亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? rfc3379.txt

?? PKIX的RFC英文文檔
?? TXT
?? 第 1 頁 / 共 3 頁
字號:
RFC 3379           DPV and DPD Protocol Requirements      September 2002   policy, time-stamp tokens from TSAs responders trusted under the   validation policy, or a DPV response from a DPV server that is   trusted under the validation policy.  When the certificate is valid   according to the validation policy, the server MUST, upon request,   include that information in the response.  However, the server MAY   omit that information when the certificate is invalid or when it   cannot determine the validity.   The DPV server MUST be able, upon request, copy a text field provided   by the client into the DPV response.  As an example, this field may   relate to the nature or reason for the DPV query.   The DPV response MUST be bound to the DPV request so that the client   can be sure that all the parameters from the request have been taken   into consideration by the DPV server to build the response.  This can   be accomplished by including a one-way hash of the request in the   response.   In some environments it may be necessary to present only a DPV   response to another relying party without the corresponding request.   In this case the response MUST be self contained.  This can be   accomplished by repeating only the important components from the   request in the response.   For the client to be confident that the certificate validation was   handled by the expected DPV server, the DPV response MUST be   authenticated, unless an error is reported (such as a badly formatted   request or unknown validation policy).   For the client to be able prove to a third party that trusts the same   DPV server that the certificate validation was handled correctly, the   DPV response MUST be digitally signed, unless an error is reported.   The DPV server's certificate MUST authenticate the DPV server.   The DPV server MAY require client authentication, therefore, the DPV   request MUST be able to be authenticated.   When the DPV request is authenticated, the client SHOULD be able to   include a client identifier in the request for the DPV server to copy   into the response.  Mechanisms for matching this identifier with the   authenticated identity depends on local DPV server conditions and/or   the validation policy.  The DPV server MAY choose to blindly copy the   identifier, omit the identifier, or return an error response.   There are no specific confidentiality requirements within this   application layer protocol.  However, when confidentiality is needed,   it can be achieved with a lower-layer security protocol.Pinkas & Housley             Informational                      [Page 6]RFC 3379           DPV and DPD Protocol Requirements      September 20024.2. Relaying, Re-direction and Multicasting   In some network environments, especially ones that include firewalls,   a DPV server might not be able to obtain all of the information that   it needs to process a request.  However, the DPV server might be   configured to use the services of one or more other DPV servers to   fulfill all requests.  In such cases, the client is unaware that the   queried DPV server is using the services of other DPV servers, and   the client-queried DPV server acts as a DPV client to another DPV   server.  Unlike the original client, the DPV server is expected to   have moderate computing and memory resources, enabling the use of   relay, re-direct or multicasting mechanisms.  The requirements in   this section support DPV server-to-DPV server exchanges without   imposing them on DPV client-to-DPV server exchanges.   Protocols designed to satisfy these requirements MAY include optional   fields and/or extensions to support relaying, re-direction or   multicasting.  