分享
 
 
 

RFC542 - File Transfer Protocol

王朝other·作者佚名  2008-05-31
窄屏简体版  字體: |||超大  

File Transfer Protocol

(Aug. 12, 1973)

RFC542 NIC 17759

Nancy J. Neigus See Also: RFCs 354, 454, 495

Bolt Beranek and Newman, Inc.

Cambridge, Mass.

File Transfer Protocol for the ARPA Network

File Transfer Protocol

(Aug. 12, 1973)

RFC542 NIC 17759

PREFACE

This document is the result of several months discussion via RFC

(relevant numbers are 430, 448, 454, 463, 468, 478, 480), followed by a

meeting of the FTP committee at BBN on March 16, followed by further

communication among committee members. There are a considerable number

of changes for the last "official" version, see RFCs 354, 385, but the

gross strUCture remains the same. The places to look for differences

are (1) in the definitions pf types and modes, (2) in the specification

of the data connection and data sockets, (3) in the command-reply

sequences, (4) in the functions dependent on the TELNET protocol (FTP

has been altered to correspond to the new TELNET spec). The model has

been clarified and enlarged to allow inter-server file transfer, and

several new commands have been added to accommodate more specialized (or

site-specific) functions. It is my belief that this new specificiation

reflects the views eXPressed by the committee at the above-mentioned

meeting and in subsequent conversations.

The large number of incompatibilities would complicate a phased

implementation schedule, such as is in effect for the TELNET protocol.

Therefore we have assigned a new socket, decimal 21, as a temporary

logger socket for the new version and a change-over date of 1 February

1974. Until that date the old (354, 385) version of FTP will be

available on Socket 3 and the new version (attached) should be

implemented on Socket 21. On 1 February the new version will shift to

Socket 3 and the old disappear from view.

The File Transfer protocol should be considered stable at least until

February, though one should feel free to propose further changes via

RFC. (Implementation of new commands on an experimental basis is

encouraged and should also be reported by RFC.) In addition, members of

the FTP committee may be contacted directly about changes. Based on

attendance at the March 16 meeting, they are:

Abhay Bhushan MIT-DMCG

Bob Braden UCLA-CCN

Bob Bressler BBN-NET

Bob Clements BBN-TENEX

John Day ILL-ANTS

Peter Deutsch PARC-MAXC

Wayne Hathaway AMES-67

Mike Kudlick SRI-ARC

Alex McKenzie BBN-NET

Bob Merryman UCSD-CC

Nancy Neigus BBN-NET

Mike Padlipsky MIT-Multics

Jim Pepin USC-44

Ken Pogran MIT-Multics

Jon Postel UCLA-NMC

1

File Transfer Protocol

(Aug. 12, 1973)

RFC542 NIC 17759

Milton Reese FNWC

Brad Reussow HARV-10

Marc Seriff MIT-DMCG

Ed Taft HARV-10

Bob Thomas BBN-TENEX

Ric Werme CMU-10

Jim White SRI-ARC

I would especially like to thank Bob Braden, Ken Pogran, Wayne Hathaway,

Jon Postel, Ed Taft and Alex McKenzie for their help in preparing this

document.

NJN/jm

2

File Transfer Protocol

(Aug. 12, 1973)

RFC542 NIC 17759

FILE TRANSFER PROTOCOL

INTRODUCTION

The File Transfer Protocol (FTP) is a protocol for file transfer

between Hosts (including Terminal Interface Message Processors

(TIPs)) on the ARPA Computer Network (ARPANET). The primary function

of FTP is to transfer files efficiently and reliably among Hosts and

to allow the convenient use of remote file storage capabilities.

The objectives of FTP are 1) to promote sharing of files (computer

programs and/or data), 2) to encourage indirect or implicit (via

programs) use of remote computers, 3) to shield a user from

variations in file storage systems among Hosts, and 4) to transfer

data reliably and efficiently. FTP, though usable directly by a user

at a terminal, is designed mainly for use by programs.

The attempt in this specification is to satisfy the diverse needs of

users of maxi-Hosts, mini-Hosts, TIPs, and the Datacomputer, with a

simple, and easily implemented protocol design.

This paper assumes knowledge of the following protocols described in

NIC #7104:

The Host-Host Protocol

The Initial Connection Protocol

The TELNET Protocol

DISCUSSION

In this section, the terminology and the FTP model are discussed.

The terms defined in this section are only those that have special

significance in FTP.

TERMINOLOGY

ASCII

The USASCII character set as defined in NIC #7104. In FTP,

ASCII characters are defined to be the lower half of an

eight-bit code set (i.e., the most significant bit is zero).

Access controls

Access controls define users' access privileges to the use of a

system, and to the files in that system. Access controls are

necessary to prevent unauthorized or accidental use of files.

3

File Transfer Protocol

(Aug. 12, 1973)

RFC542 NIC 17759

It is the prerogative of a server-FTP process to provide access

controls.

byte size

The byte size specified for the transfer of data. The data

connection is opened with this byte size. The data connection

byte size is not necessarily the byte size in which data is to

be stored in a system, nor the logical byte size for

interpretation of the structure of the data.

data connection

A simplex connection over which data is transferred, in a

specified byte size, mode and type. The data transferred may be

a part of a file, an entire file or a number of files. The

path may be between a server-DTP and a user-DTP, or between two

server-DTPs.

data socket

The passive data transfer process "listens" on the data socket

for an RFCfrom the active transfer process (server) in order

to open the data connection. The server has fixed data

sockets; the passive process may or may not.

EOF

The end-of-file condition that defines the end of a file being

transferred.

EOR

The end-of-record condition that defines the end of a record

being transferred.

error recovery

A procedure that allows a user to recover from certain errors

such as failure of either Host system or transfer process. In

FTP, error recovery may involve restarting a file transfer at a

given checkpoint.

FTP commands

A set of commands that comprise the control information flowing

from the user-FTP to the server-FTP process.

4

File Transfer Protocol

(Aug. 12, 1973)

RFC542 NIC 17759

file

An ordered set of computer data (including programs), of

arbitrary length, uniquely identified by a pathname.

mode

The mode in which data is to be transferred via the data

connection. The mode defines the data format during transfer

including EOR and EOF. The transfer modes defined in FTP are

described in the Section on Transmission Modes.

NVT

The Network Virtual Terminal as defined in the ARPANET TELNET

Protocol.

NVFS

The Network Virtual File System. A concept which defines a

standard network file system with standard commands and

pathname conventions. FTP only partially embraces the NVFS

concept at this time.

pathname

Pathname is defined to be the character string which must be

input to a file system by a user in order to identify a file.

Pathname normally contains device and/or Directory names, and

file name specification. FTP does not yet specify a standard

pathname convention. Each user must follow the file naming

conventions of the file systems he wishes to use.

record

A sequential file may be structured as a number of contiguous

parts called records. Record structures are supported by FTP

but a file need not have record structure.

reply

A reply is an acknowledgment (positive or negative) sent from

server to user via the TELNET connections in response to FTP

commands. The general form of a reply is a completion code

(including error codes) followed by a text string. The codes

are for use by programs and the text is usually intended for

human users.

5

File Transfer Protocol

(Aug. 12, 1973)

RFC542 NIC 17759

server-DTP

The data transfer process, in its normal "active" state,

establishes the data connection by RFCto the "listening" data

socket, sets up parameters for transfer and storage, and

tranfers data on command from its PI. The DTP can be placed in

a "passive" state to listen for, rather than initiate, an RFC

on the data socket.

server-FTP process

A process or set of processes which perform the function of

file transfer in cooperation with a user-FTP process and,

possibly, another server. The functions consist of a protocol

interpreter (PI) and a data transfer process (DTP).

server-PI

The protocol interpreter "listens" on Socket 3 for an ICP from

a user-PI and establishes a TELNET communication connection.

It receives standard FTP commands from the user-PI, sends

replies, and governs the server-DTP.

TELNET connections

The full-duplex communication path between a user-PI and a

server-PI. The TELNET connections are established via the

standard ARPANET Initial Connection Protocol (ICP).

type

The data representation type used for data transfer and

storage. Type implies certain transformations between the time

of data storage and data transfer. The representation types

defined in FTP are described in the Section on Establishing

Data Connections.

user

A human being or a process on behalf of a human being wishing

to oBTain file transfer service. The human user may interact

directly with a server-FTP process, but use of a user-FTP

process is preferred since the protocol design is weighted

towards automata.

6

File Transfer Protocol

(Aug. 12, 1973)

RFC542 NIC 17759

user-DTP

The data transfer process "listens" on the data socket for an

RFCfrom a server-FTP process. If two servers are transferring

data between them, the user-DTP is inactive.

user-FTP process

A set of functions including a protocol interpreter, a data

transfer process and a user interface which together perform

the function of file transfer in cooperation with one or more

server-FTP processes. The user interface allows a local

language to be used in the command-reply dialogue with the

user.

user-PI

The protocol interpreter initiates the ICP to the server-FTP

process, initiates FTP commands, and governs the user-DTP if

that process is part of the file transfer.

THE FTP MODEL

With the above definitions in mind, the following model (shown in

Figure 1) may be diagrammed for an FTP service.

-------------

!/---------\!

!! User !! --------

!!Interface!<--->! User !

!\----:----/! --------

---------- ! V !

!/------\! FTP Commands !/---------\!

!!Server!<-----------------! User !!

!! PI !----------------->! PI !!

!\--:---/! FTP Replies !\----:----/!

! V ! ! V !

-------- !/------\! Data !/---------\! --------

! File !<--->!Server!<---------------->! User !<--->! File !

!System! !! DTP !! Connections !! DTP !! !System!

-------- !\------/! !\---------/! --------

---------- -------------

Server-FTP User-FTP

NOTES: 1. The data connection may be in either direction.

2. The data connection need not exist all of the time.

Figure 1 Model for FTP Use

7

File Transfer Protocol

(Aug. 12, 1973)

RFC542 NIC 17759

In the model described in Figure 1, the user-protocol interpreter

initiates the TELNET connections. At the initiation of the user,

standard FTP commands are generated by the user-PI and transmitted to

the server process via the TELNET connections. (The user may

establish a direct TELNET connection to the server-FTP, from a TIP

terminal for example, and generate standard FTP commands himself,

by-passing the user-FTP process.) Standard replies are sent from the

server-PI to the user-PI over the TELNET connections in response to

the commands.

The FTP commands specify the parameters for the data connection (data

socket, byte size, transfer mode, representation type, and structure)

and the nature of file system operation (store, retrieve, append,

delete, etc.). The user-DTP or its designate should "listen" on the

specified data socket, and the server initiate the data connection

and data transfer in accordance with the specified parameters. It

should be noted that the data socket need not be in the same Host

that initiates the FTP commands via the TELNET connections, but the

user or his user-FTP process must ensure a "listen" on the specified

data socket. It should also be noted that two data connections, one

for send and the other for receive, may exist simultaneously.

In another situation a user might wish to transfer files between two

Hosts, neither of which is his local Host. He sets up TELNET

connections to the two servers and then arranges for a data

connection between them. In this manner control information is

passed to the user-PI but data is transferred between he server data

transfer processes. Following is a model of this server-server

interaction.

TELNET ------------ TELNET

-----------! User-FTP !------------

! -------->! User-PI !<--------- !

! ! ! "C" ! ! !

V ! ------------ ! V

-------------- --------------

! Server-FTP ! Data Connection ! Server-FTP !

! "A" !<-----------------------! "B" !

-------------- Socket(A) Socket(B) --------------

Figure 2

8

File Transfer Protocol

(Aug. 12, 1973)

RFC542 NIC 17759

The protocol requires that the TELNET connections be open while data

transfer is in progress. It is the responsibility of the user to

request the closing of the TELNET connections when finished using the

FTP service, while it is the server who takes the action. The server

may abort data transfer if the TELNET connections are closed without

command.

DATA TRANSFER FUNCTIONS

Files are transferred only via the data connection(s). The TELNET

connection is used for the transfer of commands, which describe the

functions to be performed, and the replies to these commands (see the

Section on FTP Replies). Several commands are concerned with the

transfer of data between Hosts. These data transfer commands include

the BYTE, MODE, and SOCKet commands which specify how the bits of the

data are to be transmitted, and the STRUcture and TYPE commands,

which are used to define the way in which the data are to be

represented. The transmission and representation are basically

independent but "Stream" transmission mode is dependent on the file

structure attribute and if "Compressed" transmission mode is used the

nature of the filler byte depends on the representation type.

DATA REPRESENTATION AND STORAGE

Data is transferred from a storage device in the sending Host to a

storage device in the receiving Host. Often it is necessary to

perform certain transformations on the data because data storage

representations in the two systems are different. For example,

NVT-ASCII has different data storage representations in diffeent

systems. PDP-10's generally store NVT-ASCII as five 7-bit ASCII

characters, left-justified in a 36-bit Word. 360's store NVT-ASCII as

8-bit EBCDIC codes. Multics stores NVT-ASCII as four 9-bit characters

in a 36-bit word. It may be desirable to convert characters into the

standard NVT-ASCII representation when transmitting text between

dissimilar systems. The sending and receiving sites would have to

perform the necessary transformations between the standard

representation and their internal representations.

A different problem in representation arises when transmitting binary

data (not character codes) between Host systems with different word

lengths. It is not always clear how the sender should send data, and

the receiver store it. For example, when transmitting 32-bit bytes

from a 32-bit word-length system to a 36-bit word-length system, it

may be desirable (for reasons of efficiency and usefulness) to store

the 32-bit bytes right-justified in a 36-bit word in the latter

system. In any case, the user should have the option of specifying

data representation and transformation functions. It should be noted

that FTP provides for very limited data type representations.

Transformations desired beyond this limited capability should be

9

File Transfer Protocol

(Aug. 12, 1973)

RFC542 NIC 17759

performed by the user directly or via the use of the Data

Reconfiguration Sevice (DRS, RFC#138, NIC #6715). Additonal

representation types may be defined later if there is a demonstrable

need.

Data representations are handled in FTP by a user specifying a

representation type. This type may implicitly (as in ASCII or

EBCDIC) or explicitly (as in Local byte) define a byte size for

interpretation which is referred to as the "logical byte size." This

has nothing to do with the byte size used for transmission over the

data connection(s) (called the "transfer byte size") and the two

should not be confused. For example, NVT-ASCII has a logical byte

size of 8 bits but an ASCII file might be transferred using a

transfer byte size of 32. If the type is Local byte, then the TYPE

command has an obligatory second parameter specifying the logical

byte size.

The types ASCII and EBCDIC also take a second (optional) parameter;

this is to indicate what kind of vertical format control, if any, is

associated with a file. The following data representation types are

defined in FTP:

ASCII Format

This is the default type and must be accepted by all FTP

implementations. It is intended primarily for the transfer of

text files, except when both Hosts would find the EBCDIC type

more convenient.

The sender converts the data from his internal character

representation to the standard 8-bit NVT-ASCII representation

(see the TELNET specification). The receiver will convert the

data from the standard form to his own internal form.

In accordance with the NVT standard, the <CRLF> sequence should

be used, where necessary, to denote the end of a line of text.

(See the discussion of file structure at the end of the Section

on Data Representation and Storage).

Using the standard NVT-ASCII representation means that data

must be interpreted as 8-bit bytes. If the BYTE command (see

the Section on Transfer Parameter Commands) specifies a

transfer byte size different from 8 bits, the 8-bit ASCII

characters should be packed contiguously without regard for

transfer byte boundaries.

The Format parameter for ASCII and EBCDIC types is discussed

below.

10

File Transfer Protocol

(Aug. 12, 1973)

RFC542 NIC 17759

EBCDIC Format

This type is intended for efficient transfer between Hosts

which use EBCDIC for their internal character representation.

For transmission the data are represented as 8-bit EBCDIC

characters. The character code is the only difference between

the functional specifications of EBCDIC and ASCII types.

End-of-line (as opposed to end-of-record--see the discussion of

structure) will probably be rarely used with EBCDIC type for

purposes of denoting structure, but where it is necessary the

<NL> character should be used.

A character file may be transferred to a Host for one of three

purposes: for printing, for storage and later retrieval, or for

processing. If a file is sent for printing, the receiving Host must

know how the vertical format control is represented. In the second

case, it must be possible to store a file at a Host and then retrieve

it later in exactly the same form. Finally, it ought to be possible

to move a file from one Host to another and process the file at the

second Host without undue trouble. A single ASCII or EBCDIC format

does not satisfy all these conditions and so these types have a

second parameter specifying one of the following three formats:

Non-print

This is the default format to be used if the second (format)

parameter is omitted. Non-print format must be accepted by all

FTP implementations.

The file need contain no vertical format information. If it is

passed to a printer process, this process may assume standard

values for spacing and margins.

Normally, this format will be used with files destined for

processing or just storage.

TELNET Format Controls

The file contains ASCII/EBCDIC vertical format controls (i.e.,

<CR>, <LF>, <NL>, <VT>, <FF>) which the printer process will

interpret appropriately. <CRLF>, in exactly this sequence,

also denotes end-of-line.

Carriage Control (ASA)

The file contains ASA (FORTRAN) vertical format control

characters. (See NWG/RFC#189 Appendix C and Communications of

11

File Transfer Protocol

(Aug. 12, 1973)

RFC542 NIC 17759

the ACM, Vol. 7, No. 10, 606 (Oct. 1964)). In a line or a

record, formatted according to the ASA Standard, the first

character is not to be printed. Instead it should be used to

determine the vertical movement of the paper which should take

place before the rest of the record is printed. The ASA

Standard specifies the following control characters:

Character Vertical Spacing

blank Move paper up one line

0 Move paper up two lines

1 Move paper to top of next page

+ No movement, i.e., overprint

Clearly there must be some way for a printer process to

distinguish the end of the structural entity. If a file has

record structure (see below) this is no problem; records will

be explicitly marked during transfer and storage. If the file

has no record structure, the <CRLF> end-of-line sequence is

used to separate printing lines, but these format effectors are

overridden by the ASA controls.

Image

The data are sent as contiguous bits which, for transfer, are

packed into transfer bytes of the size specified in the BYTE

command. The receiving site must store the data as contiguous

bits. The structure of the storage system might necessitate

the padding of the file (or of each record, for a

record-structured file) to some convenient boundary (byte, word

or block). This padding, which must be all zeroes, may occur

only at the end of the file (or at the end of each record) and

there must be a way of identifying the padding bits so that

they may be stripped off if the file is retrieved. The padding

transformation should be well publicized to enable a user to

process a file at the storage site.

Image type is intended for the efficient storage and retrieval

of files and for the transfer of binary data. It is

recommended that this type be accepted by all FTP

implementations.

Local byte Byte size

The data is transferred in logical bytes of the size specified

by the obligatory second parameter, Byte size. The value of

Byte size must be a decimal integer; there is no default value.

The logical byte size is not necessarily the same as the

transfer byte size. If there is a difference in byte sizes,

12

File Transfer Protocol

(Aug. 12, 1973)

RFC542 NIC 17759

then the logical bytes should be packed contiguously,

disregarding transfer byte boundaries and with any necessary

padding at the end.

When the data reaches the receiving Host it will be transformed

in a manner dependent on the logical byte size and the

particular Host. This transformation must be invertible (that

is an identical file can be retrieved if the same parameters

are used) and should be well publicized by the FTP

implementors.

This type is intended for the transfer of structured data. For

example, a user sending 36-bit floating-point numbers to a Host

with a 32-bit word could send his data as Local byte with a

logical byte size of 36. The receiving Host would then be

expected to store the logical bytes so that they could be

easily manipulated; in this example putting the 36-bit logical

bytes into 64-bit double words should suffice.

A note of caution about parameters: a file must be stored and

retrieved with the same parameters if the retrieved version is to be

identical to the version originally transmitted. Conversely, FTP

implementations must return a file identical to the original if the

parameters used to store and retrieve a file are the same.

In addition to different representation types, FTP allows the

structure of a file to be specified. Currently two file structures

are recognized in FTP: file-structure, where there is no internal

structure, and record-structure, where the file is made up of

records. File-structure is the default, to be assumed if the

STRUcture command has not been used but both structures must be

accepted for "text" files (i.e., files with TYPE ASCII or EBCDIC) by

all FTP implementations. The structure of a file will affect both

the transfer mode of a file (see the Section on Transmission Modes)

and the interpretation and storage of the file.

The "natural" structure of a file will depend on which Host stores

the file. A source-code file will usually be stored on an IBM 360 in

fixed length records but on a PDP-10 as a stream of characters

partitioned into lines, for example by <CRLF>. If the transfer of

files between such disparate sites is to be useful, there must be

some way for one site to recognize the other's assumptions about the

file.

With some sites being naturally file-oriented and others naturally

record-oriented there may be problems if a file with one structure is

sent to a Host oriented to the other. If a text file is sent with

record-structure to a Host which is file oriented, then that Host

should apply an internal transformation to the file based on the

13

File Transfer Protocol

(Aug. 12, 1973)

RFC542 NIC 17759

record structure. Obviously this transformation should be useful but

it must also be invertible so that an identical file may be

retreieved using record structure.

In the case of a file being sent with file-structure to a

record-oriented Host, there exists the question of what criteria the

Host should use to divide the file into records which can be

processed locally. If this division is necessary the FTP

implementation should use the end-of-line sequence, <CRLF> for ASCII,

or <NL> for EBCDIC text files, as the delimiter. If an FTP

implementation adopts this technique, it must be prepared to reverse

the transformation if the file is retrieved with file-structure.

ESTABLISHING DATA CONNECTIONS

The mechanics of transferring data consists of setting up the data

connection to the appropriate sockets and choosing the parameters for

transfer--byte size and mode. Both the user and the server-DTPs have

default data sockets; these are the two sockets (for send and

receive) immediately following the standard ICP TELNET socket ,i.e.,

(U+4) and (U+5) for the user-process and (S+2), (S+3) for the server.

The use of default sockets will ensure the security of the data

transfer, without requiring the socket information to be explicitly

exchanged.

The byte size for the data connection is specified by the BYTE

command, or, if left unspecified, defaults to 8-bit bytes. This byte

size is relevant only for the actual transfer of the data; it has no

bearing on representation of the data within a Host's file system.

The protocol does not require servers to accept all possible byte

sizes. Since the use of various byte sizes is intended for efficiency

of transfer, servers may implement only those sizes for which their

data transfer is efficient including the default byte size of 8 bits.

The passive data transfer process (this may be a user-DTP or a second

server-DTP) shall "listen" on the data socket prior to sending a

transfer request command. The FTP request command determines the

direction of the data transfer and thus which data socket (odd or

even) is to be used in establishing the connection. The server, upon

receiving the transfer request, will initiate the data connection by

RFCto the appropriate socket using the specified (or default) byte

size. When the connection is opened, the data transfer begins

between DTP's, and the server-PI sends a confirming reply to the

user-PI.

It is possible for the user to specify an alternate data socket by

use of the SOCK command. He might want a file dumped on a TIP line

printer or retrieved from a third party Host. In the latter case the

user-PI sets up TELNET connections with both server-PI's and sends

14

File Transfer Protocol

(Aug. 12, 1973)

RFC542 NIC 17759

each a SOCK command indicating the fixed data sockets of the other.

One server is then told (by an FTP command) to "listen" for an RFC

which the other will initiate and finally both are sent the

appropriate transfer commands. The exact sequence of commands and

replies sent between the user-controller and the servers is defined

in the Section on FTP Replies.

In general it is the server's responsibility to maintain the data

connection--to initiate the RFC's and the closes. The exception to

this is when the user-DTP is sending the data in a transfer mode that

requires the connection to be closed to indicate EOF. The server

MUST close the data connection under the following conditions:

1. The server has completed sending data in a transfer mode that

requires a close to indicate EOF.

2. The server receives an ABORT command from the user.

3. The socket or byte size specification is changed by a command

from the user.

4. The TELNET connections are closed legally or otherwise.

5. An irrecoverable error condition occurs.

Otherwise the close is a server option, the exercise of which he must

indicate to the user-process by an appropriate reply.

TRANSMISSION MODES

The next consideration in transferring data is choosing the

appropriate transmission mode. There are three modes: one which

formats the data and allows for restart procedures; one which also

compresses the data for efficient transfer; and one which passes the

data with little or no processing. In this last case the mode

interacts with the structure attribute to determine the type of

processing. In the compressed mode the representation type

determines the filler byte.

All data transfers must be completed with an end-of-file (EOF) which

may be explicitly stated or implied by the closing of the data

connection. For files with record structure, all the end-of-record

markers (EOR) are explicit, including the final one.

Note: In the rest of this section, byte means "transfer byte" except

where explicitly stated otherwise.

15

File Transfer Protocol

(Aug. 12, 1973)

RFC542 NIC 17759

The following transmission modes are defined in FTP:

Stream

The data is transmitted as a stream of bytes. There is no

restriction on the representation type used; record structures

are allowed, in which case the transfer byte size must be at

least 3 bits!

