💾 Archived View for gemini.bortzmeyer.org › rfc-mirror › rfc1865.txt captured on 2024-07-09 at 00:44:38.

View Raw

More Information

⬅️ Previous capture (2021-11-30)

-=-=-=-=-=-=-







Network Working Group                                          W. Houser
Request for Comments: 1865                     Dept. of Veterans Affairs
Category: Informational                                       J. Griffin
                                                       Athena Associates
                                                                 C. Hage
                                                      C. Hage Associates
                                                            January 1996


                         EDI Meets the Internet

                    Frequently Asked Questions about
           Electronic Data Interchange (EDI) on the Internet

Status of this Memo

   This memo provides information for the Internet community.  This memo
   does not specify an Internet standard of any kind.  Distribution of
   this memo is unlimited.

Abstract

   This memo is targeted towards the EDI community that is unfamiliar
   with the Internet, including EDI software developers, users, and
   service providers.  The memo introduces the Internet and assumes a
   basic knowledge of EDI.

Table of Contents

   1. Introduction ................................................    4
   1.1.  What is this document ....................................    4
   1.2.  What do you mean by electronic data interchange (EDI) ?  .    4
   1.3.  What are the X12 Standards that I should be aware of ?  ..    4
   1.4.  To whom do I send comments and suggestions ? .............    5
   1.5.  How can I get a copy of this document? ...................    5
   2. General Information .........................................    6
   2.1.  What is the Internet ?  ..................................    6
   2.2.  Is there a difference between EDI and
         electronic commerce (EC) ? ...............................    6
   2.3.  What makes the Internet useful for EDI ?  ................    6
   2.4.  Does this means we will now have to coordinate our
         EC/EDI activities with the Internet?  ....................    7
   2.5.  How do I find the addresses of other Trading partners
         on the Internet if I don't have to coordinate my EDI
         activities with a central organization or VAN?  ..........    7
   2.6.  How fast is the Internet?  ...............................    7
   2.7.  What about reliability of the Internet?  .................    7
   2.8.  What are RFCs and where can I get them ?  ................    8



Houser, et al                Informational                      [Page 1]

RFC 1865                 EDI Meets the Internet             January 1996


   2.9.  Where can I get general information about the Internet?  .    8
   3. Getting Connected To The Internet ...........................    9
   3.1.  What do I need to get to use the Internet?  ..............    9
   3.2.  What software is used to support electronic mail?  .......    9
   3.3.  What types of client-server or server-server
         protocols exist on the Internet?  ........................   10
   3.4.  What methods exist to broadcast information across
         the Internet?  ...........................................   12
   3.5.  What are the ways to connect to the Internet ?  ..........   13
   4. Organizational Issues .......................................   15
   4.1.  Why is the way we currently do EDI so limiting to its
         growth?  ..................................................  15
   4.2.  My organization has an internal automated system for
         processing requisitions and issuing purchase orders, but it
         does not create the X12 formatted EDI transactions; what
         should we do ?  ...........................................  16
   4.3.  My organization already has a dial-in bulletin board
         service (BBS) where we post transactions; should we
         keep it? ..................................................  16
   4.4.  My organization currently has a Trading Partner
         Agreement with each trading partner we're currently
         doing business with. Can we keep them ?  ..................  16
   4.5.  It would be nice to get more trading partners and/or
         more competition, but I'm worried about getting too many
         transactions to be able to handle them.  Has this been a
         problem ?  ................................................  17
   4.6.  Does this mean that I'll receive more messages ?  .........  17
   4.7.  If we see a transaction posted on VAN, how do we
         respond in electronic format ?  ...........................  18
   4.8.  My organization has an established bilateral
         relationship (such as an existing contract.  Can we
         send these transactions via the Internet ?  ...............  18
   5. The Role Of Value Added Networks ............................   18
   5.1.  What is a VAN?  ................... .......................  18
   5.2.  What is an Internet Service Provider (ISP)?  ..............  19
   5.3.  How might an ISP be used for EDI?  ........................  19
   5.4.  Doesn't EDI presume the services of companies called
         Value Added Networks (VANs)?  .............................  19
   5.5.  If I can use X12 protocol and my VAN to send
         transactions, what is the benefit of using
         the Internet?  ............................................  20
   5.6.  Can we expect VANs to offer connections to other VANs
         via the Internet?  ........................................  20
   5.7.  How can I use the Internet directly for exchanging EDI
         messages without going through a VAN?  ....................  20
   5.8.  Can the ISA 06 or 08 identify any entity other than the
         'end' Trading Partners (i.e. a routing entity) ?  .........  21




Houser, et al                Informational                      [Page 2]

RFC 1865                 EDI Meets the Internet             January 1996


   5.9.  Can we specify both the recipient's address and their
         VAN address in the ISA ?  ................................   22
   5.10. Are there other options for routing EDI X12
         messages ? ...............................................   22
   6. US Federal Involvement ......................................   22
   6.1.  What is the commitment of the US Federal Government
         to EDI ?  ................................................   22
   6.2.  What is the timetable for the Federal effort ?  ..........   23
   6.3.  Will the US Government use the Internet to send
         EDI transactions ?  ......................................   23
   6.4.  I heard the US Government prohibited commercial use
         of the Internet?  ........................................   24
   6.5.  The US Government is using both Internet and OSI
         E-mail protocols.  What should one consider when
         choosing which to use ?  .................................   24
   6.6.  How is the US Government using VANs to distribute
         business opportunities?  .................................   25
   6.7.  How would use of the Internet for Federal procurement
         change this RFQ process?  ................................   25
   7. EDI Resources On The Internet ...............................   26
   7.1.  Are EDI Standards available on the Internet ?  ...........   26
   7.2.  Are EDIFACT Standards available on the Internet ?  .......   28
   7.3.  The EDI X12 standards are quite complex.  How do we
         decide what X12 transactions to implement and how ?  .....   29
   7.4.  What Implementation Conventions (ICs) are available
         over the Internet ?  .....................................   29
   7.5.  How can a trading partner keep up with all these
         implementation conventions (ICs) and revisions in
         X12 and EDIFACT? .........................................   31
   7.6   Where can I get information on EDI translation
         software ? ...............................................   31
   7.7.  How do I keep in touch with others pursuing EDI and
         Electronic Commerce on the Internet ? ....................   32
   7.8.  Can I get messages that have been previously posted
         to the EDI mailing lists ? ...............................   35
   7.9.  How do I make EDI related material available
         to the Internet community ? ..............................   35
   7.10. Where are EDI Archives on the Internet ? .................   35

   8. Security Considerations .....................................   36
   8.1.  What security measures are needed to connect to the
         Internet ?  ...............................................  36
   8.2.  How do we go about protecting our system ?  ...............  36
   8.3.  Is there good publicly available software I can use?  .....  37
   8.4.  How good are electronic or digital signatures ?
         Can they be used in court ?  ..............................  38
   8.5.  Are there other US government standards publications
         I should be aware of?  ....................................  38



Houser, et al                Informational                      [Page 3]

RFC 1865                 EDI Meets the Internet             January 1996


   9. References ..................................................   39
   10. Credits ....................................................   40
   11. Authors' Addresses .........................................   41

1. Introduction

1.1.  What is this document

   This document is informational in nature and attempts to answer
   frequently asked questions concerning the use of the Internet for
   Electronic Data Interchange (EDI).  The primary audience is the EDI
   community that is unfamiliar with the Internet, including software
   developers, users, and service providers.   The reader needs some
   understanding of EDI.  Informational RFCs are prepared by the
   Internet Engineering Task Force (IETF) to improve understanding and
   effectiveness in the use of the Internet.

1.2.  What do you mean by electronic data interchange (EDI) ?

   Except as noted, the document refers to EDI as the use of the

        1) X12 standard developed by the ANSI Accredited Standards
           Committee X12 or

        2) EDIFACT[1] standard United Nations Economic Commission for
           Europe (UN/ECE), Working Party for the Facilitation of
           International Trade Procedures (WP.4).

   The differences between these standards is beyond the scope of this
   FAQ.  Both standards activities are managed in the US by:

                Data Interchange Standards Association, Inc,
                1800 Diagonal Road, Suite 200
                Alexandria, Virginia, 22314-2852
                Voice: 703-548-7005
                FAX: 703-548-5738

   There are numerous other standards one could use for EDI, but
   discussion of them is not in the scope of this document.

1.3.  What are the X12 Standards that I should be aware of ?

   ACCREDITED STANDARDS COMMITTEE (ASC) X12 Standards are available from
   DISA at the address specified in Question 1.  The following is a good
   starting set of X12 standards.

       1.  ASC X12S/94-172, An Introduction to Electronic
           Data Interchange, DISA 1994 Publications Catalog



Houser, et al                Informational                      [Page 4]

RFC 1865                 EDI Meets the Internet             January 1996


       2.  ASC X12.3 Data Element Dictionary
       3.  ASC X12.5 Interchange Control Structure
       4.  ASC X12.6 Application Control Structure
       5.  ASC X12.22 Segment Directory
       6.  ASC X12.58 Security Structures

1.4.  To whom do I send comments and suggestions ?

   Readers are invited to add questions; please include an answer if you
   know or want to suggest one.  Of course corrections and comments are
   welcome; send them to the IETF-EDI mail list by subscribing as
   described in question 7.6.  Or a send your comment to
   houser.walt@forum.va.gov.

1.5.  How can I get a copy of this document?

   Request for Comments documents (RFC) are available by anonymous FTP.
   Login with the username "anonymous" and a password of your e-mail
   address.  After logging in, type "cd rfc" and then

        "get rfc1865.txt".

   A Web address for the RFC is:

      ftp://ds.internic.net/rfc/rfc1865.txt

   RFC directories are located at:

        o  Africa at:        ftp.is.co.za    (196.4.160.2)
        o  Europe:           nic.nordu.net   (192.36.148.17)
        o  Pacific Rim:      munnari.oz.au   (128.250.1.21)
        o  US East Coast:    ds.internic.net (198.49.45.10)
        o  US West Coast:    ftp.isi.edu     (128.9.0.32)

   RFCs are also available by mail.  Send a message to:
   mailserv@ds.internic.net. In the body type:

        "FILE /rfc/rfc1865.txt"

   NOTE: The mail server at ds.internic.net can return the document in
   MIME-encoded form by using the "mpack" utility.  To use this feature,
   insert the command "ENCODING mime" before the "FILE" command.  To
   decode the response(s), you will need "munpack" or a MIME-compliant
   mail reader.  Different MIME-compliant mail readers exhibit different
   behavior, especially when dealing with "multipart" MIME messages
   (i.e., documents which have been split up into multiple messages), so
   check your local documentation on how to manipulate these messages.




Houser, et al                Informational                      [Page 5]

RFC 1865                 EDI Meets the Internet             January 1996


2. General Information

2.1.  What is the Internet ?

   It is the inter-working of existing corporate and government networks
   using commonly used telecommunications standards.  It is not a new
   physical network, although some new facilities may be needed.
   Rather, it is based on mutual interests of users to communicate more
   effectively via electronic message and file transfers.  Internet
   communications may be interpersonal (person-to-person) E-Mail or
   process-to-process like EDI.  Messages may be inquiries to shared
   databases and responses. Messages may be entire files.

2.2.  Is there a difference between EDI and electronic commerce (EC) ?

   Electronic Data Interchange (EDI) is defined as the inter-process
   (computer application to computer application) communication of
   business information in a standardized electronic form.  Electronic
   Commerce includes EDI, but recognizes the need for inter-personal
   (human to human) communications, the transfer of moneys, and the
   sharing of common data bases as additional activities that aid in the
   efficient conduct of business.  By incorporating a wide range of
   technologies, EC is much broader than EDI.  However, the focus of
   this document in on EDI, not electronic commerce.

2.3.  What makes the Internet useful for EDI ?

   The greatest benefits will derive from:

      o  Adoption of common standards and proven inter-operable systems,

      o  Adoption and deployment of a distributed Directory Service
         capability, so that one can readily contact electronically any
         other organization in the world.

      o  Explicit commitment by participating organizations to
         cooperatively route traffic, work to resolve addresses, and
         meet required standards.

      o  Ubiquitous network coverage from many service providers. This
         allows the customer to choose the level of service needed.

      o  Layering of applications (such as EDI) over existing, proven,
         applications.

      o  A standards process with reference implementations which
         all vendors have equal access.  (a.k.a. a level playing field).




Houser, et al                Informational                      [Page 6]

RFC 1865                 EDI Meets the Internet             January 1996


      o  Widely available public domain software including but not
         limited to applications, protocol/transports and multiple
         platform development tools.

2.4.  Does this means we will now have to coordinate our EC/EDI
      activities with the Internet?

   The Internet is not an organization or government agency.  You use
   the Internet to do business like you would use the telephone.  The
   same Internet connection your organization uses to send electronic
   mail would be the one you use to send EDI transactions.  Software
   developers write EDI translators, packages or templates for your e-
   mail system so that you can handle your own EDI transactions.  Your
   EDI activities do not need to be coordinated, but your connection to
   the Internet does.

2.5.  How do I find the addresses of other Trading partners on the
      Internet if I don't have to coordinate my EDI activities with
      a central organization or VAN?

   The Internet works by assigning names or "domains" to
   networks/companies/machines.  This is called the Domain Name Service
   (DNS). It works from a distributed tree structure.  The Internet
   requires registration of your Internet Protocol (IP) address and
   Domain Name in the Domain Name Service (DNS).  Your internet service
   provider can do this for you or assist you in contacting the right
   people to get your assigned addresses and domain names.

2.6.  How fast is the Internet?

   For a modest amount of data with a dedicated connection, a message
   transmission would occur in a matter of seconds, unless the ISP
   selected one of the trading partners is overloaded.  The maximum
   delay over the internet backbones is at most a few seconds.  Like the
   interstate highway system, speed depends on how close you and your
   trading partner are to Internet backbones.  Unfortunately, some areas
   may lack the capacity or "bandwidth" to handle the workload your
   organization requires.  Contact your local Internet Service Provider
   for details on service in your area.  Also, the more you are willing
   to spend, the better the service.  The Internet is inexpensive, but
   (contrary to popular mythology) it is not free.

2.7.  What about reliability of the Internet?

   For high reliability mission critical applications, redundant ISPs
   may be used (with separate backbones), and redundant mail servers at
   separate locations can be used. A single internet email or server
   address can be used to transparently route to any of the redundant



Houser, et al                Informational                      [Page 7]

RFC 1865                 EDI Meets the Internet             January 1996


   servers or network connections.

   If a dedicated Internet connection is used to transmit information,
   e.g., via SMTP (see questions 3.2 and 3.5), then the message is
   delivered directly to the trading partner's system and delivery is
   assured. If a part time store and forward connection is used, then
   the integrity of the message depends on the ISP or other computers
   used in the forwarding of a message.

2.8.  What are RFCs and where can I get them ?

   RFC stands for Request For Comments.  The RFC series of notes covers
   a broad range of topics related to computer communications.  The core
   topics are the Internet and the TCP/IP protocol suite.  There are
   three categories of RFCs today, Standards Track, Informational, or
   Experimental.  Many of the RFCs describe de-facto standards in the
   Internet Community.  Copies of RFCs are often posted to the USENET
   newsgroup comp.doc and obtainable from archive sites such as
   ds.internic.net.

                        ftp://ds.internic.net/rfc/

2.9.  Where can I get general information about the Internet?

   Your local bookstore probably has one of the many recent introductory
   publications on the Internet.  In addition, look for (or have someone
   get you) the following bibliographies for free:

         RFC 1175
             Bowers, K., LaQuey, T., Reynolds, J., Roubicek, K.,
             Stahl, M., and A. Yuan, "FYI on Where to Start -
             A Bibliography of Internetworking Information",
             08/16/1990 (FYI 3)

                    ftp://ds.internic.net/rfc/rfc1175.txt

         RFC 1463
             Hoffman, E., and L. Jackson, "FYI on Introducing the
             Internet -- A Short Bibliography of Introductory
             Internetworking Readings for the Network Novice",
             05/27/93 (FYI 19)

                    ftp://ds.internic.net/rfc/rfc1463.txt

   The reader may want to look at the Frequently Asked Questions (FAQ)
   document for the newsgroup alt.internet.services.  This FAQ, as well
   as all Usenet FAQs, can be retrieved via ftp from rtfm.mit.edu in the
   directory /pub/usenet/news.answers.  These FAQs are also available



Houser, et al                Informational                      [Page 8]

RFC 1865                 EDI Meets the Internet             January 1996


   from ftp.sterling.com in the directory /usenet/news.answers.

3. Getting Connected To The Internet

3.1.  What do I need to get to use the Internet?

   You need to know your existing telecommunications connectivity,
   address resolution, and routing capabilities.  Then you need to
   establish and operate an Electronic Mail gateway and/or other
   application gateway, e.g., for the file transfer protocol (FTP).
   Larger organizations may supply their trading partners with the
   TCP/IP software and X12 translator interfaced to E-mail or FTP.

3.2.  What software is used to support electronic mail?

   a) Simple Mail Transfer Protocol (SMTP) Servers

      A dedicated internet connection usually uses SMTP software to send
      and receive messages. The SMTP server may transfer messages to the
      "spool" area for incoming email in the file system, may queue the
      messages for transmission via UUCP, may hold mail in a POP server,
      or may transfer the message to a proprietary email system.

   b) Unix-to-Unix Copy (UUCP) Servers

      A UUCP server is used to transfer messages when a store and
      forward is used, either between machines within a WAN, or to
      another machine with a dialup link.

   c) Post Office Protocol (POP) mail Servers

      A POP server holds email which can later be retrieved by a client
      application run by the user, typically on a PC which might not be
      running 24 hours a day.  The TCP/IP protocol is used either over a
      LAN or dialup SLIP connection to retrieve messages.

   d) Mail User Agents (Mail Readers)

      Uses or applications employ client programs to retrieve and
      display email messages from the file system mail spool area, or
      from another server computer using POP or some other proprietary
      protocol (e.g. Microsoft-Mail). This mail user agent (UA) software
      is also used to compose and send email via a POP server or system
      email.

      The mail user agent may also process attached files using a
      proprietary format within a mail message, using one of the common
      de-facto standards, or using the Multipurpose Internet Mail



Houser, et al                Informational                      [Page 9]

RFC 1865                 EDI Meets the Internet             January 1996


      Extensions (MIME) internet standard.  Among other things, MIME
      permits the identification and concatenation of message parts
      (called "body parts") into a single message that can traverse the
      Internet using the SMTP protocol.  The Work in Progress, "EDI in
      MIME"  provides the necessary standards for MIME compliant user
      agents to identify EDI body parts.  A MIME compliant mail reader
      can process the contents of the messages and dispatch data to
      external software. For example, files can be dragged to file
      system directories, images can be displayed, and audio data can be
      played.  In the case of EDI, a message formatted according to the
      MIME-EDI specification could be automatically transferred to an
      EDI processing program.

   e) Automated Mail Processing

      A typical Mail User Agents is an interactive application. However
      there are automated email message processing programs which can
      sort incoming mail, process forms returned by others, or in the
      case of EDI data, transfer the message contents to the EDI system.
      Messages formatted according to the MIME EDI specification can be
      properly recognized by any MIME compliant mail processing program.

3.3.  What types of client-server or server-server protocols exist on
      the Internet?

   Internet email is typically used for two party messaging. The FTP,
   gopher, and HTTP protocols allow many users, possibly anonymous, to
   retrieve data from a central source. For example, corporate catalogs
   can be restricted by potential customers.

   a) File Transfer Protocol (FTP)

      Companies with existing connectivity to the Internet may use FTP
      to transfer files to one-another or to their VAN.  This solution
      employs the same TCP/IP used for SMTP.  Furthermore, Internet
      documents such as EDI in MIME Work in Progress are available via
      FTP on the FTP server "ds.internic.net."

   b) gopher service protocol.

      Gopher service is a way of organizing selected documents and files
      on an Internet server in a simple tree menu, so that users on
      other Internet computers can find them easily.  Most gopher menus
      are also linked to other gopher menus elsewhere, so that users can
      easily jump from one Internet server to another.  There are
      thousands of gopher servers in operation worldwide.





Houser, et al                Informational                     [Page 10]

RFC 1865                 EDI Meets the Internet             January 1996


   c) The Hypertext Transfer Protocol (HTTP)

      HTTP defines http-server and http-clients that comprise the World
      Wide Web (WWW).  WWW was developed by the European Laboratory for
      Particle Physics (CERN) as a tool for exchanging multimedia data
      between researchers.  Although there is also no specification for
      graphics in HTTP, most web browsers are graphical in nature.
      Mosaic, available free from the National Center for Supercomputer
      Applications (NCSA), provides a Graphical User Interface (GUI)
      that facilitates user access to information on the Internet.
      Mosaic interprets hypertext based information on the WWW, as well
      as to other linked Index/Directory services such as Archie, FTP,
      Gopher, and X.500 Directory information.  Mosaic also supports on
      line Graphic Interchange Format (GIF), Joint Photographic Experts
      Group (JPEG), Motion Picture Experts Group (MPEG), QuickTime, and
      other document, image, and audio types.  Vendors have developed
      product catalogues using Mosaic servers.

   d) WHOIS

      WHOIS servers generally offer information about the organization
      to which they belong.  There are many WHOIS servers scattered
      throughout the Internet.  To obtain a list of registered WHOIS
      servers, anonymous FTP to rtfm.mit.edu and get the file
      /pub/whois/whois-servers.list.  You can:

       o   run a client program on your own machine to access the
           WHOIS server,

       o   telnet to a site which hosts the server, eg: telnet to
           whois.internic.net and type help to access the full online
           help

       o   send an email message to retrieve information from the
           database.  eg: send email to mailserv@internic.net with
           a command in the Subject field.  Any information in the
           body part of message will be ignored.  ie.

                Subject:  whois <search string>

           Therefore, to find information on the Internic Registration
           Service, the subject should contain: whois internic

           Moreover, to obtain help information on this service you can
           send two separate email with the following in their subject
           line, respectively:





Houser, et al                Informational                     [Page 11]

RFC 1865                 EDI Meets the Internet             January 1996


                             help
                             whois help

3.4.  What methods exist to broadcast information across the Internet?

   There are also some usual methods to broadcast messages to multiple
   recipients as described below:

   a) Usenet News

      Usenet news is a cooperative broadcast of messages to all
      participants.  Messages are organized into categories called
      newsgroups, and there are over 10,000 newsgroups carried by the
      major ISPs.  Individual customers typically subscribe to some
      subset of these which is of interest to the organization.
      Messages are typically held for a week or two, then either
      archived or discarded.  Some newsgroups are free form, i.e. anyone
      can post a message, while others are "moderated", i.e. require
      approval prior to posting.

      Though not currently used for any type of EDI, Usenet news could
      be used to broadcast RFQs. For example, comp.newprod is used to
      announce new products, and misc.jobs.wanted is used to announce
      job openings.

   b) Mailing Lists

      If the interest is limited, a mailing list may be used in lieu of
      a newsgroup.  These are typically used for discussion groups or
      announcements of a particular nature.  Mailing lists are typically
      open, i.e. anyone can "subscribe" by sending an email message to a
      server. For discussion groups, anyone can send a message to the
      server which is then rebroadcast to all subscribers.  Since
      Internet email is extremely inexpensive, there is normally no
      charge for use of a mailing list, except for the content of
      e-magazines, etc.  Sponsors of an email list typically provide the
      list as a public service.

      For example, a mailing list could be used to broadcast EDI RFQs,
      etc.  Vendors might subscribe to various lists related to their
      product or service in order to receive messages sent by potential
      customers. Mailing lists could be provided by large companies for
      internal use, by industry organizations, or VANs.  For example, a
      firm or government agency could sponsor various mailing lists for
      EDI RFQ's, new product announcements, etc. related to procurement.
      The organization could easily allow other potential customers to
      use the same mailing lists to contact vendors.  All parties would
      benefit, and the improved access to vendors from an open mailing



Houser, et al                Informational                     [Page 12]

RFC 1865                 EDI Meets the Internet             January 1996


      list would more than offset the cost to support the mailing list
      server. Thus service might be available for free.

3.5.  What are the ways to connect to the Internet ?

   The following provides a general overview of connectivity options now
   available:

   a) Dedicated Connection

      Typically a leased telephone line is used to connect a gateway
      computer or Typically a leased telephone line is used to connect a
      gateway computer or bridge/router of a corporate LAN/WAN to the
      router of the Internet Service Provider's (ISP) Point-Of-Presence
      (POP, not to be confused with the Post Office Protocol). The
      connection may be of various types and speeds, e.g.  modem, ISDN,
      DS0, or DS1 line.

      With a dedicated connection, the SMTP protocol is typically used
      to deliver email directly to a trading partners system. Also,
      real-time client server applications can be run directly with a
      trading partners system, including information transferred using
      the FTP and HTTP protocols.

      Some ISPs provide optional services even with dedicated
      connections.  For example, store and forward email on an ISP
      server can be used as a backup for a direct SMTP server operated
      by a trading partner.  The ISP may offer disk space on their FTP
      and HTTP servers with a high speed connection to the Internet.
      For example, a trading partner might use a 14.4Kb modem for
      dedicated email transfers and use a 1.5Mb connection operated by
      the ISP to distribute FTP and HTTP information.

   b) On-demand Connection

      An on-demand connection operates like a dedicated connection,
      except a dialup ISDN or modem connection is used. If the link
      remains idle for a certain period of time, the connection is
      dropped.  Some ISPs offer dial-out capability so any inbound or
      outbound traffic can reestablish the link. However, many ISPs
      require their customers to dial-in, so only outbound traffic and
      regular polling will establish the link. In the latter case, store
      and forward would likely be used for email, and the ISP servers
      would be used for FTP and HTTP information.







Houser, et al                Informational                     [Page 13]

RFC 1865                 EDI Meets the Internet             January 1996


   c) Part-time Polled Connection

      The Unix-to-Unix Copy (UUCP) protocol is typically used for email,
      news, and (rarely) file transfers.  A client organization
      periodically dials the ISP and transfers email and Usenet news for
      the organization, then disconnects.  Typically, the client polls
      the ISP at regular intervals, e.g. every 20 minutes, though some
      ISPs dial out when a message is to be delivered.  Outgoing email
      can be sent immediately, or queued for transmission with a
      specified maximum delay.

      A UUCP connection may be used to transfer messages to an arbitrary
      number of people or automated mail processing programs.  A single
      UUCP connection may also route messages to other systems, e.g.
      divisions within a corporation.  UUCP and store-and-forward are
      synonymous.

      Since UUCP is only used to transfer mail and news messages,
      interactive internet client-server applications like FTP and HTTP
      are not available, except using a server provided by an ISP. Thus
      a separate dialup account might be needed to retrieve information
      from other FTP or HTTP servers. UUCP might be used for automated
      email transfer, and a on-demand dialup connection would be used
      for interactive internet client applications.

      Though UUCP accounts imply a delay (up to the polling interval) in
      processing a message, many ISPs allow a customer supplied script
      to process messages immediately on the ISP's machine.  Though UUCP
      can be used to transfer files directly, usually files are
      transferred by encoding them within an email message.
      Transmission within internet email messages is much more widely
      supported and can be gatewayed into proprietary systems.

   d) Dial-up Shell Account

      With a dial-up account, a single user with a personal computer
      running a terminal emulator connects to the ISP's computer.  Mail
      readers, news readers, HTTP browsers, etc. can be run on the ISP
      machine. Data on the ISP machine can be transferred to the
      personal computer manually using a protocol like X-Modem, Z-Modem,
      or Kermit.

      The ISP's host computer may run one of the usual UNIX command line
      (shell) programs, or may use a custom BBS or other menu driven
      user interface. A proprietary client-server program may be used in
      lieu of a terminal emulator to provide a graphic user interface.
      Some of the proprietary GUI clients provide access to selected
      internet applications, e.g. gopher.



Houser, et al                Informational                     [Page 14]

RFC 1865                 EDI Meets the Internet             January 1996


      A dialup ISP typically has a direct internet connection, however
      very low cost providers might only have a UUCP connection to the
      Internet. Some large proprietary networks such as CompuServe do
      not offer a direct internet connection, and only support UUCP
      email and, sometimes, Usenet news gateways to the Internet.

   d) Personal Serial Line Internet Protocol (SLIP) or Point to Point
      Protocol (PPP) Account

      A SLIP/PPP account is also available as a cross between the on
      demand and dial- up. Like the on-demand account, a single user can
      connect to an ISP and run mail reader, news reader, FTP, HTTP
      browser, etc. client applications directly from a personal
      computer.  Unlike the on-demand account, the dial-out computer
      functions as a client only and not a server, and would be used by
      a single user rather than as a gateway to a LAN.

      With a SLIP/PPP account, the POP (Post-Office-Protocol) protocol
      is used for a user's mail reader client to retrieve messages
      stored in the ISP's server.  Unlike, UUCP, the POP servers hold
      mail for a single user (i.e. individual email address).

      With a SLIP/PPP connection any standard TCP/IP application is tied
      directly into the internet.  Thus unlike the proprietary GUI
      software supplied by the ISP, any TCP/IP client application can be
      used.

      A program such as TIA (The Internet Adapter) can be run on a shell
      account which allows a standard UNIX shell account to function as
      a SLIP/PPP account.  However, some ISPs do not support TIA as they
      charge extra for SLIP.

4. Organizational Issues

4.1.  Why is the way we currently do EDI so limiting to its growth?

   There is a tendency for each organization to establish is own rules
   and administrative policies, leading to rising costs of dealing with
   multiple trading partners, each in turn with its own requirements and
   procedures.  However, new technologies and business practices are
   necessary if EDI is to move beyond the 30 to 40,000 organizations
   presently using EDI.  According to Department of Labor and Internal
   Revenue Service statistics, there are about 6.2 million entities with
   employees and about 14 million other "business" entities.  A business
   that wants to sell chairs, for example, would have to check with many
   different customers to see if they had any requirements.  By making
   it possible for a business to use a common method to look for
   customers, the barriers entering to the electronic marketplace are



Houser, et al                Informational                     [Page 15]

RFC 1865                 EDI Meets the Internet             January 1996


   greatly eased.  This does not mean that there is only one source that
   everyone goes to for a list of current business opportunities.
   Rather, a prospective supplier only needs to go to a single
   electronic marketplace.  To communicate with each other, the various
   participants in electronic commerce need to harmonize their
   procedures and processes.  Examples include common trading partner
   registration and the adoption of standard implementation conventions
   for EDI messages.

4.2.  My organization has an internal automated system for processing
      requisitions and issuing purchase orders, but it does not create
      the X12 formatted EDI transactions; what should we do ?

   You could enhance your existing system, for example, by adding EDI
   translation software.  VANs often offer EDI "translation"
   capabilities that convert flat text files into EDI X12 or EDIFACT
   format.  This translation software may be designed with a particular
   technical solution in mind; carefully consider how the software would
   be used and what applications and telecommunications software would
   need to interact with it.  You don't want to inadvertently lock
   yourself into using only one supplier.

4.3.  My organization already has a dial-in bulletin board service
      (BBS) where we post transactions; should we keep it?

   Yes, but that puts you in the role of being your own VAN.  By acting
   independently, organizations have established their own dial-up
   electronic bulletin board system with their own unique, but
   functionally equivalent, operating rules.  Your BBS will be a little
   different that the next organization's, making it difficult for
   suppliers to access.  By getting transactions from the VANs who
   specialize in moving information, your organization will get the
   widest circulation possible.  You will be able to reach trading
   partners you may not even know existed, resulting in more competitive
   bids.  Because of their idiosyncratic nature, BBS are not consistent
   with the idea of a "single face to industry" espoused by the Federal
   Government.

4.4.  My organization currently has a Trading Partner Agreement
      with each trading partner we're currently doing business with.
      Can we keep them ?

   In the short run you may want to keep some Agreements in place to
   cover unique circumstances.  But be careful not to create conflicting
   agreements and directions for your trading partners.  Follow the
   procedures common to your particular line of business.  In the long
   run, less is better.  Hopefully, the introduction of EDI into common
   commercial practice will eliminate the need for EDI-specific



Houser, et al                Informational                     [Page 16]

RFC 1865                 EDI Meets the Internet             January 1996


   agreements.

4.5.  It would be nice to get more trading partners and/or more
      competition, but I'm worried about getting too many transactions
      to be able to handle them.  Has this been a problem ?

   The answers to this and related questions presupposes a willingness
   to participate in the open bidding process.  While this process is a
   legal requirement for government agencies, many private organizations
   choose not to adopt the practice.  The technology of the Internet
   facilitates competition, but the cost of putting these practices in
   place limit their value.  This is a business decision, not a
   technical one.  Will companies competitively procure critical
   supplies absent a long term relationship with the supplier? For
   essential inputs that will make or break customer satisfaction and
   productivity, the benefits of competition may not be worth the risks.

   Many organizations experience some increase in the number of
   transactions; for competitive procurements, the winning bid should be
   significantly better than those received prior to using the
   electronic system.  The impact of an increase in volume needs to be
   evaluated on a situation by situation basis.  For example, your
   acquisition support system may need to be re-engineered to quickly
   handle bids by ranking and presenting them to your buyers in low to
   high order.  Your new or enhanced system should make it easy to
   receive and reply to any inter-personal messages that are sent and
   linked to a bid (that is, an SMTP/MIME message or the EDI X12.864
   text message transaction set).

4.6.  Does this mean that I'll receive more messages ?

   There is a strong likelihood the number of messages will increase as
   There is a strong likelihood the number of messages will increase as
   you reach more and more trading partners.  After a reasonable trial
   period, your EDI trading partners should be relying on EDI and
   disinclined to use alternative forms of communication that don't fit
   EDI/EC.  Once you use EDI/EC to communicate with a trading partner,
   you should consider discouraging the use of telephone calls or fax
   messages or other non-EDI/EC messages by pointing out the fact that
   telephone or fax messages are processed more slowly.  By using
   electronic messaging, you can establish a written and dated audit
   trail.  Your application system can route the message to the buyer
   and "attach" it to a "case file".  However, if your organization does
   not use automated systems, you will want to adjust your approach to
   dealing with non-EDI messages.






Houser, et al                Informational                     [Page 17]

RFC 1865                 EDI Meets the Internet             January 1996


4.7.  If we see a transaction posted on VAN, how do we respond in
      electronic format ?

   This function is typically handled by applications software, not by
   the Internet.  For example, a vendor that wishes to bid on a
   particular Request For Quotation (RFQ) would prepare a bid (X12-843)
   and send it via their VAN of choice.  The identification information
   in the interchange control header (ISA) and functional group header
   (GS) will be interpreted by your VAN and forwarded to the buyer's VAN
   or to the buyer directly, depending on the reply address.  VANs may
   reject messages from unregistered sources; otherwise they are
   forwarded to (or otherwise made available to) the buyer.  If a buyer
   is using dial-up access to a VAN, then they will have to call-in for
   their messages.

4.8.  My organization has an established bilateral relationship
      (such as an existing contract.  Can we send these transaction
      via the Internet ?

   Yes, the Internet can be used to send transaction sets to existing
   trading partners via SMTP or FTP messages.  VANs were typically used
   for bilateral relationships between companies, whereas the Internet
   is useful for establishing multilateral relationships.  These
   bilateral relationships are usually quite stable, but both parties
   had to agree to share the same VAN or get their VANs to interconnect.
   Multilateral relationships are between organizations that don't
   necessarily have existing relationships and may be rather ephemeral.
   The Internet is suited to dynamic multilateral relationships that may
   later evolve into static bilateral relationships between companies
   using VANs.  Therefore, the issues concerning the Internet (security,
   availability, etc.) are manageable in the early stages of forming a
   relationship.  If your current VAN is not capable of using the
   Internet, you may need an alternative route for those messages.
   Later, as the business relationship matures, the use of VANs may be
   appropriate as the level of communication becomes more important.
   For example, unless your system has a directory of all registered
   trading partners, you lack the capabilities to screen and validate
   transactions that arrive at your site.

5. The Role Of Value Added Networks

5.1.  What is a VAN?

   The use of EDI over the Internet is in the early stages, although the
   technology and services are developing remarkably rapidly.  In the
   past, organizations doing EDI typically have relied on specialized
   firms called Value Added Networks (VANs) for technical assistance.
   Many of these organizations will look to their VAN for assistance in



Houser, et al                Informational                     [Page 18]

RFC 1865                 EDI Meets the Internet             January 1996


   using the Internet.  VANs specializing in EDI applications provide
   technical support, help desk and troubleshooting for EDI and
   telecommunications problems.  They assist in configuration of
   software, upgrades to telecommunications connectivity, data and
   computer security, auditing and tracing of transactions, recovery of
   lost data, service reliability and availability.  Some EDI specific
   services can include broadcasting an RFQ to a collection of vendors,
   or storage of EDI information for later search and retrieval.

5.2.  What is an Internet Service Provider (ISP)?

   VAN services have typically used proprietary network or a network
   gatewayed with a specific set of other proprietary networks.  In
   contrast an Internet Service Provider (ISP) offers generic network
   access (i.e. not specific to EDI) for all computers connected to the
   internet. A direct internet connection permits real time computer-
   computer communication for client-server applications.
   Alternatively, a part time internet connection can be used to access
   internet servers using an on-demand basis, or access another system
   via email which includes a store and forward method.  Internet email
   may be used as a gateway to proprietary networks if the proprietary
   network has an email gateway.

5.3.  How might an ISP be used for EDI?

   Internet email can be configured for a dedicated connection with
   real-time transfers, or a store and forward method (like traditional
   VANs), or a combination of the two, e.g. where a direct delivery to a
   trading partners system is used when a link is operational, and a
   store and forward from an ISP is used as a backup.

   A large organization can connect their network to the Internet at an
   internet exchange point, however, most use a commercial ISP, either a
   major backbone provider, or local resellers of service off one or
   more backbones. The ISP provides technical assistance and access to
   local telecommunications links.

5.4.  Doesn't EDI presume the services of companies called
      Value Added Networks (VANs)?

   EDI only specifies a format for business information; the
   transmission of the information is covered under other standards. A
   real world analog is sending a business form from one company to
   another. The "form" could be sent via US mail, US Registered mail,
   via private carrier (UPS/FEDEX) or simply faxed between the
   companies.  EDI only requires that the trading partners follow the
   content standards.




Houser, et al                Informational                     [Page 19]

RFC 1865                 EDI Meets the Internet             January 1996


5.5.  If I can use X12 protocol and my VAN to send transactions,
      what is the benefit of using the Internet?

   The Internet E-mail standards have hierarchical address spaces that
   are defined and updated in what the Internet calls "domain name
   servers."  Unfortunately, X12 has a flat address space.  So, when you
   send an interchange (not via the Internet) to a partner who is on a
   different VAN, your VAN must do a table look up to figure out what
   VAN the receiving party is on.  If you use only X12 without the
   Internet, before you can send a message to this partner, you must
   first contact the recipient's VAN and have them add you as an entry
   to his VAN's table.  If the ISA contained the VAN ID of the
   recipient, then you could (in theory) send interchanges to partners
   via the VAN interconnects without having to notify the recipient's
   VAN first.  However, this theory needs to be worked out in practice.
   In contrast, thanks to the domain name service, Internet e-mail users
   (and Postal users) don't have to call up their service provider
   before sending a message across an "interconnect" to another service
   provider.

5.6.  Can we expect VANs to offer connections to other VANs via the
      Internet?

   All VANs connected to the Internet are connected to one another, thus
   avoiding most of the problems of interconnecting proprietary
   networks.  VANs can then focus on services to their customers such as
   automatic bid submission, market and business opportunity analysis,
   and translation software.

5.7.  How can I use the Internet directly for exchanging EDI messages
      without going through a VAN?

   You and your trading partner must agree on one of the Internet
   protocols for exchanging messages and then agree upon some details
   with the exchange.

   a) Email based messaging

      The simplest and most widely supported means of exchanging
      messages is via internet email. Typically, the IETF-MIME
      encapsulation specification would be used to enclose the EDI
      data within the email message, and the trading partners would
      need to agree upon an encryption method for secure email,
      typically PEM or PGP (see question 8.4).

      The trading partners would then exchange:
          1. The internet email address for EDI messages
          2. An internet email address for personal communications



Houser, et al                Informational                     [Page 20]

RFC 1865                 EDI Meets the Internet             January 1996


             related to EDI
          3. Agreement on the encryption and digital signature
             protocols, including email acknowledgment, e.g.
             support for the "Return-Receipt-To:" email header,
             or X.400 extended email header fields.
          4. Public Keys for PEM or PGP encryption and digital
             signatures.  (or private keys for DES encryption)
          5. Agreement on the format of the message, e.g. IETF MIME/EDI.

      A convention for naming email addresses might be
      established, e.g. edi@edi.xyzcorp.com for messages,
      ediinfo@xyzcorp.com for an automated response for human readable
      information on establishing internet EDI, and
      edisupport@xyzcorp.com for a personal contact.

   b) FTP based messaging

      To exchange EDI messages via FTP, some setup information must be
      included in the trading partner agreement. Typically, an account
      would be created for each trading partner for a FTP login,
      including a password. Typically, each X12 or EDIFACT message
      would be stored in a file, and the trading partner agreement would
      define the conventions for naming files and directories for
      the messages.

      The trading partner agreement would include:
          1. FTP login name and password
          2. Machine(s) from which the login will be accepted
          3. Additional security protocols, e.g. Kerberos[?]
          4. Directory and file naming conventions
          5. File encryption protocols and keys
          6. Wrappers around EDI data, e.g. MIME/EDI headers,
             PEM/PGP wrappers, etc.

   There are several compression routines and utilities available for
   virtually any computer system that uses the Internet.  Many of these
   utilities will convert across platforms (say UNIX to Mac, UNIX to PC,
   and vise versa) and are available for free from one of several ftp
   archive servers.  Use of these compression routines should be used
   with care when one is employing an encryption technique such as PEM
   or PGP.

5.8.  Can the ISA 06 or 08 identify any entity other than the
      'end' Trading Partners (i.e. a routing entity) ?

   Yes, although the ISA06 and ISA08 elements are supposed to be used to
   identify the sender and receiver of the interchange, the receiver of
   the interchange could be a clearinghouse (as well as a VAN) that



Houser, et al                Informational                     [Page 21]

RFC 1865                 EDI Meets the Internet             January 1996


   processes the interchange and then forwards the data to the ultimate
   recipient.  In this case, you could put the receiver ID of the
   clearinghouse into the ISA08. The clearinghouse would probably have
   to determine the ultimate recipient of the message by looking inside
   the transaction set (or perhaps by using the GS03).  Alternatively,
   you could put the receiver ID of the ultimate recipient into the
   ISA08 and the clearinghouse would route the interchange based on the
   ISA08 value (just as a VAN does).

5.9.  Can we specify both the recipient's address and their VAN
      address in the ISA ?

   There was an X12 DM (data maintenance) request proposed to the X12
   standards committee for a change to the ISA segment (X12 header
   information) that would allow users to specify the recipient's VAN,
   in addition to the recipient's ID.  The intent was to provide a
   hierarchical address in the ISA.  The top level would be the VAN ID,
   and the next level would be the recipient ID.  To date, this DM has
   not been approved.

5.10.  Are there other options for routing EDI X12 messages ?

   Yes, the GS02 and GS03 data elements can be used for a second level
   of routing.  The GS03 is the application receiver's code.  Some EDI
   users use the GS03 for routing a functional group to a particular
   department or application within the receiver's corporation.  For
   example, you could use the ISA08 to identify the receiver as "Acme
   Corporation" and use the GS03 to identify the receiving application
   as the "Purchasing department (within Acme Corporation)".  Many EDI
   users simply put the same value in the ISA06 and the GS02, and put
   the same value in the ISA08 and the GS03.  Interestingly, there are
   VANs that will broadcast a message.  Other VANs will map the value of
   the ISA08 into a distribution list VAN mailbox ids maintained by the
   VAN.  Thus, each recipient receives the exact same copy of the
   interchange and the value of the ISA08 is not changed by the VAN.

6. US Federal Involvement

6.1.  What is the commitment of the US Federal Government to EDI ?

   In the Federal Information Processing Standard (FIPS) 161-1 for
   Electronic Data Interchange[2], the US Government committed to using
   EDI X12 and EDIFACT standards in the exchange of business information
   with trading partners already using EDI.  On October 26, 1993,
   President Clinton signed an Executive memorandum requiring Federal
   agencies to implement the use of electronic commerce in Federal
   purchases as quickly as possible.  As the initial step the
   President's Management Council (PMC) Electronic Commerce Task Force



Houser, et al                Informational                     [Page 22]

RFC 1865                 EDI Meets the Internet             January 1996


   (ECTF), chaired by the Administrator, Office of Federal Procurement
   Policy (OFPP), chartered the Federal Electronic Commerce Acquisition
   Team (ECAT) memorandum.  The PMC gave ECAT the task of defining the
   architecture for the government-wide electronic commerce acquisition
   system and identifying the executive departments or agencies
   responsible for developing, implementing, operating, and maintaining
   the Federal electronic system.

   ECAT has become the Federal Electronic Commerce Program Management
   Office (ECA-PMO).  The National Institute or Science and Technology
   (NIST) maintains an HTML home page for the ECA-PMO:

              http://snad.ncsl.nist.gov/dartg/edi/fededi.html

6.2.  What is the timetable for the Federal effort ?

To implement EC and to achieve his objectives for EC, the President
set forth the following four milestones:

      1)  By March 1994, define the architecture for the
          government-wide EC acquisition system and identify
          executive departments or agencies responsible for
          developing, implementing, operating, and maintaining
          the Federal electronic system.  The ECAT identified
          the architecture and recommend actions that each agency
          should take.  These documents are available via ftp at
          ds.internic.net in the directory /pub/ecat.library.

                 ftp://ds.internic.net/pub/ecat.library/

      2)  By September 1994, establish an initial EC capability
          to enable the Federal government and private suppliers
          to exchange standardized requests for quotations (RFQs),
          quotes, purchase orders, and notice of awards and begin
          government-wide implementation.

      3)  By July 1995, implement a full-scale Federal EC system
          that expands initial capabilities to include electronic
          payments, document interchange, and supporting data bases.

      4)  By January 1997, complete government-wide implementation
          of EC for appropriate Federal purchases, to the maximum
          extent possible.

6.3.  Will the US Government use the Internet to send EDI transactions ?

   According to the ECAT, achieving the following objectives are
   essential for a successful ubiquitous government EDI capability:



Houser, et al                Informational                     [Page 23]

RFC 1865                 EDI Meets the Internet             January 1996


      1)  E-mail systems may be used as the transport medium for EDI
          transactions.

      2)  FTP, FTAM, SMTP, X.400, or X.400 compatible substitutes
          are the preferable transport methods for EDI.

      3)  EDI functionality must be supported such that the user can
          choose between the Internet Protocol Suite (IPS) and Open
          Systems Interconnection (OSI) protocol support.

      4)  Directory services will be provided through the X.500 model
          as services become available.

      5)  Initial implementation of X.400 shall support the user agent
          services defined in P2 and P22 protocols.

      6)  By 1996, the X.400 implementations shall contain the
          services defined in the X.435 specification.

      7)  The Internet network may be used for EDI transactions when
          it is capable of providing the essential reliability,
          security, and privacy needed for business transactions.

6.4.  I heard the US Government prohibited commercial use of the
      Internet?

   The Internet contains many Internet Service Providers (ISPs), each
   with its own internal policies governing the conduct of its
   customers. One of the largest ISPs is the National Science
   Foundation.  At one time, NSF adopted what is called the Acceptable
   Use Policy of the National Science Foundation (NSF) was intended to
   prevent commercial uses of the original NSF-sponsored Internet
   telecommunications backbone.  However, the growing number of
   commercial providers and backbones now part of the Internet have made
   this policy obsolescent.  NSF is currently reducing its direct
   support in favor of subsidies to universities and other NSF sponsored
   organizations. Today the US Government is actively encouraging
   commercial uses of the Internet.

6.5.  The US Government is using both Internet and OSI E-mail
      protocols.  What should one consider when choosing which to use ?

   For more than a decade, Federal policy has been to promote the Open
   Systems Interconnection (OSI) telecommunications protocols developed
   by international standards bodies.  Despite this policy, Government
   agencies, like the private sector, have invested far more in Internet
   than OSI compliant products.  Marshall T. Rose's "The Internet
   Message"[3] compares the two alternative protocol suites and finds



Houser, et al                Informational                     [Page 24]

RFC 1865                 EDI Meets the Internet             January 1996


   clearly in favor of the IPS for messaging in general.  For EDI
   specifically, the advantages of the IPS are its simplicity, wide
   availability, and security provided by Privacy Enhanced Mail (PEM,
   see below).  IPS lacks a number of desirable features and incurs
   something of an efficiency penalty for binary transfers.  On the
   other hand, the OSI standard for messaging handling service (X.400)
   promises a complete solution for EDI; the X.435 protocol includes
   responsibility notifications, X.500 directory support, EDI-specific
   addressing, message store support, message security, and other EDI-
   specific services.  Unfortunately, only a handful of X.435 products
   have actually reached the market, their interoperability is not
   assured, and their prices are substantially greater than for their
   IPS counterparts.  X.400 addressing tends to lock the customer into
   the domain of the service provider, whereas SMTP/MIME addresses are
   independent of the provider, permitting the customer to take his/her
   business elsewhere relatively easily.  The bottom line is that a lot
   more organizations do EDI via the Internet than via OSI.

