From list@netscape.com  Wed Nov  1 11:55:52 2000
Received: from netscape.com (h-205-217-237-47.netscape.com [205.217.237.47])
	by ietf.org (8.9.1a/8.9.1a) with SMTP id LAA22216
	for <ldapext-archive@odin.ietf.org>; Wed, 1 Nov 2000 11:55:52 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.10.0/8.10.0) with ESMTP id eA1GkoD08796;
	Wed, 1 Nov 2000 08:46:53 -0800 (PST)
Received: (from list@localhost)
	by aka.mcom.com (8.10.0/8.10.0) id eA1Gs8Q09321;
	Wed, 1 Nov 2000 08:54:08 -0800 (PST)
Resent-Date: Wed, 1 Nov 2000 08:54:08 -0800 (PST)
Message-ID: <3A004B4C.E9E84554@worldspot.com>
Date: Wed, 01 Nov 2000 08:56:44 -0800
From: Rob Weltman <robw@worldspot.com>
X-Mailer: Mozilla 4.76 [en] (Windows NT 5.0; U)
X-Accept-Language: en-US,sv,ja
MIME-Version: 1.0
To: "Kurt D. Zeilenga" <Kurt@openldap.org>
CC: ietf-ldapext@netscape.com
Subject: Re: comments: draft-weltman-ldapv3-proxy-05.txt
References: <5.0.0.25.0.20001023091802.00a93070@router.boolean.net>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Resent-Message-ID: <"ZJ40j.A.URC.vqEA6"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com
Content-Transfer-Encoding: 7bit

Kurt,

  I have taken into account your comments in a new draft which I will be submitting shortly. But there are a couple of points I disagree with (or don't fully understand). See below.

Rob


"Kurt D. Zeilenga" wrote:
> 
> The syntax of controlType should be LDAPOID and have
> the value of the assigned OID.

  That's part of the control spec of RFC 2251 (section 4.1.12), not something that can be defined by an individual control.

> 
> I suggest you add a statement that servers recognizing this
> control MUST return an error if the control is not marked
> as being critical.

  The draft defines the syntax of the control, including the required criticality. I don't think this case is different from any others - the server should reject invalid syntax.


> "This means that fewer results, or no results, may be returned"
> I assume you meant fewer entry and references responses, not
> results.

  Search results consist of entries and references.


> 5. Security Considerations
> 
> A more detailed security analysis may be appropriate.  In
> particular of dangers of using this control in environments
> without appropriate integrity and confidentiality protections
> The risk of a control being added/modified/removed in transit
> should be briefly discussed.

  If the control is used in an environment where it's contents can be altered by an intruder, the intruder can do much worse things than add/alter/remove a proxied auth control. The intruder can change the results returned by the request (including making it fail altogether or succeed where it wouldn't have otherwise) by adding/altering/removing the control, but it could do so by adding/altering/removing any other part of the request as well. An intruder can't grab proxy rights for himself/herself without being an authentication identity entitled to proxy rights. So I think the integrity issues are covered with the text in the draft:

"The Proxied Authorization Control method is subject to standard LDAP
security considerations. The control may be passed over a secure as
well as over an insecure channel."

  I'm adding a sentence about the control including an additional identity, which may be of concern in some environments.



From list@netscape.com  Wed Nov  1 12:31:38 2000
Received: from netscape.com (h-205-217-237-47.netscape.com [205.217.237.47])
	by ietf.org (8.9.1a/8.9.1a) with SMTP id MAA02964
	for <ldapext-archive@odin.ietf.org>; Wed, 1 Nov 2000 12:31:38 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.10.0/8.10.0) with ESMTP id eA1HMbD14865;
	Wed, 1 Nov 2000 09:22:37 -0800 (PST)
Received: (from list@localhost)
	by aka.mcom.com (8.10.0/8.10.0) id eA1HTtQ08690;
	Wed, 1 Nov 2000 09:29:55 -0800 (PST)
Resent-Date: Wed, 1 Nov 2000 09:29:55 -0800 (PST)
Message-ID: <3A0053A8.91E3AFDB@worldspot.com>
Date: Wed, 01 Nov 2000 09:32:24 -0800
From: Rob Weltman <robw@worldspot.com>
X-Mailer: Mozilla 4.76 [en] (Windows NT 5.0; U)
X-Accept-Language: en-US,sv,ja
MIME-Version: 1.0
To: "Kurt D. Zeilenga" <Kurt@openldap.org>
CC: ietf-ldapext@netscape.com
Subject: Re: Comments: draft-weltman-ldapv3-auth-response-02.txt
References: <5.0.0.25.0.20001022092800.00a51160@router.boolean.net>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Resent-Message-ID: <"Ggc0zD.A.dHC.SMFA6"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com
Content-Transfer-Encoding: 7bit

"Kurt D. Zeilenga" wrote:
> 
> Rob,
> 
> It should be noted that the identity assumed by the client may
> not be represented as an LDAP DN and nor be associated with any
> entry in the directory (RFC2829).  This control only defines
> a mechanism to return the identity assumed by the client when
> that identity is in the form of a DN.  You may want to allow
> return of other forms.  I suggest the response return the
> identity in the form of an AuthzId form.
> 
> As you've noted the authorization identity assumed by the
> client may later be mapped to an access control (subject)
> identity and this is the identity to be returned.  However,
> the I-D inconsistently refers to this identity as the
> authentication identity.

  OK

 
> As there are often multiple identities (authentication,
> authorization, access control) associated with a session,
> it may be appropriate to expand the response to include other
> identities.

  That's beyond the scope of this control, which is defined to solve a particular problem (finding the authorization identity resulting from a bind).

 
> I also believe the Security Considerations needs work.
> 
> The I-D states "No additional confidential information is
> passed in the control."  This is not necessarily true.
> The fact is that this control passes additional information,
> a DN, and a DN may contain confidential information.  The
> reader should be minimally referred to RFC 2253 security
> considerations section.

  I'm adding text to the effect that the response control contains an identity, which in itself may raise confidentiality concerns in some environments. But the RFC 2253 security considerations section is not about confidentiality - it's about the fact that the same DN may be encoded in more than one way, and how to encode a DN unambiguously.

 
> However, as previously noted, a critical consideration for
> this control is that it is not protected by security layers
> negotiated by the bind operation.  As the primary purpose
> of providing such information is for verify security
> relations and/or managing information used to establish
> security relations, it would likely be quite appropriate
> to require or recommend the use of other security services
> (such as TLS).
> 
> In fact, this consideration may be significant enough to
> warrant redesign of the mechanism itself.  Use of an extended
> operation may be more appropriate.

  Using a control in conjunction with the bind request provides desirable atomicity that you don't achieve with an extended operation. The bind request produces a bind response containing the authorization identity.

  If it is unacceptable to pass the authorization identity without confidentiality protection in a particular environment, then TLS or some other protection should be in place before issuing the bind request with the auth response control, as you write above. There are many environments, though, where the authorization identity does not require confidentiality.

Rob



From list@netscape.com  Wed Nov  1 13:18:15 2000
Received: from netscape.com (h-205-217-237-46.netscape.com [205.217.237.46])
	by ietf.org (8.9.1a/8.9.1a) with SMTP id NAA16953
	for <ldapext-archive@odin.ietf.org>; Wed, 1 Nov 2000 13:18:14 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.10.0/8.10.0) with ESMTP id eA1I4is14905;
	Wed, 1 Nov 2000 10:04:45 -0800 (PST)
Received: (from list@localhost)
	by aka.mcom.com (8.10.0/8.10.0) id eA1IGeU02572;
	Wed, 1 Nov 2000 10:16:40 -0800 (PST)
Resent-Date: Wed, 1 Nov 2000 10:16:40 -0800 (PST)
Message-Id: <5.0.0.25.0.20001101091105.0295a010@router.boolean.net>
X-Sender: guru@router.boolean.net
X-Mailer: QUALCOMM Windows Eudora Version 5.0
Date: Wed, 01 Nov 2000 10:15:37 -0800
To: Rob Weltman <robw@worldspot.com>
From: "Kurt D. Zeilenga" <Kurt@openldap.org>
Subject: Re: comments: draft-weltman-ldapv3-proxy-05.txt
Cc: ietf-ldapext@netscape.com
In-Reply-To: <3A004B4C.E9E84554@worldspot.com>
References: <5.0.0.25.0.20001023091802.00a93070@router.boolean.net>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Resent-Message-ID: <"7AgaRC.A.3n.H4FA6"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com

At 08:56 AM 11/1/00 -0800, Rob Weltman wrote:
>  I have taken into account your comments in a new draft which I will be submitting shortly. But there are a couple of points I disagree with (or don't fully understand). See below.


I look forward to your new draft.  Below is clarification which
may be useful.

>"Kurt D. Zeilenga" wrote:
>> 
>> The syntax of controlType should be LDAPOID and have
>> the value of the assigned OID.
>
>  That's part of the control spec of RFC 2251 (section 4.1.12), not something that can be defined by an individual control.

It's just your notation seems odd (incorrect) to me.

You say:
   proxyAuthControl ::= SEQUENCE {
           controlType     2.16.840.1.113730.3.4.12,
           criticality     BOOLEAN DEFAULT FALSE,
           controlValue    proxyAuthValue
   }

I believe you mean:
   proxyAuthControl is a Control [RFC2251] where the controlType
   value is "2.16.840.1.113730.3.4.12" and the controlValue is
   an BER encoded proxyAuthValue.

but what you said is different.

>> 
>> I suggest you add a statement that servers recognizing this
>> control MUST return an error if the control is not marked
>> as being critical.
>
>  The draft defines the syntax of the control, including the required criticality. I don't think this case is different from any others - the server should reject invalid syntax.

RFC 2251 specifically states when unavailableCrititialExtension result
code should be returned.  In particular, if the control type is
recognized and is appropriate for the operation, the value MUST be
used regardless of the criticality field and, IMO, without regard to
the criticality field.  That is, if the server determines that value
to be used is invalid, it should return some error indicating this.
This behavior should not be dependent on whether the control was
marked as critical or not.

>> "This means that fewer results, or no results, may be returned"
>> I assume you meant fewer entry and references responses, not
>> results.
>
>  Search results consist of entries and references.

This is a nit... but to clarify: A search request in a result.
This result consists of entries and references, and a done message.
When you say "fewer results", I don't read this as "fewer entries
and messages messages", hence my suggestion that you clarify.

Kurt




From list@netscape.com  Wed Nov  1 13:24:48 2000
Received: from netscape.com (h-205-217-237-47.netscape.com [205.217.237.47])
	by ietf.org (8.9.1a/8.9.1a) with SMTP id NAA18964
	for <ldapext-archive@odin.ietf.org>; Wed, 1 Nov 2000 13:24:48 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.10.0/8.10.0) with ESMTP id eA1IFjD26671;
	Wed, 1 Nov 2000 10:15:45 -0800 (PST)
Received: (from list@localhost)
	by aka.mcom.com (8.10.0/8.10.0) id eA1IN2Q06523;
	Wed, 1 Nov 2000 10:23:02 -0800 (PST)
Resent-Date: Wed, 1 Nov 2000 10:23:02 -0800 (PST)
Message-Id: <s9fffcd3.066@prv-mail20.provo.novell.com>
X-Mailer: Novell GroupWise Internet Agent 5.5.5.1
Date: Wed, 01 Nov 2000 10:59:50 -0700
From: "Jim Sermersheim" <JIMSE@novell.com>
To: <bgreenblatt@directory-applications.com>, <ietf-ldapext@netscape.com>
Cc: <d.w.chadwick@salford.ac.uk>
Subject: Re: Relationship between dupent and matched values
Mime-Version: 1.0
Content-Type: multipart/alternative; boundary="=_5E056953.1F7E15DC"
Resent-Message-ID: <"7LObqD.A.BlB.D-FA6"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com

This is a MIME message. If you are reading this text, you may want to 
consider changing to a mail reader or gateway that understands how to 
properly handle MIME multipart messages.

--=_5E056953.1F7E15DC
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: quoted-printable

Though the two drafts aren't related in such a way that one depends on the =
other, there were iterations of the dupent draft that caused a functional =
overlap with the matched values draft. That overlap has since been =
removed, and it was thought handy to point out the way in which both =
controls could be used to produce a given result.

For now, I think I'll leave the note out.

Jim

>>> Bruce Greenblatt <bgreenblatt@directory-applications.com> 10/31/00 =
5:06:59 PM >>>
At 03:20 PM 10/31/2000, Jim Sermersheim wrote:

I'm wrapping up the final edits for a new version of the duplicate entries =
draft and I was going to add a comment about the usefulness of pairing it =
with the matched values draft. I'm hesitating now, only because I'd like =
to see this draft get to RFC status soon and so I don't want to reference =
a draft that isn't scheduled to be immediately advanced.
=20
Does anyone have strong feelings about this? We could put the note in the =
matched values draft.
=20
Jim

IMHO, the two drafts have nothing to do with each other.  Duplicate =
entries deals with entries as a whole.  Matched values (vainly) attempts =
to solve an attribute-value level problem.  Definitely do NOT tie one to =
the other!

Bruce


=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
Bruce Greenblatt, Ph. D.
Directory Tools and Application Services, Inc.
http://www.directory-applications.com
See my new Book on Internet Directories: http://www.phptr.com/ptrbooks/ptr_=
0139744525.html=20

--=_5E056953.1F7E15DC
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD>
<META http-equiv=3DContent-Type content=3D"text/html; charset=3Diso-8859-1"=
>
<META content=3D"MSHTML 5.50.4134.600" name=3DGENERATOR></HEAD>
<BODY style=3D"MARGIN-TOP: 2px; FONT: 8pt MS Sans Serif; MARGIN-LEFT: =
2px">
<DIV><FONT size=3D1>Though the two drafts aren't related in such a way =
that one=20
depends on the other, there were iterations of the dupent draft that =
caused a=20
functional overlap with the matched values draft. That overlap has since =
been=20
removed, and it was thought handy to point out the way in which both =
controls=20
could be used to produce a given result.</FONT></DIV>
<DIV><FONT size=3D1></FONT>&nbsp;</DIV>
<DIV>For now, I think I'll leave the note out.</DIV>
<DIV>&nbsp;</DIV>
<DIV>Jim<BR><BR>&gt;&gt;&gt; Bruce Greenblatt=20
&lt;bgreenblatt@directory-applications.com&gt; 10/31/00 5:06:59 PM=20
&gt;&gt;&gt;<BR>At 03:20 PM 10/31/2000, Jim Sermersheim wrote:<BR></DIV>
<BLOCKQUOTE class=3Dcite cite type=3D"cite">
  <BLOCKQUOTE class=3Dcite cite type=3D"cite"><FONT face=3D"MS Sans Serif, =
Geneva"=20
    size=3D1>I'm wrapping up the final edits for a new version of the =
duplicate=20
    entries draft and I was going to add a comment about the usefulness =
of=20
    pairing it with the matched values draft. I'm hesitating now, only =
because=20
    I'd like to see this draft get to RFC status soon and so I don't want =
to=20
    reference a draft that isn't scheduled to be immediately=20
    advanced.<BR>&nbsp;<BR>Does anyone have strong feelings about this? We =
could=20
    put the note in the matched values=20
draft.<BR>&nbsp;<BR>Jim</FONT></BLOCKQUOTE></BLOCKQUOTE><BR>IMHO, the two =
drafts=20
have nothing to do with each other.&nbsp; Duplicate entries deals with =
entries=20
as a whole.&nbsp; Matched values (vainly) attempts to solve an attribute-va=
lue=20
level problem.&nbsp; Definitely do NOT tie one to the=20
other!<BR><BR>Bruce<BR><BR><X-SIGSEP>
<P></X-SIGSEP><FONT face=3D"MS Sans Serif, Geneva"=20
size=3D1>=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D<BR=
>Bruce Greenblatt, Ph.=20
D.<BR>Directory Tools and Application Services, Inc.<BR><A=20
href=3D"http://www.directory-applications.com/"=20
eudora=3D"autourl">http</A>://www.directory-applications.<A=20
href=3D"http://www.directory-applications.com/" eudora=3D"autourl">com<BR><=
/A>See my=20
new Book on Internet Directories: <A=20
href=3D"http://www.phptr.com/ptrbooks/ptr_0139744525.html"=20
eudora=3D"autourl">http</A>://www.phptr.com/ptrbooks/ptr_0139744525.<A=20
href=3D"http://www.phptr.com/ptrbooks/ptr_0139744525.html"=20
eudora=3D"autourl">html</A></FONT> </P></BODY></HTML>

--=_5E056953.1F7E15DC--



From list@netscape.com  Wed Nov  1 13:26:24 2000
Received: from netscape.com (h-205-217-237-46.netscape.com [205.217.237.46])
	by ietf.org (8.9.1a/8.9.1a) with SMTP id NAA19348
	for <ldapext-archive@odin.ietf.org>; Wed, 1 Nov 2000 13:26:24 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.10.0/8.10.0) with ESMTP id eA1ICfs16907;
	Wed, 1 Nov 2000 10:12:42 -0800 (PST)
Received: (from list@localhost)
	by aka.mcom.com (8.10.0/8.10.0) id eA1IObk07833;
	Wed, 1 Nov 2000 10:24:37 -0800 (PST)
Resent-Date: Wed, 1 Nov 2000 10:24:37 -0800 (PST)
Message-Id: <5.0.0.25.0.20001101101714.00a66cf0@router.boolean.net>
X-Sender: guru@router.boolean.net
X-Mailer: QUALCOMM Windows Eudora Version 5.0
Date: Wed, 01 Nov 2000 10:24:03 -0800
To: Rob Weltman <robw@worldspot.com>
From: "Kurt D. Zeilenga" <Kurt@openldap.org>
Subject: Re: Comments: draft-weltman-ldapv3-auth-response-02.txt
Cc: ietf-ldapext@netscape.com
In-Reply-To: <3A0053A8.91E3AFDB@worldspot.com>
References: <5.0.0.25.0.20001022092800.00a51160@router.boolean.net>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Resent-Message-ID: <"2-zB1.A.C6B.h_FA6"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com

At 09:32 AM 11/1/00 -0800, Rob Weltman wrote:
>"Kurt D. Zeilenga" wrote:
>> However, as previously noted, a critical consideration for
>> this control is that it is not protected by security layers
>> negotiated by the bind operation.  As the primary purpose
>> of providing such information is for verify security
>> relations and/or managing information used to establish
>> security relations, it would likely be quite appropriate
>> to require or recommend the use of other security services
>> (such as TLS).
>> 
>> In fact, this consideration may be significant enough to
>> warrant redesign of the mechanism itself.  Use of an extended
>> operation may be more appropriate.
>
>  Using a control in conjunction with the bind request provides desirable atomicity that you don't achieve with an extended operation. The bind request produces a bind response containing the authorization identity.

This seems reasonable rational for using a bind control.  I suggest
you detail the above security consideration (control not protected
by services negotiate by the BIND).  Besides being a specific
consideration in regards to this specification, it (IIRC)
is not specifically addressed in RFC 2251 nor 2829.

Kurt



From list@netscape.com  Thu Nov  2 05:47:16 2000
Received: from netscape.com (h-205-217-237-46.netscape.com [205.217.237.46])
	by ietf.org (8.9.1a/8.9.1a) with SMTP id FAA05392
	for <ldapext-archive@odin.ietf.org>; Thu, 2 Nov 2000 05:47:15 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.10.0/8.10.0) with ESMTP id eA2AXps21681;
	Thu, 2 Nov 2000 02:33:51 -0800 (PST)
Received: (from list@localhost)
	by aka.mcom.com (8.10.0/8.10.0) id eA2Ajlg09600;
	Thu, 2 Nov 2000 02:45:47 -0800 (PST)
Resent-Date: Thu, 2 Nov 2000 02:45:47 -0800 (PST)
From: jimmy_o@angelfire.com
Subject: Make money with the BANK'S money.
Reply-To: jimmy_o@angelfire.com
Date: 02 Nov 2000 05:52:01 -0500
Mime-Version: 1.0
Content-Type: text/html
Message-Id: <20001102102702.EMT27484@mailhost.attcanada.net>
Resent-Message-ID: <"lJ39d.A.KVC.XXUA6"@glacier>
To: ietf-ldapext@netscape.com
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com
Content-Transfer-Encoding: quoted-printable
X-MIME-Autoconverted: from 8bit to quoted-printable by netscape.com id eA2AXps21681
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml"
xmlns:o=3D"urn:schemas-microsoft-com:office:office"
xmlns:w=3D"urn:schemas-microsoft-com:office:word"
xmlns:dt=3D"uuid:C2F41010-65B3-11d1-A29F-00AA00C14882"
xmlns=3D"http://www.w3.org/TR/REC-html40">

<head>
<meta name=3D"Microsoft Theme 2.00" content=3D"blends 011">
<meta http-equiv=3DContent-Type content=3D"text/html; charset=3Dwindows-1=
252">
<meta name=3DProgId content=3DWord.Document>
<meta name=3DGenerator content=3D"Microsoft Word 9">
<meta name=3DOriginator content=3D"Microsoft Word 9">
<link rel=3DFile-List href=3D"./$ecret%20Banking%20$ystem.htm2_files/file=
list.xml">
<link rel=3DEdit-Time-Data
href=3D"./$ecret%20Banking%20$ystem.htm2_files/editdata.mso">
<!--[if !mso]>
<style>
v\:* {behavior:url(#default#VML);}
o\:* {behavior:url(#default#VML);}
w\:* {behavior:url(#default#VML);}
.shape {behavior:url(#default#VML);}
</style>
<![endif]-->
<title> </title>
<!--[if gte mso 9]><xml>
 <o:DocumentProperties>
  <o:Author>Ali Moreira</o:Author>
  <o:LastAuthor>Ali Moreira</o:LastAuthor>
  <o:Revision>2</o:Revision>
  <o:TotalTime>36</o:TotalTime>
  <o:Created>2000-10-31T01:40:00Z</o:Created>
  <o:LastSaved>2000-10-31T01:40:00Z</o:LastSaved>
  <o:Pages>3</o:Pages>
  <o:Words>1416</o:Words>
  <o:Characters>8075</o:Characters>
  <o:Lines>67</o:Lines>
  <o:Paragraphs>16</o:Paragraphs>
  <o:CharactersWithSpaces>9916</o:CharactersWithSpaces>
  <o:Version>9.2720</o:Version>
 </o:DocumentProperties>
</xml><![endif]--><!--[if gte mso 9]><xml>
 <w:WordDocument>
  <w:EmbedTrueTypeFonts/>
  <w:DrawingGridHorizontalSpacing>4.5 pt</w:DrawingGridHorizontalSpacing>
  <w:DisplayHorizontalDrawingGridEvery>2</w:DisplayHorizontalDrawingGridE=
very>
  <w:DisplayVerticalDrawingGridEvery>2</w:DisplayVerticalDrawingGridEvery=
>
  <w:DoNotOptimizeForBrowser/>
 </w:WordDocument>
</xml><![endif]-->
<style>
<!--
 /* Font Definitions */
@font-face
	{font-family:"Trebuchet MS";
	panose-1:2 11 6 3 2 2 2 2 2 4;
	mso-font-charset:0;
	mso-generic-font-family:swiss;
	mso-font-pitch:variable;
	mso-font-signature:7 0 0 0 19 0;
	mso-font-src:0;}
 /* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{mso-style-parent:"";
	margin:0in;
	margin-bottom:.0001pt;
	mso-pagination:widow-orphan;
	font-size:12.0pt;
	font-family:"Trebuchet MS";
	mso-fareast-font-family:"Times New Roman";
	mso-bidi-font-family:"Times New Roman";
	color:black;
	mso-ansi-language:EN-US;}
h1
	{mso-style-next:Normal;
	margin-top:12.0pt;
	margin-right:0in;
	margin-bottom:3.0pt;
	margin-left:0in;
	mso-pagination:widow-orphan;
	page-break-after:avoid;
	mso-outline-level:1;
	font-size:24.0pt;
	font-family:"Trebuchet MS";
	mso-bidi-font-family:Arial;
	color:#330099;
	mso-font-kerning:16.0pt;
	mso-ansi-language:EN-US;
	font-weight:normal;
	mso-bidi-font-weight:bold;}
h2
	{mso-style-next:Normal;
	margin-top:12.0pt;
	margin-right:0in;
	margin-bottom:3.0pt;
	margin-left:0in;
	mso-pagination:widow-orphan;
	page-break-after:avoid;
	mso-outline-level:2;
	font-size:18.0pt;
	font-family:"Trebuchet MS";
	mso-bidi-font-family:Arial;
	color:#330099;
	mso-ansi-language:EN-US;
	font-weight:normal;
	mso-bidi-font-weight:bold;
	mso-bidi-font-style:italic;}
h3
	{mso-style-next:Normal;
	margin-top:12.0pt;
	margin-right:0in;
	margin-bottom:3.0pt;
	margin-left:0in;
	mso-pagination:widow-orphan;
	page-break-after:avoid;
	mso-outline-level:3;
	font-size:14.0pt;
	font-family:"Trebuchet MS";
	mso-bidi-font-family:Arial;
	color:#330099;
	mso-ansi-language:EN-US;
	font-weight:normal;
	mso-bidi-font-weight:bold;}
h4
	{mso-style-next:Normal;
	margin-top:12.0pt;
	margin-right:0in;
	margin-bottom:3.0pt;
	margin-left:0in;
	mso-pagination:widow-orphan;
	page-break-after:avoid;
	mso-outline-level:4;
	font-size:12.0pt;
	font-family:"Trebuchet MS";
	color:#330099;
	mso-ansi-language:EN-US;
	font-weight:normal;
	mso-bidi-font-weight:bold;}
h5
	{mso-style-next:Normal;
	margin-top:12.0pt;
	margin-right:0in;
	margin-bottom:3.0pt;
	margin-left:0in;
	mso-pagination:widow-orphan;
	mso-outline-level:5;
	font-size:10.0pt;
	font-family:"Trebuchet MS";
	color:#330099;
	mso-ansi-language:EN-US;
	font-weight:normal;
	mso-bidi-font-weight:bold;
	mso-bidi-font-style:italic;}
h6
	{mso-style-next:Normal;
	margin-top:12.0pt;
	margin-right:0in;
	margin-bottom:3.0pt;
	margin-left:0in;
	mso-pagination:widow-orphan;
	mso-outline-level:6;
	font-size:8.0pt;
	font-family:"Trebuchet MS";
	color:#330099;
	mso-ansi-language:EN-US;
	font-weight:normal;
	mso-bidi-font-weight:bold;}
p.MsoHeading7, li.MsoHeading7, div.MsoHeading7
	{mso-style-next:Normal;
	margin:0in;
	margin-bottom:.0001pt;
	mso-pagination:widow-orphan;
	page-break-after:avoid;
	mso-outline-level:7;
	font-size:14.0pt;
	mso-bidi-font-size:12.0pt;
	font-family:"Times New Roman";
	mso-fareast-font-family:"Times New Roman";
	color:green;
	mso-ansi-language:ES;
	font-weight:bold;}
p.MsoHeading8, li.MsoHeading8, div.MsoHeading8
	{mso-style-next:Normal;
	margin:0in;
	margin-bottom:.0001pt;
	mso-pagination:widow-orphan;
	page-break-after:avoid;
	mso-outline-level:8;
	font-size:12.0pt;
	font-family:"Times New Roman";
	mso-fareast-font-family:"Times New Roman";
	color:black;
	mso-ansi-language:EN-US;
	font-weight:bold;
	text-decoration:underline;
	text-underline:single;}
p.MsoBodyText, li.MsoBodyText, div.MsoBodyText
	{margin:0in;
	margin-bottom:.0001pt;
	mso-pagination:widow-orphan;
	font-size:14.0pt;
	mso-bidi-font-size:12.0pt;
	font-family:"Times New Roman";
	mso-fareast-font-family:"Times New Roman";
	color:green;
	mso-ansi-language:EN-US;
	font-weight:bold;}
p.MsoBodyText2, li.MsoBodyText2, div.MsoBodyText2
	{margin:0in;
	margin-bottom:.0001pt;
	mso-pagination:widow-orphan;
	font-size:8.0pt;
	mso-bidi-font-size:12.0pt;
	font-family:Arial;
	mso-fareast-font-family:"Times New Roman";
	color:navy;
	mso-ansi-language:EN-US;}
p.MsoBodyText3, li.MsoBodyText3, div.MsoBodyText3
	{margin:0in;
	margin-bottom:.0001pt;
	mso-pagination:widow-orphan;
	font-size:11.0pt;
	mso-bidi-font-size:12.0pt;
	font-family:"Trebuchet MS";
	mso-fareast-font-family:"Times New Roman";
	mso-bidi-font-family:"Times New Roman";
	color:black;
	mso-ansi-language:EN-US;
	font-weight:bold;}
a:link, span.MsoHyperlink
	{color:#993300;
	text-decoration:underline;
	text-underline:single;}
a:visited, span.MsoHyperlinkFollowed
	{color:blue;
	text-decoration:underline;
	text-underline:single;}
p.MsoAutoSig, li.MsoAutoSig, div.MsoAutoSig
	{margin:0in;
	margin-bottom:.0001pt;
	mso-pagination:widow-orphan;
	font-size:12.0pt;
	font-family:"Times New Roman";
	mso-fareast-font-family:"Times New Roman";
	color:windowtext;}
p
	{margin-right:0in;
	mso-margin-top-alt:auto;
	mso-margin-bottom-alt:auto;
	margin-left:0in;
	mso-pagination:widow-orphan;
	font-size:12.0pt;
	font-family:"Times New Roman";
	mso-fareast-font-family:"Times New Roman";
	color:black;}
@page Section1
	{size:8.5in 11.0in;
	margin:1.0in 1.25in 1.0in 1.25in;
	mso-header-margin:.5in;
	mso-footer-margin:.5in;
	mso-paper-source:0;}
div.Section1
	{page:Section1;}
 /* List Definitions */
@list l0
	{mso-list-id:453330396;
	mso-list-type:hybrid;
	mso-list-template-ids:-2076952058 1687730822 859337026 2142397396 109529=
7004 -14226464 -1481212008 2100362202 -1631308784 -912904114;}
@list l0:level1
	{mso-level-tab-stop:.5in;
	mso-level-number-position:left;
	text-indent:-.25in;}
ol
	{margin-bottom:0in;}
ul
	{margin-bottom:0in;}
-->
</style>
<!--[if gte mso 9]><xml>
 <o:shapedefaults v:ext=3D"edit" spidmax=3D"2050"/>
</xml><![endif]--><!--[if gte mso 9]><xml>
 <o:shapelayout v:ext=3D"edit">
  <o:idmap v:ext=3D"edit" data=3D"1"/>
 </o:shapelayout></xml><![endif]-->
</head>

<body bgcolor=3Dwhite
background=3D"./$ecret%20Banking%20$ystem.htm2_files/image001.gif" lang=3D=
EN-CA
link=3D"#993300" vlink=3Dblue style=3D'tab-interval:.5in'>
<!--[if gte mso 9]><xml>
 <v:background id=3D"_x0000_s1025" o:bwmode=3D"white" o:targetscreensize=3D=
"800,600">
  <v:fill src=3D"./$ecret%20Banking%20$ystem.htm2_files/image001.gif" o:t=
itle=3D"blegtext"
   type=3D"frame"/>
 </v:background></xml><![endif]-->

<div class=3DSection1>

<p align=3Dcenter style=3D'text-align:center'><!--[if gte vml 1]><v:shape=
type id=3D"_x0000_t75"
 coordsize=3D"21600,21600" o:spt=3D"75" o:preferrelative=3D"t" path=3D"m@=
4@5l@4@11@9@11@9@5xe"
 filled=3D"f" stroked=3D"f">
 <v:stroke joinstyle=3D"miter"/>
 <v:formulas>
  <v:f eqn=3D"if lineDrawn pixelLineWidth 0"/>
  <v:f eqn=3D"sum @0 1 0"/>
  <v:f eqn=3D"sum 0 0 @1"/>
  <v:f eqn=3D"prod @2 1 2"/>
  <v:f eqn=3D"prod @3 21600 pixelWidth"/>
  <v:f eqn=3D"prod @3 21600 pixelHeight"/>
  <v:f eqn=3D"sum @0 0 1"/>
  <v:f eqn=3D"prod @6 1 2"/>
  <v:f eqn=3D"prod @7 21600 pixelWidth"/>
  <v:f eqn=3D"sum @8 21600 0"/>
  <v:f eqn=3D"prod @7 21600 pixelHeight"/>
  <v:f eqn=3D"sum @10 21600 0"/>
 </v:formulas>
 <v:path o:extrusionok=3D"f" gradientshapeok=3D"t" o:connecttype=3D"rect"=
/>
 <o:lock v:ext=3D"edit" aspectratio=3D"t"/>
</v:shapetype><v:shape id=3D"_x0000_i1025" type=3D"#_x0000_t75" style=3D'=
width:620.4pt;
 height:45pt'>
 <v:imagedata src=3D"./$ecret%20Banking%20$ystem.htm2_files/image002.jpg"
  o:title=3D"KeyToFinFuture"/>
</v:shape><![endif]--><![if !vml]><img width=3D827 height=3D60
src=3D"./$ecret%20Banking%20$ystem.htm2_files/image003.jpg" v:shapes=3D"_=
x0000_i1025"><![endif]></p>

<h1 align=3Dright style=3D'margin-left:.5in;text-align:right'><span lang=3D=
EN-US
style=3D'font-size:8.0pt;mso-bidi-font-size:24.0pt;color:blue'>Remove ins=
truction
at the bottom<o:p></o:p></span></h1>

<p class=3DMsoNormal><span lang=3DEN-US><![if !supportEmptyParas]>&nbsp;<=
![endif]><o:p></o:p></span></p>

<h1 align=3Dcenter style=3D'margin-left:.5in;text-align:center'><b
style=3D'mso-bidi-font-weight:normal'><span lang=3DEN-US style=3D'font-si=
ze:12.0pt;
mso-bidi-font-size:24.0pt'>QUICK CASH SECRET BANKING SYSTEM, THE SECRETS =
OF THE
RICH &amp; FAMOUS REVEALED AT LAST!!!</span></b><span lang=3DEN-US> </spa=
n><span
lang=3DEN-US style=3D'font-size:12.0pt;mso-bidi-font-size:24.0pt;color:re=
d'>Make
money with the abundance of the bank=92s money</span><span lang=3DEN-US><=
span
style=3D"mso-spacerun: yes">=A0 </span></span><span lang=3DEN-US style=3D=
'font-size:
12.0pt;mso-bidi-font-size:24.0pt'><o:p></o:p></span></h1>

<h1 align=3Dcenter style=3D'margin-left:.5in;text-align:center'><span lan=
g=3DEN-US
style=3D'font-size:10.0pt;mso-bidi-font-size:24.0pt'><span style=3D"mso-s=
pacerun:
yes">=A0 </span></span><span lang=3DEN-US style=3D'font-size:10.0pt;mso-b=
idi-font-size:
24.0pt;color:pink'>$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$=
$$<o:p></o:p></span></h1>

<h2 style=3D'margin-left:.5in'><span lang=3DEN-US style=3D'font-size:12.0=
pt;
mso-bidi-font-size:18.0pt;color:green'>Quick Cash Secret Banking System</=
span><span
lang=3DEN-US style=3D'font-size:11.0pt;mso-bidi-font-size:18.0pt;color:gr=
een'> </span><span
lang=3DEN-US style=3D'font-size:11.0pt;mso-bidi-font-size:18.0pt'>is the =
fastest
and the easiest money making system today in the world, used by all
multi-millionaires to pile up cash, without any huffing and puffing</span=
><span
lang=3DEN-US style=3D'font-size:12.0pt;mso-bidi-font-size:18.0pt'>! <o:p>=
</o:p></span></h2>

<h4 align=3Dcenter style=3D'margin-top:0in;margin-right:0in;margin-bottom=
:0in;
margin-left:.5in;margin-bottom:.0001pt;text-align:center'><span lang=3DEN=
-US
style=3D'color:black'>=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D<o:p></o:p></span></h4>

<p style=3D'margin-left:.5in;mso-outline-level:5'>It is 100% legal, easy,=
 fast
and fun! <span style=3D'color:blue'>There is no scam or shady transaction=
! </span>It
WORKS in any country in the world that has bank(s) and provides the facil=
ity to
open checking account(s). </p>

<p align=3Dcenter style=3D'margin-left:.5in;text-align:center;mso-outline=
-level:
5'><span style=3D'color:pink'>&lt;&lt;&gt;&lt;&gt;&lt;&gt;&lt;&gt;&lt;&gt=
;&lt;&gt;&lt;&gt;&lt;&gt;&lt;&gt;&lt;&gt;&lt;&lt;&gt;&lt;&gt;&lt;&gt;&lt;=
&gt;&lt;&gt;</span><o:p></o:p></p>

<p>I guarantee that from this moment on your life will never be the same =
again.
You will be amazed at how much money you will be capable of having in jus=
t a
few days, right from your Federal Reserve Board.<o:p></o:p></p>

<p>Please, leave the skepticism in the past. If you are skeptical, this w=
ill
not work or anything else in life for that matter, because you will not
believe.<span style=3D"mso-spacerun: yes">=A0=A0 </span>If you were promi=
sed
$5,000,000 to jump out of an airplane without a parachute, would you do i=
t? If
you answered &quot;<b>No</b>&quot; you answered <b>Wrong</b>! Like the ma=
jority
of the people, you made a decision before you had all the facts. Had you =
investigated
further, you would have found out that the plane was on the ground. Do no=
t let
the greatest opportunity of your life pass you by because you were so eag=
er to
jump into conclusions that you did not get all the facts. Please, read on=
 and
try to get the concept of what I can give you here and now, before you fo=
rm any
opinions.<o:p></o:p></p>

<p>Ok, I think that you are ready to begin now.<span style=3D"mso-spaceru=
n:
yes">=A0 </span>I want you to follow exactly the instructions that you ar=
e about
to read. Let me be your guide throughout the entire booklet.<span
style=3D"mso-spacerun: yes">=A0 </span>It is financial health you are loo=
king for
and I sure know how you can get it. So, follow my instructions.<span
style=3D"mso-spacerun: yes">=A0 </span><o:p></o:p></p>

<p align=3Dcenter style=3D'text-align:center'><b><span style=3D'font-size=
:14.0pt;
mso-bidi-font-size:12.0pt;color:green;background:white'>MAKE MONEY WITH T=
HE
BANK=92S MONEY</span></b><span style=3D'color:green'><o:p></o:p></span></=
p>

<p>During a 6-month period you will be able to deposit 50,000 dollars in =
your
personal bank accounts, without doing anything at all!<span
style=3D"mso-spacerun: yes">=A0 </span>Let me elaborate just a little.<sp=
an
style=3D"mso-spacerun: yes">=A0 </span><b>=93You do not do anything physi=
cal to bring
in this kind of money!=94</b><span style=3D"mso-spacerun: yes">=A0 </span=
>The bank
does all the work for you at your convenience, and as long as you keep yo=
ur
account <b>=93open=94 </b>they almost have no choice!<span style=3D"mso-s=
pacerun:
yes">=A0 </span>I will show you how to make a <b>minimum of $5,000 a mont=
h by
just opening a bank account</b>. <span style=3D"mso-spacerun: yes">=A0</s=
pan>But
that is just the tip of the iceberg!<span style=3D"mso-spacerun: yes">=A0=
 </span>By
opening a bank account, I will teach you how to have that kind of money
deposited into your bank account <b>Automatically</b>, though a built-in
automatic process that I will personally show you.<span style=3D"mso-spac=
erun:
yes">=A0 </span>That is the beauty of the $ecret Banking $ystem!<span
style=3D"mso-spacerun: yes">=A0 </span>Imagine making $5,000 a month for =
each bank
account you =93open=94.<span style=3D"mso-spacerun: yes">=A0 </span>And a=
side from
opening the account, it does not cost you anything!<span style=3D"mso-spa=
cerun:
yes">=A0 </span>Just one bank account can make you financially independen=
t for
life! <o:p></o:p></p>

<p>Now Think Big.<span style=3D"mso-spacerun: yes">=A0 </span>Think of th=
e same idea
on a slight larger scale, like two or three bank accounts working at the =
same
time each producing a guaranteed monthly income of $5,000 each.<span
style=3D"mso-spacerun: yes">=A0 </span>As of today, I have 13 active acco=
unt
@$5,000 =3D $65,000 per month, every month, 12 months a year.<span
style=3D"mso-spacerun: yes">=A0 </span>I assure you, there is no print er=
ror.<span
style=3D"mso-spacerun: yes">=A0 </span>I said 65 thousand dollars per mon=
th! <o:p></o:p></p>

<p>In summary this is how the formula works:<span style=3D"mso-spacerun: =
yes">=A0
</span>YOU walk into a bank, open a bank account, follow the instructions=
 like
a recipe in a cookbook, and 30 days later you will make $5,000. <span
style=3D"mso-spacerun: yes">=A0</span>And one of the most amazing realiti=
es of the
$ecret Banking $ystem is that you can begin with literally $0, zero money=
.<span
style=3D"mso-spacerun: yes">=A0 </span>In the $ecret Banking $ystem manua=
l, in an
easy to duplicate as a set of =93blueprints=94, you will find out for you=
rself
where all the money comes from and how it is added up for you.<o:p></o:p>=
</p>

<p class=3DMsoNormal><span lang=3DEN-US style=3D'font-family:"Times New R=
oman"'>I realize
what I am originating to you may sound impossible, but I promise you, it =
is
possible, doable and simple.<span style=3D"mso-spacerun: yes">=A0 </span>=
There is
not shortage of money, the Federal Reserve Board creates money daily but =
most
of it must pass through and circulate in the banks over and over again. <=
span
style=3D"mso-spacerun: yes">=A0</span>That is how banks run.<span
style=3D"mso-spacerun: yes">=A0 </span>That is where this Ingenious $ecre=
t Banking
$ystem comes in.<span style=3D"mso-spacerun: yes">=A0 </span>All you need=
 is the $ecret
Banking $ystem manual to start making big money.<span style=3D"mso-spacer=
un:
yes">=A0 </span><b>IF YOU ORDER TODAY WE SHALL ADD AT NO EXTRA COST TO YO=
U, </b></span><b><span
lang=3DEN-US style=3D'font-family:"Times New Roman";color:red'>THE FAMOUS=
 </span></b><b><span
lang=3DEN-US style=3D'mso-bidi-font-size:10.0pt;font-family:"Times New Ro=
man";
color:red'>&quot;101 High Profit Businesses You Can Start Online For Litt=
le Or
No Money&quot;, PLUS 1,000,000 ONE MILLION OPT-IN ADDRESSES- FREE!!</span=
></b><span
lang=3DEN-US style=3D'font-family:"Times New Roman"'><o:p></o:p></span></=
p>

<p>That you obtain your very own copy of the $ecret Banking $ystem and th=
e
above mentioned, take the first step and invest only $49US for something =
that
is worth its weight in gold.<span style=3D"mso-spacerun: yes">=A0 </span>=
Copy and
mail-send a money order <b>and Postal Money Order must be INTERNATIONAL</=
b>.<span
style=3D"mso-spacerun: yes">=A0 </span>You can also send a cheque (we acc=
ept cash)
to: <o:p></o:p></p>

<p class=3DMsoNormal><b><span lang=3DEN-US style=3D'font-size:14.0pt;mso-=
bidi-font-size:
12.0pt;font-family:"Times New Roman";color:green'>All Moreir <o:p></o:p><=
/span></b></p>

<p class=3DMsoHeading7><span lang=3DEN-US style=3D'mso-ansi-language:EN-U=
S'>970 Queen
St. E. #98165<o:p></o:p></span></p>

<p class=3DMsoHeading7><span lang=3DES>Toronto, Ontario, Canada<o:p></o:p=
></span></p>

<p class=3DMsoHeading7><span lang=3DES>M4M 1J0<o:p></o:p></span></p>

<p class=3DMsoNormal><b><span lang=3DEN-US style=3D'font-size:14.0pt;mso-=
bidi-font-size:
12.0pt;font-family:"Times New Roman";color:green'>___________<o:p></o:p><=
/span></b></p>

<p class=3DMsoNormal><b><span lang=3DEN-US style=3D'font-size:14.0pt;mso-=
bidi-font-size:
12.0pt;font-family:"Times New Roman";color:green'>ORDER FORM<o:p></o:p></=
span></b></p>

<p class=3DMsoNormal><b><span lang=3DEN-US style=3D'font-size:14.0pt;mso-=
bidi-font-size:
12.0pt;font-family:"Times New Roman";color:green'><![if !supportEmptyPara=
s]>&nbsp;<![endif]><o:p></o:p></span></b></p>

<p class=3DMsoHeading7><span lang=3DEN-US style=3D'mso-ansi-language:EN-U=
S'>Name<span
style=3D'mso-tab-count:1'>=A0=A0=A0=A0=A0=A0=A0=A0=A0 </span>____________=
____________________________________<o:p></o:p></span></p>

<p class=3DMsoHeading7><span lang=3DEN-US style=3D'mso-ansi-language:EN-U=
S'>Address<span
style=3D'mso-tab-count:1'>=A0=A0=A0=A0=A0=A0 </span>_____________________=
_________________________<o:p></o:p></span></p>

<p class=3DMsoNormal><b><span lang=3DEN-US style=3D'font-size:14.0pt;mso-=
bidi-font-size:
12.0pt;font-family:"Times New Roman";color:green'>City<span style=3D'mso-=
tab-count:
1'>=A0=A0 </span>_____________________<span style=3D'mso-tab-count:1'>=A0=
=A0=A0=A0=A0=A0=A0 </span>State_________<span
style=3D'mso-tab-count:1'>=A0=A0 </span>Zip_____-________<o:p></o:p></spa=
n></b></p>

<p class=3DMsoHeading7><span lang=3DEN-US style=3D'mso-ansi-language:EN-U=
S'>Fax<span
style=3D'mso-tab-count:1'>=A0=A0=A0 </span>(_____) _____-______<o:p></o:p=
></span></p>

<p class=3DMsoNormal><b><span lang=3DEN-US style=3D'font-size:14.0pt;mso-=
bidi-font-size:
12.0pt;font-family:"Times New Roman";color:green'>E-mail address<span
style=3D'mso-tab-count:1'>=A0=A0=A0=A0=A0 </span>________________________=
_________________<o:p></o:p></span></b></p>

<p class=3DMsoBodyText><span lang=3DEN-US style=3D'font-size:11.0pt;mso-b=
idi-font-size:
12.0pt;font-weight:normal'>Send me the $ecret Banking $ystem right now,
please.<span style=3D"mso-spacerun: yes">=A0 </span><u>Here is the $49US<=
/u>. </span><span
lang=3DEN-US style=3D'font-size:11.0pt;mso-bidi-font-size:12.0pt;color:re=
d;
font-weight:normal'>Postal Money Order must be </span><span lang=3DEN-US
style=3D'font-size:11.0pt;mso-bidi-font-size:12.0pt;color:red'>INTERNATIO=
NAL</span><span
lang=3DEN-US style=3D'font-size:11.0pt;mso-bidi-font-size:12.0pt;font-wei=
ght:normal'><o:p></o:p></span></p>

<p class=3DMsoHeading8><span lang=3DEN-US>Write legible please<o:p></o:p>=
</span></p>

<p class=3DMsoNormal><b><span lang=3DEN-US style=3D'font-size:14.0pt;mso-=
bidi-font-size:
12.0pt;font-family:"Times New Roman";color:green'>________ Check here if =
you
would like to receive this information by e-mail as an attachment and </s=
pan></b><b><span
lang=3DEN-US style=3D'font-size:13.0pt;mso-bidi-font-size:12.0pt;font-fam=
ily:"Times New Roman";
color:green'>save the $5.00 shipping and handling fee, which is the faste=
st
service; if not please add $5US for S&amp;H.</span></b><b><i><span lang=3D=
EN-US
style=3D'font-size:14.0pt;mso-bidi-font-size:12.0pt;color:green'> <o:p></=
o:p></span></i></b></p>

<p class=3DMsoNormal align=3Dcenter style=3D'text-align:center'><b><span =
lang=3DEN-US
style=3D'font-size:14.0pt;mso-bidi-font-size:12.0pt'>IF YOU ORDER TODAY<o=
:p></o:p></span></b></p>

<p class=3DMsoNormal align=3Dcenter style=3D'text-align:center'><b><span =
lang=3DEN-US
style=3D'font-size:14.0pt;mso-bidi-font-size:12.0pt'>WE SHALL ADD AT NO E=
XTRA
COST TO YOU, </span></b><b><span lang=3DEN-US style=3D'font-size:14.0pt;m=
so-bidi-font-size:
12.0pt;color:red'>THE FAMOUS </span></b><b><span lang=3DEN-US style=3D'fo=
nt-size:
11.0pt;mso-bidi-font-size:10.0pt;font-family:Arial;color:red'>&quot;101 H=
igh
Profit Businesses You Can Start Online For Little Or No Money&quot;, PLUS=
 MORE
THAN ONE MILLION OPT-IN ADDRESSES- FREE!!<o:p></o:p></span></b></p>

<p class=3DMsoNormal><b><span lang=3DEN-US style=3D'color:#333399'>Postal=
 Money
Orders MUST be international</span></b><span lang=3DEN-US style=3D'color:=
#333399'>-
- </span><span lang=3DEN-US style=3D'font-size:10.0pt;mso-bidi-font-size:=
12.0pt;
color:#333399'>if not, this will not be negotiable outside the USA and wi=
ll be
returned.</span><span lang=3DEN-US style=3D'font-size:10.0pt;mso-bidi-fon=
t-size:
12.0pt;font-family:"Times New Roman";color:#333399'><o:p></o:p></span></p=
>

<p class=3DMsoBodyText2><span lang=3DEN-US>If you realize that you are on=
 this list
in error or have changed your mind or if you do not want this type of
information, please reply to this e-mail with &quot;REMOVE&quot; in the s=
ubject
field and you will be removed immediately! I apologize for any mistake,
intrusion or inconvenience, if any.<span style=3D"mso-spacerun: yes">=A0
</span>Under Bill 1618 Title 111 passed by the 105th U.S. Congress, this
message can not be considered SPAM as long as we include a way for it to =
be
removed from future mailings</span></p>

<p align=3Dcenter style=3D'text-align:center'><b><u>&nbsp;</u></b><b><u><=
span
style=3D'color:green;background:white'>Foundations of Wealth</span></u></=
b><b><u><span
style=3D'color:green;background:gray'><o:p></o:p></span></u></b></p>

<p>If you wish to learn more=85=85please read on</p>

<p>A few years ago I believed that I really had to work hard to make mone=
y. I
thought that the more I worked, the more money I was going to make. But a=
fter a
while I realized that I was not getting anywhere. I was working like a sl=
ave
and I was not seeing any satisfactory results. I wondered why I wasn't be=
cause
I sure was applying the time and the effort. <o:p></o:p></p>

<p>I realized that I needed to make a change. For months I tried to find =
that
special answer that I needed. I tried different things, but none of them
worked. I was lost. Finally, I was ready to give up my dreams and continu=
e
living that ordinary life that I was used to living. You know, that wake =
up, go
to work, come home, have dinner, and go to bed sort of life. That kind of=
 life
that I am very sure you are used to living. But no! I had to give it one =
more
chance. I could not quit that easily. So, an idea came to my mind and I d=
ecided:
&quot;If I want to be become extremely wealthy, why don't I study people =
who
already are extremely wealthy and interpret what they are doing?&quot; So=
 that
is what I did. After a few months, I realized that the majority of the
extremely wealthy people did not work that hard. Also, the majority of th=
em not
only had enough money to buy another planet, but they also had the time a=
nd the
freedom to enjoy it. That is what I consider true wealth, and that is exa=
ctly
what $ecret Banking $ystem is all about. The ability to have free time an=
d be
able to do what you choose, when you choose it. I think that is where the=
 majority
of the people get confused on the definition of wealth. Wealth is not jus=
t
money. Wealth is also the ability to spend it the way you choose to do, w=
hen
you want to do so.<o:p></o:p></p>

<p>Having accomplished my goals, my purpose now is to help those that are=
 in the
situation I was in; my purpose is to turn you into a &quot;true&quot; wea=
lthy
person; I want you to have great amounts of money, and great amounts of f=
ree
time to enjoy it. Now, the first step to accomplish this is the one that =
a lot
of people do not pay that much attention to, yet it is one of the most
important aspects of true wealth. I am talking about the mental aspect of=
 true
wealth. Hang on! <span style=3D"mso-spacerun: yes">=A0</span>I know you a=
re tired
of listening the same psychology song over and over. Do not worry! <span
style=3D"mso-spacerun: yes">=A0</span>The mental aspect of true wealth is=
 actually
very simple and easy to apply. It is actually like a list of steps that y=
ou
have to &quot;get into your mind&quot; before we really get into the
&quot;secrets&quot; of making money with the bank=92s money that I have b=
een
talking about so much. Once you know all these steps and are ready to app=
ly
them, then you will really be ready to start the journey.<o:p></o:p></p>

<p>Please! Do not jump this section thinking that you do not need any men=
tal
preparation. It is very important! Remember, follow my instructions and y=
ou
could be sitting on gold in just days.<o:p></o:p></p>

<p>Do you remember the three &quot;keys&quot; to success that I explained=
 on
the web site? If you forgot, the three &quot;keys&quot; to success are:<o=
:p></o:p></p>

<ol start=3D1 type=3D1>
 <li class=3DMsoNormal style=3D'mso-margin-top-alt:auto;mso-margin-bottom=
-alt:auto;
     mso-list:l0 level1 lfo1;tab-stops:list .5in'><span lang=3DEN-US
     style=3D'font-family:"Times New Roman"'>Timing: Being at the right p=
lace at
     the right time. <o:p></o:p></span></li>
 <li class=3DMsoNormal style=3D'mso-margin-top-alt:auto;mso-margin-bottom=
-alt:auto;
     mso-list:l0 level1 lfo1;tab-stops:list .5in'><span lang=3DEN-US
     style=3D'font-family:"Times New Roman"'>Having Vision: Seeing potent=
ial in
     what is being presented. Having the ability to see success. <o:p></o=
:p></span></li>
 <li class=3DMsoNormal style=3D'mso-margin-top-alt:auto;mso-margin-bottom=
-alt:auto;
     mso-list:l0 level1 lfo1;tab-stops:list .5in'><span lang=3DEN-US
     style=3D'font-family:"Times New Roman"'>Taking Action: Going one ste=
p
     further than the rest. Doing instead of saying.<o:p></o:p></span></l=
i>
</ol>

<p class=3DMsoNormal><span lang=3DEN-US style=3D'font-family:"Times New R=
oman"'>These
three &quot;keys&quot; are essential to recognize success, and to make it=
 a
part of your life. Now, once you have made the decision to &quot;Take
Action,&quot; your next task is to follow what I call &quot;The Ten Steps=
 To
Success.&quot; As I said before, they are very simple, but extremely impo=
rtant
if your purpose is to achieve true wealth. I would happily give them to y=
ou as
part of the Training I provide when you obtain the $ecret Banking $ystem.=
<span
style=3D"mso-spacerun: yes">=A0 </span>Get your copy today!<o:p></o:p></s=
pan></p>

</div>

</body>

</html>




From list@netscape.com  Thu Nov  2 06:38:46 2000
Received: from netscape.com (h-205-217-237-47.netscape.com [205.217.237.47])
	by ietf.org (8.9.1a/8.9.1a) with SMTP id GAA17337
	for <ldapext-archive@odin.ietf.org>; Thu, 2 Nov 2000 06:38:46 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.10.0/8.10.0) with ESMTP id eA2BTFD28633;
	Thu, 2 Nov 2000 03:29:17 -0800 (PST)
Received: (from list@localhost)
	by aka.mcom.com (8.10.0/8.10.0) id eA2BaXs23604;
	Thu, 2 Nov 2000 03:36:33 -0800 (PST)
Resent-Date: Thu, 2 Nov 2000 03:36:33 -0800 (PST)
Message-Id: <200011021135.GAA16236@ietf.org>
Mime-Version: 1.0
Content-Type: Multipart/Mixed; Boundary="NextPart"
To: IETF-Announce: ;
Cc: ietf-ldapext@netscape.com
From: Internet-Drafts@ietf.org
Reply-to: Internet-Drafts@ietf.org
Subject: I-D ACTION:draft-ietf-ldapext-ldapv3-dupent-05.txt
Date: Thu, 02 Nov 2000 06:35:47 -0500
Sender: nsyracus@cnri.reston.va.us
Resent-Message-ID: <"O9aVcD.A.fwF.AHVA6"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com

--NextPart

A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the LDAP Extension Working Group of the IETF.

	Title		: LDAP Control for a Duplicate Entry Representation of 
                          Search Results
	Author(s)	: J. Sermersheim
	Filename	: draft-ietf-ldapext-ldapv3-dupent-05.txt
	Pages		: 9
	Date		: 01-Nov-00
	
This document describes a Duplicate Entry Representation control
extension for the LDAP Search operation. By using the control with
an LDAP search, a client requests that the server return separate
entries for each value held in the specified attributes. For
instance, if a specified attribute of an entry holds multiple
values, the search operation will return multiple instances of that
entry, each instance holding a separate single value in that
attribute.

A URL for this Internet-Draft is:
http://www.ietf.org/internet-drafts/draft-ietf-ldapext-ldapv3-dupent-05.txt

Internet-Drafts are also available by anonymous FTP. Login with the username
"anonymous" and a password of your e-mail address. After logging in,
type "cd internet-drafts" and then
	"get draft-ietf-ldapext-ldapv3-dupent-05.txt".

A list of Internet-Drafts directories can be found in
http://www.ietf.org/shadow.html 
or ftp://ftp.ietf.org/ietf/1shadow-sites.txt


Internet-Drafts can also be obtained by e-mail.

Send a message to:
	mailserv@ietf.org.
In the body type:
	"FILE /internet-drafts/draft-ietf-ldapext-ldapv3-dupent-05.txt".
	
NOTE:	The mail server at ietf.org can return the document in
	MIME-encoded form by using the "mpack" utility.  To use this
	feature, insert the command "ENCODING mime" before the "FILE"
	command.  To decode the response(s), you will need "munpack" or
	a MIME-compliant mail reader.  Different MIME-compliant mail readers
	exhibit different behavior, especially when dealing with
	"multipart" MIME messages (i.e. documents which have been split
	up into multiple messages), so check your local documentation on
	how to manipulate these messages.
		
		
Below is the data which will enable a MIME compliant mail reader
implementation to automatically retrieve the ASCII version of the
Internet-Draft.

--NextPart
Content-Type: Multipart/Alternative; Boundary="OtherAccess"

--OtherAccess
Content-Type: Message/External-body;
	access-type="mail-server";
	server="mailserv@ietf.org"

Content-Type: text/plain
Content-ID:	<20001101143654.I-D@ietf.org>

ENCODING mime
FILE /internet-drafts/draft-ietf-ldapext-ldapv3-dupent-05.txt

--OtherAccess
Content-Type: Message/External-body;
	name="draft-ietf-ldapext-ldapv3-dupent-05.txt";
	site="ftp.ietf.org";
	access-type="anon-ftp";
	directory="internet-drafts"

Content-Type: text/plain
Content-ID:	<20001101143654.I-D@ietf.org>

--OtherAccess--

--NextPart--




From list@netscape.com  Thu Nov  2 08:36:04 2000
Received: from netscape.com (h-205-217-237-47.netscape.com [205.217.237.47])
	by ietf.org (8.9.1a/8.9.1a) with SMTP id IAA16071
	for <ldapext-archive@odin.ietf.org>; Thu, 2 Nov 2000 08:36:03 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.10.0/8.10.0) with ESMTP id eA2DRAD07467;
	Thu, 2 Nov 2000 05:27:10 -0800 (PST)
Received: (from list@localhost)
	by aka.mcom.com (8.10.0/8.10.0) id eA2DYTg21917;
	Thu, 2 Nov 2000 05:34:29 -0800 (PST)
Resent-Date: Thu, 2 Nov 2000 05:34:29 -0800 (PST)
Date: Thu, 2 Nov 2000 07:36:39 -0600
Message-ID: <B0005988300@mail.crtechsystems.com>
MIME-Version: 1.0
From: accounts@betworldwide.com
Reply-To: accounts@betworldwide.com
To: ietf-ldapext@netscape.com
Subject: WEEKENDS SPORTS SCHEDULE!!!
Mime-Version: 1.0 
Content-Type: text/html; charset="us-ascii"
Resent-Message-ID: <"lSU12C.A.IWF.k1WA6"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD><TITLE></TITLE>
<META http-equiv=Content-Type content="text/html; charset=iso-8859-1">
<META content="Microsoft FrontPage 4.0" name=GENERATOR></HEAD>
<BODY>
<P><FONT size=2>Dear Bettors, THIS WEEK'S SPORTS SCHEDULE&nbsp; Sponsored by
Betworldwide: </FONT><a href="http://www.betworldwide.com/games.htm" target="_blank"><b><font size="3">CLICK
HERE!!</font></b></a><FONT size=2><STRONG><FONT color=#ff0000 size=4><br>
Check out Betworldwide</FONT></STRONG></FONT><STRONG><font color="#ff0000" size="4">'s</font><font size="2" color="#ff0000">&nbsp;
</font></STRONG><b><font color="#0000ff" size="6">60%</font></b><FONT color=#ff0000 size=4><STRONG> in 
BONUSES!!!!</STRONG></FONT><a href="http://www.betworldwide.com/mailstuff/games.htm"><b><font size="3"><br>
</font></b></a><FONT size=2>Welcome to <FONT size=4><a href="http://www.betworldwide.com/index.cfm?LID=1119">www.betworldwide.com</a></FONT> (NO DOWNLOAD 
EVER)<BR>We would like you to get acquainted with </FONT><b><font size="3">Betworldwide.com</font></b><FONT size=2><BR><FONT 
color=#ff0000 size=5>Played in a Casino or bet on sports?</FONT>&nbsp;<br>
<FONT color=#0000ff size=4>We are making it easy to have fun</FONT></FONT><font color="#0000ff" size="4">
at our expense</font><FONT size=2><FONT color=#0000ff size=4>!!!</FONT><FONT size=4><BR></FONT><BR><FONT size=3>27 New Casino 
games!!!&nbsp; That's Right!!! "27"<BR></FONT><FONT color=#0000ff><a href="http://www.betworldwide.com/index.cfm?LID=1119"><STRONG><FONT size=5>Crazy Football Specials 
Below!!!</FONT></STRONG></a></FONT>.<BR>Bonuses 
are for INITIAL&nbsp; DEPOSITS only!!! (Credit Card Deposits, Western Union and Neteller deposits<b>
Nov. 1st -Nov. 4th</b>)<br>
</FONT><b><font color="#ff0000" size="5">These bonuses are for 4 days 
only.&nbsp; Short but sooo Sweet!!!!&nbsp;</font><font color="#ff0000" size="6">&nbsp;</font><font color="#ff0000" size="5"><br>
</font>
</b><FONT size=2><font size="4"><b>Deposit $300 or more - <font color="#0000ff">Get
$150.00 MATCH PLAY BONUS FREE!!!</font></b><br>
<b>Deposit $500 or more -</b> <font color="#0000ff"><b>Get $200.00 MATCH PLAY
BONUS FREE!!!</b></font><br>
<b>Deposit $1,000 or more</b> <font color="#0000ff"><b>Get $200.00 MATCH PLAY
BONUS FREE!!! and a $50.00 3 team Parlay for f!!!!</b></font><br>
<b><font color="#FF0000">Want more? 20% MATCH PLAY BONUS for Referring a friend.
You will receive 20% of their initial deposit.<br>
</font></b></font>Maximum total bonus is $300.00 with this offer!!<br>
If
you would like to make a deposit now!! </FONT><font color="#0000FF" size="4"><a href="http://www.betworldwide.com/banking/bankingFrame.html"><strong>CLICK
HERE</strong><strong>!!!</strong></a></font><FONT size=2><br>
<br>
<b><font color="#FF0000">*</font>In order to receive your&nbsp; MATCH PLAY BONUSES, email:
</b>
</FONT><b> <a href="mailto:accounts@betworldwide.com"><font size="3">accounts@betworldwide.com</font></a><FONT size=2>&nbsp; with 
your account number and&nbsp; your deposit amount.&nbsp; Call in your $50.00
three team Parlay after your $1,000 deposit!!! For referrals email the name of 
the person you referred and your account number!!!!&nbsp;&nbsp; As soon as your 
email has been received your MATCH PLAY BONUS will be added to your 
account.<BR></FONT></b><FONT size=2><br>
&nbsp;Trying an EXCITING, FAST and SECURE new POST UP and PAYOUT option that's now 
available to all&nbsp;<b><font color="#0000FF">Betworldwide</font></b>&nbsp; members from 
Neteller!!!<BR>NETeller Cash Cards allow IMMEDIATE postups via several 
methods INCLUDING:&nbsp; Visa, Mastercard, Western Union, 
Quick Collect, and PAYPAL.COM&nbsp; The Cash Cards ALSO allow IMMEDIATE PAYOUTS! 
No more waiting for your Visa card to be credited or FEDEX to 
arrive!<BR><BR>Using NETeller Cash Cards and PayPal.com immediate, direct 
transfers can be made from and to your personal bank account. For more 
information&nbsp; please click here&nbsp; <a href="https://www.neteller.com/nethelp/custhelp.cfm?topic=signup&amp;signupcode=WORLDWIDE">NETELLER SIGN UP.<BR></a><BR>If you have any questions about our site or would like 
to open an account by phone do not hesitate to call one of our friendly clerks 
at 800-316-0066.<BR>Thank you and Good Luck,<BR><br>
<a href="http://www.betworldwide.com/index.cfm?LID=1119"><FONT 
size=4>Betworldwide</FONT>,</a><BR>Casino Manager<BR>800-316-0016<BR><BR>If you 
wish to be removed from this list, reply with "Remove" in the subject 
area<BR><BR><BR><BR>&nbsp;</FONT></P>
</BODY></HTML>




From list@netscape.com  Thu Nov  2 11:09:56 2000
Received: from netscape.com (h-205-217-237-46.netscape.com [205.217.237.46])
	by ietf.org (8.9.1a/8.9.1a) with SMTP id LAA05071
	for <ldapext-archive@odin.ietf.org>; Thu, 2 Nov 2000 11:09:55 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.10.0/8.10.0) with ESMTP id eA2FuFs19548;
	Thu, 2 Nov 2000 07:56:16 -0800 (PST)
Received: (from list@localhost)
	by aka.mcom.com (8.10.0/8.10.0) id eA2G8Bc08106;
	Thu, 2 Nov 2000 08:08:11 -0800 (PST)
Resent-Date: Thu, 2 Nov 2000 08:08:11 -0800 (PST)
Message-Id: <200011021607.LAA04490@ietf.org>
Mime-Version: 1.0
Content-Type: Multipart/Mixed; Boundary="NextPart"
To: IETF-Announce: ;
Cc: ietf-ldapext@netscape.com
From: Internet-Drafts@ietf.org
Reply-to: Internet-Drafts@ietf.org
Subject: I-D ACTION:draft-ietf-ldapext-ldapv3-dupent-05.txt
Date: Thu, 02 Nov 2000 11:07:40 -0500
Sender: nsyracus@cnri.reston.va.us
Resent-Message-ID: <"1P_ENB.A.r8B.nFZA6"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com

--NextPart

A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the LDAP Extension Working Group of the IETF.

	Title		: LDAP Control for a Duplicate Entry Representation of 
                          Search Results
	Author(s)	: J. Sermersheim
	Filename	: draft-ietf-ldapext-ldapv3-dupent-05.txt
	Pages		: 9
	Date		: 01-Nov-00
	
This document describes a Duplicate Entry Representation control
extension for the LDAP Search operation. By using the control with
an LDAP search, a client requests that the server return separate
entries for each value held in the specified attributes. For
instance, if a specified attribute of an entry holds multiple
values, the search operation will return multiple instances of that
entry, each instance holding a separate single value in that
attribute.

A URL for this Internet-Draft is:
http://www.ietf.org/internet-drafts/draft-ietf-ldapext-ldapv3-dupent-05.txt

Internet-Drafts are also available by anonymous FTP. Login with the username
"anonymous" and a password of your e-mail address. After logging in,
type "cd internet-drafts" and then
	"get draft-ietf-ldapext-ldapv3-dupent-05.txt".

A list of Internet-Drafts directories can be found in
http://www.ietf.org/shadow.html 
or ftp://ftp.ietf.org/ietf/1shadow-sites.txt


Internet-Drafts can also be obtained by e-mail.

Send a message to:
	mailserv@ietf.org.
In the body type:
	"FILE /internet-drafts/draft-ietf-ldapext-ldapv3-dupent-05.txt".
	
NOTE:	The mail server at ietf.org can return the document in
	MIME-encoded form by using the "mpack" utility.  To use this
	feature, insert the command "ENCODING mime" before the "FILE"
	command.  To decode the response(s), you will need "munpack" or
	a MIME-compliant mail reader.  Different MIME-compliant mail readers
	exhibit different behavior, especially when dealing with
	"multipart" MIME messages (i.e. documents which have been split
	up into multiple messages), so check your local documentation on
	how to manipulate these messages.
		
		
Below is the data which will enable a MIME compliant mail reader
implementation to automatically retrieve the ASCII version of the
Internet-Draft.

--NextPart
Content-Type: Multipart/Alternative; Boundary="OtherAccess"

--OtherAccess
Content-Type: Message/External-body;
	access-type="mail-server";
	server="mailserv@ietf.org"

Content-Type: text/plain
Content-ID:	<20001101143654.I-D@ietf.org>

ENCODING mime
FILE /internet-drafts/draft-ietf-ldapext-ldapv3-dupent-05.txt

--OtherAccess
Content-Type: Message/External-body;
	name="draft-ietf-ldapext-ldapv3-dupent-05.txt";
	site="ftp.ietf.org";
	access-type="anon-ftp";
	directory="internet-drafts"

Content-Type: text/plain
Content-ID:	<20001101143654.I-D@ietf.org>

--OtherAccess--

--NextPart--




From list@netscape.com  Thu Nov  2 12:03:30 2000
Received: from netscape.com (h-205-217-237-47.netscape.com [205.217.237.47])
	by ietf.org (8.9.1a/8.9.1a) with SMTP id MAA18795
	for <ldapext-archive@odin.ietf.org>; Thu, 2 Nov 2000 12:03:29 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.10.0/8.10.0) with ESMTP id eA2GsFD04417;
	Thu, 2 Nov 2000 08:54:15 -0800 (PST)
Received: (from list@localhost)
	by aka.mcom.com (8.10.0/8.10.0) id eA2H1X202126;
	Thu, 2 Nov 2000 09:01:33 -0800 (PST)
Resent-Date: Thu, 2 Nov 2000 09:01:33 -0800 (PST)
Message-ID: <20001102170053.52938.qmail@web10605.mail.yahoo.com>
Date: Thu, 2 Nov 2000 09:00:53 -0800 (PST)
From: Due Process <debtfree9510@yahoo.com>
Subject: no more debts
To: md2@theinbox.org
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Resent-Message-ID: <"16qceB.A.ue.n3ZA6"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com

Ask for my personal story and I'll explain how to get
out from under debt collectors, avoid lawsuits, stop
IRS levies, settle student loans and prevent creditors
from suing you without paying, without going to court,
without consolidation and without bankruptcy.  I did
it and now I'm going to show everyone else.

I hope to hear from you.  By the way, the information
is free!

Best regards,
John
debtfree9510@yahoo.com


__________________________________________________
Do You Yahoo!?
From homework help to love advice, Yahoo! Experts has your answer.
http://experts.yahoo.com/



From list@netscape.com  Thu Nov  2 12:57:06 2000
Received: from netscape.com (h-205-217-237-47.netscape.com [205.217.237.47])
	by ietf.org (8.9.1a/8.9.1a) with SMTP id MAA02659
	for <ldapext-archive@odin.ietf.org>; Thu, 2 Nov 2000 12:57:06 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.10.0/8.10.0) with ESMTP id eA2HlhD16518;
	Thu, 2 Nov 2000 09:47:43 -0800 (PST)
Received: (from list@localhost)
	by aka.mcom.com (8.10.0/8.10.0) id eA2HOVo25423;
	Thu, 2 Nov 2000 09:24:31 -0800 (PST)
Resent-Date: Thu, 2 Nov 2000 09:24:31 -0800 (PST)
Message-Id: <sa0140d5.065@prv-mail20.provo.novell.com>
X-Mailer: Novell GroupWise Internet Agent 5.5.5.1
Date: Thu, 02 Nov 2000 10:24:14 -0700
From: "Jim Sermersheim" <JIMSE@novell.com>
To: <ietf-ldapext@netscape.com>
Cc: <Mark.Wahl@sun.com>
Subject: Re: I-D ACTION:draft-ietf-ldapext-ldapv3-dupent-05.txt
Mime-Version: 1.0
Content-Type: multipart/alternative; boundary="=_A5FE9355.F293F70F"
Resent-Message-ID: <"HAdA6D.A.JMG.NNaA6"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com

This is a MIME message. If you are reading this text, you may want to 
consider changing to a mail reader or gateway that understands how to 
properly handle MIME multipart messages.

--=_A5FE9355.F293F70F
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: quoted-printable

Here's a list of changes to the this version:

- s/Category: Proposed Standard/Intended Catagory: Standards Track
- s/PartialResultsAllowed/PartialApplicationAllowed
- Fixed ASN.1 of AttributeDescription
- Attribute subtypes are considered when evaluating the control
- Fixed logic so that the entries are matched, duplicated, returned rather =
than duplicated, matched, returned.
- Created sections 4.1.1 and 4.1.2 for readability
- Fixed truncated last sentence in 4.1.2
- Specified that the criticality of the response control is ignored
- Fixed ASN.1 of DuplicateEntryResponseDone
- Removed 5.4 (example of duplicate, match, return)

Mark, should this go up for last call again?

Jim


>>> <Internet-Drafts@ietf.org> 11/2/00 4:35:47 AM >>>
A New Internet-Draft is available from the on-line Internet-Drafts =
directories.
This draft is a work item of the LDAP Extension Working Group of the IETF.

    Title        : LDAP Control for a Duplicate Entry Representation of=20
                          Search Results
    Author(s)    : J. Sermersheim
    Filename    : draft-ietf-ldapext-ldapv3-dupent-05.txt
    Pages        : 9
    Date        : 01-Nov-00
   =20
This document describes a Duplicate Entry Representation control
extension for the LDAP Search operation. By using the control with
an LDAP search, a client requests that the server return separate
entries for each value held in the specified attributes. For
instance, if a specified attribute of an entry holds multiple
values, the search operation will return multiple instances of that
entry, each instance holding a separate single value in that
attribute.

A URL for this Internet-Draft is:
http://www.ietf.org/internet-drafts/draft-ietf-ldapext-ldapv3-dupent-05.txt=


Internet-Drafts are also available by anonymous FTP. Login with the =
username
"anonymous" and a password of your e-mail address. After logging in,
type "cd internet-drafts" and then
    "get draft-ietf-ldapext-ldapv3-dupent-05.txt".

A list of Internet-Drafts directories can be found in
http://www.ietf.org/shadow.html=20
or ftp://ftp.ietf.org/ietf/1shadow-sites.txt


Internet-Drafts can also be obtained by e-mail.

Send a message to:
    mailserv@ietf.org.
In the body type:
    "FILE /internet-drafts/draft-ietf-ldapext-ldapv3-dupent-05.txt".
   =20
NOTE:    The mail server at ietf.org can return the document in
    MIME-encoded form by using the "mpack" utility.  To use this
    feature, insert the command "ENCODING mime" before the "FILE"
    command.  To decode the response(s), you will need "munpack" or
    a MIME-compliant mail reader.  Different MIME-compliant mail readers
    exhibit different behavior, especially when dealing with
    "multipart" MIME messages (i.e. documents which have been split
    up into multiple messages), so check your local documentation on
    how to manipulate these messages.
       =20
       =20
Below is the data which will enable a MIME compliant mail reader
implementation to automatically retrieve the ASCII version of the
Internet-Draft.

--=_A5FE9355.F293F70F
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD>
<META http-equiv=3DContent-Type content=3D"text/html; charset=3Diso-8859-1"=
>
<META content=3D"MSHTML 5.50.4134.600" name=3DGENERATOR></HEAD>
<BODY style=3D"MARGIN-TOP: 2px; FONT: 8pt MS Sans Serif; MARGIN-LEFT: =
2px">
<DIV><FONT size=3D1></FONT>Here's a list of changes to the this version:</D=
IV>
<DIV>&nbsp;</DIV>
<DIV>- s/Category: Proposed Standard/Intended Catagory: Standards =
Track</DIV>
<DIV>- s/PartialResultsAllowed/PartialApplicationAllowed</DIV>
<DIV>- Fixed ASN.1 of AttributeDescription</DIV>
<DIV>-&nbsp;Attribute subtypes are&nbsp;considered when evaluating the=20
control</DIV>
<DIV>- Fixed logic so that the entries are matched, duplicated,=20
returned&nbsp;rather than duplicated, matched, returned.</DIV>
<DIV>- Created sections 4.1.1 and 4.1.2 for readability</DIV>
<DIV>- Fixed truncated last sentence in 4.1.2</DIV>
<DIV>- Specified that the criticality of the response control is ignored</D=
IV>
<DIV>- Fixed ASN.1 of DuplicateEntryResponseDone</DIV>
<DIV>- Removed 5.4 (example of duplicate, match, return)</DIV>
<DIV>&nbsp;</DIV>
<DIV>Mark, should this go up for last call again?</DIV>
<DIV>&nbsp;</DIV>
<DIV>Jim</DIV>
<DIV><BR><BR>&gt;&gt;&gt; &lt;Internet-Drafts@ietf.org&gt; 11/2/00 4:35:47 =
AM=20
&gt;&gt;&gt;<BR>A New Internet-Draft is available from the on-line=20
Internet-Drafts directories.<BR>This draft is a work item of the LDAP =
Extension=20
Working Group of the IETF.<BR><BR>&nbsp;&nbsp;&nbsp; Title&nbsp;&nbsp;&nbsp=
;=20
&nbsp;&nbsp;&nbsp; : LDAP Control for a Duplicate Entry Representation =
of=20
<BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp=
;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;=20
Search Results<BR>&nbsp;&nbsp;&nbsp; Author(s)&nbsp;&nbsp;&nbsp; : J.=20
Sermersheim<BR>&nbsp;&nbsp;&nbsp; Filename&nbsp;&nbsp;&nbsp; :=20
draft-ietf-ldapext-ldapv3-dupent-05.txt<BR>&nbsp;&nbsp;&nbsp;=20
Pages&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; : 9<BR>&nbsp;&nbsp;&nbsp;=20
Date&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; : 01-Nov-00<BR>&nbsp;&nbsp;&nbsp;=
=20
<BR>This document describes a Duplicate Entry Representation=20
control<BR>extension for the LDAP Search operation. By using the control=20=

with<BR>an LDAP search, a client requests that the server return=20
separate<BR>entries for each value held in the specified attributes.=20
For<BR>instance, if a specified attribute of an entry holds multiple<BR>val=
ues,=20
the search operation will return multiple instances of that<BR>entry, =
each=20
instance holding a separate single value in that<BR>attribute.<BR><BR>A =
URL for=20
this Internet-Draft is:<BR><A=20
href=3D"http://www.ietf.org/internet-drafts/draft-ietf-ldapext-ldapv3-dupen=
t-05.txt">http://www.ietf.org/internet-drafts/draft-ietf-ldapext-ldapv3-dup=
ent-05.txt</A><BR><BR>Internet-Drafts=20
are also available by anonymous FTP. Login with the username<BR>"anonymous"=
 and=20
a password of your e-mail address. After logging in,<BR>type "cd=20
internet-drafts" and then<BR>&nbsp;&nbsp;&nbsp; "get=20
draft-ietf-ldapext-ldapv3-dupent-05.txt".<BR><BR>A list of Internet-Drafts=
=20
directories can be found in<BR><A=20
href=3D"http://www.ietf.org/shadow.html">http://www.ietf.org/shadow.html</A=
>=20
<BR>or ftp://ftp.ietf.org/ietf/1shadow-sites.txt<BR><BR><BR>Internet-Drafts=
 can=20
also be obtained by e-mail.<BR><BR>Send a message to:<BR>&nbsp;&nbsp;&nbsp;=
=20
mailserv@ietf.org.<BR>In the body type:<BR>&nbsp;&nbsp;&nbsp; "FILE=20
/internet-drafts/draft-ietf-ldapext-ldapv3-dupent-05.txt".<BR>&nbsp;&nbsp;&=
nbsp;=20
<BR>NOTE:&nbsp;&nbsp;&nbsp; The mail server at ietf.org can return the =
document=20
in<BR>&nbsp;&nbsp;&nbsp; MIME-encoded form by using the "mpack" utility.&nb=
sp;=20
To use this<BR>&nbsp;&nbsp;&nbsp; feature, insert the command "ENCODING =
mime"=20
before the "FILE"<BR>&nbsp;&nbsp;&nbsp; command.&nbsp; To decode the=20
response(s), you will need "munpack" or<BR>&nbsp;&nbsp;&nbsp; a MIME-compli=
ant=20
mail reader.&nbsp; Different MIME-compliant mail readers<BR>&nbsp;&nbsp;&nb=
sp;=20
exhibit different behavior, especially when dealing with<BR>&nbsp;&nbsp;&nb=
sp;=20
"multipart" MIME messages (i.e. documents which have been=20
split<BR>&nbsp;&nbsp;&nbsp; up into multiple messages), so check your =
local=20
documentation on<BR>&nbsp;&nbsp;&nbsp; how to manipulate these=20
messages.<BR>&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; <BR>&nbsp;&nbsp;&nbsp;=
=20
&nbsp;&nbsp;&nbsp; <BR>Below is the data which will enable a MIME =
compliant mail=20
reader<BR>implementation to automatically retrieve the ASCII version of=20
the<BR>Internet-Draft.<BR></DIV></BODY></HTML>

--=_A5FE9355.F293F70F--



From list@netscape.com  Thu Nov  2 15:27:44 2000
Received: from netscape.com (h-205-217-237-46.netscape.com [205.217.237.46])
	by ietf.org (8.9.1a/8.9.1a) with SMTP id PAA10975
	for <ldapext-archive@odin.ietf.org>; Thu, 2 Nov 2000 15:27:29 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.10.0/8.10.0) with ESMTP id eA2KBus04803;
	Thu, 2 Nov 2000 12:11:56 -0800 (PST)
Received: (from list@localhost)
	by aka.mcom.com (8.10.0/8.10.0) id eA2KNqM16652;
	Thu, 2 Nov 2000 12:23:52 -0800 (PST)
Resent-Date: Thu, 2 Nov 2000 12:23:52 -0800 (PST)
From: PublishingCompany@forsale-36.fsnet.co.uk
Message-Id: <200011022006.VAA17788@fw1.int.shw.de>
To: Publisher@mx-202.fsnet.co.uk.netscape.com
Date: Thu, 02 Nov 00 14:27:22 EST
Subject: Publishing Company for Sale!
Reply-To: PublishingCompany108@yahoo.com
Resent-Message-ID: <"XPbYlD.A.bDE.W1cA6"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com

See information about Free Credit Application Below!

My Multi-Million Dollar 
Publishing Company 
ONLY $149

Free Pre-Approved Merchant Account Application with Order!! 
To Start Your Business Out Right!!

If you ever wanted "the easy way out" to make a lot of money
with a business of your own....
Here is the EASIEST WAY TO START!

I'm writing this letter to let you in on something that'll blow
you away. What I'm about to present is something I've 
never done before...something that I'll never do again....
So PAY ATTENTION!

For the past few years...I've have been running ads in 
newspapers & magazines, by direct mail, and throughout 
the internet.  These ads were always small and very cheap...

On these ads, we have been selling little manuals.  These
manuals have sold for anywhere between $10 to $99 each.  
We always ran different ads for each manual we were selling.  

I like selling information because NOBODY can put a price on 
it...ESPECIALLY when it is your own...The Sky is the Limit!

Plus it is very cheap to reproduce How-To manuals.  It costs 
between 40 cents and $3 to print the entire print manuals and 
around 35 cents to copy the manuals on disk.  AND you can 
sell them for up to $99 each.   That is one hell of a markup!

These manuals tell you how to get a car with no money down 
and no credit...another one tells you how to avoid taxes by 
depositing income offshore...now you may not be interested in 
saving money by going offshore...but believe me....there are 
MILLIONS OF PEOPLE WHO DO...and they are willing to pay 
me to teach them!!! 

Well this is where the unbelievable offer comes in...I hope you
are sitting down for this one...because this is a once in a 
lifetime chance for you.  I do not know of an easier way to 
become financially independent...In fact THERE IS NO EASIER 
WAY!!!  
The next few paragraphs will reveal everything to you.

I am willing to sell you my entire informational product line 
with FULL REPRINT RIGHTS and complete step-by-step 
instructions on how to start your mail order information business 
with very little money. 

Remember, these are PROVEN WINNERS.  If you are 
stumped on something to sell or if you are having trouble 
writing a good ad, I have also included an entire book on 
disk to help you produce KILLER ads!

This entire package which I call a Publishing Company in a 
Box will come on 1 CD containing over 2000 'Hot-Selling' 
Books, Reports And Manuals ready to print and sell, Sell, 
SELL! It also will come with a signed letter giving YOU FULL 
REPRINT RIGHTS allowing you to sell them for as much as 
you want and however you want.  You Can even sell the entire
kit to someone else to resale on their own!  You also receive 
copies of KILLER ads which can fill your mailbox with cash!

I am not even going to ask you for any of the money either...
What you make is yours to keep .  In fact...you get to make a 
ton of money on these manuals for as long as you wish...and 
you will never have to pay me another red cent in royalties!

I am even going to print out and prepare our #1 selling report 
which contains the secrets of obtaining credit without a credit
check and producing an offshore income without taxes so that 
you will be able to take it down to your local copy shop and be 
ready to sell it the same day you have received it. Watch out 
though - one individual is making $70,000 a month on this report 
alone!  (Why - Because you can include a FREE offshore credit 
application for those with bad or no credit with this report and 
explode your mailbox with orders) Note: THIS APPLICATION IS 
INCLUDED!

All I ask for is...$149 and I will include FREE Priority Mail 
Shipping!  Yes, I said $149.  There are no zeros missing.  
Plus if you order before  Nov 6, 2000 I will include 
4 extra special bonuses...

Bonus #1 - "Search Engine Magic" on disk.  This report will 
shoot your web site up to the top of the search engine listings.
Other web advertisers are selling this manual for $99 by 
itself - But I will give it to you for FREE with this package.

Bonus #2 - The report "How to Make at least $1,600 a week 
online...Starting Now!" which is taking the internet by storm 
will be included absolutely FREE! 

Bonus #3 - I will include special details about a secret source
for direct mail leads that can produce cash orders along with 
out KILLER ads.  And another source will be given which 
allows you to advertise nationwide through newspapers to 
70,000,000 readers for as low as 7 cents per word.

Bonus #4 - I also will include a pre-approved application for 
a merchant account for your business benefit.  Taking credit 
cards will increase your business up to 100%.  The normal 
$195 application fee will be waved with this pre-approved 
application.  

But there is one drawback... I am sending this ad to 10,000 
other people...and I will only allow 50 kits to be sold.  It 
wouldn't make much sense if I sold this kit to 1,000 or 2,000 
people...The market would be saturated with these same 
manuals... 
and I don't want to do that.  To make sure that the people in 
this offer get the same results I have...ONLY 50 people can have 
it for $149.00!

Chances are, I will get all 50 within a week's time.  So if this 
is something you are interested in...RUSH me a check or money 
order for $149.00 TODAY to insure your future business.

But, even if you decide to pass this up...Don't sweat it.  It's
not like I am going to be mad or anything like that.  I know I 
will get my 50 order limit really fast.  And anyone who gets 
their check into me late... I will simply send it back.

For only $149.00, I am going to let you have the easiest money 
you will ever make.  The manuals are written, the ads are 
presented, the advertising plan is laid out, and all you have 
to do is print them out for pennies and place the ads.

Do it today! Rush me your payment of $149.00 right now...and 
get your very own MILLION DOLLAR publishing company going!

You can start with one or two manuals...even the day you 
receive the package...and then expand to include ALL of them!

For $149.00, you have everything you need to make a killing 
with your very own business.  If you want to make real 
money - then this offer is for you!

"I took the report "Search Engine Magic" and sold over 50 
copies on disk within 2 weeks! They sold for $99 and I was 
able to copy them for under 50 cents each.  Wait till I start 
marketing the other products included in this line!!!"
Joe Fisher - Internet Marketer

To rush order this "MILLION DOLLAR Publishing Company in 
a Box" simply fill out the order form below and fax it to 
our 24 hour  order line at:

FAX ORDER LINE:
1 (212) 504-8032

Regular Mail to:
Financial Systems
P.O. Box 301
Orange, Ma 01364

ORDER FORM
--------------------------------------------------------------
Please send to:

Your Name__________________________________________
 
Your Address________________________________________
 
Your City____________________________________________
 
State / Zip___________________________________________
 
Phone #: ____________________________________________
(For problems with your order only. No salesmen will call.)
 
Email Address_______________________________________

We Accept Checks or Money Orders along with all Major Credit 
Cards 
including Visa, MasterCard and American Express.  (NOTE - We 
only 
ship to the address listed on the credit card)

(Please Fill Out Below Section and Make sure that the above name 
and address are listed as it appears on the card) for $149.00

Credit Card Number:________________________________

Expiration Date___________________________

Signature:_________________________

Date:____________________

[  ] YES! Please rush my Publishing Company in a Box.  I 
understand I have FULL REPRINT Rights and can sell any of 
the items for whatever price I desire, even the entire kit.

[  ] DOUBLE YES!  I am ordering before Nov 6, 2000!  
Please include the extra special bonuses!

* Please check one of the following payment options:
[  ] I am faxing a check (Do not send original, we will make a 
draft from the faxed check)

[  ] I am faxing or mailing my credit card number. (Note your 
card will be charged for $149.00 and we only ship to the address 
on the card)

[  ] I am enclosing a check or money order for $149.00!

Note - If ordering outside continental US, please add $5 to S&H

P.S. Don't forget you will receive 2,000 Manuals, Books, and 
Reports (Some of which are up to 200 pages each)...all for 
$149...You have full reprint and resale rights to make as much 
money as you want without ever paying any royalties whatsoever!


_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/
If you have received this message in error and would
like to be removed from future mailings, please reply
with the word remove in the subject. x
_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/



From list@netscape.com  Thu Nov  2 19:40:20 2000
Received: from netscape.com (h-205-217-237-47.netscape.com [205.217.237.47])
	by ietf.org (8.9.1a/8.9.1a) with SMTP id TAA07098
	for <ldapext-archive@odin.ietf.org>; Thu, 2 Nov 2000 19:40:19 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.10.0/8.10.0) with ESMTP id eA30V8D13222;
	Thu, 2 Nov 2000 16:31:08 -0800 (PST)
Received: (from list@localhost)
	by aka.mcom.com (8.10.0/8.10.0) id eA30cS600027;
	Thu, 2 Nov 2000 16:38:28 -0800 (PST)
Resent-Date: Thu, 2 Nov 2000 16:38:28 -0800 (PST)
Date: Thu, 2 Nov 2000 16:38:15 -0800 (PST)
Message-Id: <200011030038.eA30cFR11103@xwing.netscape.com>
From: zyqwz@home.com
To: nflte@samrtinverstors.netscape.com
Reply-To: sam20u2@n2mail.com
Subject: Affordable Offshore!                                    [qbuqr]
Resent-Message-ID: <"TY3_oD.A.iUH.DkgA6"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com

Affordable Offshore
 
Partners Wanted, $100 to start
 
Open a secured offshore bank account and
access your funds with a MasterCard.  
No social security number or credit check.
 
Develop a secondary offshore income of 
$500 to $5,000 a day or more - you decide!!

"3 months ago I started for $100
This month I've earned $3,775 and it's 
increasing about $200 every day."  

You can:
Eliminate your debt
Secure your Assets 
Save on Taxes
and create Wealth !

Find out how YOU can build a Fortune
and Start for just $100

The Super Rich have done this for years!
Isn't it time you started?

For more info, type "Offshore Info Please" as the subject.

mailto:sam20u@n2mail.com?subject=Offshore_Info_Please

Have a Great Day! 

PS: To be removed from the list, just put "Remove"
in subject line and send.            



From list@netscape.com  Thu Nov  2 20:35:28 2000
Received: from netscape.com (h-205-217-237-47.netscape.com [205.217.237.47])
	by ietf.org (8.9.1a/8.9.1a) with SMTP id UAA19992
	for <ldapext-archive@odin.ietf.org>; Thu, 2 Nov 2000 20:35:28 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.10.0/8.10.0) with ESMTP id eA31QVD25594;
	Thu, 2 Nov 2000 17:26:31 -0800 (PST)
Received: (from list@localhost)
	by aka.mcom.com (8.10.0/8.10.0) id eA31TYk27257;
	Thu, 2 Nov 2000 17:29:34 -0800 (PST)
Resent-Date: Thu, 2 Nov 2000 17:29:34 -0800 (PST)
Date: Thu, 2 Nov 2000 20:28:55 -0500 (EST)
Message-Id: <200011030128.eA31Stx36689@mx2.mx.voyager.net>
From: uleqw@hotbot.com
To: vsgsx@NetMarkets.netscape.com
Reply-To: sam20u2@n2mail.com
Subject: Affordable Offshore!                                    [elgvz]
Resent-Message-ID: <"Q66AmB.A.njG.kThA6"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com

Affordable Offshore!
 
Partners Wanted, $100 to start
Open a secured offshore bank account and
access your funds with a MasterCard.  No social security
number or credit check. Develop a secondary offshore 
income of $500 to $5,000 a day or more - you decide!!

"3 months ago I started for $100
This month I've earned $3,775 and it's increasing about 
$200 every day."  

You can:
Eliminate your debt
Secure your Assets Save on Taxes
and create Wealth !

Find out how YOU can build a Fortune
and Start for just $100

The Super Rich have done this for years!
Isn't it time you started?

For more info, type "Offshore Info Please" as the subject.

mailto:sam20u@n2mail.com?subject=Offshore_Info_Please

Have a Great Day! 
John



From list@netscape.com  Thu Nov  2 20:40:47 2000
Received: from netscape.com (h-205-217-237-46.netscape.com [205.217.237.46])
	by ietf.org (8.9.1a/8.9.1a) with SMTP id UAA20755
	for <ldapext-archive@odin.ietf.org>; Thu, 2 Nov 2000 20:40:46 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.10.0/8.10.0) with ESMTP id eA31RHs28664;
	Thu, 2 Nov 2000 17:27:17 -0800 (PST)
Received: (from list@localhost)
	by aka.mcom.com (8.10.0/8.10.0) id eA31TaM27296;
	Thu, 2 Nov 2000 17:29:37 -0800 (PST)
Resent-Date: Thu, 2 Nov 2000 17:29:37 -0800 (PST)
Date: Thu, 2 Nov 2000 20:28:49 -0500 (EST)
Message-Id: <200011030128.eA31Snx36543@mx2.mx.voyager.net>
From: erhus@hotbot.com
To: dsxvi@NetMarkets.netscape.com
Reply-To: sam20u2@n2mail.com
Subject: Affordable Offshore!                                    [eybkx]
Resent-Message-ID: <"0LQThB.A.-lG.tThA6"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com

Affordable Offshore!
 
Partners Wanted, $100 to start
Open a secured offshore bank account and
access your funds with a MasterCard.  No social security
number or credit check. Develop a secondary offshore 
income of $500 to $5,000 a day or more - you decide!!

"3 months ago I started for $100
This month I've earned $3,775 and it's increasing about 
$200 every day."  

You can:
Eliminate your debt
Secure your Assets Save on Taxes
and create Wealth !

Find out how YOU can build a Fortune
and Start for just $100

The Super Rich have done this for years!
Isn't it time you started?

For more info, type "Offshore Info Please" as the subject.

mailto:sam20u@n2mail.com?subject=Offshore_Info_Please

Have a Great Day! 
John



From list@netscape.com  Fri Nov  3 06:57:36 2000
Received: from netscape.com (h-205-217-237-46.netscape.com [205.217.237.46])
	by ietf.org (8.9.1a/8.9.1a) with SMTP id GAA18909
	for <ldapext-archive@odin.ietf.org>; Fri, 3 Nov 2000 06:57:35 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.10.0/8.10.0) with ESMTP id eA3Bhxs19959;
	Fri, 3 Nov 2000 03:43:59 -0800 (PST)
Received: (from list@localhost)
	by aka.mcom.com (8.10.0/8.10.0) id eA3Btwc26972;
	Fri, 3 Nov 2000 03:55:58 -0800 (PST)
Resent-Date: Fri, 3 Nov 2000 03:55:58 -0800 (PST)
Date: Fri, 3 Nov 2000 19:51:32 +0800 (CST)
From: hv@of-hachetal.de
Message-Id: <200011031151.TAA04070@mail.sinet.net.cn>
To: hv@of-hachetal.de
Subject: At last, Herbal V, the all natural alternative to V----A!
Resent-Message-ID: <"3J2MSC.A.AlG.LfqA6"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com


Herbal V: An Incredible All-Natural Healthy Alternative 


  Herbal V is the All Natural Approach to Male Virility,
  Vitality and Pleasure.



Available N o w ! 


Welcome to the New Sexual Revolution.

It's the all natural male potency and pleasure pill that men 
everywhere are buzzing about. Herbal V is safe, natural and
specifically formulated to help support male sexual function
and pleasure. You just take two easy-to-swallow tablets
one hour before sex. And there's more great news - you can
get Herbal V for less than $1 a pill.

Amazing word of mouth praise on Herbal V has been spreading 
like wildfire-already over 1,500,000 men  have chosen
Herbal V. Since it is 100% natural you will never have
to worry about safety. Try doctor-recommended Herbal V
today and have the greatest night of your life!


Herbal V... Bringing Back the Magic!


1,585,000 men can't be wrong. To date over 1 million men 
have tried the super supplement Herbal V.
Here is why: 

No Doctor Visit Required 
Available Over the Counter 
Not a Drug 
100% Natural 
Safe, No Worries 
Highest Quality Pharmaceutical-Grade Pure Nutriceuticals 
Guaranteed Potency & Purity 

Be a Real Man Again!

Questions and Answers

What is Herbal V?

Herbal V is a proprietary blend that was specifically
developed as a safe alternative for men who prefer
an all-natural approach to address impotence and boost
sexual performance. This amazing formula first became
popular with Hollywood insiders and the wealthy elite.
They were maximizing their sex lives, long before it 
was available to the general public. 

How does Herbal V work?

Developed by a team whose goal was to create the perfect 
all-natural aphrodisiac. Herbal V is the result of that
remarkable effort. The Herbal V formula contains a precise
blend of cutting edge pro-sexual nutrients from around
the world that provide nutritional support, making it
possible for a man to have a pleasurable sexual experience. 

What can Herbal V do for me?

Herbal V helps support male sexual function and 
pleasure in a safe and natural manner. Simply put, 
it can make your sex life incredible. 

Is Herbal V Safe?

One of the great things about Herbal V is that it is
not a drug. It is an incredible herbal dietary supplement
that provides nutritional support for male sexual function
and pleasure. One of the most comforting features of
Herbal V is that you never have to worry about safety. 

Herbal V: Safe - Natural - Exciting

Many have speculated that because Herbal V is so
popular with men, it must contain prescription drugs
or chemical components. Herbal V does not contain any 
elements or traces of any prescription drug. Herbal V 
is made using the world's most technologically advanced
state-of-the-art cold processing equipment to ensure
maximum purity. Herbal V has been independently analyzed
by the nation's premier testing facility to ensure purity,
quality and to end the rumors that, because it is so
popular, it must somehow be chemical. It is not.
Herbal V is natural - just as it says on the label.
Herbal V is simply fantastic! 

Herbal V: Ingredients

Yohimbe, saw palmetto, avena sativa, androstenedione,
guarana, taurine, siberian ginseng, tribulus terrestris. 
Tribulus Terrestis is certified to enhanced testosterone
levels by increasing Luteinzing hormone (LH) levels. 
Androstenedione which is a precursor to testosterone
unlocks bound testosterone and makes it biologically
active again quickly. This means a dramatic surge in 
desire. Avena Sativa Stimulates the neurotransmitter 
pleasure centers to maximum capacity. This greatly
intensifies pleasure.

Just listen to what Herbal V has done for the sex lives
of people like you!

“On a scale of 1 to 10, it's a 15. Electrifying. It's like 
a wonder pill!” 
— Justin Q B., New Haven, Texas

“I haven't had sexual relations in 11 years. Then with 
Herbal V it was... wow! It works again!” 
— Sid R., Lakeland, Florida

“I had sex four times in one night. It made me feel
like a 19-year-old again.” 
— Chip S, Beech Mountain, North Carolina

“Herbal V has turned my husband into a Sexual Superman! 
I like the fact that it's all natural and has no
side effects. It's bringing back the good old days.” 
— Jennifer B, Beverly Hills, California 

The above testimonials are from product literature, 
and we have not independently verified them.
However, the following testimonial is from a "senior"
gentleman who has purchased his second bottle of
Herbal V. When we heard his words with our own ears,
we asked his permission to print them here. 

 “Man! I'm wild as I can be! I feel like I'm 25 years old again! 
I'm not believing this!” 
                          — Mr. Murphy, age 64, Lampart, IL.



Risk Free: Double Your Money Back Guarantee

If Herbal V does not give the desired results as stated
above, simply return the unused portion for a
double-your money back refund. No questions asked ! 

Order Now: Safe, Fast, Secure, Private

Herbal V with its DOUBLE YOUR MONEY BACK GUARANTEE is
available only through this special promotional offer.
Herbal V arrives in plain packaging for your privacy.
Any and all information is kept strictly confidential.

Payment Methods

You may FAX or Postal Mail Checks, MasterCard, Visa,
& American Express.payments. Money Orders
are accepted only by Postal Mail. 


Each bottle of Herbal V contains 30 tablets, approximately
a 1 month supply.


Step 1: Place a check by your desired quanity.


______ 1 Bottle of Herbal V  $28


______ 2 Bottles of Herbal V $48


______ 3 Bottles of Herbal V $59


Please add $6 shipping and handling for any size order. 
[ Total cost including shipping & handling, 
1 bottle=$34, 2 bottles=$54, 3 bottles=$65 ]

International Orders
Please add $16 shipping and handling for any size order.
[ Total cost including shipping & handling,
1 bottle=$40, 2 bottles=$60, 3 bottles=$75 ]
We cannot accept foreign checks.
International money orders or credit cards only.

Step 2: Place a check by your desired payment method 
and complete fields if necessary.


_____Check or CHECK-BY-FAX [details below]


_____Money Order 


_____American Express 
Account Number__________________ Exp____/____

_____Visa
Account Number__________________ Exp____/____

_____MasterCard
Account Number__________________ Exp____/____


Please make your check or money order payable to
"Lion Sciences National".
 

Step 3: Please complete and print the following fields clearly.


Name ___________________________________________________ 


Address _________________________________________________


City ____________________________________________________ 


State ___________________________________________________ 


Zip _____________________________________________________ 


E-mail __________________________________________________ 


Signature _________________________________________________
[ required for check and credit card orders]



             Toll Free FAX Order Line: 1-800-940-6590
If faxing in your order, please state whether you require
a fax, email, or no confirmation at all. 
Allow up to one day for confirmation, if requested.
FAX orders are processed immediately.

  Or, print & mail to: LSN   
                       3502 N. Powerline Rd. #525 
                       Pompano Beach, FL 33069                


        ______________________________________________________


*CHECK BY FAX ORDERS: Complete the check as normal. Tape
the check in the area below. Below the check, clearly write
the check number, all numbers at the bottom of the check,
& your name. Tape the check below and fax the check to the
toll free FAX number above. Void the check. Our merchant
will electronically debit your account for the amount of 
the check; your reference number for this transaction will
be your check number. Nothing could be safer & easier !

                          TAPE CHECK BELOW















              _____________________________________________________________

This is a one time mailing: Removal is automatic and no further 
contact is necessary. Please Note: Herbal V is not intended to
diagnose, treat, cure or prevent any disease. As individuals differ,
so will results. Herbal V helps provide herbal and nutritional support
for male sexual performance. The FDA has not evaluated these 
statements. For details about our double your money back guarantee,
please write to the above address, attention consumer affairs 
department; enclose a self addressed stamped envelope for this and any 
requested contact information.
Thank You.



From list@netscape.com  Fri Nov  3 09:33:50 2000
Received: from netscape.com (h-205-217-237-46.netscape.com [205.217.237.46])
	by ietf.org (8.9.1a/8.9.1a) with SMTP id JAA27711
	for <ldapext-archive@odin.ietf.org>; Fri, 3 Nov 2000 09:33:49 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.10.0/8.10.0) with ESMTP id eA3EK4s01770;
	Fri, 3 Nov 2000 06:20:04 -0800 (PST)
Received: (from list@localhost)
	by aka.mcom.com (8.10.0/8.10.0) id eA3EW2Y10658;
	Fri, 3 Nov 2000 06:32:02 -0800 (PST)
Resent-Date: Fri, 3 Nov 2000 06:32:02 -0800 (PST)
From: HomeOwners160@c22c.fsnet.co.uk
Message-ID: <00006fae7d23$000055a4$000036d1@x199>
To: <HomeOwnersx162@c22c.fsnet.co.uk>
Subject: HomeOwners: Get The Money You Need!
Date: Sat, 04 Nov 2000 00:54:01 -0500
MIME-Version: 1.0
Content-Type: text/html;
	charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
X-Priority: 1
X-MSMail-Priority: High
Reply-To: nonmail104@yahoo.com
Resent-Message-ID: <"mWDbqC.A.NmC.gxsA6"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com
Content-Transfer-Encoding: quoted-printable

<html>

<head>
<title></title>
</head>

<body bgcolor=3D"#FFFF99">

<p ALIGN=3D"center"><b><font color=3D"#008000" ptsize=3D"10" size=3D"6">Fo=
r Homeowners Only</font><font
COLOR=3D"#000000" SIZE=3D"3" PTSIZE=3D"10"><br>
<font size=3D"5"><i>Save Now!</i></font></font></b></p>
<font COLOR=3D"#000000" SIZE=3D"3" PTSIZE=3D"10">

<p ALIGN=3D"LEFT">Dear Homeowner,<br>
<br>
If you are in debt or need extra cash, we can help you get the money you h=
ave been hoping
for.<br>
Our services are <b>FREE</b> and we have already helped thousands of homeo=
wners, just like
you.<br>
<br>
<br>
<b>Best Of All...</b> <br>
</p>
</font>

<p ALIGN=3D"CENTER"><b><i><font ptsize=3D"10" color=3D"#0000FF" size=3D"3"=
>*Our lenders offer the
Lowest Interest Rates available<br>
*They can set you up with an incredibly low monthly payment! <br>
*We can provide you with Lenders who will loan you ...<br>
<br>
Up To 125% Of Your Home's Value!</font><font COLOR=3D"#000000" SIZE=3D"3" =
PTSIZE=3D"10"><br>
</font></i></b></p>
<font COLOR=3D"#000000" SIZE=3D"3" PTSIZE=3D"10">

<p ALIGN=3D"CENTER"><b><a HREF=3D"http://freewebspacehosting.com/homeloans=
/">Click Here To
Request Your FREE Quote!</a><br>
</p>
</b>

<p ALIGN=3D"CENTER">And even better, there are <b>NO</b> Advances or Upfro=
nt Fees of any
kind! <br>
This means you won't pay a dime - so you have absolutely nothing to lose! =
</p>

<p ALIGN=3D"LEFT"><br>
</font><font color=3D"#008000" SIZE=3D"3" PTSIZE=3D"10"><b>Here are just s=
ome of the ways you
could put this cash to use:</b></font> <font COLOR=3D"#000000" SIZE=3D"3" =
PTSIZE=3D"10"><br>
<br>
<b>-&gt; Home Improvements<br>
-&gt; Credit Card Debt<br>
-&gt; College Tuition<br>
-&gt; Dream Vacation<br>
-&gt; A New Car<br>
-&gt; Start Your Own Business<br>
..or whatever else you need - it's up to YOU.</b> <br>
<br>
</p>

<p ALIGN=3D"left">So if you're serious about improving your current financ=
ial position, you
owe it to yourself to request your <b>FREE</b>&nbsp;<br>
Loan Evaluation. It's <b>FREE</b> and you've got nothing to lose. Right no=
w, while it's
fresh in your mind, visit our site. </p>

<p ALIGN=3D"LEFT">&nbsp; </p>

<p ALIGN=3D"CENTER"><a HREF=3D"http://freewebspacehosting.com/homeloans/">=
<b>Click Here To
Request Your FREE Quote!</b></a><br>
<br>
We take great pride in offering such prompt and quality service to you and=
 your family.<br>
<br>
Sincerely,<br>
<i><b>The Mortgage Guys</b></i><br>
</p>

<p ALIGN=3D"CENTER">&nbsp; </p>
</font>

<p ALIGN=3D"left"><a href=3D"mailto:remove3562@freewebspacehosting.com?sub=
ject=3DUnsubscribe">To
unsubscribe from our mailing list, please click here!</a></p>
</body>
</html>





From list@netscape.com  Fri Nov  3 17:03:44 2000
Received: from netscape.com (h-205-217-237-46.netscape.com [205.217.237.46])
	by ietf.org (8.9.1a/8.9.1a) with SMTP id RAA09222
	for <ldapext-archive@odin.ietf.org>; Fri, 3 Nov 2000 17:03:37 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.10.0/8.10.0) with ESMTP id eA3Lkks13752;
	Fri, 3 Nov 2000 13:46:46 -0800 (PST)
Received: (from list@localhost)
	by aka.mcom.com (8.10.0/8.10.0) id eA3LwiQ11800;
	Fri, 3 Nov 2000 13:58:44 -0800 (PST)
Resent-Date: Fri, 3 Nov 2000 13:58:44 -0800 (PST)
Message-Id: <200011032158.eA3LwTR13463@xwing.netscape.com>
X-Apparently-From: <dbtfree2000@yahoo.com>
X-Sender: dbtfree2000@yahoo.com
From: Dave Talty <dbtfree2000@yahoo.com>
To: ietf-ldapext@netscape.com
Date: Fri, 03 Nov 2000 16:25:15 -0500
Subject: So, How  have you been?
MIME-Version: 1.0
Content-Type: text/plain; charset=iso-8859-1
Content-Transfer-Encoding: 7bit
Resent-Message-ID: <"0khUe.A.j0C.KUzA6"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com
Content-Transfer-Encoding: 7bit



So, How  have you been?

Do you remember holding previous conversations regarding business and
money-making opportunities. I did not send this to you in error!

                                You said:

"If only I could find an easier way to make a higher income"

                                  and

"If I had more money, I could spend more time with my Family, and less
time at work"

                                  and

"I sure could use more money so I could pay off my bills once and for
all!"

                                  and

"I would love to get involved in a business which will generate money
while I am not at work (like a Gas Pump)"


Dear Friend,

There is a possibility that we haven't met, but you were chosen by
someone to receive this E-Mail because you are a motivated person.

PLEASE, do yourself a favor and PRINT THIS! Read it thoroughly! Be sure
that you don't miss any of the points. Then put it down and walk away.
THEN READ IT AGAIN! I am sending you a lot of information that is hard
to absorb the first time you read it.

If you don't believe this program will work for you, send it to 10-20 of
your closest friends you trust and ask them what they think.

THIS REALLY WORKS! Have the faith, and don't miss this opportunity! GET
INVOLVED and it will work for you as it does for us!!!!!

Due to the popularity of this letter on the Internet,

A MAJOR NIGHTLY NEWS Program recently dedicated entire show to the
investigation of the program described below to see if it really can
make people money.

The show also investigated whether or not the program was legal.
Their findings proved that there are absolutely no laws prohibiting the
participation in the program. This has helped to show people that
this is a simple, harmless and fun way to make some extra money at home.

The results have been truly remarkable! So many people are
participating that those involved are doing much better than ever
before! Since everyone makes more as more people try it
out, its been very exciting!

You will understand ONLY if you get involved!

********* THE ENTIRE PLAN IS HERE BELOW *********

*** PRINT THIS NOW FOR FUTURE REFERENCE!! ***

$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$

If you would like to make AT LEAST $50,000 in less than 90 days--READ
ON!

(If not, forward this to someone who would like to make this kind of
money....... It works as designed, but only for those who follow it to
the letter!)

Please read this program...THEN READ IT AGAIN!!

$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$

THIS IS A LEGITIMATE, LEGAL, MONEY MAKING OPPORTUNITY!!

It does NOT require you to come into contact with people, either
directly or by phone. Just follow the instructions, and you
WILL make money. This simplified e-mail marketing program works
perfectly 100% EVERY TIME!

E-mail is the sales tool of the future. Take advantage of this
virtually free method of advertising NOW!!! The longer you wait,
the greater the competition!! Get your
piece of this action NOW!!!

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Hello - My name is Johnathon Rourke, I'm from Rhode Island.

The enclosed information is something I almost let slip through my
fingers. Fortunately, sometime later I re-read everything and gave
some thought and study to it. Two years ago, the corporation I worked
for the past twelve years down-sized and my position was eliminated.
After unproductive job interviews, I decided to open my own business.
Over the past year, I incurred many unforeseen financial problems.
I owed my family, friends and creditors over $35,000. The economy was
taking a toll on my business and I just couldn't seem to make ends meet.
I had to refinance and borrow against my home to support my family and
struggling business.

AT THAT MOMENT something significant happened in my life. I am
writing to share the experience in hopes that this could change your
life FOREVER!

FINANCIALLY$$$!!!

In mid December, I received this program in my e-mail. Six months
prior to receiving this program I had been sending away for information
on various business opportunities. All of the programs I received, in my
opinion, were not cost effective. They were either too difficult for me
to comprehend or the initial investment was too much for me to risk to
see if they would work. But as I was saying, in December of 1997 I
received this program. I didn't send for it, or ask for it, they just
got my name off a mailing list!

THANK GOODNESS FOR THAT!!! After reading it several times, to make sure
I was reading it correctly, I couldn't believe my eyes! Here was a MONEY
MAKING MACHINE I could start immediately without any debt.

Like most of you I was still a little skeptical and a little worried
about the legal aspects of it all. So I checked it out with the U.S.
Post Office (1-800-725-2161 24-hrs) and they confirmed that it is indeed
legal!

After determining the program was LEGAL I decided "WHY NOT!?!??"

Initially I sent out 10,000 e-mails. It cost me about $15 for my time
on-line. The great thing about e-mail is that I don't need any money for
printing to send out the program, and, because I also send the product
(reports) by e-mail, my only expense is my time!

In less than one week, I was starting to receive orders for REPORT #1!
By January 13, I had received 26 orders for REPORT #1. Your goal is to
RECEIVE at least 20 ORDERS FOR REPORT #1 WITHIN 2 WEEKS. IF YOU DON'T,
SEND OUT MORE PROGRAMS UNTIL YOU DO.

My first step in making $50,000 in 90 days was done. By January 30, I
had received 196 orders for REPORT #2. Your goal is to RECEIVE AT LEAST
100+ ORDERS FOR REPORT #2 WITHIN 2 WEEKS. IF NOT, SEND OUT MORE PROGRAMS
UNTIL YOU DO! ONCE YOU HAVE 100 ORDERS, THE REST IS EASY. RELAX, YOU
WILL MAKE YOUR $50,000 GOAL."

Well, I had 196 orders for REPORT #2--96 more than I needed.
So I sat back and relaxed. By March 1, of my e-mailing of 10,000, I
received $58,000 with more coming in every day! I paid off ALL my debts
and bought a much needed new car!

Please take your time to read this plan. IT WILL CHANGE YOUR LIFE
FOREVER$!!! Remember, it won't work if YOU don't try it!

This program DOES work, BUT you must follow it EXACTLY!

Especially the rules of not trying to place your name in a different
place. It won't work and you'll lose out on A LOT of money! In order for
this program to work, you must meet your goal of 20+ orders for REPORT
#1, and 100+ orders for REPORT #2 and YOU WILL MAKE $50,000 or more in
90 days!

I AM LIVING PROOF THAT IT WORKS!!! If you choose not to participate in
this program, I am sorry. It really is a great opportunity with little
cost or risk to you. If you choose to participate, follow the program
and you will be on your way to financial security. If you are a fellow
business owner and are in financial trouble like I was, or you want to
start your own business, consider this a sign. I DID! $$

Sincerely,

Johnathon Rourke
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

A PERSONAL NOTE FROM THE ORIGINATOR OF THIS PROGRAM:

By the time you have read the enclosed program and reports, you should
have concluded that such a program, and one that is legal, could not
have been created by an amateur. Let me tell you a little about myself.
I had a profitable business for 10 years. Then in 1979 my business began
falling off. I was doing the same things that were previously successful
for me, but it wasn't working. Finally, I figured it out. It wasn't me,
it was the economy. Inflation and recession had replaced the stable
economy that had been with us since 1945.

I don't have to tell you what happened to the unemployment rate...
because many of you know from first-hand experience. There were more
failures and bankruptcies than ever before. The middle class was
vanishing. Those who knew what they were doing invested wisely and moved
up. Those who did not, including those who never had anything to save or
invest, were moving down into the ranks of the poor. As the saying goes,
"THE RICH GET RICHER AND THE POOR GET POORER." The traditional methods
of making money will never allow you to "move up" or "get rich"--
inflation will see to that!

You have just received information that can give you financial
freedom for the rest of your life, with "NO RISK" and "JUST A LITTLE BIT
OF EFFORT." You can make more money in the next few months than you have
ever imagined. I should also point out that I will not see a penny of
this money, nor anyone else who has provided a testimonial for this
program.

I have retired from the program after sending thousands and thousands
of programs. Follow the program EXACTLY AS INSTRUCTED. Do not change it
in any way. It works exceedingly well as it is now. Remember to e-mail a
copy of this exciting report to everyone you can think of. One of the
people you send this to may send out 50,000...and your name will be on
everyone of them!

REMEMBER though, ----- the MORE YOU SEND OUT, the more potential
customers you will reach. So my friend, I have given you the ideas,
information, materials and OPPORTUNITY to become FINANCIALLY
INDEPENDENT!

IT IS UP TO YOU!! NOW DO IT!!

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

BEFORE YOU delete this program from your in-box, as I almost did,
take a little time to read it and REALLY THINK ABOUT IT. Get a pencil
and figure out what could happen when YOU participate. Figure out the
worst possible response and no matter how you calculate it, you will
still make a LOT OF MONEY! You will definitely get back what you
invested. Any doubts you have will vanish when your first orders come
in.

$$$ IT WORKS!!! $$$

Jody Jacobs Richmond, VA

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

HERE'S HOW THIS AMAZING PROGRAM WILL MAKE YOU THOUSANDS OF
DOLLAR$$$$!!!!

This method of raising capital REALLY WORKS 100% EVERY TIME. I am
sure that you could use up to $50,000 or more in the next 90 days!
Before you say "BULL... ", please read this program carefully. This is
not a chain letter, but a perfectly legal money making business.

As with all multi-level businesses, we build our business by
recruiting new partners and selling our products. Every state in the USA
allows you to recruit new multi-level business partners, and we sell and
deliver a product for EVERY dollar received.

YOUR ORDERS COME BY MAIL AND ARE FILLED BY E-MAIL, so you are not
involved in personal selling. You do it privately in your own home,
store or office. This is the EASIEST marketing plan anywhere! It is
simply order filling by email!

*******************************************************************
The product is informational and instructional material, keys to the
secrets for everyone on how to open the doors to the magic world of
E-COMMERCE , the information highway, the wave of the future!

PLAN SUMMARY:

(1) You order the 4 reports listed below ($5 each) They come to you
by email.

(2) SAVE A COPY OF THIS ENTIRE LETTER and put your name after Report
#1. Move the other names down.

(3) Via the internet, access Yahoo.com or any of the other major
search engines to locate hundreds of bulk email service companies
(search for "bulk email") and have them send 25,000 - 50,000 emails for
you (about $49+).

(4) Orders will come to you by postal mail - simply email them the
Report they ordered. Let me ask you - isn't this about as easy as it
gets?!?!?!

*******************************************************************

By the way there are over 50 MILLION email addresses with millions
more joining the internet each year so don't worry about "running out"
or "saturation". People are used to seeing and hearing the same
advertisements every day on radio/TV. How many times have you received
the same pizza flyers on your door? Then one day you are hungry for
pizza and you order one. Same thing with this letter. I received this
letter many times - then one day I decided it was time to try it.

*******************************************************************

YOU CAN START TODAY - JUST DO THESE EASY STEPS:

STEP #1. ORDER THE FOUR REPORTS

Order the four reports shown on the list below (you can't sell
them if you don't order them). -- For each report, send $5.00
CASH, the NAME & NUMBER OF THE REPORT YOU ARE ORDERING,
YOUR E-MAIL ADDRESS, and YOUR NAME & RETURN ADDRESS (in case of a
problem) to the person whose name appears on the list next to the
report.

MAKE SURE YOUR RETURN ADDRESS IS ON YOUR ENVELOPE IN CASE OF ANY MAIL
PROBLEMS!

Within a few days you will receive, by e-mail, each of the four
reports. Save them on your computer so you can send them to the 1,000's
of people who will order them from you.

STEP #2. ADD YOUR MAILING ADDRESS TO THIS LETTER
a. Look below for the listing of the four reports.
b. After you've ordered the four reports, delete the name and address
under REPORT #4. This person has made it through the cycle.
c. Move the name and address under REPORT #3 down to REPORT #4.
d. Move the name and address under REPORT #2 down to REPORT #3.
e. Move the name and address under REPORT #1 down to REPORT #2.
f. Insert your name/address in the REPORT #1 position.
Please make sure you COPY ALL INFORMATION, every name and address,
ACCURATELY!

STEP #3. Take this entire letter, including the modified list of
names, and save it to your computer. Make NO changes to these
instructions. Now you are ready to use this entire email to send by
email to prospects.

Report #1 will tell you how to download bulk email software and email
addresses so you can send it out to thousands of people while you
sleep! Remember that 50,000+ new people are joining the internet every
month.

Your cost to participate in this is practically nothing (surely you
can afford $20 and initial bulk mailing cost). You obviously already
have a computer and an Internet connection and e-mail is FREE!

There are two primary methods of building your downline:

METHOD #1: SENDING BULK E-MAIL Let's say that you decide to start
small, just to see how it goes. We'll also assume that you, and all
those involved, email out only 2,000 programs each. Let's also assume
that the mailing receives a 0.5% response. The response could be much
better! Also, many people will email out hundreds of thousands of
programs instead of 2,000 (Why stop at 2000?). But continuing with this
example, you send out only 2,000 programs. With a 0.5% response, that is
only 10 orders for

REPORT #1. Those 10 people respond by sending out 2,000 programs each
for a total of 20,000. Out of those 0.5%, 100 people respond and order

REPORT #2. Those 100 mail out 2,000 programs each for a total of
200,000. The 0.5% response to that is 1,000 orders for

REPORT #3. Those 1,000 send out 2,000 programs each for a 2,000,000
total. The 0.5% response to that is 10,000 orders for

REPORT #4. That's 10,000 $5 bills for you. CASH!!!
Your total income in this example is $50 + $500 + $5,000 + $50,000
for a total of $55,550!!!

REMEMBER FRIEND, THIS IS ASSUMING 1,990 OUT OF THE 2,000 PEOPLE YOU
MAIL TO WILL DO ABSOLUTELY NOTHING AND TRASH THIS PROGRAM!
DARE TO THINK FOR A MOMENT WHAT WOULD HAPPEN IF EVERYONE, OR HALF
SENT OUT 100,000 PROGRAMS INSTEAD OF 2,000. Believe me, many people will
do just that, and more!

METHOD #2 - PLACING FREE ADS ON THE INTERNET
Advertising on the internet is very, very inexpensive, and there are
HUNDREDS of FREE places to advertise. Let's say you decide to start
small just to see how well it works. Assume your goal is to get ONLY 10
people to participate on your first level. (Placing a lot of FREE ads on
the Internet will EASILY get a larger response.) Also assume that
everyone else in YOUR ORGANIZATION gets ONLY 10 downline members. Look
how this small number accumulates to achieve the STAGGERING results
below:

1st level--your first 10 send you $5 .....................$50
2nd level--10 members from those 10 ($5 x 100)...........$500
3rd level--10 members from those 100 ($5 x 1,000)......$5,000
4th level--10 members from those 1,000 ($5 x 10,000)..$50,000

$$$$$$ THIS TOTALS -----------------------------------$55,550 $$$$$$

AMAZING ISN'T IT? Remember friends, this assumes that the people who
participate only recruit 10 people each. Think for a moment what would
happen if they got 20 people to participate! Most people get 100's of
participants and many will continue to work this program, sending out
programs WITH YOUR NAME ON THEM for YEARS! THINK ABOUT IT!

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

People are going to get emails about this plan from YOU or SOMEBODY
ELSE and many will work this plan - the question is - Don't you want
YOUR NAME to be on the emails they will send out?

* * * DON'T MISS OUT!!!

* * * JUST TRY IT ONCE!!! * * *

* * SEE WHAT HAPPENS!!!

*** YOU'LL BE AMAZED!!!* *

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

ALWAYS PROVIDE SAME-DAY SERVICE ON ALL ORDERS!

This will guarantee that the e-mail THEY send out with YOUR name and
address on it will be prompt because they can't advertise until they
receive the report!

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

GET STARTED TODAY: PLACE YOUR ORDER FOR THE FOUR REPORTS NOW.

Notes: -- ALWAYS SEND $5 CASH (U.S. CURRENCY) FOR EACH REPORT. CHECKS
NOT ACCEPTED. Make sure the cash is concealed by wrapping it in TWO
sheets of paper. On one of those sheets of paper write:

(a) the number & name of the report you are ordering

(b) your e-mail address, and

(c) your name & postal address.

REPORT #1a "The Insider's Guide to Advertising for Free on the Internet"

ORDER REPORT #1a FROM:
DAVID TALTY
P.O. Box 51
Rochester,MA 02770


NOTE: I, (and every member listed below), am DEDICATED to helping you
with this program so it will work for you also. This IS a TEAM EFFORT!
We communicate by email and even by phone! TRY US!)

REPORT #2a "The Insider's Guide to Sending Bulk E-mail on the Internet"

ORDER REPORT #2a FROM:
ALAN BROZ
PMB 263
620 Sea Island Road
St Simons Island, GA 31522


REPORT #3a "The Secrets to Multilevel Marketing on the Internet"

ORDER REPORT #3a FROM:
BETTY SANDRIDGE
P.O. Box 4404
Roanoke  VA  24015


REPORT #4a "How to become a Millionaire utilizing the Power of
Multilevel Marketing and the Internet"

ORDER REPORT #4a FROM:
LANCE DENTON a.k.a (Debtfighter)
100 WILDWOOD RD
ROCKPORT TX 78382


******* TIPS FOR SUCCESS *******

TREAT THIS AS YOUR BUSINESS! Be prompt, professional, and follow the
directions accurately. -- Send for the four reports IMMEDIATELY so you
will have them when the orders start coming in because:

When you receive a $5 order, you MUST send out the requested
product/report. It is required for this to be a legal business and
they need the reports to send out their letters (with your name on
them!)

ALWAYS PROVIDE SAME-DAY SERVICE ON THE ORDERS YOU RECEIVE. Be
patient and persistent with this program - If you follow the
instructions exactly - results WILL FOLLOW. $$$$

******* YOUR SUCCESS GUIDELINES *******

Follow these guidelines to guarantee your success: If you don't
receive 20 orders for REPORT #1 within two weeks, continue advertising
or sending e-mails until you do. Then, a couple of weeks later you
should receive at least 100 orders for REPORT#2. If you don't, continue
advertising or sending e-mails until you do. Once you have received 100
or more orders for REPORT #2, YOU CAN RELAX, because the system is
already working for you, and the cash will continue to roll in!

THIS IS IMPORTANT TO REMEMBER: Every time your name is moved down on
the list, you are placed in front of a DIFFERENT report. You can KEEP
TRACK of your PROGRESS by watching which report people are ordering from
you.

To generate MORE INCOME, simply send another batch of e-mails or
continue placing ads and start the whole process again! There is no
limit to the income you will generate from this business!

Before you make your decision as to whether or not you participate in
this program, please answer one question. ARE YOU HAPPY WITH YOUR
PRESENT INCOME OR JOB? If the answer is no, then please look at the
following FACTS about this SUPER SIMPLE MLM program:

1.NO face to face selling, NO meetings, NO inventory!
NO Telephone calls, NO big cost to start!, Nothing to learn,
NO skills needed! (Surely you know how to send email?)

2.No equipment to buy - you already have a computer and
internet connection - so you have everything you need to fill
orders!

3.You are selling a product which does NOT COST ANYTHING TO PRODUCE OR
SHIP! (Emailing copies of the reports is FREE!)

4.All of your customers pay you in CA$H! This program will change
your LIFE FOREVER!! Look at the potential for you to be able to quit
your job and live a life of luxury you could only dream about!
Imagine getting out of debt and buying the car and home of your
dreams! Imagine being able to work a super-high paying LEISURELY
EASY BUSINES FROM HOME!

$$$ FINALLY MAKE SOME DREAMS COME TRUE! $$$

ACT NOW! Take your first step toward achieving financial independence.
Order the reports and follow the program outlined above-- SUCCESS will
be your reward!

Thank you for your time and consideration.

PLEASE NOTE: If you need help with starting a business, registering a
business name, learning how income tax is handled, etc., contact your
local office of the Small Business Administration (a Federal Agency)
1-800-827-5722 for free help and answers to questions.

Also, the Internal Revenue Service offers free help via telephone and
free seminars about business tax reuirements. Your earnings are highly
dependent on your activities and advertising. The information contained
on this site and in the report constitutes no guarantees stated nor
implied. In the event that it is determined that this site or report
constitutes a guarantee of any kind, that guarantee is now void. The
earnings amounts listed on this site and in the report are estimates
only. If you have any questions of the legality of this program, contact
the Office of Associate Director for Marketing Practices, Federal Trade
Commission, Bureau of Consumer Protection in Washington, DC.

================================================

Under Bill s.1618 TITLE III passed by the 105th US Congress this
letter cannot be considered spam as long as the sender includes
contact information and a method of removal.

This is a one time e-mail transmission. No request for removal is
necessary.










_________________________________________________________
Do You Yahoo!?
Get your free @yahoo.com address at http://mail.yahoo.com



From list@netscape.com  Fri Nov  3 20:22:21 2000
Received: from netscape.com (h-205-217-237-47.netscape.com [205.217.237.47])
	by ietf.org (8.9.1a/8.9.1a) with SMTP id UAA23197
	for <ldapext-archive@odin.ietf.org>; Fri, 3 Nov 2000 20:22:20 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.10.0/8.10.0) with ESMTP id eA41CkD27305;
	Fri, 3 Nov 2000 17:12:46 -0800 (PST)
Received: (from list@localhost)
	by aka.mcom.com (8.10.0/8.10.0) id eA41K7Y01658;
	Fri, 3 Nov 2000 17:20:07 -0800 (PST)
Resent-Date: Fri, 3 Nov 2000 17:20:07 -0800 (PST)
Date: Fri, 3 Nov 2000 17:19:06 -0800 (PST)
Message-Id: <200011040119.eA41J6R23691@xwing.netscape.com>
From: bdwna@hotbot.com
To: sazrr@RealFriend.netscape.com
Reply-To: lou2u2@n2mail.com
Subject: BULLET-PROOF YOUR ASSETS, FOREVER!                                    [brpcx]
Resent-Message-ID: <"pQek9C.A.HX.1Q2A6"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com

AMERICANS: BULLET-PROOF YOUR ASSETS, FOREVER!
====================================================
You have two MAJOR enemies in this world:

1. The Internal Revenue Service, who wants to confiscate wealth 
that rightfully belongs to you, and

2. Everybody else and their lawyers!

Learn how to:
a. make all of your assets VANISH before those who attack you!
b. operate a business so its earnings are TAX-EXEMPT!
c. become LAWSUIT-PROOF!

There IS a way -- and it'll protect your stuff from greedy lawyers,
grasping relatives, AND the government (especially the IRS)!

And, you won't have to mortgage the farm to do it!

Get FULL details -- and I do mean FULL details!
Reply with "Protect" in the subject box.

mailto:sam6@n2mail.com?subject=Protect

Have a Great Day!

PS: To be removed from the list, just put "Remove"
in subject line and send.



From list@netscape.com  Fri Nov  3 20:26:06 2000
Received: from netscape.com (h-205-217-237-47.netscape.com [205.217.237.47])
	by ietf.org (8.9.1a/8.9.1a) with SMTP id UAA24026
	for <ldapext-archive@odin.ietf.org>; Fri, 3 Nov 2000 20:26:06 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.10.0/8.10.0) with ESMTP id eA41H2D28025;
	Fri, 3 Nov 2000 17:17:02 -0800 (PST)
Received: (from list@localhost)
	by aka.mcom.com (8.10.0/8.10.0) id eA41O8A03386;
	Fri, 3 Nov 2000 17:24:08 -0800 (PST)
Resent-Date: Fri, 3 Nov 2000 17:24:08 -0800 (PST)
Message-Id: <200011040122.eA41McD15648@ywing.netscape.com>
From: <emc1102@lycos.com>
Subject: New List 11-02-00!!
Date: Fri, 3 Nov 2000 15:44:00
Resent-Message-ID: <"6pQmkB.A.Lx.5T2A6"@glacier>
To: ietf-ldapext@netscape.com
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com

  *******New List 11-02-00!!********                             
     
Visit the site for more details!
http://virtue.nu/meg925

The key to success in marketing online is reaching the people who 
are really interested in your ad! 

You need targeted e-mails of business opportunity seekers
who are ACTIVELY marketing online and trying to expand their
business TODAY!

-->   Highly Deliverable Lists!
  Our lists are cleaned and updated on a daily basis! Which means 
we have the lowest undeliverable rate out there!  We've also made 
sure to filter out all those unwanted e-mail address such as 
.mil, .org, .org, .gov, etc.
                          
-->   What YOUR Reponse Could Be!
  If you order the list of 200,000 and achieve a reponse rate of 
only 1%, you could have over 2,000 reponses to your ad, and that 
is just in ONE mailing.  Note:  it usually takes someone an 
average of 7 times to be exposed to a message before he/she 
responds to it.

Visit the site for more details!
http://virtue.nu/meg925

 10,000 opportunity seekers e-mails for only $15
**New List 11-02-00**
 25,000 opportunity seekers e-mails for only $25
 50,000 opportunity seekers e-mails for only $35
100,000 opportunity seekers e-mails for only $50
225,000 opportunity seekers e-mails for only $75

- Promotions!

**FREE with EVERY order, demo of ListMan e-mail manager software 
to manage your e-mails list 

**Order 50,000 or more e-mails and receive Express Mail Server to 
send your e-mails FREE!  
-Send your e-mails safely bypassing your ISP's mail server!
-This is not a demo but a permanent license for the software!

**Order 100,000 or more e-mails and receive:

- InfoDisk  with 1000+ Money Making Reports
- URL cloaking software
- CheckMAN software
Combined value of over $250!  Yours FREE!
_______________________________________________________________
I received your e-mail as someone interested in Internet Business 
Opportunities. If I received your e-mail in error, or you are no 
longer interested, you can be removed at no cost to you simply by 
pressing "Reply" and place "Remove" in the Subject line.
_________________________________________________________________
 
 
 
 
 
 
 
 
 
 
 



From list@netscape.com  Sat Nov  4 14:27:26 2000
Received: from netscape.com (h-205-217-237-46.netscape.com [205.217.237.46])
	by ietf.org (8.9.1a/8.9.1a) with SMTP id OAA11296
	for <ldapext-archive@odin.ietf.org>; Sat, 4 Nov 2000 14:27:26 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.10.0/8.10.0) with ESMTP id eA4JDns03166;
	Sat, 4 Nov 2000 11:13:50 -0800 (PST)
Received: (from list@localhost)
	by aka.mcom.com (8.10.0/8.10.0) id eA4JPpw27084;
	Sat, 4 Nov 2000 11:25:51 -0800 (PST)
Resent-Date: Sat, 4 Nov 2000 11:25:51 -0800 (PST)
To: Leec@dicc.co.kr
Message-Id: <uwb67x0shq4.6g7w1b2teblrx4@mail.gr>
Date: Sat, 04 Nov 2000 13:21:30 -0500
From: lucstnw@edhaus.co.kr
Content-Type: text/plain;
	 charset="iso-8859-1"
Content-Transfer-Encoding: 8BIT
Subject: Nothing on TV? Watch 500 Channels on your new Free Satellite ...
Resent-Message-ID: <"QZAyQ.A.3mG.-KGB6"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com
Content-Transfer-Encoding: 8BIT

FREE Satellite T.V. System and FREE Instalation

For a limited time we'll give you this top of the line Digital
Satellite System for FREE! We'll even include Free installation.

Enjoy over 500 Channels of crystal clear digital picture and
cd stereo sound on your FREE Satellite TV System.  Why pay
over $900 retail for these items, when we're giving you this
satellite package for free.


Call 888-514-6881 to be Guaranteed Your FREE Satellite Today


This innovative 20" satellite includes a stereo receiver and
an infrared remote.  With this FREE offer you will have both
Interactive Television Capability and an On Screen Program Guide.

This limited time FREE offer is much less than the monthly cost
of cable tv. All you have to do is call us to arrange delivery.   
If you call today, we'll throw in a second receiver for your
second T.V. free.


Call 888-514-6881 to Begin Surfing through 500 Channels Today!


To be removed send email to datyups@yahoo.com



From list@netscape.com  Sat Nov  4 20:39:59 2000
Received: from netscape.com (h-205-217-237-46.netscape.com [205.217.237.46])
	by ietf.org (8.9.1a/8.9.1a) with SMTP id UAA00814
	for <ldapext-archive@odin.ietf.org>; Sat, 4 Nov 2000 20:39:58 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.10.0/8.10.0) with ESMTP id eA51QOs19814;
	Sat, 4 Nov 2000 17:26:24 -0800 (PST)
Received: (from list@localhost)
	by aka.mcom.com (8.10.0/8.10.0) id eA51cQQ04951;
	Sat, 4 Nov 2000 17:38:26 -0800 (PST)
Resent-Date: Sat, 4 Nov 2000 17:38:26 -0800 (PST)
Message-Id: <sa045779.024@reed.oncalldba.com>
X-Mailer: Novell GroupWise Internet Agent 5.5.2.1
Date: Sat, 04 Nov 2000 18:37:17 -0700
From: "Ed Reed" <eer@OnCallDBA.COM>
To: <internet-drafts@ietf.org>
Cc: <ietf-ldup@imc.org>, <ietf-ldapext@netscape.com>
Subject: draft-ietf-ldup-subentry-04.txt
Mime-Version: 1.0
Content-Type: multipart/mixed; boundary="=_164D25F9.FE9FF338"
Resent-Message-ID: <"UQoB2B.A.CNB.QoLB6"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com

--=_164D25F9.FE9FF338
Content-Type: text/plain; charset=US-ASCII
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable

Please publish the attached as the next version of the named draft.

Abstract:

This document describes an object class called ldapSubEntry=20
which MAY be used to indicate operations and management=20
related entries in the directory, called LDAP Subentries. =20
To control the visibility of entries of type ldapSubEntry,=20
a control, ldapSubentriesControl, is also defined.=20

Note to the working groups -=20

This version adds the specification of the control, but does not yet
accomodate the requested clarifications with regard to administrative
areas, etc. =20

Please comment at your convenience on the changes made here, while
I work to address the administrative area clarifications and publish same
prior to the next publication cut-off date.

Thank you,
Ed

=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
Ed Reed
Reed-Matthews, Inc.
+1 801 796 7065
http://www.Reed-Matthews.COM


--=_164D25F9.FE9FF338
Content-Type: text/plain
Content-Disposition: attachment; filename="draft-ietf-ldup-subentry-04.txt"
Content-Transfer-Encoding: base64
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--=_164D25F9.FE9FF338--



From list@netscape.com  Sat Nov  4 20:46:11 2000
Received: from netscape.com (h-205-217-237-46.netscape.com [205.217.237.46])
	by ietf.org (8.9.1a/8.9.1a) with SMTP id UAA02154
	for <ldapext-archive@odin.ietf.org>; Sat, 4 Nov 2000 20:46:11 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.10.0/8.10.0) with ESMTP id eA51WZs20447;
	Sat, 4 Nov 2000 17:32:36 -0800 (PST)
Received: (from list@localhost)
	by aka.mcom.com (8.10.0/8.10.0) id eA51ibg06749;
	Sat, 4 Nov 2000 17:44:37 -0800 (PST)
Resent-Date: Sat, 4 Nov 2000 17:44:37 -0800 (PST)
Message-Id: <200011050144.eA51iID08292@ywing.netscape.com>
From: "Rick" <biz4uus@yahoo.com>
To: <ietf-ldapext@netscape.com>
Subject: FREE INTERNET BIZ OPPORTUNITY
Mime-Version: 1.0
Content-Type: text/plain; charset="iso-8859-1"
Date: Sat, 4 Nov 2000 20:48:48
Resent-Message-ID: <"c_P04D.A.4oB.DuLB6"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com
X-MIME-Autoconverted: from 8bit to quoted-printable by netscape.com id eA51WZs20447
Content-Transfer-Encoding: 8bit
X-MIME-Autoconverted: from quoted-printable to 8bit by ietf.org id UAA02154

Removal instructions are at the bottom of this page.   ALL removal requests must go to the 
address at the bottom.
************************************************************

You are about to be introduced to the best Global Internet Business Opportunity.
One that will allow you to make a part-time or full-time income right from your home, 
marketing top notch products and services using the most powerful global medium ever created: the Internet.
As an Independent Representative, you will receive a free web site - And you will not need to 
invest a single penny to get started!

Earn Commission
Earn up to 10% commission for each new account you bring to any one of our suite of 
services.   Simply refer your visitors to your web site - and with
every order we receive, you get paid!   Also earn residual overrides and bonuses by 
personally sponsoring friends and associates into the program.
Remember, it's FREE and IT WORKS!    We have THOUSANDS of hard 
working agents who earn substantial commission dollars each month.

We offer... 
•	No yearly renewal fee!	
•	No start-up fee!	
•	Great residual commission rates (6% to 10%) 	
•	Generous Sales and Promotional Bonuses	
•	100% customizable, fully automated e-commerce web site	
•	Full Back Office Customer Usage Reports - on your Private Agent's Site	
•	Online - real time wire transfer of commissions.

How to sign up
To view the Products and Services, review the benefits and highlights of our opportunity...
Simply REQUEST ADDITIONAL INFO and the URL from  " biz4uus@yahoo.com "


Kindest regards, have a good day!
Rick




************************************************************
This is a ONE-TIME mailing.   This message is sent in compliance of the new email bill; 
Section 301.  Paragraph (a)(2)(C) of Senate bill 1618 Title 3 http://www.senate.gov.
This letter cannot be considered spam as long as we include: contact information and
a remove link.   Refer to http://spamlaws.com/federal/hr3113.html.   If you were not
the intended recipient of this message, please accept my apologies and delete.  
Further transmissions to you by the sender of this email may be prevented by forwarding
this email to BIZ2NET2@USA.NET with "remove" as the subject line.
However, this is a ONE-TIME mailing.   Thank You.
************************************************************                       



From list@netscape.com  Sat Nov  4 22:26:59 2000
Received: from netscape.com (h-205-217-237-47.netscape.com [205.217.237.47])
	by ietf.org (8.9.1a/8.9.1a) with SMTP id WAA00045
	for <ldapext-archive@odin.ietf.org>; Sat, 4 Nov 2000 22:26:58 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.10.0/8.10.0) with ESMTP id eA53HtD16908;
	Sat, 4 Nov 2000 19:17:55 -0800 (PST)
Received: (from list@localhost)
	by aka.mcom.com (8.10.0/8.10.0) id eA53PJo23267;
	Sat, 4 Nov 2000 19:25:19 -0800 (PST)
Resent-Date: Sat, 4 Nov 2000 19:25:19 -0800 (PST)
Message-Id: <sa047096.026@reed.oncalldba.com>
X-Mailer: Novell GroupWise Internet Agent 5.5.2.1
Date: Sat, 04 Nov 2000 20:24:52 -0700
From: "Ed Reed" <eer@OnCallDBA.COM>
To: <ietf-ldup@imc.org>, <ietf-ldapext@netscape.com>,
        <d.w.chadwick@salford.ac.uk>
Subject: Discussion:  Subentries and Administrative Areas, and
	draft-ietf-ldup-subentry-04.txt
Mime-Version: 1.0
Content-Type: text/plain; charset=US-ASCII
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
X-MIME-Autoconverted: from quoted-printable to 8bit by aka.mcom.com id eA53PGv23240
Resent-Message-ID: <"FtwxN.A.OrF.dMNB6"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com
Content-Transfer-Encoding: 8bit

To refresh people's memories of the discussion in Pittsburgh, here are the notes from the LDUP WG meeting there addressing the administrative area / subentry discussion...
=================================================
5. "LDAP Subentry Schema"
http://www.ietf.org/internet-drafts/draft-ietf-ldup-subentry
-03.txt
Editor(s): Ed Reed

Basic problem is that the presence of a subentry causes an
administrative area to be defined. So the administrative
area may not exactly coincide with the naming context. The
subentry document needs to be updated to define what is
meant by each of these terms. The management of
administrative areas, and how this differs (if at all) from
the management of naming contexts, needs to be documented.

This challenges us to as to whether replication needs
semantic understanding of administrative areas. This seems
like a very thorny issue, and it was suggested that we treat
this as a version 2 problem in order to make progress with
the existing definition of LDUP. This draft will be revised
to make scoping of LDUP subentry more clear.

Open issue raised by Kurt is to use a control instead of a
filter mechanism to make subentries visible. This issue has
been posted to the list.

Action: The next revision of this draft will be published by
the end of October.
============================================
Now, you'll notice that I've asked to have published the -04 version
of the document, which includes the specification of an
LDAP control (with no arguments) intended to behave in
much the same way as the subentries ServiceControl argument
of X.511 Search and List operations.

Here, then, begins the discussion about administrative areas,
in the hopes that something simple will fall out quickly.

I confess that my thinking has always approached naming
contexts as being partitions of the namespace, and providing
natural boundaries for a corresponding replication administrative area.

The discussion at Pittsburgh, though, drove home to me that while
that simplification might well suite replication, other administrative
areas (schema, access control policy, application-specific whatever)
are not inherently limited to working within a naming context, may 
in fact overlap several contiguous naming contexts, and may not
cover all of one or more of the naming contexts it does overlap.

In other words, other administrative area definitions are likely to be
arbitrary and completely orthogonal to the ones defined for
replication.  Or at least its certain that we'll find some that are.

However, there's an important definition in [X.501] - autonomous
administrative domain - which indicates that they are non-overlapping.
That might give us leeway to simplify matters.  Certainly, for the purposes
of LDUP, the replication areas are, indeed, non-overlapping.

Further, both inner administrative areas and specific administration areas
are both bounded by (e.g. contained within) one of the non-overlapping
autonomous administrative domain.

So, I think what I"m proposing is that the namingContext auxiliary class
that LDUP Arch defines is the "autonomous administrative point", and
the subentries we're defining MIGHT be tied to that.  Such an evasion
(for that is surely what it would be ;-) would leave for future work
the definition and management of specific administration areas (SAA) which
could then partition the autonomous administrative area, and the
inner administrative areas which in turn partition the SAAs.

Do I have that right?

Would such an approach be satisfactory?  And, yes, I'd be perfectly
happy defining the bare minimum required right now.

Ed




From list@netscape.com  Sun Nov  5 02:09:53 2000
Received: from netscape.com (h-205-217-237-47.netscape.com [205.217.237.47])
	by ietf.org (8.9.1a/8.9.1a) with SMTP id CAA22142
	for <ldapext-archive@odin.ietf.org>; Sun, 5 Nov 2000 02:09:52 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.10.0/8.10.0) with ESMTP id eA570qD26252;
	Sat, 4 Nov 2000 23:00:52 -0800 (PST)
Received: (from list@localhost)
	by aka.mcom.com (8.10.0/8.10.0) id eA578Es00249;
	Sat, 4 Nov 2000 23:08:14 -0800 (PST)
Resent-Date: Sat, 4 Nov 2000 23:08:14 -0800 (PST)
X-pair-Authenticated: 144.132.68.23
Reply-To: <Albert.Langer@Directory-Designs.org>
From: "Albert Langer" <Albert.Langer@Directory-Designs.org>
To: "'Ed Reed'" <eer@OnCallDBA.COM>, <ietf-ldup@imc.org>,
        <ietf-ldapext@netscape.com>, <d.w.chadwick@salford.ac.uk>
Subject: RE: Discussion:  Subentries and Administrative Areas, anddraft-ietf-ldup-subentry-04.txt
Date: Sun, 5 Nov 2000 18:12:37 +1100
Message-ID: <000701c046f7$c8774520$17448490@vic.bigpond.net.au>
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
X-Priority: 3 (Normal)
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook CWS, Build 9.0.2416 (9.0.2910.0)
X-MimeOLE: Produced By Microsoft MimeOLE V5.50.4133.2400
In-Reply-To: <sa047096.025@reed.oncalldba.com>
Importance: Normal
Resent-Message-ID: <"_ns8OC.A.iD.ddQB6"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com
Content-Transfer-Encoding: 7bit

[Ed]
Basic problem is that the presence of a subentry causes an
administrative area to be defined. So the administrative
area may not exactly coincide with the naming context. The
subentry document needs to be updated to define what is
meant by each of these terms. The management of
administrative areas, and how this differs (if at all) from
the management of naming contexts, needs to be documented.

This challenges us to as to whether replication needs
semantic understanding of administrative areas. This seems
like a very thorny issue, and it was suggested that we treat
this as a version 2 problem in order to make progress with
the existing definition of LDUP. This draft will be revised
to make scoping of LDUP subentry more clear.

[Albert] Replication (and indeed the LDUP WG) clearly does need some
semantic understanding of administrative areas (and also of distribution ...
not to mention atomicity ;-)

Actual management could conceivably be deferred until version 2 and is
really a general LDAP issue rather than a specifically LDUP issue since it
applies even with no replication.

Replication of the managed administration points affecting a replicated area
should not be deferred.

Specifically, entries must be replicated for each administrative point in
the DIT that is an ancestor of the actual replicated area. These are not
just "glue" to form the name, which also has to be replicated, but could
"simply" be carried by the root of the replicated area. They also involve
replicated attributes and subentries with actual administrative information
that can only be applied to entries in the replicated area if it has been
replicated to the DSAs holding replicas of those entries. This is pretty
straight forward - a replication agreement implicitly requires replication
of those "ancestor" administrative points (including their subentries).

For distribution, additional knowledge information about the DSAs holding
NCs below the boundary of a replicated area also needs to be replicated
implicitly with that replication area. Otherwise a DUA cannot be given a
referral to them. That could be less straight forward.

[...Ed]
I confess that my thinking has always approached naming
contexts as being partitions of the namespace, and providing
natural boundaries for a corresponding replication administrative area.

[Albert]
Not mentioned in the correction below is that the partitioning of the
namespace by NCs is  a partition according to the single master DSA holding
the context prefix. It follows that a DSA cannot hold contiguous NCs, since
they are merged into a single NC by the fact that it holds a single context
prefix for both.

With multi-master, a set of replica DSAs holds the context prefix of a
partition of the namespace, by all holding a replicated area which includes
that entry. But the same set of DSAs need not all hold all the replicated
areas which are part of that partition of the namespace. It is sufficient
that the intersection of the sets of replicated areas they each hold include
that particular replicated area which has the context prefix.

For example an organization (Autonomous Administrative Area) might have
replicated areas corresponding to HQ, regional and local organizational
units, each with their own DSA at a corresponding office. But a single DSA
in say Paris might well hold the replicated areas for the multi-national HQ,
the Paris Region and a particular local office. There is no reason why it
should also have to hold replicas for every other regional or local
organizational unit.

A "simple" approach could just eliminate the concept of an NC, as in the
current LDUP drafts where it is confused with the new concept of a
replicated area (RA). Reading RA instead of NC, the problem seems to just
disappear.

But then who defines the namespace partitioning?

The separate concept of an NC is still needed to administer names.

[Ed]
The discussion at Pittsburgh, though, drove home to me that while
that simplification might well suite replication, other administrative
areas (schema, access control policy, application-specific whatever)
are not inherently limited to working within a naming context, may
in fact overlap several contiguous naming contexts, and may not
cover all of one or more of the naming contexts it does overlap.

In other words, other administrative area definitions are likely to be
arbitrary and completely orthogonal to the ones defined for
replication.  Or at least its certain that we'll find some that are.

[SC]
In addition, realistic Directory Access Control Domains add further
complications.

[Ed]
Such an evasion
(for that is surely what it would be ;-) would leave for future work
the definition and management of specific administration areas (SAA) which
could then partition the autonomous administrative area, and the
inner administrative areas which in turn partition the SAAs.

[SC]
The conceptual framework for this "future work" was done many years ago for
the X.500 standards.

LDAP should simplify protocols when and where possible, but must not change
the conceptual framework.

Although the the X.500 standards are pretty unreadable, an excellent
explanation is in David Chadwick's book, available online at:

http://www.salford.ac.uk/its024/Version.Web/Contents.htm

Section 11 of chapter 2 actually succeeds in making the administrative
framework intelligible!

Inner Administrative Areas do not "partition" SAAs since they can be nested
as shown on the right of this diagram:

http://www.salford.ac.uk/its024/Version.Web/Chapter.2/fig2-6.gif

Assuming that actual management can be deferred, definition (by simply
adopting the work already done) should not be deferred.

Simply specify that ancestor administrative points and their subentries are
replicated together with each replicated area. Otherwise replicas simply
would not receive essential context information.

Visualize a "replicated area" as possibly being a smaller triangle within
that nested IAP. It clearly needs to receive copies of each of the ancestor
administrative entries and subentries in that diagram.

[Ed]
However, there's an important definition in [X.501] - autonomous
administrative domain - which indicates that they are non-overlapping.
That might give us leeway to simplify matters.  Certainly, for the purposes
of LDUP, the replication areas are, indeed, non-overlapping.

Further, both inner administrative areas and specific administration areas
are both bounded by (e.g. contained within) one of the non-overlapping
autonomous administrative domain.

So, I think what I"m proposing is that the namingContext auxiliary class
that LDUP Arch defines is the "autonomous administrative point", and
the subentries we're defining MIGHT be tied to that.  Such an evasion
(for that is surely what it would be ;-) would leave for future work
the definition and management of specific administration areas (SAA) which
could then partition the autonomous administrative area, and the
inner administrative areas which in turn partition the SAAs.

[Albert]
A "Directory hosting ISP" could hold the AAA's for numerous organizations on
a single DSA, just as a "Web hosting ISP" holds numerous domains for web
service.

Each would be replicated with internal DSAs of the organization concerned
and with DSAs at other local sites of the ISP to provide global backbone
directory service for those organizations.

It certainly should not follow that they are all a single replicated area
because they hosted on a single DSA.

Not only should the various AAA's not be required to receive replicas of
each other, but some may  only need say 2 replicas at local sites of their
ISP while others may want replicas at more.




From list@netscape.com  Sun Nov  5 02:33:05 2000
Received: from netscape.com (h-205-217-237-47.netscape.com [205.217.237.47])
	by ietf.org (8.9.1a/8.9.1a) with SMTP id CAA06647
	for <ldapext-archive@odin.ietf.org>; Sun, 5 Nov 2000 02:33:04 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.10.0/8.10.0) with ESMTP id eA57OAD27414;
	Sat, 4 Nov 2000 23:24:10 -0800 (PST)
Received: (from list@localhost)
	by aka.mcom.com (8.10.0/8.10.0) id eA57VXk04425;
	Sat, 4 Nov 2000 23:31:33 -0800 (PST)
Resent-Date: Sat, 4 Nov 2000 23:31:33 -0800 (PST)
Message-Id: <200011050731.eA57VUR11332@xwing.netscape.com>
X-Sent: 5 Nov 2000 07:31:19 GMT
X-Sender: ashlaws@peoplepc.com
From: "Ashlaws.Mint" <ashlaws@peoplepc.com>
To: ietf-ldapext@netscape.com
Date: Sun, 05 Nov 2000 02:31:24 -0500
Subject: =?iso-8859-1?Q?_L(=A9=BF=A9)K!_NEW_Co-OP;_We_Do_All_The_Advertising_For_You_!_Big_Money_Maker!_?=
Reply-To: ashlaws@peoplepc.com
Organization: ashlaws
MIME-Version: 1.0
Content-Type: text/plain; charset=iso-8859-1
Content-Transfer-Encoding: 7bit
Resent-Message-ID: <"G_EXYD.A.vEB.TzQB6"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com
Content-Transfer-Encoding: 7bit

    CO-OP ADVERTISING SYSTEM. 
 
  Greatest Money Maker Ever, This is HOT!

 We Do All The Advertising For You,
 No Recruiting Required. Pay only
 One Time.YOU MUST SEE THIS!  

FOR MORE INFORMATION.
REPLY TO THIS MESSAGE WITH MORE INFO IN THE SUBJECT.

ashlaws@peoplepc.com

ashlaws@mail.com





From list@netscape.com  Sun Nov  5 17:22:16 2000
Received: from netscape.com (h-205-217-237-46.netscape.com [205.217.237.46])
	by ietf.org (8.9.1a/8.9.1a) with SMTP id RAA13718
	for <ldapext-archive@odin.ietf.org>; Sun, 5 Nov 2000 17:22:16 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.10.0/8.10.0) with ESMTP id eA5M8Ns11162;
	Sun, 5 Nov 2000 14:08:24 -0800 (PST)
Received: (from list@localhost)
	by aka.mcom.com (8.10.0/8.10.0) id eA5MKR625764;
	Sun, 5 Nov 2000 14:20:27 -0800 (PST)
Resent-Date: Sun, 5 Nov 2000 14:20:27 -0800 (PST)
From: "David Chadwick" <d.w.chadwick@salford.ac.uk>
Organization: University of Salford
To: "Jim Sermersheim" <JIMSE@novell.com>, <ietf-ldapext@netscape.com>
Date: Sun, 5 Nov 2000 22:21:04 -0000
MIME-Version: 1.0
Content-type: text/plain; charset=US-ASCII
Content-transfer-encoding: 7BIT
Subject: Re: Relationship between dupent and matched values
Reply-to: d.w.chadwick@salford.ac.uk
Message-ID: <3A05DD50.14883.4E1CA75@localhost>
Priority: normal
In-reply-to: <s9fef153.078@prv-mail20.provo.novell.com>
X-mailer: Pegasus Mail for Win32 (v3.12c)
Resent-Message-ID: <"5FKxV.A.PSG.p0dB6"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com
Content-Transfer-Encoding: 7BIT

Date sent:      	Tue, 31 Oct 2000 16:20:31 -0700
From:           	"Jim Sermersheim" <JIMSE@novell.com>
To:             	<ietf-ldapext@netscape.com>
Copies to:      	<d.w.chadwick@salford.ac.uk>
Subject:        	Relationship between dupent and matched values

> I'm wrapping up the final edits for a new version of the duplicate
> entries draft and I was going to add a comment about the usefulness of
> pairing it with the matched values draft. I'm hesitating now, only
> because I'd like to see this draft get to RFC status soon and so I
> don't want to reference a draft that isn't scheduled to be immediately
> advanced.
> 
> Does anyone have strong feelings about this? We could put the note in
> the matched values draft.

The matched values has already been sent off for last call, and 
includes an appropriate note. I believe you should do likewise. Here 
is the matched values text


This control acts independently of other LDAP controls such as 
server 
side sorting [10] and duplicate entries [7]. However, there might be 
interactions between this control and other controls so that a 
different set of Search Result Entries are returned, or the entries 
are returned in a different order, depending upon the sequencing of 
this control and other controls in the LDAP request. For example, 
with server side sorting, if sorting is done first, and value return 
filtering second, the set of Search Results may appear to be in the 
wrong order since the value filtering may remove the attribute 
values 
upon which the ordering was done. (The sorting document specifies 
that entries without any sort key attribute values should be treated 
as coming after all other attribute values.) Similarly with duplicate 
entries, if duplication is performed before value filtering, the set 
of Search Result Entries may contain identical duplicate entries, 
each with an empty set of attribute values, because the value 
filtering removed the attribute values that were used to duplicate 
the results.


David

> 
> Jim
> 


***************************************************

David Chadwick
IS Institute, University of Salford, Salford M5 4WT
Tel +44 161 295 5351  Fax +44 161 745 8169
Mobile +44 790 167 0359
Email D.W.Chadwick@salford.ac.uk
Home Page  http://www.salford.ac.uk/its024/chadwick.htm
Understanding X.500  http://www.salford.ac.uk/its024/X500.htm
X.500/LDAP Seminars http://www.salford.ac.uk/its024/seminars.htm
Entrust key validation string MLJ9-DU5T-HV8J

***************************************************



From list@netscape.com  Sun Nov  5 18:09:54 2000
Received: from netscape.com (h-205-217-237-46.netscape.com [205.217.237.46])
	by ietf.org (8.9.1a/8.9.1a) with SMTP id SAA29021
	for <ldapext-archive@odin.ietf.org>; Sun, 5 Nov 2000 18:09:54 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.10.0/8.10.0) with ESMTP id eA5Mtjs14211;
	Sun, 5 Nov 2000 14:55:45 -0800 (PST)
Received: (from list@localhost)
	by aka.mcom.com (8.10.0/8.10.0) id eA5N7nw04977;
	Sun, 5 Nov 2000 15:07:49 -0800 (PST)
Resent-Date: Sun, 5 Nov 2000 15:07:49 -0800 (PST)
Message-ID: <3A05E812.C76571CD@oracle.com>
Date: Sun, 05 Nov 2000 15:06:59 -0800
From: Uppili Srinivasan <uppili.srinivasan@oracle.com>
X-Mailer: Mozilla 4.61 [en] (Win98; I)
X-Accept-Language: en
MIME-Version: 1.0
To: Albert.Langer@directory-designs.org, "'Ed Reed'" <eer@OnCallDBA.COM>
CC: ietf-ldup@imc.org, ietf-ldapext@netscape.com, d.w.chadwick@salford.ac.uk
Subject: Re: Discussion:  Subentries and Administrative Areas, 
 anddraft-ietf-ldup-subentry-04.txt
References: <000701c046f7$c8774520$17448490@vic.bigpond.net.au>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Resent-Message-ID: <"if4_j.A.cNB.EheB6"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com
Content-Transfer-Encoding: 7bit

Ed and Albert:

Thanks for re-initiating this discussion.

I think there is no real workable way to evade the issue of replication of
administrative information associated with services whose administrative
boundaries are independent of that of replication.  I agree with Albert's
comments and his suggestions for augmenting the LDUP architecture document,
including treatment of naming contexts.

At Pittsburg it was decided that the LDUP model (architecture) document should
be updated to present a resolution for conflicts that arise from the fact that
ACL administrative areas are independent of replication administrative areas
(the latter is defined to coincide with "naming context" boundaries).  But the
actual issue, as you have stated,  is not just specific to ACLs.  So a clear
general frame-work for this has to be spelled out in the LDUP model document.

The following comments Albert has made are especially worth noting.  (Some of
these have been made before by others as well):

-  LDAP should simplify protocols when and where possible, but must not change
the conceptual framework
-  The conceptual framework for this "future work" was done many years ago for
the X.500 standards

And specifically, w.r.t replication:

-  Actual management could conceivably be deferred .... and is really a general
LDAP issue rather than a specifically LDUP issue since it applies even with no
replication.
-  Replication of the managed administration points affecting a replicated area
should not be deferred.

With subentry and ACL model drafts progressing, the problems resulting from not
spelling out a conceptual frame-work for administrative areas and their
replication is very evident.

Specifically, I propose we incorporate the following recommendations that Albert
has made to the LDUP model draft:

1)  State that the LDUP replication agreements implicitly requires replication
of those "ancestor" administrative points (including their subentries).
2)  Eliminate the concept of a NC [as defined in the current LDUP drafts ..
where it is indeed confused with replicated area (RA)].   Change the use of NC
to read as RA in other relevant discussions.
3) Paraphrase the namespace partitioning discussion along the guidelines in
X.500.  Cleanup the confusion between NC and replication area in the current
draft.

Also, the only way LDUP can go forward, in this regard, without conflicting with
the future LDAP revision is if we agree now to concretely adopt corresponding
X.500 conceptual frame-work.

Regards,
Uppili.

Albert Langer wrote:

> [Ed]
> Basic problem is that the presence of a subentry causes an
> administrative area to be defined. So the administrative
> area may not exactly coincide with the naming context. The
> subentry document needs to be updated to define what is
> meant by each of these terms. The management of
> administrative areas, and how this differs (if at all) from
> the management of naming contexts, needs to be documented.
>
> This challenges us to as to whether replication needs
> semantic understanding of administrative areas. This seems
> like a very thorny issue, and it was suggested that we treat
> this as a version 2 problem in order to make progress with
> the existing definition of LDUP. This draft will be revised
> to make scoping of LDUP subentry more clear.
>
> [Albert] Replication (and indeed the LDUP WG) clearly does need some
> semantic understanding of administrative areas (and also of distribution ...
> not to mention atomicity ;-)
>
> Actual management could conceivably be deferred until version 2 and is
> really a general LDAP issue rather than a specifically LDUP issue since it
> applies even with no replication.
>
> Replication of the managed administration points affecting a replicated area
> should not be deferred.
>
> Specifically, entries must be replicated for each administrative point in
> the DIT that is an ancestor of the actual replicated area. These are not
> just "glue" to form the name, which also has to be replicated, but could
> "simply" be carried by the root of the replicated area. They also involve
> replicated attributes and subentries with actual administrative information
> that can only be applied to entries in the replicated area if it has been
> replicated to the DSAs holding replicas of those entries. This is pretty
> straight forward - a replication agreement implicitly requires replication
> of those "ancestor" administrative points (including their subentries).
>
> For distribution, additional knowledge information about the DSAs holding
> NCs below the boundary of a replicated area also needs to be replicated
> implicitly with that replication area. Otherwise a DUA cannot be given a
> referral to them. That could be less straight forward.
>
> [...Ed]
> I confess that my thinking has always approached naming
> contexts as being partitions of the namespace, and providing
> natural boundaries for a corresponding replication administrative area.
>
> [Albert]
> Not mentioned in the correction below is that the partitioning of the
> namespace by NCs is  a partition according to the single master DSA holding
> the context prefix. It follows that a DSA cannot hold contiguous NCs, since
> they are merged into a single NC by the fact that it holds a single context
> prefix for both.
>
> With multi-master, a set of replica DSAs holds the context prefix of a
> partition of the namespace, by all holding a replicated area which includes
> that entry. But the same set of DSAs need not all hold all the replicated
> areas which are part of that partition of the namespace. It is sufficient
> that the intersection of the sets of replicated areas they each hold include
> that particular replicated area which has the context prefix.
>
> For example an organization (Autonomous Administrative Area) might have
> replicated areas corresponding to HQ, regional and local organizational
> units, each with their own DSA at a corresponding office. But a single DSA
> in say Paris might well hold the replicated areas for the multi-national HQ,
> the Paris Region and a particular local office. There is no reason why it
> should also have to hold replicas for every other regional or local
> organizational unit.
>
> A "simple" approach could just eliminate the concept of an NC, as in the
> current LDUP drafts where it is confused with the new concept of a
> replicated area (RA). Reading RA instead of NC, the problem seems to just
> disappear.
>
> But then who defines the namespace partitioning?
>
> The separate concept of an NC is still needed to administer names.
>
> [Ed]
> The discussion at Pittsburgh, though, drove home to me that while
> that simplification might well suite replication, other administrative
> areas (schema, access control policy, application-specific whatever)
> are not inherently limited to working within a naming context, may
> in fact overlap several contiguous naming contexts, and may not
> cover all of one or more of the naming contexts it does overlap.
>
> In other words, other administrative area definitions are likely to be
> arbitrary and completely orthogonal to the ones defined for
> replication.  Or at least its certain that we'll find some that are.
>
> [SC]
> In addition, realistic Directory Access Control Domains add further
> complications.
>
> [Ed]
> Such an evasion
> (for that is surely what it would be ;-) would leave for future work
> the definition and management of specific administration areas (SAA) which
> could then partition the autonomous administrative area, and the
> inner administrative areas which in turn partition the SAAs.
>
> [SC]
> The conceptual framework for this "future work" was done many years ago for
> the X.500 standards.
>
> LDAP should simplify protocols when and where possible, but must not change
> the conceptual framework.
>
> Although the the X.500 standards are pretty unreadable, an excellent
> explanation is in David Chadwick's book, available online at:
>
> http://www.salford.ac.uk/its024/Version.Web/Contents.htm
>
> Section 11 of chapter 2 actually succeeds in making the administrative
> framework intelligible!
>
> Inner Administrative Areas do not "partition" SAAs since they can be nested
> as shown on the right of this diagram:
>
> http://www.salford.ac.uk/its024/Version.Web/Chapter.2/fig2-6.gif
>
> Assuming that actual management can be deferred, definition (by simply
> adopting the work already done) should not be deferred.
>
> Simply specify that ancestor administrative points and their subentries are
> replicated together with each replicated area. Otherwise replicas simply
> would not receive essential context information.
>
> Visualize a "replicated area" as possibly being a smaller triangle within
> that nested IAP. It clearly needs to receive copies of each of the ancestor
> administrative entries and subentries in that diagram.
>
> [Ed]
> However, there's an important definition in [X.501] - autonomous
> administrative domain - which indicates that they are non-overlapping.
> That might give us leeway to simplify matters.  Certainly, for the purposes
> of LDUP, the replication areas are, indeed, non-overlapping.
>
> Further, both inner administrative areas and specific administration areas
> are both bounded by (e.g. contained within) one of the non-overlapping
> autonomous administrative domain.
>
> So, I think what I"m proposing is that the namingContext auxiliary class
> that LDUP Arch defines is the "autonomous administrative point", and
> the subentries we're defining MIGHT be tied to that.  Such an evasion
> (for that is surely what it would be ;-) would leave for future work
> the definition and management of specific administration areas (SAA) which
> could then partition the autonomous administrative area, and the
> inner administrative areas which in turn partition the SAAs.
>
> [Albert]
> A "Directory hosting ISP" could hold the AAA's for numerous organizations on
> a single DSA, just as a "Web hosting ISP" holds numerous domains for web
> service.
>
> Each would be replicated with internal DSAs of the organization concerned
> and with DSAs at other local sites of the ISP to provide global backbone
> directory service for those organizations.
>
> It certainly should not follow that they are all a single replicated area
> because they hosted on a single DSA.
>
> Not only should the various AAA's not be required to receive replicas of
> each other, but some may  only need say 2 replicas at local sites of their
> ISP while others may want replicas at more.



From list@netscape.com  Sun Nov  5 21:43:04 2000
Received: from netscape.com (h-205-217-237-47.netscape.com [205.217.237.47])
	by ietf.org (8.9.1a/8.9.1a) with SMTP id VAA09657
	for <ldapext-archive@odin.ietf.org>; Sun, 5 Nov 2000 21:43:03 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.10.0/8.10.0) with ESMTP id eA62Y7D21089;
	Sun, 5 Nov 2000 18:34:07 -0800 (PST)
Received: (from list@localhost)
	by aka.mcom.com (8.10.0/8.10.0) id eA62fWU19450;
	Sun, 5 Nov 2000 18:41:32 -0800 (PST)
Resent-Date: Sun, 5 Nov 2000 18:41:32 -0800 (PST)
Date: Sun, 5 Nov 2000 18:40:58 -0800 (PST)
Message-Id: <200011060240.eA62evR08268@xwing.netscape.com>
From: capnetn@RKSS.netscape.net
To: ietf-ldapext@RTIF.netscape.com
Subject:  Affiliate Programs & Earn Cash! -VFSI
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: 7bit
Resent-Message-ID: <"kpT5RD.A.VvE.aphB6"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com
Content-Transfer-Encoding: 7bit

Friends,

If you have received this message in error, 
please excuse the intrusion and reply remove.

How To Pay Off Loans Faster, While Saving Thousands In Interest!
*Mortgages
*Equity Loans
*Boat Loans
*RV Loans
*Student Loans
*Unclaimed Funds
*Capital Search
*Gov Contracts
*Business Plans
ANY LOAN!

http://www.affiliate.bigstep.com

*************************************************************************************************
Join Affiliate Programs and earn cash - it's easy!
*CompuBank             *Compaq
*AOL                         *Staples                       
*Priceline                   *TigerDirect
*Ebay                        *PriceCar
*Amazon                   *MapQuest
*IBM                          *PayPal
*Garden                    *Mercata
*Pets                         *Drugstore
*EStamps                  *FreeShop

http://www.affiliate.bigstep.com

************************************************************************************************




From list@netscape.com  Sun Nov  5 23:09:45 2000
Received: from netscape.com (h-205-217-237-47.netscape.com [205.217.237.47])
	by ietf.org (8.9.1a/8.9.1a) with SMTP id XAA04484
	for <ldapext-archive@odin.ietf.org>; Sun, 5 Nov 2000 23:09:44 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.10.0/8.10.0) with ESMTP id eA640RD26153;
	Sun, 5 Nov 2000 20:00:27 -0800 (PST)
Received: (from list@localhost)
	by aka.mcom.com (8.10.0/8.10.0) id eA647qw05133;
	Sun, 5 Nov 2000 20:07:52 -0800 (PST)
Resent-Date: Sun, 5 Nov 2000 20:07:52 -0800 (PST)
Date: Sun, 5 Nov 2000 23:09:54 -0500 (EST)
Message-Id: <200011060409.eA649s215203@mx2.mx.voyager.net>
From: xsnvy@msn.com
To: bkqhy@Friends.netscape.com
Reply-To: sam22me2@n2mail.com
Subject: Affordable Offshore Income!                                    [jrtqm]
Resent-Message-ID: <"-k3PD.A.4PB.X6iB6"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com

Affordable Offshore
 
Partners Wanted, $100 to start
 
Open a secured offshore bank account and
access your funds with a MasterCard.  
No social security number or credit check.
 
Develop a secondary offshore income of 
$500 to $5,000 a day or more - you decide!!

"3 months ago I started for $100
This month I've earned $3,775 and it's 
increasing about $200 every day."  

You can:
Eliminate your debt
Secure your Assets 
Save on Taxes
and create Wealth !

Find out how YOU can build a Fortune
and Start for just $100

The Super Rich have done this for years!
Isn't it time you started?

For more info, type "Send Offshore Info Please" as the subject.

mailto:sam22me@n2mail.com?subject=Send_Offshore_Info_Please

Have a Great Day!            



From list@netscape.com  Mon Nov  6 00:36:18 2000
Received: from netscape.com (h-205-217-237-47.netscape.com [205.217.237.47])
	by ietf.org (8.9.1a/8.9.1a) with SMTP id AAA26191
	for <ldapext-archive@odin.ietf.org>; Mon, 6 Nov 2000 00:36:18 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.10.0/8.10.0) with ESMTP id eA65RED04876;
	Sun, 5 Nov 2000 21:27:14 -0800 (PST)
Received: (from list@localhost)
	by aka.mcom.com (8.10.0/8.10.0) id eA65YeY20096;
	Sun, 5 Nov 2000 21:34:40 -0800 (PST)
Resent-Date: Sun, 5 Nov 2000 21:34:40 -0800 (PST)
Date: Mon, 6 Nov 2000 00:34:29 -0500
Message-Id: <200011060534.eA65YTi150716@pimout3-int.prodigy.net>
To: subscribers2@alloymail.com
From: <ameri@pmail.net>
Subject: How you can earn $100 - $500 per hour doing something FUN
Resent-Message-ID: <"3oFiQD.A.44E.vLkB6"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com



 From: Michelle Smith - publisher of the "Money Making Opportunities" Newsletter
 Sunday, 10 p.m.

 Hello,

  	If you're interested in earning $100 - $500 an hour doing something FUN,
 	Then I want to share something with you...


 Imagine you come home from a hard day's work (exhausted..)

 You immediately go straight to bed.  You get undressed,
 lay down, turn off the lights, and snuggle up face-down on
 the pillow.  A few moments later, you feel uncomfortable and
 stressed out so you lie on your back.

 When you look up at the ceiling, it's as if the ceiling has been removed!

 You see exactly what you would see if outside stargazing!
 A stunning, accurate 3-dimensional re-creation of the starry 
 night sky, including constellations such as the Big Dipper, 
 Pegasus and the Milky Way galaxy,

         ...and even shooting stars!

 You can't see it during the day.  The ceiling looks normal.
 But at night, when the lights are off, you see what looks
 like the sky outside!

 It's so relaxing and romantic.  And educational!

 And talk about stress-relief!  The moment you look at it,
 it'll melt your tension away faster than a great massage!

 Now how many people do you think would LOVE seeing this when
 they look up in their beds at night?

 "It's like you're sleeping under the stars!"

 Ok, I know you want to know How You Make Money.

 Here's how.

 You can put that awesome "convertible ceiling" in ANYONE'S 
 bedroom with a product cost to you of..

 Guess how much..

 Only ONE to TWO Dollars!  

 You offer this masterpiece for $100 - $500!
 Talk about *nice* profits!
 And it only takes you an hour or two!

 Here's an important point:

 These profits are similar to the profits of selling Information:
 the material costs next to nothing, but the customer really VALUES
 the END RESULT.  So the market value is more (a LOT more).

 "Who'd want this?"

 Anyone with a bedroom ceiling (or any ceiling),
 as well as homes, hotels, etc.

 Who do you know that has a bedroom ceiling?

 Whew!  The official money-making opportunity of the Millenium!
 (Well... we think it should be!)  |;-)

 Anyway, I know you want more information to make a decision, so ...

 To receive more FREE information on How To Make $100 - $500 An Hour,
 Simply Click On The Email Link Below and Send Back The Following:

 Mailto:stargazing46@newmail.net

 Name:
 E-Mail:
 Phone:
 Street:
 City:
 State:
 ZIP or Postal Code:
 Country (available INTERNATIONALLY):

 Mailto:stargazing46@newmail.net


 And you'll be sent the full details on
 how to make $100 - $500 an hour, as well as 
 pictures of these murals so you can see 
 for yourself how breathtaking they are!

 Best regards,

 Michelle Smith

 P.S. We'll also send you a free Opportunity E-zine with 
 more interesting Money-Making Opportunities like this one, 
 and important info. for the home-based entrepreneur!

 P.P.S. Also, even though 99% of people don't know about this 
 opportunity, that won't be the case forever, so hurry up and 
 reply to make sure you get to lock down YOUR city!


 To unsubscribe mailto:unsubscribe1101@newmail.net














From list@netscape.com  Mon Nov  6 06:33:42 2000
Received: from netscape.com (h-205-217-237-46.netscape.com [205.217.237.46])
	by ietf.org (8.9.1a/8.9.1a) with SMTP id GAA13384
	for <ldapext-archive@odin.ietf.org>; Mon, 6 Nov 2000 06:33:41 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.10.0/8.10.0) with ESMTP id eA6BK0s02590;
	Mon, 6 Nov 2000 03:20:00 -0800 (PST)
Received: (from list@localhost)
	by aka.mcom.com (8.10.0/8.10.0) id eA6BW5A02332;
	Mon, 6 Nov 2000 03:32:05 -0800 (PST)
Resent-Date: Mon, 6 Nov 2000 03:32:05 -0800 (PST)
Message-Id: <200011061131.GAA12578@ietf.org>
Mime-Version: 1.0
Content-Type: Multipart/Mixed; Boundary="NextPart"
To: IETF-Announce: ;
Cc: ietf-ldapext@netscape.com
From: Internet-Drafts@ietf.org
Reply-to: Internet-Drafts@ietf.org
Subject: I-D ACTION:draft-ietf-ldapext-ldapv3-dupent-06.txt
Date: Mon, 06 Nov 2000 06:31:40 -0500
Sender: nsyracus@cnri.reston.va.us
Resent-Message-ID: <"qbhAh.A.Hk.yapB6"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com

--NextPart

A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the LDAP Extension Working Group of the IETF.

	Title		: LDAP Control for a Duplicate Entry Representation of 
                          Search Results
	Author(s)	: J. Sermersheim
	Filename	: draft-ietf-ldapext-ldapv3-dupent-06.txt
	Pages		: 9
	Date		: 03-Nov-00
	
This document describes a Duplicate Entry Representation control
extension for the LDAP Search operation. By using the control with
an LDAP search, a client requests that the server return separate
entries for each value held in the specified attributes. For
instance, if a specified attribute of an entry holds multiple
values, the search operation will return multiple instances of that
entry, each instance holding a separate single value in that
attribute.

A URL for this Internet-Draft is:
http://www.ietf.org/internet-drafts/draft-ietf-ldapext-ldapv3-dupent-06.txt

Internet-Drafts are also available by anonymous FTP. Login with the username
"anonymous" and a password of your e-mail address. After logging in,
type "cd internet-drafts" and then
	"get draft-ietf-ldapext-ldapv3-dupent-06.txt".

A list of Internet-Drafts directories can be found in
http://www.ietf.org/shadow.html 
or ftp://ftp.ietf.org/ietf/1shadow-sites.txt


Internet-Drafts can also be obtained by e-mail.

Send a message to:
	mailserv@ietf.org.
In the body type:
	"FILE /internet-drafts/draft-ietf-ldapext-ldapv3-dupent-06.txt".
	
NOTE:	The mail server at ietf.org can return the document in
	MIME-encoded form by using the "mpack" utility.  To use this
	feature, insert the command "ENCODING mime" before the "FILE"
	command.  To decode the response(s), you will need "munpack" or
	a MIME-compliant mail reader.  Different MIME-compliant mail readers
	exhibit different behavior, especially when dealing with
	"multipart" MIME messages (i.e. documents which have been split
	up into multiple messages), so check your local documentation on
	how to manipulate these messages.
		
		
Below is the data which will enable a MIME compliant mail reader
implementation to automatically retrieve the ASCII version of the
Internet-Draft.

--NextPart
Content-Type: Multipart/Alternative; Boundary="OtherAccess"

--OtherAccess
Content-Type: Message/External-body;
	access-type="mail-server";
	server="mailserv@ietf.org"

Content-Type: text/plain
Content-ID:	<20001103114307.I-D@ietf.org>

ENCODING mime
FILE /internet-drafts/draft-ietf-ldapext-ldapv3-dupent-06.txt

--OtherAccess
Content-Type: Message/External-body;
	name="draft-ietf-ldapext-ldapv3-dupent-06.txt";
	site="ftp.ietf.org";
	access-type="anon-ftp";
	directory="internet-drafts"

Content-Type: text/plain
Content-ID:	<20001103114307.I-D@ietf.org>

--OtherAccess--

--NextPart--




From list@netscape.com  Mon Nov  6 15:12:08 2000
Received: from netscape.com (h-205-217-237-46.netscape.com [205.217.237.46])
	by ietf.org (8.9.1a/8.9.1a) with SMTP id PAA12018
	for <ldapext-archive@odin.ietf.org>; Mon, 6 Nov 2000 15:12:04 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.10.0/8.10.0) with ESMTP id eA6JuEs06235;
	Mon, 6 Nov 2000 11:56:15 -0800 (PST)
Received: (from list@localhost)
	by aka.mcom.com (8.10.0/8.10.0) id eA6K8Jc18841;
	Mon, 6 Nov 2000 12:08:19 -0800 (PST)
Resent-Date: Mon, 6 Nov 2000 12:08:19 -0800 (PST)
Message-ID: <3A070F62.F8095E9D@worldspot.com>
Date: Mon, 06 Nov 2000 12:06:58 -0800
From: Rob Weltman <robw@worldspot.com>
X-Mailer: Mozilla 4.75 [en] (Windows NT 5.0; U)
X-Accept-Language: en
MIME-Version: 1.0
To: ietf-ldapext@netscape.com
Subject: Submission: draft-ietf-ldapext-ldap-java-api-12.txt
Content-Type: multipart/mixed;
 boundary="------------CE9352E9C0F134D2DC3032DD"
Resent-Message-ID: <"X-wvjB.A.2lE.w-wB6"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com

This is a multi-part message in MIME format.
--------------CE9352E9C0F134D2DC3032DD
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit

  The attached update of the Java LDAP API draft was submitted for publication last night.

Rob
--------------CE9352E9C0F134D2DC3032DD
Content-Type: text/plain; charset=us-ascii;
 name="javaldap.txt"
Content-Disposition: inline;
 filename="javaldap.txt"
X-MIME-Autoconverted: from 8bit to quoted-printable by netscape.com id eA6JuEs06235
Content-Transfer-Encoding: quoted-printable



Network Working Group                                        Rob Weltman=20
INTERNET-DRAFT                                       Christine Tomlinson=20
Intended Category: Standards Track                Sun Microsystems, Inc.=20
                                                           Miodrag Kekic=20
                                           Netscape Communications Corp.=20
                                                          Steven Sonntag=20
                                                            Novell, Inc.=20
                                                         Jim Sermersheim=20
                                                            Novell, Inc.=20
                                                              Mark Smith=20
                                           Netscape Communications Corp.=20
                                                               Tim Howes=20
                                                         Loudcloud, Inc.=20
                                                          November, 2000=20
=20
=20
               The Java LDAP Application Program Interface=20
                  draft-ietf-ldapext-ldap-java-api-12.txt=20
=20
=20
Status of this Memo=20
=20
   This document is an Internet-Draft and is in full conformance with=20
   all provisions of Section 10 of RFC2026.=20
   =20
   Internet-Drafts are working documents of the Internet Task Force=20
   (IETF), its areas, and its working groups.  Note that other groups=20
   may also distribute working documents as Internet-Drafts.=20
   =20
   Internet-Drafts are draft documents valid for a maximum of six months=20
   and may be updated, replaced, or obsoleted by other documents at any=20
   time.  It is inappropriate to use Internet Drafts as reference=20
   material or to cite them other than as "work in progress."=20
   =20
   The list of current Internet-Drafts can be accessed at=20
   http://www.ietf.org/ietf/1id-abstracts.txt=20
   =20
   The list of Internet-Draft Shadow Directories can be accessed at=20
   http://www.ietf.org/shadow.html.=20
   =20
   =20
   =20
Abstract=20
   =20
   This document defines a Java language application program interface=20
   to the lightweight directory access protocol (LDAP), in the form of a=20
   class library. It complements but does not replace RFC 1823 [7],=20
   which describes a C language application program interface. It=20
   updates the previous draft in correcting a few minor errors which are=20
   listed in appendix B. It also includes the asynchronous layer of the=20
   API which was previously defined in draft-ietf-ldapext-ldap-java-api-
   asynch.=20
   =20
 =20
Expires May, 2001                                             [Page 1]=20
=0C
JAVA LDAP API                                            November 2000=20
=20
=20
1. Overview of the LDAP model..........................................9=20
2. Overview of the LDAP classes.......................................10=20
2.1 The LDAP asynchronous methods.....................................10=20
2.2 Interfaces........................................................11=20
2.3 Classes...........................................................12=20
2.4 Exceptions........................................................15=20
3. Overview of LDAP API use...........................................15=20
4. The Java LDAP classes..............................................16=20
4.1 public class LDAPAttribute........................................16=20
4.1.1 Constructors....................................................16=20
4.1.2 addValue........................................................17=20
4.1.3 getByteValues...................................................18=20
4.1.4 getStringValues.................................................18=20
4.1.5 getByteValueArray...............................................18=20
4.1.6 getStringValueArray.............................................18=20
4.1.7 getLangSubtype..................................................18=20
4.1.8 getBaseName.....................................................18=20
4.1.9 getName.........................................................19=20
4.1.10 getSubtypes....................................................19=20
4.1.11 hasSubtype.....................................................19=20
4.1.12 hasSubtypes....................................................19=20
4.1.13 removeValue....................................................20=20
4.1.14 size...........................................................20=20
4.2 public class LDAPAttributeSchema..................................20=20
4.2.1 Constructors....................................................20=20
4.2.2 getSyntaxString.................................................22=20
4.2.3 isSingleValued..................................................22=20
4.2.4 getSuperior.....................................................22=20
4.2.5 getEqualityMatchingRule.........................................22=20
4.2.6 getOrderingMatchingRule.........................................22=20
4.2.7 getSubstringMatchingRule........................................22=20
4.2.8 isCollective....................................................23=20
4.2.9 isModifiable....................................................23=20
4.2.10 getUsage.......................................................23=20
4.2.11 Constants of LDAPAttributeSchema...............................23=20
4.3 public class LDAPAttributeSet.....................................23=20
4.3.1 Constructors....................................................24=20
4.3.2 add.............................................................24=20
4.3.3 clone...........................................................24=20
4.3.4 elementAt.......................................................24=20
4.3.5 getAttribute....................................................24=20
4.3.6 getAttributes...................................................26=20
4.3.7 getSubset.......................................................26=20
4.3.8 remove..........................................................26=20
4.3.9 removeElementAt.................................................27=20
4.3.10 size...........................................................27=20
4.4 public interface LDAPBind.........................................27=20
4.4.1 bind............................................................27=20
4.5 public class LDAPCompareAttrNames.................................28=20
4.5.1 Constructors....................................................28=20
4.5.2 getLocale.......................................................29=20
4.5.3 setLocale.......................................................29=20
 =20
Expires May, 2001                                             [Page 2]=20
=0C
JAVA LDAP API                                            November 2000=20
=20
=20
4.5.4 isGreater.......................................................29=20
4.6 public class LDAPConnection.......................................30=20
4.6.1 Constructors....................................................30=20
4.6.2 abandon.........................................................30=20
4.6.3 add.............................................................31=20
4.6.4 bind............................................................32=20
4.6.5 clone...........................................................35=20
4.6.6 compare.........................................................35=20
4.6.7 connect.........................................................36=20
4.6.8 delete..........................................................37=20
4.6.9 disconnect......................................................37=20
4.6.10 extendedOperation..............................................37=20
4.6.11 finalize.......................................................38=20
4.6.12 getAuthenticationDN............................................38=20
4.6.13 getAuthenticationMethod........................................39=20
4.6.14 getAuthenticationPassword......................................39=20
4.6.15 getConstraints.................................................39=20
4.6.16 getHost........................................................39=20
4.6.17 getInputStream.................................................39=20
4.6.18 getOutputStream................................................39=20
4.6.19 getPort........................................................40=20
4.6.20 getProperty....................................................40=20
4.6.21 getProtocolVersion.............................................41=20
4.6.22 getResponseControls............................................41=20
4.6.23 getSaslBindCallbackHandler.....................................41=20
4.6.24 getSaslBindProperties..........................................41=20
4.6.25 getSearchConstraints...........................................41=20
4.6.26 getSocketFactory...............................................42=20
4.6.27 getUnsolicitedNotifications....................................42=20
4.6.28 isBound........................................................42=20
4.6.29 isConnected....................................................42=20
4.6.30 isTLS..........................................................42=20
4.6.31 modify.........................................................42=20
4.6.32 read...........................................................44=20
4.6.33 rename.........................................................45=20
4.6.34 search.........................................................47=20
4.6.35 setConstraints.................................................49=20
4.6.36 setInputStream.................................................49=20
4.6.37 setOutputStream................................................49=20
4.6.38 setProperty....................................................49=20
4.6.39 setSearchConstraints...........................................50=20
4.6.40 setSocketFactory...............................................50=20
4.6.41 setUnsolicitedNotifications....................................50=20
4.6.42 startTLS.......................................................51=20
4.6.43 Constants of LDAPConnection....................................51=20
4.7 public class public class LDAPConstraints.........................51=20
4.7.1 Constructors....................................................52=20
4.7.2 getHopLimit.....................................................52=20
4.7.3 getReferralHandler..............................................53=20
4.7.4 getReferralFollowing............................................53=20
4.7.5 getTimeLimit....................................................53=20
4.7.6 setHopLimit.....................................................53=20
 =20
Expires May, 2001                                             [Page 3]=20
=0C
JAVA LDAP API                                            November 2000=20
=20
=20
4.7.7 setReferralHandler..............................................53=20
4.7.8 setReferralFollowing............................................54=20
4.7.9 setTimeLimit....................................................54=20
4.7.10 getClientControls..............................................54=20
4.7.11 getServerControls..............................................54=20
4.7.12 setClientControls..............................................54=20
4.7.13 setServerControls..............................................55=20
4.8 public class LDAPControl..........................................55=20
4.8.1 Constructors....................................................55=20
4.8.2 clone...........................................................56=20
4.8.3 getID...........................................................56=20
4.8.4 getValue........................................................56=20
4.8.5 isCritical......................................................56=20
4.8.6 newInstance.....................................................56=20
4.8.7 register........................................................56=20
4.8.8 setValue........................................................57=20
4.9 public class LDAPDITContentRuleSchema.............................57=20
4.9.1 Constructors....................................................57=20
4.9.2 getAuxiliaryClasses.............................................58=20
4.9.3 getRequiredAttributes...........................................58=20
4.9.4 getOptionalAttributes...........................................58=20
4.9.5 getPrecludedAttributes..........................................59=20
4.10 public class LDAPDITStructureRuleSchema..........................59=20
4.10.1 Constructors...................................................59=20
4.10.2 getRuleID......................................................60=20
4.10.3 getNameForm....................................................60=20
4.10.4 getSuperiors...................................................60=20
4.11 public class LDAPDN..............................................60=20
4.11.1 equals.........................................................60=20
4.11.2 escapeRDN......................................................61=20
4.11.3 unescapeRDN....................................................61=20
4.11.4 explodeDN......................................................61=20
4.11.5 explodeRDN.....................................................62=20
4.12 public class LDAPEntry...........................................62=20
4.12.1 Constructors...................................................62=20
4.12.2 getAttribute...................................................63=20
4.12.3 getAttributeSet................................................63=20
4.12.4 getDN..........................................................63=20
4.13 public interface LDAPEntryComparator.............................64=20
4.13.1 isGreater......................................................64=20
4.14 public class LDAPException.......................................64=20
4.14.1 Constructors...................................................64=20
4.14.2 errorCodeToString..............................................65=20
4.14.3 getLDAPErrorMessage............................................66=20
4.14.4 getLDAPResultCode..............................................66=20
4.14.5 getMatchedDN...................................................66=20
4.14.6 Result codes...................................................66=20
4.15 public class LDAPExtendedOperation...............................68=20
4.15.1 Constructors...................................................68=20
4.15.2 getID..........................................................68=20
4.15.3 getValue.......................................................68=20
4.15.4 setValue.......................................................68=20
 =20
Expires May, 2001                                             [Page 4]=20
=0C
JAVA LDAP API                                            November 2000=20
=20
=20
4.16 public class LDAPExtendedResponse................................69=20
4.16.1 getID..........................................................69=20
4.16.2 getValue.......................................................69=20
4.17 public interface LDAPListener....................................69=20
4.17.1 getMessageIDs..................................................69=20
4.17.2 getResponse....................................................69=20
4.17.3 isResponseReceived.............................................70=20
4.17.4 merge..........................................................70=20
4.18 public class LDAPMatchingRuleSchema..............................70=20
4.18.1 Constructors...................................................70=20
4.18.2 getAttributes..................................................71=20
4.18.3 getSyntaxString................................................72=20
4.19 public class LDAPMatchingRuleUseSchema...........................72=20
4.19.1 Constructors...................................................72=20
4.19.2 getAttributes..................................................73=20
4.20 public class LDAPMessage.........................................73=20
4.20.1 getControls....................................................73=20
4.20.2 getMessageID...................................................73=20
4.20.3 getType........................................................73=20
4.21 public class LDAPModification....................................74=20
4.21.1 Constructors...................................................74=20
4.21.2 getAttribute...................................................74=20
4.21.3 getOp..........................................................74=20
4.21.4 Constants of LDAPModification..................................75=20
4.22 public class LDAPModificationSet.................................75=20
4.22.1 Constructors...................................................75=20
4.22.2 add............................................................75=20
4.22.3 elementAt......................................................75=20
4.22.4 remove.........................................................76=20
4.22.5 removeElementAt................................................76=20
4.22.6 size...........................................................76=20
4.23 public class LDAPNameFormSchema..................................76=20
4.23.1 Constructors...................................................76=20
4.23.2 getObjectClass.................................................77=20
4.23.3 getRequiredNamingAttributes....................................78=20
4.23.4 getOptionalNamingAttributes....................................78=20
4.24 public class LDAPObjectClassSchema...............................78=20
4.24.1 Constructors...................................................78=20
4.24.2 getSuperiors...................................................79=20
4.24.3 getRequiredAttributes..........................................79=20
4.24.4 getOptionalAttributes..........................................79=20
4.24.5 getType........................................................79=20
4.25 public class LDAPRebindAuth......................................80=20
4.25.1 Constructors...................................................80=20
4.25.2 getDN..........................................................80=20
4.25.3 getPassword....................................................80=20
4.26 public interface LDAPRebind......................................80=20
4.26.1 getRebindAuthentication........................................80=20
4.27 public class LDAPReferralException...............................81=20
4.27.1 Constructors...................................................81=20
4.27.2 getReferralFailureException....................................82=20
4.27.3 getReferrals...................................................82=20
 =20
Expires May, 2001                                             [Page 5]=20
=0C
JAVA LDAP API                                            November 2000=20
=20
=20
4.28 public interface LDAPReferralHandler.............................82=20
4.29 public class LDAPResponse........................................82=20
4.29.1 getErrorMessage................................................82=20
4.29.2 getMatchedDN...................................................82=20
4.29.3 getReferrals...................................................83=20
4.29.4 getResultCode..................................................83=20
4.30 public class LDAPResponseListener................................83=20
4.30.1 getMessageIDs..................................................83=20
4.30.2 getResponse....................................................83=20
4.30.3 isResponseReceived.............................................84=20
4.30.4 merge..........................................................84=20
4.31 public class LDAPSchema..........................................84=20
4.31.1 Constructors...................................................84=20
4.31.2 fetchSchema....................................................84=20
4.31.3 getAttribute...................................................85=20
4.31.4 getObjectClass.................................................85=20
4.31.5 getMatchingRule................................................85=20
4.31.6 getMatchingRuleUse.............................................86=20
4.31.7 getDITStructureRule............................................86=20
4.31.8 getDITContentRule..............................................86=20
4.31.9 getNameForm....................................................86=20
4.31.10 getSyntax.....................................................87=20
4.31.11 getAttributes.................................................87=20
4.31.12 getObjectClasses..............................................87=20
4.31.13 getMatchingRules..............................................87=20
4.31.14 getMatchingRuleUses...........................................87=20
4.31.15 getDITStructureRules..........................................87=20
4.31.16 getDITContentRules............................................88=20
4.31.17 getNameForms..................................................88=20
4.31.18 getSyntaxes...................................................88=20
4.31.19 getAttributeNames.............................................88=20
4.31.20 getObjectClassNames...........................................88=20
4.31.21 getMatchingRuleNames..........................................88=20
4.31.22 getMatchingRuleUseNames.......................................88=20
4.31.23 getDITStructureRuleNames......................................88=20
4.31.24 getDITContentRuleNames........................................89=20
4.31.25 getNameFormNames..............................................89=20
4.32 public abstract class LDAPSchemaElement..........................89=20
4.32.1 getAliases.....................................................89=20
4.32.2 getDescription.................................................89=20
4.32.3 getName........................................................89=20
4.32.4 getID..........................................................90=20
4.32.5 getQualifier...................................................90=20
4.32.6 getQualifierNames..............................................90=20
4.32.7 isObsolete.....................................................90=20
4.32.8 getValue.......................................................90=20
4.32.9 setQualifier...................................................90=20
4.32.10 add...........................................................91=20
4.32.11 remove........................................................91=20
4.32.12 modify........................................................91=20
4.33 public class LDAPSearchConstraints...............................92=20
4.33.1 Constructors...................................................92=20
 =20
Expires May, 2001                                             [Page 6]=20
=0C
JAVA LDAP API                                            November 2000=20
=20
=20
4.33.2 getBatchSize...................................................93=20
4.33.3 getDereference.................................................93=20
4.33.4 getMaxResults..................................................94=20
4.33.5 getServerTimeLimit.............................................94=20
4.33.6 setBatchSize...................................................94=20
4.33.7 setDereference.................................................94=20
4.33.8 setMaxResults..................................................94=20
4.33.9 setServerTimeLimit.............................................95=20
4.33.10 Constants of LDAPSearchConstraints............................95=20
4.34 public class LDAPSearchListener..................................95=20
4.34.1 getMessageIDs..................................................95=20
4.34.2 getResponse....................................................96=20
4.34.3 isResponseReceived.............................................96=20
4.34.4 isComplete.....................................................96=20
4.34.5 merge..........................................................97=20
4.35 public class LDAPSearchResult....................................97=20
4.35.1 getEntry.......................................................97=20
4.36 public class LDAPSearchResultReference...........................97=20
4.36.1 getReferrals...................................................97=20
4.37 public class LDAPSearchResults...................................97=20
4.37.1 getCount.......................................................98=20
4.37.2 getResponseControls............................................98=20
4.37.3 hasMoreElements................................................98=20
4.37.4 next...........................................................98=20
4.37.5 nextElement....................................................98=20
4.37.6 sort...........................................................98=20
4.38 public interface LDAPSocketFactory...............................99=20
4.38.1 makeSocket.....................................................99=20
4.39 public class LDAPSyntaxSchema...................................100=20
4.39.1 Constructors..................................................100=20
4.40 public class LDAPUrl............................................100=20
4.40.1 Constructors..................................................100=20
4.40.2 decode........................................................102=20
4.40.3 encode........................................................102=20
4.40.4 getAttributeArray.............................................102=20
4.40.5 getAttributes.................................................102=20
4.40.6 getDN.........................................................102=20
4.40.7 getExtensions.................................................102=20
4.40.8 getFilter.....................................................103=20
4.40.9 getHost.......................................................103=20
4.40.10 getPort......................................................103=20
4.40.11 getScope.....................................................103=20
4.40.12 getUrl.......................................................103=20
4.40.13 isSecure.....................................................103=20
4.41 Client and Server Controls......................................104=20
5. Security Considerations...........................................104=20
6. Acknowledgements..................................................104=20
7. Bibliography......................................................105=20
8. Authors' Addresses................................................105=20
9. Appendix A - Sample java LDAP programs............................107=20
9.1 Java LDAP programs using synchronous methods.....................107=20
9.2 Java LDAP programs using asynchronous methods....................112=20
 =20
Expires May, 2001                                             [Page 7]=20
=0C
JAVA LDAP API                                            November 2000=20
=20
=20
10. Appendix B - Changes from ldap-java-api-11.txt...................117=20
11. Appendix C - Changes from ldap-java-api-10.txt...................119=20
12. Appendix D - Changes from ldap-java-api-09.txt...................120=20
13. Appendix E - Changes from ldap-java-api-08.txt...................121=20
14. Appendix F - Changes from ldap-java-api-07.txt...................121=20
15. Appendix G - Changes from ldap-java-api-06.txt...................121=20
16. Appendix H - Changes from ldap-java-api-05.txt...................122=20
17. Appendix I - Changes from ldap-java-api-04.txt...................123=20
18. Appendix J - Changes from ldap-java-api-03.txt...................123=20
19. Appendix K - Changes from ldap-java-api-02.txt...................124=20
20. Appendix L - Changes from ldap-java-api-01.txt...................125=20









































 =20
Expires May, 2001                                             [Page 8]=20
=0C
JAVA LDAP API                                            November 2000=20
=20
=20
   Introduction=20
   =20
   The LDAP class library is designed to provide powerful, yet simple,=20
   access to LDAP directory services. It defines both asynchronous and=20
   synchronous interfaces to LDAP to suit a wide variety of=20
   applications. This document gives a brief overview of the LDAP model,=20
   then an overview of the constituents of the class library.=20
   The public class methods are described in detail, followed by an=20
   appendix that provides some example code demonstrating the use of the=20
   classes, and an appendix listing changes from earlier drafts.=20
   =20
   =20
1. Overview of the LDAP model=20
=20
   LDAP is the lightweight directory access protocol, described in [2]=20
   and [5]. It defines a lightweight access mechanism in which clients=20
   send requests to and receive responses from LDAP servers.=20
   =20
   The LDAP information model comes from X.500 [1] and is based on the=20
   entry, which contains information about some object (e.g., a person).=20
   Entries are composed of attributes, which have a type and one or more=20
   values. Each attribute has a syntax that determines what kinds of=20
   values are allowed in the attribute (e.g., ASCII characters, a jpeg=20
   photograph, etc.) and how those values behave during directory=20
   operations (e.g., is case significant during comparisons).=20
   =20
   Entries may be organized in a tree structure, usually based on=20
   political, geographical, and organizational boundaries. Other=20
   structures are possible, including a flat namespace. Each entry is=20
   uniquely named relative to its sibling entries by its relative=20
   distinguished name (RDN) consisting of one or more distinguished=20
   attribute values from the entry. At most one value from each=20
   attribute may be used in the RDN. For example, the entry for the=20
   person Babs Jensen might be named with the "Barbara Jensen" value=20
   from the commonName attribute.=20
   =20
   A globally unique name for an entry, called a distinguished name or=20
   DN, is constructed by concatenating the sequence of RDNs from the=20
   entry up to the root of the tree. For example, if Babs worked for the=20
   University of Michigan, the DN of her U-M entry might be "cn=3DBarbara=
=20
   Jensen, o=3DUniversity of Michigan, c=3DUS". The DN format used by LDA=
P=20
   is defined in [4].=20
   =20
   Operations are provided to authenticate, search for and retrieve=20
   information, modify information, and add and delete entries from the=20
   tree.=20
   =20
   An LDAP server may return referrals if it cannot completely service a=20
   request (for example if the request specifies a directory base=20
   outside of the tree managed by the server). The LDAP class library=20
   offers the programmer three options: the programmer can catch these=20
   referrals as exceptions and explicitly issue new requests to the=20
 =20
Expires May, 2001                                             [Page 9]=20
=0C
JAVA LDAP API                                            November 2000=20
=20
=20
   referred-to servers, the programmer can provide an object to=20
   establish a new connection to a referred-to server, or the programmer=20
   can let the library automatically follow the referrals.  In the=20
   latter case, the programmer may also provide a reauthentication=20
   object, allowing automatic referrals to proceed with appropriate=20
   credentials. If no such object is provided, referrals are followed=20
   with anonymous credentials, and the protocol level of the original=20
   connection is used. If the original connection used a socket factory=20
   or TLS, the referral connection will use the same.=20
   =20
   Before the client encodes and sends a string value to a server, the=20
   string values are converted from the Java 16-bit Unicode format to=20
   UTF-8 format, which is the standard string encoding for LDAPv3=20
   servers. The integrity of double-byte and other non-ASCII character=20
   sets is fully preserved.=20
   =20
   The next sections give an overview of how the class library is used=20
   and detailed descriptions of the LDAP class methods that implement=20
   all of these functions.=20
   =20
   =20
2.  Overview of the LDAP classes=20
   =20
   The central LDAP class is LDAPConnection. It provides methods to=20
   establish an authenticated or anonymous connection to an LDAP server,=20
   as well as methods to search for, modify, compare, and delete entries=20
   in the directory.=20
   =20
   The LDAPConnection class also provides fields for storing settings=20
   that are specific to the LDAP session (such as limits on the number=20
   of results returned or timeout limits). An LDAPConnection object can=20
   be cloned, allowing objects to share a single network connection but=20
   use different settings (using LDAPConstraints or=20
   LDAPSearchConstraints).=20
   =20
   A synchronous search conducted by an LDAPConnection object returns=20
   results in an LDAPSearchResults object, which can be enumerated to=20
   access the entries found. Each entry (represented by an LDAPEntry=20
   object) provides access to the attributes (represented by=20
   LDAPAttribute objects) returned for that entry. Each attribute can=20
   produce the values found as byte arrays or as Strings.=20
   =20
=20
2.1 The LDAP asynchronous methods=20
   =20
   The LDAP protocol provides synchronous as well as asynchronous=20
   directory access methods. All asynchronous methods return listener=20
   objects (either LDAPResponseListener or LDAPSearchListener) and also=20
   take a listener object as input. The listener is a message queue=20
   associated with the request, and it is the responsibility of the=20
   client to read messages out of the queue and process them.=20
   =20
 =20
Expires May, 2001                                            [Page 10]=20
=0C
JAVA LDAP API                                            November 2000=20
=20
=20
   Messages retrieved from an LDAPResponseListener are result objects=20
   derived from LDAPResponse. Messages retrieved from an=20
   LDAPSearchListener are either result objects derived from=20
   LDAPResponse, search results, or search result references.=20
   =20
   An asynchronous search conducted by an LDAPConnection object returns=20
   results via the getResponse method of the LDAPSearchListener returned=20
   by the search operation. The getResponse method typically returns an=20
   LDAPSearchResult object which has a getEntry method that returns the=20
   LDAPEntry that represents the search entry.=20
   =20
   None of the ancillary asynchronous classes are intended to be=20
   instantiated by a client, so they lack public constructors.=20
   =20
   =20
2.2 Interfaces=20
   =20
   =20
   LDAPEntryComparator        An interface to support arbitrary sorting=20
                              algorithms for entries returned by a=20
                              search operation. The basic Java LDAP=20
                              classes include one implementation:=20
                              LDAPCompareAttrNames, to sort in=20
                              ascending order based on one or more=20
                              attribute names.=20
   =20
   =20
   LDAPListener               Common interface for LDAPResponseListener=20
                              and LDAPSearchListener. Represents a=20
                              queue of incoming asynchronous messages=20
                              from the server.=20
   =20
   =20
   LDAPRebind                 A programmer desiring to supply=20
                              credentials to the default=20
                              reauthentication behavior when=20
                              automatically following referrals must=20
                              implement this interface. If LDAPRebind=20
                              or LDAPBind are not used, automatically=20
                              followed referrals will use anonymous=20
                              authentication. Referrals of any type=20
                              other than to an LDAP server (i.e. a=20
                              referral URL other than ldap://something)=20
                              are ignored on automatic referral=20
                              following.=20
   =20
   =20
   LDAPBind                   This interface allows a programmer to=20
                              override the default authentication and=20
                              reauthentication behavior when=20
                              automatically following referrals. It is=20
                              typically used to control the=20
 =20
Expires May, 2001                                            [Page 11]=20
=0C
JAVA LDAP API                                            November 2000=20
=20
=20
                              authentication mechanism used on=20
                              automatic referral following.=20
   =20
   =20
   LDAPReferralHandler        Interface that is a shared ancestor to=20
                              LDAPBind and LDAPRebind. =20
   =20
   LDAPSocketFactory          Programmers needing to provide or use=20
                              specialized socket connections, including=20
                              Transport Layer Security (TLS) based=20
                              ones, can provide an object constructor=20
                              to implement them using this interface.=20
   =20
   =20
2.3 Classes=20
   =20
   =20
   LDAPAttribute              Represents the name and values of one=20
                              attribute of a directory entry.=20
   =20
   =20
   LDAPAttributeSchema        Represents the schematic definition of a=20
                              particular attribute in a particular=20
                              Directory Server.=20
   =20
   =20
   LDAPAttributeSet           A collection of LDAPAttributes.=20
   =20
   =20
   LDAPCompareAttrNames       An implementation of LDAPEntryComparator,=20
                              to support sorting of search results by=20
                              one or more attributes.=20
   =20
   =20
   LDAPConnection             The central point for interactions with=20
                              an LDAP directory.=20
   =20
   =20
   LDAPConstraints            Defines options controlling all=20
                              operations.=20
   =20
   =20
   LDAPControl                Sets additional parameters for an LDAP=20
                              operation, either on the server or on the=20
                              client.=20
   =20
   =20
   LDAPDITContentRuleSchema   Represents a specific DIT content rule in=20
                              the directory schema.=20
   =20
   =20

 =20
Expires May, 2001                                            [Page 12]=20
=0C
JAVA LDAP API                                            November 2000=20
=20
=20
   LDAPDITStructureRuleSchema Represents a specific DIT structure rule=20
                              in the directory schema.=20
   =20
   =20
   LDAPDN                     A utility class to facilitate composition=20
                              and decomposition of distinguished names=20
                              (DNs).=20
   =20
   =20
   LDAPEntry                  Represents a single entry in a directory.=20
   =20
   =20
   LDAPExtendedOperation      Encapsulates the ID and data associated=20
                              with the sending or receiving of an=20
                              extended operation.=20
   =20
   =20
   LDAPExtendedResponse       The response returned by an LDAP server=20
                              on an asynchronous extended operation=20
                              request. It extends LDAPResponse.=20
   =20
   LDAPMatchingRuleSchema     Represents the schematic definition of a=20
                              particular matching rule in a particular=20
                              Directory Server.=20
   =20
   =20
   LDAPMatchingRuleUseSchema  Represents a specific matching rule use=20
                              in the directory schema.=20
   =20
   =20
   LDAPMessage                Base class for LDAP request and response=20
                              messages. Subclassed by response messages=20
                              used in asynchronous operations.=20
   =20
   LDAPModification           A single add/delete/replace operation to=20
                              an LDAPAttribute.=20
   =20
   =20
   LDAPModificationSet        A collection of LDAPModifications.=20
   =20
   =20
   LDAPNameFormSchema         Represents a specific name form in the=20
                              directory schema.=20
   =20
   =20
   LDAPObjectClassSchema      Represents the schematic definition of a=20
                              particular object class in a particular=20
                              Directory Server.=20
   =20
   =20
   LDAPRebindAuth             An implementation of LDAPRebind must be=20
                              able to provide an LDAPRebindAuth at the=20
 =20
Expires May, 2001                                            [Page 13]=20
=0C
JAVA LDAP API                                            November 2000=20
=20
=20
                              time of a referral. The class=20
                              encapsulates reauthentication=20
                              credentials.=20
   =20
   =20
   LDAPResponse               Represents a message received from an=20
                              LDAP server in response to an=20
                              asynchronous request. It extends=20
                              LDAPMessage.=20
   =20
   =20
   LDAPResponseListener       Low-level mechanism for processing=20
                              asynchronous messages received from a=20
                              server.=20
   =20
   =20
   LDAPSchema                 Represents the schema of a particular=20
                              Directory Server.=20
   =20
   =20
   LDAPSchemaElement          Base class for representing LDAP schema=20
                              elements.=20
   =20
   =20
   LDAPSyntaxSchema           Represents a specific syntax definition=20
                              in the directory schema.=20
   =20
   =20
   LDAPSearchConstraints      Defines the options controlling search=20
                              operations.=20
   =20
   =20
   LDAPSearchListener         Low-level mechanism for queuing=20
                              asynchronous search results received from=20
                              a server.=20
   =20
   =20
   LDAPSearchResult           A single search result that is in=20
                              response to an asynchronous search=20
                              operation. It extends LDAPMessage.=20
   =20
   =20
   LDAPSearchResultReference  A continuation reference from an=20
                              asynchronous search operation. It extends=20
                              LDAPMessage.=20
   =20
   =20
   LDAPSearchResults          The enumerable results of a search=20
                              operation.=20
   =20
   =20

 =20
Expires May, 2001                                            [Page 14]=20
=0C
JAVA LDAP API                                            November 2000=20
=20
=20
   LDAPUrl                    Encapsulates parameters of an LDAP Url=20
                              query, as defined in [6].=20
   =20
   =20
2.4 Exceptions=20
   =20
   =20
   LDAPException         General exception, which includes an error=20
                         message and an LDAP error code.=20
   =20
   =20
   LDAPReferralException Derived from LDAPException and contains a list=20
                         of URLs corresponding to referrals received on=20
                         an LDAP operation.=20
   =20
   =20
3. Overview of LDAP API use=20
   =20
   An application generally uses the LDAP API in four steps.=20
   =20
   -    Construct an LDAPConnection.  Initialize an LDAP session with a=20
        directory server. The LDAPConnection.connect() call establishes=20
        a handle to the session, allowing multiple sessions to be open=20
        at once, on different instances of LDAPConnection.=20
   =20
   -    Authenticate to the LDAP server with LDAPConnection.bind().=20
   =20
   -    Perform some LDAP operations and obtain some results.=20
        The synchronous version of LDAPConnection.search() returns an=20
        LDAPSearchResults which can be enumerated to access all entries=20
        found. The asynchronous version of LDAPConnection.search()=20
        returns an LDAPSearchListener, which is used to read the=20
        results of the search. LDAPConnection.read() returns a single=20
        entry.=20
   =20
   -    Close the connection. The LDAPConnection.disconnect() call=20
        closes the connection.=20
   =20
   There are both synchronous and asynchronous versions of the LDAP=20
   protocol operations described in this draft. Synchronous methods do=20
   not return until the operation has completed.=20
   =20
   Asynchronous methods take a listener parameter (either=20
   LDAPResponseListener or LDAPSearchListener) and return a listener=20
   object which is used to enumerate the responses from the server.  A=20
   loop is typically used to read from the listener object, which blocks=20
   until there is a response available, until the operation has=20
   completed.=20
   =20
   An LDAPResponseListener may be shared between operations, for=20
   multiplexing the results. In this case, the object returned on one=20

 =20
Expires May, 2001                                            [Page 15]=20
=0C
JAVA LDAP API                                            November 2000=20
=20
=20
   operation is passed in to one or more other operations, rather than=20
   passing in null.=20
=20
   For the asynchronous methods, exceptions are raised only for=20
   connection errors. LDAP result messages are converted into=20
   LDAPResponse objects which are to be checked by the client for errors=20
   and referrals, whereas the synchronous methods throw an LDAPException=20
   on result codes other than 0.=20
   =20
   To facilitate user feedback during synchronous searches, intermediate=20
   search results can be obtained before the entire search operation is=20
   completed by specifying the number of entries to return at a time. =20
   Standard Java Enumerations are used to parse synchronous search=20
   results. =20
   =20
   Errors result in the throwing of an LDAPException, with a specific=20
   error code and context-specific textual information available.=20
   =20
   If null is passed as the value of an LDAPConstraints or=20
   LDAPSearchConstraints parameter to an operation, the default=20
   constraints are used for that operation.=20
   =20
   If null is passed as the value of a DN to an operation it is treated=20
   as if it was the empty string.=20
   =20
   The API doesn't distinguish between LDAP search continuation=20
   references and LDAP referrals, presenting a unified interface to the=20
   client for handling the two.=20
   =20
   Implementations of the API MUST ensure that the LDAPConnection class=20
   is thread-safe. Other classes and methods MAY be thread-safe and the=20
   implementor MUST indicate which classes and methods are thread-safe.=20
   =20
   The following sections describe the LDAP classes in more detail.=20
   =20
   =20
4. The Java LDAP classes=20
   =20
   =20
4.1 public class LDAPAttribute=20
   =20
   The LDAPAttribute class represents the name and values of an=20
   attribute. It is used to specify an attribute to be added to, deleted=20
   from, or modified in a Directory entry. It is also returned on a=20
   search of a Directory.=20
   =20
   =20
4.1.1 Constructors=20
   =20
   public LDAPAttribute(LDAPAttribute attr)=20
   =20
   =20
 =20
Expires May, 2001                                            [Page 16]=20
=0C
JAVA LDAP API                                            November 2000=20
=20
=20
   Constructs an attribute with copies of all values of the input=20
   attribute.=20
   =20
   =20
   public LDAPAttribute(String attrName)=20
   =20
   =20
   Constructs an attribute with no values.=20
   =20
   =20
   public LDAPAttribute(String attrName,=20
                           byte[] attrBytes)=20
   =20
   Constructs an attribute with a byte-formatted value.=20
   =20
   =20
   public LDAPAttribute(String attrName,=20
                           String attrString)=20
   =20
   Constructs an attribute that has a single string value.=20
   =20
   =20
   public LDAPAttribute(String attrName,=20
                        String[] attrStrings)=20
   =20
   Constructs an attribute that has an array of string values.=20
   =20
   Parameters are:=20
   =20
      attr           An attribute to use as template.=20
      =20
      attrName       Name of the attribute.=20
      =20
      attrBytes      Value of the attribute as raw bytes.=20
      =20
      attrString     Value of the attribute as a String.=20
      =20
      attrStrings    Array of values as Strings.=20
   =20
   =20
4.1.2 addValue=20
   =20
   public void addValue(String attrString)=20
   =20
   Adds a string value to the attribute.=20
   =20
   =20
   public void addValue(byte[] attrBytes)=20
   =20
   Adds a byte[]-formatted value to the attribute.=20
   =20
   Parameters are:=20
 =20
Expires May, 2001                                            [Page 17]=20
=0C
JAVA LDAP API                                            November 2000=20
=20
=20
   =20
      attrString     Value of the attribute as a String.=20
      =20
      attrBytes      Value of the attribute as raw bytes.=20
   =20
   =20
4.1.3 getByteValues=20
   =20
   public Enumeration getByteValues()=20
   =20
   Returns an enumerator for the values of the attribute in byte[]=20
   format.=20
   =20
   =20
4.1.4 getStringValues=20
   =20
   public Enumeration getStringValues()=20
   =20
   Returns an enumerator for the string values of an attribute.=20
   =20
   =20
4.1.5 getByteValueArray=20
   =20
   public byte[][] getByteValueArray()=20
   =20
   Returns the values of the attribute as an array of byte[].=20
   =20
   =20
4.1.6 getStringValueArray=20
   =20
   public String[] getStringValueArray()=20
   =20
   Returns the values of the attribute as an array of Strings.=20
   =20
   =20
4.1.7 getLangSubtype=20
   =20
   public String getLangSubtype()=20
   =20
   Returns the language subtype, if any. For example, if the attribute=20
   name is cn;lang-ja;phonetic, this method returns the String lang-ja.=20
   =20
   =20
4.1.8 getBaseName=20
   =20
   public String getBaseName()=20
   =20
   public static String getBaseName(String attrName)=20
   =20
   Returns the base name. For example, if the attribute name is cn;lang-
   ja;phonetic, this method returns cn.=20
   =20
 =20
Expires May, 2001                                            [Page 18]=20
=0C
JAVA LDAP API                                            November 2000=20
=20
=20
      attrName       Name of the attribute to extract the base name=20
                      from.=20
   =20
   =20
4.1.9 getName=20
   =20
   public String getName()=20
   =20
   Returns the name of the attribute.=20
   =20
   =20
4.1.10 getSubtypes=20
   =20
   public String[] getSubtypes()=20
   =20
   public static String[] getSubtypes(String attrName)=20
   =20
   Extracts the subtypes from the specified attribute name. For example,=20
   if the attribute name is cn;lang-ja;phonetic, this method returns an=20
   array containing lang-ja and phonetic.=20
   =20
   Parameters are:=20
   =20
      attrName       Name of the attribute to extract the subtypes=20
                      from.=20
      =20
   =20
4.1.11 hasSubtype=20
   =20
   public boolean hasSubtype(String subtype)=20
   =20
   Reports if the attribute name contains the specified subtype. For=20
   example, if you check for the subtype lang-en and the attribute name=20
   is cn;lang-en, this method returns true.=20
   =20
   Parameters are:=20
   =20
      subtype        The single subtype to check for.=20
      =20
   =20
4.1.12 hasSubtypes=20
   =20
   public boolean hasSubtypes(String[] subtypes)=20
   =20
   Reports if the attribute name contains all specified subtypes. For=20
   example, if you check for the subtypes lang-en and phonetic and if=20
   the attribute name is cn;lang-en;phonetic, this method returns true.=20
   If the attribute name is cn;phonetic or cn;lang-en, this method=20
   returns false.=20
   =20
   Parameters are:=20
   =20
 =20
Expires May, 2001                                            [Page 19]=20
=0C
JAVA LDAP API                                            November 2000=20
=20
=20
      subtypes       An array of subtypes to check for.=20
      =20
   =20
4.1.13 removeValue=20
   =20
   public void removeValue(String attrString)=20
   =20
   Removes a string value from the attribute.=20
   =20
   =20
   public void removeValue(byte[] attrBytes)=20
   =20
   Removes a byte[]-formatted value from the attribute.=20
   =20
   Parameters are:=20
   =20
      attrString     Value of the attribute as a String.=20
      =20
      attrBytes      Value of the attribute as raw bytes.=20
   =20
   =20
4.1.14 size=20
   =20
   public int size()=20
   =20
   Returns the number of values of the attribute.=20
   =20
   =20
4.2 public class LDAPAttributeSchema=20
                 extends LDAPSchemaElement=20
   =20
   The LDAPAttributeSchema class represents the definition of an=20
   attribute. It is used to query attribute syntax, and to add or delete=20
   an attribute definition in a Directory. See [2] for a description of=20
   attribute representation in LDAP.=20
   =20
   =20
4.2.1 Constructors=20
   =20
   public LDAPAttributeSchema(String name,=20
                              String oid,=20
                              String description,=20
                              String syntaxString,=20
                              boolean single=20
                              String superior,=20
                              String[] aliases,=20
                              boolean obsolete,=20
                              String equality,=20
                              String ordering,=20
                              String substring,=20
                              boolean collective,=20
                              boolean userMod,=20
 =20
Expires May, 2001                                            [Page 20]=20
=0C
JAVA LDAP API                                            November 2000=20
=20
=20
                              int usage)=20
   =20
   Constructs an attribute definition for adding to or deleting from a=20
   Directory.=20
   =20
   =20
   public LDAPAttributeSchema(String raw)=20
   =20
   Constructs an attribute definition from the raw String value returned=20
   on a Directory query for "attributetypes".=20
   =20
   =20
   Parameters are:=20
   =20
      name           Name of the attribute.=20
      =20
      oid            Unique Object Identifier of the attribute - in=20
                      dotted numerical format.=20
      =20
      description    Optional description of the attribute.=20
      =20
      syntaxString   Unique Object Identifier of the syntax of the=20
                      attribute - in dotted numerical format.=20
      =20
      single         true if the attribute is to be single-valued.=20
      =20
      superior       Optional name of the attribute type which this=20
                      attribute type derives from; null if there is no=20
                      superior attribute type.=20
      =20
      aliases        Optional list of additional names by which the=20
                      attribute may be known; null if there are no=20
                      aliases.=20
      =20
      obsolete       true if this attribute is obsolete.=20
   =20
      equality       Unique Object Identifier of the equality matching=20
                      rule for the attribute - in dotted numerical=20
                      format; may be null.=20
   =20
      ordering       Unique Object Identifier of the ordering matching=20
                      rule for the attribute - in dotted numerical=20
                      format; may be null.=20
   =20
      substring      Unique Object Identifier of the substring=20
                      matching rule for the attribute - in dotted=20
                      numerical format; may be null.=20
   =20
      collective     true if this is a collective attribute.=20
   =20
      userMod        true if the attribute is modifiable by users.=20
   =20
 =20
Expires May, 2001                                            [Page 21]=20
=0C
JAVA LDAP API                                            November 2000=20
=20
=20
      usage          One of the following:=20
      =20
                     USER_APPLICATIONS=20
                     DIRECTORY_OPERATION=20
                     DISTRIBUTED_OPERATION=20
                     DSA_OPERATION=20
      =20
      raw            The raw String value returned on a Directory=20
                      query for "attributetypes".=20
   =20
   =20
4.2.2 getSyntaxString=20
   =20
   public String getSyntaxString()=20
   =20
   Returns the Unique Object Identifier of the syntax of the attribute=20
   in dotted numerical format.=20
   =20
   =20
4.2.3 isSingleValued=20
   =20
   public boolean isSingleValued()=20
   =20
   Returns true if the attribute is single-valued.=20
   =20
   =20
4.2.4 getSuperior=20
   =20
   public String getSuperior()=20
   =20
   Returns the name of the attribute type which this attribute derives=20
   from, or null if there is no superior attribute.=20
   =20
   =20
4.2.5 getEqualityMatchingRule=20
   =20
   public String getEqualityMatchingRule ()=20
   =20
   Returns the Unique Object Identifier of the equality matching rule in=20
   effect for this attribute, or null if there is none.=20
   =20
   =20
4.2.6 getOrderingMatchingRule=20
   =20
   public String getOrderingMatchingRule ()=20
   =20
   Returns the Unique Object Identifier of the ordering matching rule in=20
   effect for this attribute, or null if there is none.=20
   =20
   =20
4.2.7 getSubstringMatchingRule=20
   =20
 =20
Expires May, 2001                                            [Page 22]=20
=0C
JAVA LDAP API                                            November 2000=20
=20
=20
   public String getSubstringMatchingRule ()=20
   =20
   Returns the Unique Object Identifier of the substring matching rule=20
   in effect for this attribute, or null if there is none.=20
   =20
   =20
4.2.8 isCollective=20
   =20
   public boolean isCollective ()=20
   =20
   Returns true if the attribute is collective.=20
   =20
4.2.9 isModifiable=20
   =20
   public boolean isModifiable ()=20
   =20
   Returns true if the attribute is modifiable.=20
   =20
   =20
4.2.10 getUsage=20
   =20
   public int getUsage ()=20
   =20
   Returns one of the following:=20
   =20
        USER_APPLICATIONS=20
        DIRECTORY_OPERATION=20
        DISTRIBUTED_OPERATION=20
        DSA_OPERATION=20
   =20
   =20
4.2.11 Constants of LDAPAttributeSchema=20
   =20
     USER_APPLICATIONS (0)     An ordinary user attribute=20
      =20
     DIRECTORY_OPERATION (1)   An operational attribute used for a=20
                               directory operation or which holds a=20
                               directory specific value=20
       =20
     DISTRIBUTED_OPERATION (2) An operational attribute used to hold=20
                               server (DSA) information that is shared=20
                               among servers holding replicas of the=20
                               entry=20
     =20
     DSA_OPERATION (3)         An operational attribute used to hold=20
                               server (DSA) information that is local=20
                               to a server=20
     =20
   =20
4.3 public class LDAPAttributeSet=20
                 implements Cloneable=20
   =20
 =20
Expires May, 2001                                            [Page 23]=20
=0C
JAVA LDAP API                                            November 2000=20
=20
=20
   An LDAPAttributeSet is a collection of LDAPAttributes, as returned in=20
   an entry on a search or read operation, or used to construct an entry=20
   to be added to a directory.=20
   =20
   =20
4.3.1 Constructors=20
   =20
   public LDAPAttributeSet()=20
   =20
   Constructs a new set of attributes. This set is initially empty.=20
   =20
   =20
4.3.2 add=20
   =20
   public void add(LDAPAttribute attr)=20
   =20
   Adds the specified attribute to this attribute set.=20
   =20
   Parameters are:=20
   =20
      attr           Attribute to add to this set.=20
   =20
   =20
4.3.3 clone=20
   =20
   public Object clone()=20
   =20
   Returns a deep copy of this attribute set.=20
   =20
   =20
4.3.4 elementAt=20
   =20
   public LDAPAttribute elementAt(int index)=20
                               throws ArrayIndexOutOfBoundsException=20
   =20
   Returns the attribute at the position specified by the index. The=20
   index is 0-based.=20
   =20
   Parameters are:=20
   =20
      index           Index of the attribute to get.=20
   =20
   =20
4.3.5 getAttribute=20
   =20
   =20
   public LDAPAttribute getAttribute(String attrName)=20
   =20
   Returns the attribute matching the specified attrName. For example,=20
      =20
        getAttribute("cn")          returns only the "cn" attribute=20

 =20
Expires May, 2001                                            [Page 24]=20
=0C
JAVA LDAP API                                            November 2000=20
=20
=20
        getAttribute("cn;lang-en")  returns only the "cn;lang-en"=20
                                    attribute.=20
      =20
   In both cases, null is returned if there is no exact match to the=20
   specified attrName.=20
   =20
   =20
   public LDAPAttribute getAttribute(String attrName, String lang)=20
   =20
   Returns a single best-match attribute, or none if no match is=20
   available in the entry.=20
   =20
   LDAP version 3 allows adding a subtype specification to an attribute=20
   name. "cn;lang-ja", for example, indicates a Japanese language=20
   subtype of the "cn" attribute. "cn;lang-ja-JP-kanji" may be a subtype=20
   of "cn;lang-ja". This feature may be used to provide multiple=20
   localizations in the same Directory. For attributes which do not vary=20
   among localizations, only the base attribute may be stored, whereas=20
   for others there may be varying degrees of specialization.=20
   =20
   getAttribute(attrName, lang) returns the subtype that matches=20
   attrName and that best matches lang. If there are subtypes other than=20
   "lang" subtypes included in attrName, e.g. "cn;binary", only=20
   attributes with all of those subtypes are returned. If lang is null=20
   or empty, the method behaves as getAttribute(attrName). If there are=20
   no matching attributes, null is returned.=20
   =20
   Example:=20
   =20
      Assume the entry contains only the following attributes:=20
   =20
         cn;lang-en=20
         cn;lang-ja-JP-kanji=20
         sn=20
   =20
         getAttribute( "cn" )               returns null.=20
         getAttribute( "sn" )               returns the "sn" attribute.=20
         getAttribute( "cn", "lang-en-us" ) returns the "cn;lang-en"=20
                                            attribute.=20
         getAttribute( "cn", "lang-en" )    returns the "cn;lang-en"=20
                                            attribute.=20
         getAttribute( "cn", "lang-ja" )    returns null.=20
         getAttribute( "sn", "lang-en" )    returns the "sn" attribute.=20
   =20
   Parameters are:=20
   =20
   attrName     The name of an attribute to retrieve, with or without=20
   subtype specification(s). "cn", "cn;phonetic", and cn;binary" are=20
   valid attribute names.=20
   =20
      lang           A language specification as in [9], with optional=20
                      subtypes appended using "-" as separator. "lang-
 =20
Expires May, 2001                                            [Page 25]=20
=0C
JAVA LDAP API                                            November 2000=20
=20
=20
                      en", "lang-en-us", "lang-ja", and "lang-ja-JP-
                      kanji" are valid language specification.=20
   =20
   =20
4.3.6 getAttributes=20
   =20
   public Enumeration getAttributes()=20
   =20
   Returns an enumeration of the attributes in this attribute set.=20
   =20
   =20
4.3.7 getSubset=20
   =20
   public LDAPAttributeSet getSubset(String subtype)=20
      =20
   Creates a new attribute set containing only the attributes that have=20
   the specified subtypes. =20
   =20
   For example, suppose an attribute set contains the following=20
   attributes: =20
   =20
         cn=20
         cn;lang-ja=20
         sn;phonetic;lang-ja=20
         sn;lang-us=20
         =20
   =20
   Calling the getSubset method and passing lang-ja as the argument, the=20
   method returns an attribute set containing the following attributes: =20
   =20
         cn;lang-ja=20
         sn;phonetic;lang-ja=20
         =20
   =20
   Parameters are: =20
   =20
      subtype - Semi-colon delimited list of subtypes to include. For=20
                      example:=20
                     "lang-ja"        // Only Japanese language=20
                      subtypes=20
                     "binary"         // Only binary subtypes=20
                     "binary;lang-ja" // Only Japanese language=20
                      subtypes=20
                                         which also are binary=20
   =20
   =20
4.3.8 remove=20
   =20
   public void remove(String name)=20
   =20


 =20
Expires May, 2001                                            [Page 26]=20
=0C
JAVA LDAP API                                            November 2000=20
=20
=20
   Removes the specified attribute from the set. Subtypes of the=20
   specified attribute are not removed. If the attribute is not a member=20
   of the set, nothing happens.=20
   =20
   Parameters are:=20
      =20
      name           Name of the attribute to remove from this set. To=20
                      remove an LDAPAttribute by object, the=20
                      LDAPAttribute.getName method can be used:=20
                      LDAPAttributeSet.remove( attr.getName() );=20
   =20
   =20
4.3.9 removeElementAt=20
   =20
   public void removeElementAt(int index)=20
                               throws ArrayIndexOutOfBoundsException=20
   =20
   Removes the attribute at the position specified by the index.  The=20
   index is 0-based.=20
   =20
   Parameters are:=20
   =20
      index          Index of the attribute to remove.=20
   =20
   =20
4.3.10 size=20
   =20
   public int size()=20
   =20
   Returns the number of attributes in this set.=20
   =20
   =20
4.4 public interface LDAPBind=20
                     extends LDAPReferralHandler=20
   =20
   Used to do explicit bind processing on a referral. A client may=20
   specify an instance of this class to be used on a single operation=20
   (through an LDAPConstraints object) or for all operations (through=20
   the LDAPConstraints object associated with the connection).=20
   =20
   =20
4.4.1 bind=20
   =20
   =20
   public LDAPConnection bind(String[] ldapurl, LDAPConnection conn)=20
                    throws LDAPException=20
   =20
   This method is called by LDAPConnection when a referral is received,=20
   and is responsible to bind to one of the hosts in the list specified=20
   by the ldapurl parameter (which corresponds exactly to the list of=20
   hosts returned in a single referral response). An implementation may=20
   access the host, port, credentials, and other information in the=20
 =20
Expires May, 2001                                            [Page 27]=20
=0C
JAVA LDAP API                                            November 2000=20
=20
=20
   original LDAPConnection object to decide on an appropriate=20
   authentication mechanism, and/or may interact with a user or external=20
   module. The object implementing LDAPBind creates a new LDAPConnection=20
   object to perform its connect and bind calls. It  returns the new=20
   connection when both the connect and bind operations succeed on one=20
   host from the list. The LDAPConnection object referral following code=20
   uses the new LDAPConnection object when it resends the search=20
   request, updated with the new search base and possibly search filter.=20
   An LDAPException is thrown on failure, as in LDAPConnection.bind().=20
   =20
   Parameters are:=20
   =20
      ldapurl        List of LDAP server URLs.  There is no order=20
                      implied by the list and all servers are equally=20
                      capable of satisfying the request.=20
      =20
      conn           An established connection to an LDAP server.=20
   =20
   =20
4.5 public class LDAPCompareAttrNames=20
                 implements LDAPEntryComparator=20
   =20
   An object of this class supports sorting search results by attribute=20
   name, in ascending or descending order.=20
   =20
   =20
4.5.1 Constructors=20
      =20
   public LDAPCompareAttrNames(String attrName)=20
   =20
   =20
   Constructs an object that will sort results by a single attribute, in=20
   ascending order.=20
   =20
   =20
   public LDAPCompareAttrNames(String attrName,=20
                               boolean ascendingFlag)=20
   =20
   Constructs an object that will sort results by a single attribute, in=20
   either ascending or descending order.=20
   =20
   =20
   public LDAPCompareAttrNames(String[] attrNames)=20
   =20
   Constructs an object that will sort by one or more attributes, in the=20
   order provided, in ascending order.=20
   =20
   =20
   public LDAPCompareAttrNames(String[] attrNames,=20
                               boolean[] ascendingFlags)=20
                               throws LDAPException=20
   =20
 =20
Expires May, 2001                                            [Page 28]=20
=0C
JAVA LDAP API                                            November 2000=20
=20
=20
   Constructs an object that will sort by one or more attributes, in the=20
   order provided, in either ascending or descending order for each=20
   attribute.=20
   =20
   Parameters are:=20
   =20
      attrName       Name of an attribute to sort by.=20
      =20
      attrNames      Array of names of attributes to sort by.=20
      =20
      ascendingFlag  true to sort in ascending order, false for=20
                      descending order.=20
      =20
      ascendingFlags Array of flags, one for each attrName, where each=20
                      one is true to sort in ascending order, false for=20
                      descending order. An LDAPException is thrown if=20
                      the length of ascendingFlags is not greater than=20
                      or equal to the length of attrNames.=20
      =20
   =20
4.5.2 getLocale=20
   =20
   public Locale getLocale()=20
      =20
   Returns the Locale to be used for sorting, if a Locale has been=20
   specified. If null, a basic String.compareTo() is used for collation.=20
   If non-null, a Locale-specific collation is used.=20
      =20
   =20
4.5.3 setLocale=20
   =20
   public void setLocale(Locale locale)=20
      =20
   Sets the Locale to be used for sorting.=20
      =20
   Parameters are:=20
      =20
      locale         The Locale to be used for sorting.=20
      =20
   =20
4.5.4 isGreater=20
   =20
   public boolean isGreater(LDAPEntry entry1, LDAPEntry entry2)=20
   =20
   Returns true if entry1 is to be considered greater than entry2, for=20
   the purpose of sorting, based on the attribute name or names provided=20
   on object construction.=20
   =20
   Parameters are:=20
   =20
      entry1         Target entry for comparison.=20
      =20
 =20
Expires May, 2001                                            [Page 29]=20
=0C
JAVA LDAP API                                            November 2000=20
=20
=20
      entry2         Entry to be compared to.=20
   =20
   =20
4.6 public class LDAPConnection=20
                 implements Cloneable=20
   =20
   LDAPConnection is the central class that encapsulates the connection=20
   to a Directory Server through the LDAP protocol. An LDAPConnection=20
   object is not connected on construction, and may only be connected to=20
   one server at one port. Multiple threads may share this single=20
   connection, and an application may have more than one LDAPConnection=20
   object, connected to the same or different Directory Servers.=20
   =20
   =20
4.6.1 Constructors=20
   =20
   public LDAPConnection()=20
   =20
   Constructs a new LDAPConnection object, which represents a connection=20
   to an LDAP server.=20
   =20
   Calling the constructor does not actually establish the connection.=20
   To connect to the LDAP server, use the connect method.=20
   =20
   =20
   public LDAPConnection(LDAPSocketFactory factory)=20
   =20
   Constructs a new LDAPConnection object, which will use the supplied=20
   class factory to construct a socket connection during=20
   LDAPConnection.connect().=20
   =20
   Parameters are:=20
   =20
      factory         An object capable of producing a Socket.=20
   =20
   =20
4.6.2 abandon=20
   =20
   public void abandon(LDAPSearchResults results)=20
                       throws LDAPException=20
   =20
   public void abandon(LDAPSearchResults results, LDAPConstraints cons)=20
                       throws LDAPException=20
   =20
   public void abandon(int id)=20
                       throws LDAPException=20
   =20
   public void abandon(int id, LDAPConstraints cons)=20
                      throws LDAPException=20
   =20
   public void abandon(LDAPListener listener)=20
                      throws LDAPException=20
 =20
Expires May, 2001                                            [Page 30]=20
=0C
JAVA LDAP API                                            November 2000=20
=20
=20
   =20
   public void abandon(LDAPListener listener, LDAPConstraints cons)=20
                      throws LDAPException=20
   =20
   Either notifies the server to not send additional results associated=20
   with this LDAPSearchResults object, and discards any results already=20
   received, or abandons one or all operations for an asynchronous=20
   response listener.=20
   =20
   Parameters are:=20
   =20
      results        An object returned from a search.=20
      =20
      id             The ID of the asynchronous operation to abandon.=20
                      The ID may be obtained from the response listener=20
                      for the operation.=20
   =20
      listener       Handler returned from an asynchronous request.=20
                      All outstanding operations that are managed by=20
                      the listener are abandoned.=20
   =20
      cons           Constraints specific to the operation.=20
=20
   =20
4.6.3 add=20
   =20
   public void add(LDAPEntry entry)=20
                   throws LDAPException=20
   =20
   public void add(LDAPEntry entry,=20
                   LDAPConstraints cons)=20
                   throws LDAPException=20
   =20
   public LDAPResponseListener add(LDAPEntry entry,=20
                                   LDAPResponseListener listener)=20
                                   throws LDAPException=20
   =20
   =20
   public LDAPResponseListener add(LDAPEntry entry,=20
                                   LDAPResponseListener listener,=20
                                   LDAPConstraints cons)=20
                                   throws LDAPException=20
   =20
   Adds an entry to the directory.=20
   =20
   Parameters are:=20
   =20
      entry          LDAPEntry object specifying the distinguished=20
                      name and attributes of the new entry.=20
   =20


 =20
Expires May, 2001                                            [Page 31]=20
=0C
JAVA LDAP API                                            November 2000=20
=20
=20
      listener       Handler for messages returned from a server in=20
                      response to this request. If it is null, a=20
                      listener object is created internally.=20
      =20
      cons           Constraints specific to the operation.=20
      =20
   =20
4.6.4 bind=20
   =20
   public void bind(String dn,=20
                    String passwd)=20
                    throws LDAPException=20
   =20
   public void bind(String dn,=20
                    String passwd,=20
                    LDAPConstraints cons,=20
                    throws LDAPException=20
   =20
   public LDAPResponseListener bind(String dn,=20
                                    String passwd,=20
                                    LDAPResponseListener listener)=20
                                    throws LDAPException=20
   =20
   public LDAPResponseListener bind(String dn,=20
                                    String passwd,=20
                                    LDAPResponseListener listener,=20
                                    LDAPConstraints cons)=20
                                    throws LDAPException=20
   =20
   Authenticates with LDAPv3 protocol to the LDAP server (that the=20
   object is currently connected to) using the specified name and=20
   password.  If the object has been disconnected from an LDAP server,=20
   this method attempts to reconnect to the server. If the object had=20
   already authenticated, the old authentication is discarded.=20
   =20
   Parameters are:=20
   =20
      dn             If non-null and non-empty, specifies that the=20
                      connection and all operations through it should=20
                      be authenticated with dn as the distinguished=20
                      name.=20
      =20
      passwd         If non-null and non-empty, specifies that the=20
                      connection and all operations through it should=20
                      be authenticated with dn as the distinguished=20
                      name and passwd as password.=20
   =20
      listener       Handler for messages returned from a server in=20
                      response to this request. If it is null, a=20
                      listener object is created internally. It is=20
                      recommended that either the synchronous version=20

 =20
Expires May, 2001                                            [Page 32]=20
=0C
JAVA LDAP API                                            November 2000=20
=20
=20
                      of this method is used or that the client blocks=20
                      until the listener returns a response.=20
      =20
      cons           Constraints specific to the operation.=20
      =20
   =20
   =20
   public void bind(int version,=20
                    String dn,=20
                    String passwd)=20
                    throws LDAPException=20
   =20
   public void bind(int version,=20
                    String dn,=20
                    String passwd)=20
                    LDAPConstraints cons,=20
                    throws LDAPException=20
   =20
   public LDAPResponseListener bind(int version,=20
                                    String dn,=20
                                    String passwd,=20
                                    LDAPResponseListener listener)=20
                                    throws LDAPException=20
   =20
   public LDAPResponseListener bind(int version,=20
                                    String dn,=20
                                    String passwd,=20
                                    LDAPResponseListener listener,=20
                                    LDAPConstraints cons)=20
                                    throws LDAPException=20
   =20
   =20
   Authenticates to the LDAP server (that the object is currently=20
   connected to) using the specified name and password, with the=20
   specified LDAP protocol version. If the server does not support the=20
   requested protocol version, an exception is thrown.  If the object=20
   has been disconnected from an LDAP server, this method attempts to=20
   reconnect to the server. If the object had already authenticated, the=20
   old authentication is discarded.=20
   =20
   Parameters are:=20
   =20
      version        LDAP protocol version requested: currently 2 or=20
                      3.=20
      =20
      dn              If non-null and non-empty, specifies that the=20
                      connection and all operations through it should=20
                      be authenticated with dn as the distinguished=20
                      name.=20
      =20
      passwd         If non-null and non-empty, specifies that the=20
                      connection and all operations through it should=20
 =20
Expires May, 2001                                            [Page 33]=20
=0C
JAVA LDAP API                                            November 2000=20
=20
=20
                      be authenticated with dn as the distinguished=20
                      name and passwd as password.=20
   =20
      listener       Handler for messages returned from a server in=20
                      response to this request. If it is null, a=20
                      listener object is created internally.=20
      =20
      cons           Constraints specific to the operation.=20
   =20
   =20
   public void bind(String dn,=20
                    Properties props,=20
                    javax.security.auth.callback.CallbackHandler cbh)=20
                    throws LDAPException=20
   =20
   =20
   public void bind(String dn,=20
                    Properties props,=20
                    javax.security.auth.callback.CallbackHandler cbh,=20
                    LDAPConstraints cons)=20
                    throws LDAPException=20
   =20
   =20
   public void bind(String dn,=20
                    String[] mechanisms,=20
                    Hashtable props,=20
                    javax.security.auth.callback.CallbackHandler cbh)=20
                    throws LDAPException=20
   =20
   public void bind(String dn,=20
                    String[] mechanisms,=20
                    Hashtable props,=20
                    javax.security.auth.callback.CallbackHandler cbh,=20
                    LDAPConstraints cons)=20
                    throws LDAPException=20
   =20
   =20
   Authenticates to the LDAP server (that the object is currently=20
   connected to) using the specified name and one of a specified set of=20
   mechanisms. If none of the requested SASL mechanisms is available, an=20
   exception is thrown.  If the object has been disconnected from an=20
   LDAP server, this method attempts to reconnect to the server. If the=20
   object had already authenticated, the old authentication is=20
   discarded. If mechanisms is null, or if the first version of the=20
   method is called, the LDAP server will be interrogated for its=20
   supportedSaslMechanisms attribute of its root DSE.=20
   =20
   Parameters are:=20
   =20
      dn              If non-null and non-empty, specifies that the=20
                      connection and all operations through it should=20

 =20
Expires May, 2001                                            [Page 34]=20
=0C
JAVA LDAP API                                            November 2000=20
=20
=20
                      be authenticated with dn as the distinguished=20
                      name.=20
      =20
      mechanisms     An array of IANA-registered SASL mechanisms which=20
                      the client is willing to use for authentication.=20
=20
      props          Optional qualifiers for the authentication=20
                      session.=20
=20
      cbh            A class which may be called by the Mechanism=20
                      Driver to obtain additional information required,=20
                      such as additional credentials.=20
   =20
      cons           Constraints specific to the operation.=20
=20
   =20
4.6.5 clone=20
   =20
   public Object clone()=20
   =20
   Returns a copy of the object with a private context, but sharing the=20
   network connection if there is one. The network connection remains=20
   open until all clones have disconnected or gone out of scope. Any=20
   connection opened after cloning is private to the object making the=20
   connection.=20
   =20
   The clone can freely modify options and search constraints, and issue=20
   requests, without affecting the source object or other clones. If the=20
   clone disconnects or reconnects, it is completely dissociated from=20
   the source object and other clones. Reauthenticating in a clone,=20
   however, is a global operation which will affect the source object=20
   and all associated clones, because it applies to the single shared=20
   physical connection. Any request by an associated object after one=20
   has reauthenticated will carry the new identity.=20
   =20
   =20
4.6.6 compare=20
   =20
   public boolean compare(String dn,=20
                          LDAPAttribute attr)=20
                          throws LDAPException=20
   =20
   public boolean compare(String dn,=20
                          LDAPAttribute attr,=20
                          LDAPConstraints cons)=20
                          throws LDAPException=20
   =20
   public LDAPResponseListener compare(String dn,=20
                                       LDAPAttribute attr,=20
                                       LDAPResponseListener listener)=20
                                       throws LDAPException=20
   =20
 =20
Expires May, 2001                                            [Page 35]=20
=0C
JAVA LDAP API                                            November 2000=20
=20
=20
   public LDAPResponseListener compare(String dn,=20
                                       LDAPAttribute attr,=20
                                       LDAPResponseListener listener,=20
                                       LDAPConstraints cons)=20
                                       throws LDAPException=20
   =20
   Checks to see if an entry contains an attribute with a specified=20
   value. The synchronous methods return a value of true if the entry=20
   has the value, and false if the entry does not have the value or the=20
   attribute.=20
   =20
   Parameters are:=20
   =20
      dn             The distinguished name of the entry to use in the=20
                      comparison.=20
      =20
      attr           The attribute to compare against the entry. The=20
                      method checks to see if the entry has an=20
                      attribute with the same name and value as this=20
                      attribute.=20
   =20
      listener       Handler for messages returned from a server in=20
                      response to this request. If it is null, a=20
                      listener object is created internally.=20
      =20
      cons           Constraints specific to the operation.=20
      =20
   =20
4.6.7 connect=20
   =20
   public void connect(String host,=20
                       int port)=20
                       throws LDAPException=20
   =20
   Connects to the specified host and port. If this LDAPConnection=20
   object represents an open connection, the connection is closed first=20
   before the new connection is opened.  At this point there is no=20
   authentication, and any operations will be conducted as an anonymous=20
   client.=20
   =20
   Parameters are:=20
   =20
      host           Contains a hostname or dotted string representing=20
                      the IP address of a host running an LDAP server=20
                      to connect to. Alternatively, it may contain a=20
                      list of host names, space-delimited.  Each host=20
                      name may include a trailing colon and port=20
                      number.  In the case where more than one host=20
                      name is specified, each host name in turn will be=20
                      contacted until a connection can be established.=20
                      Examples:=20
   =20
 =20
Expires May, 2001                                            [Page 36]=20
=0C
JAVA LDAP API                                            November 2000=20
=20
=20
         "directory.knowledge.com"=20
         "199.254.1.2"=20
         "directory.knowledge.com:1050 people.catalog.com 199.254.1.2"=20
   =20
      port           Contains the TCP or UDP port number to connect to=20
                      or contact. The default LDAP port is 389. "port"=20
                      is ignored for any host name which includes a=20
                      colon and port number.=20
      =20
   =20
4.6.8 delete=20
   =20
   public void delete(String dn) throws LDAPException=20
   =20
   public void delete(String dn,=20
                      LDAPConstraints cons)=20
                      throws LDAPException=20
   =20
   public LDAPResponseListener delete(String dn,=20
                                      LDAPResponseListener listener)=20
                                      throws LDAPException=20
   =20
   public LDAPResponseListener delete(String dn,=20
                                      LDAPResponseListener listener,=20
                                      LDAPConstraints cons)=20
                                      throws LDAPException=20
   =20
   Deletes the entry for the specified DN from the directory.=20
   =20
   =20
   Parameters are:=20
   =20
      dn             Distinguished name of the entry to modify.=20
   =20
      listener       Handler for messages returned from a server in=20
                      response to this request. If it is null, a=20
                      listener object is created internally.=20
      =20
      cons           Constraints specific to the operation.=20
   =20
   =20
4.6.9 disconnect=20
   =20
   public void disconnect() throws LDAPException=20
   =20
   Disconnects from the LDAP server. Before the object can perform LDAP=20
   operations again, it must reconnect to the server by calling connect.=20
   =20
   =20
4.6.10 extendedOperation=20
   =20
   public LDAPExtendedResponse extendedOperation(=20
 =20
Expires May, 2001                                            [Page 37]=20
=0C
JAVA LDAP API                                            November 2000=20
=20
=20
                                   LDAPExtendedOperation op )=20
                                   throws LDAPException=20
   =20
   public LDAPExtendedResponse extendedOperation(=20
                                   LDAPExtendedOperation op,=20
                                   LDAPConstraints cons )=20
                                   throws LDAPException=20
   =20
   public LDAPResponseListener extendedOperation(=20
                                   LDAPExtendedOperation op,=20
                                   LDAPResponseListener listener)=20
                                   throws LDAPException=20
   =20
   public LDAPResponseListener extendedOperation(=20
                                   LDAPExtendedOperation op,=20
                                   LDAPConstraints cons,=20
                                   LDAPResponseListener listener)=20
                                   throws LDAPException=20
   =20
   Provides a means to access extended, non-mandatory operations offered=20
   by a particular LDAP version 3 compliant server.=20
   =20
   Returns an operation-specific object, containing an ID and an Octet=20
   String or BER-encoded value(s).=20
   =20
   Parameters are:=20
   =20
      op             Object which contains an identifier of the=20
                      extended operation, which should be one=20
                      recognized by the particular server this client=20
                      is connected to, and  operation-specific sequence=20
                      of Octet String or BER-encoded value(s).=20
      =20
      cons           Constraints specific to the operation.=20
   =20
   =20
4.6.11 finalize=20
   =20
   public void finalize() throws LDAPException=20
   =20
   Closes the connection if open and releases any other resources held=20
   by the object.=20
   =20
   =20
4.6.12 getAuthenticationDN=20
   =20
   public String getAuthenticationDN()=20
   =20
   Returns the distinguished name (DN) used for authentication by this=20
   object. null is returned if no authentication has been performed.=20
   =20
   =20
 =20
Expires May, 2001                                            [Page 38]=20
=0C
JAVA LDAP API                                            November 2000=20
=20
=20
4.6.13 getAuthenticationMethod=20
   =20
   public String getAuthenticationMethod()=20
   =20
   Returns the method used to authenticate the connection. The return=20
   value is one of the following:=20
   =20
      "none"         If the connection is not authenticated=20
      =20
      "simple"       If simple authentication was used, also if a null=20
                      or empty authentication DN was specified=20
      =20
      "sasl"         If a SASL mechanism was used to authenticate=20
   =20
   =20
4.6.14 getAuthenticationPassword=20
   =20
   public String getAuthenticationPassword()=20
   =20
   Returns the password used for simple authentication by this object.=20
   null is returned if no authentication has been performed.=20
   =20
   =20
4.6.15 getConstraints=20
   =20
   public LDAPConstraints getConstraints()=20
   =20
   Returns a copy of the set of constraints associated with this=20
   connection. These constraints apply to all operations performed=20
   through this connection (unless a different set of constraints is=20
   specified when calling an operation method).=20
   =20
   =20
4.6.16 getHost=20
   =20
   public String getHost()=20
   =20
   Returns the host name of the LDAP server to which the object is or=20
   was last connected, in the format originally specified.=20
   =20
   =20
4.6.17 getInputStream=20
   =20
   public InputStream getInputStream()=20
   =20
   Returns the stream used by the connection object for receiving data=20
   from the LDAP server.=20
   =20
   =20
4.6.18 getOutputStream=20
   =20
   public OutputStream getOutputStream()=20
 =20
Expires May, 2001                                            [Page 39]=20
=0C
JAVA LDAP API                                            November 2000=20
=20
=20
   =20
   Returns the stream used by the connection object to send data to the=20
   LDAP server.=20
   =20
   =20
4.6.19 getPort=20
   =20
   public int getPort()=20
   =20
   Returns the port number of the LDAP server to which the object is or=20
   was last connected.=20
      =20
   =20
4.6.20 getProperty=20
   =20
   public Object getProperty(String name) throws LDAPException=20
   =20
   Gets a property of a connection object.=20
   =20
   Parameters are:=20
   =20
      name            Name of the property to be returned.=20
   =20
                      The following read-only properties are available=20
                      for any given connection:=20
   =20
   =20
                      LDAP_PROPERTY_SDK ("version.sdk")  The version of=20
                                                    this SDK, as a=20
                                                    Float data type.=20
                      =20
                      =20
                      LDAP_PROPERTY_PROTOCOL ("version.protocol")  The=20
                                                    highest supported=20
                                                    version of the LDAP=20
                                                    protocol, as a=20
                                                    Float data type.=20
                      =20
                      =20
                      LDAP_PROPERTY_SECURITY ("version.security")  A=20
                                                    comma-separated=20
                                                    list of the types=20
                                                    of authentication=20
                                                    supported, as a=20
                                                    String.=20
   =20
      Other properties may be available in particular implementations=20
      of the class, and used to modify operations such as search.=20
      =20
      A deep copy of the property is provided where applicable; a=20
      client does not need to clone the object received.=20
      =20
 =20
Expires May, 2001                                            [Page 40]=20
=0C
JAVA LDAP API                                            November 2000=20
=20
=20
      =20
      An LDAPException is thrown if the requested property is not=20
      available.=20
   =20
   =20
4.6.21 getProtocolVersion=20
   =20
   public int getProtocolVersion ()=20
   =20
   Returns the protocol level that the connection is bound to (2 or 3).=20
      =20
   =20
4.6.22 getResponseControls=20
   =20
   public LDAPControl[] getResponseControls()=20
   =20
   Returns the latest Server Controls returned by a Directory Server=20
   with a response to an LDAP request from the current thread, or null=20
   if the latest response contained no Server Controls. The method=20
   always returns null for asynchronous requests. For asynchronous=20
   requests, the response controls are available in LDAPMessage.=20
   =20
   =20
4.6.23 getSaslBindCallbackHandler=20
   =20
   public javax.security.auth.callback.CallbackHandler=20
          getSaslBindCallbackHandler()=20
   =20
   Returns the callback handler, if any, specified on binding with a=20
   SASL mechanism.=20
   =20
   =20
4.6.24 getSaslBindProperties=20
   =20
   public Hashtable getSaslBindProperties()=20
   =20
   Returns the properties, if any, specified on binding with a SASL=20
   mechanism.=20
   =20
   =20
4.6.25 getSearchConstraints=20
   =20
   public LDAPSearchConstraints getSearchConstraints()=20
   =20
   Returns a copy of the set of search constraints associated with this=20
   connection. These constraints apply to search operations performed=20
   through this connection (unless a different set of constraints is=20
   specified when calling the search operation method). The search=20
   constraints include the base constraints returned by=20
   getConstraints().=20
   =20
   =20
 =20
Expires May, 2001                                            [Page 41]=20
=0C
JAVA LDAP API                                            November 2000=20
=20
=20
4.6.26 getSocketFactory=20
   =20
   public LDAPSocketFactory getSocketFactory()=20
   =20
   Returns the LDAPSocketFactory used to establish a connection to a=20
   server.=20
   =20
   =20
4.6.27 getUnsolicitedNotifications=20
   =20
   public boolean getUnsolicitedNotifications()=20
   =20
   Indicates if unsolicited messages from the server are accepted or=20
   not. An unsolicited message has the ID 0. If unsolicited=20
   notifications are enabled, unsolicited messages can be queried and=20
   retrieved from a response listener with isResponseReceived(0) and=20
   getResponse(0). The default is for unsolicited messages to be=20
   discarded.=20
   =20
   =20
4.6.28 isBound=20
   =20
   public boolean isBound()=20
   =20
   Indicates whether the object has authenticated to the connected LDAP=20
   server.=20
   =20
   =20
4.6.29 isConnected=20
   =20
   public boolean isConnected()=20
   =20
   Indicates if the connection represented by this object is open at=20
   this time.=20
   =20
   =20
4.6.30 isTLS=20
   =20
   public boolean isTLS ()=20
   =20
   Indicates if the connection uses TLS, i.e. startTLS has completed.=20
   =20
   =20
4.6.31 modify=20
   =20
   public void modify(String dn,=20
                      LDAPModification mod)=20
                      throws LDAPException=20
   =20
   public void modify(String dn,=20
                      LDAPModification mod,=20
                      LDAPConstraints cons)=20
 =20
Expires May, 2001                                            [Page 42]=20
=0C
JAVA LDAP API                                            November 2000=20
=20
=20
                      throws LDAPException=20
   =20
   public LDAPResponseListener modify(String dn,=20
                                      LDAPModification mod,=20
                                      LDAPResponseListener listener)=20
                                      throws LDAPException=20
   =20
   public LDAPResponseListener modify(String dn,=20
                                      LDAPModification mod,=20
                                      LDAPResponseListener listener,=20
                                      LDAPConstraints cons)=20
                                      throws LDAPException=20
   =20
   Makes a single change to an existing entry in the directory (for=20
   example, changes the value of an attribute, adds a new attribute=20
   value, or removes an existing attribute value).=20
   =20
   The LDAPModification object specifies both the change to be made and=20
   the LDAPAttribute value to be changed.=20
   =20
   =20
   public void modify(String dn,=20
                      LDAPModificationSet mods)=20
                      throws LDAPException=20
   =20
   public void modify(String dn,=20
                      LDAPModificationSet mods,=20
                      LDAPConstraints cons)=20
                      throws LDAPException=20
   =20
   public LDAPResponseListener modify(String dn,=20
                                      LDAPModificationSet mods,=20
                                      LDAPResponseListener listener)=20
                                      throws LDAPException=20
   =20
   public LDAPResponseListener modify(String dn,=20
                                      LDAPModificationSet mods,=20
                                      LDAPResponseListener listener,=20
                                      LDAPConstraints cons)=20
                                      throws LDAPException=20
   =20
   Makes a set of changes to an existing entry in the directory (for=20
   example, changes attribute values, adds new attribute values, or=20
   removes existing attribute values).=20
   =20
   Parameters are:=20
   =20
      dn             Distinguished name of the entry to modify.=20
      =20
      mod            A single change to be made to the entry.=20
      =20
      mods           A set of changes to be made to the entry.=20
 =20
Expires May, 2001                                            [Page 43]=20
=0C
JAVA LDAP API                                            November 2000=20
=20
=20
   =20
      listener       Handler for messages returned from a server in=20
                      response to this request. If it is null, a=20
                      listener object is created internally.=20
      =20
      cons           Constraints specific to the operation.=20
   =20
   =20
   =20
4.6.32 read=20
   =20
   public LDAPEntry read(String dn) throws LDAPException=20
   =20
   Reads the entry for the specified distiguished name (DN) and=20
   retrieves all attributes for the entry.=20
   =20
   =20
   public LDAPEntry read(String dn,=20
                         LDAPSearchConstraints cons)=20
                         throws LDAPException=20
   =20
   Reads the entry for the specified distiguished name (DN) and=20
   retrieves all attributes for the entry.=20
   =20
   =20
   public LDAPEntry read(String dn,=20
                         String[] attrs)=20
                         throws LDAPException=20
   =20
   public LDAPEntry read(String dn,=20
                         String[] attrs,=20
                         LDAPSearchConstraints cons)=20
                         throws LDAPException=20
   =20
   Reads the entry for the specified distinguished name (DN) and=20
   retrieves only the specified attributes from the entry.=20
   =20
   =20
   public static LDAPEntry read(LDAPUrl toGet) throws LDAPException=20
   =20
   public static LDAPEntry read(LDAPUrl toGet,=20
                                LDAPSearchConstraints cons)=20
                                throws LDAPException=20
   =20
   Reads the entry specified by the LDAP URL.=20
   =20
   When this method is called, a new connection is created=20
   automatically, using the host and port specified in the URL. After=20
   finding the entry, the method closes the connection (in other words,=20
   it disconnects from the LDAP server).=20
   =20

 =20
Expires May, 2001                                            [Page 44]=20
=0C
JAVA LDAP API                                            November 2000=20
=20
=20
   If the URL specifies a filter and scope, these are not used. Of the=20
   information specified in the URL, this method only uses the LDAP host=20
   name and port number, the base distinguished name (DN), and the list=20
   of attributes to return.=20
   =20
   The method returns the entry specified by the base DN.=20
   =20
   =20
   Parameters are:=20
   =20
      dn             Distinguished name of the entry to retrieve.=20
      =20
      cons           Constraints specific to the operation.=20
      =20
      attrs          Names of attributes to retrieve.=20
      =20
      toGet           LDAP URL specifying the entry to read.=20
      =20
   Note: read is simply a helper method and uses the ldap search=20
   operation to achieve the results. As such, there is no asynchronous=20
   interface.=20
   =20
   =20
   =20
4.6.33 rename=20
   =20
   public void rename(String dn,=20
                      String newRdn,=20
                      boolean deleteOldRdn)=20
                      throws LDAPException=20
   =20
   public void rename(String dn,=20
                      String newRdn,=20
                      boolean deleteOldRdn,=20
                      LDAPConstraints cons)=20
                      throws LDAPException=20
   =20
   public LDAPResponseListener rename(String dn,=20
                      String newRdn,=20
                      boolean deleteOldRdn,=20
                      LDAPResponseListener listener)=20
                      throws LDAPException=20
   =20
   public LDAPResponseListener rename(String dn,=20
                      String newRdn,=20
                      boolean deleteOldRdn,=20
                      LDAPResponseListener listener,=20
                      LDAPConstraints cons)=20
                      throws LDAPException=20
   =20
   Renames an existing entry in the directory.=20
   =20
 =20
Expires May, 2001                                            [Page 45]=20
=0C
JAVA LDAP API                                            November 2000=20
=20
=20
   =20
   public void rename(String dn,=20
                      String newRdn,=20
                      String newParentdn,=20
                      boolean deleteOldRdn)=20
                      throws LDAPException=20
   =20
   public void rename(String dn,=20
                      String newRdn,=20
                      String newParentdn,=20
                      boolean deleteOldRdn,=20
                      LDAPConstraints cons)=20
                      throws LDAPException=20
   =20
   public LDAPResponseListener rename(String dn,=20
                      String newRdn,=20
                      boolean deleteOldRdn)=20
                      String newParentdn,=20
                      LDAPResponseListener listener)=20
                      throws LDAPException=20
   =20
   public LDAPResponseListener rename(String dn,=20
                      String newRdn,=20
                      String newParentdn,=20
                      boolean deleteOldRdn,=20
                      LDAPResponseListener listener,=20
                      LDAPConstraints cons)=20
                      throws LDAPException=20
   =20
   Renames an existing entry in the directory, possibly repositioning it=20
   in the directory tree.=20
   =20
   Parameters are:=20
   =20
      dn             Current distinguished name of the entry.=20
      =20
      newRdn         New relative distinguished name for the entry.=20
      =20
      newParentdn    Distinguished name of the existing entry which is=20
                      to be the new parent of the entry.=20
      =20
      deleteOldRdn   If true, the old name is not retained as an=20
                      attribute value.=20
   =20
      listener       Handler for messages returned from a server in=20
                      response to this request. If it is null, a=20
                      listener object is created internally.=20
      =20
      cons           Constraints specific to the operation.=20
   =20
   =20

 =20
Expires May, 2001                                            [Page 46]=20
=0C
JAVA LDAP API                                            November 2000=20
=20
=20
4.6.34 search=20
   =20
   public LDAPSearchResults search(String base,=20
                                   int scope,=20
                                   String filter,=20
                                   String[] attrs,=20
                                   boolean typesOnly)=20
                                   throws LDAPException=20
   =20
   public LDAPSearchListener search(String base,=20
                                    int scope,=20
                                    String filter,=20
                                    String[] attrs,=20
                                    boolean typesOnly,=20
                                    LDAPSearchListener listener)=20
                                    throws LDAPException=20
   =20
   Performs the search specified by the parameters.=20
   =20
   =20
   public LDAPSearchResults search(String base,=20
                                   int scope,=20
                                   String filter,=20
                                   String[] attrs,=20
                                   boolean typesOnly,=20
                                   LDAPSearchConstraints cons)=20
                                   throws LDAPException=20
   =20
   public LDAPSearchListener search(String base,=20
                                    int scope,=20
                                    String filter,=20
                                    String[] attrs,=20
                                    boolean typesOnly,=20
                                    LDAPSearchListener listener,=20
                                    LDAPSearchConstraints cons)=20
                                    throws LDAPException=20
   =20
   Performs the search specified by the parameters, also allowing=20
   specification of constraints for the search (such as the maximum=20
   number of entries to find or the maximum time to wait for search=20
   results).=20
   =20
   As part of the search constraints, the function allows specifying=20
   whether or not the results are to be delivered all at once or in=20
   smaller batches. If specified that the results are to be delivered in=20
   smaller batches, each iteration blocks only until the next batch of=20
   results is returned.=20
   =20
   =20
   public static LDAPSearchResults search(LDAPUrl toGet)=20
   throws LDAPException=20
   =20
 =20
Expires May, 2001                                            [Page 47]=20
=0C
JAVA LDAP API                                            November 2000=20
=20
=20
   Performs the search specified by the LDAP URL, returning an=20
   enumerable LDAPSearchResults object.=20
   =20
   =20
   public static LDAPSearchResults search(LDAPUrl toGet,=20
                                          LDAPSearchConstraints cons)=20
                                          throws LDAPException=20
   =20
   Perfoms the search specified by the LDAP URL. This method also allows=20
   specifying constraints for the search (such as the maximum number of=20
   entries to find or the maximum time to wait for search results).=20
   =20
   When this method is called, a new connection is created=20
   automatically, using the host and port specified in the URL. After=20
   all search results have been received from the server, the method=20
   closes the connection (in other words, it disconnects from the LDAP=20
   server).=20
   =20
   As part of the search constraints, a choice can be made as to whether=20
   to have the results delivered all at once or in smaller batches. If=20
   the results are to be delivered in smaller batches, each iteration=20
   blocks only until the next batch of results is returned.=20
   =20
   =20
   Parameters are:=20
   =20
      base           The base distinguished name to search from.=20
      =20
      scope          The scope of the entries to search. The following=20
                      are the valid options:=20
   =20
             SCOPE_BASE   Search only the base DN=20
             =20
             SCOPE_ONE    Search only entries under the base DN=20
             =20
             SCOPE_SUB    Search the base DN and all entries within=20
                           its subtree=20
   =20
      filter         Search filter specifying the search criteria, as=20
                      defined in [3]. The value null can be passed to=20
                      indicate that the filter "(objectclass=3D*)" which=20
                      matches all entries is to be used.=20
      =20
      attrs          Names of attributes to retrieve.=20
      =20
      typesOnly      If true, returns the names but not the values of=20
                      the attributes found.  If false, returns the=20
                      names and values for attributes found.=20
      =20
      toGet          LDAP URL specifying the entry to read.=20
      =20

 =20
Expires May, 2001                                            [Page 48]=20
=0C
JAVA LDAP API                                            November 2000=20
=20
=20
      listener       Handler for messages returned from a server in=20
                      response to this request. If it is null, a=20
                      listener object is created internally.=20
      =20
      cons           Constraints specific to the search.=20
   =20
   =20
4.6.35 setConstraints=20
   =20
   public void setConstraints(LDAPConstraints cons)=20
   =20
   Sets the constraints that apply to all operations performed through=20
   this connection (unless a different set of constraints is specified=20
   when calling an operation method).=20
   =20
   =20
4.6.36 setInputStream=20
   =20
   public void setInputStream(InputStream stream)=20
   =20
   Sets the stream used by the connection object for receiving data from=20
   the LDAP server.=20
   =20
   =20
4.6.37 setOutputStream=20
   =20
   public void setOutputStream(OutputStream stream)=20
   =20
   Sets the stream used by the connection object to send data to the=20
   LDAP server.=20
   =20
   =20
4.6.38 setProperty=20
   =20
   public void setProperty(String name, Object value)=20
        throws LDAPException=20
   =20
   Sets a property of a connection object.=20
   =20
   No property names have been defined at this time, but the mechanism=20
   is in place in order to support revisional as well as dynamic=20
   extensions to operation modifiers.=20
   =20
   Parameters are:=20
      =20
      name           Name of the property to set.=20
      =20
      value          Value to assign to the property.=20
                      An LDAPException is thrown if the specified=20
                      property is not supported.=20
   =20

 =20
Expires May, 2001                                            [Page 49]=20
=0C
JAVA LDAP API                                            November 2000=20
=20
=20
4.6.39 setSearchConstraints=20
   =20
   public void setSearchConstraints(LDAPSearchConstraints cons)=20
   =20
   Sets the constraints that apply to all search operations performed=20
   through this connection (unless a different set of constraints is=20
   specified when calling a search operation method).=20
   =20
   Typically, the setSearchConstraints method is used to create a=20
   slightly different set of search constraints to apply to a particular=20
   search.=20
   =20
   =20
4.6.40 setSocketFactory=20
   =20
   public static void setSocketFactory(LDAPSocketFactory factory)=20
   =20
   Establishes the default LDAPSocketFactory used when LDAPConnection=20
   objects are constructed unless an LDAPSocketFactory is specified in=20
   the LDAPConnection object constructor.=20
     =20
   This method sets the default LDAPSocketFactory used for all=20
   subsequent LDAPConnection objects constructed. If called after=20
   LDAPConnection objects are created, those already created are not=20
   affected even if they disconnect and establish a new connection. It=20
   affects LDAPConnection objects only as they are constructed.=20
   =20
   A typical usage would be:=20
   =20
       if (usingTLS) {=20
           LDAPConnection.setSocketFactory(myTLSFactory);=20
       }=20
       ...=20
       LDAPConnection conn =3D new LDAPConnection();=20
       conn.connect(myHost, myPort);=20
   =20
   In this example, connections are constructed with the default=20
   LDAPSocketFactory.  At application start-up time, the default may be=20
   set to use a particular provided TLS socket factory.=20
   =20
   Parameters are:=20
   =20
      factory        A factory object which can construct socket=20
                      connections for an LDAPConnection.=20
   =20
   =20
4.6.41 setUnsolicitedNotifications=20
   =20
   public void setUnsolicitedNotifications (boolean allow)=20
   =20
   Enables or disables the processing of unsolicited messages from the=20
   server. An unsolicited message has the ID 0. If unsolicited=20
 =20
Expires May, 2001                                            [Page 50]=20
=0C
JAVA LDAP API                                            November 2000=20
=20
=20
   notifications are enabled, unsolicited messages can be queried and=20
   retrieved from a response listener with isResponseReceived(0) and=20
   getResponse(0). The default is for unsolicited messages to be=20
   discarded.=20
   =20
   Parameters are:=20
   =20
      allow          If true, keep unsolicited notifications and make=20
                      them available as message ID 0.=20
   =20
   =20
4.6.42 startTLS=20
   =20
   public void startTLS()=20
   =20
   Begin using the Transport Layer Security (TLS) protocol for session=20
   privacy [10]. If the socket factory of the connection is not capable=20
   of initiating a TLS session, an LDAPException is thrown with the=20
   error code TLS_NOT_SUPPORTED. If the server does not support the=20
   transition to a TLS session, an LDAPException is thrown with the=20
   error code UNWILLING_TO_PERFORM.=20
   =20
   =20
4.6.43 Constants of LDAPConnection=20
   =20
      ALL_USER_ATTRS ("*")     Used with search instead of an attribute=20
                      list to indicate that all attributes are to be=20
                      returned.=20
      =20
      NO_ATTRS ("1.1")  Used with search instead of an attribute list=20
                      to indicate that no attributes are to be=20
                      returned.=20
      =20
      DEFAULT_PORT (389) Used on connect to indicate the default LDAP=20
                      port number.=20
      =20
      SCOPE_BASE (0) Used with search to indicate that only the entry=20
                      corresponding to the base DN is to be returned.=20
      =20
      SCOPE_ONE (1)  Used with search to indicate that only immediate=20
                      subordinates of the entry corresponding to the=20
                      base DN, and not the entry corresponding to the=20
                      base DN, are to be returned.=20
      =20
      SCOPE_SUB (2)  Used with search to indicate that the entry=20
                      corresponding to the base DN as well as all=20
                      direct and indirect subordinate entries are to be=20
                      returned.=20
   =20
   =20
4.7 public class public class LDAPConstraints=20
   =20
 =20
Expires May, 2001                                            [Page 51]=20
=0C
JAVA LDAP API                                            November 2000=20
=20
=20
   A set of options to control any operation. There is always an=20
   LDAPConstraints associated with an LDAPConnection object; its=20
   values can be changed with LDAPConnection.setConstraints, or=20
   overridden by passing an LDAPConstraints object to an operation.=20
   =20
   =20
4.7.1 Constructors=20
   =20
   public LDAPConstraints()=20
   =20
   Constructs an LDAPConstraints object that specifies the default=20
   set of constraints.=20
   =20
   =20
   public LDAPConstraints(int msLimit,=20
                          boolean doReferrals,=20
                          LDAPReferralHandler binder,=20
                          int hop_limit)=20
   =20
   Constructs a new LDAPConstraints object and allows specifying=20
   the operational constraints in that object.=20
   =20
   Parameters are:=20
   =20
      msLimit         Maximum time in milliseconds to wait for results=20
                      (0 by default, which means that there is no=20
                      maximum time limit). This is an interface-imposed=20
                      limit.=20
      =20
      doReferrals     Specify true to follow referrals automatically,=20
                      or false to throw an LDAPReferralException error=20
                      if the server sends back a referral (false by=20
                      default). It is ignored for asynchronous=20
                      operations.=20
      =20
      binder         Custom authentication processor, called when the=20
                      LDAPConnection needs to authenticate, typically=20
                      on following a referral. null may be specified to=20
                      indicate default authentication processing. The=20
                      object may implement either the LDAPBind or the=20
                      LDAPRebind interface. It is ignored for=20
                      asynchronous operations.=20
      =20
      hop_limit       Maximum number of referrals to follow in a=20
                      sequence when attempting to resolve a request,=20
                      when doing automatic referral following. It is=20
                      ignored for asynchronous operations.=20
   =20
   =20
4.7.2 getHopLimit=20
   =20
   public int getHopLimit()=20
 =20
Expires May, 2001                                            [Page 52]=20
=0C
JAVA LDAP API                                            November 2000=20
=20
=20
   =20
   Returns the maximum number of hops to follow during automatic=20
   referral following.=20
   =20
   =20
4.7.3 getReferralHandler=20
   =20
   public LDAPReferralHandler getReferralHandler()=20
   =20
   Returns an object that can process authentication. It may be null.=20
   =20
   =20
4.7.4 getReferralFollowing=20
   =20
   public boolean getReferralFollowing()=20
   =20
   Specifies whether or not referrals are followed automatically.=20
   Returns true if referrals are to be followed automatically, or false=20
   if referrals throw an LDAPReferralException.=20
   =20
   =20
4.7.5 getTimeLimit=20
   =20
   public int getTimeLimit()=20
   =20
   Returns the maximum number of milliseconds the client waits for any=20
   operation under these constraints. If 0, there is no maximum time=20
   limit on waiting for the operation results. The actual granularity of=20
   the timeout depends on the implementation.=20
   =20
4.7.6 setHopLimit=20
   =20
   public void setHopLimit(int hop_limit)=20
   =20
   Sets the maximum number of hops to follow in sequence during=20
   automatic referral following. The default is 10. 0 means no limit.=20
   =20
   Parameters are:=20
   =20
      hop_limit      Maximum number of chained referrals to follow=20
                      automatically.=20
   =20
   =20
4.7.7 setReferralHandler=20
   =20
   public void setReferralHandler (LDAPReferralHandler binder)=20
   =20
   Specifies the object that will process authentication requests. The=20
   default is null.=20
   =20
   Parameters are:=20
   =20
 =20
Expires May, 2001                                            [Page 53]=20
=0C
JAVA LDAP API                                            November 2000=20
=20
=20
      binder         An object that implements LDAPBind or LDAPRebind.=20
   =20
   =20
4.7.8 setReferralFollowing=20
   =20
   public void setReferralFollowing(boolean doReferrals)=20
   =20
   Specifies whether nor not referrals are followed automatically, or if=20
   referrals throw an LDAPReferralException.  Referrals of any type=20
   other than to an LDAP server (i.e. a referral URL other than=20
   ldap://something) are ignored on automatic referral following. The=20
   default is false.=20
   =20
   Parameters are:=20
   =20
      doReferrals    True to follow referrals automatically.=20
   =20
   =20
4.7.9 setTimeLimit=20
   =20
   public void setTimeLimit(int msLimit)=20
   =20
   Sets the maximum number of milliseconds to wait for any operation=20
   under these constraints. If 0, there is no maximum time limit=20
   on waiting for the operation results. The actual granularity of the=20
   timeout depends on the implementation.=20
   =20
   Parameters are:=20
   =20
      msLimit        Maximum milliseconds to wait.=20
   =20
   =20
4.7.10 getClientControls=20
   =20
   public LDAPControl[] getClientControls() =20
   =20
   Returns controls to be used by the interface. =20
   =20
     =20
4.7.11 getServerControls=20
   =20
   public LDAPControl[] getServerControls() =20
   =20
   Returns controls to be sent to the server. =20
     =20
   =20
4.7.12 setClientControls=20
   =20
   public void setClientControls( LDAPControl control ) =20
   =20
   public void setClientControls( LDAPControl[] controls ) =20
   =20
 =20
Expires May, 2001                                            [Page 54]=20
=0C
JAVA LDAP API                                            November 2000=20
=20
=20
   Sets controls for use by the interface. =20
   =20
   Parameters are: =20
   =20
      control        A single client control. =20
      =20
      controls       An array of client controls. =20
     =20
   =20
4.7.13 setServerControls=20
   =20
   public void setServerControls( LDAPControl control ) =20
   =20
   public void setServerControls( LDAPControl[] controls ) =20
   =20
   Sets controls to be sent to the server. =20
   =20
   Parameters are: =20
   =20
      control        A single control to be sent to the server. =20
      =20
      controls       An array of controls to be sent to the server. =20
     =20
   =20
4.8 public class LDAPControl=20
                 implements Cloneable=20
   =20
   An LDAPControl encapsulates optional additional parameters or=20
   constraints to be applied to LDAP operations. If set as a Server=20
   Control, it is sent to the server along with operation requests. If=20
   set as a Client Control, it is not sent to the server, but rather=20
   interpreted locally by the client. LDAPControl is an LDAPv3=20
   extension, and is not supported in an LDAPv2 environment.=20
   =20
   =20
4.8.1 Constructors=20
   =20
   public LDAPControl(String id,=20
                      boolean critical,=20
                      byte[] vals)=20
   =20
   Parameters are:=20
   =20
      id             The type of the Control, as a string.=20
      =20
      critical       True if the LDAP operation should be discarded if=20
                      the server does not support this Control.=20
      =20
      vals           Control-specific data.=20
   =20
   =20

 =20
Expires May, 2001                                            [Page 55]=20
=0C
JAVA LDAP API                                            November 2000=20
=20
=20
4.8.2 clone=20
   =20
   public Object clone()=20
   =20
   Returns a deep copy of the object.=20
   =20
   =20
4.8.3 getID=20
   =20
   public String getID()=20
   =20
   Returns the identifier of the control.=20
   =20
   =20
4.8.4 getValue=20
   =20
   public byte[] getValue()=20
   =20
   Returns the control-specific data of the object.=20
   =20
   =20
4.8.5 isCritical=20
   =20
   public boolean isCritical()=20
   =20
   Returns true if the control must be supported for an associated=20
   operation to be executed.=20
   =20
   =20
4.8.6 newInstance=20
   =20
   public static LDAPControl newInstance(byte[] data)=20
   =20
   Instantiates a control, given the raw data representing it in an LDAP=20
   message.=20
   =20
   =20
4.8.7 register =20
   =20
   public static void register(String oid, Class controlClass)=20
   =20
   Registers a class to be instantiated on receipt of a control with the=20
   given oid. Any previous registration for the oid is overridden. The=20
   controlClass must be an extension of LDAPControl.=20
   =20
   Parameters are:=20
   =20
      oid            The Object Identifier of the Control.=20
      =20
      controlClass   A class which can instantiate an LDAPControl.=20
      =20
      =20
 =20
Expires May, 2001                                            [Page 56]=20
=0C
JAVA LDAP API                                            November 2000=20
=20
=20
4.8.8 setValue=20
   =20
   protected void setValue(byte[] value)=20
   =20
   Sets the control-specific data of the object. This method is for use=20
   by extensions of LDAPControl.=20
   =20
   Parameters are:=20
   =20
      value          The value to be assigned to the Control.=20
   =20
   =20
4.9 public class LDAPDITContentRuleSchema=20
                extends LDAPSchemaElement=20
   =20
   The LDAPDITContentRuleSchema class represents the definition of a DIT=20
   Content Rule. It is used to discover or modify additional auxiliary=20
   classes, mandatory and optional attributes, and restricted attributes=20
   in effect for an object class. See [2] for a description of DIT=20
   content rule representation in LDAP.=20
   =20
4.9.1 Constructors=20
   =20
   public LDAPDITContentRuleSchema(String name,=20
                                   String oid,=20
                                   String description,=20
                                   boolean obsolete,=20
                                   String[] auxiliary,=20
                                   String[] required,=20
                                   String[] optional,=20
                                   String[] precluded,=20
                                   String[] aliases)=20
   =20
   Constructs a DIT content rule for adding to or deleting from the=20
   schema.=20
   =20
   =20
   public LDAPDITContentRuleSchema(String raw)=20
   =20
   Constructs a DIT content rule from the raw String value returned on a=20
   schema query for "dITContentRules".=20
   =20
   Parameters are:=20
   =20
      name               Name of the content rule.=20
      =20
      oid                Unique Object Identifier of the content rule -=20
                         in dotted numerical format.=20
      =20
      description        Optional description of the content rule.=20
      =20
      obsolete           true if the content rule is obsolete. =20
 =20
Expires May, 2001                                            [Page 57]=20
=0C
JAVA LDAP API                                            November 2000=20
=20
=20
      =20
      auxiliary          A list of auxiliary object classes allowed for=20
                         an entry to which this content rule applies.=20
                         These may either be specified by name or=20
                         numeric oid.=20
      =20
      required           A list of user attribute types that an entry=20
                         to which this content rule applies must=20
                         contain in addition to its normal set of=20
                         mandatory attributes. These may either be=20
                         specified by name or numeric oid.=20
      =20
      optional           A list of user attribute types that an entry=20
                         to which this content rule applies may contain=20
                         in addition to its normal set of optional=20
                         attributes. These may either be specified by=20
                         name or numeric oid.=20
       =20
      precluded          A list, consisting of a subset of the optional=20
                         user attribute types of the structural and=20
                         auxiliary object classes which are precluded=20
                         from an entry to which this content rule=20
                         applies. These may either be specified by name=20
                         or numeric oid.=20
      =20
      aliases            Optional list of additional names by which the=20
                         content rule may be known; null if there are=20
                         no aliases.=20
      =20
      =20
      raw                The raw String value returned on a Directory=20
                         query for "dITContentRules".=20
   =20
4.9.2 getAuxiliaryClasses=20
   =20
   public String[] getAuxiliaryClasses()=20
   =20
   Returns the list of allowed auxiliary classes.=20
   =20
4.9.3 getRequiredAttributes=20
   =20
   public String[] getRequiredAttributes()=20
   =20
   Returns the list of additional required attributes for an entry=20
   controlled by this content rule.=20
    =20
4.9.4 getOptionalAttributes=20
   =20
   public String[] getOptionalAttributes()=20
   =20
   Returns the list of additional optional attributes for an entry=20
   controlled by this content rule.=20
 =20
Expires May, 2001                                            [Page 58]=20
=0C
JAVA LDAP API                                            November 2000=20
=20
=20
    =20
4.9.5 getPrecludedAttributes=20
   =20
   public String[]getPrecludedAttributes()=20
   =20
   Returns the list of precluded attributes for an entry controlled by=20
   this content rule.=20
      =20
   =20
4.10 public class LDAPDITStructureRuleSchema=20
                extends LDAPSchemaElement=20
   =20
   The LDAPDITStructureRuleSchema class represents the definition of a=20
   DIT Structure Rule. It is used to discover or modify which object=20
   classes a particular object class may be subordinate to in the DIT.=20
   See [2] for a description of DIT structure rule representation in=20
   LDAP.=20
   =20
4.10.1 Constructors=20
   =20
   public LDAPDITStructureRuleSchema(String name,=20
                                     int ruleID,=20
                                     String description,=20
                                     boolean obsolete,=20
                                     String nameForm,=20
                                     String[] superiorIDs,=20
                                     String[] aliases)=20
   =20
   Constructs a DIT structure rule for adding to or deleting from the=20
   schema.=20
   =20
   =20
   public LDAPDITStructureRuleSchema(String raw)=20
   =20
   Constructs a DIT structure rule from the raw String value returned on=20
   a schema query for "dITStructureRules".=20
   =20
   Parameters are:=20
   =20
      name               Name of the structure rule.=20
      =20
      ruleID             Unique identifier of the structure rule. NOTE:=20
                         this is an integer, not a dotted numerical=20
                         identifier. Structure rules aren't identified=20
                         by OID.=20
      =20
      description        Optional description of the structure rule.=20
      =20
      obsolete           true if the structure rule is obsolete. =20
      =20


 =20
Expires May, 2001                                            [Page 59]=20
=0C
JAVA LDAP API                                            November 2000=20
=20
=20
      nameForm           Either the identifier or name of a name form.=20
                         This is used to indirectly refer to the object=20
                         class that this structure rule applies to.=20
      =20
      superiorIDs        List of superior structure rules - specified=20
                         by their integer ID. The object class=20
                         specified by this structure rule (via the=20
                         nameForm parameter) may only be subordinate in=20
                         the DIT to object classes of those represented=20
                         by the structure rules here; may be null.=20
      =20
      aliases            Optional list of additional names by which the=20
                         structure rule may be known; null if there are=20
                         no aliases.=20
      =20
      raw                The raw String value returned on a Directory=20
                         query for "dITStructureRules".=20
      =20
4.10.2 getRuleID=20
   =20
   public int getRuleID()=20
   =20
   Returns the rule ID for this structure rule. Note that this returns=20
   an integer rather than a dotted decimal OID. Objects of this class do=20
   not have an OID, thus getID will return null.=20
   =20
4.10.3 getNameForm=20
   =20
   public String getNameForm()=20
   =20
   Returns the NameForm that this structure rule controls. You can get=20
   the actual object class that this structure rule controls by calling=20
   getNameForm().getObjectClass().=20
    =20
4.10.4 getSuperiors=20
   =20
   public String[] getSuperiors()=20
   =20
   Returns a list of all structure rules that are superior to this=20
   structure rule. To resolve to an object class, you need to first=20
   resolve the superior id to another structure rule, then call=20
   getNameForm().getObjectClass() on that structure rule.=20
   =20
   =20
4.11 public class LDAPDN=20
   =20
   A utility class representing a distinguished name (DN).=20
   =20
   =20
4.11.1 equals=20
   =20
   public static boolean equals(String dn1, String dn2)=20
 =20
Expires May, 2001                                            [Page 60]=20
=0C
JAVA LDAP API                                            November 2000=20
=20
=20
   =20
   Returns true if the two strings correspond to the same DN, after=20
   appropriate normalization.=20
   =20
   Parameters are:=20
   =20
      dn1            String form of first DN to compare.=20
      =20
      dn2            String form of second DN to compare.=20
      =20
   =20
4.11.2 escapeRDN=20
   =20
   public static String escapeRDN(String rdn)=20
   =20
   Returns the RDN after escaping the characters requiring escaping [4].=20
   For example, for the rdn =93cn=3DAcme, Inc=94, =93cn=3DAcme\, Inc=94 i=
s returned.=20
   =20
   Parameters are:=20
   =20
      rdn            The RDN to escape.=20
      =20
   =20
4.11.3 unescapeRDN=20
   =20
   public static String unescapeRDN(String rdn)=20
   =20
   Returns the RDN after unescaping the characters requiring escaping=20
   [4]. For example, for the rdn =93cn=3DAcme\, Inc=94, =93cn=3DAcme, Inc=
=94 is=20
   returned.=20
   =20
   Parameters are:=20
   =20
      rdn            The RDN to unescape.=20
      =20
   =20
4.11.4 explodeDN=20
   =20
   public static String[] explodeDN(String dn,=20
                                    boolean noTypes)=20
   =20
   Returns the individual components of a distinguished name (DN).=20
   =20
   Parameters are:=20
   =20
      dn             Distinguished name, e.g. "cn=3DBabs=20
                      Jensen,ou=3DAccounting,o=3DAcme,c=3Dus"=20
      =20
      noTypes        If true, returns only the values of the=20
                      components, and not the names, e.g. "Babs=20
                      Jensen", "Accounting", "Acme", "us" - instead of=20

 =20
Expires May, 2001                                            [Page 61]=20
=0C
JAVA LDAP API                                            November 2000=20
=20
=20
                      "cn=3DBabs Jensen", "ou=3DAccounting", "o=3DAcme", =
and=20
                      "c=3Dus".=20
   =20
   =20
4.11.5 explodeRDN=20
   =20
   public static String[] explodeRDN(String rdn,=20
                                     boolean noTypes)=20
   =20
   Returns the individual components of a relative distinguished name=20
   (RDN).=20
   =20
   Parameters are:=20
   =20
      rdn            Relative distinguished name, i.e. the left-most=20
                      component of a distinguished name.=20
      =20
      noTypes        If true, returns only the values of the=20
                      components, and not the names.=20
      =20
   =20
4.12 public class LDAPEntry=20
   =20
   An LDAPEntry represents a single entry in a directory, consisting of=20
   a distinguished name (DN) and zero or more attributes. An instance of=20
   LDAPEntry is created in order to add an entry to a Directory, and=20
   instances are returned on a search by either enumerating an=20
   LDAPSearchResults, or calling LDAPSearchResult.getEntry.=20
   =20
   =20
4.12.1 Constructors=20
   =20
   public LDAPEntry()=20
   =20
   Constructs an empty entry.=20
   =20
   public LDAPEntry(String dn)=20
   =20
   Constructs a new entry with the specified distinguished name and with=20
   an empty attribute set.=20
   =20
   =20
   public LDAPEntry(String dn,=20
                    LDAPAttributeSet attrs)=20
   =20
   Constructs a new entry with the specified distinguished name and set=20
   of attributes.=20
   =20
   Parameters are:=20
   =20
      dn             The distinguished name of the new entry. The=20
                      value is not validated. An invalid distinguished=20
 =20
Expires May, 2001                                            [Page 62]=20
=0C
JAVA LDAP API                                            November 2000=20
=20
=20
                      name will cause adding of the entry to a=20
                      directory to fail.=20
      =20
      attrs          The initial set of attributes assigned to the=20
                      entry.=20
   =20
   =20
4.12.2 getAttribute=20
   =20
   public LDAPAttribute[] getAttribute(String attrName)=20
   =20
   Returns the attributes matching the specified attrName.=20
   =20
   Parameters are:=20
   =20
      attrName       The name of the attribute or attributes to=20
                      return. See 4.3.5for the syntax and semantics=20
                      relevant to this parameter.=20
   =20
   =20
4.12.3 getAttributeSet=20
   =20
   public LDAPAttributeSet getAttributeSet()=20
   =20
   Returns the attribute set of the entry. All base and subtype variants=20
   of all attributes are returned. The LDAPAttributeSet returned may be=20
   empty if there are no attributes in the entry.=20
   =20
   =20
   public LDAPAttributeSet getAttributeSet(String subtype)=20
   =20
   Returns an attribute set from the entry, consisting of only those=20
   attributes matching the specified subtype(s). This may be used to=20
   extract only a particular language variant subtype of each attribute,=20
   if it exists. "subtype" may be, for example, "lang-ja", "binary", or=20
   "lang-ja;phonetic". If more than one subtype is specified, separated=20
   with a semicolon, only those attributes with all of the named=20
   subtypes will be returned.  The LDAPAttributeSet returned may be=20
   empty if there are no matching attributes in the entry.=20
   =20
   Parameters are:=20
   =20
      subtype        One or more subtype specification(s), separated=20
                      with semicolons.  "lang-ja" and=20
                      "lang-en;phonetic" are valid subtype=20
                      specifications.=20
   =20
   =20
4.12.4 getDN=20
   =20
   public String getDN()=20
   =20
 =20
Expires May, 2001                                            [Page 63]=20
=0C
JAVA LDAP API                                            November 2000=20
=20
=20
   Returns the distinguished name of the entry.=20
   =20
   =20
4.13 public interface LDAPEntryComparator=20
   =20
   An object of this class can implement arbitrary sorting algorithms=20
   for search results.=20
   =20
   =20
4.13.1 isGreater=20
   =20
   public boolean isGreater(LDAPEntry entry1, LDAPEntry entry2)=20
   =20
   Returns true if entry1 is to be considered greater than or equal to=20
   entry2, for the purpose of sorting.=20
   =20
   Parameters are:=20
   =20
      entry1         Target entry for comparison.=20
      =20
      entry2         Entry to be compared to.=20
   =20
   =20
4.14 public class LDAPException=20
                  extends Exception=20
   =20
   Thrown to indicate that an error has occurred. An LDAPException can=20
   result from physical problems (such as network errors) as well as=20
   problems with LDAP operations (for example, if the LDAP add operation=20
   fails because of a duplicate entry).=20
   =20
   Most errors that occur throw this type of exception.  The=20
   getLDAPResultCode() method returns the specific result code, which=20
   can be compared against standard LDAP result codes as defined in [5],=20
   section 4.=20
   =20
   =20
4.14.1 Constructors=20
   =20
   public LDAPException()=20
   =20
   Constructs a default exception with no specific error information.=20
   =20
   =20
   public LDAPException(String message,=20
                        int resultCode)=20
   =20
   Constructs an exception with a result code and a specified string as=20
   additional information.=20
   =20
   public LDAPException(String message,=20
                        int resultCode,=20
 =20
Expires May, 2001                                            [Page 64]=20
=0C
JAVA LDAP API                                            November 2000=20
=20
=20
                        String matchedDN)=20
   =20
   Constructs an exception with a result code, a specified string as=20
   additional information, and the maximal subset of a specified DN=20
   which could be matched by the server on a search operation.=20
   =20
   =20
   Parameters are:=20
   =20
      message        The additional error information=20
      =20
      resultCode     The result code returned=20
   =20
      matchedDN      The maximal subset of a specified DN which could=20
                      be matched by the server on a search operation=20
   =20
   =20
4.14.2 errorCodeToString=20
   =20
   public String errorCodeToString()=20
   =20
   Returns a String representing the internal error code, in the default=20
   Locale.=20
   =20
   =20
   public static String errorCodeToString( int code )=20
   =20
   Returns a String representing an arbitrary error code, in the default=20
   Locale, or null if there is no such code.=20
   =20
   =20
   public String errorCodeToString( Locale locale )=20
   =20
   Returns a String representing the internal error code, in the=20
   specified Locale, or null if a String representation is not available=20
   for the requested Locale.=20
   =20
   =20
   public static String errorCodeToString( int code, Locale locale )=20
   =20
   Returns a String representing an arbitrary error code, in the=20
   specified Locale, or null if there is no such code or if a String=20
   representation is not available for the requested Locale.=20
   =20
   =20
   Parameters are:=20
   =20
      code           One of the error codes listed in "Result codes"=20
                      below.=20
      =20
      locale         A Locale in which to render the error String.=20
   =20
 =20
Expires May, 2001                                            [Page 65]=20
=0C
JAVA LDAP API                                            November 2000=20
=20
=20
   =20
4.14.3 getLDAPErrorMessage=20
   =20
   public String getLDAPErrorMessage()=20
   =20
   Returns the error message, if this message is available (that is, if=20
   this message was set). If the message was not set, this method=20
   returns null.=20
   =20
   =20
4.14.4 getLDAPResultCode=20
   =20
   public int getLDAPResultCode()=20
   =20
   Returns the result code from the exception. The codes are defined as=20
   public final static int members of this class. If the exception is a=20
   result of error information returned from a directory operation, the=20
   code will be one of those defined in [5]. Otherwise, a local error=20
   code is returned (see "Result codes" below).=20
   =20
   =20
4.14.5 getMatchedDN=20
   =20
   public String getMatchedDN()=20
   =20
   Returns the part of a submitted distinguished name which could be=20
   matched by the server. If the exception was caused by a local error,=20
   such as no server available, the return value is null. If the=20
   exception resulted from an operation being executed on a server, the=20
   value is an empty String except when the result of the operation was=20
   one of the following:=20
   =20
      NO_SUCH_OBJECT=20
      ALIAS_PROBLEM=20
      INVALID_DN_SYNTAX=20
      ALIAS_DEREFERENCING_PROBLEM=20
   =20
   =20
4.14.6 Result codes=20
   =20
   See [5] for a discussion of the meanings and values of the codes. The=20
   corresponding ASN.1 name from [5] is provided in parentheses.=20
   =20
        ADMIN_LIMIT_EXCEEDED (adminLimitExceeded)=20
        AFFECTS_MULTIPLE_DSAS (affectsMultipleDSAs)=20
        ALIAS_DEREFERENCING_PROBLEM (aliasDereferencingProblem)=20
        ALIAS_PROBLEM (aliasProblem)=20
        ATTRIBUTE_OR_VALUE_EXISTS (attributeOrValueExists)=20
        AUTH_METHOD_NOT_SUPPORTED (authMethodNotSupported)=20
        BUSY (busy)=20
        COMPARE_FALSE (compareFalse)=20
        COMPARE_TRUE (compareTrue)=20
 =20
Expires May, 2001                                            [Page 66]=20
=0C
JAVA LDAP API                                            November 2000=20
=20
=20
        CONFIDENTIALITY_REQUIRED (confidentialityRequired)=20
        CONSTRAINT_VIOLATION (constraintViolation)=20
        ENTRY_ALREADY_EXISTS (entryAlreadyExists)=20
        INAPPROPRIATE_AUTHENTICATION (inappropriateAuthentication)=20
        INAPPROPRIATE_MATCHING (inappropriateMatching)=20
        INSUFFICIENT_ACCESS_RIGHTS (insufficientAccessRights)=20
        INVALID_ATTRIBUTE_SYNTAX (invalidAttributeSyntax)=20
        INVALID_CREDENTIALS (invalidCredentials)=20
        INVALID_DN_SYNTAX (invalidDNSyntax)=20
        IS_LEAF (isLeaf)=20
        LDAP_PARTIAL_RESULTS=20
        LOOP_DETECT (loopDetect)=20
        NAMING_VIOLATION (namingViolation)=20
        NO_SUCH_ATTRIBUTE (noSuchAttribute)=20
        NO_SUCH_OBJECT (noSuchObject)=20
        NOT_ALLOWED_ON_NONLEAF (notAllowedOnNonLeaf)=20
        NOT_ALLOWED_ON_RDN (notAllowedOnRDN)=20
        OBJECT_CLASS_MODS_PROHIBITED (objectClassModsProhibited)=20
        OBJECT_CLASS_VIOLATION (objectClassViolation)=20
        OPERATIONS_ERROR (operationsError)=20
        OTHER (other)=20
        PROTOCOL_ERROR (protocolError)=20
        REFERRAL (referral)=20
        SASL_BIND_IN_PROGRESS (saslBindInProgress)=20
        SIZE_LIMIT_EXCEEDED (sizeLimitExceeded)=20
        STRONG_AUTH_REQUIRED (strongAuthRequired)=20
        SUCCESS (success)=20
        TIME_LIMIT_EXCEEDED (timeLimitExceeded)=20
        UNAVAILABLE (unavailable)=20
        UNAVAILABLE_CRITICAL_EXTENSION (unavailableCriticalExtension)=20
        UNDEFINED_ATTRIBUTE_TYPE (undefinedAttributeType)=20
        UNWILLING_TO_PERFORM (unwillingToPerform)=20
   =20
   Note: LDAP_PARTIAL_RESULTS (9) is not defined in [5], but is returned=20
   by a number of LDAP servers to LDAPv2 clients as an indication of a=20
   referral (subordinate reference).=20
   =20
   Local errors, resulting from actions other than an operation on a=20
   server, are among the following:=20
   =20
        AUTH_UNKNOWN (0x56)=20
        CLIENT_LOOP  (0x60)=20
        CONNECT_ERROR (0x5b)=20
        CONTROL_NOT_FOUND (0x5d)=20
        DECODING_ERROR (0x54)=20
        ENCODING_ERROR (0x53)=20
        FILTER_ERROR (0x57)=20
        LOCAL_ERROR (0x52)=20
        LDAP_NOT_SUPPORTED (0x5c)=20
        LDAP_TIMEOUT (0x55)=20
        MORE_RESULTS_TO_RETURN (0x5f)=20
        NO_MEMORY (0x5a)=20
 =20
Expires May, 2001                                            [Page 67]=20
=0C
JAVA LDAP API                                            November 2000=20
=20
=20
        NO_RESULTS_RETURNED (0x5e)=20
        PARAM_ERROR (0x59)=20
        REFERRAL_LIMIT_EXCEEDED (0x61)=20
        SERVER_DOWN (0x51)=20
        USER_CANCELLED (0x58)=20
        TLS_NOT_SUPPORTED (0x70)=20
   =20
   =20
4.15 public class LDAPExtendedOperation=20
   =20
   An LDAPExtendedOperation encapsulates an ID which uniquely identifies=20
   a particular extended operation, known to a particular server, and=20
   the data associated with the operation.=20
   =20
   =20
4.15.1 Constructors=20
   =20
   public LDAPExtendedOperation(String oid,=20
                                byte[] vals)=20
   =20
   Constructs a new object with the specified object ID and data.=20
   =20
   Parameters are:=20
   =20
      oid            The unique identifier of the operation.=20
      =20
      vals           The operation-specific data of the operation.=20
   =20
   =20
4.15.2 getID=20
   =20
   public String getID()=20
   =20
   Returns the unique identifier of the operation.=20
   =20
   =20
4.15.3 getValue=20
   =20
   public byte[] getValue()=20
   =20
   Returns the operation-specific data (not a copy, a reference).=20
   =20
   =20
4.15.4 setValue=20
   =20
   protected void setValue(byte[] value)=20
   =20
   Sets the operation-specific data of the object. This method is for=20
   use by extensions of LDAPExtendedOperation.=20
   =20
   Parameters are:=20
   =20
 =20
Expires May, 2001                                            [Page 68]=20
=0C
JAVA LDAP API                                            November 2000=20
=20
=20
      value          The value to be assigned to the object.=20
   =20
   =20
4.16 public class LDAPExtendedResponse=20
                  extends LDAPResponse=20
   =20
   An LDAPExtendedResponse object encapsulates a server response to an=20
   asynchronous extended operation request.=20
   =20
4.16.1 getID=20
   =20
   public String getID()=20
   =20
   Returns the OID of the response.=20
   =20
   =20
4.16.2 getValue=20
   =20
   public byte[] getValue()=20
   =20
   Returns the raw bytes of the value part of the response.=20
   =20
   =20
4.17 public interface LDAPListener=20
   =20
   Represents the message queue associated with a particular=20
   asynchronous LDAP operation or operations.=20
   =20
4.17.1 getMessageIDs=20
   =20
   public int[] getMessageIDs()=20
   =20
   Returns the message IDs for all outstanding requests, i.e. requests=20
   for which a response has not been received from the server or which=20
   still have messages to be retrieved with getResponse. The last ID in=20
   the array is the messageID of the latest submitted request.=20
   =20
4.17.2 getResponse=20
   =20
   public LDAPMessage getResponse()throws LDAPException=20
   =20
   Blocks until a response is available, or until all operations=20
   associated with the object have completed or been canceled, and=20
   returns the response.=20
   =20
   public LDAPMessage getResponse(int msgid)throws LDAPException=20
   =20
   Blocks until a response is available for a particular message id, or=20
   until all operations associated with the message id have completed or=20
   been canceled, and returns the response.=20
   =20
   Parameters are:=20
 =20
Expires May, 2001                                            [Page 69]=20
=0C
JAVA LDAP API                                            November 2000=20
=20
=20
   =20
      msgid              A particular message to query for responses=20
                         available.=20
   =20
   =20
4.17.3 isResponseReceived=20
   =20
   public boolean isResponseReceived()=20
   =20
   Reports true if any response has been received from the server and=20
   not yet retrieved with getResponse. If getResponse has been used to=20
   retrieve all messages received to this point, then isResponseReceived=20
   returns false.=20
   =20
   =20
   public boolean isResponseReceived(int msgid)=20
   =20
   Reports true if a response has been received from the server for a=20
   particular message id but not retrieved with getResponse.=20
   =20
   =20
   Parameters are:=20
   =20
      msgid              A particular message to query for responses=20
                         available.=20
   =20
4.17.4 merge=20
   =20
   public void merge(LDAPListener listener2)=20
   =20
   Merges two listeners. Moves/appends the content from another          =
 =20
   listener to this one.=20
   =20
   =20
4.18 public class LDAPMatchingRuleSchema=20
                  extends LDAPSchemaElement=20
   =20
   The LDAPMatchingRuleSchema class represents the definition of a=20
   matching rule. It is used to query matching rule syntax, and to add=20
   or delete a matching rule definition in a Directory. See [2] for a=20
   description of matching rule representation in LDAP.=20
   =20
   =20
4.18.1 Constructors=20
   =20
   public LDAPMatchingRuleSchema(String name,=20
                                 String oid,=20
                                 String description,=20
                                 String[] attributes,=20
                                 String syntaxString,=20
                                 String[] aliases)=20
   =20
 =20
Expires May, 2001                                            [Page 70]=20
=0C
JAVA LDAP API                                            November 2000=20
=20
=20
   public LDAPMatchingRuleSchema(String name,=20
                                 String oid,=20
                                 String description,=20
                                 boolean obsolete,=20
                                 String syntaxString,=20
                                 String[] aliases)=20
   =20
   Constructs a matching rule definition for adding to or deleting from=20
   a Directory.=20
   =20
   =20
   public LDAPMatchingRuleSchema(String rawMatchingRule,=20
                                 String rawMatchingRuleUse)=20
   =20
   Constructs a matching rule definition from the raw String values=20
   returned on a Directory query for "matchingRule" and for=20
   "matchingRuleUse" for the same rule.=20
   =20
   =20
   Parameters are:=20
   =20
      name               Name of the attribute.=20
      =20
      oid                Unique Object Identifier of the attribute - in=20
                         dotted numerical format.=20
      =20
      description        Optional description of the attribute.=20
      =20
      attributes         OIDs of attributes to which the rule applies.=20
                         The parameter may be null.=20
      =20
      obsolete           true if this matching rule is obsolete.=20
      =20
      syntaxString       Unique Object Identifier of the syntax that=20
                         this matching rule is valid for - in dotted=20
                         numerical format.=20
      =20
      aliases            Optional list of additional names by which the=20
                         matching rule may be known; null if there are=20
                         no aliases.=20
      =20
      rawMatchingRule    The raw String value returned on a Directory=20
                         query for "matchingRule".=20
      =20
      =20
      rawMatchingRuleUse The raw String value returned on a Directory=20
                         query for "matchingRuleUse". The parameter may=20
                         be null.=20
   =20
   =20
4.18.2 getAttributes=20
   =20
 =20
Expires May, 2001                                            [Page 71]=20
=0C
JAVA LDAP API                                            November 2000=20
=20
=20
   public String[] getAttributes()=20
   =20
   Returns the OIDs of the attributes to which this rule applies.=20
   =20
4.18.3 getSyntaxString=20
   =20
   public String[] getSyntaxString()=20
   =20
   Returns the OID of the syntax that this matching rule is valid for.=20
   =20
   =20
4.19 public class LDAPMatchingRuleUseSchema=20
                extends LDAPSchemaElement=20
   =20
   The LDAPMatchingRuleUseSchema class represents the definition of a=20
   matching rule use. It is used to discover or modify which attributes=20
   are suitable for use with an extensible matching rule. It contains=20
   the name and identifier of a matching rule, and a list off attributes=20
   that it applies to.  See [2] for a description of matching rule use=20
   representation in LDAP.=20
   =20
4.19.1 Constructors=20
   =20
   public LDAPMatchingRuleUseSchema(String name,=20
                                    String oid,=20
                                    String description,=20
                                    boolean obsolete,=20
                                    String[] attributes,=20
                                    String[] aliases)=20
   =20
   Constructs a matching rule use definition for adding to or deleting=20
   from the schema.=20
   =20
   =20
   public LDAPMatchingRuleUseSchema(String raw)=20
   =20
   Constructs a matching rule use definition from the raw String value=20
   returned on a schema query for "matchingRuleUse".=20
   =20
   Parameters are:=20
   =20
      name               Name of the matching rule.=20
      =20
      oid                Unique Object Identifier of the matching rule=20
                         - in dotted numerical format.=20
      =20
      description        Optional description of the matching rule use.=20
      =20
      obsolete           true if the matching rule use is obsolete. =20
      =20


 =20
Expires May, 2001                                            [Page 72]=20
=0C
JAVA LDAP API                                            November 2000=20
=20
=20
      attributes         List of attributes that this matching rule=20
                         applies to. These values may be either the=20
                         names or numeric oids of the attributes=20
      =20
      aliases            Optional list of additional names by which the=20
                         matching rule use may be known; null if there=20
                         are no aliases.=20
      =20
      raw                The raw String value returned on a Directory=20
                         query for "matchingRuleUse".=20
   =20
4.19.2 getAttributes=20
   =20
   public String[] getAttributes()=20
   =20
   Returns an array of all the attributes that this matching rule=20
   applies to. =20
   =20
   =20
4.20 public class LDAPMessage=20
   =20
   Base class for asynchronous LDAP request and response messages.=20
   =20
4.20.1 getControls=20
   =20
   public LDAPControl[] getControls()=20
   =20
   Returns any controls in the message.=20
   =20
4.20.2 getMessageID=20
   =20
   public int getMessageID()=20
   =20
   Returns the message ID.=20
   =20
4.20.3 getType=20
   =20
   public int getType()=20
   =20
   Returns the LDAP operation type of the message. The type is one of=20
   the following:=20
   =20
      BIND_REQUEST (0x60)=20
      BIND_RESPONSE (0x61)=20
      UNBIND_REQUEST (0x42)=20
      SEARCH_REQUEST (0x63)=20
      SEARCH_RESPONSE (0x64)=20
      SEARCH_RESULT (0x65)=20
      MODIFY_REQUEST (0x66)=20
      MODIFY_RESPONSE (0x67)=20
      ADD_REQUEST (0x68)=20
      ADD_RESPONSE (0x69)=20
 =20
Expires May, 2001                                            [Page 73]=20
=0C
JAVA LDAP API                                            November 2000=20
=20
=20
      DEL_REQUEST (0x4a)=20
      DEL_RESPONSE (0x6b)=20
      MODIFY_RDN_REQUEST (0x6c)=20
      MODIFY_RDN_RESPONSE (0x6d)=20
      COMPARE_REQUEST (0x6e)=20
      COMPARE_RESPONSE (0x6f)=20
      ABANDON_REQUEST (0x50)=20
      SEARCH_RESULT_REFERENCE (0x73)=20
      EXTENDED_REQUEST (0x77)=20
      EXTENDED_RESPONSE (0x78)=20
   =20
   =20
4.21 public class LDAPModification=20
   =20
   A single change specification for an LDAPAttribute.=20
   =20
   =20
4.21.1 Constructors=20
   =20
   public LDAPModification(int op,=20
                           LDAPAttribute attr)=20
   =20
   Specifies a modification to be made to an attribute.=20
   =20
   Parameters are:=20
   =20
      op             The type of modification to make, which can be=20
                      one of the following:=20
   =20
               ADD                      The value should be added to=20
                                        the attribute=20
         =20
               DELETE                   The value should be removed=20
                                        from the attribute=20
         =20
               REPLACE                  The value should replace all=20
                                        existing values of the=20
                                        attribute=20
   =20
      attr           The attribute (possibly with values) to be=20
                      modified.=20
   =20
   =20
4.21.2 getAttribute=20
   =20
   public LDAPAttribute getAttribute()=20
   =20
   Returns the attribute (possibly with values) to be modified.=20
   =20
   =20
4.21.3 getOp=20
   =20
 =20
Expires May, 2001                                            [Page 74]=20
=0C
JAVA LDAP API                                            November 2000=20
=20
=20
   public int getOp()=20
   =20
   Returns the type of modification specified by this object.=20
   =20
   =20
4.21.4 Constants of LDAPModification=20
   =20
      ADD (0)        The value should be added to the attribute=20
      =20
      DELETE (1)     The value should be removed from the attribute=20
      =20
      MODIFY (2)     The value should replace all existing values of=20
                      the attribute=20
   =20
   =20
4.22 public class LDAPModificationSet=20
   =20
   A collection of modifications to be made to the attributes of a=20
   single entry.=20
   =20
   =20
4.22.1 Constructors=20
   =20
   public LDAPModificationSet()=20
   =20
   Constructs a new, empty set of modifications.=20
   =20
   =20
4.22.2 add=20
   =20
   public void add(int op,=20
                   LDAPAttribute attr)=20
   =20
   Specifies another modification to be added to the set of=20
   modifications.=20
   =20
   Parameters are:=20
   =20
      op             The type of modification to make, as described=20
                      for LDAPModification.=20
      =20
      attr           The attribute (possibly with values) to be=20
                      modified.=20
   =20
   =20
4.22.3 elementAt=20
   =20
   public LDAPModification elementAt(int index)=20
                               throws ArrayIndexOutOfBoundsException=20
   =20
   Retrieves a particular LDAPModification object at the position=20
   specified by the index.=20
 =20
Expires May, 2001                                            [Page 75]=20
=0C
JAVA LDAP API                                            November 2000=20
=20
=20
   =20
   Parameters are:=20
   =20
      index          Index of the modification to get.=20
   =20
   =20
4.22.4 remove=20
   =20
   public void remove(String name)=20
   =20
   Removes the first attribute with the specified name in the set of=20
   modifications.=20
   =20
   Parameters are:=20
   =20
      name           Name of the attribute to be removed.=20
   =20
   =20
4.22.5 removeElementAt=20
   =20
   public void removeElementAt(int index)=20
                               throws ArrayIndexOutOfBoundsException=20
   =20
   Removes a particular LDAPModification object at the position=20
   specified by the index.=20
   =20
   Parameters are:=20
   =20
      index          Index of the modification to remove.=20
   =20
   =20
4.22.6 size=20
   =20
   public int size()=20
   =20
   Retrieves the number of LDAPModification objects in this set.=20
   =20
   =20
4.23 public class LDAPNameFormSchema=20
                extends LDAPSchemaElement=20
   =20
   The LDAPNameFormSchema class represents the definition of a Name=20
   Form. It is used to discover or modify the allowed naming attributes=20
   for a particular object class. See [2] for a description of same form=20
   representation in LDAP.=20
=20
4.23.1 Constructors=20
   =20
   public LDAPNameFormSchema(String name,=20
                             String oid,=20
                             String description,=20
                             boolean obsolete,=20
 =20
Expires May, 2001                                            [Page 76]=20
=0C
JAVA LDAP API                                            November 2000=20
=20
=20
                             String objectClass,=20
                             String[] required,=20
                             String[] optional,=20
                             String[] aliases)=20
   =20
   Constructs a name form for adding to or deleting from the schema.=20
   =20
   =20
   public LDAPNameFormSchema(String raw)=20
   =20
   Constructs a DIT content rule from the raw String value returned on a=20
   schema query for "nameForms".=20
   =20
   Parameters are:=20
   =20
      name               Name of the name form.=20
      =20
      oid                Unique Object Identifier of the name form - in=20
                         dotted numerical format.=20
      =20
      description        Optional description of the name form.=20
      =20
      obsolete           true if the name form is obsolete. =20
      =20
      objectClass        The object to which this name form applies.=20
                         This may either be specified by name or=20
                         numeric oid.=20
      =20
      required           A list of the attributes that must be present=20
                         in the RDN of an entry that this name form=20
                         controls. These may either be specified by=20
                         name or numeric oid.=20
      =20
      optional           A list of the attributes that may be present=20
                         in the RDN of an entry that this name form=20
                         controls. These may either be specified by=20
                         name or numeric oid.=20
      =20
      aliases            Optional list of additional names by which the=20
                         name form may be known; null if there are no=20
                         aliases.=20
      =20
      raw                The raw String value returned on a Directory=20
                         query for "nameForms".=20
      =20
   =20
4.23.2 getObjectClass=20
   =20
   public String getObjectClass()=20
   =20
   Returns the name of the object class that this name form applies to.=20
   =20
 =20
Expires May, 2001                                            [Page 77]=20
=0C
JAVA LDAP API                                            November 2000=20
=20
=20
4.23.3 getRequiredNamingAttributes=20
   =20
   public String[]getRequiredNamingAttributes()=20
   =20
   Returns the list of required naming attributes for an entry=20
   controlled by this name form.=20
   =20
4.23.4 getOptionalNamingAttributes=20
   =20
   public String[]getOptionalNamingAttributes()=20
   =20
   Returns the list of optional naming attributes for an entry=20
   controlled by this content rule.=20
   =20
   =20
4.24 public class LDAPObjectClassSchema=20
                extends LDAPSchemaElement=20
   =20
   The LDAPObjectClassSchema class represents the definition of an=20
   object class. It is used to query the syntax of an object class, and=20
   to add or delete an object class definition in a Directory. See [2]=20
   for a description of object class representation in LDAP.=20
   =20
   =20
4.24.1 Constructors=20
   =20
   public LDAPObjectClassSchema(String name,=20
                                String oid,=20
                                String[] superiors,=20
                                String description,=20
                                String[] required,=20
                                String[] optional,=20
                                int type,=20
                                String[] aliases,=20
                                boolean obsolete)=20
   =20
   Constructs an object class definition for adding to or deleting from=20
   a Directory.=20
   =20
   =20
   public LDAPObjectClassSchema(String raw)=20
   =20
   Constructs an object class definition from the raw String value=20
   returned on a Directory query for "objectclasses".=20
   =20
   =20
   Parameters are:=20
   =20
      name           Name of the object class.=20
      =20
      oid            Unique Object Identifier of the object class - in=20
                      dotted numerical format.=20
 =20
Expires May, 2001                                            [Page 78]=20
=0C
JAVA LDAP API                                            November 2000=20
=20
=20
      =20
      description    Optional description of the object class.=20
      =20
      superiors      The object classes this one derives from.=20
      =20
      required       A list of attributes required for an entry with=20
                      this object class.=20
      =20
      optional       A list of attributes acceptable but not required=20
                      for an entry with this object class.=20
      =20
      type           One of ABSTRACT, AUXILIARY, or STRUCTURAL. These=20
                      are constants defined in LDAPObjectClassSchema.=20
      =20
      aliases        Optional list of additional names by which the=20
                     object class may be known; null if there are no=20
                     aliases.=20
      =20
      obsolete       true if this object class is obsolete.=20
      =20
      raw            The raw String value returned on a Directory=20
                      query for "objectclasses".=20
   =20
   =20
4.24.2 getSuperiors=20
   =20
   public String[] getSuperiors()=20
   =20
   Returns the object classes which this one derives from.=20
   =20
   =20
4.24.3 getRequiredAttributes=20
   =20
   public String[] getRequiredAttributes()=20
   =20
   Returns a list of attributes required of an entry with this object=20
   class.=20
   =20
   =20
4.24.4 getOptionalAttributes=20
   =20
   public String[] getOptionalAttributes()=20
   =20
   Returns a list of attributes acceptable but not required of an entry=20
   with this object class.=20
   =20
4.24.5 getType=20
   =20
   public int getType()=20
   =20
   Returns one of ABSTRACT, AUXILIARY, or STRUCTURAL. These are=20
   constants defined in LDAPObjectClassSchema.=20
 =20
Expires May, 2001                                            [Page 79]=20
=0C
JAVA LDAP API                                            November 2000=20
=20
=20
   =20
   =20
4.25 public class LDAPRebindAuth=20
   =20
   Represents information used to authenticate the client in cases where=20
   the client follows referrals automatically.=20
   =20
   =20
4.25.1 Constructors=20
   =20
   public LDAPRebindAuth( String dn,=20
                          String password )=20
   =20
   Constructs information that is used by the client for authentication=20
   when following referrals automatically.=20
   =20
   Parameters are:=20
   =20
      dn             Distinguished name to use in authenticating to=20
                      the server.=20
      =20
      password       Password to use in authenticating to the server.=20
      =20
4.25.2 getDN=20
   =20
   public String getDN()=20
   =20
   Returns the distinguished name to be used for reauthentication on=20
   automatic referral following.=20
   =20
   =20
4.25.3 getPassword=20
   =20
   public String getPassword()=20
   =20
   Returns the password to be used for reauthentication on automatic=20
   referral following.=20
   =20
   =20
4.26 public interface LDAPRebind=20
                      extends LDAPReferralHandler=20
=20
   Used to provide credentials for reauthentication on processing a=20
   referral.=20
   =20
   =20
4.26.1 getRebindAuthentication=20
   =20
   public LDAPRebindAuth getRebindAuthentication(String host, int port)=20
   =20
   =20

