7 Network Working Group S. Josefsson
8 Request for Comments: 4648 SJD
9 Obsoletes: 3548 October 2006
10 Category: Standards Track
13 The Base16, Base32, and Base64 Data Encodings
17 This document specifies an Internet standards track protocol for the
18 Internet community, and requests discussion and suggestions for
19 improvements. Please refer to the current edition of the "Internet
20 Official Protocol Standards" (STD 1) for the standardization state
21 and status of this protocol. Distribution of this memo is unlimited.
25 Copyright (C) The Internet Society (2006).
29 This document describes the commonly used base 64, base 32, and base
30 16 encoding schemes. It also discusses the use of line-feeds in
31 encoded data, use of padding in encoded data, use of non-alphabet
32 characters in encoded data, use of different encoding alphabets, and
58 Josefsson Standards Track [Page 1]
60 RFC 4648 Base-N Encodings October 2006
65 1. Introduction ....................................................3
66 2. Conventions Used in This Document ...............................3
67 3. Implementation Discrepancies ....................................3
68 3.1. Line Feeds in Encoded Data .................................3
69 3.2. Padding of Encoded Data ....................................4
70 3.3. Interpretation of Non-Alphabet Characters in Encoded Data ..4
71 3.4. Choosing the Alphabet ......................................4
72 3.5. Canonical Encoding .........................................5
73 4. Base 64 Encoding ................................................5
74 5. Base 64 Encoding with URL and Filename Safe Alphabet ............7
75 6. Base 32 Encoding ................................................8
76 7. Base 32 Encoding with Extended Hex Alphabet ....................10
77 8. Base 16 Encoding ...............................................10
78 9. Illustrations and Examples .....................................11
79 10. Test Vectors ..................................................12
80 11. ISO C99 Implementation of Base64 ..............................14
81 12. Security Considerations .......................................14
82 13. Changes Since RFC 3548 ........................................15
83 14. Acknowledgements ..............................................15
84 15. Copying Conditions ............................................15
85 16. References ....................................................16
86 16.1. Normative References .....................................16
87 16.2. Informative References ...................................16
114 Josefsson Standards Track [Page 2]
116 RFC 4648 Base-N Encodings October 2006
121 Base encoding of data is used in many situations to store or transfer
122 data in environments that, perhaps for legacy reasons, are restricted
123 to US-ASCII [1] data. Base encoding can also be used in new
124 applications that do not have legacy restrictions, simply because it
125 makes it possible to manipulate objects with text editors.
127 In the past, different applications have had different requirements
128 and thus sometimes implemented base encodings in slightly different
129 ways. Today, protocol specifications sometimes use base encodings in
130 general, and "base64" in particular, without a precise description or
131 reference. Multipurpose Internet Mail Extensions (MIME) [4] is often
132 used as a reference for base64 without considering the consequences
133 for line-wrapping or non-alphabet characters. The purpose of this
134 specification is to establish common alphabet and encoding
135 considerations. This will hopefully reduce ambiguity in other
136 documents, leading to better interoperability.
138 2. Conventions Used in This Document
140 The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
141 "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
142 document are to be interpreted as described in [2].
144 3. Implementation Discrepancies
146 Here we discuss the discrepancies between base encoding
147 implementations in the past and, where appropriate, mandate a
148 specific recommended behavior for the future.
150 3.1. Line Feeds in Encoded Data
152 MIME [4] is often used as a reference for base 64 encoding. However,
153 MIME does not define "base 64" per se, but rather a "base 64 Content-
154 Transfer-Encoding" for use within MIME. As such, MIME enforces a
155 limit on line length of base 64-encoded data to 76 characters. MIME
156 inherits the encoding from Privacy Enhanced Mail (PEM) [3], stating
157 that it is "virtually identical"; however, PEM uses a line length of
158 64 characters. The MIME and PEM limits are both due to limits within
161 Implementations MUST NOT add line feeds to base-encoded data unless
162 the specification referring to this document explicitly directs base
163 encoders to add line feeds after a specific number of characters.
170 Josefsson Standards Track [Page 3]
172 RFC 4648 Base-N Encodings October 2006
175 3.2. Padding of Encoded Data
177 In some circumstances, the use of padding ("=") in base-encoded data
178 is not required or used. In the general case, when assumptions about
179 the size of transported data cannot be made, padding is required to
180 yield correct decoded data.
182 Implementations MUST include appropriate pad characters at the end of
183 encoded data unless the specification referring to this document
184 explicitly states otherwise.
186 The base64 and base32 alphabets use padding, as described below in
187 sections 4 and 6, but the base16 alphabet does not need it; see
190 3.3. Interpretation of Non-Alphabet Characters in Encoded Data
192 Base encodings use a specific, reduced alphabet to encode binary
193 data. Non-alphabet characters could exist within base-encoded data,
194 caused by data corruption or by design. Non-alphabet characters may
195 be exploited as a "covert channel", where non-protocol data can be
196 sent for nefarious purposes. Non-alphabet characters might also be
197 sent in order to exploit implementation errors leading to, e.g.,
198 buffer overflow attacks.
200 Implementations MUST reject the encoded data if it contains
201 characters outside the base alphabet when interpreting base-encoded
202 data, unless the specification referring to this document explicitly
203 states otherwise. Such specifications may instead state, as MIME
204 does, that characters outside the base encoding alphabet should
205 simply be ignored when interpreting data ("be liberal in what you
206 accept"). Note that this means that any adjacent carriage return/
207 line feed (CRLF) characters constitute "non-alphabet characters" and
208 are ignored. Furthermore, such specifications MAY ignore the pad
209 character, "=", treating it as non-alphabet data, if it is present
210 before the end of the encoded data. If more than the allowed number
211 of pad characters is found at the end of the string (e.g., a base 64
212 string terminated with "==="), the excess pad characters MAY also be
215 3.4. Choosing the Alphabet
217 Different applications have different requirements on the characters
218 in the alphabet. Here are a few requirements that determine which
219 alphabet should be used:
226 Josefsson Standards Track [Page 4]
228 RFC 4648 Base-N Encodings October 2006
231 o Handled by humans. The characters "0" and "O" are easily
232 confused, as are "1", "l", and "I". In the base32 alphabet below,
233 where 0 (zero) and 1 (one) are not present, a decoder may
234 interpret 0 as O, and 1 as I or L depending on case. (However, by
235 default it should not; see previous section.)
237 o Encoded into structures that mandate other requirements. For base
238 16 and base 32, this determines the use of upper- or lowercase
239 alphabets. For base 64, the non-alphanumeric characters (in
240 particular, "/") may be problematic in file names and URLs.
242 o Used as identifiers. Certain characters, notably "+" and "/" in
243 the base 64 alphabet, are treated as word-breaks by legacy text
246 There is no universally accepted alphabet that fulfills all the
247 requirements. For an example of a highly specialized variant, see
248 IMAP [8]. In this document, we document and name some currently used
251 3.5. Canonical Encoding
253 The padding step in base 64 and base 32 encoding can, if improperly
254 implemented, lead to non-significant alterations of the encoded data.
255 For example, if the input is only one octet for a base 64 encoding,
256 then all six bits of the first symbol are used, but only the first
257 two bits of the next symbol are used. These pad bits MUST be set to
258 zero by conforming encoders, which is described in the descriptions
259 on padding below. If this property do not hold, there is no
260 canonical representation of base-encoded data, and multiple base-
261 encoded strings can be decoded to the same binary data. If this
262 property (and others discussed in this document) holds, a canonical
263 encoding is guaranteed.
265 In some environments, the alteration is critical and therefore
266 decoders MAY chose to reject an encoding if the pad bits have not
267 been set to zero. The specification referring to this may mandate a
272 The following description of base 64 is derived from [3], [4], [5],
273 and [6]. This encoding may be referred to as "base64".
275 The Base 64 encoding is designed to represent arbitrary sequences of
276 octets in a form that allows the use of both upper- and lowercase
277 letters but that need not be human readable.
282 Josefsson Standards Track [Page 5]
284 RFC 4648 Base-N Encodings October 2006
287 A 65-character subset of US-ASCII is used, enabling 6 bits to be
288 represented per printable character. (The extra 65th character, "=",
289 is used to signify a special processing function.)
291 The encoding process represents 24-bit groups of input bits as output
292 strings of 4 encoded characters. Proceeding from left to right, a
293 24-bit input group is formed by concatenating 3 8-bit input groups.
294 These 24 bits are then treated as 4 concatenated 6-bit groups, each
295 of which is translated into a single character in the base 64
298 Each 6-bit group is used as an index into an array of 64 printable
299 characters. The character referenced by the index is placed in the
302 Table 1: The Base 64 Alphabet
304 Value Encoding Value Encoding Value Encoding Value Encoding
319 14 O 31 f 48 w (pad) =
323 Special processing is performed if fewer than 24 bits are available
324 at the end of the data being encoded. A full encoding quantum is
325 always completed at the end of a quantity. When fewer than 24 input
326 bits are available in an input group, bits with value zero are added
327 (on the right) to form an integral number of 6-bit groups. Padding
328 at the end of the data is performed using the '=' character. Since
329 all base 64 input is an integral number of octets, only the following
332 (1) The final quantum of encoding input is an integral multiple of 24
333 bits; here, the final unit of encoded output will be an integral
334 multiple of 4 characters with no "=" padding.
338 Josefsson Standards Track [Page 6]
340 RFC 4648 Base-N Encodings October 2006
343 (2) The final quantum of encoding input is exactly 8 bits; here, the
344 final unit of encoded output will be two characters followed by
345 two "=" padding characters.
347 (3) The final quantum of encoding input is exactly 16 bits; here, the
348 final unit of encoded output will be three characters followed by
349 one "=" padding character.
351 5. Base 64 Encoding with URL and Filename Safe Alphabet
353 The Base 64 encoding with an URL and filename safe alphabet has been
356 An alternative alphabet has been suggested that would use "~" as the
357 63rd character. Since the "~" character has special meaning in some
358 file system environments, the encoding described in this section is
359 recommended instead. The remaining unreserved URI character is ".",
360 but some file system environments do not permit multiple "." in a
361 filename, thus making the "." character unattractive as well.
363 The pad character "=" is typically percent-encoded when used in an
364 URI [9], but if the data length is known implicitly, this can be
365 avoided by skipping the padding; see section 3.2.
367 This encoding may be referred to as "base64url". This encoding
368 should not be regarded as the same as the "base64" encoding and
369 should not be referred to as only "base64". Unless clarified
370 otherwise, "base64" refers to the base 64 in the previous section.
372 This encoding is technically identical to the previous one, except
373 for the 62:nd and 63:rd alphabet character, as indicated in Table 2.
394 Josefsson Standards Track [Page 7]
396 RFC 4648 Base-N Encodings October 2006
399 Table 2: The "URL and Filename safe" Base 64 Alphabet
401 Value Encoding Value Encoding Value Encoding Value Encoding
413 11 L 28 c 45 t 62 - (minus)
415 13 N 30 e 47 v (underline)
418 16 Q 33 h 50 y (pad) =
422 The following description of base 32 is derived from [11] (with
423 corrections). This encoding may be referred to as "base32".
425 The Base 32 encoding is designed to represent arbitrary sequences of
426 octets in a form that needs to be case insensitive but that need not
429 A 33-character subset of US-ASCII is used, enabling 5 bits to be
430 represented per printable character. (The extra 33rd character, "=",
431 is used to signify a special processing function.)
433 The encoding process represents 40-bit groups of input bits as output
434 strings of 8 encoded characters. Proceeding from left to right, a
435 40-bit input group is formed by concatenating 5 8bit input groups.
436 These 40 bits are then treated as 8 concatenated 5-bit groups, each
437 of which is translated into a single character in the base 32
438 alphabet. When a bit stream is encoded via the base 32 encoding, the
439 bit stream must be presumed to be ordered with the most-significant-
440 bit first. That is, the first bit in the stream will be the high-
441 order bit in the first 8bit byte, the eighth bit will be the low-
442 order bit in the first 8bit byte, and so on.
450 Josefsson Standards Track [Page 8]
452 RFC 4648 Base-N Encodings October 2006
455 Each 5-bit group is used as an index into an array of 32 printable
456 characters. The character referenced by the index is placed in the
457 output string. These characters, identified in Table 3, below, are
458 selected from US-ASCII digits and uppercase letters.
460 Table 3: The Base 32 Alphabet
462 Value Encoding Value Encoding Value Encoding Value Encoding
469 6 G 15 P 24 Y (pad) =
473 Special processing is performed if fewer than 40 bits are available
474 at the end of the data being encoded. A full encoding quantum is
475 always completed at the end of a body. When fewer than 40 input bits
476 are available in an input group, bits with value zero are added (on
477 the right) to form an integral number of 5-bit groups. Padding at
478 the end of the data is performed using the "=" character. Since all
479 base 32 input is an integral number of octets, only the following
482 (1) The final quantum of encoding input is an integral multiple of 40
483 bits; here, the final unit of encoded output will be an integral
484 multiple of 8 characters with no "=" padding.
486 (2) The final quantum of encoding input is exactly 8 bits; here, the
487 final unit of encoded output will be two characters followed by
488 six "=" padding characters.
