亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關(guān)于我們
? 蟲蟲下載站

?? draft-ietf-dnsext-gss-tsig-06.txt

?? bind-3.2.
?? TXT
?? 第 1 頁 / 共 4 頁
字號:
                                            context_handle matching                                         key_name if ongoing negotiation     OCTET STRING   input_token           = token specified in the Key           field from TKEY RR (from Additional records Section of           the client's query)     CREDENTIAL HANDLE acceptor_cred_handle = NULL (NULL specifies "use           default"). Server MAY instead specify some other valid handle           to its credentials.     OCTET STRING   chan_bindings          = Any valid channel bindings           as specified in Section 1.1.6 "Channel Bindings" in [RFC2743]   OUTPUTS     INTEGER        major_status     CONTEXT_HANDLE output_context_handle     OCTET STRING   output_token     INTEGER        minor_status     INTERNAL NAME  src_name     OBJECT IDENTIFIER  mech_type     BOOLEAN        deleg_stateExpires August 28, 2003                                       [Page 11]INTERNET-DRAFT                   GSS-TSIG             February 28, 2003     BOOLEAN        mutual_state     BOOLEAN        replay_det_state     BOOLEAN        sequence_state     BOOLEAN        anon_state     BOOLEAN        trans_state     BOOLEAN        prot_ready_state     BOOLEAN        conf_avail     BOOLEAN        integ_avail     INTEGER        lifetime_rec     CONTEXT_HANDLE delegated_cred_handleIf this is the first call to GSS_Accept_sec_context in a newnegotiation, then output_context_handle is stored in the server'skey-mapping table as the context_handle that maps to the name of theTKEY record.4.1.3 Send TKEY Query-Response to ClientThe server MUST respond to the client with a TKEY query response withRCODE = NOERROR, that contains a TKEY record in the answer section.If OUTPUT major_status is one of the following errors the error fieldin the TKEY record set to BADKEY.     GSS_S_DEFECTIVE_TOKEN     GSS_S_DEFECTIVE_CREDENTIAL     GSS_S_BAD_SIG (GSS_S_BAD_MIC)     GSS_S_DUPLICATE_TOKEN     GSS_S_OLD_TOKEN     GSS_S_NO_CRED     GSS_S_CREDENTIALS_EXPIRED     GSS_S_BAD_BINDINGS     GSS_S_NO_CONTEXT     GSS_S_BAD_MECH     GSS_S_FAILUREIf OUTPUT major_status is set to  GSS_S_COMPLETE orGSS_S_CONTINUE_NEEDED then server MUST act as described below.If major_status is GSS_S_COMPLETE the server component of thenegotiation is finished. If output_token is non-NULL, then it MUST bereturned to the client in a Key Data field of the RDATA in TKEY. Theerror field in the TKEY record is set to NOERROR. The message MUST besigned with a TSIG record as described in section 5, Sending andVerifying Signed Messages. Note that server is allowed to sign aresponse to unsigned client's query due to modification to the RFC2845 specified in Section 2.2 above. The context state is advanced toContext Established. Section 4.2 discusses the usage of the securitycontext.Expires August 28, 2003                                       [Page 12]INTERNET-DRAFT                   GSS-TSIG             February 28, 2003If major_status is GSS_S_COMPLETE and output_token is NULL, then theTKEY record received from the client MUST be returned in the Answersection of the response. The message MUST be signed with a TSIG recordas described in section 5, Sending and Verifying Signed Messages. Notethat server is allowed to sign a response to unsigned client's querydue to modification to the RFC 2845 specified in section 2.2 above. Thecontext state is advanced to Context Established. Section 4.2 discussesthe usage of the security context.If major_status is GSS_S_CONTINUE, the server component of thenegotiation is not yet finished.  The server responds to the TKEYquery with a standard query response, placing in the answer section aTKEY record containing output_token in the Key Data RDATA field. Theerror field in the TKEY record is set to NOERROR. The server MUST limitthe number of times that a given context is allowed to repeat, toprevent endless looping. Such limit SHOULD NOT exceed value of 10.In all cases except if major_status is GSS_S_COMPLETE and output_tokenis NULL other TKEY record fields MUST contain the following values:     NAME = key_name     RDATA        Algorithm Name      = gss-tsig        Mode                = 3 (GSS-API negotiation - per [RFC2930])        Key Size            = size of output_token in octetsThe remaining fields in the TKEY RDATA, i.e. Inception, Expiration,Error, Other Size and Data Fields, MUST be set according to [RFC2930].4.2 Context EstablishedWhen context negotiation is complete, the handle context_handleis used for the generation and verification of transaction signatures.The handle is valid for a finite amount of time determined by theunderlying security mechanism. A server MAY unilaterally terminatea context at any time (see section 4.2.1).Server SHOULD limit the amount of memory used to cache establishedcontexts.The procedures for sending and receiving signed messages are given insection 5, Sending and Verifying Signed Messages.4.2.1 Terminating a ContextA server can terminate any established context at any time.  Theserver MAY hint to the client that the context is being deleted byincluding a TKEY RR in a response with the Mode field set to 5, i.e."key deletion" [RFC2930].An active context is deleted by calling GSS_Delete_sec_contextproviding the associated context_handle.Expires August 28, 2003                                       [Page 13]INTERNET-DRAFT                   GSS-TSIG             February 28, 20035. Sending and Verifying Signed Messages5.1 Sending a Signed Message - Call GSS_GetMICThe procedure for sending a signature-protected message is specifiedin [RFC2845].  The data to be passed to the signature routine includesthe whole DNS message with specific TSIG variables appended.  For theexact format, see [RFC2845].  For this protocol, use the followingTSIG variable values:   TSIG Record     NAME = key_name that identifies this context     RDATA        Algorithm Name = gss-tsigAssign the remaining fields in the TSIG RDATA appropriate valuesas described in [RFC2845].The signature is generated by calling GSS_GetMIC. The following inputparameters MUST be used. The outcome of the call is indicated with theoutput values specified below.  Consult Sections 2.3.1 "GSS_GetMICcall" of the RFC 2743[RFC2743] for syntax definitions.   INPUTS     CONTEXT HANDLE context_handle = context_handle for key_name     OCTET STRING   message        = outgoing message plus TSIG                                     variables (per [RFC2845])     INTEGER qop_req               = 0 (0 requests a default         value). Caller MAY instead specify other valid value (for         details see Section 1.2.4 in [RFC2743])   OUTPUTS     INTEGER        major_status     INTEGER        minor_status     OCTET STRING   per_msg_tokenIf major_status is GSS_S_COMPLETE, then signature generationsucceeded.  