亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關(guān)于我們
? 蟲蟲下載站

?? rfc4034.txt

?? 非常好的dns解析軟件
?? TXT
?? 第 1 頁 / 共 5 頁
字號:
Network Working Group                                          R. ArendsRequest for Comments: 4034                          Telematica InstituutObsoletes: 2535, 3008, 3090, 3445, 3655, 3658,                R. Austein           3755, 3757, 3845                                          ISCUpdates: 1034, 1035, 2136, 2181, 2308, 3225,                   M. Larson         3007, 3597, 3226                                       VeriSignCategory: Standards Track                                      D. Massey                                               Colorado State University                                                                 S. Rose                                                                    NIST                                                              March 2005            Resource Records for the DNS Security ExtensionsStatus of This Memo   This document specifies an Internet standards track protocol for the   Internet community, and requests discussion and suggestions for   improvements.  Please refer to the current edition of the "Internet   Official Protocol Standards" (STD 1) for the standardization state   and status of this protocol.  Distribution of this memo is unlimited.Copyright Notice   Copyright (C) The Internet Society (2005).Abstract   This document is part of a family of documents that describe the DNS   Security Extensions (DNSSEC).  The DNS Security Extensions are a   collection of resource records and protocol modifications that   provide source authentication for the DNS.  This document defines the   public key (DNSKEY), delegation signer (DS), resource record digital   signature (RRSIG), and authenticated denial of existence (NSEC)   resource records.  The purpose and format of each resource record is   described in detail, and an example of each resource record is given.   This document obsoletes RFC 2535 and incorporates changes from all   updates to RFC 2535.Arends, et al.              Standards Track                     [Page 1]RFC 4034                DNSSEC Resource Records               March 2005Table of Contents   1.  Introduction . . . . . . . . . . . . . . . . . . . . . . . .  3       1.1.  Background and Related Documents . . . . . . . . . . .  3       1.2.  Reserved Words . . . . . . . . . . . . . . . . . . . .  3   2.  The DNSKEY Resource Record . . . . . . . . . . . . . . . . .  4       2.1.  DNSKEY RDATA Wire Format . . . . . . . . . . . . . . .  4             2.1.1.  The Flags Field. . . . . . . . . . . . . . . .  4             2.1.2.  The Protocol Field . . . . . . . . . . . . . .  5             2.1.3.  The Algorithm Field. . . . . . . . . . . . . .  5             2.1.4.  The Public Key Field . . . . . . . . . . . . .  5             2.1.5.  Notes on DNSKEY RDATA Design . . . . . . . . .  5       2.2.  The DNSKEY RR Presentation Format. . . . . . . . . . .  5       2.3.  DNSKEY RR Example  . . . . . . . . . . . . . . . . . .  6   3.  The RRSIG Resource Record  . . . . . . . . . . . . . . . . .  6       3.1.  RRSIG RDATA Wire Format. . . . . . . . . . . . . . . .  7             3.1.1.  The Type Covered Field . . . . . . . . . . . .  7             3.1.2.  The Algorithm Number Field . . . . . . . . . .  8             3.1.3.  The Labels Field . . . . . . . . . . . . . . .  8             3.1.4.  Original TTL Field . . . . . . . . . . . . . .  8             3.1.5.  Signature Expiration and Inception Fields. . .  9             3.1.6.  The Key Tag Field. . . . . . . . . . . . . . .  9             3.1.7.  The Signer's Name Field. . . . . . . . . . . .  9             3.1.8.  The Signature Field. . . . . . . . . . . . . .  9       3.2.  The RRSIG RR Presentation Format . . . . . . . . . . . 10       3.3.  RRSIG RR Example . . . . . . . . . . . . . . . . . . . 11   4.  The NSEC Resource Record . . . . . . . . . . . . . . . . . . 12       4.1.  NSEC RDATA Wire Format . . . . . . . . . . . . . . . . 13             4.1.1.  The Next Domain Name Field . . . . . . . . . . 13             4.1.2.  The Type Bit Maps Field. . . . . . . . . . . . 13             4.1.3.  Inclusion of Wildcard Names in NSEC RDATA. . . 14       4.2.  The NSEC RR Presentation Format. . . . . . . . . . . . 14       4.3.  NSEC RR Example. . . . . . . . . . . . . . . . . . . . 15   5.  The DS Resource Record . . . . . . . . . . . . . . . . . . . 15       5.1.  DS RDATA Wire Format . . . . . . . . . . . . . . . . . 16             5.1.1.  The Key Tag Field. . . . . . . . . . . . . . . 16             5.1.2.  The Algorithm Field. . . . . . . . . . . . . . 16             5.1.3.  The Digest Type Field. . . . . . . . . . . . . 17             5.1.4.  The Digest Field . . . . . . . . . . . . . . . 17       5.2.  Processing of DS RRs When Validating Responses . . . . 17       5.3.  The DS RR Presentation Format. . . . . . . . . . . . . 17       5.4.  DS RR Example. . . . . . . . . . . . . . . . . . . . . 18   6.  Canonical Form and Order of Resource Records . . . . . . . . 18       6.1.  Canonical DNS Name Order . . . . . . . . . . . . . . . 18       6.2.  Canonical RR Form. . . . . . . . . . . . . . . . . . . 19       6.3.  Canonical RR Ordering within an RRset. . . . . . . . . 20   7.  IANA Considerations. . . . . . . . . . . . . . . . . . . . . 20   8.  Security Considerations. . . . . . . . . . . . . . . . . . . 21Arends, et al.              Standards Track                     [Page 2]RFC 4034                DNSSEC Resource Records               March 2005   9.  Acknowledgements . . . . . . . . . . . . . . . . . . . . . . 22   10. References . . . . . . . . . . . . . . . . . . . . . . . . . 22       10.1. Normative References . . . . . . . . . . . . . . . . . 22       10.2. Informative References . . . . . . . . . . . . . . . . 23   A.  DNSSEC Algorithm and Digest Types. . . . . . . . . . . . . . 24       A.1.  DNSSEC Algorithm Types . . . . . . . . . . . . . . . . 24             A.1.1.  Private Algorithm Types. . . . . . . . . . . . 25       A.2.  DNSSEC Digest Types. . . . . . . . . . . . . . . . . . 25   B.  Key Tag Calculation. . . . . . . . . . . . . . . . . . . . . 25       B.1.  Key Tag for Algorithm 1 (RSA/MD5). . . . . . . . . . . 27   Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 28   Full Copyright Statement . . . . . . . . . . . . . . . . . . . . 291.  Introduction   The DNS Security Extensions (DNSSEC) introduce four new DNS resource   record types: DNS Public Key (DNSKEY), Resource Record Signature   (RRSIG), Next Secure (NSEC), and Delegation Signer (DS).  This   document defines the purpose of each resource record (RR), the RR's   RDATA format, and its presentation format (ASCII representation).1.1.  Background and Related Documents   This document is part of a family of documents defining DNSSEC, which   should be read together as a set.   [RFC4033] contains an introduction to DNSSEC and definition of common   terms; the reader is assumed to be familiar with this document.   [RFC4033] also contains a list of other documents updated by and   obsoleted by this document set.   [RFC4035] defines the DNSSEC protocol operations.   The reader is also assumed to be familiar with the basic DNS concepts   described in [RFC1034], [RFC1035], and the subsequent documents that   update them, particularly [RFC2181] and [RFC2308].   This document defines the DNSSEC resource records.  All numeric DNS   type codes given in this document are decimal integers.1.2.  Reserved Words   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this   document are to be interpreted as described in [RFC2119].Arends, et al.              Standards Track                     [Page 3]RFC 4034                DNSSEC Resource Records               March 20052.  The DNSKEY Resource Record   DNSSEC uses public key cryptography to sign and authenticate DNS   resource record sets (RRsets).  The public keys are stored in DNSKEY   resource records and are used in the DNSSEC authentication process   described in [RFC4035]: A zone signs its authoritative RRsets by   using a private key and stores the corresponding public key in a   DNSKEY RR.  A resolver can then use the public key to validate   signatures covering the RRsets in the zone, and thus to authenticate   them.   The DNSKEY RR is not intended as a record for storing arbitrary   public keys and MUST NOT be used to store certificates or public keys   that do not directly relate to the DNS infrastructure.   The Type value for the DNSKEY RR type is 48.   The DNSKEY RR is class independent.   The DNSKEY RR has no special TTL requirements.2.1.  DNSKEY RDATA Wire Format   The RDATA for a DNSKEY RR consists of a 2 octet Flags Field, a 1   octet Protocol Field, a 1 octet Algorithm Field, and the Public Key   Field.                        1 1 1 1 1 1 1 1 1 1 2 2 2 2 2 2 2 2 2 2 3 3    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+   |              Flags            |    Protocol   |   Algorithm   |   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+   /                                                               /   /                            Public Key                         /   /                                                               /   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+2.1.1.  The Flags Field   Bit 7 of the Flags field is the Zone Key flag.  If bit 7 has value 1,   then the DNSKEY record holds a DNS zone key, and the DNSKEY RR's   owner name MUST be the name of a zone.  If bit 7 has value 0, then   the DNSKEY record holds some other type of DNS public key and MUST   NOT be used to verify RRSIGs that cover RRsets.   Bit 15 of the Flags field is the Secure Entry Point flag, described   in [RFC3757].  If bit 15 has value 1, then the DNSKEY record holds a   key intended for use as a secure entry point.  This flag is onlyArends, et al.              Standards Track                     [Page 4]RFC 4034                DNSSEC Resource Records               March 2005   intended to be a hint to zone signing or debugging software as to the   intended use of this DNSKEY record; validators MUST NOT alter their   behavior during the signature validation process in any way based on   the setting of this bit.  This also means that a DNSKEY RR with the   SEP bit set would also need the Zone Key flag set in order to be able   to generate signatures legally.  A DNSKEY RR with the SEP set and the   Zone Key flag not set MUST NOT be used to verify RRSIGs that cover   RRsets.   Bits 0-6 and 8-14 are reserved: these bits MUST have value 0 upon   creation of the DNSKEY RR and MUST be ignored upon receipt.2.1.2.  The Protocol Field   The Protocol Field MUST have value 3, and the DNSKEY RR MUST be   treated as invalid during signature verification if it is found to be   some value other than 3.2.1.3.  The Algorithm Field   The Algorithm field identifies the public key's cryptographic   algorithm and determines the format of the Public Key field.  A list   of DNSSEC algorithm types can be found in Appendix A.12.1.4.  The Public Key Field   The Public Key Field holds the public key material.  The format   depends on the algorithm of the key being stored and is described in   separate documents.2.1.5.  Notes on DNSKEY RDATA Design   Although the Protocol Field always has value 3, it is retained for   backward compatibility with early versions of the KEY record.2.2.  The DNSKEY RR Presentation Format   The presentation format of the RDATA portion is as follows:   The Flag field MUST be represented as an unsigned decimal integer.   Given the currently defined flags, the possible values are: 0, 256,   and 257.   The Protocol Field MUST be represented as an unsigned decimal integer   with a value of 3.   The Algorithm field MUST be represented either as an unsigned decimal   integer or as an algorithm mnemonic as specified in Appendix A.1.Arends, et al.              Standards Track                     [Page 5]RFC 4034                DNSSEC Resource Records               March 2005   The Public Key field MUST be represented as a Base64 encoding of the   Public Key.  Whitespace is allowed within the Base64 text.  For a   definition of Base64 encoding, see [RFC3548].2.3.  DNSKEY RR Example   The following DNSKEY RR stores a DNS zone key for example.com.   example.com. 86400 IN DNSKEY 256 3 5 ( AQPSKmynfzW4kyBv015MUG2DeIQ3                                          Cbl+BBZH4b/0PY1kxkmvHjcZc8no                                          kfzj31GajIQKY+5CptLr3buXA10h                                          WqTkF7H6RfoRqXQeogmMHfpftf6z                                          Mv1LyBUgia7za6ZEzOJBOztyvhjL                                          742iU/TpPSEDhm2SNKLijfUppn1U                                          aNvv4w==  )   The first four text fields specify the owner name, TTL, Class, and RR   type (DNSKEY).  Value 256 indicates that the Zone Key bit (bit 7) in   the Flags field has value 1.  Value 3 is the fixed Protocol value.   Value 5 indicates the public key algorithm.  Appendix A.1 identifies   algorithm type 5 as RSA/SHA1 and indicates that the format of the   RSA/SHA1 public key field is defined in [RFC3110].  The remaining   text is a Base64 encoding of the public key.3.  The RRSIG Resource Record   DNSSEC uses public key cryptography to sign and authenticate DNS   resource record sets (RRsets).  Digital signatures are stored in   RRSIG resource records and are used in the DNSSEC authentication   process described in [RFC4035].  A validator can use these RRSIG RRs   to authenticate RRsets from the zone.  The RRSIG RR MUST only be used   to carry verification material (digital signatures) used to secure   DNS operations.   An RRSIG record contains the signature for an RRset with a particular   name, class, and type.  The RRSIG RR specifies a validity interval   for the signature and uses the Algorithm, the Signer's Name, and the   Key Tag to identify the DNSKEY RR containing the public key that a   validator can use to verify the signature.

?? 快捷鍵說明

復(fù)制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
日韩激情中文字幕| 久久精品人人做人人综合| 老司机一区二区| 国产精品视频九色porn| 在线观看视频91| 国产成人精品三级| 无吗不卡中文字幕| 亚洲天堂成人在线观看| 欧美性一二三区| 成人午夜短视频| 老色鬼精品视频在线观看播放| 亚洲另类在线视频| 中日韩av电影| 国产日本亚洲高清| 日韩欧美亚洲国产精品字幕久久久| 色国产综合视频| 成人蜜臀av电影| 国产成人av电影在线| 国产福利精品一区二区| 国产精品国产三级国产aⅴ原创 | 亚洲综合成人网| 首页国产欧美久久| 亚洲最新视频在线播放| 亚洲午夜一二三区视频| 美女诱惑一区二区| 麻豆久久久久久| 99久久久久久| 国内久久精品视频| 韩国午夜理伦三级不卡影院| 开心九九激情九九欧美日韩精美视频电影| 亚洲三级小视频| 亚洲成人资源在线| 九九九精品视频| 成人国产亚洲欧美成人综合网| 国产成人精品三级麻豆| 色综合久久久久久久久| 精品在线你懂的| 日韩精品1区2区3区| 麻豆精品视频在线观看| 狠狠色综合播放一区二区| 国产美女视频91| 一道本成人在线| 日韩一卡二卡三卡国产欧美| 欧美成人高清电影在线| 亚洲国产精品成人综合色在线婷婷| 国产精品美女久久久久久久久久久| 亚洲视频你懂的| 久久99精品网久久| 色噜噜狠狠成人网p站| 欧美一区二区三区小说| 国产欧美日韩综合| 亚洲精品日韩综合观看成人91| 国产精品视频在线看| 另类调教123区| 国产精品18久久久久久久久久久久 | 久久精品人人做人人爽97| 亚洲一区二区四区蜜桃| 国产成人免费视| 欧美一区二区三区影视| 亚洲综合久久av| 成人自拍视频在线| 欧美tk—视频vk| 婷婷丁香久久五月婷婷| 91啪在线观看| 国产女同互慰高潮91漫画| 六月丁香婷婷色狠狠久久| 欧美三级三级三级| 一区二区在线观看免费| av电影天堂一区二区在线 | 午夜a成v人精品| 91精品福利在线| 亚洲精品中文字幕在线观看| 成人av网站在线| 国产精品久久精品日日| 国产一区二区免费看| 精品久久国产老人久久综合| 日韩电影在线看| 欧美精品一区二区三区蜜臀| 日产国产高清一区二区三区| 欧美丰满一区二区免费视频| 亚洲综合色噜噜狠狠| 欧美精品一二三四| 视频一区中文字幕国产| 欧美日韩精品久久久| 日本免费在线视频不卡一不卡二| 欧美剧情片在线观看| 六月丁香婷婷色狠狠久久| 久久久久久久久99精品| 丰满少妇久久久久久久| 久久久精品中文字幕麻豆发布| 国产一区二区网址| 亚洲精品日日夜夜| 精品福利一区二区三区| 国产一区二区0| 国产精品拍天天在线| 欧美午夜精品久久久久久超碰| 日韩在线观看一区二区| 久久精品人人爽人人爽| 色视频成人在线观看免| 麻豆精品新av中文字幕| 亚洲欧洲精品一区二区精品久久久 | 婷婷一区二区三区| 久久久久久一二三区| 欧美午夜精品久久久久久孕妇| 麻豆国产欧美一区二区三区| 亚洲蜜臀av乱码久久精品| 日韩欧美在线1卡| 欧美精品乱码久久久久久按摩 | 国产福利91精品| 日本不卡一二三区黄网| 亚洲欧美一区二区久久| 久久久一区二区三区捆绑**| jlzzjlzz欧美大全| 亚洲五月六月丁香激情| 久久综合色综合88| 欧美日韩一级大片网址| 91在线丨porny丨国产| 国产一区二区三区在线看麻豆| 一级女性全黄久久生活片免费| 久久久久国产一区二区三区四区| 欧美日韩电影在线播放| 99久久伊人精品| 北岛玲一区二区三区四区 | 日韩影院在线观看| 亚洲国产va精品久久久不卡综合| 亚洲视频在线观看三级| 国产精品久线观看视频| 国产精品视频在线看| 国产精品美女久久久久久2018| 国产视频911| 亚洲国产成人自拍| 亚洲精选一二三| 樱花草国产18久久久久| 夜夜嗨av一区二区三区四季av | 在线观看免费一区| 欧美三级一区二区| 91精品国产高清一区二区三区蜜臀| 欧美日韩视频一区二区| 日韩欧美一级片| 国产精品色呦呦| 尤物视频一区二区| 免费在线一区观看| 成人综合婷婷国产精品久久蜜臀| 日韩欧美在线一区二区三区| av中文字幕在线不卡| 国产精品一卡二卡| 91久久久免费一区二区| 欧美一区二区私人影院日本| 久久一区二区三区国产精品| 亚洲欧洲成人av每日更新| 婷婷亚洲久悠悠色悠在线播放 | 人人超碰91尤物精品国产| 国产综合色在线视频区| 在线视频观看一区| 久久九九久久九九| 午夜一区二区三区视频| 国产ts人妖一区二区| 欧美另类久久久品| 国产精品天美传媒| 国产在线不卡视频| 欧美亚洲综合色| 国产丝袜在线精品| 精品一区二区三区视频| 色婷婷av一区二区三区软件| 91亚洲精华国产精华精华液| 欧美亚洲另类激情小说| 国产情人综合久久777777| 日韩avvvv在线播放| 欧美在线不卡一区| 亚洲三级免费电影| 91网站在线播放| 亚洲欧洲三级电影| www.一区二区| 国产日韩欧美不卡在线| 黄页视频在线91| 久久久久久久久久久黄色| 日本成人在线一区| 日韩一区二区在线看| 日韩电影在线免费观看| 日韩欧美中文字幕精品| 麻豆国产精品官网| 久久久久久久综合狠狠综合| 看电视剧不卡顿的网站| 中文字幕一区二区三区在线观看| 国产毛片精品视频| 亚洲欧美一区二区三区久本道91| 成人av免费在线| 国产丝袜美腿一区二区三区| 日韩国产欧美在线视频| 风间由美性色一区二区三区| 91香蕉视频mp4| 亚洲欧美电影一区二区| 欧美日韩在线直播| 久久精品国产亚洲5555| 久久久一区二区三区| a亚洲天堂av| 日韩电影在线观看电影| 日韩你懂的电影在线观看| 久久精品一区四区| 国产精品一区二区在线观看不卡 |