Ejabberd Installation and Operation Guide

Total Page:16

File Type:pdf, Size:1020Kb

Ejabberd Installation and Operation Guide ejabberd 15.03 Installation and Operation Guide ejabberd Development Team 2 Contents 1 Introduction 9 1.1 Key Features...................................... 10 1.2 Additional Features.................................. 11 2 Installing ejabberd 13 2.1 Installing ejabberd with Binary Installer...................... 13 2.2 Installing ejabberd with Operating System Specific Packages........... 14 2.3 Installing ejabberd with CEAN........................... 14 2.4 Installing ejabberd from Source Code........................ 15 2.4.1 Requirements.................................. 15 2.4.2 Download Source Code............................ 15 2.4.3 Compile..................................... 16 2.4.4 Install...................................... 17 2.4.5 Start....................................... 17 2.4.6 Specific Notes for BSD............................. 18 2.4.7 Specific Notes for Sun Solaris......................... 18 2.4.8 Specific Notes for Microsoft Windows.................... 19 2.5 Create an XMPP Account for Administration.................... 20 2.6 Upgrading ejabberd .................................. 21 3 4 Contents 3 Configuring ejabberd 23 3.1 Basic Configuration.................................. 23 3.1.1 Legacy Configuration File........................... 24 3.1.2 Host Names................................... 24 3.1.3 Virtual Hosting................................. 25 3.1.4 Listening Ports................................. 27 3.1.5 Authentication................................. 38 3.1.6 Access Rules.................................. 43 3.1.7 Shapers..................................... 47 3.1.8 Default Language................................ 48 3.1.9 CAPTCHA................................... 48 3.1.10 STUN and TURN............................... 49 3.1.11 SIP....................................... 51 3.1.12 Include Additional Configuration Files.................... 52 3.1.13 Option Macros in Configuration File..................... 54 3.2 Database and LDAP Configuration.......................... 55 3.2.1 ODBC...................................... 56 3.2.2 LDAP...................................... 57 3.2.3 Riak....................................... 62 3.3 Modules Configuration................................. 64 3.3.1 Modules Overview............................... 64 3.3.2 Common Options................................ 66 3.3.3 mod announce .................................. 67 3.3.4 mod client state ............................... 69 3.3.5 mod disco .................................... 69 3.3.6 mod echo .................................... 71 3.3.7 mod fail2ban .................................. 72 3.3.8 mod http bind ................................. 72 CONTENTS 5 3.3.9 mod http fileserver ............................. 73 3.3.10 mod irc ..................................... 75 3.3.11 mod last .................................... 76 3.3.12 mod muc ..................................... 77 3.3.13 mod muc log .................................. 82 3.3.14 mod offline .................................. 84 3.3.15 mod ping .................................... 85 3.3.16 mod pres counter ............................... 86 3.3.17 mod privacy .................................. 86 3.3.18 mod private .................................. 87 3.3.19 mod proxy65 .................................. 88 3.3.20 mod pubsub ................................... 89 3.3.21 mod register .................................. 91 3.3.22 mod register web ............................... 94 3.3.23 mod roster ................................... 95 3.3.24 mod service log ................................ 96 3.3.25 mod shared roster .............................. 97 3.3.26 mod shared roster ldap ........................... 98 3.3.27 mod sic ..................................... 105 3.3.28 mod sip ..................................... 105 3.3.29 mod stats .................................... 107 3.3.30 mod time .................................... 107 3.3.31 mod vcard .................................... 108 3.3.32 mod vcard ldap ................................ 109 3.3.33 mod vcard xupdate .............................. 112 3.3.34 mod version .................................. 113 6 Contents 4 Managing an ejabberd Server 115 4.1 ejabberdctl ...................................... 115 4.1.1 ejabberdctl Commands............................ 115 4.1.2 Erlang Runtime System............................ 116 4.2 ejabberd Commands................................. 118 4.2.1 List of ejabberd Commands.......................... 118 4.2.2 Restrict Execution with AccessCommands.................. 120 4.3 Web Admin....................................... 122 4.4 Ad-hoc Commands................................... 124 4.5 Change Computer Hostname............................. 124 5 Securing ejabberd 127 5.1 Firewall Settings.................................... 127 5.2 epmd........................................... 127 5.3 Erlang Cookie...................................... 128 5.4 Erlang Node Name................................... 128 5.5 Securing Sensitive Files................................ 129 6 Clustering 131 6.1 How it Works...................................... 131 6.1.1 Router...................................... 131 6.1.2 Local Router.................................. 131 6.1.3 Session Manager................................ 132 6.1.4 s2s Manager................................... 132 6.2 Clustering Setup.................................... 132 6.3 Service Load-Balancing................................ 133 6.3.1 Domain Load-Balancing Algorithm...................... 133 6.3.2 Load-Balancing Buckets............................ 134 CONTENTS 7 7 Debugging 135 7.1 Log Files........................................ 135 7.2 Debug Console..................................... 136 7.3 Watchdog Alerts.................................... 137 A Internationalization and Localization 139 B Release Notes 141 C Acknowledgements 143 D Copyright Information 145 8 Contents Chapter 1 Introduction ejabberd is a free and open source instant messaging server written in Erlang/OTP1. ejabberd is cross-platform, distributed, fault-tolerant, and based on open standards to achieve real-time communication. ejabberd is designed to be a rock-solid and feature rich XMPP server. ejabberd is suitable for small deployments, whether they need to be scalable or not, as well as extremely big deployments. 1http://www.erlang.org/ 9 10 1. Introduction 1.1 Key Features ejabberd is: • Cross-platform: ejabberd runs under Microsoft Windows and Unix derived systems such as Linux, FreeBSD and NetBSD. • Distributed: You can run ejabberd on a cluster of machines and all of them will serve the same Jabber domain(s). When you need more capacity you can simply add a new cheap node to your cluster. Accordingly, you do not need to buy an expensive high-end machine to support tens of thousands concurrent users. • Fault-tolerant: You can deploy an ejabberd cluster so that all the information required for a properly working service will be replicated permanently on all nodes. This means that if one of the nodes crashes, the others will continue working without disruption. In addition, nodes also can be added or replaced `on the fly’. • Administrator Friendly: ejabberd is built on top of the Open Source Erlang. As a result you do not need to install an external database, an external web server, amongst others be- cause everything is already included, and ready to run out of the box. Other administrator benefits include: { Comprehensive documentation. { Straightforward installers for Linux, Mac OS X, and Windows. { Web Administration. { Shared Roster Groups. { Command line administration tool. { Can integrate with existing authentication mechanisms. { Capability to send announce messages. • Internationalized: ejabberd leads in internationalization. Hence it is very well suited in a globalized world. Related features are: { Translated to 25 languages. { Support for IDNA2. • Open Standards: ejabberd is the first Open Source Jabber server claiming to fully comply to the XMPP standard. { Fully XMPP compliant. { XML-based protocol. { Many protocols supported3. 2http://tools.ietf.org/html/rfc3490 3http://www.ejabberd.im/protocols 1.2 Additional Features 11 1.2 Additional Features Moreover, ejabberd comes with a wide range of other state-of-the-art features: • Modular { Load only the modules you want. { Extend ejabberd with your own custom modules. • Security { SASL and STARTTLS for c2s and s2s connections. { STARTTLS and Dialback s2s connections. { Web Admin accessible via HTTPS secure access. • Databases { Internal database for fast deployment (Mnesia). { Native MySQL support. { Native PostgreSQL support. { ODBC data storage support. { Microsoft SQL Server support. { Riak NoSQL database support. • Authentication { Internal Authentication. { PAM, LDAP, ODBC and Riak. { External Authentication script. • Others { Support for virtual hosting. { Compressing XML streams with Stream Compression (XEP-01384). { Statistics via Statistics Gathering (XEP-00395). { IPv6 support both for c2s and s2s connections. { Multi-User Chat6 module with support for clustering and HTML logging. { Users Directory based on users vCards. { Publish-Subscribe7 component with support for Personal Eventing via Pubsub8. { Support for web clients: HTTP Polling9 and HTTP Binding (BOSH)10 services. 4http://xmpp.org/extensions/xep-0138.html 5http://xmpp.org/extensions/xep-0039.html 6http://xmpp.org/extensions/xep-0045.html 7http://xmpp.org/extensions/xep-0060.html 8http://xmpp.org/extensions/xep-0163.html
Recommended publications
  • Fully Eliminated the Language Barrier and Enable Ease of Communication Through This Application
    IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 2, Ver. XI (Mar-Apr. 2014), PP 113-119 www.iosrjournals.org Alltalk™- A Windows Phone Messenger with Cross Language Communication Shruti Shetye1, Akhil Abraham2, Royston Pinto3, Sonali Vaidya4 1(BE-IT Student, Information Technology, St. FrancisInstitute of Technology, India) 2(BE-IT Student, Information Technology, St. Francis Institute of Technology, India) 3(BE-IT Student, Information Technology, St. Francis Institute of Technology, India 4(Lecturer, Information Technology, St. Francis Institute of Technology, India) __________________________________________________________________________________ Abstract:In day to day life, messengers or chatting applications provide facility for instant messaging over the internet. Exchange of messages takes place in universally used languages like English, French, etc. where both the users know how to communicate in a common language. Thus chatting on mobile phones is a luxury when both the parties involved know a common language. Hence we have implemented ALLTALK™ which is a Windows 8 phone based chatting application which makes cross language communication possible using mobile programming and networking technology.This application will enable the communication between two persons irrespective of the language each user wishes to use individually. The various modes of communication available in this messenger are through text and voice. Due to the best processing power provided among the available smartphones and high battery life we choose to work on windows 8 platform. Thus we have successfully eliminated the language barrier and enable ease of communication through this application. Keywords: Cross Language communication, instant messenger, socket connection, translator,Windows phone app.
