亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? draft-ietf-dnsext-gss-tsig-06.txt

?? bind-3.2.
?? TXT
?? 第 1 頁 / 共 4 頁
字號:
INTERNET-DRAFT                                               Stuart Kwan<draft-ietf-dnsext-gss-tsig-06.txt>                         Praerit GargFebruary 28, 2003                                           James GilroyExpires August 28, 2003                                     Levon Esibov                                                           Jeff Westhead                                                         Microsoft Corp.                                                              Randy Hall                                                     Lucent Technologies                                                                     GSS Algorithm for TSIG (GSS-TSIG)Status of this MemoThis document is an Internet-Draft and is in full conformancewith all provisions of Section 10 of RFC2026.Internet-Drafts are working documents of the Internet EngineeringTask Force (IETF), its areas, and its working groups.  Note thatother groups may also distribute working documents asInternet-Drafts.Internet-Drafts are draft documents valid for a maximum of sixmonths and may be updated, replaced, or obsoleted by otherdocuments at any time.  It is inappropriate to use Internet-Drafts as reference material or to cite them other than as"work in progress."The list of current Internet-Drafts can be accessed athttp://www.ietf.org/ietf/1id-abstracts.txtThe list of Internet-Draft Shadow Directories can be accessed athttp://www.ietf.org/shadow.html.AbstractThe TSIG protocol provides transaction level authentication for DNS.TSIG is extensible through the definition of new algorithms.  Thisdocument specifies an algorithm based on the Generic Security ServiceApplication Program Interface (GSS-API) (RFC2743). This document updatesRFC 2845.Expires August 28, 2003                                       [Page 1]INTERNET-DRAFT                   GSS-TSIG            February 28, 2003Table of Contents1: Introduction......................................................22: Algorithm Overview................................................3  2.1: GSS Details...................................................4  2.2: Modifications to the TSIG protocol (RFC 2845).................43: Client Protocol Details...........................................4  3.1: Negotiating Context...........................................5    3.1.1: Call GSS_Init_sec_context.................................5    3.1.2: Send TKEY Query to Server.................................7    3.1.3: Receive TKEY Query-Response from Server...................7  3.2: Context Established..........................................10    3.2.1: Terminating a Context....................................104: Server Protocol Details..........................................10  4.1: Negotiating Context..........................................10    4.1.1: Receive TKEY Query from Client...........................11    4.1.2: Call GSS_Accept_sec_context..............................11    4.1.3: Send TKEY Query-Response to Client.......................12  4.2: Context Established..........................................13    4.2.1: Terminating a Context....................................135: Sending and Verifying Signed Messages............................14  5.1: Sending a Signed Message - Call GSS_GetMIC...................14  5.2: Verifying a Signed Message - Call GSS_VerifyMIC..............156: Example usage of GSS-TSIG algorithm..............................167: Security Considerations..........................................208: IANA Considerations..............................................209: Conformance......................................................2010:Acknowledgements.................................................2011:References.......................................................201. IntroductionThe Secret Key Transaction Authentication for DNS (TSIG) [RFC2845]protocol was developed to provide a lightweight authentication andintegrity of messages between two DNS entities, such as client andserver or server and server. TSIG can be used to protect dynamicupdate messages, authenticate regular message or to off-loadcomplicated DNSSEC [RFC2535] processing from a client to a server andstill allow the client to be assured of the integrity of the answers.The TSIG protocol [RFC2845] is extensible through the definition of newalgorithms.  This document specifies an algorithm based on the GenericSecurity Service Application Program Interface (GSS-API) [RFC2743].GSS-API is a framework that provides an abstraction of security to theapplication protocol developer.  The security services offered caninclude authentication, integrity, and confidentiality.The GSS-API framework has several benefits:* Mechanism and protocol independence.  The underlying mechanisms thatrealize the security services can be negotiated on the fly and variedover time.  For example, a client and server MAY use Kerberos [RFC1964]for one transaction, whereas that same server MAY use SPKM [RFC2025]with a different client.Expires August 28, 2003                                       [Page 2]INTERNET-DRAFT                   GSS-TSIG            February 28, 2003* The protocol developer is removed from the responsibility ofcreating and managing a security infrastructure.  For example, thedeveloper does not need to create new key distribution or keymanagement systems.  Instead the developer relies on the securityservice mechanism to manage this on its behalf.The scope of this document is limited to the description of anauthentication mechanism only. It does not discuss and/or propose anauthorization mechanism.  Readers that are unfamiliar with GSS-APIconcepts are encouraged to read the characteristics and concepts sectionof [RFC2743] before examining this protocol in detail. It is alsoassumed that the reader is familiar with [RFC2845], [RFC2930], [RFC1034]and [RFC1035].The key words "MUST", "MUST NOT", "REQUIRED", "SHOULD", "SHOULD NOT","RECOMMENDED", and "MAY" in this document are to be interpreted asdescribed in RFC 2119 [RFC2119].2. Algorithm OverviewIn GSS, client and server interact to create a "security context".The security context can be used to create and verify transactionsignatures on messages between the two parties.  A unique securitycontext is required for each unique connection between client andserver.Creating a security context involves a negotiation between client andserver.  Once a context has been established, it has a finite lifetimefor which it can be used to secure messages.  Thus there are threestates of a context associated with a connection:                           +----------+                           |          |                           V          |                   +---------------+  |                   | Uninitialized |  |                   |               |  |                   +---------------+  |                           |          |                           V          |                   +---------------+  |                   | Negotiating   |  |                   | Context       |  |                   +---------------+  |                           |          |                           V          |                   +---------------+  |                   | Context       |  |                   | Established   |  |                   +---------------+  |                           |          |                           +----------+Expires August 28, 2003                                       [Page 3]INTERNET-DRAFT                   GSS-TSIG            February 28, 2003Every connection begins in the uninitialized state.2.1 GSS DetailsClient and server MUST be locally authenticated and have acquireddefault credentials before using this protocol as specified inSection 1.1.1 "Credentials" in RFC 2743 [RFC2743].The GSS-TSIG algorithm consists of two stages:I. Establish security context. The Client and Server use theGSS_Init_sec_context and GSS_Accept_sec_context APIs to generate thetokens that they pass to each other using [RFC2930] as a transportmechanism.II. Once the security context is established it is used to generate andverify signatures using GSS_GetMIC and GSS_VerifyMIC APIs. Thesesignatures are exchanged by the Client and Server as a part of the TSIGrecords exchanged in DNS messages sent between the Client and Server,as described in [RFC2845].2.2 Modifications to the TSIG protocol (RFC 2845)Modification to RFC 2845 allows use of TSIG through signing server'sresponse in an explicitly specified place in multi message exchangebetween two DNS entities even if client's request wasn't signed.Specifically Section 4.2 of RFC 2845 MUST be modified as follows.Replace:"The server MUST not generate a signed response to an unsignedrequest."With:"The server MUST not generate a signed response to an unsigned request, except in case of response to client's unsigned TKEY query if secret key is established on server side after server processed client's query. Signing responses to unsigned TKEY queries MUST be explicitly specified in the description of an individual secret key establishment algorithm."3.  Client Protocol DetailsA unique context is required for each server to which the client sendssecure messages.  A context is identified by a context handle. Aclient maintains a mapping of servers to handles,     (target_name, key_name, context_handle)Expires August 28, 2003                                       [Page 4]INTERNET-DRAFT                   GSS-TSIG            February 28, 2003The value key_name also identifies a context handle. The key_name isthe owner name of the TKEY and TSIG records sent between a client and aserver to indicate to each other which context MUST be used to processthe current request.DNS client and server MAY use various underlying security mechanisms toestablish security context as described in sections 3 and 4. At thesame time, in order to guarantee interoperability between DNS clientsand servers that support GSS-TSIG it is REQUIRED that securitymechanism used by client enables use of Kerberos v5 (see Section 9for more information).3.1  Negotiating ContextIn GSS, establishing a security context involves the passing of opaquetokens between the client and the server.  The client generates theinitial token and sends it to the server.  The server processes thetoken and if necessary, returns a subsequent token to the client.  Theclient processes this token, and so on, until the negotiation iscomplete.  The number of times the client and server exchange tokensdepends on the underlying security mechanism.  A completed negotiationresults in a context handle.The TKEY resource record [RFC2930] is used as the vehicle to transfertokens between client and server.  The TKEY record is a generalmechanism for establishing secret keys for use with TSIG.  For moreinformation, see [RFC2930].3.1.1 Call GSS_Init_sec_contextTo obtain the first token to be sent to a server, a client MUST callGSS_Init_sec_context API.The following input parameters MUST be used. The outcome of the call isindicated with the output values below.  Consult Sections 2.2.1"GSS_Init_sec_context call" of [RFC2743] for syntax definitions.   INPUTS     CREDENTIAL HANDLE claimant_cred_handle = NULL (NULL specifies "use         default"). Client MAY instead specify some other valid handle         to its credentials.     CONTEXT HANDLE input_context_handle  = 0     INTERNAL NAME  targ_name             = "DNS@<target_server_name>"     OBJECT IDENTIFIER mech_type          = Underlying security         mechanism chosen by implementers. To guarantee         interoperability of the implementations of the GSS-TSIG         mechanism client MUST specify a valid underlying security         mechanism that enables use of Kerberos v5 (see Section 9 for         more information).     OCTET STRING   input_token           = NULL     BOOLEAN        replay_det_req_flag   = TRUEExpires August 28, 2003                                       [Page 5]INTERNET-DRAFT                   GSS-TSIG            February 28, 2003     BOOLEAN        mutual_req_flag       = TRUE     BOOLEAN        deleg_req_flag        = TRUE     BOOLEAN        sequence_req_flag     = TRUE     BOOLEAN        anon_req_flag         = FALSE     BOOLEAN        integ_req_flag        = TRUE     INTEGER        lifetime_req          = 0 (0 requests a default         value). Client MAY instead specify another upper bound for the         lifetime of the context to be established in seconds.     OCTET STRING   chan_bindings         = Any valid channel bindings         as specified in Section 1.1.6 "Channel Bindings" in [RFC2743]   OUTPUTS     INTEGER        major_status     CONTEXT HANDLE output_context_handle     OCTET STRING   output_token     BOOLEAN        replay_det_state

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
欧美成人a视频| 久久精品国产免费看久久精品| 亚洲伦理在线精品| 国产美女视频一区| 欧美美女bb生活片| 国产精品电影一区二区| 狠狠色狠狠色综合日日91app| 欧洲中文字幕精品| 亚洲婷婷在线视频| 国产激情一区二区三区四区| 欧美视频在线观看一区二区| 国产精品进线69影院| 国产乱色国产精品免费视频| 宅男噜噜噜66一区二区66| 一区二区三区国产豹纹内裤在线| 风间由美性色一区二区三区| 精品久久久久久亚洲综合网| 日韩av午夜在线观看| 欧美日本精品一区二区三区| 一区二区在线观看不卡| 97久久精品人人做人人爽50路| 国产清纯白嫩初高生在线观看91| 精品一区二区久久久| 欧美一区二视频| 婷婷一区二区三区| 欧美一区二区三区公司| 日韩精品亚洲专区| 3atv一区二区三区| 麻豆成人综合网| 日韩精品一区二区三区四区| 玖玖九九国产精品| 亚洲精品在线免费观看视频| 久草热8精品视频在线观看| 日韩欧美另类在线| 精品午夜一区二区三区在线观看| 欧美成人乱码一区二区三区| 蜜桃视频在线一区| 久久看人人爽人人| 成人av网在线| 亚洲一区电影777| 欧美日产国产精品| 久久成人免费网站| 国产欧美一区二区精品性| 国产乱子伦视频一区二区三区| 国产三区在线成人av| 成人国产亚洲欧美成人综合网| 国产精品国产三级国产有无不卡 | 樱花影视一区二区| 欧美日韩精品欧美日韩精品| 免费在线观看一区| 国产精品美女久久久久aⅴ| 色偷偷88欧美精品久久久| 午夜视频一区在线观看| 日韩欧美亚洲另类制服综合在线| 国产福利电影一区二区三区| 亚洲另类一区二区| 欧美一卡2卡3卡4卡| 国产激情91久久精品导航 | 亚洲精品一区二区三区精华液 | 日本va欧美va瓶| 国产日韩欧美一区二区三区综合| 成人小视频免费观看| 亚洲18女电影在线观看| 久久精品视频一区二区三区| 色综合亚洲欧洲| 久久精品999| 一区二区三区四区av| 久久久综合九色合综国产精品| 91亚洲国产成人精品一区二区三 | 91久久国产综合久久| 美女诱惑一区二区| 中文字幕字幕中文在线中不卡视频| 欧美日韩国产片| 成人av中文字幕| 六月丁香婷婷久久| 一级特黄大欧美久久久| 久久精品亚洲乱码伦伦中文 | 9人人澡人人爽人人精品| 亚洲亚洲人成综合网络| 久久久久久久久久久黄色| 欧美三区在线视频| 成人一道本在线| 久88久久88久久久| 亚洲一区二区视频在线| 国产精品污www在线观看| 欧美一区二区视频在线观看 | 日韩午夜三级在线| 91国产丝袜在线播放| 福利一区福利二区| 久草精品在线观看| 免费不卡在线观看| 午夜精品影院在线观看| 一区二区三区在线观看国产| 中文字幕国产一区二区| 久久伊99综合婷婷久久伊| 欧美精选一区二区| 在线欧美小视频| 97久久人人超碰| jlzzjlzz亚洲日本少妇| 国产高清视频一区| 国产一区欧美日韩| 韩国午夜理伦三级不卡影院| 日韩国产精品久久| 日韩精品一级中文字幕精品视频免费观看 | 欧美视频一区二区| 色视频一区二区| 在线视频一区二区三区| 99re这里都是精品| 色综合久久66| 在线免费不卡视频| 在线视频欧美区| 精品视频一区二区不卡| 欧美午夜精品电影| 欧美人牲a欧美精品| 7777精品伊人久久久大香线蕉的| 欧美日韩在线直播| 91精品久久久久久久91蜜桃| 91精品国产免费| 日韩午夜精品视频| 久久精品亚洲精品国产欧美kt∨| 久久理论电影网| 亚洲丝袜精品丝袜在线| 亚洲激情在线播放| 亚洲一区二区三区不卡国产欧美| 亚洲成人激情综合网| 青草国产精品久久久久久| 久久99国产精品尤物| 国产成人av电影在线播放| 不卡视频在线看| 在线观看日韩电影| 日韩欧美一卡二卡| 国产色产综合色产在线视频| 亚洲少妇中出一区| 日日骚欧美日韩| 国产精品综合二区| 91麻豆产精品久久久久久| 欧美区在线观看| 国产午夜精品久久久久久久 | 亚洲视频综合在线| 天堂影院一区二区| 极品少妇xxxx精品少妇| 99re免费视频精品全部| 欧美一级欧美三级| 国产午夜精品久久久久久免费视| 亚洲男人的天堂av| 理论电影国产精品| 91丝袜高跟美女视频| 欧美福利一区二区| 中文字幕中文字幕中文字幕亚洲无线| 洋洋av久久久久久久一区| 久久电影国产免费久久电影| caoporm超碰国产精品| 日韩欧美在线影院| 亚洲丝袜美腿综合| 国产美女一区二区三区| 欧美日韩一区二区在线观看 | 男女男精品网站| 99re8在线精品视频免费播放| 日韩欧美中文一区| 亚洲精品国产视频| 成人综合婷婷国产精品久久| 5566中文字幕一区二区电影| 中文字幕av资源一区| 日本v片在线高清不卡在线观看| 成人一级黄色片| 精品国产91洋老外米糕| 亚洲成年人网站在线观看| 99久久久精品| 国产三级三级三级精品8ⅰ区| 亚洲一区二区不卡免费| 成人黄色一级视频| www欧美成人18+| 免费的成人av| 欧美精品乱码久久久久久 | 欧美日韩一区 二区 三区 久久精品| 久久久精品人体av艺术| 六月婷婷色综合| 337p亚洲精品色噜噜噜| 亚洲国产人成综合网站| 色综合久久中文综合久久97| 国产目拍亚洲精品99久久精品| 狠狠色丁香久久婷婷综| 日韩欧美一级在线播放| 午夜国产不卡在线观看视频| 在线日韩一区二区| 亚洲在线一区二区三区| 波多野结衣一区二区三区| 久久精品无码一区二区三区| 国产在线精品一区二区三区不卡 | 欧美精品在欧美一区二区少妇| 亚洲美女区一区| 一本一本久久a久久精品综合麻豆 一本一道波多野结衣一区二区 | 国产一区二区三区蝌蚪| 精品久久国产老人久久综合| 青娱乐精品视频| 日韩免费观看高清完整版| 久久国产婷婷国产香蕉| 日韩精品综合一本久道在线视频| 日本成人在线视频网站| 欧美成人一区二区|