亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? rfc3645.txt

?? bind 源碼 最新實現 linux/unix/windows平臺
?? TXT
?? 第 1 頁 / 共 4 頁
字號:
Network Working Group                                            S. KwanRequest for Comments: 3645                                       P. GargUpdates: 2845                                                  J. GilroyCategory: Standards Track                                      L. Esibov                                                             J. Westhead                                                         Microsoft Corp.                                                                 R. Hall                                                     Lucent Technologies                                                            October 2003                 Generic Security Service Algorithm for        Secret Key Transaction Authentication for DNS (GSS-TSIG)Status of this Memo   This document specifies an Internet standards track protocol for the   Internet community, and requests discussion and suggestions for   improvements.  Please refer to the current edition of the "Internet   Official Protocol Standards" (STD 1) for the standardization state   and status of this protocol.  Distribution of this memo is unlimited.Copyright Notice   Copyright (C) The Internet Society (2003).  All Rights Reserved.Abstract   The Secret Key Transaction Authentication for DNS (TSIG) protocol   provides transaction level authentication for DNS.  TSIG is   extensible through the definition of new algorithms.  This document   specifies an algorithm based on the Generic Security Service   Application Program Interface (GSS-API) (RFC2743).  This document   updates RFC 2845.Kwan, et al.                Standards Track                     [Page 1]RFC 3645                        GSS-TSIG                    October 2003Table of Contents   1.  Introduction . . . . . . . . . . . . . . . . . . . . . . . . .  2   2.  Algorithm Overview . . . . . . . . . . . . . . . . . . . . . .  3       2.1.  GSS Details. . . . . . . . . . . . . . . . . . . . . . .  4       2.2.  Modifications to the TSIG protocol (RFC 2845). . . . . .  4   3.  Client Protocol Details. . . . . . . . . . . . . . . . . . . .  5       3.1.  Negotiating Context. . . . . . . . . . . . . . . . . . .  5           3.1.1.  Call GSS_Init_sec_context. . . . . . . . . . . . .  6           3.1.2.  Send TKEY Query to Server. . . . . . . . . . . . .  8           3.1.3.  Receive TKEY Query-Response from Server. . . . . .  8       3.2.  Context Established. . . . . . . . . . . . . . . . . . . 11           3.2.1.  Terminating a Context. . . . . . . . . . . . . . . 11   4.  Server Protocol Details. . . . . . . . . . . . . . . . . . . . 12       4.1.  Negotiating Context. . . . . . . . . . . . . . . . . . . 12           4.1.1.  Receive TKEY Query from Client . . . . . . . . . . 12           4.1.2.  Call GSS_Accept_sec_context. . . . . . . . . . . . 12           4.1.3.  Send TKEY Query-Response to Client . . . . . . . . 13       4.2.  Context Established. . . . . . . . . . . . . . . . . . . 15           4.2.1.  Terminating a Context. . . . . . . . . . . . . . . 15   5.  Sending and Verifying Signed Messages. . . . . . . . . . . . . 15       5.1.  Sending a Signed Message - Call GSS_GetMIC . . . . . . . 15       5.2.  Verifying a Signed Message - Call GSS_VerifyMIC. . . . . 16   6.  Example usage of GSS-TSIG algorithm. . . . . . . . . . . . . . 18   7.  Security Considerations. . . . . . . . . . . . . . . . . . . . 22   8.  IANA Considerations. . . . . . . . . . . . . . . . . . . . . . 22   9.  Conformance. . . . . . . . . . . . . . . . . . . . . . . . . . 22   10. Intellectual Property Statement. . . . . . . . . . . . . . . . 23   11. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . 23   12. References . . . . . . . . . . . . . . . . . . . . . . . . . . 24       12.1.  Normative References. . . . . . . . . . . . . . . . . . 24       12.2.  Informative References. . . . . . . . . . . . . . . . . 24   13. Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . 25   14. Full Copyright Statement . . . . . . . . . . . . . . . . . . . 261.  Introduction   The Secret Key Transaction Authentication for DNS (TSIG) [RFC2845]   protocol was developed to provide a lightweight authentication and   integrity of messages between two DNS entities, such as client and   server or server and server.  TSIG can be used to protect dynamic   update messages, authenticate regular message or to off-load   complicated DNSSEC [RFC2535] processing from a client to a server and   still allow the client to be assured of the integrity of the answers.Kwan, et al.                Standards Track                     [Page 2]RFC 3645                        GSS-TSIG                    October 2003   The TSIG protocol [RFC2845] is extensible through the definition of   new algorithms.  This document specifies an algorithm based on the   Generic Security Service Application Program Interface (GSS-API)   [RFC2743].  GSS-API is a framework that provides an abstraction of   security to the application protocol developer.  The security   services offered can include authentication, integrity, and   confidentiality.   The GSS-API framework has several benefits:   *  Mechanism and protocol independence.  The underlying mechanisms      that realize the security services can be negotiated on the fly      and varied over time.  For example, a client and server MAY use      Kerberos [RFC1964] for one transaction, whereas that same server      MAY use SPKM [RFC2025] with a different client.   *  The protocol developer is removed from the responsibility of      creating and managing a security infrastructure.  For example, the      developer does not need to create new key distribution or key      management systems.  Instead the developer relies on the security      service mechanism to manage this on its behalf.   The scope of this document is limited to the description of an   authentication mechanism only.  It does not discuss and/or propose an   authorization mechanism.  Readers that are unfamiliar with GSS-API   concepts are encouraged to read the characteristics and concepts   section of [RFC2743] before examining this protocol in detail.  It is   also assumed that the reader is familiar with [RFC2845], [RFC2930],   [RFC1034] and [RFC1035].   The key words "MUST", "MUST NOT", "REQUIRED", "SHOULD", "SHOULD NOT",   "RECOMMENDED", and "MAY" in this document are to be interpreted as   described in BCP 14, RFC 2119 [RFC2119].2.  Algorithm Overview   In GSS, client and server interact to create a "security context".   The security context can be used to create and verify transaction   signatures on messages between the two parties.  A unique security   context is required for each unique connection between client and   server.   Creating a security context involves a negotiation between client and   server.  Once a context has been established, it has a finite   lifetime for which it can be used to secure messages.  Thus there are   three states of a context associated with a connection:Kwan, et al.                Standards Track                     [Page 3]RFC 3645                        GSS-TSIG                    October 2003                              +----------+                              |          |                              V          |                      +---------------+  |                      | Uninitialized |  |                      |               |  |                      +---------------+  |                              |          |                              V          |                      +---------------+  |                      | Negotiating   |  |                      | Context       |  |                      +---------------+  |                              |          |                              V          |                      +---------------+  |                      | Context       |  |                      | Established   |  |                      +---------------+  |                              |          |                              +----------+   Every connection begins in the uninitialized state.2.1.  GSS Details   Client and server MUST be locally authenticated and have acquired   default credentials before using this protocol as specified in   Section 1.1.1 "Credentials" in RFC 2743 [RFC2743].   The GSS-TSIG algorithm consists of two stages:   I.  Establish security context.  The Client and Server use the       GSS_Init_sec_context and GSS_Accept_sec_context APIs to generate       the tokens that they pass to each other using [RFC2930] as a       transport mechanism.   II. Once the security context is established it is used to generate       and verify signatures using GSS_GetMIC and GSS_VerifyMIC APIs.       These signatures are exchanged by the Client and Server as a part       of the TSIG records exchanged in DNS messages sent between the       Client and Server, as described in [RFC2845].2.2.  Modifications to the TSIG protocol (RFC 2845)   Modification to RFC 2845 allows use of TSIG through signing server's   response in an explicitly specified place in multi message exchange   between two DNS entities even if client's request wasn't signed.Kwan, et al.                Standards Track                     [Page 4]RFC 3645                        GSS-TSIG                    October 2003   Specifically, Section 4.2 of RFC 2845 MUST be modified as follows:   Replace:      "The server MUST not generate a signed response to an unsigned      request."   With:      "The server MUST not generate a signed response to an unsigned      request, except in case of response to client's unsigned TKEY      query if secret key is established on server side after server      processed client's query.  Signing responses to unsigned TKEY      queries MUST be explicitly specified in the description of an      individual secret key establishment algorithm."3.  Client Protocol Details   A unique context is required for each server to which the client   sends secure messages.  A context is identified by a context handle.   A client maintains a mapping of servers to handles:      (target_name, key_name, context_handle)   The value key_name also identifies a context handle.  The key_name is   the owner name of the TKEY and TSIG records sent between a client and   a server to indicate to each other which context MUST be used to   process the current request.   DNS client and server MAY use various underlying security mechanisms   to establish security context as described in sections 3 and 4.  At   the same time, in order to guarantee interoperability between DNS   clients and servers that support GSS-TSIG it is REQUIRED that   security mechanism used by client enables use of Kerberos v5 (see   Section 9 for more information).3.1.  Negotiating Context   In GSS, establishing a security context involves the passing of   opaque tokens between the client and the server.  The client   generates the initial token and sends it to the server.  The server   processes the token and if necessary, returns a subsequent token to   the client.  The client processes this token, and so on, until the   negotiation is complete.  The number of times the client and server   exchange tokens depends on the underlying security mechanism.  A   completed negotiation results in a context handle.Kwan, et al.                Standards Track                     [Page 5]RFC 3645                        GSS-TSIG                    October 2003   The TKEY resource record [RFC2930] is used as the vehicle to transfer   tokens between client and server.  The TKEY record is a general   mechanism for establishing secret keys for use with TSIG.  For more   information, see [RFC2930].3.1.1.  Call GSS_Init_sec_context   To obtain the first token to be sent to a server, a client MUST call   GSS_Init_sec_context API.   The following input parameters MUST be used.  The outcome of the call   is indicated with the output values below.  Consult Sections 2.2.1,   "GSS_Init_sec_context call", of [RFC2743] for syntax definitions.   INPUTS     CREDENTIAL HANDLE claimant_cred_handle = NULL (NULL specifies "use         default").  Client MAY instead specify some other valid         handle to its credentials.     CONTEXT HANDLE input_context_handle  = 0     INTERNAL NAME  targ_name             = "DNS@<target_server_name>"     OBJECT IDENTIFIER mech_type          = Underlying security         mechanism chosen by implementers.  To guarantee         interoperability of the implementations of the GSS-TSIG         mechanism client MUST specify a valid underlying security         mechanism that enables use of Kerberos v5 (see Section 9 for         more information).     