亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? draft-ietf-pkix-scvp-11.txt

?? PKIX的RFC英文文檔
?? TXT
?? 第 1 頁 / 共 5 頁
字號:
Internet Draft                                             A. Malpanidraft-ietf-pkix-scvp-11.txt               Malpani Consulting ServicesDecember 2002                                              R. HousleyExpires in six months                                RSA Laboratories                                                           T. Freeman                                                       Microsoft Corp             Simple Certificate Validation Protocol (SCVP)Status of this memo   This document is an Internet-Draft and is in full conformance with   all provisions of Section 10 of RFC 2026.   Internet-Drafts are working documents of the Internet Engineering   Task Force (IETF), its areas, and its working groups.  Note that   other groups may also distribute working documents as Internet-   Drafts.   Internet-Drafts are draft documents valid for a maximum of six months   and may be updated, replaced, or obsoleted by other documents at any   time.  It is inappropriate to use Internet-Drafts as reference   material or to cite them other than as "work in progress."   The list of current Internet-Drafts can be accessed at   http://www.ietf.org/ietf/1id-abstracts.txt   The list of Internet-Draft Shadow Directories can be accessed at   http://www.ietf.org/shadow.html.Copyright Notice   Copyright (C) The Internet Society (2002). All Rights Reserved.Abstract   SCVP allows a client to offload certificate handling to a server. The   server can provide the client with a variety of valuable information   about the certificate, such as whether the certificate is valid, a   certification path to a trust anchor, and revocation status. SCVP has   many purposes, including simplifying client implementations and   allowing companies to centralize trust and policy management.Malpani, Housley, & Freeman                                     [Page 1]INTERNET DRAFT                    SCVP                     December 2002Table of Contents 1 Introduction  . . . . . . . . . . . . . . . . . . . . . . . . . .   4   1.1 SCVP overview and requirements  . . . . . . . . . . . . . . .   4   1.2 Terminology . . . . . . . . . . . . . . . . . . . . . . . . .   5   1.3 Validation Policies . . . . . . . . . . . . . . . . . . . . .   5 2 Protocol Overview . . . . . . . . . . . . . . . . . . . . . . . .   6 3 Validation Request  . . . . . . . . . . . . . . . . . . . . . . .   6   3.1 scvpVersion . . . . . . . . . . . . . . . . . . . . . . . . .   8   3.2 query . . . . . . . . . . . . . . . . . . . . . . . . . . . .   8       3.2.1 queriedCerts  . . . . . . . . . . . . . . . . . . . . .   9       3.2.2 checks  . . . . . . . . . . . . . . . . . . . . . . . .   9       3.2.3 wantBack  . . . . . . . . . . . . . . . . . . . . . . .  11       3.2.4 serverContextInfo . . . . . . . . . . . . . . . . . . .  12       3.2.5 valPolicy . . . . . . . . . . . . . . . . . . . . . . .  13       3.2.6 validityTime  . . . . . . . . . . . . . . . . . . . . .  14       3.2.7 trustAnchors  . . . . . . . . . . . . . . . . . . . . .  14       3.2.8 intermediateCerts . . . . . . . . . . . . . . . . . . .  15       3.2.9 revInfos  . . . . . . . . . . . . . . . . . . . . . . .  16       3.2.10 queryExtensions  . . . . . . . . . . . . . . . . . . .  16   3.3 requestor . . . . . . . . . . . . . . . . . . . . . . . . . .  17   3.4 requestNonce  . . . . . . . . . . . . . . . . . . . . . . . .  17   3.5 reqExtensions . . . . . . . . . . . . . . . . . . . . . . . .  17 4 Validation Response . . . . . . . . . . . . . . . . . . . . . . .  18   4.1 scvpVersion . . . . . . . . . . . . . . . . . . . . . . . . .  20   4.2 producedAt  . . . . . . . . . . . . . . . . . . . . . . . . .  20   4.3 responseStatus  . . . . . . . . . . . . . . . . . . . . . . .  20   4.4 requestReference  . . . . . . . . . . . . . . . . . . . . . .  22       4.4.1 requestHash . . . . . . . . . . . . . . . . . . . . . .  22       4.4.2 fullRequest . . . . . . . . . . . . . . . . . . . . . .  23   4.5 requestor . . . . . . . . . . . . . . . . . . . . . . . . . .  23   4.6 responder . . . . . . . . . . . . . . . . . . . . . . . . . .  23   4.7 replyObjects  . . . . . . . . . . . . . . . . . . . . . . . .  23       4.7.1 cert  . . . . . . . . . . . . . . . . . . . . . . . . .  24       4.7.2 replyStatus . . . . . . . . . . . . . . . . . . . . . .  24       4.7.3 replyValTime  . . . . . . . . . . . . . . . . . . . . .  25       4.7.4 replyChecks . . . . . . . . . . . . . . . . . . . . . .  26       4.7.5 replyWantBack . . . . . . . . . . . . . . . . . . . . .  27       4.7.6 valPolicy . . . . . . . . . . . . . . . . . . . . . . .  29       4.7.7 nextUpdate  . . . . . . . . . . . . . . . . . . . . . .  29       4.7.8 certReplyExtensions . . . . . . . . . . . . . . . . . .  29   4.8 requestNonce  . . . . . . . . . . . . . . . . . . . . . . . .  30   4.9 serverContextInfo . . . . . . . . . . . . . . . . . . . . . .  30   4.10 respExtensions . . . . . . . . . . . . . . . . . . . . . . .  30 5 Validation Policies Request . . . . . . . . . . . . . . . . . . .  31 6 Validation Policies Response  . . . . . . . . . . . . . . . . . .  31 7 SCVP Server Relay . . . . . . . . . . . . . . . . . . . . . . . .  32 8 SCVP ASN.1 Module . . . . . . . . . . . . . . . . . . . . . . . .  32Malpani, Housley, & Freeman                                     [Page 2]INTERNET DRAFT                    SCVP                     December 2002 9 Security Considerations . . . . . . . . . . . . . . . . . . . . .  3810 References  . . . . . . . . . . . . . . . . . . . . . . . . . . .  39   10.1 Normative References . . . . . . . . . . . . . . . . . . . .  39   10.2 Informative References . . . . . . . . . . . . . . . . . . .  4011 Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . . .  40Appendix A -- MIME Registrations . . . . . . . . . . . . . . . . . .  41   A.1 application/scvp-request  . . . . . . . . . . . . . . . . . .  41   A.2 application/scvp-response . . . . . . . . . . . . . . . . . .  42   A.3 application/scvp-policies-request . . . . . . . . . . . . . .  43   A.4 application/scvp-policies-response  . . . . . . . . . . . . .  44Appendix B -- SCVP over HTTP . . . . . . . . . . . . . . . . . . . .  45   B.1 SCVP Request  . . . . . . . . . . . . . . . . . . . . . . . .  45   B.2 SCVP Response . . . . . . . . . . . . . . . . . . . . . . . .  45Appendix C -- Author Contact Information . . . . . . . . . . . . . .  46Full Copyright Statement . . . . . . . . . . . . . . . . . . . . . .  47Malpani, Housley, & Freeman                                     [Page 3]INTERNET DRAFT                    SCVP                     December 20021 Introduction   Certificate validation is complex. If certificate handling is to be   widely deployed in a variety of applications and environments, the   amount of processing an application needs to perform before it can   accept a certificate needs to be reduced. There are a variety of   applications that can make use of public key certificates, but these   applications are burdened with the overhead of constructing and   validating the certification paths. SCVP reduces this overhead for   two classes of certificate-using applications.   The first class of application wants just two things. First, they   want confirmation that the public key belongs to the identity named   in the certificate. Second, they want to know if the public key can   be used for the intended purpose. The client delegates certificate   validation to the SCVP server.   The second class of application can perform certification path   validation, but these applications have no reliable method of   constructing a certification path to a trust anchor. The client   delegates certification path construction to the SCVP server.1.1 SCVP overview and requirements   The SCVP meets the requirements documented in [RQMTS].   The primary goals of SCVP are to make it easier to deploy PKI-enabled   applications and to allow central administration of PKI policies   within an organization. SCVP can be used by clients that do much of   the certificate processing themselves but simply want an untrusted   server to collect information for them. However, when the client has   complete trust in the SCVP server, SCVP can be used to delegate the   work of certification path construction and validation, and SCVP can   be used to ensure that policies are consistently enforced throughout   an organization.   Untrusted SCVP servers can provide clients the certification paths.   They can also provide clients revocation information, such as CRLs   and OCSP responses, and the client needs to validate the   certification path constructed by the SCVP server. These services can   be valuable to clients that do not include the protocols needed to   find and download intermediate certificates, CRLs, and OCSP   responses.   Trusted SCVP servers can perform certification path construction and   validation for the client. For a client uses these services, the   client inherently trusts the SCVP server as much as it would its own   path validation software (if it contained such software). There areMalpani, Housley, & Freeman                                     [Page 4]INTERNET DRAFT                    SCVP                     December 2002   two main reasons that a client may want to trust such an SCVP server:      - The client does not want to incur the overhead of including        certification path validation software and running it for each        certificate it receives.      - The client is in an organization or community that wants to        centralize its PKI policies. These policies might dictate        which trust anchors are used and the types of policy checking        that are performed during certification path validation.1.2 Terminology   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this   document are to be interpreted as described in [STDWORDS].1.3 Validation Policies   A validation policy can be used to specify the SCVP configuration.   The validation policy is determined by private agreement between the   client and the server, but it MUST be represented as an OBJECT   IDENTIFIER. The SCVP server can assign identifiers that indicate that   some settings are used in addition to values provided in the SCVP   request. These values might include certificate policies and trust   anchors.   In a separate, yet to be written, document application-specific   validation policies will be defined. These validation policies should   serve as guides for the development of further application-specific   validation policies. S/MIME, IPsec, and TLS likely candidate   applications for this document.   For a certification path to meet the validation policy, it MUST be a   valid certification path as defined in [PKIX-1] and all validation   policy constraints that apply to the certification path MUST be   verified.   Revocation checking is one aspect of certification path validation   defined in [PKIX-1]. Therefore, the validation policy MUST specify   the source of revocation information. Five alternatives are   envisioned:      1.  full CRLs (or full Authority Revocation Lists) have to be          collected;      2.  OCSP responses, using [OCSP], have to be collected;Malpani, Housley, & Freeman                                     [Page 5]INTERNET DRAFT                    SCVP                     December 2002      3.  delta CRLs and the relevant associated full CRLs (or full          Authority Revocation Lists) are to be collected;      4.  any available revocation information has to be collected;          and      5.  no revocation information need be collected.2 Protocol Overview   The SCVP uses a simple request-response model. That is, the SCVP   client creates a request and sends it to the SCVP server, and then   the SCVP server creates a single response and sends it to the client.   The typical use of SCVP is expected to be over HTTP, but it can also   be used with email. Appendix A and Appendix B provide the details   necessary to use SCVP with HTTP.   SCVP includes two request-response pairs. The primary request-   response pair handles certificate validation. The secondary request-   response pair is used to determine the list of validation policies   supported by a specific SCVP server.   Section 3 defines the certificate validation request, and section 4   defines the corresponding response.   Section 5 defines the validation policies request, and section 6   defines the corresponding response.   Appendix A registers MIME types for SCVP requests and responses, and   Appendix B describes the use of these MIME types with HTTP.3 Validation Request   A SCVP client request to the server MUST be a single SCVPRequest   item. When a SCVPRequest is encapsulated in a MIME body part,   application/scvp-request MUST be used.   There are two forms of SCVP request: unsigned and signed. A signed   request can be used to authenticate the client to the server. A   server MAY require all requests to be signed, and a server MAY   discard all unsigned requests. Alternatively, a server MAY choose to   process unsigned requests.Malpani, Housley, & Freeman                                     [Page 6]INTERNET DRAFT                    SCVP                     December 2002

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
蜜桃久久久久久| 韩日精品视频一区| 精品国产第一区二区三区观看体验| 国产综合久久久久影院| 亚洲欧美日韩久久| 欧美一级午夜免费电影| 91理论电影在线观看| 国产乱人伦偷精品视频免下载 | 国产精品久久久久精k8| 正在播放亚洲一区| 91在线你懂得| 国产一区二区三区综合| 亚洲福利视频三区| 成人免费一区二区三区视频| 久久久影院官网| 91精品国产综合久久精品app | 久久精工是国产品牌吗| 中文字幕欧美激情一区| 久久一日本道色综合| 91精品在线观看入口| 欧美探花视频资源| 欧洲av在线精品| 一本久久精品一区二区| eeuss鲁一区二区三区| 欧美精品xxxxbbbb| 91国产精品成人| 97久久精品人人做人人爽| 国产91精品一区二区麻豆亚洲| 日本亚洲天堂网| 天天色图综合网| 日韩精品高清不卡| 性做久久久久久久免费看| 亚洲欧美一区二区三区极速播放| 中文字幕精品三区| 久久久久久久久蜜桃| 91精选在线观看| 这里是久久伊人| 91精品国产高清一区二区三区蜜臀| 欧美三级中文字幕在线观看| 欧洲av在线精品| 欧美三级中文字幕| 欧美一区二区三区在| 欧美一区二区私人影院日本| 欧美一区二区视频免费观看| 欧美一区二区三区在线观看| 久久99精品久久只有精品| 26uuuu精品一区二区| 欧美一卡二卡在线| 日韩欧美中文字幕公布| 日韩免费高清视频| 欧美成人精品高清在线播放| 精品国产在天天线2019| 久久久久久久久久久久电影| 国产午夜精品美女毛片视频| 欧美高清在线精品一区| 国产精品久久久久一区二区三区共| 中文在线一区二区| 亚洲欧美色图小说| 亚洲图片欧美视频| 日韩国产高清在线| 国产在线麻豆精品观看| 国产成人免费视频网站高清观看视频 | 欧美一级搡bbbb搡bbbb| 亚洲精品一区二区三区福利| 久久久久久久久99精品| 精品国产免费久久| 中文字幕中文字幕一区| 亚洲自拍偷拍网站| 日本伊人精品一区二区三区观看方式| 久久99久久精品欧美| 国产99久久久国产精品潘金| 日本乱人伦aⅴ精品| 在线不卡一区二区| 国产欧美精品一区二区色综合朱莉| 亚洲视频中文字幕| 秋霞av亚洲一区二区三| 成人丝袜高跟foot| 91精品国产乱| 亚洲天堂a在线| 免费精品视频在线| 波多野结衣中文字幕一区二区三区| 欧美少妇bbb| 久久精品免视看| 亚洲va在线va天堂| 国产精品中文字幕日韩精品| 欧美影院午夜播放| 国产欧美一区二区精品性色超碰| 亚洲在线视频网站| 懂色av一区二区在线播放| 欧美亚洲国产怡红院影院| 国产色产综合产在线视频| 亚洲成人av一区| 95精品视频在线| 久久久噜噜噜久久人人看 | 日韩欧美一二三| 亚洲精品国产成人久久av盗摄 | 欧美视频中文一区二区三区在线观看| 亚洲精品一区二区三区蜜桃下载| 亚洲综合视频网| 成人小视频在线| 欧美tk丨vk视频| 亚洲国产欧美日韩另类综合| 成人免费视频app| 日韩三级免费观看| 午夜精品免费在线| 91在线国产福利| 日本一区二区三区久久久久久久久不| 日本va欧美va精品发布| 欧美又粗又大又爽| 日韩美女视频19| 国产成人综合在线| 日韩免费在线观看| 亚洲国产欧美一区二区三区丁香婷| 成人精品国产免费网站| 国产校园另类小说区| 久久国产免费看| 欧美一区国产二区| 亚洲不卡av一区二区三区| 色视频成人在线观看免| 国产精品毛片大码女人| 国产成人午夜视频| 久久婷婷久久一区二区三区| 麻豆成人av在线| 51精品视频一区二区三区| 亚洲主播在线播放| 99久久伊人久久99| 东方aⅴ免费观看久久av| 欧美一级艳片视频免费观看| 夜夜嗨av一区二区三区四季av| 丁香婷婷综合激情五月色| 精品久久久久一区| 久久精品免费观看| 欧美成人精品高清在线播放| 麻豆精品视频在线观看视频| 日韩三级免费观看| 人禽交欧美网站| 日韩三级高清在线| 精品制服美女久久| 精品日韩一区二区| 国内成人免费视频| 国产人妖乱国产精品人妖| 国产福利91精品| 国产精品久久午夜夜伦鲁鲁| 不卡在线视频中文字幕| 亚洲欧美日韩国产成人精品影院| 99国内精品久久| 一区二区欧美国产| 欧美精品一二三区| 麻豆成人免费电影| 国产日韩欧美精品综合| eeuss鲁片一区二区三区在线观看| 国产精品久久久久影视| 在线观看一区日韩| 亚洲男同1069视频| 欧美三级电影精品| 轻轻草成人在线| 精品国产成人在线影院| 国产成人av影院| 亚洲三级在线免费| 欧美剧在线免费观看网站 | 精品国产乱码久久| 国产激情视频一区二区在线观看| 国产精品传媒入口麻豆| 欧美性猛片xxxx免费看久爱| 久久丁香综合五月国产三级网站| 国产日韩欧美麻豆| 在线视频亚洲一区| 日本特黄久久久高潮| 国产日韩av一区二区| 在线观看av不卡| 加勒比av一区二区| 亚洲欧美国产三级| 欧美一区二区精品久久911| 国产高清不卡二三区| 亚洲一区中文日韩| 26uuu成人网一区二区三区| 91婷婷韩国欧美一区二区| 日本美女一区二区三区视频| 国产精品日韩精品欧美在线| 欧美乱熟臀69xxxxxx| 成人理论电影网| 日韩不卡免费视频| 国产精品久久久久久久久久久免费看 | 日本韩国一区二区三区| 尤物在线观看一区| 精品国产一二三| 一本一道波多野结衣一区二区| 免费观看91视频大全| 国产精品对白交换视频| 日韩一级高清毛片| 91黄色免费看| 国产一区二区精品久久91| 亚洲6080在线| 国产精品高潮久久久久无| 日韩欧美国产系列| 欧美亚一区二区| 国产91富婆露脸刺激对白| 三级精品在线观看| 亚洲女同ⅹxx女同tv| 国产人妖乱国产精品人妖|