亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? rfc2831.txt

?? 中、英文RFC文檔大全打包下載完全版 .
?? TXT
?? 第 1 頁 / 共 4 頁
字號:
Network Working Group                                           P. LeachRequest for Comments: 2831                                     MicrosoftCategory: Standards Track                                      C. Newman                                                                Innosoft                                                                May 2000            Using Digest Authentication as a SASL MechanismStatus of this Memo   This document specifies an Internet standards track protocol for the   Internet community, and requests discussion and suggestions for   improvements.  Please refer to the current edition of the "Internet   Official Protocol Standards" (STD 1) for the standardization state   and status of this protocol.  Distribution of this memo is unlimited.Copyright Notice   Copyright (C) The Internet Society (2000).  All Rights Reserved.Abstract   This specification defines how HTTP Digest Authentication [Digest]   can be used as a SASL [RFC 2222] mechanism for any protocol that has   a SASL profile. It is intended both as an improvement over CRAM-MD5   [RFC 2195] and as a convenient way to support a single authentication   mechanism for web, mail, LDAP, and other protocols.Table of Contents   1 INTRODUCTION.....................................................2    1.1 CONVENTIONS AND NOTATION......................................2    1.2 REQUIREMENTS..................................................3   2 AUTHENTICATION...................................................3    2.1 INITIAL AUTHENTICATION........................................3     2.1.1 Step One...................................................3     2.1.2 Step Two...................................................6     2.1.3 Step Three................................................12    2.2 SUBSEQUENT AUTHENTICATION....................................12     2.2.1 Step one..................................................13     2.2.2 Step Two..................................................13    2.3 INTEGRITY PROTECTION.........................................13    2.4 CONFIDENTIALITY PROTECTION...................................14   3 SECURITY CONSIDERATIONS.........................................15    3.1 AUTHENTICATION OF CLIENTS USING DIGEST AUTHENTICATION........15    3.2 COMPARISON OF DIGEST WITH PLAINTEXT PASSWORDS................16    3.3 REPLAY ATTACKS...............................................16Leach & Newman              Standards Track                     [Page 1]RFC 2831                 Digest SASL Mechanism                  May 2000    3.4 ONLINE DICTIONARY ATTACKS....................................16    3.5 OFFLINE DICTIONARY ATTACKS...................................16    3.6 MAN IN THE MIDDLE............................................17    3.7 CHOSEN PLAINTEXT ATTACKS.....................................17    3.8 SPOOFING BY COUNTERFEIT SERVERS..............................17    3.9 STORING PASSWORDS............................................17    3.10 MULTIPLE REALMS.............................................18    3.11 SUMMARY.....................................................18   4 EXAMPLE.........................................................18   5 REFERENCES......................................................20   6 AUTHORS' ADDRESSES..............................................21   7 ABNF............................................................21    7.1 AUGMENTED BNF................................................21    7.2 BASIC RULES..................................................23   8 SAMPLE CODE.....................................................25   9 FULL COPYRIGHT STATEMENT........................................271  Introduction   This specification describes the use of HTTP Digest Access   Authentication as a SASL mechanism. The authentication type   associated with the Digest SASL mechanism is "DIGEST-MD5".   This specification is intended to be upward compatible with the   "md5-sess" algorithm of HTTP/1.1 Digest Access Authentication   specified in [Digest]. The only difference in the "md5-sess"   algorithm is that some directives not needed in a SASL mechanism have   had their values defaulted.   There is one new feature for use as a SASL mechanism: integrity   protection on application protocol messages after an authentication   exchange.   Also, compared to CRAM-MD5, DIGEST-MD5 prevents chosen plaintext   attacks, and permits the use of third party authentication servers,   mutual authentication, and optimized reauthentication if a client has   recently authenticated to a server.1.1  Conventions and Notation   This specification uses the same ABNF notation and lexical   conventions as HTTP/1.1 specification; see appendix A.   Let { a, b, ... } be the concatenation of the octet strings a, b, ...   Let H(s) be the 16 octet MD5 hash [RFC 1321] of the octet string s.Leach & Newman              Standards Track                     [Page 2]RFC 2831                 Digest SASL Mechanism                  May 2000   Let KD(k, s) be H({k, ":", s}), i.e., the 16 octet hash of the string   k, a colon and the string s.   Let HEX(n) be the representation of the 16 octet MD5 hash n as a   string of 32 hex digits (with alphabetic characters always in lower   case, since MD5 is case sensitive).   Let HMAC(k, s) be the 16 octet HMAC-MD5 [RFC 2104] of the octet   string s using the octet string k as a key.   The value of a quoted string constant as an octet string does not   include any terminating null character.1.2  Requirements   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this   document are to be interpreted as described in RFC 2119 [RFC 2119].   An implementation is not compliant if it fails to satisfy one or more   of the MUST level requirements for the protocols it implements. An   implementation that satisfies all the MUST level and all the SHOULD   level requirements for its protocols is said to be "unconditionally   compliant"; one that satisfies all the MUST level requirements but   not all the SHOULD level requirements for its protocols is said to be   "conditionally compliant."2  Authentication   The following sections describe how to use Digest as a SASL   authentication mechanism.2.1  Initial Authentication   If the client has not recently authenticated to the server, then it   must perform "initial authentication", as defined in this section. If   it has recently authenticated, then a more efficient form is   available, defined in the next section.2.1.1  Step One   The server starts by sending a challenge. The data encoded in the   challenge contains a string formatted according to the rules for a   "digest-challenge" defined as follows:Leach & Newman              Standards Track                     [Page 3]RFC 2831                 Digest SASL Mechanism                  May 2000   digest-challenge  =         1#( realm | nonce | qop-options | stale | maxbuf | charset               algorithm | cipher-opts | auth-param )        realm             = "realm" "=" <"> realm-value <">        realm-value       = qdstr-val        nonce             = "nonce" "=" <"> nonce-value <">        nonce-value       = qdstr-val        qop-options       = "qop" "=" <"> qop-list <">        qop-list          = 1#qop-value        qop-value         = "auth" | "auth-int" | "auth-conf" |                             token        stale             = "stale" "=" "true"        maxbuf            = "maxbuf" "=" maxbuf-value        maxbuf-value      = 1*DIGIT        charset           = "charset" "=" "utf-8"        algorithm         = "algorithm" "=" "md5-sess"        cipher-opts       = "cipher" "=" <"> 1#cipher-value <">        cipher-value      = "3des" | "des" | "rc4-40" | "rc4" |                            "rc4-56" | token        auth-param        = token "=" ( token | quoted-string )   The meanings of the values of the directives used above are as   follows:   realm      Mechanistically, a string which can enable users to know which      username and password to use, in case they might have different      ones for different servers. Conceptually, it is the name of a      collection of accounts that might include the user's account. This      string should contain at least the name of the host performing the      authentication and might additionally indicate the collection of      users who might have access. An example might be      "registered_users@gotham.news.example.com".  This directive is      optional; if not present, the client SHOULD solicit it from the      user or be able to compute a default; a plausible default might be      the realm supplied by the user when they logged in to the client      system. Multiple realm directives are allowed, in which case the      user or client must choose one as the realm for which to supply to      username and password.   nonce      A server-specified data string which MUST be different each time a      digest-challenge is sent as part of initial authentication.  It is      recommended that this string be base64 or hexadecimal data. Note      that since the string is passed as a quoted string, the      double-quote character is not allowed unless escaped (see section      7.2). The contents of the nonce are implementation dependent. TheLeach & Newman              Standards Track                     [Page 4]RFC 2831                 Digest SASL Mechanism                  May 2000      security of the implementation depends on a good choice. It is      RECOMMENDED that it contain at least 64 bits of entropy. The nonce      is opaque to the client. This directive is required and MUST      appear exactly once; if not present, or if multiple instances are      present, the client should abort the authentication exchange.   qop-options      A quoted string of one or more tokens indicating the "quality of      protection" values supported by the server.  The value "auth"      indicates authentication; the value "auth-int" indicates      authentication with integrity protection; the value "auth-conf"      indicates authentication with integrity protection and encryption.      This directive is optional; if not present it defaults to "auth".      The client MUST ignore unrecognized options; if the client      recognizes no option, it should abort the authentication exchange.   stale      The "stale" directive is not used in initial authentication. See      the next section for its use in subsequent authentications. This      directive may appear at most once; if multiple instances are      present, the client should abort the authentication exchange.   maxbuf      A number indicating the size of the largest buffer the server is      able to receive when using "auth-int" or "auth-conf". If this      directive is missing, the default value is 65536. This directive      may appear at most once; if multiple instances are present, the      client should abort the authentication exchange.   charset      This directive, if present, specifies that the server supports      UTF-8 encoding for the username and password. If not present, the      username and password must be encoded in ISO 8859-1 (of which      US-ASCII is a subset). The directive is needed for backwards      compatibility with HTTP Digest, which only supports ISO 8859-1.      This directive may appear at most once; if multiple instances are      present, the client should abort the authentication exchange.   algorithm      This directive is required for backwards compatibility with HTTP      Digest., which supports other algorithms. . This directive is      required and MUST appear exactly once; if not present, or if      multiple instances are present, the client should abort the      authentication exchange.Leach & Newman              Standards Track                     [Page 5]RFC 2831                 Digest SASL Mechanism                  May 2000   cipher-opts      A list of ciphers that the server supports. This directive must be      present exactly once if "auth-conf" is offered in the      "qop-options" directive, in which case the "3des" and "des" modes      are mandatory-to-implement. The client MUST ignore unrecognized      options; if the client recognizes no option, it should abort the      authentication exchange.      des         the Data Encryption Standard (DES) cipher [FIPS] in cipher         block chaining (CBC) mode with a 56 bit key.      3des         the "triple DES" cipher in CBC mode with EDE with the same key         for each E stage (aka "two keys mode") for a total key length         of 112 bits.      rc4, rc4-40, rc4-56         the RC4 cipher with a 128 bit, 40 bit, and 56 bit key,         respectively.   auth-param This construct allows for future extensions; it may appear      more than once. The client MUST ignore any unrecognized      directives.   For use as a SASL mechanism, note that the following changes are made   to "digest-challenge" from HTTP: the following Digest options (called   "directives" in HTTP terminology) are unused (i.e., MUST NOT be sent,   and MUST be ignored if received):    opaque    domain   The size of a digest-challenge MUST be less than 2048 bytes.2.1.2  Step Two   The client makes note of the "digest-challenge" and then responds   with a string formatted and computed according to the rules for a   "digest-response" defined as follows:Leach & Newman              Standards Track                     [Page 6]RFC 2831                 Digest SASL Mechanism                  May 2000   digest-response  = 1#( username | realm | nonce | cnonce |                          nonce-count | qop | digest-uri | response |                          maxbuf | charset | cipher | authzid |                          auth-param )       username         = "username" "=" <"> username-value <">       username-value   = qdstr-val       cnonce           = "cnonce" "=" <"> cnonce-value <">       cnonce-value     = qdstr-val       nonce-count      = "nc" "=" nc-value       nc-value         = 8LHEX       qop              = "qop" "=" qop-value       digest-uri       = "digest-uri" "=" <"> digest-uri-value <">       digest-uri-value  = serv-type "/" host [ "/" serv-name ]       serv-type        = 1*ALPHA       host             = 1*( ALPHA | DIGIT | "-" | "." )       serv-name        = host       response         = "response" "=" response-value       response-value   = 32LHEX       LHEX             = "0" | "1" | "2" | "3" |                          "4" | "5" | "6" | "7" |                          "8" | "9" | "a" | "b" |                          "c" | "d" | "e" | "f"       cipher           = "cipher" "=" cipher-value       authzid          = "authzid" "=" <"> authzid-value <">       authzid-value    = qdstr-val   username      The user's name in the specified realm, encoded according to the      value of the "charset" directive. This directive is required and      MUST be present exactly once; otherwise, authentication fails.   realm      The realm containing the user's account. This directive is      required if the server provided any realms in the      "digest-challenge", in which case it may appear exactly once and

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
久久网这里都是精品| 欧美精选一区二区| 亚洲视频一二三| 91亚洲大成网污www| 亚洲欧美成人一区二区三区| 91浏览器在线视频| 亚洲777理论| 欧美精品久久久久久久多人混战| 日本aⅴ精品一区二区三区 | 成人av电影在线观看| 国产精品女主播av| 色婷婷亚洲一区二区三区| 亚洲尤物在线视频观看| 欧美一级夜夜爽| 国产一区二区三区四| 国产精品久久久久久久久免费桃花 | 亚洲同性gay激情无套| 色婷婷综合视频在线观看| 午夜久久福利影院| 国产午夜精品美女毛片视频| aaa国产一区| 天天操天天干天天综合网| 精品国产91乱码一区二区三区| 国产酒店精品激情| 亚洲毛片av在线| 日韩免费电影一区| 色综合久久九月婷婷色综合| 日本91福利区| 国产精品不卡视频| 欧美一级xxx| a级高清视频欧美日韩| 人禽交欧美网站| 国产精品国产自产拍高清av| 欧美日韩一区二区在线视频| 国产在线不卡一区| 亚洲风情在线资源站| 国产精品天美传媒| 日韩美女在线视频 | 国产成人综合在线播放| 亚洲成人精品一区二区| 国产日韩精品一区二区三区| 51久久夜色精品国产麻豆| 成人av网站大全| 国内久久精品视频| 亚洲国产精品久久人人爱| 欧美激情一区不卡| 欧美一区二区三区男人的天堂| 一本色道a无线码一区v| 国产乱子伦一区二区三区国色天香| 亚洲精品第1页| 国产精品美女久久久久av爽李琼| 7777女厕盗摄久久久| 99国产精品久久久久久久久久 | 国产精品69久久久久水密桃| 午夜久久福利影院| 一区二区成人在线| 国产精品国产精品国产专区不蜜| wwwwxxxxx欧美| 欧美一级片免费看| 欧美老人xxxx18| 91国内精品野花午夜精品| 成人午夜免费视频| 国产麻豆精品theporn| 麻豆精品视频在线观看视频| 亚洲丰满少妇videoshd| 亚洲一二三区在线观看| 亚洲蜜桃精久久久久久久| 国产精品传媒入口麻豆| 国产精品天天看| 国产精品久久久一本精品| 久久久亚洲国产美女国产盗摄| 欧美mv日韩mv| 精品久久久久一区二区国产| 欧美大片一区二区三区| 日韩一区二区三区四区五区六区| 91精品麻豆日日躁夜夜躁| 欧美日韩国产首页在线观看| 欧美日韩中文一区| 欧美丰满少妇xxxbbb| 欧美精品1区2区3区| 欧美日韩一二三| 欧美疯狂性受xxxxx喷水图片| 欧美三区在线观看| 日韩视频免费观看高清在线视频| 日韩免费一区二区| 亚洲精品一区二区精华| 久久久不卡网国产精品二区| 久久视频一区二区| 日本一区二区三区国色天香| 国产精品美女久久久久久久久久久| 国产精品高潮呻吟| 亚洲高清免费视频| 青青草97国产精品免费观看 | 亚洲第一在线综合网站| 亚洲高清免费一级二级三级| 日韩成人一区二区三区在线观看| 日本不卡一区二区三区| 久久99国产精品免费| 国产一区二区三区精品欧美日韩一区二区三区 | 香蕉av福利精品导航| 水野朝阳av一区二区三区| 美女视频网站黄色亚洲| 国产成人综合在线| 在线观看日韩一区| 日韩欧美高清一区| 欧美韩国日本综合| 综合在线观看色| 亚洲电影一级黄| 狂野欧美性猛交blacked| 国产福利91精品| 91国产免费观看| 日韩欧美国产成人一区二区| 国产精品国产三级国产专播品爱网| 一区二区成人在线| 激情深爱一区二区| 91视频国产观看| 精品少妇一区二区三区在线播放| 国产精品不卡在线| 久久不见久久见免费视频1 | 在线中文字幕一区| 日韩欧美国产综合一区| 国产精品国产a| 免费成人小视频| 色综合久久六月婷婷中文字幕| 91精品国产乱| 亚洲欧美激情小说另类| 老司机一区二区| 色妞www精品视频| 久久久99久久| 视频一区视频二区中文| 丁香啪啪综合成人亚洲小说| 日韩你懂的电影在线观看| 夜夜爽夜夜爽精品视频| 高清不卡一二三区| 欧美mv日韩mv| 日韩精品三区四区| 色8久久人人97超碰香蕉987| 久久蜜桃一区二区| 日韩va欧美va亚洲va久久| 色诱视频网站一区| 中文字幕av不卡| 国模娜娜一区二区三区| 欧美福利电影网| 亚洲丶国产丶欧美一区二区三区| 99久久国产综合色|国产精品| 久久无码av三级| 精品一区二区三区视频| 欧美电影一区二区| 天天操天天干天天综合网| 色欲综合视频天天天| 日韩一区欧美一区| 成人av在线网| 国产精品水嫩水嫩| 成人性生交大合| 久久久精品天堂| 国产精品1024久久| 久久久久国产成人精品亚洲午夜| 久久99精品一区二区三区| 日韩一区二区在线看| 免费视频最近日韩| 日韩精品一区二区三区视频| 免费日本视频一区| 日韩一级高清毛片| 麻豆freexxxx性91精品| 欧美成人女星排名| 国产麻豆视频一区二区| 亚洲国产高清不卡| 丁香桃色午夜亚洲一区二区三区| 国产午夜亚洲精品午夜鲁丝片| 国产资源精品在线观看| 久久久久久综合| 懂色av中文一区二区三区| 中文字幕av一区 二区| 91麻豆自制传媒国产之光| 一区二区在线观看免费视频播放| 91福利精品第一导航| 亚洲成人高清在线| 欧美一级在线观看| 国产麻豆91精品| 中文字幕一区二区在线观看 | 午夜精品久久久久久久久| 欧美另类久久久品| 九九国产精品视频| 国产亚洲精品7777| fc2成人免费人成在线观看播放 | 日韩av一区二区在线影视| 日韩一区二区三区观看| 国产精品小仙女| 亚洲欧美一区二区三区久本道91 | 亚洲国产精品精华液2区45| 成人福利在线看| 一区二区久久久| 日韩精品一区二区三区四区视频| 国产精品一区二区你懂的| 亚洲欧洲色图综合| 在线91免费看| 成人性生交大片免费看在线播放 | 日韩国产高清影视| 久久久久高清精品| 91福利视频在线|