亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? draft-ietf-pkix-scvp-11.txt

?? PKIX的RFC英文文檔
?? TXT
?? 第 1 頁 / 共 5 頁
字號:
Internet Draft                                             A. Malpanidraft-ietf-pkix-scvp-11.txt               Malpani Consulting ServicesDecember 2002                                              R. HousleyExpires in six months                                RSA Laboratories                                                           T. Freeman                                                       Microsoft Corp             Simple Certificate Validation Protocol (SCVP)Status of this memo   This document is an Internet-Draft and is in full conformance with   all provisions of Section 10 of RFC 2026.   Internet-Drafts are working documents of the Internet Engineering   Task Force (IETF), its areas, and its working groups.  Note that   other groups may also distribute working documents as Internet-   Drafts.   Internet-Drafts are draft documents valid for a maximum of six months   and may be updated, replaced, or obsoleted by other documents at any   time.  It is inappropriate to use Internet-Drafts as reference   material or to cite them other than as "work in progress."   The list of current Internet-Drafts can be accessed at   http://www.ietf.org/ietf/1id-abstracts.txt   The list of Internet-Draft Shadow Directories can be accessed at   http://www.ietf.org/shadow.html.Copyright Notice   Copyright (C) The Internet Society (2002). All Rights Reserved.Abstract   SCVP allows a client to offload certificate handling to a server. The   server can provide the client with a variety of valuable information   about the certificate, such as whether the certificate is valid, a   certification path to a trust anchor, and revocation status. SCVP has   many purposes, including simplifying client implementations and   allowing companies to centralize trust and policy management.Malpani, Housley, & Freeman                                     [Page 1]INTERNET DRAFT                    SCVP                     December 2002Table of Contents 1 Introduction  . . . . . . . . . . . . . . . . . . . . . . . . . .   4   1.1 SCVP overview and requirements  . . . . . . . . . . . . . . .   4   1.2 Terminology . . . . . . . . . . . . . . . . . . . . . . . . .   5   1.3 Validation Policies . . . . . . . . . . . . . . . . . . . . .   5 2 Protocol Overview . . . . . . . . . . . . . . . . . . . . . . . .   6 3 Validation Request  . . . . . . . . . . . . . . . . . . . . . . .   6   3.1 scvpVersion . . . . . . . . . . . . . . . . . . . . . . . . .   8   3.2 query . . . . . . . . . . . . . . . . . . . . . . . . . . . .   8       3.2.1 queriedCerts  . . . . . . . . . . . . . . . . . . . . .   9       3.2.2 checks  . . . . . . . . . . . . . . . . . . . . . . . .   9       3.2.3 wantBack  . . . . . . . . . . . . . . . . . . . . . . .  11       3.2.4 serverContextInfo . . . . . . . . . . . . . . . . . . .  12       3.2.5 valPolicy . . . . . . . . . . . . . . . . . . . . . . .  13       3.2.6 validityTime  . . . . . . . . . . . . . . . . . . . . .  14       3.2.7 trustAnchors  . . . . . . . . . . . . . . . . . . . . .  14       3.2.8 intermediateCerts . . . . . . . . . . . . . . . . . . .  15       3.2.9 revInfos  . . . . . . . . . . . . . . . . . . . . . . .  16       3.2.10 queryExtensions  . . . . . . . . . . . . . . . . . . .  16   3.3 requestor . . . . . . . . . . . . . . . . . . . . . . . . . .  17   3.4 requestNonce  . . . . . . . . . . . . . . . . . . . . . . . .  17   3.5 reqExtensions . . . . . . . . . . . . . . . . . . . . . . . .  17 4 Validation Response . . . . . . . . . . . . . . . . . . . . . . .  18   4.1 scvpVersion . . . . . . . . . . . . . . . . . . . . . . . . .  20   4.2 producedAt  . . . . . . . . . . . . . . . . . . . . . . . . .  20   4.3 responseStatus  . . . . . . . . . . . . . . . . . . . . . . .  20   4.4 requestReference  . . . . . . . . . . . . . . . . . . . . . .  22       4.4.1 requestHash . . . . . . . . . . . . . . . . . . . . . .  22       4.4.2 fullRequest . . . . . . . . . . . . . . . . . . . . . .  23   4.5 requestor . . . . . . . . . . . . . . . . . . . . . . . . . .  23   4.6 responder . . . . . . . . . . . . . . . . . . . . . . . . . .  23   4.7 replyObjects  . . . . . . . . . . . . . . . . . . . . . . . .  23       4.7.1 cert  . . . . . . . . . . . . . . . . . . . . . . . . .  24       4.7.2 replyStatus . . . . . . . . . . . . . . . . . . . . . .  24       4.7.3 replyValTime  . . . . . . . . . . . . . . . . . . . . .  25       4.7.4 replyChecks . . . . . . . . . . . . . . . . . . . . . .  26       4.7.5 replyWantBack . . . . . . . . . . . . . . . . . . . . .  27       4.7.6 valPolicy . . . . . . . . . . . . . . . . . . . . . . .  29       4.7.7 nextUpdate  . . . . . . . . . . . . . . . . . . . . . .  29       4.7.8 certReplyExtensions . . . . . . . . . . . . . . . . . .  29   4.8 requestNonce  . . . . . . . . . . . . . . . . . . . . . . . .  30   4.9 serverContextInfo . . . . . . . . . . . . . . . . . . . . . .  30   4.10 respExtensions . . . . . . . . . . . . . . . . . . . . . . .  30 5 Validation Policies Request . . . . . . . . . . . . . . . . . . .  31 6 Validation Policies Response  . . . . . . . . . . . . . . . . . .  31 7 SCVP Server Relay . . . . . . . . . . . . . . . . . . . . . . . .  32 8 SCVP ASN.1 Module . . . . . . . . . . . . . . . . . . . . . . . .  32Malpani, Housley, & Freeman                                     [Page 2]INTERNET DRAFT                    SCVP                     December 2002 9 Security Considerations . . . . . . . . . . . . . . . . . . . . .  3810 References  . . . . . . . . . . . . . . . . . . . . . . . . . . .  39   10.1 Normative References . . . . . . . . . . . . . . . . . . . .  39   10.2 Informative References . . . . . . . . . . . . . . . . . . .  4011 Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . . .  40Appendix A -- MIME Registrations . . . . . . . . . . . . . . . . . .  41   A.1 application/scvp-request  . . . . . . . . . . . . . . . . . .  41   A.2 application/scvp-response . . . . . . . . . . . . . . . . . .  42   A.3 application/scvp-policies-request . . . . . . . . . . . . . .  43   A.4 application/scvp-policies-response  . . . . . . . . . . . . .  44Appendix B -- SCVP over HTTP . . . . . . . . . . . . . . . . . . . .  45   B.1 SCVP Request  . . . . . . . . . . . . . . . . . . . . . . . .  45   B.2 SCVP Response . . . . . . . . . . . . . . . . . . . . . . . .  45Appendix C -- Author Contact Information . . . . . . . . . . . . . .  46Full Copyright Statement . . . . . . . . . . . . . . . . . . . . . .  47Malpani, Housley, & Freeman                                     [Page 3]INTERNET DRAFT                    SCVP                     December 20021 Introduction   Certificate validation is complex. If certificate handling is to be   widely deployed in a variety of applications and environments, the   amount of processing an application needs to perform before it can   accept a certificate needs to be reduced. There are a variety of   applications that can make use of public key certificates, but these   applications are burdened with the overhead of constructing and   validating the certification paths. SCVP reduces this overhead for   two classes of certificate-using applications.   The first class of application wants just two things. First, they   want confirmation that the public key belongs to the identity named   in the certificate. Second, they want to know if the public key can   be used for the intended purpose. The client delegates certificate   validation to the SCVP server.   The second class of application can perform certification path   validation, but these applications have no reliable method of   constructing a certification path to a trust anchor. The client   delegates certification path construction to the SCVP server.1.1 SCVP overview and requirements   The SCVP meets the requirements documented in [RQMTS].   The primary goals of SCVP are to make it easier to deploy PKI-enabled   applications and to allow central administration of PKI policies   within an organization. SCVP can be used by clients that do much of   the certificate processing themselves but simply want an untrusted   server to collect information for them. However, when the client has   complete trust in the SCVP server, SCVP can be used to delegate the   work of certification path construction and validation, and SCVP can   be used to ensure that policies are consistently enforced throughout   an organization.   Untrusted SCVP servers can provide clients the certification paths.   They can also provide clients revocation information, such as CRLs   and OCSP responses, and the client needs to validate the   certification path constructed by the SCVP server. These services can   be valuable to clients that do not include the protocols needed to   find and download intermediate certificates, CRLs, and OCSP   responses.   Trusted SCVP servers can perform certification path construction and   validation for the client. For a client uses these services, the   client inherently trusts the SCVP server as much as it would its own   path validation software (if it contained such software). There areMalpani, Housley, & Freeman                                     [Page 4]INTERNET DRAFT                    SCVP                     December 2002   two main reasons that a client may want to trust such an SCVP server:      - The client does not want to incur the overhead of including        certification path validation software and running it for each        certificate it receives.      - The client is in an organization or community that wants to        centralize its PKI policies. These policies might dictate        which trust anchors are used and the types of policy checking        that are performed during certification path validation.1.2 Terminology   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this   document are to be interpreted as described in [STDWORDS].1.3 Validation Policies   A validation policy can be used to specify the SCVP configuration.   The validation policy is determined by private agreement between the   client and the server, but it MUST be represented as an OBJECT   IDENTIFIER. The SCVP server can assign identifiers that indicate that   some settings are used in addition to values provided in the SCVP   request. These values might include certificate policies and trust   anchors.   In a separate, yet to be written, document application-specific   validation policies will be defined. These validation policies should   serve as guides for the development of further application-specific   validation policies. S/MIME, IPsec, and TLS likely candidate   applications for this document.   For a certification path to meet the validation policy, it MUST be a   valid certification path as defined in [PKIX-1] and all validation   policy constraints that apply to the certification path MUST be   verified.   Revocation checking is one aspect of certification path validation   defined in [PKIX-1]. Therefore, the validation policy MUST specify   the source of revocation information. Five alternatives are   envisioned:      1.  full CRLs (or full Authority Revocation Lists) have to be          collected;      2.  OCSP responses, using [OCSP], have to be collected;Malpani, Housley, & Freeman                                     [Page 5]INTERNET DRAFT                    SCVP                     December 2002      3.  delta CRLs and the relevant associated full CRLs (or full          Authority Revocation Lists) are to be collected;      4.  any available revocation information has to be collected;          and      5.  no revocation information need be collected.2 Protocol Overview   The SCVP uses a simple request-response model. That is, the SCVP   client creates a request and sends it to the SCVP server, and then   the SCVP server creates a single response and sends it to the client.   The typical use of SCVP is expected to be over HTTP, but it can also   be used with email. Appendix A and Appendix B provide the details   necessary to use SCVP with HTTP.   SCVP includes two request-response pairs. The primary request-   response pair handles certificate validation. The secondary request-   response pair is used to determine the list of validation policies   supported by a specific SCVP server.   Section 3 defines the certificate validation request, and section 4   defines the corresponding response.   Section 5 defines the validation policies request, and section 6   defines the corresponding response.   Appendix A registers MIME types for SCVP requests and responses, and   Appendix B describes the use of these MIME types with HTTP.3 Validation Request   A SCVP client request to the server MUST be a single SCVPRequest   item. When a SCVPRequest is encapsulated in a MIME body part,   application/scvp-request MUST be used.   There are two forms of SCVP request: unsigned and signed. A signed   request can be used to authenticate the client to the server. A   server MAY require all requests to be signed, and a server MAY   discard all unsigned requests. Alternatively, a server MAY choose to   process unsigned requests.Malpani, Housley, & Freeman                                     [Page 6]INTERNET DRAFT                    SCVP                     December 2002

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
日韩一区二区三区精品视频| 6080国产精品一区二区| 亚洲免费观看高清在线观看| 欧美精品第一页| 91久久线看在观草草青青| 国产99久久久国产精品潘金网站| 日本高清不卡在线观看| 亚洲欧美日韩国产手机在线| 大白屁股一区二区视频| 国产午夜精品福利| 成人免费视频国产在线观看| 欧美国产成人精品| 欧美日韩视频不卡| 91福利资源站| 成人欧美一区二区三区| www.亚洲色图| 亚洲欧洲日产国码二区| 91天堂素人约啪| 亚洲卡通欧美制服中文| 欧美亚洲动漫精品| 人人爽香蕉精品| 久久精品人人做| 91丨九色丨尤物| 日韩av一区二| 国产精品日日摸夜夜摸av| 欧美视频自拍偷拍| 精品亚洲porn| 亚洲一区影音先锋| 26uuu亚洲综合色欧美| 91日韩在线专区| 精品一区二区精品| 午夜不卡av免费| 亚洲国产电影在线观看| 欧美一级二级三级乱码| 91老师片黄在线观看| 国内久久精品视频| 亚洲一区二区四区蜜桃| 91理论电影在线观看| 亚洲女人小视频在线观看| 激情久久五月天| 欧美一级一级性生活免费录像| 久久99精品久久久久久国产越南 | 一级精品视频在线观看宜春院| 一区二区三区在线观看欧美| 日韩影院在线观看| 成人性色生活片免费看爆迷你毛片| 色婷婷av一区二区三区软件| 欧美大片日本大片免费观看| 成人欧美一区二区三区黑人麻豆 | 美女www一区二区| 一本到不卡免费一区二区| 精品国产乱码久久久久久蜜臀 | 久久精品视频免费观看| 亚洲成人手机在线| 成人免费视频免费观看| 精品久久99ma| 无码av免费一区二区三区试看| 东方欧美亚洲色图在线| 日韩一区二区在线看| 亚洲一区二区三区四区五区中文| 国产综合色视频| 7777精品伊人久久久大香线蕉的 | 不卡视频一二三四| 精品国产成人系列| 日本免费新一区视频| 欧美日韩国产综合一区二区 | 欧美日本免费一区二区三区| 国产精品久久久久久久久久免费看 | 亚洲三级电影全部在线观看高清| 奇米色一区二区| 欧美裸体bbwbbwbbw| 亚洲一区在线视频观看| 在线观看免费亚洲| 亚洲精品高清在线观看| 91香蕉视频mp4| 亚洲色图在线播放| 91一区在线观看| 国产精品欧美一区二区三区| 成人午夜电影网站| 国产精品美女久久久久久久久| 国产在线精品一区二区不卡了| 日韩欧美一区在线| 精品一区二区日韩| 久久精品免费在线观看| 国产激情视频一区二区三区欧美| 久久综合狠狠综合| 国产福利精品导航| 国产精品久99| 一本色道久久加勒比精品 | 欧美不卡一区二区| 国产精品一区二区久久不卡| 久久久久成人黄色影片| 国产麻豆午夜三级精品| 国产日韩欧美精品在线| av影院午夜一区| 亚洲最大成人综合| 在线综合视频播放| 国内精品嫩模私拍在线| 国产精品美女久久久久高潮| 91免费看视频| 日本成人在线一区| 国产丝袜欧美中文另类| 色菇凉天天综合网| 美女高潮久久久| 国产精品免费av| 欧美日韩视频在线观看一区二区三区 | av不卡在线观看| 亚洲成av人**亚洲成av**| 欧美tk—视频vk| 99国产精品视频免费观看| 亚洲一区二区三区四区在线观看| 日韩精品一区二区三区在线播放| 成人看片黄a免费看在线| 亚洲国产精品久久人人爱蜜臀| 日韩精品影音先锋| 91国产视频在线观看| 国产综合色精品一区二区三区| 亚洲图片另类小说| 精品嫩草影院久久| 在线免费观看不卡av| 国产成人免费在线视频| 亚洲bdsm女犯bdsm网站| 国产目拍亚洲精品99久久精品| 欧美在线观看一区| av影院午夜一区| 黄页网站大全一区二区| 亚洲.国产.中文慕字在线| 欧美激情一区二区三区不卡| 在线观看91精品国产麻豆| a4yy欧美一区二区三区| 国产精品一区二区无线| 日韩电影在线一区二区三区| 亚洲女子a中天字幕| 国产午夜三级一区二区三| 欧美日韩国产一级二级| 一本色道a无线码一区v| 国产aⅴ综合色| 精品亚洲国产成人av制服丝袜| 丝袜a∨在线一区二区三区不卡| 国产精品成人一区二区艾草 | 欧美日韩国产综合草草| 一本到不卡精品视频在线观看 | 欧美日韩午夜影院| 色综合久久中文综合久久97| 成人亚洲精品久久久久软件| 国产精品一区二区男女羞羞无遮挡 | 精品国产精品一区二区夜夜嗨| 欧美在线影院一区二区| 91亚洲男人天堂| 不卡欧美aaaaa| av激情综合网| 9久草视频在线视频精品| 成人一道本在线| jizzjizzjizz欧美| 91浏览器入口在线观看| 日本韩国欧美国产| 日本乱码高清不卡字幕| 一本一本久久a久久精品综合麻豆| 91色在线porny| 欧日韩精品视频| 欧美日韩国产一区| 欧美成人乱码一区二区三区| 日韩美一区二区三区| 久久综合色8888| 中文字幕欧美三区| 亚洲色图清纯唯美| 亚洲高清中文字幕| 免费高清成人在线| 国产suv一区二区三区88区| 成人av在线影院| 91福利小视频| 69久久99精品久久久久婷婷| 欧美成人bangbros| 中文一区一区三区高中清不卡| 日韩一区中文字幕| 三级在线观看一区二区| 久久69国产一区二区蜜臀| 粉嫩绯色av一区二区在线观看| 成人av免费观看| 欧美三级欧美一级| 日韩女优制服丝袜电影| 国产精品午夜在线| 亚洲国产视频一区二区| 九九九久久久精品| 91色porny在线视频| 欧美一区二区三区日韩视频| 国产视频视频一区| 一级日本不卡的影视| 黄色日韩网站视频| 欧美日韩一区国产| 久久久亚洲午夜电影| 亚洲精选一二三| 激情久久久久久久久久久久久久久久| 成人精品视频一区二区三区尤物| 欧美性极品少妇| 国产日产欧美精品一区二区三区| 亚洲另类春色校园小说| 国产很黄免费观看久久| 欧美精品视频www在线观看| 国产亚洲精品bt天堂精选|