亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關(guān)于我們
? 蟲蟲下載站

?? draft-ietf-pkix-roadmap-09.txt

?? PKIX的RFC英文文檔
?? TXT
?? 第 1 頁 / 共 5 頁
字號:
PKIX Working Group                                         A. Arsenault Internet Draft                                               Diversinet Document: draft-ietf-pkix-roadmap-09.txt                      S. Turner Expires: January, 2003                                             IECA                                                               July 2002              Internet X.509 Public Key Infrastructure: Roadmap   Status of this Memo        This document is an Internet-Draft and is in full conformance with    all provisions of Section 10 of [RFC2026].        This document is an Internet-Draft. Internet-Drafts are working    documents of the Internet Engineering Task Force (IETF), its areas,    and its working groups. Note that other groups may also distribute    working documents as Internet-Drafts.         Internet-Drafts are draft documents valid for a maximum of six    months and may be updated, replaced, or obsoleted by other documents    at any time. It is inappropriate to use Internet-Drafts as reference    material or to cite them other than as "work in progress."        The list of current Internet-Drafts can be accessed at    http://www.ietf.org/ietf/1id-abstracts.txt         The list of Internet-Draft Shadow Directories can be accessed at    http://www.ietf.org/shadow.html.        This draft is being discussed on the 'ietf-pkix' mailing list. To    subscribe, send a message to ietf-pkix-request@imc.org with the    single word subscribe in the body of the message. There is a Web    site for the mailing list at <http://www.imc.org/ietf-pkix/>.         Abstract        This document provides an overview or "roadmap" of the work done by    the IETF PKIX working group. It describes some of the terminology    used in the working group's documents, and the theory behind an    X.509-based Public Key Infrastructure, Privilege Management    Infrastructure (PMI), and Time Stamping and Data Certification    Infrastructures. It identifies each document developed by the PKIX    working group, and describes the relationships among the various    documents. It also provides advice to would-be PKIX implementors    about some of the issues discussed at length during PKIX development,    in hopes of making it easier to build implementations that will    actually interoperate.            Arsenault, Turner                                                    1  Internet-Draft                PKIX Roadmap                  July 2002    1 INTRODUCTION.....................................................3    1.1 THIS DOCUMENT..................................................3    1.2 TERMINOLOGY....................................................3    1.3 HISTORY........................................................5    2 PKI..............................................................8    2.1 THEORY.........................................................8    2.2 ARCHITECTURE MODEL.............................................9    2.3 PUBLIC KEY CERTIFICATES.......................................11    2.4 FUNCTIONS OF A PKI............................................11    2.4.1 REGISTRATION................................................11    2.4.2 INITIALIZATION..............................................12    2.4.3 CERTIFICATION...............................................12    2.4.4 KEY PAIR RECOVERY...........................................12    2.4.5 KEY GENERATION..............................................12    2.4.6 KEY UPDATE..................................................13    2.4.6.1 KEY EXPIRY................................................13    2.4.6.2 KEY COMPROMISE............................................13    2.4.7 CROSS-CERTIFICATION.........................................14    2.4.8 REVOCATION..................................................14    2.4.9 CERTIFICATE & REVOCATION NOTICE DISTRIBUTION & PUBLICATION..15    3 PMI.............................................................16    3.1 THEORY........................................................16    3.2 ARCHITECTURAL MODEL...........................................16    3.3 ATTRIBUTE CERTIFICATES........................................17    4 PKIX DOCUMENTS..................................................18    4.1 PROFILES......................................................18    4.2 OPERATIONAL PROTOCOLS.........................................22    4.3 MANAGEMENT PROTOCOLS..........................................25    4.4 POLICY OUTLINE................................................28    4.4 TIME STAMPING AND DATA CERTIFICATION..........................28    4.5 EXPIRED DRAFTS................................................32    5 IMPLEMENTATION ADVICE...........................................36    5.1 NAMES.........................................................36    5.1.1 NAME FORMS..................................................36    5.1.1.1 DISTINGUISHED NAMES.......................................36    5.1.1.2 SUBJECTALTNAME FORMS......................................37    5.1.1.2.1 INTERNET E-MAIL ADDRESSES...............................37    5.1.1.2.2 DNS NAMES...............................................38    5.1.1.2.4 URIS....................................................38    5.1.2 SCOPE OF NAMES..............................................38    5.1.3 CERTIFICATE PATH CONSTRUCTION...............................39    5.1.4 NAME CONSTRAINTS............................................40    5.1.4.1 RFC822NAMES...............................................41    5.1.4.2 DNSNAMES..................................................41    5.1.4.3 X.400 ADDRESSES...........................................42    5.1.4.5 DNS.......................................................42    5.1.4.6 URIS......................................................42    5.1.4.7 IPADDRESSES...............................................43    5.1.4.8 OTHERS....................................................43    5.1.5 WILDCARDS IN NAME FORMS.....................................43    5.1.6 NAME ENCODING...............................................44    5.2 POP...........................................................44    5.2.1 POP FOR SIGNING KEYS........................................44  Arsenault, Turner                                                    2  Internet-Draft                PKIX Roadmap                  July 2002    5.2.2 POP FOR KEY MANAGEMENT KEYS.................................45    5.3 KEY USAGE BITS................................................47    5.4 NON-REPUDIATION...............................................48    5.5 TRUST MODELS..................................................49    5.5.1 HIERARCHICAL................................................49    5.5.2 LOCAL/FEDERATION............................................49    5.5.3 ROOT REPOSITORY.............................................50    5.5.4 RP'S PERSPECTIVE............................................50    6 REFERENCES......................................................50    7 SECURITY CONSIDERATIONS.........................................54    8 ACKNOWLEDGEMENTS................................................55    9 AUTHOR'S ADDRESSES..............................................55         1 Introduction     1.1 This Document        This document is an informational Internet-Draft that provides a    "roadmap" to the documents produced by the PKIX working group. It is    intended to provide information; there are no requirements or    specifications in this document.        Section 1.2 of this document defines key terms used in this document.    Section 1.3 covers some of the basic history behind the PKIX working    group. Section 2 covers Public Key Infrastructure (PKI) theory and    functions. Section 3 covers Privilege Management Infrastructure (PMI)    theory and functions. Section 4 provides an overview of the various    PKIX documents. It identifies which documents address which areas,    and describes the relationships among the various documents. Section    5 contains "Advice to implementors." Its primary purpose is to    capture some of the major issues discussed by the PKIX working group,    as a way of explaining why some of the requirements and    specifications say what they say. This explaination should cut down    on the number of misinterpretations of the documents, and help    developers build interoperable implementations. Section 6 contains a    list of contributors we wish to thank. Section 7 provides a list    references. Section 8 discusses security considerations, and Section    9 provides contact information for the editors.         1.2 Terminology        There are a number of terms used and misused throughout PKI-related,    PMI-related, and Time Stamp and Data Certification literature. To    limit confusion caused by some of those terms, used throughout this    document, we will use the following terms in the following ways:          - Attribute Authority (AA) - An authority trusted by one or more        users to create and sign attribute certificates. It is important        to note that the AA is responsible for the attribute        certificates during their whole lifetime, not just for issuing        them.  Arsenault, Turner                                                    3  Internet-Draft                PKIX Roadmap                  July 2002            - Attribute Certificate (AC) - A data structure containing a set of        attributes for an end-entity and some other information, which        is digitally signed with the private key of the AA which issued        it.            - Certificate - Can refer to either an AC or a public key        certificate. Where there is no distinction made the context        should be assumed that the term could apply to both an AC or a        public key certificate.            - Certification Authority (CA) - An authority trusted by one or        more users to create and assign public key certificates.        Optionally the CA may create the user's keys. It is important to        note that the CA is responsible for the public key certificates        during their whole lifetime, not just for issuing them.            - Certificate Policy (CP) - A named set of rules that indicates the        applicability of a public key certificate to a particular        community or class of application with common security        requirements. For example, a particular certificate policy might        indicate applicability of a type of public key certificate to        the authentication of electronic data interchange transactions        for the trading of goods within a given price range.            - Certification Practice Statement (CPS) - A statement of the        practices which a CA employs in issuing public key certificates.            - End-entity - A subject of a certificate who is not a CA in the        PKI or an AA in the PMI. (An EE from the PKI can be an AA in the        PMI.)            - Public Key Certificate (PKC) - A data structure containing the        public key of an end-entity and some other information, which is        digitally signed with the private key of the CA which issued it.            - Public Key Infrastructure (PKI) - The set of hardware, software,        people, policies and procedures needed to create, manage, store,        distribute, and revoke PKCs based on public-key cryptography.            - Privilege Management Infrastructure (PMI) - A collection of ACs,        with their issuing AA's, subjects, relying parties, and        repositories, is referred to as a Privilege Management        Infrastructure.            - Registration Authority (RA) - An optional entity given        responsibility for performing some of the administrative tasks        necessary in the registration of subjects, such as: confirming        the subject's identity; validating that the subject is entitled        to have the values requested in a PKC; and verifying that the        subject has possession of the private key associated with the        public key requested for a PKC.        Arsenault, Turner                                                    4  Internet-Draft                PKIX Roadmap                  July 2002      - Relying party - A user or agent (e.g., a client or server) who        relies on the data in a certificate in making decisions.            - Root CA - A CA that is directly trusted by an EE; that is,        securely acquiring the value of a Root CA public key requires        some out-of-band step(s). This term is not meant to imply that a        Root CA is necessarily at the top of any hierarchy, simply that        the CA in question is trusted directly. Note that the term        'trust anchor' is commonly used with the same meaning as 'root        CA' in this document.            - Subordinate CA - A "subordinate CA" is one that is not a Root CA        for the EE in question. Often, a subordinate CA will not be a        Root CA for any entity but this is not mandatory.            - Subject - A subject is the entity (AA, CA, or EE) named in a        certificate, either a PKC or AC. Subjects can be human users,        computers (as represented by Domain Name Service (DNS) names or        Internet Protocol (IP) addresses), or even software agents.            - Time Stamp Authority (TSA) - A TSA is a trusted Third Party who        provides a "proof-of-existence" for a particular datum prior to        an instant in time.       

?? 快捷鍵說明

復(fù)制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
欧美人动与zoxxxx乱| 成人永久看片免费视频天堂| 欧美日韩一区 二区 三区 久久精品| 久久久三级国产网站| 国产精品一区二区三区四区| 久久精品一区二区三区四区| 高清不卡一区二区在线| 国产精品动漫网站| 欧美日韩成人综合天天影院| 久久精品国产第一区二区三区| 精品国内片67194| 成人h版在线观看| 夜夜爽夜夜爽精品视频| 欧美一区午夜精品| 国产91丝袜在线播放| 亚洲久本草在线中文字幕| 欧美丰满一区二区免费视频| 久久精品国产精品亚洲综合| 亚洲欧洲www| 在线成人免费观看| 国产成人午夜99999| 一区二区三区在线免费播放| 欧美电影免费提供在线观看| 99久久综合国产精品| 久久久久久麻豆| 亚洲h在线观看| 久久日韩粉嫩一区二区三区| 色先锋久久av资源部| 六月丁香婷婷久久| 亚洲欧美日韩在线播放| 欧美一区二区三区影视| 99国产精品久| 激情综合色综合久久综合| 亚洲免费观看高清完整版在线| 91精品婷婷国产综合久久性色| 国产成人亚洲综合a∨婷婷图片 | 久久精品日韩一区二区三区| 99久久久免费精品国产一区二区| 免费在线观看成人| 亚洲视频在线一区二区| 精品精品国产高清一毛片一天堂| 色婷婷av一区| 国产成人精品亚洲日本在线桃色| 婷婷六月综合亚洲| 亚洲视频香蕉人妖| 久久久久成人黄色影片| 7799精品视频| 欧美亚洲国产怡红院影院| 国产盗摄精品一区二区三区在线| 天堂成人免费av电影一区| 国产精品国产三级国产有无不卡| 日韩一区国产二区欧美三区| 欧美性极品少妇| 99re这里只有精品首页| 国产九色精品成人porny| 日韩va欧美va亚洲va久久| 亚洲乱码中文字幕| 国产精品国产三级国产aⅴ无密码 国产精品国产三级国产aⅴ原创 | 亚洲电影一区二区三区| 中文字幕+乱码+中文字幕一区| 欧美大片日本大片免费观看| 欧美日韩精品一区二区三区蜜桃 | 欧洲生活片亚洲生活在线观看| 国产精品一区二区黑丝 | 欧美性猛片aaaaaaa做受| www.亚洲国产| 国产99久久久国产精品免费看| 久久精品av麻豆的观看方式| 午夜a成v人精品| 亚洲国产婷婷综合在线精品| 亚洲精品成人精品456| 亚洲欧美国产高清| 亚洲人精品一区| 亚洲精品免费在线| 亚洲伊人伊色伊影伊综合网 | 一级中文字幕一区二区| 国产精品区一区二区三区| 国产喷白浆一区二区三区| 中文字幕国产一区| 中文字幕av免费专区久久| 国产精品久久久久影院亚瑟| 亚洲视频1区2区| 樱花草国产18久久久久| 艳妇臀荡乳欲伦亚洲一区| 亚洲一区二区三区四区中文字幕| 亚洲激情图片小说视频| 亚洲福中文字幕伊人影院| 日韩精品欧美精品| 九九热在线视频观看这里只有精品| 九九**精品视频免费播放| 国产成人精品午夜视频免费| 99国产欧美另类久久久精品| 色94色欧美sute亚洲线路一久 | 成人高清免费在线播放| 99精品视频在线观看| 在线观看一区二区视频| 欧美挠脚心视频网站| 欧美哺乳videos| 国产精品无圣光一区二区| 亚洲天堂网中文字| 香蕉乱码成人久久天堂爱免费| 蜜臀av国产精品久久久久| 韩国精品一区二区| 色欧美日韩亚洲| 日韩一级成人av| 国产精品美日韩| 亚洲成人久久影院| 国产一级精品在线| 91激情五月电影| 日韩欧美成人一区二区| 日韩一区在线看| 蜜桃精品在线观看| 成人ar影院免费观看视频| 欧美久久久久免费| 亚洲国产高清在线| 首页国产欧美日韩丝袜| 成人黄页在线观看| 欧美一区二区大片| 亚洲日本在线视频观看| 久久综合综合久久综合| 97国产一区二区| 欧美videos中文字幕| 亚洲精品第1页| 国产麻豆精品在线| 欧美色中文字幕| 中文字幕不卡的av| 麻豆国产精品一区二区三区 | 肉色丝袜一区二区| 国产**成人网毛片九色 | 在线亚洲免费视频| 国产午夜精品久久久久久免费视 | 成人免费毛片app| 91精品国产综合久久香蕉麻豆| 国产精品免费免费| 精品一区二区日韩| 欧美美女黄视频| 亚洲色图丝袜美腿| 国产大陆亚洲精品国产| 日韩视频123| 无吗不卡中文字幕| 一道本成人在线| 国产精品成人免费| 国产乱色国产精品免费视频| 欧美久久久久免费| 亚洲国产一区二区三区| 91国偷自产一区二区开放时间| 亚洲国产精品t66y| 国产精品一区二区久激情瑜伽 | 欧美视频一区在线观看| 日本一区二区三区国色天香 | 午夜久久电影网| 色婷婷综合久久| 国产精品电影一区二区三区| 国产成人精品aa毛片| 久久视频一区二区| 国内精品免费在线观看| 日韩视频免费观看高清在线视频| 亚洲www啪成人一区二区麻豆| 色呦呦日韩精品| 国产精品电影院| 97久久精品人人做人人爽| 亚洲天堂精品在线观看| eeuss鲁片一区二区三区| 国产欧美一区视频| 国产精品一区二区久久不卡| 久久久久久久久久看片| 国产精品自在欧美一区| 国产午夜亚洲精品羞羞网站| 国产激情91久久精品导航| 欧美国产综合色视频| 丁香桃色午夜亚洲一区二区三区| 国产婷婷色一区二区三区四区| 国产在线精品一区二区夜色| 久久久久综合网| 国产成人午夜片在线观看高清观看| 久久精品欧美日韩精品| www.日韩av| 亚洲欧美日韩一区| 欧美午夜电影网| 五月综合激情网| 精品免费99久久| 国产成人夜色高潮福利影视| 最新热久久免费视频| 欧美午夜寂寞影院| 久久国产精品99久久久久久老狼| 精品国产髙清在线看国产毛片| 国产在线精品一区二区三区不卡| 久久欧美一区二区| 99精品视频在线免费观看| 亚洲成人av一区二区三区| 日韩欧美一区在线| 国产suv精品一区二区883| 综合av第一页| 91麻豆精品国产91久久久更新时间| 久久99精品国产麻豆婷婷洗澡| 国产亚洲短视频| 欧洲精品一区二区| 久久99精品网久久| 日韩毛片高清在线播放| 欧美一区二区三区四区久久|