2007-06-28 11:16:21 +02:00
\documentclass [a4paper,10pt] { book}
2003-01-23 21:57:55 +01:00
2005-11-28 11:55:45 +01:00
%% Packages
\usepackage { float}
2003-01-24 21:18:33 +01:00
\usepackage { graphics}
2003-01-23 21:57:55 +01:00
\usepackage { hevea}
2005-11-28 11:55:45 +01:00
\usepackage [pdftex,colorlinks,unicode,urlcolor=blue,linkcolor=blue,
2008-07-31 13:18:49 +02:00
pdftitle=Ejabberd\ Installation\ and\ Operation\ Guide,pdfauthor=ProcessOne,pdfsubject=ejabberd,pdfkeywords=ejabberd,
2005-11-28 11:55:45 +01:00
pdfpagelabels=false]{ hyperref}
\usepackage { makeidx}
%\usepackage{showidx} % Only for verifying the index entries.
2003-01-23 21:57:55 +01:00
\usepackage { verbatim}
2005-11-28 11:55:45 +01:00
\usepackage { geometry}
2007-06-28 11:16:21 +02:00
\usepackage { fancyhdr}
\pagestyle { fancy} %Forces the page to use the fancy template
\renewcommand { \chaptermark } [1]{ \markboth { \textbf { \thechapter } .\ \emph { #1} } { } }
\renewcommand { \sectionmark } [1]{ \markright { \thesection \ \boldmath \textbf { #1} \unboldmath } }
\fancyhf { }
\fancyhead [LE,RO] { \textbf { \thepage } } %Displays the page number in bold in the header,
% to the left on even pages and to the right on odd pages.
\fancyhead [RE] { \nouppercase { \leftmark } } %Displays the upper-level (chapter) information---
% as determined above---in non-upper case in the header, to the right on even pages.
\fancyhead [LO] { \rightmark } %Displays the lower-level (section) information---as
% determined above---in the header, to the left on odd pages.
\renewcommand { \headrulewidth } { 0.5pt} %Underlines the header. (Set to 0pt if not required).
\renewcommand { \footrulewidth } { 0.5pt} %Underlines the footer. (Set to 0pt if not required).
2003-01-23 21:57:55 +01:00
2005-11-28 11:55:45 +01:00
%% Index
\makeindex
% Remove the index anchors from the HTML version to save size and bandwith.
\newcommand { \ind } [1]{ \begin { latexonly} \index { #1} \end { latexonly} }
2008-06-12 23:54:30 +02:00
\newcommand { \makechapter } [2]{ \aname { #1} { } \chapter { \ahrefloc { #1} { #2} } \label { #1} }
\newcommand { \makesection } [2]{ \aname { #1} { } \section { \ahrefloc { #1} { #2} } \label { #1} }
\newcommand { \makesubsection } [2]{ \aname { #1} { } \subsection { \ahrefloc { #1} { #2} } \label { #1} }
\newcommand { \makesubsubsection } [2]{ \aname { #1} { } \subsubsection { \ahrefloc { #1} { #2} } \label { #1} }
\newcommand { \makeparagraph } [2]{ \aname { #1} { } \paragraph { \ahrefloc { #1} { #2} } \label { #1} }
2003-01-23 21:57:55 +01:00
2005-11-28 11:55:45 +01:00
%% Images
2003-02-08 19:21:05 +01:00
\newcommand { \logoscale } { 0.7}
\newcommand { \imgscale } { 0.58}
\newcommand { \insimg } [1]{ \insscaleimg { \imgscale } { #1} }
\newcommand { \insscaleimg } [2]{
\imgsrc { #2} { }
2003-02-03 21:23:08 +01:00
\begin { latexonly}
2003-02-08 19:21:05 +01:00
\scalebox { #1} { \includegraphics { #2} }
2003-02-03 21:23:08 +01:00
\end { latexonly}
}
2003-01-24 21:18:33 +01:00
2005-11-28 11:55:45 +01:00
%% Various
2004-07-06 23:34:50 +02:00
\newcommand { \bracehack } { \def \{ { \char "7B} \def \} { \char "7D} }
2005-11-28 11:55:45 +01:00
\newcommand { \titem } [1]{ \item [\bracehack\texttt{#1}] }
2003-01-25 21:13:36 +01:00
\newcommand { \ns } [1]{ \texttt { #1} }
2004-07-06 23:34:50 +02:00
\newcommand { \jid } [1]{ \texttt { #1} }
\newcommand { \option } [1]{ \texttt { #1} }
\newcommand { \poption } [1]{ { \bracehack \texttt { #1} } }
\newcommand { \node } [1]{ \texttt { #1} }
\newcommand { \term } [1]{ \texttt { #1} }
\newcommand { \shell } [1]{ \texttt { #1} }
2003-01-23 21:57:55 +01:00
\newcommand { \ejabberd } { \texttt { ejabberd} }
\newcommand { \Jabber } { Jabber}
2009-09-23 17:28:53 +02:00
\newcommand { \XMPP } { XMPP}
2009-08-12 16:15:59 +02:00
\newcommand { \esyntax } [1]{ \begin { description} \titem { #1} \end { description} }
2003-01-23 21:57:55 +01:00
2005-11-28 11:55:45 +01:00
%% Modules
2004-07-06 23:34:50 +02:00
\newcommand { \module } [1]{ \texttt { #1} }
2006-04-23 18:55:25 +02:00
\newcommand { \modadhoc } { \module { mod\_ adhoc} }
2004-08-13 00:34:19 +02:00
\newcommand { \modannounce } { \module { mod\_ announce} }
2014-09-11 17:44:29 +02:00
\newcommand { \modclientstate } { \module { mod\_ client\_ state} }
2011-05-27 11:43:52 +02:00
\newcommand { \modblocking } { \module { mod\_ blocking} }
2007-12-06 12:13:29 +01:00
\newcommand { \modcaps } { \module { mod\_ caps} }
2014-04-15 01:29:00 +02:00
\newcommand { \modcarboncopy } { \module { mod\_ carboncopy} }
2004-07-06 23:34:50 +02:00
\newcommand { \modconfigure } { \module { mod\_ configure} }
\newcommand { \moddisco } { \module { mod\_ disco} }
2006-04-23 18:55:25 +02:00
\newcommand { \modecho } { \module { mod\_ echo} }
2014-08-17 15:38:38 +02:00
\newcommand { \modfailban } { \module { mod\_ fail2ban} }
2009-06-16 19:48:38 +02:00
\newcommand { \modhttpbind } { \module { mod\_ http\_ bind} }
2009-06-16 15:46:03 +02:00
\newcommand { \modhttpfileserver } { \module { mod\_ http\_ fileserver} }
2004-07-06 23:34:50 +02:00
\newcommand { \modirc } { \module { mod\_ irc} }
\newcommand { \modlast } { \module { mod\_ last} }
\newcommand { \modmuc } { \module { mod\_ muc} }
2006-04-11 05:16:34 +02:00
\newcommand { \modmuclog } { \module { mod\_ muc\_ log} }
2004-07-06 23:34:50 +02:00
\newcommand { \modoffline } { \module { mod\_ offline} }
2009-07-30 13:45:54 +02:00
\newcommand { \modping } { \module { mod\_ ping} }
2011-01-31 18:50:49 +01:00
\newcommand { \modprescounter } { \module { mod\_ pres\_ counter} }
2004-07-06 23:34:50 +02:00
\newcommand { \modprivacy } { \module { mod\_ privacy} }
\newcommand { \modprivate } { \module { mod\_ private} }
2006-10-29 16:07:35 +01:00
\newcommand { \modproxy } { \module { mod\_ proxy65} }
2004-07-06 23:34:50 +02:00
\newcommand { \modpubsub } { \module { mod\_ pubsub} }
2009-08-18 12:14:49 +02:00
\newcommand { \modpubsubodbc } { \module { mod\_ pubsub\_ odbc} }
2004-07-06 23:34:50 +02:00
\newcommand { \modregister } { \module { mod\_ register} }
2010-11-04 22:34:18 +01:00
\newcommand { \modregisterweb } { \module { mod\_ register\_ web} }
2004-07-06 23:34:50 +02:00
\newcommand { \modroster } { \module { mod\_ roster} }
2004-08-24 22:11:01 +02:00
\newcommand { \modservicelog } { \module { mod\_ service\_ log} }
2005-04-22 18:47:16 +02:00
\newcommand { \modsharedroster } { \module { mod\_ shared\_ roster} }
2010-11-18 08:59:35 +01:00
\newcommand { \modsharedrosterldap } { \module { mod\_ shared\_ roster\_ ldap} }
2010-03-08 13:58:22 +01:00
\newcommand { \modsic } { \module { mod\_ sic} }
2014-04-30 17:20:38 +02:00
\newcommand { \modsip } { \module { mod\_ sip} }
2004-07-06 23:34:50 +02:00
\newcommand { \modstats } { \module { mod\_ stats} }
\newcommand { \modtime } { \module { mod\_ time} }
\newcommand { \modvcard } { \module { mod\_ vcard} }
2006-04-23 18:55:25 +02:00
\newcommand { \modvcardldap } { \module { mod\_ vcard\_ ldap} }
2010-04-27 12:33:56 +02:00
\newcommand { \modvcardxupdate } { \module { mod\_ vcard\_ xupdate} }
2004-07-06 23:34:50 +02:00
\newcommand { \modversion } { \module { mod\_ version} }
2007-12-18 19:04:12 +01:00
%% Contributed modules
2009-06-16 19:48:38 +02:00
%\usepackage{ifthen}
%\newboolean{modhttpbind}
%\newcommand{\modhttpbind}{\module{mod\_http\_bind}}
%\include{contributed_modules}
%
% Then in the document you can input the partial tex file with:
%\ifthenelse{\boolean{modhttpbind}}{\input{mod_http_bind.tex}}{}
2007-12-18 19:04:12 +01:00
2005-11-28 11:55:45 +01:00
%% Common options
2013-08-12 14:25:05 +02:00
\newcommand { \iqdiscitem } [1]{ \titem { iqdisc: Discipline} \ind { options!iqdisc} This specifies
2007-06-28 11:16:21 +02:00
the processing discipline for #1 IQ queries (see section~\ref { modiqdiscoption} ).}
2005-11-28 11:55:45 +01:00
\newcommand { \hostitem } [1]{
2013-08-12 14:25:05 +02:00
\titem { host: HostName} \ind { options!host} This option defines the Jabber ID of the
2007-08-26 00:48:16 +02:00
service. If the \texttt { host} option is not specified, the Jabber ID will be the
2007-08-27 23:48:06 +02:00
hostname of the virtual host with the prefix `\jid { #1.} '. The keyword "@HOST@"
is replaced at start time with the real virtual host name.
2005-11-28 11:55:45 +01:00
}
2013-08-12 14:25:05 +02:00
\newcommand { \dbtype } { \titem { db\_ type: internal|odbc} \ind { options!dbtype}
2012-10-03 18:14:23 +02:00
Define the type of storage where the module will create the tables and store user information.
The default is to store in the internal Mnesia database.
If \term { odbc} value is defined, make sure you have defined the database, see~\ref { database} .
}
2005-11-28 11:55:45 +01:00
%% Title page
\include { version}
2007-06-28 11:16:21 +02:00
\newlength { \larg }
\setlength { \larg } { 14.5cm}
\title {
{ \rule { \larg } { 1mm} } \vspace { 7mm}
2007-08-01 20:09:00 +02:00
\begin { tabular} { r}
{ \huge { \bf ejabberd \version \ } } \\
\\
{ \huge Installation and Operation Guide}
2007-06-28 11:16:21 +02:00
\end { tabular} \\
\vspace { 2mm}
{ \rule { \larg } { 1mm} }
2008-06-13 17:25:57 +02:00
\begin { latexonly}
2007-06-28 11:16:21 +02:00
\vspace { 2mm} \\
\vspace { 5.5cm}
2008-06-13 17:25:57 +02:00
\end { latexonly}
2007-06-28 11:16:21 +02:00
}
2008-06-13 17:25:57 +02:00
\begin { latexonly}
2007-06-28 11:16:21 +02:00
\author { \begin { tabular} { p{ 13.7cm} }
ejabberd Development Team
\end { tabular} }
\date { }
2008-06-13 17:25:57 +02:00
\end { latexonly}
2007-06-28 11:16:21 +02:00
2004-07-06 23:34:50 +02:00
2005-11-28 11:55:45 +01:00
%% Options
\newcommand { \marking } [1]{ #1} % Marking disabled
\newcommand { \quoting } [2][yozhik]{ } % Quotes disabled
2007-06-28 11:16:21 +02:00
%\newcommand{\new}{\marginpar{\textsc{new}}} % Highlight new features
%\newcommand{\improved}{\marginpar{\textsc{improved}}} % Highlight improved features
2006-09-22 11:09:28 +02:00
2008-06-13 00:00:51 +02:00
%% To by-pass errors in the HTML version:
\newstyle { .SPAN} { width:20\% ; float:right; text-align:left; margin-left:auto;}
2008-06-13 17:25:57 +02:00
\newstyle { H1.titlemain HR} { display:none;}
\newstyle { TABLE.title} { border-top:1px solid grey;border-bottom:1px solid grey; background: \# efefef}
2008-06-13 12:13:44 +02:00
\newstyle { H1.chapter A, H2.section A, H3.subsection A, H4.subsubsection A, H5.paragraph A}
{ color:\# 000000; text-decoration:none;}
2008-06-13 17:25:57 +02:00
\newstyle { H1.chapter, H2.section, H3.subsection, H4.subsubsection, H5.paragraph}
{ border-top: 1px solid grey; background: \# efefef; padding: 0.5ex}
2008-06-13 00:00:51 +02:00
\newstyle { pre.verbatim} { margin:1ex 2ex;border:1px dashed lightgrey;background-color:\# f9f9f9;padding:0.5ex;}
\newstyle { .dt-description} { margin:0ex 2ex;}
\newstyle { table[border="1"]} { border-collapse:collapse;margin-bottom:1em;}
\newstyle { table[border="1"] td} { border:1px solid \# aaa;padding:2px}
% Don't display <hr> before and after tables or images:
2008-10-06 16:18:46 +02:00
\newstyle { BLOCKQUOTE.table DIV.center DIV.center HR} { display:none;}
\newstyle { BLOCKQUOTE.figure DIV.center DIV.center HR} { display:none;}
2005-11-28 11:55:45 +01:00
%% Footnotes
2004-07-06 23:34:50 +02:00
\begin { latexonly}
\global \parskip =9pt plus 3pt minus 1pt
\global \parindent =0pt
\gdef \ahrefurl #1{ \href { #1} { \texttt { #1} } }
\gdef \footahref #1#2{ #2\footnote { \href { #1} { \texttt { #1} } } }
\end { latexonly}
2009-08-11 13:41:15 +02:00
\newcommand { \txepref } [2]{ \footahref { http://xmpp.org/extensions/xep-#1.html} { #2} }
2007-01-11 09:17:18 +01:00
\newcommand { \xepref } [1]{ \txepref { #1} { XEP-#1} }
2003-01-23 21:57:55 +01:00
\begin { document}
2005-11-28 11:55:45 +01:00
2006-09-22 11:09:28 +02:00
\label { titlepage}
2003-01-23 21:57:55 +01:00
\begin { titlepage}
\maketitle { }
2005-11-28 11:55:45 +01:00
2007-06-28 11:16:21 +02:00
%% Commenting. Breaking clean layout for now:
%% \begin{center}
%% {\insscaleimg{\logoscale}{logo.png}
%% \par
%% }
%% \end{center}
2003-01-23 21:57:55 +01:00
2007-06-28 11:16:21 +02:00
%% \begin{quotation}\textit{I can thoroughly recommend ejabberd for ease of setup ---
%% Kevin Smith, Current maintainer of the Psi project}\end{quotation}
2003-01-23 21:57:55 +01:00
2005-11-28 11:55:45 +01:00
\end { titlepage}
2003-01-23 21:57:55 +01:00
2005-11-28 11:55:45 +01:00
% Set the page counter to 2 so that the titlepage and the second page do not
% have the same page number. This fixes the PDFLaTeX warning "destination with
% the same identifier".
\begin { latexonly}
\setcounter { page} { 2}
\end { latexonly}
2003-02-03 21:23:08 +01:00
2008-06-12 23:54:30 +02:00
\label { toc}
2005-11-28 11:55:45 +01:00
\tableofcontents { }
2003-01-23 21:57:55 +01:00
2005-11-28 11:55:45 +01:00
% Input introduction.tex
\input { introduction}
2003-01-23 21:57:55 +01:00
2008-06-12 23:54:30 +02:00
\makechapter { installing} { Installing \ejabberd { } }
2008-01-15 18:53:40 +01:00
2008-06-12 23:54:30 +02:00
\makesection { install.binary} { Installing \ejabberd { } with Binary Installer}
2007-06-28 11:16:21 +02:00
2008-01-15 18:53:40 +01:00
Probably the easiest way to install an \ejabberd { } instant messaging server
2008-10-06 16:18:46 +02:00
is using the binary installer published by ProcessOne.
The binary installers of released \ejabberd { } versions
2008-07-31 13:18:49 +02:00
are available in the ProcessOne \ejabberd { } downloads page:
2007-12-22 17:36:48 +01:00
\ahrefurl { http://www.process-one.net/en/ejabberd/downloads}
2007-06-28 11:16:21 +02:00
2008-01-01 19:20:57 +01:00
The installer will deploy and configure a full featured \ejabberd { }
2007-11-26 20:54:30 +01:00
server and does not require any extra dependencies.
2007-06-28 11:16:21 +02:00
2007-12-22 17:36:48 +01:00
In *nix systems, remember to set executable the binary installer before starting it. For example:
2007-12-20 10:29:30 +01:00
\begin { verbatim}
2008-06-13 01:01:09 +02:00
chmod +x ejabberd-2.0.0_ 1-linux-x86-installer.bin
./ejabberd-2.0.0_ 1-linux-x86-installer.bin
2007-12-20 10:29:30 +01:00
\end { verbatim}
2008-03-20 20:24:27 +01:00
\ejabberd { } can be started manually at any time,
or automatically by the operating system at system boot time.
To start and stop \ejabberd { } manually,
use the desktop shortcuts created by the installer.
2008-10-06 16:18:46 +02:00
If the machine doesn't have a graphical system, use the scripts 'start'
2008-03-20 20:24:27 +01:00
and 'stop' in the 'bin' directory where \ejabberd { } is installed.
2008-01-15 18:53:40 +01:00
The Windows installer also adds ejabberd as a system service,
and a shortcut to a debug console for experienced administrators.
2008-10-06 16:18:46 +02:00
If you want ejabberd to be started automatically at boot time,
2008-03-20 20:24:27 +01:00
go to the Windows service settings and set ejabberd to be automatically started.
2008-10-06 16:18:46 +02:00
Note that the Windows service is a feature still in development,
2008-03-20 20:24:27 +01:00
and for example it doesn't read the file ejabberdctl.cfg.
2008-01-15 18:53:40 +01:00
2008-10-06 16:18:46 +02:00
On a *nix system, if you want ejabberd to be started as daemon at boot time,
2008-03-20 20:24:27 +01:00
copy \term { ejabberd.init} from the 'bin' directory to something like \term { /etc/init.d/ejabberd}
2009-08-24 21:44:21 +02:00
(depending on your distribution).
2011-09-06 13:39:26 +02:00
Create a system user called \term { ejabberd} ,
give it write access to the directories \term { database/} and \term { logs/} , and set that as home;
the script will start the server with that user.
2009-08-24 21:44:21 +02:00
Then you can call \term { /etc/inid.d/ejabberd start} as root to start the server.
2008-01-15 18:53:40 +01:00
2013-08-05 19:22:22 +02:00
When ejabberd is started, the processes that are started in the system
are \term { beam} or \term { beam.smp} , and also \term { epmd} .
In Microsoft Windows, the processes are \term { erl.exe} and \term { epmd.exe} .
For more information regarding \term { epmd} consult the section \ref { epmd} .
2008-08-26 16:26:56 +02:00
If \term { ejabberd} doesn't start correctly in Windows,
try to start it using the shortcut in desktop or start menu.
If the window shows error 14001, the solution is to install:
"Microsoft Visual C++ 2005 SP1 Redistributable Package".
You can download it from
\footahref { http://www.microsoft.com/} { www.microsoft.com} .
Then uninstall \ejabberd { } and install it again.
2008-07-28 18:55:01 +02:00
If \term { ejabberd} doesn't start correctly and a crash dump is generated,
there was a severe problem.
You can try starting \term { ejabberd} with
the script \term { bin/live.bat} in Windows,
or with the command \term { bin/ejabberdctl live} in other Operating Systems.
This way you see the error message provided by Erlang
and can identify what is exactly the problem.
2008-01-15 18:53:40 +01:00
The \term { ejabberdctl} administration script is included in the \term { bin} directory.
Please refer to the section~\ref { ejabberdctl} for details about \term { ejabberdctl} ,
and configurable options to fine tune the Erlang runtime system.
2007-12-22 17:36:48 +01:00
2008-12-16 18:36:34 +01:00
\makesection { install.os} { Installing \ejabberd { } with Operating System Specific Packages}
2007-08-01 20:09:00 +02:00
2008-10-06 16:18:46 +02:00
Some Operating Systems provide a specific \ejabberd { } package adapted to
2008-01-15 18:53:40 +01:00
the system architecture and libraries.
2008-10-06 16:18:46 +02:00
It usually also checks dependencies
2007-08-01 20:09:00 +02:00
and performs basic configuration tasks like creating the initial
administrator account. Some examples are Debian and Gentoo. Consult the
resources provided by your Operating System for more information.
2008-01-15 18:53:40 +01:00
Usually those packages create a script like \term { /etc/init.d/ejabberd}
to start and stop \ejabberd { } as a service at boot time.
2008-06-12 23:54:30 +02:00
\makesection { install.cean} { Installing \ejabberd { } with CEAN}
2007-08-01 20:09:00 +02:00
\footahref { http://cean.process-one.net/} { CEAN}
(Comprehensive Erlang Archive Network) is a repository that hosts binary
2008-01-01 19:20:57 +01:00
packages from many Erlang programs, including \ejabberd { } and all its dependencies.
2007-08-01 20:09:00 +02:00
The binaries are available for many different system architectures, so this is an
2008-01-01 19:20:57 +01:00
alternative to the binary installer and Operating System's \ejabberd { } packages.
2007-08-01 20:09:00 +02:00
2008-01-15 18:53:40 +01:00
You will have to create your own \ejabberd { } start
2008-10-06 16:18:46 +02:00
script depending of how you handle your CEAN installation.
2008-01-15 18:53:40 +01:00
The default \term { ejabberdctl} script is located
into \ejabberd { } 's priv directory and can be used as an example.
2008-06-12 23:54:30 +02:00
\makesection { installation} { Installing \ejabberd { } from Source Code}
2007-11-26 08:59:35 +01:00
\ind { install}
2003-01-23 21:57:55 +01:00
2008-01-01 19:20:57 +01:00
The canonical form for distribution of \ejabberd { } stable releases is the source code package.
2008-10-06 16:18:46 +02:00
Compiling \ejabberd { } from source code is quite easy in *nix systems,
2007-12-22 17:36:48 +01:00
as long as your system have all the dependencies.
2008-06-12 23:54:30 +02:00
\makesubsection { installreq} { Requirements}
2006-09-22 11:09:28 +02:00
\ind { installation!requirements}
2003-01-23 21:57:55 +01:00
2006-09-22 11:09:28 +02:00
To compile \ejabberd { } on a `Unix-like' operating system, you need:
2003-01-23 21:57:55 +01:00
\begin { itemize}
2006-09-22 11:09:28 +02:00
\item GNU Make
\item GCC
2008-01-15 18:53:40 +01:00
\item Libexpat 1.95 or higher
2013-04-11 17:12:53 +02:00
\item Erlang/OTP R15B or higher.
2014-06-03 13:00:17 +02:00
\item Libyaml 0.1.4 or higher
2010-07-01 17:01:13 +02:00
\item OpenSSL 0.9.8 or higher, for STARTTLS, SASL and SSL encryption.
2008-03-22 01:33:28 +01:00
\item Zlib 1.2.3 or higher, for Stream Compression support (\xepref { 0138} ). Optional.
2008-12-16 18:36:34 +01:00
\item PAM library. Optional. For Pluggable Authentication Modules (PAM). See section \ref { pam} .
\item GNU Iconv 1.8 or higher, for the IRC Transport (mod\_ irc). Optional. Not needed on systems with GNU Libc. See section \ref { modirc} .
2009-11-23 13:43:15 +01:00
\item ImageMagick's Convert program. Optional. For CAPTCHA challenges. See section \ref { captcha} .
2003-01-23 21:57:55 +01:00
\end { itemize}
2008-06-12 23:54:30 +02:00
\makesubsection { download} { Download Source Code}
2007-11-26 08:59:35 +01:00
\ind { install!download}
2003-07-13 11:00:01 +02:00
2008-07-31 13:18:49 +02:00
Released versions of \ejabberd { } are available in the ProcessOne \ejabberd { } downloads page:
2007-11-28 00:35:26 +01:00
\ahrefurl { http://www.process-one.net/en/ejabberd/downloads}
2003-01-23 21:57:55 +01:00
2010-02-11 13:14:55 +01:00
\ind { Git repository}
Alternatively, the latest development source code can be retrieved from the Git repository using the commands:
2004-07-06 23:34:50 +02:00
\begin { verbatim}
2013-03-27 17:17:52 +01:00
git clone git://github.com/processone/ejabberd.git ejabberd
2010-02-11 13:14:55 +01:00
cd ejabberd
2015-01-08 17:53:25 +01:00
./autogen.sh
2004-07-06 23:34:50 +02:00
\end { verbatim}
2003-01-23 21:57:55 +01:00
2005-11-28 11:55:45 +01:00
2008-06-12 23:54:30 +02:00
\makesubsection { compile} { Compile}
2007-11-26 08:59:35 +01:00
\ind { install!compile}
2003-01-23 21:57:55 +01:00
2007-11-26 08:59:35 +01:00
To compile \ejabberd { } execute the commands:
2003-01-28 20:45:13 +01:00
\begin { verbatim}
2008-06-13 01:01:09 +02:00
./configure
make
2007-11-26 08:59:35 +01:00
\end { verbatim}
2008-07-12 23:32:45 +02:00
The build configuration script allows several options.
2007-11-26 08:59:35 +01:00
To get the full list run the command:
\begin { verbatim}
2008-06-13 01:01:09 +02:00
./configure --help
2007-11-26 08:59:35 +01:00
\end { verbatim}
Some options that you may be interested in modifying:
\begin { description}
2008-10-06 16:18:46 +02:00
\titem { --prefix=/}
2008-07-14 12:06:13 +02:00
Specify the path prefix where the files will be copied when running
the \term { make install} command.
2007-11-26 08:59:35 +01:00
2008-07-13 00:02:16 +02:00
\titem { --enable-user[=USER]}
2008-10-06 16:18:46 +02:00
Allow this normal system user to execute the ejabberdctl script
2008-07-13 00:02:16 +02:00
(see section~\ref { ejabberdctl} ),
2008-07-14 12:06:13 +02:00
read the configuration files,
read and write in the spool directory,
read and write in the log directory.
The account user and group must exist in the machine
before running \term { make install} .
This account doesn't need an explicit HOME directory, because
\term { /var/lib/ejabberd/} will be used by default.
2008-07-13 00:02:16 +02:00
2008-10-06 16:18:46 +02:00
\titem { --enable-pam}
2008-07-12 23:32:45 +02:00
Enable the PAM authentication method (see section \ref { pam} ).
2007-11-26 08:59:35 +01:00
2013-04-08 11:12:54 +02:00
\titem { --enable-mssql}
2007-11-26 08:59:35 +01:00
Required if you want to use an external database.
See section~\ref { database} for more information.
2013-04-08 11:12:54 +02:00
\titem { --enable-tools}
Enable the use of development tools.
\titem { --enable-mysql}
2013-08-12 14:25:05 +02:00
Enable MySQL support (see section \ref { odbc} ).
2013-04-08 11:12:54 +02:00
\titem { --enable-pgsql}
2013-08-12 14:25:05 +02:00
Enable PostgreSQL support (see section \ref { odbc} ).
2013-04-08 11:12:54 +02:00
\titem { --enable-zlib}
Enable Stream Compression (XEP-0138) using zlib.
\titem { --enable-iconv}
Enable iconv support. This is needed for \term { mod\_ irc} (see seciont \ref { modirc} ).
\titem { --enable-debug}
Compile with \term { +debug\_ info} enabled.
2008-10-06 16:18:46 +02:00
\titem { --enable-full-xml}
2007-11-26 08:59:35 +01:00
Enable the use of XML based optimisations.
2008-10-06 16:18:46 +02:00
It will for example use CDATA to escape characters in the XMPP stream.
2009-09-23 17:28:53 +02:00
Use this option only if you are sure your XMPP clients include a fully compliant XML parser.
2007-11-26 08:59:35 +01:00
\titem { --disable-transient-supervisors}
2008-10-06 16:18:46 +02:00
Disable the use of Erlang/OTP supervision for transient processes.
2010-07-01 16:57:47 +02:00
\titem { --enable-nif}
Replaces some critical Erlang functions with equivalents written in C to improve performance.
2007-11-26 08:59:35 +01:00
\end { description}
2008-06-12 23:54:30 +02:00
\makesubsection { install} { Install}
2007-11-26 08:59:35 +01:00
\ind { install!install}
2008-01-01 19:20:57 +01:00
To install \ejabberd { } in the destination directories, run the command:
2007-11-26 08:59:35 +01:00
\begin { verbatim}
2008-06-13 01:01:09 +02:00
make install
2003-01-28 20:45:13 +01:00
\end { verbatim}
2008-07-12 23:32:45 +02:00
Note that you probably need administrative privileges in the system
to install \term { ejabberd} .
2003-01-28 20:45:13 +01:00
2007-11-26 08:59:35 +01:00
The files and directories created are, by default:
\begin { description}
2008-07-13 21:10:01 +02:00
\titem { /etc/ejabberd/} Configuration directory:
2007-11-26 08:59:35 +01:00
\begin { description}
2013-08-12 14:25:05 +02:00
\titem { ejabberd.yml} ejabberd configuration file
2007-11-26 08:59:35 +01:00
\titem { ejabberdctl.cfg} Configuration file of the administration script
2008-07-13 21:10:01 +02:00
\titem { inetrc} Network DNS configuration file
2007-11-26 08:59:35 +01:00
\end { description}
2008-07-13 21:10:01 +02:00
\titem { /lib/ejabberd/}
2007-11-26 08:59:35 +01:00
\begin { description}
2008-07-13 21:10:01 +02:00
\titem { ebin/} Erlang binary files (*.beam)
\titem { include/} Erlang header files (*.hrl)
\titem { priv/} Additional files required at runtime
2007-11-26 08:59:35 +01:00
\begin { description}
2009-04-22 12:20:13 +02:00
\titem { bin/} Executable programs
2008-07-13 21:10:01 +02:00
\titem { lib/} Binary system libraries (*.so)
\titem { msgs/} Translation files (*.msgs)
2007-11-26 08:59:35 +01:00
\end { description}
\end { description}
2008-07-13 21:10:01 +02:00
\titem { /sbin/ejabberdctl} Administration script (see section~\ref { ejabberdctl} )
\titem { /share/doc/ejabberd/} Documentation of ejabberd
\titem { /var/lib/ejabberd/} Spool directory:
\begin { description}
\titem { .erlang.cookie} Erlang cookie file (see section \ref { cookie} )
\titem { acl.DCD, ...} Mnesia database spool files (*.DCD, *.DCL, *.DAT)
\end { description}
\titem { /var/log/ejabberd/} Log directory (see section~\ref { logfiles} ):
2007-11-26 08:59:35 +01:00
\begin { description}
2008-01-16 11:08:17 +01:00
\titem { ejabberd.log} ejabberd service log
2009-08-31 10:41:56 +02:00
\titem { erlang.log} Erlang/OTP system log
2007-11-26 08:59:35 +01:00
\end { description}
\end { description}
2008-06-12 23:54:30 +02:00
\makesubsection { start} { Start}
2007-11-26 08:59:35 +01:00
\ind { install!start}
2003-01-23 21:57:55 +01:00
2008-01-01 19:20:57 +01:00
You can use the \term { ejabberdctl} command line administration script to start and stop \ejabberd { } .
2008-07-13 00:02:16 +02:00
If you provided the configure option \term { --enable-user=USER} (see \ref { compile} ),
you can execute \term { ejabberdctl} with either that system account or root.
2007-12-20 10:29:30 +01:00
Usage example:
2007-12-06 00:46:50 +01:00
\begin { verbatim}
2008-06-13 01:01:09 +02:00
ejabberdctl start
2007-08-29 18:12:59 +02:00
2008-06-13 01:01:09 +02:00
ejabberdctl status
2008-10-12 15:32:36 +02:00
The node ejabberd@localhost is started with status: started
ejabberd is running in that node
2007-06-28 16:32:48 +02:00
2008-06-13 01:01:09 +02:00
ejabberdctl stop
2007-12-06 00:46:50 +01:00
\end { verbatim}
2008-07-12 23:32:45 +02:00
2008-07-28 18:55:01 +02:00
If \term { ejabberd} doesn't start correctly and a crash dump is generated,
there was a severe problem.
You can try starting \term { ejabberd} with
the command \term { ejabberdctl live}
to see the error message provided by Erlang
and can identify what is exactly the problem.
2007-12-06 00:46:50 +01:00
Please refer to the section~\ref { ejabberdctl} for details about \term { ejabberdctl} ,
and configurable options to fine tune the Erlang runtime system.
2007-11-26 08:59:35 +01:00
2009-08-24 21:44:21 +02:00
If you want ejabberd to be started as daemon at boot time,
copy \term { ejabberd.init} to something like \term { /etc/init.d/ejabberd}
(depending on your distribution).
Create a system user called \term { ejabberd} ;
it will be used by the script to start the server.
Then you can call \term { /etc/inid.d/ejabberd start} as root to start the server.
2008-06-12 23:54:30 +02:00
\makesubsection { bsd} { Specific Notes for BSD}
2007-11-26 08:59:35 +01:00
\ind { install!bsd}
2008-01-01 19:20:57 +01:00
The command to compile \ejabberd { } in BSD systems is:
2007-11-26 08:59:35 +01:00
\begin { verbatim}
2008-06-13 01:01:09 +02:00
gmake
2007-11-26 08:59:35 +01:00
\end { verbatim}
2006-09-22 11:09:28 +02:00
2003-07-13 11:00:01 +02:00
2008-07-07 10:47:47 +02:00
\makesubsection { solaris} { Specific Notes for Sun Solaris}
\ind { install!solaris}
You need to have \term { GNU install} ,
but it isn't included in Solaris.
It can be easily installed if your Solaris system
2008-10-06 16:18:46 +02:00
is set up for \footahref { http://www.blastwave.org/} { blastwave.org}
package repository.
2008-07-07 10:47:47 +02:00
Make sure \term { /opt/csw/bin} is in your \term { PATH} and run:
\begin { verbatim}
pkg-get -i fileutils
\end { verbatim}
If that program is called \term { ginstall} ,
modify the \ejabberd { } \term { Makefile} script to suit your system,
for example:
\begin { verbatim}
cat Makefile | sed s/install/ginstall/ > Makefile.gi
\end { verbatim}
And finally install \ejabberd { } with:
\begin { verbatim}
gmake -f Makefile.gi ginstall
\end { verbatim}
2008-06-12 23:54:30 +02:00
\makesubsection { windows} { Specific Notes for Microsoft Windows}
2007-11-26 08:59:35 +01:00
\ind { install!windows}
2008-06-12 23:54:30 +02:00
\makesubsubsection { windowsreq} { Requirements}
2007-11-26 08:59:35 +01:00
To compile \ejabberd { } on a Microsoft Windows system, you need:
2004-07-06 23:34:50 +02:00
\begin { itemize}
2007-11-26 08:59:35 +01:00
\item MS Visual C++ 6.0 Compiler
2008-06-13 17:25:57 +02:00
\item \footahref { http://www.erlang.org/download.html} { Erlang/OTP R11B-5}
2007-12-01 17:06:24 +01:00
\item \footahref { http://sourceforge.net/project/showfiles.php?group\_ id=10127\& package\_ id=11277} { Expat 2.0.0 or higher}
2007-11-26 08:59:35 +01:00
\item
2007-12-01 17:06:24 +01:00
\footahref { http://www.gnu.org/software/libiconv/} { GNU Iconv 1.9.2}
2007-11-26 08:59:35 +01:00
(optional)
2009-03-09 20:17:53 +01:00
\item \footahref { http://www.slproweb.com/products/Win32OpenSSL.html} { Shining Light OpenSSL 0.9.8d or higher}
2007-11-26 08:59:35 +01:00
(to enable SSL connections)
\item \footahref { http://www.zlib.net/} { Zlib 1.2.3 or higher}
\end { itemize}
2008-06-12 23:54:30 +02:00
\makesubsubsection { windowscom} { Compilation}
2007-11-26 08:59:35 +01:00
2008-01-01 19:20:57 +01:00
We assume that we will try to put as much library as possible into \verb |C:\sdk \| to make it easier to track what is install for \ejabberd { } .
2007-12-01 17:06:24 +01:00
2007-11-26 08:59:35 +01:00
\begin { enumerate}
2007-12-01 17:06:24 +01:00
\item Install Erlang emulator (for example, into \verb |C:\sdk \erl 5.5.5|).
\item Install Expat library into \verb |C:\sdk \Expat -2.0.0|
2004-07-06 23:34:50 +02:00
directory.
2005-11-28 11:55:45 +01:00
2007-12-01 17:06:24 +01:00
Copy file \verb |C:\sdk \Expat -2.0.0\Libs \libexpat .dll|
2003-07-13 11:00:01 +02:00
to your Windows system directory (for example, \verb |C:\WINNT | or
\verb |C:\WINNT \System 32|)
2005-11-28 11:55:45 +01:00
\item Build and install the Iconv library into the directory
2007-12-01 17:06:24 +01:00
\verb |C:\sdk \GnuWin 32|.
2005-11-28 11:55:45 +01:00
2007-12-01 17:06:24 +01:00
Copy file \verb |C:\sdk \GnuWin 32\bin \lib * .dll| to your
2005-11-28 11:55:45 +01:00
Windows system directory (more installation instructions can be found in the
file README.woe32 in the iconv distribution).
Note: instead of copying libexpat.dll and iconv.dll to the Windows
directory, you can add the directories
2007-12-01 17:06:24 +01:00
\verb |C:\sdk \Expat -2.0.0\Libs | and
\verb |C:\sdk \GnuWin 32\bin | to the \verb |PATH| environment
2003-07-13 11:00:01 +02:00
variable.
2007-12-01 17:06:24 +01:00
\item Install OpenSSL in \verb |C:\sdk \OpenSSL | and add \verb |C:\sdk \OpenSSL \lib \VC | to your path or copy the binaries to your system directory.
2008-10-06 16:18:46 +02:00
\item Install ZLib in \verb |C:\sdk \gnuWin 32|. Copy
\verb |C:\sdk \GnuWin 32\bin \zlib 1.dll| to your system directory. If you change your path it should already be set after libiconv install.
2009-01-13 15:50:31 +01:00
\item Make sure the you can access Erlang binaries from your path. For example: \verb |set PATH=%PATH%;"C:\sdk\erl5.6.5\bin"|
2007-12-01 17:06:24 +01:00
\item Depending on how you end up actually installing the library you might need to check and tweak the paths in the file configure.erl.
2005-11-28 11:55:45 +01:00
\item While in the directory \verb |ejabberd\src | run:
2003-07-13 11:00:01 +02:00
\begin { verbatim}
2004-07-06 23:34:50 +02:00
configure.bat
2003-07-13 11:00:01 +02:00
nmake -f Makefile.win32
\end { verbatim}
2013-08-12 14:25:05 +02:00
\item Edit the file \verb |ejabberd\src \ejabberd .yml| and run
2003-07-13 11:00:01 +02:00
\begin { verbatim}
werl -s ejabberd -name ejabberd
\end { verbatim}
2007-11-26 08:59:35 +01:00
\end { enumerate}
2003-07-13 11:00:01 +02:00
2006-09-22 11:09:28 +02:00
%TODO: how to compile database support on windows?
2003-10-12 20:21:16 +02:00
2012-02-22 15:40:31 +01:00
\makesection { initialadmin} { Create an XMPP Account for Administration}
2007-06-28 11:16:21 +02:00
2012-02-22 15:40:31 +01:00
You need an XMPP account and grant him administrative privileges
2008-01-01 19:20:57 +01:00
to enter the \ejabberd { } Web Admin:
2007-06-28 11:16:21 +02:00
\begin { enumerate}
2012-02-22 15:40:31 +01:00
\item Register an XMPP account on your \ejabberd { } server, for example \term { admin1@example.org} .
There are two ways to register an XMPP account:
2007-06-28 11:16:21 +02:00
\begin { enumerate}
2007-12-06 00:46:50 +01:00
\item Using \term { ejabberdctl} \ind { ejabberdctl} (see section~\ref { ejabberdctl} ):
2008-06-13 01:01:09 +02:00
\begin { verbatim}
ejabberdctl register admin1 example.org FgT5bk3
2008-10-06 16:18:46 +02:00
\end { verbatim}
2012-02-22 15:40:31 +01:00
\item Using an XMPP client and In-Band Registration (see section~\ref { modregister} ).
2007-06-28 11:16:21 +02:00
\end { enumerate}
2009-09-23 17:28:53 +02:00
\item Edit the \ejabberd { } configuration file to give administration rights to the XMPP account you created:
2008-06-13 01:01:09 +02:00
\begin { verbatim}
2013-08-12 14:25:05 +02:00
acl:
admin:
user:
- "admin1": "example.org"
access:
configure:
admin: allow
2008-10-06 16:18:46 +02:00
\end { verbatim}
2009-09-23 17:28:53 +02:00
You can grant administrative privileges to many XMPP accounts,
and also to accounts in other XMPP servers.
2007-06-28 11:16:21 +02:00
\item Restart \ejabberd { } to load the new configuration.
2008-01-01 19:20:57 +01:00
\item Open the Web Admin (\verb |http://server:port/admin/|) in your
2007-06-28 11:16:21 +02:00
favourite browser. Make sure to enter the \emph { full} JID as username (in this
2007-12-06 00:46:50 +01:00
example: \jid { admin1@example.org} . The reason that you also need to enter the
2007-06-28 11:16:21 +02:00
suffix, is because \ejabberd { } 's virtual hosting support.
\end { enumerate}
2008-06-12 23:54:30 +02:00
\makesection { upgrade} { Upgrading \ejabberd { } }
2008-01-15 18:53:40 +01:00
To upgrade an ejabberd installation to a new version,
simply uninstall the old version, and then install the new one.
2008-10-06 16:18:46 +02:00
Of course, it is important that the configuration file
2008-01-15 18:53:40 +01:00
and Mnesia database spool directory are not removed.
\ejabberd { } automatically updates the Mnesia table definitions at startup when needed.
If you also use an external database for storage of some modules,
check if the release notes of the new ejabberd version
indicates you need to also update those tables.
2007-06-28 11:16:21 +02:00
2008-06-12 23:54:30 +02:00
\makechapter { configure} { Configuring \ejabberd { } }
2005-11-28 11:55:45 +01:00
\ind { configuration file}
2003-01-23 21:57:55 +01:00
2008-06-12 23:54:30 +02:00
\makesection { basicconfig} { Basic Configuration}
2013-08-12 14:25:05 +02:00
The configuration file will be loaded the first time you start \ejabberd { } .
The configuration file name MUST have ``.yml'' extension. This helps ejabberd
to differentiate between the new and legacy file formats (see section~\ref { oldconfig} ).
2007-11-26 15:52:11 +01:00
2008-10-06 16:18:46 +02:00
Note that \ejabberd { } never edits the configuration file.
2007-11-26 15:52:11 +01:00
2013-08-12 14:25:05 +02:00
The configuration file is written in
\footahref { http://en.wikipedia.org/wiki/YAML} { YAML} .
However, different scalars are treated as different types:
\begin { itemize}
\item unquoted or single-quoted strings. The type is called \verb |atom()|
in this document.
Examples: \verb |dog|, \verb |'Jupiter'|, \verb |'3.14159'|, \verb |YELLOW|.
\item numeric literals. The type is called \verb |integer()|, \verb |float()| or,
if both are allowed, \verb |number()|.
Examples: \verb |3|, \verb |-45.0|, \verb |.0|
\item double-quoted or folded strings. The type is called \verb |string()|.
Examples of a double-quoted string:
\verb |"Lizzard"|, \verb |"orange"|, \verb |"3.14159"|.
Examples of a folded string:
\begin { verbatim}
> Art thou not Romeo,
and a Montague?
\end { verbatim}
2003-02-01 21:21:28 +01:00
\begin { verbatim}
2013-08-12 14:25:05 +02:00
| Neither, fair saint,
if either thee dislike.
2003-02-01 21:21:28 +01:00
\end { verbatim}
2013-08-12 14:25:05 +02:00
For associative arrays ("mappings") and lists you can use both outline
indentation and compact syntax (aka ``JSON style''). For example, the following is equivalent:
\begin { verbatim}
{ param1: ["val1", "val2"], param2: ["val3", "val4"]}
\end { verbatim}
and
\begin { verbatim}
param1:
- "val1"
- "val2"
param2:
- "val3"
- "val4"
\end { verbatim}
Note that both styles are used in this document.
