From owner-ietf-msgtrk@mail.imc.org  Wed Oct 23 12:56:38 2002
Received: from above.proper.com (mail.proper.com [208.184.76.45])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA25366
	for <msgtrk-archive@lists.ietf.org>; Wed, 23 Oct 2002 12:56:37 -0400 (EDT)
Received: (from majordomo@localhost)
	by above.proper.com (8.11.6/8.11.3) id g9NGsEW26300
	for ietf-msgtrk-bks; Wed, 23 Oct 2002 09:54:14 -0700 (PDT)
Received: from knecht.Neophilic.COM (knecht.sendmail.org [209.31.233.176])
	by above.proper.com (8.11.6/8.11.3) with ESMTP id g9NGs6W26278
	for <ietf-msgtrk@imc.org>; Wed, 23 Oct 2002 09:54:07 -0700 (PDT)
Received: from irma.neophilic.com (natted.Sendmail.COM [63.211.143.38])
	by knecht.Neophilic.COM (8.12.5/8.12.3) with ESMTP id g9NGrpsa029939
	(version=TLSv1/SSLv3 cipher=EDH-RSA-DES-CBC3-SHA bits=168 verify=OK);
	Wed, 23 Oct 2002 09:53:52 -0700 (PDT)
Received: from [10.210.202.76] (localhost [127.0.0.1])
	by irma.neophilic.com (8.12.6/8.12.2) with ESMTP id g9NGsIFo003153;
	Wed, 23 Oct 2002 09:54:34 -0700 (PDT)
Date: Wed, 23 Oct 2002 09:54:17 -0700
From: Eric Allman <eric@sendmail.com>
To: ned.freed@mrochek.com
cc: ietf-msgtrk@imc.org, paf@cisco.com
Subject: Re: AD review of msgtrk documents
Message-ID: <41569037.1035366856@[10.210.202.76]>
In-Reply-To: <01KLJKQFSLGK0001B1@mauve.mrochek.com>
References:  <01KLJKQFSLGK0001B1@mauve.mrochek.com>
X-Mailer: Mulberry/2.2.1 (Mac OS X)
MIME-Version: 1.0
Content-Type: multipart/mixed; boundary="==========41585900=========="
X-Spam-Status: No, hits=-5.7 required=5.0
	tests=AWL,IN_REP_TO,REFERENCES,SPAM_PHRASE_00_01
	version=2.41
Sender: owner-ietf-msgtrk@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-msgtrk/mail-archive/>
List-ID: <ietf-msgtrk.imc.org>
List-Unsubscribe: <mailto:ietf-msgtrk-request@imc.org?body=unsubscribe>


--==========41585900==========
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: 7bit

Ned, et al,

Enclosed is the update of smtpext-03 and trkstat-03 per your
comments.  These are still in "draft" format; please let me know if
you want me to update them to "RFC" format.

eric
--==========41585900==========
Content-Type: application/octet-stream; name="draft-ietf-msgtrk-smtpext.txt"
Content-Disposition: attachment; filename="draft-ietf-msgtrk-smtpext.txt";
 size=16971
Content-Transfer-Encoding: base64
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--==========41585900==========
Content-Type: application/octet-stream; name="draft-ietf-msgtrk-trkstat.txt"
Content-Disposition: attachment; filename="draft-ietf-msgtrk-trkstat.txt";
 size=21278
Content-Transfer-Encoding: base64

CgoKCkludGVybmV0IERyYWZ0ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg
ICAgICAgICBFLiBBbGxtYW4KZHJhZnQtaWV0Zi1tc2d0cmstdHJrc3RhdC0wNC50eHQgICAgICAg
ICAgICAgICAgICAgICAgICBTZW5kbWFpbCwgSW5jLgpWYWxpZCBmb3Igc2l4IG1vbnRocyAgICAg
ICAgICAgICAgICAgICAgICAgICAgICAgICAgICBPY3RvYmVyIDIxLCAyMDAyClVwZGF0ZXM6IFJG
QyAxODkzCgoKCgogICAgIEFuIEV4dGVuc2libGUgTWVzc2FnZSBGb3JtYXQgZm9yIE1lc3NhZ2Ug
VHJhY2tpbmcgUmVzcG9uc2VzCgogICAgICAgICAgICAgICAgICA8ZHJhZnQtaWV0Zi1tc2d0cmst
dHJrc3RhdC0wNC50eHQ+CgpTdGF0dXMgb2YgVGhpcyBNZW1vCgogICAgIFRoaXMgZG9jdW1lbnQg
aXMgYW4gSW50ZXJuZXQtRHJhZnQgYW5kIGlzIGluIGZ1bGwgY29uZm9ybWFuY2UKd2l0aCBhbGwg
cHJvdmlzaW9ucyBvZiBTZWN0aW9uIDEwIG9mIFJGQzIwMjYuICBJbnRlcm5ldC1EcmFmdHMgYXJl
CndvcmtpbmcgZG9jdW1lbnRzIG9mIHRoZSBJbnRlcm5ldCBFbmdpbmVlcmluZyBUYXNrIEZvcmNl
IChJRVRGKSwgaXRzCmFyZWFzLCBhbmQgaXRzIHdvcmtpbmcgZ3JvdXBzLiAgTm90ZSB0aGF0IG90
aGVyIGdyb3VwcyBtYXkgYWxzbwpkaXN0cmlidXRlIHdvcmtpbmcgZG9jdW1lbnRzIGFzIEludGVy
bmV0LURyYWZ0cy4KCiAgICAgSW50ZXJuZXQtRHJhZnRzIGFyZSBkcmFmdCBkb2N1bWVudHMgdmFs
aWQgZm9yIGEgbWF4aW11bSBvZiBzaXgKbW9udGhzIGFuZCBtYXkgYmUgdXBkYXRlZCwgcmVwbGFj
ZWQsIG9yIG9ic29sZXRlZCBieSBvdGhlciBkb2N1bWVudHMKYXQgYW55IHRpbWUuICBJdCBpcyBp
bmFwcHJvcHJpYXRlIHRvIHVzZSBJbnRlcm5ldC1EcmFmdHMgYXMgcmVmZXJlbmNlCm1hdGVyaWFs
IG9yIHRvIGNpdGUgdGhlbSBvdGhlciB0aGFuIGFzICJ3b3JrIGluIHByb2dyZXNzLiIKCiAgICAg
VGhlIElFVEYgdGFrZXMgbm8gcG9zaXRpb24gcmVnYXJkaW5nIHRoZSB2YWxpZGl0eSBvciBzY29w
ZSBvZiBhbnkKaW50ZWxsZWN0dWFsIHByb3BlcnR5IG9yIG90aGVyIHJpZ2h0cyB0aGF0IG1pZ2h0
IGJlIGNsYWltZWQgdG8KcGVydGFpbiB0byB0aGUgaW1wbGVtZW50YXRpb24gb3IgdXNlIG9mIHRo
ZSB0ZWNobm9sb2d5IGRlc2NyaWJlZCBpbgp0aGlzIGRvY3VtZW50IG9yIHRoZSBleHRlbnQgdG8g
d2hpY2ggYW55IGxpY2Vuc2UgdW5kZXIgc3VjaCByaWdodHMKbWlnaHQgb3IgbWlnaHQgbm90IGJl
IGF2YWlsYWJsZTsgbmVpdGhlciBkb2VzIGl0IHJlcHJlc2VudCB0aGF0IGl0IGhhcwptYWRlIGFu
eSBlZmZvcnQgdG8gaWRlbnRpZnkgYW55IHN1Y2ggcmlnaHRzLiAgSW5mb3JtYXRpb24gb24gdGhl
CklFVEYncyBwcm9jZWR1cmVzIHdpdGggcmVzcGVjdCB0byByaWdodHMgaW4gc3RhbmRhcmRzLXRy
YWNrIGFuZApzdGFuZGFyZHMtcmVsYXRlZCBkb2N1bWVudGF0aW9uIGNhbiBiZSBmb3VuZCBpbiBC
Q1AtMTEuICBDb3BpZXMgb2YKY2xhaW1zIG9mIHJpZ2h0cyBtYWRlIGF2YWlsYWJsZSBmb3IgcHVi
bGljYXRpb24gYW5kIGFueSBhc3N1cmFuY2VzIG9mCmxpY2Vuc2VzIHRvIGJlIG1hZGUgYXZhaWxh
YmxlLCBvciB0aGUgcmVzdWx0IG9mIGFuIGF0dGVtcHQgbWFkZSB0bwpvYnRhaW4gYSBnZW5lcmFs
IGxpY2Vuc2Ugb3IgcGVybWlzc2lvbiBmb3IgdGhlIHVzZSBvZiBzdWNoIHByb3ByaWV0YXJ5CnJp
Z2h0cyBieSBpbXBsZW1lbnRvcnMgb3IgdXNlcnMgb2YgdGhpcyBzcGVjaWZpY2F0aW9uIGNhbiBi
ZSBvYnRhaW5lZApmcm9tIHRoZSBJRVRGIFNlY3JldGFyaWF0LgoKICAgICBUaGUgSUVURiBpbnZp
dGVzIGFueSBpbnRlcmVzdGVkIHBhcnR5IHRvIGJyaW5nIHRvIGl0cyBhdHRlbnRpb24KYW55IGNv
cHlyaWdodHMsIHBhdGVudHMgb3IgcGF0ZW50IGFwcGxpY2F0aW9ucywgb3Igb3RoZXIgcHJvcHJp
ZXRhcnkKcmlnaHRzIHdoaWNoIG1heSBjb3ZlciB0ZWNobm9sb2d5IHRoYXQgbWF5IGJlIHJlcXVp
cmVkIHRvIHByYWN0aWNlCnRoaXMgc3RhbmRhcmQuICBQbGVhc2UgYWRkcmVzcyB0aGUgaW5mb3Jt
YXRpb24gdG8gdGhlIElFVEYgRXhlY3V0aXZlCkRpcmVjdG9yLgoKICAgICBUaGUgbGlzdCBvZiBj
dXJyZW50IEludGVybmV0LURyYWZ0cyBjYW4gYmUgYWNjZXNzZWQgYXQ6CgogICAgaHR0cDovL3d3
dy5pZXRmLm9yZy9pZXRmLzFpZC1hYnN0cmFjdHMudHh0CgpUaGUgbGlzdCBvZiBJbnRlcm5ldC1E
cmFmdCBTaGFkb3cgRGlyZWN0b3JpZXMgY2FuIGJlIGFjY2Vzc2VkIGF0OgoKICAgIGh0dHA6Ly93
d3cuaWV0Zi5vcmcvc2hhZG93Lmh0bWwKCgogICAgIFRoaXMgZG9jdW1lbnQgaXMgYSBzdWJtaXNz
aW9uIGJ5IHRoZSBNU0dUUksgV29ya2luZyBHcm91cCBvZiB0aGUKSW50ZXJuZXQgRW5naW5lZXJp
bmcgVGFzayBGb3JjZSAoSUVURikuICBDb21tZW50cyBzaG91bGQgYmUgc3VibWl0dGVkCgwKSW50
ZXJuZXQgRHJhZnQgICAgICAgICAgTWVzc2FnZS9UcmFja2luZy1TdGF0dXMgICAgICAgT2N0b2Jl
ciAyMSwgMjAwMgoKCnRvIHRoZSBpZXRmLW1zZ3Rya0BpbWMub3JnIG1haWxpbmcgbGlzdC4gIEFu
IGFyY2hpdmUgb2YgdGhlIG1haWxpbmcKbGlzdCBtYXkgYmUgZm91bmQgYXQKCiAgICBodHRwOi8v
d3d3LmltYy5vcmcvaWV0Zi1tc2d0cmsvaW5kZXguaHRtbAoKCiAgICAgRGlzdHJpYnV0aW9uIG9m
IHRoaXMgbWVtbyBpcyB1bmxpbWl0ZWQuCgoxLiAgQWJzdHJhY3QKCiAgICAgICAgTWVzc2FnZSBU
cmFja2luZyBpcyBleHBlY3RlZCB0byBiZSB1c2VkIHRvIGRldGVybWluZSB0aGUKICAgc3RhdHVz
IG9mIHVuZGVsaXZlcmVkIGUtbWFpbCB1cG9uIHJlcXVlc3QuICBUcmFja2luZyBpcyB1c2VkIGlu
CiAgIGNvbmp1bmN0aW9uIHdpdGggRGVsaXZlcnkgU3RhdHVzIE5vdGlmaWNhdGlvbnMgW1JGQy1E
U04tU01UUF0gYW5kCiAgIE1lc3NhZ2UgRGlzcG9zaXRpb24gTm90aWZpY2F0aW9ucyBbUkZDLU1E
Tl07IGdlbmVyYWxseSwgYSBtZXNzYWdlCiAgIHRyYWNraW5nIHJlcXVlc3Qgd2lsbCBiZSBpc3N1
ZWQgb25seSB3aGVuIGEgRFNOIG9yIE1ETiBoYXMgbm90IGJlZW4KICAgcmVjZWl2ZWQgd2l0aGlu
IGEgcmVhc29uYWJsZSB0aW1lb3V0IHBlcmlvZC4KCiAgICAgICAgVGhpcyBtZW1vIGRlZmluZXMg
YSBNSU1FIFtSRkMtTUlNRV0gY29udGVudC10eXBlIGZvciBtZXNzYWdlCiAgIHRyYWNraW5nIHN0
YXR1cyBpbiB0aGUgc2FtZSBzcGlyaXQgYXMgUkZDIDE4OTQsIGBgQW4gRXh0ZW5zaWJsZQogICBN
ZXNzYWdlIEZvcm1hdCBmb3IgRGVsaXZlcnkgU3RhdHVzIE5vdGlmaWNhdGlvbnMnJyBbUkZDLURT
Ti1TVEFUXS4KICAgSXQgaXMgdG8gYmUgaXNzdWVkIHVwb24gYSByZXF1ZXN0IGFzIGRlc2NyaWJl
ZCBpbiBgYE1lc3NhZ2UKICAgVHJhY2tpbmcgUXVlcnkgUHJvdG9jb2wnJyBbRFJBRlQtTVRSSy1N
VFFQXS4gIFRoaXMgbWVtbyBkZWZpbmVzCiAgIG9ubHkgdGhlIGZvcm1hdCBvZiB0aGUgc3RhdHVz
IGluZm9ybWF0aW9uLiAgQW4gZXh0ZW5zaW9uIHRvIFNNVFAKICAgW1JGQy1FU01UUF0gdG8gbGFi
ZWwgbWVzc2FnZXMgZm9yIGZ1cnRoZXIgdHJhY2tpbmcgYW5kIHJlcXVlc3QKICAgdHJhY2tpbmcg
c3RhdHVzIGlzIGRlZmluZWQgaW4gYSBzZXBhcmF0ZSBtZW1vIFtEUkFGVC1NVFJLLVNNVFBFWFRd
LgoKMi4gIE90aGVyIERvY3VtZW50cyBhbmQgQ29uZm9ybWFuY2UKCiAgICAgICAgVGhlIG1vZGVs
IHVzZWQgZm9yIE1lc3NhZ2UgVHJhY2tpbmcgaXMgZGVzY3JpYmVkIGluIFtEUkFGVC0KICAgTVRS
Sy1NT0RFTF0uCgogICAgICAgIE1lc3NhZ2UgdHJhY2tpbmcgaXMgaW50ZW5kZWQgZm9yIHVzZSBh
cyBhICJsYXN0IHJlc29ydCIKICAgbWVjaGFuaXNtLiAgTm9ybWFsbHksIERlbGl2ZXJ5IFN0YXR1
cyBOb3RpZmljYXRpb25zIChEU05zKSBbUkZDLQogICBEU04tU01UUF0gYW5kIE1lc3NhZ2UgRGlz
cG9zaXRpb24gTm90aWZpY2F0aW9ucyAoTUROcykgW1JGQy1NRE5dCiAgIHdvdWxkIHByb3ZpZGUg
dGhlIHByaW1hcnkgZGVsaXZlcnkgc3RhdHVzLiAgT25seSBpZiBubyByZXNwb25zZSBpcwogICBy
ZWNlaXZlZCBmcm9tIGVpdGhlciBvZiB0aGVzZSBtZWNoYW5pc21zIHdvdWxkIE1lc3NhZ2UgVHJh
Y2tpbmcgYmUKICAgdXNlZC4KCiAgICAgICAgVGhpcyBkb2N1bWVudCBpcyBiYXNlZCBvbiBbUkZD
LURTTi1TVEFUXS4gIFNlY3Rpb25zIDEuMwogICAoVGVybWlub2xvZ3kpLCAyLjEuMSAoR2VuZXJh
bCBjb252ZW50aW9ucyBmb3IgRFNOIGZpZWxkcyksIDIuMS4yCiAgICgiKi10eXBlIiBzdWJmaWVs
ZHMpLCBhbmQgMi4xLjMgKExleGljYWwgdG9rZW5zIGltcG9ydGVkIGZyb20gUkZDCiAgIDgyMikg
b2YgW1JGQy1EU04tU1RBVF0gYXJlIGluY2x1ZGVkIGludG8gdGhpcyBkb2N1bWVudCBieQogICBy
ZWZlcmVuY2UuICBPdGhlciBzZWN0aW9ucyBhcmUgZnVydGhlciBpbmNvcnBvcmF0ZWQgYXMgZGVz
Y3JpYmVkCiAgIGhlcmVpbi4KCiAgICAgICAgU3ludGF4IG5vdGF0aW9uIGluIHRoaXMgZG9jdW1l
bnQgY29uZm9ybXMgdG8gW1JGQy1BQk5GXS4KCiAgICAgICAgVGhlIGZvbGxvd2luZyBsZXhpY2Fs
IHRva2VucywgZGVmaW5lZCBpbiBbUkZDLU1TR0ZNVF0sIGFyZQogICB1c2VkIGluIHRoZSBBQk5G
IGdyYW1tYXIgZm9yIE1UU05zOiBhdG9tLCBDSEFSLCBjb21tZW50LCBDUiwgQ1JMRiwKICAgRElH
SVQsIExGLCBsaW5lYXItd2hpdGUtc3BhY2UsIFNQQUNFLCB0ZXh0LiAgVGhlIGRhdGUtdGltZSBs
ZXhpY2FsCiAgIHRva2VuIGlzIGRlZmluZWQgaW4gW1JGQy1IT1NUUkVRXS4KCiAgICAgICAgVGhl
IGtleSB3b3JkcyAiTVVTVCIsICJNVVNUIE5PVCIsICJSRVFVSVJFRCIsICJTSEFMTCIsICJTSEFM
TAogICBOT1QiLCAiU0hPVUxEIiwgIlNIT1VMRCBOT1QiLCAiUkVDT01NRU5ERUQiLCAiTUFZIiwg
YW5kICJPUFRJT05BTCIKICAgaW4gdGhpcyBkb2N1bWVudCBhcmUgdG8gYmUgaW50ZXJwcmV0ZWQg
YXMgZGVzY3JpYmVkIGluIFJGQyAyMTE5CiAgIFtSRkMtS0VZV09SRFNdLgoKCkFsbG1hbiAgICAg
ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgW1BhZ2Ug
Ml0KDApJbnRlcm5ldCBEcmFmdCAgICAgICAgICBNZXNzYWdlL1RyYWNraW5nLVN0YXR1cyAgICAg
ICBPY3RvYmVyIDIxLCAyMDAyCgoKMy4gIEZvcm1hdCBvZiBhIE1lc3NhZ2UgVHJhY2tpbmcgU3Rh
dHVzIE5vdGlmaWNhdGlvbgoKICAgICAgICBBIE1lc3NhZ2UgVHJhY2tpbmcgU3RhdHVzIE5vdGlm
aWNhdGlvbiAoTVRTTikgaXMgaW50ZW5kZWQgdG8KICAgYmUgcmV0dXJuZWQgYXMgdGhlIGJvZHkg
b2YgYSBNZXNzYWdlIFRyYWNraW5nIHJlcXVlc3QgW0RSQUZULU1UUkstCiAgIE1UUVBdLiAgVGhl
IGFjdHVhbCBib2R5IE1VU1QgYmUgYSBtdWx0aXBhcnQvcmVsYXRlZCBbUkZDLVJFTEFURURdCiAg
IHdpdGggdHlwZSBwYXJhbWV0ZXIgb2YgIm1lc3NhZ2UvdHJhY2tpbmctc3RhdHVzIjsgZWFjaCBz
dWJwYXJ0IE1VU1QKICAgYmUgb2YgdHlwZSAibWVzc2FnZS90cmFja2luZy1zdGF0dXMiIGFzIGRl
c2NyaWJlZCBoZXJlaW4uICBUaGUKICAgbXVsdGlwYXJ0L3JlbGF0ZWQgYm9keSBjYW4gaW5jbHVk
ZSBtdWx0aXBsZSBtZXNzYWdlL3RyYWNraW5nLXN0YXR1cwogICBwYXJ0cyBpZiBhbiBNVFFQIHNl
cnZlciBjaGFpbnMgcmVxdWVzdHMgdG8gdGhlIG5leHQgc2VydmVyOyBzZWUKICAgW0RSQUZULU1U
UkstTU9ERUxdIGFuZCBbRFJBRlQtTVRSSy1NVFFQXSBmb3IgbW9yZSBpbmZvcm1hdGlvbiBhYm91
dAogICBjaGFpbmluZy4KCiAgIDMuMS4gIFRoZSBtZXNzYWdlL3RyYWNraW5nLXN0YXR1cyBjb250
ZW50LXR5cGUKCiAgICAgICAgICAgVGhlIG1lc3NhZ2UvdHJhY2tpbmctc3RhdHVzIGNvbnRlbnQt
dHlwZSBpcyBkZWZpbmVkIGFzCiAgICAgIGZvbGxvd3M6CgogICAgICAgICAgTUlNRSB0eXBlIG5h
bWU6ICAgICAgICAgICBtZXNzYWdlCiAgICAgICAgICBNSU1FIHN1YnR5cGUgbmFtZTogICAgICAg
IHRyYWNraW5nLXN0YXR1cwogICAgICAgICAgT3B0aW9uYWwgcGFyYW1ldGVyczogICAgICBub25l
CiAgICAgICAgICBFbmNvZGluZyBjb25zaWRlcmF0aW9uczogICI3Yml0IiBlbmNvZGluZyBpcyBz
dWZmaWNpZW50IGFuZAogICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBNVVNUIGJl
IHVzZWQgdG8gbWFpbnRhaW4gcmVhZGFiaWxpdHkKICAgICAgICAgICAgICAgICAgICAgICAgICAg
ICAgICAgICAgd2hlbiB2aWV3ZWQgYnkgbm9uLU1JTUUgbWFpbCByZWFkZXJzLgogICAgICAgICAg
U2VjdXJpdHkgY29uc2lkZXJhdGlvbnM6ICBkaXNjdXNzZWQgaW4gc2VjdGlvbiA0IG9mIHRoaXMg
bWVtby4KCgogICAgICAgICAgIFRoZSBib2R5IG9mIGEgbWVzc2FnZS90cmFja2luZy1zdGF0dXMg
aXMgbW9kZWxlZCBhZnRlcgogICAgICBbUkZDLURTTi1TVEFUXS4gIFRoYXQgYm9keSBjb25zaXN0
cyBvZiBvbmUgb3IgbW9yZSAiZmllbGRzIgogICAgICBmb3JtYXR0ZWQgdG8gYWNjb3JkaW5nIHRv
IHRoZSBBQk5GIG9mIFJGQyAyODIyIGhlYWRlciAiZmllbGRzIgogICAgICAoc2VlIFtSRkMtTVNH
Rk1UXSkuICBUaGUgcGVyLW1lc3NhZ2UgZmllbGRzIGFwcGVhciBmaXJzdCwKICAgICAgZm9sbG93
ZWQgYnkgYSBibGFuayBsaW5lLiAgRm9sbG93aW5nIHRoZSBwZXItbWVzc2FnZSBmaWVsZHMgYXJl
CiAgICAgIG9uZSBvciBtb3JlIGdyb3VwcyBvZiBwZXItcmVjaXBpZW50IGZpZWxkcy4gIEVhY2gg
Z3JvdXAgb2YgcGVyLQogICAgICByZWNpcGllbnQgZmllbGRzIGlzIHByZWNlZGVkIGJ5IGEgYmxh
bmsgbGluZS4gIE5vdGUgdGhhdCB0aGVyZQogICAgICB3aWxsIGJlIGEgYmxhbmsgbGluZSBiZXR3
ZWVuIHRoZSBmaW5hbCBwZXItcmVjaXBpZW50IGZpZWxkIGFuZAogICAgICB0aGUgTUlNRSBib3Vu
ZGFyeSwgc2luY2Ugb25lIENSTEYgaXMgbmVjZXNzYXJ5IHRvIHRlcm1pbmF0ZSB0aGUKICAgICAg
ZmllbGQsIGFuZCBhIHNlY29uZCBpcyBuZWNlc3NhcnkgdG8gaW50cm9kdWNlIHRoZSBNSU1FIGJv
dW5kYXJ5LgogICAgICBGb3JtYWxseSwgdGhlIHN5bnRheCBvZiB0aGUgbWVzc2FnZS90cmFja2lu
Zy1zdGF0dXMgY29udGVudCBpcwogICAgICBhcyBmb2xsb3dzOgoKICAgICAgICAgIHRyYWNraW5n
LXN0YXR1cy1jb250ZW50ID0KICAgICAgICAgICAgICAgICAgICBwZXItbWVzc2FnZS1maWVsZHMg
MSooIENSTEYgcGVyLXJlY2lwaWVudC1maWVsZHMgKQoKICAgICAgVGhlIHBlci1tZXNzYWdlIGZp
ZWxkcyBhcmUgZGVzY3JpYmVkIGluIHNlY3Rpb24gMy4yLiAgVGhlIHBlci0KICAgICAgcmVjaXBp
ZW50IGZpZWxkcyBhcmUgZGVzY3JpYmVkIGluIHNlY3Rpb24gMy4zLgoKICAgICAgMy4xLjEuICBH
ZW5lcmFsIGNvbnZlbnRpb25zIGZvciBNVFNOIGZpZWxkcwoKICAgICAgICAgICAgICBTZWN0aW9u
IDIuMS4xIChHZW5lcmFsIGNvbnZlbnRpb25zIGZvciBEU04gZmllbGRzKSBvZgogICAgICAgICBb
UkZDLURTTi1TVEFUXSBpcyBpbmNsdWRlZCBoZXJlaW4gYnkgcmVmZXJlbmNlLiAgTm90YWJseSwg
dGhlCiAgICAgICAgIGRlZmluaXRpb24gb2YgeHRleHQgaXMgaWRlbnRpY2FsIHRvIHRoYXQgb2Yg
dGhhdCBkb2N1bWVudC4KCiAgICAgIDMuMS4yLiAgKi10eXBlIHN1YmZpZWxkcwoKICAgICAgICAg
ICAgICBTZWN0aW9uIDIuMS4yICgqLXR5cGUgc3ViZmllbGRzKSBvZiBbUkZDLURTTi1TVEFUXSBp
cwogICAgICAgICBpbmNsdWRlZCBoZXJlaW4gYnkgcmVmZXJlbmNlLiAgTm90YWJseSwgdGhlIGRl
ZmluaXRpb25zIG9mCiAgICAgICAgIGFkZHJlc3MtdHlwZSwgZGlhZ25vc3RpYy10eXBlLCBhbmQg
TVRBLW5hbWUgdHlwZSBhcmUKCgpBbGxtYW4gICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg
ICAgICAgICAgICAgICAgICAgICAgICAgIFtQYWdlIDNdCgwKSW50ZXJuZXQgRHJhZnQgICAgICAg
ICAgTWVzc2FnZS9UcmFja2luZy1TdGF0dXMgICAgICAgT2N0b2JlciAyMSwgMjAwMgoKCiAgICAg
ICAgIGlkZW50aWNhbCB0byB0aGF0IG9mIFJGQyAxODk0LgoKCiAgIDMuMi4gIFBlci1NZXNzYWdl
IE1UU04gRmllbGRzCgogICAgICAgICAgIFNvbWUgZmllbGRzIG9mIGFuIE1UU04gYXBwbHkgdG8g
YWxsIG9mIHRoZSBhZGRyZXNzZXMgaW4gYQogICAgICBzaW5nbGUgZW52ZWxvcGUuICBUaGVzZSBm
aWVsZHMgbWF5IGFwcGVhciBhdCBtb3N0IG9uY2UgaW4gYW55CiAgICAgIE1UU04uICBUaGVzZSBm
aWVsZHMgYXJlIHVzZWQgdG8gY29ycmVsYXRlIHRoZSBNVFNOIHdpdGggdGhlCiAgICAgIG9yaWdp
bmFsIG1lc3NhZ2UgdHJhbnNhY3Rpb24gYW5kIHRvIHByb3ZpZGUgYWRkaXRpb25hbAogICAgICBp
bmZvcm1hdGlvbiB3aGljaCBtYXkgYmUgdXNlZnVsIHRvIGdhdGV3YXlzLgoKICAgICAgICAgIHBl
ci1tZXNzYWdlLWZpZWxkcyA9CiAgICAgICAgICAgICAgICAgICAgb3JpZ2luYWwtZW52ZWxvcGUt
aWQtZmllbGQgQ1JMRgogICAgICAgICAgICAgICAgICAgIHJlcG9ydGluZy1tdGEtZmllbGQgQ1JM
RgogICAgICAgICAgICAgICAgICAgIGFycml2YWwtZGF0ZSBDUkxGCiAgICAgICAgICAgICAgICAg
ICAgKiggZXh0ZW5zaW9uLWZpZWxkIENSTEYgKQoKCiAgICAgIDMuMi4xLiAgVGhlIE9yaWdpbmFs
LUVudmVsb3BlLUlkIGZpZWxkCgogICAgICAgICAgICAgIFRoZSBPcmlnaW5hbC1FbnZlbG9wZS1J
ZCBmaWVsZCBpcyBkZWZpbmVkIGFzIGluIHNlY3Rpb24KICAgICAgICAgMi4yLjEgb2YgW1JGQy1E
U04tU1RBVF0uICBUaGlzIGZpZWxkIGlzIFJFUVVJUkVELgoKICAgICAgMy4yLjIuICBUaGUgUmVw
b3J0aW5nLU1UQSBmaWVsZAoKICAgICAgICAgICAgICBUaGUgUmVwb3J0aW5nLU1UQSBmaWVsZCBp
cyBkZWZpbmVkIGFzIGluIHNlY3Rpb24gMi4yLjIKICAgICAgICAgb2YgW1JGQy1EU04tU1RBVF0u
ICBUaGlzIGZpZWxkIGlzIFJFUVVJUkVELgoKICAgICAgMy4yLjMuICBUaGUgQXJyaXZhbC1EYXRl
IGZpZWxkCgogICAgICAgICAgICAgIFRoZSBBcnJpdmFsLURhdGUgZmllbGQgaXMgZGVmaW5lZCBh
cyBpbiBzZWN0aW9uIDIuMi41IG9mCiAgICAgICAgIFtSRkMtRFNOLVNUQVRdLiAgVGhpcyBmaWVs
ZCBpcyBSRVFVSVJFRC4KCgogICAzLjMuICBQZXItUmVjaXBpZW50IE1UU04gZmllbGRzCgogICAg
ICAgICAgIEFuIE1UU04gY29udGFpbnMgaW5mb3JtYXRpb24gYWJvdXQgYXR0ZW1wdHMgdG8gZGVs
aXZlciBhCiAgICAgIG1lc3NhZ2UgdG8gb25lIG9yIG1vcmUgcmVjaXBpZW50cy4gIFRoZSBkZWxp
dmVyeSBpbmZvcm1hdGlvbiBmb3IKICAgICAgYW55IHBhcnRpY3VsYXIgcmVjaXBpZW50IGlzIGNv
bnRhaW5lZCBpbiBhIGdyb3VwIG9mIGNvbnRpZ3VvdXMKICAgICAgcGVyLXJlY2lwaWVudCBmaWVs
ZHMuICBFYWNoIGdyb3VwIG9mIHBlci1yZWNpcGllbnQgZmllbGRzIGlzCiAgICAgIHByZWNlZGVk
IGJ5IGEgYmxhbmsgbGluZS4KCiAgICAgICAgICAgVGhlIHN5bnRheCBmb3IgdGhlIGdyb3VwIG9m
IHBlci1yZWNpcGllbnQgZmllbGRzIGlzIGFzCiAgICAgIGZvbGxvd3M6CgogICAgICAgICAgcGVy
LXJlY2lwaWVudC1maWVsZHMgPQogICAgICAgICAgICAgICAgICAgIG9yaWdpbmFsLXJlY2lwaWVu
dC1maWVsZCBDUkxGCiAgICAgICAgICAgICAgICAgICAgZmluYWwtcmVjaXBpZW50LWZpZWxkIENS
TEYKICAgICAgICAgICAgICAgICAgICBhY3Rpb24tZmllbGQgQ1JMRgogICAgICAgICAgICAgICAg
ICAgIHN0YXR1cy1maWVsZCBDUkxGCiAgICAgICAgICAgICAgICAgICAgWyByZW1vdGUtbXRhLWZp
ZWxkIENSTEYgXQogICAgICAgICAgICAgICAgICAgIFsgbGFzdC1hdHRlbXB0LWRhdGUtZmllbGQg
Q1JMRiBdCiAgICAgICAgICAgICAgICAgICAgWyB3aWxsLXJldHJ5LXVudGlsLWZpZWxkIENSTEYg
XQogICAgICAgICAgICAgICAgICAgICooIGV4dGVuc2lvbi1maWVsZCBDUkxGICkKCgoKCkFsbG1h
biAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg
W1BhZ2UgNF0KDApJbnRlcm5ldCBEcmFmdCAgICAgICAgICBNZXNzYWdlL1RyYWNraW5nLVN0YXR1
cyAgICAgICBPY3RvYmVyIDIxLCAyMDAyCgoKICAgICAgMy4zLjEuICBPcmlnaW5hbC1SZWNpcGll
bnQgZmllbGQKCiAgICAgICAgICAgICAgVGhlIE9yaWdpbmFsLVJlY2lwaWVudCBmaWVsZCBpcyBk
ZWZpbmVkIGFzIGluIHNlY3Rpb24KICAgICAgICAgMi4zLjEgb2YgW1JGQy1EU04tU1RBVF0uICBU
aGlzIGZpZWxkIGlzIFJFUVVJUkVELgoKICAgICAgMy4zLjIuICBGaW5hbC1SZWNpcGllbnQgZmll
bGQKCiAgICAgICAgICAgICAgVGhlIHJlcXVpcmVkIEZpbmFsLVJlY2lwaWVudCBmaWVsZCBpcyBk
ZWZpbmVkIGFzIGluCiAgICAgICAgIHNlY3Rpb24gMi4zLjIgb2YgW1JGQy1EU04tU1RBVF0uICBU
aGlzIGZpZWxkIGlzIFJFUVVJUkVELgoKICAgICAgMy4zLjMuICBBY3Rpb24gZmllbGQKCiAgICAg
ICAgICAgICAgVGhlIHJlcXVpcmVkIEFjdGlvbiBmaWVsZCBpbmRpY2F0ZXMgdGhlIGFjdGlvbiBw
ZXJmb3JtZWQKICAgICAgICAgYnkgdGhlIFJlcG9ydGluZy1NVEEgYXMgYSByZXN1bHQgb2YgaXRz
IGF0dGVtcHQgdG8gZGVsaXZlcgogICAgICAgICB0aGUgbWVzc2FnZSB0byB0aGlzIHJlY2lwaWVu
dCBhZGRyZXNzLiAgVGhpcyBmaWVsZCBNVVNUIGJlCiAgICAgICAgIHByZXNlbnQgZm9yIGVhY2gg
cmVjaXBpZW50IG5hbWVkIGluIHRoZSBNVFNOLiAgVGhlIHN5bnRheCBpcwogICAgICAgICBhcyBk
ZWZpbmVkIGluIHNlY3Rpb24gMi4zLjMgb2YgUkZDIDE4OTQuICBUaGlzIGZpZWxkIGlzCiAgICAg
ICAgIFJFUVVJUkVELgoKICAgICAgICAgICAgICBWYWxpZCBhY3Rpb25zIGFyZToKCiAgICAgICAg
IGZhaWxlZCAgICAgICBUaGUgbWVzc2FnZSBjb3VsZCBub3QgYmUgZGVsaXZlcmVkLiAgSWYgRFNO
cwogICAgICAgICAgICAgICAgICAgICAgaGF2ZSBiZWVuIGVuYWJsZWQsIGEgImZhaWxlZCIgRFNO
IHNob3VsZCBhbHJlYWR5CiAgICAgICAgICAgICAgICAgICAgICBoYXZlIGJlZW4gcmV0dXJuZWQu
CgogICAgICAgICBkZWxheWVkICAgICAgVGhlIG1lc3NhZ2UgaXMgY3VycmVudGx5IHdhaXRpbmcg
aW4gdGhlIE1UQQogICAgICAgICAgICAgICAgICAgICAgcXVldWUgZm9yIGZ1dHVyZSBkZWxpdmVy
eS4gIEVzc2VudGlhbGx5LCB0aGlzCiAgICAgICAgICAgICAgICAgICAgICBhY3Rpb24gbWVhbnMg
InRoZSBtZXNzYWdlIGlzIGxvY2F0ZWQsIGFuZCBpdCBpcwogICAgICAgICAgICAgICAgICAgICAg
aGVyZS4iCgogICAgICAgICBkZWxpdmVyZWQgICAgVGhlIG1lc3NhZ2UgaGFzIGJlZW4gc3VjY2Vz
c2Z1bGx5IGRlbGl2ZXJlZCB0bwogICAgICAgICAgICAgICAgICAgICAgdGhlIGZpbmFsIHJlY2lw
aWVudC4gIFRoaXMgaW5jbHVkZXMgImRlbGl2ZXJ5IgogICAgICAgICAgICAgICAgICAgICAgdG8g
YSBtYWlsaW5nIGxpc3QgZXhwbG9kZXIuICBJdCBkb2VzIG5vdAogICAgICAgICAgICAgICAgICAg
ICAgaW5kaWNhdGUgdGhhdCB0aGUgbWVzc2FnZSBoYXMgYmVlbiByZWFkLiAgTm8KICAgICAgICAg
ICAgICAgICAgICAgIGZ1cnRoZXIgaW5mb3JtYXRpb24gaXMgYXZhaWxhYmxlOyBpbiBwYXJ0aWN1
bGFyLAogICAgICAgICAgICAgICAgICAgICAgdGhlIHRyYWNraW5nIGFnZW50IFNIT1VMRCBOT1Qg
YXR0ZW1wdCBmdXJ0aGVyCiAgICAgICAgICAgICAgICAgICAgICAiZG93bnN0cmVhbSIgdHJhY2tp
bmcgcmVxdWVzdHMuCgogICAgICAgICBleHBhbmRlZCAgICAgVGhlIG1lc3NhZ2UgaGFzIGJlZW4g
c3VjY2Vzc2Z1bGx5IGRlbGl2ZXJlZCB0bwogICAgICAgICAgICAgICAgICAgICAgdGhlIHJlY2lw
aWVudCBhZGRyZXNzIGFzIHNwZWNpZmllZCBieSB0aGUKICAgICAgICAgICAgICAgICAgICAgIHNl
bmRlciwgYW5kIGZvcndhcmRlZCBieSB0aGUgUmVwb3J0aW5nLU1UQQogICAgICAgICAgICAgICAg
ICAgICAgYmV5b25kIHRoYXQgZGVzdGluYXRpb24gdG8gbXVsdGlwbGUgYWRkaXRpb25hbAogICAg
ICAgICAgICAgICAgICAgICAgcmVjaXBpZW50IGFkZHJlc3Nlcy4gIEhvd2V2ZXIsIHRoZXNlIGFk
ZGl0aW9uYWwKICAgICAgICAgICAgICAgICAgICAgIGFkZHJlc3NlcyBhcmUgbm90IHRyYWNrYWJs
ZSwgYW5kIHRoZSB0cmFja2luZwogICAgICAgICAgICAgICAgICAgICAgYWdlbnQgU0hPVUxEIE5P
VCBhdHRlbXB0IGZ1cnRoZXIgImRvd25zdHJlYW0iCiAgICAgICAgICAgICAgICAgICAgICB0cmFj
a2luZyByZXF1ZXN0cy4KCiAgICAgICAgIHJlbGF5ZWQgICAgICBUaGUgbWVzc2FnZSBoYXMgYmVl
biBkZWxpdmVyZWQgaW50byBhbgogICAgICAgICAgICAgICAgICAgICAgZW52aXJvbm1lbnQgdGhh
dCBkb2VzIG5vdCBzdXBwb3J0IG1lc3NhZ2UKICAgICAgICAgICAgICAgICAgICAgIHRyYWNraW5n
LiAgTm8gZnVydGhlciBpbmZvcm1hdGlvbiBpcyBhdmFpbGFibGU7CiAgICAgICAgICAgICAgICAg
ICAgICBpbiBwYXJ0aWN1bGFyLCB0aGUgdHJhY2tpbmcgYWdlbnQgU0hPVUxEIE5PVAogICAgICAg
ICAgICAgICAgICAgICAgYXR0ZW1wdCBmdXJ0aGVyICJkb3duc3RyZWFtIiB0cmFja2luZyByZXF1
ZXN0cy4KCiAgICAgICAgIHRyYW5zZmVycmVkICBUaGUgbWVzc2FnZSBoYXMgYmVlbiB0cmFuc2Zl
cnJlZCB0byBhbm90aGVyCiAgICAgICAgICAgICAgICAgICAgICBNVFJLLWNvbXBsaWFudCBNVEEu
ICBUaGUgdHJhY2tpbmcgYWdlbnQgU0hPVUxECiAgICAgICAgICAgICAgICAgICAgICBhdHRlbXB0
IGZ1cnRoZXIgImRvd25zdHJlYW0iIHRyYWNraW5nIHJlcXVlc3RzCgoKQWxsbWFuICAgICAgICAg
ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBbUGFnZSA1XQoM
CkludGVybmV0IERyYWZ0ICAgICAgICAgIE1lc3NhZ2UvVHJhY2tpbmctU3RhdHVzICAgICAgIE9j
dG9iZXIgMjEsIDIwMDIKCgogICAgICAgICAgICAgICAgICAgICAgdW5sZXNzIHRoYXQgaW5mb3Jt
YXRpb24gaXMgYWxyZWFkeSBnaXZlbiBpbiBhCiAgICAgICAgICAgICAgICAgICAgICBjaGFpbmlu
ZyByZXNwb25zZS4KCiAgICAgICAgIG9wYXF1ZSAgICAgICBUaGUgbWVzc2FnZSBtYXkgb3IgbWF5
IG5vdCBoYXZlIGJlZW4gc2VlbiBieQogICAgICAgICAgICAgICAgICAgICAgdGhpcyBzeXN0ZW0u
ICBObyBmdXJ0aGVyIGluZm9ybWF0aW9uIGlzCiAgICAgICAgICAgICAgICAgICAgICBhdmFpbGFi
bGUgb3IgZm9ydGhjb21pbmcuCgogICAgICAgICAgICAgIFRoZXJlIG1heSBiZSBzb21lIGNvbmZ1
c2lvbiBiZXR3ZWVuIHdoZW4gdG8gdXNlCiAgICAgICAgICJleHBhbmRlZCIgdmVyc3VzICJkZWxp
dmVyZWQiLiAgV2hlbmV2ZXIgcG9zc2libGUsICJleHBhbmRlZCIKICAgICAgICAgc2hvdWxkIGJl
IHVzZWQgd2hlbiB0aGUgTVRBIGtub3dzIHRoYXQgdGhlIG1lc3NhZ2Ugd2lsbCBiZQogICAgICAg
ICBzZW50IHRvIG11bHRpcGxlIGFkZHJlc3Nlcy4gIEhvd2V2ZXIsIGluIHNvbWUgY2FzZXMgdGhl
CiAgICAgICAgIGRlbGl2ZXJ5IG9jY3VycyB0byBhIHByb2dyYW0gd2hpY2gsIHVua25vd24gdG8g
dGhlIE1UQSwKICAgICAgICAgY2F1c2VzIG1haWxpbmcgbGlzdCBleHBhbnNpb247IGluIHRoZSBl
eHRyZW1lIGNhc2UsIHRoZQogICAgICAgICBkZWxpdmVyeSBtYXkgYmUgdG8gYSByZWFsIG1haWxi
b3ggdGhhdCBoYXMgdGhlIHNpZGUgZWZmZWN0IG9mCiAgICAgICAgIGxpc3QgZXhwYW5zaW9uLiAg
SWYgdGhlIE1UQSBjYW5ub3QgZW5zdXJlIHRoYXQgdGhpcyBkZWxpdmVyeQogICAgICAgICB3aWxs
IGNhdXNlIGxpc3QgZXhwYW5zaW9uLCBpdCBzaG91bGQgc2V0IHRoZSBhY3Rpb24gdG8KICAgICAg
ICAgImRlbGl2ZXJlZCIuCgogICAgICAzLjMuNC4gIFN0YXR1cyBmaWVsZAoKICAgICAgICAgICAg
ICBUaGUgU3RhdHVzIGZpZWxkIGlzIGRlZmluZWQgYXMgaW4gUkZDIDE4OTQgc2VjdGlvbgogICAg
ICAgICAyLjMuNC4gIEEgbmV3IGNvZGUgaXMgYWRkZWQgdG8gUkZDIDE4OTMgW1JGQy1FTVNTQ10s
CiAgICAgICAgICJFbmhhbmNlZCBNYWlsIFN5c3RlbSBTdGF0dXMgQ29kZXMiLAoKICAgICAgICAg
ICAgIFguMS45ICAgTWVzc2FnZSByZWxheWVkIHRvIG5vbi1jb21wbGlhbnQgbWFpbGVyIgoKICAg
ICAgICAgICAgICAgICBUaGUgbWFpbGJveCBhZGRyZXNzIHNwZWNpZmllZCB3YXMgdmFsaWQsIGJ1
dCB0aGUKICAgICAgICAgICAgICAgICBtZXNzYWdlIGhhcyBiZWVuIHJlbGF5ZWQgdG8gYSBzeXN0
ZW0gdGhhdCBkb2VzIG5vdAogICAgICAgICAgICAgICAgIHNwZWFrIHRoaXMgcHJvdG9jb2w7IG5v
IGZ1cnRoZXIgaW5mb3JtYXRpb24gY2FuIGJlCiAgICAgICAgICAgICAgICAgcHJvdmlkZWQuCiAg
ICAgICAgIEEgMi4xLjkgU3RhdHVzIGZpZWxkIE1VU1QgYmUgdXNlZCBleGNsdXNpdmVseSB3aXRo
IGEKICAgICAgICAgInJlbGF5ZWQiIEFjdGlvbiBmaWVsZC4gIFRoaXMgZmllbGQgaXMgUkVRVUlS
RUQuCgogICAgICAzLjMuNS4gIFJlbW90ZS1NVEEgZmllbGQKCiAgICAgICAgICAgICAgVGhlIFJl
bW90ZS1NVEEgZmllbGQgaXMgZGVmaW5lZCBhcyBpbiBzZWN0aW9uIFJlZmVyZW5jZQogICAgICAg
ICAyLjMuNSBvZiBbUkZDLURTTi1TVEFUXS4gIFRoaXMgZmllbGQgTVVTVCBOT1QgYmUgaW5jbHVk
ZWQgaWYKICAgICAgICAgbm8gZGVsaXZlcnkgYXR0ZW1wdHMgaGF2ZSBiZWVuIG1hZGUgb3IgaWYg
dGhlIEFjdGlvbiBmaWVsZAogICAgICAgICBoYXMgdmFsdWUgIm9wYXF1ZSIuICBJZiBkZWxpdmVy
eSB0byBzb21lIGFnZW50IG90aGVyIHRoYW4gYW4KICAgICAgICAgTVRBIChmb3IgZXhhbXBsZSwg
YSBMb2NhbCBEZWxpdmVyeSBBZ2VudCkgdGhlbiB0aGlzIGZpZWxkIE1BWQogICAgICAgICBiZSBp
bmNsdWRlZCwgZ2l2aW5nIHRoZSBuYW1lIG9mIHRoZSBob3N0IG9uIHdoaWNoIHRoYXQgYWdlbnQK
ICAgICAgICAgd2FzIGNvbnRhY3RlZC4KCiAgICAgIDMuMy42LiAgTGFzdC1BdHRlbXB0LURhdGUg
ZmllbGQKCiAgICAgICAgICAgICAgVGhlIExhc3QtQXR0ZW1wdC1EYXRlIGZpZWxkIGlzIGRlZmlu
ZWQgYXMgaW4gc2VjdGlvbgogICAgICAgICBSZWZlcmVuY2UgMi4zLjcgb2YgW1JGQy1EU04tU1RB
VF0uICBUaGlzIGZpZWxkIGlzIFJFUVVJUkVEIGlmCiAgICAgICAgIGFueSBkZWxpdmVyeSBhdHRl
bXB0IGhhcyBiZWVuIG1hZGUgYW5kIHRoZSBBY3Rpb24gZmllbGQgZG9lcwogICAgICAgICBub3Qg
aGF2ZSB2YWx1ZSAib3BhcXVlIiwgaW4gd2hpY2ggY2FzZSBpdCB3aWxsIHNwZWNpZnkgd2hlbgog
ICAgICAgICBpdCBsYXN0IGF0dGVtcHRlZCB0byBkZWxpdmVyIHRoaXMgbWVzc2FnZSB0byBhbm90
aGVyIE1UQSBvcgogICAgICAgICBvdGhlciBEZWxpdmVyeSBBZ2VudC4gIFRoaXMgZmllbGQgTVVT
VCBOT1QgYmUgaW5jbHVkZWQgaWYgbm8KICAgICAgICAgZGVsaXZlcnkgYXR0ZW1wdHMgaGF2ZSBi
ZWVuIG1hZGUuCgoKCgoKCkFsbG1hbiAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg
ICAgICAgICAgICAgICAgICAgICAgW1BhZ2UgNl0KDApJbnRlcm5ldCBEcmFmdCAgICAgICAgICBN
ZXNzYWdlL1RyYWNraW5nLVN0YXR1cyAgICAgICBPY3RvYmVyIDIxLCAyMDAyCgoKICAgICAgMy4z
LjcuICBXaWxsLVJldHJ5LVVudGlsIGZpZWxkCgogICAgICAgICAgICAgIFRoZSBXaWxsLVJldHJ5
LVVudGlsIGZpZWxkIGlzIGRlZmluZWQgYXMgaW4gc2VjdGlvbgogICAgICAgICBSZWZlcmVuY2Ug
Mi4zLjggb2YgW1JGQy1EU04tU1RBVF0uICBJZiB0aGUgbWVzc2FnZSBpcyBub3QgaW4KICAgICAg
ICAgdGhlIGxvY2FsIHF1ZXVlIG9yIHRoZSBBY3Rpb24gZmllbGQgaGFzIHRoZSB2YWx1ZSBgYG9w
YXF1ZScnCiAgICAgICAgIHRoZSBXaWxsLVJldHJ5LVVudGlsIGZpZWxkIE1VU1QgTk9UIGJlIGlu
Y2x1ZGVkOyBvdGhlcndpc2UsCiAgICAgICAgIHRoaXMgZmllbGQgU0hPVUxEIGJlIGluY2x1ZGVk
LgoKICAgMy40LiAgRXh0ZW5zaW9uIGZpZWxkcwoKICAgICAgICAgICBGdXR1cmUgZXh0ZW5zaW9u
IGZpZWxkcyBtYXkgYmUgZGVmaW5lZCBhcyBkZWZpbmVkIGluCiAgICAgIHNlY3Rpb24gMi40IG9m
IFtSRkMtRFNOLVNUQVRdLgoKICAgMy41LiAgSW50ZXJhY3Rpb24gQmV0d2VlbiBNVEFzIGFuZCBM
REFzCgogICAgICAgICAgIEEgbWVzc2FnZSB0aGF0IGhhcyBiZWVuIGRlbGl2ZXJlZCB0byBhIExv
Y2FsIERlbGl2ZXJ5IEFnZW50CiAgICAgIChMREEpIHRoYXQgdW5kZXJzdGFuZHMgbWVzc2FnZSB0
cmFja2luZyAoaW4gcGFydGljdWxhciwgYW4gTERBCiAgICAgIHNwZWFraW5nIExNVFAgW1JGQy1M
TVRQXSB0aGF0IHN1cHBvcnRzIHRoZSBNVFJLIGV4dGVuc2lvbikKICAgICAgU0hPVUxEIHBhc3Mg
dGhlIHRyYWNraW5nIHJlcXVlc3QgdG8gdGhlIExEQS4gIEluIHRoaXMgY2FzZSwgdGhlCiAgICAg
IEFjdGlvbiBmaWVsZCBmb3IgdGhlIE1UQS0+TERBIGV4Y2hhbmdlIHdpbGwgbG9vayB0aGUgc2Ft
ZSBhcyBhCiAgICAgIHRyYW5zZmVyIHRvIGEgY29tcGxpYW50IE1UQTsgdGhhdCBpcywgYSAidHJh
bnNmZXJyZWQiIHRyYWNraW5nCiAgICAgIHN0YXR1cyB3aWxsIGJlIGlzc3VlZC4KCgo0LiAgU2Vj
dXJpdHkgQ29uc2lkZXJhdGlvbnMKCiAgIDQuMS4gIEZvcmdlcnkKCiAgICAgICAgICAgTWFsaWNp
b3VzIHNlcnZlcnMgbWF5IGF0dGVtcHQgdG8gc3VidmVydCBtZXNzYWdlIHRyYWNraW5nCiAgICAg
IGFuZCByZXR1cm4gZmFsc2UgaW5mb3JtYXRpb24uICBUaGlzIGNvdWxkIHJlc3VsdCBpbiBtaXNk
aXJlY3Rpb24KICAgICAgb3IgbWlzaW50ZXJwcmV0YXRpb24gb2YgcmVzdWx0cy4KCiAgIDQuMi4g
IENvbmZpZGVudGlhbGl0eQoKICAgICAgICAgICBBbm90aGVyIGRpbWVuc2lvbiBvZiBzZWN1cml0
eSBpcyBjb25maWRlbnRpYWxpdHkuICBUaGVyZQogICAgICBtYXkgYmUgY2FzZXMgaW4gd2hpY2gg
YSBtZXNzYWdlIHJlY2lwaWVudCBpcyBhdXRvZm9yd2FyZGluZwogICAgICBtZXNzYWdlcyBidXQg
ZG9lcyBub3Qgd2lzaCB0byBkaXZ1bGdlIHRoZSBhZGRyZXNzIHRvIHdoaWNoIHRoZQogICAgICBt
ZXNzYWdlcyBhcmUgYXV0b2ZvcndhcmRlZC4gIFRoZSBkZXNpcmUgZm9yIHN1Y2ggY29uZmlkZW50
aWFsaXR5CiAgICAgIHdpbGwgcHJvYmFibHkgYmUgaGVpZ2h0ZW5lZCBhcyAid2lyZWxlc3MgbWFp
bGJveGVzIiwgc3VjaCBhcwogICAgICBwYWdlcnMsIGJlY29tZSBtb3JlIHdpZGVseSB1c2VkIGFz
IGF1dG9mb3J3YXJkIGFkZHJlc3Nlcy4KCiAgICAgICAgICAgTVRBIGF1dGhvcnMgYXJlIGVuY291
cmFnZWQgdG8gcHJvdmlkZSBhIG1lY2hhbmlzbSB3aGljaAogICAgICBlbmFibGVzIHRoZSBlbmQg
dXNlciB0byBwcmVzZXJ2ZSB0aGUgY29uZmlkZW50aWFsaXR5IG9mIGEKICAgICAgZm9yd2FyZGlu
ZyBhZGRyZXNzLiAgRGVwZW5kaW5nIG9uIHRoZSBkZWdyZWUgb2YgY29uZmlkZW50aWFsaXR5CiAg
ICAgIHJlcXVpcmVkLCBhbmQgdGhlIG5hdHVyZSBvZiB0aGUgZW52aXJvbm1lbnQgdG8gd2hpY2gg
YSBtZXNzYWdlCiAgICAgIHdlcmUgYmVpbmcgZm9yd2FyZGVkLCB0aGlzIG1pZ2h0IGJlIGFjY29t
cGxpc2hlZCBieSBvbmUgb3IgbW9yZQogICAgICBvZjoKCiAgICAgIChhKSAgcmVzcG9uZCB3aXRo
IGEgInJlbGF5ZWQiIHRyYWNraW5nIHN0YXR1cyB3aGVuIGEgbWVzc2FnZSBpcwogICAgICAgICAg
IGZvcndhcmRlZCB0byBhIGNvbmZpZGVudGlhbCBmb3J3YXJkaW5nIGFkZHJlc3MsIGFuZAogICAg
ICAgICAgIGRpc2FibGluZyBmdXJ0aGVyIG1lc3NhZ2UgdHJhY2tpbmcgcmVxdWVzdHMuCgogICAg
ICAoYikgIGRlY2xhcmluZyB0aGUgbWVzc2FnZSB0byBiZSBkZWxpdmVyZWQsIGlzc3VpbmcgYQog
ICAgICAgICAgICJkZWxpdmVyZWQiIHRyYWNraW5nIHN0YXR1cywgcmUtc2VuZGluZyB0aGUgbWVz
c2FnZSB0byB0aGUKICAgICAgICAgICBjb25maWRlbnRpYWwgZm9yd2FyZGluZyBhZGRyZXNzLCBh
bmQgZGlzYWJsaW5nIGZ1cnRoZXIKICAgICAgICAgICBtZXNzYWdlIHRyYWNraW5nIHJlcXVlc3Rz
LgoKCkFsbG1hbiAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg
ICAgICAgICAgW1BhZ2UgN10KDApJbnRlcm5ldCBEcmFmdCAgICAgICAgICBNZXNzYWdlL1RyYWNr
aW5nLVN0YXR1cyAgICAgICBPY3RvYmVyIDIxLCAyMDAyCgoKICAgICAgICAgICBUaGUgdHJhY2tp
bmcgYWxnb3JpdGhtcyBNVVNUIE5PVCBhbGxvdyB0cmFja2luZyB0aHJvdWdoCiAgICAgIGxpc3Qg
ZXhwYW5zaW9ucy4gIFdoZW4gYSBtZXNzYWdlIGlzIGRlbGl2ZXJlZCB0byBhIGxpc3QsIGEKICAg
ICAgdHJhY2tpbmcgcmVxdWVzdCBNVVNUIHJlc3BvbmQgd2l0aCBhbiAiZXhwYW5kZWQiIHRyYWNr
aW5nIHN0YXR1cwogICAgICBhbmQgTVVTVCBOT1QgZGlzcGxheSB0aGUgY29udGVudHMgb2YgdGhl
IGxpc3QuCgoKNS4gIElBTkEgQ29uc2lkZXJhdGlvbnMKCiAgICAgICAgSUFOQSBpcyB0byByZWdp
c3RlciB0aGUgU01UUCBleHRlbnNpb24gZGVmaW5lZCBpbiBzZWN0aW9uIDMuCgoKNi4gIEFja25v
d2xlZGdlbWVudHMKCiAgICAgICAgU2V2ZXJhbCBpbmRpdmlkdWFscyBoYXZlIGNvbW1lbnRlZCBv
biBhbmQgZW5oYW5jZWQgdGhpcyBkcmFmdCwKICAgaW5jbHVkaW5nIFRvbnkgSGFuc2VuLCBQaGls
aXAgSGF6ZWwsIEFsZXhleSBNZWxuaWtvdiwgTHluZG9uCiAgIE5lcmVuYmVyZywgQ2hyaXMgTmV3
bWFuLCBHcmVnb3J5IE5laWwgU2hhcGlybywgYW5kIERhbiBXaW5nLgoKCjcuICBOb3JtYXRpdmUg
UmVmZXJlbmNlcwoKICAgW0RSQUZULU1UUkstTU9ERUxdCiAgICAgICAgVC4gSGFuc2VuLCBgYE1l
c3NhZ2UgVHJhY2tpbmcgTW9kZWwgYW5kIFJlcXVpcmVtZW50cy4nJwogICAgICAgIGRyYWZ0LWll
dGYtbXNndHJrLW1vZGVsLTAzLnR4dC4gIE5vdmVtYmVyIDIwMDAuCgogICBbRFJBRlQtTVRSSy1N
VFFQXQogICAgICAgIFQuIEhhbnNlbiwgYGBNZXNzYWdlIFRyYWNraW5nIFF1ZXJ5IFByb3RvY29s
LicnICBkcmFmdC1pZXRmLQogICAgICAgIG1zZ3Ryay1tdHFwLTAxLnR4dC4gIE5vdmVtYmVyIDIw
MDAuCgogICBbRFJBRlQtTVRSSy1TTVRQRVhUXQogICAgICAgIEUuIEFsbG1hbiwgYGBTTVRQIFNl
cnZpY2UgRXh0ZW5zaW9uIGZvciBNZXNzYWdlIFRyYWNraW5nLicnCiAgICAgICAgZHJhZnQtaWV0
Zi1tc2d0cmstc210cGV4dC0wNC50eHQuICBPY3RvYmVyIDIwMDIuCgogICBbUkZDLUFCTkZdCiAg
ICAgICAgQ3JvY2tlciwgRC4sIEVkaXRvciwgYW5kIFAuIE92ZXJlbGwsIGBgQXVnbWVudGVkIEJO
RiBmb3IKICAgICAgICBTeW50YXggU3BlY2lmaWNhdGlvbnM6IEFCTkYnJywgUkZDIDIyMzQsIE5v
dmVtYmVyIDE5OTcuCgogICBbUkZDLUVNU1NDXQogICAgICAgIEcuIFZhdWRyZXVpbCwgYGBFbmhh
bmNlZCBNYWlsIFN5c3RlbSBTdGF0dXMgQ29kZXMuJycgIFJGQwogICAgICAgIDE4OTMuICBKYW51
YXJ5IDE5OTYuCgogICBbUkZDLUhPU1RSRVFdCiAgICAgICAgUi4gQnJhZGVuIChlZC4pLCBgYFJl
cXVpcmVtZW50cyBmb3IgSW50ZXJuZXQgSG9zdHMgLS0KICAgICAgICBBcHBsaWNhdGlvbiBhbmQg
U3VwcG9ydC4nJyAgU1REIDMsIFJGQyAxMTIzLiAgT2N0b2JlciAxOTg5LgoKICAgW1JGQy1LRVlX
T1JEU10KICAgICAgICBTLiBCcmFkbmVyLCBgYEtleSB3b3JkcyBmb3IgdXNlIGluIFJGQ3MgdG8g
SW5kaWNhdGUKICAgICAgICBSZXF1aXJlbWVudCBMZXZlbHMuJycgIFJGQyAyMTE5LiAgTWFyY2gg
MTk5Ny4KCiAgIFtSRkMtTUlNRV0KICAgICAgICBOLiBGcmVlZCBhbmQgTi4gQm9yZW5zdGVpbiwg
YGBNdWx0aXB1cnBvc2UgSW50ZXJuZXQgTWFpbAogICAgICAgIEV4dGVuc2lvbnMgKE1JTUUpIFBh
cnQgT25lOiBGb3JtYXQgb2YgSW50ZXJuZXQgTWVzc2FnZQogICAgICAgIEJvZGllcy4nJyAgUkZD
IDIwNDUuICBOb3ZlbWJlciAxOTk2LgoKICAgW1JGQy1NU0dGTVRdCiAgICAgICAgUC4gUmVzbmlj
aywgZWRpdG9yLCBgYEludGVybmV0IE1lc3NhZ2UgRm9ybWF0LicnICBSRkMgMjgyMi4KICAgICAg
ICBBcHJpbCAyMDAxLgoKCkFsbG1hbiAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg
ICAgICAgICAgICAgICAgICAgICAgW1BhZ2UgOF0KDApJbnRlcm5ldCBEcmFmdCAgICAgICAgICBN
ZXNzYWdlL1RyYWNraW5nLVN0YXR1cyAgICAgICBPY3RvYmVyIDIxLCAyMDAyCgoKICAgW1JGQy1S
RUxBVEVEXQogICAgICAgIEUuIExldmluc29uLCBgYFRoZSBNSU1FIE11bHRpcGFydC9SZWxhdGVk
IENvbnRlbnQtdHlwZS4nJyAgUkZDCiAgICAgICAgMjM4Ny4gIEF1Z3VzdCAxOTk4LgoKCjguICBJ
bmZvcm1hdGlvbmFsIFJlZmVyZW5jZXMKCiAgIFtSRkMtRFNOLVNNVFBdCiAgICAgICAgSy4gTW9v
cmUsIGBgU01UUCBTZXJ2aWNlIEV4dGVuc2lvbiBmb3IgRGVsaXZlcnkgU3RhdHVzCiAgICAgICAg
Tm90aWZpY2F0aW9ucy4nJyAgUkZDIDE4OTEuICBKYW51YXJ5IDE5OTYuCgogICBbUkZDLURTTi1T
VEFUXQogICAgICAgIEsuIE1vb3JlIGFuZCBHLiBWYXVkcmV1aWwsIGBgQW4gRXh0ZW5zaWJsZSBN
ZXNzYWdlIEZvcm1hdCBmb3IKICAgICAgICBEZWxpdmVyeSBTdGF0dXMgTm90aWZpY2F0aW9ucy4n
JyAgUkZDIDE4OTQuICBKYW51YXJ5IDE5OTYuCgogICBbUkZDLUVTTVRQXQogICAgICAgIFJvc2Us
IE0uLCBTdGVmZmVydWQsIEUuLCBDcm9ja2VyLCBELiwgS2xlbnNpbiwgSi4gYW5kIE4uCiAgICAg
ICAgRnJlZWQsIGBgU01UUCBTZXJ2aWNlIEV4dGVuc2lvbnMuJycgIFNURCAxMCwgUkZDIDE4Njku
CiAgICAgICAgTm92ZW1iZXIgMTk5NS4KCiAgIFtSRkMtTE1UUF0KICAgICAgICBKLiBNeWVycywg
YGBMb2NhbCBNYWlsIFRyYW5zZmVyIFByb3RvY29sLicnICBSRkMgMjAzMy4KICAgICAgICBPY3Rv
YmVyIDE5OTYuCgogICBbUkZDLU1ETl0KICAgICAgICBSLiBGYWptYW4sIGBgQW4gRXh0ZW5zaWJs
ZSBNZXNzYWdlIEZvcm1hdCBmb3IgTWVzc2FnZQogICAgICAgIERpc3Bvc2l0aW9uIE5vdGlmaWNh
dGlvbnMuJycgIFJGQyAyMjk4LiAgTWFyY2ggMTk5OC4KCgo5LiAgQXV0aG9yJ3MgQWRkcmVzcwoK
ICAgICAgIEVyaWMgQWxsbWFuCiAgICAgICBTZW5kbWFpbCwgSW5jLgogICAgICAgNjQyNSBDaHJp
c3RpZSBBdmUsIDR0aCBGbG9vcgogICAgICAgRW1lcnl2aWxsZSwgQ0EgIDk0NjA4CiAgICAgICBV
LlMuQS4KCiAgICAgICBFLU1haWw6IGVyaWNAU2VuZG1haWwuQ09NCiAgICAgICBQaG9uZTogKzEg
NTEwIDU5NCA1NTAxCiAgICAgICBGYXg6ICsxIDUxMCA1OTQgNTQyOQoKCgoKCgoKCgoKCgoKCgoK
CgpBbGxtYW4gICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg
ICAgICAgIFtQYWdlIDldCgw=

--==========41585900==========--



From owner-ietf-msgtrk@mail.imc.org  Thu Oct 24 22:16:05 2002
Received: from above.proper.com (mail.proper.com [208.184.76.45])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id WAA00281
	for <msgtrk-archive@lists.ietf.org>; Thu, 24 Oct 2002 22:16:03 -0400 (EDT)
Received: (from majordomo@localhost)
	by above.proper.com (8.11.6/8.11.3) id g9P2EFU15268
	for ietf-msgtrk-bks; Thu, 24 Oct 2002 19:14:15 -0700 (PDT)
Received: from kcmso2.proxy.att.com (kcmso2.att.com [192.128.134.71])
	by above.proper.com (8.11.6/8.11.3) with ESMTP id g9P2EDW15264
	for <ietf-msgtrk@imc.org>; Thu, 24 Oct 2002 19:14:13 -0700 (PDT)
Received: from maillennium.att.com ([135.25.114.99])
	by kcmso2.proxy.att.com (AT&T IPNS/MSO-4.0) with ESMTP id g9P2EBPY019429
	for <ietf-msgtrk@imc.org>; Thu, 24 Oct 2002 21:14:12 -0500 (CDT)
Received: from att.com (<unknown.domain>[135.210.32.147])
          by maillennium.att.com (mailgw1) with SMTP
          id <20021025021404gw100s00bre>
          (Authid: tony);
          Fri, 25 Oct 2002 02:14:04 +0000
Message-ID: <3DB8A912.3080302@att.com>
Date: Thu, 24 Oct 2002 22:14:42 -0400
From: Tony Hansen <tony@att.com>
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1)
X-Accept-Language: en-us, en
MIME-Version: 1.0
To: ned.freed@mrochek.com
CC: ietf-msgtrk@imc.org, paf@cisco.com
Subject: Re: AD review of msgtrk documents
References: <01KLJKQFSLGK0001B1@mauve.mrochek.com> <41569037.1035366856@[10.210.202.76]>
In-Reply-To: <01KLJKQFSLGK0001B1@mauve.mrochek.com>
Content-Type: multipart/mixed;
 boundary="------------000504090201090608090708"
Sender: owner-ietf-msgtrk@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-msgtrk/mail-archive/>
List-ID: <ietf-msgtrk.imc.org>
List-Unsubscribe: <mailto:ietf-msgtrk-request@imc.org?body=unsubscribe>


This is a multi-part message in MIME format.
--------------000504090201090608090708
Content-Type: text/plain; charset=us-ascii; format=flowed
Content-Transfer-Encoding: 7bit

ditto for model-07 and mtqp-09

	Tony

Eric Allman wrote:

> Ned, et al,
>
> Enclosed is the update of smtpext-03 and trkstat-03 per your
> comments.  These are still in "draft" format; please let me know if
> you want me to update them to "RFC" format.
>
> eric


--------------000504090201090608090708
Content-Type: text/plain;
 name="draft-ietf-msgtrk-model-07.txt"
Content-Disposition: inline;
 filename="draft-ietf-msgtrk-model-07.txt"
Content-Transfer-Encoding: quoted-printable







Internet Draft                                                 T. Hansen
draft-ietf-msgtrk-model-07.txt                         AT&T Laboratories
Valid for six months                                    October 24, 2002



                Message Tracking Model and Requirements

                    <draft-ietf-msgtrk-model-07.txt>

                         Authors' version: 1.20

     Status of this Memo

     This document is an Internet-Draft and is in full conformance with
all provisions of Section 10 of RFC2026.

     Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups.  Note that other
groups may also distribute working documents as Internet-Drafts.

     Internet-Drafts are draft documents valid for a maximum of six
months and may be updated, replaced, or obsoleted by other documents at
any time.  It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."

     The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt.

     The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html.

     This memo and its companions are discussed on the MSGTRK working
group mailing list, ietf-msgtrk@imc.org.  To subscribe, send a message
with the word "subscribe" in the body (on a line by itself) to the
address ietf-msgtrk-request@imc.org.  An archive of the mailing list may
be found at http://www.ietf.org/archive/msgtrk.

Copyright Notice

     Copyright (C) The Internet Society (%Dy%).  All Rights Reserved.

Abstract

     Customers buying enterprise message systems often ask: Can I track
the messages?  Message tracking is the ability to find out the path that
a particular message has taken through a messaging system and the
current routing status of that message.  This document provides a model



Hansen                                                          [Page 1]
=0C
Internet Draft  Message Tracking Model and Requirements October 24, 2002


of message tracking that can be used for understanding the Internet-wide
message infrastructure and to further enhance those capabilities to
include message tracking, as well as requirements for proposed message
tracking solutions.

1.  Problem Statement

     Consider sending a package through a package delivery company.
Once you've sent a package, you would like to be able to find out if the
package has been delivered or not, and if not, where that package
currently is and what its status is.  Note that the status of a package
may not include whether it was delivered to its addressee, but just the
destination.  Many package carriers provide such services today, often
via a web interface.

     Message tracking extends that capability to the Internet-wide mes-
sage infrastructure, analogous to the service provided by package car-
riers:  the ability to quickly locate where a message (package) is, and
to determine whether or not the message (package) has been delivered to
its final destination.  An Internet-standard approach will allow the
development of message tracking applications that can operate in a
multi-vendor messaging environment, and will encourage the operation of
the function across administrative boundaries.

     The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED",  "MAY", and "OPTIONAL" in this
document are to be interpreted as described in RFC 2119 [RFC-KEYWORDS].

2.  Definitions
The following terms are relevant to message tracking.  The terms Track-
ing User Agent and Tracking Server are new, while all other terms have
been collected here from other sources.

     Originating Mail User Agent (MUA)
               The originating mail user agent is the software used to
               compose and originate a message.  It is the software sit-
               ting on a person's desktop.

     Originating Mail Submission Agent (MSA)
               The Mail Submission Agent accepts a message from a User
               Agent, adds or modifies it as required for Internet stan-
               dards and/or site policy, and injects the message into
               the network.  The MSA may be the initial MTA or may hand
               off the message to an MTA.

     Message Transfer Agent (MTA)
               A Message Transfer Agent accepts a message and moves it
               forward towards its destination.  That destination may be



Hansen                                                          [Page 2]
=0C
Internet Draft  Message Tracking Model and Requirements October 24, 2002


               local or reached via another MTA.  It may use a local
               queue to store the message before transferring it
               further.  Any MTA may generate a Non-Delivery Notifica-
               tion.

     Intermediate Message Transfer Agent (MTA)
               An Intermediate MTA is an MTA that accepts a message for
               transfer somewhere else.

     Final Message Transfer Agent (MTA)
               A Final MTA is an MTA that accepts a message for local
               delivery.  It is the final place that a message is
               accepted.  The final MTA is what sends any Delivery
               Status Notifications (DSNs).  (Intermediate MTA's may
               also send a DSN if it relays to a non-DSN aware MTA.)

     Foreign Message Transfer Agent
               A foreign MTA provides delivery of messages using other
               protocols than those specified for Internet mail, such as
               an X.400 mail system.

     Gateway Message Transfer Agent (GW-MTA)
               A gateway MTA accepts a message for transfer to a foreign
               MTA outside of the Internet protocol space.

     Local Delivery Agent (LDA)
               The local Delivery Agent delivers the message to the
               local message store.  (The MTA and LDA are often combined
               into the same program.)

     Delivery Status Notification (DSN)
               A Delivery Status Notification [RFC-DSN] is produced by
               an MTA when a message is unsuccessfully delivered, either
               to its next hop or the final message store, or when it is
               successfully delivered, either to a foreign MTA, to a
               local delivery agent, or a non-DSN aware MTA.  Positive
               notifications are only performed [RFC-ESMTP-DSN] when
               specifically requested.

     Non-Delivery Notification (NDN)
               A non-delivery notification is a special form of DSN
               indicating unsuccessful delivery.

     Message Disposition Notification (MDN)
               A Message Disposition Notification is used to report the
               disposition of a message after it has been successfully
               delivered to a recipient.




Hansen                                                          [Page 3]
=0C
Internet Draft  Message Tracking Model and Requirements October 24, 2002


     Tracking User Agent (TUA)
               A tracking user agent wants to find information on a mes-
               sage on the behalf of a user.  It is the requestor or
               initiator of such a request.  (The MUA and TUA could be
               combined into the same program.)

     Tracking Server
               A tracking server provides tracking information to a
               tracking client.  It is the repository of the information
               about a message for the traversal through a particular
               MTA.  (The tracking server and MTA may run on the same
               system.)

3.  Entities

     The entities involved in message tracking are:  message user
agents, message submission agents, message transfer agents, tracking
user agents and tracking servers.

4.  Requirements

     These are requirements that any message tracking solution must be
able to satisfy:

     The message tracking solution:

     **   MUST scale to the internet.

     **   MUST be easy to deploy.

     **   SHOULD maximize the reuse of existing, already deployed tech-
          nology and infrastructure.

     **   If possible, SHOULD extend existing protocols and not invent
          new ones.

     **   SHOULD have a low implementation cost.  (This makes it easy to
          incorporate into existing products.)

     **   MUST restrict tracking of a message to the originator of the
          message (or a delegate).

     **   MUST be able to do authentication.

     **   MAY allow an originator to delegate this responsibility to a
          third party.

     **   SHOULD have the property that they would allow per-message



Hansen                                                          [Page 4]
=0C
Internet Draft  Message Tracking Model and Requirements October 24, 2002


          delegation of the tracking responsibility.

     **   MUST require a tracking user agent to prove that they are per-
          mitted to request the tracking information.

     **   MUST be able to uniquely identify messages.

     **   MUST require every message to have unique identification.

5.  Interaction Models

     There are several models by which tracking of messages can be
enabled, by which messages can be tracked, and by which information can
be requested and gathered.

5.1.  Tracking Enabling Models

     Either the envelope or message header must contain enough informa-
tion to track a message and securely retrieve information about the mes-
sage.  Any message that does not have enough information to track it is
by definition not trackable.

     If there is not enough information available in current standard
envelopes or message headers, then the current standards will need to be
extended.  Either the MUA or MSA must determine the additional informa-
tion and enable the tracking by adding the additional information to
either the envelope or header.

     This leads to two tracking enabling models:  passive enabling and
active enabling.

5.1.1.  Passive Enabling Model
The "passive enabling" model assumes that there is sufficient informa-
tion available.  No UA or MSA interaction occurs to turn tracking on; it
is on by default.

5.1.2.  Active Enabling Model

     The "active  enabling" model requires that the MUA and MSA exchange
information when the message is submitted.  This exchange indicates that
logging of the message's traversal should be performed, as well as pro-
viding enough additional information to allow the message to be tracked.
This information will need to be passed on to subsequent MTAs as needed.

5.2.  Tracking Request Models
There are several models by which tracking information may be requested.





Hansen                                                          [Page 5]
=0C
Internet Draft  Message Tracking Model and Requirements October 24, 2002


5.2.1.  Passive Request Model

     The "passive request" model requires active enabling to indicate
that some form of tracking is to be performed.  The tracking information
can be sent back immediately (as a form of telemetry) or sent to a 3rd
party for later retrieval.

5.2.2.  Passive Request Tracking Information

     Forms of passive tracking information that could potentially be
requested are  as  follows.  Note that mechanisms already exist for
requesting the information marked with a (+).  The references for such
mechanisms are listed at the end of each such entry.

     **   send a DSN of a message arriving at an intermediate MTA

     **   (+) send a DSN of a message being rejected while at an inter-
          mediate MTA [RFC-DSN]

     **   (+) send a DSN of a message leaving an intermediate MTA and
          going to another MTA [RFC-DELIVER-BY]

     **   send a DSN of a message arriving at a final MTA

     **   (+) send a DSN of a message being rejected while at a final
          MTA [RFC-DSN]

     **   (+) send a DSN of a message being delivered to a user's mes-
          sage store [RFC-DSN]

     **   (+) send a DSN of a message being delivered to a foreign MTA
          [RFC-DSN]

     **   (+) send an MDN of a message being read by an end user [RFC-
          MDN]

5.3.  Active Request Model

     The "active request" model requires an active query by a user's
user agent to the MSA, intermediate MTAs and final MTA, or to a third
party, to find the message's status as known by that MTA.  Active
request will work with either passive enabling or active enabling.

5.3.1.  Server Chaining vs. Server Referrals
When a tracking server has been asked for tracking information, and the
message has been passed on to another MTA of which this tracking server
has no tracking knowledge, there are two modelling choices:




Hansen                                                          [Page 6]
=0C
Internet Draft  Message Tracking Model and Requirements October 24, 2002


     **   the first tracking server will contact the next tracking
          server to query for status and pass back the combined status
          (server chaining), or

     **   the first tracking server will return the address of the next
          MTA and the tracking client has the responsibility of contact-
          ing the next tracking server (server referrals).

5.3.2.  Active Request Tracking Information
Forms of active tracking information that could potentially be requested
are as follows.  (Note that no mechanisms currently exist for requesting
such information.)

     **   the message has been queued for later delivery

     **   the message was delivered locally

     **   the message was delivered to another MTA,

     **   the message was delivered to a foreign MTA

     **   ask a different tracking server,

     **   I know but can't tell you,

     **   I don't know.

5.4.  Combining DSN and MDN Information with Message Tracking Informa-
tion

     The information that would be retrieved by message tracking and the
information that is returned for DSN and MDN requests all attempt to
answer the question of "what happened to message XX"?  The information
provided by each is complementary in nature, but similar.  A tracking
user agent could use all three possible information  sources  to present
a total view of the status of a message.

     Both DSN and MDN notifications utilize the formats defined by RFC
1892 [RFC-REPORT].  This suggests that the information returned by mes-
sage tracking solutions should also be similar.

6.  Security Considerations


6.1.  Security Considerations Summary

     Security vulnerabilities are detailed in [DRAFT-MTRK-ESMTP],
[DRAFT-MTRK-TSN] and [DRAFT-MTRK-MTQP].  These consideratons include:



Hansen                                                          [Page 7]
=0C
Internet Draft  Message Tracking Model and Requirements October 24, 2002


     **   vulnerability to snooping or replay attacks when using unen-
          crypted sessions

     **   a dependency on the randomness of the per-message secret

     **   reliance on TLS

     **   man-in-the-middle attacks

     **   reliance on the server maintaining the security level when it
          performs chaining

     **   denial of service

     **   confidentiality concerns

     **   forgery by malicious servers

6.2.  Message Identification and Authentication

     This is a security model for message identification and authentica-
tion that could be deployed.  (There may be others.)

     A Tracking User Agent must prove that they are permitted to request
tracking information about a message.  Every [RFC-822]-compliant message
is supposed to contain a Message-Id header.  One possible mechanism is
for the originator to calculate a one-way hash A from the message ID +
time stamp + a per-user secret.  The user then calculates another one-
way hash B to be the hash of A.  The user includes B in the submitted
message, and retains A.  Later, when the user makes a message tracking
request to the messaging system or tracking entity, it submits A in the
tracking request.  The entity receiving the tracking request then uses A
to calculate B, since it was already provided B, verifying that the
requestor is authentic.  In summary,

     A =3D H(message ID + time stamp + secret)

     B =3D H(A)

Another possible mechanism for A is to ignore the message ID and time
stamp and just use a one-way hash from a large (>128 bits) random
number.  B would be calculated as before.  In summary,

     A =3D H(large-random-number)

     B =3D H(A)

This is similar in technique to the methods used for One-Time Passwords



Hansen                                                          [Page 8]
=0C
Internet Draft  Message Tracking Model and Requirements October 24, 2002


[RFC-OTP].  The success of these techniques is dependent on the random-
ness of the per-user secret or the large random number, which can be
incredibly difficult in some environments.

     If the originator of a message were to delegate his or her tracking
request to a third party by sending it A, this would be vulnerable to
snooping over unencrypted sessions.  The user can decide on a message-
by-message basis if this risk is acceptable.

7.  Informational References


     [RFC-822] Crocker, D., "Standard for the Format of ARPA Internet
               Text Messages", STD 11, RFC 822, UDEL, August 1982.

     [RFC-DELIVER-BY]
               Newman, D., "Deliver By SMTP Service Extension", draft-
               newman-deliver-02.txt, Innosoft, January 1999.

     [RFC-DSN] Moore, K., and G. Vaudreuil, "An Extensible Message For-
               mat for Delivery Status Notifications", RFC 1894, Univer-
               sity of Tennessee, Octel Network Services, January 1996.

     [RFC-ESMTP-DSN]
               Moore, K., "SMTP Service Extension for Delivery Status
               Notifications", RFC 1891, University of Tennessee, Janu-
               ary 1996.

     [RFC-KEYWORDS]
               Bradner, S., "Key words for use in RFCs to Indicate
               Requirement Levels", RFC 2119, Harvard University, March
               1997.

     [RFC-MDN] Fajman, R., "An Extensible Message Format for Message
               Disposition Notifications", RFC 2298, National Institutes
               of Health, March 1998.

     [RFC-OTP] Haller, N., Metz, C., Nesser, P., Straw, M., "A One-Time
               Password System", RFC 2289, Bellcore, Kaman Sciences Cor-
               poration, Nesser & Nesser Consulting, Bellcore, February
               1998.

     [RFC-REPORT]
               Vaudreuil, G., "The Multipart/Report Content Type for the
               Reporting of Mail System Administrative Messages", RFC
               1892, Octel Network Services, January 1996.

     [RFC-SMTP]Postel, J., "Simple Mail Transfer Protocol", STD 10, RFC



Hansen                                                          [Page 9]
=0C
Internet Draft  Message Tracking Model and Requirements October 24, 2002


               821, USC/Information Sciences Institute, August 1982.

     [DRAFT-MTRK-ESMTP]
               draft-ietf-msgtrk-smtpext-*.txt, E. Allman, T. Hansen,
               "SMTP Service Extension for Message Tracking", Sendmail,
               Inc., AT&T Laboratories, TBD 2002.

     [DRAFT-MTRK-TSN]
               draft-ietf-msgtrk-trkstat-*.txt, E. Allman, "The
               Message/Tracking-Status MIME Extension", Sendmail, Inc.,
               TBD 2002.

     [DRAFT-MTRK-MTQP]
               draft-ietf-msgtrk-mtqp-01.txt T. Hansen, "Message Track-
               ing Query Protocol", TBD 2000.

8.  Acknowledgements

     This document is the product of input from many people and many
sources, including all of the members of the Message Tracking Working
Group, including Philip Hazel, Alexey Melnikov, Lyndon Nerenberg, Chris
Newman, and Gregory Neil Shapiro.  It owes much to earlier work by Gor-
don Jones, Bruce Ernst and Greg Vaudreuil.  In particular, I'd like to
also thank Ken Lin for his considerable contributions to the early
drafts.

