IETF-SSH archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

draft-ietf-secsh-assignednumbers-03.txt




-- 
Darren J Moffat

Network Working Group                                        S. Lehtinen
Internet-Draft                          SSH Communications Security Corp
Expires: January 12, 2004                                      D. Moffat
                                                        Sun Microsystems
                                                           July 14, 2003


                     SSH Protocol Assigned Numbers
                draft-ietf-secsh-assignednumbers-03.txt

Status of this Memo

      This document is an Internet-Draft and is in full conformance with
      all provisions of Section 10 of RFC2026.

      Internet-Drafts are working documents of the Internet Engineering
      Task Force (IETF), its areas, and its working groups.  Note that
      other groups may also distribute working documents as Internet-
      Drafts.

      Internet-Drafts are draft documents valid for a maximum of six
      months and may be updated, replaced, or obsoleted by other
      documents at any time.  It is inappropriate to use Internet-Drafts
      as reference material or to cite them other than as "work in
      progress."

      The list of current Internet-Drafts can be accessed at
      http://www.ietf.org/ietf/1id-abstracts.txt.

      The list of Internet-Draft Shadow Directories can be accessed at
      http://www.ietf.org/shadow.html.

      This Internet-Draft will expire on January 12, 2004.

Copyright Notice

      Copyright (C) The Internet Society (2003).  All Rights Reserved.

Abstract

      This document defines the initial state of the IANA assigned
      numbers for the SSH protocol as defined in [SSH-ARCH], [SSH-
      TRANS], [SSH-CONNECT], [SSH-USERAUTH].  This document does not
      define any new protocols or any number ranges not already defined
      in the above referenced documents.  It is intended only for
      initalization of the IANA databases referenced in those documents.






Lehtinen & Moffat       Expires January 12, 2004                [Page 1]

Internet-Draft        SSH Protocol Assigned Numbers            July 2003


Table of Contents

   1.    Message Numbers  . . . . . . . . . . . . . . . . . . . . . .  3
   1.1   Disconnect Codes . . . . . . . . . . . . . . . . . . . . . .  4
   2.    Service Names  . . . . . . . . . . . . . . . . . . . . . . .  5
   2.1   Authentication Method Names  . . . . . . . . . . . . . . . .  5
   2.2   Connection Protocol Assigned Names . . . . . . . . . . . . .  6
   2.2.1 Connection Protocol Channel Types  . . . . . . . . . . . . .  6
   2.2.2 Connection Protocol Global Request Names . . . . . . . . . .  6
   2.2.3 Connection Protocol Channel Request Names  . . . . . . . . .  6
   3.    Key Exchange Method Names  . . . . . . . . . . . . . . . . .  7
   4.    Assigned Algorithm Names . . . . . . . . . . . . . . . . . .  7
   4.1   Encryption Algorithm Names . . . . . . . . . . . . . . . . .  7
   4.2   MAC Algorithm Names  . . . . . . . . . . . . . . . . . . . .  8
   4.3   Public Key Algorithm Names . . . . . . . . . . . . . . . . .  8
         References . . . . . . . . . . . . . . . . . . . . . . . . .  8
         Authors' Addresses . . . . . . . . . . . . . . . . . . . . .  9
         Full Copyright Statement . . . . . . . . . . . . . . . . . . 10

































Lehtinen & Moffat       Expires January 12, 2004                [Page 2]

Internet-Draft        SSH Protocol Assigned Numbers            July 2003


   1. Message Numbers

      The Message Number is an 8-bit value, which describes the payload
      of a packet.

