This is a purely informative rendering of an RFC that includes verified errata. This rendering may not be used as a reference.
The following 'Verified' errata have been incorporated in this document:
EID 4551
Network Working Group G. Clark
Request for Comments: 2217 Cisco Systems, Inc.
Category: Experimental October 1997
Telnet Com Port Control Option
Status of this Memo
This memo defines an Experimental Protocol for the Internet
community. This memo does not specify an Internet standard of any
kind. Discussion and suggestions for improvement are requested.
Distribution of this memo is unlimited.
Introduction
This memo proposes a protocol to allow greater use of modems attached
to a network for outbound dialing purposes.
Table of Contents
1. Negotiation of the Com Port
Control Option Protocol .................. 5
2. Com Port Configuration Commands .................. 6
Version
Baud Rate
Data Bit Size
Parity
Stop Bit size
3. Special Com Port Control Commands ................. 8
XON/XOFF Flow Control
HARDWARE Flow Control
BREAK Signal
DTR Signal
RTS Signal
4. Notification of Com Port and .................. 12
Modem Line Changes
5. Flow Control .................. 13
6. Security Considerations .................. 13
7. Author's Address .................. 14
8. Reference Section .................. 14
Discussion
The Telnet protocol defines an interactive, character-oriented
communications session. It was originally designed to establish a
session between a client and a remote login service running on a host
[5].
Many new business functions require a person to connect to remote
services to retrieve or deposit information. By in large, these
remote services are accessed via an async dial up connection. This
new class of functions include:
- dial up connections to the Internet
- connecting to bulletin boards
- connecting to internal and external databases
- sending and receiving faxes.
The general nature of this new class of function requires an
interactive, character-oriented communications session via an async
modem. This is typically known as outbound modem dialing.
To help defer the cost of installing and maintaining additional phone
lines which may be used very little per person, many equipment
manufacturers have added the ability to establish a Telnet session
directly to the outbound ports on many of the most popular access
servers and routers, here after referred to as access servers.
However, the current Telnet protocol definitions are not sufficient
to fully support this new use. There are three new areas of
functionality which need to be added to the Telnet protocol to
successfully support the needs of outbound modem dialing. These are:
- The ability for the client to send com port configuration
information to the access server which is connected to the
outbound modem. This is needed to ensure the data being
transmitted and received by the modem is formatted correctly
at the byte level.
- The ability for the access server to inform the client of any
modem line or signal changes such as RLSD changes (carrier
detect). This information is vital, since many client software
packages use this information to determine if a session with the
remote service has been established. RLSD changes are also
used for signaling in Class I faxing [6].
- The ability to manage flow control between the client and
the access server which does not interfere with the flow
control mechanisms used by the session between the client and
the remote service. Unfortunately RFC 1372 "Telnet Remote
Flow Control Option" [2] can not be used for this purpose
because it relies on sending XON/XOFF style characters which
maybe transmitted or received as a normal course of the
client / remote service session.
Though this discussion has focused on outbound modem dialing as the
primary use of this protocol, the protocol can also be used for any
serial device attached to an access server. Such devices could be:
- serial printers
- plotters
- monitoring devices such as pipe line monitors or medical
monitors
- general office equipment such as photo-copiers and cash
registers
Definition of Terms
Access Server - Any network device which accepts Telnet sessions
and passes the data received to a com port, and
passes data received from the com port to the client
via the Telnet session.
Baud Rate - For the purposes of this document, baud rate will
mean the communications of data in bits per second.
Client - Any network device which initiates a Telnet session
to an access server.
Outbound - Transmission of data from the modem attached to the
access server to a remote service.
Inbound - Transmission of data from the remote service to the
modem attached to the access server.
Remote Service - Any service which accepts dial-up connections,
EID 4551 (Verified) is as follows:Section: 0
Original Text:
Remove Service
Corrected Text:
Remote Service
Notes:
Definition of Terms contains a simple spelling error. Illustration on next page shows correct spelling.
including fax machines.
Illustration
=====================
| |
| CLIENT |\
| | \ < ---- Local Area /
===================== \ Enterprise Network
\
\
=============================
| Telnet Interface |
| | |
| | |
| ACCESS SERVER | |
| | |
| | |
| Com Port Interface |
=============================
|
|
==================
| |
| MODEM |
| |
==================
|
Access to Remote Service |
most commonly Public Switched ----->|
Network |
|
|
======================
Could be Internet Service | |
Provider, Bulletin Board | |
or FAX machine | REMOTE SERVICE |
| |
| |
======================
Command Names and Codes:
COM-PORT-OPTION 44
Client to Access Server Access Server to Client
SIGNATURE text text
SET-BAUDRATE 1 101
SET-DATASIZE 2 102
SET-PARITY 3 103
SET-STOPSIZE 4 104
SET-CONTROL 5 105
NOTIFY-LINESTATE 6 106
NOTIFY-MODEMSTATE 7 107
FLOWCONTROL-SUSPEND 8 108
FLOWCONTROL-RESUME 9 109
SET-LINESTATE-MASK 10 110
SET-MODEMSTATE-MASK 11 111
PURGE-DATA 12 112
Discussion: As initially proposed, com port configuration
commands are only sent from the client to the access
server. There is no current vision that the access
server would initiate the use of a com port configuration
command, only the notify commands. However, to allow for
access server initiated com port configurations different
command values have been established.
1. Negotiation of the Com Port Control Option Protocol
The negotiation of the com port control option protocol uses the
standard Telnet negotiation protocol mechanism:
IAC WILL COM-PORT-OPTION
The sender of this command is willing to send com port
control option commands.
IAC WONT COM-PORT-OPTION
The sender of this command refuses to send com port
control option commands.
IAC DO COM-PORT-OPTION
The sender of this command is willing to accept com port
control option commands.
IAC DONT COM-PORT-OPTION
The sender of this command refuses to accept com port control
options commands.
Typically a client will use WILL and WONT, while an access server
will use DO and DONT.
2. Com Port Configuration Commands
Once DO and WILL have been negotiated, the client may send any of the
following commands. The client can send these commands at any time
and multiple times throughout the Telnet session. Each command
transmitted from the client to the access server must be acknowledged
once the command has been processed by the access server. This
confirmation informs the client of the value set at the access server
after the processing of the command. This acknowledgment is not used
to acknowledge the receipt of the command, which is handled at the
TCP protocol layer. Its purpose is to inform the client of the value
in use, which may be different than the value requested in the
client's command. For example, the client may request a baud rate
higher than the access service can provide. If an acknowledgment is
not received by the client within a reasonable time (such as twice
the delay acknowledgment timer), the client may wish to resend the
command or terminate the session.
Though the commands may be sent from the client to the access server
in any sequence, there are sequences which may result in invalid
configurations for the com port (for example: EVEN parity is only
valid if the data size is set to less than 8 bits). Thus it is
recommended that commands be issued in the following sequence:
1. SET-BAUDRATE
2. SET-DATASIZE
3. SET-PARITY
4. SET-STOPSIZE
IAC SB COM-PORT-OPTION SIGNATURE <text> IAC SE
This command may be sent by either the client or the access
server to exchange signature information. If the command is
sent without <text> it is a request from the sender to receive
the signature text of the receiver. The text may be a
combination of any characters. There is no structure to the
<text> field. It may contain manufacturer information, version
number information, or any other information desired. If an
IAC character appears in the text it must be translated to
IAC-IAC to avoid conflict with the IAC which terminates
the command.
IAC SB COM-PORT-OPTION SET-BAUD <value(4)> IAC SE
This command is sent by the client to the access server to set
the baud rate of the com port. The value is four octets (4 bytes).
The value is represented in network standard format. The value
is the baud rate being requested. A special case is the value 0.
If the value is zero the client is requesting the current baud
rate of the com port on the access server.
Discussion: Though baud rates used today form a very sparse space,
and the initial version of the option used an index
based baud rate table, after much discussion with a
number of groups it has been determined that the
actual baud rate should be used. There are two main
reasons. 1) It limits the number of updates to the
option as faster baud rates come into use,
2) It provides the greatest amount of flexibility
in the selection of the baud rates.
IAC SB COM-PORT-OPTION SET-DATASIZE <value> IAC SE
This command is sent by the client to the access server to set
the data bit size. The command can also be sent to query the
current data bit size. The value is one octet (byte). The value
is an index into the following value table:
Value Data Bit Size
0 Request Current Data Bit Size
1 Available for Future Use
2 Available for Future Use
3 Available for Future Use
4 Available for Future Use
5 5
6 6
7 7
8 8
9-127 Available for Future Use
Discussion: There are only eight possible values for the data bit
size, only four have ever been used historically and
only two are commonly used today. The use of the
command-value format is recommended to preserve
consistency with other commands. It also reduces the
number of commands defined in the protocol, and
allows for future expansion.
IAC SB COM-PORT-OPTION SET-PARITY <value> IAC SE
This command is sent by the client to the access server to set
the parity. The command can also be sent to query the current
parity. The value is one octet (byte). The value is an index into
the following value table:
Value Parity [1]
0 Request Current Data Size
1 NONE
2 ODD
3 EVEN
4 MARK
5 SPACE
6-127 Available for Future Use
Discussion: There are only five possible values for parity
commonly used today. The use of the command-value
format is recommended to preserve consistency with
other commands.
IAC SB COM-PORT-OPTION SET-STOPSIZE <value> IAC SE
This command is sent by the client to the access server to set
the number of stop bits. The command can also be sent to query
the current stop bit size. The value is one octet (byte). The
value is an index into the following value table:
Value Stop Bit Size
0 Request Current Data Size
1 1
2 2
3 1.5
4-127 Available for Future Use
Discussion: Stop bit 1.5 is supported by most com port hardware
only if data size is set to 5 bits. It is not
commonly used.
3. Special Com Port Control Commands
The client can send this command to the access server at any time
and multiple times throughout the Telnet session. Each command
transmitted from the client to the access server is acknowledged
with a confirmation of the command and the actual value set. The
client should expect a response within a reasonable time (such as
twice the delay acknowledgment timer). The client may wish to
resend any command which is not acknowledged or terminate the
session.
IAC SB COM-PORT-OPTION SET-CONTROL <value> IAC SE
This command is sent by the client to the access server to set
special com port options. The command can also be sent to query
the current option value. The value is one octet (byte). The
value is an index into the following value table:
Value Control Commands
0 Request Com Port Flow Control Setting
(outbound/both)
1 Use No Flow Control (outbound/both)
2 Use XON/XOFF Flow Control (outbound/both)
3 Use HARDWARE Flow Control (outbound/both)
4 Request BREAK State
5 Set BREAK State ON
6 Set BREAK State OFF
7 Request DTR Signal State
8 Set DTR Signal State ON
9 Set DTR Signal State OFF
10 Request RTS Signal State
11 Set RTS Signal State ON
12 Set RTS Signal State OFF
13 Request Com Port Flow Control Setting (inbound)
14 Use No Flow Control (inbound)
15 Use XON/XOFF Flow Control (inbound)
16 Use HARDWARE Flow Control (inbound)
17 Use DCD Flow Control (outbound/both)
18 Use DTR Flow Control (inbound)
19 Use DSR Flow Control (outbound/both)
20-127 Available for Future Use
Discussion: Flow control options were divided into inbound and
outbound to take full advantage of existing
programming interfaces and access server
capabilities.
Discussion: The outbound values should set flow control for both
outbound and inbound. If inbound is to be, or can
be, set separately it should be done after the
setting of the outbound value.
Discussion: If the access server is not able to set inbound flow
control differently from the outbound flow control,
it should ignore the inbound flow control commands
and set the flow control option based on the outbound
flow control commands only.
IAC SB COM-PORT-OPTION SET-LINESTATE-MASK <value> IAC SE
This command is sent by the client to the access server to set a
bit mask for the sending of the NOTIFY-LINESTATE option (see
section 4). When the LINESTATE changes on the access server, the
access server will "AND" the new LINESTATE with the LINESTATE-
MASK. If the result is not zero, the access server will send the
result of the "AND" as the value in a NOTIFY-LINESTATE com port
option. If more than one bit satisfies the LINESTATE-MASK, only
one NOTIFY-LINESTATE, with all the satisfying bits, will be sent
to the client. The SET-LINESTATE-MASK may be any combination of
bits as listed below. These are the same bit values used in the
NOTIFY-LINESTATE option. The SET-LINESTATE-MASK values are based
on the most popular UART (com port control chip) in use [1].
Bit Position Value Meaning
7 128 Time-out Error
6 64 Transfer Shift Register Empty
5 32 Transfer Holding Register Empty
4 16 Break-detect Error
3 8 Framing Error
2 4 Parity Error
1 2 Overrun Error
0 1 Data Ready
Discussion: The SET-LINESTATE-MASK value of 0 will prevent the
access server from sending NOTIFY-LINESTATE options
to the client.
Discussion: The SET-LINESTATE-MASK value of 255 will allow the
access server to send a NOTIFY-LINESTATE option to
the client each time the LINESTATE changes on the
access server.
Discussion: The initial LINESTATE-MASK at the access server is 0.
Discussion: The client does not have to send a new
SET-LINESTATE-MASK after receiving a NOTIFY-
LINESTATE. The LINESTATE-MASK on the access server
is retained until set by the client or reset at the
start of a new Telnet session.
IAC SB COM-PORT-OPTION SET-MODEMSTATE-MASK <value> IAC SE
This command is sent by the client to the access server to set a
bit mask for the sending of the NOTIFY-MODEMSTATE option (see
section 4). When the MODEMSTATE changes on the access server,
the access server will "AND" the new MODEMSTATE with the
MODEMSTATE-MASK. If the result is not zero, the access server
will send the result of the "AND" as the value in a NOTIFY-
MODEMSTATE com port option. If more than one bit satisfies the
MODEMSTATE-MASK, only one NOTIFY-MODEMSTATE, with all the
satisfying bits, will be sent to the client. The SET-
MODEMSTATE-MASK may be any combination of bits as listed below.
These are the same bit values used in the NOTIFY-MODEMSTATE
option. The SET-MODEMSTATE-MASK values are based on the most
popular UART (com port control chip) in use [1].
Bit Position Value Meaning
7 128 Receive Line Signal Detect
(also known as Carrier Detect)
6 64 Ring Indicator
5 32 Data-Set-Ready Signal State
4 16 Clear-To-Send Signal State
3 8 Delta Receive Line Signal Detect
2 4 Trailing-edge Ring Detector
1 2 Delta Data-Set-Ready
0 1 Delta Clear-To-Send
Discussion: The SET-MODEMSTATE-MASK value of 0 will prevent the
access server from sending NOTIFY-MODEMSTATE options
to the client.
Discussion: The SET-MODEMSTATE-MASK value of 255 will allow the
access server to send a NOTIFY-MODEMSTATE option to
the client each time the MODEMSTATE changes on the
access server.
Discussion: The initial MODEMSTATE-MASK at the access server
is 255.
Discussion: The client does not have to send a new
SET-MODEMSTATE-MASK after receiving a NOTIFY-
MODEMSTATE. The MODEMSTATE-MASK on the access server
is retained until set by the client or reset at the
start of a new Telnet session.
IAC SB COM-PORT-OPTION PURGE-DATA <value> IAC SE
This command is sent by the client to the access server to
instruct the access server to immediately clear all data from the
buffer or buffers referenced by the value. The value is one
octet (byte). The value is an index into the following value
table:
Value Purge Data Buffer
0 Available for Future Use
1 Purge access server receive data buffer
2 Purge access server transmit data buffer
3 Purge both the access server receive data
buffer and the access server transmit data
buffer
4-127 Available for Future Use
4. Notification of Com port and Modem Line Changes
The access server can send these commands to the client any time
and multiple times throughout the Telnet session. The access
server should send the appropriate command to the client as soon
as the com port or modem line changes occurs. The client does
not issue a response to these commands.
IAC SB COM-PORT-OPTION NOTIFY-LINESTATE <value> IAC SE
The value is one octet (byte). The value is a bit level
composition made up from the value table below. Multiple bit
values may be set in a single transmission. The values are based
on the most popular UART (com port control chip) in use [1].
Bit Position Value Meaning
7 128 Time-out Error
6 64 Transfer Shift Register Empty
5 32 Transfer Holding Register Empty
4 16 Break-detect Error
3 8 Framing Error
2 4 Parity Error
1 2 Overrun Error
0 1 Data Ready
Discussion: The LINESTATE is the line state of the UART on
the access server.
IAC SB COM-PORT-OPTION NOTIFY-MODEMSTATE <value> IAC SE
The value is one octet (byte). The value is a bit level
composition made up from the value table below. Multiple bit
values may be set in a single transmission. The values are based
on the most popular UART (com port control chip) in use [1].
Bit Position Value Meaning
7 128 Receive Line Signal Detect
(also known as Carrier Detect)
6 64 Ring Indicator
5 32 Data-Set-Ready Signal State
4 16 Clear-To-Send Signal State
3 8 Delta Receive Line Signal Detect
2 4 Trailing-edge Ring Detector
1 2 Delta Data-Set-Ready
0 1 Delta Clear-To-Send
5. Flow Control
The client and/or access server can send these commands any time and
multiple times throughout the Telnet session.
IAC SB COM-PORT-OPTION FLOWCONTROL-SUSPEND IAC SE
The sender of this command is requesting that the receiver
suspend transmission of both data and commands until the
FLOWCONTROL-RESUME is transmitted by the sender.
IAC SB COM-PORT-OPTION FLOWCONTROL-RESUME IAC SE
The sender of this command is requesting that the receiver resume
transmission of both data and commands.
Discussion: Established Telnet sessions are initially in a
resume state between the client and the access server
and the access server and the client. There is no
need to send the resume command during session
initialization.
Discussion: Multiple concurrent suspend commands may be sent.
Secondary suspend commands can be ignored.
Transmission will resume with the sending of a single
resume command.
Discussion: The flow control option is designed to handle client
to access server flow control for the Telnet session.
This option has been added in deference to RFC 1372:
Telnet Remote Flow Control Option [2]. RFC 1372 uses
a simple character XON/XOFF technology to implement
flow control. This can lead to two problems. First,
the flow control characters may be valid data values.
Second, the flow control characters may be used for
end to end flow control (client application to remote
dial up service).
6. Security Considerations
There are two security issues to discuss; authentication and
resetting resources.
Authentication can follow either the Kerberos authentication protocol
established in RFC 1411 [3] or the SPX authentication protocol
established in RFC 1412 [4].
Once the Telnet session between the client and the access server has
been terminated, the access server should ensure the connection to
the remote service is disconnected and the com port geometry (baud
rate, data size, stop bits, parity, and flow control) is reset to a
factory or administrator defined configuration. This ensures the com
port is in a known state and ready to receive the next client
session. This will make operations more predicable and avoid
problems which might occur from starting a new session with random
com port configurations.
7. Author's Address
Glen Clark, Software Architect
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 96134
USA
EMail: glenc@cisco.com
WEB: www.cisco.com
8. Reference Section
[1] Joe Campbell. C Programmer's Guide to Serial Communications,
Second Edition. Indianapolis: SAMS Publishing, 1993. 213-224.
[2] Hedrick, C., and D. Borman, "Telnet Remote Flow Control Option",
RFC 1372, Cray Research, Inc., October 1992.
[3] Borman, D., "Telnet Authentication: Kerberos Version 4",
RFC 1411, Cray Research, Inc., January 1993.
[4] Alagappan, K., "Telnet Authentication: SPX",
RFC 1412, Digital Equipment Corporation, January 1993.
[5] D. E. Comer and David Stevens. Internetworking with TCP/IP,
Volume III. Prentice Hall, 1993.
[6] Andrew Margolis. The FAX Modem Sourcebook. John Wiley & Sons.
1995.