亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? draft-ietf-dnsext-gss-tsig-06.txt

?? bind-3.2.
?? TXT
?? 第 1 頁 / 共 4 頁
字號:
INTERNET-DRAFT                                               Stuart Kwan<draft-ietf-dnsext-gss-tsig-06.txt>                         Praerit GargFebruary 28, 2003                                           James GilroyExpires August 28, 2003                                     Levon Esibov                                                           Jeff Westhead                                                         Microsoft Corp.                                                              Randy Hall                                                     Lucent Technologies                                                                     GSS Algorithm for TSIG (GSS-TSIG)Status of this MemoThis document is an Internet-Draft and is in full conformancewith all provisions of Section 10 of RFC2026.Internet-Drafts are working documents of the Internet EngineeringTask Force (IETF), its areas, and its working groups.  Note thatother groups may also distribute working documents asInternet-Drafts.Internet-Drafts are draft documents valid for a maximum of sixmonths and may be updated, replaced, or obsoleted by otherdocuments at any time.  It is inappropriate to use Internet-Drafts as reference material or to cite them other than as"work in progress."The list of current Internet-Drafts can be accessed athttp://www.ietf.org/ietf/1id-abstracts.txtThe list of Internet-Draft Shadow Directories can be accessed athttp://www.ietf.org/shadow.html.AbstractThe TSIG protocol provides transaction level authentication for DNS.TSIG is extensible through the definition of new algorithms.  Thisdocument specifies an algorithm based on the Generic Security ServiceApplication Program Interface (GSS-API) (RFC2743). This document updatesRFC 2845.Expires August 28, 2003                                       [Page 1]INTERNET-DRAFT                   GSS-TSIG            February 28, 2003Table of Contents1: Introduction......................................................22: Algorithm Overview................................................3  2.1: GSS Details...................................................4  2.2: Modifications to the TSIG protocol (RFC 2845).................43: Client Protocol Details...........................................4  3.1: Negotiating Context...........................................5    3.1.1: Call GSS_Init_sec_context.................................5    3.1.2: Send TKEY Query to Server.................................7    3.1.3: Receive TKEY Query-Response from Server...................7  3.2: Context Established..........................................10    3.2.1: Terminating a Context....................................104: Server Protocol Details..........................................10  4.1: Negotiating Context..........................................10    4.1.1: Receive TKEY Query from Client...........................11    4.1.2: Call GSS_Accept_sec_context..............................11    4.1.3: Send TKEY Query-Response to Client.......................12  4.2: Context Established..........................................13    4.2.1: Terminating a Context....................................135: Sending and Verifying Signed Messages............................14  5.1: Sending a Signed Message - Call GSS_GetMIC...................14  5.2: Verifying a Signed Message - Call GSS_VerifyMIC..............156: Example usage of GSS-TSIG algorithm..............................167: Security Considerations..........................................208: IANA Considerations..............................................209: Conformance......................................................2010:Acknowledgements.................................................2011:References.......................................................201. IntroductionThe Secret Key Transaction Authentication for DNS (TSIG) [RFC2845]protocol was developed to provide a lightweight authentication andintegrity of messages between two DNS entities, such as client andserver or server and server. TSIG can be used to protect dynamicupdate messages, authenticate regular message or to off-loadcomplicated DNSSEC [RFC2535] processing from a client to a server andstill allow the client to be assured of the integrity of the answers.The TSIG protocol [RFC2845] is extensible through the definition of newalgorithms.  This document specifies an algorithm based on the GenericSecurity Service Application Program Interface (GSS-API) [RFC2743].GSS-API is a framework that provides an abstraction of security to theapplication protocol developer.  The security services offered caninclude authentication, integrity, and confidentiality.The GSS-API framework has several benefits:* Mechanism and protocol independence.  The underlying mechanisms thatrealize the security services can be negotiated on the fly and variedover time.  For example, a client and server MAY use Kerberos [RFC1964]for one transaction, whereas that same server MAY use SPKM [RFC2025]with a different client.Expires August 28, 2003                                       [Page 2]INTERNET-DRAFT                   GSS-TSIG            February 28, 2003* The protocol developer is removed from the responsibility ofcreating and managing a security infrastructure.  For example, thedeveloper does not need to create new key distribution or keymanagement systems.  Instead the developer relies on the securityservice mechanism to manage this on its behalf.The scope of this document is limited to the description of anauthentication mechanism only. It does not discuss and/or propose anauthorization mechanism.  Readers that are unfamiliar with GSS-APIconcepts are encouraged to read the characteristics and concepts sectionof [RFC2743] before examining this protocol in detail. It is alsoassumed that the reader is familiar with [RFC2845], [RFC2930], [RFC1034]and [RFC1035].The key words "MUST", "MUST NOT", "REQUIRED", "SHOULD", "SHOULD NOT","RECOMMENDED", and "MAY" in this document are to be interpreted asdescribed in RFC 2119 [RFC2119].2. Algorithm OverviewIn GSS, client and server interact to create a "security context".The security context can be used to create and verify transactionsignatures on messages between the two parties.  A unique securitycontext is required for each unique connection between client andserver.Creating a security context involves a negotiation between client andserver.  Once a context has been established, it has a finite lifetimefor which it can be used to secure messages.  Thus there are threestates of a context associated with a connection:                           +----------+                           |          |                           V          |                   +---------------+  |                   | Uninitialized |  |                   |               |  |                   +---------------+  |                           |          |                           V          |                   +---------------+  |                   | Negotiating   |  |                   | Context       |  |                   +---------------+  |                           |          |                           V          |                   +---------------+  |                   | Context       |  |                   | Established   |  |                   +---------------+  |                           |          |                           +----------+Expires August 28, 2003                                       [Page 3]INTERNET-DRAFT                   GSS-TSIG            February 28, 2003Every connection begins in the uninitialized state.2.1 GSS DetailsClient and server MUST be locally authenticated and have acquireddefault credentials before using this protocol as specified inSection 1.1.1 "Credentials" in RFC 2743 [RFC2743].The GSS-TSIG algorithm consists of two stages:I. Establish security context. The Client and Server use theGSS_Init_sec_context and GSS_Accept_sec_context APIs to generate thetokens that they pass to each other using [RFC2930] as a transportmechanism.II. Once the security context is established it is used to generate andverify signatures using GSS_GetMIC and GSS_VerifyMIC APIs. Thesesignatures are exchanged by the Client and Server as a part of the TSIGrecords exchanged in DNS messages sent between the Client and Server,as described in [RFC2845].2.2 Modifications to the TSIG protocol (RFC 2845)Modification to RFC 2845 allows use of TSIG through signing server'sresponse in an explicitly specified place in multi message exchangebetween two DNS entities even if client's request wasn't signed.Specifically Section 4.2 of RFC 2845 MUST be modified as follows.Replace:"The server MUST not generate a signed response to an unsignedrequest."With:"The server MUST not generate a signed response to an unsigned request, except in case of response to client's unsigned TKEY query if secret key is established on server side after server processed client's query. Signing responses to unsigned TKEY queries MUST be explicitly specified in the description of an individual secret key establishment algorithm."3.  Client Protocol DetailsA unique context is required for each server to which the client sendssecure messages.  A context is identified by a context handle. Aclient maintains a mapping of servers to handles,     (target_name, key_name, context_handle)Expires August 28, 2003                                       [Page 4]INTERNET-DRAFT                   GSS-TSIG            February 28, 2003The value key_name also identifies a context handle. The key_name isthe owner name of the TKEY and TSIG records sent between a client and aserver to indicate to each other which context MUST be used to processthe current request.DNS client and server MAY use various underlying security mechanisms toestablish security context as described in sections 3 and 4. At thesame time, in order to guarantee interoperability between DNS clientsand servers that support GSS-TSIG it is REQUIRED that securitymechanism used by client enables use of Kerberos v5 (see Section 9for more information).3.1  Negotiating ContextIn GSS, establishing a security context involves the passing of opaquetokens between the client and the server.  The client generates theinitial token and sends it to the server.  The server processes thetoken and if necessary, returns a subsequent token to the client.  Theclient processes this token, and so on, until the negotiation iscomplete.  The number of times the client and server exchange tokensdepends on the underlying security mechanism.  A completed negotiationresults in a context handle.The TKEY resource record [RFC2930] is used as the vehicle to transfertokens between client and server.  The TKEY record is a generalmechanism for establishing secret keys for use with TSIG.  For moreinformation, see [RFC2930].3.1.1 Call GSS_Init_sec_contextTo obtain the first token to be sent to a server, a client MUST callGSS_Init_sec_context API.The following input parameters MUST be used. The outcome of the call isindicated with the output values below.  Consult Sections 2.2.1"GSS_Init_sec_context call" of [RFC2743] for syntax definitions.   INPUTS     CREDENTIAL HANDLE claimant_cred_handle = NULL (NULL specifies "use         default"). Client MAY instead specify some other valid handle         to its credentials.     