




已閱讀5頁,還剩12頁未讀, 繼續(xù)免費閱讀
版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請進行舉報或認領
文檔簡介
譯文 SMTP服務擴展的認證機制 這個文檔詳細說明了因特網(wǎng)團體的一個標準的協(xié)議的發(fā)展,以及對其改進和建議提出了要求。說到這,為了標準化這個協(xié)議的狀態(tài)和地位,就必須提及目前最新的“ Internet 官方協(xié)議的標準” (STD1)。發(fā)送這個文檔是不受限制的。 版權(quán)須知 版權(quán)所有 1999年 Internet 團體。所有權(quán)利將得到保留。 1 簡介 這個文檔定義了 SMTP 服務的擴展( ESMTP)并且說明了一個 SMTP 客戶端可以為服務器指定一種用來執(zhí)行與認證協(xié)議的交換,并且隨意地穿越并發(fā)的協(xié)議之間交互的安全層 的認證機制。這個擴展是“簡單認證和安全層” SASL的一個側(cè)面。 2 這個文檔用到的協(xié)定 在以下的這些例子中, C 和 S分別表示客戶端和服務器。 諸如 MUST, MUST NOT, SHOULD, SHOULD NOT, and MAY這些關鍵性的單詞被可以看作和“用在 RFC 文檔中用來標示必須的級別的關鍵字” KEYWORDS相同的解釋。 3 認證服務的擴展 SMTP服務擴展的名稱是 Authentication 聯(lián)合這個擴展的 EHLO 關鍵字的值是“ AUTH“ (3)AUTH EHLO 關鍵字 是一個有空格間隔的被 SASL機制支持的名字列表的參數(shù) (4)一個新的 SMTP動詞“ AUTH“定義完成。 (5)用在關鍵字“ AUTH“的一個可選的參數(shù)被附加到 MAIL FROM命令里,用來指定 MAIL FROM命令一行的最大長度不能超過 500個字符。 (6) 此擴展和委托協(xié)議兼容。 4 AUTH命令 AUTH機制 初始化響應 觀點: 用來標識 SASL認證機制的一個字符串 可選的 Base64編碼的一個響應 約束: 再成功發(fā)出了一個 AUTH 命令之后,在同一時間段里不能再執(zhí)行其他的 AUTH 命令。在 成功執(zhí)行了一個 AUTH 命令之后,服務器必須拒絕后來的 AUTH 命令并且返回一個 503響應碼。 在處理一個郵件事務期間,服務器不會再接受 AUTH命令。 討論: AUTH 命令顯示了一種和郵件服務器間的安全認證機制 。如果郵件服務器支持這種認證機制,它就會執(zhí)行一個認證協(xié)議交互來認證并識別郵件用戶。作為可選的情況,他也會忽略這以后后協(xié)議交互的一個安全層。如果服務器并不支持所需要的認證協(xié)議,就會用 504的回答來拒絕這個 AUTH命令。 這種認證機制的交互由一些列的服務器的響應和對認證機制來說的一些特殊的回答來組成。服務器 的正確響應,不同于其他的響應的是針對文本部分采用 Base64 編碼以 334 做為回應的??蛻舳说幕貞且粋€包含 Base64 編碼的字符串的隊列。如果客戶端想取消與服務器的認證交互,就執(zhí)行一個單個的“ *”。如果服務器接到這樣一個回應,就通過發(fā)送一個 501的響應來拒絕執(zhí)行 AUTH命令。 對 AUTH命令來說,可選的初始化響應建議是用來在使用認證機制時保持一個往 返的回程 ,認證機制的定義中此建議不發(fā)送任何數(shù)據(jù)。當初始化響應部分用在這種機制時, 開始的空的發(fā)起命令不被送到客戶端,并且服務器端使用的數(shù)據(jù)也好象是發(fā)送來 響應一個空的命令。它發(fā)送一個零長度的初始化回答作為一個 =符號。如果客戶端 在認證機制的 AUTH命令響應中使用初始化建議,客戶端就在初始化命令中發(fā)送響應的 數(shù)據(jù),服務器端用 535回答來拒絕 AUTH命令。 如果服務器不能對發(fā)送來的命令采用 Base64解碼的話,將拒絕執(zhí)行 Auth命令,并返回 501響應。如果服務器拒絕認證的數(shù)據(jù),服務器應該拒絕執(zhí)行并返回一個 535響應碼除非有更詳細的錯誤代碼,例如在 Section 6列出來的那個。如果客戶端和服務器進行了正確的交互 的操作的話, SMTP服務器將發(fā)出一個 235響應碼。 詳細說明這個 SASL側(cè)面的服務器的名稱是” SMTP“。 如果 SASL 認證交互穿越了一個安全層,將會通過一個有用來中止認證交互的CRLF來產(chǎn)生效果,而服務器也通過一個 CRLF做出正確的響應。在服務器的安全層生效之前, SMTP協(xié)議被重置到初始狀態(tài)( SMTP中的狀態(tài)是服務器發(fā)出了一個 220服務的問候之后)。服務器 MUST命令將拋棄所有的不是通過客戶端而得到的認知,比如不是通過 SASL 本身而獲得認知的 EHLO 命令的論點。客戶端的 MUST 命令將拋棄所有的從服務器獲得 的認知,例如不是通過 SASL本身而獲得的 SMTP服務擴展的隊列??蛻舳说?SHOULD在 SASL商議成功之后,發(fā)出一個 EHLO 命令做為第一個命令,這些將使得安全層得到授權(quán)。 服務器不一定要求支持任何的認證機制,而認證機制也不一定要支持所有的安全層。如果一個 AUTH命令失敗了,客戶端將試圖執(zhí)行另一個認證機制的 AUTH命令。 一個 Base64 編碼的字符串通常來說是沒有長度限制的。只要由認證機制產(chǎn)生的受客戶端和服務器支持的命令和響應,客戶端和服務器端必須支持,而不依賴于服務器或者客戶端的、可能存在于協(xié)議實現(xiàn)的某些方 面的行長度的限制。 例如: Examples: S: 220 ESMTP server ready C: EHLO S: 250- S: 250 AUTH CRAM-MD5 DIGEST-MD5 C: AUTH FOOBAR S: 504 Unrecognized authentication type. C: AUTH CRAM-MD5 S: 334 PENCeUxFREJoU0NnbmhNWitOMjNGNndAZWx3b29kLmlubm9zb2Z0LmNvbT4= C: ZnJlZCA5ZTk1YWVlMDljNDBhZjJiODRhMGMyYjNiYmFlNzg2ZQ= S: 235 Authentication successful. 5. AUTH命令的參數(shù)附加到的 MAIL FROM命令 AUTH=addr-spec 參數(shù): 一個包含標志的被提交給傳送系統(tǒng)的 addr-spec,或者是兩個字符組成的序列 , 表明這個標志是未知的或被驗明為不完成的。 討論: AUTH 中一個可 選的參數(shù)的 MAIL FROM 命令允許一個協(xié)同工作的代理與一單獨的消息就行通信在一個被信任的環(huán)境里。 如果服務器認為最初提交消息的 Addr dec的客戶端是可信任的話,將會發(fā)出一個聲明,接著服務器應當提供一個相同的 addr dec給任何其他支持 AUTH擴展的用來中轉(zhuǎn)消息的服務器。 如果 MAIL FROM 命令中那個可選的 AUTH 命令的參數(shù)沒有得到提供的話,而客戶端已經(jīng)得到認證,那么服務器認為消息是由客戶端提交的原始的信息,那么在中轉(zhuǎn)給其他的中繼服務器的時候,當前服務器就會把 addr dec做為 Auth命令的可 選的參數(shù)提供給其它的服務器。 如果服務器不是充分的相信客戶端的身份或者客戶端并沒有得到認證的話,那么服務器必須自己提供 AUTH命令的那個參數(shù)一個值。并且將這個值寫入到日志文件中。 如果 AUTH命令的可選的參數(shù)已經(jīng)提供了的話,不管是明確的提出還是由于前面段落的需要,服務器應當提供這個參數(shù)給任何其他支持 AUTH擴展的用來中轉(zhuǎn)消息的服務器。 服務器將把郵件列表的擴充視為一個新的任務, AUTH 命令加入到郵件地址列表中,或者在中轉(zhuǎn)這些消息到列表簽署者的時候管理郵件列表。 為了一致,在一個執(zhí)行很難被編碼的時候,服務器將 認為所有的這些客戶端都是不可信任的。在這種情況下,服務器能做的僅僅就是解析有效的 AUTH命令的參數(shù),并把它提供給任所有使用 AUTH擴展的認證機制的服務器,并遺棄無效的參數(shù)。 例如: C: MAIL FROM: AUTH=e+3D S: 250 OK 6 錯誤代碼 以下的錯誤代碼常常用來描述和標識各種情況。 432 需要進行密碼的轉(zhuǎn)換 這個響應碼表示,對于服務器的認證機制來講,用戶必須進行一個轉(zhuǎn)換。比較由代表性的就是一旦你使用了 PLAIN 認證機制的話,就必須進行轉(zhuǎn)換。 534 認證機過于簡單 這個響應碼表示的是選擇的認證機制相對于服務器所允許的認證機制來說顯得太弱了。 538 請求的認證機制需要加密 這個響應碼表示的是所選的認證機制只有在 SMTP 連接是需要加密的情況下才用的著 454 暫時的認證失敗 這個響應碼表示的是認證失敗的原因是由于服務器暫時出現(xiàn)問題 530 認證是必須的 除了 AUTH, EHLO, HELO, NOOP, RESET或者 QUIT這幾個命令之外的任何一個命令,都將返回這個響應碼。這表示服務器需要為了執(zhí)行被請求的操作, 需要一個認證。 7 正規(guī)的語法 以下的用在擴展的 BNF符號和用在 ABNF中的語法的規(guī)格是一樣的。 除了那些被標注的以外,所有的按字母順序排列的特征都是適合于固定場合的。排在上面的或者下面的被用來定義為有象征意義的字符串的用處僅僅是為了編輯時的便利以及清晰。執(zhí)行這些必須在以固定的格式在一定的場合來接受這些字符串。 UPALPHA = %x41-5A ; Uppercase: A-Z LOALPHA = %x61-7A ; Lowercase: a-z ALPHA = UPALPHA / LOALPHA ; case insensitive DIGIT = %x30-39 ; Digits 0-9 HEXDIGIT = %x41-46 / DIGIT ; hexidecimal digit (uppercase) hexchar = + HEXDIGIT HEXDIGIT xchar = %x21-2A / %x2C-3C / %x3E-7E ; US-ASCII except for +, =, SPACE and CTL xtext = *(xchar / hexchar) AUTH_CHAR = ALPHA / DIGIT / - / _ auth_type = 1*20AUTH_CHAR auth_command = AUTH SPACE auth_type SPACE (base64 / =) *(CRLF base64) CRLF auth_param = AUTH= xtext ; The decoded form of the xtext MUST be either ; an addr-spec or the two characters base64 = base64_terminal / ( 1*(4base64_CHAR) base64_terminal ) base64_char = UPALPHA / LOALPHA / DIGIT / + / / ; Case-sensitive base64_terminal = (2base64_char =) / (3base64_char =) continue_req = 334 SPACE base64 CRLF CR = %x0C ; ASCII CR, carriage return CRLF = CR LF CTL = %x00-1F / %x7F ; any ASCII control character and DEL LF = %x0A ; ASCII LF, line feed SPACE = %x20 ; ASCII SP, space 9 安全問題考慮 如果客戶端使用這個擴展得到不加密的渠道但是通過一個不安全的網(wǎng)絡連接到協(xié)同工作的服務器的話,客戶端將被阻斷而永遠不能發(fā)送郵件到服務器,當服務器不能夠互助地進行驗證和加密的 時候。否則,攻擊者將會通過截斷 SMTP的連接而偷取客戶端的信件,或者假裝服務器不支持認證,從而導致所有的 AUTH命令失敗。 在 SASL商議開始之前,任何協(xié)議之間的交互都可以暢通無阻的進行,但也有可能被活動著的攻擊者修改。因此客戶端和服務器都必須拋棄在 SASL之前獲得的所有消息。 認證機制并不保護 TCP 端口,攻擊者就會通過修改中轉(zhuǎn)的連接而試圖連接( SUBMIT)。 AUTH命令的參數(shù)就可以阻止這種攻擊。 一個消息子服務客戶端可能會要求用戶通過驗證,在任何它得到一個合適的 SASL的時候。 因此,對于一個聲明 SASL機制的 SUBMIT來說并不是合算的,在使用一個同意匿名子任務的客戶端而沒有任何利益的機制的時候。 這個擴展并不是有意的取代或者被用來取代端到端的消息簽名在加密系統(tǒng) S/MIME或者 PGP中。此擴展和端到端的系統(tǒng)有一些細微的差別,主要是以下的部分。 ( 1)它通常只在一個被信任的范圍里有效 ( 2)它保護整個消息的封裝替,而不僅僅是正文 ( 3)它鑒證消息的子任務而不是消息的內(nèi)容 ( 4)在發(fā)信者協(xié)同驗證下一個中轉(zhuǎn)點并且穿越一個合理的安全層的情況下,它可以給發(fā)信者一個保證,那就是可以把消息安全地傳遞到下一個地點。 另 外需要說明的是,安全問題的考慮在 SASL說明里面也有提到。 外文文獻原文 SMTP Service Extension for Authentication This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the Internet Official Protocol Standards (STD 1) for the standardization state and status of this protocol. Distribution of this memo is unlimited. Copyright Notice Copyright (C) The Internet Society (1999). All Rights Reserved. 