亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? rfc2510.txt

?? PKIX的RFC英文文檔
?? TXT
?? 第 1 頁 / 共 5 頁
字號:
Network Working Group                                            C. AdamsRequest for Comments: 2510                           Entrust TechnologiesCategory: Standards Track                                      S. Farrell                                                                      SSE                                                               March 1999                Internet X.509 Public Key Infrastructure                    Certificate Management ProtocolsStatus of this Memo   This document specifies an Internet standards track protocol for the   Internet community, and requests discussion and suggestions for   improvements.  Please refer to the current edition of the "Internet   Official Protocol Standards" (STD 1) for the standardization state   and status of this protocol.  Distribution of this memo is unlimited.Copyright Notice   Copyright (C) The Internet Society (1999).  All Rights Reserved.Abstract   This document describes the Internet X.509 Public Key Infrastructure   (PKI) Certificate Management Protocols. Protocol messages are defined   for all relevant aspects of certificate creation and management.   Note that "certificate" in this document refers to an X.509v3   Certificate as defined in [COR95, X509-AM].   The key words "MUST", "MUST NOT", "REQUIRED", "SHOULD", "SHOULD NOT",   "RECOMMENDED", "MAY", and "OPTIONAL" in this document (in uppercase,   as shown) are to be interpreted as described in [RFC2119].Introduction   The layout of this document is as follows:   - Section 1 contains an overview of PKI management;   - Section 2 contains discussion of assumptions and restrictions;   - Section 3 contains data structures used for PKI management messages;   - Section 4 defines the functions that are to be carried out in PKI     management by conforming implementations;   - Section 5 describes a simple protocol for transporting PKI messages;   - the Appendices specify profiles for conforming implementations and     provide an ASN.1 module containing the syntax for all messages     defined in this specification.Adams & Farrell             Standards Track                     [Page 1]RFC 2510          PKI Certificate Management Protocols        March 19991 PKI Management Overview   The PKI must be structured to be consistent with the types of   individuals who must administer it.  Providing such administrators   with unbounded choices not only complicates the software required but   also increases the chances that a subtle mistake by an administrator   or software developer will result in broader compromise. Similarly,   restricting administrators with cumbersome mechanisms will cause them   not to use the PKI.   Management protocols are REQUIRED to support on-line interactions   between Public Key Infrastructure (PKI) components.  For example, a   management protocol might be used between a Certification Authority   (CA) and a client system with which a key pair is associated, or   between two CAs that issue cross-certificates for each other.1.1 PKI Management Model   Before specifying particular message formats and procedures we first   define the entities involved in PKI management and their interactions   (in terms of the PKI management functions required).  We then group   these functions in order to accommodate different identifiable types   of end entities.1.2 Definitions of PKI Entities   The entities involved in PKI management include the end entity (i.e.,   the entity to be named in the subject field of a certificate) and the   certification authority (i.e., the entity named in the issuer field   of a certificate). A registration authority MAY also be involved in   PKI management.1.2.1 Subjects and End Entities   The term "subject" is used here to refer to the entity named in the   subject field of a certificate; when we wish to distinguish the tools   and/or software used by the subject (e.g., a local certificate   management module) we will use the term "subject equipment". In   general, the term "end entity" (EE) rather than subject is preferred   in order to avoid confusion with the field name.   It is important to note that the end entities here will include not   only human users of applications, but also applications themselves   (e.g., for IP security). This factor influences the protocols which   the PKI management operations use; for example, application software   is far more likely to know exactly which certificate extensions are   required than are human users. PKI management entities are also end   entities in the sense that they are sometimes named in the subjectAdams & Farrell             Standards Track                     [Page 2]RFC 2510          PKI Certificate Management Protocols        March 1999   field of a certificate or cross-certificate. Where appropriate, the   term "end-entity" will be used to refer to end entities who are not   PKI management entities.   All end entities require secure local access to some information --   at a minimum, their own name and private key, the name of a CA which   is directly trusted by this entity and that CA's public key (or a   fingerprint of the public key where a self-certified version is   available elsewhere). Implementations MAY use secure local storage   for more than this minimum (e.g., the end entity's own certificate or   application-specific information). The form of storage will also vary   -- from files to tamper-resistant cryptographic tokens.  Such local   trusted storage is referred to here as the end entity's Personal   Security Environment (PSE).   Though PSE formats are beyond the scope of this document (they are   very dependent on equipment, et cetera), a generic interchange format   for PSEs is defined here - a certification response message MAY be   used.1.2.2 Certification Authority   The certification authority (CA) may or may not actually be a real   "third party" from the end entity's point of view. Quite often, the   CA will actually belong to the same organization as the end entities   it supports.   Again, we use the term CA to refer to the entity named in the issuer   field of a certificate; when it is necessary to distinguish the   software or hardware tools used by the CA we use the term "CA   equipment".   The CA equipment will often include both an "off-line" component and   an "on-line" component, with the CA private key only available to the   "off-line" component. This is, however, a matter for implementers   (though it is also relevant as a policy issue).   We use the term "root CA" to indicate a CA that is directly trusted   by an end entity; that is, securely acquiring the value of a root CA   public key requires some out-of-band step(s). This term is not meant   to imply that a root CA is necessarily at the top of any hierarchy,   simply that the CA in question is trusted directly.   A "subordinate CA" is one that is not a root CA for the end entity in   question. Often, a subordinate CA will not be a root CA for any   entity but this is not mandatory.Adams & Farrell             Standards Track                     [Page 3]RFC 2510          PKI Certificate Management Protocols        March 19991.2.3 Registration Authority   In addition to end-entities and CAs, many environments call for the   existence of a Registration Authority (RA) separate from the   Certification Authority. The functions which the registration   authority may carry out will vary from case to case but MAY include   personal authentication, token distribution, revocation reporting,   name assignment, key generation, archival of key pairs, et cetera.   This document views the RA as an OPTIONAL component - when it is not   present the CA is assumed to be able to carry out the RA's functions   so that the PKI management protocols are the same from the end-   entity's point of view.   Again, we distinguish, where necessary, between the RA and the tools   used (the "RA equipment").   