AnsweredAssumed Answered

java.net.SocketException: Software caused connection abort: socket write error

Question asked by Jayachandran.Anbalagan on Mar 8, 2018
Latest reply on Mar 28, 2018 by Jayachandran.Anbalagan

 devtest10.2 ca devtest 10.2

I

am getting below error executing REST Step. SSL Debug logs attached. added https.protocols=SSLv3,TLSv1,TLSv1.1,TLSv1.2 in local.properties

 

============================================================================ | HTTP ============================================================================ | Step: ACN Alias Resolution Alpha 8 chars ---------------------------------------------------------------------------- | Message: java.net.SocketException: Software caused connection abort: socket write error ---------------------------------------------------------------------------- | Trapped Exception: Software caused connection abort: socket write error | Trapped Message: java.net.SocketException: Software caused connection abort: socket write error ---------------------------------------------------------------------------- STACK TRACE java.net.SocketException: Software caused connection abort: socket write error at java.net.SocketOutputStream.socketWrite0(Native Method) at java.net.SocketOutputStream.socketWrite(SocketOutputStream.java:109) at java.net.SocketOutputStream.write(SocketOutputStream.java:153) at sun.security.ssl.OutputRecord.writeBuffer(OutputRecord.java:431) at sun.security.ssl.OutputRecord.write(OutputRecord.java:417) at sun.security.ssl.SSLSocketImpl.writeRecordInternal(SSLSocketImpl.java:876) at sun.security.ssl.SSLSocketImpl.writeRecord(SSLSocketImpl.java:847) at sun.security.ssl.SSLSocketImpl.writeRecord(SSLSocketImpl.java:717) at sun.security.ssl.Handshaker.sendChangeCipherSpec(Handshaker.java:1077) at sun.security.ssl.ClientHandshaker.sendChangeCipherAndFinish(ClientHandshaker.java:1222) at sun.security.ssl.ClientHandshaker.serverHelloDone(ClientHandshaker.java:1134) at sun.security.ssl.ClientHandshaker.processMessage(ClientHandshaker.java:348) at sun.security.ssl.Handshaker.processLoop(Handshaker.java:979) at sun.security.ssl.Handshaker.process_record(Handshaker.java:914) at sun.security.ssl.SSLSocketImpl.readRecord(SSLSocketImpl.java:1062) at sun.security.ssl.SSLSocketImpl.performInitialHandshake(SSLSocketImpl.java:1375) at sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:1403) at sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:1387) at org.apache.http.conn.ssl.SSLSocketFactory.connectSocket(SSLSocketFactory.java:535) at org.apache.http.conn.ssl.SSLSocketFactory.connectSocket(SSLSocketFactory.java:403) at org.apache.http.impl.conn.DefaultClientConnectionOperator.openConnection(DefaultClientConnectionOperator.java:177) at org.apache.http.impl.conn.ManagedClientConnectionImpl.open(ManagedClientConnectionImpl.java:304) at org.apache.http.impl.client.DefaultRequestDirector.tryConnect(DefaultRequestDirector.java:611) at org.apache.http.impl.client.DefaultRequestDirector.execute(DefaultRequestDirector.java:446) at org.apache.http.impl.client.AbstractHttpClient.doExecute(AbstractHttpClient.java:863) at org.apache.http.impl.client.CloseableHttpClient.execute(CloseableHttpClient.java:72) at com.itko.lisa.test.CommTrans.doSend(CommTrans.java:1074) at com.itko.lisa.test.CommTrans.send(CommTrans.java:843) at com.itko.lisa.test.CommTrans.sendPOST(CommTrans.java:803) at com.itko.lisa.ws.rest.RESTNode.doSend(RESTNode.java:226) at com.itko.lisa.ws.rest.RESTNode.doWebTrans(RESTNode.java:171) at com.itko.lisa.ws.rest.RESTNodeBase.execute(RESTNodeBase.java:380) at com.itko.lisa.test.TestNode.executeNode(TestNode.java:984) at com.itko.lisa.test.TestCase.execute(TestCase.java:1297) at com.itko.lisa.test.TestCase.execute(TestCase.java:1198) at com.itko.lisa.test.TestCase.executeNextNode(TestCase.java:1183) at com.itko.lisa.editor.WalkThruPanel.prepAndExecNode(WalkThruPanel.java:1085) at com.itko.lisa.editor.WalkThruPanel.access$900(WalkThruPanel.java:72) at com.itko.lisa.editor.WalkThruPanel$10.doCallback(WalkThruPanel.java:992) at com.itko.util.swing.panels.ProcessingDialog$2.run(ProcessingDialog.java:194) at java.lang.Thread.run(Thread.java:745) ============================================================================

 

 

 

SSL Details

[ 2] ***
[ 2] found key for : lisa
[ 2] chain [0] = [
[ 2] [
[ 2] Version: V3
[ 2] Subject: CN=Lisa, OU=Lisa, O=Lisa, L=Dallas, ST=Texas, C=US, EMAILADDRESS=support@itko.com
[ 2] Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5
[ 2]
[ 2] Key: Sun RSA public key, 1024 bits
[ 2] modulus: 107577342571485428802393728049184265786056348388364405824138117397977455761833138845329880593678805610027793821217939298848284286683543926634250841496293888229172692948746730869670908754188073542091973621265074265583182385560072567366227383567380577316296862528343858318946945517967854106447414857653511333997
[ 2] public exponent: 65537
[ 2] Validity: [From: Sat Aug 21 00:07:30 AWST 2010,
[ 2] To: Wed Jan 06 00:07:30 AWST 2038]
[ 2] Issuer: CN=Lisa, OU=Lisa, O=Lisa, L=Dallas, ST=Texas, C=US, EMAILADDRESS=support@itko.com
[ 2] SerialNumber: [ 4c6ea842]
[ 2]
[ 2] ]
[ 2] Algorithm: [SHA1withRSA]
[ 2] Signature:
[ 2] 0000: 2B 7F 77 08 DE 2F 74 E3 CD 0F 58 D8 57 D9 08 2E +.w../t...X.W...
[ 2] 0010: AC 57 A7 02 81 07 B7 F8 5B 68 AE 22 22 C6 75 EE .W......[h."".u.
[ 2] 0020: C2 41 B6 23 DE ED 17 F8 21 AE 3B ED B6 EA 1A 17 .A.#....!.;.....
[ 2] 0030: A4 5F 95 FD BE AE 74 DA 75 64 19 D6 60 0A 63 61 ._....t.ud..`.ca
[ 2] 0040: B6 2A E1 FB 06 C5 36 E5 00 0C EB 20 EF FA 82 29 .*....6.... ...)
[ 2] 0050: 40 39 EA 61 3A 27 CF 4F 00 18 33 E8 31 4C E4 C5 @9.a:'.O..3.1L..
[ 2] 0060: 44 98 60 15 80 FE 85 FB BF BD 95 AB 35 14 F7 16 D.`.........5...
[ 2] 0070: 9D 58 F5 26 10 B7 76 7D 43 20 A7 4B F4 ED EE CF .X.&..v.C .K....
[ 2]
[ 2] ]
[ 2] ***
[ 2] X509KeyManager passed to SSLContext.init(): need an X509ExtendedKeyManager for SSLEngine use
[ 2] trigger seeding of SecureRandom
[ 2] done seeding SecureRandom
[ 2] ProcDlgThreadCallbk@2ce54912, setSoTimeout(180000) called
[ 2] Allow unsafe renegotiation: false
[ 2] Allow legacy hello messages: true
[ 2] Is initial handshake: true
[ 2] Is secure renegotiation: false
[ 2] Ignoring disabled protocol: SSLv3
[ 2] Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1
[ 2] Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLSv1
[ 2] Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 for TLSv1
[ 2] Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1
[ 2] Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 for TLSv1
[ 2] Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1
[ 2] Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1
[ 2] Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1.1
[ 2] Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLSv1.1
[ 2] Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1
[ 2] Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1.1
[ 2] Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 for TLSv1.1
[ 2] Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1
[ 2] Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1.1
[ 2] %% No cached client session
[ 2] *** ClientHello, TLSv1.2
[ 2] RandomCookie: GMT: 1503655121 bytes = { 182, 34, 87, 49, 177, 182, 206, 121, 132, 176, 148, 236, 120, 122, 5, 206, 54, 37, 65, 176, 147, 9, 138, 136, 65, 175, 133, 76 }
[ 2] Session ID: {}
[ 2] Cipher Suites: [TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384, TLS_RSA_WITH_AES_256_CBC_SHA256, TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384, TLS_DHE_RSA_WITH_AES_256_CBC_SHA256, TLS_DHE_DSS_WITH_AES_256_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDH_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_DSS_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256, TLS_RSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_DSS_WITH_AES_128_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, TLS_RSA_WITH_AES_256_GCM_SHA384, TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, TLS_DHE_DSS_WITH_AES_256_GCM_SHA384, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_DSS_WITH_AES_128_GCM_SHA256, TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA, TLS_EMPTY_RENEGOTIATION_INFO_SCSV, TLS_DH_anon_WITH_AES_256_GCM_SHA384, TLS_DH_anon_WITH_AES_128_GCM_SHA256, TLS_DH_anon_WITH_AES_256_CBC_SHA256, TLS_ECDH_anon_WITH_AES_256_CBC_SHA, TLS_DH_anon_WITH_AES_256_CBC_SHA, TLS_DH_anon_WITH_
[ 2] AES_128_CBC_SHA256, TLS_ECDH_anon_WITH_AES_128_CBC_SHA, TLS_DH_anon_WITH_AES_128_CBC_SHA, TLS_ECDH_anon_WITH_3DES_EDE_CBC_SHA, SSL_DH_anon_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_DES_CBC_SHA, SSL_DHE_RSA_WITH_DES_CBC_SHA, SSL_DHE_DSS_WITH_DES_CBC_SHA, SSL_DH_anon_WITH_DES_CBC_SHA, SSL_RSA_EXPORT_WITH_DES40_CBC_SHA, SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA, SSL_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA, SSL_DH_anon_EXPORT_WITH_DES40_CBC_SHA, TLS_RSA_WITH_NULL_SHA256, TLS_ECDHE_ECDSA_WITH_NULL_SHA, TLS_ECDHE_RSA_WITH_NULL_SHA, SSL_RSA_WITH_NULL_SHA, TLS_ECDH_ECDSA_WITH_NULL_SHA, TLS_ECDH_RSA_WITH_NULL_SHA, TLS_ECDH_anon_WITH_NULL_SHA, SSL_RSA_WITH_NULL_MD5, TLS_KRB5_WITH_3DES_EDE_CBC_SHA, TLS_KRB5_WITH_3DES_EDE_CBC_MD5, TLS_KRB5_WITH_DES_CBC_SHA, TLS_KRB5_WITH_DES_CBC_MD5, TLS_KRB5_EXPORT_WITH_DES_CBC_40_SHA, TLS_KRB5_EXPORT_WITH_DES_CBC_40_MD5]
[ 2] Compression Methods: { 0 }
[ 2] Extension elliptic_curves, curve names: {secp256r1, sect163k1, sect163r2, secp192r1, secp224r1, sect233k1, sect233r1, sect283k1, sect283r1, secp384r1, sect409k1, sect409r1, secp521r1, sect571k1, sect571r1, secp160k1, secp160r1, secp160r2, sect163r1, secp192k1, sect193r1, sect193r2, secp224k1, sect239k1, secp256k1}
[ 2] Extension ec_point_formats, formats: [uncompressed]
[ 2] Extension signature_algorithms, signature_algorithms: SHA512withECDSA, SHA512withRSA, SHA384withECDSA, SHA384withRSA, SHA256withECDSA, SHA256withRSA, SHA256withDSA, SHA1withECDSA, SHA1withRSA, SHA1withDSA
[ 2] ***
[ 2] ProcDlgThreadCallbk@2ce54912, WRITE: TLSv1.2 Handshake, length = 297
[ 2] ProcDlgThreadCallbk@2ce54912, READ: TLSv1 Handshake, length = 2348
[ 2] *** ServerHello, TLSv1
[ 2] RandomCookie: GMT: 1503655122 bytes = { 30, 87, 93, 224, 238, 2, 53, 58, 134, 29, 113, 64, 215, 152, 71, 11, 120, 166, 32, 144, 235, 93, 239, 135, 180, 127, 210, 47 }
[ 2] Session ID: {90, 160, 245, 210, 64, 79, 80, 26, 251, 232, 115, 26, 70, 8, 242, 147, 230, 9, 88, 52, 127, 41, 146, 239, 163, 65, 85, 106, 49, 91, 56, 214}
[ 2] Cipher Suite: TLS_RSA_WITH_AES_256_CBC_SHA
[ 2] Compression Method: 0
[ 2] Extension renegotiation_info, renegotiated_connection:
[ 2] ***
[ 2] %% Initialized: [Session-5, TLS_RSA_WITH_AES_256_CBC_SHA]
[ 2] ** TLS_RSA_WITH_AES_256_CBC_SHA
[ 2] *** Certificate chain
[ 2] chain [0] = [
[ 2] [
[ 2] Version: V3
[ 2] Subject: EMAILADDRESS=duty.sysprog@bankwest.com.au, CN=bbbb.mps2.bankwest.com, OU=BWA Group Services Pty Ltd, O=Commonwealth Bank of Australia, L=Perth, ST=WA, C=AU
[ 2] Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5
[ 2]
[ 2] Key: Sun RSA public key, 2048 bits
[ 2] modulus: 26440769111413576055346839927364392822027480382790481478154498185491321589829289662408844753951890388938985607312352111414251608577990009729445664992742403913155746840181967655356518558322629282182583615689380822595800210339328637885490480860545027038715111210571037622416127220560351150048294136574846346365791587173066371523198548147310260273352942815933864283398318401632092577707597452700338537719827614956958594507443530072095300695973883457133934160204107666396622875131539050578776316876089050918544752977206314745801342895873881627784166265682182434552424151460241666993656198380889999487666985386934137244429
[ 2] public exponent: 65537
[ 2] Validity: [From: Wed May 20 09:24:59 AWST 2015,
[ 2] To: Sat May 19 09:24:59 AWST 2018]
[ 2] Issuer: CN=Bankwest Web Enrolment CA, O=Bank of Western Australia Ltd, C=AU
[ 2] SerialNumber: [ 6f1973df 00000000 03d5]
[ 2]
[ 2] Certificate Extensions: 9
[ 2] [1]: ObjectId: 1.3.6.1.4.1.311.21.10 Criticality=false
[ 2] Extension unknown: DER encoded OCTET string =
[ 2] 0000: 04 1A 30 18 30 0A 06 08 2B 06 01 05 05 07 03 02 ..0.0...+.......
[ 2] 0010: 30 0A 06 08 2B 06 01 05 05 07 03 01 0...+.......
[ 2]
[ 2]
[ 2] [2]: ObjectId: 1.3.6.1.4.1.311.21.7 Criticality=false
[ 2] Extension unknown: DER encoded OCTET string =
[ 2] 0000: 04 30 30 2E 06 26 2B 06 01 04 01 82 37 15 08 83 .00..&+.....7...
[ 2] 0010: CF D4 7B 81 B8 CB 6E 82 AD 99 1A 85 F2 EB 54 84 ......n.......T.
[ 2] 0020: 93 E1 4B 18 86 F4 9F 7C 81 AF B9 71 02 01 64 02 ..K........q..d.
[ 2] 0030: 01 0A ..
[ 2]
[ 2]
[ 2] [3]: ObjectId: 1.3.6.1.5.5.7.1.1 Criticality=false
[ 2] AuthorityInfoAccess [
[ 2] [
[ 2] accessMethod: caIssuers
[ 2] accessLocation: URIName: ldap:///CN=Bankwest%20Web%20Enrolment%20CA,CN=AIA,CN=Public%20Key%20Services
[ 2] ,CN=Services,CN=Configuration,DC=rtdomau,DC=local?cACertificate?base?objectClass=certificationAuthority
[ 2] ,
[ 2] accessMethod: caIssuers
[ 2] accessLocation: URIName: http://cdp.rtdomau.local/CertData/CBDCERT004.rtdomau.local_Bankwest%20Web%20Enrolment%20CA.crt
[ 2] ,
[ 2] accessMethod: caIssuers
[ 2] accessLocation: URIName: http://cbdcert004.rtdomau.local/CertEnroll/CBDCERT004.rtdomau.local_Bankwest%20Web%20Enrolment%20CA.crt
[ 2] ]
[ 2] ]
[ 2]
[ 2] [4]: ObjectId: 2.5.29.35 Criticality=false
[ 2] AuthorityKeyIdentifier [
[ 2] KeyIdentifier [
[ 2] 0000: D1 AA C0 AE 25 4F 6D 98 66 E0 EF 60 43 BF 85 6D ....%Om.f..`C..m
[ 2] 0010: 81 8E 60 0B ..`.
[ 2] ]
[ 2] ]
[ 2]
[ 2] [5]: ObjectId: 2.5.29.31 Criticality=false
[ 2] CRLDistributionPoints [
[ 2] [DistributionPoint:
[ 2] [URIName: ldap:///CN=Bankwest%20Web%20Enrolment%20CA,CN=CBDCERT004,CN=CDP,CN=Public%20Key%20Services,CN=Services,CN=Configuration,DC=rtdomau,DC=local?certificateRevocationList?base?objectClass=cRLDistributionPoint, URIName: http://cdp.rtdomau.local/CertData/Bankwest%20Web%20Enrolment%20CA.crl]
[ 2] ]]
[ 2]
[ 2] [6]: ObjectId: 2.5.29.37 Criticality=false
[ 2] ExtendedKeyUsages [
[ 2] clientAuth
[ 2] serverAuth
[ 2] ]
[ 2]
[ 2] [7]: ObjectId: 2.5.29.15 Criticality=false
[ 2] KeyUsage [
[ 2] DigitalSignature
[ 2] Key_Encipherment
[ 2] Data_Encipherment
[ 2] ]
[ 2]
[ 2] [8]: ObjectId: 2.5.29.17 Criticality=false
[ 2] SubjectAlternativeName [
[ 2] DNSName: bbbb.mps2.bankwest.com
[ 2] DNSName: bbbb.bankwest.com
[ 2] ]
[ 2]
[ 2] [9]: ObjectId: 2.5.29.14 Criticality=false
[ 2] SubjectKeyIdentifier [
[ 2] KeyIdentifier [
[ 2] 0000: 25 85 82 DD 97 13 E6 94 6B 67 A2 F8 0B 2A 40 E9 %.......kg...*@.
[ 2] 0010: DB 52 22 C8 .R".
[ 2] ]
[ 2] ]
[ 2]
[ 2] ]
[ 2] Algorithm: [SHA1withRSA]
[ 2] Signature:
[ 2] 0000: 67 14 99 DF F5 34 2B CF 6C 89 44 34 ED 2C 8F 93 g....4+.l.D4.,..
[ 2] 0010: 4E 51 2E 05 77 18 2A A9 7C 04 0D BA DD 37 D6 45 NQ..w.*......7.E
[ 2] 0020: 96 95 07 56 84 23 40 C0 91 1C 30 A3 5B DA 20 18 ...V.#@...0.[. .
[ 2] 0030: 99 B6 D0 F9 EF ED F7 9A A8 A2 27 16 9D 61 9E 2D ..........'..a.-
[ 2] 0040: 55 43 18 A8 39 C8 BD B2 90 FA 0F 41 9D 79 C0 E6 UC..9......A.y..
[ 2] 0050: 4F 7F 2E 7F 17
[ 2] 81 32 9E 18 D8 F2 57 05 16 21 95 O.....2....W..!.
[ 2] 0060: 44 B8 D0 0A 2D 14 51 A2 18 CD 98 EC 16 19 5C 3F D...-.Q.......\?
[ 2] 0070: C3 F6 BC A9 9B F9 67 C7 68 34 0E 57 5C 04 78 41 ......g.h4.W\.xA
[ 2] 0080: 96 0B 4F 01 74 D7 7E F7 B7 11 F0 99 2C 69 72 4C ..O.t.......,irL
[ 2] 0090: 7E 8D 4E 81 C3 1C 79 3D 1A B6 BB 45 02 73 23 87 ..N...y=...E.s#.
[ 2] 00A0: 63 AF 65 DF 99 AE F1 8D D6 BF D6 73 88 51 6B 32 c.e........s.Qk2
[ 2] 00B0: CF B0 B7 D5 87 74 78 F5 C2 66 23 B6 B0 57 EE C2 .....tx..f#..W..
[ 2] 00C0: EE E2 50 25 08 2C 60 EA 4D DA 6B 5A C7 AA 3D E2 ..P%.,`.M.kZ..=.
[ 2] 00D0: 65 FD 97 C0 C6 29 05 3B CA C8 5B F6 D9 67 20 4B e....).;..[..g K
[ 2] 00E0: DC A8 FF 98 9C C2 B1 BA 36 CB E8 96 E0 12 26 EE ........6.....&.
[ 2] 00F0: E0 69 07 9C 68 0E 38 C3 1F 2D 4D FB 2B 1F 27 A9 .i..h.8..-M.+.'.
[ 2]
[ 2] ]
[ 2] ***
[ 2] *** CertificateRequest
[ 2] Cert Types: RSA, DSS, ECDSA
[ 2] Cert Authorities:
[ 2] <emailaddress=duty.sysprog@bankwest.com.au, cn="bbbb.mps2.bankwest.com," ou="BWA" group="" services="" pty="" ltd,="" o="Commonwealth" bank="" of="" australia,="" l="Perth," st="WA," c="AU">
[ 2] <cn=bankwest root="" ca,="" o="Bank" of="" western="" australia="" ltd,="" c="AU">
[ 2] *** ServerHelloDone
[ 2] *** Certificate chain
[ 2] chain [0] = [
[ 2] [
[ 2] Version: V3
[ 2] Subject: CN=Lisa, OU=Lisa, O=Lisa, L=Dallas, ST=Texas, C=US, EMAILADDRESS=support@itko.com
[ 2] Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5
[ 2]
[ 2] Key: Sun RSA public key, 1024 bits
[ 2] modulus: 107577342571485428802393728049184265786056348388364405824138117397977455761833138845329880593678805610027793821217939298848284286683543926634250841496293888229172692948746730869670908754188073542091973621265074265583182385560072567366227383567380577316296862528343858318946945517967854106447414857653511333997
[ 2] public exponent: 65537
[ 2] Validity: [From: Sat Aug 21 00:07:30 AWST 2010,
[ 2] To: Wed Jan 06 00:07:30 AWST 2038]
[ 2] Issuer: CN=Lisa, OU=Lisa, O=Lisa, L=Dallas, ST=Texas, C=US, EMAILADDRESS=support@itko.com
[ 2] SerialNumber: [ 4c6ea842]
[ 2]
[ 2] ]
[ 2] Algorithm: [SHA1withRSA]
[ 2] Signature:
[ 2] 0000: 2B 7F 77 08 DE 2F 74 E3 CD 0F 58 D8 57 D9 08 2E +.w../t...X.W...
[ 2] 0010: AC 57 A7 02 81 07 B7 F8 5B 68 AE 22 22 C6 75 EE .W......[h."".u.
[ 2] 0020: C2 41 B6 23 DE ED 17 F8 21 AE 3B ED B6 EA 1A 17 .A.#....!.;.....
[ 2] 0030: A4 5F 95 FD BE AE 74 DA 75 64 19 D6 60 0A 63 61 ._....t.ud..`.ca
[ 2] 0040: B6 2A E1 FB 06 C5 36 E5 00 0C EB 20 EF FA 82 29 .*....6.... ...)
[ 2] 0050: 40 39 EA 61 3A 27 CF 4F 00 18 33 E8 31 4C E4 C5 @9.a:'.O..3.1L..
[ 2] 0060: 44 98 60 15 80 FE 85 FB BF BD 95 AB 35 14 F7 16 D.`.........5...
[ 2] 0070: 9D 58 F5 26 10 B7 76 7D 43 20 A7 4B F4 ED EE CF .X.&..v.C .K....
[ 2]
[ 2] ]
[ 2] ***
[ 2] *** ClientKeyExchange, RSA PreMasterSecret, TLSv1
[ 2] ProcDlgThreadCallbk@2ce54912, WRITE: TLSv1 Handshake, length = 899
[ 2] SESSION KEYGEN:
[ 2] PreMaster Secret:
[ 2] 0000: 03 03 87 AE 88 0A 35 3F 72 01 B2 40 38 C2 4F 6A ......5?r..@8.Oj
[ 2] 0010: F7 B1 C5 BD B4 E1 DF 12 8B 9A A4 83 72 76 BD A2 ............rv..
[ 2] 0020: 00 5A 1B D5 89 0C E1 F2 21 A1 C2 E6 32 18 96 BF .Z......!...2...
[ 2] CONNECTION KEYGEN:
[ 2] Client Nonce:
[ 2] 0000: 5A A0 F5 D1 B6 22 57 31 B1 B6 CE 79 84 B0 94 EC Z...."W1...y....
[ 2] 0010: 78 7A 05 CE 36 25 41 B0 93 09 8A 88 41 AF 85 4C xz..6%A.....A..L
[ 2] Server Nonce:
[ 2] 0000: 5A A0 F5 D2 1E 57 5D E0 EE 02 35 3A 86 1D 71 40 Z....W]...5:..q@
[ 2] 0010: D7 98 47 0B 78 A6 20 90 EB 5D EF 87 B4 7F D2 2F ..G.x. ..]...../
[ 2] Master Secret:
[ 2] 0000: 72 00 00 FA CD 04 1A 06 B5 3D BA 58 41 12 37 74 r........=.XA.7t
[ 2] 0010: 40 33 3E 6E F2 F6 44 1B E8 2D F3 12 1E CE 28 87 @3>n..D..-....(.
[ 2] 0020: E7 96 16 56 66 B2 B6 83 36 25 A7 F4 2A 4E B5 3D ...Vf...6%..*N.=
[ 2] Client MAC write Secret:
[ 2] 0000: 64 74 52 5C B7 ED 5C EB 50 14 C2 24 EE 75 75 B6 dtR\..\.P..$.uu.
[ 2] 0010: 89 82 6D 67 ..mg
[ 2] Server MAC write Secret:
[ 2] 0000: 98 9B F0 E0 8C 4E C0 51 FC 50 A5 71 D9 B9 9F F6 .....N.Q.P.q....
[ 2] 0010: E1 58 05 E1 .X..
[ 2] Client write key:
[ 2] 0000: 54 42 D0 D6 D2 25 F5 26 5A 15 DE DF E6 4E 25 11 TB...%.&Z....N%.
[ 2] 0010: 40 6E 8D 8F 95 AD E5 97 3D EC 6D 39 D0 73 E0 33 @n......=.m9.s.3
[ 2] Server write key:
[ 2] 0000: FA F9 7B 51 B9 F2 73 2E 0D 42 0C B0 0E E5 87 68 ...Q..s..B.....h
[ 2] 0010: 8B 42 AC 1F 06 69 BB 6A 01 C4 F5 50 F4 6E F7 7A .B...i.j...P.n.z
[ 2] Client write IV:
[ 2] 0000: 0B F1 EA 5C 2C 1B FF 69 C9 43 FF 8E D4 7B E0 BC ...\,..i.C......
[ 2] Server write IV:
[ 2] 0000: 37 B9 F2 70 06 D5 07 4A 24 6F BE 78 EE F6 1B 32 7..p...J$o.x...2
[ 2] *** CertificateVerify
[ 2] ProcDlgThreadCallbk@2ce54912, WRITE: TLSv1 Handshake, length = 134
[ 2] ProcDlgThreadCallbk@2ce54912, WRITE: TLSv1 Change Cipher Spec, length = 1
[ 2] *** Finished
[ 2] verify_data: { 250, 193, 196, 42, 255, 59, 101, 28, 233, 203, 86, 206 }
[ 2] ***
[ 2] ProcDlgThreadCallbk@2ce54912, WRITE: TLSv1 Handshake, length = 48
[ 2] ProcDlgThreadCallbk@2ce54912, waiting for close_notify or alert: state 1
[ 2] ProcDlgThreadCallbk@2ce54912, Exception while waiting for close java.net.SocketException: Software caused connection abort: recv failed
[ 2] ProcDlgThreadCallbk@2ce54912, handling exception: java.net.SocketException: Software caused connection abort: recv failed
[ 2] %% Invalidated: [Session-5, TLS_RSA_WITH_AES_256_CBC_SHA]
[ 2] ProcDlgThreadCallbk@2ce54912, SEND TLSv1 ALERT: fatal, description = unexpected_message
[ 2] ProcDlgThreadCallbk@2ce54912, WRITE: TLSv1 Alert, length = 32
[ 2] ProcDlgThreadCallbk@2ce54912, Exception sending alert: java.net.SocketException: Software caused connection abort: socket write error
[ 2] ProcDlgThreadCallbk@2ce54912, called closeSocket()
[ 2] ProcDlgThreadCallbk@2ce54912, setSoTimeout(180000) called
[ 2] Allow unsafe renegotiation: false
[ 2] Allow legacy hello messages: true
[ 2] Is initial handshake: true
[ 2] Is secure renegotiation: false
[ 2] Ignoring disabled protocol: SSLv3
[ 2] Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1
[ 2] Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLSv1
[ 2] Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 for TLSv1
[ 2] Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1
[ 2] Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 for TLSv1
[ 2] Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1
[ 2] Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1
[ 2] Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1.1
[ 2] Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLSv1.1
[ 2] Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1
[ 2] Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1.1
[ 2] Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 for TLSv1.1
[ 2] Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1
[ 2] Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1.1
[ 2] %% No cached client session
[ 2] *** ClientHello, TLSv1.2
[ 2] RandomCookie: GMT: 1503655122 bytes = { 48, 38, 59, 14, 182, 50, 31, 196, 200, 67, 97, 205, 131, 4, 71, 195, 132, 127, 112, 214, 130, 181, 3, 145, 96, 196, 101, 0 }
[ 2] Session ID: {}
[ 2] Cipher Suites: [TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384, TLS_RSA_WITH_AES_256_CBC_SHA256, TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384, TLS_DHE_RSA_WITH_AES_256_CBC_SHA256, TLS_DHE_DSS_WITH_AES_256_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDH_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_DSS_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256, TLS_RSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_DSS_WITH_AES_128_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, TLS_RSA_WITH_AES_256_GCM_SHA384, TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, TLS_DHE_DSS_WITH_AES_256_GCM_SHA384, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_DSS_WITH_AES_128_GCM_SHA256, TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA, TLS_EMPTY_RENEGOTIATION_INFO_SCSV, TLS_DH_anon_WITH_AES_256_GCM_SHA384, TLS_DH_anon_WITH_AES_128_GCM_SHA256, TLS_DH_anon_WITH_AES_256_CBC_SHA256, TLS_ECDH_anon_WITH_AES_256_CBC_SHA, TLS_DH_anon_WITH_AES_256_CBC_SHA, TLS_DH_anon_WITH_
[ 2] AES_128_CBC_SHA256, TLS_ECDH_anon_WITH_AES_128_CBC_SHA, TLS_DH_anon_WITH_AES_128_CBC_SHA, TLS_ECDH_anon_WITH_3DES_EDE_CBC_SHA, SSL_DH_anon_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_DES_CBC_SHA, SSL_DHE_RSA_WITH_DES_CBC_SHA, SSL_DHE_DSS_WITH_DES_CBC_SHA, SSL_DH_anon_WITH_DES_CBC_SHA, SSL_RSA_EXPORT_WITH_DES40_CBC_SHA, SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA, SSL_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA, SSL_DH_anon_EXPORT_WITH_DES40_CBC_SHA, TLS_RSA_WITH_NULL_SHA256, TLS_ECDHE_ECDSA_WITH_NULL_SHA, TLS_ECDHE_RSA_WITH_NULL_SHA, SSL_RSA_WITH_NULL_SHA, TLS_ECDH_ECDSA_WITH_NULL_SHA, TLS_ECDH_RSA_WITH_NULL_SHA, TLS_ECDH_anon_WITH_NULL_SHA, SSL_RSA_WITH_NULL_MD5, TLS_KRB5_WITH_3DES_EDE_CBC_SHA, TLS_KRB5_WITH_3DES_EDE_CBC_MD5, TLS_KRB5_WITH_DES_CBC_SHA, TLS_KRB5_WITH_DES_CBC_MD5, TLS_KRB5_EXPORT_WITH_DES_CBC_40_SHA, TLS_KRB5_EXPORT_WITH_DES_CBC_40_MD5]
[ 2] Compression Methods: { 0 }
[ 2] Extension elliptic_curves, curve names: {secp256r1, sect163k1, sect163r2, secp192r1, secp224r1, sect233k1, sect233r1, sect283k1, sect283r1, secp384r1, sect409k1, sect409r1, secp521r1, sect571k1, sect571r1, secp160k1, secp160r1, secp160r2, sect163r1, secp192k1, sect193r1, sect193r2, secp224k1, sect239k1, secp256k1}
[ 2] Extension ec_point_formats, formats: [uncompressed]
[ 2] Extension signature_algorithms, signature_algorithms: SHA512withECDSA, SHA512withRSA, SHA384withECDSA, SHA384withRSA, SHA256withECDSA, SHA256withRSA, SHA256withDSA, SHA1withECDSA, SHA1withRSA, SHA1withDSA
[ 2] ***
[ 2] ProcDlgThreadCallbk@2ce54912, WRITE: TLSv1.2 Handshake, length = 297
[ 2] ProcDlgThreadCallbk@2ce54912, READ: TLSv1 Handshake, length = 2348
[ 2] *** ServerHello, TLSv1
[ 2] RandomCookie: GMT: 1503655122 bytes = { 200, 135, 119, 211, 109, 161, 40, 236, 46, 11, 162, 243, 97, 160, 12, 4, 133, 217, 194, 213, 65, 109, 134, 176, 235, 161, 213, 50 }
[ 2] Session ID: {90, 160, 245, 210, 130, 233, 218, 20, 145, 95, 13, 86, 236, 225, 119, 248, 170, 170, 151, 126, 184, 130, 155, 45, 201, 58, 247, 94, 13, 37, 32, 13}
[ 2] Cipher Suite: TLS_RSA_WITH_AES_256_CBC_SHA
[ 2] Compression Method: 0
[ 2] Extension renegotiation_info, renegotiated_connection:
[ 2] ***
[ 2] %% Initialized: [Session-6, TLS_RSA_WITH_AES_256_CBC_SHA]
[ 2] ** TLS_RSA_WITH_AES_256_CBC_SHA
[ 2] *** Certificate chain
[ 2] chain [0] = [
[ 2] [
[ 2] Version: V3
[ 2] Subject: EMAILADDRESS=duty.sysprog@bankwest.com.au, CN=bbbb.mps2.bankwest.com, OU=BWA Group Services Pty Ltd, O=Commonwealth Bank of Australia, L=Perth, ST=WA, C=AU
[ 2] Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5
[ 2]
[ 2] Key: Sun RSA public key, 2048 bits
[ 2] modulus: 26440769111413576055346839927364392822027480382790481478154498185491321589829289662408844753951890388938985607312352111414251608577990009729445664992742403913155746840181967655356518558322629282182583615689380822595800210339328637885490480860545027038715111210571037622416127220560351150048294136574846346365791587173066371523198548147310260273352942815933864283398318401632092577707597452700338537719827614956958594507443530072095300695973883457133934160204107666396622875131539050578776316876089050918544752977206314745801342895873881627784166265682182434552424151460241666993656198380889999487666985386934137244429
[ 2] public exponent: 65537
[ 2] Validity: [From: Wed May 20 09:24:59 AWST 2015,
[ 2] To: Sat May 19 09:24:59 AWST 2018]
[ 2] Issuer: CN=Bankwest Web Enrolment CA, O=Bank of Western Australia Ltd, C=AU
[ 2] SerialNumber: [ 6f1973df 00000000 03d5]
[ 2]
[ 2] Certificate Extensions: 9
[ 2] [1]: ObjectId: 1.3.6.1.4.1.311.21.10 Criticality=false
[ 2] Extension unknown: DER encoded OCTET string =
[ 2] 0000: 04 1A 30 18 30 0A 06 08 2B 06 01 05 05 07 03 02 ..0.0...+.......
[ 2] 0010: 30 0A 06 08 2B 06 01 05 05 07 03 01 0...+.......
[ 2]
[ 2]
[ 2] [2]: ObjectId: 1.3.6.1.4.1.311.21.7 Criticality=false
[ 2] Extension unknown: DER encoded OCTET string =
[ 2] 0000: 04 30 30 2E 06 26 2B 06 01 04 01 82 37 15 08 83 .00..&+.....7...
[ 2] 0010: CF D4 7B 81 B8 CB 6E 82 AD 99 1A 85 F2 EB 54 84 ......n.......T.
[ 2] 0020: 93 E1 4B 18 86 F4 9F 7C 81 AF B9 71 02 01 64 02 ..K........q..d.
[ 2] 0030: 01 0A ..
[ 2]
[ 2]
[ 2] [3]: ObjectId: 1.3.6.1.5.5.7.1.1 Criticality=false
[ 2] AuthorityInfoAccess [
[ 2] [
[ 2] accessMethod: caIssuers
[ 2] accessLocation: URIName: ldap:///CN=Bankwest%20Web%20Enrolment%20CA,CN=AIA,CN=Public%20Key%20Services
[ 2] ,CN=Services,CN=Configuration,DC=rtdomau,DC=local?cACertificate?base?objectClass=certificationAuthority
[ 2] ,
[ 2] accessMethod: caIssuers
[ 2] accessLocation: URIName: http://cdp.rtdomau.local/CertData/CBDCERT004.rtdomau.local_Bankwest%20Web%20Enrolment%20CA.crt
[ 2] ,
[ 2] accessMethod: caIssuers
[ 2] accessLocation: URIName: http://cbdcert004.rtdomau.local/CertEnroll/CBDCERT004.rtdomau.local_Bankwest%20Web%20Enrolment%20CA.crt
[ 2] ]
[ 2] ]
[ 2]
[ 2] [4]: ObjectId: 2.5.29.35 Criticality=false
[ 2] AuthorityKeyIdentifier [
[ 2] KeyIdentifier [
[ 2] 0000: D1 AA C0 AE 25 4F 6D 98 66 E0 EF 60 43 BF 85 6D ....%Om.f..`C..m
[ 2] 0010: 81 8E 60 0B ..`.
[ 2] ]
[ 2] ]
[ 2]
[ 2] [5]: ObjectId: 2.5.29.31 Criticality=false
[ 2] CRLDistributionPoints [
[ 2] [DistributionPoint:
[ 2] [URIName: ldap:///CN=Bankwest%20Web%20Enrolment%20CA,CN=CBDCERT004,CN=CDP,CN=Public%20Key%20Services,CN=Services,CN=Configuration,DC=rtdomau,DC=local?certificateRevocationList?base?objectClass=cRLDistributionPoint, URIName: http://cdp.rtdomau.local/CertData/Bankwest%20Web%20Enrolment%20CA.crl]
[ 2] ]]
[ 2]
[ 2] [6]: ObjectId: 2.5.29.37 Criticality=false
[ 2] ExtendedKeyUsages [
[ 2] clientAuth
[ 2] serverAuth
[ 2] ]
[ 2]
[ 2] [7]: ObjectId: 2.5.29.15 Criticality=false
[ 2] KeyUsage [
[ 2] DigitalSignature
[ 2] Key_Encipherment
[ 2] Data_Encipherment
[ 2] ]
[ 2]
[ 2] [8]: ObjectId: 2.5.29.17 Criticality=false
[ 2] SubjectAlternativeName [
[ 2] DNSName: bbbb.mps2.bankwest.com
[ 2] DNSName: bbbb.bankwest.com
[ 2] ]
[ 2]
[ 2] [9]: ObjectId: 2.5.29.14 Criticality=false
[ 2] SubjectKeyIdentifier [
[ 2] KeyIdentifier [
[ 2] 0000: 25 85 82 DD 97 13 E6 94 6B 67 A2 F8 0B 2A 40 E9 %.......kg...*@.
[ 2] 0010: DB 52 22 C8 .R".
[ 2] ]
[ 2] ]
[ 2]
[ 2] ]
[ 2] Algorithm: [SHA1withRSA]
[ 2] Signature:
[ 2] 0000: 67 14 99 DF F5 34 2B CF 6C 89 44 34 ED 2C 8F 93 g....4+.l.D4.,..
[ 2] 0010: 4E 51 2E 05 77 18 2A A9 7C 04 0D BA DD 37 D6 45 NQ..w.*......7.E
[ 2] 0020: 96 95 07 56 84 23 40 C0 91 1C 30 A3 5B DA 20 18 ...V.#@...0.[. .
[ 2] 0030: 99 B6 D0 F9 EF ED F7 9A A8 A2 27 16 9D 61 9E 2D ..........'..a.-
[ 2] 0040: 55 43 18 A8 39 C8 BD B2 90 FA 0F 41 9D 79 C0 E6 UC..9......A.y..
[ 2] 0050: 4F 7F 2E 7F 17
[ 2] 81 32 9E 18 D8 F2 57 05 16 21 95 O.....2....W..!.
[ 2] 0060: 44 B8 D0 0A 2D 14 51 A2 18 CD 98 EC 16 19 5C 3F D...-.Q.......\?
[ 2] 0070: C3 F6 BC A9 9B F9 67 C7 68 34 0E 57 5C 04 78 41 ......g.h4.W\.xA
[ 2] 0080: 96 0B 4F 01 74 D7 7E F7 B7 11 F0 99 2C 69 72 4C ..O.t.......,irL
[ 2] 0090: 7E 8D 4E 81 C3 1C 79 3D 1A B6 BB 45 02 73 23 87 ..N...y=...E.s#.
[ 2] 00A0: 63 AF 65 DF 99 AE F1 8D D6 BF D6 73 88 51 6B 32 c.e........s.Qk2
[ 2] 00B0: CF B0 B7 D5 87 74 78 F5 C2 66 23 B6 B0 57 EE C2 .....tx..f#..W..
[ 2] 00C0: EE E2 50 25 08 2C 60 EA 4D DA 6B 5A C7 AA 3D E2 ..P%.,`.M.kZ..=.
[ 2] 00D0: 65 FD 97 C0 C6 29 05 3B CA C8 5B F6 D9 67 20 4B e....).;..[..g K
[ 2] 00E0: DC A8 FF 98 9C C2 B1 BA 36 CB E8 96 E0 12 26 EE ........6.....&.
[ 2] 00F0: E0 69 07 9C 68 0E 38 C3 1F 2D 4D FB 2B 1F 27 A9 .i..h.8..-M.+.'.
[ 2]
[ 2] ]
[ 2] ***
[ 2] *** CertificateRequest
[ 2] Cert Types: RSA, DSS, ECDSA
[ 2] Cert Authorities:
[ 2] <emailaddress=duty.sysprog@bankwest.com.au, cn="bbbb.mps2.bankwest.com," ou="BWA" group="" services="" pty="" ltd,="" o="Commonwealth" bank="" of="" australia,="" l="Perth," st="WA," c="AU">
[ 2] <cn=bankwest root="" ca,="" o="Bank" of="" western="" australia="" ltd,="" c="AU">
[ 2] *** ServerHelloDone
[ 2] *** Certificate chain
[ 2] chain [0] = [
[ 2] [
[ 2] Version: V3
[ 2] Subject: CN=Lisa, OU=Lisa, O=Lisa, L=Dallas, ST=Texas, C=US, EMAILADDRESS=support@itko.com
[ 2] Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5
[ 2]
[ 2] Key: Sun RSA public key, 1024 bits
[ 2] modulus: 107577342571485428802393728049184265786056348388364405824138117397977455761833138845329880593678805610027793821217939298848284286683543926634250841496293888229172692948746730869670908754188073542091973621265074265583182385560072567366227383567380577316296862528343858318946945517967854106447414857653511333997
[ 2] public exponent: 65537
[ 2] Validity: [From: Sat Aug 21 00:07:30 AWST 2010,
[ 2] To: Wed Jan 06 00:07:30 AWST 2038]
[ 2] Issuer: CN=Lisa, OU=Lisa, O=Lisa, L=Dallas, ST=Texas, C=US, EMAILADDRESS=support@itko.com
[ 2] SerialNumber: [ 4c6ea842]
[ 2]
[ 2] ]
[ 2] Algorithm: [SHA1withRSA]
[ 2] Signature:
[ 2] 0000: 2B 7F 77 08 DE 2F 74 E3 CD 0F 58 D8 57 D9 08 2E +.w../t...X.W...
[ 2] 0010: AC 57 A7 02 81 07 B7 F8 5B 68 AE 22 22 C6 75 EE .W......[h."".u.
[ 2] 0020: C2 41 B6 23 DE ED 17 F8 21 AE 3B ED B6 EA 1A 17 .A.#....!.;.....
[ 2] 0030: A4 5F 95 FD BE AE 74 DA 75 64 19 D6 60 0A 63 61 ._....t.ud..`.ca
[ 2] 0040: B6 2A E1 FB 06 C5 36 E5 00 0C EB 20 EF FA 82 29 .*....6.... ...)
[ 2] 0050: 40 39 EA 61 3A 27 CF 4F 00 18 33 E8 31 4C E4 C5 @9.a:'.O..3.1L..
[ 2] 0060: 44 98 60 15 80 FE 85 FB BF BD 95 AB 35 14 F7 16 D.`.........5...
[ 2] 0070: 9D 58 F5 26 10 B7 76 7D 43 20 A7 4B F4 ED EE CF .X.&..v.C .K....
[ 2]
[ 2] ]
[ 2] ***
[ 2] *** ClientKeyExchange, RSA PreMasterSecret, TLSv1
[ 2] ProcDlgThreadCallbk@2ce54912, WRITE: TLSv1 Handshake, length = 899
[ 2] SESSION KEYGEN:
[ 2] PreMaster Secret:
[ 2] 0000: 03 03 31 8F 6B 1D C7 71 56 FA 78 27 E1 C6 C4 3D ..1.k..qV.x'...=
[ 2] 0010: 41 21 37 F2 3A 9D 37 88 C0 BA 4D 73 06 76 6A 36 A!7.:.7...Ms.vj6
[ 2] 0020: B9 CE 4A 60 2B F2 A3 60 4B 16 F7 4E B8 82 A3 CA ..J`+..`K..N....
[ 2] CONNECTION KEYGEN:
[ 2] Client Nonce:
[ 2] 0000: 5A A0 F5 D2 30 26 3B 0E B6 32 1F C4 C8 43 61 CD Z...0&;..2...Ca.
[ 2] 0010: 83 04 47 C3 84 7F 70 D6 82 B5 03 91 60 C4 65 00 ..G...p.....`.e.
[ 2] Server Nonce:
[ 2] 0000: 5A A0 F5 D2 C8 87 77 D3 6D A1 28 EC 2E 0B A2 F3 Z.....w.m.(.....
[ 2] 0010: 61 A0 0C 04 85 D9 C2 D5 41 6D 86 B0 EB A1 D5 32 a.......Am.....2
[ 2] Master Secret:
[ 2] 0000: 66 EA 96 60 7A B5 C1 15 E3 62 56 CE DC F0 14 FD f..`z....bV.....
[ 2] 0010: C1 02 C3 CE CE BF 60 FE 5B E0 05 4B FE 41 71 04 ......`.[..K.Aq.
[ 2] 0020: FE F4 55 C9 4C 57 92 0B 15 9C C9 38 FC 44 B0 31 ..U.LW.....8.D.1
[ 2] Client MAC write Secret:
[ 2] 0000: BB C4 3B 56 7E C0 6A CE 75 B4 EC 37 85 22 09 64 ..;V..j.u..7.".d
[ 2] 0010: 08 C9 D4 66 ...f
[ 2] Server MAC write Secret:
[ 2] 0000: 47 B9 E8 02 39 F0 E9 93 E2 C1 A8 B6 FC C5 DC B6 G...9...........
[ 2] 0010: 78 56 71 65 xVqe
[ 2] Client write key:
[ 2] 0000: 0A FC 91 88 3F BE A8 8F 0D C6 1F F9 5B 91 8E 56 ....?.......[..V
[ 2] 0010: C0 EB BD E3 23 4E 9C D9 C6 30 15 9D DA E1 8F 0F ....#N...0......
[ 2] Server write key:
[ 2] 0000: 46 55 18 5B CB 50 F2 54 5F 4F DF A1 07 10 11 F6 FU.[.P.T_O......
[ 2] 0010: B8 BA BF D4 04 7A 51 BA C0 12 48 95 94 3C 07 38 .....zQ...H..<.8
[ 2] Client write IV:
[ 2] 0000: CB 77 25 02 5F 31 45 F3 88 D1 3A AA EC DB 8E 6B .w%._1E...:....k
[ 2] Server write IV:
[ 2] 0000: 3A 70 53 44 28 33 27 75 C9 4A 43 69 65 67 3C DC :pSD(3'u.JCieg<.
[ 2] *** CertificateVerify
[ 2] ProcDlgThreadCallbk@2ce54912, WRITE: TLSv1 Handshake, length = 134
[ 2] ProcDlgThreadCallbk@2ce54912, WRITE: TLSv1 Change Cipher Spec, length = 1
[ 2] ProcDlgThreadCallbk@2ce54912, handling exception: java.net.SocketException: Software caused connection abort: socket write error
[ 2] %% Invalidated: [Session-6, TLS_RSA_WITH_AES_256_CBC_SHA]
[ 2] ProcDlgThreadCallbk@2ce54912, SEND TLSv1 ALERT: fatal, description = unexpected_message
[ 2] ProcDlgThreadCallbk@2ce54912, WRITE: TLSv1 Alert, length = 2
[ 2] ProcDlgThreadCallbk@2ce54912, Exception sending alert: java.net.SocketException: Software caused connection abort: socket write error
[ 2] ProcDlgThreadCallbk@2ce54912, called closeSocket()
[ 2] ProcDlgThreadCallbk@2ce54912, setSoTimeout(180000) called
[ 2] Allow unsafe renegotiation: false
[ 2] Allow legacy hello messages: true
[ 2] Is initial handshake: true
[ 2] Is secure renegotiation: false
[ 2] Ignoring disabled protocol: SSLv3
[ 2] Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1
[ 2] Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLSv1
[ 2] Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 for TLSv1
[ 2] Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1
[ 2] Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 for TLSv1
[ 2] Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1
[ 2] Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1
[ 2] Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1.1
[ 2] Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLSv1.1
[ 2] Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1
[ 2] Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1.1
[ 2] Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 for TLSv1.1
[ 2] Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1
[ 2] Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1.1
[ 2] %% No cached client session
[ 2] *** ClientHello, TLSv1.2
[ 2] RandomCookie: GMT: 1503655122 bytes = { 158, 86, 3, 52, 170, 249, 49, 103, 112, 19, 119, 199, 79, 65, 75, 221, 148, 61, 146, 134, 108, 52, 58, 69, 147, 165, 1, 219 }
[ 2] Session ID: {}
[ 2] Cipher Suites: [TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384, TLS_RSA_WITH_AES_256_CBC_SHA256, TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384, TLS_DHE_RSA_WITH_AES_256_CBC_SHA256, TLS_DHE_DSS_WITH_AES_256_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDH_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_DSS_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256, TLS_RSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_DSS_WITH_AES_128_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, TLS_RSA_WITH_AES_256_GCM_SHA384, TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, TLS_DHE_DSS_WITH_AES_256_GCM_SHA384, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_DSS_WITH_AES_128_GCM_SHA256, TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA, TLS_EMPTY_RENEGOTIATION_INFO_SCSV, TLS_DH_anon_WITH_AES_256_GCM_SHA384, TLS_DH_anon_WITH_AES_128_GCM_SHA256, TLS_DH_anon_WITH_AES_256_CBC_SHA256, TLS_ECDH_anon_WITH_AES_256_CBC_SHA, TLS_DH_anon_WITH_AES_256_CBC_SHA, TLS_DH_anon_WITH_
[ 2] AES_128_CBC_SHA256, TLS_ECDH_anon_WITH_AES_128_CBC_SHA, TLS_DH_anon_WITH_AES_128_CBC_SHA, TLS_ECDH_anon_WITH_3DES_EDE_CBC_SHA, SSL_DH_anon_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_DES_CBC_SHA, SSL_DHE_RSA_WITH_DES_CBC_SHA, SSL_DHE_DSS_WITH_DES_CBC_SHA, SSL_DH_anon_WITH_DES_CBC_SHA, SSL_RSA_EXPORT_WITH_DES40_CBC_SHA, SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA, SSL_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA, SSL_DH_anon_EXPORT_WITH_DES40_CBC_SHA, TLS_RSA_WITH_NULL_SHA256, TLS_ECDHE_ECDSA_WITH_NULL_SHA, TLS_ECDHE_RSA_WITH_NULL_SHA, SSL_RSA_WITH_NULL_SHA, TLS_ECDH_ECDSA_WITH_NULL_SHA, TLS_ECDH_RSA_WITH_NULL_SHA, TLS_ECDH_anon_WITH_NULL_SHA, SSL_RSA_WITH_NULL_MD5, TLS_KRB5_WITH_3DES_EDE_CBC_SHA, TLS_KRB5_WITH_3DES_EDE_CBC_MD5, TLS_KRB5_WITH_DES_CBC_SHA, TLS_KRB5_WITH_DES_CBC_MD5, TLS_KRB5_EXPORT_WITH_DES_CBC_40_SHA, TLS_KRB5_EXPORT_WITH_DES_CBC_40_MD5]
[ 2] Compression Methods: { 0 }
[ 2] Extension elliptic_curves, curve names: {secp256r1, sect163k1, sect163r2, secp192r1, secp224r1, sect233k1, sect233r1, sect283k1, sect283r1, secp384r1, sect409k1, sect409r1, secp521r1, sect571k1, sect571r1, secp160k1, secp160r1, secp160r2, sect163r1, secp192k1, sect193r1, sect193r2, secp224k1, sect239k1, secp256k1}
[ 2] Extension ec_point_formats, formats: [uncompressed]
[ 2] Extension signature_algorithms, signature_algorithms: SHA512withECDSA, SHA512withRSA, SHA384withECDSA, SHA384withRSA, SHA256withECDSA, SHA256withRSA, SHA256withDSA, SHA1withECDSA, SHA1withRSA, SHA1withDSA
[ 2] ***
[ 2] ProcDlgThreadCallbk@2ce54912, WRITE: TLSv1.2 Handshake, length = 297
[ 2] ProcDlgThreadCallbk@2ce54912, READ: TLSv1 Handshake, length = 2348
[ 2] *** ServerHello, TLSv1
[ 2] RandomCookie: GMT: 1503655122 bytes = { 162, 171, 164, 75, 25, 102, 78, 222, 175, 103, 244, 18, 185, 196, 206, 160, 163, 206, 221, 21, 89, 231, 126, 65, 175, 170, 55, 143 }
[ 2] Session ID: {90, 160, 245, 210, 61, 137, 142, 179, 63, 209, 23, 88, 220, 128, 28, 169, 164, 242, 62, 176, 199, 210, 84, 77, 12, 51, 111, 186, 36, 180, 133, 172}
[ 2] Cipher Suite: TLS_RSA_WITH_AES_256_CBC_SHA
[ 2] Compression Method: 0
[ 2] Extension renegotiation_info, renegotiated_connection:
[ 2] ***
[ 2] %% Initialized: [Session-7, TLS_RSA_WITH_AES_256_CBC_SHA]
[ 2] ** TLS_RSA_WITH_AES_256_CBC_SHA
[ 2] *** Certificate chain
[ 2] chain [0] = [
[ 2] [
[ 2] Version: V3
[ 2] Subject: EMAILADDRESS=duty.sysprog@bankwest.com.au, CN=bbbb.mps2.bankwest.com, OU=BWA Group Services Pty Ltd, O=Commonwealth Bank of Australia, L=Perth, ST=WA, C=AU
[ 2] Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5
[ 2]
[ 2] Key: Sun RSA public key, 2048 bits
[ 2] modulus: 26440769111413576055346839927364392822027480382790481478154498185491321589829289662408844753951890388938985607312352111414251608577990009729445664992742403913155746840181967655356518558322629282182583615689380822595800210339328637885490480860545027038715111210571037622416127220560351150048294136574846346365791587173066371523198548147310260273352942815933864283398318401632092577707597452700338537719827614956958594507443530072095300695973883457133934160204107666396622875131539050578776316876089050918544752977206314745801342895873881627784166265682182434552424151460241666993656198380889999487666985386934137244429
[ 2] public exponent: 65537
[ 2] Validity: [From: Wed May 20 09:24:59 AWST 2015,
[ 2] To: Sat May 19 09:24:59 AWST 2018]
[ 2] Issuer: CN=Bankwest Web Enrolment CA, O=Bank of Western Australia Ltd, C=AU
[ 2] SerialNumber: [ 6f1973df 00000000 03d5]
[ 2]
[ 2] Certificate Extensions: 9
[ 2] [1]: ObjectId: 1.3.6.1.4.1.311.21.10 Criticality=false
[ 2] Extension unknown: DER encoded OCTET string =
[ 2] 0000: 04 1A 30 18 30 0A 06 08 2B 06 01 05 05 07 03 02 ..0.0...+.......
[ 2] 0010: 30 0A 06 08 2B 06 01 05 05 07 03 01 0...+.......
[ 2]
[ 2]
[ 2] [2]: ObjectId: 1.3.6.1.4.1.311.21.7 Criticality=false
[ 2] Extension unknown: DER encoded OCTET string =
[ 2] 0000: 04 30 30 2E 06 26 2B 06 01 04 01 82 37 15 08 83 .00..&+.....7...
[ 2] 0010: CF D4 7B 81 B8 CB 6E 82 AD 99 1A 85 F2 EB 54 84 ......n.......T.
[ 2] 0020: 93 E1 4B 18 86 F4 9F 7C 81 AF B9 71 02 01 64 02 ..K........q..d.
[ 2] 0030: 01 0A ..
[ 2]
[ 2]
[ 2] [3]: ObjectId: 1.3.6.1.5.5.7.1.1 Criticality=false
[ 2] AuthorityInfoAccess [
[ 2] [
[ 2] accessMethod: caIssuers
[ 2] accessLocation: URIName: ldap:///CN=Bankwest%20Web%20Enrolment%20CA,CN=AIA,CN=Public%20Key%20Services
[ 2] ,CN=Services,CN=Configuration,DC=rtdomau,DC=local?cACertificate?base?objectClass=certificationAuthority
[ 2] ,
[ 2] accessMethod: caIssuers
[ 2] accessLocation: URIName: http://cdp.rtdomau.local/CertData/CBDCERT004.rtdomau.local_Bankwest%20Web%20Enrolment%20CA.crt
[ 2] ,
[ 2] accessMethod: caIssuers
[ 2] accessLocation: URIName: http://cbdcert004.rtdomau.local/CertEnroll/CBDCERT004.rtdomau.local_Bankwest%20Web%20Enrolment%20CA.crt
[ 2] ]
[ 2] ]
[ 2]
[ 2] [4]: ObjectId: 2.5.29.35 Criticality=false
[ 2] AuthorityKeyIdentifier [
[ 2] KeyIdentifier [
[ 2] 0000: D1 AA C0 AE 25 4F 6D 98 66 E0 EF 60 43 BF 85 6D ....%Om.f..`C..m
[ 2] 0010: 81 8E 60 0B ..`.
[ 2] ]
[ 2] ]
[ 2]
[ 2] [5]: ObjectId: 2.5.29.31 Criticality=false
[ 2] CRLDistributionPoints [
[ 2] [DistributionPoint:
[ 2] [URIName: ldap:///CN=Bankwest%20Web%20Enrolment%20CA,CN=CBDCERT004,CN=CDP,CN=Public%20Key%20Services,CN=Services,CN=Configuration,DC=rtdomau,DC=local?certificateRevocationList?base?objectClass=cRLDistributionPoint, URIName: http://cdp.rtdomau.local/CertData/Bankwest%20Web%20Enrolment%20CA.crl]
[ 2] ]]
[ 2]
[ 2] [6]: ObjectId: 2.5.29.37 Criticality=false
[ 2] ExtendedKeyUsages [
[ 2] clientAuth
[ 2] serverAuth
[ 2] ]
[ 2]
[ 2] [7]: ObjectId: 2.5.29.15 Criticality=false
[ 2] KeyUsage [
[ 2] DigitalSignature
[ 2] Key_Encipherment
[ 2] Data_Encipherment
[ 2] ]
[ 2]
[ 2] [8]: ObjectId: 2.5.29.17 Criticality=false
[ 2] SubjectAlternativeName [
[ 2] DNSName: bbbb.mps2.bankwest.com
[ 2] DNSName: bbbb.bankwest.com
[ 2] ]
[ 2]
[ 2] [9]: ObjectId: 2.5.29.14 Criticality=false
[ 2] SubjectKeyIdentifier [
[ 2] KeyIdentifier [
[ 2] 0000: 25 85 82 DD 97 13 E6 94 6B 67 A2 F8 0B 2A 40 E9 %.......kg...*@.
[ 2] 0010: DB 52 22 C8 .R".
[ 2] ]
[ 2] ]
[ 2]
[ 2] ]
[ 2] Algorithm: [SHA1withRSA]
[ 2] Signature:
[ 2] 0000: 67 14 99 DF F5 34 2B CF 6C 89 44 34 ED 2C 8F 93 g....4+.l.D4.,..
[ 2] 0010: 4E 51 2E 05 77 18 2A A9 7C 04 0D BA DD 37 D6 45 NQ..w.*......7.E
[ 2] 0020: 96 95 07 56 84 23 40 C0 91 1C 30 A3 5B DA 20 18 ...V.#@...0.[. .
[ 2] 0030: 99 B6 D0 F9 EF ED F7 9A A8 A2 27 16 9D 61 9E 2D ..........'..a.-
[ 2] 0040: 55 43 18 A8 39 C8 BD B2 90 FA 0F 41 9D 79 C0 E6 UC..9......A.y..
[ 2] 0050: 4F 7F 2E 7F 17
[ 2] 81 32 9E 18 D8 F2 57 05 16 21 95 O.....2....W..!.
[ 2] 0060: 44 B8 D0 0A 2D 14 51 A2 18 CD 98 EC 16 19 5C 3F D...-.Q.......\?
[ 2] 0070: C3 F6 BC A9 9B F9 67 C7 68 34 0E 57 5C 04 78 41 ......g.h4.W\.xA
[ 2] 0080: 96 0B 4F 01 74 D7 7E F7 B7 11 F0 99 2C 69 72 4C ..O.t.......,irL
[ 2] 0090: 7E 8D 4E 81 C3 1C 79 3D 1A B6 BB 45 02 73 23 87 ..N...y=...E.s#.
[ 2] 00A0: 63 AF 65 DF 99 AE F1 8D D6 BF D6 73 88 51 6B 32 c.e........s.Qk2
[ 2] 00B0: CF B0 B7 D5 87 74 78 F5 C2 66 23 B6 B0 57 EE C2 .....tx..f#..W..
[ 2] 00C0: EE E2 50 25 08 2C 60 EA 4D DA 6B 5A C7 AA 3D E2 ..P%.,`.M.kZ..=.
[ 2] 00D0: 65 FD 97 C0 C6 29 05 3B CA C8 5B F6 D9 67 20 4B e....).;..[..g K
[ 2] 00E0: DC A8 FF 98 9C C2 B1 BA 36 CB E8 96 E0 12 26 EE ........6.....&.
[ 2] 00F0: E0 69 07 9C 68 0E 38 C3 1F 2D 4D FB 2B 1F 27 A9 .i..h.8..-M.+.'.
[ 2]
[ 2] ]
[ 2] ***
[ 2] *** CertificateRequest
[ 2] Cert Types: RSA, DSS, ECDSA
[ 2] Cert Authorities:
[ 2] <emailaddress=duty.sysprog@bankwest.com.au, cn="bbbb.mps2.bankwest.com," ou="BWA" group="" services="" pty="" ltd,="" o="Commonwealth" bank="" of="" australia,="" l="Perth," st="WA," c="AU">
[ 2] <cn=bankwest root="" ca,="" o="Bank" of="" western="" australia="" ltd,="" c="AU">
[ 2] *** ServerHelloDone
[ 2] *** Certificate chain
[ 2] chain [0] = [
[ 2] [
[ 2] Version: V3
[ 2] Subject: CN=Lisa, OU=Lisa, O=Lisa, L=Dallas, ST=Texas, C=US, EMAILADDRESS=support@itko.com
[ 2] Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5
[ 2]
[ 2] Key: Sun RSA public key, 1024 bits
[ 2] modulus: 107577342571485428802393728049184265786056348388364405824138117397977455761833138845329880593678805610027793821217939298848284286683543926634250841496293888229172692948746730869670908754188073542091973621265074265583182385560072567366227383567380577316296862528343858318946945517967854106447414857653511333997
[ 2] public exponent: 65537
[ 2] Validity: [From: Sat Aug 21 00:07:30 AWST 2010,
[ 2] To: Wed Jan 06 00:07:30 AWST 2038]
[ 2] Issuer: CN=Lisa, OU=Lisa, O=Lisa, L=Dallas, ST=Texas, C=US, EMAILADDRESS=support@itko.com
[ 2] SerialNumber: [ 4c6ea842]
[ 2]
[ 2] ]
[ 2] Algorithm: [SHA1withRSA]
[ 2] Signature:
[ 2] 0000: 2B 7F 77 08 DE 2F 74 E3 CD 0F 58 D8 57 D9 08 2E +.w../t...X.W...
