draft-ietf-secsh-assignednumbers-11.txt   draft-ietf-secsh-assignednumbers-12.txt 
Network Working Group C. Lonvick, Ed. Network Working Group S. Lehtinen
Internet-Draft Cisco Systems, Inc. Internet-Draft SSH Communications Security Corp
Expires: August 21, 2005 February 17, 2005 Expires: September 15, 2005 C. Lonvick, Ed.
Cisco Systems, Inc.
March 14, 2005
SSH Protocol Assigned Numbers SSH Protocol Assigned Numbers
draft-ietf-secsh-assignednumbers-11.txt draft-ietf-secsh-assignednumbers-12.txt
Status of this Memo Status of this Memo
This document is an Internet-Draft and is subject to all provisions This document is an Internet-Draft and is subject to all provisions
of Section 3 of RFC 3667. By submitting this Internet-Draft, each of Section 3 of RFC 3667. By submitting this Internet-Draft, each
author represents that any applicable patent or other IPR claims of author represents that any applicable patent or other IPR claims of
which he or she is aware have been or will be disclosed, and any of which he or she is aware have been or will be disclosed, and any of
which he or she become aware will be disclosed, in accordance with which he or she become aware will be disclosed, in accordance with
RFC 3668. RFC 3668.
skipping to change at page 1, line 35 skipping to change at page 1, line 37
and may be updated, replaced, or obsoleted by other documents at any and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress." material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt. http://www.ietf.org/ietf/1id-abstracts.txt.
The list of Internet-Draft Shadow Directories can be accessed at The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html. http://www.ietf.org/shadow.html.
This Internet-Draft will expire on August 21, 2005. This Internet-Draft will expire on September 15, 2005.
Copyright Notice Copyright Notice
Copyright (C) The Internet Society (2005). Copyright (C) The Internet Society (2005).
Abstract Abstract
This document defines the instructions to the IANA and the initial This document defines the instructions to the IANA and the initial
state of the IANA assigned numbers for the SSH protocol. It is state of the IANA assigned numbers for the SSH protocol. It is
intended only for the initialization of the IANA registries intended only for the initialization of the IANA registries
skipping to change at page 2, line 14 skipping to change at page 2, line 14
Table of Contents Table of Contents
1. Contributors . . . . . . . . . . . . . . . . . . . . . . . . 4 1. Contributors . . . . . . . . . . . . . . . . . . . . . . . . 4
2. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 4 2. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 4
3. Conventions Used in This Document . . . . . . . . . . . . . 4 3. Conventions Used in This Document . . . . . . . . . . . . . 4
3.1 RFC2119 Keywords . . . . . . . . . . . . . . . . . . . . . 4 3.1 RFC2119 Keywords . . . . . . . . . . . . . . . . . . . . . 4
3.2 RFC2434 Keywords . . . . . . . . . . . . . . . . . . . . . 4 3.2 RFC2434 Keywords . . . . . . . . . . . . . . . . . . . . . 4
3.3 Protocol Fields and Values . . . . . . . . . . . . . . . . 5 3.3 Protocol Fields and Values . . . . . . . . . . . . . . . . 5
4. IANA Considerations . . . . . . . . . . . . . . . . . . . . 6 4. IANA Considerations . . . . . . . . . . . . . . . . . . . . 6
4.1 Message Numbers . . . . . . . . . . . . . . . . . . . . . 6 4.1 Message Numbers . . . . . . . . . . . . . . . . . . . . . 7
4.1.1 Conventions . . . . . . . . . . . . . . . . . . . . . 6 4.1.1 Conventions . . . . . . . . . . . . . . . . . . . . . 7
4.1.2 Initial Assignments . . . . . . . . . . . . . . . . . 7 4.1.2 Initial Assignments . . . . . . . . . . . . . . . . . 8