      Protocol packets have message numbers in the range 1 to 255.
      These numbers have been allocated as follows in [SSH-ARCH]:

     Transport layer protocol:

       1 to 19    Transport layer generic (e.g. disconnect, ignore, debug, etc.)
       20 to 29   Algorithm negotiation
       30 to 49   Key exchange method specific (numbers can be reused for
                  different authentication methods)

     User authentication protocol:

       50 to 59   User authentication generic
       60 to 79   User authentication method specific (numbers can be
                  reused for different authentication methods)

     Connection protocol:

       80 to 89   Connection protocol generic
       90 to 127  Channel related messages

     Reserved for client protocols:

       128 to 191 Reserved

     Local extensions:

       192 to 255 Local extensions


      Requests for assignments of new message numbers must be
      accompanied by an RFC which describes the new packet type.  If the
      RFC is not on the standards-track (i.e.  it is an informational or
      experimental RFC), it must be explicitly reviewed and approved by
      the IESG before the RFC is published and the message number is
      assigned.

   Message ID                            Value    Reference
   -----------                           -----    ---------
   SSH_MSG_DISCONNECT                       1     [SSH-TRANS]
   SSH_MSG_IGNORE                           2     [SSH-TRANS]
   SSH_MSG_UNIMPLEMENTED                    3     [SSH-TRANS]
   SSH_MSG_DEBUG                            4     [SSH-TRANS]



Lehtinen & Moffat       Expires January 12, 2004                [Page 3]

Internet-Draft        SSH Protocol Assigned Numbers            July 2003


   SSH_MSG_SERVICE_REQUEST                  5     [SSH-TRANS]
   SSH_MSG_SERVICE_ACCEPT                   6     [SSH-TRANS]
   SSH_MSG_KEXINIT                         20     [SSH-TRANS]
   SSH_MSG_NEWKEYS                         21     [SSH-TRANS]
   SSH_MSG_KEXDH_INIT                      30     [SSH-TRANS]
   SSH_MSG_KEXDH_REPLY                     31     [SSH-TRANS]
   SSH_MSG_USERAUTH_REQUEST                50     [SSH-USERAUTH]
   SSH_MSG_USERAUTH_FAILURE                51     [SSH-USERAUTH]
   SSH_MSG_USERAUTH_SUCCESS                52     [SSH-USERAUTH]
   SSH_MSG_USERAUTH_BANNER                 53     [SSH-USERAUTH]
   SSH_MSG_USERAUTH_PK_OK                  60     [SSH-USERAUTH]
   SSH_MSG_GLOBAL_REQUEST                  80     [SSH-CONNECT]
   SSH_MSG_REQUEST_SUCCESS                 81     [SSH-CONNECT]
   SSH_MSG_REQUEST_FAILURE                 82     [SSH-CONNECT]
   SSH_MSG_CHANNEL_OPEN                    90     [SSH-CONNECT]
   SSH_MSG_CHANNEL_OPEN_CONFIRMATION       91     [SSH-CONNECT]
   SSH_MSG_CHANNEL_OPEN_FAILURE            92     [SSH-CONNECT]
   SSH_MSG_CHANNEL_WINDOW_ADJUST           93     [SSH-CONNECT]
   SSH_MSG_CHANNEL_DATA                    94     [SSH-CONNECT]
   SSH_MSG_CHANNEL_EXTENDED_DATA           95     [SSH-CONNECT]
   SSH_MSG_CHANNEL_EOF                     96     [SSH-CONNECT]
   SSH_MSG_CHANNEL_CLOSE                   97     [SSH-CONNECT]
   SSH_MSG_CHANNEL_REQUEST                 98     [SSH-CONNECT]
   SSH_MSG_CHANNEL_SUCCESS                 99     [SSH-CONNECT]
   SSH_MSG_CHANNEL_FAILURE                100     [SSH-CONNECT]


   1.1 Disconnect Codes

      The Disconnect code is an 8-bit value, which describes the
      disconnect reason.  Requests for assignments of new disconnect
      codes must be accompanied by an RFC which describes the new
      disconnect reason code.


