Movatterモバイル変換


[0]ホーム

URL:


Jump to content
WikipediaThe Free Encyclopedia
Search

WebSocket

From Wikipedia, the free encyclopedia
Computer network protocol
WebSocket
The WebSocket logo
International standardRFC 6455,WebSockets
Developed byIETF,WHATWG
IntroducedDecember 2011 (2011-12)
IndustryComputer science
Connector typeTCP

WebSocket is a computercommunications protocol, providing abidirectional communication channel over a singleTransmission Control Protocol (TCP) connection. The WebSocket protocol was standardized by theIETF asRFC 6455 in 2011. The current specification allowing web applications to use this protocol is known asWebSockets.[1] It is a living standard maintained by theWHATWG and a successor toThe WebSocket API from theW3C.[2]

WebSocket is distinct fromHTTP used to serve most webpages. Although they are different,RFC 6455 states that WebSocket "is designed to work over HTTP ports 443 and 80 as well as to support HTTP proxies and intermediaries", making the WebSocket protocol compatible with HTTP. To achieve compatibility, the WebSockethandshake uses theHTTP Upgrade header[3] to change from the HTTP protocol to the WebSocket protocol.

The WebSocket protocol enablesfull-duplex interaction between aweb browser (or otherclient application) and aweb server with lower overhead than half-duplex alternatives such as HTTPpolling, facilitating real-time data transfer from and to the server. This is achieved by providing a standardized way for the server to send content to the client without being first requested by the client, and allowing messages to be exchanged while keeping the connection open. In this way, a two-way ongoing conversation can take place between the client and the server. The communications are usually done over TCPport number 443 (or 80 in the case of unsecured connections), which is beneficial for environments that block non-web Internet connections using afirewall. Additionally, WebSocket enables streams of messages on top of TCP. TCP alone deals with streams of bytes with no inherent concept of a message. Similar two-way browser–server communications have been achieved in non-standardized ways using stopgap technologies such asComet orAdobe Flash Player.[4]

Most browsers support the protocol, includingGoogle Chrome,Firefox,Microsoft Edge,Internet Explorer,Safari andOpera.[5] Its utility also extends to desktop applications, such as the social virtual reality platformResonite[6] which, as well as its predecessorNeosVR, uses WebSockets for real-time integrations with external services and hardware.

The WebSocket protocol specification definesws (WebSocket) andwss (WebSocket Secure) as two newuniform resource identifier (URI) schemes[7] that are used for unencrypted and encrypted connections respectively. Apart from the scheme name andfragment (i.e.# is not supported), the rest of the URI components are defined to useURI generic syntax.[8]

History

[edit]

WebSocket was first referenced as TCPConnection in theHTML5 specification, as a placeholder for a TCP-based socket API.[9] In June 2008, a series of discussions were led byMichael Carter that resulted in the first version of the protocol known as WebSocket.[10]Before WebSocket, port 80 full-duplex communication was attainable usingComet channels; however, Comet implementation is nontrivial, and due to the TCP handshake and HTTP header overhead, it is inefficient for small messages. The WebSocket protocol aims to solve these problems without compromising the security assumptions of the web.The name "WebSocket" was coined byIan Hickson and Michael Carter shortly thereafter through collaboration on the #whatwg IRC chat room,[11] and subsequently authored for inclusion in the HTML5 specification by Ian Hickson. In December 2009, Google Chrome 4 was the first browser to ship full support for the standard, with WebSocket enabled by default.[12] Development of the WebSocket protocol was subsequently moved from the W3C andWHATWG group to the IETF in February 2010, and authored for two revisions under Ian Hickson.[13]

After the protocol was shipped and enabled by default in multiple browsers, theRFC 6455 was finalized under Ian Fette in December 2011.

RFC 7692 introduced compression extension to WebSocket using theDEFLATE algorithm on a per-message basis.

Web API

[edit]

A web application (e.g. web browser) may use theWebSocket interface to maintain bidirectional communications with a WebSocket server.[14]

Client example

[edit]

InTypeScript.

// Connect to serverconstws:WebSocket=newWebSocket("wss://game.example.com/scoreboard");// Receive ArrayBuffer instead of Blobws.binaryType="arraybuffer";// Set event listenersws.onopen=():void=>{console.log("Connection opened");ws.send("Hi server, please send me the score of yesterday's game");};ws.onmessage=(event:MessageEvent):void=>{console.log("Message received",event.data);ws.close();// We got the score so we don't need the connection anymore};ws.onclose=(event:CloseEvent):void=>{console.log("Connection closed",event.code,event.reason,event.wasClean);};ws.onerror=(event:Event):void=>{console.log("Connection closed due to error");};

WebSocket interface

[edit]
TypeName[15]Description
Constructorws = newWebSocket(url: string, protocols?: string | string[])Start opening handshake.[16]
  • url: TheURL as astring (not classURL) containing:
    • Scheme: must bews,wss,http orhttps.
    • Host.
    • Optionalport: If not specified, 80 is used forws andhttp, and 443 forwss andhttps.
    • Optionalpath.
    • Optionalquery.
    • Nofragment.
  • Optionalprotocols: Astring orstring[] used as the value of theSec-WebSocket-Protocol header in the opening handshake.

Exceptions:

  • SyntaxError:
    • url parsing[a] failed.
    • url has an invalid scheme.
    • url has a fragment.
    • protocols has duplicate strings.
Methodws.send(data: string | Blob | ArrayBuffer | ArrayBufferView)Send data message.[17]
  • data: must bestring,Blob,ArrayBuffer orArrayBufferView.

Return:undefined.

Exceptions:

  • InvalidStateError:ws.readyState isCONNECTING.

Note:

  • If the data cannot be sent (e.g. because it would need to be buffered but the buffer is full), the connection is closed and onerror is fired.
ws.close(code?: number, reason?: string)Startclosing handshake.[18]
  • Optionalcode: If specified, must be 1000 (Normal closure) or in the range 3000 to 4999 (application-defined). Defaults to 1000.
  • Optionalreason: If specified, must be a string whoseUTF-8 encoding is no longer than 123 bytes. Defaults to an empty string.

Return:undefined.

Exceptions:

  • InvalidAccessError:code is not 1000 nor is in the range 3000 to 4999.
  • SyntaxError: UTF-8-encodedreason is longer than 123 bytes.

Note:

  • Ifws.readyState isOPEN orOPENING,ws.readyState is set toCLOSING and the closing handshake starts.
  • Ifws.readyState isCLOSING orCLOSED, nothing happens (because the closing handshake has already started).
Eventws.onopen = (event: Event): void => {}

ws.addEventListener("open", (event: Event): void => {})

Opening handshake succeeded.event type isEvent.
ws.onmessage = (event: MessageEvent): void => {}

ws.addEventListener("message", (event: MessageEvent): void => {})

Data message received.[19]event type isMessageEvent. This event is only fired ifws.readyState isOPEN.
  • event.data contains the data received, of type:
    • string for text.
    • Blob orArrayBuffer for binary (seews.binaryType).
  • event.origin is a string containingws.url but only with the scheme, host and port (if any) URL components.
ws.onclose = (event: CloseEvent): void => {}

ws.addEventListener("close", (event: CloseEvent): void => {})

The underlyingTCP connection closed.event type isCloseEvent containing:[20][21][22][23]
  • event.code:status code (integer).
  • event.reason: reason for closing (string).
  • event.wasClean:true if the TCP connection was closed after the closing handshake was completed;false otherwise.

Note:

  • If the receivedClose frame contains apayload,event.code andevent.reason get their value from the payload.
  • If the receivedClose frame containsno payload,event.code is 1005 (No code received) andevent.reason is an empty string.
  • IfnoClose frame was received,event.code is 1006 (Connection closed abnormally) andevent.reason is an empty string.
ws.onerror = (event: Event): void => {}

ws.addEventListener("error", (event: Event): void => {})

Connection closed due to error.event type isEvent.
Attributews.binaryType (string)Type ofevent.data inws.onmessage when a binary data message is received. Initially set to"blob" (Blob object). May be changed to"arraybuffer" (ArrayBuffer object).[24]
Read-only attributews.url (string)URL given to theWebSocket constructor with the following transformations:
  • If scheme ishttp orhttps, change it tows orwss respectively.
ws.bufferedAmount (number)Number of bytes of application data (UTF-8 text and binary data) that have beenqueued usingws.send() but not yet transmitted to the network. It resets to zero once all queued data has been sent. If the connection closes, this value will only increase, with each call tows.send(), and never reset to zero.[25]
ws.protocol (string)Protocol accepted by the server, or an empty string if the client did not specifyprotocols in theWebSocket constructor.
ws.extensions (string)Extensions accepted by the server.
ws.readyState (number)Connection state. It is one of the constants below. Initially set toCONNECTING.[26]
ConstantWebSocket.CONNECTING = 0Opening handshake is currently in progress. The initial state of the connection.[27][28]
WebSocket.OPEN = 1Opening handshake succeeded. The client and server may send messages to each other.[29][30]
WebSocket.CLOSING = 2Closing handshake is currently in progress. Eitherws.close() was called or aClose message was received.[31][32]
WebSocket.CLOSED = 3The underlyingTCP connection is closed.[33][20][21]

Protocol

[edit]
A diagram describing a connection using WebSocket

Steps:

  1. Opening handshake:HTTP request andHTTP response.
  2. Frame-based message exchange: data, ping and pong messages.
  3. Closing handshake: close message (request then echoed in response).

Opening handshake

[edit]

The client sends anHTTP request (methodGET,version ≥ 1.1) and the server returns anHTTP response withstatus code 101 (Switching Protocols) on success. HTTP and WebSocket clients can connect to a server using the same port because the opening handshake uses HTTP. Sending additional HTTP headers (that are not in the table below) is allowed. HTTP headers may be sent in any order. After theSwitching Protocols HTTP response, the opening handshake is complete, the HTTP protocol stops being used, and communication switches to a binary frame-based protocol.[34][35]

HTTP headers relevant to the opening handshake
Side
HeaderValueMandatory
Request
Origin[36]VariesYes (for browser clients)
Host[37]VariesYes
Sec-WebSocket-Version[38]13
Sec-WebSocket-Key[39]base64-encode(16-byte randomnonce)
Response
Sec-WebSocket-Accept[40]base64-encode(SHA1(Sec-WebSocket-Key +258EAFA5-E914-47DA-95CA-C5AB0DC85B11))[b]
Both
Connection[41][42]Upgrade
Upgrade[43][44]websocket
Sec-WebSocket-Protocol[45]The request may contain acomma-separated list of strings (ordered by preference) indicatingapplication-level protocols (built on top of WebSocket data messages) the client wishes to use. If the client sends this header, the server response must be one of the values from the list.No
Sec-WebSocket-Extensions[46][47][48][49]Used to negotiate protocol-level extensions. The client may request extensions to the WebSocket protocol by including a comma-separated list of extensions (ordered by preference). Each extension may have a parameter (e.g. foo=4). The server may accept some or all extensions requested by the client. This field may appear multiple times in the request (logically equivalent to a single occurrence containing all values) and must not appear more than once in the response.

Example request:[35]

GET/chatHTTP/1.1Host:server.example.comUpgrade:websocketConnection:UpgradeSec-WebSocket-Key:dGhlIHNhbXBsZSBub25jZQ==Origin:http://example.comSec-WebSocket-Protocol:chat, superchatSec-WebSocket-Version:13

Example response:[35]

HTTP/1.1101Switching ProtocolsUpgrade:websocketConnection:UpgradeSec-WebSocket-Accept:s3pPLMBiTxaQ9kYGzzhZRbK+xOo=Sec-WebSocket-Protocol:chat

The followingPython code generates a randomSec-WebSocket-Key.

importbase64importosprint(base64.b64encode(os.urandom(16)))

The following Python code calculatesSec-WebSocket-Accept usingSec-WebSocket-Key from the example request above.

importbase64importhashlibKEY:bytes=b"dGhlIHNhbXBsZSBub25jZQ=="MAGIC:bytes=b"258EAFA5-E914-47DA-95CA-C5AB0DC85B11"print(base64.b64encode(hashlib.sha1(KEY+MAGIC).digest()))

Sec-WebSocket-Key andSec-WebSocket-Accept are intended to prevent acachingproxy from re-sending a previous WebSocket conversation,[50] and does not provide any authentication, privacy, or integrity.

Though some servers accept a shortSec-WebSocket-Key, many modern servers will reject the request with error "invalid Sec-WebSocket-Key header".

Frame-based message

[edit]

After the opening handshake, the client and server can, at any time, senddata messages (text or binary) andcontrol messages (Close,Ping,Pong) to each other. A message is composed ofone frame if unfragmented orat least two frames if fragmented.

Fragmentation splits a message intotwo or more frames. It enables sending messages with initial data available but complete length unknown. Without fragmentation, the whole message must be sent in one frame, so the complete length is needed before the first byte can be sent, which requires a buffer. It also enables multiplexing several streams simultaneously (e.g. to avoid monopolizing a socket for a single largepayload).[51][52]

  • Anunfragmented message consists of one frame withFIN = 1 andopcode ≠ 0.
  • Afragmented message consists of one frame withFIN = 0 andopcode ≠ 0, followed by zero or more frames withFIN = 0 andopcode = 0, and terminated by one frame withFIN = 1 andopcode = 0.

Frame structure

[edit]
Offset
(bits)
Field[53]Size
(bits)
Description
0FIN[54]1
  • 1 =final frame of a message.
  • 0 = message is fragmented and this isnot the final frame.
1RSV11Reserved. Must be 0 unless defined by an extension. If a non-zero value is received and none of the negotiated extensions defines the meaning of such a non-zero value, the connection must be closed.[55]
2RSV21
3RSV31
4Opcode4Seeopcodes below.
8Masked[56]1
  • 1 = frame is masked (i.e. masking key is present and the payload has beenXORed with the masking key).
  • 0 = frame is not masked (i.e. masking key is not present).
Seeclient-to-server masking below.
9Payload length[57]7, 7+16 or 7+64Length of the payload (extension data + application data) in bytes.
  • 0–125 = This is the payload length.
  • 126 = The following 16 bits are the payload length.
  • 127 = The following 64 bits (MSB must be 0) are the payload length.
Endianness isbig-endian.Signedness isunsigned. Theminimum number of bits must be used to encode the length.
VariesMasking key[58]0 or 32Random nonce. Present if the masked field is 1. The client generates a masking key for every masked frame.
PayloadExtension dataPayload length (bytes)Must be empty unless defined by an extension.
Application dataDepends on the opcode

Opcodes

[edit]
Frame type[59]Opcode[60]Related

Web API

DescriptionPurpose
Fragmentable
Max. payload length (bytes)
Continuation frame0Non-first frame of a fragmented message.Message fragmentation263 − 1[c]
Non-control frameText1send(),onmessageUTF-8-encoded text.Data messageYes
Binary2Binary data.
3–7Reserved for further non-control frames. May be defined by an extension.[61]
Control frame[62]Close8close(),oncloseThe WebSocketclosing handshake starts upon either sending or receiving aClose frame.[63] It may prevent data loss by complementing theTCP closing handshake.[64] No frame can be sent after sending aClose frame. If aClose frame is received and no priorClose frame was sent, aClose frame must be sent in response (typically echoing the status code received). The payload is optional, but if present, it must start with a two-byte big-endian unsigned integerstatus code, optionally followed by a UTF-8-encoded reason message not longer than 123 bytes.[65]Protocol stateNo125
Ping9May be used forlatency measurement,keepalive andheartbeat. Both sides cansend a ping (with any payload). Whoever receives it must, as soon as is practical,send back a pong with the same payload. A pong should be ignored if no prior ping was sent.[66][67][68]
Pong10
11–15Reserved for further control frames. May be defined by an extension.[61]

Client-to-server masking

[edit]

Aclient must mask all frames sent to the server. Aserver must not mask any frames sent to the client.[69] Frame masking appliesXOR between the payload and the masking key. The followingpseudocode describes the algorithm used to both mask and unmask a frame.[58]

for ifrom 0to payload_length − 1   payload[i] := payload[i] xor masking_key[i mod 4]

Status codes

[edit]
Range[70]Allowed inClose frameCode

[71]

Description
0–999NoUnused
1000–2999 (Protocol)Yes1000Normal closure.
1001Going away (e.g. browser tab closed; server going down).
1002Protocol error.
1003Unsupported data (e.g. endpoint only understands text but received binary).
No1004Reserved for future usage
1005No code received.
1006Connection closed abnormally (i.e. closing handshake did not occur).
Yes1007Invalid payload data (e.g. non UTF-8 data in a text message).
1008Policy violated.
1009Message too big.
1010Unsupported extension. The client should write the extensions it expected the server to support in the payload.
1011Internal server error.
No1015TLS handshake failure.
3000–3999YesReserved for libraries, frameworks and applications. Registered directly withIANA.
4000–4999Private use.

Server implementation example

[edit]

In Python.

Note:recv() returns up to the amount of bytes requested. For readability, the code ignores that, thus it may fail in non-ideal network conditions.

importbase64importhashlibimportstructfromtypingimportOptionalfromsocketimportsocketasSocketdefhandle_websocket_connection(ws:Socket)->None:# Accept connectionconn,addr=ws.accept()# Receive and parse HTTP requestkey:Optional[bytes]=Noneforlineinconn.recv(4096).split(b"\r\n"):ifline.startswith(b"Sec-WebSocket-Key"):key=line.split()[-1]ifkeyisNone:raiseValueError("Sec-WebSocket-Key not found")# Send HTTP responsesec_accept=base64.b64encode(hashlib.sha1(key+b"258EAFA5-E914-47DA-95CA-C5AB0DC85B11").digest())conn.sendall(b"\r\n".join([b"HTTP/1.1 101 Switching Protocols",b"Connection: Upgrade",b"Upgrade: websocket",b"Sec-WebSocket-Accept: "+sec_accept,b"",b"",]))# Decode and print frameswhileTrue:byte0,byte1=conn.recv(2)fin:int=byte0>>7opcode:int=byte0&0b1111masked:int=byte1>>7assertmasked,"The client must mask all frames"ifopcode>=8:assertfin,"Control frames are unfragmentable"# Payload sizepayload_size:int=byte1&0b111_1111ifpayload_size==126:payload_size,=struct.unpack(">H",conn.recv(2))assertpayload_size>125,"The minimum number of bits must be used"elifpayload_size==127:payload_size,=struct.unpack(">Q",conn.recv(8))assertpayload_size>2**16-1,"The minimum number of bits must be used"assertpayload_size<=2**63-1,"The most significant bit must be zero"ifopcode>=8:assertpayload_size<=125,"Control frames must have up to 125 bytes"# Unmaskmasking_key:bytes=conn.recv(4)payload:bytearray=bytearray(conn.recv(payload_size))foriinrange(payload_size):payload[i]=payload[i]^masking_key[i%4]print("Received frame",FIN,opcode,payload)if__name__=="__main__":# Accept TCP connection on any interface at port 80ws:Socket=Socket()ws.bind(("",80))ws.listen()handle_websocket_connection(ws)

Browser support

[edit]

A secure version of the WebSocket protocol is implemented in Firefox 6,[72] Safari 6, Google Chrome 14,[73]Opera 12.10 andInternet Explorer 10.[74] A detailed protocol test suite report[75] lists the conformance of those browsers to specific protocol aspects.

An older, less secure version of the protocol was implemented in Opera 11 andSafari 5, as well as the mobile version of Safari iniOS 4.2.[76] The BlackBerry Browser in OS7 implements WebSockets.[77] Because of vulnerabilities, it was disabled in Firefox 4 and 5,[78] and Opera 11.[79]Using browser developer tools, developers can inspect the WebSocket handshake as well as the WebSocket frames.[80]

Protocol versionDraft dateInternet ExplorerFirefox[81]
(PC)
Firefox
(Android)
Chrome
(PC, Mobile)
Safari
(Mac, iOS)
Opera
(PC, Mobile)
Android Browser
hixie-75February 4, 201045.0.0
hixie-76
hybi-00
May 6, 2010
May 23, 2010
4.0
(disabled)
65.0.111.00
(disabled)
hybi-07, v7April 22, 20116[82][d]
hybi-10, v8July 11, 20117[84][d]714[85]
RFC 6455, v13December, 201110[86]111116[87]612.10[88]4.4

Server implementations

[edit]
  • Apache HTTP Server has supported WebSockets since July, 2013, implemented in version 2.4.5[91][92]
  • Internet Information Services added support for WebSockets in version 8 which was released withWindows Server 2012.[93]
  • lighttpd has supported WebSockets since 2017, implemented in lighttpd 1.4.46.[94] lighttpd mod_proxy can act as a reverse proxy and load balancer of WebSocket applications. lighttpd mod_wstunnel can act as a WebSocket endpoint to transmit arbitrary data, including inJSON format, to a backend application. lighttpd supports WebSockets over HTTP/2 since 2022, implemented in lighttpd 1.4.65.[95]
  • Eclipse Mosquitto This is anMQTT broker, but it supports the MQTT over WebSocket. So, it can be considered a type of WebSocket implementation.

ASP.NET Core have support for WebSockets using theapp.UseWebSockets(); middleware.[96]

Security considerations

[edit]

Unlike regular cross-domain HTTP requests, WebSocket requests are not restricted by thesame-origin policy. Therefore, WebSocket servers must validate the "Origin" header against the expected origins during connection establishment, to avoid cross-site WebSocket hijacking attacks (similar tocross-site request forgery), which might be possible when the connection is authenticated withcookies or HTTP authentication. It is better to use tokens or similar protection mechanisms to authenticate the WebSocket connection when sensitive (private) data is being transferred over the WebSocket.[97] A live example of vulnerability was seen in 2020 in the form ofCable Haunt.

Proxy traversal

[edit]

WebSocket protocol client implementations try to detect whether theuser agent is configured to use a proxy when connecting to destination host and port, and if it is, usesHTTP CONNECT method to set up a persistent tunnel.

The WebSocket protocol is unaware of proxy servers and firewalls. Some proxy servers are transparent and work fine with WebSocket; others will prevent WebSocket from working correctly, causing the connection to fail. In some cases, additional proxy-server configuration may be required, and certain proxy servers may need to be upgraded to support WebSocket.

If unencrypted WebSocket traffic flows through an explicit or a transparent proxy server without WebSockets support, the connection will likely fail.[98]

If an encrypted WebSocket connection is used, then the use ofTransport Layer Security (TLS) in the WebSocket Secure connection ensures that anHTTP CONNECT command is issued when the browser is configured to use an explicit proxy server. This sets up a tunnel, which provides low-level end-to-end TCP communication through the HTTP proxy, between the WebSocket Secure client and the WebSocket server. In the case of transparent proxy servers, the browser is unaware of the proxy server, so noHTTP CONNECT is sent. However, since the wire traffic is encrypted, intermediate transparent proxy servers may simply allow the encrypted traffic through, so there is a much better chance that the WebSocket connection will succeed if WebSocket Secure is used. Using encryption is not free of resource cost, but often provides the highest success rate, since it would be travelling through a secure tunnel.

A mid-2010 draft (version hixie-76) broke compatibility withreverse proxies and gateways by including eight bytes of key data after the headers, but not advertising that data in aContent-Length: 8 header.[99] This data was not forwarded by all intermediates, which could lead to protocol failure. More recent drafts (e.g., hybi-09[100]) put the key data in aSec-WebSocket-Key header, solving this problem.

See also

[edit]

Notes

[edit]
  1. ^TheURL parsing algorithm is described athttps://url.spec.whatwg.org/#concept-basic-url-parser
  2. ^The plus sign representsstring concatenation.
  3. ^The specification only explicitly restricts control frames. Thus, all other frames are restricted by the protocol limit of 63 bits for payload length (as the most significant bit must be zero).
  4. ^abGecko-based browsers versions 6–10 implement the WebSocket object as "MozWebSocket",[83] requiring extra code to integrate with existing WebSocket-enabled code.

References

[edit]
  1. ^"WebSockets Standard".WHATWG WebSockets.Archived from the original on 2023-03-12. Retrieved2022-05-16.
  2. ^"The WebSocket API".www.w3.org.Archived from the original on 2022-06-08. Retrieved2022-05-16.
  3. ^Ian Fette; Alexey Melnikov (December 2011)."Relationship to TCP and HTTP".RFC 6455 The WebSocket Protocol.IETF. sec. 1.7.doi:10.17487/RFC6455.RFC6455.
  4. ^"Adobe Flash Platform – Sockets".help.adobe.com.Archived from the original on 2021-04-18. Retrieved2021-07-28.TCP connections require a "client" and a "server". Flash Player can create client sockets.
  5. ^"The WebSocket API (WebSockets)".MDN Web Docs. Mozilla Developer Network. 2023-04-06.Archived from the original on 2021-07-28. Retrieved2021-07-26.
  6. ^"WebSocket - Resonite Wiki".wiki.resonite.com. Retrieved2025-07-18.
  7. ^Graham Klyne, ed. (2011-11-14)."IANA Uniform Resource Identifier (URI) Schemes".Internet Assigned Numbers Authority.Archived from the original on 2013-04-25. Retrieved2011-12-10.
  8. ^Ian Fette; Alexey Melnikov (December 2011)."WebSocket URIs".RFC 6455 The WebSocket Protocol.IETF. sec. 3.doi:10.17487/RFC6455.RFC6455.
  9. ^"HTML 5".www.w3.org.Archived from the original on 2016-09-16. Retrieved2016-04-17.
  10. ^"[whatwg] TCPConnection feedback from Michael Carter on 2008-06-18 (whatwg.org from June 2008)".lists.w3.org.Archived from the original on 2016-04-27. Retrieved2016-04-17.
  11. ^"IRC logs: freenode / #whatwg / 20080618".krijnhoetmer.nl.Archived from the original on 2016-08-21. Retrieved2016-04-18.
  12. ^"Web Sockets Now Available In Google Chrome".Chromium Blog.Archived from the original on 2021-12-09. Retrieved2016-04-17.
  13. ^<ian@hixie.ch>, Ian Hickson (6 May 2010)."The WebSocket protocol".Ietf Datatracker.Archived from the original on 2017-03-17. Retrieved2016-04-17.
  14. ^"Introduction".WHATWG WebSockets. sec. 1.
  15. ^"Interface definition".WHATWG WebSockets. sec. 3.1.Archived from the original on 2023-03-12. Retrieved2024-04-10.
  16. ^"new WebSocket(url, protocols)".WHATWG WebSockets. sec. 3.1.Archived from the original on 2023-03-12. Retrieved2024-04-30.
  17. ^"send(data)".WHATWG WebSockets. sec. 3.1.
  18. ^"close(code, reason)".WHATWG WebSockets. sec. 3.1.Archived from the original on 2023-03-12. Retrieved2024-04-10.
  19. ^"When a WebSocket message has been received".WHATWG WebSockets. sec. 4.
  20. ^ab"When the WebSocket connection is closed; substep 3".WHATWG WebSockets. sec. 4.Archived from the original on 2023-03-12. Retrieved2024-04-13.
  21. ^abThe WebSocket Connection is Closed. sec. 7.1.4.doi:10.17487/RFC6455.RFC6455.
  22. ^The WebSocket Connection Close Code. sec. 7.1.5.doi:10.17487/RFC6455.RFC6455.
  23. ^The WebSocket Connection Close Reason. sec. 7.1.6.doi:10.17487/RFC6455.RFC6455.
  24. ^"socket.binaryType".WHATWG WebSockets. sec. 3.1.
  25. ^"socket.bufferedAmount".WHATWG WebSockets. sec. 3.1.
  26. ^"ready state".WHATWG WebSockets. sec. 3.1.
  27. ^"CONNECTING".WHATWG WebSockets. sec. 3.1.Archived from the original on 2023-03-12. Retrieved2024-04-13.
  28. ^Client Requirements. p. 14. sec. 4.1.doi:10.17487/RFC6455.RFC6455.
  29. ^"OPEN".WHATWG WebSockets. sec. 3.1.Archived from the original on 2023-03-12. Retrieved2024-04-10.
  30. ^_The WebSocket Connection is Established_. p. 20.doi:10.17487/RFC6455.RFC6455.
  31. ^"CLOSING".WHATWG WebSockets. sec. 3.1.Archived from the original on 2023-03-12. Retrieved2024-04-10.
  32. ^The WebSocket Closing Handshake is Started. sec. 7.1.3.doi:10.17487/RFC6455.RFC6455.
  33. ^"CLOSED".WHATWG WebSockets. sec. 3.1.Archived from the original on 2023-03-12. Retrieved2024-04-10.
  34. ^Opening Handshake. sec. 1.3.doi:10.17487/RFC6455.RFC6455.
  35. ^abcProtocol Overview. sec. 1.2.doi:10.17487/RFC6455.RFC6455.
  36. ^Client requirement 8. p. 18.doi:10.17487/RFC6455.RFC6455.
  37. ^Client requirement 4. p. 17.doi:10.17487/RFC6455.RFC6455.
  38. ^Client requirement 9. p. 18.doi:10.17487/RFC6455.RFC6455.
  39. ^Client requirement 7. p. 18.doi:10.17487/RFC6455.RFC6455.
  40. ^Server step 5.4. p. 24.doi:10.17487/RFC6455.RFC6455.
  41. ^Client requirement 6. p. 18.doi:10.17487/RFC6455.RFC6455.
  42. ^Server step 5.3. p. 24.doi:10.17487/RFC6455.RFC6455.
  43. ^Client requirement 5. p. 17.doi:10.17487/RFC6455.RFC6455.
  44. ^Server step 5.2. p. 24.doi:10.17487/RFC6455.RFC6455.
  45. ^Client requirement 10. p. 18.doi:10.17487/RFC6455.RFC6455.
  46. ^Client requirement 11. p. 19.doi:10.17487/RFC6455.RFC6455.
  47. ^Sec-WebSocket-Extensions. sec. 11.3.2.doi:10.17487/RFC6455.RFC6455.
  48. ^Extensions. sec. 9.doi:10.17487/RFC6455.RFC6455.
  49. ^Negotiating Extensions. sec. 9.1.doi:10.17487/RFC6455.RFC6455.
  50. ^"Main Goal of WebSocket protocol". IETF.Archived from the original on 22 April 2016. Retrieved25 July 2015.The computation [...] is meant to prevent a caching intermediary from providing a WS-client with a cached WS-server reply without actual interaction with the WS-server.
  51. ^Fragmentation. sec. 5.4.doi:10.17487/RFC6455.RFC6455.
  52. ^John A. Tamplin; Takeshi Yoshino (2013).A Multiplexing Extension for WebSockets.IETF. I-D draft-ietf-hybi-websocket-multiplexing.
  53. ^Base Framing Protocol. sec. 5.2.doi:10.17487/RFC6455.RFC6455.
  54. ^FIN. p. 28.doi:10.17487/RFC6455.RFC6455.
  55. ^RSV1, RSV2, RSV3. p. 28.doi:10.17487/RFC6455.RFC6455.
  56. ^Mask. p. 29.doi:10.17487/RFC6455.RFC6455.
  57. ^Payload length. p. 29.doi:10.17487/RFC6455.RFC6455.
  58. ^abClient-to-Server Masking. sec. 5.3.doi:10.17487/RFC6455.RFC6455.
  59. ^frame-opcode. p. 31.doi:10.17487/RFC6455.RFC6455.
  60. ^Opcode. p. 29.doi:10.17487/RFC6455.RFC6455.
  61. ^abExtensibility. sec. 5.8.doi:10.17487/RFC6455.RFC6455.
  62. ^Control Frames. sec. 5.5.doi:10.17487/RFC6455.RFC6455.
  63. ^The WebSocket Closing Handshake is Started. sec. 7.1.3.doi:10.17487/RFC6455.RFC6455.
  64. ^Closing Handshake. sec. 1.4.doi:10.17487/RFC6455.RFC6455.
  65. ^Close. sec. 5.5.1.doi:10.17487/RFC6455.RFC6455.
  66. ^Ping. sec. 5.5.2.doi:10.17487/RFC6455.RFC6455.
  67. ^Pong. sec. 5.5.3.doi:10.17487/RFC6455.RFC6455.
  68. ^"Ping and Pong frames".WHATWG WebSockets.
  69. ^Overview. sec. 5.1.doi:10.17487/RFC6455.RFC6455.
  70. ^Reserved Status Code Ranges. sec. 7.4.2.doi:10.17487/RFC6455.RFC6455.
  71. ^Defined Status Codes. sec. 7.4.1.doi:10.17487/RFC6455.RFC6455.
  72. ^Dirkjan Ochtman (May 27, 2011)."WebSocket enabled in Firefox 6".Mozilla.org. Archived fromthe original on 2012-05-26. Retrieved2011-06-30.
  73. ^"Chromium Web Platform Status".Archived from the original on 2017-03-04. Retrieved2011-08-03.
  74. ^"WebSockets (Windows)". Microsoft. 2012-09-28.Archived from the original on 2015-03-25. Retrieved2012-11-07.
  75. ^"WebSockets Protocol Test Report". Tavendo.de. 2011-10-27. Archived fromthe original on 2016-09-22. Retrieved2011-12-10.
  76. ^Katie Marsal (November 23, 2010)."Apple adds accelerometer, WebSockets support to Safari in iOS 4.2".AppleInsider.com.Archived from the original on 2011-03-01. Retrieved2011-05-09.
  77. ^"Web Sockets API".BlackBerry. Archived fromthe original on June 10, 2011. Retrieved8 July 2011.
  78. ^Chris Heilmann (December 8, 2010)."WebSocket disabled in Firefox 4".Hacks.Mozilla.org.Archived from the original on 2017-03-06. Retrieved2011-05-09.
  79. ^Aleksander Aas (December 10, 2010)."Regarding WebSocket".My Opera Blog. Archived fromthe original on 2010-12-15. Retrieved2011-05-09.