490 (3) The final quantum of encoding input is exactly 16 bits; here, the
491 final unit of encoded output will be four characters followed by
492 four "=" padding characters.
494 (4) The final quantum of encoding input is exactly 24 bits; here, the
495 final unit of encoded output will be five characters followed by
496 three "=" padding characters.
498 (5) The final quantum of encoding input is exactly 32 bits; here, the
499 final unit of encoded output will be seven characters followed by
500 one "=" padding character.
506 Josefsson Standards Track [Page 9]
508 RFC 4648 Base-N Encodings October 2006
511 7. Base 32 Encoding with Extended Hex Alphabet
513 The following description of base 32 is derived from [7]. This
514 encoding may be referred to as "base32hex". This encoding should not
515 be regarded as the same as the "base32" encoding and should not be
516 referred to as only "base32". This encoding is used by, e.g.,
517 NextSECure3 (NSEC3) [10].
519 One property with this alphabet, which the base64 and base32
520 alphabets lack, is that encoded data maintains its sort order when
521 the encoded data is compared bit-wise.
523 This encoding is identical to the previous one, except for the
524 alphabet. The new alphabet is found in Table 4.
526 Table 4: The "Extended Hex" Base 32 Alphabet
528 Value Encoding Value Encoding Value Encoding Value Encoding
535 6 6 15 F 24 O (pad) =
541 The following description is original but analogous to previous
542 descriptions. Essentially, Base 16 encoding is the standard case-
543 insensitive hex encoding and may be referred to as "base16" or "hex".
545 A 16-character subset of US-ASCII is used, enabling 4 bits to be
546 represented per printable character.
548 The encoding process represents 8-bit groups (octets) of input bits
549 as output strings of 2 encoded characters. Proceeding from left to
550 right, an 8-bit input is taken from the input data. These 8 bits are
551 then treated as 2 concatenated 4-bit groups, each of which is
552 translated into a single character in the base 16 alphabet.
554 Each 4-bit group is used as an index into an array of 16 printable
555 characters. The character referenced by the index is placed in the
562 Josefsson Standards Track [Page 10]
564 RFC 4648 Base-N Encodings October 2006
567 Table 5: The Base 16 Alphabet
569 Value Encoding Value Encoding Value Encoding Value Encoding
575 Unlike base 32 and base 64, no special padding is necessary since a
576 full code word is always available.
578 9. Illustrations and Examples
580 To translate between binary and a base encoding, the input is stored
581 in a structure, and the output is extracted. The case for base 64 is
582 displayed in the following figure, borrowed from [5].
584 +--first octet--+-second octet--+--third octet--+
585 |7 6 5 4 3 2 1 0|7 6 5 4 3 2 1 0|7 6 5 4 3 2 1 0|
586 +-----------+---+-------+-------+---+-----------+
587 |5 4 3 2 1 0|5 4 3 2 1 0|5 4 3 2 1 0|5 4 3 2 1 0|
588 +--1.index--+--2.index--+--3.index--+--4.index--+
590 The case for base 32 is shown in the following figure, borrowed from
591 [7]. Each successive character in a base-32 value represents 5
592 successive bits of the underlying octet sequence. Thus, each group
593 of 8 characters represents a sequence of 5 octets (40 bits).
596 01234567 89012345 67890123 45678901 23456789
597 +--------+--------+--------+--------+--------+
598 |< 1 >< 2| >< 3 ><|.4 >< 5.|>< 6 ><.|7 >< 8 >|
599 +--------+--------+--------+--------+--------+
618 Josefsson Standards Track [Page 11]
620 RFC 4648 Base-N Encodings October 2006
623 The following example of Base64 data is from [5], with corrections.
625 Input data: 0x14fb9c03d97e
626 Hex: 1 4 f b 9 c | 0 3 d 9 7 e
627 8-bit: 00010100 11111011 10011100 | 00000011 11011001 01111110
628 6-bit: 000101 001111 101110 011100 | 000000 111101 100101 111110
629 Decimal: 5 15 46 28 0 61 37 62
630 Output: F P u c A 9 l +
632 Input data: 0x14fb9c03d9
633 Hex: 1 4 f b 9 c | 0 3 d 9
634 8-bit: 00010100 11111011 10011100 | 00000011 11011001
636 6-bit: 000101 001111 101110 011100 | 000000 111101 100100
637 Decimal: 5 15 46 28 0 61 36
639 Output: F P u c A 9 k =
641 Input data: 0x14fb9c03
642 Hex: 1 4 f b 9 c | 0 3
643 8-bit: 00010100 11111011 10011100 | 00000011
645 6-bit: 000101 001111 101110 011100 | 000000 110000
646 Decimal: 5 15 46 28 0 48
648 Output: F P u c A w = =
656 BASE64("fo") = "Zm8="
658 BASE64("foo") = "Zm9v"
660 BASE64("foob") = "Zm9vYg=="
662 BASE64("fooba") = "Zm9vYmE="
664 BASE64("foobar") = "Zm9vYmFy"
668 BASE32("f") = "MY======"
670 BASE32("fo") = "MZXQ===="
674 Josefsson Standards Track [Page 12]
676 RFC 4648 Base-N Encodings October 2006
679 BASE32("foo") = "MZXW6==="
681 BASE32("foob") = "MZXW6YQ="
683 BASE32("fooba") = "MZXW6YTB"
685 BASE32("foobar") = "MZXW6YTBOI======"
689 BASE32-HEX("f") = "CO======"
691 BASE32-HEX("fo") = "CPNG===="
693 BASE32-HEX("foo") = "CPNMU==="
695 BASE32-HEX("foob") = "CPNMUOG="
697 BASE32-HEX("fooba") = "CPNMUOJ1"
699 BASE32-HEX("foobar") = "CPNMUOJ1E8======"
705 BASE16("fo") = "666F"
707 BASE16("foo") = "666F6F"
709 BASE16("foob") = "666F6F62"
711 BASE16("fooba") = "666F6F6261"
713 BASE16("foobar") = "666F6F626172"
730 Josefsson Standards Track [Page 13]
732 RFC 4648 Base-N Encodings October 2006
735 11. ISO C99 Implementation of Base64
737 An ISO C99 implementation of Base64 encoding and decoding that is
738 believed to follow all recommendations in this RFC is available from:
740 http://josefsson.org/base-encoding/
742 This code is not normative.
744 The code could not be included in this RFC for procedural reasons
745 (RFC 3978 section 5.4).
747 12. Security Considerations
749 When base encoding and decoding is implemented, care should be taken
750 not to introduce vulnerabilities to buffer overflow attacks, or other
751 attacks on the implementation. A decoder should not break on invalid
752 input including, e.g., embedded NUL characters (ASCII 0).
754 If non-alphabet characters are ignored, instead of causing rejection
755 of the entire encoding (as recommended), a covert channel that can be
756 used to "leak" information is made possible. The ignored characters
757 could also be used for other nefarious purposes, such as to avoid a
758 string equality comparison or to trigger implementation bugs. The
759 implications of ignoring non-alphabet characters should be understood
760 in applications that do not follow the recommended practice.
761 Similarly, when the base 16 and base 32 alphabets are handled case
762 insensitively, alteration of case can be used to leak information or
763 make string equality comparisons fail.
765 When padding is used, there are some non-significant bits that
766 warrant security concerns, as they may be abused to leak information
767 or used to bypass string equality comparisons or to trigger
768 implementation problems.
770 Base encoding visually hides otherwise easily recognized information,
771 such as passwords, but does not provide any computational
772 confidentiality. This has been known to cause security incidents
773 when, e.g., a user reports details of a network protocol exchange
774 (perhaps to illustrate some other problem) and accidentally reveals
775 the password because she is unaware that the base encoding does not
776 protect the password.
778 Base encoding adds no entropy to the plaintext, but it does increase
779 the amount of plaintext available and provide a signature for
780 cryptanalysis in the form of a characteristic probability
786 Josefsson Standards Track [Page 14]
788 RFC 4648 Base-N Encodings October 2006
791 13. Changes Since RFC 3548
793 Added the "base32 extended hex alphabet", needed to preserve sort
794 order of encoded data.
796 Referenced IMAP for the special Base64 encoding used there.
798 Fixed the example copied from RFC 2440.
800 Added security consideration about providing a signature for
809 Several people offered comments and/or suggestions, including John E.
810 Hadstate, Tony Hansen, Gordon Mohr, John Myers, Chris Newman, and
811 Andrew Sieber. Text used in this document are based on earlier RFCs
812 describing specific uses of various base encodings. The author
813 acknowledges the RSA Laboratories for supporting the work that led to
816 This revised version is based in parts on comments and/or suggestions
817 made by Roy Arends, Eric Blake, Brian E Carpenter, Elwyn Davies, Bill
818 Fenner, Sam Hartman, Ted Hardie, Per Hygum, Jelte Jansen, Clement
819 Kent, Tero Kivinen, Paul Kwiatkowski, and Ben Laurie.
821 15. Copying Conditions
823 Copyright (c) 2000-2006 Simon Josefsson
825 Regarding the abstract and sections 1, 3, 8, 10, 12, 13, and 14 of
826 this document, that were written by Simon Josefsson ("the author",
827 for the remainder of this section), the author makes no guarantees
828 and is not responsible for any damage resulting from its use. The
829 author grants irrevocable permission to anyone to use, modify, and
830 distribute it in any way that does not diminish the rights of anyone
831 else to use, modify, and distribute it, provided that redistributed
832 derivative works do not contain misleading author or version
833 information and do not falsely purport to be IETF RFC documents.
834 Derivative works need not be licensed under similar terms.
842 Josefsson Standards Track [Page 15]
844 RFC 4648 Base-N Encodings October 2006
849 16.1. Normative References
851 [1] Cerf, V., "ASCII format for network interchange", RFC 20,
854 [2] Bradner, S., "Key words for use in RFCs to Indicate Requirement
855 Levels", BCP 14, RFC 2119, March 1997.
857 16.2. Informative References
859 [3] Linn, J., "Privacy Enhancement for Internet Electronic Mail:
860 Part I: Message Encryption and Authentication Procedures", RFC
863 [4] Freed, N. and N. Borenstein, "Multipurpose Internet Mail
864 Extensions (MIME) Part One: Format of Internet Message Bodies",
865 RFC 2045, November 1996.
867 [5] Callas, J., Donnerhacke, L., Finney, H., and R. Thayer,
868 "OpenPGP Message Format", RFC 2440, November 1998.
870 [6] Arends, R., Austein, R., Larson, M., Massey, D., and S. Rose,
871 "DNS Security Introduction and Requirements", RFC 4033, March
874 [7] Klyne, G. and L. Masinter, "Identifying Composite Media
875 Features", RFC 2938, September 2000.
877 [8] Crispin, M., "INTERNET MESSAGE ACCESS PROTOCOL - VERSION
878 4rev1", RFC 3501, March 2003.
880 [9] Berners-Lee, T., Fielding, R., and L. Masinter, "Uniform
881 Resource Identifier (URI): Generic Syntax", STD 66, RFC 3986,
884 [10] Laurie, B., Sisson, G., Arends, R., and D. Blacka, "DNSSEC Hash
885 Authenticated Denial of Existence", Work in Progress, June
888 [11] Myers, J., "SASL GSSAPI mechanisms", Work in Progress, May
891 [12] Wilcox-O'Hearn, B., "Post to P2P-hackers mailing list",
892 http://zgp.org/pipermail/p2p-hackers/2001-September/
893 000315.html, September 2001.
898 Josefsson Standards Track [Page 16]
900 RFC 4648 Base-N Encodings October 2006
907 EMail: simon@josefsson.org
954 Josefsson Standards Track [Page 17]
956 RFC 4648 Base-N Encodings October 2006
959 Full Copyright Statement
961 Copyright (C) The Internet Society (2006).
963 This document is subject to the rights, licenses and restrictions
964 contained in BCP 78, and except as set forth therein, the authors
965 retain all their rights.
967 This document and the information contained herein are provided on an
968 "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
969 OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET
970 ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED,
971 INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE
972 INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
973 WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
975 Intellectual Property
977 The IETF takes no position regarding the validity or scope of any
978 Intellectual Property Rights or other rights that might be claimed to
979 pertain to the implementation or use of the technology described in
980 this document or the extent to which any license under such rights
981 might or might not be available; nor does it represent that it has
982 made any independent effort to identify any such rights. Information
983 on the procedures with respect to rights in RFC documents can be
984 found in BCP 78 and BCP 79.
986 Copies of IPR disclosures made to the IETF Secretariat and any
987 assurances of licenses to be made available, or the result of an
988 attempt made to obtain a general license or permission for the use of
989 such proprietary rights by implementers or users of this
990 specification can be obtained from the IETF on-line IPR repository at
991 http://www.ietf.org/ipr.
993 The IETF invites any interested party to bring to its attention any
994 copyrights, patents or patent applications, or other proprietary
995 rights that may cover technology that may be required to implement
996 this standard. Please address the information to the IETF at
1001 Funding for the RFC Editor function is provided by the IETF
1002 Administrative Support Activity (IASA).
1010 Josefsson Standards Track [Page 18]