From owner-ietf-ldup@mail.imc.org  Wed Sep 13 10:52:41 2000
Received: from ns.secondary.com (ns.secondary.com [208.184.76.39])
	by ietf.org (8.9.1a/8.9.1a) with SMTP id KAA09702
	for <ldup-archive@odin.ietf.org>; Wed, 13 Sep 2000 10:52:39 -0400 (EDT)
Received: (from majordomo@localhost)
	by ns.secondary.com (8.9.3/8.9.3) id HAA04230
	for ietf-ldup-bks; Wed, 13 Sep 2000 07:02:08 -0700 (PDT)
Received: from mailgate1.austin.ibm.com (mg01.austin.ibm.com [192.35.232.18])
	by ns.secondary.com (8.9.3/8.9.3) with ESMTP id HAA04224
	for <ietf-ldup@imc.org>; Wed, 13 Sep 2000 07:02:04 -0700 (PDT)
Received: from netmail.austin.ibm.com (netmail.austin.ibm.com [9.53.250.98])
	by mailgate1.austin.ibm.com (AIX4.3/8.9.3/8.9.3) with ESMTP id JAA06806
	for <ietf-ldup@imc.org>; Wed, 13 Sep 2000 09:05:26 -0500
Received: from estokes.austin.ibm.com (lig32-225-40-7.us.lig-dial.ibm.com [32.225.40.7])
        by netmail.austin.ibm.com (8.8.5/8.8.5) with ESMTP id JAA29476;
        Wed, 13 Sep 2000 09:03:59 -0500
Message-Id: <5.0.0.19.0.20000913085113.00a64c60@popmail2.austin.ibm.com>
X-Sender: stokes@popmail2.austin.ibm.com
X-Mailer: QUALCOMM Windows Eudora Version 5.0.0.19 (Beta)
Date: Wed, 13 Sep 2000 09:03:51 -0500
To: internet-drafts@ietf.org
From: Ellen Stokes <stokes@austin.ibm.com>
Subject: draft-ietf-ldup-replica-req-04.txt   - please publish
Cc: ietf-ldup@imc.org
Mime-Version: 1.0
Content-Type: multipart/mixed;
	boundary="=====================_4224254==_"
Sender: owner-ietf-ldup@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-ldup/mail-archive/>
List-ID: <ietf-ldup.imc.org>
List-Unsubscribe: <mailto:ietf-ldup-request@imc.org?body=unsubscribe>

--=====================_4224254==_
Content-Type: text/plain; charset="us-ascii"; format=flowed

Internet drafts editor,
Please publish the attached draft.  It is a revision of the replication 
requirements draft 03.


ldup-ers,
Please find attached the revised ldup requirements draft.

This draft has been reorganized for readability.  The requirements are
labeled by type (G=general, M=model, P=protocol, SC=schema, SM=single
master, MM=multi-master, AM=administration, S=security).  There are
also 2 appendices:  Appendix A contains replication usage scenarios to
substantiate and validate the requirements, and Appendix B provides
rationale and thinking behind the requirements and raises some issues
that should be considered during design.

This draft has also been modified to address the items raised in email
by Albert Langer.  We now present these items.


Four issues were raise with the requirements.  These are listed below with
references to the items in the requirements draft that address those 
requirements.

+ No requirement for convergence or "eventual consistency": [G1]

+ No requirement for atomic operations: [P6, discussion in Appendix B.5 
about places
where atomicity may be lost]

+ No requirement to support mandatory operational attributes of LDAP: 
[Appendix B.8]

+ Definition of "updateable replica" inconsistent with multi-master
replication: [Definition changed]


Issues were also raised in 8 areas.  These 8 areas are listed below with
references to the items in the requirements draft that address those areas.

1. "Atomicity and related concepts" - P6, Appendix B.5

2. "ModifiersName and other Operational Attributes" - M3, Appendix B.8

3. "Change Reports - ProtocolOps or Primitives" - This is a 
design/implementation
decision and therefore not addressed in the requirements.

4. "Eventual Convergence - Version numbers or timestamps" - Eventual 
Convergence
is addressed by MM5, MM6, G1, and definition of Eventual Consistency.  Version
number or timestamps is a design/implementation decision and therefore not
addressed in the requirements.

5. "Oscillation" - MM5, MM6, G1, and definition of Eventual Consistency

6. "Implementation and Performance Issues" - G3, G4, G5, G6

7. "Revocation notices". - Appendix B.5 covers the situation where they 
might be needed;
also MM5 and MM6

8. "Strong consistency and transactions" - G2 and P7


Please send your comments to the list (ietf-ldup@imc.org).  We will shortly 
propose that this draft
be submitted once again for workgroup last call.

Thanks.
Ellen
--=====================_4224254==_
Content-Type: text/plain; charset="us-ascii"
Content-Disposition: attachment; filename="draft-ietf-ldup-replica-req-04.txt"

Internet-Draft                                         Ellen J. Stokes
LDAP Duplication/Replication/Update                     Tivoli Systems
Protocols WG                                          Russel F. Weiser
Intended Category: Informational               Digital Signature Trust
Expires: March 2001                                      Ryan D. Moats
                                                          Coreon, Inc.
                                                      Richard V. Huber
                                                     AT&T Laboratories
                                                        September 2000




                    LDAPv3 Replication Requirements
                   draft-ietf-ldup-replica-req-04.txt


Status of This Memo


This document is an Internet-Draft and is in full conformance with all
provisions of Section 10 of RFC2026.


Internet-Drafts are working documents of the Internet Engineering Task
Force (IETF), its areas, and its working groups.  Note that other
groups may also distribute working documents as Internet-Drafts.


Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time.  It is inappropriate to use Internet-Drafts as reference material
or to cite them other than as "work in progress."


The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/lid-abstracts.txt.


The list of Internet-Drafts Shadow Directories can be accessed at
http://www.ietf.org/shadow.html.


Copyright Notice


Copyright (C) The Internet Society (2000). All Rights Reserved.



Abstract


This document discusses the fundamental requirements for replication of
data accessible via the LDAPv3 [RFC2251] protocol. It is intended to be
a gathering place for general replication requirements needed to
provide interoperability between informational directories.



Stokes, et al           Expires February 2001                [Page 1] 
Internet-Draft     LDAPv3 Replication Requirements        August 2000


The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in [RFC2119].




















































Stokes, et al           Expires February 2001                [Page 2] 
Internet-Draft     LDAPv3 Replication Requirements        August 2000


Table of Contents


1 Introduction.......................................................4
2 Terminology........................................................4
3 The Possible Models................................................7
4 Requirements.......................................................8
 4.1 General.........................................................8
 4.2 Model...........................................................8
 4.3 Protocol.......................................................10
 4.4 Schema.........................................................10
 4.5 Single Master..................................................11
 4.6 Multi-Master...................................................11
 4.7 Administration and Management..................................12
 4.8 Security.......................................................12
5 Security Considerations...........................................13
6 Acknowledgements..................................................13
7 References........................................................13
A.APPENDIX A - Usage Scenarios......................................14
 A.1.Extranet Example...............................................14
 A.2.Consolidation Example..........................................14
 A.3.Replication Heterogeneous Deployment Example...................14
 A.4.Shared Name Space Example......................................15
 A.5.Supplier Initiated Replication.................................15
 A.6.Consumer Initiated Replication.................................15
 A.7.Prioritized attribute replication..............................16
 A.8.Bandwidth issues...............................................16
 A.9.Interoperable Administration and Management....................16
 A.10.Enterprise Directory Replication Mesh.........................17
 A.11.Failure of the Master in a Master-Slave Replicated Directory..17
 A.12.Failure of a Directory Holding Critical Service Information...18
B.APPENDIX B - Rationale............................................18
 B.1.Meta-Data Implications.........................................18
 B.2.Order of Transfer for Replicating Data.........................18
 B.3.Schema Mismatches and Replication..............................19
 B.4.Detecting and Repairing Inconsistencies Among Replicas.........20
 B.5.Some Test Cases for Conflict Resolution in Multi-Master
 Replication........................................................21
 B.6.Data Privacy During Replication................................24
 B.7.Failover in Single-Master Systems..............................25
 B.8.Including Operational Attributes in Atomic Operations..........26
Authors' Addresses...................................................26
Full Copyright Statement.............................................27








Stokes, et al           Expires February 2001                [Page 3] 
Internet-Draft     LDAPv3 Replication Requirements        August 2000





1  Introduction


The ability to distribute directory information throughout the network
provides a two-fold benefit to the network: (1) increasing the
reliability of the directory through fault tolerance, and (2) brings
the directory content closer to the clients using the data. LDAP's
acceptance as an access protocol for directory information is driving
the need to distribute LDAP directory content among servers within
enterprise and Internet.  Currently LDAP does not define a replication
mechanism and only generally mentions LDAP       shadow servers (see
[RFC2251]) in passing. A standard mechanism for replication that
operates in a multi-vendor directory environment is critical to the
successful deployment and acceptance of LDAP in the market place.


This document sets out the requirements for replication between
multiple LDAP servers.  While RFC 2251 and RFC 2252 [RFC2252] set forth
the standards for communication between LDAP clients and servers there
are additional requirements for server-to-server communication.  Some
of these are covered here.


This document first introduces the terminology to be used, then
presents the different replication models being considered.  The actual
requirements follow, along with security considerations.  The reasoning
that leads to the requirements is presented in the Appendix.  This was
done to provide a clean separation of the requirements from their
justification.


2  Terminology


The following terms are used in this document:


Area of replication - A whole or portion of a Directory Information
Tree (DIT) that makes up a distinct unit of data to be replicated. This
may also be known as "unit of replication".


Atomic operation - A set of changes to directory data which the LDAP
standards guarantee will be treated as a unit; all changes will be made
or all the changes will fail.


Atomicity Information - Information about atomic operations passed as
part of replication.


Conflict - A situation that arises when changes are made to the same
directory data on different directory servers before replication can


Stokes, et al           Expires February 2001                [Page 4] 
Internet-Draft     LDAPv3 Replication Requirements        August 2000


synchronize the data on the servers.  When the servers do synchronize,
they have inconsistent data - a conflict.


Conflict resolution - Deterministic procedures used to resolve change
information conflicts that may arise during replication.


Critical OID - Attributes or object classes defined in the replication
agreement as being critical to the operation of the system.  Changes
affecting critical OIDs cause immediate initiation of a replica cycle.
An example of a critical OID might be a password or certificate.


Fractional replication - This is the capability to replicate a subset
(as opposed to the full set) of attributes of those entries being
replicated.


Incremental Update - A replica update that contains only those
attributes or objects that have changed.


Master Replica - In a Master-Slave Replication system, the Master
Replica is the only updateable replica in the replica ring.  It is the
supplier in all replication sessions.


Master Slave, or Single Master Replication - A replication model that
assumes only one server, the master, allows write access to the
replicated data. Note that Master-Slave replication can be considered a
proper subset of multi-master replication.


Meta-Data - Data collected by the replication system that describes the
status/state of replication.


Multi-Master Replication - A replication model where entries can be
written and updated on any of several updateable replica copies without
requiring communication with other updateable replicas before the write
or update is performed.


Naming Context - Suffix of a sub-tree of entries held in a single
server [X.500].


One-way Replication  - The process of synchronization in a single
direction where the authoritative source information is provided to a
replica.


Partial Replication - Partial Replication is Fractional Replication,
Sparse Replication, or both.






Stokes, et al           Expires February 2001                [Page 5] 
Internet-Draft     LDAPv3 Replication Requirements        August 2000


Propagation behavior - The general behavior of the actual
synchronization process between a consumer and a provider of
replication information.


Read-only Replica - A read-only copy of a replicated directory. A read-
only replica is assumed to be a slave replica in the single master
replication definition.


Replica - A single instance of a whole or portion of the DIT as defined
by the area of replication.


Replica Ring - A set of servers, which hold in common the same DIT
information as, defined by "Area of replication". These servers may be
managed under a single replication agreement that handles all members
of the set of servers as a group.


Replica (or Replication) Cycle - A replica cycle is the communication
of a change or groups of changes that need to be propagated to other
members of a replica ring.  The process of contacting a replica member
is considered the beginning of a replication cycle while the
termination of communications with a replica is the end of the cycle.
Termination can occur either due to an error or successful exchange of
update records.


Replication - The process of copying portions of naming context
information and content between multiple LDAP servers, such that
certain predefined portions of the information are available from
different servers. The replication process is neither implementation
nor platform specific.


Replication Agreement - A collection of information describing the
parameters of replication between two or more servers in a replica
ring.


Replication Initiation Conflict - In multi-master replication, a
Replication Initiation Conflict is a situation where two masters want
to update the same replica at the same time.


Replication Session - A session set up between two servers in a replica
ring to pass update information as part of a Replica Cycle.


Slave (or Read-Only) Replica - A replica that cannot be directly
updated.  Changes may only be made via replication from a master
replica.


Sparse Replication - The capability to replicate some subset of entries
(other than a complete naming context) of a naming context.



Stokes, et al           Expires February 2001                [Page 6] 
Internet-Draft     LDAPv3 Replication Requirements        August 2000


Topology - The shape of the directed graph describing the relationships
between replicas.


Two-way Replication  - The process of synchronization where change
information flows bi-directionally between two replicas.


Update Propagation - Protocol-based process by which directory replicas
are reconciled.


Updateable Replica - A read-writeable copy of the replicated
information.


3  The Possible Models


The major objective is to provide an interoperable LDAP V3 directory
synchronization protocol that is simple, highly efficient and flexible
enough to support both multi-master and master-slave replication
operations. Such a protocol would meet the needs of both the Internet
and enterprise environments.


Generally, replication can be characterized by looking at data
consistency models across existing technologies. This provides insight
to LDAP v3 replication requirements. The following is a brief
examination of data consistency models.


Model 1: Transactional Consistency -- Environments that exhibit all
four of the ACID properties (Atomicity, Concurrency, Independence,
Durability) [ACID].


Model 2: Eventual Consistency or Transient Consistency -- Environments
where definite knowledge of the global replica topology is provided
through predetermined replication agreements.  Examples include X.500
Directories, Bayou [XEROX], and NDS (Novell Directory Services) [NDS].
In this model, every update propagates to every replica that it can
reach via a path of stepwise eventual connectivity.


Model 3: Limited Effort Eventual Consistency -- Environments that
provide a statistical probability of convergence with global knowledge
of replica topology. An example is the Xerox Clearinghouse [XEROX].
This model is similar to "Eventual Consistency", except where replicas
may purge updates. Purging drops propagation changes when some replica
time boundary is exceeded, thus leaving some changes replicated to only
a portion of the replica topology. Transactional consistency is not
preserved, though some weaker constraints on consistency are available.


Model 4: Loosest Consistency -- Environments where information is
provided from an opportunistic or simple cache until stale.



Stokes, et al           Expires February 2001                [Page 7] 
Internet-Draft     LDAPv3 Replication Requirements        August 2000


Model 5: Ad hoc -- A copy of a data store where no follow up checks are
made for the accuracy/freshness of the data.


Consistency models 2 and 3 involve the use of prearranged replication
agreements between cooperating servers. The added complexity of 2-phase
commit required for Model 1 is significant enough that model 1 will not
be considered at this time.  Models 4 and 5 involve unregistered
replicas that "pull" updates from another directory server without that
server's knowledge. These models can be considered to violate a
directory's security policies.


Further review of models 2 and 3 reveal two example application areas
that LDAP replication must be able to handle. These are policy
configuration through security management parameters (model 2) and
white-pages environments that contain fairly static data and address
information (model 3).  Therefore, replication requirements are
presented for models 2 and 3.



4  Requirements



4.1 General


G1.  LDAP Replication MUST support models 2 (Eventual Consistency) and
3 (Limited Effort Eventual Consistency) above.


G2.  LDAP Replication SHOULD NOT preclude support for model 1
(Transactional Consistency) in the future.


G3.  The act of replication SHOULD have minimal impact on both the
system and network performance.


G4.  An LDAP Replication Standard SHOULD NOT limit the transaction rate
of a replication session.


G5.  The replication standard SHOULD NOT limit the size of a replica.


G6.  Any meta-data collected by the LDAP replication mechanism MUST NOT
grow without bound.


G7.  All policy and state data pertaining to replication MUST be
accessible via LDAP.



4.2 Model




Stokes, et al           Expires February 2001                [Page 8] 
Internet-Draft     LDAPv3 Replication Requirements        August 2000


M1.  The model MUST support the following triggers for initiation of a
replica cycle:


  a) A configurable set of scheduled times
  b) Periodically, with a configurable period between replica cycles
  c) A configurable maximum amount of time between replica cycles
  d) A configurable number of accumulated changes
  e) Change in the value of a critical OID
  f) As the result of an automatic rescheduling after a replication
    initiation conflict
  g) Administrative request for replication


With the exception of administrative request, the specific trigger(s)
and related parameters in effect for a given server MUST be identified
in a well known place, e.g. the Replication Agreement(s).


M2.  The replication model MUST support both master-slave and multi-
master relationships.


M3.  All replicated information between the master database and its
replica databases MUST be identical including all non-user modify
operational attributes such as time stamps. Note this does not imply
that the entire database is identical from replica to replica, but that
the subset of data, chosen to replicate is identical from replica to
replica. Some operational attributes may be dynamically evaluated;
these attributes will not necessarily appear to be identical.


M4.  LDAP replication MUST encompass schema objects, attributes, access
control, and name space information.


M5.  LDAP replication MUST NOT require all copies of the replicated
information to be complete copies of the replicated object.  The model
MUST support Fractional, Partial, and Sparse Replicas.


M6.  Sub-tree Replication MUST be defined to allow for greater
flexibility in replication topologies of the DIT as defined by partial
replication.


M7.  The determination of which OIDs are critical MUST be configurable
in the replication agreement.


M8.  Replication activities MUST occur within the context of a
predefined replication agreement that addresses proper knowledge of
access requirements and credentials between the synchronizing
directories.


M9.  The replication agreements SHOULD accommodate multiple servers
receiving the same replica under a single predefined agreement.
Stokes, et al           Expires February 2001                [Page 9] 
Internet-Draft     LDAPv3 Replication Requirements        August 2000



M10. LDAP replication MUST provide scalability to both enterprise and
Internet environments, e.g. an LDAP server must be able to provide
replication services to replicas within an enterprise as well as across
the Internet.


M11. While different directory implementations can support
different/extended schema, schema mismatches between two replicating
servers MUST be handled.  One way of handling such mismatches might be
to raise an error condition.


M12. The LDAP replication model MUST allow for full update to
facilitate replica initialization and reset loading utilizing a
standardized format such as LDIF [RFC2849] format.


4.3 Protocol


P1.  The replication protocol MUST provide for recovery and
rescheduling of a replication session due to replication initiation
conflicts (e.g. consumer busy replicating with other servers) and or
loss of connection (e.g. supplier cannot reach a replica).


P2.  The replication protocol MUST allow a restart at the last
acknowledged update prior to interruption rather than re-sending
updates it had already sent to a consuming replica.


P3.  The LDAP replication protocol MUST allow for full update to
facilitate replica initialization and reset loading utilizing a
standardized format such as LDIF [RFC2849] format.


P4.  Incremental replication MUST be allowed.


P5.  The replication protocol MUST allow either a master or slave
replica to initiate the replication process.


P6.  The protocol MUST support propagation of atomicity information.


P7.  The protocol SHOULD NOT preclude future support of Transactional
Consistency (model 1).


P8.  The protocol MUST support a mechanism to report schema mismatches
between replicas discovered during a replication session.



4.4 Schema


SC1.  A standard way to determine what replicas are held on a server
MUST be defined.
Stokes, et al           Expires February 2001               [Page 10] 
Internet-Draft     LDAPv3 Replication Requirements        August 2000



SC2.  A standard schema for representing replication agreements MUST be
defined.


SC3.  The semantics associated with modifying the attributes of
replication agreements MUST be defined.


SC4.  A standard method for determining the location of replication
agreements MUST be defined.


SC5.  A standard schema for publishing state information about a given
replica MUST be defined.


SC6.  A standard method for determining the location of replica state
information MUST be defined.


SC7.  It MUST be possible for authorized administrators, regardless of
their network location, to access replication agreements in the DIT.


SC8.  Replication agreements of all servers containing replicated
information MUST be accessible via LDAP.


SC9.  All objects MUST be uniquely identifiable throughout the object
lifetime.


4.5 Single Master


SM1.  A Single Master system SHOULD provide a fast method of promoting
a slave replica to become the master replica.


SM2.  The master replica in a Single Master system SHOULD send all
changes to read-only replicas in the order in which they were applied
on the master.



4.6 Multi-Master


MM1.  Replica synchronization SHOULD be handled in such a manner as to
not saturate the network with repetitive entry replication from
supplier replicas.


MM2.  The initiator MUST be allowed to determine whether it will become
a consumer or supplier during the synchronization startup process.


MM3.  During a replication session, it MUST be possible for the two
servers to switch between the consumer and supplier roles.




Stokes, et al           Expires February 2001               [Page 11] 
Internet-Draft     LDAPv3 Replication Requirements        August 2000


MM4.  When multiple master replicas want to begin a replication session
with the same replica at the same time, the model MUST have a
deterministic mechanism for resolving the resulting replication
initiation conflict with no operator intervention.


MM5.  Multi-master replication MUST NOT lose information during
replication.  If conflict resolution would result in the loss of
directory information, the replication process MUST store that
information, notify the administrator of the nature of the conflict and
the information that was lost, and provide a mechanism for possible
override by the administrator.


MM6.  Multi-master replication MUST support convergence of the values
of attributes and objects.  Convergence may result in an event as
described in MM5.


4.7 Administration and Management


AM1.  Replication agreements MUST allow the initiation of a replica
cycle to be administratively postponed to a more convenient period.


AM2.  Each copy of a replica MUST maintain audit history information of
which servers it has replicated with and which servers have replicated
with it.


AM3.  Access to replication agreements, topologies, and policies
attributes MUST be provided through LDAP access.


AM4.  The capability to check the differences between two replicas for
the same information SHOULD be provided.


AM5. A mechanism to fix differences between replicas without triggering
new replica cycles SHOULD be provided.


AM6.  The deletion of sensitive data MUST be handled in an orderly
manner so that at no time will that data be available without proper
access control.  That is, access control information (ACI) associated
with sensitive data must be deleted after or simultaneously with the
delete of the sensitive data.  Likewise, when adding sensitive data,
ACI MUST be added first or simultaneously with the addition of that
data.


4.8 Security


S1.  During initiation of a replication session, authentication and
verification of authorization of both the replica and the source
directory MUST be allowed before any data is transferred.



Stokes, et al           Expires February 2001               [Page 12] 
Internet-Draft     LDAPv3 Replication Requirements        August 2000


S2.  The transport for LDAP synchronization MUST permit assurance of
the integrity and privacy of all data transferred.


S3.  To promote interoperability, there MUST be a mandatory-to-
implement data privacy mechanism.


S4. The transport for administrative access MUST permit assurance of
the integrity and privacy of all data transferred.


5  Security Considerations


This document includes security requirements (listed in section 4.8
above) for the replication model and protocol.


6  Acknowledgements


This document is based on input from IETF members interested in LDUP
Replication.


7  References


[ACID] T. Haerder, A. Reuter, "Principles of Transaction-Oriented
Database Recovery", Computing Surveys, Vol. 15, No. 4 (December 1983),
pp. 287-317.


[NDS] Novell, "NDS Technical Overview", 104-000223-001,
http://developer.novell.com/ndk/doc/docui/index.htm#../ndslib/dsov_enu/
data/h6tvg4z7.htm,
September, 2000.


[RFC2119]  S. Bradner, "Key Words for Use in RFCs to Indicate
Requirement Levels", RFC 2119, March 1997.


[RFC2251]  M. Wahl, T. Howes, S. Kille "Lightweight Directory Access
Protocol", RFC 2251, December 1997.


[RFC2252]  M. Wahl, A. Coulbeck, T. Howes, S. Kille, "Lightweight
Directory Access Protocol (v3): Attribute Syntax Definitions", RFC
2252, December 1997.


[RFC2849]  Gordon Good, "The LDAP Data Interchange Format (LDIF)", RFC
2849, June 2000.


[X.501] ITU-T Recommendation X.501 (1993), | ISO/IEC 9594-2: 1993,
Information Technology - Open Systems Interconnection - The Directory:
Models.




Stokes, et al           Expires February 2001               [Page 13] 
Internet-Draft     LDAPv3 Replication Requirements        August 2000


[XEROX] Hauser, C. "Managing update conflicts in Bayou, a weakly
connected replicated storage system". Palo Alto, CA: Xerox PARC,
Computer Science Laboratory; 1995 August; CSL-95-4. [CSL-95-04]



A. APPENDIX A - Usage Scenarios


The following directory deployment examples are intended to
substantiate and validate our replication requirements. It is assumed
in all cases that directory implementations from different vendors are
involved.  This material is intended as background; no requirements are
presented in this Appendix.


A.1. Extranet Example


A company has a trading partner to whom it wishes to provide directory
information.  This information may be as simple as a corporate
telephone directory, or as complex as an extranet workflow application.
For performance reasons the company may wish to have a replica of its
directory within the Partner Company, rather than simply exposed beyond
its firewall.


The requirements that follow from this scenario are:
. One-way replication, single mastered.
. Authentication of clients.
. Common access control and access control identification.
. Secure transmission of updates.
. Selective attribute replication (Fractional Replication), so that
  only partial entries can be replicated.



A.2. Consolidation Example


Company A acquires company B. In the transition period, whilst the
organizations are merged, both directory services must coexist.
Company A may wish to attach company B's directory to its own.


The requirements that follow from this scenario are:
. Multi-Master replication.
. Common access control model. Access control model identification.
. Secure transmission of updates.
. Replication between DITs with potentially differing schema.



A.3. Replication Heterogeneous Deployment Example



Stokes, et al           Expires February 2001               [Page 14] 
Internet-Draft     LDAPv3 Replication Requirements        August 2000


An organization may deliberately deploy multiple directory services
within their enterprise to employ the differing benefits of each
service.  In this case multi-master replication will be required to
ensure that the multiple updateable replicas of the DIT are
synchronized. Some vendors may provide directory clients, which are
tied to their own directory service.


The requirements that follow from this scenario are:
. Multi-Master replication
. Common access control model and Access control model identification.
. Secure transmission of updates.
. Replication among DITs with potentially differing schemas.



A.4. Shared Name Space Example


Two organizations may choose to cooperate on some venture and need a
shared name space to manage their operation.  Both organizations will
require administrative rights over the shared name space.


The requirements that follow from this scenario are:
. Multi-Master replication.
. Common access control model and Access control model identification.
. Secure transmission of updates.



A.5. Supplier Initiated Replication


This is a single master environment that maintains a number of replicas
of the DIT by pushing changes based on a defined schedule.


The requirements that follow from this scenario are:
. Single-master environment.
. Supplier-initiated replication.
. Secure transmission of updates.



A.6. Consumer Initiated Replication


Again a single mastered replication topology, but the replica initiates
the replication exchange rather than the master. An example of this is
a replica that resides on a laptop computer that may run disconnected
for a period of time.


The requirements that follow from this scenario are:
. Single-master environment.


Stokes, et al           Expires February 2001               [Page 15] 
Internet-Draft     LDAPv3 Replication Requirements        August 2000


. Consumer initiated replication.
. Open scheduling (anytime).



A.7. Prioritized attribute replication


The password attribute can provide an example of the requirement for
prioritized attribute replication.  A user is working in Utah and the
administrator resides in California.  The user has forgotten his
password.  So the user calls or emails the administrator to request a
new password.  The administrator provides the updated password (a
change).


Under normal conditions, the directory replicates to a number of
different locations overnight.  But corporate security policy states
that passwords are critical and the new value must be available
immediately (e.g. shortly) after any change.  Replication needs to
occur immediately for critical attributes/objects.


The requirements that follow from this scenario are:
. Incremental replication of changes.
. Immediate replication on change of certain attributes.
. Replicate based on time/attribute semantics.



A.8. Bandwidth issues


The replication of Server (A) R/W replica (a) in Kathmandu is handled
via a dial up phone link to Paris where server (B) R/W replica of (a)
resides. Server (C) R/W replica of (a) is connected by a T1 connection
to server (B). Each connection has a different performance
characteristic.


The requirements that follow from this scenario are:
. Minimize repetitive updates when replicating from multiple
  replication paths.
. Incremental replication of changes.
. Provide replication cycles to delay and/or retry when connections
  cannot be reached.
. Allowances for consumer initiated or supplier initiated replication.



A.9. Interoperable Administration and Management


The administrator with administrative authority of the corporate
directory which is replicated by numerous geographically dispersed LDAP
servers from different vendors notices that the replication process is
Stokes, et al           Expires February 2001               [Page 16] 
Internet-Draft     LDAPv3 Replication Requirements        August 2000


not completing correctly as the change log is continuing to grow and/or
error message informs him. The administrator uses his $19.95 RepCo LDAP
directory replication diagnostics tools to look at Root DSE replica
knowledge on server 17 and determines that server 42 made by LDAP'RUS
Inc. is not replicating properly due to an Object conflict. Using his
Repco Remote repair tools he connects to server 42 and resolves the
conflict on the remote server.


The requirements that follow from this scenario are:
. Provides replication audit history.
. Provisions for managing conflict resolution.
. Provide LDAP access to predetermined agreements, topology and policy
  attributes.
. Provide operations for comparing replica's content for validity.
. Provide LDAP access to status and audit information.



A.10.      Enterprise Directory Replication Mesh


A Corporation builds a mesh of directory servers within the enterprise
utilizing LDAP servers from various vendors. Five servers are holding
the same area of replication. The predetermined replication
agreement(s) for the enterprise mesh are under a single management, and
the security domain allows a single predetermined replication agreement
to manage the 5 servers replication.


The requirements that follow from this scenario are:
. Predefined replication agreements that manage more than a single area
  of replication that is held on numerous servers.
. Common support of replication management knowledge across vendor
  implementation.
. Rescheduling and continuation of a replication cycle when one server
  in a replica ring is busy and/or unavailable.



A.11.     Failure of the Master in a Master-Slave Replicated Directory


A company has a corporate directory that is used by the corporate email
system.  The directory is held on a mesh of servers from several
vendors.  A corporate relocation results in the closing of the location
where the master copy of the directory is located.  Employee
information (such as mailbox locations and employee certificate
information) must be kept up to date or mail cannot be delivered.


The requirements that follow from this scenario are:
. An existing slave replica must be "promote-able" to become the new
  master.
Stokes, et al           Expires February 2001               [Page 17] 
Internet-Draft     LDAPv3 Replication Requirements        August 2000


. The "promotion" must be done without significant downtime, since
  updates to the directory will continue.



A.12.     Failure of a Directory Holding Critical Service Information


An ISP uses a policy management system that uses a directory as the
policy data repository.  The directory is replicated in several
different sites on different vendors' products to avoid single points
of failure.  It is imperative that the directory be available and be
updateable even if one site is disconnected from the network.  Changes
to the data must be traceable, and it must be possible to determine how
changes made from different sites interacted.


The requirements that follow from this scenario are:
. Multi-master replication
. Ability to reschedule replication sessions
. Support for manual review and override of replication conflict
  resolution



B. APPENDIX B - Rationale


This Appendix gives some of the background behind the requirements.  It
is included to help the protocol designers understand the thinking
behind some of the requirements and to present some of the issues that
should be considered during design.  With the exception of section B.8,
which contains a suggested requirement for the update to RFC 2251, this
Appendix does not state any formal requirements.


B.1. Meta-Data Implications


Requirement G4 states that meta-data must not grow without bound.  This
implies that meta-data must, at some point, be purged from the system.
This, in turn, raises concerns about stability.  Purging meta-data
before all replicas have been updated may lead to incomplete
replication of change information and inconsistencies among replicas.
Therefore, care must be taken setting up the rules for purging meta-
data from the system while still ensuring that meta-data will not grow
forever.


B.2. Order of Transfer for Replicating Data


Situations may arise where it would be beneficial to replicate data
out-of-order (e.g. send data to consumer replicas in a different order
than it was processed at the supplier replica).  One such case might
occur if a large bulk load was done on the master server in a single-


Stokes, et al           Expires February 2001               [Page 18] 
Internet-Draft     LDAPv3 Replication Requirements        August 2000


master environment and then a single change to a critical OID (a
password change, for example) was then made.  Rather than wait for all
the bulk data to be sent to the replicas, the password change might be
moved to the head of the queue and be sent before all the bulk data was
transferred.  Other cases where this might be considered are schema
changes or changes to critical policy data stored in the directory.


While there are practical benefits to allowing out-of-order transfer,
there are some negative consequences as well.  Once out-of-order
transfers are permitted, all receiving replicas must be prepared to
deal with data and schema conflicts that might arise.


As an example, assume that schema changes are critical and must be
moved to the front of the replication queue.  Now assume that a schema
change deletes an attribute for some object class.  It is possible that
some of the operations ahead of the schema change in the queue are
operations to delete values of the soon-to-be-deleted attribute so that
the schema change can be done with no problems.  If the schema change
moves to the head of the queue, the consumer servers might have to
delete an attribute that still has values, and then receive requests to
delete the values of an attribute which is no longer defined.


In the multi-master case, similar situations can arise when
simultaneous changes are made to different replicas.  Thus, multi-
master systems must have conflict resolution algorithms in place to
handle such situations.  But in the single-master case conflict
resolution is not needed unless the master is allowed to send data out-
of-order.  This is the reasoning behind requirement SM2, which
recommends that data always be sent in order in single-master
replication.


Note that even with this restriction, the concept of a critical OID is
still useful in single-master replication.  An example of its utility
can be found in section A.7.


B.3. Schema Mismatches and Replication


Multi-vendor environments are the primary area of interest for LDAP
replication standards.  Some attention must thus be paid to the issue
of schema mismatches, since they can easily arise when vendors deliver
slightly different base schema with their directory products.  Even
when both products meet the requirements of the standards [RFC2252],
the vendors may have included additional attributes or object classes
with their products.  When two different vendor's products attempt to
replicate, these additions can cause schema mismatches.  Another
potential cause of schema mismatches is discussed in section A.3.


There are only a few possible responses when a mismatch is discovered.
Stokes, et al           Expires February 2001               [Page 19] 
Internet-Draft     LDAPv3 Replication Requirements        August 2000



. Raise an error condition and ignore the data.  This should always be
  allowed and is the basis for requirement P8 and the comment on M11.
. Map/convert the data to the form required by the consuming replica.
  A system may choose this course; requirement M11 is intended to allow
  this option.  The extent of the conversion is up to the
  implementation; in the extreme it could support use of the
  replication protocol in meta-directories.
. Quietly ignore (do not store on the consumer replica and do not raise
  an error condition) any data that does not conform to the schema at
  the consumer.


Requirement M11 is intended to exclude the last option.


Normal IETF practice in protocol implementation suggests that one be
strict in what one sends and be flexible in what one receives.  The
parallel in this case is that a supplier should be prepared to receive
an error notification for any schema mismatch, but a consumer may
choose to do a conversion instead.


The other option that can be considered in this situation is the use of
fractional replication.  If replication is set up so only the common
attributes are replicated, mismatches can be avoided.


One additional consideration here is replication of the schema itself.
M4 requires that it be possible to replicate schema.  If a consumer
replica is doing conversion, extreme care should be taken if schema
elements are replicated since some attributes are intended to have
different definitions on different replicas.


For fractional replication, the protocol designers and implementors
should give careful consideration to the way they handle schema
replication.  Some options for schema replication include:
. All schema elements are replicated.
. Schema elements are replicated only if they are used by attributes
  that are being replicated.
. Schema are manually configured on the servers involved in fractional
  replication; schema elements are not replicated via the protocol.


B.4. Detecting and Repairing Inconsistencies Among Replicas


Despite the best efforts of designers, implementors, and operators,
inconsistencies will occasionally crop up among replicas in production
directories.  Tools will be needed to detect and to correct these
inconsistencies.




Stokes, et al           Expires February 2001               [Page 20] 
Internet-Draft     LDAPv3 Replication Requirements        August 2000


A special client may accomplish detection through periodic comparisons
of replicas.  This client would typically read two replicas of the same
naming context and compare the answers, possibly by BINDing to each of
the two replicas to be compared and reading them both.  In cases where
the directory automatically reroutes some requests (e.g. chaining),
mechanisms to force access to a particular replica should be supplied.


Alternatively, the server could support a special request to handle
this situation.  A client would invoke an operation at some server.  It
would cause that server to extract the contents from some other server
it has a replication agreement with and report the differences back to
the client as the result


If an inconsistency is found, it needs to be repaired.  To determine
the appropriate repair, the administrator will need access to the
replication history to figure out how the inconsistency occurred and
what the correct repair should be.


When a repair is made, it should be restricted to the replica that
needs to be fixed; the repair should not cause new replication events
to be started.  This may require special tools to change the local data
store without triggering replication.


Requirements AM2, AM4, and AM5 address these needs.


B.5. Some Test Cases for Conflict Resolution in Multi-Master
Replication


Use of multi-master replication inevitably leads the possibility that
incompatible changes will be made simultaneously on different servers.
In such cases, conflict resolution algorithms must be applied.


As a guiding principle, conflict resolution should avoid surprising the
user.  One way to do this is to adopt the principle that, to the extent
possible, conflict resolution should mimic the situation that would
happen if there were a single server where all the requests were
handled.


While this is a useful guideline, there are some situations where it is
impossible to implement.  Some of these cases are examined in this
section.  In particular, there are some cases where data will be "lost"
in multi-master replication that would not be lost in a single-server
configuration.


In the examples below, assume that there are three replicas, A, B, and
C.  All three replicas are updateable.  Changes are made to replicas A
and B before replication allows either replica to see the change made
on the other.  In discussion of the multi-master cases, we assume that


Stokes, et al           Expires February 2001               [Page 21] 
Internet-Draft     LDAPv3 Replication Requirements        August 2000


the change to A takes precedence using whatever rules are in force for
conflict resolution.


B.5.1. Create-Create


A user creates a new instance of an object with distinguished name DN
to A.  At the same time, a different user adds an object with the same
distinguished name on B.


In the single-server case, one of the create operations would have
occurred before the other, and the second request would have failed.


In the multi-master case, each create was successful on its originating
server.  The problem is not detected until replication takes place.
When a replication request to create a DN that already exists arrives
at one of the servers, conflict resolution is invoked.  (Note that the
two requests can be distinguished even though they have the same DN
because every object has some sort of unique identifier per requirement
SC9.)


As noted above, in these discussions we assume that the change from
replica A has priority based on the conflict resolution algorithm.
Whichever change arrives first, requirement MM6 says that the values
from replica A must be those in place on all replicas at the end of the
replication cycle.  Requirement MM5 states that the system cannot
quietly ignore the values from replica B.


The values from replica B might be logged with some notice to the
administrators, or they might be added to the DIT with a machine
generated DN (again with notice to the administrators).  If they are
stored with a machine generated DN, the same DN must be used on all
servers in the replica ring (otherwise requirement M3 would be
violated).  Note that in the case where the object in question is a
container object, storage with a machine generated DN provides a place
where descendent objects may be stored if any descendents were
generated before the replication cycle was completed.


In any case, some mechanism must be provided to allow the administrator
to reverse the conflict resolution algorithm and force the values
originally created on B into place on all replicas if desired.


B.5.2. Rename-Rename


On replica A, an object with distinguished name DN1 is renamed to DN.
At the same time on replica B, an object with distinguished name DN2 is
renamed to DN.




Stokes, et al           Expires February 2001               [Page 22] 
Internet-Draft     LDAPv3 Replication Requirements        August 2000


In the single-server case, one rename operation would occur before the
other and the second would fail since the target name already exists.


In the multi-master case, each rename was successful on its originating
server.  Assuming that the change on A has priority in the conflict
resolution sense, DN will be left with the values from DN1 in all
replicas and DN1 will no longer exist in any replica.  The question is
what happens to DN2 and its original values.


Requirement MM5 states that these values must be stored somewhere.
They might be logged, they might be left in the DIT as the values of
DN2, or they might be left in the DIT as the values of some machine
generated DN.  Leaving them as the values of DN2 is attractive since it
is the same as the single-server case, but if a new DN2 has already
been created before the replica cycle finishes, there are some very
complex cases to resolve.  Any of the solutions described in this
paragraph would be consistent with requirement MM5.


B.5.3. Locking Based on Atomicity of ModifyRequest


There is an object with distinguished name DN which contains attributes
X, Y, and Z.  The value of X is 1.  On replica A, a ModifyRequest is
processed which includes modifications to change that value of X from 1
to 0 and to set the value of Y to "USER1".  At the same time, replica B
process a ModifyRequest which includes modifications to change the
value of X from 1 to 0 and to set the value of Y to "USER2" and the
value of Z to 42.  The application in this case is using X as a lock
and is depending on the atomic nature of ModifyRequests to provide
mutual exclusion for lock access.


In the single-server case, the two operations would have occurred
sequentially.  Since a ModifyRequest is atomic, the entire first
operation would succeed.  The second ModifyRequest would fail, since
the value of X would be 0 when it was attempted, and the modification
changing X from 1 to 0 would thus fail.  The atomicity rule would cause
all other modifications in the ModifyRequest to fail as well.


In the multi-master case, it is inevitable that at least some of the
changes will be reversed despite the use of the lock.  Assuming the
changes from A have priority per the conflict resolution algorithm, the
value of X should be 0 and the value of Y should be "USER1" The
interesting question is the value of Z at the end of the replication
cycle.  If it is 42, the atomicity constraint on the change from B has
been violated.  But for it to revert to its previous value, grouping
information must be retained and it is not clear when that information
can be safely discarded.  Thus, requirement G6 may be violated.




Stokes, et al           Expires February 2001               [Page 23] 
Internet-Draft     LDAPv3 Replication Requirements        August 2000


B.5.4. General Principles


With multi-master replication there are a number of cases where a user
or application will complete a sequence of operations with a server but
those actions are later "undone" because someone else completed a
conflicting set of operations at another server.


To some extent, this can happen in any multi-user system.  If a user
changes the value of an attribute and later reads it back, intervening
operations by another user may have changed the value.  In the multi-
master case, the problem is worsened, since techniques used to resolve
the problem in the single-server case won't work as shown in the
examples above.


The major question here is one of intended use.  In LDAP standards
work, it has long been said that replication provides "loose
consistency" among replicas.  At several IETF meetings and on the
mailing list, usage examples from finance where locking is required
have been declared poor uses for LDAP.  Requirement G1 is consistent
with this history.  But if loose consistency is the goal, the locking
example above is an inappropriate use of LDAP, at least in a replicated
environment.


B.5.5. Avoiding the Problem


The examples above discuss some of the most difficult problems that can
arise in multi-master replication.  While they can be dealt with,
dealing with them is difficult and can lead to situations that are
quite confusing to the application and to users.


The common characteristics of the examples are:


. Several directory users/applications are changing the same data
. They are changing the data at the same time
. They are using different directory servers to make these changes
. They are changing data that are parts of a distinguished name or they
  are using ModifyRequest to both read and write a given attribute
  value in a single atomic request


If any one of these conditions is reversed, the types of problems
described above will not occur.  There are many useful applications of
multi-master directories where at least one of the above conditions
does not occur.  For cases where all four do occur, application
designers should be aware of the possible consequences.


B.6. Data Privacy During Replication



Stokes, et al           Expires February 2001               [Page 24] 
Internet-Draft     LDAPv3 Replication Requirements        August 2000


Directories will frequently hold proprietary information.  Policy
information, name and address information, and customer lists can be
quite proprietary and are likely to be stored in directories.  Such
data must be protected during replication.


In some cases, the network environment (e.g. a private network) may
provide sufficient privacy for the application.  In other cases, the
data in the directory may be public and not require protection.  For
these reasons data privacy was not made a requirement for all
replication sessions.  But there are a substantial number of
applications that will need data privacy, so there is a requirement
(S2) that the protocol allow for data privacy in those cases where it
is needed.


This leaves the question of what privacy mechanism(s) to use.  While
this is ultimately a design/implementation decision, replication across
different vendors' directory products is an important goal of the LDAP
replication work at the IETF.  If different vendors choose to support
different data privacy mechanisms, the advantages of a standard
replication protocol would be lost.  Thus there is a requirement (S3)
for a mandatory-to-implement data privacy mechanism.


B.7. Failover in Single-Master Systems


In a single-master system, all modifications must originate at the
master.  The master is therefore a single point of failure for
modifications.  This can cause concern when high availability is a
requirement for the directory system.


One way to reduce the problem is to provide a failover process that
converts a slave replica to master when the original master fails.  The
time required to execute the failover process then becomes a major
factor in availability of the system as a whole.


Factors that designers and implementors should consider when working on
failover include:


.    If the master replica contains control information or meta-data
     that is not part of the slave replica(s), this information will
     have to be inserted into the slave which is being "promoted" to
     master as part of the failover process.  Since the old master is
     presumably unavailable at this point, it may be difficult to
     obtain this data.  For example, if the master holds the status
     information of all replicas, but each slave replica only holds its
     own status information, failover would require that the new master
     get the status of all existing replicas, presumably from those
     replicas.  Similar issues could arise for replication agreements
     if the master is the only system that holds a complete set.
Stokes, et al           Expires February 2001               [Page 25] 
Internet-Draft     LDAPv3 Replication Requirements        August 2000


.    If data privacy mechanisms (e.g. encryption) are in use during
     replication, the new master would need to have the necessary key
     information to talk to all of the slave replicas.


.    It is not only the new master that needs to be reconfigured.  The
     slaves also need to have their configurations updated so they know
     where updates should come from and where they should refer
     modifications.


.    The failover mechanism should be able to handle a situation where
     the old master is "broken" but not "dead".  The slave replicas
     should ignore updates from the old master after failover is
     initiated.


.    The old master will eventually be repaired and returned to the
     replica ring.  It might join the ring as a slave and pick up the
     changes it has "missed" from the new master, or there might be
     some mechanism to bring it into sync with the new master and then
     let it take over as master.  Some resynchronization mechanism will
     be needed.


.    Availability would be maximized if the whole failover process
     could be automated (e.g. failover is initiated by an external
     system when it determines that the original master is not
     functioning properly).



B.8. Including Operational Attributes in Atomic Operations


LDAPv3 [RFC2251] declares that some operations are atomic (e.g. all of
the modifications in a single ModifyRequest).  It also defines several
operational attributes that store information about when changes are
made to the directory (createTimestamp, etc.) and which ID was
responsible for a given change (modifiersName, etc.).  Currently, there
is no statement in RFC2251 requiring that changes to these operational
attributes be atomic with the changes to the data.


It is RECOMMENDED that this requirement be added during the revision of
RFC2251.  In the interim, replication SHOULD treat these operations as
though such a requirement were in place.


Authors' Addresses


Russel F. Weiser
Digital Signature Trust Co.
1095 East 2100 South
Suite #201
Salt Lake City, Utah 84106


Stokes, et al           Expires February 2001               [Page 26] 
Internet-Draft     LDAPv3 Replication Requirements        August 2000


USA
E-mail: rweiser@digsigtrust.com
Telephone: +1 801 246 4323
Fax:  +1 801 246 4361


Ellen J. Stokes
Tivoli Systems
6300 Bridgepoint Parkway
Austin, Texas 78731
USA
E-mail: estokes@tivoli.com
Telephone: +1 512 436 9098
Fax: +1 512 436 1199


Ryan D. Moats
Coreon, Inc.
15621 Drexel Circle
Omaha, NE  68135
USA
E-Mail: rmoats@coreon.com
Telephone: +1 402 894 9456


Richard V. Huber
Room C3-3B30
AT&T Laboratories
200 Laurel Avenue South
Middletown, NJ  07748
USA
E-Mail: rvh@att.com
Telephone: +1 732 420 2632
Fax: +1 732 368 1690



Full Copyright Statement


Copyright (C) The Internet Society (2000).  All Rights Reserved.


This document and translations of it may be copied and furnished to
others, and derivative works that comment on or otherwise explain it or
assist in its implementation may be prepared, copied, published and
distributed, in whole or in part, without restriction of any kind,
provided that the above copyright notice and this paragraph are
included on all such copies and derivative works.  However, this
document itself may not be modified in any way, such as by removing the
copyright notice or references to the Internet Society or other
Internet organizations, except as needed for the purpose of developing
Internet standards in which case the procedures for copyrights defined



Stokes, et al           Expires February 2001               [Page 27] 
Internet-Draft     LDAPv3 Replication Requirements        August 2000


in the Internet Standards process must be followed, or as required to
translate it into languages other than English.


The limited permissions granted above are perpetual and will not be
revoked by the Internet Society or its successors or assigns.


This document and the information contained herein is provided on an
"AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING
TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT
NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION HEREIN WILL
NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR
FITNESS FOR A PARTICULAR PURPOSE.


Acknowledgement


Funding for the RFC Editor function is currently provided by the
Internet Society.




































--=====================_4224254==_--



From owner-ietf-ldup@mail.imc.org  Thu Sep 14 07:37:52 2000
Received: from ns.secondary.com (ns.secondary.com [208.184.76.39])
	by ietf.org (8.9.1a/8.9.1a) with SMTP id HAA08667
	for <ldup-archive@odin.ietf.org>; Thu, 14 Sep 2000 07:37:51 -0400 (EDT)
Received: by ns.secondary.com (8.9.3/8.9.3) id DAA12034
	for ietf-ldup-bks; Thu, 14 Sep 2000 03:55:48 -0700 (PDT)
Received: from ietf.org (odin.ietf.org [132.151.1.176])
	by ns.secondary.com (8.9.3/8.9.3) with ESMTP id DAA12029
	for <ietf-ldup@imc.org>; Thu, 14 Sep 2000 03:55:47 -0700 (PDT)
Received: from CNRI.Reston.VA.US (localhost [127.0.0.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id GAA08352;
	Thu, 14 Sep 2000 06:58:02 -0400 (EDT)
Message-Id: <200009141058.GAA08352@ietf.org>
Mime-Version: 1.0
Content-Type: Multipart/Mixed; Boundary="NextPart"
To: IETF-Announce: ;
Cc: ietf-ldup@imc.org
From: Internet-Drafts@ietf.org
Reply-to: Internet-Drafts@ietf.org
Subject: I-D ACTION:draft-ietf-ldup-replica-req-04.txt
Date: Thu, 14 Sep 2000 06:58:02 -0400
Sender: owner-ietf-ldup@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-ldup/mail-archive/>
List-ID: <ietf-ldup.imc.org>
List-Unsubscribe: <mailto:ietf-ldup-request@imc.org?body=unsubscribe>

--NextPart

A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the LDAP Duplication/Replication/Update Protocols Working Group of the IETF.

	Title		: LDAPv3 Replication Requirements
	Author(s)	: E. Stokes, R. Weiser, R. Moats, R. Huber
	Filename	: draft-ietf-ldup-replica-req-04.txt
	Pages		: 27
	Date		: 13-Sep-00
	
This document discusses the fundamental requirements for replication of
data accessible via the LDAPv3 [RFC2251] protocol. It is intended to be
a gathering place for general replication requirements needed to
provide interoperability between informational directories.

A URL for this Internet-Draft is:
http://www.ietf.org/internet-drafts/draft-ietf-ldup-replica-req-04.txt

Internet-Drafts are also available by anonymous FTP. Login with the username
"anonymous" and a password of your e-mail address. After logging in,
type "cd internet-drafts" and then
	"get draft-ietf-ldup-replica-req-04.txt".

A list of Internet-Drafts directories can be found in
http://www.ietf.org/shadow.html 
or ftp://ftp.ietf.org/ietf/1shadow-sites.txt


Internet-Drafts can also be obtained by e-mail.

Send a message to:
	mailserv@ietf.org.
In the body type:
	"FILE /internet-drafts/draft-ietf-ldup-replica-req-04.txt".
	
NOTE:	The mail server at ietf.org can return the document in
	MIME-encoded form by using the "mpack" utility.  To use this
	feature, insert the command "ENCODING mime" before the "FILE"
	command.  To decode the response(s), you will need "munpack" or
	a MIME-compliant mail reader.  Different MIME-compliant mail readers
	exhibit different behavior, especially when dealing with
	"multipart" MIME messages (i.e. documents which have been split
	up into multiple messages), so check your local documentation on
	how to manipulate these messages.
		
		
Below is the data which will enable a MIME compliant mail reader
implementation to automatically retrieve the ASCII version of the
Internet-Draft.

--NextPart
Content-Type: Multipart/Alternative; Boundary="OtherAccess"

--OtherAccess
Content-Type: Message/External-body;
	access-type="mail-server";
	server="mailserv@ietf.org"

Content-Type: text/plain
Content-ID:	<20000913133618.I-D@ietf.org>

ENCODING mime
FILE /internet-drafts/draft-ietf-ldup-replica-req-04.txt

--OtherAccess
Content-Type: Message/External-body;
	name="draft-ietf-ldup-replica-req-04.txt";
	site="ftp.ietf.org";
	access-type="anon-ftp";
	directory="internet-drafts"

Content-Type: text/plain
Content-ID:	<20000913133618.I-D@ietf.org>

--OtherAccess--

--NextPart--




From owner-ietf-ldup@mail.imc.org  Thu Sep 14 10:09:16 2000
Received: from ns.secondary.com (ns.secondary.com [208.184.76.39])
	by ietf.org (8.9.1a/8.9.1a) with SMTP id KAA12482
	for <ldup-archive@odin.ietf.org>; Thu, 14 Sep 2000 10:09:15 -0400 (EDT)
Received: by ns.secondary.com (8.9.3/8.9.3) id GAA16855
	for ietf-ldup-bks; Thu, 14 Sep 2000 06:43:40 -0700 (PDT)
Received: from mail.kpnqwest.ch (mail.eunet.ch [146.228.10.7])
	by ns.secondary.com (8.9.3/8.9.3) with ESMTP id GAA16851
	for <ietf-ldup@imc.org>; Thu, 14 Sep 2000 06:43:39 -0700 (PDT)
From: svfdsivjdi@server.netjuice.es
Received: from oettinger.davidoff.ch ([195.49.110.243]) by mail.kpnqwest.ch (8.9.3/1.34) via ESMTP id NAA27916
	for <ietf-ldup@imc.org>; Thu, 14 Sep 2000 13:45:24 GMT
	env-from (svfdsivjdi@server.netjuice.es)
Received: from mail.mindspring.com by oettinger.davidoff.ch via SMTP
	id smtp\t9eejl0j.in; 14 Sep 2000 14:55:00 +0200
To: <ietf-ldup@imc.org>
Date: Thu, 14 Sep 2000 05:20:43
Message-Id: <760.219466.140135@mail.mindspring.com>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: owner-ietf-ldup@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-ldup/mail-archive/>
List-ID: <ietf-ldup.imc.org>
List-Unsubscribe: <mailto:ietf-ldup-request@imc.org?body=unsubscribe>
Content-Transfer-Encoding: 7bit

GET YOUR OWN 100 MEG WEBSITE FOR ONLY $11.95 PER MONTH TODAY!

STOP PAYING $19.95 or more TODAY for your web site, WHEN YOU CAN 
GET ONE FOR ONLY $11.95 PER MONTH!

DO YOU ALREADY HAVE A WEBSITE? ALL YOU HAVE TO DO IS TRANSFER THE 
DOMAIN TO OUR SERVERS AND UPLOAD YOUR DATA AND YOU ARE READY TO 
GO! YOUR NEW WEB SPACE CAN BE CREATED INSTANTLY WITH JUST A 
SIMPLE PHONE CALL TO  OUR OFFICE.

YOU CAN CHANGE THE DESIGN OF YOUR SITE AS MUCH AS YOU WANT with 
no extra charge!  UNLIMITED TRAFFIC -- no extra charge!

FRONT PAGE EXTENSIONS are FULLY SUPPORTED.

A SET UP FEE OF $40.00 APPLIES for FIRST TIME CUSTOMERS.

ALL FEES PREPAID IN ADVANCE FOR THE YEAR PLUS A $40.00 SET UP 
CHARGE.

FOR DETAILS CALL 1 888 248 0765  

Webhosting International

 
 
 
 
 


From owner-ietf-ldup@mail.imc.org  Tue Sep 19 14:01:11 2000
Received: from ns.secondary.com (ns.secondary.com [208.184.76.39])
	by ietf.org (8.9.1a/8.9.1a) with SMTP id OAA21625
	for <ldup-archive@odin.ietf.org>; Tue, 19 Sep 2000 14:01:10 -0400 (EDT)
Received: by ns.secondary.com (8.9.3/8.9.3) id KAA04498
	for ietf-ldup-bks; Tue, 19 Sep 2000 10:26:09 -0700 (PDT)
Received: from ormail2.orckit.com ([194.90.167.36])
	by ns.secondary.com (8.9.3/8.9.3) with ESMTP id KAA04494
	for <ietf-ldup@imc.org>; Tue, 19 Sep 2000 10:26:05 -0700 (PDT)
Received: by ORMAIL2 with Internet Mail Service (5.5.2650.21)
	id <TG6LQ5ZG>; Tue, 19 Sep 2000 20:27:43 +0200
Message-ID: <B059514836CAD3119FEC0008C78670AB014A770D@ORMAIL1>
From: Dror Bar-Lev <Drorbl@orckit.com>
To: ietf-ldup@imc.org, ietf-ldapext@netscape.com, Kurt@OpenLDAP.org
Cc: Eli Afuta <Eliaf@orckit.com>
Subject: LDAP API library for VxWorks environment
Date: Tue, 19 Sep 2000 20:27:41 +0200
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2650.21)
Content-Type: text/plain;
	charset="iso-8859-8-i"
Sender: owner-ietf-ldup@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-ldup/mail-archive/>
List-ID: <ietf-ldup.imc.org>
List-Unsubscribe: <mailto:ietf-ldup-request@imc.org?body=unsubscribe>


Hello,

I would like to modify our network element to work with LDAP server, and I
would appreciate to receive an open source package of LDAP client that could
be implemented at VxWorks operating system.

Thanks in advance,
Dror Barlev
Project Manager - NMS
Orckit Communications Ltd. 
38 Nahalat Yitzhak St. Tel Aviv 67448, Israel 
Tel: +972-3-6945343    Fax: +972 3 6094754
Web Site: http://www.orckit.com
E-mail: drorbl@orckit.com


From owner-ietf-ldup@mail.imc.org  Tue Sep 19 18:21:40 2000
Received: from ns.secondary.com (ns.secondary.com [208.184.76.39])
	by ietf.org (8.9.1a/8.9.1a) with SMTP id SAA25673
	for <ldup-archive@odin.ietf.org>; Tue, 19 Sep 2000 18:21:39 -0400 (EDT)
Received: by ns.secondary.com (8.9.3/8.9.3) id OAA12191
	for ietf-ldup-bks; Tue, 19 Sep 2000 14:44:07 -0700 (PDT)
Received: from infidel.boolean.net (root@router.boolean.net [198.144.206.49])
	by ns.secondary.com (8.9.3/8.9.3) with ESMTP id OAA12187
	for <ietf-ldup@imc.org>; Tue, 19 Sep 2000 14:44:06 -0700 (PDT)
Received: from gypsy.OpenLDAP.org (gypsy.boolean.net [198.144.202.243])
	by infidel.boolean.net (8.9.3/8.9.3) with ESMTP id VAA77528;
	Tue, 19 Sep 2000 21:46:44 GMT
	(envelope-from Kurt@OpenLDAP.org)
Message-Id: <5.0.0.25.0.20000919144248.00a9f040@router.boolean.net>
X-Sender: guru@router.boolean.net
X-Mailer: QUALCOMM Windows Eudora Version 5.0
Date: Tue, 19 Sep 2000 14:46:43 -0700
To: Dror Bar-Lev <Drorbl@orckit.com>
From: "Kurt D. Zeilenga" <Kurt@OpenLDAP.org>
Subject: Re: LDAP API library for VxWorks environment
Cc: ietf-ldup@imc.org, ietf-ldapext@netscape.com, Eli Afuta <Eliaf@orckit.com>
In-Reply-To: <B059514836CAD3119FEC0008C78670AB014A770D@ORMAIL1>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Sender: owner-ietf-ldup@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-ldup/mail-archive/>
List-ID: <ietf-ldup.imc.org>
List-Unsubscribe: <mailto:ietf-ldup-request@imc.org?body=unsubscribe>

Please note that our post is a bit off-topic for IETF Working
Group mailing lists.  IETF mailing lists are for discussion
work items of the group.  I suggest you go to your favorite
web search engine and do a search for "open source LDAP"
  http://search.yahoo.com/bin/search?p=open+source+LDAP

Kurt



From owner-ietf-ldup@mail.imc.org  Wed Sep 20 12:55:39 2000
Received: from ns.secondary.com (ns.secondary.com [208.184.76.39])
	by ietf.org (8.9.1a/8.9.1a) with SMTP id MAA27305
	for <ldup-archive@odin.ietf.org>; Wed, 20 Sep 2000 12:55:38 -0400 (EDT)
Received: (from majordomo@localhost)
	by ns.secondary.com (8.9.3/8.9.3) id JAA01471
	for ietf-ldup-bks; Wed, 20 Sep 2000 09:06:17 -0700 (PDT)
Received: from bdcsql1.al-rostamani.co.ae ([194.170.227.9])
	by ns.secondary.com (8.9.3/8.9.3) with SMTP id JAA01458
	for <ietf-ldup@imc.org>; Wed, 20 Sep 2000 09:06:06 -0700 (PDT)
Date: Wed, 20 Sep 2000 09:06:06 -0700 (PDT)
From: nile333@kadet.co.uk
Message-Id: <200009201606.JAA01458@ns.secondary.com>
Received: from SMTP agent by mail gateway 
 Wed, 20 Sep 2000 20:11:43 --400
Received: from firewall-in.al-rostamani.co.ae by bdcsql1.al-rostamani.co.ae with SMTP (Microsoft Exchange Internet Mail Service Version 5.0.1460.8)
	id TFDHQWVB; Wed, 20 Sep 2000 20:02:03 +0400
Received: from SMTP agent by mail gateway 
 Wed, 20 Sep 2000 20:07:07 --400
To: nile333@kadet.co.uk
Subject: So, How in the heck have you been?
Sender: owner-ietf-ldup@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-ldup/mail-archive/>
List-ID: <ietf-ldup.imc.org>
List-Unsubscribe: <mailto:ietf-ldup-request@imc.org?body=unsubscribe>


So, How in the heck have you been?

Do you remember holding previous conversations regarding business and
money making opportunities? I did not send this to you in error!

You Said:

If only I could find an easier way to make a higher income!

and

If I had more money, I could spend more time with my Family, and less
time at work and I sure could use more money so I could pay off my
bills once and for all!

And

I would love to get involved in a business in which will generate money
while I am not at work (like a Gas Pump)!

Dear Friend,

There is a possibility that we haven’t met, but you were chosen by
someone to receive this E-Mail. Please, please, print this off and
read thoroughly. Be sure that you don’t miss any of the points
outlined.  Then put it down, and then read it again. I am sending
you a whole lot of information in which you might not understand
the first time you read it. If you don’t believe this  program
will work for you, send it to 10-20 of your closest friends
(in which you trust deeply),  and ask them what they think?
This really works! Have faith, don’t miss this opportunity,
get involved also, and it will work for you as it does for us!!!!

Due to the popularity of this letter on the Internet, A Major Nightly
News Program recently dedicated an entire show to the investigation of
the
program described below to see if it really can make people money.
The show also investigated whether or not the program was legal. Their
findings proved that there are absolutely no laws prohibiting the
participation in the program. This has helped to show people that this
is a simple, harmless and fun way to make extra money at home. The
results have been truly remarkable. So many people are participating
that those involved are doing much better than ever before. Since
everyone makes more as more people try it out, its been very exciting.

You will understand only if you get involved!
********** THE ENTIRE PLAN IS HERE BELOW **********
**** Print This Now For Future Reference ****

$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
If you would like to make AT LEAST $50,000 in less than 90 days! If not,

forward this to someone who would like to make this kind of money.
It works (like designed) but only for those who follow it to the letter!

Please read this program THEN READ IT AGAIN!!
$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$

THIS IS A LEGITIMATE. LEGAL, MONEY MAKING OPPORTUNITY!! It does NOT
require you to come into contact with people or make or take any
telephone
calls. Just follow the instructions, and you will make money. This
simplified e-mail marketing program works perfectly 100% EVERY TIME!

E-mail is the sales tool of the future. Take advantage of this virtually

free method of advertising NOW!!! The longer you wait, the more people
will
be doing business using e-mail. Get your piece of this action!!!

Hello, My name is Johnathon Rourke, I’m from Rhode Island.  The enclosed

information is something I almost let slip through my fingers.
Fortunately, sometime later I re-read everything and gave some thought
and study to it. Two years ago, the corporation I worked for the past
twelve yearsdown-sized and my position was eliminated. After
unproductive
job interviews, I decided to open my own business. Over the past year,I
incurred many unforeseen financial problems. I owed my family, friends
and
creditors over$35,000. The economy was taking a toll on my business and
I
just could not seem to make ends meet. I had to refinance and borrow
against
my home to support my family and struggling business.

AT THAT MOMENT something significant happened in my life. I am writing
to share the experience I hopes that this could change your life
FOREVER.
FINANCIALLY$$$!!!

In mid December, I received this program in my e-mail. Six months prior
to
receiving this program I had been sending away for information on
various
business opportunities. All of the programs I received, in my
opinion,were
not cost effective. They were either toodifficult for me to comprehend
or
the initial investment was too muchfor me to risk to see if they would
work.
But as I was saying, in December of 1997 I received this program.I
didn’t
send for it, or ask for it, they just got my name off a mailing list.

THANK GOODNESS FOR THAT!!!

After reading it several times, to make sure I was reading it correctly.
I
couldn’t believe my eyes! Here was a MONEY MAKING MACHINE I could start
immediately without any debt. Like most of you I was still a little
skeptical and a little worried about the legalaspects of it all. So I
checked it out with the U.S. Post Office (1-800-725-2161 24-hrs)  and
they
confirmed that it is indeed legal ! After determining the program was
LEGAL
I decided WHY NOT!?!??

Initially I sent out 10,000 e-mails. It cost me about $15 for my time
on-line. The great thing about e-mail is that I don’t need any paper for

printing to send out the program, and because I also send the product
(reports) by e-mail, my only expense is my time. In less than one week,I
was
starting to receive orders for REPORT #1.

By January 13, I had received 26 orders for REPORT #1. Your goal is to
RECEIVE at least 20 ORDERS FOR REPORT #1 WITHIN 2 WEEKS. IF YOU DON’T
SEND OUT MORE PROGRAMS UNTIL YOU DO. My first step in making $50,000 in
90
days was done. By January 30, I had received 196 orders for REPORT #2.
Your
goal is to RECEIVE AT LEAST 100+ ORDERS FOR REPORT #2 WITHIN
2 WEEKS. IF NOT SEND OUT MORE PROGRAMS UNTIL YOU! DO. ONCE YOU HAVE
100 ORDERS, THE REST IS EASY, RELAX, YOU WILL MAKE YOUR $50,000 GOAL.

Well, I had 196 orders for REPORT #2. 96 more than I needed. So I
sat back and relaxed.

By March 1, of my e-mailing of 10,000, received $58,000 with more coming
in
every day. I paid off ALL my debts and bought a much need new car!
Please
take your time to read this plan, IT WILL CHANGE YOUR LIFE FOREVER$!!!
Remember, it won’t work if you don’t try it. This program does work, But
you
must follow it EXACTLY! Especially the rules of not trying to place your

name in a different place. It won’t work and you’ll lose out on a lot of

money! In order for this program to work, you must meet your goal of 20+

orders for REPORT #1, and 100+ orders for REPORT #2 and you will make
$50,000 or more in 90 days.

I AM LIVING PROOF THAT IT WORKS!!!

If you choose not to participate in this program, I am sorry. It really
is a great opportunity with little cost or risk to you.  If you choose
toparticipate, follow the program and you will be on your way to
financial security. If you are a fellow business owner and
are financial trouble like I was, or you want to start your own
business, consider this a sign. I DID! $$

Sincerely,
Johnathon Rourke

A PERSONAL NOTE FROM THE ORIGINATOR OF THIS PROGRAM: By the time you
have read the enclosed program and reports, you should have concluded
that
such a program, and one that is legal, cpuld not have been created by an

amateur. Let me tell you a little about myself. I had a profitable
business
for 10 years. Then in 1979 my business began falling off. I was doing
the
same things that were previously successful for me, but it wasn’t
working.
Finally, I figured it out. It wasn’t me, it was the economy. Inflation
and
recession had replaced the stable economy that had been with us since
1945.
I don’t have to tell you what happened to the unemployment rate because
many
of you know from first hand experience. There were more failures and
bankruptcies than ever before. The middle class was vanishing. Those who

knew what they were doing invested wisely and moved up. Those who did
not,
including those who never had anything to save or invest, were moving
down into the ranks of the poor. As the saying goes, THE RICH GET RICHER

ANDTHE POOR GET POORER.  The traditional methods of making money will
never
allow you to move up or get rich, inflation will see to that You have
just
received the rest of  your life, with NO RISK and JUST A LITTLE BIT OF
EFFORT. You can make more money in the next few months than you have
everimagined.I should also point out that I will not see a penny of this

money, nor anyone else who has provided a testimonial for this program.
I
retired from the program after sending thousands and thousands of
programs.
Follow the program EXACTLY AS INSTRUCTED. Do not change it in any way.
It
works exceedingly well as it is now. Remember to e-mail a copyof this
exciting report to everyone you can think of. One of the people you send

this to may send out 50,000 and your name will be on everyone of them!
REMEMBER though, ------ the MORE YOU SEND OUT, the more potential
customers
you will reach. So my friend, I have given you the ideas,  information,
materials and opportunity to become financially independent.

IT IS UP TO YOU!! NOW DO IT!!

BEFORE YOU delete this program from your in box, as I almost did, take a

little time to read it and REALLY THINK ABOUT IT. Get a pencil and
figure out what could happen when YOU participate. Figure out the worst
possible response and no matter how you calculate it, you will still
make a
lot of money! You will definitely get back what you invested. Any doubts
you
have will vanish when your first orders come in. $$$ IT WORKS!!! $$$

Jody Jacobs Richmond, VA.

HERE’S HOW THIS AMAZING PROGRAM WILL MAKE YOU THOUSANDS OF
DOLLARS$$$$!!!!

This method of raising capital REALLY WORKS 100% EVERY TIME. I am sure
that you could use up to $50,000 or more in the next 90 days. Before you
say
BULL, please read this program carefully. This is not a chain letter,but
a
perfectly legal money making business. As with all multi-level
businesses,
we build our business by recruiting new partners and selling our
products.
Every state in the USA allows you to recruit new multi-level business
partners, and we sell and deliver a product for EVERY dollar received.

YOUR ORDERS COME BY MAIL AND ARE FILLED BY E-MAIL, so you are not
involved in personal selling. You do it privately in your own home,
store or
office. This is the EASIEST marketing plan anywhere! It is simply order
filling by e-mail! The product is informational and instructional
material,
keys to the secrets for everyone on how to open the doors to the magic
world
of E-COMMERCE, the information highway, the wave of the future !

PLAN SUMMARY:

(1) You order the 4 reports listed below ($5 each) They come to you by
e-mail.

(2)  Save a copy of this entire letter and put your name after Report #1
and
move the other names down.

(3)  Via the internet, access Yahoo.com or any of the other major search

engines to locate hundreds of bulk e-mail service companies (search for
bulk
email) and have them send 25,000  50,000 emails for you about $49+.

(4)  Orders will come to you by postal mail simply e-mail them the
Report they ordered. Let me ask you  isn’t this about as easy as it
gets?

By the way there are over 50 MILLION e-mail address with millions more
joining the internet each year so don’t worry about running out or
saturation. People are used to seeing and hearing the same
advertisements every day on radio/TV. How many times have you received
the same pizza flyers on your door? Then one day you are hungry for
pizza
and order one. Same thing with this letter. I received this letter many
times  then one day I decided it was time to try it.

YOU CAN START TODAY UST DO THESE EASY STEPS: STEP #1 ORDER THE FOUR
REPORTS

Order the four reports shown on the list below (you can’t sell them if
you don’t order them).  For each report, send $5.00 CASH, the NAME &
NUMBER
OF THE REPORT YOU ARE ORDERING, YOUR E-MAIL ADDRESS, and YOUR NAME &
RETURN
ADDRESS (in case of a problem) to the person whose name appears on the
list
next to the report.MAKE SURE YOUR RETURN ADDRESS IS ON YOUR ENVELOPE IN
CASE OF ANY MAIL PROBLEMS! Within a few days you will receive, by e-mail

each of the four reports.Save them on your computer so you can send them
to
the 1,000’s of people who will  order them from you.

STEP #2. ADD YOUR MAILING ADDRESS TO THIS LETTER

a. Look below for the listing of the four reports.
b. After you’ve ordered the four reports, delete the name and address
under REPORT #4. This person has made it through the cycle.
c. Move the name and address under REPORT #3 down to REPORT #4.
d. Move the name and address under REPORT #2 down to REPORT #3.
e. Move the name and address under REPORT #1 down to REPORT #2.
f. Insert your name/address in the REPORT #1 position. Please make sure
you

COPY ALL INFORMATION, every name and address, ACCURATELY!

STEP #3. Take this entire letter, including the modified list of names,
and save it to your computer. Make NO changes to these instructions. Now
you
are ready to use this entire e-mail to send by e-mail to prospects.

Report #1 will tell you how to download bulk email software and email
address so you can send it out to thousands of people while you sleep!
Remember that 50,000+ new people are joining the internet every month!
Your cost to participate in this is practically nothing ( surely you can

afford $20 and initial bulk mailing cost). You obviously already have a
computer and an Internet connection and e-mail is FREE! There are two
primary methods of building your downline: METHOD #1: SENDING BULK
E-MAIL
let’s say that you decide to start small, just to see how it goes, and
we’ll
assume you and all those involved email out only 2,000 programs each.
Let’s
also assume that the mailing receives a 0.5% response. The response
could be
much better. Also, many people will email out thousands of thousands of
programs instead of 2,000 (Why stop at 2000?) But continuing with this
example, you send out only 2,000 programs. With a 0.5% response, that is

only 10 orders for REPORT #1. Those 10 people respond by sending out
2,000
programs each for a total of 20,000. Out of those 0.5%, 100 people
respond
and order REPORT #2.Those 100 mail out 2,000 programs each for a total
of
200,000. The 0.5% response to that is 1,000 orders for REPORT #3. Those
1,000 send out 2,000  programs each for a 2,000,000 total. The 0.5%
response
to that is 10,000 orders for REPORT #4. That’s 10,000 $5 bills for you.
CASH!!! Your total income in this example is $50 + $500 + $5000 +
$50,000
for a total of $55,550!!!

REMEMBER FRIEND, THIS IS ASSUMING 1,990 OUT OF THE 2,000 PEOPLE YOU MAIL
TO
WILL DO ABSOLUTELY NOTHING AND TRASH THIS PROGRAM! DARE TO THINK FOR A
MOMENT WHAT WOULD HAPPEN IF EVERYONE, OR HALF SENT OUT 100,000 PROGRAMS
INSTEAD OF 2,000. Believe me, many people will do just that, and more!

METHOD #2 PLACING FREE ADS ON THE INTERNET Advertising on the internet
is very, very inexpensive, and there are HUNDREDS of FREE places to
advertise. Let’s say you decide to start small to see how well it works.

Assume your goal is to get ONLY 10 people to participate on your first
level. (Placing a lot of FREE ads on the Internet will EASILY get a
larger
response). Also assume that everyone else in YOUR ORGANIZATION gets only
10
downline members. Look how this small number accumulates to achieve the
STAGGERING results below:

1St level  your first 10 send you $5........................$50
2nd level  10 members from those 10 ($5 x 100)............$500
3rd level  10 members from those 100 ($5 x 1,000)......$5,000
4th level 10 members from those 1,000 ($5 x 10,000)..$50,000
$$$$$$ THIS TOTALS
------------------------------------------------55,5550
$$$$$

AMAZING ISN’T IT Remember friends, this assumes that the people who
participate only recruit 10 people each. Think for a moment what would
happen if they got 20 people to participate! Most people get 100’s of
participants and many will continue to work this program, sending out
programs WITH YOUR NAME ON THEM for years! THINK ABOUT IT!
People are going to get emails about this plan from you or somebody else
and
many will work this plan  the question is Don’t you want your name to be
on
the emails they will send out?

*** DON’T MISS OUT !!!***
***JUST TRY IT ONCE !!!***
***SEE WHAT HAPPENS !!!***
***YOU'LL BE AMAZED !!!***

ALWAYS PROVIDE SAME DAY SERVICE ON ALL ORDERS! This will guarantee that
the e-mail THEY send out with YOUR name and address on it will be prompt

because they can’t advertise until they receive the report!

GET STARTED TODAY: PLACE YOUR ORDER FOR THE FOUR REPORTS NOW. Note:--
ALWAYS SEND $5 CASH (U.S. CURRENCY) FOR EACH REPORT. CHECKS NOT
ACCEPTED.
Make sure the cash is concealed by wrapping it in two sheets of paper.
On
one of those sheets write:

(a) the number & name of the report you are ordering
(b) your e-mail address, and
(c) your name & postal address.

REPORT #1b The Insider’s Guide to Advertising for Free on the Internet
ORDER REPORT #1 FROM:

NICK NICHOLAS
473 MICHIGAN ST
ST.PAUL, MN 55102

NOTE: I and every member below are dedicated at helping you with this
program so it will work for you also. TRY US!

REPORT #2 The Insider’s Guide to Sending Bulk E-Mail on the Internet
ORDER REPORT #2 FROM:

DIANE COLON
1811 TAMARIND AVE # 206
LOS ANGELES, CA. 90028

REPORT #3 The Secrets to Multilevel Marketing on the Internet
ORDER REPORT #3 FROM:

MELISSA HOGENMILLER
3709 MONHEIM ROAD
CONOVER, WI 54519

REPORT #4 How to become a Millionaire utilizing the Power of Multilevel
Marketing and the Internet
ORDER REPORT #4 FROM:

CATHY BARROW
10 SYCAMORE STREET
CONWAY, SC 29527

*************TIPS FOR SUCCESS***************
TREAT THIS AS YOUR BUSINESS! Be prompt, professional, and follow the
directions accurately.  Send for the four reports IMMEDIATELY so you
will have them when the orders start coming in because: When you
receive a $5 order you MUST send out the requested product/report.
It is required for this to be a legal business and they need the
reports to send out their letter (with your name on them).

--ALWAYS PROVIDE SAME-DAY SERVICE ON THE ORDERS YOU RECEIVE. Be
patient and persistent with this program- If you follow the
instructions exactly results WILL FOLLOW. $$$$

************ YOUR SUCCESS GUIDELINES ***************

Follow these guidelines to guarantee your success: If you don’t receive
20 orders for REPORT #1 within two weeks, continue advertising or
sending
e-mail until you do. Then a couple of weeks later you should receive at
least 100 orders for REPORT #2. If you don’t continue advertising or
sending
e-mail until you do. Once you have received 100 or more orders for
REPORT
#2, YOU CAN RELAX, because the system is already working for you, and
the
cash will continue to roll in! THIS IS IMPORTANT TO REMEMBER:  Every
time
your name is moved down on the list, you are placed in front of a
DIFFERENT
report. You can KEEP TRACK of your  PROGRESS by watching which report
people
are ordering from you. To generate more income, simply send another
batch of
e-mails or continue placing ads and start the whole process again! There
is
no limit to the income you will generate from this business! Before you
make
your decision as to whether or not you participate in this program.
Please
answer one question:

ARE YOU HAPPY WITH YOUR PRESENT INCOME OR JOB?

1. If the answer is no, then please look at the following facts about
this super simple MLM program: NO face to face selling, NO meetings, NO
inventory! NO Telephone calls, NO big cost to start! Nothing to learn,
No skills needed! (Surely you know how to send email?)

2. No equipment to buy you already have a computer and internet
connection so you have everything you need to fill orders!

3. You are selling a product which does NOT COST ANYTHING TO PRODUCE OR
SHIP! (Email copies of the reports are FREE!)

4. All of your customers pay you in CASH! This program will change your
LIFE  FOREEVER!! Look at the potential for you to be able to quit your
job and live a life of luxury you could only dream about! Imagine
getting out of debt and buying the car and home of your dreams and
being able to work a super-high paying leisurely easy business from
home!

$$$ FINALLY MAKE SOME DREAMS COME TRUE! $$$ ACT NOW!
Take your first step toward achieving financial independence.  Order
the reports and follow the program outlined above __ SUCCESS will be
your reward.

Thank you for your time and consideration. PLEASE NOT: If you need
help with starting a business, registering a business name, learning
now income tax is handled, etc., contact your local office of the
Small Business Administration  (A Federal Agency) 1-800-827-5722
for free help and answers to questions. Also the Internal Revenue
Service offers free help via telephone and free seminars about
business tax requirements. Your earnings are highly dependent on
your activities and advertising. The information contained on this
site and in the report constitutes no guarantees stated nor implied.
In the event that it is determined that this site or report
constitutes a guarantee of any kind, that guarantee is now void. The
earnings amounts listed on this site and in the report are estimates
only. If you have any questions of the legality of this program,
contact the Office of Associate Director for Marketing Practices,
Federal Trade Commission, Bureau of Consumer Protection in
Washington DC.

Under Bill s.1618 TITLE III passed by the 105th US Congress this
letter cannot be considered spam as long as the sender includes
contact information and a method of removal. This is a one time
e-mail transmission. No request for removal is necessary.





