亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關(guān)于我們
? 蟲蟲下載站

?? rfc3645.txt

?? bind 9.3結(jié)合mysql數(shù)據(jù)庫
?? TXT
?? 第 1 頁 / 共 4 頁
字號:
RFC 3645                        GSS-TSIG                    October 2003        GSS_S_DEFECTIVE_TOKEN        GSS_S_DEFECTIVE_CREDENTIAL        GSS_S_BAD_SIG (GSS_S_BAD_MIC)        GSS_S_DUPLICATE_TOKEN        GSS_S_OLD_TOKEN        GSS_S_NO_CRED        GSS_S_CREDENTIALS_EXPIRED        GSS_S_BAD_BINDINGS        GSS_S_NO_CONTEXT        GSS_S_BAD_MECH        GSS_S_FAILURE   If OUTPUT major_status is set to  GSS_S_COMPLETE or   GSS_S_CONTINUE_NEEDED then server MUST act as described below.   If major_status is GSS_S_COMPLETE the server component of the   negotiation is finished.  If output_token is non-NULL, then it MUST   be returned to the client in a Key Data field of the RDATA in TKEY.   The error field in the TKEY record is set to NOERROR.  The message   MUST be signed with a TSIG record as described in section 5, Sending   and Verifying Signed Messages.  Note that server is allowed to sign a   response to unsigned client's query due to modification to the RFC   2845 specified in Section 2.2 above.  The context state is advanced   to Context Established.  Section 4.2 discusses the usage of the   security context.   If major_status is GSS_S_COMPLETE and output_token is NULL, then the   TKEY record received from the client MUST be returned in the Answer   section of the response.  The message MUST be signed with a TSIG   record as described in section 5, Sending and Verifying Signed   Messages.  Note that server is allowed to sign a response to unsigned   client's query due to modification to the RFC 2845 specified in   section 2.2 above.  The context state is advanced to Context   Established.  Section 4.2 discusses the usage of the security   context.   If major_status is GSS_S_CONTINUE_NEEDED, the server component of the   negotiation is not yet finished.  The server responds to the TKEY   query with a standard query response, placing in the answer section a   TKEY record containing output_token in the Key Data RDATA field.  The   error field in the TKEY record is set to NOERROR.  The server MUST   limit the number of times that a given context is allowed to repeat,   to prevent endless looping.  Such limit SHOULD NOT exceed value of   10.Kwan, et al.                Standards Track                    [Page 14]RFC 3645                        GSS-TSIG                    October 2003   In all cases, except if major_status is GSS_S_COMPLETE and   output_token is NULL, other TKEY record fields MUST contain the   following values:        NAME = key_name        RDATA           Algorithm Name      = gss-tsig           Mode                = 3 (GSS-API negotiation - per [RFC2930])           Key Size            = size of output_token in octets   The remaining fields in the TKEY RDATA, i.e., Inception, Expiration,   Error, Other Size and Data Fields, MUST be set according to   [RFC2930].4.2.  Context Established   When context negotiation is complete, the handle context_handle is   used for the generation and verification of transaction signatures.   The handle is valid for a finite amount of time determined by the   underlying security mechanism.  A server MAY unilaterally terminate a   context at any time (see section 4.2.1).   Server SHOULD limit the amount of memory used to cache established   contexts.   The procedures for sending and receiving signed messages are given in   section 5, Sending and Verifying Signed Messages.4.2.1.  Terminating a Context   A server can terminate any established context at any time.  The   server MAY hint to the client that the context is being deleted by   including a TKEY RR in a response with the Mode field set to 5, i.e.,   "key deletion" [RFC2930].  An active context is deleted by calling   GSS_Delete_sec_context providing the associated context_handle.5.  Sending and Verifying Signed Messages5.1.  Sending a Signed Message - Call GSS_GetMIC   The procedure for sending a signature-protected message is specified   in [RFC2845].  The data to be passed to the signature routine   includes the whole DNS message with specific TSIG variables appended.   For the exact format, see [RFC2845].  For this protocol, use the   following TSIG variable values:Kwan, et al.                Standards Track                    [Page 15]RFC 3645                        GSS-TSIG                    October 2003      TSIG Record        NAME = key_name that identifies this context        RDATA           Algorithm Name = gss-tsig   Assign the remaining fields in the TSIG RDATA appropriate values as   described in [RFC2845].   The signature is generated by calling GSS_GetMIC.  The following   input parameters MUST be used.  The outcome of the call is indicated   with the output values specified below.  Consult Sections 2.3.1   "GSS_GetMIC call" of the RFC 2743[RFC2743] for syntax definitions.   INPUTS     CONTEXT HANDLE context_handle = context_handle for key_name     OCTET STRING   message        = outgoing message plus TSIG                                     variables (per [RFC2845])     INTEGER qop_req               = 0 (0 requests a default         value).  Caller MAY instead specify other valid value (for         details see Section 1.2.4 in [RFC2743])   OUTPUTS     INTEGER        major_status     INTEGER        minor_status     OCTET STRING   per_msg_token   If major_status is GSS_S_COMPLETE, then signature generation   succeeded.  The signature in per_msg_token is inserted into the   Signature field of the TSIG RR and the message is transmitted.   If major_status is GSS_S_CONTEXT_EXPIRED, GSS_S_CREDENTIALS_EXPIRED   or GSS_S_FAILURE the caller MUST delete the security context, return   to the uninitialized state and SHOULD negotiate a new security   context, as described above in Section 3.1   If major_status is GSS_S_NO_CONTEXT, the caller MUST remove the entry   for key_name from the (target_ name, key_name, context_handle)   mapping table, return to the uninitialized state and SHOULD negotiate   a new security context, as described above in Section 3.1   If major_status is GSS_S_BAD_QOP, the caller SHOULD repeat the   GSS_GetMIC call with allowed QOP value.  The number of such   repetitions MUST be limited to prevent infinite loops.5.2.  Verifying a Signed Message - Call GSS_VerifyMIC   The procedure for verifying a signature-protected message is   specified in [RFC2845].Kwan, et al.                Standards Track                    [Page 16]RFC 3645                        GSS-TSIG                    October 2003   The NAME of the TSIG record determines which context_handle maps to   the context that MUST be used to verify the signature.  