websocket 报文格式

WebSocket is a communication protocol providing full-duplex communication channels over a single TCP connection. It is designed to be used in web applications to enable interactive communication between a client (typically a web browser) and a server. WebSockets are initiated by a handshake using the HTTP protocol, which is then upgraded to the WebSocket protocol.

Key Features of WebSocket:

  1. Full-Duplex Communication: Both the client and server can send messages to each other independently.
  2. Single TCP Connection: After the initial handshake, communication continues over the same TCP connection.
  3. Efficient: Unlike HTTP, which requires a new connection for each request, WebSocket maintains a single connection, reducing overhead.

WebSocket Handshake

The WebSocket handshake is the process that initiates a WebSocket connection. It starts with the client sending an HTTP request to the server with an Upgrade header indicating the desire to upgrade to a WebSocket connection. The server then responds with headers confirming the upgrade.

Example of a WebSocket Handshake:

Client Request:

复制代码
GET /chat HTTP/1.1
Host: example.com
Upgrade: websocket
Connection: Upgrade
Sec-WebSocket-Key: dGhlIHNhbXBsZSBub25jZQ==
Sec-WebSocket-Version: 13

Server Response:

复制代码
HTTP/1.1 101 Switching Protocols
Upgrade: websocket
Connection: Upgrade
Sec-WebSocket-Accept: s3pPLMBiTxaQ9kYGzzhZRbK+xOo=

WebSocket Frame Format

After the handshake, the client and server exchange data frames. WebSocket frames have a specific format that includes an opcode, payload length, and the actual data. Below is the structure of a WebSocket frame:

  1. FIN: 1 bit - Indicates if this is the final fragment in a message.
  2. RSV1, RSV2, RSV3: 1 bit each - Reserved for future use.
  3. Opcode: 4 bits - Defines the interpretation of the payload data.
  4. Mask: 1 bit - Indicates if the payload data is masked.
  5. Payload length: 7 bits, 7+16 bits, or 7+64 bits - The length of the payload data.
  6. Masking key: 0 or 4 bytes - Used to unmask the payload data (present if Mask is 1).
  7. Payload data: (x+y) bytes - The actual data being sent.

Example of a WebSocket Frame (Hexdump)

Below is an example of a WebSocket text frame containing the message "Hello".

Unmasked Frame:
复制代码
81 05 48 65 6C 6C 6F

Breakdown:

  • 81: FIN=1, Opcode=1 (text frame)
  • 05: Payload length is 5 bytes
  • 48 65 6C 6C 6F: Payload data "Hello"
Masked Frame:
复制代码
81 85 37 FA 21 3D 7F 9F 4D 51 58

Breakdown:

  • 81: FIN=1, Opcode=1 (text frame)
  • 85: Mask=1, Payload length is 5 bytes
  • 37 FA 21 3D: Masking key
  • 7F 9F 4D 51 58: Masked payload data

To unmask the payload data, each byte of the payload is XOR'd with the corresponding byte of the masking key. Here's how to unmask the payload data in the example above:

  1. 7F ^ 37 = 48 (H)
  2. 9F ^ FA = 65 (e)
  3. 4D ^ 21 = 6C (l)
  4. 51 ^ 3D = 6C (l)
  5. 58 ^ 7F = 6F (o)

The unmasked payload data is "Hello".

Conclusion

WebSocket is a protocol based on TCP that enables full-duplex communication between a client and server over a single connection. It starts with an HTTP handshake and then switches to the WebSocket protocol for continuous communication. The protocol uses a specific frame format to exchange messages.

Below is a simple demo of WebSocket communication in C. This example will include a basic WebSocket server using the libwebsockets library, which is a lightweight C library for WebSocket clients and servers.

Prerequisites

  1. Install the libwebsockets library. On Ubuntu, you can install it using:

    bash 复制代码
    sudo apt-get install libwebsockets-dev

WebSocket Server Example

c 复制代码
#include <libwebsockets.h>
#include <string.h>
#include <signal.h>
#include <stdio.h>

static int interrupted;

static const struct lws_protocols protocols[] = {
    {
        "example-protocol",
        [](struct lws *wsi, enum lws_callback_reasons reason, void *user, void *in, size_t len) {
            switch (reason) {
                case LWS_CALLBACK_ESTABLISHED:
                    lwsl_user("Connection established\n");
                    break;
                case LWS_CALLBACK_RECEIVE:
                    lwsl_user("Received data: %s\n", (char *)in);
                    lws_write(wsi, (unsigned char *)in, len, LWS_WRITE_TEXT);
                    break;
                default:
                    break;
            }
            return 0;
        },
        0, 0, 0, 0
    },
    { NULL, NULL, 0, 0, 0, 0 }
};

static void sigint_handler(int sig) {
    interrupted = 1;
}

int main(void) {
    struct lws_context_creation_info info;
    struct lws_context *context;

    signal(SIGINT, sigint_handler);

    memset(&info, 0, sizeof info);
    info.port = 7681;
    info.protocols = protocols;
    info.options = LWS_SERVER_OPTION_DO_SSL_GLOBAL_INIT;

    context = lws_create_context(&info);
    if (!context) {
        lwsl_err("lws_create_context failed\n");
        return 1;
    }

    while (!interrupted) {
        lws_service(context, 1000);
    }

    lws_context_destroy(context);

    return 0;
}

Explanation

  • Libraries and Headers : The example uses the libwebsockets library.
  • Signal Handling : A signal handler to cleanly exit the server on Ctrl+C.
  • Protocols: Define the WebSocket protocols, in this case, "example-protocol".
  • Callback Function: This function handles WebSocket events. It prints messages when a connection is established and when data is received. It also echoes the received data back to the client.
  • Context Creation: Setup and creation of the WebSocket context.
  • Service Loop: The main loop where the server waits for and processes WebSocket events.
  • Cleanup: Clean up and free resources on exit.

Compilation

To compile the code, save it to a file (e.g., websocket_server.c) and use the following command:

bash 复制代码
gcc websocket_server.c -o websocket_server -lwebsockets

Running the Server

Execute the compiled program:

bash 复制代码
./websocket_server

Testing the WebSocket Server

You can use a WebSocket client (e.g., a browser or a WebSocket client tool like wscat) to connect to the server:

bash 复制代码
npm install -g wscat
wscat -c ws://localhost:7681

After connecting, you can send messages, and the server will echo them back.

This example demonstrates a simple WebSocket server that can be expanded upon to handle more complex interactions and protocols.

握手请求

GET /ws/v2?aid=35&device_id=2256622095183710&access_key=4c344a03d3473afa881d8377f45dbeb6&fpid=1&sdk_version=3&iid=1896027950179704&pl=0&ne=1&version_code=91710&sid=11f8f93ec399434ca20a1b992abad1b7 HTTP/1.1

Host: frontier100-toutiao.toutiaoapi.com

Connection: Upgrade

Pragma: no-cache

Cache-Control: no-cache

x-support-ack: 1

Upgrade: websocket

Origin: wss://frontier-toutiao.snssdk.com

Sec-WebSocket-Version: 13

x-tt-store-region: cn-bj

x-tt-store-region-src: did

x-tt-request-tag: s=-1;p=1

X-SS-DP: 35

x-tt-trace-id: 00-2ac33dc5010c3808c8136bd3d7d70023-2ac33dc5010c3808-01

User-Agent: Dalvik/2.1.0 (Linux; U; Android 13; SM-E5260 Build/TP1A.220624.014) NewsArticle/9.1.7 cronet/TTNetVersion:437fcb60 2022-11-09 QuicVersion:22f74f01 2022-10-11

Accept-Encoding: gzip, deflate, br

X-Cylons: jQ1ABID3KlKFZuGKLcqhMHVY

Sec-WebSocket-Key: lSdFzLlNEFY+wI+VBlbOTA==

Sec-WebSocket-Extensions: permessage-deflate; client_max_window_bits

Sec-WebSocket-Protocol: pbbp2

握手响应

HTTP/1.1 101 Switching Protocols

Server: nginx

Date: Tue, 07 Feb 2023 07:24:43 GMT

Content-Type: application/octet-stream

Connection: upgrade

Upgrade: websocket

Sec-WebSocket-Accept: 7cCulc1ObP4idNxTd4sftSwszOU=

Sec-Websocket-Protocol: pbbp2

Handshake-Status: 0

Handshake-Msg: OK

Handshake-Options: ping-interval=30;

tt-idc-switch: 10000@20230130174459

Access-Control-Expose-Headers: tt-idc-switch

server-timing: inner; dur=3

x-tt-trace-host: 01bfda85b24fa255716a400b95f35865e801de7aa0619c3c851990fc82fb61148404fccbeeeebebdba77ee9c062919ed5fd23f4b558e9975cd3763c12d0676afcee3b1d537faa85513bf792c004d971b2b7e12cb70b9902274abf845399cff1539

x-tt-trace-tag: id=00;cdn-cache=miss

x-tt-trace-id: 00-2ac33dc5010c3808c8136bd3d7d70023-2ac33dc5010c3808-01

相关推荐
南尘NCA866644 分钟前
企业微信防封防投诉拦截系统:从痛点解决到技术实现
java·网络·企业微信
程序猿费益洲2 小时前
Docker 网络详解:(三)四大网络模式
网络·docker·容器
2501_915106322 小时前
Comodo HTTPS 在工程中的部署与排查实战(证书链、兼容性与真机抓包策略)
网络协议·http·ios·小程序·https·uni-app·iphone
Mr_Meng_De2 小时前
网络安全认证培训机构的痛点
网络
AORO20254 小时前
2025全新三防平板科普:5G-A+卫星通信+国产化
网络·5g·智能手机·电脑·制造·信息与通信
深圳南柯电子4 小时前
车载通信设备EMC整改:高频问题与AI辅助诊断方案|深圳南柯电子
网络·人工智能·互联网·实验室·emc
morning_sir_jking5 小时前
深入解析 kube-proxy:Kubernetes 服务发现的网络基石
网络·kubernetes·服务发现
问道飞鱼5 小时前
【Linux知识】Linux磁盘开机挂载
linux·运维·网络·磁盘·自动挂载
☆璇6 小时前
【Linux】网络基础概念
linux·网络
独行soc7 小时前
2025年渗透测试面试题总结-106(题目+回答)
网络·python·安全·web安全·adb·渗透测试·安全狮