draft-ietf-secsh-connect-18.txt

来自「OTP是开放电信平台的简称」· 文本 代码 · 共 1,232 行 · 第 1/3 页

TXT
1,232
字号
   Implementations MUST reject these messages unless they have   previously requested a remote TCP/IP port forwarding with the given   port number.   When a connection comes to a locally forwarded TCP/IP port, the   following packet is sent to the other side.  Note that these messages   MAY be sent also for ports for which no forwarding has been   explicitly requested.  The receiving side must decide whether to   allow the forwarding.     byte      SSH_MSG_CHANNEL_OPEN     string    "direct-tcpip"     uint32    sender channelYlonen & Moffat, Editor    Expires March 31, 2004              [Page 15]Internet-Draft          SSH Connection Protocol                 Oct 2003     uint32    initial window size     uint32    maximum packet size     string    host to connect     uint32    port to connect     string    originator IP address     uint32    originator port   `Host to connect' and `port to connect' specify the TCP/IP host and   port where the recipient should connect the channel. `Host to   connect' may be either a domain name or a numeric IP address.   `Originator IP address' is the numeric IP address of the machine   where the connection request comes from, and `originator port' is the   port on the originator host from where the connection came from.   Forwarded TCP/IP channels are independent of any sessions, and   closing a session channel does not in any way imply that forwarded   connections should be closed.   Client implementations SHOULD reject direct TCP/IP open requests for   security reasons.8. Encoding of Terminal Modes   Terminal modes (as passed in a pty request) are encoded into a byte   stream.  It is intended that the coding be portable across different   environments.   The tty mode description is a stream of bytes.  The stream consists   of opcode-argument pairs.  It is terminated by opcode TTY_OP_END (0).   Opcodes 1 to 159 have a single uint32 argument. Opcodes 160 to 255   are not yet defined, and cause parsing to stop (they should only be   used after any other data).   The client SHOULD put in the stream any modes it knows about, and the   server MAY ignore any modes it does not know about.  This allows some   degree of machine-independence, at least between systems that use a   POSIX-like tty interface.  The protocol can support other systems as   well, but the client may need to fill reasonable values for a number   of parameters so the server pty gets set to a reasonable mode (the   server leaves all unspecified mode bits in their default values, and   only some combinations make sense).   The following opcodes have been defined.  The naming of opcodes   mostly follows the POSIX terminal mode flags.   0   TTY_OP_END     Indicates end of options.   1   VINTR          Interrupt character; 255 if none.  Similarly for theYlonen & Moffat, Editor    Expires March 31, 2004              [Page 16]Internet-Draft          SSH Connection Protocol                 Oct 2003                      other characters. Not all of these characters are                      supported on all systems.   2   VQUIT          The quit character (sends SIGQUIT signal on POSIX                      systems).   3   VERASE         Erase the character to left of the cursor.   4   VKILL          Kill the current input line.   5   VEOF           End-of-file character (sends EOF from the terminal).   6   VEOL           End-of-line character in addition to carriage return                      and/or linefeed.   7   VEOL2          Additional end-of-line character.   8   VSTART         Continues paused output (normally control-Q).   9   VSTOP          Pauses output (normally control-S).   10  VSUSP          Suspends the current program.   11  VDSUSP         Another suspend character.   12  VREPRINT       Reprints the current input line.   13  VWERASE        Erases a word left of cursor.   14  VLNEXT         Enter the next character typed literally, even if it                      is a special character   15  VFLUSH         Character to flush output.   16  VSWTCH         Switch to a different shell layer.   17  VSTATUS        Prints system status line (load, command, pid etc).   18  VDISCARD       Toggles the flushing of terminal output.   30  IGNPAR         The ignore parity flag.  The parameter SHOULD be 0 if                      this flag is FALSE set, and 1 if it is TRUE.   31  PARMRK         Mark parity and framing errors.   32  INPCK          Enable checking of parity errors.   33  ISTRIP         Strip 8th bit off characters.   34  INLCR          Map NL into CR on input.   35  IGNCR          Ignore CR on input.   36  ICRNL          Map CR to NL on input.   37  IUCLC          Translate uppercase characters to lowercase.   38  IXON           Enable output flow control.   