1. Introduction This document defines an SMTP service extension ESMTP whereby an SMTP client may indicate an authentication mechanism to the server,perform an authentication protocol exchange, and optionally negotiatea security layer for subsequent protocol interactio ns. This extension is a profile of the Simple Authentication and Security Layer SASL. 2. Conventions Used in this Document In examples, C: and S: indicate lines sent by the client and server respectively. The key words MUST, MUST NOT, SHOULD, SHOULD NOT, and MAY in this document are to be interpreted as defined in Key words for use in RFCs to Indicate Requirement Levels KEYWORDS. 3. The Authentication service extension (1) the name of the SMTP service extension is Authentication (2) the EHLO keyword value associated with this extension is AUTH (3) The AUTH EHLO keyword contains as a parameter a space separated list of the names of supported SASL mechanisms. (4) a new SMTP verb AUTH is defined (5) an optional parameter using the keyword AUTH is added to the MAIL FROM command, and extends the maximum line length of the MAIL FROM command by 500 characters. (6) this extension is appropriate for the submission protocol SUBMIT. 4. The AUTH command AUTH mechanism initial-response Arguments: a string identifying a SASL authentication mechanism. an optional base64-encoded response Restrictions: After an AUTH command has successfully completed, no more AUTH commands may be issued in the same session. After a successful AUTH command completes, a server MUST reject any further AUTH commands with a 503 reply. The AUTH command is not permitted during a mail transaction. Discussion: The AUTH command indicates an authentication mechanism to the server. If the server supports the requested authentication mechanism, it performs an authentication protocol exchange to authenticate and identify the user. Optionally, it also negotiates a security layer for subsequent protocol interactions. If the requested authentication mechanism is not supported, the server rejects the AUTH command with a 504 reply. The authentication protocol exchange consists of a series of server challenges and client answers that are specific to the authentication mechanism. A server challenge, otherwise known as a ready response, is a 334 reply with the text part containing a BASE64 encoded string. The client answer consists of a line containing a BASE64 encoded string. If the client wishes to cancel an authentication exchange, it issues a line with a single *. If the server receives such an answer, it MUST reject the AUTH command by sending a 501 reply. The optional initial-response argument to the AUTH command is used to save a round trip when using authentication mechanisms that are defined to send no data in the initial challenge. When the initial-response argument is used with such a mechanism, the initial empty challenge is not sent to the client and the server uses the data in the initial-response argument as if it were sent in response to the empty challenge. Unlike a zero-length client answer to a 334 reply, a zero- length initial response is sent as a single equals sign (=). If the client uses an initial-response argument to the AUTH command with a mechanism that sends data in the initial challenge, the server rejects the AUTH command with a 535 reply. If the server cannot BASE64 decode the argument, it rejects the AUTH command with a 501 reply. If the server rejects the authentication data, it SHOULD reject the AUTH command with a 535 reply unless a more specific error code, such as one listed in section 6, is appropriate. Should the client successfully complete the authentication exchange, the SMTP server issues a 235 reply. The service name specified by this protocols profile of SASL is smtp. If a security layer is negotiated through the SASL authentication exchange, it takes effect immediately following the CRLF that concludes the authentication exchange for the client, and the CRLF of the success reply for the server. Upon a security layers taking effect, the SMTP protocol is reset to the initial state (the state in SMTP after a server issues a 220 service ready greeting). The server MUST discard any knowledge obtained from the client, such as the argument to the EHLO command, which was not obtained from the SASL negotiation itself. The client MUST discard any knowledge obtained from the server, such as the list of SMTP service extensions, which was not obtained from the SASL negotiation itself (with the exception that a client MAY compare the list of advertised SASL mechanisms before and after authentication in order to detect an active down-negotiation attack). The client SHOULD send an EHLO command as the first command after a successful SASL negotiation which results in the enabling of a security layer. The server is not required to support any particular authentication mechanism, nor are authentication mechanisms required to support any security layers. If an AUTH command fails, the client may try another authentication mechanism by issuing another AUTH command. If an AUTH command fails, the server MUST behave the same as if the client had not issued the AUTH command. The BASE64 string may in general be arbitrarily long. Clients and servers MUST be able to support challenges and responses that are as long as are generated by the authentication mechanisms they support, independent of any line length limitations the client or server may have in other parts of its protocol implementation. Examples: S: 220 ESMTP server ready C: EHLO S: 250- S: 250 AUTH CRAM-MD5 DIGEST-MD5 C: AUTH FOOBAR S: 504 Unrecognized authentication type. C: AUTH CRAM-MD5 S: 334 PENCeUxFREJoU0NnbmhNWitOMjNGNndAZWx3b29kLmlubm9zb2Z0LmNvbT4= C: ZnJlZCA5ZTk1YWVlMDljNDBhZjJiODRhMGMyYjNiYmFlNzg2ZQ= S: 235 Authentication successful. 5. The AUTH parameter to the MAIL FROM command AUTH=addr-spec Arguments: An addr-spec containing the identity which submitted the message to the delivery system, or the two character sequence indicating such an identity is unknown or insufficiently authenticated. To comply with the restrictions imposed on ESMTP parameters, the addr-spec is encoded inside an xtext. The syntax of an xtext is described in section 5 of ESMTP-DSN. Discussion: The optional AUTH parameter to the MAIL FROM command allows cooperating agents in a trusted environment to communicate the authentication of individual messages. If the server trusts the authenticated identity of the client to assert that the message was originally submitted by the supplied addr-spec, then the server SHOULD supply the same addr-spec in an AUTH parameter when relaying the message to any server which supports the AUTH extension. A MAIL FROM parameter of AUTH= indicates that the original submitter of the message is not known. The server MUST NOT treat the message as having been originally submitted by the client. If the AUTH parameter to the MAIL FROM is not supplied, the client has authenticated, and the server believes the message is an original submission by the client, the server MAY supply the clients identity in the addr-spec in an AUTH parameter when relaying the message to any server which supports the AUTH extension. If the server does not sufficiently trust the authenticated identity of the client, or if the client is not authenticated, then the server MUST behave as if the AUTH= parameter was supplied. The server MAY, however, write the value of the AUTH parameter to a log file. If an AUTH= parameter was supplied, either explicitly or due to the requirement in the previous paragraph, then the server MUST supply the AUTH= parameter when relaying the message to any server which it has authenticated to using the AUTH extension. A server MAY treat expansion of a mailing list as a new submission, setting the AUTH parameter to the mailing list address or mailing list administration address when relaying the message to list subscribers. It is conforming for an implementation to be hard-coded to treat all clients as being insufficiently trusted. In that case, the implementation does nothing more than parse and discard syntactically valid AUTH parameters to the MAIL FROM command and supply AUTH= parameters to any servers to which it authenticates using the AUTH extension. Examples: C: MAIL FROM: AUTH=e+3D S: 250 OK 6. Error Codes The following error codes may be used to indicate various conditions as described. 432 A password transition is needed This response to the AUTH command indicates that the user needs to transition to the selected authentication mechanism. This typically done by authenticating once using the PLAIN authentication mechanism. 534 Authentication mechanism is too weak This response to the AUTH command indicates that the selected authentication mechanism is weaker than server policy permits for that user. 538 Encryption required for requested authentication mechanism This response to the AUTH command indicates that the selected authentication mechanism may only be used when the underlying SMTP connection is encrypted. 454 Temporary authentication failure This response to the AUTH command indicates that the authentication failed due to a temporary server failure. 530 Authentication required This response may be returned by any command other than AUTH, EHLO, HELO, NOOP, RSET, or QUIT. It indicates that server policy requires authentication in order to perform the requested action. 