⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 rfc.nroff

📁 OpenSSL Source code for SFTP, SSH, and many others
💻 NROFF
📖 第 1 页 / 共 5 页
字号:
Either party may send this message at any time.  This message, and theargument string, is silently ignored.  This message might be used insome implementations to make traffic analysis more difficult.  Thismessage is not currently sent by the implementation, but allimplementations are required to recognize and ignore it..IP "33 SSH_CMSG_EXIT_CONFIRMATION"(no arguments)Sent by the client in response to SSH_SMSG_EXITSTATUS.  This is thelast message sent by the client..IP "34 SSH_CMSG_X11_REQUEST_FORWARDING".TS;l l.string	x11_authentication_protocolstring	x11_authentication_data32-bit int	screen number (if SSH_PROTOFLAG_SCREEN_NUMBER).TESent by the client during the preparatory phase, this message requeststhat the server create a fake X11 display and set the DISPLAYenvironment variable accordingly.  An internet-domain display ispreferable.  The given authentication protocol and the associated datashould be recorded by the server so that it is used as authenticationon connections (e.g., in .Xauthority).  The authentication protocolmust be one of the supported X11 authentication protocols, e.g.,"MIT-MAGIC-COOKIE-1".  Authentication data must be a lowercase hexstring of even length.  Its interpretation is protocol dependent.The data is in a format that can be used with e.g. the xauth program.Supporting this message is optional.The client is permitted (and recommended) to generate fakeauthentication information and send fake information to the server.This way, a corrupt server will not have access to the user's terminalafter the connection has terminated.  The correct authorization codeswill also not be left hanging around in files on the server (manyusers keep the same X session for months, thus protecting theauthorization data becomes important).X11 authentication spoofing works by initially sending fake (random)authentication data to the server, and interpreting the first packetsent by the X11 client after the connection has been opened.  Thefirst packet contains the client's authentication.  If the packetcontains the correct fake data, it is replaced by the client by thecorrect authentication data, and then sent to the X server..IP "35 SSH_CMSG_AUTH_RHOSTS_RSA".TS;l l.string	clint-side user name32-bit int	client_host_key_bitsmp-int	client_host_key_public_exponentmp-int	client_host_key_public_modulus.TERequests authentication using /etc/hosts.equiv and .rhosts (orequivalent) together with RSA host authentication.  The server shouldcheck that the client side port number is less than 1024 (a privilegedport), and immediately reject authentication if it is not.  The serverresponds with SSH_SMSG_FAILURE or SSH_SMSG_AUTH_RSA_CHALLENGE.  Theclient must respond to the challenge with the properSSH_CMSG_AUTH_RSA_RESPONSE.  The server then responds with success ifaccess was granted, or failure if the client gave a wrong response.Supporting this authentication method is optional but recommended inmost environments..IP "36 SSH_MSG_DEBUG".TS;l l.string	debugging message sent to the other side.TEThis message may be sent by either party at any time.  It is used tosend debugging messages that may be informative to the user insolving various problems.  For example, if authentication failsbecause of some configuration error (e.g., incorrect permissions forsome file), it can be very helpful for the user to make the cause offailure available.  On the other hand, one should not make too muchinformation available for security reasons.  It is recommended thatthe client provides an option to display the debugging informationsent by the sender (the user probably does not want to see it by default).The server can log debugging data sent by the client (if any).  Eitherparty is free to ignore any received debugging data.  Everyimplementation must be able to receive this message, but noimplementation is required to send these..IP "37 SSH_CMSG_REQUEST_COMPRESSION".TS;l l.32-bit int	gzip compression level (1-9).TEThis message can be sent by the client in the preparatory operationsphase.  The server responds with SSH_SMSG_FAILURE if it does notsupport compression or does not want to compress; it responds withSSH_SMSG_SUCCESS if it accepted the compression request.  In thelatter case the response to this packet will still be uncompressed,but all further packets in either direction will be compressed by gzip..RT.ti 0Encoding of Terminal ModesTerminal modes (as passed in SSH_CMSG_REQUEST_PTY) are encoded into abyte stream.  It is intended that the coding be portable acrossdifferent environments.The tty mode description is a stream of bytes.  The stream consists ofopcode-argument pairs.  It is terminated by opcode TTY_OP_END (0).Opcodes 1-127 have one-byte arguments.  Opcodes 128-159 have 32-bitinteger arguments (stored msb first).  Opcodes 160-255 are not yetdefined, and cause parsing to stop (they should only be used after anyother data).The client puts in the stream any modes it knows about, and the serverignores any modes it does not know about.  This allows some degree ofmachine-independence, at least between systems that use a POSIX-like[POSIX] tty interface.  The protocol can support other systems aswell, but the client may need to fill reasonable values for a numberof parameters so the server pty gets set to a reasonable mode (theserver leaves all unspecified mode bits in their default values, andonly some combinations make sense).The following opcodes have been defined.  The naming of opcodes mostlyfollows the POSIX terminal mode flags..IP "0 TTY_OP_END"Indicates end of options..IP "1 VINTR"Interrupt character; 255 if none.  Similarly for the other characters.Not all of these characters are supported on all systems..IP "2 VQUIT"The quit character (sends SIGQUIT signal on UNIX systems)..IP "3 VERASE"Erase the character to left of the cursor..IP "4 VKILL"Kill the current input line..IP "5 VEOF "End-of-file character (sends EOF from the terminal)..IP "6 VEOL "End-of-line character in addition to carriage return and/or linefeed..IP "7 VEOL2"Additional end-of-line character..IP "8 VSTART"Continues paused output (normally ^Q)..IP "9 VSTOP"Pauses output (^S)..IP "10 VSUSP"Suspends the current program..IP "11 VDSUSP"Another suspend character..IP "12 VREPRINT"Reprints the current input line..IP "13 VWERASE"Erases a word left of cursor..IP "14 VLNEXT"More special input characters; these are probably not supported onmost systems..IP "15 VFLUSH".IP "16 VSWTCH".IP "17 VSTATUS".IP "18 VDISCARD".IP "30 IGNPAR"The ignore parity flag.  The next byte should be 0 if this flag is notset, and 1 if it is set..IP "31 PARMRK"More flags.  The exact definitions can be found in the POSIX standard..IP "32 INPCK".IP "33 ISTRIP".IP "34 INLCR".IP "35 IGNCR".IP "36 ICRNL".IP "37 IUCLC".IP "38 IXON".IP "39 IXANY".IP "40 IXOFF".IP "41 IMAXBEL".IP "50 ISIG".IP "51 ICANON".IP "52 XCASE".IP "53 ECHO".IP "54 ECHOE".IP "55 ECHOK".IP "56 ECHONL".IP "57 NOFLSH".IP "58 TOSTOP".IP "59 IEXTEN".IP "60 ECHOCTL".IP "61 ECHOKE".IP "62 PENDIN".IP "70 OPOST".IP "71 OLCUC".IP "72 ONLCR".IP "73 OCRNL".IP "74 ONOCR".IP "75 ONLRET".IP "90 CS7".IP "91 CS8".IP "92 PARENB".IP "93 PARODD".IP "192 TTY_OP_ISPEED"Specifies the input baud rate in bits per second..IP "193 TTY_OP_OSPEED"Specifies the output baud rate in bits per second..RT.ti 0The Authentication Agent ProtocolThe authentication agent is a program that can be used to hold RSAauthentication keys for the user (in future, it might hold data forother authentication types as well).  An authorized program can sendrequests to the agent to generate a proper response to an RSAchallenge.  How the connection is made to the agent (or itsrepresentative) inside a host and how access control is done inside ahost is implementation-dependent; however, how it is forwarded and howone interacts with it is specified in this protocol.  The connectionto the agent is normally automatically forwarded over the securechannel.A program that wishes to use the agent first opens a connection to itslocal representative (typically, the agent itself or an SSH server).It then writes a request to the connection, and waits for response.It is recommended that at least five minutes of timeout are providedwaiting for the agent to respond to an authentication challenge (thisgives sufficient time for the user to cut-and-paste the challenge to aseparate machine, perform the computation there, and cut-and-paste theresult back if so desired).Messages sent to and by the agent are in the following format:.TS;l l.4 bytes	Length, msb first.  Does not include length itself.1 byte	Packet type.  The value 255 is reserved for future extensions.data	Any data, depending on packet type.  Encoding as in the ssh packetprotocol..TEThe following message types are currently defined:.IP "1 SSH_AGENTC_REQUEST_RSA_IDENTITIES"(no arguments)Requests the agent to send a list of all RSA keys for which it cananswer a challenge..IP "2 SSH_AGENT_RSA_IDENTITIES_ANSWER".TS;l l.32-bit int	howmanyhowmany times:32-bit int	bitsmp-int	public exponentmp-int	public modulusstring	comment.TEThe agent sends this message in response to the toSSH_AGENTC_REQUEST_RSA_IDENTITIES.  The answer lists all RSA keys forwhich the agent can answer a challenge.  The comment field is intendedto help identify each key; it may be printed by an application toindicate which key is being used.  If the agent is not holding anykeys, howmany will be zero..IP "3 SSH_AGENTC_RSA_CHALLENGE.TS;l l.32-bit int	bitsmp-int	public exponentmp-int	public modulusmp-int	challenge16 bytes	session_id32-bit int	response_type.TERequests RSA decryption of random challenge to authenticate the otherside.  The challenge will be decrypted with the RSA private keycorresponding to the given public key.The decrypted challenge must contain a zero in the highest (partial)byte, 2 in the next byte, followed by non-zero random bytes, a zerobyte, and then the real challenge value in the lowermost bytes.  Thereal challenge must be 32 8-bit bytes (256 bits).Response_type indicates the format of the response to be returned.Currently the only supported value is 1, which means to compute MD5 ofthe real challenge plus session id, and return the resulting 16 bytesin a SSH_AGENT_RSA_RESPONSE message..IP "4 SSH_AGENT_RSA_RESPONSE".TS;l l.16 bytes	MD5 of decrypted challenge.TEAnswers an RSA authentication challenge.  The response is 16 bytes:the MD5 checksum of the 32-byte challenge..IP "5 SSH_AGENT_FAILURE"(no arguments)This message is sent whenever the agent fails to answer a requestproperly.  For example, if the agent cannot answer a challenge (e.g.,no longer has the proper key), it can respond with this.  The agentalso responds with this message if it receives a message it does notrecognize..IP "6 SSH_AGENT_SUCCESS"(no arguments)This message is sent by the agent as a response to certain requeststhat do not otherwise cause a message be sent.  Currently, this isonly sent in 

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -