draft-ietf-secsh-connect-18.2.ps
来自「OTP是开放电信平台的简称」· PS 代码 · 共 2,216 行 · 第 1/5 页
PS
2,216 行
5 415 M( implementations either maintain a list of allowable variable names or) s5 404 M( only set environment variables after the server process has dropped) s5 393 M( sufficient privileges.) s5 371 M( byte SSH_MSG_CHANNEL_REQUEST) s5 360 M( uint32 recipient channel) s5 349 M( string "env") s5 338 M( boolean want reply) s5 327 M( string variable name) s5 316 M( string variable value) s5 283 M(6.5 Starting a Shell or a Command) s5 261 M( Once the session has been set up, a program is started at the remote) s5 250 M( end. The program can be a shell, an application program or a) s5 239 M( subsystem with a host-independent name. Only one of these requests) s5 228 M( can succeed per channel.) s5 206 M( byte SSH_MSG_CHANNEL_REQUEST) s5 195 M( uint32 recipient channel) s5 184 M( string "shell") s5 173 M( boolean want reply) s5 129 M(Ylonen & Moffat, Editor Expires March 31, 2004 [Page 10]) s_RSPStoPSsaved restore%%Page: (10,11) 6userdict/PStoPSsaved save putPStoPSmatrix setmatrix595.000000 0.271378 translate90 rotate0.706651 dup scaleuserdict/PStoPSmatrix matrix currentmatrix putuserdict/PStoPSclip{0 0 moveto 595.000000 0 rlineto 0 842.000000 rlineto -595.000000 0 rlineto closepath}put initclip/showpage{}def/copypage{}def/erasepage{}defPStoPSxform concat%%BeginPageSetup_S75 0 translate/pagenum 11 def/fname () def/fdir () def/ftail () def/user_header_p false def%%EndPageSetup5 723 M(Internet-Draft SSH Connection Protocol Oct 2003) s5 690 M( This message will request the user's default shell \(typically defined) s5 679 M( in /etc/passwd in UNIX systems\) to be started at the other end.) s5 657 M( byte SSH_MSG_CHANNEL_REQUEST) s5 646 M( uint32 recipient channel) s5 635 M( string "exec") s5 624 M( boolean want reply) s5 613 M( string command) s5 591 M( This message will request the server to start the execution of the) s5 580 M( given command. The command string may contain a path. Normal) s5 569 M( precautions MUST be taken to prevent the execution of unauthorized) s5 558 M( commands.) s5 536 M( byte SSH_MSG_CHANNEL_REQUEST) s5 525 M( uint32 recipient channel) s5 514 M( string "subsystem") s5 503 M( boolean want reply) s5 492 M( string subsystem name) s5 470 M( This last form executes a predefined subsystem. It is expected that) s5 459 M( these will include a general file transfer mechanism, and possibly) s5 448 M( other features. Implementations may also allow configuring more such) s5 437 M( mechanisms. As the user's shell is usually used to execute the) s5 426 M( subsystem, it is advisable for the subsystem protocol to have a) s5 415 M( "magic cookie" at the beginning of the protocol transaction to) s5 404 M( distinguish it from arbitrary output generated by shell) s5 393 M( initialization scripts etc. This spurious output from the shell may) s5 382 M( be filtered out either at the server or at the client.) s5 360 M( The server SHOULD not halt the execution of the protocol stack when) s5 349 M( starting a shell or a program. All input and output from these SHOULD) s5 338 M( be redirected to the channel or to the encrypted tunnel.) s5 316 M( It is RECOMMENDED to request and check the reply for these messages.) s5 305 M( The client SHOULD ignore these messages.) s5 283 M( Subsystem names follow the DNS extensibility naming convention) s5 272 M( outlined in [SSH-ARCH].) s5 250 M(6.6 Session Data Transfer) s5 228 M( Data transfer for a session is done using SSH_MSG_CHANNEL_DATA and) s5 217 M( SSH_MSG_CHANNEL_EXTENDED_DATA packets and the window mechanism. The) s5 206 M( extended data type SSH_EXTENDED_DATA_STDERR has been defined for) s5 195 M( stderr data.) s5 129 M(Ylonen & Moffat, Editor Expires March 31, 2004 [Page 11]) s_RSPStoPSsaved restoreuserdict/PStoPSsaved save putPStoPSmatrix setmatrix595.000000 421.271378 translate90 rotate0.706651 dup scaleuserdict/PStoPSmatrix matrix currentmatrix putuserdict/PStoPSclip{0 0 moveto 595.000000 0 rlineto 0 842.000000 rlineto -595.000000 0 rlineto closepath}put initclipPStoPSxform concat%%BeginPageSetup_S75 0 translate/pagenum 12 def/fname () def/fdir () def/ftail () def/user_header_p false def%%EndPageSetup5 723 M(Internet-Draft SSH Connection Protocol Oct 2003) s5 690 M(6.7 Window Dimension Change Message) s5 668 M( When the window \(terminal\) size changes on the client side, it MAY) s5 657 M( send a message to the other side to inform it of the new dimensions.) s5 635 M( byte SSH_MSG_CHANNEL_REQUEST) s5 624 M( uint32 recipient_channel) s5 613 M( string "window-change") s5 602 M( boolean FALSE) s5 591 M( uint32 terminal width, columns) s5 580 M( uint32 terminal height, rows) s5 569 M( uint32 terminal width, pixels) s5 558 M( uint32 terminal height, pixels) s5 536 M( No response SHOULD be sent to this message.) s5 514 M(6.8 Local Flow Control) s5 492 M( On many systems, it is possible to determine if a pseudo-terminal is) s5 481 M( using control-S/control-Q flow control. When flow control is) s5 470 M( allowed, it is often desirable to do the flow control at the client) s5 459 M( end to speed up responses to user requests. This is facilitated by) s5 448 M( the following notification. Initially, the server is responsible for) s5 437 M( flow control. \(Here, again, client means the side originating the) s5 426 M( session, and server means the other side.\)) s5 404 M( The message below is used by the server to inform the client when it) s5 393 M( can or cannot perform flow control \(control-S/control-Q processing\).) s5 382 M( If `client can do' is TRUE, the client is allowed to do flow control) s5 371 M( using control-S and control-Q. The client MAY ignore this message.) s5 349 M( byte SSH_MSG_CHANNEL_REQUEST) s5 338 M( uint32 recipient channel) s5 327 M( string "xon-xoff") s5 316 M( boolean FALSE) s5 305 M( boolean client can do) s5 283 M( No response is sent to this message.) s5 261 M(6.9 Signals) s5 239 M( A signal can be delivered to the remote process/service using the) s5 228 M( following message. Some systems may not implement signals, in which) s5 217 M( case they SHOULD ignore this message.) s5 195 M( byte SSH_MSG_CHANNEL_REQUEST) s5 184 M( uint32 recipient channel) s5 173 M( string "signal") s5 129 M(Ylonen & Moffat, Editor Expires March 31, 2004 [Page 12]) s_RSPStoPSsaved restore%%Page: (12,13) 7userdict/PStoPSsaved save putPStoPSmatrix setmatrix595.000000 0.271378 translate90 rotate0.706651 dup scaleuserdict/PStoPSmatrix matrix currentmatrix putuserdict/PStoPSclip{0 0 moveto 595.000000 0 rlineto 0 842.000000 rlineto -595.000000 0 rlineto closepath}put initclip/showpage{}def/copypage{}def/erasepage{}defPStoPSxform concat%%BeginPageSetup_S75 0 translate/pagenum 13 def/fname () def/fdir () def/ftail () def/user_header_p false def%%EndPageSetup5 723 M(Internet-Draft SSH Connection Protocol Oct 2003) s5 690 M( boolean FALSE) s5 679 M( string signal name without the "SIG" prefix.) s5 657 M( Signal names will be encoded as discussed in the "exit-signal") s5 646 M( SSH_MSG_CHANNEL_REQUEST.) s5 624 M(6.10 Returning Exit Status) s5 602 M( When the command running at the other end terminates, the following) s5 591 M( message can be sent to return the exit status of the command.) s5 580 M( Returning the status is RECOMMENDED. No acknowledgment is sent for) s5 569 M( this message. The channel needs to be closed with) s5 558 M( SSH_MSG_CHANNEL_CLOSE after this message.) s5 536 M( The client MAY ignore these messages.) s5 514 M( byte SSH_MSG_CHANNEL_REQUEST) s5 503 M( uint32 recipient_channel) s5 492 M( string "exit-status") s5 481 M( boolean FALSE) s5 470 M( uint32 exit_status) s5 448 M( The remote command may also terminate violently due to a signal.) s5 437 M( Such a condition can be indicated by the following message. A zero) s5 426 M( exit_status usually means that the command terminated successfully.) s5 404 M( byte SSH_MSG_CHANNEL_REQUEST) s5 393 M( uint32 recipient channel) s5 382 M( string "exit-signal") s5 371 M( boolean FALSE) s5 360 M( string signal name without the "SIG" prefix.) s5 349 M( boolean core dumped) s5 338 M( string error message \(ISO-10646 UTF-8\)) s5 327 M( string language tag \(as defined in [RFC3066]\)) s5 305 M( The signal name is one of the following \(these are from [POSIX]\)) s5 283 M( ABRT) s5 272 M( ALRM) s5 261 M( FPE) s5 250 M( HUP) s5 239 M( ILL) s5 228 M( INT) s5 217 M( KILL) s5 206 M( PIPE) s5 195 M( QUIT) s5 184 M( SEGV) s5 173 M( TERM) s5 129 M(Ylonen & Moffat, Editor Expires March 31, 2004 [Page 13]) s_RSPStoPSsaved restoreuserdict/PStoPSsaved save putPStoPSmatrix setmatrix595.000000 421.271378 translate90 rotate0.706651 dup scaleuserdict/PStoPSmatrix matrix currentmatrix putuserdict/PStoPSclip{0 0 moveto 595.000000 0 rlineto 0 842.000000 rlineto -595.000000 0 rlineto closepath}put initclipPStoPSxform concat%%BeginPageSetup_S75 0 translate/pagenum 14 def/fname () def/fdir () def/ftail () def/user_header_p false def%%EndPageSetup5 723 M(Internet-Draft SSH Connection Protocol Oct 2003) s5 690 M( USR1) s5 679 M( USR2) s5 657 M( Additional signal names MAY be sent in the format "sig-name@xyz",) s5 646 M( where `sig-name' and `xyz' may be anything a particular implementor) s5 635 M( wants \(except the `@' sign\). However, it is suggested that if a) s5 624 M( `configure' script is used, the non-standard signal names it finds be) s5 613 M( encoded as "SIG@xyz.config.guess", where `SIG' is the signal name) s5 602 M( without the "SIG" prefix, and `xyz' be the host type, as determined) s5 591 M( by `config.guess'.) s5 569 M( The `error message' contains an additional explanation of the error) s5 558 M( message. The message may consist of multiple lines. The client) s5 547 M( software MAY display this message to the user. If this is done, the) s5 536 M( client software should take the precautions discussed in [SSH-ARCH].) s5 514 M(7. TCP/IP Port Forwarding) s5 492 M(7.1 Requesting Port Forwarding) s5 470 M( A party need not explicitly request forwardings from its own end to) s5 459 M( the other direction. However, if it wishes that connections to a) s5 448 M( port on the other side be forwarded to the local side, it must) s5 437 M( explicitly request this.) s5 404 M( byte SSH_MSG_GLOBAL_REQUEST) s5 393 M( string "tcpip-forward") s5 382 M( boolean want reply) s5 371 M( string address to bind \(e.g. "0.0.0.0"\)) s5 360 M( uint32 port number to bind) s5 338 M( `Address to bind' and `port number to bind' specify the IP address) s5 327 M( and port to which the socket to be listened is bound. The address) s5 316 M( should be "0.0.0.0" if connections are allowed from anywhere. \(Note) s5 305 M( that the client can still filter connections based on information) s5 294 M( passed in the open request.\)) s5 272 M( Implementations should only allow forwarding privileged ports if the) s5 261 M( user has been authenticated as a privileged user.) s5 239 M( Client implementations SHOULD reject these messages; they are) s5 228 M( normally only sent by the client.) s5 195 M( If a client passes 0 as port number to bind and has want reply TRUE) s5 184 M( then the server allocates the next available unprivileged port number) s5 173 M( and replies with the following message, otherwise there is no) s5 129 M(Ylonen & Moffat, Editor Expires March 31, 2004 [Page 14]) s
⌨️ 快捷键说明
复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?