Internet Engineering Task Force Frank da Cruz Internet Draft Jeffrey E. Altman draft-columbia-kermit-url-00.txt Columbia University April 2002 Expires: October 2002 THE KERMIT URL SCHEME STATUS OF THIS MEMO This document is an Internet-Draft and is in full conformance with all provisions of Section 10 of RFC2026. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF), its areas, and its working groups. Note that other groups may also distribute working documents as Internet- Drafts. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress". The list of current Internet-Drafts can be accessed at http://www.ietf.org/ietf/1id-abstracts.txt To view the list Internet-Draft Shadow Directories, see http://www.ietf.org/shadow.html. ABSTRACT This document defines the Kermit URL according to the rules of RFC 2717. 1. URL SCHEME NAME The scheme name is "kermit". 2. URL SCHEME SYNTAX The Kermit URL scheme is used to fetch files from Internet hosts using the Kermit protocol [1]. Kermit URLs follow the common Internet scheme syntax described in Section 3.1 of RFC 1738 [2]. If ":" is omitted, the port defaults to 1649 (as registered by IANA). A username and password may be included. If none is included, anonymous access as is used, exactly as in FTP. Examples: Anonymous retrieval of a file: kermit://kermit.columbia.edu/READ.ME Authenticated retrieval of a file: kermit://olga:secret@xyzcorp.com/somepath/oofa.txt Authenticated retrieval of multiple files: kermit://olga:secret@xyzcorp.com/somepath/*.[ch] Secure authenticated retrieval of a file: kermit://olga@xyzcorp.com/somepath/oofa.txt In the latter case, authentication is performed by whatever security scheme the server and client negotiate [1]. 3. CHARACTER ENCODING CONSIDERATIONS File and pathnames may be US ASCII (ISO 646 International Reference Version) or UTF-8. UTF-8 names are converted into the native character set of the server. For text-mode transfers, file record format and character set are converted according to normal Kermit rules and procedures. 4. INTENDED USAGE The specified file or files are retrieved from the host using Kermit protocol. Text files are sent in text mode, binary files in binary mode, as determined automatically by the server. 5. INTEROPERABILITY Any Telnet client that supports Kermit protocol and the Telnet KERMIT Option [3] may use the Internet Kermit Service. Any such Telnet client that can accept URLs on the command line (such as C-Kermit and Kermit 95) can serve as users of or helper applications for kermit URLs. 6. SECURITY Refer to [1]. No new security issues are raised by the use of this URL. 7. AUTHORS' ADDRESS Frank da Cruz fdc@columbia.edu Jeffrey E. Altman jaltman@columbia.edu The Kermit Project Columbia University 612 West 115th Street New York NY 10025-7799 USA http://www.columbia.edu/kermit/ 8. BIBLIOGRAPHY [1] da Cruz, F, and J. Altman, "Internet Kermit Service", Request for Comments 2839, Internet Engineering Task Force, May 2000. [2] T. Berners-Lee, L. Masinter, and M. McCahill, "Uniform resource locators (URL)," Request for Comments 1738, Internet Engineering Task Force, Dec. 1994. [3] Altman, J., and F. da Cruz, "Telnet Kermit Option", Request for Comments 2840, Internet Engineering Task Force, May 2000. Full Copyright Statement Copyright (c) The Internet Society (2002). All Rights Reserved. This document and translations of it may be copied and furnished to others, and derivative works that comment on or otherwise explain it or assist in its implementation may be prepared, copied, published and distributed, in whole or in part, without restriction of any kind, provided that the above copyright notice and this paragraph are included on all such copies and derivative works. However, this document itself may not be modified in any way, such as by removing the copyright notice or references to the Internet Society or other Internet organizations, except as needed for the purpose of developing Internet standards in which case the procedures for copyrights defined in the Internet Standards process must be followed, or as required to translate it into languages other than English. The limited permissions granted above are perpetual and will not be revoked by the Internet Society or its successors or assigns. This document and the information contained herein is provided on an "AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.