ASHRAE 135 INT 4-2017 BACnet - A Data Communication Protocol for Building Automation and Control Networks.pdf

上传人:赵齐羽 文档编号:450202 上传时间:2018-11-20 格式:PDF 页数:1 大小:10.81KB
下载 相关 举报
ASHRAE 135 INT 4-2017 BACnet - A Data Communication Protocol for Building Automation and Control Networks.pdf_第1页
第1页 / 共1页
亲,该文档总共1页,全部预览完了,如果喜欢就下载吧!
资源描述

1、Page 1 of 1 2017 ASHRAE. All Rights reserved. INTERPRETATION IC 135-2016-4 OF ANSI/ASHRAE STANDARD 135-2016 BACnet - A Data Communication Protocol for Building Automation and Control Networks Approval Date: June 26, 2017 Request from: Dave Robin, Automated Logic, 1150 Roberts Blvd, Kennesaw, GA 3014

2、4. Reference: This request for interpretation refers to the requirements presented in ANSI/ASHRAE Standard 135-2016, Clause W.5.3 The .auth Data Item, regarding the format of public keys. Background: The format defined for the public keys is not possible. The existing clause defines a format for “al

3、l keys“, but that format is only appropriate for private keys and therefore cannot be used for the two public keys in the /.auth tree. W.5.3 The .auth Data Item The .auth data item contains information related to the server devices security. The meaning of this data is discussed in Clause W.3. All d

4、ata under the /.auth path, with the exception of the “item-pend“ items, shall be nonvolatile. All Certificates shall be X.509 certificates in binary DER format with a mediaType “application/x-x509-ca-cert“ and all keys shall be in PKCS #8 binary DER format (RFC 5958) with a mediaType “application/pk

5、cs8“. The complete list of children is defined in the following table. The most common form of public key serialization is a DER encoding of a SubjectPublicKeyInfo structure, defined by X.509 in Section 4.1.2.7 of RFC 5280. In addition to all the places where X.509 certificates are used, this is the

6、 encoding used by the ubiquitous PEM format (i.e., “-BEGIN PUBLIC KEY-“) defined by Section 13 of RFC 7468, and also used by the “Raw Public Key“ TLS extension in Section 3 of RFC 7250. If the keys in /.auth were defined to be CharacterString values, there could be some ambiguity about whether the P

7、EM “-BEGIN/END-“ wrapper should be present or not. But since they are defined to be OctetString values, the binary DER content is the only obvious choice. Command line tools like “openssl“ can read/generate/convert keys using this binary format so no custom programming is needed. Interpretation: Sin

8、ce the storage of the public keys in the prescribed format is not possible, it is assumed that this is an errata/oversight and that an appropriate public key format was intended. And since there seems to be only one common and widely supported way to encode a public key, the assumption is that the format to be used for the public key values in the /.auth structure is a DER encoding of a SubjectPublicKeyInfo as defined by X.509. Question: Is this Interpretation correct? Answer: Yes

展开阅读全文
相关资源
猜你喜欢
相关搜索

当前位置:首页 > 标准规范 > 国际标准 > 其他

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1