Jabber What is Jabber? collection of open XML-based protocols for messaging and presence information protocol adopted by IETF as XMPP.

Slides:



Advertisements
Similar presentations
Enabling Secure Internet Access with ISA Server
Advertisements

Supervisor :Dr. Lo'ai Ali Tawalbeh Done by: Wa’el Musa Hadi
Windows 2000 Security --Kerberos COSC513 Project Sihua Xu June 13, 2014.
Kerberos Part 2 CNS 4650 Fall 2004 Rev. 2. PARC Once Again Once again XEROX PARC helped develop the basis for wide spread technology Needham-Schroeder.
Key distribution and certification In the case of public key encryption model the authenticity of the public key of each partner in the communication must.
Authenticating Users. Objectives Explain why authentication is a critical aspect of network security Explain why firewalls authenticate and how they identify.
Jabber and Extensible Messaging and Presence Protocol (XMPP) Presenter: Michael Smith Cisc 856 Dec. 6, 2005.
Kerberos Jean-Anne Fitzpatrick Jennifer English. What is Kerberos? Network authentication protocol Developed at MIT in the mid 1980s Available as open.
 Key exchange o Kerberos o Digital certificates  Certificate authority structure o PGP, hierarchical model  Recovery from exposed keys o Revocation.
Instant Messaging Internet Technologies and Applications.
ISA 3200 NETWORK SECURITY Chapter 10: Authenticating Users.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 10 Authenticating Users By Whitman, Mattord, & Austin© 2008 Course Technology.
Access Control in IIS 6.0 Windows 2003 Server Prepared by- Shamima Rahman School of Science and Computer Engineering University of Houston - Clear Lake.
Chapter 18 RADIUS. RADIUS  Remote Authentication Dial-In User Service  Protocol used for communication between NAS and AAA server  Supports authentication,
POP Configuration Microsoft Outlook Express 6.x.
Setting up in Outlook Express. Select “Tools” from the toolbar menu.
Remote Assistance  Using this program you can allow someone to work on your computer, chat with you and view your screen with your permission  The other.
Introduction to SQL Server 2000 Security Dave Watts CTO, Fig Leaf Software
XMPP Extensible Messaging and Presence Protocol. Chat In the beginning there was instant messaging and chat. Lots of binary standards: Unix talk, IRC,
Authenticating Users Chapter 6. Learning Objectives Understand why authentication is a critical aspect of network security Describe why firewalls authenticate.
Chapter 13 – Network Security
Windows IP Security Filters October 23, 2002 Joe Klemencic Fermilab Business Services.
Instant Messaging Alan Parker Robert Callow Brian Kearney Fortunato Macari Daniel Harrington Chang Gong Wang.
1 Web services and security ---discuss different ways to enforce security Presenter: Han, Xue.
FTP Server and FTP Commands By Nanda Ganesan, Ph.D. © Nanda Ganesan, All Rights Reserved.
Jabber Client Jeevan Varma Anga Distributed Systems(CSC8530) Villanova University.
Kerberos Named after a mythological three-headed dog that guards the underworld of Hades, Kerberos is a network authentication protocol that was designed.
Kerberos. What is Kerberos? Network authentication protocol Developed at MIT in the mid 1980s Available as open source or in supported commercial software.
Using Encryption with Microsoft SQL Server 2000 Kevin McDonnell Technical Lead SQL Server Support Microsoft Corporation.
4BP1 Electronic & Computer Engineering Paul Gildea th Year Interim Project Presentation.
A Case Study: UIM The Universal Instant Messenger Babak Esfandiari Carleton University SYSC 5800 Winter 2003.
Lecture 13 Page 1 Advanced Network Security Authentication and Authorization in Local Networks Advanced Network Security Peter Reiher August, 2014.
Module 11: Securing a Microsoft ASP.NET Web Application.
Guide to MCSE , Second Edition, Enhanced1 The Windows XP Security Model User must logon with: Valid user ID Password User receives access token Access.
Introduction to 學校:大同大學 班級: GI1 學號: 姓名:李奕銳 教師:葉慶隆 Jabber 1.
Kerberos By Robert Smithers. History of Kerberos Kerberos was created at MIT, and was named after the 3 headed guard dog of Hades in Greek mythology Cerberus.
Cookies COEN 351 E-commerce Security. Client / Session Identification HTTP Headers Client IP Address HTTP User Login FAT URLs Cookies.
Jabber Technical Overview Presenter: Ming-Wei Lin.
External Messaging Services. Page 2 External Messaging: Extends the power of Presence and Instant Messaging outside corporate Network Provided only to.
15 May 2006 IVOA - Victoria: VOEvent 11 Jabber/XMPP Matthew J. Graham Caltech T HE US N ATIONAL V IRTUAL O BSERVATORY.
1 SUBMITTED BY- PATEL KUMAR C.S.E(8 th - sem). SUBMITTED TO- Mr. DESHRAJ AHIRWAR.
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
1 Example security systems n Kerberos n Secure shell.
1 Cryptography CSS 329 Lecture 12: Kerberos. 2 Lecture Outline Kerberos - Overview - V4 - V5.
March 16, 2009 Jabber IM Client. March 16, 2009 What is Jabber? An open instant message protocol Defines client/server communication Uses XMPP –XML-Based.
APACHE Apache is generally recognized as the world's most popular Web server (HTTP server). Originally designed for Unix servers, the Apache Web server.
Linux Password Vault by Ali Can Oğul. Codefellas2 Developer: Ali Can Oğul Sponsor: Özgür Yazılım A. Ş.
Installing TMG & Choosing a Client Type
Microsoft Windows NT 4.0 Authentication Protocols
Understanding Switch Security
Configuring Attendant Console
Authentication & .htaccess
Remote Access Lecture 2.
Chapter 11: Managing Users
Welcome to Salem State University
Module 4 Remote Login.
SMOA XMPP Pidgin (Jabber/XMPP) Plugins for SMOA Notification
Introduction to SQL Server 2000 Security
Configure the Setting Manually in Applications to Send and Receive Verizon.Net Mail.
Understanding Switch Security
Understanding Cisco Router Security
Chapter 8: Monitoring the Network
Kerberos.
Kerberos Kerberos is an authentication protocol for trusted hosts on untrusted networks.
Kerberos Kerberos Ticket.
Kerberos Part of project Athena (MIT).
First Level Incident Handling FAQ (For EAL)
On the off chance that your business utilizes Roadrunner as your Internet specialist organization, you will have at least one accounts. While you.
Virtual Private Networks (VPN)
Q/ Compare between HTTP & HTTPS? HTTP HTTPS
Presentation transcript:

