⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 rfc2093.txt

📁 著名的RFC文档,其中有一些文档是已经翻译成中文的的.
💻 TXT
📖 第 1 页 / 共 4 页
字号:
   In sensitive systems it will need encryption prior to transmission.4.2 Create Grp Keys_1:   This message passes the information needed to create the group keys   from the GC to the selected net member.  This message contains (Grp   ID, Request, GTEK ID, GKEK ID, GTEK creation field, GKEK creation   field, Grp token, Controller signature, Controller public)Harney & Muckenhirn           Experimental                      [Page 6]RFC 2093                   GKMP Specification                  July 19974.3 Create Grp Keys_2:   This message passes the information needed to create the group keys   from the selected net member to the GC. This message contains:  (Grp   ID, GTEK ID, GKEK ID, GTEK creation field, GKEK creation field,   member signature, member public)4.4 Negotiate Grp Keys_1:   This message passes the group token and GCs permissions to the   selected net member.  This information can be sensitive and needs to   be protected.  Therefor, this message is encrypted in the GTEK just   created.  This encryption includes the appropriate data integrity   checks.  This message1 contains:  (Grp ID, TEK ID, KEK ID, Group   token, Controller permissions)4.5 Negotiate Grp Keys_2:   This message passes the selected net members permissions to the GC.   This message1 contains:  (Grp ID, GTEK ID, GKEK ID, Member   permissions).  This information can be sensitive and needs to be   protected.  Therefor, this message is encrypted in the GTEK just   created.  This encryption includes the appropriate data integrity   checks.4.6 Create Session KEK_1:   This message sends information to create a KEK for one time use   between the GC and selected net member.4.7 Create Session KEK_2:   This message sends information to create a KEK for one time use   between the selected net member and GC.4.8 Negotiate Session Keys_1:   This message passes the group ID, SKEK ID, CRL version number, Group   token and GCs permissions to the selected net member.  This   information can be sensitive and needs to be protected.  Therefor,   this message is encrypted.  If an appropriate pairwise key is   available then that key should be used.  If not the KEK just created   could be used to encrypt the message.Harney & Muckenhirn           Experimental                      [Page 7]RFC 2093                   GKMP Specification                  July 19974.9 Negotiate Session Keys_2:   This message identifies the group, SKEK, CRL version number and the   member permissions.  This information can also be sensitive and needs   protection.4.10 Download Grp Keys:   This message includes a GRP ID and Encrypted Grp Keys data items.4.11 Key download ack:   This message contains the GRP ID and Confirmation_decryption data   items.  It confirms the receipt and verified decryption of the GTEK   and GKEK.4.12 Rekey _Multicast:   This message contains:  Grp ID, GTEK ID, GKEK ID, Group token,   Controller permissions.  The rekey message is encrypted in the GKEK   already resident in all the group member sites.  This leads to a   single message capable of being accepted by all group members.4.13 Request_Group_Join:   This message contains Request, Grp ID, Member Signature, Member   Public.4.14 Delete_Group_Keys:   This message contains:  grp ID, Request, Member delete list,   Controller signature, Controllers public.4.15 Grp_Keys_Deleted_Ack:   This message contains (grp ID, member ID, member signature, member   public.4.16 Delete_Group_Keys:   This message contains (grp ID, request, member delete list,   controller signature, controller public).4.17 Grp_Keys_Deleted_Ack:   This message contains (grp ID, member ID, member signature, member   public)Harney & Muckenhirn           Experimental                      [Page 8]RFC 2093                   GKMP Specification                  July 19975 State definitions   There are thirteen separate states the in the protocol.  They are   described below:5.1 State 1:   The source address is checked to ensure it is not on the CRL.   The token field is validated with the public key of the source.   The token version number is checked to ensure this token is current.   The group ID is checked to see if this group exists.   The controller ID field is then read.  If the receiver is listed as   the GC, the receiver assumes the role of controller.  If not, the   role assumed is that of receiver.   The GC reads the group permission field in the group token.  It then   verifies that its' personnel permissions exceed or equal those of the   group.   The GC will creates its' portion of the key creation message.   The Create Grp Keys_1 message is completed and transmitted.5.2 State 2:   The source signature field is validated using the public key of the   source.   The source ID field is compared against the local CRL. If the source   is on the CRL the association is terminated.   The request field is read.  The local contributions to the group keys   are created.   The Group keys are created and stored pending negotiation.   The key table is updated to show the group key pending negotiation.5.3 State 3:   The permission certificate is retrieved and validated using the   security managers public key.  The permissions of the message source   are checked to verify they meet or exceed those of the group.Harney & Muckenhirn           Experimental                      [Page 9]RFC 2093                   GKMP Specification                  July 1997   The group token is retrieved and validated using the appropriate   public key.   The token version number is checked to ensure the token is current.   The group ID specified in the token is compared with the actual group   ID. If they are different the exchange is terminated.   The controller ID specified in the token is compared with the GC ID.   If they do not match the exchange is terminated.   The local permissions are compared to the permissions specified for   the group.  If they do not meet or exceed the group permissions the   exchange is terminated and a report is generated.   The rekey interval specified in the token is stored locally.   The key table is updated to reflect the key permissions, rekey   interval, group ID and current time.5.4 State 4:   The permission certificate is retrieved and validated using the   security members public key.  The permissions of the message source   are checked to verify they meet or exceed those of the group.   The key table is updated to reflect the key permissions, rekey   interval, group ID and current time.5.5 State 5:   The source signature field is validated using the public key of the   source.   The source ID field is compared against the local CRL. If the source   is on the CRL, the association is terminated.   The request field is read.  The local contribution to the SKEK are   created.  The SKEK is created and stored pending negotiation.   The key table is updated to show the SKEK pending negotiation.5.6 State 6:   The permission certificate is retrieved and validated using the   security managers public key.  The permissions of the message source   are checked to verify they meet or exceed those of the group.Harney & Muckenhirn           Experimental                     [Page 10]RFC 2093                   GKMP Specification                  July 1997   The group token is retrieved and validated using the appropriate   public key.   The token version number is checked to ensure the token is current.   The group ID specified in the token is stored.   The controller ID specified in the token is compared with the GC ID.   If they do not match the exchange is terminated.   The local permissions are compared to the permissions specified for   the group.  If they do not meet or exceed the group permissions the   exchange is terminated and a report is generated.   The rekey interval specified in the token is stored locally.   The key table is updated to reflect the key permissions, rekey   interval, group ID and current time.5.7 State 7:   The permission certificate is retrieved and validated using the   security managers public key.  The permissions of the message source   are checked to verify they meet or exceed those of the group.   The key table is updated.5.8 State 8:   The group ID is checked.   The group keys are decrypted using the SKEK. Data integrity checks   are validated to ensure proper decryption.   The key table is updated to reflect the new group keys, key   permissions, rekey interval, group ID and current time.5.9 State 9:   Update group management log.5.10 State 10:   The permission certificate is retrieved and validated using the   security managers public key.  The permissions of the message source   are checked to verify they meet or exceed those of the group.Harney & Muckenhirn           Experimental                     [Page 11]RFC 2093                   GKMP Specification                  July 1997   The group token is retrieved and validated using the appropriate   public key.   The token version number is checked to ensure the token is current.   The group ID specified in the token is checked.   The controller ID specified in the token is compared with the GC ID.   If they do not match the exchange is terminated.   The local permissions are compared to the permissions specified for   the group.  If they do not meet or exceed the group permissions the   exchange is terminated and a report is generated.   The rekey interval specified in the token is stored locally.   The new group keys are decrypted with the current GKEK. The data   integrity field is checked to ensure proper decryption.   The key table is updated to reflect the key permissions, rekey   interval, group ID and current time.5.11 State 11:

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -