xref: /freebsd/crypto/openssh/PROTOCOL (revision cce7d3464f90246064915b2a37a95ef8a07c7370)
1d4af9e69SDag-Erling SmørgravThis documents OpenSSH's deviations and extensions to the published SSH
2d4af9e69SDag-Erling Smørgravprotocol.
3d4af9e69SDag-Erling Smørgrav
4d4af9e69SDag-Erling SmørgravNote that OpenSSH's sftp and sftp-server implement revision 3 of the SSH
5d4af9e69SDag-Erling Smørgravfilexfer protocol described in:
6d4af9e69SDag-Erling Smørgrav
7d4af9e69SDag-Erling Smørgravhttp://www.openssh.com/txt/draft-ietf-secsh-filexfer-02.txt
8d4af9e69SDag-Erling Smørgrav
9d4af9e69SDag-Erling SmørgravFeatures from newer versions of the draft are not supported, unless
10d4af9e69SDag-Erling Smørgravexplicitly implemented as extensions described below.
11d4af9e69SDag-Erling Smørgrav
12d4af9e69SDag-Erling SmørgravThe protocol used by OpenSSH's ssh-agent is described in the file
13d4af9e69SDag-Erling SmørgravPROTOCOL.agent
14d4af9e69SDag-Erling Smørgrav
15d4af9e69SDag-Erling Smørgrav1. transport: Protocol 2 MAC algorithm "umac-64@openssh.com"
16d4af9e69SDag-Erling Smørgrav
17d4af9e69SDag-Erling SmørgravThis is a new transport-layer MAC method using the UMAC algorithm
18d4af9e69SDag-Erling Smørgrav(rfc4418). This method is identical to the "umac-64" method documented
19d4af9e69SDag-Erling Smørgravin:
20d4af9e69SDag-Erling Smørgrav
21d4af9e69SDag-Erling Smørgravhttp://www.openssh.com/txt/draft-miller-secsh-umac-01.txt
22d4af9e69SDag-Erling Smørgrav
23d4af9e69SDag-Erling Smørgrav2. transport: Protocol 2 compression algorithm "zlib@openssh.com"
24d4af9e69SDag-Erling Smørgrav
25d4af9e69SDag-Erling SmørgravThis transport-layer compression method uses the zlib compression
26d4af9e69SDag-Erling Smørgravalgorithm (identical to the "zlib" method in rfc4253), but delays the
27d4af9e69SDag-Erling Smørgravstart of compression until after authentication has completed. This
28d4af9e69SDag-Erling Smørgravavoids exposing compression code to attacks from unauthenticated users.
29d4af9e69SDag-Erling Smørgrav
30d4af9e69SDag-Erling SmørgravThe method is documented in:
31d4af9e69SDag-Erling Smørgrav
32d4af9e69SDag-Erling Smørgravhttp://www.openssh.com/txt/draft-miller-secsh-compression-delayed-00.txt
33d4af9e69SDag-Erling Smørgrav
34d4af9e69SDag-Erling Smørgrav3. connection: Channel write close extension "eow@openssh.com"
35d4af9e69SDag-Erling Smørgrav
36d4af9e69SDag-Erling SmørgravThe SSH connection protocol (rfc4254) provides the SSH_MSG_CHANNEL_EOF
37d4af9e69SDag-Erling Smørgravmessage to allow an endpoint to signal its peer that it will send no
38d4af9e69SDag-Erling Smørgravmore data over a channel. Unfortunately, there is no symmetric way for
39d4af9e69SDag-Erling Smørgravan endpoint to request that its peer should cease sending data to it
40d4af9e69SDag-Erling Smørgravwhile still keeping the channel open for the endpoint to send data to
41d4af9e69SDag-Erling Smørgravthe peer.
42d4af9e69SDag-Erling Smørgrav
43d4af9e69SDag-Erling SmørgravThis is desirable, since it saves the transmission of data that would
44d4af9e69SDag-Erling Smørgravotherwise need to be discarded and it allows an endpoint to signal local
45d4af9e69SDag-Erling Smørgravprocesses of the condition, e.g. by closing the corresponding file
46d4af9e69SDag-Erling Smørgravdescriptor.
47d4af9e69SDag-Erling Smørgrav
48d4af9e69SDag-Erling SmørgravOpenSSH implements a channel extension message to perform this
49d4af9e69SDag-Erling Smørgravsignalling: "eow@openssh.com" (End Of Write). This message is sent by
50d4af9e69SDag-Erling Smørgravan endpoint when the local output of a session channel is closed or
51d4af9e69SDag-Erling Smørgravexperiences a write error. The message is formatted as follows:
52d4af9e69SDag-Erling Smørgrav
53d4af9e69SDag-Erling Smørgrav	byte		SSH_MSG_CHANNEL_REQUEST
54d4af9e69SDag-Erling Smørgrav	uint32		recipient channel
55d4af9e69SDag-Erling Smørgrav	string		"eow@openssh.com"
56d4af9e69SDag-Erling Smørgrav	boolean		FALSE
57d4af9e69SDag-Erling Smørgrav
58d4af9e69SDag-Erling SmørgravOn receiving this message, the peer SHOULD cease sending data of
59d4af9e69SDag-Erling Smørgravthe channel and MAY signal the process from which the channel data
60d4af9e69SDag-Erling Smørgravoriginates (e.g. by closing its read file descriptor).
61d4af9e69SDag-Erling Smørgrav
62d4af9e69SDag-Erling SmørgravAs with the symmetric SSH_MSG_CHANNEL_EOF message, the channel does
63d4af9e69SDag-Erling Smørgravremain open after a "eow@openssh.com" has been sent and more data may
64d4af9e69SDag-Erling Smørgravstill be sent in the other direction. This message does not consume
65d4af9e69SDag-Erling Smørgravwindow space and may be sent even if no window space is available.
66d4af9e69SDag-Erling Smørgrav
67cce7d346SDag-Erling SmørgravNB. due to certain broken SSH implementations aborting upon receipt
68cce7d346SDag-Erling Smørgravof this message (in contravention of RFC4254 section 5.4), this
69cce7d346SDag-Erling Smørgravmessage is only sent to OpenSSH peers (identified by banner).
70cce7d346SDag-Erling SmørgravOther SSH implementations may be whitelisted to receive this message
71cce7d346SDag-Erling Smørgravupon request.
72cce7d346SDag-Erling Smørgrav
73d4af9e69SDag-Erling Smørgrav4. connection: disallow additional sessions extension
74d4af9e69SDag-Erling Smørgrav   "no-more-sessions@openssh.com"
75d4af9e69SDag-Erling Smørgrav
76d4af9e69SDag-Erling SmørgravMost SSH connections will only ever request a single session, but a
77d4af9e69SDag-Erling Smørgravattacker may abuse a running ssh client to surreptitiously open
78d4af9e69SDag-Erling Smørgravadditional sessions under their control. OpenSSH provides a global
79d4af9e69SDag-Erling Smørgravrequest "no-more-sessions@openssh.com" to mitigate this attack.
80d4af9e69SDag-Erling Smørgrav
81d4af9e69SDag-Erling SmørgravWhen an OpenSSH client expects that it will never open another session
82d4af9e69SDag-Erling Smørgrav(i.e. it has been started with connection multiplexing disabled), it
83d4af9e69SDag-Erling Smørgravwill send the following global request:
84d4af9e69SDag-Erling Smørgrav
85d4af9e69SDag-Erling Smørgrav	byte		SSH_MSG_GLOBAL_REQUEST
86d4af9e69SDag-Erling Smørgrav	string		"no-more-sessions@openssh.com"
87d4af9e69SDag-Erling Smørgrav	char		want-reply
88d4af9e69SDag-Erling Smørgrav
89d4af9e69SDag-Erling SmørgravOn receipt of such a message, an OpenSSH server will refuse to open
90d4af9e69SDag-Erling Smørgravfuture channels of type "session" and instead immediately abort the
91d4af9e69SDag-Erling Smørgravconnection.
92d4af9e69SDag-Erling Smørgrav
93d4af9e69SDag-Erling SmørgravNote that this is not a general defence against compromised clients
94d4af9e69SDag-Erling Smørgrav(that is impossible), but it thwarts a simple attack.
95d4af9e69SDag-Erling Smørgrav
96cce7d346SDag-Erling SmørgravNB. due to certain broken SSH implementations aborting upon receipt
97cce7d346SDag-Erling Smørgravof this message, the no-more-sessions request is only sent to OpenSSH
98cce7d346SDag-Erling Smørgravservers (identified by banner). Other SSH implementations may be
99cce7d346SDag-Erling Smørgravwhitelisted to receive this message upon request.
100cce7d346SDag-Erling Smørgrav
101d4af9e69SDag-Erling Smørgrav5. connection: Tunnel forward extension "tun@openssh.com"
102d4af9e69SDag-Erling Smørgrav
103d4af9e69SDag-Erling SmørgravOpenSSH supports layer 2 and layer 3 tunnelling via the "tun@openssh.com"
104d4af9e69SDag-Erling Smørgravchannel type. This channel type supports forwarding of network packets
105d4af9e69SDag-Erling Smørgravwith datagram boundaries intact between endpoints equipped with
106d4af9e69SDag-Erling Smørgravinterfaces like the BSD tun(4) device. Tunnel forwarding channels are
107d4af9e69SDag-Erling Smørgravrequested by the client with the following packet:
108d4af9e69SDag-Erling Smørgrav
109d4af9e69SDag-Erling Smørgrav	byte		SSH_MSG_CHANNEL_OPEN
110d4af9e69SDag-Erling Smørgrav	string		"tun@openssh.com"
111d4af9e69SDag-Erling Smørgrav	uint32		sender channel
112d4af9e69SDag-Erling Smørgrav	uint32		initial window size
113d4af9e69SDag-Erling Smørgrav	uint32		maximum packet size
114d4af9e69SDag-Erling Smørgrav	uint32		tunnel mode
115d4af9e69SDag-Erling Smørgrav	uint32		remote unit number
116d4af9e69SDag-Erling Smørgrav
117d4af9e69SDag-Erling SmørgravThe "tunnel mode" parameter specifies whether the tunnel should forward
118d4af9e69SDag-Erling Smørgravlayer 2 frames or layer 3 packets. It may take one of the following values:
119d4af9e69SDag-Erling Smørgrav
120d4af9e69SDag-Erling Smørgrav	SSH_TUNMODE_POINTOPOINT  1		/* layer 3 packets */
121d4af9e69SDag-Erling Smørgrav	SSH_TUNMODE_ETHERNET     2		/* layer 2 frames */
122d4af9e69SDag-Erling Smørgrav
123d4af9e69SDag-Erling SmørgravThe "tunnel unit number" specifies the remote interface number, or may
124d4af9e69SDag-Erling Smørgravbe zero to allow the server to automatically chose an interface. A server
125d4af9e69SDag-Erling Smørgravthat is not willing to open a client-specified unit should refuse the
126d4af9e69SDag-Erling Smørgravrequest with a SSH_MSG_CHANNEL_OPEN_FAILURE error. On successful open,
127d4af9e69SDag-Erling Smørgravthe server should reply with SSH_MSG_CHANNEL_OPEN_SUCCESS.
128d4af9e69SDag-Erling Smørgrav
129d4af9e69SDag-Erling SmørgravOnce established the client and server may exchange packet or frames
130d4af9e69SDag-Erling Smørgravover the tunnel channel by encapsulating them in SSH protocol strings
131d4af9e69SDag-Erling Smørgravand sending them as channel data. This ensures that packet boundaries
132d4af9e69SDag-Erling Smørgravare kept intact. Specifically, packets are transmitted using normal
133d4af9e69SDag-Erling SmørgravSSH_MSG_CHANNEL_DATA packets:
134d4af9e69SDag-Erling Smørgrav
135d4af9e69SDag-Erling Smørgrav	byte		SSH_MSG_CHANNEL_DATA
136d4af9e69SDag-Erling Smørgrav	uint32		recipient channel
137d4af9e69SDag-Erling Smørgrav	string		data
138d4af9e69SDag-Erling Smørgrav
139d4af9e69SDag-Erling SmørgravThe contents of the "data" field for layer 3 packets is:
140d4af9e69SDag-Erling Smørgrav
141d4af9e69SDag-Erling Smørgrav	uint32			packet length
142d4af9e69SDag-Erling Smørgrav	uint32			address family
143d4af9e69SDag-Erling Smørgrav	byte[packet length - 4]	packet data
144d4af9e69SDag-Erling Smørgrav
145d4af9e69SDag-Erling SmørgravThe "address family" field identifies the type of packet in the message.
146d4af9e69SDag-Erling SmørgravIt may be one of:
147d4af9e69SDag-Erling Smørgrav
148d4af9e69SDag-Erling Smørgrav	SSH_TUN_AF_INET		2		/* IPv4 */
149d4af9e69SDag-Erling Smørgrav	SSH_TUN_AF_INET6	24		/* IPv6 */
150d4af9e69SDag-Erling Smørgrav
151d4af9e69SDag-Erling SmørgravThe "packet data" field consists of the IPv4/IPv6 datagram itself
152d4af9e69SDag-Erling Smørgravwithout any link layer header.
