亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? rfc3379.txt

?? PKIX的RFC英文文檔
?? TXT
?? 第 1 頁 / 共 3 頁
字號:
Network Working Group                                          D. PinkasRequest for Comments: 3379                                          BullCategory: Informational                                       R. Housley                                                        RSA Laboratories                                                          September 2002        Delegated Path Validation and Delegated Path Discovery                         Protocol RequirementsStatus of this Memo   This memo provides information for the Internet community.  It does   not specify an Internet standard of any kind.  Distribution of this   memo is unlimited.Copyright Notice   Copyright (C) The Internet Society (2002).  All Rights Reserved.Abstract   This document specifies the requirements for Delegated Path   Validation (DPV) and Delegated Path Discovery (DPD) for Public Key   Certificates. It also specifies the requirements for DPV and DPD   policy management.1. Introduction   This document specifies the requirements for Delegated Path   Validation (DPV) and Delegated Path Discovery (DPD) for Public Key   Certificates, using two main request/response pairs.   Delegated processing provides two primary services: DPV and DPD.   Some clients require a server to perform certification path   validation and have no need for data acquisition, while some other   clients require only path discovery in support of local path   validation.   The DPV request/response pair, can be used to fully delegate path   validation processing to an DPV server, according to a set of rules,   called a validation policy.   The DPD request/response pair can be used to obtain from a DPD server   all the information needed (e.g., the end-entity certificate, the CA   certificates, full CRLs, delta-CRLs, OCSP responses) to locally   validate a certificate.  The DPD server uses a set of rules, called a   path discovery policy, to determine which information to return.Pinkas & Housley             Informational                      [Page 1]RFC 3379           DPV and DPD Protocol Requirements      September 2002   A third request/response pair allows clients to obtain references for   the policies supported by a DPV or DPD server.1.1. Terminology   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this   document (in uppercase, as shown) are to be interpreted as described   in [RFC2119].2. Rationale and Benefits for DPV (Delegated Path Validation)   DPV allows a server to perform a real time certificate validation for   a validation time T, where T may be the current time or a time in the   recent past.   In order to validate a certificate, a chain of multiple certificates,   called a certification path, may be needed, comprising a certificate   of the public key owner (the end entity) signed by one CA, and zero   or more additional certificates of CAs signed by other CAs.   Offloading path validation to a server may be required by a client   that lacks the processing, and/or communication capabilities to fetch   the necessary certificates and revocation information, perform   certification path construction, and perform local path validation.   In constrained execution environments, such as telephones and PDAs,   memory and processing limitations may preclude local implementation   of complete, PKIX-compliant certification path validation [PKIX-1].   In applications where minimum latency is critical, delegating   validation to a trusted server can offer significant advantages. The   time required to send the target certificate to the validation   server, receive the response, and authenticate the response, can be   considerably less than the time required for the client to perform   certification path discovery and validation.  Even if a certification   path were readily available to the client, the processing time   associated with signature verification for each certificate in the   path might (especially when validating very long paths or using a   limited processor) be greater than the delay associated with use of a   validation server.Pinkas & Housley             Informational                      [Page 2]RFC 3379           DPV and DPD Protocol Requirements      September 2002   Another motivation for offloading path validation is that it allows   validation against management-defined validation policies in a   consistent fashion across an enterprise.  Clients that are able to do   their own path validation may rely on a trusted server to do path   validation if centralized management of validation policies is   needed, or the clients rely on a trusted server to maintain   centralized records of such activities.   When a client uses this service, it inherently trusts the server as   much as it would its own path validation software (if it contained   such software).  Clients can direct the server to perform path   validation in accordance with a particular validation policy.3. Rationale and Benefits for DPD (Delegated Path Discovery)   DPD is valuable for clients that do much of the PKI processing   themselves and simply want a server to collect information for them.   The server is trusted to return the most current information that is   available to it (which may not be the most current information that   has been issued).  The client will ultimately perform certification   path validation.   A client that performs path validation for itself may get benefit in   several ways from using a server to acquire certificates, CRLs, and   OCSP responses [OCSP] as inputs to the validation process.  In this   context, the client is relying on the server to interact with   repositories to acquire the data that the client would otherwise have   to acquire using LDAP, HTTP, FTP [LDAP, FTP&HTTP] or another   repository access protocol.  Since these data items are digitally   signed, the client need not trust the server any more than the client   would trust the repositories.   DPD provides several benefits.  For example, a single query to a   server can replace multiple repository queries, and caching by the   server can reduce latency.  Another benefit to the client system is   that it need not incorporate a diverse set of software to interact   with various forms of repositories, perhaps via different protocols,   nor to perform the graph processing necessary to discover   certification paths, separate from making the queries to acquire path   validation data.4. Delegated Path Validation Protocol Requirements4.1. Basic Protocol   The Delegated Path Validation (DPV) protocol allows a server to   validate one or more public key certificates on behalf of a client   according to a validation policy.Pinkas & Housley             Informational                      [Page 3]RFC 3379           DPV and DPD Protocol Requirements      September 2002   If the DPV server does not support the client requested validation   policy, then the DPV server MUST return an error.   If the DPV request does not specify a validation policy, the server   response MUST indicate the validation policy that was used.   Policy definitions can be quite long and complex, and some policies   may allow for the setting of a few parameters (such as root self-   signed certificates).  The protocol MUST allow the client to include   these policy dependent parameters in the DPV request; however, it is   expected that most clients will simply reference a validation policy   for a given application or accept the DPV server's default validation   policy.   The client can request that the server determines the certificate   validity at a time other than the current time.  The DPV server MUST   obtain revocation status information for the validation time in the   client request.   In order to obtain the revocation status information of any   certificate from the certification path, the DPV server might use, in   accordance with the validation policy, different sources of   revocation information.  For example, a combination of OCSP   responses, CRLs, and delta CRLs could be used.  Alternatively, a   response from another DPV server could be used.   If the revocation status information for the requested validation   time is unavailable, then the DPV server MUST return a status   indicating that the certificate is invalid.  Additional information   about the reason for invalidity MAY also be provided.   The certificate to be validated MUST either be directly provided in   the request or unambiguously referenced, such as the CA distinguished   name, certificate serial number, and the hash of the certificate,   like ESSCertID as defined in [ESS] or OtherSigningCertificate as   defined in [ES-F].   The DPV client MUST be able to provide to the validation server,   associated with each certificate to be validated, useful   certificates, as well as useful revocation information.  Revocation   information includes OCSP responses, CRLs, and delta CRLs.  As an   example, an S/MIME message might include such information, and the   client can simply copy that information into the DPV request.Pinkas & Housley             Informational                      [Page 4]RFC 3379           DPV and DPD Protocol Requirements      September 2002   The DPV server MUST have the certificate to be validated.  When the   certificate is not provided in the request, the server MUST obtain   the certificate and then verify that the certificate is indeed the   one being unambiguous referenced by the client.  The DPV server MUST   include either the certificate or an unambiguous reference to the   certificate (in case of a CA key compromise) in the DPV response.   The DPV response MUST indicate one of the following status   alternatives:   1) the certificate is valid according to the validation policy.   2) the certificate is not valid according to the validation policy.   3) the validity of the certificate is unknown according to the      validation policy.   4) the validity could not be determined due to an error.   When the certificate is not valid according to the validation policy,   then the reason MUST also be indicated.  Invalidity reasons include:   a) the DPV server cannot determine the validity of the certificate      because a certification path cannot be constructed.   b) the DPV server successfully constructed a certification path, but      it was not valid according to the validation algorithm in      [PKIX-1].   c) the certificate is not valid at this time.  If another request      could be made later on, the certificate could possibly be      determined as valid.  This condition may occur before a      certificate validity period has begun or while a certificate is      suspended.   The protocol MUST prevent replay attacks, and the replay prevention   mechanism employed by the protocol MUST NOT rely on synchronized   clocks.   The DPV request MUST allow the client to request that the server   include in its response additional information which will allow   relying parties not trusting the DPV server to be confident that the   certificate validation has correctly been performed.  Such   information may (not necessarily exclusively) consist of a   certification path, revocation status information from authorized CRL   issuers or authorized OCSP responders, revocation status information   from CRL issuers or OCSP responders trusted under the validationPinkas & Housley             Informational                      [Page 5]

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
麻豆精品视频在线观看视频| 色婷婷综合久色| 精品国一区二区三区| 国产99久久久久| 亚洲国产成人91porn| 久久女同互慰一区二区三区| eeuss影院一区二区三区| 天天综合网 天天综合色| 中文字幕av一区二区三区高| 色综合激情五月| 国产二区国产一区在线观看| 亚洲精品写真福利| 久久九九影视网| 日韩三级在线观看| 欧美亚一区二区| 成人av在线资源| 国产不卡视频一区二区三区| 日韩在线a电影| 一区二区三区四区在线免费观看| www激情久久| 久久天堂av综合合色蜜桃网| 制服丝袜在线91| 欧美日韩欧美一区二区| 91丝袜高跟美女视频| 不卡高清视频专区| 色综合久久久久综合| 91丝袜高跟美女视频| 色综合天天在线| 一本色道久久加勒比精品| 91亚洲男人天堂| 欧美午夜精品一区二区三区| 欧美三级韩国三级日本三斤| 9191成人精品久久| 777a∨成人精品桃花网| 日韩欧美一级片| 国产精品国产三级国产三级人妇| 国产精品无码永久免费888| 国产精品色在线观看| 亚洲色欲色欲www| 日日骚欧美日韩| 国产成人啪午夜精品网站男同| 懂色av中文字幕一区二区三区| av一二三不卡影片| 欧美视频自拍偷拍| 国产精品美女视频| 日韩激情视频在线观看| 国产91精品免费| 在线观看免费亚洲| 欧美精品一区二区三区蜜桃视频 | 久久这里只有精品首页| 亚洲视频你懂的| 国产又粗又猛又爽又黄91精品| 成人黄色a**站在线观看| 欧美精品tushy高清| 中文字幕一区二区在线播放| 日本不卡高清视频| 欧美日韩国产美女| 亚洲欧美日韩人成在线播放| 国产成人99久久亚洲综合精品| 91精品蜜臀在线一区尤物| 亚洲六月丁香色婷婷综合久久 | 在线精品视频小说1| 亚洲欧美影音先锋| 国产福利一区二区三区在线视频| 日韩女优av电影| 奇米四色…亚洲| 久久亚洲影视婷婷| 国产乱子轮精品视频| 精品国产乱码久久久久久免费| 国产中文字幕精品| 精品国产乱子伦一区| 国产精品自在欧美一区| 亚洲国产精品精华液ab| 92精品国产成人观看免费| 亚洲欧美自拍偷拍| 7878成人国产在线观看| 喷水一区二区三区| 国产性天天综合网| 欧美影片第一页| 麻豆精品一区二区| 亚洲精品视频在线| 久久蜜臀精品av| 国产高清亚洲一区| 亚洲国产一区二区三区| 亚洲精品一区二区三区香蕉| 国产凹凸在线观看一区二区| 一区二区三区在线高清| 日韩视频永久免费| 日本道精品一区二区三区| 美脚の诱脚舐め脚责91| 亚洲视频一二三区| 国产亚洲视频系列| 欧美高清视频一二三区| a美女胸又www黄视频久久| 免费一区二区视频| 亚洲国产婷婷综合在线精品| 国产欧美va欧美不卡在线| 91精品国产免费| 91麻豆.com| 97精品久久久午夜一区二区三区| 蜜臀久久99精品久久久久宅男| 亚洲美女在线一区| 欧美激情一区不卡| 久久久夜色精品亚洲| 91精品视频网| 日韩一区二区电影| 精品国产麻豆免费人成网站| 欧美电影影音先锋| 欧美性猛交xxxx黑人交| 欧美最新大片在线看| 欧美一区二区高清| 91国偷自产一区二区三区成为亚洲经典 | 老司机精品视频在线| 亚洲成av人影院在线观看网| 亚洲成人av在线电影| 丝袜a∨在线一区二区三区不卡| 亚洲永久精品大片| 亚洲一级在线观看| 久热成人在线视频| 蜜臀久久99精品久久久久宅男| 免费av网站大全久久| 国产精品一区二区三区99| 国产成人在线视频网站| av男人天堂一区| 欧洲精品一区二区三区在线观看| 欧美亚洲一区二区在线观看| 欧美日韩小视频| 欧美激情一区不卡| 丝袜a∨在线一区二区三区不卡| 蜜臀va亚洲va欧美va天堂| 国产寡妇亲子伦一区二区| 欧美伊人精品成人久久综合97| 亚洲国产精品黑人久久久| 亚洲国产精品影院| 色婷婷国产精品| 国产亚洲一区二区三区四区| 亚洲va国产天堂va久久en| 狠狠色综合日日| 欧美日韩国产一区二区三区地区| 国产午夜精品久久久久久久| 亚洲国产另类精品专区| 97久久人人超碰| 中文av字幕一区| 夫妻av一区二区| 欧美国产综合色视频| 国产精品99久久久久久宅男| 9191久久久久久久久久久| 亚洲一区二区av电影| 在线亚洲精品福利网址导航| 国产日产精品1区| 国产成人综合自拍| 精品久久久久一区二区国产| 精品一区二区三区在线观看国产 | 久久99日本精品| 日韩一区二区三区三四区视频在线观看 | 国产91精品露脸国语对白| 精品日韩欧美一区二区| 国产一区欧美二区| 中文乱码免费一区二区| 国产一区二区精品在线观看| 久久先锋影音av鲁色资源网| 成人激情免费视频| 亚洲国产精品av| 在线亚洲一区观看| 蜜臀av亚洲一区中文字幕| 精品国产乱码久久久久久免费| 风流少妇一区二区| 亚洲综合无码一区二区| 日韩精品一区二区三区四区视频| 久久成人免费网| 依依成人精品视频| 久久久久久一级片| 欧美人与性动xxxx| 大美女一区二区三区| 午夜久久电影网| 国产精品天天看| 精品乱码亚洲一区二区不卡| 一本到不卡免费一区二区| 久久精品国产久精国产爱| 亚洲视频综合在线| 久久精品人人做人人综合| 欧美日韩一区二区在线观看| 成人视屏免费看| 久久精品噜噜噜成人88aⅴ| 亚洲一区中文日韩| 亚洲精品中文字幕在线观看| 国产精品色眯眯| 精品国一区二区三区| 欧美mv日韩mv亚洲| 日韩一级免费观看| 欧美精品tushy高清| 欧美日韩情趣电影| 91麻豆精品国产91久久久久久| 日本乱人伦一区| 色久优优欧美色久优优| 色综合天天综合| 欧美亚日韩国产aⅴ精品中极品| 91麻豆swag| 欧美夫妻性生活| 精品久久久久久综合日本欧美|