However, DPV clients are not expected to support   relay, re-direct or multicast.  If the protocol supports such   features, the protocol MUST include provisions for DPV clients and   DPV servers that do not support such features, allowing them to   conform to the basic set of requirements.   - When a server supports a relay mechanism, a mechanism to detect     loops or repetition MUST be provided.   - When a protocol provides the capability for a DPV server to re-     direct a request to another DPV server (that is, the protocol     chooses to provide a referral mechanism), a mechanism to provide     information to be used for the re-direction SHOULD be supported.     If such re-direction information is sent back to clients, then the     protocol MUST allow conforming clients to ignore it.   - Optional parameters in the protocol request and/or response MAY be     provide support for relaying, re-direction or multicasting.  DPV     clients that ignore any such optional parameters MUST be able to     use the DPV service.  DPV servers that ignore any such optional     parameters MUST still be able to offer the DPV service, although     they might not be able to overcome the limitations imposed by the     network topology.  In this way, protocol implementers do not need     to understand the syntax or semantics of any such optional     parameters.5. Delegated Path Discovery Protocol Requirements   The Delegated Path Discovery (DPD) protocol allows the client to use   a single request to collect at one time from a single server the data   elements available at the current time that might be collected usingPinkas & Housley             Informational                      [Page 7]RFC 3379           DPV and DPD Protocol Requirements      September 2002   different protocols (such as LDAP, HTTP, FTP, or OCSP) or by querying   multiple servers, to locally validate a public key certificate   according to a single path discovery policy.  The returned   information can be used to locally validate one or more certificates   for the current time.   Clients MUST be able to specify whether they want, in addition to the   certification path, the revocation information associated with the   path, for the end-entity certificate, for the CA certificates, or for   both.   If the DPD server does not support the client requested path   discovery policy, the DPD server MUST return an error.  Some forms of   path discovery policy can be simple.  In that case it is acceptable   to pass the parameters from the path discovery policy with each   individual request.  For example, the client might provide a set of   trust anchors and separate revocation status conditions for the end-   entity certificate and for the other certificates.  The DPD request   MUST allow more elaborated path discovery policies to be referenced.   However, it is expected that most of the time clients will only be   aware of the referenced path discovery policy for a given   application.   The DPD server response includes zero, one, or several certification   paths.  Each path consists of a sequence of certificates, starting   with the certificate to be validated and ending with a trust anchor.   If the trust anchor is a self-signed certificate, that self-signed   certificate MUST NOT be included.  In addition, if requested, the   revocation information associated with each certificate in the path   MUST also be returned.   By default, the DPD server MUST return a single certification path   for each end-entity certificate in the DPD request.  However, the   returned path may need to match some additional local criteria known   only to the client.  For example, the client might require the   presence of a particular certificate extension or a particular name   form.  Therefore, the DPD client MUST have a means of obtaining more   than one certification path for each end-entity certificate in the   DPD request.  At the same time, the mechanism for obtaining   additional certification paths MUST NOT impose protocol state on the   DPD server.  Avoiding the maintenance of state information associated   with previous requests minimizes potential denial of service attacks   and other problems associated with server crashes.   Path discovery MUST be performed according to the path discovery   policy.  The DPD response MUST indicate one of the following status   alternatives:Pinkas & Housley             Informational                      [Page 8]RFC 3379           DPV and DPD Protocol Requirements      September 2002   1) one or more certification paths was found according to the path      discovery policy, with all of the requested revocation information      present.   2) one or more certification paths was found according to the path      discovery policy, with a subset of the requested revocation      information present.   3) one or more certification paths was found according to the path      discovery policy, with none of the requested revocation      information present.   4) no certification path was found according to the path discovery      policy.   5) path construction could not be performed due to an error.   When no errors are detected, the information that is returned   consists of one or more certification paths and, if requested, its   associated revocation status information for each certificate in the   path.   For the client to be confident that all of the elements from the   response originate from the expected DPD server, an authenticated   response MAY be required.  For example, the server might sign the   response or data authentication might also be achieved using a   lower-layer security protocol.   The DPD server MAY require client authentication, allowing the DPD   request MUST to be authenticated.   There are no specific confidentiality requirement within the   application layer protocol.  However, when confidentiality is needed,   it can be achieved with a lower-layer security protocol.6. DPV and DPD Policy Query   Using a separate request/response pair, the DPV or DPD client MUST be   able to obtain references for the default policy or for all of the   policies supported by the server.  The response can include   references to previously defined policies or to a priori known   policies.7. Validation Policy   A validation policy is a set of rules against which the validation of   the certificate is performed.Pinkas & Housley             Informational                      [Page 9]RFC 3379           DPV and DPD Protocol Requirements      September 2002   A validation policy MAY include several trust anchors.  A trust   anchor is defined as one public key, a CA name, and a validity time   interval; a trust anchor optionally includes additional constraints.   The use of a self-signed certificate is one way to specify the public   key to be used, the issuer name, and the validity period of the   public key.   Additional constraints for each trust anchor MAY be defined.  These   constraints might include a set of certification policy constraints   or a set of naming constraints.  These constraints MAY also be   included in self-signed certificates.   Additional conditions that apply to the certificates in the path MAY   also be specified in the validation policy.  For example, specific   values could be provided for the inputs to the certification path   validation algorithm in [PKIX-1], such as user-initial-policy-set,   initial-policy-mapping-inhibit, initial-explicit-policy, or initial-   any-policy-inhibit.   Additional conditions that apply to the end-entity certificate MAY   also be specified in the validation policy.  For example, a specific   name form might be required.   In order to succeed, one valid certification path (none of the   certificates in the path are expired or revoked) MUST be found   between an end-entity certificate and a trust anchor and all   constraints that apply to the certification path MUST be verified.7.1. Components for a Validation Policy   A validation policy is built from three components:   1. Certification path requirements,   2. Revocation requirements, and   3. End-entity certificate specific requirements.   Note:  [ES-P] defines ASN.1 data elements that may be useful while   defining the components of a validation policy.7.2. Certificate Path Requirements   The path requirements identify a sequence of trust anchors used to   start certification path processing and initial conditions for   certification path validation as defined in [PKIX-1].Pinkas & Housley             Informational                     [Page 10]RFC 3379           DPV and DPD Protocol Requirements      September 2002

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
天堂va蜜桃一区二区三区漫画版| 久久网站热最新地址| 欧美日本一区二区三区四区| 3atv一区二区三区| 久久人人97超碰com| 中文字幕中文字幕在线一区| 亚洲一区二区三区视频在线播放| 日韩av中文在线观看| 粉嫩欧美一区二区三区高清影视| 欧洲生活片亚洲生活在线观看| 日韩亚洲欧美高清| 国产精品久线观看视频| 天天色综合天天| 成人一区二区三区中文字幕| 色婷婷久久久综合中文字幕| 精品国产免费一区二区三区四区| 中文字幕一区二区三区不卡 | 99久久99久久免费精品蜜臀| 精品视频在线视频| 337p粉嫩大胆噜噜噜噜噜91av| 亚洲欧美日韩成人高清在线一区| 精品在线亚洲视频| 99在线精品观看| 欧美成人欧美edvon| 亚洲欧美色综合| 精品写真视频在线观看| 色视频欧美一区二区三区| 精品久久久久av影院| 亚洲乱码中文字幕| 国产精品一二三四区| 在线成人午夜影院| 亚洲桃色在线一区| 国产麻豆成人传媒免费观看| 欧美精品高清视频| 亚洲手机成人高清视频| 国产资源在线一区| 欧美电影一区二区| 一区二区理论电影在线观看| 国产91丝袜在线观看| 欧美一区二区在线视频| 一区二区三区中文在线观看| 成人做爰69片免费看网站| 日韩欧美成人一区二区| 香蕉久久夜色精品国产使用方法| 成人一区在线看| 精品国产髙清在线看国产毛片 | 欧美日韩一级片网站| 国产日韩成人精品| 精品一区二区免费视频| 欧美剧情电影在线观看完整版免费励志电影| 久久久精品tv| 久久国产精品一区二区| 欧美精品亚洲二区| 亚洲一区二区免费视频| 色综合久久综合网| 国产精品妹子av| 国产精品18久久久久久久久久久久| 777久久久精品| 亚洲高清视频在线| 在线免费观看一区| 亚洲伦在线观看| 成人av资源网站| 久久久99久久| 国产乱子伦一区二区三区国色天香 | 久久久久久日产精品| 六月丁香婷婷久久| 日韩亚洲欧美一区二区三区| 日韩国产欧美在线播放| 欧美精品亚洲二区| 天堂蜜桃91精品| 制服丝袜中文字幕一区| 午夜精品久久久久久久99樱桃| 欧美日韩综合在线| 亚洲成人精品在线观看| 欧美色视频在线| 日韩二区在线观看| 日韩欧美在线综合网| 免费av网站大全久久| 欧美一区二区视频在线观看| 免费在线观看精品| 精品成人一区二区三区| 国产999精品久久久久久| 国产精品入口麻豆原神| 91一区二区在线观看| 亚洲午夜三级在线| 欧美高清视频一二三区| 麻豆国产欧美日韩综合精品二区| 日韩你懂的在线播放| 精品亚洲国产成人av制服丝袜| 久久久国产精华| 99国产精品久久| 亚洲精品va在线观看| 欧美日韩另类一区| 美国毛片一区二区| 欧美国产日韩在线观看| 一本在线高清不卡dvd| 亚洲v精品v日韩v欧美v专区| 日韩午夜激情av| 国产成人亚洲综合a∨婷婷图片| 中文字幕在线观看不卡视频| 在线国产亚洲欧美| 麻豆成人免费电影| 欧美激情综合五月色丁香| 99国产精品久| 亚洲成av人综合在线观看| xf在线a精品一区二区视频网站| 成人av在线观| 五月天欧美精品| 久久嫩草精品久久久精品| 91麻豆免费视频| 人人狠狠综合久久亚洲| 国产日韩一级二级三级| 欧美性一二三区| 激情偷乱视频一区二区三区| 亚洲欧洲精品一区二区三区不卡| 欧美日韩免费观看一区三区| 国内一区二区在线| 亚洲视频在线一区观看| 欧美成人video| 91麻豆免费视频| 久久99久久99| 一区二区三区产品免费精品久久75| 91精品国产高清一区二区三区蜜臀| 成人深夜视频在线观看| 午夜伊人狠狠久久| 国产欧美一区二区精品仙草咪| 欧美三级午夜理伦三级中视频| 国产在线一区二区| 亚洲成av人片观看| 国产精品区一区二区三区| 91精品国产综合久久精品| 成人av一区二区三区| 免费人成在线不卡| 国产精品国产精品国产专区不片| 欧美一区二区在线免费播放| 91亚洲精品久久久蜜桃网站| 黄色资源网久久资源365| 亚洲电影一级黄| 国产精品视频线看| 精品国产一区二区在线观看| 欧美三级欧美一级| av电影在线不卡| 国产一区在线观看视频| 性久久久久久久久久久久| 亚洲欧洲在线观看av| 久久伊人蜜桃av一区二区| 欧美伦理影视网| 91黄色免费看| 99在线热播精品免费| 国产福利视频一区二区三区| 日韩电影在线免费| 亚洲午夜三级在线| 亚洲同性gay激情无套| 久久久久久久久伊人| 日韩三级精品电影久久久| 欧美日韩精品欧美日韩精品一综合| www.66久久| 国产999精品久久久久久绿帽| 精品一区二区三区av| 免费av成人在线| 琪琪久久久久日韩精品| 亚洲va天堂va国产va久| 一区二区三区精品| 亚洲欧洲性图库| 中文在线免费一区三区高中清不卡| 日韩精品一区在线观看| 欧美一区二区三区免费大片 | 亚洲成人免费影院| 亚洲精品高清在线| 中文字幕日韩一区| 中日韩免费视频中文字幕| 国产女同互慰高潮91漫画| 久久综合九色综合久久久精品综合| 91精品国产手机| 欧美一区二区三区四区在线观看| 欧美日韩免费一区二区三区| 欧美日韩在线精品一区二区三区激情 | 欧美成人激情免费网| 91精品国产色综合久久ai换脸 | 日本美女一区二区| 午夜私人影院久久久久| 亚洲va韩国va欧美va精品| 亚洲成av人**亚洲成av**| 午夜精品一区二区三区三上悠亚| 亚洲国产一区在线观看| 亚洲第一成年网| 婷婷成人综合网| 日本vs亚洲vs韩国一区三区| 爽爽淫人综合网网站| 日本在线观看不卡视频| 久久精品国产亚洲aⅴ| 国产一区二区不卡| 国产成人免费9x9x人网站视频| 国产精品538一区二区在线| 成人性生交大片免费| aaa欧美大片| 欧美吞精做爰啪啪高潮| 91麻豆精品国产| 久久久另类综合| 国产精品盗摄一区二区三区|