9.  Authors' Addresses
     Tony Hansen
     AT&T Laboratories
     Middletown, NJ 07748
     USA

     Phone: +1.732.420.8934
     E-Mail: tony@att.com

10.  Full Copyright Statement

     Copyright (C) The Internet Society (%Dy%).  All Rights Reserved.

     This document and translations of it may be copied and furnished to
others, and derivative works that comment on or otherwise explain it or
assist in its implementation may be prepared, copied, published and dis-
tributed, in whole or in part, without restriction of any kind, provided
that the above copyright notice and this paragraph are included on all
such copies and derivative works.  However, this document itself may not
be modified in any way, such as by removing the copyright notice or
references to the Internet Society or other Internet organizations,
except as needed for the purpose of developing Internet standards in



Hansen                                                         [Page 10]
=0C
Internet Draft  Message Tracking Model and Requirements October 24, 2002


which case the procedures for copyrights defined in the Internet Stan-
dards process must be followed, or as required to translate it into
languages other than English.

     The limited permissions granted above are perpetual and will not be
revoked by the Internet Society or its successors or assigns.

     This document and the information contained herein is provided on
an "AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING
TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT
NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION HEREIN WILL
NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR
FITNESS FOR A PARTICULAR PURPOSE.

     This document expires April 24, 2002.




































Hansen                                                         [Page 11]

--------------000504090201090608090708
Content-Type: text/plain;
 name="draft-ietf-msgtrk-mtqp-09.txt"
Content-Disposition: inline;
 filename="draft-ietf-msgtrk-mtqp-09.txt"
Content-Transfer-Encoding: quoted-printable







Internet Draft                                                 T. Hansen
draft-ietf-msgtrk-mtqp-09.txt                          AT&T Laboratories
Valid for six months                                    October 24, 2002



                    Message Tracking Query Protocol

                    <draft-ietf-msgtrk-mtqp-09.txt>

                         Authors' version: 1.20

     Status of this Memo

     This document is an Internet-Draft and is in full conformance with
all provisions of Section 10 of RFC2026.

     Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups.  Note that other
groups may also distribute working documents as Internet-Drafts.

     Internet-Drafts are draft documents valid for a maximum of six
months and may be updated, replaced, or obsoleted by other documents at
any time.  It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."

     The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt.

     The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html.

     This memo and its companions are discussed on the MSGTRK working
group mailing list, ietf-msgtrk@imc.org.  To subscribe, send a message
with the word "subscribe" in the body (on a line by itself) to the
address ietf-msgtrk-request@imc.org.  An archive of the mailing list may
be found at http://www.ietf.org/archive/msgtrk.

Copyright Notice

     Copyright (C) The Internet Society (%Dy%).  All Rights Reserved.

Abstract

     Customers buying enterprise message systems often ask: Can I track
the messages?  Message tracking is the ability to find out the path that
a particular message has taken through a messaging system and the
current routing status of that message.  This document describes the



Hansen                                                          [Page 1]
=0C
Internet Draft      Message Tracking Query Protocol     October 24, 2002


Message Tracking Query Protocol that is used in conjunction with exten-
sions to the ESMTP protocol to provide a complete message tracking solu-
tion for the Internet.

1.  Introduction

     The Message Tracking Models and Requirements document [DRAFT-MTRK-
MODEL] discusses the models that message tracking solutions could fol-
low, along with requirements for a message tracking solution that can be
used with the Internet-wide message infrastructure.  This memo and its
companions, [DRAFT-MTRK-ESMTP] and [DRAFT-MTRK-TSN], describe a complete
message tracking solution that satisfies those requirements.  The memo
[DRAFT-MTRK-ESMTP] defines an extension to the SMTP service that pro-
vides the information necessary to track messages.  This memo defines a
protocol that can be used to query the status of messages that have been
transmitted on the Internet via SMTP.  The memo [DRAFT-MTRK-TSN]
describes the message/tracking-status [RFC-MIME] media type that is used
to report tracking status information.  Using the model document's ter-
minology, this solution uses active enabling and active requests with
both request and chaining referrals.

1.1.  Terminology

     The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in [RFC-KEYWORDS].

     All syntax descriptions use the ABNF specified by [RFC-ABNF].  Ter-
minal nodes not defined elsewhere in this document are defined in [RFC-
ABNF], [RFC-URI], [DRAFT-MTRK-ESMTP] or [RFC-SMTPEXT].

1.2.  Changes Made for...

     The Changes sections will be removed before publication.

1.2.1.  Changes Made for -09

     Fixes for AD comments made on 8/21/2002:

     The copyright date is 1999. This seems wrong...

     Section 2.4. Should say something about client timeouts and how
long it is appropriate to wait for a server.

     Section 4. It seems appropriate to have two qualified error
responses to TRACK:  (1) An indication that TLS must be negotiated
before this message can be tracked and (2) An indication that the search
succeeded but found no result.



Hansen                                                          [Page 2]
=0C
Internet Draft      Message Tracking Query Protocol     October 24, 2002


     What happens when no informatio about the message is found?  Does
this come back as an empty response or does it get a negative response?

     The URL registration in section 9 doesn't seem to meet the require-
ments set forth in RFC 2717.  In particular, the URL registration tem-
plate needs to be included.

     Section 10. The IANA considerations should mention that this docu-
ment registers the MQTP URL scheme.

     References need to be split into normative and informative.

1.2.2.  Changes Made for -08

     Change "Option Parameters" back to "none" in STARTTLS registration
definition.

1.2.3.  Changes Made for -07

     Added hostname to STARTTLS registration information.  Corrected
ABNF for STARTTLS.

1.2.4.  Changes Made for -06

     Added opt-parameter to STARTTLS and description.

1.2.5.  Changes Made for -05

     STARTTLS error response changed from "/unsupported" to "/unavail-
able".

     Fixed some minor nits in the examples and some typos.

1.2.6.  Changes Made for -04

     Reworked the SRV lookup description.

     Other comments from the list.

     Changes to the ABNF.

     Changed "must" to "MUST" in section 4.

     Changed "may" to "MAY" in section 4.

     More examples.

     Eliminated the registry of vnd. options.



Hansen                                                          [Page 3]
=0C
Internet Draft      Message Tracking Query Protocol     October 24, 2002


     Eliminated lots of unused references.

1.2.7.  Changes Made for -03

     Changed references.

     Worked on error codes.

     Made examples more real with secrets and hashes.

     Fixes to examples.

     Added dot-stuffed example.

     Additional TLS info.

     Better Security Considerations section.

1.2.8.  Changes Made for -02

     Provided information on lookup for an MTQP server: SRV MTQP, then
MX, then A.

     Provided a section on firewall considerations

     Provided a section on service DNS considerations

     At IANA's request, left the port number as XXXX and added more
information on the option registry.

     Added text on various error conditions and fixed ABNF for error
response codes.

     Fleshed out the tracking examples.

2.  Basic Operation

     The Message Tracking Query Protocol (MTQP) is similar to many other
line-oriented Internet protocols, such as [POP3] and [NNTP].  Initially,
the server host starts the MTQP service by listening on TCP port XXXX
(TBD by IANA).

     When an MTQP client wishes to make use of the message tracking ser-
vice, it establishes a TCP connection with the server host, as recorded
from the initial message submission or as returned by a previous track-
ing request.  To find the server host, the MTQP client first does an SRV
lookup for the server host using DNS SRV records, with a service name of
"mtqp" and a protocol name of "tcp", as in _mtqp._tcp.smtp3.example.com.



Hansen                                                          [Page 4]
=0C
Internet Draft      Message Tracking Query Protocol     October 24, 2002


(See the "Usage rules" section in [RFC-SRV] for details.)  If the SRV
records do not exist, the MTQP client then does an address record lookup
for the server host.

     When the connection is established, the MTQP server sends a greet-
ing.  The MTQP client and MTQP server then exchange commands and
responses (respectively) until the connection is closed or aborted.

2.1.  Tracking Service DNS Considerations

     Because of the ways server host lookups are performed, many dif-
ferent tracking server host configurations are supported.

     A mail system that uses a single mail server host and has the MTQP
server host on the same server host will most likely have a single MX
record pointing at the server host, and if not, will have an address
record.  Both mail and MTQP clients will access that host directly.

     A mail system that uses a single mail server host, but wants track-
ing queries to be performed on a different machine, MUST have an SRV
MTQP record pointing at that different machine.

     A mail system that uses multihomed mail servers has two choices for
providing tracking services: either all mail servers must be running
tracking servers that are able to retrieve information on all messages,
or the tracking service must be performed on one (or more) machine(s)
that are able to retrieve information on all messages.  In the former
case, no additional DNS records are needed beyond the MX records already
in place for the mail system.  In the latter case, SRV MTQP records are
needed that point at the machine(s) that are running the tracking ser-
vice.  In both cases, note that the tracking service MUST be able to
handle the queries for all messages accepted by that mail system.

2.2.  Commands

     Commands in MTQP consist of a case-insensitive keyword, possibly
followed by one or more parameters.  All commands are terminated by a
CRLF pair.  Keywords and parameters consist of printable ASCII charac-
ters.  Keywords and parameters are separated by whitespace (one or more
space or tab characters).  A command line is limited to 998 characters
before the CRLF.

2.3.  Responses

     Responses in MTQP consist of a status indicator that indicates suc-
cess or failure.  Successful commands may also be followed by additional
lines of data.  All response lines are terminated by a CRLF pair and are
limited to 998 characters before the CRLF.  There are several status



Hansen                                                          [Page 5]
=0C
Internet Draft      Message Tracking Query Protocol     October 24, 2002


indicators:  "+OK" indicates success; "+OK+" indicates a success fol-
lowed by additional lines of data, a multi-line success response; "-
TEMP" indicates a temporary failure; "-ERR" indicates a permanent
failure; and "-BAD" indicates a protocol error (such as for unrecognized
commands).

     A status indicator MAY be followed by a series of machine-parsable,
case-insensitive response information giving more data about the errors.
These are separated from the status indicator and each other by a single
slash character ("/", decimal code 47).  Following that, there MAY be
white space and a human-readable text message.  The human-readable text
message is not intended to be presented to the end user, but should be
appropriate for putting in a log for use in debugging problems.

     In a multi-line success response, each subsequent line is ter-
minated by a CRLF pair and limited to 998 characters before the CRLF.
When all lines of the response have been sent, a final line is sent con-
sisting of a single period (".", decimal code 046) and a CRLF pair.  If
any line of the multi-line response begins with a period, the line is
"dot-stuffed" by prepending the period with a second period.  When exa-
mining a multi-line response, the client checks to see if the line
begins with a period.  If so, and octets other than CRLF follow, the
first octet of the line (the period) is stripped away.  If so, and if
CRLF immediately follows the period, then the response from the MTQP
server is ended and the line containing the ".CRLF" is not considered
part of the multi-line response.

     An MTQP server MUST respond to an unrecognized, unimplemented, or
syntactically invalid command by responding with a negative -BAD status
indicator.  A server MUST respond to a command issued when the session
is in an incorrect state by responding with a negative -ERR status indi-
cator.

2.4.  Firewall Considerations

     A firewall mail gateway has two choices when receiving a tracking
query for a host within its domain: it may return a response to the
query that says the message has been passed on, but no further informa-
tion is available; or it may perform a chaining operation itself, gath-
ering information on the message from the mail hosts behind the
firewall, and returning to the MTQP client the information for each
behind-the-firewall hop, or possibly just the final hop information,
possibly also disguising the names of any hosts behind the firewall.
Which option is picked is an administrative decision and is not further
mandated by this document.

     If a server chooses to perform a chaining operation itself, it MUST
provide a response within 2 minutes, and SHOULD return a "no further



Hansen                                                          [Page 6]
=0C
Internet Draft      Message Tracking Query Protocol     October 24, 2002


information is available" response if it cannot provide an answer at the
end of that time limit.

2.5.  Optional Timers

     An MTQP server MAY have an inactivity autologout timer.  Such a
timer MUST be of at least 10 minutes in duration.  The receipt of any
command from the client during that interval should suffice to reset the
autologout timer.  An MTQP server MAY limit the number of commands,
unrecognized commands, or total connection time, or MAY use other cri-
teria, to prevent denial of service attacks.

     An MTQP client MAY have an inactivity autologout timer while wait-
ing for a response from the server.  Since an MTQP server may be a
firewall, and may be chaining information from other servers, such a
timer MUST be at least 2 minutes in duration.

3.  Initialization and Option Response

     Once the TCP connection has been opened by an MTQP client, the MTQP
server issues an initial status response that indicates its readiness.
If the status response is positive (+OK or +OK+), the client may proceed
with other commands.

     The initial status response MUST include the response information
"/MTQP".  Negative responses MUST include a reason code as response
information.  The following reason codes are defined here; unrecognized
reason codes added in the future may be treated as equivalent to "una-
vailable".
     "/" "unavailable"
     "/" "admin"

     The reason code "/admin" SHOULD be used when the service is una-
vailable for administrative reasons.  The reason code "/unavailable"
SHOULD be used when the service is unavailable for other reasons.

     If the server has any options enabled, they are listed as the
multi-line response of the initial status response, one per line.  An
option specification consists of an identifier, optionally followed by
option-specific parameters.  An option specification may be continued
onto additional lines by starting the continuation lines with white
space.  The option identifier is case insensitive.  Option identifiers
beginning with the characters "vnd." are reserved for vendor use.  (See
below.)

     One option specification is defined here:

     STARTTLS



Hansen                                                          [Page 7]
=0C
Internet Draft      Message Tracking Query Protocol     October 24, 2002


This capability MUST be listed if the optional STARTTLS command is sup-
ported by the MTQP server.  It has no parameters.

3.1.  Examples


     Example #1 (no options):
     S: +OK/MTQP MTQP server ready

     Example #2 (service temporarily unavailable):
     S: -TEMP/MTQP/admin Service down for admin, call back later

     Example #3 (service permanently unavailable):
     S: -ERR/MTQP/unavailable Service down

     Example #4 (alternative for no options):
     S: +OK+/MTQP MTQP server ready
     S: .

     Example #5 (options available):
     S: +OK+/MTQP MTQP server ready
     S: starttls
     S: vnd.com.example.option2 with parameters private to example.com
     S: vnd.com.example.option3 with a very long
     S:  list of parameters
     S: .

4.  TRACK Command

     Syntax:
          "TRACK" 1*WSP envid 1*WSP mtrk-secret CRLF

          mtrk-secret =3D base64

     Envid is defined in [DRAFT-MTRK-ESMTP].  Mtrk-secret is the secret
A described in [DRAFT-MTRK-ESMTP], encoded using base64.

     When the client issues the TRACK command, and the user is vali-
dated, the MTQP server retrieves tracking information about an email
message.  To validate the user, the value of mtrk-secret is hashed using
SHA1, as described in [RFC-SHA1].  The hash value is then compared with
the value passed with the message when it was originally sent.  If the
hash values match, the user is validated.

     A successful response MUST be multi-line, consisting of a [RFC-
MIME] body part.  The MIME body part MUST be of type multipart/related,
with subparts of message/tracking-status, as defined in [DRAFT-MTRK-
TSN].  The response contains the tracking information about the email



Hansen                                                          [Page 8]
=0C
Internet Draft      Message Tracking Query Protocol     October 24, 2002


message that used the given tracking-id.

     A negative response to the TRACK command may include these reason
codes:
     "/" "tls-required"
     "/" "admin"
     "/" "unavailable"
     "/" "noinfo"

     The reason code "/tls-required" SHOULD be used when the server has
decided to require TLS.  The reason code "/admin" SHOULD be used when
the server has become unavailable, due to administrative reasons, since
the connection was initialized.  The reason code "/unavailable" SHOULD
be used when the server has become unavailable, for other reasons, since
the connection was initialized.

     If a message has not been seen by the MTQP server, the server MUST
choose between two choices:  it MAY return a positive response with an
action field of "opaque" in the tracking information, or it MAY return a
negative response with a reason code of "noinfo".

4.1.  Examples

     In each of the examples below, the envid is "<12345-
20010101@example.com>", the secret A is "abcdefgh", and the SHA1 hash B
is (in hex) "734ba8b31975d0dbae4d6e249f4e8da270796c94".  The message
came from example.com and the MTQP server is example2.com.

     Example #6 Message Delivered:
     C: TRACK <12345-20010101@example.com> YWJjZGVmZ2gK
     S: +OK+ Tracking information follows
     S: Content-Type: multipart/related; boundary=3D%%%%; type=3Dtracking=
-status
     S:
     S: --%%%%
     S: Content-Type: message/tracking-status
     S:
     S: Original-Envelope-Id: 12345-20010101@example.com
     S: Reporting-MTA: dns; example2.com
     S: Arrival-Date: Mon,  1 Jan 2001 15:15:15 -0500
     S:
     S: Original-Recipient: rfc822; user1@example1.com
     S: Final-Recipient: rfc822; user1@example1.com
     S: Action: delivered
     S: Status: 2.5.0
     S:
     S: --%%%%--
     S: .




Hansen                                                          [Page 9]
=0C
Internet Draft      Message Tracking Query Protocol     October 24, 2002


     Example #7 Message Transferred:
     C: TRACK <12345-20010101@example.com> YWJjZGVmZ2gK
     S: +OK+ Tracking information follows
     S: Content-Type: multipart/related; boundary=3D%%%%; type=3Dtracking=
-status
     S:
     S: --%%%%
     S: Content-Type: message/tracking-status
     S:
     S: Original-Envelope-Id: 12345-20010101@example.com
     S: Reporting-MTA: dns; example2.com
     S: Arrival-Date: Mon,  1 Jan 2001 15:15:15 -0500
     S:
     S: Original-Recipient: rfc822; user1@example1.com
     S: Final-Recipient: rfc822; user1@example1.com
     S: Action: transferred
     S: Remote-MTA: dns; example3.com
     S: Last-Attempt-Date: Mon,  1 Jan 2001 19:15:03 -0500
     S: Status: 2.4.0
     S:
     S: --%%%%--
     S: .

     Example #8 Message Delayed and a Dot-Stuffed Header:
     C: TRACK <12345-20010101@example.com> YWJjZGVmZ2gK
     S: +OK+ Tracking information follows
     S: Content-Type: multipart/related; boundary=3D%%%%; type=3Dtracking=
-status
     S: ..Dot-Stuffed-Header: as an example
     S:
     S: --%%%%
     S: Content-Type: message/tracking-status
     S:
     S: Original-Envelope-Id: 12345-20010101@example.com
     S: Reporting-MTA: dns; example2.com
     S: Arrival-Date: Mon,  1 Jan 2001 15:15:15 -0500
     S:
     S: Original-Recipient: rfc822; user1@example1.com
     S: Final-Recipient: rfc822; user1@example1.com
     S: Action: delayed
     S: Status: 4.4.1 (No answer from host)
     S: Remote-MTA: dns; example3.com
     S: Last-Attempt-Date: Mon,  1 Jan 2001 19:15:03 -0500
     S: Will-Retry-Until: Thu,  4 Jan 2001 15:15:15 -0500
     S:
     S: --%%%%--
     S: .

     Example #9 Two Users, One Relayed, One Failed:
     C: TRACK <12345-20010101@example.com> YWJjZGVmZ2gK



Hansen                                                         [Page 10]
=0C
Internet Draft      Message Tracking Query Protocol     October 24, 2002


     S: +OK+ Tracking information follows
     S: Content-Type: multipart/related; boundary=3D%%%%; type=3Dtracking=
-status
     S:
     S: --%%%%
     S: Content-Type: message/tracking-status
     S:
     S: Original-Envelope-Id: 12345-20010101@example.com
     S: Reporting-MTA: dns; example2.com
     S: Arrival-Date: Mon,  1 Jan 2001 15:15:15 -0500
     S:
     S: Original-Recipient: rfc822; user1@example1.com
     S: Final-Recipient: rfc822; user1@example1.com
     S: Action: relayed
     S: Status: 2.1.9
     S: Remote-MTA: dns; example3.com
     S: Last-Attempt-Date: Mon,  1 Jan 2001 19:15:03 -0500
     S:
     S: Original-Recipient: rfc822; user2@example1.com
     S: Final-Recipient: rfc822; user2@example1.com
     S: Action: failed
     S: Status 5.2.2 (Mailbox full)
     S: Remote-MTA: dns; example3.com
     S: Last-Attempt-Date: Mon,  1 Jan 2001 19:15:03 -0500
     S:
     S: --%%%%--
     S: .

     Example #10 Firewall:
     C: TRACK <12345-20010101@example.com> YWJjZGVmZ2gK
     S: +OK+ Tracking information follows
     S: Content-Type: multipart/related; boundary=3D%%%%; type=3Dtracking=
-status
     S:
     S: --%%%%
     S: Content-Type: message/tracking-status
     S:
     S: Original-Envelope-Id: 12345-20010101@example.com
     S: Reporting-MTA: dns; example2.com
     S: Arrival-Date: Mon,  1 Jan 2001 15:15:15 -0500
     S:
     S: Original-Recipient: rfc822; user1@example1.com
     S: Final-Recipient: rfc822; user1@example1.com
     S: Action: relayed
     S: Status: 2.1.9
     S: Remote-MTA: dns; smtp.example3.com
     S: Last-Attempt-Date: Mon,  1 Jan 2001 19:15:03 -0500
     S:
     S: --%%%%
     S: Content-Type: message/tracking-status



Hansen                                                         [Page 11]
=0C
Internet Draft      Message Tracking Query Protocol     October 24, 2002


     S:
     S: Original-Envelope-Id: 12345-20010101@example.com
     S: Reporting-MTA: dns; smtp.example3.com
     S: Arrival-Date: Mon,  1 Jan 2001 15:15:15 -0500
     S:
     S: Original-Recipient: rfc822; user2@example1.com
     S: Final-Recipient: rfc822; user4@example3.com
     S: Action: delivered
     S: Status: 2.5.0
     S:
     S: --%%%%--
     S: .

     Example #11 Firewall, Combining Per-Recipient Blocks:
     C: TRACK <12345-20010101@example.com> YWJjZGVmZ2gK
     S: +OK+ Tracking information follows
     S: Content-Type: multipart/related; boundary=3D%%%%; type=3Dtracking=
-status
     S:
     S: --%%%%
     S: Content-Type: message/tracking-status
     S:
     S: Original-Envelope-Id: 12345-20010101@example.com
     S: Reporting-MTA: dns; example2.com
     S: Arrival-Date: Mon,  1 Jan 2001 15:15:15 -0500
     S:
     S: Original-Recipient: rfc822; user1@example1.com
     S: Final-Recipient: rfc822; user1@example1.com
     S: Action: relayed
     S: Status: 2.1.9
     S: Remote-MTA: dns; smtp.example3.com
     S: Last-Attempt-Date: Mon,  1 Jan 2001 19:15:03 -0500
     S:
     S: Original-Recipient: rfc822; user2@example1.com
     S: Final-Recipient: rfc822; user4@example3.com
     S: Action: delivered
     S: Status: 2.5.0
     S:
     S: --%%%%--
     S: .

     Example #12 Firewall, Hiding System Names Behind the Firewall:
     C: TRACK <12345-20010101@example.com> YWJjZGVmZ2gK
     S: +OK+ Tracking information follows
     S: Content-Type: multipart/related; boundary=3D%%%%; type=3Dtracking=
-status
     S:
     S: --%%%%
     S: Content-Type: message/tracking-status
     S:



Hansen                                                         [Page 12]
=0C
Internet Draft      Message Tracking Query Protocol     October 24, 2002


     S: Original-Envelope-Id: 12345-20010101@example.com
     S: Reporting-MTA: dns; example2.com
     S: Arrival-Date: Mon,  1 Jan 2001 15:15:15 -0500
     S:
     S: Original-Recipient: rfc822; user1@example1.com
     S: Final-Recipient: rfc822; user1@example1.com
     S: Action: relayed
     S: Status: 2.1.9
     S: Remote-MTA: dns; example2.com
     S: Last-Attempt-Date: Mon,  1 Jan 2001 19:15:03 -0500
     S:
     S: --%%%%
     S: Content-Type: message/tracking-status
     S:
     S: Original-Envelope-Id: 12345-20010101@example.com
     S: Reporting-MTA: dns; example2.com
     S: Arrival-Date: Mon,  1 Jan 2001 15:15:15 -0500
     S:
     S: Original-Recipient: rfc822; user2@example1.com
     S: Final-Recipient: rfc822; user4@example1.com
     S: Action: delivered
     S: Status: 2.5.0
     S:
     S: --%%%%--
     S: .

5.  COMMENT Command

     Syntax:
          "COMMENT" opt-text CRLF

          opt-text =3D [WSP *(VCHAR / WSP)]

     When the client issues the COMMENT command, the MTQP server MUST
respond with a successful response (+OK or +OK+).  All optional text
provided with the COMMENT command are ignored.

6.  STARTTLS Command

     Syntax:
          "STARTTLS" [WSP hostname] CRLF

     TLS [TLS], more commonly known as SSL, is a popular mechanism for
enhancing TCP communications with privacy and authentication.  An MTQP
server MAY support TLS.  If an MTQP server supports TLS, it MUST include
"STARTTLS" in the option specifications list on protocol startup.

     The optional parameter, if specified, MUST be a fully qualified



Hansen                                                         [Page 13]
=0C
Internet Draft      Message Tracking Query Protocol     October 24, 2002


domain name.  A client MAY specify the hostname it believes it is speak-
ing with so that the server may respond with the proper TLS certificate.
This is useful for virtual servers that provide message tracking for
multiple domains (i.e., virtual hosting).

     If the server returns a negative response, it MAY use one of the
following response codes:
     "/" "unsupported"
     "/" "unavailable"
     "/" "tlsinprogress"

     If TLS is not supported, then a response code of "/unsupported"
SHOULD be used.  If TLS is not available for some other reason, then a
response code of "/unavailable" SHOULD be used.  If a TLS session is
already in progress, then it is a protocol error and "-BAD" MUST be
returned with a response code of "/tlsinprogress".

     After receiving a positive response to a STARTTLS command, the
client MUST start the TLS negotiation before giving any other MTQP com-
mands.

     If the MTQP client is using pipelining (see below), the STARTTLS
command must be the last command in a group.

6.1.  Processing After the STARTTLS Command

     If the TLS handshake fails, the server SHOULD abort the connection.

     After the TLS handshake has been completed, both parties MUST
immediately decide whether or not to continue based on the authentica-
tion and privacy achieved. The MTQP client and server may decide to move
ahead even if the TLS negotiation ended with no authentication and/or no
privacy because most MTQP services are performed with no authentication
and no privacy, but some MTQP clients or servers may want to continue
only if a particular level of authentication and/or privacy was
achieved.

     If the MTQP client decides that the level of authentication or
privacy is not high enough for it to continue, it SHOULD issue an MTQP
QUIT command immediately after the TLS negotiation is complete.  If the
MTQP server decides that the level of authentication or privacy is not
high enough for it to continue, it SHOULD reply to every MTQP command
from the client (other than a QUIT command) with a negative "-ERR"
response and a response code of "/insecure".

6.2.  Result of the STARTTLS Command

     Upon completion of the TLS handshake, the MTQP protocol is reset to



Hansen                                                         [Page 14]
=0C
Internet Draft      Message Tracking Query Protocol     October 24, 2002


the initial state (the state in MTQP after a server starts up).  The
server MUST discard any knowledge obtained from the client prior to the
TLS negotiation itself. The client MUST discard any knowledge obtained
from the server, such as the list of MTQP options, which was not
obtained from the TLS negotiation itself.

     At the end of the TLS handshake, the server acts as if the connec-
tion had been initiated and responds with an initial status response
and, optionally, a list of server options.  The list of MTQP server
options received after the TLS handshake MUST be different than the list
returned before the TLS handshake.  In particular, a server MUST NOT
return the STARTTLS option in the list of server options after a TLS
handshake has completed.

     Both the client and the server MUST know if there is a TLS session
active.  A client MUST NOT attempt to start a TLS session if a TLS ses-
sion is already active.

7.  QUIT Command

     Syntax:
          "QUIT" CRLF

     When the client issues the QUIT command, the MTQP session ter-
minates.  The QUIT command has no parameters.  The server MUST respond
with a successful response.  The client MAY close the session from its
end immediately after issuing this command (if the client is on an
operating system where this does not cause problems).

8.  Pipelining

     The MTQP client may elect to transmit groups of MTQP commands in
batches without waiting for a response to each individual command.  The
MTQP server MUST process the commands in the order received.

     Specific commands may place further constraints on pipelining.  For
example, STARTTLS must be the last command in a batch of MTQP commands.

8.1.  Examples

     The following two examples are identical:

     Example #13 :
     C: TRACK <tracking-id> YWJjZGVmZ2gK
     S: +OK+ Tracking information follows
     S:
     S: ... tracking details #1 go here ...
     S: .



Hansen                                                         [Page 15]
=0C
Internet Draft      Message Tracking Query Protocol     October 24, 2002


     C: TRACK <tracking-id-2> QUJDREVGR0gK
     S: +OK+ Tracking information follows
     S:
     S: ... tracking details #2 go here ...
     S: .

     Example #14 :
     C: TRACK <tracking-id> YWJjZGVmZ2gK
     C: TRACK <tracking-id-2> QUJDREVGR0gK
     S: +OK+ Tracking information follows
     S:
     S: ... tracking details #1 go here ...
     S: .
     S: +OK+ Tracking information follows
     S:
     S: ... tracking details #2 go here ...
     S: .

9.  The MTQP URI Scheme


9.1.  Intended usage

     The MTQP URI scheme is used to designate MTQP servers on Internet
hosts accessible using the MTQP protocol.  It performs an MTQP query and
returns tracking status information.

9.2.  URI Scheme Name

     The name of the URI scheme is "mtqp".

9.3.  URI Scheme Syntax

     An MTQP URI takes one of the following forms:

     mtqp://<mserver>/track/<envid>/<mtrk-secret>
     mtqp://<mserver>:<port>/track/<envid>/<mtrk-secret>

     The first form is used to refer to an MTQP server on the standard
port, while the second form specifies a non-standard port.  Both of
these forms specify that the TRACK command is to be issued using the
given tracking id (envid) and authorization secret (mtrk-secret).  The
path element "/track/" MUST BE treated case insensitively, but the envid
and mtrk-secret MUST NOT be.

9.3.1.  Formal Syntax


     This is an ABNF description of the MTQP URI.



Hansen                                                         [Page 16]
=0C
Internet Draft      Message Tracking Query Protocol     October 24, 2002


     mtqp-uri =3D "mtqp://" net_loc "/track/" envid "/" mtrk-secret

9.4.  Encoding Rules

     The encoding of envid is discussed in [DRAFT-MTRK-ESMTP].  Mtrk-
secret is required to be base64 encoded.  If the "/", "?" and "%" octets
appear in envid or mtrk-secret, they are further required to be
represented by a "%" followed by two hexadecimal characters.  (The two
characters give the hexadecimal representation of that octet.)

10.  IANA Considerations

     System port number XXXX - TBD by IANA

     The service name to be registered with the Internet Assigned Number
Authority (IANA) is "MTQP".

     The IANA is asked to register the URI registration template found
in Appendix A in accordance with [BCP35].

     This document requests that IANA maintain one new registry: MTQP
options.  The registry's purpose is to register options to this proto-
col.  Options whose names do not begin with "vnd." MUST be defined in a
standards track or IESG approved experimental RFC.  New MTQP options
MUST include the following information as part of their definition:

     option identifier
     option parameters
     added commands
     standard commands affected
     specification reference
     discussion

     One MTQP option is defined in this document, with the following
registration definition:

     option identifier: STARTTLS
     option parameters: none
     added commands: STARTTLS
     standard commands affected: none
     specification reference: RFC TBD
     discussion: see RFC TBD

     Additional vendor-specific options for this protocol have names
that begin with "vnd.".  After the "vnd." would appear the reversed
domain name of the vendor, another dot ".", and a name for the option
itself.  For example, "vnd.com.example.extinfo" might represent a
vendor-specific extension providing extended information by the owner of



Hansen                                                         [Page 17]
=0C
Internet Draft      Message Tracking Query Protocol     October 24, 2002


the "example.com" domain.  These names MAY be registered with IANA.

11.  Security Considerations

     If the originator of a message were to delegate his or her tracking
request to a third party, this would be vulnerable to snooping over
unencrypted sessions.  The user can decide on a message-by-message basis
if this risk is acceptable.

     The security of tracking information is dependent on the randomness
of the secret chosen for each message and the level of exposure of that
secret.  If different secrets are used for each message, then the max-
imum exposure from tracking any message will be that single message for
the time that the tracking information is kept on any MTQP server.  If
this level of exposure is too much, TLS may be used to reduce the expo-
sure further.

     It should be noted that message tracking is not an end-to-end
mechanism.  Thus, if an MTQP client/server pair decide to use TLS
privacy, they are not securing tracking queries with any prior or suc-
cessive MTQP servers.

     Both the MTQP client and server must check the result of the TLS
negotiation to see whether acceptable authentication or privacy was
achieved.  Ignoring this step completely invalidates using TLS for secu-
rity.  The decision about whether acceptable authentication or privacy
was achieved is made locally, is implementation-dependent, and is beyond
the scope of this document.

     The MTQP client and server should note carefully the result of the
TLS negotiation.  If the negotiation results in no privacy, or if it
results in privacy using algorithms or key lengths that are deemed not
strong enough, or if the authentication is not good enough for either
party, the client may choose to end the MTQP session with an immediate
QUIT command, or the server may choose to not accept any more MTQP com-
mands.

     A man-in-the-middle attack can be launched by deleting the
"STARTTLS" option response from the server.  This would cause the client
not to try to start a TLS session.  An MTQP client can protect against
this attack by recording the fact that a particular MTQP server offers
TLS during one session and generating an alarm if it does not appear in
an option response for a later session.

     If TLS is not used, a tracking request is vulnerable to replay
attacks, such that a snoop can later replay the same handshake again to
potentially gain more information about a message's status.




Hansen                                                         [Page 18]
=0C
Internet Draft      Message Tracking Query Protocol     October 24, 2002


     Before the TLS handshake has begun, any protocol interactions are
performed in the clear and may be modified by an active attacker.  For
this reason, clients and servers MUST discard any knowledge obtained
prior to the start of the TLS handshake upon completion of the TLS
handshake.

     If a client/server pair successfully performs a TLS handshake and
the server does chaining referrals, then the server SHOULD attempt to
negotiate TLS at the same (or better) security level at the next hop.
In a hop-by-hop scenario, STARTTLS is a request for "best effort" secu-
rity and should be treated as such.

     SASL is not used because authentication is per message rather than
per user.

12.  Protocol Syntax

     This is a collected ABNF description of the MTQP protocol.
     conversation =3D command-response *( client-command command-response=
 )

     # client side
     client-command =3D track-command / starttls-command / quit-command /=
 comment-command

     track-command =3D "TRACK" 1*WS envid 1*WS mtrk-secret CRLF

     mtrk-secret =3D base64

     starttls-command =3D "STARTTLS" [WSP hostname] CRLF

     quit-command =3D "QUIT" CRLF

     comment-command =3D "COMMENT" opt-text CRLF

     # server side
     command-response =3D success-response / temp-response / error-respon=
se / bad-response

     temp-response =3D "-TEMP" response-info opt-text CRLF

     opt-text =3D [WSP *(VCHAR / WSP)]

     error-response =3D "-ERR" response-info opt-text CRLF

     bad-response =3D "-BAD" response-info opt-text CRLF

     success-response =3D single-line-success / multi-line-success

     single-line-success =3D "+OK" response-info opt-text CRLF




Hansen                                                         [Page 19]
=0C
Internet Draft      Message Tracking Query Protocol     October 24, 2002


     multi-line-success =3D "+OK+" response-info opt-text CRLF *dataline =
dotcrlf

     dataline =3D *998OCTET CRLF

     dotcrlf =3D "." CRLF

     option-list =3D *option-line

     option-line =3D identifier opt-text *(CRLF WSP opt-text) CRLF

     NAMECHAR =3D ALPHA / DIGIT / "-" / "_"

     identifier =3D (ALPHA / "_") *NAMECHAR)

     response-info =3D *( "/" ( "admin" / "unavailable" / "unsupported" /=

             "tlsinprogress" / "insecure" / 1*NAMECHAR ) )

13.  Acknowledgements

     The description of STARTTLS is based on [RFC-SMTP-TLS].

14.  Normative References


     [RFC-MIME]RFC 2045, N. Freed & N. Borenstein, "Multipurpose Inter-
               net Mail Extensions (MIME) Part One: Format of Internet
               Message Bodies", Innosoft, First Virtual, November 1996.

     [RFC-ABNF]RFC 2234, D. Crocker, Editor, and P. Overell, "Augmented
               BNF for Syntax Specifications: ABNF", Internet Mail Con-
               sortium, Demon Internet Ltd., November 1997.

     [RFC-SRV] RFC 2782, A. Gulbrandsen, P. Vixie, L. Esibov, "A DNS RR
               for specifying the location of services (DNS SRV)" Troll
               Technologies, Internet Software Consortium, Microsoft
               Corp., February 2000

     [RFC-SMTPEXT]
               RFC 2554, J. Myers, "SMTP Service Extension for Authenti-
               cation", Netscape Communications, March 1999.

     [DRAFT-MTRK-ESMTP]
               draft-ietf-msgtrk-smtpext-*.txt, E. Allman, T. Hansen,
               "SMTP Service Extension for Message Tracking", Sendmail,
               Inc., AT&T Laboratories, TBD 2002.

     [DRAFT-MTRK-MODEL]
               draft-ietf-msgtrk-model-*.txt, T. Hansen, "Message



Hansen                                                         [Page 20]
=0C
Internet Draft      Message Tracking Query Protocol     October 24, 2002


               Tracking Models and Requirements", AT&T Laboratories, TBD
               2002.

     [DRAFT-MTRK-TSN]
               draft-ietf-msgtrk-trkstat-*.txt, E. Allman, "The
               Message/Tracking-Status MIME Extension", Sendmail, Inc.,
               TBD 2002.

     [RFC-URI] RFC 2396, T. Berners-Lee, R. Fielding, L. Masinter, "Uni-
               form Resource Identifiers (URI): Generic Syntax",
               MIT/LCS, U. C. Irvine, Xerox Corporation, August 1998.

15.  Informational References


     [BCP35]   BCP 35, RFC 2717, R. Petke, I. King, "Registration Pro-
               cedures for URL Scheme Names", November 1999.

     [RFC-SHA1]RFC 3184, D. Eastlake & P. Jones, "US Secure Hash Stan-
               dard 1 (SHA1)", September 2001.

     [RFC-KEYWORDS]
               RFC 2119, S. Bradner, "Key words for use in RFCs to Indi-
               cate Requirement Levels", Harvard University, March 1997.

     [RFC-SMTP-TLS]
               RFC2487, P. Hoffman, "SMTP Service Extension for Secure
               SMTP over TLS", Internet Mail Consortium, January 1999.

Appendix A. MTQP URI Registration Template

     Scheme name: mtqp

     Scheme syntax: see section 9.1

     Character encoding considerations: see section 9.4

     Intended usage: see section 9.3

     Applications and/or protocols which use this scheme: MTQP

     Interoperability considerations: as specified for MTQP

     Security considerations: see section 11.0

     Relevant publications: [DRAFT-MTRK-ESMTP], [DRAFT-MTRK-MODEL],
[DRAFT-MTRK-TSN]




Hansen                                                         [Page 21]
=0C
Internet Draft      Message Tracking Query Protocol     October 24, 2002


     Contact: MSGTRK Working Group

     Author/Change Controller: IESG

16.  Author's Address

     Tony Hansen
     AT&T Laboratories
     Middletown, NJ 07748
     USA

     Phone: +1.732.420.8934
     E-Mail: tony@att.com

17.  Full Copyright Statement

     Copyright (C) The Internet Society (%Dy%).  All Rights Reserved.

     This document and translations of it may be copied and furnished to
others, and derivative works that comment on or otherwise explain it or
assist in its implementation may be prepared, copied, published and dis-
tributed, in whole or in part, without restriction of any kind, provided
that the above copyright notice and this paragraph are included on all
such copies and derivative works.  However, this document itself may not
be modified in any way, such as by removing the copyright notice or
references to the Internet Society or other Internet organizations,
except as needed for the purpose of developing Internet standards in
which case the procedures for copyrights defined in the Internet Stan-
dards process must be followed, or as required to translate it into
languages other than English.

     The limited permissions granted above are perpetual and will not be
revoked by the Internet Society or its successors or assigns.

     This document and the information contained herein is provided on
an "AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING
TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT
NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION HEREIN WILL
NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR
FITNESS FOR A PARTICULAR PURPOSE.

     This document expires April 24, 2002.









Hansen                                                         [Page 22]

--------------000504090201090608090708--



From owner-ietf-msgtrk@mail.imc.org  Fri Oct 25 00:27:59 2002
Received: from above.proper.com (mail.proper.com [208.184.76.45])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id AAA02943
	for <msgtrk-archive@lists.ietf.org>; Fri, 25 Oct 2002 00:27:59 -0400 (EDT)
Received: (from majordomo@localhost)
	by above.proper.com (8.11.6/8.11.3) id g9P4Sh823255
	for ietf-msgtrk-bks; Thu, 24 Oct 2002 21:28:43 -0700 (PDT)
Received: from mauve.mrochek.com (mauve.mrochek.com [209.55.107.55])
	by above.proper.com (8.11.6/8.11.3) with ESMTP id g9P4SgW23250
	for <ietf-msgtrk@imc.org>; Thu, 24 Oct 2002 21:28:42 -0700 (PDT)
Received: from mauve.mrochek.com by mauve.mrochek.com (PMDF V6.1-1 #35243)
 id <01KO229DTADC004XU0@mauve.mrochek.com> for ietf-msgtrk@imc.org; Thu,
 24 Oct 2002 21:28:40 -0700 (PDT)
Date: Thu, 24 Oct 2002 21:27:37 -0700 (PDT)
From: ned.freed@mrochek.com
Subject: Re: AD review of msgtrk documents
In-reply-to: "Your message dated Thu, 24 Oct 2002 22:14:42 -0400"
 <3DB8A912.3080302@att.com>
To: Tony Hansen <tony@att.com>
Cc: ned.freed@mrochek.com, ietf-msgtrk@imc.org, paf@cisco.com
Message-id: <01KO236G44ZS004XU0@mauve.mrochek.com>
MIME-version: 1.0
Content-type: TEXT/PLAIN; CHARSET=us-ascii
Content-transfer-encoding: 7BIT
Sender: owner-ietf-msgtrk@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-msgtrk/mail-archive/>
List-ID: <ietf-msgtrk.imc.org>
List-Unsubscribe: <mailto:ietf-msgtrk-request@imc.org?body=unsubscribe>
Content-Transfer-Encoding: 7BIT


> > Enclosed is the update of smtpext-03 and trkstat-03 per your
> > comments.  These are still in "draft" format; please let me know if
> > you want me to update them to "RFC" format.

> ditto for model-07 and mtqp-09

The new drafts need to be posted as Internet-Drafts in the usual Internet-Draft
format. Once that's done I'll review and ask for a IETF-wide last call.

				Ned


From owner-ietf-msgtrk@mail.imc.org  Mon Oct 28 06:31:26 2002
Received: from above.proper.com (mail.proper.com [208.184.76.45])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id GAA03679
	for <msgtrk-archive@lists.ietf.org>; Mon, 28 Oct 2002 06:31:25 -0500 (EST)
Received: (from majordomo@localhost)
	by above.proper.com (8.11.6/8.11.3) id g9SBUwn08924
	for ietf-msgtrk-bks; Mon, 28 Oct 2002 03:30:58 -0800 (PST)
Received: from ietf.org (odin.ietf.org [132.151.1.176])
	by above.proper.com (8.11.6/8.11.3) with ESMTP id g9SBUvW08910
	for <ietf-msgtrk@imc.org>; Mon, 28 Oct 2002 03:30:57 -0800 (PST)
Received: from CNRI.Reston.VA.US (localhost [127.0.0.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id GAA03431;
	Mon, 28 Oct 2002 06:28:35 -0500 (EST)
Message-Id: <200210281128.GAA03431@ietf.org>
Mime-Version: 1.0
Content-Type: Multipart/Mixed; Boundary="NextPart"
To: IETF-Announce: ;
Cc: ietf-msgtrk@imc.org
From: Internet-Drafts@ietf.org
Reply-to: Internet-Drafts@ietf.org
Subject: I-D ACTION:draft-ietf-msgtrk-mtqp-09.txt
Date: Mon, 28 Oct 2002 06:28:35 -0500
Sender: owner-ietf-msgtrk@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-msgtrk/mail-archive/>
List-ID: <ietf-msgtrk.imc.org>
List-Unsubscribe: <mailto:ietf-msgtrk-request@imc.org?body=unsubscribe>


--NextPart

A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the Message Tracking Protocol Working Group of the IETF.

	Title		: Message Tracking Query Protocol
	Author(s)	: T. Hansen
	Filename	: draft-ietf-msgtrk-mtqp-09.txt
	Pages		: 22
	Date		: 2002-10-25
	
Customers buying enterprise message systems often ask: Can I track
the messages?  Message tracking is the ability to find out the path that
a particular message has taken through a messaging system and the
current routing status of that message.  This document describes the
Message Tracking Query Protocol that is used in conjunction with exten-
sions to the ESMTP protocol to provide a complete message tracking solu-
tion for the Internet.

A URL for this Internet-Draft is:
http://www.ietf.org/internet-drafts/draft-ietf-msgtrk-mtqp-09.txt

To remove yourself from the IETF Announcement list, send a message to 
ietf-announce-request with the word unsubscribe in the body of the message.

Internet-Drafts are also available by anonymous FTP. Login with the username
"anonymous" and a password of your e-mail address. After logging in,
type "cd internet-drafts" and then
	"get draft-ietf-msgtrk-mtqp-09.txt".

A list of Internet-Drafts directories can be found in
http://www.ietf.org/shadow.html 
or ftp://ftp.ietf.org/ietf/1shadow-sites.txt


Internet-Drafts can also be obtained by e-mail.

Send a message to:
	mailserv@ietf.org.
In the body type:
	"FILE /internet-drafts/draft-ietf-msgtrk-mtqp-09.txt".
	
NOTE:	The mail server at ietf.org can return the document in
	MIME-encoded form by using the "mpack" utility.  To use this
	feature, insert the command "ENCODING mime" before the "FILE"
	command.  To decode the response(s), you will need "munpack" or
	a MIME-compliant mail reader.  Different MIME-compliant mail readers
	exhibit different behavior, especially when dealing with
	"multipart" MIME messages (i.e. documents which have been split
	up into multiple messages), so check your local documentation on
	how to manipulate these messages.
		
		
Below is the data which will enable a MIME compliant mail reader
implementation to automatically retrieve the ASCII version of the
Internet-Draft.

--NextPart
Content-Type: Multipart/Alternative; Boundary="OtherAccess"

--OtherAccess
Content-Type: Message/External-body;
	access-type="mail-server";
	server="mailserv@ietf.org"

Content-Type: text/plain
Content-ID:	<2002-10-25112719.I-D@ietf.org>

ENCODING mime
FILE /internet-drafts/draft-ietf-msgtrk-mtqp-09.txt

--OtherAccess
Content-Type: Message/External-body;
	name="draft-ietf-msgtrk-mtqp-09.txt";
	site="ftp.ietf.org";
	access-type="anon-ftp";
	directory="internet-drafts"

Content-Type: text/plain
Content-ID:	<2002-10-25112719.I-D@ietf.org>

--OtherAccess--

--NextPart--




From owner-ietf-msgtrk@mail.imc.org  Mon Oct 28 06:32:26 2002
Received: from above.proper.com (mail.proper.com [208.184.76.45])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id GAA03778
	for <msgtrk-archive@lists.ietf.org>; Mon, 28 Oct 2002 06:32:26 -0500 (EST)
Received: (from majordomo@localhost)
	by above.proper.com (8.11.6/8.11.3) id g9SBUr608897
	for ietf-msgtrk-bks; Mon, 28 Oct 2002 03:30:53 -0800 (PST)
Received: from ietf.org (odin.ietf.org [132.151.1.176])
	by above.proper.com (8.11.6/8.11.3) with ESMTP id g9SBUqW08892
	for <ietf-msgtrk@imc.org>; Mon, 28 Oct 2002 03:30:52 -0800 (PST)
Received: from CNRI.Reston.VA.US (localhost [127.0.0.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id GAA03413;
	Mon, 28 Oct 2002 06:28:30 -0500 (EST)
Message-Id: <200210281128.GAA03413@ietf.org>
Mime-Version: 1.0
Content-Type: Multipart/Mixed; Boundary="NextPart"
To: IETF-Announce: ;
Cc: ietf-msgtrk@imc.org
From: Internet-Drafts@ietf.org
Reply-to: Internet-Drafts@ietf.org
Subject: I-D ACTION:draft-ietf-msgtrk-model-07.txt
Date: Mon, 28 Oct 2002 06:28:30 -0500
Sender: owner-ietf-msgtrk@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-msgtrk/mail-archive/>
List-ID: <ietf-msgtrk.imc.org>
List-Unsubscribe: <mailto:ietf-msgtrk-request@imc.org?body=unsubscribe>


--NextPart

A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the Message Tracking Protocol Working Group of the IETF.

	Title		: Message	Tracking Model and Requirements
	Author(s)	: T. Hansen
	Filename	: draft-ietf-msgtrk-model-07.txt
	Pages		: 11
	Date		: 2002-10-25
	
Customers buying enterprise message systems often ask: Can I track
the messages?  Message tracking is the ability to find out the path that
a particular message has taken through a messaging system and the
current routing status of that message.  This document provides a model
of message tracking that can be used for understanding the Internet-wide
message infrastructure and to further enhance those capabilities to
include message tracking, as well as requirements for proposed message
tracking solutions.

A URL for this Internet-Draft is:
http://www.ietf.org/internet-drafts/draft-ietf-msgtrk-model-07.txt

To remove yourself from the IETF Announcement list, send a message to 
ietf-announce-request with the word unsubscribe in the body of the message.

Internet-Drafts are also available by anonymous FTP. Login with the username
"anonymous" and a password of your e-mail address. After logging in,
type "cd internet-drafts" and then
	"get draft-ietf-msgtrk-model-07.txt".

A list of Internet-Drafts directories can be found in
http://www.ietf.org/shadow.html 
or ftp://ftp.ietf.org/ietf/1shadow-sites.txt


Internet-Drafts can also be obtained by e-mail.

Send a message to:
	mailserv@ietf.org.
In the body type:
	"FILE /internet-drafts/draft-ietf-msgtrk-model-07.txt".
	
NOTE:	The mail server at ietf.org can return the document in
	MIME-encoded form by using the "mpack" utility.  To use this
	feature, insert the command "ENCODING mime" before the "FILE"
	command.  To decode the response(s), you will need "munpack" or
	a MIME-compliant mail reader.  Different MIME-compliant mail readers
	exhibit different behavior, especially when dealing with
	"multipart" MIME messages (i.e. documents which have been split
	up into multiple messages), so check your local documentation on
	how to manipulate these messages.
		
		
Below is the data which will enable a MIME compliant mail reader
implementation to automatically retrieve the ASCII version of the
Internet-Draft.

--NextPart
Content-Type: Multipart/Alternative; Boundary="OtherAccess"

--OtherAccess
Content-Type: Message/External-body;
	access-type="mail-server";
	server="mailserv@ietf.org"

Content-Type: text/plain
Content-ID:	<2002-10-25112704.I-D@ietf.org>

ENCODING mime
FILE /internet-drafts/draft-ietf-msgtrk-model-07.txt

--OtherAccess
Content-Type: Message/External-body;
	name="draft-ietf-msgtrk-model-07.txt";
	site="ftp.ietf.org";
	access-type="anon-ftp";
	directory="internet-drafts"

Content-Type: text/plain
Content-ID:	<2002-10-25112704.I-D@ietf.org>

--OtherAccess--

--NextPart--




