当前位置 : 主页 > 网络编程 > lua >

lua – Chromium没有任何解释就关闭了WebSocket

来源:互联网 收集:自由互联 发布时间:2021-06-23
我有Chromium 12.0.742.112(90304),我正在尝试用它设置一个简单的WebSocket服务器.我收到一个握手请求,如: Upgrade: WebSocketConnection: UpgradeHost: akira:22222Origin: http://akira:22222Sec-WebSocket-Key1: ;39LP*eC4
我有Chromium 12.0.742.112(90304),我正在尝试用它设置一个简单的WebSocket服务器.我收到一个握手请求,如:

Upgrade: WebSocket
Connection: Upgrade
Host: akira:22222
Origin: http://akira:22222
Sec-WebSocket-Key1: ;39LP*eC48 n /r0P6  v6548
Sec-WebSocket-Key2: 1 0  r 362547    4  4  G

接着是8个关键字节,在这种情况下是88 09 F9 EE 21 13 F4 0D.我已经确认这些是Chromium在网络控制台选项卡中显示的相同密钥.我计算前两个键为:

Key1: 3948066548 / 4 = 987016637
Key2: 1036254744 / 12 = 86354562

并发送我的回复:

000001  48 54 54 50  2F 31 2E 31  20 31 30 31  20 57 65 62  HTTP/1.1 101 Web
000011  20 53 6F 63  6B 65 74 20  50 72 6F 74  6F 63 6F 6C   Socket Protocol
000021  20 48 61 6E  64 73 68 61  6B 65 0D 0A  55 70 67 72   Handshake..Upgr
000031  61 64 65 3A  20 57 65 62  53 6F 63 6B  65 74 0D 0A  ade: WebSocket..
000041  43 6F 6E 6E  65 63 74 69  6F 6E 3A 20  55 70 67 72  Connection: Upgr
000051  61 64 65 0D  0A 53 65 63  2D 57 65 62  53 6F 63 6B  ade..Sec-WebSock
000061  65 74 2D 4F  72 69 67 69  6E 3A 20 68  74 74 70 3A  et-Origin: http:
000071  2F 2F 61 6B  69 72 61 3A  32 32 32 32  32 0D 0A 53  //akira:22222..S
000081  65 63 2D 57  65 62 53 6F  63 6B 65 74  2D 4C 6F 63  ec-WebSocket-Loc
000091  61 74 69 6F  6E 3A 20 77  73 3A 2F 2F  61 6B 69 72  ation: ws://akir
0000A1  61 3A 32 32  32 32 32 2F  73 6F 63 6B  65 74 0D 0A  a:22222/socket..
0000B1  0D 0A FF F4  2E 12 9D DC  12 C2 56 40  B8 09 F3 84  ..........V@....
0000C1  CA EF .. ..  .. .. .. ..  .. .. .. ..  .. .. .. ..  ..##############

Chromium只是关闭套接字,甚至没有在JS控制台中打印消息.我不知道我做错了什么?

服务器端代码在Lua中(因此上面的十六进制转储从1开始索引):

require('crypto')
local handshake = {
    "HTTP/1.1 101 Web Socket Protocol Handshake",
    "Upgrade: WebSocket",
    "Connection: Upgrade",
    "Sec-WebSocket-Origin: " .. request.header.origin,
    "Sec-WebSocket-Location: " ..
        request.header.origin:gsub('http:', 'ws:') .. "/socket",
'\r\n'}

log.debug("Request header:\n%s\n", table.concat(request.rawheader, '\n'))

local client = response.socket
client:settimeout(10)

local keys =
    {request.header.sec_websocket_key1, request.header.sec_websocket_key2}
local sum = {}
for i, k in ipairs(keys) do
    local nspc = 0
    sum[i] = ''
    k:gsub('%d', function(n) sum[i] = sum[i] ..n end)
    k:gsub(' ', function() nspc = nspc + 1 end)
    log.debug("Key%d: %s / %d = ", i, sum[i], nspc)
    sum[i] = tostring(tonumber(sum[i]) / nspc)
    log.debug("%s\n", sum[i])
end

local key = assert(client:receive(8))
local bytes = {key:byte(1, #key)}
local keydump = {}
for i = 1, #bytes do keydump[i] = ('%02X'):format(bytes[i]) end
log.debug("Key3: %s\n", table.concat(keydump, ' '))

local resp = crypto.evp.digest('md5', table.concat(sum) .. key, true)
handshake = table.concat(handshake, '\r\n') .. resp

client:settimeout(0.1)
log.debug("Send handshake:\n%s\n", rena.debug.hexdump(handshake))
client:send(handshake)

repeat
    local res, err = client:receive('*l')
    if res then log.debug("R: %s\n", res) end

    local res, err = client:send("Test " .. tostring(os.time()) .. '\n')
    if res then socket.sleep(1)
    elseif err == 'timeout' then log.debug("WS: Timed out\n")
    elseif err == 'closed' then log.debug("WS: Closed\n")
    else log.error("WS: Error: %s\n", tostring(err))
    end
until not res

(此脚本由服务器脚本加载,该脚本预设某些变量,例如请求和响应,并使用LuaCrypto for MD5).一切看起来都正确(虽然我注意到所有示例都显示了二进制密钥的漂亮ASCII字符,而我的大多数都是不可打印的),但它只是关闭套接字.

不幸的是,Chromium是我唯一支持WebSocket的浏览器(除非有一些方法可以在Firefox 6中启用它?),所以我无法检查其他内容.

好吧,我发现了这个问题.前两个键要连接为32位整数(组成一个64位整数),而不是ASCII字符串:

- sum[i] = tostring(tonumber(sum[i]) / nspc)
+ sum[i] = ('%08X'):format(tonumber(sum[i]) / nspc)

- local resp = crypto.evp.digest('md5', table.concat(sum) .. key, true)
- handshake = table.concat(handshake, '\r\n') .. resp
+ local challenge = ''
+ (sum[1] .. sum[2]):gsub('..', function(byte)
+   challenge = challenge .. string.char(tonumber(byte, 16))
+ end)
+ 
+ challenge = challenge .. key
+ log.debug("Ch:   %s\n", challenge:tohex())
+ 
+ local resp = crypto.evp.digest('md5', challenge, true)
+ handshake = table.concat(handshake, '\r\n') .. resp

随着Chromium接受连接.我提交了一个错误,抱怨错误消息缺少错误消息.

网友评论