\end { itemize}
\makesubsection { oldconfig} { Legacy Configuration File}
In previous \ejabberd { } version the configuration file should be written
in Erlang terms. The format is still supported, but it is highly recommended
to convert it to the new YAML format using \term { convert\_ to\_ yaml} command
2013-10-09 16:05:45 +02:00
from \term { ejabberdctl} (see~\ref { ejabberdctl} and \ref { list-eja-commands} for details).
2003-01-23 21:57:55 +01:00
2015-01-28 17:16:10 +01:00
If you want to specify some options using the old Erlang format,
you can set them in an additional cfg file, and include it using
the \option { include\_ config\_ file} option, see \ref { includeconfigfile}
for the option description and a related example in \ref { accesscommands} .
If you just want to provide an erlang term inside an option,
you can use the \term { "> erlangterm."} syntax for embedding erlang terms in a YAML file, for example:
\begin { verbatim}
modules:
mod_ cron:
tasks:
- time: 10
units: seconds
module: mnesia
function: info
arguments: "> []."
- time: 3
units: seconds
module: ejabberd_ auth
function: try_ register
arguments: "> [\" user1\" , \" localhost\" , \" pass\" ]."
\end { verbatim}
2008-06-12 23:54:30 +02:00
\makesubsection { hostnames} { Host Names}
2005-11-28 11:55:45 +01:00
\ind { options!hosts} \ind { host names}
2003-01-23 21:57:55 +01:00
2005-11-28 11:55:45 +01:00
The option \option { hosts} defines a list containing one or more domains that
\ejabberd { } will serve.
2005-04-18 16:47:13 +02:00
2009-08-12 16:15:59 +02:00
The syntax is:
2013-08-12 14:25:05 +02:00
\esyntax { [HostName]}
2009-08-12 16:15:59 +02:00
2005-11-28 11:55:45 +01:00
Examples:
\begin { itemize}
\item Serving one domain:
2008-06-13 01:01:09 +02:00
\begin { verbatim}
2013-08-12 14:25:05 +02:00
hosts: ["example.org"]
2005-11-28 11:55:45 +01:00
\end { verbatim}
2009-08-12 16:15:59 +02:00
\item Serving three domains:
2003-01-23 21:57:55 +01:00
\begin { verbatim}
2013-08-12 14:25:05 +02:00
hosts:
- "example.net"
- "example.com"
- "jabber.somesite.org"
2003-01-23 21:57:55 +01:00
\end { verbatim}
2005-11-28 11:55:45 +01:00
\end { itemize}
2003-01-23 21:57:55 +01:00
2008-06-12 23:54:30 +02:00
\makesubsection { virtualhost} { Virtual Hosting}
2006-09-22 11:09:28 +02:00
\ind { virtual hosting} \ind { virtual hosts} \ind { virtual domains}
2003-02-11 21:45:35 +01:00
2006-09-22 11:09:28 +02:00
Options can be defined separately for every virtual host using the
2009-08-12 16:15:59 +02:00
\term { host\_ config} option.
The syntax is: \ind { options!host\_ config}
2013-08-12 14:25:05 +02:00
\esyntax { \{ HostName: [Option, ...]\} }
2005-11-28 11:55:45 +01:00
Examples:
\begin { itemize}
2006-09-22 11:09:28 +02:00
\item Domain \jid { example.net} is using the internal authentication method while
domain \jid { example.com} is using the \ind { LDAP} LDAP server running on the
domain \jid { localhost} to perform authentication:
2003-02-11 21:45:35 +01:00
\begin { verbatim}
2013-08-12 14:25:05 +02:00
host_ config:
"example.net"
auth_ method: internal
"example.com":
auth_ method: ldap
ldap_ servers:
- "localhost"
ldap_ uids:
- "uid"
ldap_ rootdn: "dc=localdomain"
ldap_ rootdn: "dc=example,dc=com"
ldap_ password: ""
\end { verbatim}
\item Domain \jid { example.net} is using \ind { odbc} ODBC to perform authentication
2006-09-22 11:09:28 +02:00
while domain \jid { example.com} is using the LDAP servers running on the domains
\jid { localhost} and \jid { otherhost} :
2005-11-28 11:55:45 +01:00
\begin { verbatim}
2013-08-12 14:25:05 +02:00
host_ config:
"example.net":
auth_ method: odbc
odbc_ type: odbc
odbc_ server: "DSN=ejabberd;UID=ejabberd;PWD=ejabberd"
"example.com":
auth_ method: ldap
ldap_ servers:
- "localhost"
- "otherhost"
ldap_ uids:
- "uid"
ldap_ rootdn: "dc=localdomain"
ldap_ rootdn: "dc=example,dc=com"
ldap_ password: ""
2005-11-28 11:55:45 +01:00
\end { verbatim}
\end { itemize}
2008-10-06 16:18:46 +02:00
2008-03-04 11:36:57 +01:00
To define specific ejabberd modules in a virtual host,
you can define the global \term { modules} option with the common modules,
and later add specific modules to certain virtual hosts.
2013-08-12 14:25:05 +02:00
To accomplish that, instead of defining each option in \term { host\_ config}
use \term { append\_ host\_ config} with the same syntax.
2007-09-06 09:45:04 +02:00
2008-03-04 11:36:57 +01:00
In this example three virtual hosts have some similar modules, but there are also
other different modules for some specific virtual hosts:
2007-09-06 09:45:04 +02:00
\begin { verbatim}
2013-08-12 14:25:05 +02:00
## This ejabberd server has three vhosts:
hosts:
- "one.example.org"
- "two.example.org"
- "three.example.org"
## Configuration of modules that are common to all vhosts
modules:
mod_ roster: { }
mod_ configure: { }
mod_ disco: { }
mod_ private: { }
mod_ time: { }
mod_ last: { }
mod_ version: { }
## Add some modules to vhost one:
append_ host_ config:
"one.example.org":
modules:
mod_ echo:
host: "echo-service.one.example.org"
mod_ http_ bind: { }
mod_ logxml: { }
## Add a module just to vhost two:
append_ host_ config:
"two.example.org":
modules:
mod_ echo:
host: "mirror.two.example.org"
2007-09-06 09:45:04 +02:00
\end { verbatim}
2003-02-11 21:45:35 +01:00
2008-06-12 23:54:30 +02:00
\makesubsection { listened} { Listening Ports}
2005-11-28 11:55:45 +01:00
\ind { options!listen}
2003-02-01 21:21:28 +01:00
2009-08-11 13:22:57 +02:00
The option \option { listen} defines for which ports, addresses and network protocols \ejabberd { }
2013-08-12 14:25:05 +02:00
will listen and what services will be run on them. Each element of the list is an
associative array with the following elements:
2003-02-01 21:21:28 +01:00
\begin { itemize}
2009-08-11 12:13:03 +02:00
\item Port number. Optionally also the IP address and/or a transport protocol.
2009-01-12 21:03:02 +01:00
\item Listening module that serves this port.
\item Options for the TCP socket and for the listening module.
2003-02-01 21:21:28 +01:00
\end { itemize}
2009-08-12 16:15:59 +02:00
The option syntax is:
2013-08-12 14:25:05 +02:00
\esyntax { [Listener, ...]}
Example:
\begin { verbatim}
listen:
-
port: 5222
module: ejabberd_ c2s
starttls: true
certfile: "/path/to/certfile.pem"
-
port: 5269
module: ejabberd_ s2s_ in
transport: tcp
\end { verbatim}
2009-01-12 21:03:02 +01:00
2009-08-11 12:13:03 +02:00
\makesubsubsection { listened-port} { Port Number, IP Address and Transport Protocol}
2009-01-12 21:03:02 +01:00
The port number defines which port to listen for incoming connections.
It can be a Jabber/XMPP standard port
(see section \ref { firewall} ) or any other valid port number.
2013-08-12 14:25:05 +02:00
The IP address can be represented as a string.
2009-01-12 21:03:02 +01:00
The socket will listen only in that network interface.
It is possible to specify a generic address,
so \ejabberd { } will listen in all addresses.
Depending in the type of the IP address, IPv4 or IPv6 will be used.
2009-08-12 16:15:59 +02:00
When not specified the IP address, it will listen on all IPv4 network addresses.
2009-01-12 21:03:02 +01:00
Some example values for IP address:
\begin { itemize}
\item \verb |"0.0.0.0"| to listen in all IPv4 network interfaces. This is the default value when no IP is specified.
\item \verb |"::"| to listen in all IPv6 network interfaces
\item \verb |"10.11.12.13"| is the IPv4 address \verb |10.11.12.13|
\item \verb |"::FFFF:127.0.0.1"| is the IPv6 address \verb |::FFFF:127.0.0.1/128|
\end { itemize}
2009-08-11 13:22:57 +02:00
The transport protocol can be \term { tcp} or \term { udp} .
Default is \term { tcp} .
2009-01-12 21:03:02 +01:00
\makesubsubsection { listened-module} { Listening Module}
2007-01-11 09:17:18 +01:00
\ind { modules!ejabberd\_ c2s} \ind { modules!ejabberd\_ s2s\_ in} \ind { modules!ejabberd\_ service} \ind { modules!ejabberd\_ http} \ind { protocols!XEP-0114: Jabber Component Protocol}
2007-11-27 19:40:09 +01:00
The available modules, their purpose and the options allowed by each one are:
2008-06-13 01:52:13 +02:00
\begin { description}
2008-10-06 16:18:46 +02:00
\titem { \texttt { ejabberd\_ c2s} }
2008-06-13 01:52:13 +02:00
Handles c2s connections.\\
2014-04-01 21:57:33 +02:00
Options: \texttt { access} , \texttt { certfile} , \texttt { ciphers} , \texttt { protocol\_ options}
2014-03-12 23:34:14 +01:00
\texttt { max\_ ack\_ queue} , \texttt { max\_ fsm\_ queue} ,
2014-03-25 23:23:38 +01:00
\texttt { max\_ stanza\_ size} , \texttt { resend\_ on\_ timeout} ,
\texttt { resume\_ timeout} , \texttt { shaper} ,
\texttt { starttls} , \texttt { starttls\_ required} ,
2014-03-12 23:34:14 +01:00
\texttt { stream\_ management} , \texttt { tls} ,
2013-07-17 14:28:23 +02:00
\texttt { zlib} , \texttt { tls\_ compression}
2008-06-13 01:52:13 +02:00
\titem { \texttt { ejabberd\_ s2s\_ in} }
Handles incoming s2s connections.\\
2013-07-17 14:28:23 +02:00
Options: \texttt { max\_ stanza\_ size} , \texttt { shaper} , \texttt { tls\_ compression}
2008-06-13 01:52:13 +02:00
\titem { \texttt { ejabberd\_ service} }
2008-10-06 16:18:46 +02:00
Interacts with an \footahref { http://www.ejabberd.im/tutorials-transports} { external component}
2007-11-27 19:40:09 +01:00
(as defined in the Jabber Component Protocol (\xepref { 0114} ).\\
2009-10-08 16:29:42 +02:00
Options: \texttt { access} , \texttt { hosts} , \texttt { max\_ fsm\_ queue} ,
2013-06-10 17:56:00 +02:00
\texttt { service\_ check\_ from} , \texttt { shaper\_ rule}
2014-04-30 17:20:38 +02:00
\titem { \texttt { ejabberd\_ sip} }
Handles SIP requests as defined in
\footahref { http://tools.ietf.org/html/rfc3261} { RFC 3261} .\\
Options: \texttt { certfile} , \texttt { tls}
2009-08-11 12:13:03 +02:00
\titem { \texttt { ejabberd\_ stun} }
2014-05-08 14:08:07 +02:00
Handles STUN/TURN requests as defined in
\footahref { http://tools.ietf.org/html/rfc5389} { RFC 5389} and
\footahref { http://tools.ietf.org/html/rfc5766} { RFC 5766} .\\
Options: \texttt { certfile} , \texttt { tls} , \texttt { use\_ turn} , \texttt { turn\_ ip} ,
\texttt { turn\_ port\_ range} , \texttt { turn\_ max\_ allocations} ,
\texttt { turn\_ max\_ permissions} , \texttt { shaper} , \texttt { server\_ name} ,
\texttt { auth\_ realm} , \texttt { auth\_ type}
2008-06-13 01:52:13 +02:00
\titem { \texttt { ejabberd\_ http} }
Handles incoming HTTP connections.\\
2012-02-14 11:35:17 +01:00
Options: \texttt { captcha} , \texttt { certfile} , \texttt { default\_ host} , \texttt { http\_ bind} , \texttt { http\_ poll} ,
2013-07-17 14:28:23 +02:00
\texttt { request\_ handlers} , \texttt { tls} , \texttt { tls\_ compression} , \texttt { trusted\_ proxies} , \texttt { web\_ admin} \\
2014-01-02 16:31:28 +01:00
\titem { \texttt { ejabberd\_ xmlrpc} }
Handles XML-RPC requests to execute ejabberd commands (\ref { eja-commands} ).\\
Options: \texttt { access\_ commands} , \texttt { maxsessions} , \texttt { timeout} .\\
You can find option explanations, example configuration in old and new format,
and example calls in several languages in the old
2014-05-14 22:39:19 +02:00
\footahref { http://www.ejabberd.im/ejabberd\_ xmlrpc} { ejabberd\_ xmlrpc documentation} .
2008-06-13 01:52:13 +02:00
\end { description}
2004-07-06 23:34:50 +02:00
2009-01-12 21:03:02 +01:00
\makesubsubsection { listened-options} { Options}
2007-11-28 18:16:36 +01:00
This is a detailed description of each option allowed by the listening modules:
2005-11-28 11:55:45 +01:00
\begin { description}
2013-08-12 14:25:05 +02:00
\titem { access: AccessName} \ind { options!access} This option defines
2006-09-22 11:09:28 +02:00
access to the port. The default value is \term { all} .
2013-08-12 14:25:05 +02:00
\titem { backlog: Value} \ind { options!backlog} The backlog value
2009-10-19 15:23:46 +02:00
defines the maximum length that the queue of pending connections may
grow to. This should be increased if the server is going to handle
lots of new incoming connections as they may be dropped if there is
no space in the queue (and ejabberd was not able to accept them
immediately). Default value is 5.
2013-08-12 14:25:05 +02:00
\titem { captcha: true|false} \ind { options!http-captcha}
2010-04-19 11:57:16 +02:00
Simple web page that allows a user to fill a CAPTCHA challenge (see section \ref { captcha} ).
2013-08-12 14:25:05 +02:00
\titem { certfile: Path} Full path to a file containing the default SSL certificate.
2007-11-28 18:16:36 +01:00
To define a certificate file specific for a given domain, use the global option \term { domain\_ certfile} .
2013-11-28 18:39:11 +01:00
\titem { ciphers: Ciphers} OpenSSL ciphers list in the same format accepted by
`\verb |openssl ciphers|' command.
2014-04-01 21:57:33 +02:00
\titem { protocol\_ options: ProtocolOpts} \ind { options!protocol\_ options}
2014-05-20 00:24:34 +02:00
List of general options relating to SSL/TLS. These map to
\footahref { https://www.openssl.org/docs/ssl/SSL\_ CTX\_ set\_ options.html} { OpenSSL's set\_ options()} .
For a full list of options available in ejabberd,
\footahref { https://github.com/processone/tls/blob/master/c\_ src/options.h} { see the source} .
2014-04-01 21:57:33 +02:00
The default entry is: \verb |"no_ sslv2"|
2013-08-12 14:25:05 +02:00
\titem { default\_ host: undefined|HostName\} }
2012-02-14 11:35:17 +01:00
If the HTTP request received by ejabberd contains the HTTP header \term { Host}
with an ambiguous virtual host that doesn't match any one defined in ejabberd (see \ref { hostnames} ),
then this configured HostName is set as the request Host.
The default value of this option is: \term { undefined} .
2013-08-12 14:25:05 +02:00
\titem { hosts: \{ Hostname: [HostOption, ...]\} } \ind { options!hosts}
2008-09-15 20:38:52 +02:00
The external Jabber component that connects to this \term { ejabberd\_ service}
can serve one or more hostnames.
2009-08-12 16:15:59 +02:00
As \term { HostOption} you can define options for the component;
2008-09-15 20:38:52 +02:00
currently the only allowed option is the password required to the component
2013-08-12 14:25:05 +02:00
when attempt to connect to ejabberd: \poption { password: Secret} .
2008-07-15 23:03:48 +02:00
Note that you cannot define in a single \term { ejabberd\_ service} components of
different services: add an \term { ejabberd\_ service} for each service,
as seen in an example below.
2013-08-12 14:25:05 +02:00
\titem { http\_ bind: true|false} \ind { options!http\_ bind} \ind { protocols!XEP-0206: HTTP Binding} \ind { JWChat} \ind { web-based XMPP client}
2007-12-22 17:36:48 +01:00
This option enables HTTP Binding (\xepref { 0124} and \xepref { 0206} ) support. HTTP Bind
enables access via HTTP requests to \ejabberd { } from behind firewalls which
do not allow outgoing sockets on port 5222.
Remember that you must also install and enable the module mod\_ http\_ bind.
If HTTP Bind is enabled, it will be available at
\verb |http://server:port/http-bind/|. Be aware that support for HTTP Bind
2009-09-23 17:28:53 +02:00
is also needed in the \XMPP { } client. Remark also that HTTP Bind can be
interesting to host a web-based \XMPP { } client such as
2008-10-06 16:18:46 +02:00
\footahref { http://jwchat.sourceforge.net/} { JWChat}
2008-06-08 18:52:25 +02:00
(check the tutorials to install JWChat with ejabberd and an
\footahref { http://www.ejabberd.im/jwchat-localserver} { embedded local web server}
or \footahref { http://www.ejabberd.im/jwchat-apache} { Apache} ).
2013-08-12 14:25:05 +02:00
\titem { http\_ poll: true|false} \ind { options!http\_ poll} \ind { protocols!XEP-0025: HTTP Polling} \ind { JWChat} \ind { web-based XMPP client}
2007-01-11 09:17:18 +01:00
This option enables HTTP Polling (\xepref { 0025} ) support. HTTP Polling
2005-11-28 11:55:45 +01:00
enables access via HTTP requests to \ejabberd { } from behind firewalls which
do not allow outgoing sockets on port 5222.
If HTTP Polling is enabled, it will be available at
\verb |http://server:port/http-poll/|. Be aware that support for HTTP Polling
2009-09-23 17:28:53 +02:00
is also needed in the \XMPP { } client. Remark also that HTTP Polling can be
interesting to host a web-based \XMPP { } client such as
2008-06-08 18:52:25 +02:00
\footahref { http://jwchat.sourceforge.net/} { JWChat} .
2009-02-14 10:03:26 +01:00
The maximum period of time to keep a client session active without
an incoming POST request can be configured with the global option
\term { http\_ poll\_ timeout} . The default value is five minutes.
2013-08-12 14:25:05 +02:00
The option can be defined in \term { ejabberd.yml} , expressing the time
2009-02-14 10:03:26 +01:00
in seconds: \verb |{ http_ poll_ timeout, 300} .|
2014-03-12 23:34:14 +01:00
\titem { max\_ ack\_ queue: Size}
This option specifies the maximum number of unacknowledged stanzas
queued for possible retransmission if \term { stream\_ management} is
2014-05-27 22:56:33 +02:00
enabled. When the limit is exceeded, the client session is
terminated. This option can be specified for \term { ejabberd\_ c2s}
listeners. The allowed values are positive integers and
\term { infinity} . Default value: \term { 500} .
2013-08-12 14:25:05 +02:00
\titem { max\_ fsm\_ queue: Size}
2010-02-18 07:48:11 +01:00
This option specifies the maximum number of elements in the queue of the FSM
(Finite State Machine).
Roughly speaking, each message in such queues represents one XML
stanza queued to be sent into its relevant outgoing stream. If queue size
reaches the limit (because, for example, the receiver of stanzas is too slow),
the FSM and the corresponding connection (if any) will be terminated
and error message will be logged.
The reasonable value for this option depends on your hardware configuration.
However, there is no much sense to set the size above 1000 elements.
2010-01-28 14:56:38 +01:00
This option can be specified for \term { ejabberd\_ service} and
\term { ejabberd\_ c2s} listeners,
2009-10-08 16:29:42 +02:00
or also globally for \term { ejabberd\_ s2s\_ out} .
2010-01-28 14:56:38 +01:00
If the option is not specified for \term { ejabberd\_ service} or
\term { ejabberd\_ c2s} listeners,
2009-10-08 16:29:42 +02:00
the globally configured value is used.
The allowed values are integers and 'undefined'.
Default value: 'undefined'.
2013-08-12 14:25:05 +02:00
\titem { max\_ stanza\_ size: Size}
2007-07-24 11:17:29 +02:00
\ind { options!max\_ stanza\_ size} This option specifies an
approximate maximum size in bytes of XML stanzas. Approximate,
2010-04-19 11:57:16 +02:00
because it is calculated with the precision of one block of read
2007-07-24 11:17:29 +02:00
data. For example \verb |{ max_ stanza_ size, 65536} |. The default
2007-11-26 20:54:30 +01:00
value is \term { infinity} . Recommended values are 65536 for c2s
2007-07-24 11:17:29 +02:00
connections and 131072 for s2s connections. s2s max stanza size
must always much higher than c2s limit. Change this value with
extreme care as it can cause unwanted disconnect if set too low.
2013-08-12 14:25:05 +02:00
\titem { request\_ handlers: \{ Path: Module\} } To define one or several handlers that will serve HTTP requests.
The Path is a string; so the URIs that start with that Path will be served by Module.
2007-11-27 19:40:09 +01:00
For example, if you want \term { mod\_ foo} to serve the URIs that start with \term { /a/b/} ,
and you also want \term { mod\_ http\_ bind} to serve the URIs \term { /http-bind/} ,
2013-08-12 14:25:05 +02:00
use this option:
\begin { verbatim}
request_ handlers:
/"a"/"b": mod_ foo
/"http-bind": mod_ http_ bind
\end { verbatim}
2014-09-16 22:42:34 +02:00
\titem { resend\_ on\_ timeout: true|false|if\_ offline}
2014-03-25 23:23:38 +01:00
If \term { stream\_ management} is enabled and this option is set to
\term { true} , any stanzas that weren't acknowledged by the client
will be resent on session timeout. This behavior might often be
desired, but could have unexpected results under certain
circumstances. For example, a message that was sent to two resources
might get resent to one of them if the other one timed out.
Therefore, the default value for this option is \term { false} , which
2014-09-16 22:42:34 +02:00
tells ejabberd to generate an error message instead. As an
alternative, the option may be set to \term { if\_ offline} . In this
case, unacknowledged stanzas are resent only if no other resource is
online when the session times out. Otherwise, error messages are
generated. The option can be specified for \term { ejabberd\_ c2s}
listeners.
2014-03-19 00:51:33 +01:00
\titem { resume\_ timeout: Seconds}
This option configures the number of seconds until a session times
out if the connection is lost. During this period of time, a client
may resume the session if \term { stream\_ management} is enabled. This
option can be specified for \term { ejabberd\_ c2s} listeners. Setting
it to \term { 0} effectively disables session resumption. The default
value is \term { 300} .
2013-08-12 14:25:05 +02:00
\titem { service\_ check\_ from: true|false}
2010-04-19 11:57:16 +02:00
\ind { options!service\_ check\_ from}
This option can be used with \term { ejabberd\_ service} only.
\xepref { 0114} requires that the domain must match the hostname of the component.
If this option is set to \term { false} , \ejabberd { } will allow the component
to send stanzas with any arbitrary domain in the 'from' attribute.
Only use this option if you are completely sure about it.
The default value is \term { true} , to be compliant with \xepref { 0114} .
2013-08-12 14:25:05 +02:00
\titem { shaper: none|ShaperName} \ind { options!shaper} This option defines a
2007-01-11 09:17:18 +01:00
shaper for the port (see section~\ref { shapers} ). The default value
2006-09-22 11:09:28 +02:00
is \term { none} .
2013-08-12 14:25:05 +02:00
\titem { shaper\_ rule: none|ShaperRule} \ind { options!shaperrule} This option defines a
2013-06-10 17:56:00 +02:00
shaper rule for the \term { ejabberd\_ service} (see section~\ref { shapers} ). The recommended value
is \term { fast} .
2013-08-12 14:25:05 +02:00
\titem { starttls: true|false} \ind { options!starttls} \ind { STARTTLS} This option
2005-11-28 11:55:45 +01:00
specifies that STARTTLS encryption is available on connections to the port.
You should also set the \option { certfile} option.
2007-11-28 18:16:36 +01:00
You can define a certificate file for a specific domain using the global option \option { domain\_ certfile} .
2013-08-12 14:25:05 +02:00
\titem { starttls\_ required: true|false} \ind { options!starttls\_ required} This option
2005-11-28 11:55:45 +01:00
specifies that STARTTLS encryption is required on connections to the port.
2008-10-06 16:18:46 +02:00
No unencrypted connections will be allowed.
2007-11-28 18:16:36 +01:00
You should also set the \option { certfile} option.
You can define a certificate file for a specific domain using the global option \option { domain\_ certfile} .
2014-03-12 23:34:14 +01:00
\titem { stream\_ management: true|false}
Setting this option to \term { false} disables ejabberd's support for
2014-08-26 01:01:11 +02:00
Stream Management (\xepref { 0198} ). It can be specified for
2014-03-12 23:34:14 +01:00
\term { ejabberd\_ c2s} listeners. The default value is \term { true} .
2013-08-12 14:25:05 +02:00
\titem { timeout: Integer} \ind { options!timeout}
Timeout of the connections, expressed in milliseconds.
Default: 5000
\titem { tls: true|false} \ind { options!tls} \ind { TLS} This option specifies that traffic on
2009-06-25 20:02:23 +02:00
the port will be encrypted using SSL immediately after connecting.
This was the traditional encryption method in the early Jabber software,
commonly on port 5223 for client-to-server communications.
But this method is nowadays deprecated and not recommended.
The preferable encryption method is STARTTLS on port 5222, as defined
2015-02-26 12:18:51 +01:00
\footahref { http://xmpp.org/rfcs/rfc6120.html\# tls} { RFC 6120: XMPP Core} ,
2009-06-25 20:02:23 +02:00
which can be enabled in \ejabberd { } with the option \term { starttls} .
If this option is set, you should also set the \option { certfile} option.
2009-12-23 10:04:39 +01:00
The option \term { tls} can also be used in \term { ejabberd\_ http} to support HTTPS.
2013-08-12 14:25:05 +02:00
\titem { tls\_ compression: true|false}
2013-07-17 14:28:23 +02:00
Whether to enable or disable TLS compression. The default value is \term { true} .
2013-08-12 14:25:05 +02:00
\titem { trusted\_ proxies: all | [IpString]} \ind { options!trusted\_ proxies}
2010-12-07 16:47:32 +01:00
Specify what proxies are trusted when an HTTP request contains the header \term { X-Forwarded-For}
You can specify \term { all} to allow all proxies, or specify a list of IPs in string format.
The default value is: \term { ["127.0.0.1"]}
2013-08-12 14:25:05 +02:00
\titem { web\_ admin: true|false} \ind { options!web\_ admin} \ind { web admin} This option
2008-01-01 19:20:57 +01:00
enables the Web Admin for \ejabberd { } administration which is available
2007-11-27 19:40:09 +01:00
at \verb |http://server:port/admin/|. Login and password are the username and
password of one of the registered users who are granted access by the
`configure' access rule.
2013-08-12 14:25:05 +02:00
\titem { zlib: true|false} \ind { options!zlib} \ind { protocols!XEP-0138: Stream Compression} \ind { Zlib} This
2007-01-11 09:17:18 +01:00
option specifies that Zlib stream compression (as defined in \xepref { 0138} )
2009-08-31 18:29:25 +02:00
is available on connections to the port.
2003-02-01 21:21:28 +01:00
\end { description}
2009-01-12 21:03:02 +01:00
There are some additional global options that can be specified in the ejabberd configuration file (outside \term { listen} ):
2005-12-06 21:03:21 +01:00
\begin { description}
2013-08-12 14:25:05 +02:00
\titem { s2s\_ use\_ starttls: false|optional|required|required\_ trusted}
2010-12-08 20:02:31 +01:00
\ind { options!s2s\_ use\_ starttls} \ind { STARTTLS} This option defines if
2010-12-11 02:28:50 +01:00
s2s connections don't use STARTTLS encryption; if STARTTLS can be used optionally;
if STARTTLS is required to establish the connection;
or if STARTTLS is required and the remote certificate must be valid and trusted.
2010-12-08 20:02:31 +01:00
The default value is to not use STARTTLS: \term { false} .
2013-08-12 14:25:05 +02:00
\titem { s2s\_ certfile: Path} \ind { options!s2s\_ certificate} Full path to a
2006-09-22 11:09:28 +02:00
file containing a SSL certificate.
2013-08-12 14:25:05 +02:00
\titem { domain\_ certfile: Path} \ind { options!domain\_ certfile}
2007-11-28 18:16:36 +01:00
Full path to the file containing the SSL certificate for a specific domain.
2013-11-28 18:39:11 +01:00
\titem { s2s\_ ciphers: Ciphers} \ind { options!s2s\_ ciphers} OpenSSL ciphers list
in the same format accepted by `\verb |openssl ciphers|' command.
2014-04-01 21:57:33 +02:00
\titem { s2s\_ protocol\_ options: ProtocolOpts} \ind { options!s2s\_ protocol\_ options}
2014-05-20 00:24:34 +02:00
List of general options relating to SSL/TLS. These map to
\footahref { https://www.openssl.org/docs/ssl/SSL\_ CTX\_ set\_ options.html} { OpenSSL's set\_ options()} .
For a full list of options available in ejabberd,
\footahref { https://github.com/processone/tls/blob/master/c\_ src/options.h} { see the source} .
2014-04-16 00:25:11 +02:00
The default entry is: \verb |"no_ sslv2"|
2013-08-12 14:25:05 +02:00
\titem { outgoing\_ s2s\_ families: [Family, ...]} \ind { options!outgoing\_ s2s\_ families}
Specify which address families to try, in what order.
By default it first tries connecting with IPv4, if that fails it tries using IPv6.
\titem { outgoing\_ s2s\_ timeout: Timeout} \ind { options!outgoing\_ s2s\_ timeout}
The timeout in milliseconds for outgoing S2S connection attempts.
\titem { s2s\_ dns\_ timeout: Timeout} \ind { options!s2s\_ dns\_ timeout}
The timeout in seconds for DNS resolving. The default value is \term { 10} .
\titem { s2s\_ dns\_ retries: Number} \ind { options!s2s\_ dns\_ retries}
DNS resolving retries in seconds. The default value is \term { 2} .
\titem { s2s\_ policy: Access} \ind { options!s2s\_ policy}
The policy for incoming and outgoing s2s connections to other XMPP servers.
The default value is \term { all} .
\titem { s2s\_ max\_ retry\_ delay: Seconds} \ind { options!s2s\_ max\_ retry\_ delay}
2008-04-18 14:19:45 +02:00
The maximum allowed delay for retry to connect after a failed connection attempt.
Specified in seconds. The default value is 300 seconds (5 minutes).
2013-08-12 14:25:05 +02:00
\titem { s2s\_ tls\_ compression: true|false}
2013-07-17 14:28:23 +02:00
Whether to enable or disable TLS compression for s2s connections.
The default value is \term { true} .
2013-08-12 14:25:05 +02:00
\titem { max\_ fsm\_ queue: Size}
2010-02-18 07:48:11 +01:00
This option specifies the maximum number of elements in the queue of the FSM
(Finite State Machine).
Roughly speaking, each message in such queues represents one XML
stanza queued to be sent into its relevant outgoing stream. If queue size
reaches the limit (because, for example, the receiver of stanzas is too slow),
the FSM and the corresponding connection (if any) will be terminated
and error message will be logged.
The reasonable value for this option depends on your hardware configuration.
However, there is no much sense to set the size above 1000 elements.
2010-01-28 14:56:38 +01:00
This option can be specified for \term { ejabberd\_ service} and
\term { ejabberd\_ c2s} listeners,
2009-10-08 16:29:42 +02:00
or also globally for \term { ejabberd\_ s2s\_ out} .
2010-01-28 14:56:38 +01:00
If the option is not specified for \term { ejabberd\_ service} or
\term { ejabberd\_ c2s} listeners,
2009-10-08 16:29:42 +02:00
the globally configured value is used.
The allowed values are integers and 'undefined'.
Default value: 'undefined'.
2013-08-12 14:25:05 +02:00
\titem { route\_ subdomains: local|s2s}
2010-01-16 15:34:31 +01:00
Defines if ejabberd must route stanzas directed to subdomains locally (compliant with
2015-02-26 12:18:51 +01:00
\footahref { http://xmpp.org/rfcs/rfc6120.html\# rules-local} { RFC 6120 Local Domain rules} ),
2010-01-16 15:34:31 +01:00
or to foreign server using S2S (compliant with
2015-02-26 12:18:51 +01:00
\footahref { http://xmpp.org/rfcs/rfc6120.html\# rules-remote} { RFC 6120 Remote Domain rules} ).
2005-12-06 21:03:21 +01:00
\end { description}
2009-01-12 21:03:02 +01:00
\makesubsubsection { listened-examples} { Examples}
2007-11-28 18:16:36 +01:00
For example, the following simple configuration defines:
\begin { itemize}
\item There are three domains. The default certificate file is \term { server.pem} .
However, the c2s and s2s connections to the domain \term { example.com} use the file \term { example\_ com.pem} .
2008-10-06 16:18:46 +02:00
\item Port 5222 listens for c2s connections with STARTTLS,
2007-11-28 18:16:36 +01:00
and also allows plain connections for old clients.
\item Port 5223 listens for c2s connections with the old SSL.
2009-01-12 21:03:02 +01:00
\item Port 5269 listens for s2s connections with STARTTLS. The socket is set for IPv6 instead of IPv4.
2009-08-11 12:13:03 +02:00
\item Port 3478 listens for STUN requests over UDP.
2007-11-28 18:16:36 +01:00
\item Port 5280 listens for HTTP requests, and serves the HTTP Poll service.
2011-04-28 13:24:18 +02:00
\item Port 5281 listens for HTTP requests, using HTTPS to serve HTTP-Bind (BOSH) and the Web Admin as explained in
2009-01-12 21:03:02 +01:00
section~\ref { webadmin} . The socket only listens connections to the IP address 127.0.0.1.
2007-11-28 18:16:36 +01:00
\end { itemize}
\begin { verbatim}
2013-08-12 14:25:05 +02:00
hosts:
- "example.com"
- "example.org"
- "example.net"
listen:
-
port: 5222
module: ejabberd_ c2s
access: c2s
shaper: c2s_ shaper
starttls: true
certfile: "/etc/ejabberd/server.pem"
max_ stanza_ size: 65536
-
port: 5223
module: ejabberd_ c2s
access: c2s
shaper: c2s_ shaper
tls: true
certfile: "/etc/ejabberd/server.pem"
max_ stanza_ size: 65536
-
port: 5269
ip: "::"
module: ejabberd_ s2s_ in
shaper: s2s_ shaper
max_ stanza_ size: 131072
-
port: 3478
transport: udp
module: ejabberd_ stun
-
port: 5280
module: ejabberd_ http
http_ poll: true
-
port: 5281
ip: "127.0.0.1"
module: ejabberd_ http
web_ admin: true
http_ bind: true
tls: true
certfile: "/etc/ejabberd/server.pem"
s2s_ use_ starttls: optional
s2s_ certfile: "/etc/ejabberd/server.pem"
host_ config:
"example.com":
domain_ certfile: "/etc/ejabberd/example_ com.pem"
outgoing_ s2s_ families:
- ipv4
- ipv6
outgoing_ s2s_ timeout: 10000
2007-11-28 18:16:36 +01:00
\end { verbatim}
In this example, the following configuration defines that:
2004-05-22 21:48:35 +02:00
\begin { itemize}
2009-01-12 21:03:02 +01:00
\item c2s connections are listened for on port 5222 (all IPv4 addresses) and
on port 5223 (SSL, IP 192.168.0.1 and fdca:8ab6:a243:75ef::1) and denied
2006-09-22 11:09:28 +02:00
for the user called `\term { bad} '.
2009-01-12 21:03:02 +01:00
\item s2s connections are listened for on port 5269 (all IPv4 addresses)
2010-12-11 02:28:50 +01:00
with STARTTLS for secured traffic strictly required, and the certificates are verified.
2009-09-23 17:28:53 +02:00
Incoming and outgoing connections of remote XMPP servers are denied,
2008-03-21 17:17:37 +01:00
only two servers can connect: "jabber.example.org" and "example.com".
2009-01-12 21:03:02 +01:00
\item Port 5280 is serving the Web Admin and the HTTP Polling service
in all the IPv4 addresses. Note
2005-11-28 11:55:45 +01:00
that it is also possible to serve them on different ports. The second
2008-03-31 12:36:41 +02:00
example in section~\ref { webadmin} shows how exactly this can be done.
2009-01-12 21:03:02 +01:00
\item All users except for the administrators have a traffic of limit
2005-11-28 11:55:45 +01:00
1,000\, Bytes/second
\item \ind { transports!AIM} The
2007-11-28 00:35:26 +01:00
\footahref { http://www.ejabberd.im/pyaimt} { AIM transport}
2009-01-12 21:03:02 +01:00
\jid { aim.example.org} is connected to port 5233 on localhost IP addresses
(127.0.0.1 and ::1) with password `\term { aimsecret} '.
2005-11-28 11:55:45 +01:00
\item \ind { transports!ICQ} The ICQ transport JIT (\jid { icq.example.org} and
\jid { sms.example.org} ) is connected to port 5234 with password
2006-09-22 11:09:28 +02:00
`\term { jitsecret} '.
2005-11-28 11:55:45 +01:00
\item \ind { transports!MSN} The
2007-11-28 00:35:26 +01:00
\footahref { http://www.ejabberd.im/pymsnt} { MSN transport}
2005-11-28 11:55:45 +01:00
\jid { msn.example.org} is connected to port 5235 with password
2006-09-22 11:09:28 +02:00
`\term { msnsecret} '.
2005-11-28 11:55:45 +01:00
\item \ind { transports!Yahoo} The
2007-11-28 00:35:26 +01:00
\footahref { http://www.ejabberd.im/yahoo-transport-2} { Yahoo! transport}
2005-11-28 11:55:45 +01:00
\jid { yahoo.example.org} is connected to port 5236 with password
2006-09-22 11:09:28 +02:00
`\term { yahoosecret} '.
2007-11-28 00:35:26 +01:00
\item \ind { transports!Gadu-Gadu} The \footahref { http://www.ejabberd.im/jabber-gg-transport} { Gadu-Gadu transport} \jid { gg.example.org} is
2006-09-22 11:09:28 +02:00
connected to port 5237 with password `\term { ggsecret} '.
2005-11-28 11:55:45 +01:00
\item \ind { transports!email notifier} The
2007-11-28 00:35:26 +01:00
\footahref { http://www.ejabberd.im/jmc} { Jabber Mail Component}
2005-11-28 11:55:45 +01:00
\jid { jmc.example.org} is connected to port 5238 with password
2006-09-22 11:09:28 +02:00
`\term { jmcsecret} '.
2007-06-28 16:32:48 +02:00
\item The service custom has enabled the special option to avoiding checking the \term { from} attribute in the packets send by this component. The component can send packets in behalf of any users from the server, or even on behalf of any server.
2004-05-22 21:48:35 +02:00
\end { itemize}
2004-07-10 00:34:26 +02:00
\begin { verbatim}
2013-08-12 14:25:05 +02:00
acl:
blocked:
user: "bad"
trusted_ servers:
server:
- "example.com"
- "jabber.example.org"
xmlrpc_ bot:
user:
- "xmlrpc-robot": "example.org"
shaper:
normal: 1000
access:
c2s:
blocked: deny
all: allow
c2s_ shaper:
admin: none
all: normal
xmlrpc_ access:
xmlrpc_ bot: allow
2014-07-22 15:06:19 +02:00
s2s:
2013-08-12 14:25:05 +02:00
trusted_ servers: allow
all: deny
s2s_ certfile: "/path/to/ssl.pem"
2014-07-22 15:06:19 +02:00
s2s_ access: s2s
2013-08-12 14:25:05 +02:00
s2s_ use_ starttls: required_ trusted
listen:
-
port: 5222
module: ejabberd_ c2s
shaper: c2s_ shaper
access: c2s
-
ip: "192.168.0.1"
port: 5223
module: ejabberd_ c2s
certfile: "/path/to/ssl.pem"
tls: true
access: c2s
-
ip: "FDCA:8AB6:A243:75EF::1"
port: 5223
module: ejabberd_ c2s
certfile: "/path/to/ssl.pem"
tls: true
access: c2s
-
port: 5269
module: ejabberd_ s2s_ in
-
port: 5280
module: ejabberd_ http
web_ admin: true
http_ poll: true
-
port: 4560
module: ejabberd_ xmlrpc
-
ip: "127.0.0.1"
port: 5233
module: ejabberd_ service
hosts:
"aim.example.org":
password: "aimsecret"
-
ip: "::1"
port: 5233
module: ejabberd_ service
hosts:
"aim.example.org":
password: "aimsecret"
-
port: 5234
module: ejabberd_ service
hosts:
"icq.example.org":
password: "jitsecret"
"sms.example.org":
password: "jitsecret"
-
port: 5235
module: ejabberd_ service
hosts:
"msn.example.org":
password: "msnsecret"
-
port: 5236
module: ejabberd_ service
hosts:
"yahoo.example.org":
password: "yahoosecret"
-
port: 5237
module: ejabberd_ service
hosts:
"gg.example.org":
password: "ggsecret"
-
port: 5238
module: ejabberd_ service
hosts:
"jmc.example.org":
password: "jmcsecret"
-
port: 5239
module: ejabberd_ service
service_ check_ from: false
hosts:
"custom.example.org":
password: "customsecret"
2004-07-06 23:34:50 +02:00
\end { verbatim}
2009-01-12 19:41:46 +01:00
Note, that for services based in \ind { jabberd14} jabberd14 or \ind { WPJabber} WPJabber
you have to make the transports log and do \ind { XDB} XDB by themselves:
2004-05-22 21:48:35 +02:00
\begin { verbatim}
<!--
2004-07-06 23:34:50 +02:00
You have to add elogger and rlogger entries here when using ejabberd.
2004-05-22 21:48:35 +02:00
In this case the transport will do the logging.
-->
2004-07-06 23:34:50 +02:00
<log id='logger'>
2004-05-22 21:48:35 +02:00
<host/>
<logtype/>
<format>%d: [%t] (%h): %s</format>
2004-07-06 23:34:50 +02:00
<file>/var/log/jabber/service.log</file>
2004-05-22 21:48:35 +02:00
</log>
<!--
2009-09-23 17:28:53 +02:00
Some XMPP server implementations do not provide
2005-11-28 11:55:45 +01:00
XDB services (for example, jabberd2 and ejabberd).
xdb_ file.so is loaded in to handle all XDB requests.
2004-05-22 21:48:35 +02:00
-->
<xdb id="xdb">
<host/>
<load>
2009-01-12 19:41:46 +01:00
<!-- this is a lib of wpjabber or jabberd14 -->
2004-07-06 23:34:50 +02:00
<xdb_ file>/usr/lib/jabber/xdb_ file.so</xdb_ file>
2004-05-22 21:48:35 +02:00
</load>
<xdb_ file xmlns="jabber:config:xdb_ file">
<spool><jabberd:cmdline flag='s'>/var/spool/jabber</jabberd:cmdline></spool>
</xdb_ file>
</xdb>
2003-02-01 21:21:28 +01:00
\end { verbatim}
2008-06-12 23:54:30 +02:00
\makesubsection { auth} { Authentication}
2006-09-22 11:09:28 +02:00
\ind { authentication} \ind { options!auth\_ method}
2003-01-23 21:57:55 +01:00
2009-08-12 16:15:59 +02:00
The option \option { auth\_ method} defines the authentication methods that are used
for user authentication. The syntax is:
2013-08-12 14:25:05 +02:00
\esyntax { [Method, ...]}
2003-01-23 21:57:55 +01:00
2006-09-22 11:09:28 +02:00
The following authentication methods are supported by \ejabberd { } :
2006-04-23 18:55:25 +02:00
\begin { itemize}
2007-01-11 09:17:18 +01:00
\item internal (default) --- See section~\ref { internalauth} .
2010-05-10 16:42:54 +02:00
\item external --- See section~\ref { extauth} .
2007-01-11 09:17:18 +01:00
\item ldap --- See section~\ref { ldap} .
2013-08-12 14:25:05 +02:00
\item odbc --- See section~\ref { odbc} .
2007-01-11 09:17:18 +01:00
\item anonymous --- See section~\ref { saslanonymous} .
2007-10-01 12:33:03 +02:00
\item pam --- See section~\ref { pam} .
2006-04-23 18:55:25 +02:00
\end { itemize}
2003-01-23 21:57:55 +01:00
2010-05-10 16:42:54 +02:00
Account creation is only supported by internal, external and odbc methods.
2009-01-20 23:38:29 +01:00
2011-08-17 19:42:11 +02:00
The option \option { resource\_ conflict} defines the action when a client attempts to
login to an account with a resource that is already connected.
