亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來(lái)到蟲(chóng)蟲(chóng)下載站! | ?? 資源下載 ?? 資源專(zhuān)輯 ?? 關(guān)于我們
? 蟲(chóng)蟲(chóng)下載站

?? rfc2459.txt

?? PKIX的RFC英文文檔
?? TXT
?? 第 1 頁(yè) / 共 5 頁(yè)
字號(hào):
2  Requirements and Assumptions   The goal of this specification is to develop a profile to facilitate   the use of X.509 certificates within Internet applications for those   communities wishing to make use of X.509 technology. Such   applications may include WWW, electronic mail, user authentication,   and IPsec.  In order to relieve some of the obstacles to using X.509   certificates, this document defines a profile to promote the   development of certificate management systems; development of   application tools; and interoperability determined by policy.   Some communities will need to supplement, or possibly replace, this   profile in order to meet the requirements of specialized application   domains or environments with additional authorization, assurance, or   operational requirements.  However, for basic applications, common   representations of frequently used attributes are defined so that   application developers can obtain necessary information without   regard to the issuer of a particular certificate or certificate   revocation list (CRL).   A certificate user should review the certificate policy generated by   the certification authority (CA) before relying on the authentication   or non-repudiation services associated with the public key in a   particular certificate.  To this end, this standard does not   prescribe legally binding rules or duties.   As supplemental authorization and attribute management tools emerge,   such as attribute certificates, it may be appropriate to limit the   authenticated attributes that are included in a certificate.  These   other management tools may provide more appropriate methods of   conveying many authenticated attributes.2.1  Communication and Topology   The users of certificates will operate in a wide range of   environments with respect to their communication topology, especially   users of secure electronic mail.  This profile supports users without   high bandwidth, real-time IP connectivity, or high connection   availability.  In addition, the profile allows for the presence of   firewall or other filtered communication.Housley, et. al.            Standards Track                     [Page 6]RFC 2459        Internet X.509 Public Key Infrastructure    January 1999   This profile does not assume the deployment of an X.500 Directory   system.  The profile does not prohibit the use of an X.500 Directory,   but other means of distributing certificates and certificate   revocation lists (CRLs) may be used.2.2  Acceptability Criteria   The goal of the Internet Public Key Infrastructure (PKI) is to meet   the needs of deterministic, automated identification, authentication,   access control, and authorization functions. Support for these   services determines the attributes contained in the certificate as   well as the ancillary control information in the certificate such as   policy data and certification path constraints.2.3  User Expectations   Users of the Internet PKI are people and processes who use client   software and are the subjects named in certificates.  These uses   include readers and writers of electronic mail, the clients for WWW   browsers, WWW servers, and the key manager for IPsec within a router.   This profile recognizes the limitations of the platforms these users   employ and the limitations in sophistication and attentiveness of the   users themselves.  This manifests itself in minimal user   configuration responsibility (e.g., trusted CA keys, rules), explicit   platform usage constraints within the certificate, certification path   constraints which shield the user from many malicious actions, and   applications which sensibly automate validation functions.2.4  Administrator Expectations   As with user expectations, the Internet PKI profile is structured to   support the individuals who generally operate CAs.  Providing   administrators with unbounded choices increases the chances that a   subtle CA administrator mistake will result in broad compromise.   Also, unbounded choices greatly complicate the software that shall   process and validate the certificates created by the CA.3  Overview of Approach   Following is a simplified view of the architectural model assumed by   the PKIX specifications.Housley, et. al.            Standards Track                     [Page 7]RFC 2459        Internet X.509 Public Key Infrastructure    January 1999       +---+       | C |                       +------------+       | e | <-------------------->| End entity |       | r |       Operational     +------------+       | t |       transactions          ^       |   |      and management         |  Management       | / |       transactions          |  transactions       |   |                             |                PKI users       | C |                             v       | R |       -------------------+--+-----------+----------------       | L |                          ^              ^       |   |                          |              |  PKI management       |   |                          v              |      entities       | R |                       +------+          |       | e | <---------------------| RA   | <---+    |       | p |  Publish certificate  +------+     |    |       | o |                                    |    |       | s |                                    |    |       | I |                                    v    v       | t |                                +------------+       | o | <------------------------------|     CA     |       | r |   Publish certificate          +------------+       | y |   Publish CRL                         ^       |   |                                       |       +---+                        Management     |                                    transactions   |                                                   v                                               +------+                                               |  CA  |                                               +------+                          Figure 1 - PKI Entities   The components in this model are:   end entity:  user of PKI certificates and/or end user system that                is the subject of a certificate;   CA:          certification authority;   RA:          registration authority, i.e., an optional system to                which a CA delegates certain management functions;   repository:  a system or collection of distributed systems that                store certificates and CRLs and serves as a means of                distributing these certificates and CRLs to end                entities.Housley, et. al.            Standards Track                     [Page 8]RFC 2459        Internet X.509 Public Key Infrastructure    January 19993.1  X.509 Version 3 Certificate   Users of a public key shall be confident that the associated private   key is owned by the correct remote subject (person or system) with   which an encryption or digital signature mechanism will be used.   This confidence is obtained through the use of public key   certificates, which are data structures that bind public key values   to subjects.  The binding is asserted by having a trusted CA   digitally sign each certificate. The CA may base this assertion upon   technical means (a.k.a., proof of posession through a challenge-   response protocol), presentation of the private key, or on an   assertion by the subject.  A certificate has a limited valid lifetime   which is indicated in its signed contents.  Because a certificate's   signature and timeliness can be independently checked by a   certificate-using client, certificates can be distributed via   untrusted communications and server systems, and can be cached in   unsecured storage in certificate-using systems.   ITU-T X.509 (formerly CCITT X.509) or ISO/IEC/ITU 9594-8, which was   first published in 1988 as part of the X.500 Directory   recommendations, defines a standard certificate format [X.509]. The   certificate format in the 1988 standard is called the version 1 (v1)   format.  When X.500 was revised in 1993, two more fields were added,   resulting in the version 2 (v2) format. These two fields may be used   to support directory access control.   The Internet Privacy Enhanced Mail (PEM) RFCs, published in 1993,   include specifications for a public key infrastructure based on X.509   v1 certificates [RFC 1422].  The experience gained in attempts to   deploy RFC 1422 made it clear that the v1 and v2 certificate formats   are deficient in several respects.  Most importantly, more fields   were needed to carry information which PEM design and implementation   experience has proven necessary.  In response to these new   requirements, ISO/IEC/ITU and ANSI X9 developed the X.509 version 3   (v3) certificate format.  The v3 format extends the v2 format by   adding provision for additional extension fields.  Particular   extension field types may be specified in standards or may be defined   and registered by any organization or community. In June 1996,   standardization of the basic v3 format was completed [X.509].   ISO/IEC/ITU and ANSI X9 have also developed standard extensions for   use in the v3 extensions field [X.509][X9.55].  These extensions can   convey such data as additional subject identification information,   key attribute information, policy information, and certification path   constraints.Housley, et. al.            Standards Track                     [Page 9]RFC 2459        Internet X.509 Public Key Infrastructure    January 1999   However, the ISO/IEC/ITU and ANSI X9 standard extensions are very   broad in their applicability.  In order to develop interoperable   implementations of X.509 v3 systems for Internet use, it is necessary   to specify a profile for use of the X.509 v3 extensions tailored for   the Internet.  It is one goal of this document to specify a profile   for Internet WWW, electronic mail, and IPsec applications.   Environments with additional requirements may build on this profile   or may replace it.3.2  Certification Paths and Trust   A user of a security service requiring knowledge of a public key   generally needs to obtain and validate a certificate containing the   required public key. If the public-key user does not already hold an   assured copy of the public key of the CA that signed the certificate,   the CA's name, and related information (such as the validity period   or name constraints), then it might need an additional certificate to   obtain that public key.  In general, a chain of multiple certificates   may be needed, comprising a certificate of the public key owner (the   end entity) signed by one CA, and zero or more additional   certificates of CAs signed by other CAs.  Such chains, called   certification paths, are required because a public key user is only   initialized with a limited number of assured CA public keys.   There are different ways in which CAs might be configured in order   for public key users to be able to find certification paths.  For   PEM, RFC 1422 defined a rigid hierarchical structure of CAs.  There   are three types of PEM certification authority:      (a)  Internet Policy Registration Authority (IPRA):  This      authority, operated under the auspices of the Internet Society,      acts as the root of the PEM certification hierarchy at level 1.      It issues certificates only for the next level of authorities,      PCAs.  All certification paths start with the IPRA.      (b)  Policy Certification Authorities (PCAs):  PCAs are at level 2      of the hierarchy, each PCA being certified by the IPRA.  A PCA      shall establish and publish a statement of its policy with respect      to certifying users or subordinate certification authorities.      Distinct PCAs aim to satisfy different user needs. For example,      one PCA (an organizational PCA) might support the general      electronic mail needs of commercial organizations, and another PCA      (a high-assurance PCA) might have a more stringent policy designed      for satisfying legally binding digital signature requirements.Housley, et. al.            Standards Track                    [Page 10]RFC 2459        Internet X.509 Public Key Infrastructure    January 1999      (c)  Certification Authorities (CAs):  CAs are at level 3 of the      hierarchy and can also be at lower levels. Those at level 3 are      certified by PCAs.  CAs represent, for example, particular      organizations, particular organizational units (e.g., departments,      groups, sections), or particular geographical areas.   RFC 1422 furthermore has a name subordination rule which requires   that a CA can only issue certificates for entities whose names are   subordinate (in the X.500 naming tree) to the name of the CA itself.   The trust associated with a PEM certification path is implied by the   PCA name. The name subordination rule ensures that CAs below the PCA   are sensibly constrained as to the set of subordinate entities they

?? 快捷鍵說(shuō)明

復(fù)制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號(hào) Ctrl + =
減小字號(hào) Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
亚洲男人的天堂网| 日韩二区在线观看| 欧美一区二区免费观在线| 大白屁股一区二区视频| 亚洲成a人片综合在线| 日本一区二区三区dvd视频在线| 日本久久电影网| 国产激情视频一区二区在线观看| 亚洲一区二区欧美激情| 中文字幕av不卡| 精品国产人成亚洲区| 欧美日韩在线三区| 一本一道综合狠狠老| 国产精品99久久久久久似苏梦涵 | 日本不卡高清视频| 亚洲欧洲精品成人久久奇米网| 精品国产91九色蝌蚪| 欧美日韩高清影院| 色婷婷av一区二区三区软件| 成人在线综合网站| 国产精品一卡二卡在线观看| 免费欧美在线视频| 午夜精品福利一区二区三区av| 国产精品久久一卡二卡| 久久久久久黄色| 精品国产第一区二区三区观看体验| 欧美精品xxxxbbbb| 欧美亚洲图片小说| 色播五月激情综合网| caoporn国产精品| 高清不卡在线观看| 国产乱对白刺激视频不卡| 久久99精品久久久久久动态图| 天天综合网 天天综合色| 亚洲电影一区二区三区| 亚洲一区影音先锋| 一区二区三区高清不卡| 亚洲激情第一区| 亚洲精品免费在线播放| 一个色妞综合视频在线观看| 亚洲黄色小视频| 亚洲国产成人91porn| 日韩专区欧美专区| 日韩国产一区二| 另类的小说在线视频另类成人小视频在线 | 国产亚洲污的网站| 国产日产欧产精品推荐色| 久久久国产精华| 国产精品国产自产拍在线| 国产精品免费av| 亚洲色欲色欲www在线观看| 亚洲麻豆国产自偷在线| 亚洲综合精品久久| 日韩精品一级二级 | 国产91综合一区在线观看| 国产一本一道久久香蕉| 国产一区在线视频| 国产精品99久久久久久久vr| 99久久精品国产导航| 91激情在线视频| 欧美男生操女生| 精品少妇一区二区三区视频免付费| 欧美精品一区二区久久久| 中文欧美字幕免费| 亚洲激情五月婷婷| 久久福利视频一区二区| 成人动漫精品一区二区| 欧美视频一区二区| 日韩欧美国产一区二区在线播放| 久久久久久电影| 亚洲综合精品久久| 国产永久精品大片wwwapp| 91麻豆精品视频| 91精品国产综合久久福利软件| 久久色在线观看| 亚洲黄色免费电影| 国产在线精品视频| 欧洲一区二区三区在线| 日韩欧美一区中文| ...xxx性欧美| 蜜乳av一区二区| 97久久精品人人澡人人爽| 欧美精品vⅰdeose4hd| 欧美经典一区二区| 亚洲444eee在线观看| 成人午夜免费电影| 欧美一区在线视频| 国产精品久久久久久久久久免费看| 香蕉成人啪国产精品视频综合网| 国产一区二区三区四区在线观看 | 成人app软件下载大全免费| 在线电影院国产精品| 日韩久久一区二区| 国产曰批免费观看久久久| 欧美色手机在线观看| 久久久青草青青国产亚洲免观| 亚洲成人资源网| 成人av综合在线| 欧美变态凌虐bdsm| 一区二区三区**美女毛片| 国产suv精品一区二区三区| 91精品国产黑色紧身裤美女| 中文字幕日韩精品一区| 激情丁香综合五月| 欧美绝品在线观看成人午夜影视| 国产精品久久久久天堂| 麻豆极品一区二区三区| 欧美性猛交xxxxxxxx| 国产精品久久久久久久久图文区| 久久精品国产一区二区三| 欧美日韩三级一区二区| 国产精品国产三级国产普通话99 | 久久一二三国产| 视频一区在线播放| 日本道精品一区二区三区| 国产精品网站导航| 国产成人在线色| 精品精品欲导航| 久久99久久99小草精品免视看| 欧美日韩国产精品成人| 亚洲精品久久嫩草网站秘色| 成人小视频在线观看| 26uuu欧美日本| 精品一区二区影视| 欧美一区二区三区思思人| 亚洲福利视频三区| 欧美日韩免费在线视频| 亚洲影视资源网| 在线观看中文字幕不卡| 亚洲一区二区在线免费观看视频| 91视频观看视频| 一区二区成人在线| 欧美视频在线一区| 亚洲成人动漫在线免费观看| 日本韩国欧美在线| 一区二区三区免费网站| 欧美四级电影在线观看| 亚洲国产wwwccc36天堂| 8x8x8国产精品| 日本不卡一二三区黄网| 精品国产精品一区二区夜夜嗨| 毛片av一区二区| 精品成人一区二区| 国产精品中文有码| 国产精品污网站| 99re成人在线| 亚洲国产乱码最新视频| 538在线一区二区精品国产| 日本不卡一区二区三区| 久久综合久久99| 成人av资源下载| 一区二区三区四区激情| 欧美色倩网站大全免费| 麻豆国产91在线播放| 国产亚洲自拍一区| 91网站在线观看视频| 亚洲图片一区二区| 91精品国产一区二区| 国产福利视频一区二区三区| 亚洲欧洲日产国码二区| 欧美主播一区二区三区美女| 日本不卡123| 国产欧美久久久精品影院| 91高清视频在线| 免费高清在线视频一区·| 亚洲国产精品高清| 在线精品视频一区二区| 毛片一区二区三区| 亚洲欧洲一区二区在线播放| 欧美日韩在线三级| 国产精一区二区三区| 一区二区三区在线观看动漫| 91精品国产美女浴室洗澡无遮挡| 国产91清纯白嫩初高中在线观看 | 懂色av一区二区三区免费观看| 一区二区中文视频| 日韩一区二区免费视频| 成人高清视频在线观看| 亚洲h动漫在线| 国产欧美日韩不卡免费| 欧美日韩精品一区二区三区四区| 激情综合亚洲精品| 一区二区三区在线观看网站| 亚洲精品在线观| 欧美在线制服丝袜| 国产美女精品人人做人人爽| 亚洲自拍偷拍图区| 国产日产精品一区| 欧美一区二区视频网站| 99re这里只有精品6| 国产一区二区美女诱惑| 亚洲九九爱视频| 久久久国产精华| 日韩一二三四区| 欧美日韩五月天| 99久久精品国产麻豆演员表| 国产一区在线精品| 日韩成人dvd| 亚洲一区二区av在线| 国产精品嫩草影院com|