On Wed Mar 4 12:58:15 2009, Norman Rasmussen wrote: > SSL handshake has read 4027 bytes and written 456 bytes > --- > New, TLSv1/SSLv3, Cipher is AES256-SHA > Server public key is 2048 bit > Compression: NONE > Expansion: NONE > SSL-Session: > Protocol : TLSv1 > Cipher : AES256-SHA > Session-ID: > 17EE056A1983610BE3A9C7740CC2A2573E67F1A68A01324A49790407F1B43665 > Session-ID-ctx: > Master-Key: > 76CF7657109C181CAD208821F47B9F195C2801E72820A72C07B19A64A4118C4DBA7C20C7F9B5F52602C45C8241F96064 > Key-Arg : None > Start Time: 1236171444 > Timeout : 300 (sec) > Verify return code: 20 (unable to get local issuer certificate)
That simply means you're using a SSLv2 handshake. Using an SSLv3 or TLS handshake *will* give you compression, assuming your OpenSSL is built right, which it probably is. > No features, so XEP-0138 isn't being offered. :-( > As far as I know there are no server implementations that offer > XEP-0138 via > s2s at this point in time. dave.cridland.net should be, Isode M-Link has supported it for some time - more or less from its initial release. I didn't realise it wasn't popular on S2S, so it's had little interop testing, but it ought to work both incoming and outgoing. (We also do TLS compression, although there's some known bugs there in current releases, but I tend to run somewhat trunky code, so it'll work). Note that it shouldn't offer XEP-0138 if TLS compression is enabled, but I admit to not having tested that for a while. Dave. -- Dave Cridland - mailto:[email protected] - xmpp:[email protected] - acap://acap.dave.cridland.net/byowner/user/dwd/bookmarks/ - http://dave.cridland.net/ Infotrope Polymer - ACAP, IMAP, ESMTP, and Lemonade _______________________________________________ JDev mailing list Forum: http://www.jabberforum.org/forumdisplay.php?f=20 Info: http://mail.jabber.org/mailman/listinfo/jdev Unsubscribe: [email protected] _______________________________________________
