亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? rfc2585.txt

?? PKIX的RFC英文文檔
?? TXT
字號:
Network Working Group                                        R. HousleyRequest for Comments: 2585                                       SPYRUSCategory: Standards Track                                    P. Hoffman                                                                    IMC                                                               May 1999                Internet X.509 Public Key Infrastructure                  Operational Protocols: FTP and HTTPStatus of this Memo   This document specifies an Internet standards track protocol for the   Internet community, and requests discussion and suggestions for   improvements.  Please refer to the current edition of the "Internet   Official Protocol Standards" (STD 1) for the standardization state   and status of this protocol.  Distribution of this memo is unlimited.Copyright Notice   Copyright (C) The Internet Society (1999).  All Rights Reserved.Abstract   The protocol conventions described in this document satisfy some of   the operational requirements of the Internet Public Key   Infrastructure (PKI).  This document specifies the conventions for   using the File Transfer Protocol (FTP) and the Hypertext Transfer   Protocol (HTTP) to obtain certificates and certificate revocation   lists (CRLs) from PKI repositories.  Additional mechanisms addressing   PKIX operational requirements are specified in separate documents.1  Introduction   This specification is part of a multi-part standard for the Internet   Public Key Infrastructure (PKI) using X.509 certificates and   certificate revocation lists (CRLs).  This document specifies the   conventions for using the File Transfer Protocol (FTP) and the   Hypertext Transfer Protocol (HTTP) to obtain certificates and CRLs   from PKI repositories.  Additional mechanisms addressing PKI   repository access are specified in separate documents.Housley & Hoffman           Standards Track                     [Page 1]RFC 2585       PKIX Operational Protocols:  FTP and HTTP        May 19991.1. Model   The following is a simplified view of the architectural model assumed   by the Internet PKI specifications.      +---+      | C |                       +------------+      | e | <-------------------->| End entity |      | r |       Operational     +------------+      | t |       transactions          ^      |   |      and management         |  Management      | / |       transactions          |  transactions      |   |                             |                PKI users      | C |                             v      | R |       -------------------+--+-----------+-----------------      | L |                          ^              ^      |   |                          |              |   PKI management      |   |                          v              |       entities      | R |                       +------+          |      | e | <---------------------| RA   | <---+    |      | p |  Publish certificate  +------+     |    |      | o |                                    |    |      | s |                                    |    |      | I |                                    v    v      | t |                                +------------+      | o | <------------------------------|     CA     |      | r |   Publish certificate          +------------+      | y |   Publish CRL                         ^      |   |                                       |      +---+                        Management     |                                   transactions   |                                                  v                                              +------+                                              |  CA  |                                              +------+   The components in this model are:   End Entity:  user of PKI certificates and/or end user system that is                the subject of a certificate;   CA:          certification authority;   RA:          registration authority, i.e., an optional system to                which a CA delegates certain management functions;Housley & Hoffman           Standards Track                     [Page 2]RFC 2585       PKIX Operational Protocols:  FTP and HTTP        May 1999   Repository:  a system or collection of distributed systems that store                certificates and CRLs and serves as a means of                distributing these certificates and CRLs to end                entities.1.2.  