The option syntax is:
2013-08-12 14:25:05 +02:00
\esyntax { resource\_ conflict: setresource|closenew|closeold}
2011-08-17 19:42:11 +02:00
The possible values match exactly the three possibilities described in
\footahref { http://tools.ietf.org/html/rfc6120\# section-7.7.2.2} { XMPP Core: section 7.7.2.2} .
The default value is \term { closeold} .
If the client uses old Jabber Non-SASL authentication (\xepref { 0078} ),
then this option is not respected, and the action performed is \term { closeold} .
2012-03-16 14:16:17 +01:00
The option \option { fqdn} allows you to define the Fully Qualified Domain Name
of the machine, in case it isn't detected automatically.
The FQDN is used to authenticate some clients that use the DIGEST-MD5 SASL mechanism.
The option syntax is:
2013-08-12 14:25:05 +02:00
\esyntax { fqdn: undefined|FqdnString|[FqdnString]}
2012-03-16 14:16:17 +01:00
2014-11-10 01:10:04 +01:00
The option \option { disable\_ sasl\_ mechanisms} specifies a list of SASL
mechanisms that should \emph { not} be offered to the client. The mechanisms can
be listed as lowercase or uppercase strings. The option syntax is:
\esyntax { disable\_ sasl\_ mechanisms: [Mechanism, ...]}
2008-06-12 23:54:30 +02:00
\makesubsubsection { internalauth} { Internal}
2006-09-22 11:09:28 +02:00
\ind { internal authentication} \ind { Mnesia}
2005-07-31 21:51:52 +02:00
2006-09-22 11:09:28 +02:00
\ejabberd { } uses its internal Mnesia database as the default authentication method.
2009-08-12 16:15:59 +02:00
The value \term { internal} will enable the internal authentication method.
2005-07-31 21:51:52 +02:00
2013-08-12 14:25:05 +02:00
The option \term { auth\_ password\_ format: plain|scram}
2011-08-16 00:26:49 +02:00
defines in what format the users passwords are stored:
\begin { description}
\titem { plain}
The password is stored as plain text in the database.
This is risky because the passwords can be read if your database gets compromised.
This is the default value.
This format allows clients to authenticate using:
the old Jabber Non-SASL (\xepref { 0078} ), \term { SASL PLAIN} ,
\term { SASL DIGEST-MD5} , and \term { SASL SCRAM-SHA-1} .
\titem { scram}
The password is not stored, only some information that allows to verify the hash provided by the client.
It is impossible to obtain the original plain password from the stored information;
for this reason, when this value is configured it cannot be changed to \term { plain} anymore.
This format allows clients to authenticate using: \term { SASL PLAIN} and \term { SASL SCRAM-SHA-1} .
\end { description}
2006-09-22 11:09:28 +02:00
Examples:
\begin { itemize}
\item To use internal authentication on \jid { example.org} and LDAP
authentication on \jid { example.net} :
2008-06-13 01:01:09 +02:00
\begin { verbatim}
2013-08-12 14:25:05 +02:00
host_ config:
"example.org":
auth_ method: [internal]
"example.net":
auth_ method: [ldap]
2005-07-31 21:51:52 +02:00
\end { verbatim}
2011-08-16 00:26:49 +02:00
\item To use internal authentication with hashed passwords on all virtual hosts:
2008-06-13 01:01:09 +02:00
\begin { verbatim}
2013-08-12 14:25:05 +02:00
auth_ method: internal
auth_ password_ format: scram
2005-11-28 11:55:45 +01:00
\end { verbatim}
\end { itemize}
2005-07-31 21:51:52 +02:00
2010-05-10 16:42:54 +02:00
\makesubsubsection { extauth} { External Script}
\ind { external authentication}
In this authentication method, when \ejabberd { } starts,
it start a script, and calls it to perform authentication tasks.
The server administrator can write the external authentication script
in any language.
The details on the interface between ejabberd and the script are described
in the \term { ejabberd Developers Guide} .
There are also \footahref { http://www.ejabberd.im/extauth} { several example authentication scripts} .
These are the specific options:
\begin { description}
2013-08-12 14:25:05 +02:00
\titem { extauth\_ program: PathToScript}
2010-05-10 16:42:54 +02:00
Indicate in this option the full path to the external authentication script.
The script must be executable by ejabberd.
2013-08-12 14:25:05 +02:00
\titem { extauth\_ instances: Integer}
2010-07-30 20:33:03 +02:00
Indicate how many instances of the script to run simultaneously to serve authentication in the virtual host.
The default value is the minimum number: 1.
2013-08-12 14:25:05 +02:00
\titem { extauth\_ cache: false|CacheTimeInteger}
2010-05-10 16:42:54 +02:00
The value \term { false} disables the caching feature, this is the default.
The integer \term { 0} (zero) enables caching for statistics, but doesn't use that cached information to authenticate users.
If another integer value is set, caching is enabled both for statistics and for authentication:
the CacheTimeInteger indicates the number of seconds that ejabberd can reuse
the authentication information since the user last disconnected,
to verify again the user authentication without querying again the extauth script.
Note: caching should not be enabled in a host if internal auth is also enabled.
2012-10-03 18:14:23 +02:00
If caching is enabled, \term { mod\_ last} must be enabled also in that vhost.
2010-05-10 16:42:54 +02:00
\end { description}
2010-07-30 20:33:03 +02:00
This example sets external authentication, the extauth script, enables caching for 10 minutes,
and starts three instances of the script for each virtual host defined in ejabberd:
2010-05-10 16:42:54 +02:00
\begin { verbatim}
2013-08-12 14:25:05 +02:00
auth_ method: [external]
extauth_ program: "/etc/ejabberd/JabberAuth.class.php"
extauth_ cache: 600
extauth_ instances: 3
2010-05-10 16:42:54 +02:00
\end { verbatim}
2013-03-27 13:05:51 +01:00
\makesubsubsection { saslanonymous} { Anonymous Login and SASL Anonymous}
2006-04-21 00:12:09 +02:00
\ind { sasl anonymous} \ind { anonymous login}
2013-03-27 13:05:51 +01:00
The \term { anonymous} authentication method enables two modes for anonymous authentication:
\begin { description}
\titem { Anonymous login:} This is a standard login, that use the
classical login and password mechanisms, but where password is
accepted or preconfigured for all anonymous users. This login is
compliant with SASL authentication, password and digest non-SASL
authentication, so this option will work with almost all XMPP
clients
\titem { SASL Anonymous:} This is a special SASL authentication
mechanism that allows to login without providing username or
password (see \xepref { 0175} ). The main advantage of SASL Anonymous
is that the protocol was designed to give the user a login. This is
useful to avoid in some case, where the server has many users
already logged or registered and when it is hard to find a free
username. The main disavantage is that you need a client that
specifically supports the SASL Anonymous protocol.
\end { description}
2009-08-12 16:15:59 +02:00
2006-09-22 11:09:28 +02:00
%TODO: introduction; tell what people can do with this
The anonymous authentication method can be configured with the following
options. Remember that you can use the \term { host\_ config} option to set virtual
2013-03-27 13:05:51 +01:00
host specific options (see section~\ref { virtualhost} ).
2006-04-21 00:12:09 +02:00
2009-08-12 16:15:59 +02:00
\begin { description}
2013-08-12 14:25:05 +02:00
\titem { allow\_ multiple\_ connections: false|true} This option is only used
2009-08-12 16:15:59 +02:00
when the anonymous mode is
2006-09-22 11:09:28 +02:00
enabled. Setting it to \term { true} means that the same username can be taken
multiple times in anonymous login mode if different resource are used to
connect. This option is only useful in very special occasions. The default
value is \term { false} .
2013-08-12 14:25:05 +02:00
\titem { anonymous\_ protocol: login\_ anon | sasl\_ anon | both}
2013-03-27 13:05:51 +01:00
\term { login\_ anon} means that the anonymous login method will be used.
\term { sasl\_ anon} means that the SASL Anonymous method will be used.
\term { both} means that SASL Anonymous and login anonymous are both enabled.
2009-08-12 16:15:59 +02:00
\end { description}
2006-04-21 00:12:09 +02:00
Those options are defined for each virtual host with the \term { host\_ config}
2007-01-11 09:17:18 +01:00
parameter (see section~\ref { virtualhost} ).
2006-04-21 00:12:09 +02:00
Examples:
\begin { itemize}
2006-09-22 11:09:28 +02:00
\item To enable anonymous login on all virtual hosts:
2008-06-13 01:01:09 +02:00
\begin { verbatim}
2013-08-12 14:25:05 +02:00
auth_ method: [anonymous]
anonymous_ protocol: login_ anon
2008-06-13 01:01:09 +02:00
\end { verbatim}
2006-09-22 11:09:28 +02:00
\item Similar as previous example, but limited to \jid { public.example.org} :
2008-06-13 01:01:09 +02:00
\begin { verbatim}
2013-08-12 14:25:05 +02:00
host_ config:
"public.example.org":
auth_ method: [anonymous]
anonymous_ protoco: login_ anon
2006-04-21 00:12:09 +02:00
\end { verbatim}
\item To enable anonymous login and internal authentication on a virtual host:
2008-06-13 01:01:09 +02:00
\begin { verbatim}
2013-08-12 14:25:05 +02:00
host_ config:
"public.example.org":
auth_ method:
- internal
- anonymous
anonymous_ protocol: login_ anon
2006-04-21 00:12:09 +02:00
\end { verbatim}
2006-09-22 11:09:28 +02:00
\item To enable SASL Anonymous on a virtual host:
2008-06-13 01:01:09 +02:00
\begin { verbatim}
2013-08-12 14:25:05 +02:00
host_ config:
"public.example.org":
auth_ method: [anonymous]
anonymous_ protocol: sasl_ anon
2006-04-21 00:12:09 +02:00
\end { verbatim}
2006-09-22 11:09:28 +02:00
\item To enable SASL Anonymous and anonymous login on a virtual host:
2008-06-13 01:01:09 +02:00
\begin { verbatim}
2013-08-12 14:25:05 +02:00
host_ config:
"public.example.org":
auth_ method: [anonymous]
anonymous_ protocol: both
2006-04-21 00:12:09 +02:00
\end { verbatim}
2006-09-22 11:09:28 +02:00
\item To enable SASL Anonymous, anonymous login, and internal authentication on
2006-04-21 00:12:09 +02:00
a virtual host:
2008-06-13 01:01:09 +02:00
\begin { verbatim}
2013-08-12 14:25:05 +02:00
host_ config:
"public.example.org":
auth_ method:
- internal
- anonymous
anonymous_ protocol: both
2006-04-21 00:12:09 +02:00
\end { verbatim}
\end { itemize}
2013-03-27 13:05:51 +01:00
There are more configuration examples and XMPP client example stanzas in
\footahref { http://www.ejabberd.im/Anonymous-users-support} { Anonymous users support} .
2008-06-12 23:54:30 +02:00
\makesubsubsection { pam} { PAM Authentication}
2007-10-01 12:33:03 +02:00
\ind { PAM authentication} \ind { Pluggable Authentication Modules}
\ejabberd { } supports authentication via Pluggable Authentication Modules (PAM).
PAM is currently supported in AIX, FreeBSD, HP-UX, Linux, Mac OS X, NetBSD and Solaris.
PAM authentication is disabled by default, so you have to configure and compile
\ejabberd { } with PAM support enabled:
\begin { verbatim}
./configure --enable-pam & & make install
\end { verbatim}
Options:
\begin { description}
2013-08-12 14:25:05 +02:00
\titem { pam\_ service: Name} \ind { options!pam\_ service} This option defines the PAM service name.
2007-10-01 12:33:03 +02:00
Default is \term { "ejabberd"} . Refer to the PAM documentation of your operation system
for more information.
2013-08-12 14:25:05 +02:00
\titem { pam\_ userinfotype: username|jid} \ind { options!pam\_ userinfotype}
2010-05-07 22:34:59 +02:00
This option defines what type of information about the user ejabberd
provides to the PAM service: only the username, or the user JID.
Default is \term { username} .
2007-10-01 12:33:03 +02:00
\end { description}
Example:
\begin { verbatim}
2013-08-12 14:25:05 +02:00
auth_ method: [pam]
pam_ service: "ejabberd"
2007-10-01 12:33:03 +02:00
\end { verbatim}
Though it is quite easy to set up PAM support in \ejabberd { } , PAM itself introduces some
security issues:
\begin { itemize}
\item To perform PAM authentication \ejabberd { } uses external C-program called
2008-07-12 23:32:45 +02:00
\term { epam} . By default, it is located in \verb |/var/lib/ejabberd/priv/bin/|
2007-10-01 12:33:03 +02:00
directory. You have to set it root on execution in the case when your PAM module
requires root privileges (\term { pam\_ unix.so} for example). Also you have to grant access
2008-06-13 01:01:09 +02:00
for \ejabberd { } to this file and remove all other permissions from it.
Execute with root privileges:
2007-10-01 12:33:03 +02:00
\begin { verbatim}
2008-06-13 01:01:09 +02:00
chown root:ejabberd /var/lib/ejabberd/priv/bin/epam
chmod 4750 /var/lib/ejabberd/priv/bin/epam
2007-10-01 12:33:03 +02:00
\end { verbatim}
\item Make sure you have the latest version of PAM installed on your system.
Some old versions of PAM modules cause memory leaks. If you are not able to use the latest
version, you can \term { kill(1)} \term { epam} process periodically to reduce its memory
consumption: \ejabberd { } will restart this process immediately.
\item \term { epam} program tries to turn off delays on authentication failures.
However, some PAM modules ignore this behavior and rely on their own configuration options.
2008-07-24 20:21:40 +02:00
You can create a configuration file \term { ejabberd.pam} .
This example shows how to turn off delays in \term { pam\_ unix.so} module:
\begin { verbatim}
#%PAM-1.0
auth sufficient pam_ unix.so likeauth nullok nodelay
account sufficient pam_ unix.so
\end { verbatim}
That is not a ready to use configuration file: you must use it
2007-10-01 12:33:03 +02:00
as a hint when building your own PAM configuration instead. Note that if you want to disable
delays on authentication failures in the PAM configuration file, you have to restrict access
to this file, so a malicious user can't use your configuration to perform brute-force
attacks.
\item You may want to allow login access only for certain users. \term { pam\_ listfile.so}
module provides such functionality.
2009-06-25 19:07:15 +02:00
\item If you use \term { pam\_ winbind} to authorise against a Windows Active Directory,
2012-07-06 12:07:41 +02:00
then \term { /etc/nsswitch.conf} must be configured to use \term { winbind} as well.
2007-10-01 12:33:03 +02:00
\end { itemize}
2008-06-12 23:54:30 +02:00
\makesubsection { accessrules} { Access Rules}
2007-01-24 16:56:26 +01:00
\ind { access rules} \ind { ACL} \ind { Access Control List}
2008-06-12 23:54:30 +02:00
\makesubsubsection { ACLDefinition} { ACL Definition}
2007-01-24 16:56:26 +01:00
\ind { ACL} \ind { options!acl} \ind { ACL} \ind { Access Control List}
2006-09-03 17:15:46 +02:00
2006-09-22 11:09:28 +02:00
Access control in \ejabberd { } is performed via Access Control Lists (ACLs). The
declarations of ACLs in the configuration file have the following syntax:
2013-08-12 14:25:05 +02:00
\esyntax { acl: \{ ACLName: \{ ACLType: ACLValue \} \} }
2009-08-12 16:15:59 +02:00
2013-08-12 14:25:05 +02:00
\term { ACLType: ACLValue} can be one of the following:
2006-09-22 11:09:28 +02:00
\begin { description}
\titem { all} Matches all JIDs. Example:
2006-09-03 17:15:46 +02:00
\begin { verbatim}
2013-08-12 14:25:05 +02:00
acl:
world: all
2006-09-03 17:15:46 +02:00
\end { verbatim}
2013-08-12 14:25:05 +02:00
\titem { user: Username} Matches the user with the name
2009-08-12 16:15:59 +02:00
\term { Username} at the first virtual host. Example:
2006-04-23 22:04:40 +02:00
\begin { verbatim}
2013-08-12 14:25:05 +02:00
acl:
admin:
user: "yozhik"
2006-04-23 22:04:40 +02:00
\end { verbatim}
2013-08-12 14:25:05 +02:00
\titem { user: \{ Username: Server\} } Matches the user with the JID
2009-08-12 16:15:59 +02:00
\term { Username@Server} and any resource. Example:
2006-09-22 11:09:28 +02:00
\begin { verbatim}
2013-08-12 14:25:05 +02:00
acl:
admin:
user:
"yozhik": "example.org"
2006-09-22 11:09:28 +02:00
\end { verbatim}
2013-08-12 14:25:05 +02:00
\titem { server: Server} Matches any JID from server
2009-08-12 16:15:59 +02:00
\term { Server} . Example:
2006-09-22 11:09:28 +02:00
\begin { verbatim}
2013-08-12 14:25:05 +02:00
acl:
exampleorg:
server: "example.org"
2006-09-22 11:09:28 +02:00
\end { verbatim}
2013-08-12 14:25:05 +02:00
\titem { resource: Resource} Matches any JID with a resource
2009-08-12 16:15:59 +02:00
\term { Resource} . Example:
2008-04-25 11:25:31 +02:00
\begin { verbatim}
2013-08-12 14:25:05 +02:00
acl:
mucklres:
resource: "muckl"
\end { verbatim}
\titem { shared\_ group: Groupname} Matches any member of a Shared Roster Group with name \term { Groupname} in the virtual host. Example:
\begin { verbatim}
acl:
techgroupmembers:
shared_ group: "techteam"
2008-04-25 11:25:31 +02:00
\end { verbatim}
2013-08-12 14:25:05 +02:00
\titem { shared\_ group: \{ Groupname: Server\} } Matches any member of a Shared Roster Group with name \term { Groupname} in the virtual host \term { Server} . Example:
2008-12-23 20:15:33 +01:00
\begin { verbatim}
2013-08-12 14:25:05 +02:00
acl:
techgroupmembers:
shared_ group:
"techteam": "example.org"
2008-12-23 20:15:33 +01:00
\end { verbatim}
2013-08-12 14:25:05 +02:00
\titem { ip: Network} Matches any IP address from the \term { Network} . Example:
2008-12-23 20:15:33 +01:00
\begin { verbatim}
2013-08-12 14:25:05 +02:00
acl:
loopback:
ip:
- "127.0.0.0/8"
2015-03-03 21:23:11 +01:00
- "::1"
2008-12-23 20:15:33 +01:00
\end { verbatim}
2013-08-12 14:25:05 +02:00
\titem { user\_ regexp: Regexp} Matches any local user with a name that
2009-08-12 16:15:59 +02:00
matches \term { Regexp} on local virtual hosts. Example:
2006-09-22 11:09:28 +02:00
\begin { verbatim}
2013-08-12 14:25:05 +02:00
acl:
tests:
user_ regexp: "^ test[0-9]*$ "
2006-09-22 11:09:28 +02:00
\end { verbatim}
%$
2013-08-12 14:25:05 +02:00
\titem { user\_ regexp: \{ Regexp: Server\} } Matches any user with a name
2009-08-12 16:15:59 +02:00
that matches \term { Regexp} at server \term { Server} . Example:
2006-09-22 11:09:28 +02:00
\begin { verbatim}
2013-08-12 14:25:05 +02:00
acl:
tests:
user_ regexp:
"^ test": "example.org"
2006-09-22 11:09:28 +02:00
\end { verbatim}
2013-08-12 14:25:05 +02:00
\titem { server\_ regexp: Regexp} Matches any JID from the server that
2009-08-12 16:15:59 +02:00
matches \term { Regexp} . Example:
2006-09-22 11:09:28 +02:00
\begin { verbatim}
2013-08-12 14:25:05 +02:00
acl:
icq:
server_ regexp: "^ icq\\ ."
2006-09-22 11:09:28 +02:00
\end { verbatim}
2013-08-12 14:25:05 +02:00
\titem { resource\_ regexp: Regexp} Matches any JID with a resource that
2009-08-12 16:15:59 +02:00
matches \term { Regexp} . Example:
2008-04-25 11:25:31 +02:00
\begin { verbatim}
2013-08-12 14:25:05 +02:00
acl:
icq:
resource_ regexp: "^ laptop\\ ."
2008-04-25 11:25:31 +02:00
\end { verbatim}
2013-08-12 14:25:05 +02:00
\titem { node\_ regexp: \{ UserRegexp: ServerRegexp\} } Matches any user
2009-08-12 16:15:59 +02:00
with a name that matches \term { UserRegexp} at any server that matches
\term { ServerRegexp} . Example:
2006-09-22 11:09:28 +02:00
\begin { verbatim}
2013-08-12 14:25:05 +02:00
acl:
yozhik:
node_ regexp:
"^ yozhik$ ": " ^ example. ( com|org ) $ "
2006-09-22 11:09:28 +02:00
\end { verbatim}
2013-08-12 14:25:05 +02:00
\titem { user\_ glob: Glob\} }
\titem { user\_ glob: \{ Glob: Server\} }
\titem { server\_ glob: Glob}
\titem { resource\_ glob: Glob}
\titem { node\_ glob: \{ UserGlob: ServerGlob\} } This is the same as
2006-09-22 11:09:28 +02:00
above. However, it uses shell glob patterns instead of regexp. These patterns
can have the following special characters:
\begin { description}
\titem { *} matches any string including the null string.
\titem { ?} matches any single character.
\titem { [...]} matches any of the enclosed characters. Character
ranges are specified by a pair of characters separated by a \term { `-'} .
If the first character after \term { `['} is a \term { `!'} , any
character not enclosed is matched.
\end { description}
\end { description}
2006-04-23 22:04:40 +02:00
2009-08-12 16:15:59 +02:00
The following \term { ACLName} are pre-defined:
2006-09-22 11:09:28 +02:00
\begin { description}
\titem { all} Matches any JID.
\titem { none} Matches no JID.
\end { description}
2008-06-12 23:54:30 +02:00
\makesubsubsection { AccessRights} { Access Rights}
2007-01-24 16:56:26 +01:00
\ind { access} \ind { ACL} \ind { options!acl} \ind { ACL} \ind { Access Control List}
2009-08-12 16:15:59 +02:00
An entry allowing or denying access to different services.
The syntax is:
2013-08-12 14:25:05 +02:00
\esyntax { access: \{ AccessName: \{ ACLName: allow|deny \} \} }
2009-08-12 16:15:59 +02:00
When a JID is checked to have access to \term { Accessname} , the server
2007-11-26 20:54:30 +01:00
sequentially checks if that JID matches any of the ACLs that are named in the
2014-04-11 14:00:10 +02:00
first elements of the tuples in the list. If it matches, the second element of
2006-09-22 11:09:28 +02:00
the first matched tuple is returned, otherwise the value `\term { deny} ' is
returned.
2006-04-23 22:04:40 +02:00
2009-12-23 17:08:34 +01:00
If you define specific Access rights in a virtual host,
remember that the globally defined Access rights have precedence over those.
This means that, in case of conflict, the Access granted or denied in the global server is used
and the Access of a virtual host doesn't have effect.
2006-09-22 11:09:28 +02:00
Example:
2006-04-23 22:04:40 +02:00
\begin { verbatim}
2013-08-12 14:25:05 +02:00
access:
configure:
admin: allow
something
badmans: deny
all: allow
2006-04-23 22:04:40 +02:00
\end { verbatim}
2009-08-12 16:15:59 +02:00
The following \term { AccessName} are pre-defined:
2006-09-22 11:09:28 +02:00
\begin { description}
\titem { all} Always returns the value `\term { allow} '.
\titem { none} Always returns the value `\term { deny} '.
\end { description}
2008-06-12 23:54:30 +02:00
\makesubsubsection { configmaxsessions} { Limiting Opened Sessions with ACL}
2007-01-24 16:56:26 +01:00
\ind { options!max\_ user\_ sessions}
2007-11-26 20:54:30 +01:00
The special access \term { max\_ user\_ sessions} specifies the maximum
2007-09-03 10:50:49 +02:00
number of sessions (authenticated connections) per user. If a user
tries to open more sessions by using different resources, the first
opened session will be disconnected. The error \term { session replaced}
will be sent to the disconnected session. The value for this option
can be either a number, or \term { infinity} . The default value is
\term { infinity} .
2007-01-24 16:56:26 +01:00
The syntax is:
2013-08-12 14:25:05 +02:00
\esyntax { \{ max\_ user\_ sessions: \{ ACLName: MaxNumber \} \} }
2007-01-24 16:56:26 +01:00
2009-08-12 16:15:59 +02:00
This example limits the number of sessions per user to 5 for all users, and to 10 for admins:
2007-01-24 16:56:26 +01:00
\begin { verbatim}
2013-08-12 14:25:05 +02:00
access:
max_ user_ sessions:
admin: 10
all: 5
2007-01-24 16:56:26 +01:00
\end { verbatim}
2009-09-23 17:28:53 +02:00
\makesubsubsection { configmaxs2sconns} { Several connections to a remote XMPP server with ACL}
2008-04-28 20:07:23 +02:00
\ind { options!max\_ s2s\_ connections}
The special access \term { max\_ s2s\_ connections} specifies how many
2010-01-26 14:16:51 +01:00
simultaneous S2S connections can be established to a specific remote XMPP server.
2008-04-28 20:07:23 +02:00
The default value is \term { 1} .
There's also available the access \term { max\_ s2s\_ connections\_ per\_ node} .
The syntax is:
2013-08-12 14:25:05 +02:00
\esyntax { \{ max\_ s2s\_ connections: \{ ACLName: MaxNumber \} \} }
2008-04-28 20:07:23 +02:00
Examples:
\begin { itemize}
\item Allow up to 3 connections with each remote server:
\begin { verbatim}
2013-08-12 14:25:05 +02:00
access:
max_ s2s_ connections:
all: 3
2008-04-28 20:07:23 +02:00
\end { verbatim}
\end { itemize}
2008-06-12 23:54:30 +02:00
\makesubsection { shapers} { Shapers}
2013-08-12 14:25:05 +02:00
\ind { options!shaper} \ind { shapers} \ind { traffic speed}
2006-09-22 11:09:28 +02:00
2009-08-12 16:15:59 +02:00
Shapers enable you to limit connection traffic.
The syntax is:
2013-08-12 14:25:05 +02:00
\esyntax { shaper: \{ ShaperName: Rate \} }
2009-08-12 16:15:59 +02:00
where \term { Rate} stands for the maximum allowed incoming rate in bytes per
2006-09-22 11:09:28 +02:00
second.
2008-10-06 16:18:46 +02:00
When a connection exceeds this limit, \ejabberd { } stops reading from the socket
2008-03-20 20:24:27 +01:00
until the average rate is again below the allowed maximum.
2006-09-22 11:09:28 +02:00
Examples:
\begin { itemize}
\item To define a shaper named `\term { normal} ' with traffic speed limited to
1,000\, bytes/second:
\begin { verbatim}
2013-08-12 14:25:05 +02:00
shaper:
normal: 1000
2006-09-22 11:09:28 +02:00
\end { verbatim}
\item To define a shaper named `\term { fast} ' with traffic speed limited to
50,000\, bytes/second:
\begin { verbatim}
2013-08-12 14:25:05 +02:00
shaper:
fast: 50000
2006-04-23 22:04:40 +02:00
\end { verbatim}
2006-09-22 11:09:28 +02:00
\end { itemize}
2008-06-12 23:54:30 +02:00
\makesubsection { language} { Default Language}
2006-09-22 11:09:28 +02:00
\ind { options!language} \ind { language}
The option \option { language} defines the default language of server strings that
2009-09-23 17:28:53 +02:00
can be seen by \XMPP { } clients. If a \XMPP { } client does not support
2009-08-12 16:15:59 +02:00
\option { xml:lang} , the specified language is used.
The option syntax is:
2013-08-12 14:25:05 +02:00
\esyntax { language: Language}
2009-08-12 16:15:59 +02:00
The default value is \term { en} .
In order to take effect there must be a translation file
\term { Language.msg} in \ejabberd { } 's \term { msgs} directory.
2006-09-22 11:09:28 +02:00
2009-01-31 13:26:27 +01:00
For example, to set Russian as default language:
2006-04-23 22:04:40 +02:00
\begin { verbatim}
2013-08-12 14:25:05 +02:00
language: "ru"
2006-09-22 11:09:28 +02:00
\end { verbatim}
2006-04-23 22:04:40 +02:00
2008-08-18 11:17:58 +02:00
Appendix \ref { i18ni10n} provides more details about internationalization and localization.
2008-08-17 18:35:58 +02:00
2009-04-22 12:20:13 +02:00
\makesubsection { captcha} { CAPTCHA}
\ind { options!captcha} \ind { captcha}
Some \ejabberd { } modules can be configured to require a CAPTCHA challenge on certain actions.
If the client does not support CAPTCHA Forms (\xepref { 0158} ),
a web link is provided so the user can fill the challenge in a web browser.
2009-11-23 13:43:15 +01:00
An example script is provided that generates the image
2009-04-22 12:20:13 +02:00
using ImageMagick's Convert program.
The configurable options are:
\begin { description}
2013-08-12 14:25:05 +02:00
\titem { captcha\_ cmd: Path}
2009-04-22 12:20:13 +02:00
Full path to a script that generates the image.
2012-02-01 00:09:51 +01:00
The default value disables the feature: \term { undefined}
2013-08-12 14:25:05 +02:00
\titem { captcha\_ host: ProtocolHostPort}
2011-04-11 19:58:25 +02:00
ProtocolHostPort is a string with the host, and optionally the Protocol and Port number.
It must identify where ejabberd listens for CAPTCHA requests.
The URL sent to the user is formed by: \term { Protocol://Host:Port/captcha/}
The default value is: protocol \term { http} , the first hostname configured, and port \term { 80} .
If you specify a port number that does not match exactly an ejabberd listener
2011-03-03 11:35:47 +01:00
(because you are using a reverse proxy or other port-forwarding tool),
2011-04-11 19:58:25 +02:00
then you must specify the transfer protocol, as seen in the example below.
2009-04-22 12:20:13 +02:00
\end { description}
Additionally, an \term { ejabberd\_ http} listener must be enabled with the \term { captcha} option.
See section \ref { listened-module} .
Example configuration:
\begin { verbatim}
2013-08-12 14:25:05 +02:00
hosts: ["example.org"]
2009-04-22 12:20:13 +02:00
2013-08-12 14:25:05 +02:00
captcha_ cmd: "/lib/ejabberd/priv/bin/captcha.sh"
captcha_ host: "example.org:5280"
## captcha_ host: "https://example.org:443"
## captcha_ host: "http://example.com"
2009-04-22 12:20:13 +02:00
2013-08-12 14:25:05 +02:00
listen:
...
-
port: 5280
module: ejabberd_ http
captcha: true
2009-04-22 12:20:13 +02:00
...
\end { verbatim}
2014-05-08 14:08:07 +02:00
\makesubsection { stun} { STUN and TURN}
2009-08-11 12:13:03 +02:00
\ind { options!stun} \ind { stun}
2014-05-08 14:08:07 +02:00
\ejabberd { } is able to act as a stand-alone STUN/TURN server
(\footahref { http://tools.ietf.org/html/rfc5389} { RFC 5389} /\footahref { http://tools.ietf.org/html/rfc5766} { RFC 5766} ). In that role \ejabberd { } helps clients with ICE (\footahref { http://tools.ietf.org/html/rfc5245} { RFC 5245} ) or Jingle ICE (\xepref { 0176} ) support to discover their external addresses and ports and to relay media traffic when it is impossible to establish direct
peer-to-peer connection.
2009-08-11 12:13:03 +02:00
You should configure \term { ejabberd\_ stun} listening module as described in \ref { listened} section.
2014-05-08 14:08:07 +02:00
The specific configurable options are:
\begin { description}
\titem { tls: true|false}
If enabled, \option { certfile} option must be set, otherwise \ejabberd { }
will not be able to accept TLS connections. Obviously, this option
makes sense for \term { tcp} transport only. The default is \term { false} .
\titem { certfile: Path}
Path to the certificate file. Only makes sense when \option { tls} is set.
\titem { use\_ turn: true|false}
Enables/disables TURN (media relay) functionality. The default is \term { false} .
\titem { turn\_ ip: String}
The IPv4 address advertised by your TURN server. The address should not be NAT'ed
or firewalled. There is not default, so you should set this option explicitly.
Implies \term { use\_ turn} .
\titem { turn\_ min\_ port: Integer}
Together with \option { turn\_ max\_ port} forms port range to allocate from.
The default is 49152. Implies \term { use\_ turn} .
\titem { turn\_ max\_ port: Integer}
Together with \option { turn\_ min\_ port} forms port range to allocate from.
The default is 65535. Implies \term { use\_ turn} .
2014-08-20 20:43:38 +02:00
\titem { turn\_ max\_ allocations: Integer|infinity}
2014-05-08 14:08:07 +02:00
Maximum number of TURN allocations available from the particular IP address.
The default value is 10. Implies \term { use\_ turn} .
2014-08-20 20:43:38 +02:00
\titem { turn\_ max\_ permissions: Integer|infinity}
2014-05-08 14:08:07 +02:00
Maximum number of TURN permissions available from the particular IP address.
The default value is 10. Implies \term { use\_ turn} .
\titem { auth\_ type: user|anonymous}
Which authentication type to use for TURN allocation requests. When type \term { user}
is set, ejabberd authentication backend is used. For \term { anonymous} type
no authentication is performed (not recommended for public services).
The default is \term { user} . Implies \term { use\_ turn} .
\titem { auth\_ realm: String}
When \option { auth\_ type} is set to \term { user} and you have several virtual
hosts configured you should set this option explicitly to the virtual host
you want to serve on this particular listening port. Implies \term { use\_ turn} .
\titem { shaper: Atom}
For \term { tcp} transports defines shaper to use. The default is \term { none} .
\titem { server\_ name: String}
Defines software version to return with every response. The default is the
STUN library version.
\end { description}
2009-08-11 12:13:03 +02:00
2014-05-08 14:08:07 +02:00
Example configuration with disabled TURN functionality (STUN only):
2009-08-11 12:13:03 +02:00
\begin { verbatim}
2013-08-12 14:25:05 +02:00
listen:
2009-08-11 12:13:03 +02:00
...
2013-08-12 14:25:05 +02:00
-
port: 3478
transport: udp
module: ejabberd_ stun
-
port: 3478
module: ejabberd_ stun
-
port: 5349
module: ejabberd_ stun
certfile: "/etc/ejabberd/server.pem"
2009-08-11 12:13:03 +02:00
...
\end { verbatim}
2014-05-08 14:08:07 +02:00
Example configuration with TURN functionality. Note that STUN is always
enabled if TURN is enabled. Here, only UDP section is shown:
\begin { verbatim}
listen:
...
-
port: 3478
transport: udp
use_ turn: true
2015-01-04 00:55:00 +01:00
turn_ ip: "10.20.30.1"
2014-05-08 14:08:07 +02:00
module: ejabberd_ stun
...
\end { verbatim}
2009-08-11 12:13:03 +02:00
You also need to configure DNS SRV records properly so clients can easily discover a
2014-05-08 14:08:07 +02:00
STUN/TURN server serving your XMPP domain. Refer to section
2009-08-11 12:13:03 +02:00
\footahref { http://tools.ietf.org/html/rfc5389\# section-9} { DNS Discovery of a Server}
2014-05-08 14:08:07 +02:00
of \footahref { http://tools.ietf.org/html/rfc5389} { RFC 5389} and section
\footahref { http://tools.ietf.org/html/rfc5766\# section-6} { Creating an Allocation}
of \footahref { http://tools.ietf.org/html/rfc5766} { RFC 5766} for details.
2009-08-11 12:13:03 +02:00
2014-05-08 14:08:07 +02:00
Example DNS SRV configuration for STUN only:
2009-08-11 12:13:03 +02:00
\begin { verbatim}
_ stun._ udp IN SRV 0 0 3478 stun.example.com.
_ stun._ tcp IN SRV 0 0 3478 stun.example.com.
_ stuns._ tcp IN SRV 0 0 5349 stun.example.com.
\end { verbatim}
2009-04-22 12:20:13 +02:00
2014-05-08 14:08:07 +02:00
And you should also add these in the case if TURN is enabled:
\begin { verbatim}
_ turn._ udp IN SRV 0 0 3478 turn.example.com.
_ turn._ tcp IN SRV 0 0 3478 turn.example.com.
_ turns._ tcp IN SRV 0 0 5349 turn.example.com.
\end { verbatim}
2014-04-30 17:20:38 +02:00
\makesubsection { sip} { SIP}
\ind { options!sip} \ind { sip}
\ejabberd { } has built-in SIP support. In order to activate it you need to add
listeners for it, configure DNS properly and enable \modsip { } for
the desired virtual host.
To add a listener you should configure \term { ejabberd\_ sip} listening module as
described in \ref { listened} section. If option \option { tls} is specified, option
\option { certfile} must be specified as well, otherwise incoming TLS connections would fail.
Example configuration with standard ports
(as per \footahref { http://tools.ietf.org/html/rfc3261} { RFC 3261} ):
\begin { verbatim}
listen:
...
-
port: 5060
transport: udp
module: ejabberd_ sip
-
port: 5060
module: ejabberd_ sip
-
port: 5061
module: ejabberd_ sip
tls: true
certfile: "/etc/ejabberd/server.pem"
...
\end { verbatim}
Note that there is no StartTLS support in SIP and \footahref { http://en.wikipedia.org/wiki/Server\_ Name\_ Indication} { SNI} support is somewhat tricky, so for TLS you have to configure
different virtual hosts on different ports if you have different certificate files for them.
Next you need to configure DNS SIP records for your virtual domains.
Refer to \footahref { http://tools.ietf.org/html/rfc3263} { RFC 3263} for the detailed explanation.
Simply put, you should add NAPTR and SRV records for your domains.
Skip NAPTR configuration if your DNS provider doesn't support this type of records.
It's not fatal, however, highly recommended.
Example configuration of NAPTR records:
\begin { verbatim}
example.com IN NAPTR 10 0 "s" "SIPS+D2T" "" _ sips._ tcp.example.com.
example.com IN NAPTR 20 0 "s" "SIP+D2T" "" _ sip._ tcp.example.com.
example.com IN NAPTR 30 0 "s" "SIP+D2U" "" _ sip._ udp.example.com.
\end { verbatim}
Example configuration of SRV records with standard ports
(as per \footahref { http://tools.ietf.org/html/rfc3261} { RFC 3261} ):
\begin { verbatim}
_ sip._ udp IN SRV 0 0 5060 sip.example.com.
_ sip._ tcp IN SRV 0 0 5060 sip.example.com.
_ sips._ tcp IN SRV 0 0 5061 sip.example.com.
\end { verbatim}
2008-06-12 23:54:30 +02:00
\makesubsection { includeconfigfile} { Include Additional Configuration Files}
2008-04-02 18:31:15 +02:00
\ind { options!includeconfigfile} \ind { includeconfigfile}
The option \option { include\_ config\_ file} in a configuration file instructs \ejabberd { } to include other configuration files immediately.
2009-08-12 16:15:59 +02:00
The basic syntax is:
2013-08-12 14:25:05 +02:00
\esyntax { include\_ config\_ file: [Filename]}
2009-08-12 16:15:59 +02:00
It is possible to specify suboptions using the full syntax:
2013-08-12 14:25:05 +02:00
\esyntax { include\_ config\_ file: \{ Filename: [Suboption, ...] \} }
2008-04-02 18:31:15 +02:00
The filename can be indicated either as an absolute path,
or relative to the main \ejabberd { } configuration file.
It isn't possible to use wildcards.
The file must exist and be readable.
The allowed suboptions are:
\begin { description}
2013-08-12 14:25:05 +02:00
\titem { disallow: [Optionname, ...]} Disallows the usage of those options in the included configuration file.
2008-04-02 18:31:15 +02:00
The options that match this criteria are not accepted.
The default value is an empty list: \term { []}
2013-08-12 14:25:05 +02:00
\titem { allow\_ only: [Optionname, ...]} Allows only the usage of those options in the included configuration file.
2008-04-02 18:31:15 +02:00
The options that do not match this criteria are not accepted.
The default value is: \term { all}
\end { description}
This is a basic example:
\begin { verbatim}
2013-08-12 14:25:05 +02:00
include_ config_ file: "/etc/ejabberd/additional.yml"
2008-04-02 18:31:15 +02:00
\end { verbatim}
In this example, the included file is not allowed to contain a \term { listen} option.
If such an option is present, the option will not be accepted.
The file is in a subdirectory from where the main configuration file is.
\begin { verbatim}
2013-08-12 14:25:05 +02:00
include_ config_ file:
"./example.org/additional_ not_ listen.yml":
disallow: [listen]
2008-04-02 18:31:15 +02:00
\end { verbatim}
2013-08-12 14:25:05 +02:00
In this example, \term { ejabberd.yml} defines some ACL and Access rules,
2008-04-02 18:31:15 +02:00
and later includes another file with additional rules:
\begin { verbatim}
2013-08-12 14:25:05 +02:00
acl:
admin:
user:
- "admin": "localhost"
access:
announce:
admin: allow
include_ config_ file:
"/etc/ejabberd/acl_ and_ access.yml":
allow_ only:
- acl
- access
2008-04-02 18:31:15 +02:00
\end { verbatim}
2013-08-12 14:25:05 +02:00
and content of the file \term { acl\_ and\_ access.yml} can be, for example:
2008-04-02 18:31:15 +02:00
\begin { verbatim}
2013-08-12 14:25:05 +02:00
acl:
admin:
user:
- "bob": "localhost"
- "jan": "localhost"
2008-04-02 18:31:15 +02:00
\end { verbatim}
2008-06-12 23:54:30 +02:00
\makesubsection { optionmacros} { Option Macros in Configuration File}
2008-04-02 18:31:15 +02:00
\ind { options!optionmacros} \ind { optionmacros}
In the \ejabberd { } configuration file,
it is possible to define a macro for a value
and later use this macro when defining an option.
A macro is defined with this syntax:
2013-08-12 14:25:05 +02:00
\esyntax { define\_ macro: \{ 'MACRO': Value \} }
2008-04-29 18:44:12 +02:00
The \term { MACRO} must be surrounded by single quotation marks,
and all letters in uppercase; check the examples bellow.
2008-04-02 18:31:15 +02:00
The \term { value} can be any valid arbitrary Erlang term.
The first definition of a macro is preserved,
and additional definitions of the same macro are forgotten.
Macros are processed after
additional configuration files have been included,
so it is possible to use macros that
are defined in configuration files included before the usage.
It isn't possible to use a macro in the definition
of another macro.
This example shows the basic usage of a macro:
\begin { verbatim}
2013-08-12 14:25:05 +02:00
define_ macro:
'LOG_ LEVEL_ NUMBER': 5
loglevel: 'LOG_ LEVEL_ NUMBER'
2008-04-02 18:31:15 +02:00
\end { verbatim}
2013-08-12 14:25:05 +02:00
The resulting option interpreted by \ejabberd { } is: \term { loglevel: 5} .
2008-04-02 18:31:15 +02:00
This example shows that values can be any arbitrary Erlang term:
\begin { verbatim}
2013-08-12 14:25:05 +02:00
define_ macro:
'USERBOB':
user:
- "bob": "localhost"
acl:
admin: 'USERBOB'
\end { verbatim}
The resulting option interpreted by \ejabberd { } is:
\begin { verbatim}
acl:
admin:
user:
- "bob": "localhost"
2008-04-02 18:31:15 +02:00
\end { verbatim}
This complex example:
\begin { verbatim}
2013-08-12 14:25:05 +02:00
define_ macro:
'NUMBER_ PORT_ C2S': 5222
'NUMBER_ PORT_ HTTP': 5280
listen:
-
port: 'NUMBER_ PORT_ C2S'
module: ejabberd_ c2s
-
port: 'NUMBER_ PORT_ HTTP'
module: ejabberd_ http
2008-04-02 18:31:15 +02:00
\end { verbatim}
produces this result after being interpreted:
\begin { verbatim}
2013-08-12 14:25:05 +02:00
listen:
-
port: 5222
module: ejabberd_ c2s
-
port: 5280
module: ejabberd_ http
2008-04-02 18:31:15 +02:00
\end { verbatim}
2008-06-12 23:54:30 +02:00
\makesection { database} { Database and LDAP Configuration}
2006-09-22 11:09:28 +02:00
\ind { database}
%TODO: this whole section is not yet 100% optimized
2006-04-23 22:04:40 +02:00
2006-09-22 11:09:28 +02:00
\ejabberd { } uses its internal Mnesia database by default. However, it is
2014-07-10 10:11:03 +02:00
possible to use a relational database, key-value storage or an LDAP server to store persistent,
2006-09-22 11:09:28 +02:00
long-living data. \ejabberd { } is very flexible: you can configure different
authentication methods for different virtual hosts, you can configure different
authentication mechanisms for the same virtual host (fallback), you can set
different storage systems for modules, and so forth.
2006-04-23 22:04:40 +02:00
2006-09-22 11:09:28 +02:00
The following databases are supported by \ejabberd { } :
\begin { itemize}
2013-08-12 14:25:05 +02:00
%%\item \footahref{http://www.microsoft.com/sql/}{Microsoft SQL Server}
2008-06-13 17:25:57 +02:00
\item \footahref { http://www.erlang.org/doc/apps/mnesia/index.html} { Mnesia}
\item \footahref { http://www.mysql.com/} { MySQL}
2006-09-22 11:09:28 +02:00
\item \footahref { http://en.wikipedia.org/wiki/Open\_ Database\_ Connectivity} { Any ODBC compatible database}
\item \footahref { http://www.postgresql.org/} { PostgreSQL}
2014-07-10 10:11:03 +02:00
\item \footahref { http://basho.com/riak/} { Riak}
2006-09-22 11:09:28 +02:00
\end { itemize}
2006-04-23 22:04:40 +02:00
2006-09-22 11:09:28 +02:00
The following LDAP servers are tested with \ejabberd { } :
2006-04-23 22:04:40 +02:00
\begin { itemize}
2006-09-22 11:09:28 +02:00
\item \footahref { http://www.microsoft.com/activedirectory/} { Active Directory}
2007-01-11 09:17:18 +01:00
(see section~\ref { ad} )
2006-09-22 11:09:28 +02:00
\item \footahref { http://www.openldap.org/} { OpenLDAP}
2011-05-07 02:32:52 +02:00
\item \footahref { http://www.communigate.com/} { CommuniGate Pro}
2006-09-22 11:09:28 +02:00
\item Normally any LDAP compatible server should work; inform us about your
success with a not-listed server so that we can list it here.
2006-04-23 22:04:40 +02:00
\end { itemize}
2008-12-01 18:45:01 +01:00
Important note about virtual hosting:
2013-08-12 14:25:05 +02:00
if you define several domains in ejabberd.yml (see section \ref { hostnames} ),
2008-12-01 18:45:01 +01:00
you probably want that each virtual host uses a different configuration of database, authentication and storage,
so that usernames do not conflict and mix between different virtual hosts.
For that purpose, the options described in the next sections
2009-03-05 20:48:24 +01:00
must be set inside a \term { host\_ config} for each vhost (see section \ref { virtualhost} ).
2008-12-01 18:45:01 +01:00
For example:
\begin { verbatim}
2013-08-12 14:25:05 +02:00
host_ config:
"public.example.org":
odbc_ type: pgsql
odbc_ server: "localhost"
odbc_ database: "database-public-example-org"
odbc_ username: "ejabberd"
odbc_ password: "password"
auth_ method: [odbc]
2008-12-01 18:45:01 +01:00
\end { verbatim}
2007-03-10 16:53:53 +01:00
2013-08-12 14:25:05 +02:00
\makesubsection { odbc} { ODBC} \ind { odbc}
2003-01-25 21:13:36 +01:00
2013-08-12 14:25:05 +02:00
The actual database access is defined in the options with \term { odbc\_ } prefix. The
values are used to define if we want to use ODBC, or one of the two native
2006-09-22 11:09:28 +02:00
interface available, PostgreSQL or MySQL.
2004-10-06 17:07:21 +02:00
2013-08-12 14:25:05 +02:00
The following paramaters are available:
\begin { description}
\titem { odbc\_ type: mysql | pgsql | odbc} The type of an ODBC connection.
The default is \term { odbc} .
\titem { odbc\_ server: String} A hostname of the ODBC server. The default is
\term { ``localhost''} .
\titem { odbc\_ port: Port} The port where the ODBC server is accepting connections.
The option is only valid for \term { mysql} and \term { pgsql} . The default is
\term { 3306} and \term { 5432} respectively.
\titem { odbc\_ database: String} The database name. The default is \term { ``ejabberd''} .
The option is only valid for \term { mysql} and \term { pgsql} .
\titem { odbc\_ username: String} The username. The default is \term { ``ejabberd''} .
The option is only valid for \term { mysql} and \term { pgsql} .
\titem { odbc\_ password: String} The password. The default is empty string.
The option is only valid for \term { mysql} and \term { pgsql} .
\titem { odbc\_ pool\_ size: N} By default \ejabberd { } opens 10 connections to
the database for each virtual host. You can change this number by using this option.
\titem { odbc\_ keepalive\_ interval: N} You can configure an interval to
make a dummy SQL request to keep alive the connections to the database.
The default value is 'undefined', so no keepalive requests are made.
Specify in seconds: for example 28800 means 8 hours.
\titem { odbc\_ start\_ interval: N} If the connection to the database fails,
\ejabberd { } waits 30 seconds before retrying.
You can modify this interval with this option.
\end { description}
2008-12-01 18:45:01 +01:00
2013-08-12 14:25:05 +02:00
Example of plain ODBC connection:
2008-12-01 18:45:01 +01:00
\begin { verbatim}
2013-08-12 14:25:05 +02:00
odbc_ server: "DSN=database;UID=ejabberd;PWD=password"
2008-12-01 18:45:01 +01:00
\end { verbatim}
2013-08-12 14:25:05 +02:00
Example of MySQL connection:
2008-12-01 18:45:01 +01:00
\begin { verbatim}
2013-08-12 14:25:05 +02:00
odbc_ type: mysql
odbc_ server: "server.company.com"
odbc_ port: 3306 # the default
odbc_ database: "mydb"
odbc_ username: "user1"
odbc_ password: "**********"
odbc_ pool_ size: 5
2008-12-01 18:45:01 +01:00
\end { verbatim}
2008-06-12 23:54:30 +02:00
\makesubsubsection { odbcstorage} { Storage}
2006-09-22 11:09:28 +02:00
\ind { ODBC!storage}
2005-11-28 11:55:45 +01:00
2006-09-22 11:09:28 +02:00
An ODBC compatible database also can be used to store information into from
2012-10-03 18:14:23 +02:00
several \ejabberd { }
modules. See section~\ref { modoverview} to see which modules can be used with
relational databases like MySQL. To enable storage to your database, just make
sure that your database is running well (see previous sections), and add the
2013-08-12 14:25:05 +02:00
module option \term { db\_ type: odbc} .
2004-10-06 17:07:21 +02:00
2008-06-12 23:54:30 +02:00
\makesubsection { ldap} { LDAP}
2006-09-22 11:09:28 +02:00
\ind { databases!LDAP}
2004-10-06 17:07:21 +02:00
2006-09-22 11:09:28 +02:00
\ejabberd { } has built-in LDAP support. You can authenticate users against LDAP
2010-11-18 08:59:35 +01:00
server and use LDAP directory as vCard storage.
2005-11-28 11:55:45 +01:00
2010-04-19 15:05:48 +02:00
Usually \ejabberd { } treats LDAP as a read-only storage:
2008-10-06 16:18:46 +02:00
it is possible to consult data, but not possible to
2010-04-19 15:05:48 +02:00
create accounts or edit vCard that is stored in LDAP.
However, it is possible to change passwords if \module { mod\_ register} module is enabled
and LDAP server supports
\footahref { http://tools.ietf.org/html/rfc3062} { RFC 3062} .
2008-08-13 13:00:21 +02:00
2008-06-12 23:54:30 +02:00
\makesubsubsection { ldapconnection} { Connection}
2005-11-28 11:55:45 +01:00
2010-06-10 13:58:55 +02:00
Two connections are established to the LDAP server per vhost,
one for authentication and other for regular calls.
2006-09-22 11:09:28 +02:00
Parameters:
\begin { description}
2013-08-12 14:25:05 +02:00
\titem { ldap\_ servers: [Servers, ...]} \ind { options!ldap\_ server} List of IP addresses or DNS names of your
2008-03-13 11:59:57 +01:00
LDAP servers. This option is required.
2013-08-12 14:25:05 +02:00
\titem { ldap\_ encrypt: none|tls} \ind { options!ldap\_ encrypt} Type of connection encryption to the LDAP server.
2009-05-25 19:15:48 +02:00
Allowed values are: \term { none} , \term { tls} .
2009-11-04 21:12:54 +01:00
The value \term { tls} enables encryption by using LDAP over SSL.
Note that STARTTLS encryption is not supported.
2009-05-25 19:15:48 +02:00
The default value is: \term { none} .
2013-08-12 14:25:05 +02:00
\titem { ldap\_ tls\_ verify: false|soft|hard} \ind { options!ldap\_ tls\_ verify}
2010-05-10 11:37:37 +02:00
This option specifies whether to verify LDAP server certificate or not when TLS is enabled.
When \term { hard} is enabled \ejabberd { } doesn't proceed if a certificate is invalid.
When \term { soft} is enabled \ejabberd { } proceeds even if check fails.
The default is \term { false} which means no checks are performed.
2013-08-12 14:25:05 +02:00
\titem { ldap\_ tls\_ cacertfile: Path} \ind { options!ldap\_ tls\_ cacertfile}
2011-07-13 07:57:01 +02:00
Path to file containing PEM encoded CA certificates. This option is needed
(and required) when TLS verification is enabled.
2013-08-12 14:25:05 +02:00
\titem { ldap\_ tls\_ depth: Number} \ind { options!ldap\_ tls\_ depth}
2011-07-13 07:57:01 +02:00
Specifies the maximum verification depth when TLS verification is enabled,
i.e. how far in a chain of certificates the verification process can proceed
before the verification is considered to fail.
Peer certificate = 0, CA certificate = 1, higher level CA certificate = 2, etc.
The value 2 thus means that a chain can at most contain peer cert,
CA cert, next CA cert, and an additional CA cert. The default value is 1.
2013-08-12 14:25:05 +02:00
\titem { ldap\_ port: Number} \ind { options!ldap\_ port} Port to connect to your LDAP server.
2009-05-25 19:15:48 +02:00
The default port is~389 if encryption is disabled; and 636 if encryption is enabled.
2008-10-06 16:18:46 +02:00
If you configure a value, it is stored in \ejabberd { } 's database.
Then, if you remove that value from the configuration file,
2009-05-25 19:15:48 +02:00
the value previously stored in the database will be used instead of the default port.
2013-08-12 14:25:05 +02:00
\titem { ldap\_ rootdn: RootDN} \ind { options!ldap\_ rootdn} Bind DN. The default value
2006-09-22 11:09:28 +02:00
is~\term { ""} which means `anonymous connection'.
2013-08-12 14:25:05 +02:00
\titem { ldap\_ password: Password} \ind { options!ldap\_ password} Bind password. The default
2006-09-22 11:09:28 +02:00
value is \term { ""} .
2013-08-12 14:25:05 +02:00
\titem { ldap\_ deref\_ aliases: never|always|finding|searching} \ind { options!ldap\_ deref\_ aliases} Whether or not to dereference aliases. The default is \term { never} .
2006-09-22 11:09:28 +02:00
\end { description}
2004-10-06 17:07:21 +02:00
2006-09-22 11:09:28 +02:00
Example:
\begin { verbatim}
2013-08-12 14:25:05 +02:00
auth_ method: [ldap]
ldap_ servers:
- "ldap1.example.org"
ldap_ port: 389
ldap_ rootdn: "cn=Manager,dc=domain,dc=org"
ldap_ password: "**********"
2006-09-22 11:09:28 +02:00
\end { verbatim}
2005-11-28 11:55:45 +01:00
2008-06-12 23:54:30 +02:00
\makesubsubsection { ldapauth} { Authentication}
2005-11-28 11:55:45 +01:00
2010-06-10 13:58:55 +02:00
You can authenticate users against an LDAP directory.
Note that current LDAP implementation does not support SASL authentication.
Available options are:
2005-11-28 11:55:45 +01:00
2006-09-22 11:09:28 +02:00
\begin { description}
2013-08-12 14:25:05 +02:00
\titem { ldap\_ base: Base} \ind { options!ldap\_ base} LDAP base directory which stores
2006-10-17 14:35:47 +02:00
users accounts. This option is required.
2013-08-12 14:25:05 +02:00
\titem { ldap\_ uids: [ ldap\_ uidattr | \{ ldap\_ uidattr: ldap\_ uidattr\_ format\} ]} \ind { options!ldap\_ uids}
2009-08-12 16:15:59 +02:00
LDAP attribute which holds a list of attributes to use as alternatives for getting the JID.
The default attributes are \term { [\{ "uid", "\% u"\} ]} .
The attributes are of the form:
\term { [\{ ldap\_ uidattr\} ]} or \term { [\{ ldap\_ uidattr, ldap\_ uidattr\_ format\} ]} .
You can use as many comma separated attributes as needed.
The values for \term { ldap\_ uidattr} and
2006-10-17 14:35:47 +02:00
\term { ldap\_ uidattr\_ format} are described as follow:
\begin { description}
\titem { ldap\_ uidattr} \ind { options!ldap\_ uidattr} LDAP attribute which holds
the user's part of a JID. The default value is \term { "uid"} .
\titem { ldap\_ uidattr\_ format} \ind { options!ldap\_ uidattr\_ format} Format of
the \term { ldap\_ uidattr} variable. The format \emph { must} contain one and
only one pattern variable \term { "\% u"} which will be replaced by the
user's part of a JID. For example, \term { "\% u@example.org"} . The default
value is \term { "\% u"} .
\end { description}
2013-08-12 14:25:05 +02:00
\titem { ldap\_ filter: Filter} \ind { options!ldap\_ filter} \ind { protocols!RFC 4515:
2009-08-11 13:41:15 +02:00
LDAP String Representation of Search Filters}
\footahref { http://tools.ietf.org/html/rfc4515} { RFC 4515} LDAP filter. The
2009-11-13 21:16:41 +01:00
default Filter value is: \term { undefined} . Example:
2006-09-22 11:09:28 +02:00
\term { "(\& (objectClass=shadowAccount)(memberOf=Jabber Users))"} . Please, do
not forget to close brackets and do not use superfluous whitespaces. Also you
\emph { must not} use \option { ldap\_ uidattr} attribute in filter because this
attribute will be substituted in LDAP filter automatically.
2013-08-12 14:25:05 +02:00
\titem { ldap\_ dn\_ filter: \{ Filter: FilterAttrs \} } \ind { options!ldap\_ dn\_ filter}
2010-03-08 08:44:14 +01:00
This filter is applied on the results returned by the main filter. This filter
performs additional LDAP lookup to make the complete result. This is useful
when you are unable to define all filter rules in \term { ldap\_ filter} . You
can define \term { "\% u"} , \term { "\% d"} , \term { "\% s"} and \term { "\% D"} pattern
variables in Filter: \term { "\% u"} is replaced by a user's part of a JID,
\term { "\% d"} is replaced by the corresponding domain (virtual host),
all \term { "\% s"} variables are consecutively replaced by values of FilterAttrs
attributes and \term { "\% D"} is replaced by Distinguished Name. By default
\term { ldap\_ dn\_ filter} is undefined.
Example:
\begin { verbatim}
2013-08-12 14:25:05 +02:00
ldap_ dn_ filter:
"(& (name=%s)(owner=%D)(user=%u@%d))": ["sn"]
2010-03-08 08:44:14 +01:00
\end { verbatim}
Since this filter makes additional LDAP lookups, use it only in the
last resort: try to define all filter rules in \term { ldap\_ filter} if possible.
2009-08-12 16:15:59 +02:00
\titem { \{ ldap\_ local\_ filter, Filter\} } \ind { options!ldap\_ local\_ filter}
2008-06-13 12:13:44 +02:00
If you can't use \term { ldap\_ filter} due to performance reasons
(the LDAP server has many users registered),
you can use this local filter.
The local filter checks an attribute in ejabberd,
not in LDAP, so this limits the load on the LDAP directory.
The default filter is: \term { undefined} .
Example values:
\begin { verbatim}
{ ldap_ local_ filter, { notequal, { "accountStatus",["disabled"]} } } .
{ ldap_ local_ filter, { equal, { "accountStatus",["enabled"]} } } .
{ ldap_ local_ filter, undefined} .
\end { verbatim}
2006-09-22 11:09:28 +02:00
\end { description}
2004-10-06 17:07:21 +02:00
2008-06-12 23:54:30 +02:00
\makesubsubsection { ldapexamples} { Examples}
2005-11-28 11:55:45 +01:00
2008-06-12 23:54:30 +02:00
\makeparagraph { ldapcommonexample} { Common example}
2004-10-06 17:07:21 +02:00
2006-09-22 11:09:28 +02:00
Let's say \term { ldap.example.org} is the name of our LDAP server. We have
users with their passwords in \term { "ou=Users,dc=example,dc=org"} directory.
Also we have addressbook, which contains users emails and their additional
2009-05-25 19:15:48 +02:00
infos in \term { "ou=AddressBook,dc=example,dc=org"} directory.
The connection to the LDAP server is encrypted using TLS,
and using the custom port 6123.
Corresponding authentication section should looks like this:
2005-11-28 11:55:45 +01:00
2006-09-22 11:09:28 +02:00
\begin { verbatim}
2013-08-12 14:25:05 +02:00
## Authentication method
auth_ method: [ldap]
## DNS name of our LDAP server
ldap_ servers: ["ldap.example.org"]
## Bind to LDAP server as "cn=Manager,dc=example,dc=org" with password "secret"
ldap_ rootdn: "cn=Manager,dc=example,dc=org"
ldap_ password: "secret"
ldap_ encrypt: tls
ldap_ port: 6123
## Define the user's base
ldap_ base: "ou=Users,dc=example,dc=org"
## We want to authorize users from 'shadowAccount' object class only
ldap_ filter: "(objectClass=shadowAccount)"
2006-09-22 11:09:28 +02:00
\end { verbatim}
2004-10-06 17:07:21 +02:00
2006-09-22 11:09:28 +02:00
Now we want to use users LDAP-info as their vCards. We have four attributes
defined in our LDAP schema: \term { "mail"} --- email address, \term { "givenName"}
--- first name, \term { "sn"} --- second name, \term { "birthDay"} --- birthday.
Also we want users to search each other. Let's see how we can set it up:
2003-01-23 21:57:55 +01:00
2006-09-22 11:09:28 +02:00
\begin { verbatim}
2013-08-12 14:25:05 +02:00
modules:
2008-06-13 01:01:09 +02:00
...
2013-08-12 14:25:05 +02:00
mod_ vcard_ ldap:
## We use the same server and port, but want to bind anonymously because
## our LDAP server accepts anonymous requests to
## "ou=AddressBook,dc=example,dc=org" subtree.
ldap_ rootdn: ""
ldap_ password: ""
## define the addressbook's base
ldap_ base: "ou=AddressBook,dc=example,dc=org"
## uidattr: user's part of JID is located in the "mail" attribute
## uidattr_ format: common format for our emails
ldap_ uids:
"mail": "%u@mail.example.org"
## We have to define empty filter here, because entries in addressbook does not
## belong to shadowAccount object class
ldap_ filter: ""
## Now we want to define vCard pattern
ldap_ vcard_ map:
"NICKNAME": { "%u": []} # just use user's part of JID as his nickname
"GIVEN": { "%s": ["givenName"]}
"FAMILY": { "%s": ["sn"]}
"FN": { "%s, %s": ["sn", "givenName"]}, # example: "Smith, John"
"EMAIL": { "%s": ["mail"]}
"BDAY": { "%s": ["birthDay"]}]}
## Search form
ldap_ search_ fields:
"User": "%u"
"Name": "givenName"
"Family Name": "sn"
"Email": "mail"
"Birthday": "birthDay"
## vCard fields to be reported
## Note that JID is always returned with search results
ldap_ search_ reported:
"Full Name": "FN"
"Nickname": "NICKNAME"
"Birthday": "BDAY"
2008-06-13 01:01:09 +02:00
...
2006-09-22 11:09:28 +02:00
\end { verbatim}
2003-01-23 21:57:55 +01:00
2006-09-22 11:09:28 +02:00
Note that \modvcardldap { } module checks for the existence of the user before
searching in his information in LDAP.
2003-01-23 21:57:55 +01:00
2006-04-23 18:55:25 +02:00
2008-06-12 23:54:30 +02:00
\makeparagraph { ad} { Active Directory}
2006-09-22 11:09:28 +02:00
\ind { databases!Active Directory}
2006-04-23 18:55:25 +02:00
2006-09-22 11:09:28 +02:00
Active Directory is just an LDAP-server with predefined attributes. A sample
2007-08-31 18:41:31 +02:00
configuration is shown below:
2006-04-23 18:55:25 +02:00
2006-09-22 11:09:28 +02:00
\begin { verbatim}
2013-08-12 14:25:05 +02:00
auth_ method: [ldap]
ldap_ servers: ["office.org"] # List of LDAP servers
ldap_ base: "DC=office,DC=org" # Search base of LDAP directory
ldap_ rootdn: "CN=Administrator,CN=Users,DC=office,DC=org" # LDAP manager
ldap_ password: "*******" # Password to LDAP manager
ldap_ uids: ["sAMAccountName"]
ldap_ filter: "(memberOf=*)"
2008-06-13 01:01:09 +02:00
2013-08-12 14:25:05 +02:00
modules:
2008-06-13 01:01:09 +02:00
...
2013-08-12 14:25:05 +02:00
mod_ vcard_ ldap:
ldap_ vcard_ map:
"NICKNAME": { "%u", []}
"GIVEN": { "%s", ["givenName"]}
"MIDDLE": { "%s", ["initials"]}
"FAMILY": { "%s", ["sn"]}
"FN": { "%s", ["displayName"]}
"EMAIL": { "%s", ["mail"]}
"ORGNAME": { "%s", ["company"]}
"ORGUNIT": { "%s", ["department"]}
"CTRY": { "%s", ["c"]}
"LOCALITY": { "%s", ["l"]}
"STREET": { "%s", ["streetAddress"]}
"REGION": { "%s", ["st"]}
"PCODE": { "%s", ["postalCode"]}
"TITLE": { "%s", ["title"]}
"URL": { "%s", ["wWWHomePage"]}
"DESC": { "%s", ["description"]}
"TEL": { "%s", ["telephoneNumber"]}]}
ldap_ search_ fields:
"User": "%u"
"Name": "givenName"
"Family Name": "sn"
"Email": "mail"
"Company": "company"
"Department": "department"
"Role": "title"
"Description": "description"
"Phone": "telephoneNumber"
ldap_ search_ reported:
"Full Name": "FN"
"Nickname": "NICKNAME"
"Email": "EMAIL"
2008-06-13 01:01:09 +02:00
...
2006-09-22 11:09:28 +02:00
\end { verbatim}
2014-07-10 10:11:03 +02:00
\makesubsection { riak} { Riak}
\ind { databases!Riak}
\footahref { http://basho.com/riak/} { Riak} is a distributed NoSQL key-value data store.
The actual database access is defined in the options with \term { riak\_ } prefix.
\makesubsubsection { riakconnection} { Connection}
\ind { riak!connection}
The following paramaters are available:
\begin { description}
\titem { riak\_ server: String} A hostname of the Riak server. The default is
\term { ``localhost''} .
\titem { riak\_ port: Port} The port where the Riak server is accepting connections.
The defalt is 8087.
\titem { riak\_ pool\_ size: N} By default \ejabberd { } opens 10 connections to
the Riak server. You can change this number by using this option.
\titem { riak\_ start\_ interval: N} If the connection to the Riak server fails,
\ejabberd { } waits 30 seconds before retrying.
You can modify this interval with this option.
\end { description}
Example configuration:
\begin { verbatim}
riak_ server: "riak.server.com"
riak_ port: 9097
\end { verbatim}
\makesubsubsection { riakstorage} { Storage}
\ind { riak!storage}
Several \ejabberd { } modules can be used to store information in Riak database.
Refer to the corresponding module documentation to see if it supports such
ability. To enable storage to Riak database, just make
sure that your database is running well (see the next section), and add the
module option \term { db\_ type: riak} .
\makesubsubsection { riakconfiguration} { Riak Configuration}
\ind { riak!configuration}
First, you need to configure Riak to use
\footahref { http://en.wikipedia.org/wiki/LevelDB} { LevelDB} as a database backend.
If you are using Riak 2.x and higher, configure \term { storage\_ backend} option
of \term { /etc/riak/riak.conf} as follows:
\begin { verbatim}
...
storage_ backend = leveldb
...
\end { verbatim}
If you are using Riak 1.4.x and older, configure \term { storage\_ backend} option
of \term { /etc/riak/app.config} in the section \term { riak\_ kv} as follows:
\begin { verbatim}
...
{ riak_ kv, [
...
{ storage_ backend, riak_ kv_ eleveldb_ backend} ,
...
\end { verbatim}
Second, Riak should be pointed to \ejabberd { } Erlang binary files (*.beam).
As described in \ref { install} , by default those are located
in \term { /lib/ejabberd/ebin} directory. So you
should add the following to \term { /etc/riak/vm.args} :
\begin { verbatim}
...
## Path to ejabberd beams in order to make map/reduce
-pz /lib/ejabberd/ebin
...
\end { verbatim}
Important notice: make sure Riak has at least read access to that directory.
Otherwise its startup will likely fail.
2006-09-22 11:09:28 +02:00
2008-06-12 23:54:30 +02:00
\makesection { modules} { Modules Configuration}
2006-09-22 11:09:28 +02:00
\ind { modules}
The option \term { modules} defines the list of modules that will be loaded after
\ejabberd { } 's startup. Each entry in the list is a tuple in which the first
element is the name of a module and the second is a list of options for that
module.
2009-08-12 16:15:59 +02:00
The syntax is:
2013-08-12 14:25:05 +02:00
\esyntax { modules: \{ ModuleName: ModuleOptions \} }
2009-08-12 16:15:59 +02:00
2006-09-22 11:09:28 +02:00
Examples:
\begin { itemize}
\item In this example only the module \modecho { } is loaded and no module
options are specified between the square brackets:
2008-06-13 01:01:09 +02:00
\begin { verbatim}
2013-08-12 14:25:05 +02:00
modules:
mod_ echo: { }
2006-09-22 11:09:28 +02:00
\end { verbatim}
\item In the second example the modules \modecho { } , \modtime { } , and
2014-04-15 01:21:41 +02:00
\modversion { } are loaded without options.
2008-06-13 01:01:09 +02:00
\begin { verbatim}
2013-08-12 14:25:05 +02:00
modules:
mod_ echo: { }
mod_ time: { }
mod_ version: { }
2006-09-22 11:09:28 +02:00
\end { verbatim}
\end { itemize}
2008-06-13 01:52:13 +02:00
\makesubsection { modoverview} { Modules Overview}
2006-09-22 11:09:28 +02:00
\ind { modules!overview} \ind { XMPP compliancy}
2007-12-06 00:46:50 +01:00
The following table lists all modules included in \ejabberd { } .
2006-09-22 11:09:28 +02:00
\begin { table} [H]
\centering
2008-06-13 01:52:13 +02:00
\begin { tabular} { |l|l|l|}
2008-10-06 16:18:46 +02:00
\hline { \bf Module} & { \bf Feature} & { \bf Dependencies} \\
2008-06-13 01:52:13 +02:00
\hline
2008-10-06 16:18:46 +02:00
\hline \modadhoc { } & Ad-Hoc Commands (\xepref { 0050} ) & \\
\hline \ahrefloc { modannounce} { \modannounce { } } & Manage announcements & recommends \modadhoc { } \\
2011-05-27 11:43:52 +02:00
\hline \modblocking { } & Simple Communications Blocking (\xepref { 0191} ) & \modprivacy { } \\
2008-10-06 16:18:46 +02:00
\hline \modcaps { } & Entity Capabilities (\xepref { 0115} ) & \\
2014-04-15 01:29:00 +02:00
\hline \modcarboncopy { } & Message Carbons (\xepref { 0280} ) & \\
2014-09-11 17:44:29 +02:00
\hline \ahrefloc { modclientstate} { \modclientstate { } } & Filter stanzas for inactive clients & \\
2008-10-06 16:18:46 +02:00
\hline \modconfigure { } & Server configuration using Ad-Hoc & \modadhoc { } \\
\hline \ahrefloc { moddisco} { \moddisco { } } & Service Discovery (\xepref { 0030} ) & \\
2009-09-23 17:28:53 +02:00
\hline \ahrefloc { modecho} { \modecho { } } & Echoes XMPP stanzas & \\
2014-08-17 15:38:38 +02:00
\hline \ahrefloc { modfail2ban} { \modfailban { } } & Bans IPs that show the malicious signs & \\
2010-07-11 12:14:23 +02:00
\hline \ahrefloc { modhttpbind} { \modhttpbind { } } & XMPP over Bosh service (HTTP Binding) & \\
\hline \ahrefloc { modhttpfileserver} { \modhttpfileserver { } } & Small HTTP file server & \\
2008-10-06 16:18:46 +02:00
\hline \ahrefloc { modirc} { \modirc { } } & IRC transport & \\
\hline \ahrefloc { modlast} { \modlast { } } & Last Activity (\xepref { 0012} ) & \\
\hline \ahrefloc { modmuc} { \modmuc { } } & Multi-User Chat (\xepref { 0045} ) & \\
2012-10-03 18:14:23 +02:00
\hline \ahrefloc { modmuclog} { \modmuclog { } } & Multi-User Chat room logging & \modmuc { } \\
2008-10-06 16:18:46 +02:00
\hline \ahrefloc { modoffline} { \modoffline { } } & Offline message storage (\xepref { 0160} ) & \\
2009-07-30 13:45:54 +02:00
\hline \ahrefloc { modping} { \modping { } } & XMPP Ping and periodic keepalives (\xepref { 0199} ) & \\
2011-07-15 02:53:32 +02:00
\hline \ahrefloc { modprescounter} { \modprescounter { } } & Detect presence subscription flood & \\
2011-05-27 11:43:52 +02:00
\hline \ahrefloc { modprivacy} { \modprivacy { } } & Blocking Communication (\xepref { 0016} ) & \\
2008-10-06 16:18:46 +02:00
\hline \ahrefloc { modprivate} { \modprivate { } } & Private XML Storage (\xepref { 0049} ) & \\
2008-06-13 01:52:13 +02:00
\hline \ahrefloc { modproxy} { \modproxy { } } & SOCKS5 Bytestreams (\xepref { 0065} ) & \\
2008-10-06 16:18:46 +02:00
\hline \ahrefloc { modpubsub} { \modpubsub { } } & Pub-Sub (\xepref { 0060} ), PEP (\xepref { 0163} ) & \modcaps { } \\
2009-08-18 12:14:49 +02:00
\hline \ahrefloc { modpubsub} { \modpubsubodbc { } } & Pub-Sub (\xepref { 0060} ), PEP (\xepref { 0163} ) & supported DB (*) and \modcaps { } \\
2008-10-06 16:18:46 +02:00
\hline \ahrefloc { modregister} { \modregister { } } & In-Band Registration (\xepref { 0077} ) & \\
2010-11-04 22:34:18 +01:00
\hline \ahrefloc { modregisterweb} { \modregisterweb { } } & Web for Account Registrations & \\
2008-10-06 16:18:46 +02:00
\hline \ahrefloc { modroster} { \modroster { } } & Roster management (XMPP IM) & \\
\hline \ahrefloc { modservicelog} { \modservicelog { } } & Copy user messages to logger service & \\
2012-10-03 18:14:23 +02:00
\hline \ahrefloc { modsharedroster} { \modsharedroster { } } & Shared roster management & \modroster { } \\
\hline \ahrefloc { modsharedrosterldap} { \modsharedrosterldap { } } & LDAP Shared roster management & \modroster { } \\
2010-03-08 13:58:22 +01:00
\hline \ahrefloc { modsic} { \modsic { } } & Server IP Check (\xepref { 0279} ) & \\
2014-04-30 17:20:38 +02:00
\hline \ahrefloc { modsip} { \modsip { } } & SIP Registrar/Proxy (\footahref { http://tools.ietf.org/html/rfc3261} { RFC 3261} ) & \term { ejabberd\_ sip} \\
2008-10-06 16:18:46 +02:00
\hline \ahrefloc { modstats} { \modstats { } } & Statistics Gathering (\xepref { 0039} ) & \\
2009-06-30 18:51:25 +02:00
\hline \ahrefloc { modtime} { \modtime { } } & Entity Time (\xepref { 0202} ) & \\
2008-10-06 16:18:46 +02:00
\hline \ahrefloc { modvcard} { \modvcard { } } & vcard-temp (\xepref { 0054} ) & \\
\hline \ahrefloc { modvcardldap} { \modvcardldap { } } & vcard-temp (\xepref { 0054} ) & LDAP server \\
2012-10-03 18:14:23 +02:00
\hline \ahrefloc { modvcardxupdate} { \modvcardxupdate { } } & vCard-Based Avatars (\xepref { 0153} ) & \modvcard { } \\
2008-06-13 01:52:13 +02:00
\hline \ahrefloc { modversion} { \modversion { } } & Software Version (\xepref { 0092} ) & \\
2006-04-23 18:55:25 +02:00
\hline
\end { tabular}
\end { table}
2006-09-22 11:09:28 +02:00
\begin { itemize}
2008-06-13 01:52:13 +02:00
\item (*) This module requires a supported database. For a list of supported databases, see section~\ref { database} .
2006-09-22 11:09:28 +02:00
\end { itemize}
2006-04-23 18:55:25 +02:00
2007-12-06 00:46:50 +01:00
You can see which database backend each module needs by looking at the suffix:
\begin { itemize}
2012-10-03 18:14:23 +02:00
\item No suffix, this means that the module uses Erlang's built-in database
2014-07-10 13:33:50 +02:00
Mnesia as backend, Riak key-value store or ODBC database (see~\ref { database} ).
2007-12-06 00:46:50 +01:00
\item `\_ ldap', this means that the module needs an LDAP server as backend.
\end { itemize}
You can find more
\footahref { http://www.ejabberd.im/contributions} { contributed modules} on the
\ejabberd { } website. Please remember that these contributions might not work or
that they can contain severe bugs and security leaks. Therefore, use them at
your own risk!
2008-06-12 23:54:30 +02:00
\makesubsection { modcommonoptions} { Common Options}
2003-01-24 21:18:33 +01:00
2005-11-28 11:55:45 +01:00
The following options are used by many modules. Therefore, they are described in
this separate section.
2003-01-24 21:18:33 +01:00
2008-06-12 23:54:30 +02:00
\makesubsubsection { modiqdiscoption} { \option { iqdisc} }
2005-11-28 11:55:45 +01:00
\ind { options!iqdisc}
2003-01-24 21:18:33 +01:00
Many modules define handlers for processing IQ queries of different namespaces
2005-11-28 11:55:45 +01:00
to this server or to a user (e.\, g.\ to \jid { example.org} or to
\jid { user@example.org} ). This option defines processing discipline for
2009-08-12 16:15:59 +02:00
these queries.
The syntax is:
2013-08-12 14:25:05 +02:00
\esyntax { iqdisc: Value}
2009-08-12 16:15:59 +02:00
Possible \term { Value} are:
2003-01-24 21:18:33 +01:00
\begin { description}
2005-11-28 11:55:45 +01:00
\titem { no\_ queue} All queries of a namespace with this processing discipline are
2011-04-07 12:06:31 +02:00
processed directly. This means that the XMPP connection that sends this IQ query gets blocked:
no other packets can be processed
2005-11-28 11:55:45 +01:00
until this one has been completely processed. Hence this discipline is not
recommended if the processing of a query can take a relatively long time.
\titem { one\_ queue} In this case a separate queue is created for the processing
of IQ queries of a namespace with this discipline. In addition, the processing
of this queue is done in parallel with that of other packets. This discipline
is most recommended.
2013-08-12 14:25:05 +02:00
\titem { N} N separate queues are created to process the
2011-04-07 12:06:31 +02:00
queries. The queries are thus processed in parallel, but in a
2008-04-07 15:18:42 +02:00
controlled way.
2005-11-28 11:55:45 +01:00
\titem { parallel} For every packet with this discipline a separate Erlang process
is spawned. Consequently, all these packets are processed in parallel.
Although spawning of Erlang process has a relatively low cost, this can break
the server's normal work, because the Erlang emulator has a limit on the
number of processes (32000 by default).
2003-01-24 21:18:33 +01:00
\end { description}
Example:
\begin { verbatim}
2013-08-12 14:25:05 +02:00
modules:
2008-06-13 01:01:09 +02:00
...
2013-08-12 14:25:05 +02:00
mod_ time:
iqdisc: no_ queue
2008-06-13 01:01:09 +02:00
...
2003-01-24 21:18:33 +01:00
\end { verbatim}
2003-01-23 21:57:55 +01:00
2008-06-12 23:54:30 +02:00
\makesubsubsection { modhostoption} { \option { host} }
2007-08-26 00:48:16 +02:00
\ind { options!host}
2003-01-25 21:13:36 +01:00
2008-01-01 19:20:57 +01:00
This option defines the Jabber ID of a service provided by an \ejabberd { } module.
2009-08-12 16:15:59 +02:00
The syntax is:
2013-08-12 14:25:05 +02:00
\esyntax { host: HostName}
2009-08-12 16:15:59 +02:00
If you include the keyword "@HOST@" in the HostName,
it is replaced at start time with the real virtual host string.
2003-01-25 21:13:36 +01:00
2007-08-26 00:48:16 +02:00
This example configures
2008-10-06 16:18:46 +02:00
the \ind { modules!\modecho { } } echo module to provide its echoing service
2007-08-26 00:48:16 +02:00
in the Jabber ID \jid { mirror.example.org} :
2008-06-13 01:01:09 +02:00
\begin { verbatim}
2013-08-12 14:25:05 +02:00
modules:
2008-06-13 01:01:09 +02:00
...
2013-08-12 14:25:05 +02:00
mod_ echo:
host: "mirror.example.org"
2008-06-13 01:01:09 +02:00
...
2005-04-18 16:47:13 +02:00
\end { verbatim}
2003-01-25 21:13:36 +01:00
2007-08-27 23:48:06 +02:00
However, if there are several virtual hosts and this module is enabled in all of them,
the "@HOST@" keyword must be used:
2008-06-13 01:01:09 +02:00
\begin { verbatim}
2013-08-12 14:25:05 +02:00
modules:
2008-06-13 01:01:09 +02:00
...
2013-08-12 14:25:05 +02:00
mod_ echo:
host: "mirror.@HOST@"
2008-06-13 01:01:09 +02:00
...
2007-08-27 23:48:06 +02:00
\end { verbatim}
2008-06-12 23:54:30 +02:00
\makesubsection { modannounce} { \modannounce { } }
2005-11-28 11:55:45 +01:00
\ind { modules!\modannounce { } } \ind { MOTD} \ind { message of the day} \ind { announcements}
This module enables configured users to broadcast announcements and to set
2008-10-06 16:18:46 +02:00
the message of the day (MOTD).
2008-03-04 10:07:43 +01:00
Configured users can perform these actions with a
2009-09-23 17:28:53 +02:00
\XMPP { } client either using Ad-hoc commands
2008-03-04 10:07:43 +01:00
or sending messages to specific JIDs.
The Ad-hoc commands are listed in the Server Discovery.
For this feature to work, \modadhoc { } must be enabled.
The specific JIDs where messages can be sent are listed bellow.
The first JID in each entry will apply only to the specified virtual host
2005-11-28 11:55:45 +01:00
\jid { example.org} , while the JID between brackets will apply to all virtual
2008-03-04 10:07:43 +01:00
hosts in ejabberd.
2004-08-22 23:54:14 +02:00
\begin { description}
2005-11-28 11:55:45 +01:00
\titem { example.org/announce/all (example.org/announce/all-hosts/all)} The
message is sent to all registered users. If the user is online and connected
to several resources, only the resource with the highest priority will receive
the message. If the registered user is not connected, the message will be
stored offline in assumption that \ind { modules!\modoffline { } } offline storage
2007-01-11 09:17:18 +01:00
(see section~\ref { modoffline} ) is enabled.
2005-11-28 11:55:45 +01:00
\titem { example.org/announce/online (example.org/announce/all-hosts/online)} The
message is sent to all connected users. If the user is online and connected
to several resources, all resources will receive the message.
\titem { example.org/announce/motd (example.org/announce/all-hosts/motd)} The
message is set as the message of the day (MOTD) and is sent to users when they
login. In addition the message is sent to all connected users (similar to
\term { announce/online} ).
\titem { example.org/announce/motd/update (example.org/announce/all-hosts/motd/update)}
The message is set as message of the day (MOTD) and is sent to users when they
login. The message is \emph { not sent} to any currently connected user.
\titem { example.org/announce/motd/delete (example.org/announce/all-hosts/motd/delete)}
Any message sent to this JID removes the existing message of the day (MOTD).
2004-08-22 23:54:14 +02:00
\end { description}
2004-08-13 00:34:19 +02:00
Options:
\begin { description}
2012-10-03 18:14:23 +02:00
\dbtype
2013-08-12 14:25:05 +02:00
\titem { access: AccessName} \ind { options!access} This option specifies who is allowed to
2005-11-28 11:55:45 +01:00
send announcements and to set the message of the day (by default, nobody is
able to send such messages).
2004-08-13 00:34:19 +02:00
\end { description}
2005-11-28 11:55:45 +01:00
Examples:
\begin { itemize}
\item Only administrators can send announcements:
2008-06-13 01:01:09 +02:00
\begin { verbatim}
2013-08-12 14:25:05 +02:00
access:
announce:
admin: allow
2004-08-13 00:34:19 +02:00
2013-08-12 14:25:05 +02:00
modules:
2008-06-13 01:01:09 +02:00
...
2013-08-12 14:25:05 +02:00
mod_ adhoc: { }
mod_ announce:
access: announce
2008-06-13 01:01:09 +02:00
...
2004-08-13 00:34:19 +02:00
\end { verbatim}
2005-11-28 11:55:45 +01:00
\item Administrators as well as the direction can send announcements:
2007-08-03 10:53:05 +02:00
\begin { verbatim}
2013-08-12 14:25:05 +02:00
acl:
direction:
user:
"big_ boss": "example.org"
"assistant": "example.org"
admin:
user:
"admin": "example.org"
access:
announce:
admin: allow
direction: allow
modules:
2005-11-28 11:55:45 +01:00
...
2013-08-12 14:25:05 +02:00
mod_ adhoc: { }
mod_ announce:
access: announce
2005-11-28 11:55:45 +01:00
...
\end { verbatim}
\end { itemize}
2004-07-06 23:34:50 +02:00
2007-08-03 10:53:05 +02:00
Note that \modannounce { } can be resource intensive on large
deployments as it can broadcast lot of messages. This module should be
2008-01-01 19:20:57 +01:00
disabled for instances of \ejabberd { } with hundreds of thousands users.
2007-08-03 10:53:05 +02:00
2014-09-11 17:44:29 +02:00
\makesubsection { modclientstate} { \modclientstate { } }
\ind { modules!\modclientstate { } } \ind { Client State Indication}
\ind { protocols!XEP-0352: Client State Indication}
This module allows for queueing or dropping certain types of stanzas
when a client indicates that the user is not actively using the client
at the moment (see \xepref { 0352} ). This can save bandwidth and
resources.
Options:
\begin { description}
\titem { drop\_ chat\_ states: true|false} \ind { options!drop\_ chat\_ states}
Drop most "standalone" Chat State Notifications (as defined in
\xepref { 0085} ) while a client indicates inactivity. The default value
is \term { false} .
\titem { queue\_ presence: true|false} \ind { options!queue\_ presence}
While a client is inactive, queue presence stanzas that indicate
(un)availability. The latest queued stanza of each contact is
delivered as soon as the client becomes active again. The default
value is \term { false} .
\end { description}
Example:
\begin { verbatim}
modules:
...
mod_ client_ state:
drop_ chat_ states: true
queue_ presence: true
...
\end { verbatim}
2008-06-12 23:54:30 +02:00
\makesubsection { moddisco} { \moddisco { } }
\ind { modules!\moddisco { } }
\ind { protocols!XEP-0030: Service Discovery}
\ind { protocols!XEP-0011: Jabber Browsing}
\ind { protocols!XEP-0094: Agent Information}
2009-07-17 22:45:44 +02:00
\ind { protocols!XEP-0157: Contact Addresses for XMPP Services}
2004-07-06 23:34:50 +02:00
2007-01-11 09:17:18 +01:00
This module adds support for Service Discovery (\xepref { 0030} ). With
2005-11-28 11:55:45 +01:00
this module enabled, services on your server can be discovered by
2009-09-23 17:28:53 +02:00
\XMPP { } clients. Note that \ejabberd { } has no modules with support
2007-01-11 09:17:18 +01:00
for the superseded Jabber Browsing (\xepref { 0011} ) and Agent Information
2009-09-23 17:28:53 +02:00
(\xepref { 0094} ). Accordingly, \XMPP { } clients need to have support for
2005-11-28 11:55:45 +01:00
the newer Service Discovery protocol if you want them be able to discover
the services you offer.
2003-10-11 19:39:36 +02:00
Options:
\begin { description}
2005-11-28 11:55:45 +01:00
\iqdiscitem { Service Discovery (\ns { http://jabber.org/protocol/disco\# items} and
\ns { http://jabber.org/protocol/disco\# info} )}
2013-08-12 14:25:05 +02:00
\titem { extra\_ domains: [Domain, ...]} \ind { options!extra\_ domains} With this option,
2009-07-17 22:45:44 +02:00
you can specify a list of extra domains that are added to the Service Discovery item list.
2013-08-12 14:25:05 +02:00
\titem { server\_ info: [ \{ modules: Modules, name: Name, urls: [URL, ...] \} ]} \ind { options!server\_ info}
2009-07-17 22:45:44 +02:00
Specify additional information about the server,
as described in Contact Addresses for XMPP Services (\xepref { 0157} ).
\term { Modules} can be the keyword `all',
in which case the information is reported in all the services;
or a list of \ejabberd { } modules,
in which case the information is only specified for the services provided by those modules.
2013-08-12 14:25:05 +02:00
Any arbitrary \term { Name} and \term { URL} can be specified, not only contact addresses.
2003-10-11 19:39:36 +02:00
\end { description}
2005-11-28 11:55:45 +01:00
Examples:
\begin { itemize}
\item To serve a link to the Jabber User Directory on \jid { jabber.org} :
2008-06-13 01:01:09 +02:00
\begin { verbatim}
2013-08-12 14:25:05 +02:00
modules:
2008-06-13 01:01:09 +02:00
...
2013-08-12 14:25:05 +02:00
mod_ disco:
extra_ domains: ["users.jabber.org"]
2008-06-13 01:01:09 +02:00
...
2005-11-28 11:55:45 +01:00
\end { verbatim}
\item To serve a link to the transports on another server:
2008-06-13 01:01:09 +02:00
\begin { verbatim}
2013-08-12 14:25:05 +02:00
modules:
2008-06-13 01:01:09 +02:00
...
2013-08-12 14:25:05 +02:00
mod_ disco:
extra_ domains:
- "icq.example.com"
- "msn.example.com"
2008-06-13 01:01:09 +02:00
...
2005-11-28 11:55:45 +01:00
\end { verbatim}
\item To serve a link to a few friendly servers:
2008-06-13 01:01:09 +02:00
\begin { verbatim}
2013-08-12 14:25:05 +02:00
modules:
2008-06-13 01:01:09 +02:00
...
2013-08-12 14:25:05 +02:00
mod_ disco:
extra_ domains:
- "example.org"
- "example.com"
2008-06-13 01:01:09 +02:00
...
2004-07-06 23:34:50 +02:00
\end { verbatim}
2009-07-17 22:45:44 +02:00
\item With this configuration, all services show abuse addresses,
feedback address on the main server,
and admin addresses for both the main server and the vJUD service:
\begin { verbatim}
2013-08-12 14:25:05 +02:00
modules:
2009-07-17 22:45:44 +02:00
...
2013-08-12 14:25:05 +02:00
mod_ disco:
server_ info:
-
modules: all
name: "abuse-addresses"
urls: ["mailto:abuse@shakespeare.lit"]
-
modules: [mod_ muc]
name: "Web chatroom logs"
urls: ["http://www.example.org/muc-logs"]
-
modules: [mod_ disco]
name: "feedback-addresses"
urls:
- "http://shakespeare.lit/feedback.php"
- "mailto:feedback@shakespeare.lit"
- "xmpp:feedback@shakespeare.lit"
-
modules:
- mod_ disco
- mod_ vcard
name: "admin-addresses"
urls:
- "mailto:xmpp@shakespeare.lit"
- "xmpp:admins@shakespeare.lit"
2009-07-17 22:45:44 +02:00
...
\end { verbatim}
2005-11-28 11:55:45 +01:00
\end { itemize}
2003-10-11 19:39:36 +02:00
2008-06-12 23:54:30 +02:00
\makesubsection { modecho} { \modecho { } }
2005-11-28 11:55:45 +01:00
\ind { modules!\modecho { } } \ind { debugging}
2003-10-11 19:39:36 +02:00
2009-09-23 17:28:53 +02:00
This module simply echoes any \XMPP { }
2005-11-28 11:55:45 +01:00
packet back to the sender. This mirror can be of interest for
2009-09-23 17:28:53 +02:00
\ejabberd { } and \XMPP { } client debugging.
2003-10-11 19:39:36 +02:00
2004-07-06 23:34:50 +02:00
Options:
\begin { description}
\hostitem { echo}
\end { description}
2003-01-23 21:57:55 +01:00
2007-08-26 00:48:16 +02:00
Example: Mirror, mirror, on the wall, who is the most beautiful
2005-11-28 11:55:45 +01:00
of them all?
2008-06-13 01:01:09 +02:00
\begin { verbatim}
2013-08-12 14:25:05 +02:00
modules:
2008-06-13 01:01:09 +02:00
...
2013-08-12 14:25:05 +02:00
mod_ echo:
host: "mirror.example.org"
2008-06-13 01:01:09 +02:00
...
2005-11-28 11:55:45 +01:00
\end { verbatim}
2003-01-23 21:57:55 +01:00
2014-08-17 15:38:38 +02:00
\makesubsection { modfail2ban} { \modfailban { } }
\ind { modules!\modfailban { } } \ind { modfail2ban}
The module bans IPs that show the malicious signs. Currently only C2S authentication
failures are detected.
Available options:
\begin { description}
\titem { c2s\_ auth\_ ban\_ lifetime: Seconds} The lifetime of the IP ban caused by too
many C2S authentication failures. The default is 3600, i.e. one hour.
\titem { c2s\_ max\_ auth\_ failures: Integer} The number of C2S authentication failures to
trigger the IP ban. The default is 20.
\end { description}
Example:
\begin { verbatim}
modules:
...
mod_ fail2ban:
c2s_ auth_ block_ lifetime: 7200
c2s_ max_ auth_ failures: 50
...
\end { verbatim}
2009-06-16 19:48:38 +02:00
\makesubsection { modhttpbind} { \modhttpbind { } }
\ind { modules!\modhttpbind { } } \ind { modhttpbind}
This module implements XMPP over Bosh (formerly known as HTTP Binding)
as defined in \xepref { 0124} and \xepref { 0206} .
It extends ejabberd's built in HTTP service with a configurable
resource at which this service will be hosted.
To use HTTP-Binding, enable the module:
\begin { verbatim}
2013-08-12 14:25:05 +02:00
modules:
2009-06-16 19:48:38 +02:00
...
2013-08-12 14:25:05 +02:00
mod_ http_ bind: { }
2009-06-16 19:48:38 +02:00
...
\end { verbatim}
and add \verb |http_ bind| in the HTTP service. For example:
\begin { verbatim}
2013-08-12 14:25:05 +02:00
listen:
2009-06-16 19:48:38 +02:00
...
2013-08-12 14:25:05 +02:00
-
port: 5280
module: ejabberd_ http
http_ bind: true
http_ poll: true
web_ admin: true
2009-06-16 19:48:38 +02:00
...
\end { verbatim}
With this configuration, the module will serve the requests sent to
\verb |http://example.org:5280/http-bind/|
Remember that this page is not designed to be used by web browsers,
2009-09-23 17:28:53 +02:00
it is used by XMPP clients that support XMPP over Bosh.
2009-06-16 19:48:38 +02:00
If you want to set the service in a different URI path or use a different module,
you can configure it manually using the option \verb |request_ handlers|.
For example:
\begin { verbatim}
2013-08-12 14:25:05 +02:00
listen:
2009-06-16 19:48:38 +02:00
...
2013-08-12 14:25:05 +02:00
-
port: 5280
module: ejabberd_ http
request_ handlers:
"/http-bind": mod_ http_ bind
http_ poll: true
web_ admin: true
2009-06-16 19:48:38 +02:00
...
\end { verbatim}
2009-08-12 16:15:59 +02:00
Options:
\begin { description}
\titem { \{ max\_ inactivity, Seconds\} } \ind { options!max\_ inactivity}
Define the maximum inactivity period in seconds.
Default value is 30 seconds.
For example, to set 50 seconds:
2009-06-16 19:48:38 +02:00
\begin { verbatim}
2013-08-12 14:25:05 +02:00
modules:
2009-06-16 19:48:38 +02:00
...
2013-08-12 14:25:05 +02:00
mod_ http_ bind:
max_ inactivity: 50
2009-06-16 19:48:38 +02:00
...
\end { verbatim}
2009-08-12 16:15:59 +02:00
\end { description}
2007-12-18 19:04:12 +01:00
2009-06-16 15:46:03 +02:00
\makesubsection { modhttpfileserver} { \modhttpfileserver { } }
\ind { modules!\modhttpfileserver { } } \ind { modhttpfileserver}
This simple module serves files from the local disk over HTTP.
Options:
\begin { description}
2013-08-12 14:25:05 +02:00
\titem { docroot: Path} \ind { options!docroot}
2009-06-16 15:46:03 +02:00
Directory to serve the files.
2013-08-12 14:25:05 +02:00
\titem { accesslog: Path} \ind { options!accesslog}
2009-06-16 15:46:03 +02:00
File to log accesses using an Apache-like format.
No log will be recorded if this option is not specified.
2013-08-12 14:25:05 +02:00
\titem { directory\_ indices: [Index, ...]} \ind { options!directoryindices}
2009-06-16 15:46:03 +02:00
Indicate one or more directory index files, similarly to Apache's
DirectoryIndex variable. When a web request hits a directory
instead of a regular file, those directory indices are looked in
order, and the first one found is returned.
2013-08-12 14:25:05 +02:00
\titem { custom\_ headers: \{ Name: Value\} } \ind { options!customheaders}
2009-11-23 20:11:37 +01:00
Indicate custom HTTP headers to be included in all responses.
Default value is: \term { []}
2013-08-12 14:25:05 +02:00
\titem { content\_ types: \{ Name: Type\} } \ind { options!contenttypes}
2009-11-23 20:11:37 +01:00
Specify mappings of extension to content type.
2009-07-21 19:31:09 +02:00
There are several content types already defined,
with this option you can add new definitions, modify or delete existing ones.
To delete an existing definition, simply define it with a value: `undefined'.
2013-08-12 14:25:05 +02:00
\titem { default\_ content\_ type: Type} \ind { options!defaultcontenttype}
2009-07-21 19:31:09 +02:00
Specify the content type to use for unknown extensions.
Default value is `application/octet-stream'.
2009-06-16 15:46:03 +02:00
\end { description}
This example configuration will serve the files from
the local directory \verb |/var/www|
in the address \verb |http://example.org:5280/pub/archive/|.
2009-07-21 19:31:09 +02:00
In this example a new content type \term { ogg} is defined,
\term { png} is redefined, and \term { jpg} definition is deleted.
2009-06-16 15:46:03 +02:00
To use this module you must enable it:
\begin { verbatim}
2013-08-12 14:25:05 +02:00
modules:
2009-06-16 15:46:03 +02:00
...
2013-08-12 14:25:05 +02:00
mod_ http_ fileserver:
docroot: "/var/www"
accesslog: "/var/log/ejabberd/access.log"
directory_ indices:
- "index.html"
- "main.htm"
custom_ headers:
"X-Powered-By": "Erlang/OTP"
"X-Fry": "It's a widely-believed fact!"
content_ types:
".ogg": "audio/ogg"
".png": "image/png"
".jpg": undefined
default_ content_ type: "text/html"
2009-06-16 15:46:03 +02:00
...
\end { verbatim}
And define it as a handler in the HTTP service:
\begin { verbatim}
2013-08-12 14:25:05 +02:00
listen:
2009-06-16 15:46:03 +02:00
...
2013-08-12 14:25:05 +02:00
-
port: 5280
module: ejabberd_ http
request_ handlers:
...
"/pub/archive": mod_ http_ fileserver
...
2009-06-16 15:46:03 +02:00
...
\end { verbatim}
2007-12-18 19:04:12 +01:00
2008-06-12 23:54:30 +02:00
\makesubsection { modirc} { \modirc { } }
2005-11-28 11:55:45 +01:00
\ind { modules!\modirc { } } \ind { IRC}
2004-07-06 23:34:50 +02:00
2005-11-28 11:55:45 +01:00
This module is an IRC transport that can be used to join channels on IRC
servers.
End user information:
2007-01-11 09:17:18 +01:00
\ind { protocols!groupchat 1.0} \ind { protocols!XEP-0045: Multi-User Chat}
2005-11-28 11:55:45 +01:00
\begin { itemize}
2009-09-23 17:28:53 +02:00
\item A \XMPP { } client with `groupchat 1.0' support or Multi-User
2007-01-11 09:17:18 +01:00
Chat support (\xepref { 0045} ) is necessary to join IRC channels.
2005-11-28 11:55:45 +01:00
\item An IRC channel can be joined in nearly the same way as joining a
2009-09-23 17:28:53 +02:00
\XMPP { } Multi-User Chat room. The difference is that the room name will
2006-09-22 11:09:28 +02:00
be `channel\% \jid { irc.example.org} ' in case \jid { irc.example.org} is
the IRC server hosting `channel'. And of course the host should point
2005-11-28 11:55:45 +01:00
to the IRC transport instead of the Multi-User Chat service.
2006-09-22 11:09:28 +02:00
\item You can register your nickame by sending `IDENTIFY password' to \\
2005-11-28 11:55:45 +01:00
\jid { nickserver!irc.example.org@irc.jabberserver.org} .
2006-09-22 11:09:28 +02:00
\item Entering your password is possible by sending `LOGIN nick password' \\
2005-11-28 11:55:45 +01:00
to \jid { nickserver!irc.example.org@irc.jabberserver.org} .
2009-06-15 20:56:52 +02:00
\item The IRC transport provides Ad-Hoc Commands (\xepref { 0050} )
to join a channel, and to set custom IRC username and encoding.
2009-09-23 17:28:53 +02:00
\item When using a popular \XMPP { } server, it can occur that no
2005-11-28 11:55:45 +01:00
connection can be achieved with some IRC servers because they limit the
2011-05-31 10:07:50 +02:00
number of connections from one IP.
2005-11-28 11:55:45 +01:00
\end { itemize}
2004-07-06 23:34:50 +02:00
Options:
\begin { description}
\hostitem { irc}
2012-10-03 18:14:23 +02:00
\dbtype
2013-08-12 14:25:05 +02:00
\titem { access: AccessName} \ind { options!access} This option can be used to specify who
2005-11-28 11:55:45 +01:00
may use the IRC transport (default value: \term { all} ).
2013-08-12 14:25:05 +02:00
\titem { default\_ encoding: Encoding} \ind { options!defaultencoding} Set the default IRC encoding.
2010-11-02 22:47:28 +01:00
Default value: \term { "iso8859-1"}
2004-07-06 23:34:50 +02:00
\end { description}
2003-01-23 21:57:55 +01:00
2005-11-28 11:55:45 +01:00
Examples:
\begin { itemize}
\item In the first example, the IRC transport is available on (all) your
2006-09-22 11:09:28 +02:00
virtual host(s) with the prefix `\jid { irc.} '. Furthermore, anyone is
2007-06-22 17:25:27 +02:00
able to use the transport. The default encoding is set to "iso8859-15".
2008-06-13 01:01:09 +02:00
\begin { verbatim}
2013-08-12 14:25:05 +02:00
modules:
2008-06-13 01:01:09 +02:00
...
2013-08-12 14:25:05 +02:00
mod_ irc:
access: all
default_ encoding: "iso8859-15"
2008-06-13 01:01:09 +02:00
...
2004-07-11 22:51:54 +02:00
\end { verbatim}
2007-08-26 00:48:16 +02:00
\item In next example the IRC transport is available with JIDs with prefix \jid { irc-t.net} .
2008-11-12 01:21:47 +01:00
Moreover, the transport is only accessible to two users
of \term { example.org} , and any user of \term { example.com} :
2008-06-13 01:01:09 +02:00
\begin { verbatim}
2013-08-12 14:25:05 +02:00
acl:
paying_ customers:
user:
- "customer1": "example.org"
- "customer2": "example.org"
server: "example.com"
2008-06-13 01:01:09 +02:00
2013-08-12 14:25:05 +02:00
access:
irc_ users:
paying_ customers: allow
all: deny
2008-06-13 01:01:09 +02:00
2013-08-12 14:25:05 +02:00
modules:
2005-11-28 11:55:45 +01:00
...
2013-08-12 14:25:05 +02:00
mod_ irc:
access: irc_ users
host: "irc.example.net"
2008-06-13 01:01:09 +02:00
...
2005-11-28 11:55:45 +01:00
\end { verbatim}
\end { itemize}
2003-01-23 21:57:55 +01:00
2008-06-12 23:54:30 +02:00
\makesubsection { modlast} { \modlast { } }
2007-01-11 09:17:18 +01:00
\ind { modules!\modlast { } } \ind { protocols!XEP-0012: Last Activity}
2003-01-23 21:57:55 +01:00
2007-01-11 09:17:18 +01:00
This module adds support for Last Activity (\xepref { 0012} ). It can be used to
2005-11-28 11:55:45 +01:00
discover when a disconnected user last accessed the server, to know when a
connected user was last active on the server, or to query the uptime of the
\ejabberd { } server.
2003-01-23 21:57:55 +01:00
2004-07-06 23:34:50 +02:00
Options:
\begin { description}
2005-11-28 11:55:45 +01:00
\iqdiscitem { Last activity (\ns { jabber:iq:last} )}
2012-10-03 18:14:23 +02:00
\dbtype
2004-07-06 23:34:50 +02:00
\end { description}
2003-01-23 21:57:55 +01:00
2008-06-12 23:54:30 +02:00
\makesubsection { modmuc} { \modmuc { } }
2007-01-11 09:17:18 +01:00
\ind { modules!\modmuc { } } \ind { protocols!XEP-0045: Multi-User Chat} \ind { conferencing}
2005-11-28 11:55:45 +01:00
2008-08-21 17:13:25 +02:00
This module provides a Multi-User Chat (\xepref { 0045} ) service.
Users can discover existing rooms, join or create them.
Occupants of a room can chat in public or have private chats.
2005-11-28 11:55:45 +01:00
Some of the features of Multi-User Chat:
\begin { itemize}
2008-08-21 17:13:25 +02:00
\item Sending public and private messages to room occupants.
\item Inviting other users to a room.
\item Setting a room subject.
2005-11-28 11:55:45 +01:00
\item Creating password protected rooms.
2008-08-21 17:13:25 +02:00
\item Kicking and banning occupants.
2005-11-28 11:55:45 +01:00
\end { itemize}
2003-10-09 20:09:05 +02:00
2007-11-26 11:23:37 +01:00
The MUC service allows any Jabber ID to register a nickname,
so nobody else can use that nickname in any room in the MUC service.
2008-10-06 16:18:46 +02:00
To register a nickname, open the Service Discovery in your
2009-09-23 17:28:53 +02:00
XMPP client and register in the MUC service.
2007-11-26 11:23:37 +01:00
This module supports clustering and load
balancing. One module can be started per cluster node. Rooms are
distributed at creation time on all available MUC module
2008-08-21 17:13:25 +02:00
instances. The multi-user chat module is clustered but the rooms
2007-11-26 11:23:37 +01:00
themselves are not clustered nor fault-tolerant: if the node managing a
set of rooms goes down, the rooms disappear and they will be recreated
on an available node on first connection attempt.
2008-04-29 18:44:12 +02:00
Module options:
2003-10-09 20:09:05 +02:00
\begin { description}
2004-07-06 23:34:50 +02:00
\hostitem { conference}
2012-10-03 18:14:23 +02:00
\dbtype
2013-08-12 14:25:05 +02:00
\titem { access: AccessName} \ind { options!access} You can specify who is allowed to use
2008-08-21 17:13:25 +02:00
the Multi-User Chat service. By default everyone is allowed to use it.
2013-08-12 14:25:05 +02:00
\titem { access\_ create: AccessName} \ind { options!access\_ create} To configure who is
2009-10-19 19:02:37 +02:00
allowed to create new rooms at the Multi-User Chat service, this option can be used.
By default any account in the local ejabberd server is allowed to create rooms.
2013-08-12 14:25:05 +02:00
\titem { access\_ persistent: AccessName} \ind { options!access\_ persistent} To configure who is
2008-08-21 17:13:25 +02:00
allowed to modify the 'persistent' room option.
2009-10-19 19:02:37 +02:00
By default any account in the local ejabberd server is allowed to modify that option.
2013-08-12 14:25:05 +02:00
\titem { access\_ admin: AccessName} \ind { options!access\_ admin} This option specifies
2008-08-21 17:13:25 +02:00
who is allowed to administrate the Multi-User Chat service. The default
2005-11-28 11:55:45 +01:00
value is \term { none} , which means that only the room creator can
2008-08-21 17:13:25 +02:00
administer his room.
2008-06-13 20:55:26 +02:00
The administrators can send a normal message to the service JID,
2008-08-21 17:13:25 +02:00
and it will be shown in all active rooms as a service message.
2008-06-13 20:55:26 +02:00
The administrators can send a groupchat message to the JID of an active room,
and the message will be shown in the room as a service message.
2013-08-12 14:25:05 +02:00
\titem { history\_ size: Size} \ind { options!history\_ size} A small history of
2007-12-03 11:50:36 +01:00
the current discussion is sent to users when they enter the
room. With this option you can define the number of history messages
to keep and send to users joining the room. The value is an
integer. Setting the value to \term { 0} disables the history feature
and, as a result, nothing is kept in memory. The default value is
\term { 20} . This value is global and thus affects all rooms on the
2008-08-21 17:13:25 +02:00
service.
2013-08-12 14:25:05 +02:00
\titem { max\_ users: Number} \ind { options!max\_ users} This option defines at
2008-08-21 17:13:25 +02:00
the service level, the maximum number of users allowed per
2007-08-31 18:41:27 +02:00
room. It can be lowered in each room configuration but cannot be
2008-08-21 17:13:25 +02:00
increased in individual room configuration. The default value is
2007-08-31 18:41:27 +02:00
200.
2013-08-12 14:25:05 +02:00
\titem { max\_ users\_ admin\_ threshold: Number}
2007-08-31 18:41:27 +02:00
\ind { options!max\_ users\_ admin\_ threshold} This option defines the
2008-08-21 17:13:25 +02:00
number of service admins or room owners allowed to enter the room when
the maximum number of allowed occupants was reached. The default limit
is 5.
2013-08-12 14:25:05 +02:00
\titem { max\_ user\_ conferences: Number}
2008-08-21 17:13:25 +02:00
\ind { options!max\_ user\_ conferences} This option defines the maximum
number of rooms that any given user can join. The default value
2007-12-03 11:50:36 +01:00
is 10. This option is used to prevent possible abuses. Note that
2008-08-21 17:13:25 +02:00
this is a soft limit: some users can sometimes join more conferences
2007-12-03 11:50:36 +01:00
in cluster configurations.
2013-08-12 14:25:05 +02:00
\titem { max\_ room\_ id: Number} \ind { options!max\_ room\_ id}
2009-04-22 14:05:10 +02:00
This option defines the maximum number of characters that Room ID
can have when creating a new room.
2014-08-20 12:26:03 +02:00
The default value is to not limit: \term { infinity} .
2013-08-12 14:25:05 +02:00
\titem { max\_ room\_ name: Number} \ind { options!max\_ room\_ name}
2009-04-22 14:05:10 +02:00
This option defines the maximum number of characters that Room Name
can have when configuring the room.
2014-08-20 12:26:03 +02:00
The default value is to not limit: \term { infinity} .
2013-08-12 14:25:05 +02:00
\titem { max\_ room\_ desc: Number} \ind { options!max\_ room\_ desc}
2009-04-22 14:05:10 +02:00
This option defines the maximum number of characters that Room Description
can have when configuring the room.
2014-08-20 12:26:03 +02:00
The default value is to not limit: \term { infinity} .
2013-08-12 14:25:05 +02:00
\titem { min\_ message\_ interval: Number} \ind { options!min\_ message\_ interval}
2007-12-03 11:50:36 +01:00
This option defines the minimum interval between two messages send
2008-08-21 17:13:25 +02:00
by an occupant in seconds. This option is global and valid for all
2007-12-03 11:50:36 +01:00
rooms. A decimal value can be used. When this option is not defined,
message rate is not limited. This feature can be used to protect a
2008-08-21 17:13:25 +02:00
MUC service from occupant abuses and limit number of messages that will
2007-12-03 11:50:36 +01:00
be broadcasted by the service. A good value for this minimum message
2008-08-21 17:13:25 +02:00
interval is 0.4 second. If an occupant tries to send messages faster, an
error is send back explaining that the message has been discarded
2007-12-03 11:50:36 +01:00
and describing the reason why the message is not acceptable.
2013-08-12 14:25:05 +02:00
\titem { min\_ presence\_ interval: Number}
2007-12-03 11:50:36 +01:00
\ind { options!min\_ presence\_ interval} This option defines the
2008-08-21 17:13:25 +02:00
minimum of time between presence changes coming from a given occupant in
seconds. This option is global and valid for all rooms. A
2007-12-03 11:50:36 +01:00
decimal value can be used. When this option is not defined, no
restriction is applied. This option can be used to protect a MUC
2008-08-21 17:13:25 +02:00
service for occupants abuses. If an occupant tries
2007-12-03 11:50:36 +01:00
to change its presence more often than the specified interval, the
2008-01-01 19:20:57 +01:00
presence is cached by \ejabberd { } and only the last presence is
2008-08-21 17:13:25 +02:00
broadcasted to all occupants in the room after expiration of the
2007-12-03 11:50:36 +01:00
interval delay. Intermediate presence packets are silently
discarded. A good value for this option is 4 seconds.
2013-08-12 14:25:05 +02:00
\titem { default\_ room\_ options: \{ OptionName: OptionValue\} } \ind { options!default\_ room\_ options}
2008-04-29 18:44:12 +02:00
This module option allows to define the desired default room options.
2008-10-06 16:18:46 +02:00
Note that the creator of a room can modify the options of his room
2012-02-22 15:40:31 +01:00
at any time using an XMPP client with MUC capability.
2008-04-29 18:44:12 +02:00
The available room options and the default values are:
\begin { description}
2013-08-12 14:25:05 +02:00
\titem { allow\_ change\_ subj: true|false} Allow occupants to change the subject.
\titem { allow\_ private\_ messages: true|false} Occupants can send private messages to other occupants.
\titem { allow\_ private\_ messages\_ from\_ visitors: anyone|moderators|nobody} Visitors can send private messages to other occupants.
\titem { allow\_ query\_ users: true|false} Occupants can send IQ queries to other occupants.
\titem { allow\_ user\_ invites: false|true} Allow occupants to send invitations.
\titem { allow\_ visitor\_ nickchange: true|false} Allow visitors to
2008-07-24 13:11:19 +02:00
change nickname.
2013-08-12 14:25:05 +02:00
\titem { allow\_ visitor\_ status: true|false} Allow visitors to send
2008-07-24 13:11:19 +02:00
status text in presence updates. If disallowed, the \term { status}
text is stripped before broadcasting the presence update to all
the room occupants.
2013-08-12 14:25:05 +02:00
\titem { anonymous: true|false} The room is anonymous:
2008-09-15 20:38:52 +02:00
occupants don't see the real JIDs of other occupants.
Note that the room moderators can always see the real JIDs of the occupants.
2013-08-12 14:25:05 +02:00
\titem { captcha\_ protected: false}
2010-07-02 13:08:33 +02:00
When a user tries to join a room where he has no affiliation (not owner, admin or member),
the room requires him to fill a CAPTCHA challenge (see section \ref { captcha} )
in order to accept her join in the room.
2013-08-12 14:25:05 +02:00
\titem { logging: false|true} The public messages are logged using \term { mod\_ muc\_ log} .
\titem { max\_ users: 200} Maximum number of occupants in the room.
\titem { members\_ by\_ default: true|false} The occupants that enter the room are participants by default, so they have 'voice'.
\titem { members\_ only: false|true} Only members of the room can enter.
\titem { moderated: true|false} Only occupants with 'voice' can send public messages.
\titem { password: "roompass123"} Password of the room. You may want to enable the next option too.
\titem { password\_ protected: false|true} The password is required to enter the room.
\titem { persistent: false|true} The room persists even if the last participant leaves.
\titem { public: true|false} The room is public in the list of the MUC service, so it can be discovered.
\titem { public\_ list: true|false} The list of participants is public, without requiring to enter the room.
\titem { title: "Room Title"} A human-readable title of the room.
2008-04-29 18:44:12 +02:00
\end { description}
All of those room options can be set to \term { true} or \term { false} ,
except \term { password} and \term { title} which are strings,
and \term { max\_ users} that is integer.
2003-10-09 20:09:05 +02:00
\end { description}
2005-11-28 11:55:45 +01:00
Examples:
\begin { itemize}
\item In the first example everyone is allowed to use the Multi-User Chat
service. Everyone will also be able to create new rooms but only the user
\jid { admin@example.org} is allowed to administrate any room. In this
2006-04-23 18:55:25 +02:00
example he is also a global administrator. When \jid { admin@example.org}
2009-09-23 17:28:53 +02:00
sends a message such as `Tomorrow, the \XMPP { } server will be moved
2006-04-23 18:55:25 +02:00
to new hardware. This will involve service breakdowns around 23:00 UMT.
2006-09-22 11:09:28 +02:00
We apologise for this inconvenience.' to \jid { conference.example.org} ,
2006-09-05 17:53:54 +02:00
it will be displayed in all active rooms. In this example the history
feature is disabled.
2008-06-13 01:01:09 +02:00
\begin { verbatim}
2013-08-12 14:25:05 +02:00
acl:
admin:
user:
- "admin": "example.org"
2008-06-13 01:01:09 +02:00
2013-08-12 14:25:05 +02:00
access:
muc_ admin:
admin: allow
2008-06-13 01:01:09 +02:00
2013-08-12 14:25:05 +02:00
modules:
2005-11-28 11:55:45 +01:00
...
2013-08-12 14:25:05 +02:00
mod_ muc:
access: all
access_ create: all
access_ admin: muc_ admin
history_ size: 0
2005-11-28 11:55:45 +01:00
...
2003-10-09 20:09:05 +02:00
\end { verbatim}
2005-11-28 11:55:45 +01:00
\item In the second example the Multi-User Chat service is only accessible by
paying customers registered on our domains and on other servers. Of course
the administrator is also allowed to access rooms. In addition, he is the
2006-04-23 18:55:25 +02:00
only authority able to create and administer rooms. When
2006-09-22 11:09:28 +02:00
\jid { admin@example.org} sends a message such as `Tomorrow, the \Jabber { }
2006-04-23 18:55:25 +02:00
server will be moved to new hardware. This will involve service breakdowns
2006-09-22 11:09:28 +02:00
around 23:00 UMT. We apologise for this inconvenience.' to
2006-09-05 17:53:54 +02:00
\jid { conference.example.org} , it will be displayed in all active rooms. No
\term { history\_ size} option is used, this means that the feature is enabled
and the default value of 20 history messages will be send to the users.
2008-06-13 01:01:09 +02:00
\begin { verbatim}
2013-08-12 14:25:05 +02:00
acl:
paying_ customers:
user:
- "customer1": "example.net"
- "customer2": "example.com"
- "customer3": "example.org"
admin:
user:
- "admin": "example.org"
access:
muc_ admin
admin: allow
all: deny
muc_ access:
paying_ customers: allow
admin: allow
all: deny
modules:
2005-11-28 11:55:45 +01:00
...
2013-08-12 14:25:05 +02:00
mod_ muc:
access: muc_ access
access_ create: muc_ admin
access_ admin: muc_ admin
2005-11-28 11:55:45 +01:00
...
\end { verbatim}
2007-06-25 18:43:42 +02:00
2008-08-21 17:13:25 +02:00
\item In the following example, MUC anti abuse options are used. An
occupant cannot send more than one message every 0.4 seconds and cannot
2009-04-22 14:05:10 +02:00
change its presence more than once every 4 seconds.
The length of Room IDs and Room Names are limited to 20 characters,
and Room Description to 300 characters. No ACLs are
2007-06-25 18:43:42 +02:00
defined, but some user restriction could be added as well:
2008-06-13 01:01:09 +02:00
\begin { verbatim}
2013-08-12 14:25:05 +02:00
modules:
2007-06-25 18:43:42 +02:00
...
2013-08-12 14:25:05 +02:00
mod_ muc:
min_ message_ interval: 0.4
min_ presence_ interval: 4
max_ room_ id: 20
max_ room_ name: 20
max_ room_ desc: 300
2008-06-13 01:01:09 +02:00
...
2007-06-25 18:43:42 +02:00
\end { verbatim}
2008-04-05 12:53:32 +02:00
\item This example shows how to use \option { default\_ room\_ options} to make sure
2008-08-21 17:13:25 +02:00
the newly created rooms have by default those options.
2008-06-13 01:01:09 +02:00
\begin { verbatim}
2013-08-12 14:25:05 +02:00
modules:
2008-06-13 01:01:09 +02:00
...
2013-08-12 14:25:05 +02:00
mod_ muc:
access: muc_ access
access_ create: muc_ admin
default_ room_ options:
allow_ change_ subj: false
allow_ query_ users: true
allow_ private_ messages: true
members_ by_ default: false
title: "New chatroom"
anonymous: false
access_ admin: muc_ admin
2008-06-13 01:01:09 +02:00
...
2007-08-02 04:30:25 +02:00
\end { verbatim}
2005-11-28 11:55:45 +01:00
\end { itemize}
2003-01-23 21:57:55 +01:00
2008-06-12 23:54:30 +02:00
\makesubsection { modmuclog} { \modmuclog { } }
2006-04-11 05:16:34 +02:00
\ind { modules!\modmuclog { } }
2008-08-21 17:13:25 +02:00
This module enables optional logging of Multi-User Chat (MUC) public conversations to
HTML. Once you enable this module, users can join a room using a MUC capable
2009-09-23 17:28:53 +02:00
XMPP client, and if they have enough privileges, they can request the
2008-08-21 17:13:25 +02:00
configuration form in which they can set the option to enable room logging.
2006-04-11 05:16:34 +02:00
2006-09-22 11:09:28 +02:00
Features:
2006-04-11 05:16:34 +02:00
\begin { itemize}
2008-08-21 17:13:25 +02:00
\item Room details are added on top of each page: room title, JID,
2006-09-22 11:09:28 +02:00
author, subject and configuration.
2008-07-09 16:07:27 +02:00
\item \ind { protocols!RFC 5122: Internationalized Resource Identifiers (IRIs) and Uniform Resource Identifiers (URIs) for the Extensible Messaging and Presence Protocol (XMPP)}
2008-08-21 17:13:25 +02:00
The room JID in the generated HTML is a link to join the room (using
2009-08-11 13:41:15 +02:00
\footahref { http://xmpp.org/rfcs/rfc5122.html} { XMPP URI} ).
2008-08-21 17:13:25 +02:00
\item Subject and room configuration changes are tracked and displayed.
2006-09-22 11:09:28 +02:00
\item Joins, leaves, nick changes, kicks, bans and `/me' are tracked and
displayed, including the reason if available.
2006-04-11 05:16:34 +02:00
\item Generated HTML files are XHTML 1.0 Transitional and CSS compliant.
\item Timestamps are self-referencing links.
\item Links on top for quicker navigation: Previous day, Next day, Up.
\item CSS is used for style definition, and a custom CSS file can be used.
\item URLs on messages and subjects are converted to hyperlinks.
\item Timezone used on timestamps is shown on the log files.
2006-09-22 11:09:28 +02:00
\item A custom link can be added on top of each page.
2006-04-11 05:16:34 +02:00
\end { itemize}
Options:
\begin { description}
2013-08-12 14:25:05 +02:00
\titem { access\_ log: AccessName} \ind { options!access\_ log}
2008-08-21 17:13:25 +02:00
This option restricts which occupants are allowed to enable or disable room
2006-09-22 11:09:28 +02:00
logging. The default value is \term { muc\_ admin} . Note for this default setting
you need to have an access rule for \term { muc\_ admin} in order to take effect.
2013-08-12 14:25:05 +02:00
\titem { cssfile: false|URL} \ind { options!cssfile}
2006-09-22 11:09:28 +02:00
With this option you can set whether the HTML files should have a custom CSS
file or if they need to use the embedded CSS file. Allowed values are
\term { false} and an URL to a CSS file. With the first value, HTML files will
include the embedded CSS code. With the latter, you can specify the URL of the
2009-08-12 16:15:59 +02:00
custom CSS file (for example: \term { "http://example.com/my.css"} ). The default value
2006-09-22 11:09:28 +02:00
is \term { false} .
2013-08-12 14:25:05 +02:00
\titem { dirname: room\_ jid|room\_ name} \ind { options!dirname}
2008-08-18 21:08:30 +02:00
Allows to configure the name of the room directory.
Allowed values are \term { room\_ jid} and \term { room\_ name} .
With the first value, the room directory name will be the full room JID.
With the latter, the room directory name will be only the room name,
not including the MUC service name.
The default value is \term { room\_ jid} .
2013-08-12 14:25:05 +02:00
\titem { dirtype: subdirs|plain} \ind { options!dirtype}
2006-09-22 11:09:28 +02:00
The type of the created directories can be specified with this option. Allowed
values are \term { subdirs} and \term { plain} . With the first value,
subdirectories are created for each year and month. With the latter, the
names of the log files contain the full date, and there are no subdirectories.
The default value is \term { subdirs} .
2013-08-12 14:25:05 +02:00
\titem { file\_ format: html|plaintext} \ind { options!file\_ format}
2008-08-18 21:08:30 +02:00
Define the format of the log files:
\term { html} stores in HTML format,
\term { plaintext} stores in plain text.
The default value is \term { html} .
2013-08-12 14:25:05 +02:00
\titem { file\_ permissions: \{ mode: Mode, group: Group\} } \ind { options!file\_ permissions}
2013-02-05 16:19:23 +01:00
Define the permissions that must be used when creating the log files:
the number of the mode, and the numeric id of the group that will own the files.
The default value is \term { \{ 644, 33\} } .
2013-08-12 14:25:05 +02:00
\titem { outdir: Path} \ind { options!outdir}
2006-09-22 11:09:28 +02:00
This option sets the full path to the directory in which the HTML files should
be stored. Make sure the \ejabberd { } daemon user has write access on that
directory. The default value is \term { "www/muc"} .
2013-08-12 14:25:05 +02:00
\titem { spam\_ prevention: true|false} \ind { options!spam\_ prevention}
2007-06-25 18:43:42 +02:00
To prevent spam, the \term { spam\_ prevention} option adds a special attribute
2007-02-19 11:49:23 +01:00
to links that prevent their indexation by search engines. The default value
is \term { true} , which mean that nofollow attributes will be added to user
2008-10-06 16:18:46 +02:00
submitted links.
2013-08-12 14:25:05 +02:00
\titem { timezone: local|universal} \ind { options!timezone}
2008-08-18 21:08:30 +02:00
The time zone for the logs is configurable with this option. Allowed values
are \term { local} and \term { universal} . With the first value, the local time,
as reported to Erlang by the operating system, will be used. With the latter,
GMT/UTC time will be used. The default value is \term { local} .
2013-08-12 14:25:05 +02:00
\titem { top\_ link: \{ URL: Text\} } \ind { options!top\_ link}
2006-09-22 11:09:28 +02:00
With this option you can customize the link on the top right corner of each
2009-08-12 16:15:59 +02:00
log file. The default value is \term { \{ "/", "Home"\} } .
2006-04-11 05:16:34 +02:00
\end { description}
2006-09-22 11:09:28 +02:00
Examples:
\begin { itemize}
2008-08-21 17:13:25 +02:00
\item In the first example any room owner can enable logging, and a
custom CSS file will be used (http://example.com/my.css). The names
2006-09-22 11:09:28 +02:00
of the log files will contain the full date, and there will be no
subdirectories. The log files will be stored in /var/www/muclogs, and the
time zone will be GMT/UTC. Finally, the top link will be
2008-06-13 17:25:57 +02:00
\verb |<a href="http://www.jabber.ru/">Jabber.ru</a>|.
2008-06-13 01:01:09 +02:00
\begin { verbatim}
2013-08-12 14:25:05 +02:00
access:
muc:
all: allow
2008-06-13 01:01:09 +02:00
2013-08-12 14:25:05 +02:00
modules:
2006-09-22 11:09:28 +02:00
...
2013-08-12 14:25:05 +02:00
mod_ muc_ log:
access_ log: muc
cssfile: "http://example.com/my.css"
dirtype: plain
dirname: room_ jid
outdir: "/var/www/muclogs"
timezone: universal
spam_ prevention: true
top_ link:
"http://www.jabber.ru/": "Jabber.ru"
2008-06-13 01:01:09 +02:00
...
2006-04-11 05:16:34 +02:00
\end { verbatim}
2006-09-22 11:09:28 +02:00
\item In the second example only \jid { admin1@example.org} and
\jid { admin2@example.net} can enable logging, and the embedded CSS file will be
2008-08-21 17:13:25 +02:00
used. The names of the log files will only contain the day (number),
2006-09-22 11:09:28 +02:00
and there will be subdirectories for each year and month. The log files will
be stored in /var/www/muclogs, and the local time will be used. Finally, the
top link will be the default \verb |<a href="/">Home</a>|.
2008-06-13 01:01:09 +02:00
\begin { verbatim}
2013-08-12 14:25:05 +02:00
acl:
admin:
user:
- "admin1": "example.org"
- "admin2": "example.net"
access:
muc_ log:
admin: allow
all: deny
modules:
2006-09-22 11:09:28 +02:00
...
2013-08-12 14:25:05 +02:00
mod_ muc_ log:
access_ log: muc_ log
cssfile: false
dirtype: subdirs
file_ permissions:
mode: 644
group: 33
outdir: "/var/www/muclogs"
timezone: local
2006-09-22 11:09:28 +02:00
...
\end { verbatim}
\end { itemize}
2006-04-11 05:16:34 +02:00
2008-06-12 23:54:30 +02:00
\makesubsection { modoffline} { \modoffline { } }
2005-11-28 11:55:45 +01:00
\ind { modules!\modoffline { } }
2004-07-06 23:34:50 +02:00
2009-07-30 13:45:54 +02:00
This module implements offline message storage (\xepref { 0160} ).
This means that all messages
2005-11-28 11:55:45 +01:00
sent to an offline user will be stored on the server until that user comes
online again. Thus it is very similar to how email works. Note that
\term { ejabberdctl} \ind { ejabberdctl} has a command to delete expired messages
2007-01-11 09:17:18 +01:00
(see section~\ref { ejabberdctl} ).
2004-07-06 23:34:50 +02:00
2007-08-13 16:13:44 +02:00
\begin { description}
2012-10-03 18:14:23 +02:00
\dbtype
2013-08-12 14:25:05 +02:00
\titem { access\_ max\_ user\_ messages: AccessName} \ind { options!access\_ max\_ user\_ messages}
2009-06-15 19:43:18 +02:00
This option defines which access rule will be enforced to limit
the maximum number of offline messages that a user can have (quota).
When a user has too many offline messages, any new messages that he receive are discarded,
and a resource-constraint error is returned to the sender.
The default value is \term { max\_ user\_ offline\_ messages} .
Then you can define an access rule with a syntax similar to
\term { max\_ user\_ sessions} (see \ref { configmaxsessions} ).
2014-10-27 12:14:52 +01:00
\titem { store\_ empty\_ body: true|false} \ind { options!store\_ empty\_ body} Whether or not
to store messages with empty \term { <body/>} element. The default value is \term { true} .
2007-08-13 16:13:44 +02:00
\end { description}
2009-06-15 19:43:18 +02:00
This example allows power users to have as much as 5000 offline messages,
administrators up to 2000,
and all the other users up to 100.
\begin { verbatim}
2013-08-12 14:25:05 +02:00
acl:
admin:
user:
- "admin1": "localhost"
- "admin2": "example.org"
poweruser:
user:
- "bob": "example.org"
- "jane": "example.org"
access:
max_ user_ offline_ messages:
poweruser: 5000
admin: 2000
all: 100
modules:
2009-06-15 19:43:18 +02:00
...
2013-08-12 14:25:05 +02:00
mod_ offline:
access_ max_ user_ messages: max_ user_ offline_ messages
2009-06-15 19:43:18 +02:00
...
\end { verbatim}
2009-07-30 13:45:54 +02:00
\makesubsection { modping} { \modping { } }
\ind { modules!\modping { } }
This module implements support for XMPP Ping (\xepref { 0199} ) and periodic keepalives.
When this module is enabled ejabberd responds correctly to
ping requests, as defined in the protocol.
Configuration options:
\begin { description}
2013-08-12 14:25:05 +02:00
\titem { send\_ pings: true|false} \ind { options!send\_ pings}
2009-07-30 13:45:54 +02:00
If this option is set to \term { true} , the server sends pings to connected clients
that are not active in a given interval \term { ping\_ interval} .
This is useful to keep client connections alive or checking availability.
By default this option is disabled.
% because it is mostly not needed and consumes resources.
2013-08-12 14:25:05 +02:00
\titem { ping\_ interval: Seconds} \ind { options!ping\_ interval}
2009-07-30 13:45:54 +02:00
How often to send pings to connected clients, if the previous option is enabled.
If a client connection does not send or receive any stanza in this interval,
a ping request is sent to the client.
The default value is 60 seconds.
2013-08-12 14:25:05 +02:00
\titem { timeout\_ action: none|kill} \ind { options!timeout\_ action}
2009-07-30 13:45:54 +02:00
What to do when a client does not answer to a server ping request in less than 32 seconds.
% Those 32 seconds are defined in ejabberd_local.erl: -define(IQ_TIMEOUT, 32000).
The default is to do nothing.
\end { description}
This example enables Ping responses, configures the module to send pings
to client connections that are inactive for 4 minutes,
and if a client does not answer to the ping in less than 32 seconds, its connection is closed:
\begin { verbatim}
2013-08-12 14:25:05 +02:00
modules:
2009-07-30 13:45:54 +02:00
...
2013-08-12 14:25:05 +02:00
mod_ ping:
send_ pings: true
ping_ interval: 240
timeout_ action: kill
2009-07-30 13:45:54 +02:00
...
\end { verbatim}
2007-08-13 16:13:44 +02:00
2011-01-31 18:50:49 +01:00
\makesubsection { modprescounter} { \modprescounter { } }
\ind { modules!\modprescounter { } }
This module detects flood/spam in presence subscription stanza traffic.
If a user sends or receives more of those stanzas in a time interval,
the exceeding stanzas are silently dropped, and warning is logged.
Configuration options:
\begin { description}
2013-08-12 14:25:05 +02:00
\titem { count: StanzaNumber} \ind { options!count}
2011-01-31 18:50:49 +01:00
The number of subscription presence stanzas
(subscribe, unsubscribe, subscribed, unsubscribed)
allowed for any direction (input or output)
per time interval.
Please note that two users subscribing to each other usually generate
4 stanzas, so the recommended value is 4 or more.
The default value is: 5.
2013-08-12 14:25:05 +02:00
\titem { interval: Seconds} \ind { options!interval}
2011-01-31 18:50:49 +01:00
The time interval defined in seconds.
The default value is 60.
\end { description}
This example enables the module, and allows up to 5 presence subscription stanzas
to be sent or received by the users in 60 seconds:
\begin { verbatim}
2013-08-12 14:25:05 +02:00
modules:
2011-01-31 18:50:49 +01:00
...
2013-08-12 14:25:05 +02:00
mod_ pres_ counter:
count: 5
interval: 60
2011-01-31 18:50:49 +01:00
...
\end { verbatim}
2008-06-12 23:54:30 +02:00
\makesubsection { modprivacy} { \modprivacy { } }
2015-02-26 12:18:51 +01:00
\ind { modules!\modprivacy { } } \ind { Blocking Communication} \ind { Privacy Rules} \ind { protocols!XEP-0016: Privacy Lists}
2004-07-06 23:34:50 +02:00
2015-02-26 12:18:51 +01:00
This module implements \footahref { http://www.xmpp.org/extensions/xep-0016.html} { XEP-0016: Privacy Lists} .
2015-01-08 18:18:17 +01:00
If end users have support for it in their \XMPP { } client, they will be able to:
2005-11-28 11:55:45 +01:00
\begin { quote}
\begin { itemize}
2006-09-22 11:09:28 +02:00
\item Retrieving one's privacy lists.
\item Adding, removing, and editing one's privacy lists.
\item Setting, changing, or declining active lists.
2005-11-28 11:55:45 +01:00
\item Setting, changing, or declining the default list (i.e., the list that
2006-09-22 11:09:28 +02:00
is active by default).
2005-11-28 11:55:45 +01:00
\item Allowing or blocking messages based on JID, group, or subscription type
2006-09-22 11:09:28 +02:00
(or globally).
2005-11-28 11:55:45 +01:00
\item Allowing or blocking inbound presence notifications based on JID, group,
2006-09-22 11:09:28 +02:00
or subscription type (or globally).
2005-11-28 11:55:45 +01:00
\item Allowing or blocking outbound presence notifications based on JID, group,
2006-09-22 11:09:28 +02:00
or subscription type (or globally).
2005-11-28 11:55:45 +01:00
\item Allowing or blocking IQ stanzas based on JID, group, or subscription type
2006-09-22 11:09:28 +02:00
(or globally).
2005-11-28 11:55:45 +01:00
\item Allowing or blocking all communications based on JID, group, or
subscription type (or globally).
\end { itemize}
\end { quote}
2003-01-25 21:13:36 +01:00
Options:
\begin { description}
2005-11-28 11:55:45 +01:00
\iqdiscitem { Blocking Communication (\ns { jabber:iq:privacy} )}
2012-10-03 18:14:23 +02:00
\dbtype
2003-01-25 21:13:36 +01:00
\end { description}
2003-01-23 21:57:55 +01:00
2008-06-12 23:54:30 +02:00
\makesubsection { modprivate} { \modprivate { } }
2007-01-11 09:17:18 +01:00
\ind { modules!\modprivate { } } \ind { protocols!XEP-0049: Private XML Storage} \ind { protocols!XEP-0048: Bookmark Storage}
2003-01-23 21:57:55 +01:00
2007-01-11 09:17:18 +01:00
This module adds support for Private XML Storage (\xepref { 0049} ):
2005-11-28 11:55:45 +01:00
\begin { quote}
2009-09-23 17:28:53 +02:00
Using this method, XMPP entities can store private data on the server and
2005-11-28 11:55:45 +01:00
retrieve it whenever necessary. The data stored might be anything, as long as
it is valid XML. One typical usage for this namespace is the server-side storage
2007-01-11 09:17:18 +01:00
of client-specific preferences; another is Bookmark Storage (\xepref { 0048} ).
2005-11-28 11:55:45 +01:00
\end { quote}
2003-01-23 21:57:55 +01:00
2004-07-06 23:34:50 +02:00
Options:
\begin { description}
2005-11-28 11:55:45 +01:00
\iqdiscitem { Private XML Storage (\ns { jabber:iq:private} )}
2012-10-03 18:14:23 +02:00
\dbtype
2004-07-06 23:34:50 +02:00
\end { description}
2003-01-23 21:57:55 +01:00
2008-06-12 23:54:30 +02:00
\makesubsection { modproxy} { \modproxy { } }
2007-01-11 09:17:18 +01:00
\ind { modules!\modversion { } } \ind { protocols!XEP-0065: SOCKS5 Bytestreams}
2006-10-29 16:07:35 +01:00
2007-01-11 09:17:18 +01:00
This module implements SOCKS5 Bytestreams (\xepref { 0065} ).
2006-10-29 16:07:35 +01:00
It allows \ejabberd { } to act as a file transfer proxy between two
XMPP clients.
Options:
\begin { description}
2009-08-12 16:15:59 +02:00
\hostitem { proxy}
2013-08-12 14:25:05 +02:00
\titem { name: Text} \ind { options!name} Defines Service Discovery name of the service.
2006-10-29 16:07:35 +01:00
Default is \term { "SOCKS5 Bytestreams"} .
2013-08-12 14:25:05 +02:00
\titem { ip: IP} \ind { options!ip} This option specifies which network interface
2006-10-29 16:07:35 +01:00
to listen for. Default is an IP address of the service's DNS name, or,
2013-08-12 14:25:05 +02:00
if fails, \verb |"127.0.0.1"|.
\titem { port: Number} \ind { options!port} This option defines port to listen for
2006-10-29 16:07:35 +01:00
incoming connections. Default is~7777.
2013-08-12 14:25:05 +02:00
\titem { hostname: HostName} \ind { options!hostname} Defines a hostname advertised
2010-02-17 15:17:33 +01:00
by the service when establishing a session with clients. This is useful when
you run the service behind a NAT. The default is the value of \term { ip} option.
Examples: \term { "proxy.mydomain.org"} , \term { "200.150.100.50"} . Note that
not all clients understand domain names in stream negotiation,
so you should think twice before setting domain name in this option.
2013-08-12 14:25:05 +02:00
\titem { auth\_ type: anonymous|plain} \ind { options!auth\_ type} SOCKS5 authentication type.
2006-10-29 16:07:35 +01:00
Possible values are \term { anonymous} and \term { plain} . Default is
\term { anonymous} .
2013-08-12 14:25:05 +02:00
\titem { access: AccessName} \ind { options!access} Defines ACL for file transfer initiators.
2006-10-29 16:07:35 +01:00
Default is \term { all} .
2013-08-12 14:25:05 +02:00
\titem { max\_ connections: Number} \ind { options!max\_ connections} Maximum number of
2006-10-29 16:07:35 +01:00
active connections per file transfer initiator. No limit by default.
2013-08-12 14:25:05 +02:00
\titem { shaper: none|ShaperName} \ind { options!shaper} This option defines shaper for
2006-10-29 16:07:35 +01:00
the file transfer peers. Shaper with the maximum bandwidth will be selected.
Default is \term { none} .
\end { description}
Examples:
\begin { itemize}
\item The simpliest configuration of the module:
2008-06-13 01:01:09 +02:00
\begin { verbatim}
2013-08-12 14:25:05 +02:00
modules:
2008-06-13 01:01:09 +02:00
...
2013-08-12 14:25:05 +02:00
mod_ proxy65: { }
2008-06-13 01:01:09 +02:00
...
2006-10-29 16:07:35 +01:00
\end { verbatim}
\item More complicated configuration.
2008-06-13 01:01:09 +02:00
\begin { verbatim}
2013-08-12 14:25:05 +02:00
acl:
admin:
user:
- "admin": "example.org"
proxy_ users:
server:
- "example.org"
access:
proxy65_ access:
proxy_ users: allow
all: deny
proxy65_ shaper:
admin: none
proxy_ users: proxyrate
shaper:
proxyrate: 10240
modules:
2006-10-29 16:07:35 +01:00
...
2013-08-12 14:25:05 +02:00
mod_ proxy65:
host: "proxy1.example.org"
name: "File Transfer Proxy"
ip: "200.150.100.1"
port: 7778
max_ connections: 5
access: proxy65_ access
shaper: proxy65_ shaper
2006-10-29 16:07:35 +01:00
...
\end { verbatim}
\end { itemize}
2008-06-12 23:54:30 +02:00
\makesubsection { modpubsub} { \modpubsub { } }
2007-01-11 09:17:18 +01:00
\ind { modules!\modpubsub { } } \ind { protocols!XEP-0060: Publish-Subscribe}
2005-11-28 11:55:45 +01:00
2007-01-11 09:17:18 +01:00
This module offers a Publish-Subscribe Service (\xepref { 0060} ).
2007-12-06 12:13:29 +01:00
The functionality in \modpubsub { } can be extended using plugins.
The plugin that implements PEP (Personal Eventing via Pubsub) (\xepref { 0163} )
2008-04-16 17:44:58 +02:00
is enabled in the default ejabberd configuration file,
and it requires \modcaps { } .
2003-01-23 21:57:55 +01:00
2004-07-06 23:34:50 +02:00
Options:
\begin { description}
\hostitem { pubsub}
2009-12-04 17:08:31 +01:00
If you use \modpubsubodbc , please ensure the prefix contains only one dot,
for example `\jid { pubsub.} ', or `\jid { publish.} ',.
2013-08-12 14:25:05 +02:00
\titem { access\_ createnode: AccessName} \ind { options!access\_ createnode}
2006-09-22 11:09:28 +02:00
This option restricts which users are allowed to create pubsub nodes using
2009-10-19 19:02:37 +02:00
ACL and ACCESS.
By default any account in the local ejabberd server is allowed to create pubsub nodes.
2013-08-12 14:25:05 +02:00
\titem { max\_ items\_ node: MaxItems} \ind { options!max\_ items\_ node}
2009-09-23 17:56:06 +02:00
Define the maximum number of items that can be stored in a node.
Default value is 10.
2013-08-12 14:25:05 +02:00
\titem { plugins: [ Plugin, ...]} \ind { options!plugins}
2009-08-19 17:44:29 +02:00
To specify which pubsub node plugins to use.
2009-08-19 18:34:13 +02:00
The first one in the list is used by default.
If this option is not defined, the default plugins list is: \term { ["flat"]} .
PubSub clients can define which plugin to use when creating a node:
add \term { type='plugin-name'} attribute to the \term { create} stanza element.
2013-08-12 14:25:05 +02:00
\titem { nodetree: Nodetree} \ind { options!nodetree}
2009-08-19 17:44:29 +02:00
To specify which nodetree to use.
If not defined, the default pubsub nodetree is used: "tree".
Only one nodetree can be used per host, and is shared by all node plugins.
The "virtual" nodetree does not store nodes on database.
This saves resources on systems with tons of nodes.
If using the "virtual" nodetree,
you can only enable those node plugins:
["flat","pep"] or ["flat"];
any other plugins configuration will not work.
Also, all nodes will have the defaut configuration,
and this can not be changed.
Using "virtual" nodetree requires to start from a clean database,
it will not work if you used the default "tree" nodetree before.
The "dag" nodetree provides experimental support for PubSub Collection Nodes (\xepref { 0248} ).
In that case you should also add "dag" node plugin as default, for example:
2013-08-12 14:25:05 +02:00
\term { plugins: ["dag","flat","hometree","pep"]}
\titem { ignore\_ pep\_ from\_ offline: false|true} \ind { options!ignore\_ pep\_ from\_ offline}
2009-05-29 00:30:43 +02:00
To specify whether or not we should get last published PEP items
from users in our roster which are offline when we connect. Value is true or false.
2009-09-23 23:54:58 +02:00
If not defined, pubsub assumes true so we only get last items of online contacts.
2013-08-12 14:25:05 +02:00
\titem { last\_ item\_ cache: false|true} \ind { options!last\_ item\_ cache}
2009-05-29 00:30:43 +02:00
To specify whether or not pubsub should cache last items. Value is true
or false. If not defined, pubsub do not cache last items. On systems with not so many nodes,
caching last items speeds up pubsub and allows to raise user connection rate. The cost is memory
usage, as every item is stored in memory.
2013-08-12 14:25:05 +02:00
\titem { pep\_ mapping: \{ Key, Value\} } \ind { pep\_ mapping}
2009-05-29 00:30:43 +02:00
This allow to define a Key-Value list to choose defined node plugins on given PEP namespace.
The following example will use node\_ tune instead of node\_ pep for every PEP node with tune namespace:
\begin { verbatim}
2013-08-12 14:25:05 +02:00
modules:
...
mod_ pubsub:
pep_ mapping:
"http://jabber.org/protocol/tune": "tune"
...
2009-05-29 00:30:43 +02:00
\end { verbatim}
2008-01-30 18:51:09 +01:00
%\titem{served\_hosts} \ind{options!served\_hosts}
% This option allows to create additional pubsub virtual hosts in a single module instance.
2004-07-06 23:34:50 +02:00
\end { description}
2003-01-23 21:57:55 +01:00
2009-08-18 12:14:49 +02:00
Example of configuration that uses flat nodes as default, and allows use of flat, nodetree and pep nodes:
2004-07-06 23:34:50 +02:00
\begin { verbatim}
2013-08-12 14:25:05 +02:00
modules:
2008-06-13 01:01:09 +02:00
...
2013-08-12 14:25:05 +02:00
mod_ pubsub:
access_ createnode: pubsub_ createnode
plugins:
- "flat"
- "hometree"
- "pep"
2009-08-18 12:14:49 +02:00
...
\end { verbatim}
2013-06-24 22:49:12 +02:00
Using ODBC database requires using mod\_ pubsub\_ odbc without option changes. Only flat, hometree and pep plugins supports ODBC.
The following example shows previous configuration with ODBC usage:
2009-08-18 12:14:49 +02:00
\begin { verbatim}
2013-08-12 14:25:05 +02:00
modules:
2009-08-18 12:14:49 +02:00
...
2013-08-12 14:25:05 +02:00
mod_ pubsub_ odbc:
access_ createnode: pubsub_ createnode
plugins:
- "flat"
- "hometree"
- "pep"
2008-06-13 01:01:09 +02:00
...
2004-07-06 23:34:50 +02:00
\end { verbatim}
2003-01-23 21:57:55 +01:00
2008-06-12 23:54:30 +02:00
\makesubsection { modregister} { \modregister { } }
2007-01-11 09:17:18 +01:00
\ind { modules!\modregister { } } \ind { protocols!XEP-0077: In-Band Registration} \ind { public registration}
2005-11-28 11:55:45 +01:00
2007-01-11 09:17:18 +01:00
This module adds support for In-Band Registration (\xepref { 0077} ). This protocol
2009-09-23 17:28:53 +02:00
enables end users to use a \XMPP { } client to:
2005-11-28 11:55:45 +01:00
\begin { itemize}
\item Register a new account on the server.
\item Change the password from an existing account on the server.
\item Delete an existing account on the server.
\end { itemize}
2003-01-23 21:57:55 +01:00
2004-07-06 23:34:50 +02:00
Options:
\begin { description}
2013-08-12 14:25:05 +02:00
\titem { access: AccessName} \ind { options!access}
2011-04-26 22:55:04 +02:00
Specify rules to restrict what usernames can be registered and unregistered.
If a rule returns `deny' on the requested username,
registration and unregistration of that user name is denied.
There are no restrictions by default.
2013-08-12 14:25:05 +02:00
\titem { access\_ from: AccessName} \ind { options!access\_ from} By default, \ejabberd { }
2010-02-18 06:57:08 +01:00
doesn't allow to register new accounts from s2s or existing c2s sessions. You can
change it by defining access rule in this option. Use with care: allowing registration
from s2s leads to uncontrolled massive accounts creation by rogue users.
2013-08-12 14:25:05 +02:00
\titem { captcha\_ protected: false|true} \ind { options!captcha\_ protected}
2010-10-24 07:45:42 +02:00
Protect registrations with CAPTCHA (see section \ref { captcha} ). The default is \term { false} .
2013-08-12 14:25:05 +02:00
\titem { ip\_ access: AccessName} \ind { options!ip\_ access}
2010-11-05 19:00:16 +01:00
Define rules to allow or deny account registration depending
2013-08-12 14:25:05 +02:00
on the IP address of the XMPP client. The \term { AccessName} should be
of type \term { ip} . The default value is \term { all} .
\titem { password\_ strength: Entropy} \ind { options!password\_ strength}
2010-10-24 09:17:30 +02:00
This option sets the minimum informational entropy for passwords. The value \term { Entropy}
is a number of bits of entropy. The recommended minimum is 32 bits.
The default is 0, i.e. no checks are performed.
2013-08-12 14:25:05 +02:00
\titem { welcome\_ message: \{ subject: Subject, body: Body\} }
\ind { options!welcomem} Set a welcome message that
2008-10-06 16:18:46 +02:00
is sent to each newly registered account. The first string is the subject, and
2007-09-04 09:55:41 +02:00
the second string is the message body.
2013-08-12 14:25:05 +02:00
\titem { registration\_ watchers: [ JID, ...]} \ind { options!rwatchers} This option defines a
2007-09-04 09:55:41 +02:00
list of JIDs which will be notified each time a new account is registered.
2005-11-28 11:55:45 +01:00
\iqdiscitem { In-Band Registration (\ns { jabber:iq:register} )}
2004-07-06 23:34:50 +02:00
\end { description}
2009-03-05 20:48:24 +01:00
This module reads also another option defined globally for the server:
2013-08-12 14:25:05 +02:00
\term { registration\_ timeout: Timeout} . \ind { options!registratimeout}
2008-04-26 00:45:45 +02:00
This option limits the frequency of registration from a given IP or username.
2010-07-19 12:08:02 +02:00
So, a user that tries to register a new account from the same IP address or JID during
this number of seconds after his previous registration
will receive an error \term { resource-constraint} with the explanation:
``Users are not allowed to register accounts so quickly''.
The timeout is expressed in seconds, and it must be an integer.
2008-05-19 11:13:19 +02:00
To disable this limitation,
instead of an integer put a word like: \term { infinity} .
2008-04-26 00:45:45 +02:00
Default value: 600 seconds.
2005-11-28 11:55:45 +01:00
Examples:
\begin { itemize}
2010-11-05 19:00:16 +01:00
\item Next example prohibits the registration of too short account names,
and allows to create accounts only to clients of the local network:
2006-09-14 04:54:21 +02:00
\begin { verbatim}
2013-08-12 14:25:05 +02:00
acl:
loopback:
ip:
- "127.0.0.0/8"
2015-03-03 21:23:11 +01:00
- "::1"
2013-08-12 14:25:05 +02:00
shortname:
user_ glob:
- "?"
- "??"
## The same using regexp:
##user_ regexp: "^ ..?$ "
access:
mynetworks:
loopback: allow
all: deny
register:
shortname: deny
all: allow
modules:
mod_ register:
ip_ access: mynetworks
access: register
2004-07-06 23:34:50 +02:00
\end { verbatim}
2009-08-20 23:43:55 +02:00
\item This configuration prohibits usage of In-Band Registration
to create or delete accounts,
but allows existing accounts to change the password:
2008-06-13 01:01:09 +02:00
\begin { verbatim}
2013-08-12 14:25:05 +02:00
access:
register:
all: deny
2004-07-06 23:34:50 +02:00
2013-08-12 14:25:05 +02:00
modules:
2009-08-20 23:43:55 +02:00
...
2013-08-12 14:25:05 +02:00
mod_ register:
access: register
2009-08-20 23:43:55 +02:00
...
\end { verbatim}
\item
This configuration disables all In-Band Registration
functionality: create, delete accounts and change password:
\begin { verbatim}
2013-08-12 14:25:05 +02:00
modules:
2008-06-13 01:01:09 +02:00
...
2013-08-12 14:25:05 +02:00
## mod_ register:
## access: register
2008-06-13 01:01:09 +02:00
...
2005-11-28 11:55:45 +01:00
\end { verbatim}
2008-06-13 01:01:09 +02:00
\item Define the welcome message and two registration watchers.
2008-04-26 00:45:45 +02:00
Also define a registration timeout of one hour:
2008-06-13 01:01:09 +02:00
\begin { verbatim}
2013-08-12 14:25:05 +02:00
registration_ timeout: 3600
modules:
2008-06-13 01:01:09 +02:00
...
2013-08-12 14:25:05 +02:00
mod_ register:
welcome_ message:
subject: "Welcome!"
body: |-
Hi.
Welcome to this Jabber server.
Check http://www.jabber.org
Bye
registration_ watchers:
- "admin1@example.org"
- "boss@example.net"
2008-06-13 01:01:09 +02:00
...
2007-09-04 09:55:41 +02:00
\end { verbatim}
2005-11-28 11:55:45 +01:00
\end { itemize}
2004-07-06 23:34:50 +02:00
2010-11-04 22:34:18 +01:00
\makesubsection { modregisterweb} { \modregisterweb { } }
\ind { modules!\modregisterweb { } }
This module provides a web page where people can:
\begin { itemize}
\item Register a new account on the server.
\item Change the password from an existing account on the server.
\item Delete an existing account on the server.
\end { itemize}
This module supports CAPTCHA image to register a new account.
To enable this feature, configure the options captcha\_ cmd and captcha\_ host.
Options:
\begin { description}
2013-08-12 14:25:05 +02:00
\titem { registration\_ watchers: [ JID, ...]} \ind { options!rwatchers} This option defines a
2010-11-04 22:34:18 +01:00
list of JIDs which will be notified each time a new account is registered.
\end { description}
This example configuration shows how to enable the module and the web handler:
\begin { verbatim}
2013-08-12 14:25:05 +02:00
hosts:
- "localhost"
- "example.org"
- "example.com"
listen:
2010-11-04 22:34:18 +01:00
...
2013-08-12 14:25:05 +02:00
-
port: 5281
module: ejabberd_ http
register: true
certfile: "/etc/ejabberd/certificate.pem"
tls: true
2010-11-04 22:34:18 +01:00
...
2013-08-12 14:25:05 +02:00
modules:
2010-11-04 22:34:18 +01:00
...
2013-08-12 14:25:05 +02:00
mod_ register_ web: { }
2010-11-04 22:34:18 +01:00
...
\end { verbatim}
2011-06-11 16:15:37 +02:00
For example, the users of the host \term { example.org} can visit the page:
\ns { https://example.org:5281/register/}
2010-11-04 22:34:18 +01:00
It is important to include the last / character in the URL,
otherwise the subpages URL will be incorrect.
2008-06-12 23:54:30 +02:00
\makesubsection { modroster} { \modroster { } }
2015-01-08 18:18:17 +01:00
\ind { modules!\modroster { } } \ind { roster management} \ind { protocols!RFC 6121: XMPP IM}
2004-07-06 23:34:50 +02:00
2009-08-06 23:06:20 +02:00
This module implements roster management as defined in
2015-01-08 18:18:17 +01:00
\footahref { http://tools.ietf.org/html/rfc6121\# section-2} { RFC 6121: XMPP IM} .
2009-08-06 23:06:20 +02:00
It also supports Roster Versioning (\xepref { 0237} ).
2004-07-06 23:34:50 +02:00
Options:
\begin { description}
2005-11-28 11:55:45 +01:00
\iqdiscitem { Roster Management (\ns { jabber:iq:roster} )}
2012-10-03 18:14:23 +02:00
\dbtype
2013-08-12 14:25:05 +02:00
\titem { versioning: false|true} \ind { options!versioning} Enables
2009-08-06 23:06:20 +02:00
Roster Versioning.
This option is disabled by default.
2013-08-12 14:25:05 +02:00
\titem { store\_ current\_ id: false|true} \ind { options!storecurrentid}
2009-08-06 23:06:20 +02:00
If this option is enabled, the current version number is stored on the database.
If disabled, the version number is calculated on the fly each time.
Enabling this option reduces the load for both ejabberd and the database.
This option does not affect the client in any way.
This option is only useful if Roster Versioning is enabled.
This option is disabled by default.
2012-10-03 18:14:23 +02:00
Important: if you use \modsharedroster { } or \modsharedrosterldap { } ,
2010-11-18 08:59:35 +01:00
you must disable this option.
2013-12-04 14:55:21 +01:00
\titem { access} \ind { options!access}
This option can be configured to specify rules to restrict roster management.
If a rule returns `deny' on the requested user name,
that user cannot modify his personal roster:
not add/remove/modify contacts,
or subscribe/unsubscribe presence.
By default there aren't restrictions.
2014-02-26 18:01:47 +01:00
\titem { managers} \ind { options!managers}
List of remote entities that can manage users rosters using Remote Roster Management
(\xepref { 0321} ).
The protocol sections implemented are:
\term { 4.2. The remote entity requests current user's roster} .
\term { 4.3. The user updates roster} .
\term { 4.4. The remote entity updates the user's roster} .
A remote entity cab only get or modify roster items that have the same domain as the entity.
Default value is: \term { []} .
2004-07-06 23:34:50 +02:00
\end { description}
2014-02-26 18:01:47 +01:00
This example configuration enables Roster Versioning with storage of current id.
The ICQ and MSN transports can get ICQ and MSN contacts, add them, or remove them for any local account:
2009-08-06 23:06:20 +02:00
\begin { verbatim}
2013-08-12 14:25:05 +02:00
modules:
2009-08-06 23:06:20 +02:00
...
2013-08-12 14:25:05 +02:00
mod_ roster:
versioning: true
store_ current_ id: true
2014-02-26 18:01:47 +01:00
managers:
- "icq.example.org"
- "msn.example.org"
2009-08-06 23:06:20 +02:00
...
\end { verbatim}
2013-12-04 14:55:21 +01:00
With this example configuration, only admins can manage their rosters;
everybody else cannot modify the roster:
\begin { verbatim}
acl:
admin:
user:
- "sarah": "example.org"
access:
roster:
admin: allow
modules:
...
mod_ roster:
access: roster
...
\end { verbatim}
2008-06-12 23:54:30 +02:00
\makesubsection { modservicelog} { \modservicelog { } }
2005-11-28 11:55:45 +01:00
\ind { modules!\modservicelog { } } \ind { message auditing} \ind { Bandersnatch}
2004-08-24 22:11:01 +02:00
2009-09-23 17:28:53 +02:00
This module adds support for logging end user packets via a \XMPP { } message
2005-11-28 11:55:45 +01:00
auditing service such as
2008-06-13 17:25:57 +02:00
\footahref { http://www.funkypenguin.info/project/bandersnatch/} { Bandersnatch} . All user
2005-11-28 11:55:45 +01:00
packets are encapsulated in a \verb |<route/>| element and sent to the specified
service(s).
2004-08-24 22:11:01 +02:00
Options:
\begin { description}
2013-08-12 14:25:05 +02:00
\titem { loggers: [Names, ...]} \ind { options!loggers} With this option a (list of) service(s)
2005-11-28 11:55:45 +01:00
that will receive the packets can be specified.
2004-08-24 22:11:01 +02:00
\end { description}
2005-11-28 11:55:45 +01:00
Examples:
\begin { itemize}
\item To log all end user packets to the Bandersnatch service running on
\jid { bandersnatch.example.com} :
2008-06-13 01:01:09 +02:00
\begin { verbatim}
2013-08-12 14:25:05 +02:00
modules:
2008-06-13 01:01:09 +02:00
...
2013-08-12 14:25:05 +02:00
mod_ service_ log:
loggers: ["bandersnatch.example.com"]
2008-06-13 01:01:09 +02:00
...
2004-08-24 22:11:01 +02:00
\end { verbatim}
2005-11-28 11:55:45 +01:00
\item To log all end user packets to the Bandersnatch service running on
2008-10-06 16:18:46 +02:00
\jid { bandersnatch.example.com} and the backup service on
2005-11-28 11:55:45 +01:00
\jid { bandersnatch.example.org} :
2008-06-13 01:01:09 +02:00
\begin { verbatim}
2013-08-12 14:25:05 +02:00
modules:
2008-06-13 01:01:09 +02:00
...
2013-08-12 14:25:05 +02:00
mod_ service_ log:
loggers:
- "bandersnatch.example.com"
- "bandersnatch.example.org"
2008-06-13 01:01:09 +02:00
...
2005-11-28 11:55:45 +01:00
\end { verbatim}
\end { itemize}
2004-08-24 22:11:01 +02:00
2008-06-12 23:54:30 +02:00
\makesubsection { modsharedroster} { \modsharedroster { } }
2005-11-28 11:55:45 +01:00
\ind { modules!\modsharedroster { } } \ind { shared roster groups}
2005-04-22 18:47:16 +02:00
2005-11-28 11:55:45 +01:00
This module enables you to create shared roster groups. This means that you can
create groups of people that can see members from (other) groups in their
rosters. The big advantages of this feature are that end users do not need to
manually add all users to their rosters, and that they cannot permanently delete
2008-10-06 16:18:46 +02:00
users from the shared roster groups.
2009-09-23 17:28:53 +02:00
A shared roster group can have members from any XMPP server,
2008-10-06 16:18:46 +02:00
but the presence will only be available from and to members
2007-12-10 17:00:31 +01:00
of the same virtual host where the group is created.
2005-04-22 18:47:16 +02:00
2012-10-03 18:14:23 +02:00
Options:
\begin { description}
\dbtype
\end { description}
2008-01-01 19:20:57 +01:00
Shared roster groups can be edited \emph { only} via the Web Admin. Each group
2005-11-28 11:55:45 +01:00
has a unique identification and the following parameters:
2005-04-22 18:47:16 +02:00
\begin { description}
2005-11-28 11:55:45 +01:00
\item [Name] The name of the group, which will be displayed in the roster.
2006-09-22 11:09:28 +02:00
\item [Description] The description of the group. This parameter does not affect
2005-11-28 11:55:45 +01:00
anything.
2011-02-21 22:33:23 +01:00
\item [Members] A list of JIDs of group members, entered one per line in
2008-01-01 19:20:57 +01:00
the Web Admin.
2011-02-21 22:33:23 +01:00
The special member directive \term { @all@}
represents all the registered users in the virtual host;
which is only recommended for a small server with just a few hundred users.
The special member directive \term { @online@}
represents the online users in the virtual host.
2011-07-27 10:20:22 +02:00
\item [Displayed groups]
A list of groups that will be in the rosters of this group's members.
A group of other vhost can be identified with \term { groupid@vhost}
2005-04-22 18:47:16 +02:00
\end { description}
2005-11-28 11:55:45 +01:00
Examples:
\begin { itemize}
\item Take the case of a computer club that wants all its members seeing each
other in their rosters. To achieve this, they need to create a shared roster
group similar to next table:
\begin { table} [H]
2005-04-22 18:47:16 +02:00
\centering
\begin { tabular} { |l|l|}
2005-11-28 11:55:45 +01:00
\hline Identification& Group `\texttt { club\_ members} '\\
\hline Name& Club Members\\
\hline Description& Members from the computer club\\
\hline Members&
2005-04-22 18:47:16 +02:00
{ \begin { tabular} { l}
2005-11-28 11:55:45 +01:00
\jid { member1@example.org} \\
\jid { member2@example.org} \\
\jid { member3@example.org}
2005-04-22 18:47:16 +02:00
\end { tabular}
} \\
2005-11-28 11:55:45 +01:00
\hline Displayed groups& \texttt { club\_ members} \\
\hline
2005-04-22 18:47:16 +02:00
\end { tabular}
\end { table}
2005-11-28 11:55:45 +01:00
\item In another case we have a company which has three divisions: Management,
Marketing and Sales. All group members should see all other members in their
2007-11-26 20:54:30 +01:00
rosters. Additionally, all managers should have all marketing and sales people
2005-11-28 11:55:45 +01:00
in their roster. Simultaneously, all marketeers and the whole sales team
should see all managers. This scenario can be achieved by creating shared
roster groups as shown in the following table:
\begin { table} [H]
2005-04-22 18:47:16 +02:00
\centering
\begin { tabular} { |l|l|l|l|}
2005-11-28 11:55:45 +01:00
\hline Identification&
Group `\texttt { management} '&
Group `\texttt { marketing} '&
Group `\texttt { sales} '\\
\hline Name& Management& Marketing& Sales\\
\hline Description& \\
2005-04-22 18:47:16 +02:00
Members&
{ \begin { tabular} { l}
\jid { manager1@example.org} \\
\jid { manager2@example.org} \\
2005-11-28 11:55:45 +01:00
\jid { manager3@example.org} \\
\jid { manager4@example.org}
2005-04-22 18:47:16 +02:00
\end { tabular}
} &
{ \begin { tabular} { l}
2005-11-28 11:55:45 +01:00
\jid { marketeer1@example.org} \\
\jid { marketeer2@example.org} \\
\jid { marketeer3@example.org} \\
\jid { marketeer4@example.org}
2005-04-22 18:47:16 +02:00
\end { tabular}
} &
{ \begin { tabular} { l}
2005-11-28 11:55:45 +01:00
\jid { saleswoman1@example.org} \\
\jid { salesman1@example.org} \\
\jid { saleswoman2@example.org} \\
\jid { salesman2@example.org}
2005-04-22 18:47:16 +02:00
\end { tabular}
} \\
2005-11-28 11:55:45 +01:00
\hline Displayed groups&
2005-04-22 18:47:16 +02:00
{ \begin { tabular} { l}
2005-11-28 11:55:45 +01:00
\texttt { management} \\
\texttt { marketing} \\
\texttt { sales}
2005-04-22 18:47:16 +02:00
\end { tabular}
} &
{ \begin { tabular} { l}
2005-11-28 11:55:45 +01:00
\texttt { management} \\
\texttt { marketing}
2005-04-22 18:47:16 +02:00
\end { tabular}
} &
{ \begin { tabular} { l}
2005-11-28 11:55:45 +01:00
\texttt { management} \\
\texttt { sales}
2005-04-22 18:47:16 +02:00
\end { tabular}
2005-11-28 11:55:45 +01:00
} \\
\hline
2005-04-22 18:47:16 +02:00
\end { tabular}
\end { table}
2005-11-28 11:55:45 +01:00
\end { itemize}
2005-04-22 18:47:16 +02:00
2010-11-18 08:59:35 +01:00
\makesubsection { modsharedrosterldap} { \modsharedrosterldap { } }
\ind { modules!\modsharedrosterldap { } } \ind { shared roster groups ldap}
This module lets the server administrator
automatically populate users' rosters (contact lists) with entries based on
users and groups defined in an LDAP-based directory.
\makesubsubsection { msrlconfigparams} { Configuration parameters}
The module accepts the following configuration parameters. Some of them, if
unspecified, default to the values specified for the top level of
configuration. This lets you avoid specifying, for example, the bind password,
in multiple places.
\makeparagraph { msrlfilters} { Filters}
These parameters specify LDAP filters used to query for shared roster information.
All of them are run against the \verb |ldap_ base|.
\begin { description}
\titem { { \tt ldap\_ rfilter} }
So called ``Roster Filter''. Used to find names of all ``shared roster'' groups.
See also the \verb |ldap_ groupattr| parameter.
If unspecified, defaults to the top-level parameter of the same name.
You { \em must} specify it in some place in the configuration, there is no default.
\titem { { \tt ldap\_ ufilter} }
``User Filter'' -- used for retrieving the human-readable name of roster
entries (usually full names of people in the roster).
See also the parameters \verb |ldap_ userdesc| and \verb |ldap_ useruid|.
If unspecified, defaults to the top-level parameter of the same name.
If that one also is unspecified, then the filter is assembled from values of
other parameters as follows (\verb |[ldap_ SOMETHING]| is used to mean ``the
value of the configuration parameter { \tt ldap\_ SOMETHING} ''):
\begin { verbatim}
(& (& ([ldap_ memberattr]=[ldap_ memberattr_ format])([ldap_ groupattr]=%g))[ldap_filter])
\end { verbatim}
Subsequently { \tt \% u} and { \tt \% g} are replaced with a { \tt *} . This means
that given the defaults, the filter sent to the LDAP server is would be
\verb |(& (memberUid=*)(cn=*))|. If however the { \tt ldap\_ memberattr\_ format}
is something like \verb |uid=%u,ou=People,o=org|, then the filter will be
\verb |(& (memberUid=uid=*,ou=People,o=org)(cn=*))|.
\titem { { \tt ldap\_ gfilter} }
``Group Filter'' -- used when retrieving human-readable name (a.k.a.
``Display Name'') and the members of a group.
See also the parameters \verb |ldap_ groupattr|, \verb |ldap_ groupdesc| and \verb |ldap_ memberattr|.
If unspecified, defaults to the top-level parameter of the same name.
If that one also is unspecified, then the filter is constructed exactly in the
same way as { \tt User Filter} .
\titem { { \tt ldap\_ filter} }
Additional filter which is AND-ed together with { \tt User Filter} and { \tt
Group Filter} .
If unspecified, defaults to the top-level parameter of the same name. If that
one is also unspecified, then no additional filter is merged with the other
filters.
\end { description}
Note that you will probably need to manually define the { \tt User} and { \tt
Group Filter} s (since the auto-assembled ones will not work) if:
\begin { itemize}
\item your { \tt ldap\_ memberattr\_ format} is anything other than a simple { \tt \% u} ,
\item { \bf and} the attribute specified with { \tt ldap\_ memberattr} does not support substring matches.
\end { itemize}
An example where it is the case is OpenLDAP and { \tt (unique)MemberName} attribute from the { \tt groupOf(Unique)Names} objectClass.
A symptom of this problem is that you will see messages such as the following in your { \tt slapd.log} :
\begin { verbatim}
get_ filter: unknown filter type=130
filter="(& (?=undefined)(?=undefined)(something=else))"
\end { verbatim}
\makesubsubsection { msrlattrs} { Attributes}
These parameters specify the names of the attributes which hold interesting data
in the entries returned by running filters specified in
section~\ref { msrlfilters} .
\begin { description}
\titem { { \tt ldap\_ groupattr} }
The name of the attribute that holds the group name, and that is used to differentiate between them.
Retrieved from results of the ``Roster Filter'' and ``Group Filter''.
Defaults to { \tt cn} .
\titem { { \tt ldap\_ groupdesc} }
The name of the attribute which holds the human-readable group name in the
objects you use to represent groups.
Retrieved from results of the ``Group Filter''.
Defaults to whatever { \tt ldap\_ groupattr} is set.
\titem { { \tt ldap\_ memberattr} }
The name of the attribute which holds the IDs of the members of a group.
Retrieved from results of the ``Group Filter''.
Defaults to { \tt memberUid} .
The name of the attribute differs depending on the { \tt objectClass} you use
for your group objects, for example:
\begin { description}
\item { { \tt posixGroup} } $ \rightarrow { } $ { \tt memberUid}
\item { { \tt groupOfNames} } $ \rightarrow { } $ { \tt member}
\item { { \tt groupOfUniqueNames} } $ \rightarrow { } $ { \tt uniqueMember}
\end { description}
\titem { { \tt ldap\_ userdesc} }
The name of the attribute which holds the human-readable user name.
Retrieved from results of the ``User Filter''.
Defaults to { \tt cn} .
\titem { { \tt ldap\_ useruid} }
The name of the attribute which holds the ID of a roster item. Value of this
attribute in the roster item objects needs to match the ID retrieved from the
{ \tt ldap\_ memberattr} attribute of a group object.
Retrieved from results of the ``User Filter''.
Defaults to { \tt cn} .
\end { description}
\makesubsubsection { msrlcontrolparams} { Control parameters}
These paramters control the behaviour of the module.
\begin { description}
\titem { { \tt ldap\_ memberattr\_ format} }
A globbing format for extracting user ID from the value of the attribute named by
\verb |ldap_ memberattr|.
Defaults to { \tt \% u} , which means that the whole value is the member ID. If
you change it to something different, you may also need to specify the User
and Group Filters manually --- see section~\ref { msrlfilters} .
\titem { { \tt ldap\_ memberattr\_ format\_ re} }
A regex for extracting user ID from the value of the attribute named by
\verb |ldap_ memberattr|.
An example value { \tt "CN=($ \backslash { } \backslash { } $ w*),(OU=.*,)*DC=company,DC=com"} works for user IDs such as the following:
\begin { itemize}
\item \texttt { CN=Romeo,OU=Montague,DC=company,DC=com}
\item \texttt { CN=Abram,OU=Servants,OU=Montague,DC=company,DC=com}
\item \texttt { CN=Juliet,OU=Capulet,DC=company,DC=com}
\item \texttt { CN=Peter,OU=Servants,OU=Capulet,DC=company,DC=com}
\end { itemize}
In case:
\begin { itemize}
\item the option is unset,
\item or the { \tt re} module in unavailable in the current Erlang environment,
\item or the regular expression does not compile,
\end { itemize}
then instead of a regular expression, a simple format specified by { \tt
ldap\_ memberattr\_ format} is used. Also, in the last two cases an error
message is logged during the module initialization.
Also, note that in all cases { \tt ldap\_ memberattr\_ format} (and { \em not} the
regex version) is used for constructing the default ``User/Group Filter'' ---
see section~\ref { msrlfilters} .
\titem { { \tt ldap\_ auth\_ check} }
Whether the module should check (via the ejabberd authentication subsystem)
for existence of each user in the shared LDAP roster. See
section~\ref { msrlconfigroster} form more information. Set to { \tt off} if you
want to disable the check.
Defaults to { \tt on} .
\titem { { \tt ldap\_ user\_ cache\_ validity} }
Number of seconds for which the cache for roster item full names is considered
fresh after retrieval. 300 by default. See section~\ref { msrlconfigroster} on
how it is used during roster retrieval.
\titem { { \tt ldap\_ group\_ cache\_ validity} }
Number of seconds for which the cache for group membership is considered
fresh after retrieval. 300 by default. See section~\ref { msrlconfigroster} on
how it is used during roster retrieval.
\end { description}
\makesubsubsection { msrlconnparams} { Connection parameters}
The module also accepts the connection parameters, all of which default to the
top-level parameter of the same name, if unspecified. See~\ref { ldapconnection}
for more information about them.
\makesubsubsection { msrlconfigroster} { Retrieving the roster}
When the module is called to retrieve the shared roster for a user, the
following algorithm is used:
\begin { enumerate}
\item \label { step:rfilter} A list of names of groups to display is created: the { \tt Roster Filter}
is run against the base DN, retrieving the values of the attribute named by
{ \tt ldap\_ groupattr} .
\item Unless the group cache is fresh (see the { \tt
ldap\_ group\_ cache\_ validity} option), it is refreshed:
\begin { enumerate}
\item Information for all groups is retrieved using a single query: the { \tt
Group Filter} is run against the Base DN, retrieving the values of attributes
named by { \tt ldap\_ groupattr} (group ID), { \tt ldap\_ groupdesc} (group
``Display Name'') and { \tt ldap\_ memberattr} (IDs of group members).
\item group ``Display Name'', read from the attribute named by { \tt
ldap\_ groupdesc} , is stored in the cache for the given group
\item the following processing takes place for each retrieved value of
attribute named by { \tt ldap\_ memberattr} :
\begin { enumerate}
\item the user ID part of it is extracted using { \tt
ldap\_ memberattr\_ format(\_ re)} ,
\item then (unless { \tt ldap\_ auth\_ check} is set to { \tt off} ) for each
found user ID, the module checks (using the \ejabberd { } authentication
subsystem) whether such user exists in the given virtual host. It is
skipped if the check is enabled and fails.
This step is here for historical reasons. If you have a tidy DIT and
properly defined ``Roster Filter'' and ``Group Filter'', it is safe to
disable it by setting { \tt ldap\_ auth\_ check} to { \tt off} --- it will
speed up the roster retrieval.
\item the user ID is stored in the list of members in the cache for the
given group
\end { enumerate}
\end { enumerate}
\item For each item (group name) in the list of groups retrieved in step~\ref { step:rfilter} :
\begin { enumerate}
\item the display name of a shared roster group is retrieved from the group
cache
\item for each IDs of users which belong to the group, retrieved from the
group cache:
\begin { enumerate}
\item the ID is skipped if it's the same as the one for which we are
retrieving the roster. This is so that the user does not have himself in
the roster.
\item the display name of a shared roster user is retrieved:
\begin { enumerate}
\item first, unless the user name cache is fresh (see the { \tt
ldap\_ user\_ cache\_ validity} option), it is refreshed by running the
{ \tt User Filter} , against the Base DN, retrieving the values of
attributes named by { \tt ldap\_ useruid} and { \tt ldap\_ userdesc} .
\item then, the display name for the given user ID is retrieved from the
user name cache.
\end { enumerate}
\end { enumerate}
\end { enumerate}
\end { enumerate}
\makesubsubsection { msrlconfigexample} { Configuration examples}
Since there are many possible
\footahref { http://en.wikipedia.org/wiki/Directory\_ Information\_ Tree} { DIT}
layouts, it will probably be easiest to understand how to configure the module
by looking at an example for a given DIT (or one resembling it).
\makeparagraph { msrlconfigexampleflat} { Flat DIT}
This seems to be the kind of DIT for which this module was initially designed.
Basically there are just user objects, and group membership is stored in an
attribute individually for each user. For example in a layout shown in
figure~\ref { fig:msrl-dit-flat} , the group of each user is stored in its { \tt
ou} attribute.
\begin { figure} [htbp]
\centering
\insscaleimg { 0.4} { msrl-dit-flat.png}
\caption { Flat DIT graph}
\label { fig:msrl-dit-flat}
\end { figure}
Such layout has a few downsides, including:
\begin { itemize}
\item information duplication -- the group name is repeated in every member object
\item difficult group management -- information about group members is not
centralized, but distributed between member objects
\item inefficiency -- the list of unique group names has to be computed by iterating over all users
\end { itemize}
This however seems to be a common DIT layout, so the module keeps supporting it.
You can use the following configuration\ldots
\begin { verbatim}
2013-08-12 14:25:05 +02:00
modules:
...
mod_ shared_ roster_ ldap:
ldap_ base: "ou=flat,dc=nodomain"
ldap_ rfilter: "(objectClass=inetOrgPerson)"
ldap_ groupattr: "ou"
ldap_ memberattr: "cn"
ldap_ filter: "(objectClass=inetOrgPerson)"
ldap_ userdesc: "displayName"
...
2010-11-18 08:59:35 +01:00
\end { verbatim}
\ldots to be provided with a roster as shown in figure~\ref { fig:msrl-roster-flat} upon connecting as user { \tt czesio} .
\begin { figure} [htbp]
\centering
\insscaleimg { 1} { msrl-roster-flat.png}
\caption { Roster from flat DIT}
\label { fig:msrl-roster-flat}
\end { figure}
\makeparagraph { msrlconfigexampledeep} { Deep DIT}
This type of DIT contains distinctly typed objects for users and groups -- see figure~\ref { fig:msrl-dit-deep} .
They are shown separated into different subtrees, but it's not a requirement.
\begin { figure} [htbp]
\centering
\insscaleimg { 0.35} { msrl-dit-deep.png}
\caption { Example ``deep'' DIT graph}
\label { fig:msrl-dit-deep}
\end { figure}
If you use the following example module configuration with it:
\begin { verbatim}
2013-08-12 14:25:05 +02:00
modules:
...
mod_ shared_ roster_ ldap:
ldap_ base: "ou=deep,dc=nodomain"
ldap_ rfilter: "(objectClass=groupOfUniqueNames)"
ldap_ filter: ""
ldap_ gfilter: "(& (objectClass=groupOfUniqueNames)(cn=%g))"
ldap_ groupdesc: "description"
ldap_ memberattr: "uniqueMember"
ldap_ memberattr_ format: "cn=%u,ou=people,ou=deep,dc=nodomain"
ldap_ ufilter: "(& (objectClass=inetOrgPerson)(cn=%u))"
ldap_ userdesc: "displayName"
...
2010-11-18 08:59:35 +01:00
\end { verbatim}
\ldots and connect as user { \tt czesio} , then \ejabberd { } will provide you with
the roster shown in figure~\ref { fig:msrl-roster-deep} .
\begin { figure} [htbp]
\centering
\insscaleimg { 1} { msrl-roster-deep.png}
\caption { Example roster from ``deep'' DIT}
\label { fig:msrl-roster-deep}
\end { figure}
2010-03-08 13:58:22 +01:00
\makesubsection { modsic} { \modsic { } }
\ind { modules!\modstats { } } \ind { protocols!XEP-0279: Server IP Check}
This module adds support for Server IP Check (\xepref { 0279} ). This protocol
enables a client to discover its external IP address.
Options:
\begin { description}
\iqdiscitem { \ns { urn:xmpp:sic:0} }
\end { description}
2014-04-30 17:20:38 +02:00
\makesubsection { modsip} { \modsip { } }
\ind { modules!\modsip { } }
This module adds SIP proxy/registrar support for the corresponding virtual host.
Note that it is not enough to just load this module only. You should also configure
listeners and DNS records properly. See section \ref { sip} for the full explanation.
Example configuration:
\begin { verbatim}
modules:
...
mod_ sip: { }
...
\end { verbatim}
Options:
\begin { description}
2014-07-07 07:38:50 +02:00
\titem { record\_ route: SIP\_ URI} \ind { options!record\_ route} When the option
\term { always\_ record\_ route} is set or when SIP outbound
is utilized \footahref { http://tools.ietf.org/html/rfc5626} { RFC 5626} ,
\ejabberd { } inserts \term { Record-Route} header field with this \term { SIP\_ URI}
into a SIP message. The default is SIP URI constructed from the virtual host.
\titem { always\_ record\_ route: true|false} \ind { options!always\_ record\_ route}
Always insert \term { Record-Route} header into SIP messages. This approach allows
to bypass NATs/firewalls a bit more easily. The default is \term { true} .
\titem { routes: [SIP\_ URI]} \ind { options!routes} You can set a list of SIP URIs of routes
pointing to this proxy server. The default is a list of a SIP URI constructed
from the virtual host.
\titem { flow\_ timeout\_ udp: Seconds} For SIP outbound UDP connections set a keep-alive
timer to \term { Seconds} . The default is 29.
\titem { flow\_ timeout\_ tcp: Seconds} For SIP outbound TCP connections set a keep-alive
timer to \term { Seconds} . The default is 120.
2014-04-30 17:20:38 +02:00
\titem { via: [\{ type: Type, host: Host, port: Port\} ]} \ind { options!via} With
this option for every \term { Type} you can specify \term { Host} and \term { Port}
to set in \term { Via} header of outgoing SIP messages, where \term { Type} can be
\term { udp} , \term { tcp} or \term { tls} . \term { Host} is a string and \term { Port} is
a non negative integer. This is useful if you're running your server in a non-standard
2014-07-07 07:38:50 +02:00
network topology.
\end { description}
Example complex configuration:
2014-04-30 17:20:38 +02:00
\begin { verbatim}
modules:
...
mod_ sip:
2014-07-07 07:38:50 +02:00
always_ record_ route: false
record_ route: sip:example.com;lr
routes:
- sip:example.com;lr
- sip:sip.example.com;lr
flow_ timeout_ udp: 30
flow_ timeout_ tcp: 130
2014-04-30 17:20:38 +02:00
via:
-
type: tls
host: "sip-tls.example.com"
port: 5061
-
type: tcp
host: "sip-tcp.example.com"
port: 5060
-
type: udp
host: "sip-udp.example.com"
port: 5060
...
\end { verbatim}
2008-06-12 23:54:30 +02:00
\makesubsection { modstats} { \modstats { } }
2007-01-11 09:17:18 +01:00
\ind { modules!\modstats { } } \ind { protocols!XEP-0039: Statistics Gathering} \ind { statistics}
2004-07-06 23:34:50 +02:00
2007-01-11 09:17:18 +01:00
This module adds support for Statistics Gathering (\xepref { 0039} ). This protocol
2005-11-28 11:55:45 +01:00
allows you to retrieve next statistics from your \ejabberd { } deployment:
\begin { itemize}
\item Total number of registered users on the current virtual host (users/total).
\item Total number of registered users on all virtual hosts (users/all-hosts/total).
\item Total number of online users on the current virtual host (users/online).
\item Total number of online users on all virtual hosts (users/all-hosts/online).
\end { itemize}
2003-01-23 21:57:55 +01:00
2003-01-25 21:13:36 +01:00
Options:
\begin { description}
2005-11-28 11:55:45 +01:00
\iqdiscitem { Statistics Gathering (\ns { http://jabber.org/protocol/stats} )}
2003-01-25 21:13:36 +01:00
\end { description}
2003-01-23 21:57:55 +01:00
2005-11-28 11:55:45 +01:00
As there are only a small amount of clients (for \ind { Tkabber} example
\footahref { http://tkabber.jabber.ru/} { Tkabber} ) and software libraries with
2007-01-11 09:17:18 +01:00
support for this XEP, a few examples are given of the XML you need to send
2005-11-28 11:55:45 +01:00
in order to get the statistics. Here they are:
\begin { itemize}
\item You can request the number of online users on the current virtual host
(\jid { example.org} ) by sending:
2008-06-13 01:01:09 +02:00
\begin { verbatim}
2005-11-28 11:55:45 +01:00
<iq to='example.org' type='get'>
<query xmlns='http://jabber.org/protocol/stats'>
<stat name='users/online'/>
</query>
</iq>
\end { verbatim}
\item You can request the total number of registered users on all virtual hosts
by sending:
2008-06-13 01:01:09 +02:00
\begin { verbatim}
2005-11-28 11:55:45 +01:00
<iq to='example.org' type='get'>
<query xmlns='http://jabber.org/protocol/stats'>
<stat name='users/all-hosts/total'/>
</query>
</iq>
\end { verbatim}
\end { itemize}
2004-07-06 23:34:50 +02:00
2008-06-12 23:54:30 +02:00
\makesubsection { modtime} { \modtime { } }
2009-06-30 18:51:25 +02:00
\ind { modules!\modtime { } } \ind { protocols!XEP-0202: Entity Time}
2003-01-23 21:57:55 +01:00
2009-06-30 18:51:25 +02:00
This module features support for Entity Time (\xepref { 0202} ). By using this XEP,
2005-11-28 11:55:45 +01:00
you are able to discover the time at another entity's location.
2003-01-25 21:13:36 +01:00
Options:
\begin { description}
2005-11-28 11:55:45 +01:00
\iqdiscitem { Entity Time (\ns { jabber:iq:time} )}
2004-07-06 23:34:50 +02:00
\end { description}
2008-06-12 23:54:30 +02:00
\makesubsection { modvcard} { \modvcard { } }
2007-01-11 09:17:18 +01:00
\ind { modules!\modvcard { } } \ind { JUD} \ind { Jabber User Directory} \ind { vCard} \ind { protocols!XEP-0054: vcard-temp}
2004-07-06 23:34:50 +02:00
2005-11-28 11:55:45 +01:00
This module allows end users to store and retrieve their vCard, and to retrieve
2007-01-11 09:17:18 +01:00
other users vCards, as defined in vcard-temp (\xepref { 0054} ). The module also
2005-11-28 11:55:45 +01:00
implements an uncomplicated \Jabber { } User Directory based on the vCards of
these users. Moreover, it enables the server to send its vCard when queried.
2004-07-06 23:34:50 +02:00
Options:
\begin { description}
\hostitem { vjud}
\iqdiscitem { \ns { vcard-temp} }
2012-10-03 18:14:23 +02:00
\dbtype
2013-08-12 14:25:05 +02:00
\titem { search: true|false} \ind { options!search} This option specifies whether the search
2009-08-12 16:15:59 +02:00
functionality is enabled or not
If disabled, the option \term { host} will be ignored and the
2006-09-22 11:09:28 +02:00
\Jabber { } User Directory service will not appear in the Service Discovery item
list. The default value is \term { true} .
2013-08-12 14:25:05 +02:00
\titem { matches: infinity|Number} \ind { options!matches} With this option, the number of reported
2005-11-28 11:55:45 +01:00
search results can be limited. If the option's value is set to \term { infinity} ,
all search results are reported. The default value is \term { 30} .
2013-08-12 14:25:05 +02:00
\titem { allow\_ return\_ all: false|true} \ind { options!allow\_ return\_ all} This option enables
2006-09-22 11:09:28 +02:00
you to specify if search operations with empty input fields should return all
users who added some information to their vCard. The default value is
2005-11-28 11:55:45 +01:00
\term { false} .
2013-08-12 14:25:05 +02:00
\titem { search\_ all\_ hosts, true|false} \ind { options!search\_ all\_ hosts} If this option is set
2006-09-22 11:09:28 +02:00
to \term { true} , search operations will apply to all virtual hosts. Otherwise
only the current host will be searched. The default value is \term { true} .
2012-10-03 18:14:23 +02:00
This option is available in \modvcard when using Mnesia, but not when using ODBC storage.
2003-01-25 21:13:36 +01:00
\end { description}
2003-01-23 21:57:55 +01:00
2005-11-28 11:55:45 +01:00
Examples:
\begin { itemize}
\item In this first situation, search results are limited to twenty items,
every user who added information to their vCard will be listed when people
do an empty search, and only users from the current host will be returned:
2008-06-13 01:01:09 +02:00
\begin { verbatim}
2013-08-12 14:25:05 +02:00
modules:
2008-06-13 01:01:09 +02:00
...
2013-08-12 14:25:05 +02:00
mod_ vcard:
search: true
matches: 20
allow_ return_ all: true
search_ all_ hosts: false
2008-06-13 01:01:09 +02:00
...
2004-07-10 00:34:26 +02:00
\end { verbatim}
2005-11-28 11:55:45 +01:00
\item The second situation differs in a way that search results are not limited,
and that all virtual hosts will be searched instead of only the current one:
2008-06-13 01:01:09 +02:00
\begin { verbatim}
2013-08-12 14:25:05 +02:00
modules:
2008-06-13 01:01:09 +02:00
...
2013-08-12 14:25:05 +02:00
mod_ vcard:
search: true
matches: infinity
allow_ return_ all: true
2008-06-13 01:01:09 +02:00
...
2005-11-28 11:55:45 +01:00
\end { verbatim}
\end { itemize}
2003-01-23 21:57:55 +01:00
2008-06-12 23:54:30 +02:00
\makesubsection { modvcardldap} { \modvcardldap { } }
2007-01-11 09:17:18 +01:00
\ind { modules!\modvcardldap { } } \ind { JUD} \ind { Jabber User Directory} \ind { vCard} \ind { protocols!XEP-0054: vcard-temp}
2006-09-14 04:54:21 +02:00
2011-05-31 10:07:50 +02:00
%TODO: verify if the referrers to the LDAP section are still correct
2006-09-22 11:09:28 +02:00
\ejabberd { } can map LDAP attributes to vCard fields. This behaviour is
implemented in the \modvcardldap { } module. This module does not depend on the
2008-03-13 11:59:57 +01:00
authentication method (see~\ref { ldapauth} ).
2010-04-19 15:05:48 +02:00
Usually \ejabberd { } treats LDAP as a read-only storage:
2008-10-06 16:18:46 +02:00
it is possible to consult data, but not possible to
2010-04-19 15:05:48 +02:00
create accounts or edit vCard that is stored in LDAP.
However, it is possible to change passwords if \module { mod\_ register} module is enabled
and LDAP server supports
\footahref { http://tools.ietf.org/html/rfc3062} { RFC 3062} .
2008-08-13 13:00:21 +02:00
2008-03-13 11:59:57 +01:00
The \modvcardldap { } module has
2006-10-27 18:37:10 +02:00
its own optional parameters. The first group of parameters has the same
2006-09-22 11:09:28 +02:00
meaning as the top-level LDAP parameters to set the authentication method:
\option { ldap\_ servers} , \option { ldap\_ port} , \option { ldap\_ rootdn} ,
2011-09-19 08:58:55 +02:00
\option { ldap\_ password} , \option { ldap\_ base} , \option { ldap\_ uids} ,
\option { ldap\_ deref\_ aliases} and \option { ldap\_ filter} .
See section~\ref { ldapauth} for detailed information
2006-10-27 18:37:10 +02:00
about these options. If one of these options is not set, \ejabberd { } will look
2008-03-13 11:59:57 +01:00
for the top-level option with the same name.
The second group of parameters
2006-10-27 18:37:10 +02:00
consists of the following \modvcardldap { } -specific options:
2006-09-22 11:09:28 +02:00
\begin { description}
\hostitem { vjud}
\iqdiscitem { \ns { vcard-temp} }
2015-02-17 13:40:37 +01:00
\titem { search: true|false} \ind { options!search} This option specifies whether the search
2006-09-22 11:09:28 +02:00
functionality is enabled (value: \term { true} ) or disabled (value:
2007-08-26 00:48:16 +02:00
\term { false} ). If disabled, the option \term { host} will be ignored and the
2006-09-22 11:09:28 +02:00
\Jabber { } User Directory service will not appear in the Service Discovery item
list. The default value is \term { true} .
2015-02-17 13:40:37 +01:00
\titem { matches: infinity|Number} \ind { options!matches} With this option, the number of reported
2008-03-13 11:59:57 +01:00
search results can be limited. If the option's value is set to \term { infinity} ,
all search results are reported. The default value is \term { 30} .
2015-02-17 13:40:37 +01:00
\titem { ldap\_ vcard\_ map: \{ Name: \{ Pattern, LDAPattributes\} , ...\} } \ind { options!ldap\_ vcard\_ map}
2009-08-12 16:15:59 +02:00
With this option you can set the table that maps LDAP attributes to vCard fields.
\ind { protocols!RFC 2426: vCard MIME Directory Profile}
\term { Name} is the type name of the vCard as defined in
\footahref { http://tools.ietf.org/html/rfc2426} { RFC 2426} .
\term { Pattern} is a string which contains pattern variables
\term { "\% u"} , \term { "\% d"} or \term { "\% s"} .
\term { LDAPattributes} is the list containing LDAP attributes.
The pattern variables
\term { "\% s"} will be sequentially replaced
2006-09-22 11:09:28 +02:00
with the values of LDAP attributes from \term { List\_ of\_ LDAP\_ attributes} ,
2009-08-12 16:15:59 +02:00
\term { "\% u"} will be replaced with the user part of a JID,
and \term { "\% d"} will be replaced with the domain part of a JID.
The default is:
2008-06-13 01:01:09 +02:00
\begin { verbatim}
2015-02-17 13:40:37 +01:00
"NICKNAME": { "%u": []}
"FN": { "%s": ["displayName"]}
"LAST": { "%s": ["sn"]}
"FIRST": { "%s": ["givenName"]}
"MIDDLE": { "%s": ["initials"]}
"ORGNAME": { "%s": ["o"]}
"ORGUNIT": { "%s": ["ou"]}
"CTRY": { "%s": ["c"]}
"LOCALITY": { "%s": ["l"]}
"STREET": { "%s": ["street"]}
"REGION": { "%s": ["st"]}
"PCODE": { "%s": ["postalCode"]}
"TITLE": { "%s": ["title"]}
"URL": { "%s": ["labeleduri"]}
"DESC": { "%s": ["description"]}
"TEL": { "%s": ["telephoneNumber"]}
"EMAIL": { "%s": ["mail"]}
"BDAY": { "%s": ["birthDay"]}
"ROLE": { "%s": ["employeeType"]}
"PHOTO": { "%s": ["jpegPhoto"]}
\end { verbatim}
\titem { ldap\_ search\_ fields: \{ Name: Attribute, ...\} } \ind { options!ldap\_ search\_ fields} This option
2009-08-12 16:15:59 +02:00
defines the search form and the LDAP attributes to search within.
\term { Name} is the name of a search form
2006-09-22 11:09:28 +02:00
field which will be automatically translated by using the translation
files (see \term { msgs/*.msg} for available words). \term { Attribute} is the
LDAP attribute or the pattern \term { "\% u"} . The default is:
2008-06-13 01:01:09 +02:00
\begin { verbatim}
2015-02-17 13:40:37 +01:00
"User": "%u"
"Full Name": "displayName"
"Given Name": "givenName"
"Middle Name": "initials"
"Family Name": "sn"
"Nickname": "%u"
"Birthday": "birthDay"
"Country": "c"
"City": "l"
"Email": "mail"
"Organization Name": "o"
"Organization Unit": "ou"
\end { verbatim}
\titem { ldap\_ search\_ reported: \{ SearchField: VcardField, ...\} } \ind { options!ldap\_ search\_ reported} This option
2009-08-12 16:15:59 +02:00
defines which search fields should be reported.
\term { SearchField} is the name of a search form
2006-09-22 11:09:28 +02:00
field which will be automatically translated by using the translation
2009-08-12 16:15:59 +02:00
files (see \term { msgs/*.msg} for available words). \term { VcardField} is the
2006-09-22 11:09:28 +02:00
vCard field name defined in the \option { ldap\_ vcard\_ map} option. The default
is:
\begin { verbatim}
2015-02-17 13:40:37 +01:00
"Full Name": "FN"
"Given Name": "FIRST"
"Middle Name": "MIDDLE"
"Family Name": "LAST"
"Nickname": "NICKNAME"
"Birthday": "BDAY"
"Country": "CTRY"
"City": "LOCALITY"
"Email": "EMAIL"
"Organization Name": "ORGNAME"
"Organization Unit": "ORGUNIT"
2006-09-22 11:09:28 +02:00
\end { verbatim}
\end { description}
%TODO: this examples still should be organised better
Examples:
\begin { itemize}
2008-10-06 16:18:46 +02:00
\item
2006-09-14 04:54:21 +02:00
2006-09-22 11:09:28 +02:00
Let's say \term { ldap.example.org} is the name of our LDAP server. We have
users with their passwords in \term { "ou=Users,dc=example,dc=org"} directory.
Also we have addressbook, which contains users emails and their additional
infos in \term { "ou=AddressBook,dc=example,dc=org"} directory. Corresponding
authentication section should looks like this:
2006-09-14 04:54:21 +02:00
2006-09-22 11:09:28 +02:00
\begin { verbatim}
2015-02-17 13:40:37 +01:00
## authentication method
auth_ method: ldap
## DNS name of our LDAP server
ldap_ servers:
- "ldap.example.org"
## We want to authorize users from 'shadowAccount' object class only
ldap_ filter: "(objectClass=shadowAccount)"
2006-09-22 11:09:28 +02:00
\end { verbatim}
2006-09-14 04:54:21 +02:00
2006-09-22 11:09:28 +02:00
Now we want to use users LDAP-info as their vCards. We have four attributes
defined in our LDAP schema: \term { "mail"} --- email address, \term { "givenName"}
--- first name, \term { "sn"} --- second name, \term { "birthDay"} --- birthday.
Also we want users to search each other. Let's see how we can set it up:
2006-09-14 04:54:21 +02:00
2006-09-22 11:09:28 +02:00
\begin { verbatim}
2015-02-17 13:40:37 +01:00
modules:
mod_ vcard_ ldap:
## We use the same server and port, but want to bind anonymously because
## our LDAP server accepts anonymous requests to
## "ou=AddressBook,dc=example,dc=org" subtree.
ldap_ rootdn: ""
ldap_ password: ""
## define the addressbook's base
ldap_ base: "ou=AddressBook,dc=example,dc=org"
## uidattr: user's part of JID is located in the "mail" attribute
## uidattr_ format: common format for our emails
ldap_ uids: { "mail": "%u@mail.example.org"}
## Now we want to define vCard pattern
ldap_ vcard_ map:
"NICKNAME": { "%u": []} # just use user's part of JID as his nickname
"FIRST": { "%s": ["givenName"]}
"LAST": { "%s": ["sn"]}
"FN": { "%s, %s": ["sn", "givenName"]} # example: "Smith, John"
"EMAIL": { "%s": ["mail"]}
"BDAY": { "%s": ["birthDay"]}
## Search form
ldap_ search_ fields:
"User": "%u"
"Name": "givenName"
"Family Name": "sn"
"Email": "mail"
"Birthday": "birthDay"
## vCard fields to be reported
## Note that JID is always returned with search results
ldap_ search_ reported:
"Full Name": "FN"
"Nickname": "NICKNAME"
"Birthday": "BDAY"
2006-09-22 11:09:28 +02:00
\end { verbatim}
2006-09-14 04:54:21 +02:00
2006-09-22 11:09:28 +02:00
Note that \modvcardldap { } module checks an existence of the user before
searching his info in LDAP.
2006-09-14 04:54:21 +02:00
2006-09-22 11:09:28 +02:00
\item \term { ldap\_ vcard\_ map} example:
\begin { verbatim}
2015-02-17 13:40:37 +01:00
ldap_ vcard_ map:
"NICKNAME": { "%u": []} # just use user's part of JID as his nickname
"FN": { "%s": ["displayName"]}
"CTRY": { "Russia": []}
"EMAIL": { "%u@%d": []}
"DESC": { "%s\n%s": ["title", "description"]}
2006-09-22 11:09:28 +02:00
\end { verbatim}
\item \term { ldap\_ search\_ fields} example:
\begin { verbatim}
2015-02-17 13:40:37 +01:00
ldap_ search_ fields:
"User": "uid"
"Full Name": "displayName"
"Email": "mail"
2006-09-22 11:09:28 +02:00
\end { verbatim}
\item \term { ldap\_ search\_ reported} example:
\begin { verbatim}
2015-02-17 13:40:37 +01:00
ldap_ search_ reported:
"Full Name": "FN"
"Email": "EMAIL"
"Birthday": "BDAY"
"Nickname": "NICKNAME"
2006-09-22 11:09:28 +02:00
\end { verbatim}
\end { itemize}
2010-04-27 12:33:56 +02:00
\makesubsection { modvcardxupdate} { \modvcardxupdate { } }
\ind { modules!\modvcardxupdate { } } \ind { protocols!XEP-0153: vCard-Based Avatars}
The user's client can store an avatar in the user vCard.
The vCard-Based Avatars protocol (\xepref { 0153} )
provides a method for clients to inform the contacts what is the avatar hash value.
However, simple or small clients may not implement that protocol.
If this module is enabled, all the outgoing client presence stanzas get automatically
the avatar hash on behalf of the client.
So, the contacts receive the presence stanzas with the Update Data described
in \xepref { 0153} as if the client would had inserted it itself.
If the client had already included such element in the presence stanza,
it is replaced with the element generated by ejabberd.
By enabling this module, each vCard modification produces a hash recalculation,
and each presence sent by a client produces hash retrieval and a
presence stanza rewrite.
For this reason, enabling this module will introduce a computational overhead
in servers with clients that change frequently their presence.
2012-10-03 18:14:23 +02:00
Options:
\begin { description}
\dbtype
\end { description}
2008-06-12 23:54:30 +02:00
\makesubsection { modversion} { \modversion { } }
2007-01-11 09:17:18 +01:00
\ind { modules!\modversion { } } \ind { protocols!XEP-0092: Software Version}
2006-09-22 11:09:28 +02:00
2007-01-11 09:17:18 +01:00
This module implements Software Version (\xepref { 0092} ). Consequently, it
2006-09-22 11:09:28 +02:00
answers \ejabberd { } 's version when queried.
Options:
2006-09-14 04:54:21 +02:00
\begin { description}
2013-08-12 14:25:05 +02:00
\titem { show\_ os: true|false} \ind { options!showos} Should the operating system be revealed or not.
2007-07-31 06:13:58 +02:00
The default value is \term { true} .
2006-09-22 11:09:28 +02:00
\iqdiscitem { Software Version (\ns { jabber:iq:version} )}
2006-09-14 04:54:21 +02:00
\end { description}
2008-12-16 18:36:34 +01:00
\makechapter { manage} { Managing an \ejabberd { } Server}
2006-09-22 11:09:28 +02:00
2007-12-06 00:46:50 +01:00
2008-06-12 23:54:30 +02:00
\makesection { ejabberdctl} { \term { ejabberdctl} }
2007-12-06 00:46:50 +01:00
2009-04-17 15:53:20 +02:00
With the \term { ejabberdctl} command line administration script
you can execute \term { ejabberdctl commands} (described in the next section, \ref { ectl-commands} )
and also many general \term { ejabberd commands} (described in section \ref { eja-commands} ).
This means you can start, stop and perform many other administrative tasks
in a local or remote \ejabberd { } server (by providing the argument \term { --node NODENAME} ).
2007-12-06 00:46:50 +01:00
2009-04-17 15:53:20 +02:00
The \term { ejabberdctl} script can be configured in the file \term { ejabberdctl.cfg} .
This file includes detailed information about each configurable option. See section \ref { erlangconfiguration} .
The \term { ejabberdctl} script returns a numerical status code.
Success is represented by \term { 0} ,
error is represented by \term { 1} ,
and other codes may be used for specific results.
This can be used by other scripts to determine automatically
if a command succeeded or failed,
for example using: \term { echo \$ ?}
2014-03-26 16:43:40 +01:00
If you use Bash, you can get Bash completion by copying the file \term { tools/ejabberdctl.bc}
to the directory \term { /etc/bash\_ completion.d/} (in Debian, Ubuntu, Fedora and maybe others).
2009-04-17 15:53:20 +02:00
\makesubsection { ectl-commands} { ejabberdctl Commands}
2007-12-06 00:46:50 +01:00
When \term { ejabberdctl} is executed without any parameter,
2008-10-06 16:18:46 +02:00
it displays the available options. If there isn't an \ejabberd { } server running,
2007-12-06 00:46:50 +01:00
the available parameters are:
\begin { description}
2008-01-01 19:20:57 +01:00
\titem { start} Start \ejabberd { } in background mode. This is the default method.
\titem { debug} Attach an Erlang shell to an already existing \ejabberd { } server. This allows to execute commands interactively in the \ejabberd { } server.
\titem { live} Start \ejabberd { } in live mode: the shell keeps attached to the started server, showing log messages and allowing to execute interactive commands.
2007-12-06 00:46:50 +01:00
\end { description}
2008-01-01 19:20:57 +01:00
If there is an \ejabberd { } server running in the system,
2009-04-17 15:53:20 +02:00
\term { ejabberdctl} shows the \term { ejabberdctl commands} described bellow
and all the \term { ejabberd commands} available in that server (see \ref { list-eja-commands} ).
The \term { ejabberdctl commands} are:
2007-12-06 00:46:50 +01:00
\begin { description}
2008-10-12 15:32:36 +02:00
\titem { help} Get help about ejabberdctl or any available command. Try \term { ejabberdctl help help} .
2008-01-01 19:20:57 +01:00
\titem { status} Check the status of the \ejabberd { } server.
2009-04-17 15:53:20 +02:00
\titem { stop} Stop the \ejabberd { } server.
\titem { restart} Restart the \ejabberd { } server.
\titem { mnesia} Get information about the Mnesia database.
2007-12-06 00:46:50 +01:00
\end { description}
2009-04-17 15:53:20 +02:00
The \term { ejabberdctl} script can be restricted to require authentication
and execute some \term { ejabberd commands} ; see \ref { accesscommands} .
2008-06-05 14:04:43 +02:00
2009-04-17 15:53:20 +02:00
If account \term { robot1@example.org} is registered in \ejabberd { } with password \term { abcdef}
2013-08-12 14:25:05 +02:00
(which MD5 is E8B501798950FC58AAD83C8C14978E),
2015-01-15 20:00:35 +01:00
and your old-format configuration file contains this setting:
2009-04-17 15:53:20 +02:00
\begin { verbatim}
{ hosts, ["example.org"]} .
{ acl, bots, { user, "robot1", "example.org"} } .
{ access, ctlaccess, [{ allow, bots} ]} .
{ ejabberdctl_ access_ commands, [ { ctlaccess, [registered_ users, register], []} ]} .
\end { verbatim}
then you can do this in the shell:
\begin { verbatim}
$ ejabberdctl registered _ users example.org
Error: no_ auth_ provided
2012-08-27 16:57:56 +02:00
$ ejabberdctl - - auth robot 1 example.org abcdef registered _ users example.org
2009-04-17 15:53:20 +02:00
robot1
testuser1
testuser2
\end { verbatim}
2007-12-06 00:46:50 +01:00
2008-12-16 18:36:34 +01:00
\makesubsection { erlangconfiguration} { Erlang Runtime System}
2007-12-06 00:46:50 +01:00
2008-01-15 18:53:40 +01:00
\ejabberd { } is an Erlang/OTP application that runs inside an Erlang runtime system.
This system is configured using environment variables and command line parameters.
The \term { ejabberdctl} administration script uses many of those possibilities.
2008-10-06 16:18:46 +02:00
You can configure some of them with the file \term { ejabberdctl.cfg} ,
2008-01-15 18:53:40 +01:00
which includes detailed description about them.
2008-10-06 16:18:46 +02:00
This section describes for reference purposes
2008-01-15 18:53:40 +01:00
all the environment variables and command line parameters.
The environment variables:
\begin { description}
2008-10-06 16:18:46 +02:00
\titem { EJABBERD\_ CONFIG\_ PATH}
2008-01-15 18:53:40 +01:00
Path to the ejabberd configuration file.
2008-10-06 16:18:46 +02:00
\titem { EJABBERD\_ MSGS\_ PATH}
2008-01-15 18:53:40 +01:00
Path to the directory with translated strings.
2008-10-06 16:18:46 +02:00
\titem { EJABBERD\_ LOG\_ PATH}
2008-01-16 11:08:17 +01:00
Path to the ejabberd service log file.
2008-10-06 16:18:46 +02:00
\titem { EJABBERD\_ SO\_ PATH}
2008-01-15 18:53:40 +01:00
Path to the directory with binary system libraries.
2009-01-20 20:42:08 +01:00
\titem { EJABBERD\_ DOC\_ PATH}
Path to the directory with ejabberd documentation.
2009-08-24 23:21:04 +02:00
\titem { EJABBERD\_ PID\_ PATH}
Path to the PID file that ejabberd can create when started.
2008-10-06 16:18:46 +02:00
\titem { HOME}
2008-01-15 18:53:40 +01:00
Path to the directory that is considered \ejabberd { } 's home.
This path is used to read the file \term { .erlang.cookie} .
2008-10-06 16:18:46 +02:00
\titem { ERL\_ CRASH\_ DUMP}
2008-01-15 18:53:40 +01:00
Path to the file where crash reports will be dumped.
2011-05-31 12:26:44 +02:00
\titem { ERL\_ EPMD\_ ADDRESS}
IP address where epmd listens for connections (see section \ref { epmd} ).
2008-10-06 16:18:46 +02:00
\titem { ERL\_ INETRC}
2008-04-01 14:00:34 +02:00
Indicates which IP name resolution to use.
If using \term { -sname} , specify either this option or \term { -kernel inetrc filepath} .
2008-10-06 16:18:46 +02:00
\titem { ERL\_ MAX\_ PORTS}
2008-01-15 18:53:40 +01:00
Maximum number of simultaneously open Erlang ports.
2008-10-06 16:18:46 +02:00
\titem { ERL\_ MAX\_ ETS\_ TABLES}
2008-01-15 18:53:40 +01:00
Maximum number of ETS and Mnesia tables.
\end { description}
The command line parameters:
2007-12-06 00:46:50 +01:00
\begin { description}
2008-10-06 16:18:46 +02:00
\titem { -sname ejabberd}
2007-12-06 00:46:50 +01:00
The Erlang node will be identified using only the first part
of the host name, i.\, e. other Erlang nodes outside this domain cannot contact
this node. This is the preferable option in most cases.
2008-10-06 16:18:46 +02:00
\titem { -name ejabberd}
2007-12-06 00:46:50 +01:00
The Erlang node will be fully identified.
2008-01-01 19:20:57 +01:00
This is only useful if you plan to setup an \ejabberd { } cluster with nodes in different networks.
2010-02-25 00:04:48 +01:00
\titem { -kernel inetrc '"/etc/ejabberd/inetrc"'}
2008-10-06 16:18:46 +02:00
Indicates which IP name resolution to use.
2008-04-01 14:00:34 +02:00
If using \term { -sname} , specify either this option or \term { ERL\_ INETRC} .
2008-10-06 16:18:46 +02:00
\titem { -kernel inet\_ dist\_ listen\_ min 4200 inet\_ dist\_ listen\_ min 4210}
2008-04-01 14:00:34 +02:00
Define the first and last ports that \term { epmd} (section \ref { epmd} ) can listen to.
2011-02-16 23:53:29 +01:00
\titem { -kernel inet\_ dist\_ use\_ interface "\{ 127,0,0,1 \} "}
Define the IP address where this Erlang node listens for other nodes
connections (see section \ref { epmd} ).
2008-10-06 16:18:46 +02:00
\titem { -detached}
Starts the Erlang system detached from the system console.
2011-05-31 12:27:45 +02:00
Useful for running daemons and background processes.
2008-10-06 16:18:46 +02:00
\titem { -noinput}
2007-12-06 00:46:50 +01:00
Ensures that the Erlang system never tries to read any input.
2011-05-31 12:27:45 +02:00
Useful for running daemons and background processes.
2008-10-06 16:18:46 +02:00
\titem { -pa /var/lib/ejabberd/ebin}
2007-12-06 00:46:50 +01:00
Specify the directory where Erlang binary files (*.beam) are located.
2008-10-06 16:18:46 +02:00
\titem { -s ejabberd}
2008-01-01 19:20:57 +01:00
Tell Erlang runtime system to start the \ejabberd { } application.
2010-02-25 00:04:48 +01:00
\titem { -mnesia dir '"/var/lib/ejabberd/"'}
2007-12-06 00:46:50 +01:00
Specify the Mnesia database directory.
2009-08-31 10:41:56 +02:00
\titem { -sasl sasl\_ error\_ logger \{ file, "/var/log/ejabberd/erlang.log"\} }
2008-01-16 11:08:17 +01:00
Path to the Erlang/OTP system log file.
2009-08-31 10:41:56 +02:00
SASL here means ``System Architecture Support Libraries''
not ``Simple Authentication and Security Layer''.
2008-10-06 16:18:46 +02:00
\titem { +K [true|false]}
2008-01-15 18:53:40 +01:00
Kernel polling.
2008-10-06 16:18:46 +02:00
\titem { -smp [auto|enable|disable]}
2008-01-15 18:53:40 +01:00
SMP support.
2008-10-06 16:18:46 +02:00
\titem { +P 250000}
2008-01-15 18:53:40 +01:00
Maximum number of Erlang processes.
2008-10-06 16:18:46 +02:00
\titem { -remsh ejabberd@localhost}
2008-01-15 18:53:40 +01:00
Open an Erlang shell in a remote Erlang node.
2009-07-06 16:08:57 +02:00
\titem { -hidden}
The connections to other nodes are hidden (not published).
The result is that this node is not considered part of the cluster.
This is important when starting a temporary \term { ctl} or \term { debug} node.
2007-12-06 00:46:50 +01:00
\end { description}
Note that some characters need to be escaped when used in shell scripts, for instance \verb |"| and \verb |{ } |.
You can find other options in the Erlang manual page (\shell { erl -man erl} ).
2009-04-17 15:53:20 +02:00
\makesection { eja-commands} { \ejabberd { } Commands}
An \term { ejabberd command} is an abstract function identified by a name,
with a defined number and type of calling arguments and type of result
that is registered in the \term { ejabberd\_ commands} service.
Those commands can be defined in any Erlang module and executed using any valid frontend.
2014-01-02 16:31:28 +01:00
\ejabberd { } includes two frontends to execute \term { ejabberd commands} : the script \term { ejabberdctl} (\ref { ejabberdctl} )
and the \term { ejabberd\_ xmlrpc} listener (\ref { listened-module} ).
2009-04-17 15:53:20 +02:00
Other known frontends that can be installed to execute ejabberd commands in different ways are:
\term { mod\_ rest} (HTTP POST service),
\term { mod\_ shcommands} (ejabberd WebAdmin page).
\makesubsection { list-eja-commands} { List of ejabberd Commands}
2015-01-28 17:54:05 +01:00
\ejabberd { } includes a few ejabberd Commands by default as listed below.
2009-04-17 15:53:20 +02:00
When more modules are installed, new commands may be available in the frontends.
The easiest way to get a list of the available commands, and get help for them is to use
the ejabberdctl script:
\begin { verbatim}
$ ejabberdctl help
Usage: ejabberdctl [--node nodename] [--auth user host password] command [options]
Available commands in this ejabberd node:
backup file Store the database to backup file
connected_ users List all established sessions
connected_ users_ number Get the number of established sessions
...
\end { verbatim}
2015-01-28 17:54:05 +01:00
The commands included in ejabberd by default are:
2009-04-17 15:53:20 +02:00
\begin { description}
2015-01-28 17:54:05 +01:00
\titem { stop\_ kindly delay announcement} Inform users and rooms, wait, and stop the server.
Provide the delay in seconds, and the announcement quoted.
\titem { registered\_ vhosts} List all registered vhosts in SERVER
2009-08-07 12:22:06 +02:00
\titem { reopen\_ log} Reopen the log files after they were renamed.
2009-04-17 15:53:20 +02:00
If the old files were not renamed before calling this command,
they are automatically renamed to \term { "*-old.log"} . See section \ref { logfiles} .
2013-10-09 16:05:45 +02:00
\titem { convert\_ to\_ yaml /etc/ejabberd/ejabberd.cfg /etc/ejabberd/ejabberd-converted.yml}
Convert an old ejabberd.cfg file to the YAML syntax in a new file.
2009-04-17 15:53:20 +02:00
\titem { backup ejabberd.backup}
Store internal Mnesia database to a binary backup file.
\titem { restore ejabberd.backup}
Restore immediately from a binary backup file the internal Mnesia database.
2009-12-28 13:43:44 +01:00
This will consume a lot of memory if you have a large database,
so better use \term { install\_ fallback} .
2009-08-07 12:22:06 +02:00
\titem { install\_ fallback ejabberd.backup}
2009-04-17 15:53:20 +02:00
The binary backup file is installed as fallback:
it will be used to restore the database at the next ejabberd start.
2009-12-28 13:43:44 +01:00
This means that, after running this command, you have to restart ejabberd.
This command requires less memory than \term { restore} .
2009-04-17 15:53:20 +02:00
\titem { dump ejabberd.dump}
Dump internal Mnesia database to a text file dump.
\titem { load ejabberd.dump}
Restore immediately from a text file dump.
This is not recommended for big databases, as it will consume much time,
2009-08-07 12:22:06 +02:00
memory and processor. In that case it's preferable to use \term { backup} and \term { install\_ fallback} .
\titem { import\_ piefxis, export\_ piefxis, export\_ piefxis\_ host} \ind { migrate between servers}
2009-08-07 11:52:45 +02:00
These options can be used to migrate accounts
using \xepref { 0227} formatted XML files
2009-09-23 17:28:53 +02:00
from/to other Jabber/XMPP servers
2009-08-07 11:52:45 +02:00
or move users of a vhost to another ejabberd installation.
2010-01-16 15:34:35 +01:00
See also \footahref { https://support.process-one.net/doc/display/MESSENGER/ejabberd+migration+kit} { ejabberd migration kit} .
2009-08-07 12:22:06 +02:00
\titem { import\_ file, import\_ dir} \ind { migration from other software}
2009-08-07 11:52:45 +02:00
These options can be used to migrate accounts
using jabberd1.4 formatted XML files.
2009-09-23 17:28:53 +02:00
from other Jabber/XMPP servers
2009-08-07 11:52:45 +02:00
There exist tutorials to
\footahref { http://www.ejabberd.im/migrate-to-ejabberd} { migrate from other software to ejabberd} .
2015-01-28 17:54:05 +01:00
\titem { set\_ master nodename}
Set master node of the clustered Mnesia tables.
If you provide as nodename "self", this node will be set as its own master.
\titem { mnesia\_ change\_ nodename oldnodename newnodename oldbackup newbackup}
Change the erlang node name in a backup file
2012-11-26 13:22:29 +01:00
\titem { export2odbc virtualhost directory} \ind { export mnesia data to SQL files}
Export virtual host information from Mnesia tables to SQL files.
2015-01-28 17:54:05 +01:00
\titem { update\_ list} List modified modules that can be updated
\titem { update module} Update the given module, or use the keyword: all
\titem { reload\_ config} Reload ejabberd configuration file into memory
2009-08-07 12:22:06 +02:00
\titem { delete\_ expired\_ messages} This option can be used to delete old messages
2009-04-17 15:53:20 +02:00
in offline storage. This might be useful when the number of offline messages
is very high.
2009-09-21 12:03:37 +02:00
\titem { delete\_ old\_ messages days} Delete offline messages older than the given days.
2015-01-28 17:54:05 +01:00
\titem { incoming\_ s2s\_ number} Number of incoming s2s connections on the node
\titem { outgoing\_ s2s\_ number} Number of outgoing s2s connections on the node
2009-09-21 12:03:37 +02:00
\titem { register user host password} Register an account in that domain with the given password.
\titem { unregister user host} Unregister the given account.
2015-01-28 17:54:05 +01:00
\titem { registered\_ users host} List all registered users in HOST
\titem { connected\_ users} List all established sessions
\titem { connected\_ users\_ number} Get the number of established sessions
\titem { user\_ resources user host} List user's connected resources
\titem { kick\_ user user host} Disconnect user's active sessions
2009-04-17 15:53:20 +02:00
\end { description}
\makesubsection { accesscommands} { Restrict Execution with AccessCommands}
2015-01-15 20:00:35 +01:00
The frontends can be configured to restrict access to certain commands
using the \term { AccessCommands} .
2009-04-17 15:53:20 +02:00
In that case, authentication information must be provided.
2015-01-15 20:00:35 +01:00
This option allows quite complex settings, so it does not use the YAML format,
instead it uses the Erlang format.
If you want to set that option,
then you must move the frontend definition to another config file
and include it using the \term { include\_ config\_ file} option
(see section~\ref { includeconfigfile} and the example below).
2009-04-17 15:53:20 +02:00
In each frontend the \term { AccessCommands} option is defined
in a different place. But in all cases the option syntax is the same:
\begin { verbatim}
2009-08-12 16:15:59 +02:00
AccessCommands = [ { Access, CommandNames, Arguments} , ...]
2009-04-17 15:53:20 +02:00
Access = atom()
CommandNames = all | [CommandName]
CommandName = atom()
2009-08-12 16:15:59 +02:00
Arguments = [ { ArgumentName, ArgumentValue} , ...]
