Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

OF-2919: Prevent exception after S2S TLS fails #2623

Merged

Conversation

guusdk
Copy link
Member

@guusdk guusdk commented Nov 26, 2024

When TLS fails in a server-to-server connection, this frequently is followed up with another exception, mentioning that a ^W character couldn't be parsed as valid XMPP.

This End-of-Transmission character is likely sent by the peer, as the end of the (failed) TLS handshake. Openfire should let the TLS handler process that character. This prevents the XMPP handler from having to process it.

When TLS fails in a server-to-server connection, this frequently is followed up with another exception, mentioning that a `^W` character couldn't be parsed as valid XMPP.

This End-of-Transmission character is likely sent by the peer, as the end of the (failed) TLS handshake. Openfire should let the TLS handler process that character. This prevents the XMPP handler from having to process it.
@guusdk
Copy link
Member Author

guusdk commented Nov 27, 2024

Merging this without a review to get it tested on Ignite.

@guusdk guusdk merged commit 9b4ce6f into igniterealtime:main Nov 27, 2024
17 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant