亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來(lái)到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關(guān)于我們
? 蟲蟲下載站

?? draft-ietf-pkix-rfc2510bis-07.txt

?? PKIX的RFC英文文檔
?? TXT
?? 第 1 頁(yè) / 共 5 頁(yè)
字號(hào):
Internet Draft                                                   C. AdamsPKIX Working Group                                          Entrust, Inc.November, 2002                                                 S. FarrellExpires in 6 Months                                Baltimore Technologies                Internet X.509 Public Key Infrastructure                    Certificate Management Protocols                   <draft-ietf-pkix-rfc2510bis-07.txt>Status of this Memo      This document is an Internet-Draft and is in full conformance with   all provisions of Section 10 of RFC2026.   Internet-Drafts are working documents of the Internet Engineering   Task Force (IETF), its areas, and its working groups.  Note that other    groups may also distribute working documents as Internet-Drafts.   Internet-Drafts are draft documents valid for a maximum of six months    and may be updated, replaced, or obsoleted by other documents at any    time.  It is inappropriate to use Internet-Drafts as reference    material or to cite them other than as "work in progress."   The list of current Internet-Drafts can be accessed at   http://www.ietf.org/ietf/1id-abstracts.txt   The list of Internet-Draft Shadow Directories can be accessed at   http://www.ietf.org/shadow.html.   This Internet-Draft will expire in May, 2003.  Comments or    suggestions for improvement may be made on the "ietf-pkix" mailing   list, or directly to the authors.Copyright Notice   Copyright (C) The Internet Society (2002).  All Rights Reserved.Abstract   This document describes the Internet X.509 Public Key Infrastructure   (PKI) Certificate Management Protocols. Protocol messages are defined   for all relevant aspects of certificate creation and management.   Note that "certificate" in this document refers to an X.509v3   Certificate as defined in [COR95, X509-AM].   The key words "MUST", "MUST NOT", "REQUIRED", "SHOULD", "SHOULD NOT",   "RECOMMENDED", "MAY", and "OPTIONAL" in this document (in uppercase,   as shown) are to be interpreted as described in [RFC2119].Adams & Farrell               Expires May 2003                    [Page 1]Table of Contents1. PKI Management Overview ............................................  4   1.1 PKI Management Model ...........................................  4   1.2 Definitions of PKI Entities ....................................  4   1.3 PKI Management Requirements ....................................  6   1.4 PKI Management Operations ......................................  82. Assumptions and Restrictions ....................................... 12   2.1 End Entity Initialization ...................................... 12   2.2 Initial Registration/Certification ............................. 12   2.3 Proof of Possession (POP) of Private Key ....................... 15   2.4 Root CA Key Update ............................................. 173. Data Structures .................................................... 21   3.1 Overall PKI Message ............................................ 21   3.2 Common Data Structures ......................................... 28   3.3 Operation-Specific Data Structures ............................. 38      3.3.1  Initialization Request ................................... 38      3.3.2  Initialization Response .................................. 38      3.3.3  Certification Request .................................... 38      3.3.4  Certification Response ................................... 39      3.3.5  Key Update Request ....................................... 40      3.3.6  Key Update Response ...................................... 40      3.3.7  Key Recovery Request ..................................... 40      3.3.8  Key Recovery Response .................................... 40      3.3.9  Revocation Request ....................................... 41      3.3.10 Revocation Response ...................................... 41      3.3.11 Cross-Certification Request .............................. 41      3.3.12 Cross-Certification Response ............................. 42      3.3.13 CA Key Update Announcement ............................... 42      3.3.14 Certificate Announcement ................................. 42      3.3.15 Revocation Announcement .................................. 42      3.3.16 CRL Announcement ......................................... 43      3.3.17 PKI Confirmation ......................................... 43      3.3.18 Certificate Confirmation ................................. 43      3.3.19 PKI General Message ...................................... 44      3.3.20 PKI General Response ..................................... 47      3.3.21 Error Message ............................................ 47      3.3.22 Polling Request and Response ............................. 474. Mandatory PKI Management Functions ................................. 49   4.1 Root CA Initialization ......................................... 49   4.2 Root CA Key Update ............................................. 50   4.3 Subordinate CA Initialization .................................. 50   4.4 CRL Production ................................................. 50   4.5 PKI Information Request ........................................ 50   4.6 Cross-Certification ............................................ 51   4.7 End Entity Initialization ...................................... 53   4.8 Certificate Request ............................................ 54   4.9 Key Update ..................................................... 54Adams & Farrell               Expires May 2003                    [Page 2]5. Version Negotiation ................................................ 55   5.1 Supporting RFC 2510 Implementations ............................ 55Security Considerations ............................................... 56References ............................................................ 57Acknowledgements ...................................................... 58Authors' Addresses .................................................... 58Appendix A: Reasons for the presence of RAs ........................... 59Appendix B: PKI Management Message Profiles (REQUIRED) ................ 60Appendix C: PKI Management Message Profiles (OPTIONAL) ................ 70Appendix D: Request Message Behavioral Clarifications ................. 77Appendix E: The Use of "Revocation Passphrase" ........................ 78Appendix F: "Compilable" ASN.1 Module Using 1988 Syntax ............... 80Appendix G: Registration of MIME Type for E-Mail or HTTP Use .......... 91Full Copyright Statement .............................................. 92Adams & Farrell               Expires May 2003                    [Page 3]1 PKI Management Overview   The PKI must be structured to be consistent with the types of   individuals who must administer it.  Providing such administrators   with unbounded choices not only complicates the software required but   also increases the chances that a subtle mistake by an administrator   or software developer will result in broader compromise. Similarly,   restricting administrators with cumbersome mechanisms will cause them   not to use the PKI.   Management protocols are REQUIRED to support on-line interactions   between Public Key Infrastructure (PKI) components.  