The signature in per_msg_token is inserted into theSignature field of the TSIG RR and the message is transmitted.If major_status is GSS_S_CONTEXT_EXPIRED, GSS_S_CREDENTIALS_EXPIRED orGSS_S_FAILURE the caller MUST delete the security context, return to theuninitialized state and SHOULD negotiate a new security context, asdescribed above in Section 3.1If major_status is GSS_S_NO_CONTEXT, the caller MUST remove the entryfor key_name from the (target_ name, key_name, context_handle) mappingtable, return to the uninitialized state and SHOULD negotiate a newsecurity context, as described above in Section 3.1If major_status is GSS_S_BAD_QOP, the caller SHOULD repeat theGSS_GetMIC call with allowed QOP value. The number of such repetitionsMUST be limited to prevent infinite loops.Expires August 28, 2003                                       [Page 14]INTERNET-DRAFT                   GSS-TSIG             February 28, 20035.2 Verifying a Signed Message - Call GSS_VerifyMICThe procedure for verifying a signature-protected message is specifiedin [RFC2845].The NAME of the TSIG record determines which context_handle maps tothe context that MUST be used to verify the signature.  If the NAMEdoes not map to an established context, the server MUST send astandard TSIG error response to the client indicating BADKEY in theTSIG error field (as described in [RFC2845]).For the GSS algorithm, a signature is verified by using GSS_VerifyMIC:   INPUTS     CONTEXT HANDLE context_handle = context_handle for key_name     OCTET STRING   message        = incoming message plus TSIG                                     variables (per [RFC2845])     OCTET STRING   per_msg_token  = Signature field from TSIG RR   OUTPUTS     INTEGER        major_status     INTEGER        minor_status     INTEGER        qop_stateIf major_status is GSS_S_COMPLETE, the signature is authentic and themessage was delivered intact.  Per [RFC2845], the timer values of theTSIG record MUST also be valid before considering the message to beauthentic.  The caller MUST not act on the request or response in themessage until these checks are verified.When a server is processing a client request,the server MUST send a standard TSIG error response to the clientindicating BADKEY in the TSIG error field as described in [RFC2845],if major_status is set to one of the following values     GSS_S_DEFECTIVE_TOKEN     GSS_S_BAD_SIG (GSS_S_BAD_MIC)     GSS_S_DUPLICATE_TOKEN     GSS_S_OLD_TOKEN     GSS_S_UNSEQ_TOKEN     GSS_S_GAP_TOKEN     GSS_S_CONTEXT_EXPIRED     GSS_S_NO_CONTEXT     GSS_S_FAILUREIf the timer values of the TSIG record are invalid, the message MUSTNOT be considered authentic. If this error checking fails when a serveris processing a client request, the appropriate error response MUST besent to the client according to [RFC2845].Expires August 28, 2003                                       [Page 15]INTERNET-DRAFT                   GSS-TSIG             February 28, 20036. Example usage of GSS-TSIG algorithmThis Section describes an example where a Client, client.example.com,and a Server, server.example.com, establish a security context accordingto the algorithm described above.  I. Client initializes security context negotiation  To establish a security context with a server, server.example.com, the  Client calls GSS_Init_sec_context with the following parameters  (Note that some INPUT and OUTPUT parameters not critical for this  algorithm are not described in this example)     CONTEXT HANDLE input_context_handle  = 0     INTERNAL NAME  targ_name             = "DNS@server.example.com"     OCTET STRING   input_token           = NULL     BOOLEAN        replay_det_req_flag   = TRUE     BOOLEAN        mutual_req_flag       = TRUE  The OUTPUTS parameters returned by GSS_Init_sec_context include     INTEGER        major_status = GSS_S_CONTINUE_NEEDED     CONTEXT HANDLE output_context_handle context_handle     OCTET STRING   output_token output_token     BOOLEAN        replay_det_state = TRUE     BOOLEAN        mutual_state = TRUE  Client verifies that replay_det_state and mutual_state values are  TRUE. Since the major_status is GSS_S_CONTINUE_NEEDED, which is a  success OUTPUT major_status value, client stores context_handle that  maps to "DNS@server.example.com" and proceeds to the next step.  II. Client sends a query with QTYPE = TKEY to server  Client sends a query with QTYPE = TKEY for a client-generated globally  unique domain name string, 789.client.example.com.server.example.com.  Query contains a TKEY record in its Additional records section with  the following fields (Note that some fields not specific to this  algorithm are not specified)     NAME = 789.client.example.com.server.example.com.     RDATA        Algorithm Name      = gss-tsig        Mode                = 3 (GSS-API negotiation - per [RFC2930])        Key Size            = size of output_token in octets        Key Data            = output_token  After the key_name 789.client.example.com.server.example.com.  is generated it is stored in the client's (target_name, key_name,  context_handle) mapping table.

?? 快捷鍵說明

復(fù)制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
国产女主播一区| 日韩美女一区二区三区| 最新成人av在线| 91麻豆免费观看| 亚洲一区二区欧美| 欧美一级理论片| 国产成人综合网站| 亚洲丝袜自拍清纯另类| 在线免费观看视频一区| 久久精品噜噜噜成人av农村| 久久毛片高清国产| 91伊人久久大香线蕉| 天堂一区二区在线| 国产三区在线成人av| 在线观看视频91| 麻豆91在线播放| 亚洲人快播电影网| 日韩亚洲欧美高清| 不卡av在线免费观看| 亚洲成人av一区二区三区| 精品久久久久久久久久久久久久久久久 | 韩国成人福利片在线播放| 日本一区免费视频| 欧美色网一区二区| 国产成人免费av在线| 亚洲影视在线观看| 久久久久国产精品麻豆ai换脸| 99国产欧美另类久久久精品| 日韩成人一级片| 国产精品国产三级国产aⅴ无密码| 欧美色手机在线观看| 国产传媒欧美日韩成人| 亚洲成人第一页| 日韩一区在线免费观看| 日韩一区二区免费高清| 一本高清dvd不卡在线观看| 国产在线看一区| 香港成人在线视频| 亚洲欧美电影一区二区| www国产成人| 欧美一区二区在线播放| 91碰在线视频| 国产69精品久久777的优势| 日本欧美一区二区三区乱码| 亚洲私人黄色宅男| 欧美国产日韩精品免费观看| 日韩一区二区三免费高清| 91麻豆文化传媒在线观看| 国产精品2024| 精品在线观看免费| 日韩国产欧美视频| 亚洲成人黄色小说| 亚洲最大成人综合| 中文字幕乱码一区二区免费| 亚洲精品一区二区三区福利| 91精品国产乱| 欧美精品一级二级三级| 欧美午夜在线观看| 色狠狠色狠狠综合| 99精品欧美一区二区三区小说| 国产高清久久久| 国产一区二区三区高清播放| 免费看黄色91| 99久久777色| 成人福利视频网站| 成人一区在线看| 国产成人综合自拍| 成人午夜视频在线| 国产不卡视频在线播放| 国产精品香蕉一区二区三区| 狠狠狠色丁香婷婷综合激情 | 国产精品99久| 狠狠色丁香婷综合久久| 精品一区二区免费看| 免费黄网站欧美| 日韩1区2区日韩1区2区| 青草国产精品久久久久久| 青草av.久久免费一区| 久久国产剧场电影| 精品一区二区三区的国产在线播放| 日本中文字幕一区二区有限公司| 香蕉成人啪国产精品视频综合网| 日日夜夜一区二区| 麻豆精品国产传媒mv男同| 精品一二三四区| 国产精品一区二区久激情瑜伽| 国产精一区二区三区| 成人精品一区二区三区中文字幕| 92精品国产成人观看免费| 日本大香伊一区二区三区| 欧洲激情一区二区| 3atv一区二区三区| 久久精品夜色噜噜亚洲aⅴ| 国产精品欧美久久久久无广告 | 91麻豆免费在线观看| 在线精品视频免费观看| 8v天堂国产在线一区二区| 欧美电影精品一区二区| 亚洲国产成人一区二区三区| 亚洲欧美日韩精品久久久久| 香蕉久久夜色精品国产使用方法| 蜜臀av一区二区在线免费观看| 精品一区二区三区影院在线午夜| 高清不卡一区二区| 欧美无砖砖区免费| 精品国产乱码久久久久久1区2区| 国产日韩精品一区二区三区在线| 最新日韩av在线| 日韩精品成人一区二区三区 | av电影天堂一区二区在线| 91久久免费观看| 精品盗摄一区二区三区| 国产精品视频看| 舔着乳尖日韩一区| 成人avav影音| 91精品国产综合久久久久久漫画| 国产精品丝袜黑色高跟| 视频在线观看一区| 97久久精品人人做人人爽50路| 911精品国产一区二区在线| 国产精品久久毛片a| 免费高清在线视频一区·| 一本一道波多野结衣一区二区| 欧美mv日韩mv国产网站| 一级特黄大欧美久久久| 国产一区二区在线视频| 欧美日韩在线一区二区| 国产欧美日韩不卡免费| 日韩影视精彩在线| 91麻豆免费在线观看| 久久久精品综合| 日韩高清不卡在线| 色婷婷综合久久久中文一区二区| 日韩你懂的在线播放| 亚洲永久精品大片| 99精品欧美一区| 国产亚洲欧美激情| 久久成人av少妇免费| 欧美日韩小视频| 亚洲精品免费在线| 成人精品国产一区二区4080| 日韩午夜电影av| 五月婷婷激情综合网| 在线观看91精品国产入口| 中文字幕一区三区| 国产超碰在线一区| 久久久久久久综合日本| 韩国一区二区视频| 日韩精品一区二区三区四区 | 中文字幕不卡在线播放| 久久精品国内一区二区三区| 欧美精品久久99久久在免费线 | 亚洲国产精品二十页| 韩国精品一区二区| 精品国产一区久久| 久久精品久久综合| 欧美va在线播放| 久草中文综合在线| 欧美成人一区二区三区| 免费看黄色91| 欧美不卡在线视频| 免费在线看一区| 欧美变态口味重另类| 免费黄网站欧美| 欧美不卡一区二区三区四区| 久久精品国产久精国产爱| 精品国产91久久久久久久妲己| 美女mm1313爽爽久久久蜜臀| 日韩片之四级片| 国产一区二区三区精品欧美日韩一区二区三区 | 亚洲国产精品一区二区www| 欧洲一区二区三区在线| 午夜不卡av在线| 欧美变态tickle挠乳网站| 精品写真视频在线观看| 久久久久国产精品厨房| 成人动漫一区二区三区| 亚洲色大成网站www久久九九| 在线亚洲欧美专区二区| 天堂成人国产精品一区| 精品国产免费视频| 成人毛片在线观看| 亚洲综合在线电影| 91精品午夜视频| 国产伦理精品不卡| 亚洲三级免费电影| 91精品欧美福利在线观看| 国产一区美女在线| 亚洲免费在线播放| 91精品国产欧美一区二区18| 国产精品一区二区久激情瑜伽| 亚洲图片另类小说| 欧美精品 国产精品| 国产中文字幕一区| 亚洲欧洲综合另类| 7777精品伊人久久久大香线蕉| 国产剧情av麻豆香蕉精品| 亚洲欧美日韩一区二区 | 色偷偷久久一区二区三区| 五月婷婷综合激情|