   Disconnect code                                 Value  Reference
   ----------------                                -----  ---------
   SSH_DISCONNECT_HOST_NOT_ALLOWED_TO_CONNECT        1    [SSH-TRANS]
   SSH_DISCONNECT_PROTOCOL_ERROR                     2    [SSH-TRANS]
   SSH_DISCONNECT_KEY_EXCHANGE_FAILED                3    [SSH-TRANS]
   SSH_DISCONNECT_RESERVED                           4    [SSH-TRANS]
   SSH_DISCONNECT_MAC_ERROR                          5    [SSH-TRANS]
   SSH_DISCONNECT_COMPRESSION_ERROR                  6    [SSH-TRANS]
   SSH_DISCONNECT_SERVICE_NOT_AVAILABLE              7    [SSH-TRANS]
   SSH_DISCONNECT_PROTOCOL_VERSION_NOT_SUPPORTED     8    [SSH-TRANS]
   SSH_DISCONNECT_HOST_KEY_NOT_VERIFIABLE            9    [SSH-TRANS]
   SSH_DISCONNECT_CONNECTION_LOST                   10    [SSH-TRANS]
   SSH_DISCONNECT_BY_APPLICATION                    11    [SSH-TRANS]



Lehtinen & Moffat       Expires January 12, 2004                [Page 4]

Internet-Draft        SSH Protocol Assigned Numbers            July 2003


   SSH_DISCONNECT_TOO_MANY_CONNECTIONS              12    [SSH-TRANS]
   SSH_DISCONNECT_AUTH_CANCELLED_BY_USER            13    [SSH-TRANS]
   SSH_DISCONNECT_NO_MORE_AUTH_METHODS_AVAILABLE    14    [SSH-TRANS]
   SSH_DISCONNECT_ILLEGAL_USER_NAME                 15    [SSH-TRANS]


   2. Service Names

      The Service Name is used to describe a protocol layer.  These
      names MUST be printable US-ASCII strings, and MUST NOT contain the
      characters at-sign ('@'), comma (','), or whitespace or control
      characters (ASCII codes 32 or less).  Names are case-sensitive,
      and MUST NOT be longer than 64 characters.

      Requests for assignments of new service names must be accompanied
      by an RFC which describes the interpretation for the service name.
      If the RFC is not on the standards-track (i.e.  it is an
      informational or experimental RFC), it must be explicitly reviewed
      and approved by the IESG before the RFC is published and the
      service name is assigned.

   Service name                  Reference
   -------------                 ---------
   ssh-userauth                  [SSH-USERAUTH]
   ssh-connection                [SSH-CONNECT]


   2.1 Authentication Method Names

      The Authentication Method Name is used to describe an
      authentication method for the "ssh-userauth" service [SSH-
      USERAUTH].  These names MUST be printable US-ASCII strings, and
      MUST NOT contain the characters at-sign ('@'), comma (','), or
      whitespace or control characters (ASCII codes 32 or less).  Names
      are case-sensitive, and MUST NOT be longer than 64 characters.

      Requests for assignments of new authentication method names must
      be accompanied by an RFC which describes the interpretation for
      the authentication method.

   Method name                   Reference
   ------------                  ---------
   publickey                     [SSH-USERAUTH, Section 4]
   password                      [SSH-USERAUTH, Section 5]
   hostbased                     [SSH-USERAUTH, Section 6]
   none                          [SSH-USERAUTH, Section 2.3]





Lehtinen & Moffat       Expires January 12, 2004                [Page 5]

Internet-Draft        SSH Protocol Assigned Numbers            July 2003


   2.2 Connection Protocol Assigned Names

      The following request and type names MUST be printable US-ASCII
      strings, and MUST NOT contain the characters at-sign ('@'), comma
      (','), or whitespace or control characters (ASCII codes 32 or
      less).  Names are case-sensitive, and MUST NOT be longer than 64
      characters.

      Requests for assignments of new assigned names must be accompanied
      by an RFC which describes the interpretation for the type or
      request.

   2.2.1 Connection Protocol Channel Types

   Channel type                  Reference
   ------------                  ---------
   session                       [SSH-CONNECT, Section 4.1]
   x11                           [SSH-CONNECT, Section 4.3.2]
   forwarded-tcpip               [SSH-CONNECT, Section 5.2]
   direct-tcpip                  [SSH-CONNECT, Section 5.2]


   2.2.2 Connection Protocol Global Request Names

   Request type                  Reference
   ------------                  ---------
   tcpip-forward                 [SSH-CONNECT, Section 5.1]
   cancel-tcpip-forward          [SSH-CONNECT, Section 5.1]


   2.2.3 Connection Protocol Channel Request Names

   Request type                  Reference
   ------------                  ---------
   pty-req                       [SSH-CONNECT, Section 4.2]
   x11-req                       [SSH-CONNECT, Section 4.3.1]
   env                           [SSH-CONNECT, Section 4.4]
   shell                         [SSH-CONNECT, Section 4.5]
   exec                          [SSH-CONNECT, Section 4.5]
   subsystem                     [SSH-CONNECT, Section 4.5]
   window-change                 [SSH-CONNECT, Section 4.7]
   xon-xoff                      [SSH-CONNECT, Section 4.8]
   signal                        [SSH-CONNECT, Section 4.9]
   exit-status                   [SSH-CONNECT, Section 4.10]
   exit-signal                   [SSH-CONNECT, Section 4.10]






Lehtinen & Moffat       Expires January 12, 2004                [Page 6]

Internet-Draft        SSH Protocol Assigned Numbers            July 2003


   3. Key Exchange Method Names

      The Key Exchange Method Name describes a key-exchange method for
      the protocol [SSH-TRANS].  The names MUST be printable US-ASCII
      strings, and MUST NOT contain the characters at-sign ('@'), comma
      (','), or whitespace or control characters (ASCII codes 32 or
      less).  Names are case-sensitive, and MUST NOT be longer than 64
      characters.

      Requests for assignment of new key-exchange method names must be
      accompanied by a reference to a standards-track or Informational
      RFC which describes this method.

   Method name                   Reference
   ------------                  ---------
   diffie-hellman-group1-sha1    [SSH-TRANS, Section 4.5]


   4. Assigned Algorithm Names

      The following identifiers (names) MUST be printable US-ASCII
      strings, and MUST NOT contain the characters at-sign ('@'), comma
      (','), or whitespace or control characters (ASCII codes 32 or
      less).  Names are case-sensitive, and MUST NOT be longer than 64
      characters.

      Requests for assignment of new algorithm names must be accompanied
      by a reference to a standards-track or Informational RFC or a
      reference to published cryptographic literature which describes
      the algorithm.

   4.1 Encryption Algorithm Names

   Cipher name                   Reference
   ------------                  ---------
   3des-cbc                      [SSH-TRANS, Section 4.3]
   blowfish-cbc                  [SSH-TRANS, Section 4.3]
   twofish256-cbc                [SSH-TRANS, Section 4.3]
   twofish-cbc                   [SSH-TRANS, Section 4.3]
   twofish192-cbc                [SSH-TRANS, Section 4.3]
   twofish128-cbc                [SSH-TRANS, Section 4.3]
   aes256-cbc                    [SSH-TRANS, Section 4.3]
   aes192-cbc                    [SSH-TRANS, Section 4.3]
   aes128-cbc                    [SSH-TRANS, Section 4.3]
   serpent256-cbc                [SSH-TRANS, Section 4.3]
   serpent192-cbc                [SSH-TRANS, Section 4.3]
   serpent128-cbc                [SSH-TRANS, Section 4.3]
   arcfour                       [SSH-TRANS, Section 4.3]



Lehtinen & Moffat       Expires January 12, 2004                [Page 7]

Internet-Draft        SSH Protocol Assigned Numbers            July 2003


   idea-cbc                      [SSH-TRANS, Section 4.3]
   cast128-cbc                   [SSH-TRANS, Section 4.3]
   none                          [SSH-TRANS, Section 4.3]
   des-cbc                       [FIPS-46-3] HISTORIC; See page 4 of [FIPS 46-3]


   4.2 MAC Algorithm Names



   MAC name                      Reference
   ---------                     ---------
   hmac-sha1                     [SSH-TRANS, Section 4.4]
   hmac-sha1-96                  [SSH-TRANS, Section 4.4]
   hmac-md5                      [SSH-TRANS, Section 4.4]
   hmac-md5-96                   [SSH-TRANS, Section 4.4]
   none                          [SSH-TRANS, Section 4.4]


   4.3 Public Key Algorithm Names

   Algorithm name                Reference
   ---------------               ---------
   ssh-dss                       [SSH-TRANS, Section 4.6]
   ssh-rsa                       [SSH-TRANS, Section 4.6]
   x509v3-sign-rsa               [SSH-TRANS, Section 4.6]
   x509v3-sign-dss               [SSH-TRANS, Section 4.6]
   spki-sign-rsa                 [SSH-TRANS, Section 4.6]
   spki-sign-dss                 [SSH-TRANS, Section 4.6]
   pgp-sign-rsa                  [SSH-TRANS, Section 4.6]
   pgp-sign-dss                  [SSH-TRANS, Section 4.6]

References

      [SSH-ARCH]      Ylonen, T., "SSH Protocol Architecture", I-D
                      draft-ietf-architecture-14.txt, July 2003.

      [SSH-TRANS]     Ylonen, T., "SSH Transport Layer Protocol", I-D
                      draft-ietf-transport-16.txt, July 2003.

      [SSH-USERAUTH]  Ylonen, T., "SSH Authentication Protocol", I-D
                      draft-ietf-userauth-17.txt, July 2003.

      [SSH-CONNECT]   Ylonen, T., "SSH Connection Protocol", I-D draft-
                      ietf-connect-17.txt, July 2003.

      [SSH-NUMBERS]   Lehtinen, S. and D. Moffat, "SSH Protocol Assigned
                      Numbers", I-D draft-ietf-secsh-assignednumbers-



Lehtinen & Moffat       Expires January 12, 2004                [Page 8]

Internet-Draft        SSH Protocol Assigned Numbers            July 2003


                      03.txt, July 2003.

      [FIPS-46-3]     U.S. Dept. of Commerce, ., "FIPS PUB 46-3, Data
                      Encryption Standard (DES)", October 1999.


Authors' Addresses

   Sami Lehtinen
   SSH Communications Security Corp
   Fredrikinkatu 42
   HELSINKI  FIN-00100
   Finland

   EMail: sjl%ssh.com@localhost


   Darren J Moffat
   Sun Microsystems
   901 San Antonio Road
   Palo Alto  94303
   USA

   EMail: Darren.Moffat%Sun.COM@localhost



























Lehtinen & Moffat       Expires January 12, 2004                [Page 9]

Internet-Draft        SSH Protocol Assigned Numbers            July 2003


Full Copyright Statement

      Copyright (C) The Internet Society (2003).  All Rights Reserved.

      This document and translations of it may be copied and furnished
      to others, and derivative works that comment on or otherwise
      explain it or assist in its implementation may be prepared,
      copied, published and distributed, in whole or in part, without
      restriction of any kind, provided that the above copyright notice
      and this paragraph are included on all such copies and derivative
      works.  However, this document itself may not be modified in any
      way, such as by removing the copyright notice or references to the
      Internet Society or other Internet organizations, except as needed
      for the purpose of developing Internet standards in which case the
      procedures for copyrights defined in the Internet Standards
      process must be followed, or as required to translate it into
      languages other than English.

      The limited permissions granted above are perpetual and will not
      be revoked by the Internet Society or its successors or assigns.

      This document and the information contained herein is provided on
      an "AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET
      ENGINEERING TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR
      IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF
      THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
      WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.

Acknowledgement

      Funding for the RFC Editor function is currently provided by the
      Internet Society.



















Lehtinen & Moffat       Expires January 12, 2004               [Page 10]



Home | Main Index | Thread Index | Old Index