亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? rfc3645.txt

?? bind 源碼 最新實現(xiàn) linux/unix/windows平臺
?? TXT
?? 第 1 頁 / 共 4 頁
字號:
RFC 3645                        GSS-TSIG                    October 2003        GSS_S_DEFECTIVE_TOKEN        GSS_S_DEFECTIVE_CREDENTIAL        GSS_S_BAD_SIG (GSS_S_BAD_MIC)        GSS_S_DUPLICATE_TOKEN        GSS_S_OLD_TOKEN        GSS_S_NO_CRED        GSS_S_CREDENTIALS_EXPIRED        GSS_S_BAD_BINDINGS        GSS_S_NO_CONTEXT        GSS_S_BAD_MECH        GSS_S_FAILURE   If OUTPUT major_status is set to  GSS_S_COMPLETE or   GSS_S_CONTINUE_NEEDED then server MUST act as described below.   If major_status is GSS_S_COMPLETE the server component of the   negotiation is finished.  If output_token is non-NULL, then it MUST   be returned to the client in a Key Data field of the RDATA in TKEY.   The error field in the TKEY record is set to NOERROR.  The message   MUST be signed with a TSIG record as described in section 5, Sending   and Verifying Signed Messages.  Note that server is allowed to sign a   response to unsigned client's query due to modification to the RFC   2845 specified in Section 2.2 above.  The context state is advanced   to Context Established.  Section 4.2 discusses the usage of the   security context.   If major_status is GSS_S_COMPLETE and output_token is NULL, then the   TKEY record received from the client MUST be returned in the Answer   section of the response.  The message MUST be signed with a TSIG   record as described in section 5, Sending and Verifying Signed   Messages.  Note that server is allowed to sign a response to unsigned   client's query due to modification to the RFC 2845 specified in   section 2.2 above.  The context state is advanced to Context   Established.  Section 4.2 discusses the usage of the security   context.   If major_status is GSS_S_CONTINUE_NEEDED, the server component of the   negotiation is not yet finished.  The server responds to the TKEY   query with a standard query response, placing in the answer section a   TKEY record containing output_token in the Key Data RDATA field.  The   error field in the TKEY record is set to NOERROR.  The server MUST   limit the number of times that a given context is allowed to repeat,   to prevent endless looping.  Such limit SHOULD NOT exceed value of   10.Kwan, et al.                Standards Track                    [Page 14]RFC 3645                        GSS-TSIG                    October 2003   In all cases, except if major_status is GSS_S_COMPLETE and   output_token is NULL, other TKEY record fields MUST contain the   following values:        NAME = key_name        RDATA           Algorithm Name      = gss-tsig           Mode                = 3 (GSS-API negotiation - per [RFC2930])           Key Size            = size of output_token in octets   The remaining fields in the TKEY RDATA, i.e., Inception, Expiration,   Error, Other Size and Data Fields, MUST be set according to   [RFC2930].4.2.  Context Established   When context negotiation is complete, the handle context_handle is   used for the generation and verification of transaction signatures.   The handle is valid for a finite amount of time determined by the   underlying security mechanism.  A server MAY unilaterally terminate a   context at any time (see section 4.2.1).   Server SHOULD limit the amount of memory used to cache established   contexts.   The procedures for sending and receiving signed messages are given in   section 5, Sending and Verifying Signed Messages.4.2.1.  Terminating a Context   A server can terminate any established context at any time.  The   server MAY hint to the client that the context is being deleted by   including a TKEY RR in a response with the Mode field set to 5, i.e.,   "key deletion" [RFC2930].  An active context is deleted by calling   GSS_Delete_sec_context providing the associated context_handle.5.  Sending and Verifying Signed Messages5.1.  Sending a Signed Message - Call GSS_GetMIC   The procedure for sending a signature-protected message is specified   in [RFC2845].  The data to be passed to the signature routine   includes the whole DNS message with specific TSIG variables appended.   For the exact format, see [RFC2845].  For this protocol, use the   following TSIG variable values:Kwan, et al.                Standards Track                    [Page 15]RFC 3645                        GSS-TSIG                    October 2003      TSIG Record        NAME = key_name that identifies this context        RDATA           Algorithm Name = gss-tsig   Assign the remaining fields in the TSIG RDATA appropriate values as   described in [RFC2845].   The signature is generated by calling GSS_GetMIC.  The following   input parameters MUST be used.  The outcome of the call is indicated   with the output values specified below.  Consult Sections 2.3.1   "GSS_GetMIC call" of the RFC 2743[RFC2743] for syntax definitions.   INPUTS     CONTEXT HANDLE context_handle = context_handle for key_name     OCTET STRING   message        = outgoing message plus TSIG                                     variables (per [RFC2845])     INTEGER qop_req               = 0 (0 requests a default         value).  Caller MAY instead specify other valid value (for         details see Section 1.2.4 in [RFC2743])   OUTPUTS     INTEGER        major_status     INTEGER        minor_status     OCTET STRING   per_msg_token   If major_status is GSS_S_COMPLETE, then signature generation   succeeded.  The signature in per_msg_token is inserted into the   Signature field of the TSIG RR and the message is transmitted.   If major_status is GSS_S_CONTEXT_EXPIRED, GSS_S_CREDENTIALS_EXPIRED   or GSS_S_FAILURE the caller MUST delete the security context, return   to the uninitialized state and SHOULD negotiate a new security   context, as described above in Section 3.1   If major_status is GSS_S_NO_CONTEXT, the caller MUST remove the entry   for key_name from the (target_ name, key_name, context_handle)   mapping table, return to the uninitialized state and SHOULD negotiate   a new security context, as described above in Section 3.1   If major_status is GSS_S_BAD_QOP, the caller SHOULD repeat the   GSS_GetMIC call with allowed QOP value.  The number of such   repetitions MUST be limited to prevent infinite loops.5.2.  Verifying a Signed Message - Call GSS_VerifyMIC   The procedure for verifying a signature-protected message is   specified in [RFC2845].Kwan, et al.                Standards Track                    [Page 16]RFC 3645                        GSS-TSIG                    October 2003   The NAME of the TSIG record determines which context_handle maps to   the context that MUST be used to verify the signature.  If the NAME   does not map to an established context, the server MUST send a   standard TSIG error response to the client indicating BADKEY in the   TSIG error field (as described in [RFC2845]).   For the GSS algorithm, a signature is verified by using   GSS_VerifyMIC:   INPUTS     CONTEXT HANDLE context_handle = context_handle for key_name     OCTET STRING   message        = incoming message plus TSIG                                     variables (per [RFC2845])     OCTET STRING   per_msg_token  = Signature field from TSIG RR   OUTPUTS     INTEGER        major_status     INTEGER        minor_status     INTEGER        qop_state   If major_status is GSS_S_COMPLETE, the signature is authentic and the   message was delivered intact.  Per [RFC2845], the timer values of the   TSIG record MUST also be valid before considering the message to be   authentic.  The caller MUST not act on the request or response in the   message until these checks are verified.   When a server is processing a client request, the server MUST send a   standard TSIG error response to the client indicating BADKEY in the   TSIG error field as described in [RFC2845], if major_status is set to   one of the following values        GSS_S_DEFECTIVE_TOKEN        GSS_S_BAD_SIG (GSS_S_BAD_MIC)        GSS_S_DUPLICATE_TOKEN        GSS_S_OLD_TOKEN        GSS_S_UNSEQ_TOKEN        GSS_S_GAP_TOKEN        GSS_S_CONTEXT_EXPIRED        GSS_S_NO_CONTEXT        GSS_S_FAILURE   If the timer values of the TSIG record are invalid, the message MUST   NOT be considered authentic.  If this error checking fails when a   server is processing a client request, the appropriate error response   MUST be sent to the client according to [RFC2845].Kwan, et al.                Standards Track                    [Page 17]RFC 3645                        GSS-TSIG                    October 20036.  Example usage of GSS-TSIG algorithm   This Section describes an example where a Client, client.example.com,   and a Server, server.example.com, establish a security context   according to the algorithm described above.  I.  Client initializes security context negotiation  To establish a security context with a server, server.example.com, the  Client calls GSS_Init_sec_context with the following parameters.  (Note that some INPUT and OUTPUT parameters not critical for this  algorithm are not described in this example.)     CONTEXT HANDLE input_context_handle  = 0     INTERNAL NAME  targ_name             = "DNS@server.example.com"     OCTET STRING   input_token           = NULL     BOOLEAN        replay_det_req_flag   = TRUE     BOOLEAN        mutual_req_flag       = TRUE  The OUTPUTS parameters returned by GSS_Init_sec_context include     INTEGER        major_status = GSS_S_CONTINUE_NEEDED     CONTEXT HANDLE output_context_handle context_handle     OCTET STRING   output_token output_token     BOOLEAN        replay_det_state = TRUE     BOOLEAN        mutual_state = TRUE  Client verifies that replay_det_state and mutual_state values are  TRUE.  Since the major_status is GSS_S_CONTINUE_NEEDED, which is a  success OUTPUT major_status value, client stores context_handle that  maps to "DNS@server.example.com" and proceeds to the next step.  II.  Client sends a query with QTYPE = TKEY to server  Client sends a query with QTYPE = TKEY for a client-generated globally  unique domain name string, 789.client.example.com.server.example.com.  