CONTEXT HANDLE input_context_handle  = 0     INTERNAL NAME  targ_name             = "DNS@<target_server_name>"     OBJECT IDENTIFIER mech_type          = Underlying security         mechanism chosen by implementers. To guarantee         interoperability of the implementations of the GSS-TSIG         mechanism client MUST specify a valid underlying security         mechanism that enables use of Kerberos v5 (see Section 9 for         more information).     OCTET STRING   input_token           = NULL     BOOLEAN        replay_det_req_flag   = TRUEExpires August 28, 2003                                       [Page 5]INTERNET-DRAFT                   GSS-TSIG            February 28, 2003     BOOLEAN        mutual_req_flag       = TRUE     BOOLEAN        deleg_req_flag        = TRUE     BOOLEAN        sequence_req_flag     = TRUE     BOOLEAN        anon_req_flag         = FALSE     BOOLEAN        integ_req_flag        = TRUE     INTEGER        lifetime_req          = 0 (0 requests a default         value). Client MAY instead specify another upper bound for the         lifetime of the context to be established in seconds.     OCTET STRING   chan_bindings         = Any valid channel bindings         as specified in Section 1.1.6 "Channel Bindings" in [RFC2743]   OUTPUTS     INTEGER        major_status     CONTEXT HANDLE output_context_handle     OCTET STRING   output_token     BOOLEAN        replay_det_state

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
婷婷夜色潮精品综合在线| 亚洲欧美在线aaa| 欧美精品日韩精品| 欧美三区在线视频| 91首页免费视频| 欧美性受极品xxxx喷水| 欧美丝袜第三区| 欧美一区在线视频| 日韩免费电影一区| 国产网站一区二区三区| 国产精品青草久久| 亚洲激情在线激情| 日韩—二三区免费观看av| 日韩高清在线电影| 国产精品一级片| 91在线视频播放地址| 欧美日本一道本| 久久综合给合久久狠狠狠97色69| 久久综合久久综合久久| 久久超碰97人人做人人爱| 国内偷窥港台综合视频在线播放| 成人听书哪个软件好| 色综合欧美在线| 91超碰这里只有精品国产| 精品国产一区二区三区久久久蜜月 | 亚洲欧美日韩电影| 午夜激情一区二区| 国产成人在线看| 91啪九色porn原创视频在线观看| 欧美日韩成人综合天天影院| 精品88久久久久88久久久| 亚洲欧洲三级电影| 免费在线观看日韩欧美| 粗大黑人巨茎大战欧美成人| 欧美日韩在线综合| 国产日产亚洲精品系列| 亚洲一区二区视频在线| 国产精品一区二区视频| 在线观看日韩国产| 久久久影视传媒| 偷拍自拍另类欧美| eeuss影院一区二区三区| 日韩女优av电影在线观看| 综合久久一区二区三区| 久久精品国产77777蜜臀| 91麻豆免费在线观看| 精品区一区二区| 亚洲国产一区二区三区青草影视| 国产精品原创巨作av| 欧美日韩综合不卡| 亚洲日本护士毛茸茸| 国产中文字幕一区| 日韩一级大片在线| 亚洲午夜在线观看视频在线| 91亚洲精品乱码久久久久久蜜桃| 精品av久久707| 秋霞影院一区二区| 欧美日韩三级在线| 亚洲免费在线看| 99久久伊人久久99| 中文在线一区二区| 国产精品亚洲一区二区三区妖精 | 亚洲人成精品久久久久| 韩国一区二区在线观看| 欧美男女性生活在线直播观看| 亚洲欧美另类小说| 91丨porny丨最新| 中文字幕一区二区三区不卡| 粉嫩av亚洲一区二区图片| 精品国一区二区三区| 美女www一区二区| 欧美一级二级三级乱码| 天天色天天操综合| 欧美精品色一区二区三区| 亚洲高清免费视频| 国产精品久久久久久久久免费樱桃 | 国产精品一二三四| 欧美激情一区二区| 成人app软件下载大全免费| 亚洲欧美怡红院| 欧美伊人精品成人久久综合97 | 日韩欧美精品三级| 麻豆精品国产传媒mv男同| 欧美变态tickle挠乳网站| 国产一区二区精品在线观看| 久久久亚洲高清| gogo大胆日本视频一区| 亚洲aaa精品| 精品88久久久久88久久久| 国产99久久久国产精品潘金网站| 国产女同性恋一区二区| 99久久er热在这里只有精品15| 亚洲视频一区二区在线| 4hu四虎永久在线影院成人| 午夜精品久久久久久不卡8050| 日韩视频永久免费| 成人永久aaa| 一个色在线综合| 日韩欧美你懂的| av不卡免费在线观看| 一区二区三区不卡视频在线观看 | 五月天激情综合| 久久精品亚洲精品国产欧美kt∨| fc2成人免费人成在线观看播放| 亚洲一线二线三线久久久| 69堂国产成人免费视频| 丁香网亚洲国际| 午夜精品123| 国产精品视频线看| 日韩一区二区在线观看视频播放| 国产精品18久久久久久vr| 亚洲电影激情视频网站| 日本一区二区成人| 这里只有精品99re| 成人在线视频首页| 免费高清视频精品| 亚洲精品第1页| 欧美韩国日本不卡| 欧美一区二区三区免费大片| 成人综合婷婷国产精品久久| 午夜激情综合网| 亚洲日本va午夜在线影院| 2021国产精品久久精品| 欧美日韩你懂得| av电影天堂一区二区在线| 激情五月婷婷综合网| 亚洲成a人v欧美综合天堂下载| 亚洲国产精品ⅴa在线观看| 精品久久久久久综合日本欧美| 欧美三级在线播放| 91美女在线视频| 99久久er热在这里只有精品66| 国产在线观看免费一区| 免费观看日韩av| 日韩高清一级片| 国产麻豆午夜三级精品| 久久99久久99| 蜜臀91精品一区二区三区| 日韩黄色一级片| 日韩电影一区二区三区四区| 亚洲一区二区三区在线看| 亚洲精品乱码久久久久久黑人| 国产精品欧美一区喷水| 欧美国产日韩亚洲一区| 欧美极品美女视频| 国产欧美1区2区3区| 亚洲国产精品ⅴa在线观看| 久久精品日韩一区二区三区| 精品成人佐山爱一区二区| 精品国产区一区| 久久―日本道色综合久久| 精品欧美一区二区三区精品久久| 欧美va亚洲va香蕉在线| 精品91自产拍在线观看一区| 久久久久久久综合日本| 日本一区二区三区四区在线视频| 中文字幕av不卡| 国产精品国产三级国产三级人妇| 综合欧美一区二区三区| 一区二区三区中文字幕| 婷婷夜色潮精品综合在线| 久久疯狂做爰流白浆xx| 国产福利一区二区三区视频在线| 国产精品99久久久| 91在线视频18| 欧美精品精品一区| 久久综合丝袜日本网| 中文字幕视频一区| 亚洲国产成人91porn| 久久成人久久爱| 成人黄页毛片网站| 欧美午夜精品电影| 欧美一卡二卡在线| 久久精品人人做人人综合| 亚洲精品国产a久久久久久| 偷窥少妇高潮呻吟av久久免费| 奇米一区二区三区av| 成人免费看的视频| 欧美日韩在线播放三区四区| 精品成人在线观看| 夜夜精品视频一区二区 | 国产精品乱人伦一区二区| 亚洲综合激情小说| 精品中文av资源站在线观看| 成人国产精品免费网站| 欧美三级视频在线| 久久免费的精品国产v∧| 亚洲视频一区在线观看| 麻豆精品一区二区三区| 色综合视频在线观看| 日韩久久精品一区| 亚洲精品视频一区| 国产精品456露脸| 欧美一区二区三区成人| 亚洲欧洲性图库| 国产剧情一区二区| 欧美电影一区二区三区| 国产精品久久久久影院亚瑟| 麻豆91精品91久久久的内涵| 色av一区二区|