Fuzzing Windows Applications and Network Protocols Bachelor Thesis

Total Page:16

File Type:pdf, Size:1020Kb

Fuzzing Windows Applications and Network Protocols Bachelor Thesis Fuzzing Windows Applications and Network Protocols Bachelor Thesis Department of Computer Science University of Applied Science Rapperswil Spring Term 2012 Authors: Kevin Lynn, Michael Fisler Advisor: Prof. Dr. Andreas Steffen Project Partner: Compass Security AG External Co-Examiner: Dr. Ralf Hauser Internal Co-Examiner: Prof. Dr. Luc Bläser Abstract Fuzzing is a technique for detecting software flaws by intentionally sending invalid input to a target of evaluation, generally involving a high degree of automation. For software engineers it is crucial to identify and eliminate such flaws since they might be exploitable by a remote attacker. As a consequence an attacker could compromise the application as well as the operating system the software is running on, gain unauthorized access and steal or modify confidential data. Fuzzing provides an instrument to find bugs fast with relatively low costs. While the basic idea behind fuzzing is simple, creating thorough, precise and performant fuzzers is a real challenge. With time and computing power being limiting factors, the success of fuzzing depends on the level of detail when modeling the protocol as well as the effectiveness of the data mutations performed. The goal of this paper is to present methods to effectively fuzz a network (i.e. server) application using an example protocol and a custom fuzzer. By choosing the standards based Extensible Messaging and Presence Protocol (XMPP) we not only selected a contemporary protocol that has a gaining popularity in real-time communication applications but that also incorporates many advanced concepts found in other common networking protocols. The scope of the XMPP protocol including all its extensions is vast and therefore presents a major challenge in terms of protocol modeling and target coverage. As our tool of choice we selected the Peach Fuzzing Platform for fuzzer modeling. Peach is a free, powerful framework including many automation features. Partly due to the documentation, which in some areas is very scarce, Peach has quite a steep learning curve. By documenting our experience, successes and mistakes we aim to reduce the initial effort required to become acquainted with Peach and its varied features. Further- more, by following an incremental approach to build-up expertise moving from simple to more challenging problems and techniques proved a viable project guideline. In addition to general fuzzing considerations such as the circumstances under which fuzzing makes sense and the limitations of fuzzing we also present methods to approach fuzzing extensive XML-based protocols and tuning Peach to achieve higher performance and point out strategies to a high level of coverage and precision. Contents I. Technical Report 9 1. Introduction 10 1.1. Types of Fuzzing . 10 1.2. Attack Surface . 11 1.3. Fuzzer Types . 11 1.4. Failure Analysis . 11 1.5. Fuzzing Approaches Of Major Companies . 11 1.6. State of the Art Fuzzing Tools . 12 1.7. Project Goals & Vision . 12 1.8. General Conditions, Environment, Definitions, Limitations . 12 1.9. Procedure & Setup . 12 1.10. Chapter Overview . 13 2. Evaluation 14 2.1. Protocol . 14 2.1.1. Criteria . 14 2.1.2. Assessment . 14 2.1.3. Conclusion . 15 2.2. Fuzzer . 16 2.2.1. Fuzzing Frameworks . 16 2.2.2. Criteria . 18 2.2.3. Assessment . 18 2.2.4. Conclusion . 19 2.3. Open Source XMPP Server . 20 2.3.1. Criteria . 20 2.3.2. Assessment . 20 2.3.3. Conclusion . 20 2.4. Closed Source XMPP Server . 21 2.4.1. Criteria . 21 2.4.2. Assessment . 21 2.4.3. Conclusion . 21 3. The XMPP Protocol 22 3.1. XMPP Core Technology . 22 3.2. XML Stream . 22 3 3.3. Roster . 22 3.4. Stanza . 22 3.5. Simple Authentication and Security Layer (SASL) . 23 3.6. Client Registration . 23 4. The Peach Fuzzing Framework 24 4.1. General Peach Concepts . 24 4.2. Peach Fuzzer . 24 4.3. Peach Agent . 26 4.4. Peach Fuzzer Configuration File (Pit File) . 26 4.5. Peach Mutators . 29 4.5.1. Mutation Strategies . 29 4.5.2. Peach’s Default Mutators . 29 4.6. Peach Fixup . 31 4.6.1. Creating Custom Fixups . 32 4.6.2. Including The Fixup in the DataModel . 33 4.7. Slurp Action . 33 4.8. Peach Publisher . 33 5. Realization 35 5.1. Proof of Concept: Savant Web Server . 35 5.2. Proof of Concept: Known-Exploit Fuzzing . 35 5.3. General Fuzzing Considerations . 35 5.4. Choice Of Database . 36 5.5. Authentication . 36 5.6. XMPP-specific Peach DataModels . 37 5.6.1. JID . 37 5.6.2. DateTime . 38 5.7. Peach Mutator Optimization . 38 5.7.1. General String Mutators . 39 5.7.2. Overflow Mutator . 40 5.7.3. Invalid Char Mutators . 40 5.8. XMPP Schema Coverage: Input Space Determination . 40 5.9. Server Feature Coverage . 44 5.10. Code Coverage, Fuzzer Tracking . 45 5.10.1. PaiMei . 46 5.10.2. White-box code coverage . 47 5.10.3. Grey-box code coverage . 47 5.10.4. Results . 47 5.11. Logger Considerations . 47 6. Results 49 6.1. Benefits of Fuzzing . 49 4 6.2. Limitations of Fuzzing . 49 6.2.1. Time-Detail-Precision Tradeoff . 49 6.2.2. How Secure Is A Fuzzed Software? . 49 6.2.3. Misconfiguration . 50 6.2.4. Automated Fuzzer Creation . 50 6.3. Strategies for Efficient and Effective Fuzzing . 50 6.3.1. Selection of Features . 50 6.3.2. Mutator Quality . 51 6.3.3. Modeling Detail . 51 6.3.4. Features of an Optimal Fuzzing Framework . 51 6.3.5. Combining mutation-based and generation-based fuzzing . 53 6.4. Future Work . 53 6.4.1. Mutators . 53 6.4.2. Fuzzer Tracking / Code Coverage . 53 6.5. Personal Reports . 54 6.5.1. Kevin Lynn . 54 6.5.2. Michael Fisler . 54 6.6. Acknowledgments . 55 II. Software Documentation 56 7. Overview of Tools 57 7.1. Fuzzer Assisting and Analysis Tools . 57 7.1.1. config.py . 57 7.1.2. xmpp_schema_analyzer.py . 58 7.1.3. jabberd_mysql_reset.py . 58 7.2. Pit Generation Scripts . 58 7.2.1. pit_creator.py . 58 7.2.2. xep_ripper.py . 59 7.2.3. configure.py . 60 7.2.4. tag_dupl.py . 60 7.2.5. xml2sm.py . 61 7.2.6. xml2pdm.py . 62 8. Software Decisions 64 8.1. Software Engineering Decisions . 64 8.1.1. Script Robustness . 64 8.1.2. Script Scope . ..
Recommended publications
  • Universidad Pol Facultad D Trabajo
    UNIVERSIDAD POLITÉCNICA DE MADRID FACULTAD DE INFORMÁTICA TRABAJO FINAL DE CARRERA ESTUDIO DEL PROTOCOLO XMPP DE MESAJERÍA ISTATÁEA, DE SUS ATECEDETES, Y DE SUS APLICACIOES CIVILES Y MILITARES Autor: José Carlos Díaz García Tutor: Rafael Martínez Olalla Madrid, Septiembre de 2008 2 A mis padres, Francisco y Pilar, que me empujaron siempre a terminar esta licenciatura y que tanto me han enseñado sobre la vida A mis abuelos (q.e.p.d.) A mi hijo icolás, que me ha dejado terminar este trabajo a pesar de robarle su tiempo de juego conmigo Y muy en especial, a Susana, mi fiel y leal compañera, y la luz que ilumina mi camino Agradecimientos En primer lugar, me gustaría agradecer a toda mi familia la comprensión y confianza que me han dado, una vez más, para poder concluir definitivamente esta etapa de mi vida. Sin su apoyo, no lo hubiera hecho. En segundo lugar, quiero agradecer a mis amigos Rafa y Carmen, su interés e insistencia para que llegara este momento. Por sus consejos y por su amistad, les debo mi gratitud. Por otra parte, quiero agradecer a mis compañeros asesores militares de Nextel Engineering sus explicaciones y sabios consejos, que sin duda han sido muy oportunos para escribir el capítulo cuarto de este trabajo. Del mismo modo, agradecer a Pepe Hevia, arquitecto de software de Alhambra Eidos, los buenos ratos compartidos alrrededor de nuestros viejos proyectos sobre XMPP y que encendieron prodigiosamente la mecha de este proyecto. A Jaime y a Bernardo, del Ministerio de Defensa, por haberme hecho descubrir las bondades de XMPP.
    [Show full text]
  • A Survey of Open Source Products for Building a SIP Communication Platform
    Hindawi Publishing Corporation Advances in Multimedia Volume 2011, Article ID 372591, 21 pages doi:10.1155/2011/372591 Research Article A Survey of Open Source Products for Building a SIP Communication Platform Pavel Segec and Tatiana Kovacikova Department of InfoCom Networks, University of Zilina, Univerzitna 8215/1, 010 26 Zilina, Slovakia Correspondence should be addressed to Tatiana Kovacikova, [email protected] Received 29 July 2011; Revised 31 October 2011; Accepted 15 November 2011 Academic Editor: T. Turletti Copyright © 2011 P. Segec and T. Kovacikova. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. The Session Initiation Protocol (SIP) is a multimedia signalling protocol that has evolved into a widely adopted communication standard. The integration of SIP into existing IP networks has fostered IP networks becoming a convergence platform for both real- time and non-real-time multimedia communications. This converged platform integrates data, voice, video, presence, messaging, and conference services into a single network that offers new communication experiences for users. The open source community has contributed to SIP adoption through the development of open source software for both SIP clients and servers. In this paper, we provide a survey on open SIP systems that can be built using publically available software. We identify SIP features for service deve- lopment and programming, services and applications of a SIP-converged platform, and the most important technologies support- ing SIP functionalities. We propose an advanced converged IP communication platform that uses SIP for service delivery.
    [Show full text]
  • Ovládání Zabezpečovací Kamery EYE-02 Protokolem
    TECHNICKA´ UNIVERZITA V LIBERCI Fakulta mechatroniky, informatiky a mezioborov´ych studi´ı DIPLOMOVA´ PRACE´ V Liberci, 18. kvˇetna2013 Bc. Jakub Ponikelsk´y TECHNICKA´ UNIVERZITA V LIBERCI Fakulta mechatroniky, informatiky a mezioborov´ych studi´ı Studijn´ıprogram: N2612 – Elektronika a informatika Studijn´ıobor: 1802T007 – Informaˇcn´ıtechnologie Ovl´ad´an´ızabezpeˇcovac´ıkamery EYE-02 protokolem XMPP Control of security camera EYE-02 via XMPP protocol Bc. Jakub Ponikelsk´y Vedouc´ıpr´ace: doc. RNDr. Pavel Satrapa, Ph.D. Konzultant: Ing. Jan Halama, JABLOCOM s. r. o. Pracoviˇstˇe: Ustav´ nov´ych technologi´ıa aplikovan´einformatiky Prohl´aˇsen´ı Byl(a) jsem sezn´amen(a)s t´ım,ˇze na mou diplomovou pr´aci se plnˇevztahuje z´akon ˇc.121/2000 Sb., o pr´avuautorsk´em,zejm´ena § 60 – ˇskoln´ıd´ılo. Beru na vˇedom´ı,ˇzeTechnick´auniverzita v Liberci (TUL) nezasahuje do m´ych autorsk´ych pr´avuˇzit´ımm´ediplomov´epr´acepro vnitˇrn´ıpotˇrebuTUL. Uˇziji-lidiplomovou pr´acinebo poskytnu-li licenci k jej´ımu vyuˇzit´ı,jsem si vˇedom povinnosti informovat o t´etoskuteˇcnostiTUL; v tomto pˇr´ıpadˇem´aTUL pr´avo ode mne poˇzadovat ´uhradun´aklad˚u,kter´evynaloˇzilana vytvoˇren´ıd´ıla,aˇzdo jejich skuteˇcn´e v´yˇse. Diplomovou pr´acijsem vypracoval(a) samostatnˇes pouˇzit´ımuveden´eliteratury a na z´akladˇekonzultac´ıs vedouc´ımdiplomov´epr´acea konzultantem. Datum: 18. kvˇetna2013 Podpis: ......................... Bc. Jakub Ponikelsk´y 3 Podˇekov´an´ı Touto cestou bych r´adpodˇekoval vedouc´ımu diplomov´epr´acedoc. RNDr. Pavlu Satrapovi, Ph.D., za jeho cenn´epˇripom´ınkypˇrivytv´aˇren´ıa dokonˇcov´an´ıpr´ace.R´ad bych tak´epodˇekoval spoleˇcnosti JABLOCOM s.
    [Show full text]
  • Pipenightdreams Osgcal-Doc Mumudvb Mpg123-Alsa Tbb
    pipenightdreams osgcal-doc mumudvb mpg123-alsa tbb-examples libgammu4-dbg gcc-4.1-doc snort-rules-default davical cutmp3 libevolution5.0-cil aspell-am python-gobject-doc openoffice.org-l10n-mn libc6-xen xserver-xorg trophy-data t38modem pioneers-console libnb-platform10-java libgtkglext1-ruby libboost-wave1.39-dev drgenius bfbtester libchromexvmcpro1 isdnutils-xtools ubuntuone-client openoffice.org2-math openoffice.org-l10n-lt lsb-cxx-ia32 kdeartwork-emoticons-kde4 wmpuzzle trafshow python-plplot lx-gdb link-monitor-applet libscm-dev liblog-agent-logger-perl libccrtp-doc libclass-throwable-perl kde-i18n-csb jack-jconv hamradio-menus coinor-libvol-doc msx-emulator bitbake nabi language-pack-gnome-zh libpaperg popularity-contest xracer-tools xfont-nexus opendrim-lmp-baseserver libvorbisfile-ruby liblinebreak-doc libgfcui-2.0-0c2a-dbg libblacs-mpi-dev dict-freedict-spa-eng blender-ogrexml aspell-da x11-apps openoffice.org-l10n-lv openoffice.org-l10n-nl pnmtopng libodbcinstq1 libhsqldb-java-doc libmono-addins-gui0.2-cil sg3-utils linux-backports-modules-alsa-2.6.31-19-generic yorick-yeti-gsl python-pymssql plasma-widget-cpuload mcpp gpsim-lcd cl-csv libhtml-clean-perl asterisk-dbg apt-dater-dbg libgnome-mag1-dev language-pack-gnome-yo python-crypto svn-autoreleasedeb sugar-terminal-activity mii-diag maria-doc libplexus-component-api-java-doc libhugs-hgl-bundled libchipcard-libgwenhywfar47-plugins libghc6-random-dev freefem3d ezmlm cakephp-scripts aspell-ar ara-byte not+sparc openoffice.org-l10n-nn linux-backports-modules-karmic-generic-pae
    [Show full text]
  • Jabber/Xmpp Robot Pro Vyhledávání Pomocí Google Jabber/Xmpp Robot for Searching by Means of Google
    VYSOKÉ UČENÍ TECHNICKÉ V BRNĚ BRNO UNIVERSITY OF TECHNOLOGY FAKULTA INFORMAČNÍCH TECHNOLOGIÍ ÚSTAV INFORMAČNÍCH SYSTÉMŮ FACULTY OF INFORMATION TECHNOLOGY DEPARTMENT OF INFORMATION SYSTEMS JABBER/XMPP ROBOT PRO VYHLEDÁVÁNÍ POMOCÍ GOOGLE JABBER/XMPP ROBOT FOR SEARCHING BY MEANS OF GOOGLE BAKALÁŘSKÁ PRÁCE BACHELOR´S THESIS AUTOR PRÁCE Jiří Hrazdil AUTHOR VEDOUCÍ PRÁCE Mgr. Marek Rychlý SUPERVISOR BRNO 2007 Jabber/XMPP robot pro vyhledávání pomocí Google Zadání 1. Seznamte se s protokolem Jabber/XMPP a jeho open-source implementacemi. 2. Seznamte se se službami vyhledávače Google a s rozhraním webové služby Google (Google Web APIs service). 3. Návrhněte vhodný formát dotazu (strukturovaný prostý text), který pokryje funkce a služby poskytované vyhledávačem Google. 4. Navrhněte a implementujte robota pro Jabber, který bude odpovídat na dotazy podle výsledků hledání pomocí služby Google. Robot by měl umožnit přizpůsobit své uživatelské rozhraní podle požadavků uživatele. 5. Diskutujte výsledky práce a navrhněte možná rozšíření. 2 Licenční smlouva Licenční smlouva je uložena v archivu Fakulty informačních technologií Vysokého učení technického v Brně. 3 Abstrakt Cílem této práce bylo seznámit se s principem a fungováním komunikační sítě Jabber/XMPP a jeho open-source implementacemi, dále pak seznámit se s rozhraním pro vyhledávání webových stránek pomocí rozhraní webové služby vyhledávače Google a implementovat robota, který na dotazy položené prostřednictvím protokolu XMPP odpoví výsledky získanými z webového vyhledávače pomocí protokolu SOAP. Klíčová slova Jabber, XMPP, robot, Google, Yahoo, MSN Live, SOAP, vyhledávání na webu. Abstract The aim of this thesis was to get acquainted with principles and basics of Jabber/XMPP communication network and its open-source implementations, learn about Google web search application interface and implement a robot, which will respond to search queries sent via XMPP protocol with adequate search results acquired through SOAP.
    [Show full text]
  • International Journal for Scientific Research & Development| Sp. Issue- Computer Networking | ISSN (Online):2321-061
    IJSRD - International Journal for Scientific Research & Development| Sp. Issue- Computer Networking | ISSN (online):2321-0613 XMPP in Instant Messengers Neeraj Vashistha1 Akshay Khilari2 S.N. Shelke3 3Assistant Professor 1,2,3Department of Computer Engineering 1,2,3Sinhgad Academy of Engineering, SPPU, Pune. Abstract— Instant Messengers(IM) are the most commonly like Pidgin, Adium using the standard XMPP protocol. The used interacting method to communicate with people main advantage of using a decentralized architecture is that worldwide. IM presence is felt in multicast (chat rooms) and it allows client developers to focus on user experience and one-to-one message exchange between different kind of server developers to focus on reliability and scalability. The client entities. IM using eXtensible Messaging and Presence servers incorporate important security features such as Protocol (XMPP) as the base protocol is able to provide near authentication, channel encryption. real-time text-based communication through the use of The following are the components of the XMPP XML. Social media networks like gtalk, ejabberd, facebook architecture: employ XMPP. XMPP can be implemented with servers as well as without servers. XMPP is not only used in IM but also collaborative services like sensor networks, multiplayer games and Internet-of-Things (IoT) as they require real-time event publication and distribution. In this paper we briefly describe XMPP and its usage in IM and also discuss the market share of XMPP. Key words: XMPP, Social Media Networks, Collaborative Services, Internet of things, Near Real-time communication I. HISTORY OF XMPP AND LESSONS LEARNT As discussed in [1], based on TCP, DNS and SSL and built as a client-server architecture XMPP prophesied for simple Fig.
    [Show full text]
  • Vysoké Učení Technické V Brně Nebezpečí Internetové Komunikace
    VYSOKÉ U ČENÍ TECHNICKÉ V BRN Ě BRNO UNIVERSITY OF TECHNOLOGY FAKULTA ELEKTROTECHNIKY A KOMUNIKA ČNÍCH TECHNOLOGIÍ ÚSTAV TELEKOMUNIKACÍ FACULTY OF ELECTRICAL ENGINEERING AND COMMUNICATION DEPARTMENT OF TELECOMMUNICATIONS NEBEZPE ČÍ INTERNETOVÉ KOMUNIKACE INTERNET COMMUNICATION RISKS BAKALÁ ŘSKÁ PRÁCE BACHELOR‘S THESIS AUTOR PRÁCE RADEK ŠT ĚRBA AUTHOR VEDOUCÍ PRÁCE ING. MICHAL POLÍVKA SUPERVISOR BRNO 2009 Anotace Tato práce se zabývá problematikou komunikačních protokolů a serverů. Jsou zde popsány protokoly TCP/IP. Dále jsou popsány čtyři nejpoužívanější IM protokoly (popis přihlašování, komunikace a zabezpečení). Jsou zde popsány protokoly pro hlasovou komunikaci a problematika softwarových ústředen. Dále jsou zde nastíněny databázové systémy hlavně LDAP. Součástí této práce je také praktická činnost – zprovoznění serveru pro hlasovou komunikaci a posílání zpráv a databáze LDAP. Je popsán postup pro zprovoznění jednotlivých serverů, navázání příslušných klientů na servery a v neposlední řadě komunikace s LDAP. Klíčová slova TCP/IP, Instant Messaging, Jabber, VoIP, SIP, LDAP, server, klient, odposlech, ústředna. Abstrakt This work deals with problems of communications protocols and servers. Primarily protocols TCP/IP are described. Next four the most used IM protocols (account of log in, communications and security) are described. Protocols for voice communications and problems of software phone systems are described here. Also database systems especially LDAP are mentioned here. A practical working is a part of this work too – a putting server for voice communications and sending messages and database LDAP into service. The process for putting the servers into service, connecting competent clients, and last but not least communications with LDAP are described. Key words TCP/IP, Instant Messaging, Jabber, VoIP, SIP, LDAP, server, client, wiretap, phone system.
    [Show full text]
  • Real-Time Communications Quick Start Guide
    Real-Time Communications Quick Start Guide Daniel Pocock [http://danielpocock.com] Real-Time Communications Quick Start Guide Daniel Pocock [http://danielpocock.com] Copyright © 2013, 2014, 2015 Daniel Pocock Table of Contents Preface ........................................................................................................................ x 1. Introduction .............................................................................................................. 1 Federation ............................................................................................................ 1 Independent and decentralized alternatives to federation ............................................... 1 Private networks ........................................................................................... 1 Decentralized networks .................................................................................. 1 Conclusion ................................................................................................... 2 Choosing between SIP and XMPP ........................................................................... 2 Choice of operating system ..................................................................................... 3 Using a ready-to-run or turn-key solution .......................................................... 3 Using a generic GNU/Linux distribution ........................................................... 3 Use latest software versions ...................................................................................
    [Show full text]
  • An Analysis of Instant Messaging and E- Mail Access Protocol Behavior in Wireless Environment
    An Analysis of Instant Messaging and E- mail Access Protocol Behavior in Wireless Environment IIP Mixture Project Simone Leggio Tuomas Kulve Oriana Riva Jarno Saarto Markku Kojo March 26, 2004 University of Helsinki - Department of Computer Science i TABLE OF CONTENTS 1 Introduction ..................................................................................................................................... 1 PART I: BACKGROUND AND PROTOCOL ANALYSIS ............................................................. 1 2 Instant Messaging............................................................................................................................ 1 3 ICQ.................................................................................................................................................. 3 3.1 Overview ................................................................................................................................. 3 3.2 Protocol Operation .................................................................................................................. 4 3.2.1 Client to Server................................................................................................................4 3.2.2 Client to Client ................................................................................................................5 3.2.3 Normal Operation............................................................................................................ 5 3.2.4 Abnormal Operation.......................................................................................................
    [Show full text]
  • Ejabberd 2.1.11 Installation and Operation Guide Contents
    ejabberd 2.1.11 Installation and Operation Guide Contents Chapter 1 Introduction 1.1 Key Features 1.2 Additional Features Chapter 2 Installing ejabberd 2.1 Installing ejabberd with Binary Installer 2.2 Installing ejabberd with Operating System Specific Packages 2.3 Installing ejabberd with CEAN 2.4 Installing ejabberd from Source Code 2.4.1 Requirements 2.4.2 Download Source Code 2.4.3 Compile 2.4.4 Install 2.4.5 Start 2.4.6 Specific Notes for BSD 2.4.7 Specific Notes for Sun Solaris 2.4.8 Specific Notes for Microsoft Windows 2.5 Create an XMPP Account for Administration 2.6 Upgrading ejabberd Chapter 3 Configuring ejabberd 3.1 Basic Configuration 3.1.1 Host Names 3.1.2 Virtual Hosting 3.1.3 Listening Ports 3.1.4 Authentication 3.1.5 Access Rules 3.1.6 Shapers 3.1.7 Default Language 3.1.8 CAPTCHA 3.1.9 STUN 3.1.10 Include Additional Configuration Files 3.1.11 Option Macros in Configuration File 3.2 Database and LDAP Configuration 3.2.1 MySQL 3.2.2 Microsoft SQL Server 3.2.3 PostgreSQL 3.2.4 ODBC Compatible 3.2.5 LDAP 3.3 Modules Configuration 3.3.1 Modules Overview 3.3.2 Common Options 3.3.3 mod_announce 3.3.4 mod_disco 3.3.5 mod_echo 3.3.6 mod_http_bind 3.3.7 mod_http_fileserver 3.3.8 mod_irc 3.3.9 mod_last 3.3.10 mod_muc 3.3.11 mod_muc_log 3.3.12 mod_offline 3.3.13 mod_ping 3.3.14 mod_pres_counter 3.3.15 mod_privacy 3.3.16 mod_private 3.3.17 mod_proxy65 3.3.18 mod_pubsub 3.3.19 mod_register 3.3.20 mod_register_web 3.3.21 mod_roster 3.3.22 mod_service_log 3.3.23 mod_shared_roster 3.3.24 mod_shared_roster_ldap 3.3.25 mod_sic 3.3.26 mod_stats
    [Show full text]
  • Openser XMPP-SIMPLE Gateway
    OpenSER XMPP-SIMPLE Gateway Daniel-Constantin Mierla Co-Founder OpenSER Project Target • Transparent XMPP-SIMPLE gateway • Open Source software • Instant Messaging • End-to-End Presence model • Client-Server Presence model • VoIP (Jingle-SIP) – only at signaling level if possible O February 24 FOSDEM 2007 Brussels, Belgium Previous work October 2002 SIMPLE-Jabber Gateway * Jabber 1.3 * SIP Express Router * FhG Fokus, Germany, Berlin Initial target: SIMPLE to any IM network * reuse of Jabber 1.3 IM gateways (transports) * have just on translation in SIP side (SIMPLE-XMPP) * SIMPLE – MSN * SIMPLE – ICQ * SIMPLE – Yahoo! O February 24 FOSDEM 2007 Brussels, Belgium Limitations of old version Scalability - for each SIP account must exist a Jabber account - each SIP account needed a TCP connection to Jabber server - too many connections from same IP to different IM servers Security - SIP users have to provide credentials to be stored in SIP server - some IM services accepts only one registration Interoperability - not all SIP users are visible in XMPP world and vice versa - delay in new XMPP/SIMPLE user propagation O February 24 FOSDEM 2007 Brussels, Belgium Requirements for new implementation Focus on XMPP - open protocols allow to improve the interoperability - trend to migrate to open protocols - XMPP is widely used IM&P protocol Transparent gatewaying - don't require extra credentials from users - one-to-one relation between XMPP address and SIP address using DNS - immediate visibility of the new accounts in both sides - gateway the signaling
    [Show full text]
  • Kommunikation Mit Jabber (XMPP)
    Sichere Unternehmens- kommunikation mit Jabber (XMPP) SLAC2008 Magdeburg 12. Dezember 2008 [email protected] <version>2008-12-12</version> <author>Holger Zuleger</author> <slide total=34>1</slide> > c Secure Jabber Agenda • Einführ ung —Kommunikationsar ten im Unternehmen —War um Jabber/XMPP • XMPP Kommunikationsmodell —Client Registrier ung —Ser ver − ServerKommunikation —Skalier ung • Softwareauswahl —Ser versoftware / Clientsoftware • Sicherheit —Client − ServerVerschlüsselung (TLS) —Ser ver − ServerDialback —Ende zu Ende Verschlüsselung —OTR • Zusammenfassung <version>2008-12-12</version> <author>Holger Zuleger</author> <slide total=34>2</slide> < > c Secure Jabber Kommunikationsar ten im Unternehmen • Inter ne Kommunikation E-Mail, Telefon, Meeting, Fax, Brief • Exter ne Kommunikation Br ief,Fax, E-Mail, Telefon, Meeting • Eigenschaften unterschiedlicher Kommunikationsar ten Komm.- Vorlauf- Reakt.- Multiuser- Medium form zeit zeit fähig Mail Text async − ≤ 5Tage ja Telefon Sprache sync unbest. − jein pers.Bild/ sync Tage - −ja Meeting Sprache Wochen Br ief/Fax Text async − ≥ 1Woche nein Video- Bild/ sync Tage − ja konferenz Sprache SMS Text async −Stunden nein Instant Text sync Presence Minuten ja Messaging Dienst <version>2008-12-12</version> <author>Holger Zuleger</author> <slide total=34>3</slide> < > c Secure Jabber WarumJabber/XMPP? • Viele verschiedene Instant Messaging Systeme verfügbar IRC,ICQ, AIM, Yahoo,MSN, Skype,Gadu Gadu, QQ, GoogleTalk • Meist properitäre Systeme • Separate ”Communities“ • Keine Kommunikation
    [Show full text]