Certificate and CRL Repository   Some CAs mandate the use of on-line validation services, while others   distribute CRLs to allow certificate users to perform certificate   validation themselves.  In general, CAs make CRLs available to   certificate users by publishing them in the Directory.  The Directory   is also the normal distribution mechanism for certificates.  However,   Directory Services are not available in many parts of the Internet   today. The File Transfer Protocol (FTP) defined in RFC 959 and the   Hypertext Transfer Protocol (HTTP) defined in RFC 2068 offer   alternate methods for certificate and CRL distribution.   End entities and CAs may retrieve certificates and CRLs from the   repository using FTP or HTTP.  End entities may publish their own   certificate in the repository using FTP or HTTP, and RAs and CAs may   publish certificates and CRLs in the repository using FTP or HTTP.2  FTP Conventions   Within certificate extensions and CRL extensions, the URI form of   GeneralName is used to specify the location where issuer certificates   and CRLs may be obtained.  For instance, a URI identifying the   subject of a certificate may be carried in subjectAltName certificate   extension. An IA5String describes the use of anonymous FTP to fetch   certificate or CRL information.  For example:      ftp://ftp.netcom.com/sp/spyrus/housley.cer      ftp://ftp.your.org/pki/id48.cer      ftp://ftp.your.org/pki/id48.no42.crl   Internet users may publish the URI reference to a file that contains   their certificate on their business card.  This practice is useful   when there is no Directory entry for that user.  FTP is widely   deployed, and anonymous FTP are accommodated by many firewalls.   Thus, FTP is an attractive alternative to Directory access protocols   for certificate and CRL distribution.  While this service satisfies   the requirement to retrieve information related to a certificate   which is already identified by a URI, it is not intended to satisfy   the more general problem of finding a certificate for a user about   whom some other information, such as their electronic mail address or   corporate affiliation, is known.Housley & Hoffman           Standards Track                     [Page 3]RFC 2585       PKIX Operational Protocols:  FTP and HTTP        May 1999   For convenience, the names of files that contain certificates should   have a suffix of ".cer".  Each ".cer" file contains exactly one   certificate, encoded in DER format.  Likewise, the names of files   that contain CRLs should have a suffix of ".crl".  Each ".crl" file   contains exactly one CRL, encoded in DER format.3  HTTP Conventions   Within certificate extensions and CRL extensions, the URI form of   GeneralName is used to specify the location where issuer certificates   and CRLs may be obtained.  For instance, a URI identifying the   subject of a certificate may be carried in subjectAltName certificate   extension. An IA5String describes the use of HTTP to fetch   certificate or CRL information.  For example:      http://www.netcom.com/sp/spyrus/housley.cer      http://www.your.org/pki/id48.cer      http://www.your.org/pki/id48.no42.crl   Internet users may publish the URI reference to a file that contains   their certificate on their business card.  This practice is useful   when there is no Directory entry for that user.  HTTP is widely   deployed, and HTTP is accommodated by many firewalls.  Thus, HTTP is   an attractive alternative to Directory access protocols for   certificate and CRL distribution.  While this service satisfies the   requirement to retrieve information related to a certificate which is   already identified by a URI, it is not intended to satisfy the more   general problem of finding a certificate for a user about whom some   other information, such as their electronic mail address or corporate   affiliation, is known.   For convenience, the names of files that contain certificates should   have a suffix of ".cer".  Each ".cer" file contains exactly one   certificate, encoded in DER format.  Likewise, the names of files   that contain CRLs should have a suffix of ".crl".  Each ".crl" file   contains exactly one CRL, encoded in DER format.4  MIME registrations   Two MIME types are defined to support the transfer of certificates   and CRLs.  They are:      application/pkix-cert      application/pkix-crlHousley & Hoffman           Standards Track                     [Page 4]RFC 2585       PKIX Operational Protocols:  FTP and HTTP        May 19994.1. application/pkix-cert   To: ietf-types@iana.org   Subject: Registration of MIME media type application/pkix-cert   MIME media type name: application   MIME subtype name: pkix-cert   Required parameters: None   Optional parameters: version (default value is "1")   Encoding considerations: will be none for 8-bit transports and most   likely Base64 for SMTP or other 7-bit transports   Security considerations: Carries a cryptographic certificate   Interoperability considerations: None   Published specification: draft-ietf-pkix-ipki-part1   Applications which use this media type: Any MIME-complaint transport   Additional information:     Magic number(s): None     File extension(s): .CER     Macintosh File Type Code(s): none   Person & email address to contact for further information:   Russ Housley <housley@spyrus.com>   Intended usage: COMMON   Author/Change controller:   Russ Housley <housley@spyrus.com>4.2. application/pkix-crl   To: ietf-types@iana.org   Subject: Registration of MIME media type application/pkix-crl   MIME media type name: application   MIME subtype name: pkix-crl   Required parameters: NoneHousley & Hoffman           Standards Track                     [Page 5]RFC 2585       PKIX Operational Protocols:  FTP and HTTP        May 1999   Optional parameters: version (default value is "1")   Encoding considerations: will be none for 8-bit transports and most   likely Base64 for SMTP or other 7-bit transports   Security considerations: Carries a cryptographic certificate   revocation list   Interoperability considerations: None   Published specification: draft-ietf-pkix-ipki-part1   Applications which use this media type: Any MIME-complaint transport   Additional information:     Magic number(s): None     File extension(s): .CRL     Macintosh File Type Code(s): none   Person & email address to contact for further information:   Russ Housley <housley@spyrus.com>   Intended usage: COMMON   Author/Change controller:   Russ Housley <housley@spyrus.com>References   [RFC 959]   Postel, J. and J. Reynolds, "File Transfer Protocol (FTP)",               STD 5, RFC 959, October 1985.   [RFC 1738]  Berners-Lee, T., Masinter, L. and M. McCahill, "Uniform               Resource Locators (URL)", RFC 1738, December 1994.   [RFC 2068]  Fielding, R., Gettys, J., Mogul, J., Frystyk, H. and               T. Berners-Lee; "Hypertext Transfer Protocol -- HTTP/1.1",               RFC 2068, January 1997.Security Considerations   Since certificates and CRLs are digitally signed, no additional   integrity service is necessary.  Neither certificates nor CRLs need   be kept secret, and anonymous access to certificates and CRLs is   generally acceptable.  Thus, no privacy service is necessary.Housley & Hoffman           Standards Track                     [Page 6]RFC 2585       PKIX Operational Protocols:  FTP and HTTP        May 1999   HTTP caching proxies are common on the Internet, and some proxies do   not check for the latest version of an object correctly. If an HTTP   request for a certificate or CRL goes through a misconfigured or   otherwise broken proxy, the proxy may return an out-of-date response.   Operators of FTP sites and World Wide Web servers should authenticate   end entities who publish certificates as well as CAs and RAs who   publish certificates and CRLs.  However, authentication is not   necessary to retrieve certificates and CRLs.Authors' Addresses   Russell Housley   SPYRUS   381 Elden Street, Suite 1120   Herndon, VA 20170 USA   EMail: housley@spyrus.com   Paul Hoffman   Internet Mail Consortium   127 Segre Place   Santa Cruz, CA 95060 USA   EMail: phoffman@imc.orgHousley & Hoffman           Standards Track                     [Page 7]RFC 2585       PKIX Operational Protocols:  FTP and HTTP        May 1999Full Copyright Statement   Copyright (C) The Internet Society (1999).  All Rights Reserved.   This document and translations of it may be copied and furnished to   others, and derivative works that comment on or otherwise explain it   or assist in its implementation may be prepared, copied, published   and distributed, in whole or in part, without restriction of any   kind, provided that the above copyright notice and this paragraph are   included on all such copies and derivative works.  However, this   document itself may not be modified in any way, such as by removing   the copyright notice or references to the Internet Society or other   Internet organizations, except as needed for the purpose of   developing Internet standards in which case the procedures for   copyrights defined in the Internet Standards process must be   followed, or as required to translate it into languages other than   English.   The limited permissions granted above are perpetual and will not be   revoked by the Internet Society or its successors or assigns.   This document and the information contained herein is provided on an   "AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING   TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING   BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION   HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF   MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.Acknowledgement   Funding for the RFC Editor function is currently provided by the   Internet Society.Housley & Hoffman           Standards Track                     [Page 8]

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
欧美高清视频在线高清观看mv色露露十八| 亚洲成人你懂的| 国产一区不卡视频| 久久综合av免费| 国产精品一二三四区| 久久精品欧美一区二区三区不卡 | eeuss鲁一区二区三区| 国产精品久久久久一区二区三区 | 色婷婷av一区二区三区大白胸 | 国产69精品久久99不卡| 欧美极品美女视频| 色婷婷久久综合| 青青草国产精品97视觉盛宴| 精品国产乱码久久久久久免费| 国产精品888| 亚洲卡通动漫在线| 91精品国产91综合久久蜜臀| 国产一区二区主播在线| 国产精品久久久久久久久动漫 | av不卡在线播放| 亚洲国产精品一区二区尤物区| 91精品午夜视频| 高清久久久久久| 亚洲一级在线观看| 国产日韩精品一区二区三区在线| 不卡视频在线观看| 日韩高清欧美激情| 国产精品色噜噜| 在线不卡免费av| 成人97人人超碰人人99| 日本v片在线高清不卡在线观看| 欧美激情综合五月色丁香| 欧美日韩激情在线| www.久久久久久久久| 青青草精品视频| 亚洲精品国产精华液| 26uuu精品一区二区三区四区在线| 色综合久久66| 国产成人av网站| 日韩av成人高清| 亚洲三级在线免费观看| 精品福利视频一区二区三区| 日本乱人伦一区| 成人自拍视频在线| 欧美aaa在线| 一区二区激情视频| 中文字幕一区av| 国产亚洲成av人在线观看导航 | 狂野欧美性猛交blacked| |精品福利一区二区三区| 欧美成人在线直播| 精品污污网站免费看| 成人黄色一级视频| 国产精品77777| 久久精品久久精品| 日韩av一级电影| 亚洲综合在线视频| 亚洲女人****多毛耸耸8| 国产欧美一区二区精品仙草咪| 欧美疯狂性受xxxxx喷水图片| 一本在线高清不卡dvd| 成人国产一区二区三区精品| 国产一区二区在线影院| 久久精品国产亚洲aⅴ| 天堂一区二区在线| 亚洲一级不卡视频| 夜夜亚洲天天久久| 亚洲精品成人在线| 亚洲天堂网中文字| 亚洲欧美日韩久久| 亚洲三级久久久| 一区二区三区四区在线免费观看 | 国产精华液一区二区三区| 久久99这里只有精品| 另类调教123区| 国产一区二区三区蝌蚪| 狠狠色丁香婷婷综合久久片| 看国产成人h片视频| 韩国欧美国产一区| 国产成人综合视频| 国产成人精品免费网站| 成人一区二区三区中文字幕| 成人性生交大片免费看中文网站| 国产不卡一区视频| av中文字幕不卡| 91福利精品视频| 欧美精品日韩一本| 欧美一二三四在线| 久久新电视剧免费观看| 欧美精品一区二区三区蜜桃视频| 久久这里都是精品| 国产精品护士白丝一区av| 亚洲欧美另类在线| 天使萌一区二区三区免费观看| 丝袜a∨在线一区二区三区不卡| 琪琪久久久久日韩精品| 精品一区二区三区蜜桃| 成人av片在线观看| 欧美亚洲丝袜传媒另类| 日韩免费福利电影在线观看| 精品国产免费一区二区三区香蕉| 国产日韩欧美亚洲| 亚洲一区中文日韩| 美女脱光内衣内裤视频久久网站 | 在线观看亚洲成人| 这里是久久伊人| 久久久噜噜噜久久人人看| 国产精品青草综合久久久久99| 亚洲欧美韩国综合色| 日本成人在线看| 成人动漫视频在线| 在线播放91灌醉迷j高跟美女 | 91色乱码一区二区三区| 在线视频观看一区| 日韩视频免费观看高清在线视频| 久久先锋影音av鲁色资源网| 亚洲欧美一区二区三区孕妇| 蜜臀久久99精品久久久久宅男| 丰满亚洲少妇av| 91精品国产综合久久香蕉的特点| 国产日韩欧美精品综合| 亚洲成精国产精品女| 风间由美中文字幕在线看视频国产欧美| 欧美中文字幕不卡| 国产日韩亚洲欧美综合| 午夜精品福利一区二区三区蜜桃| 国产在线不卡视频| 精品视频1区2区3区| 国产精品入口麻豆九色| 美女视频黄久久| 欧美在线一二三| 国产精品久久久久婷婷二区次| 日韩精品欧美精品| 色先锋久久av资源部| 国产亚洲美州欧州综合国| 日韩电影在线观看电影| 91蜜桃在线免费视频| 国产三级欧美三级日产三级99 | 日本不卡1234视频| 欧美亚洲国产bt| 中文字幕av一区二区三区免费看| 五月天欧美精品| 在线日韩av片| 日韩毛片高清在线播放| 国产精品996| xf在线a精品一区二区视频网站| 亚洲电影第三页| 欧美亚洲国产bt| 亚洲精品国产精品乱码不99| 成人免费视频国产在线观看| 日韩欧美国产麻豆| 蜜桃视频在线一区| 7777精品伊人久久久大香线蕉完整版| 国产精品二三区| 风流少妇一区二区| 久久先锋影音av鲁色资源网| 视频一区二区三区在线| 在线看日韩精品电影| 亚洲精品少妇30p| 91丨porny丨国产入口| 中文字幕在线视频一区| 成人免费视频一区二区| 中文字幕第一区第二区| 高清不卡在线观看| 国产精品剧情在线亚洲| 成人av在线电影| 亚洲欧美日韩国产综合在线| 日韩美女主播在线视频一区二区三区| 日韩av不卡一区二区| 欧美一区二区久久| 日本视频一区二区三区| 日韩欧美综合一区| 精品一区二区av| 久久久精品一品道一区| 成人自拍视频在线观看| 中文字幕一区二区三区视频 | 亚洲制服丝袜在线| 欧美性生活久久| 午夜精品久久久久久久| 91精品国产aⅴ一区二区| 精品一区二区三区香蕉蜜桃 | 国产精品美女久久久久高潮| 91丨九色丨蝌蚪富婆spa| 亚洲伦理在线免费看| 欧美亚洲图片小说| 免费成人在线影院| 久久久久久夜精品精品免费| 成人aa视频在线观看| 一区二区视频免费在线观看| 欧美日韩另类国产亚洲欧美一级| 石原莉奈在线亚洲二区| 欧美r级在线观看| 成人高清免费在线播放| 亚洲成人资源在线| 欧美电影免费提供在线观看| 成熟亚洲日本毛茸茸凸凹| 亚洲一区二区三区中文字幕在线| 欧美精品粉嫩高潮一区二区| 国产乱码精品一品二品| 国产精品久久久久久妇女6080|