Telnet STD
Telnet STD
com
MIL-S7D t 782
10 MAY 1984
MILITARYSTANDARD
TELNET PROTOCOL
.,
~m
, .
o“
●
47. .4*
?3.
I
..+=-’&!??
: ‘/
I /
NO DELIVERABLE OATA
..
.. ... .
MI L-SID-1782
10 my 1984
DEPARTMENT OF OEFENSE
WASHINGTON, D. C. 20301
TELNET Protocol
hiIL-STO-l 782
ii
Downloaded from http://www.everyspec.com
FtIL-SID-178Z
.. 10 my 1984
PoREubxD
i.
I
I iii
Downloaded from http://www.everyspec.com
..
MIL~STO-1 782
10 my 1984
CONTENTS
I 4.2.4
4.2.5
Use of options
Synopsis -------------
The network virtual
---------
terminal
-------
------
- - - - - - - - -
:::.1 Transmission of data - - - - - - - - - - - - -
I 4.3.1.1 Accumulation of data ------ -------
4.3.1.2 TELNET W Phead (GA) comnand - - - - - - - - -
4.3.2 Transmission cautton - - - - - - - - - - - - -
4.4 Standard representat {on of control functions -
4.4.1 Interrupt process (1P) - - - - - - - - - - - -
4.4.2 Abort output (AO)---------- -----
4.4.3 Areyouthere (ACT) --------- -----
4.4.4 Erase character (EC) - - - - - - - - - - - - -
4.4.5 Erase line (EL) ------------ ----
4.5 The TELNET Synch signal- - - - - - - - - - - -
4.5.1 Sending several Wnchs - - - - - - - - - - - -
4.5.2 Interesting signals- - - - - - - - - - - - - -
4.5.3 we effect of the Synch mechanism- - - - - - -
4.5.4 TELNET comnand requirement - - - - - - - - - -
4.6 The NVT printer and keyboard - - - - - - - - -
4.6.1 NVT printer codes -------- -------
4.6.1.1 Example of code use-------- ------
4.6.1.2 ASCII code generation- - - - - - - - - - - - -
4.6.1.3 OAditional codes ------- --------
4.6.1 .3.1 Synch ---------------- -----
4.6.1 .3.2 8reak(8RK)------------- -----
4.6.1 .3.3 / Interrupt process (1P) -- --- - --- ---
4.6.1 .3.4 4bort output (AO)---------- -----
4.6.1 .3.5 Areyouthere (ACT) --------- -----
4.6.1 .3.6 Erase character (EC) -- - - - - - - - - - - -
4.6.1 .3.7 Erase line (EL) ----------- -----
4.6.1 .3.8 Intent of additional codes - - - - - - - - - -
..
iv
Downloaded from http://www.everyspec.com
CONTENTS - Continued
APPENDICES
MI L-STO-1 782
10 t%ly 1984
CONTENTS - Contfnued
~
Appendix o. TELNETSTATLIS OPTION ------- -------24
10. Command name and code ------ -------24
Cmnand meanings - ----- ----- ---- 24
% 1 IAC MILL STATUS - ----- ----- ---- 24
20.2 IAC MON’ T STATUS - ----- ----- ---- 24
20.3 IAC 00 STATUS- - - . ---- ----- ---- 24
20.4 IAC OON’ T STATUS - ----- ----- .- 24
20.5 IAC S8 STATUS SENO iA; SE-----------24
20.6 IAC S8 STATUS IS... IAC SE-----------24
30. Default -------------- ------24
40. Motivation for the octfon- - - - - - - - - - - 24
Oescrlption of the option- - - - - - - - - - - 24
Appendix ?“ TELNET TIMING MARK OPTION- - - - - - - -- - - - 25
10. Command name and code- ;----- ------25
20. Command meanings -------- ------- 25
20.1 IACHILL TIMING-MPRK-------- ----- 25
20.2 IAC WON’T TIMING-MARK- - - - - - - - - - - - - 25
20.3 IACOO TIMING-MARK --------- ----- 25
20.4 IACOON’T TIMING-W.RK------- ----- 25
Default ------------- ------ 25
::: Motivation for the option - - - - - - - - - - 25
Examples of option application- - - - - - - - 25
%: CX?scription of the option - - - - - - - - - -
70. Three typical applications- - - - - - - - - -- :?
70.1 Round-trip delay --------- ------ 27
70.2 Resynchronization - - - - - - - - - - - - - - 27
70.3 Oual resynchronization- - - - - - - - - - - - 27
Appendix F. TELNET EXTENDEO OPTIONS - LIST OPTION - - - - - 28
10. Command name and code ------ ------ 28
20. Consnand meanings -------- ------- 28
20.1 IACWILL EXOPL----------- ----- 28
20.2 lACHON’T EXOPL ----------- ----- 28
20.3 IACOOEXOPL ------------ ----- 28
20.4 IACOON’T EXOPL --------- ------ 28
20.5 IAC S8 EXOPL subccasnandl - - - - - - - - - - 28
30. Default -------------- ..--- 28
I 40. !!otivation for the option - - - - - - - - - - 28
I 50. Description of the option - - - - - - - - - - 28
vi
Downloaded from http://www.everyspec.com
I
141
L-STO-1782
.. 10 May 1984
i
FIGORSS
vii
Downloaded from http://www.everyspec.com
MI L-STD-1782
10 May 1984
1. SCOPE
l.1 Purpose. This standard establ fshes criteria for the TELNET Protocol
tiich supports the standard method of Interfacing terminal devices and
terminal -oriented processes to each other.
MI L-STO-1782
10 May 1984
..
. .. ..
2. REFERENCED DOCWiENTS
2.1 Issues of documents. The fol lowing documents of the issue in effect on
date of i nvitation for ds or reauest for. prooosal. form a part of th~s
standard to the extent specified herein.
STANDPRDS
FEDERAL
FED-STO-1O37 . Glossary of Telecommunications Terms
141L1TARY
MIL-STD-1778 Transnd sslon Control Protocol
2
Downloaded from http://www.everyspec.com
MIL-STD-1782
10 May 1984
1...-.
.:.. 3. DEFINITIONS
3
Downloaded from http://www.everyspec.com
MIL-STD-1782
10 May 1984
4. GENERAL REQUIREMENTS
4
Downloaded from http://www.everyspec.com
fiIL-SID-17S2
10 my 198L
a request to disable soue option since all pnrtiea mat be prepared to support
the WT. The eyntax of option negotiation hae been set up eo chat if both
parriee request an option .vimultaneoualy,each will see the other’s requeet
as the positive acknowledgment of its own.
4.2.4 Use of options. Option requeata are Zikely to flurry back and
forth when a TSLNET connection ia firat estab21ahed, aa each party attempte
co get the beat poaaible servica frem the other party. Beyord that, hnwever,
optioae can be used to dynamically umdify the characteriatice of the comec-
cion to suit chawging local condition. For example, the NW, as till be
expLeined later, uses a tranemiaaion discipline well suited to the many
‘lina at a time- applicatioaa such aa BASIC, but poorly aulted to the many
“characterat e time- applicetlone such ae NLS. A server tnfghtelect to
devete the extra proceaaor everhead required for a “character at a tiaw-
discip2ine when it was suitable for the local proceaa aad wnuld negotiate
an.apprwpriete option. Rwever.,,rather than then being permanently burdened
with the extra proceaaing overhead, it could twitch (i.e., negotiate) beck
to NVT when the detailed control waa no longer neceaaary. It ia poaaib2e for
requeata initiated by proceaaee to atlmulate a nonterudnetiag requeac loop
if the proceaa reapomla to a rejection by merely re-requesting the wption.
To prevent such 100ps from occurfl”g, rejected requaeta ahnuld nnt be repeated
until sonx?tMng changea. Operationally, this can mean the proceaa is running
a different program, or the user haa given another ccrmmcnd,or whatever
makea aenee in the context of the given proceaa and the given eption. A
5.
i
Downloaded from http://www.everyspec.com
HIL-STD-1782
10 Nay 1984
.. ......
goed rule ef thumb is that a re-request etmuld only occur ee a reeult ef .-
subeaquent infornmtion from the other ewl ef the connection or when demanded
by local human intervention. Option &elgnera atmuld not feel cenetrained by
the somevhat limlted syatax availabk for option negotiation. The intent of
the 8*1. eynt8x ie te make it eeey to hnve eptinna — since it is cOrre-
spnadingly eaey to profess l~orance about them. If so- particular eption
requiree a richer negotiation structure than possible within ‘DO, DONIT,
WILL, WON’T-. the proper tack ia to uae TO. DON’T, WILL, WN’T- to eetablieh
that both partiee uederetaml the eptlon, and once tMs is acccmpLlebed a
uure exotic syntax can be used freely. For example, a party might send a
request te el”ter(establish) line length. If it is accepted, then a different
symtax an he used for actually negotiating the line length — such a ‘aub-
negotiation- might inclu& fie.ldefor minimum allovebla, nmximum all~ble
and desired line lengths. The important cnncept is that euch expaoded nego_
tiatinma shmld never Lx@n until mme prior (standard) negotiation hea
established that both partiee are capable of paraing,the expanded syntax.
4.3 The Netverk Virtual Terminal. The Network Virtual Termtnal (NVT) iB
a bl-directionalcharacter &vice. The NVT hae a printer aad a keybnard.
The printer ?espenda to incemleg data and the kaybnard producee outgoing
data which is sent ever the =NE7 confection ad, if ‘ecboea- are deairef,
to the NVT’s printer as well. %cMee” will not be expected to craverae the
network (altfmugh nptione exist te enable a ‘remote- echoiag UUde of operw
tion, no heat is required te implamsnt tMa nption). The code aat i.eeever
Mc OSASCII in an eight-bit field, except ae mdified herein. Aay cede
conversion and timing coaeideratione are local probleme and do not effect
the NvT.
flIL-STO-1782
10 hy 1984
.
4.3.1.2 TELNBT Go Ahead (GA) c-rid. When a process has completed semd-
ing dete to an NVT printer end has no queued input from the NVf keybard for
further proceaaing (i. e., when a process at one eod of a TKLNET coomection
csnnot preceed without input from the other emd). the Proc=s must tranesdt
the TELNRT GM Ahead (M) canmend. This rule ie not intended to require tbet
the TYJ.MH W cwmxand be sent from e terminal at the end of each line, since
server bests do not normally require a epecial signel (in eddition to emd-of-
line or other loce.lly+efined charectere) in order to cnmmence proceet+ing.
Rather, the TELN2T OA la designed to help a user’s locel host operate a
physically half duplex terminal which has a ‘lockable- keyboard such aa the
IBN 2741. A deacripcion of tMs type of terminal may help to explain the
proper uae of the M cemmand. The terminal-temputer connection la always
under control of either the user or the computer. Neither can unilaterally
seize control from the other: rather the controlling end must relinquish Itc
control explicitly. At the terminel end, the hardware is constructed eo ae
tn relinquish control each time that e ‘line” ie terminated (i.e., when the
‘Nw Line- key is typed by the user). When this occurs, the attached (local)
cmuter Proceeses the inwt data, decides if output should be generated,
and if not returns control to the terminal. If output almuld be generated,
control la retained by the cemputer until all output has been transmitted.
I The difficultiesof usisg this type of terminel thrsugh the netwo~ almuld
be obvieus. The ‘local- cemputer la no longer able to decide whether to
I retain control efter seeing an end-of-line signal or not; this decision can
only”be me& by the “remote- computer WiIIchis processing the data. There-
fore, the T2LN8T GA canamrd previdea a mechanism whereby the ‘remote- (server)
cemputer ten signal the ‘10C81- (user) computer that it is tirs?to paea
control to the ueer of the termisel. It elrmId be transmitted st tbece
ti~a, and enly et these tinwa, when the user aheuld be given control of the
terminal. Note thet premature transmiaaion of the GA cemmsui may reeslt in
the blocking of output, since the user is likely to cesume that the transmit-
ting system has pa$sed, and therefore he will fail to turn the line around
msnsally.
7
Downloaded from http://www.everyspec.com
tlIL-STO-17g2
10 May 1984
..
b.4.2 Abert output (AO). Many .qsteme provide a function which allewe a
rmocees. which is Reneratinx outuut. to run to comletion (or to reach the
eau? stopping poin~ it woul~ re&h if running to c&pletion) but withut
aending the output to the user’e terminal. Further, this function typically
cleare any output already produced but not yet actually printed (or displayed)
on;the user‘n terminal. AO ie the etandard representation for invoking this
function. Por example, some eubaystem might normally accept a uear’a c-rid,
send a long text string to the user ‘a terminal in reapenee, and finally sig-
nal readiness to ac,ceptthe next cemmand by sanding a ‘prompt- character
(preceded by <CRXLP>) to the user’s terminal. If the AO were received
durinx the tranemiesion of the text string, a reasonable implementation
weuld be to suppreee the remainder of the text string, but tnrnemit the
prempt character and the preceding <CRXLP>. (This ie possibly in distinc-
tion to the action which might be taken if an 1P were received; the 1P might
s
Downloaded from http://www.everyspec.com
flIL-SID-17S2
10 my 1984
cause suppraealm of the text etring and an exit from the subsystem. ) It
slmuld be noted, by server eyetema which provide tMs fumction, that there
MY be buffere external to the system (in the uetvork and the meer’s local
host) which sbnuld be cleared; the appropriate way to do tMs is to tranemit
the “Symch- eigaal (described below) to the ueer system.
6.4.3 Are you there (ATT). tiny eyetems previde a fmnction which prnvidee
...
. the uear with same visible (e.g., printable) e~@nce thet the sYQtem ie etfll
Up and running. ~ia function may be invoked by the ueer when the eystem ie
une~ctadly ‘silent- for a long tinm, bacauee of the unanticipated (by the
user) length of a computation, aIIunueually ~aVY eystem lo~. etc. ATT ie
the stan&rd representation for invokiog thie function.
4.4. S Erase line (EL). Many eyetema prmvide a fumction which deletes all
the data in the current ‘line- of input. 2%1s function is typically ueed
to ~it keyboard input. EL is the standard representation for inVokiUg thie
function.
I 4.5 The TELNET ‘Synch- eignal. Most tiam-eharing SYSteme prnvide mecha-
niema vhich allow a terminal user to regain control of a ‘runavay” procaaa;
the IP aad AO fuectione deecribad above ate examplea of these me~aniame.
I
Such aysteme, hen used locally, have acceae to OH of the aigeela auppl.ied
by the user, whether these are normal character or apacial ‘out of bamd-
aignala such cc thoee auppiied by the teletype ‘-- key or the IM 2741
1 ‘ATTN- key. Thie la not necesaarlly true when terminda are connected to
the system through the network; the networkla flow control mchaniame WY
cauee such a eignal to be bufferad elaawhere, fourexample in the user’e
1 hoat. To counter tNs problem, the TELSET “Synch- mechaniam ie introduced.
A Synch signal conaieta of a ~P Urgent notification, coupled with the TSLNET
c-rid DATA HARK. The Urgent notification, which la not subject to the
flew control pertaining to the TELNST connection, ie ueed to invoke apacLa2
handling of the data stream by the proceae vhich receives it. In this medei
the data stream la immediately ecenned for “intereatimg- aignela aa defined
I bekv, diecardinK intervening data. The TELSET caamand DATA MEIC (t@i)la
the eynchronizinx mark in the data stream vhich indicates that any apaciel
aimi haa already occurred and the recipient can return to mormal proceeding
I of the data stream. The Synch la sent via the TCP send operation with the
Urgent flau aet and the DM aa the bat (or only) date octet.
/
,..
9
Downloaded from http://www.everyspec.com
M[L-STO-1782
10. May 1984
4.5.1. Sending several Synchs. Uhen several Synchs are sent in rapid
succession, the Llrgent noti fications may be merged. It is not possible to
count Ltrgents since the number received wi 11 be less than or equal the number
sent. Mhen in normal mode, a 0t4 is a no operation; when in urgent mode, it
signals the end of the urgent processing. If ,TCP indicates the end of Urgent
data before the EM is found, TELNET should continue the special handling of
the data stream unti 1 the CM is found. If TCP indicates more Urgent data
after the ~ is found, i t c.in only be because of a subsequent Synch. TELNET
should continue the special handling of the jata stream unti 1 another U4 is
found. ,. ~
4.5.2 Interesting siqnals. “Interesting= signals are defined to be: the
TELNET standa rd representations of 1P, AO, and AYT (but not EC or EL); the
local analogs of these standard representations (if any); al 1 other TEMET
consnands; other sitedef ined signals which can be acted on without delaying
the scan of the data stream.
I
4.5.3 One effect of the Synch mechanism. Since one effect of the Synch
mechanism Is the i scardlng of essen tl al ly al 1 characters (except TELNH
consnands) between the sender of the Synch and its recipient, this mechanism is
specified as the standard way to clear the data path when that is desired.
For example, if a user at a terminal causes an AO to be transmitted, the
server which receives the AO (if it provides that function at al 1 ) should
return a Synch to the user.
b. Send the TELNET Synch sequence, that is: Send the Oata Mark (ON)
as the only character in a TCP urgent mode send operat i on;
The user (or process acting on his behalf) must transmit the TELNET SYNCkk
sequence of step b above to ensure that the TELNET 1P gets through to the
server’s TELNET interpreter. The Urgent should wake up the TELNET process;
the 1P should wake up the next higher level process.
10
Downloaded from http://www.everyspec.com
MIL-STD-I 782
I 10 May 1984
I .
4.6.1 Uk’7 printer codes. The NVT printer has an unspecified carriage width
and page Ten and can produce representations of al 1 95 ASCII graPhics
(codes 32 th%gh 126). Of the 33 ASCII control codes (O through 31 and 127),
and the 128 uncovered codes (128 through 255), the following have specified
meaning to the NVT printer:
WE CODE MEANING
In addltlon, the following codes shal 1 have defined, but not required, effects
on the NW printer. Neither end of a TELNET connection maY assume that the
other party wi 11 take, or wi 1 I have taken, any particular action upon receipt
or transmission of the following:
Al 1 remaining codef do not cause the NVT printer to take any action.
11
Downloaded from http://www.everyspec.com
MIL-STD-1 782
10 May 1984
4.6.1.2 ASCII code generation. The NVT keyboard has keys, or key
combinations, or key sequences, for generating al 1 128 ASCII codes. Note that
although many have no effect on the NVT printer, the NW keYbOard is caPable
of generating them.
This key aI lows the user to clear his data path to the
oth~r.
46131.pir~y =activation of this key causes a CFi (see command section) to
be sent in the data stream and a TCP Urgent notification is associated with
it. The pair CM-Urgent is to have required meaning as defined previously.
12
Downloaded from http://www.everyspec.com
nIL-sm-1782
IO &ly 1984
b.6.1.3.4 Abert output (AO). Allow the current procees to (appear to)
run to completion, but do not send its output to the user. Also, send a
Synch to the user.
4.6.1.3.5 Are you there (ATT). Send back co the NVT some visible (i.e.,
printable) evidence that the AYT was received.
4.6.1.3.6 Erase character (EC). The recipient sheuld delete the last
preceding undeleted character or ‘print position- from the data stream.
I
4.6.1.3.7 Eraae line (EL). The recipient should delete character frem
{ the data atreem hack to, but not including, the Iaet ‘CR Lp- aaquence sent
riverthe TELNST connection.
4.7.1 TELNST commands defined. The following are the defined IKLNET
cammanda. Note that thaae codee and co& aequencee have the indicated meaning
only when imm?diate2y preceded by an IAC.
corm
13
Downloaded from http://www.everyspec.com
HIL-SID-1762
1
10,Flay1986
.. . . . .. .
14
Downloaded from http://www.everyspec.com
M! L-STD-1782
10 May 1984
I :,.’
b’
15
Downloaded from http://www.everyspec.com
MIL-STD-1782
10 May 1984
,., :..:
.. .
APPENDIX A
TRAJLSNIT-81NARY o
20.3 IAC 00 TRANSMIT-81 NlAY. The sender of this ccinnand REQUESTS that the
sender 07 he data start transmitting, or conf i m that the sender of data is
I expected to transmit, characters which are to be interpreted as 8 bits of
I binary data (i.e., by the party sending this comnand).
30. &fault.
WON’ T TRANS141T-81NPAY
16
Downloaded from http://www.everyspec.com
MIL-STO-1782
,.. 10 May 1984
40. Not~vation for the optton. It “is sometimes useful to have available a
binary ~ransmission path within TELNET without having to utf Iize one of the
more efficient, higher level protocols providing binary transmission (such as
the File Transfer Protocol ). The use of the IAC prefix wlthln the basic
TELNET protocol provides the option of binary transmission In a natural way,
requlrlng only the addttion of a mechanism by which the parties involved can
agree to INTERPRET the characters transmitted over a TELNET connect 1on as
binary data.
17
I Downloaded from http://www.everyspec.com
MI L-STD-1 782
10 May 1984
..
18
Downloaded from http://www.everyspec.com
MI L-STD-1782
10 May 1984
APPENDIX 8
ECNO 1
20.1 IAC MILL ECW. The sender of this cotnnand REQUES~ to begin, or
con-firms that now begin, echol ng data characters 1t receives over the
TELNET connection ~ack to the sender of the data characters.
20.2 IAC ltON’ T ECHO. The sender of this comnand DEMANOS to stop, or
refuses to start, echoing the data characters ft receives over the TELNET
connect f on back to the sender of the data characters.
20.3 IAC 00 ECHO. The sender of this comnand REQUESTS that the rece~ver of
this cousnand be gin echoing, or confirms that the receiver of this cotnnand is
expected to echo, data characters ft receives over the TELNET connection back
to the sender.
I
20.4 IAC DON’ T ECHO. me sender of this comnand DEMANOS the receiver of
this command stop, or not start, echoing data characters ft recetves over the
TELNET connect ton.
30. Default.
lfON’ T EcND
! MN*T ECH)
19
Downloaded from http://www.everyspec.com
fiIL-STO-1782
10,kbly]984
.. ... .
..
5.0 Ocscription of the option. When the echo@g option is in effect, the
party at the end performing the echoing 1.sexpected to transmit (echo) data
character it receives back to the sender of the deta characters.. The option
does not require that the characters echsed be exactly the characters received
(for example, a sumber of systems echo the AMII E* *eracter with sO=tM~
other then the ESC character). When the echoing option is not in effect, the
receiver of data charactem shsuld not echo them back to the sender; this,
of cou=e, does not prevent the receiver from responding to data cbaractere
! received. The normal TELSET connection is two way. That ia, deta flows in
each direction on the connection independently; and neither, either, or both
dlrectfone may be eperatfng sfmultmeeusly in echo msde. There are five
reasonable nmdee of operetlon for echeing on e connection pair:
4
moceesl moceeea
*
Neither eul echoes
PRoceeel
4, f
*
?wcese a
-
mocrss 1 mocrss 2
)b
One end echeee for the other
PsOcrssl mocree2
4, (~
“’L “
One ecd echoes for both ends
FIGURE’1. Five reasossble medee of operation for
echoing on a connection pair.
20
Downloaded from http://www.everyspec.com
Ml L-STD-l 782
.. ... 10 May 1984
opt ton provides the capabl 1ity to decide on whether or not either end
echo for the other. It does not, however, provide any control over
whether or not ah end echoes for itself; this decision must be left to the
sole di scret ion of the systems at each end (although they may use information
regardin the state of “remote- echoing ne otiations in making this
decision?. If BOTH hosts enter the mode o? echoing characters transmitted by
the other host, then any character transmitted in either direction Vi 11 be
“echoed” back and forth indefinitely. Therefore, care should be taken in each
implementation that if one site Is echoing. echoing is not permitted to be
turned on at the other. As discussed in Section 4, both parties to a
full-duplex TELNET connection initfally assume each direction of the
““connection is being operated in the default mode which is non-echo (non-echo
is not using this option, and the “same as DON’T ECHO, WON’T ECtO). If either
party desires himself to echo characters to the other party or for the other
party to echo characters to him, that party gives the appropriate connmnd
(HILL ECHD or DO ECHO) and waits (and hopes) for acceptance of the option. If
the request to operate the connection in echo mode is refused, then the
connection continues to operate In non-echo mode. If the request to operate
the connection in echo mode is accepted, the connection is operated in echo
mode. After a connection has been changed to echo mode, either party may
demand that it revert to non-echo mode by giving the appropriate DON’T EcHD or
IION’ T ECHO csxnnand (which the other party must conf i nn thereby allowing the
connection to operate in non-echo mode). Just as each direction of the TELNET
connec-tion may be put in remote echoing mode independently, each directton of
the TELNET connection must be removed from remote echoin9 mode separately:
21
Downloaded from http://www.everyspec.com
MIL-STO-17E2
1 .. 10.Nay 1984 . . ..-.
...
22
Downloaded from http://www.everyspec.com
MI L-STD-1782
10 May 1984
I ... APPENDIX C
SUPPRESS-60 -ANEAD 3
.20.1 IAC WILL SUPPRESS-60 -ANEAD. The sender of this cmnnand requests’
‘ pennlsslon to begin suppressing transmission of the TELN~ GO ANEAD (GA)
character when transmitting data characters, or the sender of this comnand
confirms it will now begin suppressing transmission of GAs with transmitted
data characters.
20.4 IAC DON’T SUPPRESS-W-ANEAD. The sender of this consnand demands that
the rece~ver of the command start or cent inue transmitting GAs when
transmitting data.
30. kfault.
40. Notlvation for the option. blhile the NVT nominally follows a half
duplex protocol complete wit h a GO ANEAO signal, there is no reason why a full
duplex connection between a ful 1 duplex terminal and a host optimized to
handle full duplex terminals should be burdened with the GO ANEAD signal.
Therefore, it is desirable to have a TELNET option with which parties
i n-volved can agree that one or the other or both should suppress transmission
of 60 ANEAOS.
23
Downloaded from http://www.everyspec.com
MI L-STD-1 782
10 may 1984
.....
mist be suppressed in both directions independent y. Uith the
SUPPRESS-61WlHEAD option in effect, the IAC GA comnand should be treated as a
NOP if received, although IAC 6A should not normally be sent in this mode.
24
Downloaded from http://www.everyspec.com
MI L-STD-1782
10 May 1984
.....
I“ APPENDIX D
STA?US 5
20.1 IAC NILL STATUS. The sender of HILL status agrees to send status
information. spontaneously or In response b future requests.
20.2 IAC WON’T STATUS. Sender refuses to carry on any further discussion
of the current status of options.
20.3 IAC 00 STATUS. The sender of 00 wishes to be able to send request for
status 0? in option information or conffm that he is wi 11 ing to send such
requests.
20.4 IAC 00N’ T STATUS. Sender refuses to carry on any further discussion
of the current status of options.
20.5 IAC SB STATUS SENO IAC SE. Sender requests receiver to transmit his
(the receiver]s ) perception of th e current status of TELNET options. The code
for SEND is 1.
20.6 IAC SB STATUSIS. . . IAC SE. Sender is stating his Deception of the
current status of T options. The code for IS is o.
30. Default.
40. Motivation for the option. This option allows a userbocess to verify
the current status of T options (e.g., echoing) as viewed by the person/-
process on” the other end of the TELNET connection. Sfmply renegotiating
options could lead to the nonterminat ing request loop problem discussed in
paragraph 4.2.3. This option fits into the normal structure of TELNET optfons
by deferring the actual transfer of status i nfonnation to the SB consnand.
50. Description of the optfon. IJILL and DO are used only to obtain and
grant permission tor future di scussion. The actual exchange of status
informatf on occurs ,yithin option subcomnands ( IAC SB STATUS...). Once the tw
hosts have exchanged a MILL and a 00, the sender of the HILL STATUS is free to
transmit status information, spontaneously or in response to a request from
25
Downloaded from http://www.everyspec.com
I .. MI L-STD-1782
10 tiy 1984 .“. ..
the sender of the DO. At worst, thfs may lead to transmitting the information
twice. Only the sender of the DO may send requests ( IAC S8 STA~ SEND IAC
SE) and only the sender of the MILL may transmit actual status information
(withtn an XAC S8 STATUS IS . . . IAC SE Comnand). IS has the subc-ands UILL.
CUI and S8. They are used EXACTLY as used during the actual negotiation of
TELNET options, except that S8 is terminated with SE, rather. than IAC SE.
Tiansmisslon of SE, as a regular data byte, is accomplished by doubling the
byte (SE SE). Options that are not explicitly described are assumed to be in
their default states. A single IAC S8 STATUS IS... IAC SE describes the
condi t ion of ALL optl ons.
Nost2 (the following stream is broken into multiple 1ines only for
readability. No carriage returns are implied.):
IAC S8 STATUS IS
WILL ECNO
@O SUPPRESS-GO-ANEAO
WILL STATUS
00 STATUS
MC SE
26
Downloaded from http://www.everyspec.com
MI L-STD-1782
10 May 1984
APPENI X E
TIMING-MMK 6
20.1 [AC UILL TIM ING-WRK.. The sender of this ccmsnand ASSURES the receiver
of th 1s comnand is fnserted In the data stream at the “appropriate
place” to insure s~c~ronization with a 00 TIMING-MPRK transmitted by the
receiver of this comnand.
20.2 IAC UON’T TIMING-WRK. The sender of this consaand REFUSES to insure
that this comnand is inserted in the data stream at the ‘appropriate place- to
insure synchronization.
20.3 IAC 00 TIMING-MPRK. The sender of this command REQUESTS that the
receiver of his coinnand return a WILL TIMING-MARK In the data stream at the
‘appropriate place” as defined in paragraph 11.4 below.
20.4 IAC DON’T TIMING-14ARK. The sender of this command notifies the
receiver of hls consnand thaf a HILL TIMING-MARK (previously transmitted by
the receiver of this comnand ) has been IGNOREO.
30. Oefaul t.
27
Downloaded from http://www.everyspec.com
.. ML-STD-1782
1
10 &y 1984
I tO lad
tO incorrect results if subaeq~nc c~~s are =ecuted), se~ tba
user error message, and raeume interpretation of canmande which the ueer
an
typed after seeing the error meesage. If the user were local, the eystem
wnuld be able to discard the buffered input; but input may be b@ fered in
the ueer’s best or edsewhere. Therefore, the server might send a’00 TRUNG
MARK and hope to receive a WILL T7H2NG+4AKK from the user at the ‘appropriate
place- in the data Etreem. The ‘appropriate piece- (in ebsence of other
information) Is clearly juet before the firet chnractei which the user typed
aft:r,eaeing the error meseaga. “ That is,.it ehnuld eppaar that the timimg
mark wan ‘printed- on the userma termlnel and that, %n response, tbe uoer
typed en anewering timing mark. Next, rsupposethat the ueer in the exe!@le
above realized that he had mieapalled a ccumand, realized that the server
wou2d send a DO T~2N~, and wanted to etart ‘typing ah?ad- again wlt~ut
waitimg for this to occur. 2tamight then imetruct MS ewn eyetem to send a
WILL TIMXNC+AKK to the server and then begin ‘typing ahead- again. (Imple-
mantere.ehould remember that the user’s en eystem aunt remember that it
sent the WILL T21f2NC-NAKKeo co to dieterd the DOiDON’T T12UNC+IAKK when it
eventually arrivae.) Thw, in this ase the “appropriate place- for the
insertion of the H21.LT2N2NC+AEK 10 the piece defined by the ueer. In botb
of the examplae above, it ie the raopeneibility of the system which tranemlta
the DO TIM2NC-NAKK to discard any uuvanted character; the WILL T12UN0—NAKK
on2y provides help in deciding which charactere are ‘unwanted-.
?uocEae A rrLNrlcOnut&n
, ‘reuMmu
“ ‘-o- “~
+
-l:Fiil-
28
Downloaded from http://www.everyspec.com
MIL-STD-1782
10 May 1984
I This achieves the effect of f Iushfng all “type ahead” after the erroneous
comnand, up to the point when the user actual 1y saw the question mark.
1 b. 6 starts
receives
reading output from A and throwing
MILL TIMING-MPRK.
it away until it
This achieves the effect of flushing all output from A, up to the point where
A saw the timing mark, but not output generated in response to the following
conznand.