In a record structured file EOR and EOF will each be indicated

by a two-byte control code of whatever byte size is used for

the transfer. The first byte of the control code will be all

ones, the escape character. The second byte will have the low

order bit on and zeroes elsewhere for EOR and the second low

order bit on for EOF; that is, the byte will have value 1 for

EOR and value 2 for EOF. EOR and EOF may be indicated together

on the last byte transmitted by turning both low order bits on,

i.e., the value 3. If a byte of all ones was intended to be

sent as data, it should be repeated in the second byte of the

control code.

If the file does not have record structure, the EOF is

indicated by the sending Host closing the data connection and

all bytes are data bytes.

For the purpose of standardized transfer, the sending Host will

translate his internal end of line or end of record denotation into

the representation prescribed by the transfer mode and file

structure, and the receiving Host will perform the inverse

translation to his internal denotation. An IBM 360 record count

field may not be recognized at another Host, so the end of record

information may be transferred as a two byte control code in Stream

mode or as a flagged bit in a Block or Compressed mode descriptor.

End of line in an ASCII or EBCDIC file with no record structure

should be indicated by <CRLF> or <NL>, respectively. Since these

transformations imply extra work for some systems, identical systems

transferring non-record structured text files might wish to use a

binary representation and stream mode for the transfer.

Block

The file is transmitted as a series of data blocks preceded by

one or more header bytes. The header bytes contain a count

field, and descriptor code. The count field indicates the

total length of the data block in bytes, thus marking the

beginning of the next data block (there are no filler bits).

The descriptor code defines: last block in the file (EOF) last

block in the record (EOR), restart marker (see the Section on

Error Recovery and Restart) or suspect data (i.e., the data

16

File Transfer Protocol

(Aug. 12, 1973)

RFC542 NIC 17759

being transferred is suspected of errors and is not reliable).

This last code is NOT intended for error control within FTP.

It is motivated by the desire of sites exchanging certain types

of data (e.g., seismic or weather data) to send and receive all

the data despite local errors (such as "magnetic tape read

errors"), but to indicate in the transmission that certain

portions are suspect). Record structures are allowed in this

mode, and any representation type may be used. There is no

restriction on the transfer byte size.

The header consists of the smallest integral number of bytes

whose length is greater than or equal to 24 bits. Only the

LEAST significant 24 bits (right-justified) of header shall

have information; the remaining most significant bits are

"don't care" bits. Of the 24 bits of header information, the

16 low order bits shall represent byte count, and the 8 high

order bits shall represent descriptor codes as shown below.

Integral number of bytes greater than or equal to 24 bits

--------------------------------------------------------

! Don't care ! Descriptor ! Byte Count !

! 0 to 231 bits ! 8 bits ! 16 bits !

--------------------------------------------------------

The descriptor codes are indicated by bit flags in the

descriptor byte. Four codes have been assigned, where each

code number is the decimal value of the corresponding bit in

the byte.

Code Meaning

128 End of data block is EOR

64 End of data block is EOF

32 Suspected errors in data block

16 Data block is a restart marker

With this encoding more than one descriptor coded condition may

exist for a particular block. As many bits as necessary may be

flagged.

The restart marker is embedded in the data stream as an

integral number of 8-bit bytes representing printable

characters in the language being used over the TELNET

connection (e.g., default--NVT-ASCII). These marker bytes are

right-justified in the smallest integral number of transfer

bytes greater than or equal to 8 bits. For example, if the

17

File Transfer Protocol

(Aug. 12, 1973)

RFC542 NIC 17759

byte size is 7 bits, the restart marker byte would be one byte

right-justified per two 7-bit bytes as shown below:

Two 7-bit bytes

-------------------------

! ! Marker Char !

! ! 8 bits !

-------------------------

If the transfer byte size is 16 or more bits, the maximum

possible number of complete marker bytes should be packed,

right-justified, into each transfer byte. The restart marker

should begin in the first marker byte. If there are any unused

marker bytes, these should be filled with the character <SP>

(Space, in the appropriate language). <SP> must not be used

WITHIN a restart marker. For example, to transmit a

six-character marker with a 36-bit transfer byte size, the

following three 36-bit bytes would be sent:

------------------------------------------

! Don't care !Descriptor! Byte count = 2 !

! 12 bits ! code = 16! !

------------------------------------------

------------------------------------------

! ! Marker ! Marker ! Marker ! Marker !

! ! 8 bits ! 8 bits ! 8 bits ! 8 bits !

------------------------------------------

------------------------------------------

! ! Marker ! Marker ! Space ! Space !

! ! 8 bits ! 8 bits ! 8 bits ! 8 bits !

------------------------------------------

Compressed

The file is transmitted as series of bytes of the size

specified by the BYTE command. There are three kinds of

information to be sent: regular data, sent in a byte string;

compressed data, consisting of replications or filler; and

control information, sent in a two-byte escape sequence. If

the byte size is B bits and n>0 bytes of regular data are sent,

these n bytes are preceded by a byte with the left-most bit set

to 0 and the right-most B-1 bits containing the number n.

18

File Transfer Protocol

(Aug. 12, 1973)

RFC542 NIC 17759

1 B-1 B B

------- ------ ------

Byte string: !0! n ! !d(1)!...!d(n)!

------- ------ ------

^ ^

!---n bytes---!

of data

String of n data bytes d(1),..., d(n)

Count n must be positive

To compress a string of n replications of the data byte d, the

following 2 bytes are sent:

2 B-2 B

--------------- ------

Replicated Byte: ! 1 0 ! n ! ! d !

--------------- ------

A string of n filler bytes can be compressed into a single

byte, where the filler byte varies with the representation

type. If the type is ASCII or EBCDIC the filler byte is <SP>

(Space, ASCII code 32., EBCDIC code 64). If the transfer byte

size is not 8, the expanded byte string should be filled with

8-bit <SP> characters in the manner described in the definition

of ASCII representation type (see the Section on Data

Representation and Storage). If the type is Image or Local

byte the filler is a zero byte.

2 B-2

---------------

Filler String: ! 1 1 ! n !

---------------

The escape sequence is a double byte, the first of which is the

escape byte (all zeroes) and the second of which contains

descriptor codes as defined in Block mode. This implies that

the byte size must be at least 8 bits, which is not much of a

restriction for efficiency in this mode. The descriptor codes

have the same meaning as in Block mode and apply to the

succeeding string of bytes.

Compressed mode is useful for obtaining increased bandwidth on

very large network transmissions at a little extra CPU cost.

It is most efficient when the byte size chosen is that of the

word size of the transmitting Host, and can be most effectively

used to reduce the size of printer files such as those

generated by RJE Hosts.

19

File Transfer Protocol

(Aug. 12, 1973)

RFC542 NIC 17759

ERROR RECOVERY AND RESTART

There is no provision for detecting bits lost or scrambled in data

transfer. This issue is perhaps handled best at the NCP level where

it benefits most users. However, a restart procedure is provided to

protect users from gross system failures (including failures of a

Host, an FTP-process, or the IMP subnet).

The restart procedure is defined only for the block and compressed

modes of data transfer. It requires the sender of data to insert a

special marker code in the data stream with some marker information.

The marker information has meaning only to the sender, but must

consist of printable characters in the default or negotiated language

of the TELNET connection. The marker could represent a bit-count, a

record-count, or any other information by which a system may identify

a data checkpoint. The receiver of data, if it implements the

restart procedure, would then mark the corresponding position of this

marker in the recieving system, and return this information to the

user.

In the event of a system failure, the user can restart the data

transfer by identifying the marker point with the FTP restart

procedure. The following example illustrates the use of the restart

procedure.

The sender of the data inserts an appropriate marker block in the

data stream at a convenient point. The receiving Host marks the

corresponding data point in its file system and conveys the last

known sender and receiver marker information to the user, either

directly or over the TELNET connection in a 251 reply (depending on

who is the sender). In the event of a system failure, the user or

controller process restarts the server at the last server marker by

sending a restart command with server's marker code as its argument.

The restrart command is transmitted over the TELNET connection and is

immediately followed by the command (such as RETR, STOR or LIST)

which was being executed when the system failure occurred.

FILE TRANSFER FUNCTIONS

The communication channel from the user-PI to the server-PI is

established by ICP from the user to a standard server socket. The

user protocol interpreter is responsible for sending FTP commands and

interpreting the replies received; the server-PI interprets commands,

sends replies and directs its DTP to set up the data connection and

transfer the data. If the second party to the data transfer (the

passive transfer process) is the user-DTP then it is governed through

the internal protocol of the user-FTP Host; if it is a second

server-DTP then it is governed by its PI on command from the user-PI.

20

File Transfer Protocol

(Aug. 12, 1973)

RFC542 NIC 17759

FTP COMMANDS

The File Transfer Protocol follows the specifications of the TELNET

protocol for all communications over the TELNET connection - see NIC

#7104. Since, in the future, the language used for TELNET

communication may be a negotiated option, all references in the next

two sections will be to the "TELNET language" and the corresponding

"TELNET end of line code". Currently one may take these to mean

NVT-ASCII and <CRLF>. No other specifications of the TELNET protocol

will be cited.

FTP commands are "TELNET strings" terminated by the "TELNET end of

line code". The command codes themselves are alphabetic characters

terminated by the character <SP> (Space) if parameters follow and

TELNET-EOL otherwise. The command codes and the semantics of

commands are described in this section; the detailed syntax of

commands is specified in the Section on Commands, the reply sequences

are discussed in the Section on Sequencing of Commands and Replies,

and scenarios illustrating the use of commands are provided in the

Section on Typical FTP Scenarios.

FTP commands may be partitioned as those specifying access-control

identifiers, data transfer parameters, or FTP service requests.

Certain commands (such as ABOR, STAT, BYE) may be sent over the

TELNET connections while a data transfer is in progress. Some

servers may not be able to monitor the TELNET and data connections

simultaneously, in which case some special action will be necessary

to get the server's attention. The exact form of the "special

action" is related to decisions currently under review by the TELNET

committee; but the following ordered format is tentatively

recommended:

1. User system inserts the TELNET "Interrupt Process" (IP) signal

in the TELNET stream.

2. User system sends the TELNET "Synch" signal

3. User system inserts the command (e.g., ABOR) in the TELNET

stream.

4. Server PI,, after receiving "IP", scans the TELNET stream for

EXACTLY ONE FTP command.

(For other servers this may not be necessary but the actions listed

above should have no unusual effect.)

21

File Transfer Protocol

(Aug. 12, 1973)

RFC542 NIC 17759

ACCESS CONTROL COMMANDS

The following commands specify access control identifiers (command

codes are shown in parentheses).

USER NAME (USER)

The argument field is a TELNET string identifying the user.

The user identification is that which is required by the server

for access to its file system. This command will normally be

the first command transmitted by the user after the TELNET

connections are made (some servers may require this).

Additional identification information in the form of a password

and/or an account command may also be required by some servers.

Servers may allow a new USER command to be entered at any point

in order to change the access control and/or accounting

information. This has the effect of flushing any user,

password, and account information already supplied and

beginning the login sequence again. All transfer parameters

are unchanged and any file transfer in progress is completed

under the old acccount.

PASSWORD (PASS)

The argument field is a TELNET string identifying the user's

password. This command must be immediately preceded by the

user name command, and, for some sites, completes the user's

identification for access control. Since password information

is quite sensitive, it is desirable in general to "mask" it or

suppress typeout. It appears that the server has no foolproof

way to achieve this. It is therefore the responsibility of the

user-FTP process to hide the sensitive password information.

ACCOUNT (ACCT)

The argument field is a TELNET string identifying the user's

account. The command is not necessarily related to the USER

command, as some sites may require an account for login and

others only for specific access, such as storing files. In the

latter case the command may arrive at any time. There are two

reply codes to differentiate these cases for the automaton:

when account information is required for login, the response to

a successful PASSword command is reply code 331; then if a

command other than ACCounT is sent, the server may remember it

and return a 331 reply, prepared to act on the command after

the account information is received; or he may flush the

command and return a 433 reply aSKINg for the account. On the

other hand, if account information is NOT required for login,

the reply to a successful PASSword command is 230; and if the

22

File Transfer Protocol

(Aug. 12, 1973)

RFC542 NIC 17759

information is needed for a command issued later in the

dialogue, the server should return a 331 or 433 reply depending

on whether he stores (pending receipt of the ACCounT command)

or discards the command, respectively.

REINITIALIZE (REIN)

This command terminates a USER, flushing all I/O and account

information, except to allow any transfer in progress to be

completed. All parameters are reset to the default settings

and the TELNET connection is left open. This is identical to

the state in which a user finds himself immediately after the

ICP is completed and the TELNET connections are opened. A USER

command may be expected to follow.

LOGOUT (BYE)

This command terminates a USER and if file transfer is not in

progress, the server closes the TELNET connection. If file

transfer is in progress, the connection will remain open for

result response and the server will then close it. If the

user-process is transferring files for several USERs but does

not wish to close and then reopen connections for each, then

the REIN command should be used instead of BYE.

An unexpected close on the TELNET connection will cause the

server to take the effective action of an abort (ABOR) and a

logout (BYE).

TRANSFER PARAMETER COMMANDS

All data transfer parameters have default values, and the commands

specifying data transfer parameters are required only if the default

parameter values are to be changed. The default value is the last

specified value, or if no value has been specified, the standard

default value as stated here. This implies that the server must

"remember" the applicable default values. The commands may be in any

order except that they must precede the FTP service request. The

following commands specify data transfer parameters.

BYTE SIZE (BYTE)

The argument is a decimal integer (1 through 255) specifying

the byte size for the data connection. The default byte size

is 8 bits. A server may reject certain byte sizes that he has

not implemented.

23

File Transfer Protocol

(Aug. 12, 1973)

RFC542 NIC 17759

DATA SOCKET (SOCK)

The argument is a HOST-SOCKET specification for the data socket

to be used in data connection. There may be two data sockets,

one for transfer from the "active" DTP to the "passive" DTP and

one for "passive" to "active". An odd socket number defines a

send socket and an even socket number defines a receive socket.

The default HOST is the user Host to which TELNET connections

are made. The default data sockets are (U+4) and (U+5) where U

is the socket number used in the TELNET ICP and the TELNET

connections are on sockets (U+2) and (U+3). The server has

fixed data sockets (S+2) and (S+3) as well, and under normal

circimstances this command and its reply are not needed.

PASSIVE (PASV)

This command requests the server-DTP to "listen" on both of his

data sockets and to wait for an RFCto arrive for one socket

rather than initiate one upon receipt of a transfer command.

It is assumed the server has already received a SOCK command to

indicate the foreign socket from which the RFCwill arrive to

ensure the security of the transfer.

REPRESENTATION TYPE (TYPE)

The argument specifies the representation type as described in

the Section on Data Representation and Storage. Several types

take a second parameter. The first parameter is denoted by a

single TELNET character, as is the second Format parameter for

ASCII and EBCDIC; the second parameter for local byte is a

decimal integer to indicate Bytesize. The parameters are

separated by a <SP> (Space, ASCII code 32.). The following

codes are assigned for type:

\ /

A - ASCII ! ! N - Non-print

!-><-! T - TELNET format effectors

E - EBCDIC! ! C - Carriage Control (ASA)

/ I - Image

L # - Local byte Bytesize

The default representation type is ASCII Non-print. If the

Format parameter is changed, and later just the first argument

is changed, Format then returns to the Non-print default.

24

File Transfer Protocol

(Aug. 12, 1973)

RFC542 NIC 17759

FILE STRUCTURE (STRU)

The argument is a single TELNET character code specifying file

structure described in the Section on Data Representation and

Storage. The following codes are assigned for structure:

F - File (no record structure)

R - Record structure

The default structure is File (i.e., no records).

TRANSFER MODE (MODE)

The argument is a single TELNET character code specifying the

data transfer modes described in the Section on Transmission

Modes. The following codes are assigned for transfer modes:

S - Stream

B - Block

C - Compressed

The default transfer mode is Stream.

FTP SERVICE COMMANDS

The FTP service commands define the file transfer or the file system

function requested by the user. The argument of an FTP service

command will normally be a pathname. The syntax of pathnames must

conform to server site conventions (with standard defaults

applicable), and the language conventions of the TELNET connection.

The suggested default handling is to use the last specified device,

directory or file name, or the standard default defined for local

users. The commands may be in any order except that a "rename from"

command must be followed by a "rename to" command and the restart

command must be followed by the interrupted service command. The

data, when transferred in response to FTP service commands, shall

always be sent over the data connection, except for certain

informative replies. The following commands specify FTP service

requests:

RETRIEVE (RETR)

This command causes the server-DTP to transfer a copy of the

file, specified in the pathname, to the server- or user-DTP at

the other end of the data connection. The status and contents

of the file at the server site shall be unaffected.

25

File Transfer Protocol

(Aug. 12, 1973)

RFC542 NIC 17759

STORE (STOR)

This command causes the server-DTP to accept the data

transferred via the data connection and to store the data as a

file at the server site. If the file specified in the pathname

exists at the server site then its contents shall be replaced

by the data being transferred. A new file is created at the

server site if the file specified in the pathname does not

already exist.

APPEND (with create) (APPE)

This command causes the server-DTP to accept the data

transferred via the data connection and to store the data in a

file at the server site. If the file specified in the pathname

exists at the server site, then the data shall be appended to

that file; otherwise the file specified in the pathname shall

be created at the server site.

ALLOCATE (ALLO)

This command may be required by some servers to reserve

sufficient storage to accommodate the new file to be

transferred. The argument shall be a decimal integer

representing the number of bytes (using the logical byte size)

of storage to be reserved for the file. For files sent with

record structure a maximum record size (in logical bytes) might

also be necessary; this is indicated by a decimal integer in a

second argument field of the command. This second argument is

optional, but when present should be separated from the first

by the three TELNET characters <SP> R <SP>. This command shall

be followed by a STORe or APPEnd command. The ALLO command

should be treated as a NOOP (no operation) by those servers

which do not require that the maximum size of the file be

declared beforehand, and those servers interested in only the

maximum record size should accept a dummy value in the first

argument and ignore it.

RESTART (REST)

The argument field represents the server marker at which file

transfer is to be restarted. This command does not cause file

transfer but "spaces" over the file to the specified data

checkpoint. This command shall be immediately followed by the

appropriate FTP service command which shall cause file transfer

to resume.

26

File Transfer Protocol

(Aug. 12, 1973)

RFC542 NIC 17759

RENAME FROM (RNFR)

This command specifies the file which is to be renamed. This

command must be immediately followed by a "rename to" command

specifying the new file pathname.

RENAME TO (RNTO)

This command specifies the new pathname of the file specified

in the immediately preceding "rename from" command. Together

the two commands cause a file to be renamed.

ABORT (ABOR)

This command indicates to the server to abort the previous FTP

service command and any associated transfer of data. The abort

command may require "special action", as discussed in the

Section on FTP Commands, to force recognition by the server.

No action is to be taken if the previous command has been

completed (including data transfer). The TELNET connections

are not to be closed by the server, but the data connection

must be closed. An appropriate reply should be sent by the

server in all cases.

DELETE (DELE)

This command causes the file specified in the pathname to be

deleted at the server site. If an extra level of protection is

desired (such as the query, "DO you really wish to delete?"),

it should be provided by the user-FTP process.

LIST (LIST)

This command causes a list to be sent from the server to the

passive DTP. If the pathname specifies a directory, the server

should transfer a list of files in the specified directory. If

the pathname specifies a file then the server should send

current information on the file. A null argument implies the

user's current working or default directory. The data transfer

is over the data connection in type ASCII or type EBCDIC. (The

user must ensure that the TYPE is appropriately ASCII or

EBCDIC).

NAME-LIST (NLST)

This command causes a directory listing to be sent from server

to user site. The pathname should specify a directory or other

system-specific file group descriptor; a null argument implies

the current directory. The server will return a stream of

27

File Transfer Protocol

(Aug. 12, 1973)

RFC542 NIC 17759

names of files and no other information. The data will be

transferred in ASCII or EBCDIC type over the data connection as

valid pathname strings separated by <CRLF> or <NL>. (Again the

user must ensure that the TYPE is correct.)

SITE PARAMETERS (SITE)

This command is used by the server to provide services specific

to his system that are essential to file transfer but not

sufficiently universal to be included as commands in the

protocol. The nature of these services and the specification

of their syntax can be stated in a reply to the HELP SITE

command.

STATUS (STAT)

This command shall cause a status response to be sent over the

TELNET connection in the form of a reply. The command may be

sent during a file transfer (along with the TELNET IP and Synch

signals--see the Section on FTP Commands) in which case the

server will respond with the status of the operation in

progress, or it may be sent between file transfers. In the

latter case the command may have an argument field. If the

argument is a pathname, the command is analogous to the "list"

command except that data shall be trasferred over the TELNET

connection. If a partial pathname is given, the server may

respond with a list of file names or attributes associated with

that specification. If no argument is given, the server should

return general status information about the server FTP process.

This should include current values of all transfer parameters

and the status of connections.

HELP (HELP)

This command shall cause the server to send helpful information

regarding its implementation status over the TELNET connection

to the user. The command may take an argument (e.g., any

command name) and return more specific information as a

response. The reply is type Oxx, general system status. It is

suggested that HELP be allowed before entering a USER command.

The server may use this reply to specify site-dependent

parameters, e.g., in response to HELP SITE.

NOOP (NOOP)

This command does not affect any parameters or previously

entered commands. It specifies no action other than that the

server send a 200 reply.

28

File Transfer Protocol

(Aug. 12, 1973)

RFC542 NIC 17759

MISCELLANEOUS COMMANDS

There are several functions that utilize the services of file

transfer but go beyond it in scope. These are the Mail and Remote

Job Entry functions. It is suggested that these become auxiliary

protocols that can assume recognition of file transfer commands on

the part of the server, i.e., they may depend on the core of FTP

commands. The command sets specific to Mail and RJE will be given in

separate documents.

Commands that are closely related to file transfer but not proven

essential to the protocol may be implemented by servers on an

experimental basis. The command name should begin with an X and may

be listed in the HELP command. The official command set is

expandable from these experiments; all experimental commands or

proposals for expanding the official command set should be announced

via RFC. An example of a current experimental command is:

Change Working Directory (XCWD)

This command allows the user to work with a different directory

or dataset for file storage or retrieval without altering his

login or accounting information. Transfer parameters are

similarly unchanged. The argument is a pathname specifying a

directory or other system dependent file group designator.

FTP REPLIES

The server sends FTP replies over the TELNET connection in response

to user FTP commands. The FTP replies constitute the acknowledgment

or completion code (including errors). The FTP-server replies are

formatted for human or program interpretation. Single line replies

consist of a leading three-digit numeric code followed by a space,

followed by a one-line text explanation of the code. For replies

that contain several lines of text, the first line will have a

leading three-digit numeric code followed immediately by the

character "-" (Hyphen, ASCII code 45), and possibly some text. All

succeeding continuation lines except the last are constrained NOT to

begin with three digits; the last line must repeat the numeric code

of the first line and be followed immediately by a space. For

example:

100-First Line

Continuation Line

Another Line

100 Last Line

It is possible to nest (but not overlap) a reply withiin a multi-line

29

File Transfer Protocol

(Aug. 12, 1973)

RFC542 NIC 17759

reply. The same format for matched number-coded first and last lines

holds.

The numeric codes are assigned by groups and for ease of

interpretation by programs in a manner consistent with other

protocols such as the RJE protocol. The three digits of the code are

to be interpreted as follows:

1. The first digit specifies type of response as indicated below:

0xx These replies are purely informative and constitute

neither a positive nor a negative acknowledgment.

1xx Informative replies to status inquiries. These constitute

a positive acknowledgment to the status command.

2xx Positive acknowledgment of previous command or other

successful action.

3xx Incomplete information. Activity cannot proceed without

further specification and input.

4xx Unsuccessful reply. The request is correctly specified

but the server is unsuccessful in correctly fulfilling it.

5xx Incorrect or illegal command. The command or its

parameters were invalid or incomplete from a syntactic

viewpoint, or the command is inconsistent with a previous

command. The command in question has been completely

ignored.

6xx-9xx Reserved for future expansion.

2. The second digit specifies the general category to which the

response refers:

x00-x29 General purpose replies, not assignable to other

categories.

x3x Primary access. Informative replies to the "log-on"

attempt.

x4x Secondary access. The primary server is commenting on its

ability to access a secondary service.

x5x FTP results.

x6x RJE results.

30

File Transfer Protocol

(Aug. 12, 1973)

RFC542 NIC 17759

x7x Mail Portocol results.

x8x-x9x Reserved for future expansion.

3. The final digit specifies a particular message type. Since the

code is designed for an automaton process to interpret, it is

not necessary for every variation of a reply to have a unique

number. Only the basic meaning of replies need have unique

numbers. The text of a reply can explain the specific reason

for that reply to a human user.

Each TELNET line delimited by a numeric code and the TELNET EOL (or

group of text lines bounded by coded lines) that is sent by the

server is intended to be a complete reply message. It should be noted

that the text of replies is intended for a human user. Only the reply

codes and in some instances the first line of text are intended for

programs.

The assigned reply codes relating to FTP are:

000 Announcing FTP.

010 Message from system operator.

020 Exected delay.

030 Server availability information.

050 FTP commentary or user information.

100 System status reply.

110 System busy doing...

150 File status reply.

151 Directory listing reply.

200 Last command received correctly.

201 An ABORT has terminated activity, as requested.

202 Abort request ignored, no activity in progress.

230 User is "logged in". May proceed.

231 User is "logged out". Service terminated.

232 Logout command noted, will complete when transfer done.

233 User is "logged out". Parameters reinitialized.

250 FTP file transfer started correctly.

251 FTP Restart-marker reply.

Text is: MARK yyyy = mmmm

where 'yyyy' is user's data stream marker (yours)

and mmmm is server's equivalent marker (mine)

(Note the spaces between the markers and '=').

252 FTP transfer completed correctly.

253 Rename completed.

254 Delete completed.

257 Closing the data connection, transfer completed.

300 Connection greeting message, awaiting input.

301 Current command incomplete (no <CRLF> for long time).

330 Enter password.

31

File Transfer Protocol

(Aug. 12, 1973)

RFC542 NIC 17759

331 Enter account (if account required as part of login sequence).

332 Login first, please.

400 This service not implemented.

401 This service not accepting users now, goodbye.

402 Command not implemented for requested value or action.

430 Log-on time or tries exceeded, goodbye.

431 Log-on unsuccessful. User and/or password invalid.

432 User not valid for this service.

433 Cannot transfer files without valid account. Enter account and

resend command.

434 Log-out forced by operator action. Phone site.

435 Log-out forced by system problem.

436 Service shutting down, goodbye.

450 FTP: File not found.

451 FTP: File access denied to you.

452 FTP: File transfer incomplete, data connection closed.

453 FTP: File transfer incomplete, insufficient storage space.

454 FTP: Cannot connect to your data socket.

455 FTP: File system error not covered by other reply codes.

456 FTP: Name duplication; rename failed.

457 FTP: Transfer parameters in error.

500 Last command line completely unrecognized.

501 Syntax of last command is incorrect.

502 Last command incomplete, parameters missing.

503 Last command invalid (ignored), illegal parameter combination.

504 Last command invalid, action not possible at this time.

505 Last command conflicts illegally with previous command(s).

506 Last command not implemented by the server.

507 Catchall error reply.

550 Bad pathname specification (e.g., syntax error).

32

File Transfer Protocol

(Aug. 12, 1973)

RFC542 NIC 17759

DECLARATIVE SPECIFICATIONS

MINIMUM IMPLEMENTATION

In order to make FTP workable without needless error messages, the

following minimum implementation is required for servers:

TYPE - ASCII Non-print

MODE - Stream

STRUCTURE - File

Record

BYTE - 8

COMMANDS - USER, BYE, SOCK,

TYPE, BYTE, MODE, STRU,

for the default values

RETR, STOR,

NOOP.

The initial default values for transfer parameters are:

TYPE - ASCII Non-print

BYTE - 8

MODE - Stream

STRU - File

All Hosts must accept the above as the standard defaults.

CONNECTIONS

The server protocol interpreter shall "listen" on Socket 3. The user

or user protocol interpreter shall initiate the full-duplex TELNET

connections performing the ARPANET standard initial connection

protocol (ICP) to server Socket 3. Server- and user- processes

should follow the conventions of the TELNET protocol as specified in

NIC #7104. Servers are under no obligation to provide for editing of

command lines and may specify that it be done in the user Host. The

TELNET connections shall be closed by the server at the user's

request after all transfers and replies are completed.

The user-DTP must "listen" on the specified data sockets (send and/or

receive); these may be the default user sockets (U+4) and (U+5) or a

socket specified in the SOCK command. The server shall initiate the

data connection from his own fixed sockets (S+2) and (S+3) using the

specified user data socket and byte size (default - 8 bits). The

33

File Transfer Protocol

(Aug. 12, 1973)

RFC542 NIC 17759

direction of the transfer and the sockets used will be determined by

the FTP service command.

When data is to be transferred between two servers, A and B (refer to

Figure 2), the user-PI, C, sets up TELNET connections with both

server-PI's. He then sends A's fixed sockets, S(A), to B in a SOCK

command and B's to A; replies are returned. One of the servers, say

A, is then sent a PASV command telling him to "listen" on his data

sockets rather than initiate an RFCwhen he receives a transfer

service command. When the user-PI receives an acknowledgment to the

PASV command, he may send (in either order) the corresponding service

commands to A and B. Server B initiates the RFCand the transfer

proceeds. The command-reply sequence is listed below where the

messages are vertically synchronous but horizontally asynchronous:

User-PI - Server A User-PI - Server B

------------------ ------------------

C->A : ICP C->B : ICP

C->A : SOCK HOST-B, SKT-S(B) C->B : SOCK HOST-A, SKT-S(A)

A->C : 200 Okay B->C : 200 Okay

C->A : PASV

A->C : 200 Okay

C->A : STOR C->B : RETR

The data connection shall be closed by the server under the

conditions described in the Section on Establishing Data Connections.

If the server wishes to close the connection after a transfer where

it is not required, he should do so immediately after the file

transfer is completed. He should not wait until after a new transfer

command is received because the user-process will have already tested

the data connection to see if it needs to do a "listen"; (recall that

the user must "listen" on a closed data socket BEFORE sending the

transfer request). To prevent a race condition here, the server

sends a secondary reply (257) after closing the data connection (or

if the connection is left open, a "file transfer completed" reply

(252) and the user-PI should wait for one of these replies before

issuing a new transfer command.

COMMANDS

The commands are TELNET character string transmitted over the TELNET

connections as described in the Section on FTP Commands. The command

functions and semantics are described in the Section on Access

Control Commands, Transfer Parameter Commands, FTP Service Commands,

and Miscellaneous Commands. The command syntax is specified here.

The commands begin with a command code followed by an argument field.

34

File Transfer Protocol

(Aug. 12, 1973)

RFC542 NIC 17759

The command codes are four or fewer alphabetic characters. Upper and

lower case alphabetic characters are to be treated identically. Thus

any of the following may represent the retrieve command:

RETR Retr retr ReTr rETr

This also applies to any symbols representing parameter values, such

as A or a for ASCII TYPE. The command codes and the argument fields

are separated by one or more spaces.

The argument field consists of a variable length character string

ending with the character sequence <CRLF> (Carriage Return, Linefeed)

for NVT-ASCII representation; for other negotiated languages a

different end of line character might be used. It should be noted

that the server is to take NO action until the end of line code is

received.

The syntax is specified below in NVT-ASCII. All characters in the

argument field are ASCII characters including any ASCII represented

decimal integers. Square brackets denote an optional argument field.

If the option is not taken, the appropriate default is implied.

The following are all the currently defined FTP commmands:

USER <SP> <username> <CRLF>

PASS <SP> <password> <CRLF>

ACCT <SP> <acctno> <CRLF>

REIN <CRLF>

BYE <CRLF>

BYTE <SP> <byte size> <CRLF>

SOCK <SP> <Host-socket> <CRLF>

PASV <CRLF>

TYPE <SP> <type code> <CRLF>

STRU <SP> <structure code> <CRLF>

MODE <SP> <mode code> <CRLF>

RETR <SP> <pathname> <CRLF>

STOR <SP> <pathname> <CRLF>

APPE <SP> <pathname> <CRLF>

ALLO <SP> <decimal integer> [<SP> R <SP> <decimal integer>] <CRLF>

REST <SP> <marker> <CRLF>

RNFR <SP> <pathname> <CRLF>

RNTO <SP> <pathname> <CRLF>

ABOR <CRLF>

DELE <SP> <pathname> <CRLF>

LIST [<SP> <pathname>] <CRLF>

NLST [<SP> <pathname>] <CRLF>

SITE <SP> <string> <CRLF>

STAT [<SP> <pathname>] <CRLF>

HELP [<SP> <string>] <CRLF>

35

File Transfer Protocol

(Aug. 12, 1973)

RFC542 NIC 17759

NOOP <CRLF>

The syntax of the above argument fields (using BNF notation where

applicable ) is:

<username> ::= <string>

<password> ::= <string>

<acctno> ::= <string>

<string> ::= <char><char><string>

<char> ::= any of the 128 ASCII characters except <CR> and <LF>

<marker> ::= <pr string>

<pr string> ::= <pr char><pr char><pr string>

<pr char> ::= any ASCII code 33. through 126., printable

characters

<byte size> ::= any decimal integer 1 through 255

<Host-socket> ::= <socket><Host number>, <socket>

<Host-number> ::= a decimal integer specifying an ARPANET Host.

<socket> ::= decimal integer between 0 and (2**32)-1

<form code> ::= NTC

<type code> ::= A[<SP> <form code>]E [SP> <form code>]I

L <SP> <byte size>

<structure code> ::= FR

<mode code> ::= SBC

<pathname> ::= <string>

SEQUENCING OF COMMANDS AND REPLIES

The communication between the user and server is intended to be an

alternating dialogue. As such, the user issues an FTP command and

the server responds with a prompt primary reply. The user should

wait for this initial primary success or failure response before

sending further commands.

Certain commands require a second reply for which the user should

also wait. These replies may, for example, report on the progress or

completion of file transfer or the closing of the data connection.

They are secondary replies to file transfer commands.

The third class of replies are informational and spontaneous replies

which may arrive at any time. The user-PI should be prepared to

receive them. These replies are listed below as sponteneous.

One important group of spontaneous replies is the connection

greetings. Under normal circumstances, a server will send a 300

reply, "awaiting input", when the ICP is completed. The user should

wait for this greeting message before sending any commands. If the

server is unable to accept input right away, he should send a 000

"announcing FTP" or a 020 "expected delay" reply immediately and a

36

File Transfer Protocol

(Aug. 12, 1973)

RFC542 NIC 17759

300 reply when ready. The user will then know not to hang up if

there is a delay.

The table below lists alternative success and failure replies for

each command. These must be strictly adhered to; a server may

substitute text in the replies, but the meaning and action implied by

the code numbers and by the specific command reply sequence cannot be

altered.

COMMAND-REPLY CORRESPONDENCE TABLE

COMMAND SUCCESS FAILURE

USER 230,330 430-432,500-505,507

PASS 230,330 430-432,500-507

ACCT 230 430-432,500-507

REIN 232,233 401,436,500-507

Secondary Reply 300

BYE 231,232 500-505,507

BYTE 200,331 402,500-505,507

SOCK 200,331 500-505,507

PASV 200,331 500-507

TYPE 200,331 402,500-505,507

STRU 200,331 500-505,507

MODE 200,331 402,500-505,507

RETR 250 402,433,450,451,454,455,457,

500-505,507,550

Secondary Reply 252,257 452

STOR 250 402,433,451,454,455,457,

500-505,507,550

Secondary Reply 252,257 452,453

APPE 250 402,433,451,454,455,457,500-507,

550

Secondary Reply 252,257 452,453

ALLO 200,331 402,500-507

REST 200,331 500-507

RNFR 200 402,433,450,451,455,500-507,550

RNTO 253 402,433,450,451,455,456,500-507,

550

ABOR 201,202,331 500-507

DELE 254 402,433,450,451,455,500-507,550

LIST 250 402,433,450,451,454,455,457,

500-507,550

Secondary Reply 252,257 452

NLST 250 402,433,450,451,454,455,457,

500-507,550

Secondary Reply 252,257 452

SITE 200,331 402,500-507

37

File Transfer Protocol

(Aug. 12, 1973)

RFC542 NIC 17759

STAT 100,110, 450,451,455,500-507,550

150,151,331

HELP 030,050 500-507

NOOP 200 500-505,507

Spontaneous Replies 000,010,020, 400,401,434-436

300,301,251,255

TYPICAL FTP SCENARIOS

TIP User wanting to transfer file from Host X to local printer:

1. TIP user opens TELNET connections by ICP to Host X socket 3.

2. The following commands and replies are exchanged:

TIP HOST X

<---------- 300 Awaiting input <CRLF>

USER username <CRLF> ---------->

<---------- 330 Enter Password <CRLF>

PASS password <CRLF> ---------->

<---------- 230 User logged in <CRLF>

SOCK 65538 <CRLF> ---------->

<---------- 200 Commmand received OK<CRLF>

RETR this.file <CRLF> ---------->

(Host X initiates data connection to TIP socket 65538,

i.e., PORT 1 receive)

<---------- 250 File transfer started <CRLF>

<---------- 252 File transfer completed <CRLF>

BYE<CRLF> ---------->

<---------- 231 User logged out <CRLF>

3. Host X closes the TELNET and data connections.

Note: The TIP user should be in line mode.

User at Host U wanting to transfer files to/from Host S:

In general the user will communicate to the server via a mediating

user-FTP process. The following may be a typical scenario. The

user-FTP prompts are shown in parentheses, '---->' represents

commands from Host U to Host S, and '<----' represents replies from

Host S to Host U.

38

File Transfer Protocol

(Aug. 12, 1973)

RFC542 NIC 17759

LOCAL COMMANDS BY USER ACTION INVOLVED

ftp (host) multics<CR> ICP to Host S, socket 3,

establishing TELNET connections

<---- 330 Awaiting input <CRLF>

username Doe <CR> USER Doe<CRLF>---->

<---- 330 password<CRLF>

password mumble <CR> PASS mumble<CRLF>---->

<---- 230 Doe logged in.<CRLF>

retrieve (local type) ASCII<CR>

(local pathname) test 1 <CR> User-FTP opens local file in ASCII.

(for.pathname) testp11<CR> RETR test.p11<CRLF> ---->

Server makes data connection to

(U+4)

<---- 250 File transfer starts

<CRLF>

<---- 252 File transfer

complete<CRLF>

type Image<CR> TYPE I<CRLF> ---->

<---- 200 Command OK<CRLF>

byte 36<CR> BYTE 36<CR>LF ---->

<---- 200 Command OK<CRLF>

store (local type) image<CR>

(local pathname) file dump<CR> User-FTP opens local file in Image.

(for.pathname) >udd>cn>fd<CR> STOR >udd>cn>fd<CRLF> ---->

<---- 451 Access denied<CRLF>

terminate BYE <CRLF> ---->

Server closes all connections.

 
 
 
免责声明:本文为网络用户发布,其观点仅代表作者个人观点,与本站无关,本站仅提供信息存储服务。文中陈述内容未经本站证实,其真实性、完整性、及时性本站不作任何保证或承诺,请读者仅作参考,并请自行核实相关内容。
2023年上半年GDP全球前十五强
 百态   2023-10-24
美众议院议长启动对拜登的弹劾调查
 百态   2023-09-13
上海、济南、武汉等多地出现不明坠落物
 探索   2023-09-06
印度或要将国名改为“巴拉特”
 百态   2023-09-06
男子为女友送行,买票不登机被捕
 百态   2023-08-20
手机地震预警功能怎么开?
 干货   2023-08-06
女子4年卖2套房花700多万做美容:不但没变美脸,面部还出现变形
 百态   2023-08-04
住户一楼被水淹 还冲来8头猪
 百态   2023-07-31
女子体内爬出大量瓜子状活虫
 百态   2023-07-25
地球连续35年收到神秘规律性信号,网友:不要回答!
 探索   2023-07-21
全球镓价格本周大涨27%
 探索   2023-07-09
钱都流向了那些不缺钱的人,苦都留给了能吃苦的人
 探索   2023-07-02
倩女手游刀客魅者强控制(强混乱强眩晕强睡眠)和对应控制抗性的关系
 百态   2020-08-20
美国5月9日最新疫情:美国确诊人数突破131万
 百态   2020-05-09
荷兰政府宣布将集体辞职
 干货   2020-04-30
倩女幽魂手游师徒任务情义春秋猜成语答案逍遥观:鹏程万里
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案神机营:射石饮羽
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案昆仑山:拔刀相助
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案天工阁:鬼斧神工
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案丝路古道:单枪匹马
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案镇郊荒野:与虎谋皮
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案镇郊荒野:李代桃僵
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案镇郊荒野:指鹿为马
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案金陵:小鸟依人
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案金陵:千金买邻
 干货   2019-11-12
 
推荐阅读
 
 
 
>>返回首頁<<
 
靜靜地坐在廢墟上,四周的荒凉一望無際,忽然覺得,淒涼也很美
© 2005- 王朝網路 版權所有