An Open Source MQTT v3.1/v3.1.1 Broker
http://mosquitto.org/
Mosquitto is an open source (BSD licensed) message broker that implements the
MQ Telemetry Transport protocol versions 3.1 and 3.1.1. MQTT provides a
lightweight method of carrying out messaging using a publish/subscribe model.
This makes it suitable for "machine to machine" messaging such as with low
power sensors or mobile devices such as phones, embedded computers or
microcontrollers like the Arduino. A good example of this is all of the work
that Andy Stanford-Clark (one of the originators of MQTT) has done in home
monitoring and automation with his twittering house and twittering ferry.
- Links to network:messaging:mqtt / mosquitto
- Has a link diff
- Download package
-
Checkout Package
osc -A https://api.opensuse.org checkout home:mnhauke/mosquitto && cd $_
- Create Badge
Refresh
Refresh
Source Files (show merged sources derived from linked package)
Filename | Size | Changed |
---|---|---|
_link | 0000000263 263 Bytes | |
mosquitto-2.0.18.tar.gz | 0000796351 778 KB | |
mosquitto-2.0.18.tar.gz.sig | 0000000833 833 Bytes | |
project.diff | 0000004092 4 KB |
Latest Revision
Martin Hauke (mnhauke)
committed
(revision 73)
- Update to version 2.0.18 Broker: * Fix crash on subscribe under certain unlikely conditions. Clients: * Fix mosquitto_rr not honouring `-R`. - Update to version 2.0.17 Broker: * Fix `max_queued_messages 0` stopping clients from receiving messages. * Fix `max_inflight_messages` not being set correctly. Apps: * Fix `mosquitto_passwd -U` backup file creation. - Update to version 2.0.16 Security: * CVE-2023-28366: Fix memory leak in broker when clients send multiple QoS 2 messages with the same message ID, but then never respond to the PUBREC commands. * CVE-2023-0809: Fix excessive memory being allocated based on malicious initial packets that are not CONNECT packets. * CVE-2023-3592: Fix memory leak when clients send v5 CONNECT packets with a will message that contains invalid property types. * Broker will now reject Will messages that attempt to publish to $CONTROL/. * Broker now validates usernames provided in a TLS certificate or TLS-PSK identity are valid UTF-8. * Fix potential crash when loading invalid persistence file. * Library will no longer allow single level wildcard certificates, e.g. *.com Broker:
Comments 0