7. Formal Syntax The following syntax specification uses the augmented Backus-Naur Form (BNF) notation as specified in ABNF. Except as noted otherwise, all alphabetic characters are case- insensitive. The use of upper or lower case characters to define token strings is for editorial clarity only. Implementations MUST accept these strings in a case-insensitive fashion. UPALPHA = %x41-5A ; Uppercase: A-Z LOALPHA = %x61-7A ; Lowercase: a-z ALPHA = UPALPHA / LOALPHA ; case insensitive DIGIT = %x30-39 ; Digits 0-9 HEXDIGIT = %x41-46 / DIGIT ; hexidecimal digit (uppercase) hexchar = + HEXDIGIT HEXDIGIT xchar = %x21-2A / %x2C-3C / %x3E-7E; US-ASCII except for +, =, SPACE and CTL xtext = *(xchar / hexchar) AUTH_CHAR = ALPHA / DIGIT / - / _ auth_type = 1*20AUTH_CHAR auth_command = AUTH SPACE auth_type SPACE (base64 / =)*(CRLF base64) CRLF auth_param = AUTH= xtext; The decoded form of the xtext MUST be either; an addr-spec or the two characters base64 = base64_terminal /( 1*(4base64_CHAR) base64_terminal ) base64_char = UPALPHA / LOALPHA / DIGIT / + / /; Case-sensitive base64_terminal = (2base64_char =) / (3base64_char =) continue_req = 334 SPACE base64 CRLF CR = %x0C ; ASCII CR, carriage return CRLF = CR LF CTL = %x00-1F / %x7F ; any ASCII control character and DEL LF = %x0A ; ASCII LF, line feed SPACE = %x20 ; ASCII SP, space 8. References ABNF Crocker, D. and P. Overell, Augmented BNF for Syntax Specifications: ABNF, RFC2234, November 1997. CRAM-MD5 Klensin, J., Catoe, R. and P. Krumviede, IMAP/POP AUTHorize Extension for Simple Challenge/Response, RFC 2195, September 1997. ESMTP Klensin, J., Freed, N., Rose, M., Stefferud, E. and D. Crocker, SMTP Service Extensions, RFC1869, November 1995. ESMTP-DSN Moore, K, SMTP Service Extension for Delivery Status Notifications, RFC1891, January 1996. KEYWORDS Bradner, S., Key words for use in RFCs to Indicate Requirement Levels, BCP 14, RFC2119, March 1997 SASL Myers, J., Simple Authentication and Security Layer (SASL), RFC2222, October 1997. SUBMIT Gellens, R. and J. Klensin, Message Submission, RFC 2476, December 1998. RFC821 Postel, J., Simple Mail Transfer Protocol, STD 10, RFC 821, August 1982. RFC822 Crocker, D., Standard for the Format of ARPA Internet Text Messages, STD 11, RFC822, August 1982. 9. Security Considerations Security issues are discussed throughout this memo. If a client uses this extension to get an encrypted tunnel through an insecure network to a cooperating server, it needs
溫馨提示
- 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會有圖紙預覽,若沒有圖紙預覽就沒有圖紙。
- 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 人人文庫網(wǎng)僅提供信息存儲空間,僅對用戶上傳內(nèi)容的表現(xiàn)方式做保護處理,對用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對任何下載內(nèi)容負責。
- 6. 下載文件中如有侵權(quán)或不適當內(nèi)容,請與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準確性、安全性和完整性, 同時也不承擔用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。
最新文檔
- 責令改正法律適用研究
- SLM成形HfO2@TiCp-GH3536復合材料組織性能研究
- 基于VR-AR的編程課程教學設計與應用研究-以中職C語言為例
- 糖尿病酮癥病人的個案護理
- 婦女兩癌健康知識
- 幼兒健康蔬菜知識啟蒙
- 頜面部骨折護理課件
- 某企業(yè)客戶關系管理分析
- 2025護理質(zhì)量控制計劃
- 傅玄教育思想體系解析
- 人教版小學英語單詞表(完整版)
- 共享工作室租賃合同
- DL-T 1476-2023 電力安全工器具預防性試驗規(guī)程
- 無人機航空測繪與后期制作 課件 第二十二課時 ContextCapture傾斜攝影測量數(shù)據(jù)處理流程-空三加密
- 2024招投標法培訓
- 溧陽市安息堂規(guī)劃建設方案
- 學校準軍事化管理投標方案(技術方案)
- 2024年國家電網(wǎng)招聘之金融類題庫【易錯題】
- 2023年-2024年鐵道運輸行業(yè)-鐵路信號工競賽理論考試題庫附答案
- 建筑項目的合規(guī)與法律要求
- 建設工程施工投標標書情況匯總表
評論
0/150
提交評論