rfc1847.txt

来自「中、英文RFC文档大全打包下载完全版 .」· 文本 代码 · 共 620 行 · 第 1/2 页

TXT
620
字号
    --Signed Boundary--2.2.  Definition of Multipart/Encrypted   (1)  MIME type name: multipart   (2)  MIME subtype name: encrypted   (3)  Required parameters: boundary, protocol   (4)  Optional parameters: none   (5)  Security considerations: none   The multipart/encrypted content type contains exactly two body parts.   The first body part contains the control information necessary to   decrypt the data in the second body part and is labeled according to   the value of the protocol parameter.  The second body part contains   the data which was encrypted and is always labeled   application/octet-stream.   The attribute token for the protocol parameter is "protocol", i.e.,    parameter := "protocol" "=" valueGalvin, et al               Standards Track                     [Page 6]RFC 1847                  Security Multiparts               October 1995   The value token is comprised of the type and sub-type tokens of the   Content-Type: header of the first body part, i.e.,    value := <"> type "/" subtype <">   where the type and subtype tokens are defined by the MIME [2]   specification.  The semantics of the protocol parameter are defined   according to its value.   When creating a multipart/encrypted body part, the following sequence   of steps describes the processing necessary.  It must be emphasized   that these steps are descriptive, not prescriptive, and in no way   impose restrictions or requirements on implementations of this   specification.   (1)  The contents of the body part to be protected is prepared according        to a local convention.  The contents are then transformed into a        MIME body part in canonical MIME format, including an appropriate        set of MIME headers.   (2)  The body part (headers and content) to be encrypted is prepared for        encryption according to the value of the protocol parameter.  The        MIME headers of the encrypted body part are included in the        encryption to protect from disclosure the MIME labeling of the        data that is encrypted.   (3)  The prepared body part is made available to the encryption process        according to a local convention.  The encryption process must make        available to a MIME implementation two data streams: the control        information necessary to decrypt the body part, which the MIME        implementation will place in the first body part and label        according to the value of the protocol parameter, and the        encrypted body part, which the MIME implementation will place in        the second body part and label application/octet-stream.  Thus,        when used in a multipart/encrypted, the application/octet-stream        data is comprised of a nested MIME body part.   When receiving a multipart/encrypted body part, the following   sequence of steps describes the processing necessary to decrypt the   enclosed data.  It must be emphasized that these steps are   descriptive, not prescriptive, and in no way impose restrictions or   requirements on implementations of this specification.   (1)  The second body part and the control information in the first body        part must be prepared for the decryption process according to the        value of the protocol parameter.Galvin, et al               Standards Track                     [Page 7]RFC 1847                  Security Multiparts               October 1995   (2)  The prepared body parts must be made available to the decryption        process according to a local convention.  The decryption process        must make available to the MIME implementation the result of the        decryption and the decrypted form of the encrypted body part.            NOTE: The result of the decryption process is likely to            include a testament of the success or failure of the            decryption.  Failure may be due to an inability to locate            the proper decryption key or the proper recipient field,            etc.  Implementors should note that the data, if any, of a            failed decryption process is pretty much guaranteed to be            garbage.   (3)  The result of the decryption process is made available to the user        and the MIME implementation continues processing with the decrypted        body part, i.e., the body part returned by the decryption process.            NOTE: A MIME implementation will not be able to display the            received form of the second body part because the            application of encryption will transform the body part.            This transformation will not be described in the MIME            headers (Content-Type: and Content-Transfer-Encoding:) but,            rather, will be described in the content of the first body            part.  Therefore, an implementation should wait until the            encryption has been removed before attempting to display            the content.   The following example is an illustration of a multipart/encrypted   body part.  It is necessarily incomplete since the control   information is defined by the security protocol, which must be   specified in a separate document.    Content-Type: multipart/encrypted; protocol="TYPE/STYPE";            boundary="Encrypted Boundary"    --Encrypted Boundary    Content-Type: TYPE/STYPE    CONTROL INFORMATION for protocol "TYPE/STYPE" would be here    --Encrypted Boundary    Content-Type: application/octet-stream        Content-Type: text/plain; charset="us-ascii"Galvin, et al               Standards Track                     [Page 8]RFC 1847                  Security Multiparts               October 1995        All of this indented text, including the indented headers,        would be unreadable since it would have been encrypted by        the protocol "TYPE/STYPE".  Also, this encrypted data could        be any type of data, labeled accordingly, of course.    --Encrypted Boundary--3.  Definition of Control Information Content Types   This document defines a framework within which security services may   be applied to MIME body parts.  A minimal MIME implementation will be   able to recognize multipart/signed and multipart/encrypted body parts   and be able to identify the protected data and control information   body parts within them.   Complete support for security services requires the MIME agent to   recognize the value of the protocol parameter and to continue   processing based on its value.  The value of the protocol parameter   is the same value used to label the content type of the control   information.   The value of the protocol parameter and the resulting processing   required must be specified in the document defining the security   protocol used.  That document must also precisely specify the   contents of the control information body part.4.  Definition of Key Management Content Types   This specification recognizes that the complete specification of a   MIME-based security protocol must include a mechanism for   distributing the cryptographic material used in support of the   security services.  For example, a digital signature service   implemented with asymmetric cryptography requires that a signer's   public key be available to the signee.   One possible mechanism for distributing cryptographic material is to   define two additional body parts: one for the purpose of requesting   cryptographic information and one for the purpose of returning the   cryptographic information requested.  The specification of a security   protocol may include a definition of two such body parts or it may   specify an alternate mechanism for the distribution of cryptographic   material.Galvin, et al               Standards Track                     [Page 9]RFC 1847                  Security Multiparts               October 19955.  Security Considerations   This specification describes an enhancement to MIME to support signed   and encrypted body parts.  In that context this entire document is   about security.6.  Acknowledgements   David H. Crocker suggested the use of a multipart structure for the   MIME and PEM interaction.7.  References   [1] Crocker, D., "Standard for the Format of ARPA Internet Text       Messages", STD 11, RFC 822, University of Delaware, August 1982.   [2] Borenstein, N., and N. Freed, "MIME (Multipurpose Internet Mail       Extension) Part One: Mechanisms for Specifying and Describing the       Format of Internet Message Bodies", RFC 1521, Bellcore and       Innosoft, September 1993.Galvin, et al               Standards Track                    [Page 10]RFC 1847                  Security Multiparts               October 19958.  Authors' Addresses   Jim Galvin   Trusted Information Systems   3060 Washington Road   Glenwood, MD  21738   Phone: +1 301 854 6889   Fax: +1 301 854 5363   EMail:  galvin@tis.com   Sandy Murphy   Trusted Information Systems   3060 Washington Road   Glenwood, MD  21738   Phone: +1 301 854 6889   Fax: +1 301 854 5363   EMail:  sandy@tis.com   Steve Crocker   CyberCash, Inc.   2086 Hunters Crest Way   Vienna, VA 22181   Phone::    +1 703 620 1222   Fax:    +1 703 391 2651   EMail:  crocker@cybercash.com   Ned Freed   Innosoft International, Inc.   1050 East Garvey Avenue South   West Covina, CA 91790   Phone: +1 818 919 3600   Fax: +1 818 919 3614   EMail:  ned@innosoft.comGalvin, et al               Standards Track                    [Page 11]

⌨️ 快捷键说明

复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?