科技行者

行者学院 转型私董会 科技行者专题报道 网红大战科技行者

知识库

知识库 安全导航

至顶网网络频道Telnet Protocol specification(7)

Telnet Protocol specification(7)

  • 扫一扫
    分享文章到微信

  • 扫一扫
    关注官方公众号
    至顶头条

The purpose of the TELNET Protocol is to provide a fairly general, bi-directional, eight-bit byte oriented communications facility.

作者:论坛整理 来源:ZDNet网络安全 2007年12月28日

关键字: opentelnet telnet命令 linux telnet telnet入侵 telnet telnet端口

  • 评论
  • 分享微博
  • 分享邮件

  Interrupt Process (IP)

  Suspend, interrupt, abort or terminate the process to which the NVT is connected. Also, part of the out-of-band signal for other protocols which use TELNET.

  Abort Output (AO)

  Allow the current process to (appear to) run to completion, but do not send its output to the user. Also, send a Synch to the user.

  Are You There (AYT)

  Send back to the NVT some visible (i.e., printable) evidence that the AYT was received.

  Erase Character (EC)

  The recipient should delete the last preceding undeleted character or "print position" from the data stream.

  Erase Line (EL)

  The recipient should delete characters from the data stream back to, but not including, the last "CR LF" sequence sent over the TELNET connection.

  The spirit of these "extra" keys, and also the printer format effectors, is that they should represent a natural extension of the mapping that already must be done from "NVT" into "local".

  Just as the NVT data byte 104 should be mapped into whatever the local code for "uppercase D" is, so the EC character should be mapped into whatever the local "Erase Character" function is.

  Further, just as the mapping for 174 is somewhat arbitrary in an environment that has no "vertical bar" character, the EL character may have a somewhat arbitrary mapping (or none at all) if there is no local "Erase Line" facility. Similarly for format effectors:

  if the terminal actually does have a "Vertical tab", then the mapping for VT is obvious, and only when the terminal does not have a vertical tab should the effect of VT be unpredictable.

  TELNET COMMAND STRUCTURE

  All TELNET commands consist of at least a two byte sequence: the "Interpret as Command" (IAC) escape character followed by the code for the command. The commands dealing with option negotiation are three byte sequences, the third byte being the code for the option referenced. This format was chosen so that as more comprehensive use of the "data space" is made -- by negotiations from the basic NVT, of course -- collisions of data bytes with reserved command values will be minimized, all such collisions requiring the inconvenience, and inefficiency, of "escaping" the data bytes into the stream. With the current set-up, only the IAC need be doubled to be sent as data, and the other 255 codes may be passed transparently.

  The following are the defined TELNET commands. Note that these codes and code sequences have the indicated meaning only when immediately preceded by an IAC.

  NAME CODE MEANING

  SE 240 End of subnegotiation parameters

  NOP 241 No operation

  Data Mark 242 The data stream portion of a Synch

  This should always be accompanied by a TCP Urgent notification.

  Break 243 NVT character BRK

  Interrupt Process 244 The function IP

  Abort output 245 The function AO

  Are You There 246 The function AYT

  Erase character 247 The function EC

  Erase Line 248 The function EL

  Go ahead 249 The GA signal

  SB 250 Indicates that what follows is subnegotiation of the indicated option

  WILL (option code) 251 Indicates the desire to begin performing, or confirmation that you are now performing, the indicated option

  WON't (option code) 252 Indicates the refusal to perform, or continue performing, the indicated option.

  DO (option code) 253 Indicates the request that the other party perform, or confirmation that you are expecting the other party to perform, the indicated option.

  DON'T (option code) 254 Indicates the demand that the other party stop performing, or confirmation that you are no longer expecting the other party to perform, the indicated option.

  IAC 255 Data Byte 255.

  CONNECTION ESTABLISHMENT

  The TELNET TCP connection is established between the user's port U and the server's port L. The server listens on its well known port L for such connections. Since a TCP connection is full duplex and identified by the pair of ports, the server can engage in many simultaneous connections involving it's port L and different user ports U.

  Port Assignment

  When used for remote user access to service hosts (i.e., remote terminal access) this protocol is assigned server port 23 (27 octal). That is L=23.

    • 评论
    • 分享微博
    • 分享邮件
    邮件订阅

    如果您非常迫切的想了解IT领域最新产品与技术信息,那么订阅至顶网技术邮件将是您的最佳途径之一。

    重磅专题
    往期文章
    最新文章