亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? rfc3008.txt

?? 最新的RFC3008文檔
?? TXT
字號:
Network Working Group                                      B. WellingtonRequest for Comments: 3008                                       NominumUpdates: 2535                                              November 2000Category: Standards Track         Domain Name System Security (DNSSEC) Signing AuthorityStatus of this Memo   This document specifies an Internet standards track protocol for the   Internet community, and requests discussion and suggestions for   improvements.  Please refer to the current edition of the "Internet   Official Protocol Standards" (STD 1) for the standardization state   and status of this protocol.  Distribution of this memo is unlimited.Copyright Notice   Copyright (C) The Internet Society (2000).  All Rights Reserved.Abstract   This document proposes a revised model of Domain Name System Security   (DNSSEC) Signing Authority.  The revised model is designed to clarify   earlier documents and add additional restrictions to simplify the   secure resolution process.  Specifically, this affects the   authorization of keys to sign sets of records.   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this   document are to be interpreted as described in RFC 2119 [RFC2119].1 - Introduction   This document defines additional restrictions on DNSSEC signatures   (SIG) records relating to their authority to sign associated data.   The intent is to establish a standard policy followed by a secure   resolver; this policy can be augmented by local rules.  This builds   upon [RFC2535], updating section 2.3.6 of that document.   The most significant change is that in a secure zone, zone data is   required to be signed by the zone key.   Familiarity with the DNS system [RFC1034, RFC1035] and the DNS   security extensions [RFC2535] is assumed.Wellington                  Standards Track                     [Page 1]RFC 3008                DNSSEC Signing Authority           November 20002 - The SIG Record   A SIG record is normally associated with an RRset, and "covers" (that   is, demonstrates the authenticity and integrity of) the RRset.  This   is referred to as a "data SIG".  Note that there can be multiple SIG   records covering an RRset, and the same validation process should be   repeated for each of them.  Some data SIGs are considered "material",   that is, relevant to a DNSSEC capable resolver, and some are   "immaterial" or "extra-DNSSEC", as they are not relevant to DNSSEC   validation.  Immaterial SIGs may have application defined roles.  SIG   records may exist which are not bound to any RRset; these are also   considered immaterial.  The validation process determines which SIGs   are material; once a SIG is shown to be immaterial, no other   validation is necessary.   SIGs may also be used for transaction security.  In this case, a SIG   record with a type covered field of 0 is attached to a message, and   is used to protect message integrity.  This is referred to as a   SIG(0) [RFC2535, RFC2931].   The following sections define requirements for all of the fields of a   SIG record.  These requirements MUST be met in order for a DNSSEC   capable resolver to process this signature.  If any of these   requirements are not met, the SIG cannot be further processed.   Additionally, once a KEY has been identified as having generated this   SIG, there are requirements that it MUST meet.2.1 - Type Covered   For a data SIG, the type covered MUST be the same as the type of data   in the associated RRset.  For a SIG(0), the type covered MUST be 0.2.2 - Algorithm Number   The algorithm specified in a SIG MUST be recognized by the client,   and it MUST be an algorithm that has a defined SIG rdata format.2.3 - Labels   The labels count MUST be less than or equal to the number of labels   in the SIG owner name, as specified in [RFC2535, section 4.1.3].2.4 - Original TTL   The original TTL MUST be greater than or equal to the TTL of the SIG   record itself, since the TTL cannot be increased by intermediate   servers.  This field can be ignored for SIG(0) records.Wellington                  Standards Track                     [Page 2]RFC 3008                DNSSEC Signing Authority           November 20002.5 - Signature Expiration and Inception   The current time at the time of validation MUST lie within the   validity period bounded by the inception and expiration times.2.6 - Key Tag   There are no restrictions on the Key Tag field, although it is   possible that future algorithms will impose constraints.2.7 - Signer's Name   The signer's name field of a data SIG MUST contain the name of the   zone to which the data and signature belong.  The combination of   signer's name, key tag, and algorithm MUST identify a zone key if the   SIG is to be considered material.  The only exception that the   signer's name field in a SIG KEY at a zone apex SHOULD contain the   parent zone's name, unless the KEY set is self-signed.  This document   defines a standard policy for DNSSEC validation; local policy may   override the standard policy.   There are no restrictions on the signer field of a SIG(0) record.   The combination of signer's name, key tag, and algorithm MUST   identify a key if this SIG(0) is to be processed.2.8 - Signature   There are no restrictions on the signature field.  The signature will   be verified at some point, but does not need to be examined prior to   verification unless a future algorithm imposes constraints.3 - The Signing KEY Record   Once a signature has been examined and its fields validated (but   before the signature has been verified), the resolver attempts to   locate a KEY that matches the signer name, key tag, and algorithm   fields in the SIG.  If one is not found, the SIG cannot be verified   and is considered immaterial.  If KEYs are found, several fields of   the KEY record MUST have specific values if the SIG is to be   considered material and authorized.  If there are multiple KEYs, the   following checks are performed on all of them, as there is no way to   determine which one generated the signature until the verification is   performed.Wellington                  Standards Track                     [Page 3]RFC 3008                DNSSEC Signing Authority           November 20003.1 - Type Flags   The signing KEY record MUST have a flags value of 00 or 01   (authentication allowed, confidentiality optional) [RFC2535, 3.1.2].   A DNSSEC resolver MUST only trust signatures generated by keys that   are permitted to authenticate data.3.2 - Name Flags   The interpretation of this field is considerably different for data   SIGs and SIG(0) records.3.2.1 - Data SIG   If the SIG record covers an RRset, the name type of the associated   KEY MUST be 01 (zone) [RFC2535, 3.1.2].  This updates RFC 2535,   section 2.3.6.  The DNSSEC validation process performed by a resolver   MUST ignore all keys that are not zone keys unless local policy   dictates otherwise.   The primary reason that RFC 2535 allows host and user keys to   generate material DNSSEC signatures is to allow dynamic update   without online zone keys; that is, avoid storing private keys in an   online server.  The desire to avoid online signing keys cannot be   achieved, though, because they are necessary to sign NXT and SOA sets   [RFC3007].  These online zone keys can sign any incoming data.   Removing the goal of having no online keys removes the reason to   allow host and user keys to generate material signatures.   Limiting material signatures to zone keys simplifies the validation   process.  The length of the verification chain is bounded by the   name's label depth.  The authority of a key is clearly defined; a   resolver does not need to make a potentially complicated decision to   determine whether a key has the proper authority to sign data.   Finally, there is no additional flexibility granted by allowing   host/user key generated material signatures.  As long as users and   hosts have the ability to authenticate update requests to the primary   zone server, signatures by zone keys are sufficient to protect the   integrity of the data to the world at large.3.2.2 - SIG(0)   If the SIG record is a SIG(0) protecting a message, the name type of   the associated KEY SHOULD be 00 (user) or 10 (host/entity).   Transactions are initiated by a host or user, not a zone, so zone   keys SHOULD not generate SIG(0) records.Wellington                  Standards Track                     [Page 4]RFC 3008                DNSSEC Signing Authority           November 2000   A client is either explicitly executed by a user or on behalf of a   host, therefore the name type of a SIG(0) generated by a client   SHOULD be either user or host.  A nameserver is associated with a   host, and its use of SIG(0) is not associated with a particular zone,   so the name type of a SIG(0) generated by a nameserver SHOULD be   host.3.3 - Signatory Flags   This document does not assign any values to the signatory field, nor   require any values to be present.3.4 - Protocol   The signing KEY record MUST have a protocol value of 3 (DNSSEC) or   255 (ALL).  If a key is not specified for use with DNSSEC, a DNSSEC   resolver MUST NOT trust any signature that it generates.3.5 - Algorithm Number   The algorithm field MUST be identical to that of the generated SIG   record, and MUST meet all requirements for an algorithm value in a   SIG record.4 - Security Considerations   This document defines a standard baseline for a DNSSEC capable   resolver.  This is necessary for a thorough security analysis of   DNSSEC, if one is to be done.   Specifically, this document places additional restrictions on SIG   records that a resolver must validate before the signature can be   considered worthy of DNSSEC trust.  This simplifies the protocol,   making it more robust and able to withstand scrutiny by the security   community.5 - Acknowledgements   The author would like to thank the following people for review and   informative comments (in alphabetical order):   Olafur Gudmundsson   Ed LewisWellington                  Standards Track                     [Page 5]RFC 3008                DNSSEC Signing Authority           November 20006 - References   [RFC1034]  Mockapetris, P., "Domain Names - Concepts and Facilities",              STD 13, RFC 1034, November 1987.   [RFC1035]  Mockapetris, P., "Domain Names - Implementation and              Specification", STD 13, RFC 1035, November 1987.   [RFC2119]  Bradner, S., "Key words for use in RFCs to Indicate              Requirement Levels", BCP 14, RFC 2119, March 1997.   [RFC2136]  Vixie (Ed.), P., Thomson, S., Rekhter, Y. and J. Bound,              "Dynamic Updates in the Domain Name System", RFC 2136,              April 1997.   [RFC2535]  Eastlake, D., "Domain Name System Security Extensions",              RFC 2535, March 1999.   [RFC2931]  Eastlake, D., "DNS Request and Transaction Signatures              (SIG(0)s )", RFC 2931, September 2000.   [RFC3007]      Wellington, B., "Simple Secure Domain Name System              (DNS) Dynamic Update", RFC 3007, November 2000.7 - Author's Address   Brian Wellington   Nominum, Inc.   950 Charter Street   Redwood City, CA 94063   Phone: +1 650 381 6022   EMail: Brian.Wellington@nominum.comWellington                  Standards Track                     [Page 6]RFC 3008                DNSSEC Signing Authority           November 20008  Full Copyright Statement   Copyright (C) The Internet Society (2000).  All Rights Reserved.   This document and translations of it may be copied and furnished to   others, and derivative works that comment on or otherwise explain it   or assist in its implementation may be prepared, copied, published   and distributed, in whole or in part, without restriction of any   kind, provided that the above copyright notice and this paragraph are   included on all such copies and derivative works.  However, this   document itself may not be modified in any way, such as by removing   the copyright notice or references to the Internet Society or other   Internet organizations, except as needed for the purpose of   developing Internet standards in which case the procedures for   copyrights defined in the Internet Standards process must be   followed, or as required to translate it into languages other than   English.   The limited permissions granted above are perpetual and will not be   revoked by the Internet Society or its successors or assigns.   This document and the information contained herein is provided on an   "AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING   TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING   BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION   HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF   MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.Acknowledgement   Funding for the RFC Editor function is currently provided by the   Internet Society.Wellington                  Standards Track                     [Page 7]

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
亚洲欧美另类久久久精品2019| 日韩伦理免费电影| 国产欧美视频一区二区三区| 欧美精品一区二区三区在线播放| 日韩欧美一二区| 久久精品人人做人人综合| 亚洲色图一区二区三区| 亚洲亚洲精品在线观看| 蜜臀va亚洲va欧美va天堂 | 成人动漫中文字幕| 91免费看片在线观看| 日韩一区二区三| 最近日韩中文字幕| 国内久久精品视频| 日本久久一区二区三区| 精品国产伦一区二区三区观看体验 | 日韩欧美一区在线观看| 久久精品人人做人人爽97 | 99re免费视频精品全部| 日韩欧美在线一区二区三区| 亚洲欧洲国产专区| 男男视频亚洲欧美| 欧美日韩黄色影视| 尤物av一区二区| 99re成人精品视频| 专区另类欧美日韩| 国产乱子轮精品视频| 91成人免费电影| 中文字幕一区二区在线播放 | 日韩欧美国产精品| 亚洲国产视频a| 91老师片黄在线观看| 中文字幕第一区二区| 成人精品小蝌蚪| 日本一区二区三区国色天香 | 亚洲精品一区二区三区福利| 五月婷婷综合在线| 欧美一级搡bbbb搡bbbb| 午夜av一区二区三区| 91精品国产全国免费观看| 蜜桃视频在线观看一区| 91精品在线麻豆| 国产成人精品亚洲日本在线桃色| 久久先锋影音av鲁色资源网| 国产黑丝在线一区二区三区| 久久久www成人免费毛片麻豆| 国产精品影音先锋| 中文字幕一区二区三区视频| 在线观看精品一区| 日本色综合中文字幕| 2022国产精品视频| 日本精品视频一区二区| 看电影不卡的网站| 成人欧美一区二区三区视频网页| 97se亚洲国产综合在线| 一卡二卡三卡日韩欧美| 国产欧美日韩不卡免费| 日日摸夜夜添夜夜添亚洲女人| 久久中文字幕电影| 欧美日韩视频在线第一区| 粉嫩嫩av羞羞动漫久久久| 亚洲国产精品久久久男人的天堂| 91精品国产品国语在线不卡| 99在线热播精品免费| 久久97超碰色| 丝袜美腿亚洲综合| 一区二区三区免费看视频| 国产日产欧美精品一区二区三区| 欧美日韩国产精选| 99久久99久久精品免费观看| 久久成人羞羞网站| 婷婷成人综合网| 一区二区三区四区乱视频| 亚洲欧洲无码一区二区三区| 久久久午夜电影| 久久久久久久电影| 精品国产91洋老外米糕| 日韩手机在线导航| 精品国产一区二区三区不卡| 91精品国产免费久久综合| 欧美精品一区二区精品网| 在线不卡免费av| 91精品啪在线观看国产60岁| 欧美精品视频www在线观看 | 亚洲国产精品天堂| 亚洲图片有声小说| 日本亚洲一区二区| 精品亚洲免费视频| 国产成人午夜精品5599 | 久久一区二区三区四区| 久久色成人在线| 亚洲手机成人高清视频| 亚洲一区二区精品视频| 婷婷丁香激情综合| 国产成人激情av| 91麻豆免费在线观看| 91精品欧美福利在线观看 | 极品尤物av久久免费看| 国产成人av资源| 欧美综合色免费| 久久久www成人免费毛片麻豆| 国产精品国产自产拍高清av王其 | 日本高清不卡视频| 日韩欧美国产不卡| 亚洲欧美色一区| 久久精品久久综合| 在线精品视频小说1| 国产女同性恋一区二区| 日韩精品成人一区二区在线| 成人午夜视频在线| 日韩一区二区免费高清| 亚洲一区视频在线观看视频| 国产乱码字幕精品高清av | 午夜电影网一区| 91网上在线视频| 综合激情网...| 国产成人精品影院| 久久精品视频在线看| 蜜乳av一区二区三区| 欧美日韩精品三区| 性做久久久久久免费观看欧美| 国产精品 日产精品 欧美精品| 日韩一级高清毛片| 日韩欧美国产电影| 精品制服美女久久| 精品久久久久久久久久久久包黑料| 亚洲国产综合91精品麻豆| 色狠狠一区二区三区香蕉| 亚洲欧美在线视频| 色播五月激情综合网| 亚洲国产成人va在线观看天堂| 色婷婷综合久色| 亚洲国产色一区| 日韩免费一区二区| 国产精品77777竹菊影视小说| 国产亚洲婷婷免费| 99国产精品久| 丝袜诱惑亚洲看片| 337p日本欧洲亚洲大胆色噜噜| 国产成a人亚洲精品| 尤物av一区二区| 日韩精品资源二区在线| 国产69精品一区二区亚洲孕妇| 18成人在线观看| 精品sm捆绑视频| 成人av资源在线观看| 亚洲图片欧美激情| 日韩欧美国产综合一区| 9色porny自拍视频一区二区| 天天亚洲美女在线视频| 国产免费成人在线视频| 9191久久久久久久久久久| 国产成人8x视频一区二区| 亚洲成av人片| 一区二区三区在线免费视频| 欧美电视剧免费观看| 欧美日韩一级大片网址| 成人高清视频在线观看| 国产乱码字幕精品高清av | 91社区在线播放| 国产经典欧美精品| 精品在线播放午夜| 亚洲成人你懂的| 亚洲色图在线看| 最新欧美精品一区二区三区| 日韩三级av在线播放| 欧美三日本三级三级在线播放| 成人精品小蝌蚪| 播五月开心婷婷综合| 懂色av一区二区三区免费观看| 激情成人综合网| 国产精品18久久久久久久久 | 国产亚洲短视频| 欧美r级电影在线观看| 日韩视频一区二区三区在线播放| 91福利精品视频| 欧美日韩亚州综合| 欧美久久久久久久久久| 91精品在线一区二区| 日韩欧美在线影院| 国产精品天干天干在线综合| 国产精品萝li| 亚洲一区二区美女| 伦理电影国产精品| 国产一区高清在线| 99久精品国产| 欧美精品一卡二卡| 国产精品三级视频| 亚洲成人午夜影院| 国产成人精品1024| 欧美丝袜自拍制服另类| 久久精品一区蜜桃臀影院| 国产精品久久影院| 欧美aⅴ一区二区三区视频| 国产激情一区二区三区| 欧美日韩精品福利| 国产精品女同互慰在线看| 亚洲国产精品欧美一二99| av在线不卡电影| 日韩欧美在线123|