Skip to content

aeftimia/hexchat

Repository files navigation

hexchat =======

xmpp tunnel protocol

Summary of concept:

When using hexchat, the data is sent to a local TCP socket running hexchat (call it hexchat1). Hexchat1 then reads the data (thereby stripping it of its TCP header) and passes it over a chat server to another hexchat program (call it hexchat2) that sends the data to the appropriate ip:port (giving it a new TCP header in the process). The client thinks it is sending the data to hexchat1, and the server thinks it is receiving data from hexchat2, but the data itself is never changed. It might be broken into smaller chunks or combined into bigger chunks, and it might be delivered at unpredictable rates, but it is never altered.


Summary of implementation: When the program is started, it is told what JID(s) to use to connect to a chat server, and possibly the following optional parameters: 1. An ip:port to listen on.

  1. A JID. Connection requests will be sent to this JID when a connection is is made to the ip:port specified in (1).

  2. Another ip:port. This is the ip:port the bot connected from the JID in (2) should connect to. Note that any bot can connect to any ip:port that client asks for. This could be a 127.0.0.1 address, or a remote address (but will probably be the former). I plan to add a feature in which you can provide a list of acceptable ip:ports to connect to and refuse to connect to anything else (for security). However, that is not a priority at the moment.

When a connection is made, the server and client exchange all JIDs they are using to connect to the chat server so they can each rotate through JIDs to send messages from and JIDs to send messages to. With the exception of initial connections, all messages are sent as IQ stanzas.

When data is sent, it is base 64 encoded and sent with an ID number that is incremented each time a message is sent.

When data is received, the id is checked against the id of the last message that resulted in writing data to a socket. The difference between these two ids is used as an index in a buffer. Then, messages are read from the buffer and sent to the appropriate socket.

When a socket closes, a disconnect message is sent. Like when sending messages, an id stanza is included.

When a disconnect message is received, the bot checks if there are any entries in the appropriate socket's message buffer. If not, it closes the socket and deletes it from the routing table. If there are messages in the buffer, the disconnect message is added to the buffer at the appropriate index as a string "disconnect" as though it were normal data. When a "disconnect" string is found in the buffer, the socket is closed and deleted from the bot's routing table.


Running the program: The server is launched with: python hexchat.py --logfile logfile --login serveruser1@chatserver 'password1' serveruser2@chatserver 'password2' ...

and the client is launched with:

python hexchat.py --logfile log file --login clientuser1@chatserver 'password1' clientuser2@chatserver 'password2' ... --client LocalIP1 LocalPort1 serveruser@chatserver1 RemoteIP1 RemotePort1 ...

, where serveruser@chatserver is one of the logins used when launching the server (this one cannot be a gmail account).

You can also specify a whitelist of ip:ports you will allow your bot to connect to with the --whitelist option. This is used as follows: python hexchat.py ... --whitelist ip1 port1 ip2 port2 ...

By default, there is no whitelist and the bot will connect to any ip:port requested by the client.

Use the --debug flag to run the program in debug mode:

python hexchat.py --debug --logfile ...

Use the --num_logins flag to set the number of times the program should login to each account. This may or may not improve bandwidth, but the option is there. The default is to login once to each account.

Use the --sequential_bootup flag to force hexchat to login to each chat account sequentially. Some computers need this.

Use the --take_measurements flag to have hexchat record the rate at which sockets send data. The logfile will contains warning messages of the form:

avg send rate kb/s. peak kb/s. total kb/s

, where "avg send rate" is the average send rate of all currently open connections, "peak" highest send rate of all currently open connections, and "total" is the the combined send rate of all currently open connections. In this context, "send rate" refers to the rate at which s socket is receiving data to be sent over a chat server.


Example: client: python hexchat.py --logfile /tmp/hexchat --login [email protected] 'alices password' [email protected] 'bobs password' [email protected] 'charlies password' --client 127.0.0.1 5555 [email protected] RemoteIP RemotePort

server: python hexchat.py --logfile /tmp/hexchat --login [email protected] 'roberts password' [email protected] 'eves password' [email protected] 'alicias password'

Now when when the client connects to 127.0.0.1:5555, the data will be forwarded to the server, which will in turn forward the connection and data to RemoteIP:RemotePort

About

xmpp tunnel protocol

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages