黄色在线观看视频-黄色在线免费看-黄色在线视频免费-黄色在线视频免费看-免费啪啪网-免费啪啪网站

首頁 考試吧論壇 Exam8視線 考試商城 網絡課程 模擬考試 考友錄 實用文檔 求職招聘 論文下載
2011中考 | 2011高考 | 2012考研 | 考研培訓 | 在職研 | 自學考試 | 成人高考 | 法律碩士 | MBA考試
MPA考試 | 中科院
四六級 | 職稱英語 | 商務英語 | 公共英語 | 托福 | 雅思 | 專四專八 | 口譯筆譯 | 博思 | GRE GMAT
新概念英語 | 成人英語三級 | 申碩英語 | 攻碩英語 | 職稱日語 | 日語學習 | 法語 | 德語 | 韓語
計算機等級考試 | 軟件水平考試 | 職稱計算機 | 微軟認證 | 思科認證 | Oracle認證 | Linux認證
華為認證 | Java認證
公務員 | 報關員 | 銀行從業資格 | 證券從業資格 | 期貨從業資格 | 司法考試 | 法律顧問 | 導游資格
報檢員 | 教師資格 | 社會工作者 | 外銷員 | 國際商務師 | 跟單員 | 單證員 | 物流師 | 價格鑒證師
人力資源 | 管理咨詢師考試 | 秘書資格 | 心理咨詢師考試 | 出版專業資格 | 廣告師職業水平
駕駛員 | 網絡編輯
衛生資格 | 執業醫師 | 執業藥師 | 執業護士
會計從業資格考試會計證) | 經濟師 | 會計職稱 | 注冊會計師 | 審計師 | 注冊稅務師
注冊資產評估師 | 高級會計師 | ACCA | 統計師 | 精算師 | 理財規劃師 | 國際內審師
一級建造師 | 二級建造師 | 造價工程師 | 造價員 | 咨詢工程師 | 監理工程師 | 安全工程師
質量工程師 | 物業管理師 | 招標師 | 結構工程師 | 建筑師 | 房地產估價師 | 土地估價師 | 巖土師
設備監理師 | 房地產經紀人 | 投資項目管理師 | 土地登記代理人 | 環境影響評價師 | 環保工程師
城市規劃師 | 公路監理師 | 公路造價師 | 安全評價師 | 電氣工程師 | 注冊測繪師 | 注冊計量師
繽紛校園 | 實用文檔 | 英語學習 | 作文大全 | 求職招聘 | 論文下載 | 訪談 | 游戲
您現在的位置: 考試吧(Exam8.com) > 軟件水平考試 > 計算機專業英語 > 正文

2. SSL Handshake Protocol Specification

2.1 SSL Handshake Protocol Flow

  The SSL Handshake Protocol has two major phases. The first phase is used to establish private communications. The second phase is used for client authentication.

Phase 1

  The first phase is the initial connection phase where both parties communicate their "hello" messages. The client initiates the conversation by sending the CLIENT-HELLO message. The server receives the CLIENT-HELLO message and processes it responding with the SERVER-HELLO message.
At this point both the client and server have enough information to know whether or not a new master key is needed. When a new master key is not needed, both the client and the server proceed immediately to phase 2.

  When a new master key is needed, the SERVER-HELLO message will contain enough information for the client to generate it. This includes the server's signed certificate (more about that later), a list of bulk cipher specifications (see below), and a connection-id (a connection-id is a randomly generated value generated by the server that is used by the client and server during a single connection). The client generates the master key and responds with a CLIENT-MASTER-KEY message (or an ERROR message if the server information indicates that the client and server cannot agree on a bulk cipher).

  It should be noted here that each SSL endpoint uses a pair of ciphers per connection (for a total of four ciphers). At each endpoint, one cipher is used for outgoing communications, and one is used for incoming communications. When the client or server generate a session key, they actually generate two keys, the SERVER-READ-KEY (also known as the CLIENT-WRITE-KEY) and the SERVER-WRITE-KEY (also known as the CLIENT-READ-KEY). The master key is used by the client and server to generate the various session keys (more about that later).

  Finally, the server sends a SERVER-VERIFY message to the client after the master key has been determined. This final step authenticates the server, because only a server which has the appropriate public key can know the master key.


Phase 2

  The second phase is the authentication phase. The server has already been authenticated by the client in the first phase, so this phase is primarily used to authenticate the client. In a typical scenario, the server will require something from the client and send a request. The client will answer in the positive if it has the needed information, or send an ERROR message if it does not. This protocol specification does not define the semantics of an ERROR response to a server request (e.g., an implementation can ignore the error, close the connection, etc. and still conform to this specification).

  When a party is done authenticating the other party, it sends its finished message. For the client, the CLIENT-FINISHED message contains the encrypted form of the CONNECTION-ID for the server to verify. If the verification fails, the server sends an ERROR message.

  Once a party has sent its finished message it must continue to listen to its peers messages until it too receives a finished message. Once a party has both sent a finished message and received its peers finished message, the SSL handshake protocol is done. At this point the application protocol begins to operate (Note: the application protocol continues to be layered on the SSL Record Protocol).


2.2 Typical Protocol Message Flow

  The following sequences define several typical protocol message flows for the SSL Handshake Protocol. In these examples we have two principals in the conversation: the client and the server. We use a notation commonly found in the literature [10]. When something is enclosed in curly braces "{something}key" then the something has been encrypted using "key".

  2.2.1 Assuming no session-identifier

  client-hello C -> S: challenge, cipher_specs
  server-hello S -> C: connection-id,server_certificate,cipher_specs
  client-master-key C -> S: {master_key}server_public_key
  client-finish C -> S: {connection-id}client_write_key
  server-verify S -> C: {challenge}server_write_key
  server-finish S -> C: {new_session_id}server_write_key

  2.2.2 Assuming a session-identifier was found by both client & server

  client-hello C -> S: challenge, session_id, cipher_specs
  server-hello S -> C: connection-id, session_id_hit
  client-finish C -> S: {connection-id}client_write_key
  server-verify S -> C: {challenge}server_write_key
  server-finish S -> C: {session_id}server_write_key

  2.2.3 Assuming a session-identifier was used and client authentication is used

  client-hello C -> S: challenge, session_id, cipher_specs
  server-hello S -> C: connection-id, session_id_hit
  client-finish C -> S: {connection-id}client_write_key
  server-verify S -> C: {challenge}server_write_key
  request-certificate S -> C: {auth_type,challenge'}server_write_key
  client-certificate C -> S: {cert_type,client_cert,
  response_data}client_write_key
  server-finish S -> C: {session_id}server_write_key

  In this last exchange, the response_data is a function of the auth_type.

上一頁  1 2 3 4 5 6 7 8 9 10 下一頁
文章責編:ak47  
看了本文的網友還看了
·計算機英語因特網(中英對照)  (2007-6-21 8:35:31)
·常見網址英文縮寫的含義匯編表  (2007-6-21 11:33:47)
·計算機專業英語名詞解釋大匯總  (2007-1-25 11:39:39)
·E-mail地址中的符號@是什么意思  (2007-1-25 11:32:20)
·了解到底什么是多媒體  (2007-1-25 11:29:34)
·A range of grid-related questions  (2007-1-25 11:26:39)
文章搜索
軟件水平考試欄目導航
版權聲明:如果軟件水平考試網所轉載內容不慎侵犯了您的權益,請與我們聯系800@exam8.com,我們將會及時處理。如轉載本軟件水平考試網內容,請注明出處。
主站蜘蛛池模板: 亚洲毛片在线观看 | 成人在线免费视频 | 国产一区精品视频 | 午夜湿影院多多影院 | 性欧美丨18一19 | 日韩精品一区二区三区在线观看 | 欧美午夜视频在线观看 | 天天色天天摸 | 欧美一级特黄aa大片视频 | 免费看黄的网页 | 日韩精品网 | 九九九色视频在线观看免费 | 久久久免费观成人影院 | 影音先锋色69成人资源 | 亚洲欧美日韩高清一区二区三区 | 国产精品免费大片一区二区 | 九九热在线播放 | 中文字幕日本一区 | 国产午夜免费视频 | 午夜久久久久久亚洲国产精品 | 波兰性xxxxx极品hd | 日日射影院 | 秋霞午夜一级理论片久久 | 波多野结衣一区二区三区高清在线 | 天天看天天射天天视频 | 亚洲影院在线播放 | 国产精品成人久久久久 | 久久成人亚洲香蕉草草 | 亚洲国产欧美日韩一区二区三区 | 欧美性4khd | 日日操夜夜操视频 | 中国性猛交xxxxx免费看 | 一级做a爱过程免费视频高清 | 久久亚洲精品成人 | 亚欧日韩毛片在线看免费网站 | 99re在线免费视频 | 国产日韩视频 | 亚洲精品自在线拍 | 手机毛片在线观看 | 日韩中文字幕免费观看 | 日本成人在线播放 |