亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? draft-ietf-pkix-rfc2510bis-07.txt

?? PKIX的RFC英文文檔
?? TXT
?? 第 1 頁 / 共 5 頁
字號:
Internet Draft                                                   C. AdamsPKIX Working Group                                          Entrust, Inc.November, 2002                                                 S. FarrellExpires in 6 Months                                Baltimore Technologies                Internet X.509 Public Key Infrastructure                    Certificate Management Protocols                   <draft-ietf-pkix-rfc2510bis-07.txt>Status of this Memo      This document is an Internet-Draft and is in full conformance with   all provisions of Section 10 of RFC2026.   Internet-Drafts are working documents of the Internet Engineering   Task Force (IETF), its areas, and its working groups.  Note that other    groups may also distribute working documents as Internet-Drafts.   Internet-Drafts are draft documents valid for a maximum of six months    and may be updated, replaced, or obsoleted by other documents at any    time.  It is inappropriate to use Internet-Drafts as reference    material or to cite them other than as "work in progress."   The list of current Internet-Drafts can be accessed at   http://www.ietf.org/ietf/1id-abstracts.txt   The list of Internet-Draft Shadow Directories can be accessed at   http://www.ietf.org/shadow.html.   This Internet-Draft will expire in May, 2003.  Comments or    suggestions for improvement may be made on the "ietf-pkix" mailing   list, or directly to the authors.Copyright Notice   Copyright (C) The Internet Society (2002).  All Rights Reserved.Abstract   This document describes the Internet X.509 Public Key Infrastructure   (PKI) Certificate Management Protocols. Protocol messages are defined   for all relevant aspects of certificate creation and management.   Note that "certificate" in this document refers to an X.509v3   Certificate as defined in [COR95, X509-AM].   The key words "MUST", "MUST NOT", "REQUIRED", "SHOULD", "SHOULD NOT",   "RECOMMENDED", "MAY", and "OPTIONAL" in this document (in uppercase,   as shown) are to be interpreted as described in [RFC2119].Adams & Farrell               Expires May 2003                    [Page 1]Table of Contents1. PKI Management Overview ............................................  4   1.1 PKI Management Model ...........................................  4   1.2 Definitions of PKI Entities ....................................  4   1.3 PKI Management Requirements ....................................  6   1.4 PKI Management Operations ......................................  82. Assumptions and Restrictions ....................................... 12   2.1 End Entity Initialization ...................................... 12   2.2 Initial Registration/Certification ............................. 12   2.3 Proof of Possession (POP) of Private Key ....................... 15   2.4 Root CA Key Update ............................................. 173. Data Structures .................................................... 21   3.1 Overall PKI Message ............................................ 21   3.2 Common Data Structures ......................................... 28   3.3 Operation-Specific Data Structures ............................. 38      3.3.1  Initialization Request ................................... 38      3.3.2  Initialization Response .................................. 38      3.3.3  Certification Request .................................... 38      3.3.4  Certification Response ................................... 39      3.3.5  Key Update Request ....................................... 40      3.3.6  Key Update Response ...................................... 40      3.3.7  Key Recovery Request ..................................... 40      3.3.8  Key Recovery Response .................................... 40      3.3.9  Revocation Request ....................................... 41      3.3.10 Revocation Response ...................................... 41      3.3.11 Cross-Certification Request .............................. 41      3.3.12 Cross-Certification Response ............................. 42      3.3.13 CA Key Update Announcement ............................... 42      3.3.14 Certificate Announcement ................................. 42      3.3.15 Revocation Announcement .................................. 42      3.3.16 CRL Announcement ......................................... 43      3.3.17 PKI Confirmation ......................................... 43      3.3.18 Certificate Confirmation ................................. 43      3.3.19 PKI General Message ...................................... 44      3.3.20 PKI General Response ..................................... 47      3.3.21 Error Message ............................................ 47      3.3.22 Polling Request and Response ............................. 474. Mandatory PKI Management Functions ................................. 49   4.1 Root CA Initialization ......................................... 49   4.2 Root CA Key Update ............................................. 50   4.3 Subordinate CA Initialization .................................. 50   4.4 CRL Production ................................................. 50   4.5 PKI Information Request ........................................ 50   4.6 Cross-Certification ............................................ 51   4.7 End Entity Initialization ...................................... 53   4.8 Certificate Request ............................................ 54   4.9 Key Update ..................................................... 54Adams & Farrell               Expires May 2003                    [Page 2]5. Version Negotiation ................................................ 55   5.1 Supporting RFC 2510 Implementations ............................ 55Security Considerations ............................................... 56References ............................................................ 57Acknowledgements ...................................................... 58Authors' Addresses .................................................... 58Appendix A: Reasons for the presence of RAs ........................... 59Appendix B: PKI Management Message Profiles (REQUIRED) ................ 60Appendix C: PKI Management Message Profiles (OPTIONAL) ................ 70Appendix D: Request Message Behavioral Clarifications ................. 77Appendix E: The Use of "Revocation Passphrase" ........................ 78Appendix F: "Compilable" ASN.1 Module Using 1988 Syntax ............... 80Appendix G: Registration of MIME Type for E-Mail or HTTP Use .......... 91Full Copyright Statement .............................................. 92Adams & Farrell               Expires May 2003                    [Page 3]1 PKI Management Overview   The PKI must be structured to be consistent with the types of   individuals who must administer it.  Providing such administrators   with unbounded choices not only complicates the software required but   also increases the chances that a subtle mistake by an administrator   or software developer will result in broader compromise. Similarly,   restricting administrators with cumbersome mechanisms will cause them   not to use the PKI.   Management protocols are REQUIRED to support on-line interactions   between Public Key Infrastructure (PKI) components.  For example, a   management protocol might be used between a Certification Authority   (CA) and a client system with which a key pair is associated, or   between two CAs that issue cross-certificates for each other.1.1 PKI Management Model   Before specifying particular message formats and procedures we first   define the entities involved in PKI management and their interactions   (in terms of the PKI management functions required).  We then group   these functions in order to accommodate different identifiable types   of end entities.1.2 Definitions of PKI Entities   The entities involved in PKI management include the end entity (i.e.,   the entity to whom the certificate is issued) and the   certification authority (i.e., the entity that issues the certificate).    A registration authority MAY also be involved in PKI management.1.2.1 Subjects and End Entities   The term "subject" is used here to refer to the entity to whom the    certificate is issued, typically named in the subject or   subjectAltName field of a certificate.  When we wish to distinguish the    tools and/or software used by the subject (e.g., a local certificate   management module) we will use the term "subject equipment". In   general, the term "end entity" (EE) rather than subject is preferred   in order to avoid confusion with the field name.   It is important to note that the end entities here will include not   only human users of applications, but also applications themselves   (e.g., for IP security). This factor influences the protocols which   the PKI management operations use; for example, application software   is far more likely to know exactly which certificate extensions are   required than are human users. PKI management entities are also end   entities in the sense that they are sometimes named in the subject or    subjectAltName field of a certificate or cross-certificate.  WhereAdams & Farrell               Expires May 2003                    [Page 4]   appropriate, the term "end-entity" will be used to refer to end   entities who are not PKI management entities.      All end entities require secure local access to some information --   at a minimum, their own name and private key, the name of a CA which   is directly trusted by this entity and that CA's public key (or a   fingerprint of the public key where a self-certified version is   available elsewhere). Implementations MAY use secure local storage   for more than this minimum (e.g., the end entity's own certificate or   application-specific information). The form of storage will also vary   -- from files to tamper-resistant cryptographic tokens.  Such local   trusted storage is referred to here as the end entity's Personal   Security Environment (PSE).   Though PSE formats are beyond the scope of this document (they are   very dependent on equipment, et cetera), a generic interchange format   for PSEs is defined here - a certification response message MAY be   used.1.2.2 Certification Authority   The certification authority (CA) may or may not actually be a real   "third party" from the end entity's point of view. Quite often, the   CA will actually belong to the same organization as the end entities   it supports.   Again, we use the term CA to refer to the entity named in the issuer   field of a certificate; when it is necessary to distinguish the   software or hardware tools used by the CA we use the term "CA   equipment".   The CA equipment will often include both an "off-line" component and   an "on-line" component, with the CA private key only available to the   "off-line" component. This is, however, a matter for implementers   (though it is also relevant as a policy issue).   We use the term "root CA" to indicate a CA that is directly trusted   by an end entity; that is, securely acquiring the value of a root CA   public key requires some out-of-band step(s). This term is not meant   to imply that a root CA is necessarily at the top of any hierarchy,   simply that the CA in question is trusted directly.   A "subordinate CA" is one that is not a root CA for the end entity in   question. Often, a subordinate CA will not be a root CA for any   entity but this is not mandatory.Adams & Farrell               Expires May 2003                    [Page 5]1.2.3 Registration Authority   In addition to end-entities and CAs, many environments call for the   existence of a Registration Authority (RA) separate from the   Certification Authority. The functions which the registration   authority may carry out will vary from case to case but MAY include   personal authentication, token distribution, revocation reporting,   name assignment, key generation, archival of key pairs, et cetera.   This document views the RA as an OPTIONAL component - when it is not   present the CA is assumed to be able to carry out the RA's functions   so that the PKI management protocols are the same from the end-   entity's point of view.   Again, we distinguish, where necessary, between the RA and the tools   used (the "RA equipment").   Note that an RA is itself an end entity. We further assume that all   RAs are in fact certified end entities and that RAs have private keys   that are usable for signing. How a particular CA equipment identifies   some end entities as RAs is an implementation issue (i.e., this   document specifies no special RA certification operation). We do not

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
亚洲人成网站精品片在线观看| 欧美蜜桃一区二区三区| 国产日韩精品一区二区三区在线| 精品一区二区三区在线播放 | 成人一区二区三区视频在线观看| 精品卡一卡二卡三卡四在线| 国产乱码一区二区三区| 国产清纯美女被跳蛋高潮一区二区久久w | 久久精品欧美日韩| 大白屁股一区二区视频| 亚洲欧美精品午睡沙发| 欧美天堂一区二区三区| 日产欧产美韩系列久久99| 欧美电影精品一区二区| 粉嫩嫩av羞羞动漫久久久| 日韩一区在线看| 欧美午夜免费电影| 韩国三级在线一区| 亚洲视频一区二区在线观看| 欧美日韩精品一二三区| 久久精品999| 欧美国产97人人爽人人喊| 色综合久久久网| 免费成人美女在线观看.| 欧美—级在线免费片| 欧美在线一区二区| 国产精品资源在线看| 亚洲欧洲精品一区二区精品久久久| 色av成人天堂桃色av| 久久99精品视频| 中文字幕亚洲一区二区va在线| 欧美色偷偷大香| 国产精品99久久久久久久女警 | 久久精品一区四区| 在线视频国内自拍亚洲视频| 韩国精品久久久| 亚洲激情图片小说视频| 欧美精品一区二区三区蜜臀| 91在线一区二区| 久久99精品久久只有精品| 亚洲已满18点击进入久久| 久久夜色精品国产噜噜av| 在线观看一区二区视频| 高清不卡一二三区| 奇米影视7777精品一区二区| 亚洲色图视频免费播放| 精品久久久久久久久久久久包黑料 | 在线中文字幕一区二区| 国产在线视频一区二区| 亚洲大片精品永久免费| 欧美激情一区二区三区蜜桃视频 | 色综合久久天天| 国产ts人妖一区二区| 日本强好片久久久久久aaa| **欧美大码日韩| 久久看人人爽人人| 日韩午夜精品视频| 欧美日韩免费观看一区二区三区| 成人免费av在线| 国产传媒一区在线| 久久精品国产亚洲5555| 日韩av一区二区在线影视| 亚洲高清免费观看| 一区二区三区在线观看网站| 一色桃子久久精品亚洲| 欧美国产1区2区| 久久久不卡网国产精品一区| 日韩精品专区在线影院观看| 欧美一卡二卡在线观看| 欧美精品黑人性xxxx| 91福利视频久久久久| 91丝袜国产在线播放| av亚洲精华国产精华精| 成人在线视频首页| 国产91富婆露脸刺激对白| 国产一区二区在线视频| 韩国精品久久久| 国产精品一区二区在线观看不卡| 国产一区二区三区综合| 狠狠网亚洲精品| 国精产品一区一区三区mba视频| 久久精品72免费观看| 久久99精品久久久| 精品一区二区在线免费观看| 国精品**一区二区三区在线蜜桃| 经典一区二区三区| 国产高清不卡二三区| 国产馆精品极品| www.激情成人| 色av成人天堂桃色av| 91成人免费电影| 欧美一区二区三区四区五区| 日韩精品一区二区三区老鸭窝| 日韩欧美精品在线| 欧美精品一区二区三区蜜桃| 久久久久久99久久久精品网站| 久久久国产精品不卡| 国产精品成人免费精品自在线观看 | 亚洲人精品午夜| 亚洲成人资源在线| 精品影视av免费| 豆国产96在线|亚洲| 91亚洲国产成人精品一区二区三 | 免费在线观看一区| 国产一区二区在线观看免费| 成人动漫中文字幕| 在线免费视频一区二区| 欧美疯狂性受xxxxx喷水图片| 日韩欧美国产午夜精品| 欧美国产精品一区二区| 亚洲免费av高清| 久久精品国产99久久6| 成人黄色在线视频| 欧美电影在线免费观看| 国产午夜精品一区二区三区嫩草 | 国产成人在线视频播放| 色婷婷国产精品久久包臀 | 久久亚洲精华国产精华液 | 日韩午夜中文字幕| 国产精品视频第一区| 午夜av区久久| 国产91清纯白嫩初高中在线观看| 欧美午夜寂寞影院| 国产性天天综合网| 亚洲午夜一二三区视频| 国产成人丝袜美腿| 欧美日本在线观看| 综合中文字幕亚洲| 精品一区二区日韩| 欧美羞羞免费网站| 国产精品视频一二| 久久99国内精品| 欧美三级日韩三级国产三级| 中文字幕欧美激情| 青青青伊人色综合久久| 91国偷自产一区二区开放时间 | 亚洲视频一区在线| 国产福利一区在线观看| 日韩一区二区三区在线视频| 亚洲精品视频免费看| 粉嫩aⅴ一区二区三区四区 | eeuss鲁片一区二区三区在线观看 eeuss鲁片一区二区三区在线看 | 欧美婷婷六月丁香综合色| 欧美激情在线看| 国产一区亚洲一区| 欧美zozozo| 视频一区视频二区中文| 91成人免费电影| 亚洲私人影院在线观看| 成人一区二区三区在线观看| 精品国产乱码久久久久久牛牛| 天天影视色香欲综合网老头| 成人av免费网站| 国产日韩欧美亚洲| 国产精品综合在线视频| 亚洲精品一线二线三线无人区| 日韩精品一区第一页| 91高清在线观看| 亚洲一线二线三线视频| 色女孩综合影院| 亚洲人成网站精品片在线观看 | 激情成人综合网| 欧美日本韩国一区二区三区视频 | 中文在线资源观看网站视频免费不卡| 亚洲第一av色| 一本大道久久a久久精品综合| 亚洲国产精品成人综合色在线婷婷| 国产在线精品一区二区三区不卡| 制服丝袜一区二区三区| 日韩主播视频在线| 日韩欧美久久久| 激情综合网最新| 久久久久高清精品| 高清不卡在线观看| 亚洲欧美一区二区视频| 一本色道久久加勒比精品| 亚洲欧洲制服丝袜| 在线精品视频免费观看| 亚洲成人资源在线| 日韩一卡二卡三卡国产欧美| 麻豆精品久久精品色综合| 精品乱人伦一区二区三区| 国产成人在线视频免费播放| 国产精品国产三级国产aⅴ无密码| av电影一区二区| 亚洲一区二区三区中文字幕 | 精油按摩中文字幕久久| 2021久久国产精品不只是精品| 国产自产高清不卡| 中文字幕精品—区二区四季| 国产v日产∨综合v精品视频| 国产精品美女一区二区在线观看| 99国产精品久久| 亚洲国产裸拍裸体视频在线观看乱了 | 国产精品一区二区久久不卡| 欧美精品一区在线观看| 成人免费不卡视频| 亚洲国产视频a| 精品国产一区久久| 99国产麻豆精品|