2009-04-17 15:53:20 +02:00
ArgumentName = atom()
ArgumentValue = any()
\end { verbatim}
The default value is to not define any restriction: \term { []} .
2010-01-09 01:39:33 +01:00
The authentication information is provided when executing a command,
and is Username, Hostname and Password of a local XMPP account
2009-04-17 15:53:20 +02:00
that has permission to execute the corresponding command.
This means that the account must be registered in the local ejabberd,
because the information will be verified.
When one or several access restrictions are defined and the
authentication information is provided,
each restriction is verified until one matches completely:
the account matches the Access rule,
the command name is listed in CommandNames,
and the provided arguments do not contradict Arguments.
As an example to understand the syntax, let's suppose those options:
\begin { verbatim}
{ hosts, ["example.org"]} .
{ acl, bots, { user, "robot1", "example.org"} } .
{ access, commaccess, [{ allow, bots} ]} .
\end { verbatim}
This list of access restrictions allows only \term { robot1@example.org} to execute all commands:
\begin { verbatim}
[{ commaccess, all, []} ]
\end { verbatim}
See another list of restrictions (the corresponding ACL and ACCESS are not shown):
\begin { verbatim}
[
%% This bot can execute all commands:
{ bot, all, []} ,
%% This bot can only execute the command 'dump'. No argument restriction:
{ bot_ backups, [dump], []}
%% This bot can execute all commands,
%% but if a 'host' argument is provided, it must be "example.org":
{ bot_ all_ example, all, [{ host, "example.org"} ]} ,
%% This bot can only execute the command 'register',
%% and if argument 'host' is provided, it must be "example.org":
{ bot_ reg_ example, [register], [{ host, "example.org"} ]} ,
%% This bot can execute the commands 'register' and 'unregister',
%% if argument host is provided, it must be "test.org":
{ _ bot_ reg_ test, [register, unregister], [{ host, "test.org"} ]}
]
\end { verbatim}
2007-12-06 00:46:50 +01:00
2015-01-15 20:00:35 +01:00
In summary, you put the frontends configurations in a CFG file using Erlang format, for example a file called \term { additional.cfg} :
\begin { verbatim}
{ ejabberdctl_ access_ commands, [ { ctlaccess, [registered_ users, register], []} ]} .
{ listen, [
{ 4560, ejabberd_ xmlrpc, [{ maxsessions, 10} , { timeout, 5000} ,
{ access_ commands, [
{ ctlaccess, [registered_ users], [{ host, "localhost"} ]}
]}
]}
]} .
{ modules, [
{ mod_ rest, [
{ allowed_ ips, [ { 127,0,0,1} , { 192,168,1,12} ]} ,
{ allowed_ destinations, [ "nolan@localhost", "admin@example.com" ]} ,
{ allowed_ stanza_ types, [ "message", "presence", "iq" ]} ,
{ access_ commands, [
{ ctlaccess, [registered_ users], [{ host, "localhost"} ]}
]}
]}
]} .
\end { verbatim}
and then add this line at the end of your main ejabberd configuration file, usually called \term { ejabberd.yml} :
\begin { verbatim}
include_ config_ file: "/etc/ejabberd/additional.cfg"
\end { verbatim}
2008-06-12 23:54:30 +02:00
\makesection { webadmin} { Web Admin}
2008-01-01 19:20:57 +01:00
\ind { web admin}
2006-09-22 11:09:28 +02:00
2008-01-01 19:20:57 +01:00
The \ejabberd { } Web Admin allows to administer most of \ejabberd { } using a web browser.
This feature is enabled by default:
a \term { ejabberd\_ http} listener with the option \term { web\_ admin} (see
2008-10-06 16:18:46 +02:00
section~\ref { listened} ) is included in the listening ports. Then you can open
2006-09-22 11:09:28 +02:00
\verb |http://server:port/admin/| in your favourite web browser. You
will be asked to enter the username (the \emph { full} \Jabber { } ID) and password
of an \ejabberd { } user with administrator rights. After authentication
you will see a page similar to figure~\ref { fig:webadmmain} .
\begin { figure} [htbp]
\centering
\insimg { webadmmain.png}
2008-01-01 19:20:57 +01:00
\caption { Top page from the Web Admin}
2006-09-22 11:09:28 +02:00
\label { fig:webadmmain}
\end { figure}
Here you can edit access restrictions, manage users, create backups,
manage the database, enable/disable ports listened for, view server
statistics,\ldots
2010-04-27 23:16:48 +02:00
The access rule \term { configure} determines what accounts can access the Web Admin and modify it.
The access rule \term { webadmin\_ view} is to grant only view access: those accounts can browse the Web Admin with read-only access.
Example configurations:
2006-09-22 11:09:28 +02:00
\begin { itemize}
2008-01-01 19:20:57 +01:00
\item You can serve the Web Admin on the same port as the
2007-01-11 09:17:18 +01:00
\ind { protocols!XEP-0025: HTTP Polling} HTTP Polling interface. In this example
2006-09-22 11:09:28 +02:00
you should point your web browser to \verb |http://example.org:5280/admin/| to
administer all virtual hosts or to
\verb |http://example.org:5280/admin/server/example.com/| to administer only
2008-01-01 19:20:57 +01:00
the virtual host \jid { example.com} . Before you get access to the Web Admin
2006-09-22 11:09:28 +02:00
you need to enter as username, the JID and password from a registered user
that is allowed to configure \ejabberd { } . In this example you can enter as
username `\jid { admin@example.net} ' to administer all virtual hosts (first
URL). If you log in with `\jid { admin@example.com} ' on \\
\verb |http://example.org:5280/admin/server/example.com/| you can only
administer the virtual host \jid { example.com} .
2010-04-27 23:16:48 +02:00
The account `\jid { reviewer@example.com} ' can browse that vhost in read-only mode.
2008-06-13 01:01:09 +02:00
\begin { verbatim}
2013-08-12 14:25:05 +02:00
acl:
admin:
user:
- "admin": "example.net"
host_ config:
"example.com":
acl:
admin:
user:
- "admin": "example.com"
viewers:
user:
- "reviewer": "example.com"
access:
configure:
admin: allow
webadmin_ view:
viewers: allow
hosts:
- "example.org"
listen:
2006-09-22 11:09:28 +02:00
...
2013-08-12 14:25:05 +02:00
-
port: 5280
module: ejabberd_ http
web_ admin: true
http_ poll: true
2006-09-22 11:09:28 +02:00
...
\end { verbatim}
2008-01-01 19:20:57 +01:00
\item For security reasons, you can serve the Web Admin on a secured
2006-09-22 11:09:28 +02:00
connection, on a port differing from the HTTP Polling interface, and bind it
2008-01-01 19:20:57 +01:00
to the internal LAN IP. The Web Admin will be accessible by pointing your
2009-01-12 21:03:02 +01:00
web browser to \verb |https://192.168.1.1:5282/admin/|:
2008-06-13 01:01:09 +02:00
\begin { verbatim}
2013-08-12 14:25:05 +02:00
hosts:
- "example.org"
listen:
2006-09-22 11:09:28 +02:00
...
2013-08-12 14:25:05 +02:00
-
port: 5280
module: ejabberd_ http
http_ poll: true
-
ip: "192.168.1.1"
port: 5282
module: ejabberd_ http
certfile: "/usr/local/etc/server.pem"
tls: true
web_ admin: true
2006-09-22 11:09:28 +02:00
...
\end { verbatim}
\end { itemize}
2009-01-07 01:55:02 +01:00
Certain pages in the ejabberd Web Admin contain a link to a related
section in the ejabberd Installation and Operation Guide.
In order to view such links, a copy in HTML format of the Guide must
be installed in the system.
The file is searched by default in
\term { "/share/doc/ejabberd/guide.html"} .
The directory of the documentation can be specified in
2009-01-20 20:42:08 +01:00
the environment variable \term { EJABBERD\_ DOC\_ PATH} .
See section \ref { erlangconfiguration} .
2007-11-26 08:59:35 +01:00
2008-06-12 23:54:30 +02:00
\makesection { adhoccommands} { Ad-hoc Commands}
2007-11-26 08:59:35 +01:00
2007-12-06 00:46:50 +01:00
If you enable \modconfigure \ and \modadhoc ,
2008-01-01 19:20:57 +01:00
you can perform several administrative tasks in \ejabberd { }
2012-02-22 15:40:31 +01:00
with an XMPP client.
2007-12-06 00:46:50 +01:00
The client must support Ad-Hoc Commands (\xepref { 0050} ),
2009-09-23 17:28:53 +02:00
and you must login in the XMPP server with
2007-12-06 00:46:50 +01:00
an account with proper privileges.
2007-11-26 08:59:35 +01:00
2008-06-12 23:54:30 +02:00
\makesection { changeerlangnodename} { Change Computer Hostname}
2007-12-06 16:26:53 +01:00
2008-10-06 16:18:46 +02:00
\ejabberd { } uses the distributed Mnesia database.
2007-12-06 16:26:53 +01:00
Being distributed, Mnesia enforces consistency of its file,
2008-07-07 16:52:47 +02:00
so it stores the name of the Erlang node in it (see section \ref { nodename} ).
2007-12-06 16:26:53 +01:00
The name of an Erlang node includes the hostname of the computer.
So, the name of the Erlang node changes
2008-01-01 19:20:57 +01:00
if you change the name of the machine in which \ejabberd { } runs,
or when you move \ejabberd { } to a different machine.
2007-12-06 16:26:53 +01:00
2009-05-16 00:39:30 +02:00
You have two ways to use the old Mnesia database in an ejabberd with new node name:
put the old node name in \term { ejabberdctl.cfg} ,
or convert the database to the new node name.
Those example steps will backup, convert and load the Mnesia database.
You need to have either the old Mnesia spool dir or a backup of Mnesia.
If you already have a backup file of the old database, you can go directly to step 5.
You also need to know the old node name and the new node name.
If you don't know them, look for them by executing \term { ejabberdctl}
or in the ejabberd log files.
Before starting, setup some variables:
\begin { verbatim}
OLDNODE=ejabberd@oldmachine
NEWNODE=ejabberd@newmachine
OLDFILE=/tmp/old.backup
NEWFILE=/tmp/new.backup
\end { verbatim}
2007-12-06 16:26:53 +01:00
\begin { enumerate}
2009-05-16 00:39:30 +02:00
\item Start ejabberd enforcing the old node name:
\begin { verbatim}
ejabberdctl --node $ OLDNODE start
\end { verbatim}
\item Generate a backup file:
\begin { verbatim}
ejabberdctl --node $ OLDNODE backup $ OLDFILE
\end { verbatim}
\item Stop the old node:
2007-12-06 16:26:53 +01:00
\begin { verbatim}
2009-05-16 00:39:30 +02:00
ejabberdctl --node $ OLDNODE stop
2007-12-06 16:26:53 +01:00
\end { verbatim}
2009-05-16 00:39:30 +02:00
\item Make sure there aren't files in the Mnesia spool dir. For example:
2007-12-06 16:26:53 +01:00
\begin { verbatim}
2009-05-16 00:39:30 +02:00
mkdir /var/lib/ejabberd/oldfiles
mv /var/lib/ejabberd/*.* /var/lib/ejabberd/oldfiles/
2007-12-06 16:26:53 +01:00
\end { verbatim}
2009-05-16 00:39:30 +02:00
\item Start ejabberd. There isn't any need to specify the node name anymore:
\begin { verbatim}
ejabberdctl start
\end { verbatim}
\item Convert the backup to new node name:
\begin { verbatim}
ejabberdctl mnesia_ change_ nodename $ OLDNODE $ NEWNODE $ OLDFILE $ NEWFILE
\end { verbatim}
2009-12-28 13:43:44 +01:00
\item Install the backup file as a fallback:
2009-05-16 00:39:30 +02:00
\begin { verbatim}
2009-12-28 13:43:44 +01:00
ejabberdctl install_ fallback $ NEWFILE
\end { verbatim}
\item Stop ejabberd:
\begin { verbatim}
ejabberdctl stop
\end { verbatim}
You may see an error message in the log files, it's normal, so don't worry:
\begin { verbatim}
Mnesia(ejabberd@newmachine):
** ERROR ** (ignoring core)
** FATAL ** A fallback is installed and Mnesia must be restarted.
Forcing shutdown after mnesia_ down from ejabberd@newmachine...
\end { verbatim}
\item Now you can finally start ejabberd:
\begin { verbatim}
ejabberdctl start
2009-05-16 00:39:30 +02:00
\end { verbatim}
\item Check that the information of the old database is available: accounts, rosters...
After you finish, remember to delete the temporary backup files from public directories.
2007-12-06 16:26:53 +01:00
\end { enumerate}
2008-06-12 23:54:30 +02:00
\makechapter { secure} { Securing \ejabberd { } }
\makesection { firewall} { Firewall Settings}
2006-09-22 11:09:28 +02:00
\ind { firewall} \ind { ports} \ind { SASL} \ind { TLS} \ind { clustering!ports}
You need to take the following TCP ports in mind when configuring your firewall:
\begin { table} [H]
\centering
\begin { tabular} { |l|l|}
2008-06-13 01:52:13 +02:00
\hline { \bf Port} & { \bf Description} \\
2007-12-05 19:53:09 +01:00
\hline \hline 5222& Standard port for Jabber/XMPP client connections, plain or STARTTLS.\\
\hline 5223& Standard port for Jabber client connections using the old SSL method.\\
\hline 5269& Standard port for Jabber/XMPP server connections.\\
2008-04-01 14:00:34 +02:00
\hline 4369& EPMD (section \ref { epmd} ) listens for Erlang node name requests.\\
\hline port range& Used for connections between Erlang nodes. This range is configurable (see section \ref { epmd} ).\\
2006-09-22 11:09:28 +02:00
\hline
\end { tabular}
\end { table}
2008-06-12 23:54:30 +02:00
\makesection { epmd} { epmd}
2007-12-05 19:53:09 +01:00
\footahref { http://www.erlang.org/doc/man/epmd.html} { epmd (Erlang Port Mapper Daemon)}
2008-10-06 16:18:46 +02:00
is a small name server included in Erlang/OTP
and used by Erlang programs when establishing distributed Erlang communications.
\ejabberd { } needs \term { epmd} to use \term { ejabberdctl} and also when clustering \ejabberd { } nodes.
2007-12-05 19:53:09 +01:00
This small program is automatically started by Erlang, and is never stopped.
2008-10-06 16:18:46 +02:00
If \ejabberd { } is stopped, and there aren't any other Erlang programs
2007-12-05 19:53:09 +01:00
running in the system, you can safely stop \term { epmd} if you want.
2008-10-06 16:18:46 +02:00
\ejabberd { } runs inside an Erlang node.
To communicate with \ejabberd { } , the script \term { ejabberdctl} starts a new Erlang node
2008-01-01 19:20:57 +01:00
and connects to the Erlang node that holds \ejabberd { } .
2007-12-05 19:53:09 +01:00
In order for this communication to work,
\term { epmd} must be running and listening for name requests in the port 4369.
2008-04-01 14:00:34 +02:00
You should block the port 4369 in the firewall in such a way that
only the programs in your machine can access it.
2013-04-11 17:12:53 +02:00
or configure the option \term { ERL\_ EPMD\_ ADDRESS} in the file \term { ejabberdctl.cfg} .
2007-12-05 19:53:09 +01:00
2008-01-01 19:20:57 +01:00
If you build a cluster of several \ejabberd { } instances,
each \ejabberd { } instance is called an \ejabberd { } node.
Those \ejabberd { } nodes use a special Erlang communication method to
2007-12-05 19:53:09 +01:00
build the cluster, and EPMD is again needed listening in the port 4369.
2008-01-01 19:20:57 +01:00
So, if you plan to build a cluster of \ejabberd { } nodes
2007-12-05 19:53:09 +01:00
you must open the port 4369 for the machines involved in the cluster.
Remember to block the port so Internet doesn't have access to it.
Once an Erlang node solved the node name of another Erlang node using EPMD and port 4369,
the nodes communicate directly.
2008-10-06 16:18:46 +02:00
The ports used in this case by default are random,
2008-04-01 14:00:34 +02:00
but can be configured in the file \term { ejabberdctl.cfg} .
The Erlang command-line parameter used internally is, for example:
2007-12-05 19:53:09 +01:00
\begin { verbatim}
erl ... -kernel inet_ dist_ listen_ min 4370 inet_ dist_ listen_ max 4375
\end { verbatim}
2011-02-16 23:53:29 +01:00
It is also possible to configure in \term { ejabberdctl.cfg}
the network interface where the Erlang node will listen and accept connections.
The Erlang command-line parameter used internally is, for example:
\begin { verbatim}
erl ... -kernel inet_ dist_ use_ interface "{ 127,0,0,1} "
\end { verbatim}
2007-12-05 19:53:09 +01:00
2008-06-12 23:54:30 +02:00
\makesection { cookie} { Erlang Cookie}
2007-12-05 19:53:09 +01:00
2008-10-06 16:18:46 +02:00
The Erlang cookie is a string with numbers and letters.
2008-07-07 16:52:47 +02:00
An Erlang node reads the cookie at startup from the command-line parameter \term { -setcookie} .
If not indicated, the cookie is read from the cookie file \term { \$ HOME/.erlang.cookie} .
If this file does not exist, it is created immediately with a random cookie.
2007-12-05 19:53:09 +01:00
Two Erlang nodes communicate only if they have the same cookie.
2008-10-06 16:18:46 +02:00
Setting a cookie on the Erlang node allows you to structure your Erlang network
2007-12-05 19:53:09 +01:00
and define which nodes are allowed to connect to which.
Thanks to Erlang cookies, you can prevent access to the Erlang node by mistake,
for example when there are several Erlang nodes running different programs in the same machine.
Setting a secret cookie is a simple method
to difficult unauthorized access to your Erlang node.
2008-10-06 16:18:46 +02:00
However, the cookie system is not ultimately effective
2007-12-05 19:53:09 +01:00
to prevent unauthorized access or intrusion to an Erlang node.
The communication between Erlang nodes are not encrypted,
so the cookie could be read sniffing the traffic on the network.
The recommended way to secure the Erlang node is to block the port 4369.
2008-12-16 18:36:34 +01:00
\makesection { nodename} { Erlang Node Name}
2007-12-05 19:53:09 +01:00
An Erlang node may have a node name.
2008-10-06 16:18:46 +02:00
The name can be short (if indicated with the command-line parameter \term { -sname} )
or long (if indicated with the parameter \term { -name} ).
2007-12-05 19:53:09 +01:00
Starting an Erlang node with -sname limits the communication between Erlang nodes to the LAN.
2008-10-06 16:18:46 +02:00
Using the option \term { -sname} instead of \term { -name} is a simple method
2007-12-05 19:53:09 +01:00
to difficult unauthorized access to your Erlang node.
However, it is not ultimately effective to prevent access to the Erlang node,
2008-10-06 16:18:46 +02:00
because it may be possible to fake the fact that you are on another network
2007-12-05 19:53:09 +01:00
using a modified version of Erlang \term { epmd} .
The recommended way to secure the Erlang node is to block the port 4369.
2009-10-19 12:48:55 +02:00
\makesection { secure-files} { Securing Sensitive Files}
2008-07-07 16:52:47 +02:00
2009-10-19 12:48:55 +02:00
\ejabberd { } stores sensitive data in the file system either in plain text or binary files.
2008-07-07 16:52:47 +02:00
The file system permissions should be set to only allow the proper user to read,
write and execute those files and directories.
\begin { description}
2013-08-12 14:25:05 +02:00
\titem { ejabberd configuration file: /etc/ejabberd/ejabberd.yml}
2008-07-07 16:52:47 +02:00
Contains the JID of administrators
and passwords of external components.
The backup files probably contain also this information,
so it is preferable to secure the whole \term { /etc/ejabberd/} directory.
\titem { ejabberd service log: /var/log/ejabberd/ejabberd.log}
Contains IP addresses of clients.
If the loglevel is set to 5, it contains whole conversations and passwords.
If a logrotate system is used, there may be several log files with similar information,
so it is preferable to secure the whole \term { /var/log/ejabberd/} directory.
2008-07-13 21:10:01 +02:00
\titem { Mnesia database spool files in /var/lib/ejabberd/}
2008-07-07 16:52:47 +02:00
The files store binary data, but some parts are still readable.
The files are generated by Mnesia and their permissions cannot be set directly,
2008-07-13 21:10:01 +02:00
so it is preferable to secure the whole \term { /var/lib/ejabberd/} directory.
2008-07-07 16:52:47 +02:00
\titem { Erlang cookie file: /var/lib/ejabberd/.erlang.cookie}
See section \ref { cookie} .
\end { description}
2008-06-12 23:54:30 +02:00
\makechapter { clustering} { Clustering}
2006-09-22 11:09:28 +02:00
\ind { clustering}
2008-06-12 23:54:30 +02:00
\makesection { howitworks} { How it Works}
2006-09-22 11:09:28 +02:00
\ind { clustering!how it works}
2009-09-23 17:28:53 +02:00
A \XMPP { } domain is served by one or more \ejabberd { } nodes. These nodes can
2006-09-22 11:09:28 +02:00
be run on different machines that are connected via a network. They all
must have the ability to connect to port 4369 of all another nodes, and must
have the same magic cookie (see Erlang/OTP documentation, in other words the
file \term { \~ { } ejabberd/.erlang.cookie} must be the same on all nodes). This is
needed because all nodes exchange information about connected users, s2s
connections, registered services, etc\ldots
Each \ejabberd { } node has the following modules:
\begin { itemize}
\item router,
\item local router,
\item session manager,
\item s2s manager.
\end { itemize}
2008-06-12 23:54:30 +02:00
\makesubsection { router} { Router}
2006-09-22 11:09:28 +02:00
\ind { clustering!router}
2009-09-23 17:28:53 +02:00
This module is the main router of \XMPP { } packets on each node. It
2006-09-22 11:09:28 +02:00
routes them based on their destination's domains. It uses a global
routing table. The domain of the packet's destination is searched in the
routing table, and if it is found, the packet is routed to the
appropriate process. If not, it is sent to the s2s manager.
2008-06-12 23:54:30 +02:00
\makesubsection { localrouter} { Local Router}
2006-09-22 11:09:28 +02:00
\ind { clustering!local router}
This module routes packets which have a destination domain equal to
one of this server's host names. If the destination JID has a non-empty user
part, it is routed to the session manager, otherwise it is processed depending
on its content.
2006-09-14 04:54:21 +02:00
2008-06-12 23:54:30 +02:00
\makesubsection { sessionmanager} { Session Manager}
2006-09-22 11:09:28 +02:00
\ind { clustering!session manager}
2006-09-14 04:54:21 +02:00
2006-09-22 11:09:28 +02:00
This module routes packets to local users. It looks up to which user
resource a packet must be sent via a presence table. Then the packet is
either routed to the appropriate c2s process, or stored in offline
storage, or bounced back.
2006-09-14 04:54:21 +02:00
2008-06-12 23:54:30 +02:00
\makesubsection { s2smanager} { s2s Manager}
2006-09-22 11:09:28 +02:00
\ind { clustering!s2s manager}
2006-09-14 04:54:21 +02:00
2009-09-23 17:28:53 +02:00
This module routes packets to other \XMPP { } servers. First, it
2006-09-22 11:09:28 +02:00
checks if an opened s2s connection from the domain of the packet's
source to the domain of the packet's destination exists. If that is the case,
the s2s manager routes the packet to the process
serving this connection, otherwise a new connection is opened.
2006-09-14 04:54:21 +02:00
2008-06-12 23:54:30 +02:00
\makesection { cluster} { Clustering Setup}
2006-09-22 11:09:28 +02:00
\ind { clustering!setup}
2006-09-14 04:54:21 +02:00
2006-09-22 11:09:28 +02:00
Suppose you already configured \ejabberd { } on one machine named (\term { first} ),
and you need to setup another one to make an \ejabberd { } cluster. Then do
following steps:
2006-09-14 04:54:21 +02:00
2006-09-22 11:09:28 +02:00
\begin { enumerate}
\item Copy \verb |~ejabberd/.erlang.cookie| file from \term { first} to
\term { second} .
2006-09-14 04:54:21 +02:00
2009-12-09 11:09:19 +01:00
(alt) You can also add `\verb |-setcookie content_ of_ .erlang.cookie|'
2006-09-22 11:09:28 +02:00
option to all `\shell { erl} ' commands below.
2006-09-14 04:54:21 +02:00
2006-09-22 11:09:28 +02:00
\item On \term { second} run the following command as the \ejabberd { } daemon user,
in the working directory of \ejabberd { } :
2006-09-14 04:54:21 +02:00
\begin { verbatim}
2006-09-22 11:09:28 +02:00
erl -sname ejabberd \
2010-02-25 00:04:48 +01:00
-mnesia dir '"/var/lib/ejabberd/"' \
2006-09-22 11:09:28 +02:00
-mnesia extra_ db_ nodes "['ejabberd@first']" \
-s mnesia
2006-09-14 04:54:21 +02:00
\end { verbatim}
2006-09-22 11:09:28 +02:00
This will start Mnesia serving the same database as \node { ejabberd@first} .
You can check this by running the command `\verb |mnesia:info().|'. You
should see a lot of remote tables and a line like the following:
2008-09-15 20:38:52 +02:00
Note: the Mnesia directory may be different in your system.
To know where does ejabberd expect Mnesia to be installed by default,
call \ref { ejabberdctl} without options and it will show some help,
including the Mnesia database spool dir.
2006-09-14 04:54:21 +02:00
\begin { verbatim}
2006-09-22 11:09:28 +02:00
running db nodes = [ejabberd@first, ejabberd@second]
2006-09-14 04:54:21 +02:00
\end { verbatim}
2006-09-22 11:09:28 +02:00
\item Now run the following in the same `\shell { erl} ' session:
2006-09-14 04:54:21 +02:00
\begin { verbatim}
2006-09-22 11:09:28 +02:00
mnesia:change_ table_ copy_ type(schema, node(), disc_ copies).
2006-09-14 04:54:21 +02:00
\end { verbatim}
2006-09-22 11:09:28 +02:00
This will create local disc storage for the database.
2006-09-14 04:54:21 +02:00
2006-09-22 11:09:28 +02:00
(alt) Change storage type of the \term { scheme} table to `RAM and disc
2008-01-01 19:20:57 +01:00
copy' on the second node via the Web Admin.
2006-09-14 04:54:21 +02:00
2006-09-22 11:09:28 +02:00
\item Now you can add replicas of various tables to this node with
`\verb |mnesia:add_ table_ copy|' or
`\verb |mnesia:change_ table_ copy_ type|' as above (just replace
`\verb |schema|' with another table name and `\verb |disc_ copies|'
can be replaced with `\verb |ram_ copies|' or
`\verb |disc_ only_ copies|').
2006-09-14 04:54:21 +02:00
2006-09-22 11:09:28 +02:00
Which tables to replicate is very dependant on your needs, you can get
some hints from the command `\verb |mnesia:info().|', by looking at the
size of tables and the default storage type for each table on 'first'.
2006-09-14 04:54:21 +02:00
2006-09-22 11:09:28 +02:00
Replicating a table makes lookups in this table faster on this node.
Writing, on the other hand, will be slower. And of course if machine with one
of the replicas is down, other replicas will be used.
2006-09-14 04:54:21 +02:00
2008-06-13 17:25:57 +02:00
Also \footahref { http://www.erlang.org/doc/apps/mnesia/Mnesia\_ chap5.html\# 5.3}
2006-09-22 11:09:28 +02:00
{ section 5.3 (Table Fragmentation) of Mnesia User's Guide} can be helpful.
% The above URL needs update every Erlang release!
2006-09-14 04:54:21 +02:00
2006-09-22 11:09:28 +02:00
(alt) Same as in previous item, but for other tables.
2006-09-14 04:54:21 +02:00
2003-01-23 21:57:55 +01:00
2006-09-22 11:09:28 +02:00
\item Run `\verb |init:stop().|' or just `\verb |q().|' to exit from
the Erlang shell. This probably can take some time if Mnesia has not yet
transfered and processed all data it needed from \term { first} .
2003-01-25 21:13:36 +01:00
2009-01-27 12:20:55 +01:00
\item Now run \ejabberd { } on \term { second} with a configuration similar as
on \term { first} : you probably do not need to duplicate `\verb |acl|'
and `\verb |access|' options because they will be taken from
\term { first} ; and \verb |mod_ irc| should be
enabled only on one machine in the cluster.
2006-09-22 11:09:28 +02:00
\end { enumerate}
You can repeat these steps for other machines supposed to serve this
domain.
2008-06-12 23:54:30 +02:00
\makesection { servicelb} { Service Load-Balancing}
2007-06-28 11:16:21 +02:00
\ind { component load-balancing}
2011-11-15 16:46:00 +01:00
% This section never had content, should it?
% \makesubsection{componentlb}{Components Load-Balancing}
2008-06-12 23:54:30 +02:00
\makesubsection { domainlb} { Domain Load-Balancing Algorithm}
2007-06-28 11:16:21 +02:00
\ind { options!domain\_ balancing}
2008-01-01 19:20:57 +01:00
\ejabberd { } includes an algorithm to load balance the components that are plugged on an \ejabberd { } cluster. It means that you can plug one or several instances of the same component on each \ejabberd { } cluster and that the traffic will be automatically distributed.
2007-06-28 11:16:21 +02:00
2007-11-26 20:54:30 +01:00
The default distribution algorithm try to deliver to a local instance of a component. If several local instances are available, one instance is chosen randomly. If no instance is available locally, one instance is chosen randomly among the remote component instances.
2007-06-28 11:16:21 +02:00
If you need a different behaviour, you can change the load balancing behaviour with the option \option { domain\_ balancing} . The syntax of the option is the following:
2013-08-12 14:25:05 +02:00
\esyntax { domain\_ balancing: BalancingCriteria}
2007-06-28 11:16:21 +02:00
Several balancing criteria are available:
\begin { itemize}
\item \term { destination} : the full JID of the packet \term { to} attribute is used.
\item \term { source} : the full JID of the packet \term { from} attribute is used.
\item \term { bare\_ destination} : the bare JID (without resource) of the packet \term { to} attribute is used.
\item \term { bare\_ source} : the bare JID (without resource) of the packet \term { from} attribute is used.
\end { itemize}
2007-11-26 20:54:30 +01:00
If the value corresponding to the criteria is the same, the same component instance in the cluster will be used.
2007-06-28 11:16:21 +02:00
2008-06-12 23:54:30 +02:00
\makesubsection { lbbuckets} { Load-Balancing Buckets}
2007-06-28 11:16:21 +02:00
\ind { options!domain\_ balancing\_ component\_ number}
2007-11-26 20:54:30 +01:00
When there is a risk of failure for a given component, domain balancing can cause service trouble. If one component is failing the service will not work correctly unless the sessions are rebalanced.
2007-06-28 11:16:21 +02:00
2007-11-26 20:54:30 +01:00
In this case, it is best to limit the problem to the sessions handled by the failing component. This is what the \term { domain\_ balancing\_ component\_ number} option does, making the load balancing algorithm not dynamic, but sticky on a fix number of component instances.
2007-06-28 11:16:21 +02:00
2009-08-12 16:15:59 +02:00
The syntax is:
2013-08-12 14:25:05 +02:00
\esyntax { domain\_ balancing\_ component\_ number: Number}
2007-06-28 11:16:21 +02:00
2006-09-22 11:09:28 +02:00
% TODO
% See also the section about ejabberdctl!!!!
%\section{Backup and Restore}
2007-01-11 09:17:18 +01:00
%\label{backup}
2006-09-22 11:09:28 +02:00
%\ind{backup}
2003-01-23 21:57:55 +01:00
2008-06-12 23:54:30 +02:00
\makechapter { debugging} { Debugging}
2007-06-25 09:15:30 +02:00
\ind { debugging}
2008-06-12 23:54:30 +02:00
\makesection { logfiles} { Log Files}
2007-06-25 09:15:30 +02:00
2013-11-12 12:33:09 +01:00
An \ejabberd { } node writes three log files:
2007-12-06 00:46:50 +01:00
\begin { description}
2008-01-16 11:08:17 +01:00
\titem { ejabberd.log} is the ejabberd service log, with the messages reported by \ejabberd { } code
2013-11-12 12:33:09 +01:00
\titem { error.log} is the file accumulating error messages from \term { ejabberd.log}
\titem { crash.log} is the Erlang/OTP log, with the crash messages reported by Erlang/OTP using SASL (System Architecture Support Libraries)
2007-12-06 00:46:50 +01:00
\end { description}
2007-06-25 09:15:30 +02:00
2013-08-12 14:25:05 +02:00
The option \term { loglevel} modifies the verbosity of the file ejabberd.log. The syntax:
2010-10-13 13:45:08 +02:00
\begin { description}
2013-08-12 14:25:05 +02:00
\titem { loglevel: Level} The standard form to set a global log level.
2010-10-13 13:45:08 +02:00
\end { description}
2009-08-12 16:15:59 +02:00
The possible \term { Level} are:
2007-12-06 00:46:50 +01:00
\begin { description}
\titem { 0} No ejabberd log at all (not recommended)
\titem { 1} Critical
\titem { 2} Error
\titem { 3} Warning
\titem { 4} Info
\titem { 5} Debug
\end { description}
For example, the default configuration is:
2007-06-25 09:15:30 +02:00
\begin { verbatim}
2013-08-12 14:25:05 +02:00
loglevel: 4
2007-06-25 09:15:30 +02:00
\end { verbatim}
2013-11-12 12:33:09 +01:00
Option \term { log\_ rate\_ limit} is useful if you want to protect the logging
mechanism from being overloaded by excessive amount of log messages.
The syntax is:
\begin { description}
\titem { log\_ rate\_ limit: N} Where N is a maximum number of log messages per second.
The default value is 100.
\end { description}
When the limit is reached the similar warning message is logged:
\begin { verbatim}
lager_ error_ logger_ h dropped 800 messages in the last second that exceeded the limit of 100 messages/sec
\end { verbatim}
By default \ejabberd { } rotates the log files when they get grown above a certain size.
The exact value is controlled by \term { log\_ rotate\_ size} option.
The syntax is:
\begin { description}
\titem { log\_ rotate\_ size: N} Where N is the maximum size of a log file in bytes.
2014-07-02 10:41:12 +02:00
The default value is 10485760 (10Mb).
\end { description}
\ejabberd { } can also rotates the log files at given date interval.
The exact value is controlled by \term { log\_ rotate\_ date} option.
The syntax is:
\begin { description}
\titem { log\_ rotate\_ date: D} Where D is a string with syntax is taken from the syntax newsyslog uses in newsyslog.conf.
The default value is \term { ""} (no rotation triggered by date).
2013-11-12 12:33:09 +01:00
\end { description}
However, you can rotate the log files manually.
2014-07-02 10:41:12 +02:00
For doing this, set \term { log\_ rotate\_ size} option to 0 and \term { log\_ rotate\_ date}
to empty list, then, when you need to rotate the files, rename and then reopen them.
2009-04-17 15:53:20 +02:00
The ejabberdctl command \term { reopen-log}
(please refer to section \ref { ectl-commands} )
2008-12-16 18:36:34 +01:00
reopens the log files,
and also renames the old ones if you didn't rename them.
2013-11-18 14:22:48 +01:00
The option \term { log\_ rotate\_ count} defines the number of rotated files to keep
by \term { reopen-log} command.
Every such file has a numeric suffix. The exact format is:
\begin { description}
\titem { log\_ rotate\_ count: N} The default value is 1,
which means only \term { ejabberd.log.0} , \term { error.log.0}
and \term { crash.log.0} will be kept.
\end { description}
2008-06-12 23:54:30 +02:00
\makesection { debugconsole} { Debug Console}
2007-12-06 01:31:09 +01:00
2008-01-01 19:20:57 +01:00
The Debug Console is an Erlang shell attached to an already running \ejabberd { } server.
2007-12-06 01:31:09 +01:00
With this Erlang shell, an experienced administrator can perform complex tasks.
2008-01-01 19:20:57 +01:00
This shell gives complete control over the \ejabberd { } server,
2007-12-06 01:31:09 +01:00
so it is important to use it with extremely care.
2008-10-06 16:18:46 +02:00
There are some simple and safe examples in the article
2007-12-06 01:31:09 +01:00
\footahref { http://www.ejabberd.im/interconnect-erl-nodes} { Interconnecting Erlang Nodes}
To exit the shell, close the window or press the keys: control+c control+c.
2008-12-16 18:36:34 +01:00
\makesection { watchdog} { Watchdog Alerts}
\ind { debugging!watchdog}
\ejabberd { } includes a watchdog mechanism that may be useful to developers
when troubleshooting a problem related to memory usage.
2009-02-13 20:27:56 +01:00
If a process in the \ejabberd { } server consumes more memory than the configured threshold,
2009-09-23 17:28:53 +02:00
a message is sent to the XMPP accounts defined with the option
2008-12-16 18:36:34 +01:00
\term { watchdog\_ admins}
\ind { options!watchdog\_ admins} in the \ejabberd { } configuration file.
2009-02-13 20:27:56 +01:00
2009-08-12 16:15:59 +02:00
The syntax is:
2013-08-12 14:25:05 +02:00
\esyntax { watchdog\_ admins: [JID, ...]}
2009-08-12 16:15:59 +02:00
2009-02-13 20:27:56 +01:00
The memory consumed is measured in \term { words} :
a word on 32-bit architecture is 4 bytes,
and a word on 64-bit architecture is 8 bytes.
The threshold by default is 1000000 words.
This value can be configured with the option \term { watchdog\_ large\_ heap} ,
or in a conversation with the watchdog alert bot.
2009-08-12 16:15:59 +02:00
The syntax is:
2013-08-12 14:25:05 +02:00
\esyntax { watchdog\_ large\_ heap: Number}
2009-08-12 16:15:59 +02:00
2008-12-16 18:36:34 +01:00
Example configuration:
\begin { verbatim}
2013-08-12 14:25:05 +02:00
watchdog_ admins:
- "admin2@localhost"
- "admin2@example.org"
watchdog_ large_ heap: 30000000
2008-12-16 18:36:34 +01:00
\end { verbatim}
To remove watchdog admins, remove them in the option.
To remove all watchdog admins, set the option with an empty list:
\begin { verbatim}
2013-08-12 14:25:05 +02:00
watchdog_ admins: []
2008-12-16 18:36:34 +01:00
\end { verbatim}
2006-09-22 11:09:28 +02:00
\appendix { }
2008-06-12 23:54:30 +02:00
\makechapter { i18ni10n} { Internationalization and Localization}
2005-11-28 11:55:45 +01:00
\ind { xml:lang} \ind { internationalization} \ind { localization} \ind { i18n} \ind { l10n}
2003-02-08 19:21:05 +01:00
2008-08-17 18:35:58 +02:00
The source code of \ejabberd { } supports localization.
2008-10-06 16:18:46 +02:00
The translators can edit the
\footahref { http://www.gnu.org/software/gettext/} { gettext} .po files
2008-08-18 11:17:58 +02:00
using any capable program (KBabel, Lokalize, Poedit...) or a simple text editor.
2008-08-17 18:35:58 +02:00
2008-08-18 11:17:58 +02:00
Then gettext
is used to extract, update and export those .po files to the .msg format read by \ejabberd { } .
2008-08-17 18:35:58 +02:00
To perform those management tasks, in the \term { src/} directory execute \term { make translations} .
The translatable strings are extracted from source code to generate the file \term { ejabberd.pot} .
2008-08-18 11:17:58 +02:00
This file is merged with each .po file to produce updated .po files.
Finally those .po files are exported to .msg files, that have a format easily readable by \ejabberd { } .
2008-08-17 18:35:58 +02:00
2005-11-28 11:55:45 +01:00
All built-in modules support the \texttt { xml:lang} attribute inside IQ queries.
Figure~\ref { fig:discorus} , for example, shows the reply to the following query:
2003-02-08 19:21:05 +01:00
\begin { verbatim}
2008-06-13 01:01:09 +02:00
<iq id='5'
to='example.org'
type='get'
xml:lang='ru'>
<query xmlns='http://jabber.org/protocol/disco#items'/>
</iq>
2003-02-08 19:21:05 +01:00
\end { verbatim}
\begin { figure} [htbp]
\centering
\insimg { discorus.png}
2005-11-28 11:55:45 +01:00
\caption { Service Discovery when \texttt { xml:lang='ru'} }
2003-02-08 19:21:05 +01:00
\label { fig:discorus}
\end { figure}
2003-01-23 21:57:55 +01:00
2008-03-31 12:36:41 +02:00
The Web Admin also supports the \verb |Accept-Language| HTTP header.
2004-07-10 00:34:26 +02:00
\begin { figure} [htbp]
\centering
\insimg { webadmmainru.png}
2008-10-06 16:18:46 +02:00
\caption { Web Admin showing a virtual host when the web browser provides the
2008-03-31 12:36:41 +02:00
HTTP header `Accept-Language: ru'}
2004-07-10 00:34:26 +02:00
\label { fig:webadmmainru}
\end { figure}
2006-09-22 11:09:28 +02:00
2008-06-12 23:54:30 +02:00
\makechapter { releasenotes} { Release Notes}
2005-11-28 11:55:45 +01:00
\ind { release notes}
2007-08-13 16:22:59 +02:00
Release notes are available from \footahref { http://www.process-one.net/en/ejabberd/release\_ notes/} { ejabberd Home Page}
2006-09-22 11:09:28 +02:00
2008-06-12 23:54:30 +02:00
\makechapter { acknowledgements} { Acknowledgements}
2005-11-28 11:55:45 +01:00
Thanks to all people who contributed to this guide:
\begin { itemize}
\item Alexey Shchepin (\ahrefurl { xmpp:aleksey@jabber.ru} )
2006-09-22 11:09:28 +02:00
\item Badlop (\ahrefurl { xmpp:badlop@jabberes.org} )
\item Evgeniy Khramtsov (\ahrefurl { xmpp:xram@jabber.ru} )
2005-11-28 11:55:45 +01:00
\item Florian Zumbiehl (\ahrefurl { xmpp:florz@florz.de} )
2012-02-15 18:30:16 +01:00
\item Ludovic Bocquet (\ahrefurl { xmpp:lbocquet@jabber.org} )
2010-11-18 08:59:35 +01:00
\item Marcin Owsiany (\ahrefurl { xmpp:marcin.owsiany@gmail.com} )
2005-11-28 11:55:45 +01:00
\item Michael Grigutsch (\ahrefurl { xmpp:migri@jabber.i-pobox.net} )
2008-03-31 12:36:41 +02:00
\item Mickael Remond (\ahrefurl { xmpp:mremond@process-one.net} )
\item Sander Devrieze (\ahrefurl { xmpp:s.devrieze@gmail.com} )
2005-11-28 11:55:45 +01:00
\item Sergei Golovan (\ahrefurl { xmpp:sgolovan@nes.ru} )
\item Vsevolod Pelipas (\ahrefurl { xmpp:vsevoload@jabber.ru} )
\end { itemize}
2006-09-22 11:09:28 +02:00
2008-06-12 23:54:30 +02:00
\makechapter { copyright} { Copyright Information}
2006-09-22 11:09:28 +02:00
Ejabberd Installation and Operation Guide.\\
2015-01-21 14:52:37 +01:00
Copyright \copyright { } 2003 --- 2015 ProcessOne
2006-09-22 11:09:28 +02:00
This document is free software; you can redistribute it and/or
modify it under the terms of the GNU General Public License
as published by the Free Software Foundation; either version 2
of the License, or (at your option) any later version.
This document is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.
You should have received a copy of the GNU General Public License along with
this document; if not, write to the Free Software Foundation, Inc., 51 Franklin
Street, Fifth Floor, Boston, MA 02110-1301, USA.
%TODO: a glossary describing common terms
2008-06-12 23:54:30 +02:00
%\makesection{glossary}{Glossary}
2005-11-28 11:55:45 +01:00
%\ind{glossary}
%\begin{description}
2008-10-06 16:18:46 +02:00
%\titem{c2s}
2005-11-28 11:55:45 +01:00
%\titem{s2s}
%\titem{STARTTLS}
2007-01-11 09:17:18 +01:00
%\titem{XEP} (\XMPP{} Extension Protocol)
2005-11-28 11:55:45 +01:00
%\titem{Resource}
%\titem{Roster}
%\titem{Transport}
%\titem{JID} (\Jabber{} ID) <Wikipedia>
%\titem{JUD} (\Jabber{} User Directory)
%\titem{vCard} <Wikipedia>
%\titem{Publish-Subscribe}
%\titem{Namespace}
%\titem{Erlang} <Wikipedia>
%\titem{Fault-tolerant}
%\titem{Distributed} <Wikipedia>
%\titem{Node} <Wikipedia>
%\titem{Tuple} <Wikipedia>
%\titem{Regular Expression}
%\titem{ACL} (Access Control List) <Wikipedia>
%\titem{IPv6} <Wikipedia>
2009-09-23 17:28:53 +02:00
%\titem{XMPP}
2005-11-28 11:55:45 +01:00
%\titem{LDAP} (Lightweight Directory Access Protocol) <Wikipedia>
%\titem{ODBC} (Open Database Connectivity) <Wikipedia>
%\titem{Virtual Hosting} <Wikipedia>
%\end{description}
% Remove the index from the HTML version to save size and bandwith.
\begin { latexonly}
\printindex
\end { latexonly}
2003-01-23 21:57:55 +01:00
\end { document}