亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? draft-ietf-pkix-roadmap-09.txt

?? PKIX的RFC英文文檔
?? TXT
?? 第 1 頁 / 共 5 頁
字號:
PKIX Working Group                                         A. Arsenault Internet Draft                                               Diversinet Document: draft-ietf-pkix-roadmap-09.txt                      S. Turner Expires: January, 2003                                             IECA                                                               July 2002              Internet X.509 Public Key Infrastructure: Roadmap   Status of this Memo        This document is an Internet-Draft and is in full conformance with    all provisions of Section 10 of [RFC2026].        This document is an Internet-Draft. Internet-Drafts are working    documents of the Internet Engineering Task Force (IETF), its areas,    and its working groups. Note that other groups may also distribute    working documents as Internet-Drafts.         Internet-Drafts are draft documents valid for a maximum of six    months and may be updated, replaced, or obsoleted by other documents    at any time. It is inappropriate to use Internet-Drafts as reference    material or to cite them other than as "work in progress."        The list of current Internet-Drafts can be accessed at    http://www.ietf.org/ietf/1id-abstracts.txt         The list of Internet-Draft Shadow Directories can be accessed at    http://www.ietf.org/shadow.html.        This draft is being discussed on the 'ietf-pkix' mailing list. To    subscribe, send a message to ietf-pkix-request@imc.org with the    single word subscribe in the body of the message. There is a Web    site for the mailing list at <http://www.imc.org/ietf-pkix/>.         Abstract        This document provides an overview or "roadmap" of the work done by    the IETF PKIX working group. It describes some of the terminology    used in the working group's documents, and the theory behind an    X.509-based Public Key Infrastructure, Privilege Management    Infrastructure (PMI), and Time Stamping and Data Certification    Infrastructures. It identifies each document developed by the PKIX    working group, and describes the relationships among the various    documents. It also provides advice to would-be PKIX implementors    about some of the issues discussed at length during PKIX development,    in hopes of making it easier to build implementations that will    actually interoperate.            Arsenault, Turner                                                    1  Internet-Draft                PKIX Roadmap                  July 2002    1 INTRODUCTION.....................................................3    1.1 THIS DOCUMENT..................................................3    1.2 TERMINOLOGY....................................................3    1.3 HISTORY........................................................5    2 PKI..............................................................8    2.1 THEORY.........................................................8    2.2 ARCHITECTURE MODEL.............................................9    2.3 PUBLIC KEY CERTIFICATES.......................................11    2.4 FUNCTIONS OF A PKI............................................11    2.4.1 REGISTRATION................................................11    2.4.2 INITIALIZATION..............................................12    2.4.3 CERTIFICATION...............................................12    2.4.4 KEY PAIR RECOVERY...........................................12    2.4.5 KEY GENERATION..............................................12    2.4.6 KEY UPDATE..................................................13    2.4.6.1 KEY EXPIRY................................................13    2.4.6.2 KEY COMPROMISE............................................13    2.4.7 CROSS-CERTIFICATION.........................................14    2.4.8 REVOCATION..................................................14    2.4.9 CERTIFICATE & REVOCATION NOTICE DISTRIBUTION & PUBLICATION..15    3 