draft-ietf-secsh-assignednumbers-09.txt   draft-ietf-secsh-assignednumbers-10.txt 
Network Working Group C. Lonvick, Ed. Network Working Group C. Lonvick, Ed.
Internet-Draft Cisco Systems, Inc. Internet-Draft Cisco Systems, Inc.
Expires: May 30, 2005 November 29, 2004 Expires: June 9, 2005 December 9, 2004
SSH Protocol Assigned Numbers SSH Protocol Assigned Numbers
draft-ietf-secsh-assignednumbers-09.txt draft-ietf-secsh-assignednumbers-10.txt
Status of this Memo Status of this Memo
This document is an Internet-Draft and is subject to all provisions This document is an Internet-Draft and is subject to all provisions
of section 3 of RFC 3667. By submitting this Internet-Draft, each of section 3 of RFC 3667. By submitting this Internet-Draft, each
author represents that any applicable patent or other IPR claims of author represents that any applicable patent or other IPR claims of
which he or she is aware have been or will be disclosed, and any of which he or she is aware have been or will be disclosed, and any of
which he or she become aware will be disclosed, in accordance with which he or she become aware will be disclosed, in accordance with
RFC 3668. RFC 3668.
skipping to change at page 1, line 34 skipping to change at page 1, line 35
and may be updated, replaced, or obsoleted by other documents at any and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress." material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt. http://www.ietf.org/ietf/1id-abstracts.txt.
The list of Internet-Draft Shadow Directories can be accessed at The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html. http://www.ietf.org/shadow.html.
This Internet-Draft will expire on May 30, 2005. This Internet-Draft will expire on June 9, 2005.
Copyright Notice Copyright Notice
Copyright (C) The Internet Society (2004). Copyright (C) The Internet Society (2004).
Abstract Abstract
This document defines the instructions to the IANA and the initial This document defines the instructions to the IANA and the initial
state of the IANA assigned numbers for the SSH protocol. It is state of the IANA assigned numbers for the SSH protocol. It is
intended only for the initialization of the IANA registries intended only for the initialization of the IANA registries
skipping to change at page 2, line 49 skipping to change at page 2, line 49
4.9.2 Connection Protocol Global Request Names . . . . . . . 14 4.9.2 Connection Protocol Global Request Names . . . . . . . 14
4.9.3 Connection Protocol Channel Request Names . . . . . . 15 4.9.3 Connection Protocol Channel Request Names . . . . . . 15
4.9.4 Initial Assignment of Signal Names . . . . . . . . . . 15 4.9.4 Initial Assignment of Signal Names . . . . . . . . . . 15
4.10 Key Exchange Method Names . . . . . . . . . . . . . . . 15 4.10 Key Exchange Method Names . . . . . . . . . . . . . . . 15
4.11 Assigned Algorithm Names . . . . . . . . . . . . . . . . 16 4.11 Assigned Algorithm Names . . . . . . . . . . . . . . . . 16
4.11.1 Encryption Algorithm Names . . . . . . . . . . . . . 16 4.11.1 Encryption Algorithm Names . . . . . . . . . . . . . 16
4.11.2 MAC Algorithm Names . . . . . . . . . . . . . . . . 16 4.11.2 MAC Algorithm Names . . . . . . . . . . . . . . . . 16
4.11.3 Public Key Algorithm Names . . . . . . . . . . . . . 17 4.11.3 Public Key Algorithm Names . . . . . . . . . . . . . 17
4.11.4 Compression Algorithm Names . . . . . . . . . . . . 17 4.11.4 Compression Algorithm Names . . . . . . . . . . . . 17
5. Security Considerations . . . . . . . . . . . . . . . . . . 17 5. Security Considerations . . . . . . . . . . . . . . . . . . 17
6. References . . . . . . . . . . . . . . . . . . . . . . . . . 17 6. References . . . . . . . . . . . . . . . . . . . . . . . . . 18
6.1 Normative References . . . . . . . . . . . . . . . . . . . . 17 6.1 Normative References . . . . . . . . . . . . . . . . . . . . 18
6.2 Informative References . . . . . . . . . . . . . . . . . . . 18 6.2 Informative References . . . . . . . . . . . . . . . . . . . 18
Author's Address . . . . . . . . . . . . . . . . . . . . . . 18 Author's Address . . . . . . . . . . . . . . . . . . . . . . 19
Intellectual Property and Copyright Statements . . . . . . . 19 Intellectual Property and Copyright Statements . . . . . . . 20
1. Contributors 1. Contributors
The major original contributors of this set of documents have been: The major original contributors of this set of documents have been:
Tatu Ylonen, Tero Kivinen, Timo J. Rinne, Sami Lehtinen (all of SSH Tatu Ylonen, Tero Kivinen, Timo J. Rinne, Sami Lehtinen (all of SSH
Communications Security Corp), and Markku-Juhani O. Saarinen Communications Security Corp), and Markku-Juhani O. Saarinen
(University of Jyvaskyla). Darren Moffit was the original editor of (University of Jyvaskyla). Darren Moffit was the original editor of
this set of documents and also made very substantial contributions. this set of documents and also made very substantial contributions.
Additional contributors to this document include [need list]. Additional contributors to this document include [need list].
skipping to change at page 5, line 47 skipping to change at page 5, line 47
4. IANA Considerations 4. IANA Considerations
This entire document is the IANA considerations for the SSH protocol This entire document is the IANA considerations for the SSH protocol
as is defined in [SSH-ARCH], [SSH-TRANS], [SSH-USERAUTH], as is defined in [SSH-ARCH], [SSH-TRANS], [SSH-USERAUTH],
[SSH-CONNECT]. This section contains conventions used in naming the [SSH-CONNECT]. This section contains conventions used in naming the
namespaces, the initial state of the registry, and instructions for namespaces, the initial state of the registry, and instructions for
future assignments. future assignments.
4.1 Message Numbers 4.1 Message Numbers
The Message Number is an 8-bit value, which describes the payload of The Message Number is a byte value, which describes the payload of a
a packet. packet.
4.1.1 Conventions 4.1.1 Conventions
Protocol packets have message numbers in the range 1 to 255. These Protocol packets have message numbers in the range 1 to 255. These
numbers are allocated as follows: numbers are allocated as follows:
Transport layer protocol: Transport layer protocol:
1 to 19 Transport layer generic (e.g., disconnect, ignore, 1 to 19 Transport layer generic (e.g., disconnect, ignore,
debug, etc.) debug, etc.)
skipping to change at page 11, line 49 skipping to change at page 11, line 49
12 VREPRINT Reprints the current input line. 12 VREPRINT Reprints the current input line.
13 VWERASE Erases a word left of cursor. 13 VWERASE Erases a word left of cursor.
14 VLNEXT Enter the next character typed literally, 14 VLNEXT Enter the next character typed literally,
even if it is a special character even if it is a special character
15 VFLUSH Character to flush output. 15 VFLUSH Character to flush output.
16 VSWTCH Switch to a different shell layer. 16 VSWTCH Switch to a different shell layer.
17 VSTATUS Prints system status line (load, command, 17 VSTATUS Prints system status line (load, command,
pid, etc). pid, etc).
18 VDISCARD Toggles the flushing of terminal output. 18 VDISCARD Toggles the flushing of terminal output.
30 IGNPAR The ignore parity flag. The parameter 30 IGNPAR The ignore parity flag. The parameter
SHOULD be 0 if this flag is FALSE set, SHOULD be 0 if this flag is FALSE,
and 1 if it is TRUE. and 1 if it is TRUE.
31 PARMRK Mark parity and framing errors. 31 PARMRK Mark parity and framing errors.
32 INPCK Enable checking of parity errors. 32 INPCK Enable checking of parity errors.
33 ISTRIP Strip 8th bit off characters. 33 ISTRIP Strip 8th bit off characters.
34 INLCR Map NL into CR on input. 34 INLCR Map NL into CR on input.
35 IGNCR Ignore CR on input. 35 IGNCR Ignore CR on input.
36 ICRNL Map CR to NL on input. 36 ICRNL Map CR to NL on input.
37 IUCLC Translate uppercase characters to 37 IUCLC Translate uppercase characters to
lowercase. lowercase.
skipping to change at page 15, line 48 skipping to change at page 15, line 48
PIPE [SSH-CONNECT] PIPE [SSH-CONNECT]
QUIT [SSH-CONNECT] QUIT [SSH-CONNECT]
SEGV [SSH-CONNECT] SEGV [SSH-CONNECT]
TERM [SSH-CONNECT] TERM [SSH-CONNECT]
USR1 [SSH-CONNECT] USR1 [SSH-CONNECT]
USR2 [SSH-CONNECT] USR2 [SSH-CONNECT]
4.10 Key Exchange Method Names 4.10 Key Exchange Method Names
The Key Exchange Method Name describes a key-exchange method for the The Key Exchange Method Name describes a key-exchange method for the
protocol [SSH-TRANS]. Note that, for historical reasons, the name protocol [SSH-TRANS]. Note that for historical reasons, the name
"diffie-hellman-group1-sha1" is used for a key exchange method using "diffie-hellman-group1-sha1" is used for a key exchange method using
Oakley Group 2. This is considered an aberration and should not be an Oakley group as defined in [RFC2412]. Subsequently, the Working
Group attempted to follow the numbering scheme of group numbers from
[RFC3526] with diffie-hellman-group14-sha1 for the name of the second
defined name. This is considered an aberration and should not be
repeated. Any future specifications of Diffie-Hellman key exchange repeated. Any future specifications of Diffie-Hellman key exchange
using Oakley groups defined in [RFC2412] or its successors should be using Oakley groups defined in [RFC2412] or its successors should be
named using the group numbers assigned by IANA, and names of the form performed with care and a bit of research.
"diffie-hellman-groupN-sha1" should be reserved for this purpose.
The following table identifies the initial assignments of the The following table identifies the initial assignments of the
key-exchange methods. key-exchange methods.
Method name Reference Method name Reference
------------ --------- ------------ ---------
diffie-hellman-group1-sha1 [SSH-TRANS, Section 8.1] diffie-hellman-group1-sha1 [SSH-TRANS, Section 8.1]
diffie-hellman-group14-sha1 [SSH-TRANS, Section 8.2] diffie-hellman-group14-sha1 [SSH-TRANS, Section 8.2]
4.11 Assigned Algorithm Names 4.11 Assigned Algorithm Names
skipping to change at page 18, line 5 skipping to change at page 18, line 11
Full security considerations for this protocol are provided in Full security considerations for this protocol are provided in
[SSH-ARCH]. [SSH-ARCH].
6. References 6. References
6.1 Normative References 6.1 Normative References
[SSH-ARCH] [SSH-ARCH]
Lonvick, C., "SSH Protocol Architecture", I-D Lonvick, C., "SSH Protocol Architecture", I-D
draft-ietf-architecture-19.txt, November 2004. draft-ietf-secsh-architecture-20.txt, December 2004.
[SSH-TRANS] [SSH-TRANS]
Lonvick, C., "SSH Transport Layer Protocol", I-D Lonvick, C., "SSH Transport Layer Protocol", I-D
draft-ietf-transport-21.txt, November 2004. draft-ietf-secsh-transport-22.txt, December 2004.
[SSH-USERAUTH] [SSH-USERAUTH]
Lonvick, C., "SSH Authentication Protocol", I-D Lonvick, C., "SSH Authentication Protocol", I-D
draft-ietf-userauth-24.txt, November 2004. draft-ietf-secsh-userauth-25.txt, December 2004.
[SSH-CONNECT] [SSH-CONNECT]
Lonvick, C., "SSH Connection Protocol", I-D Lonvick, C., "SSH Connection Protocol", I-D
draft-ietf-connect-22.txt, November 2004. draft-ietf-secsh-connect-23.txt, December 2004.
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119, March 1997. Requirement Levels", BCP 14, RFC 2119, March 1997.
[RFC2412] Orman, H., "The OAKLEY Key Determination Protocol", RFC [RFC2412] Orman, H., "The OAKLEY Key Determination Protocol", RFC
2412, November 1998. 2412, November 1998.
[RFC2434] Narten, T. and H. Alvestrand, "Guidelines for Writing an [RFC2434] Narten, T. and H. Alvestrand, "Guidelines for Writing an
IANA Considerations Section in RFCs", BCP 26, RFC 2434, IANA Considerations Section in RFCs", BCP 26, RFC 2434,
October 1998. October 1998.
[RFC3526] Kivinen, T. and M. Kojo, "More Modular Exponential (MODP)
Diffie-Hellman groups for Internet Key Exchange (IKE)",
RFC 3526, May 2003.
6.2 Informative References 6.2 Informative References
[RFC0822] Crocker, D., "Standard for the format of ARPA Internet [RFC0822] Crocker, D., "Standard for the format of ARPA Internet
text messages", STD 11, RFC 822, August 1982. text messages", STD 11, RFC 822, August 1982.
[RFC1034] Mockapetris, P., "Domain names - concepts and facilities", [RFC1034] Mockapetris, P., "Domain names - concepts and facilities",
STD 13, RFC 1034, November 1987. STD 13, RFC 1034, November 1987.
[FIPS-46-3] [FIPS-46-3]
 End of changes. 

This html diff was produced by rfcdiff 1.23, available from http://www.levkowetz.com/ietf/tools/rfcdiff/