⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 rfc.nroff

📁 OpenSSL Source code for SFTP, SSH, and many others
💻 NROFF
📖 第 1 页 / 共 5 页
字号:
additions are not visible at the protocol level.  Supporting thisauthentication method is optional but recommended..IP "7 SSH_SMSG_AUTH_RSA_CHALLENGE".TS;l l.mp-int	encrypted challenge.TEPresents an RSA authentication challenge to the client.  The challengeis a 256-bit random value encrypted as described elsewhere in thisdocument.  The client must decrypt the challenge using the RSA privatekey, compute MD5 of the challenge plus session id, and send back theresulting 16 bytes using SSH_CMSG_AUTH_RSA_RESPONSE..IP "8 SSH_CMSG_AUTH_RSA_RESPONSE".TS;l l.16 bytes	MD5 of decrypted challenge.TEThis message is sent by the client in response to an RSA challenge.The MD5 checksum is returned instead of the decrypted challenge todeter known-plaintext attacks against the RSA key.  The serverresponds to this message with either SSH_SMSG_SUCCESS orSSH_SMSG_FAILURE..IP "9 SSH_CMSG_AUTH_PASSWORD".TS;l l.string	plain text password.TERequests password authentication using the given password.  Note thateven though the password is plain text inside the packet, the wholepacket is normally encrypted by the packet layer.  It would not bepossible for the client to perform password encryption/hashing,because it cannot know which kind of encryption/hashing, if any, theserver uses.  The server responds to this message withSSH_SMSG_SUCCESS or SSH_SMSG_FAILURE..IP "10 SSH_CMSG_REQUEST_PTY".TS;l l.string	TERM environment variable value (e.g. vt100)32-bit int	terminal height, rows (e.g., 24)32-bit int	terminal width, columns (e.g., 80)32-bit int	terminal width, pixels (0 if no graphics) (e.g., 480)32-bit int	terminal height, pixels (0 if no graphics) (e.g., 640)n bytes	tty modes encoded in binary.TERequests a pseudo-terminal to be allocated for this command.  Thismessage can be used regardless of whether the session will laterexecute the shell or a command.  If a pty has been requested with thismessage, the shell or command will run on a pty.  Otherwise it willcommunicate with the server using pipes, sockets or some other similarmechanism.The terminal type gives the type of the user's terminal.  In the UNIXenvironment it is passed to the shell or command in the TERMenvironment variable.The width and height values give the initial size of the user'sterminal or window.  All values can be zero if not supported by theoperating system.  The server will pass these values to the kernel ifsupported.Terminal modes are encoded into a byte stream in a portable format.The exact format is described later in this document.The server responds to the request with either SSH_SMSG_SUCCESS orSSH_SMSG_FAILURE.  If the server does not have the concept of pseudoterminals, it should return success if it is possible to execute ashell or a command so that it looks to the client as if it was runningon a pseudo terminal..IP "11 SSH_CMSG_WINDOW_SIZE".TS;l l.32-bit int	terminal height, rows32-bit int	terminal width, columns32-bit int	terminal width, pixels32-bit int	terminal height, pixels.TEThis message can only be sent by the client during the interactivesession.  This indicates that the size of the user's window haschanged, and provides the new size.  The server will update thekernel's notion of the window size, and a SIGWINCH signal orequivalent will be sent to the shell or command (if supported by theoperating system)..IP "12 SSH_CMSG_EXEC_SHELL"(no arguments)Starts a shell (command interpreter), and enters interactive sessionmode..IP "13 SSH_CMSG_EXEC_CMD".TS;l l.string	command to execute.TEStarts executing the given command, and enters interactive sessionmode.  On UNIX, the command is run as "<shell> -c <command>", where<shell> is the user's login shell..IP "14 SSH_SMSG_SUCCESS"(no arguments)This message is sent by the server in response to the session key, asuccessful authentication request, and a successfully completedpreparatory operation..IP "15 SSH_SMSG_FAILURE"(no arguments)This message is sent by the server in response to a failedauthentication operation to indicate that the user has not yet beensuccessfully authenticated, and in response to a failed preparatoryoperation.  This is also sent in response to an authentication orpreparatory operation request that is not recognized or supported..IP "16 SSH_CMSG_STDIN_DATA".TS;l l.string	data.TEDelivers data from the client to be supplied as input to the shell orprogram running on the server side.  This message can only be used inthe interactive session mode.  No acknowledgement is sent for thismessage..IP "17 SSH_SMSG_STDOUT_DATA".TS;l l.string	data.TEDelivers data from the server that was read from the standard output ofthe shell or program running on the server side.  This message canonly be used in the interactive session mode.  No acknowledgement issent for this message..IP "18 SSH_SMSG_STDERR_DATA".TS;l l.string	data.TEDelivers data from the server that was read from the standard error ofthe shell or program running on the server side.  This message canonly be used in the interactive session mode.  No acknowledgement issent for this message..IP "19 SSH_CMSG_EOF"(no arguments)This message is sent by the client to indicate that EOF has beenreached on the input.  Upon receiving this message, and after allbuffered input data has been sent to the shell or program, the serverwill close the input file descriptor to the program.  This message canonly be used in the interactive session mode.  No acknowledgement issent for this message..IP "20 SSH_SMSG_EXITSTATUS".TS;l l.32-bit int	exit status of the command.TEReturns the exit status of the shell or program after it has exited.The client should respond with SSH_CMSG_EXIT_CONFIRMATION when it hasreceived this message.  This will be the last message sent by theserver.  If the program being executed dies with a signal instead ofexiting normally, the server should terminate the session withSSH_MSG_DISCONNECT (which can be used to pass a human-readable stringindicating that the program died due to a signal) instead of usingthis message..IP "21 SSH_MSG_CHANNEL_OPEN_CONFIRMATION".TS;l l.32-bit int	remote_channel32-bit int	local_channel.TEThis is sent in response to any channel open request if the channelhas been successfully opened.  Remote_channel is the channel numberreceived in the initial open request; local_channel is the channelnumber the side sending this message has allocated for the channel.Data can be transmitted on the channel after this message..IP "22 SSH_MSG_CHANNEL_OPEN_FAILURE".TS;l l.32-bit int	remote_channel.TEThis message indicates that an earlier channel open request by theother side has failed or has been denied.  Remote_channel is thechannel number given in the original request..IP "23 SSH_MSG_CHANNEL_DATA".TS;l l.32-bit int	remote_channelstring	data.TEData is transmitted in a channel in these messages.  A channel isbidirectional, and both sides can send these messages.  There is noacknowledgement for these messages.  It is possible that either sidereceives these messages after it has sent SSH_MSG_CHANNEL_CLOSE forthe channel.  These messages cannot be received after the party hassent or received SSH_MSG_CHANNEL_CLOSE_CONFIRMATION..IP "24 SSH_MSG_CHANNEL_CLOSE".TS;l l.32-bit int	remote_channel.TEWhen a channel is closed at one end of the connection, that side sendsthis message.  Upon receiving this message, the channel should beclosed.  When this message is received, if the channel is alreadyclosed (the receiving side has sent this message for the same channelearlier), the channel is freed and no further action is taken;otherwise the channel is freed and SSH_MSG_CHANNEL_CLOSE_CONFIRMATIONis sent in response.  (It is possible that the channel is closedsimultaneously at both ends.).IP "25 SSH_MSG_CHANNEL_CLOSE_CONFIRMATION".TS;l l.32-bit int	remote_channel.TEThis message is sent in response to SSH_MSG_CHANNEL_CLOSE unless thechannel was already closed.  When this message is sent or received,the channel is freed..IP "26 (OBSOLETED; was unix-domain X11 forwarding).IP "27 SSH_SMSG_X11_OPEN".TS;l l.32-bit int	local_channelstring	originator_string (see below).TEThis message can be sent by the server during the interactive sessionmode to indicate that a client has connected the fake X server.Local_channel is the channel number that the server has allocated forthe connection.  The client should try to open a connection to thereal X server, and respond with SSH_MSG_CHANNEL_OPEN_CONFIRMATION orSSH_MSG_CHANNEL_OPEN_FAILURE.The field originator_string is present if both sidesspecified SSH_PROTOFLAG_HOST_IN_FWD_OPEN in the protocol flags.  Itcontains a description of the host originating the connection..IP "28 SSH_CMSG_PORT_FORWARD_REQUEST".TS;l l.32-bit int	server_portstring	host_to_connect32-bit int	port_to_connect.TESent by the client in the preparatory phase, this message requeststhat server_port on the server machine be forwarded over the securechannel to the client machine, and from there to the specified hostand port.  The server should start listening on the port, and sendSSH_MSG_PORT_OPEN whenever a connection is made to it.  Supportingthis message is optional, and the server is free to reject any forwardrequest.  For example, it is highly recommended that unless the userhas been authenticated as root, forwarding any privileged port numbers(below 1024) is denied..IP "29 SSH_MSG_PORT_OPEN".TS;l l.32-bit int	local_channelstring	host_name32-bit int	portstring	originator_string (see below).TESent by either party in interactive session mode, this messageindicates that a connection has been opened to a forwarded TCP/IPport.  Local_channel is the channel number that the sending party hasallocated for the connection.  Host_name is the host the connectionshould be be forwarded to, and the port is the port on that host toconnect.  The receiving party should open the connection, and respondwith SSH_MSG_CHANNEL_OPEN_CONFIRMATION orSSH_MSG_CHANNEL_OPEN_FAILURE.  It is recommended that the receivingside check the host_name and port for validity to avoid compromisinglocal security by compromised remote side software.  Particularly, itis recommended that the client permit connections only to those portsfor which it has requested forwarding with SSH_CMSG_PORT_FORWARD_REQUEST.The field originator_string is present if both sidesspecified SSH_PROTOFLAG_HOST_IN_FWD_OPEN in the protocol flags.  Itcontains a description of the host originating the connection..IP "30 SSH_CMSG_AGENT_REQUEST_FORWARDING"(no arguments)Requests that the connection to the authentication agent be forwardedover the secure channel.  The method used by clients to contact theauthentication agent within each machine is implementation and machinedependent.  If the server accepts this request, it should arrange thatany clients run from this session will actually contact the serverprogram when they try to contact the authentication agent.  The servershould then send a SSH_SMSG_AGENT_OPEN to open a channel to the agent,and the client should forward the connection to the realauthentication agent.  Supporting this message is optional..IP "31 SSH_SMSG_AGENT_OPEN".TS;l l.32-bit int	local_channel.TESent by the server in interactive session mode, this message requestsopening a channel to the authentication agent.  The client should opena channel, and respond with either SSH_MSG_CHANNEL_OPEN_CONFIRMATIONor SSH_MSG_CHANNEL_OPEN_FAILURE..IP "32 SSH_MSG_IGNORE".TS;l l.string	data.TE

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -