亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? draft-ietf-pkix-certstore-http-03.txt

?? PKIX的RFC英文文檔
?? TXT
?? 第 1 頁 / 共 2 頁
字號:
to implement the two stores using mechanisms tailored to the data theycontain.This access mechanism is similar to the PGP HKP protocol, however the latteris almost entirely undocumented and requires implementors to reverse-engineerother implementations.  Because of this lack of standardisation, no attempthas been made to ensure interoperability or compatibility with HKP-basedservers.  One benefit that HKP brings is extensive implementation experience,which indicates that this is a very workable solution to the problem of asimple key/certificate retrieval mechanism.  HKP servers have been implementedusing flat files, Berkeley DB, and various databases such as Postgres andMySQL.3. Locating HTTP Certificate StoresIn order to locate servers from which certificates may be retrieved, relyingparties can employ one or more of the following strategies:  Information contained in the certificate  Use of a "well-known" location  Manual configuration of the client softwareThe intent of the various options provided here is to make the certificatestore access as transparent as possible, only requiring manual userconfiguration as a last resort.3.1 Information in the CertificateIn order to convey to relying parties a well-known point of informationaccess, CAs MAY use of the SubjectInfoAccess (SIA) and AuthorityInfoAccess(AIA) extension [RFC3280] in certificates.  The OID value for the accessMethodis one of:  id-ad-http-certs     OBJECT IDENTIFIER ::= { id-ad 6 }  id-ad-http-crls      OBJECT IDENTIFIER ::= { id-ad 7 }and the corresponding accessLocation is the query URI.This provides a CA with a convenient place to indicate where furthercertificates may be found, for example for path construction purposes.  Notethat it doesn't mean that the provision of certificate store access servicesis limited to CAs only.3.2 Use of a "well-known" LocationIf no other location information is available, the certificate store interfacemay be located at a "well-known" location constructed from the serviceprovider's domain name.  In the usual case the URI is constructed byprepending the type of information to be retrieved, either "certificates." or"crls.", to the domain name to obtain the net_loc portion of the URI andappending a fixed abs_path portion "search.cgi".  The URI form of the "well-known" location is therefore:  certificates.<domain_name>/search.cgi  crls.<domain_name>/search.cgiService providers SHOULD use these URIs in preference to other alternatives.A second case occurs when the certificate access service is being provided byweb-enabled embedded devices such as Universal Plug and Play devices [UPNP].These devices have a single, fixed net_loc (either an IP address or a DNSname) and makes services available via an HTTP interface.  In this case theURI is constructed by appending a fixed abs_path portion"certificates/search.cgi" for certificates and "crls/search.cgi" for CRLs tothe net_loc.  The URI form of the "well-known" location is therefore:  <net_loc>/certificates/search.cgi  <net_loc>/crls/search.cgiIf certificate access as described in this document is implemented by thedevice then it SHOULD use these URIs in preference to other alternatives (seethe rationale for more on this requirement).3.2.1 ExamplesIf a CA with the domain kiwisign.com were to make its certificates availablevia an HTTP certificate store interface, the "well-known" query URIs forcertificates and CRLs would be:  certificates.kiwisign.com/search.cgi  crls.kiwisign.com/search.cgiA home automation controller with IP address 192.168.1.1 (a control point inUPNP terminology) would make certificates for devices such as HVACcontrollers, lighting and appliance controllers, and fire and physicalintrusion detection devices available as:  192.168.1.1/certificates/search.cgi  192.168.1.1/crls/search.cgiA print server with DNS name "printspooler" would make certificates for web-enabled printers that it communicates with available as:  printspooler/certificates/search.cgi  printspooler/crls/search.cgi3.3 Manual Configuration of the Client SoftwareThe accessLocation for the HTTP certificate/CRL store MAY be configuredlocally at the client.  This can be used if no other information is available,or if it is necessary to override other information.3.4 Implementation NotesThe well-known location option can frequently be automatically derived by usersoftware from currently-known parameters.  For example if the recipient'semail address is @hotmail.com, the user software would go tocertificates.hotmail.com and request the certificate.  If the recipient workedfor a government department, the certificate would be requested atcertificates.departmentname.gov.  In addition user software may maintain alist of known certificate sources in the way that known CA lists aremaintained by web browsers.  The specific mention of support for redirectionin section 2 emphasises the fact that many sites will outsource thecertificate-storage task.  At worst all that will be required is the additionof a single static web page pointing to the real server.  Alternatives such asDNS CNAME RRs are obviously also possible, but aren't quite as easy to set upas HTTP redirects and won't work well across domains.Implementations that require the use of nonstandard locations or ports orHTTPS rather than HTTP in combination with well-known locations should use anHTTP redirect at the well-known location to point to the nonstandard location.For example if the print spooler in section 3.2 used an SSL-protected servernamed printspooler-server with an abs_path portion of cert_access, it woulduse an HTTP 302 redirect to https://printspooler-server/cert_access.  Thiscombines the plug-and-play capability of well-known locations with the abilityto use nonstandard locations and ports.A single server can be used to handle both CRLDP and AIA/SIA queries providedthe CRLDP form uses an HTTP URI.  Since CRLDP points to a single staticlocation for a CRL, a query can be pre-constructed and stored in the CRLDPextension.  Software that uses the CRLDP will retrieve the single CRL thatapplies to the certificate from the server, and software that uses theAIA/SIA can retrieve any CRL from the server.  Similar pre-constructed URIsmay also be useful in other circumstances, for example for links on web pages,to place in appropriate locations like the issuerAltName, or even for techsupport staff to email to users who can't find the certificate themselves.3.5 RationaleThe SIA and AIA extensions are used to indicate the location for the CRL storeinterface rather than the CRLDistributionPoint (CRLDP) extension since the twoperform entirely different functions.  A CRLDP contains "a pointer to thecurrent CRL", a fixed location containing a CRL for the current certificate,while the SIA/AIA extension indicates "how to access CA information andservices for the subject/issuer of the certificate in which the extensionappears", in this case the CRL store interface that provides CRLs for anycertificates issued by the CA.  In addition CRLDP associates other attributeinformation with a query that is incompatible with the simple query mechanismspresented in this document.The well-known location URI is designed to make hosting options as flexible aspossible.  Locating the service at www.<domain name> would generally requireit to be handled by the provider's main web server, while using a distinctserver URI allows it to handled as desired by the provider.  Although therewill no doubt be servers that implement the interface using Apache and Perlscripts, a more logical implementation would consist of a simple networkinterface to a key-and-value lookup mechanism such as Berkeley DB.  The URIform presented in section 3.2 allows for maximum flexibility, since it willwork with both web servers/CGI scripts and non-web-server-based network front-ends for certificate stores.Web-enabled (or more strictly HTTP-enabled) devices are intended to be plug-and-play, with minimal (or no) user configuration necessary.  The "well-known"URI allows any known device (for example one discovered via UPNP's SimpleService Discovery Protocol) to be queried for certificates without requiringfurther user configuration.Protocols such as UPnP have their own means of disseminating device andprotocol information.  For example, UPnP uses SOAP, which provides aGetPublicKeys action for pulling device keys and a PresentKeys action forpushing control point keys.  The text in section 3.2 is not meant to implythat this document overrides the existing UPnP mechanism, but merely that if adevice implements the mechanism describe here, it should use the naming schemein section 3.2 rather than using arbitrary names.4. Security ConsiderationsHTTP caching proxies are common on the Internet, and some proxies may notcheck for the latest version of an object correctly.  [RFC2068] specifies thatresponses to query URLs should not be cached, and most proxies and serverscorrectly implement the "Cache-Control: no-cache" mechanism that can be usedto override cacheing ("Pragma: no-cache" for HTTP 1.0), however in the rareinstance in which an HTTP request for a certificate or CRL goes through amisconfigured or otherwise broken proxy, the proxy may return an out-of-dateresponse.Care should be taken to ensure that only valid queries are fed through to thebackend used to retrieve certificates.  Allowing an attacker to submitarbitrary queries may allow them to manipulate the certificate store inunexpected ways if the backend tries to interpret the query contents.  Forexample if a certificate store is implemented using an RDBMS in which the SQLquery is built up as "SELECT certificate FROM certificates WHERE iHash = " +<search key> and <search key> is set to "X;DELETE FROM certificates" theresults of the query will be quite different from what was expected by thecertificate store administrator.  The same applies to queries by name andemail address.Alongside filtering of queries, the backend should be configured to disableany form of update access via the web interface.  For Berkeley DB thisrestriction can be imposed by opening the certificate store in read-only modefrom the web interface.  For relational databases, it can be imposed throughthe SQL GRANT/REVOKE mechanism, for example "REVOKE ALL ON certificates FROMwebuser; GRANT SELECT ON certificates TO webuser" will allow read-only accessof the appropriate kind for the web interface.4. IANA ConsiderationsThe AIA/SIA accessMethod types are identified by object identifiers (OIDs).OIDs were assigned from an arc contributed to the PKIX Working Group by RSASecurity.  Should additional accessMethods be introduced (for example forattribute certificates or non-X.509 certificate types), the advocates for suchaccessMethods are expected to assign the necessary OIDs from their own arcs.No action by the IANA is necessary for this document or any anticipatedupdates.Author AddressPeter GutmannUniversity of AucklandPrivate Bag 92019Auckland, New Zealandpgut001@cs.auckland.ac.nzReferences  [Gutmann] "A Reliable, Scalable General-purpose Certificate Store", P.            Gutmann, Proceedings of the 16th Annual Computer Security            Applications Conference, December 2000.  [Heidemann] "Performance Interactions Between P-HTTP and TCP              Implementations", J.Heidemann, ACM Computer Communications              Review, April 1997.  [Nielsen] "Network Performance Effects of HTTP/1.1, CSS1, and PNG",            H.Nielsen, J.Gettys, A.Baird-Smith, E.Prud'hommeaux, H.Wium Lie,            and C.Lilley, 24 June 1997,            http://www.w3.org/Protocols/HTTP/1.0/Performance/Pipeline.html.  [PKCS11] PKCS #11 Cryptographic Token Interface Standard, RSA Laboratories,           December 1999.  [PKCS15] PKCS #15 Cryptographic Token Information Syntax Standard, RSA           Laboratories, June 2000.  [RFC1866] "Hypertext Markup Language - 2.0", RFC 1866, T. Berners-Lee and D.            Connolly, November 1995.  [RFC2068] "Hypertext Transfer Protocol -- HTTP/1.1", RFC 2068, J. Gettys, J.            Mogul, H. Frystyk, and T. Berners-Lee, January 1997.  [RFC2119] "Key Words for Use in RFCs to Indicate Requirement Levels",            RFC 2119, S.Bradner, March 1997.  [RFC3280] "Internet X.509 Public Key Infrastructure: Certificate and CRL            Profile", RFC 3280, R. Housley, W. Ford, W. Polk, and D. Solo,            April 2002.  [RFC2585] "Internet X.509 Public Key Infrastructure: Operational Protocols:            FTP and HTTP", RFC 2585, R. Housley and P. Hoffman, May 1999  [Spero] "Analysis of HTTP Performance Problems", S.Spero, July 1994,          http://www.w3.org/Protocols/HTTP/1.0/HTTPPerformance.html.  [UPNP] "Universal Plug and Play Device Architecture, Version 1.0", UPnP         Forum, 8 June 2000.Full Copyright StatementCopyright (C) The Internet Society 2001.  All Rights Reserved.This document and translations of it may be copied and furnished to others,and derivative works that comment on or otherwise explain it or assist in itsimplementation may be prepared, copied, published and distributed, in whole orin part, without restriction of any kind, provided that the above copyrightnotice and this paragraph are included on all such copies and derivativeworks. However, this document itself may not be modified in any way, such asby removing the copyright notice or references to the Internet Society orother Internet organizations, except as needed for the purpose of developingInternet standards in which case the procedures for copyrights defined in theInternet Standards process must be followed, or as required to translate itinto languages other than English.The limited permissions granted above are perpetual and will not be revoked bythe Internet Society or its successors or assigns.This document and the information contained herein is provided on an "AS IS"basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING TASK FORCEDISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANYWARRANTY THAT THE USE OF THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTSOR ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULARPURPOSE.

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
精品久久久久99| 久久久激情视频| 成人av资源网站| 一区二区三区电影在线播| 日韩美女天天操| 国产成人aaa| 一区二区三区日韩精品视频| 久久亚区不卡日本| 欧美日韩一区二区三区在线| 国产乱人伦偷精品视频不卡| 亚洲乱码中文字幕综合| 久久亚洲影视婷婷| 欧美一级淫片007| 国产成人丝袜美腿| 美女一区二区久久| 天天色天天操综合| 亚洲一区二区中文在线| 国产日韩成人精品| 日韩一级大片在线观看| 欧美精品久久一区二区三区| 91在线看国产| 972aa.com艺术欧美| 成人性色生活片| 精品一区二区三区av| 毛片一区二区三区| 国产自产v一区二区三区c| 免费观看成人鲁鲁鲁鲁鲁视频| 亚洲精品福利视频网站| 国产精品国产精品国产专区不蜜| 国产午夜亚洲精品羞羞网站| 精品国产露脸精彩对白| 国产欧美精品一区二区色综合 | 色婷婷国产精品| 欧美性一二三区| 日韩视频不卡中文| 欧美精品一区视频| 中文幕一区二区三区久久蜜桃| 久久女同互慰一区二区三区| 日本一区二区高清| 亚洲综合免费观看高清在线观看| 精品国产sm最大网站免费看| 久久精品男人的天堂| 一区在线播放视频| 亚洲国产精品久久久男人的天堂| 日本特黄久久久高潮| 久久狠狠亚洲综合| 不卡区在线中文字幕| 欧美色区777第一页| 日韩精品一区国产麻豆| 综合色中文字幕| 国内欧美视频一区二区| 欧美写真视频网站| 久久女同互慰一区二区三区| 久久久精品免费免费| 亚洲国产精品久久不卡毛片| 麻豆专区一区二区三区四区五区| 成人不卡免费av| 精品成人佐山爱一区二区| 亚洲免费色视频| 成人一区在线观看| 精品国产免费一区二区三区香蕉| 国产亚洲精久久久久久| 全部av―极品视觉盛宴亚洲| aa级大片欧美| 中文字幕中文字幕在线一区 | 欧美视频一区二区三区在线观看| 欧美成人官网二区| 婷婷成人激情在线网| 99国产精品视频免费观看| 国产精品无码永久免费888| 蜜臀精品一区二区三区在线观看| 欧美久久一区二区| 有坂深雪av一区二区精品| 成人99免费视频| 欧美经典三级视频一区二区三区| 久久66热re国产| 91精品免费观看| 亚洲一区免费视频| 欧美午夜一区二区三区| 亚洲一区二区欧美日韩| 成人av午夜影院| 国产网红主播福利一区二区| 日本在线播放一区二区三区| 欧美日韩国产另类一区| 日韩av在线发布| 精品国产一区二区精华| 国产精品亚洲成人| 中文字幕一区二区三区不卡 | 99精品欧美一区二区三区小说 | 三级久久三级久久| 91精品国产aⅴ一区二区| 国产成人免费视频网站 | 亚洲色欲色欲www在线观看| 99久久精品99国产精品| 中文字幕日韩欧美一区二区三区| 成人免费黄色大片| 五月天激情综合| 精品国产一区二区三区av性色| 国产成人av网站| 亚洲一区欧美一区| 日韩亚洲欧美综合| av一二三不卡影片| 国产一区高清在线| 亚洲一区二区三区在线| 欧美丝袜自拍制服另类| 国产成人综合在线播放| 亚洲成a人v欧美综合天堂下载| 欧美大黄免费观看| 色呦呦日韩精品| 毛片一区二区三区| 亚洲bdsm女犯bdsm网站| 国产精品毛片无遮挡高清| 日韩精品在线一区二区| 色妞www精品视频| 99在线精品免费| av资源站一区| 成人av高清在线| 99re亚洲国产精品| 91久久人澡人人添人人爽欧美| 一本到不卡免费一区二区| 91日韩在线专区| 欧美日韩一级片在线观看| 欧美最猛黑人xxxxx猛交| 91蝌蚪porny九色| 欧美四级电影网| 精品国产免费一区二区三区四区| 精品国产乱码久久久久久闺蜜| 久久久亚洲精品石原莉奈 | 美国三级日本三级久久99| 老司机免费视频一区二区| 国产一区高清在线| 91麻豆国产福利精品| 欧美精选午夜久久久乱码6080| 91精品一区二区三区在线观看| 精品国产91久久久久久久妲己 | 国产成人综合在线播放| 91视频免费看| 欧美成人精品高清在线播放| 国产精品免费丝袜| 日韩影院精彩在线| 99精品热视频| 久久中文娱乐网| 一区二区激情小说| 激情丁香综合五月| 欧美日韩精品一区二区三区| 国产日韩成人精品| 五月天激情综合网| 91玉足脚交白嫩脚丫在线播放| 日韩一级大片在线| 亚洲国产精品久久久久婷婷884| 激情综合一区二区三区| 欧美日韩久久一区| 中文字幕五月欧美| 国产成人av在线影院| 精品少妇一区二区三区在线播放 | 91亚洲资源网| 国产精品免费视频网站| 毛片av一区二区| 欧美一区二区三区不卡| 亚洲免费在线看| 91老司机福利 在线| 亚洲男人的天堂在线观看| 国产麻豆91精品| 精品国产91亚洲一区二区三区婷婷 | 不卡的av在线| 中文字幕日韩av资源站| 国产精品亚洲а∨天堂免在线| 日韩精品一区二区三区老鸭窝| 日韩精品亚洲一区| 欧美一区二区三区喷汁尤物| 丝袜美腿亚洲色图| 在线播放亚洲一区| 久久综合综合久久综合| 欧美一区二区人人喊爽| 肉肉av福利一精品导航| 欧美成va人片在线观看| 麻豆中文一区二区| 国产日韩欧美一区二区三区乱码 | 欧洲人成人精品| 丝袜美腿成人在线| 在线综合视频播放| 另类小说一区二区三区| 中文字幕免费一区| 色婷婷久久久亚洲一区二区三区| 亚洲自拍另类综合| 日韩三级视频中文字幕| 丁香激情综合国产| 亚洲国产日产av| 欧美精品一区二区三区久久久 | 91亚洲精品乱码久久久久久蜜桃 | 久久成人免费日本黄色| 亚洲国产电影在线观看| 欧美自拍偷拍午夜视频| 美女尤物国产一区| 亚洲欧洲美洲综合色网| 欧美一区二区三区思思人| jvid福利写真一区二区三区| 日韩av一区二区在线影视| 亚洲色图制服诱惑| 亚洲国产精品高清|