153d4af9e69SDag-Erling Smørgrav
154d4af9e69SDag-Erling SmørgravThe contents of the "data" field for layer 3 packets is:
155d4af9e69SDag-Erling Smørgrav
156d4af9e69SDag-Erling Smørgrav	uint32			packet length
157d4af9e69SDag-Erling Smørgrav	byte[packet length]	frame
158d4af9e69SDag-Erling Smørgrav
159d4af9e69SDag-Erling SmørgravThe "frame" field contains an IEEE 802.3 Ethernet frame, including
160d4af9e69SDag-Erling Smørgravheader.
161d4af9e69SDag-Erling Smørgrav
162d4af9e69SDag-Erling Smørgrav6. sftp: Reversal of arguments to SSH_FXP_SYMLINK
163d4af9e69SDag-Erling Smørgrav
164d4af9e69SDag-Erling SmørgravWhen OpenSSH's sftp-server was implemented, the order of the arguments
165d4af9e69SDag-Erling Smørgravto the SSH_FXP_SYMLINK method was inadvertently reversed. Unfortunately,
166d4af9e69SDag-Erling Smørgravthe reversal was not noticed until the server was widely deployed. Since
167d4af9e69SDag-Erling Smørgravfixing this to follow the specification would cause incompatibility, the
168d4af9e69SDag-Erling Smørgravcurrent order was retained. For correct operation, clients should send
169d4af9e69SDag-Erling SmørgravSSH_FXP_SYMLINK as follows:
170d4af9e69SDag-Erling Smørgrav
171d4af9e69SDag-Erling Smørgrav	uint32		id
172d4af9e69SDag-Erling Smørgrav	string		targetpath
173d4af9e69SDag-Erling Smørgrav	string		linkpath
174d4af9e69SDag-Erling Smørgrav
175d4af9e69SDag-Erling Smørgrav7. sftp: Server extension announcement in SSH_FXP_VERSION
176d4af9e69SDag-Erling Smørgrav
177d4af9e69SDag-Erling SmørgravOpenSSH's sftp-server lists the extensions it supports using the
178d4af9e69SDag-Erling Smørgravstandard extension announcement mechanism in the SSH_FXP_VERSION server
179d4af9e69SDag-Erling Smørgravhello packet:
180d4af9e69SDag-Erling Smørgrav
181d4af9e69SDag-Erling Smørgrav	uint32		3		/* protocol version */
182d4af9e69SDag-Erling Smørgrav	string		ext1-name
183d4af9e69SDag-Erling Smørgrav	string		ext1-version
184d4af9e69SDag-Erling Smørgrav	string		ext2-name
185d4af9e69SDag-Erling Smørgrav	string		ext2-version
186d4af9e69SDag-Erling Smørgrav	...
187d4af9e69SDag-Erling Smørgrav	string		extN-name
188d4af9e69SDag-Erling Smørgrav	string		extN-version
189d4af9e69SDag-Erling Smørgrav
190d4af9e69SDag-Erling SmørgravEach extension reports its integer version number as an ASCII encoded
191d4af9e69SDag-Erling Smørgravstring, e.g. "1". The version will be incremented if the extension is
192d4af9e69SDag-Erling Smørgravever changed in an incompatible way. The server MAY advertise the same
193d4af9e69SDag-Erling Smørgravextension with multiple versions (though this is unlikely). Clients MUST
194d4af9e69SDag-Erling Smørgravcheck the version number before attempting to use the extension.
195d4af9e69SDag-Erling Smørgrav
196d4af9e69SDag-Erling Smørgrav8. sftp: Extension request "posix-rename@openssh.com"
197d4af9e69SDag-Erling Smørgrav
198d4af9e69SDag-Erling SmørgravThis operation provides a rename operation with POSIX semantics, which
199d4af9e69SDag-Erling Smørgravare different to those provided by the standard SSH_FXP_RENAME in
200d4af9e69SDag-Erling Smørgravdraft-ietf-secsh-filexfer-02.txt. This request is implemented as a
201d4af9e69SDag-Erling SmørgravSSH_FXP_EXTENDED request with the following format:
202d4af9e69SDag-Erling Smørgrav
203d4af9e69SDag-Erling Smørgrav	uint32		id
204d4af9e69SDag-Erling Smørgrav	string		"posix-rename@openssh.com"
205d4af9e69SDag-Erling Smørgrav	string		oldpath
206d4af9e69SDag-Erling Smørgrav	string		newpath
207d4af9e69SDag-Erling Smørgrav
208d4af9e69SDag-Erling SmørgravOn receiving this request the server will perform the POSIX operation
209d4af9e69SDag-Erling Smørgravrename(oldpath, newpath) and will respond with a SSH_FXP_STATUS message.
210d4af9e69SDag-Erling SmørgravThis extension is advertised in the SSH_FXP_VERSION hello with version
211d4af9e69SDag-Erling Smørgrav"1".
212d4af9e69SDag-Erling Smørgrav
213d4af9e69SDag-Erling Smørgrav9. sftp: Extension requests "statvfs@openssh.com" and
214d4af9e69SDag-Erling Smørgrav         "fstatvfs@openssh.com"
215d4af9e69SDag-Erling Smørgrav
216d4af9e69SDag-Erling SmørgravThese requests correspond to the statvfs and fstatvfs POSIX system
217d4af9e69SDag-Erling Smørgravinterfaces. The "statvfs@openssh.com" request operates on an explicit
218d4af9e69SDag-Erling Smørgravpathname, and is formatted as follows:
219d4af9e69SDag-Erling Smørgrav
220d4af9e69SDag-Erling Smørgrav	uint32		id
221d4af9e69SDag-Erling Smørgrav	string		"statvfs@openssh.com"
222d4af9e69SDag-Erling Smørgrav	string		path
223d4af9e69SDag-Erling Smørgrav
224d4af9e69SDag-Erling SmørgravThe "fstatvfs@openssh.com" operates on an open file handle:
225d4af9e69SDag-Erling Smørgrav
226d4af9e69SDag-Erling Smørgrav	uint32		id
227d4af9e69SDag-Erling Smørgrav	string		"fstatvfs@openssh.com"
228d4af9e69SDag-Erling Smørgrav	string		handle
229d4af9e69SDag-Erling Smørgrav
230d4af9e69SDag-Erling SmørgravThese requests return a SSH_FXP_STATUS reply on failure. On success they
231d4af9e69SDag-Erling Smørgravreturn the following SSH_FXP_EXTENDED_REPLY reply:
232d4af9e69SDag-Erling Smørgrav
233d4af9e69SDag-Erling Smørgrav	uint32		id
234d4af9e69SDag-Erling Smørgrav	uint64		f_bsize		/* file system block size */
235d4af9e69SDag-Erling Smørgrav	uint64		f_frsize	/* fundamental fs block size */
236d4af9e69SDag-Erling Smørgrav	uint64		f_blocks	/* number of blocks (unit f_frsize) */
237d4af9e69SDag-Erling Smørgrav	uint64		f_bfree		/* free blocks in file system */
238d4af9e69SDag-Erling Smørgrav	uint64		f_bavail	/* free blocks for non-root */
239d4af9e69SDag-Erling Smørgrav	uint64		f_files		/* total file inodes */
240d4af9e69SDag-Erling Smørgrav	uint64		f_ffree		/* free file inodes */
241d4af9e69SDag-Erling Smørgrav	uint64		f_favail	/* free file inodes for to non-root */
242d4af9e69SDag-Erling Smørgrav	uint64		f_fsid		/* file system id */
243d4af9e69SDag-Erling Smørgrav	uint64		f_flag		/* bit mask of f_flag values */
244d4af9e69SDag-Erling Smørgrav	uint64		f_namemax	/* maximum filename length */
245d4af9e69SDag-Erling Smørgrav
246d4af9e69SDag-Erling SmørgravThe values of the f_flag bitmask are as follows:
247d4af9e69SDag-Erling Smørgrav
248d4af9e69SDag-Erling Smørgrav	#define SSH_FXE_STATVFS_ST_RDONLY	0x1	/* read-only */
249d4af9e69SDag-Erling Smørgrav	#define SSH_FXE_STATVFS_ST_NOSUID	0x2	/* no setuid */
250d4af9e69SDag-Erling Smørgrav
251d4af9e69SDag-Erling SmørgravBoth the "statvfs@openssh.com" and "fstatvfs@openssh.com" extensions are
252d4af9e69SDag-Erling Smørgravadvertised in the SSH_FXP_VERSION hello with version "2".
253d4af9e69SDag-Erling Smørgrav
254cce7d346SDag-Erling Smørgrav$OpenBSD: PROTOCOL,v 1.12 2009/02/14 06:35:49 djm Exp $
255