39  IXANY          Any char will restart after stop.   40  IXOFF          Enable input flow control.   41  IMAXBEL        Ring bell on input queue full.   50  ISIG           Enable signals INTR, QUIT, [D]SUSP.   51  ICANON         Canonicalize input lines.   52  XCASE          Enable input and output of uppercase characters by                      preceding their lowercase equivalents with `\'.   53  ECHO           Enable echoing.   54  ECHOE          Visually erase chars.   55  ECHOK          Kill character discards current line.   56  ECHONL         Echo NL even if ECHO is off.   57  NOFLSH         Don't flush after interrupt.   58  TOSTOP         Stop background jobs from output.   59  IEXTEN         Enable extensions.   60  ECHOCTL        Echo control characters as ^(Char).   61  ECHOKE         Visual erase for line kill.Ylonen & Moffat, Editor    Expires March 31, 2004              [Page 17]Internet-Draft          SSH Connection Protocol                 Oct 2003   62  PENDIN         Retype pending input.   70  OPOST          Enable output processing.   71  OLCUC          Convert lowercase to uppercase.   72  ONLCR          Map NL to CR-NL.   73  OCRNL          Translate carriage return to newline (output).   74  ONOCR          Translate newline to carriage return-newline                      (output).   75  ONLRET         Newline performs a carriage return (output).   90  CS7            7 bit mode.   91  CS8            8 bit mode.   92  PARENB         Parity enable.   93  PARODD         Odd parity, else even.   128 TTY_OP_ISPEED  Specifies the input baud rate in bits per second.   129 TTY_OP_OSPEED  Specifies the output baud rate in bits per second.9. Summary of Message Numbers     #define SSH_MSG_GLOBAL_REQUEST                  80     #define SSH_MSG_REQUEST_SUCCESS                 81     #define SSH_MSG_REQUEST_FAILURE                 82     #define SSH_MSG_CHANNEL_OPEN                    90     #define SSH_MSG_CHANNEL_OPEN_CONFIRMATION       91     #define SSH_MSG_CHANNEL_OPEN_FAILURE            92     #define SSH_MSG_CHANNEL_WINDOW_ADJUST           93     #define SSH_MSG_CHANNEL_DATA                    94     #define SSH_MSG_CHANNEL_EXTENDED_DATA           95     #define SSH_MSG_CHANNEL_EOF                     96     #define SSH_MSG_CHANNEL_CLOSE                   97     #define SSH_MSG_CHANNEL_REQUEST                 98     #define SSH_MSG_CHANNEL_SUCCESS                 99     #define SSH_MSG_CHANNEL_FAILURE                 10010. Security Considerations   This protocol is assumed to run on top of a secure, authenticated   transport.  User authentication and protection against network-level   attacks are assumed to be provided by the underlying protocols.   It is RECOMMENDED that implementations disable all the potentially   dangerous features (e.g. agent forwarding, X11 forwarding, and TCP/IP   forwarding) if the host key has changed.   Full security considerations for this protocol are provided in   Section 8 of [SSH-ARCH]Ylonen & Moffat, Editor    Expires March 31, 2004              [Page 18]Internet-Draft          SSH Connection Protocol                 Oct 200311. iana cONSiderations   This document is part of a set, the IANA considerations for the SSH   protocol as defined in [SSH-ARCH], [SSH-TRANS], [SSH-USERAUTH],   [SSH-CONNECT] are detailed in [SSH-NUMBERS].12. Intellectual Property   The IETF takes no position regarding the validity or scope of any   intellectual property or other rights that might be claimed to   pertain to the implementation or use of the technology described in   this document or the extent to which any license under such rights   might or might not be available; neither does it represent that it   has made any effort to identify any such rights. Information on the   IETF's procedures with respect to rights in standards-track and   standards-related documentation can be found in BCP-11. Copies of   claims of rights made available for publication and any assurances of   licenses to be made available, or the result of an attempt made to   obtain a general license or permission for the use of such   proprietary rights by implementers or users of this specification can   be obtained from the IETF Secretariat.   The IETF has been notified of intellectual property rights claimed in   regard to some or all of the specification contained in this   document. For more information consult the online list of claimed   rights.Normative References   [SSH-ARCH]              Ylonen, T., "SSH Protocol Architecture", I-D              draft-ietf-architecture-15.txt, Oct 2003.   [SSH-TRANS]              Ylonen, T., "SSH Transport Layer Protocol", I-D              draft-ietf-transport-17.txt, Oct 2003.   [SSH-USERAUTH]              Ylonen, T., "SSH Authentication Protocol", I-D              draft-ietf-userauth-18.txt, Oct 2003.   [SSH-CONNECT]              Ylonen, T., "SSH Connection Protocol", I-D              draft-ietf-connect-18.txt, Oct 2003.   [SSH-NUMBERS]              Lehtinen, S. and D. Moffat, "SSH Protocol Assigned              Numbers", I-D draft-ietf-secsh-assignednumbers-05.txt, OctYlonen & Moffat, Editor    Expires March 31, 2004              [Page 19]Internet-Draft          SSH Connection Protocol                 Oct 2003              2003.   [RFC2119]  Bradner, S., "Key words for use in RFCs to Indicate              Requirement Levels", BCP 14, RFC 2119, March 1997.Informative References   [RFC3066]  Alvestrand, H., "Tags for the Identification of              Languages", BCP 47, RFC 3066, January 2001.   [RFC1884]  Hinden, R. and S. Deering, "IP Version 6 Addressing              Architecture", RFC 1884, December 1995.   [RFC2279]  Yergeau, F., "UTF-8, a transformation format of ISO              10646", RFC 2279, January 1998.   [SCHEIFLER]              Scheifler, R., "X Window System : The Complete Reference              to Xlib, X Protocol, Icccm, Xlfd, 3rd edition.", Digital              Press ISBN 1555580882, Feburary 1992.   [POSIX]    ISO/IEC, 9945-1., "Information technology -- Portable              Operating System Interface  (POSIX)-Part 1: System              Application Program Interface (API) C Language", ANSI/IEE              Std 1003.1, July 1996.Authors' Addresses   Tatu Ylonen   SSH Communications Security Corp   Fredrikinkatu 42   HELSINKI  FIN-00100   Finland   EMail: ylo@ssh.com   Darren J. Moffat (editor)   Sun Microsystems, Inc   17 Network Circle   Menlo Park  CA 94025   USA   EMail: Darren.Moffat@Sun.COMYlonen & Moffat, Editor    Expires March 31, 2004              [Page 20]Internet-Draft          SSH Connection Protocol                 Oct 2003Intellectual Property Statement   The IETF takes no position regarding the validity or scope of any   intellectual property or other rights that might be claimed to   pertain to the implementation or use of the technology described in   this document or the extent to which any license under such rights   might or might not be available; neither does it represent that it   has made any effort to identify any such rights. Information on the   IETF's procedures with respect to rights in standards-track and   standards-related documentation can be found in BCP-11. Copies of   claims of rights made available for publication and any assurances of   licenses to be made available, or the result of an attempt made to   obtain a general license or permission for the use of such   proprietary rights by implementors or users of this specification can   be obtained from the IETF Secretariat.   The IETF invites any interested party to bring to its attention any   copyrights, patents or patent applications, or other proprietary   rights which may cover technology that may be required to practice   this standard. Please address the information to the IETF Executive   Director.   The IETF has been notified of intellectual property rights claimed in   regard to some or all of the specification contained in this   document. For more information consult the online list of claimed   rights.Full Copyright Statement   Copyright (C) The Internet Society (2003). All Rights Reserved.   This document and translations of it may be copied and furnished to   others, and derivative works that comment on or otherwise explain it   or assist in its implementation may be prepared, copied, published   and distributed, in whole or in part, without restriction of any   kind, provided that the above copyright notice and this paragraph are   included on all such copies and derivative works. However, this   document itself may not be modified in any way, such as by removing   the copyright notice or references to the Internet Society or other   Internet organizations, except as needed for the purpose of   developing Internet standards in which case the procedures for   copyrights defined in the Internet Standards process must be   followed, or as required to translate it into languages other than   English.   The limited permissions granted above are perpetual and will not be   revoked by the Internet Society or its successors or assignees.Ylonen & Moffat, Editor    Expires March 31, 2004              [Page 21]Internet-Draft          SSH Connection Protocol                 Oct 2003   This document and the information contained herein is provided on an   "AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING   TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING   BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION   HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF   MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.Acknowledgment   Funding for the RFC Editor function is currently provided by the   Internet Society.Ylonen & Moffat, Editor    Expires March 31, 2004              [Page 22]

⌨️ 快捷键说明

复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?