This is the last lecture of the "Ice Breaking" section. I will first briefly review the previous content, and then actually operate on the Windows system, using several application software to build a "minimized" HTTP experimental environment to facilitate the subsequent learning of the "Basics", "Advanced" and "Security" sections. Review of “Ice Breaking” The HTTP protocol was born 30 years ago and was originally designed to transmit plain text data. However, due to its flexible form and the ability to connect all resources on the Internet with technologies such as URI and HTML to form a complex hypertext system that allows people to freely access information, it has developed rapidly. HTTP has multiple versions. The most widely used one is HTTP/1.1, which can almost be said to be the cornerstone of the entire Internet. However, the performance of HTTP/1.1 is difficult to meet the needs of today's high-traffic websites, so HTTP/2 and HTTP/3 appeared. However, these two new versions of the protocol have not yet been fully promoted. In the foreseeable future, HTTP/1.1 will continue to exist. HTTP is translated into Chinese as "Hypertext Transfer Protocol". It is an application layer protocol, usually based on TCP/IP, which can transmit text, pictures, audio, video and other data between any two points in the network. The two endpoints in the HTTP protocol are called the requester and the responder. The requester is usually a web browser, also called a user agent, and the responder is a web server, which stores most of the static or dynamic resources on the network. There are some "middlemen" between the browser and the server, such as CDN, gateway, proxy, etc. They also comply with the HTTP protocol and can help users obtain resources more quickly and securely. HTTP is not an isolated protocol, but requires the cooperation of many other protocols at the lower level. The most basic one is TCP/IP, which implements addressing, routing and reliable data transmission, and the DNS protocol, which implements the location search of hosts on the Internet. A more accurate name for HTTP is "HTTP over TCP/IP", and another "HTTP over SSL/TLS" is HTTPS with added security features. Software Introduction As the saying goes, "Practice makes perfect", and there is also a saying that "Talking without practice is just a lie". To study the HTTP protocol, it is best to have a practical, operational and verifiable environment. Learning through actual data and phenomena is definitely much better than simply "talking". Of course there are ready-made environments. As long as you can use a browser to access the Internet, there will be HTTP protocol, and you can conduct experiments. But the real network environment is too complicated, with many irrelevant interference factors, and these "noises" will "drowned" the truly useful information. So, my suggestion to you is: build a "minimal" environment, in which there are only two endpoints of the HTTP protocol: the requester and the responder, and remove all unnecessary links so that you can grasp the key points and quickly grasp the essence of HTTP. Let me briefly talk about the application software used in this "minimized" environment:
Wireshark is a well-known network packet capture tool that can intercept all traffic transmitted in the TCP/IP protocol stack and filter it arbitrarily by protocol type, address, port, etc. It is very powerful and is an essential tool for learning network protocols. It is like a "high-speed camera" in the online world, which "films" the network transmission process that happens in just a moment, and then "slows down" it afterwards, allowing us to calm down and carefully analyze what happened at that moment. Chrome is a browser developed by Google and is one of the mainstream browsers. It is not only convenient for surfing the Internet, but also a good debugger. It supports HTTP/1.1, HTTPS, HTTP/2, QUIC and other protocols very well. You can use F12 to open the "Developer Tools" to observe various data in the entire HTTP transmission process in great detail. If you are more accustomed to using Firefox, that's fine. In fact, its functions are not much different from Chrome. Just choose the one you like. Unlike Wireshark, Chrome and Firefox are “experts after the fact” and cannot observe the HTTP transmission process, but only the results. Telnet is a classic virtual terminal that logs into the host remotely based on the TCP protocol. We can use it to simulate the behavior of the browser, manually send HTTP requests after connecting to the server, and completely eliminate the interference of the browser, so that we can study the HTTP protocol from the most primitive level. You may be unfamiliar with OpenResty. It is an "enhanced package" based on Nginx. In addition to Nginx, it also contains a lot of useful functional modules. It not only supports HTTP/HTTPS, but also integrates the scripting language Lua to simplify Nginx secondary development, facilitate and quickly build dynamic gateways, and can be used as an application container to write business logic. The reason for choosing OpenResty instead of using Nginx directly is that it is equivalent to a "superset" of Nginx, with richer functions and easier installation and deployment. I will also use Lua to write some server-side scripts to implement simple Web server response logic for easy experimentation. Installation Process The installation process of this "minimized" environment is also relatively simple, and it only takes you less than half an hour to complete it. I have created a project for this column on GitHub: http_study. You can download it directly using "git clone" or go to the Release page to download the compressed package. The operating environment I use is Windows 10. If you are using Mac or Linux, you can use virtual machine software such as VirtualBox to install a Windows virtual machine and then operate in it. First, you need to get the latest http_study project source code. Assuming the cloned or unzipped directory is "D:\http_study", the completed operation should look like the following figure. The installation of Chrome and WireShark is relatively simple, just click "Next" all the way. Use the latest version. My version may not be the latest, Chrome is 73, WireShark is 3.0.0. Windows 10 comes with Telnet, which does not need to be installed, but it is not enabled by default, so you need to configure it a little bit. Open the Windows settings window, search for "Telnet", and you will find "Turn Windows features on or off". In this window, find "Telnet Client" and check the box. You can refer to the screenshot. Next, we need to install OpenResty. Go to its official website, click "Download" in the left column, enter the download page, and download the version suitable for your system (here I downloaded the 64-bit 1.15.8.1, the package name is "openresty-1.15.8.1-win64.zip"). Then please note that you must unzip the OpenResty compressed package into the "D:\http_study" directory just now and rename it to "openresty". The installation work is about to be completed. In order to enable the browser to use the DNS domain name to access our experimental environment, we also need to modify the local hosts file, located in "C:\WINDOWS\system32\drivers\etc", and add three lines of mapping from the local IP address to the test domain name. You can also refer to the hosts file in the GitHub project. This is equivalent to "hosting" three virtual hosts on a physical machine.
Note that modifying the hosts file requires administrator privileges. Editing it directly with Notepad will not work. You can switch to administrator status, or use other advanced editors, such as Notepad++. It is also best to make a backup before making any changes. At this point, our installation is complete! After that, you can use Wireshark, Chrome, and Telnet to "tamper" with this environment at will. It doesn't matter if you break it. Just delete the directory and perform the operation again to restore it. Test verification The experimental environment has been set up, but it still needs to be run and a simple test verification is performed to see if it is running normally. First we have to start the web server, which is OpenResty. There are four batch files in the "www" directory of http_study, namely:
Double-click the "start" batch file to start the OpenResty server and run it in the background. During this process, there may be a warning from the Windows Firewall. Just select "Allow". After running, double-click "list" to check whether OpenResty has started normally. There should be two nginx.exe background processes, as shown in the figure below. Now that we have a web server, we need to run Wireshark and start capturing packets. Because our experimental environment runs on the local 127.0.0.1, which is the loopback address. Therefore, in Wireshark, we need to select "Npcap loopback Adapter" and select "HTTP TCP port (80)" as the filter, that is, only capture HTTP-related data packets. Double-click "Npcap loopback Adapter" in the start interface to start capturing network data on the local machine. Then we open Chrome, enter "http://localhost/" in the address bar, access the OpenResty server just started, and you will see a simple welcome interface as shown below. At this time, if you look back at Wireshark, it should show that some data has been captured. You can use the mouse to click the "Stop Capture" button in the toolbar to tell Wireshark to "stop here" and stop capturing packets. As for what these data are and what they mean, I will introduce them in detail in the next lecture. If you can get to this step on your computer, it means that the "minimized" experimental environment has been successfully built. Don't forget to run the batch "stop" to stop the OpenResty server after the experiment. summary This time we learned how to build an HTTP experimental environment on our own computer. Here is a brief summary of today's content.
Homework
|
<<: The truth about 5G speed, is your 5G package worth it?
>>: How did the maximum distance of network cable data transmission reach 100 meters?
Maxthon Hosting has long provided 20% discount co...
The networking world is known for widespread chan...
The Gulf Cooperation Council (GCC) countries have...
V5.NET Server is promoting Huawei Cloud dedicated...
Yecao Cloud has launched a 2024 Spring Festival p...
But in any case, from 1G to 5G, it has developed ...
The advent of 5G technology will revolutionize th...
On January 8, 2023, China Academy of Information ...
The Year of the Rooster has arrived! Good luck to...
From networking and integration to failover, asse...
The epidemic has given rise to many new formats a...
Many friends asked about the knowledge related to...
In the article "Understanding OAuth2 through...
[51CTO.com original article] "Stable and rel...
Recently, Acumen Research and Consulting, a globa...