I am learning XMPP by reading the spec and trying to follow basic workflows.
I tried Openfire 3.8.2 and I recognized some inconsistencies:
SASL negoatiation seems to be implemented wrong:
Openfire does not respond with an appropriate failure, but instead always sends
So if I send an with an invalid mechanism I would have expected:
If I send an auth with invalid base64 I would have expected:
Openfire also does not respond with a
when aborting the negotiation, but instead closes the stream. http://xmpp.org/rfcs/rfc6120.html#sasl-errors-aborted
I think these are bugs in the implementation.
Could you comment on it?