亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? draft-ietf-pkix-certstore-http-03.txt

?? PKIX的RFC英文文檔
?? TXT
?? 第 1 頁 / 共 2 頁
字號:
Internet Draft                                       Editor: Peter Gutmanndraft-ietf-pkix-certstore-http-03.txt                University of AucklandDecember 2002Expires June 2003                Internet X.509 Public Key Infrastructure       Operational Protocols: Certificate Store Access via HTTPStatus of this memoThis document is an Internet-Draft and is in full conformance with allprovisions of Section 10 of RFC2026.  Internet-Drafts are working documents ofthe Internet Engineering Task Force (IETF), its areas, and its working groups.Note that other groups may also distribute working documents as Internet-Drafts.Internet-Drafts are draft documents valid for a maximum of six months and maybe updated, replaced, or obsoleted by other documents at any time.  It isinappropriate to use Internet-Drafts as reference material or to cite themother than as "work in progress."The list of current Internet-Drafts can be accessed athttp://www.ietf.org/ietf/1id-abstracts.txtThe list of Internet-Draft Shadow Directories can be accessed athttp://www.ietf.org/shadow.html.AbstractThe protocol conventions described in this document satisfy some of theoperational requirements of the Internet Public Key Infrastructure (PKI). Thisdocument specifies the conventions for using the Hypertext Transfer Protocol(HTTP/HTTPS) as an interface mechanism to obtain certificates and certificaterevocation lists (CRLs) from PKI repositories.  Additional mechanismsaddressing PKIX operational requirements are specified in separate documents.1. IntroductionThis specification is part of a multi-part standard for the Internet PublicKey Infrastructure (PKI) using X.509 certificates and certificate revocationlists (CRLs).  This document specifies the conventions for using the HypertextTransfer Protocol (HTTP) or optionally HTTPS (throughout the remainder of thisdocument the generic term HTTP will be used to cover either option) as aninterface mechanism to obtain certificates and certificate revocation lists(CRLs) from PKI repositories.Although RFC 2585 [RFC2585] covers fetching certificates via HTTP, this merelymentions that certificates may be fetched from a static URL, which doesn'tprovide any general-purpose interface capabilities to a certificate store.The conventions described in this document allows HTTP to be used as ageneral- purpose, transparent interface to any type of certificate storeranging from flat files through to standard databases such as Berkeley DB andrelational databases, as well as traditional X.500/LDAP directories.  Typicalapplications would include use with web-enabled relational databases (whichmost current databases are) or simple key/data lookup mechanisms such asBerkeley DB and its various descendants.Additional mechanisms addressing PKIX operational requirements are specifiedin separate documents.The key words "MUST", "MUST NOT", "REQUIRED", "SHOULD", "SHOULD NOT","RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted asdescribed in [RFC2119].This draft is being discussed on the "ietf-pkix" mailing list.  To join thelist, send a message to <ietf-pkix-request@imc.org> with the single word"subscribe" in the body of the message.  Also, there is a Web site for themailing list at <http://www.imc.org/ietf-pkix>.2. HTTP Certificate Store InterfaceThe GET method is used in combination with a query URI to retrievecertificates from the underlying certificate store [RFC2068].  The parametersfor the query URI are a certificate identifier consisting of an attribute typeand a value that specifies one or more certificates to be returned from thequery.  The query URI may be specified in a certificate SubjectInfoaccess orAuthorityInfoAccess extension or configured at the client (see section 3).Permitted attribute types and associated values are described below.Arbitrary-length binary values (indicated in the table below) are convertedinto a search key by the process described in section 2.1.  Note that thevalues are checked for an exact match, and are therefore case-sensitive.Attribute  Binary  Value---------  ------  -----certHash     Y     Search key derived from the SHA-1 hash of the                   certificate (sometimes called the certificate                   fingerprint).email        N     Subject email address contained in the certificate,                   typically as an rfc882Name attribute.iHash        Y     Search key derived from the issuer DN as it                   appears in the certificate, CRL, or other object.iAndSHash    Y     Search key derived from the certificate's                   issuerAndSerialNumber [RFC2630].name         N     Subject CommonName contained in the certificate.sHash        Y     Search key derived from the subject DN as it                   appears in the certificate or other object.sKIDHash     Y     Search key derived from the certificate's                   subjectKeyIdentifier.The full URI is formed by concatenating the query URI and the attribute andvalue.  Certificates are retrieved from one query URI (the certificate URI)and CRLs from another query URI (the CRL URI).  These may or may notcorrespond to the same certificate store and/or server (the exactinterpretation is a local configuration issue).  The form of the complete URIis therefore:  <query URI> '?' <attribute> '=' <value>The query value MUST be encoded using the form-urlencoded media type[RFC1866].Certificate URIs MUST support retrieval by all of the above attribute types.CRL URIs MUST support retrival by the iHash and sKID attribute types, whichidentify the issuer of the CRL.If more than one certificate matches a query, it MUST be returned as amultipart/mixed response.Responses to unsuccessful queries (for example to indicate a non-match or anerror conditions) are handled in the standard manner as per [RFC2068].Clients should in particular be aware that in some instances servers mayreturn HTTP type 3xx redirection requests to explicitly redirect queries toanother server.  Obviously, implicit DNS-based redirection is also possible.Other information such as naming conventions and MIME types are specified in[RFC2585].2.1 Convering Binary Blobs into Search KeysThe fields marked as binary data in the table in section 2 are of arbitrarylength and contain non-textual data.  Both of these properties make themunsuited for direct use in HTTP queries.  In order to make them usable, theyare first hashed down to a fixed-length 160-bit value and then base64-encoded:  Step 1: Hash the key value using SHA-1 to produce a 160-bit value  Step 2: Encode the hash value using base64-encoding to produce a          27-byte text-only valueCertificate stores should verify that the base64-encoded values submitted inrequests contain only characters in the range 'a'-'z', 'A'-'Z', '0'-'9', '/',and '.'.  Queries containing any other character MUST be rejected (see theimplementation notes in section 2.2 and the security considerations in section4 for more details on this requirement).2.2 Implementation NotesAlthough clients will always submit a fixed 160-bit value, servers are free toutilise as many bits of this value as they require, for example a server maychoose to use only the first 40 or 64 or 80 or 128 bits for efficiency insearching and maintaining indices.The base64-encoded form of the identifier should be carefully checked forinvalid characters since allowing raw data through presents a security risk.Consider for example a certificate store implemented using an RDBMS in whichthe SQL query is built up as "SELECT certificate FROM certificates WHERE iHash= " + <search key>.  If <search key> is set to "ABCD;DELETE FROM certificates"the results of the query will be quite different from what was expected by thecertificate store administrators.  For this reason only valid base64 encodingsshould be allowed.  The same checking applies to queries by name or emailaddress.Various network efficiency considerations need to be taken into account whenimplementing this certificate distribution mechanism.  For example, asimplistic implementation that performs two writes (the HTTP header and thecertificate written seperately) followed by a read will interact badly withTCP delayed-ACK and slow-start.  The reason for this is that the TCP MSS istypically 1460 bytes on a LAN (Ethernet) or 512/536 bytes on a WAN, while HTTPheaders are ~200-300 bytes, far less than the MSS.  When an HTTP message isfirst sent, the TCP congestion window begins at one segment, with the TCPslow-start then doubling its size for each ACK.  Sending the headersseparately will send one short segment and a second MSS-size segment,whereupon the TCP stack will wait for the responder's ACK before continuing.The responder gets both segments, then delays its ACK for 200ms in the hopesof piggybacking it on responder data, which is never sent since it's stillwaiting for the rest of the HTTP body from the initiator.  As a result, thisresults in a 200ms (+ assorted RTT) delay in each message sent.There are various other considerations that need to be taken into account inorder to provide maximum efficiency.  These are covered in depth elsewhere[Spero] [Heidemann] [Nielsen].  A rule of thumb for optimal performance is tocombine the HTTP header and data payload into a single write (any reasonableHTTP implementation will do this anyway, thanks to the considerable body ofexperience that exists for HTTP server performance tuning), and to keep theHTTP headers to a minimum to try and fit data within a TCP MSS.  Since thisprotocol doesn't involve a web browser, there's no need to include the usualheaders covering browser versions and languages and so on; a minimal set ofcontent-type/encoding and host and session control information will suffice.2.3 ExamplesTo convert the subject DN C=NZ, O=... CN=Fred Dagg into a search key:  Hash the DN, in the DER-encoded form it appears in the certificate, to  obtain:    96 4C 70 C4 1E C9 08 E5 CA 45 25 10 D6 C8 28 3A 1A C1 DF E2  base-64 encode this to obtain:    lkxwxB7JCOXKRSUQ1sgoOhrB3+IThis is the search key to use in the query URI.To fetch all certificates useful for sending encrypted email to foo@bar.com:  GET /search-cgi?email=foo%40bar.com HTTP/1.1In this case "/search-cgi" is the abs_path portion of the query URI, and therequest is submitted to the server located at the net_loc portion of the queryURI.  Note the encoding of the '@' symbol as per [RFC1866].  Remainingrequired headers such as the "Host" header required by HTTP 1.1 have beenomitted for the sake of clarity.To fetch the CA certificate that issued the email certificate:  <Convert the issuer DN to a search key>  GET /search-cgi?iHash=<search key> HTTP/1.1Alternatively, if chaining is by key identifier:  <Extract the keyIdentifier from the authorityKeyIdentifier>  GET /search-cgi?sKID=<search key> HTTP/1.1To fetch other certificates belonging to the same user as the emailcertificate:  <Convert the subject DN to a search key>  GET /search-cgi?sHash=<search key> HTTP/1.1To fetch the CRL for the certificate:  <Convert the issuer DN to a search key>  GET /search-cgi?iHash=<search key> HTTP/1.1Note that since the differentiator is the URI base, the above two queriesappear identical (since the URI base isn't shown) but are in fact distinct.2.4 RationaleThe identifiers are taken from PKCS #15 [PKCS15], a standard that covers(among other things) a transparent interface to a certificate store.  Theseidentifiers have been field proven through having been in common use for anumber of years, typically via PKCS #11 [PKCS11].  Certificate stores and theidentifiers that are required for typical certificate lookup operations areanalysed in some detail in [Gutmann].Another possible identifier that has been suggested is an IP address or DNSname, which will be required for web-enabled embedded devices.  This isnecessary to allow for example a home automation controller to be queried forcertificates for the devices that it controls.  Since this value is regardedas the CN for the device, common practice is to use this value for the CN inthe same way that web server certificates set the CN to the server's DNS name,so this option is already covered in a widely-accepted manner.The query types have been specifically chosen to be not just an HTTP interfaceto LDAP but as a general-purpose retrieval mechanism that allows arbitrarycertificate storage mechanisms (with a bias towards simple key/data stores,which are deployed almost universally, whether as ISAM, Berkeley DB, or anRDBMS) to be employed as back-ends.Hashes are used for arbitrary-length fields such as ones containing DNs inplace of the full field to keep the length manageable.  In addition the use ofthe hashed form emphasizes the fact that searching for structured name dataisn't a supported feature, since this is a simple interface to a key/datacertificate store rather than an HTTP interface to an X.500 directory.  Usersspecifically requiring an HTTP interface to X.500 may use technology such asHTTP LDAP gateways for this purpose.The attributes are given shortened name forms (for example iAndSHash in placeof issuerAndSerialNumberHash) in order to keep the lengths reasonable, orcommon name forms (for example email in place of rfc822Name, rfc822Mailbox,emailAddress, mail, email, etc etc) where multiple name forms exist.Multiple response are returned as multipart/mixed rather than an ASN.1SEQUENCE OF Certificate or PKCS #7/CMS certificate chain because this is morestraightforward to implement with standard web-enabled tools.  An additionaladvantage is that it doesn't restrict this access mechanism to DER-based data,allowing it to be extended to other certificate types such as XML, PGP, andSPKI.Certificate and CRL stores are allocated separate URIs because they may beimplemented using different mechanisms.  A certificate store typicallycontains large numbers of small items while a CRL store contains a very smallnumber of potentially large items, by providing independant URIs it's possible

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
欧美吻胸吃奶大尺度电影 | 久久综合资源网| 国产日韩高清在线| 亚洲综合成人网| 国产精品69久久久久水密桃 | 国产精品一区二区在线观看不卡| 成人免费看视频| 日韩三级免费观看| 一区二区成人在线观看| 国产成人综合亚洲网站| 日韩一区二区在线免费观看| 亚洲日本在线天堂| 国产aⅴ综合色| 日韩免费福利电影在线观看| 一区二区三区波多野结衣在线观看| 国产在线视频一区二区| 欧美日韩精品一区二区三区蜜桃 | 午夜久久电影网| 成人性生交大片免费看中文| 日韩视频在线观看一区二区| 亚洲国产视频a| 一本一道综合狠狠老| 日本一区二区免费在线观看视频| 美女爽到高潮91| 欧美日韩一区二区三区免费看| 中文字幕在线观看一区| 成人午夜又粗又硬又大| 久久一二三国产| 日韩av一级电影| 欧美丰满少妇xxxxx高潮对白| 亚洲精品免费电影| 色综合色综合色综合| 亚洲欧美成人一区二区三区| 成人免费看片app下载| 中文成人综合网| 国产传媒欧美日韩成人| 国产日韩欧美综合在线| 国产一区二三区| 久久综合一区二区| 国产精品99久| 国产精品乱人伦一区二区| 国产精品白丝jk黑袜喷水| 精品国产一区二区国模嫣然| 国模无码大尺度一区二区三区| 欧美大片免费久久精品三p| 日韩高清中文字幕一区| 欧美一级欧美三级| 久久se这里有精品| 国产婷婷色一区二区三区四区| 国产精品一区在线观看你懂的| 久久青草国产手机看片福利盒子| 国产一区二区三区久久久| 久久久久久久一区| 成人免费观看男女羞羞视频| 亚洲色图在线播放| 日本道在线观看一区二区| 香蕉乱码成人久久天堂爱免费| 欧美二区三区的天堂| 久久99久久精品| 国产欧美视频在线观看| 99热99精品| 天天影视网天天综合色在线播放| 日韩三级免费观看| 不卡的电影网站| 亚洲精品videosex极品| 91精品国产入口在线| 国产揄拍国内精品对白| 亚洲视频1区2区| 91精品麻豆日日躁夜夜躁| 国产在线视频不卡二| 亚洲欧美一区二区视频| 欧美精品视频www在线观看 | 日韩精品一级二级| 久久久亚洲精品石原莉奈| 91免费看视频| 美国欧美日韩国产在线播放| 国产精品女同互慰在线看| 欧美日韩一区二区三区高清| 国产成人无遮挡在线视频| 樱花影视一区二区| 欧美大片一区二区| 欧美三级资源在线| 国产又粗又猛又爽又黄91精品| 136国产福利精品导航| 91精品福利在线一区二区三区| 国产一区二区三区在线观看精品 | 日韩欧美成人一区二区| 亚洲v日本v欧美v久久精品| 欧美精品亚洲一区二区在线播放| 成人中文字幕合集| 亚洲一区二区在线免费观看视频| 激情图区综合网| 色噜噜夜夜夜综合网| 日韩电影免费在线| 国产精品国产a| 欧美成人a视频| 欧美无砖砖区免费| 91碰在线视频| 国产伦精一区二区三区| 日本欧美韩国一区三区| 亚洲精品国产一区二区精华液 | 欧美理论电影在线| 一本一道久久a久久精品| 国产成人精品免费| 老司机精品视频导航| 亚洲国产精品精华液网站| 亚洲欧美区自拍先锋| 久久久久国产精品人| 日韩精品中文字幕在线不卡尤物| 欧美日韩日本视频| 日本韩国欧美一区| 色综合天天综合| 99久久伊人久久99| 成人午夜激情片| 国产激情一区二区三区四区 | 丝袜美腿亚洲一区| 亚洲综合无码一区二区| 亚洲视频香蕉人妖| 亚洲欧美日韩一区二区| 中文字幕一区二区在线观看| 欧美国产综合一区二区| 国产女同互慰高潮91漫画| 久久中文娱乐网| 久久久精品综合| 久久久久久久久久久久电影| 国产欧美一二三区| 亚洲欧洲三级电影| 亚洲黄网站在线观看| 亚洲一区二区四区蜜桃| 一区二区激情小说| 亚洲成人av中文| 日韩电影在线免费看| 毛片av一区二区| 国产大陆精品国产| 成人91在线观看| 91久久精品一区二区| 欧美伦理影视网| 欧美不卡一区二区三区| 久久先锋资源网| 国产精品久久久久久户外露出| 综合久久国产九一剧情麻豆| 夜夜嗨av一区二区三区四季av | 亚洲欧美日韩国产成人精品影院| 亚洲在线视频网站| 日欧美一区二区| 国产一区在线精品| 91蝌蚪porny| 这里只有精品99re| 久久久久国色av免费看影院| 综合中文字幕亚洲| 日韩高清不卡一区二区| 国产福利精品导航| 欧美综合亚洲图片综合区| 日韩午夜在线播放| 国产欧美一区二区精品婷婷| 亚洲精品国产高清久久伦理二区| 婷婷丁香激情综合| 不卡一区二区三区四区| 欧美三级三级三级| 久久中文娱乐网| 亚洲.国产.中文慕字在线| 国产乱码精品一区二区三区五月婷 | wwwwxxxxx欧美| 日韩毛片在线免费观看| 蜜臀av性久久久久蜜臀av麻豆| 岛国精品一区二区| 在线电影一区二区三区| 欧美激情一区三区| 日韩av电影免费观看高清完整版在线观看 | 91在线porny国产在线看| 3atv一区二区三区| 成人免费小视频| 极品美女销魂一区二区三区| 欧美午夜电影网| 中文字幕亚洲综合久久菠萝蜜| 免费在线看一区| 91福利在线播放| 日本一区二区三区dvd视频在线| 视频一区中文字幕国产| 91小视频在线| 久久久国产一区二区三区四区小说| 亚洲gay无套男同| 91丨九色丨国产丨porny| 久久精品日产第一区二区三区高清版| 亚洲成在线观看| 色素色在线综合| 国产精品电影一区二区| 国产精品1024| 久久婷婷国产综合精品青草| 日韩精品一级二级| 欧美丝袜丝交足nylons图片| 中国av一区二区三区| 国产精品性做久久久久久| 欧美一级片在线看| 免费欧美高清视频| 欧美二区三区91| 婷婷六月综合亚洲| 91麻豆精品国产91| 日韩有码一区二区三区| 日韩一级片在线观看|