    [Show full text]
  • Universidad Pol Facultad D Trabajo
    UNIVERSIDAD POLITÉCNICA DE MADRID FACULTAD DE INFORMÁTICA TRABAJO FINAL DE CARRERA ESTUDIO DEL PROTOCOLO XMPP DE MESAJERÍA ISTATÁEA, DE SUS ATECEDETES, Y DE SUS APLICACIOES CIVILES Y MILITARES Autor: José Carlos Díaz García Tutor: Rafael Martínez Olalla Madrid, Septiembre de 2008 2 A mis padres, Francisco y Pilar, que me empujaron siempre a terminar esta licenciatura y que tanto me han enseñado sobre la vida A mis abuelos (q.e.p.d.) A mi hijo icolás, que me ha dejado terminar este trabajo a pesar de robarle su tiempo de juego conmigo Y muy en especial, a Susana, mi fiel y leal compañera, y la luz que ilumina mi camino Agradecimientos En primer lugar, me gustaría agradecer a toda mi familia la comprensión y confianza que me han dado, una vez más, para poder concluir definitivamente esta etapa de mi vida. Sin su apoyo, no lo hubiera hecho. En segundo lugar, quiero agradecer a mis amigos Rafa y Carmen, su interés e insistencia para que llegara este momento. Por sus consejos y por su amistad, les debo mi gratitud. Por otra parte, quiero agradecer a mis compañeros asesores militares de Nextel Engineering sus explicaciones y sabios consejos, que sin duda han sido muy oportunos para escribir el capítulo cuarto de este trabajo. Del mismo modo, agradecer a Pepe Hevia, arquitecto de software de Alhambra Eidos, los buenos ratos compartidos alrrededor de nuestros viejos proyectos sobre XMPP y que encendieron prodigiosamente la mecha de este proyecto. A Jaime y a Bernardo, del Ministerio de Defensa, por haberme hecho descubrir las bondades de XMPP.
    [Show full text]
  • TLS in the Wild: an Internet-Wide Analysis of TLS-Based Protocols for Electronic Communication
    TLS in the wild: An Internet-wide analysis of TLS-based protocols for electronic communication Ralph Holz∗, Johanna Amannz, Olivier Mehaniy, Matthias Wachsx, Mohamed Ali Kaafary ∗University of Sydney, Australia, Email: [email protected] yData61/CSIRO, Sydney, Australia, Email: [email protected] zICSI, Berkeley, USA, Email: [email protected] xTechnical University of Munich, Germany, Email: [email protected] This is a preprint of the camera-ready version to appear at NDSS 2016. Last update: 19 Dec 2015. Abstract—Email and chat still constitute the majority of in 2018 [11]. As for chat, the most widely used standard- electronic communication on the Internet. The standardisation based networks are IRC group chats and the XMPP instant and acceptance of protocols such as SMTP, IMAP, POP3, XMPP, messaging and multi-user conferencing network. and IRC has allowed to deploy servers for email and chat in a decentralised and interoperable fashion. These protocols can be In their early days, email protocols such as SMTP, POP3, secured by providing encryption with TLS—directly or via the and IMAP were designed with no special focus on security. STARTTLS extension. X.509 PKIs and ad hoc methods can be In particular, authentication in SMTP was introduced a while leveraged to authenticate communication peers. However, secure after the protocol’s standardisation, initially as a way to configuration is not straight-forward and many combinations fight spam. User agents started to move towards encryption of encryption and authentication mechanisms lead to insecure deployments and potentially compromise of data in transit. In and authenticated connections gradually, using the then-new this paper, we present the largest study to date that investigates SSL 3 and later the TLS protocols to protect the transport the security of our email and chat infrastructures.