OCTET STRING   input_token           = NULL     BOOLEAN        replay_det_req_flag   = TRUE     BOOLEAN        mutual_req_flag       = TRUE     BOOLEAN        deleg_req_flag        = TRUE     BOOLEAN        sequence_req_flag     = TRUE     BOOLEAN        anon_req_flag         = FALSE     BOOLEAN        integ_req_flag        = TRUE     INTEGER        lifetime_req          = 0 (0 requests a default         value).  Client MAY instead specify another upper bound for the         lifetime of the context to be established in seconds.     OCTET STRING   chan_bindings         = Any valid channel bindings         as specified in Section 1.1.6 "Channel Bindings" in [RFC2743]   OUTPUTS     INTEGER        major_status     CONTEXT HANDLE output_context_handle     OCTET STRING   output_token     BOOLEAN        replay_det_state     BOOLEAN        mutual_state     INTEGER        minor_status     OBJECT IDENTIFIER mech_type     BOOLEAN        deleg_stateKwan, et al.                Standards Track                     [Page 6]RFC 3645                        GSS-TSIG                    October 2003     BOOLEAN        sequence_state     BOOLEAN        anon_state     BOOLEAN        trans_state     BOOLEAN        prot_ready_state     BOOLEAN        conf_avail     BOOLEAN        integ_avail     INTEGER        lifetime_rec   If returned major_status is set to one of the following errors:     GSS_S_DEFECTIVE_TOKEN     GSS_S_DEFECTIVE_CREDENTIAL     GSS_S_BAD_SIG (GSS_S_BAD_MIC)     GSS_S_NO_CRED     GSS_S_CREDENTIALS_EXPIRED     GSS_S_BAD_BINDINGS     GSS_S_OLD_TOKEN     GSS_S_DUPLICATE_TOKEN     GSS_S_NO_CONTEXT     GSS_S_BAD_NAMETYPE     GSS_S_BAD_NAME     GSS_S_BAD_MECH     GSS_S_FAILURE

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
亚洲r级在线视频| 久久久噜噜噜久久中文字幕色伊伊| 亚洲精品国产成人久久av盗摄 | 国产午夜精品一区二区三区嫩草| 亚洲视频你懂的| 久久97超碰色| 91精品国产综合久久国产大片| 欧美xxxx在线观看| 亚洲v日本v欧美v久久精品| 国产精品一区免费在线观看| 欧美日韩中文国产| 依依成人精品视频| 国产91在线观看| 久久新电视剧免费观看| 视频一区二区三区在线| 欧美精品乱码久久久久久| 亚洲一区二区三区中文字幕在线 | 亚洲国产成人精品视频| 欧美日韩另类一区| 经典三级在线一区| 欧美韩日一区二区三区四区| 成人午夜av在线| 亚洲色图在线视频| 色诱亚洲精品久久久久久| 中文字幕人成不卡一区| 91免费观看视频| 亚洲综合丁香婷婷六月香| 一本色道综合亚洲| 午夜精品福利一区二区三区av| 欧美日韩一区在线| 图片区小说区区亚洲影院| 日韩一区二区视频| 亚洲视频免费看| 91亚洲精品久久久蜜桃| 午夜私人影院久久久久| 久久久久99精品国产片| 色诱视频网站一区| 午夜精品久久久久影视| 国产精品一区二区男女羞羞无遮挡| 精品久久久久99| 91精品国产91久久久久久最新毛片| 国产99久久久精品| 国产一区二区91| 水野朝阳av一区二区三区| 国产日韩精品久久久| 91高清在线观看| 国内精品伊人久久久久影院对白| 国产精品不卡在线| 欧美日韩成人高清| 另类小说综合欧美亚洲| 亚洲影视资源网| 欧美国产在线观看| 欧美日韩国产一区| 国产盗摄女厕一区二区三区| 一区二区三区四区激情| 国产欧美日韩在线看| 日韩一区二区三区三四区视频在线观看| 成人晚上爱看视频| 蜜臀久久久久久久| 国产成人在线视频免费播放| 日本在线不卡视频一二三区| 日韩欧美国产wwwww| 日本韩国一区二区三区| 国产美女av一区二区三区| 亚洲人成影院在线观看| 久久只精品国产| 日韩精品在线看片z| 欧美影院一区二区| 欧美二区乱c少妇| 91在线观看地址| 成人18视频日本| 成人av网站在线观看| 美国三级日本三级久久99| 日韩av高清在线观看| 亚洲高清免费在线| 亚洲精品免费在线观看| 亚洲女女做受ⅹxx高潮| 国产精品国产三级国产a | 中文久久乱码一区二区| 欧美成人精品福利| 久久综合九色综合欧美98 | 日韩久久精品一区| 欧美一区二区成人| 精品久久国产字幕高潮| 精品黑人一区二区三区久久| 精品国产乱码91久久久久久网站| 精品免费视频.| 欧美一级夜夜爽| 国产精品色一区二区三区| 一区二区三区中文字幕精品精品| 午夜久久久久久电影| 国产乱一区二区| 欧美三级视频在线播放| 久久嫩草精品久久久精品| 成人免费在线播放视频| 日韩av一级片| 美腿丝袜一区二区三区| 国产精品系列在线观看| www.激情成人| 欧美日韩一二三| 久久精品亚洲乱码伦伦中文 | 欧美影片第一页| 日韩视频免费直播| 国产精品人妖ts系列视频| 亚洲不卡一区二区三区| 国产高清不卡一区二区| 日本道色综合久久| 欧美成人高清电影在线| 亚洲激情自拍偷拍| 国产精品综合在线视频| 在线视频综合导航| 久久久亚洲高清| 午夜电影网一区| 99久久精品免费看国产免费软件| 欧美性色黄大片| 国产精品人成在线观看免费| 蜜臀精品一区二区三区在线观看| 成人的网站免费观看| 91福利社在线观看| 国产女人水真多18毛片18精品视频| 中文字幕综合网| 国产美女一区二区| 在线成人午夜影院| 夜夜精品视频一区二区| 国产suv精品一区二区6| 欧美变态tickle挠乳网站| 日韩国产欧美三级| 欧美日韩三级一区| 日本一区二区三区在线不卡 | 日本不卡一二三| 日韩一区二区精品葵司在线| 亚洲成a天堂v人片| 欧美最猛性xxxxx直播| 亚洲女人小视频在线观看| av网站一区二区三区| 国产精品另类一区| 国产91精品入口| 中文字幕精品一区| 不卡一区二区中文字幕| 国产人妖乱国产精品人妖| 懂色av一区二区三区免费观看| 国产日韩av一区二区| 久久国产综合精品| www亚洲一区| 成人美女视频在线看| 亚洲欧美激情视频在线观看一区二区三区| 97se狠狠狠综合亚洲狠狠| 1000部国产精品成人观看| 99re热视频这里只精品| 亚洲精品久久久蜜桃| 欧洲亚洲国产日韩| 调教+趴+乳夹+国产+精品| 婷婷成人综合网| 精品久久久久久久一区二区蜜臀| 久久精品国产**网站演员| 久久久影视传媒| 99re这里只有精品6| 日韩精品一卡二卡三卡四卡无卡| 欧美va亚洲va香蕉在线| www.色综合.com| 亚洲午夜精品在线| 久久久久久久网| 欧洲一区在线电影| 国产精品一区二区三区四区| 伊人一区二区三区| 国产日本亚洲高清| 欧美裸体bbwbbwbbw| 91色视频在线| 韩日av一区二区| 亚洲男人的天堂av| 久久久美女毛片| 日韩一区二区三区精品视频| 91视频在线观看免费| 国产一区二区在线影院| 五月综合激情网| 亚洲人成在线播放网站岛国| 26uuu欧美| 337p亚洲精品色噜噜| 欧美亚洲尤物久久| 国产99久久久国产精品免费看| 狠狠狠色丁香婷婷综合久久五月| 一区二区成人在线| 亚洲人成伊人成综合网小说| 欧美国产一区二区| 久久先锋资源网| 精品久久久久久久人人人人传媒| 91精品婷婷国产综合久久竹菊| 色婷婷精品久久二区二区蜜臀av | 国产精品少妇自拍| 精品不卡在线视频| 欧美成人a∨高清免费观看| 欧美精品丝袜中出| 欧美日韩国产一二三| 欧美色精品在线视频| 欧美三级日韩三级| 欧美日韩1区2区| 在线观看成人小视频| 8x8x8国产精品| 欧美一级片免费看| 久久先锋影音av鲁色资源|