 =20
Expires May, 2001                                            [Page 80]=20
=0C
JAVA LDAP API                                            November 2000=20
=20
=20
   Returns an object which can provide credentials for authenticating to=20
   a server at the provided host name and port number.=20
   =20
   Parameters are:=20
   =20
      host           Contains a hostname or dotted string representing=20
                      the IP address of a host running an LDAP server.=20
      =20
      port           Contains the TCP or UDP port number to connect=20
                      to.=20
   =20
   =20
4.27 public class LDAPReferralException=20
                  extends LDAPException=20
   =20
   This exception, derived from LDAPException, is thrown when a server=20
   returns a referral and automatic referral following has not been=20
   enabled.=20
   =20
   =20
4.27.1 Constructors=20
   =20
   public LDAPReferralException()=20
   =20
   Constructs a default exception with no specific error information.=20
   =20
   =20
   public LDAPReferralException(String message)=20
   =20
   Constructs a default exception with a specified string as additional=20
   information. This form is used for lower-level errors.=20
   =20
   =20
   public LDAPReferralException(String message,=20
                                LDAPException rootException)=20
   =20
   Constructs a default exception with a specified string as additional=20
   information and an exception that indicates a failure to follow a=20
   referral.  This exception applies only to synchronous operations and=20
   is thrown only on receipt of a referral when the referral was not=20
   followed.=20
   =20
   =20
   public LDAPReferralException(String message,=20
                                int resultCode,=20
                                String serverMessage)=20
   =20
   public LDAPReferralException(String message,=20
                                int resultCode,=20
                                String serverMessage,=20
                                LDAPException rootException)=20
   =20
 =20
Expires May, 2001                                            [Page 81]=20
=0C
JAVA LDAP API                                            November 2000=20
=20
=20
   Parameters are:=20
   =20
      message        The additional error information.=20
      =20
      resultCode     The result code returned=20
      =20
      serverMessage  Error message specifying additional information=20
                      from the server.=20
      =20
      rootException  An exception which caused referral following to=20
                      fail=20
   =20
   =20
4.27.2 getReferralFailureException=20
   =20
   public LDAPException getReferralFailureException ()=20
   =20
   Returns the LDAPException which caused the referral to fail, if any.=20
   =20
4.27.3 getReferrals=20
   =20
   public String[] getReferrals()=20
   =20
   Gets the list of referrals (LDAP URLs to other servers) returned by=20
   the LDAP server=20
   The referrals may include URLs of a type other than ones for an LDAP=20
   server (i.e. a referral URL other than ldap://something).=20
   =20
   =20
4.28 public interface LDAPReferralHandler=20
   =20
   Shared ancestor to the two types of referal objects - LDAPBind and=20
   LDAPRebind.=20
   =20
   =20
4.29 public class LDAPResponse=20
                  extends LDAPMessage=20
   =20
   Represents the response to a particular asynchronous LDAP operation.=20
=20
=20
4.29.1 getErrorMessage=20
   =20
   public String getErrorMessage()=20
   =20
   Returns any error message in the response.=20
=20
=20
4.29.2 getMatchedDN=20
   =20
   public String getMatchedDN()=20
   =20
 =20
Expires May, 2001                                            [Page 82]=20
=0C
JAVA LDAP API                                            November 2000=20
=20
=20
   Returns the partially matched DN field, if any, in a server response.=20
=20
=20
4.29.3 getReferrals=20
   =20
   public String[] getReferrals()=20
   =20
   Returns all referrals, if any, in a server response.=20
=20
=20
4.29.4 getResultCode=20
   =20
   public int getResultCode()=20
   =20
   Returns the result code in a server response, as defined in [5].=20
   =20
   =20
4.30 public class LDAPResponseListener=20
                  implements LDAPListener=20
   =20
   Represents the message queue associated with a particular=20
   asynchronous LDAP operation or operations.=20
   =20
   =20
4.30.1 getMessageIDs=20
   =20
   public int[] getMessageIDs()=20
   =20
   Returns the message IDs for all outstanding requests, i.e. requests=20
   for which a response has not been received from the server or which=20
   still have messages to be retrieved with getResponse. The last ID in=20
   the array is the messageID of the latest submitted request.=20
   =20
   =20
4.30.2 getResponse=20
   =20
   public LDAPMessage getResponse()throws LDAPException=20
   =20
   Blocks until a response is available, or until all operations=20
   associated with the object have completed or been canceled, and=20
   returns the response.=20
   =20
   public LDAPMessage getResponse(int msgid)throws LDAPException=20
   =20
   Blocks until a response is available for a particular message id, or=20
   until all operations associated with the message id have completed or=20
   been canceled, and returns the response.=20
   =20
   Parameters are:=20
   =20
      msgid              A particular message to query for responses=20
                         available.=20
 =20
Expires May, 2001                                            [Page 83]=20
=0C
JAVA LDAP API                                            November 2000=20
=20
=20
   =20
   =20
4.30.3 isResponseReceived=20
   =20
   public boolean isResponseReceived()=20
   =20
   Reports true if any response has been received from the server and=20
   not yet retrieved with getResponse. If getResponse has been used to=20
   retrieve all messages received to this point, then isResponseReceived=20
   returns false.=20
   =20
   =20
   public boolean isResponseReceived(int msgid)=20
   =20
   Reports true if a response has been received from the server for a=20
   particular message id.=20
   =20
   =20
   Parameters are:=20
   =20
      msgid              A particular message to query for responses=20
                         available.=20
   =20
4.30.4 merge=20
   =20
   public void merge(LDAPListener listener2)=20
   =20
   Merges two response listeners. Moves/appends the content from another =
          =20
   listener to this one.=20
   =20
   =20
4.31 public class LDAPSchema=20
   =20
   The LDAPSchema supports querying a Directory Server for its schema,=20
   and obtaining definitions of individual schema elements.=20
   =20
   =20
4.31.1 Constructors=20
   =20
   public LDAPSchema()=20
   =20
   Constructs an empty LDAPSchema object.=20
   =20
   =20
4.31.2 fetchSchema=20
   =20
   public void fetchSchema(LDAPConnection ld) throws LDAPException=20
   =20
   Retrieves the entire schema from a Directory Server.=20
   =20
   public void fetchSchema(LDAPConnection ld,=20
                           String dn) throws LDAPException=20
 =20
Expires May, 2001                                            [Page 84]=20
=0C
JAVA LDAP API                                            November 2000=20
=20
=20
   =20
   Retrieves the schema in effect at a particular entry in the Directory=20
   Server.=20
   =20
   The fetchSchema methods are the only methods that interact with a=20
   Directory Server. The other methods access information acquired=20
   through fetchSchema. An LDAPException is thrown as for=20
   LDAPConnection.search() (4.6.34) if the schema cannot be retrieved=20
   with the specified connection.=20
   =20
   Parameters are:=20
   =20
      ld             An open connection to a Directory Server.=20
      =20
      dn             Distinguished name of the entry from which to=20
                      return schema. The subschemasubentry attribute of=20
                      the entry is queried to find the location of the=20
                      schema to be returned.=20
   =20
   =20
4.31.3 getAttribute=20
   =20
   public LDAPAttributeSchema getAttribute( String name )=20
   =20
   Returns a particular attribute definition, or null if not found.=20
   =20
   Parameters are:=20
   =20
      name           Name of the attribute for which a definition is=20
                      to be returned.=20
      =20
   =20
4.31.4 getObjectClass=20
   =20
   public LDAPObjectClassSchema getObjectClass( String name )=20
   =20
   Returns a particular object class definition, or null if not found.=20
   =20
   Parameters are:=20
   =20
      name           Name of the object class for which a definition=20
                      is to be returned.=20
   =20
   =20
4.31.5 getMatchingRule=20
   =20
   public LDAPMatchingRuleSchema getMatchingRule( String name )=20
   =20
   Returns a particular matching rule definition, or null if not found.=20
   =20
   Parameters are:=20
   =20
 =20
Expires May, 2001                                            [Page 85]=20
=0C
JAVA LDAP API                                            November 2000=20
=20
=20
      name           Name of the matching rule for which a definition=20
                      is to be returned.=20
=20
4.31.6 getMatchingRuleUse=20
   =20
   public LDAPMatchingRuleUseSchema getMatchingRuleUse( String name )=20
   =20
   Returns a particular matching rule use definition, or null if not=20
   found.=20
   =20
   Parameters are:=20
      =20
      name           Name of the matching rule use for which a=20
                      definition is to be returned.=20
      =20
   =20
4.31.7 getDITStructureRule=20
   =20
   public LDAPDITStructureRuleSchema getDITStructureRule( String name )=20
   =20
   public LDAPDITStructureRuleSchema getDITStructureRule( int ID )=20
   =20
   =20
   Returns a particular structure rule definition, or null if not found.=20
   =20
   Parameters are:=20
   =20
      name           Name of the structure rule for which a definition=20
                      is to be returned.=20
      =20
      ID             Identifier of the structure rule for which a=20
                      definition is to be returned.=20
      =20
   =20
4.31.8 getDITContentRule=20
   =20
   public LDAPDITContentRuleSchema getDITContentRule( String name )=20
   =20
   Returns a particular content rule definition, or null if not found.=20
   =20
   Parameters are:=20
   =20
      name           Name of the content rule for which a definition=20
                      is to be returned.=20
      =20
      =20
4.31.9 getNameForm=20
   =20
   public LDAPNameFormSchema getNameForm( String name )=20
   =20
   Returns a particular name form definition, or null if not found.=20
   =20
 =20
Expires May, 2001                                            [Page 86]=20
=0C
JAVA LDAP API                                            November 2000=20
=20
=20
   Parameters are:=20
   =20
      name           Name of the name form for which a definition is=20
                      to be returned.=20
      =20
   =20
4.31.10 getSyntax=20
   =20
   public LDAPSyntaxSchema getSyntax( String oid )=20
   =20
   Returns a particular syntax definition, or null if not found.=20
   =20
   Parameters are:=20
   =20
      oid            Identifier of the syntax for which a definition=20
                     is to be returned.=20
   =20
   =20
4.31.11 getAttributes=20
   =20
   public Enumeration getAttributes()=20
   =20
   Returns an enumeration of attribute definitions.=20
   =20
   =20
4.31.12 getObjectClasses=20
   =20
   public Enumeration getObjectClasses()=20
   =20
   Returns an enumeration of object class definitions.=20
   =20
   =20
4.31.13 getMatchingRules=20
   =20
   public Enumeration getMatchingRules()=20
   =20
   Returns an enumeration of matching rule definitions.=20
   =20
   =20
4.31.14 getMatchingRuleUses=20
   =20
   public Enumeration getMatchingRuleUses()=20
   =20
   Returns an enumeration of LDAPMatchingRuleUseSchema objects.=20
=20
=20
4.31.15 getDITStructureRules=20
   =20
   public Enumeration getDITStructureRules()=20
   =20
   Returns an enumeration of LDAPDITStructureRuleSchema objects.=20
=20
 =20
Expires May, 2001                                            [Page 87]=20
=0C
JAVA LDAP API                                            November 2000=20
=20
=20
   =20
4.31.16 getDITContentRules=20
   =20
   public Enumeration getDITContentRules()=20
   =20
   Returns an enumeration of LDAPDITContentRuleSchema objects.=20
=20
   =20
4.31.17 getNameForms=20
   =20
   public Enumeration getNameForms()=20
   =20
   Returns an enumeration of LDAPNameFormSchema objects.=20
=20
   =20
4.31.18 getSyntaxes=20
   =20
   public Enumeration getSyntaxes()=20
   =20
   Returns an enumeration of LDAPSyntaxSchema objects.=20
   =20
   =20
4.31.19 getAttributeNames=20
   =20
   public Enumeration getAttributeNames()=20
   =20
   Returns an enumeration of attribute names.=20
   =20
   =20
4.31.20 getObjectClassNames=20
   =20
   public Enumeration getObjectClassNames()=20
   =20
   Returns an enumeration of object class names.=20
   =20
   =20
4.31.21 getMatchingRuleNames=20
   =20
   public Enumeration getMatchingRuleNames()=20
   =20
   Returns an enumeration of matching rule names.=20
   =20
   =20
4.31.22 getMatchingRuleUseNames=20
   =20
   public Enumeration getMatchingRuleUseNames()=20
   =20
   Returns an enumeration of matching rule use names.=20
   =20
   =20
4.31.23 getDITStructureRuleNames=20
   =20
 =20
Expires May, 2001                                            [Page 88]=20
=0C
JAVA LDAP API                                            November 2000=20
=20
=20
   public Enumeration getDITStructureRuleNames ()=20
   =20
   Returns an enumeration of structure rule names.=20
   =20
   =20
4.31.24 getDITContentRuleNames=20
   =20
   public Enumeration getDITContentRuleNames ()=20
   =20
   Returns an enumeration of content rule names.=20
   =20
   =20
4.31.25 getNameFormNames=20
   =20
   public Enumeration getNameFormNames ()=20
   =20
   Returns an enumeration of name form names.=20
   =20
   =20
4.32 public abstract class LDAPSchemaElement=20
   =20
   The LDAPSchemaElement class is the base class for representing schema=20
   elements in LDAP.=20
   =20
   =20
4.32.1 getAliases=20
   =20
   public String[] getAliases()=20
   =20
   Returns an array of alternative names of the element, or null if=20
   there are none. With respect to the protocol-level schema element=20
   syntax definition of [2], the array consists of all values but the=20
   first of the NAME qualifier.=20
   =20
   =20
4.32.2 getDescription=20
   =20
   public String getDescription()=20
   =20
   Returns the description of the element. With respect to the protocol-
   level schema element syntax definition of [2], the value is that of=20
   the DESC qualifier.=20
   =20
   =20
4.32.3 getName=20
   =20
   public String getName()=20
   =20
   Returns the name of the element. With respect to the protocol-level=20
   schema element syntax definition of [2], the value is that of the=20
   first NAME qualifier.=20
   =20
 =20
Expires May, 2001                                            [Page 89]=20
=0C
JAVA LDAP API                                            November 2000=20
=20
=20
   =20
4.32.4 getID=20
   =20
   public String getID()=20
   =20
   Returns the Unique Object Identifier of the element.=20
   =20
   =20
4.32.5 getQualifier=20
   =20
   public String[] getQualifier(String name)=20
   =20
   Returns an array of all values of a specified optional or non-
   standard qualifier of the element. This method may be used to access=20
   the values of vendor-specific qualifiers (which begin with "X-" [2]).=20
   =20
   Parameters are:=20
   =20
      name           The name of the qualifier, case-sensitive.=20
   =20
   =20
4.32.6 getQualifierNames=20
   =20
   public Enumeration getQualifierNames()=20
   =20
   Returns an enumeration of all qualifiers of the element which are not=20
   defined in [2].=20
   =20
   =20
4.32.7 isObsolete=20
   =20
   public boolean isObsolete()=20
   =20
   Returns true if the element is obsolete (has the OBSOLETE qualifier=20
   in its LDAP definition [2].=20
   =20
   =20
4.32.8 getValue=20
   =20
   public String getValue()=20
   =20
   Returns a String in a format suitable for directly adding to a=20
   Directory, as a value of the particular schema element attribute.=20
   =20
   =20
4.32.9 setQualifier=20
   =20
   public void setQualifier(String name, String[] values)=20
   =20
   Sets the values of a specified optional or non-standard qualifier of=20
   the element. This method may be used to set the values of vendor-
   specific qualifiers (which begin with "X-" [2]).=20
 =20
Expires May, 2001                                            [Page 90]=20
=0C
JAVA LDAP API                                            November 2000=20
=20
=20
   =20
   Parameters are:=20
   =20
      name           The name of the qualifier, case-sensitive.=20
      =20
      values         The values to set for the qualifier.=20
      =20
   =20
4.32.10 add=20
   =20
   public void add(LDAPConnection ld) throws LDAPException=20
   =20
   public void add(LDAPConnection ld, String dn) throws LDAPException=20
   =20
   Adds the definition to a Directory. An exception is thrown if the=20
   definition can't be added.=20
   =20
   Parameters are:=20
   =20
      ld             An open connection to a Directory Server.=20
                      Typically the connection must have been=20
                      authenticated to add a schema definition.=20
      =20
      dn             Entry at which to determine the subschemasubentry=20
                      to which the schema element is to be added.=20
   =20
   =20
4.32.11 remove=20
   =20
   public void remove(LDAPConnection ld) throws LDAPException=20
   =20
   public void remove(LDAPConnection ld, String dn) throws LDAPException=20
   =20
   Removes the definition from a Directory. An exception is thrown if=20
   the definition can't be removed.=20
   =20
   Parameters are:=20
   =20
      ld             An open connection to a Directory Server.=20
                      Typically the connection must have been=20
                      authenticated to remove a schema definition.=20
   =20
      dn             Entry at which to determine the subschemasubentry=20
                      to remove the schema element from.=20
   =20
   =20
4.32.12 modify=20
   =20
   public void modify(LDAPConnection ld=20
                      LDAPSchemaElement newValue) throws LDAPException=20
   =20
   public void modify(LDAPConnection ld=20
 =20
Expires May, 2001                                            [Page 91]=20
=0C
JAVA LDAP API                                            November 2000=20
=20
=20
                      LDAPSchemaElement newValue,=20
                      String dn) throws LDAPException=20
   =20
   Replace a single value of the schema element definition in the=20
   schema. An exception is thrown if the definition can't be modified.=20
   =20
   Parameters are:=20
   =20
      ld             An open connection to a Directory Server.=20
                      Typically the connection must have been=20
                      authenticated to modify a schema definition.=20
      =20
      newValue       The new schema element value.=20
   =20
      dn             Entry at which to determine the subschemasubentry=20
                      to store the schema change in.=20
   =20
   =20
4.33 public class LDAPSearchConstraints=20
                  extends LDAPConstraints=20
   =20
   A set of options to control a search operation. There is always an=20
   LDAPSearchConstraints associated with an LDAPConnection object; its=20
   values can be changed with LDAPConnection.setSearchConstraints, or=20
   overridden by passing an LDAPConstraints object to the search=20
   operation.=20
   =20
   =20
4.33.1 Constructors=20
   =20
   public LDAPSearchConstraints()=20
   =20
   Constructs an LDAPSearchConstraints object that specifies the default=20
   set of search constraints.=20
   =20
   =20
   public LDAPSearchConstraints(int msLimit,=20
                                int serverTimeLimit,=20
                                int dereference,=20
                                int maxResults,=20
                                boolean doReferrals,=20
                                int batchSize,=20
                                LDAPReferralHandler binder,=20
                                int hop_limit)=20
   =20
   Constructs a new LDAPSearchConstraints object and allows specifying=20
   the operational constraints in that object.=20
   =20
   Parameters are:=20
   =20
      msLimit         Maximum time in milliseconds to wait for results=20
                      (0 by default, which means that there is no=20
 =20
Expires May, 2001                                            [Page 92]=20
=0C
JAVA LDAP API                                            November 2000=20
=20
=20
                      maximum time limit). This is an interface-imposed=20
                      limit.=20
      =20
      serverTimeLimit  Maximum time in seconds that the server should=20
                      spend returning results. This is a server-imposed=20
                      limit. The default of 0 means no time limit.=20
      =20
      dereference     Specifies when aliases should be dereferenced.=20
                      Must be either DEREF_NEVER, DEREF_FINDING,=20
                      DEREF_SEARCHING, or DEREF_ALWAYS (DEREF_NEVER by=20
                      default).=20
      =20
      maxResults      Maximum number of search results to return (1000=20
                      by default).=20
      =20
      doReferrals     Specify true to follow referrals automatically,=20
                      or false to throw an LDAPReferralException error=20
                      if the server sends back a referral (false by=20
                      default). It is ignored for asynchronous=20
                      operations.=20
      =20
      batchSize       Specify the number of results to block on during=20
                      enumeration. 0 means to block until all results=20
                      are in (1 by default). It is ignored for=20
                      asynchronous operations.=20
      =20
      binder         Custom authentication processor, called when the=20
                      LDAPConnection needs to authenticate, typically=20
                      on following a referral. null may be specified to=20
                      indicate default authentication processing. The=20
                      object implements either the LDAPBind or the=20
                      LDAPRebind interface. It is ignored for=20
                      asynchronous operations.=20
      =20
      hop_limit       Maximum number of referrals to follow in a=20
                      sequence when attempting to resolve a request,=20
                      when doing automatic referral following. It is=20
                      ignored for asynchronous operations. The value is=20
                      10 by default.=20
   =20
   =20
4.33.2 getBatchSize=20
   =20
   public int getBatchSize()=20
   =20
   Returns the number of results to block on during enumeration of=20
   search results. This should be 0 if intermediate results are not=20
   needed, and 1 if results are to be processed as they come in.=20
   =20
   =20
4.33.3 getDereference=20
   =20
 =20
Expires May, 2001                                            [Page 93]=20
=0C
JAVA LDAP API                                            November 2000=20
=20
=20
   public int getDereference()=20
   =20
   Specifies when aliases should be dereferenced. Returns either=20
   DEREF_NEVER, DEREF_FINDING, DEREF_SEARCHING, or=20
   DEREF_ALWAYS.=20
   =20
   =20
4.33.4 getMaxResults=20
   =20
   public int getMaxResults()=20
   =20
   Returns the maximum number of search results to be returned; 0 means=20
   no limit.=20
   =20
   =20
4.33.5 getServerTimeLimit=20
   =20
   public int getServerTimeLimit()=20
   =20
   Reports the maximum number of seconds that the server is to wait when=20
   returning search results while using this constraint object=20
   =20
   =20
4.33.6 setBatchSize=20
   =20
   public void setBatchSize(int batchSize)=20
   =20
   Sets the suggested number of results to block on during enumeration=20
   of search results. This should be 0 if intermediate results are not=20
   needed, and 1 if results are to be processed as they come in.  The=20
   default is 1.=20
   =20
   Parameters are:=20
   =20
      batchSize      Blocking size on search enumerations.=20
   =20
   =20
4.33.7 setDereference=20
   =20
   public void setDereference(int dereference)=20
   =20
   Sets a preference indicating whether or not aliases should be=20
   dereferenced, and if so, when.=20
   =20
   Parameters are:=20
   =20
      dereference    Either DEREF_NEVER, DEREF_FINDING,=20
                      DEREF_SEARCHING, or DEREF_ALWAYS.=20
   =20
   =20
4.33.8 setMaxResults=20
   =20
 =20
Expires May, 2001                                            [Page 94]=20
=0C
JAVA LDAP API                                            November 2000=20
=20
=20
   public void setMaxResults(int maxResults)=20
   =20
   Sets the maximum number of search results to be returned; 0 means no=20
   limit.  The default is 1000.=20
   =20
   Parameters are:=20
   =20
      maxResults     Maximum number of search results to return.=20
   =20
   =20
4.33.9 setServerTimeLimit=20
   =20
   public void setServerTimeLimit(int seconds)=20
   =20
   Sets the maximum number of seconds that the server is to wait when=20
   returning search results. The parameter is only recognized on search=20
   operations.=20
   =20
   =20
4.33.10 Constants of LDAPSearchConstraints=20
   =20
      DEREF_NEVER (0)     Aliases are never dereferenced.=20
      =20
      DEREF_SEARCHING (1) Aliases are dereferenced when searching the=20
                      entries beneath the starting point of the search=20
                      (but not when finding the starting entry).=20
      =20
      DEREF_FINDING (2)   Aliases are dereferenced when finding the=20
                      starting point for the search (but not when=20
                      searching under that starting entry).=20
      =20
      DEREF_ALWAYS (3)   Aliases are always dereferenced (both when=20
                      finding the starting point for the search and=20
                      when searching under that starting entry).=20
      =20
   =20
4.34 public class LDAPSearchListener=20
                  implements LDAPListener=20
   =20
   An LDAPSearchListener manages search results and references returned=20
   on one or more asynchronous search requests.=20
   =20
   =20
4.34.1 getMessageIDs=20
   =20
   public int[] getMessageIDs()=20
   =20
   Returns the message IDs for all outstanding requests, i.e. requests=20
   for which a response has not been received from the server or which=20
   still have messages to be retrieved with getResponse. The last ID in=20
   the array is the messageID of the latest submitted request.=20
   =20
 =20
Expires May, 2001                                            [Page 95]=20
=0C
JAVA LDAP API                                            November 2000=20
=20
=20
   =20
4.34.2 getResponse=20
   =20
   public LDAPMessage getResponse() throws LDAPException=20
   =20
   Blocks until a response is available, or until all operations=20
   associated with the object have completed or been canceled, and=20
   returns the response.=20
   =20
   public LDAPMessage getResponse(int msgid) throws LDAPException=20
   =20
   Blocks until a response is available for a particular message id, or=20
   until all operations associated with the message id have completed or=20
   been canceled, and returns the response.=20
   =20
   Parameters are:=20
   =20
      msgid              A particular message to query for responses=20
                         available.=20
   =20
   =20
4.34.3 isResponseReceived=20
   =20
   public boolean isResponseReceived()=20
   =20
   Reports true if any response has been received from the server and=20
   not yet retrieved with getResponse. If getResponse has been used to=20
   retrieve all messages received to this point, then isResponseReceived=20
   returns false.=20
   =20
   =20
   public boolean isResponseReceived(int msgid)=20
   =20
   Reports true if a response has been received from the server for a=20
   particular message id.=20
   =20
   =20
   Parameters are:=20
   =20
      msgid              A particular message to query for responses=20
                         available.=20
   =20
   =20
4.34.4 isComplete=20
   =20
   =20
   public boolean isComplete(int msgid)=20
   =20
   Reports true if all results have been received for a particular=20
   message id, i.e. a response has been received from the server for the=20
   id. There may still be messages waiting to be retrieved with=20
   getResponse.=20
 =20
Expires May, 2001                                            [Page 96]=20
=0C
JAVA LDAP API                                            November 2000=20
=20
=20
   =20
   =20
   Parameters are:=20
   =20
      msgid              A particular message to query for completion.=20
   =20
   =20
4.34.5 merge=20
   =20
   public void merge(LDAPSearchListener listener2)=20
   =20
   Merges two search listeners. Moves/appends the content from another   =
        =20
   search listener to this one.=20
   =20
   =20
4.35 public class LDAPSearchResult=20
                  extends LDAPMessage=20
   =20
   An LDAPSearchResult object encapsulates a single asynchronous search=20
   result.=20
   =20
   =20
4.35.1 getEntry=20
   =20
   public LDAPEntry getEntry()=20
   =20
   Returns the entry of a server search response.=20
   =20
   =20
4.36 public class LDAPSearchResultReference=20
                  extends LDAPMessage=20
   =20
   An LDAPSearchResultReference object encapsulates a continuation=20
   reference from an asynchronous search operation.=20
=20
=20
4.36.1 getReferrals=20
   =20
   public String[] getReferrals()=20
   =20
   Returns any referral URLs in the object.=20
   =20
   =20
4.37 public class LDAPSearchResults=20
                  implements Enumeration=20
   =20
   An LDAPSearchResults object is returned from a synchronous search=20
   operation. It implements Enumeration, thereby providing access to all=20
   entries retrieved during the operation.=20
   =20
   =20

 =20
Expires May, 2001                                            [Page 97]=20
=0C
JAVA LDAP API                                            November 2000=20
=20
=20
4.37.1 getCount=20
   =20
   public int getCount()=20
   =20
   Returns a count of the entries in the search result. If the search is=20
   asynchronous (batch size not 0), this reports the number of results=20
   received so far.=20
   =20
   =20
4.37.2 getResponseControls=20
   =20
   public LDAPControl[] getResponseControls()=20
   =20
   Returns the latest Server Controls returned by a Directory Server=20
   in the context of this search request, or null=20
   if no Server Controls were returned.=20
   =20
   =20
4.37.3 hasMoreElements=20
   =20
   public boolean hasMoreElements()=20
   =20
   Specifies whether or not there are more search results in the=20
   enumeration. If true, there are more search results.=20
   =20
   =20
4.37.4 next=20
   =20
   public LDAPEntry next() throws LDAPException=20
   =20
   Returns the next result in the enumeration as an LDAPEntry. If=20
   automatic referral following is disabled or a referral was not=20
   followed, next() will throw an LDAPReferralException when the=20
   referral is received.=20
   =20
   =20
4.37.5 nextElement=20
   =20
   public Object nextElement()=20
   =20
   Returns the next result in the enumeration as an Object. This the=20
   default implementation of Enumeration.nextElement(). The returned=20
   value may be an LDAPEntry or an LDAPException.=20
   =20
   =20
4.37.6 sort=20
   =20
   public void sort(LDAPEntryComparator comp)=20
   =20
   Sorts all entries in the results using the provided comparison=20
   object. If the object has been partially or completely enumerated,=20
   only remaining elements are sorted. Sorting the results requires that=20
 =20
Expires May, 2001                                            [Page 98]=20
=0C
JAVA LDAP API                                            November 2000=20
=20
=20
   they all be present. This implies that=20
   LDAPSearchResults.nextElement() will always block until all results=20
   have been retrieved, after a sort operation.=20
   =20
   The LDAPCompareAttrNames class is provided to support the common need=20
   to collate by a single or multiple attribute values, in ascending or=20
   descending order.  Examples are:=20
   =20
       res.sort(new LDAPCompareAttrNames("cn"));=20
   =20
       res.sort(new LDAPCompareAttrNames("cn", false));=20
   =20
       String[] attrNames =3D { "sn", "givenname" };=20
       res.sort(new LDAPCompareAttrNames(attrNames));=20
   =20
   Parameters are:=20
   =20
      comp            An object that implements the LDAPEntryComparator=20
                      interface to compare two objects of type=20
                      LDAPEntry.=20
   =20
   =20
4.38 public interface LDAPSocketFactory=20
   =20
   Used to construct a socket connection for use in an LDAPConnection. =20
   An implementation of this interface may, for example, provide a=20
   TLSSocket connected to a secure server.=20
   =20
   =20
4.38.1 makeSocket=20
   =20
   public Socket makeSocket(String host, int port)=20
                            throws IOException, UnknownHostException=20
   =20
   =20
   Returns a socket connected using the provided host name and port=20
   number.=20
   =20
   There may be additional makeSocket methods defined when interfaces to=20
   establish TLS and SASL authentication in the Java environment have=20
   been standardized.=20
   =20
   Parameters are:=20
   =20
      host           Contains a hostname or dotted string representing=20
                      the IP address of a host running an LDAP server=20
                      to connect to.=20
      =20
      port           Contains the TCP or UDP port number to connect to=20
                      or contact. The default LDAP port is 389.=20
   =20
   =20
 =20
Expires May, 2001                                            [Page 99]=20
=0C
JAVA LDAP API                                            November 2000=20
=20
=20
4.39 public class LDAPSyntaxSchema=20
                extends LDAPSchemaElement=20
   =20
   The LDAPSyntaxSchema class represents the definition of a syntax. It=20
   is used to discover the known set of syntaxes in effect for the=20
   subschema. See [2] for a description of syntax representation in=20
   LDAP.=20
   Note that though this extends LDAPSchemaElement, it does not use the=20
   name or obsolete members, subsequently calls to getName always return=20
   null and isObsolete always returns false. There is also no matching=20
   getSyntaxNames method in LDAPSchema.=20
=20
=20
4.39.1 Constructors=20
   =20
   public LDAPSyntaxSchema(String oid,=20
                           String description)=20
   =20
   Constructs a syntax for adding to or deleting from the schema. Note=20
   that adding and removing syntaxes is not typically a supported=20
   feature of LDAP servers.=20
   =20
   =20
   public LDAPSyntaxSchema(String raw)=20
   =20
   Constructs a syntax from the raw String value returned on a schema=20
   query for "LDAPSyntaxes".=20
   =20
   Parameters are:=20
   =20
      oid            Unique Object Identifier of the syntax - in=20
                      dotted numerical format.=20
      =20
      description    Optional description of the syntax.=20
      =20
      raw            The raw String value returned on a Directory=20
                      query for "ldapSyntaxes".=20
   =20
   =20
4.40 public class LDAPUrl=20
   =20
   Encapsulates parameters of an LDAP Url query, as defined in [6].  An=20
   LDAPUrl object can be passed to LDAPConnection.search to retrieve=20
   search results.=20
   =20
   =20
4.40.1 Constructors=20
   =20
   public LDAPUrl(String url) throws MalformedURLException=20
   =20
   Constructs a URL object with the specified string as URL.=20
   =20
 =20
Expires May, 2001                                           [Page 100]=20
=0C
JAVA LDAP API                                            November 2000=20
=20
=20
   =20
   public LDAPUrl(String host,=20
                  int port,=20
                  String dn)=20
   =20
   Constructs a URL object with the specified host, port, and DN. This=20
   form is used to create URL references to a particular object in the=20
   directory.=20
   =20
   public LDAPUrl(String host,=20
                  int port,=20
                  String dn,=20
                  String[] attrNames,=20
                  int scope,=20
                  String filter)=20
   =20
   public LDAPUrl(String host,=20
                  int port,=20
                  String dn,=20
                  String[] attrNames,=20
                  int scope,=20
                  String filter,=20
                  boolean secure)=20
   =20
   Constructs a full-blown LDAP URL to specify an LDAP search operation.=20
   =20
   Parameters are:=20
   =20
      url            An explicit URL string, e.g.=20
                      "ldap://ldap.acme.com:80/o=3DAce%20Industry,c=3Dus?=
cn
                      ,sn?sub?(objectclass=3DinetOrgPerson)".=20
      =20
      host           Host name of LDAP server, or null for "nearest=20
                      X.500/LDAP".=20
      =20
      port           Port number for LDAP server (use=20
                      LDAPConnection.DEFAULT_PORT for default port).=20
      =20
      dn             Distinguished name of object to fetch.=20
      =20
      attrNames      Names of attributes to retrieve. null for all=20
                      attributes.=20
      =20
      scope          Depth of search (in DN namespace). Use one of=20
                      SCOPE_BASE, SCOPE_ONE, SCOPE_SUB from=20
                      LDAPConnection.=20
   =20
      filter         Search filter specifying the search criteria, as=20
                      defined in [3].=20
   =20
      secure         True to create an LDAP URL of the "ldaps" type.=20
   =20
 =20
Expires May, 2001                                           [Page 101]=20
=0C
JAVA LDAP API                                            November 2000=20
=20
=20
   =20
4.40.2 decode=20
   =20
   public static String decode(String URLEncoded) throws=20
   MalformedURLException=20
   =20
   Decodes a URL-encoded string. Any occurrences of %HH are decoded to=20
   the hex value represented. However, this method does NOT decode "+"=20
   into " ". See [8] for details on URL encoding/decoding.=20
   =20
   Parameters are:=20
   =20
      URLEncoded     String to decode.=20
   =20
   =20
4.40.3 encode=20
   =20
   public static String encode(String toEncode)=20
   =20
   Encodes an arbitrary string. Any illegal characters are encoded as=20
   %HH.  However, this method does NOT encode " " into "+".=20
   =20
   Parameters are:=20
   =20
      toEncode       String to encode.=20
   =20
   =20
4.40.4 getAttributeArray=20
   =20
   public String[] getAttributeArray()=20
   =20
   Returns an array of attribute names specified in the URL.=20
   =20
   =20
4.40.5 getAttributes=20
   =20
   public Enumeration getAttributes()=20
   =20
   Returns an Enumerator for the attribute names specified in the URL.=20
   =20
   =20
4.40.6 getDN=20
   =20
   public String getDN()=20
   =20
   Returns the distinguished name encapsulated in the URL.=20
   =20
   =20
4.40.7 getExtensions=20
   =20
   public String[] getExtensions ()=20
   =20
 =20
Expires May, 2001                                           [Page 102]=20
=0C
JAVA LDAP API                                            November 2000=20
=20
=20
   Returns any LDAP URL extensions specified, or null if none are=20
   specified. Each extension is a type=3Dvalue expression. The =3Dvalue p=
art=20
   may be omitted. The expression may be prefixed with '!' if it is=20
   mandatory for evaluation of the URL.=20
   =20
   =20
4.40.8 getFilter=20
   =20
   public String getFilter()=20
   =20
   Returns the search filter [6], or the default filter -=20
   (objectclass=3D*) - if none was specified.=20
   =20
   =20
4.40.9 getHost=20
   =20
   public String getHost()=20
   =20
   Returns the host name of the LDAP server to connect to.=20
   =20
   =20
4.40.10 getPort=20
   =20
   public int getPort()=20
   =20
   Returns the port number of the LDAP server to connect to.=20
=20
=20
4.40.11 getScope=20
   =20
   public int getScope()=20
   =20
   Returns the depth of search (in DN namespace) - one of SCOPE_BASE,=20
   SCOPE_ONE, SCOPE_SUB from LDAPConnection.=20
   =20
   =20
4.40.12 getUrl=20
   =20
   public String getUrl()=20
   =20
   Returns a valid string representation of this LDAP URL.=20
   =20
   =20
   =20
4.40.13 isSecure=20
   =20
   public boolean isSecure()=20
   =20
   Returns true if the URL is of the type ldaps (LDAP over SSL, a=20
   predecessor to startTLS).=20
   =20
   =20
 =20
Expires May, 2001                                           [Page 103]=20
=0C
JAVA LDAP API                                            November 2000=20
=20
=20
   =20
4.41 Client and Server Controls=20
   =20
   LDAPv3 operations can be extended through the use of controls.=20
   Controls may be sent to a server or returned to the client with any=20
   LDAP message. These controls are referred to as server controls. The=20
   LDAP API also supports a client-side extension mechanism through the=20
   use of client controls (these controls affect the behavior of the=20
   LDAP API only and are never sent to a server). A common class is used=20
   to represent both types of controls - LDAPControl.=20
   =20
   Controls are set and retrieved in LDAPConnection with the=20
   setConstraints and getConstraints methods. Either a single=20
   LDAPControl or an array may be specified, e.g.=20
   =20
      LDAPControl control =3D new LDAPControl( type, critical, vals );=20
      LDAPConstraints cons =3D ld.getConstraints();=20
      cons.setServerControls( control );=20
      ld.setConstraints( cons );=20
   or=20
      LDAPControl[] controls =3D new LDAPControl[2];=20
      controls[0] =3D new LDAPControl( type0, critical0, vals0 );=20
      controls[1] =3D new LDAPControl( type1, critical1, vals1 );=20
      LDAPConstraints cons =3D ld.getConstraints();=20
      cons.setServerControls( controls );=20
      ld.setConstraints( cons );=20
   =20
   Server controls returned to a client as part of the response to a=20
   synchronous operation can be obtained with=20
   LDAPConnection.getResponseControls(). Controls returned on an=20
   asynchronous operation are available with LDAPMessage.getControls().=20
   =20
   Support for specific controls is defined in a package "controls"=20
   subordinate to the main LDAP package.=20
   =20
   =20
5. Security Considerations=20
   =20
   LDAP supports security through protocol-level authentication, using=20
   clear-text passwords or other more secure mechanisms.  It also=20
   supports running over TLS, which provides strong security at the=20
   transport layer.=20
   An interface to using SASL for configurable authentication and=20
   session protection is provided, but implementations are outside the=20
   scope of this document.=20
   =20
   =20
6. Acknowledgements=20
   =20
   The proposed API builds on earlier work done in collaboration with=20
   Thomas Kwan and Stephan Gudmundson, then of NCware Technologies Corp.=20
   It also includes suggestions by Steven Merrell of Novell.=20
 =20
Expires May, 2001                                           [Page 104]=20
=0C
JAVA LDAP API                                            November 2000=20
=20
=20
   =20
    =20
7. Bibliography=20
   =20
   [1]  The Directory: Selected Attribute Syntaxes.  CCITT,=20
        Recommendation X.520.=20
   =20
   [2]  M. Wahl, A. Coulbeck, T. Howes, S. Kille, "Lightweight Directory=20
        Access Protocol: Attribute Syntax Definitions",=20
        RFC 2252, December 1997=20
   =20
   [3]  T. Howes, "A String Representation of LDAP Search Filters," RFC=20
        2254, December 1997.=20
   =20
   [4]  S. Kille, " UTF-8 String Representation of Distinguished Names,"=20
        RFC 2253, December 1997.=20
   =20
   [5]  M. Wahl, T. Howes, S. Kille, "Lightweight Directory Access=20
        Protocol (v3)", RFC 2251, December 1997.=20
   =20
   [6]  T. Howes, M. Smith, "An LDAP URL Format", RFC 2255, December=20
        1997.=20
   =20
   [7]  T. Howes, M. Smith, "The LDAP Application Program Interface",=20
        Internet Draft draft-ietf-ldapext-ldap-c-api-04.txt, 1999.=20
   =20
   [8] T. Berners-Lee, L. Masinter, M. McCahill, "Uniform Resource=20
        Locators (URL)", RFC 1738, December 1994.=20
   =20
   [9] H. Alvestrans, "Tags for the Identification of Languages", RFC=20
        1766, March 1995.=20
   =20
   [10] T. Dierks, C. Allen, "The TLS Protocol", RFC 2246, January 1999.=20
   =20
   =20
8. Authors' Addresses=20
   =20
   Rob Weltman=20
   +1 650 461 1708=20
   robw@worldspot.com=20
   =20
   Christine Tomlinson=20
   Innosoft International, Inc.=20
   8911 Capital of Texas Highway=20
   Suite 4140=20
   Austin, TX  US  78759=20
   +1 512 231 1600=20
   christine.tomlinson@innosoft.com=20
   =20
   Miodrag Kekic=20
   Netscape Communications Corp.=20
   501 E. Middlefield Rd.=20
 =20
Expires May, 2001                                           [Page 105]=20
=0C
JAVA LDAP API                                            November 2000=20
=20
=20
   Mountain View, CA 94043=20
   USA=20
   +1 650 937-5663=20
   miodrag@netscape.com=20
   =20
   Steven Sonntag=20
   Novell, Inc.=20
   1800 South Novell Place=20
   Provo, UT 84606=20
   USA=20
   +1 801 861 7097=20
   vtag@novell.com=20
   =20
   Jim Sermersheim=20
   Novell, Inc.=20
   1800 South Novell Place=20
   Provo, UT 84606=20
   USA=20
   +1 801 861 3088=20
   jimse@novell.com=20
   =20
   Mark Smith=20
   Netscape Communications Corp.=20
   501 E. Middlefield Rd.=20
   Mountain View, CA 94043=20
   USA=20
   +1 650 937-3477=20
   mcs@netscape.com=20
   =20
   Tim Howes=20
   Loudcloud, Inc.=20
   599 N. Mathilda Ave.=20
   Sunnyvale, CA 94086=20
   USA=20
   +1 650 321-4565 x111=20
   howes@loudcloud.com=20
















 =20
Expires May, 2001                                           [Page 106]=20
=0C
JAVA LDAP API                                            November 2000=20
=20
=20
9. Appendix A - Sample java LDAP programs=20
   =20
9.1 Java LDAP programs using synchronous methods=20
   =20
   import netscape.ldap.*;=20
   import java.util.*;=20
   =20
   public class SearchJensen {=20
       public static void main( String[] args )=20
       {=20
           LDAPConnection ld =3D new LDAPConnection();=20
           try {=20
               /* Connect to server */=20
               String MY_HOST =3D "localhost";=20
               int MY_PORT =3D 389;=20
               ld.connect( MY_HOST, MY_PORT );=20
                /* authenticate to the directory as nobody */=20
               /* This is not really necessary if explicit=20
                  authentication is not desired, because there is=20
                  already anonymous authentication at connect time */=20
               ld.bind( "", "" );=20
   =20
               /* search for all entries with surname of Jensen */=20
               String MY_FILTER =3D "sn=3DJensen";=20
               String MY_SEARCHBASE =3D "o=3DAce Industry, c=3DUS";=20
   =20
               LDAPSearchConstraints cons =3D ld.getSearchConstraints();=20
               /* Setting the batchSize to one will cause the result=20
                  enumeration below to block on one result at a time,=20
                  allowing us to update a list or do other things as=20
                  results come in. */=20
               /* We could set it to 0 if we just wanted to get all=20
                  results and were willing to block until then */=20
               cons.setBatchSize( 1 );=20
               LDAPSearchResults res =3D ld.search( MY_SEARCHBASE,=20
                                                  ld.SCOPE_ONE,=20
                                                  MY_FILTER,=20
                                                  null,=20
                                                  false,=20
                                                  cons );=20
   =20
               /* Loop on results until finished */=20
               while ( res.hasMoreElements() ) {=20
   =20
                   /* Next directory entry */=20
                   LDAPEntry findEntry =3D (LDAPEntry)res.nextElement();=20
                   System.out.println( findEntry.getDN() );=20
   =20
                   /* Get the attributes of the entry */=20
   =20
                   LDAPAttributeSet findAttrs =3D=20
                                        findEntry.getAttributeSet();=20
 =20
Expires May, 2001                                           [Page 107]=20
=0C
JAVA LDAP API                                            November 2000=20
=20
=20
                   Enumeration enumAttrs =3D findAttrs.getAttributes();=20
                   System.out.println( "Attributes: " );=20
                   /* Loop on attributes */=20
                   while ( enumAttrs.hasMoreElements() ) {=20
                       LDAPAttribute anAttr =3D=20
                           (LDAPAttribute)enumAttrs.nextElement();=20
                       String attrName =3D anAttr.getName();=20
                       System.out.println( "" + attrName );=20
                       /* Loop on values for this attribute */=20
                       Enumeration enumVals =3D anAttr.getStringValues();=
=20
                       while ( enumVals.hasMoreElements() ) {=20
                           String aVal =3D (String)enumVals.nextElement()=
;=20
                           System.out.println( "" + aVal );=20
                       }=20
                   }=20
               }=20
           }=20
           catch( LDAPException e ) {=20
               System.out.println( "Error: " + e.toString() );=20
           }=20
           /* Done, so disconnect */=20
           if ( ld.isConnected() )=20
               ld.disconnect();=20
       }=20
   }=20



























 =20
Expires May, 2001                                           [Page 108]=20
=0C
JAVA LDAP API                                            November 2000=20
=20
=20
   import netscape.ldap.*;=20
   import java.util.*;=20
   =20
   public class ModifyEmail {=20
       public static void main( String[] args )=20
       {=20
           LDAPConnection ld =3D new LDAPConnection();=20
           try {=20
               /* Connect to server */=20
               String MY_HOST =3D "localhost";=20
               int MY_PORT =3D 389;=20
               ld.connect( MY_HOST, MY_PORT );=20
   =20
               /* authenticate to the directory as Bab Jensen */=20
               String MY_NAME =3D "cn=3DBarbara Jensen,o=3DAce Industry,c=
=3DUS";=20
               String MY_PASSWORD =3D "MysteryLady";=20
               ld.bind( MY_NAME, MY_PASSWORD );=20
   =20
               /* Prepare to change my email address */=20
               LDAPAttribute attrEmail =3D=20
                       new LDAPAttribute( "mail", "babs@ace.com" );=20
               LDAPModification mod =3D=20
                       new LDAPModification( LDAPModification.REPLACE,=20
                                             attrEmail );=20
   =20
               /* Now modify the entry in the directory */=20
               ld.modify( MY_NAME, mod );=20
               System.out.println( "Entry modified"  );=20
   =20
           }=20
           catch( LDAPException e ) {=20
               System.out.println( "Error: " + e.toString() );=20
           }=20
           /* Done, so disconnect */=20
           if ( ld.isConnected() )=20
               ld.disconnect();=20
       }=20
   }=20














 =20
Expires May, 2001                                           [Page 109]=20
=0C
JAVA LDAP API                                            November 2000=20
=20
=20
   import netscape.ldap.*;=20
   import java.util.*;=20
   =20
   public class ShowSchema {=20
       public static void main( String[] args )=20
       {=20
           LDAPConnection ld =3D new LDAPConnection();=20
           try {=20
               /* Connect to server */=20
               String MY_HOST =3D "localhost";=20
               int MY_PORT =3D 389;=20
               ld.connect( MY_HOST, MY_PORT );=20
   =20
               /* Fetch the schema (anonymous is okay for reading) */=20
               LDAPSchema schema =3D new LDAPSchema();=20
               schema.fetchSchema( ld );=20
   =20
               /* What is the definition of "userPassword"? */=20
               LDAPAttributeSchema a =3D=20
                                 schema.getAttribute( "userpassword" );=20
               if ( a !=3D null ) {=20
                  String syntax =3D a.getSyntaxString();=20
                  String syntaxString =3D "string";=20
                  if ( syntax.equals(BINARY_SYNTAX) )=20
                      syntaxString =3D "binary";=20
                  else if (syntax.equals(INTEGER_SYNTAX) )=20
                      syntaxString =3D "integer";=20
                  String single =3D "multi-valued";=20
                  if ( a.isSingleValued() )=20
                      single =3D "single-valued";=20
                  System.out.println( "userPassword. " +=20
                                      "OID =3D " + a.getID() +=20
                                      ", type =3D " + syntaxString +=20
                                      ", " + single );=20
               );=20
   =20
               /* What are the possible attributes for "person"? */=20
               LDAPObjectClassSchema o =3D=20
                                 schema.getObjectClass( "person" );=20
               if ( o !=3D null ) {=20
                  Enumeration required =3D o.getRequiredAttributes();=20
                  Enumeration optional =3D o.getOptionalAttributes();=20
                  System.out.println(=20
                              "Required attributes for person:" );=20
                  while( required.hasMoreElements() )=20
                      System.out.println( "  " +=20
                              (String)required.nextElement() );=20
                  System.out.println(=20
                              "Optional attributes for person:" );=20
                  while(optional.hasMoreElements() )=20
                      System.out.println( "  " +=20
                              (String) optional.nextElement() );=20
 =20
Expires May, 2001                                           [Page 110]=20
=0C
JAVA LDAP API                                            November 2000=20
=20
=20
               );=20
   =20
           } catch( LDAPException e ) {=20
               System.out.println( "Error: " + e.toString() );=20
           }=20
           /* Done, so disconnect */=20
           if ( ld.isConnected() )=20
               ld.disconnect();=20
       }=20
       protected static final String BINARY_SYNTAX =3D=20
                                     "1.3.6.1.4.1.1466.115.121.1.5";=20
       protected static final String INTEGER_SYNTAX =3D=20
                                     "1.3.6.1.4.1.1466.115.121.1.27";=20
   }=20
   =20
   =20




































 =20
Expires May, 2001                                           [Page 111]=20
=0C
JAVA LDAP API                                            November 2000=20
=20
=20
9.2 Java LDAP programs using asynchronous methods=20
   =20
   import org.ietf.ldap.*;=20
   import java.util.*;=20
   =20
   public class SearchJensen {=20
       public static void main( String[] args ) {=20
           try {=20
               LDAPConnection ld =3D new LDAPConnection();=20
               /* Connect to server */=20
               String MY_HOST =3D "localhost";=20
               int MY_PORT =3D 389;=20
               ld.connect( MY_HOST, MY_PORT );=20
   =20
               /* Asynchronous authentication */=20
               LDAPResponseListener r =3D=20
                   ld.bind( "uid=3Dadmin, o=3DAirius.com",=20
                            "password", null );=20
   =20
               /* Do something else, just to show that we're not=20
                  blocked yet */=20
               System.out.println( "Started authenticating" );=20
   =20
               /* Wait until it completes */=20
               LDAPResponse response =3D (LDAPResponse)r.getResponse();=20
               int resultCode =3D response.getResultCode();=20
               if (resultCode !=3D LDAPException.SUCCESS) {=20
                   throw new LDAPException ("error result", resultCode,=20
                   response.getErrorMessage(),=20
                   response.getMatchedDN());=20
               }=20
   =20
               /* search for all entries with surname of Jensen */=20
               String MY_FILTER =3D "sn=3DJensen";=20
               String MY_SEARCHBASE =3D "o=3DAce Industry, c=3DUS";=20
   =20
               LDAPSearchListener l =3D=20
                   ld.search( MY_SEARCHBASE,=20
                              ld.SCOPE_ONE,=20
                              MY_FILTER,=20
                              null,=20
                              false,=20
                              null,=20
                             (LDAPSearchListener)null );=20
   =20
               /* Loop on results until finished */=20
               LDAPMessage msg;=20
               while( (msg =3D l.getResponse()) !=3D null ) {=20
                   if ( msg instanceof LDAPSearchResultReference ) {=20
                       String[] urls =3D=20
                           ((LDAPSearchResultReference)msg).getUrls();=20
                       // Do something with the referrals...=20
 =20
Expires May, 2001                                           [Page 112]=20
=0C
JAVA LDAP API                                            November 2000=20
=20
=20
                   } else if ( msg instanceof LDAPSearchResult ) {=20
                       LDAPEntry entry =3D=20
                           ((LDAPSearchResult)msg).getEntry();=20
                       // The rest of the processing is the same as for=20
                       // a synchronous search=20
                       System.out.println( entry.getDN() );=20
                   } else {=20
                       // A search response=20
                       LDAPResponse res =3D (LDAPResponse)msg;=20
                       int status =3D res.getResultCode();=20
                       if ( status =3D=3D LDAPException.SUCCESS ) {=20
                           // Nothing to do=20
                       } else {=20
                           String err =3D=20
                               LDAPException.errorCodeToString(status);=20
                           throw new LDAPException(=20
                                                  err,=20
                                                  status,=20
                                                  res.getErrorMessage(),=20
                                                  res.getMatchedDN() );=20
                       }=20
                   }=20
               }=20
           } catch ( LDAPException e ) {=20
               System.err.println( e.toString() );=20
           }=20
           /* Done, so disconnect */=20
           if ( ld.isConnected() ) {=20
               ld.disconnect();=20
           }=20
       }=20
   }=20




















 =20
Expires May, 2001                                           [Page 113]=20
=0C
JAVA LDAP API                                            November 2000=20
=20
=20
   import org.ietf.ldap.*;=20
   import java.util.*;=20
   =20
   /* This example multiplexes the input from three different servers */=20
   =20
   public class MultiplexServers {=20
       public static void main( String[] args )=20
       {=20
           try {=20
               LDAPConnection [] ld =3D new LDAPConnection [3];=20
               String[] hosts =3D { "foo1", "foo2", "foo3" };=20
               int[] ports =3D { 389, 389, 2018 }=20
               String[] bases =3D=20
                   { "o=3DAirius.com", "o=3DAcme.com", "dc=3DAcme,dc=3Dco=
m" };=20
               /* search for all entries with surname of Jensen */=20
               String MY_FILTER =3D "sn=3DJensen";=20
   =20
               for( int i =3D 0; i < ld.length; i++ ) {=20
                   ld[i] =3D new LDAPConnection ();=20
                   /* Connect to server */=20
                   ld[i].connect( hosts[i], ports[i] );=20
               }=20
   =20
               /* Get a response listener for one search */=20
               LDAPSearchListener l =3D=20
                   ld[0].search( bases[0],=20
                                 ld.SCOPE_SUB,=20
                                 MY_FILTER,=20
                                 null,=20
                                 false,=20
                                (LDAPSearchListener)null );=20
               /* Share the listener */=20
               for( i =3D 1; i < ld.length; i++ ) {=20
                   ld[i].search( bases[i],=20
                              ld[i].SCOPE_SUB,=20
                              MY_FILTER,=20
                              null,=20
                              false,=20
                              l );=20
               }=20
   =20
               /* Loop on results until finished */=20
               LDAPMessage msg;=20
               while( (msg =3D l.getResponse()) !=3D null ) {=20
                   /* The rest is the same as in the previous example */=20
                   /* ... */=20






 =20
Expires May, 2001                                           [Page 114]=20
=0C
JAVA LDAP API                                            November 2000=20
=20
=20
   import org.ietf.ldap.*;=20
   import java.util.*;=20
   =20
   /* This example multiplexes the input from three searches in=20
      different subtrees of the same server */=20
   =20
   public class MultiplexTrees {=20
       public static void main( String[] args )=20
       {=20
           try {=20
               LDAPConnection ld =3D new LDAPConnection ();=20
               /* Connect to server */=20
               String MY_HOST =3D "localhost";=20
               int MY_PORT =3D 389;=20
               ld.connect( MY_HOST, MY_PORT );=20
               String MY_FILTER =3D "sn=3DJensen";=20
               String[] bases =3D=20
                   { "o=3DAirius.com", "o=3DAcme.com", "dc=3DAcme,dc=3Dco=
m" };=20
   =20
               /* Get a response listener for one search */=20
               LDAPSearchListener l =3D=20
                   ld.search( bases[0],=20
                              ld.SCOPE_SUB,=20
                              MY_FILTER,=20
                              null,=20
                              false,=20
                              (LDAPSearchListener)null );=20
               /* Share the listener */=20
               for( i =3D 1; i < bases.length; i++ ) {=20
                   ld.search( bases[i],=20
                              ld.SCOPE_SUB,=20
                              MY_FILTER,=20
                              null,=20
                              false,=20
                              l );=20
               }=20
   =20
               /* The rest is the same as in the MultiplexServers=20
                  example */=20
               /* ... */=20












 =20
Expires May, 2001                                           [Page 115]=20
=0C
JAVA LDAP API                                            November 2000=20
=20
=20
   import org.ietf.ldap.*;=20
   import java.util.*;=20
   =20
   public class ModifyEmail {=20
       public static void main( String[] args )=20
       {=20
           LDAPConnection ld =3D new LDAPConnection();=20
           try {=20
               /* Connect to server */=20
               String MY_HOST =3D "localhost";=20
               int MY_PORT =3D 389;=20
               ld.connect( MY_HOST, MY_PORT );=20
   =20
               /* authenticate to the directory as Bab Jensen */=20
               String MY_NAME =3D "cn=3DBarbara Jensen,o=3DAce Industry,c=
=3DUS";=20
               String MY_PASSWORD =3D "MysteryLady";=20
               ld.bind( MY_NAME, MY_PASSWORD );=20
   =20
               /* Prepare to change my email address */=20
               LDAPAttribute attrEmail =3D=20
                       new LDAPAttribute( "mail", "babs@ace.com" );=20
               LDAPModification mod =3D=20
                       new LDAPModification( LDAPModification.REPLACE,=20
                                             attrEmail );=20
   =20
               /* Now modify the entry in the directory */=20
               ld.modify( MY_NAME, mod );=20
               System.out.println( "Entry modified"  );=20
   =20
           }=20
           catch( LDAPException e ) {=20
               System.out.println( "Error: " + e.toString() );=20
           }=20
           /* Done, so disconnect */=20
           if ( ld.isConnected() )=20
               ld.disconnect();=20
       }=20
   }=20














 =20
Expires May, 2001                                           [Page 116]=20
=0C
JAVA LDAP API                                            November 2000=20
=20
=20
    =20
10. Appendix B - Changes from ldap-java-api-11.txt=20
   =20
   =20
   LDAPConnection=20
   =20
        Eliminated the interfaces (LDAPv2 and LDAPv3) that=20
        LDAPConnection implemented.=20
        =20
        Eliminated setOption and getOption (there are corresponding=20
        properties in LDAPConstraints and LDAPSearchConstraints).=20
=20
        Removed the signatures of connect which took DN, password, and=20
        protocol version as arguments. The previous signatures were=20
        utility methods that combined connect and bind.=20
        =20
        Added a signature of extendedOperation which takes=20
        LDAPConstraints as argument.=20
        =20
        Added isTLS.=20
        =20
        Added getProtocolVersion.=20
        =20
        Added signatures of abandon which take LDAPConstraints as=20
        argument.=20
        =20
        extendedOperation returns LDAPExtendedResponse, not=20
        LDAPExtendedOperation.=20
        =20
        Added signatures of SASL bind that take LDAPConstraints as=20
        argument.=20
        =20
        Added getSaslBindProperties.=20
        =20
        Added getSaslBindCallbackHandler.=20
        =20
        Added getUnsolicitedNotifications and=20
        setUnsolicitedNotifications.=20
        =20
        The default protocol version to bind with is LDAPv3, not=20
        LDAPv2.=20
        =20
        Constants: LDAP_DEREF_NEVER, etc changed to DEREF_NEVER, etc.=20
        Values of DEREF_SEARCHING and DEREF_FINDING corrected to those=20
        of RFC 2251. The values are now defined in=20
        LDAPSearchConstraints instead of in LDAPConnection.=20
   =20
   =20
   LDAPControl=20
   =20
        Added setValue.=20
   =20
 =20
Expires May, 2001                                           [Page 117]=20
=0C
JAVA LDAP API                                            November 2000=20
=20
=20
   =20
   LDAPExtendedOperation=20
   =20
        Added setValue.=20
   =20
   =20
   LDAPSearchResultReference=20
   =20
        Changed getURLs to getReferrals, which returns String[].=20
   =20
   =20
   LDAPUrl=20
   =20
        Added method isSecure.=20
        =20
        Added constructors that take a boolean for isSecure.=20
   =20
   =20
   LDAPReferralException=20
   =20
        Added getReferralFailureException.=20
        Changed getURLs to getReferrals, which returns String[].=20
   =20
   =20
   LDAPConstraints=20
   =20
        Takes a new interface LDAPReferralHandler as parameter, instead=20
        of LDAPBind and LDAPRebind.=20
        Changed getReferrals to getReferralFollowing.=20
        Changed setReferrals to setReferralFollowing.=20
   =20
   =20
   LDAPReferralHandler=20
   =20
        New common ancestor to LDAPBind and LDAPRebind.=20
   =20
   =20
   LDAPListener=20
   =20
        New common ancestor to LDAPSearchListener and=20
        LDAPResponseListener.=20
   =20
   =20
   LDAPSearchListener=20
   =20
        Implements LDAPListener.=20
        =20
        Added signature of isResponseReceived and of getResponse that=20
        takes a message ID as parameter.=20
        =20
        Added isComplete.=20
   =20
 =20
Expires May, 2001                                           [Page 118]=20
=0C
JAVA LDAP API                                            November 2000=20
=20
=20
   =20
   LDAPResponseListener=20
   =20
        Implements LDAPListener.=20
   =20
        Added signatures isResponseReceived and getResponse that take a=20
        message ID as parameter.=20
   =20
   =20
   LDAPBind=20
   =20
        Changed the signature of bind to return LDAPConnection instead=20
        of void, and take an LDAP URL string list as argument.=20
   =20
   =20
   LDAPException=20
   =20
        Defined the values of symbolic result codes generated by the=20
        interface. Added a constructor that takes matchedDN as=20
        parameter.=20
   =20
   =20
   LDAPMessage=20
   =20
        Redefined the values of the message types to correspond to the=20
        message type values in [5].=20
   =20
   =20
11. Appendix C - Changes from ldap-java-api-10.txt=20
   =20
   Overview of the LDAP model=20
   =20
        Allowed for character set conversion from/to T.61 (in addition=20
        to UTF-8).=20
   =20
   LDAPConnection=20
   =20
        Added startTLS. Added STRING_FORMAT option to setOption. Added=20
        numerical values to options in setOption and search. Changed=20
        REFERRALS_AUTHENTICATION to REFERRALS_REBIND_PROC. Clarified=20
        that getAuthenticationPassword returns null if no simple bind=20
        has been performed. Added asynchronous methods (from [10]). =20
   =20
   LDAPConstraints=20
   =20
        Default for setHopLimit is 10, not 5.=20
   =20
   =20
   LDAPUrl=20
   =20
        Added getScope and getExtensions.=20
   =20
 =20
Expires May, 2001                                           [Page 119]=20
=0C
JAVA LDAP API                                            November 2000=20
=20
=20
   =20
   Schema classes=20
   =20
        Added parameters to constructors (aliases, obsolete,=20
        collective).=20
        =20
        =20
   Various classes=20
   =20
        Removed all "synchronized" qualifier on methods. Added a=20
        statement that implementations should ensure thread-safety.=20
        =20
   =20
12. Appendix D - Changes from ldap-java-api-09.txt=20
   =20
   =20
   Overview of LDAP API use=20
   =20
        Clarifications were added on the behavior of the SDK for null=20
        values of LDAPConstraints and for a DN.=20
   =20
   =20
   LDAPAttributeSet=20
   =20
        Return type of getAttribute is LDAPAttribute, not=20
        LDAPAttribute[].=20
   =20
   =20
   LDAPV2=20
   =20
        Added convenience method of add that does not take=20
        LDAPConstraints, added read method that does take=20
        LDAPSearchConstraints.=20
   =20
   =20
   Error Codes=20
   =20
        Changed to Result Codes. Added TLS_NOT_SUPPORTED.=20
   =20
   =20
   LDAPSearchResults=20
   =20
        Clarified in declaration that it implements Enumeration.=20
   =20
   =20
   LDAPV3=20
   =20
        Added constants NO_ATTRS and ALL_USER_ATTRS.=20
   =20
   =20
   Schema classes=20
   =20
 =20
Expires May, 2001                                           [Page 120]=20
=0C
JAVA LDAP API                                            November 2000=20
=20
=20
        Added LDAPDITContentRuleSchema, LDAPDITStructureRuleSchema,=20
        LDAPMatchingRuleUseSchema, LDAPNameFormSchema, LDAPSyntaxSchema.=20
   =20
   =20
13. Appendix E - Changes from ldap-java-api-08.txt=20
   =20
   =20
   Standards track=20
   =20
        Added intended category to first page header.=20
   =20
   SASL references=20
   =20
        Removed all references to a Java SASL internet draft.=20
   =20
   LDAPv2=20
   =20
        Removed static methods search(LDAPUrl url). The methods are=20
        still present in LDAPConnection.=20
   =20
   =20
14. Appendix F - Changes from ldap-java-api-07.txt=20
   =20
   =20
   LDAPAttributeSchema=20
   =20
        Removed getAliases() because it is already defined in the=20
        superior class LDAPSchemaElement. Removed getSyntax() which=20
        returned an integer.=20
   =20
   LDAPConnection=20
   =20
        Added getAuthenticationMethod().=20
   =20
   LDAPSchemaElement=20
   =20
        Changed getOID() to getID().=20
   =20
   =20
15. Appendix G - Changes from ldap-java-api-06.txt=20
   =20
   =20
   LDAPAttributeSchema=20
   =20
        Added a constructor that takes the attribute syntax as a String,=20
        an optional superior attribute type, and an optional list of=20
        aliases. Removed previous constructor.=20
        Added getSuperior()and getSyntaxString().=20
   =20
   =20
   LDAPConnection=20
   =20
 =20
Expires May, 2001                                           [Page 121]=20
=0C
JAVA LDAP API                                            November 2000=20
=20
=20
        Added getInputStream()getOutputStream(), setInputStream()=20
        (4.6.36), and setOutputStream(). They are used when establishing=20
        a security layer with SASL, and may also be used to interpose a=20
        proxy.=20
   =20
   =20
   LDAPDN=20
   =20
        Added equals().=20
   =20
   =20
   LDAPException=20
   =20
        Added additional error codes defined in [7].=20
   =20
   =20
   LDAPMatchingRuleSchema=20
   =20
        Added a constructor that takes the attribute syntax as a String=20
        and an optional list of aliases. Removed previous constructor.=20
   =20
   =20
   LDAPObjectClassSchema=20
   =20
        Added a constructor that takes an array of superior object class=20
        names, a type (ABSTRACT, AUXILIARY, or STRUCTURAL), and an=20
        optional list of aliases. Removed previous constructor.=20
        Added getSuperiors()and getType(). Removed getSuperior().=20
   =20
   =20
   LDAPSchemaElement=20
   =20
        Added overloaded methods of add, remove, and modify which take a=20
        DN as parameter, for specifying where in the DIT to determine=20
        the SubschemaSubentry for the modification.=20
        Added getAliases(), getQualifier(), getQualiferNames(),=20
        isObsolete(), and setQualifier().=20
   =20
   =20
16. Appendix H - Changes from ldap-java-api-05.txt=20
   =20
   =20
   LDAPConnection=20
   =20
        Distinguished between getConstraints() and=20
        getSearchConstraints(), and between setConstraints() and=20
        setSearchConstraints().=20
   =20
   =20
   LDAPConstraints=20
   =20

 =20
Expires May, 2001                                           [Page 122]=20
=0C
JAVA LDAP API                                            November 2000=20
=20
=20
        LDAPBind and LDAPRebind should not be specified in the same=20
        constructor. Added setClientControls().=20
   =20
   =20
   LDAPSearchConstraints=20
   =20
        LDAPBind and LDAPRebind should not be specified in the same=20
        constructor.=20
   =20
   =20
   LDAPControl=20
   =20
        newInstance() is now static.=20
   =20
   =20
   LDAPv3=20
   =20
        Changed the signature of the bind() methods to match the Java=20
        SASL Internet Draft.=20
   =20
   =20
17. Appendix I - Changes from ldap-java-api-04.txt=20
   =20
   =20
   LDAPAttribute=20
   =20
        Added getByteValueArray() and getStringValueArray().=20
   =20
   =20
   LDAPCompareAttrNames=20
   =20
        Added getLocale() and setLocale().=20
   =20
   =20
   LDAPSchemaElement=20
   =20
        Added modify().=20
   =20
   =20
   LDAPSchemaElement=20
   =20
        Added fetchSchema(LDAPConnection, String).=20
   =20
   =20
18. Appendix J - Changes from ldap-java-api-03.txt=20
   =20
   =20
   LDAPBind=20
   =20
        New interface, to support sophisticated reauthentication=20
        mechanisms.=20
   =20
 =20
Expires May, 2001                                           [Page 123]=20
=0C
JAVA LDAP API                                            November 2000=20
=20
=20
   =20
   LDAPControl=20
   =20
        Added methods register() and newInstance(), to support dynamic=20
        registration and instantiation of server response controls.=20
   =20
   =20
   LDAPConstraints=20
   =20
        Separated interface time limit from server search time limit.=20
        Moved all search-only constraints to LDAPSearchConstraints.=20
   =20
   =20
   LDAPRebind=20
   =20
        Reverted back to original name, instead of LDAPReauthentication=20
        as it was in the previous draft.=20
   =20
   =20
   LDAPRebindProc=20
   =20
        Reverted back from LDAPCredentials.=20
   =20
   =20
   LDAPSearchConstraints=20
   =20
        Reinstated this class, to represent all constraints applicable=20
        to a search. LDAPConstraints (which it extends) only represents=20
        common constraints for all operations.=20
   =20
   LDAPSearchResults=20
   =20
        Added getResponseControls().=20
   =20
   =20
   LDAPv2=20
   =20
        Added abandon(). Separated interface time limit from server=20
        search time limit. Changed authenticate() to bind().=20
   =20
   =20
   LDAPv3=20
   =20
        Changed authenticate() to bind().=20
   =20
   =20
19. Appendix K - Changes from ldap-java-api-02.txt=20
   =20
   =20
   LDAPSearchConstraints=20
   =20

 =20
Expires May, 2001                                           [Page 124]=20
=0C
JAVA LDAP API                                            November 2000=20
=20
=20
        Renamed to LDAPConstraints, since it can be applied to=20
        operations other than search.=20
   =20
   =20
   LDAPRebind=20
   =20
        Renamed to LDAPReauthentication. Added a definition of its=20
        single method.=20
   =20
   LDAPRebindProc=20
   =20
        Renamed to LDAPCredentials.=20
   =20
   =20
20. Appendix L - Changes from ldap-java-api-01.txt=20
   =20
   =20
   LDAPAttribute=20
   =20
        Added a copy constructor.=20
        Added support for subtypes, and for language subtypes in=20
        particular.=20
   =20
   =20
   LDAPAttributeSet=20
   =20
        LDAPAttributeSet implements Cloneable.=20
        Added getSubset() for subtype support.=20
   =20
   =20
   LDAPDN=20
   =20
        Added support for escaping and unescaping an RDN.=20
   =20
   =20
   LDAPException=20
   =20
        Added the SASL_BIND_IN_PROGRESS error code.=20
   =20
   =20
   LDAPSearchResults=20
   =20
        Added getCount(), to report the number of results returned.=20
   =20
   =20
   LDAPConnection=20
   =20
        Added a signature that passes LDAPConstraints to read(LDAPURL).=20
   =20
   =20
   LDAPv2=20
   =20
 =20
Expires May, 2001                                           [Page 125]=20
=0C
JAVA LDAP API                                            November 2000=20
=20
=20
        Added signatures that pass LDAPConstraints to the following=20
        methods:=20
                add()=20
                compare()=20
                modify()=20
                read()=20
                rename()=20
   =20
   LDAPv3=20
   =20
        Removed "Preferred Language", because it has been dropped from=20
        the extension work.=20
        Added a signature that passes LDAPConstraints to rename().=20
=20






































 =20
Expires May, 2001                                           [Page 126]=20
=0C

--------------CE9352E9C0F134D2DC3032DD--



From list@netscape.com  Mon Nov  6 15:14:12 2000
Received: from netscape.com (h-205-217-237-47.netscape.com [205.217.237.47])
	by ietf.org (8.9.1a/8.9.1a) with SMTP id PAA12609
	for <ldapext-archive@odin.ietf.org>; Mon, 6 Nov 2000 15:14:11 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.10.0/8.10.0) with ESMTP id eA6K1vD10713;
	Mon, 6 Nov 2000 12:01:57 -0800 (PST)
Received: (from list@localhost)
	by aka.mcom.com (8.10.0/8.10.0) id eA6K9M619196;
	Mon, 6 Nov 2000 12:09:22 -0800 (PST)
Resent-Date: Mon, 6 Nov 2000 12:09:22 -0800 (PST)
Message-ID: <3A070FB0.F2F2E98F@worldspot.com>
Date: Mon, 06 Nov 2000 12:08:16 -0800
From: Rob Weltman <robw@worldspot.com>
X-Mailer: Mozilla 4.75 [en] (Windows NT 5.0; U)
X-Accept-Language: en
MIME-Version: 1.0
To: ietf-ldapext@netscape.com
Subject: Submission: draft-weltman-ldapv3-proxy-06.txt
Content-Type: multipart/mixed;
 boundary="------------1C9B40BCD6B03FB85A30A86D"
Resent-Message-ID: <"IO2WzD.A.nrE.x_wB6"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com

This is a multi-part message in MIME format.
--------------1C9B40BCD6B03FB85A30A86D
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit

  The attached update of the proxied authorization control draft was submitted for publication last night.

Rob
--------------1C9B40BCD6B03FB85A30A86D
Content-Type: text/plain; charset=us-ascii;
 name="ldapproxy.txt"
Content-Disposition: inline;
 filename="ldapproxy.txt"
Content-Transfer-Encoding: 7bit



Network Working Group                                        Rob Weltman 
INTERNET-DRAFT                                            November, 2000 
    
                   LDAP Proxied Authorization Control 
                   draft-weltman-ldapv3-proxy-06.txt 
 
 
Status of this Memo 
 
   This document is an Internet-Draft and is in full conformance with 
   all provisions of Section 10 of RFC2026. 
    
   Internet-Drafts are working documents of the Internet Task Force 
   (IETF), its areas, and its working groups.  Note that other groups 
   may also distribute working documents as Internet-Drafts. 
    
   Internet-Drafts are draft documents valid for a maximum of six months 
   and may be updated, replaced, or obsoleted by other documents at any 
   time.  It is inappropriate to use Internet Drafts as reference 
   material or to cite them other than as "work in progress." 
    
   The list of current Internet-Drafts can be accessed at 
   http://www.ietf.org/ietf/1id-abstracts.txt 
    
   The list of Internet-Draft Shadow Directories can be accessed at 
   http://www.ietf.org/shadow.html. 
    
    
Abstract 
    
   This document defines support for the Proxied Authorization Control. 
   Controls are an LDAP protocol version 3 extension, to allow passing 
   arbitrary control information along with a standard request to a 
   server, and to receive arbitrary information back with a standard 
   result. The Proxied Authorization Control allows a client to request  
   that an operation be processed under a provided authorization 
   identity [AUTH] instead of as the current authorization identity 
   associated with the connection. 
    
    
1. Introduction 
    
   Version 3 of the LDAP protocol provides a means of supplying 
   arbitrary additional information along with a request to an LDAP 
   server, and receiving arbitrary additional response information. The 
   Control protocol extension is described in [LDAPV3], section 4.1.12. 
   This document defines support for proxied authorization using the 
   Control mechanism. 
    
   The key words "MUST", "SHOULD", and "MAY" used in this document  are  
   to be interpreted as described in [KEYWORDS]. 
    
    

  
Expires May 2001                                              [Page 1] 

PROXIED AUTHORIZATION CONTROL                            November 2000 
 
 
2. Publishing support for the Proxied Authorization Control 
    
   Support for the Proxied Authorization Control is indicated by the 
   presence of the OID "2.16.840.1.113730.3.4.18" in the 
   supportedControl attribute of a server's root DSE. 
    
    
3. Proxied Authorization Control 
    
    
   This control may be included in any search, compare, modify, add, 
   delete, modDN or extended operation request message as part of the 
   controls field of the LDAPMessage, as defined in [LDAPV3]. 
    
   The controlType of the proxied authorization control is 
   "2.16.840.1.113730.3.4.18". 
    
   The criticality MUST be included and MUST be TRUE. 
    
   The control value is the BER encoded authorization identity to use 
   for the request. 
    
    
4. Permission to execute as proxy 
    
   An LDAP server supporting the Proxied Authorization Control may 
   choose to honor or not honor a particular request. If the control is 
   supported but a particular request is denied, the server MUST return 
   the error code insufficientAccessRights. 
    
   A typical implementation will evaluate if the requester has proxy 
   access rights at the base DN of the request. If the requester has 
   proxy access rights, and if the authorization identity is recognized 
   by the server, the request will be honored. If the request is 
   honored, it will be executed as if submitted by the proxy identity. 
    
   During evaluation of a search request, an entry which would have been 
   returned for the search if submitted by the proxy identity directly 
   may not be returned if the server finds that the requester does not 
   have proxy rights to the entry, even if the entry is within the scope 
   of a search request under a base DN which does imply such rights. 
   This means that fewer results, or no results, may be returned 
   compared to the case where the proxy identity issued the request 
   directly. An example of such a case may be a system with fine-grained 
   access control, where the proxy right requester has proxy rights at 
   the top of a search tree, but not at or below a point or points 
   within the tree. 
    
    
5. Security Considerations 
    


  
Expires May 2001                                               [Page 2 

PROXIED AUTHORIZATION CONTROL                            November 2000 
 
 
   The Proxied Authorization Control method is subject to standard LDAP 
   security considerations. The control may be passed over a secure as 
   well as over an insecure channel. 
    
   The control allows for an additional authorization identity to be 
   passed. In some deployments, these identities may contain 
   confidential information which require privacy protection. 
    
   Note that the server is responsible for determining if a proxied 
   authorization request is to be honored. 
    
    
6. Copyright 
    
   Copyright (C) The Internet Society (date). All Rights Reserved. 
    
   This document and translations of it may be copied and furnished to 
   others, and derivative works that comment on or otherwise explain it 
   or assist in its implementation may be prepared, copied, published 
   and distributed, in whole or in part, without restriction of any 
   kind, provided that the above copyright notice and this paragraph are 
   included on all such copies and derivative works.  However, this 
   document itself may not be modified in any way, such as by removing 
   the copyright notice or references to the Internet Society or other 
   Internet organizations, except as needed for the  purpose of 
   developing Internet standards in which case the procedures for 
   copyrights defined in the Internet Standards process must be 
   followed, or as required to translate it into languages other than 
   English. 
    
   The limited permissions granted above are perpetual and will not be 
   revoked by the Internet Society or its successors or assigns. 
    
   This document and the information contained herein is provided on an 
   "AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING 
   TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING 
   BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION 
   HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF 
   MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. 
    
    
7. Bibliography 
    
   [LDAPV3] M. Wahl, T. Howes, S. Kille, "Lightweight Directory Access 
        Protocol (v3)", RFC 2251, December 1997. 
    
   [KEYWORDS] Bradner, Scott, "Key Words for use in RFCs to Indicate 
        Requirement Levels", draft-bradner-key-words-03.txt, January, 
        1997. 
    
   [AUTH] M. Wahl, H. Alvestrand, J. Hodges, R. Morgan, "Authentication 
        Methods for LDAP", RFC 2829, May 2000 
    
  
Expires May 2001                                               [Page 3 

PROXIED AUTHORIZATION CONTROL                            November 2000 
 
 
8. Author's Address 
    
   Rob Weltman 
   +1 650 461 1708 
   robw@worldspot.com 
    
    
9. Acknowledgements 
    
   Mark Smith of Netscape Communications Corp., Mark Wahl of Sun 
   Microsystems, Inc, and Kurt Zeilenga of OpenLDAP Foundation have 
   contributed with reviews of this draft. 
    
    
10. Changes from draft-weltman-ldapv3-proxy-05.txt 
    
   The control also applies to add and extended operations. 
    
   The control value is an authorization ID, not necessarily a DN. 
    
   Confidentiality concerns are mentioned. 
    
    
11. Changes from draft-weltman-ldapv3-proxy-04.txt 
    
   The control does not apply to bind, unbind, or abandon operations. 
    
   The proxy DN is represented as a string in the control, rather than 
   embedded in a sequence. 
    
   Support for the control is published in the supportedControl 
   attribute of the root DSE, not in supportedExtensions. 
    
   The security section mentions confidentiality issues with exposing an 
   additional identity. 
    
    
12. Changes from draft-weltman-ldapv3-proxy-03.txt 
    
   None 
    
    
13. Changes from draft-weltman-ldapv3-proxy-02.txt 
    

13.1 Renamed Control 
    
   The Control is now called Proxied Authorization Control, rather than 
   Proxied Authentication Control, to reflect that no authentication 
   occurs as a consequence of processing the Control. 


  
Expires May 2001                                               [Page 4 

PROXIED AUTHORIZATION CONTROL                            November 2000 
 
 
13.2 Control envelope 
    
   Rather than containing an LDAPDN as the Control value, the Control 
   contains a Sequence (which contains an LDAPDN). This is to provide 
   for future extensions. 















































  
Expires May 2001                                               [Page 5 


--------------1C9B40BCD6B03FB85A30A86D--



From list@netscape.com  Mon Nov  6 15:37:15 2000
Received: from netscape.com (h-205-217-237-46.netscape.com [205.217.237.46])
	by ietf.org (8.9.1a/8.9.1a) with SMTP id PAA19563
	for <ldapext-archive@odin.ietf.org>; Mon, 6 Nov 2000 15:37:14 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.10.0/8.10.0) with ESMTP id eA6KNQs13311;
	Mon, 6 Nov 2000 12:23:26 -0800 (PST)
Received: (from list@localhost)
	by aka.mcom.com (8.10.0/8.10.0) id eA6KZUo03399;
	Mon, 6 Nov 2000 12:35:30 -0800 (PST)
Resent-Date: Mon, 6 Nov 2000 12:35:30 -0800 (PST)
Message-Id: <5.0.0.25.0.20001106123041.00a21400@pop.walltech.com>
X-Sender: bgreenblatt@pop.walltech.com
X-Mailer: QUALCOMM Windows Eudora Version 5.0
Date: Mon, 06 Nov 2000 12:34:28 -0800
To: ietf-ldapext@netscape.com
From: Bruce Greenblatt <bgreenblatt@directory-applications.com>
Subject: what's a standards track control?
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"; format=flowed
Resent-Message-ID: <"VTXx7C.A.Uy.KYxB6"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com

What does it mean for an RFC that defines an LDAP control to be Standards 
Track?  Since it clearly isn't a requirement that all LDAP Servers to 
implement the control, I wonder what the difference is between a "Standards 
Track" control and an "Informational Track" control.  If there is no 
difference, shouldn't all controls be Informational Track (or maybe 
Standards Track)?  Or maybe, all Standards Track controls should be 
mandatory to implement, once the RFC reaches a Standard status.  Any thoughts?

==============================================
Bruce Greenblatt, Ph. D.
Directory Tools and Application Services, Inc.
http://www.directory-applications.com
See my new Book on Internet Directories: 
http://www.phptr.com/ptrbooks/ptr_0139744525.html



From list@netscape.com  Mon Nov  6 17:24:16 2000
Received: from netscape.com (h-205-217-237-46.netscape.com [205.217.237.46])
	by ietf.org (8.9.1a/8.9.1a) with SMTP id RAA24270
	for <ldapext-archive@odin.ietf.org>; Mon, 6 Nov 2000 17:24:15 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.10.0/8.10.0) with ESMTP id eA6MAFs01543;
	Mon, 6 Nov 2000 14:10:16 -0800 (PST)
Received: (from list@localhost)
	by aka.mcom.com (8.10.0/8.10.0) id eA6MMKc27739;
	Mon, 6 Nov 2000 14:22:20 -0800 (PST)
Resent-Date: Mon, 6 Nov 2000 14:22:20 -0800 (PST)
Sender: Mark.Wahl@Central.Sun.COM
Message-ID: <3A072F37.8DE8999E@sun.com>
Date: Mon, 06 Nov 2000 16:22:47 -0600
From: Mark Wahl <Mark.Wahl@Sun.COM>
Organization: Sun Microsystems, Inc.
X-Mailer: Mozilla 4.74 [en] (X11; U; SunOS 5.8 sun4u)
X-Accept-Language: en
MIME-Version: 1.0
To: Bruce Greenblatt <bgreenblatt@directory-applications.com>
CC: ietf-ldapext@netscape.com
Subject: Re: what's a standards track control?
References: <5.0.0.25.0.20001106123041.00a21400@pop.walltech.com>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Resent-Message-ID: <"2biHkC.A.GxG.a8yB6"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com
Content-Transfer-Encoding: 7bit

Bruce Greenblatt wrote:
> 
> What does it mean for an RFC that defines an LDAP control to be Standards
> Track?  Since it clearly isn't a requirement that all LDAP Servers to
> implement the control, I wonder what the difference is between a "Standards
> Track" control and an "Informational Track" control.  

RFC 2026 defines the difference between standards track and informational and
experimental.

Consider the Host Requirements RFC.  It is not a requirement that EVERY 
Internet host implement SMTP to be part of the Internet.  However SMTP is 
a Standard-track specification. Similarly, there are extensions to SMTP which
are not required to be implemented by EVERY MTA, but they are still standards
track.

> If there is no difference, shouldn't all controls be Informational Track (or
> maybe Standards Track)?  Or maybe, all Standards Track controls should be
> mandatory to implement, once the RFC reaches a Standard status.  Any thoughts?

Extensions are optional to implement by client or server, except when referenced
by an Applicability Statement or the core protocol definition.  This does not
keep them from being standards-track.

Mark Wahl
Sun Microsystems Inc.



From list@netscape.com  Mon Nov  6 17:56:54 2000
Received: from netscape.com (h-205-217-237-47.netscape.com [205.217.237.47])
	by ietf.org (8.9.1a/8.9.1a) with SMTP id RAA06085
	for <ldapext-archive@odin.ietf.org>; Mon, 6 Nov 2000 17:56:53 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.10.0/8.10.0) with ESMTP id eA6MkCD16360;
	Mon, 6 Nov 2000 14:46:13 -0800 (PST)
Received: (from list@localhost)
	by aka.mcom.com (8.10.0/8.10.0) id eA6MrcM16251;
	Mon, 6 Nov 2000 14:53:38 -0800 (PST)
Resent-Date: Mon, 6 Nov 2000 14:53:38 -0800 (PST)
Message-Id: <5.0.0.25.0.20001106143827.00a6beb0@pop.walltech.com>
X-Sender: bgreenblatt@pop.walltech.com
X-Mailer: QUALCOMM Windows Eudora Version 5.0
Date: Mon, 06 Nov 2000 14:52:29 -0800
To: Mark Wahl <Mark.Wahl@sun.com>
From: Bruce Greenblatt <bgreenblatt@directory-applications.com>
Subject: Re: what's a standards track control?
Cc: ietf-ldapext@netscape.com
In-Reply-To: <3A072F37.8DE8999E@sun.com>
References: <5.0.0.25.0.20001106123041.00a21400@pop.walltech.com>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"; format=flowed
Resent-Message-ID: <"LV-OkD.A.f9D.xZzB6"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com

At 02:22 PM 11/6/2000, Mark Wahl wrote:
>Bruce Greenblatt wrote:
> >
> > What does it mean for an RFC that defines an LDAP control to be Standards
> > Track?  Since it clearly isn't a requirement that all LDAP Servers to
> > implement the control, I wonder what the difference is between a "Standards
> > Track" control and an "Informational Track" control.
>
>RFC 2026 defines the difference between standards track and informational and
>experimental.

Yes, I know that.  It was after re-reading RFC 2026, that I posted my 
note.  As far as I can tell, there is no difference (yet) between a 
Standards Track control, and an Informational Track control.  I would 
recommend that unless there is substantial consensus that the control will 
be widely implemented, then controls should be Informational.  I think that 
Standards Track should be reserved for those controls which the IETF 
community feels are important for all servers to implement.  Before any 
more controls go forward, some guidance should be provided over what makes 
up difference between Experimental, Informational and Standards Track 
Controls...

>[snip]
>
>Extensions are optional to implement by client or server, except when 
>referenced
>by an Applicability Statement or the core protocol definition.  This does not
>keep them from being standards-track.

They are now, but I can imagine that there may come a time that Servers 
will be required to implement a particular control (or some other extension).


>Mark Wahl
>Sun Microsystems Inc.

==============================================
Bruce Greenblatt, Ph. D.
Directory Tools and Application Services, Inc.
http://www.directory-applications.com
See my new Book on Internet Directories: 
http://www.phptr.com/ptrbooks/ptr_0139744525.html



From list@netscape.com  Mon Nov  6 20:32:18 2000
Received: from netscape.com (h-205-217-237-47.netscape.com [205.217.237.47])
	by ietf.org (8.9.1a/8.9.1a) with SMTP id UAA03183
	for <ldapext-archive@odin.ietf.org>; Mon, 6 Nov 2000 20:32:16 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.10.0/8.10.0) with ESMTP id eA71NAD15720;
	Mon, 6 Nov 2000 17:23:10 -0800 (PST)
Received: (from list@localhost)
	by aka.mcom.com (8.10.0/8.10.0) id eA71UZ201382;
	Mon, 6 Nov 2000 17:30:35 -0800 (PST)
Resent-Date: Mon, 6 Nov 2000 17:30:35 -0800 (PST)
Date: Mon, 6 Nov 2000 17:30:00 -0800 (PST)
Message-Id: <200011070130.eA71TwD09618@ywing.netscape.com>
From: jjmk2404@CBND.hotmail.com
To: Business@ywing.netscape.com, Opportunists@netscape.com
Subject:  Financial Freedom
X-Reply-To:  jjmk2404@hotmail.com 
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: 7bit
Resent-Message-ID: <"26Udx.A.mU.5s1B6"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com
Content-Transfer-Encoding: 7bit

This is not a spam - your e-mail was purchased from HP Marketing as someone 
seeking new business opportunities.  If you have received this e-mail in error or you 
are no longer interested, you can be removed by pressing "Reply" and place 
"Remove" in the subject line.  


* AS SEEN ON NATIONAL TV *

Thankyou for your time and interest
this is the Letter you've been hearing about
in the News lately. The results of this TV show
have been truly remarkable.................
now EVERYBODY wants to get involved !! 

****************************************************************
LISTEN IN TO A FEW * TESTIMONIALS * 
AND SEE FOR YOURSELF WHAT ALL THE 
EXCITEMENT'S ABOUT..........HOW ORDINARY
MEN AND WOMEN........ JUST LIKE YOU AND ME 
ARE MAKING MORE MONEY THAN THEY EVER
THOUGHT POSSIBLE
****************************************************************

The day I stopped looking at hyped up fancy websites
was the day I actually started making some money

Dorothy O'Connor
Canada

My name is Frank, my wife Doris and I live in Bel-Air, MD.
I am a cost accountant with a major U.S. Corporation and 
I make pretty good money. When I received this program I 
grumbled to Doris about receiving junk mail in fact I made 
fun of the whole thing, spouting my knowledge of 
the population and the percentages involved......
I " knew " it wouldn't work....but Doris totally ignored my
supposed intelligence, and jumped in with both feet.
I made merciless fun of her, and was ready to lay the old
" I told you so " on her when the thing didn't work........
well, the laugh was on me, how wrong I was !!
within 2 weeks she had received over 50 responses.....
within 42 days she had received over $147,200 in $5 bills!
I was so sure that I had it all figured out, and that it could
not work......I AM A BELIEVER NOW......I have joined my
wife Doris in her hobby, and we've both said goodbye to 
the Rat Race, and we owe it all to an innocent little e:mail

Frank T, Bel-Air, MD

I just want to pass along my best wishes and 
encouragement to all of you out there who may still be
sceptical.......any doubts you may have will vanish when
your first orders come in.....I even checked with the 
U.S. Post Office to verify that the plan was legal
it definitely is !!!.........AND IT WORKS !!!

Paul Johnson, Raleigh, NC

The main reason for this letter, is to convince you that this
system is honest lawful extremely profitable, and is a way
to get a large amount of money in a short space of time..
I was approached several times before I checked it out.
I joined, more out of curiosity than anything else just to see
what one could realistically expect in return for the minimal
effort and money required......To my absolute astonishment
I received $36,475 in my first 14 weeks....with, I might add
money still coming in.....................just do it !

Phillip A Brown, London UK

I bought my first computer about 6 years ago, for the soul 
purpose of trying to make money on the net, and I can tell
you it's been up-hill all the way ........ until now !
If you wanted to make money on the Internet you had to 
register, download, install, and troubleshoot software........
answer personal questions, handover credit card
details, accept unwanted e:mails, recruit, sponsor, 
carry stock, and sell to complete strangers either 
face to face or over the phone..........UNTIL NOW !
and before you say " Rubbish it won't work ".you're wrong
IT DOES WORK, it's working right now for homeworkers
all over the world.
If like the rest of us you hate spending hours on the phone
reading from a script, night after night, trying in vain to get 
someone to look at a website that you now secretly wish 
you had never bought into.....then read on, this is for you
this is a work from home money maker, pure and simple
.........this is the fastest, easiest money making system
on the net.....and that's a fact.

Susan Kennedy, Edinburgh, Scotland

I bought my son Jason a computer last Christmas
all the other kids had one so I was hard pressed 
to say no.....one night after he had gone to bed, I thought
I would surf the net, just for a bit of fun, I realise now that
at the time my learning curve must have been as steep 
as Everest.....because I hadn't a clue what an e/mail was..
well I must have joined something because the next
day the in-box was full of biz opps, I even had to ask my 
next door neighbour how to open it, as it happens, that 
was the best thing I ever did because it was my neighbour 
June, that spotted this opportunity, we'd seen all sorts
of fancy websites, but somehow this program seemed so 
simple to operate.........so we clubbed together $10 each,
and sent off for the 4 reports, well, as they say, the rest is 
history ....... we're not millionaires yet, but at the rate we're
going who knows.................this time next year??? 

Connie...".a very happy working mum.".....Dublin, Ireland 

Not being the gambling type, it took me several weeks 
to make up my mind to participate in this plan.
But I decided that the initial investment was so small 
that there was just no way that I wouldn't get enough 
orders to at least get my money back, BOY OH BOY 
was I surprised when I found my medium-size PO box 
crammed with envelopes for a while, it got so overloaded 
that I had to start picking up my mail at the window. 
The nice thing about this plan is
it doesn't matter where in the WORLD people live.......
everybody wants to make some extra cash, there isn't
a better investment with a Faster return......just do it

Mary Rockland, Lansing, MI

I had received this programme before and deleted it, 
but later I wondered if I shouldn't have given it a try. 
Of course I had no idea who to contact to get another 
so I had to wait until I was E- mailed another program... 
5 months passed then it came....I made more than
$27,000 on my first try

D. Wilburn, Muncie, IN

We have quit our jobs, and will soon buy a house 
on the beach and live off the interest on our money.
The only way this plan will work for YOU, is if you do it 
For the sake of your family, don't pass up this golden 
opportunity ...........Good Luck, and happy spending!

Charles Fairchild, Sidney, Australia

$Ł$Ł$Ł$Ł$Ł$Ł$Ł$Ł$Ł$Ł$Ł$Ł$Ł$Ł$Ł$Ł$Ł$Ł$Ł$Ł$Ł$Ł$Ł

" OK, HERE IT IS "
*** PRINT THIS NOW FOR FUTURE REFERENCE ***
AND PLEASE INCLUDE ALL THE TESTIMONIALS

$Ł$Ł$Ł$Ł$Ł$Ł$Ł$Ł$Ł$Ł$Ł$Ł$Ł$Ł$Ł$Ł$Ł$Ł$Ł$Ł$Ł$Ł$Ł

THIS IS A LEGITIMATE LEGAL HONEST CHEAT-PROOF
MONEY MAKING OPPORTUNITY.
It does not require you to come into contact with people, 
do any work, or leave the house except to get the mail.
If you truly believe that someday you'll get that big break 
that you've been waiting for....THIS IS IT !!!.....simply follow
the instructions and like so many other people
your dreams will come true.This e:mail marketing program 
works perfectly......100% EVERY TIME.....
Take advantage of this non-commercialised method of
advertising NOW!!!..........

MULTI-LEVEL MARKETING ( MLM ) has finally gained 
respectability. It is being taught in the Harvard Business 
School, both Stanford Research 
and the Wall Street Journal have stated that, between 
50% & 65% of all goods and services will be sold through 
multi-level methods by the year 2002. 
This is a Multi-Billion Dollar industry and of the 500,000 
millionaires in the U.S. 30% made their fortune in the last 
few years in MLM. Moreover, statistics show 45 people
become millionaires everyday through Multi-Level Marketing

You may have heard this story before, but over the summer
Donald Trump made an appearance on the David Letterman
Show. Dave asked him what he would do if he lost everything
and had to start again from scratch, without hesitating Trump
said " I would find a good network marketing company and
get to work "........The audience started to hoot and boo him,
he looked out at the audience and dead-panned his response
That's why I'm sitting up here and you are all sitting out there 

Residual income is the secret of the wealthy. 
it means getting paid again and again
over and over, you will see at a glance that the techniques
used in this business plan are the same techniques that
Tupperware.....Mary Kay......Amway, and a few other
well known successful empires have used for years, 
Geometric Progression, simply means the multiplying 
of numbers by compounding. This method of reaching 
the masses has until now been unavailable to the average
homeworker, simply because of the cost of advertising and
postage... not anymore, the computer has changed all that

$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
A PERSONAL NOTE
FROM THE ORIGINATOR OF THIS PROGRAM 

By the time you have read the enclosed program and reports
you will have concluded that such a program, could not have 
been created by an amateur.
You are in possession of information that can AND WILL give
you financial freedom for the rest of your life, with " NO RISK "
.....with just a little bit of effort, YOU can make more money 
in the next few months than you have ever imagined. I should
point out that I will not see a penny of this money nor anyone
else who has provided a testimonial for this program.
I have already made over 4 MILLION DOLLARS ! 
and I am now happily retired

Follow the program ( EXACTLY AS INSTRUCTED )
Do Not Change It In Any Way.....it works exceedingly well
just as it is. Remember, one of the people you send this
to may send 50,000..with your name on everyone of them 

****************************************************************
****************************************************************
HERE'S HOW THIS AMAZING PROGRAM WILL
MAKE YOU THOUSANDS OF DOLLARS

This is what you MUST do:
1. Order all 4 reports shown on the list below
( you can't sell them if you don't order them )

* For each report, send $5.00 CASH or the equivalent
in your own currency..........
PLUS, the NAME and NUMBER of the report you are
ordering
PLUS, YOUR E:MAIL ADDRESS
PLUS, "YOUR" NAME AND ADDRESS to:- the person
whose name appears on the list next to the report
you are ordering......PLEASE MAKE SURE " YOUR "
NAME AND ADDRESS IS WRITTEN ON THE BACK
OF THE ENVELOPE IN CASE OF ANY MAIL 
PROBLEMS
* When you place your order make sure you order each of
the 4 reports, you MUST have all 4 reports so that you 
can save them on your computer and resell them 
to YOUR customers......................

* Within a few days, you will receive via e:mail each of the 
4 reports....... SAVE THEM on your computer so they 
will be accessible for you to send to the 1,000's 
of people who will order them from you

2. VERY IMPORTANT --- DO NOT --- REPEAT DO NOT ---
alter the names of the people who are listed next to 
each report ......or their sequence on the list, in any way
other than is instructed below in steps "a" through to " f "
or you will lose out on the majority of your profits.

* Once you understand the way this system works, you'll
also see how it doesn't work IF YOU CHANGE IT
rest assured....this method has been tested, and if you
alter it, it will not work!!! 

a. Look below for the listing of available reports

b. After you've ordered the four reports, take this letter and
remove the name and address next to REPORT # 4

c. Move the name and address next to REPORT # 3 down 
to REPORT # 4

d. Move the name and address next to REPORT # 2 down
to REPORT # 3

e. Move the name and address next to REPORT # 1 down
to REPORT # 2

f. Insert YOUR name and address in the # 1 position next
to REPORT # 1

PLEASE PLEASE make absolutely sure that you copy
every name and address ACCURATELY.......thankyou

3. Take this entire letter including the modified list of names
and save it to your computer. Make NO changes to the
instruction portion of this letter

4. Now you're ready to start an advertising campaign on the
World Wide Web ! ......Send Out This Letter
( with YOUR name added in the # 1 position )
to as many people as you can, friends, family, whoever.....
Advertising on the net can be very inexpensive, and
there are HUNDREDS of FREE places to advertise.
And then of course there are e:mail lists......
check this out for a megga response rate....go to:-
http://members.1millionoptin.com 
you will be mailing to 1,000,000+ people everyday !!
nothing for you to set up......no instructions to follow
it's all done for you......simple / quick / and easy

5. NOW FOR THE FUN PART OF THE PROGRAM
Now you are ready to start raking in the cash
For every $5.00 you receive, all you must do is e:mail
them the report they have ordered......always provide
Same-Day service on all orders......it is in your own
interest to do this......the sooner they get the report
the sooner they can advertise........yes?......ok!
OK.....LETS RE-CAP 
order each report by number and name
always send $5 cash for each report
always send your order via the quickest form of delivery
make sure the cash is concealed by wrapping it in
at least 2 sheets of paper......on one of those sheets
of paper, include: (a) the number and name of the report
you are ordering: (b) your e:mail address 
and (c) your postal address

-----------------------------------------------------------------
-------------------
REPORT # 1 HOW TO MAKE $250,000 THROUGH
MULTI-LEVEL SALES
ORDER THIS REPORT FROM:-

K. Gipple
P.O. Box 451
Johnston
IA  50131
-----------------------------------------------------------------
-------------------
REPORT # 2 MAJOR CORPORATIONS AND
MULTI-LEVEL SALES
ORDER THIS REPORT FROM:-

Graham Shaw
63 Woodland Avenue
Thornton-Cleveleys
Lancashire FY5 4HA
England UK

-----------------------------------------------------------------
-------------------
REPORT # 3 SOURCES FOR THE BEST MAILING LISTS
ORDER THIS REPORT FROM:-

Mingo Bueno
6814 Country Cross
San Antonio
Texas 78240

-----------------------------------------------------------------
-------------------
REPORT # 4 EVALUATING MULTI-LEVEL SALES PLANS
ORDER THIS REPORT FROM:-

B Taylor
P.O. Box 807
Homer
LA 71040


-----------------------------------------------------------------
-------------------
HERE'S HOW THIS AMAZING PLAN 
WILL MAKE YOU $$ MONEY $$
-----------------------------------------------------------------
------------------

Set your goal to get 10 people to participate......
obviously you'll get a lot more because everyone can
afford the $20 ...... but just for now, assume 10......
and assume that everyone else in your organization
does the same......follow this example to achieve the
STAGGERING results below 

1st level-your 10 members with $5,,,,,,,,$50
2nd level-10 join from those 10 ($5x100)$500
3rd level-10 join from those 100($5x1,000)$5,000
4th level-10 join from those 1,000($5x10,000)$50,000
and remember.....this calculation is only to a factor of ten 
TOTAL $55,550
$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
Well my friend, it's decision time, now it's up to you
do you continue to search the net for that... 
mythical.....illusive.....rainbows end
the one everybody keeps talking about, but no ones 
found yet, or do you say, what the heck, I've spent enough
time and money looking........lets go for it
Lets Just Do It !!!!!!
ORDER THE REPORTS ' TODAY ' AND GET STARTED
ON THAT ROAD TO FINANCIAL FREEDOM
$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$


















































































































































































































































































































































































































































From list@netscape.com  Mon Nov  6 23:46:58 2000
Received: from netscape.com (h-205-217-237-47.netscape.com [205.217.237.47])
	by ietf.org (8.9.1a/8.9.1a) with SMTP id XAA15184
	for <ldapext-archive@odin.ietf.org>; Mon, 6 Nov 2000 23:46:57 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.10.0/8.10.0) with ESMTP id eA74buD09931;
	Mon, 6 Nov 2000 20:37:57 -0800 (PST)
Received: (from list@localhost)
	by aka.mcom.com (8.10.0/8.10.0) id eA74jNo11970;
	Mon, 6 Nov 2000 20:45:23 -0800 (PST)
Resent-Date: Mon, 6 Nov 2000 20:45:23 -0800 (PST)
Date: Mon, 6 Nov 2000 20:44:59 -0800 (PST)
Message-Id: <200011070444.eA74ixR28699@xwing.netscape.com>
From: lotsamoola2000@VQDQ.yahoo.com
To: ietf-ldapext@netscape.com
Subject:  Do you want to make a quick $100 today?
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: 7bit
Resent-Message-ID: <"XI3Sj.A.j6C.ij4B6"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com
Content-Transfer-Encoding: 7bit

Need a quick $100 today? 
Need a quick $500 this week? 
Need to QUICKLY build a $5,000 monthly income? 

This may be the most COMMON SENSE email you've ever read 
because I'm going show you EXACTLY how I got SICK AND TIRED of 
all the stupid chain letters, MLM's and mathematically 
impossible matrix deals, and started making all the money I 
needed, right from my home computer. 

I'm gonna show you EXACTLY how I get money deposited RIGHT to 
MY bank account (no company to hold my money while they "work 
things out"), and EXACTLY what I do every single day. This is 
for normal, hardworking people who want to make a steady, 
substantial and growing income from their computers, and to 
start making money today. 

You DON'T need a website. 
You DON'T need to "recruit" anyone. 
You DON'T need to talk to anyone. And... 
you DON'T even need to pay 
until YOU see that it works for YOU! 

I'm not kidding you when I tell you that you can have a 
perfectly legal and legitimate home based business that starts 
earning you money RIGHT AWAY, and that provides a STEADY and 
GROWING income - as much as you want to make! 

I'm gonna give you the tools to make this an automated thing, 
so you can be earning money whether you're at your computer or 
not! Believe me when I tell you that this very simple system 
took me from worrying about bills to having fun shopping in 
less than a week! 

Are YOU sick of it all yet? 
Do YOU need a QUICK income? 
Do YOU want control of your OWN money? 

Simply send me an email to tell_me_more@aoservices.com and an 
autoresponder will immediately send you back the very simple 
and straightforward explanation of how YOU can do what I've 
done. Then you can decide if it's something you can do. 

But don't kid yourself. You have to do SOMETHING different, 
right? What if I'm telling the truth? (And I can prove that I 
am?) send an  email to:

 tell_me_more@aoservices.com

*In subject please write "more info"*



--------------------------------------------------------------------------------------------------------------------------------
  
I recieved your e-mail address as someone interested in business opportunities, if this was an error I 
apologize. This is a one-time mailing and your e-mail address will be deleted from my data base
--------------------------------------------------------------------------------------------------------------------------------




From list@netscape.com  Tue Nov  7 06:07:52 2000
Received: from netscape.com (h-205-217-237-47.netscape.com [205.217.237.47])
	by ietf.org (8.9.1a/8.9.1a) with SMTP id GAA07478
	for <ldapext-archive@odin.ietf.org>; Tue, 7 Nov 2000 06:07:52 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.10.0/8.10.0) with ESMTP id eA7AwcD17963;
	Tue, 7 Nov 2000 02:58:39 -0800 (PST)
Received: (from list@localhost)
	by aka.mcom.com (8.10.0/8.10.0) id eA7B64605693;
	Tue, 7 Nov 2000 03:06:04 -0800 (PST)
Resent-Date: Tue, 7 Nov 2000 03:06:04 -0800 (PST)
Message-Id: <200011071104.GAA06111@ietf.org>
Mime-Version: 1.0
Content-Type: Multipart/Mixed; Boundary="NextPart"
To: IETF-Announce: ;
Cc: ietf-ldapext@netscape.com
From: Internet-Drafts@ietf.org
Reply-to: Internet-Drafts@ietf.org
Subject: I-D ACTION:draft-ietf-ldapext-ldap-java-api-12.txt
Date: Tue, 07 Nov 2000 06:04:21 -0500
Sender: nsyracus@cnri.reston.va.us
Resent-Message-ID: <"biUfOC.A.nYB.RI-B6"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com

--NextPart

A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the LDAP Extension Working Group of the IETF.

	Title		: The Java LDAP Application Program Interface
	Author(s)	: R. Weltman, C. Tomlinson, M. Kekic,
                          S. Sonntag, J. Sermersheim, M. Smith,
                          T. Howes
	Filename	: draft-ietf-ldapext-ldap-java-api-12.txt
	Pages		: 126
	Date		: 06-Nov-00
	
This document defines a Java language application program interface
to the lightweight directory access protocol (LDAP), in the form of a
class library. It complements but does not replace RFC 1823 ([7]),
which describes a C language application program interface. It
updates the previous draft in correcting a few minor errors which are
listed in appendix B. It also includes the asynchronous layer of the
API which was previously defined in draft-ietf-ldapext-ldap-java-api-
asynch [10].

A URL for this Internet-Draft is:
http://www.ietf.org/internet-drafts/draft-ietf-ldapext-ldap-java-api-12.txt

Internet-Drafts are also available by anonymous FTP. Login with the username
"anonymous" and a password of your e-mail address. After logging in,
type "cd internet-drafts" and then
	"get draft-ietf-ldapext-ldap-java-api-12.txt".

A list of Internet-Drafts directories can be found in
http://www.ietf.org/shadow.html 
or ftp://ftp.ietf.org/ietf/1shadow-sites.txt


Internet-Drafts can also be obtained by e-mail.

Send a message to:
	mailserv@ietf.org.
In the body type:
	"FILE /internet-drafts/draft-ietf-ldapext-ldap-java-api-12.txt".
	
NOTE:	The mail server at ietf.org can return the document in
	MIME-encoded form by using the "mpack" utility.  To use this
	feature, insert the command "ENCODING mime" before the "FILE"
	command.  To decode the response(s), you will need "munpack" or
	a MIME-compliant mail reader.  Different MIME-compliant mail readers
	exhibit different behavior, especially when dealing with
	"multipart" MIME messages (i.e. documents which have been split
	up into multiple messages), so check your local documentation on
	how to manipulate these messages.
		
		
Below is the data which will enable a MIME compliant mail reader
implementation to automatically retrieve the ASCII version of the
Internet-Draft.

--NextPart
Content-Type: Multipart/Alternative; Boundary="OtherAccess"

--OtherAccess
Content-Type: Message/External-body;
	access-type="mail-server";
	server="mailserv@ietf.org"

Content-Type: text/plain
Content-ID:	<20001106120234.I-D@ietf.org>

ENCODING mime
FILE /internet-drafts/draft-ietf-ldapext-ldap-java-api-12.txt

--OtherAccess
Content-Type: Message/External-body;
	name="draft-ietf-ldapext-ldap-java-api-12.txt";
	site="ftp.ietf.org";
	access-type="anon-ftp";
	directory="internet-drafts"

Content-Type: text/plain
Content-ID:	<20001106120234.I-D@ietf.org>

--OtherAccess--

--NextPart--




From list@netscape.com  Tue Nov  7 11:10:57 2000
Received: from netscape.com (h-205-217-237-46.netscape.com [205.217.237.46])
	by ietf.org (8.9.1a/8.9.1a) with SMTP id LAA15573
	for <ldapext-archive@odin.ietf.org>; Tue, 7 Nov 2000 11:10:57 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.10.0/8.10.0) with ESMTP id eA7Fv9s05313;
	Tue, 7 Nov 2000 07:57:10 -0800 (PST)
Received: (from list@localhost)
	by aka.mcom.com (8.10.0/8.10.0) id eA7G9Fk08365;
	Tue, 7 Nov 2000 08:09:15 -0800 (PST)
Resent-Date: Tue, 7 Nov 2000 08:09:15 -0800 (PST)
Message-Id: <5.0.0.25.0.20001107074503.00ac0050@router.boolean.net>
X-Sender: guru@router.boolean.net
X-Mailer: QUALCOMM Windows Eudora Version 5.0
Date: Tue, 07 Nov 2000 08:08:16 -0800
To: robw@worldspot.com
From: "Kurt D. Zeilenga" <Kurt@openldap.org>
Subject: LDAP Proxied Authorization Control
Cc: ietf-ldapext@netscape.com
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Resent-Message-ID: <"r11yuB.A.bAC.mkCC6"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com

Rob,

You're control syntax needs a slight change due to the change
to a "authentication identity".  RFC2829 states:
   The authorization identity is a string in the UTF-8 character set,
   corresponding to the following ABNF [7]: ...

Hence, there is no ASN.1 to BER encode (as you had in previous draft,
hence my previous suggestion).   I suggest:
   The control value, an OCTET STRING, contains a LDAP Authorization
   Identity (authzId) as described in RFC2829, Section 9.

Alternative, you could define the value as the BER encoding of an
ASN.1 SEQUENCE which holds one OCTET STRING that contains an authzId.
   The control value is the BER encoding of proxiedAuthzValue:
		proxiedAuthzValue ::= SEQUENCE {
			proxyId	LDAPString }

   where proxyId contains an LDAP Authorization Identity (authzID) as
   described in RFC 2829, Section 9.  This sequence may be updated by
   Standard Track specifications updating this document.  Implementations
   SHOULD ignore elements of this sequence whose tags they do not
   recognize.

The latter offers a bit of extensibility which may or may not be
desirable.







Kurt
 



From list@netscape.com  Tue Nov  7 14:58:35 2000
Received: from netscape.com (h-205-217-237-47.netscape.com [205.217.237.47])
	by ietf.org (8.9.1a/8.9.1a) with SMTP id OAA09141
	for <ldapext-archive@odin.ietf.org>; Tue, 7 Nov 2000 14:58:34 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.10.0/8.10.0) with ESMTP id eA7JnOD12952;
	Tue, 7 Nov 2000 11:49:27 -0800 (PST)
Received: (from list@localhost)
	by aka.mcom.com (8.10.0/8.10.0) id eA7Jun215587;
	Tue, 7 Nov 2000 11:56:49 -0800 (PST)
Resent-Date: Tue, 7 Nov 2000 11:56:49 -0800 (PST)
Sender: Morteza.Ansari@eng.Sun.COM
Message-ID: <3A085E4C.B78029B@eng.sun.com>
Date: Tue, 07 Nov 2000 11:55:56 -0800
From: Morteza Ansari <morteza@eng.Sun.COM>
Organization: Sun Microsystems Inc.
X-Mailer: Mozilla 4.75 [en] (X11; U; SunOS 5.9 sun4u)
X-Accept-Language: en
MIME-Version: 1.0
To: robw@worldspot.com
CC: ietf-ldapext@netscape.com
Subject: Java LDAP Application Program Interface
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Resent-Message-ID: <"2cCFOB.A.4xD.95FC6"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com
Content-Transfer-Encoding: 7bit

Rob,

In sections 4.6.7, 4.26.1, 4.38.1, and 4.40.1, "host" is defined as a
hostname or dotted string which may include trailing colon and port
number.  This does not allow IPv6 addresses to be specified, and should
be changed to comply with RFC 2732:

      host          = hostname | IPv4address | IPv6reference
      ipv6reference = "[" IPv6address "]"

For example:

      "[FEDC:BA98:7654:3210:FEDC:BA98:7654:3210]:80"
      ldap://[3ffe:2a00:100:7031::1]:1050/o=abc


Cheers,
Morteza



From list@netscape.com  Tue Nov  7 16:18:12 2000
Received: from netscape.com (h-205-217-237-47.netscape.com [205.217.237.47])
	by ietf.org (8.9.1a/8.9.1a) with SMTP id QAA28863
	for <ldapext-archive@odin.ietf.org>; Tue, 7 Nov 2000 16:18:12 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.10.0/8.10.0) with ESMTP id eA7L8ID29503;
	Tue, 7 Nov 2000 13:08:18 -0800 (PST)
Received: (from list@localhost)
	by aka.mcom.com (8.10.0/8.10.0) id eA7LFio22915;
	Tue, 7 Nov 2000 13:15:44 -0800 (PST)
Resent-Date: Tue, 7 Nov 2000 13:15:44 -0800 (PST)
Message-ID: <3A0870B1.7DD1534A@worldspot.com>
Date: Tue, 07 Nov 2000 13:14:26 -0800
From: Rob Weltman <robw@worldspot.com>
X-Mailer: Mozilla 4.75 [en] (Windows NT 5.0; U)
X-Accept-Language: en
MIME-Version: 1.0
To: Morteza Ansari <morteza@eng.sun.com>
CC: ietf-ldapext@netscape.com
Subject: Re: Java LDAP Application Program Interface
References: <3A085E4C.B78029B@eng.sun.com>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Resent-Message-ID: <"GMzUzD.A.qlF._DHC6"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com
Content-Transfer-Encoding: 7bit

  That's true. As I understand it, the IPv6-formatted host addresses should work.

Rob


Morteza Ansari wrote:

> Rob,
>
> In sections 4.6.7, 4.26.1, 4.38.1, and 4.40.1, "host" is defined as a
> hostname or dotted string which may include trailing colon and port
> number.  This does not allow IPv6 addresses to be specified, and should
> be changed to comply with RFC 2732:
>
>       host          = hostname | IPv4address | IPv6reference
>       ipv6reference = "[" IPv6address "]"
>
> For example:
>
>       "[FEDC:BA98:7654:3210:FEDC:BA98:7654:3210]:80"
>       ldap://[3ffe:2a00:100:7031::1]:1050/o=abc
>
> Cheers,
> Morteza



From list@netscape.com  Tue Nov  7 20:18:54 2000
Received: from netscape.com (h-205-217-237-47.netscape.com [205.217.237.47])
	by ietf.org (8.9.1a/8.9.1a) with SMTP id UAA29808
	for <ldapext-archive@odin.ietf.org>; Tue, 7 Nov 2000 20:18:49 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.10.0/8.10.0) with ESMTP id eA819fD00408;
	Tue, 7 Nov 2000 17:09:41 -0800 (PST)
Received: (from list@localhost)
	by aka.mcom.com (8.10.0/8.10.0) id eA81H8I03653;
	Tue, 7 Nov 2000 17:17:08 -0800 (PST)
Resent-Date: Tue, 7 Nov 2000 17:17:08 -0800 (PST)
Subject: >>>Real Estate income opportunity w/o a license
Date: Tue, 07 Nov 2000 17:28:26 -0700
To: real_estate_center27@excite.com
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: 7BIT
Message-Id: <mcvqidyg.hclagyfxmgdhhyfndwhu@1Iupdownclown.com>
From: real_estate_center29@excite.com
Resent-Message-ID: <"DqOTPB.A.u4.TmKC6"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com
Content-Transfer-Encoding: 7BIT

START YOUR OWN REAL ESTATE BUSINESS FOR UNDER $100

Would you like to get off the business opportunity
merry-go-round and make some serious money?
Are you tired of spending your hard-earned cash
for worthless MLM, envelope stuffing and get rich
quick moneymaking schemes?

"How to sell and control real estate without a
license or money" will be the last program you will
ever need because it will show you how to make
a lot of money from your home, part-time or full-time
in a legitimate home-based business it's that simple,
you will wonder why you haven't heard of it before.
If our can read a newspaper and fill out a simple
form, you can be successful in this business.

"How to sell and control real estate without a
license or money," is the most unique and lucrative
real estate business opportunity ever offered. It's very
realistic to expect to make $100,000.00 per year
part-time from your home using the simple techniques
you will learn in this program.

"How to sell and control real estate without a license
or money," is designed and targeted to attract the
person who wants to sell their property fast and at
full market price. Your ads will be geared to attract
many buyers for the same property. The lenders you
will have access to are eager and waiting to lend
money to just about anyone that has a job. Now I ask
you, how many homes do you think you can sell if
you have several buyers for each home, and have a
list of lenders that will lend to almost anyone who has
a job even though their credit is less than perfect?

You will learn the secrets of selling each and every
home you have under your control in less than 30
days by tailoring your ads to attract sub-prime home
buyers.

Did you know that the sub-prime homebuyers market
in real estate is 2 1/2 times as big as the regular real
estate market? What this all means is that there are
thousands of potential home buyers out there that
can't qualify for a regular mortgage since they don't
meet the rigid credit requirements of local lenders.
"How to sell and control real estate without a license
or money," shows you how to tap into this market of
sub-prime lenders and get these people a mortgage
even though they have less than perfect credit. These
people will buy all the homes you have for sale!!!

This is a much-needed service that will allow you to
make thousands of dollars part-time right from your
home helping people with less than perfect credit
purchase a home. By working with home purchasers
in the sub-prime real estate market, you will learn that
the homes you control will sell for full price every time.
Under normal conditions in the market place qualified
A-A+ credit buyers drive the price of homes down by
making less than full price offers.

Here's what you will learn in "How to sell and control
real estate without a license or money,"

*   You will learn how to sell real estate legally without
a license anywhere in the country!  You will learn how
to capture a property at the best price possible with a
small investment (usually only $1.00) and resell this
property at full market value within 30 days.

*  You will learn how to make $2,500.00 with only
$1.00 investment. Now that is leverage! You will learn
the technique of taking a small amount of money and
turning it into a large sum of money within 30 days.  Its
called leverage - this is one of the techniques used by
investors to make millions of dollars!!!

*  You will learn how to control $1,000,000.00 in real
estate for only $100.00! Impossible you say - not really
when you understand and apply the techniques in
"How to sell and control real estate without a license or
money,"

*  You will learn how to stay in control of your own
deals! By that I mean you will be both buyer and seller.
You accept or reject any offer you want to. You are in
control.

*  You will learn to maneuver in real estate, make big
money and learn how to control a real estate empire with
little or no money! You will learn the techniques of
creating a legal paper trail or footprint to protect yourself
while being in control of several properties and all the
profits generated by their sale.

*  You will learn insider secrets on how the big investors
acquire massive wealth by controlling real estate for
pennies on the dollar! Real estate investors know that a
low profile financial exposure is the ideal position to be in
when controlling a piece of property for profit - yes you
will be exposed to this moneymaking technique known
and used by big real estate investors.

*  You will learn how to create ownership rights in real
estate without having to make a mortgage payment,
pay taxes or insurance payments! This document will
put you in the drivers seat and on the fast track to
making thousands of dollars in real estate without
ever having to qualify and acquire a real estate
license in your state.

*  You will learn the inside secrets about the late night
TV infomercial real estate talking heads, and what they
tell you about how easy it is to buy real estate with "no
money down." It's all bull fertilizer compared to the
information that you will be exposed to in this program!
Most people seeking "no money down deals," lack
money/credit or the expertise to negotiate. That's why
most fail in their efforts to procure a piece of property.
However, "How to sell and control real estate without
a license or money," will show you how to capture a
piece of property at a set price; turn around and sell
that property, make $2,500.00 to $25,000.00, and
have 100's of people calling begging you to sell their
homes.

*  You will learn how to make your phone ring off the
hook, and how to sell your properties at full appraised
price every time by using sub-prime lenders and make
more money than you ever thought possible, just by
filling out one little piece of paper! This is the trade
secret in this whole program - we show you how to tap
into the sub-prime lenders in the country and how to
access them. It's as simple as bringing your sub-prime
buyer of the home that you control together with a
sub-prime lender that lends to people with less than
perfect credit. It's just that simple and I guarantee that
if you put any effort into implementing this simple to
start, easy to run program you will make tons of money!

If you order "How to sell and control real estate
without a license or money" in the next 10 days, you'll
receive as an extra bonus, "How to Live in Your Home
for Free," and you will learn how and where to access
up to a $120,000.00 home loan at 3% interest without
fees or credit check.

If our program doesn't work for you...No Problem - Take
Advantage of our 60 DAY MONEY BACK GUARANTEE!

Call Now! 1.480.990.4463    EXT. 4113

"Have Your Credit Card Ready"

CCost: $49.95 

Priority Shipping Included!

---------------------------------------------------------

To Unsubscribe: Reply with "UNSUBSCRIBE" in subject line

---------------------------------------------------------





From list@netscape.com  Tue Nov  7 20:48:55 2000
Received: from netscape.com (h-205-217-237-46.netscape.com [205.217.237.46])
	by ietf.org (8.9.1a/8.9.1a) with SMTP id UAA06409
	for <ldapext-archive@odin.ietf.org>; Tue, 7 Nov 2000 20:48:55 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.10.0/8.10.0) with ESMTP id eA81Xos02392;
	Tue, 7 Nov 2000 17:33:51 -0800 (PST)
Received: (from list@localhost)
	by aka.mcom.com (8.10.0/8.10.0) id eA81jwE16250;
	Tue, 7 Nov 2000 17:45:58 -0800 (PST)
Resent-Date: Tue, 7 Nov 2000 17:45:58 -0800 (PST)
From: success3006@hotmail.com
Message-Id: <200011080143.SAA37333@mail.oanet.com>
To: success3006@hotmail.com
Date: Tue, 07 Nov 2000 18:41:05 PST
Subject: FREE Marketing Software...A Complete Package!!!!
Resent-Message-ID: <"UzvkG.A.j9D.VBLC6"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com

FREE Software - FREE Opportunity

If you are determined to succeed on the Internet 
then visit our web site.

Here is what we offer you with your FREE membership.

*  FREE 2 E-Mail Address Extractor Programs!
*  FREE Email List Management program!
*  FREE The BEST E-Mail program on the Net! 
*  FREE Classified Ad submitter program! 
*  FREE Functional FFA Link submission program!
*  FREE Internet Training! 
*  FREE Internet Tools! 
*  FREE WebPainter! 
*  FREE E-Book Creation Software! 
*  FREE HTML Editing Program!
*  FREE FFA's! 
*  FREE Autoresponders! 
*  FREE Report - Creating Profitable Ads! 
*  FREE Meta-Tag Generating Program! 
*  FREE Automatic Keyword Generator! 
*  FREE E-Book Building an MLM Empire!
*  FREE Dozens of Fantastic Marketing E-Books!

***Plus Much Much More***

This is just the TIP of the Iceberg folks!

Check it out.

For more info mail to:
success3004@yahoo.com





From list@netscape.com  Wed Nov  8 12:03:12 2000
Received: from netscape.com (h-205-217-237-46.netscape.com [205.217.237.46])
	by ietf.org (8.9.1a/8.9.1a) with SMTP id MAA00552
	for <ldapext-archive@odin.ietf.org>; Wed, 8 Nov 2000 12:03:11 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.10.0/8.10.0) with ESMTP id eA8GnVs15580;
	Wed, 8 Nov 2000 08:49:35 -0800 (PST)
Received: (from list@localhost)
	by aka.mcom.com (8.10.0/8.10.0) id eA8H1d205733;
	Wed, 8 Nov 2000 09:01:39 -0800 (PST)
Resent-Date: Wed, 8 Nov 2000 09:01:39 -0800 (PST)
Subject: RE:Real Estate income opportunity w/o a license
Message-Id: <vswdesgwmhbtujo.mtmset@12Apopcybe.com>
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: 7BIT
From: real_estate_center30@excite.com
Date: Wed, 08 Nov 2000 09:13:01 -0700
To: real_estate_center28@excite.com
Resent-Message-ID: <"R1BLbB.A.BYB.vbYC6"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com
Content-Transfer-Encoding: 7BIT

START YOUR OWN REAL ESTATE BUSINESS FOR UNDER $100

Would you like to get off the business opportunity
merry-go-round and make some serious money?
Are you tired of spending your hard-earned cash
for worthless MLM, envelope stuffing and get rich
quick moneymaking schemes?

"How to sell and control real estate without a
license or money" will be the last program you will
ever need because it will show you how to make
a lot of money from your home, part-time or full-time
in a legitimate home-based business it's that simple,
you will wonder why you haven't heard of it before.
If our can read a newspaper and fill out a simple
form, you can be successful in this business.

"How to sell and control real estate without a
license or money," is the most unique and lucrative
real estate business opportunity ever offered. It's very
realistic to expect to make $100,000.00 per year
part-time from your home using the simple techniques
you will learn in this program.

"How to sell and control real estate without a license
or money," is designed and targeted to attract the
person who wants to sell their property fast and at
full market price. Your ads will be geared to attract
many buyers for the same property. The lenders you
will have access to are eager and waiting to lend
money to just about anyone that has a job. Now I ask
you, how many homes do you think you can sell if
you have several buyers for each home, and have a
list of lenders that will lend to almost anyone who has
a job even though their credit is less than perfect?

You will learn the secrets of selling each and every
home you have under your control in less than 30
days by tailoring your ads to attract sub-prime home
buyers.

Did you know that the sub-prime homebuyers market
in real estate is 2 1/2 times as big as the regular real
estate market? What this all means is that there are
thousands of potential home buyers out there that
can't qualify for a regular mortgage since they don't
meet the rigid credit requirements of local lenders.
"How to sell and control real estate without a license
or money," shows you how to tap into this market of
sub-prime lenders and get these people a mortgage
even though they have less than perfect credit. These
people will buy all the homes you have for sale!!!

This is a much-needed service that will allow you to
make thousands of dollars part-time right from your
home helping people with less than perfect credit
purchase a home. By working with home purchasers
in the sub-prime real estate market, you will learn that
the homes you control will sell for full price every time.
Under normal conditions in the market place qualified
A-A+ credit buyers drive the price of homes down by
making less than full price offers.

Here's what you will learn in "How to sell and control
real estate without a license or money,"

*   You will learn how to sell real estate legally without
a license anywhere in the country!  You will learn how
to capture a property at the best price possible with a
small investment (usually only $1.00) and resell this
property at full market value within 30 days.

*  You will learn how to make $2,500.00 with only
$1.00 investment. Now that is leverage! You will learn
the technique of taking a small amount of money and
turning it into a large sum of money within 30 days.  Its
called leverage - this is one of the techniques used by
investors to make millions of dollars!!!

*  You will learn how to control $1,000,000.00 in real
estate for only $100.00! Impossible you say - not really
when you understand and apply the techniques in
"How to sell and control real estate without a license or
money,"

*  You will learn how to stay in control of your own
deals! By that I mean you will be both buyer and seller.
You accept or reject any offer you want to. You are in
control.

*  You will learn to maneuver in real estate, make big
money and learn how to control a real estate empire with
little or no money! You will learn the techniques of
creating a legal paper trail or footprint to protect yourself
while being in control of several properties and all the
profits generated by their sale.

*  You will learn insider secrets on how the big investors
acquire massive wealth by controlling real estate for
pennies on the dollar! Real estate investors know that a
low profile financial exposure is the ideal position to be in
when controlling a piece of property for profit - yes you
will be exposed to this moneymaking technique known
and used by big real estate investors.

*  You will learn how to create ownership rights in real
estate without having to make a mortgage payment,
pay taxes or insurance payments! This document will
put you in the drivers seat and on the fast track to
making thousands of dollars in real estate without
ever having to qualify and acquire a real estate
license in your state.

*  You will learn the inside secrets about the late night
TV infomercial real estate talking heads, and what they
tell you about how easy it is to buy real estate with "no
money down." It's all bull fertilizer compared to the
information that you will be exposed to in this program!
Most people seeking "no money down deals," lack
money/credit or the expertise to negotiate. That's why
most fail in their efforts to procure a piece of property.
However, "How to sell and control real estate without
a license or money," will show you how to capture a
piece of property at a set price; turn around and sell
that property, make $2,500.00 to $25,000.00, and
have 100's of people calling begging you to sell their
homes.

*  You will learn how to make your phone ring off the
hook, and how to sell your properties at full appraised
price every time by using sub-prime lenders and make
more money than you ever thought possible, just by
filling out one little piece of paper! This is the trade
secret in this whole program - we show you how to tap
into the sub-prime lenders in the country and how to
access them. It's as simple as bringing your sub-prime
buyer of the home that you control together with a
sub-prime lender that lends to people with less than
perfect credit. It's just that simple and I guarantee that
if you put any effort into implementing this simple to
start, easy to run program you will make tons of money!

If you order "How to sell and control real estate
without a license or money" in the next 10 days, you'll
receive as an extra bonus, "How to Live in Your Home
for Free," and you will learn how and where to access
up to a $120,000.00 home loan at 3% interest without
fees or credit check.

If our program doesn't work for you...No Problem - Take
Advantage of our 60 DAY MONEY BACK GUARANTEE!

Call Now! 1.480.990.4463    EXT. 4113

"Have Your Credit Card Ready"

CCost: $49.95 

Priority Shipping Included!

---------------------------------------------------------

To Unsubscribe: Reply with "UNSUBSCRIBE" in subject line

---------------------------------------------------------





From list@netscape.com  Thu Nov  9 01:19:34 2000
Received: from netscape.com (h-205-217-237-46.netscape.com [205.217.237.46])
	by ietf.org (8.9.1a/8.9.1a) with SMTP id BAA20823
	for <ldapext-archive@odin.ietf.org>; Thu, 9 Nov 2000 01:19:33 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.10.0/8.10.0) with ESMTP id eA965ds23002;
	Wed, 8 Nov 2000 22:05:43 -0800 (PST)
Received: (from list@localhost)
	by aka.mcom.com (8.10.0/8.10.0) id eA96HnM28749;
	Wed, 8 Nov 2000 22:17:49 -0800 (PST)
Resent-Date: Wed, 8 Nov 2000 22:17:49 -0800 (PST)
From: lfestoshorttobesittingback@usa.net
Message-Id: <200011090620.TAA13705@smtpout1.compass.net.nz>
To: ietf-ldapext@netscape.com
Date: Thu, 09 Nov 00 19:04:29 EST
Subject: " WE currently hiring SERIOUS HOMEWORKERS Position: Home Typist, Clerk, Secretary, Mail Processing, Supervisor, Manager...
Reply-To: lfestoshorttobesittingback@usa.net
Resent-Message-ID: <"oIKSTC.A.1AH.LGkC6"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com

" WE currently hiring SERIOUS HOMEWORKERS Position: Home Typist, Clerk, Secretary, Mail Processing, Supervisor, Manager...
 
Earn $3,500 -$5,000 per month! Experience is NOT necessary. Part time/full time. ANYWHERE in the world! 
 
This is a GREAT and EASY home business to start and REAL job for everyone. Apply now  

Please, be serious in accepting this job, because we are only hiring serious homeworkers.
We offer you a REAL job that you can do at home and increase your income. 

If you are looking for a get-rich-quick scheme or MLM program, please do not e-mail me. 

If you are not interested please hit "Reply" and type in the word "Remove" in the subject field and you will not be contacted again. 
 
For more infomation please apply to

homeworker65@alloymail.com 

Please provide a valid E-Mail Address so I may respond to you.

Please write short text those who are serious.


Thank you for your time

Rachel 
Mother of 1



From list@netscape.com  Thu Nov  9 01:46:50 2000
Received: from netscape.com (h-205-217-237-46.netscape.com [205.217.237.46])
	by ietf.org (8.9.1a/8.9.1a) with SMTP id BAA08315
	for <ldapext-archive@odin.ietf.org>; Thu, 9 Nov 2000 01:46:48 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.10.0/8.10.0) with ESMTP id eA96Wvs25568;
	Wed, 8 Nov 2000 22:32:57 -0800 (PST)
Received: (from list@localhost)
	by aka.mcom.com (8.10.0/8.10.0) id eA96j7k06504;
	Wed, 8 Nov 2000 22:45:07 -0800 (PST)
Resent-Date: Wed, 8 Nov 2000 22:45:07 -0800 (PST)
Date: Wed, 8 Nov 2000 22:45:03 -0800 (PST)
Message-Id: <200011090645.eA96j3R22104@xwing.netscape.com>
From: bwen21@juno.com
To: friend@netscape.com
Subject:  Earn cash while you surf!
X-Reply-To:  bwen21@juno.com
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: 7bit
Resent-Message-ID: <"qWI6IB.A.NlB.xfkC6"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com
Content-Transfer-Encoding: 7bit

Hello....

I found a great new Internet company - CashFiesta.com that has created a product 
that everyone can benefit from. They pay you while you work or play on your 
computer. They even pay you when your friends are using their computers. It's free to 
join and your privacy is completely protected.

Their proprietary software - the FiestaBar™ - displays ads at the bottom or top of 
your computer screen. Since advertisers want you to view these ads, they pay 
CashFiesta to reach you via The FiestaBar™ and then CashFiesta shares its 
advertising revenues with you. Members who use the FiestaBar™ are paid for their 
own Web browsing and for referrals.

All you have to do is sign up and start making money. It only takes a minute. You can 
refer your friends, family and co-workers and you will receive a percentage of their 
earnings in addition to your own.

So here is the link, enjoy and happy money making to all of you.

http://www.cashfiesta.com/php/join.php?ref=bwen21

Check it out!

Brent Wenning 

{This is not spam. You requested in the past to receive information on business 
opportunities}
If you wish to be removed from future mailings, please reply with the subject
"Remove" and you will automatically be blocked from any future mailings.




From list@netscape.com  Thu Nov  9 02:49:49 2000
Received: from netscape.com (h-205-217-237-46.netscape.com [205.217.237.46])
	by ietf.org (8.9.1a/8.9.1a) with SMTP id CAA15323
	for <ldapext-archive@odin.ietf.org>; Thu, 9 Nov 2000 02:49:49 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.10.0/8.10.0) with ESMTP id eA97Zns01696;
	Wed, 8 Nov 2000 23:35:49 -0800 (PST)
Received: (from list@localhost)
	by aka.mcom.com (8.10.0/8.10.0) id eA97m0619815;
	Wed, 8 Nov 2000 23:48:00 -0800 (PST)
Resent-Date: Wed, 8 Nov 2000 23:48:00 -0800 (PST)
Message-ID: <39EFD5930000F67F@atle.svenskamediaresia.se> (added by atle.svenskamediaresia.se)
To: coupons@yahoo.com
Date: Thu, 09 Nov 00 02:26:51 EST
From: CouponsHere@ma08.fsnet.co.uk
Subject: Save 20-70% off your Grocery Bill !
Reply-To: Coupons227@yahoo.com
Resent-Message-ID: <"dzKIhB.A.M1E.ualC6"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com

Would you like grocery coupons for 
EVERY item you purchase at the 
grocery store?


America's premiere coupon web site GUARANTEES you'll save
20-70% off your grocery bill. Simply choose from our extensive 
list of approximately 1,000 different manufacturer grocery 
coupons for the items you purchase on a regular basis. The 
same day, we'll promptly first-class mail your coupons to your 
door. These are the same manufacturer coupons you see in the 
Sunday paper but hundreds more to choose from, as we stock 
over 1 MILLION manufacturer coupons.

No more buying newspapers or magazines. No more searching, 
clipping, or hassles to get the coupons you need.

Find out why this new service has already been seen on the 
ABC and FOX networks.

If you would you like more information how to obtain the 
manufacturer grocery coupons of your choice and reduce your 
grocery bill by 20-70%, SIMPLY REPLY WITH "MORE INFO"
IN THE SUBJECT LINE.



_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/
If you have received this message in error and would
like to be removed from future mailings, please reply
with the word remove in the subject.
_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/



From list@netscape.com  Thu Nov  9 06:58:54 2000
Received: from netscape.com (h-205-217-237-47.netscape.com [205.217.237.47])
	by ietf.org (8.9.1a/8.9.1a) with SMTP id GAA23612
	for <ldapext-archive@odin.ietf.org>; Thu, 9 Nov 2000 06:58:53 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.10.0/8.10.0) with ESMTP id eA9BnoD15746;
	Thu, 9 Nov 2000 03:49:50 -0800 (PST)
Received: (from list@localhost)
	by aka.mcom.com (8.10.0/8.10.0) id eA9BvIM23116;
	Thu, 9 Nov 2000 03:57:18 -0800 (PST)
Resent-Date: Thu, 9 Nov 2000 03:57:18 -0800 (PST)
From: <lucy75324@yahoo.com>
Subject: LITTLE COMPANIES -- BIG OPPORTUNITIES
Date: Thu, 9 Nov 2000 02:18:38
Message-Id: <540.105022.744316@Server02>
Resent-Message-ID: <"R9MdiB.A.toF.dEpC6"@glacier>
To: ietf-ldapext@netscape.com
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com

Here Are 20 Companies For You To Check Out
Just One WINNER Could Make You Rich 

Stocks on the over-the-counter bulletin board (OTC BB) are 
exploding! Deep in the heart of the OTC BB lies the next company 
ready to come out of nowhere, WOW the world and reward investors 
with HUGE gains! A company, which has been reporting on Wall 
Street since 1992, is now covering this OTC BB market. 

For a FREE SUBSCRIPTION (email and website access), send an 
e-mail to info@64.123.155.114, type "subscribe" in the subject 
line, and click your "send" button. Or visit the website at 
http://64.123.155.100/aboutstockreporter and register for a free 
subscription (e-mail and website access).

TO BE REMOVED: If you do not want to receive financial 
information, just send an e-mail to info@64.123.155.114, type 
"remove" in the subject line, and click your "send" button. We 
will remove you.  We want to reach only those persons interested 
in the financial markets. 

IN THIS ISSUE
FEATURED COMPANIES

This computer company has just reported record revenues and we 
hear that there is more good news coming! Also, want the greatest 
computer deals, click right here: coledeals

This company has acquired a profitable telecommunications company 
and is changing its name. Anticipating profits of over $100 
million in 2001 and over $150 million in 2002. Discover this 
company before it hits NASDAQ!

Everybody loves the movies. Good times, bad times - we all go to 
the movies. Entertainment companies can make a lot of money - and 
the management of this company seems to be committed to making a 
lot of it for their shareholders. 

This company is developing a 4-Star network of vacation and 
entertainment properties. We like good, solid assets! We also 
like a good solid revenue stream. 

If you invest in things that you love, and if you love horses, 
you will love this company.  Their website is beautiful and their 
management is aggressive in the marketing and PR areas.  

This company announced release of their latest version of a 
proprietary product on August 22.  That announcement, combined 
with a new strategic alliance, positions this company to lead the 
way in e-commerce. Discover this company before everybody else 
does.

Already successful in the Business-to-Business and OEM sectors of 
the technology industry, this company is gearing up to take the 
consumer electronics industry by storm. We are talking about a 
HUGE market.

This company is positioning itself to be a complete supplier of 
telecommunications products. The integration of switched, IP 
(Internet Protocol) and wireless technologies over a managed 
network will enable the company to offer wholesale, retail and 
enhanced telecommunications products. We know there is an end to 
the growth in this sector, but we don't see it coming anytime 
soon. A number of companies in this sector will make their 
shareholders rich.

Talking about revenues, a bullish equity growth rate, together 
with record-breaking earnings last year and a record-setting 
trend this year, makes this consulting and real estate investing 
firm a very interesting company. 

We find this company fascinating. It's in the field of Human 
Genomics... you know...  the stuff that's going to hand us an 
owner's manual to our bodies along with our first pacifier. The 
company is teaming up with another great company to develop 
genetic tools that will allow them to pinpoint predisposition 
factors to afflictions such as cancer and heart disease. 
Together, they are looking at the areas of environmental testing, 
food processing and biological warfare. The size of these 
markets? We can't even guess, but we know they are huge - 
billions of dollars. Take a CLOSE look at this exciting company.

This company promises a toothy smile with its proprietary 
precision dental implant system. Investors are smiling because 
the US dental implant market is forecast to grow at 8 percent 
annually, as maturing "baby boomers" add to the demand. 

And for those of us who have fond memories of years gone by, and 
the cars we drove, this company is bringing back the Volkswagen 
Bug. Not that newfangled contraption you see on the road, but the 
original "Why's the engine in the trunk?" bug. 

This company is in the oil and gas business. Does anyone really 
think that this sector is going away anytime soon? We don't. We 
do see the industry changing under technology and political 
pressures, however, and this company has teamed up with another 
company in a 600-megawatt gas-fired electricity generating 
facility, among other projects. Savvy investors who are aware of 
the coming deregulation might want to siphon some of this company 
into their portfolios. 

This company has a proprietary line of all natural, 
ready-to-drink ("RTD") bottled coffee drinks. You decide which is 
better, their great drinks or the big orders for their great 
drinks. 

This company has teamed up with a partner to solve that pesky 
Methanol "crossover" problem with its proprietary fuel cell, 
designed to increase the efficiency and reduce the cost of fuel 
cells. If you understand this technology, you will understand the 
value of this company. 

This company is a worldwide pioneer in the development, 
manufacturing, licensing and distribution of high-quality digital 
imaging solutions. The Company produces controllers for 
non-impact printers and multifunction peripherals, monochrome and 
color printers, printer controllers, external print servers and 
software to improve the accuracy of color reproductions. This 
company is in an industry that is experiencing double-digit 
annual growth rate and is now a $400 billion market. 

Do you need to get away from it all? You can barter vacation 
ownership intervals, take virtual reality tours of resorts and 
more with this company's first real-time vacation interval 
marketing exchange and auction site on the Internet. Get your 
ticket today.

In a world of limited resources, it's mighty handy to have some 
help in finding them. Through its digitally analyzed imagery 
product, this profiled company helps a number of industries with 
this daunting task.

This company knows that there's money to be made by helping 
governments stretch tax dollars by enabling these governments to 
purchase goods and services more efficiently and at lower 
administrative costs. Sounds good to us.

Protecting flora and fauna is this company's business. It also 
markets breathtaking floral and plant arrangements through its 
own floral retail chain. Stop and smell the roses. We believe 
there will always be a market for flowers and other beautiful 
things. Good for the soul, you know.

For access to full information on these companies, send us an 
e-mail at info@64.123.155.114. Type "subscribe" in the subject 
line and click your "send" button. Or visit our website at 
http://64.123.155.100/aboutstockreporter.

Let us hear from you. We are in Texas, and folks in Texas are 
friendly.  

TO UNSUBSCRIBE: Send an e-mail to info@64.123.155.114 and type 
"remove" in the subject line.

DISCLAIMER: This publication is not a solicitation to purchase, 
hold, or dispose of shares warrants or options of any company or 
companies mentioned herein. Readers should consult with their own 
independent tax, business and financial advisors with respect to 
any investment opportunity, including any contemplated investment 
in the featured companies.  All information concerning a featured 
company herein and contained in this website should be verified 
independently with such company and an independent securities 
analyst. 

 
 
 
 
 
 
 
 
 
 
 
 



From list@netscape.com  Thu Nov  9 12:42:00 2000
Received: from netscape.com (h-205-217-237-46.netscape.com [205.217.237.46])
	by ietf.org (8.9.1a/8.9.1a) with SMTP id MAA28555
	for <ldapext-archive@odin.ietf.org>; Thu, 9 Nov 2000 12:42:00 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.10.0/8.10.0) with ESMTP id eA9HS6s07755;
	Thu, 9 Nov 2000 09:28:10 -0800 (PST)
Received: (from list@localhost)
	by aka.mcom.com (8.10.0/8.10.0) id eA9HeHI29579;
	Thu, 9 Nov 2000 09:40:17 -0800 (PST)
Resent-Date: Thu, 9 Nov 2000 09:40:17 -0800 (PST)
Message-Id: <sa0a7f03.095@prv-mail20.provo.novell.com>
X-Mailer: Novell GroupWise Internet Agent 5.5.5.1
Date: Thu, 09 Nov 2000 10:39:41 -0700
From: "Jim Sermersheim" <JIMSE@novell.com>
To: <ietf-ldapext@netscape.com>
Subject: Archive of ASID listserv messages
Mime-Version: 1.0
Content-Type: multipart/alternative; boundary="=_DA81E763.680964FF"
Resent-Message-ID: <"791XvB.A.ZNH.9FuC6"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com

This is a MIME message. If you are reading this text, you may want to 
consider changing to a mail reader or gateway that understands how to 
properly handle MIME multipart messages.

--=_DA81E763.680964FF
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: quoted-printable

Does anyone know how I can get a copy of this archive?

--=_DA81E763.680964FF
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD>
<META http-equiv=3DContent-Type content=3D"text/html; charset=3Diso-8859-1"=
>
<META content=3D"MSHTML 5.50.4134.600" name=3DGENERATOR></HEAD>
<BODY style=3D"MARGIN-TOP: 2px; FONT: 8pt MS Sans Serif; MARGIN-LEFT: =
2px">
<DIV>Does anyone know how I can get a copy of this archive?</DIV></BODY></H=
TML>

--=_DA81E763.680964FF--



From list@netscape.com  Thu Nov  9 21:54:00 2000
Received: from netscape.com (h-205-217-237-46.netscape.com [205.217.237.46])
	by ietf.org (8.9.1a/8.9.1a) with SMTP id VAA05195
	for <ldapext-archive@odin.ietf.org>; Thu, 9 Nov 2000 21:53:57 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.10.0/8.10.0) with ESMTP id eAA2dcs24140;
	Thu, 9 Nov 2000 18:39:48 -0800 (PST)
Received: (from list@localhost)
	by aka.mcom.com (8.10.0/8.10.0) id eAA2pns19042;
	Thu, 9 Nov 2000 18:51:49 -0800 (PST)
Resent-Date: Thu, 9 Nov 2000 18:51:49 -0800 (PST)
Message-Id: <sa0affb7.013@reed.oncalldba.com>
X-Mailer: Novell GroupWise Internet Agent 5.5.2.1
Date: Thu, 09 Nov 2000 19:48:59 -0700
From: "Ed Reed" <eer@OnCallDBA.COM>
To: <steven.legg@adacel.com.au>, <kurt@boolean.net>,
        <Albert.Langer@Directory-Designs.Org>, <helmut.volpers@icn.siemens.de>,
        <internet-drafts@ietf.org>, <Uppili.Srinivasan@oracle.com>,
        <d.w.chadwick@salford.ac.uk>, <Thomas.Salter@unisys.com>
Cc: <ietf-ldup@imc.org>, <ietf-ldapext@netscape.com>
Subject: Revision: draft-ietf-ldup-subentry-05.txt
Mime-Version: 1.0
Content-Type: multipart/mixed; boundary="=_0C573037.90F19D48"
Resent-Message-ID: <"waChXD.A.-nE.DL2C6"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com

--=_0C573037.90F19D48
Content-Type: text/plain; charset=US-ASCII
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable

Please publish the attached updated internet draft.

Abstract:

This document describes an object class called ldapSubEntry which MAY be =
used to indicate operations and management related entries in the =
directory, called LDAP Subentries.  To control the visibility of entries =
of type ldapSubEntry, a control, ldapSubentriesControl, is defined, and a =
special case using Search filters is described.

This version:  language is tightened up quite a bit to clarify required =
behavior in specific circumstances, and the OID for the ldapSubentriesContr=
ol is defined. =20

Note to the working groups:  The discussion about inheritance of subentries=
 across replication areas (new term - thank you, Albert) will be addressed =
in a revision of the LDUP architecture document.  The policy governing =
inheritance seems to belong somewhere other than this document, which is =
intentionally limited in its scope.=20

Regards,
Ed

=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
Ed Reed
Reed-Matthews, Inc.
+1 801 796 7065
http://www.Reed-Matthews.COM


--=_0C573037.90F19D48
Content-Type: text/plain
Content-Disposition: attachment; filename="draft-ietf-ldup-subentry-05.txt"
Content-Transfer-Encoding: base64
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--=_0C573037.90F19D48--



From list@netscape.com  Thu Nov  9 23:45:03 2000
Received: from netscape.com (h-205-217-237-47.netscape.com [205.217.237.47])
	by ietf.org (8.9.1a/8.9.1a) with SMTP id XAA08150
	for <ldapext-archive@odin.ietf.org>; Thu, 9 Nov 2000 23:45:02 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.10.0/8.10.0) with ESMTP id eAA4ZpD18504;
	Thu, 9 Nov 2000 20:35:51 -0800 (PST)
Received: (from list@localhost)
	by aka.mcom.com (8.10.0/8.10.0) id eAA4hMg19647;
	Thu, 9 Nov 2000 20:43:22 -0800 (PST)
Resent-Date: Thu, 9 Nov 2000 20:43:22 -0800 (PST)
Subject: Short on cash?  We'll give you $900 in free merchandise
Content-Type: text/plain;
	 charset="iso-8859-1"
Content-Transfer-Encoding: 8BIT
To: Thompson@essenet.it
From: Walker@dnafrica.co.za
Date: Thu, 09 Nov 2000 19:47:12 -0500
Message-Id: <830gww83htjv1.8dxq8m5p1ay@mail.gr>
Resent-Message-ID: <"blAR-B.A.byE.oz3C6"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com
Content-Transfer-Encoding: 8BIT

FREE Satellite T.V. System and FREE Instalation

For a limited time we'll give you this top of the line Digital
Satellite System for FREE! We'll even include Free installation.

Enjoy over 500 Channels of crystal clear digital picture and
cd stereo sound on your FREE Satellite TV System.  Why pay
over $900 retail for these items, when we're giving you this
satellite package for free.


Call 888-514-6881 to be Guaranteed Your FREE Satellite Today


This innovative 20" satellite includes a stereo receiver and
an infrared remote.  With this FREE offer you will have both
Interactive Television Capability and an On Screen Program Guide.

This limited time FREE offer is much less than the monthly cost
of cable tv. All you have to do is call us to arrange delivery.   
If you call today, we'll throw in a second receiver for your
second T.V. free.


Call 888-514-6881 to Begin Surfing through 500 Channels Today!


To be removed send email to fairelamour2u@yahoo.com



From list@netscape.com  Fri Nov 10 03:22:32 2000
Received: from netscape.com (h-205-217-237-46.netscape.com [205.217.237.46])
	by ietf.org (8.9.1a/8.9.1a) with SMTP id DAA22941
	for <ldapext-archive@odin.ietf.org>; Fri, 10 Nov 2000 03:22:32 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.10.0/8.10.0) with ESMTP id eAA88os27998;
	Fri, 10 Nov 2000 00:08:51 -0800 (PST)
Received: (from list@localhost)
	by aka.mcom.com (8.10.0/8.10.0) id eAA8L2U07518;
	Fri, 10 Nov 2000 00:21:02 -0800 (PST)
Resent-Date: Fri, 10 Nov 2000 00:21:02 -0800 (PST)
Date: Fri, 10 Nov 2000 00:22:49 -0800
Message-Id: <200011100822.AAA27237@follower.serverpro.to>
From: bestinfo@serverpro.to
Reply-To: bestinfo@serverpro.to
To: bestinfo@serverpro.to
Subject: BULK E-MAIL WORKS!
Resent-Message-ID: <"Npw5mC.A.E1B.s_6C6"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com

Sick and tired of promoting your web site? Bulk e-mail WORKS! Visit http://208.6.163.3/works.htm for more information on how we can help you make more money.





To be removed, send a message with remove in the subject to remove@serverpro.to





From list@netscape.com  Fri Nov 10 20:49:12 2000
Received: from netscape.com (h-205-217-237-46.netscape.com [205.217.237.46])
	by ietf.org (8.9.1a/8.9.1a) with SMTP id UAA16635
	for <ldapext-archive@odin.ietf.org>; Fri, 10 Nov 2000 20:49:11 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.10.0/8.10.0) with ESMTP id eAB1ZHs27955;
	Fri, 10 Nov 2000 17:35:21 -0800 (PST)
Received: (from list@localhost)
	by aka.mcom.com (8.10.0/8.10.0) id eAB1lVo23855;
	Fri, 10 Nov 2000 17:47:31 -0800 (PST)
Resent-Date: Fri, 10 Nov 2000 17:47:31 -0800 (PST)
Date: Fri, 10 Nov 2000 17:48:05 -0800
Message-Id: <200011110148.RAA03425@follower.serverpro.to>
From: bestinfo@serverpro.to
Reply-To: bestinfo@serverpro.to
To: bestinfo@serverpro.to
Subject: YOUR TURN - FINALLY    
Resent-Message-ID: <"p-cEFB.A.N0F.yUKD6"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com

It is YOUR turn...FINALLY...to:
 
Break FREE to do all the things you ever wanted to do.
 
Income
No Boss
Better Lifestyle
Paid off bills
New house
New car...or two
 
All the things that only money can buy.  
 
If you are ready to finally grab the brass ring, you need to click here:  http://www.serverpro.to/moneytree.htm
 
Opportunity knocks only a few times in a lifetime.  Don't wait for it to break the door down.
 
Go to http://www.serverpro.to/moneytree.htm NOW and get the details of how YOU can have YOUR DREAMS.
 
Opportunity MARKeting Director
 
P.S. Make just ONE decision and be on your way to success.

---------------------------------------------------------------------------------------------

To be removed, send an e-mail with "Remove" in the subject line to remove@serverpro.to
 




From list@netscape.com  Fri Nov 10 22:42:53 2000
Received: from netscape.com (h-205-217-237-46.netscape.com [205.217.237.46])
	by ietf.org (8.9.1a/8.9.1a) with SMTP id WAA15375
	for <ldapext-archive@odin.ietf.org>; Fri, 10 Nov 2000 22:42:53 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.10.0/8.10.0) with ESMTP id eAB3T7s08923;
	Fri, 10 Nov 2000 19:29:07 -0800 (PST)
Received: (from list@localhost)
	by aka.mcom.com (8.10.0/8.10.0) id eAB3fJE02842;
	Fri, 10 Nov 2000 19:41:19 -0800 (PST)
Resent-Date: Fri, 10 Nov 2000 19:41:19 -0800 (PST)
Date: Fri, 10 Nov 2000 19:41:10 -0800 (PST)
From: versalam <linkwan.com@my.netvigator.com>
To: <ietf-ldapext@netscape.com>
Message-Id: <419.436841.48550509linkwan.com@my.netvigator.com>
Subject: ľ«˛ĘÍřŐľŁ¬ÖµµĂŇ»ż´Łˇ
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Resent-Message-ID: <"SGpoB.A.Es.e_LD6"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com
X-MIME-Autoconverted: from 8bit to base64 by netscape.com id eAB3T7s08923
Content-Transfer-Encoding: 8bit
X-MIME-Autoconverted: from base64 to 8bit by ietf.org id WAA15375

ĹóÓŃ: ÄúşĂ!  
    ±ľČËĘÇˇ°ĘŔ˝çÍřÂçˇ±Ľ°ˇ°´óÖĐ»ŞÓˇŇŐÍřˇ±´´°ěČËÁÖşÍ°˛Ł¬Ďă¸ŰÓˇŇŐ
Ń§»áÖ´ÎŻˇ˘ą«ąŘ×ÜĽŕˇŁ 
©¤©¤©¤©¤©¤©¤©¤©¤©¤©¤©¤©¤©¤©¤©¤©¤©¤©¤©¤©¤©¤©¤©¤©¤©¤©¤©¤©¤©¤©¤©¤©¤
ˇôˇôĘŔ˝çÍřÂç http://www.linkwan.com  ÍĆąăżí´řĽĽĘőŁ¬ą˛ÖţŐ×ËŮÍřÂç
©¤©¤©¤©¤©¤©¤©¤©¤©¤©¤©¤©¤©¤©¤©¤©¤©¤©¤©¤©¤©¤©¤©¤©¤©¤©¤©¤©¤©¤©¤©¤©¤
  ˇďÄúĎëÖŞµŔÄúÁ¬µ˝ĂŔąú»ňĆäËüąúĽŇµÄ´řżíÂđŁż
  ˇďČçąűÄúĎëÖŞµŔ´ÓÄłµŘ·ĂÎĘÄł¸öĚŘ¶¨ŐľµăŇŞľ­ąýÄÄĐ©˝áµăÂđŁż
  ˇďÄúĘÔąý¶ÔÄúµÄÍřŇł˝řĐĐĚŘĐÔ˛âĘÔÂđŁż
  ˇďÄúĎëÁË˝âÁ˝°¶ČýµŘµÄżíĆµ·ţÎń×´żöÂđŁż
  ˇďÄúĎëÁË˝âżí´řĽĽĘőÂđŁż
  ˇďÄúĎëÍĆąăÍřÂç˛úĆ·ÂđŁż
 >>>>>>>--------Çëµ˝---------ˇŞˇŞˇú http://www.linkwan.comˇˇ 
    ĘŔ˝çÍřÂçŁ¨http://www.linkwan.comŁ©Č«ĂćĘŐĽŻÁ˝°¶ČýµŘ(ÄÚµŘˇ˘
Ďă¸Űˇ˘Ě¨ÍĺĽ°ĐÂĽÓĆÂ)żí´řÍř˝¨Éčˇ˘żí´řĽĽĘőşÍ·ţÎńĽ°żí´ř˛úĆ·µÄĎŕąŘ
×ĘÁĎŁ¬˛˘Ěáą©ÔÚĎß´řżí˛âĘÔˇ˘×îĐÂĐĐŇµ¶ŻĚ¬ˇ˘Ç°ŃŘĽĽĘőşÍ˛úĆ··ţÎńˇŁ
    ËýµÄˇ°ÔÚĎß˛âĘÔˇ±Ŕ¸Äż(http://www.linkwan.com/gb/broadmeter/)
ĘŐĽŻÁËÍřÂç˛âĘÔ¸÷¸ö·˝ĂćµÄ˛âĘÔĎîÄżÄÚČÝ±Č˝ĎÍęÉĆŁ¬ĘµÎŞÍřÂç˝çČËĘż
˛»żÉ»ňČ±µÄ˛ÎżĽą¤ľßˇŁ˛˘ÇŇ±ľŐľŇŃÓëĂŔąúFortelą«Ëľ´ďłÉĐ­ŇéŁ¬łÉÎŞ
¸Ăą«ËľVisualRouteÂ·ÓÉČíĽţÔÚŃÇĚ«µŘÇřµÄ˛âĘÔµăˇŁ


©¤©¤©¤©¤©¤©¤©¤©¤©¤©¤©¤©¤©¤©¤©¤©¤©¤©¤©¤©¤©¤©¤©¤©¤©¤©¤©¤©¤©¤©¤©¤©¤©¤
ˇôˇô ´óÖĐ»ŞÓˇŇŐÍř http://www.cgan.net  şëŃďÖĐ»ŞÎÄ»ŻŁ¬ÍĆąăÓˇŇŐżĆĽĽ 
©¤©¤©¤©¤©¤©¤©¤©¤©¤©¤©¤©¤©¤©¤©¤©¤©¤©¤©¤©¤©¤©¤©¤©¤©¤©¤©¤©¤©¤©¤©¤©¤©¤
  ˇˇ ˇˇ.ˇŞ.ˇŞ.                 ÔÚąĹ´úÖĐ»ŞĂń×ĺµÄËÄ´ó·˘Ă÷ÖĐŁ¬ŇÔÓˇË˘  
 .ˇŞ.ˇˇ|ˇˇ|ˇˇ|ˇŞ.ˇˇ        Ęő¶Ô´Ů˝řČËŔŕÎÄĂ÷µÄą±Ď××î´óŁ¬Ó°Ďě×îÉîÔ¶ˇŁ
 |Óˇ|ˇŞ|ˇˇ|Ăż|ĐÂ|ˇŞ.       ´óÖĐ»ŞÓˇŇŐÍřŁ¨http://www.cgan.netŁ©±ľ
 |ŇŐ|Óˇ|Óˇ|ÖÜ|ÎĹ|ČË|<\     ×ĹČČ°®Ăń×ĺˇ˘ÇżÎŇÖĐ»ŞµÄĐÄÔ¸Ł¬ÖĽÔÚ·˘ŃďĎČ
 |ÂŰ|ŇŐ|ŇŐ|Ň»|ÖĐ|˛Ĺ| \\    ČËµÄ´´Ôěľ«ÉńŁ¬żŞÍŘÍřÉĎ˝ĚÓýŁ¬´Ů˝řÓˇË˘×Ę
 |Ěł|Ęé|żĆ|Ľö|ĐÄ|ĘĐ|  \\   Ń¶µÄąă·ş˝»Á÷ˇŁĚáÉýÓˇË˘˛úŇµČËÔÚ×ĘŃ¶˛úŇµ
 |ˇˇ|żŻ|˝Ě|ˇˇ|ˇˇ|łˇ|   \\  µÄµŘÎ»ˇŁ
""""""""""""""""""""""""""
 >>>>>>>--------»¶Ó­äŻŔŔ---------ˇŞˇŞˇú http://www.cgan.net


********************ˇîˇú˝áĘřÓďˇűˇî************************

    ÍřÂçĘ±´úĘÇŇ»¸öżŞ·Ĺˇ˘ŐűşĎˇ˘×ĘÔ´ą˛Ďíˇ˘ą˛Í¬·˘ŐąµÄĐÂľ­ĽĂĘ±´úˇŁ
±ľČËĽÄÍűÓÚ¸÷Î»ĹóÓŃˇ˘Ňµ˝çÓĐĐÄČËĘż´óÁ¦Đ­ÖúŁ¬´Í¸řŇâĽűĽ°ą©¸ř×ĘÁĎŁ¬
ĘąĆäÄÚČÝ¸üłäĘµˇ˘¸ü×ĽČ·Ł¬˝«ĘŔ˝çÍřÂç°ěłÉ»ŞÓďµŘÇřµÄˇ°´óÖĐ»Şżí´ř
Ířˇ±Ł¬ŇÔ´Ů˝ř»ŞÓďµŘÇřżí´řÓ¦ÓĂµÄĆŐĽ°ÍĆąăŁ»´Ů˝řżí´řĽĽĘő˝»Á÷şÍżí
´ř˛úĆ·µÄżŞ·˘ĎúĘŰˇŁ

                       \\\|///
                      \\~~ ~~//
                      (  @ @  )
+--------oOOO------------(_)-----------oOOO-------+
|                                                 |
|-------------------------------------------------|
|              http://www.linkwan.com             |          
|              http://www.cgan.net                |
\                                                 \
/                     ooO                         /
+--------------------(   )-Ooo-------------------+
                      \ ( (   )
                       \_) ) /
                          (_/

    ĘŔ˝çÍřÂç˝«Óë´óÖĐ»ŞÓˇŇŐÍřĐŻĘÖ˛˘˝ř,Ĺ¬Á¦ ÎŞČËŔŕĐĹĎ˘×ĘŃ¶¸ďĂü
ĆĚÂ·´îÇĹˇŁÍ¬Ę±Ł¬Ň˛»¶Ó­¸÷Î»Ěáłö¸÷ÖÖżÉÄÜµÄşĎ×÷·˝Ę˝Ł¨ČçÓŃÇéÁ´˝Óˇ˘
˝»»»Bannerąă¸ćˇ˘˝¨Á˘Ő˝ÂÔşĎ×÷»ď°éąŘĎµµČŁ©ˇŁ

    ÓĐąŘ±ľČËµÄĽň˝éżÉĽű: 
    http://www.cgan.net/cganself/founder/

            ÍřÓŃÁÖşÍ°˛ľ´ÉĎ
                   



From list@netscape.com  Fri Nov 10 23:29:14 2000
Received: from netscape.com (h-205-217-237-47.netscape.com [205.217.237.47])
	by ietf.org (8.9.1a/8.9.1a) with SMTP id XAA25229
	for <ldapext-archive@odin.ietf.org>; Fri, 10 Nov 2000 23:29:14 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.10.0/8.10.0) with ESMTP id eAB4K9D16562;
	Fri, 10 Nov 2000 20:20:09 -0800 (PST)
Received: (from list@localhost)
	by aka.mcom.com (8.10.0/8.10.0) id eAB4Rfk12276;
	Fri, 10 Nov 2000 20:27:41 -0800 (PST)
Resent-Date: Fri, 10 Nov 2000 20:27:41 -0800 (PST)
From: markzmiz@bigfoot.com
Message-Id: <200011110428.NAA25194@ns.realhost.co.kr>
To: ietf-ldapext@netscape.com
Date: Fri, 10 Nov 00 18:55:05 EST
Subject: Hi There!
Resent-Message-ID: <"lDd3oC.A.f_C.8qMD6"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com

Hi There!

I thought I would drop you a quick note and let you know that
there is an exciting and very profitable SELF-RUN online
business which is exploding in 2000.

This is the EASIEST and the HOTTEST online business today!
Voted as #1 online business in a major business magazine!
Company of the month twice in another major publication!

Please check out my website below for more details:

http://12.21.34.27/brylyn

It takes only 30 seconds to find out. You will be glad that you did!

Thank you and have a nice day!......Brian



From list@netscape.com  Sat Nov 11 12:44:25 2000
Received: from netscape.com ([205.217.237.47])
	by ietf.org (8.9.1a/8.9.1a) with SMTP id MAA08711
	for <ldapext-archive@odin.ietf.org>; Sat, 11 Nov 2000 12:44:24 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.10.0/8.10.0) with ESMTP id eABHZGD03338;
	Sat, 11 Nov 2000 09:35:16 -0800 (PST)
Received: (from list@localhost)
	by aka.mcom.com (8.10.0/8.10.0) id eABHgmM22567;
	Sat, 11 Nov 2000 09:42:48 -0800 (PST)
Resent-Date: Sat, 11 Nov 2000 09:42:48 -0800 (PST)
Message-ID: <0a4801c04c02$681a1800$d35488cd@candw.ag>
From: "wes" <goobil@yahoo.com>
To: <ietf-ldapext@netscape.com>
Subject: A Wesome Site
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"
X-Mailer: Microsoft Outlook Express 5.00.2314.1300
X-MimeOLE: Produced By Microsoft MimeOLE V5.00.2314.1300
Date: Sat, 11 Nov 2000 12:41:00 -0500
X-IMSTrailer: __IMail_5__
Content-Transfer-Encoding: 8bit
X-MIME-Autoconverted: from quoted-printable to 8bit by aka.mcom.com id eABHgkv22538
Resent-Message-ID: <"LgXdQ.A.QgF.WUYD6"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com
Content-Transfer-Encoding: 8bit

 

Awesome Site
 



Dear ietf-ldapext@netscape.com, 
This is a message from your friend, Dennis, I am a member at The 5diamonds Online Casino, located at http://www.5diamondscasino.com, and I think you'd enjoy it as much as I do! Their software is FREE and easy to download plus they have 6 outstanding FREE casino chip offers! Be sure to check out the FREE OFFERS section of their website for all the details!
They offer more than 25 casino games w/ jackpots up to $50,000 including 3 multi-player games where we could sit at the same table and play together in cyber-space! Plus, you can also wager on your favorite teams in their sports book!
Here's some more great facts about The 5diamondscasino at http://www.5diamondscasino.com:
 
So visit http://www.5diamondscasino.com and I think you'll agree with me that The 5Diamonds Online casino & Sportsbook really is "The Best Bet on the Net!".
See you in the casino!
-- Dennis Ferguson





_____________________________________________________________

Get Your Private, Free E-Mail From 
Link2casino At http://mail.link2casino.com
_____________________________________________________________



From list@netscape.com  Sun Nov 12 19:48:49 2000
Received: from netscape.com (h-205-217-237-47.netscape.com [205.217.237.47])
	by ietf.org (8.9.1a/8.9.1a) with SMTP id TAA27740
	for <ldapext-archive@odin.ietf.org>; Sun, 12 Nov 2000 19:48:44 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.10.0/8.10.0) with ESMTP id eAD0dQD24285;
	Sun, 12 Nov 2000 16:39:26 -0800 (PST)
Received: (from list@localhost)
	by aka.mcom.com (8.10.0/8.10.0) id eAD0l0604353;
	Sun, 12 Nov 2000 16:47:00 -0800 (PST)
Resent-Date: Sun, 12 Nov 2000 16:47:00 -0800 (PST)
To: Stockwinner@aol.com
From: <ihzd@msn.com>
Subject: Stock Pick of the Week
Message-ID: <04bb15244000db0CPIMSSMTPU01@email.msn.com>
Date: 12 Nov 2000 16:44:57 -0800
Resent-Message-ID: <"WEglRC.A.jDB.DozD6"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com


>>> STOCK PICK OF THE WEEK <<<
For the week beginning Monday, 11-13-2000

Investment Snapshot - LOCHE -- Loch Harris

http://moneycentral.msn.com/scripts/webquote.dll?iPage=qd&Symbol=loche

Target Price: $1.00  Current Price: $.11

Take a close look at this stock, it's going to rise fast!

It had some bad news which resulted in the price dropping, but they will be
coming out of it this week with good news.




From list@netscape.com  Mon Nov 13 10:56:42 2000
Received: from netscape.com (h-205-217-237-47.netscape.com [205.217.237.47])
	by ietf.org (8.9.1a/8.9.1a) with SMTP id KAA03867
	for <ldapext-archive@odin.ietf.org>; Mon, 13 Nov 2000 10:56:38 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.10.0/8.10.0) with ESMTP id eADFkuD11997;
	Mon, 13 Nov 2000 07:46:56 -0800 (PST)
Received: (from list@localhost)
	by aka.mcom.com (8.10.0/8.10.0) id eADFsUc29347;
	Mon, 13 Nov 2000 07:54:30 -0800 (PST)
Resent-Date: Mon, 13 Nov 2000 07:54:30 -0800 (PST)
Message-ID: <B0000017983@ns.cway.co.jp>
From: "William Stone" <tbar9@operamail.com>
Subject: Overnight Results # 2C9
To: see39f@xwing.netscape.com
X-Mailer: Microsoft Outlook Express 4.72.1712.3
X-MimeOLE: Produced By Microsoft MimeOLE VĐßD.1712.3
Mime-Version: 1.0
Date: Mon, 13 Nov 2000 07:16:16 -0500
Content-Type: multipart/mixed; boundary="----=_NextPart_000_007F_01BDF6C7.FABAC1B0"
Resent-Message-ID: <"fPpJ8B.A.BKH.16AE6"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com

This is a MIME Message

------=_NextPart_000_007F_01BDF6C7.FABAC1B0
Content-Type: multipart/alternative; boundary="----=_NextPart_001_0080_01BDF6C7.FABAC1B0"

------=_NextPart_001_0080_01BDF6C7.FABAC1B0
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

***** This is an HTML Message ! *****


------=_NextPart_001_0080_01BDF6C7.FABAC1B0
Content-Type: text/html; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable


<HTML>
<HEAD>
   <TITLE>ORDER BELLE LIPOSOME REDUCING SYSTEM</TITLE>
 

</HEAD>
<BODY LEFTMARGIN=3D0 TEXT=3D"#000000" BGCOLOR=3D"#FFB3B3" LINK=3D"#FFFFFF"=
 VLINK=3D"#FFFFFF" ALINK=3D"#00FF00" BACKGROUND=3D"images/menubar3=2Egif">



<p align=3D"center"><br>
<br>
<b><font size=3D"4" color=3D"#0000FF">It only takes ONE HOUR of your time<=
br>
                           to LOSE 4-6 INCHES of stubborn fat overnight!</=
font><br>
<br>
                                    ****FLATTEN your stomach=2E<br>
                                     ****RE-SHAPE your butt=2E<br>
                                       ****TRIM your thighs=2E<br>
                                 ****REDUCE cellulite everywhere!<br>
<br>
<br>
                          THOUSANDS OF YOUR INTERNET NEIGHBORS<br>
                            have already effortlessly removed their most<b=
r>
                               stubborn fat with just one application=2E=2E=
=2E<br>
<br>
                                        =2Ewithout strict diets<br>
                                    =2Ewithout strenuous exercise<br>
                               =2Ewithout harmful metabolism boosters<br>
                                    =2Ewithout dangerous surgery<br>
<br>
                         Now it's YOUR TURN to solve your "problem areas"<=
br>
                                         once and for all!<br>
<br>
                                          Introducing=2E=2E=2E<br>
<br>
<font color=3D"#0000FF"><i><font size=3D"4">                              =
            The Original</font></i><br>
<br>
<font size=3D"4">                         Belle Figure Liposome Reducing S=
ystem (LRS)</font></font><br>
<br>
<br>
                             PERMANENT, SAFE &amp; GENTLE FAT LOSS<br>
<br>
                             There are no diuretics in our miracle gels=2E=
<br>
                            So you won't experience the disappointment<br>=

                           of losing inches of water that comes right back=
<br>
                                         a few days later=2E<br>
<br>
                               This time you'll lose REAL FAT forever=2E<b=
r>
                                And all you have to do is eat sensibly;<br=
>
                                     you don't have to starve!<br>
<br>
<font size=3D"4"><font color=3D"#0000FF">                                 =
   HOW MUCH FAT CAN YOU<br>
                               REALISTICALLY LOSE IN 24 HOURS?</font><br>
</font><br>
                           You'll lose an average of FOUR TO SIX INCHES<br=
>
                            effortlessly, just by rubbing in our gels like=
 a<br>
                                          moisturizer=2E=2E=2E<br>
<br>
                                      That's an average loss<br>
                                      of 1 inch to 1-1/2 inches<br>
                                      of excess fat per area --<br>
                                 midriff, stomach, hips, and thighs=2E<br>=

<br>
                           =2EAnd that's just average results! Many custom=
ers<br>
                            report as much as three inches of fat loss in =
a<br>
                           single area -- that's enough to instantly slip =
into<br>
                                      a size smaller clothes!<br>
<br>
                                 AND=2E=2E=2E your results are guaranteed!=
<br>
<br>
<font color=3D"#0000FF" size=3D"4">                                SOUND T=
OO GOOD TO BE TRUE?</font><br>
<br>
                         OVER ONE MILLION INTERNATIONAL CUSTOMERS<br>
                       have already effortlessly removed their most stubbo=
rn fat<br>
                      with our safe and gentle herbal gels=2E Now it's YOU=
R TURN<br>
                    to solve your "problem areas=2E" Your results are GUAR=
ANTEED!<br>
<br>
<font size=3D"4" color=3D"#0000FF">                            PERMANENT, =
SAFE &amp; GENTLE FAT LOSS --=2E<br>
                             APPROVED IN UNITED STATES, CANADA,<br>
                                    SWITZERLAND &amp; MEXICO=2E</font><br>=

<br>
                        "My wife was scheduled for $6,000 liposuction surg=
ery=2E<br>
                         We saw your ad and decided your product was worth=
<br>
                      trying first=2E In 24 hours, my wife lost two inches=
 in her waist=2E<br>
                          In 48 hours, she lost four inches in her midriff=
 and<br>
                    three inches in her waist, much more than the 'average=
 results'<br>
                      your ad talked about! We cancelled the liposuction s=
urgery=2E<br>
                         Words can't express how delighted we are with you=
r<br>
                   product's performance=2E Two months later, the inches a=
re still off!<br>
<br>
                                     Eric Larsen, Lacrosse, WI<br>
<br>
<br>
                       "I'm a professional singer, and I'm on the road a l=
ot=2E Your<br>
                     product is wonderful=2E I lost almost two inches in m=
y waistline<br>
                     in the first 24 hours=2E I am very proud of the fact =
that I have lost<br>
                                  this waistline and obliques fat=2E"<br>
<br>
                                    David Hutchins, Hickory, NC</b></p>



<p align=3D"center"><b>"When I used Belle Figure LRS for the first time, I=
 expected to lose fat --<br>
and I did=2E=2E=2Ean impressive 1-1/2 inches from my stomach=2E What I did=
n't expect<br>
was to see a dramatic difference in the tone and texture of my skin=2E To =
me<br>
this was just as important as the fat loss=2E Belle Figure LRS delivered o=
n<br>
both counts=2E"<br>
<br>
Greg Williams, age 28, Tucson, AZ</b></p>



<p align=3D"center">
<b><br>
<br>
<font size=3D"5" color=3D"#0000FF">                                     OR=
DER TODAY!</font><br>
                                  Mastercard &amp; Visa are welcome!<br>
<br>
                1=2E FILL OUT the convenient ORDER FORM below and click on=
 "SUBMIT=2E"<br>
<br>
                   2=2E ORDER BY PHONE: 1-520-203-4572 (9am-6pm, PST Mon-S=
un)&nbsp;<br>
<br>
                         You'll talk to people who have used our miracle g=
els=2E<br>
<br>
<font size=3D"4" color=3D"#0000FF">                                NEED MO=
RE INFORMATION?</font><br>
<br>
           Just check the "SEND FREE INFORMATION" button on the order form=
, and be sure<br>
                to fill in your name, address, phone number and email addr=
ess so that we<br>
                       know how to reach you=2E Then click the "SUBMIT" bu=
tton=2E</b></p>



<TABLE CELLSPACING=3D0 CELLPADDING=3D0 BORDER=3D0 WIDTH=3D"620" >
<TR>
<TD VALIGN=3DTOP align=3Dleft width=3D"116"><P>&nbsp;<BR>
<!-----
<B><FONT FACE=3D"arial"><FONT SIZE=3D-1><A HREF=3D"home=2Ehtm" target=3D"m=
ain">Home</A></FONT>
<BR>
<FONT SIZE=3D-1><A HREF=3D"overview=2Ehtm" target=3D"main">How It Works</A=
></FONT>
<BR>
<FONT SIZE=3D-1><A HREF=3D"ingred=2Ehtm" target=3D"main">Ingredients</A></=
FONT>
<BR>
<FONT SIZE=3D-1><A HREF=3D"success=2Ehtm" target=3D"main">95% Success!</A>=
</FONT>
<BR>
<FONT SIZE=3D-1><A HREF=3D"testimon=2Ehtm" target=3D"main">Testimonials</A=
></FONT>
<BR>
<FONT SIZE=3D-1><A HREF=3D"instruct=2Ehtm" target=3D"main">Instructions</A=
></FONT>
<BR>
<FONT SIZE=3D-1><A HREF=3D"faq=2Ehtm" target=3D"main">FAQ</A></FONT> <BR>
<FONT SIZE=3D-1><A HREF=3D"lipo=2Ehtm" target=3D"main">Liposuction Facts</=
A></FONT></FONT></B></P>

<P><B><FONT FACE=3D"arial"><FONT SIZE=3D-1><A HREF=3D"special=2Ehtm" targe=
t=3D"main"><blink>Holiday
Special</blink><BR>
<BR>
</A></FONT><FONT SIZE=3D+0><A HREF=3D"order=2Ehtm" target=3D"main">Order I=
nfo<BR>
<BR>
</A></FONT><FONT SIZE=3D-1><A HREF=3D"dealer=2Ehtm" target=3D"main">Become=
 a Dealer</A></FONT>
---------->
<BR>
  </P></TD>

<TD WIDTH=3D"6">&nbsp;</TD>



<TD VALIGN=3DTOP WIDTH=3D"492">
<CENTER><TABLE CELLSPACING=3D0 CELLPADDING=3D10 WIDTH=3D"450" >
<TR>
<TD>
<B><FONT SIZE=3D+2>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
ORDER FORM<BR>

</FONT></B>
<TABLE BGCOLOR=3DRED BORDER=3D0 CELLSPACING=3D2 width=3D"100%"><TR><TD ALI=
GN=3DCENTER VALIGN=3DCENTER>
<FONT FACE=3D"VERDANA,ARIAL,HELVETICA"><FONT SIZE=3D-1 COLOR=3DYELLOW><B>D=
o not use this form for non-U=2ES=2E orders=2E<br>Please
call (520) 203-4572=2E</FONT></FONT></B></TD></TR></TABLE>

</TD>
</TR>

<TR><TD align=3Dleft><FONT FACE=3D"verdana,arial,helvetica"><FONT SIZE=3D-=
1>
We guarantee that you will be completely satisfied with the 
performance of Belle Figure Liposome Reducing System within 
five days of application, or you may return the jars within 30 
days of purchase and receive a full refund=2E</FONT></FONT>
</TD></TR>

<TR>
<TD ALIGN=3DLEFT>
<TABLE CELLSPACING=3D0 CELLPADDING=3D0 WIDTH=3D"450" >
<TR>
<TD VALIGN=3DTOP ALIGN=3DLEFT COLSPAN=3D4>
<form name=3D"form"
  method=3D"post"
  action=3D"mailto:29kab@ukmax=2Ecom?SUBJECT=3DInternet Form"
  enctype=3D"text/plain"
  >
 
 <tr>


<FONT SIZE=3D+3>Step
1<BR>
</FONT></FONT></TT><FONT COLOR=3D"#0000FF"><FONT SIZE=3D+2>Billing and Shi=
pping
Information</FONT></FONT></B><BR>
<BR>
</TD>
</TR>

<TR>
<TD ALIGN=3DLEFT VALIGN=3DTOP COLSPAN=3D"2"><B><FONT SIZE=3D+1>Shipping In=
formation
(required)</FONT> <BR>
<FONT COLOR=3D"#FF0000"><FONT SIZE=3D-1>ALL INFO IN THIS SECTION IS REQUIR=
ED=2E</FONT></FONT></B></TD>
</TR>

<TR>
<TD ALIGN=3DRIGHT WIDTH=3D"25%"><B>FirstName </B></TD>

<TD ALIGN=3DLEFT WIDTH=3D"25%"><INPUT type=3D"text" name=3D"FIRSTNAME"

             value=3D""

             size=3D24


             maxlength=3D50></TD>
</TR>

<TR>
<TD ALIGN=3DRIGHT WIDTH=3D"25%"><B>Last Name </B></TD>

<TD ALIGN=3DLEFT WIDTH=3D"25%"><INPUT type=3D"text" name=3D"LASTNAME"

             value=3D""

             size=3D24


             maxlength=3D50></TD>
</TR>

<TR>
<TD ALIGN=3DRIGHT><B>Address </B></TD>

<TD><INPUT type=3D"text" name=3D"STREETADDRESS"

             value=3D""

             size=3D24


             maxlength=3D80></TD>
</TR>

<TR>
<TD ALIGN=3DRIGHT><B>City </B></TD>

<TD><INPUT type=3D"text" name=3D"CITY"

             value=3D""

             size=3D24


             maxlength=3D78></TD>
</TR>

<TR>
<TD ALIGN=3DRIGHT><B>State </B></TD>

<TD><SELECT name=3D"TP_STATE" ><OPTION><OPTION VALUE=3D"AL">AL
<OPTION VALUE=3D"AK">AK <OPTION VALUE=3D"AR">AR <OPTION VALUE=3D"AZ">AZ <O=
PTION VALUE=3D"CA">CA
<OPTION VALUE=3D"CO">CO <OPTION VALUE=3D"CT">CT <OPTION VALUE=3D"DC">DC <O=
PTION VALUE=3D"DE">DE
<OPTION VALUE=3D"FL">FL <OPTION VALUE=3D"GA">GA <OPTION VALUE=3D"HI">HI <O=
PTION VALUE=3D"ID">ID
<OPTION VALUE=3D"IL">IL <OPTION VALUE=3D"IN">IN <OPTION VALUE=3D"IA">IA <O=
PTION VALUE=3D"KS">KS
<OPTION VALUE=3D"KY">KY <OPTION VALUE=3D"LA">LA <OPTION VALUE=3D"ME">ME <O=
PTION VALUE=3D"MD">MD
<OPTION VALUE=3D"MA">MA <OPTION VALUE=3D"MI">MI <OPTION VALUE=3D"MN">MN <O=
PTION VALUE=3D"MS">MS
<OPTION VALUE=3D"MO">MO <OPTION VALUE=3D"MT">MT <OPTION VALUE=3D"NE">NE <O=
PTION VALUE=3D"NV">NV
<OPTION VALUE=3D"NH">NH <OPTION VALUE=3D"NJ">NJ <OPTION VALUE=3D"NM">NM <O=
PTION VALUE=3D"NY">NY
<OPTION VALUE=3D"NC">NC <OPTION VALUE=3D"ND">ND <OPTION VALUE=3D"OH">OH <O=
PTION VALUE=3D"OK">OK
<OPTION VALUE=3D"OR">OR <OPTION VALUE=3D"PA">PA <OPTION VALUE=3D"PR">PR <O=
PTION VALUE=3D"RI">RI
<OPTION VALUE=3D"SC">SC <OPTION VALUE=3D"SD">SD <OPTION VALUE=3D"TN">TN <O=
PTION VALUE=3D"TX">TX
<OPTION VALUE=3D"UT">UT <OPTION VALUE=3D"VT">VT <OPTION VALUE=3D"VA">VA <O=
PTION VALUE=3D"WA">WA
<OPTION VALUE=3D"WI">WI <OPTION VALUE=3D"WU">WV <OPTION VALUE=3D"WY">WY </=
SELECT></TD>
</TR>

<TR>
<TD ALIGN=3DRIGHT><B>Zip </B></TD>

<TD><INPUT type=3D"text" name=3D"ZIP"

             value=3D""

             size=3D24


             maxlength=3D10></TD>
</TR>

<TR>
<TD ALIGN=3DRIGHT><B>Phone </B></TD>

<TD><INPUT type=3D"text" name=3D"PHONE"

             value=3D""

             size=3D24


             maxlength=3D24></TD>
</TR>

<TR>
<TD VALIGN=3DTOP ALIGN=3DRIGHT><B>E-mail </B></TD>

<TD><INPUT type=3D"text" name=3D"reply_email"

             value=3D""

             size=3D24


             maxlength=3D80></TD>
</TR>

<TR>
<TD COLSPAN=3D2 ALIGN=3DCENTER bgcolor=3D"#0000ff">
<B><FONT FACE=3D"ARIAL, HELVETICA" SIZE=3D-0 Color=3D"white">Pay By Credit=
 Card</font></b>
</td></tr>

<TR>
<TD COLSPAN=3D2 ALIGN=3DCENTER bgcolor=3D"#eeeeff">
<TABLE WIDTH=3D"90%" >
<TR VALIGN=3DBOTTOM>
<TD ALIGN=3DCENTER><B><FONT SIZE=3D-1>Select Credit Card Type:<BR>
<SELECT name=3D"PAYMENTMETHOD"><OPTION value=3D"Mastercard "></FONT></B>Ma=
stercard
<OPTION value=3D"Visa">Visa </SELECT></TD>

<TD ALIGN=3DCENTER nowrap><B><FONT SIZE=3D-1>Account number<BR>
(no spaces or dashes)</FONT></B><BR>
<INPUT type=3D"text" name=3D"CC"

                  value=3D""

                   size=3D19


                  maxlength=3D19></TD>

<TD ALIGN=3DCENTER><B><FONT SIZE=3D-1>Exp=2E Date - Mo=2E/Yr=2E<BR>
REQUIRED<BR>
<SELECT name=3D"Month" size=3D1 ><OPTION SELECTED><OPTION VALUE=3D"01"></F=
ONT></B>01
<OPTION VALUE=3D"02">02 <OPTION VALUE=3D"03">03 <OPTION VALUE=3D"04">04 <O=
PTION VALUE=3D"05">05
<OPTION VALUE=3D"06">06 <OPTION VALUE=3D"07">07 <OPTION VALUE=3D"08">08 <O=
PTION VALUE=3D"09">09
<OPTION VALUE=3D"10">10 <OPTION VALUE=3D"11">11 <OPTION VALUE=3D"12">12 </=
SELECT>
<SELECT name=3D"Year" size=3D1 ><OPTION> <OPTION VALUE=3D"00">00 <OPTION V=
ALUE=3D"01">01 <OPTION VALUE=3D"02">02
  <option value=3D"03">03</option>
  <option value=3D"04">04</option>
</SELECT><INPUT TYPE=3D"HIDDEN" NAME=3D"Exp" value=3D""></TD>
</TR>

<TR>
<TD ALIGN=3DCENTER COLSPAN=3D3><FONT SIZE=3D-1>(Your account information w=
ill
be encrypted=2E) </FONT><BR><BR>
<TEXTAREA NAME=3D"ccMailAddr" COLS=3D50 ROWS=3D5 WRAP=3DVIRTUAL>
Enter Credit Card Billing Address Here If Different From Above
</TEXTAREA>
</TD>
</TR>
</TABLE>
</TD>
</TR>
<!-------------------
<TR>
<TD COLSPAN=3D2 ALIGN=3DCENTER bgcolor=3D"#00dd00">
<B><FONT FACE=3D"ARIAL, HELVETICA" SIZE=3D-0 Color=3D"white">Enter Your Pa=
yment By Electronic Check</font></b>
</td></tr>

<TR>
<TD COLSPAN=3D2 ALIGN=3DCENTER bgcolor=3D"#eeffee">

<TABLE>
<TR>
<TD align=3D"left"><B><FONT COLOR=3D"#008000"><FONT SIZE=3D+1>Your Banking=
 Information</FONT></FONT></B></TD>
</TR>

<TR>
<TD align=3D"right"><font size=3D-1><B>Bank Name:</font></b></TD>

<TD><INPUT type=3D"text" name=3D"BANKNAME"></TD>
</TR>

<TR>
<TD align=3D"right"><font size=3D-1><B>Branch</b> (<I>optional</I>):</font=
></TD>

<TD><INPUT type=3D"text" name=3D"BANKBRANCH"></TD>
</TR>

<TR>
<TD align=3D"right"><font size=3D-1><B>Bank Address:</font></b></TD>

<TD><INPUT type=3D"text" name=3D"BANKADDRESS"></TD>
</TR>

<TR>
<TD align=3D"right"><font size=3D-1><B>City:</font></b></TD>

<TD><INPUT type=3D"text" name=3D"BANKCITY"></TD>
</TR>

<TR>
<TD align=3D"right"><font size=3D-1><B>State:</font></b></TD>

<TD><INPUT type=3D"text" name=3D"BANKSTATE"></TD>
</TR>

<TR>
<TD align=3D"right"><font size=3D-1><B>Zip :</font></b></TD>

<TD><INPUT type=3D"text" name=3D"BANKZIP"></TD>
</TR>

<TR>
<TD align=3D"right"><font size=3D-1><B>Bank Phone Number:</font></b></TD>

<TD><INPUT type=3D"text" name=3D"BANKPHONE"></TD>
</TR>

<TR>
<TD align=3D"right"><font size=3D-1><B>Check Number:</font></b></TD>

<TD><INPUT type=3D"text" name=3D"CHECK_NUMBER"></TD>
</TR>
</TABLE>

<P align=3Dleft><font><b>The next two fields require you to gather informa=
tion from the line
of numbers at the bottom of your check=2E Here's an example line from the
bottom of a check for you to use when filling in these fields:</font></b><=
/P>

<P> <IMG SRC=3D"images/microline=2Egif" HEIGHT=3D62 WIDTH=3D414> </P>

<TABLE>
<TR>
<TD align=3D"right"><font size=3D-1><B>Routing Number</b><BR>
(The numbers between the <IMG SRC=3D"images/microdots=2Egif" HEIGHT=3D14 W=
IDTH=3D14>characters):</font></TD>

<TD><INPUT type=3D"text" name=3D"BANK_ROUTING"></TD>
</TR>

<TR>
<TD align=3D"right"><font size=3D-1><B>Account Number:</font></b></TD>

<TD><INPUT type=3D"text" name=3D"BANK_ACCOUNT"></TD>


</TR>
</TABLE>

</td></tr>
--------------------->
</TABLE>
</TD>
</TR>

<TR>
<TD ALIGN=3DLEFT>
<TABLE CELLSPACING=3D0 CELLPADDING=3D0 WIDTH=3D"450" >
<TR>
<TD ALIGN=3DLEFT COLSPAN=3D4><B><TT><FONT COLOR=3D"#FF0000"><FONT SIZE=3D+=
3>Step
2<BR>
</FONT></FONT></TT><FONT COLOR=3D"#0000FF"><FONT SIZE=3D+2>Select Quantity=

and Delivery</FONT></FONT></B><BR><BR>
</TD>
</TR>
<TR>
<TD>
<INPUT TYPE=3DRADIO NAME=3D"QTY" CHECKED VALUE=3D"1 @ $189=2E95+8=2E95">
<FONT FACE=3D"ARIAL, HELVETICA, GENEVA" SIZE=3D-1><B> 1&nbsp; Belle Figure=
 LRS @ $189=2E95 + $8=2E95 S&H =3D $198=2E90</B></FONT><BR><BR>
<FONT FACE=3D"ARIAL, HELVETICA, GENEVA" SIZE=3D+1 COLOR=3DRED><B>SAVE WITH=
 OUR MONTHLY SPECIALS!</B></FONT><BR><BR>
<INPUT TYPE=3DRADIO NAME=3D"QTY" VALUE=3D"2 @ $363=2E85">&nbsp;<B><FONT FA=
CE=3D"ARIAL, HELVETICA, GENEVA" SIZE=3D-1>
</FONT><FONT face=3D"ARIAL, HELVETICA, GENEVA" SIZE=3D-1 color=3D"#0000FF"=
>SAVE $33=2E95</FONT><FONT FACE=3D"ARIAL, HELVETICA, GENEVA" SIZE=3D-1>&nbs=
p;&nbsp;
2&nbsp; Belle Figure LRSs- with S&H =3D $363=2E85&nbsp;</FONT></B><BR>
<INPUT TYPE=3DRADIO NAME=3D"QTY" VALUE=3D"3 @ $537=2E75">&nbsp;<B><FONT FA=
CE=3D"ARIAL, HELVETICA, GENEVA" SIZE=3D-1>
</FONT><FONT face=3D"ARIAL, HELVETICA, GENEVA" SIZE=3D-1 color=3D"#0000FF"=
>SAVE $58=2E95</FONT><FONT FACE=3D"ARIAL, HELVETICA, GENEVA" SIZE=3D-1>&nbs=
p;&nbsp;
3&nbsp; Belle Figure LRSs- with S&H =3D $537=2E75&nbsp;</FONT><FONT FACE=3D=
"ARIAL, HELVETICA, GENEVA" SIZE=3D-1><br>
</FONT></B><input type=3D"radio" value=3D"more_info" name=3D"QTY"> <b><fon=
t face=3D"Arial" size=3D"2" color=3D"#0000FF">Please send FREE INFORMATION =
only=2E (Please<br>
 click "SUBMIT" button to send us your contact information=2E)</font></b>
<p><BR>
<BR>
<!----------
<INPUT TYPE=3DCHECKBOX NAME=3D"FEDEX" VALUE=3D"Add FedEx @ $25"><FONT FACE=
=3D"ARIAL, HELVETICA, GENEVA" SIZE=3D-1 COLOR=3DRED><B> Check for Overnight=
 FedEx Delivery ($25=2E00)</FONT></B>
-------->
</p>
</TD>




</TABLE>
</TD>
</TR>

<TR>
<TD ALIGN=3DCENTER>
<TABLE CELLSPACING=3D0 CELLPADDING=3D10 WIDTH=3D"470" >
<TR>
<TD ALIGN=3DLEFT COLSPAN=3D"2" NOWRAP WIDTH=3D"25%"><B><TT><FONT COLOR=3D"=
#FF0000"><FONT SIZE=3D+3>
</FONT></FONT></TT></B> <INPUT TYPE=3D"submit" VALUE=3D"SUBMIT "></TD>
</TR>

<TR><TD><FONT SIZE=3D+2 FACE=3D"ARIAL,HELVETICA,GENEVA" color=3Dblue><B>Pl=
ease allow 2-3 weeks for shipping=2E</b></font>
</td></tr>

<TR>
<TD COLSPAN=3D2><B><TT><FONT SIZE=3D+2>Did you remember?<BR>
</FONT></TT><FONT FACE=3D"arial, helvetica, geneva">1=2E Please complete a=
nd review your Order Form before authorizing your
  purchase=2E Double check your credit card account number and the expirat=
ion date=2E<BR>
  2=2E You must enter your billing address exactly as it appears on your c=
redit card statement=2E  If you want your order shipped to a different addr=
ess than
  the billing address, please indicate in the "Comments" section=2E<BR>
  3=2E Your email address is required so that we can send you a receipt an=
d other important information concerning your order=2E </FONT></B>
<P><B><FONT SIZE=3D+1>If you have any questions about your order, please c=
ontact Customer Service
at&nbsp;
</FONT></B></P>
<P><B><FONT SIZE=3D+1> (520) 203-4572 (Mountain Time)<BR>
</FONT></B></P>
</TD>
</TR>
</TABLE>
</TD>
</TR>
</TABLE></CENTER>

<P></FORM></P>
</TD>
</TR>

<TR>
<TD WIDTH=3D"116"></TD>

<TD WIDTH=3D"6">&nbsp;</TD>

<TD ALIGN=3DCENTER VALIGN=3DCENTER width=3D"492">
<HR SIZE=3D1 NOSHADE WIDTH=3D"100%">
<P>&nbsp;</P>

<P><FONT FACE=3D"arial, geneva, helvetica"><FONT SIZE=3D-1>&copy; 1998 All=

rights reserved=2E</FONT></FONT></P>
</TD>
</TR>
</TABLE>
<hr WIDTH=3D"100%">
<p align=3D"center">
 <br><b><font size=3D"4" color=3D"#0000FF">List
 Removal</font></b>
 <br><b><a
 href=3D"mailto:29kab@eudoramail=2Ecom?subject=3Dremove"><font size=3D-1 c=
olor=3D"#FF0000">Click
 Here</font></a></b>


</BODY>
</HTML>


------=_NextPart_001_0080_01BDF6C7.FABAC1B0--

------=_NextPart_000_007F_01BDF6C7.FABAC1B0--





From list@netscape.com  Mon Nov 13 23:28:31 2000
Received: from netscape.com (h-205-217-237-47.netscape.com [205.217.237.47])
	by ietf.org (8.9.1a/8.9.1a) with SMTP id XAA15314
	for <ldapext-archive@odin.ietf.org>; Mon, 13 Nov 2000 23:28:31 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.10.0/8.10.0) with ESMTP id eAE4JND11731;
	Mon, 13 Nov 2000 20:19:23 -0800 (PST)
Received: (from list@localhost)
	by aka.mcom.com (8.10.0/8.10.0) id eAE4QxA29551;
	Mon, 13 Nov 2000 20:26:59 -0800 (PST)
Resent-Date: Mon, 13 Nov 2000 20:26:59 -0800 (PST)
From: opp5000@hotmail.com
Message-Id: <200011140425.VAA90091@mail.oanet.com>
To: opp5000@hotmail.com
Date: Mon, 13 Nov 2000 21:22:38 PST
Subject: FREE Marketing Software.....A Complete Package!!!!
Resent-Message-ID: <"bRrw0.A.YNH.S8LE6"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com

"You have 700 New Members in your Downline!" 

450 people received the above message in October. 

626 new members joined our program in October.

With our revolutionary new Single-Line Downline System,
the first 450 new members who signed up had a guaranteed 
downline of 700 people their first month! What if you only
had 200, 100 or even 50 members placed in your downline?
How many programs will do that for you? 

You can try our program for FREE!! 

If we don't keep our word and build a Downline for YOU 
- You've risked nothing. 

For more info mail to:
moolah10@yahoo.com 











From list@netscape.com  Tue Nov 14 03:58:23 2000
Received: from netscape.com (h-205-217-237-47.netscape.com [205.217.237.47])
	by ietf.org (8.9.1a/8.9.1a) with SMTP id DAA12467
	for <ldapext-archive@odin.ietf.org>; Tue, 14 Nov 2000 03:58:22 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.10.0/8.10.0) with ESMTP id eAE8n3D08558;
	Tue, 14 Nov 2000 00:49:03 -0800 (PST)
Received: (from list@localhost)
	by aka.mcom.com (8.10.0/8.10.0) id eAE8ud204622;
	Tue, 14 Nov 2000 00:56:39 -0800 (PST)
Resent-Date: Tue, 14 Nov 2000 00:56:39 -0800 (PST)
From: namesmktingcd@virgin.net
Date: Mon, 13 Nov 00 22:26:39 EST
To: namesmktingcds@virgin.net
Subject: Online marketing success increase sales
Message-ID: <>
Resent-Message-ID: <"U6LNc.A.lHB.G5PE6"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com

FINALLY, THE TRUTH IS REVEALED ABOUT
HAVING A SUCCESSFUL ONLINE BUSINESS. . . .

Our research has found that many people have
tried one or more of the following...

Free Classifieds? (Don't work)
Web Site? (Takes thousands of visitors)
Banners? (Expensive and iffy)
E-Zine? (They better have a huge list)
Search Engines? (Easily buried with thousands of others)

S O  W H A T  D O E S  W O R K ?

Although often misunderstood, there is one method
that has proven to succeed time-after-time.

 E - M A I L  M A R K E T I N G ! !

It's a fact! If you're not using your computer to generate income,
you're leaving money on the table.

Here's what the experts have to say about E-Mail Marketing:

"A gold mine for those who can take advantage of
bulk e-mail programs" - The New York Times

"E-mail is an incredible lead generation tool"
Crains Magazine

"Blows away traditional Mailing" - Advertising Age

Here is an example of your potential earnings if you have a
product that brings you a profit of around $30. Remember,
on the Internet, you can make money 7 days a week, 24
hours a day... even while you sleep, orders come from
all over the world!

Orders Per Day Weekly Earnings / Monthly Earnings /
 Yearly Earnings

 1 $210.00 $840.00 $10,080.00
 2 $420.00 $1,680.00 $20,160.00
 3 $630.00 $2,520.00 $30,240.00
 5 $1,050.00 $4,200.00 $50,400.00
 10 $2,100.00 $8,400.00 $100,000.00
 15 $3,150.00 $12,600.00 $151,200.00

We have available for a LIMITED TIME, over 40 million
FRESH, DELIVERABLE, e-mail addresses on CD-ROM.
The cd-rom includes targeted addresses, such as business
opportunity seekers, sports buffs, mlm, impulsive buyers and
investors. The cd-rom also includes general Internet, 
United States, United kingdom, mixed domains, International,
Canadian, earthlink, aol, compuserve, misc. and much more. 
The list's are divided into groups and are compressed. This will
allow you to use the names right off the cd. 

ORDER IN THE NEXT 7 DAYS AND RECEIVE 4
BONUSES!!  

*BONUS #1 Receive an additional cd-rom with millions of fresh, 
deliverable general internet e-mail addresses free!!

*BONUS #2 Receive 2000 how to books, reports and manuals
on cd-rom with reprint resale rights! Produce for pennies 
and sale for BIG dollars!  HOW TO INFORMATION IS A 
BIG MONEY MAKER! 

*BONUS #3 Receive the Mass mailer bulk delivery software, 
with full operating instructions. This software will get the mail 
out QUICK!

*BONUS #4 Receive the informational guide to bulk e-mail. 
This guide will give you all the information you need to get started!

THIS IS A ONE TIME PACKAGE DEAL WORTH
OVER NINE HUNDRED DOLLARS!!  
 
ACT NOW! THIS IS A LIMITED TIME OFFER!
ORDER WHILE SUPPLIES LAST!

RECEIVE THIS DREAM PACKAGE FOR THE 
UNBELIEVABLE LOW, LOW  PRICE OF  ONLY $69.95!

YOU MUST ORDER WITHIN 7 DAYS TO RECEIVE THIS 
SPECIAL ONE TIME PRICE OF $69.95!!

ACT NOW!!  $69.95  ORDER TODAY!!

WE HAVE TWO ORDER OPTIONS

Call (QUICK PRODUCTS) quick ship order line Toll Free
24hrs 1-877-711-4400  We accept all major credit cards 
and checks over the phone. This is a order line only!!!!

FAX LINE!!  We also accept all major credit cards and checks
by fax 9am to 9pm eastern fax to (1-716-834-7443)  Credit card orders
please include name,address,telephone number,account number,
exp. date. Make checks payable to CSC.  

If we have reached you in error, and you would like to be removed
peadmatter@yahoo.com





From list@netscape.com  Tue Nov 14 12:28:59 2000
Received: from netscape.com (h-205-217-237-47.netscape.com [205.217.237.47])
	by ietf.org (8.9.1a/8.9.1a) with SMTP id MAA25360
	for <ldapext-archive@odin.ietf.org>; Tue, 14 Nov 2000 12:28:59 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.10.0/8.10.0) with ESMTP id eAEHJRD10792;
	Tue, 14 Nov 2000 09:19:31 -0800 (PST)
Received: (from list@localhost)
	by aka.mcom.com (8.10.0/8.10.0) id eAEHR2w14644;
	Tue, 14 Nov 2000 09:27:03 -0800 (PST)
Resent-Date: Tue, 14 Nov 2000 09:27:03 -0800 (PST)
Message-Id: <sa111362.054@prv-mail20.provo.novell.com>
X-Mailer: Novell GroupWise Internet Agent 5.5.5.1
Date: Tue, 14 Nov 2000 10:26:23 -0700
From: "Jim Sermersheim" <jimse@novell.com>
To: <ietf-ldapext@netscape.com>, <ietf-ldapbis@openldap.org>
Cc: "Richard Ellis" <RELLIS@novell.com>
Subject: anonymous binds
Mime-Version: 1.0
Content-Type: text/plain; charset=US-ASCII
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
X-MIME-Autoconverted: from quoted-printable to 8bit by aka.mcom.com id eAEHR0v14611
Resent-Message-ID: <"CDM8BC.A.ZkD.lXXE6"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com
Content-Transfer-Encoding: 8bit

RFC 2251 seems to conflict itself when talking about anonymous binds. 

In 4.2 the explanation of the name field says: "This field may take on a null value (a zero length string) for the purposes of anonymous binds" which at first glance seems to imply that an empty name signifies an anon bind.

In 4.2.2, the wording is: "If no authentication is to be performed, then the simple authentication option MUST be chosen, and the password be of zero length, ... Typically the DN is also of zero length". This says (a bit more explicitly) that an empty (simple) password signifies an anonymous bind (I assume the intent was that no authentication is the same as anonymous bind).

Questions:

1) Is it the intent that "anonymous bind" and "no authentication" are equal here? If so, I propose we use the term anonymous bind in 4.2.2 to clarify.

2) Which signifies an anonymous bind, an empty name or empty simple password? I assume it's an empty password, and when an empty password is used, teh name is simply ignored by the server.

3) What does it mean to bind with an empty name and a simple password that contains data? Elsewhere, an empty DN implies the root DSE. Is there or will ther be a need to authenticate as the root DSE using simple authentication? If not, we should state that this case results in a protocolError.

Jim



From list@netscape.com  Wed Nov 15 05:07:31 2000
Received: from netscape.com (h-205-217-237-47.netscape.com [205.217.237.47])
	by ietf.org (8.9.1a/8.9.1a) with SMTP id FAA21427
	for <ldapext-archive@odin.ietf.org>; Wed, 15 Nov 2000 05:07:30 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.10.0/8.10.0) with ESMTP id eAF9ugD12383;
	Wed, 15 Nov 2000 01:56:42 -0800 (PST)
Received: (from list@localhost)
	by aka.mcom.com (8.10.0/8.10.0) id eAFA4Ks05819;
	Wed, 15 Nov 2000 02:04:20 -0800 (PST)
Resent-Date: Wed, 15 Nov 2000 02:04:20 -0800 (PST)
Date: Wed, 15 Nov 2000 19:07:29 +0900
Message-ID: <B0000021590@janey.kssystem.co.jp>
To: <ietf-ldapext@netscape.com>
From: <ellie900@usa.com>
Subject: Fwd: Second Site
Resent-Message-ID: <"vN-f5.A.maB.i-lE6"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com


YET ANOTHER CHANGE!!  PLEASE TAKE A MOMENT TO CHECK OUT THE IMPROVEMENTS

http://3638141293/36/1059436/newflash.htm




















From list@netscape.com  Wed Nov 15 05:09:53 2000
Received: from netscape.com (h-205-217-237-46.netscape.com [205.217.237.46])
	by ietf.org (8.9.1a/8.9.1a) with SMTP id FAA22438
	for <ldapext-archive@odin.ietf.org>; Wed, 15 Nov 2000 05:09:52 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.10.0/8.10.0) with ESMTP id eAF9sds08870;
	Wed, 15 Nov 2000 01:54:40 -0800 (PST)
Received: (from list@localhost)
	by aka.mcom.com (8.10.0/8.10.0) id eAFA71Q06918;
	Wed, 15 Nov 2000 02:07:01 -0800 (PST)
Resent-Date: Wed, 15 Nov 2000 02:07:01 -0800 (PST)
Date: Wed, 15 Nov 2000 19:00:20 +0900
Message-ID: <B0000127606@ausntsv01.aus.co.jp>
To: <ietf-ldapext@netscape.com>
From: <ellie900@usa.com>
Subject: Fwd:  First Site
Resent-Message-ID: <"5Z2xKC.A.xrB.DBmE6"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com


THE NEW LINK FOR OUR SITE.
SORRY FOR ANY TROUBLE YOU MAY HAVE HAD WITH THE OLD LINK.
THIS ONE HAS ALL THE CORRECTIONS

http://3638141293/36/1059436/legal.html
















From list@netscape.com  Wed Nov 15 06:43:30 2000
Received: from netscape.com (h-205-217-237-47.netscape.com [205.217.237.47])
	by ietf.org (8.9.1a/8.9.1a) with SMTP id GAA02458
	for <ldapext-archive@odin.ietf.org>; Wed, 15 Nov 2000 06:43:30 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.10.0/8.10.0) with ESMTP id eAFBY3D22823;
	Wed, 15 Nov 2000 03:34:03 -0800 (PST)
Received: (from list@localhost)
	by aka.mcom.com (8.10.0/8.10.0) id eAFBfdU29922;
	Wed, 15 Nov 2000 03:41:39 -0800 (PST)
Resent-Date: Wed, 15 Nov 2000 03:41:39 -0800 (PST)
Message-Id: <200011151141.GAA01176@ietf.org>
Mime-Version: 1.0
Content-Type: Multipart/Mixed; Boundary="NextPart"
To: IETF-Announce: ;
CC: ietf-ldapext@netscape.com
From: Internet-Drafts@ietf.org
Reply-to: Internet-Drafts@ietf.org
Subject: I-D ACTION:draft-elliott-ldapext-spdna-recrecs-00.txt
Date: Wed, 15 Nov 2000 06:41:03 -0500
Sender: nsyracus@cnri.reston.va.us
Resent-Message-ID: <"bAnduD.A.NTH.yZnE6"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com

--NextPart

A New Internet-Draft is available from the on-line Internet-Drafts directories.


	Title		: Recommendations for Recording Directory Access Data
	Author(s)	: D. Elliott, N. Greene, S. Miklos
	Filename	: draft-elliott-ldapext-spdna-recrecs-00.txt
	Pages		: 10
	Date		: 14-Nov-00
	
The Service Provider Directory-enabled Network Applications WG in
the Directory Interoperability Forum of the Open Group (see
http://www.sp-dna.org) is looking at the use of LDAP-accessible
directories for Service Provider applications. In the course of this
work, we have found a few areas where existing LDAP standards do not
meet all the needs for a directory. This document addresses one such
area - logging and auditing.

A URL for this Internet-Draft is:
http://www.ietf.org/internet-drafts/draft-elliott-ldapext-spdna-recrecs-00.txt

Internet-Drafts are also available by anonymous FTP. Login with the username
"anonymous" and a password of your e-mail address. After logging in,
type "cd internet-drafts" and then
	"get draft-elliott-ldapext-spdna-recrecs-00.txt".

A list of Internet-Drafts directories can be found in
http://www.ietf.org/shadow.html 
or ftp://ftp.ietf.org/ietf/1shadow-sites.txt


Internet-Drafts can also be obtained by e-mail.

Send a message to:
	mailserv@ietf.org.
In the body type:
	"FILE /internet-drafts/draft-elliott-ldapext-spdna-recrecs-00.txt".
	
NOTE:	The mail server at ietf.org can return the document in
	MIME-encoded form by using the "mpack" utility.  To use this
	feature, insert the command "ENCODING mime" before the "FILE"
	command.  To decode the response(s), you will need "munpack" or
	a MIME-compliant mail reader.  Different MIME-compliant mail readers
	exhibit different behavior, especially when dealing with
	"multipart" MIME messages (i.e. documents which have been split
	up into multiple messages), so check your local documentation on
	how to manipulate these messages.
		
		
Below is the data which will enable a MIME compliant mail reader
implementation to automatically retrieve the ASCII version of the
Internet-Draft.

--NextPart
Content-Type: Multipart/Alternative; Boundary="OtherAccess"

--OtherAccess
Content-Type: Message/External-body;
	access-type="mail-server";
	server="mailserv@ietf.org"

Content-Type: text/plain
Content-ID:	<20001114131210.I-D@ietf.org>

ENCODING mime
FILE /internet-drafts/draft-elliott-ldapext-spdna-recrecs-00.txt

--OtherAccess
Content-Type: Message/External-body;
	name="draft-elliott-ldapext-spdna-recrecs-00.txt";
	site="ftp.ietf.org";
	access-type="anon-ftp";
	directory="internet-drafts"

Content-Type: text/plain
Content-ID:	<20001114131210.I-D@ietf.org>

--OtherAccess--

--NextPart--




From list@netscape.com  Wed Nov 15 21:29:24 2000
Received: from netscape.com (h-205-217-237-47.netscape.com [205.217.237.47])
	by ietf.org (8.9.1a/8.9.1a) with SMTP id VAA02762
	for <ldapext-archive@odin.ietf.org>; Wed, 15 Nov 2000 21:29:24 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.10.0/8.10.0) with ESMTP id eAG2KID09949;
	Wed, 15 Nov 2000 18:20:19 -0800 (PST)
Received: (from list@localhost)
	by aka.mcom.com (8.10.0/8.10.0) id eAG2Rvs24726;
	Wed, 15 Nov 2000 18:27:57 -0800 (PST)
Resent-Date: Wed, 15 Nov 2000 18:27:57 -0800 (PST)
From: PublishingCompanyforSale@uku.co.uk
To: Publishing@yahoo.com
Date: Wed, 15 Nov 00 16:54:42 EST
Subject: Publishing Company for Sale!
Reply-To: PublishingCompany106@yahoo.com
Message-ID: <40F08F36CC9@gml.cz>
Resent-Message-ID: <"iGCQF.A.2BG.qY0E6"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com

See information about Free Credit Application Below!

My Multi-Million Dollar 
Publishing Company 
ONLY $149

Free Pre-Approved Merchant Account Application with Order!! 
To Start Your Business Out Right!!

If you ever wanted "the easy way out" to make a lot of money
with a business of your own....
Here is the EASIEST WAY TO START!

I'm writing this letter to let you in on something that'll blow
you away. What I'm about to present is something I've 
never done before...something that I'll never do again....
So PAY ATTENTION!

For the past few years...I've have been running ads in 
newspapers & magazines, by direct mail, and throughout 
the internet.  These ads were always small and very cheap...

On these ads, we have been selling little manuals.  These
manuals have sold for anywhere between $10 to $99 each.  
We always ran different ads for each manual we were selling.  

I like selling information because NOBODY can put a price on 
it...ESPECIALLY when it is your own...The Sky is the Limit!

Plus it is very cheap to reproduce How-To manuals.  It costs 
between 40 cents and $3 to print the entire print manuals and 
around 35 cents to copy the manuals on disk.  AND you can 
sell them for up to $99 each.   That is one hell of a markup!

These manuals tell you how to get a car with no money down 
and no credit...another one tells you how to avoid taxes by 
depositing income offshore...now you may not be interested in 
saving money by going offshore...but believe me....there are 
MILLIONS OF PEOPLE WHO DO...and they are willing to pay 
me to teach them!!! 

Well this is where the unbelievable offer comes in...I hope you
are sitting down for this one...because this is a once in a 
lifetime chance for you.  I do not know of an easier way to 
become financially independent...In fact THERE IS NO EASIER 
WAY!!!  
The next few paragraphs will reveal everything to you.

I am willing to sell you my entire informational product line 
with FULL REPRINT RIGHTS and complete step-by-step 
instructions on how to start your mail order information business 
with very little money. 

Remember, these are PROVEN WINNERS.  If you are 
stumped on something to sell or if you are having trouble 
writing a good ad, I have also included an entire book on 
disk to help you produce KILLER ads!

This entire package which I call a Publishing Company in a 
Box will come on 1 CD containing over 2000 'Hot-Selling' 
Books, Reports And Manuals ready to print and sell, Sell, 
SELL! It also will come with a signed letter giving YOU FULL 
REPRINT RIGHTS allowing you to sell them for as much as 
you want and however you want.  You Can even sell the entire
kit to someone else to resale on their own!  You also receive 
copies of KILLER ads which can fill your mailbox with cash!

I am not even going to ask you for any of the money either...
What you make is yours to keep .  In fact...you get to make a 
ton of money on these manuals for as long as you wish...and 
you will never have to pay me another red cent in royalties!

I am even going to print out and prepare our #1 selling report 
which contains the secrets of obtaining credit without a credit
check and producing an offshore income without taxes so that 
you will be able to take it down to your local copy shop and be 
ready to sell it the same day you have received it. Watch out 
though - one individual is making $70,000 a month on this report 
alone!  (Why - Because you can include a FREE offshore credit 
application for those with bad or no credit with this report and 
explode your mailbox with orders) Note: THIS APPLICATION IS 
INCLUDED!

All I ask for is...$149 and I will include FREE Priority Mail 
Shipping!  Yes, I said $149.  There are no zeros missing.  
Plus if you order before  Nov 20, 2000 I will include 
4 extra special bonuses...

Bonus #1 - "Search Engine Magic" on disk.  This report will 
shoot your web site up to the top of the search engine listings.
Other web advertisers are selling this manual for $99 by 
itself - But I will give it to you for FREE with this package.

Bonus #2 - The report "How to Make at least $1,600 a week 
online...Starting Now!" which is taking the internet by storm 
will be included absolutely FREE! 

Bonus #3 - I will include special details about a secret source
for direct mail leads that can produce cash orders along with 
out KILLER ads.  And another source will be given which 
allows you to advertise nationwide through newspapers to 
70,000,000 readers for as low as 7 cents per word.

Bonus #4 - I also will include a pre-approved application for 
a merchant account for your business benefit.  Taking credit 
cards will increase your business up to 100%.  The normal 
$195 application fee will be waved with this pre-approved 
application.  

But there is one drawback... I am sending this ad to 10,000 
other people...and I will only allow 50 kits to be sold.  It 
wouldn't make much sense if I sold this kit to 1,000 or 2,000 
people...The market would be saturated with these same 
manuals... 
and I don't want to do that.  To make sure that the people in 
this offer get the same results I have...ONLY 50 people can have 
it for $149.00!

Chances are, I will get all 50 within a week's time.  So if this 
is something you are interested in...RUSH me a check or money 
order for $149.00 TODAY to insure your future business.

But, even if you decide to pass this up...Don't sweat it.  It's
not like I am going to be mad or anything like that.  I know I 
will get my 50 order limit really fast.  And anyone who gets 
their check into me late... I will simply send it back.

For only $149.00, I am going to let you have the easiest money 
you will ever make.  The manuals are written, the ads are 
presented, the advertising plan is laid out, and all you have 
to do is print them out for pennies and place the ads.

Do it today! Rush me your payment of $149.00 right now...and 
get your very own MILLION DOLLAR publishing company going!

You can start with one or two manuals...even the day you 
receive the package...and then expand to include ALL of them!

For $149.00, you have everything you need to make a killing 
with your very own business.  If you want to make real 
money - then this offer is for you!

"I took the report "Search Engine Magic" and sold over 50 
copies on disk within 2 weeks! They sold for $99 and I was 
able to copy them for under 50 cents each.  Wait till I start 
marketing the other products included in this line!!!"
Joe Fisher - Internet Marketer

To rush order this "MILLION DOLLAR Publishing Company in 
a Box" simply fill out the order form below and fax it to 
our 24 hour  order line at:

FAX ORDER LINE:
1 (212) 504-8032

Regular Mail to:
Financial Systems
P.O. Box 301
Orange, Ma 01364

ORDER FORM
--------------------------------------------------------------
Please send to:

Your Name__________________________________________
 
Your Address________________________________________
 
Your City____________________________________________
 
State / Zip___________________________________________
 
Phone #: ____________________________________________
(For problems with your order only. No salesmen will call.)
 
Email Address_______________________________________

We Accept Checks or Money Orders along with all Major Credit 
Cards 
including Visa, MasterCard and American Express.  (NOTE - We 
only 
ship to the address listed on the credit card)

(Please Fill Out Below Section and Make sure that the above name 
and address are listed as it appears on the card) for $149.00

Credit Card Number:________________________________

Expiration Date___________________________

Signature:_________________________

Date:____________________

[  ] YES! Please rush my Publishing Company in a Box.  I 
understand I have FULL REPRINT Rights and can sell any of 
the items for whatever price I desire, even the entire kit.

[  ] DOUBLE YES!  I am ordering before Nov 20, 2000!  
Please include the extra special bonuses!

* Please check one of the following payment options:
[  ] I am faxing a check (Do not send original, we will make a 
draft from the faxed check)

[  ] I am faxing or mailing my credit card number. (Note your 
card will be charged for $149.00 and we only ship to the address 
on the card)

[  ] I am enclosing a check or money order for $149.00!

Note - If ordering outside continental US, please add $5 to S&H

P.S. Don't forget you will receive 2,000 Manuals, Books, and 
Reports (Some of which are up to 200 pages each)...all for 
$149...You have full reprint and resale rights to make as much 
money as you want without ever paying any royalties whatsoever!


_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/
If you have received this message in error and would
like to be removed from future mailings, please reply
with the word remove in the subject. x
_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/



From list@netscape.com  Thu Nov 16 14:51:17 2000
Received: from netscape.com (h-205-217-237-47.netscape.com [205.217.237.47])
	by ietf.org (8.9.1a/8.9.1a) with SMTP id OAA18996
	for <ldapext-archive@odin.ietf.org>; Thu, 16 Nov 2000 14:51:17 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.10.0/8.10.0) with ESMTP id eAGJgTD23713;
	Thu, 16 Nov 2000 11:42:29 -0800 (PST)
Received: (from list@localhost)
	by aka.mcom.com (8.10.0/8.10.0) id eAGJo7I19842;
	Thu, 16 Nov 2000 11:50:07 -0800 (PST)
Resent-Date: Thu, 16 Nov 2000 11:50:07 -0800 (PST)
Message-Id: <sa13d7f2.006@prv-mail20.provo.novell.com>
X-Mailer: Novell GroupWise Internet Agent 5.5.5.1
Date: Thu, 16 Nov 2000 12:49:43 -0700
From: "Steve Trottier" <STROTTIER@novell.com>
To: <ietf-ldapext@netscape.com>, "Jim Sermersheim" <JIMSE@novell.com>,
        <ietf-ldapbis@openldap.org>
Cc: "Richard Ellis" <RELLIS@novell.com>
Subject: Re: anonymous binds
Mime-Version: 1.0
Content-Type: text/plain; charset=US-ASCII
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
X-MIME-Autoconverted: from quoted-printable to 8bit by aka.mcom.com id eAGJo4v19815
Resent-Message-ID: <"pYL6rB.A.t1E.upDF6"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com
Content-Transfer-Encoding: 8bit

Jim,

I have a few thoughts on this.

I always assumed from the RFC language that if either the DN or the password is null (or zero length string) then it would result in an anonymous bind, and also that if one were null (or zero length string) then the other would be ignored.

I agree that it should be clarified in the RFC.

This question came up a few years ago in a discussion I was having in the hallway with John Aurich. He wondered (and I agreed) if an allowance should be made for users with zero-length passwords. Many systems allow users to log-in with blank passwords, and even though an administrator worth his salt should probably never allow it, if a system and its administrator decide to allow it for some reason, LDAP shouldn't undermine that by assuming a zero-length password always means to perform an anonymous bind.

Even though I can't think of a reason an LDAP server should need to allow the root DSE to bind, your comment about zero-length DN meaning root DSE in some cases but meaning anonymous in a simple bind is a good one. Different meanings in different contexts like that could be confusing to some.

Clients can get around the ambiguity by not binding at all and letting an implied anonymous bind happen when the server receives a request on a non-bound connection. But this behavior is only defined for LDAP v3.

Steve


>>> "Jim Sermersheim" <jimse@novell.com> 11/14/00 10:26AM >>>
RFC 2251 seems to conflict itself when talking about anonymous binds. 

In 4.2 the explanation of the name field says: "This field may take on a null value (a zero length string) for the purposes of anonymous binds" which at first glance seems to imply that an empty name signifies an anon bind.

In 4.2.2, the wording is: "If no authentication is to be performed, then the simple authentication option MUST be chosen, and the password be of zero length, ... Typically the DN is also of zero length". This says (a bit more explicitly) that an empty (simple) password signifies an anonymous bind (I assume the intent was that no authentication is the same as anonymous bind).

Questions:

1) Is it the intent that "anonymous bind" and "no authentication" are equal here? If so, I propose we use the term anonymous bind in 4.2.2 to clarify.

2) Which signifies an anonymous bind, an empty name or empty simple password? I assume it's an empty password, and when an empty password is used, teh name is simply ignored by the server.

3) What does it mean to bind with an empty name and a simple password that contains data? Elsewhere, an empty DN implies the root DSE. Is there or will ther be a need to authenticate as the root DSE using simple authentication? If not, we should state that this case results in a protocolError.

Jim




From list@netscape.com  Thu Nov 16 15:13:02 2000
Received: from netscape.com (h-205-217-237-47.netscape.com [205.217.237.47])
	by ietf.org (8.9.1a/8.9.1a) with SMTP id PAA28656
	for <ldapext-archive@odin.ietf.org>; Thu, 16 Nov 2000 15:13:01 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.10.0/8.10.0) with ESMTP id eAGK3dD29225;
	Thu, 16 Nov 2000 12:03:40 -0800 (PST)
Received: (from list@localhost)
	by aka.mcom.com (8.10.0/8.10.0) id eAGKBIk02294;
	Thu, 16 Nov 2000 12:11:18 -0800 (PST)
Resent-Date: Thu, 16 Nov 2000 12:11:18 -0800 (PST)
Message-Id: <200011162011.eAGKB8D19994@ywing.netscape.com>
To: ietf-ldapext@netscape.com
From: "Qchex.com" <mailresponse2@g7ps.com>
Subject: Send & Accept Checks by Email. FREE !
Reply-To: "Qchex.com" <mailresponse2@g7ps.com>
Date: 11/15/00 02:50:52 PM
Resent-Message-ID: <"5GRLHB.A.Cj.j9DF6"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com

SEND & ACCEPT CHECKS BY EMAIL!

50 Checks per month FREE. No fees!
*Efficient Business Solutions available!

To start and for more details click below:
http://www.qchex.com

*** electronic news keep you informed and protect our natural resources ***

Note:
To receive future Qchex information, please click on the following link:  
http://www.globalzon2k.com/scripts/mfm_ae.asp?e=ietf-ldapext@netscape.com

To Opt-Out on future Qchex information, please click on the following link:
http://www.globalzon2k.com/scripts/mfm_de.asp?e=ietf-ldapext@netscape.com





From list@netscape.com  Thu Nov 16 17:47:57 2000
Received: from netscape.com (h-205-217-237-47.netscape.com [205.217.237.47])
	by ietf.org (8.9.1a/8.9.1a) with SMTP id RAA26350
	for <ldapext-archive@odin.ietf.org>; Thu, 16 Nov 2000 17:47:56 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.10.0/8.10.0) with ESMTP id eAGMcWD04615;
	Thu, 16 Nov 2000 14:38:32 -0800 (PST)
Received: (from list@localhost)
	by aka.mcom.com (8.10.0/8.10.0) id eAGMkBE15714;
	Thu, 16 Nov 2000 14:46:11 -0800 (PST)
Resent-Date: Thu, 16 Nov 2000 14:46:11 -0800 (PST)
Message-ID: <000028b61e90$00000ad4$00006ae5@>
To: <Saalbach@d10.de>
From: Saalbach@d10.de
Subject: Receive a FREE Satellite T.V. System
Date: Thu, 16 Nov 2000 17:50:49 -0400
MIME-Version: 1.0
Content-Type: text/plain;
	charset="Windows-1252"
Content-Transfer-Encoding: 7bit
X-Priority: 3
X-MSMail-Priority: Normal
Resent-Message-ID: <"eBIYwC.A.j0D.wOGF6"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com
Content-Transfer-Encoding: 7bit

FREE Satellite T.V. System and FREE Installation

For a limited time we'll give you this top of the line Digital
Satellite System for FREE!  We'll even include Free installation.

Enjoy over 500 Channels of crystal clear digital picture and
cd stereo sound on your FREE Satellite TV System.  Why pay
for these items in a retail store, when we're giving you the
same satellite package for free.


Call 888-514-6881 to be Guaranteed Your FREE Satellite Today


This Innovative 20" Satellite includes a stereo receiver and
an infrared remote.  With this FREE offer you will have both
Interactive Television Capability and an On Screen Program Guide.

This limited time FREE offer is much less than the monthly cost
of cable tv. All you have to do is call us to arrange delivery.   
If you call today, we'll throw in a second receiver for your
second T.V. free.


Call 888-514-6881 to Begin Surfing through 500 Channels Today!


To be removed send email to tcaiom@yahoo.com



From list@netscape.com  Fri Nov 17 15:23:43 2000
Received: from netscape.com (h-205-217-237-46.netscape.com [205.217.237.46])
	by ietf.org (8.9.1a/8.9.1a) with SMTP id PAA08287
	for <ldapext-archive@odin.ietf.org>; Fri, 17 Nov 2000 15:23:42 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.10.0/8.10.0) with ESMTP id eAHK9Vs23038;
	Fri, 17 Nov 2000 12:09:32 -0800 (PST)
Received: (from list@localhost)
	by aka.mcom.com (8.10.0/8.10.0) id eAHBeXQ17263;
	Fri, 17 Nov 2000 03:40:33 -0800 (PST)
Resent-Date: Fri, 17 Nov 2000 03:40:33 -0800 (PST)
Message-Id: <200011171140.GAA12088@ietf.org>
Mime-Version: 1.0
Content-Type: Multipart/Mixed; Boundary="NextPart"
To: IETF-Announce: ;
Cc: ietf-ldapext@netscape.com
From: Internet-Drafts@ietf.org
Reply-to: Internet-Drafts@ietf.org
Subject: I-D ACTION:draft-ietf-ldapext-psearch-03.txt
Date: Fri, 17 Nov 2000 06:40:09 -0500
Sender: nsyracus@cnri.reston.va.us
Resent-Message-ID: <"xmv9PD.A.cNE.skRF6"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com

--NextPart

A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the LDAP Extension Working Group of the IETF.

	Title		: Persistent Search: A Simple LDAP Change Notification 
                          Mechanism
	Author(s)	: M. Smith, G. Good, T. Howes, R. Weltman
	Filename	: draft-ietf-ldapext-psearch-03.txt
	Pages		: 9
	Date		: 16-Nov-00
	
This document defines two controls that extend the LDAPv3 [LDAP] search
operation to provide a simple mechanism by which an LDAP client can
receive notification of changes that occur in an LDAP server.  The
mechanism is designed to be very flexible yet easy for clients and
servers to implement.  Since the IETF is likely to pursue a different,
more comprehensive solution in this area, this document will eventually
be published with Informational status in order to document an existing
practice.

A URL for this Internet-Draft is:
http://www.ietf.org/internet-drafts/draft-ietf-ldapext-psearch-03.txt

Internet-Drafts are also available by anonymous FTP. Login with the username
"anonymous" and a password of your e-mail address. After logging in,
type "cd internet-drafts" and then
	"get draft-ietf-ldapext-psearch-03.txt".

A list of Internet-Drafts directories can be found in
http://www.ietf.org/shadow.html 
or ftp://ftp.ietf.org/ietf/1shadow-sites.txt


Internet-Drafts can also be obtained by e-mail.

Send a message to:
	mailserv@ietf.org.
In the body type:
	"FILE /internet-drafts/draft-ietf-ldapext-psearch-03.txt".
	
NOTE:	The mail server at ietf.org can return the document in
	MIME-encoded form by using the "mpack" utility.  To use this
	feature, insert the command "ENCODING mime" before the "FILE"
	command.  To decode the response(s), you will need "munpack" or
	a MIME-compliant mail reader.  Different MIME-compliant mail readers
	exhibit different behavior, especially when dealing with
	"multipart" MIME messages (i.e. documents which have been split
	up into multiple messages), so check your local documentation on
	how to manipulate these messages.
		
		
Below is the data which will enable a MIME compliant mail reader
implementation to automatically retrieve the ASCII version of the
Internet-Draft.

--NextPart
Content-Type: Multipart/Alternative; Boundary="OtherAccess"

--OtherAccess
Content-Type: Message/External-body;
	access-type="mail-server";
	server="mailserv@ietf.org"

Content-Type: text/plain
Content-ID:	<20001116142849.I-D@ietf.org>

ENCODING mime
FILE /internet-drafts/draft-ietf-ldapext-psearch-03.txt

--OtherAccess
Content-Type: Message/External-body;
	name="draft-ietf-ldapext-psearch-03.txt";
	site="ftp.ietf.org";
	access-type="anon-ftp";
	directory="internet-drafts"

Content-Type: text/plain
Content-ID:	<20001116142849.I-D@ietf.org>

--OtherAccess--

--NextPart--




From list@netscape.com  Fri Nov 17 16:04:17 2000
Received: from netscape.com (h-205-217-237-46.netscape.com [205.217.237.46])
	by ietf.org (8.9.1a/8.9.1a) with SMTP id QAA10198
	for <ldapext-archive@odin.ietf.org>; Fri, 17 Nov 2000 16:04:17 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.10.0/8.10.0) with ESMTP id eAHKoEs01947;
	Fri, 17 Nov 2000 12:50:15 -0800 (PST)
Received: (from list@localhost)
	by aka.mcom.com (8.10.0/8.10.0) id eAGNvM621739;
	Thu, 16 Nov 2000 15:57:22 -0800 (PST)
Resent-Date: Thu, 16 Nov 2000 15:57:22 -0800 (PST)
Date: Thu, 16 Nov 2000 15:56:57 -0800 (PST)
Message-Id: <200011162356.eAGNuvR21361@xwing.netscape.com>
From: ashlaws@mail.com
To: ietf-ldapext@netscape.com
Subject:  Hi  ietf-ldapext  We Do All The Advertising For You!
X-Reply-To:  ashlaws@mail.com
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: 7bit
Resent-Message-ID: <"B_65s.A.wRF.aRHF6"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com
Content-Transfer-Encoding: 7bit


  CO-OP ADVERTISING SYSTEM.

Greatest Money Maker Ever This is HOT!


We Do All The Advertising For You,
No Recruiting Required. Pay only
One Time.YOU MUST SEE THIS! 

For More Information;Reply To This Message With
[MORE INFO]  As The Subject.
ashlaws@mail.com




From list@netscape.com  Fri Nov 17 23:45:38 2000
Received: from netscape.com (h-205-217-237-47.netscape.com [205.217.237.47])
	by ietf.org (8.9.1a/8.9.1a) with SMTP id XAA21135
	for <ldapext-archive@odin.ietf.org>; Fri, 17 Nov 2000 23:45:38 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.10.0/8.10.0) with ESMTP id eAI4aPD10241;
	Fri, 17 Nov 2000 20:36:25 -0800 (PST)
Received: (from list@localhost)
	by aka.mcom.com (8.10.0/8.10.0) id eAI4i5226445;
	Fri, 17 Nov 2000 20:44:05 -0800 (PST)
Resent-Date: Fri, 17 Nov 2000 20:44:05 -0800 (PST)
Date: Fri, 17 Nov 2000 20:43:26 -0800 (PST)
Message-Id: <200011180443.eAI4h4R26487@xwing.netscape.com>
From: David.Bowden@xwing.netscape.com
To: .XIXK@netscape.com
Subject:  International Opportunity, setting industry records!!!
X-Reply-To:  dbmarketing@hotmail.com
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: 7bit
Resent-Message-ID: <"PdCHrD.A.4cG.TkgF6"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com
Content-Transfer-Encoding: 7bit


Dear Friend, 

Thank you for your time and interest. 

This email contains the ENTIRE PLAN of how YOU can make $50,000 or 

more in the next 90 days simply sending email! 

Seem impossible? Just read on and see how easy this is.... 


Due to the popularity of this letter on the Internet, a major 

nightly news program recently devoted an entire show to the 

investigation of the program described below to see if it really 

can make people money. 


The show also investigated whether or not the program was 

legal. Their findings proved that there are absolutely no laws 

prohibiting the participation in the program. 

This has helped to show people that this is a simple, harmless 

and fun way to make some extra money at home. 


The results have been truly remarkable. So many 

people are participating that those involved are doing much 

better than ever before. Since everyone makes more as more 

people try it out, its been very exciting. 

You will understand once you try it yourself! 


********* THE ENTIRE PLAN IS HERE BELOW ********* 

*** Print This Now For Future Reference *** 

$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ 

If you would like to make at least $50,000 in less than 90 days! 

Please read this program...THEN READ IT AGAIN!! 

$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ 

THIS IS A LEGITIMATE, LEGAL, MONEY MAKING 

OPPORTUNITY!! It does NOT require you to come into contact 

with people or make or take any telephone calls. 

Just follow the instructions, and you will make money 

This simplified e-mail marketing program works 

perfectly 100% EVERY TIME! 


E-mail is the sales tool of the future. Take advantage of this 

virtually free method of advertising NOW!!! 

The longer you wait, the more people will be doing business 

using email. Get your piece of this action!!! 


~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 

Hello - My name is Johnathon Rourke, I'm from Rhode Island. 


The enclosed information is something I almost let slip 

through my fingers. Fortunately, sometime later I re-read 

everything and gave some thought and study to it. Two years 

ago, the corporation I worked for the past twelve years down- 

sized and my position was eliminated. After unproductive job 

interviews, I decided to open my own business. Over the past 

year, I incurred many unforeseen financial problems. I owed my 

family, friends and creditors over $35,000. The economy was 

taking a toll on my business and I just couldn't seem to make 

ends meet. I had to refinance and borrow against my home to 

support my family and struggling business. 

AT THAT MOMENT something significant happened in my life. 

I am writing to share the experience in hopes that this could 

change your life FOREVER FINANCIALLY$$$!!! 


In mid December, I received this program in my e-mail. Six months 

prior to receiving this program I had been sending away for 

information on various business opportunities. All of the 

programs I received, in my opinion, were not cost effective. 

They were either too difficult for me to comprehend or the initial 

investment was too much for me to risk to see if they would work . 


But as I was saying, in December of 1997 I received this 

program. I didn't send for it, or ask for it, they just got my 

name off a mailing list. THANK GOODNESS FOR THAT!!! After reading it 

several times, to make sure I was reading it correctly. 

I couldn't believe my eyes! Here was a MONEY MAKING 

MACHINE I could start immediately without any debt. 


Like most of you I was still a little skeptical and a little worried 

about the legal aspects of it all. So I checked it out with the U.S. 

Post Office (1-800-725-2161 24-hrs) and they confirmed that it is 

indeed legal! After determining the program was LEGAL 

I decided "WHY NOT!?!??" 

Initially I sent out 10,000 e-mails. It cost me about $15 for my time 

on-line. The great thing about e-mail is that I don't need any 

money for printing to send out the program, and because I also 

send the product (reports) by e-mail, my only expense is my time. 

In less than one week, I was starting to receive orders for 

REPORT #1. By January 13, I had received 26 orders for 

REPORT #1. Your goal is to "RECEIVE at least 20 ORDERS FOR 

REPORT #1 WITHIN 2 WEEKS. IF YOU DON'T, SEND OUT 

MORE PROGRAMS UNTIL YOU DO. 


My first step in making $50,000 in 90 days was done. By January 

30, I had received 196 orders for REPORT #2. Your goal is to 

"RECEIVE AT LEAST 100+ ORDERS FOR REPORT #2 WITHIN 

2 WEEKS. IF NOT, SEND OUT MORE PROGRAMS UNTIL YOU 

DO. ONCE YOU HAVE 100 ORDERS, THE REST IS EASY, 

RELAX, YOU WILL MAKE YOUR $50,000 GOAL." 


Well, I had 196 orders for REPORT #2. 96 more than I needed. 

So I sat back and relaxed. By March 1, of my e-mailing of 10,000, I 

received $58,000 with more coming in every day. I paid off ALL 

my debts and bought a much needed new car! 


Please take your time to read this plan, IT WILL CHANGE YOUR 

LIFE FOREVER$!!! Remember, it won't work if you don't try it. 


This program does work, but you must follow it EXACTLY! 

Especially the rules of not trying to place your name in a different 

place. It won't work and you'll lose out on a lot of 

money! In order ! for this program to work, you must meet your 

goal of 20+ orders for REPORT #1, and 100+ orders for 

REPORT #2 and you will make $50,000 or more in 90 days. 


I AM LIVING PROOF THAT IT WORKS!!! If you choose not to 

participate in this program, I am sorry. It really is a great 

opportunity with little cost or risk to you. If you choose to 

participate, follow the program and you will be on your way to 

financial security. If you are a fellow business owner and are in 

financial trouble like I was, or you want to start your own business, 

consider this a sign. I DID! $$ 

Sincerely, 

Johnathon Rourke 

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 

A PERSONAL NOTE FROM 

THE ORIGINATOR OF THIS PROGRAM: 


By the time you have read the enclosed program and reports, 

you should have concluded that such a program, and one that is 

legal, could not have been created by an amateur. Let me tell you 

a little about myself. I had a profitable business for 10 years. Then 

in 1979 my business began falling off. I was doing the same 

things that were previously successful for me, but it wasn't 

working. Finally, I figured it out. It wasn't me, it was the economy. 

Inflation and recession had replaced the stable economy that had 

been with us since 1945. 


I don't have to tell you what happened to the unemployment 

rate... because many of you know from first hand experience. 

There were more failures and bankruptcies than ever before. The 

middle class was vanishing. Those who knew what they were 

doing invested wisely and moved up. Those who did not, 

including those who never had anything to save or invest, were 

moving down into the ranks of the poor. As the saying goes, 

"THE RICH GET RICHER AND THE POOR GET POORER." The 

traditional methods of making money will never allow you to 

"move up" or "get rich", inflation will see to that. You have just 

received information that can give you financial freedom for the 

rest of your life, with "NO RISK" and "JUST A LITTLE BIT OF 

EFFORT." You can make more money in the next few months 

than you have ever imagined. I should also point out that I will not 

see a penny of this money, nor anyone else who has provided a 

testimonial for this program. 


I have retired from the program after sending thousands and 

thousands of programs. Follow the program EXACTLY AS 

INSTRUCTED. Do not change it in any way. It works exceedingly 

well as it is now. Remember to e-mail a copy of this exciting report 

to everyone you can think of. One of the people you send this to 

may send out 50,000...and your name will be on everyone of 

them! Remember though, the more you send out, the more 

potential customers you will reach. 


So my friend, I have given you the ideas, information, materials 

and opportunity to become financially independent. 


IT IS UP TO YOU NOW! DO IT ! 

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 

Before you delete this program from your in box, as I almost 

did, take a little time to read it and REALLY THINK ABOUT IT. Get 

a pencil and figure out what could happen when YOU participate. 

Figure out the worst possible response and no matter how you 

calculate it, you will still make a lot of money! You will definitely 

get back what you invested. Any doubts you have will vanish when 

your first orders come in. 

$$$ IT WORKS!!! $$$ 

Jody Jacobs Richmond, VA 

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 

HERE'S HOW THIS AMAZING PROGRAM WILL MAKE YOU 
THOUSANDS OF DOLLAR$$$$!!!! 

This method of raising capital REALLY WORKS 100% EVERY 

TIME. I am sure that you could use up to $50,000 or more in the 

next 90 days. Before you say "BULL... ", please read this 

program carefully. This is not a chain letter, but a perfectly legal 

money making business. 

As with all multi-level businesses, we build our business by 

recruiting new partners and selling our products. Every state in 

the USA allows you to recruit new multi-level business partners, 

and we sell and deliver a product for EVERY dollar received. YOUR 

ORDERS COME BY MAIL AND ARE FILLED BY E-MAIL, so you 

are not involved in personal selling. You do it privately in your 

own home, store or office. This is the EASIEST marketing plan anywhere! 

It is simply order filling by email! 

******************************************************************* 

The product is informational and instructional material, keys to the 

secrets for everyone on to open the doors to the magic world of 

E-COMMERCE , the information highway, the wave of the future ! 


PLAN SUMMARY: 

(1) You order the 4 reports listed below ($5 each) They come to 

you by email. 

(2) Save a copy of this entire letter and put your name after 

Report #1 and move the other names down. 

(3) Use any of the hundreds of bulk email services (search for 

"Bulk Email") and have them send 25,000 - 50,000 emails for you 

(about $49+) 

(4) Orders will come to you by postal mail - simply email them the 

Report they ordered. 

Let me ask you - isn't this about as easy as it gets? 

******************************************************************* 

By the way there are over 50 MILLION email addresses with 

millions more ! joining the internet each year so don't worry about 

"running out" or "saturation". People are used to seeing and 

hearing the same advertisements every day on radio/TV. How many 

times have you received the same pizza flyers on your door? Then 

one day you are hungry for pizza and you order one. Same thing 

with this letter. I received this letter many times - then one day I 

decided it was time to try it. 

******************************************************************* 

YOU CAN START TODAY - JUST DO THESE EASY STEPS: 

STEP #1. ORDER THE FOUR REPORTS 

Order the four reports shown on the list below (you can't sell 

them if you don't order them). -- For each report, send $5.00 

CASH, the NAME & NUMBER OF THE REPORT YOU ARE 

ORDERING, YOUR E-MAIL ADDRESS, and YOUR NAME & 

RETURN ADDRESS (in case of a problem) to the person 

whose name appears on the list next to the report. 

MAKE SURE YOUR RETURN ADDRESS IS ON YOUR 

ENVELOPE IN CASE OF ANY MAIL PROBLEMS! 

Within a few days you will receive, by e-mail, each of the four 

reports. Save them on your computer so you can send them to 

the 1,000's of people who will order them from you. 

STEP #2. ADD YOUR MAILING ADDRESS TO THIS LETTER 



a. Look below for the listing of the four reports. 

b. After you've ordered the four reports, delete the name and 

address under REPORT #4. This person has made it through the 

cycle. 

c. Move the name and address under REPORT #3 down to 

REPORT #4. 

d. Move the name and address under REPORT #2 down to 

REPORT #3. 

e. Move the name and address under REPORT #1 down to 

REPORT #2. 

f. Insert your name/address in the REPORT #1 position. 

Please make sure you COPY ALL INFORMATION, every name 

and address, ! ACCURATELY! 

STEP #3. Take this entire letter, including the modified list of 

names, and save it to your computer. Make NO changes to 

these instructions. Now you are ready to use this entire email to 

send by email to prospects. 

Report #1 will tell you how to download bulk email software and 

email addresses so you can send it out to thousands of people 

while you sleep! Remember that 50,000+ new people are joining 

the internet every month. 


Your cost to participate in this is practically nothing (surely you 

can afford $20 and initial bulk mailing cost). You obviously already 

have a computer and an Internet connection and e-mail is FREE! 

There are two primary methods of building your downline: 


METHOD #1: SENDING BULK E-MAIL Let's say that you decide 

to start small, just to see how it goes, and we'll assume you and all 

those involved email out only 2,000 programs each. Let's also 

assume that the mailing receives a 0.5% response. The 

response could be much better. Also, many people will email out 

hundreds of thousands of programs instead of 2,000 (Why stop 

at 2000?). But continuing with this example, you send out only 

2,000 programs. With a 0.5% response, that is only 10 orders for 

REPORT #1. Those 10 people respond by sending out 2,000 

programs each for a total of 20,000. Out of those 0..5%, 100 

people respond and order REPORT #2. Those 100 mail out 

2,000 programs each for a total of 200,000. The 0.5% response 

to that is 1,000 orders for REPORT #3. Those 1,000 send out 

2,000 programs each for a 2,000,000 total. The 0.5% response 

to that is 10,000 orders for REPORT #4. That's 10,000 $5 bills 

for you. CASH!!! 

Your total income in this example is $50 + $500 + $5,000 + 

$50,000 for a total of $55,550!! !! 


REMEMBER FRIEND, THIS IS ASSUMING 1,990 OUT OF THE 

2,000 PEOPLE YOU MAIL TO WILL DO ABSOLUTELY 

NOTHING AND TRASH THIS PROGRAM! 


DARE TO THINK FOR A MOMENT WHAT WOULD HAPPEN IF 

EVERYONE, OR HALF SENT OUT 100,000 PROGRAMS 

INSTEAD OF 2,000. Believe me, many people will do just that, 

and more! 


METHOD #2 - PLACING FREE ADS ON THE INTERNET 

Advertising on the internet is very, very inexpensive, and there 

are HUNDREDS of FREE places to advertise. Let's say you 

decide to start small just to see how well it works. Assume your 

goal is to get ONLY 10 people to participate on your first level. 

(Placing a lot of FREE ads on the Internet will EASILY get a larger 

response.) Also assume that everyone else in YOUR 

ORGANIZATION gets ONLY 10 downline members. Look how 

this small number accumulates to achieve the STAGGERING 

results below:! 


1st level--your first 10 send you $5................................$50 

2nd level--10 members from those 10 ($5 x 100).............$500 

3rd level--10 members from those 100 ($5 x 1,000)........$5,000 

4th level--10 members from those 1,000 ($5 x 10,000)..$50,000 

$$$$$$ THIS TOTALS ----------$55,550 $$$$$$ 

AMAZING ISN'T IT? Remember friends, this assumes that the 

people who participate only recruit 10 people each. Think for a 

moment what would happen if they got 20 people to participate! 

Most people get 100's of participants and many will continue to 

work this program, sending out programs WITH YOUR NAME ON 

THEM for years! THINK ABOUT IT! 

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 

People are going to get emails about this plan from you or 

somebody else and many will work this plan - the question is - 

Don't you want your name to be! on the emails they will send out? 


* * * DON'T MISS OUT!!! * * * JUST TRY IT ONCE!!! * * * 

* * SEE WHAT HAPPENS!!! *** YOU'LL BE AMAZED!!!* * 

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 

ALWAYS PROVIDE SAME-DAY SERVICE ON ALL ORDERS! 

This will guarantee that the e-mail THEY send out with YOUR 

name and address on it will be prompt because they can't 

advertise until they receive the report! 

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 

GET STARTED TODAY: PLACE YOUR ORDER FOR THE 

FOUR REPORTS NOW. 

Notes: -- ALWAYS SEND $5 CASH (U.S. CURRENCY) FOR 

EACH REPORT. CHECKS NOT ACCEPTED. Make sure the 

cash is concealed by wrapping it in two sheets of paper. On one 

of those sheets of paper write: (a) the number & name of the 

report you are ordering, (b) your e-mail address, and (c) your 

name & postal address. 

REPORT #1 
"The Insider's Guide to Advertising for Free on the Internet" 

ORDER REPORT #1 FROM: 

David Bowden
P.O.Box 1036
Lismore, N.S.W 2480
Australia


REPORT #2 

"The Insider's Guide to Sending Bulk E-mail on the Internet" 
ORDER REPORT #2 FROM: 

Richard Wright
P.O.Box 3206
Knoxville, TN 37927-3206 


REPORT #3 

"The Secrets to Multilevel Marketing on the Internet" 

ORDER REPORT #3 FROM: 

Suzie Davidson 
1319 Pegusus Trail 
St. Peters, MO 63376 



REPORT #4 

"How to become a Millionaire utilizing the Power of Multilevel 
Marketing and the Internet" 

ORDER REPORT #4 FROM: 

G.B. Scott 
P.O. Box 181 
Chanute, KS 66720 


******* TIPS FOR SUCCESS ******* 

TREAT THIS AS YOUR BUSINESS! Be prompt, professional, 

and follow the directions accurately. -- Send for the four reports 

IMMEDIATELY so you will have them when the orders start 

coming in because: 

When you receive a $5 order, you MUST send out the requested 

product/report. It is required for this to be a legal business and 

they need the reports to send out their letters (with your name on 

them!) -- ALWAYS PROVIDE SAME-DAY SERVICE ON THE 

ORDERS YOU RECEIVE. -- Be patient and persistent with this 

program - If you follow the instructions exactly - results WILL 

follow. $$$$ 

******* YOUR SUCCESS GUIDELINES ******* 

Follow these guidelines to guarantee your success: If you don't 

receive 20 orders for REPORT #1 within two weeks, continue 

advertising or sending e-mails until you do. Then, a couple of 

weeks later you should receive at least 100 orders for 

REPORT#2. If you don't, continue advertising or sending e-mails 

until you do. Once you have received 100 or more orders for 

REPORT #2, YOU CAN RELAX, because the system is already working 

for you, and the cash will continue to roll in! 

THIS IS IMPORTANT TO REMEMBER: Every time your name is 

moved down on the list, you are placed in front of a DIFFERENT 

report. You can KEEP TRACK of your PROGRESS by watching 

which report people are ordering from you. To generate more 

income, simply send another batch of e-mails or continue placing 

ads and start the whole process again! There is no limit to the 

income you will generate from this business! 

Before you make your decision as to whether or not you 

participate in this program. Please answer one question. 


ARE YOU HAPPY WITH YOUR PRESENT INCOME OR JOB? 

If the answer is no, then please look at the following facts about 

this super simple MLM program: 

1. NO face to face selling, NO meetings, NO inventory! 

NO Telephone calls, NO big cost to start!, Nothing to learn, 

NO skills needed! (Surely you know how to send email?) 

2. No equipment to buy - you already have a computer and 

internet connection - so you have everything you need to fill 

orders! 

3. You are selling a product which does NOT COST 

ANYTHING TO PRODUCE OR SHIP! 

(Emailing copies of the reports is FREE!) 

4. All of your customers pay you in CA$$H! 

This program will change your LIFE FOREVER!! Look at the 

potential for you to be able to quit your job and live a life of luxury 

you could only dream about! Imagine getting out of debt and 

buying the car and home of your dreams and being able to work 

a super-high paying leisurely easy business from home! 


$$$ FINALLY MAKE SOME DREAMS COME TRUE! $$$ 

ACT NOW! Take your first step toward achieving financial 

independence. Order the reports and follow the program 

outlined above -- SUCCESS will be your reward. 

Thank you for your time and consideration. 

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 

PLEASE NOTE: If you need help with starting a business, 
registering a business name, learning how income tax is handled, 
etc., contact your local office of the Small Business 
Administration (a Federal Agency)1-800-827-5722 for free help 

*************************************************
This is a one time mailing so there is no need to reply to
be removed.  You will not recieve any further emails.
Thankyou.






From list@netscape.com  Sat Nov 18 00:24:00 2000
Received: from netscape.com (h-205-217-237-46.netscape.com [205.217.237.46])
	by ietf.org (8.9.1a/8.9.1a) with SMTP id AAA21862
	for <ldapext-archive@odin.ietf.org>; Sat, 18 Nov 2000 00:23:59 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.10.0/8.10.0) with ESMTP id eAI5A2s28883;
	Fri, 17 Nov 2000 21:10:02 -0800 (PST)
Received: (from list@localhost)
	by aka.mcom.com (8.10.0/8.10.0) id eAI5MRo04232;
	Fri, 17 Nov 2000 21:22:27 -0800 (PST)
Resent-Date: Fri, 17 Nov 2000 21:22:27 -0800 (PST)
Date: Fri, 17 Nov 2000 21:21:53 -0800 (PST)
Message-Id: <200011180521.eAI5LWR10320@xwing.netscape.com>
From: Joyful<urmoney@SUTT.quickmail.com>
To: wanmon.JKFX@netscape.com
Subject:  I'm Joyful! Join me? -IOAP
X-Reply-To:  Joyful<retirementor@yahoo.com> 
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: 7bit
Resent-Message-ID: <"BUIsPD.A.tBB.RIhF6"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com
Content-Transfer-Encoding: 7bit

Hello: I'm Joyful! This really works! And it's FREE
To join! I've been getting several notifications of new
people signing up each and every day.  You can too!
I was sent this recently and it sounded interesting so 
I thought I would check it out. Would YOU like to make 
$17,000 in just a few weeks? I know what you're thinking, 
"Yeah, right. I've heard that before!". Well try this! It 
does not cost you one cent. As a matter of fact, you get 
paid $10.00 just for signing up (no strings attached). With 
a small amount of effort, you can make $17,000 in a matter
of weeks! How, you ask? All you need to do is find
three other's who would also join for FREE and they
get paid $10.00 just like you did! Simple huh!

Calculation of Earnings 

Your own sign up $10.00 

First Level 27 x 0.40 = $10.80 

Second Level 729 x 0.20 = $145.80 

Third Level 19683 x 0.05 $984.15 

Fourth Level 531441 x 0.03 = $15943.23 

Total Potential Earnings $17093.97 

Cost to you - NIL 

Send me a blank email with "Show Me" in the
subject and I will send all the info!

Go ahead, do it now! I'm nice!
I'm Joyful!
retirementor@yahoo.com 




This message is sent in compliance of the new e-mail bill: 
Senate bill 1618, Title 3, section 301.
TO BE REMOVED FROM THE MAILING LIST
And to ensure you do not recieve further transmissions to you 
by the sender of this email PRESS REPLY AND PUT 
the Subject REMOVE 

ALL REMOVES TO THIS ADDRESS WILL BE HONORED
pleaseremove1@netscape.net  ?subject=Remove
Please do not send removes to the interested address as
you may end up receiving the information.




From list@netscape.com  Sat Nov 18 08:50:12 2000
Received: from netscape.com (h-205-217-237-47.netscape.com [205.217.237.47])
	by ietf.org (8.9.1a/8.9.1a) with SMTP id IAA08337
	for <ldapext-archive@odin.ietf.org>; Sat, 18 Nov 2000 08:50:11 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.10.0/8.10.0) with ESMTP id eAIDelD11932;
	Sat, 18 Nov 2000 05:40:51 -0800 (PST)
Received: (from list@localhost)
	by aka.mcom.com (8.10.0/8.10.0) id eAIDmRg00024;
	Sat, 18 Nov 2000 05:48:27 -0800 (PST)
Resent-Date: Sat, 18 Nov 2000 05:48:27 -0800 (PST)
Content-Type: text/plain
Content-Disposition: inline
Mime-Version: 1.0
X-Mailer: MIME-tools 4.104 (Entity 4.117)
Date: Sat, 18 Nov 2000 05:48:10 -0800 (PST)
From: E R <extraincomeseeker15@adfront.com>
To: extraincomeseeker15@adfront.com
Subject: #1 Great Home Internet Income
Reply-To: extraincomeseeker15@adfront.com
X-Originating-Ip: [128.100.240.245]
Message-Id: <20001118134810.9AB192740@sitemail.everyone.net>
Resent-Message-ID: <"YFhnrB.A.sUH.qioF6"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com

Dear Friend:

"Making over half million dollars every 4 to 5 months from your
home for an investment of only $25 U.S. Dollars expense one
time"

THANKS TO THE COMPUTER AGE AND THE INTERNET!
===============================================

BE A MILLIONAIRE LIKE OTHERS WITHIN A YEAR !!

Before you say "Bull" , please read the following. This is the
letter you have been hearing about on the news lately. Due to the
popularity of this letter on the internet, a national weekly news
program recently devoted an entire show to the investigation of
this program described below , to see if it really can make people
money.

The show also investigated whether or not the program was legal.
Their findings proved once and for all that there are "absolutely
no laws prohibiting the participation in the program and if people
can follow the simple instructions, they are bound to make
some mega bucks with only $25 out of pocket cost".

DUE TO THE RECENT INCREASE OF POPULARITY & RESPECT
THIS PROGRAM HAS ATTAINED, IT IS CURRENTLY WORKING
BETTER THAN EVER.

This is what one had to say:

"Thanks to this profitable opportunity. I was approached
many times before but each time I passed on it. I am so glad
I finally joined just to see what one could expect in return
for the minimal effort and money required. To my astonishment, I
received total $ 610,470.00 in 21 weeks, with money still
coming in".
Pam Hedland, Fort Lee, New Jersey.

-------------------------------------------------------------------------

Here is another testimonial:

"This program has been around for a long time but I never
believed in it. But one day when I received this again in
the mail I decided to gamble my $25 on it. I followed the
simple instructions and walaa ..... 3 weeks later the money
started to come in. First month I only made $240.00 but
the next 2 months after that I made a total of $290,000.00.
So far, in the past 8 months by re-entering the program,I
have made over $710,000.00 and I am playing it again.
The key to success in this program is to follow the simple
steps and NOT change anything ."

More testimonials later but first,

****** PRINT THIS NOW FOR YOUR FUTURE REFERENCE *******

$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
If you would like to make at least $500,000 every 4 to 5 months
easily and comfortably, please read the following...THEN READ
IT AGAIN and AGAIN !!!
$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$

FOLLOW THE SIMPLE INSTRUCTION BELOW AND YOUR
FINANCIAL DREAMS WILL COME TRUE, GUARANTEED!

INSTRUCTIONS:

**** Order all 5 reports shown on the list below.

**** For each report, send $5 CASH, THE NAME & NUMBER OF THE
REPORT YOU ARE ORDERING and YOUR E-MAIL ADDRESS
to the person whose name appears ON THAT LIST next to the report.
MAKE SURE YOUR RETURN ADDRESS IS ON YOUR ENVELOPE
TOP LEFT CORNER in case of any mail problems.

**** When you place your order, make sure you order each of the 5
reports. You will need all 5 reports so that you can save them on your computer and resell them. YOUR TOTAL COST $5 X 5 = $25.00.

**** Within a few days you will receive, via e-mail, each of the 5
reports from these 5 different individuals. Save them on your computer
so they will be accessible for you to send to the 1,000's of people
who will order them from you. Also make a floppy of these
reports and keep it on your desk in case something happen to your
computer.

****.IMPORTANT - DO NOT alter the names of the people who are
listed next to each report, or their sequence on the list, in
any way other than what is instructed below in steps 1 through
6 or you will loose out on majority of your profits. Once you
understand the way this works, you will also see how it does not work if you change it.

Remember, this method has been tested, and if you alter, it
will NOT work!!! People have tried to put their friends/relatives names
on all five thinking they could get all the money. But it does not work this way. Believe us, we all have tried to be greedy and then nothing happened. So Do Not try to change anything other than what is instructed. Because if you do, it will not work for you. Remember, honesty reaps the reward!!!

1.. After you have ordered all 5 reports, take this advertisement
and REMOVE the name & address of the person in REPORT # 5. This
person has made it through the cycle and is no doubt counting
their fortune.

2.... Move the name & address in REPORT # 4 down TO REPORT # 5.

3.... Move the name & address in REPORT # 3 down TO REPORT # 4.

4.... Move the name & address in REPORT # 2 down TO REPORT # 3.

5.... Move the name & address in REPORT # 1 down TO REPORT # 2

6.... Insert YOUR name & address in the REPORT # 1 Position.

PLEASE MAKE SURE you copy every name & address ACCURATELY !
=========================================================

Take this entire letter, with the modified list of names, and save
it on your computer. DO NOT MAKE ANY OTHER CHANGES.
Save this on a disk as well just in case if you loose any data.

To assist you with marketing your business on the internet, the
5 reports you purchase will provide you with invaluable
marketing information which includes how to send bulk e-mails legally,
where to find thousands of free classified ads and much more.

There are 2 Primary methods to get this venture going:

METHOD # 1 : BY SENDING BULK E-MAIL LEGALLY
============================================
let's say that you decide to start small, just to see how it
goes, and we will assume You and those involved send out only
5,000 e-mails each. Let's also assume that the mailing receive only a
0.2% response (the response could be much better but lets just
say it is only 0.2% . Also many people will send out hundreds of
thousands e-mails instead of only 5,000 each).

Continuing with this example, you send out only 5,000 e-mails.
With a 0.2% response, that is only 10 orders for report # 1.
Those 10 people responded by sending out 5,000 e-mail
each for a total of 50,000. Out of those 50,000 e-mails only
0.2% responded with orders. That's = 100 people responded
and ordered Report # 2. Those 100 people mail out 5,000
e-mails each for a total of 500,000 e-mails. The 0.2% response
to that is 1000 orders for Report # 3. Those 1000 people send
out 5,000 e-mails each for a total of 5 million e-mails sent out.
The 0.2% response to that is 10,000 orders for Report # 4.
Those 10,000 people send out 5,000 e-mails each for a total of
50,000,000 (50 million) e-mails. The 0.2% response to that is
100,000 orders for Report # 5.

THAT'S 100,000 ORDERS TIMES $5 EACH = $500,000.00 (half million).

Your total income in this example is:
1..... $50 +
2..... $500 +
3..... $5,000 +
4..... $50,000 +
5..... $500,000 ......... Grand Total = $555,550.00

NUMBERS DO NOT LIE. GET A PENCIL & PAPER AND FIGURE
OUT THE WORST POSSIBLE RESPONSES AND NO MATTER
HOW YOU CALCULATE IT, YOU WILL STILL MAKE A LOT OF
MONEY !

------------------------------------------------------------------------------

REMEMBER FRIEND, THIS IS ASSUMING ONLY 10 PEOPLE
ORDERING OUT OF 5,000 YOU MAILED TO. Dare to think for
a moment what would happen if everyone, or half or even one 4th
of those people mailed 100,000 e-mails each or more? There are
over 250 million people on the internet worldwide and counting.
Believe me, many people will do just that, and more!

METHOD # 2 : BY PLACING FREE ADS ON THE INTERNET
===================================================
Advertising on the net is very very inexpensive and there are
hundreds of FREE places to advertise. Placing a lot of free ads
on the internet will easily get a larger response. We strongly
suggest you start with Method # 1 and add METHOD # 2 as you go
along.

For every $5 you receive, all you must do is e-mail them the Report
they ordered. That's it . Always provide same day service on all
orders. This will guarantee that the e-mail they send out, with your
name and address on it, will be prompt because they can not advertise until they receive the report.

_____________________ AVAILABLE REPORTS_____________________

ORDER EACH REPORT BY ITS NUMBER & NAME ONLY.

Notes: Always send $5 cash (U.S. CURRENCY) for each Report.
Checks NOT accepted. Make sure the cash is concealed by wrapping
it in at least 2 sheets of paper. On one of those sheets of paper,
Write the NUMBER & the NAME of the Report you are ordering, YOUR
E-MAIL ADDRESS and your name and postal address.

PLACE YOUR ORDER FOR THESE REPORTS NOW :
==============================================
REPORT #1, "The Insider's Guide to Sending
Bulk E-mail on the Internet"
ORDER REPORT #1 FROM:

E.L. Rix
138 Dundas Street West, #243
Toronto, Ontario
Canada, M5G 1C3

don't forget to provide a permanent e-mail address in clear writing (better typed) to receive the reports. We had problems in delivery e-mails before!!!
==============================================
REPORT #2 "The Insider's Guide to Advertising for Free on the
Internet"
ORDER REPORT #2 FROM:

Yan Wen
25 Elm Street, #907
Toronto, Ontario
Canada M5G 2G5 
==============================================
REPORT #3 "The Secrets to Multilevel Marketing on the Internet"
ORDER REPORT #3 FROM:

John Lutheran
PO Box 33555
San Diego, CA 92163-3555
USA
==============================================
REPORT #4 "How to become a Millionaire utilizing the Power of
Multilevel Marketing and the Internet"
ORDER REPORT #4 FROM:

Trumpeter Productions
4105 Tujunga Ave #6
Studio City CA 91604
USA
==============================================
REPORT #5 "How to SEND 1,000,000 e-mails for FREE"
ORDER REPORT #5 FROM:

Liquid INC
210 Hemlock Drive
North Wales PA 19454
USA
==============================================
There are currently more than 250,000,000 people online
worldwide!

$$$$$$$$$ YOUR SUCCESS GUIDELINES $$$$$$$$$$$

Follow these guidelines to guarantee your success:

If you do not receive at least 10 orders for Report #1 within 2
weeks, continue sending e-mails until you do.

After you have received 10 orders, 2 to 3 weeks after that
you should receive 100 orders or more for REPORT # 2.
If you did not, continue advertising or sending e-mails until
you do.

Once you have received 100 or more orders for Report # 2,
YOU CAN RELAX, because the system is already working for
you , and the cash will continue to roll in !

THIS IS IMPORTANT TO REMEMBER : Every time your name is
moved down on the list, you are placed in front of a different report.
You can KEEP TRACK of your PROGRESS by watching which
report people are ordering from you. IF YOU WANT TO GENERATE
MORE INCOME SEND ANOTHER BATCH OF E-MAILS AND
START THE WHOLE PROCESS AGAIN. There is NO LIMIT to
the income you can generate from this business !!!
____________________________________________________

FOLLOWING IS A NOTE FROM THE ORIGINATOR OF THIS
PROGRAM:

You have just received information that can give you financial
freedom for the rest of your life, with NO RISK and JUST A
LITTLE BIT OF EFFORT. You can make more money in the
next few weeks and months than you have ever imagined.

Follow the program EXACTLY AS INSTRUCTED. Do Not change
it in any way. It works exceedingly well as it is now.
Remember to e-mail a copy of this exciting report after you
have put your name and address in Report #1 and moved others to
#2...........# 5 as instructed above. One of the people you send this to may send out 100,000 or more e-mails and your name will be on everyone of them. Remember though, the more you send out the more potential customers you will reach.

So my friend, I have given you the ideas, information,
materials and opportunity to become financially independent. IT IS UP TO YOU NOW !

************** MORE TESTIMONIALS ****************

"My name is Mitchell. My wife , Jody and I live in Chicago.
I am an accountant with a major U.S. Corporation and I
make pretty good money. When I received this program I grumbled
to Jody about receiving ''junk mail''. I made fun of the
whole thing, spouting my knowledge of the population and
percentages involved. I ''knew'' it wouldn't work. Jody
totally ignored my supposed intelligence and few days later she jumped in with both feet. I made merciless fun of her, and was ready to
lay the old ''I told you so'' on her when the thing didn't
work. Well, the laugh was on me! Within 3 weeks she had received
50 responses. Within the next 45 days she had received a
total of $ 147,200.00 all cash! I was shocked. I have
joined Jody in her ''hobby''."
Mitchell Wolf,
Chicago, Illinois

------------------------------------------------------------

"Not being the gambling type, it took me several weeks to
make up my mind to participate in this plan. But conservative that
I am, I decided that the initial investment was so little
that there was just no way that I wouldn't get enough orders to at
least get my money back.

I was surprised when I found my medium size post office box
crammed with orders. I made $319,210.00 in the first 12
weeks. The nice thing about this deal is that it does not matter
where people live. There simply isn't a better investment
with a faster return and so big."
Dan Sondstrom, Alberta,
Canada

-----------------------------------------------------------

"I had received this program before. I deleted it, but
later I wondered if I should have given it a try. Of course, I had
no idea who to contact to get another copy, so I had to wait
until I was e-mailed again by someone else.........11 months
passed then it luckily came again...... I did not delete this
one! I made more than $490,000 on my first try and all the
money came within 22 weeks".
Susan De Suza,
New York, N.Y.

----------------------------------------------------

"It really is a great opportunity to make relatively easy
money with little cost to you. I followed the simple
instructions carefully and within 10 days the money
started to come in. My first month I made $ 20,560.00
and by the end of third month my total cash count was
$ 362,840.00. Life is beautiful, Thanx to internet".
Fred Dellaca, Westport,
New Zealand

------------------------------------------------------------


ORDER YOUR REPORTS TODAY AND GET STARTED ON
YOUR ROAD TO FINANCIAL FREEDOM !

=======================================================

If you have any questions of the legality of this program, contact the
Office of Associate Director for Marketing Practices, Federal Trade
Commission, Bureau of Consumer Protection, Washington, D.C.


Under Bill s.1618 TITLE III passed by the 105th US Congress this
letter cannot be considered spam as long as the sender includes
contact information and a method of removal.
This is one time e-mail transmission. No request for removal is
necessary.

------------------------------------------------------------
This message is sent in compliance of the new email
Bill HR 1910. Under Bill HR 1910 passed by the 106th
US Congress on May 24, 1999, this message cannot be
considered Spam as long as we include the way to be
removed. Per Section HR 1910, Please type "REMOVE" in
the subject line and reply to this email. All removal
requests are handled personally an immediately once
received.
-------------------------------------------------------------------------------------------------------------


_____________________________________________________________
Get your Free email today from Adfront.com Classifieds
--> http://mail.adfront.com



From list@netscape.com  Sun Nov 19 12:58:13 2000
Received: from netscape.com (h-205-217-237-47.netscape.com [205.217.237.47])
	by ietf.org (8.9.1a/8.9.1a) with SMTP id MAA11489
	for <ldapext-archive@odin.ietf.org>; Sun, 19 Nov 2000 12:58:13 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.10.0/8.10.0) with ESMTP id eAJHmpD08540;
	Sun, 19 Nov 2000 09:48:51 -0800 (PST)
Received: (from list@localhost)
	by aka.mcom.com (8.10.0/8.10.0) id eAJHuXI22525;
	Sun, 19 Nov 2000 09:56:33 -0800 (PST)
Resent-Date: Sun, 19 Nov 2000 09:56:33 -0800 (PST)
Message-ID: <X1ompaRSZpQM7+.Yc17QhPeqsMkQzo@msn.com>
From: "rnai1er@flashmail.com" <rnai1er@flashmail.com>
Reply-To: rnai1er@flashmail.com
Subject: Earn $338,628.00 per Year  NO Work Required!
Date: Sun, 19 Nov 2000 12:53:51 -0400 (EDT)
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset="US-ASCII"
Content-Transfer-Encoding: 7bit
Resent-Message-ID: <"tCaN3C.A.kfF.PRBG6"@glacier>
To: ietf-ldapext@netscape.com
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com
Content-Transfer-Encoding: 7bit

Welcome to the World's EASIEST Business!

Forget everything you ever heard or seen before about 
making money on the Net! 

A newly developed cash generating system can pay you
$338,628.00 a year, and you don't have to do ANY work 
whatsoever!

This highly profitable cash generating system blows 
away all traditional methods of making money Online!

No matter who you are, or where you live, you can cash 
in BIG with this NEW, Completely Automated, Wealth 
Building Opportunity!

If you are really serious about making money, come to 
the site NOW!

http://8rn.8m.com





This message is sent in compliance of the new email
Bill HR 1910. Under Bill HR 1910 passed by the 106th
US Congress on May 24, 1999, this message cannot be
considered SPAM as long as we include the way to be
removed. Per Section HR 1910, Please type "REMOVE" in
the subject line and reply to this email. All removal 
requests are handled automatically by our software.
No person will ever see your request.




From list@netscape.com  Mon Nov 20 01:58:29 2000
Received: from netscape.com (h-205-217-237-46.netscape.com [205.217.237.46])
	by ietf.org (8.9.1a/8.9.1a) with SMTP id BAA25091
	for <ldapext-archive@odin.ietf.org>; Mon, 20 Nov 2000 01:58:29 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.10.0/8.10.0) with ESMTP id eAK6iTs13452;
	Sun, 19 Nov 2000 22:44:29 -0800 (PST)
Received: (from list@localhost)
	by aka.mcom.com (8.10.0/8.10.0) id eAK6uxw02219;
	Sun, 19 Nov 2000 22:56:59 -0800 (PST)
Resent-Date: Sun, 19 Nov 2000 22:56:59 -0800 (PST)
From: <portfolio_builder@yahoo.com>
Subject: test
Date: Mon, 20 Nov 2000 01:57:21
Message-Id: <570.126889.53779@yahoo.com>
Reply-To: portfolio_add@yahoo.com
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Resent-Message-ID: <"48SOHC.A.dh.4sMG6"@glacier>
To: ietf-ldapext@netscape.com
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com


THE DOUBLER  -  
NEW BUY OPINION: European American Resources, Inc. 
Symbol: EPAR (OTCBB)
Recent Price - $.375 52 Week Range - $.21875 - $1.6875 
Estimated Float - 5.9 Million Shares Outstanding -
16.2 Million Shares 

Gold mining stocks have been a neglected group during
this great Bull Market.  Many financial advisors
suggest putting a small percentage of a portfolio
(3-10%) into precious metals as a hedge against
inflation.  With oil prices hitting multi-year highs,
we are advising purchase of European American
Resources (EPAR), currently trading near the low for
the year.

EPAR'S largest property in Nevada is located
right between two successful gold mines operated by
Homestake Mining (HM-NYSE-5 5/8), one of the top gold
companies in North America.  EPAR recently agreed to a
joint venture with HM, where Homestake is financing
100% of the drilling costs.  If the digging is
promising, European American could be a takeover
candidate at a high multiple to the current price.  In
fact, HM has acquired three of the last five companies
that they entered into similar joint ventures with. 
Also, Nevada is known as one of the lowest-cost areas
to mine gold, and EPAR'S Prospect Mountain property is
right next door to HM'S Ruby Hill, which runs at a
rock bottom cost of $64 per ounce to mine gold.

Our philosophy is to buy stocks with the potential of
doubling over a short-term period.  After they reach
the doubling point, we advise selling half of your
position, so the remaining shares are in your
portfolio on a "FREE" basis.  We recommend buying EPAR
at any price up to $1.50 per share.

DISCLAIMER: 
The Doubler has received a fee of 5000 shares of
European American Resources, Inc. 
common stock for the writing and distribution of this
report. The Doubler and/or 
its affiliates currently own shares of EPAR, and may
buy or sell shares at any 
time after the dissemination of this report. Because
the publisher owns this stock, there may be a conflict
of interest in The Doubler's statements and opinions. The 
Doubler is not a registered investment advisor,
broker or dealer. Purchase of this 
stock may be considered speculative, and may result in
the loss of some or all of any investment made. 


If you would like to be included in our mailing list to receive information regarding possible stock possibilites, e-mail us at portfolio_add@yahoo.com or print out this letter, fill in the blanks and fax us at (727) 942-0341.


Name_________________

E-mail Address ________________

Telephone Number: (     )___ - _____

If you would like to be removed from our mailing list, please e-mail us at portfolio_delete@yahoo.com



From list@netscape.com  Mon Nov 20 02:23:05 2000
Received: from netscape.com (h-205-217-237-46.netscape.com [205.217.237.46])
	by ietf.org (8.9.1a/8.9.1a) with SMTP id CAA02437
	for <ldapext-archive@odin.ietf.org>; Mon, 20 Nov 2000 02:23:00 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.10.0/8.10.0) with ESMTP id eAK78vs15253;
	Sun, 19 Nov 2000 23:08:58 -0800 (PST)
Received: (from list@localhost)
	by aka.mcom.com (8.10.0/8.10.0) id eAK7LRA08124;
	Sun, 19 Nov 2000 23:21:27 -0800 (PST)
Resent-Date: Sun, 19 Nov 2000 23:21:27 -0800 (PST)
Date: Mon, 20 Nov 2000 14:54:57 +0800
From: Home-Biz-Option@china.com
Message-Id: <200011200654.OAA26399@ywii.com>
Reply-To: Home-Biz-Option@china.com
To: Home-Biz-Option@china.com
Subject: Int'l Company Has Selected You
Resent-Message-ID: <"7YaGX.A.l-B.2DNG6"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com

Dear Internet User,

We are e-Market, Inc. an International eCommerce marketing
company conducting a "head-hunter" search on behalf of an
International enterprise. 

Our client is a multi-billion dollar company operating in
50 countries and is currently in need of individuals to
train in the areas of retail, management, and marketing.
All candidates who are selected must own/lease a computer 
or WebTV and wish to work either part or full time online 
from home.

Based on key demographics, you have been selected to
receive this notification to be part of this International
search. Our two step process will enable you to determine
if this opportunity is right for you. Your training begins
by simply taking the survey and deciding to continue.
 
Once you decide to start you will be taught how to...

   • Own & Operate your own e-commerce business from home
     via the Internet
   • Plug into the fastest growing industry in the world
   • Market just under 200 top quality products
   • Receive an unlimited source of consumers/customers
   • Samples of our products
   • Product training video
   • Business Plan video

Your training will also incorporate how to process orders
for these high quality products in a way that is very
unique to this industry. No selling or soliciting is
required. All this and much much more will be available to
you so you can start making money right away.

Please note that you will need to work a minimum of
5 to 10 hours per week in order to get paid.

If you wish to participate in our survey and interview
process, please email us at hr_dept_box@hongkong.com. Make
sure you copy and paste these exact words into the Subject
line of the email header:

                    OPTIN

Then email it to  hr_dept_box@hongkong.com

Also tell us...
     • Your name
     • Phone number
     • Best time to call
     • State
     • Country

We will contact you within 24-48 hours to provide
information regarding this unique opportunity.

If you act now and are one of the first 1000 respondents
selected from our survey you will receive a two page web
site FREE! These pages are valued at $19.95 per month and
will be made available for your use the very first day. 
So Act NOW! 

AND Email us at:  hr_dept_box@hongkong.com

In closing, if this is not something you are interested in
pursuing but believe someone you care about might be then
please forward this email to them.

Thank you for your attention!
___________________________________________________________

To be removed from this list simply send an email to 
         hr_dept_box@hongkong.com
with the word REMOVE in the subject line.
We honor all removal requests!!!
___________________________________________________________




From list@netscape.com  Mon Nov 20 05:07:03 2000
Received: from netscape.com (h-205-217-237-46.netscape.com [205.217.237.46])
	by ietf.org (8.9.1a/8.9.1a) with SMTP id FAA03491
	for <ldapext-archive@odin.ietf.org>; Mon, 20 Nov 2000 05:07:02 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.10.0/8.10.0) with ESMTP id eAK9qxs02346;
	Mon, 20 Nov 2000 01:52:59 -0800 (PST)
Received: (from list@localhost)
	by aka.mcom.com (8.10.0/8.10.0) id eAKA5Uo14226;
	Mon, 20 Nov 2000 02:05:30 -0800 (PST)
Resent-Date: Mon, 20 Nov 2000 02:05:30 -0800 (PST)
From: sdcv5@aol.com
Message-Id: <200011200955.SAA07166@home.panworldnet.com>
To: hjmn8@aol.com
Subject: Finally We Have Your Solution
Date: Mon, 20 Nov 00 05:00:53 Eastern Standard Time
Reply-To: sdcv5@aol.com
X-Priority: 3
X-MSMailPriority: Normal
Importance: Normal
MIME-Version: 1.0
Content-Type: multipart/mixed;
	boundary="----=_NextPart_000_018C_01BD9940.715D52A0"
Resent-Message-ID: <"JeFm8B.A.gdD.odPG6"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com

This is a multi-part message in MIME format.

------=_NextPart_000_018C_01BD9940.715D52A0
Content-Type: text/html;

<HTML>
<BODY>

<FONT face="MS Sans Serif">
<FONT size=2>              FINALLY WE HAVE YOUR SOLUTION!<BR>
           WE BUILD YOUR DOWNLINE FOR YOU!<BR>
  <BR>
Greetings,<BR>
      I hope all is well! I know you have seen many MLM,<BR>
Network Marketing, and Home Based Business programs to last<BR>
you a lifetime, and I know some of them work very well.<BR>
However, my biggest objection is the high cost of promoting<BR>
these programs. To make any REAL money you have to mail 1000<BR>
to 2000 Letters and I know most of us out there just can't<BR>
afford to do that.<BR>
The cost of stamps alone would be over $600.00 not to<BR>
mention printing cost, envelopes and a good list of names.<BR>
This whole concept is sound but just too expensive for me,<BR>
not to mention,<BR>
VERY time consuming and I just don't have that kind of time!<BR>
<BR>
However, what if I could offer you a company that offered<BR>
ALL the advantages of a Forced Matrix Program WITHOUT all<BR>
the costs and work? Well it's here!<BR>
THE GIFTING SOLUTION! This company does ALL OF THE PROMOTING<BR>
FOR YOU, and as people join they place them into YOUR<BR>
downline. You don't have to do any mailings of any kind to<BR>
build your downline, because THEY WILL DO IT FOR YOU!<BR>
<BR>
You are not required to mail anything and I have found that<BR>
it is very easy to get people excited about THE GIFTING<BR>
SOLUTION, since they eliminate ALL of the recruiting<BR>
obstacles.<BR>
<BR>
Now you may be wondering if they do all of the promoting,<BR>
WHY am I sending you this letter? Well that is a very fair<BR>
question. I have chosen to promote this because I believe in<BR>
its capability for others and have found I am receiving an<BR>
overwhelming response. However, YOU ARE NOT REQUIRED to mail<BR>
anything, but that option is yours!<BR>
<BR>
This is an outstanding opportunity that I have placed in<BR>
front of you and I encourage you to give it your full<BR>
consideration. For more information and/or for an<BR>
application, pull up our 4 page fax on demand at (403)<BR>
934-6061 you will then enter ID- 197605 #<BR>
(You may have to enter 197605 # again IF you receive an<BR>
error msg.) /or send a<BR>
 S. A. S. E. along with your request for further information<BR>
to, T. G.  Solution,<BR>
Attention C. Rios, P. O.  Box 11756, Tucson, AZ, 85734.<BR>
<BR>
<BR>
Sincerely, C. Rios<BR>
<BR>
PS Many HEAVY HITTERS are taking a strong look at<BR>
       The Gifting Solution. Join NOW before they do!!!<BR>
<BR>
<BR>
Should you have any further questions AFTER pulling up our<BR>
fax on demand, then please feel free to give me a call at<BR>
(520) 578-7631-MST.<BR>
<BR>
<BR>
</FONT></FONT></BODY></HTML>


------=_NextPart_000_018C_01BD9940.715D52A0--


From list@netscape.com  Tue Nov 21 02:00:47 2000
Received: from netscape.com (h-205-217-237-47.netscape.com [205.217.237.47])
	by ietf.org (8.9.1a/8.9.1a) with SMTP id CAA28141
	for <ldapext-archive@odin.ietf.org>; Tue, 21 Nov 2000 02:00:42 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.10.0/8.10.0) with ESMTP id eAL6pPD11249;
	Mon, 20 Nov 2000 22:51:25 -0800 (PST)
Received: (from list@localhost)
	by aka.mcom.com (8.10.0/8.10.0) id eAL6xBA04320;
	Mon, 20 Nov 2000 22:59:11 -0800 (PST)
Resent-Date: Mon, 20 Nov 2000 22:59:11 -0800 (PST)
Message-Id: <200011210659.eAL6wvR15780@xwing.netscape.com>
X-Sender: greatopportunties2000@yahoo.com
From: "FREE ISP, no banners or bars!!!!" <greatopportunties2000@yahoo.com>
To: "8 of 50000" <greatopportunties2000@yahoo.com>
Date: Mon, 20 Nov 2000 23:58:30 -0700
Subject: This opportunity is ROCKING THE INTERNET!!!!
Reply-To: dollyg@micron.net
MIME-Version: 1.0
Content-Type: text/plain; charset=iso-8859-1
Content-Transfer-Encoding: 7bit
X-Priority: 1
X-SMTP-HELO: localhost
X-SMTP-MAIL-FROM: greatopportunties2000@yahoo.com
X-SMTP-PEER-INFO: cboi061p11.boi.micron.net [206.80.120.29]
Resent-Message-ID: <"WJqjyC.A.7CB.90hG6"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com
Content-Transfer-Encoding: 7bit

Hi, 
Have you considered your own internet business???  Here is a sure winner.  It 
is a FREE ISP with no banners or Bars!!!  Did you realize that every time you 
get on the internet you generate income for the ISP???  Well this company is 
paying that income back to the membersof the company.  Not only the income that 
you generate but the income that all your referrals create by their usage.   
Plus they pay you a commission for all of your referrals!!!  For a short time 
there are two ways to get in.  You can join for free and get 10 referrals to 
go BRONZE (you need to go BRONZE before you can receive commissions) or you can 
pay a very small fee of $25 to go BRONZE.  

This Company is going to LAUNCH the first of DECEMBER and then the option to 
pay $25 to Go BRONZE is gone, you will only be able to join for FREE.  After 
the company launches the first of DECEMBER they are going to launch a world wide 
advertising campaign for free members, those free members will be placed under 
the founding members!!!  This is very exciting!!!  This is to good to be true, 
you say???  I have already received my first check so I know it is true and it 
works!!!  

IF you would like more information email my autoresponder at
goingsilver@webmailstation.com

This ad will tell you about a WALL STREET JOURNAL that says they estimate 10 
million people will join in the next 6 months...all of them being placed under 
the founding members.  If you have ever desired a ground floor opportunity.....this 
is it!!!!

You can not lose...at the very least you will get your ISP for free...if you 
decide to pay and go BRONZE...they have a money back unconditional guarentee 
that you will be satisfied!!!

Do you know any one that would like to get their ISP free??? Especially with 
no pesty banners or bars???

email
goingsilver@webmailstation.com

This is not spam we have done business in the past or we are friends.  If you 
would like to be removed from this list just hit reply with remove in the subject 
and you will be promply removed!!!  Have a GREAT day!!! :-)


 




From list@netscape.com  Tue Nov 21 14:19:32 2000
Received: from netscape.com (h-205-217-237-47.netscape.com [205.217.237.47])
	by ietf.org (8.9.1a/8.9.1a) with SMTP id OAA08689
	for <ldapext-archive@odin.ietf.org>; Tue, 21 Nov 2000 14:19:31 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.10.0/8.10.0) with ESMTP id eALJAOD11975;
	Tue, 21 Nov 2000 11:10:24 -0800 (PST)
Received: (from list@localhost)
	by aka.mcom.com (8.10.0/8.10.0) id eALJI9602966;
	Tue, 21 Nov 2000 11:18:09 -0800 (PST)
Resent-Date: Tue, 21 Nov 2000 11:18:09 -0800 (PST)
Message-Id: <sa1a659e.048@prv-mail20.provo.novell.com>
X-Mailer: Novell GroupWise Internet Agent 5.5.5.1
Date: Tue, 21 Nov 2000 10:38:32 -0700
From: "Jim Sermersheim" <JIMSE@novell.com>
To: <ietf-ldapext@netscape.com>
Subject: Solicitation for review
	(draft-sermersheim-ldap-chaining-00.txt)
Mime-Version: 1.0
Content-Type: multipart/alternative; boundary="=_9EC5B31E.DCBDD819"
Resent-Message-ID: <"TY02P.A.1t.vpsG6"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com

This is a MIME message. If you are reading this text, you may want to 
consider changing to a mail reader or gateway that understands how to 
properly handle MIME multipart messages.

--=_9EC5B31E.DCBDD819
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: quoted-printable

This draft describes a control to be used to specify chaining behavior.

http://www.ietf.org/internet-drafts/draft-sermersheim-ldap-chaining-00.txt

Review and feedback via this list is appreciated.

Thanks.

Jim

--=_9EC5B31E.DCBDD819
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD>
<META http-equiv=3DContent-Type content=3D"text/html; charset=3Diso-8859-1"=
>
<META content=3D"MSHTML 5.50.4134.600" name=3DGENERATOR></HEAD>
<BODY style=3D"MARGIN-TOP: 2px; FONT: 8pt MS Sans Serif; MARGIN-LEFT: =
2px">
<DIV><FONT size=3D1></FONT>This draft describes a control to be used to =
specify=20
chaining behavior.</DIV>
<DIV>&nbsp;</DIV>
<DIV><A=20
href=3D"http://www.ietf.org/internet-drafts/draft-sermersheim-ldap-chaining=
-00.txt">http://www.ietf.org/internet-drafts/draft-sermersheim-ldap-chainin=
g-00.txt</A></DIV>
<DIV>&nbsp;</DIV>
<DIV>Review and feedback via this list is appreciated.</DIV>
<DIV>&nbsp;</DIV>
<DIV>Thanks.</DIV>
<DIV>&nbsp;</DIV>
<DIV>Jim</DIV></BODY></HTML>

--=_9EC5B31E.DCBDD819--



From list@netscape.com  Wed Nov 22 11:59:56 2000
Received: from netscape.com (h-205-217-237-46.netscape.com [205.217.237.46])
	by ietf.org (8.9.1a/8.9.1a) with SMTP id LAA26855
	for <ldapext-archive@odin.ietf.org>; Wed, 22 Nov 2000 11:59:56 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.10.0/8.10.0) with ESMTP id eAMGjcs00072;
	Wed, 22 Nov 2000 08:45:42 -0800 (PST)
Received: (from list@localhost)
	by aka.mcom.com (8.10.0/8.10.0) id eAMGwEM22316;
	Wed, 22 Nov 2000 08:58:14 -0800 (PST)
Resent-Date: Wed, 22 Nov 2000 08:58:14 -0800 (PST)
Date: Wed, 22 Nov 2000 08:58:10 -0800 (PST)
Message-Id: <200011221658.eAMGw9D29902@ywing.netscape.com>
From: AM Publishing <globalwork@mail.com>
To: ietf-ldapext@netscape.com
Subject:  ietf-ldapext, The New "AOL" - Free Business Opportunity.
X-Reply-To:  <globalwork@mail.com>
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: 7bit
Resent-Message-ID: <"PSex.A.XcF.ls_G6"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com
Content-Transfer-Encoding: 7bit

ietf-ldapext,

Does Your ISP Pay You? This one will.
Free ISP - Pays You - No Banners - Free Business Opportunity.
Over 80,000 joined since Oct. 5, 2000. Why?
Expected sign ups in 6 months: Millions...
See the opportunity? Its the new "AOL", in its pre launch phase.
Secure your position in the network now, its 100% free! 

You'll i.e. get in on a free full service ISP & Internet Community program, 
(international) which shares its company revenues with its members!
You can secure a position in their (GPC) program option 100% free right now.

Millions are estimated to sign up within months after this company has 
launched and for a ONE TIME $25 fee,
which comes with a life time refund guarantee, (no risk in trying out the program) 
you can also secure a position in their (bronze level) affiliate 
network. (GPAP) Thus...for a $25 one time investment, you can get
thousands of dollars in monthly residual income within a few months. Why?
Because with millions estimated to sign up due to the major advertising 
campaign soon coming (we're talking TV, Radio, Newspapers, Magazines etc.) 
and the way their pretty fair network is constructed, a huge spillover 
will be the result, (they build the network for you) and your own 
organization(s) will be built lightening fast, with no efforts necessary from you. 
If you would like to contribute with referrals however, fine...
then it will go even faster. 

You can in fact EARN $25 instead of paying the $25 one time affiliate fee by 
signing up for their Compubank option for direct revenue deposits
from this program, if you join their affiliate program now!

The bad news are that when they launches, (in the end of this month)
the $25 buy in option to the bronze level, will no longer be allowed. 
So please believe me, you have now a once in a life time opportunity
to buy in early in a company which focus on becoming the new AOL
and have the resources to do it. I'm dead serious when I say you
can very well get rich, if you act now. Its not a hype, it is very realistic...
based on the way their brilliant program is constructed and the
expected millions of sign ups coming. Can 80,000 pre launch
sign ups...be wrong? Can you afford to not at least check it out?

For more information, please fill in the form below and we will send it to you
in just a few minutes. Your e-mail address will not be shared with others.

http://www.veoweb.com/users/ebiznow/gp-info.html

Thanks for your time.

Sincerely,
Arild
P.S.
You have either posted a link to the FFA page network we are part of
or we have been in a business to business contact before or
we have received information from you or your company in the past.
That's how your e-mail address came on our business contact list.
This is not U.C.E. If you feel you have received
this message in error and want to be removed, just fill in the form below
with your name & e-mail address and hit send.

<http://www.veoweb.com/users/ebiznow/removecgi.html>






From list@netscape.com  Wed Nov 22 14:09:46 2000
Received: from netscape.com (h-205-217-237-47.netscape.com [205.217.237.47])
	by ietf.org (8.9.1a/8.9.1a) with SMTP id OAA01177
	for <ldapext-archive@odin.ietf.org>; Wed, 22 Nov 2000 14:09:45 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.10.0/8.10.0) with ESMTP id eAMIw7D12881;
	Wed, 22 Nov 2000 10:58:08 -0800 (PST)
Received: (from list@localhost)
	by aka.mcom.com (8.10.0/8.10.0) id eAMJ5so09795;
	Wed, 22 Nov 2000 11:05:54 -0800 (PST)
Resent-Date: Wed, 22 Nov 2000 11:05:54 -0800 (PST)
Date: Wed, 22 Nov 2000 11:05:50 -0800 (PST)
Message-Id: <200011221905.eAMJ5oR17569@xwing.netscape.com>
To: sales@recyclingequipment.com
From: <contest@emailstore.com>
Subject: Recycling Equipment Sale, Win $100
MIME-Version: 1.0
Content-Type: text/plain; charset=unknown-8bit
Resent-Message-ID: <"AsbCvC.A.qYC.QkBH6"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com


Register to receive our equipment inventory newsletter and updates, and you could win $100!

http://www.emailstore.com/register.htm

**********************************

TWE is a leading buyer, seller and broker of new and used recycling equipment.  We specialize in wood waste, tire recycling & crumb rubber, soil remediation, medical waste, waste incinerators, balers, granulators, material handling equipment and many other types of waste and refuse equipment.  Our newsletter and update mailings will keep you informed of our latest equipment acquisitions, want-to-buys, and hot sales price reductions.

Today's incredible deals:

Mac Saturn 6240HT Tire Shredder, two 200-hp electric motors, 525 KYB hydraulic drive motor, hopper, stand, only 1680 hours, $85,000

Mac Saturn 7246 Stationary Shredder, two 100-hp hydraulic drive motors, feed hopper, infeed/discharge conveyors, electric controls, only $145,000

Hrubetz Mobile Thermal Oxidizer Unit, 1990, Excellent condition, blower powered by 125-hp motor, burner fueled by either propane or natural gas, $85,000

Morbark 1200 Tub Grinder, 1994, 650-hp Cat diesel engine, 5800 hours, Morlift grapple, A/C & heat in cab, all new Morbark updates, $165,000

CMI (Rexworks) Series "C" Biogrind, 1999, 226-hp Cummins diesel engine, only 300 hours, conveyor, magnetic head pulley, only $95,000

Diamond Z 1463T Tub Grinder, 1994, two 800-hp Cat diesel engines, crossbelt magnet, conveyors, many spare parts including screens, only $395,000

To find out about this equipment and more,  register for our newsletter.

http://www.emailstore.com/register.htm


Every month, we will randomly choose one of our subscribers, and they will win $100 cash!  As long as you are subscribed, you can win!  Sign up today at:

http://www.emailstore.com/register.htm


**********************************

This is a mailing designated for buyers, sellers and users of recycling equipment and other types of machinery and equipment.  If you feel you have received this mailing in error, send a blank email to remove@emailstore.com and your email address will be removed from our list immediately.  Problems registering at the website? Email contest@emailstore.com and we will contact you.






From list@netscape.com  Thu Nov 23 03:31:55 2000
Received: from netscape.com (h-205-217-237-47.netscape.com [205.217.237.47])
	by ietf.org (8.9.1a/8.9.1a) with SMTP id DAA13469
	for <ldapext-archive@odin.ietf.org>; Thu, 23 Nov 2000 03:31:54 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.10.0/8.10.0) with ESMTP id eAN8MBD06266;
	Thu, 23 Nov 2000 00:22:12 -0800 (PST)
Received: (from list@localhost)
	by aka.mcom.com (8.10.0/8.10.0) id eAN8U0614378;
	Thu, 23 Nov 2000 00:30:00 -0800 (PST)
Resent-Date: Thu, 23 Nov 2000 00:30:00 -0800 (PST)
X-Envelope-Sender-Is: helmut.volpers@icn.siemens.de (at relayer goliath.siemens.de)
Message-ID: <E1EB691EEC98D311A7CC0050DA3D8357689226@pappel.mch.sni.de>
From: "Volpers, Helmut" <helmut.volpers@icn.siemens.de>
To: "'Jim Sermersheim'" <JIMSE@novell.com>, ietf-ldapext@netscape.com
Subject: RE: Solicitation for review (draft-sermersheim-ldap-chaining-00.t
	xt)
Date: Thu, 23 Nov 2000 09:29:32 +0100
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2650.21)
Content-Type: multipart/alternative;
	boundary="----_=_NextPart_001_01C05527.8146D100"
Resent-Message-ID: <"aoWbXD.A.WgD.HWNH6"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com

This message is in MIME format. Since your mail reader does not understand
this format, some or all of this message may not be legible.

------_=_NextPart_001_01C05527.8146D100
Content-Type: text/plain;
	charset="iso-8859-1"

Hi Jim,
 
I like the idea of defining a control to enable an LDAP Client to say to a
Server
whether the server should chain or return referrals if references exist.
I understand you correct that you don't want to define distributed
operations ?
I will review your draft in detail. At the moment I think we need something
like
"scope of referral" to limit the scope where the Server chain to e.g. my
local
domain or my country etc.
Who will define the OID's for the control.
Do you present the draft in San Diego ?
 
Helmut

-----Original Message-----
From: Jim Sermersheim [mailto:JIMSE@novell.com]
Sent: Dienstag, 21. November 2000 18:39
To: ietf-ldapext@netscape.com
Subject: Solicitation for review (draft-sermersheim-ldap-chaining-00.txt)


This draft describes a control to be used to specify chaining behavior.
 
http://www.ietf.org/internet-drafts/draft-sermersheim-ldap-chaining-00.txt
<http://www.ietf.org/internet-drafts/draft-sermersheim-ldap-chaining-00.txt>

 
Review and feedback via this list is appreciated.
 
Thanks.
 
Jim


------_=_NextPart_001_01C05527.8146D100
Content-Type: text/html;
	charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD>
<META HTTP-EQUIV=3D"Content-Type" CONTENT=3D"text/html; =
charset=3Diso-8859-1">


<META content=3D"MSHTML 5.50.4522.1800" name=3DGENERATOR></HEAD>
<BODY style=3D"MARGIN-TOP: 2px; FONT: 8pt MS Sans Serif; MARGIN-LEFT: =
2px">
<DIV><SPAN class=3D160321708-23112000><FONT size=3D1>Hi =
Jim,</FONT></SPAN></DIV>
<DIV><SPAN class=3D160321708-23112000><FONT =
size=3D1></FONT></SPAN>&nbsp;</DIV>
<DIV><SPAN class=3D160321708-23112000><FONT size=3D1>I like the idea of =
defining a=20
control to enable an LDAP Client to say to a Server</FONT></SPAN></DIV>
<DIV><SPAN class=3D160321708-23112000><FONT size=3D1>whether the server =
should chain=20
or return referrals if references exist.</FONT></SPAN></DIV>
<DIV><SPAN class=3D160321708-23112000><FONT size=3D1>I understand you =
correct that=20
you don't want to define distributed operations ?</FONT></SPAN></DIV>
<DIV><SPAN class=3D160321708-23112000><FONT size=3D1>I will review your =
draft in=20
detail. At the moment I think we need something =
like</FONT></SPAN></DIV>
<DIV><SPAN class=3D160321708-23112000><FONT size=3D1>"scope of =
referral" to limit=20
the scope where the Server chain to e.g. my local</FONT></SPAN></DIV>
<DIV><SPAN class=3D160321708-23112000><FONT size=3D1>domain or my =
country=20
etc.</FONT></SPAN></DIV>
<DIV><SPAN class=3D160321708-23112000><FONT size=3D1>Who will define =
the OID's for=20
the control.</FONT></SPAN></DIV>
<DIV><SPAN class=3D160321708-23112000><FONT size=3D1>Do you present the =
draft in San=20
Diego ?</FONT></SPAN></DIV>
<DIV><SPAN class=3D160321708-23112000><FONT =
size=3D1></FONT></SPAN>&nbsp;</DIV>
<DIV><SPAN class=3D160321708-23112000><FONT =
size=3D1>Helmut</FONT></SPAN></DIV>
<BLOCKQUOTE dir=3Dltr=20
style=3D"PADDING-LEFT: 5px; MARGIN-LEFT: 5px; BORDER-LEFT: #000000 2px =
solid; MARGIN-RIGHT: 0px">
  <DIV class=3DOutlookMessageHeader dir=3Dltr align=3Dleft><FONT =
face=3DTahoma=20
  size=3D2>-----Original Message-----<BR><B>From:</B> Jim Sermersheim=20
  [mailto:JIMSE@novell.com]<BR><B>Sent:</B> Dienstag, 21. November 2000 =

  18:39<BR><B>To:</B> ietf-ldapext@netscape.com<BR><B>Subject:</B> =
Solicitation=20
  for review =
(draft-sermersheim-ldap-chaining-00.txt)<BR><BR></FONT></DIV>
  <DIV><FONT size=3D1></FONT>This draft describes a control to be used =
to specify=20
  chaining behavior.</DIV>
  <DIV>&nbsp;</DIV>
  <DIV><A=20
  =
href=3D"http://www.ietf.org/internet-drafts/draft-sermersheim-ldap-chain=
ing-00.txt">http://www.ietf.org/internet-drafts/draft-sermersheim-ldap-c=
haining-00.txt</A></DIV>
  <DIV>&nbsp;</DIV>
  <DIV>Review and feedback via this list is appreciated.</DIV>
  <DIV>&nbsp;</DIV>
  <DIV>Thanks.</DIV>
  <DIV>&nbsp;</DIV>
  <DIV>Jim</DIV></BLOCKQUOTE></BODY></HTML>

------_=_NextPart_001_01C05527.8146D100--



From list@netscape.com  Thu Nov 23 06:41:25 2000
Received: from netscape.com (h-205-217-237-47.netscape.com [205.217.237.47])
	by ietf.org (8.9.1a/8.9.1a) with SMTP id GAA20101
	for <ldapext-archive@odin.ietf.org>; Thu, 23 Nov 2000 06:41:24 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.10.0/8.10.0) with ESMTP id eANBW3D18729;
	Thu, 23 Nov 2000 03:32:03 -0800 (PST)
Received: (from list@localhost)
	by aka.mcom.com (8.10.0/8.10.0) id eANBdpg27982;
	Thu, 23 Nov 2000 03:39:51 -0800 (PST)
Resent-Date: Thu, 23 Nov 2000 03:39:51 -0800 (PST)
Date: Thu, 23 Nov 2000 03:39:38 -0800 (PST)
Message-Id: <200011231139.eANBdbD14997@ywing.netscape.com>
From: here1971@hotmail.com
To: Internet@ywing.netscape.com, Opportunist@netscape.com
Subject:  The New Internet Era!!!
X-Reply-To:  here1971@hotmail.com
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: 7bit
Resent-Message-ID: <"uT3jeC.A.80G.GIQH6"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com
Content-Transfer-Encoding: 7bit

Hello,

If you would like to make Millions on the Internet or,

You would just like some Free stuff,

You are invited to visit my new site at:

http://www.expage.com/monmake

You will be glad you visited.

Thankyou for your time and have a great day











You have received this email because I purchased a mailing list of opportunity seekers with your address 
on it.  If you no longer wish to be on this list, please reply with 'REMOVE' in the subject field.
I have sent this email with the understanding you have wanted to receive it.  If this is not the case I 
sincerely apologise.
Thankyou for your time and patience.




From list@netscape.com  Thu Nov 23 15:49:29 2000
Received: from netscape.com (h-205-217-237-46.netscape.com [205.217.237.46])
	by ietf.org (8.9.1a/8.9.1a) with SMTP id PAA18226
	for <ldapext-archive@odin.ietf.org>; Thu, 23 Nov 2000 15:49:28 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.10.0/8.10.0) with ESMTP id eANKXks13720;
	Thu, 23 Nov 2000 12:33:46 -0800 (PST)
Received: (from list@localhost)
	by aka.mcom.com (8.10.0/8.10.0) id eANKkNo08750;
	Thu, 23 Nov 2000 12:46:23 -0800 (PST)
Resent-Date: Thu, 23 Nov 2000 12:46:23 -0800 (PST)
Date: Thu, 23 Nov 2000 12:46:10 -0800 (PST)
Message-Id: <200011232046.eANKk0R26007@xwing.netscape.com>
From: ashlaws@mail.com
To: ietf-ldapext@netscape.com
Subject:  Hi  ietf-ldapext  We Do All The Advertising For You!
X-Reply-To:  ashlaws@mail.com
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: 7bit
Resent-Message-ID: <"i_S8B.A.cIC.eIYH6"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com
Content-Transfer-Encoding: 7bit

LOOK! 

 CO-OP ADVERTISING SYSTEM.

Greatest Money Maker Ever This is HOT!

We Do All The Advertising For You,
No Recruiting Required. Pay only
One Time.YOU MUST SEE THIS! 

For More Information;Reply To This Message With
[MORE INFO]  As The Subject.

ashlaws@mail.com




From list@netscape.com  Thu Nov 23 17:33:06 2000
Received: from netscape.com (h-205-217-237-46.netscape.com [205.217.237.46])
	by ietf.org (8.9.1a/8.9.1a) with SMTP id RAA01913
	for <ldapext-archive@odin.ietf.org>; Thu, 23 Nov 2000 17:33:06 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.10.0/8.10.0) with ESMTP id eANMIqs18300;
	Thu, 23 Nov 2000 14:18:56 -0800 (PST)
Received: (from list@localhost)
	by aka.mcom.com (8.10.0/8.10.0) id eANMVUM26341;
	Thu, 23 Nov 2000 14:31:30 -0800 (PST)
Resent-Date: Thu, 23 Nov 2000 14:31:30 -0800 (PST)
Subject: E-Mail Marketing Svcs
To: a_z93@yahoo.com
Date: Thu, 23 Nov 2000 14:41:25 -0700
From: a_z51@yahoo.com
Message-Id: <nypulmvbcoifq.vdsddooejmdxfpwm@mailg.gWturntime.com>
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: 7BIT
Resent-Message-ID: <"k4EMv.A.HbG.BrZH6"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com
Content-Transfer-Encoding: 7BIT



TIRED OF ENDLESSLY POSTING YOUR ONLINE CLASSIFIED AD AND GETTING 
NO RESULTS?

The fact is there are over 7000 such sites scattered about the web
and frankly none of them generate enough traffic to be worth your
while. Even when someone does find or visits one of these sites, your
ad is hopelessly lost in a myriad of similar offerings.

Another frustration is search engines. If you are not in the Top 10
forget about high traffic visiting your web site. Not everyone can be
in the Top 10 and stay there, when there are estimates of 4 million
that have a web pages.

You ask, how do we know? That's exactly what we used to do.

The greatest way of marketing this century is undoubtedly direct
e-mail. It's similar to the postman delivering a letter to your
mailbox. There is NO stumbling on to it! The ability to promote your
product, service, website, or MLM/Network Marketing opportunity to
millions instantly is what advertisers have been dreaming of for over
100 years. We will e-mail your one page promotion to a list of our
general addresses. The greatest part is, it's completely affordable.

-----------------------------------------------------------------------

NOTICE: No pornography, chain letters, get quick rich, pyramid scheme,
or any threatening or questionable materials. Don't even Ask!!

-----------------------------------------------------------------------

STANDARD PRICING AND PROCEDURES

-----------------------------------------------------------------------

EXTRACTING:

Our list of general Internet addreses are actually extracted 
from the most popular web sites on the Internet. The addresses are verified 
and run through our purification process. The process includes addresses
run against our custom filter of 2,492 keywords to remove as well as
through our 192MB remove /flamer list. The EDU, ORG, GOV, Mil, and US
domains are removed as well as well as other domains that asked not to
receive e-mail.

-----------------------------------------------------------------------

SET-UP FEE:  $150.00
This will cover the costs of uploading files, Internet Access (ISP),
and software set-up.

-----------------------------------------------------------------------

EVALUATION:  $350.00 (optional)
One of our Marketing Specialists will evaluate your sales letter, and
offer his/her expertise on how to make it the most successful.

-----------------------------------------------------------------------

STANDARD PRICING: (Emails Delivered)
1 Million- $800.00 per
2 Million- $700.00 per
3 Million & up- $600.00 per

-----------------------------------------------------------------------

SPECIAL OFFER!

This introductory offer of $475.00 includes:

1. Set-Up Fee
2. Evaluation of sales letter 
3. 250,000 e-mails delivered

-----------------------------------------------------------------------

PAYMENT POLICY
All services must be paid in full prior to delivery of advertisement.
Under NO CIRCUMSTANCES will any sales or marketing strategies be
discussed until payment is received.
-----------------------------------------------------------------------
If you are serious about Direct Email Marketing-Fax the following
form to (253) 498-4648
----------------------------------------------------------------------

THIS FORM MUST BE COMPLETELY FILLED OUT!

Contact Name: _____________________________________________
Business Name:  ______________________________________
Business Type:  ______________________________________
# Years in Business:  _________________________
Address: _________________________________________________
City: ____________________  State: ______  Zip: ______________
Country: _______________
Email Address: _______________________________________________
Phone:  __________________________Fax:  ____________________________

-----------------------------------------------------------------------



From list@netscape.com  Fri Nov 24 17:12:41 2000
Received: from netscape.com (h-205-217-237-47.netscape.com [205.217.237.47])
	by ietf.org (8.9.1a/8.9.1a) with SMTP id RAA09344
	for <ldapext-archive@odin.ietf.org>; Fri, 24 Nov 2000 17:12:40 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.10.0/8.10.0) with ESMTP id eAOM3GD12379;
	Fri, 24 Nov 2000 14:03:19 -0800 (PST)
Received: (from list@localhost)
	by aka.mcom.com (8.10.0/8.10.0) id eAOMB5k05607;
	Fri, 24 Nov 2000 14:11:05 -0800 (PST)
Resent-Date: Fri, 24 Nov 2000 14:11:05 -0800 (PST)
Message-Id: <sa1e84d5.016@reed.oncalldba.com>
X-Mailer: Novell GroupWise Internet Agent 5.5.2.1
Date: Fri, 24 Nov 2000 15:10:05 -0700
From: "Ed Reed" <eer@OnCallDBA.COM>
To: <internet-drafts@ietf.org>
Cc: <ietf-ldup@imc.org>, <ietf-ldapext@netscape.com>
Subject: draft-ietf-ldup-subentry-06.txt
Mime-Version: 1.0
Content-Type: multipart/mixed; boundary="=_FEA5D755.62036FBD"
Resent-Message-ID: <"5YW_BB.A.VXB.4duH6"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com

--=_FEA5D755.62036FBD
Content-Type: text/plain; charset=US-ASCII
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable

Please publish the attached revised internet draft - draft-ietf-ldup-subent=
ry-06.txt

Abstract:


This document describes two object classes called=20
ldapSubEntry and inheritableLDAPSubEntry which MAY be used=20
to indicate operations and management related entries in=20
the directory, called LDAP Subentries.  To control the=20
visibility of entries of type ldapSubEntry, a control,=20
ldapSubentriesControl, is defined, and a special case using=20
Search filters is described.  Scope rules are defined along=20
with rules for dealing with inheritance of subentry policy.=20

To the work group:

1) sorry this arrives to you in base64 encoding...if it does (hi, Rick!)
2) I've significantly revised this document to include the scope discussion=

requested, and to provide an example scope extension for inheritance
and inheritance blocking. =20

It needs your review before going to last call.

=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
Ed Reed
Reed-Matthews, Inc.
+1 801 796 7065
http://www.Reed-Matthews.COM


--=_FEA5D755.62036FBD
Content-Type: text/plain
Content-Disposition: attachment; filename="draft-ietf-ldup-subentry-06.txt"
Content-Transfer-Encoding: base64

DQoNCg0KDQoNCg0KSU5URVJORVQtRFJBRlQNCmRyYWZ0LWlldGYtbGR1cC1zdWJlbnRyeS0wNi50
eHQgDQogICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg
RWQgUmVlZCANCiAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBSZWVkLU1h
dHRoZXdzLCBJbmMuIA0KICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg
Tm92ZW1iZXIgMjQsIDIwMDAgDQogICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg
ICAgICAgICAgICAgICAgICAgICAgICANCkxEQVAgU3ViZW50cnkgU2NoZW1hIA0KDQoNCjEuIFN0
YXR1cyBvZiB0aGlzIE1lbW8gDQoNClRoaXMgZG9jdW1lbnQgaXMgYW4gSW50ZXJuZXQtRHJhZnQg
YW5kIGlzIGluIGZ1bGwgDQpjb25mb3JtYW5jZSB3aXRoIGFsbCBwcm92aXNpb25zIG9mIFNlY3Rp
b24gMTAgb2YgUkZDMjAyNi4gDQogDQpJbnRlcm5ldC1EcmFmdHMgYXJlIHdvcmtpbmcgZG9jdW1l
bnRzIG9mIHRoZSBJbnRlcm5ldCANCkVuZ2luZWVyaW5nIFRhc2sgRm9yY2UgKElFVEYpLCBpdHMg
YXJlYXMsIGFuZCBpdHMgd29ya2luZyANCmdyb3Vwcy4gTm90ZSB0aGF0IG90aGVyIGdyb3VwcyBt
YXkgYWxzbyBkaXN0cmlidXRlIHdvcmtpbmcgDQpkb2N1bWVudHMgYXMgSW50ZXJuZXQtRHJhZnRz
LiAgDQogDQpJbnRlcm5ldC1EcmFmdHMgYXJlIGRyYWZ0IGRvY3VtZW50cyB2YWxpZCBmb3IgYSBt
YXhpbXVtIG9mIA0Kc2l4IG1vbnRocyBhbmQgbWF5IGJlIHVwZGF0ZWQsIHJlcGxhY2VkLCBvciBv
YnNvbGV0ZWQgYnkgDQpvdGhlciBkb2N1bWVudHMgYXQgYW55IHRpbWUuIEl0IGlzIGluYXBwcm9w
cmlhdGUgdG8gdXNlIA0KSW50ZXJuZXQtRHJhZnRzIGFzIHJlZmVyZW5jZSBtYXRlcmlhbCBvciB0
byBjaXRlIHRoZW0gb3RoZXIgDQp0aGFuIGFzICJ3b3JrIGluIHByb2dyZXNzLiIgIA0KIA0KVGhl
IGxpc3Qgb2YgY3VycmVudCBJbnRlcm5ldC1EcmFmdHMgY2FuIGJlIGFjY2Vzc2VkIGF0IA0KaHR0
cDovL3d3dy5pZXRmLm9yZy9pZXRmLzFpZC1hYnN0cmFjdHMudHh0LiAgDQogDQpUaGUgbGlzdCBv
ZiBJbnRlcm5ldC1EcmFmdCBTaGFkb3cgRGlyZWN0b3JpZXMgY2FuIGJlIA0KYWNjZXNzZWQgYXQg
aHR0cDovL3d3dy5pZXRmLm9yZy9zaGFkb3cuaHRtbC4gDQogDQpUaGlzIEludGVybmV0LURyYWZ0
IGV4cGlyZXMgb24gTWF5IDI0LCAyMDAxLiANCg0KDQoyLiBBYnN0cmFjdCAvIERlc2NyaXB0aW9u
IA0KDQpUaGlzIGRvY3VtZW50IGRlc2NyaWJlcyB0d28gb2JqZWN0IGNsYXNzZXMgY2FsbGVkIA0K
bGRhcFN1YkVudHJ5IGFuZCBpbmhlcml0YWJsZUxEQVBTdWJFbnRyeSB3aGljaCBNQVkgYmUgdXNl
ZCANCnRvIGluZGljYXRlIG9wZXJhdGlvbnMgYW5kIG1hbmFnZW1lbnQgcmVsYXRlZCBlbnRyaWVz
IGluIA0KdGhlIGRpcmVjdG9yeSwgY2FsbGVkIExEQVAgU3ViZW50cmllcy4gIFRvIGNvbnRyb2wg
dGhlIA0KdmlzaWJpbGl0eSBvZiBlbnRyaWVzIG9mIHR5cGUgbGRhcFN1YkVudHJ5LCBhIGNvbnRy
b2wsIA0KbGRhcFN1YmVudHJpZXNDb250cm9sLCBpcyBkZWZpbmVkLCBhbmQgYSBzcGVjaWFsIGNh
c2UgdXNpbmcgDQpTZWFyY2ggZmlsdGVycyBpcyBkZXNjcmliZWQuICBTY29wZSBydWxlcyBhcmUg
ZGVmaW5lZCBhbG9uZyANCndpdGggcnVsZXMgZm9yIGRlYWxpbmcgd2l0aCBpbmhlcml0YW5jZSBv
ZiBzdWJlbnRyeSBwb2xpY3kuIA0KDQpUaGUga2V5IHdvcmRzICJNVVNUIiwgIk1VU1QgTk9UIiwg
IlJFUVVJUkVEIiwgIlNIQUxMIiwgDQoiU0hBTEwgTk9UIiwgIlNIT1VMRCIsICJTSE9VTEQgTk9U
IiwgIlJFQ09NTUVOREVEIiwgIk1BWSIsIA0KYW5kICAiT1BUSU9OQUwiIGluIHRoaXMgZG9jdW1l
bnQgYXJlIHRvIGJlIGludGVycHJldGVkIGFzIA0KDQoNClJlZWQgICAgICAgICAgICAgICAgICAg
ICAgICAgICAgICAgICAgICAgICAgICAgICAgIFtQYWdlIDFdIA0KICAgICAgICAgICAgICAgICAg
ICBFeHBpcmVzIE1heSAyNCwgMjAwMSANDA0KDQoNCklOVEVSTkVULURSQUZUICAgICAgICAgICAg
ICAgICAgICAgICAgICAgICAyNCBOb3ZlbWJlciAyMDAwIA0KICAgICAgICAgICAgICAgICAgIExE
QVAgU3ViZW50cnkgU2NoZW1hIA0KDQpkZXNjcmliZWQgaW4gW1JGQzIxMTldLiBUaGUgc2VjdGlv
bnMgYmVsb3cgcmVpdGVyYXRlIHRoZXNlIA0KZGVmaW5pdGlvbnMgYW5kIGluY2x1ZGUgc29tZSBh
ZGRpdGlvbmFsIG9uZXMuIA0KDQoNCg0KMy4gVGFibGUgb2YgQ29udGVudHMgDQoNCjEuIFN0YXR1
cyBvZiB0aGlzIE1lbW8gICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg
MSANCjIuIEFic3RyYWN0IC8gRGVzY3JpcHRpb24gICAgICAgICAgICAgICAgICAgICAgICAgICAg
ICAgICAgICAgICAgMSANCjMuIFRhYmxlIG9mIENvbnRlbnRzICAgICAgICAgICAgICAgICAgICAg
ICAgICAgICAgICAgICAgICAgICAgICAgMiANCjQuIE9iamVjdCBDbGFzcyBEZWZpbml0aW9ucyAg
ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgMyANCjQuMSAgbGRhcFN1YkVudHJ5
IENsYXNzICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgMyANCjQuMS4x
ICAgICBTY29wZSBSdWxlcyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg
ICAgMyANCjQuMiAgSW5oZXJpdGFibGVMREFQU3ViZW50cnkgQ2xhc3MgICAgICAgICAgICAgICAg
ICAgICAgICAgICAgICAgNCANCjQuMi4xICAgICBJbGx1c3RyYXRpb24gICAgICAgICAgICAgICAg
ICAgICAgICAgICAgICAgICAgICAgICAgICAgNSANCjUuIEF0dHJpYnV0ZSBEZWZpbml0aW9ucyAg
ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgNiANCjUuMSAgaW5oZXJpdGFi
bGUgQXR0cmlidXRlICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgNiANCjUu
MiAgYmxvY2tJbmhlcml0YW5jZSBBdHRyaWJ1dGUgICAgICAgICAgICAgICAgICAgICAgICAgICAg
ICAgICAgNiANCjYuIFZpc2liaWxpdHkgQ29udHJvbHMgICAgICAgICAgICAgICAgICAgICAgICAg
ICAgICAgICAgICAgICAgICAgNyANCjYuMSAgbGRhcFN1YmVudHJpZXNDb250cm9sICAgICAgICAg
ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgNyANCjYuMS4xICAgICBMREFQIFNlYXJjaCB3
aXRoIHNjb3BlIG90aGVyIHRoYW4gYmFzZU9iamVjdCAgICAgICAgICAgNyANCjYuMS4yICAgICBM
REFQIFNlYXJjaCB3aXRoIHNjb3BlIG9mIGJhc2VPYmplY3QgICAgICAgICAgICAgICAgICAgOCAN
CjYuMS4zICAgICBPdGhlciBMREFQIG9wZXJhdGlvbnMgICAgICAgICAgICAgICAgICAgICAgICAg
ICAgICAgICAgOCANCjYuMS40ICAgICBDb3JyZXNwb25kZW5jZSB0byBYLjUwMCBbWC41MTFdICAg
ICAgICAgICAgICAgICAgICAgICAgOCANCjYuMiAgU2VhcmNoIEZpbHRlciBWaXNpYmlsaXR5ICAg
ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgOSANCjcuIFNlY3VyaXR5IENvbnNpZGVy
YXRpb25zICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgOSANCjguIFJlZmVy
ZW5jZXMgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg
MTAgDQo5LiBDb3B5cmlnaHQgTm90aWNlICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg
ICAgICAgICAgICAgIDEwIA0KMTAuIA0gICBBY2tub3dsZWRnZW1lbnRzICAgICAgICAgICAgICAg
ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIDExIA0KMTEuIA0gICBBdXRob3IncyBBZGRy
ZXNzICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIDExIA0KDQoN
Cg0KDQoNCg0KDQoNCg0KDQoNCg0KDQoNCg0KDQoNCg0KDQpSZWVkICAgICAgICAgICAgICAgICAg
ICAgICAgICAgICAgICAgICAgICAgICAgICAgICBbUGFnZSAyXSANCiAgICAgICAgICAgICAgICAg
ICAgRXhwaXJlcyBNYXkgMjQsIDIwMDEgDQogDQwNCg0KDQpJTlRFUk5FVC1EUkFGVCAgICAgICAg
ICAgICAgICAgICAgICAgICAgICAgMjQgTm92ZW1iZXIgMjAwMCANCiAgICAgICAgICAgICAgICAg
ICBMREFQIFN1YmVudHJ5IFNjaGVtYSANCg0KIA0KIA0KDQoNCjQuIE9iamVjdCBDbGFzcyBEZWZp
bml0aW9ucyANCg0KDQo0LjEgbGRhcFN1YkVudHJ5IENsYXNzIA0KDQooIDIuMTYuODQwLjEuMTEz
NzE5LjIuMTQyLjYuMS4xIE5BTUUgJ2xkYXBTdWJFbnRyeScgIA0KICAgREVTQyAnTERBUCBTdWJl
bnRyeSBjbGFzcywgdmVyc2lvbiAxJyAgDQogICAgIFNVUCB0b3AgU1RSVUNUVVJBTCAgDQogICAg
IE1BWSAoIGNuICkgKSAgDQoNClRoZSBjbGFzcyBsZGFwU3ViRW50cnkgaXMgaW50ZW5kZWQgdG8g
YmUgdXNlZCBhcyBhIHN1cGVyLSANCmNsYXNzIHdoZW4gZGVmaW5pbmcgb3RoZXIgc3RydWN0dXJh
bCBjbGFzc2VzIHRvIGJlIHVzZWQgDQphcyBMREFQIFN1YmVudHJpZXMsIGFuZCBhcyB0aGUgc3Ry
dWN0dXJhbCBjbGFzcyB0byB3aGljaCANCkF1eGlsaWFyeSBjbGFzc2VzIG1heSBiZSBhZGRlZCBm
b3IgYXBwbGljYXRpb24gc3BlY2lmaWMgDQpzdWJlbnRyeSBpbmZvcm1hdGlvbi4gIFdoZXJlIHBv
c3NpYmxlLCB0aGUgdXNlIG9mIEF1eGlsaWFyeSANCmNsYXNzZXMgdG8gZXh0ZW5kIExEQVAgU3Vi
ZW50cmllcyBpcyBzdHJvbmdseSBwcmVmZXJyZWQuIA0KIA0KVGhlIHByZXNlbmNlIG9mIGxkYXBT
dWJFbnRyeSBpbiB0aGUgbGlzdCBvZiBzdXBlci1jbGFzc2VzIA0Kb2YgYW4gZW50cnkgaW4gdGhl
IGRpcmVjdG9yeSBtYWtlcyB0aGF0IGVudHJ5IGFuIExEQVAgDQpTdWJlbnRyeS4gIE9iamVjdCBj
bGFzc2VzIGRlcml2ZWQgZnJvbSBsZGFwU3ViRW50cnkgYXJlIA0KdGhlbXNlbHZlcyBjb25zaWRl
cmVkIGxkYXBTdWJFbnRyeSBjbGFzc2VzLCBmb3IgdGhlIHB1cnBvc2UgDQpvZiB0aGlzIGRpc2N1
c3Npb24uIA0KDQpMREFQIFN1YmVudHJpZXMgTUFZIGJlIG5hbWVkIGJ5IHRoZWlyIGNvbW1vbk5h
bWUgYXR0cmlidXRlIA0KW1JGQzIyNTFdLiAgT3RoZXIgbmFtaW5nIGF0dHJpYnV0ZXMgYXJlIGFs
c28gcGVybWl0dGVkLiANCg0KTERBUCBTdWJlbnRyaWVzIE1BWSBiZSBjb250YWluZXJzLCB1bmxp
a2UgdGhlaXIgW1guNTAxXSANCmNvdW50ZXJwYXJ0cy4gDQoNCkxEQVAgU3ViZW50cmllcyBNQVkg
YmUgY29udGFpbmVkIGJ5LCBhbmQgd2lsbCB1c3VhbGx5IGJlIA0KbG9jYXRlZCBpbiB0aGUgZGly
ZWN0b3J5IGluZm9ybWF0aW9uIHRyZWUgaW1tZWRpYXRlbHkgDQpzdWJvcmRpbmF0ZSB0bywgYWRt
aW5pc3RyYXRpdmUgcG9pbnRzLiAgRnVydGhlciAodW5saWtlIA0KWC41MDAgc3ViZW50cmllcyks
IExEQVAgU3ViZW50cmllcyBNQVkgYmUgY29udGFpbmVkIGJ5IA0Kb3RoZXIgTERBUCBTdWJlbnRy
aWVzICh0aGUgd2F5IG9yZ2FuaXphdGlvbmFsIHVuaXRzIG1heSBiZSANCmNvbnRhaW5lZCBieSBv
dGhlciBvcmdhbml6YXRpb25hbCB1bml0cykuICBEZWVwIG5lc3Rpbmcgb2YgDQpMREFQIFN1YmVu
dHJpZXMgYXJlIGRpc2NvdXJhZ2VkLCBidXQgbm90IHByb2hpYml0ZWQuIA0KDQoNCjQuMS4xIFNj
b3BlIFJ1bGVzIA0KDQpUaGUgZGVmYXVsdCBzY29wZSBvZiBhbiBMREFQIFN1YmVudHJ5IGlzIGxp
bWl0ZWQgdG8gdGhlIA0KYWRtaW5pc3RyYXRpdmUgYXJlYSBpbiB3aGljaCBpdCBpcyBkZWZpbmVk
LiAgU3BlY2lmaWNhbGx5LCANCnRoZSBzdWJ0cmVlIG9mIHRoZSBkaXJlY3RvcnkgbmFtZXNwYWNl
IGJhc2VkIGF0IHRoZSANCmFkbWluaXN0cmF0aXZlIHBvaW50IG1vc3QgaW1tZWRpYXRlbHkgc3Vw
ZXJpb3IgdG8gdGhlIExEQVAgDQoNClJlZWQgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg
ICAgICAgICAgICAgICAgIFtQYWdlIDNdIA0KICAgICAgICAgICAgICAgICAgICBFeHBpcmVzIE1h
eSAyNCwgMjAwMSANCiANDA0KDQoNCklOVEVSTkVULURSQUZUICAgICAgICAgICAgICAgICAgICAg
ICAgICAgICAyNCBOb3ZlbWJlciAyMDAwIA0KICAgICAgICAgICAgICAgICAgIExEQVAgU3ViZW50
cnkgU2NoZW1hIA0KDQpTdWJlbnRyeSwgZG93biB0byBidXQgbm90IGluY2x1ZGluZyBhbnkgc3Vi
b3JkaW5hdGUgDQphZG1pbmlzdHJhdGl2ZSBwb2ludHMgb3IgYXJlYXMuICBQb2xpY3kgZGVmaW5l
ZCBpbiBhbiBMREFQIA0KU3ViZW50cnkgaXMgbm90IGluaGVyaXRhYmxlLCB1bmxlc3Mgc3VjaCBp
bmhlcml0YW5jZSBpcyANCmV4cGxpY2l0bHkgZGVmaW5lZCAoc2VlIHRoZSBvYmplY3QgY2xhc3Mg
ZGVmaW5pdGlvbiBmb3IgDQpJbmhlcml0YWJsZUxEQVBTdWJlbnRyeSwgYmVsb3csIGZvciBzdWNo
IGFuIGV4YW1wbGUpLiANCg0KSWYgYW4gTERBUCBTdWJlbnRyeSBpcyBzdWJvcmRpbmF0ZSB0byBh
bm90aGVyIExEQVAgDQpTdWJlbnRyeSwgaXQgdGFrZXMgdGhlIHNhbWUgc2NvcGUgYXMgdGhlIHBh
cmVudCBMREFQIA0KU3ViZW50cnkuIA0KDQpBcHBsaWNhdGlvbnMgTUFZIGRlZmluZSBhbHRlcm5h
dGl2ZSBzY29wZSBzZW1hbnRpY3MgZm9yIA0KY2xhc3NlcyB0aGV5IGRlZmluZSB3aGljaCBhcmUg
ZGVyaXZlZCBmcm9tIHRoZSBsZGFwU3ViRW50cnkgDQpjbGFzcy4gVGhpcyBtZWFucyB0aGF0IGFu
IGFwcGxpY2F0aW9uIGNhbiBkZXJpdmUgYSBuZXcgDQpjbGFzcyBmcm9tIHRoZSBsZGFwU3ViRW50
cnkgY2xhc3MgYW5kIGFkZCBhbiBhdHRyaWJ1dGUsIA0KbGlrZSBzdWJ0cmVlU3BlY2lmaWNhdGlv
biBbWC41MDFdIG9yIGluaGVyaXRhbmNlIGNvbnRyb2xzIA0KKHNlZSBiZWxvdyksIHRvIGRlZmlu
ZSBhIG5ldyBzY29wZSBydWxlIGZvciB0aGF0IA0KYXBwbGljYXRpb24gdG8gdXNlLiANCg0KQXBw
bGljYXRpb25zIE1VU1QgTk9UIGRlZmluZSBhbHRlcm5hdGl2ZSBzY29wZSBydWxlcyBmb3IgDQph
dXhpbGlhcnkgY2xhc3NlcyB1c2VkIHRvIGRlY29yYXRlIGVudHJpZXMgb2YgdGhlIA0KbGRhcFN1
YkVudHJ5IGNsYXNzLiAgVGhpcyByZXN0cmljdGlvbiBpcyByZXF1aXJlZCB0byBhdm9pZCANCmhh
dmluZyBjb25mbGljdGluZyBvciBjb250cmFkaWN0b3J5IHNjb3BlIGRlZmluaXRpb25zIA0KYXBw
bGllZCBieSBkaWZmZXJlbnQgYXBwbGljYXRpb25zIHRvIHRoZSBzYW1lIExEQVAgDQpTdWJlbnRy
eS4gDQoNCg0KNC4yIEluaGVyaXRhYmxlTERBUFN1YmVudHJ5IENsYXNzIA0KDQooIDEuMy42LjEu
NC4xLjc2MjguNS42LjEuMSBOQU1FICdpbmhlcml0YWJsZUxEQVBTdWJFbnRyeScgIA0KICAgREVT
QyAnSW5oZXJpdGFibGUgTERBUCBTdWJlbnRyeSBjbGFzcywgdmVyc2lvbiAxJyAgDQogICBTVVAg
bGRhcFN1YkVudHJ5IFNUUlVDVFVSQUwgIA0KICAgTVVTVCAoIGluaGVyaXRhYmxlICkgIA0KICAg
TUFZICAoIGJsb2NrSW5oZXJpdGFuY2UgKSANCg0KVGhlIEluaGVyaXRhYmxlTERBUFN1YmVudHJ5
IGNsYXNzIGlzIGRlcml2ZWQgZnJvbSB0aGUgDQpsZGFwU3ViRW50cnkgY2xhc3MgYW5kIHByb3Zp
ZGVzIG1vZGlmaWVkIHNjb3BlIHNlbWFudGljcyB0byANCnBlcm1pdCBhbmQgY29udHJvbCBpbmhl
cml0YW5jZSBmcm9tIG9uZSBhZG1pbmlzdHJhdGl2ZSBhcmVhIA0KdG8gb25lIG9yIG1vcmUgc3Vi
b3JkaW5hdGUgYWRtaW5pc3RyYXRpdmUgYXJlYXMuIA0KDQpJZiB0aGUgJ2luaGVyaXRhYmxlJyBh
dHRyaWJ1dGUgaXMgVFJVRSAoMSksIHRoZW4gdGhlIHBvbGljeSANCmluZm9ybWF0aW9uIGNvbnRh
aW5lZCBpbiB0aGUgSW5oZXJpdGFibGVMREFQU3ViZW50cnkgaXMgDQppbnRlbmRlZCB0byBleHRl
bmQgaW50byBhbnkgc3Vib3JkaW5hdGUgYWRtaW5pc3RyYXRpdmUgDQphcmVhcy4gIFN1Ym9yZGlu
YXRlIGFkbWluaXN0cmF0aXZlIGFyZWFzIFNIT1VMRCBpbmNsdWRlIA0KSW5oZXJpdGFibGUgTERB
UCBTdWJlbnRyaWVzIGZyb20gdGhlaXIgaW1tZWRpYXRlbHkgc3VwZXJpb3IgDQphZG1pbmlzdHJh
dGl2ZSBhcmVhICh1bmxlc3MgYmxvY2tlZCwgc2VlIGJlbG93KS4gDQoNCklmIHRoZSAnaW5oZXJp
dGFibGUnIGF0dHJpYnV0ZSBpcyBGQUxTRSAoMCksIHRoZSBwb2xpY3kgaXMgDQpOT1QgaW5oZXJp
dGFibGUsIGFuZCBzdWJvcmRpbmF0ZSBhZG1pbmlzdHJhdGl2ZSBhcmVhcyBNVVNUIA0KDQpSZWVk
ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBbUGFnZSA0XSAN
CiAgICAgICAgICAgICAgICAgICAgRXhwaXJlcyBNYXkgMjQsIDIwMDEgDQogDQwNCg0KDQpJTlRF
Uk5FVC1EUkFGVCAgICAgICAgICAgICAgICAgICAgICAgICAgICAgMjQgTm92ZW1iZXIgMjAwMCAN
CiAgICAgICAgICAgICAgICAgICBMREFQIFN1YmVudHJ5IFNjaGVtYSANCg0KdHJlYXQgdGhlIGFz
c29jaWF0ZWQgcG9saWN5IGluZm9ybWF0aW9uIGFzIFVOREVGSU5FRCB1bmxlc3MgDQpleHBsaWNp
dGx5IGRlZmluZWQgd2l0aGluIHRoZWlyIG93biBhZG1pbmlzdHJhdGl2ZSBhcmVhLiANCg0KSWYg
YSBzdWJvcmRpbmF0ZSBhZG1pbmlzdHJhdGl2ZSBhcmVhIGRlZmluZXMgYW4gSW5oZXJpdGFibGUg
DQpMREFQIFN1YmVudHJ5IGZvciBhbiBhcHBsaWNhdGlvbiB3aXRoIHRoZSBzYW1lIG5hbWUgYXMg
b25lIA0KZGVmaW5lZCBpbiB0aGUgc3VwZXJpb3IgYWRtaW5pc3RyYXRpdmUgYXJlYSwgYW5kIGlm
IHRoZSANCnN1Ym9yZGluYXRlJ3MgSW5oZXJpdGFibGUgTERBUCBTdWJlbnRyeSBoYXMgdGhlIGF0
dHJpYnV0ZSANCidibG9ja0luaGVyaXRhbmNlJyB3aXRoIHRoZSB2YWx1ZSBUUlVFLCB0aGVuIGlu
aGVyaXRhbmNlIGlzIA0KYmxvY2tlZCBmcm9tIHRoZSBzdXBlcmlvciBhZG1pbmlzdHJhdGl2ZSBh
cmVhIHRvIHRoYXQgDQpzdWJvcmRpbmF0ZSBhZG1pbmlzdHJhdGl2ZSBhcmVhLCBhbmQgdGhlIGVm
ZmVjdCBpcyB0aGUgc2FtZSANCmFzIGlmIHRoZSBzdXBlcmlvciBJbmhlcml0YWJsZSBMREFQIFN1
YmVudHJ5IGNvbnRhaW5lZCB0aGUgDQonaW5oZXJpdGFibGUnIGF0dHJpYnV0ZSBzZXQgdG8gRkFM
U0UuIA0KDQpUaGUgdmFsdWUgb2YgdGhlICdibG9ja0luaGVyaXRhbmNlJyBhdHRyaWJ1dGUgaW4g
YSBzdXBlcmlvciANCmFkbWluaXN0cmF0aXZlIGFyZWEgSW5oZXJpdGFibGUgTERBUCBTdWJlbnRy
eSBpcyBpcnJlbGV2YW50IA0KdG8gYSBzdWJvcmRpbmF0ZSBhZG1pbmlzdHJhdGl2ZSBhcmVhIGZv
ciB0aGlzIG9iamVjdCBjbGFzcy4gICANCg0KTm8gbWVjaGFuaXNtIGlzIGRlZmluZWQgYXQgdGhp
cyB0aW1lIHRvIHNpZ25hbCB0byANCnN1Ym9yZGluYXRlIGFkbWluaXN0cmF0aXZlIGFyZWFzIHRo
YXQgdGhleSBtYXkgbm90IGJsb2NrIA0KaW5oZXJpdGFibGUgcG9saWN5IGZyb20gc3VwZXJpb3Ig
YWRtaW5pc3RyYXRpdmUgYXJlYXMuIA0KDQoNCjQuMi4xIElsbHVzdHJhdGlvbiANCg0KQW4gaWxs
dXN0cmF0aW9uIG1heSBoZWxwIGNsYXJpZnkgdGhlIHVzZSBvZiB0aGUgY2xhc3MgYW5kIA0KdGhl
c2UgYXR0cmlidXRlcy4gDQoNClN1cHBvc2UgdGhlIGFkbWluaXN0cmF0aXZlIGFyZWEgYmFzZWQg
YXQgJ2RjPWNvbScgaGFzIGFuIA0KSW5oZXJpdGFibGUgTERBUCBTdWJlbnRyeSBmb3IgYW4gYXBw
bGljYXRpb24gZGVmaW5lZCB3aXRoIA0KdGhlICdpbmhlcml0YWJsZScgYXR0cmlidXRlIHNldCB0
byBUUlVFLiAgU3Vib3JkaW5hdGUgDQphZG1pbmlzdHJhdGl2ZSBhcmVhcywgZm9yIGluc3RhbmNl
ICdkYz13aWRnZXQsIGRjPWNvbScgDQptaWdodCBvciBtaWdodCBub3Qgd2FudCB0byBhY2NlcHQg
dGhlIGluaGVyaXRlZCBwb2xpY3kgZnJvbSANCnRoZSAnZGM9Y29tJyBhZG1pbmlzdHJhdGl2ZSBh
cmVhLiANCg0KSWYgdGhlIGFkbWluaXN0cmF0b3Igb2YgdGhlICdkYz13aWRnZXQsIGRjPWNvbScg
DQphZG1pbmlzdHJhdGl2ZSBhcmVhIGNyZWF0ZXMgYW4gSW5oZXJpdGFibGUgTERBUCBTdWJlbnRy
eSANCndpdGggdGhlIHNhbWUgcmVsYXRpdmUgZGlzdGluZ3Vpc2hlZCBuYW1lIGFzIHVzZWQgaW4g
dGhlIA0KJ2RjPWNvbScgYWRtaW5pc3RyYXRpdmUgYXJlYSBzZXR0aW5nIHRoZSAnYmxvY2tJbmhl
cml0YW5jZScgDQphdHRyaWJ1dGUgc2V0IHRvIFRSVUUsIHRoZW4gdGhlIGluaGVyaXRhbmNlIG9m
IHRoaXMgcG9saWN5IA0KaXMgZWZmZWN0aXZlbHkgYmxvY2tlZCBmcm9tIGFmZmVjdGluZyB0aGUg
J2RjPXdpZGdldCwgDQpkYz1jb20nIGFkbWluaXN0cmF0aXZlIGFyZWEuICBXZSdsbCBjYWxsIHRo
aXMgYSBibG9ja2luZyANCnN1YmVudHJ5IGZvciBvdXIgZGlzY3Vzc2lvbiBoZXJlLiANCg0KSWYg
dGhlIGFkbWluaXN0cmF0b3Igb2YgdGhlICdkYz13aWRnZXQsIGRjPWNvbScgDQphZG1pbmlzdHJh
dGl2ZSBhcmVhIGNyZWF0ZXMgYSBibG9ja2luZyBzdWJlbnRyeSAoYXMgYWJvdmUpIA0Kd2l0aCBz
b21lIGxvY2FsbHkgZGVmaW5lZCBwb2xpY3kgaW5mb3JtYXRpb24sIHRoYXQgcG9saWN5IA0KaW5m
b3JtYXRpb24gZWZmZWN0aXZlbHkgcmVwbGFjZXMgdGhlIHBvbGljeSBpbmZvcm1hdGlvbiANCg0K
DQpSZWVkICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBbUGFn
ZSA1XSANCiAgICAgICAgICAgICAgICAgICAgRXhwaXJlcyBNYXkgMjQsIDIwMDEgDQogDQwNCg0K
DQpJTlRFUk5FVC1EUkFGVCAgICAgICAgICAgICAgICAgICAgICAgICAgICAgMjQgTm92ZW1iZXIg
MjAwMCANCiAgICAgICAgICAgICAgICAgICBMREFQIFN1YmVudHJ5IFNjaGVtYSANCg0KZGVmaW5l
ZCBieSB0aGUgc3VwZXJpb3IgYWRtaW5pc3RyYXRpdmUgYXJlYS4gIFdlJ2xsIGNhbGwgDQp0aGlz
IGFuIG92ZXItcmlkaW5nIHN1YmVudHJ5IGZvciBvdXIgZGlzY3Vzc2lvbiBoZXJlLiANCg0KQW4g
b3Zlci1yaWRpbmcgc3ViZW50cnkgTUFZIGl0c2VsZiBiZSBpbmhlcml0YWJsZSwgaW4gd2hpY2gg
DQpjYXNlIHRoZSAnaW5oZXJpdGFibGUnIGF0dHJpYnV0ZSBvbiB0aGUgbG9jYWxseSBkZWZpbmVk
IA0KSW5oZXJpdGFibGUgTERBUCBTdWJlbnRyeSBNQVkgYmUgc2V0IHRvIFRSVUUgb3IgRkFMU0Us
IGF0IA0KdGhlIGRpc2NyZXRpb24gb2YgdGhlIGxvY2FsIGFkbWluaXN0cmF0aXZlIGF1dGhvcml0
eSwgd2l0aCANCmFwcHJvcHJpYXRlIGltcGxpY2F0aW9ucyBmb3IgaW5oZXJpdGFuY2Ugb2YgdGhl
IG5ldywgDQpsb2NhbGx5IGRlZmluZWQgcG9saWN5LCBvbiBhbnkgb3RoZXIgc3Vib3JkaW5hdGUg
DQphZG1pbmlzdHJhdGl2ZSBhcmVhcy4gIEluIHRoaXMgd2F5LCB0aGUgJ2RjPXdpZGdldCwgZGM9
Y29tJyANCmFkbWluaXN0cmF0b3IgY2FuIHNldCBpbmhlcml0YWJsZSBwb2xpY3kgZm9yIG9yZ2Fu
aXphdGlvbmFsIA0KdW5pdHMgKGxpa2UgJ291PWVuZywgZGM9d2lkZ2V0LCBkYz1jb20nKSBmb3Ig
YW4gYXBwbGljYXRpb24gDQp3aGlsZSBvdmVyLXJpZGluZyBpbmhlcml0YWJsZSBwb2xpY3kgZnJv
bSB0aGUgc3VwZXJpb3IgDQonZGM9Y29tJyBhZG1pbmlzdHJhdGl2ZSBhcmVhLiANCg0KDQoNCjUu
IEF0dHJpYnV0ZSBEZWZpbml0aW9ucyANCg0KDQo1LjEgaW5oZXJpdGFibGUgQXR0cmlidXRlIA0K
DQooIDEuMy42LjEuNC4xLjc2MjguNS40LjEgTkFNRSAnaW5oZXJpdGFibGUnIA0KICAgU1lOVEFY
IEJPT0xFQU4gDQogICBTSU5HTEUtVkFMVUUgTk8tVVNFUi1NT0RJRklDQVRJT04gVVNBR0UgZFNB
T3BlcmF0aW9uICkgDQoNClVzZWQgdG8gc2lnbmFsIHdoZXRoZXIgYW4gaW5oZXJpdGFibGVMREFQ
U3ViZW50cnkgaXMgDQppbnRlbmRlZCB0byBiZSBpbmhlcml0ZWQgYnkgc3Vib3JkaW5hdGUgYWRt
aW5pc3RyYXRpdmUgDQphcmVhcywgb3Igbm90LiAgVFJVRSBpbmRpY2F0ZXMgdGhhdCB0aGUgc3Vi
ZW50cnkgYW5kIHRoZSANCnBvbGljeSBpdCBjb250YWlucyBpcyBpbmhlcml0YWJsZS4gICANCg0K
RkFMU0UgaW5kaWNhdGVzIHRoYXQgaXQgaXMgbm90LiANCg0KDQo1LjIgYmxvY2tJbmhlcml0YW5j
ZSBBdHRyaWJ1dGUgDQoNCiggMS4zLjYuMS40LjEuNzYyOC41LjQuMiBOQU1FICdibG9ja0luaGVy
aXRhbmNlJyANCiAgIFNZTlRBWCBCT09MRUFOIA0KICAgU0lOR0xFLVZBTFVFIE5PLVVTRVItTU9E
SUZJQ0FUSU9OIFVTQUdFIGRTQU9wZXJhdGlvbiApIA0KDQpVc2VkIGJ5IGFkbWluaXN0cmF0b3Jz
IG9mIHN1Ym9yZGluYXRlIGFkbWluaXN0cmF0aXZlIGFyZWFzIA0KdG8gb3Zlci1yaWRlLCBvciBi
bG9jaywgdGhlIGluaGVyaXRhbmNlIG9mIA0KaW5oZXJpdGFibGVMREFQU3ViRW50cnkgcG9saWN5
IGZyb20gc3VwZXJpb3IgYWRtaW5pc3RyYXRpdmUgDQphcmVhcy4gICANCg0KQSB2YWx1ZSBvZiBU
UlVFIGluZGljYXRlcyB0aGF0IGluaGVyaXRhbmNlIGlzIHRvIGJlIA0KYmxvY2tlZC4gICANCg0K
DQpSZWVkICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBbUGFn
ZSA2XSANCiAgICAgICAgICAgICAgICAgICAgRXhwaXJlcyBNYXkgMjQsIDIwMDEgDQogDQwNCg0K
DQpJTlRFUk5FVC1EUkFGVCAgICAgICAgICAgICAgICAgICAgICAgICAgICAgMjQgTm92ZW1iZXIg
MjAwMCANCiAgICAgICAgICAgICAgICAgICBMREFQIFN1YmVudHJ5IFNjaGVtYSANCg0KQSB2YWx1
ZSBvZiBGQUxTRSBpcyBpbXBsaWVzIHRoYXQgaW5oZXJpdGFuY2UgaXMgbm90IHRvIGJlIA0KYmxv
Y2tlZCwgYnV0IHNwZWNpZmljIHNlbWFudGljIGludGVycHJldGF0aW9uIGlzIGxlZnQgdG8gDQph
cHBsaWNhdGlvbnMgKHdobyBtYXkgc3BlY2lmeSBhbnkgb2YgYSB2YXJpZXR5IG9mIHBvbGljeSAN
CmFnZ3JlZ2F0aW9uIG1lY2hhbmlzbXMgdG8gZGVmaW5lIGhvdyBpbmhlcml0ZWQgcG9saWN5IGlz
IHRvIA0KYmUgbWl4ZWQgd2l0aCBsb2NhbGx5IGRlZmluZWQgcG9saWN5KS4gDQoNCg0KDQo2LiBW
aXNpYmlsaXR5IENvbnRyb2xzIA0KDQoNCjYuMSBsZGFwU3ViZW50cmllc0NvbnRyb2wgDQoNClRo
aXMgY29udHJvbCBpcyBpbmNsdWRlZCBpbiB0aGUgc2VhcmNoUmVxdWVzdCBtZXNzYWdlIGFzIA0K
cGFydCBvZiB0aGUgY29udHJvbHMgZmllbGQgb2YgdGhlIExEQVBNZXNzYWdlLCBhcyBkZWZpbmVk
IA0KaW4gU2VjdGlvbiA0LjEuMTIgb2YgW1JGQzIyNTFdLiANCg0KVGhlIGNvbnRyb2xUeXBlIGlz
IHNldCB0byAiMS4zLjYuMS40LjEuNzYyOC41LjEwMS4xIi4gVGhlIA0KY3JpdGljYWxpdHkgTUFZ
IGJlIHNldCB0byBlaXRoZXIgVFJVRSBvciBGQUxTRS4gIFRoZSANCmNvbnRyb2xWYWx1ZSBpcyBh
YnNlbnQuICAgDQoNClRoZXJlIGlzIG5vIGNvcnJlc3BvbmRpbmcgcmVzcG9uc2UgY29udHJvbCBk
ZWZpbmVkLiANCg0KTERBUCBzZXJ2ZXJzIHRoYXQgc3VwcG9ydCB0aGlzIGNvbnRyb2wgTVVTVCB0
cmVhdCBMREFQIA0KU3ViZW50cmllcyBhcyAib3BlcmF0aW9uYWwgb2JqZWN0cyIgaW4gbXVjaCB0
aGUgc2FtZSB3YXkgDQp0aGF0ICJvcGVyYXRpb25hbCBhdHRyaWJ1dGVzIiBhcmUgbm90IHJldHVy
bmVkIGluIHNlYXJjaCANCnJlc3VsdHMgYW5kIFtYLjUxMV0gcmVhZCBvcGVyYXRpb25zIHdoZW4g
b25seSB1c2VyIA0KYXR0cmlidXRlcyBhcmUgcmVxdWVzdGVkLiAgDQoNCkVudHJpZXMgd2hpY2gg
YXJlIG5vdCBMREFQIFN1YmVudHJpZXMgbWF5IHN0aWxsIGJlIA0KcmVmZXJlbmNlZCBpbiB0aGUg
YmFzZSBvYmplY3Qgb2Ygc2VhcmNoIG9wZXJhdGlvbnMgd2hlcmUgDQp0aGUgbGRhcFN1YmVudHJp
ZXNDb250cm9sIGlzIHByZXNlbnQgaW4gdGhlIHJlcXVlc3QuICAgDQoNCg0KNi4xLjEgTERBUCBT
ZWFyY2ggd2l0aCBzY29wZSBvdGhlciB0aGFuIGJhc2VPYmplY3QgDQoNClRoZSBsZGFwU3ViZW50
cmllc0NvbnRyb2wgaXMgZGVmaW5lZCBmb3IgTERBUCB0byBzaWduYWwgdG8gDQpMREFQIFNlYXJj
aCBvcGVyYXRpb25zIHRoYXQgT05MWSBMREFQIFN1YmVudHJpZXMgYXJlIHRvIGJlIA0KaW5jbHVk
ZWQgaW4gdGhlIHJldHVybiBzZXQgb2YgZW50cmllcyBmb3IgdGhlIFNlYXJjaCwgDQpwcm92aWRl
ZCBvdGhlciBTZWFyY2ggY3JpdGVyaWEgKHN1Y2ggYXMgc2NvcGUgYW5kIGZpbHRlcikgDQphcmUg
c2F0aXNmaWVkLiAgV2hlbiBsZGFwU3ViZW50cmllc0NvbnRyb2wgaXMgTk9UIGluY2x1ZGVkIA0K
aW4gYSBTZWFyY2ggcmVxdWVzdCBvbiBhIHNlcnZlciB0aGF0IHN1cHBvcnRzIHRoZSBjb250cm9s
LCANCkxEQVAgU3ViZW50cmllcyBNVVNUIGJlIG9taXR0ZWQgZnJvbSB0aGUgcmV0dXJuIHNldCAo
d2l0aCANCnRoZSBzaW5nbGUgZXhjZXB0aW9uIGRlc2NyaWJlZCBpbiBTZWFyY2ggRmlsdGVyIFZp
c2liaWxpdHksIA0KYmVsb3cpLiANCg0KDQoNCg0KUmVlZCAgICAgICAgICAgICAgICAgICAgICAg
ICAgICAgICAgICAgICAgICAgICAgICAgW1BhZ2UgN10gDQogICAgICAgICAgICAgICAgICAgIEV4
cGlyZXMgTWF5IDI0LCAyMDAxIA0KIA0MDQoNCg0KSU5URVJORVQtRFJBRlQgICAgICAgICAgICAg
ICAgICAgICAgICAgICAgIDI0IE5vdmVtYmVyIDIwMDAgDQogICAgICAgICAgICAgICAgICAgTERB
UCBTdWJlbnRyeSBTY2hlbWEgDQoNCjYuMS4yIExEQVAgU2VhcmNoIHdpdGggc2NvcGUgb2YgYmFz
ZU9iamVjdCANCg0KRm9yIFNlYXJjaCBvcGVyYXRpb25zIHdpdGggYSBzY29wZSB2YWx1ZSBvZiBi
YXNlT2JqZWN0LCB0aGUgDQpwcmVzZW5jZSBvciBhYnNlbmNlIG9mIHRoZSBsZGFwU3ViZW50cmll
c0NvbnRyb2wgTVVTVCBiZSANCmlnbm9yZWQuICBTcGVjaWZpY2FsbHksIGJhc2VPYmplY3Qgc2Vh
cmNoZXMgYXBwbGllZCB0byANCmxkYXBTdWJFbnRyeSBlbnRyaWVzIE1VU1QgYmUgZXZhbHVhdGVk
IGJ5IFNlYXJjaCBhcyBpZiB0aGUgDQpsZGFwU3ViZW50cmllc0NvbnRyb2wgaXMgcHJlc2VudCwg
ZXZlbiBpZiBpdCBpcyBhYnNlbnQuICANCg0KVGhpcyBwcm92aXNpb24gaXMgaW50ZW5kZWQgdG8g
cHJlc2VydmUgdGhlIGJlaGF2aW9yIG9mIA0KW1guNTExXSBSZWFkIG9wZXJhdGlvbnMsIHdoaWNo
IGFyZSBub3QgYWZmZWN0ZWQgYnkgdGhlIA0KW1guNTExXSBzdWJlbnRyaWVzIGNvbnRyb2wgKHNl
ZSBDb3JyZXNwb25kZW5jZSB0byBYLjUwMCwgDQpiZWxvdyksIGFuZCBiZWNhdXNlIGl0IHdvdWxk
IHNlZW0gc2lsbHkgdG8gYmVoYXZlIA0Kb3RoZXJ3aXNlLiANCg0KDQo2LjEuMyBPdGhlciBMREFQ
IG9wZXJhdGlvbnMgDQoNClRoZSBsZGFwU3ViZW50cmllc0NvbnRyb2wgaXMgbm90IGRlZmluZWQg
Zm9yIGFueSBMREFQIA0Kb3BlcmF0aW9uIG90aGVyIHRoYW4gU2VhcmNoLiAgSG93ZXZlciwgYW4g
TERBUHYzIEV4dGVuc2lvbiANCk1BWSBkZWZpbmUgYSB1c2Ugb2YgdGhpcyBjb250cm9sIHdpdGgg
dGhhdCBleHRlbnNpb24gYXMgDQpsb25nIGFzIHN1Y2ggdXNlIGlzIGNvbnNpc3RlbnQgd2l0aCB0
aGlzIHNwZWNpZmljYXRpb24uIA0KDQoNCjYuMS40IENvcnJlc3BvbmRlbmNlIHRvIFguNTAwIFtY
LjUxMV0gDQoNCkluIFtYLjUxMV0gYSBTZXJ2aWNlQ29udHJvbCBvcHRpb24gaXMgdXNlZCB0byBn
b3Zlcm4gdGhlIA0KdmlzaWJpbGl0eSBvZiBbWC41MDFdIHN1YmVudHJpZXMuICBUaGUgc3ViZW50
cnkgDQpTZXJ2aWNlQ29udHJvbCBvcHRpb24gaXMgYSBzcGVjaWZpYyBiaXQgb2YgYSBiaXRzdHJp
bmcgDQp0aGF0LCB3aGVuIHNldCB0byBUUlVFIGluIHRoZSBjb21tb24gYXJndW1lbnRzIG9mIGFu
IFguNTAwIA0KU2VhcmNoIG9yIExpc3Qgb3BlcmF0aW9uLCBpbmRpY2F0ZXMgdGhhdCB0aGUgb3Bl
cmF0aW9uIGlzIA0KdG8gYWNjZXNzIE9OTFkgdGhlIHN1YmVudHJpZXMgZm91bmQgaW4gdGhlIGNv
bnRleHQgb2YgdGhlIA0KbGlzdCBvciBzZWFyY2guICBJbiBmYWN0LCBub3JtYWwgZW50cmllcyBh
cmUgZXhwbGljaXRseSBOT1QgDQpyZXR1cm5lZCBpbiB0aGUgcmVzdWx0IG9mIGEgbGlzdCBvciBz
ZWFyY2ggb3BlcmF0aW9uIHdoZW4gDQp0aGUgWC41MDAgc3ViZW50cmllcyBTZXJ2aWNlQ29udHJv
bCBpcyBzZXQuICAgDQoNCkVudHJpZXMgd2hpY2ggYXJlIG5vdCBzdWJlbnRyaWVzIG1heSBzdGls
bCBiZSByZWZlcmVuY2VkIGluIA0KdGhlIGJhc2Ugb2JqZWN0IG9mIGxpc3QgYW5kIHNlYXJjaCBv
cGVyYXRpb25zIHdoZXJlIHRoZSANCnN1YmVudHJpZXMgY29udHJvbCBpcyBzZXQuICAgDQoNClRo
ZSBbWC41MTFdIHN1YmVudHJpZXMgU2VydmljZUNvbnRyb2wgaGFzIG5vIG1lYW5pbmcgZm9yIA0K
b3BlcmF0aW9ucyBvdGhlciB0aGFuIFNlYXJjaCBhbmQgTGlzdCAoaS5lLiwgUmVhZCwgTW9kaWZ5
LCANCkRlbGV0ZSwgZXRjLikuIA0KDQpJbiBbWC41MDFdLCB0aGUgc2NvcGUgb2YgYSBzdWJlbnRy
eSBpcyBhIHN1YnRyZWUgb3Igc3VidHJlZSANCnJlZmluZW1lbnQuICBUaGUgbGRhcFN1YkVudHJ5
IGNsYXNzIGRlZmluZWQgaW4gdGhpcyANCmRvY3VtZW50IHByb3ZpZGVzIG5vIG1lY2hhbmlzbSB0
byBkZWZpbmUgYSBzdWJ0cmVlIA0KcmVmaW5lbWVudC4gIA0KDQoNClJlZWQgICAgICAgICAgICAg
ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIFtQYWdlIDhdIA0KICAgICAgICAgICAg
ICAgICAgICBFeHBpcmVzIE1heSAyNCwgMjAwMSANCiANDA0KDQoNCklOVEVSTkVULURSQUZUICAg
ICAgICAgICAgICAgICAgICAgICAgICAgICAyNCBOb3ZlbWJlciAyMDAwIA0KICAgICAgICAgICAg
ICAgICAgIExEQVAgU3ViZW50cnkgU2NoZW1hIA0KDQo2LjIgU2VhcmNoIEZpbHRlciBWaXNpYmls
aXR5ICANCg0KTERBUCBzZXJ2ZXJzIE1VU1QgaW1wbGVtZW50IHRoZSBmb2xsb3dpbmcgc3BlY2lh
bCBoYW5kbGluZyANCm9mIGxkYXBTdWJFbnRyeSBlbnRyaWVzOiBzZWFyY2ggb3BlcmF0aW9ucyB3
aGljaCBpbmNsdWRlIGEgDQpmaWx0ZXIgIm9iamVjdGNsYXNzPWxkYXBTdWJFbnRyeSIgTVVTVCBp
bmNsdWRlIGVudHJpZXMgDQpkZXJpdmVkIGZyb20gdGhlIGxkYXBTdWJFbnRyeSBjbGFzcyBpbiB0
aGUgc2NvcGUgb2YgdGhlaXIgDQpvcGVyYXRpb25zLCByZWdhcmRsZXNzIG9mIHdoZXRoZXIgdGhl
IGxkYXBTdWJlbnRyaWVzQ29udHJvbCANCmlzIGluY2x1ZGVkIGluIHRoZSBTZWFyY2ggb3Igbm90
LiAgIA0KDQpUaGlzIG1ldGhvZCBvZiByZXF1ZXN0aW5nIHRoZSBvcGVyYXRpb24gYmUgYXBwbGll
ZCB0byANCmVudHJpZXMgb2YgbGRhcFN1YkVudHJ5IGNsYXNzIGlzIGludHVpdGl2ZSwgYW5kIGlz
IA0Kc3BlY2lmaWVkIHRvIG1haW50YWluIGNvbnNpc3RlbmN5IHdpdGggcHJldmlvdXMgZHJhZnRz
IG9mIA0KdGhpcyBkb2N1bWVudC4gDQoNCkRldmVsb3BlcnMgU0hPVUxEIHVzZSB0aGUgY29udHJv
bCBsZGFwU3ViZW50cmllc0NvbnRyb2wgaW4gDQpsaWV1IG9mIHRoZSBTZWFyY2ggRmlsdGVyIG1l
dGhvZCBvZiBzZWFyY2hpbmcgZm9yIExEQVAgDQpTdWJlbnRyaWVzLCBhcyB0aGUgU2VhcmNoIEZp
bHRlciBtZXRob2QgTUFZIGJlIGRlcHJlY2lhdGVkIA0KaW4gdGhlIGZ1dHVyZS4gDQoNCg0KDQo3
LiBTZWN1cml0eSBDb25zaWRlcmF0aW9ucyANCg0KTERBUCBTdWJlbnRyaWVzIHdpbGwgZnJlcXVl
bnRseSBiZSB1c2VkIHRvIGhvbGQgZGF0YSB3aGljaCANCnJlZmxlY3RzIGVpdGhlciB0aGUgYWN0
dWFsIG9yIGludGVuZGVkIGJlaGF2aW9yIG9mIHRoZSANCmRpcmVjdG9yeSBzZXJ2aWNlLiAgQXMg
c3VjaCwgcGVybWlzc2lvbiB0byByZWFkIHN1Y2ggDQplbnRyaWVzIE1BWSBuZWVkIHRvIGJlIHJl
c3RyaWN0ZWQgdG8gYXV0aG9yaXplZCB1c2Vycy4gIA0KTW9yZSBpbXBvcnRhbnRseSwgSUYgYSBk
aXJlY3Rvcnkgc2VydmljZSB0cmVhdHMgdGhlIA0KaW5mb3JtYXRpb24gaW4gYW4gTERBUCBTdWJl
bnRyeSBhcyB0aGUgYXV0aG9yaXRhdGl2ZSBzb3VyY2UgDQpvZiBwb2xpY3kgdG8gYmUgdXNlZCB0
byBjb250cm9sIHRoZSBiZWhhdmlvciBvZiB0aGUgDQpkaXJlY3RvcnksIHRoZW4gcGVybWlzc2lv
biB0byBjcmVhdGUsIG1vZGlmeSwgb3IgZGVsZXRlIA0Kc3VjaCBlbnRyaWVzIE1VU1QgYmUgY2Fy
ZWZ1bGx5IHJlc3RyaWN0ZWQgdG8gYXV0aG9yaXplZCANCmFkbWluaXN0cmF0b3JzLiANCg0KVGhp
cyBzcGVjaWZpY2F0aW9uIGRlZmluZXMgYSBwb2xpY3kgaW5oZXJpdGFuY2UgbW9kZWwgdGhhdCAN
CmFsbG93cyBzdWJvcmRpbmF0ZSBhZG1pbmlzdHJhdG9ycyB0byBvdmVyLXJpZGUgcG9saWN5IA0K
ZGVmaW5lZCBieSBhZG1pbmlzdHJhdG9ycyBvZiBhZG1pbmlzdHJhdGl2ZSBhcmVhcyBzdXBlcmlv
ciANCnRvIHRoZSBsb2NhbCBhZG1pbmlzdHJhdGl2ZSBhcmVhLiAgTm8gbWVjaGFuaXNtIGlzIGRl
ZmluZWQgDQpoZXJlIHRvIGtlZXAgbG9jYWwgYWRtaW5pc3RyYXRvcnMgZnJvbSBvdmVyLXJpZGlu
ZyBzdWNoIA0KaW5oZXJpdGVkIHBvbGljeS4gIEltcGxlbWVudGF0aW9ucyB0aGF0IGludGVuZCB0
byBwcm92aWRlIA0Kc3VjaCBjb250cm9sIG92ZXIgdGhlIGFjdGlvbnMgb2Ygc3Vib3JkaW5hdGUg
YWRtaW5pc3RyYXRvcnMgDQp3aWxsIHJlcXVpcmUgYWRkaXRpb25hbCBzZW1hbnRpY3MgKGFuZCBw
b3NzaWJseSBzeW50YXgpLiANCg0KDQoNCg0KDQoNCg0KUmVlZCAgICAgICAgICAgICAgICAgICAg
ICAgICAgICAgICAgICAgICAgICAgICAgICAgW1BhZ2UgOV0gDQogICAgICAgICAgICAgICAgICAg
IEV4cGlyZXMgTWF5IDI0LCAyMDAxIA0KIA0MDQoNCg0KSU5URVJORVQtRFJBRlQgICAgICAgICAg
ICAgICAgICAgICAgICAgICAgIDI0IE5vdmVtYmVyIDIwMDAgDQogICAgICAgICAgICAgICAgICAg
TERBUCBTdWJlbnRyeSBTY2hlbWEgDQoNCjguIFJlZmVyZW5jZXMgDQoNCltSRkMyMTE5XSBTLiBC
cmFkbmVyLCAiS2V5IHdvcmRzIGZvciB1c2UgaW4gUkZDcyB0byANCkluZGljYXRlIFJlcXVpcmVt
ZW50IExldmVscyIsIFJGQyAyMTE5LCBNYXJjaCAxOTk3IA0KDQpbUkZDMjI1MV0gUy4gS2lsbGUs
IE0uIFdhaGwsIGFuZCBULiBIb3dlcywgIkxpZ2h0d2VpZ2h0IA0KRGlyZWN0b3J5IEFjY2VzcyBQ
cm90b2NvbCAodjMpIiwgUkZDIDIyNTEsIERlY2VtYmVyIDE5OTcgDQoNCltYLjUwMV0gSVRVLVQg
UmVjLiBYLjUwMSwgIlRoZSBEaXJlY3Rvcnk6IE1vZGVscyIsIDE5OTMgYW5kIA0Kc3Vic2VxdWVu
dCB2ZXJzaW9ucyANCg0KW1guNTExXSBJVFUtVCBSZWMuIFguNTAxLCAiVGhlIERpcmVjdG9yeTog
QWJzdHJhY3QgU2VydmljZSANCkRlZmluaXRpb24iLCAxOTkzIGFuZCBzdWJzZXF1ZW50IHZlcnNp
b25zIA0KDQoNCg0KOS4gQ29weXJpZ2h0IE5vdGljZSANCg0KQ29weXJpZ2h0IChDKSBUaGUgSW50
ZXJuZXQgU29jaWV0eSAoMjAwMCkuIEFsbCBSaWdodHMgDQpSZXNlcnZlZC4gIA0KIA0KVGhpcyBk
b2N1bWVudCBhbmQgdHJhbnNsYXRpb25zIG9mIGl0IG1heSBiZSBjb3BpZWQgYW5kIA0KZnVybmlz
aGVkIHRvIG90aGVycywgYW5kIGRlcml2YXRpdmUgd29ya3MgdGhhdCBjb21tZW50IG9uIA0Kb3Ig
b3RoZXJ3aXNlIGV4cGxhaW4gaXQgb3IgYXNzaXN0IGluIGl0cyBpbXBsZW1lbnRhdGlvbiBtYXkg
DQpiZSBwcmVwYXJlZCwgY29waWVkLCBwdWJsaXNoZWQgYW5kIGRpc3RyaWJ1dGVkLCBpbiB3aG9s
ZSBvciANCmluIHBhcnQsIHdpdGhvdXQgcmVzdHJpY3Rpb24gb2YgYW55IGtpbmQsIHByb3ZpZGVk
IHRoYXQgdGhlIA0KYWJvdmUgY29weXJpZ2h0IG5vdGljZSBhbmQgdGhpcyBwYXJhZ3JhcGggYXJl
IGluY2x1ZGVkIG9uIA0KYWxsIHN1Y2ggY29waWVzIGFuZCBkZXJpdmF0aXZlIHdvcmtzLiBIb3dl
dmVyLCB0aGlzIA0KZG9jdW1lbnQgaXRzZWxmIG1heSBub3QgYmUgbW9kaWZpZWQgaW4gYW55IHdh
eSwgc3VjaCBhcyBieSANCnJlbW92aW5nIHRoZSBjb3B5cmlnaHQgbm90aWNlIG9yIHJlZmVyZW5j
ZXMgdG8gdGhlIEludGVybmV0IA0KU29jaWV0eSBvciBvdGhlciBJbnRlcm5ldCBvcmdhbml6YXRp
b25zLCBleGNlcHQgYXMgbmVlZGVkIA0KZm9yIHRoZSBwdXJwb3NlIG9mIGRldmVsb3BpbmcgSW50
ZXJuZXQgc3RhbmRhcmRzIGluIHdoaWNoIA0KY2FzZSB0aGUgcHJvY2VkdXJlcyBmb3IgY29weXJp
Z2h0cyBkZWZpbmVkIGluIHRoZSBJbnRlcm5ldCANClN0YW5kYXJkcyBwcm9jZXNzIG11c3QgYmUg
Zm9sbG93ZWQsIG9yIGFzIHJlcXVpcmVkIHRvIA0KdHJhbnNsYXRlIGl0IGludG8gbGFuZ3VhZ2Vz
IG90aGVyIHRoYW4gRW5nbGlzaC4gDQogDQpUaGUgbGltaXRlZCBwZXJtaXNzaW9ucyBncmFudGVk
IGFib3ZlIGFyZSBwZXJwZXR1YWwgYW5kIA0Kd2lsbCBub3QgYmUgcmV2b2tlZCBieSB0aGUgSW50
ZXJuZXQgU29jaWV0eSBvciBpdHMgDQpzdWNjZXNzb3JzIG9yIGFzc2lnbnMuIA0KIA0KVGhpcyBk
b2N1bWVudCBhbmQgdGhlIGluZm9ybWF0aW9uIGNvbnRhaW5lZCBoZXJlaW4gaXMgDQpwcm92aWRl
ZCBvbiBhbiAiQVMgSVMiIGJhc2lzIGFuZCBUSEUgSU5URVJORVQgU09DSUVUWSBBTkQgDQpUSEUg
SU5URVJORVQgRU5HSU5FRVJJTkcgVEFTSyBGT1JDRSBESVNDTEFJTVMgQUxMIA0KV0FSUkFOVElF
UywgRVhQUkVTUyBPUiBJTVBMSUVELCBJTkNMVURJTkcgQlVUIE5PVCBMSU1JVEVEIA0KVE8gQU5Z
IFdBUlJBTlRZIFRIQVQgVEhFIFVTRSBPRiBUSEUgSU5GT1JNQVRJT04gSEVSRUlOIFdJTEwgDQpO
T1QgSU5GUklOR0UgQU5ZIFJJR0hUUyBPUiBBTlkgSU1QTElFRCBXQVJSQU5USUVTIE9GIA0KTUVS
Q0hBTlRBQklMSVRZIE9SIEZJVE5FU1MgRk9SIEEgUEFSVElDVUxBUiBQVVJQT1NFLiIgDQoNCg0K
UmVlZCAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBbUGFnZSAx
MF0gDQogICAgICAgICAgICAgICAgICAgIEV4cGlyZXMgTWF5IDI0LCAyMDAxIA0KIA0MDQoNCg0K
SU5URVJORVQtRFJBRlQgICAgICAgICAgICAgICAgICAgICAgICAgICAgIDI0IE5vdmVtYmVyIDIw
MDAgDQogICAgICAgICAgICAgICAgICAgTERBUCBTdWJlbnRyeSBTY2hlbWEgDQoNCjEwLiBBY2tu
b3dsZWRnZW1lbnRzIA0KDQpUaGUgdXNlIG9mIHN1YkVudHJ5IG9iamVjdCBjbGFzcyB0byBzdG9y
ZSBSZXBsaWNhIGFuZCANClJlcGxpY2F0aW9uIEFncmVlbWVudCBpbmZvcm1hdGlvbiBpcyBkdWUg
cHJpbWFyaWx5IHRvIHRoZSANCmx1Y2lkIGV4cGxhbmF0aW9uIGJ5IE1hcmsgV2FobCwgKHRoZW4g
b2YgSW5ub3NvZnQpLCBvZiBob3cgDQp0aGV5IGNvdWxkIGJlIHVzZWQgYW5kIGV4dGVuZGVkLiAN
CiANClRoZSBJRVRGIHRha2VzIG5vIHBvc2l0aW9uIHJlZ2FyZGluZyB0aGUgdmFsaWRpdHkgb3Ig
c2NvcGUgDQpvZiBhbnkgaW50ZWxsZWN0dWFsIHByb3BlcnR5IG9yIG90aGVyIHJpZ2h0cyB0aGF0
IG1pZ2h0IGJlIA0KY2xhaW1lZCB0byBwZXJ0YWluIHRvIHRoZSBpbXBsZW1lbnRhdGlvbiBvciB1
c2Ugb2YgdGhlIA0KdGVjaG5vbG9neSBkZXNjcmliZWQgaW4gdGhpcyBkb2N1bWVudCBvciB0aGUg
ZXh0ZW50IHRvIA0Kd2hpY2ggYW55IGxpY2Vuc2UgdW5kZXIgc3VjaCByaWdodHMgbWlnaHQgb3Ig
bWlnaHQgbm90IGJlIA0KYXZhaWxhYmxlOyBuZWl0aGVyIGRvZXMgaXQgcmVwcmVzZW50IHRoYXQg
aXQgaGFzIG1hZGUgYW55IA0KZWZmb3J0IHRvIGlkZW50aWZ5IGFueSBzdWNoIHJpZ2h0cy4gSW5m
b3JtYXRpb24gb24gdGhlIA0KSUVURidzIHByb2NlZHVyZXMgd2l0aCByZXNwZWN0IHRvIHJpZ2h0
cyBpbiBzdGFuZGFyZHMtdHJhY2sgDQphbmQgc3RhbmRhcmRzLXJlbGF0ZWQgZG9jdW1lbnRhdGlv
biBjYW4gYmUgZm91bmQgaW4gQkNQLTExLiANCkNvcGllcyBvZiBjbGFpbXMgb2YgcmlnaHRzIG1h
ZGUgYXZhaWxhYmxlIGZvciBwdWJsaWNhdGlvbiANCmFuZCBhbnkgYXNzdXJhbmNlcyBvZiBsaWNl
bnNlcyB0byBiZSBtYWRlIGF2YWlsYWJsZSwgb3IgdGhlIA0KcmVzdWx0IG9mIGFuIGF0dGVtcHQg
bWFkZSB0byBvYnRhaW4gYSBnZW5lcmFsIGxpY2Vuc2Ugb3IgDQpwZXJtaXNzaW9uIGZvciB0aGUg
dXNlIG9mIHN1Y2ggcHJvcHJpZXRhcnkgcmlnaHRzIGJ5IA0KaW1wbGVtZW50ZXJzIG9yIHVzZXJz
IG9mIHRoaXMgc3BlY2lmaWNhdGlvbiBjYW4gYmUgb2J0YWluZWQgDQpmcm9tIHRoZSBJRVRGIFNl
Y3JldGFyaWF0LiANCiANClRoZSBJRVRGIGludml0ZXMgYW55IGludGVyZXN0ZWQgcGFydHkgdG8g
YnJpbmcgdG8gaXRzIA0KYXR0ZW50aW9uIGFueSBjb3B5cmlnaHRzLCBwYXRlbnRzIG9yIHBhdGVu
dCBhcHBsaWNhdGlvbnMsIA0Kb3Igb3RoZXIgcHJvcHJpZXRhcnkgcmlnaHRzIHdoaWNoIG1heSBj
b3ZlciB0ZWNobm9sb2d5IHRoYXQgDQptYXkgYmUgcmVxdWlyZWQgdG8gcHJhY3RpY2UgdGhpcyBz
dGFuZGFyZC4gUGxlYXNlIGFkZHJlc3MgDQp0aGUgaW5mb3JtYXRpb24gdG8gdGhlIElFVEYgRXhl
Y3V0aXZlIERpcmVjdG9yLiANCg0KDQoxMS4gQXV0aG9yJ3MgQWRkcmVzcyANCg0KICAgICBFZHdh
cmRzIEUuIFJlZWQgDQogICAgIFJlZWQtTWF0dGhld3MsIEluYy4gDQogICAgIDEwNjQgRSAxNDAg
Tm9ydGggDQogICAgIExpbmRvbiwgVVQgIDg0MDQyIA0KICAgICBVU0EgDQogICAgIEUtbWFpbDog
ZWVyQG9uY2FsbGRiYS5jb20gIA0KICAgICAgDQogICAgIExEVVAgTWFpbGluZyBMaXN0OiBpZXRm
LWxkdXBAaW1jLm9yZyAgDQogICAgIExEQVBFWFQgTWFpbGluZyBMaXN0OiBpZXRmLWxkYXBleHRA
bmV0c2NhcGUuY29tIA0KDQoNCg0KDQoNCg0KDQoNClJlZWQgICAgICAgICAgICAgICAgICAgICAg
ICAgICAgICAgICAgICAgICAgICAgICAgW1BhZ2UgMTFdIA0KICAgICAgICAgICAgICAgICAgICBF
eHBpcmVzIE1heSAyNCwgMjAwMSANCiANDA0K

--=_FEA5D755.62036FBD--



From list@netscape.com  Fri Nov 24 17:15:47 2000
Received: from netscape.com (h-205-217-237-47.netscape.com [205.217.237.47])
	by ietf.org (8.9.1a/8.9.1a) with SMTP id RAA10000
	for <ldapext-archive@odin.ietf.org>; Fri, 24 Nov 2000 17:15:46 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.10.0/8.10.0) with ESMTP id eAOM6PD12854;
	Fri, 24 Nov 2000 14:06:25 -0800 (PST)
Received: (from list@localhost)
	by aka.mcom.com (8.10.0/8.10.0) id eAOMEEI06696;
	Fri, 24 Nov 2000 14:14:14 -0800 (PST)
Resent-Date: Fri, 24 Nov 2000 14:14:14 -0800 (PST)
Message-Id: <sa1e85c1.018@reed.oncalldba.com>
X-Mailer: Novell GroupWise Internet Agent 5.5.2.1
Date: Fri, 24 Nov 2000 15:14:06 -0700
From: "Ed Reed" <eer@OnCallDBA.COM>
To: <ietf-ldapext@netscape.com>
Subject: Fwd: Re: draft-ietf-ldup-subentry-06.txt
Mime-Version: 1.0
Content-Type: multipart/mixed; boundary="=_85DEAC21.7C1D71A3"
Resent-Message-ID: <"S40zCC.A.WoB.1guH6"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com

--=_85DEAC21.7C1D71A3
Content-Type: text/plain; charset=US-ASCII
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable

Sorry, I blew it. This is still the document I plan to discuss at the =
meeting in December.

=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
Ed Reed
Reed-Matthews, Inc.
+1 801 796 7065
http://www.Reed-Matthews.COM

--=_85DEAC21.7C1D71A3
Content-Type: message/rfc822

Received: from ietf.org
	(odin.ietf.org [132.151.1.176])
	by reed.oncalldba.com; Fri, 24 Nov 2000 15:10:29 -0700
Received: by ietf.org (8.9.1a/8.9.1a) id RAA08869;
	Fri, 24 Nov 2000 17:10:27 -0500 (EST)
Date: Fri, 24 Nov 2000 17:10:27 -0500 (EST)
Message-Id: <200011242210.RAA08869@ietf.org>
To: eer@OnCallDBA.COM
Subject: Re: draft-ietf-ldup-subentry-06.txt
References: <sa1e84d5.014@reed.oncalldba.com>
In-Reply-To: <sa1e84d5.014@reed.oncalldba.com>
X-URL: http://www.ietf.org/
Subject: Autoreply from Internet Draft Submission Manager
From: ietfauto@ietf.org (Internet Draft Submission Manager)
MIME-Version: 1.0

Greetings,

We are sorry, but the cut-off for Internet-Draft submissions was Friday,
November 24, 2000 at 5pm ET. Your submission will not be retained (i.e. you
need to resubmit) after December 10.

Any submissions received prior to December 11, 2000 will not be retained;
they must be resubmitted. Internet-Draft submissions received on or after
December 11 will be processed. However, Internet-Draft announcements will
not be sent until after the meeting concludes.

If you receive this announcement, your submission will NOT be processed.

Thank you for your understanding.


IETF Secretariat

--=_85DEAC21.7C1D71A3--



From list@netscape.com  Fri Nov 24 18:05:35 2000
Received: from netscape.com (h-205-217-237-47.netscape.com [205.217.237.47])
	by ietf.org (8.9.1a/8.9.1a) with SMTP id SAA20324
	for <ldapext-archive@odin.ietf.org>; Fri, 24 Nov 2000 18:05:35 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.10.0/8.10.0) with ESMTP id eAOMtSD15624;
	Fri, 24 Nov 2000 14:55:29 -0800 (PST)
Received: (from list@localhost)
	by aka.mcom.com (8.10.0/8.10.0) id eAON3Is16938;
	Fri, 24 Nov 2000 15:03:18 -0800 (PST)
Resent-Date: Fri, 24 Nov 2000 15:03:18 -0800 (PST)
Message-ID: <75C9A75D295AD31184E70008C79189D204F40028@zcard00b.ca.nortel.com>
From: "Luc Lanoue" <llanoue@nortelnetworks.com>
To: ietf-ldapext <ietf-ldapext@netscape.com>
Subject: Help unsubscribing from this list...Please!
Date: Fri, 24 Nov 2000 17:01:25 -0600
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2652.35)
Content-Type: multipart/alternative;
              boundary="----_=_NextPart_001_01C0566A.78671EC0"
Resent-Message-ID: <"gBA9h.A.YIE.1OvH6"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com

This message is in MIME format. Since your mail reader does not understand
this format, some or all of this message may not be legible.

------_=_NextPart_001_01C0566A.78671EC0
Content-Type: text/plain;
	charset="iso-8859-1"


Can anyone tell me who the list administrator is. 

I'm having problems unsubscrib'ing from this list. Every time I try to
unsubscribe, it tells me that it can't find me, however it returns several
entries with my name. It also appears to be adding an entry with my name
every time I try to unsubscribe - and I tried lots of different ways. 

Thank you.

------_=_NextPart_001_01C0566A.78671EC0
Content-Type: text/html;
	charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2//EN">
<HTML>
<HEAD>
<META HTTP-EQUIV=3D"Content-Type" CONTENT=3D"text/html; =
charset=3Diso-8859-1">
<META NAME=3D"Generator" CONTENT=3D"MS Exchange Server version =
5.5.2652.35">
<TITLE>Help unsubscribing from this list...Please!</TITLE>
</HEAD>
<BODY>
<BR>

<P><FONT SIZE=3D2>Can anyone tell me who the list administrator is. =
</FONT>
</P>

<P><FONT SIZE=3D2>I'm having problems unsubscrib'ing from this list. =
Every time I try to unsubscribe, it tells me that it can't find me, =
however it returns several entries with my name. It also appears to be =
adding an entry with my name every time I try to unsubscribe - and I =
tried lots of different ways. </FONT></P>

<P><FONT SIZE=3D2>Thank you.</FONT>
</P>

</BODY>
</HTML>
------_=_NextPart_001_01C0566A.78671EC0--



From list@netscape.com  Fri Nov 24 18:14:21 2000
Received: from netscape.com (h-205-217-237-46.netscape.com [205.217.237.46])
	by ietf.org (8.9.1a/8.9.1a) with SMTP id SAA22383
	for <ldapext-archive@odin.ietf.org>; Fri, 24 Nov 2000 18:14:20 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.10.0/8.10.0) with ESMTP id eAOMxSs08573;
	Fri, 24 Nov 2000 14:59:28 -0800 (PST)
Received: (from list@localhost)
	by aka.mcom.com (8.10.0/8.10.0) id eAONC7w19133;
	Fri, 24 Nov 2000 15:12:07 -0800 (PST)
Resent-Date: Fri, 24 Nov 2000 15:12:07 -0800 (PST)
Message-Id: <200011242311.SAA21721@ietf.org>
Mime-Version: 1.0
Content-Type: Multipart/Mixed; Boundary="NextPart"
To: IETF-Announce: ;
Cc: ietf-ldapext@netscape.com
From: Internet-Drafts@ietf.org
Reply-to: Internet-Drafts@ietf.org
Subject: I-D ACTION:draft-ietf-ldapext-ldap-c-api-05.txt
Date: Fri, 24 Nov 2000 18:11:46 -0500
Sender: scoya@cnri.reston.va.us
Resent-Message-ID: <"Qy6E_D.A.pqE.GXvH6"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com

--NextPart

A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the LDAP Extension Working Group of the IETF.

	Title		: The C LDAP Application Program Interface
	Author(s)	: M. Smith, T. Howes, A. Herron, M. Wahl, A. Anantha
	Filename	: draft-ietf-ldapext-ldap-c-api-05.txt
	Pages		: 83
	Date		: 22-Nov-00
	
This document defines a C language application program interface (API)
to the Lightweight Directory Access Protocol (LDAP). This document
replaces the previous definition of this API, defined in RFC 1823,
updating it to include support for features found in version 3 of the
LDAP protocol.  New extended operation functions were added to support
LDAPv3 features such as controls.  In addition, other LDAP API changes
were made to support information hiding and thread safety.
 
The C LDAP API is designed to be powerful, yet simple to use. It defines
compatible synchronous and asynchronous interfaces to LDAP to suit a
wide variety of applications. This document gives a brief overview of
the LDAP model, then an overview of how the API is used by an applica-
tion program to obtain LDAP information.  The API calls are described in
detail, followed by appendices that provide example code demonstrating
use of the API, the namespace consumed by the API, a summary of require-
ments for API extensions, known incompatibilities with RFC 1823, and a
list of changes made since the last revision of this document.

A URL for this Internet-Draft is:
http://www.ietf.org/internet-drafts/draft-ietf-ldapext-ldap-c-api-05.txt

Internet-Drafts are also available by anonymous FTP. Login with the username
"anonymous" and a password of your e-mail address. After logging in,
type "cd internet-drafts" and then
	"get draft-ietf-ldapext-ldap-c-api-05.txt".

A list of Internet-Drafts directories can be found in
http://www.ietf.org/shadow.html 
or ftp://ftp.ietf.org/ietf/1shadow-sites.txt


Internet-Drafts can also be obtained by e-mail.

Send a message to:
	mailserv@ietf.org.
In the body type:
	"FILE /internet-drafts/draft-ietf-ldapext-ldap-c-api-05.txt".
	
NOTE:	The mail server at ietf.org can return the document in
	MIME-encoded form by using the "mpack" utility.  To use this
	feature, insert the command "ENCODING mime" before the "FILE"
	command.  To decode the response(s), you will need "munpack" or
	a MIME-compliant mail reader.  Different MIME-compliant mail readers
	exhibit different behavior, especially when dealing with
	"multipart" MIME messages (i.e. documents which have been split
	up into multiple messages), so check your local documentation on
	how to manipulate these messages.
		
		
Below is the data which will enable a MIME compliant mail reader
implementation to automatically retrieve the ASCII version of the
Internet-Draft.

--NextPart
Content-Type: Multipart/Alternative; Boundary="OtherAccess"

--OtherAccess
Content-Type: Message/External-body;
	access-type="mail-server";
	server="mailserv@ietf.org"

Content-Type: text/plain
Content-ID:	<20001122150004.I-D@ietf.org>

ENCODING mime
FILE /internet-drafts/draft-ietf-ldapext-ldap-c-api-05.txt

--OtherAccess
Content-Type: Message/External-body;
	name="draft-ietf-ldapext-ldap-c-api-05.txt";
	site="ftp.ietf.org";
	access-type="anon-ftp";
	directory="internet-drafts"

Content-Type: text/plain
Content-ID:	<20001122150004.I-D@ietf.org>

--OtherAccess--

--NextPart--




From list@netscape.com  Sat Nov 25 02:19:45 2000
Received: from netscape.com (h-205-217-237-47.netscape.com [205.217.237.47])
	by ietf.org (8.9.1a/8.9.1a) with SMTP id CAA04202
	for <ldapext-archive@odin.ietf.org>; Sat, 25 Nov 2000 02:19:45 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.10.0/8.10.0) with ESMTP id eAP7AHD07425;
	Fri, 24 Nov 2000 23:10:21 -0800 (PST)
Received: (from list@localhost)
	by aka.mcom.com (8.10.0/8.10.0) id eAP7I8c05888;
	Fri, 24 Nov 2000 23:18:08 -0800 (PST)
Resent-Date: Fri, 24 Nov 2000 23:18:08 -0800 (PST)
Date: Fri, 24 Nov 2000 23:18:01 -0800 (PST)
Message-Id: <200011250718.eAP7HoR08604@xwing.netscape.com>
From: kfgh@mailcity.com
To: Internet.Entrepreneurs@netscape.com
Subject:  America Online...WATCH OUT !
X-Reply-To:  kjnnb@mailcity.com
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: 7bit
Resent-Message-ID: <"LeLiPB.A.mbB.ue2H6"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com
Content-Transfer-Encoding: 7bit

You now have the opportunity to enroll FOR FREE in a new
online community that PAYS YOU TO BE A MEMBER and
were not talking peanuts.

AOL... Watch Out! 

Yes ..the GIANT has met It's Match !! 
America On Line. Prepare for Battle !!! 
This Company is  On A MISSION 
To Conquer the Internet world !! 

What you will be introduced to will 
Blow Your Mind. 

One of the world's largest advertising companies has taken on the duties of spreading 
the word and they will be doing this in a BIG WAY!!!! 


We're talking T.V., Radio, Billboards, Newspaper, and Magazines. They will be 
blasting it EVERYWHERE!!This is WORLD - WIDE !! 

Think about this ... If you had a chance to be in at the Beginning of America On Line 
and the chance to also *BUY INTO* AOL .. you would have made Money- An 
AWESOME serious amount Of MONEY !! 

You Now have the Same GOLDEN OPPORTUNITY to enroll  for FREE in a 
NEW .. MEGA . Online Community that PAYS YOU TO BE A MEMBER !! 

Your cost to enroll .. Totally FREE !! 
Just USE the  community and make the BIGGEST PROFITS EVER !! 

Join a Winning Team!! 

We are going to help every member reach their goal. If you Succeed, we Succeed!!! 

First,  become part of our Team! 

Come see for yourself and Register NOW!!!!
     

For More Information
Please email me at
mach2@angelfire.com
Please Put "Wealth"  in the  subject header

Thankyou,
Sarah Harrington




From list@netscape.com  Sat Nov 25 16:50:18 2000
Received: from netscape.com (h-205-217-237-46.netscape.com [205.217.237.46])
	by ietf.org (8.9.1a/8.9.1a) with SMTP id QAA20794
	for <ldapext-archive@odin.ietf.org>; Sat, 25 Nov 2000 16:50:18 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.10.0/8.10.0) with ESMTP id eAPLZbs04167;
	Sat, 25 Nov 2000 13:35:41 -0800 (PST)
Received: (from list@localhost)
	by aka.mcom.com (8.10.0/8.10.0) id eAPLmI611537;
	Sat, 25 Nov 2000 13:48:18 -0800 (PST)
Resent-Date: Sat, 25 Nov 2000 13:48:18 -0800 (PST)
Date: Sat, 25 Nov 2000 13:47:35 -0800 (PST)
Message-Id: <200011252147.eAPLlUD21227@ywing.netscape.com>
From: Bill.blankenship.inkeeper@QONG.apex.net
To: Friends.QCCV@netscape.com
Subject:  $25=$500,000 -EIXX
X-Reply-To:  inkeeper@apex.net
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: 7bit
Resent-Message-ID: <"Gk05MB.A.uzC.hODI6"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com
Content-Transfer-Encoding: 7bit

Dear Friend,

AS SEEN ON NATIONAL TV:

''Making over half million dollars every 4 to 5 months from your
home for an investment of only $25 U.S. Dollars expense one
time''

THANKS TO THE COMPUTER AGE AND THE INTERNET!
===============================================

BE A MILLIONAIRE LIKE OTHERS WITHIN A YEAR !!

Before you say ''Bull'' , please read the following. This is the
letter you have been hearing about on the news lately. Due to the
popularity of this letter on the internet, a national weekly news
program recently devoted an entire show to the investigation of
this program described below , to see if it really can make people
money.

The show also investigated whether or not the program was legal.
Their findings proved once and for all that there are 
''absolutely NO Laws prohibiting the participation in the program and if 
people can follow the simple instructions, they are bound to make
some mega bucks with only $25 out of pocket cost''.

DUE TO THE RECENT INCREASE OF POPULARITY & 
RESPECT THIS PROGRAM HAS ATTAINED, IT IS 
CURRENTLY WORKING BETTER THAN EVER.

This is what one had to say:

''Thanks to this profitable opportunity. I was approached
many times before but each time I passed on it. I am so glad
I finally joined just to see what one could expect in return
for the minimal effort and money required. To my astonishment, 
I received total $ 610,470.00 in 21 weeks, with money still 
coming in''.
Pam Hedland, Fort Lee, New Jersey.

-------------------------------------------------------------------------

Here is another testimonial:

''This program has been around for a long time but I never
believed in it. But one day when I received this again in
the mail I decided to gamble my $25 on it. I followed the
simple instructions and walaa ..... 3 weeks later the money
started to come in. First month I only made $240.00 but
the next 2 months after that I made a total of $290,000.00.
So far, in the past 8 months by re-entering the program,I
have made over $710,000.00 and I am playing it again.
The key to success in this program is to follow the simple
steps and NOT change anything .''

More testimonials later but first,

PRINT THIS NOW FOR YOUR FUTURE REFERENCE *******

$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$

If you would like to make at least $500,000 every 4 to 5 
months easily and comfortably, please read the following...THEN 
READ IT AGAIN and AGAIN !!!

$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$

FOLLOW THE SIMPLE INSTRUCTION BELOW AND YOUR
FINANCIAL DREAMS WILL COME TRUE, GUARANTEED!

INSTRUCTIONS:

**** Order all 5 reports shown on the list below.

**** For each report, send $5 CASH, THE NAME & NUMBER OF 
THE REPORT YOU ARE ORDERING and YOUR E-MAIL 
ADDRESS to the person whose name appears ON THAT LIST next to 
the report. MAKE SURE YOUR RETURN ADDRESS IS ON YOUR 
ENVELOPE TOP LEFT CORNER in case of any mail problems.

When you place your order, make sure you order each of the 5
reports. You will need all 5 reports so that you can save them on 
your computer and resell them.
YOUR TOTAL COST $5 X 5 = $25.00.

Within a few days you will receive, vie e-mail, each of the 5
reports from these 5 different individuals. Save them on your computer
so they will be accessible for you to send to the 1,000's of people
who will order them from you. Also make a floppy of these
reports and keep it on your desk in case something happen to your
computer.

IMPORTANT - DO NOT alter the names of the people who are
listed next to each report, or their sequence on the list, in
any way other than what is instructed below in step '' 1 through
6 '' or you will loose out on majority of your profits. Once you
understand the way this works, you will also see how it does not work 
if 
you change it.

Remember, this method has been tested, and if you alter, it
will NOT work!!! People have tried to put their friends/relatives names
on all five thinking they could get all the money. But it does not work 
this way. Believe us, we all have tried to be greedy and then nothing 
happened. So Do Not try to change anything other than what is 
instructed. Because if you do, it will not work for you. Remember, 
honesty reaps the reward!!!

1.. After you have ordered all 5 reports, take this advertisement
and REMOVE the name & address of the person in REPORT # 5. This
person has made it through the cycle and is no doubt counting
their fortune.

2.... Move the name & address in REPORT # 4 down TO REPORT # 5.

3.... Move the name & address in REPORT # 3 down TO REPORT # 4.

4.... Move the name & address in REPORT # 2 down TO REPORT # 3.

5.... Move the name & address in REPORT # 1 down TO REPORT # 2

6.... Insert YOUR name & address in the REPORT # 1 Position.

PLEASE MAKE SURE you copy every name & address 
ACCURATELY !
====================================================

Take this entire letter, with the modified list of names, and save
it on your computer. DO NOT MAKE ANY OTHER CHANGES.
Save this on a disk as well just in case if you loose any data.

To assist you with marketing your business on the internet, the
5 reports you purchase will provide you with invaluable
marketing information which includes how to send bulk e-mails legally,
where to find thousands of free classified ads and much more.

There are 2 Primary methods to get this venture going:

METHOD # 1 : BY SENDING BULK E-MAIL LEGALLY
============================================
let's say that you decide to start small, just to see how it
goes, and we will assume You and those involved send out only
5,000 e-mails each. Let's also assume that the mailing receive only a
0.2% response (the response could be much better but lets just
say it is only 0.2% . Also many people will send out hundreds of
thousands e-mails instead of only 5,000 each).

Continuing with this example, you send out only 5,000 e-mails.
With a 0.2% response, that is only 10 orders for report # 1.
Those 10 people responded by sending out 5,000 e-mail
each for a total of 50,000. Out of those 50,000 e-mails only
0.2% responded with orders. That's = 100 people responded
and ordered Report # 2. Those 100 people mail out 5,000
e-mails each for a total of 500,000 e-mails. The 0.2% response
to that is 1000 orders for Report # 3. Those 1000 people send 
out 5,000 e-mails each for a total of 5 million e-mails sent out. 
The 0.2% response to that is 10,000 orders for Report # 4. 
Those 10,000 people send out 5,000 e-mails each for a total of 
50,000,000 (50 million) e-mails. The 0.2% response to that is 
100,000 orders for Report # 5.

THAT'S 100,000 ORDERS TIMES $5 EACH = $500,000.00 (half 
million).

Your total income in this example is:
1..... $50 +
2..... $500 +
3..... $5,000 +
4..... $50,000 +
5..... $500,000 ......... Grand Total = $555,550.00

NUMBERS DO NOT LIE. GET A PENCIL & PAPER AND FIGURE
OUT THE WORST POSSIBLE RESPONSES AND NO MATTER
HOW YOU CALCULATE IT, YOU WILL STILL MAKE A LOT OF
MONEY !

------------------------------------------------------------------------------

REMEMBER FRIEND, THIS IS ASSUMING ONLY 10 PEOPLE
ORDERING OUT OF 5,000 YOU MAILED TO. Dare to think for
a moment what would happen if everyone, or half or even one 4th
of those people mailed 100,000 e-mails each or more? There are
over 150 million people on the internet worldwide and counting.
Believe me, many people will do just that, and more!

METHOD # 2 : BY PLACING FREE ADS ON THE INTERNET
===================================================
Advertising on the net is very very inexpensive and there are
hundreds of FREE places to advertise. Placing a lot of free ads
on the internet will easily get a larger response. We strongly
suggest you start with Method # 1 and add METHOD # 2 as you go
along.

For every $5 you receive, all you must do is e-mail them the Report
they ordered. That's it . Always provide same day service on all
orders. This will guarantee that the e-mail they send out, with your
name and address on it, will be prompt because they can not advertise 
until they receive the report.

____________ AVAILABLE REPORTS_____________________

ORDER EACH REPORT BY ITS NUMBER & NAME ONLY.

Notes: Always send $5 cash (U.S. CURRENCY) for each Report.
Checks NOT accepted. Make sure the cash is concealed by wrapping
it in atleast 2 sheets of paper. On one of those sheets of paper,
Write the NUMBER & the NAME of the Report you are ordering, 
YOUR E-MAIL ADDRESS and your name and postal address.

PLACE YOUR ORDER FOR THESE REPORTS NOW :
==============================================

REPORT # 1: ''The Insider's Guide to Advertising for Free on the Net''

Order Report # 1 from:

Bill Blankenship
8409 St. Rt. 80 East
Mayfield, Ky 42066 
__________________________________________________

REPORT # 2 : ''The Insider's Guide to Sending Bulk e-mail on the Net''

Order Report # 2 from :

LeeAnn Ng
1080 Warfield Avenue
Oakland , Ca 94610

__________________________________________________

REPORT # 3 : ''The Secret to Multilevel marketing on the net''

Order Report # 3 from: 

Vivian Kreisel
20 Appaloosa Lane
Ormond Beach, Fl 32174


___________________________________________________

REPORT # 4 : ''How to become a millionaire utilizing MLM & the Net''

Order Report # 4 from: 

Ted Kubiak
27 DePue Lane
Stroudsburg, Pa. 18360 
___________________________________________________

REPORT # 5 : ''HOW TO SEND 1 MILLION E-MAILS FOR FREE''

Order Report # 5 from:

Kim Hansen
Kyse Markvej 6, Kyse
4700 Naestved
Denmark 

__________________________________________________

$$$$$$$$$ YOUR SUCCESS GUIDELINES $$$$$$$$$$$

Follow these guidelines to guarantee your success:

If you do not receive at least 10 orders for Report #1 within 
2 weeks, continue sending e-mails until you do.

After you have received 10 orders, 2 to 3 weeks after that
you should receive 100 orders or more for REPORT # 2.
If you did not, continue advertising or sending e-mails until
you do.

Once you have received 100 or more orders for Report # 2,
YOU CAN RELAX, because the system is already working for
you , and the cash will continue to roll in !

THIS IS IMPORTANT TO REMEMBER : Every time your name 
is moved down on the list, you are placed in front of a 
different report. You can KEEP TRACK of your PROGRESS by watching 
which report people are ordering from you. IF YOU WANT TO 
GENERATE MORE INCOME SEND ANOTHER BATCH OF 
E-MAILS AND START THE WHOLE PROCESS AGAIN. 
There is NO LIMIT to the income you can generate from this 
business !!!
____________________________________________________

FOLLOWING IS A NOTE FROM THE ORIGINATOR OF THIS
PROGRAM:

"You have just received information that can give you 
financial freedom for the rest of your life, with NO RISK and JUST 
A LITTLE BIT OF EFFORT. You can make more money in the
next few weeks and months than you have ever imagined.

Follow the program EXACTLY AS INSTRUCTED. Do Not 
change it in any way. It works exceedingly well as it is 
now.Remember to e-mail a copy of this exciting report after you
have put your name and address in Report #1 and moved 
others to #2...........# 5 as instructed above. One of the people 
you send this to may send out 100,000 or more e-mails and your name 
will be on everyone of them. Remember though, the more you send 
out the more potential customers you will reach.

So my friend, I have given you the ideas, information,
materials and opportunity to become financially 
independent. IT IS UP TO YOU NOW !

************** MORE TESTIMONIALS ****************

'' My name is Mitchell. My wife , Jody and I live in 
Chicago.I am an accountant with a major U.S. Corporation and I 
make pretty good money. When I received this program I 
grumbled to Jody about receiving ''junk mail''. I made fun 
of the whole thing, spouting my knowledge of the population and
percentages involved. I ''knew'' it wouldn't work. Jody
totally ignored my supposed intelligence and few days later 
she jumped in with both feet. I made merciless fun of her, and 
was ready to lay the old ''I told you so'' on her when the 
thing didn't work. Well, the laugh was on me! Within 3 weeks she had 
received 50 responses. Within the next 45 days she had 
received a total of $ 147,200.00 all cash! I was shocked. I have
joined Jody in her ''hobby''.
Mitchell Wolf, M.D. 
,
Chicago, Illinois

------------------------------------------------------------

'' Not being the gambling type, it took me several weeks to
make up my mind to participate in this plan. But 
conservative that I am, I decided that the initial investment was so 
little that there was just no way that I wouldn't get enough 
orders to at least get my money back.

I was surprised when I found my medium size post office box
crammed with orders. I made $319,210.00 in the first 12
weeks. The nice thing about this deal is that it does not 
matter where people live. There simply isn't a better investment
with a faster return and so big''.
Dan Sondstrom, Alberta,
Canada

-----------------------------------------------------------

'' I had received this program before. I deleted it, but
later I wondered if I should have given it a try. Of 
course, I had no idea who to contact to get another copy, so I had to 
wait until I was e-mailed again by someone else.........11 
months passed then it luckily came again...... I did not delete 
this one! I made more than $490,000 on my first try and all 
the money came within 22 weeks''.
Susan De Suza,
New York, N.Y.


----------------------------------------------------

'' It really is a great opportunity to make relatively easy
money with little cost to you. I followed the simple
instructions carefully and within 10 days the money
started to come in. My first month I made $ 20, 560.00 
and by the end of third month my total cash count was 
$ 362,840.00. Life is beautiful, Thanx to internet''.
Fred Dellaca, Westport,
New Zealand

------------------------------------------------------------


ORDER YOUR REPORTS TODAY AND GET STARTED ON
YOUR ROAD TO FINANCIAL FREEDOM !

====================================================

If you have any questions of the legality of this program, contact the
Office of Associate Director for Marketing Practices, Federal Trade
Commission, Bureau of Consumer Protection, Washington, D.C.

////////////////////////////////////////////////
ONE TIME MAILING, NO NEED TO REMOVE
//////////////////////////////////////////////

This message is sent in compliance of the proposed bill SECTION 301.
per Section 301, Paragraph (a)(2)(C) of S. 1618. Further transmission 
to
you by the sender of this e-mail may be stopped at no cost to you by
sending a reply to : Sophie530@email.com with the word Remove in 
the subject line. This message is not intended for residents in the 
State of
Washington, screening of addresses has been done to the best of our
technical ability.


-------- T H E E N D ---------












From list@netscape.com  Sat Nov 25 18:35:40 2000
Received: from netscape.com (h-205-217-237-46.netscape.com [205.217.237.46])
	by ietf.org (8.9.1a/8.9.1a) with SMTP id SAA06668
	for <ldapext-archive@odin.ietf.org>; Sat, 25 Nov 2000 18:35:39 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.10.0/8.10.0) with ESMTP id eAPNLPs09038;
	Sat, 25 Nov 2000 15:21:25 -0800 (PST)
Received: (from list@localhost)
	by aka.mcom.com (8.10.0/8.10.0) id eAPNY7c29632;
	Sat, 25 Nov 2000 15:34:07 -0800 (PST)
Resent-Date: Sat, 25 Nov 2000 15:34:07 -0800 (PST)
Message-ID: <20001125233354.19442.qmail@nwcst091.netaddress.usa.net>
Date: 25 Nov 00 16:33:54 MST
From: Derek White <rose.piper@usa.net>
To: peskey@usa.net
Subject: FREE - Promote Your Website!
X-Mailer: USANET web-mailer (34FM.0700.4.03)
Mime-Version: 1.0
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 8bit
X-MIME-Autoconverted: from quoted-printable to 8bit by aka.mcom.com id eAPNY6v29599
Resent-Message-ID: <"Zpr4UC.A.lOH.uxEI6"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com
Content-Transfer-Encoding: 8bit

see remove instructions below.


I will give this FREE software, just for taking the time to visit my web
page:

* A Fantastic FFA Link Submission Program!
* A Fantastic Classified Ad-Submitter Program!
* A Fantastic Web Site Position Analyzer and Promotion Program!
* A Fantastic Email List Management Program!
* A Fully-Functional WYSIWYG Website Editor!
* One of the Best E-Mail Programs on the Net! 
* A Program to Rocket your Internet Connection to Warp Speed!
* A Free FTP Program!

Visit NOW: 
http://www.pcpages.com/piper281 

These valuable programs are yours - just visit my web page and follow
our simple instructions. Best of all - they're FREE.

Take advantage now. You won't find another offer like this on the web.

My wife says I'm crazy to be giving away so much
at once -- but somehow, I feel good about it.

Visit NOW:
http://www.pcpages.com/piper281   
Have a great day!

Derek White

-------------------------------------------------------------------------------------------
If I have received your email address in error, I apologise. If you wish to
be REMOVED just click on Reply - Subject = REMOVE. All removal
requests are handled personally and quickly once received, as long as
"REMOVE" is in the subject line. I have no wish to solicit you with
ads you don't want to receive..
-------------------------------------------------------------------------------------------


____________________________________________________________________
Get free email and a permanent address at http://www.netaddress.com/?N=1



From list@netscape.com  Sun Nov 26 10:29:37 2000
Received: from netscape.com (h-205-217-237-47.netscape.com [205.217.237.47])
	by ietf.org (8.9.1a/8.9.1a) with SMTP id KAA01076
	for <ldapext-archive@odin.ietf.org>; Sun, 26 Nov 2000 10:29:37 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.10.0/8.10.0) with ESMTP id eAQFK3D24869;
	Sun, 26 Nov 2000 07:20:11 -0800 (PST)
Received: (from list@localhost)
	by aka.mcom.com (8.10.0/8.10.0) id eAQFRs626868;
	Sun, 26 Nov 2000 07:27:54 -0800 (PST)
Resent-Date: Sun, 26 Nov 2000 07:27:54 -0800 (PST)
Date: Sun, 26 Nov 2000 07:27:51 -0800 (PST)
Message-Id: <200011261527.eAQFRpR12002@xwing.netscape.com>
From: tdzsf@hotmail.com
To: jdlec@Onlinefriends.netscape.com
Reply-To: tes2u2@n2mail.com
Subject: Fed UP with Big Brother WATCHING like a Hawk?                                    [aakzh]
Resent-Message-ID: <"ptAaX.A.ijG.5vSI6"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com

AMERICANS -- Fed UP with Big Brother WATCHING like a Hawk?
=========================================================
Have you ever asked yourself WHY you are being tracked,
categorized, filed, numbered, referenced, documented,
classified, qualified, registered, indexed, recorded,
listed, and archived by government?

Any monetary transaction over a specified limit is
traced by the IRS. Your cash withdrawals from your bank
are tracked. Anyone paying an airline ticket in cash is
under suspicion. Any person can now be searched and
property seized without any charges. What is happening
to the right of mankind.. "Life, Liberty, and Happiness"?

Want to protect your assets, property, and life long
possessions from being sold to pay taxes instead of going
to your children or estate?

40+% of North America's workforce now get paid directly
or indirectly by government. Never in history have so
many been so successfully lied to and deceived by so few!

BUT, there is a way to simply, elegantly, make all of
your worldly assets "disappear" from the government's
(or anyone else's) radar screen!  Please reply with 
"SafeAsset" on the subject line and send to;

mailto:lee28@n2mail.com?Subject=SafeAsset

Have a Nice Day !!


PS.  To be removed from the list, please reply with
"Remove" in subject line. Thanks.



From list@netscape.com  Sun Nov 26 14:40:15 2000
Received: from netscape.com (h-205-217-237-46.netscape.com [205.217.237.46])
	by ietf.org (8.9.1a/8.9.1a) with SMTP id OAA26085
	for <ldapext-archive@odin.ietf.org>; Sun, 26 Nov 2000 14:40:14 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.10.0/8.10.0) with ESMTP id eAQJPxs26447;
	Sun, 26 Nov 2000 11:25:59 -0800 (PST)
Received: (from list@localhost)
	by aka.mcom.com (8.10.0/8.10.0) id eAQJcgo07416;
	Sun, 26 Nov 2000 11:38:42 -0800 (PST)
Resent-Date: Sun, 26 Nov 2000 11:38:42 -0800 (PST)
Date: Sun, 26 Nov 00 13:58:05 EST
From: griftec@nowhere.com
To: success@nowhere.com
Subject: FREE guide to starting a profitable home business 
Message-Id: <MAA01933>
Reply-To: GrifTec@nowhere.com
X-Pmflags: 34078848 0
X-Uidl: 2610431056a78aeb1b128fda426c9a5e
Comments: Authenticated sender is <Success@nowhere.com>
Resent-Message-ID: <"BbzVnD.A.czB.BbWI6"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com

FREE 32-page booklet shows you how to create a profitable Home Business earning more than $20,000 per month in just a few short weeks! 
It guides you, step-by-step, through the complete process of establishing a highly successful Internet business... from product development through Website development and promotion. 
There is absolutely no obligation or cost for this booklet. Just click the e-mail below and receive your free copy. You'll be awfully glad you did.
GrifTec@sendfree.com?subject=FreeBook 
GrifTec Inc.




From list@netscape.com  Sun Nov 26 18:50:34 2000
Received: from netscape.com (h-205-217-237-47.netscape.com [205.217.237.47])
	by ietf.org (8.9.1a/8.9.1a) with SMTP id SAA28644
	for <ldapext-archive@odin.ietf.org>; Sun, 26 Nov 2000 18:50:33 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.10.0/8.10.0) with ESMTP id eAQNf8D18361;
	Sun, 26 Nov 2000 15:41:08 -0800 (PST)
Received: (from list@localhost)
	by aka.mcom.com (8.10.0/8.10.0) id eAQNn0o21768;
	Sun, 26 Nov 2000 15:49:00 -0800 (PST)
Resent-Date: Sun, 26 Nov 2000 15:49:00 -0800 (PST)
Message-Id: <sa213ed5.086@prv-mail20.provo.novell.com>
X-Mailer: Novell GroupWise Internet Agent 5.5.5.1
Date: Sun, 26 Nov 2000 16:48:15 -0700
From: "Jim Sermersheim" <jimse@novell.com>
To: <helmut.volpers@icn.siemens.de>, <ietf-ldapext@netscape.com>
Subject: Re: RE: Solicitation for review
	(draft-sermersheim-ldap-chaining-00.txt)
Mime-Version: 1.0
Content-Type: text/plain; charset=US-ASCII
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
X-MIME-Autoconverted: from quoted-printable to 8bit by aka.mcom.com id eAQNmwv21742
Resent-Message-ID: <"wRIanC.A.0TF.rFaI6"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com
Content-Transfer-Encoding: 8bit

I wouldn't mind adding some scoping choices if we can define a good set of scopes. Would you prefer that the draft describe the semantics of the scoping choices or leave them as implementation-specific?

>>> "Volpers, Helmut" <helmut.volpers@icn.siemens.de> 11/23/00 01:30 AM >>>
Hi Jim,
 
I like the idea of defining a control to enable an LDAP Client to say to a
Server
whether the server should chain or return referrals if references exist.
I understand you correct that you don't want to define distributed
operations ?
I will review your draft in detail. At the moment I think we need something
like
"scope of referral" to limit the scope where the Server chain to e.g. my
local
domain or my country etc.
Who will define the OID's for the control.
Do you present the draft in San Diego ?
 
Helmut

-----Original Message-----
From: Jim Sermersheim [mailto:JIMSE@novell.com]
Sent: Dienstag, 21. November 2000 18:39
To: ietf-ldapext@netscape.com
Subject: Solicitation for review (draft-sermersheim-ldap-chaining-00.txt)


This draft describes a control to be used to specify chaining behavior.
 
http://www.ietf.org/internet-drafts/draft-sermersheim-ldap-chaining-00.txt
<http://www.ietf.org/internet-drafts/draft-sermersheim-ldap-chaining-00.txt>

 
Review and feedback via this list is appreciated.
 
Thanks.
 
Jim




From list@netscape.com  Sun Nov 26 20:15:12 2000
Received: from netscape.com (h-205-217-237-47.netscape.com [205.217.237.47])
	by ietf.org (8.9.1a/8.9.1a) with SMTP id UAA17641
	for <ldapext-archive@odin.ietf.org>; Sun, 26 Nov 2000 20:15:11 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.10.0/8.10.0) with ESMTP id eAR15iD23454;
	Sun, 26 Nov 2000 17:05:44 -0800 (PST)
Received: (from list@localhost)
	by aka.mcom.com (8.10.0/8.10.0) id eAR1DaA08434;
	Sun, 26 Nov 2000 17:13:36 -0800 (PST)
Resent-Date: Sun, 26 Nov 2000 17:13:36 -0800 (PST)
From: sleuth7@personal.ro
Message-Id: <200011270110.RAA06151@gospelcity.com>
Subject: INTERNET SPY, VOL.II
Date: Sun, 26 Nov 2000 16:32:54 -0700
MIME-Version: 1.0
Content-Type: multipart/mixed;
	boundary="----=_NextPart_000_6033_000016C9.00001893"
X-Priority: 3
X-MSMail-Priority: Normal
Resent-Message-ID: <"25aC7C.A.gDC._UbI6"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com

------=_NextPart_000_6033_000016C9.00001893
Content-Type: text/html;

<HTML>
<BODY>

<FONT face="MS Sans Serif">
<FONT size=2><B> This is an advertisement for the program "THE INTERNET SPY AND YOU 2000 - VOL. II" if you have no interest in this program CLICK DELETE NOW.<BR>
_________________________________________<BR>
<BR>
</B>
<FONT color="#000080"><B> "THE INTERNET SPY AND YOU 2000 - VOL. II"<BR>
</B></FONT><B> <BR>
Shows you how to get the facts on anyone.<BR>
<BR>
CONFIDENTIAL<BR>
The SOFTWARE They Wanted BANNED In all 50 States! Why?<BR>
Because these secrets were never intended to reach your eyes....<BR>
<BR>
Get the facts on anyone using the Internet!<BR>
Locate Missing Persons, find Lost Relatives, obtain Addresses and<BR>
Phone Numbers of old school friends, even Skip Trace Dead Beat Spouses. <BR>
This is not a Private Investigator, but a sophisticated SOFTWARE program<BR>
 DESIGNED to automatically CRACK YOUR CASE with links to thousands of <BR>
Public record databases. Find out SECRETS about your relatives, friends, <BR>
enemies, and everyone else! -- even your spouse! <BR>
<BR>
 With the New THE INTERNET SPY AND YOU 2000 - VOL. II!<BR>
<BR>
It's absolutely astounding!  Here's some of what you can learn:<BR>
<BR>
License plate numbers!<BR>
Get anyone's name and address with just a license plate number!<BR>
(Find that girl you met in traffic!)<BR>
<BR>
DRIVING RECORDS!<BR>
Get anyone's driving record!<BR>
<BR>
Social security number!<BR>
Trace anyone by social security number!<BR>
<BR>
ADDRESSES!<BR>
Get anyone's address with just a name!<BR>
<BR>
Unlisted phone numbers!<BR>
Get anyone's phone number with just a name-even unlisted numbers!<BR>
<BR>
LOCATE!<BR>
Long lost friends, relatives, a past lover who broke your heart!<BR>
Now with Full Internet Search.<BR>
<BR>
E-mail!<BR>
Send anonymous e-mail completely untraceable!<BR>
<BR>
Dirty secrets!<BR>
Discover dirty secrets your in-laws don't want you to know!<BR>
<BR>
Investigate anyone!<BR>
Use the source that private investigators use (all on the Internet)<BR>
secretly!<BR>
<BR>
Ex-spouse!<BR>
Learn how to get information on an ex-spouse that will help you win<BR>
in court!  (Dig up old skeletons)<BR>
<BR>
Criminal search-Backround check!<BR>
Find out about you daughters boyfriend! (or her husband)<BR>
<BR>
Neighbors!<BR>
Learn all about your mysterious neighbors!  Find out what they<BR>
have to hide!<BR>
<BR>
Co-workers!<BR>
Be astonished by what you'll learn about people you work with!<BR>
<BR>
Education verification!<BR>
Did he really graduate college?  Find out!<BR>
<BR>
(NEW)<BR>
All 50 States Web Pages available to you PLUS all the counties<BR>
within the states you can check out everything!<BR>
<BR>
THE INTERNET SPY AND YOU 2000 - VOL. II<BR>
Software will help you discover ANYTHING about anyone, with <BR>
clickable hyperlinks and no typing in long Internet addresses!<BR>
<BR>
Just insert Your floppy disk and Go!<BR>
<BR>
It's INCREDIBLE what you can find out using The Internet Spy and<BR>
You 2000 -Vol. II and the Internet!  You'll be riveted to your <BR>
computer screen!  The software they're trying to ban! <BR>
Before it's too late!<BR>
<BR>
LIMITED TIME OFFER: ORDER TODAY!<BR>
Only $15.95 US (Postage Paid)<BR>
<BR>
WORKS WITH ALL BROWSERS AND ALL VERSIONS OF AOL!<BR>
<BR>
</B>
<FONT color="#FF0000"><B> ORDER TODAY:<BR>
SEND Only $15.95 US<BR>
(CASH, CHECK, OR MONEY ORDER)<BR>
(FLORIDA RESIDENTS ADD 7% FLORIDA STATE SALES TAX)<BR>
(ORDERS OUTSIDE THE USA, ADD $6.00)</B></FONT><B> <BR>
<BR>
ALSO ON THIS DISK IS:<BR>
When you order Spy-2000 - Vol. II you will also receive 156 FREE PC<BR>
PROGRAMS AND SOFTWARE FOR FREE.<BR>
PLUS OVER 10,000 plus CLIP ART FREE AND READY TO USE.<BR>
The free goods alone are worth the $15.95 you pay for the <BR>
complete program.<BR>
<BR>
 DON'T WAIT ORDER TODAY!<BR>
<BR>
</B>
<FONT color="#000080"><B> SEND TO:<BR>
DLMSR MARKETING INC.  <BR>
PO BOX 951504<BR>
LAKE MARY, FLORIDA<BR>
32746-1504 </B></FONT><B> <BR>
<BR>
(ALL ORDERS MAIL WITHIN 48 HOURS OF RECEIVING THEM)<BR>
<BR>
MAKE YOUR CHECK PAYABLE TO:<BR>
</B>
<FONT color="#FF0000"><B> DLMSR Marketing Inc.</B></FONT><B> <BR>
<BR>
(Please Print Clearly Your Name and Address)<BR>
                                                                                   <BR>
Name_________________________________________________<BR>
<BR>
Address_______________________________________________<BR>
<BR>
City/State/ZIP__________________________________________<BR>
<BR>
E-mail Address_________________________________________<BR>
<BR>
This program is Guaranteed, if you are unhappy for any reason,<BR>
just return the program within 30 DAYS and we will refund your money, <BR>
Thank you.<BR>
<BR>
SORRY NO MAC VERSION AVAILABLE AT THIS TIME.<BR>
THIS PROGRAM WILL NOT WORK WITH M/S 3.11 AND OLDER.<BR>
<BR>
Copyright \'a9 1998-2000<BR>
All Rights Reserved DLMSR Marketing Inc.<BR>
<BR>
<BR>
<BR>
<BR>
**********************************************************************<BR>
All REMOVE requests AUTOMATICALLY honored upon receipt.<BR>
<BR>
PLEASE understand that any effort to disrupt, close or block this<BR>
 REMOVE account can only result in difficulties for others wanting<BR>
 to be removed from our mailing list as it will be impossible to take<BR>
 anyone off the list if the remove instruction can not be received.<BR>
<BR>
To be removed from our mailing list please<BR>
send an email to: lister123@fastmail.ca  and place remove<BR>
in the subject<BR>
Thank you<BR>
<BR>
*********************************</B> <BR>
</FONT></FONT><p><p><p><p><p><p><p><p><p><p>

<p><FONT face="MS Sans Serif"><p><FONT size=2><B> This is an advertisement for the program "THE INTERNET SPY AND YOU 2000 - VOL. II" if you have no interest in this program CLICK DELETE NOW.<BR><p></BODY></HTML>


------=_NextPart_000_6033_000016C9.00001893--


From list@netscape.com  Mon Nov 27 10:53:37 2000
Received: from netscape.com (h-205-217-237-47.netscape.com [205.217.237.47])
	by ietf.org (8.9.1a/8.9.1a) with SMTP id KAA21156
	for <ldapext-archive@odin.ietf.org>; Mon, 27 Nov 2000 10:53:32 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.10.0/8.10.0) with ESMTP id eARFhYD23183;
	Mon, 27 Nov 2000 07:43:35 -0800 (PST)
Received: (from list@localhost)
	by aka.mcom.com (8.10.0/8.10.0) id eARFpRU22022;
	Mon, 27 Nov 2000 07:51:27 -0800 (PST)
Resent-Date: Mon, 27 Nov 2000 07:51:27 -0800 (PST)
From: "Ryan Moats" <rmoats@coreon.net>
To: "Ed Reed" <eer@OnCallDBA.COM>
Cc: <ietf-ldup@imc.org>, <ietf-ldapext@netscape.com>
Subject: RE: draft-ietf-ldup-subentry-06.txt
Date: Mon, 27 Nov 2000 09:55:19 -0600
Message-ID: <OAEPJLLCHIJCOBJMOMBOEEMDCHAA.rmoats@coreon.com>
MIME-Version: 1.0
Content-Type: text/plain;
	charset="us-ascii"
Content-Transfer-Encoding: 7bit
X-Priority: 3 (Normal)
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook IMO, Build 9.0.2416 (9.0.2911.0)
Importance: Normal
In-Reply-To: <sa1e84d5.016@reed.oncalldba.com>
X-MimeOLE: Produced By Microsoft MimeOLE V5.00.2919.6700
Resent-Message-ID: <"KryqyB.A.yXF.9LoI6"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com
Content-Transfer-Encoding: 7bit

Ed-

Maybe I'm missing something, but when I read through
the draft, I see an acknowledgement of how to
store Replica and Replication Agreement information
but no discussion of how to store Replica and Replication
Agreement in the document.  Is this intentional or
did I just miss something [a common state of affairs].

Ryan

-----Original Message-----
From: Ed Reed [mailto:eer@OnCallDBA.COM]
Sent: Friday, November 24, 2000 4:10 PM
To: internet-drafts@ietf.org
Cc: ietf-ldup@imc.org; ietf-ldapext@netscape.com
Subject: draft-ietf-ldup-subentry-06.txt


Please publish the attached revised internet draft -
draft-ietf-ldup-subentry-06.txt

Abstract:


This document describes two object classes called
ldapSubEntry and inheritableLDAPSubEntry which MAY be used
to indicate operations and management related entries in
the directory, called LDAP Subentries.  To control the
visibility of entries of type ldapSubEntry, a control,
ldapSubentriesControl, is defined, and a special case using
Search filters is described.  Scope rules are defined along
with rules for dealing with inheritance of subentry policy.

To the work group:

1) sorry this arrives to you in base64 encoding...if it does (hi, Rick!)
2) I've significantly revised this document to include the scope discussion
requested, and to provide an example scope extension for inheritance
and inheritance blocking.

It needs your review before going to last call.

=================
Ed Reed
Reed-Matthews, Inc.
+1 801 796 7065
http://www.Reed-Matthews.COM




From list@netscape.com  Mon Nov 27 12:37:36 2000
Received: from netscape.com (h-205-217-237-47.netscape.com [205.217.237.47])
	by ietf.org (8.9.1a/8.9.1a) with SMTP id MAA24592
	for <ldapext-archive@odin.ietf.org>; Mon, 27 Nov 2000 12:37:36 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.10.0/8.10.0) with ESMTP id eARHS8D11610;
	Mon, 27 Nov 2000 09:28:08 -0800 (PST)
Received: (from list@localhost)
	by aka.mcom.com (8.10.0/8.10.0) id eARHa0s00838;
	Mon, 27 Nov 2000 09:36:00 -0800 (PST)
Resent-Date: Mon, 27 Nov 2000 09:36:00 -0800 (PST)
Message-Id: <200011271735.eARHZRD25476@ywing.netscape.com>
From: <e1117e@yahoo.com>
Subject: 50% OFF Targeted e-mail leads!
Date: Mon, 27 Nov 2000 07:58:53
Resent-Message-ID: <"XieI2.A.eM.-tpI6"@glacier>
To: ietf-ldapext@netscape.com
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com

  *******New List TODAY!!******** 
   
*****50% OFF SPECIAL THRU 11-28-00 ONLY!*****

                              
Visit the site for more details!
http://virtue.nu/flwr

The key to success in marketing online is reaching the people who 
are really interested in your ad! 

You need targeted e-mails of business opportunity seekers
who are ACTIVELY marketing online and trying to expand their
business TODAY!

-->   Highly Deliverable Lists!
  Our lists are cleaned and updated on a daily basis! Which means 
we have the lowest undeliverable rate out there!  We've also made 
sure to filter out all those unwanted e-mail address such as 
.mil, .org, .org, .gov, etc.
                          


Visit the site for more details!
http://virtue.nu/flwr

*****50% OFF SPECIAL THRU 11-28-00 ONLY!*****

 10,000 opportunity seekers e-mails for only $7
**New List TODAY**
 25,000 opportunity seekers e-mails for only $12
 50,000 opportunity seekers e-mails for only $17
100,000 opportunity seekers e-mails for only $25
225,000 opportunity seekers e-mails for only $37

- Promotions!

**FREE with EVERY order, demo of ListMan e-mail manager software 
to manage your e-mails list 

**Order 50,000 or more e-mails and receive Express Mail Server to 
send your e-mails FREE!  
-Send your e-mails safely bypassing your ISP's mail server!
-This is not a demo but a permanent license for the software!

**Order 100,000 or more e-mails and receive:

- InfoDisk  with 1000+ Money Making Reports
- URL cloaking software
- CheckMAN software
Combined value of over $250!  Yours FREE!
_______________________________________________________________
I received your e-mail as someone interested in Internet Business 
Opportunities. If I received your e-mail in error, or you are no 
longer interested, you can be removed at no cost to you simply by 
pressing "Reply" and place "Remove" in the Subject line.
_________________________________________________________________
 
 
 
 
 
 
 
 
 
 
 
 
 



From list@netscape.com  Mon Nov 27 17:10:02 2000
Received: from netscape.com (h-205-217-237-46.netscape.com [205.217.237.46])
	by ietf.org (8.9.1a/8.9.1a) with SMTP id RAA23841
	for <ldapext-archive@odin.ietf.org>; Mon, 27 Nov 2000 17:10:02 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.10.0/8.10.0) with ESMTP id eARLtes10240;
	Mon, 27 Nov 2000 13:55:40 -0800 (PST)
Received: (from list@localhost)
	by aka.mcom.com (8.10.0/8.10.0) id eARM8PU20549;
	Mon, 27 Nov 2000 14:08:25 -0800 (PST)
Resent-Date: Mon, 27 Nov 2000 14:08:25 -0800 (PST)
From: Augustynyoder@cc-srv.baranyanet.hu
Message-ID: <00001a290f1a$00003d42$00002415@>
To: <Augustynyoder@cc-srv.baranyanet.hu>
Subject: Click Here for a Brand New Free Satellite.
Date: Mon, 27 Nov 2000 17:06:09 -0400
MIME-Version: 1.0
Content-Type: text/plain;
	charset="Windows-1252"
Content-Transfer-Encoding: 7bit
X-Priority: 3
X-MSMail-Priority: Normal
Resent-Message-ID: <"A_AkkB.A.lAF.YttI6"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com
Content-Transfer-Encoding: 7bit

FREE Satellite T.V. System and FREE Installation

For a limited time we'll give you this top of the line Digital
Satellite System for FREE!  We'll even include Free installation.

Enjoy over 500 Channels of crystal clear digital picture and
cd stereo sound on your FREE Satellite TV System.  Why pay
for these items in a retail store, when we're giving you the
same satellite package for free.


Call 888-514-6881 to be Guaranteed Your FREE Satellite Today


This Innovative 20" Satellite includes a stereo receiver and
an infrared remote.  With this FREE offer you will have both
Interactive Television Capability and an On Screen Program Guide.

This limited time FREE offer is much less than the monthly cost
of cable tv. All you have to do is call us to arrange delivery.   
If you call today, we'll throw in a second receiver for your
second T.V. free.


Call 888-514-6881 to Begin Surfing through 500 Channels Today!


To be removed send email to jedisparu@yahoo.com



From list@netscape.com  Mon Nov 27 17:14:37 2000
Received: from netscape.com (h-205-217-237-47.netscape.com [205.217.237.47])
	by ietf.org (8.9.1a/8.9.1a) with SMTP id RAA25844
	for <ldapext-archive@odin.ietf.org>; Mon, 27 Nov 2000 17:14:37 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.10.0/8.10.0) with ESMTP id eARM52D09858;
	Mon, 27 Nov 2000 14:05:02 -0800 (PST)
Received: (from list@localhost)
	by aka.mcom.com (8.10.0/8.10.0) id eARMCtM22783;
	Mon, 27 Nov 2000 14:12:55 -0800 (PST)
Resent-Date: Mon, 27 Nov 2000 14:12:55 -0800 (PST)
Reply-To: <John.Liang@openwave.com>
From: "John Liang" <John.Liang@openwave.com>
To: <ietf-ldapext@netscape.com>
Subject: cookies in VLV
Date: Mon, 27 Nov 2000 17:12:41 -0500
Message-ID: <000001c058bf$28c3eae0$b305400a@software.com>
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
X-Priority: 3 (Normal)
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook 8.5, Build 4.71.2377.0
Importance: Normal
X-MimeOLE: Produced By Microsoft MimeOLE V5.00.2314.1300
Resent-Message-ID: <"oagGfC.A.tjF.mxtI6"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com
Content-Transfer-Encoding: 7bit

HI there,

In <<LDAP Extensions for scrolling view browsing of search results>>,
How can we distinguish a subsequent VLV request and an original VLV
requst without SSS?

For instance, the client sends the first VLV request to the server
with SSS, it also sends a few subsequent requests to get the entries
that it is interested in. And then the client wants to send a new
VLV request to the server. But for some reason, it forgets to send
SSS with it.

When the server receives it, it will get confused because it does not
know if this is a new request without SSS in which case an error message
should return; Or it is a subsequent request of the first VLV request.

Thanks,
--
John Liang



From list@netscape.com  Mon Nov 27 17:16:48 2000
Received: from netscape.com (h-205-217-237-47.netscape.com [205.217.237.47])
	by ietf.org (8.9.1a/8.9.1a) with SMTP id RAA26758
	for <ldapext-archive@odin.ietf.org>; Mon, 27 Nov 2000 17:16:48 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.10.0/8.10.0) with ESMTP id eARM5FD09989;
	Mon, 27 Nov 2000 14:05:15 -0800 (PST)
Received: (from list@localhost)
	by aka.mcom.com (8.10.0/8.10.0) id eARMD8k23089;
	Mon, 27 Nov 2000 14:13:08 -0800 (PST)
Resent-Date: Mon, 27 Nov 2000 14:13:08 -0800 (PST)
Message-Id: <sa2279eb.089@prv-mail20.provo.novell.com>
X-Mailer: Novell GroupWise Internet Agent 5.5.5.1
Date: Mon, 27 Nov 2000 15:12:37 -0700
From: "Steve Sonntag" <VTAG@novell.com>
To: <ietf-ldapext@netscape.com>, <robw@worldspot.com>
Subject: Re: draft Java-api-12
Mime-Version: 1.0
Content-Type: multipart/alternative; boundary="=_E7BCF24B.36573580"
Resent-Message-ID: <"Ck2m3.A.nnF.xxtI6"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com

This is a MIME message. If you are reading this text, you may want to 
consider changing to a mail reader or gateway that understands how to 
properly handle MIME multipart messages.

--=_E7BCF24B.36573580
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: quoted-printable

I have been thinking about the specification for=20
unsolicited notifications in the Java api draft version 12.

The draft has two methods in LDAPConnection
that are concerned with Unsolicited Notifications:

one sets a flag indicating whether to keep or discard
unsolicited notifications:
    setUnsolocitedNotifications(boolean flag)
the other gets the value of the flag

Unsolicited notifications are retrieved by calling
the getResponse(0) method from one of the
Listener classes.  the "0" indicates message ID 0.

The problem is that a listener has association with
a connection only when a request is in progress
using that listener.  A listener in an application with
5 connections open could be servicing requests
on all five connections or on none of them.  Using
getResponse from the listener class to get
Unsolicited notifications is problematic.  If no requests
are outstanding on the listener, there is no association
with a connection, so it is not possible to check
for unsolicited notifications.

It would seem that the only reliable way to check for
and get unsolicited notifications would be through
the LDAPConnection class itself and not through the listener.
classes. Two more LDAPConnection methods - ugh, but
perhaps necessary?

Anyone have any better ideas?

-Steve



------------------------
Steve Sonntag
Novell, Inc., the leading provider of Net services software

--=_E7BCF24B.36573580
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD>
<META content=3D"text/html; charset=3Diso-8859-1" http-equiv=3DContent-Type=
>
<META content=3D"MSHTML 5.00.2014.210" name=3DGENERATOR></HEAD>
<BODY style=3D"FONT: 8pt MS Sans Serif; MARGIN-LEFT: 2px; MARGIN-TOP: =
2px">
<DIV>I have been thinking about the specification for </DIV>
<DIV>unsolicited notifications in the Java api draft version 12.</DIV>
<DIV>&nbsp;</DIV>
<DIV>The draft has two methods in LDAPConnection</DIV>
<DIV>that are concerned with Unsolicited Notifications:</DIV>
<DIV>&nbsp;</DIV>
<DIV>one sets a flag indicating whether to keep or discard</DIV>
<DIV>unsolicited notifications:</DIV>
<DIV>&nbsp;&nbsp;&nbsp; setUnsolocitedNotifications(boolean flag)</DIV>
<DIV>the other gets the value of the flag</DIV>
<DIV>&nbsp;</DIV>
<DIV>Unsolicited notifications are retrieved by calling</DIV>
<DIV>the getResponse(0) method from one of the</DIV>
<DIV>Listener classes.&nbsp; the "0" indicates message ID 0.</DIV>
<DIV>&nbsp;</DIV>
<DIV>The problem is that a listener has association with</DIV>
<DIV>a connection only when a request is in progress</DIV>
<DIV>using that listener.&nbsp; A listener in an application with</DIV>
<DIV>5 connections open could be servicing requests</DIV>
<DIV>on all five connections or on none of them.&nbsp; Using</DIV>
<DIV>getResponse from the listener class to get</DIV>
<DIV>Unsolicited notifications is problematic.&nbsp; If no requests</DIV>
<DIV>are&nbsp;outstanding on the listener, there is no association</DIV>
<DIV>with a connection, so it is not possible to check</DIV>
<DIV>for unsolicited notifications.</DIV>
<DIV>&nbsp;</DIV>
<DIV>It would seem that the only reliable way to check for</DIV>
<DIV>and get unsolicited notifications would be through</DIV>
<DIV>the LDAPConnection class itself and not through the listener.</DIV>
<DIV>classes. Two more LDAPConnection methods - ugh, but</DIV>
<DIV>perhaps necessary?</DIV>
<DIV>&nbsp;</DIV>
<DIV>Anyone have any better ideas?</DIV>
<DIV>&nbsp;</DIV>
<DIV>-Steve</DIV>
<DIV>&nbsp;</DIV>
<DIV>&nbsp;</DIV>
<DIV>&nbsp;</DIV>
<DIV>------------------------<BR>Steve Sonntag<BR>Novell, Inc., the =
leading=20
provider of Net services software</DIV>
<DIV>&nbsp;</DIV>
<DIV>&nbsp;</DIV></BODY></HTML>

--=_E7BCF24B.36573580--



From list@netscape.com  Mon Nov 27 18:00:38 2000
Received: from netscape.com (h-205-217-237-47.netscape.com [205.217.237.47])
	by ietf.org (8.9.1a/8.9.1a) with SMTP id SAA10428
	for <ldapext-archive@odin.ietf.org>; Mon, 27 Nov 2000 18:00:38 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.10.0/8.10.0) with ESMTP id eARMp7D20403;
	Mon, 27 Nov 2000 14:51:08 -0800 (PST)
Received: (from list@localhost)
	by aka.mcom.com (8.10.0/8.10.0) id eARMwwI16163;
	Mon, 27 Nov 2000 14:58:58 -0800 (PST)
Resent-Date: Mon, 27 Nov 2000 14:58:58 -0800 (PST)
Message-Id: <sa2284b3.063@prv-mail20.provo.novell.com>
X-Mailer: Novell GroupWise Internet Agent 5.5.5.1
Date: Mon, 27 Nov 2000 15:58:41 -0700
From: "Jim Sermersheim" <JIMSE@novell.com>
To: <ietf-ldapext@netscape.com>, <John.Liang@openwave.com>
Subject: Re: cookies in VLV
Mime-Version: 1.0
Content-Type: multipart/alternative; boundary="=_A4FFB133.066705B8"
Resent-Message-ID: <"9TnooB.A.E8D.vcuI6"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com

This is a MIME message. If you are reading this text, you may want to 
consider changing to a mail reader or gateway that understands how to 
properly handle MIME multipart messages.

--=_A4FFB133.066705B8
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: quoted-printable

John,

Section 5.1 says:
"If this control is included in a SearchRequest message, a Server Side =
Sorting request control [SSS] MUST also be present in the message.". So, =
even though it may be redundant, the SSS control must be included on =
subsequent iterations.

BTW, if you want to let the server know that this is a subsequent request, =
you should use the contextID field.

>>> "John Liang" <John.Liang@openwave.com> 11/27/00 3:12:41 PM >>>
HI there,

In <<LDAP Extensions for scrolling view browsing of search results>>,
How can we distinguish a subsequent VLV request and an original VLV
requst without SSS?

For instance, the client sends the first VLV request to the server
with SSS, it also sends a few subsequent requests to get the entries
that it is interested in. And then the client wants to send a new
VLV request to the server. But for some reason, it forgets to send
SSS with it.

When the server receives it, it will get confused because it does not
know if this is a new request without SSS in which case an error message
should return; Or it is a subsequent request of the first VLV request.

Thanks,
--
John Liang

--=_A4FFB133.066705B8--


From list@netscape.com  Mon Nov 27 19:29:15 2000
Received: from netscape.com (h-205-217-237-47.netscape.com [205.217.237.47])
	by ietf.org (8.9.1a/8.9.1a) with SMTP id TAA01964
	for <ldapext-archive@odin.ietf.org>; Mon, 27 Nov 2000 19:29:14 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.10.0/8.10.0) with ESMTP id eAS0IbD09516;
	Mon, 27 Nov 2000 16:18:38 -0800 (PST)
Received: (from list@localhost)
	by aka.mcom.com (8.10.0/8.10.0) id eAS0QU221302;
	Mon, 27 Nov 2000 16:26:30 -0800 (PST)
Resent-Date: Mon, 27 Nov 2000 16:26:30 -0800 (PST)
Date: Tue, 28 Nov 2000 08:12:42 +0800 (CST)
From: <eujps@sercomtel.com.br>
Message-Id: <200011280012.IAA0000018670@ds20.viewcn.com>
To: yrxvk@sercomtel.com.br
Reply-To: sercomtel.com.br@viewcn.com
Subject: Super Sex Pill with no side effects!                                                    xrfed
Resent-Message-ID: <"x6N8L.A.EMF.0uvI6"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com

Jumpstart sexual desire in both Men and Women, 
to the point that you never thought possible.
Finally, there is A Dream Come True Product
that over 100 Million people have been waiting for!!
  
 I have had fantastic sex, but this stuff made me feel like I had rockets shooting out everywhere . . . rockets!!!
B.J. CA MEN - easily achieve Naturally Triggered erections,like you are 18 all over again!
  
WOMEN - will pump with naturally flowing juices 
from the start and will achieve the most intense
orgasms of their lives! 
  
Together the Raging Mix is enough to drive any couple of any age into a sexual frenzy for hours on end! Perform better now with 100% Herbal Sensation. It&#8217;s the first and the best! 100% Herbal Sensation is a safe and natural alternative to Viagra® that everyone is trying to duplicate.
  
Its an all natural relationship enhancer (via sex)! Men remember those youthful days when all an attractive girl had to do was come close and you would erupt into a steel
pole hard-on! (Depending on where you were it could have been embarrassing!) 
  
This formula helps you with naturally 
triggered hard-ons, not artificially triggered like Viagra.
  
Women remember when those romantic and hot sensual thoughts filled your mind? 
All you needed was a man to take care of business. 
The formula for women puts you back in action. 
It turns up the heat, and gets your juices stirring!
One formula for MEN and another for WOMEN! 100% Herbal Sensation allows SEX to take place! 
  
But not only SEX, GREAT SEX! Order now -Guaranteed to work or your money back. If you are not completely satisfied with 100% Herbal Sensation, return the unused bottle within 30 days and receive a full refund for the
product. 
  
Please visit our web site for the Holiday special!
  
Buy one get one Free!!
http://www.cyberfreepages.net/sites/jkpyt56e/
       ========================================================
Remove mailto:o.roll@angelfire.com



From list@netscape.com  Mon Nov 27 19:54:48 2000
Received: from netscape.com (h-205-217-237-46.netscape.com [205.217.237.46])
	by ietf.org (8.9.1a/8.9.1a) with SMTP id TAA07619
	for <ldapext-archive@odin.ietf.org>; Mon, 27 Nov 2000 19:54:47 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.10.0/8.10.0) with ESMTP id eAS0eTs09497;
	Mon, 27 Nov 2000 16:40:29 -0800 (PST)
Received: (from list@localhost)
	by aka.mcom.com (8.10.0/8.10.0) id eAS0rFc02329;
	Mon, 27 Nov 2000 16:53:15 -0800 (PST)
Resent-Date: Mon, 27 Nov 2000 16:53:15 -0800 (PST)
Message-ID: <3A23026B.76760D9E@home.com>
Date: Mon, 27 Nov 2000 18:55:07 -0600
From: ken brustad <kbrustad@home.com>
Organization: @Home Network
X-Mailer: Mozilla 4.72 [en]C-AtHome0404  (WinNT; I)
X-Accept-Language: en
MIME-Version: 1.0
To: ietf-ldapext <ietf-ldapext@netscape.com>
Subject: Cancel me!
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Resent-Message-ID: <"3zdmW.A.Hk.6HwI6"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com
Content-Transfer-Encoding: 7bit

I have enjoyed the LDAP discussion forum. I have been reading the
comments for over a year. It has been VERY valuable to me.

I AM GETTING SOOOOOO MANY UNSOLICITED EMAILS FROM BELONG ON THIS LIST
I CAN'T STAND IT ANYMORE!

PLeas cancel me from this list!

kbrustad@home.com



From list@netscape.com  Tue Nov 28 04:14:53 2000
Received: from netscape.com (h-205-217-237-46.netscape.com [205.217.237.46])
	by ietf.org (8.9.1a/8.9.1a) with SMTP id EAA25477
	for <ldapext-archive@odin.ietf.org>; Tue, 28 Nov 2000 04:14:53 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.10.0/8.10.0) with ESMTP id eAS90Ms19888;
	Tue, 28 Nov 2000 01:00:22 -0800 (PST)
Received: (from list@localhost)
	by aka.mcom.com (8.10.0/8.10.0) id eAS9D8Q17563;
	Tue, 28 Nov 2000 01:13:08 -0800 (PST)
Resent-Date: Tue, 28 Nov 2000 01:13:08 -0800 (PST)
From: stck5@aol.com
Message-Id: <200011280918.SAA111362@mail.daishin.co.kr>
To: pkj8@aol.com
Subject: Stock Of The Month - GTAX
Date: Tue, 28 Nov 00 03:37:49 Eastern Standard Time
Reply-To: stck5@aol.com
X-Priority: 3
X-MSMailPriority: Normal
Importance: Normal
MIME-Version: 1.0
Content-Type: multipart/mixed;
	boundary="----=_NextPart_000_018C_01BD9940.715D52A0"
Resent-Message-ID: <"DvSrs.A.1RE.jc3I6"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com

This is a multi-part message in MIME format.

------=_NextPart_000_018C_01BD9940.715D52A0
Content-Type: text/html;

<HTML>
<BODY>
<P align=center>
<FONT face="MS Sans Serif">
<FONT size=3>
<FONT color="#000000"><B> <center>Attn. Stock Market Investors:</P><BR>
 <BR>
Welcome to the InvestmentGenies Monthly Stock Pick, At InvestmentGenie we're constantly looking at and reviewing opportunities we believe have the potential to provide investors with successful investment results. We always encourage members to do their own due diligence before investing.<BR>
</B></FONT>
<FONT color="#000000">  <BR>
<BR>
<P align=center></FONT>
<FONT size=3>
<FONT color="#000000"><B><I> We urge you to utilize your best resources to confirm our outlook for this under followed undervalued company. Here's what we've uncovered, and why we believe GTAX is a timely opportunity for investors. </P><BR>
</I></B></FONT>
<FONT size=3>
<FONT color="#000000"> <BR>
 Gilman & Ciocia (GTAX)<BR>
 <BR>
Gilman & Ciocia, Inc. (GTAX) is a leading, nationwide provider of one-stop financial shopping, including tax preparation, financial planning, estate planning and mortgage lending services. The company, headquartered in White Plains, New York, currently conducts its operations through 145 offices in 17 states. They have 650 registered representatives through its wholly owned broker-dealer subsidiaries. G+C serves more than 500,000 clients nationwide, primarily middle- and upper-income individuals, recently, G+C launched e1040.com a unique, easy-to-use Internet Website that allows taxpayers to complete tax returns online and also obtain professional advice.<BR>
 <BR>
</FONT>
<FONT color="#000000"><B> Market Opportunity:<BR>
</B></FONT>
<FONT color="#000000">  <BR>
</FONT>
<FONT color="#000000"><U> Tax Preparation</U></FONT>
<FONT color="#000000"> <BR>
<BR>
</FONT>
<FONT color="#000000"><U> Tax preparation is a multimillion dollar business<BR>
 Over 120 Million returns filed in 1998<BR>
56% prepared by an accountant or paid tax professional  increase of 6% in the last 5 years<BR>
Electronic Filing gaining prevalence<BR>
 Highly fragmented industry  demand for one-stop shopping<BR>
</U></FONT>
<FONT color="#000000">  <BR>
</FONT>
<FONT color="#000000"><U> Financial Services<BR>
 <BR>
600,000 registered representatives of securities broker  dealers<BR>
Proliferation of E-trading, IRA/401K programs<BR>
U.S. household wealth has increased 400% over last 10 years<BR>
Up to 70% of U.S. households invest<BR>
Highly fragmented industry  demand for one-stop shopping<BR>
</U></FONT>
<FONT color="#000000">  <BR>
</FONT>
<FONT color="#000000"><B> Growth Strategy:</B></FONT>
<FONT color="#000000"> <BR>
 <BR>
Gilman & Ciocias growth strategy is to expand its product offerings and customer base through acquisitions and internal growth. To date, the successful execution of this strategy has resulted in strong revenue and earnings growth. Revenue for fiscal year ended June 30, 2000 increased 78% to a record $89,578,494 from $50,443,406 reported for the same year ago period. <BR>
 <BR>
</FONT>
<FONT color="#000000"><I> Strategic Acquisitions,</I></FONT>
<FONT color="#000000">  G+C has actively sought and continues to seek strategic alliances to meet the enormous and growing demand for one-stop financial shopping. The acquisition of profitable and established firms immediately adds to the overall client and revenue base while creating new opportunities to cross sell other value-added services, such as mutual funds, insurance products, managed money accounts, and retirement and estate plans.<BR>
 <BR>
</FONT>
<FONT color="#000000"><I> Internal Growth,</I></FONT>
<FONT color="#000000">  G+C also established e1040.com, its online tax preparation and one-stop shopping service that will enable Company to benefit from the growth of e-finance.<BR>
 <BR>
</FONT>
<FONT color="#000000"><B> Products & Services:<BR>
</B></FONT>
<FONT color="#000000">  <BR>
</FONT>
<FONT color="#000000"><U> Tax Preparation<BR>
 <BR>
 Tax return preparation services conducted live by 650 registered representatives in over 140 offices.<BR>
Online tax preparation and one-stop shopping service through which taxpayers can obtain both automated and humanly assisted service by phone or e-mail. They offer advice on how to reduce taxes as well as provides the following services:<BR>
 Online tax return preparation services, including e-file and RAL (Refund Anticipation Loan) capabilities<BR>
 Online IRS Instructions and Publications<BR>
 Tax Forms, Instructions and Publications by fax<BR>
 <BR>
Quickie Tax Calculator<BR>
</U></FONT>
<FONT color="#000000">  <BR>
</FONT>
<FONT color="#000000"><B> Financial Planning Services:</B></FONT>
<FONT color="#000000"> <BR>
 <BR>
 Securities Brokerage<BR>
Insurance<BR>
 Mortgage Agency<BR>
 <BR>
</FONT>
<FONT color="#000000"><B> Why Invest in Gilman & Ciocia:<BR>
</B></FONT>
<FONT color="#000000">  <BR>
</FONT>
<FONT color="#000000"><I> Huge Market Potential</I></FONT>
<FONT color="#000000"> , Professional tax preparation, financial planning and mortgage lending is a multi-billion dollar industry in the midst of an industry consolidation driven by increasing demand for one-stop financial shopping and financial deregulation. Of the more than 120 million tax returns filed each year 56% are completed by professional tax return preparers.<BR>
 <BR>
</FONT>
<FONT color="#000000"><I> Market Leader</I></FONT>
<FONT color="#000000"> , Gilman & Ciocia is a leading provider of one-stop financial shopping, including tax preparation, financial planning, life insurance and mortgage lending services. The Company is growing through internal growth and acquisitions of profitable financial service businesses and through e-commerce.<BR>
 <BR>
</FONT>
<FONT color="#000000"><I> Strong Growth</I></FONT>
<FONT color="#000000"> , Revenue growth outperformed the industry sector during the last few years, increasing approximately 50% during FY1998 , 77% during FY1999 and 78% during FY2000.<BR>
 <BR>
<BR>
 <BR>
Why hasn't the stock trading higher? Well the biggest factor is that the stock is UNDERFOLLOWED. (And by the way, it has been a bit of a lousy market these days in the event you've missed it.) GTAX has held up very, very well throughout the market's latest slide, however. <BR>
 <BR>
For additional Information on Gilman & Ciocia or to request an investor packet, call 516-774-7300 and leave your name and address and well be sure to contact you right away.<BR>
 <BR>
<BR>
 <BR>
Happy Trading,<BR>
 <BR>
http://195.200.193.83/investmentgenie/<BR>
 <BR>
-------------------------------------------------------------------------<BR>
 <BR>
</FONT>
<FONT size=2>
<FONT color="#000000"> This ad is being sent in compliance with Senate bill 1618, Title 3, section 301. http://www.senate.gov/~murkowski/commercialemail/S771index.html <BR>
 <BR>
Here is a more detailed version of the legal notice above: <BR>
 <BR>
This message is sent in compliance of the new e-mail bill: SECTION 301. Per Section 301, Paragraph (a)(2)(C) of S. 1618, <BR>
 <BR>
Further transmissions to you by the sender of this email may be stopped at no cost to you by sending an email to rmvnow@yahoo.com with the word "remove" in the subject line.<BR>
 <BR>
----------------------------------------------------------------------------</center><BR>
</FONT>
<FONT color="#000000">  <BR>
 <BR>
Disclaimer:<BR>
 <BR>
InvestmentGenie is an independent electronic publication providing both information and factual analysis on selected public companies. Certain companies profiled by InvestmentGenie pay consideration in cash and/ or stock to InvestmentGenie for the electronic dissemination of company information, and in some cases, web site development. All statements and statements are the opinion of InvestmentGenie and are not meant to be a solicitation to buy, hold or, sell securities. InvestmentGenie is not currently a registered investment advisor or a broker dealer. InvestmentGenie strives on bringing you the most accurate information on particular companies that we feel has the potential for long term appreciation, investments in the companies reviewed are considered to be high risk and use of the information provided is at the investors sole risk. The majority of the information that InvestmentGenie relies on is provided by the profiled companies, other sources are but are not limited!
 r!
esearch reports, public filings and, interviews conducted by InvestmentGenie. While InvestmentGenie works hard to bring you the most accurate information and believes it to be accurate, InvestmentGenie makes no representation or warranty as to the accuracy of the information provided. Investors should not rely solely on the information contained in this publication. Instead, investors should use the information as the starting point for doing additional independent research on the profiled companies, in order for the investor to make his/her own opinion regarding investing in the profiled companies. Factual statements made about the profiled companies are made as of the date stated and are subject to change without notice. The receipt of this publication shall not create, under any circumstances, any implication that there has been no change in the affairs of the company profiled since the date of review. InvestmentGenie may act as a consultant to the profiled companies revi!
ew!
ed and may receive compensation from the company or its!<BR>
  shareholders for promotional or public relations services. The editor or the editors affiliates, agents and /or family members may have interests or positions in equity securities of the companies reviewed in this publication, some or all of which may have been acquired prior to the dissemination of the information, and may increase or decrease its position at any time. InvestmentGenie will be contracted as a consultant for one year to all featured companies. Investing in micro-cap and growth securities is highly speculative and carries an extremely high degree of risk. It is possible that an investor's investment may be lost or impaired due to the speculative nature of the companies profiled. InvestmentGenie is currently in negotiations for a $3,000 monthly retainer as well as GTAX warrants. As of Profiling date 11/1/00 has received no compensation at all.<BR>
<BR>
</FONT></FONT></FONT></FONT></FONT></BODY></HTML>


------=_NextPart_000_018C_01BD9940.715D52A0--


From list@netscape.com  Tue Nov 28 11:44:15 2000
Received: from netscape.com (h-205-217-237-47.netscape.com [205.217.237.47])
	by ietf.org (8.9.1a/8.9.1a) with SMTP id LAA25135
	for <ldapext-archive@odin.ietf.org>; Tue, 28 Nov 2000 11:44:14 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.10.0/8.10.0) with ESMTP id eASGWdD08724;
	Tue, 28 Nov 2000 08:32:39 -0800 (PST)
Received: (from list@localhost)
	by aka.mcom.com (8.10.0/8.10.0) id eASGeXs19605;
	Tue, 28 Nov 2000 08:40:33 -0800 (PST)
Resent-Date: Tue, 28 Nov 2000 08:40:33 -0800 (PST)
Message-ID: <3A23E0B1.EEFEB1C0@worldspot.com>
Date: Tue, 28 Nov 2000 08:43:29 -0800
From: Rob Weltman <robw@worldspot.com>
X-Mailer: Mozilla 4.76 [en] (Windows NT 5.0; U)
X-Accept-Language: en-US,sv,ja
MIME-Version: 1.0
To: Steve Sonntag <VTAG@novell.com>
CC: ietf-ldapext@netscape.com
Subject: Re: draft Java-api-12
References: <sa2279eb.090@prv-mail20.provo.novell.com>
Content-Type: multipart/alternative;
 boundary="------------27F783055A722DB134135D67"
Resent-Message-ID: <"GpUa4.A.DyE.AA-I6"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com


--------------27F783055A722DB134135D67
Content-Type: text/plain; charset=iso-8859-1
Content-Transfer-Encoding: quoted-printable

Steve Sonntag wrote:

>  I have been thinking about the specification forunsolicited notificati=
ons in the Java api draft version 12. The draft has two methods in LDAPCo=
nnectionthat are concerned with Unsolicited Notifications: one sets a fla=
g indicating whether to keep or discardunsolicited notifications:    setU=
nsolocitedNotifications(boolean flag)the other gets the value of the flag=
 Unsolicited notifications are retrieved by callingthe getResponse(0) met=
hod from one of theListener classes.  the "0" indicates message ID 0. The=
 problem is that a listener has association witha connection only when a =
request is in progressusing that listener.  A listener in an application =
with5 connections open could be servicing requestson all five connections=
 or on none of them.  UsinggetResponse from the listener class to getUnso=
licited notifications is problematic.  If no requestsare outstanding on t=
he listener, there is no associationwith a connection, so it is not possi=
ble to checkfor unsolicited notifications. It would seem that the only re=
liable way to check forand get unsolicited notifications would be through=
the LDAPConnection class itself and not through the listener.classes. Two=
 more LDAPConnection methods - ugh, butperhaps necessary? Anyone have any=
 better ideas? -Steve   ------------------------
> Steve Sonntag
> Novell, Inc., the leading provider of Net services software

  It might be better instead to eliminate the current unsolicited notific=
ation methods and instead have methods to add and remove listeners for us=
olicited notifications. The implementation can then discard unsolicited n=
otifications if there are no listeners. For example (I haven't thought th=
is through completely yet):

LDAPConnection

public LDAPResponseListener addUnsolicitedNotificationListener( LDAPRespo=
nseListener listener )

public void addUnsolicitedNotificationListener( LDAPResponseListener list=
ener )

Rob


--------------27F783055A722DB134135D67
Content-Type: text/html; charset=us-ascii
Content-Transfer-Encoding: 7bit

<!doctype html public "-//w3c//dtd html 4.0 transitional//en">
<html>
<body style="FONT: 8pt MS Sans Serif; MARGIN-LEFT: 2px; MARGIN-TOP: 2px">
Steve Sonntag wrote:
<blockquote TYPE=CITE>&nbsp;I have been thinking about the specification
forunsolicited notifications in the Java api draft version 12.&nbsp;The
draft has two methods in LDAPConnectionthat are concerned with Unsolicited
Notifications:&nbsp;one sets a flag indicating whether to keep or discardunsolicited
notifications:&nbsp;&nbsp;&nbsp; setUnsolocitedNotifications(boolean flag)the
other gets the value of the flag&nbsp;Unsolicited notifications are retrieved
by callingthe getResponse(0) method from one of theListener classes.&nbsp;
the "0" indicates message ID 0.&nbsp;The problem is that a listener has
association witha connection only when a request is in progressusing that
listener.&nbsp; A listener in an application with5 connections open could
be servicing requestson all five connections or on none of them.&nbsp;
UsinggetResponse from the listener class to getUnsolicited notifications
is problematic.&nbsp; If no requestsare outstanding on the listener, there
is no associationwith a connection, so it is not possible to checkfor unsolicited
notifications.&nbsp;It would seem that the only reliable way to check forand
get unsolicited notifications would be throughthe LDAPConnection class
itself and not through the listener.classes. Two more LDAPConnection methods
- ugh, butperhaps necessary?&nbsp;Anyone have any better ideas?&nbsp;-Steve&nbsp;&nbsp;&nbsp;------------------------
<br>Steve Sonntag
<br>Novell, Inc., the leading provider of Net services software&nbsp;&nbsp;</blockquote>

<p><br>&nbsp; It might be better instead to eliminate the current unsolicited
notification methods and instead have methods to add and remove listeners
for usolicited notifications. The implementation can then discard unsolicited
notifications if there are no listeners. For example (I haven't thought
this through completely yet):
<p>LDAPConnection
<p>public LDAPResponseListener addUnsolicitedNotificationListener( LDAPResponseListener
listener )
<p>public void addUnsolicitedNotificationListener( LDAPResponseListener
listener )
<p>Rob
<br>&nbsp;
</body>
</html>

--------------27F783055A722DB134135D67--



From list@netscape.com  Tue Nov 28 11:53:23 2000
Received: from netscape.com (h-205-217-237-46.netscape.com [205.217.237.46])
	by ietf.org (8.9.1a/8.9.1a) with SMTP id LAA28521
	for <ldapext-archive@odin.ietf.org>; Tue, 28 Nov 2000 11:53:22 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.10.0/8.10.0) with ESMTP id eASGd6s25201;
	Tue, 28 Nov 2000 08:39:06 -0800 (PST)
Received: (from list@localhost)
	by aka.mcom.com (8.10.0/8.10.0) id eASGpqw24889;
	Tue, 28 Nov 2000 08:51:52 -0800 (PST)
Resent-Date: Tue, 28 Nov 2000 08:51:52 -0800 (PST)
Message-Id: <5.0.0.25.0.20001128084712.00a5e530@router.boolean.net>
X-Sender: guru@router.boolean.net
X-Mailer: QUALCOMM Windows Eudora Version 5.0
Date: Tue, 28 Nov 2000 08:51:15 -0800
To: Rob Weltman <robw@worldspot.com>
From: "Kurt D. Zeilenga" <Kurt@openldap.org>
Subject: Re: draft Java-api-12
Cc: Steve Sonntag <VTAG@novell.com>, ietf-ldapext@netscape.com
In-Reply-To: <3A23E0B1.EEFEB1C0@worldspot.com>
References: <sa2279eb.090@prv-mail20.provo.novell.com>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Resent-Message-ID: <"Ay3ak.A.lEG.nK-I6"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com

At 08:43 AM 11/28/00 -0800, Rob Weltman wrote:
>It might be better instead to eliminate the current unsolicited notification methods and instead have methods to add and remove listeners for usolicited notifications. The implementation can then discard unsolicited notifications if there are no listeners. For example (I haven't thought this through completely yet): 

When using the low level ("asynchronous") API, unsolicited
notifications can (and should) be handled just like any other
response message.  I do agree that the higher level ("synchronous")
API which needs some reworking.



From list@netscape.com  Tue Nov 28 15:54:48 2000
Received: from netscape.com (h-205-217-237-46.netscape.com [205.217.237.46])
	by ietf.org (8.9.1a/8.9.1a) with SMTP id PAA11580
	for <ldapext-archive@odin.ietf.org>; Tue, 28 Nov 2000 15:54:48 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.10.0/8.10.0) with ESMTP id eASKeHs06004;
	Tue, 28 Nov 2000 12:40:17 -0800 (PST)
Received: (from list@localhost)
	by aka.mcom.com (8.10.0/8.10.0) id eASKr4U04147;
	Tue, 28 Nov 2000 12:53:04 -0800 (PST)
Resent-Date: Tue, 28 Nov 2000 12:53:04 -0800 (PST)
Message-ID: <3A241B21.3BCBA676@novell.com>
Date: Tue, 28 Nov 2000 13:52:49 -0700
From: Steven Sonntag <vtag@novell.com>
Organization: Novell, Inc.
X-Mailer: Mozilla 4.75 [en] (WinNT; U)
X-Accept-Language: en
MIME-Version: 1.0
To: Rob Weltman <robw@worldspot.com>
CC: ietf-ldapext@netscape.com
Subject: Re: draft Java-api-12
References: <sa2279eb.090@prv-mail20.provo.novell.com> <3A23E0B1.EEFEB1C0@worldspot.com>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Resent-Message-ID: <"ehNia.A.UAB.vsBJ6"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com
Content-Transfer-Encoding: 7bit



Rob Weltman wrote:

> Steve Sonntag wrote:
>
>>  I have been thinking about the specification forunsolicited
>> notifications in the Java api draft version 12. The draft has two
>> methods in LDAPConnectionthat are concerned with Unsolicited
>> Notifications: one sets a flag indicating whether to keep or
>> discardunsolicited notifications:
>> setUnsolocitedNotifications(boolean flag)the other gets the value of
>> the flag Unsolicited notifications are retrieved by callingthe
>> getResponse(0) method from one of theListener classes.  the "0"
>> indicates message ID 0. The problem is that a listener has
>> association witha connection only when a request is in progressusing
>> that listener.  A listener in an application with5 connections open
>> could be servicing requestson all five connections or on none of
>> them.  UsinggetResponse from the listener class to getUnsolicited
>> notifications is problematic.  If no requestsare outstanding on the
>> listener, there is no associationwith a connection, so it is not
>> possible to checkfor unsolicited notifications. It would seem that
>> the only reliable way to check forand get unsolicited notifications
>> would be throughthe LDAPConnection class itself and not through the
>> listener.classes. Two more LDAPConnection methods - ugh, butperhaps
>> necessary? Anyone have any better ideas? -Steve
>> ------------------------
>> Steve Sonntag
>> Novell, Inc., the leading provider of Net services software
>
>
>   It might be better instead to eliminate the current unsolicited
> notification methods and instead have methods to add and remove
> listeners for usolicited notifications. The implementation can then
> discard unsolicited notifications if there are no listeners. For
> example (I haven't thought this through completely yet):
>
> LDAPConnection
>
> public LDAPResponseListener addUnsolicitedNotificationListener(
> LDAPResponseListener listener )
>
> public void addUnsolicitedNotificationListener( LDAPResponseListener
> listener )
>
> Rob
>

I like your idea Rob, it fits much better with the rest of the
architecture.

I have a few questions:

Are multiple UnsolicitedNotificationListeners allowed on a given
connection.
What would the behavior be in such a situation.  The name seems to
indicate
that multiple are allowed.

My take is that only one unsolicited notification listener exists for a
given connection.
Of course, that listener may be servicing multiple connections (using
the first method
to create it).  I am not sure of the purpose for the second method.
Would the first method be more clearly named
"setUnsolicitedNotificationListener",
implying there is only one?

I assume that getResponse() blocks if no unsolicited notifications are
available.

getMessageIds would return an array with 0 being one of the message ID
values.

Could this listener be merged with a regular listener?  There seems no
reason why it
couldn't.

How does one remove an unsolicited notification listener, or was your
second
method meant to be a delUnsolicitedNotificationListener?

-Steve

--
------------------------
Steve Sonntag
Novell, Inc., the leading provider of Net services software




From list@netscape.com  Tue Nov 28 16:01:15 2000
Received: from netscape.com (h-205-217-237-46.netscape.com [205.217.237.46])
	by ietf.org (8.9.1a/8.9.1a) with SMTP id QAA13154
	for <ldapext-archive@odin.ietf.org>; Tue, 28 Nov 2000 16:01:15 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.10.0/8.10.0) with ESMTP id eASKkks07266;
	Tue, 28 Nov 2000 12:46:46 -0800 (PST)
Received: (from list@localhost)
	by aka.mcom.com (8.10.0/8.10.0) id eASKxYw07277;
	Tue, 28 Nov 2000 12:59:34 -0800 (PST)
Resent-Date: Tue, 28 Nov 2000 12:59:34 -0800 (PST)
Message-ID: <3A241C74.1DA35020@worldspot.com>
Date: Tue, 28 Nov 2000 12:58:29 -0800
From: Rob Weltman <robw@worldspot.com>
X-Mailer: Mozilla 4.75 [en] (Windows NT 5.0; U)
X-Accept-Language: en
MIME-Version: 1.0
To: Steven Sonntag <vtag@novell.com>
CC: Rob Weltman <robw@worldspot.com>, ietf-ldapext@netscape.com,
        Miodrag Kekic <miodrag@netscape.com>
Subject: Re: draft Java-api-12
References: <sa2279eb.090@prv-mail20.provo.novell.com> <3A23E0B1.EEFEB1C0@worldspot.com> <3A241B21.3BCBA676@novell.com>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Resent-Message-ID: <"v2__0.A.bxB.1yBJ6"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com
Content-Transfer-Encoding: 7bit

Steven Sonntag wrote:

> Rob Weltman wrote:
>
> > Steve Sonntag wrote:
> >
> >>  I have been thinking about the specification forunsolicited
> >> notifications in the Java api draft version 12. The draft has two
> >> methods in LDAPConnectionthat are concerned with Unsolicited
> >> Notifications: one sets a flag indicating whether to keep or
> >> discardunsolicited notifications:
> >> setUnsolocitedNotifications(boolean flag)the other gets the value of
> >> the flag Unsolicited notifications are retrieved by callingthe
> >> getResponse(0) method from one of theListener classes.  the "0"
> >> indicates message ID 0. The problem is that a listener has
> >> association witha connection only when a request is in progressusing
> >> that listener.  A listener in an application with5 connections open
> >> could be servicing requestson all five connections or on none of
> >> them.  UsinggetResponse from the listener class to getUnsolicited
> >> notifications is problematic.  If no requestsare outstanding on the
> >> listener, there is no associationwith a connection, so it is not
> >> possible to checkfor unsolicited notifications. It would seem that
> >> the only reliable way to check forand get unsolicited notifications
> >> would be throughthe LDAPConnection class itself and not through the
> >> listener.classes. Two more LDAPConnection methods - ugh, butperhaps
> >> necessary? Anyone have any better ideas? -Steve
> >> ------------------------
> >> Steve Sonntag
> >> Novell, Inc., the leading provider of Net services software
> >
> >
> >   It might be better instead to eliminate the current unsolicited
> > notification methods and instead have methods to add and remove
> > listeners for usolicited notifications. The implementation can then
> > discard unsolicited notifications if there are no listeners. For
> > example (I haven't thought this through completely yet):
> >
> > LDAPConnection
> >
> > public LDAPResponseListener addUnsolicitedNotificationListener(
> > LDAPResponseListener listener )
> >
> > public void addUnsolicitedNotificationListener( LDAPResponseListener
> > listener )
> >
> > Rob
> >
>
> I like your idea Rob, it fits much better with the rest of the
> architecture.
>
> I have a few questions:
>
> Are multiple UnsolicitedNotificationListeners allowed on a given
> connection.
> What would the behavior be in such a situation.  The name seems to
> indicate
> that multiple are allowed.
>
> My take is that only one unsolicited notification listener exists for a
> given connection.
> Of course, that listener may be servicing multiple connections (using
> the first method
> to create it).  I am not sure of the purpose for the second method.
> Would the first method be more clearly named
> "setUnsolicitedNotificationListener",
> implying there is only one?
>
> I assume that getResponse() blocks if no unsolicited notifications are
> available.
>
> getMessageIds would return an array with 0 being one of the message ID
> values.
>
> Could this listener be merged with a regular listener?  There seems no
> reason why it
> couldn't.
>
> How does one remove an unsolicited notification listener, or was your
> second
> method meant to be a delUnsolicitedNotificationListener?

  Yes, except it should be:

public void removeUnsolicitedNotificationListener( LDAPResponseListener listener )


  I was thinking that you could have more than one listener - that's why the method naming (also, of course, to be consistent with the JDK's listener method naming). An implementation could feed each listener with a copy of each incoming unsolicited notification, and each client could pull out notifications independently.

Rob




From list@netscape.com  Tue Nov 28 16:48:20 2000
Received: from netscape.com (h-205-217-237-46.netscape.com [205.217.237.46])
	by ietf.org (8.9.1a/8.9.1a) with SMTP id QAA02089
	for <ldapext-archive@odin.ietf.org>; Tue, 28 Nov 2000 16:48:20 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.10.0/8.10.0) with ESMTP id eASLXws15079;
	Tue, 28 Nov 2000 13:33:59 -0800 (PST)
Received: (from list@localhost)
	by aka.mcom.com (8.10.0/8.10.0) id eASLkjw01795;
	Tue, 28 Nov 2000 13:46:45 -0800 (PST)
Resent-Date: Tue, 28 Nov 2000 13:46:45 -0800 (PST)
Message-ID: <31EF955E0A3BD411AE7F004F4E01F08423A7A6@mailut2.vpnx.com>
From: Brian Jarvis <bjarvis@internap.com>
To: "Ietf-Ldapext (E-mail)" <ietf-ldapext@netscape.com>
Subject: RE: Submission: draft-weltman-ldapv3-proxy-06.txt
Date: Tue, 28 Nov 2000 14:46:26 -0700
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2650.21)
Content-Type: text/plain;
	charset="iso-8859-1"
Resent-Message-ID: <"mh-UnD.A.lb.DfCJ6"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com

Several times in the draft you refer to "proxy access rights".  I have
not seen these defined.  I think that there are at least two choices.

1.  Define what proxy access rights are in terms of other, already
    existing, permissions as defined in the draft for "Access Control
    Model for LDAPv3" (draft-ietf-ldapext-acl-model-06.txt).
2.  Add new permissions to the aforementioned acl model draft that are
    specific to proxy rights.

--the walrus

-----Original Message-----
From: Rob Weltman [mailto:robw@worldspot.com]
Sent: Monday, November 06, 2000 13:08
To: ietf-ldapext@netscape.com
Subject: Submission: draft-weltman-ldapv3-proxy-06.txt


  The attached update of the proxied authorization control draft was
submitted for publication last night.

Rob



From list@netscape.com  Tue Nov 28 18:41:28 2000
Received: from netscape.com (h-205-217-237-47.netscape.com [205.217.237.47])
	by ietf.org (8.9.1a/8.9.1a) with SMTP id SAA17563
	for <ldapext-archive@odin.ietf.org>; Tue, 28 Nov 2000 18:41:23 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.10.0/8.10.0) with ESMTP id eASNVTD01769;
	Tue, 28 Nov 2000 15:31:30 -0800 (PST)
Received: (from list@localhost)
	by aka.mcom.com (8.10.0/8.10.0) id eASNdO624078;
	Tue, 28 Nov 2000 15:39:24 -0800 (PST)
Resent-Date: Tue, 28 Nov 2000 15:39:24 -0800 (PST)
Message-ID: <3A2441FF.2E4167B9@novell.com>
Date: Tue, 28 Nov 2000 16:38:39 -0700
From: Steven Sonntag <vtag@novell.com>
Organization: Novell, Inc.
X-Mailer: Mozilla 4.75 [en] (WinNT; U)
X-Accept-Language: en
MIME-Version: 1.0
To: Rob Weltman <robw@worldspot.com>
CC: ietf-ldapext@netscape.com, Miodrag Kekic <miodrag@netscape.com>
Subject: Re: draft Java-api-12
References: <sa2279eb.090@prv-mail20.provo.novell.com> <3A23E0B1.EEFEB1C0@worldspot.com> <3A241B21.3BCBA676@novell.com> <3A241C74.1DA35020@worldspot.com>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Resent-Message-ID: <"KI98QB.A.23F.rIEJ6"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com
Content-Transfer-Encoding: 7bit



Rob Weltman wrote:

> Steven Sonntag wrote:
>
> > Rob Weltman wrote:
> >
> > > Steve Sonntag wrote:
> > >
> > >>  I have been thinking about the specification forunsolicited
> > >> notifications in the Java api draft version 12. The draft has two
> > >> methods in LDAPConnectionthat are concerned with Unsolicited
> > >> Notifications: one sets a flag indicating whether to keep or
> > >> discardunsolicited notifications:
> > >> setUnsolocitedNotifications(boolean flag)the other gets the value of
> > >> the flag Unsolicited notifications are retrieved by callingthe
> > >> getResponse(0) method from one of theListener classes.  the "0"
> > >> indicates message ID 0. The problem is that a listener has
> > >> association witha connection only when a request is in progressusing
> > >> that listener.  A listener in an application with5 connections open
> > >> could be servicing requestson all five connections or on none of
> > >> them.  UsinggetResponse from the listener class to getUnsolicited
> > >> notifications is problematic.  If no requestsare outstanding on the
> > >> listener, there is no associationwith a connection, so it is not
> > >> possible to checkfor unsolicited notifications. It would seem that
> > >> the only reliable way to check forand get unsolicited notifications
> > >> would be throughthe LDAPConnection class itself and not through the
> > >> listener.classes. Two more LDAPConnection methods - ugh, butperhaps
> > >> necessary? Anyone have any better ideas? -Steve
> > >> ------------------------
> > >> Steve Sonntag
> > >> Novell, Inc., the leading provider of Net services software
> > >
> > >
> > >   It might be better instead to eliminate the current unsolicited
> > > notification methods and instead have methods to add and remove
> > > listeners for usolicited notifications. The implementation can then
> > > discard unsolicited notifications if there are no listeners. For
> > > example (I haven't thought this through completely yet):
> > >
> > > LDAPConnection
> > >
> > > public LDAPResponseListener addUnsolicitedNotificationListener(
> > > LDAPResponseListener listener )
> > >
> > > public void addUnsolicitedNotificationListener( LDAPResponseListener
> > > listener )
> > >
> > > Rob
> > >
> >
> > I like your idea Rob, it fits much better with the rest of the
> > architecture.
> >
> > I have a few questions:
> >
> > Are multiple UnsolicitedNotificationListeners allowed on a given
> > connection.
> > What would the behavior be in such a situation.  The name seems to
> > indicate
> > that multiple are allowed.
> >
> > My take is that only one unsolicited notification listener exists for a
> > given connection.
> > Of course, that listener may be servicing multiple connections (using
> > the first method
> > to create it).  I am not sure of the purpose for the second method.
> > Would the first method be more clearly named
> > "setUnsolicitedNotificationListener",
> > implying there is only one?
> >
> > I assume that getResponse() blocks if no unsolicited notifications are
> > available.
> >
> > getMessageIds would return an array with 0 being one of the message ID
> > values.
> >
> > Could this listener be merged with a regular listener?  There seems no
> > reason why it
> > couldn't.
> >
> > How does one remove an unsolicited notification listener, or was your
> > second
> > method meant to be a delUnsolicitedNotificationListener?
>
>   Yes, except it should be:
>
> public void removeUnsolicitedNotificationListener( LDAPResponseListener listener )
>
>   I was thinking that you could have more than one listener - that's why the method naming (also, of course, to be consistent with the JDK's listener method naming). An implementation could feed each listener with a copy of each incoming unsolicited notification, and each client could pull out notifications independently.
>
> Rob

Sounds good.

Does there need to be a method on LDAPConnection that is something like

    LDAPResponseListener[] getUnsolicitedNotificationListeners()

to discover which listeners are allowed to receive unsolicited notifications on this connection?

-Steve
--
------------------------
Steve Sonntag
Novell, Inc., the leading provider of Net services software




From list@netscape.com  Tue Nov 28 18:52:07 2000
Received: from netscape.com (h-205-217-237-47.netscape.com [205.217.237.47])
	by ietf.org (8.9.1a/8.9.1a) with SMTP id SAA22209
	for <ldapext-archive@odin.ietf.org>; Tue, 28 Nov 2000 18:52:07 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.10.0/8.10.0) with ESMTP id eASNgDD03798;
	Tue, 28 Nov 2000 15:42:13 -0800 (PST)
Received: (from list@localhost)
	by aka.mcom.com (8.10.0/8.10.0) id eASNo8c27972;
	Tue, 28 Nov 2000 15:50:08 -0800 (PST)
Resent-Date: Tue, 28 Nov 2000 15:50:08 -0800 (PST)
Message-ID: <3A24446E.61A3724A@worldspot.com>
Date: Tue, 28 Nov 2000 15:49:02 -0800
From: Rob Weltman <robw@worldspot.com>
X-Mailer: Mozilla 4.75 [en] (Windows NT 5.0; U)
X-Accept-Language: en
MIME-Version: 1.0
To: Steven Sonntag <vtag@novell.com>
CC: Rob Weltman <robw@worldspot.com>, ietf-ldapext@netscape.com,
        Miodrag Kekic <miodrag@netscape.com>
Subject: Re: draft Java-api-12
References: <sa2279eb.090@prv-mail20.provo.novell.com> <3A23E0B1.EEFEB1C0@worldspot.com> <3A241B21.3BCBA676@novell.com> <3A241C74.1DA35020@worldspot.com> <3A2441FF.2E4167B9@novell.com>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Resent-Message-ID: <"7NEmXC.A.y0G.vSEJ6"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com
Content-Transfer-Encoding: 7bit

Steven Sonntag wrote:
> 
> > public void removeUnsolicitedNotificationListener( LDAPResponseListener listener )
> >
> >   I was thinking that you could have more than one listener - that's why the method naming (also, of course, to be consistent with the JDK's listener method naming). An implementation could feed each listener with a copy of each incoming unsolicited notification, and each client could pull out notifications independently.
> >
> > Rob
> 
> Sounds good.
> 
> Does there need to be a method on LDAPConnection that is something like
> 
>     LDAPResponseListener[] getUnsolicitedNotificationListeners()
> 
> to discover which listeners are allowed to receive unsolicited notifications on this connection?

  That is not part of the standard listener pattern in the JDK, and I don't see any production use for it. Only the connection itself cares about what listeners are registered (except for if you are debugging the implementation; if you are debugging a client you can wrap the two methods in a derived class).

Rob



From list@netscape.com  Tue Nov 28 18:58:44 2000
Received: from netscape.com (h-205-217-237-47.netscape.com [205.217.237.47])
	by ietf.org (8.9.1a/8.9.1a) with SMTP id SAA25725
	for <ldapext-archive@odin.ietf.org>; Tue, 28 Nov 2000 18:58:44 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.10.0/8.10.0) with ESMTP id eASNl5D04860;
	Tue, 28 Nov 2000 15:47:05 -0800 (PST)
Received: (from list@localhost)
	by aka.mcom.com (8.10.0/8.10.0) id eASNsxc00378;
	Tue, 28 Nov 2000 15:54:59 -0800 (PST)
Resent-Date: Tue, 28 Nov 2000 15:54:59 -0800 (PST)
Message-ID: <3A2445AF.78F08BC9@novell.com>
Date: Tue, 28 Nov 2000 16:54:23 -0700
From: Steven Sonntag <vtag@novell.com>
Organization: Novell, Inc.
X-Mailer: Mozilla 4.75 [en] (WinNT; U)
X-Accept-Language: en
MIME-Version: 1.0
To: Rob Weltman <robw@worldspot.com>
CC: ietf-ldapext@netscape.com, Miodrag Kekic <miodrag@netscape.com>
Subject: Re: draft Java-api-12
References: <sa2279eb.090@prv-mail20.provo.novell.com> <3A23E0B1.EEFEB1C0@worldspot.com> <3A241B21.3BCBA676@novell.com> <3A241C74.1DA35020@worldspot.com> <3A2441FF.2E4167B9@novell.com> <3A24446E.61A3724A@worldspot.com>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Resent-Message-ID: <"jR3uy.A.nF.SXEJ6"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com
Content-Transfer-Encoding: 7bit



Rob Weltman wrote:

> Steven Sonntag wrote:
> >
> > > public void removeUnsolicitedNotificationListener( LDAPResponseListener listener )
> > >
> > >   I was thinking that you could have more than one listener - that's why the method naming (also, of course, to be consistent with the JDK's listener method naming). An implementation could feed each listener with a copy of each incoming unsolicited notification, and each client could pull out notifications independently.
> > >
> > > Rob
> >
> > Sounds good.
> >
> > Does there need to be a method on LDAPConnection that is something like
> >
> >     LDAPResponseListener[] getUnsolicitedNotificationListeners()
> >
> > to discover which listeners are allowed to receive unsolicited notifications on this connection?
>
>   That is not part of the standard listener pattern in the JDK, and I don't see any production use for it. Only the connection itself cares about what listeners are registered (except for if you are debugging the implementation; if you are debugging a client you can wrap the two methods in a derived class).
>
> Rob

I was thinking of an application needing to disable the receipt of Unsolicited notifications
for a connection.

--
------------------------
Steve Sonntag
Novell, Inc., the leading provider of Net services software




From list@netscape.com  Tue Nov 28 19:00:46 2000
Received: from netscape.com (h-205-217-237-47.netscape.com [205.217.237.47])
	by ietf.org (8.9.1a/8.9.1a) with SMTP id TAA26786
	for <ldapext-archive@odin.ietf.org>; Tue, 28 Nov 2000 19:00:46 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.10.0/8.10.0) with ESMTP id eASNojD05902;
	Tue, 28 Nov 2000 15:50:45 -0800 (PST)
Received: (from list@localhost)
	by aka.mcom.com (8.10.0/8.10.0) id eASNweY02118;
	Tue, 28 Nov 2000 15:58:40 -0800 (PST)
Resent-Date: Tue, 28 Nov 2000 15:58:40 -0800 (PST)
Message-ID: <3A244678.BFC6604F@worldspot.com>
Date: Tue, 28 Nov 2000 15:57:44 -0800
From: Rob Weltman <robw@worldspot.com>
X-Mailer: Mozilla 4.75 [en] (Windows NT 5.0; U)
X-Accept-Language: en
MIME-Version: 1.0
To: Steven Sonntag <vtag@novell.com>
CC: ietf-ldapext@netscape.com, Miodrag Kekic <miodrag@netscape.com>
Subject: Re: draft Java-api-12
References: <sa2279eb.090@prv-mail20.provo.novell.com> <3A23E0B1.EEFEB1C0@worldspot.com> <3A241B21.3BCBA676@novell.com> <3A241C74.1DA35020@worldspot.com> <3A2441FF.2E4167B9@novell.com> <3A24446E.61A3724A@worldspot.com> <3A2445AF.78F08BC9@novell.com>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Resent-Message-ID: <"cDCab.A.0g.vaEJ6"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com
Content-Transfer-Encoding: 7bit

Steven Sonntag wrote:
> 
> Rob Weltman wrote:
> 
> > Steven Sonntag wrote:
> > >
> > > > public void removeUnsolicitedNotificationListener( LDAPResponseListener listener )
> > > >
> > > >   I was thinking that you could have more than one listener - that's why the method naming (also, of course, to be consistent with the JDK's listener method naming). An implementation could feed each listener with a copy of each incoming unsolicited notification, and each client could pull out notifications independently.
> > > >
> > > > Rob
> > >
> > > Sounds good.
> > >
> > > Does there need to be a method on LDAPConnection that is something like
> > >
> > >     LDAPResponseListener[] getUnsolicitedNotificationListeners()
> > >
> > > to discover which listeners are allowed to receive unsolicited notifications on this connection?
> >
> >   That is not part of the standard listener pattern in the JDK, and I don't see any production use for it. Only the connection itself cares about what listeners are registered (except for if you are debugging the implementation; if you are debugging a client you can wrap the two methods in a derived class).
> >
> > Rob
> 
> I was thinking of an application needing to disable the receipt of Unsolicited notifications
> for a connection.

  That can be done by removing the listeners. I don't think it is a big deal for an application to keep track of its listener(s) if it wants to disable listening later on.

Rob



From list@netscape.com  Tue Nov 28 19:13:24 2000
Received: from netscape.com (h-205-217-237-46.netscape.com [205.217.237.46])
	by ietf.org (8.9.1a/8.9.1a) with SMTP id TAA02291
	for <ldapext-archive@odin.ietf.org>; Tue, 28 Nov 2000 19:13:23 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.10.0/8.10.0) with ESMTP id eASNwXs10616;
	Tue, 28 Nov 2000 15:58:36 -0800 (PST)
Received: (from list@localhost)
	by aka.mcom.com (8.10.0/8.10.0) id eAT0BJs08089;
	Tue, 28 Nov 2000 16:11:19 -0800 (PST)
Resent-Date: Tue, 28 Nov 2000 16:11:19 -0800 (PST)
Message-ID: <3A244970.1289ACD1@worldspot.com>
Date: Tue, 28 Nov 2000 16:10:24 -0800
From: Rob Weltman <robw@worldspot.com>
X-Mailer: Mozilla 4.75 [en] (Windows NT 5.0; U)
X-Accept-Language: en
MIME-Version: 1.0
To: Brian Jarvis <bjarvis@internap.com>
CC: "Ietf-Ldapext (E-mail)" <ietf-ldapext@netscape.com>
Subject: Re: Submission: draft-weltman-ldapv3-proxy-06.txt
References: <31EF955E0A3BD411AE7F004F4E01F08423A7A6@mailut2.vpnx.com>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Resent-Message-ID: <"hVqmfD.A.H-B.mmEJ6"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com
Content-Transfer-Encoding: 7bit

Brian Jarvis wrote:
> 
> Several times in the draft you refer to "proxy access rights".  I have
> not seen these defined.  I think that there are at least two choices.
> 
> 1.  Define what proxy access rights are in terms of other, already
>     existing, permissions as defined in the draft for "Access Control
>     Model for LDAPv3" (draft-ietf-ldapext-acl-model-06.txt).
> 2.  Add new permissions to the aforementioned acl model draft that are
>     specific to proxy rights.
> 
> --the walrus

  The implementation is not defined in the draft, only the behavior. A server will typically implement the behavior in terms of its own access control system, which is orthogonal to the contents of the control and to the behavior specified for the control.

  At some point in the future, proxy access terms may be added to the documents of the ldapext working group on access control, but there is no point to making the proxy auth control document dependent on that. The control can and has been implemented in advance of an RFC on access control, and the control draft will be valid also after completion of the ldapext acl work.

Rob


> 
> -----Original Message-----
> From: Rob Weltman [mailto:robw@worldspot.com]
> Sent: Monday, November 06, 2000 13:08
> To: ietf-ldapext@netscape.com
> Subject: Submission: draft-weltman-ldapv3-proxy-06.txt
> 
>   The attached update of the proxied authorization control draft was
> submitted for publication last night.
> 
> Rob



From list@netscape.com  Tue Nov 28 22:36:58 2000
Received: from netscape.com (h-205-217-237-46.netscape.com [205.217.237.46])
	by ietf.org (8.9.1a/8.9.1a) with SMTP id WAA18532
	for <ldapext-archive@odin.ietf.org>; Tue, 28 Nov 2000 22:36:58 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.10.0/8.10.0) with ESMTP id eAT3MYs08491;
	Tue, 28 Nov 2000 19:22:34 -0800 (PST)
Received: (from list@localhost)
	by aka.mcom.com (8.10.0/8.10.0) id eAT3ZLU29843;
	Tue, 28 Nov 2000 19:35:21 -0800 (PST)
Resent-Date: Tue, 28 Nov 2000 19:35:21 -0800 (PST)
Date: Wed, 29 Nov 2000 12:33:02 +0900
From: xrt@hpu.at
Message-Id: <200011290333.MAA01338@dns1.toei-bm.co.jp>
To: xrt@hpu.at
Subject: Does Your Job Pay You Cash Daily?
MIME-Version: 1.0
Content-Type: text/plain; charset=unknown-8bit
Resent-Message-ID: <"7hT8PB.A.BSH.4lHJ6"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com
X-MIME-Autoconverted: from 8bit to quoted-printable by netscape.com id eAT3MYs08491
Content-Transfer-Encoding: 8bit
X-MIME-Autoconverted: from quoted-printable to 8bit by ietf.org id WAA18532


I have a friend that is spending about 20 minutes/day and
making $150 or more per day. He has already made over $5,000
in just 2 months. Read the body of this e-mail and you will
see what he is doing. The person that introduced him has
made over $300,000 in the last 3 years, hasn't advertised
for over a year and still has orders coming in.

THIS REALLY WORKS!!!

Have the faith, don't miss this opportunity, get involved.
It will work for you as it does for us!!!

Thank you for your time and interest. Please keep reading.

This e-mail contains the ENTIRE PLAN of how YOU can receive
$50,000 or more in the next 90 days simply sending e-mail!!
Seem impossible? Just read on and see how easy this is.

It's YOUR turn!!!

Due to the popularity of this letter on the Internet, a
major nightly news program recently devoted an entire show
to the investigation of the program described below to see
if it really can make people money.

The show also investigated whether or not the program was
legal. Their findings proved that there are absolutely no
laws prohibiting the participation in the program. This has
helped to show people that this is a simple, harmless, and
fun way to make some extra money at home.

The results have been truly remarkable. So many people are
participating that those involved are doing much better than
ever before, and it's been exciting. You will understand
once you try it yourself!!

******THE ENTIRE PLAN IS PRESENTED BELOW******

***Print This Now For Future Reference***

$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$

If you would like to make at least $50,000 in less than 90
days!

Please read this program: THEN READ IT AGAIN!!

$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$

THIS IS A LEGITIMATE, LEGAL, MONEY MAKING OPPORTUNITY!!

It does NOT require you to come into contact with people or
make or take any telephone calls. Just follow the
instructions, and you will make money. This simplified e-
mail marketing program works perfectly 100% EVERY TIME!

E-mail is the sales tool of the future. Take advantage of
this virtually free method of advertising NOW!!! The longer
you wait, the more people will be doing business using e-
mail. Get your piece of this action!!!

Hello, My name is Jonathan Rourke; I'm from Rhode Island.

The enclosed information is something I almost let slip
through my fingers. Fortunately sometime later I re-read
everything and gave some thought and study to it. Two years
ago, the corporation I worked for, for the past twelve years
downsized and my position was eliminated.

After unproductive job interviews, I decided to open my own
business. Over the past year, I incurred many unforeseen
financial problems. I owed my family, friends and creditors
over $35,000. The economy was taking a toll on my business
and I just couldn't seem to make ends meet. I had to
refinance and borrow against my home to support my family
and struggling business.

AT THAT MOMENT, something significant happened in my life.

I am writing to share the experience in hopes that this
could change your life FOREVER FINANCIALLY$$$!! In mid
December, I received this program in my e-mail. Six months
prior to receiving this program I had been sending away for
information on various business opportunities. All of the
programs I received, in my opinion, were not cost effective.
They were either too difficult for me to comprehend or the
initial investment was too much for me to risk to see if
they would work. But as I was saying, in December of 1997 I
received this program. I didn't send for it, or ask for it,
they just got my name off a mailing list.

THANK GOODNESS FOR THAT!!! After reading it several times,
to make sure I was reading it correctly, I couldn't believe
my eyes! Here was a MONEY MAKING

MACHINE I could start immediately without any debt.

Like most of you, I was still a little skeptical and little
worried about the legal aspects of it all. So I checked it
out with the U.S. Post Office (1-800-725-2161 24-hrs) and
they confirmed that it is indeed legal! After determining
the program was LEGAL I decided "WHY NOT"!!!

Initially, I sent out 10,000 e-mails. It cost me about $15
for my time on-line. The great thing about e-mail is that I
don't need any money for printing to send out the program,
and because I also send the product (reports) by e-mail, my
only expense is my time.

In less than one week, I was starting to receive orders for
REPORT # 1. By January 13, I had received 26 orders for
REPORT # 1. Your goal is to RECEIVE at least 20 ORDERS FOR
REPORT #1 WITHIN 2 WEEKS. IF YOU DON'T RECEIVE THAT MANY,
SEND OUT MORE PROGRAMS UNTIL YOU DO.

My first step in making $50,000 in 90 days was done. By
January 30, I had received 196 orders for REPORT # 2. Your
goal is to RECEIVE AT LEAST 100+ ORDERS FOR REPORT # 2
WITHIN 2 WEEKS. IF NOT, SEND OUT MORE PROGRAM UNTIL YOU DO.
ONCE YOU HAVE 100 ORDERS, THE REST IS EASY, RELAX , YOU WILL
MAKE YOUR $50,000 GOAL.

Well, I had 196 orders for REPORT # 2. 96 more than I
needed. So I sat back and relaxed. By March 1, of my e-
mailing of 10,000, I had received $58,000 with more coming
in every day. I paid off ALL my debts and bought a much
needed new car!!

Please take your time to read this plan, IT WILL CHANGE YOUR
LIFE FOREVER!!!

Remember, it won't work if you don't try it. This program
does work, but you must follow it EXACTLY! Especially the
rules of not trying to place your name in a different place.
If you do that, it won't work and you'll lose out on a lot
of money!! In order for this program to work, you must meet
your goal of 20+ orders for REPORT # 1, and 100+ orders for
REPORT # 2 and you will make $50,000 or more in 90 days.

I AM LIVING PROOF THAT IT WORKS!!! If you choose not to
participate in this program, I am sorry. It really is a
great opportunity with little cost or risk to you. If you
choose to participate, follow the program and you will be on
your way to financial security. If you are a fellow business
owner and are in financial trouble like I was, or you want
to start your own business, consider this a sign. I DID!!!

Sincerely, Jonathan Rourke

A PERSONAL NOTE FROM THE ORIGINATOR OF THIS PROGRAM:

By the time you have read the enclosed program and reports,
you should have concluded that such a program, and one that
is legal, could not have been created by an amateur. Let me
tell you a little about myself. I had a profitable business
for 10 years. Then in 1979 my business began falling off. I
was doing the same things that were previously successful
for me, but it wasn't working. Finally, I figured it out. It
wasn't me, it was the economy. Inflation and recession had
replaced the stable economy that had been with us since
1945.

I don't have to tell you what happened to the unemployment
rate: because many of you know from first hand experience.
There were more failures and bankruptcies than ever before.
The middle class was vanishing. Those who knew what they
were doing, invested wisely and moved up. Those who did not,
including those who never had anything to save or invest,
were moving down into the ranks of the poor.

As the saying goes. "THE RICH GET RICHER AND THE POOR GET
POORER". The traditional methods of making money will never
allow you to "move up" or "get rich", inflation will see to
that.

You have just received information that can give you
financial freedom for the rest of your life, with "NO RISK"
and "JUST A LITTLE BIT OF EFFORT." You can make more money
in the next few months than you have ever imagined. I should
also point out that I will not see a penny of this money,
nor anyone else who had provided a testimonial for this
program.

I have retired from the program after sending thousands and
thousands of programs. Follow the program EXACTLY AS
INSTRUCTED. Do not change it in any way. It works
exceedingly well as it is now.

Remember to e-mail a copy of this exciting report to
everyone you can think of. One of the people you send this
to may send out to 50,000 people in a bulk e-mail and your
name will be on every one of them!!

Remember though, the more you send out, the more potential
customers you will reach. So my friend, I have given you the
ideas, information, materials and opportunity to become
financially independent.

IT IS UP TO YOU!! NOW DO IT!!!

Before you delete this program from your in box, as I almost
did, take a little time to read it and REALLY THINK ABOUT
IT. Get a pencil and figure out what could happen. YOU will
definitely get back what you invested. Any doubts you have
will vanish when your first orders come in.

$$$IT WORKS!!!$$$

Jody Jacobs..Richmond, VA

HERE'S HOW THIS AMAZING PROGRAM WILL MAKE YOU THOUSANDS OF
DOLLARS$$$!!!

This method of raising capital REALLY WORKS 100% EVERY TIME.
I am sure that you could use up to $50,000 or more in the
next 90 days. Before you say BULL...please read this program
carefully. This is NOT a chain letter, but a perfectly legal
money making business.

As with all multi-level business, we build our business by
recruiting new partners and selling our products. Every
state in the USA allows you to recruit new multi-level
business partners, and we sell and deliver a product for
EVERY dollar received.

YOUR ORDERS COME BY MAIL AND ARE FILLED BY E-MAIL, so you
are not involved in personal selling. You do it privately in
your own home, store or office. This is the EASIEST
marketing plan anywhere! It is simply order filling by e-
mail!

The product is informational and instructional material.
Keys to the secrets for everyone on how to open the doors to
the magic world of E-COMMERCE, the information highway, the
wave of the future!!!

PLAN SUMMARY:

1. You order the 4 reports listed below ($5 each). They come
to you by e-mail.

2. Save a copy of this entire letter and put your name after
Report # 1 and move the other names down.

3. Via the internet, access Yahoo.com or any of the other
major search engines to locate hundreds of bulk e-mail
service companies (search for "Bulk e-mail" and have them
send 25,000 - 50,000 e-mails for you.) Cost about $49+
depending on the company.

4. Orders will come to you by postal mail- simply e-mail
them the Report they ordered.

Let me ask you; isn't this about as easy as it gets?

By the way there are over 50 MILLION e-mail addresses with
millions more joining the internet each year so don't worry
about "running out" or "saturation". People are used to
seeing and hearing the same advertisements every day on
radio/TV. How many times have you received the same pizza
flyers on your door: Then one day you are hungry for pizza
and you order one; same thing with this letter. I received
this letter many times, then one day I decided it was time
to try it.

YOU CAN START TODAY; JUST DO THESE EASY STEPS:

STEP #1. ORDER THE FOUR REPORTS

Order the four reports shown on the list below (you can't
sell them if you don't order them). For each report, send
$5.00 CASH, the NAME & NUMBER OF THE REPORT YOU ARE
ORDERING, YOUR E-MAIL ADDRESS, and YOUR NAME & RETURN
ADDRESS (in case of a problem) to the person whose name
appears on the list next to the report.

MAKE SURE YOUR RETURN ADDRESS IS ON YOUR ENVELOPE IN CASE OF
ANY MAIL PROBLEMS!

Within a few days you will receive, by e-mail, each of the
four reports. Save them on your computer so you can send
them to the 1000's of people who will order them from you.

STEP # 2. ADD YOUR MAILING ADDRESS TO THIS LETTER

a. look below for the listing of the four reports.

b. After you've ordered the four reports, delete the name
and address under REPORT #4. This person has made it through
the cycle.

c. Move the name and address under REPORT # 3 down to REPORT
# 4.

d. Move the name and address under REPORT # 2 down to REPORT
# 3.

e. Move the name and address under REPORT # 1 down to REPORT
# 2.

f. Insert your name/address in the REPORT # 1 position.

Please make sure you COPY ALL INFORMATION, every name and
address, ACCURATELY!!!

STEP # 3. Take this entire letter, including the modified
list of names , and save it to your computer. Make NO
changes to these instructions. Now you are ready to use this
entire e-mail to send by e-mail to prospects.

Report # 1 will tell you how to download bulk e-mail
software and e-mail addresses so you can send it out to
thousands of people while you sleep! Remember that 50,000+
new people are joining the internet every month.

Your cost to participate in this is practically nothing
(surely you can afford $20 and the initial bulk mailing
cost). You obviously already have a computer and an Internet
connection and e-mailing is FREE!!

There are two primary methods of building your downline:

METHOD # 1: SENDING BULK E-MAIL

Let's say that you decide to start small, just to see how it
goes, and we'll assume you and all those involved e-mail out
only 2,000 programs each. Let's also assume that the mailing
receives a 0.5% (1/2%) response. The response could be much
better. Also, many people will e-mail out hundreds of
thousands of programs instead of 2,000 (why stop at 2,000?)
But continuing with this example, you send out only 2,000
programs. With a 0.5% response, that is only 10 orders for
REPORT # 1. Those 10 people respond by sending out 2,000
programs each for a total of 20,000. Out of those 0.5%, 100
people respond and order REPORT # 2. Those 100 mail out
2,000 programs each for a total of 200,000.

The 0.5% response to that is 1,000 orders for REPORT # 3.
Those 1,000 send out 2,000 programs each for a 2,000,000
total. The 0.5% response to that is 10,000 orders for REPORT
# 4. That's 10,000 $5 bills for you. CASH!!! Your total
income in this example is $50 + $500 + $5000 + $50,000 for a
total of $55,500!!!

REMEMBER FRIEND, THIS IS ASSUMING 1,990 OUT OF THE 2,000
PEOPLE YOU MAIL TO WILL DO ABSOLUTELY NOTHING AND TRASH THIS
PROGRAM! DARE TO THINK FOR A MOMENT WHAT WOULD HAPPEN IF
EVERYONE, OR HALF SENT OUT 100,000 PROGRAMS INSTEAD OF
2,000.

Believe me, many people will do just that , and more!!

METHOD # 2: PLACING FREE ADS ON THE INTERNET

Advertising on the internet is very, very inexpensive, and
there are HUNDREDS of FREE places to advertise. Let's say
you decide to start small just to see how well it works.
Assume your goal is to get ONLY 10 people to participate on
your first level. (Placing a lot of FREE ads on the Internet
will EASILY get a larger response.)

Also assume that everyone else in YOUR ORGANIZATION gets
ONLY 10 downline

members. Look how this small number accumulates to achieve
the STAGGERING results below:

1st level: your first 10 send you $5 for a total of $50

2nd level: 10 members from those 10 ($5 X 100) for a total
of $500

3rd level: 10 members from those 100 ($5 X 1,000) for a
total of $5,000

4th level: 10 members from those 1,000 ($5 X 10,000) for a
total of $50,000

$$$$$$$$$$$$THIS TOTALS---------$55,550 $$$$$$$$$$$$$

AMAZING ISN'T IT? Remember friends, this assumes that the
people who participate only recruit 10 people each. Think
for a moment what would happen if they got 20 people to
participate!! Most people get 100's of participants and many
will continue to work this program, sending out programs
WITH YOUR NAME ON THEM for years! THINK ABOUT IT!!

People are going to get e-mails about this plan from you or
somebody else and many will work this plan - the question
is: Don't you want your name to be on the e-mails they send
out?

***DON'T MISS OUT!!!*** JUST TRY IT ONCE!!***

***SEE WHAT HAPPENS!!!***YOU'LL BE AMAZED!!***

ALWAYS PROVIDE SAME-DAY SERVICE ON ALL ORDERS!

This will guarantee that the e-mail THEY send out with YOUR
name and address on it will be prompt because they can't
advertise until they receive the report!

GET STARTED TODAY: PLACE YOUR ORDER FOR THE FOUR REPORTS
NOW!

Note: ALWAYS SEND $5 CASH (U.S. CURRENCY) FOR EACH REPORT.
CHECKS NOT ACCEPTED

Make sure the cash is concealed by wrapping it in two sheets
of paper. On one of those sheets of paper write:

a. The number & name of the report you are ordering.

b. Your e-mail address.

c. Your name & postal address.

REPORT #1 "The Insider’s Guide
to Advertising for Free on the Internet" 

ORDER REPORT #1 FROM
Megan Ward 
120 Hana Hwy # 9
PMB 196 Paia, HI 96779

REPORT #2 "The Insider’s Guide to Sending Bulk E-mail on the
Internet" 

ORDER REPORT #2 FROM 
Tom More
110 24th St.
Newport Beach, CA. 92663

REPORT #3 "The Secrets to Multilevel Marketing on the
Internet" 

ORDER REPORT #3 FROM
Randy Catlett 817 W. Iola Place
Broken Arrow, OK 74012

REPORT #4 "How to become a Millionaire utilizing the Power
of Multilevel Marketing and the Internet"

ORDER REPORT #4 FROM
Sam Rappa
319 Pulaski Rd
Calumet City, IL 60409

******************TIPS FOR SUCCESS********************

TREAT THIS AS YOUR BUSINESS! Be prompt, professional, and
follow the directions accurately. Send for the four reports
IMMEDIATELY so you will have them when the orders start
coming in, because: When you receive a $5 order, you MUST
send out the requested product/report. It is required for
this to be a legal business and they need the reports to
send out their letters (with your name on them!)

ALWAYS PROVIDE SAME-DAY SERVICE ON THE ORDERS YOU RECEIVE.
Be patient and persistent with this program...if you follow
the instructions exactly; results WILL FOLLOW$$$

******************YOUR SUCCESS GUIDELINES***************

Follow these guidelines to guarantee your success. If you
don't receive 20 orders for REPORT # 1 within two weeks,
continue advertising or sending e-mails until you do. Then,
a couple of weeks later you should receive at least 100
orders for REPORT # 2

If you don't, continue advertising or sending e-mails until
you do. Once you have received 100 or more orders for REPORT
# 2, YOU CAN RELAX, because the system is already working
for you, and the cash will continue to roll in!

THIS IS IMPORTANT TO REMEMBER: Every time your name is moved
down on the list, you are placed in front of a DIFFERENT
report. You can KEEP TRACK of your PROGRESS by watching
which report people are ordering from you.

To generate more income, simply send another batch of e-
mails or continue placing ads and start the whole process
again.! There is no limit to the income you will generate
from this business!

Before you make your decision as to whether or not you
participate in this program, PLEASE answer one question. ARE
YOU HAPPY WITH YOUR PRESENT INCOME OR JOB? If the answer is
no, then please look at the following facts about this super
simple MLM program:

1. NO face to face selling, NO meetings, NO inventory, NO
telephone calls, NO big cost to start, Nothing to learn, NO
skills needed!! (Surely you know how to send e-mail!)

2. NO equipment to buy; you already have a computer and
internet connection; so you have everything you need to fill
orders!

3. You are selling a product which does NOT COST ANYTHING TO
PRODUCE OR SHIP! (e-mailing copies of the reports is FREE!)

4. All of your customers pay you in CA$H! This program will
change your LIFE FOREVER!!! Look at the potential for you to
be able to work a super-high paying leisurely easy business
from home!

$$$$FINALLY MAKE SOME DREAMS COME TRUE!$$$

ACT NOW! Take your first step toward achieving financial
independence. Order the reports and follow the program
outlined above: SUCCESS will be your reward.

Thank you for your time and consideration.

PLEASE NOTE: If you need help with starting a business,
registering a business name, learning how income tax is
handled, etc., contact your local office of the Small
Business Administration (a Federal Agency) 1-800-827-5722
for free help and answers to questions.

Also, the Internal Revenue Service offers free help via
telephone and free seminars about business tax requirements.
Your earnings are highly dependent on your activities and
advertising. The information contained on this site and in
the reports constitutes no guarantees stated nor implied. In
the event that it is determined that this site or report
constitutes a guarantee of any kind, that guarantee is now
void. The earnings amounts listed on this site and in the
report are estimates only. If you have any questions of the
legality of this program, contact the Office of Associate
Director for Marketing Practices, Federal Trade Commission,
Bureau of Consumer Protection in Washington, DC.

Under Bill s.1618 TITLE 111 passed by the 105th US Congress,
this letter cannot be considered spam as long as the sender
includes contact information and a method of removal.

This is a one time e-mail transmission. No request for
removal is necessary.




From list@netscape.com  Wed Nov 29 06:43:56 2000
Received: from netscape.com (h-205-217-237-46.netscape.com [205.217.237.46])
	by ietf.org (8.9.1a/8.9.1a) with SMTP id GAA08508
	for <ldapext-archive@odin.ietf.org>; Wed, 29 Nov 2000 06:43:55 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.10.0/8.10.0) with ESMTP id eATBTWs07958;
	Wed, 29 Nov 2000 03:29:33 -0800 (PST)
Received: (from list@localhost)
	by aka.mcom.com (8.10.0/8.10.0) id eATBgKM20085;
	Wed, 29 Nov 2000 03:42:20 -0800 (PST)
Resent-Date: Wed, 29 Nov 2000 03:42:20 -0800 (PST)
Message-Id: <200011291136.eATBarD20540@smtp11.singnet.com.sg>
X-Sender: kool2ksg@yahoo.com
From: Webmaster <kool2ksg@yahoo.com>
To: "eweb8" <kool2ksg@yahoo.com>
Date: Wed, 29 Nov 2000 19:44:36 +0800
Subject: FREE! 20 profit centers in One Centralized online PROFIT MACHINE!! 
MIME-Version: 1.0
Content-Type: text/plain; charset=iso-8859-1
Content-Transfer-Encoding: 7bit
Resent-Message-ID: <"9yzeQC.A.j5E.buOJ6"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com
Content-Transfer-Encoding: 7bit

Just look at some of what we have to offer! Totally FREE!

  FREE Income Generating Programs All Under One Roof! 
  FREE Self-Replicating Web site! 
  FREE Personal Page To Promote Your Current Programs! 
  FREE Training Letters! 
  FREE 3 by Infinity Matrix Downline Builder 
  FREE LIVE Internet Training! 
  FREE Internet Tools! 
  FREE Personal/Business Web site! 
  FREE Leads! 
  FREE Money! 
  FREE FFA advertising Forum! 
  FREE Autoresponders! 
  FREE Motivation! 
  FREE Chat Room! 
  FREE Communication With Your Entire Team! 
  FREE Genealogy Viewer! 
A Real Business In A Box Concept with MORE TO COME.....ALL FREE! 

All This Great Free  Stuff? There Must Be A Catch? 

There's no catch! This website is 100% FREE. It's all designed to help you promote 
the last website you'll ever need while maximizing your income from multiple 
STREAMS.

Request for info!
mailto:catchfri@usa.com?subject=infopls!

Have A Great Day!

.......................................................................
To be removed from this mailing list please send mailto:catchfri@usa.com?subject=remove 
me!
Sorry for any Inconvience.











From list@netscape.com  Wed Nov 29 17:56:45 2000
Received: from netscape.com (h-205-217-237-47.netscape.com [205.217.237.47])
	by ietf.org (8.9.1a/8.9.1a) with SMTP id RAA15098
	for <ldapext-archive@odin.ietf.org>; Wed, 29 Nov 2000 17:56:45 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.10.0/8.10.0) with ESMTP id eATMl2D01177;
	Wed, 29 Nov 2000 14:47:02 -0800 (PST)
Received: (from list@localhost)
	by aka.mcom.com (8.10.0/8.10.0) id eATMsw610458;
	Wed, 29 Nov 2000 14:54:58 -0800 (PST)
Resent-Date: Wed, 29 Nov 2000 14:54:58 -0800 (PST)
To: V@tzw.de
From: <V@tzw.de>
Subject: Lady V:  The Pleasure Pill for Women!
Date: Thu, 30 Nov 2000 06:42:36 +0800
Message-ID: <77374D18ED.AGEF62@SINET2.sinet.net.cn>
Resent-Message-ID: <"rzmQp.A.FjC.BlYJ6"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com


LADY V: The Pleasure Pill for Women!

Men Have Their Viagra®! Finally, A Pill for Women! 

It's Here! The Revolutionary Woman's Sexual Sensation is Now
                           Available.

Researchers are calling Lady V the greatest breakthrough
for women since the Birth Control Pill. And you don't even need
a prescription to get it!

               Welcome to the New Sexual Revolution!

It's no secret that men have been having the time of their
lives since the wonder pill Viagra® was made available. But,
women were left out in the cold with no pill... nothing! 
Well now thanks to an all-star team of medical researchers 
who have been working around the clock, those days are finally
over. The perfect female "pleasure pill" has been created and
you don't even need a prescription. You can now get it from
Lion Sciences!

Lady V is the world's first pleasure pill scientifically 
designed for women. Lady V is an all-natural proprietary 
herbal blend of prosexual nutrients from around the world
synergistically blended to naturally stimulate neurotransmitter
endorphin signals. This magical combination increases targeted
blood flow, unleashes natural stimulator for maximum stimulation,
triggering pleasure responses quickly. Lady V is safe, natural
and doctor-recommended.
Since its introduction Lady V has been taking the world by storm!
From Malibu to Miami women are enjoying the most intense pleasure
of their lives! 

• 100% Natural
• Safe
• The Highest Quality Pharmaceutical Pure Nutraceuticals
• Guaranteed Potency
• Certified Purity

                     Lady V is Sweeping the Nation!

Women are going crazy over Lady V. Suddenly couples are falling
in love all over again. The passion and pleasure that women are
reporting is off the charts! Lady V has an incredible 88% success
rate. Best of all, while Viagra costs $10 a pill, Lady V costs
less than $1 a pill! It's not just a man's world anymore!

Just look at what a few women have to say:

"I thought my love life was good before, but now it is out of
this world! Lady V is remarkable." — Mary J., Interior Designer

"I haven't smiled like this in a long time. My husband and I 
feel like a couple of 19 year olds again!" — Debra T, Assistant Buyer

"Imagine what it would feel like to have incredible passion
and pleasure anytime you want." — Jennifer C., Film Editor

"Suddenly my husband and I are spending more time in the bedroom
instead of the TV room." — Angie R., Realtor

Ingredients: Vitamin D, Niacin, Vitamin B6, Folic Acid,
Vitamin B12, Avena Sativa, Kava Kava, Guarana, White Willow Extract,
Mura Puama, St. John's Wort, Siberian Ginseng, Cordyceps, Damiana,
and L-Taurine.

Each bottle of Lady V contains 30 tablets.
Take three capsules one hour before romantic activity
as a dietary supplement. 

Risk Free: Double Your Money Back Guarantee

If Lady V does not give the desired results as stated
above, simply return the unused portion for a
double-your money back refund. No questions asked! 

Order Now: Safe, Fast, Secure, Private

Lady V with its DOUBLE YOUR MONEY BACK GUARANTEE is
available only through this special promotional offer.
Herbal V arrives in plain packaging for your privacy.
Any and all information is kept strictly confidential.

Payment Methods

You may FAX or Postal Mail Checks, MasterCard, Visa,
& American Express.payments. Money Orders
are accepted only by Postal Mail. 


Each bottle of Lady V contains 30 tablets.


Step 1: Place a check by your desired quanity.


______ 1 Bottle of Lady V  $24


______ 2 Bottles of Lady V $44


______ 3 Bottles of Lady V $59


Please add $6 shipping and handling for any size order. 
[ Total cost including shipping & handling, 
1 bottle=$30, 2 bottles=$50, 3 bottles=$65 ]

International Orders
Please add $18 shipping and handling for any size order.
[ Total cost including shipping & handling,
1 bottle=$42, 2 bottles=$62, 3 bottles=$77 ]
We cannot accept foreign checks.
International money orders or credit cards only.

Step 2: Place a check by your desired payment method 
and complete fields if necessary.


_____Check or CHECK-BY-FAX [details below]


_____Money Order 


_____American Express 
Account Number__________________ Exp____/____

_____Visa
Account Number__________________ Exp____/____

_____MasterCard
Account Number__________________ Exp____/____


Please make your check or money order payable to
"Lion Sciences National".
 

Step 3: Please complete and print the following fields clearly.


Name ___________________________________________________ 


Address _________________________________________________


City ____________________________________________________ 


State ___________________________________________________ 


Zip _____________________________________________________ 


E-mail __________________________________________________ 


Signature _________________________________________________
[ required for check and credit card orders]



             Toll Free FAX Order Line: 1-800-940-6590
If faxing in your order, please state whether you require
a fax, email, or no confirmation at all. 
Allow up to one day for confirmation, if requested.
FAX orders are processed immediately.

  Or, print & mail to: LSN   
                       273 S. State Rd. 7, #193
                       Margate, FL 33068-5727               


        ______________________________________________________


*CHECK BY FAX ORDERS: Complete the check as normal. Tape
the check in the area below. Below the check, clearly write
the check number, all numbers at the bottom of the check,
& your name. Tape the check below and fax the check to the
toll free FAX number above. Void the check. Our merchant
will electronically debit your account for the amount of 
the check; your reference number for this transaction will
be your check number. Nothing could be safer & easier !

                          TAPE CHECK BELOW















              _____________________________________________________________

This is a one time mailing: Removal is automatic and no further 
contact is necessary. Please Note: Lady V is not intended to
diagnose, treat, cure or prevent any disease. As individuals differ,
so will results. Lady V helps provide herbal and nutritional support
for female sexual performance. The FDA has not evaluated these 
statements. For details about our double your money back guarantee,
please write to the above address, attention consumer affairs 
department; enclose a self addressed stamped envelope for this and any 
requested contact information.
Thank You.



From list@netscape.com  Wed Nov 29 18:15:51 2000
Received: from netscape.com (h-205-217-237-47.netscape.com [205.217.237.47])
	by ietf.org (8.9.1a/8.9.1a) with SMTP id SAA20335
	for <ldapext-archive@odin.ietf.org>; Wed, 29 Nov 2000 18:15:51 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.10.0/8.10.0) with ESMTP id eATN6kD05839;
	Wed, 29 Nov 2000 15:06:46 -0800 (PST)
Received: (from list@localhost)
	by aka.mcom.com (8.10.0/8.10.0) id eATNEfg21252;
	Wed, 29 Nov 2000 15:14:41 -0800 (PST)
Resent-Date: Wed, 29 Nov 2000 15:14:41 -0800 (PST)
Message-ID: <C01853FCD0E0D3119F7400508B553CB1357B88@MAIL2>
From: "Dodor, Dmitri" <ddodor@quallaby.com>
To: "'ietf-ldapext@netscape.com'" <ietf-ldapext@netscape.com>
Subject:  LDAP server MERRITT
Date: Wed, 29 Nov 2000 18:10:56 -0500
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2650.21)
Content-Type: text/plain;
	charset="iso-8859-1"
Resent-Message-ID: <"d2XCmC.A.yLF.g3YJ6"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com





Hi !
I'm looking for any information about LDAP server named "MERRITT .
Preferably URL to developer or a distributor
Thank you 
Dmitri 



From list@netscape.com  Thu Nov 30 08:47:34 2000
Received: from netscape.com (h-205-217-237-47.netscape.com [205.217.237.47])
	by ietf.org (8.9.1a/8.9.1a) with SMTP id IAA08758
	for <ldapext-archive@odin.ietf.org>; Thu, 30 Nov 2000 08:47:33 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.10.0/8.10.0) with ESMTP id eAUDb4D05944;
	Thu, 30 Nov 2000 05:37:05 -0800 (PST)
Received: (from list@localhost)
	by aka.mcom.com (8.10.0/8.10.0) id eAUDj2A23909;
	Thu, 30 Nov 2000 05:45:02 -0800 (PST)
Resent-Date: Thu, 30 Nov 2000 05:45:02 -0800 (PST)
X-Sender: twinkbratt@simple.com
From: TERESA <twinkbratt@simple.com>
To: ietf-ldapext@netscape.com
Date: Thu, 30 Nov 2000 05:46:09 -0800
Subject: $FREE - How to Make $100,000-FREE$
MIME-Version: 1.0
Content-Type: text/plain; charset=iso-8859-1
Content-Transfer-Encoding: 7bit
Message-Id: <200011300641828.SM01254@localhost>
Resent-Message-ID: <"4FEDkC.A.P1F.dnlJ6"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com
Content-Transfer-Encoding: 7bit

$FREE - How to Make $100,000-FREE$ 
FREE newsletter shows you how to build a $100,000 home business. 
We are sponsoring 1,000's monthly worldwide without mailing anything, without 
faxing anything, without calling anyone! 
Totally internet and system driven and we have only scratched the surface. 
Enroll for FREE today and receive an Internet Income Course at no charge. 
Click here!
http://www.sixfigureincome.com/free/?495617



From list@netscape.com  Thu Nov 30 15:51:05 2000
Received: from netscape.com (h-205-217-237-46.netscape.com [205.217.237.46])
	by ietf.org (8.9.1a/8.9.1a) with SMTP id PAA10934
	for <ldapext-archive@odin.ietf.org>; Thu, 30 Nov 2000 15:51:03 -0500 (EST)
Received: from aka.mcom.com (aka.mcom.com [205.217.237.180])
	by netscape.com (8.10.0/8.10.0) with ESMTP id eAUKaBs26580;
	Thu, 30 Nov 2000 12:36:14 -0800 (PST)
Received: (from list@localhost)
	by aka.mcom.com (8.10.0/8.10.0) id eAUKn1U18582;
	Thu, 30 Nov 2000 12:49:01 -0800 (PST)
Resent-Date: Thu, 30 Nov 2000 12:49:01 -0800 (PST)
Message-ID: <3A26BD37.A145A162@netscape.com>
Date: Thu, 30 Nov 2000 15:48:55 -0500
From: mcs@netscape.com (Mark C Smith)
Organization: iPlanet E-Commerce Solutions
X-Mailer: Mozilla 4.75 [en] (Windows NT 5.0; U)
X-Accept-Language: en
MIME-Version: 1.0
To: ietf-ldapext@netscape.com
Subject: Re: I-D ACTION:draft-ietf-ldapext-ldap-c-api-05.txt
References: <200011242311.SAA21721@ietf.org>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Resent-Message-ID: <"UfUTJD.A.EiE.80rJ6"@glacier>
Resent-From: ietf-ldapext@netscape.com
X-Mailing-List: <ietf-ldapext@netscape.com> 
X-Loop: ietf-ldapext@netscape.com
Precedence: list
Resent-Sender: ietf-ldapext-request@netscape.com
Content-Transfer-Encoding: 7bit

Some notes about this draft (C LDAP API).  I submitted the -05 revision
mainly because the document had expired and was removed from the I-D
repository a while ago (which makes it hard to discuss the document). 
But there are additional changes that were agreed to during the last
call that I have not yet incorporated.  I apologize.  I plan to make
those edits after the San Diego meeting and submit a -06 revision in
January 2001.  There are also two open issues that need to be addressed,
namely:

1) Some functions in the API do not provide a reliable way for the
caller to detect errors.  Possibly solutions: (1) specify a global LDAP
error reporting mechanism, or (2) modify the calls to return result
codes directly.  The authors of the document plan to work on this issue
and come back to the group with a concrete proposal.

2) Lack of separation between local (API generated) result codes and
ones returned by the LDAP server.  As currently defined, some space is
reserved for APIs within the LDAPv3 result codes.  Some people think
this is a problem, and others do not.  I personally do not think this is
a major flaw.

-- 
Mark Smith
Netscape


Internet-Drafts@ietf.org wrote:
> 
> A New Internet-Draft is available from the on-line Internet-Drafts directories.
> This draft is a work item of the LDAP Extension Working Group of the IETF.
> 
>         Title           : The C LDAP Application Program Interface
>         Author(s)       : M. Smith, T. Howes, A. Herron, M. Wahl, A. Anantha
>         Filename        : draft-ietf-ldapext-ldap-c-api-05.txt
>         Pages           : 83
>         Date            : 22-Nov-00
> 
> This document defines a C language application program interface (API)
> to the Lightweight Directory Access Protocol (LDAP). This document
> replaces the previous definition of this API, defined in RFC 1823,
> updating it to include support for features found in version 3 of the
> LDAP protocol.  New extended operation functions were added to support
> LDAPv3 features such as controls.  In addition, other LDAP API changes
> were made to support information hiding and thread safety.
> 
> The C LDAP API is designed to be powerful, yet simple to use. It defines
> compatible synchronous and asynchronous interfaces to LDAP to suit a
> wide variety of applications. This document gives a brief overview of
> the LDAP model, then an overview of how the API is used by an applica-
> tion program to obtain LDAP information.  The API calls are described in
> detail, followed by appendices that provide example code demonstrating
> use of the API, the namespace consumed by the API, a summary of require-
> ments for API extensions, known incompatibilities with RFC 1823, and a
> list of changes made since the last revision of this document.
> 
> A URL for this Internet-Draft is:
> http://www.ietf.org/internet-drafts/draft-ietf-ldapext-ldap-c-api-05.txt
> 
> Internet-Drafts are also available by anonymous FTP. Login with the username
> "anonymous" and a password of your e-mail address. After logging in,
> type "cd internet-drafts" and then
>         "get draft-ietf-ldapext-ldap-c-api-05.txt".
> 
> A list of Internet-Drafts directories can be found in
> http://www.ietf.org/shadow.html
> or ftp://ftp.ietf.org/ietf/1shadow-sites.txt
> 
> Internet-Drafts can also be obtained by e-mail.
> 
> Send a message to:
>         mailserv@ietf.org.
> In the body type:
>         "FILE /internet-drafts/draft-ietf-ldapext-ldap-c-api-05.txt".
> 
> NOTE:   The mail server at ietf.org can return the document in
>         MIME-encoded form by using the "mpack" utility.  To use this
>         feature, insert the command "ENCODING mime" before the "FILE"
>         command.  To decode the response(s), you will need "munpack" or
>         a MIME-compliant mail reader.  Different MIME-compliant mail readers
>         exhibit different behavior, especially when dealing with
>         "multipart" MIME messages (i.e. documents which have been split
>         up into multiple messages), so check your local documentation on
>         how to manipulate these messages.
> 
> 
> Below is the data which will enable a MIME compliant mail reader
> implementation to automatically retrieve the ASCII version of the
> Internet-Draft.
> 
>   ------------------------------------------------------------------------
> Content-Type: text/plain
> Content-ID:     <20001122150004.I-D@ietf.org>