Note that an RA is itself an end entity. We further assume that all   RAs are in fact certified end entities and that RAs have private keys   that are usable for signing. How a particular CA equipment identifies   some end entities as RAs is an implementation issue (i.e., this   document specifies no special RA certification operation). We do not   mandate that the RA is certified by the CA with which it is   interacting at the moment (so one RA may work with more than one CA   whilst only being certified once).   In some circumstances end entities will communicate directly with a   CA even where an RA is present. For example, for initial registration   and/or certification the subject may use its RA, but communicate   directly with the CA in order to refresh its certificate.1.3 PKI Management Requirements   The protocols given here meet the following requirements on PKI   management.      1. PKI management must conform to the ISO 9594-8 standard and the         associated amendments (certificate extensions)      2. PKI management must conform to the other parts of this series.      3. It must be possible to regularly update any key pair without         affecting any other key pair.      4. The use of confidentiality in PKI management protocols must be         kept to a minimum in order to ease regulatory problems.Adams & Farrell             Standards Track                     [Page 4]RFC 2510          PKI Certificate Management Protocols        March 1999      5. PKI management protocols must allow the use of different         industry-standard cryptographic algorithms, (specifically         including RSA, DSA, MD5, SHA-1) -- this means that any given         CA, RA, or end entity may, in principle, use whichever         algorithms suit it for its own key pair(s).      6. PKI management protocols must not preclude the generation of         key pairs by the end-entity concerned, by an RA, or by a CA --         key generation may also occur elsewhere, but for the purposes         of PKI management we can regard key generation as occurring         wherever the key is first present at an end entity, RA, or CA.      7. PKI management protocols must support the publication of         certificates by the end-entity concerned, by an RA, or by a CA.         Different implementations and different environments may choose         any of the above approaches.      8. PKI management protocols must support the production of         Certificate Revocation Lists (CRLs) by allowing certified end         entities to make requests for the revocation of certificates -         this must be done in such a way that the denial-of-service         attacks which are possible are not made simpler.      9. PKI management protocols must be usable over a variety of         "transport" mechanisms, specifically including mail, http,         TCP/IP and ftp.      10. Final authority for certification creation rests with the CA;          no RA or end-entity equipment can assume that any certificate          issued by a CA will contain what was requested -- a CA may          alter certificate field values or may add, delete or alter          extensions according to its operating policy. In other words,          all PKI entities (end-entities, RAs, and CAs) must be capable          of handling responses to requests for certificates in which          the actual certificate issued is different from that requested          (for example, a CA may shorten the validity period requested).          Note that policy may dictate that the CA must not publish or          otherwise distribute the certificate until the requesting          entity has reviewed and accepted the newly-created certificate          (typically through use of the PKIConfirm message).      11. A graceful, scheduled change-over from one non-compromised CA          key pair to the next (CA key update) must be supported (note          that if the CA key is compromised, re-initialization must be          performed for all entities in the domain of that CA). An end          entity whose PSE contains the new CA public key (following a          CA key update) must also be able to verify certificates          verifiable using the old public key. End entities who directlyAdams & Farrell             Standards Track                     [Page 5]RFC 2510          PKI Certificate Management Protocols        March 1999          trust the old CA key pair must also be able to verify          certificates signed using the new CA private key.  (Required          for situations where the old CA public key is "hardwired" into          the end entity's cryptographic equipment).      12. The Functions of an RA may, in some implementations or          environments, be carried out by the CA itself. The protocols          must be designed so that end entities will use the same          protocol (but, of course, not the same key!) regardless of          whether the communication is with an RA or CA.      13. Where an end entity requests a certificate containing a given          public key value, the end entity must be ready to demonstrate          possession of the corresponding private key value. This may be          accomplished in various ways, depending on the type of          certification request. See Section 2.3, "Proof of Possession          of Private Key", for details of the in-band methods defined          for the PKIX-CMP (i.e., Certificate Management Protocol)          messages.PKI Management Operations   The following diagram shows the relationship between the entities   defined above in terms of the PKI management operations. The letters   in the diagram indicate "protocols" in the sense that a defined set   of PKI management messages can be sent along each of the lettered

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
久久超碰97中文字幕| 欧美色综合影院| 欧美日韩精品一区二区在线播放| 欧美一区二区日韩| 亚洲人成在线播放网站岛国| 国产一区二区三区免费在线观看| 欧美中文字幕一区二区三区亚洲| 欧美精彩视频一区二区三区| 图片区日韩欧美亚洲| 99免费精品在线观看| 精品国精品国产| 午夜精品一区在线观看| av一区二区久久| 久久精品人人做人人爽人人| 日一区二区三区| 91福利小视频| 中文字幕在线不卡一区二区三区 | 亚洲女同一区二区| 狠狠色伊人亚洲综合成人| 在线成人免费视频| 亚洲自拍偷拍图区| 91偷拍与自偷拍精品| 中文字幕av资源一区| 国产美女在线观看一区| 欧美mv日韩mv国产网站app| 亚洲va国产天堂va久久en| 色妞www精品视频| 亚洲天堂免费看| 91色.com| 亚洲精品综合在线| 在线免费观看不卡av| 亚洲人成人一区二区在线观看 | 国产精品欧美精品| 国产盗摄视频一区二区三区| 久久久精品一品道一区| 国产一区二区三区电影在线观看| 久久综合给合久久狠狠狠97色69| 久久精工是国产品牌吗| 欧美成人女星排名| 国产在线一区二区| 国产日韩精品一区二区浪潮av| 国产精品亚洲午夜一区二区三区| 久久亚洲综合色| 波多野结衣精品在线| 中文字幕色av一区二区三区| 91网站在线观看视频| 又紧又大又爽精品一区二区| 欧美日韩一区二区三区四区五区| 亚洲风情在线资源站| 欧美猛男超大videosgay| 九九**精品视频免费播放| 久久免费偷拍视频| 成人av网在线| 亚洲一级片在线观看| 91精品国产免费| 国产一区二区久久| 一区精品在线播放| 欧美日韩夫妻久久| 国产激情一区二区三区四区 | 首页国产欧美日韩丝袜| 欧美电影免费提供在线观看| 国产1区2区3区精品美女| 一区二区三区四区亚洲| 日韩欧美国产三级| av在线综合网| 日韩国产欧美三级| 国产精品久久久久久久蜜臀| 欧美性xxxxx极品少妇| 国产一区二区久久| 亚洲成av人片| 国产精品久久久久一区二区三区| 欧美嫩在线观看| av一本久道久久综合久久鬼色| 日韩电影在线一区| 国产精品久久综合| 日韩免费性生活视频播放| 91在线观看高清| 韩国女主播成人在线观看| 亚洲欧美电影一区二区| 久久久精品tv| 9191久久久久久久久久久| 懂色av一区二区三区蜜臀| 三级欧美在线一区| 一区二区三区av电影| 国产亚洲欧美一级| 欧美一区二区三区白人| 在线亚洲人成电影网站色www| 国内精品免费在线观看| 亚洲成人动漫一区| 依依成人综合视频| 中文字幕在线视频一区| 精品av综合导航| 在线播放国产精品二区一二区四区| 不卡视频在线观看| 国产一区999| 麻豆91免费看| 青草av.久久免费一区| 亚洲va国产va欧美va观看| 亚洲女人的天堂| 国产精品国产三级国产a| 久久久亚洲精品一区二区三区| 欧美日韩国产一二三| 一本大道久久a久久综合婷婷 | 国产精品国产三级国产普通话蜜臀| 欧美一区二区三区小说| 欧美视频一区二区三区四区 | 美国十次综合导航| 五月天精品一区二区三区| 亚洲视频每日更新| 亚洲人吸女人奶水| 日韩一区欧美小说| 成人免费小视频| 综合久久久久久| 自拍偷自拍亚洲精品播放| 成人欧美一区二区三区视频网页| 国产精品毛片久久久久久久| 国产欧美精品一区二区色综合朱莉| 久久看人人爽人人| 国产欧美日韩不卡免费| 中文一区二区在线观看| 国产精品视频麻豆| 亚洲桃色在线一区| 亚洲精品乱码久久久久久黑人| 亚洲视频一区二区免费在线观看| 亚洲色图丝袜美腿| 亚洲一区中文日韩| 午夜精品久久久久久久久久| 日韩av在线免费观看不卡| 美女被吸乳得到大胸91| 国产乱淫av一区二区三区| 国产91丝袜在线播放0| www.性欧美| 精品视频一区二区三区免费| 欧美老肥妇做.爰bbww视频| 欧美一区二区观看视频| 精品国产麻豆免费人成网站| 久久久99久久| 亚洲精品你懂的| 免费在线观看成人| 国产福利视频一区二区三区| 91麻豆swag| 日韩午夜av一区| 国产精品美女视频| 亚洲成人综合在线| 激情图片小说一区| 91论坛在线播放| 欧美一区二区三区免费大片| 国产精品午夜久久| 亚洲国产成人91porn| 国产精品一级片在线观看| 一本一道久久a久久精品| 欧美军同video69gay| 欧美国产日本视频| 午夜久久电影网| 成人h动漫精品| 欧美一区二区三区色| 亚洲免费av网站| 黑人巨大精品欧美一区| 欧美亚一区二区| 中文字幕电影一区| 日韩二区三区在线观看| 91美女视频网站| 久久久不卡影院| 日本不卡一二三| 92国产精品观看| 国产欧美一区二区三区沐欲| 亚洲国产精品久久久久秋霞影院| 国产成人在线视频网站| 5566中文字幕一区二区电影| 国产精品进线69影院| 国产激情视频一区二区在线观看| 7777精品伊人久久久大香线蕉经典版下载 | 一区二区三区四区不卡在线 | 欧美mv和日韩mv国产网站| 亚洲人被黑人高潮完整版| 国产盗摄视频一区二区三区| 日韩视频在线你懂得| 亚洲精品乱码久久久久久久久| 国产99久久久国产精品潘金| 欧美一级国产精品| 亚洲国产美女搞黄色| 91婷婷韩国欧美一区二区| 国产精品视频线看| 丁香啪啪综合成人亚洲小说| 久久蜜臀中文字幕| 黄色精品一二区| 欧美电影免费观看高清完整版在线 | 91视频91自| 国产精品久久夜| gogogo免费视频观看亚洲一| 久久久九九九九| 国产成人免费高清| 26uuu精品一区二区| 美女视频网站久久| 日韩一区二区中文字幕| 午夜精品免费在线| 7777精品伊人久久久大香线蕉的 | 国产毛片精品视频| 精品国产三级a在线观看| 久久国产精品无码网站|