Was this page helpful?
Your feedback about this content is important. Let us know what you think.
Additional feedback?
1500 characters remaining
Export (0) Print
Expand All

8 Index

A

Abort timers (section 3.1.2.1, section 3.1.6.1)

Abstract data model

   client (section 3.1.1, section 3.2.1)

   server (section 3.1.1, section 3.3.1)

Applicability

Attack scenarios - security

C

Call abort - state machine

Call abort message

   client

   server

Call Abort Message (SSTP_MSG_CALL_ABORT) message

Call Abort packet

Call Connect Acknowledge Message (SSTP_MSG_CALL_CONNECT_ACK) message

Call connect acknowledgment message - client

Call connect message - server

Call connect negative acknowledgment message - client

Call Connect Negative Acknowledgment Message (SSTP_MSG_CALL_CONNECT_NAK) message

Call Connect Request Message (SSTP_MSG_CALL_CONNECT_REQUEST) message

Call connected message - server

Call Connected Message (SSTP_MSG_CALL_CONNECTED) message

Call disconnect - state machine

Call Disconnect Acknowledge (SSTP_MSG_CALL_DISCONNECT_ACK) - Echo Request (SSTP_MSG_ECHO_REQUEST) - and Echo Response (SSTP_MSG_ECHO_RESPONSE) Messages message

Call disconnect acknowledgment message

   client

   server

Call disconnect message

   client

   server

Call Disconnect Message (SSTP_MSG_CALL_DISCONNECT) message

Call Disconnect packet

Call establishment

   client

   server

Call_Connect_Acknowledge_Message packet

Call_Connect_Negative_Acknowledgment_Message packet

Call_Connect_Request_Message packet

Call_Connected_Message packet

Capability negotiation

Change tracking

Client

   abstract data model (section 3.1.1, section 3.2.1)

   call abort message

   call connect acknowledgment message

   call connect negative acknowledgment message

   call disconnect acknowledgment message

   call disconnect message

   call establishment

   crypto binding

   Echo Request message

   Echo Response message

   error handling (section 3.1.5.1, section 3.2.5.1)

   higher-layer triggered events (section 3.1.4, section 3.2.4)

   initialization (section 3.1.3, section 3.2.3)

   local events (section 3.1.7, section 3.2.7)

   message processing (section 3.1.5, section 3.2.5)

   message status (section 3.1.5.1, section 3.2.5.1)

   negotiation timer (section 3.2.2.1, section 3.2.6.1)

   other local events

   overview (section 3.1, section 3.2)

   packet processing

   packet validation

   sequencing rules (section 3.1.5, section 3.2.5)

   SSTP packet processing

   state machine (section 3.1.1.1, section 3.2.1.1)

   timer events (section 3.1.6, section 3.2.6)

   timers (section 3.1.2, section 3.2.2)

Crypto binding

   client

   example

Crypto Binding Attribute message

Crypto Binding Request Attribute message

Crypto_Binding_Attribute packet

Crypto_Binding_Request_Attribute packet

D

Data model - abstract

   client (section 3.1.1, section 3.2.1)

   server (section 3.1.1, section 3.3.1)

Disconnect timers (section 3.1.2.2, section 3.1.6.2)

E

Echo Request message

   client

   server

Echo Response message

   client

   server

Encapsulated Protocol ID Attribute message

Encapsulated_Protocol_ID_Attribute packet

Error handling

   client (section 3.1.5.1, section 3.2.5.1)

   server (section 3.1.5.1, section 3.3.5.1)

Examples

   crypto binding

   handling HTTP proxies

   HTTPS layer establishment

   HTTPS layer teardown

   SSTP layer establishment

   SSTP layer teardown

F

Fields - vendor-extensible

G

Glossary

H

Handling HTTP proxies example

Hello timer (section 3.1.2.3, section 3.1.6.3)

Higher-layer triggered events

   client (section 3.1.4, section 3.2.4)

   server (section 3.1.4, section 3.3.4)

HMAC-SHA1-160

   input data

   key

HMAC-SHA256-256

   input data

   key

HTTPS layer establishment example

HTTPS layer teardown example

I

Implementer - security considerations

Index of security parameters

Informative references

Initialization

   client (section 3.1.3, section 3.2.3)

   server (section 3.1.3, section 3.3.3)

Input data

   crypto binding HMAC-SHA1-160

   crypto binding HMAC-SHA256-256

Introduction

K

Key

   crypto binding HMAC-SHA1-160

   crypto binding HMAC-SHA256-256

L

Local events

   client (section 3.1.7, section 3.2.7)

   server (section 3.1.7, section 3.3.7)

M

Man in the middle attack - security

Message processing

   client (section 3.1.5, section 3.2.5)

   server (section 3.1.5, section 3.3.5)

Messages

   Call Abort Message (SSTP_MSG_CALL_ABORT)

   Call Connect Acknowledge Message (SSTP_MSG_CALL_CONNECT_ACK)

   Call Connect Negative Acknowledgment Message (SSTP_MSG_CALL_CONNECT_NAK)

   Call Connect Request Message (SSTP_MSG_CALL_CONNECT_REQUEST)

   Call Connected Message (SSTP_MSG_CALL_CONNECTED)

   Call Disconnect Acknowledge (SSTP_MSG_CALL_DISCONNECT_ACK) - Echo Request (SSTP_MSG_ECHO_REQUEST) - and Echo Response (SSTP_MSG_ECHO_RESPONSE) Messages

   Call Disconnect Message (SSTP_MSG_CALL_DISCONNECT)

   Crypto Binding Attribute

   Crypto Binding Request Attribute

   Encapsulated Protocol ID Attribute

   SSTP Attributes

   SSTP Control Packet

   SSTP Data Packet

   SSTP Packet

   status - client (section 3.1.5.1, section 3.2.5.1)

   status - server (section 3.1.5.1, section 3.3.5.1)

   Status Info Attribute

   syntax

   transport

MITM attack - security

N

Negotiation timer

   client (section 3.2.2.1, section 3.2.6.1)

   server (section 3.3.2.1, section 3.3.6.1)

Normative references

O

Other local events

   client

   server

Overview (synopsis)

P

Packet processing

   client

   server

Packet validation

   client

   server

Parameters - security

Parameters - security index

Preconditions

Prerequisites

Product behavior

Protocol Details

   overview

R

References

   informative

   normative

Relationship to other protocols

Rogue client - security

Rogue SSTP server and genuine SSTP client - security

S

Security

   attack scenarios

   implementer considerations

   MITM attack

   parameter index

   parameters

   rogue client

   rogue SSTP server and genuine SSTP client

Sequencing rules

   client (section 3.1.5, section 3.2.5)

   server (section 3.1.5, section 3.3.5)

Server

   abstract data model (section 3.1.1, section 3.3.1)

   call abort message

   call connect message

   call connected message

   call disconnect acknowledgment message

   call disconnect message

   call establishment

   Echo Request message

   Echo Response message

   error handling (section 3.1.5.1, section 3.3.5.1)

   higher-layer triggered events (section 3.1.4, section 3.3.4)

   initialization (section 3.1.3, section 3.3.3)

   local events (section 3.1.7, section 3.3.7)

   message processing (section 3.1.5, section 3.3.5)

   message status (section 3.1.5.1, section 3.3.5.1)

   negotiation timer (section 3.3.2.1, section 3.3.6.1)

   other local events

   overview (section 3.1, section 3.3)

   packet processing

   packet validation

   sequencing rules (section 3.1.5, section 3.3.5)

   SSTP packet processing

   state machine (section 3.1.1.1, section 3.3.1.1)

   timer events (section 3.1.6, section 3.3.6)

   timers (section 3.1.2, section 3.3.2)

SSTP Attributes message

SSTP Control Packet message

SSTP Data Packet message

SSTP layer establishment example

SSTP layer teardown example

SSTP Packet message

SSTP packet processing

SSTP_Attributes packet

SSTP_Control_Packet packet

SSTP_Data_Packet packet

SSTP_MSG_CALL_DISCONNECT_OR_SSTP_MSG_CALL_DISCONNECT_ACK_OR_SSTP_MSG_ECHO_REQUEST_OR_SSTP_MSG_ECHO_RESPONSE packet

SSTP_Packet packet

Standards assignments

State machine

   client (section 3.1.1.1, section 3.2.1.1)

   server (section 3.1.1.1, section 3.3.1.1)

Status - message

   client (section 3.1.5.1, section 3.2.5.1)

   server (section 3.1.5.1, section 3.3.5.1)

Status Info Attribute message

Status_Info_Attribute packet

Syntax

T

Timer events

   client (section 3.1.6, section 3.2.6)

   server (section 3.1.6, section 3.3.6)

Timers

   client (section 3.1.2, section 3.2.2)

   server (section 3.1.2, section 3.3.2)

Tracking changes

Transport

Triggered events - higher-layer

   client (section 3.1.4, section 3.2.4)

   server (section 3.1.4, section 3.3.4)

Tunnel event

   disconnect

   establish

V

Vendor-extensible fields

Versioning

Show:
© 2015 Microsoft