PMI.............................................................16    3.1 THEORY........................................................16    3.2 ARCHITECTURAL MODEL...........................................16    3.3 ATTRIBUTE CERTIFICATES........................................17    4 PKIX DOCUMENTS..................................................18    4.1 PROFILES......................................................18    4.2 OPERATIONAL PROTOCOLS.........................................22    4.3 MANAGEMENT PROTOCOLS..........................................25    4.4 POLICY OUTLINE................................................28    4.4 TIME STAMPING AND DATA CERTIFICATION..........................28    4.5 EXPIRED DRAFTS................................................32    5 IMPLEMENTATION ADVICE...........................................36    5.1 NAMES.........................................................36    5.1.1 NAME FORMS..................................................36    5.1.1.1 DISTINGUISHED NAMES.......................................36    5.1.1.2 SUBJECTALTNAME FORMS......................................37    5.1.1.2.1 INTERNET E-MAIL ADDRESSES...............................37    5.1.1.2.2 DNS NAMES...............................................38    5.1.1.2.4 URIS....................................................38    5.1.2 SCOPE OF NAMES..............................................38    5.1.3 CERTIFICATE PATH CONSTRUCTION...............................39    5.1.4 NAME CONSTRAINTS............................................40    5.1.4.1 RFC822NAMES...............................................41    5.1.4.2 DNSNAMES..................................................41    5.1.4.3 X.400 ADDRESSES...........................................42    5.1.4.5 DNS.......................................................42    5.1.4.6 URIS......................................................42    5.1.4.7 IPADDRESSES...............................................43    5.1.4.8 OTHERS....................................................43    5.1.5 WILDCARDS IN NAME FORMS.....................................43    5.1.6 NAME ENCODING...............................................44    5.2 POP...........................................................44    5.2.1 POP FOR SIGNING KEYS........................................44  Arsenault, Turner                                                    2  Internet-Draft                PKIX Roadmap                  July 2002    5.2.2 POP FOR KEY MANAGEMENT KEYS.................................45    5.3 KEY USAGE BITS................................................47    5.4 NON-REPUDIATION...............................................48    5.5 TRUST MODELS..................................................49    5.5.1 HIERARCHICAL................................................49    5.5.2 LOCAL/FEDERATION............................................49    5.5.3 ROOT REPOSITORY.............................................50    5.5.4 RP'S PERSPECTIVE............................................50    6 REFERENCES......................................................50    7 SECURITY CONSIDERATIONS.........................................54    8 ACKNOWLEDGEMENTS................................................55    9 AUTHOR'S ADDRESSES..............................................55         1 Introduction     1.1 This Document        This document is an informational Internet-Draft that provides a    "roadmap" to the documents produced by the PKIX working group. It is    intended to provide information; there are no requirements or    specifications in this document.        Section 1.2 of this document defines key terms used in this document.    Section 1.3 covers some of the basic history behind the PKIX working    group. Section 2 covers Public Key Infrastructure (PKI) theory and    functions. Section 3 covers Privilege Management Infrastructure (PMI)    theory and functions. Section 4 provides an overview of the various    PKIX documents. It identifies which documents address which areas,    and describes the relationships among the various documents. Section    5 contains "Advice to implementors." Its primary purpose is to    capture some of the major issues discussed by the PKIX working group,    as a way of explaining why some of the requirements and    specifications say what they say. This explaination should cut down    on the number of misinterpretations of the documents, and help    developers build interoperable implementations. Section 6 contains a    list of contributors we wish to thank. Section 7 provides a list    references. Section 8 discusses security considerations, and Section    9 provides contact information for the editors.         1.2 Terminology        There are a number of terms used and misused throughout PKI-related,    PMI-related, and Time Stamp and Data Certification literature. To    limit confusion caused by some of those terms, used throughout this    document, we will use the following terms in the following ways:          - Attribute Authority (AA) - An authority trusted by one or more        users to create and sign attribute certificates. It is important        to note that the AA is responsible for the attribute        certificates during their whole lifetime, not just for issuing        them.  Arsenault, Turner                                                    3  Internet-Draft                PKIX Roadmap                  July 2002            - Attribute Certificate (AC) - A data structure containing a set of        attributes for an end-entity and some other information, which        is digitally signed with the private key of the AA which issued        it.            - Certificate - Can refer to either an AC or a public key        certificate. Where there is no distinction made the context        should be assumed that the term could apply to both an AC or a        public key certificate.            - Certification Authority (CA) - An authority trusted by one or        more users to create and assign public key certificates.        Optionally the CA may create the user's keys. It is important to        note that the CA is responsible for the public key certificates        during their whole lifetime, not just for issuing them.            - Certificate Policy (CP) - A named set of rules that indicates the        applicability of a public key certificate to a particular        community or class of application with common security        requirements. For example, a particular certificate policy might        indicate applicability of a type of public key certificate to        the authentication of electronic data interchange transactions        for the trading of goods within a given price range.            - Certification Practice Statement (CPS) - A statement of the        practices which a CA employs in issuing public key certificates.            - End-entity - A subject of a certificate who is not a CA in the        PKI or an AA in the PMI. (An EE from the PKI can be an AA in the        PMI.)            - Public Key Certificate (PKC) - A data structure containing the        public key of an end-entity and some other information, which is        digitally signed with the private key of the CA which issued it.            - Public Key Infrastructure (PKI) - The set of hardware, software,        people, policies and procedures needed to create, manage, store,        distribute, and revoke PKCs based on public-key cryptography.            - Privilege Management Infrastructure (PMI) - A collection of ACs,        with their issuing AA's, subjects, relying parties, and        repositories, is referred to as a Privilege Management        Infrastructure.            - Registration Authority (RA) - An optional entity given        responsibility for performing some of the administrative tasks        necessary in the registration of subjects, such as: confirming        the subject's identity; validating that the subject is entitled        to have the values requested in a PKC; and verifying that the        subject has possession of the private key associated with the        public key requested for a PKC.        Arsenault, Turner                                                    4  Internet-Draft                PKIX Roadmap                  July 2002      - Relying party - A user or agent (e.g., a client or server) who        relies on the data in a certificate in making decisions.            - Root CA - A CA that is directly trusted by an EE; that is,        securely acquiring the value of a Root CA public key requires        some out-of-band step(s). This term is not meant to imply that a        Root CA is necessarily at the top of any hierarchy, simply that        the CA in question is trusted directly. Note that the term        'trust anchor' is commonly used with the same meaning as 'root        CA' in this document.            - Subordinate CA - A "subordinate CA" is one that is not a Root CA        for the EE in question. Often, a subordinate CA will not be a        Root CA for any entity but this is not mandatory.            - Subject - A subject is the entity (AA, CA, or EE) named in a        certificate, either a PKC or AC. Subjects can be human users,        computers (as represented by Domain Name Service (DNS) names or        Internet Protocol (IP) addresses), or even software agents.            - Time Stamp Authority (TSA) - A TSA is a trusted Third Party who        provides a "proof-of-existence" for a particular datum prior to        an instant in time.       

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
中文字幕在线观看一区| 婷婷成人综合网| 午夜天堂影视香蕉久久| 国产麻豆精品在线| 欧美日韩国产高清一区| 中文字幕亚洲不卡| 国产一区二区福利| 欧美一区二区三区四区在线观看| 国产精品久久久一本精品| 久久成人免费网站| 欧美军同video69gay| 中文字幕欧美一区| 久久99精品久久只有精品| 欧美三区在线观看| 亚洲国产视频一区| 91色视频在线| 国产精品国产三级国产专播品爱网 | 亚洲在线中文字幕| 97精品久久久久中文字幕| 国产偷国产偷亚洲高清人白洁| 同产精品九九九| 色久综合一二码| 国产精品久久久久一区二区三区共| 久久成人免费电影| 91精品国产91久久综合桃花| 亚洲永久精品国产| 91国偷自产一区二区三区观看| 国产精品乱人伦一区二区| 成人毛片老司机大片| 国产精品美女视频| 99久久精品一区二区| 中文字幕欧美区| 成人动漫av在线| 亚洲女人的天堂| 色久综合一二码| 香蕉久久夜色精品国产使用方法| 欧美一a一片一级一片| 亚洲电影一区二区| 3d动漫精品啪啪1区2区免费| 亚洲国产精品自拍| 4hu四虎永久在线影院成人| 亚洲sss视频在线视频| 7777精品伊人久久久大香线蕉的| 日韩成人精品视频| 久久先锋资源网| 成人av在线播放网址| 自拍偷拍国产精品| 精品视频123区在线观看| 亚洲成人你懂的| 欧美成人伊人久久综合网| 国产一区二区三区观看| 国产精品美女久久久久av爽李琼| 91啦中文在线观看| 天天综合网天天综合色| 精品国产一区二区三区不卡| 国产精品18久久久| 亚洲黄色尤物视频| 欧美一区二区视频在线观看 | 亚洲精品欧美激情| 欧美精品日韩综合在线| 极品少妇xxxx精品少妇偷拍| 中文天堂在线一区| 欧美日韩亚洲国产综合| 捆绑变态av一区二区三区| 国产精品免费视频网站| 欧美在线一区二区| 国产一区二区不卡老阿姨| 中文字幕一区二区三区在线不卡| 欧美日韩在线播放三区| 国产一区久久久| 亚洲国产日日夜夜| 久久精品视频在线免费观看| 色香色香欲天天天影视综合网| 男人操女人的视频在线观看欧美 | 国产suv一区二区三区88区| 中文字幕一区二区三区不卡| 欧美丰满高潮xxxx喷水动漫| 国产黄人亚洲片| 日韩专区中文字幕一区二区| 国产亚洲欧美在线| 777欧美精品| 91极品美女在线| 成人高清在线视频| 黄色日韩网站视频| 日本人妖一区二区| 一级日本不卡的影视| 久久久精品黄色| 日韩欧美一区二区视频| 91视频在线看| 国产91丝袜在线播放| 蜜桃视频一区二区三区| 亚洲亚洲精品在线观看| 国产精品大尺度| 国产亚洲一区二区三区四区| 制服丝袜日韩国产| 欧美日韩在线亚洲一区蜜芽| av在线一区二区| 不卡大黄网站免费看| 国产精品一线二线三线精华| 久久精品国产亚洲aⅴ| 亚洲成人资源网| 亚洲黄色小说网站| 国产精品国产三级国产| 国产日韩欧美综合在线| 亚洲精品一区二区三区在线观看| 91麻豆精品国产91| 欧美日韩亚洲综合在线 欧美亚洲特黄一级| 9色porny自拍视频一区二区| 国产不卡一区视频| 国产成人丝袜美腿| 国产剧情在线观看一区二区| 韩国理伦片一区二区三区在线播放| 日本最新不卡在线| 天堂资源在线中文精品| 三级在线观看一区二区| 日韩精品一区第一页| 视频一区二区三区在线| 免播放器亚洲一区| 国产一区二区导航在线播放| 国产一区二区女| caoporn国产精品| 色偷偷久久一区二区三区| 91蜜桃传媒精品久久久一区二区| 色综合久久综合网97色综合 | 亚洲精品高清视频在线观看| 日韩一区在线播放| 亚洲精品美国一| 亚洲成va人在线观看| 日本中文字幕一区| 精品制服美女丁香| 国产成人精品一区二区三区网站观看| 国产a精品视频| 91在线一区二区| 欧美片网站yy| 欧美精品一区二区三区蜜桃视频| 国产午夜精品一区二区三区四区| 国产女人水真多18毛片18精品视频| 国产精品久久久久7777按摩| 亚洲日本青草视频在线怡红院| 一区二区不卡在线视频 午夜欧美不卡在| 亚洲综合在线观看视频| 日本欧美久久久久免费播放网| 国产一区91精品张津瑜| av福利精品导航| 制服丝袜亚洲播放| 国产精品污网站| 亚洲成a人v欧美综合天堂下载| 精品一区二区三区香蕉蜜桃| 成人国产精品视频| 欧美人牲a欧美精品| 久久久99久久精品欧美| 亚洲与欧洲av电影| 国产一区91精品张津瑜| 在线精品观看国产| 久久久久久亚洲综合| 一区二区三区电影在线播| 久久99久国产精品黄毛片色诱| 99久久精品国产导航| 欧美一区二区人人喊爽| 国产精品久99| 激情综合网最新| 一本久久a久久精品亚洲| 精品对白一区国产伦| 亚洲综合在线观看视频| 福利一区福利二区| 91精品国产综合久久精品| 亚洲精品视频在线| 国产精品白丝jk白祙喷水网站| 欧美综合欧美视频| 国产精品美女久久久久aⅴ| 天堂一区二区在线| 色综合色综合色综合| 国产欧美日韩在线视频| 九九久久精品视频| 日韩一区二区三区观看| 亚洲日本va午夜在线影院| 国产精品一区2区| 欧美va亚洲va| 亚洲国产aⅴ天堂久久| 99精品桃花视频在线观看| 国产亚洲精品7777| 久久国产人妖系列| 欧美军同video69gay| 亚洲国产精品综合小说图片区| 91视频免费看| 国产精品色一区二区三区| 国产在线视频一区二区三区| 欧美一区二区成人6969| 天堂成人国产精品一区| 欧美色综合网站| 亚洲愉拍自拍另类高清精品| 91免费看`日韩一区二区| 国产精品国产三级国产普通话三级| 国产99久久久精品| 久久精品免费在线观看| 国产在线精品免费av| 国产色婷婷亚洲99精品小说| 国产精品一级在线| 国产精品视频一区二区三区不卡| 国产精品888|