Using the NETCONF Protocol over Secure Shell (SSH)

نویسنده

  • Margaret Wasserman
چکیده

This document is subject to BCP 78 and the IETF Trust’s Legal Provisions Relating to IETF Documents (http://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Simplified BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Simplified BSD License.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

RFC 4742 NETCONF over

Status of This Memo This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the "Internet Official Protocol Standards" (STD 1) for the standardization state and status of this protocol. Distribution of this memo is unlimited. Abstract This document describes a method...

متن کامل

Secure Shell (SSH): Public Key Authentication over Hypertext Transfer Protocol (HTTP)

The Secure Shell (SSH) protocol requires all implementations to support public key authentication method (“publickey”) for authentication purposes [2]. Hypertext Transfer Protocol (HTTP) applications which provide a SSH client over the web browser need to support “publickey”. However, restrictions in HTTP, such as Same Origin Policy, make it difficult to perform such authentications. In this do...

متن کامل

Generic Message Exchange Authentication for the Secure Shell Protocol (SSH)

The Secure Shell Protocol (SSH) is a protocol for secure remote login and other secure network services over an insecure network. This document describes a general purpose authentication method for the SSH protocol, suitable for interactive authentications where the authentication data should be entered via a keyboard (or equivalent alphanumeric input device). The major goal of this method is t...

متن کامل

Architectural Defects of the Secure Shell

Although some flaws have been found out in the SSH, the Secure Shell, there is not so much discussion about its architecture or design safety. Therefore, in this paper, considering the SSH’s architecture, e.g. the key exchange protocol, the user authentication protocols and its total design of the SSH, we not only discuss the SSH’s architectural safety but show some critical flaws for SSH users...

متن کامل

Diffie-Hellman Group Exchange for the Secure Shell (SSH) Transport Layer Protocol

Status of This Memo This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the "Internet Official Protocol Standards" (STD 1) for the standardization state and status of this protocol. Distribution of this memo is unlimited. Abstract This memo describes a new key ex...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • RFC

دوره 6242  شماره 

صفحات  -

تاریخ انتشار 2011