亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關(guān)于我們
? 蟲蟲下載站

?? rfc2510.txt

?? PKIX的RFC英文文檔
?? TXT
?? 第 1 頁 / 共 5 頁
字號:
   using a (proprietary or standardized) key generation request/response   protocol (outside the scope of this specification).   There are thus three possibilities for the location of "key   generation":  the end entity, an RA, or a CA.2.2.1.4 Confirmation of successful certification   Following the creation of an initial certificate for an end entity,   additional assurance can be gained by having the end entity   explicitly confirm successful receipt of the message containing (or   indicating the creation of) the certificate. Naturally, this   confirmation message must be protected (based on the initial   authentication key or other means).   This gives two further possibilities: confirmed or not.2.2.2 Mandatory schemes   The criteria above allow for a large number of initial registration /   certification schemes. This specification mandates that conforming CA   equipment, RA equipment, and EE equipment MUST support the second   scheme listed below. Any entity MAY additionally support other   schemes, if desired.2.2.2.1 Centralized scheme   In terms of the classification above, this scheme is, in some ways,   the simplest possible, where:   - initiation occurs at the certifying CA;   - no on-line message authentication is required;   - "key generation" occurs at the certifying CA (see Section 2.2.1.3);   - no confirmation message is required.   In terms of message flow, this scheme means that the only message   required is sent from the CA to the end entity. The message must   contain the entire PSE for the end entity. Some out-of-band means   must be provided to allow the end entity to authenticate the message   received and decrypt any encrypted values.Adams & Farrell             Standards Track                    [Page 12]RFC 2510          PKI Certificate Management Protocols        March 19992.2.2.2 Basic authenticated scheme   In terms of the classification above, this scheme is where:   - initiation occurs at the end entity;   - message authentication is REQUIRED;   - "key generation" occurs at the end entity (see Section 2.2.1.3);   - a confirmation message is REQUIRED.   In terms of message flow, the basic authenticated scheme is as   follows:      End entity                                          RA/CA      ==========                                      =============           out-of-band distribution of Initial Authentication           Key (IAK) and reference value (RA/CA -> EE)      Key generation      Creation of certification request      Protect request with IAK                    -->>--certification request-->>--                                                     verify request                                                     process request                                                     create response                    --<<--certification response--<<--      handle response      create confirmation                    -->>--confirmation message-->>--                                                     verify confirmation   (Where verification of the confirmation message fails, the RA/CA MUST   revoke the newly issued certificate if it has been published or   otherwise made available.)2.3 Proof of Possession (POP) of Private Key   In order to prevent certain attacks and to allow a CA/RA to properly   check the validity of the binding between an end entity and a key   pair, the PKI management operations specified here make it possible   for an end entity to prove that it has possession of (i.e., is able   to use) the private key corresponding to the public key for which a   certificate is requested.  A given CA/RA is free to choose how to   enforce POP (e.g., out-of-band procedural means versus PKIX-CMP in-   band messages) in its certification exchanges (i.e., this may be a   policy issue).  