Query contains a TKEY record in its Additional records section with  the following fields.  (Note that some fields not specific to this  algorithm are not specified.)     NAME = 789.client.example.com.server.example.com.     RDATA        Algorithm Name      = gss-tsig        Mode                = 3 (GSS-API negotiation - per [RFC2930])        Key Size            = size of output_token in octets        Key Data            = output_tokenKwan, et al.                Standards Track                    [Page 18]RFC 3645                        GSS-TSIG                    October 2003  After the key_name 789.client.example.com.server.example.com.  is generated it is stored in the client's (target_name, key_name,  context_handle) mapping table.  III.  Server receives a query with QTYPE = TKEY  When server receives a query with QTYPE = TKEY, the server verifies  that Mode and Algorithm fields in the TKEY record in the Additional  records section of the query are set to 3 and "gss-tsig" respectively.  It finds that the key_name 789.client.example.com.server.example.com.  is not listed in its (key_name, context_handle) mapping table.  IV.  Server calls GSS_Accept_sec_context  To continue security context negotiation server calls  GSS_Accept_sec_context with the following parameters.  (Note that  some INPUT and OUTPUT parameters not critical for this algorithm  are not described in this example.)   INPUTS     CONTEXT HANDLE input_context_handle  = 0     OCTET STRING   input_token           = token specified in the Key                              field from TKEY RR (from Additional                              records section of the client's query)  The OUTPUTS parameters returned by GSS_Accept_sec_context include     INTEGER        major_status = GSS_S_CONTINUE_NEEDED     CONTEXT_HANDLE output_context_handle context_handle     OCTET STRING   output_token output_token  Server stores the mapping of the  789.client.example.com.server.example.com. to OUTPUT context_handle  in its (key_name, context_handle) mapping table.  V.  Server responds to the TKEY query  Since the major_status = GSS_S_CONTINUE_NEEDED in the last server's  call to GSS_Accept_sec_context, the server responds to the TKEY query  placing in the answer section a TKEY record containing output_token in  the Key Data RDATA field.  The error field in the TKEY record is set  to 0.  The RCODE in the query response is set to NOERROR.  VI.  Client processes token returned by server  When the client receives the TKEY query response from the server, the  client calls GSS_Init_sec_context with the following parameters.  (Note that some INPUT and OUTPUT parameters not critical for this  algorithm are not described in this example.)Kwan, et al.                Standards Track                    [Page 19]RFC 3645                        GSS-TSIG                    October 2003     CONTEXT HANDLE input_context_handle  = the context_handle stored          in the client's mapping table entry (DNS@server.example.com.,          789.client.example.com.server.example.com., context_handle)     INTERNAL NAME  targ_name             = "DNS@server.example.com"     OCTET STRING   input_token           = token from Key field of TKEY          record from the Answer section of the server's response     BOOLEAN        replay_det_req_flag   = TRUE     BOOLEAN        mutual_req_flag       = TRUE  The OUTPUTS parameters returned by GSS_Init_sec_context include     INTEGER        major_status = GSS_S_COMPLETE     CONTEXT HANDLE output_context_handle = context_handle     OCTET STRING   output_token = output_token     BOOLEAN        replay_det_state = TRUE     BOOLEAN        mutual_state = TRUE  Since the major_status is set to GSS_S_COMPLETE the client side  security context is established, but since the output_token is not  NULL client MUST send a TKEY query to the server as described below.  VII.  Client sends a query with QTYPE = TKEY to server  Client sends to the server a TKEY query for the  789.client.example.com.server.example.com. name.  Query contains a  TKEY record in its Additional records section with the following

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
九色综合狠狠综合久久| 欧美日韩视频第一区| 91官网在线观看| 久久先锋资源网| 日韩国产精品久久| 91影院在线免费观看| 欧美大白屁股肥臀xxxxxx| 亚洲黄色av一区| 成人aaaa免费全部观看| 久久老女人爱爱| 久久99精品一区二区三区三区| 色94色欧美sute亚洲线路一ni| 国产日韩精品一区二区三区| 麻豆91免费看| 日韩一区二区三免费高清| 亚洲国产精品久久艾草纯爱| 91蜜桃视频在线| 亚洲天堂网中文字| 成人国产视频在线观看| 欧美激情在线免费观看| 国产成人在线电影| 久久久综合九色合综国产精品| 久久精品国产精品青草| 精品欧美一区二区在线观看| 日韩精品一二区| 3atv在线一区二区三区| 午夜精品福利一区二区三区av| 欧美在线|欧美| 亚洲大片免费看| 69堂国产成人免费视频| 秋霞电影网一区二区| 91精品免费观看| 久久机这里只有精品| 久久综合九色欧美综合狠狠 | 亚洲综合免费观看高清在线观看| 风间由美一区二区av101| 国产精品免费免费| 99久久婷婷国产精品综合| 亚洲女人的天堂| 欧美三级日本三级少妇99| 亚洲国产wwwccc36天堂| 日韩一区二区三区视频在线| 国产呦精品一区二区三区网站| 久久先锋影音av鲁色资源网| 国产激情一区二区三区四区| 国产精品天干天干在观线| 色又黄又爽网站www久久| 午夜精品123| 国产亚洲人成网站| 99久久精品免费看国产免费软件| 一区二区三区色| 日韩一区二区三区观看| 国产白丝网站精品污在线入口| 国产精品久久一卡二卡| 欧美午夜寂寞影院| 久久超碰97中文字幕| 国产精品电影一区二区三区| 在线日韩国产精品| 激情六月婷婷久久| 中文字幕亚洲区| 日韩一区二区三区精品视频| 成人亚洲一区二区一| 亚洲成人精品一区| 久久久精品蜜桃| 欧美综合久久久| 国产精品888| 五月天激情综合| 国产精品国产精品国产专区不片| 欧美午夜不卡视频| 国产精品一区二区三区99| 亚洲已满18点击进入久久| 亚洲精品在线网站| 在线观看日韩高清av| 国产在线日韩欧美| 亚洲h在线观看| 17c精品麻豆一区二区免费| 国产一区免费电影| 成人午夜在线视频| 亚洲一区二区三区视频在线 | 欧美日韩黄色影视| 99精品国产一区二区三区不卡| 成人免费高清视频在线观看| 99久久精品国产导航| 色综合久久天天综合网| 色综合av在线| 欧美日韩成人一区| 日韩一区二区免费视频| 精品久久久久久久一区二区蜜臀| 精品99999| 中文字幕二三区不卡| 亚洲欧美日韩综合aⅴ视频| 亚洲一区在线看| 免费黄网站欧美| 国产一区二区不卡老阿姨| 国产不卡高清在线观看视频| av一区二区三区在线| 欧美三级韩国三级日本三斤| 日韩一区二区三区视频| 欧美国产禁国产网站cc| 一区二区三区成人| 免费观看日韩av| 成人av免费在线播放| 欧美视频日韩视频在线观看| 精品日韩一区二区三区| 国产精品伦理一区二区| 亚洲va欧美va人人爽| 国产一区二区三区观看| 色综合久久88色综合天天6| 欧美日韩国产区一| 国产日韩欧美精品电影三级在线| 亚洲激情五月婷婷| 久久av资源站| 色视频成人在线观看免| 欧美变态口味重另类| 亚洲人成在线观看一区二区| 日本不卡不码高清免费观看| 99久久国产综合精品麻豆| 91麻豆精品国产91久久久久久| 中文字幕精品一区 | 天天影视网天天综合色在线播放| 国产永久精品大片wwwapp | 久久精品72免费观看| 99久久99久久精品免费观看| 日韩午夜在线观看视频| 亚洲日穴在线视频| 国产精品一区二区久久精品爱涩 | 国产精品夜夜嗨| 欧美性色欧美a在线播放| 久久理论电影网| 视频一区免费在线观看| 成人av电影在线| 亚洲精品一区二区三区蜜桃下载 | 日韩精品资源二区在线| 综合久久久久久| 国产精品原创巨作av| 欧美妇女性影城| 亚洲图片激情小说| 高清shemale亚洲人妖| 911国产精品| 亚洲一区av在线| 91丨porny丨首页| 国产无一区二区| 老色鬼精品视频在线观看播放| 欧洲一区二区三区在线| 中文字幕在线观看不卡| 国产一区二区在线影院| 日韩欧美的一区| 丝袜美腿亚洲一区| 欧美日韩高清不卡| 亚洲精品精品亚洲| 成人激情黄色小说| 国产精品久久久99| 成人av在线影院| 亚洲国产激情av| 丁香亚洲综合激情啪啪综合| www国产亚洲精品久久麻豆| 九色综合狠狠综合久久| 日韩欧美在线不卡| 日本人妖一区二区| 91精品在线一区二区| 日韩国产欧美在线播放| 91精品国产综合久久小美女| 天天综合网 天天综合色| 7777精品伊人久久久大香线蕉完整版| 亚洲一区免费视频| 在线视频欧美区| 亚洲一级二级在线| 欧美性三三影院| 亚洲综合激情小说| 91成人国产精品| 亚洲高清在线精品| 欧美精品九九99久久| 免费人成在线不卡| 日韩女优制服丝袜电影| 国产主播一区二区三区| 国产欧美一区二区精品久导航 | 精品欧美乱码久久久久久| 韩国在线一区二区| 国产欧美一二三区| 色94色欧美sute亚洲线路一ni| 亚洲综合无码一区二区| 7777精品伊人久久久大香线蕉的| 秋霞国产午夜精品免费视频| 精品国产乱码久久久久久浪潮| 国产一区二区三区在线观看免费视频| 久久久天堂av| 91丨porny丨首页| 日韩av在线发布| 久久精品一区二区三区av| av在线播放一区二区三区| 亚洲国产精品一区二区www| 日韩丝袜美女视频| 国产91在线看| 亚洲综合免费观看高清完整版在线| 91精品国产一区二区三区蜜臀| 韩国三级在线一区| 亚洲精品乱码久久久久| 欧美电视剧免费全集观看| 成人久久视频在线观看| 亚洲成人综合网站|