Return-Path: X-Original-To: apmail-zookeeper-dev-archive@www.apache.org Delivered-To: apmail-zookeeper-dev-archive@www.apache.org Received: from mail.apache.org (hermes.apache.org [140.211.11.3]) by minotaur.apache.org (Postfix) with SMTP id 67BA8D72A for ; Wed, 11 Jul 2012 13:59:58 +0000 (UTC) Received: (qmail 89162 invoked by uid 500); 11 Jul 2012 13:59:58 -0000 Delivered-To: apmail-zookeeper-dev-archive@zookeeper.apache.org Received: (qmail 88333 invoked by uid 500); 11 Jul 2012 13:59:56 -0000 Mailing-List: contact dev-help@zookeeper.apache.org; run by ezmlm Precedence: bulk List-Help: List-Unsubscribe: List-Post: List-Id: Reply-To: dev@zookeeper.apache.org Delivered-To: mailing list dev@zookeeper.apache.org Delivered-To: moderator for dev@zookeeper.apache.org Received: (qmail 30815 invoked by uid 99); 11 Jul 2012 13:16:32 -0000 X-ASF-Spam-Status: No, hits=0.3 required=5.0 tests=RCVD_IN_DNSWL_LOW,SPF_SOFTFAIL X-Spam-Check-By: apache.org Received-SPF: softfail (athena.apache.org: transitioning domain of adc@toolazydogs.com does not designate 209.85.160.42 as permitted sender) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=from:content-type:content-transfer-encoding:subject:date:message-id :to:mime-version:x-mailer:x-gm-message-state; bh=X8UP59RcywXcUH0TaJecqcIJ+ZD1xw8AK8xTt511/So=; b=Dux52yPk/XxHd4hxjHJJJ82UgeOwdY8Y26e8krFUXmI1kEcFn3JSmF/vRoDdWmgqHW fWtjuYlM0ktvnzEkKS5x4avSEQLzcBQaAzePtsWilpxPz+M/iyRcDAXLDkHof3NdQPv/ S837j+GpEnkOsQ/4Jga6fu2fCK2pGH+OT6G4t5ZzzVZBph1FHERj2YkxtYvFceF+iSiw 5p7DfOE+RCfltKuk7xhHMcw34ABSfg1eIiEI4XWQSWozWFDzSR5TkKot+KsZwPq9NyLq C6EBfD2s1YYAi1Fs3oosu4XDo2nY39po9Bc/IltKHxAYNHN0OavDEkTNAGhjg+7bk86i yfoA== From: "Alan D. Cabrera" Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: quoted-printable Subject: Sending an invalid auth scheme Date: Wed, 11 Jul 2012 06:15:52 -0700 Message-Id: <8FEA4DBB-1363-44E1-BE6F-6826A204513F@toolazydogs.com> To: dev@zookeeper.apache.org Mime-Version: 1.0 (Apple Message framework v1278) X-Mailer: Apple Mail (2.1278) X-Gm-Message-State: ALoCoQkW50na3dyEep2BYo+81D9LXCsrQ5tVp6M4BhBk6U8t1KxfDWuWuUTnhfo9i1A1QSFJjmg2 X-Virus-Checked: Checked by ClamAV on apache.org It seems that if the client sends an invalid auth scheme the server = simply drops the connection without returning an error packet. Is this = true? If this is true is this desired behavior? Regards, Alan =20=