6.6.  How is the US Government using VANs to distribute business
      opportunities?

   Presently, VANs make EDI request for quotation (RFQ) transactions
   available to their subscribers (along with other services).  For
   example, a VAN client may ask that all RFQs for chairs be forwarded
   immediately to them but the client is not interested in being
   notified about RFQs for paper products.  When a VAN sends an RFQ to a
   specific client mailbox, the VAN modifies the "to address" to that of
   the client.  In this way, a vendor need only subscribe to a VAN that
   is certified to receive and post the RFQs.  The vendor then sees a
   single source for all RFQs of interest, regardless of which buying
   organization originated them.  The screening and filtering process
   performed by the VANs prevents the spread of electronic "junk" mail.
   However, a trading partner could use an email filtering program to
   filter and sort email, saving on VAN charges.

6.7.  How would use of the Internet for Federal procurement change
      this RFQ process?

   Initially, very few changes may be apparent.  New and existing VANs
   will use the Internet to collect and disseminate EDI transactions;
   trading partners may be totally unaware of the change in technology.
   Prices may fall as VANs share telecommunications resources through
   Internet Protocols rather than maintain their own costly proprietary
   telecommunications services.  Instead of competing with VANs, the
   ubiquitous connectivity of the Internet offers VANs even greater
   business opportunities.  General purpose Internet Service Providers
   (ISPs) do not typically offer EDI specific services, but they can
   provide an alternative means to transfer EDI messages at a small



Houser, et al                Informational                     [Page 25]

RFC 1865                 EDI Meets the Internet             January 1996


   fraction of the cost of typical EDI VANs.

   The impact of an organization's moving EDI onto the Internet,
   independent of a VAN, is more difficult to assess.  In the view of
   some, the introduction of the Internet in the near term (1-5 years)
   adds additional interfaces and complexity to the organization's
   existing EDI environment.  This may in the short term increase costs
   and raise new costs.  But a corporate commitment to an open systems
   environment through the use of Internet Protocols offers the
   potential for a greater interoperability, integration of application
   systems, and therefore the promise of higher performance and lower
   costs.  Some organizations will be able to get to these benefits
   others will pay for a set of largely incompatible services.  The
   return on investment largely depends on one's ability to consider EDI
   on the Internet as a part of the organization's overall information
   systems strategy and the organization's plans for a presence on the
   Internet.

7. EDI Resources On The Internet

7.1.  Are EDI Standards available on the Internet ?

   The Data Interchange Standards Association (DISA)  has a World Wide
   Web server at "http://www.disa.org/"  This Web server has
   considerable information, including a list of new standards, a list
   of all the X12 transaction sets, meeting minutes, calendar of events,
   and lists of courses.  Unfortunately, as of this date, the X12
   standards are not available electronically.  [soap ...] Hopefully
   that will be added soon.  [...soap].  DISA has also set up a gopher
   server (gopher.disa.org) and an FTP server (ftp.disa.org).

   The principle documents regarding ANSI ASC X12's planned alignment
   with EDIFACT are available on the World Wide Web.  The alignment plan
   adopted by a mail ballot of X12 in December 1994/January 1995 is at

                   http:/www.disa.org/info/alinplan.html

   The "floor motion" adopted at the X12 meeting in February 1995 is at:

                 http:/www.disa.org/meetings/alinmotn.html

   The following mail lists and exploders support X12 and EDIFACT
   standards development work.








Houser, et al                Informational                     [Page 26]

RFC 1865                 EDI Meets the Internet             January 1996


   ------------------
   X12G Mailing list:
   ------------------

      This is a fully open exploder set up to support X12G.

      To subscribe send an e-mail message to:

                       x12g-request@snad.ncsl.nist.gov

      The text of the message should only contain the following:

                                subscribe x12g

      After you subscribe, you can broadcast your messages to the
      participants (who have subscribed) via the address

                           x12g@snad.ncsl.nist.gov.

   ---------------------
   FED-REG Mailing list:
   ---------------------

      This new exploder is concerned with the federal EDI Registry and
      the implementation of IMPDEF within the registry, the  EDI Viewers
      and Editors, and the use of IMPDEF to upgrade EDI products.  The
      nature of this mailist calls for informal discussion focusing on
      pragmatic issues.

      To subscribe send an e-mail message to:

                      fed-reg-request@snad.ncsl.nist.gov

      The text of the message should only contain the following:

                              subscribe fed-reg

      Messages intended for the fed-reg list should be sent to:

                          fed-reg@snad.ncsl.nist.gov

   -------------------------
   X12C-IMPDEF Mailing list:
   -------------------------

      This exploder deals with formal discussion in the context of X12
      regarding the evolution of IMPDEF. If would expect that
      discussions in the context of the "fed-reg" exploder result in



Houser, et al                Informational                     [Page 27]

RFC 1865                 EDI Meets the Internet             January 1996


      formal DMRs submitted to "x12c-impdef" and X12C.  Anyway, the
      process will be defined and controlled by the appropriate X12C
      authority.

      To subscribe send an e-mail message to:

                    x12c-impdef-request@snad.ncsl.nist.gov

      The text of the message should only contain the following:

                            subscribe x12c-impdef

      Messages intended for the fed-reg list should be sent to:

                        x12c-impdef@snad.ncsl.nist.gov

      See section 7.7 for additional EDI related mailing lists.

7.2.  Are EDIFACT Standards available on the Internet ?

   You can access the EDIFACT standards via GOPHER from the
   International Telecommunications Union (gopher://info.itu.ch).  Here
   are the general directions in getting to the standards.

          1. Launch the gopher client as gopher info.itu.ch
          2. Select entry 11 (UN and international organizations)
          3. Select entry 1 (UN EDITRANS, UN/EDIFACT (EDICORE))
          4. Select entry 3 (UN-EDIFACT Standards Database (EDICORE))
          5. Select entry 1, Publications.

   If you want the actual standards, select 1, Drafts. You will get

           D93A (which becomes the standard S94a)
           D94A (which will be next year's standard).

   If you want the UNTDED, select 2.  If you want the UNTDID, select 3.
   When you get to the lowest level directory in which ever path you
   choose, press D (i.e.  upper case D) to download. Choose the protocol
   that suits and you are the proud owner of an EDIFACT Standards
   Directory.

   For electronic mail retrieval, send your message to itudoc@itu.ch
   with no subject and the following message body:

   START
   GET ITU-1900
   END




Houser, et al                Informational                     [Page 28]

RFC 1865                 EDI Meets the Internet             January 1996


7.3.  The EDI X12 standards are quite complex.  How do we decide what
      X12 transactions to implement and how ?

   There are a number of generic implementation conventions (ICs) or
   guidelines; most ICs are prepared on an industry-by-industry basis.
   Be sure that both you and your current trading partners are working
   from the same set.  The Federal Electronic Commerce for Acquisition
   Program Management Office has been promoting the 3040 version
   throughout the government and the private sector.  Older versions may
   be used in accordance with the ASC X12 rules.  Certain ICs are
   published by the Data Interchange Standards Association (DISA);
   contact DISA at the address above for information about ICs for your
   applications.  Certain ICs as well as the X12 standards may be
   obtained through:

                   Washington Publishing Company
                   c/o EDI Support Services
                   P.O. Box 203
                   Chardon, OH 44024-0203

                   US Phone     (800) 334-4912
                   Non-US Phone (216) 974-7650
                   Fax          (216) 974-7655

7.4.  What Implementation Conventions (ICs) are available over the
      Internet ?

   The US. Federal Implementation Guidelines for Electronic Commerce for
   Acquisition are available for free via FTP at ds.internic.net.  These
   cover X12 transaction sets 810, 820, 824, 836, 838, 840, 843, 850,
   855, 864, and 997.  The path is pub/ecat.library/fed.ic/xxx where xxx
   can be acrobat.pdf, postscript or ascii file formats.

              ftp://ds.internic.net/pub/ecat.library/fed.ic/

   The SPEEDE/ExPRESS Project, funded by the National Center for
   Education Statistics of the U.S. Dept. of Ed., publishes an
   Implementation Guide for X12 transaction sets 130, 131, 146, 147, and
   997.  The July 1994 versions (each in WordPerfect and in Postscript)
   may be retrieved by anonymous FTP at admissions.carleton.ca.  The
   WordPerfect 5.1 files are found in /pub/wp_speede_2 while the
   Postscript files are found in /pub/ps_guide_2.

               ftp://admissions.carleton.ca/pub/wp_speede_2/
                ftp://admissions.carleton.ca/pub/psguide_2/

   Complete directions for retrieving these files can be found in the
   AACRAO gopher at AACRAO-DEC.NCHE.EDU.  Choose the SPEEDE/ ExPRESS



Houser, et al                Informational                     [Page 29]

RFC 1865                 EDI Meets the Internet             January 1996


   menu item, then Publications, and then select a version of the
   Implementation Guide.  Note that guidelines are sometimes referred to
   by the release/version designation (currently 3040).

   The Defense Information Systems Agency (DISA) Center for Standards is
   the designated configuration manager for DoD Electronic
   Commerce/Electronic Data Interchange (EC/EDI) standards.  The DoD
   EC/EDI Standards repository system, available via anonymous FTP from
   ftp.sterling.com in the /edi/DoD-edi/ directory, contains DoD EDI ICs
   separated into two categories, User and Test.

                    ftp://ftp.sterling.com/edi/DoD-edi/

   Test conventions are identical to User, except that the condition
   designator for all applicable transaction sets, data segments and
   data elements used by that convention are designated as Mandatory for
   test purposes.  Implementation convention files, both user and test
   versions, can be downloaded either individually or all together in
   compressed self-extracting files.  All the implementation files are
   available, when decompressed, in both WordPerfect 5.1/5.2 (.WP) file
   format and Standard Exchange Format (SEF) test files which are for
   use with EDISIM software or any other EDI software that conforms with
   the EDISIM .SEF file format.

   The /DoD-edi/2003_User & _Test directories contain draft DoD
   Implementation Conventions based on ANSI X12 Version 2 Release 3
   (2003):

        840  Request for Quotation
        843  Response to Request for Quotation
        850  Purchase Order
        997  Functional Acknowledgement

   The /DoD-edi/3010_User & _Test directories contain draft DoD
   Implementation Conventions based on ANSI X12 Version 3 Release 1
   (3010):

        810  Invoice:
        810  Commercial
        810  Progress Payment
        810  Public Voucher
        840  Request for Quotation
        843  Response to Request for Quotation
        850  Purchase Order
        997  Functional Acknowledgement

   Additional 2003 and 3010 based conventions may be added in the near
   future.  3010 based conventions will never progress to approved



Houser, et al                Informational                     [Page 30]

RFC 1865                 EDI Meets the Internet             January 1996


   status but will be used temporarily by various DoD agencies to
   implement phase I of the DoD Electronic Commerce (EC)/Electronic Data
   Interchange (EDI) in Contracting Report.

   The /DoD-edi/3050_User directory contains draft DoD Implementation
   Conventions based on ANSI X12 Version 3 Release 5 (3050):

        840  Request for Quotation
        843  Response to Request for Quotation
        850  Purchase Order
        855  Purchase Order Acknowledgement
        860  Purchase Order Change Request - Buyer Initiated
        865  Purchase Order Change Acknowledgement/Request - Seller
             Initiated

   Note that the ICs in the /DoD-edi/3050_USER directory were developed
   as a means to express DOD requirements for an ANSI X12 3050 based
   transaction set.  They are not approved for implementation.  They
   have been submitted to the Federal IC configuration management
   process for adoption throughout the federal government.  Since they
   are subject to Federal review and are based upon a standard not yet
   released, changes can be anticipated.  (See ECA PMO above)

7.5  How can a trading partner keep up with all these implementation
     conventions (ICs) and revisions in X12 and EDIFACT?

   The US government is trying to standardize electronic communications
   internally and with it's 300,000 plus suppliers.  This requires
   standardization of the standards process and cross communication
   between programs.  The IMPDEF message and the NIST Federal IC
   Registry will place electronic versions of all its ICs on the
   Registry - both full federal ICs and individual agency ICs - so that
   any trading partner can download and use them.  In combination with
   message data compliance checking as well, smaller firms should be
   able to get into EDI and start benefitting both themselves and the
   government.

7.6.  Where can I get information on EDI translation software ?

   Several commercial trade magazines publish periodic guides to EDI
   translation software.  Under commission by the US Government, the
   Logistics Management Institute (LMI) of McLean, Va. published "A
   Guide to EDI Translation Software, 1994 Edition."  The guide
   describes the features and characteristics of EDI software offered by
   more than 60 vendors.  Commercial organizations can get copies for
   $20 each by sending a check made out to the Logistics Management
   nstitute.  Federal agencies may have up to five free copies by
   sending requests to



Houser, et al                Informational                     [Page 31]

RFC 1865                 EDI Meets the Internet             January 1996


                   Logistics Management Institute
                   Attn. Library
                   2000 Corporate Ridge
                   McLean, Virginia, 22102-7805

   You can fax a typed request to the LMI library at (703) 917-7597 or
   send a request to library@lmi.org.  Requests for hard copies of the
   Guide must include the requester's name, organization, address,
   telephone number, and number of copies desired.  All requests should
   cite Report IR421RD1.  If you have questions about the Guide, you can
   contact the author, Harold Frohman, at (703) 917-7286 or send him an
   Internet message at hfrohman@lmi.org.   A somewhat older LMI report
   (1992), but still quite relevant, is EDI Planning and Implementation
   Guide (DL204RD1, August 1992).

7.7.  How do I keep in touch with others pursuing EDI and Electronic
      Commerce on the Internet ?

   There are several EDI related mailing lists on (and off) the
   Internet.  Information on subscription follows below.

   ----------------------
   IETF-EDI Mailing list:
   ----------------------

      The IETF-EDI list has been established as a forum for discussing
      methods of operating EDI transactions over the Internet, and for
      discussing specifications which permit such operation.  This list
      is therefore focused on the technology of Internet usage of EDI,
      rather than on more general aspects of EDI technology or use.

      To subscribe, send an e-mail message to:

                             LISTSERV@BYU.EDU.

      The text of the message should only contain the following:

                           sub ietf-edi <your-name>

      Messages intended for the ietf-edi list should be sent to:

                              IETF-EDI@BYU.EDU.









Houser, et al                Informational                     [Page 32]

RFC 1865                 EDI Meets the Internet             January 1996


   -------------------
   EDI-L Mailing list:
   -------------------

      The EDI-L list is target towards more general EDI discussions.
      The edi-l mailing list is also gatewayed to the USENET newsgroup
      bit.listserv.edi-l.

      To subscribe, send an e-mail message to:

                           listserv@uccvma.ucop.edu


      The text of the message should only contain the following:

                         subscribe edi-l <your-name>

      Messages intended for the edi-l list should be sent to:

                            EDI-l@uccvma.ucop.edu


   ---------------------
   EDI-NEW Mailing list:
   ---------------------

      This list complements ietf-edi in the sense that it promotes
      discussion of new approaches to edi and the extension of edi
      beyond its traditional domains.

      To subscribe, send an e-mail message to:

                      edi-new-request@tegsun.harvard.edu

      The text of the message should only contain the following:

                        subscribe edi-new <your-name>

      Messages intended for the edi-new list should be sent to:

                          edi-new@tegsun.harvard.edu










Houser, et al                Informational                     [Page 33]

RFC 1865                 EDI Meets the Internet             January 1996


   ----------------------
   SPEEDE-L Mailing list:
   ----------------------

      The main purpose of this list is for discussions of Educational
      EDI Standards.

      To subscribe, send an e-mail message to:

                           listserv@vtvm1.cc.vt.edu

      The text of the message should only contain the following:

                    SUBSCRIBE SPEEDE-L firstname lastname

      Messages intended for the speede-l list should be sent to:

                           speede-l@vtvm1.cc.vt.edu

   ----------------------
   OPEN-EDI Mailing list:
   ----------------------

      The main purpose of this list is for UN/EDIFACT users to review
      the work of JTC1/SC30.

      To subscribe, send an e-mail message to:

                          majordomo@utu.premenos.com

      The text of the message should only contain the following:

                              subscribe open-edi

      Messages intended for the open-edi list should be sent to:

                          OPEN-EDI@utu.premenos.com


   ------------------
   ECAT Mailing list:
   ------------------

      The Federal Electronic Commerce for Acquisition Team (ECAT) has
      established an open mail list for those interested in ECAT
      activities.





Houser, et al                Informational                     [Page 34]

RFC 1865                 EDI Meets the Internet             January 1996


      Information sent to the forum address is automatically distributed
      to all forum members. This forum is available 24 hours a day, 7
      days a week. Currently, only ASCII text messages up to 250kb are
      supported.  For best results when sending messages to this forum,
      each line should be limited 70 characters followed by a carriage
      return.  Also, your name and email address should be included in
      the body of messages sent.

      To subscribe, send an e-mail message to:

                           listserv@forums.fed.gov

      The text of the message should only contain the following:

                      subscribe ecat firstname lastname

      Messages intended for the ECAT list should be sent to:

                             ECAT@forums.fed.gov.

7.8.  Can I get messages that have been previously posted to the EDI
      mailing lists ?

   Yes.  Messages that have appeared on the ecat, edi-l, edi-new, fed-
   reg, x12c-impdef and ietf-edi list are available via FTP from

                     ftp://ftp.sterling.com/edi/lists/

7.9.  I have EDI related material I'd like to make available to the
      Internet community.  How do I do that ?

   If you have an existing Internet connected site, you can make the
   information available via FTP or WWW.  If you do not wish to go to
   the effort, send mail to Kent Landfield at

                         edi-archive@sterling.com

   Sterling Software is making the archive publicly available to the
   community.  Anyone who wants to distribute EDI related documents may
   contact Sterling to make your documents publicly available on
   ftp.sterling.com.  For example, the Department of Veterans Affairs
   has posted numerous studies and training materials on EDI which are
   available to the public at ftp.sterling.com/edi/va/.

7.10.  Where are EDI Archives on the Internet ?

   Some have been discussed previously while others have not.  Here is a
   very incomplete list of sites that archive EDI related material and



Houser, et al                Informational                     [Page 35]

RFC 1865                 EDI Meets the Internet             January 1996


   make that information publicly available.

          o  ftp://admissions.carleton.ca/pub/
          o  ftp://ds.internic.net/ietf/edi/
          o  ftp://ds.internic.net/pub/ecat.library/
          o  ftp://ftp.sterling.com/edi/
          o  ftp://ftp.swin.edu.au/pub/edi/
          o  ftp://prospero.isi.edu/pub/papers/security/
          o  ftp://turiel.cs.mu.oz.au/pub/edi/

          o  http://snad.ncsl.nist.gov/dartg/edi/fededi.html
          o  http://waltz.ncsl.nist.gov/ECIF/ecif.html
          o  http://www.disa.org/
          o  http://www.acq.osd.mil/ec/
          o  http://www.ietf.cnri.reston.va.us/
          o  http://www.premenos.com/standards/EDIStandards.html

8. Security Considerations

8.1.  What security measures are needed to connect to the Internet ?

   Internet security measures can be placed in two broad categories:
   protecting your system from intruders and protecting the content and
   integrity of your messages.  With respect to the latter, EC/EDI
   transactions of nominal value and sensitivity do not require special
   security requirements.  However, if the information has any sensitive
   aspects, you will need to take measures discussed below.  Competitors
   might intercept your bids and undercut your proposal.  Or they could
   monitor your purchases and shipping notices to determine your firm's
   production capacity.  To ensure confidentiality of the message, your
   e-mail system should offer some means of encrypting the message in a
   manner only the intended recipient can read.  Trading partners are
   responsible for satisfying existing rules and regulations relating to
   computer security and privacy.  For example, bid data received by
   government systems is subject to the appropriate controls.  Trading
   partner financial account data is likewise subject to disclosure
   restrictions.  To thwart those who might tamper with a message to
   divert delivery by changing the "ship-to" address, digital signatures
   can attest to the integrity of the message.  Digital signatures can
   also authenticate messages, preventing pranksters or rivals from
   submitting false orders.

8.2.  How do we go about protecting our system ?

   The weakest link in most systems are people and passwords; your
   current practices for managing both will apply to use of the
   Internet.  Steps you can take include:




Houser, et al                Informational                     [Page 36]

RFC 1865                 EDI Meets the Internet             January 1996


      o  Obtain, study, implement, and enforce the NIST FIPS (112) on
         passwords.  Make the practice of safe computing a condition of
         continued employment and let your staff know it.

      o  Conduct a risk assessment as described in Appendix M of the
         Federal Electronic Commerce for Acquisition Team report
         Streamlining Procurement Through Electronic Commerce.  This
         documents is available via ftp at ds.internic.net in the
         directory /pub/ecat.library.

      o  Apply the recommendations from NIST Special Publication 800-9,
         Good Security Practices for Electronic Commerce, Including
         Electronic Data Interchange as appropriate.

      o  Establish necessary internal and external "Firewalls."  See
         John Wack and Lisa Carnahan, "Keeping Your Site Comfortably
         Secure: An Introduction to Internet Firewalls," NIST Special
         Publication 800-10, undated.

      o  Review RFC 1281[4] Guidelines for the Secure Operation of
         the Internet and RFC 1244 Holbrook and Reynolds "Site Security
         Handbook"

      o  Review Cheswick and Bellovin's "Firewalls and Internet
         Security - Repelling the Wily Hacker," Addison-Wesley [5]

      o  Consider implementing active countermeasures in your firewalls.
         See "There Be Dragons" by S. Bellovin, Proceedings of the Third
         Usenix UNIX Security Symposium, September 1992[6].  You can
         contact Bellovin at smb@ulysses.att.com.

8.3.  Is there good publicly available software I can use?

   These are several free, publicly available, security tools one can
   obtain via ftp from one of many good archives.  If your company uses
   UNIX systems to connect to the Internet or has UNIX systems connected
   to the Internet get and use the following tools:

     1.  The Purdue University COAST - Security Archive (Computer
         Operations, Audit, and Security Tools, run by Gene Spafford)
         is located at coast.cs.purdue.edu and mirrored in a few places,
         including ftp.sterling.com.
     2.  COPS available from ftp.cert.org in /pub/tools
     3.  TIGER available from net.tamu.edu in pub/

   These tools are a series of scripts and programs that will alert you
   to many well-know problems and holes in UNIX systems and how to fix
   them.



Houser, et al                Informational                     [Page 37]

RFC 1865                 EDI Meets the Internet             January 1996


   The Computer Emergency Response Team (CERT) at Carnegie Mellon
   University can assist with computer break-ins as well as provide
   notices of security activity on the Internet.  The US Department of
   Energy's Computer Incident Advisory Capability (CIAC), located at
   Lawrence Livermore National Laboratory, can provide assistance at
   ciac@llnl.gov or at 510-422-8193.  CIAC offers software and documents
   on their anonymous ftp server at ciac.llnl.gov.  Both CERT and CIAC
   are members of the Forum of Incident Response and Security Teams
   (FIRST), a global organization to foster cooperation and coordination
   among computer security teams worldwide.

8.4.  How good are electronic or digital signatures ? Can they be used
      in court ?

   Properly used, these signature systems are better than existing paper
   based authentication and forgery detection technology.  You will find
   a clear and concise description of how these signatures work in Gary
   Ratterree's RIPEM Beginner's Guide; contact Ratterree at
   grayr@cs.tamu.edu.   Other references include:

                ftp://ftp.tis.com/pub/PEM/    for Privacy Enhanced Mail
                ftp://ftp.rsa.com/            for PEM
                ftp net-dist.mit.edu:/pub/PGP for Pretty Good Privacy
                                              (PGP)

   An "infrastructure" for public keys is not required to use public key
   encryption or digital signatures. In the absence of such an
   infrastructure, the encryption protocol and the public keys would
   need to be exchanged bilaterally, such as part of the trading partner
   agreement.  A public key infrastructure would provide a secure means
   to obtain a public key without a need for a manual key exchange.

   But digital techniques will become more convenient with the arrival
   of additional infrastructure and support systems.  The US government
   is taking steps to ensure the admissibility in court of such systems.
   We anticipate that the necessary regulatory and legal infrastructure
   will be in place about the same time as the necessary directory and
   certificate services and other supporting systems come on-line.  We
   expect to see expansion of several government pilot programs in the
   later half of 1994.  NIST recently published a report on the Public
   Key Infrastructure (PKI) and related policy issues; for information
   contact the NIST Computer Security Division at 301-975-2934.

8.5.  Are there other US government standards publications I should
      be aware of?

   Yes.  Here is a sample of those you will often hear mentioned.




Houser, et al                Informational                     [Page 38]

RFC 1865                 EDI Meets the Internet             January 1996


      1. Federal Information Processing Standard (FIPS) Publication
         46-1, Data Encryption Standard, January 1988.

      2. FIPS Publication 65, Guideline for Automated Data Processing
         Risk Analysis, August 1979.

      3. FIPS Publication 113, Computer Data Authentication, May 1985.

      4. FIPS Publication 180, Secure Hash Standard - (SHS), May 1993.

      5. FIPS Publication 186,  Digital Signature Standard - (DSS),
         May 1994.

      6. NIST Special Publication 800-9, Good Security Practices for
         Electronic Commerce Including Electronic Data Interchange,
         December 1993.

   The FIPS standards may be ordered from the

              U.S. Department of Commerce
              National Technical Information Service
              Springfield, VA 22161.

9. References

   [1] UN/EDIFACT (Electronic Data Interchange for Administration,
       Commerce and Transport) Syntax Rules (ISO 9735), March 1993,
       United Nations Economic Commission for Europe (UN/ECE), Working
       Party for the Facilitation of International Trade Procedures
       (WP.4)

   [2] FIPS Publication 161-1, Electronic Data Interchange (EDI),
       National Institute of Standards and Technology, April 1993.

   [3] The Internet Message: Closing the book with electronic mail,
       Marshal T. Rose., Prentice Hall, Englewood Cliffs, New Jersey,
       1993.

   [4] Pethia, R., Crocker, S., and B. Fraser, "Guidelines for the
       Secure Operation of the Internet", RFC 1281, Software
       Engineering Institute, Trusted Information Systems, Inc.,
       Software Engineering Institute, November 1991

   [5] Firewalls and Internet Security - Repelling the Wily Hacker,
       by Cheswick and Bellovin, Addison-Wesley, 1994,
       ISBN 0-201-63357-4





Houser, et al                Informational                     [Page 39]

RFC 1865                 EDI Meets the Internet             January 1996


   [6] There Be Dragons, S. Bellovin, Proceedings of the Third
       Usenix UNIX Security Symposium, Baltimore, Maryland, September
       1992.  USENIX Association, ISBN 1-880446-46-4

10. Credits

   James A.(Artch) Griffin <artch@AGRIFFIN.CPCUG.ORG> is credited with
   co-authorship as he prepared the ECAT FAQ which I used (or perhaps
   abused) as the base document.  Artch was judicious and patient as he
   watched his original text being rewritten over and over.

   Carl Hage contributed detailed explanations and clarifications of the
   various Internet protocols and services and how EDI can employ them.

   I would like to thank the following people for their comments and
   specific contributions: Kent Landfield, Mike Bauer, Kit Lueder, Eric
   Christ, Betsy Bainbridge, Bob Lyons, Kirby Spencer, Sally Hambridge,
   Ed Levinson, Warren Smith, Steve Bass, Jerry Johnson, Randy
   VandenBrink, John Pillay, Jim W.C.  Smith, Mark Charles, Jean-
   Philippe Favreau.  I apologize if I omitted any one of the many folks
   who responded to my many calls for comments.

   I greatly appreciate Kent Landfield for his editorial assistance
   during final preparation of this document.  Sterling Software
   graciously hosted the work in progress for ftp access and review,
   saving many bits of Internet SMTP traffic.

   Finally, I am grateful for the patient cooperation of the IETF
   Working Group and the participants of the IETF-EDI and EDI-L lists.
   It's a nice cyberplace to work!

      WRH, Washington, DC.



















Houser, et al                Informational                     [Page 40]

RFC 1865                 EDI Meets the Internet             January 1996


11. Authors' Addresses

   Walter Houser
   Department of Veterans Affairs
   810 Vermont Avenue
   Washington DC, 20240

   Phone: 202-786-9572
   EMail: houser.walt@forum.va.gov
          houser@cpcug.org
   http://www.va.gov/


   James A. (Artch) Griffin
   President, Athena Associates
   18924 High Point Drive
   Gaithersburg, Maryland 20879

   Phone: 301-972-2502
   EMail: agriffin@cpcug.org


   Carl Hage
   C. Hage Associates
   1180 Reed Ave #51
   Sunnyvale, CA 94086

   EMail: carl@chage.com
   http://www.chage.com/chage/






















Houser, et al                Informational                     [Page 41]