请输入您要查询的百科知识:

 

词条 Signal Protocol
释义

  1. History

  2. Properties

      Authentication   Metadata 

  3. Usage

  4. Influence

  5. Implementations

  6. See also

  7. References

  8. Literature

  9. External links

{{Infobox networking protocol
| title = Signal Protocol
| is stack = no
| purpose = End-to-end encrypted communications
| developer = Signal Messenger
| date =
| based on = OTR, SCIMP[1]
| influenced = OMEMO, Matrix[1]
| osilayer = Application layer
}}

The Signal Protocol (formerly known as the TextSecure Protocol) is a non-federated cryptographic protocol that can be used to provide end-to-end encryption for voice calls, video calls,[3] and instant messaging conversations.[1] The protocol was developed by Open Whisper Systems in 2013[1] and was first introduced in the open-source TextSecure app, which later became Signal. Several closed-source applications claim to have implemented the protocol, such as WhatsApp, which is said to encrypt the conversations of "more than a billion people worldwide".[2] Facebook Messenger also say they offer the protocol for optional "secret conversations", as does Google Allo for its "incognito mode".

The protocol combines the Double Ratchet algorithm, prekeys, and a triple Diffie–Hellman (3-DH) handshake,[3] and uses Curve25519, AES-256, and HMAC-SHA256 as primitives.[4]

History

The Signal Protocol's development was started by Trevor Perrin and Moxie Marlinspike (Open Whisper Systems) in 2013. The first version of the protocol, TextSecure v1, was based on Off-the-Record Messaging (OTR).[9][5]

On 24 February 2014, Open Whisper Systems introduced TextSecure v2,[6] which migrated to the Axolotl Ratchet.[9][7] The design of the Axolotl Ratchet is based on the ephemeral key exchange that was introduced by OTR and combines it with a symmetric-key ratchet modeled after the Silent Circle Instant Messaging Protocol (SCIMP).[8] It brought about support for asynchronous communication ("offline messages") as its major new feature, as well as better resilience with distorted order of messages and simpler support for conversations with multiple participants.[9] The Axolotl Ratchet was named after the critically endangered aquatic salamander Axolotl, which has extraordinary self-healing capabilities. The developers refer to the algorithm as self-healing because it automatically disables an attacker from accessing the cleartext of later messages after having compromised a session key.[8]

The third version of the protocol, TextSecure v3, made some changes to the cryptographic primitives and the wire protocol.[9] In October 2014, researchers from Ruhr University Bochum published an analysis of TextSecure v3.[4][9] Among other findings, they presented an unknown key-share attack on the protocol, but in general, they found that it was secure.[10]

In March 2016, the developers renamed the protocol as the Signal Protocol. They also renamed the Axolotl Ratchet as the Double Ratchet algorithm to better differentiate between the ratchet and the full protocol[21] because some had used the name Axolotl when referring to the full protocol.[11][12]

{{As of|October 2016}}, the Signal Protocol is based on TextSecure v3, but with additional cryptographic changes.[13] In October 2016, researchers from the UK's University of Oxford, Australia's Queensland University of Technology, and Canada's McMaster University published a formal analysis of the protocol.[25][26] They concluded that the protocol was cryptographically sound.[14][15]

Properties

The protocol provides confidentiality, integrity, authentication, participant consistency, destination validation, forward secrecy, post-compromise security (aka future secrecy), causality preservation, message unlinkability, message repudiation, participation repudiation, and asynchronicity.[29] It does not provide anonymity preservation and requires servers for the relaying of messages and storing of public key material.[16]

The Signal Protocol also supports end-to-end encrypted group chats. The group chat protocol is a combination of a pairwise double ratchet and multicast encryption.[16] In addition to the properties provided by the one-to-one protocol, the group chat protocol provides speaker consistency, out-of-order resilience, dropped message resilience, computational equality, trust equality, subgroup messaging, as well as contractible and expandable membership.[16]

Authentication

For authentication, users can manually compare public key fingerprints through an outside channel.[17] This makes it possible for users to verify each other's identities and avoid a man-in-the-middle attack.[17] An implementation can also choose to employ a trust on first use mechanism in order to notify users if a correspondent's key changes.[17]

Metadata

The Signal Protocol does not prevent a company from retaining information about when and with whom users communicate.[18][37] There can therefore be differences in how messaging service providers choose to handle this information. Signal's privacy policy states that recipients' identifiers are only kept on the Signal servers as long as necessary in order to transmit each message.[19] In June 2016, Moxie Marlinspike told The Intercept: "the closest piece of information to metadata that the Signal server stores is the last time each user connected to the server, and the precision of this information is reduced to the day, rather than the hour, minute, and second."[20]

In October 2018, the Signal Foundation announced that it had implemented a "sealed sender" protocol feature, which if enabled in the clients' Settings, prevents the Signal servers from learning the identity of the sender of each message.[21] The sender's identity is conveyed to the recipient in each message, but is encrypted with a key that the server does not have. However, contemporaneous wiretaps of the user's device and/or the Signal servers can reveal that the device's IP address accessed a Signal server to send or receive messages at certain times.[21]

Usage

Open Whisper Systems first introduced the protocol in their TextSecure app. They later merged an encrypted voice calling application called RedPhone into the TextSecure app and renamed it as Signal. RedPhone used ZRTP to encrypt its calls. In March 2017, Signal transitioned to a new WebRTC-based[3] calling system that also introduced the ability to make video calls.[22] Signal's new calling system uses the Signal Protocol for end-to-end encryption.[23]

In November 2014, Open Whisper Systems announced a partnership with WhatsApp to provide end-to-end encryption by incorporating the Signal Protocol into each WhatsApp client platform.[24] Open Whisper Systems said that they had already incorporated the protocol into the latest WhatsApp client for Android and that support for other clients, group/media messages, and key verification would be coming soon after.[25] On April 5, 2016, WhatsApp and Open Whisper Systems announced that they had finished adding end-to-end encryption to "every form of communication" on WhatsApp, and that users could now verify each other's keys.[26][27] In February 2017, WhatsApp announced a new feature, WhatsApp Status, which uses the Signal Protocol to secure its contents.[28]

In September 2015, G Data Software launched a new messaging app called Secure Chat which uses the Signal Protocol.[29][30]

In September 2016, Google launched a new messaging app called Allo, which features an optional Incognito Mode that uses the Signal Protocol for end-to-end encryption.[31][32]

In October 2016, Facebook deployed an optional mode called Secret Conversations in Facebook Messenger which provides end-to-end encryption using an implementation of the Signal Protocol.[33][34][35][36]

In January 2018, Open Whisper Systems and Microsoft announced the addition of Signal Protocol support to an optional Skype mode called Private Conversations.[37][38]

Influence

The Signal Protocol has had an influence on other cryptographic protocols. In May 2016, Viber said that their encryption protocol is a custom implementation that "uses the same concepts" as the Signal Protocol.[39][40] Forsta's developers have said that their app uses a custom implementation of the Signal Protocol.[41][42]{{third-party inline|date=February 2019}}

The Double Ratchet algorithm that was introduced as part of the Signal Protocol has also been adopted by other protocols. OMEMO is an XMPP Extension Protocol (XEP) that was introduced in the Conversations messaging app and approved by the XMPP Standards Foundation (XSF) in December 2016 as XEP-0384.[43][1] Matrix is an open communications protocol that includes Olm, a library that provides for optional end-to-end encryption on a room-by-room basis via a Double Ratchet algorithm implementation.[1] The developers of Wire have said that their app uses a custom implementation of the Double Ratchet algorithm.[44][45][46]

Implementations

Open Whisper Systems maintains the following Signal Protocol libraries on GitHub:

  • [https://github.com/whispersystems/libsignal-protocol-c libsignal-protocol-c]: A library written in C and published under the GPLv3 license with additional permissions for Apple's App Store.
  • [https://github.com/whispersystems/libsignal-protocol-java libsignal-protocol-java]: A library written in Java and published under the GPLv3 license.
  • [https://github.com/whispersystems/libsignal-protocol-javascript libsignal-protocol-javascript]: A library written in JavaScript and published under the GPLv3 license.

See also

{{Portal
| Cryptography}}
  • Comparison of instant messaging protocols
  • Comparison of cryptography libraries

References

1. ^{{cite conference|last1=Ermoshina|first1=Ksenia|last2=Musiani|first2=Francesca|last3=Halpin|first3=Harry|editor=Bagnoli, Franco |display-editors=etal |pages=244–254|title=End-to-End Encrypted Messaging Protocols: An Overview|book-title=Internet Science |publisher=Springer |location=Florence, Italy |conference=INSCI 2016 |doi=10.1007/978-3-319-45982-0_22 |isbn=978-3-319-45982-0 |date=September 2016 }}
2. ^{{cite web|title=Moxie Marlinspike - 40 under 40|url=http://fortune.com/40-under-40/moxie-marlinspike-31/|website=Fortune|publisher=Time Inc.|year=2016|accessdate=22 September 2016}}
3. ^{{harvnb|Unger|Dechand|Bonneau|Fahl|2015|p=241}}
4. ^{{harvnb|Frosch|Mainka|Bader|Bergsma|2016}}
5. ^{{cite web|url=https://github.com/WhisperSystems/TextSecure/wiki/Protocol|title=Protocol|last=|first=|date=2 March 2014|publisher=Open Whisper Systems|via=GitHub|archiveurl=https://web.archive.org/web/20150107094950/https://github.com/WhisperSystems/TextSecure/wiki/Protocol|archivedate=7 January 2015|dead-url=|accessdate=28 October 2016}}
6. ^{{cite web|date=24 February 2014 |first=Brian |last=Donohue |url=https://threatpost.com/textsecure-sheds-sms-in-latest-version/104456 |title=TextSecure Sheds SMS in Latest Version |website=Threatpost |accessdate=14 July 2016}}
7. ^{{cite web|url=https://github.com/WhisperSystems/TextSecure/wiki/ProtocolV2|title=ProtocolV2|last=|first=|date=2 March 2014|publisher=Open Whisper Systems|via=GitHub|archiveurl=https://web.archive.org/web/20141015215356/https://github.com/WhisperSystems/TextSecure/wiki/ProtocolV2|archivedate=15 October 2014|dead-url=|accessdate=28 October 2016}}
8. ^{{cite web|url=https://whispersystems.org/blog/advanced-ratcheting/|title=Advanced cryptographic ratcheting|last=Marlinspike|first=Moxie|date=26 November 2013|work=Signal Blog|publisher=Open Whisper Systems|archive-url=|archive-date=|dead-url=|accessdate=23 September 2016}}
9. ^{{harvnb|Unger|Dechand|Bonneau|Fahl|2015}}
10. ^{{cite web|url=https://www.theregister.co.uk/2014/11/03/how_secure_is_textsecure_pretty_well_secure/|title=Auditors find encrypted chat client TextSecure is secure|last1=Pauli|first1=Darren|date=3 November 2014|website=The Register|archive-url=|archive-date=|dead-url=|accessdate=4 November 2014}}
11. ^{{harvnb|Cohn-Gordon|Cremers|Dowling|Garratt|2016|p=1}}
12. ^{{cite web|url=https://whispersystems.org/blog/signal-inside-and-out/|title=Signal on the outside, Signal on the inside|last1=Marlinspike|first1=Moxie|date=30 March 2016|website=Signal Blog|publisher=Open Whisper Systems|archive-url=|archive-date=|dead-url=|accessdate=9 April 2016}}
13. ^{{harvnb|Cohn-Gordon|Cremers|Dowling|Garratt|2016|p=2}}
14. ^{{cite web|last1=Brook|first1=Chris|title=Signal Audit Reveals Protocol Cryptographically Sound|url=https://threatpost.com/signal-audit-reveals-protocol-cryptographically-sound/121892/|website=Threatpost|publisher=Kaspersky Lab|accessdate=11 November 2016|date=10 November 2016}}
15. ^{{harvnb|Cohn-Gordon|Cremers|Dowling|Garratt|2016}}
16. ^{{harvnb|Unger|Dechand|Bonneau|Fahl|2015|p=239}}
17. ^{{harvnb|Rottermanner|Kieseberg|Huber|Schmiedecker|2015|p=5}}
18. ^{{harvnb|Rottermanner|Kieseberg|Huber|Schmiedecker|2015|p=4}}
19. ^{{cite web|title=Privacy Policy|url=https://whispersystems.org/signal/privacy/|publisher=Open Whisper Systems|accessdate=8 October 2016|date=n.d.}}
20. ^{{cite web|url=https://theintercept.com/2016/06/22/battle-of-the-secure-messaging-apps-how-signal-beats-whatsapp/|title=Battle of the Secure Messaging Apps: How Signal Beats WhatsApp|last1=Lee|first1=Micah|date=22 June 2016|website=The Intercept|archive-url=|archive-date=|dead-url=|accessdate=8 October 2016}}
21. ^{{cite web| url=https://arstechnica.com/information-technology/2018/10/new-signal-privacy-feature-removes-sender-id-from-metadata/ |title=New Signal privacy feature removes sender ID from metadata |author=Dan Goodin |work=Ars Technica |date=Oct 30, 2018 |accessdate=2019-03-28}}
22. ^{{cite web|url=https://whispersystems.org/blog/signal-video-calls/|title=Video calls for Signal out of beta|last1=Marlinspike|first1=Moxie|date=13 March 2017|website=Signal Blog|publisher=Open Whisper Systems|archive-url=|archive-date=|dead-url=|accessdate=7 April 2017}}
23. ^{{cite web|url=https://whispersystems.org/blog/signal-video-calls-beta/|title=Video calls for Signal now in public beta|last1=Marlinspike|first1=Moxie|date=14 February 2017|website=Signal Blog|publisher=Open Whisper Systems|archive-url=|archive-date=|dead-url=|accessdate=7 April 2017}}
24. ^{{cite web|url=https://techcrunch.com/2014/11/18/end-to-end-for-everyone/|title=WhatsApp Partners With Open Whisper Systems To End-To-End Encrypt Billions Of Messages A Day|author=Evans|first=Jon|date=18 November 2014|website=TechCrunch|archive-url=|archive-date=|dead-url=|accessdate=14 March 2016}}
25. ^{{cite web|url=https://whispersystems.org/blog/whatsapp/|title=Open Whisper Systems partners with WhatsApp to provide end-to-end encryption|last=Marlinspike|first=Moxie|authorlink=Moxie Marlinspike|date=18 November 2014|website=|publisher=Open Whisper Systems|archive-url=|archive-date=|dead-url=|accessdate=14 March 2016}}
26. ^{{cite journal|url=https://www.wired.com/2016/04/forget-apple-vs-fbi-whatsapp-just-switched-encryption-billion-people/|title=Forget Apple vs. the FBI: WhatsApp Just Switched on Encryption for a Billion People|last1=Metz|first1=Cade|date=5 April 2016|journal=Wired|archive-url=|archive-date=|dead-url=|accessdate=5 April 2016}}
27. ^{{cite web|url=https://techcrunch.com/2016/04/05/whatsapp-completes-end-to-end-encryption-rollout/|title=WhatsApp completes end-to-end encryption rollout|last1=Lomas|first1=Natasha|date=5 April 2016|website=TechCrunch|archive-url=|archive-date=|dead-url=|accessdate=5 April 2016}}
28. ^{{Cite web|url=https://blog.whatsapp.com/10000630/WhatsApp-Status|title=WhatsApp Status|last=|first=|date=20 February 2017|website=WhatsApp|publisher=Facebook|archive-url=|archive-date=|dead-url=}}
29. ^{{cite web|url=https://www.infosecurity-magazine.com/news/g-data-adds-encryption-for-secure/|title=G DATA Adds Encryption for Secure Mobile Chat|last=Seals|first=Tara|date=17 September 2015|work=Infosecurity Magazine|archive-url=|archive-date=|dead-url=|accessdate=14 July 2016}}
30. ^{{cite web|url=https://github.com/GDATASoftwareAG/SecureChat|title=SecureChat|last=|first=|date=|publisher=G Data|via=GitHub|archive-url=|archive-date=|dead-url=|accessdate=14 July 2016}}
31. ^{{Cite journal|url=https://www.wired.com/2016/05/allo-duo-google-finally-encrypts-conversations-end-end/|title=With Allo and Duo, Google Finally Encrypts Conversations End-to-End|last=Greenberg|first=Andy|date=18 May 2016|journal=Wired|archive-url=|archive-date=|dead-url=|access-date=18 May 2016}}
32. ^{{cite web|url=https://www.theguardian.com/technology/2016/sep/21/google-whatsapp-allo-google-assistant|title=Google launches WhatsApp competitor Allo – with Google Assistant|last1=Gibbs|first1=Samuel|date=21 September 2016|website=The Guardian|archive-url=|archive-date=|dead-url=|accessdate=21 September 2016}}
33. ^{{cite web|url=https://www.nytimes.com/2016/07/09/technology/facebook-messenger-app-encryption.html|title=Facebook to Add 'Secret Conversations' to Messenger App|last1=Isaac|first1=Mike|date=8 July 2016|website=The New York Times|archive-url=|archive-date=|dead-url=|accessdate=12 July 2016}}
34. ^{{cite web|title=Messenger Starts Testing End-to-End Encryption with Secret Conversations|url=https://newsroom.fb.com/news/2016/07/messenger-starts-testing-end-to-end-encryption-with-secret-conversations/|publisher=Facebook|accessdate=11 January 2018|date=8 July 2016}}
35. ^{{cite journal|url=https://www.wired.com/2016/07/secret-conversations-end-end-encryption-facebook-messenger-arrived/|title='Secret Conversations:' End-to-End Encryption Comes to Facebook Messenger|last1=Greenberg|first1=Andy|date=8 July 2016|journal=Wired|archive-url=|archive-date=|dead-url=|accessdate=12 July 2016}}
36. ^{{cite journal|url=https://www.wired.com/2016/10/facebook-completely-encrypted-messenger-update-now/|title=You Can All Finally Encrypt Facebook Messenger, So Do It|last1=Greenberg|first1=Andy|date=4 October 2016|journal=Wired|archive-url=|archive-date=|dead-url=|accessdate=5 October 2016}}
37. ^{{cite journal|url=https://www.wired.com/story/skype-end-to-end-encryption-voice-text/|title=Skype's Rolling Out End-to-End Encryption For Hundreds of Millions of People|last1=Newman|first1=Lily Hay|date=11 January 2018|journal=Wired|archive-url=|archive-date=|dead-url=|accessdate=13 January 2018}}
38. ^{{cite web|url=https://signal.org/blog/skype-partnership/|title=Signal partners with Microsoft to bring end-to-end encryption to Skype|last1=Lund|first1=Joshua|date=11 January 2018|website=Signal Blog|publisher=Open Whisper Systems|archive-url=|archive-date=|dead-url=|accessdate=13 January 2018}}
39. ^{{cite web|title=Viber Encryption Overview|archiveurl=https://web.archive.org/web/20160711035838/http://www.viber.com/en/security-overview|url=https://www.viber.com/en/security-overview|publisher=Viber|date=3 May 2016|archivedate=11 July 2016|accessdate=8 July 2017}}
40. ^{{cite web|last1=Eyal|first1=Ofir|title=Canada, Germany and Australia are getting e2e encryption|url=https://www.viber.com/en/blog/2016-05-03/canada-germany-and-australia-are-getting-e2e-encryption|publisher=Viber|accessdate=9 October 2016|date=3 May 2016}}
41. ^{{Cite web|author=u/tooker|url=https://www.reddit.com/r/crypto/comments/8b1m6n/forsta_signal_based_messaging_platform_for/|title=r/crypto - Forsta - Signal based messaging platform for enterprises|website=reddit|language=en|access-date=2019-02-06}}
42. ^{{Cite web|url=https://github.com/ForstaLabs/libsignal-node|title=ForstaLabs/libsignal-node |publisher=Forsta Inc.|website=GitHub|language=en|access-date=2019-02-06|date=2019-02-03 }}
43. ^{{cite web | author=Andreas Straub | title=XEP-0384: OMEMO Encryption | url=https://xmpp.org/extensions/xep-0384.html | date=7 December 2016 |accessdate=28 April 2017 | work=XMPP Standards Foundation website}}
44. ^{{cite web|title= Add attribution |url=https://github.com/wireapp/proteus/blob/develop/src/internal/session.rs#L2|website=GitHub|publisher=Wire Swiss GmbH|date=9 May 2016|accessdate=9 October 2016}}
45. ^{{Cite web|url=https://wire-docs.wire.com/download/Wire+Security+Whitepaper.pdf|title= Wire Security Whitepaper |publisher= Wire Swiss GmbH |date=3 March 2016 |accessdate=7 February 2019}}
46. ^{{cite web |last1=Lomas |first1=Natasha |title=Encrypted messaging app Wire adds usernames so you can limit what you share with contacts |url=https://techcrunch.com/2016/12/16/encrypted-messaging-app-wire-adds-usernames-so-you-can-limit-what-you-share-with-contacts/ |website=TechCrunch |publisher=Verizon Media |accessdate=8 February 2019 |date=16 December 2016}}

Literature

{{Refbegin|30em}}
  • {{cite journal|last1=Cohn-Gordon|first1=Katriel|last2=Cremers|first2=Cas|last3=Dowling|first3=Benjamin|last4=Garratt|first4=Luke|last5=Stebila|first5=Douglas|title=A Formal Security Analysis of the Signal Messaging Protocol |url=https://eprint.iacr.org/2016/1013.pdf |website=Cryptology ePrint Archive |publisher=International Association for Cryptologic Research (IACR) |date=25 October 2016 |ref={{harvid|Cohn-Gordon|Cremers|Dowling|Garratt|2016}} }}
  • {{cite conference|last1=Ermoshina|first1=Ksenia|last2=Musiani|first2=Francesca|last3=Halpin|first3=Harry|editor=Bagnoli, Franco |display-editors=etal |pages=244–254|title=End-to-End Encrypted Messaging Protocols: An Overview|book-title=Internet Science |publisher=Springer |location=Florence, Italy |conference=INSCI 2016 |doi=10.1007/978-3-319-45982-0_22 |isbn=978-3-319-45982-0 |date=September 2016 |ref={{harvid|Ermoshina|Musiani|Halpin|2016}} }}
  • {{Cite conference|last1=Frosch |first1=Tilman |last2=Mainka |first2=Christian |last3=Bader |first3=Christoph |last4=Bergsma |first4=Florian |last5=Schwenk |first5=Jörg |last6=Holz |first6=Thorsten |title=How Secure is TextSecure? |conference=2016 IEEE European Symposium on Security and Privacy (EuroS&P) |publisher= IEEE |url=http://ieeexplore.ieee.org/document/7467371/ |format= |location=Saarbrücken, Germany |date=March 2016 |pages=457–472 |doi= 10.1109/EuroSP.2016.41 |isbn= 978-1-5090-1752-2 |ref={{harvid|Frosch|Mainka|Bader|Bergsma|2016}} |accessdate=28 September 2016 }}
  • {{Cite conference|last1=Rottermanner|first1=Christoph|last2=Kieseberg|first2=Peter|last3=Huber|first3=Markus|last4=Schmiedecker|first4=Martin|last5=Schrittwieser|first5=Sebastian|title=Privacy and Data Protection in Smartphone Messengers|url=https://www.sba-research.org/wp-content/uploads/publications/paper_drafthp.pdf|format=PDF|conference=Proceedings of the 17th International Conference on Information Integration and Web-based Applications & Services (iiWAS2015)|publisher=ACM International Conference Proceedings Series|isbn=978-1-4503-3491-4|date=December 2015 |ref={{harvid|Rottermanner|Kieseberg|Huber|Schmiedecker|2015}} |accessdate=25 September 2016}}
  • {{cite conference |first1 = Nik |last1=Unger |first2=Sergej |last2=Dechand |first3=Joseph |last3=Bonneau |first4=Sascha |last4=Fahl |first5= Henning |last5=Perl |first6=Ian Avrum |last6=Goldberg |first7= Matthew |last7= Smith |title = SoK: Secure Messaging |publisher = IEEE Computer Society's Technical Committee on Security and Privacy |conference = Proceedings of the 2015 IEEE Symposium on Security and Privacy |year = 2015 |pages = 232–249 |isbn = |doi=10.1109/SP.2015.22 |url = http://ieee-security.org/TC/SP2015/papers-archived/6949a232.pdf|format=PDF |ref={{harvid|Unger|Dechand|Bonneau|Fahl|2015}} }}
{{Refend}}

External links

{{Commons category|Open Whisper Systems}}
  • {{Official|https://signal.org/docs}}
  • [https://www.youtube.com/watch?v=7WnwSovjYMs "TextSecure Protocol: Present and Future"], talk by Trevor Perrin at NorthSec 2015 (video)
{{Cryptography navbox | public-key}}{{Cryptographic software}}

2 : Application layer protocols|Cryptographic protocols

随便看

 

开放百科全书收录14589846条英语、德语、日语等多语种百科知识,基本涵盖了大多数领域的百科知识,是一部内容自由、开放的电子版国际百科全书。

 

Copyright © 2023 OENC.NET All Rights Reserved
京ICP备2021023879号 更新时间:2024/11/10 13:36:42