科技行者

行者学院 转型私董会 科技行者专题报道 网红大战科技行者

知识库

知识库 安全导航

至顶网网络频道Proposed Telnet Changes

Proposed Telnet Changes

  • 扫一扫
    分享文章到微信

  • 扫一扫
    关注官方公众号
    至顶头条

Cal comp plotter attached to a teletype has logic permitting a  program to turn the plotter on and off.

作者:论坛整理 来源:ZDNet网络安全 2007年12月26日

关键字: telnet命令 opentelnet linux telnet telnet入侵 telnet telnet端口

  • 评论
  • 分享微博
  • 分享邮件

  Network Working Group Tom O'Sullivan

  Request for Comments: 340 Raytheon Company

  NIC 9933 Sudbury, Mass.

  Categories: Telnet

  References: RFC32815 May 1972

  PROPOSED TELNET CHANGES

  The proposed change to the TELNET protocol calling for one standard protocol and dropping the idea of minimum implementation seems reasonable at this time.

  I suggest that both Data Types and Hide Your Input be kept for the following reasons:

  Data Types:

  The objection stating that switching out of ASCII results in an irreversible change and loss of control can be met by requiring other codes to provide to a return to ASCII. Each other code may have its own return code, however, it may not always be employed. Other codes are important for alphanumeric terminals that have special devices attached. Several potential cases can be cited:

  1. Cal comp plotter attached to a teletype has logic permitting a program to turn the plotter on and off. When operating I believe it uses an 8 bit code which could conflict with Telnet signals.

  2. Numerically controlled machines, either controlled from a user terminal or code prepared by a HOST computer to be punched on the paper tape punch at a teletype way require the use of an arbitrary 8 bit code.

  3. Experiments controlled from alphanumeric terminal or sensor data collected through a cal-comp like connection may require the use of a full 8 bit code.

  In these cases a transparent data type with a provision for a return to ASCII mode seems desirable.

  As more and more use of data base systems in the network is considered, the need for and importance of using accesskeys, passwords, etc. grows. The fact that it is difficult to select the length of input to be hidden is not a persuasive argument. Potential solutions seem to exist, e.g. the protocol could provide for accepting length statements from the user program, data base system, operating system, etc. and in default of this, use a default length representing the server system expected optimum length.

  [ This RFCwas put into machine readable form for entry ]

  [ into the online RFCarchives by BBN Corp. under the ]

  [ direction of Alex McKenzie. 12/96 ]

    • 评论
    • 分享微博
    • 分享邮件
    邮件订阅

    如果您非常迫切的想了解IT领域最新产品与技术信息,那么订阅至顶网技术邮件将是您的最佳途径之一。

    重磅专题
    往期文章
    最新文章