Telnet proxy forwarding mechanism

A mechanism and thread technology, applied in the field of Telnet proxy forwarding mechanism, can solve problems such as potential safety hazards, and achieve the effect of improving the level of internal risk control

Inactive Publication Date: 2014-09-24
北京华电天益信息科技有限公司
View PDF3 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, through the Telnet protocol, the linking device is transmitted in plain text, which has great security risks.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Telnet proxy forwarding mechanism
  • Telnet proxy forwarding mechanism
  • Telnet proxy forwarding mechanism

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0031] Embodiment 1: Telnet is a kind of simpler remote login agreement, and its whole process does not need encryption, but application is quite extensive, can work between any host computer or any terminal, and this among them is to come by NVT (network virtual terminal) accomplish. NVT is a virtual device, and the two connected parties, that is, the client and the server, must convert their physical terminals to and from the NVT.

[0032] The term NVT ACSII stands for 7-bit ACSII character set. Each 7-bit character is sent in 8-bit format with the most significant bit being 0. During Telnet communication, the byte 0xff is sent, which is called IAC (interpreted as a command).

[0033] During a Telnet connection, the first information exchanged between the two parties is the option negotiation data. Option negotiation is symmetric, which means that any party can actively send an option negotiation request to the other party. For any given option, either side of the connec...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a telnet proxy forwarding mechanism, which comprises a step that a main process completes state initialization and establishes a connecting thread, a step that the connecting thread sets up connection and forwards a message, and a step that the socket connecting thread monitors forwarded data. To be particular, (1) when an enter instruction is received, a function is called to parse the instruction to obtain a correct command; (2) a command filtering module is called to determine whether the command is allowed to be executed; if allowed, the correct command is sent to a monitoring program; or if not allowed, a message not allowing the command to be executed is forwarded to the client; and (3) a Thread_loop function handles all read and write events iteratively until the socket connection is closed. The mechanism achieve the functions of telnet session command analysis, session monitoring, cutting and playback, realizes prevention beforehand, intervention during an event and analysis and processing afterwards during operation and maintenance, and helps an enterprise to raise the internal risk control level to a certain extent.

Description

technical field [0001] The invention relates to a Telnet proxy forwarding mechanism, in particular to a Telnet proxy forwarding mechanism for monitoring sessions. Background technique [0002] The Telnet protocol is a member of the TCP / IP protocol family, and it is the standard protocol and main method of Internet remote login service. It provides users with the ability to do remote host work on their local computer. Use the telnet program on the end user's computer to connect to the server. End users can enter commands in the telnet program, and these commands will be run on the server, just as if they were entered directly on the server console. The server can be controlled locally. To start a telnet session, a username and password must be entered to log into the server. Telnet is a commonly used method for remotely controlling a Web server. The Telnet protocol is a member of the TCP / IP protocol family, and it is the standard protocol and main method of Internet remo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/08H04L12/24
Inventor 吴克河崔文超卻鑫运
Owner 北京华电天益信息科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products