⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 rfc2480.txt

📁 中、英文RFC文档大全打包下载完全版 .
💻 TXT
字号:
Network Working Group                                        N. FreedRequest for Comments: 2480               Innosoft International, Inc.Category: Standards Track                                January 1999                 Gateways and MIME Security MultipartsStatus of this Memo   This document specifies an Internet standards track protocol for the   Internet community, and requests discussion and suggestions for   improvements.  Please refer to the current edition of the "Internet   Official Protocol Standards" (STD 1) for the standardization state   and status of this protocol.  Distribution of this memo is unlimited.Copyright Notice   Copyright (C) The Internet Society (1999).  All Rights Reserved.1.  Abstract   This document examines the problems associated with use of MIME   security multiparts and gateways to non-MIME environments. A set of   requirements for gateway behavior are defined which provide   facilities necessary to properly accomodate the transfer of security   multiparts through gateways.2.  Requirements Notation   This document occasionally uses terms that appear in capital letters.   When the terms "MUST", "MUST NOT", "SHOULD", "SHOULD NOT", and "MAY"   appear capitalized, they are being used to indicate particular   requirements of this specification. A discussion of the meanings of   the terms "MUST", "SHOULD", and "MAY" appears in  RFC 1123 [2]; the   terms "MUST NOT" and "SHOULD NOT" are logical extensions of this   usage.3.  The Problem   Security multiparts [RFC-1847] provide an effective way to add   integrity and confidentiality services to protocols that employ MIME   objects [RFC-2045, RFC-2046]. Difficulties arise, however, in   heterogeneous environments involving gateways to environments that   don't support MIME. Specifically:    (1)   Security services have to be applied to MIME objects in          their entirety. Failure to do so can lead to security          exposures.Freed                       Standards Track                     [Page 1]RFC 2480         Gateways and MIME Security Multiparts      January 1999          For example, a signature that covers only object data and not          the object's MIME labels would allow someone to tamper with          the labels in an undetectable fashion.  Similarly, failure to          encrypt MIME label information exposes information about the          content that could facilitate traffic analysis.          Composite MIME objects (e.g., multipart/mixed, message/rfc822)          also have to be secured as a unit.  Again, failure to do so          may facilitate tampering, reveal important information          unnecessarily, or both.    (2)   Gateways that deal with MIME objects have to be able to          convert them to non-MIME formats.          For example, gateways often have to transform MIME labelling          information into other forms. MIME type information may end up          being expressed as a file extension or as an OID.          Gateways also have to take apart composite MIME objects into          their component parts, converting the resulting set of parts          into whatever form the non-MIME environments uses for          composite objects. Failure to do so makes the objects unusable          in any environment that doesn't support MIME. In many cases          this also means that multi-level MIME structures have to be          converted into a sequential list of parts.    (3)   Security services have to be deployed in an end-to-end          fashion. Failure to do so again can lead to security          exposures.          An integrity service deployed at something other than a          connection end point means a region exists between the point          where the integrity service is applied and the actual end          point where object tampering is possible. A confidentiality          service deployed at something other than a connection end          point means a region exists where the object is transferred in          the clear. And worse, distributed private keys are usually          necessary whenever someone other than the originator applies          an integrity service or someone other than the recipient          removes a confidentiality service, which in turn may make          theft of private key information a possibility.          All of these issues can be addressed, of course. For example,          it may be possible to use multiple overlapping security          services to assure that no exposure exists even though there          is no end-to-end security per se. And keys can be distributed          in a secure fashion. However, such designs tend to be quite          complex, and complexity in a security system is highlyFreed                       Standards Track                     [Page 2]RFC 2480         Gateways and MIME Security Multiparts      January 1999          undesireable.   The preceeding three requirments are fundamentally in conflict: It is   possible to satisfy two of them at once, but not all three at once.   In fact the conflict is even worse than it first appears. In most   situations of this sort some sort of compromise is possible which,   while not satisfying any of the requirements completely, does   optimize some sort of average of all the requirements. Such a   solution does not exist in this case, however, because many real   world situations exist where any one of these requirements absolutely   must be satisfied.4.  Solving the Problem   Since the previously described problem doesn't allow for a single   solution the only viable approach is to require that gateways provide   multiple solutions.  In particular, gateways    (1)   MUST provide the ability to tunnel multipart/signed and          multipart/encrypted objects as monolithic entities if there is          any chance whatsoever that MIME capabilities exist on the          non-MIME side of the gateway. No changes to content of the          multipart are permitted, even when the content is itself a          composite MIME object.          This option must be provided so that entities behind the          gateway that are capable of processing security multiparts and          their MIME content will work properly.  As mentioned          previously, situations exist where application security          requirements are absolute and must be accomodated, even when          meeting them causes problems for other agents.          Exceptions are allowed only when there is no possibility of          MIME support on one side of the gateway.  For example, a          gateway to a voice messaging system may have no useful way to          represent a signed MIME object.    (2)   MUST provide the ability to take apart multipart/signed          objects, exposing the content (and in the process ruining the          signature). When this approach is selected, gateways SHOULD          NOT remove the signature. Instead, gateways SHOULD keep the          signature intact and add to it a note that it will probably be          invalid for checking the message contents, but may still be          contain valuable information about the sender.Freed                       Standards Track                     [Page 3]RFC 2480         Gateways and MIME Security Multiparts      January 1999          This option must be provided so that entities behind the          gateway which are incapable of processing MIME will work          properly.    (3)   SHOULD provide the ability to select between the previous two          options on per-user basis.    (4)   MAY provide facilities to check signatures and decrypt          encrypted content. Such facilities MUST NOT be enabled by          default; the potential security exposure involved has to be          assessed before such capabilities can be used.    (5)   MAY provide facilities to sign and/or encrypt material passing          from the non-MIME side to the MIME side of the gateway. Again,          such facilities MUST NOT be enabled by default; the potential          security exposure involved in the transfer of unsecured          content within the application domain behind the gateway has          to be assessed before such capabilities can be used.   A gateway which complies with the above requirements is considered to   be security multiparts compliant.5.  Security Considerations   This entire document is about security.Freed                       Standards Track                     [Page 4]RFC 2480         Gateways and MIME Security Multiparts      January 19996.  References   [RFC-822]  Crocker, D., "Standard for the Format of ARPA Internet              Text Messages", STD 11, RFC 822, August, 1982.   [RFC-1847] Galvin, J., Murphy, S., Crocker, S. and N. Freed,              "Security Multiparts for MIME: Multipart/Signed and              Multipart/Encrypted", RFC 1847, October 1995.   [RFC-1123] Braden, R., Ed., "Requirements for Internet Hosts --              Application and Support", STD 3, RFC 1123, October 1989.   [RFC-2045] Freed, N. and N. Borenstein, "Multipurpose Internet Mail              Extensions (MIME) Part One: Format of Internet Message              Bodies", RFC 2045, December 1996.   [RFC-2046] Freed, N. and N. Borenstein, "Multipurpose Internet Mail              Extensions (MIME) Part Two: Media Types", RFC 2046,              December 1996.   [RFC-2049] Freed, N. and N. Borenstein, "Multipurpose Internet Mail              Extensions (MIME) Part Five: Conformance Criteria and              Examples", RFC 2049, December 1996.7.  Author's Address   Ned Freed   Innosoft International, Inc.   1050 Lakes Drive   West Covina, CA 91790   USA   Phone: +1 626 919 3600   Fax:   +1 626 919 3614   EMail: ned.freed@innosoft.comFreed                       Standards Track                     [Page 5]RFC 2480         Gateways and MIME Security Multiparts      January 19998.  Full Copyright Statement   Copyright (C) The Internet Society (1999).  All Rights Reserved.   This document and translations of it may be copied and furnished to   others, and derivative works that comment on or otherwise explain it   or assist in its implementation may be prepared, copied, published   and distributed, in whole or in part, without restriction of any   kind, provided that the above copyright notice and this paragraph are   included on all such copies and derivative works.  However, this   document itself may not be modified in any way, such as by removing   the copyright notice or references to the Internet Society or other   Internet organizations, except as needed for the purpose of   developing Internet standards in which case the procedures for   copyrights defined in the Internet Standards process must be   followed, or as required to translate it into languages other than   English.   The limited permissions granted above are perpetual and will not be   revoked by the Internet Society or its successors or assigns.   This document and the information contained herein is provided on an   "AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING   TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING   BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION   HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF   MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.Freed                       Standards Track                     [Page 6]

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -