亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? rfc2560.txt

?? PKIX的RFC英文文檔
?? TXT
?? 第 1 頁 / 共 3 頁
字號:
   The value for responseBytes consists of an OBJECT IDENTIFIER and a   response syntax identified by that OID encoded as an OCTET STRING.   ResponseBytes ::=       SEQUENCE {       responseType   OBJECT IDENTIFIER,       response       OCTET STRING }   For a basic OCSP responder, responseType will be id-pkix-ocsp-basic.   id-pkix-ocsp           OBJECT IDENTIFIER ::= { id-ad-ocsp }   id-pkix-ocsp-basic     OBJECT IDENTIFIER ::= { id-pkix-ocsp 1 }Myers, et al.               Standards Track                     [Page 8]RFC 2560                       PKIX OCSP                       June 1999   OCSP responders SHALL be capable of producing responses of the id-   pkix-ocsp-basic response type. Correspondingly, OCSP clients SHALL be   capable of receiving and processing responses of the id-pkix-ocsp-   basic response type.   The value for response SHALL be the DER encoding of   BasicOCSPResponse.   BasicOCSPResponse       ::= SEQUENCE {      tbsResponseData      ResponseData,      signatureAlgorithm   AlgorithmIdentifier,      signature            BIT STRING,      certs                [0] EXPLICIT SEQUENCE OF Certificate OPTIONAL }   The value for signature SHALL be computed on the hash of the DER   encoding ResponseData.   ResponseData ::= SEQUENCE {      version              [0] EXPLICIT Version DEFAULT v1,      responderID              ResponderID,      producedAt               GeneralizedTime,      responses                SEQUENCE OF SingleResponse,      responseExtensions   [1] EXPLICIT Extensions OPTIONAL }   ResponderID ::= CHOICE {      byName               [1] Name,      byKey                [2] KeyHash }   KeyHash ::= OCTET STRING -- SHA-1 hash of responder's public key   (excluding the tag and length fields)   SingleResponse ::= SEQUENCE {      certID                       CertID,      certStatus                   CertStatus,      thisUpdate                   GeneralizedTime,      nextUpdate         [0]       EXPLICIT GeneralizedTime OPTIONAL,      singleExtensions   [1]       EXPLICIT Extensions OPTIONAL }   CertStatus ::= CHOICE {       good        [0]     IMPLICIT NULL,       revoked     [1]     IMPLICIT RevokedInfo,       unknown     [2]     IMPLICIT UnknownInfo }   RevokedInfo ::= SEQUENCE {       revocationTime              GeneralizedTime,       revocationReason    [0]     EXPLICIT CRLReason OPTIONAL }   UnknownInfo ::= NULL -- this can be replaced with an enumerationMyers, et al.               Standards Track                     [Page 9]RFC 2560                       PKIX OCSP                       June 19994.2.2  Notes on OCSP Responses4.2.2.1  Time   The thisUpdate and nextUpdate fields define a recommended validity   interval. This interval corresponds to the {thisUpdate, nextUpdate}   interval in CRLs. Responses whose nextUpdate value is earlier than   the local system time value SHOULD be considered unreliable.   Responses whose thisUpdate time is later than the local system time   SHOULD be considered unreliable. Responses where the nextUpdate value   is not set are equivalent to a CRL with no time for nextUpdate (see   Section 2.4).   The producedAt time is the time at which this response was signed.4.2.2.2  Authorized Responders   The key that signs a certificate's status information need not be the   same key that signed the certificate. It is necessary however to   ensure that the entity signing this information is authorized to do   so.  Therefore, a certificate's issuer MUST either sign the OCSP   responses itself or it MUST explicitly designate this authority to   another entity.  OCSP signing delegation SHALL be designated by the   inclusion of id-kp-OCSPSigning in an extendedKeyUsage certificate   extension included in the OCSP response signer's certificate.  This   certificate MUST be issued directly by the CA that issued the   certificate in question.   id-kp-OCSPSigning OBJECT IDENTIFIER ::= {id-kp 9}   Systems or applications that rely on OCSP responses MUST be capable   of detecting and enforcing use of the id-ad-ocspSigning value as   described above. They MAY provide a means of locally configuring one   or more OCSP signing authorities, and specifying the set of CAs for   which each signing authority is trusted. They MUST reject the   response if the certificate required to validate the signature on the   response fails to meet at least one of the following criteria:   1. Matches a local configuration of OCSP signing authority for the   certificate in question; or   2. Is the certificate of the CA that issued the certificate in   question; or   3. Includes a value of id-ad-ocspSigning in an ExtendedKeyUsage   extension and is issued by the CA that issued the certificate in   question."Myers, et al.               Standards Track                    [Page 10]RFC 2560                       PKIX OCSP                       June 1999   Additional acceptance or rejection criteria may apply to either the   response itself or to the certificate used to validate the signature   on the response.4.2.2.2.1  Revocation Checking of an Authorized Responder   Since an Authorized OCSP responder provides status information for   one or more CAs, OCSP clients need to know how to check that an   authorized responder's certificate has not been revoked. CAs may   choose to deal with this problem in one of three ways:   - A CA may specify that an OCSP client can trust a responder for the   lifetime of the responder's certificate. The CA does so by including   the extension id-pkix-ocsp-nocheck. This SHOULD be a non-critical   extension. The value of the extension should be NULL. CAs issuing   such a certificate should realized that a compromise of the   responder's key, is as serious as the compromise of a CA key used to   sign CRLs, at least for the validity period of this certificate. CA's   may choose to issue this type of certificate with a very short   lifetime and renew it frequently.   id-pkix-ocsp-nocheck OBJECT IDENTIFIER ::= { id-pkix-ocsp 5 }   - A CA may specify how the responder's certificate be checked for   revocation. This can be done using CRL Distribution Points if the   check should be done using CRLs or CRL Distribution Points, or   Authority Information Access if the check should be done in some   other way. Details for specifying either of these two mechanisms are   available in [RFC2459].   - A CA may choose not to specify any method of revocation checking   for the responder's certificate, in which case, it would be up to the   OCSP client's local security policy to decide whether that   certificate should be checked for revocation or not.4.3  Mandatory and Optional Cryptographic Algorithms   Clients that request OCSP services SHALL be capable of processing   responses signed used DSA keys identified by the DSA sig-alg-oid   specified in section 7.2.2 of [RFC2459]. Clients SHOULD also be   capable of processing RSA signatures as specified in section 7.2.1 of   [RFC2459]. OCSP responders SHALL support the SHA1 hashing algorithm.4.4  Extensions   This section defines some standard extensions, based on the extension   model employed in X.509 version 3 certificates see [RFC2459]. Support   for all extensions is optional for both clients and responders.  