For example, a   management protocol might be used between a Certification Authority   (CA) and a client system with which a key pair is associated, or   between two CAs that issue cross-certificates for each other.1.1 PKI Management Model   Before specifying particular message formats and procedures we first   define the entities involved in PKI management and their interactions   (in terms of the PKI management functions required).  We then group   these functions in order to accommodate different identifiable types   of end entities.1.2 Definitions of PKI Entities   The entities involved in PKI management include the end entity (i.e.,   the entity to whom the certificate is issued) and the   certification authority (i.e., the entity that issues the certificate).    A registration authority MAY also be involved in PKI management.1.2.1 Subjects and End Entities   The term "subject" is used here to refer to the entity to whom the    certificate is issued, typically named in the subject or   subjectAltName field of a certificate.  When we wish to distinguish the    tools and/or software used by the subject (e.g., a local certificate   management module) we will use the term "subject equipment". In   general, the term "end entity" (EE) rather than subject is preferred   in order to avoid confusion with the field name.   It is important to note that the end entities here will include not   only human users of applications, but also applications themselves   (e.g., for IP security). This factor influences the protocols which   the PKI management operations use; for example, application software   is far more likely to know exactly which certificate extensions are   required than are human users. PKI management entities are also end   entities in the sense that they are sometimes named in the subject or    subjectAltName field of a certificate or cross-certificate.  WhereAdams & Farrell               Expires May 2003                    [Page 4]   appropriate, the term "end-entity" will be used to refer to end   entities who are not PKI management entities.      All end entities require secure local access to some information --   at a minimum, their own name and private key, the name of a CA which   is directly trusted by this entity and that CA's public key (or a   fingerprint of the public key where a self-certified version is   available elsewhere). Implementations MAY use secure local storage   for more than this minimum (e.g., the end entity's own certificate or   application-specific information). The form of storage will also vary   -- from files to tamper-resistant cryptographic tokens.  Such local   trusted storage is referred to here as the end entity's Personal   Security Environment (PSE).   Though PSE formats are beyond the scope of this document (they are   very dependent on equipment, et cetera), a generic interchange format   for PSEs is defined here - a certification response message MAY be   used.1.2.2 Certification Authority   The certification authority (CA) may or may not actually be a real   "third party" from the end entity's point of view. Quite often, the   CA will actually belong to the same organization as the end entities   it supports.   Again, we use the term CA to refer to the entity named in the issuer   field of a certificate; when it is necessary to distinguish the   software or hardware tools used by the CA we use the term "CA   equipment".   The CA equipment will often include both an "off-line" component and   an "on-line" component, with the CA private key only available to the   "off-line" component. This is, however, a matter for implementers   (though it is also relevant as a policy issue).   We use the term "root CA" to indicate a CA that is directly trusted   by an end entity; that is, securely acquiring the value of a root CA   public key requires some out-of-band step(s). This term is not meant   to imply that a root CA is necessarily at the top of any hierarchy,   simply that the CA in question is trusted directly.   A "subordinate CA" is one that is not a root CA for the end entity in   question. Often, a subordinate CA will not be a root CA for any   entity but this is not mandatory.Adams & Farrell               Expires May 2003                    [Page 5]1.2.3 Registration Authority   In addition to end-entities and CAs, many environments call for the   existence of a Registration Authority (RA) separate from the   Certification Authority. The functions which the registration   authority may carry out will vary from case to case but MAY include   personal authentication, token distribution, revocation reporting,   name assignment, key generation, archival of key pairs, et cetera.   This document views the RA as an OPTIONAL component - when it is not   present the CA is assumed to be able to carry out the RA's functions   so that the PKI management protocols are the same from the end-   entity's point of view.   Again, we distinguish, where necessary, between the RA and the tools   used (the "RA equipment").   Note that an RA is itself an end entity. We further assume that all   RAs are in fact certified end entities and that RAs have private keys   that are usable for signing. How a particular CA equipment identifies   some end entities as RAs is an implementation issue (i.e., this   document specifies no special RA certification operation). We do not

?? 快捷鍵說(shuō)明

復(fù)制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號(hào) Ctrl + =
減小字號(hào) Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
国产aⅴ综合色| 国产一区在线观看视频| 激情深爱一区二区| 91首页免费视频| 久久亚洲私人国产精品va媚药| 亚洲欧洲日韩一区二区三区| 日本v片在线高清不卡在线观看| jiyouzz国产精品久久| 日韩美女视频在线| 一区二区三区四区av| www.亚洲精品| 欧美变态凌虐bdsm| 三级一区在线视频先锋| 欧美亚洲国产一区二区三区va| 国产日韩欧美麻豆| 国内精品伊人久久久久av一坑| 欧美疯狂性受xxxxx喷水图片| 亚洲色图欧美偷拍| av电影在线观看完整版一区二区| 欧美sm极限捆绑bd| 久久不见久久见免费视频1| 欧美日韩三级视频| 亚洲成人综合网站| 欧美亚州韩日在线看免费版国语版| 国产精品国产三级国产a| 国产成人av在线影院| 欧美精品一区二区久久久| 奇米四色…亚洲| 日韩一区二区在线免费观看| 天天影视网天天综合色在线播放 | 欧美激情在线免费观看| 麻豆91在线观看| 欧美成人精品二区三区99精品| 免费视频一区二区| 日韩欧美综合在线| 久久精品国产久精国产爱| 日韩视频永久免费| 国产真实乱对白精彩久久| 久久久影视传媒| 国产精品小仙女| 欧美激情在线看| aaa国产一区| 亚洲久草在线视频| 在线观看亚洲精品视频| 午夜私人影院久久久久| 欧美疯狂性受xxxxx喷水图片| 日韩在线卡一卡二| www久久久久| av电影天堂一区二区在线| 亚洲男人天堂av网| 欧美日韩aaa| 国产酒店精品激情| 国产色婷婷亚洲99精品小说| www.66久久| 日韩中文欧美在线| 亚洲国产精品av| 欧美中文字幕一区| 蜜臀av一区二区三区| 日本一区二区综合亚洲| 色av综合在线| 免费在线视频一区| 中文字幕一区不卡| 在线播放国产精品二区一二区四区| 五月婷婷欧美视频| 国产欧美视频一区二区三区| 91久久精品国产91性色tv | 国产一区二区三区精品视频| 国产精品网曝门| 欧美日韩电影一区| 国产精品99久久不卡二区| 一区二区三区不卡视频在线观看| 欧美一区二区播放| 色综合久久综合网欧美综合网 | 欧美日韩成人在线| 国产盗摄视频一区二区三区| 一区二区三区丝袜| 久久久久久免费网| 538在线一区二区精品国产| 黄网站免费久久| 亚洲成a人v欧美综合天堂下载| 精品国产免费视频| 欧美性欧美巨大黑白大战| 韩国一区二区三区| 亚洲gay无套男同| 中文字幕中文字幕在线一区| 91精品国产欧美一区二区成人| 99麻豆久久久国产精品免费| 久久99深爱久久99精品| 亚洲综合免费观看高清完整版| 久久久国产综合精品女国产盗摄| 欧美浪妇xxxx高跟鞋交| 99久久国产免费看| 国产精品亚洲а∨天堂免在线| 免费成人在线网站| 亚洲丶国产丶欧美一区二区三区| 国产精品毛片久久久久久| 精品久久久久香蕉网| 欧美福利一区二区| 精品1区2区3区| 91免费在线视频观看| 国产一区二区伦理| 韩国成人福利片在线播放| 日韩影院在线观看| 午夜精品久久久| 亚洲成人一区在线| 亚洲宅男天堂在线观看无病毒| 国产精品国产三级国产专播品爱网| 久久影音资源网| 精品91自产拍在线观看一区| 日韩色视频在线观看| 777xxx欧美| 91精品麻豆日日躁夜夜躁| 欧美日韩精品是欧美日韩精品| 91视频在线看| 91久久国产最好的精华液| 在线精品国精品国产尤物884a| 色综合天天天天做夜夜夜夜做| 不卡免费追剧大全电视剧网站| 成人精品亚洲人成在线| 成人理论电影网| 91污在线观看| 日本韩国欧美在线| 欧美日韩国产综合一区二区 | 日韩欧美中文一区二区| 欧美一区二区三区在线观看| 日韩亚洲欧美在线观看| 91精品国产欧美一区二区成人| 91精品一区二区三区久久久久久| 欧美人伦禁忌dvd放荡欲情| 欧美日韩精品系列| 欧美一级专区免费大片| 精品99一区二区三区| 国产三级一区二区| 亚洲美女少妇撒尿| 丝袜a∨在线一区二区三区不卡| 日韩成人一区二区| 国产一区二区三区四区五区美女 | 日韩和欧美一区二区| 免费在线观看成人| 国产成人精品免费一区二区| 成人app网站| 欧美日韩亚洲综合一区二区三区| 日韩欧美在线影院| 久久久精品国产免费观看同学| 中文字幕亚洲电影| 亚洲不卡在线观看| 美脚の诱脚舐め脚责91| 成人美女视频在线观看18| 欧美日韩一区二区三区高清 | 国产99久久久久| 97久久超碰国产精品电影| 欧洲一区二区三区免费视频| 在线国产亚洲欧美| 这里只有精品免费| 久久久影视传媒| 亚洲一二三级电影| 国产一区二区导航在线播放| 一本久道久久综合中文字幕| 日韩一区国产二区欧美三区| 亚洲视频免费在线| 久久99精品国产| 色吧成人激情小说| 欧美极品美女视频| 免费观看一级欧美片| 99久久婷婷国产综合精品 | 麻豆freexxxx性91精品| 91麻豆国产福利在线观看| 日韩午夜av电影| 一区二区三区高清| av不卡一区二区三区| 精品国产1区二区| 亚洲成人你懂的| 91捆绑美女网站| 亚洲国产成人一区二区三区| 午夜一区二区三区视频| 91色.com| 国产精品免费视频观看| 久久99热这里只有精品| 欧美日韩国产一级片| 亚洲免费电影在线| 国产精品一区二区三区网站| 欧美剧情片在线观看| 一区二区三区中文字幕| 成人高清视频免费观看| 日韩一区二区三区免费看| 亚洲成人在线免费| 99vv1com这只有精品| 久久九九久久九九| 国产尤物一区二区| 日韩欧美激情一区| 麻豆一区二区99久久久久| 欧美日韩高清一区二区不卡| 亚洲777理论| 欧美日韩www| 日本系列欧美系列| 日韩欧美国产一区在线观看| 免费成人美女在线观看.| 日韩欧美一二区| 老汉av免费一区二区三区| 精品欧美一区二区久久|