⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 draft-ietf-pkix-ldap-pki-schema-00.txt

📁 PKIX的RFC英文文档
💻 TXT
📖 第 1 页 / 共 4 页
字号:
7. Filter ExamplesThe following examples are written using the string representation of Search filters defined in [18]. Line-breaks have been added as an aid to readability.i) To match on the serial number of a PKI certificate using extensibleMatch with component matching       (userCertificate:componentFilterMatch:=       item:{ component "serialNumber", rule integerMatch,       value 12345 })ii) To exactly match one certificate using extensibleMatch with certificateExactMatch and GSERCertificateExactAssertion        (userCertificate:certificateExactMatch:= {serialNumber 12345 ,       issuer rdnSequence: "O=truetrust ltd, C=GB" } )iii) To exactly match one certificate using equalityMatch with certificateExactMatch and GSERCertificateExactAssertion      (UserCertificate= {serialNumber 12345 , issuer rdnSequence:       "O=truetrust ltd, C=GB" })iv) To exactly match one certificate using equalityMatch with certificateExactMatch and SimpleCertificateExactAssertion      (UserCertificate=12345$O=truetrust ltd, C=GB)v) To exactly match one certificate using extensibleMatch with component matching      (userCertificate:componentFilterMatch:=and:{      item:{ component "serialNumber", rule integerMatch, value 12345 },      item:{ component "issuer.rdnSequence", rule      distinguishedNameMatch, value "O=truetrust ltd, C=GB"  } })vi) To match on certificates containing a certain email address as a subjectAltName      (userCertificate:componentFilterMatch:=item:{       component "toBeSigned.extensions.*.extnValue.       content.(2.5.29.17).*.rfc822Name",       rule caseIgnoreIA5Match, value "person@email.address.com" })8. Security ConsiderationsThis [Internet Draft/Standard] describes the schema for the storageand matching of attribute certificates and revocation lists in anLDAP directory server. It does not address the protocol for theretrieval of this information.LDAP servers SHOULD use access control information to protect theinformation during its storage. In addition, clients MAY choose toencrypt the attributes in the attribute certificates before storingthem in an LDAP server.9. ReferencesNormative[1] Bradner, S. The Internet Standards Process -- Revision 3. RFC2026  October 1996.[4] J. Sermersheim "Lightweight Directory Access Protocol (v3)" <draft-ietf-ldapbis-protocol-02.txt> July 2001[5] S.Bradner. "Key words for use in RFCs to Indicate RequirementLevels", RFC 2119, March 1997.[6] M. Wahl, S. Kille, T. Howes. "Lightweight Directory AccessProtocol (v3): UTF-8 String Representation of Distinguished Names",RFC2253, December 1997.[9] ITU-T Rec. X.509(2000) The  Directory:  AuthenticationFramework[10] D. Crocker, P. Overell, "Augmented BNF for SyntaxSpecifications: ABNF", RFC 2234, November 1997[13] S. Legg, "Generic String Encoding Rules", <draft-legg-ldap-gser-XX.txt>, March 2002, a work in progress[16] S. Legg, "Common Elements of GSER Encodings", <draft-legg-ldap-gser-abnf-XX.txt>, March 2002, a work in progressInformative[2] Yeong, W., Howes, T., and Kille, S. "Lightweight Directory AccessProtocol", RFC 1777, March 1995.[8] S.Boeyen, T. Howes, P. Richard "Internet X.509 Public KeyInfrastructure, LDAPv2 Schema", RFC 2587, June 1999[12] Howes, T., Kille, S., Yeong, W., Robbins, C., "The String Representation of Standard Attribute Syntaxes", RFC 1778, March 1995[14] R. Housley, W. Ford, W Polk, D. Solo. "Internet X.509 Public Key Infrastructure - Certificate and CRL Profile" <draft-ietf-pkix-new-part1-08.txt>, July 2001[17] M. Wahl, "A Summary of the X.500(96) User Schema for use with LDAPv3", RFC 2256, Dec 1997[18] Howes, T. "The String Representation of LDAP Search Filters". RFC 2254, December 1997.10. Intellectual Property NoticeThe IETF takes no position regarding the validity or scope of anyintellectual property or other rights that might be claimed topertain to the implementation or use of the technology described inthis document or the extent to which any license under such rightsmight or might not be available; neither does it represent that it hasmade any effort to identify any such rights.Information on theIETF's procedures with respect to rights in standards-track andstandards-related documentation can be found in BCP-11. [BCP-11]Copies of claims of rights made available for publication and anyassurances of licenses to be made available, or the result of anattempt made to obtain a general license or permission for the use ofsuch proprietary rights by implementors or users of this specificationcan be obtained from the IETF Secretariat.The IETF invites any interested party to bring to its attention anycopyrights, patents or patent applications, or other proprietaryrights which may cover technology that may be required to practicethis standard.Please address the information to the IETF ExecutiveDirector.11. CopyrightCopyright (C) The Internet Society (2001). All Rights Reserved.This document and translations of it may be copied and furnished toothers, and derivative works that comment on or otherwise explain itor assist in its implementation may be prepared, copied, publishedand distributed, in whole or in part, without restriction of anykind, provided that the above copyright notice and this paragraph areincluded on all such copies and derivative works. However, thisdocument itself may not be modified in any way, such as by removingthe copyright notice or references to the Internet Society or otherInternet organizations, except as needed for the purpose ofdeveloping Internet standards in which case the procedures forcopyrights defined in the Internet Standards process must befollowed, or as required to translate it into languages other thanEnglish.The limited permissions granted above are perpetual and will not berevoked by the Internet Society or its successors or assigns.This document and the information contained herein is provided on an"AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERINGTASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDINGBUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATIONHEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OFMERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.12. Authors' AddressesDavid ChadwickIS InstituteUniversity of SalfordSalfordEnglandM5 4WTEmail: d.w.chadwick@salford.ac.ukSteven LeggAdacel Technologies Ltd.405-409 Ferntree Gully Road,Mount Waverley,Victoria, 3149AustraliaEmail: steven.legg@adacel.com.au13. Changes >From <draft-pkix-ldap-schema-00.txt>i) Added ABNF notation for all of the syntaxes.ii) Removed the restriction on the syntax of Distribution Point Names.iii) Removed constraints on IssuerSerial.iv) Bug detected in X.509 AttributeCertificateExactMatch that will needresolving.v) Changed the string encodings for non-exact matches to keywords for each component instead of $ separators.>From <draft-pkix-ldap-schema-01.txt>i)	Added and corrected all X.509 PKI schema definitions, since these have been removed from RFC2252-bis.ii)	Changed assertion syntaxes to use the syntax defined by Component Matching Rulesiii)	Included all the matching rules for AC extensions>From <draft-pkix-ldap-schema-02.txt>i)	Separation in PKI and PMI IDs.ii)	Examples of filters have been addediii)	Text has been added to mandate that servers must store and retrieve many of the syntaxes defined in this ID exactly as given.iv)	The ;binary encoding option has been removed in accordance with work in the LDAPBIS group. A new LDAP-specific encoding has been defined which has exactly the same syntax as the old ;binary encoding.v)	We have obsoleted RFC 2587 and RFC 2256 and copied the relevant schemas into this document.vi)	We have added some new PKI schema appearing for the first time in X.509(2000) e.g. pkiPath14. Outstanding Issuesi.	We need to decide if userSMIMECertificates should also be supported as part of this profile or not.ii.	We have added a CPS attribute and a CPS pointer attribute. These are adapted from the certificationPracticeStmt attribute in the X.509 standard which is a choice of either the CPS or a pointer to it. However our pointer is simply a URI (as in the CPS qualifier extension in the PKIX profile) whereas the X.500 pointer is a GeneralName and an optional hash. Are these changes sensible and acceptable?iii.	We have added a matching rule to the certificatePolicy attribute. No matching rule is defined in X.509, so we have reported this as a defect. Should we stick with the X.509 syntax or create two alternative attributes (a pointer and a policy) as in the CPS case.iv.	We have made the matching rule for supportedAlgorithms as the objectIdentifierFirstComponentMatch. RFC2256 did not specify any matching rule and X.509(2001) specifies a more complex matching rule. Should we align with X.509 or not?15. Table of Contents1. Introduction	12. Subschema Publishing	23. PKI Attributes and Syntaxes	23.1  userCertificate Attribute	23.2  cACertificate Attribute	23.3  Certificate Syntax	23.4 authorityRevocationList Attribute	33.5 certificateRevocationList Attribute	33.6 deltaRevocationList Attribute	33.7 Certificate List Syntax	33.8 crossCertificatePair Attribute	43.9	Certificate Pair Syntax	43.10	PKI Path Attribute	43.11  PKI Path Syntax	53.12  CPS Attribute	53.13  CPS Pointer Attribute	53.14 Certificate Policy Attribute	53.15 Certificate Policy Syntax	53.16  Certificate Policy Pointer Attribute	63.17  Supported Algorithms Attribute	63.18 Supported Algorithm Syntax	64. Public Key Certificate Matching Rules and Assertion Syntaxes	64.1  Certificate Exact Match	74.2 Certificate Match	84.3 Certificate Pair Exact Match	124.4 Certificate Pair Match	125 Certificate Revocation List Matching Rules	135.1  Certificate List Exact Match	135.2 Certificate List Match	146. PKI Object Classes	156.1 PKI user object class	156.2 PKI CA object class	166.3 CRL Distribution Point object class	166.4 Delta CRL object class	166.5 Certificate Policy and CPS object class	166.6 PKI Certification Path object class	167. Filter Examples	168. Security Considerations	179. References	18Normative	18Informative	1810. Intellectual Property Notice	1811. Copyright	1912. Authors' Addresses	1913. Changes	2014. Outstanding Issues	2015. Table of Contents	21

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -