亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? draft-ietf-pkix-rfc2510bis-07.txt

?? PKIX的RFC英文文檔
?? TXT
?? 第 1 頁 / 共 5 頁
字號:
Adams & Farrell               Expires May 2003                   [Page 11]      7 PSE operations: whilst the definition of PSE operations (e.g.,        moving a PSE, changing a PIN, etc.) are beyond the scope of this        specification, we do define a PKIMessage (CertRepMessage) which        can form the basis of such operations.   Note that on-line protocols are not the only way of implementing the   above operations.  For all operations there are off-line methods of   achieving the same result, and this specification does not mandate   use of on-line protocols.  For example, when hardware tokens are   used, many of the operations MAY be achieved as part of the physical   token delivery.   Later sections define a set of standard messages supporting the above   operations.  Transport protocols for conveying these exchanges in    different environments (file based, on-line, E-mail, and WWW) are    beyond the scope of this document and are specified separately.2. Assumptions and restrictions2.1 End entity initialization   The first step for an end entity in dealing with PKI management   entities is to request information about the PKI functions supported   and to securely acquire a copy of the relevant root CA public key(s).2.2 Initial registration/certification   There are many schemes that can be used to achieve initial   registration and certification of end entities. No one method is   suitable for all situations due to the range of policies which a CA   may implement and the variation in the types of end entity which can   occur.   We can however, classify the initial registration / certification   schemes that are supported by this specification. Note that the word   "initial", above, is crucial - we are dealing with the situation   where the end entity in question has had no previous contact with the   PKI. Where the end entity already possesses certified keys then some   simplifications/alternatives are possible.   Having classified the schemes that are supported by this   specification we can then specify some as mandatory and some as   optional. The goal is that the mandatory schemes cover a sufficient   number of the cases which will arise in real use, whilst the optional   schemes are available for special cases which arise less frequently.   In this way we achieve a balance between flexibility and ease of   implementation.Adams & Farrell               Expires May 2003                   [Page 12]   We will now describe the classification of initial registration /   certification schemes.2.2.1 Criteria used2.2.1.1 Initiation of registration / certification   In terms of the PKI messages which are produced we can regard the   initiation of the initial registration / certification exchanges as   occurring wherever the first PKI message relating to the end entity   is produced. Note that the real-world initiation of the registration   / certification procedure may occur elsewhere (e.g., a personnel   department may telephone an RA operator).   The possible locations are at the end entity, an RA, or a CA.2.2.1.2 End entity message origin authentication   The on-line messages produced by the end entity that requires a   certificate may be authenticated or not. The requirement here is to   authenticate the origin of any messages from the end entity to the   PKI (CA/RA).   In this specification, such authentication is achieved by the PKI   (CA/RA) issuing the end entity with a secret value (initial   authentication key) and reference value (used to identify the   secret value) via some out-of-band means. The initial authentication   key can then be used to protect relevant PKI messages.   We can thus classify the initial registration/certification scheme   according to whether or not the on-line end entity -> PKI messages   are authenticated or not.   Note 1: We do not discuss the authentication of the PKI -> end entity   messages here as this is always REQUIRED. In any case, it can be   achieved simply once the root-CA public key has been installed at the   end entity's equipment or it can be based on the initial   authentication key.   Note 2: An initial registration / certification procedure can be   secure where the messages from the end entity are authenticated via   some out- of-band means (e.g., a subsequent visit).2.2.1.3 Location of key generation   In this specification, "key generation" is regarded as occurring   wherever either the public or private component of a key pair first   occurs in a PKIMessage. Note that this does not preclude aAdams & Farrell               Expires May 2003                   [Page 13]   centralized key generation service - the actual key pair MAY have   been generated elsewhere and transported to the end entity, RA, or CA   using a (proprietary or standardized) key generation request/response   protocol (outside the scope of this specification).   There are thus three possibilities for the location of "key   generation":  the end entity, an RA, or a CA.2.2.1.4 Confirmation of successful certification   Following the creation of an initial certificate for an end entity,   additional assurance can be gained by having the end entity   explicitly confirm successful receipt of the message containing (or   indicating the creation of) the certificate. Naturally, this   confirmation message must be protected (based on the initial   authentication key or other means).   This gives two further possibilities: confirmed or not.2.2.2 Mandatory schemes   The criteria above allow for a large number of initial registration /   certification schemes. This specification mandates that conforming CA   equipment, RA equipment, and EE equipment MUST support the second   scheme listed below. Any entity MAY additionally support other   schemes, if desired.2.2.2.1 Centralized scheme   In terms of the classification above, this scheme is, in some ways,   the simplest possible, where:   - initiation occurs at the certifying CA;   - no on-line message authentication is required;   - "key generation" occurs at the certifying CA (see Section 2.2.1.3);   - no confirmation message is required.   In terms of message flow, this scheme means that the only message   required is sent from the CA to the end entity. The message must   contain the entire PSE for the end entity. Some out-of-band means   must be provided to allow the end entity to authenticate the message   received and decrypt any encrypted values.Adams & Farrell               Expires May 2003                   [Page 14]2.2.2.2 Basic authenticated scheme   In terms of the classification above, this scheme is where:   - initiation occurs at the end entity;   - message authentication is REQUIRED;   - "key generation" occurs at the end entity (see Section 2.2.1.3);   - a confirmation message is REQUIRED.   In terms of message flow, the basic authenticated scheme is as   follows:      End entity                                          RA/CA      ==========                                      =============           out-of-band distribution of Initial Authentication           Key (IAK) and reference value (RA/CA -> EE)      Key generation      Creation of certification request      Protect request with IAK                    -->>--certification request-->>--                                                     verify request                                                     process request                                                     create response                    --<<--certification response--<<--      handle response      create confirmation                    -->>--cert conf message-->>--                                                     verify confirmation                                                     create response                    --<<-- conf ack (optional)  --<<--      handle response   (Where verification of the cert confirmation message fails, the RA/CA    MUST revoke the newly issued certificate if it has been published or   otherwise made available.)2.3 Proof of Possession (POP) of Private Key   In order to prevent certain attacks and to allow a CA/RA to properly   check the validity of the binding between an end entity and a key   pair, the PKI management operations specified here make it possible   for an end entity to prove that it has possession of (i.e., is able   to use) the private key corresponding to the public key for which a   certificate is requested.  A given CA/RA is free to choose how to   enforce POP (e.g., out-of-band procedural means versus PKIX-CMP in-   band messages) in its certification exchanges (i.e., this may be a   policy issue).  However, it is REQUIRED that CAs/RAs MUST enforce POP   by some means because there are currently many non-PKIX operational   protocols in use (various electronic mail protocols are one example)   that do not explicitly check the binding between the end entity and   the private key.  Until operational protocols that do verify theAdams & Farrell               Expires May 2003                   [Page 15]   binding (for signature, encryption, and key agreement key pairs)   exist, and are ubiquitous, this binding can only be assumed to have   been verified by the CA/RA. Therefore, if the binding is not verified   by the CA/RA, certificates in the Internet Public-Key Infrastructure   end up being somewhat less meaningful.   POP is accomplished in different ways depending upon the type of key   for which a certificate is requested. If a key can be used for   multiple purposes (e.g., an RSA key) then any appropriate method MAY   be used (e.g., a key which may be used for signing, as well as other   purposes, SHOULD NOT be sent to the CA/RA in order to prove   possession).   This specification explicitly allows for cases where an end entity   supplies the relevant proof to an RA and the RA subsequently attests   to the CA that the required proof has been received (and validated!).   For example, an end entity wishing to have a signing key certified   could send the appropriate signature to the RA which then simply   notifies the relevant CA that the end entity has supplied the   required proof. Of course, such a situation may be disallowed by some   policies (e.g., CAs may be the only entities permitted to verify POP   during certification).2.3.1 Signature Keys   For signature keys, the end entity can sign a value to prove   possession of the private key.2.3.2 Encryption Keys   For encryption keys, the end entity can provide the private key to   the CA/RA, or can be required to decrypt a value in order to prove   possession of the private key (see Section 3.2.8). Decrypting a value   can be achieved either directly or indirectly.   The direct method is for the RA/CA to issue a random challenge to   which an immediate response by the EE is required.   The indirect method is to issue a certificate which is encrypted for   the end entity (and have the end entity demonstrate its ability to   decrypt this certificate in the confirmation message). This allows a   CA to issue a certificate in a form which can only be used by the   intended end entity.   This specification encourages use of the indirect method because this   requires no extra messages to be sent (i.e., the proof can be   demonstrated using the {request, response, confirmation} triple of   messages).Adams & Farrell               Expires May 2003                   [Page 16]2.3.3 Key Agreement Keys   For key agreement keys, the end entity and the PKI management entity   (i.e., CA or RA) must establish a shared secret key in order to prove   that the end entity has possession of the private key.   Note that this need not impose any restrictions on the keys that can   be certified by a given CA -- in particular, for Diffie-Hellman keys   the end entity may freely choose its algorithm parameters -- provided   that the CA can generate a short-term (or one-time) key pair with the   appropriate parameters when necessary.2.4 Root CA key update

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
日韩免费高清电影| 久久亚洲欧美国产精品乐播| 免费观看一级特黄欧美大片| 国产欧美一区二区精品忘忧草| 91麻豆免费观看| 久久国产日韩欧美精品| 一区二区三区精品视频在线| 久久久久国产精品免费免费搜索| 91高清视频在线| 国产麻豆欧美日韩一区| 性做久久久久久免费观看欧美| 久久精品欧美日韩精品 | 看片网站欧美日韩| 亚洲婷婷在线视频| 久久久久一区二区三区四区| 欧美日韩美女一区二区| 色哟哟精品一区| 国产精品综合二区| 男男视频亚洲欧美| 亚洲成a人片在线观看中文| 亚洲欧美日韩一区二区三区在线观看 | 亚洲一区二区高清| 自拍偷在线精品自拍偷无码专区| 精品日韩在线观看| 日韩一区二区三区视频在线观看| 色婷婷综合视频在线观看| 成人免费视频app| 国内精品久久久久影院色| 美女一区二区三区| 日本欧美一区二区| 日韩成人精品在线| 婷婷中文字幕综合| 日韩在线a电影| 亚洲r级在线视频| 亚洲国产你懂的| 一区二区三区四区高清精品免费观看 | 伊人色综合久久天天人手人婷| 中文字幕av免费专区久久| 欧美一级高清片| 91精品国产欧美一区二区成人| 欧美色网站导航| 欧美在线一区二区| 欧美午夜电影一区| 欧美伊人精品成人久久综合97| 91麻豆福利精品推荐| 91蜜桃免费观看视频| av动漫一区二区| 色婷婷亚洲精品| 欧美日韩高清一区二区三区| 欧美精品久久天天躁| 91精品国产综合久久蜜臀| 日韩精品一区二区三区视频播放 | 国产91露脸合集magnet| 成人18视频日本| 91原创在线视频| 日本精品一级二级| 91精品综合久久久久久| 欧美一级精品在线| 久久久久久久久久久久久女国产乱 | 欧美日韩精品免费观看视频| 欧美一区二区三区免费观看视频 | 久久蜜臀精品av| 国产精品免费网站在线观看| 亚洲三级久久久| 一区二区三区免费| 免费高清在线一区| 国产福利91精品一区二区三区| 成人精品免费看| 欧洲中文字幕精品| 欧美一级理论片| 欧美国产乱子伦| 亚洲一区二区在线视频| 精品一区二区三区欧美| 成人美女在线观看| 欧美高清视频一二三区| 久久久欧美精品sm网站| 亚洲欧美电影一区二区| 日韩 欧美一区二区三区| 国产成人精品影视| 欧美日本在线播放| 久久精品一二三| 亚洲国产欧美日韩另类综合| 国产一区二区三区| 色8久久精品久久久久久蜜 | 亚洲女人小视频在线观看| 午夜精品久久久久久久久| 国产资源在线一区| 色综合久久九月婷婷色综合| 日韩欧美一级二级| 伊人性伊人情综合网| 国模冰冰炮一区二区| 在线看不卡av| 中文字幕av不卡| 日韩精品久久理论片| 成人午夜视频在线| 欧美一区二区在线免费观看| 国产精品福利影院| 蜜桃91丨九色丨蝌蚪91桃色| 色久优优欧美色久优优| 久久久久久一二三区| 亚洲国产综合色| 不卡一区中文字幕| 欧美不卡激情三级在线观看| 亚洲一本大道在线| 成人黄色在线视频| 日韩精品在线一区二区| 亚洲国产另类精品专区| 99久久综合狠狠综合久久| 欧美精品一区二区三区在线播放| 亚洲激情av在线| 国产凹凸在线观看一区二区| 日韩欧美中文一区| 亚洲成人精品一区二区| 91在线视频免费91| 国产精品视频线看| 国内精品写真在线观看| 欧美一卡2卡3卡4卡| 亚洲综合一区二区| 色婷婷精品久久二区二区蜜臂av| 国产精品午夜在线观看| 国产精品一卡二卡| 精品电影一区二区三区 | 色域天天综合网| 中文字幕一区二区三区四区不卡| 国产精品538一区二区在线| 欧美一级日韩免费不卡| 亚洲第一福利视频在线| 欧美性猛交xxxxxx富婆| 亚洲精选视频免费看| av一区二区久久| 一区二区中文字幕在线| 国产91精品久久久久久久网曝门| 久久久www成人免费无遮挡大片| 精品一区二区久久久| 日韩视频免费观看高清完整版在线观看| 一区二区三区四区国产精品| 91久久精品一区二区三| 亚洲狼人国产精品| 在线观看成人免费视频| 亚洲自拍偷拍九九九| 色婷婷精品久久二区二区蜜臂av| 亚洲少妇最新在线视频| 91免费看片在线观看| 亚洲一区中文在线| 欧美在线免费观看亚洲| 五月天精品一区二区三区| 欧美一区二区三区免费观看视频| 蜜桃视频在线观看一区| 久久这里只有精品首页| 国产成人精品影视| 亚洲色图视频网| 欧美日韩免费一区二区三区视频| 亚洲成人av在线电影| 91麻豆精品国产91久久久使用方法 | 国产精品乱码久久久久久| 不卡一二三区首页| 亚洲免费av高清| 精品视频一区二区不卡| 日韩精品乱码av一区二区| 精品欧美一区二区在线观看| 国产成人精品在线看| 国产精品国产馆在线真实露脸 | 亚洲私人影院在线观看| 欧美自拍偷拍一区| 精品无人区卡一卡二卡三乱码免费卡 | a级高清视频欧美日韩| 亚洲自拍都市欧美小说| 欧美女孩性生活视频| 久久国产成人午夜av影院| 国产女同互慰高潮91漫画| 91在线一区二区| 日韩在线观看一区二区| 国产午夜精品一区二区| 一本大道av伊人久久综合| 奇米综合一区二区三区精品视频 | 精品区一区二区| 成av人片一区二区| 男女性色大片免费观看一区二区| 精品三级av在线| 91天堂素人约啪| 日韩二区在线观看| 欧美国产欧美综合| 欧美一区二区三级| 不卡av在线网| 日本午夜一本久久久综合| 国产精品天美传媒沈樵| 欧美高清性hdvideosex| 成人精品一区二区三区四区| 午夜精品久久久久久久久| 欧美激情一区二区三区在线| 欧美午夜电影在线播放| 国产suv精品一区二区883| 亚洲成国产人片在线观看| 国产欧美日韩中文久久| 欧美日韩大陆一区二区| 成人黄色片在线观看| 日韩成人免费在线| 亚洲综合男人的天堂| 国产日韩v精品一区二区| 欧美日韩国产欧美日美国产精品|