亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? rfc3645.txt

?? 非常好的dns解析軟件
?? TXT
?? 第 1 頁 / 共 4 頁
字號:
Network Working Group                                            S. KwanRequest for Comments: 3645                                       P. GargUpdates: 2845                                                  J. GilroyCategory: Standards Track                                      L. Esibov                                                             J. Westhead                                                         Microsoft Corp.                                                                 R. Hall                                                     Lucent Technologies                                                            October 2003                 Generic Security Service Algorithm for        Secret Key Transaction Authentication for DNS (GSS-TSIG)Status of this Memo   This document specifies an Internet standards track protocol for the   Internet community, and requests discussion and suggestions for   improvements.  Please refer to the current edition of the "Internet   Official Protocol Standards" (STD 1) for the standardization state   and status of this protocol.  Distribution of this memo is unlimited.Copyright Notice   Copyright (C) The Internet Society (2003).  All Rights Reserved.Abstract   The Secret Key Transaction Authentication for DNS (TSIG) protocol   provides transaction level authentication for DNS.  TSIG is   extensible through the definition of new algorithms.  This document   specifies an algorithm based on the Generic Security Service   Application Program Interface (GSS-API) (RFC2743).  This document   updates RFC 2845.Kwan, et al.                Standards Track                     [Page 1]RFC 3645                        GSS-TSIG                    October 2003Table of Contents   1.  Introduction . . . . . . . . . . . . . . . . . . . . . . . . .  2   2.  Algorithm Overview . . . . . . . . . . . . . . . . . . . . . .  3       2.1.  GSS Details. . . . . . . . . . . . . . . . . . . . . . .  4       2.2.  Modifications to the TSIG protocol (RFC 2845). . . . . .  4   3.  Client Protocol Details. . . . . . . . . . . . . . . . . . . .  5       3.1.  Negotiating Context. . . . . . . . . . . . . . . . . . .  5           3.1.1.  Call GSS_Init_sec_context. . . . . . . . . . . . .  6           3.1.2.  Send TKEY Query to Server. . . . . . . . . . . . .  8           3.1.3.  Receive TKEY Query-Response from Server. . . . . .  8       3.2.  Context Established. . . . . . . . . . . . . . . . . . . 11           3.2.1.  Terminating a Context. . . . . . . . . . . . . . . 11   4.  Server Protocol Details. . . . . . . . . . . . . . . . . . . . 12       4.1.  Negotiating Context. . . . . . . . . . . . . . . . . . . 12           4.1.1.  Receive TKEY Query from Client . . . . . . . . . . 12           4.1.2.  Call GSS_Accept_sec_context. . . . . . . . . . . . 12           4.1.3.  Send TKEY Query-Response to Client . . . . . . . . 13       4.2.  Context Established. . . . . . . . . . . . . . . . . . . 15           4.2.1.  Terminating a Context. . . . . . . . . . . . . . . 15   5.  Sending and Verifying Signed Messages. . . . . . . . . . . . . 15       5.1.  Sending a Signed Message - Call GSS_GetMIC . . . . . . . 15       5.2.  Verifying a Signed Message - Call GSS_VerifyMIC. . . . . 16   6.  Example usage of GSS-TSIG algorithm. . . . . . . . . . . . . . 18   7.  Security Considerations. . . . . . . . . . . . . . . . . . . . 22   8.  IANA Considerations. . . . . . . . . . . . . . . . . . . . . . 22   9.  Conformance. . . . . . . . . . . . . . . . . . . . . . . . . . 22   10. Intellectual Property Statement. . . . . . . . . . . . . . . . 23   11. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . 23   12. References . . . . . . . . . . . . . . . . . . . . . . . . . . 24       12.1.  Normative References. . . . . . . . . . . . . . . . . . 24       12.2.  Informative References. . . . . . . . . . . . . . . . . 24   13. Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . 25   14. Full Copyright Statement . . . . . . . . . . . . . . . . . . . 261.  Introduction   The Secret Key Transaction Authentication for DNS (TSIG) [RFC2845]   protocol was developed to provide a lightweight authentication and   integrity of messages between two DNS entities, such as client and   server or server and server.  TSIG can be used to protect dynamic   update messages, authenticate regular message or to off-load   complicated DNSSEC [RFC2535] processing from a client to a server and   still allow the client to be assured of the integrity of the answers.Kwan, et al.                Standards Track                     [Page 2]RFC 3645                        GSS-TSIG                    October 2003   The TSIG protocol [RFC2845] is extensible through the definition of   new algorithms.  This document specifies an algorithm based on the   Generic Security Service Application Program Interface (GSS-API)   [RFC2743].  GSS-API is a framework that provides an abstraction of   security to the application protocol developer.  The security   services offered can include authentication, integrity, and   confidentiality.   The GSS-API framework has several benefits:   *  Mechanism and protocol independence.  The underlying mechanisms      that realize the security services can be negotiated on the fly      and varied over time.  For example, a client and server MAY use      Kerberos [RFC1964] for one transaction, whereas that same server      MAY use SPKM [RFC2025] with a different client.   *  The protocol developer is removed from the responsibility of      creating and managing a security infrastructure.  For example, the      developer does not need to create new key distribution or key      management systems.  Instead the developer relies on the security      service mechanism to manage this on its behalf.   The scope of this document is limited to the description of an   authentication mechanism only.  It does not discuss and/or propose an   authorization mechanism.  Readers that are unfamiliar with GSS-API   concepts are encouraged to read the characteristics and concepts   section of [RFC2743] before examining this protocol in detail.  It is   also assumed that the reader is familiar with [RFC2845], [RFC2930],   [RFC1034] and [RFC1035].   The key words "MUST", "MUST NOT", "REQUIRED", "SHOULD", "SHOULD NOT",   "RECOMMENDED", and "MAY" in this document are to be interpreted as   described in BCP 14, RFC 2119 [RFC2119].2.  Algorithm Overview   In GSS, client and server interact to create a "security context".   The security context can be used to create and verify transaction   signatures on messages between the two parties.  A unique security   context is required for each unique connection between client and   server.   Creating a security context involves a negotiation between client and   server.  Once a context has been established, it has a finite   lifetime for which it can be used to secure messages.  Thus there are   three states of a context associated with a connection:Kwan, et al.                Standards Track                     [Page 3]RFC 3645                        GSS-TSIG                    October 2003                              +----------+                              |          |                              V          |                      +---------------+  |                      | Uninitialized |  |                      |               |  |                      +---------------+  |                              |          |                              V          |                      +---------------+  |                      | Negotiating   |  |                      | Context       |  |                      +---------------+  |                              |          |                              V          |                      +---------------+  |                      | Context       |  |                      | Established   |  |                      +---------------+  |                              |          |                              +----------+   Every connection begins in the uninitialized state.2.1.  GSS Details   Client and server MUST be locally authenticated and have acquired   default credentials before using this protocol as specified in   Section 1.1.1 "Credentials" in RFC 2743 [RFC2743].   The GSS-TSIG algorithm consists of two stages:   I.  