ForMyers, et al.               Standards Track                    [Page 11]RFC 2560                       PKIX OCSP                       June 1999   each extension, the definition indicates its syntax, processing   performed by the OCSP Responder, and any extensions which are   included in the corresponding response.4.4.1  Nonce   The nonce cryptographically binds a request and a response to prevent   replay attacks. The nonce is included as one of the requestExtensions   in requests, while in responses it would be included as one of the   responseExtensions. In both the request and the response, the nonce   will be identified by the object identifier id-pkix-ocsp-nonce, while   the extnValue is the value of the nonce.   id-pkix-ocsp-nonce     OBJECT IDENTIFIER ::= { id-pkix-ocsp 2 }4.4.2  CRL References   It may be desirable for the OCSP responder to indicate the CRL on   which a revoked or onHold certificate is found. This can be useful   where OCSP is used between repositories, and also as an auditing   mechanism. The CRL may be specified by a URL (the URL at which the   CRL is available), a number (CRL number) or a time (the time at which   the relevant CRL was created). These extensions will be specified as   singleExtensions. The identifier for this extension will be id-pkix-   ocsp-crl, while the value will be CrlID.   id-pkix-ocsp-crl       OBJECT IDENTIFIER ::= { id-pkix-ocsp 3 }   CrlID ::= SEQUENCE {      crlUrl               [0]     EXPLICIT IA5String OPTIONAL,      crlNum               [1]     EXPLICIT INTEGER OPTIONAL,      crlTime              [2]     EXPLICIT GeneralizedTime OPTIONAL }   For the choice crlUrl, the IA5String will specify the URL at which   the CRL is available. For crlNum, the INTEGER will specify the value   of the CRL number extension of the relevant CRL. For crlTime, the   GeneralizedTime will indicate the time at which the relevant CRL was   issued.4.4.3  Acceptable Response Types   An OCSP client MAY wish to specify the kinds of response types it   understands. To do so, it SHOULD use an extension with the OID id-   pkix-ocsp-response, and the value AcceptableResponses.  This   extension is included as one of the requestExtensions in requests.   The OIDs included in AcceptableResponses are the OIDs of the various   response types this client can accept (e.g., id-pkix-ocsp-basic).Myers, et al.               Standards Track                    [Page 12]RFC 2560                       PKIX OCSP                       June 1999   id-pkix-ocsp-response  OBJECT IDENTIFIER ::= { id-pkix-ocsp 4 }   AcceptableResponses ::= SEQUENCE OF OBJECT IDENTIFIER   As noted in section 4.2.1, OCSP responders SHALL be capable of   responding with responses of the id-pkix-ocsp-basic response type.   Correspondingly, OCSP clients SHALL be capable of receiving and   processing responses of the id-pkix-ocsp-basic response type.4.4.4  Archive Cutoff   An OCSP responder MAY choose to retain revocation information beyond   a certificate's expiration. The date obtained by subtracting this   retention interval value from the producedAt time in a response is   defined as the certificate's "archive cutoff" date.   OCSP-enabled applications would use an OCSP archive cutoff date to   contribute to a proof that a digital signature was (or was not)   reliable on the date it was produced even if the certificate needed   to validate the signature has long since expired.   OCSP servers that provide support for such historical reference   SHOULD include an archive cutoff date extension in responses.  If   included, this value SHALL be provided as an OCSP singleExtensions   extension identified by id-pkix-ocsp-archive-cutoff and of syntax   GeneralizedTime.   id-pkix-ocsp-archive-cutoff  OBJECT IDENTIFIER ::= { id-pkix-ocsp 6 }   ArchiveCutoff ::= GeneralizedTime   To illustrate, if a server is operated with a 7-year retention   interval policy and status was produced at time t1 then the value for   ArchiveCutoff in the response would be (t1 - 7 years).4.4.5  CRL Entry Extensions   All the extensions specified as CRL Entry Extensions - in Section 5.3   of [RFC2459] - are also supported as singleExtensions.4.4.6  Service Locator   An OCSP server may be operated in a mode whereby the server receives   a request and routes it to the OCSP server which is known to be   authoritative for the identified certificate.  The serviceLocator   request extension is defined for this purpose.  This extension is   included as one of the singleRequestExtensions in requests.Myers, et al.               Standards Track                    [Page 13]RFC 2560                       PKIX OCSP                       June 1999   id-pkix-ocsp-service-locator OBJECT IDENTIFIER ::= { id-pkix-ocsp 7 }   ServiceLocator ::= SEQUENCE {       issuer    Name,       locator   AuthorityInfoAccessSyntax OPTIONAL }   Values for these fields are obtained from the corresponding fields in   the subject certificate.5.  Security Considerations   For this service to be effective, certificate using systems must   connect to the certificate status service provider. In the event such   a connection cannot be obtained, certificate-using systems could   implement CRL processing logic as a fall-back position.   A denial of service vulnerability is evident with respect to a flood   of queries. The production of a cryptographic signature significantly   affects response generation cycle time, thereby exacerbating the   situation. Unsigned error responses open up the protocol to another   denial of service attack, where the attacker sends false error   responses.   The use of precomputed responses allows replay attacks in which an   old (good) response is replayed prior to its expiration date but   after the certificate has been revoked. Deployments of OCSP should   carefully evaluate the benefit of precomputed responses against the   probability of a replay attack and the costs associated with its   successful execution.   Requests do not contain the responder they are directed to. This   allows an attacker to replay a request to any number of OCSP   responders.   The reliance of HTTP caching in some deployment scenarios may result   in unexpected results if intermediate servers are incorrectly   configured or are known to possess cache management faults.   Implementors are advised to take the reliability of HTTP cache   mechanisms into account when deploying OCSP over HTTP.Myers, et al.               Standards Track                    [Page 14]RFC 2560                       PKIX OCSP                       June 19996.  References   [RFC2459] Housley, R., Ford, W., Polk, W. and D. Solo, "Internet             X.509 Public Key Infrastructure Certificate and CRL             Profile", RFC 2459, January 1999.   [HTTP]    Fielding, R., Gettys, J., Mogul, J., Frystyk, H. and T.             Berners-Lee, "Hypertext Transfer Protocol -- HTTP/1.1", RFC             2068, January 1997.   [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate             Requirement Levels", BCP 14, RFC 2119, March 1997.   [URL]     Berners-Lee, T., Masinter, L. and M. McCahill, "Uniform             Resource Locators (URL)", RFC 1738, December 1994.   [X.690]   ITU-T Recommendation X.690 (1994) | ISO/IEC 8825-1:1995,             Information Technology - ASN.1 encoding rules:             Specification of Basic Encoding Rules (BER), Canonical             Encoding Rules (CER) and Distinguished Encoding Rules             (DER).Myers, et al.               Standards Track                    [Page 15]RFC 2560                       PKIX OCSP                       June 19997.  Authors' Addresses   Michael Myers   VeriSign, Inc.   1350 Charleston Road   Mountain View, CA 94043   EMail: mmyers@verisign.com   Rich Ankney   CertCo, LLC   13506 King Charles Dr.   Chantilly, VA  20151   EMail: rankney@erols.com

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
欧美一区二区三区日韩视频| 亚洲一区在线观看视频| 亚洲精品乱码久久久久| 免费成人深夜小野草| 色久综合一二码| 国产欧美日韩亚州综合 | www.欧美日韩国产在线| 欧美美女网站色| 日韩一区在线免费观看| 久久se精品一区二区| 欧美日韩综合在线免费观看| 国产精品久久久久久久久免费桃花 | 日本道精品一区二区三区| 久久久久综合网| 免费欧美日韩国产三级电影| 在线视频观看一区| 国产精品电影一区二区三区| 国产中文字幕一区| 欧美一区二区在线免费观看| 亚洲第一成人在线| 在线观看日韩毛片| 亚洲综合自拍偷拍| 日本乱人伦aⅴ精品| 亚洲欧美色综合| 99精品一区二区三区| 国产精品国产自产拍高清av| www.日本不卡| 亚洲欧美日韩人成在线播放| 99精品欧美一区二区三区小说 | 欧美电影免费提供在线观看| 午夜精品爽啪视频| 91精品一区二区三区久久久久久| 亚洲国产成人av| 欧美日本一区二区| 丝袜亚洲另类欧美| 91精品久久久久久蜜臀| 日本三级亚洲精品| 精品国产乱码久久久久久牛牛| 韩国成人在线视频| 久久精品人人做人人综合| 国产在线一区观看| 国产拍揄自揄精品视频麻豆 | 国产精品影视天天线| 国产亚洲一本大道中文在线| 国产成人综合在线观看| 国产精品国产a级| 色哟哟亚洲精品| 亚洲主播在线播放| 精品国产凹凸成av人网站| 国内国产精品久久| 亚洲色图色小说| 日韩亚洲欧美一区二区三区| 国产在线精品一区二区三区不卡| 国产欧美精品一区二区色综合朱莉| 成人免费视频一区| 亚洲一卡二卡三卡四卡无卡久久 | 日本sm残虐另类| 久久久精品黄色| 色综合天天综合网天天看片| 亚洲成人1区2区| 久久一区二区视频| 色欧美片视频在线观看| 裸体歌舞表演一区二区| 中文字幕在线不卡| 日韩一区二区在线观看| 99re视频精品| 久久精品国产精品青草| 中文字幕一区二区三区不卡| 欧美福利一区二区| 成人永久aaa| 日韩一区精品字幕| 成人免费在线播放视频| 91精品国产入口| youjizz久久| 久久草av在线| 亚洲成人资源网| 中文字幕国产一区二区| 亚洲色图视频网站| 久久亚洲影视婷婷| 欧美日韩国产天堂| 91美女精品福利| 精品一区二区三区欧美| 一区二区三区波多野结衣在线观看| 日韩欧美精品三级| 欧美在线观看禁18| 处破女av一区二区| 国内精品国产三级国产a久久| 亚洲国产视频一区二区| 国产精品短视频| 337p日本欧洲亚洲大胆色噜噜| 欧美日本一区二区三区四区| 91免费版pro下载短视频| 精品一区二区在线播放| 日韩国产欧美视频| 亚洲成人av福利| 一个色综合av| 亚洲男人的天堂在线aⅴ视频| 亚洲国产精品传媒在线观看| 精品国产区一区| 91精品国产91久久综合桃花 | 国产91精品精华液一区二区三区| 日韩精品亚洲专区| 亚洲高清免费视频| 亚洲精品高清在线| 亚洲综合一区二区精品导航| 综合激情网...| 中文字幕亚洲一区二区av在线 | 国产高清成人在线| 国产乱国产乱300精品| 老色鬼精品视频在线观看播放| 日韩精品欧美成人高清一区二区| 亚洲欧美在线视频| 亚洲日本护士毛茸茸| 亚洲免费视频中文字幕| 亚洲视频免费在线| 亚洲精品大片www| 亚洲国产中文字幕在线视频综合| 亚洲一区二区美女| 日韩和欧美一区二区| 男人的j进女人的j一区| 久久99久久精品| 国产精品一区二区久久精品爱涩| 国产高清久久久久| 粗大黑人巨茎大战欧美成人| 99v久久综合狠狠综合久久| 色爱区综合激月婷婷| 在线免费观看日本欧美| 欧美精品 国产精品| 日韩欧美中文字幕制服| 久久青草欧美一区二区三区| 国产精品白丝在线| 亚洲在线视频免费观看| 天堂成人免费av电影一区| 久久疯狂做爰流白浆xx| 成人午夜视频网站| 色婷婷综合久色| 日韩欧美国产一区二区在线播放| 久久午夜电影网| 亚洲美女区一区| 三级欧美韩日大片在线看| 麻豆精品国产91久久久久久| 成人免费毛片a| 欧美日韩在线三级| 2欧美一区二区三区在线观看视频| 国产精品青草综合久久久久99| 亚洲午夜私人影院| 国产乱码字幕精品高清av| 一本久道久久综合中文字幕| 欧美二区乱c少妇| 亚洲国产精品成人综合 | 欧美一区二区三区喷汁尤物| 久久婷婷成人综合色| 亚洲精品免费在线播放| 美女脱光内衣内裤视频久久影院| k8久久久一区二区三区| 欧美一区二区三区男人的天堂| 国产欧美精品一区二区三区四区 | 欧美一区在线视频| 国产精品视频一二三| 五月天婷婷综合| 91视视频在线观看入口直接观看www | 欧美色成人综合| 国产精品污www在线观看| 日本不卡高清视频| 91啪亚洲精品| 久久久www免费人成精品| 日韩极品在线观看| 91视频国产资源| 精品国产成人系列| 调教+趴+乳夹+国产+精品| 不卡在线视频中文字幕| 日韩三区在线观看| 性做久久久久久免费观看| 97久久久精品综合88久久| 久久综合狠狠综合久久综合88| 亚洲国产日韩在线一区模特| 99精品欧美一区二区蜜桃免费 | 大尺度一区二区| 精品99999| 日韩电影免费一区| 欧美日韩黄色影视| 一区二区欧美在线观看| 白白色 亚洲乱淫| 国产精品理论在线观看| 福利一区在线观看| 国产三级久久久| 国产精品白丝jk白祙喷水网站| 欧美大度的电影原声| 天使萌一区二区三区免费观看| 色妹子一区二区| 亚洲欧美激情插| 99re这里只有精品视频首页| 国产精品天天看| 99久久免费精品| 亚洲男人的天堂在线aⅴ视频| 91在线观看下载| 亚洲精品免费在线| 欧美日韩精品一区二区三区四区| 亚洲国产一区在线观看| 欧美高清hd18日本|