Internet Draft Benoit de Boursetty
Document: Florent Bersani
draft-boursetty-eap-cst-00.txt France Telecom R&D
Expires: September 2003 March 2003
EAP client-side transport
<draft-boursetty-eap-cst-00.txt>
Status of this Memo
This document is an Internet-Draft and is in full conformance with
all provisions of Section 10 of RFC 2026.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that other
groups may also distribute working documents as Internet-Drafts.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt
The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html.
Abstract
This document defines a new architecture on the client-side for
authentication by EAP. This architecture complements the usual setup
considered in EAP by making it become symmetric: the client-side is
divided in two parts, the Authentication Token and the client, which
are analogous respectively to the Authentication Server and the
Authenticator on the server-side. Moreover, this document describes a
framework for the use of Authentication Tokens with the EAP protocol.
Boursetty and Bersani Expires - September 2003 [Page 1]
EAP client-side transport March 2003
Table of Contents
1. Introduction...................................................2
1.1 Reminder of a Typical EAP Setup............................2
1.2 Purpose of this draft......................................3
1.3 Requirements language......................................4
1.4 Terminology................................................4
1.5 Related work...............................................5
2. Architecture...................................................6
2.1 Overall Architecture.......................................6
2.2 Protocol stack.............................................7
3. Rationale for our proposal.....................................8
3.1 Security on the client side................................8
3.2 Flexibility on the Client side.............................8
3.3 Ease of deployment of the authentication method............9
4. Protocol specifications.......................................10
4.1 EAP-CST (EAP Client-Side Transport).......................10
4.2 EAP-CST-LDA (EAP-CST Link-layer Dependent Adaptation).....11
5. Example.......................................................11
6. Provisions for the evolution of EAP-CST.......................13
6.1 MK and MSK transport between AuthToken and Client.........13
6.2 Initialization of the authentication......................13
7. Security Considerations.......................................13
Acknowledgements.................................................14
References.......................................................14
Authors' Addresses...............................................16
1. Introduction
1.1 Reminder of a Typical EAP Setup
Let us begin this draft with a reminder of a typical EAP Setup. For a
more detailed description, the reader is referred to [1].
+--------+ +--------+
| Client | | NAS |
| +--( Access Network )--+ +-----( Target Network )
+--------+ +----+---+
|
|
+----+----+
| AAA |
| Server |
+---------+
Fig. 1 รป A typical EAP Setup
Boursetty and Bersani Expires - September 2003 [Page 2]
EAP client-side transport March 2003
As represented on Fig 1., a client wants to connect to a Target
Network through a Network Access Server (NAS), which is first reached
via an Access Network (e.g. 802.11 [6]). The NAS requires
authentication using EAP [2,3] from the client, but it does not
perform authentication itself. It instead relays EAP authentication
exchanges to an AAA server (e.g. using the RADIUS protocol [4]).
After a successful authentication, an EAP Master Key (MK) may be
shared between the AAA Server and the Client, depending on the EAP
Method used. An example of EAP Method providing MK establishment is
EAP-TLS [5].
The data encryption or integrity protocol between the client and the
NAS that is used after the authentication (e.g. WEP, TKIP or CCMP
[6,7]) will use keying material which is termed in [1] the Master
Session Key (MSK). This MSK may be provided by the AAA server or
derived from the MK.
Since the NAS does not know this keying material right after the
authentication procedure, it needs to be transmitted from the AAA.
This problem is explained for PPP [8] in section 6.2 of [4]. In [1],
the data containing keying material transferred from the AAA server
to the NAS is called the AN-Token. Transport from the AAA server to
the NAS is sometimes dealt with, when using RADIUS, by using MS-MPPE-
Send-Key and MS-MPPE-Recv-Key between the NAS and the RADIUS server
as described in [9]. RADIUS Support For Extensible Authentication
Protocol (EAP) is dealt with in [10].
We want to stress the separation on the server-side between
authentication and its later use. In this setup, authentication is
performed between the Client and the AAA Server, but it is used
between the Client and the NAS.
1.2 Purpose of this draft
We propose in this draft a client-side mechanism which also separates
authentication from its later use (for instance, session keys used to
encrypt the communications between the NAS and the client).
We would additionally like to provide the basis for an interoperable
framework for the use of Authentication Tokens with EAP.
We however do not intend to define a general transaction protocol on
the client side. A typical use case for such a transaction protocol
is the following: the user wants to digitally sign an e-mail that he
wrote on his laptop but his credentials are stored on his mobile
phone. The transaction protocol would handle the communication
between the laptop and the mobile phone so as to deliver the expected
Boursetty and Bersani Expires - September 2003 [Page 3]
EAP client-side transport March 2003
service. Such a protocol is outside of our scope: our sole purpose is
to enhance EAP's typical setup on the client-side.
1.3 Requirements language
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in RFC-2119 [11].
1.4 Terminology
AN-Token
This terminology is defined in [1] and has the same meaning in this
document.
Client and Server
Two main entities are considered in this draft: the Client and the
Server. These two entities communicate with one another. The Client
initiates the dialog to the Server. In this document, the Client and
the Server wish to authenticate to each other, mutually or not. The
Client and the Server may then wish to use cryptographic
confidentiality and integrity protection mechanisms to safeguard
their communications.
We adopt this terminology of "Client" and "Server", although in [1]
the corresponding notions would be called "Client" and "NAS". This is
to abstract our work from the network access control problem to
address other sorts of access control, between any client and server.
Authentication Server (AuthServer or AS)
An Authentication Server is an entity that provides an authentication
service to the Server. Most implementations would probably feature
Authorization and Accounting, making it an AAA server. But this is
not mandatory for the purpose of this draft.
Authentication Token (AuthToken or AT)
An Authentication Token is a device which a Client can use to prove
its identity and gain access to services suchas network services or
application services.
An Authentication Token not only stores the user's credentials but
also handles the authentication protocol and provides additional
management features like enabling multiple identities to be stored on
the same Token. In addition, Authentication Tokens have the ability
to communicate with other devices. A token card without a
communication port shall therefore not be considered an
Authentication Token in this draft.
Boursetty and Bersani Expires - September 2003 [Page 4]
EAP client-side transport March 2003
Authentication Tokens may be for instance: smart cards, token cards,
mobile phones or even laptops. An instance of Authentication Token is
the smart card performing EAP as presented in [12].
1.5 Related work
Our work is closely related to [12].
The approach of [12] is to perform end-to-end authentication between
a smart card and an AAA Server, then transmit session keys (fragments
of the MSK) from the smart card to the authenticating device which
will then be communicating with the NAS using these session keys for
security.
The main value of this approach is to lower the risk of fraud. When
secrets are stored on a device like a PC, historically known to be
prone to Trojan horses, they can easily be misused without the
legitimate user noticing it. Also, the memory of a "borrowed" PC
(e.g. hard drives) can be read with little time and investment. Thus,
by keeping the secrets on a secure authentication Token hardened
against Trojan horse and physical attacks, the overall fraud risk is
lowered.
Acknowledging the value of this approach, we propose an architecture
that generalizes it in several ways.
First, we would like to broaden the scope and not be restricted to
smart cards. An Authentication Token might well be, for instance, a
mobile phone regardless of whether a smart card (like the GSM SIM) is
present in the mobile phone. We would therefore like to specify a
more general protocol that would enable EAP exchanges to be relayed
from a Client to an Authentication Token.
Second, we wish to split this protocol in two sublayers: a logical
sublayer, independent of the networking technology used to link the
Authentication Token to the Client, and a physical sublayer taking
care of the adaptation to the particular technology used. To take
[12] as an example, this would imply separating the four abstract
primitives used (EAP-Packet, Get-Next-Identity, Set-Identity, Get-
PairwiseMasterKey) from the specific ISO 7816-4 case.
In our approach, we make a clear distinction between the link used by
the Authentication Token and the Client (in [12], ISO 7816-4) and the
Token itself (in [12], a smart card). Thanks to our approach, the
same Authentication Token (e.g. a mobile phone) can be used with
various links (e.g. Infra-red or Bluetooth). Similarly, the same link
(e.g. Bluetooth) can be used by different Authentication Tokens (e.g.
a Linux PDA or a Java phone).
Boursetty and Bersani Expires - September 2003 [Page 5]
EAP client-side transport March 2003
2. Architecture
2.1 Overall Architecture
The architecture that we define is represented on Fig. 2.
+---------+ +----------+
|AuthToken| <====== Authentication ======> |AuthServer|
+----+----+ +-----+----+
| Integrity & |
| +------------+ <= Encryption => +-----------+ |
'----+ Client |------------------+ Server +-'
+------------+ +-----------+
Fig. 2. A new EAP setup
A Client and a Server want to communicate with each other (e.g. a
client laptop and an 802.11 Access Point).
At some point, authentication needs to be performed between the
Client and the Server. This authentication is delegated on the
client-side to an Authentication Token (AuthToken), and on the
server-side to an Authentication Server (AuthServer).
Authentication then takes place using EAP between the Authentication
Token and the Authentication Server at the logical level, while the
Client and the Server simply relay exchanges between the two, such as
Challenges, Responses, etc.
Optionally, an EAP Master Key (MK) is derived during the
authentication phase. At the end of this phase, the MK is shared
between the Authentication Token and the Authentication Server.
If the Client and the Server then wish to establish a secure link,
they need to share some keying material. This keying material derives
from the MSK that is provided either by derivation from the MK or by
the Authentication Server (depending on the particular EAP method
used).
The Client and the Server then use the MSK (more precisely the TSK
derived from the MSK) to encrypt and integrity-protect their
communications in a service-specific way.
The setup that we propose in Fig. 2 makes the typical setup of Fig. 1
become symmetric. In Fig 2, the client of Fig 1. has been split up in
two parts (the Authentication Token and the Client), the NAS has
become the Server and the AAA Server, the Authentication Server.
Boursetty and Bersani Expires - September 2003 [Page 6]
EAP client-side transport March 2003
2.2 Protocol stack
The protocol stack defined for our architecture is represented on
Fig. 3.
+------------+
| EAP-X |<== Authentication to the AuthServer =>
+------------+ +------------++--------+ +--------++--------+
| EAP | | EAP || EAP | | EAP || EAP |
+------------+ +------------++--------+ +--------++--------+
| EAP-CST | | EAP-CST || | | || EAP |
+------------+ +------------+|Service | |Service || over |
|EAP-CST-LDA | |EAP-CST-LDA ||Protocol| |Protocol|| AAA |
+------------+ +------------+| | | |+--------+
| Local link |---| Local link || +-------+ || AAA |
+------------+ +------------++--------+ +--------++--------+
AuthToken Client Server
Fig. 3(a). Protocol stack on the client side
+---------+
<= Authentication from the AuthToken => | EAP-X |
+--------++--------+ +---------+
| EAP || EAP | | EAP |
+--------++--------+ +---------+
| || EAP | | EAP |
|Service || over | + over |
|Protocol|| AAA | | AAA |
| |+--------+ +---------+
| || AAA |----------------------------| AAA |
+--------++--------+ +---------+
Server AuthServer
Fig. 3(b). Protocol stack on the server side
It is assumed that the Server and the Client authenticate each other
using EAP.
EAP is used to encapsulate a given method represented on Fig. 3. as
EAP-X, for instance EAP-TLS. Any method can be used there (e.g. EAP-
SIM [13], EAP-TLS, ...).
The layer represented as "Service Protocol" is an abstract layer,
that is to say that its choice does not have any importance for the
definition of our architecture. It could be instantiated for example
by EAPoverLAN over 802.3 [14], or by PPP over a serial line.
Boursetty and Bersani Expires - September 2003 [Page 7]
EAP client-side transport March 2003
Similarly, it is not relevant to specify the AAA and EAP-over-AAA
protocols for the purpose of this Draft.
The two layers that we define in this document are EAP-CST (which
stands for EAP Client-Side Transport) and EAP-CST-LDA (which stands
for EAP-CST Link-layer Dependent Adaptation).
3. Rationale for our proposal
In our opinion, the benefits of our approach are:
a. Security on the client side.
b. Flexibility on the client side.
c. Ease of deployment of the authentication method.
Additionally, when compared to [12], our approach enhances the
security of the client's credentials. Although smart cards provide
good protection against physical attacks, they provide little
protection so far against Trojan horses on the host to which they are
connected. It is easier to provide security against these threats by
encapsulating the smart card in a component which can be hardened
against Trojan horses more efficiently than a PC, e.g. a mobile
phone.
3.1 Security on the client side
Thanks to an adequate Authentication Token, it will be harder for an
attacker to steal the client's credentials, to use them without his
consent, to destroy them or to make them unusable.
For instance, if a Trojan horse on the host to which a smartcard is
connected performs enough wrong PIN entries, it may block that
smartcard. Alternatively, if a Trojan horse knew the user's PIN code
(for example by keylogging previous PIN entries), it could relay the
smartcard's capabilities to an outside attacker.
By placing a smartcard inside an Authentication Token which has a
User Interface, and only performs authentication once the User
Interface has been properly activated, the risk can greatly be
reduced. For instance, an Authentication Token may be a closed OS
device featuring a keyboard for PIN entry and comprising a smart
card; PIN entry being performed locally to the Authentication Token,
a Trojan horse located on a different host would have no way of
keylogging the PIN or entering it secretly to the smartcard
unbeknownst to the user.
3.2 Flexibility on the Client side
Boursetty and Bersani Expires - September 2003 [Page 8]
EAP client-side transport March 2003
The same Client (e.g. a laptop) supports a wide range of
authentication Tokens (mobile phone, smart card, Token card...).
The client will be able to use at his/her convenience a wide range of
media for authentication transport (Bluetooth, Ir, etc.).
The client will be able to authenticate to multiple services
simultaneously (e.g. cellular and WLAN services).
The client won't have to do any cumbersome manipulation (e.g. taking
the SIM out of a GSM mobile phone to plug it into an appropriate
reader on his laptop, when the GSM mobile phone could instead act as
an Authentication Token for the laptop).
3.3 Ease of deployment of the authentication method
Only the Authentication Token needs to implement the EAP method, not
the Client. This may simplify the user configuration: for instance,
no specific adjustments would need to be made to a user's laptop when
an EAP method upgrade is performed.
Boursetty and Bersani Expires - September 2003 [Page 9]
EAP client-side transport March 2003
4. Protocol specifications
These sections should be completed in future versions of this draft.
4.1 EAP-CST (EAP Client-Side Transport)
The following specification of EAP-CST is currently only at the
functional level. In the future, the definition of the primitives
below shall be completed by parameter syntax and more precise
semantics.
EAP-CST includes the following primitives, exchanged between
AuthToken (AT) and the Client (C).
Primitive name Direction Description
====================================================================
EAP-Packet AT <-> C Relay an EAP packet
--------------------------------------------------------------------
Auth-Status AT --> C Indicate the success or failure of the
authentication. If successful, a
MasterSessionKey-Give message may
follow
--------------------------------------------------------------------
MasterSessionKey- AT --> C Transmit the Master Session Key
Give generated by the last authentication,
if successful
--------------------------------------------------------------------
IdentityList-Get AT <-- C Request a list of identities supported
by the Authentication Token
--------------------------------------------------------------------
IdentityList-Give AT --> C Give a list of supported identities
--------------------------------------------------------------------
Identity-Select AT <-> C Select an identity for use for the next
authentication
--------------------------------------------------------------------
Prompt-Request AT --> C Request an entry from the user (e.g.
"Please enter your PIN code")
--------------------------------------------------------------------
Prompt-Answer AT <-- C Give the user's response to a Prompt
request.
--------------------------------------------------------------------
Control-Start AT <-> C Require the start of a session
--------------------------------------------------------------------
Control-Stop AT <-> C Close the current session
--------------------------------------------------------------------
Boursetty and Bersani Expires - September 2003 [Page 10]
EAP client-side transport March 2003
4.2 EAP-CST-LDA (EAP-CST Link-layer Dependent Adaptation)
EAP-CST-LDA may be specified in future versions of this draft, or in
separate drafts. It will define a mapping of the abstract primitives
of EAP-CST to actual data exchanges on the local link layer.
EAP-CST-LDA will also be responsible for ensuring security; to take
an example where EAP-CST-LDA would be required to provide security,
the unprotected client-side transport of EAP over an IrCOMM link
would not be protected against eavesdropping; an attacker would be
able to learn the session key from listening to SessionKey-Response
messages. In this case, EAP-CST-LDA would be required to add a
security mechanism similar to the BlueTooth pairing mechanism.
5. Example
Let us illustrate our architecture with a use case: Alice ("A") wants
to connect to an 802.11 wireless LAN using her mobile phone as an
Authentication Token. A's Wireless Internet Service Provider
authenticates its users through a RADIUS server interrogated by
wireless Access Points.
This example is an instance of the above architecture, with the
following mapping:
* AuthToken = A's mobile phone
* Client = A's laptop
* Server = the wireless Access Point A wishes to use
* AuthServer = the wireless ISP's RADIUS server.
The local link layer is a BlueTooth pseudo-serial link [15]. The
"Service Protocol" abstract layer is 802.1x.
At first, the Access Point will require A to provide her identity and
start an authentication session with the RADIUS server.
Boursetty and Bersani Expires - September 2003 [Page 11]
EAP client-side transport March 2003
A's Mobile Phone A's Laptop Access Point RADIUS
AuthToken Client Server AuthServer
| | | |
| | EAP-Request/Identity | |
| |<---------------------| |
| EAP-Request/Identity| | |
|<--------------------| | |
| | | |
| EAP-Respon./Identity| | |
|-------------------->| | |
| | | |
| | EAP-Respon./Identity | |
| |--------------------->| EAP-Respon./Id. |
| | |----------------->|
The Wireless ISP's RADIUS server then starts an EAP method (EAP-SIM
for instance)
A's Mobile Phone A's Laptop Access Point RADIUS
AuthToken Client Server AuthServer
| | | |
| | |EAP-Req./SIM/Start|
| | |<-----------------|
| | EAP-Request/SIM/Start| |
| |<---------------------| |
| EAP-Req./SIM/Start | | |
|<--------------------| | |
The EAP-SIM dialog continues between the Wireless ISP's RADIUS and
A's mobile phone, relayed by the Access Point and A's laptop, until
the RADIUS issues an EAP-Success message. During this phase, A's
mobile phone may ask A to enter a PIN code. Upon success of
authentication, A's mobile phone delivers to A the session keys
derived from the successful EAP-SIM exchange.
A's Mobile Phone A's Laptop Access Point RADIUS
AuthToken Client Server AuthServer
| | | |
| | | EAP-Success |
| | |<-----------------|
| | EAP-Success | |
| |<---------------------| |
| EAP-Success | | |
|<--------------------| | |
| Auth-Success | | |
|-------------------->| | |
| SessionKey-Give | | |
|-------------------->| | |
Boursetty and Bersani Expires - September 2003 [Page 12]
EAP client-side transport March 2003
6. Provisions for the evolution of EAP-CST
6.1 MK and MSK transport between AuthToken and Client
At this point, the table of section 4.1 contains a primitive to
transport the Master Session Key. This scheme is satisfactory e.g. in
the case of EAP-TLS, where the MSK is derived using the sole
knowledge of the EAP Master Key. But considering for example that in
services allowing roaming, several MSKs may need to be created from
the EAP Master Key, and particularized for each Server to which they
relate (cf. the definition of Client-Server Token, page 4 of [1]), we
think that this scheme may need to be evolved to take into account
multiple Client-Server Tokens.
6.2 Initialization of the authentication
At this point, the table of section 4.1 contains two very simple
primitives to start and stop an authentication session. As of now,
more evolved scenarios (e.g Client scans for all available AuthTokens
and asks the user to choose which one to use) do not fall in the
scope of this document, since it is merely focused on EAP exchanges.
7. Security Considerations
As highlighted in [12] and in section 3.1, we feel that our
architecture enhances the overall security of the client-side by
preventing malicious use of critical credentials because of their
connection to a potentially insecure environment.
However, we must carefully examine various threats on our
architecture, because the EAP-CST interface exposes confidential
data. An initial assessment of threats follows. It is inspired from
section 14.3 of MeT Personal Transactions Protocol [16] (an
architecture which shares the same kind of vulnerabilities).
a. Impersonation of the Authentication Token to the Client
b. Impersonation of the Client to the Authentication Token
c. Eavesdropping on the link between the Authentication Token and
the Client
d. Modification or insertion of packets (including replay attacks)
on the link between the Authentication Token and the Client
e. Man in the Middle Attack between the Authentication Token and
the Client
f. Denial of Service on the link between the Authentication Token
and the Cilent
As mentioned in section 4.2, EAP-CST-LDA is responsible for providing
EAP-CST with a secure link that enforces confidentiality, data origin
authentication and replay protection and thus tackle all the threats
listed above.
Boursetty and Bersani Expires - September 2003 [Page 13]
EAP client-side transport March 2003
Of course, if the Authentication Token is compromised (e.g. infected
by a Trojan Horse), our security enhancements are voided: our central
assumption is that the Authentication Token is a much safer
application execution environment than the Client.
Acknowledgements
We would like to express our deep thanks to Julien Bournelle of INT
and Stefan Andersson of Ericsson for their very valuable feedback
on preliminary versions of this document.
Additionally, we thank Laurent Butti and Jean-Michel Combes of France
Telecom R&D for their support and input on the preparation of this
document.
References
1 Aboba, B., Simon, D., "EAP Keying Framework", Internet Draft
(work in progress) draft-aboba-pppext-key-problem-06.txt, March
2003
2 Blunk, L., Vollbrecht, J., "PPP Extensible Authentication
Protocol (EAP)", RFC 2284, March 1998
3 Blunk, L., et al., "Extensible Authentication Protocol (EAP)",
Internet Draft (work in progress) draft-ietf-eap-rfc2284bis-
01.txt, January 2003
4 Rigney, C., et al., "Remote Authentication Dial-In User Service
(RADIUS)", RFC 2865, June 2000
5 Aboba, B., Simon, D., "PPP EAP TLS Authentication Protocol",
RFC 2716, October 1999
6 Institute of Electrical and Electronics Engineers, "Information
Technology - Telecommunications and Information Exchange between
Systems - Local and Metropolitan Area Network - Specific
Requirements - Part 11: Wireless LAN Medium Access Control (MAC)
and Physical Layer (PHY) Specifications", IEEE Standard 802.11,
1999.
7 Institute of Electrical and Electronics Engineers, "Information
Technology - Telecommunications and Information Exchange between
Systems - Local and Metropolitan Area Network - Specific
Boursetty and Bersani Expires - September 2003 [Page 14]
EAP client-side transport March 2003
Requirements - Part 11: Wireless LAN Medium Access Control (MAC)
and Physical Layer (PHY) Specifications: Specification for
Robust Security", IEEE Standard 802.11i, Drat 3.1 (work in
progress), February 2003
8 Simpson, W., "The Point-to-Point Protocol (PPP)", STD 51, RFC
1661, July 1994.
9 Zorn, G., "Microsoft Vendor-specific RADIUS Attributes",
RFC 2458, March 1999
10 Aboba, B., Calhoun, P., "RADIUS Support For Extensible
Authentication Protocol (EAP)", draft-aboba-radius-rfc2869bis-
10.txt, March 2003
11 Bradner, S., "Key words for use in RFCs to Indicate Requirement
Levels", BCP 14, RFC 2119, March 1997
12 Urien, P., et al., "EAP support in smartcards", Internet Draft
(work in progress) draft-urien-eap-smartcard-01.txt, February
2003
13 Haverinen, H. Salowey, J., "EAP SIM Authentication", Internet
Draft (work in progress) draft-haverinen-pppext-eap-sim-09.txt,
January 2003
14 Institute of Electrical and Electronics Engineers, "Local and
Metropolitan Area Networks: Port-Based Network Access Control",
IEEE Standard 802.1X, September 2001.
15 Bluetooth SIG, "Bluetooth specifications v1.1", February 2001
16 Mobile electronic Transactions, "MeT Personal Transactions
Protocol v1.0", November 2002.
Boursetty and Bersani Expires - September 2003 [Page 15]
EAP client-side transport March 2003
Authors' Addresses
Benoit de Boursetty Phone: +33-1-4529-5926
France Telecom R&D Email: benoit.deboursetty
38, rue du General-Leclerc @francetelecom.com
92794 Issy-les-Moulineaux Cedex 9
France
Florent Bersani Phone: +33-1-4529-6220
France Telecom R&D Email: florent.bersani
38, rue du General-Leclerc @francetelecom.com
92794 Issy-les-Moulineaux Cedex 9
France
Boursetty and Bersani Expires - September 2003 [Page 16]