Establish security context.  The Client and Server use the       GSS_Init_sec_context and GSS_Accept_sec_context APIs to generate       the tokens that they pass to each other using [RFC2930] as a       transport mechanism.   II. Once the security context is established it is used to generate       and verify signatures using GSS_GetMIC and GSS_VerifyMIC APIs.       These signatures are exchanged by the Client and Server as a part       of the TSIG records exchanged in DNS messages sent between the       Client and Server, as described in [RFC2845].2.2.  Modifications to the TSIG protocol (RFC 2845)   Modification to RFC 2845 allows use of TSIG through signing server's   response in an explicitly specified place in multi message exchange   between two DNS entities even if client's request wasn't signed.Kwan, et al.                Standards Track                     [Page 4]RFC 3645                        GSS-TSIG                    October 2003   Specifically, Section 4.2 of RFC 2845 MUST be modified as follows:   Replace:      "The server MUST not generate a signed response to an unsigned      request."   With:      "The server MUST not generate a signed response to an unsigned      request, except in case of response to client's unsigned TKEY      query if secret key is established on server side after server      processed client's query.  Signing responses to unsigned TKEY      queries MUST be explicitly specified in the description of an      individual secret key establishment algorithm."3.  Client Protocol Details   A unique context is required for each server to which the client   sends secure messages.  A context is identified by a context handle.   A client maintains a mapping of servers to handles:      (target_name, key_name, context_handle)   The value key_name also identifies a context handle.  The key_name is   the owner name of the TKEY and TSIG records sent between a client and   a server to indicate to each other which context MUST be used to   process the current request.   DNS client and server MAY use various underlying security mechanisms   to establish security context as described in sections 3 and 4.  At   the same time, in order to guarantee interoperability between DNS   clients and servers that support GSS-TSIG it is REQUIRED that   security mechanism used by client enables use of Kerberos v5 (see   Section 9 for more information).3.1.  Negotiating Context   In GSS, establishing a security context involves the passing of   opaque tokens between the client and the server.  The client   generates the initial token and sends it to the server.  The server   processes the token and if necessary, returns a subsequent token to   the client.  The client processes this token, and so on, until the   negotiation is complete.  The number of times the client and server   exchange tokens depends on the underlying security mechanism.  A   completed negotiation results in a context handle.Kwan, et al.                Standards Track                     [Page 5]RFC 3645                        GSS-TSIG                    October 2003   The TKEY resource record [RFC2930] is used as the vehicle to transfer   tokens between client and server.  The TKEY record is a general   mechanism for establishing secret keys for use with TSIG.  For more   information, see [RFC2930].3.1.1.  Call GSS_Init_sec_context   To obtain the first token to be sent to a server, a client MUST call   GSS_Init_sec_context API.   The following input parameters MUST be used.  The outcome of the call   is indicated with the output values below.  Consult Sections 2.2.1,   "GSS_Init_sec_context call", of [RFC2743] for syntax definitions.   INPUTS     CREDENTIAL HANDLE claimant_cred_handle = NULL (NULL specifies "use         default").  Client MAY instead specify some other valid         handle to its credentials.     CONTEXT HANDLE input_context_handle  = 0     INTERNAL NAME  targ_name             = "DNS@<target_server_name>"     OBJECT IDENTIFIER mech_type          = Underlying security         mechanism chosen by implementers.  To guarantee         interoperability of the implementations of the GSS-TSIG         mechanism client MUST specify a valid underlying security         mechanism that enables use of Kerberos v5 (see Section 9 for         more information).     OCTET STRING   input_token           = NULL     BOOLEAN        replay_det_req_flag   = TRUE     BOOLEAN        mutual_req_flag       = TRUE     BOOLEAN        deleg_req_flag        = TRUE     BOOLEAN        sequence_req_flag     = TRUE     BOOLEAN        anon_req_flag         = FALSE     BOOLEAN        integ_req_flag        = TRUE     INTEGER        lifetime_req          = 0 (0 requests a default         value).  Client MAY instead specify another upper bound for the         lifetime of the context to be established in seconds.     OCTET STRING   chan_bindings         = Any valid channel bindings         as specified in Section 1.1.6 "Channel Bindings" in [RFC2743]   OUTPUTS     INTEGER        major_status     CONTEXT HANDLE output_context_handle     OCTET STRING   output_token     BOOLEAN        replay_det_state     BOOLEAN        mutual_state     INTEGER        minor_status     OBJECT IDENTIFIER mech_type     BOOLEAN        deleg_stateKwan, et al.                Standards Track                     [Page 6]RFC 3645                        GSS-TSIG                    October 2003     BOOLEAN        sequence_state     BOOLEAN        anon_state     BOOLEAN        trans_state     BOOLEAN        prot_ready_state     BOOLEAN        conf_avail     BOOLEAN        integ_avail     INTEGER        lifetime_rec   If returned major_status is set to one of the following errors:     GSS_S_DEFECTIVE_TOKEN     GSS_S_DEFECTIVE_CREDENTIAL     GSS_S_BAD_SIG (GSS_S_BAD_MIC)     GSS_S_NO_CRED     GSS_S_CREDENTIALS_EXPIRED     GSS_S_BAD_BINDINGS     GSS_S_OLD_TOKEN     GSS_S_DUPLICATE_TOKEN     GSS_S_NO_CONTEXT     GSS_S_BAD_NAMETYPE     GSS_S_BAD_NAME     GSS_S_BAD_MECH     GSS_S_FAILURE

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
国产精品色婷婷| 91精品国产麻豆| 国产精品一区久久久久| 日韩国产欧美在线视频| 亚洲风情在线资源站| 综合av第一页| 亚洲蜜臀av乱码久久精品蜜桃| 亚洲精品福利视频网站| 亚洲综合精品自拍| 午夜精品123| 麻豆91免费观看| 国产一区二区三区精品视频| 国产毛片精品一区| 国产精品69久久久久水密桃| 成av人片一区二区| 91视频在线看| 欧美私人免费视频| 91精品国产综合久久久久久| 欧美mv和日韩mv国产网站| 久久夜色精品一区| 国产精品成人在线观看| 亚洲精品日韩综合观看成人91| 天天色图综合网| 蜜桃一区二区三区四区| 高清不卡一二三区| 色菇凉天天综合网| 欧美一区二区三区白人| 国产无遮挡一区二区三区毛片日本 | 中文字幕亚洲成人| 亚洲影视在线播放| 狠狠色丁香婷婷综合久久片| 成人h动漫精品一区二| 欧美日韩一区在线| 久久久久国产精品厨房| 亚洲女同一区二区| 九九在线精品视频| 91丨porny丨户外露出| 在线不卡a资源高清| 日本一区二区免费在线| 午夜一区二区三区视频| 国产成人亚洲综合a∨猫咪| 欧美专区亚洲专区| 久久久国产一区二区三区四区小说| 亚洲精品视频一区| 国产激情91久久精品导航 | 日韩三级伦理片妻子的秘密按摩| 中文字幕+乱码+中文字幕一区| 亚洲成人动漫在线观看| av一区二区三区黑人| 91精品国产综合久久福利| 亚洲欧美在线aaa| 加勒比av一区二区| 精品视频一区二区不卡| 亚洲欧美一区二区视频| 极品少妇xxxx精品少妇| 欧美在线免费观看视频| 国产精品美女久久久久av爽李琼 | 成人性生交大片| 日韩一区二区不卡| 亚洲一二三区不卡| 91视视频在线直接观看在线看网页在线看| 欧美成人一级视频| 午夜精品免费在线| 91行情网站电视在线观看高清版| 中文一区二区在线观看| 国产综合一区二区| 日韩女同互慰一区二区| 国产三级一区二区| 国产**成人网毛片九色 | 理论电影国产精品| 91.com在线观看| 亚洲成av人片www| 成人免费毛片高清视频| 国产欧美精品区一区二区三区 | 91视频国产观看| 国产亚洲精品福利| 丰满少妇久久久久久久| 国产亚洲人成网站| 国产精品一二三四五| 国产婷婷色一区二区三区四区| 激情综合色播激情啊| 久久婷婷成人综合色| 国产成人午夜电影网| 欧美激情一区二区| 成人av电影免费在线播放| 一色屋精品亚洲香蕉网站| 99久久免费精品| 日韩久久久久久| 日韩—二三区免费观看av| 91精品国产色综合久久| 亚洲国产综合在线| 欧美福利一区二区| 狠狠久久亚洲欧美| 欧美一级日韩一级| 国产高清无密码一区二区三区| 精品成人a区在线观看| 亚洲欧美视频一区| 欧美人与性动xxxx| 免费观看日韩电影| 久久久亚洲国产美女国产盗摄 | 国产精品欧美一级免费| 91免费精品国自产拍在线不卡| 一区二区三区中文字幕电影| 欧美日韩小视频| 久久成人精品无人区| 中文字幕乱码久久午夜不卡| 91视频在线看| 偷拍亚洲欧洲综合| 69久久夜色精品国产69蝌蚪网| 丝袜美腿成人在线| 日韩欧美成人一区二区| 国产精品99久久久久久久女警| 亚洲三级电影全部在线观看高清| 欧美日韩在线播| 激情综合色综合久久综合| 久久久91精品国产一区二区精品 | 欧美日本一区二区| 成人午夜激情片| 日韩成人精品在线| 国产精品视频线看| 欧美精品 国产精品| 成人免费高清在线| 日本视频一区二区三区| 中文字幕不卡在线播放| 日韩视频一区二区三区在线播放 | 一区二区在线观看免费| 精品福利二区三区| 欧美在线999| 成人福利在线看| 国产一区二区三区四区五区美女| 一区二区不卡在线视频 午夜欧美不卡在| 欧美一区二区三区色| av电影天堂一区二区在线观看| 蜜桃视频免费观看一区| 亚洲视频网在线直播| 欧美va亚洲va香蕉在线| 欧美性三三影院| av资源站一区| 国产福利不卡视频| 国内外精品视频| 视频一区欧美精品| 夜夜爽夜夜爽精品视频| 17c精品麻豆一区二区免费| 久久香蕉国产线看观看99| 欧美一级在线观看| 91精品在线免费观看| 在线观看av不卡| 91视频xxxx| 成人av在线一区二区| 国产精品18久久久久久vr| 麻豆国产精品视频| 天天色天天操综合| 亚洲第四色夜色| 亚洲综合在线视频| 综合久久久久久久| 综合网在线视频| 亚洲日本电影在线| 国产精品久久久久久久午夜片| 国产精品私房写真福利视频| 久久影院午夜论| 亚洲精品一区二区三区99| 精品电影一区二区| 久久久不卡影院| 国产欧美日韩在线看| 中文字幕电影一区| 中文字幕在线观看不卡视频| 亚洲欧美中日韩| 亚洲另类一区二区| 亚洲大片精品永久免费| 五月婷婷激情综合网| 日本一区中文字幕| 国产最新精品免费| 成人国产精品免费| 色播五月激情综合网| 91年精品国产| 欧美视频精品在线观看| 欧美一区二区高清| 日韩精品中文字幕一区二区三区| 精品日韩99亚洲| 欧美韩日一区二区三区| 亚洲三级电影网站| 青草国产精品久久久久久| 久久99精品网久久| 成人av电影免费观看| 欧美三级中文字幕| 精品国产凹凸成av人导航| 国产精品理论片在线观看| 五月天丁香久久| 韩国女主播一区| 日本韩国一区二区三区视频| 777午夜精品免费视频| 国产亚洲精久久久久久| 一区二区欧美国产| 韩国欧美国产1区| 91老师国产黑色丝袜在线| 日韩欧美国产高清| 亚洲免费伊人电影| 激情欧美一区二区三区在线观看| 成人免费视频国产在线观看| 欧美日韩欧美一区二区|