Skip to main content

Secure shell over HTTP/3 connections
draft-michel-ssh3-00

Document Type Replaced Internet-Draft (individual)
Expired & archived
Authors François Michel , Olivier Bonaventure
Last updated 2024-02-28
Replaced by draft-michel-remote-terminal-http3
RFC stream (None)
Intended RFC status (None)
Formats
Stream Stream state (No stream defined)
Consensus boilerplate Unknown
RFC Editor Note (None)
IESG IESG state Replaced by draft-michel-remote-terminal-http3
Telechat date (None)
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:

Abstract

The secure shell (SSH) traditionally offers its secure services over an insecure network using the TCP transport protocol. This document defines mechanisms to run the SSH protocol over HTTP/3 using Extended CONNECT. Running SSH over HTTP/3 enables additional benefits such as the scalability offered by HTTP multiplexing, relying on TLS for secure channel establishment leveraging X.509 certificates, HTTP Authentication schemes for client and server authentication, UDP port forwarding and stronger resilience against packet injection attacks and middlebox interference.

Authors

François Michel
Olivier Bonaventure

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)