However, it is REQUIRED that CAs/RAs MUST enforce POP   by some means because there are currently many non-PKIX operational   protocols in use (various electronic mail protocols are one example)   that do not explicitly check the binding between the end entity and   the private key.  Until operational protocols that do verify theAdams & Farrell             Standards Track                    [Page 13]RFC 2510          PKI Certificate Management Protocols        March 1999   binding (for signature, encryption, and key agreement key pairs)   exist, and are ubiquitous, this binding can only be assumed to have   been verified by the CA/RA. Therefore, if the binding is not verified   by the CA/RA, certificates in the Internet Public-Key Infrastructure   end up being somewhat less meaningful.   POP is accomplished in different ways depending upon the type of key   for which a certificate is requested. If a key can be used for   multiple purposes (e.g., an RSA key) then any appropriate method MAY   be used (e.g., a key which may be used for signing, as well as other   purposes, SHOULD NOT be sent to the CA/RA in order to prove   possession).   This specification explicitly allows for cases where an end entity   supplies the relevant proof to an RA and the RA subsequently attests   to the CA that the required proof has been received (and validated!).   For example, an end entity wishing to have a signing key certified   could send the appropriate signature to the RA which then simply   notifies the relevant CA that the end entity has supplied the   required proof. Of course, such a situation may be disallowed by some   policies (e.g., CAs may be the only entities permitted to verify POP   during certification).2.3.1 Signature Keys   For signature keys, the end entity can sign a value to prove   possession of the private key.2.3.2 Encryption Keys   For encryption keys, the end entity can provide the private key to   the CA/RA, or can be required to decrypt a value in order to prove   possession of the private key (see Section 3.2.8). Decrypting a value   can be achieved either directly or indirectly.   The direct method is for the RA/CA to issue a random challenge to   which an immediate response by the EE is required.   The indirect method is to issue a certificate which is encrypted for   the end entity (and have the end entity demonstrate its ability to   decrypt this certificate in the confirmation message). This allows a   CA to issue a certificate in a form which can only be used by the   intended end entity.   This specification encourages use of the indirect method because this   requires no extra messages to be sent (i.e., the proof can be   demonstrated using the {request, response, confirmation} triple of   messages).Adams & Farrell             Standards Track                    [Page 14]RFC 2510          PKI Certificate Management Protocols        March 19992.3.3 Key Agreement Keys   For key agreement keys, the end entity and the PKI management entity   (i.e., CA or RA) must establish a shared secret key in order to prove   that the end entity has possession of the private key.   Note that this need not impose any restrictions on the keys that can   be certified by a given CA -- in particular, for Diffie-Hellman keys   the end entity may freely choose its algorithm parameters -- provided   that the CA can generate a short-term (or one-time) key pair with the   appropriate parameters when necessary.2.4 Root CA key update   This discussion only applies to CAs that are a root CA for some end   entity.   The basis of the procedure described here is that the CA protects its   new public key using its previous private key and vice versa. Thus   when a CA updates its key pair it must generate two extra   cACertificate attribute values if certificates are made available   using an X.500 directory (for a total of four:  OldWithOld;   OldWithNew; NewWithOld; and NewWithNew).   