4.1.3 Future Assignments . . . . . . . . . . . . . . . . . . 7 4.1.3 Future Assignments . . . . . . . . . . . . . . . . . . 8
4.2 Disconnection Messages Reason Codes and Descriptions . . . 8 4.2 Disconnection Messages Reason Codes and Descriptions . . . 9
4.2.1 Conventions . . . . . . . . . . . . . . . . . . . . . 8 4.2.1 Conventions . . . . . . . . . . . . . . . . . . . . . 9
4.2.2 Initial Assignments . . . . . . . . . . . . . . . . . 8 4.2.2 Initial Assignments . . . . . . . . . . . . . . . . . 9
4.2.3 Future Assignments . . . . . . . . . . . . . . . . . . 9 4.2.3 Future Assignments . . . . . . . . . . . . . . . . . . 10
4.3 Channel Connection Failure Reason Codes and Descriptions . 9 4.3 Channel Connection Failure Reason Codes and Descriptions . 10
4.3.1 Conventions . . . . . . . . . . . . . . . . . . . . . 9 4.3.1 Conventions . . . . . . . . . . . . . . . . . . . . . 10
4.3.2 Initial Assignments . . . . . . . . . . . . . . . . . 9 4.3.2 Initial Assignments . . . . . . . . . . . . . . . . . 10
4.3.3 Future Assignments . . . . . . . . . . . . . . . . . . 9 4.3.3 Future Assignments . . . . . . . . . . . . . . . . . . 10
4.3.4 Notes about the PRIVATE USE Range . . . . . . . . . . 10 4.3.4 Notes about the PRIVATE USE Range . . . . . . . . . . 11
4.4 Extended Channel Data Transfer data_type_code and Data . . 10 4.4 Extended Channel Data Transfer data_type_code and Data . . 11
4.4.1 Conventions . . . . . . . . . . . . . . . . . . . . . 10 4.4.1 Conventions . . . . . . . . . . . . . . . . . . . . . 11
4.4.2 Initial Assignments . . . . . . . . . . . . . . . . . 10 4.4.2 Initial Assignments . . . . . . . . . . . . . . . . . 11
4.4.3 Future Assignments . . . . . . . . . . . . . . . . . . 11 4.4.3 Future Assignments . . . . . . . . . . . . . . . . . . 12
4.5 Pseudo-Terminal Encoded Terminal Modes . . . . . . . . . . 11 4.5 Pseudo-Terminal Encoded Terminal Modes . . . . . . . . . . 12
4.5.1 Conventions . . . . . . . . . . . . . . . . . . . . . 11 4.5.1 Conventions . . . . . . . . . . . . . . . . . . . . . 12
4.5.2 Initial Assignments . . . . . . . . . . . . . . . . . 11 4.5.2 Initial Assignments . . . . . . . . . . . . . . . . . 12
4.5.3 Future Assignments . . . . . . . . . . . . . . . . . . 13 4.5.3 Future Assignments . . . . . . . . . . . . . . . . . . 14
4.6 Names . . . . . . . . . . . . . . . . . . . . . . . . . . 13 4.6 Names . . . . . . . . . . . . . . . . . . . . . . . . . . 14
4.6.1 Conventions for Names . . . . . . . . . . . . . . . . 13 4.6.1 Conventions for Names . . . . . . . . . . . . . . . . 14
4.6.2 Future Assignments of Names . . . . . . . . . . . . . 14 4.6.2 Future Assignments of Names . . . . . . . . . . . . . 15
4.7 Service Names . . . . . . . . . . . . . . . . . . . . . . 14 4.7 Service Names . . . . . . . . . . . . . . . . . . . . . . 15
4.8 Authentication Method Names . . . . . . . . . . . . . . . 14 4.8 Authentication Method Names . . . . . . . . . . . . . . . 15
4.9 Connection Protocol Assigned Names . . . . . . . . . . . . 14 4.9 Connection Protocol Assigned Names . . . . . . . . . . . . 16
4.9.1 Connection Protocol Channel Types . . . . . . . . . . 15 4.9.1 Connection Protocol Channel Types . . . . . . . . . . 16
4.9.2 Connection Protocol Global Request Names . . . . . . . 15 4.9.2 Connection Protocol Global Request Names . . . . . . . 16
4.9.3 Connection Protocol Channel Request Names . . . . . . 15 4.9.3 Connection Protocol Channel Request Names . . . . . . 16
4.9.4 Initial Assignment of Signal Names . . . . . . . . . . 16 4.9.4 Initial Assignment of Signal Names . . . . . . . . . . 17
4.9.5 Connection Protocol Subsystem Names . . . . . . . . . 16 4.9.5 Connection Protocol Subsystem Names . . . . . . . . . 17
4.10 Key Exchange Method Names . . . . . . . . . . . . . . . 16 4.10 Key Exchange Method Names . . . . . . . . . . . . . . . 17
4.11 Assigned Algorithm Names . . . . . . . . . . . . . . . . 17 4.11 Assigned Algorithm Names . . . . . . . . . . . . . . . . 18
4.11.1 Encryption Algorithm Names . . . . . . . . . . . . . 17 4.11.1 Encryption Algorithm Names . . . . . . . . . . . . . 18
4.11.2 MAC Algorithm Names . . . . . . . . . . . . . . . . 17 4.11.2 MAC Algorithm Names . . . . . . . . . . . . . . . . 18
4.11.3 Public Key Algorithm Names . . . . . . . . . . . . . 17 4.11.3 Public Key Algorithm Names . . . . . . . . . . . . . 19
4.11.4 Compression Algorithm Names . . . . . . . . . . . . 18 4.11.4 Compression Algorithm Names . . . . . . . . . . . . 19
5. Security Considerations . . . . . . . . . . . . . . . . . . 18 5. Security Considerations . . . . . . . . . . . . . . . . . . 19
6. References . . . . . . . . . . . . . . . . . . . . . . . . . 18 6. References . . . . . . . . . . . . . . . . . . . . . . . . . 19
6.1 Normative References . . . . . . . . . . . . . . . . . . . 18 6.1 Normative References . . . . . . . . . . . . . . . . . . . 19
6.2 Informative References . . . . . . . . . . . . . . . . . . 19 6.2 Informative References . . . . . . . . . . . . . . . . . . 20
Author's Address . . . . . . . . . . . . . . . . . . . . . . 19 Authors' Addresses . . . . . . . . . . . . . . . . . . . . . 20
Intellectual Property and Copyright Statements . . . . . . . 20 A. Trademark Notice . . . . . . . . . . . . . . . . . . . . . . 21
Intellectual Property and Copyright Statements . . . . . . . 22
1. Contributors 1. Contributors
The major original contributors of this set of documents have been: The major original contributors of this set of documents have been:
Tatu Ylonen, Tero Kivinen, Timo J. Rinne, Sami Lehtinen (all of SSH Tatu Ylonen, Tero Kivinen, Timo J. Rinne, Sami Lehtinen (all of SSH
Communications Security Corp), and Markku-Juhani O. Saarinen Communications Security Corp), and Markku-Juhani O. Saarinen
(University of Jyvaskyla). Darren Moffit was the original editor of (University of Jyvaskyla). Darren Moffit was the original editor of
this set of documents and also made very substantial contributions. this set of documents and also made very substantial contributions.
Additional contributors to this document include [need list]. Many people contributed to the development of this document over the
Listing their names here does not mean that they endorse this years. People who should be acknowledged include Mats Andersson, Ben
document, but that they have contributed to it. Harris, Brent McClure, Niels Moller, Damien Miller, Derek Fawcus,
Frank Cusack, Heikki Nousiainen, Jakob Schlyter, Jeff Van Dyke,
Comments on this internet draft should be sent to the IETF SECSH Jeffrey Altman, Jeffrey Hutzelman, Jon Bright, Joseph Galbraith, Ken
working group, details at: Hornstein, Markus Friedl, Martin Forssen, Nicolas Williams, Niels
http://ietf.org/html.charters/secsh-charter.html Note: This paragraph Provos, Perry Metzger, Peter Gutmann, Simon Josefsson, Simon Tatham,
will be removed before this document progresses to become an RFC. Wei Dai, Denis Bider, der Mouse, and Tadayoshi Kohno. Listing their
names here does not mean that they endorse this document, but that
they have contributed to it.
2. Introduction 2. Introduction
This document does not define any new protocols. It is intended only This document does not define any new protocols. It is intended only
to create the initial state of the IANA databases for the SSH to create the initial state of the IANA databases for the SSH
protocol and also contains instructions for future assignments. protocol and also contains instructions for future assignments.
Except for one HISTORIC algorithm generally regarded as obsolete, Except for one HISTORIC algorithm generally regarded as obsolete,
this document does not define any new protocols or any number ranges this document does not define any new protocols or any number ranges
not already defined in: [SSH-ARCH], [SSH-TRANS], [SSH-USERAUTH], not already defined in: [SSH-ARCH], [SSH-TRANS], [SSH-USERAUTH],
[SSH-CONNECT]. [SSH-CONNECT].
skipping to change at page 7, line 22 skipping to change at page 8, line 20
Message ID Value Reference Message ID Value Reference
----------- ----- --------- ----------- ----- ---------
SSH_MSG_DISCONNECT 1 [SSH-TRANS] SSH_MSG_DISCONNECT 1 [SSH-TRANS]
SSH_MSG_IGNORE 2 [SSH-TRANS] SSH_MSG_IGNORE 2 [SSH-TRANS]
SSH_MSG_UNIMPLEMENTED 3 [SSH-TRANS] SSH_MSG_UNIMPLEMENTED 3 [SSH-TRANS]
SSH_MSG_DEBUG 4 [SSH-TRANS] SSH_MSG_DEBUG 4 [SSH-TRANS]
SSH_MSG_SERVICE_REQUEST 5 [SSH-TRANS] SSH_MSG_SERVICE_REQUEST 5 [SSH-TRANS]
SSH_MSG_SERVICE_ACCEPT 6 [SSH-TRANS] SSH_MSG_SERVICE_ACCEPT 6 [SSH-TRANS]
SSH_MSG_KEXINIT 20 [SSH-TRANS] SSH_MSG_KEXINIT 20 [SSH-TRANS]
SSH_MSG_NEWKEYS 21 [SSH-TRANS] SSH_MSG_NEWKEYS 21 [SSH-TRANS]
SSH_MSG_KEXDH_INIT 30 [SSH-TRANS]
SSH_MSG_KEXDH_REPLY 31 [SSH-TRANS]
SSH_MSG_USERAUTH_REQUEST 50 [SSH-USERAUTH] SSH_MSG_USERAUTH_REQUEST 50 [SSH-USERAUTH]
SSH_MSG_USERAUTH_FAILURE 51 [SSH-USERAUTH] SSH_MSG_USERAUTH_FAILURE 51 [SSH-USERAUTH]
SSH_MSG_USERAUTH_SUCCESS 52 [SSH-USERAUTH] SSH_MSG_USERAUTH_SUCCESS 52 [SSH-USERAUTH]
SSH_MSG_USERAUTH_BANNER 53 [SSH-USERAUTH] SSH_MSG_USERAUTH_BANNER 53 [SSH-USERAUTH]
SSH_MSG_GLOBAL_REQUEST 80 [SSH-CONNECT] SSH_MSG_GLOBAL_REQUEST 80 [SSH-CONNECT]
SSH_MSG_REQUEST_SUCCESS 81 [SSH-CONNECT] SSH_MSG_REQUEST_SUCCESS 81 [SSH-CONNECT]
SSH_MSG_REQUEST_FAILURE 82 [SSH-CONNECT] SSH_MSG_REQUEST_FAILURE 82 [SSH-CONNECT]
SSH_MSG_CHANNEL_OPEN 90 [SSH-CONNECT] SSH_MSG_CHANNEL_OPEN 90 [SSH-CONNECT]
SSH_MSG_CHANNEL_OPEN_CONFIRMATION 91 [SSH-CONNECT] SSH_MSG_CHANNEL_OPEN_CONFIRMATION 91 [SSH-CONNECT]
SSH_MSG_CHANNEL_OPEN_FAILURE 92 [SSH-CONNECT] SSH_MSG_CHANNEL_OPEN_FAILURE 92 [SSH-CONNECT]
skipping to change at page 18, line 38 skipping to change at page 19, line 43
Full security considerations for this protocol are provided in Full security considerations for this protocol are provided in
[SSH-ARCH]. [SSH-ARCH].
6. References 6. References
6.1 Normative References 6.1 Normative References
[SSH-ARCH] [SSH-ARCH]
Lonvick, C., "SSH Protocol Architecture", Lonvick, C., "SSH Protocol Architecture",
I-D draft-ietf-secsh-architecture-21.txt, February 2005. I-D draft-ietf-secsh-architecture-22.txt, March 2005.
[SSH-TRANS] [SSH-TRANS]
Lonvick, C., "SSH Transport Layer Protocol", Lonvick, C., "SSH Transport Layer Protocol",
I-D draft-ietf-secsh-transport-23.txt, February 2005. I-D draft-ietf-secsh-transport-24.txt, March 2005.
[SSH-USERAUTH] [SSH-USERAUTH]
Lonvick, C., "SSH Authentication Protocol", Lonvick, C., "SSH Authentication Protocol",
I-D draft-ietf-secsh-userauth-26.txt, February 2005. I-D draft-ietf-secsh-userauth-27.txt, March 2005.
[SSH-CONNECT] [SSH-CONNECT]
Lonvick, C., "SSH Connection Protocol", Lonvick, C., "SSH Connection Protocol",
I-D draft-ietf-secsh-connect-24.txt, February 2005. I-D draft-ietf-secsh-connect-25.txt, March 2005.
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119, March 1997. Requirement Levels", BCP 14, RFC 2119, March 1997.
[RFC2409] Harkins, D. and D. Carrel, "The Internet Key Exchange [RFC2409] Harkins, D. and D. Carrel, "The Internet Key Exchange
(IKE)", RFC 2409, November 1998. (IKE)", RFC 2409, November 1998.
[RFC2434] Narten, T. and H. Alvestrand, "Guidelines for Writing an [RFC2434] Narten, T. and H. Alvestrand, "Guidelines for Writing an
IANA Considerations Section in RFCs", BCP 26, RFC 2434, IANA Considerations Section in RFCs", BCP 26, RFC 2434,
October 1998. October 1998.
skipping to change at page 19, line 31 skipping to change at page 20, line 36
[RFC0822] Crocker, D., "Standard for the format of ARPA Internet [RFC0822] Crocker, D., "Standard for the format of ARPA Internet
text messages", STD 11, RFC 822, August 1982. text messages", STD 11, RFC 822, August 1982.
[RFC1034] Mockapetris, P., "Domain names - concepts and facilities", [RFC1034] Mockapetris, P., "Domain names - concepts and facilities",
STD 13, RFC 1034, November 1987. STD 13, RFC 1034, November 1987.
[RFC2412] Orman, H., "The OAKLEY Key Determination Protocol", [RFC2412] Orman, H., "The OAKLEY Key Determination Protocol",
RFC 2412, November 1998. RFC 2412, November 1998.
[FIPS-46-3] [FIPS-46-3]
U.S. Dept. of Commerce, "FIPS PUB 46-3, Data Encryption National Institute of Standards and Technology, "Data
Standard (DES)", October 1999. Encryption Standard (DES)", Federal Information Processing
Standards Publication 46-3, October 1999.
Author's Address Authors' Addresses
Sami Lehtinen
SSH Communications Security Corp
Fredrikinkatu 42
HELSINKI FIN-00100
Finland
Email: sjl@ssh.com
Chris Lonvick (editor) Chris Lonvick (editor)
Cisco Systems, Inc. Cisco Systems, Inc.
12515 Research Blvd. 12515 Research Blvd.
Austin 78759 Austin 78759
USA USA
Email: clonvick@cisco.com Email: clonvick@cisco.com
Appendix A. Trademark Notice
"ssh" is a registered trademark in the United States and/or other
countries.
Note to the RFC Editor: This should be a separate section like the
subsequent ones, and not an appendix. This paragraph to be removed
before publication.
Intellectual Property Statement Intellectual Property Statement
The IETF takes no position regarding the validity or scope of any The IETF takes no position regarding the validity or scope of any
Intellectual Property Rights or other rights that might be claimed to Intellectual Property Rights or other rights that might be claimed to
pertain to the implementation or use of the technology described in pertain to the implementation or use of the technology described in
this document or the extent to which any license under such rights this document or the extent to which any license under such rights
might or might not be available; nor does it represent that it has might or might not be available; nor does it represent that it has
made any independent effort to identify any such rights. Information made any independent effort to identify any such rights. Information
on the procedures with respect to rights in RFC documents can be on the procedures with respect to rights in RFC documents can be
 End of changes. 

This html diff was produced by rfcdiff 1.23, available from http://www.levkowetz.com/ietf/tools/rfcdiff/