Export (0) Print
Expand All

8 Index

A

Abort timers (section 3.1.2.1, section 3.1.6.1)

Abstract data model

client (section 3.1.1, section 3.2.1)

server (section 3.1.1, section 3.3.1)

Applicability

Attack scenarios - security

C

Call abort - state machine

Call abort message

client

server

Call Abort packet

Call connect acknowledgment message - client

Call connect message - server

Call connect negative acknowledgment message - client

Call connected message - server

Call disconnect - state machine

Call disconnect acknowledgment message

client

server

Call disconnect message

client

server

Call Disconnect packet

Call establishment

client

server

Call_Connect_Acknowledge_Message packet

Call_Connect_Negative_Acknowledgment_Message packet

Call_Connect_Request_Message packet

Call_Connected_Message packet

Capability negotiation

Change tracking

Client

abstract data model (section 3.1.1, section 3.2.1)

call abort message

call connect acknowledgment message

call connect negative acknowledgment message

call disconnect acknowledgment message

call disconnect message

call establishment

crypto binding

Echo Request message

Echo Response message

error handling (section 3.1.5.1, section 3.2.5.1)

higher-layer triggered events (section 3.1.4, section 3.2.4)

initialization (section 3.1.3, section 3.2.3)

local events (section 3.1.7, section 3.2.7)

message processing (section 3.1.5, section 3.2.5)

message status (section 3.1.5.1, section 3.2.5.1)

negotiation timer (section 3.2.2.1, section 3.2.6.1)

overview (section 3.1, section 3.2)

packet processing

packet validation

sequencing rules (section 3.1.5, section 3.2.5)

SSTP packet processing

state machine (section 3.1.1.1, section 3.2.1.1)

timer events (section 3.1.6, section 3.2.6)

timers (section 3.1.2, section 3.2.2)

Crypto binding

client

example

Crypto_Binding_Attribute packet

Crypto_Binding_Request_Attribute packet

D

Data model - abstract

client (section 3.1.1, section 3.2.1)

server (section 3.1.1, section 3.3.1)

Disconnect timers (section 3.1.2.2, section 3.1.6.2)

E

Echo Request message

client

server

Echo Response message

client

server

Encapsulated_Protocol_ID_Attribute packet

Error handling

client (section 3.1.5.1, section 3.2.5.1)

server (section 3.1.5.1, section 3.3.5.1)

Examples

crypto binding

handling HTTP proxies

HTTPS layer establishment

HTTPS layer teardown

SSTP layer establishment

SSTP layer teardown

F

Fields - vendor-extensible

G

Glossary

H

Handling HTTP proxies example

Hello timer (section 3.1.2.3, section 3.1.6.3)

Higher-layer triggered events

client (section 3.1.4, section 3.2.4)

server (section 3.1.4, section 3.3.4)

HMAC-SHA1-160

input data

key

HMAC-SHA256-256

input data

key

HTTPS layer establishment example

HTTPS layer teardown example

I

Implementer - security considerations

Informative references

Initialization

client (section 3.1.3, section 3.2.3)

server (section 3.1.3, section 3.3.3)

Input data

crypto binding HMAC-SHA1-160

crypto binding HMAC-SHA256-256

Introduction

K

Key

crypto binding HMAC-SHA1-160

crypto binding HMAC-SHA256-256

L

Local events

client (section 3.1.7, section 3.2.7)

server (section 3.1.7, section 3.3.7)

M

Man in the middle attack - security

Message processing

client (section 3.1.5, section 3.2.5)

server (section 3.1.5, section 3.3.5)

Messages

status - client (section 3.1.5.1, section 3.2.5.1)

status - server (section 3.1.5.1, section 3.3.5.1)

syntax

transport

MITM attack - security

N

Negotiation timer

client (section 3.2.2.1, section 3.2.6.1)

server (section 3.3.2.1, section 3.3.6.1)

Normative references

O

Overview (synopsis)

P

Packet processing

client

server

Packet validation

client

server

Parameters - security

Preconditions

Prerequisites

Product behavior

R

References

informative

normative

Relationship to other protocols

Rogue client - security

Rogue SSTP server and genuine SSTP client - security

S

Security

attack scenarios

implementer considerations

MITM attack

parameters

rogue client

rogue SSTP server and genuine SSTP client

Sequencing rules

client (section 3.1.5, section 3.2.5)

server (section 3.1.5, section 3.3.5)

Server

abstract data model (section 3.1.1, section 3.3.1)

call abort message

call connect message

call connected message

call disconnect acknowledgment message

call disconnect message

call establishment

Echo Request message

Echo Response message

error handling (section 3.1.5.1, section 3.3.5.1)

higher-layer triggered events (section 3.1.4, section 3.3.4)

initialization (section 3.1.3, section 3.3.3)

local events (section 3.1.7, section 3.3.7)

message processing (section 3.1.5, section 3.3.5)

message status (section 3.1.5.1, section 3.3.5.1)

negotiation timer (section 3.3.2.1, section 3.3.6.1)

overview (section 3.1, section 3.3)

packet processing

packet validation

sequencing rules (section 3.1.5, section 3.3.5)

SSTP packet processing

state machine (section 3.1.1.1, section 3.3.1.1)

timer events (section 3.1.6, section 3.3.6)

timers (section 3.1.2, section 3.3.2)

SSTP layer establishment example

SSTP layer teardown example

SSTP packet processing

SSTP_Attributes packet

SSTP_Control_Packet packet

SSTP_Data_Packet packet

SSTP_MSG_CALL_DISCONNECT_OR_SSTP_MSG_CALL_DISCONNECT_ACK_OR_SSTP_MSG_ECHO_REQUEST_OR_SSTP_MSG_ECHO_RESPONSE packet

SSTP_Packet packet

Standards assignments

State machine

client (section 3.1.1.1, section 3.2.1.1)

server (section 3.1.1.1, section 3.3.1.1)

Status - message

client (section 3.1.5.1, section 3.2.5.1)

server (section 3.1.5.1, section 3.3.5.1)

Status_Info_Attribute packet

Syntax

T

Timer events

client (section 3.1.6, section 3.2.6)

server (section 3.1.6, section 3.3.6)

Timers

client (section 3.1.2, section 3.2.2)

server (section 3.1.2, section 3.3.2)

Tracking changes

Transport

Triggered events - higher-layer

client (section 3.1.4, section 3.2.4)

server (section 3.1.4, section 3.3.4)

Tunnel event

disconnect

establish

V

Vendor-extensible fields

Versioning

 
Show:
© 2014 Microsoft