If the NAME   does not map to an established context, the server MUST send a   standard TSIG error response to the client indicating BADKEY in the   TSIG error field (as described in [RFC2845]).   For the GSS algorithm, a signature is verified by using   GSS_VerifyMIC:   INPUTS     CONTEXT HANDLE context_handle = context_handle for key_name     OCTET STRING   message        = incoming message plus TSIG                                     variables (per [RFC2845])     OCTET STRING   per_msg_token  = Signature field from TSIG RR   OUTPUTS     INTEGER        major_status     INTEGER        minor_status     INTEGER        qop_state   If major_status is GSS_S_COMPLETE, the signature is authentic and the   message was delivered intact.  Per [RFC2845], the timer values of the   TSIG record MUST also be valid before considering the message to be   authentic.  The caller MUST not act on the request or response in the   message until these checks are verified.   When a server is processing a client request, the server MUST send a   standard TSIG error response to the client indicating BADKEY in the   TSIG error field as described in [RFC2845], if major_status is set to   one of the following values        GSS_S_DEFECTIVE_TOKEN        GSS_S_BAD_SIG (GSS_S_BAD_MIC)        GSS_S_DUPLICATE_TOKEN        GSS_S_OLD_TOKEN        GSS_S_UNSEQ_TOKEN        GSS_S_GAP_TOKEN        GSS_S_CONTEXT_EXPIRED        GSS_S_NO_CONTEXT        GSS_S_FAILURE   If the timer values of the TSIG record are invalid, the message MUST   NOT be considered authentic.  If this error checking fails when a   server is processing a client request, the appropriate error response   MUST be sent to the client according to [RFC2845].Kwan, et al.                Standards Track                    [Page 17]RFC 3645                        GSS-TSIG                    October 20036.  Example usage of GSS-TSIG algorithm   This Section describes an example where a Client, client.example.com,   and a Server, server.example.com, establish a security context   according to the algorithm described above.  I.  Client initializes security context negotiation  To establish a security context with a server, server.example.com, the  Client calls GSS_Init_sec_context with the following parameters.  (Note that some INPUT and OUTPUT parameters not critical for this  algorithm are not described in this example.)     CONTEXT HANDLE input_context_handle  = 0     INTERNAL NAME  targ_name             = "DNS@server.example.com"     OCTET STRING   input_token           = NULL     BOOLEAN        replay_det_req_flag   = TRUE     BOOLEAN        mutual_req_flag       = TRUE  The OUTPUTS parameters returned by GSS_Init_sec_context include     INTEGER        major_status = GSS_S_CONTINUE_NEEDED     CONTEXT HANDLE output_context_handle context_handle     OCTET STRING   output_token output_token     BOOLEAN        replay_det_state = TRUE     BOOLEAN        mutual_state = TRUE  Client verifies that replay_det_state and mutual_state values are  TRUE.  Since the major_status is GSS_S_CONTINUE_NEEDED, which is a  success OUTPUT major_status value, client stores context_handle that  maps to "DNS@server.example.com" and proceeds to the next step.  II.  Client sends a query with QTYPE = TKEY to server  Client sends a query with QTYPE = TKEY for a client-generated globally  unique domain name string, 789.client.example.com.server.example.com.  Query contains a TKEY record in its Additional records section with  the following fields.  (Note that some fields not specific to this  algorithm are not specified.)     NAME = 789.client.example.com.server.example.com.     RDATA        Algorithm Name      = gss-tsig        Mode                = 3 (GSS-API negotiation - per [RFC2930])        Key Size            = size of output_token in octets        Key Data            = output_tokenKwan, et al.                Standards Track                    [Page 18]RFC 3645                        GSS-TSIG                    October 2003  After the key_name 789.client.example.com.server.example.com.  is generated it is stored in the client's (target_name, key_name,  context_handle) mapping table.  III.  Server receives a query with QTYPE = TKEY  When server receives a query with QTYPE = TKEY, the server verifies  that Mode and Algorithm fields in the TKEY record in the Additional  records section of the query are set to 3 and "gss-tsig" respectively.  It finds that the key_name 789.client.example.com.server.example.com.  is not listed in its (key_name, context_handle) mapping table.  IV.  Server calls GSS_Accept_sec_context  To continue security context negotiation server calls  GSS_Accept_sec_context with the following parameters.  (Note that  some INPUT and OUTPUT parameters not critical for this algorithm  are not described in this example.)   INPUTS     CONTEXT HANDLE input_context_handle  = 0     OCTET STRING   input_token           = token specified in the Key                              field from TKEY RR (from Additional                              records section of the client's query)  The OUTPUTS parameters returned by GSS_Accept_sec_context include     INTEGER        major_status = GSS_S_CONTINUE_NEEDED     CONTEXT_HANDLE output_context_handle context_handle     OCTET STRING   output_token output_token  Server stores the mapping of the  789.client.example.com.server.example.com. to OUTPUT context_handle  in its (key_name, context_handle) mapping table.  V.  Server responds to the TKEY query  Since the major_status = GSS_S_CONTINUE_NEEDED in the last server's  call to GSS_Accept_sec_context, the server responds to the TKEY query  placing in the answer section a TKEY record containing output_token in  the Key Data RDATA field.  The error field in the TKEY record is set  to 0.  The RCODE in the query response is set to NOERROR.  VI.  Client processes token returned by server  When the client receives the TKEY query response from the server, the  client calls GSS_Init_sec_context with the following parameters.  (Note that some INPUT and OUTPUT parameters not critical for this  algorithm are not described in this example.)Kwan, et al.                Standards Track                    [Page 19]RFC 3645                        GSS-TSIG                    October 2003     CONTEXT HANDLE input_context_handle  = the context_handle stored          in the client's mapping table entry (DNS@server.example.com.,          789.client.example.com.server.example.com., context_handle)     INTERNAL NAME  targ_name             = "DNS@server.example.com"     OCTET STRING   input_token           = token from Key field of TKEY          record from the Answer section of the server's response     BOOLEAN        replay_det_req_flag   = TRUE     BOOLEAN        mutual_req_flag       = TRUE  The OUTPUTS parameters returned by GSS_Init_sec_context include     INTEGER        major_status = GSS_S_COMPLETE     CONTEXT HANDLE output_context_handle = context_handle     OCTET STRING   output_token = output_token     BOOLEAN        replay_det_state = TRUE     BOOLEAN        mutual_state = TRUE  Since the major_status is set to GSS_S_COMPLETE the client side  security context is established, but since the output_token is not  NULL client MUST send a TKEY query to the server as described below.  VII.  Client sends a query with QTYPE = TKEY to server  Client sends to the server a TKEY query for the  789.client.example.com.server.example.com. name.  Query contains a  TKEY record in its Additional records section with the following

?? 快捷鍵說明

復(fù)制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
欧美久久久久久久久久| 欧美午夜不卡视频| 亚洲国产精品二十页| 另类的小说在线视频另类成人小视频在线 | 99久久综合99久久综合网站| 91精品国产美女浴室洗澡无遮挡| 亚洲国产三级在线| 欧美午夜寂寞影院| 国产精品免费视频一区| 欧美一卡二卡三卡四卡| 亚洲成人三级小说| 色婷婷国产精品久久包臀| ㊣最新国产の精品bt伙计久久| 欧美天天综合网| 午夜国产精品一区| 欧美日韩国产欧美日美国产精品| 久久久久久97三级| 日韩理论片网站| 亚洲国产日产av| 成人精品视频一区二区三区 | 久久久久久97三级| 亚洲成人免费视频| 日韩欧美www| 亚洲国产一区二区a毛片| k8久久久一区二区三区 | 欧美日韩亚洲综合一区| 欧美丰满少妇xxxxx高潮对白| 亚洲日穴在线视频| 色综合久久久网| 国产午夜久久久久| 99麻豆久久久国产精品免费| 精品久久久久香蕉网| 成人av电影免费观看| 亚洲一区在线播放| 亚洲一级不卡视频| 精品国产一区二区国模嫣然| 久久成人免费电影| 国产成人免费在线观看不卡| 午夜精品成人在线| 欧美在线视频全部完| 三级在线观看一区二区| 91精品国产综合久久香蕉麻豆| 亚洲三级久久久| 欧美猛男男办公室激情| 日韩av电影免费观看高清完整版 | 欧美一区二区三区免费在线看| 国产在线精品免费av| 日韩av电影免费观看高清完整版| 亚洲视频在线一区观看| 亚洲色图色小说| 亚洲视频免费在线观看| 亚洲黄色录像片| 亚洲国产美女搞黄色| 亚洲美女淫视频| 午夜影视日本亚洲欧洲精品| 日韩一区精品视频| 欧美变态tickle挠乳网站| 狠狠色丁香婷综合久久| 中文字幕日本不卡| 色狠狠综合天天综合综合| 国产精品中文欧美| 日韩精品国产精品| 国产精品性做久久久久久| 亚洲一二三专区| 欧美日韩一卡二卡| 91美女片黄在线观看91美女| 午夜精品久久久久久久| 亚洲一区二区视频| 亚洲影院久久精品| 亚洲精品中文字幕乱码三区| 国产精品久久久久久久裸模 | 青青青伊人色综合久久| 日韩电影免费一区| 成人性生交大片免费看视频在线| youjizz国产精品| 欧美日韩亚洲综合一区| 日韩精品一区二区三区视频在线观看| 国产丝袜美腿一区二区三区| 色狠狠色噜噜噜综合网| 欧美成人猛片aaaaaaa| 国产精品国产三级国产aⅴ无密码| 国产精品美女一区二区三区 | 国产精品白丝av| 91丨国产丨九色丨pron| 日韩三级免费观看| 婷婷一区二区三区| 99久久99久久综合| 国产精品色一区二区三区| 亚洲一二三专区| 91美女精品福利| 久久亚洲免费视频| 亚洲一二三区在线观看| 秋霞电影网一区二区| 91久久精品一区二区三| 欧美精彩视频一区二区三区| 日韩va欧美va亚洲va久久| 99久久久国产精品| 国产欧美日本一区视频| 精品一区二区三区在线播放视频| 欧美在线观看一区二区| 亚洲丝袜另类动漫二区| 不卡的电影网站| 中文字幕不卡的av| 成人网在线播放| 日韩理论在线观看| 色综合久久久久久久久久久| 一区二区在线观看视频| 欧美午夜片在线观看| 亚洲国产欧美日韩另类综合 | 精品成人a区在线观看| 久久97超碰国产精品超碰| 久久久久久久电影| 99国产精品视频免费观看| 一区二区三区视频在线观看| 欧美高清精品3d| 精品写真视频在线观看| 中文字幕免费观看一区| 91福利社在线观看| 蜜臀久久99精品久久久久久9 | 中文天堂在线一区| 在线观看av不卡| 久久aⅴ国产欧美74aaa| 久久精品男人天堂av| 欧美中文字幕久久| 久久成人免费电影| 一区二区三区在线不卡| 日韩精品一区二区三区四区视频| 成人三级伦理片| 麻豆成人av在线| 亚洲美女精品一区| 国产欧美一区二区三区鸳鸯浴 | 蜜桃视频一区二区| 亚洲欧美日韩一区二区三区在线观看| 一区二区三区.www| 日韩午夜激情av| 91香蕉视频污| 日韩一区二区三区四区| 91精品1区2区| 国产曰批免费观看久久久| 亚洲国产精品久久人人爱| 日韩三级在线观看| 日本韩国欧美在线| 日韩高清欧美激情| av在线这里只有精品| 欧洲一区二区av| 国产黄色91视频| 国产一区二区不卡| 狠狠色综合播放一区二区| 久久99精品久久久久婷婷| 午夜久久久久久久久| 亚洲三级电影网站| 亚洲免费资源在线播放| 精品一区二区三区蜜桃| 精品亚洲国内自在自线福利| 亚洲成av人片在线观看| 亚洲制服丝袜一区| 一区二区三区视频在线看| 中文字幕一区二区视频| 国产精品久久久久7777按摩| 久久久久免费观看| 亚洲欧洲精品一区二区三区| 日本一区二区免费在线| 国产免费成人在线视频| 一区二区三区不卡视频| 久久99精品久久久| 懂色一区二区三区免费观看 | 国产成人福利片| 成人永久aaa| 欧美日韩免费观看一区三区| 91精品国产欧美一区二区18| 久久亚洲综合av| 1000部国产精品成人观看| 亚洲国产精品麻豆| 精品美女一区二区三区| 国产欧美一区二区精品性色超碰| 欧美韩国日本一区| 成人午夜视频免费看| 欧美日本在线播放| 久久青草欧美一区二区三区| 日韩高清一区二区| 国产精品资源在线看| 欧美精选一区二区| 91一区二区在线| 美女网站在线免费欧美精品| 色综合网色综合| 欧美videos中文字幕| 亚洲精品视频一区| 久久精品一区二区三区不卡牛牛| 亚洲综合成人在线| 国产精品一区二区在线播放 | 亚洲欧美日韩久久| eeuss鲁片一区二区三区在线看| 欧美一区二区美女| 99视频在线精品| 精品一区二区三区在线观看 | 国产欧美日韩麻豆91| 欧美一级电影网站| 美美哒免费高清在线观看视频一区二区 | 日韩精品专区在线影院观看| 成人妖精视频yjsp地址|