When a CA changes its key pair those entities who have acquired the   old CA public key via "out-of-band" means are most affected. It is   these end entities who will need access to the new CA public key   protected with the old CA private key. However, they will only   require this for a limited period (until they have acquired the new   CA public key via the "out-of-band" mechanism). This will typically   be easily achieved when these end entities' certificates expire.   The data structure used to protect the new and old CA public keys is   a standard certificate (which may also contain extensions). There are   no new data structures required.   Note 1. This scheme does not make use of any of the X.509 v3   extensions as it must be able to work even for version 1   certificates. The presence of the KeyIdentifier extension would make   for efficiency improvements.   Note 2. While the scheme could be generalized to cover cases where   the CA updates its key pair more than once during the validity period   of one of its end entities' certificates, this generalization seems   of dubious value. Not having this generalization simply means that   the validity period of a CA key pair must be greater than the   validity period of any certificate issued by that CA using that key   pair.Adams & Farrell             Standards Track                    [Page 15]RFC 2510          PKI Certificate Management Protocols        March 1999   Note 3.This scheme forces end entities to acquire the new CA public   key on the expiry of the last certificate they owned that was signed   with the old CA private key (via the "out-of-band" means).   Certificate and/or key update operations occurring at other times do   not necessarily require this (depending on the end entity's   equipment).2.4.1 CA Operator actions   To change the key of the CA, the CA operator does the following:      1. Generate a new key pair;      2. Create a certificate containing the old CA public key signed         with the new private key (the "old with new" certificate);      3. Create a certificate containing the new CA public key signed         with the old private key (the "new with old" certificate);      4. Create a certificate containing the new CA public key signed         with the new private key (the "new with new" certificate);      5. Publish these new certificates via the directory and/or other         means (perhaps using a CAKeyUpdAnn message);      6. Export the new CA public key so that end entities may acquire         it using the "out-of-band" mechanism (if required).   The old CA private key is then no longer required. The old CA public   key will however remain in use for some time. The time when the old   CA public key is no longer required (other than for non-repudiation)   will be when all end entities of this CA have securely acquired the   new CA public key.   The "old with new" certificate must have a validity period starting   at the generation time of the old key pair and ending at the expiry   date of the old public key.   The "new with old" certificate must have a validity period starting   at the generation time of the new key pair and ending at the time by   which all end entities of this CA will securely possess the new CA   public key (at the latest, the expiry date of the old public key).   The "new with new" certificate must have a validity period starting   at the generation time of the new key pair and ending at the time by   which the CA will next update its key pair.Adams & Farrell             Standards Track                    [Page 16]RFC 2510          PKI Certificate Management Protocols        March 19992.4.2 Verifying Certificates.   Normally when verifying a signature, the verifier verifies (among   other things) the certificate containing the public key of the   signer. However, once a CA is allowed to update its key there are a   range of new possibilities. These are shown in the table below.               Repository contains NEW     Repository contains only OLD                 and OLD public keys        public key (due to, e.g.,                                             delay in publication)                  PSE      PSE Contains  PSE Contains    PSE Contains               Contains     OLD public    NEW public      OLD public              NEW public       key            key            key                  key   Signer's   Case 1:      Case 3:       Case 5:        Case 7:   certifi-   This is      In this case  Although the   In this case   cate is    the          the verifier  CA operator    the CA   protected  standard     must access   has not        operator  has   using NEW  case where   the           updated the    not updated   public     the          directory in  directory the  the directory   key        verifier     order to get  verifier can   and so the              can          the value of  verify the     verification              directly     the NEW       certificate    will FAIL              verify the   public key    directly -              certificate                this is thus              without                    the same as              using the                  case 1.              directory   Signer's   Case 2:      Case 4:       Case 6:        Case 8:   certifi-   In this      In this case  The verifier   Although the   cate is    case the     the verifier  thinks this    CA operator

?? 快捷鍵說明

復(fù)制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
欧美二区三区的天堂| 国内久久婷婷综合| 91久久香蕉国产日韩欧美9色| 中文子幕无线码一区tr| 国产成人无遮挡在线视频| 欧美国产一区二区在线观看 | 欧美日韩黄色影视| 亚洲超丰满肉感bbw| 制服丝袜在线91| 国产在线视频一区二区三区| 国产日韩欧美综合一区| 99久久久久久99| 午夜精彩视频在线观看不卡| 日韩一级视频免费观看在线| 国精产品一区一区三区mba视频 | 国产一区啦啦啦在线观看| 精品久久久久久亚洲综合网| 国产黄色精品网站| 亚洲精品视频在线观看网站| 欧美系列亚洲系列| 久久99国产精品麻豆| 中文字幕一区二区三| 欧美色窝79yyyycom| 国产另类ts人妖一区二区| 亚洲色欲色欲www在线观看| 欧美日韩成人综合| 国产成人8x视频一区二区| 亚洲综合成人在线视频| 精品免费视频一区二区| 91欧美一区二区| 麻豆精品国产91久久久久久| 国产精品电影一区二区| 这里是久久伊人| 91免费看视频| 九一久久久久久| 夜夜操天天操亚洲| 久久蜜桃av一区二区天堂| 91精品福利在线| 国产伦精一区二区三区| 丝袜诱惑制服诱惑色一区在线观看| 久久综合色一综合色88| 欧美日韩午夜精品| 成人av高清在线| 久久99国产精品尤物| 亚洲一级电影视频| 国产无人区一区二区三区| 欧美日韩国产123区| 成年人国产精品| 韩国三级中文字幕hd久久精品| 一区二区三区四区高清精品免费观看 | 综合久久久久久| 久久综合九色综合欧美98| 精品视频免费看| 91在线精品一区二区三区| 国产真实乱对白精彩久久| 日精品一区二区三区| 亚洲欧美一区二区三区久本道91| 日韩欧美国产高清| 欧美日韩视频在线观看一区二区三区| 成人午夜精品在线| 激情五月婷婷综合网| 日本亚洲电影天堂| 午夜成人免费电影| 亚洲1区2区3区4区| 亚洲午夜私人影院| 一区二区三区精品在线观看| 国产精品理伦片| 中文字幕制服丝袜成人av| 久久久久高清精品| 久久九九影视网| 国产人成亚洲第一网站在线播放| 精品女同一区二区| 久久婷婷国产综合国色天香| 精品美女一区二区| 亚洲精品在线观看视频| 欧美电视剧在线看免费| 欧美一区二区三级| 日韩欧美国产一二三区| 日韩欧美在线影院| 精品理论电影在线观看| 日韩欧美精品在线视频| 欧美zozozo| 久久精品亚洲一区二区三区浴池| 久久久噜噜噜久噜久久综合| 久久精品一区四区| 国产精品成人免费在线| 综合婷婷亚洲小说| 亚洲一区二区三区四区五区黄| 一区二区三区日韩欧美| 亚洲bt欧美bt精品| 经典三级视频一区| 成人免费看的视频| 99精品欧美一区二区蜜桃免费| 色综合天天综合| 欧美四级电影网| 日韩欧美一区二区久久婷婷| 精品毛片乱码1区2区3区| 中文字幕电影一区| 亚洲精品欧美在线| 日本v片在线高清不卡在线观看| 久久精品国产99国产| 国产馆精品极品| 91蝌蚪porny九色| 欧美精品乱码久久久久久按摩| 日韩一区二区免费在线电影| 久久久99久久| 亚洲精品日产精品乱码不卡| 免费在线观看视频一区| 国产高清不卡一区二区| 91黄视频在线| 精品成人佐山爱一区二区| 国产精品久久久久婷婷| 亚洲va国产va欧美va观看| 国产一区999| 欧美在线短视频| 久久综合九色综合欧美亚洲| 亚洲码国产岛国毛片在线| 日韩av一级片| voyeur盗摄精品| 91麻豆精品国产| 国产精品美女久久久久久2018| 亚洲第一搞黄网站| 高清shemale亚洲人妖| 欧美日韩一区二区在线观看视频| 久久综合国产精品| 亚洲成人福利片| av一区二区久久| 一区二区三区欧美| 国模无码大尺度一区二区三区| 91在线你懂得| 国产欧美日韩卡一| 男女男精品视频网| aaa欧美色吧激情视频| 日韩精品影音先锋| 一区二区久久久| 成人app软件下载大全免费| 日韩视频在线一区二区| 一区二区三区在线播放| 成人国产在线观看| 日韩免费视频线观看| 一区二区三区欧美| 91视频xxxx| 中文字幕制服丝袜一区二区三区 | 三级不卡在线观看| 色综合久久88色综合天天6 | 欧美日本国产一区| 亚洲精品欧美激情| 波多野洁衣一区| 国产欧美一区二区三区鸳鸯浴| 蜜臀久久99精品久久久久宅男 | 91久久国产最好的精华液| 日本一区二区三区电影| 久久不见久久见免费视频7| 欧美日韩一本到| 亚洲一区免费视频| 在线观看网站黄不卡| 日韩美女精品在线| proumb性欧美在线观看| 久久精品人人做人人爽人人| 精品一区二区免费在线观看| 在线播放视频一区| 视频一区国产视频| 日韩视频免费观看高清完整版在线观看 | 蜜臀av一区二区在线免费观看 | 成人精品电影在线观看| 337p日本欧洲亚洲大胆精品| 香港成人在线视频| 在线成人av网站| 天天亚洲美女在线视频| 欧美在线观看一区| 亚洲国产中文字幕| 欧美日韩精品一区二区三区| 亚洲午夜久久久久| 欧美久久高跟鞋激| 麻豆成人av在线| 精品国产一区二区精华| 久久精品72免费观看| 欧美电视剧免费全集观看| 国内精品嫩模私拍在线| 久久精品欧美一区二区三区麻豆| 成人黄色综合网站| 国产精品福利在线播放| 91啪亚洲精品| 日日夜夜免费精品视频| 欧美大片国产精品| 国产精品亚洲专一区二区三区| 国产色一区二区| 色综合色综合色综合 | 日韩精品一二三区| 精品久久久网站| 99视频精品免费视频| 亚洲精品五月天| 日韩欧美高清dvd碟片| 国产精品综合一区二区三区| 国产精品视频线看| 欧美日韩国产影片| 国产精品资源在线观看| 一区二区三区视频在线看| 日韩一区二区三区四区| 成人一区二区视频|