Jabber

What is Jabber? collection of open XML-based protocols for messaging and presence information protocol adopted by IETF as XMPP (eXtensible Messaging and Presence Protocol) decentralized (no one “Jabber Server”) Flexible (more than just IM) Securable

Presence concept used to describe user’s availability and willingness to communicate like “away message” on AIM or “zaway” you can specify your status and your presence “away” and “at lunch” vs “away” and “gone for weekend”

Jabber ID resource can be any arbitrary string (usually name of client) if you want to be logged on twice, resources must differ each jabber id can have different presence

“Buddy List” Buddies must be “authorized” to view presence information You must add them, and they must approve it or vice versa Some clients (iChat, jwgc) get confused about this

Messages Stored If you send a message to someone who you have authorized and who is not logged in, it will be stored and displayed when they do log in Except when it’s not, because some clients get confused

Can be created by anyone Configuration is a bit tricky Unused rooms are “reaped” every so often

Jabber Clients Gaim (Windows, Linux, Athena) jwgc (Linux,Athena) - for advanced users only Uses kerberos tickets (windows and Athena) Can be used for AIM, MSN, Yahoo, Zephyr, much more Adium (OS X) - similar to GAIM

iChat Only iChat 3 (came with 10.4) works Has some bugs Not recommended yet, maybe in the future Bogus SSL error message

Our Jabber Server Domain: mit.edu Connect Server: jabber.mit.edu Jabber ID: your username Port: 5222 with TLS encryption Port 5223 with SSL encryption (iChat) Will not permit unencrypted logins

Possible Support Headaches Users attempting to use non-MIT etc) Confusion about buddy authorization procedure Stored messages showing up at login - check timestamps Unconfigured chatrooms locking out creators Unsupported clients

Resources