Wiki - Freifunk Pinneberg

Freies WLAN im Kreis Pinneberg

Benutzer-Werkzeuge

Webseiten-Werkzeuge


prosody

Unterschiede

Hier werden die Unterschiede zwischen zwei Versionen angezeigt.

Link zu dieser Vergleichsansicht

Nächste Überarbeitung
Vorhergehende Überarbeitung
prosody [05.12.2015 21:44] – angelegt havelockprosody [25.12.2015 11:13] (aktuell) – [Konfiguration] x1lent
Zeile 1: Zeile 1:
-Prosody+====== Prosody ======
  
-    Installation auf ffpi-services +  * Installation auf ffpi-services 
-    Wird unter xmpp.ffpi oder xmpp.pinneberg.freifunk.net erreichbar sein+  * Ist unter xmpp.ffpi oder xmpp.pinneberg.freifunk.net erreichbar 
  
-Warum Prosody?+===== Warum Prosody? =====
  
-Sicher fragt man sich warum wir kein ejabberd nutzen. Dies ist schlicht und ergreifend eigenen Präferenz. Ich persöhnlich störe mich daran bei ejabberd die Cipher-Suites für den verschlüsselten Austausch mit anderen Servern nicht manuell einstellen zu können. Weiterhin lässt sich ejabberd meiner Meinung schlechter warten, da es mit erlang geschrieben wurde. Prosody im Kontrast wurde mit lua geschrieben. Alleine schon die Packages die für den Betrieb benötigt werden sind kleiner und weniger von der Anzahl her. Weiterhin verbraucht Prosody nur 1/3 des Speicherbedarf von ejabberd. +Sicher fragt man sich warum wir kein ejabberd nutzen. Dies ist schlicht und ergreifend eigenen Präferenz. Ich persönlich störe mich daran bei ejabberd die Cipher-Suites für den verschlüsselten Austausch mit anderen Servern nicht manuell einstellen zu können. Weiterhin lässt sich ejabberd meiner Meinung schlechter warten, da es mit erlang geschrieben wurde. Prosody im Kontrast wurde mit lua geschrieben. Alleine schon die Packages die für den Betrieb benötigt werden sind kleiner und weniger von der Anzahl her. Weiterhin verbraucht Prosody nur 1/3 des Speicherbedarfs von ejabberd. 
-Installation+ 
 +===== Installation =====
  
 Vorausgesetzt wird ein Debian Jessie 8.1 System. Vorausgesetzt wird ein Debian Jessie 8.1 System.
Zeile 13: Zeile 14:
 Als erstes muss die Paketquelle von Prosody hinzugefügt werden: Als erstes muss die Paketquelle von Prosody hinzugefügt werden:
  
 +<code>
 echo "deb http://packages.prosody.im/debian jessie main" > /etc/apt/sources.list.d/prosody.sources.list echo "deb http://packages.prosody.im/debian jessie main" > /etc/apt/sources.list.d/prosody.sources.list
 wget https://prosody.im/files/prosody-debian-packages.key -O- | apt-key add - wget https://prosody.im/files/prosody-debian-packages.key -O- | apt-key add -
 apt-get update apt-get update
 +</code>
  
 Nachdem dies erledigt wurde wird prosody an sich installiert: Nachdem dies erledigt wurde wird prosody an sich installiert:
  
 +<code>
 apt-get update apt-get update
-apt-get install prosody lua-sec+apt-get install prosody lua-sec lua-dbi-mysql lua-event lua-zlib 
 +</code>
  
-Sollte die Version von lua-sec aus dem offiziellen Package Repos < 5.0 sein solltet ihr anstatt von lua-sec lua-sec-prosody installieren, dies trifft zum Beispiel auf Debian Wheezy zu. +Sollte die Version von lua-sec aus dem offiziellen Package Repos < 5.0 sein solltet ihr anstelle von lua-sec lua-sec-prosody installieren. Dies trifft zum Beispiel auf Debian Wheezy zu.
-Modifikation+
  
-Da es nur Clients aus dem FFPI Netz erlaubt werden soll einen Account beim XMPP Server zu erstellen muss die mod_register.lua modifiziert werden, da prosody das nicht von Haus aus unterstützt. Weiterhin wollen wir, dass der XMPP Server bei der Registration für mehrere VirtualHosts einen Account erstellt.+===== Modifikation =====
  
-/usr/lib/prosody/modules/mod_register.lua+Da es nur Clients aus dem FFPI Netz erlaubt werden soll einen Account beim XMPP Server zu erstellen und dieser Account weiterhin auf beiden Hosts (xmpp.ffpi und xmpp.pinneberg.freifunk.net) registriert werden muss benutzen wir mod_register_web in einer modifizierten Version.
  
-    [...] +<code> 
-    local blacklisted_ips = module:get_option("registration_blacklist") or {}; +cd /usr/lib/prosody/modules/ 
-    local whitelist_ip_starts_with = module:get_option("registration_whitelist_starts_with"); +apt-get install git 
-    local register_hosts = module:get_option("registration_hosts"); +git clone https://github.com/freifunk-pinneberg/mod_register_web.git 
-    --IP Check for FFPI -- +</code> 
-    function checkIP(ipadress,whitelist_start) +===== Konfiguration =====
-    for i, ipstart in ipairs(whitelist_start) do +
-    if string.sub(ipadress,1,string.len(ipstart))==ipstart then +
-    return true +
-    end +
-        end +
-        return false +
-    end +
-      +
-    [...] +
-      +
-    elseif blacklisted_ips[session.ip] or (whitelist_only and not whitelisted_ips[session.ip]) then +
-        module:log("debug", "Check for WhiteList Strart"+
-        if (whitelist_only and not checkIP(session.ip,whitelist_ip_starts_with) then +
-            session.send(st.error_reply(stanza, "cancel", "not-acceptable", "You are not allowed to register an account.")); +
-     return true; +
-        end +
-    [...] +
-      +
-    else +
-    -- TODO unable to write file, file may be locked, etc, what's the correct error? +
-        local error_reply st.error_reply(stanza, "wait", "internal-server-error", "Failed to write data to disk."); +
-      +
-        for i, reg_host in ipairs(register_hosts) do +
-    module:log("debug","host test: %s",reg_host) +
-    if usermanager_create_user(username, password, reg_host) then +
-        if next(data) and not account_details:set(username, data) then +
-            usermanager_delete_user(username, reg_host); +
-    session.send(error_reply); +
-    return true; +
-        end +
-        session.send(st.reply(stanza)); -- user created! +
-        module:log("info", "User account created: %s@%s", username, reg_host); +
-        module:fire_event("user-registered",+
-                    username username, reg_host reg_host, source "mod_register", +
-    session session }); +
-            else +
-        session.send(error_reply); +
-    end +
-       end +
-    [...]+
  
-Konfiguration 
  
 Als erstes wird der DH-Schlüssel für FS (Forward Secrecy) generiert: Als erstes wird der DH-Schlüssel für FS (Forward Secrecy) generiert:
 +<code>
 openssl dhparam -out /etc/prosody/certs/dh_4096.pem 4096 openssl dhparam -out /etc/prosody/certs/dh_4096.pem 4096
 +</code>
 +Dies kann einige Zeit dauern. In der Zwischenzeit erstellen wir daher einen User und eine Datenbank für prosody:
  
-Dies kann einige Zeit dauernAlso in der Zwischenzeit einen Kaffee machen.+<code> 
 +mysql -u root -p 
 +mysql> create database prosody; 
 +mysql> grant usage on *.* to prosody@localhost identified by 'extremelySECRET'; 
 +mysql> grant all privileges on prosody.* to prosody@localhost; 
 +</code>
  
-Nun geht es an die eigentliche Anpassung von Prosody. Die Namen der Domainzertifikate sowie die Domain müssen natürlich entsprechend ausgefüllt werden.+Nun geht es an die eigentliche Konfiguration von Prosody. Die Namen der Domainzertifikate sowie die Domain müssen natürlich entsprechend ausgefüllt werden.
  
