亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? rfc3645.txt

?? bind 9.3結合mysql數據庫
?? TXT
?? 第 1 頁 / 共 4 頁
字號:
  fields.  (Note that some INPUT and OUTPUT parameters not critical to  this algorithm are not described in this example.)     NAME = 789.client.example.com.server.example.com.     RDATA        Algorithm Name      = gss-tsig        Mode                = 3 (GSS-API negotiation - per [RFC2930])        Key Size            = size of output_token in octets        Key Data            = output_token  VIII.  Server receives a TKEY query  When the server receives a TKEY query, the server verifies that Mode  and Algorithm fields in the TKEY record in the Additional records  section of the query are set to 3 and gss-tsig, respectively.  It  finds that the key_name 789.client.example.com.server.example.com. is  listed in its (key_name, context_handle) mapping table.Kwan, et al.                Standards Track                    [Page 20]RFC 3645                        GSS-TSIG                    October 2003  IX.  Server calls GSS_Accept_sec_context  To continue security context negotiation server calls  GSS_Accept_sec_context with the following parameters (Note that some  INPUT and OUTPUT parameters not critical for this algorithm are not  described in this example)   INPUTS     CONTEXT HANDLE input_context_handle  = context_handle from the           (789.client.example.com.server.example.com., context_handle)           entry in the server's mapping table     OCTET STRING   input_token           = token specified in the Key           field of TKEY RR (from Additional records Section of           the client's query)  The OUTPUTS parameters returned by GSS_Accept_sec_context include     INTEGER        major_status = GSS_S_COMPLETE     CONTEXT_HANDLE output_context_handle = context_handle     OCTET STRING   output_token = NULL  Since major_status = GSS_S_COMPLETE, the security context on the  server side is established, but the server still needs to respond to  the client's TKEY query, as described below.  The security context  state is advanced to Context Established.  X.  Server responds to the TKEY query  Since the major_status = GSS_S_COMPLETE in the last server's call to  GSS_Accept_sec_context and the output_token is NULL, the server  responds to the TKEY query placing in the answer section a TKEY record  that was sent by the client in the Additional records section of the  client's latest TKEY query.  In addition, this server places a  TSIG record in additional records section of its response.  Server  calls GSS_GetMIC to generate a signature to include it in the TSIG  record.  The server specifies the following GSS_GetMIC INPUT  parameters:     CONTEXT HANDLE context_handle = context_handle from the           (789.client.example.com.server.example.com., context_handle)           entry in the server's mapping table     OCTET STRING   message        = outgoing message plus TSIG                                   variables (as described in [RFC2845])  The OUTPUTS parameters returned by GSS_GetMIC include     INTEGER        major_status = GSS_S_COMPLETE     OCTET STRING   per_msg_token  Signature field in the TSIG record is set to per_msg_token.Kwan, et al.                Standards Track                    [Page 21]RFC 3645                        GSS-TSIG                    October 2003  XI.  Client processes token returned by server  Client receives the TKEY query response from the server.  Since the  major_status was GSS_S_COMPLETE in the last client's call to  GSS_Init_sec_context, the client verifies that the server's response  is signed.  To validate the signature, the client calls  GSS_VerifyMIC with the following parameters:   INPUTS     CONTEXT HANDLE context_handle = context_handle for                  789.client.example.com.server.example.com. key_name     OCTET STRING   message        = incoming message plus TSIG                                  variables (as described in [RFC2845])     OCTET STRING   per_msg_token  = Signature field from TSIG RR                  included in the server's query response  Since the OUTPUTS parameter major_status = GSS_S_COMPLETE, the  signature is validated, security negotiation is complete and the  security context state is advanced to Context Established.  These  client and server will use the established security context to sign  and validate the signatures when they exchange packets with each  other until the context expires.7.  Security Considerations   This document describes a protocol for DNS security using GSS-API.   The security provided by this protocol is only as effective as the   security provided by the underlying GSS mechanisms.   All the security considerations from RFC 2845, RFC 2930 and RFC 2743   apply to the protocol described in this document.8.  IANA Considerations   The IANA has reserved the TSIG Algorithm name gss-tsig for the use in   the Algorithm fields of TKEY and TSIG resource records.  This   Algorithm name refers to the algorithm described in this document.   The requirement to have this name registered with IANA is specified   in RFC 2845.9.  Conformance   The GSS API using SPNEGO [RFC2478] provides maximum flexibility to   choose the underlying security mechanisms that enables security   context negotiation.  GSS API using SPNEGO [RFC2478] enables client   and server to negotiate and choose such underlying security   mechanisms on the fly.  To support such flexibility, DNS clients and   servers SHOULD specify SPNEGO mech_type in their GSS API calls.  AtKwan, et al.                Standards Track                    [Page 22]RFC 3645                        GSS-TSIG                    October 2003   the same time, in order to guarantee interoperability between DNS   clients and servers that support GSS-TSIG it is required that   -  DNS servers specify SPNEGO mech_type   -  GSS APIs called by DNS client support Kerberos v5   -  GSS APIs called by DNS server support SPNEGO [RFC2478] and      Kerberos v5.   In addition to these, GSS APIs used by DNS client and server MAY also   support other underlying security mechanisms.10.  Intellectual Property Statement   The IETF takes no position regarding the validity or scope of any   intellectual property or other rights that might be claimed to   pertain to the implementation or use of the technology described in   this document or the extent to which any license under such rights   might or might not be available; neither does it represent that it   has made any effort to identify any such rights.  Information on the   IETF's procedures with respect to rights in standards-track and   standards-related documentation can be found in BCP-11.  Copies of   claims of rights made available for publication and any assurances of   licenses to be made available, or the result of an attempt made to   obtain a general license or permission for the use of such   proprietary rights by implementors or users of this specification can   be obtained from the IETF Secretariat.   The IETF invites any interested party to bring to its attention any   copyrights, patents or patent applications, or other proprietary   rights which may cover technology that may be required to practice   this standard.  Please address the information to the IETF Executive   Director.11.  Acknowledgements   The authors of this document would like to thank the following people   for their contribution to this specification:  Chuck Chan, Mike   Swift, Ram Viswanathan, Olafur Gudmundsson, Donald E. Eastlake, 3rd   and Erik Nordmark.Kwan, et al.                Standards Track                    [Page 23]RFC 3645                        GSS-TSIG                    October 200312.  References12.1.  Normative References   [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate             Requirement Levels", BCP 14, RFC 2119, March 1997.   [RFC2478] Baize, E. and D. Pinkas, "The Simple and Protected GSS-API             Negotiation Mechanism", RFC 2478, December 1998.   [RFC2743] Linn, J., "Generic Security Service Application Program             Interface, Version 2 , Update 1", RFC 2743, January 2000.   [RFC2845] Vixie, P., Gudmundsson, O., Eastlake 3rd, D. and B.             Wellington, "Secret Key Transaction Authentication for DNS             (TSIG)", RFC 2845, May 2000.   [RFC2930] Eastlake 3rd, D., "Secret Key Establishment for DNS (TKEY             RR)", RFC 2930, September 2000.12.2.  Informative References   [ISO11578] "Information technology", "Open Systems Interconnection",              "Remote Procedure Call", ISO/IEC 11578:1996,              http://www.iso.ch/cate/d2229.html.   [RFC1034] Mockapetris, P., "Domain Names - Concepts and Facilities",             STD 13, RFC 1034, November 1987.   [RFC1035] Mockapetris, P., "Domain Names - Implementation and             Specification", STD 13, RFC 1034, November 1987.   [RFC1964] Linn, J., "The Kerberos Version 5 GSS-API Mechanism", RFC             1964, June 1996.   [RFC2025] Adams, C., "The Simple Public-Key GSS-API Mechanism             (SPKM)", RFC 2025, October 1996.   [RFC2137] Eastlake 3rd, D., "Secure Domain Name System Dynamic             Update", RFC 2137, April 1997.   [RFC2535] Eastlake 3rd, D., "Domain Name System Security Extensions",             RFC 2535, March 1999.Kwan, et al.                Standards Track                    [Page 24]RFC 3645                        GSS-TSIG                    October 200313.  Authors' Addresses   Stuart Kwan   Microsoft Corporation   One Microsoft Way   Redmond, WA  98052   USA   EMail: skwan@microsoft.com   Praerit Garg   Microsoft Corporation   One Microsoft Way   Redmond, WA  98052   USA   EMail: praeritg@microsoft.com   James Gilroy   Microsoft Corporation   One Microsoft Way   Redmond, WA  98052   USA   EMail: jamesg@microsoft.com   Levon Esibov   Microsoft Corporation   One Microsoft Way   Redmond, WA  98052   USA   EMail: levone@microsoft.com   Randy Hall   Lucent Technologies   400 Lapp Road   Malvern PA 19355   USA   EMail: randyhall@lucent.com   Jeff Westhead   Microsoft Corporation   One Microsoft Way   Redmond, WA  98052   USA   EMail: jwesth@microsoft.comKwan, et al.                Standards Track                    [Page 25]RFC 3645                        GSS-TSIG                    October 200314.  Full Copyright Statement   Copyright (C) The Internet Society (2003).  All Rights Reserved.   This document and translations of it may be copied and furnished to   others, and derivative works that comment on or otherwise explain it   or assist in its implementation may be prepared, copied, published   and distributed, in whole or in part, without restriction of any   kind, provided that the above copyright notice and this paragraph are   included on all such copies and derivative works.  