1. Introduction ....................................................3 1.1. Requirements Language ......................................3 2. Changes since RFC 1831 ..........................................3 3. Terminology .....................................................3 4. The RPC Model ...................................................4 5. Transports and Semantics ........................................5 6. Binding and Rendezvous Independence .............................7 7. Authentication ..................................................7 8. RPC Protocol Requirements .......................................7 8.1. RPC Programs and Procedures ................................8 8.2. Authentication, Integrity, and Privacy .....................9 8.3. Program Number Assignment .................................10 8.4. Other Uses of the RPC Protocol ............................10 8.4.1. Batching ...........................................10 8.4.2. Broadcast Remote Procedure Calls ...................11 9. The RPC Message Protocol .......................................11 10. Authentication Protocols ......................................15 10.1. Null Authentication ......................................15 11. Record Marking Standard .......................................16 12. The RPC Language ..............................................16 12.1. An Example Service Described in the RPC Language .........17 12.2. The RPC Language Specification ...........................18 12.3. Syntax Notes .............................................18 13. IANA Considerations ...........................................19 13.1. Numbering Requests to IANA ...............................19 13.2. Protecting Past Assignments ..............................19 13.3. RPC Number Assignment ....................................19 13.3.1. To be assigned by IANA ............................20 13.3.2. Defined by Local Administrator ....................20 13.3.3. Transient Block ...................................20 13.3.4. Reserved Block ....................................21 13.3.5. RPC Number Sub-Blocks .............................21 13.4. RPC Authentication Flavor Number Assignment ..............22 13.4.1. Assignment Policy .................................22 13.4.2. Auth Flavors vs. Pseudo-Flavors ...................23 13.5. Authentication Status Number Assignment ..................23 13.5.1. Assignment Policy .................................23 14. Security Considerations .......................................24 Appendix A: System Authentication .................................25 Appendix B: Requesting RPC-Related Numbers from IANA .............26 Appendix C: Current Number Assignments ...........................27 Normative References .............................................62 Informative References ...........................................62
1. Introduction ....................................................3 1.1. Requirements Language ......................................3 2. Changes since RFC 1831 ..........................................3 3. Terminology .....................................................3 4. The RPC Model ...................................................4 5. Transports and Semantics ........................................5 6. Binding and Rendezvous Independence .............................7 7. Authentication ..................................................7 8. RPC Protocol Requirements .......................................7 8.1. RPC Programs and Procedures ................................8 8.2. Authentication, Integrity, and Privacy .....................9 8.3. Program Number Assignment .................................10 8.4. Other Uses of the RPC Protocol ............................10 8.4.1. Batching ...........................................10 8.4.2. Broadcast Remote Procedure Calls ...................11 9. The RPC Message Protocol .......................................11 10. Authentication Protocols ......................................15 10.1. Null Authentication ......................................15 11. Record Marking Standard .......................................16 12. The RPC Language ..............................................16 12.1. An Example Service Described in the RPC Language .........17 12.2. The RPC Language Specification ...........................18 12.3. Syntax Notes .............................................18 13. IANA Considerations ...........................................19 13.1. Numbering Requests to IANA ...............................19 13.2. Protecting Past Assignments ..............................19 13.3. RPC Number Assignment ....................................19 13.3.1. To be assigned by IANA ............................20 13.3.2. Defined by Local Administrator ....................20 13.3.3. Transient Block ...................................20 13.3.4. Reserved Block ....................................21 13.3.5. RPC Number Sub-Blocks .............................21 13.4. RPC Authentication Flavor Number Assignment ..............22 13.4.1. Assignment Policy .................................22 13.4.2. Auth Flavors vs. Pseudo-Flavors ...................23 13.5. Authentication Status Number Assignment ..................23 13.5.1. Assignment Policy .................................23 14. Security Considerations .......................................24 Appendix A: System Authentication .................................25 Appendix B: Requesting RPC-Related Numbers from IANA .............26 Appendix C: Current Number Assignments ...........................27 Normative References .............................................62 Informative References ...........................................62
原文链接:http://www.rfc2cn.com/rfc5531.html
© 版权声明
声明📢本站内容均来自互联网,归原创作者所有,如有侵权必删除。
本站文章皆由CC-4.0协议发布,如无来源则为原创,转载请注明出处。
THE END