-/etc/prosody/prosody.cfg.lua+<file lua /etc/prosody/prosody.cfg.lua
 +-- Prosody XMPP Server Configuration 
 +-- 
 +-- Information on configuring Prosody can be found on our 
 +-- website at http://prosody.im/doc/configure 
 +-- 
 +-- Tip: You can check that the syntax of this file is correct 
 +-- when you have finished by running: luac -p prosody.cfg.lua 
 +-- If there are any errors, it will let you know what and where 
 +-- they are, otherwise it will keep quiet. 
 +-- 
 +-- Good luck, and happy Jabbering! 
 +  
 +  
 +---------- Server-wide settings ---------- 
 +-- Settings in this section apply to the whole server and are the default settings 
 +-- for any virtual hosts 
 +  
 +-- This is a (by default, empty) list of accounts that are admins 
 +-- for the server. Note that you must create the accounts separately 
 +-- (see http://prosody.im/doc/creating_accounts for info) 
 +-- Example: admins = { "user1@example.com", "user2@example.net"
 +admins = {} 
 +  
 +-- Enable use of libevent for better performance under high load 
 +-- For more information see: http://prosody.im/doc/libevent 
 +use_libevent = true;
  
-    -- Prosody XMPP Server Configuration + 
-    -- +plugin_paths = {""
-    -- Information on configuring Prosody can be found on our +  
-    -- website at http://prosody.im/doc/configure +-- This is the list of modules Prosody will load on startup. 
-    -- +-- It looks for mod_modulename.lua in the plugins folder, so make sure that exists too. 
-    -- Tip: You can check that the syntax of this file is correct +-- Documentation on modules can be found at: http://prosody.im/doc/modules 
-    -- when you have finished by running: luac -p prosody.cfg.lua +modules_enabled = { 
-    -- If there are any errors, it will let you know what and where +  
-    -- they are, otherwise it will keep quiet. +        -- Generally required 
-    -- +                "roster"; -- Allow users to have a roster. Recommended ;) 
-    -- Good luck, and happy Jabbering! +                "saslauth"; -- Authentication for clients and servers. Recommended if you want to log in. 
-      +                "tls"; -- Add support for secure TLS on c2s/s2s connections 
-      +                "dialback"; -- s2s dialback support 
-    ---------- Server-wide settings ---------- +                "disco"; -- Service discovery 
-    -- Settings in this section apply to the whole server and are the default settings +                "posix"; -- POSIX functionality, sends server to background, enables syslog, etc. 
-    -- for any virtual hosts +  
-      +        -- Not essential, but recommended 
-    -- This is a (by default, empty) list of accounts that are admins +                "private"; -- Private XML storage (for room bookmarks, etc.) 
-    -- for the server. Note that you must create the accounts separately +                "vcard"; -- Allow users to set vCards 
-    -- (see http://prosody.im/doc/creating_accounts for info) +  
-    -- Example: admins = { "user1@example.com", "user2@example.net" } +        -- These are commented by default as they have a performance impact 
-    admins = {} +                --"privacy"; -- Support privacy lists 
-      +                "compression"; -- Stream compression (requires the lua-zlib package installed) 
-    -- Enable use of libevent for better performance under high load +  
-    -- For more information see: http://prosody.im/doc/libevent +        -- Nice to have 
-    --use_libevent = true; + "http"; 
-      + "register_web"; 
-    -- This is the list of modules Prosody will load on startup. +                "version"; -- Replies to server version requests 
-    -- It looks for mod_modulename.lua in the plugins folder, so make sure that exists too. +                "uptime"; -- Report how long server has been running 
-    -- Documentation on modules can be found at: http://prosody.im/doc/modules +                "time"; -- Let others know the time here on this server 
-    modules_enabled = { +                "ping"; -- Replies to XMPP pings with pongs 
-      +                "pep"; -- Enables users to publish their mood, activity, playing music and more 
-            -- Generally required +                --"register"; -- Allow users to register on this server using a client and change passwords 
-                    "roster"; -- Allow users to have a roster. Recommended ;) +  
-                    "saslauth"; -- Authentication for clients and servers. Recommended if you want to log in. +        -- Admin interfaces 
-                    "tls"; -- Add support for secure TLS on c2s/s2s connections +                "admin_adhoc"; -- Allows administration via an XMPP client that supports ad-hoc commands 
-                    "dialback"; -- s2s dialback support +                --"admin_telnet"; -- Opens telnet console interface on localhost port 5582 
-                    "disco"; -- Service discovery +  
-                    "posix"; -- POSIX functionality, sends server to background, enables syslog, etc. +        -- HTTP modules 
-      +                --"bosh"; -- Enable BOSH clients, aka "Jabber over HTTP" 
-            -- Not essential, but recommended +                "http_files"; -- Serve static files from a directory over HTTP 
-                    "private"; -- Private XML storage (for room bookmarks, etc.) +  
-                    "vcard"; -- Allow users to set vCards +        -- Other specific functionality 
-      +                --"groups"; -- Shared roster support 
-            -- These are commented by default as they have a performance impact +                --"announce"; -- Send announcement to all online users 
-                    --"privacy"; -- Support privacy lists +                --"welcome"; -- Welcome users who register accounts 
-                    --"compression"; -- Stream compression (requires the lua-zlib package installed) +                --"watchregistrations"; -- Alert admins of registrations 
-      +                --"motd"; -- Send a message to users when they log in 
-            -- Nice to have +                --"legacyauth"; -- Legacy authentication. Only used by some old clients and bots. 
-                    "version"; -- Replies to server version requests +}; 
-                    "uptime"; -- Report how long server has been running +  
-                    "time"; -- Let others know the time here on this server +-- These modules are auto-loaded, but should you want 
-                    "ping"; -- Replies to XMPP pings with pongs +-- to disable them then uncomment them here: 
-                    "pep"; -- Enables users to publish their mood, activity, playing music and more +modules_disabled = { 
-                    "register"; -- Allow users to register on this server using a client and change passwords +        -- "offline"; -- Store offline messages 
-      +        -- "c2s"; -- Handle client connections 
-            -- Admin interfaces +        -- "s2s"; -- Handle server-to-server connections 
-                    "admin_adhoc"; -- Allows administration via an XMPP client that supports ad-hoc commands +}; 
-                    --"admin_telnet"; -- Opens telnet console interface on localhost port 5582 +  
-      +-- Disable account creation by default, for security 
-            -- HTTP modules +-- For more information see http://prosody.im/doc/creating_accounts 
-                    --"bosh"; -- Enable BOSH clients, aka "Jabber over HTTP" +allow_registration = true; 
-                    --"http_files"; -- Serve static files from a directory over HTTP +registration_hosts={'xmpp.ffpi', 'xmpp.pinneberg.freifunk.net'
-      +  
-            -- Other specific functionality +daemonize = true; 
-                    --"groups"; -- Shared roster support +-- Required for init scripts and prosodyctl 
-                    --"announce"; -- Send announcement to all online users +pidfile = "/var/run/prosody/prosody.pid"; 
-                    --"welcome"; -- Welcome users who register accounts + 
-                    --"watchregistrations"; -- Alert admins of registrations +http_files_dir="/usr/lib/prosody/modules/mod_register_web/templates/ressources/"; 
-                    --"motd"; -- Send a message to users when they log in +http_dir_listing=true; 
-                    --"legacyauth"; -- Legacy authentication. Only used by some old clients and bots. + 
-    }; +http_ports = { 5280 } 
-      +http_interfaces = { "127.0.0.1","::1"
-    -- These modules are auto-loaded, but should you want + 
-    -- to disable them then uncomment them here: +-- These are the SSL/TLS-related settings. If you don't want 
-    modules_disabled = { +-- to use SSL/TLS, you may comment or remove this 
-            -- "offline"; -- Store offline messages +ssl = { 
-            -- "c2s"; -- Handle client connections +        key = "/etc/prosody/certs/localhost.key"; 
-            -- "s2s"; -- Handle server-to-server connections +        certificate = "/etc/prosody/certs/localhost.crt"; 
-    }; +
-      +  
-    -- Disable account creation by default, for security +-- Force clients to use encrypted connections? This option will 
-    -- For more information see http://prosody.im/doc/creating_accounts +-- prevent clients from authenticating unless they are using encryption. 
-    allow_registration = true; +  
-    whitelist_registration_only = true; +c2s_require_encryption = true 
-    registration_whitelist_starts_with = { '10.137.', 'fde8:21c6:9d82:'+  
-    registration_hosts = {'xmpp.ffpi', 'xmpp.pinneberg.freifunk.net'+-- Force certificate authentication for server-to-server connections? 
-      +-- This provides ideal security, but requires servers you communicate 
-      +-- with to support encryption AND present valid, trusted certificates. 
-    daemonize = true; +-- NOTE: Your version of LuaSec must support certificate verification! 
-    -- Required for init scripts and prosodyctl +-- For more information see http://prosody.im/doc/s2s#security 
-    pidfile = "/var/run/prosody/prosody.pid"; +  
-      +s2s_require_encryption = true 
-    -- These are the SSL/TLS-related settings. If you don't want +s2s_secure_auth = false 
-    -- to use SSL/TLS, you may comment or remove this +  
-    ssl = { +-- Many servers don't support encryption or have invalid or self-signed 
-            key = "/etc/prosody/certs/localhost.key"; +-- certificates. You can list domains here that will not be required to 
-            certificate = "/etc/prosody/certs/localhost.crt"; +-- authenticate using certificates. They will be authenticated using DNS. 
-    +  
-      +s2s_insecure_domains = { "gmail.com"
-    -- Force clients to use encrypted connections? This option will +  
-    -- prevent clients from authenticating unless they are using encryption. +-- Even if you leave s2s_secure_auth disabled, you can still require valid 
-      +-- certificates for some domains by specifying a list here. 
-    c2s_require_encryption = true +  
-      +s2s_secure_domains = { "jabber.org"
-    -- Force certificate authentication for server-to-server connections? +  
-    -- This provides ideal security, but requires servers you communicate +-- Select the authentication backend to use. The 'internal' providers 
-    -- with to support encryption AND present valid, trusted certificates. +-- use Prosody's configured data storage to store the authentication data. 
-    -- NOTE: Your version of LuaSec must support certificate verification! +-- To allow Prosody to offer secure authentication mechanisms to clients, the 
-    -- For more information see http://prosody.im/doc/s2s#security +-- default provider stores passwords in plaintext. If you do not trust your 
-      +-- server please see http://prosody.im/doc/modules/mod_auth_internal_hashed 
-    s2s_require_encryption = true +-- for information about using the hashed backend. 
-    s2s_secure_auth = false +  
-      +--authentication = "internal_plain" 
-    -- Many servers don't support encryption or have invalid or self-signed +  
-    -- certificates. You can list domains here that will not be required to +-- we want passwords to be hashed on disk! 
-    -- authenticate using certificates. They will be authenticated using DNS. +authentication = "internal_hashed" 
-      +  
-    s2s_insecure_domains = { "gmail.com"+-- Select the storage backend to use. By default Prosody uses flat files 
-      +-- in its configured data directory, but it also supports more backends 
-    -- Even if you leave s2s_secure_auth disabled, you can still require valid +-- through modules. An "sql" backend is included by default, but requires 
-    -- certificates for some domains by specifying a list here. +-- additional dependencies. See http://prosody.im/doc/storage for more info. 
-      +  
-    s2s_secure_domains = { "jabber.org"+storage = "sql" -- Default is "internal" 
-      +  
-    -- Select the authentication backend to use. The 'internal' providers +-- For the "sql" backend, you can uncomment *one* of the below to configure: 
-    -- use Prosody's configured data storage to store the authentication data. +--sql = { driver = "SQLite3", database = "prosody.sqlite" } -- Default. 'database' is the filename. 
-    -- To allow Prosody to offer secure authentication mechanisms to clients, the +sql = { driver = "MySQL", database = "prosody", username = "prosody", password = "extremelySECRET", host = "localhost"
-    -- default provider stores passwords in plaintext. If you do not trust your +--sql = { driver = "PostgreSQL", database = "prosody", username = "prosody", password = "secret", host = "localhost"
-    -- server please see http://prosody.im/doc/modules/mod_auth_internal_hashed +  
-    -- for information about using the hashed backend. +-- Logging configuration 
-      +-- For advanced logging see http://prosody.im/doc/logging 
-    --authentication = "internal_plain" +log = { 
-      +        info = "/var/log/prosody/prosody.log"; -- Change 'info' to 'debug' for verbose logging 
-    -- we want passwords to be hashed on disk! +        error = "/var/log/prosody/prosody.err"; 
-    authentication = "internal_hashed" +       -- Syslog: 
-      +       { levels = { "error" }; to = "syslog";  }; 
-    -- Select the storage backend to use. By default Prosody uses flat files +--        "*syslog"; 
-    -- in its configured data directory, but it also supports more backends +
-    -- through modules. An "sql" backend is included by default, but requires +  
-    -- additional dependencies. See http://prosody.im/doc/storage for more info. + 
-      + 
-    --storage = "sql" -- Default is "internal" + 
-      +http_paths = { 
-    -- For the "sql" backend, you can uncomment *one* of the below to configure: + register_web = "/"; 
-    --sql = { driver = "SQLite3", database = "prosody.sqlite" } -- Default. 'database' is the filename. + files="/files"; 
-    --sql = { driver = "MySQL", database = "prosody", username = "prosody", password = "secret", host = "localhost"+
-    --sql = { driver = "PostgreSQL", database = "prosody", username = "prosody", password = "secret", host = "localhost"+ 
-      +http_host = "127.0.0.1" 
-    -- Logging configuration + 
-    -- For advanced logging see http://prosody.im/doc/logging +----------- Virtual hosts ----------- 
-    log = { +-- You need to add a VirtualHost entry for each domain you wish Prosody to serve. 
-            info = "/var/log/prosody/prosody.log"; -- Change 'info' to 'debug' for verbose logging +-- Settings under each VirtualHost entry apply *only* to that host. 
-            error = "/var/log/prosody/prosody.err"; + 
-           -- Syslog: +  
-           { levels = { "error" }; to = "syslog";  }; +--VirtualHost "localhost" 
-    --        "*syslog"; +  
-    +-- Section for host 
-      +  
-    ----------- Virtual hosts ----------- +VirtualHost "xmpp.ffpi
-    -- You need to add a VirtualHost entry for each domain you wish Prosody to serve. +        --enabled = false -- Remove this line to enable this host 
