亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? draft-ietf-pkix-rfc2510bis-07.txt

?? PKIX的RFC英文文檔
?? TXT
?? 第 1 頁 / 共 5 頁
字號:
   This discussion only applies to CAs that are a root CA for some end   entity.   The basis of the procedure described here is that the CA protects its   new public key using its previous private key and vice versa. Thus   when a CA updates its key pair it must generate two extra   cACertificate attribute values if certificates are made available   using an X.500 directory (for a total of four:  OldWithOld;   OldWithNew; NewWithOld; and NewWithNew).   When a CA changes its key pair those entities who have acquired the   old CA public key via "out-of-band" means are most affected. It is   these end entities who will need access to the new CA public key   protected with the old CA private key. However, they will only   require this for a limited period (until they have acquired the new   CA public key via the "out-of-band" mechanism). This will typically   be easily achieved when these end entities' certificates expire.   The data structure used to protect the new and old CA public keys is   a standard certificate (which may also contain extensions). There are   no new data structures required.   Note 1. This scheme does not make use of any of the X.509 v3   extensions as it must be able to work even for version 1   certificates. The presence of the KeyIdentifier extension would make   for efficiency improvements.   Note 2. While the scheme could be generalized to cover cases where   the CA updates its key pair more than once during the validity period   of one of its end entities' certificates, this generalization seems   of dubious value. Not having this generalization simply means that   the validity period of a CA key pair must be greater than the   validity period of any certificate issued by that CA using that key   pair.Adams & Farrell               Expires May 2003                   [Page 17]   Note 3. This scheme ensures that end entities will acquire the new CA    public key, at the latest by the expiry of the last certificate they    owned that was signed with the old CA private key (via the    "out-of-band" means).  Certificate and/or key update operations    occurring at other times do not necessarily require this (depending on    the end entity's equipment).2.4.1 CA Operator actions   To change the key of the CA, the CA operator does the following:      1. Generate a new key pair;      2. Create a certificate containing the old CA public key signed         with the new private key (the "old with new" certificate);      3. Create a certificate containing the new CA public key signed         with the old private key (the "new with old" certificate);      4. Create a certificate containing the new CA public key signed         with the new private key (the "new with new" certificate);      5. Publish these new certificates via the repository and/or other         means (perhaps using a CAKeyUpdAnn message);      6. Export the new CA public key so that end entities may acquire         it using the "out-of-band" mechanism (if required).   The old CA private key is then no longer required. The old CA public   key will however remain in use for some time. The time when the old   CA public key is no longer required (other than for non-repudiation)   will be when all end entities of this CA have securely acquired the   new CA public key.   The "old with new" certificate must have a validity period starting   at the generation time of the old key pair and ending at the expiry   date of the old public key.   The "new with old" certificate must have a validity period starting   at the generation time of the new key pair and ending at the time by   which all end entities of this CA will securely possess the new CA   public key (at the latest, the expiry date of the old public key).   The "new with new" certificate must have a validity period starting   at the generation time of the new key pair and ending at or before the    time by which the CA will next update its key pair.Adams & Farrell               Expires May 2003                   [Page 18]2.4.2 Verifying Certificates.   Normally when verifying a signature, the verifier verifies (among   other things) the certificate containing the public key of the   signer. However, once a CA is allowed to update its key there are a   range of new possibilities. These are shown in the table below.               Repository contains NEW     Repository contains only OLD                 and OLD public keys        public key (due to, e.g.,                                             delay in publication)                  PSE      PSE Contains  PSE Contains    PSE Contains               Contains     OLD public    NEW public      OLD public              NEW public       key            key            key                  key   Signer's   Case 1:      Case 3:       Case 5:        Case 7:   certifi-   This is      In this case  Although the   In this case   cate is    the          the verifier  CA operator    the CA   protected  standard     must access   has not        operator  has   using NEW  case where   the           updated the    not updated   public     the          repository in repository the the repository   key        verifier     order to get  verifier can   and so the              can          the value of  verify the     verification              directly     the NEW       certificate    will FAIL              verify the   public key    directly -              certificate                this is thus              without                    the same as              using the                  case 1.              repository   Signer's   Case 2:      Case 4:       Case 6:        Case 8:   certifi-   In this      In this case  The verifier   Although the   cate is    case the     the verifier  thinks this    CA operator   protected  verifier     can directly  is the         has not   using OLD  must         verify the    situation of   updated the   public     access the   certificate   case 2 and     repository the   key        repository   without       will access    verifier can              in order     using the     the            verify the              to get the   repository    repository;    certificate              value of                   however, the   directly -              the OLD                    verification   this is thus              public key                 will FAIL      the same as                                                        case 4.Adams & Farrell               Expires May 2003                   [Page 19]2.4.2.1 Verification in cases 1, 4, 5 and 8.   In these cases the verifier has a local copy of the CA public key   which can be used to verify the certificate directly. This is the   same as the situation where no key change has occurred.   Note that case 8 may arise between the time when the CA operator has   generated the new key pair and the time when the CA operator stores   the updated attributes in the repository. Case 5 can only arise if the   CA operator has issued both the signer's and verifier's certificates   during this "gap" (the CA operator SHOULD avoid this as it leads to   the failure cases described below).2.4.2.2 Verification in case 2.   In case 2 the verifier must get access to the old public key of the   CA. The verifier does the following:      1. Look up the caCertificate attribute in the repository and pick         the OldWithNew certificate (determined based on validity         periods; note that the subject and issuer fields must match);      2. Verify that this is correct using the new CA key (which the         verifier has locally);      3. If correct, check the signer's certificate using the old CA         key.   Case 2 will arise when the CA operator has issued the signer's   certificate, then changed key and then issued the verifier's   certificate, so it is quite a typical case.2.4.2.3 Verification in case 3.   In case 3 the verifier must get access to the new public key of the   CA. The verifier does the following:      1. Look up the CACertificate attribute in the repository and pick         the NewWithOld certificate (determined based on validity         periods; note that the subject and issuer fields must match);      2. Verify that this is correct using the old CA key (which the         verifier has stored locally);      3. If correct, check the signer's certificate using the new CA         key.   Case 3 will arise when the CA operator has issued the verifier's   certificate, then changed key and then issued the signer's   certificate, so it is also quite a typical case.Adams & Farrell               Expires May 2003                   [Page 20]2.4.2.4 Failure of verification in case 6.   In this case the CA has issued the verifier's PSE containing the new   key without updating the repository attributes. This means that the   verifier has no means to get a trustworthy version of the CA's old   key and so verification fails.   Note that the failure is the CA operator's fault.2.4.2.5 Failure of verification in case 7.   In this case the CA has issued the signer's certificate protected   with the new key without updating the repository attributes. This   means that the verifier has no means to get a trustworthy version of   the CA's new key and so verification fails.   Note that the failure is again the CA operator's fault.2.4.3 Revocation - Change of CA key   As we saw above the verification of a certificate becomes more   complex once the CA is allowed to change its key. This is also true   for revocation checks as the CA may have signed the CRL using a newer   private key than the one that is within the user's PSE.   The analysis of the alternatives is as for certificate verification.3. Data Structures   This section contains descriptions of the data structures required   for PKI management messages. Section 4 describes constraints on their   values and the sequence of events for each of the various PKI   management operations. 3.1 Overall PKI Message   All of the messages used in this specification for the purposes of   PKI management use the following structure:     PKIMessage ::= SEQUENCE {         header           PKIHeader,         body             PKIBody,         protection   [0] PKIProtection OPTIONAL,         extraCerts   [1] SEQUENCE SIZE (1..MAX) OF Certificate OPTIONAL     }     PKIMessages ::= SEQUENCE SIZE (1..MAX) OF PKIMessageAdams & Farrell               Expires May 2003                   [Page 21]   The PKIHeader contains information which is common to many PKI   messages.   The PKIBody contains message-specific information.   The PKIProtection, when used, contains bits that protect the PKI   message.   The extraCerts field can contain certificates that may be useful to   the recipient. For example, this can be used by a CA or RA to present   an end entity with certificates that it needs to verify its own new   certificate (if, for example, the CA that issued the end entity's   certificate is not a root CA for the end entity).  Note that this   field does not necessarily contain a certification path - the   recipient may have to sort, select from, or otherwise process the   extra certificates in order to use them.3.1.1 PKI Message Header   All PKI messages require some header information for addressing and   transaction identification. Some of this information will also be   present in a transport-specific envelope; however, if the PKI message   is protected then this information is also protected (i.e., we make   no assumption about secure transport).   The following data structure is used to contain this information:     PKIHeader ::= SEQUENCE {         pvno                INTEGER     { cmp1999(1), cmp2000(2) },         sender              GeneralName,         -- identifies the sender         recipient           GeneralName,         -- identifies the intended recipient         messageTime     [0] GeneralizedTime         OPTIONAL,         -- time of production of this message (used when sender         -- believes that the transport will be "suitable"; i.e.,         -- that the time will still be meaningful upon receipt)         protectionAlg   [1] AlgorithmIdentifier     OPTIONAL,         -- algorithm used for calculation of protection bits

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
日本欧美大码aⅴ在线播放| 国产精品一二二区| 欧美三级乱人伦电影| 一区二区三区四区在线播放| 91色视频在线| 亚洲成人手机在线| 8v天堂国产在线一区二区| 久久成人综合网| 国产精品网站在线观看| 欧美中文一区二区三区| 六月丁香婷婷色狠狠久久| 久久夜色精品国产欧美乱极品| 国产乱码精品一区二区三 | 国产**成人网毛片九色| 国产精品国产自产拍高清av王其| 91丝袜美腿高跟国产极品老师| 午夜一区二区三区在线观看| 欧美日韩国产欧美日美国产精品| 天天射综合影视| 精品福利一二区| 老色鬼精品视频在线观看播放| 欧美国产欧美综合| 欧美一级一级性生活免费录像| 粉嫩高潮美女一区二区三区| 午夜日韩在线电影| 亚洲欧美电影院| 久久精品夜色噜噜亚洲aⅴ| 欧美午夜免费电影| 一本一道久久a久久精品综合蜜臀| 美国十次综合导航| 日韩—二三区免费观看av| 一区二区国产盗摄色噜噜| 欧美韩国一区二区| 中文字幕欧美日本乱码一线二线 | 精品在线观看视频| 日韩综合小视频| 日韩影视精彩在线| 日日摸夜夜添夜夜添精品视频| 一区二区三区中文字幕| 亚洲欧洲综合另类在线| 亚洲天堂2014| 亚洲自拍偷拍av| 午夜av一区二区三区| 亚洲国产精品久久人人爱| 午夜久久福利影院| 久久成人免费网站| 亚洲国产精品久久久久婷婷884 | 亚洲天堂精品视频| 亚洲制服丝袜在线| 日本中文一区二区三区| 无码av免费一区二区三区试看| 亚洲精品国产无天堂网2021| 亚洲女女做受ⅹxx高潮| 亚洲国产综合视频在线观看| 精品无码三级在线观看视频 | 亚洲一区欧美一区| 午夜在线成人av| 国产一区二区中文字幕| 成人国产精品免费观看视频| 91在线你懂得| 国产欧美精品国产国产专区| 亚洲第一搞黄网站| 日本久久电影网| 国产欧美视频一区二区| 性做久久久久久免费观看| 成人免费黄色大片| 欧美成人乱码一区二区三区| 亚洲色图欧美在线| 成人a免费在线看| 国产人成亚洲第一网站在线播放 | 亚洲国产精品久久人人爱蜜臀| 国产黄色精品视频| 久久久综合精品| 久久国产精品色| 欧美不卡一区二区三区四区| 亚洲成av人片一区二区梦乃| 972aa.com艺术欧美| 国产精品久久久久久久久搜平片| 国产精品一二三区在线| 2021国产精品久久精品| 国产精品77777| 国产亚洲成aⅴ人片在线观看| 蜜桃在线一区二区三区| 精品黑人一区二区三区久久| 精品一区二区三区久久| 久久综合久久综合九色| 免费成人在线网站| 欧美精品一级二级三级| 日本麻豆一区二区三区视频| 精品日本一线二线三线不卡| 国产尤物一区二区| 亚洲欧美色图小说| 欧美精品 国产精品| 六月丁香婷婷久久| 国产精品网站一区| 欧美三级日韩三级国产三级| 国产在线国偷精品产拍免费yy| 国产欧美日韩精品一区| 成人美女在线视频| 国产精品入口麻豆九色| 欧美日韩国产在线观看| 国产一区二区免费看| 天堂一区二区在线| 亚洲欧洲www| 久久久三级国产网站| 欧美手机在线视频| 91网站最新地址| 国产一区二区三区免费看| 亚洲一区在线播放| 日韩伦理电影网| 一区在线观看免费| 久久久噜噜噜久久中文字幕色伊伊| 在线一区二区观看| 91麻豆福利精品推荐| 丁香五精品蜜臀久久久久99网站| 日日夜夜精品视频免费| 日日骚欧美日韩| 午夜精品福利一区二区三区av| 亚洲激情六月丁香| 亚洲视频每日更新| 亚洲最色的网站| 亚洲一区二区偷拍精品| 亚洲国产va精品久久久不卡综合| 亚洲欧洲成人自拍| 一区二区三区影院| 日韩电影在线免费看| 国产剧情一区二区三区| 成人精品国产免费网站| 一本高清dvd不卡在线观看| 在线观看亚洲一区| 91精品国产免费| 国产精品丝袜一区| 欧美日韩中文国产| 欧美一区午夜精品| 国产偷v国产偷v亚洲高清 | 久久青草欧美一区二区三区| 久久综合久久99| 亚洲午夜在线视频| 国产乱一区二区| 欧美久久久久久久久中文字幕| 精品欧美久久久| 夜夜爽夜夜爽精品视频| 美女看a上一区| 欧美午夜寂寞影院| 欧美激情一区二区三区在线| 亚洲激情在线播放| 国产91综合一区在线观看| 91久久精品国产91性色tv| 久久影院午夜片一区| 日一区二区三区| 欧美日本国产一区| 亚洲免费资源在线播放| 狠狠色丁香婷婷综合久久片| 在线视频观看一区| 国产精品美女久久久久高潮| 紧缚捆绑精品一区二区| 欧美色区777第一页| 亚洲视频一区二区在线观看| 激情六月婷婷久久| 久久久亚洲高清| 大陆成人av片| 中文字幕日本不卡| 99久久精品情趣| 中文字幕中文乱码欧美一区二区| 国产原创一区二区三区| 久久夜色精品一区| 国产高清在线精品| 欧美一二三区在线观看| 日韩中文字幕av电影| 欧美巨大另类极品videosbest | 午夜视频久久久久久| 欧美美女一区二区三区| 日韩和欧美一区二区三区| 日韩一区二区高清| 国产a精品视频| 亚洲资源中文字幕| 欧美一级高清大全免费观看| 精品一区二区免费在线观看| 国产精品网站在线观看| www.欧美色图| 亚洲欧美激情小说另类| 日韩视频一区在线观看| 成人av免费在线播放| 亚洲小说欧美激情另类| 久久综合久久综合久久| 色婷婷精品久久二区二区蜜臂av| 午夜精品久久久久久久久久久 | 91麻豆国产福利精品| 久热成人在线视频| 亚洲精品国产一区二区精华液| 日韩丝袜美女视频| 91理论电影在线观看| 国产一区二区三区综合| 日本中文字幕一区二区视频| 国产精品三级电影| www成人在线观看| 日韩精品一区二区三区中文不卡 | 成人av集中营| 国产精品中文有码| 九色|91porny|