diff options
author | Colin Watson <cjwatson@debian.org> | 2010-03-31 00:48:57 +0100 |
---|---|---|
committer | Colin Watson <cjwatson@debian.org> | 2010-03-31 00:48:57 +0100 |
commit | d1a87e462e1db89f19cd960588d0c6b287cb5ccc (patch) | |
tree | f0d13e1687800f36a3c4322b94ac5230ad17bdbf /PROTOCOL | |
parent | 964476f91b66c475d5b8fa1e8b28d39a97a1b56e (diff) | |
parent | 004a7fb9c6a00b13dc98f56599918a54a3506d10 (diff) |
merge 5.4p1
Diffstat (limited to 'PROTOCOL')
-rw-r--r-- | PROTOCOL | 37 |
1 files changed, 22 insertions, 15 deletions
@@ -6,8 +6,8 @@ filexfer protocol described in: | |||
6 | 6 | ||
7 | http://www.openssh.com/txt/draft-ietf-secsh-filexfer-02.txt | 7 | http://www.openssh.com/txt/draft-ietf-secsh-filexfer-02.txt |
8 | 8 | ||
9 | Features from newer versions of the draft are not supported, unless | 9 | Newer versions of the draft will not be supported, though some features |
10 | explicitly implemented as extensions described below. | 10 | are individually implemented as extensions described below. |
11 | 11 | ||
12 | The protocol used by OpenSSH's ssh-agent is described in the file | 12 | The protocol used by OpenSSH's ssh-agent is described in the file |
13 | PROTOCOL.agent | 13 | PROTOCOL.agent |
@@ -31,7 +31,14 @@ The method is documented in: | |||
31 | 31 | ||
32 | http://www.openssh.com/txt/draft-miller-secsh-compression-delayed-00.txt | 32 | http://www.openssh.com/txt/draft-miller-secsh-compression-delayed-00.txt |
33 | 33 | ||
34 | 3. connection: Channel write close extension "eow@openssh.com" | 34 | 3. transport: New public key algorithms "ssh-rsa-cert-v00@openssh.com" and |
35 | "ssh-dsa-cert-v00@openssh.com" | ||
36 | |||
37 | OpenSSH introduces two new public key algorithms to support certificate | ||
38 | authentication for users and hostkeys. These methods are documented in | ||
39 | the file PROTOCOL.certkeys | ||
40 | |||
41 | 4. connection: Channel write close extension "eow@openssh.com" | ||
35 | 42 | ||
36 | The SSH connection protocol (rfc4254) provides the SSH_MSG_CHANNEL_EOF | 43 | The SSH connection protocol (rfc4254) provides the SSH_MSG_CHANNEL_EOF |
37 | message to allow an endpoint to signal its peer that it will send no | 44 | message to allow an endpoint to signal its peer that it will send no |
@@ -70,7 +77,7 @@ message is only sent to OpenSSH peers (identified by banner). | |||
70 | Other SSH implementations may be whitelisted to receive this message | 77 | Other SSH implementations may be whitelisted to receive this message |
71 | upon request. | 78 | upon request. |
72 | 79 | ||
73 | 4. connection: disallow additional sessions extension | 80 | 5. connection: disallow additional sessions extension |
74 | "no-more-sessions@openssh.com" | 81 | "no-more-sessions@openssh.com" |
75 | 82 | ||
76 | Most SSH connections will only ever request a single session, but a | 83 | Most SSH connections will only ever request a single session, but a |
@@ -98,7 +105,7 @@ of this message, the no-more-sessions request is only sent to OpenSSH | |||
98 | servers (identified by banner). Other SSH implementations may be | 105 | servers (identified by banner). Other SSH implementations may be |
99 | whitelisted to receive this message upon request. | 106 | whitelisted to receive this message upon request. |
100 | 107 | ||
101 | 5. connection: Tunnel forward extension "tun@openssh.com" | 108 | 6. connection: Tunnel forward extension "tun@openssh.com" |
102 | 109 | ||
103 | OpenSSH supports layer 2 and layer 3 tunnelling via the "tun@openssh.com" | 110 | OpenSSH supports layer 2 and layer 3 tunnelling via the "tun@openssh.com" |
104 | channel type. This channel type supports forwarding of network packets | 111 | channel type. This channel type supports forwarding of network packets |
@@ -121,10 +128,10 @@ layer 2 frames or layer 3 packets. It may take one of the following values: | |||
121 | SSH_TUNMODE_ETHERNET 2 /* layer 2 frames */ | 128 | SSH_TUNMODE_ETHERNET 2 /* layer 2 frames */ |
122 | 129 | ||
123 | The "tunnel unit number" specifies the remote interface number, or may | 130 | The "tunnel unit number" specifies the remote interface number, or may |
124 | be zero to allow the server to automatically chose an interface. A server | 131 | be 0x7fffffff to allow the server to automatically chose an interface. A |
125 | that is not willing to open a client-specified unit should refuse the | 132 | server that is not willing to open a client-specified unit should refuse |
126 | request with a SSH_MSG_CHANNEL_OPEN_FAILURE error. On successful open, | 133 | the request with a SSH_MSG_CHANNEL_OPEN_FAILURE error. On successful |
127 | the server should reply with SSH_MSG_CHANNEL_OPEN_SUCCESS. | 134 | open, the server should reply with SSH_MSG_CHANNEL_OPEN_SUCCESS. |
128 | 135 | ||
129 | Once established the client and server may exchange packet or frames | 136 | Once established the client and server may exchange packet or frames |
130 | over the tunnel channel by encapsulating them in SSH protocol strings | 137 | over the tunnel channel by encapsulating them in SSH protocol strings |
@@ -151,7 +158,7 @@ It may be one of: | |||
151 | The "packet data" field consists of the IPv4/IPv6 datagram itself | 158 | The "packet data" field consists of the IPv4/IPv6 datagram itself |
152 | without any link layer header. | 159 | without any link layer header. |
153 | 160 | ||
154 | The contents of the "data" field for layer 3 packets is: | 161 | The contents of the "data" field for layer 2 packets is: |
155 | 162 | ||
156 | uint32 packet length | 163 | uint32 packet length |
157 | byte[packet length] frame | 164 | byte[packet length] frame |
@@ -159,7 +166,7 @@ The contents of the "data" field for layer 3 packets is: | |||
159 | The "frame" field contains an IEEE 802.3 Ethernet frame, including | 166 | The "frame" field contains an IEEE 802.3 Ethernet frame, including |
160 | header. | 167 | header. |
161 | 168 | ||
162 | 6. sftp: Reversal of arguments to SSH_FXP_SYMLINK | 169 | 7. sftp: Reversal of arguments to SSH_FXP_SYMLINK |
163 | 170 | ||
164 | When OpenSSH's sftp-server was implemented, the order of the arguments | 171 | When OpenSSH's sftp-server was implemented, the order of the arguments |
165 | to the SSH_FXP_SYMLINK method was inadvertently reversed. Unfortunately, | 172 | to the SSH_FXP_SYMLINK method was inadvertently reversed. Unfortunately, |
@@ -172,7 +179,7 @@ SSH_FXP_SYMLINK as follows: | |||
172 | string targetpath | 179 | string targetpath |
173 | string linkpath | 180 | string linkpath |
174 | 181 | ||
175 | 7. sftp: Server extension announcement in SSH_FXP_VERSION | 182 | 8. sftp: Server extension announcement in SSH_FXP_VERSION |
176 | 183 | ||
177 | OpenSSH's sftp-server lists the extensions it supports using the | 184 | OpenSSH's sftp-server lists the extensions it supports using the |
178 | standard extension announcement mechanism in the SSH_FXP_VERSION server | 185 | standard extension announcement mechanism in the SSH_FXP_VERSION server |
@@ -193,7 +200,7 @@ ever changed in an incompatible way. The server MAY advertise the same | |||
193 | extension with multiple versions (though this is unlikely). Clients MUST | 200 | extension with multiple versions (though this is unlikely). Clients MUST |
194 | check the version number before attempting to use the extension. | 201 | check the version number before attempting to use the extension. |
195 | 202 | ||
196 | 8. sftp: Extension request "posix-rename@openssh.com" | 203 | 9. sftp: Extension request "posix-rename@openssh.com" |
197 | 204 | ||
198 | This operation provides a rename operation with POSIX semantics, which | 205 | This operation provides a rename operation with POSIX semantics, which |
199 | are different to those provided by the standard SSH_FXP_RENAME in | 206 | are different to those provided by the standard SSH_FXP_RENAME in |
@@ -210,7 +217,7 @@ rename(oldpath, newpath) and will respond with a SSH_FXP_STATUS message. | |||
210 | This extension is advertised in the SSH_FXP_VERSION hello with version | 217 | This extension is advertised in the SSH_FXP_VERSION hello with version |
211 | "1". | 218 | "1". |
212 | 219 | ||
213 | 9. sftp: Extension requests "statvfs@openssh.com" and | 220 | 10. sftp: Extension requests "statvfs@openssh.com" and |
214 | "fstatvfs@openssh.com" | 221 | "fstatvfs@openssh.com" |
215 | 222 | ||
216 | These requests correspond to the statvfs and fstatvfs POSIX system | 223 | These requests correspond to the statvfs and fstatvfs POSIX system |
@@ -251,4 +258,4 @@ The values of the f_flag bitmask are as follows: | |||
251 | Both the "statvfs@openssh.com" and "fstatvfs@openssh.com" extensions are | 258 | Both the "statvfs@openssh.com" and "fstatvfs@openssh.com" extensions are |
252 | advertised in the SSH_FXP_VERSION hello with version "2". | 259 | advertised in the SSH_FXP_VERSION hello with version "2". |
253 | 260 | ||
254 | $OpenBSD: PROTOCOL,v 1.12 2009/02/14 06:35:49 djm Exp $ | 261 | $OpenBSD: PROTOCOL,v 1.15 2010/02/26 20:29:54 djm Exp $ |