However, this   document itself may not be modified in any way, such as by removing   the copyright notice or references to the Internet Society or other   Internet organizations, except as needed for the purpose of   developing Internet standards in which case the procedures for   copyrights defined in the Internet Standards process must be   followed, or as required to translate it into languages other than   English.   The limited permissions granted above are perpetual and will not be   revoked by the Internet Society or its successors or assignees.   This document and the information contained herein is provided on an   "AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING   TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING   BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION   HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF   MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.Acknowledgement   Funding for the RFC Editor function is currently provided by the   Internet Society.Kwan, et al.                Standards Track                    [Page 26]

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
午夜欧美电影在线观看| 欧洲激情一区二区| 色综合天天做天天爱| 91精品国产色综合久久ai换脸| 久久久av毛片精品| 日韩黄色在线观看| 91福利国产成人精品照片| 中文字幕高清不卡| 经典三级在线一区| 欧美日韩视频在线观看一区二区三区 | 91免费观看国产| www欧美成人18+| 蓝色福利精品导航| 欧美丰满少妇xxxbbb| 亚洲一二三专区| 色av一区二区| 亚洲欧美色综合| av不卡免费在线观看| 欧美激情一区二区三区四区 | 国产精品69毛片高清亚洲| 欧美久久久久中文字幕| 亚洲国产日韩av| 欧美怡红院视频| 一区二区三区在线观看国产| www.综合网.com| 欧美高清在线精品一区| 成人一区在线观看| 亚洲欧美一区二区视频| 不卡高清视频专区| 中文字幕一区二区视频| bt欧美亚洲午夜电影天堂| 国产精品国产三级国产| 99热99精品| 亚洲最新视频在线播放| 欧美日韩免费不卡视频一区二区三区| 亚洲日本va在线观看| 91丨九色丨尤物| 亚洲综合区在线| 777奇米成人网| 久久99国产精品久久99| 国产偷国产偷精品高清尤物| 成人av资源下载| 亚洲免费av网站| 欧美精选一区二区| 精品亚洲成a人| 久久久精品综合| 成人黄色在线网站| 亚洲国产aⅴ天堂久久| 欧美成人a视频| 成人免费高清在线观看| 亚洲一区二区三区小说| 日韩免费在线观看| 丁香五精品蜜臀久久久久99网站| 中文字幕一区免费在线观看| 欧美日韩国产综合一区二区三区 | 久久九九影视网| 91麻豆精品在线观看| 日本不卡视频一二三区| 久久在线观看免费| eeuss鲁片一区二区三区在线看| 亚洲精品久久嫩草网站秘色| 欧美一区日韩一区| 国产成人午夜高潮毛片| 亚洲一区欧美一区| 久久久亚洲综合| 欧美在线999| 国产麻豆日韩欧美久久| 一区二区三区在线观看视频| 欧美va亚洲va| 欧美丝袜丝交足nylons| 国产精品原创巨作av| 性做久久久久久久久| 中文字幕精品三区| 日韩欧美自拍偷拍| 日本久久精品电影| 国产成人激情av| 天天影视色香欲综合网老头| 国产精品国产馆在线真实露脸| 欧美一级黄色大片| 欧美在线免费播放| 不卡的看片网站| 国产一区二区0| 日韩二区三区在线观看| 亚洲视频一区二区免费在线观看 | 国产一区不卡精品| 日本中文一区二区三区| 亚洲自拍偷拍图区| 国产精品久久看| 久久久精品蜜桃| 日韩视频在线你懂得| 欧美精品日韩综合在线| 91香蕉视频污| 成人精品一区二区三区四区| 伦理电影国产精品| 日韩电影免费一区| 亚洲一区影音先锋| 伊人色综合久久天天人手人婷| 国产三级精品三级| 国产亚洲婷婷免费| 精品国产乱码久久| 日韩一区二区在线播放| 91.麻豆视频| 91 com成人网| 欧美一级爆毛片| 欧美一区二区国产| 欧美福利一区二区| 欧美日本在线视频| 在线不卡a资源高清| 欧美日韩精品免费观看视频| 在线免费视频一区二区| 91老司机福利 在线| 一本久久a久久免费精品不卡| av不卡免费在线观看| 99精品欧美一区二区三区综合在线| 国产美女精品在线| 福利一区在线观看| 成人午夜精品在线| 99久久伊人网影院| 色天使色偷偷av一区二区| 欧美视频一区在线| 在线不卡的av| 精品国产区一区| 久久久久亚洲蜜桃| **性色生活片久久毛片| 亚洲激情网站免费观看| 亚洲成人一区二区| 麻豆精品一区二区三区| 国产剧情一区二区| 国产不卡视频一区二区三区| 99久久99久久久精品齐齐| 欧美日韩一区小说| 欧美va在线播放| 国产精品第五页| 亚洲一区二区三区四区在线免费观看 | 午夜私人影院久久久久| 日韩av电影天堂| 国产精品66部| 色悠久久久久综合欧美99| 欧美三级中文字| 久久影院午夜论| 亚洲欧美日韩国产综合在线| 日韩精品乱码免费| 国产精品影音先锋| 色综合欧美在线视频区| 日韩欧美你懂的| 亚洲欧美一区二区在线观看| 日韩成人av影视| 成人a级免费电影| 日韩一区二区三区观看| 国产蜜臀97一区二区三区| 亚洲一区中文日韩| 国产成人av一区二区三区在线 | 日韩电影一二三区| 成人h动漫精品一区二区| 91精品午夜视频| 中文字幕一区在线| 久久精品国内一区二区三区| av电影在线不卡| 日韩免费看的电影| 亚洲一级电影视频| 成人黄色在线看| 精品美女在线观看| 亚洲成在人线在线播放| 99久久99久久免费精品蜜臀| 欧美videossexotv100| 亚洲国产精品综合小说图片区| 国产成人自拍高清视频在线免费播放| 在线观看一区不卡| 日本一区二区三级电影在线观看 | 蜜臀av性久久久久蜜臀aⅴ | 色婷婷av一区二区| 国产拍揄自揄精品视频麻豆| 免费欧美日韩国产三级电影| 色老汉av一区二区三区| 欧美国产精品中文字幕| 韩国三级在线一区| 7777精品伊人久久久大香线蕉| 亚洲欧美在线另类| 国产伦精一区二区三区| 日韩女优毛片在线| 日韩高清电影一区| 制服丝袜av成人在线看| 亚洲国产一区在线观看| 日本精品一区二区三区高清| 中文字幕一区二区日韩精品绯色| 国产精品一区二区三区乱码| 精品日韩在线一区| 日韩 欧美一区二区三区| 欧美视频在线观看一区二区| 一区二区三区在线免费视频| 色美美综合视频| 亚洲在线视频网站| 欧美中文字幕一二三区视频| 亚洲免费观看高清在线观看| 91蝌蚪porny九色| 亚洲精品欧美激情| 一本色道久久综合亚洲91| 亚洲乱码一区二区三区在线观看| 99精品国产99久久久久久白柏| 国产精品麻豆网站|