  80. ^Wang, Vanessa; Salim, Frank; Moskovits, Peter (February 2013)."APPENDIX A: WebSocket Frame Inspection with Google Chrome Developer Tools".The Definitive Guide to HTML5 WebSocket. Apress.ISBN 978-1-4302-4740-1. Archived fromthe original on 31 December 2015. Retrieved7 April 2013.
  81. ^"WebSockets (support in Firefox)".developer.mozilla.org. Mozilla Foundation. 2011-09-30. Archived fromthe original on 2012-05-26. Retrieved2011-12-10.
  82. ^"Bug 640003 - WebSockets - upgrade to ietf-06". Mozilla Foundation. 2011-03-08.Archived from the original on 2021-04-01. Retrieved2011-12-10.
  83. ^"WebSockets - MDN".developer.mozilla.org. Mozilla Foundation. 2011-09-30. Archived fromthe original on 2012-05-26. Retrieved2011-12-10.
  84. ^"Bug 640003 - WebSockets - upgrade to ietf-07(comment 91)". Mozilla Foundation. 2011-07-22.Archived from the original on 2021-04-01. Retrieved2011-07-28.
  85. ^"Chromium bug 64470".code.google.com. 2010-11-25.Archived from the original on 2015-12-31. Retrieved2011-12-10.
  86. ^"WebSockets in Windows Consumer Preview".IE Engineering Team. Microsoft. 2012-03-19.Archived from the original on 2015-09-06. Retrieved2012-07-23.
  87. ^"WebKit Changeset 97247: WebSocket: Update WebSocket protocol to hybi-17".trac.webkit.org.Archived from the original on 2012-01-05. Retrieved2011-12-10.
  88. ^"A hot Opera 12.50 summer-time snapshot". Opera Developer News. 2012-08-03. Archived fromthe original on 2012-08-05. Retrieved2012-08-03.
  89. ^"Welcome to nginx!".nginx.org. Archived fromthe original on 17 July 2012. Retrieved3 February 2022.
  90. ^"Using NGINX as a WebSocket Proxy".NGINX. May 17, 2014.Archived from the original on October 6, 2019. RetrievedNovember 3, 2019.
  91. ^"Overview of new features in Apache HTTP Server 2.4".Apache.Archived from the original on 2020-11-11. Retrieved2021-01-26.
  92. ^"Changelog Apache 2.4".Apache Lounge.Archived from the original on 2021-01-22. Retrieved2021-01-26.
  93. ^"IIS 8.0 WebSocket Protocol Support".Microsoft Docs. 28 November 2012.Archived from the original on 2020-02-18. Retrieved2020-02-18.
  94. ^"Release-1 4 46 - Lighttpd - lighty labs".Archived from the original on 2021-01-16. Retrieved2020-12-29.
  95. ^"Release-1 4 65 - Lighttpd - lighty labs".Archived from the original on 2024-05-03. Retrieved2024-05-03.
  96. ^"WebSockets support in ASP.NET Core".learn.microsoft.com. Retrieved2 May 2025.
  97. ^Christian Schneider (August 31, 2013)."Cross-Site WebSocket Hijacking (CSWSH)".Web Application Security Blog.Archived from the original on December 31, 2016. RetrievedDecember 30, 2015.
  98. ^Peter Lubbers (March 16, 2010)."How HTML5 Web Sockets Interact With Proxy Servers".Infoq.com. C4Media Inc.Archived from the original on 2016-05-08. Retrieved2011-12-10.
  99. ^Willy Tarreau (2010-07-06)."WebSocket -76 is incompatible with HTTP reverse proxies".ietf.org (email). Internet Engineering Task Force.Archived from the original on 2016-09-17. Retrieved2011-12-10.
  100. ^Ian Fette (June 13, 2011)."Sec-WebSocket-Key".The WebSocket protocol, draft hybi-09. sec. 11.4. RetrievedJune 15, 2011.Archived February 1, 2016, at theWayback Machine

External links

[edit]
Features, standards & protocols
Features
Web standards
Protocols
Active
Blink-based
Proprietary
FOSS
Gecko-based
WebKit-based
Multi-engine
Other
Discontinued
Blink-based
Gecko-based
MSHTML-based
WebKit-based
Other
Protocols
Server APIs
Apache modules
Topics
Browser APIs
Web APIs
WHATWG
W3C
Khronos
Others
Topics
Related topics
Retrieved from "https://en.wikipedia.org/w/index.php?title=WebSocket&oldid=1318864536"
Categories:
Hidden categories:

[8]ページ先頭

©2009-2025 Movatter.jp