From list@netscape.com Fri Jun 1 03:58:26 2001 Received: from netscape.com (c3po.netscape.com [205.217.237.46]) by ietf.org (8.9.1a/8.9.1a) with SMTP id DAA02411 for ; Fri, 1 Jun 2001 03:58:25 -0400 (EDT) Received: from aka.mcom.com (aka.mcom.com [205.217.237.180]) by netscape.com (8.10.0/8.10.0) with ESMTP id f517udY08876; Fri, 1 Jun 2001 00:56:39 -0700 (PDT) Received: (from list@localhost) by aka.mcom.com (8.10.0/8.10.0) id f517ugw01951; Fri, 1 Jun 2001 00:56:42 -0700 (PDT) Resent-Date: Fri, 1 Jun 2001 00:56:42 -0700 (PDT) Message-ID: <00005642093c$00002fc2$00006ef2@> To: From: gen6aie@yahoo.com Subject: Get a FREE Motorola Pager - Click Here NOW! 28402 Date: Sun, 03 Jun 2001 14:49:46 -0400 MIME-Version: 1.0 Content-Type: text/html; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable X-Priority: 3 X-MSMail-Priority: Normal Resent-Message-ID: <"Ki0Ta.A.He.4q0F7"@glacier> Resent-From: ietf-ldapext@netscape.com X-Mailing-List: X-Loop: ietf-ldapext@netscape.com Precedence: list Resent-Sender: ietf-ldapext-request@netscape.com Content-Transfer-Encoding: quoted-printable URGENT MESSAGE!

 PRIORITY EXPRESS MAIL


Absolutely FREE Motorola Talkabout Pager

 

You have been selected to recei= ve a FREE MOTOROLA Pager! This side viewable display pager is incredibly small and lightweight. Thi= s incredible MOTOROLA PAGER has a unique, never out of range feature so yo= u will never miss a page.

Call 1(800)761-0511 and Orde= r Your FREE Motorola Pager Today!

This strictly limited-time offe= r will enable you to stay in touch with family and friends.

There is no mistake. Your FREE= MOTOROLA Pager is waiting for you-but you must respond soon. If I do not= hear from you within 7 days this offer will go to someone else. Please do= not allow that to happen!

When you call you will receive = a BRAND NEW PAGER in your choice of color and already programmed with a lo= cal telephone number in just a few days!

P.S. This may be your final no= tice regarding the FREE MOTOROLA Pager.


*

Put your email address in body = of email to get removed.

From list@netscape.com Fri Jun 1 13:12:45 2001 Received: from netscape.com (r2d2.netscape.com [205.217.237.47]) by ietf.org (8.9.1a/8.9.1a) with SMTP id NAA13025 for ; Fri, 1 Jun 2001 13:12:43 -0400 (EDT) Received: from aka.mcom.com (aka.mcom.com [205.217.237.180]) by netscape.com (8.10.0/8.10.0) with ESMTP id f51HArr06695; Fri, 1 Jun 2001 10:10:53 -0700 (PDT) Received: (from list@localhost) by aka.mcom.com (8.10.0/8.10.0) id f51HAq612440; Fri, 1 Jun 2001 10:10:52 -0700 (PDT) Resent-Date: Fri, 1 Jun 2001 10:10:52 -0700 (PDT) Message-ID: <000008f46bd1$00005671$00000913@> To: From: ach_01@hotmail.com Subject: Are you low on ink or paper?? Date: Fri, 01 Jun 2001 10:13:31 -0700 X-Priority: 3 X-MSMail-Priority: Normal Reply-To: ach_01@hotmail.com Resent-Message-ID: <"zjl7XD.A.TBD.Yy8F7"@glacier> Resent-From: ietf-ldapext@netscape.com X-Mailing-List: X-Loop: ietf-ldapext@netscape.com Precedence: list Resent-Sender: ietf-ldapext-request@netscape.com We currently have the following specials on inkjet cartridges for Epson, Canon, and HP printers: Go To http://3475622417/inkjet/ or use fax order form below Epson 400/500/600 Black cartridge (S020093) $7.95 Epson 400/600/800/850/1520 Color cartridge (S020089) $9.95 Epson 800/850/1520 Black cartridge (S020108) $8.95 Epson 200/500 Color cartridge (S020097) $8.50 Epson 440/640/660/670 Black cartridge (S020187) $8.50 Epson 740/760 Black cartridge (S020189) $10.50 Epson 440/640/660/740/760 Color cartridge (S020191) $11.50 Epson 700 Color cartridge (S020110) $13.95 Epson 750 Color cartridge (S020193) $14.95 Epson 900 Black cartridge (T003011) $14.95 Epson 900 Color cartridge (T005011) $17.95 Go To http://3475622417/inkjet/ or use fax order form below Canon 4000/4100/4200 Black cartridge (BC-21) $5.25 Canon 4000/4100/4200 Color cartridge (BC-21) $7.95 Canon 600/610/620 Color set BCMY cartridges $9.95 HP 51626A Recycled Black cartridge $16.95 HP 51629A Recycled Black cartridge $16.95 HP 51645A Recycled Black cartridge $16.95 HP 51625A New Color cartridge $22.95 HP 51649A Recycled Color cartridge $22.95 HP 51641A Recycled Color cartridge $22.95 Inkjet Cardstock Paper 25 Sheets per box $3.95 Inkjet Glossy Cardstock Paper 10 Sheets per box $3.95 Inkjet Glossy Photo Cardstock Paper 10 Sheets per box $3.95 Inkjet Satin Photo Paper 10 Sheets per box $3.95 Inkjet Transfer Paper 10 Sheets per box $6.95 Go To http://3475622417/inkjet/ or use fax order form below Shipping is $4.95 per order and takes 3-4 business days by USPS. We accept MC, Visa and AMEX. One year warranty on all products sold. All Epson and Canon cartridges are new compatibles. ************************************************************* VISA/MC/AMEX ONLY STEP 1: Print out the below ORDER FORM STEP 2: Type or Print your order information into the form STEP 3: FAX Your order to us. FAX TO: 305-278-4183 (Order with confidence. This is a secure fax area. Only our qualified sales team will have access to your order information) ORDER FORM(Print clearly with DARK pen) ****************************************************************************** Name: ________________________________ Address: ________________________________ * *BILLING ADDRESS ONLY City, State, ZIP: ________________________________ Country: ______________ (International Orders) Phone Number: ______________ (In case we can't make out your order) METHOD OF PAYMENT- CREDIT CARD ONLY [ ]Visa [ ]MasterCard [ ]AMEX Credit Card #: __________________________________ Exp Date: _______________ Signature: ____________________________ (Required) E-Mail Address: ____________________________ *(PRINT CLEARLY!!) Cartridge type Quantity Price Total 1) X = 2) X = 3) X = 4) X = Sub-Total = Shipping & Handling + $4.95 Total *********************************************************************** This mail has been sent in accordance with the pending Anti-Spam law Unsolicited Electronic Mail Act of 2000 (H.R. 3113). Should you wish to be removed from this mailing list please send an e-mail with Remove in the subject line to mailto:applied@myrealbox.com?Subject=Remove We currently have the following specials on inkjet cartridges for Epson, Canon, and HP printers: From list@netscape.com Fri Jun 1 17:49:35 2001 Received: from netscape.com (r2d2.netscape.com [205.217.237.47]) by ietf.org (8.9.1a/8.9.1a) with SMTP id RAA18615 for ; Fri, 1 Jun 2001 17:49:34 -0400 (EDT) Received: from aka.mcom.com (aka.mcom.com [205.217.237.180]) by netscape.com (8.10.0/8.10.0) with ESMTP id f51Llnr24553; Fri, 1 Jun 2001 14:47:49 -0700 (PDT) Received: (from list@localhost) by aka.mcom.com (8.10.0/8.10.0) id f51LlnY00363; Fri, 1 Jun 2001 14:47:49 -0700 (PDT) Resent-Date: Fri, 1 Jun 2001 14:47:49 -0700 (PDT) Message-Id: <200106012147.OAA22079@breakaway.Stanford.EDU> X-Mailer: exmh version 2.0.2 2/24/98 Subject: Empty sasl credentials question on RFCs 2829/2830 To: ietf-ldapext@netscape.com From: Jeff.Hodges@kingsmountain.com Reply-to: ietf-ldapext@netscape.com Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Date: Fri, 01 Jun 2001 14:47:44 -0700 Sender: hodges@breakaway.Stanford.EDU Resent-Message-ID: <"nMtjq.A.OF.D2AG7"@glacier> Resent-From: ietf-ldapext@netscape.com X-Mailing-List: X-Loop: ietf-ldapext@netscape.com Precedence: list Resent-Sender: ietf-ldapext-request@netscape.com Ariel'd sent me these questions/commments privately an embarrassingly long time ago, and I'd mentioned them at IETF meetings also an embarrassingly long time ago. Anyway, there they are for the record. the first item might be considered a material change to the doc(s) (i.e. whatever the successor(s) of RFCs 2829/2830 turn out to be) -- and thus should perhaps be queued for any successor to the successor(s) of RFCs 2829/2830 (got that? ;) The items following that first one seem to me to be asking for clarifications, and as such are perhaps viable for consideration for inclusion in the successor(s) of RFCs 2829/2830. JeffH ----- ariel@columbia.edu wrote... Empty sasl credentials question: I spent some more time looking microscopically at ldap-auth-methods and ldap-ext-tls drafts. the drafts say that the credential must have the form dn:xxx or u:xxx or be absent, and although they don't say what to do in the case of an empty octet string I would say that we could send protocolError (claim it is a bad PDU). There is still the question of what to do if the credential is 'dn:' (or 'u:') followed by the empty string. *sigh* One more comment, on section... I am uneasy about the hostname check. My experience from PKI with HTTP probably is a contributing factor; we have people using the short hostname to get to a server which naturally has the FQDN in the certificate, no end of problems. I have a certificate on my laptop which has the FQDN for the casse when the system is on our Columbia network with a fixed IP; when I dial in however, I have some horrible dialup name, and using the local https server becomes annoying. Issuing a certificate in the name 'localhost' is not a solution! Wildcard match does not solve this problem. For these reasons I am inclined to argue for 'SHOULD' instead of 'MUST' in paragraph... Also, The hostname check against the name in the certificate is a very weak means of preventing man-in-the-middle attacks; the proper solution is not here yet (SecureDNS or some equivalent). Faking out DNS is not so hard, and we see this sort of thing in the press on a pretty regular basis, where site A hijacks the DNS server for site B and gets all their requests. Some mention of this should be made in the draft. One final question: If the 'dn:' form of sasl creds is used, is it the intention of the draft(ers) that this DN must exist in the directory and the client will have the privileges associated with that entry, or can the server map the sasl DN to perhaps some other DN in the directory, in an implementation-dependent fashion? We already know that if *no* sasl credentials are presented, the DN or altname in the client certificate may be mapped to a DN in an implementation-dependent fashion, or indeed to something not in the directory at all. (Right?) ----- end From list@netscape.com Fri Jun 1 21:03:49 2001 Received: from netscape.com (r2d2.netscape.com [205.217.237.47]) by ietf.org (8.9.1a/8.9.1a) with SMTP id VAA20431 for ; Fri, 1 Jun 2001 21:03:48 -0400 (EDT) Received: from aka.mcom.com (aka.mcom.com [205.217.237.180]) by netscape.com (8.10.0/8.10.0) with ESMTP id f52125r23734; Fri, 1 Jun 2001 18:02:05 -0700 (PDT) Received: (from list@localhost) by aka.mcom.com (8.10.0/8.10.0) id f52125w00132; Fri, 1 Jun 2001 18:02:05 -0700 (PDT) Resent-Date: Fri, 1 Jun 2001 18:02:05 -0700 (PDT) From: mikeee1118@offrhode.com Reply-To: nh938472@oceanfree.net To: corn1921@schwarb.com Cc: ietf-ldapext-request@schwarb.com, ietf-ldapext@schwarb.com, iae_win@schwarb.com, bheck71985@schwarb.com, bheck@schwarb.com, bheckathorn@schwarb.com, bhecke@schwarb.com, bheckel@schwarb.com, bheckelman@schwarb.com Date: Fri, 01 Jun 2001 21:06:26 -0500 Content-Type: text/html; charset="iso-8859-1" Content-Transfer-Encoding: 8BIT Message-Id: <0p2j3y4kougy1.g2qu4v64@mail.offrhode.com> Subject: re: contest confirmation X-Mailer: Microsoft Outlook Express 5.50.4133.2400 Resent-Message-ID: <"ZpirGB.A.oB.KsDG7"@glacier> Resent-From: ietf-ldapext@netscape.com X-Mailing-List: X-Loop: ietf-ldapext@netscape.com Precedence: list Resent-Sender: ietf-ldapext-request@netscape.com Content-Transfer-Encoding: 8BIT Thank you for entering.

You have been specially selected to qualify for the following:

Grand prize   - Florida Bahamas vacation and cruise
1st prize       - Airline tickets
Other Prizes - 3 days and 2 nights hotel accommodations

Please confirm your entry within 24 hours of receipt of this confirmation.


Click here to confirm

Confirmation number - zy345ki490a

Batch number - 2189

 

to be removed reply to this message with "remove' in the subject line

begin 666 InterScan_Disclaimer.txt M5&AE(&EN9F]R;6%T:6]N('1R86YS;6ET=&5D(&ES(&EN=&5N9&5D(&9O2!T;R!W:&EC:"!I="!I2!C;VYT86EN(&-O;F9I9&5N=&EA;"!A;F0O;W(@<')I=FEL96=E M9"!M871E; Sat, 2 Jun 2001 15:50:04 -0400 (EDT) Received: from aka.mcom.com (aka.mcom.com [205.217.237.180]) by netscape.com (8.10.0/8.10.0) with ESMTP id f52JmHY15737; Sat, 2 Jun 2001 12:48:17 -0700 (PDT) Received: (from list@localhost) by aka.mcom.com (8.10.0/8.10.0) id f52JmI601640; Sat, 2 Jun 2001 12:48:18 -0700 (PDT) Resent-Date: Sat, 2 Jun 2001 12:48:18 -0700 (PDT) From: Subject: Invest $25 and Retire! Date: Sun, 3 Jun 2001 03:42:57 Message-Id: <375.156970.738462@courses2careers.com> Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Resent-Message-ID: <"1DLrq.A.nY.-LUG7"@glacier> To: ietf-ldapext@netscape.com Resent-From: ietf-ldapext@netscape.com X-Mailing-List: X-Loop: ietf-ldapext@netscape.com Precedence: list Resent-Sender: ietf-ldapext-request@netscape.com Dear Friend, AS SEEN ON NATIONAL TV : ''Making over half million dollars every 4 to 5 months from your home for an investment of only $25 US Dollars expense one time'' THANKS TO THE COMPUTER AGE AND THE INTERNET! ================================================= BE A MILLIONAIRE LIKE OTHERS WITHIN A YEAR!!! Before you say ''Bull'', please read the following. This is the letter you have been hearing about on the news lately. Due to the popularity of this letter on the Internet, a national weekly news program recently devoted an entire show to the investigation of this program described below, to see if it really can make people money. The show also investigated whether or not the program was legal. Their findings proved once and for all that there are ''absolutely NO laws prohibiting the participation in the program and if people can follow the simple instructions, they are bound to make some mega bucks with only $25 out of pocket cost''. DUE TO THE RECENT INCREASE OF POPULARITY & RESPECT THIS PROGRAM HAS ATTAINED, IT IS CURRENTLY WORKING BETTER THAN EVER. This is what one had to say: ''Thanks to this profitable opportunity. I was approached many times before but each time I passed on it. I am so glad I finally joined just to see what one could expect in return for the minimal effort and money required. To my astonishment, I received total $ 610,470.00 in 21 weeks, with money still coming in''. Pam Hedland, Fort Lee, New Jersey. ------------------------------------------------------------------------- Here is another testimonial: ''This program has been around for a long time but I never believed in it. But one day when I received this again in the mail I decided to gamble my $25 on it. I followed the simple instructions and voila' - 3 weeks later the money started to come in. First month I only made $240.00 but the next 2 months after that I made a total of $290,000.00. So far, in the past 8 months by re-entering the program, I have made over $710,000.00 and I am playing it again. The key to success in this program is to follow the simple steps and NOT change anything'' More testimonials later but first, ****PRINT THIS NOW FOR YOUR FUTURE REFERENCE**** $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ If you would like to make at least $500,000 every 4 to 5 months easily and comfortably, please read the following...THEN READ IT AGAIN and AGAIN!!! $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ FOLLOW THE SIMPLE INSTRUCTION BELOW AND YOUR FINANCIAL DREAMS WILL COME TRUE, GUARANTEED! INSTRUCTIONS: ****Order all 5 reports shown on the list below. ****For each report, send $5 CASH, THE NAME & NUMBER OF THE REPORT YOU ARE ORDERING and YOUR E-MAIL ADDRESS to the person whose name appears ON THAT LIST next to the report. MAKE SURE YOUR RETURN ADDRESS IS ON YOUR ENVELOPE TOP LEFT CORNER in case of any mail problems. ****When you place your order, make sure you order each of the 5 reports. You will need all 5 reports so that you can save them on your computer and resell them. YOUR TOTAL COST $5 X 5 = $25.00. ****You will receive, vie e-mail, each of the 5 reports from these 5 different individuals. Save them on your computer so they will be accessible for you to send to the 1,000's of people who will order them from you. Also make a floppy of these reports and keep it on your desk in case something happen to your computer. ****IMPORTANT __ DO NOT alter the names of the people who are listed next to each report, or their sequence on the list, in any way other than what is instructed below in step '' 1 through 6 '' or you will loose out on majority of your profits. Once you understand the way this works, you will also see how it does not work if you change it. Remember, this method has been tested, and if you alter, it will NOT work!!! People have tried to put their friends/relatives names on all five thinking they could get all the money. But it does not work this way. Believe us, we all have tried to be greedy and then nothing happened. So Do Not try to change anything other than what is instructed. Because if you do, it will not work for you. Remember, honesty reaps the reward!!! 1....After you have ordered all 5 reports, take this advertisement and REMOVE the name & address of the person in REPORT #5. This person has made it through the cycle and is no doubt counting their fortune. 2....Move the name & address in REPORT #4 down TO REPORT #5. 3....Move the name & address in REPORT #3 down TO REPORT #4. 4....Move the name & address in REPORT #2 down TO REPORT #3. 5....Move the name & address in REPORT #1 down TO REPORT #2 6....Insert YOUR name & address in the REPORT #1 Position. PLEASE MAKE SURE you copy every name & address ACCURATELY! ================================================= ****Take this entire letter, with the modified list of names, and save it on your computer. DO NOT MAKE ANY OTHER CHANGES. Save this on a disk as well just in case if you loose any data. ****To assist you with marketing your business on the Internet, the 5 reports you purchase will provide you with invaluable marketing information which includes how to send bulk e-mails legally, where to find thousands of free classified ads and much more. There are 2 Primary methods to get this venture going: METHOD #1 : BY SENDING BULK E-MAIL LEGALLY ================================================= Let's say that you decide to start small, just to see how it goes, and we will assume You and those involved send out only 5,000 e-mails each. Let's also assume that the mailing receive only a 0.2% response (the response could be much better but lets just say it is only 0.2% . Also many people will send out hundreds of thousands e-mails instead of only 5,000 each). Continuing with this example, you send out only 5,000 e-mails. With a 0.2% response, that is only 10 orders for report # 1.Those 10 people responded by sending out 5,000 e-mail each for a total of 50,000. Out of those 50,000 e-mails only 0.2% responded with orders. That's = 100 people responded and ordered Report # 2. Those 100 people mail out 5,000 e-mails each for a total of 500,000 e-mails. The 0.2% response to that is 1000 orders for Report # 3. Those 1000 people send out 5,000 e-mails each for a total of 5 million e-mails sent out. The 0.2% response to that is 10,000 orders for Report # 4. Those 10,000 people send out 5,000 e-mails each for a total of 50,000,000 (50 million) e-mails. The 0.2% response to that is 100,000 orders for Report #5 THAT'S 100,000 ORDERS TIMES $5 EACH = $500,000.00 (half million). Your total income in this example is: 1..... $50 + 2..... $500 + 3..... $5,000 + 4..... $50,000 + 5..... $500,000 ......... Grand Total = $555,550.00 NUMBERS DO NOT LIE. GET A PENCIL & PAPER AND FIGURE OUT THE WORST POSSIBLE RESPONSES AND NO MATTER HOW YOU CALCULATE IT, YOU WILL STILL MAKE A LOT OF MONEY! -------------------------------------------------------------------------- REMEMBER FRIEND, THIS IS ASSUMING ONLY 10 PEOPLE ORDERING OUT OF 5,000 YOU MAILED TO. Dare to think for a moment what would happen if everyone, or half or even one 4th of those people mailed 100,000 e-mails each or more? There are over 150 million people on the Internet worldwide and counting. Believe me, any people will do just that, and more! METHOD #2 : BY PLACING FREE ADS ON THE INTERNET ================================================= Advertising on the net is very very inexpensive and there are hundreds of FREE places to advertise. Placing a lot of free ads on the Internet will easily get a larger response. We strongly suggest you start with method #1 and add METHOD #2 as you go along. For every $5 you receive, all you must do is e-mail them the Report they ordered. That's it . Always provide same day service on all orders. This will guarantee that the e-mail they send out, with your name and address on it, will be prompt because they can not advertise until they receive the report. _________________AVAILABLE REPORTS__________________ ORDER EACH REPORT BY ITS NUMBER & NAME ONLY. Notes: Always send $5 cash (US CURRENCY) for each Report. Checks NOT accepted. Make sure the cash is concealed by wrapping it in at least 2 sheets of paper. _________________________________________________________ *PLEASE USE THIS REPORT ORDER FORM FOR EACH REPORT* START OF REPORT ORDER FORM COPY FROM HERE TO WHERE IT SAYS "END OF REPORT ORDER FORM" BELOW-------Copy & Paste this form to your word processor 5 times, then fill out & send for each report ---------------- Ordering Report Name & Number : My E-mail Address : My Name & Mailing Address : REMEMBER WITHOUT AN E-MAIL ADDRESS THE ORDERS CAN NOT BE PROCESSED!! ****************************************************** WHEN COPYING DONT CHANGE ANY OF THE DETAILS BELOW THIS LINE. JUST ENTER THE RELEVANT REPORT YOU ARE ORDERING IN THE SPACES ABOVE AND COPY THE LIST BELOW UNCHANGED. PLACE YOUR ORDER FOR THESE REPORTS NOW : ================================================= REPORT #1 ''The Insider's Guide to Advertising for Free on the Net'' Order Report #1 from: Stanley Davidson Box 1082 Nedlands 6909 Australia ______________________________________________________ REPORT #2 ''The Insider's Guide to Sending Bulk e-mail on the Net'' Order Report #2 from : Tom Sutton 42 Charles Kurz Drive Worongary 4213 Queensland Australia ______________________________________________________ REPORT #3 ''The Secret to Multilevel marketing on the net'' Order Report #3 from: Dianne Wells PO Box 609 Kingscote 5223 South Australia ______________________________________________________ REPORT #4 ''How to become a millionaire utilizing MLM & the Net'' Order Report #4 from: Frank Stewart 10 Mcatuur Street Cottesloe Perth, Western Australia. ______________________________________________________ REPORT #5 ''HOW TO SEND 1 MILLION E-MAILS FOR FREE'' Order Report #5 from: Nancy Yager 19 C Crownview Terraace Hamburg, New York 14075 USA **************************************************** COPY TO HERE FOR THE FULL ORDER FORM *****END OF REPORT ORDER FORM**** **************************************************** $$$$$$$$$$$$ YOUR SUCCESS GUIDELINES $$$$$$$$$$$$$ Follow these guidelines to guarantee your success: ***If you do not receive at least 10 orders for Report #1 within 2 weeks, continue sending e-mails until you do. ***After you have received 10 orders, 2 to 3 weeks after that you should receive 100 orders or more for REPORT #2. If you did not, continue advertising or sending e-mails until you do. ***Once you have received 100 or more orders for Report #2, YOU CAN RELAX, because the system is already working for you , and the cash will continue to roll in! THIS IS IMPORTANT TO REMEMBER : Every time your name is moved down on the list, you are placed in front of a Different report. You can KEEP TRACK of your PROGRESS by watching which report people are ordering from you. IF YOU WANT TO GENERATE MORE INCOME SEND ANOTHER BATCH OF E-MAILS AND START THE WHOLE PROCESS AGAIN. There is NO LIMIT to the income you can generate from this business!!! ______________________________________________________ FOLLOWING IS A NOTE FROM THE ORIGINATOR OF THIS PROGRAM: "You have just received information that can give you financial freedom for the rest of your life, with NO RISK and JUST A LITTLE BIT OF EFFORT. You can make more money in the next few weeks and months than you have ever imagined. Follow the program EXACTLY AS INSTRUCTED. Do Not change it in any way. It works exceedingly well as it is now. Remember to e-mail a copy of this exciting report after you have put your name and address in Report #1 and moved others to #2 ...........#5 as instructed above. One of the people you send this to may send out 100,000 or more e-mails and your name will be on everyone of them. Remember though, the more you send out the more potential customers you will reach. So my friend, I have given you the ideas, information, materials and opportunity to become financially independent. IT IS UP TO YOU NOW! ****************MORE TESTIMONIALS***************** 'My name is Mitchell. My wife, Jody and I live in Chicago. I am an accountant with a major US Corporation and I make pretty good money. When I received this program I grumbled to Jody about receiving ''junk mail''. I made fun of the whole thing, spouting my knowledge of the population and percentages involved. I ''knew'' it wouldn't work. Jody totally ignored my supposed intelligence and few days later she jumped in with both feet. I made merciless fun of her, and was ready to lay the old ''I told you so'' on her when the thing didn't work. Well, the laugh was on me! Within 3 weeks she had received 50 responses. Within the next 45 days she had received total $ 147,200.00 ......... all cash! I was shocked. I have joined Jody in her ''hobby''. Mitchell Wolf, MD , Chicago, Illinois -------------------------------------------------------------------------- ''Not being the gambling type, it took me several weeks to make up my mind to participate in this plan. But conservative that I am, I decided that the initial investment was so little that there was just no way that I wouldn't get enough orders to at least get my money back''. ''I was surprised when I found my medium size post office box crammed with orders. I made $319,210.00 in the first 12 weeks. The nice thing about this deal is that it does not matter where people live. There simply isn't a better investment with a faster return and so big''. Dan Sondstrom, Alberta, Canada -------------------------------------------------------------------------- ''I had received this program before. I deleted it, but later I wondered if I should have given it a try. Of course, I had no idea who to contact to get another copy, so I had to wait until I was e-mailed again by someone else.........11 months passed then it luckily came again...... I did not delete this one! I made more than $490,000 on my first try and all the money came within 22 weeks''. Susan De Suza, Sydney, Australia -------------------------------------------------------------------------- ''It really is a great opportunity to make relatively easy money with little cost to you. I followed the simple instructions carefully and within 10 days the money started to come in. My first month I made $ 20, 560.00 and by the end of third month my total cash count was $ 362,840.00. Life is beautiful, Thanx to Internet''. Fred Dellaca, Westport, New Zealand -------------------------------------------------------------------------- ORDER YOUR REPORTS TODAY AND GET STARTED ON YOUR ROAD TO FINANCIAL FREEDOM! ================================================== If you have any questions of the legality of this program, contact the Office of Associate Director for Marketing Practices, Federal Trade Commission, Bureau of Consumer Protection, Washington, DC /////////////////////////////////////////////////////////////////////////////// ONE TIME MAILING, NO NEED TO REMOVE /////////////////////////////////////////////////////////////////////////////// This message is sent in compliance of the proposed bill SECTION 301. per Section 301, Paragraph (a)(2)(C) of S. 1618. Further transmission to you by the sender of this e-mail may be stopped at no cost to you by sending a reply to : remove@atrc.com with the word Remove in the subject line. This message is not intended for residents in the State of Washington, screening of addresses has been done to the best of our technical ability. ******************************************************* THIS LETTER CONSTITUTES NO GUARANTEES STATED NOR IMPLIED. IN THE EVENT THAT IT IS DETERMINED THAT THIS LETTER CONSTITUTES A GUARANTEE OF ANY KIND, THAT GUARANTEE IS NOW VOID. ANY TESTIMONIALS OR AMOUNTS OF EARNINGS LISTED IN THIS LETTER MAY BE FACTUAL OR FICTITIOUS. ******************************************************** From list@netscape.com Sat Jun 2 16:15:53 2001 Received: from netscape.com ([205.217.237.46]) by ietf.org (8.9.1a/8.9.1a) with SMTP id QAA13341 for ; Sat, 2 Jun 2001 16:15:52 -0400 (EDT) Received: from aka.mcom.com (aka.mcom.com [205.217.237.180]) by netscape.com (8.10.0/8.10.0) with ESMTP id f52KEAY17153; Sat, 2 Jun 2001 13:14:10 -0700 (PDT) Received: (from list@localhost) by aka.mcom.com (8.10.0/8.10.0) id f52KEBU07436; Sat, 2 Jun 2001 13:14:11 -0700 (PDT) Resent-Date: Sat, 2 Jun 2001 13:14:11 -0700 (PDT) Message-Id: <200106022014.f52KENl09967@xwing.aoltw.net> From: "Linda Johnson" To: Subject: Free Products & Services! Date: Sat, 2 Jun 2001 13:11:19 -0700 MIME-Version: 1.0 Content-Type: text/plain; charset="iso-8859-1" X-MimeOLE: Produced By Microsoft MimeOLE V5.00.2314.1300 Content-Transfer-Encoding: 8bit X-MIME-Autoconverted: from quoted-printable to 8bit by aka.mcom.com id f52KE8v07386 Resent-Message-ID: <"Qf7q0B.A.gzB.QkUG7"@glacier> Resent-From: ietf-ldapext@netscape.com X-Mailing-List: X-Loop: ietf-ldapext@netscape.com Precedence: list Resent-Sender: ietf-ldapext-request@netscape.com Content-Transfer-Encoding: 8bit You are subscribed as: ietf-ldapext@netscape.com Good Afternoon! Please select one or any of the below productivity software products FREE and check out a new Qchex service to send Invoices and Request Payments at no charge. FREE Qchex Membership ! Click on the following link to try Qchex Invoice and Check service: http://www.qchex.com/home.asp?d=21 ******************************* FREE Productivity Software: a) eXpressForms 2000 - "create your own forms, greeting cards and invitations. Use them on the internet to send, fill out and collect data" ($149.99 value) b) Fortune - "relationship manager to help you organize your personal and business contacts - includes email broadcast feature" ($149.99 value) c) Datascan - "scanner for business cards and directories - eliminates typing in contact information into your database" ($149.99 value) d) TransForm Suite PE - "scan in your forms and watch TransForm convert them into electronic forms using OCR and tracing technology" e) VersaClips - "hand craftes images and clipart for use with VersaCheck check software, web pages and to enhance the look of documents in general" Click on the following link and the "SPECIAL Free Software" banner: http://www/g7ps.com ******************************* / Please do not hesitate to call 800-303-2620 for any questions you may have or just email me back. Thank you very much. Yours truly, Linda Johnson Customer Relations for Payment Services Neovi Data Corporation. Linda.Johnson@emipsusa.com To change your communication preference please click on: http://www.globalzon2k.com/scripts/mf_de.asp?e=ietf-ldapext@netscape.com or simly reply to this Email with UNSUBSCRIBE in the subject line. From list@netscape.com Sun Jun 3 10:20:02 2001 Received: from netscape.com ([205.217.237.46]) by ietf.org (8.9.1a/8.9.1a) with SMTP id KAA09722 for ; Sun, 3 Jun 2001 10:20:02 -0400 (EDT) Received: from aka.mcom.com (aka.mcom.com [205.217.237.180]) by netscape.com (8.10.0/8.10.0) with ESMTP id f53EIIY28287; Sun, 3 Jun 2001 07:18:18 -0700 (PDT) Received: (from list@localhost) by aka.mcom.com (8.10.0/8.10.0) id f53EIHo24107; Sun, 3 Jun 2001 07:18:17 -0700 (PDT) Resent-Date: Sun, 3 Jun 2001 07:18:17 -0700 (PDT) Date: Sun, 3 Jun 2001 07:17:23 -0700 (PDT) Message-Id: <200106031417.f53EHNX25557@ywing.netscape.com> From: zcqzn@hotmail.com To: qpmvl@OnlineFriends.netscape.com Reply-To: 10ma@bigfoot.com Subject: Change Your Life..."THE SECRET IS OUT" [itbpt] Resent-Message-ID: <"jULBQD.A.T4F.ockG7"@glacier> Resent-From: ietf-ldapext@netscape.com X-Mailing-List: X-Loop: ietf-ldapext@netscape.com Precedence: list Resent-Sender: ietf-ldapext-request@netscape.com Hi Friend, WE'RE LETTING A MAJOR SECRET OUT OF THE BAG TODAY! The top Legal Consultant in this industry has just developed a literal cash machine. Now, people in our activity are receiving money from all over the place. $500 into $4,000 virtually overnight. And that's just for starters. Everything is done for you automatically! This will absolutely amaze you. NO faxing, NO meetings, NO doing everyone else's work for them. Join the only legitimate and legal program of its kind. Reply to, mailto:tim15u2@n2mail.com?subject=Details_Please with your name, phone number, and best time to reach you. I'll personally give you this amazing, private website URL. Do It Now! Here's why this activity can help you: 1. Complete Automation! Everything is done via computer. Take your life back again; let advanced technology do most of the work for you. 2. You can see where you are in the system at all times. You get an email notifying you instantly every step of your growth. Everything happens in real time. 3. An online website that your people can visit to get the info. Talk about convenience! Just send everyone there with the current password and your Prospect will automatically join. 4. Now everyone can afford to participate! Get in at the beginning for once! Be at the TOP and be there before others coming in under you. This program is not only legal... it is blatantly legal. HINT: Your upline is a heavy marketer. That's means alot of overspill. Don't wait! Contact us now before the masses jump in ahead of you! Reply to: mailto:tim15u2@n2mail.com?subject=Details_Please with your name, phone number, and the best time to reach you. I'll personally give you this amazing, private Website URL. Do It Now! Testimonials "While the gifts I received are indeed very helpful, the wonderful people I have met have assisted me in other personal matters I could not resolve alone." - N.H. - Georgia "The gift I gave was to somebody I didn't know and it still brought me joy. The feelings I have from sharing my gifts with my family and being able to give such needed help to them when they really needed it is eternally warming." - E.A. - Arkansas "I have been fortunate enough to have people that care enough about me to introduce me to an activity that has given me my life back. The team effort, and the positive energy I have experienced here have been absolutely amazing!!" -M.B. - Oregon "I was personally approached about gifting by someone who knew me through a mutual acquaintance. The people I met gifted me over $25,000 in an eight week period. This came at a very crucial time in my life. In return I helped many others experience the gifting activity. I wish everyone could participate." -D.N. - Indiana "I Know that money doesn't buy happiness, but this program has done a world of good for my marriage that was suffering under the weight of massive debt." - S.S. - California "Since I entered these activities I have met many people I believe will be my friends for life." - D.P. - Montana "If I hadn't met these people when I did, I would have lost my mortgage to my house due to illness. Giving is good." - Y.L. - New York Reply to: mailto:tim15u2@n2mail.com?subject=Details_Please with your name, phone number, and the best time to reach you. I'll personally give you this amazing, private Website URL. Do It Now! From list@netscape.com Mon Jun 4 01:12:35 2001 Received: from netscape.com ([205.217.237.46]) by ietf.org (8.9.1a/8.9.1a) with SMTP id BAA16486 for ; Mon, 4 Jun 2001 01:12:35 -0400 (EDT) Received: from aka.mcom.com (aka.mcom.com [205.217.237.180]) by netscape.com (8.10.0/8.10.0) with ESMTP id f545ApY06991; Sun, 3 Jun 2001 22:10:51 -0700 (PDT) Received: (from list@localhost) by aka.mcom.com (8.10.0/8.10.0) id f545Ars15248; Sun, 3 Jun 2001 22:10:53 -0700 (PDT) Resent-Date: Sun, 3 Jun 2001 22:10:53 -0700 (PDT) Date: 4 Jun 2001 05:14:37 -0000 Message-ID: <20010604051437.31465.qmail@mailweb9.rediffmail.com> MIME-Version: 1.0 To: "ietf-ldapext@netscape.com" Subject: Ldap packets capture From: "Anumula Rama krishna" Content-ID: Content-type: text/plain Content-Description: Body Content-Transfer-Encoding: 7bit Resent-Message-ID: <"b3_GbD.A.4tD.bhxG7"@glacier> Resent-From: ietf-ldapext@netscape.com X-Mailing-List: X-Loop: ietf-ldapext@netscape.com Precedence: list Resent-Sender: ietf-ldapext-request@netscape.com Content-Transfer-Encoding: 7bit Dear Sir, Send the detail of packet capturing tools on Win95/98/NT/UNIX which can capture LDAP and LDAP with SSL packets and display them. Thanking you sir ramakrishna _____________________________________________________ Chat with your friends as soon as they come online. Get Rediff Bol at http://bol.rediff.com From list@netscape.com Mon Jun 4 12:22:11 2001 Received: from netscape.com ([205.217.237.46]) by ietf.org (8.9.1a/8.9.1a) with SMTP id MAA11790 for ; Mon, 4 Jun 2001 12:22:11 -0400 (EDT) Received: from aka.mcom.com (aka.mcom.com [205.217.237.180]) by netscape.com (8.10.0/8.10.0) with ESMTP id f54GKSY26068; Mon, 4 Jun 2001 09:20:29 -0700 (PDT) Received: (from list@localhost) by aka.mcom.com (8.10.0/8.10.0) id f54GKSc22053; Mon, 4 Jun 2001 09:20:28 -0700 (PDT) Resent-Date: Mon, 4 Jun 2001 09:20:28 -0700 (PDT) From: lana43@parsmail.com X-Mailer: Message-Id: <1p2cxo5weh0gf8.0x608gx8a30s7rcd@excite.ccom> Content-Type: text/html; charset="iso-8859-1" Content-Transfer-Encoding: 8BIT To: posting4u@operamail.com Subject: A Must Use Online Investigation Program ! Date: Mon, 04 Jun 2001 02:55:00 -0800 Resent-Message-ID: <"kGSVD.A.UXF.KV7G7"@glacier> Resent-From: ietf-ldapext@netscape.com X-Mailing-List: X-Loop: ietf-ldapext@netscape.com Precedence: list Resent-Sender: ietf-ldapext-request@netscape.com Content-Transfer-Encoding: 8BIT Find Out Virtually Anything You Want
Find the Truth About Anyone and Anything
use the Most Powerful Detective Tool on the Internet.
Please Click Here to get more detailed information



Use what the Professionals use
Locate your enemies, friends, debtors, new love interest,
Get information on your personal or business needs and much
much more ...
Please Click Here to get more detailed information





If you would like to be removed from our mailing list, click here.

From list@netscape.com Tue Jun 5 16:11:55 2001 Received: from netscape.com (r2d2.netscape.com [205.217.237.47]) by ietf.org (8.9.1a/8.9.1a) with SMTP id QAA29429 for ; Tue, 5 Jun 2001 16:11:54 -0400 (EDT) Received: from aka.mcom.com (aka.mcom.com [205.217.237.180]) by netscape.com (8.10.0/8.10.0) with ESMTP id f55KA1r25524; Tue, 5 Jun 2001 13:10:01 -0700 (PDT) Received: (from list@localhost) by aka.mcom.com (8.10.0/8.10.0) id f55KA0Q14779; Tue, 5 Jun 2001 13:10:00 -0700 (PDT) Resent-Date: Tue, 5 Jun 2001 13:10:00 -0700 (PDT) Date: Wed, 6 Jun 2001 03:56:44 +0800 (CST) From: Message-Id: <200106051956.DAA0000021676@ns1.npic.ac.cn> To: opt-in9@alloymail.com Subject: Blast Your AD to Huge OPT IN List for FREE! Resent-Message-ID: <"AiLNyC.A.GmD.WyTH7"@glacier> Resent-From: ietf-ldapext@netscape.com X-Mailing-List: X-Loop: ietf-ldapext@netscape.com Precedence: list Resent-Sender: ietf-ldapext-request@netscape.com ============================================================ Opt In Club Opportunities Help stamp out spam by going Opt In. ============================================================ ============================================ Blast Your AD to Huge OPT IN List for FREE! ============================================ Blast Your Ad to this New OPT In List for FREE! The Ultimate Mailer will revolutionize the future of opt in emailing as we know it.... This is the First WEB BROWSER Based emailing system that allows you to send to *Targeted Groups* every single Day for FREE. But Hurry, the offer for a FREE Membership ends very shortly. You must Act Now To Guarantee your place. Please join us now, Mailto:optinblasts1@yahoo.com ============================================================= To be unsubscribe from future mailings, click the link mailto:optout529@yahoo.com ============================================================= From list@netscape.com Tue Jun 5 20:44:40 2001 Received: from netscape.com (c3po.netscape.com [205.217.237.46]) by ietf.org (8.9.1a/8.9.1a) with SMTP id UAA02228 for ; Tue, 5 Jun 2001 20:44:39 -0400 (EDT) Received: from aka.mcom.com (aka.mcom.com [205.217.237.180]) by netscape.com (8.10.0/8.10.0) with ESMTP id f560grY21195; Tue, 5 Jun 2001 17:42:53 -0700 (PDT) Received: (from list@localhost) by aka.mcom.com (8.10.0/8.10.0) id f560gsg28881; Tue, 5 Jun 2001 17:42:54 -0700 (PDT) Resent-Date: Tue, 5 Jun 2001 17:42:54 -0700 (PDT) Date: Tue, 5 Jun 2001 17:43:11 -0700 (PDT) Message-Id: <200106060043.f560hBF14695@xwing.aoltw.net> From: aoyui@hotmail.com To: syiip@CybernetFriends.netscape.com Reply-To: 10ma@bigfoot.com Subject: Making Serious Money Has Never Been This Easy! [cowhr] Resent-Message-ID: <"00sIOC.A.1CH.MyXH7"@glacier> Resent-From: ietf-ldapext@netscape.com X-Mailing-List: X-Loop: ietf-ldapext@netscape.com Precedence: list Resent-Sender: ietf-ldapext-request@netscape.com NEW CD ROM is helping to Create HUGE FORTUNES!! Free Info: * What if you could make a full time income handing/sending out a $1.25 CD ROM? * What if the company paid you EVERY DAY? * What if it was a New York Stock Exchange Company? * What if there was no "real" competition, and everybody needs our service? * What if you got paid when somebody goes to your website and views the hottest video presentation ever and signs up? If you are the least bit curious about why this CD ROM is making us Fortunes!! All you need to do is simply: 1.Send an email to: mailto:tim17u@n2mail.com?subject=CD_ROM 2. Put " CD ROM " in the subject heading We will email you all you need to know to get signed up and making money TODAY!!! Waiting to hear from you soon! GA PS.. Please put "Remove" in subject line to get out of this list. Thanks. From list@netscape.com Wed Jun 6 04:32:22 2001 Received: from netscape.com (c3po.netscape.com [205.217.237.46]) by ietf.org (8.9.1a/8.9.1a) with SMTP id EAA23637 for ; Wed, 6 Jun 2001 04:32:22 -0400 (EDT) Received: from aka.mcom.com (aka.mcom.com [205.217.237.180]) by netscape.com (8.10.0/8.10.0) with ESMTP id f568UXY27312; Wed, 6 Jun 2001 01:30:33 -0700 (PDT) Received: (from list@localhost) by aka.mcom.com (8.10.0/8.10.0) id f568UYQ20327; Wed, 6 Jun 2001 01:30:34 -0700 (PDT) Resent-Date: Wed, 6 Jun 2001 01:30:34 -0700 (PDT) Date: Wed, 6 Jun 2001 01:29:35 -0700 (PDT) Message-ID: <3B115CEF0000A0D8@mail.transcen.org> (added by mail.transcen.org) From: m000061@123india.com To: jrpgyn2oxr@msn.com Reply-To: avissandra659@hairdresser.net Subject: Got Debt? [xbjm8] Resent-Message-ID: <"cqf5CB.A.E9E.poeH7"@glacier> Resent-From: ietf-ldapext@netscape.com X-Mailing-List: X-Loop: ietf-ldapext@netscape.com Precedence: list Resent-Sender: ietf-ldapext-request@netscape.com Got debt? We can help using Debt Consolidation! If you owe $4,000 USD or more, consolidate your debt into just 1 payment and let us handle the rest! Wouldn't it be nice to have to worry about just 1 fee instead of half a dozen? We think so too. - You do not have to own a home - You do not need another mortgage - No credit checks required - Approval within 10 business days - Available to all US citizens For a FREE, no obligation, consultation, please fill out the form below and return it to us. Paying bills should not be a chore, and your life should be as easy and simple as possible. So take advantage of this great offer! Please note that we deal in unsecured debt, so mortgages and car loans etc. cannot apply. Please enter 'N/A' where appropriate. Work phone can be a secondary/cell number. -=-=-=-=-=-=-=-=-=-=- Full Name : Street Address : City : State : Zip Code : Home Phone : Work Phone : Time to Call : Estimated Debt Size : -=-=-=-=-=-=-=-=-=-=- Thank You To receive no further offers from our company regarding this matter or any other matter, please reply to this e-mail with the word 'Remove' in the subject line. From list@netscape.com Thu Jun 7 02:55:00 2001 Received: from netscape.com (r2d2.netscape.com [205.217.237.47]) by ietf.org (8.9.1a/8.9.1a) with SMTP id CAA28929 for ; Thu, 7 Jun 2001 02:55:00 -0400 (EDT) Received: from aka.mcom.com (aka.mcom.com [205.217.237.180]) by netscape.com (8.10.0/8.10.0) with ESMTP id f576rEr25748; Wed, 6 Jun 2001 23:53:14 -0700 (PDT) Received: (from list@localhost) by aka.mcom.com (8.10.0/8.10.0) id f576rEw25903; Wed, 6 Jun 2001 23:53:14 -0700 (PDT) Resent-Date: Wed, 6 Jun 2001 23:53:14 -0700 (PDT) Message-ID: <00006a8e7c46$00005f14$00002ddc@> To: From: Caojnideitions23@yahoo.com Subject: Follow-Up To Your Inquiry 11740 Date: Wed, 06 Jun 2001 13:53:01 -0400 MIME-Version: 1.0 Content-Type: text/html; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable X-Priority: 3 X-MSMail-Priority: Normal Resent-Message-ID: <"bZjS5C.A.VUG.ZTyH7"@glacier> Resent-From: ietf-ldapext@netscape.com X-Mailing-List: X-Loop: ietf-ldapext@netscape.com Precedence: list Resent-Sender: ietf-ldapext-request@netscape.com Content-Transfer-Encoding: quoted-printable

e Earn = $1500 Or More P= er Week!

 
This offer is limited to the = first 49 people who contact me today!


Let's face it, every bus= iness opportunity is not for everyone.  You need something = that fits your needs, budget, and schedule.  That is why w= e have put together several "Real= " Income Opportunities just for you. We have sea= rched and searched and finally found and compiled the best opportunities available.  

I pr= omise, you will not regret it. You will finally find something you tr= uly can make Money with. You really can make an Extra = $200 to $1,500 a Week if you have a few hours a week to wor= k your business!

You = do not have to pay one dime to find out about these true money making opportunities.  Just Call 1(888)281-2694 and we will show you the best, = real moneymakers available.&n= bsp; It is 100% FREE, so visit us today, do not miss out on= a life changing opportunity.

This is Absolutely= No Risk, so Call 1(888)281-2694 Right Now, = and Find The Opportunity of A Lifetime!

 

Call 1(888)281-2694 Immediatly
24 Hrs / 7 Days

 

 
- Testimonials -
 
"My very first day with less than an hour of my= spare time I made over $123.00. My second da= y I duplicated that in less than 30 minutes."
Jason Vielhem
"Mr. Skeptical"
-----------= ----
 
"I literally make thousands each month fr= om the comfort of my home, heck my couch! Tha= nk you for changing my life forever!"
 
Jenna Wilson

---------------=

a

 






 

 

 

 

Put your email address in body of email and send email to here


******* From list@netscape.com Thu Jun 7 11:33:39 2001 Received: from netscape.com (c3po.netscape.com [205.217.237.46]) by ietf.org (8.9.1a/8.9.1a) with SMTP id LAA08831 for ; Thu, 7 Jun 2001 11:33:38 -0400 (EDT) Received: from aka.mcom.com (aka.mcom.com [205.217.237.180]) by netscape.com (8.10.0/8.10.0) with ESMTP id f57FVeY11368; Thu, 7 Jun 2001 08:31:40 -0700 (PDT) Received: (from list@localhost) by aka.mcom.com (8.10.0/8.10.0) id f57FVfM19166; Thu, 7 Jun 2001 08:31:41 -0700 (PDT) Resent-Date: Thu, 7 Jun 2001 08:31:41 -0700 (PDT) Date: Thu, 7 Jun 2001 08:30:38 -0700 (PDT) Message-Id: <200106071530.f57FUcX27474@ywing.netscape.com> From: traceebraband3920@playful.com To: tzjr@msn.com Reply-To: 238043@loveable.com Subject: Are you making enough money, want to make more? [xucpq] Resent-Message-ID: <"MtJyj.A.2qE.b55H7"@glacier> Resent-From: ietf-ldapext@netscape.com X-Mailing-List: X-Loop: ietf-ldapext@netscape.com Precedence: list Resent-Sender: ietf-ldapext-request@netscape.com If you run a business and are reading this e-mail chances are you have probably heard of merchant accounts. While there are lots of other Merchant Account Venders telling you all the same thing, we don't have any limited time offers, no monthly sales or any other slick marketing techniques. Our Prices are the lowest, we never have set up fee's or application fee's. Our Monthly rates already are super low, our transaction fee's are so low they're almost free!! Reply to this e-mail with your Name, Phone Number, and Good time to call One of our helpful staff will call you and help you set up your account. For Whatever size your business is, we have an account perfect for you. If you have any previous credit problems? Don't worry about it because we won't either!! While our competition may have a sale this month, Or won't charge you a set up fee today. We have a sale everyday. All you need to do to take advantage of this every day offer is simply Reply to this e-mail with your Name, Phone Number, and Good time to call Reply today and you can accept; Visa Mastercard American Express Discover Novus Direct Checks Fax Checks and Also Accept Debit Cards !! Remember, this is not a sale, not a limited time offer. We Offer the best rates, all the time. You are 99.8% GUARANTEED to get a merchant account. So what are you waiting for? For more information please: Reply to this e-mail with your Name, Phone Number, and Good time to call It's that easy. Your friend; Todd Roberts --------------------------------------------------------------------- To no longer receive this message reply with the word - remove - in the e-mail subject line. From list@netscape.com Thu Jun 7 18:57:38 2001 Received: from netscape.com (r2d2.netscape.com [205.217.237.47]) by ietf.org (8.9.1a/8.9.1a) with SMTP id SAA15793 for ; Thu, 7 Jun 2001 18:57:37 -0400 (EDT) Received: from aka.mcom.com (aka.mcom.com [205.217.237.180]) by netscape.com (8.10.0/8.10.0) with ESMTP id f57Mtur14293; Thu, 7 Jun 2001 15:55:56 -0700 (PDT) Received: (from list@localhost) by aka.mcom.com (8.10.0/8.10.0) id f57MtuY09490; Thu, 7 Jun 2001 15:55:56 -0700 (PDT) Resent-Date: Thu, 7 Jun 2001 15:55:56 -0700 (PDT) DATE: 07 Jun 01 6:01:42 PM FROM: v62k9Hd96@china.com Message-ID: TO: jmichaels546@excite.com SUBJECT: 8 Phone Marketer's Needed / Checks Paid Weekly Resent-Message-ID: <"H9bvVB.A.hTC.4ZAI7"@glacier> Resent-From: ietf-ldapext@netscape.com X-Mailing-List: X-Loop: ietf-ldapext@netscape.com Precedence: list Resent-Sender: ietf-ldapext-request@netscape.com This email will NOT contain any hype, just facts. **Recent Announcement** An 8 Time MLM industry million dollar earner (Phil Piccolo) and I have recently joined forces. We are setting up our initial team In a 4 by 7 Forced matrix (YES this is MLM). We are NOT interested in you dealing with family and freinds..Because of this...We will back you up with lists of FREE qualified prospects to contact and YOU will earn the $100 weekly commission checks. To be considered for our team you must follow the steps below before we will consider you for a position: STEP 1: Call 212-990-6089 (Listen To Mr. Piccolo's 5min message) STEP 2: Contact Mr. Sellers at 954-337-2343 and let him know you have completed step 1 by leaving a clear message on his voice mail. You may respond by email but you must listen to Mr. Piccolo's 5 minute message first. *** The first 8 people who follow the above steps and accepted onto our team will recieve priority leads from DAILY emailing we are performing** These are the benefits of succeeding on our team: -Car Bonus Up To $1500 Per Month -Weekly Checks -Mortgage Bonus Up To $10,000 Per Month (Does Your Employer Offer These Benefits?) We will email millions to find the right people. Good luck. ***To Be Removed Click Respond and type "Remove"******* mailto:hillyou@mail.com?Subject=Remove From list@netscape.com Thu Jun 7 21:40:00 2001 Received: from netscape.com (c3po.netscape.com [205.217.237.46]) by ietf.org (8.9.1a/8.9.1a) with SMTP id VAA18219 for ; Thu, 7 Jun 2001 21:40:00 -0400 (EDT) Received: from aka.mcom.com (aka.mcom.com [205.217.237.180]) by netscape.com (8.10.0/8.10.0) with ESMTP id f581cIY00630; Thu, 7 Jun 2001 18:38:18 -0700 (PDT) Received: (from list@localhost) by aka.mcom.com (8.10.0/8.10.0) id f581cJ626132; Thu, 7 Jun 2001 18:38:19 -0700 (PDT) Resent-Date: Thu, 7 Jun 2001 18:38:19 -0700 (PDT) Message-ID: <3083620016581304780@young> X-EM-Version: 5, 0, 0, 19 X-EM-Registration: #01B0530810E603002D00 X-Priority: 3 X-MSMail-Priority: Normal From: "Mitchell" To: ietf-ldapext@netscape.com Subject: Your Order (MLM Plan) Date: Thu, 7 Jun 2001 15:30:47 -1000 MIME-Version: 1.0 Content-type: text/plain; charset="US-ASCII" Content-Transfer-Encoding: 8bit X-MIME-Autoconverted: from quoted-printable to 8bit by aka.mcom.com id f581cHv26093 Resent-Message-ID: <"J9PShC.A.5XG.KyCI7"@glacier> Resent-From: ietf-ldapext@netscape.com X-Mailing-List: X-Loop: ietf-ldapext@netscape.com Precedence: list Resent-Sender: ietf-ldapext-request@netscape.com Content-Transfer-Encoding: 8bit Dear Friend, here is your Multi-Level Marketing Plan: "Making over half million dollars every 4 to 5 months from your home for an investment of only $25 U.S. Dollars expense one time" THANKS TO THE COMPUTER AGE AND THE INTERNET! =============================================== BE A MILLIONAIRE LIKE OTHERS WITHIN A YEAR !! Before you say "Bull" , please read the following. This is the letter you have been hearing about on the news lately. Due to the popularity of this letter on the internet, a national weekly news program recently devoted an entire show to the investigation of this program described below , to see if it really can make people money. The show also investigated whether or not the program was legal. Their findings proved once and for all that there are "absolutely no laws prohibiting the participation in the program and if people can follow the simple instructions, they are bound to make some mega bucks with only $25 out of pocket cost". DUE TO THE RECENT INCREASE OF POPULARITY & RESPECT THIS PROGRAM HAS ATTAINED, IT IS CURRENTLY WORKING BETTER THAN EVER. This is what one had to say: "Thanks to this profitable opportunity. I was approached many times before but each time I passed on it. I am so glad I finally joined just to see what one could expect in return for the minimal effort and money required. To my astonishment, I received total $ 610,470.00 in 21 weeks, with money still coming in". Pam Hedland, Fort Lee, New Jersey. ------------------------------------------------------------------------- Here is another testimonial: "This program has been around for a long time but I never believed in it. But one day when I received this again in the mail I decided to gamble my $25 on it. I followed thesimple instructions and walaa ..... 3 weeks later the money started to come in. First month I only made $240.00 but the next 2 months after that I made a total of $290,000.00. So far, in the past 8 months by re-entering the program,I have made over $710,000.00 and I am playing it again. The key to success in this program is to follow the simple steps and NOT change anything ." More testimonials later but first, ****** PRINT THIS NOW FOR YOUR FUTURE REFERENCE ******* $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ If you would like to make at least $500,000 every 4 to 5 months easily and comfortably, please read the following...THEN READ IT AGAIN and AGAIN !!! $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ FOLLOW THE SIMPLE INSTRUCTION BELOW AND YOUR FINANCIAL DREAMS WILL COME TRUE, GUARANTEED! INSTRUCTIONS: **** Order all 5 reports shown on the list below. **** For each report, send $5 CASH, THE NAME & NUMBER OF THE REPORT YOU ARE ORDERING and YOUR E-MAIL ADDRESS to the person whose name appears ON THAT LIST next to the report. MAKE SURE YOUR RETURN ADDRESS IS ON YOUR ENVELOPE TOP LEFT CORNER in case of any mail problems. **** When you place your order, make sure you order each of the 5 reports. You will need all 5 reports so that you can save them on your computer and resell them. YOUR TOTAL COST $5 X 5 = $25.00. **** Within a few days you will receive, via e-mail, each of the 5 reports from these 5 different individuals. Save them on your computer so they will be accessible for you to send to the 1,000's of people who will order them from you. Also make a floppy of these reports and keep it on your desk in case something happen to your computer. ****.IMPORTANT - DO NOT alter the names of the people who are listed next to each report, or their sequence on the list, in any way other than what is instructed below in steps 1 through6 or you will loose out on majority of your profits. Once you understand the way this works, you will also see how it does not work if you change it. Remember, this method has been tested, and if you alter, it will NOT work!!! People have tried to put their friends/relatives names on all five thinking they could get all the money. But it does not work this way. Believe us, we all have tried to be greedy and then nothing happened. So Do Not try to change anything other than what is instructed. Because if you do, it will not work for you. Remember, honesty reaps the reward!!! 1.. After you have ordered all 5 reports, take this advertisement and REMOVE the name & address of the person in REPORT # 5. This person has made it through the cycle and is no doubt counting their fortune. 2.... Move the name & address in REPORT # 4 down TO REPORT # 5. 3.... Move the name & address in REPORT # 3 down TO REPORT # 4. 4.... Move the name & address in REPORT # 2 down TO REPORT # 3. 5.... Move the name & address in REPORT # 1 down TO REPORT # 2 6.... Insert YOUR name & address in the REPORT # 1 Position. PLEASE MAKE SURE you copy every name & address ACCURATELY ! ========================================================= Take this entire letter, with the modified list of names, and save it on your computer. DO NOT MAKE ANY OTHER CHANGES. Save this on a disk as well just in case if you loose any data. To assist you with marketing your business on the internet, the 5 reports you purchase will provide you with invaluable marketing information which includes how to send bulk e-mails legally, where to find thousands of free classified ads and much more. There are 2 Primary methods to get this venture going: METHOD # 1 : BY SENDING BULK E-MAIL LEGALLY ============================================ let's say that you decide to start small, just to see how it goes, and we will assume You and those involved send out only 5,000 e-mails each. Let's also assume that the mailing receive only a0.2% response (the response could be much better but lets just say it is only 0.2% . Also many people will send out hundreds of thousands e-mails instead of only 5,000 each). Continuing with this example, you send out only 5,000 e-mails. With a 0.2% response, that is only 10 orders for report # 1. Those 10 people responded by sending out 5,000 e-mail each for a total of 50,000. Out of those 50,000 e-mails only 0.2% responded with orders. That's = 100 people responded and ordered Report # 2. Those 100 people mail out 5,000 e-mails each for a total of 500,000 e-mails. The 0.2% response to that is 1000 orders for Report # 3. Those 1000 people send out 5,000 e-mails each for a total of 5 million e-mails sent out. The 0.2% response to that is 10,000 orders for Report # 4. Those 10,000 people send out 5,000 e-mails each for a total of 50,000,000 (50 million) e-mails. The 0.2% response to that is 100,000 orders for Report # 5. THAT'S 100,000 ORDERS TIMES $5 EACH = $500,000.00 (half million). Your total income in this example is: 1..... $50 + 2..... $500 + 3..... $5,000 + 4..... $50,000 + 5..... $500,000 ......... Grand Total = $555,550.00 NUMBERS DO NOT LIE. GET A PENCIL & PAPER AND FIGURE OUT THE WORST POSSIBLE RESPONSES AND NO MATTER HOW YOU CALCULATE IT, YOU WILL STILL MAKE A LOT OF MONEY ! ------------------------------------------------------------------------------ REMEMBER FRIEND, THIS IS ASSUMING ONLY 10 PEOPLE ORDERING OUT OF 5,000 YOU MAILED TO. Dare to think for a moment what would happen if everyone, or half or even one 4th of those people mailed 100,000 e-mails each or more? There are over 250 million people on the internet worldwide and counting. Believe me, many people will do just that, and more! METHOD # 2 : BY PLACING FREE ADS ON THE INTERNET =================================================== Advertising on the net is very very inexpensive and there are hundreds of FREE places to advertise. Placing a lot of free adson the internet will easily get a larger response. We strongly suggest you start with Method # 1 and add METHOD # 2 as you go along. For every $5 you receive, all you must do is e-mail them the Report they ordered. That's it . Always provide same day service on all orders. This will guarantee that the e-mail they send out, with your name and address on it, will be prompt because they can not advertise until they receive the report. _____________________ AVAILABLE REPORTS_____________________ ORDER EACH REPORT BY ITS NUMBER & NAME ONLY. Notes: Always send $5 cash (U.S. CURRENCY) for each Report. Checks NOT accepted. Make sure the cash is concealed by wrapping it in at least 2 sheets of paper. On one of those sheets of paper, Write the NUMBER & the NAME of the Report you are ordering, YOUR E-MAIL ADDRESS and your name and postal address. PLACE YOUR ORDER FOR THESE REPORTS NOW : ============================================== REPORT #1, "The Insider's Guide to Sending Bulk E-mail on the Internet" ORDER REPORT #1 FROM: G. Mitchell P.O. Box 25884 Honolulu, Hawaii 96825-0884 don't forget to provide a permanent e-mail address in clear writing (better typed) to receive the reports. We had problems in delivery e-mails before!!! ============================================== REPORT #2 "The Insider's Guide to Advertising for Free on the Internet" ORDER REPORT #2 FROM: JD P.O.Box 1114 Des Plaines, IL 60017 USA ============================================== REPORT #3 "The Secrets to Multilevel Marketing on the Internet" ORDER REPORT #3 FROM: J Santi 833 Walter Ave Des Plaines, IL 60016 USA ============================================== REPORT #4 "How to become a Millionaire utilizing the Power of Multilevel Marketing and the Internet" ORDER REPORT #4 FROM: Elaine Rix 138 Dundas Street, West, #243 Toronto, Ontario Canada M5G 1C3 ============================================== REPORT #5 "How to SEND 1,000,000 e-mails for FREE" ORDER REPORT #5 FROM: C. Shaw P.O. Box 468 Schomberg, Ontario Canada L0G IT0 ============================================== There are currently more than 250,000,000 people online worldwide! $$$$$$$$$ YOUR SUCCESS GUIDELINES $$$$$$$$$$$ Follow these guidelines to guarantee your success: If you do not receive at least 10 orders for Report #1 within 2 weeks, continue sending e-mails until you do. After you have received 10 orders, 2 to 3 weeks after that you should receive 100 orders or more for REPORT # 2. If you did not, continue advertising or sending e-mails until you do. Once you have received 100 or more orders for Report # 2, YOU CAN RELAX, because the system is already working for you , and the cash will continue to roll in ! THIS IS IMPORTANT TO REMEMBER : Every time your name is moved down on the list, you are placed in front of a different report. You can KEEP TRACK of your PROGRESS by watching which report people are ordering from you. IF YOU WANT TO GENERATE MORE INCOME SEND ANOTHER BATCH OF E-MAILS AND START THE WHOLE PROCESS AGAIN. There is NO LIMIT to the income you can generate from this business !!! ____________________________________________________ FOLLOWING IS A NOTE FROM THE ORIGINATOR OF THIS PROGRAM: You have just received information that can give you financial freedom for the rest of your life, with NO RISK and JUST A LITTLE BIT OF EFFORT. You can make more money in the next few weeks and months than you have ever imagined. Follow the program EXACTLY AS INSTRUCTED. Do Not change it in any way. It works exceedingly well as it is now. Remember to e-mail a copy of this exciting report after you have put your name and address in Report #1 and moved others to #2...........# 5 as instructed above. One of the people you send this to may send out 100,000 or more e-mails and your name will be on everyone of them. Remember though, the more you send out the more potential customers you will reach. So my friend, I have given you the ideas, information, materials and opportunity to become financially independent. IT IS UP TO YOU NOW ! ************** MORE TESTIMONIALS **************** "My name is Mitchell. My wife , Jody and I live in Chicago. I am an accountant with a major U.S. Corporation and I make pretty good money. When I received this program I grumbled to Jody about receiving ''junk mail''. I made fun of the whole thing, spouting my knowledge of the population and percentages involved. I ''knew'' it wouldn't work. Jody totally ignored my supposed intelligence and few days later she jumped in with both feet. I made merciless fun of her, and was ready to lay the old ''I told you so'' on her when the thing didn'twork. Well, the laugh was on me! Within 3 weeks she had received 50 responses. Within the next 45 days she had received a total of $ 147,200.00 all cash! I was shocked. I have joined Jody in her ''hobby''." Mitchell Wolf, Chicago, Illinois ------------------------------------------------------------ "Not being the gambling type, it took me several weeks to make up my mind to participate in this plan. But conservative that I am, I decided that the initial investment was so little that there was just no way that I wouldn't get enough orders to at least get my money back. I was surprised when I found my medium size post office box crammed with orders. I made $319,210.00 in the first 12 weeks. The nice thing about this deal is that it does not matter where people live. There simply isn't a better investment with a faster return and so big." Dan Sondstrom, Alberta, Canada ----------------------------------------------------------- "I had received this program before. I deleted it, but later I wondered if I should have given it a try. Of course, I had no idea who to contact to get another copy, so I had to wait until I was e-mailed again by someone else.........11 months passed then it luckily came again...... I did not delete this one! I made more than $490,000 on my first try and all the money came within 22 weeks". Susan De Suza, New York, N.Y. ---------------------------------------------------- "It really is a great opportunity to make relatively easy money with little cost to you. I followed the simple instructions carefully and within 10 days the money started to come in. My first month I made $ 20,560.00 and by the end of third month my total cash count was $ 362,840.00. Life is beautiful, Thanx to internet". Fred Dellaca, Westport, New Zealand ------------------------------------------------------------ ORDER YOUR REPORTS TODAY AND GET STARTED ON YOUR ROAD TO FINANCIAL FREEDOM ! ======================================================= If you have any questions of the legality of this program, contact the Office of Associate Director for Marketing Practices, Federal Trade Commission, Bureau of Consumer Protection, Washington, D.C. Under Bill s.1618 TITLE III passed by the 105th US Congress this letter cannot be considered spam as long as the sender includes contact information and a method of removal. This is one time e-mail transmission. No request for removal is necessary. ------------------------------------------------------------ This message is sent in compliance of the new email Bill HR 1910. Under Bill HR 1910 passed by the 106th US Congress on May 24, 1999, this message cannot be considered Spam as long as we include the way to be removed. Per Section HR 1910, Please type "REMOVE" in the subject line and reply to this email. All removal requests are handled personally an immediately once received. From list@netscape.com Thu Jun 7 23:13:50 2001 Received: from netscape.com (c3po.netscape.com [205.217.237.46]) by ietf.org (8.9.1a/8.9.1a) with SMTP id XAA20201 for ; Thu, 7 Jun 2001 23:13:49 -0400 (EDT) Received: from aka.mcom.com (aka.mcom.com [205.217.237.180]) by netscape.com (8.10.0/8.10.0) with ESMTP id f583CAY08363; Thu, 7 Jun 2001 20:12:10 -0700 (PDT) Received: (from list@localhost) by aka.mcom.com (8.10.0/8.10.0) id f583CCs22203; Thu, 7 Jun 2001 20:12:12 -0700 (PDT) Resent-Date: Thu, 7 Jun 2001 20:12:12 -0700 (PDT) Date: Thu, 7 Jun 2001 20:12:30 -0700 (PDT) Message-Id: <200106080312.f583CTF07464@xwing.aoltw.net> From: yiadu@aol.com To: yiugi@NetFriends.netscape.com Reply-To: 10ma@bigfoot.com Subject: I Can Help Recoup Money Lost In Other Programs! [dkvuz] Resent-Message-ID: <"reFj9D.A.haF.KKEI7"@glacier> Resent-From: ietf-ldapext@netscape.com X-Mailing-List: X-Loop: ietf-ldapext@netscape.com Precedence: list Resent-Sender: ietf-ldapext-request@netscape.com How many programs have you tried and FAILED? How many times have you been promised riches beyond your wildest dreams and they haven’t come true? Perhaps that’s because you haven’t received the help necessary to succeed in your past endeavors……. With our program I will personally teach you exactly what I have learned which has brought me success. By following my example you can receive $16,000 in the next few weeks! Sound unbelievable???? JUST TRY ME! Please reply with "Tell Me More" in the subject line. mailto:tim22u2@n2mail.com?subject=Tell_Me_More Name:____________ Phone Number:__________ Best time to call:___________ I promise to get back to you immediately Thanks, Eileen PS: Please put "Remove" in the subject line to get out of this list. Thanks. From list@netscape.com Fri Jun 8 14:38:55 2001 Received: from netscape.com (c3po.netscape.com [205.217.237.46]) by ietf.org (8.9.1a/8.9.1a) with SMTP id OAA18760 for ; Fri, 8 Jun 2001 14:38:54 -0400 (EDT) Received: from aka.mcom.com (aka.mcom.com [205.217.237.180]) by netscape.com (8.10.0/8.10.0) with ESMTP id f58Id5Y28330; Fri, 8 Jun 2001 11:39:05 -0700 (PDT) Received: (from list@localhost) by aka.mcom.com (8.10.0/8.10.0) id f58Id5A12635; Fri, 8 Jun 2001 11:39:05 -0700 (PDT) Resent-Date: Fri, 8 Jun 2001 11:39:05 -0700 (PDT) X-MimeOLE: Produced By Microsoft Exchange V6.0.4712.0 content-class: urn:content-classes:message MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Subject: RE: Does anyone have application(s) that uses SRV records ? Date: Fri, 8 Jun 2001 11:36:21 -0700 Message-ID: <4AEE3169443CDD4796CA8A00B02191CDBEC414@win-msg-01.wingroup.windeploy.ntdev.microsoft.com> Thread-Topic: Does anyone have application(s) that uses SRV records ? Thread-Index: AcDt8NCVafqkTu1eSRKC/NgJ+Fm8/ACWOs7g From: "Levon Esibov" To: Cc: "Olafur Gudmundsson" X-OriginalArrivalTime: 08 Jun 2001 18:36:21.0449 (UTC) FILETIME=[E9F04390:01C0F049] Content-Transfer-Encoding: 8bit X-MIME-Autoconverted: from quoted-printable to 8bit by aka.mcom.com id f58Id2v12595 Resent-Message-ID: <"41iNYB.A.5ED.GvRI7"@glacier> Resent-From: ietf-ldapext@netscape.com X-Mailing-List: X-Loop: ietf-ldapext@netscape.com Precedence: list Resent-Sender: ietf-ldapext-request@netscape.com Content-Transfer-Encoding: 8bit If you are aware of any other than Windows 2000 LDAP client implementation(s) that uses SRV DNS records to locate LDAP servers, please, contact me directly (I don't want to spam this mailing list). Thanks, Levon. > -----Original Message----- > From: Olafur Gudmundsson [mailto:ogud@ogud.com] > Sent: Tuesday, June 05, 2001 11:06 AM > To: namedroppers@ops.ietf.org > Subject: Does anyone have application(s) that uses SRV records ? > > We need implementation reports on how good the text in RFC2782 is. > And we need to perform interoperabilty tests that show that applications > follow the specification. > > Any help in getting this done is greatly appreciated. > > thanks > Olafur > > > > to unsubscribe send a message to namedroppers-request@ops.ietf.org with > the word 'unsubscribe' in a single line as the message text body. From list@netscape.com Fri Jun 8 15:11:31 2001 Received: from netscape.com (r2d2.netscape.com [205.217.237.47]) by ietf.org (8.9.1a/8.9.1a) with SMTP id PAA19402 for ; Fri, 8 Jun 2001 15:11:30 -0400 (EDT) Received: from aka.mcom.com (aka.mcom.com [205.217.237.180]) by netscape.com (8.10.0/8.10.0) with ESMTP id f58JALr03557; Fri, 8 Jun 2001 12:10:21 -0700 (PDT) Received: (from list@localhost) by aka.mcom.com (8.10.0/8.10.0) id f58JALg24385; Fri, 8 Jun 2001 12:10:21 -0700 (PDT) Resent-Date: Fri, 8 Jun 2001 12:10:21 -0700 (PDT) Sender: michael@junker.stroeder.com Message-ID: <3B212098.52EA4257@stroeder.com> Date: Fri, 08 Jun 2001 20:59:36 +0200 From: Michael =?iso-8859-1?Q?Str=F6der?= Reply-To: michael@stroeder.com Organization: stroeder.com X-Mailer: Mozilla 4.77 [en] (X11; U; Linux 2.2.19 i686) X-Accept-Language: de-DE, de, en MIME-Version: 1.0 To: ietf-ldapext@netscape.com Subject: Re: Does anyone have application(s) that uses SRV records ? References: <4AEE3169443CDD4796CA8A00B02191CDBEC414@win-msg-01.wingroup.windeploy.ntdev.microsoft.com> Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: 7bit Resent-Message-ID: <"bSCLr.A.Q8F.aMSI7"@glacier> Resent-From: ietf-ldapext@netscape.com X-Mailing-List: X-Loop: ietf-ldapext@netscape.com Precedence: list Resent-Sender: ietf-ldapext-request@netscape.com Content-Transfer-Encoding: 7bit Levon Esibov wrote: > > If you are aware of any other than Windows 2000 LDAP client > implementation(s) that uses SRV DNS records to locate LDAP servers, > please, contact me directly (I don't want to spam this mailing list). I would also be interested in knowing about other implementations. Ciao, Michael. From list@netscape.com Fri Jun 8 19:07:30 2001 Received: from netscape.com (c3po.netscape.com [205.217.237.46]) by ietf.org (8.9.1a/8.9.1a) with SMTP id TAA21525 for ; Fri, 8 Jun 2001 19:07:29 -0400 (EDT) Received: from aka.mcom.com (aka.mcom.com [205.217.237.180]) by netscape.com (8.10.0/8.10.0) with ESMTP id f58N43Y26044; Fri, 8 Jun 2001 16:04:03 -0700 (PDT) Received: (from list@localhost) by aka.mcom.com (8.10.0/8.10.0) id f58N42M19314; Fri, 8 Jun 2001 16:04:02 -0700 (PDT) Resent-Date: Fri, 8 Jun 2001 16:04:02 -0700 (PDT) Message-ID: <000022e16b98$00001c44$0000638d@actp.andersen.fr> To: From: newspicks@porto.portonet.com.br Subject: EXPLOSIVE STOCK ALERT at $0.07 !!! Date: Fri, 08 Jun 2001 11:41:52 -0400 MIME-Version: 1.0 Content-Type: text/plain; charset="Windows-1252" Content-Transfer-Encoding: 7bit X-Priority: 3 X-MSMail-Priority: Normal Resent-Message-ID: <"RC0WdC.A.9sE.gnVI7"@glacier> Resent-From: ietf-ldapext@netscape.com X-Mailing-List: X-Loop: ietf-ldapext@netscape.com Precedence: list Resent-Sender: ietf-ldapext-request@netscape.com Content-Transfer-Encoding: 7bit EXPLOSIVE STOCK ALERT at $0.07 !!!! EXPLOSIVE STOCK ALERT INNOVATIVE HLDGS (OTCBB: IHTL) HUGE NEWSLETTER COVERAGE THIS WEEK!!! This coming Tuesday IHTL will be profiled by some major newsletters. huge volume and a strong increase in price is expected for several days. The 52 week high for IHTL is $.38 Needless to say there is huge upside potential for IHTL. We believe the stock could easily reach over $.25 Good luck and watch IHTL fly this week! DISCLAIMER: hotstocks cautions that stocks are high-risk investments and that some or all investment dollars can be lost. We suggest you consult a professional investment advisor before purchasing any stock. All opinions expressed in this newsletter are the opinions of hotstocks. We own shares in the mentioned company and may sell at any time. We recommend you use the information found here as an initial starting point for conducting your own research and conduct your own due diligence on the featured company in order to determine your own personal opinion of the company before investing. for proper removal from this newsletter you must email: unsub992@excite.com From list@netscape.com Fri Jun 8 19:18:23 2001 Received: from netscape.com (c3po.netscape.com [205.217.237.46]) by ietf.org (8.9.1a/8.9.1a) with SMTP id TAA21613 for ; Fri, 8 Jun 2001 19:18:23 -0400 (EDT) Received: from aka.mcom.com (aka.mcom.com [205.217.237.180]) by netscape.com (8.10.0/8.10.0) with ESMTP id f58NGiY29238; Fri, 8 Jun 2001 16:16:44 -0700 (PDT) Received: (from list@localhost) by aka.mcom.com (8.10.0/8.10.0) id f58NBi223362; Fri, 8 Jun 2001 16:11:44 -0700 (PDT) Resent-Date: Fri, 8 Jun 2001 16:11:44 -0700 (PDT) From: bureauvirtuel@chez.com To: ietf-ldapext@netscape.com Date: Fri, 08 Jun 2001 19:08:01 PDT Subject: work at home Message-Id: <20010608231040.VXB2764.tomts14-srv.bellnexxia.net@lyne> Resent-Message-ID: <"pukWQC.A.wmF.cuVI7"@glacier> Resent-From: ietf-ldapext@netscape.com X-Mailing-List: X-Loop: ietf-ldapext@netscape.com Precedence: list Resent-Sender: ietf-ldapext-request@netscape.com ___________________________________ Si vous ne désirez plus recevoir de courriers de cette liste : To remove your email address from this list : http://www.intellitec.net/remove/ ___________________________________ votre adresse email a été trouvée par l'expéditeur de ce message avec le logiciel MailCast : your email address was found by the sender of this message using MailCast : http://www.intellitec.net/Commercial/MailCast/default.htm From list@netscape.com Fri Jun 8 19:20:32 2001 Received: from netscape.com (r2d2.netscape.com [205.217.237.47]) by ietf.org (8.9.1a/8.9.1a) with SMTP id TAA21662 for ; Fri, 8 Jun 2001 19:20:31 -0400 (EDT) Received: from aka.mcom.com (aka.mcom.com [205.217.237.180]) by netscape.com (8.10.0/8.10.0) with ESMTP id f58NIsr06760; Fri, 8 Jun 2001 16:18:54 -0700 (PDT) Received: (from list@localhost) by aka.mcom.com (8.10.0/8.10.0) id f58NIs228934; Fri, 8 Jun 2001 16:18:54 -0700 (PDT) Resent-Date: Fri, 8 Jun 2001 16:18:54 -0700 (PDT) Message-Id: <200106081037.f58AbCX15580@ywing.netscape.com> From: flyhit@sina.com Subject: Export Goldfish Sender: flyhit@sina.com Mime-Version: 1.0 Content-Type: text/plain; charset="iso-8859-1" Date: Thu, 14 Jun 2001 18:37:21 +0800 Resent-Message-ID: <"QsYw6B.A.NBH.Y1VI7"@glacier> Resent-From: ietf-ldapext@netscape.com X-Mailing-List: X-Loop: ietf-ldapext@netscape.com Precedence: list Resent-Sender: ietf-ldapext-request@netscape.com X-MIME-Autoconverted: from 8bit to quoted-printable by netscape.com id f58NIsr06760 Content-Transfer-Encoding: 8bit X-MIME-Autoconverted: from quoted-printable to 8bit by ietf.org id TAA21662 ÈổªÈ¡Ïû£¬Çë»Ø¸´: cancel@sina.com Export Goldfish ±± ¾© ½đ ÊÀ ½ç ¹Û ÉÍ Óă ÓĐ Ï̃ ¹« ˾ BEIJING GOLDEN-WORLD ORNAMENTAL FISH CO., LTD. Add: C-6-D Golden Lake Garden, Yaojiayuan Rd.,Chaoyang District, Beijing100026£¬P.R.China E-mail: flyhit@sina.com Tel: (8610) 6590 1567 Fax: (8610) 6590 1815 To whom it is concerned Fax: From: Beijing Golden-world Ornamental Fish Co., Ltd. Tel: 86 10 6590 1567 Fax: 86 10 6590 1815 E-mail:flyhit@sina.com Dear Sir or Madam, It is my pleasure to send our latest pricelist of goldfish. In our company, we can provide over 40 kinds of precious goldfish in stock. We guarantee the goldfish we provided are the best fish in china. Should you find interest in our any products, please contact us without hesitation for anytime. We are looking forward to getting good news from you shortly. Very truly yours, Yang laifeng Sales Manager Enclosed the Company Profiles and Pricelist BEIJING GOLDEN-WORLD ORNAMENTAL FISH CO., Ltd. Add: C-6-D Golden Lake Garden, Yaojiayuan Rd., Chaoyang District, Beijing100026£¬P.R.China E-mail: flyhit@sina.com Tel: (8610) 6590 1567 Fax: (8610) 6590 1815 As a special ornamental fish, goldfish is characterized by its beautiful shape, dignified and peaceful manner and refined posture. It is one of the best views for you in your park, garden, table and aquarium. For this reason, it is welcome by all markets all over the world. China is the birthplace of Goldfish; Beijing Goldfish is that kind of most famous and precious in China. Beijing Golden-world Ornamental Fish Co., Ltd. is joint ventures of foreign investment. It is located in golden place for ornamental fish export in Chaoyang district of Beijing with 2 miles to airport. It owns 10 hectares goldfish ponds and over 40 species of goldfish. In order to push the Beijing goldfish into international markets, the company introduced advanced culture technology and equipment from abroad. Also the company is an experimental base of Beijing Ornamental Fish Institute. Now the company is famous with the superior quality, purebred goldfish, advanced technology and professional staffs . To be true friend with you, the company wants to build the good relationship with you and to make best efforts for a beautiful world. PRICELIST (FOB IN US$) OF BEIJING GOLDEN-WORLD ORNAMENTAL FISH CO.,LTD I. ORANDA QUANTITY/BOXSIZE/CM 9004-5 8005-6 6006-7 3507-8 2508-9 2009-10 14010-11 12011-12 7012-14 6014-16 3616-18 2018-20 RED ,RED-WHITE,BLACK,CALICO,PURPLE,RED-CAP 0.09 0.14 0.18 0.30 0.42 0.65 0.85 1.05 1.65 2.40 3.60 4.80 BLACK-WHITE,BLUE,TRICOLOR 0.25 0.38 0.50 0.75 0.95 1.30 2.00 3.00 4.50 6.00 II. TIGERHEAD QUANTITY/BOXSIZE/CM 8004-5 7005-6 5506-7 3007-8 2208-9 1809-10 12010-11 10011-12 7012-14 6014-16 RED ,RED-WHITE,,RED-BLACK 0.15 0.20 0.40 0.70 1.00 1.60 2.20 3.20 4.00 6.00 RED &RED-WHITE RANCHU 0.25 0.52 0.90 1.30 1.80 2.50 3.60 5.00 8.00 III£®BUTTERFLY TAIL QUANTITY/BOXSIZE/CM 8004-5 7005-6 5506-7 3007-8 2208-9 1809-10 12010-11 10011-12 7012-14 RED ,RED-WHITE,,BLACK & CALICO 0.15 0.20 0.40 0.70 1.00 1.60 2.20 3.20 4.00 PANDA 1.00 2.00 4.00 5.00 8.00 12.00 18.00. 25.00 IV£®DRAGON EYES QUANTITY/BOXSIZE/CM 8004-5 7005-6 6006-7 3507-8 2508-9 2009-10 14010-11 12011-12 7012-14 6014-16 3616-18 2018-20 RED ,BLACK &CALICO 0.09 0.14 0.18 0.30 0.42 0.65 0.85 1.05 1.65 2.40 3.60 4.80 BLACK WITH LONG TAIL 0.10 0.15 0.20 0.35 0.45 0.70 0.90 1.20 1.80 3.00 4.50 V£®PEARLSCALE QUANTITY/BOXSIZE/CM 8004-5 7005-6 5506-7 3007-8 2208-9 1809-10 12010-11 10011-12 7012-14 CROWN 0.15 0.20 0.40 0.70 1.00 1.60 2.20 3.20 4.00 CALICO 0.15 0.20 0.40 0.70 1.00 1.60 2.20 3.20 4.00 VI£®FRANGETAIL QUANTITY/BOXSIZE/CM 9004-5 8005-6 6006-7 3507-8 2508-9 2009-10 14010-11 12011-12 7012-14 6014-16 3616-18 2018-20 RED ,RED-BLACK,RED-WHITE & CALICO 0.09 0.14 0.18 0.30 0.42 0.65 0.85 1.05 1.65 2.40 3.60 4.80 VII£®BUBBLE EYE QUANTITY/BOXSIZE/CM 8004-5 7005-6 5506-7 3007-8 2208-9 1809-10 12010-11 10011-12 7012-14 RED ,RED-WHITE,BLACK & CALICO 0.10 0.15 0.20 0.35 0.45 0.70 0.90 1.20 1.80 VIII£®VELET BALL QUANTITY/BOXSIZE/CM 8004-5 7005-6 5506-7 3007-8 2208-9 1809-10 12010-11 10011-12 7012-14 RED VELET BALL 0.15 0.20 0.40 0.70 1.00 1.60 2.20 3.20 4.00 PURPLE VELET BALL 0.15 0.20 0.40 0.70 1.00 1.60 2.20 3.20 4.00 IX£®FANTAIL QUANTITY/BOXSIZE/CM 9004-5 8005-6 6006-7 3507-8 2508-9 2009-10 14010-11 12011-12 7012-14 6014-16 3616-18 RED ,RED-WHITE,CALICO & RED CAP 0.09 0.14 0.18 0.30 0.42 0.65 0.85 1.05 1.65 2.40 3.60 X£®CELESTRAIL EYES QUANTITY/BOXSIZE/CM 8004-5 7005-6 5506-7 3007-8 2208-9 1809-10 12010-11 10011-12 RED & PURPLE 0.09 0.14 0.18 0.30 0.42 0.65 0.85 1.05 XI£®COMMON GOLDFISN ( RED, RED-WHITE ,RED-BLACK ) 65.00USD/BOX SIZE/CM 3-5 5-7 7-10 10-12 12-15 15-18 18-20 20-22 22-25 QUANTITY/BOX 1200 600 300 200 100 65 35 25 15 XII£®SHUBUNKIN & KOI 120.00USD/BOX SIZE/CM 6-8 8-10 10-12 12-15 15-18 18-20 QUANTITY/BOX 400 250 200 90 60 30 XIII£®OTHER AQUATIC ANIMALS AND PLANTS NAME SIZE QUAN PRICE LOBSTER 8-12cm 300PCS/BOX 0.55USD/PCS FIRE-NEWTS 7-9-12cm 2000CS/BOX 0.20USD/PCS LOACH 4-6cm 1200PCS/BOX 0.20USD/PCS 9-14cm 500PCS/BOX 0.25USD/PCS WATER-LILY RED/YELLOW 200PCS/BOX 0.55USD/PCS PINK/WHITE 200PCS/BOX 0.55USD/PCS XIV.HEAT-PACKS 0.25USD/PCS, 240PCS/BOX, 960BOX/CONTAINER From list@netscape.com Fri Jun 8 21:31:45 2001 Received: from netscape.com (c3po.netscape.com [205.217.237.46]) by ietf.org (8.9.1a/8.9.1a) with SMTP id VAA22800 for ; Fri, 8 Jun 2001 21:31:44 -0400 (EDT) Received: from aka.mcom.com (aka.mcom.com [205.217.237.180]) by netscape.com (8.10.0/8.10.0) with ESMTP id f591ToY17373; Fri, 8 Jun 2001 18:29:50 -0700 (PDT) Received: (from list@localhost) by aka.mcom.com (8.10.0/8.10.0) id f591Tps01899; Fri, 8 Jun 2001 18:29:51 -0700 (PDT) Resent-Date: Fri, 8 Jun 2001 18:29:51 -0700 (PDT) From: flyhit@sina.com Subject: Export Goldfish Sender: flyhit@sina.com Mime-Version: 1.0 Content-Type: text/plain; charset="iso-8859-1" Date: Thu, 14 Jun 2001 09:53:19 +0800 Message-Id: <200106080952140.SM00365@> Resent-Message-ID: <"2Deqh.A.Rd.NwXI7"@glacier> Resent-From: ietf-ldapext@netscape.com X-Mailing-List: X-Loop: ietf-ldapext@netscape.com Precedence: list Resent-Sender: ietf-ldapext-request@netscape.com X-MIME-Autoconverted: from 8bit to quoted-printable by netscape.com id f591ToY17373 Content-Transfer-Encoding: 8bit X-MIME-Autoconverted: from quoted-printable to 8bit by ietf.org id VAA22800 ÈổªÈ¡Ïû£¬Çë»Ø¸´: cancel@sina.com Export Goldfish ±± ¾© ½đ ÊÀ ½ç ¹Û ÉÍ Óă ÓĐ Ï̃ ¹« ˾ BEIJING GOLDEN-WORLD ORNAMENTAL FISH CO., LTD. Add: C-6-D Golden Lake Garden, Yaojiayuan Rd.,Chaoyang District, Beijing100026£¬P.R.China E-mail: flyhit@sina.com Tel: (8610) 6590 1567 Fax: (8610) 6590 1815 To whom it is concerned Fax: From: Beijing Golden-world Ornamental Fish Co., Ltd. Tel: 86 10 6590 1567 Fax: 86 10 6590 1815 E-mail:flyhit@sina.com Dear Sir or Madam, It is my pleasure to send our latest pricelist of goldfish. In our company, we can provide over 40 kinds of precious goldfish in stock. We guarantee the goldfish we provided are the best fish in china. Should you find interest in our any products, please contact us without hesitation for anytime. We are looking forward to getting good news from you shortly. Very truly yours, Yang laifeng Sales Manager Enclosed the Company Profiles and Pricelist BEIJING GOLDEN-WORLD ORNAMENTAL FISH CO., Ltd. Add: C-6-D Golden Lake Garden, Yaojiayuan Rd., Chaoyang District, Beijing100026£¬P.R.China E-mail: flyhit@sina.com Tel: (8610) 6590 1567 Fax: (8610) 6590 1815 As a special ornamental fish, goldfish is characterized by its beautiful shape, dignified and peaceful manner and refined posture. It is one of the best views for you in your park, garden, table and aquarium. For this reason, it is welcome by all markets all over the world. China is the birthplace of Goldfish; Beijing Goldfish is that kind of most famous and precious in China. Beijing Golden-world Ornamental Fish Co., Ltd. is joint ventures of foreign investment. It is located in golden place for ornamental fish export in Chaoyang district of Beijing with 2 miles to airport. It owns 10 hectares goldfish ponds and over 40 species of goldfish. In order to push the Beijing goldfish into international markets, the company introduced advanced culture technology and equipment from abroad. Also the company is an experimental base of Beijing Ornamental Fish Institute. Now the company is famous with the superior quality, purebred goldfish, advanced technology and professional staffs . To be true friend with you, the company wants to build the good relationship with you and to make best efforts for a beautiful world. PRICELIST (FOB IN US$) OF BEIJING GOLDEN-WORLD ORNAMENTAL FISH CO.,LTD I. ORANDA QUANTITY/BOXSIZE/CM 9004-5 8005-6 6006-7 3507-8 2508-9 2009-10 14010-11 12011-12 7012-14 6014-16 3616-18 2018-20 RED ,RED-WHITE,BLACK,CALICO,PURPLE,RED-CAP 0.09 0.14 0.18 0.30 0.42 0.65 0.85 1.05 1.65 2.40 3.60 4.80 BLACK-WHITE,BLUE,TRICOLOR 0.25 0.38 0.50 0.75 0.95 1.30 2.00 3.00 4.50 6.00 II. TIGERHEAD QUANTITY/BOXSIZE/CM 8004-5 7005-6 5506-7 3007-8 2208-9 1809-10 12010-11 10011-12 7012-14 6014-16 RED ,RED-WHITE,,RED-BLACK 0.15 0.20 0.40 0.70 1.00 1.60 2.20 3.20 4.00 6.00 RED &RED-WHITE RANCHU 0.25 0.52 0.90 1.30 1.80 2.50 3.60 5.00 8.00 III£®BUTTERFLY TAIL QUANTITY/BOXSIZE/CM 8004-5 7005-6 5506-7 3007-8 2208-9 1809-10 12010-11 10011-12 7012-14 RED ,RED-WHITE,,BLACK & CALICO 0.15 0.20 0.40 0.70 1.00 1.60 2.20 3.20 4.00 PANDA 1.00 2.00 4.00 5.00 8.00 12.00 18.00. 25.00 IV£®DRAGON EYES QUANTITY/BOXSIZE/CM 8004-5 7005-6 6006-7 3507-8 2508-9 2009-10 14010-11 12011-12 7012-14 6014-16 3616-18 2018-20 RED ,BLACK &CALICO 0.09 0.14 0.18 0.30 0.42 0.65 0.85 1.05 1.65 2.40 3.60 4.80 BLACK WITH LONG TAIL 0.10 0.15 0.20 0.35 0.45 0.70 0.90 1.20 1.80 3.00 4.50 V£®PEARLSCALE QUANTITY/BOXSIZE/CM 8004-5 7005-6 5506-7 3007-8 2208-9 1809-10 12010-11 10011-12 7012-14 CROWN 0.15 0.20 0.40 0.70 1.00 1.60 2.20 3.20 4.00 CALICO 0.15 0.20 0.40 0.70 1.00 1.60 2.20 3.20 4.00 VI£®FRANGETAIL QUANTITY/BOXSIZE/CM 9004-5 8005-6 6006-7 3507-8 2508-9 2009-10 14010-11 12011-12 7012-14 6014-16 3616-18 2018-20 RED ,RED-BLACK,RED-WHITE & CALICO 0.09 0.14 0.18 0.30 0.42 0.65 0.85 1.05 1.65 2.40 3.60 4.80 VII£®BUBBLE EYE QUANTITY/BOXSIZE/CM 8004-5 7005-6 5506-7 3007-8 2208-9 1809-10 12010-11 10011-12 7012-14 RED ,RED-WHITE,BLACK & CALICO 0.10 0.15 0.20 0.35 0.45 0.70 0.90 1.20 1.80 VIII£®VELET BALL QUANTITY/BOXSIZE/CM 8004-5 7005-6 5506-7 3007-8 2208-9 1809-10 12010-11 10011-12 7012-14 RED VELET BALL 0.15 0.20 0.40 0.70 1.00 1.60 2.20 3.20 4.00 PURPLE VELET BALL 0.15 0.20 0.40 0.70 1.00 1.60 2.20 3.20 4.00 IX£®FANTAIL QUANTITY/BOXSIZE/CM 9004-5 8005-6 6006-7 3507-8 2508-9 2009-10 14010-11 12011-12 7012-14 6014-16 3616-18 RED ,RED-WHITE,CALICO & RED CAP 0.09 0.14 0.18 0.30 0.42 0.65 0.85 1.05 1.65 2.40 3.60 X£®CELESTRAIL EYES QUANTITY/BOXSIZE/CM 8004-5 7005-6 5506-7 3007-8 2208-9 1809-10 12010-11 10011-12 RED & PURPLE 0.09 0.14 0.18 0.30 0.42 0.65 0.85 1.05 XI£®COMMON GOLDFISN ( RED, RED-WHITE ,RED-BLACK ) 65.00USD/BOX SIZE/CM 3-5 5-7 7-10 10-12 12-15 15-18 18-20 20-22 22-25 QUANTITY/BOX 1200 600 300 200 100 65 35 25 15 XII£®SHUBUNKIN & KOI 120.00USD/BOX SIZE/CM 6-8 8-10 10-12 12-15 15-18 18-20 QUANTITY/BOX 400 250 200 90 60 30 XIII£®OTHER AQUATIC ANIMALS AND PLANTS NAME SIZE QUAN PRICE LOBSTER 8-12cm 300PCS/BOX 0.55USD/PCS FIRE-NEWTS 7-9-12cm 2000CS/BOX 0.20USD/PCS LOACH 4-6cm 1200PCS/BOX 0.20USD/PCS 9-14cm 500PCS/BOX 0.25USD/PCS WATER-LILY RED/YELLOW 200PCS/BOX 0.55USD/PCS PINK/WHITE 200PCS/BOX 0.55USD/PCS XIV.HEAT-PACKS 0.25USD/PCS, 240PCS/BOX, 960BOX/CONTAINER From list@netscape.com Fri Jun 8 23:13:37 2001 Received: from netscape.com (c3po.netscape.com [205.217.237.46]) by ietf.org (8.9.1a/8.9.1a) with SMTP id XAA25413 for ; Fri, 8 Jun 2001 23:13:36 -0400 (EDT) Received: from aka.mcom.com (aka.mcom.com [205.217.237.180]) by netscape.com (8.10.0/8.10.0) with ESMTP id f593BxY24583; Fri, 8 Jun 2001 20:11:59 -0700 (PDT) Received: (from list@localhost) by aka.mcom.com (8.10.0/8.10.0) id f593BwI25726; Fri, 8 Jun 2001 20:11:59 -0700 (PDT) Resent-Date: Fri, 8 Jun 2001 20:11:59 -0700 (PDT) Date: Fri, 8 Jun 2001 20:12:16 -0700 (PDT) Message-Id: <200106090312.f593CGs00900@xwing.aoltw.net> From: okcrn@hotmail.com To: rwiqx@MyOnlineFriends.netscape.com Reply-To: r4sm@bigfoot.com Subject: An 18 to 1 Return On Your Money, GUARANTEED! [yphtw] Resent-Message-ID: <"K-_LuD.A.dRG.9PZI7"@glacier> Resent-From: ietf-ldapext@netscape.com X-Mailing-List: X-Loop: ietf-ldapext@netscape.com Precedence: list Resent-Sender: ietf-ldapext-request@netscape.com This is a personal invitation for you to be a part of our private association. We are a group of successful entrepreneurs with backgrounds specializing in helping others achieve financial success. Our goal was to combine our knowledge and expertise to create a moneymaking opportunity like no other. We wanted to make it simple, easy, and duplicable. This opportunity is a 100% win/win offering for every participant. There are absolutely no losers, whatsoever! Some of the benefits of this opportunity include: 1. Passive participants can make $36,000 on average every 1-2 months. 2. Recruiters can make $2000 - $5000 a day realistically 3. Beautifully thought out program was created to be fair for all participants. 4. Support, Support, Support 5. Complete TURNKEY SYSTEM in place 6. NO SPONSORING REQUIRED 7. $1000 fast start bonuses paid within 48 hours. 8. $2000 to participate passively or $500 to actively participate actively. We have over twelve years experience. This has allowed us to help thousands of people from students to executives to create the lifestyles and incomes they deserve! This activity is NOT network marketing, multi-level marketing, direct sales, a business or any commercial activity. Individuals simply support each other in a team concept and help change lives. BONUS: The first 20 people who respond to this ad, will be considered for an introduction to a HIGH YIELD PROGRAM that has been paying consistently for over 30 years. (After a personal relationship is established) Follow these 3 easy steps to secure your financial future. 1.Listen to the 3 minute sizzle message: 800-542-5120 2.Pull up the Fax on Demand: 403-934-6061 doc 399709## 3.Respond to this email and include the information below, and we will contact you within 24hrs. mailto:tim24me@n2mail.com?subject=Heres_My_Form_Filled First and Last Name: _____________________________________ Phone# ___________________________________________________ Best time to reach you: ________ Time zone _______________ Level of interest on a scale of 1-10 … 10 Being the highest ___________ Thank You and have a Prosperous Day Mark PS: Please put "Remove" in the subject line to get out of this list. Thanks. From list@netscape.com Fri Jun 8 23:15:23 2001 Received: from netscape.com (c3po.netscape.com [205.217.237.46]) by ietf.org (8.9.1a/8.9.1a) with SMTP id XAA25467 for ; Fri, 8 Jun 2001 23:15:23 -0400 (EDT) Received: from aka.mcom.com (aka.mcom.com [205.217.237.180]) by netscape.com (8.10.0/8.10.0) with ESMTP id f593CeY24996; Fri, 8 Jun 2001 20:12:41 -0700 (PDT) Received: (from list@localhost) by aka.mcom.com (8.10.0/8.10.0) id f593CfY26515; Fri, 8 Jun 2001 20:12:41 -0700 (PDT) Resent-Date: Fri, 8 Jun 2001 20:12:41 -0700 (PDT) Date: Fri, 8 Jun 2001 20:15:11 -0700 (MST) From: 2sauv@msn.com Message-Id: <200106090315.UAA06060@aapunix.aapunix1.com> To: 9ebep10hn3@msn.com Reply-To: andersonoverlee3534@excite.com Subject: Get Out Of Debt Without Another Loan! [rbtus] Resent-Message-ID: <"lSrDZB.A.sdG.nQZI7"@glacier> Resent-From: ietf-ldapext@netscape.com X-Mailing-List: X-Loop: ietf-ldapext@netscape.com Precedence: list Resent-Sender: ietf-ldapext-request@netscape.com Bill Problems? What Is Your Next Move? Debt Consolidation! For a FREE Consultation... Please Read On Are you tired of being overwhelmed by your bills? Feeling as if is there nothing you can do about it? We help you get out of debt without another loan! We make Debt a thing of the Past! We offer hope and help to put you back on track with your finances. We are here to help! You do not have to be a homeowner! Your past credit history does not matter! Same Day Approval! Nationwide! No Credit Check! For a FREE Consultation Please provide the following information. Full Name: Address: City: State: Zip Code: Home Phone: Work Phone: Best Time to Call: E-Mail Address: Estimated Debt Size: (Please note that we are only able to help those who have a debt size of $7500 or over) (All information is kept securely and never provided to any third party sources) To unsubscribe please hit reply and send a message with remove in the subject. From list@netscape.com Sat Jun 9 17:39:29 2001 Received: from netscape.com (r2d2.netscape.com [205.217.237.47]) by ietf.org (8.9.1a/8.9.1a) with SMTP id RAA19392 for ; Sat, 9 Jun 2001 17:39:28 -0400 (EDT) Received: from aka.mcom.com (aka.mcom.com [205.217.237.180]) by netscape.com (8.10.0/8.10.0) with ESMTP id f59LbYr05716; Sat, 9 Jun 2001 14:37:35 -0700 (PDT) Received: (from list@localhost) by aka.mcom.com (8.10.0/8.10.0) id f59LbZw00609; Sat, 9 Jun 2001 14:37:35 -0700 (PDT) Resent-Date: Sat, 9 Jun 2001 14:37:35 -0700 (PDT) Message-Id: <200106092136.f59LaQ713056@ywing.netscape.com> From: "Program Info Concen1" To: Subject: The Program Sender: "Program Info Concen1" Mime-Version: 1.0 Content-Type: text/plain; charset="ISO-8859-1" Date: Sat, 9 Jun 2001 17:32:56 -0400 Reply-To: "Program Info Concen1" Content-Transfer-Encoding: 8bit Resent-Message-ID: <"8Iw5e.A.JJ.dcpI7"@glacier> Resent-From: ietf-ldapext@netscape.com X-Mailing-List: X-Loop: ietf-ldapext@netscape.com Precedence: list Resent-Sender: ietf-ldapext-request@netscape.com Content-Transfer-Encoding: 8bit Several months ago, I made a conscious decision not to delete what I figured was just another "junk" e-mail. That decision has changed my life. Here you have the very same opportunity in front of you. If you take just five minutes to read through the following program you won't regret it. See for yourself! Dear Friends & Future Millionaires: AS SEEN ON NATIONAL TV: Making over half a million dollars every 4 to 5 months from your home for an investment of only $25 U.S. Dollars expense one time THANKS TO THE COMPUTER AGE AND THE INTERNET ! ================================================== BE A MILLIONAIRE LIKE OTHERS WITHIN A YEAR!!! Before you say ''Bull'', please read the following. This is the letter you have been hearing about on the news lately. Due to the popularity of this letter on the Internet, a national weekly news program recently devoted an entire show to the investigation of this program described below, to see if it really can make people money. The show also investigated whether or not the program was legal. Their findings proved once and for all that there are ''absolutely NO Laws prohibiting the participation in the program and if people can -follow the simple instructions, they are bound to make some mega bucks with only $25 out of pocket cost''. DUE TO THE RECENT INCREASE OF POPULARITY & RESPECT THIS PROGRAM HAS ATTAINED, IT IS CURRENTLY WORKING BETTER THAN EVER. This is what one had to say: ''Thanks to this profitable opportunity. I was approached many times before but each time I passed on it. I am so glad finally joined just to see what one could expect in return for the minimal effort and money required. To my astonishment, I received total $610,470.00 in 21 weeks, with money still coming in." Pam Hedland, Fort Lee, New Jersey. =================================================== Here is another testimonial: "This program has been around for a long time but I never believed in it. But one day when I received this again in the mail I decided to gamble my $25 on it. I followed the simple instructions and voila ..... 3 weeks later the money started to come in. First month I only made $240.00 but the next 2 months after that I made a total of $290,000.00. So far, in the past 8 months by re-entering the program, I have made over $710,000.00 and I am playing it again. The key to success in this program is to follow the simple steps and NOT change anything.'' More testimonials later but first, ===== PRINT THIS NOW FOR YOUR FUTURE REFERENCE ====== $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ If you would like to make at least $500,000 every 4 to 5 months easily and comfortably, please read the following...THEN READ IT AGAIN and AGAIN!!! $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ FOLLOW THE SIMPLE INSTRUCTIONS BELOW AND YOUR FINANCIAL DREAMS WILL COME TRUE, GUARANTEED! INSTRUCTIONS: =====Order all 5 reports shown on the list below ===== For each report, send $5 CASH, THE NAME & NUMBER OF THE REPORT YOU ARE ORDERING and YOUR E-MAIL ADDRESS to the person whose name appears ON THAT LIST next to the report. MAKE SURE YOUR RETURN ADDRESS IS ON YOUR ENVELOPE TOP LEFT CORNER in case of any mail problems. === When you place your order, make sure you order each of the 5 reports. You will need all 5 reports so that you can save them on your computer and resell them. YOUR TOTAL COST $5 X 5=$25.00. Within a few days you will receive, via e-mail, each of the 5 reports from these 5 different individuals. Save them on your computer so they will be accessible for you to send to the 1,000's of people who will order them from you. Also make a floppy of these reports and keep it on your desk in case something happens to your computer. IMPORTANT - DO NOT alter the names of the people who are listed next to each report, or their sequence on the list, in any way other than what is instructed below in steps '' 1 through 6 '' or you will loose out on a majority of your profits. Once you understand the way this works, you will also see how it does not work if you change it. Remember, this method has been tested, and if you alter it, it will NOT work!!! People have tried to put their friends/relatives names on all five thinking they could get all the money. But it does not work this way. Believe us, we all have tried to be greedy and then nothing happened. So Do Not try to change anything other than what is instructed. Because if you do, it will not work for you. Remember, honesty reaps the reward!!! 1.... After you have ordered all 5 reports, take this advertisement and REMOVE the name & address of the person in REPORT # 5. This person has made it through the cycle and is no doubt counting their fortune. 2.... Move the name & address in REPORT # 4 down TO REPORT # 5. 3.... Move the name & address in REPORT # 3 down TO REPORT # 4. 4.... Move the name & address in REPORT # 2 down TO REPORT # 3. 5.... Move the name & address in REPORT # 1 down TO REPORT # 2. 6.... Insert YOUR name & address in the REPORT # 1 Position. PLEASE MAKE SURE you copy every name & address ACCURATELY! ========================================================== **** Take this entire letter, with the modified list of names, and save it on your computer. DO NOT MAKE ANY OTHER CHANGES. Save this on a disk as well just in case if you loose any data. To assist you with marketing your business on the internet, the 5 reports you purchase will provide you with invaluable marketing information which includes how to send bulk e-mails legally, where to find thousands of free classified ads and much more. There are 2 Primary methods to get this venture going: METHOD # 1: BY SENDING BULK E-MAIL LEGALLY ========================================================== Let's say that you decide to start small, just to see how it goes, and we will assume You and those involved send out only 5,000 e-mails each. Let's also assume that the mailing receives only a 0.2% response (the response could be much better but lets just say it is only 0.2%. Also many people will send out hundreds of thousands of e-mails instead of only 5,000 each). Continuing with this example, you send out only 5,000 e-mails. With a 0.2% response, that is only 10 orders for report # 1. Those 10 people responded by sending out 5,000 e-mail each for a total of 50,000. Out of those 50,000 e-mails only 0.2% responded with orders. That's 100 people responded and ordered Report # 2. Those 100 people mail out 5,000 e-mails each for a total of 500,000 e-mails. The 0.2% response to that is 1000 orders for Report # 3. Those 1000 people send out 5,000 e-mails each for a total of 5 million e-mails sent out. The 0.2% response to that is 10,000 orders for Report # 4. Those 10,000 people send out 5,000 e-mails each for a total of 50,000,000 (50 million) e-mails. The 0.2% response to that is 100,000 orders for Report # 5 THAT'S 100,000 ORDERS TIMES $5 EACH=$500,000.00 (half a million). Your total income in this example is: 1..... $50 + 2..... $500 + 3..... $5,000 + 4.... $50,000 + 5..... $500,000 ........ Grand Total=$555,550.00 NUMBERS DO NOT LIE. GET A PENCIL & PAPER AND FIGURE OUT THE WORST POSSIBLE RESPONSE AND NO MATTER HOW YOU CALCULATE IT, YOU WILL STILL MAKE A LOT OF MONEY! ========================================================= REMEMBER FRIEND, THIS IS ASSUMING ONLY 10 PEOPLE ORDERING OUT OF 5,000 YOU MAILED TO. Dare to think for a moment what would happen if everyone or half or even one 4th of those people mailed 100,000e-mails each or more? There are over 150 million people on the Internet worldwide and counting. Believe me, many people will do just that, and more! ========================================================= METHOD # 2 : BY PLACING FREE ADS ON THE INTERNET ======================================================= Advertising on the net is very very inexpensive and there are hundreds of FREE places to advertise. Placing a lot of free ads on the Internet will easily get a larger response. We strongly suggest you start with Method # 1 and add METHOD # 2 as you go along. For every $5 you receive, all you must do is e-mail them the Report they ordered. That's it. Always provide same day service on all orders. This will guarantee that the e-mail they send out, with your name and address on it, will be prompt because they can not advertise until they receive the report. =========== AVAILABLE REPORTS ==================== ORDER EACH REPORT BY ITS NUMBER & NAME ONLY. Notes: Always send $5 cash (U.S. CURRENCY) for each Report. Checks NOT accepted. Make sure the cash is concealed by wrapping it in at least 2 sheets of paper. On one of those sheets of paper, Write the NUMBER & the NAME of the Report you are ordering, YOUR E-MAIL ADDRESS and your name and postal address. PLACE YOUR ORDER FOR THESE REPORTS NOW : ==================================================== REPORT # 1: "The Insider's Guide to Advertising for Free on the Net" Order Report #1 from: N. H. Merrill 147 Crescent St. Shrewsbury ___________________________________________________________ REPORT # 2: "The Insider's Guide to Sending Bulk e-mail on the Net" Order Report # 2 from: C. Henry 16211 N. 21st Street Phoenix, Arizona 85022 USA ____________________________________________________________ REPORT # 3: "Secret to Multilevel Marketing on the Net" Order Report # 3 from : R.F. 33 Thistledown Court Nepean, Ontario K2J 1J4 CANADA ____________________________________________________________ REPORT # 4: "How to Become a Millionaire Utilizing MLM & the Net" Order Report # 4 from: Dianna Jepson 63 West 4th Street North Berwick, ME 03906 USA ____________________________________________________________ REPORT #5: "How to Send Out 0ne Million e-mails for Free" Order Report # 5 from: K.A. PO Box 122 Springdale, WA 99173 USA ____________________________________________________________ $$$$$$$$$ YOUR SUCCESS GUIDELINES $$$$$$$$$$$ Follow these guidelines to guarantee your success: === If you do not receive at least 10 orders for Report #1 within 2 weeks, continue sending e-mails until you do. === After you have received 10 orders, 2 to 3 weeks after that you should receive 100 orders or more for REPORT # 2. If you did not, continue advertising or sending e-mails until you do. === Once you have received 100 or more orders for Report # 2, YOU CAN RELAX, because the system is already working for you, and the cash will continue to roll in! THIS IS IMPORTANT TO REMEMBER: Every time your name is moved down on the list, you are placed in front of a Different report. You can KEEP TRACK of your PROGRESS by watching which report people are ordering from you. IF YOU WANT TO GENERATE MORE INCOME SEND ANOTHER BATCH OF E-MAILS AND START THE WHOLE PROCESS AGAIN. There is NO LIMIT to the income you can generate from this business!!! ====================================================== FOLLOWING IS A NOTE FROM THE ORIGINATOR OF THIS PROGRAM: You have just received information that can give you financial freedom for the rest of your life, with NO RISK and JUST A LITTLE BIT OF EFFORT. You can make more money in the next few weeks and months than you have ever imagined. Follow the program EXACTLY AS INSTRUCTED. Do Not change it in any way. It works exceedingly well as it is now. Remember to e-mail a copy of this exciting report after you have put your name and address in Report #1 and moved others to #2 ...........# 5 as instructed above. One of the people you send this to may send out 100,000 or more e-mails and your name will be on every one of them. Remember though, the more you send out the more potential customers you will reach. So my friend, I have given you the ideas, information, materials and opportunity to become financially independent. IT IS UP TO YOU NOW! ============ MORE TESTIMONIALS ================ "My name is Mitchell. My wife, Jody and I live in Chicago. I am an accountant with a major U.S. Corporation and I make pretty good money. When I received this program I grumbled to Jody about receiving ''junk mail.'' I made fun of the whole thing, spouting my knowledge of the population and percentages involved. I ''knew'' it wouldn't work. Jody totally ignored my supposed intelligence and a few days later she jumped in with both feet. I made merciless fun of her, and was ready to lay the old ''I told you so" on her when the thing didn't work. Well, the laugh was on me! Within 3 weeks she had received 50 responses. Within the next 45 days she had received a total of $147,200.00 ........... all cash! I was shocked. I have joined Jody in her "hobby." Mitchell Wolf, Chicago, Illinois ====================================================== "Not being the gambling type, it took me several weeks to make up my mind to participate in this plan. But conservative that I am, I decided that the initial investment was so little that there was just no way that I wouldn't get enough orders to at least get my money back." "I was surprised when I found my medium sized post office box crammed with orders. I made $319,210.00 in the first 12 weeks. The nice thing about this deal is that it does not matter where people live. There simply isn't a better investment with a faster return and so big." Dan Sondstrom, Alberta, Canada ======================================================= ''I had received this program before. I deleted it, but later I wondered if I should have given it a try. Of course, I had no idea who to contact to get another copy, so I had to wait until I was e-mailed again by someone else.........11 months passed then it luckily came again...... I did not delete this one! I made more than $490,000 on my first try and all the money came within 22 weeks." Susan De Suza, New York, N.Y. ======================================================= ''It really is a great opportunity to make relatively easy money with little cost to you. I followed the simple instructions carefully and within 10 days the money started to come in. My first month I made $20,560.00 and by the end of third month my total cash count was $362,840.00. Life is beautiful, Thanx to the internet." Fred Dellaca, Westport, New Zealand ======================================================= ORDER YOUR REPORTS TODAY AND GET STARTED ON 'YOUR' ROAD TO FINANCIAL FREEDOM! ======================================================= If you have any questions of the legality of this program, contact the Office of Associate Director for Marketing Practices, Federal Trade Commission, Bureau of Consumer Protection, Washington, D.C ======================================================== This message is sent in compliance of the new e-mail bill: SECTION 301. Per Section 301, Paragraph (a)(2)(C) of S. 1618, ============================================================ To be removed from the list, just put "Remove" in subject line and send. _________________________________________________ From list@netscape.com Sun Jun 10 01:27:22 2001 Received: from netscape.com (r2d2.netscape.com [205.217.237.47]) by ietf.org (8.9.1a/8.9.1a) with SMTP id BAA26351 for ; Sun, 10 Jun 2001 01:27:21 -0400 (EDT) Received: from aka.mcom.com (aka.mcom.com [205.217.237.180]) by netscape.com (8.10.0/8.10.0) with ESMTP id f5A5Pgr24511; Sat, 9 Jun 2001 22:25:43 -0700 (PDT) Received: (from list@localhost) by aka.mcom.com (8.10.0/8.10.0) id f5A5PhM12243; Sat, 9 Jun 2001 22:25:43 -0700 (PDT) Resent-Date: Sat, 9 Jun 2001 22:25:43 -0700 (PDT) Message-Id: <200106100526.f5A5Q2w26528@xwing.aoltw.net> From: "Ronny Uklin" Subject: Reduce Your Monthly #66FC To: ksl32@xwing.aoltw.net X-Mailer: Microsoft Outlook Express 4.72.1712.3 X-MimeOLE: Produced By Microsoft MimeOLE VĐßD.1712.3 Mime-Version: 1.0 Date: Sun, 10 Jun 2001 00:30:30 -0500 Content-Type: multipart/mixed; boundary="----=_NextPart_000_007F_01BDF6C7.FABAC1B0" Resent-Message-ID: <"8_w3mD.A.7-C.VTwI7"@glacier> Resent-From: ietf-ldapext@netscape.com X-Mailing-List: X-Loop: ietf-ldapext@netscape.com Precedence: list Resent-Sender: ietf-ldapext-request@netscape.com This is a MIME Message ------=_NextPart_000_007F_01BDF6C7.FABAC1B0 Content-Type: multipart/alternative; boundary="----=_NextPart_001_0080_01BDF6C7.FABAC1B0" ------=_NextPart_001_0080_01BDF6C7.FABAC1B0 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable ***** This is an HTML Message ! ***** ------=_NextPart_001_0080_01BDF6C7.FABAC1B0 Content-Type: text/html; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable

We will help you= get the mortgage loan you want! 

Whether a new home loan is what you seek or
to refinance your current h= ome loan at a lower interest rate and payment, we can help!

Mortgage rates haven't been this low in the last 12 months, take action no= w!
Refinance your home with us and include all of those pesky credit card bil= ls or
use the extra cash for that pool you've always wanted=2E=2E=2E&nbs= p;

Where others says NO, we say YES!!!
Even if you have been turned down elsewhere, we can help! 

Easy terms! Our mortgage referral service combines the
highest quality loans wi= th most economical rates and the easiest qualification
!

Take just 2 minutes to complete the following form=2E
There is no obligation, all information is= kept strictly confidential, and you must be at least 18 years of age=2E Service available within the United States only=2E This service is fast an= d free=2E

 

Free information= request form:

Loan Application Form



= Please complete all the information below=2E
Our loan specialist will b= e contacting you at your convenience=2E
Thank You!

=

Please use your mouse to navigate between fields=2E Thank You=2E

<= td width=3D"282" background=3D"Greenbackground=2Ejpg"> * <= tr align=3D"center">
Your Full Name = *
Address *
City *
<= font size=3D"2" color=3D"#000000" face=3D"Arial, Helvetica,sans-serif"> = State(USA Only) * UNITED STATES= ONLY!
Zip/Postal Code= *
Home Phone *
Work Phone= *
Email Address *<= /td>
Best Time To Call
Do You Own Your Home? * Mobile Homes Do Not Qualif= y
Property Value =3D 50000)) { alert('Not Valid! Please enter the approximate = value of current property or property you wish to purchase \n (greater than= or equal to 50000) using only number characters - 0123456789'); this=2Efoc= us(); this=2Eselect(); return false; }"> * Please use numbers only
Property Type
<= font size=3D"2" color=3D"#000000" face=3D"Arial, Helvetica,sans-serif"> = Purchase Price * Please us= e numbers only

Year Acquired

*
1st Mortgage-Balance Owed * Please use numbers o= nly (ex:45000) enter 0 for none
1st Mor= tgage-Interest Rate %
Is 1st Adjusta= ble or Fixed? *
Employer *
Monthly Gross&n= bsp;Household Income * Please use numbers only
2nd Mortgage Balance owed > *= Please use numbers only(ex:45000) enter= 0 for none
Amount You Wish To Borrow *
Credit Rating *
Monthly Debt * Please use numbers only
Loan Interested In *
 
<= p>Fast & Easy -You Are Done !

REMOVAL INSTRUCTIONS: This message is being sent to you in complianc= e with the current Federal legislation=2E You must have either posted an AD= to my FFA site, web-site, or requested information, or responded to one of= our email letters=2E If you do not want to receive further emails or any o= ther information from us, or you have received this mail in error, or for i= mmediate removal you may simply use reply on your email program with "= Remove from your mailing list#99221" in the subject=2E

------=_NextPart_001_0080_01BDF6C7.FABAC1B0-- ------=_NextPart_000_007F_01BDF6C7.FABAC1B0-- From list@netscape.com Sun Jun 10 02:29:38 2001 Received: from netscape.com (r2d2.netscape.com [205.217.237.47]) by ietf.org (8.9.1a/8.9.1a) with SMTP id CAA07291 for ; Sun, 10 Jun 2001 02:29:37 -0400 (EDT) Received: from aka.mcom.com (aka.mcom.com [205.217.237.180]) by netscape.com (8.10.0/8.10.0) with ESMTP id f5A6Rur26876; Sat, 9 Jun 2001 23:27:56 -0700 (PDT) Received: (from list@localhost) by aka.mcom.com (8.10.0/8.10.0) id f5A6RvY22382; Sat, 9 Jun 2001 23:27:57 -0700 (PDT) Resent-Date: Sat, 9 Jun 2001 23:27:57 -0700 (PDT) Subject: LDAP Result Codes To: ietf-ldapext@netscape.com X-Mailer: Lotus Notes Release 5.0.5 September 22, 2000 Message-ID: From: "Karen Gdaniec" Date: Fri, 8 Jun 2001 16:12:38 -0400 X-MIMETrack: Serialize by Router on D01MLC96/01/M/IBM(Release 5.0.7a SPR #MIAS4UTJ8H, S/390 SPR #JHEG4V8UT5 & S/390 SPR #JHEG4WERGL |May 21, 2001) at 06/08/2001 04:09:40 PM MIME-Version: 1.0 Content-type: text/plain; charset=us-ascii Resent-Message-ID: <"WkgsdB.A.SdF.rNxI7"@glacier> Resent-From: ietf-ldapext@netscape.com X-Mailing-List: X-Loop: ietf-ldapext@netscape.com Precedence: list Resent-Sender: ietf-ldapext-request@netscape.com Folks, We have been looking at the expired result codes draft, draft-just-ldapv3-rescodes-02.txt, which someone on this list indicated would be "folded into" an updated RFC 2251 sometime. We have a question regarding the result code LDAP_OPERATIONS_ERROR. Our current server support uses this return code to indicate that an internal server error occurred while handling the request. This differs vastly from the definition in the draft, which indicates this return code should only be returned if a bind is required prior to some operation and the bind was not performed. We have searched the draft and found no other result code that seems to satisfy our need for an "internal server error". We tend to try to avoid using LDAP_OTHER because it is so ambiguous. What is the intent of LDAP_OPERATIONS_ERROR? What result code should be used for internal problems at the server? Does another result code need to be defined? Thanks in advance, Karen Internet: kgdaniec@us.ibm.com Internal: Karen Gdaniec/Endicott/IBM@IBMUS or IBMUSM10(KGDANIEC) phone: 607.752.1075 tie-line: 8/852-1075 fax: 607.752.3681 From list@netscape.com Sun Jun 10 09:06:31 2001 Received: from netscape.com (c3po.netscape.com [205.217.237.46]) by ietf.org (8.9.1a/8.9.1a) with SMTP id JAA10687 for ; Sun, 10 Jun 2001 09:06:30 -0400 (EDT) Received: from aka.mcom.com (aka.mcom.com [205.217.237.180]) by netscape.com (8.10.0/8.10.0) with ESMTP id f5AD4tY05344; Sun, 10 Jun 2001 06:04:55 -0700 (PDT) Received: (from list@localhost) by aka.mcom.com (8.10.0/8.10.0) id f5AD4uw20458; Sun, 10 Jun 2001 06:04:56 -0700 (PDT) Resent-Date: Sun, 10 Jun 2001 06:04:56 -0700 (PDT) Date: Sun, 10 Jun 2001 06:03:49 -0700 (PDT) Message-Id: <200106101303.f5AD3nB18334@ywing.netscape.com> From: softwareplus@SWXS.so.carb.uk.netscape.com To: ietf-ldapext@ABTH.netscape.com Subject: Make Big Money Daily In Your Own Software Business! -BQIQ X-Reply-To: infoteck@sanet.be Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: 7bit Resent-Message-ID: <"Jcb5_D.A.S_E.2B3I7"@glacier> Resent-From: ietf-ldapext@netscape.com X-Mailing-List: X-Loop: ietf-ldapext@netscape.com Precedence: list Resent-Sender: ietf-ldapext-request@netscape.com Content-Transfer-Encoding: 7bit Earn Instant Gobs of Cash In The Most Unusual, And Quite Possibly The Most Generous "Distributor Program" That Requires No Experience And No Personal Selling. We'll Fulfill All The Orders You Can Get (up to 2,500 CD-ROMs) At NO COST To You! You Keep The Entire $99 Selling Price. Own A Business Where Customers Gladly Pay you Full Price. For A Product That You Practically Get For FREE. Become a distributor for the new Infodisk ProPlus, and we'll fulfill all the orders you can get (up to 2,500 CD-ROMs) - at NO COST To You! You'll keep the entire $99 selling price, and pay only for shipping & handling. We'll process the order, prepare the product, and ship it to your customers. As an authorized Infodisk Distributor, you will receive marketing tools and materials that will enable you to market Infodisk by mail, by phone, and by fax. you will also receive your own Website where people can order Infodisk by web and by email. And here's the best part... .. When people order Infodisk ProPlus, they pay $99 plus $16 shipping & handling. .. Out of the $99 selling price, you keep the entire $99 .. The only portion that we get is the $16 shipping & handling fee. And on top of that, we'll even do the fulfillment for you! We'll fulfill. pack and ship all orders direct to your customers. This means you don't have to mess around with fulfillment. No products to put in boxes. No licking stamps, No trip to the Post Office. We do all the work for you. Up To 2,500 CD-ROMs We will fulfill and ship up to 2,500 Infodisk ProPlus orders (that you can get by mail, phone, fax, email or the Web) at Zero ($0) price to you. This 2,500-Unit incentive means that you can make up to $99 X 2,500=) $247,500 without having to pay a penny for the product. Earn Obscene Profits Using Low-Cost Marketing Methods That Guarantee Almost Anyone Immediate Success. As an Infodisk Distributor, you will receive a set of marketing tools you can use to market Infodisk ProPlus to others. These tools are designed to make ordering very convenient for your customers. recceive "instant orders" by mail, by fax, by phone, by email and the web. Here's something even better: W e'll enroll you to become an authorized Infodisk Distributor - For FREE. Simply order Infodisk ProPlus through this special "Distributorship Offer" and recive the following - at absolutely no extra cost to you: Distributor Benefit #1 You'll receive camera-ready materials for a Direct-Mail Campaign which you can customize for your own use. The contents and design of the mailing pieces that you're going to receive are based on this very same direct mail campaign that earned us over $18,000 in just 7 days. Distributor Benefit #2 You'll receive camera-ready Display and Classified ads which you can use to advertise your business in newspapers and magazines. You may also want to use the camera-ready display ads as a design for a flier or a single-piece insert. Distributor Benefit #3 You'll receive a camera-ready Fax-On-Demand Material which you can customize and place with any fax-on-demand service company. Anyone from anywhere in the world can automatically receive this material which they can use to order the Infodisk from you. Distributor Benefit #4 To reach customers who want to order by phone, we'll provide you with a Voice Script which you can record on any type of voicemail or automated answering service. If you don't have one yet, we can help you get an order-taking voicemail service. Distributor Benefit #5 Your Very Own DISTRIBUTOR WEBSITE! In addition to all the marketing tools listed above, you'll also receive (free of charge) your very own Distributor Website where people can order the Infodisk ProPlus right on the Web ACCEPT ORDERS ON THE INTERNET Your website works as a point-of-sale and order-taking service rolled into one. It educates your customers about Infodisk and its benefits. It is designed to answer questions about the product and to solicit INSTANT ORDERS from the customers - without needing to speak with anyone, without having to require additional information. Everything customers need to JUST GO AHEAD AND ORDER. Whether An Order Comes From The Mail, Fax, Phone, Email or Web... You Keep 100% Of All Sales! - IF A CUSTOMER SENDS AN ORDER DIRECTLY TO YOU... Simply send us the customer's name & address along with the $16 shipping & handling fee. We'll ship the Infodisk ProPlus direct to your customer. You keep the $99 as your profit. - IF A CUSTOMER ORDERS THROUGH YOUR WEBSITE... We will ship the Infodisk ProPlus direct to your customer, keep the $16 shipping & handling fee, and send you a $99 commission check within 30 days after the order is processed. It's True, Our Infodisk Distributor Program Provides You A Lot Of Support, Is Extremely Generous, And Very Profitable. But The Real Question Is... WHAT IS INFODISK PROPLUS? AND WHY DO PEOPLE BUY IT? Infodisk is a "Reproduction Right Library" of over 1,000 money-making reports, guides, reviews, books, articles, software, etc. that can be reproduced and marketed in digital or printed form. Many Infodisk owners are in the "Information marketing business". They make money reproducing our reports on floppy disks, selling the reports individually, or republishing them into how-to booklets, newsletters, etc.) Our newest Infodisk edition, the Infodisk Proplus, also contains over $400 worth of Free Software, Internet Tools, Animated GIF Files, HTML pages, Camera-Ready Materials, etc. Infodisk ProPlus has an extensive collection of reports and caters to every single type of business out there - mail order, direct sales, MLM, retails shops, consultants, service companies, etc. Infodisk ProPlus contains current, practical information that is needed by every entrepreneur and small business owner. This is why customers are usually "SOLD" on Infodisk the very first time they see your advertising or visit your Infodisk Website. ANOTHER REASON people will be more than glad to pay you $99 for an Infodisk ProPlus is because... they automatically become Infodisk Distributors, too. Anyone who orders Infodisk ProPlus (from you) also get FREE AUTOMATIC ENROLLMENT TO BECOME AN INFODISK DISTRIBUTOR. Aside from their personal copy of Infodisk ProPlus, they will also receive their own set of marketing tools and their own distributor website. They can market Infodisk ProPlus to others. Charge $99. And keep the entire $99 as their profit. So, you see... Infodisk is not only an extraordinary product, it also has an extraordinary marketing program built-in to it. In a society hungray for information, the best commodity to market is "information". For the past 5 years, Infodisk has helped thousands of distributors and information marketers worldwide, providing them with money-making information products that are, until today, being marketed both on the Internet and other traditional direct-marketing means. Infodisk ProPlus is an exceptional product, with a huge market, and great demand. By using our proven proven marketing system, you can really make a small fortune as an Infodisk Distributor. ..ALL YOU HAVE TO DO IS PUT THIS IN MOTION! Sign up to become a Distributor - today - and have your website activated to start receiving orders immediately. (Keep in mind Website Names are reserved on a first come first first served basis.) Every once in a while, a really 'big" opportunity comes along. This is such an opportunity. Order now and put your brand new "information marketing business" into OVERDRIVE! E-Z ORDER FORM ========================================================= DISTRIBUTOR WEBSITE We will customize and activate your Distributor Website using the NAME you choose, Names are reserved on a first come, first served basis NAME CHOICES: Provide a primary Name and one Back-up Name in case your primary choice is already taken. Maximun 8 characters. Use letters & numbers only. No spaces,symbols or punctuations. PRIMARY: BACK-UP Enclose is $115.00 ($99 + $16 Shipping & handling) Send my personal copy of INFODISK ProPlus which includes over 1,000 Money Making Reports, Guides, Forms, Software, Starter Kits, Etc. That I can copy and Sell Mail To: E.F. Enterprises 22 Driggers Rd Ridgeland, SC 29936 MAKE CHECKS OR MONEY ORDERS PAYABLE TO: Ernest Fripp (DBA) E.F. Enterprises NAME -------------------------------------------------------- ADDRESS -------------------------------------------------------- CITY -------------------------------------------------------- STATE ZIP -------------------------------------------------------- E-MAIL ADDRESS: -------------------------------------------------------- (Orders payable by check please allow 4-6 weeks for delivery.) To be removed from future mailing simpy reply with the word remove in the subject field: From list@netscape.com Sun Jun 10 17:53:41 2001 Received: from netscape.com (c3po.netscape.com [205.217.237.46]) by ietf.org (8.9.1a/8.9.1a) with SMTP id RAA14090 for ; Sun, 10 Jun 2001 17:53:41 -0400 (EDT) Received: from aka.mcom.com (aka.mcom.com [205.217.237.180]) by netscape.com (8.10.0/8.10.0) with ESMTP id f5ALq1Y24743; Sun, 10 Jun 2001 14:52:01 -0700 (PDT) Received: (from list@localhost) by aka.mcom.com (8.10.0/8.10.0) id f5ALq2A07885; Sun, 10 Jun 2001 14:52:02 -0700 (PDT) Resent-Date: Sun, 10 Jun 2001 14:52:02 -0700 (PDT) Message-Id: <5.1.0.14.0.20010610144520.00a86e88@pop.walltech.com> X-Sender: bgreenblatt@pop.walltech.com X-Mailer: QUALCOMM Windows Eudora Version 5.1 Date: Sun, 10 Jun 2001 14:49:10 -0700 To: "Karen Gdaniec" , ietf-ldapext@netscape.com From: Bruce Greenblatt Subject: Re: LDAP Result Codes In-Reply-To: Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii"; format=flowed Resent-Message-ID: <"xc9TVC.A.s6B.Aw-I7"@glacier> Resent-From: ietf-ldapext@netscape.com X-Mailing-List: X-Loop: ietf-ldapext@netscape.com Precedence: list Resent-Sender: ietf-ldapext-request@netscape.com In looking back at RFC 2251, I see that it indicates that in the case of a Bind, RFC specifically states in clause 4.2.3 that the server returns operationsError in the case that: "server encountered an internal error". It doesn't state this any place else, but one could logically deduce that any time that the server encounters an internal error that an operationsError can be returned, irrespective of which LDAP operation is being implemented. So, I think that your interpretation is correct, and the result codes draft is in error. Bruce Greenblatt At 04:12 PM 6/8/01 -0400, Karen Gdaniec wrote: >Folks, >We have been looking at the expired result codes draft, >draft-just-ldapv3-rescodes-02.txt, which someone on this list indicated >would be "folded into" an updated RFC 2251 sometime. > >We have a question regarding the result code LDAP_OPERATIONS_ERROR. Our >current server support uses this return code to indicate that an internal >server error occurred while handling the request. This differs vastly from >the definition in the draft, which indicates this return code should only >be returned if a bind is required prior to some operation and the bind was >not performed. > >We have searched the draft and found no other result code that seems to >satisfy our need for an "internal server error". We tend to try to avoid >using LDAP_OTHER because it is so ambiguous. > >What is the intent of LDAP_OPERATIONS_ERROR? What result code should be >used for internal problems at the server? Does another result code need to >be defined? > >Thanks in advance, > >Karen > >Internet: kgdaniec@us.ibm.com >Internal: Karen Gdaniec/Endicott/IBM@IBMUS or > IBMUSM10(KGDANIEC) >phone: 607.752.1075 tie-line: 8/852-1075 >fax: 607.752.3681 ============================================== Bruce Greenblatt, Ph. D. Directory Tools and Application Services, Inc. http://www.directory-applications.com From list@netscape.com Sun Jun 10 18:33:10 2001 Received: from netscape.com (r2d2.netscape.com [205.217.237.47]) by ietf.org (8.9.1a/8.9.1a) with SMTP id SAA14285 for ; Sun, 10 Jun 2001 18:33:10 -0400 (EDT) Received: from aka.mcom.com (aka.mcom.com [205.217.237.180]) by netscape.com (8.10.0/8.10.0) with ESMTP id f5AMVZr01280; Sun, 10 Jun 2001 15:31:35 -0700 (PDT) Received: (from list@localhost) by aka.mcom.com (8.10.0/8.10.0) id f5AMVZQ14686; Sun, 10 Jun 2001 15:31:35 -0700 (PDT) Resent-Date: Sun, 10 Jun 2001 15:31:35 -0700 (PDT) Message-Id: <5.1.0.14.0.20010610180726.00a70070@localhost> X-Sender: post@localhost X-Mailer: QUALCOMM Windows Eudora Version 5.1 Date: Sun, 10 Jun 2001 18:09:26 -0400 To: "Levon Esibov" , From: Olafur Gudmundsson Subject: RE: Does anyone have application(s) that uses SRV records ? Cc: "Olafur Gudmundsson" In-Reply-To: <4AEE3169443CDD4796CA8A00B02191CDBEC414@win-msg-01.wingroup .windeploy.ntdev.microsoft.com> Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii"; format=flowed Resent-Message-ID: <"XpgRAB.A.GlD.FV_I7"@glacier> Resent-From: ietf-ldapext@netscape.com X-Mailing-List: X-Loop: ietf-ldapext@netscape.com Precedence: list Resent-Sender: ietf-ldapext-request@netscape.com At 02:36 PM 6/8/2001, Levon Esibov wrote: >If you are aware of any other than Windows 2000 LDAP client >implementation(s) that uses SRV DNS records to locate LDAP servers, >please, contact me directly (I don't want to spam this mailing list). Good, is there documentation on how this is supposed work for LDAP ? This is the second protocol offered up so I think we can try to figure out some tests based on them. Olafur Ps: Spam namedroppers if documentation exists. From list@netscape.com Mon Jun 11 01:27:52 2001 Received: from netscape.com (c3po.netscape.com [205.217.237.46]) by ietf.org (8.9.1a/8.9.1a) with SMTP id BAA20345 for ; Mon, 11 Jun 2001 01:27:51 -0400 (EDT) Received: from aka.mcom.com (aka.mcom.com [205.217.237.180]) by netscape.com (8.10.0/8.10.0) with ESMTP id f5B5QDY16909; Sun, 10 Jun 2001 22:26:13 -0700 (PDT) Received: (from list@localhost) by aka.mcom.com (8.10.0/8.10.0) id f5B5QEg24927; Sun, 10 Jun 2001 22:26:14 -0700 (PDT) Resent-Date: Sun, 10 Jun 2001 22:26:14 -0700 (PDT) Message-Id: <5.1.0.14.0.20010610213948.03088358@127.0.0.1> X-Sender: kurt@127.0.0.1 X-Mailer: QUALCOMM Windows Eudora Version 5.1 Date: Sun, 10 Jun 2001 22:24:52 -0700 To: Olafur Gudmundsson From: "Kurt D. Zeilenga" Subject: RE: Does anyone have application(s) that uses SRV records ? Cc: "Levon Esibov" , , "Olafur Gudmundsson" In-Reply-To: <5.1.0.14.0.20010610180726.00a70070@localhost> References: <4AEE3169443CDD4796CA8A00B02191CDBEC414@win-msg-01.wingroup .windeploy.ntdev.microsoft.com> Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Resent-Message-ID: <"-_8dMB.A.4EG.1ZFJ7"@glacier> Resent-From: ietf-ldapext@netscape.com X-Mailing-List: X-Loop: ietf-ldapext@netscape.com Precedence: list Resent-Sender: ietf-ldapext-request@netscape.com At 03:09 PM 6/10/2001, Olafur Gudmundsson wrote: >At 02:36 PM 6/8/2001, Levon Esibov wrote: >>If you are aware of any other than Windows 2000 LDAP client >>implementation(s) that uses SRV DNS records to locate LDAP servers, >>please, contact me directly (I don't want to spam this mailing list). > > >Good, is there documentation on how this is supposed work for LDAP ? The current proposal can be found in draft-ietf-ldapext-locate-05.txt. I note that there is some debate regarding the distinguished name to DN mapping algorithm, so there may be still be significant changes before this I-D is progressed. There are a number of implementations based (to some degree) on this I-D. RFC 3088 describes an experimental use of DNS SRV for LDAP referral generation. Also, Microsoft is using DNS SRV within Active Directory. There are other, similar implementations. These multiple independent implementations of this I-D can locate an appropriate LDAP service for the requested LDAP distinguishedName. There may also be implementations with incompatible LDAP-DN->DNS-FQDN mappings. However, their use of DNS SRV to locate the LDAP service hosting LDAP for the DNS-FQDN should be compatible. I believe that there is some useful DNS SRV interoperability reporting which LDAP DNS SRV implementors. As an implementor of LDAP locate using DNS SRV, I would be willing to report my experiences. -- Kurt From list@netscape.com Mon Jun 11 01:32:50 2001 Received: from netscape.com (c3po.netscape.com [205.217.237.46]) by ietf.org (8.9.1a/8.9.1a) with SMTP id BAA20687 for ; Mon, 11 Jun 2001 01:32:49 -0400 (EDT) Received: from aka.mcom.com (aka.mcom.com [205.217.237.180]) by netscape.com (8.10.0/8.10.0) with ESMTP id f5B5VAY17540; Sun, 10 Jun 2001 22:31:10 -0700 (PDT) Received: (from list@localhost) by aka.mcom.com (8.10.0/8.10.0) id f5B5VCs26547; Sun, 10 Jun 2001 22:31:12 -0700 (PDT) Resent-Date: Sun, 10 Jun 2001 22:31:12 -0700 (PDT) Message-Id: <5.1.0.14.0.20010610212217.00adcf08@127.0.0.1> X-Sender: kurt@127.0.0.1 X-Mailer: QUALCOMM Windows Eudora Version 5.1 Date: Sun, 10 Jun 2001 22:29:19 -0700 To: Bruce Greenblatt From: "Kurt D. Zeilenga" Subject: Re: LDAP Result Codes Cc: "Karen Gdaniec" , ietf-ldapext@netscape.com In-Reply-To: <5.1.0.14.0.20010610144520.00a86e88@pop.walltech.com> References: Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Resent-Message-ID: <"LTj03C.A.JeG.eeFJ7"@glacier> Resent-From: ietf-ldapext@netscape.com X-Mailing-List: X-Loop: ietf-ldapext@netscape.com Precedence: list Resent-Sender: ietf-ldapext-request@netscape.com At 02:49 PM 6/10/2001, Bruce Greenblatt wrote: >In looking back at RFC 2251, I see that it indicates that in the case of a Bind, RFC specifically states in clause 4.2.3 that the server returns operationsError in the case that: "server encountered an internal error". It doesn't state this any place else, but one could logically deduce that any time that the server encounters an internal error that an operationsError can be returned, irrespective of which LDAP operation is being implemented. So, I think that your interpretation is correct, and the result codes draft is in error. I believe this was discussed previously (on this list) and likely will be discussed again (on LDAPbis list). Basically, the folks seemed to agree that 'other' should be used for 'internal' errors and that 'operationsError' should be used for indicating an operation could not be processed because some other operation was outstanding. E.g., 'operationsError' should be return for any operation issues during processing of a StartTLS operation or any non-bind operation during a SASL bind. I recommend 'other' be used to indicate internal errors. I also recommend that no extension specifically call for 'other' to be returned in any particular exception case. 'other' should be unambiguous refer to an condition for which there is not a more specific resultCode. Kurt >Bruce Greenblatt > >At 04:12 PM 6/8/01 -0400, Karen Gdaniec wrote: >>Folks, >>We have been looking at the expired result codes draft, >>draft-just-ldapv3-rescodes-02.txt, which someone on this list indicated >>would be "folded into" an updated RFC 2251 sometime. >> >>We have a question regarding the result code LDAP_OPERATIONS_ERROR. Our >>current server support uses this return code to indicate that an internal >>server error occurred while handling the request. This differs vastly from >>the definition in the draft, which indicates this return code should only >>be returned if a bind is required prior to some operation and the bind was >>not performed. >> >>We have searched the draft and found no other result code that seems to >>satisfy our need for an "internal server error". We tend to try to avoid >>using LDAP_OTHER because it is so ambiguous. >> >>What is the intent of LDAP_OPERATIONS_ERROR? What result code should be >>used for internal problems at the server? Does another result code need to >>be defined? >> >>Thanks in advance, >> >>Karen >> >>Internet: kgdaniec@us.ibm.com >>Internal: Karen Gdaniec/Endicott/IBM@IBMUS or >> IBMUSM10(KGDANIEC) >>phone: 607.752.1075 tie-line: 8/852-1075 >>fax: 607.752.3681 > >============================================== >Bruce Greenblatt, Ph. D. >Directory Tools and Application Services, Inc. >http://www.directory-applications.com From list@netscape.com Mon Jun 11 03:03:55 2001 Received: from netscape.com (r2d2.netscape.com [205.217.237.47]) by ietf.org (8.9.1a/8.9.1a) with SMTP id DAA03816 for ; Mon, 11 Jun 2001 03:03:54 -0400 (EDT) Received: from aka.mcom.com (aka.mcom.com [205.217.237.180]) by netscape.com (8.10.0/8.10.0) with ESMTP id f5B724r26916; Mon, 11 Jun 2001 00:02:04 -0700 (PDT) Received: (from list@localhost) by aka.mcom.com (8.10.0/8.10.0) id f5B724I12183; Mon, 11 Jun 2001 00:02:04 -0700 (PDT) Resent-Date: Mon, 11 Jun 2001 00:02:04 -0700 (PDT) Message-ID: <00005c1d3933$00003dc1$000009a2@> To: From: kvioltanlj@yahoo.com Subject: Get a FREE Motorola Pager Today 2466 Date: Thu, 14 Jun 2001 13:25:10 -0400 MIME-Version: 1.0 Content-Type: text/html; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable X-Priority: 3 X-MSMail-Priority: Normal Resent-Message-ID: <"2EIe-.A.29C.qzGJ7"@glacier> Resent-From: ietf-ldapext@netscape.com X-Mailing-List: X-Loop: ietf-ldapext@netscape.com Precedence: list Resent-Sender: ietf-ldapext-request@netscape.com Content-Transfer-Encoding: quoted-printable

Brand New FREE= MOTOROLA PAGER  

Limited Time FREE Offer.

Call 1(800)761= -0511 to be Guaranteed Your FREE MOTOROLA Pager Today

With this FREE MOTOROLA Pag= er you will receive the following  

FREE activation.<= /TD>
Very small and lightweight.<= /FONT>
Stay in touch with friends/f= amily.
Guaranteed to never miss a p= age.
Brand New FLEX MOTOROLA Page= r technology.


1)= This MOTOROLA Pager is small and light weight.
2) A unique never out of range feature.
3) 50,000 character memory & automatic garbled m= essage correction.
4) You can also receive weather, news and sports.

Call 1(800)761= -0511 to get your FREE MOTOROLA Pager TODAY!
While SUPPLY Lasts
<= /STRONG>




To be taken off reply to here=

********* From list@netscape.com Mon Jun 11 09:55:33 2001 Received: from netscape.com (c3po.netscape.com [205.217.237.46]) by ietf.org (8.9.1a/8.9.1a) with SMTP id JAA10833 for ; Mon, 11 Jun 2001 09:55:32 -0400 (EDT) Received: from aka.mcom.com (aka.mcom.com [205.217.237.180]) by netscape.com (8.10.0/8.10.0) with ESMTP id f5BDrkY27289; Mon, 11 Jun 2001 06:53:46 -0700 (PDT) Received: (from list@localhost) by aka.mcom.com (8.10.0/8.10.0) id f5BDrks20265; Mon, 11 Jun 2001 06:53:46 -0700 (PDT) Resent-Date: Mon, 11 Jun 2001 06:53:46 -0700 (PDT) Reply-To: From: "John Liang" To: "Kurt D. Zeilenga" , "Bruce Greenblatt" Cc: "Karen Gdaniec" , Subject: RE: LDAP Result Codes Date: Mon, 11 Jun 2001 09:53:42 -0400 Message-ID: <000201c0f27d$ec951180$1f05400a@software.com> MIME-Version: 1.0 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: 7bit X-Priority: 3 (Normal) X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook 8.5, Build 4.71.2377.0 X-MimeOLE: Produced By Microsoft MimeOLE V5.00.2314.1300 In-Reply-To: <5.1.0.14.0.20010610212217.00adcf08@127.0.0.1> Importance: Normal Resent-Message-ID: <"5DYzm.A.O8E.p1MJ7"@glacier> Resent-From: ietf-ldapext@netscape.com X-Mailing-List: X-Loop: ietf-ldapext@netscape.com Precedence: list Resent-Sender: ietf-ldapext-request@netscape.com Content-Transfer-Encoding: 7bit Also we need a result code for Virtual List View related control error. And if we want to change RFC 2289, Server Side Sorting, we will need another one for SSS too. Does anyone know when it will happen? Thanks, -- Xiaojun Liang > -----Original Message----- > From: Kurt D. Zeilenga [mailto:Kurt@OpenLDAP.org] > Sent: Monday, June 11, 2001 1:29 AM > To: Bruce Greenblatt > Cc: Karen Gdaniec; ietf-ldapext@netscape.com > Subject: Re: LDAP Result Codes > > > At 02:49 PM 6/10/2001, Bruce Greenblatt wrote: > >In looking back at RFC 2251, I see that it indicates that in the > case of a Bind, RFC specifically states in clause 4.2.3 that the > server returns operationsError in the case that: "server > encountered an internal error". It doesn't state this any place > else, but one could logically deduce that any time that the > server encounters an internal error that an operationsError can > be returned, irrespective of which LDAP operation is being > implemented. So, I think that your interpretation is correct, > and the result codes draft is in error. > > I believe this was discussed previously (on this list) and > likely will be discussed again (on LDAPbis list). > > Basically, the folks seemed to agree that 'other' should be > used for 'internal' errors and that 'operationsError' should be > used for indicating an operation could not be processed because > some other operation was outstanding. E.g., 'operationsError' > should be return for any operation issues during processing of > a StartTLS operation or any non-bind operation during a SASL bind. > > I recommend 'other' be used to indicate internal errors. > I also recommend that no extension specifically call for > 'other' to be returned in any particular exception case. > 'other' should be unambiguous refer to an condition for > which there is not a more specific resultCode. > > Kurt > > > >Bruce Greenblatt > > > >At 04:12 PM 6/8/01 -0400, Karen Gdaniec wrote: > >>Folks, > >>We have been looking at the expired result codes draft, > >>draft-just-ldapv3-rescodes-02.txt, which someone on this list indicated > >>would be "folded into" an updated RFC 2251 sometime. > >> > >>We have a question regarding the result code LDAP_OPERATIONS_ERROR. Our > >>current server support uses this return code to indicate that > an internal > >>server error occurred while handling the request. This differs > vastly from > >>the definition in the draft, which indicates this return code > should only > >>be returned if a bind is required prior to some operation and > the bind was > >>not performed. > >> > >>We have searched the draft and found no other result code that seems to > >>satisfy our need for an "internal server error". We tend to > try to avoid > >>using LDAP_OTHER because it is so ambiguous. > >> > >>What is the intent of LDAP_OPERATIONS_ERROR? What result code should be > >>used for internal problems at the server? Does another result > code need to > >>be defined? > >> > >>Thanks in advance, > >> > >>Karen > >> > >>Internet: kgdaniec@us.ibm.com > >>Internal: Karen Gdaniec/Endicott/IBM@IBMUS or > >> IBMUSM10(KGDANIEC) > >>phone: 607.752.1075 tie-line: 8/852-1075 > >>fax: 607.752.3681 > > > >============================================== > >Bruce Greenblatt, Ph. D. > >Directory Tools and Application Services, Inc. > >http://www.directory-applications.com > > From list@netscape.com Mon Jun 11 22:35:20 2001 Received: from netscape.com (c3po.netscape.com [205.217.237.46]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id WAA23929 for ; Mon, 11 Jun 2001 22:35:19 -0400 (EDT) Received: from aka.mcom.com (aka.mcom.com [205.217.237.180]) by netscape.com (8.10.0/8.10.0) with ESMTP id f5C2XfY10129; Mon, 11 Jun 2001 19:33:41 -0700 (PDT) Received: (from list@localhost) by aka.mcom.com (8.10.0/8.10.0) id f5C2Xg616025; Mon, 11 Jun 2001 19:33:42 -0700 (PDT) Resent-Date: Mon, 11 Jun 2001 19:33:42 -0700 (PDT) Date: Mon, 11 Jun 2001 19:32:42 -0700 (PDT) Message-Id: <200106120232.f5C2Wfc16982@xwing.aoltw.net> From: ghe_21@address.com To: unknown@unknown.com Mime-Version: 1.0 Content-Type: text/html; charset="iso-8859-1"; Subject: Resent-Message-ID: <"csWaRB.A.o4D.A-XJ7"@glacier> Resent-From: ietf-ldapext@netscape.com X-Mailing-List: X-Loop: ietf-ldapext@netscape.com Precedence: list Resent-Sender: ietf-ldapext-request@netscape.com Would you like to look and feel 10-20 years younger? 50

Would you be interested in increasing energy levels by 84%?
How about Increasing Sexual Potency Frequency by 75%?

Would you like to increase your Muscle Strength by 88%
While...At the same time...
Reducing Body Fat by 72% and Wrinkles by 51%?


Of course you would!
We offer the Most Potent Oral GH Formula available to help you achieve all of this and more! Turn Back The Clock and Turn Up the Energy Now!

In thousands of clinical studies, GH has been shown to accomplish the following:


_ Reduce body fat and build lean muscle without exercise!
_ Enhance sexual performance
_ Remove wrinkles and cellulite
_ Lower blood pressure and improve cholesterol profile
_ Improve sleep, vision and memory
_ Restore hair color and growth
_ Strengthen the immune system
_ Increase energy and cardiac output
_ Turn back your body's biological time clock 10-20 years in 6 months of usage !!!


Here is a sample of just a few of the letters we receive every week
thanking us for what our product has done:

"I am astounded! The day before I started taking the GH1,
I took blood tests. Then I began using the GH1 as directed.
After 8 weeks I took blood tests again.
My IGF-1 level (evidence of GH) showed a 70% increase!
Furthermore, my cholesterol score went from 190 down to 144!
I definitely feel better overall and certainly have more energy.
To say the least I am very impressed and pleased with GH1.
My "biological" age is now that of a 40 year old!"
-Dr. A. Zuckerman M.D., age 60, NY


"A year ago, my blood pressure was 180/120 and I was on blood
pressure medication. I also started the Anti-Aging formula, GH1.
After a year on the product, my blood pressure is now 120/80--
and I haven't been on the blood pressure medication for months!"
-Susanne Peters, Laguna Beach, CA


"After 2 weeks on Anti-Aging Formula GH1, I noticed a higher
level of energy, increased sexual energy and my memory and vision
were enhanced. My blood pressure is down to 126/84 after workout-and
it seems every other day I have to 'rev-up' the amps on the treadmill
at the gym. I've noticed a tightening of the skin under my chin and
a change in my lungs with much easier breathing. After 4 months,
I only need 5 hours sleep instead of 7. One morning, I had to do an extra
karate workout just to expend all the extra energy!" "After 6 months on
GH1, my blood sugar levels went from 130 down to 65! Also, my stamina has
increased, as well as my energy and sex drive--this product is GREAT!"
-Dr. Richard Boyd, 78 years old, Harvard Clinical Psychologist, CA

"As a straight-ahead bicycle racer, I used to have to wait a minute
and a half after sprinting, for my heart rate to come down to where
I could sprint again. After a month on GH1, I can now sprint again
after only 45 seconds! GH1 cut my waiting time in half!"
-Ed Caz, age 40, Fresno,CA

"When I heard GH1 would reduce body fat increase lean muscle WITHOUT EXERCISE, I couldn't believe it--but in just a few months I lost 4 inches around my waist without exercising and my body fat went from 22 down to 19--even though I gained 10 pounds! Also, after 4 months, my fine vision returned. I no longer need the magnifying glasses to read fine print."
-Larry Baker, age 54,Oceanside, CA

"I have been taking Anti-Aging Formula GH1 for five months now.
I have been under great stress in my business.
I believe that taking Anti-Aging Formula GH1 has had a big part in keeping
my energy level up and having the strength to stay positive in the midst
of discouraging circumstances. Last week I came down with a cold.
Colds are tough on me and seem to run their course- headaches, sinus inflammation, and then throat. I am progressing through those stages but more quickly than before. Hallelujah! My eyes aren't as puffy and the skin on my hands snaps back faster.
My muscles seem to have better tone-I notice it in my legs-and I have more energy
when I go out walking."
- Carolyn Munn

"I was taking injections of GH for over one year. A friend suggested that
I try Anti-Aging Formula GH1, since I was spending $1,000 a month and needed
a doctor to inject it daily. In 2-3 weeks I felt better from the Anti-Aging
Formula GH1 than the whole time I was getting the injections.
Thank you Anti-Aging Formula for greatly helping to improve my life!"
-Rita Mills McCoy

"I have had elevated cholesterol levels since the first time I was tested,
in my twenties. I was on Anti-Aging Formula GHI for only 1 month when my levels
dropped from 245 to 210. I could hardly believe it! After 3 months on Anti-Aging
Formula GH1 my gray hair began to darken at the roots, returning to its normal
coloring. I have even been able to reduce my thyroid medication. All of this
without having to change anything else about my lifestyle, other than taking
few sprays of Anti-Aging Formula GH1 a day. Wow!
-Alan Ross, 43 years old

GH1 is the highest concentration of orally administered GH1
available on the market today. Injections of GH taken in international units are usually prescribed to be taken as a shot, two times per day. The individual would be taking between 2 and 4 units per day. GH1 has over 2000ng per dosage and was created to
imitate the body's natural secretion of GH.

WHAT IS GROWTH HORMONE (GH)?

Growth hormone is a naturally occurring substance in the human body which
is secreted by the pituitary, the master gland of the body, located in the
endocrine system. GH is a microscopic protein substance that is chemically
similar to insulin, which is secreted in short pulses during the first few
hours of sleep and after exercise. GH is one of the most abundant hormones
secreted, influencing growth of cells, bones, muscles and organs throughout
the body. Production of GH peaks at adolescence.

Every three years approximately 90% of the cells in the human body are newly made.
The body is composed of more than 100 trillion cells that are continuously
dying and regenerating. The brain and the nervous system retain their original
cells; however, in the brain new proteins are continuously being produced to
store memories of every new experience. Overall intelligence and the ability
to learn and memorize all depend on adequate growth hormone.
Growth hormone replacement therapy is now available to reverse age-related symptoms, including wrinkling of the skin, increased body fat, decreased muscle mass, increased cholesterol, decreased stamina and energy, decreased mental function and loss of libido.

When growth hormone falls below normal levels, supplementation offers the
all-natural potential for great benefit. Growth hormone is an amazing substance
which is safe and effective with no known side effects, if taken in the
proper dosage amounts.

GH is one of many endocrine hormones, such as estrogen, progesterone, testosterone,
melatonin and DHEA, that all decline in production as we age. Hormones are tiny
chemical messengers continuously secreted in the bloodstream in order to regulate
the activities of the vital organs. The word "hormone" is derived from a Greek word
meaning to stimulate. Many of these hormones can be replaced to deter some of the
effects of aging; however, GH reaches far beyond the scope of these other
hormones. Not only does it prevent biological aging, but it acts to greatly
reverse a broad range of signs and symptoms associated with aging, including
making the skin more elastic and causing wrinkles to disappear. GH also
helps restore hair color and hair loss.

THE ETERNAL FOUNTAIN OF YOUTH?

Our bodies naturally produce GH in abundance when we are young, and its production
gradually slows over time. The amount of GH after the age of 21 falls about 14% per
decade, so that its production is reduced in half by age 60. While GH is not new,
its availability as a supplement has been limited. Specialized clinics and physicians
have been using GH for over 30 years on thousands of patients with consistent results.

Unfortunately, due to the high costs previously associated with GH, only the medical
profession and the wealthy have been privy to its benefits. Another problem has been
that the large GH molecule, composed of 191 amino acids (protein), had been only
effective administered through injections. However, a new technology developed by
Anti-Aging Inc., now makes GH an effective, affordable and convenient alternative.

GH production falls by 80% from age 21 to 61

Growth hormone declines with age in every animal species that has been tested to date.
The amount of decline in humans falls approximately 14% per decade.
This results in the growth hormone production rate being reduced in half by the age
of 60. Humans produce on a daily basis 500 micrograms per year at age 20,
200 micrograms at age 40 and 25 micrograms at 80 years of age. Between the ages
of 70 and 80, nearly everyone is deficient in growth hormone which results in SDS,
or Somatotrophin Deficiency Syndrome. These symptoms are part of the disease called
aging which the medical community has determined is not a normal occurrence.
Healing ability and energy levels decrease, as does physical mobility.
Those who want to maintain their youthful vitality and stamina should include
an effective growth hormone therapy as part of their health regimen.


After numerous clinical studies, the following was determined
after 6 or more months of GH therapy:

_ Improved memory
_ Regenerating of the brain, heart, liver, pancreas, spleen, kidneys and other organs
_ Increased sexual drive and performance
_ Increased fertility
_ Enhanced immune system
_ Quicker wound and fracture healing
_ New hair growth and color reparation
_ Sharper vision
_ Improved exercise performance and tolerance
_ Increased muscle mass without exercise
_ Reduction of cellulite and fat
_ Increased stamina and vitality
_ Reduction in high blood pressure
_ Improvement in sleep
_ Anti-aging
_ Wrinkle reduction and smoothing
_ Decrease in LDL (bad) cholesterol
_ Increase in HDL (good) cholesterol
_ Strengthening of bones

IS GH SAFE?

GH has been successfully used in the medical community
for over thirty years and has been studies for over 60 years.
Edmond Klein, M.D. and L. Cas Terry Ph.D., tested over
800 individuals and reported in their 1995 study that
GH had substantial benefits and no side effects.

***********************************************************************

You're going to receive "Anti-Aging Formula" for under $150.00...
Not even $50.00... You are going to receive the entire
life-changing Anti-Aging Formula for only $28.95.
This is NOT a misprint.
But you had better act fast because supplies are limited.


PS I almost forgot.
"Anti-Aging Formula" comes with a ONE MONTH MONEY-BACK GUARANTEE!
So your one-time fee is refundable making your decision risk free!
WE GUARANTEE THAT IF YOU ARE NOT COMPLETELY SATISFIED,
JUST RETURN THE UN-USED PORTION WITHIN 30 DAYS AND
WE WILL GIVE YOU A FULL REFUND OF THE PURCHASE PRICE.

*** Our normal price for Anti-Aging Formula is $28.95.
For a limited time only, you can purchase a 3 MONTH SUPPLY for only $48.95!
That is a savings of $37.90 off our regular price.


We will also continue to offer you the Anti-Aging Formula at this low price
as long as you purchase from us in the future. To take advantage of this
savings you must order within the next 10 days.

***********************************************************************
ORDER TODAY:
SEND Only $28.95 US (Each bottle is a months supply.)

For Shipping OUTSIDE the US please add $11.00
or
3 MONTHS SUPPLY for only $48.95!
For Shipping OUTSIDE the US please add $11.00
(CREDIT CARD, CASH, CHECK, OR MONEY ORDER)

Shipping is FREE!


To place your order merely fill out the following form and fax to 1-775-667-9216. If this line is busy, please try faxing to 1-413-375-0109.

Internet Information Services
PO Box 21442
Billings, MT 59104


(ALL ORDERS FILLED WITHIN 24 HOURS OF RECEIVING THEM)


Please allow 7 days for delivery.
*************************
Credit Card Order Form

Name on Credit Card:

Address:

City/State/ZIP:

Your email address:

++++++++++++++++++++++++++++++++++++++++

Please circle one

Please send me a ONE month supply for $28.95

For Shipping OUTSIDE the US please add $11.00


Please send me a THREE month supply for $48.95

For Shipping OUTSIDE the US please add $11.00

(This is a savings of $37.90 off our regular price.)

++++++++++++++++++++++++++++++++++++++++

Credit Card Number:

Date Credit Card Expires:

If you do not receive your order within 10 days,
please send us a fax letting us know of the late arrival.


We will then contact you to figure out why you have not received your order.


Please tell us your phone Number:

Please tell us your fax Number:

To order by Check or Money Order:


MAKE YOUR CHECK PAYABLE TO

Internet Information Services

Name:

Address:

City/State/ZIP:

E-mail Address:


If you do not receive your order within 10 days, please send us a fax letting us know of the late arrival. We will then contact you to figure out why you have not received your order.

Please tell us your phone Number:

Please tell us your fax Number:

Thank you for your business,


Internet Information Services
PO Box 21442
Billings, MT 59104

Fax to 1-775-667-9216.
If this line is busy,
please try faxing to 1-413-375-0109.

Copyright (c) 1997-2000
All Rights Reserved


"Anti-Aging Formula" comes with a
ONE MONTH MONEY-BACK GUARANTEE!

So your one-time fee is refundable making your decision risk free!

WE GUARANTEE THAT IF YOU ARE NOT COMPLETELY SATISFIED,
JUST RETURN THE UN-USED PORTION WITHIN 30 DAYS
AND WE WILL GIVE YOU A FULL REFUND OF THE PURCHASE PRICE.








+++++++++++++++++++++++++++++++++++++++++++++++++++++++
This ad is produced and sent out by: Universal Advertising Systems
To be removed from our mailing list please email us at
vanessagreen@freeze.com with remove in the subject line or
call us toll free at 1-888-605-2485 and give us your email address
or write us at:Central DB Removal, PO Box 1200, Oranjestad, Aruba
++++++++++++++++++++++++++++++++++++++++++++++++++++++++





Content-Transfer-Encoding: 7BIT
From list@netscape.com Mon Jun 11 23:03:39 2001 Received: from netscape.com (c3po.netscape.com [205.217.237.46]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id XAA24158 for ; Mon, 11 Jun 2001 23:03:38 -0400 (EDT) Received: from aka.mcom.com (aka.mcom.com [205.217.237.180]) by netscape.com (8.10.0/8.10.0) with ESMTP id f5C30lY12710; Mon, 11 Jun 2001 20:00:50 -0700 (PDT) Received: (from list@localhost) by aka.mcom.com (8.10.0/8.10.0) id f5C30nM22401; Mon, 11 Jun 2001 20:00:49 -0700 (PDT) Resent-Date: Mon, 11 Jun 2001 20:00:49 -0700 (PDT) From: MrX@bulkemailnet.com Message-Id: <200106121809.LAA11872@peric.ac.cn> To: Subject: 10 Million Fresh Email Addresses, Stealth Mass Mailer & More.. 22707 Date: Mon, 11 Jun 2001 20:02:02 -0700 MIME-Version: 1.0 Content-Type: text/html; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable X-Priority: 3 X-MSMail-Priority: Normal Reply-To: MrX@bulkemailnet.com Resent-Message-ID: <"tOsBxB.A.idF.fXYJ7"@glacier> Resent-From: ietf-ldapext@netscape.com X-Mailing-List: X-Loop: ietf-ldapext@netscape.com Precedence: list Resent-Sender: ietf-ldapext-request@netscape.com Content-Transfer-Encoding: quoted-printable
Email = Advertising WORKS!


Email Advertise your product or website to millions for only $99.

For $99.00 you will receive the Stealth Bulk E-Mailing Software, List Manager, Over 10 Million "FRESH" E-Mail Addresses, Targeted Email Address Harvesting Software, and as a FREE BONUS, special Mail Servers to send your mail through!

Its only $99 for everything,
and you can DOWNLOAD IT ALL, today!

FOR MORE INFO:
Click HER= E OR Simp= ly Reply with "99" in the SUBJECT Field

To be PERMANENTLY REMOVED from our mail list:
Click HERE&nb= sp;OR Simply Reply= with "REMOVE" in the SUBJECT Field

--- From list@netscape.com Tue Jun 12 15:15:44 2001 Received: from netscape.com (r2d2.netscape.com [205.217.237.47]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA22831 for ; Tue, 12 Jun 2001 15:15:43 -0400 (EDT) Received: from aka.mcom.com (aka.mcom.com [205.217.237.180]) by netscape.com (8.10.0/8.10.0) with ESMTP id f5CJDYr07611; Tue, 12 Jun 2001 12:13:34 -0700 (PDT) Received: (from list@localhost) by aka.mcom.com (8.10.0/8.10.0) id f5CJAQc23586; Tue, 12 Jun 2001 12:10:26 -0700 (PDT) Resent-Date: Tue, 12 Jun 2001 12:10:26 -0700 (PDT) To: ietf-ldapext@netscape.com X-Mailer: Lotus Notes Release 5.0.5 September 22, 2000 Message-ID: From: Nitin_Singal@i2.com Date: Tue, 12 Jun 2001 14:07:16 -0500 X-MIMETrack: Serialize by Router on i2Notes7/Servers/i2Tech(Release 5.0.7 |March 21, 2001) at 06/12/2001 02:07:13 PM, Serialize complete at 06/12/2001 02:07:13 PM, Itemize by SMTP Server on SMTPMTA2/i2Tech(Release 5.0.7 |March 21, 2001) at 06/12/2001 02:07:14 PM, Serialize by Router on SMTPMTA2/i2Tech(Release 5.0.7 |March 21, 2001) at 06/12/2001 02:07:15 PM, Serialize complete at 06/12/2001 02:07:15 PM MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="=_alternative 0069093086256A69_=" Resent-Message-ID: <"JxeSED.A.XoF.OkmJ7"@glacier> Resent-From: ietf-ldapext@netscape.com X-Mailing-List: X-Loop: ietf-ldapext@netscape.com Precedence: list Resent-Sender: ietf-ldapext-request@netscape.com This is a multipart message in MIME format. --=_alternative 0069093086256A69_= Content-Type: text/plain; charset="us-ascii" Dear Mr. Ietf, We at i2 use Netscape Ldap server to store a couple of things.Now we wish to implement a functionality where a client could change the password for a user. 1)Can this be done?[Is password a modifiable attribute?] 2) If so which java Api function can be used to modify the password. Regards, Nitin PS> I got u'r e-mail id while surfing the net looking for an answer to the above mentioned problem. --=_alternative 0069093086256A69_= Content-Type: text/html; charset="us-ascii"
Dear Mr. Ietf,
        We at i2 use Netscape Ldap server to store a couple of things.Now we wish to implement a functionality
        where a client could change the password for a user.
        1)Can this be done?[Is password a modifiable attribute?]
        2) If so which java Api function can be used to modify the         password.
       
Regards,
Nitin
PS> I got u'r e-mail id while surfing the net looking for an answer to the above mentioned problem. --=_alternative 0069093086256A69_=-- From list@netscape.com Tue Jun 12 22:02:05 2001 Received: from netscape.com (c3po.netscape.com [205.217.237.46]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id WAA28875 for ; Tue, 12 Jun 2001 22:02:05 -0400 (EDT) Received: from aka.mcom.com (aka.mcom.com [205.217.237.180]) by netscape.com (8.10.0/8.10.0) with ESMTP id f5D20QY29060; Tue, 12 Jun 2001 19:00:26 -0700 (PDT) Received: (from list@localhost) by aka.mcom.com (8.10.0/8.10.0) id f5D20Rw00708; Tue, 12 Jun 2001 19:00:27 -0700 (PDT) Resent-Date: Tue, 12 Jun 2001 19:00:27 -0700 (PDT) Date: Tue, 12 Jun 2001 18:59:22 -0700 (PDT) Message-Id: <200106130159.f5D1xLN16361@ywing.netscape.com> From: "Judy" To: "Recipient"@netscape.com Subject: Wow! $3 Per Name - Home Typing! X-Reply-To: "Judy" Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: 7bit Resent-Message-ID: <"pgdNtD.A.iK.6ksJ7"@glacier> Resent-From: ietf-ldapext@netscape.com X-Mailing-List: X-Loop: ietf-ldapext@netscape.com Precedence: list Resent-Sender: ietf-ldapext-request@netscape.com Content-Transfer-Encoding: 7bit Home Typing We are looking for a few dependable people who desire an earning of substantial income right in the comfort of their homes. We need local compilers to secure and type our exclusive mailing lists in nearly every city of the country and we are not about to open thousands of offices nationwide. That is why we need YOU! We appreciate your assistance, so we do our very best to make it easy for you. Simply follow our instruction kit and hand written names and addresses come to you every day and all you have to do is submit them for your pay of $3.00 for each and every name and address you compile and type! Paychecks are mailed on the 1st and 15th each month! NEW BONUS SYSTEM NOW ADDED! After submitting 100 names to BestBizUsa, you will now be paid $4 per name! Also, we now have weekly bonuses set up !! Do not confuse this one of a kind offer with any unwanted commissioned mailing programs, envelope stuffing, or any other such deceptive nonsense. This is legitimate home employment that is not a get rich quick job, but you can make a part time income fairly easily. Working with BESTBIZUSA Typing Resource Centers gives you the freedom to stay at home and create your own hours. If you are a parent with children, this type of work is very beneficial because it allows you to be a stay at home parent. These are only a couple of the perks, let's not forget the money. The more time you put into this job, the more you will get out of it. Because we need local typists immediately, we will hold your position open for the next 10 working days. So if you would like to begin working and making money, email me at judehtyping@sendfree.com for more information. Judes Safelist http://www.stormpages.com/judeslist/ EZ Money! More Info: judehezmoney@sendfree.com http://www.clicktoconnect.to/judeshometyping Email 1 Million Daily! http://www.powerpromotion.net/06231 Blast Your Ad to 125,000 FREE! Start Your Own Business for $5!! 100% Profit on Every Sale! Free Website Explains everything! Easy to follow Instructions! No Hidden Expenses! No Downloads! $$$ Deposited Directly into Your Account! http://giftline.jumpbusiness.com/judy.htm Won't Cost You a Dime! Email judeh122@sendfree.com with "Show Me How" in subject. http://judes.go.coolebiz.com If you do not wish to receive any more correspondence similar to this, click on Mailto:jakemcd@visto.com?Subject=Remove and send. Your request will be honored promptly. From list@netscape.com Wed Jun 13 06:02:18 2001 Received: from netscape.com (c3po.netscape.com [205.217.237.46]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id GAA17969 for ; Wed, 13 Jun 2001 06:02:17 -0400 (EDT) Received: from aka.mcom.com (aka.mcom.com [205.217.237.180]) by netscape.com (8.10.0/8.10.0) with ESMTP id f5DA0dY09923; Wed, 13 Jun 2001 03:00:39 -0700 (PDT) Received: (from list@localhost) by aka.mcom.com (8.10.0/8.10.0) id f5DA0d221492; Wed, 13 Jun 2001 03:00:39 -0700 (PDT) Resent-Date: Wed, 13 Jun 2001 03:00:39 -0700 (PDT) Date: Wed, 13 Jun 2001 18:58:36 +0900 Message-ID: From: blackgold89@gmx.net To: members@freeinfo.com Cc: torytape@netrover.com, probst@netrover.com, wiwillis@netrover.com, jeepee@netrover.com, bjhayes@netrover.com, sales@netrover.com, kobra@netrover.com, schwenk@netrus.net, tke@netrus.net, klai@netrus.net, robertal@netrus.net, swp@netrus.net, raustin@netrus.net, aheller@netrus.net, cherylw@netscape.com, ietf-ldapext@netscape.com, charles@netscape.com, blaynedennis@netscape.com, jboring@netscape.com, pamlin@netscape.com, reg2beta@netscape.com, kenchuk@netscape.net, jmgreen3@netscape.net, pkovacek@netscape.net Mime-Version: 1.0 Content-Type: text/html; charset="iso-8859-1"; Subject: FW: Resent-Message-ID: <"EEBIvB.A.-OF.DnzJ7"@glacier> Resent-From: ietf-ldapext@netscape.com X-Mailing-List: X-Loop: ietf-ldapext@netscape.com Precedence: list Resent-Sender: ietf-ldapext-request@netscape.com Thank you for your interest!
Judgment Courses offers an extensive Audio training
course in
"How to Collect Money Judgments"
88.

If you are like many people, you are not even sure what a
Money Judgment is and
why processing Money Judgments
can earn you very substantial income
.

If you ever sue a company or a person and you win then you
will have a Money Judgment against them.

You are happy you won but you will soon find out the
shocking fact: "Its now up to you to collect on the
Judgment". The court does not require the loser to pay you.
The court will not even help you. You must trace the loser
down, find their assets, their employment, bank accounts,
real estate, stocks and bonds, etc.

Very few people know how to find these assets or what to do
when they are found. The result is that millions of
Judgments are just sitting in files and being forgotten.

"In 79% of the cases the winner of a Judgment never sees a
dime."

The non-payment of judicial debt has grown to epidemic
proportions. Right now in the United States there is
between
200 and 300 billion dollars of uncollected Money
Judgment debt
. For every Judgment that is paid, 5 more
Judgments take its place.

We identified this massive market 8 years ago and have
actively pursued Judicial Judgments since. We invented this
business. We have perfected it into a well proven and solid
profession in which only a select few will be trained in the
techniques necessary to succeed.

With our first hand experience we have built a course which
teaches you how to start your business in this new unknown
and exciting field of processing Money Judgments.

By following the steps laid out in our course and with
reasonable effort you can become very successful in the
processing of Money Judgments.

The income potential is substantial in this profession.
We
have associates who have taken our course and are now
working full time making $96,000.00 to over $200,000.00 per
year. Part time associates are earning between $24,000.00
and $100,000.00 per year
. Some choose to operate out of
their home and work by themselves. Others build a sizable
organization of 15 to 25 people in attractive business
offices.

Today our company and our associates have over 126
million dollars in Money Judgments that we are currently
processing. Of this 126 million, 25 million is in the form
of joint ventures between our firm and our associates.
Joint ventures are where we make our money. We only break
even when our course is purchased. We make a 12% margin on
the reports we supply to our associates. Our reporting
capability is so extensive that government agencies, police
officers, attorneys, credit agencies etc., all come to us
for reports.


Many of our associates already have real estate liens in
force of between 5 million to over 15 million dollars.
Legally this means that when the properties are sold or
refinanced our associate must be paid off. The norm is 10%
interest compounded annually on unpaid Money Judgments.
Annual interest on 5 million at 10% translates to
$500,000.00 annually in interest income, not counting the
payment of the principal.

Our associates earn half of this amount or $250,000.00 per
year. This is just for interest, not counting principle
and not counting the compounding of the interest which can
add substantial additional income. Typically companies are
sold for 10 times earnings. Just based on simple interest
an associate with 5 million in real estate liens could sell
their business for approximately 2.5 million dollars.

92% of all of our associates work out of their home; 43%
are women and 36% are part time
.

One of the benefits of working in this field is that you are
not under any kind of time frame. If you decide to take off
for a month on vacation then go. The Judgments you are
working on will be there when you return. The Judgments
are still in force, they do not disappear.

The way we train you is non-confrontational. You use your
computer and telephone to do most of the processing. You
never confront the debtor. The debtor doesn't know who you
are. You are not a collection agency.

Simply stated the steps to successful Money Processing
are as follows:

Mail our recommended letter to companies and individuals
with Money Judgments. (We train you how to find out who
to write to)

8% to 11% of the firms and people you write will call you
and ask for your help. They call you, you don't call them
unless you want to.

You send them an agreement (supplied in the course) to
sign which splits every dollar you collect 50% to you and
50% to them. This applies no matter if the judgment is for
$2,000.00 or $2,000,000.00.

You then go on-line to our computers to find the debtor
and their assets. We offer over 120 powerful reports to
assist you. They range from credit reports from all three
credit bureaus, to bank account locates, employment
locates, skip traces and locating stocks and bonds, etc.
The prices of our reports are very low. Typically 1/2 to
1/3 of what other firms charge. For example we charge
$6.00 for an individuals credit report when some other
companies charge $25.00.

Once you find the debtor and their assets you file
garnishments and liens on the assets you have located.
(Standard fill in the blanks forms are included in the
course)

When you receive the assets you keep 50% and send 50% to
the original Judgment holder.

Once the Judgment is fully paid you mail a Satisfaction of
Judgment to the court. (Included in the course)

Quote's from several of our students:

Thomas in area code 516 writes us: "I just wanted to drop
you a short note thanking you for your excellent course.
My
first week, part time, will net me 3,700.00 dollars
. Your
professionalism in both the manual and the video opened
doors for me in the future. There's no stopping me now.
Recently Thomas states he has over $8,500,000 worth of
judgments he is working on.

After only having this course for four months, Larry S. in
area code 314 stated to us: "
I am now making $2,000.00 per
week
and expect this to grow to twice this amount within the
next year. I am having a ball. I have over $250,000 in
judgments I am collecting on now."

After having our course for 7 months Larry S. in 314 stated
"
I am now making $12,000.00 per month and have approximately
$500,000.00 in judgments I am collecting on. Looks like I
will have to hire someone to help out"

Marshal in area code 407 states to us "I feel bad, you only
charged me $259.00 for this course and it is a goldmine. I
have added 3 full time people to help me after only having
your course for 5 months"

From the above information and actual results you can see
why we can state the following:

With our course you can own your own successful business.
A business which earns you substantial income now and one
which could be sold in 3-5 years, paying you enough to
retire on and travel the world. A business which is
extremely interesting to be in. A Business in which every
day is new and exciting.

None of your days will be hum-drum. Your brain is
Challenged. A business, which protects you from Corporate
Downsizing. A business which you can start part time from
your home and later, if you so desire, you can work in full
time. A business, which is your ticket to freedom from
others telling you what to do. A business, which lets you
control your own destiny. Our training has made this happen
for many others already. Make it happen for you!

If the above sounds interesting to you then its time for you
to talk to a real live human being, no cost or obligation
on your part.

Please call us at 1-4 0 6--6 5 2--0 1 9 4 .

We have
Customer Support staff available to you from 8:00am to
9:00pm (Mountain Time) 7 days a week
. If you call this number
you can talk to one of our experienced Customer Support personnel.
They can answer any questions you may have - with no obligation.
Sometimes we run special pricing on our courses and combinations
of courses. When you call our Customer Support line they can let
you know of any specials we may be running. If you like what you
read and hear about our courses, then the Customer Support person
can work with you to place your order. We are very low key. We
merely give you the facts and you can then decide if you want to
work with us or not.

Thank you for your time and interest.















++++++++++++++++++++++++++++++++++++++++++++++++++++++++
This ad is produced and sent out by:
Universal Advertising Systems
To be removed from our mailing list please email us at
tammismith@freeze.com with remove in the subject line or
call us toll free at 1-888-605-2485 and give us your email address or write us at:
Central DB Removal, PO Box 1200, Oranjestad, Aruba
++++++++++++++++++++++++++++++++++++++++++++++++++++




=========================================
------------###########################--------------






Content-Transfer-Encoding: 7BIT





Content-Transfer-Encoding: 7BIT
From list@netscape.com Wed Jun 13 19:50:10 2001 Received: from netscape.com (r2d2.netscape.com [205.217.237.47]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id TAA03599 for ; Wed, 13 Jun 2001 19:50:09 -0400 (EDT) Received: from aka.mcom.com (aka.mcom.com [205.217.237.180]) by netscape.com (8.10.0/8.10.0) with ESMTP id f5DNmXr09602; Wed, 13 Jun 2001 16:48:33 -0700 (PDT) Received: (from list@localhost) by aka.mcom.com (8.10.0/8.10.0) id f5DNmXU25788; Wed, 13 Jun 2001 16:48:33 -0700 (PDT) Resent-Date: Wed, 13 Jun 2001 16:48:33 -0700 (PDT) Date: Wed, 13 Jun 2001 19:29:31 -0400 From: pw19s@msn.com Message-Id: <200106132329.TAA20582@ophir.astro.umd.edu> To: umkq8108@msn.com Reply-To: aldengerckens426@excite.com Subject: Increase Sales, Accept Credit Cards! [99y7k] Resent-Message-ID: <"v-AM3B.A.VSG.Qv_J7"@glacier> Resent-From: ietf-ldapext@netscape.com X-Mailing-List: X-Loop: ietf-ldapext@netscape.com Precedence: list Resent-Sender: ietf-ldapext-request@netscape.com We provide businesses of ALL types an opportunity to have their own no hassle Credit Card Merchant Account with NO setup fees. Good credit, bad credit, no credit -- not a problem! 95% approval rate! You will be able to accept all major credit cards including Visa, MasterCard, American Express and Discover, as well as debit cards, ATM and check guarantee services. You will have the ability to accept E-checks over the Internet with a secure server. To insure that you wont miss a sale, you will be able to accept checks by Phone or Fax. We can handle ANY business and client type! If you already have a merchant account we can lower your rates substantially with the most competitive rates in the industry and state of the art equipment and software. We will tailor a program to fit your budget and you wont pay a premium for this incredible service! If you are a U.S. or Canadian citizen and are interested in finding out additional information or to speak with one of our reps, reply to this email and include the following contact information: Your Name, Phone Number (with Area/Country code), and if possible, a best time to call. One of our sales reps will get back to you shortly. Thank you for your time. If you wish to be removed from our mailing list, please reply to this email with the subject "Remove" and you will not receive future emails from our company. From list@netscape.com Thu Jun 14 09:19:32 2001 Received: from netscape.com (c3po.netscape.com [205.217.237.46]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id JAA28199 for ; Thu, 14 Jun 2001 09:19:31 -0400 (EDT) Received: from aka.mcom.com (aka.mcom.com [205.217.237.180]) by netscape.com (8.10.0/8.10.0) with ESMTP id f5EDHnY09759; Thu, 14 Jun 2001 06:17:49 -0700 (PDT) Received: (from list@localhost) by aka.mcom.com (8.10.0/8.10.0) id f5EDHnE13348; Thu, 14 Jun 2001 06:17:49 -0700 (PDT) Resent-Date: Thu, 14 Jun 2001 06:17:49 -0700 (PDT) From: mario To: ietf-nntp-request@academ.com Subject: Manuf. Production/Contrl Software For $1,495.00. Date: Wed, 13 Jun 2001 11:56:53 Mime-Version: 1.0 Content-Type: text/plain; charset="DEFAULT_CHARSET" X-Priority: 3 X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook Express 5.00.2919.6700 X-MimeOLE: Produced By Microsoft MimeOLE V5.00.2919.6700 Message-Id: <20010613234992.SM01040@plain> Resent-Message-ID: <"zsAqcC.A.KQD.7lLK7"@glacier> Resent-From: ietf-ldapext@netscape.com X-Mailing-List: X-Loop: ietf-ldapext@netscape.com Precedence: list Resent-Sender: ietf-ldapext-request@netscape.com Job Master, a complete, user friendly Windows based software package, can manage and control your operation from sales quote to shipment. For one week only, Job Master, normally $2,495.00, is on sale for a total price of $1,495.00. In order for you to receive this $1,000.00 savings we must have your order by June 22th. Job Master is designed specifically for small to medium sized manufacturers, and costs many thousands of dollars less than any other even remotely comparable software package. Following is a list of features. If you have any questions, would like to discuss the package further, or if you would like to obtain our Web site address for a total walk through of the program, please call me directly at (661)254-9926(please do not E Mail me back. I may not get your message if you simply hit "Reply" and respond to this message via return E Mail). By way of background, we are a software company, which for some years has specialized in the development of custom software, primarily for small to medium sized manufacturers. Job Master is a distillation of over a million and a half dollars of software we have developed to control and manage the production of our manufacturing clients. Job Master contains the following features: 1. QUOTATION MODULE. In this module, quotes are developed, modified, and produced for sending to your client. A history is kept of all quotes for future reference, or modification for other clients. All quotations and revisions are "auto numbered," including versions. The quotes section allows for the entry of parts/processes, and costing of each, including materials, labor, markup, and taxes. Inventory status can be accessed from this section for reference. 2. SALES ORDER. Once a quotation is accepted, the final quotation information can be transformed into a Sales Order for your client's signature on a "point and click" basis. The Sales Order can be modified and re issued if necessary. A history if kept of all Sales Orders for future reference, or modification for other clients. All sales orders and revisions are "auto numbered," including versions. Inventory status can be accessed from this section for reference. 3. CUSTOMER LETTERS can be created from the Quotation and Sales Order sections. 4. SHOP TRAVELER/WORK ORDER. Once a Sales Order is accepted, the sales order information can be transformed into a shop traveler/work order on a "point and click" basis. Each item on the Sales Order becomes a shop traveler/work order, with each step of production of the item then listed on the traveler/work order. Each such traveler/work order is tied back into the Sales Order. The shop traveler/work order allows for the entry of line items, and notes on each line item. The shop traveler/work order contains a "notes" section. The Shop traveler/work order allows for the storing or attachment of drawings to the traveler/work order. The shop traveler/work order also contains a "drop down," from which standard processes can be selected for inclusion on the shop traveler/work order. The shop traveler/work order numbers progress in order of production sequence, and re numbers them if new steps are added. The shop traveler/work order allows for change orders or revisions, a! nd numbers changes in sequence of he original shop traveler/work order number; i.e., 100, 100-1, 100-2, etc. All shop traveler/work orders and related revisions are retained in memory for future reference. The shop traveler/work order is bar coded for tracking of production step by step, and production of ongoing client status reports. Bar coding includes the ability for an employee to "swipe" their own ID bar code for recording in the system as to who upgraded what step. The shop traveler/work order function also allows for manual update of production status. The shop traveler/work order allows for quality control sign off, and the final production of certifications, either from a "canned" list, or hand typed in on a case by case basis. 5. INVENTORY. The application includes an inventory section, which allows operations to check materials inventory in and out. The inventory section allows for the comparison of inventory received against a P.O., and produces an "overage/underage" report of inventory received as compared against the P.O. The inventory section allows for the setting of minimum (re-order now!) and maximum inventory amounts, and produces reports showing what inventory needs to be ordered, as well as inventory that is at or above the maximum set to have in house. The inventory section also tracks "partially shipped" orders, which are tied in to the shipping function. This section shows how much completed product under a particular order has been actually shipped to a client, and how much remains to be shipped. The balance is adjusted as shipments are made. 6. REQUEST FOR PURCHASE. The application allows operators to produce a Request For Purchase for accounting for any inventory items, which need to be ordered. Inventory items have a drop down of approved vendors for each item. 7. REQUEST FOR BID. The application allows operators to produce a Request For Bid for accounting to send to Vendors for any inventory items, which need to be ordered. Inventory items have a drop down of approved vendors for each item to which Requests For Bid can be sent. 8. INVOICE. The application produces an invoice/invoice detail for all completed items ready to be billed/shipped to clients. 9. PRODUCTION OUTPUT STATUS. The application produces a date range selectable report on how much product, and the value of the product, which was completed during a selected date range. The application also produces a report on how many orders, and the value of those orders, which remain to be completed during a selected date range. 10. The application produces SHIPPING DOCUMENTS as per selected shippers, and produces a PACKING SLIP. 11. The application has a "FIND" FUNCTION in selected sections, allowing for searches by customer name, work order number, etc. 12. The application has "AUTO FILL;" i.e., when an operator starts to type in a name, number, etc. all related information auto fills after the first few letters or numbers are typed in. Job Master is currently being sold in the marketplace for $2,495.00 per package. However, if we receive your order by June 22th, your total price will be $1,495.00. Again, if you have any questions at all, or would like to place your order, please call me on my direct line, (661) 254-9926. Thank you! Mario Chavez Application Sales, Inc. ---------------------------------------------------------------------- You have received this newsletter because you signed up for updates on our tracking software. If you want to unsubscribe from this newsletter, please send a reply email with "REMOVE" in the subject line. From list@netscape.com Thu Jun 14 09:43:33 2001 Received: from netscape.com (c3po.netscape.com [205.217.237.46]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id JAA29074 for ; Thu, 14 Jun 2001 09:43:32 -0400 (EDT) Received: from aka.mcom.com (aka.mcom.com [205.217.237.180]) by netscape.com (8.10.0/8.10.0) with ESMTP id f5EDfxY12694; Thu, 14 Jun 2001 06:42:00 -0700 (PDT) Received: (from list@localhost) by aka.mcom.com (8.10.0/8.10.0) id f5EDfxY21585; Thu, 14 Jun 2001 06:41:59 -0700 (PDT) Resent-Date: Thu, 14 Jun 2001 06:41:59 -0700 (PDT) Message-Id: Date: Thu, Jun 2001 23:40:49 From: goteam@myoffice.com Mime-Version: 1.0 To: Subject: Lusty Lips working hard Content-Type: text/plain; charset="us-ascii" Resent-Message-ID: <"PhajIB.A.0PF.j8LK7"@glacier> Resent-From: ietf-ldapext@netscape.com X-Mailing-List: X-Loop: ietf-ldapext@netscape.com Precedence: list Resent-Sender: ietf-ldapext-request@netscape.com T E E N P I E You will get as wet as they do. Heaps of HOT HORNY LUSHIOUS LICKABLE GOODNESS..... http://www.teen-pie.com/?sausage *Live sex chat *Ripe teen snatch *Live teen slut shows *Hidden voyuer cam *Streaming video TEEN ORGIES WILD BI TEENS CUM FACED TEENS YUMMY TEEN SNATCH GOLDEN SHOWER TEENS http://www.teen-pie.com/?sausage #bM#aWV0Zi1sZGFwZXh0QG5ldHNjYXBlLmNvbQ==#eM# From list@netscape.com Thu Jun 14 15:19:58 2001 Received: from netscape.com (c3po.netscape.com [205.217.237.46]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA08116 for ; Thu, 14 Jun 2001 15:19:56 -0400 (EDT) Received: from aka.mcom.com (aka.mcom.com [205.217.237.180]) by netscape.com (8.10.0/8.10.0) with ESMTP id f5EJIGY17966; Thu, 14 Jun 2001 12:18:16 -0700 (PDT) Received: (from list@localhost) by aka.mcom.com (8.10.0/8.10.0) id f5EJIG218380; Thu, 14 Jun 2001 12:18:16 -0700 (PDT) Resent-Date: Thu, 14 Jun 2001 12:18:16 -0700 (PDT) Content-return: allowed Date: Thu, 14 Jun 2001 14:27:29 -0400 From: "Richard, Francois M" Subject: LDAP and character encoding... To: "'ietf-ldapext@netscape.com'" Message-id: MIME-version: 1.0 X-Mailer: Internet Mail Service (5.5.2653.19) Content-type: text/plain; charset=iso-8859-1 Content-transfer-encoding: 7BIT Resent-Message-ID: <"RR947.A.bdE.03QK7"@glacier> Resent-From: ietf-ldapext@netscape.com X-Mailing-List: X-Loop: ietf-ldapext@netscape.com Precedence: list Resent-Sender: ietf-ldapext-request@netscape.com Content-Transfer-Encoding: 7BIT Hi, I hope this list is appropriate for the kind of general information about LDAP I am looking for. I understood (from RFC2251) that strings exchanged through LDAP protocol are utf-8 encoded. But all different samples of message I could find (like in RFC 2849) seem to apply Base64 transfer encoding. For instance # cn;lang-ja;phonetic:: title;lang-ja;phonetic:: 44GI44GE44GO44KH44GG44G2IOOBtuOBoeOCh+OBhg== So I am trying to test my understanding on this character encoding issue: 1- LDAP v3 requires utf-8 character encoding for strings 2- The LDIF format for exchanging data through LDAP v3 protocol requires the utf-8 encoded bytes to be base64 transfer encoding before being sent over the wire. Is this correct? Other related questions: Is the only benefit of using Base64 encoding the 7-bit clean aspect? Why does LDAP has to be 7-bit clean when other protocol(HTTP, IPP, ...) can transmit utf-8 over the wire? Is it possible that this restriction will be removed in the near future, to get utf-8 over the wire? Is there still existing implementation of LDPA v2 (based on IA5 or IRA)? I would appreciate some help since reading between the lines of RFCs is tedious... Tanks From list@netscape.com Thu Jun 14 18:28:24 2001 Received: from netscape.com (c3po.netscape.com [205.217.237.46]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id SAA10814 for ; Thu, 14 Jun 2001 18:28:23 -0400 (EDT) Received: from aka.mcom.com (aka.mcom.com [205.217.237.180]) by netscape.com (8.10.0/8.10.0) with ESMTP id f5EMQfY29361; Thu, 14 Jun 2001 15:26:41 -0700 (PDT) Received: (from list@localhost) by aka.mcom.com (8.10.0/8.10.0) id f5EMQh217848; Thu, 14 Jun 2001 15:26:43 -0700 (PDT) Resent-Date: Thu, 14 Jun 2001 15:26:43 -0700 (PDT) Message-Id: <5.1.0.14.0.20010614152031.00ae3510@127.0.0.1> X-Sender: kurt@127.0.0.1 X-Mailer: QUALCOMM Windows Eudora Version 5.1 Date: Thu, 14 Jun 2001 15:25:13 -0700 To: From: "Kurt D. Zeilenga" Subject: RE: LDAP Result Codes Cc: "Bruce Greenblatt" , "Karen Gdaniec" , In-Reply-To: <000201c0f27d$ec951180$1f05400a@software.com> References: <5.1.0.14.0.20010610212217.00adcf08@127.0.0.1> Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Resent-Message-ID: <"cg3ZmD.A.mVE.doTK7"@glacier> Resent-From: ietf-ldapext@netscape.com X-Mailing-List: X-Loop: ietf-ldapext@netscape.com Precedence: list Resent-Sender: ietf-ldapext-request@netscape.com At 06:53 AM 6/11/2001, John Liang wrote: >Also we need a result code for Virtual List View related >control error. And if we want to change RFC 2289, Server >Side Sorting, we will need another one for SSS too. It's my understanding that only one resultCode is needed as outlined in Michael's control error I-D. draft-armijo-ldap-control-error-01.txt Kurt From list@netscape.com Sat Jun 16 03:23:51 2001 Received: from netscape.com (r2d2.netscape.com [205.217.237.47]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id DAA22056 for ; Sat, 16 Jun 2001 03:23:50 -0400 (EDT) Received: from aka.mcom.com (aka.mcom.com [205.217.237.180]) by netscape.com (8.10.0/8.10.0) with ESMTP id f5G7MBr21006; Sat, 16 Jun 2001 00:22:11 -0700 (PDT) Received: (from list@localhost) by aka.mcom.com (8.10.0/8.10.0) id f5G7MCU23309; Sat, 16 Jun 2001 00:22:12 -0700 (PDT) Resent-Date: Sat, 16 Jun 2001 00:22:12 -0700 (PDT) To: Undisclosed.Recipients@msrv.minfin.govrn.bg From: vivant@netlaputa.ne.jp Subject: GUARANTEED way to QUICKLY have EXCELLENT CREDIT!! 20793 Date: Sat, 16 Jun 2001 00:15:54 -0700 MIME-Version: 1.0 Content-Type: text/plain; charset="Windows-1252" Content-Transfer-Encoding: 7bit X-Priority: 3 X-MSMail-Priority: Normal Reply-To: akashi@eri.osaka-cu.ac.jp Message-ID: <20010616081420734.AAA318.290@acadiau.ca> Resent-Message-ID: <"AK9TbD.A.qrF.ikwK7"@glacier> Resent-From: ietf-ldapext@netscape.com X-Mailing-List: X-Loop: ietf-ldapext@netscape.com Precedence: list Resent-Sender: ietf-ldapext-request@netscape.com Content-Transfer-Encoding: 7bit $$ GUARANTEED WAY TO QUICKLY HAVE EXCELLENT CREDIT!! $$ Dear Friend, Give yourself the ADVANTAGE of enjoying life more with EXCELLENT CREDIT!! Over the past 8 years I have perfected a system called the Proven Credit Advantage Program. It's a guaranteed way for legally getting an excellent credit rating almost instantly. Here's how: If you have bad credit you will simply go through my easy 5 step program to quickly get a new, legal, unblemished credit file and establish Excellent Credit. If you don't have bad credit, but want to make your existing credit EXCELLENT, we will go straight to STEP 5. Step 1 - Because no two people in the United States have the same Social Security Number, Banks and Creditors access your credit file almost entirely by your SS#. You will not want to change your Social Security Number because it is extremely difficult to do so and you need it for your Employment, Taxes and Social Security Benefits. The FEDERAL PRIVACY ACT OF 1974 clearly states that only the Government and your employer can force you to use your SS#. Because of this law you are allowed to legally use another 9 digit number to use in place of your Social Security # on credit applications. The first day you become our client, you will receive your own number through the Employer Identification Number Program. You will need us for this because 95% of all Employer Identification Numbers, although 9 digits, do not look anything like Social Security Numbers and cannot be used on credit applications. We will legally get you an Employer Identification Number that fits in the same range of Social Numbers in use today. Because the Federal Laws do not require you to give your SS# to anyone besides your Employer and the Government, you can now legally use this number in place of your SS# on credit applications. Remember, your new number will only be used for new credit. Step 2 - No two people with the same name have the same mailing address, so you will need to obtain a new mailing address for use on your new credit file. A friend, relative or mailbox address in your area will be perfect. Step 3 - No two people with the same name have the same telephone numbers, so you will also need a new telephone number for use on your new credit file. A friend, relative, voice mail or pager will again work perfectly. Step 4 - With your new Social Security number, new address and new telephone number we will open your new credit file. It will now be totally impossible for any creditor to know anything about your past credit history. Step 5- To guarantee that you will quickly have EXCELLENT CREDIT, we will assist you in instantly adding UNLIMITED positive information to your credit file. This is an unknown way of adding real accounts to your new credit file to give you an Excellent Credit Rating in less than 15 days. As you know, the more positive information on your credit file, the more money banks will lend you. Countless clients of ours have credit lines over $100,000 because of our Proven Credit Advantage Program! When we are finished you will receive a copy of your credit file proving that you now have excellent credit! This will take less than 15 days. You will now be able to easily qualify for ANY credit you apply for! To be on the road to EXCELLENT CREDIT simply send us your name, complete mailing address including zip code and telephone number (optional), along with a check or money order payable to American Financial Services Inc. for $29.95. Send to: American Financial Services Inc. Attn.: Mike Robbins 311 N. Robertson Blvd. Suite 625 Beverly Hills, CA 90210 All necessary paperwork along with a telephone number to contact us for assistance will be sent to you priority mailed to you within 3 business days. $$$$ RISK FREE DOUBLE YOUR MONEY BACK GUARANTEE!! $$$$ My Proven Credit Advantage Program unconditionally guarantees you will qualify for personal loans, business loans, credit cards, auto loans, home loans and any other credit you apply for! If you are not able to qualify for credit after using my program, simply return your Proven Credit Advantage Program along with your denial letter and your $29.95 investment will be refunded DOUBLE! That's a $59.90 refund if this doesn't work like I said! I make this guarantee to you because the Proven Credit Advantage Program has already helped over 15,000 people just like you. I KNOW it works - all you need to do is sign up TODAY! I truly look forward to making you another SATISFIED CLIENT!! ................................................................ Yes! I deserve excellent credit. Please enroll me in the Proven Credit Advantage Program. Enclosed is my check/money order for $29.95. The following information is for our records only and does not need to be your new credit file information. First Name______________________________ Last Name________________________________ Address__________________________________ City_____________________________________ State_______________Zip__________________ Telephone(optional)______________________ e-mail___________________________________ If you would prefer to download your Proven Credit Advantage Program, simply check below and we will e-mail you a download upon receipt of your order. Otherwise we will Priority Mail your program to the above address. ___ Please e-mail me my PROVEN CREDIT ADVANTAGE PROGRAM to the above e-mail address. ___ Please send me my PROVEN CREDIT ADVANTAGE PROGRAM via United States Priority Mail to the above address. Send $29.95 to: American Financial Services Inc. Attn: Mike Robbins 311 N. Robertson Blvd. Suite 625 Beverly Hills, CA 90210 This e-mail is never sent unsolicited! You have been sent this email because we received your e-mail address in an opt-in database for individuals interested in information to improve their financial situation. If this e-mail has reached you in error please respond to: optmeoutnow44@hotmail.com with remove in the subject line. From list@netscape.com Sat Jun 16 23:29:05 2001 Received: from netscape.com (r2d2.netscape.com [205.217.237.47]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id XAA29452 for ; Sat, 16 Jun 2001 23:29:04 -0400 (EDT) Received: from aka.mcom.com (aka.mcom.com [205.217.237.180]) by netscape.com (8.10.0/8.10.0) with ESMTP id f5H3RGr09879; Sat, 16 Jun 2001 20:27:16 -0700 (PDT) Received: (from list@localhost) by aka.mcom.com (8.10.0/8.10.0) id f5H3RGU19902; Sat, 16 Jun 2001 20:27:16 -0700 (PDT) Resent-Date: Sat, 16 Jun 2001 20:27:16 -0700 (PDT) Message-ID: <0000707c1967$000053fe$00003ade@mail4.catchaplane.net> To: From: knedoba@keepyourheadup.net Subject: re: contest confirmation. 15070 Date: Wed, 08 Sep 1999 13:42:08 -0400 MIME-Version: 1.0 X-Priority: 3 (Normal) X-MSMail-Priority: Normal Reply-To: vdgefv3d@Flashmail.com X-MIMETrack: Itemize by SMTP Server on WEB_SERVER/ALBA(Release 5.0.5 |September 22, 2000) at 06/16/2001 03:35:31 PM, Serialize by Router on WEB_SERVER/ALBA(Release 5.0.5 |September 22, 2000) at 06/17/2001 12:18:20 AM, Serialize complete at 06/17/2001 12:18:20 AM Content-Transfer-Encoding: quoted-printable Content-Type: text/html; charset="iso-8859-1" Resent-Message-ID: <"ehT4KC.A.T2E.SOCL7"@glacier> Resent-From: ietf-ldapext@netscape.com X-Mailing-List: X-Loop: ietf-ldapext@netscape.com Precedence: list Resent-Sender: ietf-ldapext-request@netscape.com Content-Transfer-Encoding: quoted-printable Thank you for ente= ring.

You have been specially selected to qualify for the following:

Grand prize  &n= bsp;- Florida Bahamas vacation and cruise
1st prize       - Airline tickets
Other Prizes - 3 days and 2 nights hotel accommodations

Please confirm your entry within 24 hours of receipt of this confirmation.=


Click here to confirm

Confirmation number - zy345ki490a

Batch number - 2189<= /b>

 

to be removed reply to this message with "remove'= in the subject line

From list@netscape.com Sun Jun 17 02:18:02 2001 Received: from netscape.com (c3po.netscape.com [205.217.237.46]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id CAA11660 for ; Sun, 17 Jun 2001 02:18:00 -0400 (EDT) Received: from aka.mcom.com (aka.mcom.com [205.217.237.180]) by netscape.com (8.10.0/8.10.0) with ESMTP id f5H6GOY12146; Sat, 16 Jun 2001 23:16:24 -0700 (PDT) Received: (from list@localhost) by aka.mcom.com (8.10.0/8.10.0) id f5H6GPE13632; Sat, 16 Jun 2001 23:16:25 -0700 (PDT) Resent-Date: Sat, 16 Jun 2001 23:16:25 -0700 (PDT) CC: ietf-ldapext-request@netscape.com, ietf-ldapext@netscape.com, humorchannel@netscape.com, husjon@netscape.com, hyama@netscape.com, imad@netscape.com, ibrahimokka@netscape.com, idesignwebcom@netscape.com, ibagna@netscape.com, ibd-feedback@netscape.com, ibendersen@netscape.com, imexa@netscape.com, html-evang-input@netscape.com, tward@netscape.com, undenied@netscape.com Reply-To: trew6543@arabia.com X-Mailer: Microsoft Outlook Express 5.50.4133.2400 Subject: Three Cherrys Wins!!!!! Message-Id: <8k058dgrea5.41n34n@mail4.keepyourheadup.net> To: illyst784@netscape.com Content-Type: text/html; charset="iso-8859-1" Content-Transfer-Encoding: 8BIT From: beendwnb4@catchaplane.net Date: Sun, 17 Jun 2001 00:58:38 -0500 Resent-Message-ID: <"yc1qRC.A.NUD.3sEL7"@glacier> Resent-From: ietf-ldapext@netscape.com X-Mailing-List: X-Loop: ietf-ldapext@netscape.com Precedence: list Resent-Sender: ietf-ldapext-request@netscape.com Content-Transfer-Encoding: 8BIT

We've already paid out over a cool MILLION DOLLARS to WINNERS just like YOU.

Enter the Finest, Highest Paying Casino Online

$25,000 WINNERS are cashing in at our casino DAILY! Grab YOUR share of this wealth pool and open an account now. We'll bring the finest, most secure, highest paying casino on the Net right to your desktop.

We deliver the best games, like REAL LAS VEGAS STYLE BLACKJACK plus Caribbean Stud, Draw Poker and LOTS of the loosest Slot Machines you'll ever find. You're just a click away from High Paying Winning Action.

FREE $10 SIGN UP for EVERY new player!
CLICK HERE To Enter The Casino and Win Big Now!!!

3D JAVA & Multi-Player
Play the best online Casino in the world right now.
NO DOWNLOADS necessary.
INSTANT ACCESS
High quality, totally secure and private CASINO FUN, right on your computer in the comfort and privacy of home.

PLAY WITH A PROVEN GAMING ORGANIZATION.
Your privacy is taken very seriously and is assured.
WIN BIG at our Virtual Tables and Cash Out Instantly!

To be removed please reply with REMOVE in the subject line.

From list@netscape.com Sun Jun 17 02:42:59 2001 Received: from netscape.com (c3po.netscape.com [205.217.237.46]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id CAA13190 for ; Sun, 17 Jun 2001 02:42:59 -0400 (EDT) Received: from aka.mcom.com (aka.mcom.com [205.217.237.180]) by netscape.com (8.10.0/8.10.0) with ESMTP id f5H6fRY13369; Sat, 16 Jun 2001 23:41:27 -0700 (PDT) Received: (from list@localhost) by aka.mcom.com (8.10.0/8.10.0) id f5H6fSM17934; Sat, 16 Jun 2001 23:41:28 -0700 (PDT) Resent-Date: Sat, 16 Jun 2001 23:41:28 -0700 (PDT) Message-Id: <200106170641.f5H6foq26633@xwing.aoltw.net> From: abbu@earthlink.net Reply-To: oliverbryant@freeze.com To: abbu@earthlink.net Subject: * Time:6:48:53 PM Date: Sat, 16 Jun 2001 18:48:53 Mime-Version: 1.0 Content-Type: text/plain; charset="DEFAULT_CHARSET" X-Priority: 3 X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook Express 5.00.2919.6700 X-MimeOLE: Produced By Microsoft MimeOLE V5.00.2919.6700 Resent-Message-ID: <"oXU-HC.A.2XE.WEFL7"@glacier> Resent-From: ietf-ldapext@netscape.com X-Mailing-List: X-Loop: ietf-ldapext@netscape.com Precedence: list Resent-Sender: ietf-ldapext-request@netscape.com *BANKCARD MERCHANT CENTER June Promotion: $49.99/month + standard fees to accept Credit Cards from your customers. Tollfree 877-492-4314 Express Processing M-F 9am-11pm, Sat-Sun 11am-8pm EST OR mailto:102positive@excite.com to activate Merchant Account w/in 48hrs, Please provide your, telephone and the best time to conduct your Instaphone Application: Bad Credit /No Credit NO PROBLEM Accounts GUARANTEED Tollfree 877-492-4314 Use code ACTIVATION#4999 to get up to $499 Cash Rebate Tollfree 877-492-4314 Express Processing M-F 9am-11pm, Sat-Sun 11am-8pm EST This message is being sent in Full compliance with US Sente Bill 1618, Title#3, Section301. If you wish to be delete from this list, mailto:oliverbryant@freez.com with REMOVE in the Subject line. From list@netscape.com Sun Jun 17 07:57:08 2001 Received: from netscape.com (r2d2.netscape.com [205.217.237.47]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id HAA09105 for ; Sun, 17 Jun 2001 07:57:06 -0400 (EDT) Received: from aka.mcom.com (aka.mcom.com [205.217.237.180]) by netscape.com (8.10.0/8.10.0) with ESMTP id f5HBssr28336; Sun, 17 Jun 2001 04:54:54 -0700 (PDT) Received: (from list@localhost) by aka.mcom.com (8.10.0/8.10.0) id f5HBstM02950; Sun, 17 Jun 2001 04:54:55 -0700 (PDT) Resent-Date: Sun, 17 Jun 2001 04:54:55 -0700 (PDT) Message-Id: <200106171153.f5HBrk614669@ywing.netscape.com> From: dangilmour@hotmail.com Reply-To: oliverbryant@freeze.com To: dangilmour@hotmail.com Subject: *** Time:11:12:33 PM Date: Sat, 16 Jun 2001 23:12:33 Mime-Version: 1.0 Content-Type: text/plain; charset="DEFAULT_CHARSET" X-Priority: 3 X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook Express 5.00.2919.6700 X-MimeOLE: Produced By Microsoft MimeOLE V5.00.2919.6700 Resent-Message-ID: <"_M0W0C.A.ut.NqJL7"@glacier> Resent-From: ietf-ldapext@netscape.com X-Mailing-List: X-Loop: ietf-ldapext@netscape.com Precedence: list Resent-Sender: ietf-ldapext-request@netscape.com *BANKCARD MERCHANT CENTER June Promotion: $49.99/month + standard fees to accept Credit Cards from your customers. Tollfree 877-492-4314 Express Processing M-F 9am-11pm, Sat-Sun 11am-8pm EST OR mailto:102positive@excite.com to activate Merchant Account w/in 48hrs, Please provide your, telephone and the best time to conduct your Instaphone Application: Bad Credit /No Credit NO PROBLEM Accounts GUARANTEED Tollfree 877-492-4314 Use code ACTIVATE$4999 to get your Application Fee Waived - NO upfront $$$! Tollfree 877-492-4314 Express Processing M-F 9am-11pm, Sat-Sun 11am-8pm EST This message is being sent in Full compliance with US Sente Bill 1618, Title#3, Section301. If you wish to be delete from this list, mailto:oliverbryant@freez.com with REMOVE in the Subject line. From list@netscape.com Sun Jun 17 18:02:34 2001 Received: from netscape.com (c3po.netscape.com [205.217.237.46]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id SAA12276 for ; Sun, 17 Jun 2001 18:02:32 -0400 (EDT) Received: from aka.mcom.com (aka.mcom.com [205.217.237.180]) by netscape.com (8.10.0/8.10.0) with ESMTP id f5HM0nY18910; Sun, 17 Jun 2001 15:00:49 -0700 (PDT) Received: (from list@localhost) by aka.mcom.com (8.10.0/8.10.0) id f5HM0oc09124; Sun, 17 Jun 2001 15:00:50 -0700 (PDT) Resent-Date: Sun, 17 Jun 2001 15:00:50 -0700 (PDT) Message-ID: <000053f237fa$00006255$00004235@mc4.law13.hotmail.com> To: From: sweetylady20@hotmail.com Subject: Fire Your Boss!! 16949 Date: Sun, 17 Jun 2001 17:54:37 -1600 MIME-Version: 1.0 Content-Type: text/html; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable X-Priority: 3 X-MSMail-Priority: Normal Resent-Message-ID: <"mndDRD.A.pNC.RiSL7"@glacier> Resent-From: ietf-ldapext@netscape.com X-Mailing-List: X-Loop: ietf-ldapext@netscape.com Precedence: list Resent-Sender: ietf-ldapext-request@netscape.com Content-Transfer-Encoding: quoted-printable

FOLLOW ME TO FINANCIAL FREEDOM!!



I Am looking for people with good work ethic and extrordinary desire
to earn at least $10,000 per month working from home!



NO SPECIAL SKILLS OR EXPERIENCE REQUIRED We will give you all the

training and personal support you will need to ensure your success!


This LEGITIMATE HOME-BASED INCOME OPPORTUNITY can put you back in

control of your time,your finances,and your life!



If you've tried other opportunities in the past that have failed to
live up their promises,



THIS IS DIFFERENT THEN ANYTHING ELSE YOU'VE SEEN!



THIS IS NOT A GET RICH QUICK SCHEME!



YOUR FINANCIAL PAST DOES NOT HAVE TO BE YOUR FINANCIAL FUTURE!



CALL ONLY IF YOU ARE SERIOUS!



1-800-345-9708



DONT GO TO SLEEP WITHOUT LISTENING TO THIS!



"ALL our dreams can come true- if we have the courage to persue them"
<= BR> -Walt Disney



Please Leave Your Name And Number And Best Time To Call



DO NOT RESPOND BY EMAIL



This is not a SPAM. You are receiving this because

you are on a list of email addresses that I have bought.

And you have opted to receive information about

business opportunities. If you did not opt in to receive

information on business opportunities then please accept

our apology. To be REMOVED from this list simply reply

with REMOVE as the subject. And you will NEVER receive

another email from me.


From list@netscape.com Mon Jun 18 07:01:32 2001 Received: from netscape.com (c3po.netscape.com [205.217.237.46]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id HAA02987 for ; Mon, 18 Jun 2001 07:01:30 -0400 (EDT) Received: from aka.mcom.com (aka.mcom.com [205.217.237.180]) by netscape.com (8.10.0/8.10.0) with ESMTP id f5IAxIY01727; Mon, 18 Jun 2001 03:59:18 -0700 (PDT) Received: (from list@localhost) by aka.mcom.com (8.10.0/8.10.0) id f5IAxIs20818; Mon, 18 Jun 2001 03:59:18 -0700 (PDT) Resent-Date: Mon, 18 Jun 2001 03:59:18 -0700 (PDT) Message-Id: Date: Mon, Jun 2001 20:58:03 From: tommytommy@yahoo.com Mime-Version: 1.0 To: Subject: I am waiting ? Content-Type: text/plain; charset="us-ascii" Resent-Message-ID: <"o9jzuC.A.6EF.F8dL7"@glacier> Resent-From: ietf-ldapext@netscape.com X-Mailing-List: X-Loop: ietf-ldapext@netscape.com Precedence: list Resent-Sender: ietf-ldapext-request@netscape.com BARNYARD CHICKS http://www.barnyard-chicks.com/?sausage 1000's Farm sex photo galleries Pics Updated Daily Animal loving amateurs Cowgirl cunt lickers Barnyard gang bangs Goats & gashes These chicks don't stop for nothin' Tractors & toys Barn bonkfest Ridden Horses Shearing slits Hay humping Farm fetishes TOO MUCH TO LIST HERE GO TO http://www.barnyard-chicks.com/?sausage To be removed from this list please click on the link below and you WILL be removed. http://backdoormail.com/?address=ietf-ldapext@netscape.com #bM#aWV0Zi1sZGFwZXh0QG5ldHNjYXBlLmNvbQ==#eM# From list@netscape.com Mon Jun 18 07:18:48 2001 Received: from netscape.com (r2d2.netscape.com [205.217.237.47]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id HAA03352 for ; Mon, 18 Jun 2001 07:18:47 -0400 (EDT) Received: from aka.mcom.com (aka.mcom.com [205.217.237.180]) by netscape.com (8.10.0/8.10.0) with ESMTP id f5IBHBr03846; Mon, 18 Jun 2001 04:17:11 -0700 (PDT) Received: (from list@localhost) by aka.mcom.com (8.10.0/8.10.0) id f5IBHBY24864; Mon, 18 Jun 2001 04:17:11 -0700 (PDT) Resent-Date: Mon, 18 Jun 2001 04:17:11 -0700 (PDT) Message-Id: <200106181116.HAA03291@ietf.org> Mime-Version: 1.0 Content-Type: Multipart/Mixed; Boundary="NextPart" To: IETF-Announce: ; Cc: ietf-ldapext@netscape.com From: Internet-Drafts@ietf.org Reply-to: Internet-Drafts@ietf.org Subject: I-D ACTION:draft-ietf-ldapext-ldap-java-api-15.txt Date: Mon, 18 Jun 2001 07:16:28 -0400 Sender: nsyracus@cnri.reston.va.us Resent-Message-ID: <"kUhy1C.A.FEG.2MeL7"@glacier> Resent-From: ietf-ldapext@netscape.com X-Mailing-List: X-Loop: ietf-ldapext@netscape.com Precedence: list Resent-Sender: ietf-ldapext-request@netscape.com --NextPart A New Internet-Draft is available from the on-line Internet-Drafts directories. This draft is a work item of the LDAP Extension Working Group of the IETF. Title : The Java LDAP Application Program Interface Author(s) : R. Weltman, C. Tomlinson, M. Kekic, S. Sonntag, J. Sermersheim, M. Smith, T. Howes Filename : draft-ietf-ldapext-ldap-java-api-15.txt Pages : 139 Date : 15-Jun-01 This document defines a Java [JAVA] language application program interface to the Lightweight Directory Access Protocol (LDAP) [LDAPv3], in the form of a class library. A URL for this Internet-Draft is: http://www.ietf.org/internet-drafts/draft-ietf-ldapext-ldap-java-api-15.txt Internet-Drafts are also available by anonymous FTP. Login with the username "anonymous" and a password of your e-mail address. After logging in, type "cd internet-drafts" and then "get draft-ietf-ldapext-ldap-java-api-15.txt". A list of Internet-Drafts directories can be found in http://www.ietf.org/shadow.html or ftp://ftp.ietf.org/ietf/1shadow-sites.txt Internet-Drafts can also be obtained by e-mail. Send a message to: mailserv@ietf.org. In the body type: "FILE /internet-drafts/draft-ietf-ldapext-ldap-java-api-15.txt". NOTE: The mail server at ietf.org can return the document in MIME-encoded form by using the "mpack" utility. To use this feature, insert the command "ENCODING mime" before the "FILE" command. To decode the response(s), you will need "munpack" or a MIME-compliant mail reader. Different MIME-compliant mail readers exhibit different behavior, especially when dealing with "multipart" MIME messages (i.e. documents which have been split up into multiple messages), so check your local documentation on how to manipulate these messages. Below is the data which will enable a MIME compliant mail reader implementation to automatically retrieve the ASCII version of the Internet-Draft. --NextPart Content-Type: Multipart/Alternative; Boundary="OtherAccess" --OtherAccess Content-Type: Message/External-body; access-type="mail-server"; server="mailserv@ietf.org" Content-Type: text/plain Content-ID: <20010615131442.I-D@ietf.org> ENCODING mime FILE /internet-drafts/draft-ietf-ldapext-ldap-java-api-15.txt --OtherAccess Content-Type: Message/External-body; name="draft-ietf-ldapext-ldap-java-api-15.txt"; site="ftp.ietf.org"; access-type="anon-ftp"; directory="internet-drafts" Content-Type: text/plain Content-ID: <20010615131442.I-D@ietf.org> --OtherAccess-- --NextPart-- From list@netscape.com Mon Jun 18 21:09:27 2001 Received: from netscape.com (r2d2.netscape.com [205.217.237.47]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id VAA25907 for ; Mon, 18 Jun 2001 21:09:26 -0400 (EDT) Received: from aka.mcom.com (aka.mcom.com [205.217.237.180]) by netscape.com (8.10.0/8.10.0) with ESMTP id f5J13hr21159; Mon, 18 Jun 2001 18:03:45 -0700 (PDT) Received: (from list@localhost) by aka.mcom.com (8.10.0/8.10.0) id f5J13hg18724; Mon, 18 Jun 2001 18:03:43 -0700 (PDT) Resent-Date: Mon, 18 Jun 2001 18:03:43 -0700 (PDT) Date: Mon, 18 Jun 2001 21:07:05 -0400 From: <10ypzclw@msn.com> Message-Id: <200106190107.VAA13067@crow.idsk.com> To: ogxlh4z10x1@msn.com Reply-To: kathrynfickle163@excite.com Subject: Do you owe money? [tmky7] Resent-Message-ID: <"xicU9C.A.vjE.sTqL7"@glacier> Resent-From: ietf-ldapext@netscape.com X-Mailing-List: X-Loop: ietf-ldapext@netscape.com Precedence: list Resent-Sender: ietf-ldapext-request@netscape.com Do you owe money? Is it getting troublesome keeping track of all those bills and whom you owe how much and when? Would it not be easier if you could just make 1 monthly payment instead of several? We can help! If your debts are $4,000 US or more and you are a United States citizen, you can consolidate your debt into just one easy payment! You do not have to own a home, nor do you need to take out a loan. Credit checks are not required! To receive more information regarding our services, please fill out the form below and return it to us, or provide the necessary information in your response. There are absolutely no obligations. All the fields below are required for your application to be processed. ********** Full Name : Address : City : State : Zip Code : Home Phone : Work Phone : Best Time to Call : E-Mail Address : Estimated Debt Size : ********** Please allow upto ten business days for application processing. Thank You Note: If this e-mail arrived to you by error, or you wish to never receive such advertisements from our company, please reply to this e-mail with the word REMOVE in the e-mail subject line. We apologize for any inconveniences From list@netscape.com Tue Jun 19 16:17:44 2001 Received: from netscape.com (r2d2.netscape.com [205.217.237.47]) by ietf.org (8.9.1a/8.9.1a) with SMTP id QAA03470 for ; Tue, 19 Jun 2001 16:17:43 -0400 (EDT) Received: from aka.mcom.com (aka.mcom.com [205.217.237.180]) by netscape.com (8.10.0/8.10.0) with ESMTP id f5JKF6r10495; Tue, 19 Jun 2001 13:15:06 -0700 (PDT) Received: (from list@localhost) by aka.mcom.com (8.10.0/8.10.0) id f5JKF6627905; Tue, 19 Jun 2001 13:15:06 -0700 (PDT) Resent-Date: Tue, 19 Jun 2001 13:15:06 -0700 (PDT) Message-Id: <200106192013.f5JKDs309587@ywing.netscape.com> From: mario To: ietf-ldapext@netscape.com Subject: Manuf. Production/Contrl Software For $1,495.00. Date: Wed, 20 Jun 2001 03:32:38 Mime-Version: 1.0 Content-Type: text/plain; charset="DEFAULT_CHARSET" X-Priority: 3 X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook Express 5.00.2919.6700 X-MimeOLE: Produced By Microsoft MimeOLE V5.00.2919.6700 Resent-Message-ID: <"Efmkc.A.pzG.IL7L7"@glacier> Resent-From: ietf-ldapext@netscape.com X-Mailing-List: X-Loop: ietf-ldapext@netscape.com Precedence: list Resent-Sender: ietf-ldapext-request@netscape.com Job Master, a complete, user friendly Windows based software package, can manage and control your operation from sales quote to shipment. For one week only, Job Master, normally $2,495.00, is on sale for a total price of $1,495.00. In order for you to receive this $1,000.00 savings we must have your order by June 22th. Job Master is designed specifically for small to medium sized manufacturers, and costs many thousands of dollars less than any other even remotely comparable software package. Following is a list of features. If you have any questions, would like to discuss the package further, or if you would like to obtain our Web site address for a total walk through of the program, please call me directly at (661)254-9926(please do not E Mail me back. I may not get your message if you simply hit "Reply" and respond to this message via return E Mail). By way of background, we are a software company, which for some years has specialized in the development of custom software, primarily for small to medium sized manufacturers. Job Master is a distillation of over a million and a half dollars of software we have developed to control and manage the production of our manufacturing clients. Job Master contains the following features: 1. QUOTATION MODULE. In this module, quotes are developed, modified, and produced for sending to your client. A history is kept of all quotes for future reference, or modification for other clients. All quotations and revisions are "auto numbered," including versions. The quotes section allows for the entry of parts/processes, and costing of each, including materials, labor, markup, and taxes. Inventory status can be accessed from this section for reference. 2. SALES ORDER. Once a quotation is accepted, the final quotation information can be transformed into a Sales Order for your client's signature on a "point and click" basis. The Sales Order can be modified and re issued if necessary. A history if kept of all Sales Orders for future reference, or modification for other clients. All sales orders and revisions are "auto numbered," including versions. Inventory status can be accessed from this section for reference. 3. CUSTOMER LETTERS can be created from the Quotation and Sales Order sections. 4. SHOP TRAVELER/WORK ORDER. Once a Sales Order is accepted, the sales order information can be transformed into a shop traveler/work order on a "point and click" basis. Each item on the Sales Order becomes a shop traveler/work order, with each step of production of the item then listed on the traveler/work order. Each such traveler/work order is tied back into the Sales Order. The shop traveler/work order allows for the entry of line items, and notes on each line item. The shop traveler/work order contains a "notes" section. The Shop traveler/work order allows for the storing or attachment of drawings to the traveler/work order. The shop traveler/work order also contains a "drop down," from which standard processes can be selected for inclusion on the shop traveler/work order. The shop traveler/work order numbers progress in order of production sequence, and re numbers them if new steps are added. The shop traveler/work order allows for change orders or revisions, a! nd numbers changes in sequence of he original shop traveler/work order number; i.e., 100, 100-1, 100-2, etc. All shop traveler/work orders and related revisions are retained in memory for future reference. The shop traveler/work order is bar coded for tracking of production step by step, and production of ongoing client status reports. Bar coding includes the ability for an employee to "swipe" their own ID bar code for recording in the system as to who upgraded what step. The shop traveler/work order function also allows for manual update of production status. The shop traveler/work order allows for quality control sign off, and the final production of certifications, either from a "canned" list, or hand typed in on a case by case basis. 5. INVENTORY. The application includes an inventory section, which allows operations to check materials inventory in and out. The inventory section allows for the comparison of inventory received against a P.O., and produces an "overage/underage" report of inventory received as compared against the P.O. The inventory section allows for the setting of minimum (re-order now!) and maximum inventory amounts, and produces reports showing what inventory needs to be ordered, as well as inventory that is at or above the maximum set to have in house. The inventory section also tracks "partially shipped" orders, which are tied in to the shipping function. This section shows how much completed product under a particular order has been actually shipped to a client, and how much remains to be shipped. The balance is adjusted as shipments are made. 6. REQUEST FOR PURCHASE. The application allows operators to produce a Request For Purchase for accounting for any inventory items, which need to be ordered. Inventory items have a drop down of approved vendors for each item. 7. REQUEST FOR BID. The application allows operators to produce a Request For Bid for accounting to send to Vendors for any inventory items, which need to be ordered. Inventory items have a drop down of approved vendors for each item to which Requests For Bid can be sent. 8. INVOICE. The application produces an invoice/invoice detail for all completed items ready to be billed/shipped to clients. 9. PRODUCTION OUTPUT STATUS. The application produces a date range selectable report on how much product, and the value of the product, which was completed during a selected date range. The application also produces a report on how many orders, and the value of those orders, which remain to be completed during a selected date range. 10. The application produces SHIPPING DOCUMENTS as per selected shippers, and produces a PACKING SLIP. 11. The application has a "FIND" FUNCTION in selected sections, allowing for searches by customer name, work order number, etc. 12. The application has "AUTO FILL;" i.e., when an operator starts to type in a name, number, etc. all related information auto fills after the first few letters or numbers are typed in. Job Master is currently being sold in the marketplace for $2,495.00 per package. However, if we receive your order by June 22th, your total price will be $1,495.00. Again, if you have any questions at all, or would like to place your order, please call me on my direct line, (661) 254-9926. Thank you! Mario Chavez Application Sales, Inc. ---------------------------------------------------------------------- You have received this newsletter because you signed up for updates on our tracking software. If you want to unsubscribe from this newsletter, please send a reply email with "REMOVE" in the subject line. From list@netscape.com Tue Jun 19 19:54:39 2001 Received: from netscape.com (r2d2.netscape.com [205.217.237.47]) by ietf.org (8.9.1a/8.9.1a) with SMTP id TAA08128 for ; Tue, 19 Jun 2001 19:54:38 -0400 (EDT) Received: from aka.mcom.com (aka.mcom.com [205.217.237.180]) by netscape.com (8.10.0/8.10.0) with ESMTP id f5JNr4r25296; Tue, 19 Jun 2001 16:53:04 -0700 (PDT) Received: (from list@localhost) by aka.mcom.com (8.10.0/8.10.0) id f5JNr4Q24721; Tue, 19 Jun 2001 16:53:04 -0700 (PDT) Resent-Date: Tue, 19 Jun 2001 16:53:04 -0700 (PDT) X-Mailer: ListManager Web Interface Date: Tue, 19 Jun 2001 19:30:26 -0400 Subject: Two things for our subscribers... To: "The Scientific Marketing Ezine" From: webmaster@scientificmarketing.com List-Unsubscribe: Reply-To: webmaster@scientificmarketing.com Message-Id: Resent-Message-ID: <"9CvbJC.A.rBG.dX-L7"@glacier> Resent-From: ietf-ldapext@netscape.com X-Mailing-List: X-Loop: ietf-ldapext@netscape.com Precedence: list Resent-Sender: ietf-ldapext-request@netscape.com Dear Search Engine World Subscriber, I'm writing you for two reasons... 1) I wanted to let you know personally that we've sold our "Search Engine World" ezine, and our www.pegasoweb.com website to the folks at www.scientificmarketing.com effective immediately... These guys are top notch, and have done everything in internet marketing from selling one of their software businesses for $11 million to selling $250,000 diamonds online! Listen (and profit) from what they have to say! 2) I just recently found a VERY special service that I'm sure you'll will be interested in... Take a look at http://searchenginewebpromotion.com/scientif.asp for what I've found... It will greatly help you get more qualifed, targeted traffic to your site, no matter what business you're in. Thanks! Fabio Salvadori CEO -- PegasoWeb P.S. If for some reason you'd like to unsubscribe from "The Scientific Marketing Ezine" at this time, feel free to click the link at the bottom of this email, and you'll be unsubscribed instantly! ******************* Is your site invisible? Dear Webmaster, If you want to increase your sales and profits online, I can summarize the name of the game in 3 simple words: "More Targeted Traffic" And there's one method that consistently out-performs the rest, when it comes to getting sizzling-hot visitors to your website... Top placement in the major search engines. **** For more details visit http://searchenginewebpromotion.com/scientif.asp **** You may think I'm just stating the obvious. If you did, I wouldn't blame you. But the truth is that only a small handful of website owners can rightfully claim that their website can be found at the top of the search engines. Can you? And I'm not just talking about one placement, on one keyword, in just one search engine. I'm talking about rocketing your website to the top of the most popular search engines and directories with your most desirable keywords. That's how you REALLY drench your website with a tidal wave of super-targeted traffic and increase your online sales and profits. And I'm not going to just tease you with attractive "what if" scenarios today. Right now, I'm going to show you exactly how you can ethically push your way through the thick jungle of competition, and get your website found by your best prospects in the best search engines, with your best keywords. So how do you do it? Well, one way is to use optimization software, like Engenius. But as effective as this software can be, most people simply don't have the time, technical savvy, or patience to do it this way. After all, no matter how good the software is, there is no magic wand to getting top search engine placement. It takes long and hard work... tons of patience... and it robs you of precious time that could be spent on other important activities. Have no worries though. There's a much easier way to guarantee yourself elite positions in the major search engines. Visit http://searchenginewebpromotion.com/scientif.asp As the CEO of PegasoWeb and Search Engine World, I know the ins and outs of search engine marketing. I know what works and what doesn't. More importantly, I know many of the top pros in this business. And others who make empty claims just to get your money unfortunately, there are a lot of these chumps out there). These people have an impressive reputation and track record for delivering and maintaining GUARANTEED top-20 rankings for their clients. I'd even put my own reputation on the line to say that they're probably the best in the business. The bottom line is that these guys deliver where others just blow smoke and hype. Their clients range from Fortune 500 caliber companies (like American Express Travel and Verio Web Hosting) to small and medium sized business seeking increased exposure and profitability. Plus, they have an incredibly *air-tight guarantee*. Your website will get (and keep) multiple Top-20 rankings in the major search engines or your money back. No questions. No excuses. No B.S. And their guarantee is only half of it. They provide the utmost in service, value, and customer care. You'll be assigned a chief search engine consultant who you can speak with over the phone. And if you have questions, you'll get answers fast. I believe integrity means everything. And I can assure you that you'll find it at http://searchenginewebpromotion.com/scientif.asp Check it out, you'll discover the 4 facts you must know to squeeze the most profit from top search engine placement. Sincerely, Fabio Salvadori CEO -- PegasoWeb P.S. Don't leave profits on the table - just for your competitors to snatch up for themselves. Find out how you can take back your lost profits by visiting http://searchenginewebpromotion.com/scientif.asp ============================================= "The Scientific Marketing Ezine" Please help us out and forward this ezine, along with a personal note, to 7 of your closest business associates. (Every subscriber that does will get a special $29 gift for *free*!) When you qualify for the gift, drop me an email me at: mailto:gift@scientificmarketing.com ============================================= The email I have for you is: ietf-ldapext@netscape.com To edit or correct this information, please go to the following URL: http://www.dundee.net/scientificmarketing/ and click on "How to Make Changes", on the screen that follows, then enter your email address (leave the password blank). Interested in advertising in this ezine? (Our current circulation is over 258,000!) Go to: http://www.scientificmarketing.com/ezine The Scientific Marketing Ezine (C) 2000 Kirt Christensen & Scientific Marketing http://www.scientificmarketing.com ============================================= To subscribe send a blank email to: mailto:subscribe@scientificmarketing.com To unsubscribe, click on the link below and send ANY blank email from ANY email address to: mailto:leave-scientificmarketing-13162130Y@lyris.dundee.net ============================================= From list@netscape.com Wed Jun 20 00:02:07 2001 Received: from netscape.com (r2d2.netscape.com [205.217.237.47]) by ietf.org (8.9.1a/8.9.1a) with SMTP id AAA13955 for ; Wed, 20 Jun 2001 00:02:06 -0400 (EDT) Received: from aka.mcom.com (aka.mcom.com [205.217.237.180]) by netscape.com (8.10.0/8.10.0) with ESMTP id f5K40Yr21565; Tue, 19 Jun 2001 21:00:35 -0700 (PDT) Received: (from list@localhost) by aka.mcom.com (8.10.0/8.10.0) id f5K40Zc20056; Tue, 19 Jun 2001 21:00:35 -0700 (PDT) Resent-Date: Tue, 19 Jun 2001 21:00:35 -0700 (PDT) DATE: 20 Jun 01 11:26:32 AM FROM: GFYtMN35b@excite.com Message-ID: <5MiAz5rO7Je12U8K5> TO: yourboxc@now.co.uj.netscape.com SUBJECT: here .. WOW> Criminal search Background check! Resent-Message-ID: <"Bc_ug.A.j4E.h_BM7"@glacier> Resent-From: ietf-ldapext@netscape.com X-Mailing-List: X-Loop: ietf-ldapext@netscape.com Precedence: list Resent-Sender: ietf-ldapext-request@netscape.com READY TO KNOW? CONFIDENTIAL! The KIT They Want BANNED In all 50 STATES. Why? Because these secrets were never intended to reach your eyes... Get the facts on anyone! Locate Missing Persons, find Lost Relatives, obtain Addresses and Phone Numbers of old school friends, even Skip Trace Dead Beat Spouses. This is not a Private Investigator, but a sophisticated KIT DESIGNED to automatically CRACK YOUR CASE with links to thousands of Public Record databases. Find out SECRETS about your relatives, friends, enemies, and everyone else! Even your spouse! With the New, INTERNET SPY KIT AND YOU! It's absolutely astounding! Here's what you can learn. License plate number! Get anyone's name and address with just a license plate number! (Find that Person you met in traffic!) Driving record! Get anyone's driving record! Social security number! Trace anyone by social security number! Address! Get anyone's address with just a name! Unlisted phone numbers! Get anyone's phone number with just a name even unlisted numbers! Locate! Long lost friends, relatives, a past lover who broke your heart! E-mail! Send anonymous e-mail completely untraceable! Dirty secrets! Discover dirty secrets your in-laws don't want you to know! Investigate anyone! Use the sources that private investigators use (all on the Internet) Secretly! Ex-spouse! Learn how to get information on an ex-spouse that will help you win in court! (Dig up old skeletons)! Criminal search Background check! Find out about your daughter's boyfriend! Find out! If you are being investigated! Neighbors! Learn all about your mysterious neighbors! Find out what they have to hide! People you work with! Be astonished by what you'll learn about people you work with! Education verification! Did he really graduate college? Find out! Internet Spy and You! THIS KIT will help you discover ANYTHING about anyone, with Click-able hyperlinks and no typing in internet addresses! Just Open the page and Go! You will be shocked and amazed by the secrets that can be discovered about absolutely everyone! Find out the secrets they don't want you to know! About others, about yourself! It's INCREDIBLE what you can find out using Internet Spy Kit! You'll be riveted to your computer screen! Get the KIT they're trying to ban! Before it's too late! LIMITED TIME OFFER ORDER TODAY! Only $25.00 We will RUSH YOU our Internet Spy Kit and You can begin discovering all the secrets you ever wanted to know! You can Know EVERYTHING about ANYONE with our Internet Spy and Your Software. Works with all browsers and all versions of AOL! ORDER TODAY. DON'T WAIT TO GET STARTED...It's fast and easy CREDIT CARD ORDERS ONLY Call, Mail or Fax your order in today! Phone Orders Call: 1-480-990-4463 ASK FOR EXT. 44 Mail To: CyberCO 8190 W Deer Vally Road Suite 104-265 Peoria, Az 85382 Fax Orders To: 1-413-235-6585 Name: ________________________________________ Address: ________________________________________ City/State/Zip: ______________________________________ Email Address to Ship Orders to: _____________________________________ FOR CREDIT CARD ORDERS ONLY! Account Number: ____________________________________ Exp. Date: ________________________ DISCLAIMER: The seller of this powerful resource kit will not be held responsible for how the purchaser chooses to use it's resources. Thank you ****************Remove Instructions******************** ******************************************************** To be removed from future mailings!!!! All REMOVE requests AUTOMATICALLY honored upon receipt. mailto:nogoz1@excite.com?subject=REMOVESPY PLEASE understand that any effort to disrupt, close or block this REMOVE account can only result in difficulties for others wanting to be removed from our mailing list as it will be impossible to take anyone off the list if the remove instruction is not received. ******************************************************* From list@netscape.com Wed Jun 20 08:50:34 2001 Received: from netscape.com (r2d2.netscape.com [205.217.237.47]) by ietf.org (8.9.1a/8.9.1a) with SMTP id IAA05176 for ; Wed, 20 Jun 2001 08:50:33 -0400 (EDT) Received: from aka.mcom.com (aka.mcom.com [205.217.237.180]) by netscape.com (8.10.0/8.10.0) with ESMTP id f5KCmxr29194; Wed, 20 Jun 2001 05:49:00 -0700 (PDT) Received: (from list@localhost) by aka.mcom.com (8.10.0/8.10.0) id f5KCmxU26653; Wed, 20 Jun 2001 05:48:59 -0700 (PDT) Resent-Date: Wed, 20 Jun 2001 05:48:59 -0700 (PDT) Date: Wed, 20 Jun 2001 05:47:44 -0700 (PDT) Message-Id: <200106201247.f5KCliS19734@ywing.netscape.com> From: 1tkqbskh10@msn.com To: 4mtt8rgo@msn.com Reply-To: wesbarrow2592@excite.com Subject: Do you have tax problems? [74k5o] Resent-Message-ID: <"scJ-8B.A.jeG.4uJM7"@glacier> Resent-From: ietf-ldapext@netscape.com X-Mailing-List: X-Loop: ietf-ldapext@netscape.com Precedence: list Resent-Sender: ietf-ldapext-request@netscape.com Have tax problems? Do you owe the IRS money? If your debt is $10,000 US or more, we can help! Our licensed agents can help you with both past and present tax debt. We have direct contacts with the IRS, so once your application is processed we can help you immediately without further delay. Also, as our client we can offer you other services and help with other problems such as: - Tax Preparation - Audits - Seizures - Bank Levies - Asset Protection - Audit Reconsideration - Trust Fund Penalty Defense - Penalty Appeals - Penalty Abatement - Wage Garnishments .. and more! To receive FREE information on tax help, please fill out the form below and return it to us. There are no obligations, and supplied information is kept strictly confidential. Please note that this offer only applies to US citizens. Application processing may take up to 10 business days. ********** Full Name: State: Phone Number: Time to Call: Estimated Tax Debt Size: ********** Thank you for your time. Note: If you wish to receive no further advertisements regarding this matter or any other, please reply to this e-mail with the word REMOVE in the subject. From list@netscape.com Wed Jun 20 12:29:14 2001 Received: from netscape.com (c3po.netscape.com [205.217.237.46]) by ietf.org (8.9.1a/8.9.1a) with SMTP id MAA12871 for ; Wed, 20 Jun 2001 12:29:13 -0400 (EDT) Received: from aka.mcom.com (aka.mcom.com [205.217.237.180]) by netscape.com (8.10.0/8.10.0) with ESMTP id f5KGRdY00672; Wed, 20 Jun 2001 09:27:39 -0700 (PDT) Received: (from list@localhost) by aka.mcom.com (8.10.0/8.10.0) id f5KGRcQ08487; Wed, 20 Jun 2001 09:27:38 -0700 (PDT) Resent-Date: Wed, 20 Jun 2001 09:27:38 -0700 (PDT) Subject: Re: LDAP Result Codes To: "Kurt D. Zeilenga" Cc: Bruce Greenblatt , ietf-ldapext@netscape.com X-Mailer: Lotus Notes Release 5.0.5 September 22, 2000 Message-ID: From: "Karen Gdaniec" Date: Wed, 20 Jun 2001 12:29:16 -0400 X-MIMETrack: Serialize by Router on D01MLC96/01/M/IBM(Build V508_05242001.dev00 SPR #MIAS4UTJ8H |June 1, 2001) at 06/20/2001 12:26:25 PM MIME-Version: 1.0 Content-type: text/plain; charset=us-ascii Resent-Message-ID: <"VkITYD.A.S_B.u7MM7"@glacier> Resent-From: ietf-ldapext@netscape.com X-Mailing-List: X-Loop: ietf-ldapext@netscape.com Precedence: list Resent-Sender: ietf-ldapext-request@netscape.com All, So, at this point I've received two conflicting comments on the use of LDAP_OPERATIONS_ERROR. We and other server developers need some concensus here. Help! Thanks. Karen Internet: kgdaniec@us.ibm.com Internal: Karen Gdaniec/Endicott/IBM@IBMUS or IBMUSM10(KGDANIEC) phone: 607.752.1075 tie-line: 8/852-1075 fax: 607.752.3681 From list@netscape.com Wed Jun 20 13:32:00 2001 Received: from netscape.com (r2d2.netscape.com [205.217.237.47]) by ietf.org (8.9.1a/8.9.1a) with SMTP id NAA15266 for ; Wed, 20 Jun 2001 13:31:59 -0400 (EDT) Received: from aka.mcom.com (aka.mcom.com [205.217.237.180]) by netscape.com (8.10.0/8.10.0) with ESMTP id f5KHUYr12238; Wed, 20 Jun 2001 10:30:35 -0700 (PDT) Received: (from list@localhost) by aka.mcom.com (8.10.0/8.10.0) id f5KHUYw14848; Wed, 20 Jun 2001 10:30:34 -0700 (PDT) Resent-Date: Wed, 20 Jun 2001 10:30:34 -0700 (PDT) Date: Wed, 20 Jun 2001 10:30:48 -0700 (PDT) Message-Id: <200106201730.f5KHUmh12881@xwing.aoltw.net> From: job.dept@FQPW.iwav.net.relaxu2@bigfoot.com.razor9@blacknetplanet.com.netscape.com To: $Name.BCLL@netscape.com Subject: UMS -OGWW X-Reply-To: earnings4u@prontomail.com Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: 7bit Resent-Message-ID: <"AwptBC.A.EnD.32NM7"@glacier> Resent-From: ietf-ldapext@netscape.com X-Mailing-List: X-Loop: ietf-ldapext@netscape.com Precedence: list Resent-Sender: ietf-ldapext-request@netscape.com Content-Transfer-Encoding: 7bit Subject: Confirmation Required You, or someone using your email address, requested information regarding the best method of promoting your business on the internet. We are prepared to send our current best promotional tools to you free as promised, but first we need to verify your email address, to be sure that we have your permission to do so. Simply click reply to this email to verify, or follow the instructions below. You are not currently subscribed on any list. This is a one time emailing to ask you to verify your email address. ************************************************** ********* Either return this email or go to my website addresses below: http://reports.emarketplacedirect.com/Free.jsp/pag es/1635916.html http://www.iwav.net/office/jobs/soho.shtml and complete your verification to our massive free website promotional services. There is no cost associated with these services. They are free. Sincerely, Earnings4u@lycos.com mailto:Earnings4u@lycos.com?Subject=Confirmed ************************************************** ********* We are attempting to verify your email address. This message is only a request to verify. It is not in any way to be construed as a commercial message. If you do not wish to receive any mail from our servers, simply do not reply to this email nor click on any links. Thank you, jobs.dept@iwav.net ************************************************** ********* If you have any questions, you can email to me at mailto:lewis3@uswest.net?subject=UMS or that mailbox is ever full, then mailto:jobs@iwav.net?subject=UMS and I will personally reply to you, as long as you put UMS in the subject line. Sincerely, Don Lewis http://jobs.iwav.net 369 E 900 South #305 Salt Lake City, UT 84111 USA Phone (801) 466-4264 or (801) 347-3798 Want to see how others are doing with this? Visit: http://reports.emarketplacedirect.com/proof.jsp/pa ges/1635916.html If you ever wish to remove your name from receiving these emails from your UMS Cash Club upline, simply click the box located under "preferred email type" at the "change preferences tab" (edit personal info section) in the members only section of your Ultimate Marketing Solution CASH CLUB site. --------------------Headers -------------------- From list@netscape.com Wed Jun 20 15:05:25 2001 Received: from netscape.com (r2d2.netscape.com [205.217.237.47]) by ietf.org (8.9.1a/8.9.1a) with SMTP id PAA18512 for ; Wed, 20 Jun 2001 15:05:24 -0400 (EDT) Received: from aka.mcom.com (aka.mcom.com [205.217.237.180]) by netscape.com (8.10.0/8.10.0) with ESMTP id f5KJ36r04100; Wed, 20 Jun 2001 12:03:07 -0700 (PDT) Received: (from list@localhost) by aka.mcom.com (8.10.0/8.10.0) id f5KJ37c17518; Wed, 20 Jun 2001 12:03:07 -0700 (PDT) Resent-Date: Wed, 20 Jun 2001 12:03:07 -0700 (PDT) Message-Id: <5.1.0.14.1.20010620195609.00a5aae0@mailhome.rdg.opengroup.org> X-Sender: cjh@mailhome.rdg.opengroup.org X-Mailer: QUALCOMM Windows Eudora Version 5.1 Date: Wed, 20 Jun 2001 19:57:55 +0100 To: ietf-ldapext@netscape.com From: Chris Harding Subject: Calling LDAP Application Developers Mime-Version: 1.0 Content-Type: multipart/alternative; boundary="=====================_126381195==_.ALT" Resent-Message-ID: <"VR934C.A.ZQE.nNPM7"@glacier> Resent-From: ietf-ldapext@netscape.com X-Mailing-List: X-Loop: ietf-ldapext@netscape.com Precedence: list Resent-Sender: ietf-ldapext-request@netscape.com --=====================_126381195==_.ALT Content-Type: text/plain; charset="us-ascii"; format=flowed Hi - (Apologies if you are also on the Umich ldap list, in which case you'll have seen this already.) How many servers have you tested against? Are you confidant that your product will work with all standard servers? Save yourself TIME, EFFORT and MONEY by participating in the LDAP Plugfest in San Jose, CA, July 11-13, 2001. The servers you want to test against will be there, ready and set up for you to test your application! You will also have access to representatives of the server vendors, to help you work through any issues that may come up. Make plans to join us July 11th thru 13th in San Jose and participate in the LDAP Plugfest. The LDAP Plugfest will be enable Developers with LDAP applications to validate the interoperability of their applications against Critical Path, IBM, iPlanet, Novell, Oracle and other LDAP Directory servers. Each developer will have access to a variety of LDAP Directory products and personnel together in one location. It will be an environment for testing product interoperability with significantly less overhead and preparation than would have to take place for each application individually. LDAP applications participating in the Plugfest and completing an interoperability test will obtain the "Works with LDAP 2000" certification. Approved applications will be recognized as ones that conform to the open standards and is useable in a number of environments. This event is organized by the Open Group Directory Interoperability Forum and hosted by Novell, a member of the DIF, at their San Jose Silicon Valley Conference Center. For certification details see http://www.wwldap.org/. To register and for the latest Plugfest details, see http://www.opengroup.org/dif/dc8/plugfest.htm . There will be a $495 charge for each application being tested. The fee is the certification charge if the application is certified by the end of the week. Space is limited and will be provided on a first come, first serve basis, so register soon! Regards, Chris +++++ ======================================================================== Dr. Christopher J. Harding T H E Executive Director for the Directory Interoperability Forum O P E N Apex Plaza, Forbury Road, Reading RG1 1AX, UK G R O U P Mailto:c.harding@opengroup.org Phone: +44 118 950 8311 x2262 WWW: http://www.opengroup.org Mobile: +44 774 063 1520 ======================================================================== The Open Group Conference Austin Tx 16-20 July 2001 - MANAGEABILITY 2001 - Competitive Advantage thru multi-vendor solutions EMA 2001 - Solutions Summit http://www.opengroup.org/austin2001 ======================================================================== --=====================_126381195==_.ALT Content-Type: text/html; charset="us-ascii" Hi -

(Apologies if you are also on the Umich ldap list, in which case you'll have seen this already.)

How many servers have you tested against?

Are you confidant that your product will work with all standard servers?

Save yourself TIME, EFFORT and MONEY by participating in the LDAP Plugfest in San Jose, CA, July 11-13, 2001.  The servers you want to test against will be there, ready and set up for you to test your application!  You will also have access to representatives of the server vendors, to help you work through any issues that may come up.

Make plans to join us July 11th thru 13th in San Jose and participate in the LDAP Plugfest.  The LDAP Plugfest will be enable Developers with LDAP applications to validate the interoperability of their applications against Critical Path, IBM, iPlanet, Novell, Oracle and other LDAP Directory servers. Each developer will have access to a variety of LDAP Directory products and personnel together in one location. It will be an environment for testing product interoperability with significantly less overhead and preparation than would have to take place for each application individually.

LDAP applications participating in the Plugfest and completing an interoperability test will obtain the "Works with LDAP 2000" certification.  Approved applications will be recognized as ones that conform to the open standards and is useable in a number of environments.

This event is organized by the Open Group Directory Interoperability Forum and hosted by Novell, a member of the DIF, at their San Jose Silicon Valley Conference Center.  For certification details see
http://www.wwldap.org/. To register and for the latest Plugfest details, see  http://www.opengroup.org/dif/dc8/plugfest.htm . There will be a $495 charge for each application being tested.  The fee is the certification charge if the application is certified by the end of the week.  Space is limited and will be provided on a first come, first serve basis, so register soon!


Regards,

Chris
+++++

========================================================================
           Dr. Christopher J. Harding
  T H E    Executive Director for the Directory Interoperability Forum
 O P E N   Apex Plaza, Forbury Road, Reading RG1 1AX, UK
G R O U P  Mailto:c.harding@opengroup.org Phone:  +44 118 950 8311 x2262
           WWW: http://www.opengroup.org Mobile: +44 774 063 1520
========================================================================
The Open Group Conference Austin Tx 16-20 July 2001 -
MANAGEABILITY 2001 - Competitive Advantage thru multi-vendor solutions
EMA 2001 - Solutions Summit
http://www.opengroup.org/austin2001
========================================================================
--=====================_126381195==_.ALT-- From list@netscape.com Thu Jun 21 00:24:52 2001 Received: from netscape.com (c3po.netscape.com [205.217.237.46]) by ietf.org (8.9.1a/8.9.1a) with SMTP id AAA03817 for ; Thu, 21 Jun 2001 00:24:51 -0400 (EDT) Received: from aka.mcom.com (aka.mcom.com [205.217.237.180]) by netscape.com (8.10.0/8.10.0) with ESMTP id f5L4NdY00290; Wed, 20 Jun 2001 21:23:39 -0700 (PDT) Received: (from list@localhost) by aka.mcom.com (8.10.0/8.10.0) id f5L4NfM16169; Wed, 20 Jun 2001 21:23:41 -0700 (PDT) Resent-Date: Wed, 20 Jun 2001 21:23:41 -0700 (PDT) CC: jonkatkim@netscape.com, tmmygrl199@netscape.com, pturner507@netscape.com, roselawfrm@netscape.com, oceanboy23@netscape.com, oceanboy32@netscape.com, roselawn@netscape.com, roselaya@netscape.com, yeaka@netscape.com, hmil84@netscape.com, ietf-ldapext-request@netscape.com, ietf-ldapext@netscape.com, humorchannel@netscape.com, husjon@netscape.com, hyama@netscape.com Date: Thu, 21 Jun 2001 00:27:32 -0500 Subject: I WAS SICK OF BEING FAT!! Reply-To: mack3176@ematic.com Content-Type: text/html; charset="iso-8859-1" Content-Transfer-Encoding: 8BIT To: estod@netscape.com From: mikeee15@icytundra.com Message-Id: <6vmx0b2.ampk4f502iebbcr6kx5@mail2.icytundra.com> X-Mailer: Microsoft Outlook Express 5.50.4133.2400 Resent-Message-ID: <"TjwOdD.A.F8D.LbXM7"@glacier> Resent-From: ietf-ldapext@netscape.com X-Mailing-List: X-Loop: ietf-ldapext@netscape.com Precedence: list Resent-Sender: ietf-ldapext-request@netscape.com Content-Transfer-Encoding: 8BIT

I sincerely apologize if you are receiving this e-mail in error.

I have been taking an herbal formula for 10 months and it has saved my family
and my life. Because of this I have made a commitment to get the word out on
this life-changing product, so that it will be available to everyone.

My name is Dana Hampton. I'm a married 37-year-old mother of 4 who was a
happy size 7 before my first child and who grew 4 dress sizes larger by my
fourth pregnancy.
It's amazing how long you can avoid dealing with a problem that you simply
don't want to face up to.
I didn't like the way I looked and I didn't like the way I felt. I was at the
point where I just didn't want to live and have to face another day.
I WAS SICK OF BEING FAT!
I FELT THAT I OWED IT TO MY HUSBAND, MY FOUR CHILDREN, AND MYSELF TO MAKE ONE
MORE ATTEMPT AT WEIGHT LOSS.

I have researched and tried many weight loss programs during my " yo-yo
dieting" years. I did Slim Fast, Cybervision, Atkins, soup diets, starvation,
"exercise and eat no fat," chromium picolinate, metabolic enhancers, and
more. You name it, I tried it!
I lost some pounds with every diet, but eventually gained them back, usually
with a few extra pounds. On every one of those diets, I lost energy, and
eventually had to eat a lot to feel better. I was grouchy with a short fuse.
This even happened during the diet where I exercised and ate less with only
low-fat foods, the better-known "right way" to lose weight. I'm sure losing
weight that way works OK for many people, but it just didn't work very well
for me.
It seemed my metabolism froze, and I was going to stay at that weight
forever, but I wanted to look better and be healthy. I was very depressed and
disappointed. I dieted on and off, but got nowhere. The weight kept
returning.
I suddenly realized just how difficult this weight problem had really become.
Now I understood why so many people have the same problem.

I almost gave up. Then, I remembered something I heard from old my friend
Janie. She told me about a company who makes a nutritionally-engineered
weight loss product, which
ACCELERATES WEIGHT LOSS. It was developed by
European Scientists and had been kept a secret for years, UNTIL NOW.
Scientists from an American Nutriceutical company met up with their top
scientist and brought the secret here. It is a unique product, called
BerryTrim Plus, and

NO OTHER PRODUCT HAS THESE INGREDIENTS.

It sounded too good to be true. I didn't want to get all hyped up about some
new program, and I didn't want to add one more diet to my failure list.
What really made me decide to try it were all the testimonials I read on
their web site, written by so many Doctors, Celebrities, and people like you
and me.

I called for my 30-day supply and was so amazed when only after the first 3
days, I began to experience a sense of "well being" - something I hadn't felt
for months, maybe years. I felt ENERGIZED, not to mention my sugar/chocolate
cravings were absolutely gone!

I COULD NOT BELIEVE THE DIFFERENCE I FELT!

I began to hope again - maybe I could lose this old weight. I gave this
pursuit up months before and had boxed up my smallest clothes to give away!
After 5 weeks of BerryTrim Plus I had already lost 10 inches off my hips and
thighs and,

OH JOY! I FINALLY SEE MY WAIST LINE!

Not to mention,

THE SCALE WAS ACTUALLY SPINNING BACKWARDS AND SHOWING A

TREMENDOUS WEIGHT LOSS!

THE BEST PART IS, I DIDN'T CHANGE ANYTHING ABOUT THE WAY I ATE, WHAT I ATE,
OR ADD AN EXERCISE ROUTINE TO MY DAILY REGIMEN. ALL I DID WAS USE THE
PRODUCT, AND THE WEIGHT SIMPLY CAME OFF…
EASILY AND SAFELY! THAT'S IT.


Well, now today I'm 4 dress sizes & 7 jean sizes smaller + 26½ inches are
gone!
I FEEL ABSOLUTELY WONDERFUL!
I really wish I could show you how I looked 10 months ago compared to how I
look now. The differences are unbelievable. I recently traveled and when I
had to show a picture I.D. at the airport for security reasons, the airline
agent asked for "another" form of picture I.D. because my driver's license
picture doesn't look like me anymore!

It's kind of embarrassing receiving all of the compliments about how " great I
look" now. It's even more embarrassing to mention it. But they keep coming.
The greatest compliment I got was from my husband, Recently, he told me,
"Olivia, you really look great, you look like the young girl I kissed at our
wedding." I said, "WHAT?" He told me that I "looked younger". He said my face
looked especially younger, "you look like the real you!"
It was true, just like everything I had read about the product. It all came
true!
That was a first for any weight loss program I had ever tried.
The changes that took place were both subtle and obvious. Here are some of
them:
MY ATTITUDE IMPROVED
I HAVE LESS TENSION AND ANXIETY
RELATIONSHIPS WITH MY FAMILY IMPROVED
QUALITY OF MY SLEEP IMPROVED
I NOW SLEEP THROUGH THE ENTIRE NIGHT
I HAVE GREATER ENERGY
COMPULSIVE EATING DECREASED
CRAVINGS FOR SWEETS DECREASED
I HAVE LESS FREQUENT HOT FLASHES
NO LONGER DRINK CAFFEINE THROUGHOUT THE DAY
NO LONGER SLEEP FOR HOURS IN THE AFTERNOONS
NO LONGER EXPERIENCE DISCOMFORT WITH MOVEMENT.

I feel better now than I've felt in years. Thanks to BerryTrim Plus and
Janie, who introduced me to it.
I invite you to try it for 30-days. I promise you'll be calling for more soon
after!"
Look, if you want to try out this product, it can change your life. If you
don't want to, that's OK too. At least find some way to lose weight that
works for you. Your life will change after you lose the weight. Many people
won't try it because they won't believe it. Unfortunately, with all the
marketing and scams out there, we all have to be skeptical. If I tried to
hand out fifty dollar bills on a city sidewalk, most people would not take it
because they would think it was some kind of trick. This is not a trick. It
worked for me.
Whether you need to take off five pounds or five hundred, this will help you
do it in a healthy way. The company has a 60-day money-back guarantee, and I
called to check on that. They get practically no returns and 92% re-orders.
That says it all if you ask me. You order directly from the company and use a
credit card. Their link is at the end of this story. , Click through this
website thoroughly and marvel over what this amazing product has done for so
many people like you and me!

I can assure you that I would not publicly put my credibility on the line
unless everything I have told you here was 100% true. So, do take a look at
the many success stories from others who have gained better health, improved
their relationships, and of course, lost weight and are keeping it off for
good. The testimonials speak for themselves. And if you decide this is
something you are willing to try - GO FOR IT!!!!! You won't be sorry. Do take
the time to read them. Many are more AMAZING than my own!

Click here to read many of the success stories.

CLICK HERE

Thank you for your patience and interest.
God Bless,
Dana Hampton


This message is brought to you by BerryTrim Affiliate# 3b2eaac90544da44
To be removed reply with REMOVE in the subject line.

From list@netscape.com Thu Jun 21 07:46:13 2001 Received: from netscape.com (r2d2.netscape.com [205.217.237.47]) by ietf.org (8.9.1a/8.9.1a) with SMTP id HAA23967 for ; Thu, 21 Jun 2001 07:46:12 -0400 (EDT) Received: from aka.mcom.com (aka.mcom.com [205.217.237.180]) by netscape.com (8.10.0/8.10.0) with ESMTP id f5LBfQr27118; Thu, 21 Jun 2001 04:41:26 -0700 (PDT) Received: (from list@localhost) by aka.mcom.com (8.10.0/8.10.0) id f5LBfRs03546; Thu, 21 Jun 2001 04:41:27 -0700 (PDT) Resent-Date: Thu, 21 Jun 2001 04:41:27 -0700 (PDT) X400-Received: by mta BAWMTA in /c=gb/admd=attmail/prmd=ba/; Relayed; 21 Jun 2001 11:41:20 Z X400-Received: by /c=gb/admd=attmail/prmd=ba/; Relayed; 21 Jun 2001 11:41:20 Z X400-MTS-Identifier: [/c=gb/admd=attmail/prmd=ba/; 019843B31DD60017-BAWMTA] Content-Identifier: 019843B31DD60017 Content-Return: Allowed X400-Content-Type: P2-1988 ( 22 ) Conversion: Allowed Original-Encoded-Information-Types: IA5-Text Priority: normal Disclose-Recipients: Prohibited Alternate-Recipient: Allowed X400-Originator: Dominic.J.Steinitz@BritishAirways.com X400-Recipients: non-disclosure; Message-Id: <"019843B31DD60017*/c=GB/admd=ATTMAIL/prmd=BA/o=British Airways PLC/ou=CORPLN1/s=Steinitz/g=Dominic/i=J/"@MHS> Date: 21 Jun 2001 11:41:20 Z From: "Steinitz, Dominic J" To: ietf-ldapext Subject: BER and Attribute Syntax Resent-Message-ID: <"zeiMgC.A.C3.m1dM7"@glacier> Resent-From: ietf-ldapext@netscape.com X-Mailing-List: X-Loop: ietf-ldapext@netscape.com Precedence: list Resent-Sender: ietf-ldapext-request@netscape.com I hope this is the right mailing list for asking these sort of questions. If not can someone please direct me to the correct one. According to BER, the decimal number 1321should be encoded as Universal Primitive 2 1321= [2,2,5,41] but according to the attribute syntax definitions RFC2252 6.16, INTEGER attributes are encoded as a string of the decimal representation. So to encode an ASN.1 INTEGER we should use BER but to encode an INTEGER attribute we should produce an OctetString of the decimal value. Is this correct? Dominic. ------------------------------------------------------------------------------------------------- 21st century air travel http://www.britishairways.com ------------------------------------------------------------------------------------------------- 21st century air travel http://www.britishairways.com From list@netscape.com Thu Jun 21 08:38:38 2001 Received: from netscape.com (c3po.netscape.com [205.217.237.46]) by ietf.org (8.9.1a/8.9.1a) with SMTP id IAA25794 for ; Thu, 21 Jun 2001 08:38:37 -0400 (EDT) Received: from aka.mcom.com (aka.mcom.com [205.217.237.180]) by netscape.com (8.10.0/8.10.0) with ESMTP id f5LCb0Y14283; Thu, 21 Jun 2001 05:37:00 -0700 (PDT) Received: (from list@localhost) by aka.mcom.com (8.10.0/8.10.0) id f5LCb0M15807; Thu, 21 Jun 2001 05:37:00 -0700 (PDT) Resent-Date: Thu, 21 Jun 2001 05:37:00 -0700 (PDT) To: "Steinitz, Dominic J" Cc: ietf-ldapext Subject: Re: BER and Attribute Syntax X-Mailer: Lotus Notes Release 5.0.5 September 22, 2000 From: "Timothy Hahn" Message-ID: Date: Thu, 21 Jun 2001 08:36:27 -0400 X-MIMETrack: Serialize by Router on D01MLC96/01/M/IBM(Build V508_05242001.dev00 SPR #MIAS4UTJ8H |June 1, 2001) at 06/21/2001 08:36:29 AM, Serialize complete at 06/21/2001 08:36:29 AM MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="=_alternative 0044AEC485256A72_=" Resent-Message-ID: <"_nDukB.A.n2D.qpeM7"@glacier> Resent-From: ietf-ldapext@netscape.com X-Mailing-List: X-Loop: ietf-ldapext@netscape.com Precedence: list Resent-Sender: ietf-ldapext-request@netscape.com This is a multipart message in MIME format. --=_alternative 0044AEC485256A72_= Content-Type: text/plain; charset="us-ascii" Dominic, You have it. Section 4.1.6 of RFC 2251 clarifies the encoding of attribute values when transfered over the LDAP protocol. Regads, Tim Hahn Internet: hahnt@us.ibm.com Internal: Timothy Hahn/Endicott/IBM@IBMUS or IBMUSM00(HAHNT) phone: 607.752.6388 tie-line: 8/852.6388 fax: 607.752.3681 "Steinitz, Dominic J" 06/21/2001 11:41 AM To: ietf-ldapext cc: Subject: BER and Attribute Syntax I hope this is the right mailing list for asking these sort of questions. If not can someone please direct me to the correct one. According to BER, the decimal number 1321should be encoded as Universal Primitive 2 1321= [2,2,5,41] but according to the attribute syntax definitions RFC2252 6.16, INTEGER attributes are encoded as a string of the decimal representation. So to encode an ASN.1 INTEGER we should use BER but to encode an INTEGER attribute we should produce an OctetString of the decimal value. Is this correct? Dominic. ------------------------------------------------------------------------------------------------- 21st century air travel http://www.britishairways.com ------------------------------------------------------------------------------------------------- 21st century air travel http://www.britishairways.com --=_alternative 0044AEC485256A72_= Content-Type: text/html; charset="us-ascii"
Dominic,

You have it.  Section 4.1.6 of RFC 2251 clarifies the encoding of attribute values when transfered over the LDAP protocol.

Regads,
Tim Hahn

Internet: hahnt@us.ibm.com
Internal: Timothy Hahn/Endicott/IBM@IBMUS or IBMUSM00(HAHNT)
phone: 607.752.6388     tie-line: 8/852.6388
fax: 607.752.3681



"Steinitz, Dominic J" <Dominic.J.Steinitz@BritishAirways.com>

06/21/2001 11:41 AM

       
        To:        ietf-ldapext <ietf-ldapext@netscape.com>
        cc:        
        Subject:        BER and Attribute Syntax

       


I hope this is the right mailing list for asking these sort of questions. If not can someone please direct me to the correct one.

According to BER, the decimal number 1321should be encoded as Universal Primitive 2 1321= [2,2,5,41] but according to the attribute syntax definitions RFC2252 6.16, INTEGER attributes are encoded as a string of the decimal representation. So to encode an ASN.1 INTEGER we should use BER but to encode an INTEGER attribute we should produce an OctetString of the decimal value. Is this correct?

Dominic.

-------------------------------------------------------------------------------------------------
21st century air travel     http://www.britishairways.com

-------------------------------------------------------------------------------------------------
21st century air travel     http://www.britishairways.com



--=_alternative 0044AEC485256A72_=-- From list@netscape.com Thu Jun 21 09:37:29 2001 Received: from netscape.com (c3po.netscape.com [205.217.237.46]) by ietf.org (8.9.1a/8.9.1a) with SMTP id JAA28344 for ; Thu, 21 Jun 2001 09:37:28 -0400 (EDT) Received: from aka.mcom.com (aka.mcom.com [205.217.237.180]) by netscape.com (8.10.0/8.10.0) with ESMTP id f5LDa5Y19818; Thu, 21 Jun 2001 06:36:06 -0700 (PDT) Received: (from list@localhost) by aka.mcom.com (8.10.0/8.10.0) id f5LDa5I02843; Thu, 21 Jun 2001 06:36:05 -0700 (PDT) Resent-Date: Thu, 21 Jun 2001 06:36:05 -0700 (PDT) Message-Id: <200106211334.f5LDYqd24047@ywing.netscape.com> From: "Computer Connection" To: Subject: Computer Discount Catalog Sender: "Computer Connection" Mime-Version: 1.0 Content-Type: text/html; charset="ISO-8859-1" Date: Thu, 21 Jun 2001 09:34:05 -0400 Reply-To: "Computer Connection" Content-Transfer-Encoding: 8bit Resent-Message-ID: <"hrmdl.A.Bs.EhfM7"@glacier> Resent-From: ietf-ldapext@netscape.com X-Mailing-List: X-Loop: ietf-ldapext@netscape.com Precedence: list Resent-Sender: ietf-ldapext-request@netscape.com Content-Transfer-Encoding: 8bit
LOOKING FOR THE BEST COMPUTER PRICES? HOW ABOUT CABLES, MEMORY, PROCESSORS AND MORE?
Please take a moment to view our online catalog.
WELCOME TO COMPUTER CONNECTION'S ONLINE CATALOG

WELCOME TO COMPUTER CONNECTION'S ONLINE CATALOG

Computer Connection


Click here to go to main catalog


SPECIALS

CLICK ON ANY LINK IN THE MAIN CATALOG TO VIEW PRODUCTS

Under Bill s.1618 Title III passed by the 105th congress, this letter cannot be considered spam as long as the sender includes contact information and a method of removal.

This message is sent in compliance of the new e-mail bill: SECTION 301. Per Section 301, Paragraph (a)(2)(C) of S. 1618
To be removed from the list, simply click on this email address with "Remove" in the subject line.
From list@netscape.com Thu Jun 21 11:10:28 2001 Received: from netscape.com (r2d2.netscape.com [205.217.237.47]) by ietf.org (8.9.1a/8.9.1a) with SMTP id LAA01774 for ; Thu, 21 Jun 2001 11:10:27 -0400 (EDT) Received: from aka.mcom.com (aka.mcom.com [205.217.237.180]) by netscape.com (8.10.0/8.10.0) with ESMTP id f5LF8vr27094; Thu, 21 Jun 2001 08:08:58 -0700 (PDT) Received: (from list@localhost) by aka.mcom.com (8.10.0/8.10.0) id f5LF8wI29569; Thu, 21 Jun 2001 08:08:58 -0700 (PDT) Resent-Date: Thu, 21 Jun 2001 08:08:58 -0700 (PDT) Subject: Learn what Others Know about You! Date: Thu, 21 Jun 2001 08:04:45 -0800 From: wen123@altavista.com Message-Id: <6tvq1e718q5h7fn65h44.4fwy4@yahoo.com> X-Mailer: GoldMine [4.00.9626] To: donnatoday@yahoo.com Content-Type: text/html; charset="iso-8859-1" Content-Transfer-Encoding: 8BIT Resent-Message-ID: <"GnRBwD.A.nNH.I4gM7"@glacier> Resent-From: ietf-ldapext@netscape.com X-Mailing-List: X-Loop: ietf-ldapext@netscape.com Precedence: list Resent-Sender: ietf-ldapext-request@netscape.com Content-Transfer-Encoding: 8BIT
Find Out Virtually Anything You Want
Find the Truth About Anyone and Anything
use the Most Powerful Detective Tool on the Internet.
Please Click Here to get more detailed information


Use what the Professionals use
Locate your enemies, friends, debtors, new love interest,
Get information on your personal or business needs and much
much more ...
Please Click Here to get more detailed information





If you would like to be removed from our mailing list, click here.

From list@netscape.com Thu Jun 21 12:39:36 2001 Received: from netscape.com (c3po.netscape.com [205.217.237.46]) by ietf.org (8.9.1a/8.9.1a) with SMTP id MAA05851 for ; Thu, 21 Jun 2001 12:39:35 -0400 (EDT) Received: from aka.mcom.com (aka.mcom.com [205.217.237.180]) by netscape.com (8.10.0/8.10.0) with ESMTP id f5LGbrY18514; Thu, 21 Jun 2001 09:37:54 -0700 (PDT) Received: (from list@localhost) by aka.mcom.com (8.10.0/8.10.0) id f5LGbrY04095; Thu, 21 Jun 2001 09:37:53 -0700 (PDT) Resent-Date: Thu, 21 Jun 2001 09:37:53 -0700 (PDT) From: Casino.XO.Management@ywing.aoltw.net To: ietf-ldapext@netscape.com Subject: Casino Bonus - 30% All Deposits - New Games Reply-To: support@casinoxo.com Date: 21 Jun 2001 12:37:18 -0400 MIME-Version: 1.0 Content-Type: text/html Content-Transfer-Encoding: 8bit Message-ID: X-OriginalArrivalTime: 21 Jun 2001 16:37:18.0312 (UTC) FILETIME=[6FAACE80:01C0FA70] Resent-Message-ID: <"5Qns3C.A.n_.fLiM7"@glacier> Resent-From: ietf-ldapext@netscape.com X-Mailing-List: X-Loop: ietf-ldapext@netscape.com Precedence: list Resent-Sender: ietf-ldapext-request@netscape.com Content-Transfer-Encoding: 8bit Dear Casino Player,

Casino XO "Worlds Best Internet Video Lottery Casino Games" would like to reward you with 30% Bonus on all your Deposits. When you download the New Software and play any one of Roulette, Baccarat, Blackjack, Slots, Keno, Video Poker and make your next purchase of chips, you will automatically receive an extra 30% Bonus to your player account.

 

Win real Money wagering as low as 25 cents

 

CLICK HERE TO DOWNLOAD NEW CASINO SOFTWARE

 

 

By simply downloading the new casino and
making your first deposit you will
 automatically receive a 30% Bonus

30% On All Real Money Deposits

CLICK HERE TO DOWNLOAD NEW CASINO SOFTWARE

http://www.CasinoXO.com

Our professional Customer Service is available to you 24 hrs/day



 

Casino Management

Please send any comments regarding your 30% Bonus support@casinoxo.com

Offer valid between June7 - June 25, 2001

Rules: 30% Bonus is applied to all real money deposits (1 account only per player). You can withdraw any winnings earned using your promotional money as long as you have wagered your initial deposit.

    - If you do not wish to receive future promotions please email Casino XO Promotion Manager with "Unsubscribe Promotion4b@casinoxo.com" typed in the body field of your email.

From list@netscape.com Thu Jun 21 20:59:44 2001 Received: from netscape.com (r2d2.netscape.com [205.217.237.47]) by ietf.org (8.9.1a/8.9.1a) with SMTP id UAA22582 for ; Thu, 21 Jun 2001 20:59:43 -0400 (EDT) Received: from aka.mcom.com (aka.mcom.com [205.217.237.180]) by netscape.com (8.10.0/8.10.0) with ESMTP id f5M0wCr14378; Thu, 21 Jun 2001 17:58:12 -0700 (PDT) Received: (from list@localhost) by aka.mcom.com (8.10.0/8.10.0) id f5M0wCA08152; Thu, 21 Jun 2001 17:58:12 -0700 (PDT) Resent-Date: Thu, 21 Jun 2001 17:58:12 -0700 (PDT) Date: Thu, 21 Jun 2001 17:56:57 -0700 (PDT) Message-Id: <200106220056.f5M0uv724323@ywing.netscape.com> From: iuzbb@hotmail.com To: zddkd@MyNetFriend.netscape.com Reply-To: r4sm@bigfoot.com Subject: Making Serious Money Has Never Been This Easy! [wgghh] Resent-Message-ID: <"XlvlWC.A.A_B.jgpM7"@glacier> Resent-From: ietf-ldapext@netscape.com X-Mailing-List: X-Loop: ietf-ldapext@netscape.com Precedence: list Resent-Sender: ietf-ldapext-request@netscape.com NEW CD ROM is helping to Create HUGE FORTUNES!! Free Info: * What if you could make a full time income handing/sending out a $1.25 CD ROM? * What if the company paid you EVERY DAY? * What if it was a New York Stock Exchange Company? * What if there was no "real" competition, and everybody needs our service? * What if you got paid when somebody goes to your website and views the hottest video presentation ever and signs up? If you are the least bit curious about why this CD ROM is making us Fortunes!! All you need to do is simply: 1.Send an email to: mailto:tim30me@n2mail.com?subject=CD_ROM 2. Put " CD ROM " in the subject heading We will email you all you need to know to get signed up and making money TODAY!!! Waiting to hear from you soon! GA PS.. Please put "Remove" in subject line to get out of this list. Thanks. From list@netscape.com Thu Jun 21 21:36:38 2001 Received: from netscape.com (r2d2.netscape.com [205.217.237.47]) by ietf.org (8.9.1a/8.9.1a) with SMTP id VAA24331 for ; Thu, 21 Jun 2001 21:36:38 -0400 (EDT) Received: from aka.mcom.com (aka.mcom.com [205.217.237.180]) by netscape.com (8.10.0/8.10.0) with ESMTP id f5M1Ylr18909; Thu, 21 Jun 2001 18:34:47 -0700 (PDT) Received: (from list@localhost) by aka.mcom.com (8.10.0/8.10.0) id f5M1YmY22191; Thu, 21 Jun 2001 18:34:48 -0700 (PDT) Resent-Date: Thu, 21 Jun 2001 18:34:48 -0700 (PDT) Reply-To: From: "Steven Legg" To: "'Steinitz, Dominic J'" , "'ietf-ldapext'" Subject: RE: BER and Attribute Syntax Date: Fri, 22 Jun 2001 11:34:53 +1000 Message-ID: <000901c0fabb$89eca6b0$b05508cb@osmium.adacel.com.au> MIME-Version: 1.0 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: 7bit X-Priority: 3 (Normal) X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook 8.5, Build 4.71.2377.0 Importance: Normal In-Reply-To: <"019843B31DD60017*/c=GB/admd=ATTMAIL/prmd=BA/o=British Airways PLC/ou=CORPLN1/s=Steinitz/g=Dominic/i=J/"@MHS> X-MimeOLE: Produced By Microsoft MimeOLE V4.72.2120.0 Resent-Message-ID: <"t6wnxC.A.XaF.2CqM7"@glacier> Resent-From: ietf-ldapext@netscape.com X-Mailing-List: X-Loop: ietf-ldapext@netscape.com Precedence: list Resent-Sender: ietf-ldapext-request@netscape.com Content-Transfer-Encoding: 7bit Dominic, > -----Original Message----- > From: Steinitz, Dominic J > [mailto:Dominic.J.Steinitz@BritishAirways.com] > Sent: Thursday, 21 June 2001 21:41 > To: ietf-ldapext > Subject: BER and Attribute Syntax > > > I hope this is the right mailing list for asking these sort > of questions. If not can someone please direct me to the correct one. > > According to BER, the decimal number 1321should be encoded as > Universal Primitive 2 1321= [2,2,5,41] but according to the > attribute syntax definitions RFC2252 6.16, INTEGER attributes > are encoded as a string of the decimal representation. So to > encode an ASN.1 INTEGER we should use BER but to encode an > INTEGER attribute we should produce an OctetString of the > decimal value. Is this correct? If by "an OctetString of the decimal value" you mean the four octets with the decimal values 49, 51, 50 and 49, being the ASCII codes for the characters `1', `3', `2' and `1' respectively, then the answer is yes. If you mean the two octets with the decimal values 5 and 41 then the answer is no. If the attribute value is instead transfered according to the LDAP ";binary" attribute option (see RFC 2251) then the LDAP AttributeValue OCTET STRING would contain the four octets with the decimal values 2, 2, 5 and 41 (i.e. a BER encoding stuffed into an ASN.1 OCTET STRING as the content). Regards, Steven > > Dominic. > > -------------------------------------------------------------- > ----------------------------------- > 21st century air travel http://www.britishairways.com > > -------------------------------------------------------------- > ----------------------------------- > 21st century air travel http://www.britishairways.com > > From list@netscape.com Thu Jun 21 21:57:23 2001 Received: from netscape.com (r2d2.netscape.com [205.217.237.47]) by ietf.org (8.9.1a/8.9.1a) with SMTP id VAA24618 for ; Thu, 21 Jun 2001 21:57:23 -0400 (EDT) Received: from aka.mcom.com (aka.mcom.com [205.217.237.180]) by netscape.com (8.10.0/8.10.0) with ESMTP id f5M1tur21600; Thu, 21 Jun 2001 18:55:56 -0700 (PDT) Received: (from list@localhost) by aka.mcom.com (8.10.0/8.10.0) id f5M1tvA29913; Thu, 21 Jun 2001 18:55:57 -0700 (PDT) Resent-Date: Thu, 21 Jun 2001 18:55:57 -0700 (PDT) Message-Id: From: "Skovgaard, Erik" To: "'Steinitz, Dominic J'" Cc: ietf-ldapext Subject: RE: BER and Attribute Syntax Date: Thu, 21 Jun 2001 19:01:02 -0700 MIME-Version: 1.0 X-Mailer: Internet Mail Service (5.5.2653.19) Content-Type: multipart/mixed; boundary="----_=_NextPart_000_01C0FABF.30507290" Resent-Message-ID: <"a983fB.A._SH.rWqM7"@glacier> Resent-From: ietf-ldapext@netscape.com X-Mailing-List: X-Loop: ietf-ldapext@netscape.com Precedence: list Resent-Sender: ietf-ldapext-request@netscape.com This message is in MIME format. Since your mail reader does not understand this format, some or all of this message may not be legible. ------_=_NextPart_000_01C0FABF.30507290 Content-Type: text/plain; charset="iso-8859-1" Dominic, You are right about the BER encoding of the integer values, but this is only used on DAP, DSP and DISP. In LDAP we use the string representation; i.e. it is sent across as the visual decimal representation "1321". It makes it easier to read the trace with a protocol analyzer. Cheers, ....Erik. Erik Skovgaard Siemens Meta-Directory Solutions Phone: +1 604-204-0750 Fax: +1 604-204-0760 -----Original Message----- From: Steinitz, Dominic J [mailto:Dominic.J.Steinitz@BritishAirways.com] Sent: Thursday, June 21, 2001 04:41 To: ietf-ldapext Subject: BER and Attribute Syntax I hope this is the right mailing list for asking these sort of questions. If not can someone please direct me to the correct one. According to BER, the decimal number 1321should be encoded as Universal Primitive 2 1321= [2,2,5,41] but according to the attribute syntax definitions RFC2252 6.16, INTEGER attributes are encoded as a string of the decimal representation. So to encode an ASN.1 INTEGER we should use BER but to encode an INTEGER attribute we should produce an OctetString of the decimal value. Is this correct? Dominic. ---------------------------------------------------------------------------- --------------------- 21st century air travel http://www.britishairways.com ---------------------------------------------------------------------------- --------------------- 21st century air travel http://www.britishairways.com ------_=_NextPart_000_01C0FABF.30507290 Content-Type: application/octet-stream; name="Skovgaard, Erik.vcf" Content-Disposition: attachment; filename="Skovgaard, Erik.vcf" BEGIN:VCARD VERSION:2.1 N:Skovgaard;Erik FN:Skovgaard, Erik ORG:Siemens Information and Communications Networks, Inc.;90726B NOTE;ENCODING=QUOTED-PRINTABLE:Employee works out of his home office in Richmond, British Columbia=0D=0A TEL;WORK;VOICE:+1 604-204-0750 TEL;HOME;VOICE:Erik.Skovgaard@icn.siemens.com TEL;HOME:Directory Team-Engineering EMAIL;PREF;INTERNET:Erik.Skovgaard@icn.siemens.com REV:20000518T232217Z END:VCARD ------_=_NextPart_000_01C0FABF.30507290-- From list@netscape.com Thu Jun 21 22:27:01 2001 Received: from netscape.com (r2d2.netscape.com [205.217.237.47]) by ietf.org (8.9.1a/8.9.1a) with SMTP id WAA25195 for ; Thu, 21 Jun 2001 22:27:01 -0400 (EDT) Received: from aka.mcom.com (aka.mcom.com [205.217.237.180]) by netscape.com (8.10.0/8.10.0) with ESMTP id f5M2PMr24387; Thu, 21 Jun 2001 19:25:23 -0700 (PDT) Received: (from list@localhost) by aka.mcom.com (8.10.0/8.10.0) id f5M2PNc08308; Thu, 21 Jun 2001 19:25:23 -0700 (PDT) Resent-Date: Thu, 21 Jun 2001 19:25:23 -0700 (PDT) Date: Thu, 21 Jun 2001 19:25:48 -0700 (PDT) Message-Id: <200106220225.f5M2Pml10127@xwing.aoltw.net> From: suqfg@hotmail.com To: bdezv@MyNetFriend.netscape.com Reply-To: r4sm@bigfoot.com Subject: Are YOU or Someone You Know Always SICK? [hiege] Resent-Message-ID: <"y5fYWD.A.YBC.RyqM7"@glacier> Resent-From: ietf-ldapext@netscape.com X-Mailing-List: X-Loop: ietf-ldapext@netscape.com Precedence: list Resent-Sender: ietf-ldapext-request@netscape.com Sufferers of... Arthritis, Diabetes, Allergies, Chronic Fatigue Syndrome, Flu, Colds, Cancer, Heart Disease, Chronic Pain, Digestive Problems, MS, Fibromyalgia, Alzheimer, Blood Disorders, Lupus, Obesity, Psoriasis, Carpal Tunnel Syndrome, Premature Aging, Etc..... Have you been in pain for years and given up hope, thinking nothing can help? Are you or someone you know dying from one of these diseases? Can't Find a Cure? Would You like to Look Younger than You Really Are? Would you like to Lose Weight? Maybe Your Immune System is Out of Balance? Maybe Your System is stressed out! Want a Better Life? WE CAN HELP! 4 Year Old –All Herbal, cutting edge Alternative Medicine Company has just come out with NEW Products that can help with these and other Health Problems, NOW! There is NO Competition, no other Company has the quality and diversity of products that we have! Thousands of testimonial letters prove that our Products Work! Want to Help Us Eliminate Disease? This company also has a Great Home Based Business Opportunity, with fantastic tools and a complete Turnkey Internet Marketing System. The average distributor with just 50 active members, earns between $3,000-$5,000 a month. Bigger distributors earn substantially more. If you enjoy Helping People and are sick and tired of a Dead-end JOB that leads to nowhere, then maybe this is what you are looking for. Join us and get Healthy and Wealthy all at the same time! You'll be Glad you did! For more information, put "New Health Info" in the subject line and send to: mailto:tim31@n2mail.com?subjectc=New_Health_Info Be Healthy and Live Long! Max PS: Please put "Remove" in the subject line to get out from this list. Thanks. From list@netscape.com Fri Jun 22 17:47:44 2001 Received: from netscape.com (r2d2.netscape.com [205.217.237.47]) by ietf.org (8.9.1a/8.9.1a) with SMTP id RAA12555 for ; Fri, 22 Jun 2001 17:47:41 -0400 (EDT) Received: from aka.mcom.com (aka.mcom.com [205.217.237.180]) by netscape.com (8.10.0/8.10.0) with ESMTP id f5ML1xr26663; Fri, 22 Jun 2001 14:01:59 -0700 (PDT) Received: (from list@localhost) by aka.mcom.com (8.10.0/8.10.0) id f5ML20I02665; Fri, 22 Jun 2001 14:02:00 -0700 (PDT) Resent-Date: Fri, 22 Jun 2001 14:02:00 -0700 (PDT) Message-Id: <200106222101.OAA15645@taller.eng.sun.com> Date: Fri, 22 Jun 2001 14:03:19 -0700 (PDT) From: Rosanna Lee Reply-To: Rosanna Lee Subject: Comments on draft-ietf-ldapext-ldap-java-api-15.txt To: ietf-ldapext@netscape.com MIME-Version: 1.0 Content-Type: TEXT/plain; charset=us-ascii Content-MD5: 7Cp17v90DaaSlCXx35KtRQ== X-Mailer: dtmail 1.3.0 @(#)CDE Version 1.3.2 SunOS 5.7 sun4u sparc Resent-Message-ID: <"e3BM7.A.oo.FJ7M7"@glacier> Resent-From: ietf-ldapext@netscape.com X-Mailing-List: X-Loop: ietf-ldapext@netscape.com Precedence: list Resent-Sender: ietf-ldapext-request@netscape.com Please cc me in the discussion. I'm not on this mailing list. _____________________ Rosanna Lee Java Software, Sun Microsystems, Inc rosanna.lee@sun.com ----------------------------------------------------------------------- 1. Section 1.2 The LDAP classes The LDAPConnection class also provides fields for storing settings that are specific to the LDAP session (such as limits on the number of results returned or timeout limits). In fact, the LDAPConnection class does not provide fields because none has been declared. What the class does provide are get/set methods for updating the state of the connection. 2. LDAPSearchResult and LDAPSearchResults A natural conclusion of examining these names is that they should be related: LDAPSearchResults is probably a collection of "LDAPSearchResult"s. But these classes are not related at all. An LDAPSearchResults is an enumeration of LDAPEntry while LDAPSearchResult is a result from an async search. One of these classes should be renamed to avoid confusion. 3. Section 1.4 Interfaces LDAPEntryComparator An interface to support arbitrary sorting algorithms for entries returned by a search operation. The basic Java LDAP classes include one implementation: LDAPCompareAttrNames, to sort in ascending order based on one or more attribute names. Not just ascending, but ascending or descending order. 4. Section 1.4 Interfaces LDAPRebind A programmer desiring to supply credentials to the default reauthentication behavior when automatically following referrals MUST ... Supplying "credentials" to a "behavior" is very strange wording. 5. Section 1.4 Interfaces LDAPBind This interface allows a programmer to override the default authentication and reauthentication behavior when automatically following referrals and search references. It is used to specify the authentication mechanism used on automatic referral following. This description seems too restrictive. LDAPBind is used to specify arbitrary behavior--behavior that might be unrelated to authentication--when following referrals. 6. Section 1.4 Interfaces LDAPUnsolicitedNotificationListener Allows a client to be notified when unsolicited messages arrive from a server. Unsolicited messages have a message ID of 0. An implementation of the Java LDAP API SHOULD NOT generate messages with an ID of 0. Is the Java LDAP API even allowed to generate messages? Isn't message generation the responsibility of the server? 7. Section 1.5 Classes LDAPConstraints Defines options controlling all operations. Do you mean "Defines options controlling all operations on the Directory"? Or perhaps "... on LDAPConnection"? 8. Section 1.5 Classes LDAPExtendedResponse The response returned by an LDAP server on an asynchronous extended operation request. It extends LDAPResponse. Not async. 9. Section 1.5 Classes LDAPDITContentRuleSchema Represents a specific DIT content rule in the directory schema. LDAPDITStructureRuleSchema Represents a specific DIT structure rule in the directory schema. LDAPMatchingRuleUseSchema Represents a specific matching rule use in the directory schema. LDAPNameFormSchema Represents a specific name form in the directory schema. LDAPSyntaxSchema Represents a specific syntax definition in the directory schema. Delete 'specific'. 10. Section 1.5 Classes LDAPAttributeSchema Represents a schematic definition of a particular attribute in a particular Directory Server. LDAPMatchingRuleSchema Represents the schematic definition of a particular matching rule in a particular Directory Server. LDAPObjectClassSchema Represents the schematic definition of a particular object class in a particular Directory Server. LDAPSchema Represents the schema controlling one or more entries held by a particular Directory Server. Delete 'particular'. Why 'in a particular Directory Server'? In fact, you can create one of these and it need not be associated with any Directory Server until you decide to add it to one. 11. Section 1.5 Classes LDAPMessage Base class for LDAP request and response messages. Subclassed by response messages used in asynchronous operations. LDAPResponse Represents a message received from an LDAP server in response to an asynchronous request. It extends LDAPMessage. async is incorrect. Also used for non-async extendedOperation. 12. Section 1.5 Classes LDAPResponseListener Low-level mechanism for processing asynchronous messages received from a server. LDAPSearchListener Low-level mechanism for queuing asynchronous search results received from a server. 'Low-level'? Compared to what? Is there a high-level mechanism for doing the same thing? If not, delete 'low-level'. 13. Section 1.5 Classes LDAPSchemaElement Base class for representing LDAP schema elements. Base class for representing an LDAP schema element. (singular). 14. Section 1.5 Classes LDAPUrl Encapsulates parameters of an LDAP Url query, as defined in [LDAPURL]. Strange wording. Why isn't this simply "Represents an LDAP URL [LDAPURL]"? 15. Section 1.7 LDAP API use For the asynchronous methods, exceptions are raised only for connection errors. Are local errors in the "connection errors" category? 16. Section 1.7 LDAP API use To facilitate user feedback during synchronous searches, intermediate search results can be obtained before the entire search operation is completed by specifying the number of entries to return at a time. Standard Java Enumerations are used to parse synchronous search results. parse -> obtain Users of the enumeration don't parse anything, although the underlying Enumeration implementation might. 17. Section 3.6 Array Return Values Section 3.6 belongs here in section 1.7, where similar things are talked about, instead of being in a section named 'Implementation Considerations'. 18. Section 2.2.1 Constructors public LDAPAttributeSchema(String name, String oid, String description, String syntaxString, boolean single String superior, String[] aliases, boolean obsolete, String equality, String ordering, String substring, boolean collective, boolean userMod, int usage) Which ones of these arguments are optional? The descriptions seem to say that the following are optional: description superior aliases equality ordering substring RFC 2252 says that the following are optional: name/aliases description obsolete superior equality ordering substring usage syntaxString userMod collective single Need to clarify in the descriptions which are optional. If conforming to RFC 2252, then need to specify whether the corresponding methods (such as getSyntaxString()) can return null. 19 Section 2.3 public class LDAPAttributeSet implements Cloneable If LDAPAttributeSet is really a set, then it should implement java.util.Set so that it benefits from the utilties offered by the Java Collections Framework. 20.. Section 2.3.5 getAttribute Returns a single best-match attribute, or none if no match is available in the entry. entry -> set 21. Section 2.3.2 add public void add(LDAPAttribute attr) Adds the specified attribute to this attribute set. What happens if attr with same name already exists? Overwritten? Ignored? Runtime exception? Need to specify. 22. Section 2.3.4 elementAt public LDAPAttribute elementAt(int index) throws ArrayIndexOutOfBoundsException Returns the attribute at the position specified by the index. The index is 0-based. and Section 2.3.9 removeElementAt public void removeElementAt(int index) throws ArrayIndexOutOfBoundsException Removes the attribute at the position specified by the index. Are the contents of LDAPAttributeSet ordered? A set, by definition, is unordered. How is the order affected by addition of a new attribute? Added to the beginning? end? random? If LDAPAttributeSet is ordered, then the class should be renamed and the behavior of these methods specified. 23. Section 2.3.5 getAttribute (subtyping) getAttribute( "cn", "lang-en-us" ) returns the "cn;lang-en" attribute. getAttribute( "sn", "lang-en" ) returns the "sn" attribute. getAttribute( "cn", "lang-ja" ) returns null. These seem to violate subtyping rules and RFC 2596. A lang-en is not a lang-en-us. A lang-ja-JP-kanji is a lang-ja. An 'sn' is not an 'sn;lang-en'. 24. Section 2.3.5 getAttribute ... If there are no matching attributes, null is returned. If the results are ambiguous, the exception UnsupportedOperationException is thrown. UnsupportedOperationException seems to be the wrong exception to throw here. RuntimeExceptions are not intended to be used in this way. The nature of the failure seem to indicate the need for a checked exception and that caller of getAttribute() should expect the exception if the parameter specification is ambiguous 25. Section 2.4.1 bind ... An implementation may access the host, port, credentials, and other information in the original LDAPConnection object ... Contrary to this statement, there does not appear to be a way for the implementation to access the credentials of the original LDAPConnection. 26. Section 2.5 public class LDAPCompareAttrNames Behavior unspecified as to how entries without the specified attribute name/names are treated for ascending and descending orders. 27. LDAPCompareAttrNames is a LDAPEntryComparator. Yet the name sounds like a method instead of a comparator. Better choices might be LDAPAttrNamesEntryComparator or LDAPAttrNamesComparator 28. Section 2.5.1 Constructors ascendingFlags Array of flags, one for each attrName, where each one is true to sort in ascending order, false for descending order. An LDAPException is thrown if the length of ascendingFlags is not greater than or equal to the length of attrNames. Why is greater than acceptable? Why not just require equality? Otherwise, you need to add text to say that the extras are ignored. 29. Section 2.6.2 abandon The application is responsible for not calling this method more than once with a particular id or LDAPSearchResults. What is the behavior otherwise? Undefined? What is the behavior if abandon is called on a nonexistent message id? LDAPException? 30. Section 2.6.3 add The application is responsible for not specifying attribute values which are not valid according to the syntax defined for the attributes. It is also responsible for including all attributes which are required for the entry. What is the behavior otherwise? LDAPException? Which error codes? Why single out attribute values in particular for conformance? Why not list requirements on dn, etc. Need to clarify or delete. 31. Section 2.6.5 bind (passwd security) passwd is explicitly typed to be String. Using String for the password contradicts Section 4, which says: Implementations of this API SHOULD be cautious when handling authentication credentials. In particular, keeping long-lived copies of credentials without the application's knowledge is discouraged. The common practice in the JDK is to use char[] for passwords. 32. Section 2.6.5 bind (version) public void bind(int version, String dn, String passwd) throws LDAPException and related overloads with 'version' parameter. version LDAP protocol version requested: currently 2 or 3. What if the user specifies 2 and the server accepts? Then the session proceeds in v2? Then how does that reconcile with the earlier statement in Section 1.1 The LDAP model. Before the client encodes and sends a string value to a server, the string values are converted from the Java 16-bit Unicode format to UTF-8 format, which many LDAPv3 protocol elements and value encodings use. The integrity of double-byte and other non-ASCII v2 doesn't use UTF-8. 33. Section 2.6.5 bind (more comments on version) ... This API is specifically designed for use with LDAPv3. Unless the API provides specific support (as defined in other documents) for other versions of LDAP, version 3 should be used. How does this reconcile with the version argument description, which seems to imply that both 2 & 3 are supported. version LDAP protocol version requested: currently 2 or 3. 34. Section 2.6.5 bind (dn/passwd parameters) dn If non-null and non-empty, specifies that the connection and all operations through it SHOULD be authenticated with dn as the distinguished name. passwd If non-null and non-empty, specifies that the connection and all operations through it SHOULD be authenticated with dn as the distinguished name and passwd as password. Doesn't say what happens if dn is null or empty, or if passwd is null or empty, or if dn is non-empty and passwd is empty. Need to specify. Also, why is it only SHOULD? Is the implementation free to ignore dn and passwd and authenticate using any dn/passwd it chooses? Doesn't say how to do anonymous bind. Should explicitly say that non-empty dn and non-empty passwd will be used to perform simple bind. "simple bind" is mentioned elsewhere in the class (e.g., isBound()) but not in this section at all. 35. Section 2.6.5 bind (authzId variants) public void bind(String dn, String authzId, Hashtable props, javax.security.auth.callback.CallbackHandler cbh) throws LDAPException public void bind(String dn, String authzId, Hashtable props, javax.security.auth.callback.CallbackHandler cbh, LDAPConstraints cons) throws LDAPException These appear to be missing the String[] mechanisms parameter, and if added, aren't these equivalent to the two other definitions that follow them? 36. Section 2.6.5 bind (authzId variants) Should use java.util.Map instead of java.util.Hashtable because it allows the client to use more efficient implementations. Similar change to 2.6.24 getSaslBindProperties public Hashtable getSaslBindProperties() 37. Section 2.6.5 bind (SASL bind wording) A SASL bind call() may involved multiple protocol requests. An attempt to invoke an operation other than bind between bind requests in a multi-stage bind results in an LDAPException with the result code SASL_BIND_IN_PROGRESS. How can someone do this? Isn't the SASL bind method synchronous? It returns only when SASL authentication terminates either successfully or unsuccessfully. call() -> call 38. Section 2.6.5 bind (authzId variants - parameters) authzId If not null and not empty, an LDAP authzID [AUTH] to be passed to the SASL layer. What if it is null or empty? Should say that if null or empty, that the authzId will be treated as an empty string and processed as per RFC 2222. (Or, instead of referencing 2222, say what RFC 2222 does with it). Also, is the dn allowed to be null and/or empty for SASL bind? Need to specify. cbh A class which may be called by the Mechanism Driver to obtain additional information required, such as additional credentials. "Mechanism Driver" not defined in this document. 39. Section 2.6.8 connect (default port) port Contains the TCP port number to connect to or contact. The default LDAP port is 389. "port" is ignored for any host identifier which includes a colon and port number. How do you specify the default port? Wording from 2.41.1 seems more appropriate. port Port number for LDAP server (use LDAPConnection.DEFAULT_PORT for default port). 40. Section 2.6.8 connect (host/port specification) host Each host identifier may include a trailing colon and port number. and port ... "port" is ignored for any host identifier which includes a colon and port number. This is an odd feature. It is also inconsistent with the Java platform's networking library. Since both host and port are already separate arguments, it seems cleaner to leave them separate. Same comment applies to Section 2.41.1. 41. Section 2.6.8 connect (IPv6) host Contains a host identifier consisting of a hostname, an IPv4 dotted string, or an IPv6 reference [IPv6] representing the IP address of host running an LDAP server to connect to. "[FEDC:BA98:7654:3210:FEDC:BA98:7654:3210]:4389" The format for literal IPv6 addresses is described in RFC 2373. RFC 2732 describes the format for literal IPv6 addresses in URLs. 'host' here is being used in the context of a host address, not in the context of a URL. Therefore, the reference should be to RFC 2373 and the example shown should be without the '[' and ']' (and port, See 40). 42. Section 2.6.9 delete dn Distinguished name of the entry to modify. Should be 'the entry to delete'. 43. Section 2.6.10 disconnect Disconnects from the LDAP server. The API implementation sends an Unbind request to the server with any controls specified by the LDAPConstraints object before closing the connection. Before the object can perform LDAP operations again, it MUST reconnect to the server by calling either connect or bind (bind will attempt to reconnect). This seems to contradict Section 2.6.6 clone : The network connection remains open until all clones have disconnected or gone out of scope. Any connection opened after cloning is private to the object making the connection. Need to clarify one or the other. 44. Section 2.6.12 finalize First, defining finalizers in general degrades performance of the JVM severely. Second, the finalize() method is reserved for finalization and should not be used as a common method name. Finally, finalize() should never be declared public. To do this in a public API forces poor implementations. If a method is needed for cleaning up the connection that is different from disconnect, call it something else. 45. Section 2.6.14 getAuthenticationMethod "none" The current authentication state has not been established by use of the bind operation. This is the initial state upon connect(). Perhaps useful to add that the method can be in "none" if the last bind failed or if last successful bind was anonymous. 46. Section 2.6.16 getHost Returns the host name of the LDAP server to which the object is or was last connected, in the format originally specified. and Section 2.6.19 getPort public int getPort() Returns the port number of the LDAP server to which the object is or was last connected. What if last connection attempt was unsuccessful? What if no connection attempt was ever made? For host, do you get null or empty string? For port, what do you get? 47. Section 2.6.17 getInputStream and Section 2.6.18 getOutputStream public InputStream getInputStream() Returns the stream used by the connection object for receiving data from the LDAP server. What if connect() was not called or the connection has been disconnected? Do you get null? Exception? 48. Section 2.6.20 getProperty LDAP_PROPERTY_SDK ("version.sdk") The version of this SDK, as a Float data type. A Float seems like an odd type to use for versioning. LDAP_PROPERTY_PROTOCOL ("version.protocol") The highest supported version of the LDAP protocol, as a Float data type. Same comment as above. LDAP_PROPERTY_SECURITY ("version.security") A comma-separated list of the types of authentication supported, as a String. What is meant by authentication types? SASL mechanism names? Or things like "none", "simple" or "sasl"? Need to clarify. Are the properties available related at all to those added via setProperty()? Why do these property names start with "version."? What is the naming convention for the properties and who controls this namespace? 49. Section 2.6.20 getProperty LDAP_PROPERTY_SDK ("version.sdk") The version of this SDK, as a Float data type. Why not use the versioning facilities in java.lang.Package? 50. Section 2.6.21 getProtocolVersion public int getProtocolVersion () Returns the protocol version that the connection is bound to (2 or 3). How come this returns an int but LDAP_PROPERTY_PROTOCOL returns a Float? What is returned if connection is not bound? 51. Section 2.6.27 isBound public boolean isBound() Indicates whether the object has authenticated to the connected LDAP server (other than anonymously with simple bind). It returns false initially, false upon a bind request, and true after successful completion of the last outstanding non-anonymous simple bind. What about last successful SASL bind? A better name for this method might be isAuthenticated(), as indicated by the method description. 52. Section 2.6.30 modify The application is responsible for specifying attribute values which are valid according to the syntax defined for the attributes. Otherwise? Why single this out? What about validity of other arguments? 53. setSearchConstraints still shows up in the following 2 sections. Section 2.6.6 clone Section 2.33 public class LDAPSearchConstraints extends LDAPConstraints A set of options to control a search operation. There is always an LDAPSearchConstraints associated with an LDAPConnection object; its values can be changed with LDAPConnection.setSearchConstraints, or overridden by passing an LDAPConstraints object to the search operation. 54. Section 2.6.15 getConstraints public LDAPConstraints getConstraints() Returns a copy of the set of constraints associated with this connection. These constraints apply to all operations performed through this connection (unless a different set of constraints is specified when calling an operation method). What if none was set? Do you get null or a copy of a default LDAPConstraints? Same comment for Section 2.6.25 getSearchConstraints. 55. Section 2.6.35 setConstraints public void setConstraints(LDAPConstraints cons) Sets the constraints that apply to all operations performed through this connection (unless a different set of constraints is specified when calling an operation method). An LDAPSearchConstraints object which is passed to this method will override all constraints, while an LDAPConstraints object will only affect the base constraints. Can I pass in null to clear any previous set constraints? Or must cons be nonnull? 56. Section 2.6.11 extendedOperation op Object which contains an object identifier of the extended operation, which SHOULD be one recognized by the particular server this client is connected to, and operation-specific sequence of Octet String or BER-encoded value(s). At the API level, there should be no requirement that the operation is recognized by the server. Even RFC 2251 doesn't go that far. 57. Section 2.6.33 rename newParentdn -> newParentDn for consistent use of capitalization. Renames an existing entry or subtree in the directory, possibly repositioning it in the directory tree. Parameters are: dn Current distinguished name of the entry. Method description doesn't say what happens when newParentDn is omitted. Need to specify. 58. Section 2.6.36 setInputStream public void setInputStream(InputStream stream) Sets the stream used by the connection object for receiving data from the LDAP server. and Section 2.6.37 setOutputStream public void setOutputStream(OutputStream stream) Sets the stream used by the connection object to send data to the LDAP server. First, these are low-level service-provider methods that should not be mixed up with user-level methods in the same class. These are dangerous methods that should not be used lightly. Second, you need to describe the purpose of these methods other than what it does. There is a brief mention of its use in the change log, but that's not part of the main spec. Third, you need to describe the implications of using these methods. What happens to the async listeners when you invoke either of these? Similarly, getOutputStream() and getInputStream() also seem like they don't belong in a user-level API. 59. Section 2.6.38 setProperty public void setProperty(String name, Object value) throws LDAPException Sets a property of a connection object. No property names have been defined at this time, but the mechanism is in place in order to support revisional as well as dynamic extensions to operation modifiers. It seems to be jumping the gun to define an API for which there is currently no use. Also, need to explain how are properties are related to "client controls"? When should you use which to control client-side behavior? 60. Section 2.6.40 setSocketFactory Can this be called more than once? Do you need appropriate permissions to do this? 61. Section 2.6.41 startTLS There is no support for the client to stop TLS and downgrade to a plain unauthenticated LDAP connection. A major advantage of the Start TLS extension (instead of just LDAP over SSL) is the client's ability to multiplex encrypted and clear requests on the same connection. Despite the lack of current server support, the API should not be deficient. 62. Section 2.7.9 setReferralFollowing ... Referrals of any type other than to an LDAP server (i.e. a referral URL other than ldap://something) are ignored on automatic referral following. The default is false. Is this true also if you setReferralHandler(LDAPBind)? When you use LDAPBind, aren't you given all of the URLs regardless of their scheme? 63. Section 2.7.2 getClientControls public LDAPControl[] getClientControls() Returns controls to be used by the interface. and Section 2.7.7 setClientControls Sets controls for use by the interface. Not clear what 'used by the interface' means. An interface is a declaration. Perhaps you mean "the implementation of the Java LDAP API". The whole concept of "client controls" is confusing. See 64. 64. Section 3.1 Client and Server Controls LDAPv3 operations can be extended through the use of controls. Controls MAY be sent to a server or returned to the client with any LDAP message. These controls are referred to as server controls. The LDAP API also supports a client-side extension mechanism through the use of client controls (these controls affect the behavior of the LDAP API only and are never sent to a server). A common class is used to represent both types of controls - LDAPControl. The API is inventing new terms and concepts that don't mesh well with those already defined in RFC 2251. "Control" has a very specific meaning in RFC 2251. It maps to server controls as described in this document. The API invents "client controls", using the same structure to modify behavior of the client library. There are several problems with this. First, it has a very clumsy structure (Section 2.8.1) public LDAPControl(String id, boolean critical, byte[] value) This structure is appropriate for server controls because it fits well within the RFC 2251 framework. For client controls, why force control values to fit within a byte[]? If byte[] won't' be used for client controls, then why use LDAPControl? Is there a common encoding for byte[] value that makes it useful for client controls? Second, what is the relationship between a property and a client control? Section 2.6.38 setProperty says: No property names have been defined at this time, but the mechanism is in place in order to support revisional as well as dynamic extensions to operation modifiers. It seems the properties could be used as operation modifiers. Is that what client controls are for too? When should you use which? Third, are there examples of client controls? Are they standard? 65. Section 2.7.7 setClientControls public void setClientControls( LDAPControl control ) public void setClientControls( LDAPControl[] controls ) Sets controls for use by the interface. What if the client control is unsupported? Does this method throw an exception? Or does LDAPConnection throw an exception somewhere down the line when it tries to use the client controls? Why is the first method name plural when the argument is singular? 66. Section 2.7.11 setServerControls public void setServerControls( LDAPControl control ) Why is the method name plural when the argument is singular? 67. LDAPConstraints.getReferralHandler() was removed. How can the LDAPConnection implementation get the LDAPReferralHandler from the LDAPConstraints/LDAPSearchContraints argument to handle referrals? 68. Section 2.7.10 setReferralHandler public void setReferralHandler (LDAPReferralHandler binder) Specifies the object that will process authentication requests. The default is null. and Section 2.7.1 Constructors public LDAPConstraints(int msLimit, boolean doReferrals, LDAPReferralHandler binder, int hop_limit) Poor choice of name for LDAPReferralHandler interface leads to confusion about exactly what it is. 'binder' is a handler? 69. Poor descriptions of LDAPReferralHandler. Section 1.4: LDAPReferralHandler Interface that is a shared ancestor to LDAPBind and LDAPRebind. And in 2.7.10 setReferralHandler public void setReferralHandler (LDAPReferralHandler binder) Specifies the object that will process authentication requests. The default is null. Parameters are: binder An object that implements LDAPBind or LDAPRebind. These descriptions need to be made more useful instead of just describing the class hierarchy. What is its exact purpose? To customize referral handling? To customize authentication done during referral handling? Describing its intended use would be more useful. If its purpose is to process authentication requests, why is it called LDAPReferralHandler? Probably both the interface name and the descriptions need work. 70. LDAPBind and LDAPRebind, LDAPRebindAuth Section 2.4 public interface LDAPBind Section 2.25 public interface LDAPRebind Section 2.26 public class LDAPRebindAuth These interface and class names give a poor indication of their function. LDAPRebindAuth: Why not use java.net.PasswordAuthentication? The PasswordAuthentication class is a {String, char[]} pair. Password is best represented as a char[] so that you can zero it out, instead of being stored in an immutable entity like a String. Using String for the password contradicts Section 4, which says: Implementations of this API SHOULD be cautious when handling authentication credentials. In particular, keeping long-lived copies of credentials without the application's knowledge is discouraged. The name LDAPRebind is not at all indicative of the purpose of this interface. How about: LDAPRebind -> LdapAuthenticator Similarly, LDAPBind is a poor choice of name. Seems like it is related to LDAPRebind except performing the bind the first time. But that's not what the interface is for. How about: LDAPBind -> LdapConnectionReferralHandler 71. Section 2.8.1 Constructors critical If true, the LDAP operation will fail with UNAVAILABLE_CRITICAL_EXTENSION if the server does not support this Control. value Control-specific data. The description of the 'critical' parameter cannot be used if you want LDAPControl to represent both client and server controls. What is the format of value? Same comment as 73. 72. Section 2.8.6 register public static void register(String oid, Class controlClass) Do you need appropriate permissions to do this? Explicit use of Class means that you're forcing the caller to deal with class loading issues. controlClass A class which can instantiate an LDAPControl. A factory can also instantiate an LDAPControl, but you had a stricter requirement earlier: The controlClass MUST be an extension of LDAPControl. Need to clarify argument description. 73. Section 2.8.4 getValue public byte[] getValue() Returns the control-specific data of the object. and Section 2.8.7 setValue protected void setValue(byte[] value) Sets the control-specific data of the object. This method is for use by extensions of LDAPControl. What is the format of value? Is it in ASN.1 BER encoding, ready to be sent as is to the server? Or is it an octet string that the Java LDAP API implementation must encode using ASN.1 BER, by adding in the tag and length. This needs to be specified because it is the contract between the developer of the control and the developer of the LDAP client library, which might be different entities. 74. Section 3.1 Client and Server Controls Support for specific controls is defined in a package "controls" subordinate to the main LDAP package. Support for controls may be defined in any package (user-defined, vendor-supplied, etc), not just those in the "controls" subpackage. Perhaps standard controls might be defined in a "controls" subpackage but why even mention it here, especially since the other package hasn't been standardized? 75. Section 2.1.2 addValue (both forms): How are duplicates handled? 76. Section 2.1.4 getByteValues public Enumeration getByteValues() Returns an enumerator for the values of the attribute in byte[] format. and Section 2.1.5 getByteValueArray public byte[][] getByteValueArray() Returns the values of the attribute as an array of byte[]. What if the values are of type String? What encoding is used for the conversion? UTF-8 won't work for v2. 77. Section 2.1.13 removeValue public void removeValue(String attrString) Removes a string value from the attribute. What if attribute values are byte[]? How is equality of attribute values determined? What if the value does not exist? Need to specify. public void removeValue(byte[] attrBytes) Removes a byte[]-formatted value from the attribute. What if attribute value is a String? How is equality of attribute values determined? What if the value does not exist? Need to specify. 78. Section 2.1.8 getStringValueArray public String[] getStringValueArray() Returns the values of the attribute as an array of Strings. This method should only be called if the attribute values are known to be strings with values restricted to UTF-8. The returned Strings have undefined values if the attribute contains values not restricted to UTF-8. and Section 2.1.9 getStringValues public Enumeration getStringValues() Returns an enumerator for the string values of an attribute. This method should only be called if the attribute values are known to be strings with values restricted to UTF-8. The returned Strings have undefined values if the attribute contains values not restricted to UTF-8. How do I know whether a string has an undefined value? Do you mean the String is null or does it contain funny characters (by inspection)? 79. Section 2.1 public class LDAPAttribute This class allows you to get the attr values back as either String or byte[] but there appears to be no way of finding out what was the intended presentation format (String or binary). Suppose I'm writing a generic browser and reads some attributes from the directory. What is the recommended approach to display as much of the attribute values as strings as possible and indicate that others are binary? 80. None of the classes are Serializable. Some data types, such as LdapAttribute, LdapAttributeSet, and the schema classes seem like they would benefit from being Serializable. 81. Why isn't LDAPAttribute Cloneable? It has a constructor that accepts an LDAPAttribute. Why do that instead of making it cloneable? Why use a different pattern than LDAPAttributeSet? 82. Incorrect/unresolved citations Section 2.6.41 startTLS Begin using the Transport Layer Security (TLS) protocol for session privacy [10]. Section 2.29.4 getResultCode Returns the result code in a server response, as defined in [5]. Section 2.11.2 escapeRDN Returns the RDN after escaping the characters requiring escaping [4]. 83. 'raw' descriptions Section 2.2.1 Constructors public LDAPAttributeSchema(String raw) Constructs an attribute definition from the raw String value returned on a Directory query for "attributetypes". You probably mean a single attribute value from the "attributetypes" attribute. But the string value might not have been gotten from a directory query. Better to just say that 'raw' is a string encoded using the AttributeTypeDescription syntax [ATTR]. Similar comments apply to the following constructors: Section 2.9.1 Constructors public LDAPDITContentRuleSchema(String raw) Constructs a DIT content rule from the raw String value returned on a schema query for "dITContentRules". Section 2.10.1 Constructors public LDAPDITStructureRuleSchema(String raw) Constructs a DIT structure rule from the raw String value returned on a schema query for "dITStructureRules". Section 2.18.1 Constructors public LDAPMatchingRuleSchema(String rawMatchingRule, String rawMatchingRuleUse) Constructs a matching rule definition from the raw String values returned on a Directory query for "matchingRule" and for "matchingRuleUse" for the same rule. Section 2.19.1 Constructors public LDAPMatchingRuleUseSchema(String raw) Constructs a matching rule use definition from the raw String value returned on a schema query for "matchingRuleUse". Section 2.23.1 Constructors public LDAPNameFormSchema(String raw) Constructs a DIT content rule from the raw String value returned on a schema query for "nameForms". Section 2.24.1 Constructors public LDAPObjectClassSchema(String raw) Constructs an object class definition from the raw String value returned on a Directory query for "objectclasses". Section 2.39.1 Constructors public LDAPSyntaxSchema(String raw) Constructs a syntax from the raw String value returned on a schema query for "LDAPSyntaxes". 84. 2.9.1 Constructors public LDAPDITContentRuleSchema(String name, String oid, String description, boolean obsolete, String[] auxiliary, String[] required, String[] optional, String[] precluded, String[] aliases) Which ones of these arguments are optional? The descriptions seem to say that the following are optional: description aliases RFC 2252 says that the following are optional: name/aliases description, obsolete, auxiliary, required, optional, precluded, Need to clarify in the descriptions which are optional. If conforming to RFC 2252, then need to specify whether the corresponding methods (such as getName()) can return null. 85. Section 2.10.1 Constructors public LDAPDITStructureRuleSchema(String name, int ruleID, String description, boolean obsolete, String nameForm, String[] superiorIDs, String[] aliases) Which ones of these arguments are optional? The descriptions seem to say that the following are optional: description superiorIDs aliases RFC 2252 says that the following are optional: name/aliases description superiorIDs obsolete Need to clarify in the descriptions which are optional. If conforming to RFC 2252, then need to specify whether the corresponding methods (such as getName()) can return null. 86. Section 2.10.2 getNameForm public String getNameForm() Returns the NameForm that this structure rule controls. You can get the actual object class that this structure rule controls by calling getNameForm().getObjectClass(). The method returns a String, not the NameForm. The last sentence needs correction, such as ldapSchema.getNameForm(ditStructRule.getNameForm()).getObjectClass(). 87. Section 2.11 public class LDAPDN A utility class representing a distinguished name (DN). First, poor choice of capitalization. Second, this class does not represent a distinguished name. It is a utility class for manipulating distinguished names. 88. Section 2.12.2 getAttribute public LDAPAttribute getAttribute(String attrName) Section 2.12.3 getAttributeSet public LDAPAttributeSet getAttributeSet(String subtype) These are redundant with 2.3.5 getAttribute and 2.3.7 getSubset. LDAPAtrributeSet has a superset of similar methods for doing this. Why duplicate a subset here? 89. Section 2.13 public interface LDAPEntryComparator Why doesn't this method extend from java.util.Comparator? In fact, why is this interface necessary at all? Why doesn't LDAPCompareAttrNames just implement Comparator? Using Comparator would make available all of the sorting and searching utilities available in the Java Collections framework. Also, having public int compare(Object o1, Object o2) is a lot more flexible than public boolean isGreater(LDAPEntry entry1, LDAPEntry entry2) 90. Section 2.14 public class LDAPException extends Exception Thrown to indicate that an error has occurred. An LDAPException can result from physical problems (such as network errors) as well as problems with LDAP operations (for example, if the LDAP add operation fails because an entry already exists with the DN of the entry to be added). And also due to "local errors"? 91. Section 2.14.2 errorCodeToString Section 2.14.5 getLDAPResultCode One method says "errorCode", the other says "LDAPResultCode". Do you mean the same thing? If so, use the same names. 92. Section 2.14.4 getLDAPErrorMessage public String getLDAPErrorMessage() Returns the error message, if this message is available (that is, if this message was set). If the message was not set, this method returns null. How is this set? via the 'message' argument to the constructor? How is this different from the result of Throwable.getMessage()? The description doesn't mention anything LDAP-specific, so why is the method named getLDAPErrorMessage()? 93. Section 2.14.7 toString public String toString() Overrides the default toString implementation. It expands all the nested exceptions. Don't quite know what "expanding the nested exceptions" mean. Does it mean showing the class names of the nested exception, if any? In which order? 94. Section 2.14.2 errorCodeToString public static String errorCodeToString( int code ) Returns a String representing an arbitrary result code in the default Locale, or null if there is no such code known to the API. public static String errorCodeToString( int code, Locale locale ) Returns a String representing an arbitrary result code in the specified Locale, or null if there is no such code or if a String representation is not available for the requested Locale. Not an arbitrary result code, but the specified result code. 95. Section 2.14.5 getLDAPResultCode public int getLDAPResultCode() Why 'LDAPResultCode' and not simply 'ResultCode'? Some error codes (such as NO_MEMORY, USER_CANCELLED) might not even be LDAP related. 96. Section 2.15.1 Constructors public LDAPExtendedOperation(String oid, byte[] value) value The operation-specific data of the operation. Section 2.15.3 getValue public byte[] getValue() Returns the operation-specific data (not a copy, a reference). and Section 2.15.4 setValue protected void setValue(byte[] value) Same comment as 73. 97. Section 2.16.2 getValue public byte[] getValue() Returns the raw bytes of the value part of the response. Similar comment as 73. 98. Section 2.16 public class LDAPExtendedResponse extends LDAPResponse An LDAPExtendedResponse object encapsulates a server response to an asynchronous extended operation request. and Section 1.5 Classes LDAPExtendedResponse The response returned by an LDAP server on an asynchronous extended operation request. It extends LDAPResponse. The extended operation need not be asynchronous. For example, it is returned by (Section 2.6.11) public LDAPExtendedResponse extendedOperation( LDAPExtendedOperation op ) throws LDAPException public LDAPExtendedResponse extendedOperation( LDAPExtendedOperation op, LDAPConstraints cons ) throws LDAPException which are synchronous forms of extendedOperation. 99. Section 2.17 public interface LDAPListener Represents the message queue associated with a particular asynchronous LDAP operation or operations. If it is a message queue, why is it called a listener? 100. Inappropriate use of the "Listener" pattern for LDAPListener LDAPResponseListener LDAPSearchListener Throughout the Java platform, interfaces that are called "Listener" are callback interfaces that contain methods that are invoked when an asynchronous event occurs. The LDAP listeners, however, are not callback interfaces but instead have an entirely different usage pattern. Furthermore, there is an interface in this package, LDAPUnsolicitedNotificationListener, that is a callback interface. Having two different types of "listeners" in the same package is confusing enough, not to mention the confusion created by one type being different from those in the Java platform. As 98 points out, the description of the LDAP listeners indicates the poor name choice right away. In Section 1.3, the following sentence appears: The listener is a message queue associated with the request, and it is the responsibility of the client to read messages out of the queue and process them. If the listener is a message queue, why call it a listener at all? This incorrect use of "listener" makes the API confusing to use. 101. Section 2.17.3 isResponseReceived Reports true if a response has been received from the server for a particular message ID but not retrieved with getResponse. If there is no outstanding operation for the message ID (or if it is zero or a negative number), IllegalArgumentException is thrown. and Section 2.17.2 getResponse Blocks until a response is available for a particular message ID, or until all operations associated with the message ID have completed or been canceled, and returns the response. If there is no outstanding operation for the message ID (or if it is zero or a negative number), IllegalArgumentException is thrown. Perhaps a better name for these methods might be hasResponse() and nextResponse(), respectively, because they fit the descriptions and usage pattern better. 102. Section 2.17.1 getMessageIDs public int[] getMessageIDs() Didn't explain what is a message ID. Perhaps can be resolved as simply as making a reference to Section 4.1.1.1 of RFC 2251. Similar comment for methods in LDAPListener, LDAPMessage and the LDAPConnection.abandon() method. 103. Section 2.17.4 merge public void merge(LDAPListener listener2) Merges two listeners. Moves/appends the content from another listener to this one. and Section 2.30.4 merge public void merge(LDAPListener listener2) Can you merge different types of listeners (LDAPResponseListener with LDAPSearchListener and vice versa)? What about a user-defined LDAPListener implementation that is neither LDAPResponseListener nor LDAPSearchListener? Also, is this operation destructive in terms of listener2? After the operation, would listener2.getMessageIDs() return an empty array and its outstanding responses be removed? Need to be more explicit. 104. Section 2.2.6 getSyntaxString public String getSyntaxString() Returns the Object Identifier of the syntax of the attribute in dotted numerical format. Section 2.2.1 Constructors public LDAPAttributeSchema(String name, String oid, String description, String syntaxString, ... syntaxString Object Identifier of the syntax of the attribute - in dotted-decimal format. Section 2.18.1 Constructors syntaxString Object Identifier of the syntax that this matching rule is valid for - in dotted-decimal format. Section 2.18.3 getSyntaxString public String getSyntaxString() Returns the OID of the syntax that this matching rule is valid for. Why aren't these methods called getSyntaxOid() and the argument to the constructors called syntaxOid instead of syntaxString? 105. Section 2.18.1 Constructors public LDAPMatchingRuleSchema(String name, String oid, String description, String[] attributes, String syntaxString, String[] aliases) public LDAPMatchingRuleSchema(String name, String oid, String description, boolean obsolete, String syntaxString, String[] aliases) For all of the classes that are subclasses of LDAPSchemaElement, each has a single constructor with some optional arguments and a constructor that accepts a raw string. Why does this class need two similar constructors, one with 'obsolete' and the other 'attributes'. 106. 2.18.1 Constructors Which ones of these arguments are optional? The descriptions seem to say that the following are optional: description attributes aliases RFC 2252 says that the following are optional: name/aliases, description, obsolete attributes Need to clarify in the descriptions which are optional. If conforming to RFC 2252, then need to specify whether the corresponding methods (such as getName()) can return null. 107. 2.19.1 Constructors public LDAPMatchingRuleUseSchema(String name, String oid, String description, boolean obsolete, String[] attributes, String[] aliases) Which ones of these arguments are optional? The descriptions seem to say that the following are optional: description aliases RFC 2252 says that the following are optional: name/aliases description obsolete Need to clarify in the descriptions which are optional. If conforming to RFC 2252, then need to specify whether the corresponding methods (such as getName()) can return null. 108. Section 2.20 public class LDAPMessage Base class for asynchronous LDAP request and response messages. Not always async. Also used for LDAPExtendedResponse, which may be gotten as a synchronous response. 109. Section 2.21.1 Constructors ADD The value should be added to the attribute DELETE The value should be removed from the attribute REPLACE The value should replace all existing values of the attribute If you're going to explain these here, then make the descriptions complete or refer to RFC 2251. For example, ADD doesn't just add a value, it might affect the entire attribute. 110. Section 2.21.4 Constants of LDAPModification Same comment as 109. 111. Section 2.22 public class LDAPModificationSet A "set", by definition, is unordered. Why does a set have the following methods? 2.22.3 elementAt 2.22.5 removeElementAt Also, in Section 2.22.4 remove public void remove(String name) Removes the first attribute with the specified name in the set of modifications. 'the first' is meaningless in a set. Replace with 'an'. If it is really a set, then it should implement the java.util.Set interface. Furthermore, RFC 2251 requires the modifications to be a sequence: ModifyRequest ::= [APPLICATION 6] SEQUENCE { object LDAPDN, modification SEQUENCE OF SEQUENCE { operation ENUMERATED { add (0), delete (1), replace (2) }, modification AttributeTypeAndValues } } It might be more efficient and simpler to eliminate LDAPModificationSet and just use LDAPModification[]. 112. Section 2.23.1 Constructors public LDAPNameFormSchema(String name, String oid, String description, boolean obsolete, String objectClass, String[] required, String[] optional, String[] aliases) Which ones of these arguments are optional? The descriptions seem to say that the following are optional: description aliases RFC 2252 says that the following are optional: name/aliases description obsolete optional Need to clarify in the descriptions which are optional. If conforming to RFC 2252, then need to specify whether the corresponding methods (such as getName()) can return null. 113. Section 2.24.1 Constructors public LDAPObjectClassSchema(String name, String oid, String[] superiors, String description, String[] required, String[] optional, int type, String[] aliases, boolean obsolete) Which ones of these arguments are optional? The descriptions seem to say that the following are optional: description aliases RFC 2252 says that the following are optional: name/aliases desc obsolete superiors required optional type Need to clarify in the descriptions which are optional. If conforming to RFC 2252, then need to specify whether the corresponding methods (such as getName()) can return null. 114. Section 2.26.3 getPassword public byte[] getPassword() Returns the password to be used for reauthentication on automatic referral following. What if passwd was of type String when passed into the constructor? Is UTF-8 encoding used for the conversion always? What if you're using LDAP v2? 115. Section 2.27.3 getReferrals public String[] getReferrals() Gets the list of referral URLs (LDAP URLs to other servers) returned ... The referral list MAY include URLs of a type other than ones for an LDAP server (i.e. a referral URL other than ldap://something). Delete "LDAP" from the first sentence because it contradicts RFC 2251 and the last sentence in the section. 116. Section 2.28 public interface LDAPReferralHandler Shared ancestor to the two types of referal objects - LDAPBind and LDAPRebind. Typo. referal -> referral. 117. Section 2.29 public class LDAPResponse extends LDAPMessage Represents the response to a particular asynchronous LDAP operation. Not always asynchronous. 118. Section 2.31 public class LDAPSchema (method naming) The methods in this class has names that are confusing. For example, in Section 2.31.3 getAttribute: public LDAPAttributeSchema getAttribute( String name ) The result returned is actually an attribute schema, not an attribute. Similarly for Section 2.31.24 getSyntax public LDAPSyntaxSchema getSyntax( String oid ) and Section 2.31.25 getSyntaxes public Enumeration getSyntaxes() Returns an enumeration of LDAPSyntaxSchema objects. getSyntaxSchema() and getSyntaxSchemas() seem more appropriate names. All of the get* method would benefit by employing more appropriate names. 119. Section 2.31 public class LDAPSchema (method parameters) LDAPSchema defines several get methods based on the schema definition's name. public LDAPAttributeSchema getAttribute( String name ) public Enumeration getAttributeNames() public LDAPDITContentRuleSchema getDITContentRule( String name ) public Enumeration getDITContentRuleNames () public Enumeration getDITStructureRuleNames () public LDAPMatchingRuleSchema getMatchingRule( String name ) public Enumeration getMatchingRuleNames() public LDAPMatchingRuleUseSchema getMatchingRuleUse( String name ) public Enumeration getMatchingRuleUseNames() public LDAPNameFormSchema getNameForm( String name ) public Enumeration getNameFormNames () public LDAPObjectClassSchema getObjectClass( String name ) public Enumeration getObjectClassNames() Yet, according to RFC 2252, the corresponding schema definitions have the oid as mandatory and name as optional. AttributeTypeDescription = "(" whsp numericoid whsp ; AttributeType identifier [ "NAME" qdescrs ] ; name used in AttributeType ... ObjectClassDescription = "(" whsp numericoid whsp ; ObjectClass identifier [ "NAME" qdescrs ] ... MatchingRuleDescription = "(" whsp numericoid whsp ; MatchingRule identifier [ "NAME" qdescrs ] ... MatchingRuleUseDescription = "(" whsp numericoid whsp ; MatchingRule identifier [ "NAME" qdescrs ] ... DITContentRuleDescription = "(" numericoid ; Structural ObjectClass identifier [ "NAME" qdescrs ] ... NameFormDescription = "(" whsp numericoid whsp ; NameForm identifier [ "NAME" qdescrs ] ... DITStructureRuleDescription = "(" whsp ruleidentifier whsp ; DITStructureRule identifier [ "NAME" qdescrs ] Aren't the methods in LDAPSchema out of sync with RFC 2252? Is the only way to find a definition by OID to do a linear search? 120. Section 2.31.2 fetchSchema Seeing that there is a fetchSchema method in LDAPSchema, a user might expect to find a storeSchema method in the same class but the store methods are actually found in LDAPSchemaElement and has entirely different names. The LDAPSchema description should describe this, or better yet, be re-structured so that the store methods are in the same class. Here's one suggestion of how to make things symmetric and more intuitive. Redefine the constructors as follows. public LDAPSchema(LDAPConnection ld) throws LDAPException public LDAPSchema(LDAPConnection ld, String dn) throws LDAPException Remove LDAPSchemaElement.add/LDAPSchemaElement.modify/ LDAPSchemaElement.remove/ and add the following to LDAPSchema. public void add(LDAPSchemaElement) throws LDAPException public void modify(LDAPSchemaElement) throws LDAPException public void remove(LDAPSchemaElement) throws LDAPException If you need a method to refresh the schema, then add public void refresh() throws LDAPException; The schema from ld need not be loaded immediately when the constructor is called. In fact, the implementation might load it completely or even partially on demand, as required by the get* methods. The get methods would need a throws LDAPException clause. The result is a much cleaner design in which all of the physical schema access and update methods are localized in one class instead of being spread over two. 121. Section 2.31.2 fetchSchema The fetchSchema methods are the only methods that interact with a Directory Server. The other methods access information acquired through fetchSchema. An LDAPException is thrown as for LDAPConnection.search() (2.6.34) if the schema cannot be retrieved with the specified connection, or if the subschemaSubentry attribute used to locate the schema contains multiple values. The first two sentences are implementation details and should be omitted. The 3rd sentence describes how the schema is fetched (i.e., via a search) -- again, implementation detail that should be omitted. Delete "as for LDAPConnection.search() (2.6.34)". 122. Section 2.3.2 public abstract class LDAPSchemaElement 2.32.1 add 2.32.10 modify 2.32.11 remove See 120. Should move functionality to LDAPSchema, which already deals with the physical schema tree directly. 123. Why isn't LDAPSchemaElement Cloneable or Serializable? It would be useful to be able to clone and then modify the copy. It would be useful to be able to serialize schema elements to a file or other storage medium. 124. Can these return null? Section 2.32.2 getAliases public String[] getAliases() Section 2.32.3 getDescription public String getDescription() Section 2.32.4 getName public String getName() Section 2.32.5 getID public String getID() (LDAPDITStructureRuleSchema says getID() returns null). 125. Section 2.32.6 getQualifier public String[] getQualifier(String name) Returns an array of all values of a specified optional or experimental qualifier of the element. This method may be used to access the values of vendor-specific qualifiers (which begin with "X- " [ATTR]). and Section 2.32.7 getQualifierNames public Enumeration getQualifierNames() Returns an enumeration of all qualifiers of the element which are not defined in [ATTR]. Does getQualifier and getQualifierNames see the same namespace? Their method names imply so but their descriptions don't. getQualifier is a very general name and one would expect to get any qualifier, not just optional and experimental ones. Also, which are optional? Perhaps need to say that the list of optional qualifiers varies for each type of LDAPSchemaElement and is defined in RFC 2252. Also, if the method description is correct, then should choose a different name for the method. Same comments apply to Section 2.32.12 setQualifier. The method description for getQualifierNames suggests that the namespace is more restrictive than getQualifier's. If so, then the method name should reflect this. 126. Section 2.32.8 getValue (method name) public String getValue() Returns a String in a format suitable for directly adding to a Directory, as a value of the particular schema element attribute. Why not call this method toString()? The "value" of a schema element is what? It seems that this method is returning the string representation, and the typical way to do that is to use toString(). The name getValue() seems like it is equivalent to the other get methods (such as getName(), getID()). If toString() seems too generic, then how about toRfc2252Syntax()? 127. Section 2.32.8 getValue (method description) public String getValue() Returns a String in a format suitable for directly adding to a Directory, as a value of the particular schema element attribute. The description is too vague. In fact, this method should be abstract and a getValue() method should be added to each subclass of LDAPSchemaElement that clearly states the expected output of the method. It should use the language suggested for the 'raw' parameter descriptions. (See 83). For example, for LDAPAttributeSchema, getValue() must return a string encoded using the AttributeTypeDescription syntax [ATTR]. 128. Section 2.7 public class LDAPConstraints Why isn't LDAPConstraints cloneable? That would make it easier to make a copy of an existing LDAPConstraints and modify one or two parameters. This is especially useful for LDAPSearchConstraints. 129. Section 2.33.1 Constructors It might be useful to have an LDAPSearchConstraints constructor that accepts a LDAPConstraints argument. 130. Section 2.33.1 Constructors dereference Specifies when aliases should be dereferenced. MUST be either DEREF_NEVER, DEREF_FINDING, DEREF_SEARCHING, or DEREF_ALWAYS (DEREF_NEVER by default). and Section 2.33.3 getDereference public int getDereference() Specifies when aliases should be dereferenced. Returns either DEREF_NEVER, DEREF_FINDING, DEREF_SEARCHING, or DEREF_ALWAYS. either -> one of 131. Section 2.34.3 isComplete public boolean isComplete(int msgid) Reports true if all results have been received for a particular message ID. For search, it is true if a searchResultDone response has been received from the server for the id. ... LDAPSearchListener is used only for searches. 'For search' is redundant. 132. These concrete classes do not have any explicit constructors and no set methods to update their state. A public no-argument constructor will be made available by default. The user should not be creating instances of these. These are objects returned by the Java LDAP API implementation. They should be probably be interfaces instead of concrete classes. 2.16 public class LDAPExtendedResponse extends LDAPResponse 2.20 public class LDAPMessage 2.29 public class LDAPResponse extends LDAPMessage 2.35 public class LDAPSearchResult extends LDAPMessage 2.36 public class LDAPSearchResultReference extends LDAPMessage 2.37 public class LDAPSearchResults implements Enumeration 133. Section 2.37.5 nextElement public Object nextElement() Returns the next result in the enumeration as an Object. This the default implementation of Enumeration.nextElement(). The returned value may be an LDAPEntry or an LDAPException. Returning an exception is poor design and nonstandard. No other API in the Java platform uses enumerations in this way. This design forces the caller to check whether each element is a real answer or an exception. Look at the Appendix A, 8.1 example. LDAPSearchResults res = ld.search( MY_SEARCHBASE, ...); /* Loop on results until finished */ while ( res.hasMoreElements() ) { /* Next directory entry */ LDAPEntry findEntry = (LDAPEntry)res.nextElement(); With nextElement() defined the way it is, if you follow this example, then you'll get a ClassCastException if nextElement() returns an LDAPException. To avoid the exception, you'd need to write something like /* Next directory entry */ Object answer = res.nextElement(); if (answer instanceof LDAPEntry) { findEntry = (LDAPEntry) answer; } else if (answer instanceof LDAPException) { throw (LDAPException) answer; } As illustrated by this example, this API definition forces the user to write very awkward code. 134. Section 2.37.5 nextElement public Object nextElement() Returns the next result in the enumeration as an Object. This the default implementation of Enumeration.nextElement(). The returned value may be an LDAPEntry or an LDAPException. Can an LDAPException be returned midstream or is it always the last element in the enumeration? Are some exception fatal while others not? 135. Section 2.37.1 getCount public int getCount() Returns a count of the entries and exceptions in the search result. If the search is asynchronous (batch size not 0), this reports the number of results received so far. LDAPSearchResults is returned only for synchronous searches. A batch size of nonzero is not defined in this document as making a search 'asynchronous'. Probably want to use different wording to avoid confusion with real async searches. Exceptions are also included in this count so the caller has no real way of knowing how many entries there are. 136. Section 2.37.6 sort This implies that LDAPSearchResults.nextElement() will always block until all results have been retrieved, after a sort operation. This also means batch size will be ignored (be effectively 0) if you invoke sort. This method seems rather awkward. There is no corresponding functionality in the LDAP C API. It would seem more flexible and appropriate to just delete this method and use the sort/search facilities available in the Java Collections framework. That way, you have greater control over the data structures and algorithm. 137. Section 2.37.2 getResponseControls public LDAPControl[] getResponseControls() Returns the latest Server Controls returned by a Directory Server in the context of this search request. Is this supposed to return the controls associated with each LDAPEntry that got returned? Should it be invoked in tandem with each call to nextElement()? Does it block in the same way nextElement() does? Or does it return the controls returned by the server since the last time getResponseControls() was invoked. 138. Section 2.37.3 hasMoreElements public boolean hasMoreElements() Specifies whether or not there are more search results in the enumeration. If true, there are more search results. What about exceptions? Does an exception in the enumeration count as a "search result"? 139. Section 2.38 public interface LDAPSocketFactory. There is already a standard abstract class for socket factory: javax.net.SocketFactory. javax.net.SocketFactory is available as part of the Java Secure Socket Extension (JSSE) and also as part of the Java 2 Platform, Standard Edition, v 1.4. It is a general socket factory mechanism and encompasses the functionality of LDAPSocketFactory. There is nothing LDAP-specific about LDAPSocketFactory. public Socket makeSocket(String host, int port) throws IOException, UnknownHostException Even if you decide not to use javax.net.SocketFactory, at least change the name of this method to "createSocket" so that it is consistent with javax.net.SocketFactory. 140. Section 2.39.1 Constructors ... Note that adding and removing syntaxes is not typically a supported feature of LDAP servers. Don't know why this is here in the constructor class. Calling the constructor won't add or remove syntaxes from LDAP servers. It might belong in the class description or even maybe the LDAPSchema class. This note might be applicable for other types of schema elements as well and to schema updates in general. 141. Section 2.41.3 encode Encodes an arbitrary string. Any illegal characters are encoded as %HH. "illegal" is not the correct term to use here. This method could benefit from a better description. Also, not an arbitrary string, but the specified string. 142. Section 2.41.5 getAttributes public Enumeration getAttributes() Returns an Enumerator for the attribute names specified in the URL. Null OK? Or will empty enumeration be returned if there are none. 143. Section 2.41.12 getUrl public String getUrl() Returns a valid string representation of this LDAP URL. Why not call this method toString() instead of getUrl()? The method description seems to indicate that toString() is appropriate. 144. Section 2.41.1 Constructors public LDAPUrl(String host, int port, String dn, String[] attrNames, int scope, ... attrNames Names or OIDs of attributes to retrieve. Passing a null array signifies that all user attributes are to be retrieved. Passing a value of "*" allows you to specify that all user attributes as well as any specified operational attributes are to be retrieved. Can't pass a value of "*" because constructor wants a String[]. The description of "*" contradicts ALL_USER_ATTRS (Section 2.6.41). ALL_USER_ATTRS ("*") Used with search in an attribute list to indicate that all attributes (other than operational attributes) are to be returned. 145. Section 2.41.7 getExtensions public String[] getExtensions () Returns any LDAP URL extensions specified, or null if none are specified. Each extension is a type=value expression. The =value part MAY be omitted. The expression MAY be prefixed with '!' if it is mandatory for evaluation of the URL. The only constructor that allows extensions to be specified is the one that takes a raw URL String. Is that intended or is a String[] extensions argument missing from the 3rd constructor. 146. Section 3.1 Client and Server Controls Server controls returned to a client as part of the response to a synchronous operation can be obtained with LDAPConnection.getResponseControls() And LDAPSearchResults.getResponseControls(). 147. Section 3.2 Referral handling and exceptions, The "Synchronous requests" section often talks about exceptions being "thrown". However, those exceptions are also just returned via LDAPSearchResults.nextElement(), not necessarily thrown. 148. Section 3.2 Referral handling and exceptions When a referral is received, the application receives an LDAPResponse object with a result code of REFERRAL. If a continuation reference is received the application receives an LDAPSearchResultReference object. Not true for v2. 149. Section 3.2 Referral handling and exceptions Throughout this section, the document uses "the API" when "the implementation of the Java LDAP API" would be more appropriate. Two occurrences of "an LDAPReferral exception" should be changed to "an LDAPReferralException". 150. Section 3.5 Invalid responses If a message is received by an API implementation from the server and the message cannot be interpreted as an LDAP PDU, an LDAPException MUST be thrown with a result code of INVALID_RESPONSE. Same comment as 147. 151 Section 3.4 Level of compatibility (package name) Implementations ... and MUST be implemented with the package name org.ietf.ldap. The package name should be specified in Section 1 or 2, not in Section 3, under Implementation Considerations. The package name is not an implementation consideration, it is part of the API specification, just like a class name or a method name. 152. Section 3.4 Level of compatibility Implementations of the API are to be binary compatible, and ... Binary compatibility of Java programs is defined by the Java Programming Language and the Java Virtual Machine Specifications. Don't know the value added by the first sentence. Might be more useful to specify which version of the Java Platform and which Optional Packages this API depends on. There is a dependency on JAAS (javax.security.auth.callback.*). 153. Section 8 Appendix A - Sample java LDAP programs All code samples should follow the Code Conventions for the Java Programming Language, available at http://java.sun.com/docs/codeconv/ 154. Section 8.1 /* Fetch the schema (anonymous is okay for reading) */ This comment is not true for Active Directory: you need to be authenticated to read the schema. 155. Section 8.1, ShowSchema example ); /* What are the possible attributes for "person"? */ LDAPObjectClassSchema o = schema.getObjectClass( "person" ); if ( o != null ) { Enumeration required = o.getRequiredAttributes(); Enumeration optional = o.getOptionalAttributes(); System.out.println( "Required attributes for person:" ); while( required.hasMoreElements() ) System.out.println( " " + (String)required.nextElement() ); System.out.println( "Optional attributes for person:" ); while(optional.hasMoreElements() ) System.out.println( " " + (String) optional.nextElement() ); ); LDAPObjectClassSchema.getRequiredAttributes() and LDAPObjectClassSchema.getOptionalAttributes() return String[], not Enumeration, and the subsequent while loops need to be changed accordingly. The first and last line of code sample shown should be "}", not ");". 156. Section 8 Appendix The ModifyEmail example on page 124 is supposed to be asynchronous but it shows a synchronous usage of "modify" and "bind". 157. Section 2.11.5 isValid Returns true if the string conforms to distinguished name syntax (section 3 of [DN]. It MAY return true also if the string conforms to section 4 of [DN]. Missing closing parens. 158. Section 2.14.8 Result codes The meanings of the result codes not covered by RFC 2251 need to be stated explicitly. AMBIGUOUS_RESPONSE (0x65) AUTH_UNKNOWN (0x56) CLIENT_LOOP (0x60) CONNECT_ERROR (0x5b) CONTROL_NOT_FOUND (0x5d) DECODING_ERROR (0x54) ENCODING_ERROR (0x53) FILTER_ERROR (0x57) INVALID_RESPONSE (0x64) LOCAL_ERROR (0x52) LDAP_NOT_SUPPORTED (0x5c) LDAP_TIMEOUT (0x55) MORE_RESULTS_TO_RETURN (0x5f) NO_MEMORY (0x5a) NO_RESULTS_RETURNED (0x5e) REFERRAL_LIMIT_EXCEEDED (0x61) SERVER_DOWN (0x51) USER_CANCELLED (0x58) TLS_NOT_SUPPORTED (0x70) Also, isn't NO_MEMORY already covered by the VM error OutOfMemoryError? From list@netscape.com Fri Jun 22 20:36:03 2001 Received: from netscape.com (r2d2.netscape.com [205.217.237.47]) by ietf.org (8.9.1a/8.9.1a) with SMTP id UAA16859 for ; Fri, 22 Jun 2001 20:36:01 -0400 (EDT) Received: from aka.mcom.com (aka.mcom.com [205.217.237.180]) by netscape.com (8.10.0/8.10.0) with ESMTP id f5N0WJr28764; Fri, 22 Jun 2001 17:32:20 -0700 (PDT) Received: (from list@localhost) by aka.mcom.com (8.10.0/8.10.0) id f5N0WKk12944; Fri, 22 Jun 2001 17:32:20 -0700 (PDT) Resent-Date: Fri, 22 Jun 2001 17:32:20 -0700 (PDT) Date: Fri, 22 Jun 2001 20:33:59 -0400 (EDT) Message-Id: <200106230033.f5N0XxS13741@mailhost.digitalselect.net> From: cl10rmgm@msn.com To: 7rr6qg@msn.com Reply-To: rexbrachle579@excite.com Subject: Expand Your Business! [clo8g] Resent-Message-ID: <"pf3Nz.A.PJD.SO-M7"@glacier> Resent-From: ietf-ldapext@netscape.com X-Mailing-List: X-Loop: ietf-ldapext@netscape.com Precedence: list Resent-Sender: ietf-ldapext-request@netscape.com Expand your business! Make it easy for your customers to pay using Visa, Master Card, Discover, American Express, Debit Card and Checks via Phone/Fax/Internet. How? Through a business Merchant Account! By providing multiple methods of acceptable payment you automatically help ensure that it will be easier for them to pay you and build up trust. People DON'T want to send cash or checks via mail, because it is dangerous and gives them absolutely no guarantees whatsoever. So make it easier for your customers and setup a Merchant Account for your business. There are NO setup fees, and the monthly costs are very low. To obtain more information, please reply to this email with your name, phone number with area code, and a good time to call. You will be contacted within 10 business days by one of our staff. Thank you for your time. To be removed from our contact list, send us an email with the subject "Remove" and you will be automatically taken off our list. If removal does not work, reply with your email address in the Body of the email From list@netscape.com Sat Jun 23 07:29:27 2001 Received: from netscape.com (c3po.netscape.com [205.217.237.46]) by ietf.org (8.9.1a/8.9.1a) with SMTP id HAA09355 for ; Sat, 23 Jun 2001 07:29:27 -0400 (EDT) Received: from aka.mcom.com (aka.mcom.com [205.217.237.180]) by netscape.com (8.10.0/8.10.0) with ESMTP id f5NBRqY20022; Sat, 23 Jun 2001 04:27:52 -0700 (PDT) Received: (from list@localhost) by aka.mcom.com (8.10.0/8.10.0) id f5NBRqM21160; Sat, 23 Jun 2001 04:27:52 -0700 (PDT) Resent-Date: Sat, 23 Jun 2001 04:27:52 -0700 (PDT) From: hjkdfg@excite.com To: jackyfan2002@yahoo.com Subject: RECEIVE $2,000 in one WEEK !! GUARANTEED!! --------------maily5 Date: Sat, 23 Jun 01 01:32:18 Hawaiian Standard Time Reply-To: Yllaxis@yahoo.com X-Mailer: [12.87.149.207] 196.34.144.100] (helo=66.97.0.6) X-Priority: 3 X-MSMailPriority: Normal Importance: Normal Message-Id: Resent-Message-ID: <"8P4OB.A.QKF.30HN7"@glacier> Resent-From: ietf-ldapext@netscape.com X-Mailing-List: X-Loop: ietf-ldapext@netscape.com Precedence: list Resent-Sender: ietf-ldapext-request@netscape.com R E C E I V E $1,000 COMMISSION every $0 down SALE !! DID YOU MAKE $8,000 LAST MONTH? IF NOT, YOU NEED TO JOIN US TODAY! $0 DOWN ! 100% FINANCING - 100% CASH MACHINE EVERYBODY IS A PROSPECT - 99% APPROVED EARN $1,000 ON EVERY A THROUGH F CREDIT SALE! EARN $1,000 ON EACH AND EVERY SALE TO INFINITY! REQUEST MORE INFO NOW! send an e-mail to: mailybox@yahoo.com with SEND INFO in the subject line or JUST CLICK on "Reply" NOW!! Available for USA residents only. ~~~~~~~~~~~ MARKET the hottest consumer savings package in America today and earn $1,000 each and every time someone joins for $0 DOWN! NO hard selling, NO cold calls - 100% AUTOPILOT Imagine being plugged into a proven system that puts your entire business on auto-pilot and have you earning MINIMUM $2,000 every week! GUARANTEED!! IT'S TRUE! You can be in business for $0 DOWN! And you can easily make $2,000 your very FIRST week .. . and we'll show you how! Your business will literally explode overnight when you join our team and plug into the BEST marketing system available on the web! Most OUTSTANDING: Receive FULL SUPPORT 24 hrs!! ~~~~~~~~~~~ REQUEST MORE INFO NOW! send an e-mail to: mailybox@yahoo.com with SEND INFO in the subject line or JUST CLICK on "Reply" NOW!! Available for USA residents only. To remove please click: remove12341@excite.com From list@netscape.com Sat Jun 23 10:29:10 2001 Received: from netscape.com (c3po.netscape.com [205.217.237.46]) by ietf.org (8.9.1a/8.9.1a) with SMTP id KAA11572 for ; Sat, 23 Jun 2001 10:29:10 -0400 (EDT) Received: from aka.mcom.com (aka.mcom.com [205.217.237.180]) by netscape.com (8.10.0/8.10.0) with ESMTP id f5NERfY27570; Sat, 23 Jun 2001 07:27:41 -0700 (PDT) Received: (from list@localhost) by aka.mcom.com (8.10.0/8.10.0) id f5NERfM16275; Sat, 23 Jun 2001 07:27:41 -0700 (PDT) Resent-Date: Sat, 23 Jun 2001 07:27:41 -0700 (PDT) Message-Id: <5.1.0.14.0.20010623072033.00af7360@127.0.0.1> X-Sender: kurt@127.0.0.1 X-Mailer: QUALCOMM Windows Eudora Version 5.1 Date: Sat, 23 Jun 2001 07:23:38 -0700 To: "Karen Gdaniec" From: "Kurt D. Zeilenga" Subject: Re: LDAP Result Codes Cc: Bruce Greenblatt , ietf-ldapext@netscape.com In-Reply-To: Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Resent-Message-ID: <"w0sbiB.A.59D.bdKN7"@glacier> Resent-From: ietf-ldapext@netscape.com X-Mailing-List: X-Loop: ietf-ldapext@netscape.com Precedence: list Resent-Sender: ietf-ldapext-request@netscape.com At 09:29 AM 6/20/2001, Karen Gdaniec wrote: >So, at this point I've received two conflicting comments on the use of >LDAP_OPERATIONS_ERROR. We and other server developers need some concensus >here. I suggest this issue be raised on the LDAPbis WG mailing list so that any consensus reached can be reflected in the revised LDAPv3 "core" specification. Kurt From list@netscape.com Sat Jun 23 15:42:06 2001 Received: from netscape.com (r2d2.netscape.com [205.217.237.47]) by ietf.org (8.9.1a/8.9.1a) with SMTP id PAA16162 for ; Sat, 23 Jun 2001 15:42:05 -0400 (EDT) Received: from aka.mcom.com (aka.mcom.com [205.217.237.180]) by netscape.com (8.10.0/8.10.0) with ESMTP id f5NJeXr22427; Sat, 23 Jun 2001 12:40:33 -0700 (PDT) Received: (from list@localhost) by aka.mcom.com (8.10.0/8.10.0) id f5NJeX210241; Sat, 23 Jun 2001 12:40:33 -0700 (PDT) Resent-Date: Sat, 23 Jun 2001 12:40:33 -0700 (PDT) Date: Sat, 23 Jun 2001 15:40:54 -0500 From: tigger6026@bugjuise.net Reply-To: mfjiue87@runbox.com Message-Id: Subject: I WAS SICK OF BEING FAT!! X-Mailer: Microsoft Outlook Express 5.50.4133.2400 To: estoddca@netscape.com CC: ietf-ldapext-request@netscape.com, ietf-ldapext@netscape.com, humorchannel@netscape.com, husjon@netscape.com, hyama@netscape.com, imad@netscape.com, ibrahimokka@netscape.com, idesignwebcom@netscape.com, ibagna@netscape.com, ibd-feedback@netscape.com, ibendersen@netscape.com, imexa@netscape.com, html-evang-input@netscape.com, tward@netscape.com, undenied@netscape.com Content-Type: text/html; charset="iso-8859-1" Content-Transfer-Encoding: 8BIT Resent-Message-ID: <"NbrwO.A.bfC.uCPN7"@glacier> Resent-From: ietf-ldapext@netscape.com X-Mailing-List: X-Loop: ietf-ldapext@netscape.com Precedence: list Resent-Sender: ietf-ldapext-request@netscape.com Content-Transfer-Encoding: 8BIT

I sincerely apologize if you are receiving this e-mail in error.

I have been taking an herbal formula for 10 months and it has saved my family
and my life. Because of this I have made a commitment to get the word out on
this life-changing product, so that it will be available to everyone.

My name is Dana Hampton. I'm a married 37-year-old mother of 4 who was a
happy size 7 before my first child and who grew 4 dress sizes larger by my
fourth pregnancy.
It's amazing how long you can avoid dealing with a problem that you simply
don't want to face up to.
I didn't like the way I looked and I didn't like the way I felt. I was at the
point where I just didn't want to live and have to face another day.
I WAS SICK OF BEING FAT!
I FELT THAT I OWED IT TO MY HUSBAND, MY FOUR CHILDREN, AND MYSELF TO MAKE ONE
MORE ATTEMPT AT WEIGHT LOSS.

I have researched and tried many weight loss programs during my " yo-yo
dieting" years. I did Slim Fast, Cybervision, Atkins, soup diets, starvation,
"exercise and eat no fat," chromium picolinate, metabolic enhancers, and
more. You name it, I tried it!
I lost some pounds with every diet, but eventually gained them back, usually
with a few extra pounds. On every one of those diets, I lost energy, and
eventually had to eat a lot to feel better. I was grouchy with a short fuse.
This even happened during the diet where I exercised and ate less with only
low-fat foods, the better-known "right way" to lose weight. I'm sure losing
weight that way works OK for many people, but it just didn't work very well
for me.
It seemed my metabolism froze, and I was going to stay at that weight
forever, but I wanted to look better and be healthy. I was very depressed and
disappointed. I dieted on and off, but got nowhere. The weight kept
returning.
I suddenly realized just how difficult this weight problem had really become.
Now I understood why so many people have the same problem.

I almost gave up. Then, I remembered something I heard from old my friend
Janie. She told me about a company who makes a nutritionally-engineered
weight loss product, which
ACCELERATES WEIGHT LOSS. It was developed by
European Scientists and had been kept a secret for years, UNTIL NOW.
Scientists from an American Nutriceutical company met up with their top
scientist and brought the secret here. It is a unique product, called
BerryTrim Plus, and

NO OTHER PRODUCT HAS THESE INGREDIENTS.

It sounded too good to be true. I didn't want to get all hyped up about some
new program, and I didn't want to add one more diet to my failure list.
What really made me decide to try it were all the testimonials I read on
their web site, written by so many Doctors, Celebrities, and people like you
and me.

I called for my 30-day supply and was so amazed when only after the first 3
days, I began to experience a sense of "well being" - something I hadn't felt
for months, maybe years. I felt ENERGIZED, not to mention my sugar/chocolate
cravings were absolutely gone!

I COULD NOT BELIEVE THE DIFFERENCE I FELT!

I began to hope again - maybe I could lose this old weight. I gave this
pursuit up months before and had boxed up my smallest clothes to give away!
After 5 weeks of BerryTrim Plus I had already lost 10 inches off my hips and
thighs and,

OH JOY! I FINALLY SEE MY WAIST LINE!

Not to mention,

THE SCALE WAS ACTUALLY SPINNING BACKWARDS AND SHOWING A

TREMENDOUS WEIGHT LOSS!

THE BEST PART IS, I DIDN'T CHANGE ANYTHING ABOUT THE WAY I ATE, WHAT I ATE,
OR ADD AN EXERCISE ROUTINE TO MY DAILY REGIMEN. ALL I DID WAS USE THE
PRODUCT, AND THE WEIGHT SIMPLY CAME OFF…
EASILY AND SAFELY! THAT'S IT.


Well, now today I'm 4 dress sizes & 7 jean sizes smaller + 26½ inches are
gone!
I FEEL ABSOLUTELY WONDERFUL!
I really wish I could show you how I looked 10 months ago compared to how I
look now. The differences are unbelievable. I recently traveled and when I
had to show a picture I.D. at the airport for security reasons, the airline
agent asked for "another" form of picture I.D. because my driver's license
picture doesn't look like me anymore!

It's kind of embarrassing receiving all of the compliments about how " great I
look" now. It's even more embarrassing to mention it. But they keep coming.
The greatest compliment I got was from my husband, Recently, he told me,
"Olivia, you really look great, you look like the young girl I kissed at our
wedding." I said, "WHAT?" He told me that I "looked younger". He said my face
looked especially younger, "you look like the real you!"
It was true, just like everything I had read about the product. It all came
true!
That was a first for any weight loss program I had ever tried.
The changes that took place were both subtle and obvious. Here are some of
them:
MY ATTITUDE IMPROVED
I HAVE LESS TENSION AND ANXIETY
RELATIONSHIPS WITH MY FAMILY IMPROVED
QUALITY OF MY SLEEP IMPROVED
I NOW SLEEP THROUGH THE ENTIRE NIGHT
I HAVE GREATER ENERGY
COMPULSIVE EATING DECREASED
CRAVINGS FOR SWEETS DECREASED
I HAVE LESS FREQUENT HOT FLASHES
NO LONGER DRINK CAFFEINE THROUGHOUT THE DAY
NO LONGER SLEEP FOR HOURS IN THE AFTERNOONS
NO LONGER EXPERIENCE DISCOMFORT WITH MOVEMENT.

I feel better now than I've felt in years. Thanks to BerryTrim Plus and
Janie, who introduced me to it.
I invite you to try it for 30-days. I promise you'll be calling for more soon
after!"
Look, if you want to try out this product, it can change your life. If you
don't want to, that's OK too. At least find some way to lose weight that
works for you. Your life will change after you lose the weight. Many people
won't try it because they won't believe it. Unfortunately, with all the
marketing and scams out there, we all have to be skeptical. If I tried to
hand out fifty dollar bills on a city sidewalk, most people would not take it
because they would think it was some kind of trick. This is not a trick. It
worked for me.
Whether you need to take off five pounds or five hundred, this will help you
do it in a healthy way. The company has a 60-day money-back guarantee, and I
called to check on that. They get practically no returns and 92% re-orders.
That says it all if you ask me. You order directly from the company and use a
credit card. Their link is at the end of this story. , Click through this
website thoroughly and marvel over what this amazing product has done for so
many people like you and me!

I can assure you that I would not publicly put my credibility on the line
unless everything I have told you here was 100% true. So, do take a look at
the many success stories from others who have gained better health, improved
their relationships, and of course, lost weight and are keeping it off for
good. The testimonials speak for themselves. And if you decide this is
something you are willing to try - GO FOR IT!!!!! You won't be sorry. Do take
the time to read them. Many are more AMAZING than my own!

Click here to read many of the success stories.

CLICK HERE

Thank you for your patience and interest.
God Bless,
Dana Hampton


This message is brought to you by BerryTrim Affiliate# 3b2eaac90544da44
To be removed reply with REMOVE in the subject line.

From list@netscape.com Sat Jun 23 17:45:20 2001 Received: from netscape.com (c3po.netscape.com [205.217.237.46]) by ietf.org (8.9.1a/8.9.1a) with SMTP id RAA17941 for ; Sat, 23 Jun 2001 17:45:20 -0400 (EDT) Received: from aka.mcom.com (aka.mcom.com [205.217.237.180]) by netscape.com (8.10.0/8.10.0) with ESMTP id f5NLhqY16847; Sat, 23 Jun 2001 14:43:53 -0700 (PDT) Received: (from list@localhost) by aka.mcom.com (8.10.0/8.10.0) id f5NLhsA00415; Sat, 23 Jun 2001 14:43:54 -0700 (PDT) Resent-Date: Sat, 23 Jun 2001 14:43:54 -0700 (PDT) Message-Id: <200106232144.f5NLiJi21084@xwing.aoltw.net> From: "Cash Heaven" To: Sender: "Cash Heaven" Mime-Version: 1.0 Content-Type: text/plain; charset="ISO-8859-1" Date: Sat, 23 Jun 2001 18:04:05 -0400 Reply-To: "Cash Heaven" Content-Transfer-Encoding: 8bit Resent-Message-ID: <"9b7pLD.A.FG.Y2QN7"@glacier> Resent-From: ietf-ldapext@netscape.com X-Mailing-List: X-Loop: ietf-ldapext@netscape.com Precedence: list Resent-Sender: ietf-ldapext-request@netscape.com Content-Transfer-Encoding: 8bit From list@netscape.com Sun Jun 24 18:42:46 2001 Received: from netscape.com (c3po.netscape.com [205.217.237.46]) by ietf.org (8.9.1a/8.9.1a) with SMTP id SAA16584 for ; Sun, 24 Jun 2001 18:42:46 -0400 (EDT) Received: from aka.mcom.com (aka.mcom.com [205.217.237.180]) by netscape.com (8.10.0/8.10.0) with ESMTP id f5OMfHY22883; Sun, 24 Jun 2001 15:41:17 -0700 (PDT) Received: (from list@localhost) by aka.mcom.com (8.10.0/8.10.0) id f5OMfIU04982; Sun, 24 Jun 2001 15:41:18 -0700 (PDT) Resent-Date: Sun, 24 Jun 2001 15:41:18 -0700 (PDT) Message-ID: <000a01c0fcf6$2de96a00$5c32ac3f@Dad> From: "sandra adams" To: Subject: homeworker Date: Sun, 24 Jun 2001 15:39:38 -0600 MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="----=_NextPart_000_0007_01C0FCC3.E0972D00" X-Priority: 3 X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook Express 5.00.2314.1300 X-MimeOLE: Produced By Microsoft MimeOLE V5.00.2314.1300 Resent-Message-ID: <"PQZWZD.A.cNB.NymN7"@glacier> Resent-From: ietf-ldapext@netscape.com X-Mailing-List: X-Loop: ietf-ldapext@netscape.com Precedence: list Resent-Sender: ietf-ldapext-request@netscape.com This is a multi-part message in MIME format. ------=_NextPart_000_0007_01C0FCC3.E0972D00 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable seeking home employment , please advise of your list of opportunities. = Thank you. ------=_NextPart_000_0007_01C0FCC3.E0972D00 Content-Type: text/html; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable
seeking home employment , please advise = of your=20 list of opportunities.  Thank you.
------=_NextPart_000_0007_01C0FCC3.E0972D00-- From list@netscape.com Sun Jun 24 20:31:44 2001 Received: from netscape.com (r2d2.netscape.com [205.217.237.47]) by ietf.org (8.9.1a/8.9.1a) with SMTP id UAA17334 for ; Sun, 24 Jun 2001 20:31:43 -0400 (EDT) Received: from aka.mcom.com (aka.mcom.com [205.217.237.180]) by netscape.com (8.10.0/8.10.0) with ESMTP id f5P0U6r00012; Sun, 24 Jun 2001 17:30:06 -0700 (PDT) Received: (from list@localhost) by aka.mcom.com (8.10.0/8.10.0) id f5P0U7M23577; Sun, 24 Jun 2001 17:30:07 -0700 (PDT) Resent-Date: Sun, 24 Jun 2001 17:30:07 -0700 (PDT) Message-ID: <000067a005ed$000040c3$00002c9f@mail3.bugjuise.net> To: From: illzshakur@bugjuise.net Subject: You Won The First Round! claim# 3518 11423 Date: Thu, 16 Sep 1999 19:17:29 -0400 MIME-Version: 1.0 Content-Type: text/html; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable X-Priority: 3 X-MSMail-Priority: Normal Reply-To: kara5678@runbox.com X-OriginalArrivalTime: 25 Jun 2001 00:18:34.0533 (UTC) FILETIME=[5F383D50:01C0FD0C] Resent-Message-ID: <"441nwB.A.rvF.NYoN7"@glacier> Resent-From: ietf-ldapext@netscape.com X-Mailing-List: X-Loop: ietf-ldapext@netscape.com Precedence: list Resent-Sender: ietf-ldapext-request@netscape.com Content-Transfer-Encoding: quoted-printable

You Have Won The First Round!

Claim Your Entry Now!

Collect The Prize Of The Week!<= /b>

Click Here To Collect!

 

to be removed reply to this message w= ith "REMOVE" in the subject line

From list@netscape.com Sun Jun 24 23:17:21 2001 Received: from netscape.com (c3po.netscape.com [205.217.237.46]) by ietf.org (8.9.1a/8.9.1a) with SMTP id XAA20525 for ; Sun, 24 Jun 2001 23:17:21 -0400 (EDT) Received: from aka.mcom.com (aka.mcom.com [205.217.237.180]) by netscape.com (8.10.0/8.10.0) with ESMTP id f5P3DJY07040; Sun, 24 Jun 2001 20:13:19 -0700 (PDT) Received: (from list@localhost) by aka.mcom.com (8.10.0/8.10.0) id f5P3DLc21795; Sun, 24 Jun 2001 20:13:21 -0700 (PDT) Resent-Date: Sun, 24 Jun 2001 20:13:21 -0700 (PDT) Message-Id: <200106250300.f5P30I811094@www.justit.co.kr> From: "Sal Guinis" Subject: Home Based Reps. Needed #52D0 To: on39f@www.justit.co.kr X-Mailer: Microsoft Outlook Express 4.72.1712.3 X-MimeOLE: Produced By Microsoft MimeOLE V(null).1712.3 Mime-Version: 1.0 Date: Sun, 24 Jun 2001 22:10:24 -0500 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: 8bit X-MIME-Autoconverted: from quoted-printable to 8bit by aka.mcom.com id f5P3DJv21763 Resent-Message-ID: <"7PNmyB.A.JUF.PxqN7"@glacier> Resent-From: ietf-ldapext@netscape.com X-Mailing-List: X-Loop: ietf-ldapext@netscape.com Precedence: list Resent-Sender: ietf-ldapext-request@netscape.com Content-Transfer-Encoding: 8bit NEW COMPANY SEEKS REPS! NEW Women's Product Mentioned On Oprah CALL NOW...1-888-881-7128 Leave Your Info After The 3 Minute SIZZLE Message Dear Opportunity Seeker, They say that two genuine opportunities come to us in a lifetime. Well...Here is one of them. Back in 1999 when a major pharmaceutical company developed the little blue pill...it left many sexually unsatisfied women asking..."Where's Mine?". A well known OBGYN of 22+ years has developed a product that is Sexy, Profitable, Discreet and actually works on the majority of women. "Did you know that the Sexual Dysfunction Product industry did over $1 BILLION in sales last year with the little blue pill alone?" Do YOU Want A Piece? Here is why we feel this opportunity is HUGE! * 43% of Adult women could use it. * Its a BILLION Dollar Industry * Product is all natural * Product is gaining BRAND Recognition by being mentioned on shows such as Oprah, EXTRA, and many many local evening NEWS reports as we speak. All of which had POSITIVE feedback to report back to their viewers * Highly Profitable...Many REPS are making $750 to $5000 a week ! Some are already making a consistent 5 figure check each and every week. * Low startup cost * Its over the counter, and does NOT need a prescription. * Average of 1 out of every 20 people that are signing up to become distributors are in the medical profession, Doctors, Nurses, Nurses Aides, etc. * GROUND FLOOR Opportunity- It just started Jan 22, 2001. * Company is a subsidiary of a PUBLICLY traded company that has been on NASDAQ and around for over 10 years. CALL NOW...1-888-881-7128 Leave Your Info After The 3 Minute SIZZLE Message ******************************************************************** If you have never requested more information on Bizops please remove at: mailto:harton56@yahoo.com?subject=remove ********************************************************************* From list@netscape.com Mon Jun 25 05:08:49 2001 Received: from netscape.com (r2d2.netscape.com [205.217.237.47]) by ietf.org (8.9.1a/8.9.1a) with SMTP id FAA09183 for ; Mon, 25 Jun 2001 05:08:48 -0400 (EDT) Received: from aka.mcom.com (aka.mcom.com [205.217.237.180]) by netscape.com (8.10.0/8.10.0) with ESMTP id f5P97Gr00996; Mon, 25 Jun 2001 02:07:16 -0700 (PDT) Received: (from list@localhost) by aka.mcom.com (8.10.0/8.10.0) id f5P97GQ07901; Mon, 25 Jun 2001 02:07:16 -0700 (PDT) Resent-Date: Mon, 25 Jun 2001 02:07:16 -0700 (PDT) Message-Id: Date: Mon, Jun 2001 19:05:15 From: hotandsteamy@aol.com Mime-Version: 1.0 To: Subject: Anything you can think of... Content-Type: text/plain; charset="us-ascii" Resent-Message-ID: <"itrVv.A.F7B.C9vN7"@glacier> Resent-From: ietf-ldapext@netscape.com X-Mailing-List: X-Loop: ietf-ldapext@netscape.com Precedence: list Resent-Sender: ietf-ldapext-request@netscape.com NEARLY 19 AND READY FOR GOOD LOVIN' http://www.nearly19.com/?goodlooks 100,000+ Teen Pics Tiny Tit Teens Hidden Cams First time ****ing Teen Sex Chat College C*** Licking XXX Games Live Teen Sex Feeds Virginal Pussies Extreme Teen Videos Barely Legal Babes Sweet Teen Sex Stories Teen Orgies Dorm Muff-Diving Too much more to list. Check it out for yourself @ http://www.nearly19.com/?goodlooks To be removed from this list, click on the link below and you WILL be removed http://hidden-mail.com/?address=ietf-ldapext@netscape.com #bM#aWV0Zi1sZGFwZXh0QG5ldHNjYXBlLmNvbQ==#eM# From list@netscape.com Tue Jun 26 03:34:54 2001 Received: from netscape.com (r2d2.netscape.com [205.217.237.47]) by ietf.org (8.9.1a/8.9.1a) with SMTP id DAA24488 for ; Tue, 26 Jun 2001 03:34:53 -0400 (EDT) Received: from aka.mcom.com (aka.mcom.com [205.217.237.180]) by netscape.com (8.10.0/8.10.0) with ESMTP id f5Q7WOr04306; Tue, 26 Jun 2001 00:32:24 -0700 (PDT) Received: (from list@localhost) by aka.mcom.com (8.10.0/8.10.0) id f5Q7WPc24098; Tue, 26 Jun 2001 00:32:25 -0700 (PDT) Resent-Date: Tue, 26 Jun 2001 00:32:25 -0700 (PDT) Message-Id: <200106260730.f5Q7Uxm20817@ywing.netscape.com> From: "Dan Howard" Subject: Get Cash Fast! To: <#field0#@ywing.aoltw.net> Date: Mon, 25 Jun 2001 21:44:06 -0700 X-Mailer: diffondi V4,0,1,0 (W95/NT) (Build: Feb 20 2001) Mime-Version: 1.0 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: 8bit X-MIME-Autoconverted: from quoted-printable to 8bit by aka.mcom.com id f5Q7WGv23969 Resent-Message-ID: <"QIG-SB.A.B4F.HqDO7"@glacier> Resent-From: ietf-ldapext@netscape.com X-Mailing-List: X-Loop: ietf-ldapext@netscape.com Precedence: list Resent-Sender: ietf-ldapext-request@netscape.com Content-Transfer-Encoding: 8bit We will help you get the mortgage loan you want! Whether a new home loan is what you seek or to refinance your current home loan at a lower interest rate, we can help! Mortgage rates haven't been this low in the last 12 months, take action now! Refinance your home with us and include all of those pesky credit card bills or use the extra cash for that pool you've always wanted... Where others say NO, we say YES!!! Even if you have been turned down elsewhere, we can help! Easy terms! Our mortgage referral service combines the highest quality loans with the most economical rates and the easiest qualifications! Take just 2 minutes to complete the following form. There is no obligation, all information is kept strictly confidential, and you must be at least 18 years of age. Service is available within the United States only. This service is fast and free. Free information request form: PLEASE VISIT www.webbprofit.com **************************************************************** Since you have received this message you have either responded to one of our offers in the past or your address has been registered with us. If you wish to be removed please reply to: mailto:jim984@post.com?subject=remove **************************************************************** From list@netscape.com Tue Jun 26 03:48:21 2001 Received: from netscape.com (r2d2.netscape.com [205.217.237.47]) by ietf.org (8.9.1a/8.9.1a) with SMTP id DAA24681 for ; Tue, 26 Jun 2001 03:48:19 -0400 (EDT) Received: from aka.mcom.com (aka.mcom.com [205.217.237.180]) by netscape.com (8.10.0/8.10.0) with ESMTP id f5P5hFr17054; Sun, 24 Jun 2001 22:43:16 -0700 (PDT) Received: (from list@localhost) by aka.mcom.com (8.10.0/8.10.0) id f5P5hGg21183; Sun, 24 Jun 2001 22:43:16 -0700 (PDT) Resent-Date: Sun, 24 Jun 2001 22:43:16 -0700 (PDT) Message-ID: <00004ff25bb1$00000ba0$00001903@taffar (pool-209-138-205-92-dlls.grid.net [219.138.205.92]) by smtp7.atl.mindspring.net (ts029d25.nil-ny.concentric.net [216.173.24.181])> To: From: e4ent@mailhost.blue-whale.com Subject: Stoke Smoke.... Date: Sun, 24 Jun 2001 21:36:41 -0700 X-Priority: 3 X-MSMail-Priority: Normal X-Mailer: Mozilla 4.72 [en] (Win98; U) Resent-Message-ID: <"XvXAyB.A.fKF.y9sN7"@glacier> Resent-From: ietf-ldapext@netscape.com X-Mailing-List: X-Loop: ietf-ldapext@netscape.com Precedence: list Resent-Sender: ietf-ldapext-request@netscape.com Greetings & Blessings To You! Offering for your "Sensitive" Delight: 1. "Seventh Heaven" Kathmandu Temple Kiff (tm); a viripotent cannabis alternative for blissful regressions of vexatious depressions... 2. Sweet Vjestika Aphrodisia Drops (tm); An erotic aphrodisia; sexual intensifier / enhancer liquid amalgamated extract for MEN and WOMEN. 3. "Seventh Heaven" Prosaka Tablets (tm); A botanical alternative to pharmaceutical medications for calm, balance, serenity and joyful living... 4. "Seventh Heaven" Gentle Ferocity Tablets (tm); a most efficacious, non-caffeine, non-ephedrine, non-MaHuang botanical energizer... ********************************************* Kathmandu Temple Kiff is a proprietary; Nepalese, sensitive, pipe-smoking/stoking substance. Kathmandu Temple Kiff is indeed the most substantial marijuana/ cannabis alternative on the planet. Absolutely Legal! Marvelously Potent! Kathmandu Temple Kiff possesses all of the positive virtues of fine ganja/cannabis without any of the negatives. An amalgamation of high concentrates of rare euphoric herbas, Kathmandu is offered in a solid jigget/bar format and is actually more UPLIFTING & POISED than cannabis/ marijuana while rendering Euphoria, Happiness, Mood-Enhancement, Stress/Depression Relief and promoting contemplativeness, creativity, better sleep, lucid dreaming... and enhancing the sexual experience!!! Kathmandu Temple Kiff is simply the best and just a little pinch/snippet of the Kathmandu goes a long, "sensitive" way. Just 4 or 5 draws of the pipe ... (an herb pipe included with each package of Kathmandu Temple Kiff). PLEASE NOTE: Although no botanical factor in Kathmandu Temple Kiff is illegal or considered to be harmful by regulatory agencies and no tobacco is included therein, it is the policy of our company that Kathmandu Temple Kiff may not be offered or sold to any person that has not attained at least 21 years of age. Ingredients: Kathmandu Temple Kiff is both a euphoriant & an uplifting, calmative relaxant that offers scintillating physical and cerebral ambiance enhancement. Kathmandu Temple Kiff is a proprietary, prescribed amalgamation which includes the following synergistically, synesthesia conglomerated, uncommon herbs, resins, essences, flower-tops and oils in extreme ratio extractment ranging from 8.5 to 1. to 60 to 1, viripotent concentrations : Drachasha, Chavana Prash, Trikatu, Black Seed Herb, Capillaris Herba, Angelica Root, Wild Dagga, Haritaki, Shatavari, Labdunum, Neroli, Unicorn Root, Papaver Rhoes, Dendrobian, Calea Zacalechichi, Rue, Amla, Salvia Divinorum, Crocus Sativa, Lotus and Gokshura. ********************************************* SWEET VJESTIKA APHRODISIA DROPS (tm) TANTRA PLEASURE SACRAMENT Indeed; a HeavenSent Treasure of Pleasure!! To entice your Passion, To intrigue your Desire, Enchantment's Rapture; Sweet Vjestika Fire.... SWEET VJESTIKA APHRODISIA DROPS EXTRAVAGANTLY INSPIRES AND ENHANCES: *Penile & clitoral sensitivity *Sensitivity to touch *Desire to touch *Desire to be touched *Fantasy *Lust *Rapture *Erogenous sensitivity *Uninhibitedness *Sexual courageousness *Sexual gentleness and ferocity SWEET VJESTIKA APHRODISIA DROPS(tm) *Prolongs and intensifies foreplay; *Prolongs and intensifies orgasm / climax; *Inspires body, mind, spirit orgasm / climax; *Inspires and enhances body, mind, spirit communion betwixt lovers; *Inspires and enhances the enchantment / glamourie of Love.... Sweet Vjestika is a Chimera Tantric proprietary glamourie / enchantment Fantasia Amalgamation for men and women, comprised of high ratio extracts derived from the following Herbs of Power which are master blended to emphasis extravaganza body, mind, spirit erogenous sensory awareness and gourmet carnal delight. CONTENTS: Whole MaHuang, Bee Pollen, Epimedium Angelica, Rehmannia, Ginger, Schizandra, Polygonatum, Adenophora, Tremella, Tang Kuei, Reishi, Codonopsis, Eucommium, Lycii Berry, Ligusticum, Peony Root, Fo Ti, Atractylodes, Ophiopogon, Royal Jelly, Euryales Seeds, Poria, Licorice, Mountain Peony Bark, Cormi Fruit, Rose Hips, Prince Ginseng, Scrophularia, Alisma, Astragalus, Fennel, Buplerium, Cypera, Aconite, Polygala, Red Sage Root, Jujube Seed, Lotus Seed, Tien Chi Ginseng, Ligus Ticum, Psoralea, Dodder Seed, and Cisthanches in a solution containing 24% pure grain alcohol as a preservative, distilled water and Lecithen as an emulsifier. SUGGESTED USAGE: Sweet Vjestika is extremely potent. Use 10 – 15 drops sublingually or in juice or tea, not to exceed 25 drops. Best when taken upon an empty stomach approx. 45 minutes before intimacy. Based upon 25 – drop increments there are approx. 60 dosages per 1 oz. bottle. Usage should not exceed 2 doses per week. Persons taking any prescription medication or suffering from depression or anxiety, should consult with their health care provider before using. This product is not intented for usage by persons with abnormal blood pressure or any cardiovascular malady or any thyroid dysfunction. Nor is it to be used during pregnancy or by any person under 21 years of age. ********************************************* Also for your sensitive mellowness.... "Seventh Heaven" Prosaka Tablets are an entirely natural, proprietary, botanical prescription comprised of uncommon Asian Herbs for Calm, Balance, Serenity and living joyful. "Seventh Heaven" Prosaka is indeed a most extraordinary, viripotent, calming, centering, mood-enhancing, holistically - formulated, exotic herbaceous alternative to pharmaceutical medications for depression, anxiety, stress, insomnia, etc. NO side effects! NO dependency! Vivaciously Mellow! There is ABSOLUTELY nothing else quite like "Seventh Heaven" Prosaka (tm). Ingredients: Seventh Heaven Prosaka tablets contain the following herbal factors in precise prescription: Tadix Salviae, Sensitive Mimosa Bark, Arullus Euphoriae, Shizandra, Frutcus Mori, Caulis, Polygoni Multiflori, Zizphus, Tang Kuei, Cedar Seed, Sweetflag Rhizome, Cuscutae, Amber, Radix Scutellariae, Evodia, Longan, Arizisaema, Cistanches, Radix Polygalae, Red Sage Root and Eucommia. Recommended dosage: 1-2 tablets; 2-3 times per day. ********************************************** Also....for your "Sensitive" "Pure Energy" Energization "Seventh Heaven" Gentle Ferocity Tablets (tm); A "Seventh Heaven" non-caffeine, non-ephedrine, non- ephedra, non-MaHuang; viripotent, herbaceous prescription for the dynamic energization of body, mind and spirit. This Gentle Ferocity Formulation is amalgamated in accordance with the fundamental Taoist herbal principle of botanical interactiveness and precursorship which in essence is a molecular equation of the relevant botanical/ herbal alkaloids and glycosides interacting with one another to prolificate molecular communion and thereby to achieve demonstrative herbal efficaciousness without negative implication to any aspect of human composition. These Gentle Ferocity Cordial Tablets are incredulously and thoroughly effective. Enjoy! Contents: Each Gentle Ferocity Tablet contains 500 mg. of the following proprietary formulated, high-ratio concentrated botanical factors ... Cortex Eucommiae, Radex Polygoni Multiflori, Zizyphus Seed, Fructus Schisandrae, Radix Panax Ginseng, Radix Astragali, Atractylode, Sclerotium, Porial Cocos, Saussurea Tang Kuei, Longan, Radix Paeoniae, Biota Seeds, Glehnia, Radix Salviae, Ligusticum, Lycu Berry, Radix Dioscoreae, Cortex Mouton, Frutcus Corni, Radix Polygalae, Cistanches, Radix Pseudoslellariae and Cortex Aranthopanacis. ======================================== PRICING INFORMATION: 1. SEVENTH HEAVEN KATHMANDU TEMPLE KIFF (tm) One 0.75 oz. jigget/bar $65.00 One 2.0 oz. jigget/bar $115.00 (Free Capillaris Herba with 2.0 oz. bar. Refer to Capillaris paragraph at end of text) 2. SWEET VJESTIKA APHRODISIA DROPS (tm) One 1.0 oz. bottle $90.00 Two 1.0 oz. bottles $140.00 (Free Capillaris Herba with any Sweet Vjestika order. Refer to Capillaris paragraph at end of text) 3. SEVENTH HEAVEN PROSAKA (tm) One 100 tablet tin $40.00 Three 100 tablet tins $105.00 Six 100 tablet tins $185.00 4. SEVENTH HEAVEN GENTLE FEROCITY (tm) One 300 tablet jar $130.00 5. SWEET APHRODISIA INTRO COMBINATION OFFER Includes one, 2.0 oz. jigget/bar of Kathmandu Temple Kiff & one, 1 oz. bottle of Sweet Vjestika Aphrodisia Drops. For $150.00 (Reg. $205.00 Save $55) (Free Capillaris Herba with this intro offer. Refer to Capillaris paragraph at end of text) 6. BODY, MIND, SPIRIT "HEAVENLY" INTRO COMBINATION OFFER Includes one, 2.0 oz. jigget/bar of Kathmandu Temple Kiff & 1 tin (100 tablets) of Seventh Heaven Prosaka for $125.00 (Reg. $155.00 Save $30) (Free Capillaris Herba with this intro offer. Refer to Capillaris paragraph at end of text) 7. "PURE ENERGY" INTRO COMBINATION OFFER Includes one, 2.0 oz. jigget/bar of Kathmandu Temple Kiff & 1 jar (300 tablets) of Seventh Heaven Gentle Ferocity. For $170.00 (Reg. $245.00 Save $75) (Free Capillaris Herba with this intro offer Refer to Capillaris paragraph at end of text) 8. "SENSITIVE" PREFERENTIAL INTRO COMBINATION OFFER Includes one, 2.0 oz. jigget/bar of Kathmandu Temple Kiff & 1 tin (100 tablets) of Seventh Heaven Prosaka & 1 jar (300 tablets) of Seventh Heaven Gentle Ferocity For $200.00 (Reg. $285.00 Save $85) (Free Capillaris Herba with this intro offer Refer to Capillaris paragraph at end of text.) 9. ULTIMATE HERBACEOUSNESS INTRO COMBINATION OFFER Includes one - 2.0 oz. jigget / bar of Kathmandu Temple Kiff, one - 1 oz. bottle of Sweet Vjestika Aphrodisia Drops, one - 100 tablet tin of Prosaka, and one - 300 tablet jar of Gentle Ferocity for a deep discounted Retail Price of $260.00 (Reg. $375.00 Save $115) (Free Capillaris Herba with this intro offer Refer to Capillaris paragraph at end of text.) ************************************************** ORDERING INFORMATION: For your convenience, you can call us direct with your orders or questions. Call 1-949-706-2202 Mon. - Fri. 10:30 am to 7:00 pm (MST) Sat. - 10:00 am to 2:00 pm (MST) For all domestic orders, add $5.00 shipping & handling (shipped U.S. Priority Mail). Add $20.00 for International orders. ************************************************** SPECIAL DISCOUNT & GIFT Call now and receive a FREE botanical gift! With every order for a 2.0 oz. jigget / bar of Kathmandu Temple Kiff, an order of Sweet Vjestika Aphrodisia Drops or one of our four (4) Intro Combination Offers, we will include as our free gift to you ... a 2.0 oz. package of our ever so sedate, sensitive Asian import, loose-leaf Capillaris Herba for "happy" smoking or brewing ... (a $65.00 retail value). ==================================================== To remove your address, send an email to: MAILTO:jonathanw@myrealbox.com?subject="no-more" Please be sure "no-more" is in the subject. From list@netscape.com Tue Jun 26 05:11:47 2001 Received: from netscape.com (r2d2.netscape.com [205.217.237.47]) by ietf.org (8.9.1a/8.9.1a) with SMTP id FAA25624 for ; Tue, 26 Jun 2001 05:11:46 -0400 (EDT) Received: from aka.mcom.com (aka.mcom.com [205.217.237.180]) by netscape.com (8.10.0/8.10.0) with ESMTP id f5Q99dr11769; Tue, 26 Jun 2001 02:09:39 -0700 (PDT) Received: (from list@localhost) by aka.mcom.com (8.10.0/8.10.0) id f5Q99eU16974; Tue, 26 Jun 2001 02:09:40 -0700 (PDT) Resent-Date: Tue, 26 Jun 2001 02:09:40 -0700 (PDT) Message-Id: <200106260908.f5Q98Dm21760@ywing.netscape.com> X-WM-Posted-At: ufcw23.com; Tue, 26 Jun 01 02:42:53 -0400 From: jlsdjkfj@yahoo.com To: meisners3@yahoo.com Subject: RECEIVE $2,000 in one WEEK !! GUARANTEED!! ----------- ulyxxx2 Date: Mon, 25 Jun 01 20:30:01 Hawaiian Standard Time Reply-To: ulyssaxx2@yahoo.com X-Mailer: [102.87.149.207] [196.34.144.100] (helo=67.97.0.7) X-Priority: 3 X-MSMailPriority: Normal Importance: Normal Resent-Message-ID: <"mzKuuD.A.fIE.SFFO7"@glacier> Resent-From: ietf-ldapext@netscape.com X-Mailing-List: X-Loop: ietf-ldapext@netscape.com Precedence: list Resent-Sender: ietf-ldapext-request@netscape.com R E C E I V E $1,000 COMMISSION every $0 down SALE !! DID YOU MAKE $8,000 LAST MONTH? IF NOT, YOU NEED TO JOIN US TODAY! $0 DOWN ! 100% FINANCING - 100% CASH MACHINE EVERYBODY IS A PROSPECT - 99% APPROVED EARN $1,000 ON EVERY A THROUGH F CREDIT SALE! EARN $1,000 ON EACH AND EVERY SALE TO INFINITY! REQUEST MORE INFO NOW! send an e-mail to: ulyssaxxx2@yahoo.com with SEND INFO in the subject line or JUST CLICK on "Reply" NOW!! Available for USA residents only. ~~~~~~~~~~~ MARKET the hottest consumer savings package in America today and earn $1,000 each and every time someone joins for $0 DOWN! NO hard selling, NO cold calls - 100% AUTOPILOT Imagine being plugged into a proven system that puts your entire business on auto-pilot and have you earning MINIMUM $2,000 every week! GUARANTEED!! IT'S TRUE! You can be in business for $0 DOWN! And you can easily make $2,000 your very FIRST week .. . and we'll show you how! Your business will literally explode overnight when you join our team and plug into the BEST marketing system available on the web! Most OUTSTANDING: Receive FULL SUPPORT 24 hrs!! ~~~~~~~~~~~ REQUEST MORE INFO NOW! send an e-mail to: ulyssaxxx2@yahoo.com with SEND INFO in the subject line or JUST CLICK on "Reply" NOW!! Available for USA residents only. To remove please click: ulyssaxxx2@yahoo.com From list@netscape.com Wed Jun 27 04:26:29 2001 Received: from netscape.com (r2d2.netscape.com [205.217.237.47]) by ietf.org (8.9.1a/8.9.1a) with SMTP id EAA27384 for ; Wed, 27 Jun 2001 04:26:29 -0400 (EDT) Received: from aka.mcom.com (aka.mcom.com [205.217.237.180]) by netscape.com (8.10.0/8.10.0) with ESMTP id f5R8P8r27337; Wed, 27 Jun 2001 01:25:08 -0700 (PDT) Received: (from list@localhost) by aka.mcom.com (8.10.0/8.10.0) id f5R8P8k01634; Wed, 27 Jun 2001 01:25:08 -0700 (PDT) Resent-Date: Wed, 27 Jun 2001 01:25:08 -0700 (PDT) Message-Id: <200106270825.f5R8P0641697@firstsponsor.com> From: SitePro To: Date: Wed, 27 Jun 2001 10:23:22 +0100 Subject: SitePro Newsletter Reply-To: info@sitepro.cis24.com MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: 7bit X-Priority: 3 Resent-Message-ID: <"2wwDu.A.IZ.ihZO7"@glacier> Resent-From: ietf-ldapext@netscape.com X-Mailing-List: X-Loop: ietf-ldapext@netscape.com Precedence: list Resent-Sender: ietf-ldapext-request@netscape.com Content-Transfer-Encoding: 7bit SitePro Newsletter See the end of the message for removal instructions. ================================================== 1. Are you ready for a big win? 2. Internet Tip of the Day 3. International Careers with LottoTeam 4. Golds get Free downline! 5. Accept credit cards today! 6. Increase your marketability 7. The Rapid Replicator Services 8. Disclaimer How To Unsubscribe ================================================== 1. Are you ready for a big win? ================================================== This is an international opportunity. The company is more than 6 years old. They process 20 million credit cards a month. They purchase 20 to 35 million lotto tickets each week. They have 250 employees working 3 shifts around the clock. Firmly regulated by the German government. Only a few thousand reps in the U.S. (that will change VERY quickly!!) They are paying out HUGE commissions every month, and have been doing so for years. The compensation plan is SIMPLE and INCREDIBLE!! The product is simple to understand: MONEY!! http://www.lottonet24.com 2. Internet Tip of the Day ================================================== http://www.darwin-germany.net/member/bestbuy/world 3. International Careers with LottoTeam ================================================== International Careers with LottoTeam ... or, how you can can get richer even without winning the lottery Millions play Lotto each week to take advantage of the millions available in the German Lotto-Toto lottery systems. If you would get payed only a penny per row for each played game on Saturday, you would be a millionaire on Sunday. A dream? Not at all! You can get a share of each week's betting and earn additional commissions on bets placed through other agency partners. The LottoTeam Strategy makes it possible. Discover the possibilities! Everything You Need! The LottoTeam Strategy as a Path to Success Do you want to be successful? LottoTeam offers the best conditions for success: 1. A consumer product with repeat sales value. The numbers of the Germany Toto- and Lotto- systems speak for themselves: Approximately 60 million to 150 million, depending on the size of the jackpot) are paid out each week. 2. Best market prospects for high, rising profits Lotto is played all over the world. The German Lotto is one of the most popular, and offers solid prospects to win. In Germany alone, over 90 percent of the population know Lotto. 3. Good partners and support As a LottoTeam partner, you receive a free, complete website, assistance from other LottoTeam partners, and more. In addition to detailed statistics, our Online Support Center offers you many useful tips and links to help you succeed. 4. A sound concept and the prospect of high returns With LottoTeam, you yourself determine how much you want to earn. The Career Plan offers you the best career opportunities and, from the start, support and financial assistance provisions worth up to 1 million. All this spells real security for the future. http://www.us.lottoteam24.com 4. Golds get Free downline! ================================================== AWESOME DEAL! If you step in the program as a Gold Member we have good news for you! Gold Members (ELITE21, 40 shares) are part of the Elite21 forced matrix wich means that subscriptions made after you by the company or sponsors will be placed in your structure as well and you will earn on them and their downlines! Your structure will be automatically filled up with new subscribers! So yes! You have every reason to start on the Gold position and get yourself in momentum fast! Do you know a company who has this awesome program?! Go for growth, go for Gold! http://www.lottoteam24.com 5. Accept credit cards today! ================================================== ClickBank is the online billing solution used by thousands of web businesses that deliver unique products and services over the Internet itself (via web pages, files, or email). Our payment technology lets any web business (a merchant) automatically pay sales commissions to any other web business (an affiliate) that links apaying customer to the merchant. Clickbank bills the customer, pays the merchant, and pays the affiliate. Click HERE to learn more about becoming a merchant. Click HERE to learn more about becoming an affiliate. http://zzz.clickbank.net/r/?cisnet 6. Increase your marketability ================================================== Empowerism frees you not just to think outside of the box, but to get out of the box! For just $10 a month, you can change everything and learn, right here, what entrepreneurs and people in all forms of business are frantic to learn: NetMarketing. This is the hottest, most sought-after skill in any business, big or small, today. Find greater individual success in your current job or in your search for a new one. You'll increase your marketability and be respected and valued instead of just "employed." This is your "leg up" on the competition. Expand your opportunities for personal prosperity. On your own or while functioning in your current job, you will have the marketing skills that will allow you to take control of your own income! http://www.empowerism.com/e/9613 7. The Rapid Replicator Services ================================================== The Rapid Replicator system hosted on our reliable Apache Server. Sub-Domain with ample amount of storage space for all your graphics web pages that you want replicated. Additional space available upon request Tremendous storage space for all your unlimited self-replicating web sites. File Transfer System to upload your files and graphics using your browser. (No FTP necessary) Future Upgrades absolutely FREE if you signup today! Tech Support (conducted entirely via electronic mail) http://replicate99.com/cgi-bin/replicate/redeem.cgi?repl636 8. Disclaimer How To Unsubscribe ================================================== Why are you receiving this email? 1) You subscribed! or requested info on our services/products 2) You have placed an advertisement on our pages or played our FREE Lottery game. Unsubscribe Instructions This email was sent to ietf-ldapext@netscape.com You can still remove yourself from our list by sending a email noted below. Send a email to: mailto:remove@sitepro.cis24.com?subject=REMOVE-ietf-ldapext@netscape.com From list@netscape.com Wed Jun 27 05:05:49 2001 Received: from netscape.com (c3po.netscape.com [205.217.237.46]) by ietf.org (8.9.1a/8.9.1a) with SMTP id FAA13859 for ; Wed, 27 Jun 2001 05:05:48 -0400 (EDT) Received: from aka.mcom.com (aka.mcom.com [205.217.237.180]) by netscape.com (8.10.0/8.10.0) with ESMTP id f5R94bY15906; Wed, 27 Jun 2001 02:04:37 -0700 (PDT) Received: (from list@localhost) by aka.mcom.com (8.10.0/8.10.0) id f5R94dI10800; Wed, 27 Jun 2001 02:04:39 -0700 (PDT) Resent-Date: Wed, 27 Jun 2001 02:04:39 -0700 (PDT) Date: Wed, 27 Jun 2001 02:05:05 -0700 (PDT) Message-Id: <200106270905.f5R955C22356@xwing.aoltw.net> From: TrueFriend@hotmail.com To: apvaz@NewFoundFriend.netscape.com Reply-To: r4sm@bigfoot.com Subject: I Can Help You Recoup Money Lost in Previous Programs! [kchfj] Resent-Message-ID: <"3weOEC.A.YoC.lGaO7"@glacier> Resent-From: ietf-ldapext@netscape.com X-Mailing-List: X-Loop: ietf-ldapext@netscape.com Precedence: list Resent-Sender: ietf-ldapext-request@netscape.com I, along with several friends, have lost money in various programs -- lots of money! The only good thing that came out of my loss was that I met an interesting individual who does not do MLM, direct sales, but is involved with a one-of-a-kind program that enables him and ALL people involved to turn $2,000 into $16,000 USD month in and month out! It is very likely that you will generate $16,000 USD in the first two to four weeks in the program if you choose to participate with me. I and at least one other person will work closely with you to make that happen! My question to you is: If I can absolutely show you how to put $16,000 USD in your pocket within the next two to four weeks, WOULD YOU BE INTERESTED in hearing more? It is by far the simplest, fool proof, most profitable method I have ever been involved with in my 17 years of business. Up until now it has been a very well kept secret. It is by invitation only. It is available for you and I now! I'm inviting you to be a part of what I have learned and if you like what you see, share it with a few of your friends, loved ones, or people who have struggled for years trying to make money. Email me back if you are interested in learning more about this activity. I need your phone number and the best time to contact you. Just click the link below and send. mailto:tim34a@n2mail.com?subject=Tell_Me_More Place "Tell Me More" in the Subject line. Name ______________________________ Phone Number ______________________ Best Time to Call _________________ Regards, Monitor P.S - THIS WILL MAKE UP FOR THE LOSSES IN OTHER PROGRAMS! I Promise!! From list@netscape.com Wed Jun 27 06:53:30 2001 Received: from netscape.com (r2d2.netscape.com [205.217.237.47]) by ietf.org (8.9.1a/8.9.1a) with SMTP id GAA19495 for ; Wed, 27 Jun 2001 06:53:29 -0400 (EDT) Received: from aka.mcom.com (aka.mcom.com [205.217.237.180]) by netscape.com (8.10.0/8.10.0) with ESMTP id f5RApEr08451; Wed, 27 Jun 2001 03:51:15 -0700 (PDT) Received: (from list@localhost) by aka.mcom.com (8.10.0/8.10.0) id f5RApEo05722; Wed, 27 Jun 2001 03:51:14 -0700 (PDT) Resent-Date: Wed, 27 Jun 2001 03:51:14 -0700 (PDT) Message-ID: <000023066f11$000021f8$00004c18@oemcomputer ([102.74.4.25]) by mtiwmhc08.worldnet.att.net (InterMail v03.02.07.07 118-134) with SMTP id <20000116195506.ZOOK28505@oemcomputer> from worldnet.att.net ([12.77.194.15]) by mtiwmhc03.worldnet.att.net> To: From: ljuliets1050@dds.nl Subject: Profound Principles Date: Wed, 27 Jun 2001 00:53:44 -0700 MIME-Version: 1.0 Content-Type: text/html; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable X-Priority: 3 X-MSMail-Priority: Normal X-Mailer: Mozilla 4.72 [en] (Win98; U) Resent-Message-ID: <"9_eg1B.A.CZB.gqbO7"@glacier> Resent-From: ietf-ldapext@netscape.com X-Mailing-List: X-Loop: ietf-ldapext@netscape.com Precedence: list Resent-Sender: ietf-ldapext-request@netscape.com Content-Transfer-Encoding: quoted-printable AS SEEN ON NATIONAL TV:

Making over half million dollars every 4 to 5 months
from your home for an investment of only $25 U.S. Dollars
expense one time THANK'S TO THE COMPUTER AGE AND THE
INTERNET!

Note: You've may have received a letter like this before
and passed on it but I urge you to take another look -
the program just got even easier to execute. Please read
carefully.

++++++++++++++++++++++++++++++++++++++++++++++++++++++

BE A MILLIONAIRE LIKE OTHERS WITHIN A YEAR!!!
Before you say "Bull", please read the following. This
is the letter you have been hearing about on the news
lately. Due to the popularity of this letter on the
Internet, a national weekly news program recently
devoted an entire show to the investigation of this
program described below, to see if it really can make
people money. The show also investigated whether or not
the program was legal. Their findings proved once and
for all that there are "Absolutely NO Laws prohibiting
the participation in the program and if people can follow
the simple instructions, they are bound to make some mega
bucks with only $25 out of pocket cost".

DUE TO THE RECENT INCREASE OF POPULARITY & RESPECT
THIS PROGRAM HAS ATTAINED, IT IS CURRENTLY WORKING
BETTER THAN EVER.

This is what one had to say: "Thanks to this profitable
opportunity! I was approached many times before but each
time I passed on it. I am so glad I finally joined just
to see what one could expect in return for the minimal
effort and money required. To my astonishment, I received
total $610,470.00 in 21 weeks, with money still coming in."
Pam Hedland, Fort Lee, New Jersey.

Here is another testimonial: "This program has been around
for a long time but I never believed in it. But one day
when I received this again in the mail I decided to gamble
my $25 on it. I followed the simple instructions and walaa
.. 3 weeks later the money started to come in. First month
I only made $240.00 but the next 2 months after that I made
a total of $290,000.00. So far, in the past 8 months by
re-entering the program, I have made over $710,000.00 and I
am playing it again. The key to success in this program is
to follow the simple steps and NOT change anything." More
testimonials later but first,

=3D=3D=3D=3D=3D PRINT THIS NOW FOR YOUR FUTURE REFERENCE =3D=3D=3D=3D=3D=3D=

$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
If you would like to make at least $500,000 every 4 to 5
months easily and comfortably, please read the following...
THEN READ IT AGAIN and AGAIN!!!
$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$

FOLLOW THE SIMPLE INSTRUCTIONS BELOW AND YOUR FINANCIAL
DREAMS WILL COME TRUE, GUARANTEED!

=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3DINSTRUCTIONS=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D

STEP #1:
Order all 5 reports shown on the list below. For each
report, send:
1. $5 CASH
2. THE NAME & NUMBER OF THE REPORT YOU ARE ORDERING
3. YOUR E-MAIL ADDRESS to the person whose name appears
ON THAT LIST next to the report.
4. MAKE SURE YOUR RETURN ADDRESS IS ON YOUR ENVELOPE
TOP LEFT CORNER in case of any mail problems.

When you place your order, make sure you order each of the
5 reports. You will need all 5 reports so that you can save
them on your computer and resell them.
YOUR TOTAL COST $5 X 5=3D$25.00.
Within a few days you will receive, via email, each of the
5 reports from these 5 different individuals. Save them on
your computer so they will be accessible for you to send
to the 1,000's of people who will order them from you. Also
make a floppy of these reports and keep it on your desk in
case something happen to your computer.

IMPORTANT - DO NOT alter the names of the people who are
listed next to each report, or their sequence on the list,
in any way other than what is instructed below in step
"1 through 6" or you will loose out on majority of your
profits. Once you understand the way this works, you will
also see how it does not work if you change it. Remember,
this method has been tested, and if you alter, it will NOT
work!!! People have tried to put their friends/relatives
names on all five thinking they could get all the money.
But it does not work this way. Believe us, we all have
tried to be greedy and then nothing happened. So Do Not
change anything other than what is instructed. Because
if you do, it will not work for you.
Remember, honesty reaps the reward!!!

STEP #2
1....After you have ordered all 5 reports, take this
advertisement letter and REMOVE the name & address of the
person in REPORT #5. This person has made it through the
cycle and is no doubt counting their fortune.
2. Move the name & address in REPORT #4 down TO REPORT #5
3. Move the name & address in REPORT #3 down TO REPORT #4
4. Move the name & address in REPORT #2 down TO REPORT #3
5. Move the name & address in REPORT #1 down TO REPORT #2
6. Insert YOUR name & address in the REPORT #1 position

PLEASE MAKE SURE you copy every name & address
ACCURATELY!

Take this entire letter, with the modified list of names,
and save it on your computer. DO NOT MAKE ANY OTHER
CHANGES. Save this on a floppy disk as well just in case
if you loose any data.

STEP #3
Get this letter (with your name now in slot 1) in front
of as many people as you can. To assist you with marketing
your new business on the Internet, the 5 reports you
purchase will provide you with invaluable marketing
information which includes how to send bulk e-mails
legally, INCLUDING HOW TO FIND PROVIDERS THAT WILL SEND
YOUR LETTER TO UP TO 150,000 ADDRESSES FOR FREE, where
to find thousands of free classified ads and much more.

There are 2 Primary methods to get this venture going:

METHOD #1: BY SENDING BULK E-MAIL LEGALLY

Let's say that you decide to start small, just to see how
it goes, and we will assume you and those involved send
out only 5,000 e-mails each. Let's also assume that the
mailing receive only a 0.2% response. Using a good list
the response could be much better. Also many people will
send out hundreds of thousands e-mails instead of only
5,000 each but lets just say it is only 0.2%. Continuing
with this example, you send out only 5,000 e-mails. With
a 0.2% response, that is only 10 orders for report #1.
Those 10 people responded by sending out 5,000 e-mails
each for a total of 50,000. Out of those 50,000 e-mails
only 0.2% responded with orders. That's 100 people that
responded and ordered Report #2. Those 100 people mail
out 5,000 e-mails each for a total of 500,000 e-mails.
A 0.2% response to that is 1000 orders for Report #3.
Those 1000 people send out 5,000 e-mails each for a total
of 5 million e-mails sent out. The 0.2% response to that
is 10,000 orders for Report #4. Those 10,000 people send
out 5,000 e-mails each for a total of 50,000,000 (50
million) e-mails. The 0.2% response to that is 100,000
orders for Report #5 THAT'S 100,000 ORDERS TIMES $5 EACH
=3D$500,000.00 (half million).

Your total income in this example is:
Orders for Report #1 =3D $50 +
Orders for Report #2 =3D $500 +
Orders for Report #3 =3D $5,000 +
Orders for Report #4 =3D $50,000 +
Orders for Report #5 =3D $500,000
Grand Total=3D$555,550.00!!!

NUMBERS DO NOT LIE. GET A PENCIL & PAPER AND FIGURE
OUT THE WORST POSSIBLE RESPONSES AND NO MATTER HOW
YOU CALCULATE IT, YOU WILL STILL MAKE A LOT OF MONEY!

=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D
REMEMBER, THIS IS ASSUMING ONLY 10 PEOPLE ORDERING OUT
OF 5,000 YOU MAILED TO.
Dare to think for a moment what would happen if everyone,
or half, or even one 4th of those people mailed 100,000
e-mails each or more?
(REPORT #2 tells you how you can send 100,000 e-mails for
free) There are over 150 million people on the Internet
worldwide and counting. Believe me, many people will do
just that, and more!
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D

METHOD #2: BY PLACING FREE ADS ON THE INTERNET

Advertising on the net is very inexpensive and there are
hundreds of FREE places to advertise. Placing a lot of
free ads on the Internet will easily get a larger response.
WE STRONGLY SUGGEST YOU START WITH METHOD #1 and add METHOD
#2 as you go along. For every $5 you receive, all you must
do is e-mail them the Report they ordered. That's it.
Always provide same day service on all orders. This will
guarantee that the e-mail they send out, with your name
and address on it, will be prompt because they can not
advertise until they receive the report.

=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D AVAILABLE REPORTS =3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
ORDER EACH REPORT BY ITS NUMBER & NAME ONLY.
Note: Always send $5 cash (U.S. CURRENCY) for each Report.
Checks NOT accepted. Make sure the cash is concealed by
wrapping it in at least 2 sheets of paper. On one of those
sheets of paper write:
> THE NAME & NUMBER OF THE REPORT YOU ARE ORDERING
> YOUR E-MAIL ADDRESS
to the person whose name appears ON THAT LIST next to the
report.
> MAKE SURE YOUR RETURN ADDRESS IS ON YOUR ENVELOPE
TOP LEFT CORNER in case of any mail problems.

PLACE YOUR ORDER FOR THESE REPORTS NOW:
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D
REPORT #1: "The Insider's Guide to Advertising for Free
on the Net"
Order Report #1 from:

S. Rogers
1280 Bison Ave B9-499
Newport Beach, CA 92660
USA

___________________________________________________________

REPORT #2: "The Insider's Guide to Sending Bulk e-mail on
the Net"
Order Report #2 from:

G. Mann
55 Tepee Rd
Louisville, KY 40207
USA
____________________________________________________________

REPORT #3: "Secret to Multilevel Marketing on the Net"
Order Report #3 from:

Jack Corwin
18565 Soledad Canyon Rd., #204
Canyon Country, CA 91351
USA
____________________________________________________________

REPORT #4: "How to Become a Millionaire Utilizing MLM &
the Net"
Order Report #4 from:

A. Cole
244 Shopping Ave #320
Sarasota, FL 34237
USA
____________________________________________________________

REPORT #5: "Creative Marketing On-Line"
Order Report #5 from:

D. Thompson
10061 Riverside Drive #296
Toluca Lake, CA 91602
USA

____________________________________________________________

$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3DYOUR SUCCESS GUIDELINES=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
Follow these guidelines to guarantee your success:

=3D=3D=3DIf you do not receive at least 10 orders for Report #1
within 2 weeks, continue sending e-mails until you do.
=3D=3D=3D After you have received 10 orders, 2 to 3 weeks after
that you should receive 100 orders or more for REPORT #2.
If you did not, continue advertising or sending e-mails
until you do.
=3D=3D=3D Once you have received 100 or more orders for Report
#2, YOU CAN RELAX, because the system is already working
for you, and the cash will continue to roll in ! THIS IS
IMPORTANT TO REMEMBER:
Every time your name is moved down on the list, you are
placed in front of a Different report. You can KEEP TRACK
of your PROGRESS by watching which report people are
ordering from you. IF YOU WANT TO GENERATE MORE INCOME
SEND ANOTHER BATCH OF E-MAILS AND START THE WHOLE PROCESS
AGAIN. There is NO LIMIT to the income you can generate
from this business!!!

=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D

FOLLOWING IS A NOTE FROM THE ORIGINATOR OF THIS PROGRAM:
You have just received information that can give you
financial freedom for the rest of your life, with NO RISK
and JUST A LITTLE BIT OF EFFORT. You can make more money in
the next few weeks and months than you have ever imagined.
Follow the program EXACTLY AS INSTRUCTED. Do Not change it
in any way. It works exceedingly well as it is now.
Remember to e-mail a copy of this exciting letter after
you have put your name and address in beside Report #1 and
moved others to #2 thru #5 as instructed above. One of
the people you send this to may send out 100,000 or more
e-mails and your name will be on every one of them.
Remember though, the more you send out the more potential
customers you will reach. So my friend, I have given you
the ideas, information, materials and opportunity to become
financially independent. IT IS UP TO YOU NOW!

=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D MORE TESTIMONIALS =3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D

"My name is Mitchell. My wife, Jody and I live in Chicago.
I am an accountant with a major U.S. Corporation and I make
pretty good money. When I received this program I grumbled
to Jody about receiving "junk mail". I made fun of the
whole thing, spouting my knowledge of the population and
percentages involved. I "knew" it wouldn't work. Jody
totally ignored my supposed intelligence and few days later
she jumped in with both feet. I made merciless fun of her,
and was ready to lay the old "I told you so" on her when
the thing didn't work. Well, the laugh was on me! Within 3
weeks she had received 50 responses. Within the next 45
days she had received total $ 147,200.00 all cash! I was
shocked. I have joined Jody in her "hobby".
Mitchell Wolf M.D., Chicago, Illinois
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D
"Not being the gambling type, it took me several weeks
to make up my mind to participate in this plan. But
conservative that I am, I decided that the initial
investment was so little that there was just no way that
I wouldn't get enough orders to at least get my money
back". "I was surprised when I found my medium size post
office box crammed with orders. I made $319,210.00 in the
first 12 weeks. The nice thing about this deal is that it
does not matter where people live. There simply isn't a
better investment with a faster return - and so big."
Dan Sondstrom, Alberta, Canada
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D
"I had received this program before. I deleted it, but
later I wondered if I should have given it a try. Of
course, I had no idea who to contact to get another copy,
so I had to wait until I was e-mailed again by someone
else. Eleven months passed then it luckily came again -
I did not delete this one! I made more than $490,000 on
my first try and all the money came within 22 weeks."
Susan De Suza, New York, N.Y.
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D
"It really is a great opportunity to make relatively easy
money with little cost to you. I followed the simple
instructions carefully and within 10 days the money started
to come in. My first month I made $20,560.00 and by the end
of third month my total cash count was $362,840.00. Life is
beautiful, Thanx to the Internet.".
Fred Dellaca, Westport, New Zealand
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D
ORDER YOUR REPORTS TODAY AND GET STARTED ON "YOUR" ROAD
TO FINANCIAL FREEDOM !
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D

P.S. Don't forget to pay special attention to REPORT #2
where there is valuable information about how you can
take advantage of promotional programs from bulk e-mail
companies to send up to 100,000 emails for free and really
kick start your business.


If you have any questions of the legality of this program,
contact the Office of Associate Director for Marketing
Practices, Federal Trade Commission, Bureau of Consumer
Protection, Washington, D.C.

***********************************************************
Under Bills 1618 Title III passed by the 105th US Congress
this letter cannot be considered spam if the sender
includes contact information and a method of removal.
Since this is a one time e-mail transmission, no request
for removal is necessary.

Thank you.

List Management Services


From list@netscape.com Wed Jun 27 07:27:42 2001 Received: from netscape.com (c3po.netscape.com [205.217.237.46]) by ietf.org (8.9.1a/8.9.1a) with SMTP id HAA11729 for ; Wed, 27 Jun 2001 07:27:41 -0400 (EDT) Received: from aka.mcom.com (aka.mcom.com [205.217.237.180]) by netscape.com (8.10.0/8.10.0) with ESMTP id f5RBQVY26905; Wed, 27 Jun 2001 04:26:31 -0700 (PDT) Received: (from list@localhost) by aka.mcom.com (8.10.0/8.10.0) id f5RBQUY16951; Wed, 27 Jun 2001 04:26:30 -0700 (PDT) Resent-Date: Wed, 27 Jun 2001 04:26:30 -0700 (PDT) From: artzhur@public3.bta.net.cn Message-ID: <00006f7d5432$000037e3$00007530@public3.bta.net.cn> To: Subject: AUTO PILOT MONEY MACHINE!!........................................... 30000 Date: Wed, 27 Jun 2001 04:34:45 -0700 MIME-Version: 1.0 Content-Type: text/plain; charset="Windows-1252" Content-Transfer-Encoding: 7bit X-Priority: 3 X-MSMail-Priority: Normal Reply-To: m4autopilot@yahoo.com X-Mailer: Microsoft Outlook 8.5, Build 4.71.2173.0 X-MimeOLE: Produced By Microsoft MimeOLE V4.72.3110.3 X-Originating-IP: 211.39.129.241 Resent-Message-ID: <"n3VygC.A.PIE.kLcO7"@glacier> Resent-From: ietf-ldapext@netscape.com X-Mailing-List: X-Loop: ietf-ldapext@netscape.com Precedence: list Resent-Sender: ietf-ldapext-request@netscape.com Content-Transfer-Encoding: 7bit Auto Pilot Money Machine !!!! We believe we have found one of the most lucrative opportunities available ANYWHERE!! Our company is the first Direct & Referral Marketing Company in the world to tap into the 3 TRILLION DOLLAR money transfer industry. With our Universal, Multi Purpose Card, you can transfer money anywhere in the world to another cardholder in seconds from the comfort of your home using your touch- tone phone or your computer to send the funds!! **** Warning: Even if you don't fully understand right now why this industry is so lucrative, STAY with us!! You won't regret it. Money Transfer is the quiet, untapped monopoly, controlled by a handful of companies worldwide. That's about to change forever! We will show you WHERE & HOW to find the customers! One of our associates called Western Union recently and asked them how much it would cost to send $500.00 from California to Pennsylvania, and they said $43.00. With our Global Card, the same transfer of money is only a fraction of that, with a savings of more than 50%!!! And as I said, the transfer is made from the comfort of your home!! There are tens of millions of people that transfer money every month to their families and loved ones all over the world. They will all want our Universal Card!! Do you know anyone who can't get a checking account? There are millions of people in this dilemma. That's no longer a problem with our company's no credit check, no questions asked policy to receive the CARD!! These two features of this incredible product are only the tip of the iceberg of what this card will do!! There has NEVER been any referral marketing company like ours before now, and there will never be one after it!! Yes, strong words...We know. We are the first company in the world to deliver an International Card with a $15,000,000 multi-purpose financial platform that allows the card to perform up to 600 functions!! A leading Int'l. accounting firm values the platform at $25 million dollars. Combine our Universal Card with the strongest compensation payout in the history of referral marketing, and you will see why the biggest networking leaders in the world are now positioning themselves in our company!! Pre-Launch is officially July 1st!! Earn up to $40,000.00 per week from your personal business center. You can also earn a 20% matching bonus check on the weekly earnings of all your personally sponsored reps. It gets even better...You also earn a 10% matching check on all of your 2nd level reps. Then we combine this with a second pay structure that earns you $10.00 per person per month with full compression and roll up and an infinity bonus from the 7th level down, for leaders!! Plus, 3 different income streams to earn true lifetime residuals! Have you ever seen TRUE walk away residual income, where your customer will continue to use a product without regular follow up by you? You're in for a pleasant surprise!! I want to ask you another question. Have you ever found a Global Product that is needed by 90% of the world's population with absolutely zero competition?? Then please read this.... Our company's President is a leading Technology Architect and formerly an Officer of one the largest International Banks in the world. He, in collaboration with a former Senior Vice President of an International Credit Card Company, has created a powerful MULTI-PURPOSE, universal card with incredible features called... You'll have to wait until you get to our website to see! Our card functions on an International Bank Card, ATM Network and Bank Certified Platform that cost over $15 million dollars and required 4 years to create!! A World Wide Multi-Billion Dollar Financial Institution insures all monies deposited into the Card!! Everyone, everywhere in the world has heard the name of this Financial Institution and get this, the NAME of this company will be printed on the back of every Card!! After the Pre-Launch, we will not only be able to mention the name of this multi-billion dollar financial institution, but we will also be able to prove it by pulling our card out of our wallet and showing people. Both the name of the International Credit Card Company and the name of this financial Institution will bring true global marketability and a level of confidence never experienced in referral marketing before!! The official corporate web site with full back office support, including real time genealogy and commissions, is already done and ready to go now!! But they are waiting to release them to the public until they open the doors for business. Until the Pre-Launch starts on July 1st, you can visit our temporary web site for all the details on our Universal Card, Company, Compensation Plan, Products, and the Principles that are behind our company. Each pre-registered member of our PERSONAL team gets a FREE self replicating web site to help you share this incredible opportunity with others before launch! You'll find ours at the end of this letter. Note: Our Company is over 2 years old!! This is a "NEW" beginning for an already solid and stable company. After you visit our temporary web site and read all the exciting details, you'll be able to pre-register, at no obligation, immediately & obtain your FREE site at the same time. I will then place you in the Power Leg I am building and start positioning others down under you to help you make money!! Many successful leaders have been fortunate enough to earn large amounts of money in the referral marketing industry by spotting winners before the masses get wind of them. Trust me, this is the BIGGEST thing we have EVER seen!! I look forward to working with you. Get pre-registered with us today. It won't cost you anything, yet at the same time, not doing so, could cost you a bundle!! Please email me with SEND INFO in the subject line and I will send you the web address and everything you need to get started NOW! m3autopilot2001@yahoo.com Randall B. REMOVE requests will be honored if sent to: masterlist3000@yahoo.com From list@netscape.com Wed Jun 27 17:10:24 2001 Received: from netscape.com (c3po.netscape.com [205.217.237.46]) by ietf.org (8.9.1a/8.9.1a) with SMTP id RAA05688 for ; Wed, 27 Jun 2001 17:10:23 -0400 (EDT) Received: from aka.mcom.com (aka.mcom.com [205.217.237.180]) by netscape.com (8.10.0/8.10.0) with ESMTP id f5RL8dY05867; Wed, 27 Jun 2001 14:08:39 -0700 (PDT) Received: (from list@localhost) by aka.mcom.com (8.10.0/8.10.0) id f5RL8dM18583; Wed, 27 Jun 2001 14:08:39 -0700 (PDT) Resent-Date: Wed, 27 Jun 2001 14:08:39 -0700 (PDT) From: maru@mandic.com.br Message-ID: <000051e65694$00000dcf$00003288@mandic.com.br> To: Subject: Make $1,000 per SALE!!................. 12936 Date: Wed, 27 Jun 2001 14:16:42 -0700 MIME-Version: 1.0 Content-Type: text/plain; charset="Windows-1252" Content-Transfer-Encoding: 7bit X-Priority: 3 X-MSMail-Priority: Normal Reply-To: thankyoutoday2001@yahoo.com X-Mailer: Microsoft Outlook 8.5, Build 4.71.2173.0 X-MimeOLE: Produced By Microsoft MimeOLE V4.72.3110.3 X-Originating-IP: 200.189.209.21 Resent-Message-ID: <"vnJBHC.A.ehE.UtkO7"@glacier> Resent-From: ietf-ldapext@netscape.com X-Mailing-List: X-Loop: ietf-ldapext@netscape.com Precedence: list Resent-Sender: ietf-ldapext-request@netscape.com Content-Transfer-Encoding: 7bit Receive $1,000 Commission on a $0 down SALE !! DID YOU MAKE $5,000 LAST MONTH? IF NOT, YOU NEED TO JOIN US TODAY! $0 DOWN ! 100% FINANCING - 100% CASH MACHINE EVERYBODY IS A PROSPECT - 98% APPROVED EARN $1,000 ON EVERY A THROUGH F CREDIT SALE! EARN $1,000 ON EACH AND EVERY SALE TO INFINITY! REQUEST MORE INFO NOW! send an e-mail to: poppaxis@yahoo.com with SEND INFO in the subject line NOW!! Available for USA residents only. We provide you with all resources you will ever need - even full tech support! ~~~~~~~~~~~ Market the hottest consumer savings package in America today and earn $1,000 each and every time someone joins for $0 DOWN! Imagine being plugged into a proven system that puts your entire business on auto-pilot and have you earning $3,000 every week! IT'S TRUE! You can be in business for $0 DOWN! And you can easily make $3,000 your very first week ... and we'll show you how! Your business will literally explode overnight when you join our team and plug into the BEST marketing system available on the web! REQUEST MORE INFO NOW! send an e-mail to: poppaxis@yahoo.com with SEND INFO in the subject line NOW! Available for USA residents only. REMOVE requests will be honored if send to masterlist3000@yahoo.com From list@netscape.com Wed Jun 27 17:37:02 2001 Received: from netscape.com (r2d2.netscape.com [205.217.237.47]) by ietf.org (8.9.1a/8.9.1a) with SMTP id RAA24175 for ; Wed, 27 Jun 2001 17:37:01 -0400 (EDT) Received: from aka.mcom.com (aka.mcom.com [205.217.237.180]) by netscape.com (8.10.0/8.10.0) with ESMTP id f5RLYcr25626; Wed, 27 Jun 2001 14:34:38 -0700 (PDT) Received: (from list@localhost) by aka.mcom.com (8.10.0/8.10.0) id f5RLYbc13723; Wed, 27 Jun 2001 14:34:38 -0700 (PDT) Resent-Date: Wed, 27 Jun 2001 14:34:38 -0700 (PDT) Message-ID: <005301c0fe65$4cba3e80$e40cfea9@bussuites.com> Reply-To: "CW" From: "CW" To: ietf-ldapext@netscape.com Subject: I can show you hoe to repair Credit Problems - NOW! Date: Tue, 26 Jun 2001 13:27:39 -0400 Organization: WAJC Publishing MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="----=_NextPart_000_0050_01C0FE43.C57DE500" X-Priority: 3 X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook Express 5.00.2615.200 X-MimeOLE: Produced By Microsoft MimeOLE V5.00.2615.200 Resent-Message-ID: <"a-TKAB.A.sVD.rFlO7"@glacier> Resent-From: ietf-ldapext@netscape.com X-Mailing-List: X-Loop: ietf-ldapext@netscape.com Precedence: list Resent-Sender: ietf-ldapext-request@netscape.com This is a multi-part message in MIME format. ------=_NextPart_000_0050_01C0FE43.C57DE500 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable /WWWWWWWWWWWWWWWWWWWWWWWWWWWW\ If you have credit problems YOU Must Read This Message. WWWWWWWWWWWWWWWWWWWWwwWWWWWWW/ I too had problems with my credit. I am a junior, named after my father. My father's bad credit, unscrupulous creditors, genuine=20 mistakes by the credit agencies, and my own indiscretions=20 created a devastating financial picture for me. Pardon my language,=20 but I thought that I was royally screwed! Then I woke up!!! I took matters into my own hands! Instead of=20 paying a credit repair company or a lawyer hundreds of dollars=20 I learned how to do it myself. And so can you. We are offering you a chance to learn how to correct your credit and get back on track. You can even learn the secrets to establishing a new credit identity. If you want to buy a=20 house, buy a car, get a loan, in some cases, even adopt a=20 dog -- good credit is imperative! You can purchase things with bad credit -- but at what costs. People with bad or poor credit pay higher rates, get denied opportunties, and = spend more money on the same financed items than people who have good credit. Recently, I was looking at a Mercedes Benz for my fiance. I noticed that a car dealer that specialized in financing to people with bad credit wanted $28,000 at 15% interest for the same car the we purchased for $16,000 at 6% interest. How? Simple. Because I was able to buy the car from a dealer that specializes in selling cars at wholesale rates to people who can get their car own car loans. Bad credit won't allow you to do this! Here is a brief of our information: Each easy-to-understand step is designed to remove negative=20 credit remarks on each of the major credit bureau files,=20 legally! Never before, has it been easier to remove=20 negative credit just like the professionals.=20 With our credit kit you can remove negative items from=20 each credit report:=20 TRW (Experian), TransUnion, CBI/Equifax=20 Communicate with the credit bureaus without fear or reprisal.=20 Manage your own credit reports easily because now "you"=20 have control over your reports. Re-establish good credit,=20 Fast and easy!"=20 Please go to: www.wajc.net/Products/CreditKit/creditkit.html=20 You can purchase our Consumer Credit Kit today, or you can=20 continue to deal with your negative credit situation.=20 =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D What price are you willing to pay for a fresh start or a better way of = life? =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D Order today, and we will also send you our FREE ebook: The Magic Story. It is a magical tale that will help you change your life for the Better! =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3DUnsubscrib= e = Information=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D You received this message as an opt in subscriber from one of our affiliates. To be removed from this list, click here = mailto:unsubscribe@wajc.net Thank you. =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D ------=_NextPart_000_0050_01C0FE43.C57DE500 Content-Type: text/html; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable
/WWWWWWWWWWWWWWWWWWWWWWWWWWWW\
If = you have=20 credit problems YOU Must Read This=20 Message.
WWWWWWWWWWWWWWWWWWWWwwWWWWWWW/
 
I too had problems with my credit. I am = a junior,=20 named after my
father. My father's bad credit, unscrupulous = creditors,=20 genuine
mistakes by the credit agencies, and my own indiscretions=20
created a devastating financial picture for me. Pardon my language, =
but=20 I thought that I was royally screwed!
 
Then I woke up!!! I took matters into = my own hands!=20 Instead of
paying a credit repair company or a lawyer hundreds of = dollars=20
I learned how to do it myself. And so can you.
 
We are offering you a chance to learn = how to=20 correct your
credit and get back on track. You can even learn the=20 secrets
to establishing a new credit identity.  If you want to = buy a=20
house, buy a car, get a loan, in some cases, even adopt a
dog -- = good=20 credit is imperative!
 
You can purchase things with bad credit = -- but at=20 what costs. People
with bad or poor credit pay higher rates, get = denied=20 opportunties, and spend more money on the same financed items than = people who=20 have good
credit.
 
Recently, I was looking at a Mercedes = Benz for my=20 fiance. I noticed
that a car dealer that specialized in financing to = people=20 with bad
credit wanted $28,000 at 15% interest for the same car the=20 we
purchased for $16,000 at 6% interest. How? Simple. Because = I
was able=20 to buy the car from a dealer that specializes in selling cars
at = wholesale=20 rates to people who can get their car own car loans.
Bad credit won't = allow=20 you to do this!
 

Here is a brief of our = information:
Each=20 easy-to-understand step is designed to remove negative
credit = remarks on=20 each of the major credit bureau files,
legally! Never before, has it = been=20 easier to remove
negative credit just like the professionals. =
 
With our credit kit you can remove = negative items=20 from
each credit report:
 
TRW (Experian), TransUnion, CBI/Equifax =
 
Communicate with the credit bureaus = without fear or=20 reprisal.
 
Manage your own credit reports easily = because now=20 "you"
have control over your reports. Re-establish good credit, =
Fast and=20 easy!"
 
Please go to:
 
www.wajc.n= et/Products/CreditKit/creditkit.html=20
 
You can purchase our Consumer Credit = Kit today, or=20 you can
continue to deal with your negative credit situation. =
 
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
What price=20 are you willing to pay for a fresh start or a better way of=20 life?
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
 
Order today, and we will also send you = our FREE=20 ebook: The Magic Story.
It is a magical tale that will help you = change your=20 life for the Better!
 
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3DU= nsubscribe=20 Information=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D
You received this message as an opt in=20 subscriber from one of our
affiliates. To be removed from this list, = click=20 here mailto:unsubscribe@wajc.net
T= hank=20 you.
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
------=_NextPart_000_0050_01C0FE43.C57DE500-- From list@netscape.com Thu Jun 28 03:29:08 2001 Received: from netscape.com (r2d2.netscape.com [205.217.237.47]) by ietf.org (8.9.1a/8.9.1a) with SMTP id DAA08900 for ; Thu, 28 Jun 2001 03:29:07 -0400 (EDT) Received: from aka.mcom.com (aka.mcom.com [205.217.237.180]) by netscape.com (8.10.0/8.10.0) with ESMTP id f5S7RPr06051; Thu, 28 Jun 2001 00:27:25 -0700 (PDT) Received: (from list@localhost) by aka.mcom.com (8.10.0/8.10.0) id f5S7RQ222037; Thu, 28 Jun 2001 00:27:26 -0700 (PDT) Resent-Date: Thu, 28 Jun 2001 00:27:26 -0700 (PDT) Date: Thu, 28 Jun 2001 00:27:52 -0700 (PDT) Message-Id: <200106280727.f5S7RqC16956@xwing.aoltw.net> From: h1hvxkqo4k@msn.com To: bubsaw4r@msn.com Reply-To: doylerundle3861@excite.com Subject: Something EVERY Business Needs! [vstt7] Resent-Message-ID: <"71jotC.A.3XF.bxtO7"@glacier> Resent-From: ietf-ldapext@netscape.com X-Mailing-List: X-Loop: ietf-ldapext@netscape.com Precedence: list Resent-Sender: ietf-ldapext-request@netscape.com Something EVERY business needs, a Merchant Account! A Merchant Account is the hardware and software which gives you the ability to allow customers to pay using any credit card such as Visa, Master Card, American Express, Discover etc., and other forms of payment such as e-Checks, Debit Cards and secure Internet based payment. We offer several different packages, any of which can be custom tailored to your needs. Services are currently provided to the United States and Canada. To make a purchase or ask questions regarding our services, please reply to this email with your full name, phone number (with area/country code) and if possible a good time to call. You are under no obligations. A sales rep will contact you and will be able to address any of your questions or needs. Thank you *** To be removed from our mailing list, reply to this email with the word 'Remove' in the subject line. *** From list@netscape.com Thu Jun 28 07:16:54 2001 Received: from netscape.com (r2d2.netscape.com [205.217.237.47]) by ietf.org (8.9.1a/8.9.1a) with SMTP id HAA11380 for ; Thu, 28 Jun 2001 07:16:53 -0400 (EDT) Received: from aka.mcom.com (aka.mcom.com [205.217.237.180]) by netscape.com (8.10.0/8.10.0) with ESMTP id f5SBEsr23723; Thu, 28 Jun 2001 04:14:54 -0700 (PDT) Received: (from list@localhost) by aka.mcom.com (8.10.0/8.10.0) id f5SBEsA18765; Thu, 28 Jun 2001 04:14:54 -0700 (PDT) Resent-Date: Thu, 28 Jun 2001 04:14:54 -0700 (PDT) Message-Id: <200106281114.HAA10789@ietf.org> Mime-Version: 1.0 Content-Type: Multipart/Mixed; Boundary="NextPart" To: IETF-Announce: ; CC: ietf-ldapext@netscape.com From: Internet-Drafts@ietf.org Reply-to: Internet-Drafts@ietf.org Subject: I-D ACTION:draft-zeilenga-ldap-user-schema-01.txt Date: Thu, 28 Jun 2001 07:14:07 -0400 Sender: nsyracus@cnri.reston.va.us Resent-Message-ID: <"KmyeKD.A.XkE.rGxO7"@glacier> Resent-From: ietf-ldapext@netscape.com X-Mailing-List: X-Loop: ietf-ldapext@netscape.com Precedence: list Resent-Sender: ietf-ldapext-request@netscape.com --NextPart A New Internet-Draft is available from the on-line Internet-Drafts directories. Title : LDAPv3: A Collection of User Schema Author(s) : K. Zeilenga Filename : draft-zeilenga-ldap-user-schema-01.txt Pages : 17 Date : 27-Jun-01 This document provides a collection of user schema elements for use with LDAP collected from numerous sources A URL for this Internet-Draft is: http://www.ietf.org/internet-drafts/draft-zeilenga-ldap-user-schema-01.txt Internet-Drafts are also available by anonymous FTP. Login with the username "anonymous" and a password of your e-mail address. After logging in, type "cd internet-drafts" and then "get draft-zeilenga-ldap-user-schema-01.txt". A list of Internet-Drafts directories can be found in http://www.ietf.org/shadow.html or ftp://ftp.ietf.org/ietf/1shadow-sites.txt Internet-Drafts can also be obtained by e-mail. Send a message to: mailserv@ietf.org. In the body type: "FILE /internet-drafts/draft-zeilenga-ldap-user-schema-01.txt". NOTE: The mail server at ietf.org can return the document in MIME-encoded form by using the "mpack" utility. To use this feature, insert the command "ENCODING mime" before the "FILE" command. To decode the response(s), you will need "munpack" or a MIME-compliant mail reader. Different MIME-compliant mail readers exhibit different behavior, especially when dealing with "multipart" MIME messages (i.e. documents which have been split up into multiple messages), so check your local documentation on how to manipulate these messages. Below is the data which will enable a MIME compliant mail reader implementation to automatically retrieve the ASCII version of the Internet-Draft. --NextPart Content-Type: Multipart/Alternative; Boundary="OtherAccess" --OtherAccess Content-Type: Message/External-body; access-type="mail-server"; server="mailserv@ietf.org" Content-Type: text/plain Content-ID: <20010627132415.I-D@ietf.org> ENCODING mime FILE /internet-drafts/draft-zeilenga-ldap-user-schema-01.txt --OtherAccess Content-Type: Message/External-body; name="draft-zeilenga-ldap-user-schema-01.txt"; site="ftp.ietf.org"; access-type="anon-ftp"; directory="internet-drafts" Content-Type: text/plain Content-ID: <20010627132415.I-D@ietf.org> --OtherAccess-- --NextPart-- From list@netscape.com Thu Jun 28 07:16:54 2001 Received: from netscape.com (c3po.netscape.com [205.217.237.46]) by ietf.org (8.9.1a/8.9.1a) with SMTP id HAA11381 for ; Thu, 28 Jun 2001 07:16:53 -0400 (EDT) Received: from aka.mcom.com (aka.mcom.com [205.217.237.180]) by netscape.com (8.10.0/8.10.0) with ESMTP id f5SBEjY10762; Thu, 28 Jun 2001 04:14:45 -0700 (PDT) Received: (from list@localhost) by aka.mcom.com (8.10.0/8.10.0) id f5SBEjI18544; Thu, 28 Jun 2001 04:14:45 -0700 (PDT) Resent-Date: Thu, 28 Jun 2001 04:14:45 -0700 (PDT) Message-Id: <200106281113.HAA10751@ietf.org> Mime-Version: 1.0 Content-Type: Multipart/Mixed; Boundary="NextPart" To: IETF-Announce: ; CC: ietf-ldapext@netscape.com From: Internet-Drafts@ietf.org Reply-to: Internet-Drafts@ietf.org Subject: I-D ACTION:draft-zeilenga-ldap-features-01.txt Date: Thu, 28 Jun 2001 07:13:56 -0400 Sender: nsyracus@cnri.reston.va.us Resent-Message-ID: <"1_Fh9C.A.YhE.iGxO7"@glacier> Resent-From: ietf-ldapext@netscape.com X-Mailing-List: X-Loop: ietf-ldapext@netscape.com Precedence: list Resent-Sender: ietf-ldapext-request@netscape.com --NextPart A New Internet-Draft is available from the on-line Internet-Drafts directories. Title : Feature Discovery in LDAP Author(s) : K. Zeilenga Filename : draft-zeilenga-ldap-features-01.txt Pages : 3 Date : 27-Jun-01 LDAP [RFC2251] is an extensible protocol with numerous elective features. LDAP provides mechanisms for a client to discover supported protocol versions, controls, extended operations, SASL mechanisms, and subschema information. However, these mechanisms are not designed to support general feature discovery. A URL for this Internet-Draft is: http://www.ietf.org/internet-drafts/draft-zeilenga-ldap-features-01.txt Internet-Drafts are also available by anonymous FTP. Login with the username "anonymous" and a password of your e-mail address. After logging in, type "cd internet-drafts" and then "get draft-zeilenga-ldap-features-01.txt". A list of Internet-Drafts directories can be found in http://www.ietf.org/shadow.html or ftp://ftp.ietf.org/ietf/1shadow-sites.txt Internet-Drafts can also be obtained by e-mail. Send a message to: mailserv@ietf.org. In the body type: "FILE /internet-drafts/draft-zeilenga-ldap-features-01.txt". NOTE: The mail server at ietf.org can return the document in MIME-encoded form by using the "mpack" utility. To use this feature, insert the command "ENCODING mime" before the "FILE" command. To decode the response(s), you will need "munpack" or a MIME-compliant mail reader. Different MIME-compliant mail readers exhibit different behavior, especially when dealing with "multipart" MIME messages (i.e. documents which have been split up into multiple messages), so check your local documentation on how to manipulate these messages. Below is the data which will enable a MIME compliant mail reader implementation to automatically retrieve the ASCII version of the Internet-Draft. --NextPart Content-Type: Multipart/Alternative; Boundary="OtherAccess" --OtherAccess Content-Type: Message/External-body; access-type="mail-server"; server="mailserv@ietf.org" Content-Type: text/plain Content-ID: <20010627132356.I-D@ietf.org> ENCODING mime FILE /internet-drafts/draft-zeilenga-ldap-features-01.txt --OtherAccess Content-Type: Message/External-body; name="draft-zeilenga-ldap-features-01.txt"; site="ftp.ietf.org"; access-type="anon-ftp"; directory="internet-drafts" Content-Type: text/plain Content-ID: <20010627132357.I-D@ietf.org> --OtherAccess-- --NextPart-- From list@netscape.com Thu Jun 28 07:18:10 2001 Received: from netscape.com (c3po.netscape.com [205.217.237.46]) by ietf.org (8.9.1a/8.9.1a) with SMTP id HAA11478 for ; Thu, 28 Jun 2001 07:18:09 -0400 (EDT) Received: from aka.mcom.com (aka.mcom.com [205.217.237.180]) by netscape.com (8.10.0/8.10.0) with ESMTP id f5SBGFY11180; Thu, 28 Jun 2001 04:16:25 -0700 (PDT) Received: (from list@localhost) by aka.mcom.com (8.10.0/8.10.0) id f5SBFow19222; Thu, 28 Jun 2001 04:15:50 -0700 (PDT) Resent-Date: Thu, 28 Jun 2001 04:15:50 -0700 (PDT) Message-Id: <200106281114.HAA10850@ietf.org> Mime-Version: 1.0 Content-Type: Multipart/Mixed; Boundary="NextPart" To: IETF-Announce: ; CC: ietf-ldapext@netscape.com From: Internet-Drafts@ietf.org Reply-to: Internet-Drafts@ietf.org Subject: I-D ACTION:draft-zeilenga-ldap-collective-01.txt Date: Thu, 28 Jun 2001 07:14:21 -0400 Sender: nsyracus@cnri.reston.va.us Resent-Message-ID: <"IsWJZ.A.NqE.HHxO7"@glacier> Resent-From: ietf-ldapext@netscape.com X-Mailing-List: X-Loop: ietf-ldapext@netscape.com Precedence: list Resent-Sender: ietf-ldapext-request@netscape.com --NextPart A New Internet-Draft is available from the on-line Internet-Drafts directories. Title : LDAPv3: Collective Attributes Author(s) : K. Zeilenga Filename : draft-zeilenga-ldap-collective-01.txt Pages : 8 Date : 27-Jun-01 Collective attributes allow common characteristics to be shared between collections of entries. This document summarizes the X.500 information model for collective attributes and describes use of collective attributes in LDAP. This document provides LDAP schema descriptions for X.500 collective attributes. A URL for this Internet-Draft is: http://www.ietf.org/internet-drafts/draft-zeilenga-ldap-collective-01.txt Internet-Drafts are also available by anonymous FTP. Login with the username "anonymous" and a password of your e-mail address. After logging in, type "cd internet-drafts" and then "get draft-zeilenga-ldap-collective-01.txt". A list of Internet-Drafts directories can be found in http://www.ietf.org/shadow.html or ftp://ftp.ietf.org/ietf/1shadow-sites.txt Internet-Drafts can also be obtained by e-mail. Send a message to: mailserv@ietf.org. In the body type: "FILE /internet-drafts/draft-zeilenga-ldap-collective-01.txt". NOTE: The mail server at ietf.org can return the document in MIME-encoded form by using the "mpack" utility. To use this feature, insert the command "ENCODING mime" before the "FILE" command. To decode the response(s), you will need "munpack" or a MIME-compliant mail reader. Different MIME-compliant mail readers exhibit different behavior, especially when dealing with "multipart" MIME messages (i.e. documents which have been split up into multiple messages), so check your local documentation on how to manipulate these messages. Below is the data which will enable a MIME compliant mail reader implementation to automatically retrieve the ASCII version of the Internet-Draft. --NextPart Content-Type: Multipart/Alternative; Boundary="OtherAccess" --OtherAccess Content-Type: Message/External-body; access-type="mail-server"; server="mailserv@ietf.org" Content-Type: text/plain Content-ID: <20010627132432.I-D@ietf.org> ENCODING mime FILE /internet-drafts/draft-zeilenga-ldap-collective-01.txt --OtherAccess Content-Type: Message/External-body; name="draft-zeilenga-ldap-collective-01.txt"; site="ftp.ietf.org"; access-type="anon-ftp"; directory="internet-drafts" Content-Type: text/plain Content-ID: <20010627132432.I-D@ietf.org> --OtherAccess-- --NextPart-- From list@netscape.com Thu Jun 28 07:18:14 2001 Received: from netscape.com (c3po.netscape.com [205.217.237.46]) by ietf.org (8.9.1a/8.9.1a) with SMTP id HAA11493 for ; Thu, 28 Jun 2001 07:18:12 -0400 (EDT) Received: from aka.mcom.com (aka.mcom.com [205.217.237.180]) by netscape.com (8.10.0/8.10.0) with ESMTP id f5SBFQY11016; Thu, 28 Jun 2001 04:15:46 -0700 (PDT) Received: (from list@localhost) by aka.mcom.com (8.10.0/8.10.0) id f5SBF1Y18976; Thu, 28 Jun 2001 04:15:01 -0700 (PDT) Resent-Date: Thu, 28 Jun 2001 04:15:01 -0700 (PDT) Message-Id: <200106281114.HAA10820@ietf.org> Mime-Version: 1.0 Content-Type: Multipart/Mixed; Boundary="NextPart" To: IETF-Announce: ; CC: ietf-ldapext@netscape.com From: Internet-Drafts@ietf.org Reply-to: Internet-Drafts@ietf.org Subject: I-D ACTION:draft-zeilenga-ldap-opattrs-01.txt Date: Thu, 28 Jun 2001 07:14:13 -0400 Sender: nsyracus@cnri.reston.va.us Resent-Message-ID: <"VLo9LB.A.SnE.xGxO7"@glacier> Resent-From: ietf-ldapext@netscape.com X-Mailing-List: X-Loop: ietf-ldapext@netscape.com Precedence: list Resent-Sender: ietf-ldapext-request@netscape.com --NextPart A New Internet-Draft is available from the on-line Internet-Drafts directories. Title : LDAPv3: All Operational Attributes Author(s) : K. Zeilenga Filename : draft-zeilenga-ldap-opattrs-01.txt Pages : 4 Date : 27-Jun-01 X.500 [X.500] provides a mechanism for clients to request all operational attributes be returned with entries provided in response to a search operation. This mechanism is often used by clients to discover which operational attributes are present in an entry. A URL for this Internet-Draft is: http://www.ietf.org/internet-drafts/draft-zeilenga-ldap-opattrs-01.txt Internet-Drafts are also available by anonymous FTP. Login with the username "anonymous" and a password of your e-mail address. After logging in, type "cd internet-drafts" and then "get draft-zeilenga-ldap-opattrs-01.txt". A list of Internet-Drafts directories can be found in http://www.ietf.org/shadow.html or ftp://ftp.ietf.org/ietf/1shadow-sites.txt Internet-Drafts can also be obtained by e-mail. Send a message to: mailserv@ietf.org. In the body type: "FILE /internet-drafts/draft-zeilenga-ldap-opattrs-01.txt". NOTE: The mail server at ietf.org can return the document in MIME-encoded form by using the "mpack" utility. To use this feature, insert the command "ENCODING mime" before the "FILE" command. To decode the response(s), you will need "munpack" or a MIME-compliant mail reader. Different MIME-compliant mail readers exhibit different behavior, especially when dealing with "multipart" MIME messages (i.e. documents which have been split up into multiple messages), so check your local documentation on how to manipulate these messages. Below is the data which will enable a MIME compliant mail reader implementation to automatically retrieve the ASCII version of the Internet-Draft. --NextPart Content-Type: Multipart/Alternative; Boundary="OtherAccess" --OtherAccess Content-Type: Message/External-body; access-type="mail-server"; server="mailserv@ietf.org" Content-Type: text/plain Content-ID: <20010627132424.I-D@ietf.org> ENCODING mime FILE /internet-drafts/draft-zeilenga-ldap-opattrs-01.txt --OtherAccess Content-Type: Message/External-body; name="draft-zeilenga-ldap-opattrs-01.txt"; site="ftp.ietf.org"; access-type="anon-ftp"; directory="internet-drafts" Content-Type: text/plain Content-ID: <20010627132424.I-D@ietf.org> --OtherAccess-- --NextPart-- From list@netscape.com Thu Jun 28 07:18:16 2001 Received: from netscape.com (c3po.netscape.com [205.217.237.46]) by ietf.org (8.9.1a/8.9.1a) with SMTP id HAA11503 for ; Thu, 28 Jun 2001 07:18:15 -0400 (EDT) Received: from aka.mcom.com (aka.mcom.com [205.217.237.180]) by netscape.com (8.10.0/8.10.0) with ESMTP id f5SBGMY11210; Thu, 28 Jun 2001 04:16:34 -0700 (PDT) Received: (from list@localhost) by aka.mcom.com (8.10.0/8.10.0) id f5SBFvs19271; Thu, 28 Jun 2001 04:15:57 -0700 (PDT) Resent-Date: Thu, 28 Jun 2001 04:15:57 -0700 (PDT) Message-Id: <200106281114.HAA10870@ietf.org> Mime-Version: 1.0 Content-Type: Multipart/Mixed; Boundary="NextPart" To: IETF-Announce: ; CC: ietf-ldapext@netscape.com From: Internet-Drafts@ietf.org Reply-to: Internet-Drafts@ietf.org Subject: I-D ACTION:draft-zeilenga-ldap-x500-locate-01.txt Date: Thu, 28 Jun 2001 07:14:26 -0400 Sender: nsyracus@cnri.reston.va.us Resent-Message-ID: <"4RgocD.A.CrE.NHxO7"@glacier> Resent-From: ietf-ldapext@netscape.com X-Mailing-List: X-Loop: ietf-ldapext@netscape.com Precedence: list Resent-Sender: ietf-ldapext-request@netscape.com --NextPart A New Internet-Draft is available from the on-line Internet-Drafts directories. Title : Location of LDAP services using Geo-Political Naming Author(s) : K. Zeilenga Filename : draft-zeilenga-ldap-x500-locate-01.txt Pages : 6 Date : 27-Jun-01 This document describes an experimental mechanism for locating LDAP services which use traditional geo-political naming. The mechanism uses DNS SRV records which supports the established ITU managed name registration model A URL for this Internet-Draft is: http://www.ietf.org/internet-drafts/draft-zeilenga-ldap-x500-locate-01.txt Internet-Drafts are also available by anonymous FTP. Login with the username "anonymous" and a password of your e-mail address. After logging in, type "cd internet-drafts" and then "get draft-zeilenga-ldap-x500-locate-01.txt". A list of Internet-Drafts directories can be found in http://www.ietf.org/shadow.html or ftp://ftp.ietf.org/ietf/1shadow-sites.txt Internet-Drafts can also be obtained by e-mail. Send a message to: mailserv@ietf.org. In the body type: "FILE /internet-drafts/draft-zeilenga-ldap-x500-locate-01.txt". NOTE: The mail server at ietf.org can return the document in MIME-encoded form by using the "mpack" utility. To use this feature, insert the command "ENCODING mime" before the "FILE" command. To decode the response(s), you will need "munpack" or a MIME-compliant mail reader. Different MIME-compliant mail readers exhibit different behavior, especially when dealing with "multipart" MIME messages (i.e. documents which have been split up into multiple messages), so check your local documentation on how to manipulate these messages. Below is the data which will enable a MIME compliant mail reader implementation to automatically retrieve the ASCII version of the Internet-Draft. --NextPart Content-Type: Multipart/Alternative; Boundary="OtherAccess" --OtherAccess Content-Type: Message/External-body; access-type="mail-server"; server="mailserv@ietf.org" Content-Type: text/plain Content-ID: <20010627132441.I-D@ietf.org> ENCODING mime FILE /internet-drafts/draft-zeilenga-ldap-x500-locate-01.txt --OtherAccess Content-Type: Message/External-body; name="draft-zeilenga-ldap-x500-locate-01.txt"; site="ftp.ietf.org"; access-type="anon-ftp"; directory="internet-drafts" Content-Type: text/plain Content-ID: <20010627132441.I-D@ietf.org> --OtherAccess-- --NextPart-- From list@netscape.com Thu Jun 28 09:38:29 2001 Received: from netscape.com (c3po.netscape.com [205.217.237.46]) by ietf.org (8.9.1a/8.9.1a) with SMTP id JAA04768 for ; Thu, 28 Jun 2001 09:38:28 -0400 (EDT) Received: from aka.mcom.com (aka.mcom.com [205.217.237.180]) by netscape.com (8.10.0/8.10.0) with ESMTP id f5SDakY22351; Thu, 28 Jun 2001 06:36:47 -0700 (PDT) Received: (from list@localhost) by aka.mcom.com (8.10.0/8.10.0) id f5SDalg23984; Thu, 28 Jun 2001 06:36:47 -0700 (PDT) Resent-Date: Thu, 28 Jun 2001 06:36:47 -0700 (PDT) Reply-To: From: "Sean Burke" To: Cc: Subject: RE: I-D ACTION:draft-zeilenga-ldap-x500-locate-01.txt Date: Thu, 28 Jun 2001 09:29:52 -0400 Message-ID: <004801c0ffd6$6a442930$48345141@globalgateway.net> MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit X-Priority: 3 (Normal) X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook, Build 10.0.2627 Importance: Normal In-Reply-To: <200106281114.HAA10870@ietf.org> X-MimeOLE: Produced By Microsoft MimeOLE V5.50.4522.1200 Resent-Message-ID: <"vTA2qD.A.W2F.tLzO7"@glacier> Resent-From: ietf-ldapext@netscape.com X-Mailing-List: X-Loop: ietf-ldapext@netscape.com Precedence: list Resent-Sender: ietf-ldapext-request@netscape.com Content-Transfer-Encoding: 7bit Please unsubscribe me from this new letter. -----Original Message----- From: nsyracus@cnri.reston.va.us [mailto:nsyracus@cnri.reston.va.us] On Behalf Of Internet-Drafts@ietf.org Sent: Thursday, June 28, 2001 7:14 AM To: IETF-Announce: Cc: ietf-ldapext@NETSCAPE.COM Subject: I-D ACTION:draft-zeilenga-ldap-x500-locate-01.txt A New Internet-Draft is available from the on-line Internet-Drafts directories. Title : Location of LDAP services using Geo-Political Naming Author(s) : K. Zeilenga Filename : draft-zeilenga-ldap-x500-locate-01.txt Pages : 6 Date : 27-Jun-01 This document describes an experimental mechanism for locating LDAP services which use traditional geo-political naming. The mechanism uses DNS SRV records which supports the established ITU managed name registration model A URL for this Internet-Draft is: http://www.ietf.org/internet-drafts/draft-zeilenga-ldap-x500-locate-01.t xt Internet-Drafts are also available by anonymous FTP. Login with the username "anonymous" and a password of your e-mail address. After logging in, type "cd internet-drafts" and then "get draft-zeilenga-ldap-x500-locate-01.txt". A list of Internet-Drafts directories can be found in http://www.ietf.org/shadow.html or ftp://ftp.ietf.org/ietf/1shadow-sites.txt Internet-Drafts can also be obtained by e-mail. Send a message to: mailserv@ietf.org. In the body type: "FILE /internet-drafts/draft-zeilenga-ldap-x500-locate-01.txt". NOTE: The mail server at ietf.org can return the document in MIME-encoded form by using the "mpack" utility. To use this feature, insert the command "ENCODING mime" before the "FILE" command. To decode the response(s), you will need "munpack" or a MIME-compliant mail reader. Different MIME-compliant mail readers exhibit different behavior, especially when dealing with "multipart" MIME messages (i.e. documents which have been split up into multiple messages), so check your local documentation on how to manipulate these messages. Below is the data which will enable a MIME compliant mail reader implementation to automatically retrieve the ASCII version of the Internet-Draft. From list@netscape.com Thu Jun 28 11:05:59 2001 Received: from netscape.com (c3po.netscape.com [205.217.237.46]) by ietf.org (8.9.1a/8.9.1a) with SMTP id LAA07313 for ; Thu, 28 Jun 2001 11:05:58 -0400 (EDT) Received: from aka.mcom.com (aka.mcom.com [205.217.237.180]) by netscape.com (8.10.0/8.10.0) with ESMTP id f5SF3KY02997; Thu, 28 Jun 2001 08:03:20 -0700 (PDT) Received: (from list@localhost) by aka.mcom.com (8.10.0/8.10.0) id f5SF3K626795; Thu, 28 Jun 2001 08:03:20 -0700 (PDT) Resent-Date: Thu, 28 Jun 2001 08:03:20 -0700 (PDT) Date: Thu, 28 Jun 2001 17:01:30 +0200 From: tellmeok@bbkinger.com.netscape.com To: Subject: HEY... HOW BAD DO YOU WANT IT? Reply-To: sample@whynot.net X-PMFLAGS: 10322341.10 X-UIDL: 10293287_192832.222 Comments: Authenticated Sender is Message-Id: 93904039291232@hsd_hypothesis.com Resent-Message-ID: <"1wiwXB.A.yhG.0c0O7"@glacier> Resent-From: ietf-ldapext@netscape.com X-Mailing-List: X-Loop: ietf-ldapext@netscape.com Precedence: list Resent-Sender: ietf-ldapext-request@netscape.com Hello, Recently you agreed to recieve info on things that could dramatically change your future forever. We have broken records in 4 companies already! This is a LEADERS ONLY CLUB and as a team we are unstopable! Imagine a group of leaders that moves from one opportunity to the next as a redy built downline where you are constantly moving up! HUGE CASH GUARANTEES!!! visit the site below, ITS FREE! http://webhost4u.mysprintfast.com/networkpage.html OR, If you have already found a company to call home and you want HOT FRESH leads then visit the site below, ITS FREE! http://webhost4u.mysprintfast.com/leadorders.html =========================================================== This mail is sent by a member (ID 1129) of removenow.org --- the email watchdog. --- To be excluded from future mailings by this member and thousands of other companies , please click here: http://www.removenow.org ============================================================ From list@netscape.com Thu Jun 28 15:04:21 2001 Received: from netscape.com (c3po.netscape.com [205.217.237.46]) by ietf.org (8.9.1a/8.9.1a) with SMTP id PAA25825 for ; Thu, 28 Jun 2001 15:04:20 -0400 (EDT) Received: from aka.mcom.com (aka.mcom.com [205.217.237.180]) by netscape.com (8.10.0/8.10.0) with ESMTP id f5SHtUY09845; Thu, 28 Jun 2001 10:55:31 -0700 (PDT) Received: (from list@localhost) by aka.mcom.com (8.10.0/8.10.0) id f5SHppM26409; Thu, 28 Jun 2001 10:51:51 -0700 (PDT) Resent-Date: Thu, 28 Jun 2001 10:51:51 -0700 (PDT) Message-ID: <000044497f31$00000aa8$000009d6@mail.keepyourheadup.net> To: From: corn333333@catchaplane.net Subject: Boost Your Windows Reliability!!!!! 2518 Date: Sun, 17 Jun 2001 02:44:37 -0400 MIME-Version: 1.0 Content-Type: text/html; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable X-Priority: 3 X-MSMail-Priority: Normal Reply-To: qwertrew@Flashmail.com Resent-Message-ID: <"2OS-eB.A.bVG.l62O7"@glacier> Resent-From: ietf-ldapext@netscape.com X-Mailing-List: X-Loop: ietf-ldapext@netscape.com Precedence: list Resent-Sender: ietf-ldapext-request@netscape.com Content-Transfer-Encoding: quoted-printable

Dear Windows User,

Now you can boost the reliability of ordinary Windows 95, 98 and ME to nea= rly the level of Windows NT or 2000, Microsoft's professional and industrial v= ersion of Windows.

The new WinFix is a very effective way to improve the reliability of Windo= ws, because it makes Windows fault-tolerant and self-repairing.

And WinFix is very safe, because it operates completely independent of Win= dows.

CLICK = HERE to find out more about WinFix, the safest, most effect= ive way to keep you working, by keeping your PC working non-stop.

Arlen Dixon, CEO
Pinewood Software Marketing

-------------------------------------------------------

This announcement is intended for PC users who asked to be kept
informed about new developments in Windows technology.

To be removed from future mailings, please reply with REMOVE in the sub= ject line.

From list@netscape.com Thu Jun 28 17:50:08 2001 Received: from netscape.com (c3po.netscape.com [205.217.237.46]) by ietf.org (8.9.1a/8.9.1a) with SMTP id RAA09591 for ; Thu, 28 Jun 2001 17:50:08 -0400 (EDT) Received: from aka.mcom.com (aka.mcom.com [205.217.237.180]) by netscape.com (8.10.0/8.10.0) with ESMTP id f5SLlFY00114; Thu, 28 Jun 2001 14:47:16 -0700 (PDT) Received: (from list@localhost) by aka.mcom.com (8.10.0/8.10.0) id f5SLlGI06558; Thu, 28 Jun 2001 14:47:16 -0700 (PDT) Resent-Date: Thu, 28 Jun 2001 14:47:16 -0700 (PDT) Message-Id: <200106282147.f5SLlfC06774@xwing.aoltw.net> From: "BuyDirect" To: Subject: Your Summer Guide Has Arrived Mime-Version: 1.0 Content-Type: text/html; charset="iso-8859-1" Date: Thu, 28 Jun 2001 14:50:41 Resent-Message-ID: <"fIjzg.A.SlB.hX6O7"@glacier> Resent-From: ietf-ldapext@netscape.com X-Mailing-List: X-Loop: ietf-ldapext@netscape.com Precedence: list Resent-Sender: ietf-ldapext-request@netscape.com

For those of you who cannot read HTML coded messages, our apologies.

But for those of you who can read this:

IT'S A SUMMER SAVINGS EVENT!

We've assembled a directory of many of the best company's in the
world who are offering merchandise and services with savings up to
70% off on many items.

When you click below it will take to you to whatever service or
product you can possibly imagine.

 

Click HERE and SAVE $$$

 

 

 

 

From list@netscape.com Thu Jun 28 23:03:55 2001 Received: from netscape.com (r2d2.netscape.com [205.217.237.47]) by ietf.org (8.9.1a/8.9.1a) with SMTP id XAA16225 for ; Thu, 28 Jun 2001 23:03:55 -0400 (EDT) Received: from aka.mcom.com (aka.mcom.com [205.217.237.180]) by netscape.com (8.10.0/8.10.0) with ESMTP id f5T324r23943; Thu, 28 Jun 2001 20:02:04 -0700 (PDT) Received: (from list@localhost) by aka.mcom.com (8.10.0/8.10.0) id f5T324s13168; Thu, 28 Jun 2001 20:02:04 -0700 (PDT) Resent-Date: Thu, 28 Jun 2001 20:02:04 -0700 (PDT) From: Stealth@renetcom.net Message-Id: <200106290300.MAA15359@schbc.ac.kr> To: Subject: Stealth Mass Mailer, 10 Million Fresh Email Addresses & More.. 1467 Date: Thu, 28 Jun 2001 19:57:43 -0700 MIME-Version: 1.0 Content-Type: text/html; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable Reply-To: Stealth@renetcom.net Resent-Message-ID: <"x6IPvC.A.XND.q--O7"@glacier> Resent-From: ietf-ldapext@netscape.com X-Mailing-List: X-Loop: ietf-ldapext@netscape.com Precedence: list Resent-Sender: ietf-ldapext-request@netscape.com Content-Transfer-Encoding: quoted-printable Email advertising WORKS! Email Advertise your product or website to millions for only $99. For $99.00 you will receive the Stealth Bulk Mailing Software, List Manager, Over 10 Million "FRESH" E-Mail Addresses, Targeted Email Address Harvesting Software, and as a FREE BONUS, special Mail Servers to send your mail through! Its only $99 for everything, and you can DOWNLOAD IT ALL, today! And as a special bonus, we will harvest a targeted list of your choice! FOR MORE INFO: ---> http://webhost4u.mysprintfast.com/mrx/ To be PERMANENTLY REMOVED from our mail list, YOU MUST SIMPLY REPLY with "REMOVE" in the --> "SUBJECT" Line! =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D This mail is sent by a member (ID 1129) of removenow.org --- the email watchdog. --- To be excluded from future mailings by this member and thousands of other companies , please exercise this your right at http://www.removenow.org From list@netscape.com Fri Jun 29 00:08:26 2001 Received: from netscape.com (c3po.netscape.com [205.217.237.46]) by ietf.org (8.9.1a/8.9.1a) with SMTP id AAA01842 for ; Fri, 29 Jun 2001 00:08:24 -0400 (EDT) Received: from aka.mcom.com (aka.mcom.com [205.217.237.180]) by netscape.com (8.10.0/8.10.0) with ESMTP id f5T46GY22018; Thu, 28 Jun 2001 21:06:16 -0700 (PDT) Received: (from list@localhost) by aka.mcom.com (8.10.0/8.10.0) id f5T46Ho27911; Thu, 28 Jun 2001 21:06:17 -0700 (PDT) Resent-Date: Thu, 28 Jun 2001 21:06:17 -0700 (PDT) To: knedabreak@netscape.com From: tigger601@emailisfun.com Subject: The Scale Moved!!!!!!!! Date: Fri, 29 Jun 2001 00:05:27 -0500 Content-Type: text/html; charset="iso-8859-1" Content-Transfer-Encoding: 8BIT Message-Id: <37w87y03chvb1lly.u8wc4bqxi17mh4da4f@mail2.emailisfun.com> CC: ian@netscape.com, ik@netscape.com, hyama@netscape.com, hyatt@netscape.com, ienvenu@netscape.com, iesrp@netscape.com, ietf-ldapext-request@netscape.com, ietf-ldapext@netscape.com, irene@netscape.com, iqax5@netscape.com, ira@netscape.com, idesignwebcom@netscape.com, ichelobe@netscape.com, iamachristian@netscape.com, iggy53@netscape.com X-Mailer: Microsoft Outlook Express 5.50.4133.2400 Resent-Message-ID: <"GnrbZB.A.ZzG.36_O7"@glacier> Resent-From: ietf-ldapext@netscape.com X-Mailing-List: X-Loop: ietf-ldapext@netscape.com Precedence: list Resent-Sender: ietf-ldapext-request@netscape.com Content-Transfer-Encoding: 8BIT THE SCALE MOVED

THE SCALE MOVED!!!

Hello! My name is Tami Evans and I would like to share my experience as an
inspiration to many who may feel there is no hope.

It’s amazing how long you can avoid dealing with a problem that you simply
don’t want to face up to. I managed to ignore my weight problem for the
better part of a decade.

My life was going from the bed to the sofa and from the sofa to the
refrigerator.

Food was my escape, and the weight piled on until I hated the way I looked.
At my top weight of 282 pounds, I felt worthless, with no desire or energy
to respond to life. I would look at old pictures, and wonder — If that thin,
sexy, woman, in that short black dress — was really me? (My husband proposed
to me in that dress 10 years ago) I didn’t even feel like that happy woman
in the picture – I was exhausted and so depressed.

My husband, who had been caring for me and our four children (because I was
too big), was genuinely concerned about my physical and mental health. I was
tired - very tired, of the struggle to make it through each day.

I have been on every diet you can think of during my lengthy dieting
"career. " Diet Center, NutriSystem, Slim Fast, Atkins Diet, & even
Phen-Phen, and the list goes on and on. I would diet for the first few days,
then it was only a matter of time until I reached my breaking point and
ended up eating vast quantities of the very foods I’d been denying myself.
NOTHING worked for me until a dear friend of ours convinced me to try a
product that was nutritionally engineered for maximum results. That product
was called BERRYTRIM PLUS.

After about five days on BERRYTRIM PLUS, I began to experience a sense of
"well being" with increased energy - I didn’t feel tired, irritable or
sluggish. More Importantly, I didn't feel Hungry - something I hadn't felt
for months, maybe years.

I've been looking for a weight-loss solution for so long. I thought I had
tried
everything when...

The Scale Moved!! I mean, really Moved! .

I lost 126 pounds in 6 months.
Within 6 months I dropped down to 156 pounds.

Today, I can do many activities that I couldn't when I weighed 282 pounds.
The most amazing part - how simple and easy it was! My doctor has examined
me, and my weight loss has blown his mind! People that I used to work with
and even family members didn't recognize me at Christmas! I truly wish
everyone who is overweight knew about this program ... I plan to tell
everyone I can who has struggled with his or her weight, like I have. I can
feel your pain, believe me!!! You cannot go wrong on the BerryTrim Plus
program! It has given me a new lease on life… After losing 126 pounds so
far, I feel very confident, happy, and even sexy! Oh, and I recently wore
that same black cocktail dress I wore when my husband proposed - 10 years
ago! (I guess that woman in the picture really was me! ) I thought I would
never look and feel like that again!

BERRYTRIM PLUS is a powerful gift from nature that has touched every aspect
of my life! And from the bottom of my heart, I will always thank my dear
friend Judy for telling me about this wonderful product and giving me back
the joy of living.
IF I COULD DO IT, YOU CAN DO IT TOO!
I was sick of being fat. I didn’t like the way I looked and I didn’t like
the way I felt. I felt that I owed it to my husband, my four children, and
myself to make one more attempt at weight loss. If you need to lose a few
pounds, more than 100 pounds, or anything in between, click through this
website thoroughly and marvel over what this amazing product has done for so
many people like you and me!. The proof is in the pudding (so to speak) so
take a look at the many success stories from others who have gained better
health, improved their relationships, and of course, lost weight and are
keeping it off for good. The testimonials speak for themselves. And if you
decide this is something you are willing to try — GO FOR IT!!!!! You won't
be sorry.. Do take the time to read them. Many are simply AMAZING!

Click here to read many of the success stories.

CLICK HERE

God Bless,

Tami Evans

 

This message is brought to you by BerryTrim Affiliate# 3b3773c002ce47b
We apologize for any email you may have inadvertently received.
Please CLICK HERE to be removed from future mailings.

From list@netscape.com Fri Jun 29 10:25:22 2001 Received: from netscape.com (r2d2.netscape.com [205.217.237.47]) by ietf.org (8.9.1a/8.9.1a) with SMTP id KAA09759 for ; Fri, 29 Jun 2001 10:25:20 -0400 (EDT) Received: from aka.mcom.com (aka.mcom.com [205.217.237.180]) by netscape.com (8.10.0/8.10.0) with ESMTP id f5TEMrr14066; Fri, 29 Jun 2001 07:22:53 -0700 (PDT) Received: (from list@localhost) by aka.mcom.com (8.10.0/8.10.0) id f5TEMsg21207; Fri, 29 Jun 2001 07:22:54 -0700 (PDT) Resent-Date: Fri, 29 Jun 2001 07:22:54 -0700 (PDT) Message-ID: <000061af058b$00004d68$00006053@mail3.emailisfun.com> To: From: corn40@emailisfun.com Subject: You Won The First Round! claim# 2522 24659 Date: Fri, 29 Jun 2001 09:18:20 -0400 MIME-Version: 1.0 Content-Type: text/html; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable X-Priority: 3 X-MSMail-Priority: Normal Reply-To: wjilknmv@acmemail.net Resent-Message-ID: <"6oPlLD.A.RKF.68IP7"@glacier> Resent-From: ietf-ldapext@netscape.com X-Mailing-List: X-Loop: ietf-ldapext@netscape.com Precedence: list Resent-Sender: ietf-ldapext-request@netscape.com Content-Transfer-Encoding: quoted-printable

You Have Won The First Round!

Claim Your Entry Now!

Collect The Prize Of The Week!<= /b>

Click Here To Collect!

 

We apologize for any email you may ha= ve inadvertently received.
Please CLICK HERE to be remov= ed from future mailings.

From list@netscape.com Fri Jun 29 12:07:30 2001 Received: from netscape.com (r2d2.netscape.com [205.217.237.47]) by ietf.org (8.9.1a/8.9.1a) with SMTP id MAA16572 for ; Fri, 29 Jun 2001 12:07:25 -0400 (EDT) Received: from aka.mcom.com (aka.mcom.com [205.217.237.180]) by netscape.com (8.10.0/8.10.0) with ESMTP id f5TG5sr04038; Fri, 29 Jun 2001 09:05:55 -0700 (PDT) Received: (from list@localhost) by aka.mcom.com (8.10.0/8.10.0) id f5TG5rg10756; Fri, 29 Jun 2001 09:05:53 -0700 (PDT) Resent-Date: Fri, 29 Jun 2001 09:05:53 -0700 (PDT) Message-Id: <5.0.2.1.0.20010629105210.00a63688@popmail2.austin.ibm.com> X-Sender: stokes@popmail2.austin.ibm.com X-Mailer: QUALCOMM Windows Eudora Version 5.0.2 Date: Fri, 29 Jun 2001 11:05:39 -0500 To: internet-drafts@ietf.org From: Ellen Stokes Subject: please publish - draft-ietf-ldapext-acl-model-08.txt Cc: ietf-ldapext@netscape.com Mime-Version: 1.0 Content-Type: multipart/mixed; boundary="=====================_11243497==_" Resent-Message-ID: <"aWDKOC.A.FnC.edKP7"@glacier> Resent-From: ietf-ldapext@netscape.com X-Mailing-List: X-Loop: ietf-ldapext@netscape.com Precedence: list Resent-Sender: ietf-ldapext-request@netscape.com --=====================_11243497==_ Content-Type: text/plain; charset="us-ascii"; format=flowed Internet Drafts Editor, Please publish the attached draft: draft-ietf-ldapext-acl-model-08.txt Thanks. ldapext working group: Please find attached the next version of the ldap access control model. The following is a summary list of the changes we made in this draft based on mailing list comments, discussions, etc: - list of what is out of scope for the model - corrected and consistent ABNF and ASN.1 - authentication level is now a set of levels similar to what is in X.500; it is always an explicitly required part of an ACI (see security considerations section) - ipAddress and DNSName are retained as subjects (see security considerations section) - a few new permissions u = unveil (disclose on error) p = search filter (presence only) g = get effective rights - expanded section on access control decision making that discusses applicability rules, precedences, inheritance, and the algorithm; examples of applying the algorithm to make an access control decision - added lots more examples in section 8 to cover interaction among ACI, use of ipAddress in ACI, and use of authnLevel in ACI - revision of getEffectiveRights control for simplicity - expanded security considerations section Please recall that the goal here from the last IETF meeting is to do a last call on this draft before the August meeting. So please review so we can make a last call happen real soon (remember that IF we need to do another revision before the last call, the draft cutoff is July 20). Please send comments to the list. Thanks. Ellen, Rob, and Rick --=====================_11243497==_ Content-Type: text/plain; charset="us-ascii" Content-Disposition: attachment; filename="draft-ietf-ldapext-acl-model-08.txt.txt" Internet-Draft E. Stokes LDAP Extensions WG B. Blakley Intended Category: Standards Track Tivoli Systems Expires: 29 December 2001 R. Byrne Sun Microsystems R. Huber AT&T Laboratories D. Rinkevich Momenta 29 June 2001 Access Control Model for LDAPv3 STATUS OF THIS MEMO This document is an Internet-Draft and is in full conformance with all provisions of Section 10 of RFC2026. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF), its areas, and its working groups. Note that other groups may also distribute working documents as Internet-Drafts. Internet- Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." The list of current Internet-Drafts can be accessed at http://www.ietf.org/ietf/1id-abstracts.txt The list of Internet-Draft Shadow Directories can be accessed at http://www.ietf.org/shadow.html. Comments and suggestions on this document are encouraged. Comments on this document should be sent to the LDAPEXT working group discussion list: ietf-ldapext@netscape.com COPYRIGHT NOTICE Copyright (C) The Internet Society (2000). All Rights Reserved. ABSTRACT This document describes the access control model for the Lightweight Directory Application Protocol V3 (LDAPv3) directory service. It includes a description of the model, the schema for the model, and the LDAP control to the LDAP protocol. The current LDAP APIs are sufficient for the access control operations. A separate requirements document for access control exists [REQTS]. The access control model used the Stokes, et al Expires 29 December 2001 [Page 1] Internet-Draft Access Control Model 29 June 2001 requirements document as a guideline for the development of this specification and are reflected in this specification to the extent that the working group could agree on an access control model. The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", and "MAY" used in this document are to be interpreted as described in [Bradner97]. 1. Introduction The ability to securely access (replicate and distribute) directory information throughout the network is necessary for successful deployment. LDAP's acceptance as an access protocol for directory information is driving the need to provide an access control model definition for LDAP directory content among servers within an enterprise and the Internet. Currently LDAP does not define an access control model, but one is needed to ensure consistent secure access, replication, and management across heterogeneous LDAP implementations. The major objective is to provide a simple, usable, and implementable, but secure and efficient access control model for LDAP accessible directory content while also providing the appropriate flexibility to meet the needs of both the Internet and enterprise environments and policies. This document defines the model, the schema, and the LDAP control. This model does not (and cannot) fully specify the behavior of the Access Control Model in a distributed environment (e.g. propagating access control information across servers and ACI administration) because there is no LDAP standard defining how to distribute directory data between LDAP servers. The behavior of the Access Control Model in distributed environments is beyond the scope of this model. The following topics are deemed interesting and useful for future work, but are also beyond the scope of this model: - Permissions based on object class - Application permissions - How to get initial entryACI and subtreeACI attributes in the directory is server specific - Use of prescriptive ACIs and scoping via use of a ldapACISubEntry - Required permissions for LDAP extended operations and LDAP controls, such as a proxy permission and permission extensibility Stokes, et al Expires 29 December 2001 [Page 2] Internet-Draft Access Control Model 29 June 2001 - The access rights required for the creation of the first entry in the directory - filter use in ACI - Mapping of SASL authentication identities (whose form is mechanism specific) to LDAP authorization identities (which are used for access control purposes) 2. The LDAPv3 Access Control Model Access Control mechanisms evaluate requests for access to protected resources and make decisions about whether those requests should be granted or denied. In order to make a grant/deny decision about a request for access to a protected resource, an access control mechanism needs to evaluate policy data. This policy data describes security- relevant characteristics of the requesting subject and the rules which govern the use of the target object. No mechanism is defined in this document for storage of access control information at the server beyond indicating that the attribute holding access control information is an operational attribute. The access control model defines - What flows on the wire for interoperability The existing LDAP protocol flows for ldap operations are used to manipulate access control information. These same flows on the wire apply when ACI is transmitted during replication. A set of permissions and their semantics with respect to ldap operations is defined. The permissions parallel the defined set of ldap operations. Encoding of access control information on the wire is per the LDAPv3 specifications. There is a LDAP control defined, GetEffectiveRights. LDAP clients use the control to manage and administer access control policy enforced by LDAP servers. Servers may store access control information in any way they choose. In particular, servers may use the access control mechanisms of their datastores to store and enforce LDAP access control, or they may implement/exploit access control managers external to their datastores. Datastores and external access control managers MAY implement any access control rule syntax and semantics they choose, but the semantics MUST be compatible with those defined in the section titled "Required Permissions for Each LDAP Operation". Stokes, et al Expires 29 December 2001 [Page 3] Internet-Draft Access Control Model 29 June 2001 - Attributes and classes for application portability of access control information. Portable (LDAP) applications should only use the ACI in this model. Two access control information attributes (entryACI and subtreeACI) for application portability. These attributes are used as input to the LDAP APIs so access control information can be addressed uniformly independent of how that information is accessed and stored at the server. These same attributes appear in LDIF output for interchange of access control information. An access control information subentry class (ldapACISubEntry) and a set of attributes (supportedAccessControlSchemes which is used in the rootDSE, and accessControlSchemes which is used in the subentry ldapACISubEntry) to identity the access control mechanisms supported by a server and in a given part of the namespace, respectively. - A mechanism to control access to access control information: The access control information operational attributes, entryACI and subtreeACI, are also used to control access to access control information (controls access to itself). How to get initial entryACI and subtreeACI attributes in the directory is server specific and beyond the scope of this model. Servers can support multiple access control mechanisms, but MUST be capable of supporting the LDAP Mechanism in the DIT scoped by the rootDSE (entire server's DIT) for that server and SHOULD be capable of supporting the LDAP mechanism in an arbitrary part (subtree) of the DIT. The accessControlSchemes attribute in the ldapACISubEntry indicates which access control mechanisms are in effect for the scope of that ldapACISubEntry. The supportedAccessControlSchemes attribute in the rootDSE indicates which access control mechanisms are supported by the server; those mechanisms are in effect in that server's DIT unless overridden by a mechanism defined in a ldapACISubEntry elsewhere in that DIT. Changing the value(s) of either the supportedAccessControlSchemes or accessControlSchemes attributes changes the mechanism(s) in effect for the scope of those attributes (where scope is either that of the rootDSE or ldapACISubEntry). Through the use of the supportedAccessControlSchemes attribute in the rootDSE and the accessControlSchemes attribute in the ldapACISubEntry, it is possible to run multiple mechanisms in either the same subtree or separate subtrees. This might occur if the underlying datastore for the directory was accessible via LDAP and other applications. In this case, LDAP access should always be subjects to the LDAP access controls described in this document. Stokes, et al Expires 29 December 2001 [Page 4] Internet-Draft Access Control Model 29 June 2001 3. Access Control Mechanism Attributes Two attributes are defined to identify which access control mechanisms are supported by a given server and by a given subtree: supportedAccessControlSchemes and accessControlSchemes. (We chose these names based on the X.500 attribute, AccessControlScheme which is single-valued and defined in X.501). 3.1 Root DSE Attribute for Access Control Mechanism The server advertises which access control mechanisms it supports by inclusion of the 'supportedAccessControlSchemes' attribute in the root DSE. This attribute is a list of OIDs, each of which identify an access control mechanism supported by the server. By default, these are also the mechanisms in effect in subtrees beneath the root in that server unless overridden by a ldapACISubEntry (see section "Subentry Class Access Control Mechanism"). ( NAME 'supportedAccessControlSchemes' DESC list of access control mechanisms supported by this directory server EQUALITY objectIdentifierMatch SYNTAX OID USAGE dSAOperation ) The access control mechanism defined is: LDAPv3 Other vendor access control mechanisms MAY be defined (by OID) and are the responsibility of those vendors to provide the definition and OID. 3.2 Subentry Class Access Control Mechanism A given naming context MUST provide information about which access control mechanisms are in effect for that portion of the namespace. This information is contained in a subentry (ldapACISubEntry class), derived from [SUBENTRY]. ldapACISubEntry MAY be used to define the scope of an access control mechanism. The value(s) held in the rootDSE attribute, supportedAccessControlSchemes, are the mechanisms in effect in subtrees beneath the root in that server unless overridden in a ldapACISubEntry further down the tree held by that server. The scope of that ldapACISubEntry is to the end of the subtree held by that server or until another ldapACISubEntry is encountered in that subtree held by that server. The ldapACISubEntry class is defined as: ( Stokes, et al Expires 29 December 2001 [Page 5] Internet-Draft Access Control Model 29 June 2001 NAME 'ldapACISubEntry' DESC 'LDAP ACI Subentry class' SUP ldapSubEntry STRUCTURAL MUST ( accessControlSchemes ) ) The accessControlSchemes attribute MUST be in each ldapACISubEntry entry associated with a naming context whose access control mechanism is different from adjacent naming contexts supported by that directory server. accessControlSchemes lists the values (list of OIDs) that define the access control mechanisms in effect for the scope of that ldap access control subentry (either until another ldapACISubEntry is encountered in that subtree or end of subtree is reached on the server). Although, in general, this attribute will define only a single mechanism (single value), more than one mechanism MAY be in effect for the scope of that subentry. ( NAME 'accessControlSchemes' DESC list of access control mechanisms supported in this subtree EQUALITY objectIdentifierMatch SYNTAX OID USAGE dSAOperation ) 4. The Access Control Information Attributes, Syntax, and Rules The access control information syntax and attributes, entryACI and subtreeACI, are defined as: ( DESC 'attribute syntax for LDAP access control information' ) ( NAME 'entryACI' DESC 'ldap access control information, scope of entry' EQUALITY directoryComponentsMatch SYNTAX USAGE directoryOperation ) ( NAME 'subtreeACI' DESC 'ldap access control information, scope of subtree' EQUALITY directoryComponentsMatch SYNTAX USAGE directoryOperation Stokes, et al Expires 29 December 2001 [Page 6] Internet-Draft Access Control Model 29 June 2001 ) Section 4.1 defines the ABNF and ASN.1 for these attributes, entryACI and subtreeACI. The intent of the attribute definitions is to define a common interchange format and have a separation of responsibilities to allow different people to administer the different attribute types. (X.500 overcomes this by allowing access control on a per-value basis, which is complex). Any given LDAP server should be able to translate the defined attribute into meaningful requests. Each server should be able to understand the attribute; there should not be any ambiguity into what any part of the syntax means. While the end goal is to have a common behavior model between different LDAP server implementations, the attribute definitions alone will not ensure identical ACL processing behavior between servers. Applicability and precedence rules for making access decisions are defined later in this section. The semantics of how a server interprets the ACI syntax are defined in the "Required Permissions for Each LDAP Operation" section of this document. Additionally, while the server must recognize and act on the attribute when received over the wire, there are no requirements for the server to physically store these attributes in this form. The attribute definitions maintain an assumption that the receiving server supports ACI inheritance within the security model. If the server does not support inheritance, the receiving server must expand any inherited information based on the scope flag. The attributes are defined so access control information (ACI) can be addressed in a server in an implementation independent manner. These attributes are used in typical LDAP APIs, in LDIF output of ACI and in transfer of ACI during replication. These attributes may be queried or set on all directory objects. The ABNF and definitions are given below. 4.1 The ABNF and ASN.1 4.1.1 ACI UTF-8 String Representation The LDAP string encoding of values of the ACI syntax () is described by the following ABNF [ABNF]. This string representation MUST be supported. ACI = rights "#" attr "#" generalSubject rights = (("grant:" / "deny:") permissions) / Stokes, et al Expires 29 December 2001 [Page 7] Internet-Draft Access Control Model 29 June 2001 ("grant:" permissions ";deny:" permissions) permissions = 1*(permission) permission = "a" / ; add "d" / ; delete "e" / ; export "i" / ; import "n" / ; renameDN "b" / ; browseDN "v" / ; view (entry level read permission) "t" / ; returnDN "r" / ; read "s" / ; search filter "p" / ; search filter (presence only) "w" / ; write (mod-add) "o" / ; obliterate (mod-del) "c" / ; compare "m" / ; make "u" / ; unveil (disclose on error permission) "g" ; getEffectiveRights ; permissions r, w, o, s, p, c, m work on attributes ; permissions a, d, e, i, n, b, v, t, u, g work on entries ; permissions for attributes and permissions for entries are ; never found in a single ACI attr = "[all]" / "[entry]" / (attribute *("," attribute)) attribute = AttributeDescription ; The rule is defined ; in Section 4.1.5 of [LDAPv3] generalSubject = context pureSubject context = "authnLevel:" authnLevel ":" pureSubject = anySubject / machineSubject / idBasedSubject anySubject = "public:" machineSubject = "ipAddress:" ipAddressRange *( "," ipAddressRange ) / "dns:" partialdomainname *( "," partialdomainname ) partialdomainname = [ "*." ] domainname idBasedSubject = thisSubject / oneSubject / setOfSubjects Stokes, et al Expires 29 December 2001 [Page 8] Internet-Draft Access Control Model 29 June 2001 thisSubject = "this:" oneSubject = ( "authzId-" authzId ) setOfSubjects = ( "role:" dn ) / ( "group:" dn ) / ( "subtree:" dn ) authnLevel = "none" / "weak" / "limited" / "strong" ; The rule is defined in [AuthMeth]. It is ; repeated below for convenience. authzId = dnAuthzId / uAuthzId ; distinguished-name-based authz id. dnAuthzId = "dn:" dn dn = utf8string ; with syntax defined in [UTF] ; unspecified userid, UTF-8 encoded. uAuthzId = "u:" userid userid = utf8string ; syntax unspecified ; A utf8string is defined to be the UTF-8 encoding of ; one or more ISO 10646 characters. ipAddress = IPv6address ; following is excerpted from [IPV6] IPv6address = hexpart [ ":" IPv4address ] IPv4address = 1*3DIGIT "." 1*3DIGIT "." 1*3DIGIT "." 1*3DIGIT hexpart = hexseq | hexseq "::" [ hexseq ] | "::" [ hexseq ] hexseq = hex4 *( ":" hex4) hex4 = 1*4HEXDIG ipAddressRange = ipAddress [ HYPHEN ipAddress ] ; IPv6 address range domainname = domaincomponent *( "." domaincomponent ) OUTER = ALPHA / DIGIT INNER = ALPHA / DIGIT / HYPHEN HYPHEN = %x2D domaincomponent = OUTER [ *61( INNER ) OUTER ] Note that the colon following the "public" and "this" subject options exist only to simplify string parsing. If an ACI is attempted to be added with an authz that is not understood, Stokes, et al Expires 29 December 2001 [Page 9] Internet-Draft Access Control Model 29 June 2001 then the server MUST reject that entryACI or subEntryACI value. This clarifies the statement in [AuthMeth] that allows for authzId may be expanded in the future. See section titled 'ACI Examples' for examples of the string representation. 4.1.2 ACI Binary Representation The ASN.1 type ACI is used to represent this syntax when transferred in binary form. This binary form SHOULD be supported. LDAP-Access-Control-Model DEFINITIONS EXTENSIBILITY IMPLIED ::= BEGIN IMPORTS AttributeType, DistinguishedName, CONTEXT FROM InformationFramework; -- from [X501] ACI ::= SEQUENCE { rights SEQUENCE { grant Permissions OPTIONAL, deny [1] Permissions OPTIONAL } (WITH COMPONENTS { ..., grant PRESENT } | WITH COMPONENTS { ..., deny PRESENT }), -- at least one of grant or deny must be present -- attr CHOICE { all NULL, entry [1] NULL, attributes SET (1..MAX) OF AttributeTypeAndOptions }, authnLevel ::= ENUMERATED { none (0), weak (1), limited (2), strong (3)} subject GeneralSubject } -- An X.500 representation for an LDAP Attribute Description -- AttributeTypeAndOptions ::= SEQUENCE { type AttributeType, type-name UTF8String OPTIONAL, -- A hint of what LDAP textual name to use when encoding an -- AttributeTypeAndOptions as an . options SEQUENCE SIZE (1..MAX) OF CONTEXT.&Assertion OPTIONAL -- A future revision will constrain CONTEXT.&Assertion to be -- the context assertion syntax of the CONTEXT information Stokes, et al Expires 29 December 2001 [Page 10] Internet-Draft Access Control Model 29 June 2001 -- object defined by the X.500 working group to represent -- LDAP attribute options in the X.500 protocols. -- This is likely to be the UTF8String type. } GeneralSubject ::= CHOICE { anySubject NULL, machineSubject [1] MachineSubject, idBasedSubject [2] IDBasedSubject -- may be expanded per [AuthMeth] -- } MachineSubject ::= CHOICE { ipAddress IPAddress, dns [1] DomainName } IPAddress ::= UTF8String -- The character contents of an IPAddress string are encoded -- according to the rule in Section 4.1.1. DomainName ::= UTF8String -- The character contents of a DomainName string are encoded -- according to the rule in Section 4.1.1. IDBasedSubject ::= CHOICE { thisSubject NULL, oneSubject [1] OneSubject, setOfSubjects [2] SetOfSubjects } OneSubject ::= CHOICE { dn DistinguishedName, user UTF8String } SetOfSubjects ::= CHOICE { role DistinguishedName, group [1] DistinguishedName, subtree [2] DistinguishedName } Permissions ::= BIT STRING { add (0), delete (1), export (2), import (3), Stokes, et al Expires 29 December 2001 [Page 11] Internet-Draft Access Control Model 29 June 2001 renameDN (4), browseDN (5), viewEntry (6), returnDN (7), read (8), search (9), searchPresence (10), write (11), obliterate (12), compare (13), make (14), unveil (15), getEffectiveRights (16) (CONSTRAINED BY { -- at least one bit must be set -- }) } -- permissions read, write, obliterate, search, -- searchPresence, compare, make work on attributes -- permissions add, delete, export, import, renameDN, -- browseDN, viewEntry, returnDN, unveil, -- getEffectiveRights work on entries END 4.2 The Components of entryACI and subtreeACI Attributes This section defines components that comprise the access control information attributes, entryACI and subtreeACI. The access control information in the entryACI attribute applies only to the entry in which it is contained. The access control information in the subtreeACI attribute applies to each entry down the subtree unless it is overridden by an entry-specific entryACI whose values are more specific or another subtreeACI lower in the tree. Use of prescriptive ACIs and scoping via use of a ldapACISubEntry is outside the scope of this document. 4.2.1 Access Rights and Permissions Access rights can apply to an entire object or to attributes of the object. Access can be granted or denied. Either or both of the actions "grant" | "deny" may be used when creating or updating entryACI and subtreeACI. Each of the LDAP access permissions are discrete. One permission does Stokes, et al Expires 29 December 2001 [Page 12] Internet-Draft Access Control Model 29 June 2001 not imply another permission. The permissions which apply to attributes and the entry parallel the type of ldap operations that can be performed. Permissions which apply to attributes: r Read Read attribute values w Write Modify-add values o Obliterate Modify-delete values s Search Search entries with specified attributes p searchPresence Presence only filters c Compare Compare attributes m Make Make attributes on a new entry below this entry 1. r Read If granted, permits attributes and values to be returned in a read or search operation. 2. w Write If granted, permits attributes and values to be added in a modify-add operation. 3. o Obliterate If granted, permits attributes and values to be deleted in a modify-delete operation. 4. s Search If granted, permits attributes and values to be included in the search filter of a search operation. 5. c Compare If granted, permits attributes and value to be used in a compare operation. 6. p SearchPresence If granted permits attributes and values to be included in presence tests in a search filter. 7. m Make The attribute permission "m" is required for all attributes that are placed on an object when it is created. Just as the "w" and Stokes, et al Expires 29 December 2001 [Page 13] Internet-Draft Access Control Model 29 June 2001 "o" permissions are used in the Modify operation, the "m" permission is used in the Add operation. Additionally, note that "w" and "o" have no bearing on the Add operation and "m" has no bearing on the Modify operation. Since a new object does not yet exist, the "a" and "m" permissions needed to create it must be granted on the new object's parent. This differs from "w" and "o" which must be granted on the object being modified. The "m" permission is distinct and separate from the "w" and "o" permissions so that there is no conflict between the permissions needed to add new children to an entry and the permissions needed to modify existing children of the same entry. Note: Modify-replace values of an attribute require both "w" and "o" permission. Permissions that apply to an entire entry: a Add Add an entry below this entry d Delete Delete this entry e Export Export entry & subordinates to new location i Import Import entry & subordinates below this entry from some location n RenameDN Rename an entry's DN b BrowseDN Browse an entry's DN v ViewEntry A read level entry permission t ReturnDN Allows DN of entry to be disclosed in an operation result u Unveil This is the discloseOnError permission g GetEffectiveRights This is get effective rights permission 1. a Add If granted, permits creation of an entry in the DIT subject to access control on all attributes and values to be placed in the new entry at time of creation. In order to add an entry, permission must also be granted to add all attributes that exist in the add operation. 2. d Delete If granted, permits the entry to be removed from the DIT regardless of controls on attributes within the entry. Delete only works on leaf entries (same as X.500). 3. e Export If granted, permits an entry and its subordinates (if any) to be exported; that is, removed from the current location and placed in Stokes, et al Expires 29 December 2001 [Page 14] Internet-Draft Access Control Model 29 June 2001 a new location subject to the granting of suitable permission at the destination. If the last RDN is changed, Rename is also required at the current location. In order to export an entry or its subordinates, there are no prerequisite permissions to contained attributes, including the RDN attributes; this is true even when the operation causes new attribute values to be added or removed as the result of the changes of RDN. 4. i Import If granted, permits an entry and its subordinates (if any) to be imported; that is, removed from some other location and placed below the location to which the permission applies subject to the granting of suitable permissions at and below the source location. In order to import an entry or its subordinates, there are no prerequisite permissions to contained attributes, including the RDN attributes; this is true even when the operation causes new attribute values to be added or removed as the result of the changes of RDN. 5. n RenameDN Granting Rename is necessary for an entry to be renamed with a new RDN. There are many cases here surrounding the use of this permission. See the section on 'Modify DN Operation'. 6. b BrowseDN If granted, permits entries to be accessed using directory operations which do not explicitly provide the name of the entry. 7. v ViewEntry If granted, permits entries to be accessed. This entry level read permission is useful as it is not dependent on the scope or aliasing properties of the entry. 8. t ReturnDN If granted, allows the distinguished name of the entry to be disclosed in the operation result. 9. u Unveil If granted, allows the presence of the entry to be disclosed in the case where access is denied to the entry according to the access control rules. 10. g getEffectiveRights If granted, allows the effective rights on that entry and the Stokes, et al Expires 29 December 2001 [Page 15] Internet-Draft Access Control Model 29 June 2001 attributes within that entry to be returned, for _any_ subject. 4.2.2 Attributes Attribute describes an attribute name in the form of a dotted decimal OID for that . If the string (OID) refers to an attribute not defined in the given server's schema, the server SHOULD report an error. The use of "[entry]" or "[all]" helps to focus the permissions to either entry or attribute quickly, and hence helps in parsing. "[entry]" means the permissions apply to the entire object. This could mean actions such as delete the object, or add a child object. When used in subtreeACI, the specified permissions (on the entry set of permissions are legal here - see the ABNF) apply to each entry in the subtree. "[all]" means the permission set applies to all attributes of the entry. When used in subtreeACI, "[all]" applies to all attributes of each entry in the subtree. If the keyword "[all]" and another attribute are both specified within an ACI, the more specific permission set for the attribute overrides the less specific permission set for "[all]". 4.2.3 Subjects and Associated Authentication The following subjects are defined and MUST be supported: - authzId, defined per [AuthMeth] - group, defined as the distinguished name of a groupOfNames or groupOfUniqueNames entry - role, asserts a subject's organizational position and entitlement to perform the operations appropriate to that organizational position. It is implementation defined how the association between authorization id and the role dn is made. - subtree, defined as some distinguished name of a non-leaf node in the DIT - ipAddress, in IPv6 text format [IPV6] - dnsName, a domain name or a wildcarded (left-most name or most specific part) domain name (see ABNF) - public, defined as public access Stokes, et al Expires 29 December 2001 [Page 16] Internet-Draft Access Control Model 29 June 2001 - this, defined as the user whose name matches that of the entry being accessed Other parties MAY define other subjects. It is the responsibility of those parties to provide the definition. Adding new subjects may inhibit interoperability. A subject may be qualified by the level of authentication required for access to a given attribute(s) or entry. authnLevel defines the minimum requestor authentication level required for a given ACI. For a requestor's authentication level to exceed a minimum requirement, the requestor's level must meet or exceed that specified in the ACI. The authentication levels defined, in increasing order of authentication, are: - none - no name and no password, or name but no password - weak - authentication mechanisms that are prone to both passive and active attacks [ATTACK]; for example, simple authentication (name and password) - limited - authentication mechanisms that protect against passive attacks but may be prone to active attacks; for example, DIGEST-MD5 - strong - authentication mechanisms that protect against both passive and active attacks; for example, Kerberos with per- authentication or PKI authentication The authnLevel applies to a subject as follows: - If the ACI is a grant, then the authnLevel applies if the subject is authenticated at or above that level. - If the ACI is a deny, then the authnLevel applies to that subject if authenticated at that level AND to all other subjects authenticated with levels below that. Authentication level is always specified in an ACI. For grant, this means that you are granted access if you can prove your authentication via a strong authentication mechanism, such as a digital signature. For deny, the meaning of this is "you are denied access if you are Mr. X and you can prove it with a digital signature". If you are not Mr. X you are not denied access only if you can prove it (authenticate yourself) with a digital signature. In other words, everyone who does not authenticate with a digital signature is denied access. Everyone who authenticates with a digital signature is allowed access except Mr. X. A recommended categorization of authentication mechanisms per authentication level may be offered separately. For each mechanism categorized in the recommendations, implementations SHOULD NOT assign a Stokes, et al Expires 29 December 2001 [Page 17] Internet-Draft Access Control Model 29 June 2001 higher authentication level, but MAY assign a lower authentication level. For mechanisms not covered by the recommendation, the implementation SHOULD specify a conservative level. Implementations SHOULD provide a means for the directory administrator to disable and/or lower the authentication level associated with a mechanism. Two interesting subjects not explicitly included, but can be composed using subject and authnLevel are anonymous and authenticated. - anonymous: authnLevel=none + anySubject(public) - authenticated: authnLevel=weak + anySubject(public) 4.3 Access Control Decision Making The ultimate goal of the Access Control Model is to define the way in which an LDAP server determines an access control decision for a given requested LDAP operation. In fact, a requestor may require several individual permissions in order to be authorized to carry out an LDAP operation and we define these in section 5. In this section we introduce the concepts and algorithm that allow the server to decide if a requestor has an individual permission on an individual resource. The concepts we require are firstly, the parameters which must be provided in order for the Access Control Decision Algorithm to determine whether the access is allowed or not. Secondly, we define precisely when a given ACI value will be involved in a given access control decision. Thirdly, this model defines some precedence rules which the Algorithm will use when dealing with more than one ACI value. Finally, we can define the Access Control Decision Algorithm which will determine the access decision. Throughout, we use the ABNF, when we need to refer to portions of individual ACI values. 4.3.1 The Parameters to the Access Decision Algorithm The decision algorithm answers the question "Does the specified requestor have the specified permission on the specified resource?" The resource may be an entry (as for the Delete operation) or it may be an attribute within an entry (as for the Modify operation) so we characterize the resource like this: (targetEntry, targetAttribute OPTIONAL). The requestor is identified primarily by his authorization ID (which may be omitted if the requestor has bound anonymously), but also includes other context information about the requestor so it is represented like this: (authzId OPTIONAL, ipAddress, dnsName, authnLevel). The permission is one of the valid permissions defined by the model. So, the parameters to the Access Control Decision Algorithm, which we will refer to collectively as "the decision parameters" are: Stokes, et al Expires 29 December 2001 [Page 18] Internet-Draft Access Control Model 29 June 2001 - resource: (targetEntry, targetAttribute OPTIONAL) - permission: permissionParameter - requestorSubject: (authzId OPTIONAL, ipAddress, dnsName, authnLevel) If permissionParameter is an attribute-level parameter then targetAttribute must be specified; if it is an entry-level permission then targetAttribute is ignored. The output is either "Access Allowed" or "Access Denied". 4.3.2 Applicability Rules The applicability rules define whether a given ACI value, or portions of it, apply to some given decision parameters. 4.3.2.1 Applicability Rules for Scope Types These rules determine whether a specific ACI applies to the targetEntry part of the decision parameters. - If the ACI in question is an entryACI, then ACI applies to the resource if the ACI is an attribute of the entry targetEntry. - If the ACI in question is a subtreeACI, then ACI applies to the resource if targetEntry is part of the subtree defined by the entry containing the ACI. 4.3.2.2 Applicability Rules for Permissions If permissionParameter is an entry-level permission, then the ACI in question applies if permissionParameter is mentioned in the permissions list of the ACI. If permissionParameter is an attribute-level permission, then the ACI in question applies if permissionParameter is mentioned in the permissions list and the ACI's attribute list applies to the target attribute per "Applicability Rules for Attributes". Note that for an ACI which contains both grant and deny permissions lists, the grant permission list may not be available for the purposes of this applicability rule--see point 3 in the "Applicability Rules for Subjects". Stokes, et al Expires 29 December 2001 [Page 19] Internet-Draft Access Control Model 29 June 2001 4.3.2.3 Applicability Rules for Attributes If an attribute is not specified as part of the resource, then this rule does not apply. If an attribute is specified, then the ACI in question applies if its attribute list is [all] or if targetAttribute is explicitly mentioned in the ACI's attribute list. In the case where targetAttribute is an attribute type with options (e.g. sn;lang-en;lang-uk), it is applicable if the ACI's attribute list mentions a less specific form of targetAttribute. For example, if the list contained "sn;lang-en", then that list applies to the attribute "sn;lang-en;lang-uk", but not the attribute "sn". 4.3.2.4 Applicability Rules for Subjects Call the subject portion of the ACI in question aciSubject. Then to determine if aciSubject applies to requestorSubject we apply the following rules: 1. The ACI in question is a grant ACI. Then the ACI applies if both the context and pureSubject portions of aciSubject apply, as defined in "Applicability Rules for Context" and "Applicability Rules for pureSubject" below. 2. The ACI in question is a deny ACI. There are three possibilities: a. The pureSubject part applies (according to "Applicability Rules for pureSubject"). Then the ACI applies to requestorSubject. b. The pureSubject part does not apply. Then the ACI applies to any requestorSubject with an authnLevel less than the authnLevel of the ACI. c. Otherwise the ACI does not apply. 3. The ACI in question is both a deny and grant ACI. There are three possibilities: a. aciSubject applies when evaluated as a grant ACI (per 1 above). Both the grant permissions and deny permissions of the ACI are available for the purpose of the "Applicability Rules for Attributes and Permissions". b. aciSubject does not apply as a grant ACI but does apply as a deny ACI (per 2 above). The deny permissions of the ACI are available for the purpose of the "Applicability Rules for Attributes" and the "Applicability Rules for Permissions". c. aciSubject does not apply when evaluated as either a grant ACI or a deny ACI. The ACI does not apply to Stokes, et al Expires 29 December 2001 [Page 20] Internet-Draft Access Control Model 29 June 2001 requestorSubject. Note: the deny behavior with authnLevel deserves explication. In the case where an ACI denies access to a given subject with a given authnLevel, then naturally it will deny access to that given subject authenticated at authnLevel or above. Similarly, another user authenticated at authnLevel or above, to which the pureSubject part does not apply, will not be denied those rights by that ACI. The interesting case is a user authenticated at a lower level than authnLevel. For such a user the ACM takes the view that as that user has not proved to the system, to a sufficient degree of confidence, that the pureSubject portion does not apply to him, then to be safe, he will be denied those rights. So if you deny access to a particular authzId with authnLevel of "none", then that authzId will be denied access at any authentication level, but it will not affect any other requestors. On the other hand, if you deny access to a particular authzId with an authnLevel of "strong", then that will deny access to that user when authenticated strongly AND deny access to ANY users authenticated with lower authentication levels. 4.3.2.5 Applicability Rules for pureSubject If aciSubject is of type anySubject, then it applies to requestorSubject. If aciSubject is of type machineSubject, then if the ipAddress or dns name from requestorSubject matches the ipAddress or dns name range in aciSubject, then the ACI applies to requestorSubject if it is a deny ACI or the deny part of a grant/deny ACI. A grant ACI (or the grant part of a grant/deny ACI) never applies if the subject is ipAddress: or dns:. The note at the end of the "Precedence of Subjects within a Scope" explains the reasoning behind this rule. If the aciSubject is of type idBasedSubject, then it applies according to the definition in "Applicability Rules for idBasedSubject". 4.3.2.6 Applicability Rules for Context The context of aciSubject applies to requestorSubject if authnLevel from requestorSubject is greater than or equal to the authnLevel specified in the context part of aciSubject. 4.3.2.7 Applicability Rules for idBasedSubject If idBasedSubject is of type thisSubject, then it applies to requestorSubject if authzId from requestorSubject is of type "dn" and is equal to the DN of the resource. Stokes, et al Expires 29 December 2001 [Page 21] Internet-Draft Access Control Model 29 June 2001 If idBasedSubject is of type oneSubject, then it applies to requestorSubject if authzId from requestorSubject is equal to the authzId specified in aciSubject. If idBasedSubject is of type setOfSubjects, then it applies to requestorSubject if authzId from requestorSubject is defined to be in the set specified in aciSubject (i.e. is in that group, role or subtree). The "Precedence of Subjects within a Scope" includes rules for determining membership in a setOfSubjects. 4.3.3 Precedence Rules The precedence rules allow the Access Control Decision Algorithm to determine which ACI values should take precedence over others. 4.3.3.1 Precedence of Scope Types 1. Entry 2. Subtree 4.3.3.2 Precedence of Position in the DIT For a given subject DN (including authentication level) and target DN, subtreeACI lower in the tree take precedence over those higher in the tree. 4.3.3.3 Precedence of Subjects within a Scope 1. ipAddress or dns in a deny ACI or the deny part of a grant/deny ACI 2. authzId distinguished name ("authzId-dn:") or authzId userid ("authzId-u:") 3. this 4. role If the DN of a role or a group appears in a role (e.g. appears as a value of roleOccupant in an organizationalRole), it is recursively expanded. For determination of precedence, the resulting expanded collection of names is considered to have come from a role regardless of the original source. Stokes, et al Expires 29 December 2001 [Page 22] Internet-Draft Access Control Model 29 June 2001 5. group If the DN of a role or a group appears in a group, it is recursively expanded. For determination of precedence, the resulting expanded collection of names is considered to have come from a group regardless of the original source. 6. subtree Subtrees may contain groups and/or roles. They should be recursively expanded. For determination of precedence, members of groups or occupants of roles that apply because (after recursive expansion) the group or role is contained in a subtree are considered to have come from the subtree regardless of the original source. 7. public The precedence of ipAddress and DNS names are treated specially, and depend on the type of ACI involved. Typical situations are: - If an ACL says to grant on the basis of IP address but deny on the basis of some other attribute (username, group, etc....), then the behavior we want is "deny". Rationale: the user is prohibited from access, regardless of where he's sitting. - If an ACL says to deny on the basis of IP address but grant on the basis of some other attribute (username, group, etc....), then the behavior we want is also "deny". Rationale: the user is allowed access, but not from where he's sitting. In addition, a grant to an ipAddress with no other applicable ACI is very dangerous from a security point of view, since it would grant permissions to ANY user who has access to the machine with the given address. Thus ipAddress and dns subjects can be used only to deny permission, not to grant them. The "Applicability Rules for pureSubject" enforce this. 4.3.3.4 Precedence of Attribute Specifications Access controls specifying "[all]" attributes are of lower precedence than specific lists. 4.3.3.5 Precedence of grant/deny Deny takes precedence over grant. Stokes, et al Expires 29 December 2001 [Page 23] Internet-Draft Access Control Model 29 June 2001 4.3.3.6 Default Deny is the default when there is no access control information or when evaluation of the access control information yields no result that allows the requester access. 4.3.4 Access Control Decision Algorithm The Access Control Decision Algorithm takes as input the decision parameters defined above and produces a grant or a deny decision. In the case where we are interested in the permission set for a set of entries and attributes (as in the case of evaluating the effective rights in section 9), then we must apply the algorithm for each entry/attribute and permission pair we are interested in. Naturally implementers are free to implement any algorithm which produces the same decision given the same input and ACI values in a DIT. The algorithm has two phases. First, all the potentially applicable ACI values are sorted into an ordered list of sets of ACI values of the same precedence. Then this list is scanned in order to find the set of ACIs which will determine the access decision. Phase 1: Order the potentially applicable ACI values 1. Determine all the entryACI and subtreeACI values that apply to targetEntry, according to the "Applicability Rules for Scope Types". 2. Sort these ACIs into a list of sets of ACIs of equal precedence, according to the "Precedence of Scope Types" and "Precedence of Position in the DIT" rules. 3. Determine which of the collected ACI values from step 1 apply to requestorSubject using the "Applicability Rules for Subjects". All the ACI values which do not apply to this subject are discarded. 4. The list of sets is sorted according to subject type from the "Precedence of Subjects within a Scope" rules. 5. Now we split the list into two separate lists keeping the same relative ordering of sets--one list has the sets that just contain ACI values that refer to entry-level permissions and the other has the sets that just contain ACI values that refer to attribute- level permissions. 6. Each set in the attribute-level list of sets is further divided into a list of sets of equal precedence according to "Precedence of Attributes Specification". Stokes, et al Expires 29 December 2001 [Page 24] Internet-Draft Access Control Model 29 June 2001 Note: At this point we have two lists of sets of ACI values, one dealing with entry-level permissions the other dealing with attribute-level permissions. The lists have been sorted according to Scope, Position, Subject and (for the attribute-level list) Attribute Specification precedence rules. Phase 2: Scan the lists to determine the access decision: 1. If permissionParameter is an entry-level permission (so that the optional targetAttribute field is not specified), then scan the list of entry-level sets in order. The first set in the list that contains an ACI that applies to permissionParameter (as defined in the "Applicability Rules for Permissions" rules) determines the access decision--if an ACI in the set grants permissionParameter and no other denies it, then access is granted, otherwise access is denied. 2. If permissionParameter is an attribute-level permission then scan the list of attribute-level sets in order. The first set in the list that contains an ACI that applies to permissionParameter AND applies to targetAttribute (as defined in the "Applicability Rules for Attributes" and "Applicability Rules for Permissions") determines the access decision--if an ACI in the set grants permissionParameter and no other denies it, then access is granted, otherwise access is denied. 4.3.5 Precedence/Inheritance Access Decision Example The examples in this section refer to the following directory tree: dc=com | +--------+---------------+ | | dc=tivoli dc=sun | | cn=ellen cn=rob The ACI at dc=com: 1. subtreeACI:grant:rsc#[all]#authnLevel:none:public: 2. subtreeACI:deny:rsc#userPassword,subtreeACI,entryACI,salary# authnLevel:none:public: 3. subtreeACI:grant:bvt#[entry]#authnLevel:none:public: 4. subtreeACI:grant:rscmow#[all]#authnLevel:strong: authzID-dn:cn=rob,dc=sun,dc=com 5. subtreeACI:grant:bvtugeinad#[entry]#authnLevel:strong: authzID-dn:cn=rob,dc=sun,dc=com The ACI at dc=tivoli,dc=com: Stokes, et al Expires 29 December 2001 [Page 25] Internet-Draft Access Control Model 29 June 2001 6. subtreeACI:grant:rsc;deny:mow#[all]#authnLevel:strong: authzID-dn:cn=rob,dc=sun,dc=com 7. subtreeACI:deny:einad#[entry]#authnLevel:strong: authzID-dn:cn=rob,dc=sun,dc=com The ACI at cn=ellen,dc=tivoli,dc=com 8. entryACI:grant:wo#[all]#authnLevel:strong: authz-ID-dn:cn=ellen,dc=tivoli,dc=com 9. entryACI: deny: wo#entryACI,subtreeACI,salary#authnLevel:strong: authz-ID-dn:cn=ellen,dc=tivoli,dc=com Example #1 subject: ("cn=rob,dc=sun,dc=com", ipaddress, dns name, strong): resource: ("cn=ellen,dc=tivoli,dc=com", salary) permission: "w" Phase 1: Find all applicable ACI based on the Applicability of Scope Types. {1, 2, 3, 4, 5, 6, 7, 8, 9} Sort by Precedence of Scope Type and Precedence of Position in DIT: {8, 9}, {6, 7}, {1, 2, 3, 4, 5} Determine which ACI are applicable based on the Subject: {6, 7}, {1, 2, 3, 4, 5} Sort by Precedence of Subjects within Scope: {6, 7}, {4, 5}, {1, 2, 3} Separate permissions applicable to entry and those applicable to attributes: Entry: {7}, {5}, {3} Attr: {6}, {4}, {1, 2} Sort the permissions applicable to attributes by precedence of attribute specification: Entry: {7}, {5}, {3} Attr: {6}, {4}, {2}, {1} Phase 2: Since "w" is an attribute permission, look at the Attr list. ACI 6 in the first sub-list mentions "w" and salary (via [all]) so this set defines the access--which is deny. Stokes, et al Expires 29 December 2001 [Page 26] Internet-Draft Access Control Model 29 June 2001 Example #2 subject: ("cn=rob,dc=sun,dc=com", ipaddress, dns name, limited): resource: ("cn=ellen,dc=tivoli,dc=com", salary) permission: "w" Phase 1: First the ACIs are ordered into the following sets whose subject matches the subject tuple: Entry: {7}, {3} Attr: {6}, {2}, {1} Phase 2: For ACI 6 in the first set, which matched the subject because of the deny portion and limited < strong, the permissions available are "mow". So, this ACI applies to "w" and salary (via [all]) and the access is "deny". Example #3 subject: ("cn=rob,dc=sun,dc=com", ipaddress, dns name, limited): resource: ("cn=ellen,dc=tivoli,dc=com", salary) permission: "r" Phase 1: First the ACIs are ordered into the following sets whose subject matches the subject tuple: Entry: {7}, {3} Attr: {6}, {2}, {1} Phase 2: As the grant portion of ACI 6 is not active, the first set that contains an ACI that applies to "r" and salary is {2}. As 2 denies access, access is denied. Example #4 subject: ("cn=rob,dc=sun,dc=com", ipaddress, dns name, limited): resource: ("cn=ellen,dc=tivoli,dc=com", cn) permission: "r" Phase 1: First the ACIs are ordered into the following sets whose subject matches the subject tuple: Entry: {7}, {3} Attr: {6}, {2}, {1} Phase 2: As the grant portion of ACI 6 is not active, the first set that contains an ACI that applies to "r" and cn is {1}. As 1 grants access, access is granted. Stokes, et al Expires 29 December 2001 [Page 27] Internet-Draft Access Control Model 29 June 2001 5. Required Permissions for each LDAP Operation This section defines the required permissions for each LDAP operation. Even if these requirements are satisfied, the server may refuse to carry out the operation due to other implementation specific security considerations. For example, a server may refuse to modify an entry because the database where that entry resides is in read only mode. Another example might be that although LDAP access control has been specified on the userPassword attribute a server may refuse modifications due to some server specific policy governing access to passwords. Here, we specify the rights required by a user when performing an LDAP operation in terms of the LDAP permissions specified above. Recall that "a, d, e, i, n, b, v, t, u" are permissions that apply to entries as a whole while permissions "r, s, p, w, o, c, m, g" apply to attributes within entries. Required permissions for LDAP extended operations and LDAP controls SHOULD be defined along with their specifications. These requirements could be expressed in terms of this model, for example by requiring one of the existing permissions on some particular entry or attribute. This version of the LDAP access control model does not offer any mechanism to extend the permission set or aci syntax to accommodate extended operations or controls. For the following, assume that the authorization identity of the user doing the operation is authzId. 5.1 Bind Operation This model does not require any permissions to allow a bind operation to proceed. 5.2 Search Operation Recall that the parameters of the Search operation per RFC 2251 [LDAPv3] Section 4.5 are: SearchRequest ::= [APPLICATION 3] SEQUENCE { baseObject LDAPDN, scope ENUMERATED { baseObject (0), singleLevel (1), wholeSubtree (2) }, derefAliases ENUMERATED { neverDerefAliases (0), derefInSearching (1), derefFindingBaseObj (2), Stokes, et al Expires 29 December 2001 [Page 28] Internet-Draft Access Control Model 29 June 2001 derefAlways (3) }, sizeLimit INTEGER (0 .. maxInt), timeLimit INTEGER (0 .. maxInt), typesOnly BOOLEAN, filter Filter, attributes AttributeDescriptionList } Suppose a server is processing a search request from user authzId with parameters as above and is processing the entry with dn candidateDN to decide if it may be returned or not. Then the permissions required by authzId that need to be evaluated are as follows: 1. permission "b" to the entry candidateDN if the entry is in the scope of the search but is not the base entry. If this permission is not granted then the dn candidateDN MUST NOT be returned nor any attribute type nor attribute value from this entry. Note: the "b" permission is included to allow different browsing or discovery rights to be assigned to different classes of users. 2. permission "v" to the entry candidateDN If this permission is not granted then the dn candidateDN MUST NOT be returned nor any attribute type nor attribute value from this entry. Note A: The "v" permission is the entry level read permission. This is included as it is useful to have one simple permission (not dependent on scope or aliasing) that protects all the components of an entry; the dn and the attributes. Note B: Disclosing the full distinguished name of an entry will inevitiably reveal the names of its ancestors. This issue is discussed in detail below. 3. permission "p" or "s" to each attribute appearing in a search filter presence test during the evaluation of the search filter. permission "s" is required on attributes appearing in non-presence tests (see RFC2254, section 3: equalityMatch, substrings, greaterOrEqual, lessOrEqual, present, approxMatch, extensibleMatch) during the evaluation of the search filter. The above statement covers the case where the attributes are being evaluated as part of an extensibleMatch (RFC 2251 section 4.5.1) which appears in the filter. In the case where the dnAttributes field of the extensibleMatch is true (and so the filter test is Stokes, et al Expires 29 December 2001 [Page 29] Internet-Draft Access Control Model 29 June 2001 applied to the naming attributes in the dn of the entry) then we do not require any access checks to the attributes of the dn as access to these is taken to be granted by the "v" permission, which has already been required above. If there is an attribute in a filter element to which the required permission is not granted then that filter element evaluates to "Undefined" of the three-valued-logic of X.511(93). Note: The motivation for the "p" permission is that if you have full filter rights on an attribute then in some cases that could be operationally the same as having read permission i.e. you could quickly determine the attribute value, and this may not be desirable. For example, if the type of the attribute was integer then with full filter permissions you could quickly determine the value by doing a sequence of binary chop style searches using ">" and "<". Whereas, with just the presence test ability, you would not have right to do those kind of searches, but you would be able to test for the presence of the attribute. 4. permission "r" to each attribute in the attribute list AttributeDescriptionList (or all attributes in the entry candidateDN if AttributeDescriptionList is *) whose type and/or value will be returned. Note A: The presence of an attribute in an entry is only ever volunteered by the server if "r" permission is granted to it, though a user may infer the presence of an attribute with "s" or "p" permission by using a presence test on that attribute in the search filter. Note B: Although both "r" and "s" permissions will typically be granted to attributes we keep both permissions as there are cases where the distinction is useful. A reverse telephone lookup is an example of granting "r" but not "s" permission. 5. permission "t" to the entry candidateDN If this permission is not granted then the dn candidateDN MUST NOT be returned. If the server knows of an alias for the entry, this alias may be returned instead. If no alias name is available then the entry candidateDN MUST be omitted from the search results. Note: Disclosing the full distinguished name of an entry will inevitiably reveal the names of its ancestors. This issue is discussed in detail below. 6. Disclose on error for the Search operation If there is no entry in the scope of the search which satisfies item 1 (browse right on the candidate entry) and item 2 (read Stokes, et al Expires 29 December 2001 [Page 30] Internet-Draft Access Control Model 29 June 2001 level permission on the entry) and item 3 (right to use the filter on that entry) then the "u" permission on the base entry must be evaluated. If "u" (disclose on error) is not granted to the base entry then the operation MUST fail with a "no such object error" and the matchedDN of the LDAPResult MUST be set to "". If "u" is granted to the baseObject then the empty set of results is returned. Note: the point here is that if you do not have the right to discover at least one entry in the scope of the search then the disclose on error mechanism is there to prevent you discovering the base entry of the search. The "t" permission is not considered here as it is not conceptually a permission involved in the discovery of entries but rather in how they are returned (dn vs. alias). 5.2.1 Protecting the naming attributes of DNs Protecting the naming attributes in an entry's dn presents a problem for access control. The issue is that if access is granted to the dn of a given entry, then via the naming attributes this dn contains, access is also also granted to attribute values in other entries. In addition, knowledge about the existence of ancestor entries of a given entry is also disclosed by the entry's dn. It could be argued that there should be consistency in the ability of a given requestor to see attribute values in the dn of an entry and his ability to see those attributes in the entry where they actually reside. Similarly, it could be argued that there should be consistency in the ability of a requestor to see an entry and his ability to see its ancestor entries. The main reason we do not require such cross checking of permissions is because of the extra work it entails for the server. There is a trade off between the consistency this cross checking guarantees and the work it takes to do that cross checking. For LDAP servers the trade off has been to go in favor of speed. In addition there are some other points which mitigate these kind of inconsistencies. Firstly, it appears to be difficult to produce a real world example where they really cause a problem. Secondly there are other methods of hiding DNs (and hence protecting the naming attribute and ancestor information they contain) which are outside the scope of access control, for example aliasing and LDAP proxying. 5.3 Modify Operation Recall that the parameters of the Modify operation per RFC2251 [LDAPv3] Section 4.6 are: Stokes, et al Expires 29 December 2001 [Page 31] Internet-Draft Access Control Model 29 June 2001 ModifyRequest ::= [APPLICATION 6] SEQUENCE { object LDAPDN, modification SEQUENCE OF SEQUENCE { operation ENUMERATED { add (0), delete (1), replace (2) }, modification AttributeTypeAndValues } } AttributeTypeAndValues ::= SEQUENCE { type AttributeDescription, vals SET OF AttributeValue } Then the permissions required by authzId that need to be evaluated are as follows: 1. permission "w" to each attribute being added to object If this permission is not granted to such an attribute, then the operation MUST fail. 2. permission "o" to each attribute for which a value is being deleted from object If this permission is not granted to such an attribute, then the operation MUST fail. 3. permissions "o" and "w" to each attribute being replaced in object If each of these items is satisfied then the operation is allowed by the access control model. If one of these items is not satisfied, then the operation MUST fail. In this case, if "u" (discloseOnError) is granted to object, then the usual error codes (such as noSuchObject, attributeOrValueExists, noSuchAttribute and insufficientAccess) and matchedDN value may be returned; if "u" is not granted to object then nosuchObject MUST be returned and matchedDN set to "". 5.4 Add Operation Recall that the parameters of the Add operation per RFC2251 [LDAPv3] Section 4.7 are: AddRequest ::= [APPLICATION 8] SEQUENCE { entry LDAPDN, attributes AttributeList } AttributeList ::= SEQUENCE OF SEQUENCE { type AttributeDescription, Stokes, et al Expires 29 December 2001 [Page 32] Internet-Draft Access Control Model 29 June 2001 vals SET OF AttributeValue } Then the permissions required by authzId that need to be evaluated are as follows: 1. permission "a" to the parent of entry The access rights required for the creation of a root entry in the Directory are beyond the scope of this document. They will be vendor specific. 2. permission "m" to the parent of entry for each attribute being added to entry If each of these items is satisfied then the operation is allowed by the access control model. If one of these items is not satisfied, then the operation MUST fail. In this case, if "u" (discloseOnError) is granted to the parent of entry, then the usual error codes (such as noSuchObject, entryAlreadyExists, and insufficientAccess) and matchedDN value may be returned; if "u" is not granted to the parent of entry, then nosuchObject MUST be returned and matchedDN set to "". Note A: We require "m" permission to each attribute to prevent an entry from acquiring "unintended" rights (via group or role membership), to stop a "rogue" ACI being added that would prevent even admins deleting the entry, and for general consistency with the MODIFY operation. 5.5 Delete Operation Recall that the parameters of the Delete operation per RFC2251 [LDAPv3] Section 4.10 are: DelRequest ::= [APPLICATION 10] LDAPDN Then the permissions required by authzId that need to be evaluated are as follows: 1. permission "d" to the entry in the Delete request If each of these items is satisfied then the operation is allowed by the access control model. If one of these items is not satisfied, then the operation MUST fail. In this case, if "u" (discloseOnError) is granted to the entry to be deleted, then the usual error codes (such as noSuchObject, and insufficientAccess) and matchedDN value may be returned; if "u" is not granted to object then nosuchObject MUST be returned and matchedDN set to "". Note: One could also require the "o" permission to be granted to allow Stokes, et al Expires 29 December 2001 [Page 33] Internet-Draft Access Control Model 29 June 2001 the operation to proceed, but customer experience has shown that the requirement of the additional permission is not useful nor expected, and X.500 requires only the "d" permission. 5.6 Modify DN Operation Recall that the parameters of the Modify DN operation per RFC2251 [LDAPv3] Section 4.6 are: ModifyDNRequest ::= [APPLICATION 12] SEQUENCE { entry LDAPDN, newrdn RelativeLDAPDN, deleteoldrdn BOOLEAN, newSuperior [0] LDAPDN OPTIONAL } The variants of the ModifyDN operation are listed below. Combinations of the write, obliterate, import, export and renameDN permissions are needed for each variant. 1. Rename an entry by moving the conceptual RDN flag between two existing attribute values, without altering any attribute values at all. Permissions needed are renameDN. 2. Rename an entry by adding a new attribute value. Permissions needed are renameDN and write. 3. Rename an entry using an existing attribute value and delete the current attribute value. Permissions needed are renameDN and obliterate. 4. Rename an entry adding a new attribute value and deleting the current attribute value. Permissions needed are renameDN, write, and obliterate. 5. Move an entry to a new place in the DIT, keeping its existing RDN as is. Permissions needed are import and export. 6. Move an entry to a new place coupled with 1. above Permissions needed are import, export, and renameDN. 7. Move coupled with 2. above. Permissions needed are import, export, renameDN, and write. 8. Move coupled with 3. above. Permissions needed are import, export, renameDN, and obliterate. 9. Move coupled with 4. above. Permissions needed are import, export, renameDN, write, and obliterate. For a given case, if the required permissions are granted, then the Stokes, et al Expires 29 December 2001 [Page 34] Internet-Draft Access Control Model 29 June 2001 operation is allowed by the access control model. If, for a given case, the required permissions are not granted, then the operation MUST fail. If the access control failure is due to a missing attribute or entry permission on entry, then if "u" (discloseOnError) is granted to entry, then the usual error codes (such as noSuchObject, attributeOrValueExists and insufficientAccess) and matchedDN value may be returned; if "u" is not granted to entry then nosuchObject MUST be returned and matchedDN set to "". Similar logic applies if the access control failure was due to a missing permission on newSuperior. 5.7 Compare Operation Recall that the parameters of the Compare operation per RFC2251 [LDAPv3] Section 4.10 are: CompareRequest ::= [APPLICATION 14] SEQUENCE { entry LDAPDN, ava AttributeValueAssertion } Then the permissions required by authzId that need to be evaluated are as follows: 1. permission "c" to the attribute in entry on which the comparison is being made. If each of these items is satisfied then the operation is allowed by the access control model. If one of these items is not satisfied, then the operation MUST fail. In this case, if "u" (discloseOnError) is granted to entry, then the usual error codes (such as noSuchObject, and insufficientAccess) and matchedDN value may be returned; if "u" is not granted to entry then nosuchObject MUST be returned and matchedDN set to "". 5.8 Abandon Operation Recall that the parameters of the Abandon operation per RFC2251 [LDAPv3] Section 4.6 are: AbandonRequest ::= [APPLICATION 16] MessageID authzId always has the right to send an Abandon Operation for an operation he previously initiated. 5.9 Extended Operation Recall that the parameters of the Extended operation per RFC2251 [LDA{v3] Section 4.12 are: Stokes, et al Expires 29 December 2001 [Page 35] Internet-Draft Access Control Model 29 June 2001 ExtendedRequest ::= [APPLICATION 23] SEQUENCE { requestName [0] LDAPOID, requestValue [1] OCTET STRING OPTIONAL } The access required for an Extended Operation is beyond the scope of this document. The required access will normally be defined by the implementer of the extended request. 6. Required Permissions for Handling Aliases and References Use of aliases and referrals are part of LDAPv3. However, neither is particularly well-defined. Alias objects and attributes are defined in RFC 2256 as derived from X.500, but LDAPv3 does not explicitly define their semantics or behavior. X.500 does define alias semantics and behavior with respect to access control; we define its behavior in LDAPv3 based on the X.511 (1993) [X511], section 7.11.1. Referrals and knowledge information are still under design in LDAPv3; they are defined in X.500, however, X.500 does not specify their semantics and behavior with respect to access control. We define their semantics and behavior in LDAPv3 in terms that should be independent of the future LDAPv3 definition of referrals and knowledge information. 6.1 ACI Distribution Currently there is no LDAP standard defining how to distribute directory data between LDAP servers. Consequently this model cannot fully specify the behavior of the Access Control Model in a distributed environment. The case of distribution via referrals is treated in the "Referrals" section below. In the case of chaining (where one LDAP server forwards a request to another on behalf of a client) then it is server specific how the access control model behaves in this environment. Similarly it is server specific how the server determines whether the chaining of an operation is permitted in the first place. For example, the implementation may choose to regard the local naming context and the remote subordinate naming context as separate Access Control Specific Areas, or it may regard the DIT as one Access Control Specific Area and implement mechanisms to propagate access control information between the two servers. The behavior of the Access Control Model in distributed environments such as these is beyond the scope of this model. 6.2 Aliases There are two things to protect with respect to aliases: the real name of the aliased object and the location of the server holding it. If alias de-referencing is required in the process of locating a target entry, no specific permissions are necessary for alias de-referencing to Stokes, et al Expires 29 December 2001 [Page 36] Internet-Draft Access Control Model 29 June 2001 take place. Access control is enforced at the object pointed to by the alias. If alias de-referencing would result in a continuationReference (e.g. from a search operation), then browse permission is required to the alias entry and read permission is required to the attribute. Requiring these permission closes the hole of discovery. 6.3 Referrals If a referral is to be followed, no specific permissions are necessary for the ldap client to follow the referral. Access control is enforced at the referenced object. If a referral is returned, then browse is required on the entry and read permission is required to the attribute containing the referral (we cannot name this attribute exactly today because there are no RFCs on this). If the server implements a default referral, then no special permissions are required to read and return that referral. Requiring these permissions closes the hole of discovery. In the default case, it is assumed that a default referral is public. 7. Controlling Access to Access Control Information The entryACI and subtreeACI attributes are used to specify control for who has permission to set/change access control information (entryACI and subtreeACI). The entryACI and subtreeACI attributes/OIDs are just another attribute described with set of rights and permissions, and subject as a value of the entryACI and subtreeACI attributes. (See the example in the "ACI Examples" section). If the policy for controlling the entryACI and subtreeACI attributes are not specified for any object in the tree, behavior is implementation defined. For instance, if no object anywhere in the tree defines the access for entryACI/subtreeACI within the entryACI/subtreeACI attributes, then the server could simply assert that the 'root DN' is considered the policy owner (controller for controlling access control) for all objects. 8. ACI Examples Note that in the examples, the form "OID." refers to the OID in dotted decimal form for the attribute . This shorthand notation is used only for the examples. In implementation, the dotted decimal form of the OID is used. Stokes, et al Expires 29 December 2001 [Page 37] Internet-Draft Access Control Model 29 June 2001 8.1 Attribute Definition The following examples show the access required to control access to the entryACI and subtreeACI attributes. The first example shows controlling the access control on an individual entry and its attributes. The second example shows controlling the access control on a subtree. The authnLevel is set so that a reasonably secure form of authentication is required, since changing ACI has significant security consequences. entryACI: grant:rwo# OID.entryACI#authnLevel:limited:role:cn=aciAdmin subtreeACI: grant:rwo# OID.subtreeACI#authnLevel:limited:role:cn=aciAdmin The next example shows a subtreeACI attribute where a group "cn=Dept XYZ, c=US" is being given permissions to read, search, and compare attribute attr1. The permission applies to the entire subtree below the node containing this ACI. subtreeACI: grant;rsc# OID.attr1#authnLevel:weak:group:cn=Dept XYZ,c=US The next example shows an ACI attribute where a role "cn=SysAdmins,o=Company" is being given permissions to browseDN, viewEntry, and returnDN for objects below this node. The role is also being given permission to read, search, and compare to attribute attr2 and read, search, compare, write, obliterate to attr3. The permissions apply to the entire subtree below the node containing this ACI. subtreeACI: grant:bvt# [entry]#authnLevel:weak:role:cn=SysAdmins,o=Company subtreeACI: grant:rsc# OID.attr2#authnLevel:weak:role:cn=SysAdmins,o=Company subtreeACI: grant:rscwo# OID.attr3#authnLevel:weak:role:cn=SysAdmins,o=Company 8.2 Modifying the entryACI and subtreeACI Values Modify-Replace works as defined in the ldap operation modify. If the attribute value does not exist, create the value. If the attribute does exist, replace the value. If the entryACI/subtreeACI value is replaced, all entryACI/subtreeACI values are replaced. To modify the entryACI/subtreeACI attributes requires you to have 'w' and 'o' permission on the entryACI/subtreeACI attribute (recall that a value of entryACI/subtreeACI specifies entryACI/subtreeACI so one can control access to the entryACI/subtreeACI attribute). The examples in this section assume that you have access to control entryACI/subtreeACI. Stokes, et al Expires 29 December 2001 [Page 38] Internet-Draft Access Control Model 29 June 2001 A given subtreeACI for an entry: subtreeACI: deny:rw#[all]#authnLevel:weak:group:cn=Dept ABC subtreeACI: grant:r#OID.attr1#authnLevel:weak:group:cn=Dept XYZ perform the following change: dn: cn=someEntry changetype: modify replace: subtreeACI subtreeACI: grant:rw#[all]#authnLevel:weak:group:cn=Dept LMN The resulting ACI is: subtreeACI: grant:rw#[all]#authnLevel:weak:group:cn=Dept LMN ( subtreeACI values for Dept XYZ and ABC are lost through the replace ) During an ldapmodify-add, if the ACI does not exist, the create the ACI with the specific entryACI/subtreeACI value(s). If the ACI does exist, then add the specified values to the given entryACI/subtreeACI. For example a given ACI: subtreeACI: grant:rw#[all]#authnLevel:weak:group:cn=Dept XYZ with a modification: dn: cn=someEntry changetype: modify add: subtreeACI subtreeACI: grant:r#OID.attr1#authnLevel:weak:group:cn=Dept XYZ would yield an multi-valued ACI of: subtreeACI: grant:rw#[all]#authnLevel:weak:group:cn=Dept XYZ subtreeACI: grant:r#OID.attr1#authnLevel:weak:group:cn=Dept XYZ To delete a particular ACI value, use the regular ldapmodify - delete syntax Given an ACI of: subtreeACI: grant:rw#[all]#authnLevel:weak:group:cn=Dept XYZ subtreeACI: grant:r#OID.attr1#authnLevel:weak:group:cn=Dept XYZ dn: cn = some Entry changetype: modify delete: subtreeACI subtreeACI: grant:r#OID.attr1#authnLevel:weak:group:cn=Dept XYZ Stokes, et al Expires 29 December 2001 [Page 39] Internet-Draft Access Control Model 29 June 2001 would yield a remaining ACI on the server of subtreeACI: grant:rw#[all]#authnLevel:weak:group:cn=Dept XYZ The attributes which are defined for access control interchange may be used in all LDAP operations. Within the ldapmodify-delete operation, the entire acl may be deleted by specifying dn: cn = some Entry changetype: modify delete: entryACI dn: cn = some Entry changetype: modify delete: subtreeACI In this case, the entry would then inherit its ACI from other nodes in the tree depending on the inheritance model. Similarly, if all values of entryACI and subtreeACI are deleted, then the access control information for that entry is defined by the inheritance model. 8.3 Evaluation These examples assume that the ACI entries listed in each example are the only ACI which applies to the entry in question; if backing-store ACI also exists, the effective policy may be different from that listed in each example. Assume cn=jsmith is a member of group cn=G1. Assume cn=jsmith is a member of group cn=G2. Example #1 dn: o=XYZ, c=US subtreeACI: grant:r#attr2 #authnLevel:weak:group:cn=G1,ou=ABC,o=XYZ,c=US subtreeACI: grant:w#attr2 #authnLevel:weak:group:cn=G2,ou=ABC,o=XYZ,c=US What rights does cn=jsmith have to attr2 of o=XYZ,c=US? Read-write (rw) access; ACI is combined because both subjects (group) have same precedence. Stokes, et al Expires 29 December 2001 [Page 40] Internet-Draft Access Control Model 29 June 2001 Example #2 dn: o=XYZ, c=US subtreeACI: grant:rw#OID.attr3 #authnLevel:weak:group:cn=G1,ou=ABC,o=XYZ,c=US subtreeACI: deny:w#OID.attr3#authnLevel:weak:group:cn=G2,ou=ABC,o=XYZ,c=US What rights does cn=jsmith have to attr3 of o=XYZ, c=US? Read access; write is denied (deny has precedence over grant). Example #3 dn: o=XYZ, c=US subtreeACI: grant:m#OID.attr5 #authnLevel:weak:authzID-dn:cn=jsmith,o=ABC,c=US subtreeACI: grant:m#OID.cn #authnLevel:weak:authzID-dn:cn=jsmith,o=ABC,c=US subtreeACI: grant:m#OID.sn #authnLevel:weak:authzID-dn:cn=jsmith,o=ABC,c=US subtreeACI: grant:a#[entry] #authnLevel:weak:authzID-dn:#cn=jsmith,o=ABC,c=US What rights does cn=jsmith have to o=XYZ, c=US? Make(m) on attributes attr5, cn, and sn and Add(a) on the entry. These are the minimal yet sufficient permissions to create a new object, cn=New, o=XYZ, c=US with values for the attr5, cn, and sn attributes. This example illustrates how the "m" permission can be used to limit the attributes that can be created on a new entry. Example #4 dn: c=US subtreeACI: grant:m#[all]#authnLevel:weak:subtree:c=US dn: o=XYZ, c=US subtreeACI: grant:a#[entry]# authnLevel:weak:authzID-dn:cn=jsmith,o=ABC,c=US What rights does cn=jsmith have to o=XYZ, c=US? Make(m) on attributes all attributes and Add(a) on the entry. These are sufficient permissions to create a new object, cn=New, o=XYZ, c=US with values for any desired attributes. For administrators who do not wish to limit the attributes that can be created on new entries, this example shows how a single ldapACI at the top of the domain solves the problem. Stokes, et al Expires 29 December 2001 [Page 41] Internet-Draft Access Control Model 29 June 2001 Example #5 dn: dc=com,dc=demo subtreeACI: grant:rw#description;lang-en#authnLevel:weak:authzID-dn: cn=rvh,dc=att,dc=com subtreeACI: grant:rw#description;lang-en,description;lang-fr# authnLevel:weak:authzID-dn:cn=rob,dc=sun,dc=com In this example, cn=rvh,dc=att,dc=com has "rw" access to the English- language "description" attributes of entries under dc=com,dc=demo. cn=rob,dc=sun,dc=com has "rw" rights to both English- and French- language "description" attributes. The example demonstrates that "Attribute Descriptions", not just "Attribute Types", can be used in the "attr" field of an ACI. See [LangCode] for more information on the attribute options used here. 8.4 ModDN There are many different actions that can happen when the modDN command are used. The following illustrates the permissions needed in order to execute each scenario. For all examples, we will assume the role cn=Admins is working with the following entry: dn: cn=personA, o=Company cn: personA cn: FirstName sn: LastName objectclass: person Example #1 Perform a modRDN only, using an existing attribute value. In this case, we perform a modRDN and rename cn=personA, o=Company to cn=FirstName, o=Company. The entryACI value for this entry must give the cn=Admin role rename permission on the entry. entryACI: grant:n#[entry]#authnLevel:weak:role:cn=Admin Example #2 We wanted to perform a ModRDN and add a new attribute value. In this case we are renaming cn=personA, o=Company to cn=newFirstName, o=Company. The entryACI value must give the cn=Admin role rename permission on the entry and w permission on the cn attribute. entryACI: grant:n#[entry]#authnLevel:weak:role:cn=Admin entryACI: grant:w#cn#authnLevel:weak:role:cn=Admin Stokes, et al Expires 29 December 2001 [Page 42] Internet-Draft Access Control Model 29 June 2001 Example #3 Perform a modRDN, using an existing attribute, but delete the old RDN value. Here, we perform a modRDN and rename cn=personA, o=Company to cn=FirstName, o=Company and set the deleteOldRdn flag to true. The cn=Admin role must have permission to rename the entry, and to delete a cn attribute value ( i.e. 'o' ). entryACI: grant:n#[entry]#authnLevel:weak:role:cn=Admin entryACI: grant:o#OID.cn#authnLevel:weak:role:cn=Admin Example #4 Perform a modRDN, using an new cn attribute value (cn=newFirstName), and delete the old RDN value (cn=personA). Here, we perform a modRDN and rename cn=personA, o=Company to cn=newFirstName, o=Company and set the deleteOldRdn flag to true. The cn=Admin role must have permission to rename the entry, and to delete and write the cn attribute value. entryACI: grant:n#[entry]#authnLevel:weak:role:cn=Admin entryACI: grant:w,o#OID.cn#authnLevel:weak:role:cn=Admin Example #5 We want to change the entry's location in the DIT ( modDN ) and keep the same RDN Value. In this case we are moving cn=personA, o=Company to cn=personA, o=CompanyB. The cn=Admin role must have export permission on the original entry, and import permission on the new superior object ( the new parent ). The cn=personA, o=Company entryACI is: entryACI: grant:e#[entry]#authnLevel:weak:role:cn=Admin and the o=CompanyB entryACI is: entryACI: grant:i#[entry]#authnLevel:weak:role:cn=Admin Example #6 We want to change the entry's location in the DIT ( modDN ) and change the RDN Value to an existing attribute value. In this case we are moving cn=personA, o=Company to cn=FirstName, o=CompanyB. The cn=Admin role must have rename and export permission on the original entry, and import permission on the new superior object ( the new parent ). The cn=personA, o=Company entryACI is: entryACI: grant:en#[entry]#authnLevel:weak:role:cn=Admin and the o=CompanyB entryACI is: Stokes, et al Expires 29 December 2001 [Page 43] Internet-Draft Access Control Model 29 June 2001 entryACI: grant:i#[entry]#authnLevel:weak:role:cn=Admin Example #7 We want to change the entry's location in the DIT ( modDN ) and change the RDN Value to a new attribute value. In this case we are moving cn=personA, o=Company to cn=newFirstName, o=CompanyB. The cn=Admin role must have rename and export permission on the original entry, write permission on the naming attribute ( cn) and import permission on the new superior object ( the new parent ). The cn=personA, o=Company entryACI is: entryACI: grant:en#[entry]#authnLevel:weak:role:cn=Admin entryACI: grant:w#OID.cn#authnLevel:weak:role:cn=Admin and the o=CompanyB entryACI is: entryACI: grant:i#[entry]#authnLevel:weak:role:cn=Admin Example #8 We want to change the entry's location in the DIT ( modDN ) and change the RDN Value to an existing attribute value, and delete the old RDN value. In this case we are moving cn=personA, o=Company to cn=FirstName, o=CompanyB and deleting the attribute value personA. The cn=Admin role must have rename and export permission on the original entry, delete ('o') permission on the naming attribute (cn) and import permission on the new superior object (the new parent). The cn=personA, o=Company entryACI is: entryACI: grant:en#[entry]#authnLevel:weak:role:cn=Admin entryACI: grant:o#cn#authnLevel:weak:role:cn=Admin and the o=CompanyB entryACI is: entryACI: grant:i#[entry]#authnLevel:weak:role:cn=Admin Example #9 We want to change the entry's location in the DIT ( modDN ) and change the RDN Value to a new attribute value, and delete the old RDN value. In this case we are moving cn=personA, o=Company to cn=newFirstName, o=CompanyB and deleting the attribute value personA. The cn=Admin role must have rename and export permission on the original entry, write ('w'), and delete ('o') permission on the naming attribute (cn) and import permission on the new superior object ( the new parent ). The cn=personA, o=Company entryACI is: Stokes, et al Expires 29 December 2001 [Page 44] Internet-Draft Access Control Model 29 June 2001 entryACI: grant:en#[entry]#authnLevel:weak:role:cn=Admin entryACI: grant:wo#OID.cn#authnLevel:weak:role:cn=Admin and the o=CompanyB entryACI is: entryACI: grant:i#[entry]#authnLevel:weak:role:cn=Admin 8.5 Interaction Among ACI These examples show how ACI in different parts of the tree interact. Examples with varying authnLevel are given in the next section. The examples refer to this fragment of a directory tree: dc=com | +--------+---------------+ | | dc=tivoli dc=sun | | cn=ellen cn=rob Example #1 If the ACI is as follows: at dc=com: subtreeACI:grant:rw#[all]#authnLevel:weak: authzID-dn:cn=rob,dc=sun,dc=com at dc=tivoli,dc=com: subtreeACI:grant:r#[all]#authnLevel:weak: authzID-dn:cn=rob,dc=sun,dc=com Then the effective rights of cn=rob,dc=sun,dc=com to all the attributes of object cn=ellen,dc=tivoli,dc=com are "rw". The ACI at dc=tivoli,dc=com is redundant. Example #2 If the ACI is as follows: at dc=com: subtreeACI:grant:r#[all]# authnLevel:weak: authzID-dn:cn=rob,dc=sun,dc=com at dc=tivoli,dc=com: subtreeACI:grant:w#OID.uid#authnLevel:weak: authzID-dn:cn=rob,dc=sun,dc=com Then cn=rob,dc=sun,dc=com has effective rights of "r" to all the attributes of object cn=ellen,dc=tivoli,dc=com, and effective rights of "rw" to the uid attribute of object cn=ellen,dc=tivoli,dc=com. Also, cn=rob,dc=sun,dc=com has effective rights of "r" to all attributes of object cn=rob,cn=sun,cn=com. Stokes, et al Expires 29 December 2001 [Page 45] Internet-Draft Access Control Model 29 June 2001 Example #3 If the ACI is as follows: at dc=com: subtreeACI:grant:rw#[all]#authnLevel:weak: authzID-dn:cn=rob,dc=sun,dc=com at dc=tivoli,dc=com: subtreeACI:deny:w#[all]#authnLevel:weak: authzID-dn:cn=rob,dc=sun,dc=com Then cn=rob,dc=sun,dc=com has effective rights of "r" (but not "w") to all the attributes of object cn=ellen,dc=tivoli,dc=com and has effective rights of "rw" to all attributes of objects cn=rob,dc=sun,dc=com. Example #4 If the ACI is as follows: at dc=com: subtreeACI:grant:r#OID.uid#authnLevel:weak: authzID-dn:cn=rob,dc=sun,dc=com at dc=tivoli,dc=com: subtreeACI:grant:w#OID.sn#authnLevel:weak: authzID-dn:cn=rob,dc=sun,dc=com Then cn=rob,dc=sun,dc=com has effective rights of "r" to the uid attribute and "w" to the sn attribute of object cn=ellen,dc=tivoli,dc=com. Example #5 If the ACI is as follows: at dc=com: subtreeACI:grant:r#OID.uid#authnLevel:weak: authzID-dn:cn=rob,dc=sun,dc=com at cn=rob,dc=sun,dc=com: entryACI:grant:rw#[all]#authnLevel:weak: this: Then cn=rob,dc=sun,dc=com has effective rights of "rw" to all attributes of object cn=rob,dc=sun,dc=com. Example #6 If the ACI is as follows: at dc=com: subtreeACI:grant:rw#uid#authnLevel:weak: authzID-dn:cn=rob,dc=sun,dc=com at dc=tivoli,dc=com: subtreeACI:deny:w#uid#authnLevel:weak: subtree:dc=sun,dc=com Then cn=rob,dc=sun,dc=com has rights of "r" to the uid attribute of object cn=ellen,dc=tivoli,dc=com. While checking the "w" permission, the subtreeACI at dc=tivoli,dc=com is lower in the tree than the subtreeACI at dc=com, so it takes precedence at Step 1. Stokes, et al Expires 29 December 2001 [Page 46] Internet-Draft Access Control Model 29 June 2001 Example #7 If the ACI is as follows: at dc=com: subtreeACI:grant:rw#OID.uid#authnLevel:weak: authzID-dn:cn=rob,dc=sun,dc=com at dc=com: subtreeACI:deny:w#OID.uid#authnLevel:weak: subtree:dc=sun,dc=com Then cn=rob,dc=sun,dc=com has rights of "rw" to the uid attribute of object cn=ellen,dc=tivoli,dc=com. While checking the "w" permission, the two subtreeACI are at the same level in the tree (step 1) and the Subject Type dn-dn has precedence over Subject Type subtree (step 2), so the first ACI has precedence over the second. Example #8 If the ACI is as follows: at dc=com: subtreeACI:grant:rw#OID.uid#authnLevel:weak: subtree:dc=sun,dc=com at dc=com: subtreeACI:deny:w#OID.uid#authnLevel:weak:subtree:dc=com Then cn=rob,dc=sun,dc=com has rights of "r" to the uid attribute of object cn=ellen,dc=tivoli,dc=com. While checking the "w" permission, the two subtreeACI are at the same level in the tree (step 1) and they have the same Subject Type (step 2), so the precedence of deny over grant (step 5) is the deciding factor. Example #9 If the ACI is as follows: at dc=com: subtreeACI:grant:rw#OID.uid#authnLevel:weak: subtree:dc=sun,dc=com at dc=com: subtreeACI:deny:w#[all]#authnLevel:weak:subtree:dc=com Then cn=rob,dc=sun,dc=com has rights of "rw" to the uid attribute of object cn=ellen,dc=tivoli,dc=com. While checking the "w" permission, the two subtreeACI are at the same level in the tree (step 1) and they have the same Subject Type (step 2), so the precedence of a specific attribute list over "[all]" (step 4) is the deciding factor. 8.6 Use of ipAddress in ACI Using the tree fragment from Section 8.5: Stokes, et al Expires 29 December 2001 [Page 47] Internet-Draft Access Control Model 29 June 2001 Example #1 If the ACI is as follows: at dc=com: subtreeACI: deny:adeinbvtug#[entry]# authnLevel:strong:ipAddress:10.0.0.0-10.255.255.255 subtreeACI: deny:rwospcm#[all]# authnLevel:strong:ipAddress:10.0.0.0-10.255.255.255 subtreeACI: grant:rscp#[all]#authnLevel:none:public: subtreeACI: grant:btv#[entry]#authnLevel:none:public: Then any user regardless of the strength of their authentication is denied all permissions if they happen to be connecting from an IP address in the 10-net. If they connect from any other address, they have "rscp" permissions for all attributes and "btv" permissions for all entries in the dc=com subtree. Example #2 If the ACI is as follows: at dc=com: subtreeACI: grant:adeinbvtug#[entry]# authnLevel:weak:ipAddress:10.0.0.0-10.255.255.255 subtreeACI: grant:rspwocm#[all]# authnLevel:weak:ipAddress:10.0.0.0-10.255.255.255 It will have no effect. While it might seem that it would grant total access to any user bound from an address in 10-net, the special rules governing ipAddress and dns as subjects make them useful only for deny ACI, not for grants. This was done because the effects of a mistaken grant to an IP address range or wildcarded DNS name could be extremely serious. An (insane) administrator who really wants to grant total access to anyone on 10-net would have to specify: at dc=com: subtreeACI: grant:adeinbvtug#[entry]#authnLevel:weak:public: subtreeACI: deny:adeinbvtug#[entry]# authnLevel:strong:ipAddress:0.0.0.0-9.255.255.255, 11.0.0.0-255.255.255.255 subtreeACI: grant:rspwocm#[all]#authnLevel:weak:public: subtreeACI: deny:rspwocm#[all]# authnLevel:strong:ipAddress:0.0.0.0-9.255.255.255, 11.0.0.0-255.255.255.255 This ACI depends on the fact that a "deny" works on the stated authnLevel and all lower authnLevels while a "grant" works on the stated level and all higher authnLevels. Stokes, et al Expires 29 December 2001 [Page 48] Internet-Draft Access Control Model 29 June 2001 8.7 Use of authnLevel in ACI Using the tree fragment from Section 8.5: Example #1 If the ACI is as follows: at dc=com: subtreeACI:grant:rw#OID.sn#authnLevel:strong: authzID-dn:cn=rob,dc=sun,dc=com at dc=tivoli,dc=com: subtreeACI:grant:r#OID.sn#authnLevel:limited: authzID-dn:cn=rob,dc=sun,dc=com Then cn=rob,dc=sun,dc=com has effective rights of "rw" to the sn attribute of object cn=ellen,dc=tivoli,dc=com if the BIND for this session used strong authentication. If the BIND for this session used limited authentication, cn=rob,dc=sun,dc=com has effective rights of "r" to the sn attribute of object cn=ellen,dc=tivoli,dc=com. If the BIND for this session used weak or no authentication, cn=rob,dc=sun,dc=com has no rights to object cn=ellen,dc=tivoli,dc=com. Example #2 If the ACI is as follows: at dc=com: subtreeACI: grant:rw#sn#authnLevel:limited: subtree:dc=sun,dc=com at dc=tivoli,dc=com: subtreeACI: grant:c;deny:w#sn#authnLevel:strong: authzID-dn:cn=rob,dc=sun,dc=com Then cn=rob,dc=sun,dc=com has effective rights of "rc" to the sn attribute of object cn=ellen,dc=tivoli,dc=com if the BIND for this session used strong authentication. The "r" permission comes from the fact that the grant part of the first ACI applies to BINDs at or above the "limited" level. If the BIND for this session used limited authentication, cn=rob,dc=sun,dc=com has "r" rights to the sn attribute of object cn=ellen,dc=tivoli,dc=com. The deny part of the second ACI applies to cases where the authnLevel is less than "strong", so it overrides the grant of "w" permission in the first ACI. If the BIND for this session is at the weak or none authnLevel, the user has no permissions. Example #3 If the ACI is as follows: at dc=com: subtreeACI:grant:rs#sn#authnLevel:none:public at dc=com: subtreeACI:grant:w#sn#authnLevel:strong: subtree:cn=rob,dc=sun,dc=com Then cn=rob,dc=sun,dc=com has effective rights of "rsw" to the sn Stokes, et al Expires 29 December 2001 [Page 49] Internet-Draft Access Control Model 29 June 2001 attribute of object cn=ellen,dc=tivoli,dc=com if the BIND for this session used strong authentication and effective rights "rs" if the BIND for this session used any other form of authentication. The grant in the first ACI applies to BINDs at the "none" level and above, so it applies to any authnLevel. Example #4 If the ACI is as follows: at root: subtreeACI:grant:ps#[all]#authnLevel:none:public: subtreeACI:grant:cr#[all]#authnLevel:weak:subtree: Then any user including the anonymous user (no name supplied to BIND) has "ps" permissions to any entry on the server, and any user with an ID on the server ("subtree:" specifies any DN in the subtree under root) who has bound using "weak" or better authentication has "pscr" permissions. Example #5 If the ACI is as follows: at dc=com: subtreeACI:grant:rw#[all]#authnLevel:limited: cn=ellen,dc=tivoli,dc=com at dc=tivoli,dc=com: subtreeACI:deny:w#[all]#authnLevel:strong: cn=rob,dc=sun,dc=com Then if bound at the strong authnLevel, user cn=ellen,dc=tivoli,dc=com has permissions "rw" to all the attributes of the object cn=ellen,dc=tivoli,dc=com, and permissions "rw" to all the attributes of the object cn=rob,dc=sun,dc=com. But if bound at the limited authnLevel, user cn=ellen,dc=tivoli,dc=com has permissions "r" to all the attributes of the object cn=ellen,dc=tivoli,dc=com, and permissions "rw" to all the attributes of the object cn=rob,dc=sun,dc=com. This is a consequence of the way that "deny" is processed with respect to authnLevel. Since cn=rob,dc=sun,dc=com is denied "w" permission when authenticating at the "strong" authnLevel, ALL users are denied "w" permission when bound at any weaker level (see the rules for authnLevel in "Subjects and Associated Authentication"). 9. GetEffectiveRights Control The access control information controls provide a way to manipulate access control information in conjunction with a LDAP operation. One LDAP control is defined. This control allows access control information to be retrieved. The control is: GetEffectiveRights - obtain the effective rights for a given Stokes, et al Expires 29 December 2001 [Page 50] Internet-Draft Access Control Model 29 June 2001 directory entry(s) for a given subject during a ldap_search operation The purpose of the getEffectiveRights control is to allow an administrator or application to query the server about the rights of another user of the directory. This is important as it would allow the administrator to verify the access control policy for a given subject. Or it would allow an application for example, to propose to a user the attributes which he has the right to modify or see in a given entry. 9.1 Request Control This control may only be included in the ldap_search message as part of the controls field of the LDAPMessage, as defined in Section 4.1.12 of [LDAPv3]. The controlType is set to . The criticality MAY be either TRUE or FALSE (where absent is also equivalent to FALSE) at the client's option. The controlValue is an OCTET STRING, whose value is the BER encoding of a value of the following SEQUENCE: GetEffectiveRightsRequest ::= SEQUENCE{ gerSubject [0] GERSubject } GERSubject ::= SEQUENCE { gerOneSubject [0] OneSubject -- from 4.1.2 , OPTIONAL germachineSubject [1] GERMachineSubject, gerAuthnLEvel [2] AuthnLevel, -- from 4.1.2 } GERMachineSubject ::= SEQUENCE{ gerOneIPAddress [0] IPAddress, -- from 4.1.2 gerOneDNSName [1] DomainName -- from 4.1.2 } The getEffectiveRightsRequest specifies a subject, gerSubject, about whom access control information is being requested. The control asks the server to evaluate and return the entry level rights possessed by the gerSubject for each entry that is returned in the search results, and for each returned or specifically requested attribute. The server will use the Access Decision Algorithm from section 4.3 to determine the requested effective rights; it will be seen that the parameters defining the subject in the Access Decision algorithm ((dn OPTIONAL, ipAddress, dnsName, authnLevel)) are all present in this control. Stokes, et al Expires 29 December 2001 [Page 51] Internet-Draft Access Control Model 29 June 2001 9.2 Response Control This control is included in the ldap_search_response message as part of the controls field of the LDAPMessage, as defined in Section 4.1.12 of [LDAPv3]. The controlType is set to . There is no need to set the criticality on the response. The controlValue is an OCTET STRING, whose value is the BER encoding of a value of the following SEQUENCE: GetEffectiveRightsResponse ::= { result ENUMERATED { success (0), operationsError (1), unavailableCriticalExtension (12), noSuchAttribute (16), undefinedAttributeType (17), invalidAttributeSyntax (21), insufficientRights (50), unavailable (52), unwillingToPerform (53), other (80) } } The effective rights returned are returned with each entry returned by the search result. The control response for ldap_search is: PartialEffectiveRightsList ::= SEQUENCE { entryLevelRights [0] EffectiveRights, attributeLevelRights [1] AttributeLevelRights } EffectiveRights ::= CHOICE { rights [0] Permissions -- from 4.1.2, noRights [1] NULL, errorEvaluatingRights [2] GerError } GerError ::= ENUMERATED {generalError(0),insufficientAccess(1)} AttributeLevelRights ::= SEQUENCE OF { attr [0] SEQUENCE OF Attribute, rights [1] EffectiveRights } For a given entry, the control response entryLevelRights field contains Stokes, et al Expires 29 December 2001 [Page 52] Internet-Draft Access Control Model 29 June 2001 the entry level effective rights that gerSubject has on that entry. The attributeLevelRights field contains a list of attributes and the effective rights that gerSubject has for each of those attributes. The list of attributes consists of those attributes returned as part of the search operation plus any explicitly requested attributes that were not returned. An attribute explicitly requested in the search request might not be returned because the attribute is not in the entry, but we may still be interested in the effective rights on it, for example to determine if gerSubject could add that attribute to the entry. The control returns the permissions that gerSubject has on a given entry and its attributes. In order to determine whether these permissions suffice to allow gerSubject to perform a given LDAP operation on the entry, the requestor will determine if these permissions satisfy the required permissions for that LDAP operation, as defined in section 5. Note that in the case where gerSubject does not have a particular permission then this control does not allow the requestor to determine whether that is because the permission was not granted to gerSubject or whether it was because this permission has been explicitly denied. The required permissions to see the effective rights of a subject on an entry and its attributes are specified in 9.3. If gerSubject has the same rights to a set of attributes in that entry then the server may group the attributes together in a list. Although this extends the search operation, there are no incompatibilities between versions. LDAPv2 cannot send a control, hence the above structure cannot be returned to a LDAPv2 client. A LDAPv3 client cannot send this request to a LDAPv2 server. A LDAPv3 server not supporting this control cannot return the additional data. 9.3 Access control for the Get Effective Rights Control In the presence of the get effective rights control, the access controls applied to the search operation use the requestor's authorization identity. For a given entry returned in the search results then in order to see the effective rights of any subject for this entry and its attributes the requestor requires: 1. "g" permission on the entry. If 1. is not satisfied then the "insufficientAccess" error is returned for the entryLevelRights of that entry and for each of the rights in the AttributeLevelRights list. Note A: the set of entries and attributes that are returned are those Stokes, et al Expires 29 December 2001 [Page 53] Internet-Draft Access Control Model 29 June 2001 visible to the requestor, not the gerSubject. This means that it is possible that if gerSubject could see an entry that the requestor could not then it is impossible for the requestor, using the getEffectiveRights control, to retrieve the effective rights of gerSubject on that entry. However, the idea here is that the requestor will typically be a powerful administrator whose access rights will be a superset of those of other users. Note B: once a given subject has the "g" permission on a given entry then he has the right to see the effective rights of _any_ subject on that entry. It might be useful to have a way to restrict the set of subjects whose effective rights can be retrieved but that complicates the model in that, for the "g" permission only, we no longer have a target/subject type structure but rather a target/subject/otherSubject structure. Here, we choose the simpler model rather than this extra functionality. 9.4 Get Effective Rights example Suppose we have a DIT with the entries and access controls as described in the following LDIF example: o=sun.com objectclass: top objectclass: organization o: sun.com subtreeACI: grant:rsc#[all]#authnLevel:none:public: subtreeACI: deny:rsc#[userPassword,subtreeACI, entryACI,salary]#authnLevel:none:public: subtreeACI: grant:bvt#[entry]#authnLevel:none:public: subtreeACI: grant:g#[entry]#authnLevel:limited:this: subtreeACI: grant:worsc#[all]#authnLevel:limited:this: subtreeACI: deny: wo[entryACI, subtreeACI, salary]#this subtreeACI: grant:rscmo,w#[all]#authnLevel:strong:group: cn=adminGroup,ou=Groups,o=sun.com subtreeACI: grant:bvtugeinad#[entry]#authnLevel:strong group: cn=adminGroup,ou=Groups,o=sun.com cn=admin,o=sun.com objectclass: top objectclass: person cn: admin sn: admin userPassword: secret salary: 10000 ou=Groups,o=sun.com objectclass: top objectclass: organizationalUnit Stokes, et al Expires 29 December 2001 [Page 54] Internet-Draft Access Control Model 29 June 2001 ou: Groups cn=adminGroup,ou=Groups,o=sun.com objectclass: top objectclass: groupOfUniqueNames uniquemember: cn=admin,o=sun.com ou=Eng,o=sun.com objectclass: top objectclass: organizationalUnit ou: Eng cn=Joe Engineer,ou=Eng,o=sun.com objectclass: top objectclass: person cn: Joe Engineer sn: Engineer userPassword: secret salary: 10000 ou=Sales,o=sun.com objectclass: top objectclass: organizationalUnit cn=Joe Sales,ou=Sales,o=sun.com objectclass: top objectclass: person cn: Joe Sales sn: Sales userPassword: secret salary: 100000000000 The access control policy in this DIT policy may be described as follows: 1. anonymous users have full read, search, and compare rights to the whole DIT, except for the important attributes userPassword, subtreeACI, entryACI, and salary. 2. Any user bound with a limited authentication level can modify any attributes in his own entry, except subtreeACI, entryACI and salary. 3. Any user can read all attributes in his own entry. Stokes, et al Expires 29 December 2001 [Page 55] Internet-Draft Access Control Model 29 June 2001 4. Any user bound with a limited authentication level can retrieve the effective rights on his own entry (including userPassword, salary, entryACI and subtreeACI). 5. users, bound with a strong authentication level, in the cn=adminGroup,ou=Groups,o=sun.com group have full rights in the whole DIT. Then here are some examples of requests to get the effective rights and the responses: Example 1. Suppose we issue a search authenticated to level strong as "cn=admin,o=sun.com" (who is in the group cn=adminGroup,ou=Groups,o=sun.com), with base "o=sun.com", search filter "objectclass=*", requested attributes "* entryACI", with the getEffectiveRights control subject set to "cn=Joe Sales,ou=Sales,o=sun.com" and the MachineSubject specifying the ipAddress and dnsName of the client machine and the authnLevel set to limited. Then the search result and effective rights we see are: o=sun.com objectclass: top objectclass: organization o: sun.com entryLevelRights: bvt attributeLevelRights: objectclass,o: rsc,entryACI: none --- cn=admin,o=sun.com objectclass: top objectclass: person cn: admin sn: admin userPassword: secret salary: 10000 entryLevelRights: bvt attributeLevelRights: objectclass,cn,sn: rsc userPassword,salary,entryACI: none --- ou=Groups,o=sun.com objectclass: top objectclass: organizationalUnit ou: Groups entryLevelRights: bvt Stokes, et al Expires 29 December 2001 [Page 56] Internet-Draft Access Control Model 29 June 2001 attributeLevelRights: objectclass,ou: rsc,entryACI: none --- ou=Eng,o=sun.com objectclass: top objectclass: organizationalUnit entryLevelRights: bvt attributeLevelRights: objectclass,ou: rsc,entryACI: none --- cn=Joe Engineer,ou=Eng,o=sun.com objectclass: person cn: Joe Engineer sn: Engineer userPassword: secret salary: 10000 entryLevelRights: bvt attributeLevelRights: objectclass,cn,sn: rsc userPassword,salary,entryACI: none --- ou=Sales,o=sun.com objectclass: top objectclass: organizationalUnit entryLevelRights: bvt attributeLevelRights: objectclass,ou: rsc,entryACI: none --- cn=Joe Sales,ou=Sales,o=sun.com objectclass: person cn: Joe Sales sn: Sales userPassword: secret salary: 100000000000 entryLevelRights: bvtg attributeLevelRights: objectclass,cn,sn,userPassword: rscow salary,entryACI: rsc 9.5 Client-Server Interaction The GetEffectiveRightsRequest control requests the rights that are in effect for requested directory entry/attribute based on the specified subject. The server that consumes the search operation looks up the rights for the returned directory information based on the subject and returns that rights information as defined above. Stokes, et al Expires 29 December 2001 [Page 57] Internet-Draft Access Control Model 29 June 2001 There are six possible scenarios that may occur as a result of the GetEffectiveRights control being included on the search request: 1. If the server does not support this control and the client specified TRUE for the control's criticality field, then the server MUST return unavailableCriticalExtension as a return code in the searchResponse message and not send back any other results. This behavior is specified in section 4.1.12 of [LDAPv3]. 2. If the server does not support this control and the client specified FALSE for the control's criticality field, then the server MUST ignore the control and process the request as if it were not present. This behavior is specified in section 4.1.12 of [LDAPv3]. 3. If the server supports this control but for some reason the server cannot process it and the client specified TRUE for the control's criticality field, then the server SHOULD do the following: return unavailableCriticalExtension as a return code in the searchResult message. 4. If the server supports this control but for some reason the server cannot process it and the client specified FALSE for the control's criticality field, then the server should process as 'no rights returned' and include the result Unavailable in the GetEffectiveRightsResponse control in the searchResult message. 5. If the server supports this control and can return the rights information, then it should include the GetEffectiveRightsResponse control in the searchResult message with a result of success. 6. If the search request failed for any other reason, then the server SHOULD omit the GetEffectiveRightsResponse control from the searchResult message. The client application is assured that the correct rights are returned for scope of the search operation if and only if the GetEffectiveRightsResponse control returns the rights. If the server omits the GetEffectiveRightsResponse control from the searchResult message, the client SHOULD assume that the control was ignored by the server. The GetEffectiveRightsResponse control, if included by the server in the searchResponse message, should have the GetEffectiveRightsResult set to either success if the rights are returned or set to the appropriate error code as to why the rights could not be returned. The server may not be able to return a right because it may not exist in that directory object's attribute; in this case, the rights request is ignored with success. Stokes, et al Expires 29 December 2001 [Page 58] Internet-Draft Access Control Model 29 June 2001 10. Security Considerations This document proposes protocol elements for transmission of security policy information. Security considerations are discussed throughout this model. Because subject security attribute information is used to evaluate decision requests, it is security-sensitive information and must be protected against unauthorized modification whenever it is stored or transmitted. Interaction of access control with other directory functions (other than the ones defined in this document) are not defined in this document, but instead in the documents where those directory functions are defined. For example, the directory replication documents should address the interaction of access control with the replication function. In general, IP addresses and DNS names should not be used as identities (subjects) since they can be easily spoofed. However, some widely- deployed implementations have long supported and continue to support IP addresses and DNS names in ACI to enforce access controls based on topology. Thus IP address and DNS name are retained in the access control model though their use should be discouraged in new deployments. It is good security practice to set defaults to the most secure settings. This is done to ensure that accidentally omitting a security field does not compromise security. Following this practice in the case of authnLevel would result in a default of "strong". This would have meant that ACI with omitted authnLevel in directories where "strong" authentication is not available (the great majority of environments at this time) would deny all access, causing confusion among users and administrators. To avoid this problem, authnLevel is required on all ACI. This has the useful side-effect of forcing administrators to think about the strength of their authentication system when setting up ACI. All of the advantages of authnLevel-based access control may be lost if system administrators do a poor job of associating actual authentication mechanisms with the authnLevels in the model. Administrators should use external guidelines (for an example, see [AUTHMAP]) if they are not completely familiar with the relative strengths of the authentication mechanisms available in their environment. In addition, administrators in replicated environments should make sure that the authnLevel/authentication mechanism mappings at all replicating sites are consistent. 11. References [ABNF] D. Crocker, P. Overell, "Augmented BNF for Syntax Specifications: ABNF", RFC 2234, November 1997. [ATTACK] R. Shirey, "Internet Security Glossary", RFC 2828, May 2000. Stokes, et al Expires 29 December 2001 [Page 59] Internet-Draft Access Control Model 29 June 2001 [ATTR] M. Wahl, A. Coulbeck, T. Howes, S. Kille, "Lightweight Directory Access Protocol (v3)": Attribute Syntax Definitions, RFC 2252, December 1997. [AUTHMAP] K. Zeilenga, "Authentication Mechanisms Levels", Internet Draft, draft-zeilenga-auth-lvl-01.txt, April 2001. [AuthMeth] M. Wahl, H. Alvestrand, J. Hodges, and R. Morgan, "Authentication Methods for LDAP", RFC 2829, May 2000. [Bradner97] S. Bradner, "Key Words for use in RFCs to Indicate Requirement Levels", RFC 2119. [DirCompMatch] S. Legg, "LDAP & X.500 Component Matching Rules", Internet Draft, draft-legg-ldapext-component-matching-02.txt, May 30, 2001. [ECMA] ECMA, "Security in Open Systems: A Security Framework" ECMA TR/46, July 1988. [IPV6] R. Hinden, S. Deering, "IP Version 6 Addressing Architecture", RFC 2373, July 1998. [LangCode] M. Wahl, T. Howes, "Use of Language Codes in LDAP", RFC 2596, May 1999. [LDAPv3] M. Wahl, T. Howes, S. Kille, "Lightweight Directory Access Protocol (v3)", RFC 2251, December 1997. [REQTS] E. Stokes, R. Byrne, R. Blakley, "Access Control Requirements for LDAP", RFC 2820, May 2000. [SUBENTRY] E. Reed, "LDAP Subentry Schema", Internet Draft, draft-ietf- ldup-subentry-08.txt, April 2001. [UTF] M. Wahl, S. Kille, "Lightweight Directory Access Protocol (v3)": A UTF-8 String Representation of Distinguished Names", RFC 2253, December 1997. [X501] Recommendation X.501 (1993), "Information Technology--Open Systems Interconnection--The Directory: Models". [X511] ITU-T, "Information technology - Open Systems Interconnection - The Directory: Abstract service definition", ITU-T Recommendation X.511 (1993) | ISO/IEC 9594-3:1994. ACKNOWLEDGEMENT This is to acknowledge the numerous companies and individuals who have contributed their valuable help and insights to the development of this Stokes, et al Expires 29 December 2001 [Page 60] Internet-Draft Access Control Model 29 June 2001 specification. AUTHOR(S) ADDRESS Ellen Stokes Bob Blakley Tivoli Systems Tivoli Systems 9442 Capital of Texas Hwy N 9442 Capital of Texas Hwy N Austin, TX 78759 Austin, TX 78759 USA USA mail-to: estokes@tivoli.com mail-to: blakley@tivoli.com phone: +1 512 436 9098 phone: +1 512 436 1564 fax: +1 512 436 1190 fax: +1 512 436 1199 Debbie Rinkevich Robert Byrne Momenta Sun Microsystems --- 14 Chemin du Vieux Chene Austin, TX Meylan ZIRST 38240 USA France mail-to: drinkevich@momenta.com mail-to: robert.byrne@.sun.com phone: +1 512 732 0060 ext 125 phone: +33 (0)4 76 188 205 Rick Huber AT&T Laboratories 200 Laurel Avenue South Middletown, NJ 07748 USA mail-to: rvh@att.com phone: +1 732 420 2632 fax: +1 732 368 1690 Stokes, et al Expires 29 December 2001 [Page 61] Internet-Draft Access Control Model 29 June 2001 Stokes, et al Expires 29 December 2001 [Page 62] CONTENTS 1. Introduction................................................... 2 2. The LDAPv3 Access Control Model................................ 3 3. Access Control Mechanism Attributes............................ 5 3.1 Root DSE Attribute for Access Control Mechanism........... 5 3.2 Subentry Class Access Control Mechanism................... 5 4. The Access Control Information Attributes, Syntax, and Rules.......................................................... 6 4.1 The ABNF and ASN.1........................................ 7 4.1.1 ACI UTF-8 String Representation 7 4.1.2 ACI Binary Representation 10 4.2 The Components of entryACI and subtreeACI Attributes...... 12 4.2.1 Access Rights and Permissions 12 4.2.2 Attributes 16 4.2.3 Subjects and Associated Authentication 16 4.3 Access Control Decision Making............................ 18 4.3.1 The Parameters to the Access Decision Algorithm 18 4.3.2 Applicability Rules 19 4.3.3 Precedence Rules 22 4.3.4 Access Control Decision Algorithm 24 4.3.5 Precedence/Inheritance Access Decision Example 25 5. Required Permissions for each LDAP Operation................... 28 5.1 Bind Operation............................................ 28 5.2 Search Operation.......................................... 28 5.2.1 Protecting the naming attributes of DNs 31 5.3 Modify Operation.......................................... 31 5.4 Add Operation............................................. 32 5.5 Delete Operation.......................................... 33 5.6 Modify DN Operation....................................... 34 5.7 Compare Operation......................................... 35 5.8 Abandon Operation......................................... 35 5.9 Extended Operation........................................ 35 6. Required Permissions for Handling Aliases and References....... 36 6.1 ACI Distribution.......................................... 36 6.2 Aliases................................................... 36 6.3 Referrals................................................. 37 7. Controlling Access to Access Control Information............... 37 8. ACI Examples................................................... 37 8.1 Attribute Definition...................................... 38 8.2 Modifying the entryACI and subtreeACI Values.............. 38 8.3 Evaluation................................................ 40 - i - 8.4 ModDN..................................................... 42 8.5 Interaction Among ACI..................................... 45 8.6 Use of ipAddress in ACI................................... 47 8.7 Use of authnLevel in ACI.................................. 49 9. GetEffectiveRights Control..................................... 50 9.1 Request Control........................................... 51 9.2 Response Control.......................................... 52 9.3 Access control for the Get Effective Rights Control....... 53 9.4 Get Effective Rights example.............................. 54 9.5 Client-Server Interaction................................. 57 10. Security Considerations........................................ 59 11. References..................................................... 59 - ii - Full Copyright Statement Copyright (C) The Internet Society (2000). All Rights Reserved. This document and translations of it may be copied and furnished to others, and derivative works that comment on or otherwise explain it or assist in its implementation may be prepared, copied, published and distributed, in whole or in part, without restriction of any kind, provided that the above copyright notice and this paragraph are included on all such copies and derivative works. However, this document itself may not be modified in any way, such as by removing the copyright notice or references to the Internet Society or other Internet organizations, except as needed for the purpose of developing Internet standards in which case the procedures for copyrights defined in the Internet Standards process must be followed, or as required to translate it into languages other than English. The limited permissions granted above are perpetual and will not be revoked by the Internet Society or its successors or assigns. This document and the information contained herein is provided on an "AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. - iii - --=====================_11243497==_-- From list@netscape.com Fri Jun 29 17:53:43 2001 Received: from netscape.com (c3po.netscape.com [205.217.237.46]) by ietf.org (8.9.1a/8.9.1a) with SMTP id RAA26009 for ; Fri, 29 Jun 2001 17:53:41 -0400 (EDT) Received: from aka.mcom.com (aka.mcom.com [205.217.237.180]) by netscape.com (8.10.0/8.10.0) with ESMTP id f5TLpbY05102; Fri, 29 Jun 2001 14:51:37 -0700 (PDT) Received: (from list@localhost) by aka.mcom.com (8.10.0/8.10.0) id f5TLpbw19779; Fri, 29 Jun 2001 14:51:37 -0700 (PDT) Resent-Date: Fri, 29 Jun 2001 14:51:37 -0700 (PDT) Message-ID: <00007b0f3a5a$000004d8$00004361@mail4.emailisfun.com> To: From: tigger5bl9@emailisfun.com Subject: Highest Rated Online Casino... 17249 Date: Sun, 19 Sep 1999 09:06:29 -0400 MIME-Version: 1.0 Content-Type: text/html; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable X-Priority: 3 X-MSMail-Priority: Normal Reply-To: donajkei@Flashmail.com Resent-Message-ID: <"VHjYdD.A.T0E.ohPP7"@glacier> Resent-From: ietf-ldapext@netscape.com X-Mailing-List: X-Loop: ietf-ldapext@netscape.com Precedence: list Resent-Sender: ietf-ldapext-request@netscape.com Content-Transfer-Encoding: quoted-printable

Come and play at the world's premiere online Casino! We are happy to offer you, in an elegant atmosphere, a $100 BONUS for your first deposit as a New Player.
Sign up now! Don't wait!
We'll automatically credit your account with $1= 00 of extra chips, to wager in our casino.
Don't hesitate and try your luck!
CLICK HERE


We apologize for any email you may have inadvertently received.
Please
CLICK HERE to be remov= ed from future mailings.

From list@netscape.com Fri Jun 29 22:55:20 2001 Received: from netscape.com (c3po.netscape.com [205.217.237.46]) by ietf.org (8.9.1a/8.9.1a) with SMTP id WAA02260 for ; Fri, 29 Jun 2001 22:55:19 -0400 (EDT) Received: from aka.mcom.com (aka.mcom.com [205.217.237.180]) by netscape.com (8.10.0/8.10.0) with ESMTP id f5U2rSY08847; Fri, 29 Jun 2001 19:53:28 -0700 (PDT) Received: (from list@localhost) by aka.mcom.com (8.10.0/8.10.0) id f5U2rSI19873; Fri, 29 Jun 2001 19:53:28 -0700 (PDT) Resent-Date: Fri, 29 Jun 2001 19:53:28 -0700 (PDT) Message-ID: <000030cd320f$00004374$00003296@oemcomputer ([102.74.4.25]) by mtiwmhc08.worldnet.att.net (InterMail v03.02.07.07 118-134) with SMTP id <20000116195506.ZOOK28505@oemcomputer> from worldnet.att.net ([12.77.194.15]) by mtiwmhc03.worldnet.att.net> To: From: alexica10@ensta.fr Subject: Microsoft Excell Running Out of Steam? Date: Fri, 29 Jun 2001 19:14:09 -0700 X-Priority: 3 X-MSMail-Priority: Normal X-Mailer: Mozilla 4.72 [en] (Win98; U) Resent-Message-ID: <"OnZQ0C.A.H2E.m8TP7"@glacier> Resent-From: ietf-ldapext@netscape.com X-Mailing-List: X-Loop: ietf-ldapext@netscape.com Precedence: list Resent-Sender: ietf-ldapext-request@netscape.com Finding that you're running out of steam with Microsoft Excel for managing your business and personal information? Afraid that Microsoft Access will make you feel like a dummy? How about database software that doesn't require programming and doesn't lock you into Microsoft for your data? Get a simple, easy to use solution for all your database projects! A powerful Windows database ideal for database management and rapid application development, one critically acclaimed by leading computer publications including PC Magazine, PC World, InfoWorld, Corporate PC and Computer Shopper. PC World describes the product as being a simple, powerful, and elegant relational database that is easier to use than Microsoft Access. This software comes from a company that has been building database software for over 19 years and has over 1 million satisfied customers. FREE Trial Offer! To receive your free trial send an Email to: Mailto:databasesolution@excite.com?subject=Trial BONUS: 40 FREE Database Applications included! With this database you will easily solve problems like, Billing Invoicing Receivables Medical Records Customer Service Inventory Control Contact Management Non Profit Record Keeping Human Resource Information Church and School Membership Property Management and Maintenance Repair and Maintenance Records Insurance Claims and Records Project Management Referral Systems Point of Sale Scheduling Payables PLUS MUCH MORE!!! To receive your free trial, just click on the link below to send a Email to:databasesolution@excite.com?subject=Trial To be removed from this list send a email to: jonathan0423@bluemail.net?subject=Delete-Me From list@netscape.com Sat Jun 30 17:27:32 2001 Received: from netscape.com (r2d2.netscape.com [205.217.237.47]) by ietf.org (8.9.1a/8.9.1a) with SMTP id RAA25722 for ; Sat, 30 Jun 2001 17:27:31 -0400 (EDT) Received: from aka.mcom.com (aka.mcom.com [205.217.237.180]) by netscape.com (8.10.0/8.10.0) with ESMTP id f5ULPvr21896; Sat, 30 Jun 2001 14:25:57 -0700 (PDT) Received: (from list@localhost) by aka.mcom.com (8.10.0/8.10.0) id f5ULPwo08141; Sat, 30 Jun 2001 14:25:58 -0700 (PDT) Resent-Date: Sat, 30 Jun 2001 14:25:58 -0700 (PDT) Message-ID: <2124320016630195016720@cc484152-b> X-EM-Version: 5, 0, 0, 19 X-EM-Registration: #01B0530810E603002D00 X-Priority: 3 To: "email 9" From: "Fast Cash" Subject: FAST CASH System Date: Sat, 30 Jun 2001 15:50:16 -0400 MIME-Version: 1.0 Content-type: text/plain; charset="US-ASCII" X-MIME-Autoconverted: from quoted-printable to 8bit by aka.mcom.com id f5ULPrv08111 Resent-Message-ID: <"3WYWEC.A.1-B.iPkP7"@glacier> Resent-From: ietf-ldapext@netscape.com X-Mailing-List: X-Loop: ietf-ldapext@netscape.com Precedence: list Resent-Sender: ietf-ldapext-request@netscape.com X-MIME-Autoconverted: from 8bit to quoted-printable by netscape.com id f5ULPvr21896 Content-Transfer-Encoding: 8bit X-MIME-Autoconverted: from quoted-printable to 8bit by ietf.org id RAA25722 Dear friend, Thank you for responding to my mail of how you can turn $10 into a huge pile of money. I have come over many programs of this kind, but here is one which I really think has potential. I have contacted some of the people who have gone through this before, and they were really happy and impressed. (And rich----but I have manners and did not ask too much!) The person who gives it out should try his/her best to help the responders. I will give you a couple of follow-up letters in a while. At first it seems to be complicated, but if you read it twice it should not make any problems for you. It is also very easy to edit. Michael. Now let's begin with the program: ****QUICK EASY CASH WHILE YOU BUILD A MAILING LIST SERVICE ****** Dear Sir/Madam, Hi, Here is your copy of PHASE 1: ****NOTE****Please read this complete e-mail in it's entirety to be sure that you fully understand it. Read it twice, or even three times if you have to. E-mail me with any questions if you still are not sure that you understand it. When you decide to run this program, and follow the instructions in PHASE 2 along with the training manual, you will be highly satisfied with the results. *****This program is quite new and very effective, many people have not had the opportunity to see it yet. PHASE 1 BEGINS*********Prepare to be impressed! This program is the most powerful money generator on the WorldWide Web! No other program comes close when you need money easy and fast, and you are GUARANTEED financial success with this opportunity because of the METHOD USED TO CONFIRM THE HONESTY OF THE PARTICIPANTS. When I first looked at this program, I thought the same thing as everyone else, another "get rich quick scheme". However, it is not. Only a week after joining this program my inbox was overwhelmed with responses, and a few weeks later the money just started rolling in. Now I am making more money than I know what to do with, but I am sure I will find something to enjoy with it. (including paying off several bills!!) THAT IS WHEN I REALIZED THAT I HAD FOUND THE PERFECT FAIL-SAFE CHEAT PROOF OPPORTUNITY. What have you got to lose? Thousands of people are using this program to produce a substantial income quickly on the internet. You will be amazed at how quickly you will be able to KISS THE BOSS GOODBYE! YOU REALLY WILL BE ABLE TO PUT UP TO $40,000 IN YOUR BANK ACCOUNT IN THE NEXT SIX WEEKS WITH THIS SIMPLE PROGRAM! This is a FAIL-SAFE money making program where all CASH RECEIPTS are verifiable in advance... where every participant is held ACCOUNTABLE... where everyone gets paid EXTREMELY WELL and WHERE NOBODY CAN CHEAT!!! I always knew these programs could work, but I have always had two problems with them: 1) There is usually no way of monitoring returns. 2) There is no way of eliminating cheaters. People can add their names to the list without sending any money! THIS PROGRAM RESOLVES BOTH OF THOSE CONCERNS. IT IS 100% TOTALLY CHEAT PROOF AND EVERYONE WILL GET PAID FOR PARTICIPATING I can give you my 100% GUARANTEE by providing an e-mail that enables you to verify that everyone has been paid right up front BEFORE YOU GIVE ANYONE A DIME The total cost to you is just two $5 Bills (US Currency). ****IF YOU WERE TO SPEND $10 ON THE LOTTERY TODAY, your chances of making any money are slim to none!**** Please read this carefully. If you have any questions, I want you to e-mail me at: "panaba47@hotmail.com" Subject: FAST CASH According to US Postal Service Lottery Codes: Title 18, Section 1302 and 1341 state that this service is legal because we are building a mailing list. The postal service has a phone number where you can call and verify this. The number is 1-800-725-2161. This program includes a FAIL-SAFE MECHANISM. It is controlled SO THAT IT IS IMPOSSIBLE FOR ANYONE TO CHEAT. This way NOBODY GETS HURT, AND EVERYONE GETS PAID. Everyone will make the money they deserve for their efforts. It can't be ruined for everyone by somebody cheating. ****NOTE*****IT IS VERY, VERY IMPORTANT THAT YOU FOLLOW THE INSTRUCTIONS PRECISELY AND VERY, VERY CAREFULLY This will ensure that you get the MAXIMUM RETURN. INTERNET MAILING PROGRAM I am sure you have seen similar programs on the internet.....there are a lot of them. This one is DIFFERENT...IT IS THE ONLY ONE THAT IS CHEAT-PROOF. Read on and you will see why. It includes a method of accountability that keeps everyone honest, so that we all get our money, and a VALUABLE MAILING LIST. Too many programs like this one have no FAIL SAFE METHOD of protecting its participants from those who put their names on the list without sending any money, which IS WHAT RUINS it for everyone. With this program it is IMPOSSIBLE FOR THIS TO HAPPEN. That problem has been solved for good. As you read on, you will be required to send $5 (US currency) to just TWO (2) of the people on the list below, with a note asking them to add your name to their mailing list. More about that later----First take the time to SAVE this letter to a file so that you can edit it later, in case you decide to participate. THESE NEXT INSTRUCTIONS ARE VERY, VERY IMPORTANT. PLEASE READ THEM CAREFULLY. Next, e-mail the two people in POSITION #1 and POSITION #2 and ask them if they have received their $5 from ME. THIS IS WHAT ENSURES the SUCCESS of this program. You will not send money to me until you know that I have paid the people in POSITIONS 1 AND 2. POSITION #1 Hans Hvaring Box 2092 N-4394 Sandnes Norway email: folsom53@yahoo.com POSITION #2 Edith de Reus Houtzaagmolen 33 1622HE Hoorn Noordholland Netherlands email: "mailto:edereus@yahoo.com" ***These are the two people I sent my $5 to with a note asking them to add me to their mailing list. AFTER you have checked with them, address an envelope to the person in POSITION #3 (me), put a $5 bill (US Currency), with your name, address, and e-mail address included on the note that reads "Please add my name to your Mailing List” and rush Phase 2 to me by e-mail. ****IMPORTANT NOTE****** Only the person in POSITION #3 supplies Phase 2 NEVER ANY OTHER PERSON!!! POSITION #3 MICHAEL PANEBIANCO 470 Patterson Ave Osprey Fl 34229 Email to: "mailto: panaba47@hotmail.com" Next....address an envelope to the person in POSITION #4, enclose a $5 bill, your name, address, and e-mail address with a note that states "please add me to your mailing list". POSITION #4 DENISE HUBBS 501 Speedway Odessa , NY. 14869 email: "mailto:bhubbs@stny.rr.com" NOW ALL YOU HAVE TO DO IS EDIT YOUR COPY OF THIS LETTER. First, move the person in POSITION #4 to POSITION #2. Be sure all information is copied correctly and completely. (The person originally in position #2 is now dropped from the list!) SECOND, move the person in POSITION #1 to POSITION #4 with all the correct information. THIRD, move the person in POSITION #3 to POSITION #1 with all the correct information. FINALLY, enter YOUR name, complete address, and e-mail address in to POSITION #3. REMEMBER--you only send the $5 to the names in POSITIONS #3 and #4. DO NOT SEND MONEY TO THE NAMES IN POSITION 1 AND 2!! E-mail addresses are very specific, and need to be typed exactly as they are given in all of your correspondence with us. Otherwise it will not work....I REPEAT, it will not work. OKAY, THERE ARE TWO SIMPLE THINGS YOU MUST DO TO MAKE THIS WORK FOR THE MAXIMUM RETURN IN 30-45 DAYS. ****ATTENTION*****THIS IS VERY IMPORTANT 1) In phase 2 you will advertise everywhere you can in the FREE AD areas. I will send you everything you need to advertise such as samples, tips, and LOTS OF LINKS TO FREE CLASSIFIED ADS ON THE NET. If you need help, just ask me. 2) BE PATIENT! **It takes easily a week or so to really get up and going and to start getting lots of replies in your e-mail. BUT IT DOES COME! AND THE MONEY WILL COME ALSO! YOU WILL DEFINITELY MAKE A LARGE SUM OF MONEY WITHIN A FEW WEEKS, and you will also have a mailing list service to use yourself or to sell. THAT IN ITSELF CAN BE WORTH A GREAT DEAL! THIS PROGRAM IS DESIGNED TO MAKE MONEY FAST. It is very INEXPENSIVE to participate in and it is designated totally to be done on-line. There are no postage expenses or name list expenses (other than the two stamps needed to mail your two $5 bills. READ THIS OVER CAREFULLY. In addition to being very inexpensive it brings QUICK RESPONSES! Here is how it works: This program is not what you might think. You will not have to send $5 to five people for a report, a recipe, a disk, or any other product. I WILL SHOW YOU PROOF THAT IT WORKS. First of all, there are only FOUR LEVELS, not five, six, seven, or more like other programs. When you first send this program out you will have 40-50 people who send you $5 to get PHASE 2 REPORT. To account for curiosity seekers and people who never recognize opportunity knocking at their door (not you, of course!), let's say that only 20 people actually pursue this program. They will put your name in the accountability list POSITION #1 , and their respondents will be asking you if they paid you their $5 dollars. Their active participants will then move your name to POSITION #4, WHERE YOU WILL BE RECEIVING $5 from 20 x 20 x 20=8,000 people, TIMES $5. THIS EQUALS $40,000! Because this is done only on the internet it moves very quickly. (this is not snail mail taking forever to see any money) THE ORIGINATOR OF THIS PROGRAM IS STILL MAKING MONEY. Cindy Allen Ran this mailing list summation, and has become FINANCIALLY INDEPENDENT with the proceeds. When the program is continued as it should be, EVERYONE WILL PROFIT. You only need 20 ACTIVE PARTICIPANTS who actually promote this program. To get this amount, you should advertise until twice that number of people (40-50) have sent you the $5 and received PHASE 2 FROM YOU VIA E-MAIL. At this point, YOU CAN RELAX BECAUSE YOU ARE WELL ON YOUR WAY TO RECEIVING BIG MONEY. All you have to do is answer the e-mails saying "yes I have been paid". BE SURE TO KEEP A RECORD OF THOSE THAT HAVE PAID AND BEEN ADDED TO YOUR MAILING LIST FOR FUTURE REFERENCE. You should send this program to people who send you similar programs because you know yours is FASTER AND EASIER. It is SIMPLE and the INVESTMENT is VERY LOW compared to OTHER MLM PROGRAMS.. YOU WILL BE AMAZED WITH THE RESPONSES YOU GET FROM THE WEB. Thanks for reading this far......now here are the simple details. FOLLOW THESE EASY STEPS. 1) save this file as your Phase 1 file where you can edit the changes (names, addresses, e-mail addresses, and position #'s) 2) Mail out a total of $10--($5 each) to the people in POSITION'S 3 AND 4 listed above. 3) Update the names on the list. Place YOUR name, address and e-mail address in POSITION #3 (where mine is now), and wait for PHASE 2 TO ARRIVE IN YOUR e-mail box. PHASE 2 WILL BE SENT THE SAME DAY THAT YOUR MONEY ARRIVES AT MY HOME ADDRESS. In the Phase 2 file you will be given the information of the person that will be placed in POSITION #4 of your version of the PHASE 1 FILE. You will receive more in PHASE 2, which will be on its way to you the same day I receive the $5 from you in my mail. THANK YOU FOR YOUR PARTICIPATION. WE WILL ALL MAKE HUGE PROFITS THANKS TO THIS CHEAT PROOF/FAIL-PROOF PROGRAM Again, here is how your name will move quickly through the system! 1) Your name is at Position #3 in Phase #1 that you will e-mail out to people who will respond to your ad, or e-mail to anyone you have ever had contact with on the internet. We all have received junk-mail, maybe now it is time for the junk mail to pay off. Just keep sending as many e-mails as you possibly can. 2) You will e-mail PHASE 2 out to each person who has sent you $5. On your PHASE 2, you will be instructing your respondents to place your name in POSITION #1 and you will begin receiving inquiries from others asking if you have been paid by so and so. It is important that you keep track of who you have been paid by. At this point you won't be receiving money (other than the $5 you received from each person in phase 1, which will be $200-$250) just inquiries. 3) Those people who have just inquired to you as to whether payment was made to you, will be getting another 20 or more people to participate, and your name will then be IN POSITION #4. This is when you will receive THE BIG MONEY!!! Finally, your name will be in position #2, where you will again be receiving inquiries, and you will be able to answer at this point "YES, I AM $40,000 RICHER. They should immediately participate and make money. ISN'T THIS BUSINESS FANTASTIC? HOW CAN YOU NOT WANT TO PARTICIPATE. WE HAVE FINALLY BEEN ABLE TO CREATE A FOOL PROOF/CHEAT PROOF PROGRAM where everyone has accountability. That is why these programs have not worked in the past, because that one thing was missing. Your small investment of two $5 bills will reward you with $40,000 or more! Once again, please e-mail me if you have any questions. "None of us are able to go back and make a new beginning. All of us are able to start now and make a new ending". Good fortune to all of you. Now, to quickly recap the steps that you need to take: 1) Email the persons in positions #1 and #2 to ensure that both of them have received my $5 payments. AFTER RECEIVING THAT VERIFICATION you: 2) Send $5 to each of the persons in positions #3 and #4 along with your name, address, email and a note asking that you be added to their mailing list. 3) Edit this Phase 1 letter by doing the following: a. Move the person who is in position #4 to position #2. b. Move the person from position #1 to position #4. c. Move the person form position #3 to position #1 d. Insert your name, complete mailing address and email address into position #3. e. Put your name and email at the end of this letter. Looking forward to hearing from you, Michael "mailto:panaba47@hotmail.com" From list@netscape.com Sat Jun 30 17:45:21 2001 Received: from netscape.com (r2d2.netscape.com [205.217.237.47]) by ietf.org (8.9.1a/8.9.1a) with SMTP id RAA25797 for ; Sat, 30 Jun 2001 17:45:21 -0400 (EDT) Received: from aka.mcom.com (aka.mcom.com [205.217.237.180]) by netscape.com (8.10.0/8.10.0) with ESMTP id f5ULi0r22819; Sat, 30 Jun 2001 14:44:00 -0700 (PDT) Received: (from list@localhost) by aka.mcom.com (8.10.0/8.10.0) id f5ULi0c11356; Sat, 30 Jun 2001 14:44:00 -0700 (PDT) Resent-Date: Sat, 30 Jun 2001 14:44:00 -0700 (PDT) Content-Type: text/html; charset="iso-8859-1" Content-Transfer-Encoding: 8BIT To: corn15206@netscape.com Date: Thu, 28 Jun 2001 23:32:39 -0500 From: corn4386@emailisfun.com.netscape.com Message-Id: X-Mailer: Microsoft Outlook Express 5.50.4133.2400 CC: ingrid@netscape.com, hydbazaar@netscape.com, ian@netscape.com, ik@netscape.com, hyama@netscape.com, hyatt@netscape.com, ienvenu@netscape.com, iesrp@netscape.com, ietf-ldapext-request@netscape.com, ietf-ldapext@netscape.com, irene@netscape.com, iqax5@netscape.com, ira@netscape.com, idesignwebcom@netscape.com, ichelobe@netscape.com Subject: Government Grants For You.... Resent-Message-ID: <"3_7lQC.A.5wC.egkP7"@glacier> Resent-From: ietf-ldapext@netscape.com X-Mailing-List: X-Loop: ietf-ldapext@netscape.com Precedence: list Resent-Sender: ietf-ldapext-request@netscape.com Content-Transfer-Encoding: 8BIT

Dear Friend,

FREE CASH GRANTS, NEVER REPAY!

You Can Receive The Money You Need...

To Start Your own Home Business...
College...for you or your family members...
To Start Your Home Business and prosper...
Almost ANY Worthwhile Reason or need...

Every day millions of dollars are given away to people, just like you!!
Your Government spends billions of tax dollars on government grants.
Do you know that private foundations, trust and corporations are
required to give away a portion of theirs assets. It doesn't matter,
where you live, your employment status, or if you are broke, retired
or living on a fixed income. There may be a grant for you!

Who Can Apply?
ANYONE can apply for a Grant from 18 years old and up!
We will Help You!
We will show you HOW & WHERE to get Grants.
This MONEY has to be given away, WHY not to YOU?
Grants from $500.00 to $50,000.00 are possible!
GRANTS don't have to be paid back, EVER!
Grants can be ideal for people who are or were bankrupt or just
have bad credit.

Claim your slice of the FREE American Pie,
Please Visit Our Web-site Below And Place Your Order TODAY!

CLICK HERE

Don't Delay, This Is A Limited Time Offer At This Amazing Low Price!
Get That Grant Now, Before College Rush Time Comes!

We apologize for any email you may have inadvertently received.
Please CLICK HERE to be removed from future mailings.

From list@netscape.com Sat Jun 30 19:04:59 2001 Received: from netscape.com (r2d2.netscape.com [205.217.237.47]) by ietf.org (8.9.1a/8.9.1a) with SMTP id TAA26229 for ; Sat, 30 Jun 2001 19:04:59 -0400 (EDT) Received: from aka.mcom.com (aka.mcom.com [205.217.237.180]) by netscape.com (8.10.0/8.10.0) with ESMTP id f5UN3Xr25976; Sat, 30 Jun 2001 16:03:33 -0700 (PDT) Received: (from list@localhost) by aka.mcom.com (8.10.0/8.10.0) id f5UN3X623455; Sat, 30 Jun 2001 16:03:33 -0700 (PDT) Resent-Date: Sat, 30 Jun 2001 16:03:33 -0700 (PDT) Message-ID: <00001ec00092$00006fca$00004473@mail.cloudyweather.net> To: From: philblunt1@cloudyweather.net Subject: Ultimate Internet Casino!!! 17523 Date: Sat, 30 Jun 2001 18:09:02 -0400 MIME-Version: 1.0 Content-Type: text/html; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable X-Priority: 3 X-MSMail-Priority: Normal Reply-To: jeff3327@runbox.com Resent-Message-ID: <"xRHZ3B.A.4tF.DrlP7"@glacier> Resent-From: ietf-ldapext@netscape.com X-Mailing-List: X-Loop: ietf-ldapext@netscape.com Precedence: list Resent-Sender: ietf-ldapext-request@netscape.com Content-Transfer-Encoding: quoted-printable

Come and play at the world's premiere online Casino! We are happy to offer you, in an elegant atmosphere, a 20% BONUS for your first deposit as a New Player.
Sign up now! Don't wait!
We'll automatically credit your account with a = 20% BONUS of extra chips, to wager in our casino.
Don't hesitate and try your luck!
CLICK HERE<= /a>


We apologize for any email you may have inadvertently received.
Please
CLICK HERE to be remo= ved from future mailings.

From list@netscape.com Sat Jun 30 19:38:24 2001 Received: from netscape.com (c3po.netscape.com [205.217.237.46]) by ietf.org (8.9.1a/8.9.1a) with SMTP id TAA26599 for ; Sat, 30 Jun 2001 19:38:23 -0400 (EDT) Received: from aka.mcom.com (aka.mcom.com [205.217.237.180]) by netscape.com (8.10.0/8.10.0) with ESMTP id f5UNb1Y26563; Sat, 30 Jun 2001 16:37:01 -0700 (PDT) Received: (from list@localhost) by aka.mcom.com (8.10.0/8.10.0) id f5UNb2c28762; Sat, 30 Jun 2001 16:37:02 -0700 (PDT) Resent-Date: Sat, 30 Jun 2001 16:37:02 -0700 (PDT) Message-ID: <000045b43bfe$000036c6$00003fec@mail2.cloudyweather.net> To: From: tigger6003@cloudyweather.net Subject: The Scale Moved!! 16364 Date: Sat, 30 Jun 2001 18:03:32 -0400 MIME-Version: 1.0 Content-Type: text/html; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable X-Priority: 3 X-MSMail-Priority: Normal Reply-To: daan6354@arabia.com Resent-Message-ID: <"nybERB.A.rAH.cKmP7"@glacier> Resent-From: ietf-ldapext@netscape.com X-Mailing-List: X-Loop: ietf-ldapext@netscape.com Precedence: list Resent-Sender: ietf-ldapext-request@netscape.com Content-Transfer-Encoding: quoted-printable THE SCALE MOVED

THE SCALE MOVED!!!

Hello! My name is Tami Evans and I would like to share my experience as an=
inspiration to many who may feel there is no hope.

It=FFFFFF92s amazing how long you can avoid dealing with a problem that yo= u simply
don=FFFFFF92t want to face up to. I managed to ignore my weight problem fo= r the
better part of a decade.

My life was going from the bed to the sofa and from the sofa to the
refrigerator.

Food was my escape, and the weight piled on until I hated the way I looked= .
At my top weight of 282 pounds, I felt worthless, with no desire or energy=
to respond to life. I would look at old pictures, and wonder =FFFFFF97 If = that thin,
sexy, woman, in that short black dress =FFFFFF97 was really me? (My husban= d proposed
to me in that dress 10 years ago) I didn=FFFFFF92t even feel like that hap= py woman
in the picture =FFFFFF96 I was exhausted and so depressed.

My husband, who had been caring for me and our four children (because I wa= s
too big), was genuinely concerned about my physical and mental health. I w= as
tired - very tired, of the struggle to make it through each day.

I have been on every diet you can think of during my lengthy dieting
"career. " Diet Center, NutriSystem, Slim Fast, Atkins Diet, & even Phen-Phen, and the list goes on and on. I would diet for the first few day= s,
then it was only a matter of time until I reached my breaking point and ended up eating vast quantities of the very foods I=FFFFFF92d been denying= myself.
NOTHING worked for me until a dear friend of ours convinced me to try a product that was nutritionally engineered for maximum results. That produc= t
was called BERRY= TRIM PLUS.

After about five days on BERRYTRIM PLUS, I began to experience a sense of
"well being" with increased energy - I didn=FFFFFF92t feel tired, irritabl= e or
sluggish. More Importantly, I didn't feel Hungry - something I hadn't felt=
for months, maybe years.

I've been looking for a weight-loss solution for so long. I thought I had<= br> tried
everything when...

The Scale Moved!! I mean, really Moved! .

I lost 126 pounds in 6 months.
Within 6 months I dropped down to 156 pounds.

Today, I can do many activities that I couldn't when I weighed 282 pounds.=
The most amazing part - how simple and easy it was! My doctor has examined=
me, and my weight loss has blown his mind! People that I used to work with=
and even family members didn't recognize me at Christmas! I truly wish
everyone who is overweight knew about this program ... I plan to tell
everyone I can who has struggled with his or her weight, like I have. I ca= n
feel your pain, believe me!!! You cannot go wrong on the BerryTrim Plus program! It has given me a new lease on life=FFFFFF85 After losing 126 pou= nds so
far, I feel very confident, happy, and even sexy! Oh, and I recently wore<= br> that same black cocktail dress I wore when my husband proposed - 10 years<= br> ago! (I guess that woman in the picture really was me! ) I thought I would=
never look and feel like that again!

BERRYTRIM PLUS is a powerful gift from nature that has touched ev= ery aspect
of my life! And from the bottom of my heart, I will always thank my dear friend Judy for telling me about this wonderful product and giving me back=
the joy of living.
IF I COULD DO IT, YOU CAN DO IT TOO!
I was sick of being fat. I didn=FFFFFF92t like the way I looked and I didn= =FFFFFF92t like
the way I felt. I felt that I owed it to my husband, my four children, and=
myself to make one more attempt at weight loss. If you need to lose a few<= br> pounds, more than 100 pounds, or anything in between, click through this website thoroughly and marvel over what this amazing product has done for = so
many people like you and me!. The proof is in the pudding (so to speak) so=
take a look at the many success stories from others who have gained better=
health, improved their relationships, and of course, lost weight and are keeping it off for good. The testimonials speak for themselves. And if you=
decide this is something you are willing to try =FFFFFF97 GO FOR IT!!!!! Y= ou won't
be sorry.. Do take the time to read them. Many are simply AMAZING!

Click here to read many of the success stories.

CLICK HERE

God Bless,

Tami Evans

 

This message is brought to you by BerryTrim Affiliate# 3b3773c002ce47b
We apologize for any email you may have inadvertently received.
Please CLICK HERE to be remo= ved from future mailings.