(评论)
(comments)
原始链接: https://news.ycombinator.com/item?id=39313170
作者重点介绍了与 TCP 端口相关的各个技术方面,包括获取端口分配的历史以及名为互联网号码分配机构 (IANA) 的注册机构的存在,该机构负责维护众所周知的端口号和相应服务名称的全球注册。 此外,作者提到,曾经有一个名为“Who's Who”的官方登记册,但其档案库现在以可下载的 PDF 文件形式存在,突出显示了互联网基础设施如何随着时间的推移而发展。 另一个技术方面涉及 DNS 区域文件的创建和维护,特别是涉及使用 DNSSEC 或 NSEC 创建自定义 BIND 区域,需要正确的创建和备份方法。 此外,作者认为,某些协议和应用程序需要使用专用IP地址和关联端口,导致资源管理的复杂性和挑战增加,特别是在NAT穿越和DNS解析方面。 因此,分配任意端口可能会导致冲突场景和潜在的不稳定问题,从而影响应用程序性能和可用性。 最后,作者反思了 IANA 的角色和责任,并对获取端口分配提出了建议,指出从 IANA 接收端口分配实际上是不可能的,这与注册域或分配 IP 范围不同,后者需要遵守既定的程序、规范和文件要求。 总体而言,这些技术方面强调了互联网通信技术的演进和成熟,反映了通信模式、协议设计原则和操作实践的变化,并强调了社区参与和参与塑造技术发展路径的重要性。
As I have written here previously¹, that’s actually a bit of revisionist history, or at least a significant omission. Speaking as someone who was actually using Unix systems when this happened, the "ssh" command was replacing the rsh command, and also still ships an "slogin" command, replacing rsh’s companion command, "rlogin" (and "scp" replaced "rcp"). Where I was, nobody was even using telnet or FTP internally; everybody was using rsh, rlogin and rcp! This also better explains the naming; going from "rsh" to "ssh" is easier.
If someone had wanted to make telnet encrypted, they would just have had to implement the standard telnet protocol and add another option in the protocol; it has a bunch already, and even one for encryption, IIRC.
1. https://news.ycombinator.com/item?id=14178333>
reply