| Summary: | Kopete jabber protocol outdated | ||
|---|---|---|---|
| Product: | TDE | Reporter: | Kris <krisgamrat> |
| Component: | tdenetwork | Assignee: | Slávek Banko <slavek.banko> |
| Status: | RESOLVED FIXED | ||
| Severity: | minor | CC: | bugwatch, matrixx-trinity, michele.calgaro, slavek.banko |
| Priority: | P5 | ||
| Version: | R14.0.0 [Trinity] | ||
| Hardware: | All | ||
| OS: | Linux | ||
| See Also: | http://bugs.pearsoncomputing.net/show_bug.cgi?id=2669 | ||
| Compiler Version: | TDE Version String: | ||
| Application Version: | Application Name: | ||
| Bug Depends on: | |||
| Bug Blocks: | 2575 | ||
| Attachments: |
Not force old XMPP protocol
Allow SRV lookup for server+port Add SASL PLAIN method for authentication Final patch to prevent startup crashes |
||
|
Description
Kris
2011-11-28 11:03:05 CST
A link to the new specification, and possibly what has changed in that specification versus the Kopete-included version would help this bug to get attention. I wouldn't know what changed. I only know what my good friend Google told me, and he/she/it has confirmed it several times :-) I will try asking Google to fetch me the link later when I have time to do some serious searching. I don't know who maintains the official specs. I'm sure it wouldn't be too hard to hack the protocol out of Kopete for KDE4, though, since it works fine with Facebook (or at least, when I had Facebook). I finally got around to querying Google. I found the official XMPP Standards Foundation site at http://xmpp.org/ . Pointing at "Protocols" in the navigation bar at the top will produce a menu. Here are the links for convenience: Link from clicking menu: http://xmpp.org/xmpp-protocols/ Protocol Namespaces: http://xmpp.org/xmpp-protocols/protocol-namespaces/ Protocol Stack: http://xmpp.org/xmpp-protocols/xmpp-core/ XMPP Extensions: http://xmpp.org/xmpp-protocols/xmpp-extensions/ Internet Drafts: http://xmpp.org/xmpp-protocols/internet-drafts/ RFCs: http://xmpp.org/xmpp-protocols/rfcs/ Since I'm nowhere near being an expert at XMPP or coding, and don't have a reference to use for comparison, I couldn't say what changed. Hopefully the above links help though. The most important are probably: - Support for DNS SRV queries for server information: decribed in RFC 6120, section 3.2 > workaround: find the target IP address and port manually and fill into the configuration form. - Support for StartTLS - introduced in RFC 6120, section 5 > workaround: none(?); traditional TLS (not supported everywhere anymore); unencrpyted connection. These issues are becoming more important with introduction of virtual jabber servers. Created attachment 2720 [details]
Not force old XMPP protocol
I have examined the code, and found that kopete enforces the use of an older protocol (XMPP 0.9) in all cases, regardless of whether the user has forced the use of a specific server + port. However, enforcement of an older protocol prevents, for example, use StartTLS. With attached patch is forcing the use of older protocol + server + port only if it is set by the user.
Created attachment 2721 [details]
Allow SRV lookup for server+port
In order to patch above would work properly, it is necessary to add a lookup for server and port using the SRV record. The second patch from this series adds just this.
Created attachment 2722 [details]
Add SASL PLAIN method for authentication
When using StartTLS, it is used SASL for authentication. Because communication is already encrypted, SASL PLAIN method can be used. The third patch from this series adds just SASL PLAIN method.
With patches above is already possible to connect to jabber servers using encrypted communication on port 5222. However, during testing I noticed frequent crash during login. This will require further efforts. Created attachment 2732 [details]
Final patch to prevent startup crashes
This patch avoids crashes at startup.
Patches pushed to GIT + attachment 2721 [details] in hash d2625220 (master) and 8988b1a5 (r14.0.x) + attachment 2722 [details] in hash a9aee0e6 (master) and f94fdac5 (r14.0.x) + attachment 2720 [details] in hash 2a0baddd (master) and a1ff2d63 (r14.0.x) + attachment 2732 [details] in hash d6dc04be (master) and f43fe7ee (r14.0.x) It seems that the fundamental weaknesses are now solved. Therefore, I close this bug report. Thank you for your patience! |