29
Downloaded from http://www.everyspec.com
1.
I MI L-STD-1782
,.,.. . . .
I 10 May 1984
APPENDIX F
I
TEINET EXTENDED OPTIONS - LIST OPTION
20.1 IAC UILL EXOf’L. The sender of thfs comnand REQUESTS penni ss ion to
begin negotiating, or confirms that It will begin negotiating, TELNET options
which are on the ‘Extended OptIons List. ”
20.2 IAC UON’T EXOPL. The sender of this coinnand REFUSES to negotiate, or
to continue negotl sting, options on the ‘,Extended options LiSt. o
20.3 IAC 00 EXOPL. The sender of this consnand REQUESTS that the receiver
of this coinnand b egfn negotiating, or confirms that the receiver of this
.comnand is expected to begin negotiating, TELNET options With are on the
‘Extended Options List. 0
20.4 IAC DON’T EXOPL. The sender of this comnand OEMNDS that the receiver
conduct no further negotiation of options on the ‘Extended Options List. ●
30. Default.
40. Motivation for the option. Eventual lY, a 257th TELNET option wi 11 be
needed. Ttl 1s option w1ll extend the option list for another 256 options in a
manner which is easy to implement. The option is proposed now, rather than
later (probably much 1ater), in order to reserve the option number (255).
~
50. Oescript ion of the option. The EXOPL option has five subcomnand codes:
MILL; ~ They have exactly the same meanings as the
TELNET cotnn&sds ‘wi th t~ea~ame &mes, and are used in exactly the same way.
For consistency, these subconsnand codes wi 11 have the same values as the
TELNET comnand codes, (250-254). Thus, the format for negotiating a specific
option on the ‘Extended Options List” (once both parties have agreed to use
it) is:
I 30. .
I Downloaded from http://www.everyspec.com
MIL-STO-1782
10 May 1964
Once both sides have agreed to use the specific option specified by <option
code>, subnegoti at ion may be required. In this case the format to be used is:
31
Downloaded from http://www.everyspec.com
INSTRUCTIONS h . eantinuimg effort fn mtk. our ttsndardiition documun~ better, the DoD pmvidci this form for ucc i.
mbmitdng commen~ ●d cugsudmu (or impmvemeoti. AU wcm of mitilary dandmdizafion docume.ta are inritcd to provide
qations. ‘II& form -g be de-bed, folded dons the fins hdiafed, taped afoas ibe loon edse (DO NOT STAPLE), md
.. mailed. fn block 6, be u spccifii u padbfe cbout particular Probtem - web u mudins -f&b required intemwekation. -
h @d. ~=. 4 -Ms’-% -- kr-mwtlble. andslvdcmwaed wrhs chansuwbkb wmdd autiti ti
~bfcum. f?ntc?in bfock 6 my mmah not refated to t slteeiflc omsms)b of Ilte document. If bfak 7 u filfed out, M
tirmwicdgement WI be mded b you wklbfn sO day8 to let you know tit your commenb warm received and are L4ng
cOmi&l’cd.
NOl%: ‘fW form may mot be A to mqued ~pfcg of daumenu, nor to mquak wafwm, dwfsfhns, or chrkfhtton of
-fkab m@remeat! on mlrmnt CcJltncfs. cOmmcntE Suf.vnittad on UI18form do not COoafitule 0? impfy au ftlori=tion
b wake my po?tkm at tbe demmed dommentia) or to amend cunhctual $’eqolmmm&
OFflCfAL
?ENALIV
su51Nm
FOCI●RWATE uSE SW BHJNESS
Ve
REPLY MAIL
FIWIT A1.,~&l., VA. MO. A9M
111111 u No
UNITED
POSTAGE
NECE~RV
IF MAILEO
8M THE
STATES
Director
Defense Ccmnuni cations Engl neering Center
/ lnteroperability 6 Standards Office
I 1860 Ulehle Avenue
Reston, VA 22090-5500
Downloaded from http://www.everyspec.com
0 VENDOR
❑ us,.
D O,”cll(stifi,:
PROBLEM [email protected]
& — w41dlnw
c R.uOFJR.!hWI# f- R—lam:
REMARKS
-.. .
.
I. NAME OF SUn MITIER ,kl. Fh, M,,, - 00I1md b, WORK TE1.EPMONE NUUBER/fnslnd# A-
C*) - 09 Wllld
MAILING 400RESS ,Sl,.cf, CIW. Sfa~. X,, C&, - OP,IONI 8, oATE OF SU8UISSION tVVMMDD)
.—
OUS EO, T,ON
DD.%’’)!!.
1426 P~EV, OS OBSOLETE.