亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? rfc2510.txt

?? PKIX的RFC英文文檔
?? TXT
?? 第 1 頁 / 共 5 頁
字號:
Network Working Group                                            C. AdamsRequest for Comments: 2510                           Entrust TechnologiesCategory: Standards Track                                      S. Farrell                                                                      SSE                                                               March 1999                Internet X.509 Public Key Infrastructure                    Certificate Management ProtocolsStatus of this Memo   This document specifies an Internet standards track protocol for the   Internet community, and requests discussion and suggestions for   improvements.  Please refer to the current edition of the "Internet   Official Protocol Standards" (STD 1) for the standardization state   and status of this protocol.  Distribution of this memo is unlimited.Copyright Notice   Copyright (C) The Internet Society (1999).  All Rights Reserved.Abstract   This document describes the Internet X.509 Public Key Infrastructure   (PKI) Certificate Management Protocols. Protocol messages are defined   for all relevant aspects of certificate creation and management.   Note that "certificate" in this document refers to an X.509v3   Certificate as defined in [COR95, X509-AM].   The key words "MUST", "MUST NOT", "REQUIRED", "SHOULD", "SHOULD NOT",   "RECOMMENDED", "MAY", and "OPTIONAL" in this document (in uppercase,   as shown) are to be interpreted as described in [RFC2119].Introduction   The layout of this document is as follows:   - Section 1 contains an overview of PKI management;   - Section 2 contains discussion of assumptions and restrictions;   - Section 3 contains data structures used for PKI management messages;   - Section 4 defines the functions that are to be carried out in PKI     management by conforming implementations;   - Section 5 describes a simple protocol for transporting PKI messages;   - the Appendices specify profiles for conforming implementations and     provide an ASN.1 module containing the syntax for all messages     defined in this specification.Adams & Farrell             Standards Track                     [Page 1]RFC 2510          PKI Certificate Management Protocols        March 19991 PKI Management Overview   The PKI must be structured to be consistent with the types of   individuals who must administer it.  Providing such administrators   with unbounded choices not only complicates the software required but   also increases the chances that a subtle mistake by an administrator   or software developer will result in broader compromise. Similarly,   restricting administrators with cumbersome mechanisms will cause them   not to use the PKI.   Management protocols are REQUIRED to support on-line interactions   between Public Key Infrastructure (PKI) components.  For example, a   management protocol might be used between a Certification Authority   (CA) and a client system with which a key pair is associated, or   between two CAs that issue cross-certificates for each other.1.1 PKI Management Model   Before specifying particular message formats and procedures we first   define the entities involved in PKI management and their interactions   (in terms of the PKI management functions required).  We then group   these functions in order to accommodate different identifiable types   of end entities.1.2 Definitions of PKI Entities   The entities involved in PKI management include the end entity (i.e.,   the entity to be named in the subject field of a certificate) and the   certification authority (i.e., the entity named in the issuer field   of a certificate). A registration authority MAY also be involved in   PKI management.1.2.1 Subjects and End Entities   The term "subject" is used here to refer to the entity named in the   subject field of a certificate; when we wish to distinguish the tools   and/or software used by the subject (e.g., a local certificate   management module) we will use the term "subject equipment". In   general, the term "end entity" (EE) rather than subject is preferred   in order to avoid confusion with the field name.   It is important to note that the end entities here will include not   only human users of applications, but also applications themselves   (e.g., for IP security). This factor influences the protocols which   the PKI management operations use; for example, application software   is far more likely to know exactly which certificate extensions are   required than are human users. PKI management entities are also end   entities in the sense that they are sometimes named in the subjectAdams & Farrell             Standards Track                     [Page 2]RFC 2510          PKI Certificate Management Protocols        March 1999   field of a certificate or cross-certificate. Where appropriate, the   term "end-entity" will be used to refer to end entities who are not   PKI management entities.   All end entities require secure local access to some information --   at a minimum, their own name and private key, the name of a CA which   is directly trusted by this entity and that CA's public key (or a   fingerprint of the public key where a self-certified version is   available elsewhere). Implementations MAY use secure local storage   for more than this minimum (e.g., the end entity's own certificate or   application-specific information). The form of storage will also vary   -- from files to tamper-resistant cryptographic tokens.  Such local   trusted storage is referred to here as the end entity's Personal   Security Environment (PSE).   Though PSE formats are beyond the scope of this document (they are   very dependent on equipment, et cetera), a generic interchange format   for PSEs is defined here - a certification response message MAY be   used.1.2.2 Certification Authority   The certification authority (CA) may or may not actually be a real   "third party" from the end entity's point of view. Quite often, the   CA will actually belong to the same organization as the end entities   it supports.   Again, we use the term CA to refer to the entity named in the issuer   field of a certificate; when it is necessary to distinguish the   software or hardware tools used by the CA we use the term "CA   equipment".   The CA equipment will often include both an "off-line" component and   an "on-line" component, with the CA private key only available to the   "off-line" component. This is, however, a matter for implementers   (though it is also relevant as a policy issue).   We use the term "root CA" to indicate a CA that is directly trusted   by an end entity; that is, securely acquiring the value of a root CA   public key requires some out-of-band step(s). This term is not meant   to imply that a root CA is necessarily at the top of any hierarchy,   simply that the CA in question is trusted directly.   A "subordinate CA" is one that is not a root CA for the end entity in   question. Often, a subordinate CA will not be a root CA for any   entity but this is not mandatory.Adams & Farrell             Standards Track                     [Page 3]RFC 2510          PKI Certificate Management Protocols        March 19991.2.3 Registration Authority   In addition to end-entities and CAs, many environments call for the   existence of a Registration Authority (RA) separate from the   Certification Authority. The functions which the registration   authority may carry out will vary from case to case but MAY include   personal authentication, token distribution, revocation reporting,   name assignment, key generation, archival of key pairs, et cetera.   This document views the RA as an OPTIONAL component - when it is not   present the CA is assumed to be able to carry out the RA's functions   so that the PKI management protocols are the same from the end-   entity's point of view.   Again, we distinguish, where necessary, between the RA and the tools   used (the "RA equipment").   Note that an RA is itself an end entity. We further assume that all   RAs are in fact certified end entities and that RAs have private keys   that are usable for signing. How a particular CA equipment identifies   some end entities as RAs is an implementation issue (i.e., this   document specifies no special RA certification operation). We do not   mandate that the RA is certified by the CA with which it is   interacting at the moment (so one RA may work with more than one CA   whilst only being certified once).   In some circumstances end entities will communicate directly with a   CA even where an RA is present. For example, for initial registration   and/or certification the subject may use its RA, but communicate   directly with the CA in order to refresh its certificate.1.3 PKI Management Requirements   The protocols given here meet the following requirements on PKI   management.      1. PKI management must conform to the ISO 9594-8 standard and the         associated amendments (certificate extensions)      2. PKI management must conform to the other parts of this series.      3. It must be possible to regularly update any key pair without         affecting any other key pair.      4. The use of confidentiality in PKI management protocols must be         kept to a minimum in order to ease regulatory problems.Adams & Farrell             Standards Track                     [Page 4]RFC 2510          PKI Certificate Management Protocols        March 1999      5. PKI management protocols must allow the use of different         industry-standard cryptographic algorithms, (specifically         including RSA, DSA, MD5, SHA-1) -- this means that any given         CA, RA, or end entity may, in principle, use whichever         algorithms suit it for its own key pair(s).      6. PKI management protocols must not preclude the generation of         key pairs by the end-entity concerned, by an RA, or by a CA --         key generation may also occur elsewhere, but for the purposes         of PKI management we can regard key generation as occurring         wherever the key is first present at an end entity, RA, or CA.      7. PKI management protocols must support the publication of         certificates by the end-entity concerned, by an RA, or by a CA.         Different implementations and different environments may choose         any of the above approaches.      8. PKI management protocols must support the production of         Certificate Revocation Lists (CRLs) by allowing certified end         entities to make requests for the revocation of certificates -         this must be done in such a way that the denial-of-service         attacks which are possible are not made simpler.      9. PKI management protocols must be usable over a variety of         "transport" mechanisms, specifically including mail, http,         TCP/IP and ftp.      10. Final authority for certification creation rests with the CA;          no RA or end-entity equipment can assume that any certificate          issued by a CA will contain what was requested -- a CA may          alter certificate field values or may add, delete or alter          extensions according to its operating policy. In other words,          all PKI entities (end-entities, RAs, and CAs) must be capable          of handling responses to requests for certificates in which          the actual certificate issued is different from that requested          (for example, a CA may shorten the validity period requested).          Note that policy may dictate that the CA must not publish or          otherwise distribute the certificate until the requesting          entity has reviewed and accepted the newly-created certificate          (typically through use of the PKIConfirm message).      11. A graceful, scheduled change-over from one non-compromised CA          key pair to the next (CA key update) must be supported (note          that if the CA key is compromised, re-initialization must be          performed for all entities in the domain of that CA). An end          entity whose PSE contains the new CA public key (following a          CA key update) must also be able to verify certificates          verifiable using the old public key. End entities who directlyAdams & Farrell             Standards Track                     [Page 5]RFC 2510          PKI Certificate Management Protocols        March 1999          trust the old CA key pair must also be able to verify          certificates signed using the new CA private key.  (Required          for situations where the old CA public key is "hardwired" into          the end entity's cryptographic equipment).      12. The Functions of an RA may, in some implementations or          environments, be carried out by the CA itself. The protocols          must be designed so that end entities will use the same          protocol (but, of course, not the same key!) regardless of          whether the communication is with an RA or CA.      13. Where an end entity requests a certificate containing a given          public key value, the end entity must be ready to demonstrate          possession of the corresponding private key value. This may be          accomplished in various ways, depending on the type of          certification request. See Section 2.3, "Proof of Possession          of Private Key", for details of the in-band methods defined          for the PKIX-CMP (i.e., Certificate Management Protocol)          messages.PKI Management Operations   The following diagram shows the relationship between the entities   defined above in terms of the PKI management operations. The letters   in the diagram indicate "protocols" in the sense that a defined set   of PKI management messages can be sent along each of the lettered

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
欧美三级蜜桃2在线观看| 国产精品乱码人人做人人爱| 久久久久久99久久久精品网站| 中文字幕一区二区三区视频| 蜜臀av性久久久久av蜜臀妖精| 99精品在线免费| 久久精品人人做人人爽人人| 天天操天天色综合| 成人18视频在线播放| 久久综合网色—综合色88| 五月天视频一区| 日本韩国欧美一区二区三区| 国产日韩欧美一区二区三区乱码 | 国产网红主播福利一区二区| 亚洲国产你懂的| 色哟哟国产精品免费观看| 国产欧美精品一区| 国产成人精品www牛牛影视| 精品欧美一区二区三区精品久久| 午夜伦理一区二区| 欧美性videosxxxxx| 亚洲激情综合网| 一本大道久久精品懂色aⅴ| 国产免费观看久久| 高清免费成人av| 日本一区二区视频在线观看| 国产福利一区在线| 久久一日本道色综合| 精品一区二区三区久久| 精品国一区二区三区| 裸体在线国模精品偷拍| 精品国产乱码久久久久久老虎| 美女www一区二区| 日韩美女天天操| 国产尤物一区二区| 国产三级一区二区三区| 成人国产精品免费观看| 亚洲色图另类专区| 欧美影院一区二区三区| 五月天丁香久久| 日韩欧美中文字幕公布| 蜜桃av一区二区三区| 精品久久一区二区三区| 国产一区不卡在线| 日韩一区日韩二区| 欧美日韩在线三区| 精品一区二区三区不卡 | 成熟亚洲日本毛茸茸凸凹| 国产欧美一区二区三区在线老狼| 欧美欧美欧美欧美首页| 肉色丝袜一区二区| 26uuu精品一区二区| 成人激情动漫在线观看| 亚洲女同ⅹxx女同tv| 欧美疯狂做受xxxx富婆| 国产一区二区三区国产| 亚洲人妖av一区二区| 精品婷婷伊人一区三区三| 秋霞电影网一区二区| 国产亚洲综合色| 欧美三级三级三级爽爽爽| 国产一区91精品张津瑜| 亚洲精品成a人| 26uuu另类欧美| 在线观看日韩国产| 国产在线一区二区| 一区二区三区在线视频观看| 欧美成人video| 一本大道久久a久久综合| 美女www一区二区| 成人免费一区二区三区在线观看| 91精选在线观看| 99久久久无码国产精品| 蜜臀av性久久久久蜜臀av麻豆| 中文一区在线播放| 日韩欧美不卡在线观看视频| 色综合天天综合网天天狠天天| 日本亚洲免费观看| 一区二区三区四区亚洲| 国产日韩一级二级三级| 91精品国产麻豆| a亚洲天堂av| 国产精品影视网| 日韩电影免费在线| 一区二区视频免费在线观看| 国产日韩欧美一区二区三区乱码| 91精品国产一区二区三区香蕉| 99国产精品视频免费观看| 国产一二精品视频| www.日韩在线| 国产精品一区二区在线播放| 日本成人中文字幕在线视频| 一区二区三区在线不卡| 欧美国产欧美综合| 久久久精品日韩欧美| 日韩免费视频线观看| 欧美日韩精品专区| 91福利视频久久久久| 成人黄色电影在线| 国产精品一级黄| 国产一区美女在线| 久久精品国产网站| 日本欧美大码aⅴ在线播放| 亚洲一区免费在线观看| 亚洲人成人一区二区在线观看 | caoporn国产一区二区| 国产一区二区三区免费观看| 久久精品噜噜噜成人88aⅴ| 午夜视频一区二区三区| 午夜av电影一区| 亚瑟在线精品视频| 偷窥少妇高潮呻吟av久久免费 | 亚洲欧美日韩国产另类专区| 国产精品久久久久久一区二区三区 | 亚洲国产一区在线观看| 日韩美女精品在线| ...中文天堂在线一区| 亚洲色图欧美在线| 国产精品一卡二卡| 精品午夜久久福利影院| 免费av网站大全久久| 另类小说一区二区三区| 狠狠色狠狠色综合日日91app| 久久精品72免费观看| 国产一区三区三区| 成人丝袜18视频在线观看| 91啪九色porn原创视频在线观看| 波多野结衣中文一区| 91亚洲永久精品| 欧美日韩精品欧美日韩精品| 337p亚洲精品色噜噜狠狠| 欧美成人精品二区三区99精品| 国产日韩精品一区二区浪潮av| 中文字幕精品一区| 尤物在线观看一区| 日韩经典一区二区| 国产酒店精品激情| 99久久婷婷国产精品综合| 欧美伊人久久久久久久久影院 | 欧美激情一区二区三区蜜桃视频| 国产精品嫩草99a| 亚洲精品精品亚洲| 久久国产精品色婷婷| 粉嫩久久99精品久久久久久夜| 一本色道亚洲精品aⅴ| 在线电影欧美成精品| www国产成人免费观看视频 深夜成人网 | 亚洲乱码国产乱码精品精可以看 | 欧美色偷偷大香| 精品国产一区二区在线观看| 国产精品国产精品国产专区不蜜| 亚洲午夜精品17c| 国产成人一区二区精品非洲| 欧美亚洲动漫精品| 国产欧美一区在线| www.性欧美| 精品国产麻豆免费人成网站| 亚洲视频免费在线| 久久精品国内一区二区三区| 色综合天天狠狠| 久久亚区不卡日本| 亚洲高清中文字幕| 成人综合在线视频| 精品欧美一区二区三区精品久久| 亚洲男人天堂av| 国产精品456露脸| 欧美另类videos死尸| 亚洲欧洲无码一区二区三区| 久热成人在线视频| 在线精品观看国产| 中文字幕+乱码+中文字幕一区| 蜜臀av一级做a爰片久久| 91精品1区2区| 中文字幕亚洲精品在线观看| 精品一区二区三区免费| 欧美丰满少妇xxxbbb| 亚洲自拍都市欧美小说| av午夜一区麻豆| 日本一区二区三区四区 | 久久久久9999亚洲精品| 日本aⅴ亚洲精品中文乱码| 欧美在线三级电影| 日韩一区欧美小说| av激情综合网| 国产精品网曝门| 国产凹凸在线观看一区二区| 久久欧美中文字幕| 精品亚洲欧美一区| 日韩精品一区二区三区在线播放 | 亚洲欧美日韩小说| 丁香五精品蜜臀久久久久99网站 | 99视频精品在线| 国产精品久久久久久亚洲毛片 | 亚洲一区影音先锋| 91成人免费网站| 亚洲午夜久久久久| 欧美日韩一区二区三区视频| 亚洲午夜激情av| 欧美日韩国产美| 奇米精品一区二区三区在线观看一|