-    -- Settings under each VirtualHost entry apply *only* to that host. +  
-      +        -- Assign this host a certificate for TLS, otherwise it would use the one 
-    VirtualHost "localhost" +        -- set in the global section (if any). 
-      +        -- Note that old-style SSL on port 5223 only supports one certificate, and will always 
-    -- Section for host +        -- use the global one. 
-      +        ssl = { 
-    VirtualHost "hier der domain name+                key = "/etc/prosody/certs/localhost.key"; 
-            --enabled = false -- Remove this line to enable this host +                certificate = "/etc/prosody/certs/localhost.crt"; 
-      +  
-            -- Assign this host a certificate for TLS, otherwise it would use the one +                -- We do not want SSL2 and SSL3, no compression, no client cipher preference. 
-            -- set in the global section (if any). +                options = { "no_sslv2", "no_sslv3", "no_ticket", "no_compression", "cipher_server_preference", "single_dh_use", "single_ecdh_use" }; 
-            -- Note that old-style SSL on port 5223 only supports one certificate, and will always +                --options = { "no_sslv2", "no_sslv3", "no_ticket", "no_compression", "single_dh_use", "single_ecdh_use" }; 
-            -- use the global one. +                --options = { "no_sslv2", "no_sslv3", "no_compression", "cipher_server_preference" }; 
-            ssl = { +                -- Only FS (Forward Secrecy) Ciphers 
-                    key = "/etc/prosody/certs/domain_name_dec.de.key"; +                ciphers = "EECDH+AESGCM:EDH+AESGCM:EECDH:EDH:AES256-GCM-SHA384:AES128-GCM-SHA256:!MD5:!RC4:!LOW:!MEDIUM:!CAMELLIA:!ECDSA:!DES:!DSS:!3DES:!NULL"; 
-                    certificate = "/etc/prosody/certs/domain_name.de_chain.pem"; +                dhparam = "/etc/prosody/certs/dh_4096.pem"; 
-      +                } 
-                    -- We do not want SSL2 and SSL3, no compression, no client cipher preference. + 
-                    options = { "no_sslv2", "no_sslv3", "no_ticket", "no_compression", "cipher_server_preference", "single_dh_use", "single_ecdh_use" }; + 
-                    --options = { "no_sslv2", "no_sslv3", "no_ticket", "no_compression", "single_dh_use", "single_ecdh_use" }; + 
-                    --options = { "no_sslv2", "no_sslv3", "no_compression", "cipher_server_preference" }; +VirtualHost "xmpp.pinneberg.freifunk.net" 
-                    -- Only FS (Forward Secrecy) Ciphers +        --enabled = false -- Remove this line to enable this host 
-                    ciphers = "EECDH+AESGCM:EDH+AESGCM:EECDH:EDH:AES256-GCM-SHA384:AES128-GCM-SHA256:!MD5:!RC4:!LOW:!MEDIUM:!CAMELLIA:!ECDSA:!DES:!DSS:!3DES:!NULL"; +  
-                    dhparam = "/etc/prosody/certs/dh_4096.pem"; +        -- Assign this host a certificate for TLS, otherwise it would use the one 
-                    +        -- set in the global section (if any). 
-      +        -- Note that old-style SSL on port 5223 only supports one certificate, and will always 
-    ------ Components ------ +        -- use the global one. 
-    -- You can specify components to add hosts that provide special services, +        ssl = { 
-    -- like multi-user conferences, and transports. +                key = "/etc/prosody/certs/localhost.key"; 
-    -- For more information on components, see http://prosody.im/doc/components +                certificate = "/etc/prosody/certs/localhost.crt"; 
-      +  
-    -- Set up a MUC (multi-user chat) room server on conference.example.com: +                -- We do not want SSL2 and SSL3, no compression, no client cipher preference. 
-    --Component "conference.example.com" "muc" +                options = { "no_sslv2", "no_sslv3", "no_ticket", "no_compression", "cipher_server_preference", "single_dh_use", "single_ecdh_use" }; 
-      +                --options = { "no_sslv2", "no_sslv3", "no_ticket", "no_compression", "single_dh_use", "single_ecdh_use" }; 
-    -- Set up a SOCKS5 bytestream proxy for server-proxied file transfers: +                --options = { "no_sslv2", "no_sslv3", "no_compression", "cipher_server_preference" }; 
-    --Component "proxy.example.com" "proxy65" +                -- Only FS (Forward Secrecy) Ciphers 
-      +                ciphers = "EECDH+AESGCM:EDH+AESGCM:EECDH:EDH:AES256-GCM-SHA384:AES128-GCM-SHA256:!MD5:!RC4:!LOW:!MEDIUM:!CAMELLIA:!ECDSA:!DES:!DSS:!3DES:!NULL"; 
-    ---Set up an external component (default component port is 5347) +                dhparam = "/etc/prosody/certs/dh_4096.pem"; 
-    --Component "gateway.example.com" +                
-    --        component_secret = "password"+  
 +------ Components ------ 
 +-- You can specify components to add hosts that provide special services, 
 +-- like multi-user conferences, and transports. 
 +-- For more information on components, see http://prosody.im/doc/components 
 +  
 +-- Set up a MUC (multi-user chat) room server on conference.example.com: 
 +--Component "conference.example.com" "muc" 
 +  
 +-- Set up a SOCKS5 bytestream proxy for server-proxied file transfers: 
 +--Component "proxy.example.com" "proxy65" 
 +  
 +---Set up an external component (default component port is 5347) 
 +--Component "gateway.example.com" 
 +--        component_secret = "password" 
 + 
 +</file>
  
 Bei der Auswahl der Ciphers wurde ein besonderes Augenmerk auf die Sicherheit der Übertragung gelegt. Leider lässt sich eine eine ausschließe Verwendung von FS-Ciphers nicht umsetzen, da viele Server kein FS Support haben. Um aber trotzdem mit diesen Servern kommunizieren zu können wurde AES-128/256 im GCM (Galois-Counter-Mode) aktiviert. Bei der Auswahl der Ciphers wurde ein besonderes Augenmerk auf die Sicherheit der Übertragung gelegt. Leider lässt sich eine eine ausschließe Verwendung von FS-Ciphers nicht umsetzen, da viele Server kein FS Support haben. Um aber trotzdem mit diesen Servern kommunizieren zu können wurde AES-128/256 im GCM (Galois-Counter-Mode) aktiviert.
-DNS-Konfiguration+ 
 +===== DNS-Konfiguration ===== 
  
 Jetzt müssen noch die richtigen DNS Einträge für den Server gesetzt werden. Jetzt müssen noch die richtigen DNS Einträge für den Server gesetzt werden.
  
-ffpi.zone+<file conf ffpi.zone>
  
     ; _service._proto.name TTL class SRV priority weight port target     ; _service._proto.name TTL class SRV priority weight port target
     _xmpp-client._tcp.ffpi. 86400 IN SRV 5 0 5222 srv02.ffpi.     _xmpp-client._tcp.ffpi. 86400 IN SRV 5 0 5222 srv02.ffpi.
     _xmpp-server._tcp.ffpi. 86400 IN SRV 5 0 5269 srv02.ffpi.     _xmpp-server._tcp.ffpi. 86400 IN SRV 5 0 5269 srv02.ffpi.
 +</file>
  
-Abschluss+===== Abschluss =====
  
-Anschließend Prosody einmal neustarten+Abschließend Prosody einmal neustarten
  
-service prosody restart+  service prosody restart
  
  
prosody.1449348264.txt.gz · Zuletzt geändert: 05.12.2015 21:44 von havelock