ejabberd分析(四) 用户登录

仍然看ejabberd_c2s 这个gen_fsm 模块。

[plain]  view plain copy print ?
  1. RECV <stream:stream to="localhost" xmlns="jabber:client" xmlns:stream="http://etherx.jabber.org/streams" version="1.0">  
  2. SENT <?xml version='1.0' encoding='UTF-8'?><stream:stream xmlns:stream="http://etherx.jabber.org/streams" xmlns="jabber:client" from="kinglong" id="7acd9ea9" xml:lang="en" version="1.0">  
  3. SENT <stream:features><starttls xmlns="urn:ietf:params:xml:ns:xmpp-tls"></starttls>  
  4.        <mechanisms xmlns="urn:ietf:params:xml:ns:xmpp-sasl">  
  5.           <mechanism>DIGEST-MD5</mechanism>  
  6.           <mechanism>JIVE-SHAREDSECRET</mechanism>  
  7.           <mechanism>PLAIN</mechanism>  
  8.           <mechanism>ANONYMOUS</mechanism>  
  9.           <mechanism>CRAM-MD5</mechanism>  
  10.        </mechanisms>  
  11.       <compression xmlns="http://jabber.org/features/compress">  
  12.          <method>zlib</method>  
  13.       </compression>  
  14.       <auth xmlns="http://jabber.org/features/iq-auth"/>  
  15.       <register xmlns="http://jabber.org/features/iq-register"/>  
  16.      </stream:features>  
  17. RECV <starttls xmlns="urn:ietf:params:xml:ns:xmpp-tls"/>  
  18. RECV <stream:stream to="kinglong" xmlns="jabber:client" xmlns:stream="http://etherx.jabber.org/streams" version="1.0">  
  19. SENT <?xml version='1.0' encoding='UTF-8'?>  
  20.      <stream:stream xmlns:stream="http://etherx.jabber.org/streams" xmlns="jabber:client" from="kinglong" id="7acd9ea9" xml:lang="en" version="1.0">  
  21.         <stream:features>  
  22.           <mechanisms xmlns="urn:ietf:params:xml:ns:xmpp-sasl">  
  23.            <mechanism>DIGEST-MD5</mechanism>  
  24.            <mechanism>JIVE-SHAREDSECRET</mechanism>  
  25.            <mechanism>PLAIN</mechanism>  
  26.            <mechanism>ANONYMOUS</mechanism>  
  27.            <mechanism>CRAM-MD5</mechanism>  
  28.           </mechanisms>  
  29.           <compression xmlns="http://jabber.org/features/compress">  
  30.             <method>zlib</method>  
  31.           </compression>  
  32.          <auth xmlns="http://jabber.org/features/iq-auth"/>  
  33.           <register xmlns="http://jabber.org/features/iq-register"/>  
  34. </stream:features>  

上面客户端与服务器建立连接的初始几步直接略过。具体参见ejabberd分析(二),重点看下面的交互:

注:目前的状态为wait_for_feature_request

客户端发送如下的鉴权请求给服务器:

<auth mechanism="DIGEST-MD5" xmlns="urn:ietf:params:xml:ns:xmpp-sasl"></auth>

服务器端匹配到

[plain]  view plain copy print ?
  1. case {xml:get_attr_s("xmlns", Attrs), Name} of  
  2.     {?NS_SASL, "auth"} when not ((SockMod == gen_tcp) and TLSRequired) ->  
同时获取客户端选择的加密方式(DIGEST-MD5)。匹配到以下路径:

[plain]  view plain copy print ?
  1. case cyrsasl:server_start(StateData#state.sasl_state,  
  2.                       Mech,  
  3.                       ClientIn) of  
  4.          .........  
  5.         {continue, ServerOut, NewSASLState} ->  
  6.                    send_element(StateData,  
  7.                            {xmlelement, "challenge",  
  8.                            [{"xmlns", ?NS_SASL}],  
  9.                            [{xmlcdata,  
  10.                                jlib:encode_base64(ServerOut)}]}),  
  11.                    fsm_next_state(wait_for_sasl_response,  
  12.                            StateData#state{  
  13.                            sasl_state = NewSASLState});  
以上代码会向客户端发送challenge并将状态设置为wait_for_sasl_response:

<challenge xmlns="urn:ietf:params:xml:ns:xmpp-sasl">cmVhbG09Imtpbmdsb25nIixub25jZT0iQXZ4aFNmYXo3ZlpmMWpqdXh2Qmo4ZTF2SUZQRHNPWDdPUWVXVEFTdiIscW9wPSJhdXRoIixjaGFyc2V0PXV0Zi04LGFsZ29yaXRobT1tZDUtc2Vzcw==</challenge>

客户端收到后返回响应:

<response xmlns="urn:ietf:params:xml:ns:xmpp-sasl">Y2hhcnNldD11dGYtOCx1c2VybmFtZT0iMTU1NTUyMTU1NTQiLHJlYWxtPSJraW5nbG9uZyIsbm9uY2U9IkF2eGhTZmF6N2ZaZjFqanV4dkJqOGUxdklGUERzT1g3T1FlV1RBU3YiLG5jPTAwMDAwMDAxLGNub25jZT0icUlaU05ORjNGVmFRN0UzRklKUXI2UFpYaHZTa0hvOFkrZ2ZBVjJ0VCIsZGlnZXN0LXVyaT0ieG1wcC9raW5nbG9uZyIsbWF4YnVmPTY1NTM2LHJlc3BvbnNlPWYxNGM0NDc4NWYwMzNlMDZkNTE1Y2I3MjI4MzVlZmI2LHFvcD1hdXRoLGF1dGh6aWQ9IjE1NTU1MjE1NTU0Ig==</response>

xmpp的验证机制可参照网上的资料。

这里啰嗦两句:

前面的<starttls xmlns="urn:ietf:params:xml:ns:xmpp-tls"/>就是在进行TLS握手。先通过TLS传输密钥给客户端,再使用此密钥按照SASL协议进行用户名、密码等验证。

服务器端在wait_for_sasl_response函数中验证通过后发送鉴权通过的消息给客户端,并将状态设置为wait_for_stream:

<success xmlns="urn:ietf:params:xml:ns:xmpp-sasl">cnNwYXV0aD0wMjFkMjI4MTRmNjcwNDMxMTUxZDMwMTIwYzg3ODg0Ng==</success>

客户端继续发送如下消息给服务器,再次初始化一个流。

<stream:stream to="kinglong" xmlns="jabber:client" xmlns:stream="http://etherx.jabber.org/streams" version="1.0">

此时服务器端的状态已经为验证通过,但客户端未绑定资源:

[plain]  view plain copy print ?
  1. case StateData#state.authenticated of  
  2.              ......  
  3.              _ ->  
  4.                     case StateData#state.resource of  
  5.                     "" ->  
  6.                       ......  
  7.                       StreamFeatures =  
  8.                         [{xmlelement, "bind",  
  9.                           [{"xmlns", ?NS_BIND}], []},  
  10.                          {xmlelement, "session",  
  11.                           [{"xmlns", ?NS_SESSION}], []}]  
  12.                         ++ RosterVersioningFeature  
  13.                         ++ ejabberd_hooks:run_fold(  
  14.                              c2s_stream_features,  
  15.                              Server,  
  16.                              [], [Server]),  
服务器发送bind给客户端,并将状态设置为wait_for_bind:

<?xml version='1.0' encoding='UTF-8'?><stream:stream xmlns:stream="http://etherx.jabber.org/streams" xmlns="jabber:client" from="kinglong" id="7acd9ea9" xml:lang="en" version="1.0"><stream:features><compression xmlns="http://jabber.org/features/compress"><method>zlib</method></compression><bind xmlns="urn:ietf:params:xml:ns:xmpp-bind"/><session xmlns="urn:ietf:params:xml:ns:xmpp-session"/></stream:features>

客户端接收到后发送bind响应,绑定自己的资源:

<iq id="T2U7N-0" type="set"><bind xmlns="urn:ietf:params:xml:ns:xmpp-bind"><resource>Spark 2.6.3</resource></bind></iq>

服务器端在wait_for_bind 函数中进行资源冲突的检查,完成绑定后返回成功的消息,并将状态设置为wait_for_session,等待客户端建立session:

<iq type="result" id="T2U7N-0" to="kinglong/7acd9ea9"><bind xmlns="urn:ietf:params:xml:ns:xmpp-bind"><jid>12345678910@kinglong/Spark 2.6.3</jid></bind></iq>

客户端发送session请求给服务器端:

<iq id="T2U7N-1" type="set"><session xmlns="urn:ietf:params:xml:ns:xmpp-session"/></iq>

服务器端的wait_for_session函数中:

[plain]  view plain copy print ?
  1. case jlib:iq_query_info(El) of  
  2.     #iq{type = set, xmlns = ?NS_SESSION} ->  
  3.            ......  
  4.            Res = jlib:make_result_iq_reply(El),  
  5.                 send_element(StateData, Res),  
对消息进行判断,成功后然后返回result消息:

<iq type="result" id="T2U7N-1" to="15555215554@kinglong/Spark 2.6.3"><session xmlns="urn:ietf:params:xml:ns:xmpp-session"/></iq>

接下来调用

[plain]  view plain copy print ?
  1. ejabberd_sm:open_session(  
  2.               SID, U, StateData#state.server, R, Info)  
来创建session,并将状态设置为session_established,并在session_established2中处理接下来的客户端消息。

  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 0
    评论

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值