    [Show full text]
  • MCP Q4`18 Release Notes Version Q4-18 Mirantis Cloud Platform Release Notes Version Q4`18
    MCP Q4`18 Release Notes version q4-18 Mirantis Cloud Platform Release Notes version Q4`18 Copyright notice 2021 Mirantis, Inc. All rights reserved. This product is protected by U.S. and international copyright and intellectual property laws. No part of this publication may be reproduced in any written, electronic, recording, or photocopying form without written permission of Mirantis, Inc. Mirantis, Inc. reserves the right to modify the content of this document at any time without prior notice. Functionality described in the document may not be available at the moment. The document contains the latest information at the time of publication. Mirantis, Inc. and the Mirantis Logo are trademarks of Mirantis, Inc. and/or its affiliates in the United States an other countries. Third party trademarks, service marks, and names mentioned in this document are the properties of their respective owners. ©2021, Mirantis Inc. Page 2 Mirantis Cloud Platform Release Notes version Q4`18 What’s new This section provides the details about the features and enhancements introduced with the latest MCP release version. Note The MCP integration of the community software projects, such as OpenStack, Kubernetes, OpenContrail, and Ceph, includes the integration of the features which the MCP consumers can benefit from. Refer to the MCP Q4`18 Deployment Guide for the software features that can be deployed and managed by MCP DriveTrain. MCP DriveTrain • Encryption of sensitive data in the Reclass model • Galera verification and restoration pipeline • Jenkins version upgrade • Partitioning table for the VCP images Encryption of sensitive data in the Reclass model SECURITY Implemented the GPG encryption to protect sensitive data in the Git repositories of the Reclass model as well as the key management mechanism for secrets encryption and decryption.
    [Show full text]
  • LIST of NOSQL DATABASES [Currently 150]
    Your Ultimate Guide to the Non - Relational Universe! [the best selected nosql link Archive in the web] ...never miss a conceptual article again... News Feed covering all changes here! NoSQL DEFINITION: Next Generation Databases mostly addressing some of the points: being non-relational, distributed, open-source and horizontally scalable. The original intention has been modern web-scale databases. The movement began early 2009 and is growing rapidly. Often more characteristics apply such as: schema-free, easy replication support, simple API, eventually consistent / BASE (not ACID), a huge amount of data and more. So the misleading term "nosql" (the community now translates it mostly with "not only sql") should be seen as an alias to something like the definition above. [based on 7 sources, 14 constructive feedback emails (thanks!) and 1 disliking comment . Agree / Disagree? Tell me so! By the way: this is a strong definition and it is out there here since 2009!] LIST OF NOSQL DATABASES [currently 150] Core NoSQL Systems: [Mostly originated out of a Web 2.0 need] Wide Column Store / Column Families Hadoop / HBase API: Java / any writer, Protocol: any write call, Query Method: MapReduce Java / any exec, Replication: HDFS Replication, Written in: Java, Concurrency: ?, Misc: Links: 3 Books [1, 2, 3] Cassandra massively scalable, partitioned row store, masterless architecture, linear scale performance, no single points of failure, read/write support across multiple data centers & cloud availability zones. API / Query Method: CQL and Thrift, replication: peer-to-peer, written in: Java, Concurrency: tunable consistency, Misc: built-in data compression, MapReduce support, primary/secondary indexes, security features.
    [Show full text]
  • A User Study of Off-The-Record Messaging
    A User Study of Off-the-Record Messaging Ryan Stedman Kayo Yoshida Ian Goldberg University of Waterloo 200 University Avenue West Waterloo, Ontario, Canada N2L 3G1 {rstedman@cs, k2yoshid@math, iang@cs}.uwaterloo.ca ABSTRACT Keywords Instant messaging is a prevalent form of communication ac- OTR, Usable Security, Instant Messaging, Think Aloud ross the Internet, yet most instant messaging services pro- vide little security against eavesdroppers or impersonators. 1. INTRODUCTION There are a variety of existing systems that aim to solve There has been much research into creating privacy-en- this problem, but the one that provides the highest level hancing technologies, especially since the Internet has started of privacy is Off-the-Record Messaging (OTR), which aims to play an essential role in everyday life. However, not many to give instant messaging conversations the level of privacy of these technologies have seen widespread adoption. One available in a face-to-face conversation. In the most recent of the reasons for this is that many of these technologies redesign of OTR, as well as increasing the security of the provide insufficient usability [8]. protocol, one of the goals of the designers was to make OTR The process of evaluating and enhancing usability is im- easier to use, without users needing to understand details of portant in order for a privacy-enhancing technology to pro- computer security such as keys or fingerprints. vide benefits to ordinary users. Since privacy is not just To determine if this design goal has been met, we con- intended for computer scientists or cryptographers, but for ducted a user study of the OTR plugin for the Pidgin in- everyone, these technologies should be accessible to the gen- stant messaging client using the think aloud method.
    [Show full text]
  • A Survey of Open Source Products for Building a SIP Communication Platform
    Hindawi Publishing Corporation Advances in Multimedia Volume 2011, Article ID 372591, 21 pages doi:10.1155/2011/372591 Research Article A Survey of Open Source Products for Building a SIP Communication Platform Pavel Segec and Tatiana Kovacikova Department of InfoCom Networks, University of Zilina, Univerzitna 8215/1, 010 26 Zilina, Slovakia Correspondence should be addressed to Tatiana Kovacikova, [email protected] Received 29 July 2011; Revised 31 October 2011; Accepted 15 November 2011 Academic Editor: T. Turletti Copyright © 2011 P. Segec and T. Kovacikova. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. The Session Initiation Protocol (SIP) is a multimedia signalling protocol that has evolved into a widely adopted communication standard. The integration of SIP into existing IP networks has fostered IP networks becoming a convergence platform for both real- time and non-real-time multimedia communications. This converged platform integrates data, voice, video, presence, messaging, and conference services into a single network that offers new communication experiences for users. The open source community has contributed to SIP adoption through the development of open source software for both SIP clients and servers. In this paper, we provide a survey on open SIP systems that can be built using publically available software. We identify SIP features for service deve- lopment and programming, services and applications of a SIP-converged platform, and the most important technologies support- ing SIP functionalities. We propose an advanced converged IP communication platform that uses SIP for service delivery.
    [Show full text]
  • Couchbase Server Manual 2.1.0 Couchbase Server Manual 2.1.0
    Couchbase Server Manual 2.1.0 Couchbase Server Manual 2.1.0 Abstract This manual documents the Couchbase Server 2.1.0 series, including installation, monitoring, and administration interface and associ- ated tools. For the corresponding Moxi product, please use the Moxi 1.8 series. See Moxi 1.8 Manual. External Community Resources. Download Couchbase Server 2.1 Couchbase Developer Guide 2.1 Client Libraries Couchbase Server Forum Last document update: 05 Sep 2013 23:46; Document built: 05 Sep 2013 23:46. Documentation Availability and Formats. This documentation is available online: HTML Online . For other documentation from Couchbase, see Couchbase Documentation Library Contact: [email protected] or couchbase.com Copyright © 2010-2013 Couchbase, Inc. Contact [email protected]. For documentation license information, see Section F.1, “Documentation License”. For all license information, see Appendix F, Licenses. Table of Contents Preface ................................................................................................................................................... xiii 1. Best Practice Guides ..................................................................................................................... xiii 1. Introduction to Couchbase Server .............................................................................................................. 1 1.1. Couchbase Server and NoSQL ........................................................................................................ 1 1.2. Architecture
    [Show full text]
  • THE NOTION of DESIGN EMERGENCE EVOLVING YOUR SOFTWARE Who Are We
    THE NOTION OF DESIGN EMERGENCE EVOLVING YOUR SOFTWARE Who Are we 陈永胜 [email protected] @yeongsheng yeongsheng-tan !2 EVOLVING YOUR SOFTWARE - THE NOTION OF DESIGN EMERGENCE “THE BEST ARCHITECTURES, REQUIREMENTS, AND DESIGNS EMERGE FROM SELF-ORGANIZING TEAMS.” – PRINCIPLES BEHIND THE AGILE MANIFESTO AGENDA ‣ EMERGENT DESIGN ‣ CHOOSE YOUR POISON ‣ SWITCHING OUT AN ARCHITECTURAL LAYER ‣ WHEN RUBBER HITS THE ROAD ‣ SHOW ME THE CODE ‣ Q&A LISTEN, LEARN, UNDERSTAND, ADAPT EMERGENT DESIGN EVOLVING YOUR SOFTWARE - THE NOTION OF DESIGN EMERGENCE KNOWLEDGE CREATION & PRESERVATION KNOWLEDGE CREATION KNOWLEDGE PRESERVATION EVOLVING YOUR SOFTWARE - THE NOTION OF DESIGN EMERGENCE WHEN DO YOU HAVE BEST KNOWLEDGE? KNOWLEDGE VS TIME 100 75 50 Knowledge 25 0 AUG SEP OCT NOV DEC Time EVOLVING YOUR SOFTWARE - THE NOTION OF DESIGN EMERGENCE HYPOTHETICAL KNOWLEDGE VS TIME 100 75 50 Knowledge 25 0 AUG SEP OCT NOV DEC Time EVOLVING YOUR SOFTWARE - THE NOTION OF DESIGN EMERGENCE REALITY KNOWLEDGE VS TIME 100 75 50 Knowledge 25 0 AUG SEP OCT NOV DEC Time EVOLVING YOUR SOFTWARE - THE NOTION OF DESIGN EMERGENCE WHAT WE SHOULD STRIVE FOR KNOWLEDGE VS TIME 100 75 50 Knowledge 25 0 AUG SEP OCT NOV DEC Time EVOLVING YOUR SOFTWARE - THE NOTION OF DESIGN EMERGENCE TRADITIONAL VS EMERGENT Design Implement the initial design (try to make all decisions) TRADITIONAL EMERGENT Design Reflect and (decide an Design/Code Decide Design/Code initial Direction direction) Reflect and Design/Code Decide Direction EVOLVING YOUR SOFTWARE - THE NOTION OF DESIGN EMERGENCE MAKE IT WORK
    [Show full text]
  • Ovládání Zabezpečovací Kamery EYE-02 Protokolem
    TECHNICKA´ UNIVERZITA V LIBERCI Fakulta mechatroniky, informatiky a mezioborov´ych studi´ı DIPLOMOVA´ PRACE´ V Liberci, 18. kvˇetna2013 Bc. Jakub Ponikelsk´y TECHNICKA´ UNIVERZITA V LIBERCI Fakulta mechatroniky, informatiky a mezioborov´ych studi´ı Studijn´ıprogram: N2612 – Elektronika a informatika Studijn´ıobor: 1802T007 – Informaˇcn´ıtechnologie Ovl´ad´an´ızabezpeˇcovac´ıkamery EYE-02 protokolem XMPP Control of security camera EYE-02 via XMPP protocol Bc. Jakub Ponikelsk´y Vedouc´ıpr´ace: doc. RNDr. Pavel Satrapa, Ph.D. Konzultant: Ing. Jan Halama, JABLOCOM s. r. o. Pracoviˇstˇe: Ustav´ nov´ych technologi´ıa aplikovan´einformatiky Prohl´aˇsen´ı Byl(a) jsem sezn´amen(a)s t´ım,ˇze na mou diplomovou pr´aci se plnˇevztahuje z´akon ˇc.121/2000 Sb., o pr´avuautorsk´em,zejm´ena § 60 – ˇskoln´ıd´ılo. Beru na vˇedom´ı,ˇzeTechnick´auniverzita v Liberci (TUL) nezasahuje do m´ych autorsk´ych pr´avuˇzit´ımm´ediplomov´epr´acepro vnitˇrn´ıpotˇrebuTUL. Uˇziji-lidiplomovou pr´acinebo poskytnu-li licenci k jej´ımu vyuˇzit´ı,jsem si vˇedom povinnosti informovat o t´etoskuteˇcnostiTUL; v tomto pˇr´ıpadˇem´aTUL pr´avo ode mne poˇzadovat ´uhradun´aklad˚u,kter´evynaloˇzilana vytvoˇren´ıd´ıla,aˇzdo jejich skuteˇcn´e v´yˇse. Diplomovou pr´acijsem vypracoval(a) samostatnˇes pouˇzit´ımuveden´eliteratury a na z´akladˇekonzultac´ıs vedouc´ımdiplomov´epr´acea konzultantem. Datum: 18. kvˇetna2013 Podpis: ......................... Bc. Jakub Ponikelsk´y 3 Podˇekov´an´ı Touto cestou bych r´adpodˇekoval vedouc´ımu diplomov´epr´acedoc. RNDr. Pavlu Satrapovi, Ph.D., za jeho cenn´epˇripom´ınkypˇrivytv´aˇren´ıa dokonˇcov´an´ıpr´ace.R´ad bych tak´epodˇekoval spoleˇcnosti JABLOCOM s.
    [Show full text]
  • Pipenightdreams Osgcal-Doc Mumudvb Mpg123-Alsa Tbb
    pipenightdreams osgcal-doc mumudvb mpg123-alsa tbb-examples libgammu4-dbg gcc-4.1-doc snort-rules-default davical cutmp3 libevolution5.0-cil aspell-am python-gobject-doc openoffice.org-l10n-mn libc6-xen xserver-xorg trophy-data t38modem pioneers-console libnb-platform10-java libgtkglext1-ruby libboost-wave1.39-dev drgenius bfbtester libchromexvmcpro1 isdnutils-xtools ubuntuone-client openoffice.org2-math openoffice.org-l10n-lt lsb-cxx-ia32 kdeartwork-emoticons-kde4 wmpuzzle trafshow python-plplot lx-gdb link-monitor-applet libscm-dev liblog-agent-logger-perl libccrtp-doc libclass-throwable-perl kde-i18n-csb jack-jconv hamradio-menus coinor-libvol-doc msx-emulator bitbake nabi language-pack-gnome-zh libpaperg popularity-contest xracer-tools xfont-nexus opendrim-lmp-baseserver libvorbisfile-ruby liblinebreak-doc libgfcui-2.0-0c2a-dbg libblacs-mpi-dev dict-freedict-spa-eng blender-ogrexml aspell-da x11-apps openoffice.org-l10n-lv openoffice.org-l10n-nl pnmtopng libodbcinstq1 libhsqldb-java-doc libmono-addins-gui0.2-cil sg3-utils linux-backports-modules-alsa-2.6.31-19-generic yorick-yeti-gsl python-pymssql plasma-widget-cpuload mcpp gpsim-lcd cl-csv libhtml-clean-perl asterisk-dbg apt-dater-dbg libgnome-mag1-dev language-pack-gnome-yo python-crypto svn-autoreleasedeb sugar-terminal-activity mii-diag maria-doc libplexus-component-api-java-doc libhugs-hgl-bundled libchipcard-libgwenhywfar47-plugins libghc6-random-dev freefem3d ezmlm cakephp-scripts aspell-ar ara-byte not+sparc openoffice.org-l10n-nn linux-backports-modules-karmic-generic-pae
    [Show full text]
  • Offline OTR Messaging System Under Network Disruption
    computers & security 82 (2019) 227–240 Available online at www.sciencedirect.com j o u r n a l h o m e p a g e : w w w . e l s e v i e r . c o m / l o c a t e / c o s e 2 O TR: Offline OTR messaging system under R network disruption Mahdi Daghmehchi Firoozjaei a,b, MinChang Kim a, JaeSeung Song b, ∗ Hyoungshick Kim a,1, a Department of Electrical and Computer Engineering, College of Information and Communication Engineering, Sungkyunkwan University, Suwon, Republic of Korea b Department of Computer and Information Security, College of Software & Convergence technology, Sejong University, Seoul, Republic of Korea a r t i c l e i n f o a b s t r a c t Article history: Providing a secure and efficient communication system under network disruption without Received 14 August 2018 a trusted third party remains a challenging issue. To develop a secure and efficient system Accepted 26 December 2018 in such situations, we extend the conventional Off-The-Record (OTR) protocol into a new Available online 29 December 2018 protocol named offline OTR (O 2TR). O 2TR provides end-to-end security between users with- out requiring the assumption that they are persistently connected to each other. To show Keywords: the feasibility of the proposed protocol, we implemented a prototype to support O 2TR based Key management on the Gajim XMMP instant messaging platform. Our experiments showed that O 2TR can Reliability be used reliably even when the corresponding network party is temporarily broken down.
    [Show full text]