[ 2] 0010: AC 57 A7 02 81 07 B7 F8 5B 68 AE 22 22 C6 75 EE .W......[h."".u.
[ 2] 0020: C2 41 B6 23 DE ED 17 F8 21 AE 3B ED B6 EA 1A 17 .A.#....!.;.....
[ 2] 0030: A4 5F 95 FD BE AE 74 DA 75 64 19 D6 60 0A 63 61 ._....t.ud..`.ca
[ 2] 0040: B6 2A E1 FB 06 C5 36 E5 00 0C EB 20 EF FA 82 29 .*....6.... ...)
[ 2] 0050: 40 39 EA 61 3A 27 CF 4F 00 18 33 E8 31 4C E4 C5 @9.a:'.O..3.1L..
[ 2] 0060: 44 98 60 15 80 FE 85 FB BF BD 95 AB 35 14 F7 16 D.`.........5...
[ 2] 0070: 9D 58 F5 26 10 B7 76 7D 43 20 A7 4B F4 ED EE CF .X.&..v.C .K....
[ 2]
[ 2] ]
[ 2] ***
[ 2] *** ClientKeyExchange, RSA PreMasterSecret, TLSv1
[ 2] ProcDlgThreadCallbk@2ce54912, WRITE: TLSv1 Handshake, length = 899
[ 2] SESSION KEYGEN:
[ 2] PreMaster Secret:
[ 2] 0000: 03 03 7B B9 84 DA FE 8F B6 34 67 54 0B A3 EA 8F .........4gT....
[ 2] 0010: 7B 9D 16 D9 6D 88 F4 26 5B 9F 88 8F 11 9E F1 A2 ....m..&[.......
[ 2] 0020: 61 AA 2B A1 36 16 F3 71 D8 4C 4F 8F 9F 27 1D F7 a.+.6..q.LO..'..
[ 2] CONNECTION KEYGEN:
[ 2] Client Nonce:
[ 2] 0000: 5A A0 F5 D2 9E 56 03 34 AA F9 31 67 70 13 77 C7 Z....V.4..1gp.w.
[ 2] 0010: 4F 41 4B DD 94 3D 92 86 6C 34 3A 45 93 A5 01 DB OAK..=..l4:E....
[ 2] Server Nonce:
[ 2] 0000: 5A A0 F5 D2 A2 AB A4 4B 19 66 4E DE AF 67 F4 12 Z......K.fN..g..
[ 2] 0010: B9 C4 CE A0 A3 CE DD 15 59 E7 7E 41 AF AA 37 8F ........Y..A..7.
[ 2] Master Secret:
[ 2] 0000: 24 E3 BF 6A DE 60 3A 94 E2 1C 90 8F 09 71 C5 7D $..j.`:......q..
[ 2] 0010: 9E 0A EB 3A CA 84 3F AC F9 33 56 D8 DB 00 07 3C ...:..?..3V....<
[ 2] 0020: C7 DD 64 62 1F F1 09 74 86 3B 74 4B 00 B8 0C B5 ..db...t.;tK....
[ 2] Client MAC write Secret:
[ 2] 0000: A1 6F 8D 4D 50 BC 14 1C 18 5C C5 F5 7A 75 CE 26 .o.MP....\..zu.&
[ 2] 0010: 0B 97 2C 22 ..,"
[ 2] Server MAC write Secret:
[ 2] 0000: 49 90 D6 EA 25 B7 17 A1 5E 1E 70 92 19 62 40 94 I...%...^.p..b@.
[ 2] 0010: 5F 71 0F BA _q..
[ 2] Client write key:
[ 2] 0000: 99 07 B9 F5 23 F5 52 0F E3 66 0A 42 4F E6 93 E1 ....#.R..f.BO...
[ 2] 0010: 32 29 89 EE 81 E9 4B 14 0B 33 BA 98 51 69 25 FA 2)....K..3..Qi%.
[ 2] Server write key:
[ 2] 0000: 21 DC 53 A4 F4 6A 18 51 B1 BD 82 D3 9F EE 54 75 !.S..j.Q......Tu
[ 2] 0010: E2 1D D8 98 EE 2B E0 57 79 A4 6F B7 DF A5 E8 E9 .....+.Wy.o.....
[ 2] Client write IV:
[ 2] 0000: 4B 39 1F CF 3D D1 0F C2 ED 40 C9 65 B7 55 A9 A7 K9..=....@.e.U..
[ 2] Server write IV:
[ 2] 0000: 48 C5 60 B1 30 2C C8 57 05 31 4E 90 E9 6C 1D 7E H.`.0,.W.1N..l..
[ 2] *** CertificateVerify
[ 2] ProcDlgThreadCallbk@2ce54912, WRITE: TLSv1 Handshake, length = 134
[ 2] ProcDlgThreadCallbk@2ce54912, WRITE: TLSv1 Change Cipher Spec, length = 1
[ 2] *** Finished
[ 2] [SSL Handshake Summary] Thread [ProcDlgThreadCallbk@2ce54912]
[ 2] [SSL Handshake Summary] Acting as a Client
[ 2] [SSL Handshake Summary] *†‡ indicates linked optional steps
[ 2] [SSL Handshake Summary]
[ 2] [SSL Handshake Summary] 1 RUN Client Hello -->
[ 2] [SSL Handshake Summary] 2 RUN <-- Server Hello
[ 2] [SSL Handshake Summary] 3* RUN <-- Server Certificate (Public Key)
[ 2] [SSL Handshake Summary] 4† RUN <-- Request Client Certificate
[ 2] [SSL Handshake Summary] 5* UNKNOWN Verify and Trust Server Certificate v
[ 2] [SSL Handshake Summary] 6‡ SKIPPED <-- Server Key Exchange
[ 2] [SSL Handshake Summary] 7 RUN <-- Server Hello Done
[ 2] [SSL Handshake Summary] 8† RUN Client Certificate (Public Key) -->
[ 2] [SSL Handshake Summary] 9† ASSUMED v Verify and Trust Client Certificate
[ 2] [SSL Handshake Summary] 10 RUN Client Key Exchange -->
[ 2] [SSL Handshake Summary] 11† RUN Certificate Verify Confirmation -->
[ 2] [SSL Handshake Summary] 12 RUN Client Change Cipher Spec -->
[ 2] [SSL Handshake Summary] 13 RUN Client Finished -->
[ 2] [SSL Handshake Summary] 14 RUN <-- Server Change Cipher Spec
[ 2] [SSL Handshake Summary] 15 RUN <-- Server Finished
[ 2] [SSL Handshake Summary]
[ 2] [SSL Handshake Summary] SEND TLSv1 ALERT: fatal, description = unexpected_message
[ 2] [SSL Handshake Summary] java.net.SocketException: Software caused connection abort: socket write error
[ 2] [SSL Handshake Summary] See Alert or Exception for details
[ 2] verify_data: { 188, 57, 213, 25, 60, 187, 34, 197, 102, 19, 135, 7 }
[ 2] ***
[ 2] ProcDlgThreadCallbk@2ce54912, WRITE: TLSv1 Handshake, length = 48
[ 2] ProcDlgThreadCallbk@2ce54912, waiting for close_notify or alert: state 1
[ 2] ProcDlgThreadCallbk@2ce54912, Exception while waiting for close java.net.SocketException: Software caused connection abort: recv failed
[ 2] ProcDlgThreadCallbk@2ce54912, handling exception: java.net.SocketException: Software caused connection abort: recv failed
[ 2] %% Invalidated: [Session-7, TLS_RSA_WITH_AES_256_CBC_SHA]
[ 2] ProcDlgThreadCallbk@2ce54912, SEND TLSv1 ALERT: fatal, description = unexpected_message
[ 2] ProcDlgThreadCallbk@2ce54912, WRITE: TLSv1 Alert, length = 32
[ 2] ProcDlgThreadCallbk@2ce54912, Exception sending alert: java.net.SocketException: Software caused connection abort: socket write error
[ 2] ProcDlgThreadCallbk@2ce54912, called closeSocket()
[ 2] ProcDlgThreadCallbk@2ce54912, setSoTimeout(180000) called
[ 2] Allow unsafe renegotiation: false
[ 2] Allow legacy hello messages: true
[ 2] Is initial handshake: true
[ 2] Is secure renegotiation: false
[ 2] Ignoring disabled protocol: SSLv3
[ 2] Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1
[ 2] Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLSv1
[ 2] Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 for TLSv1
[ 2] Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1
[ 2] Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 for TLSv1
[ 2] Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1
[ 2] Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1
[ 2] Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1.1
[ 2] Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLSv1.1
[ 2] Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1
[ 2] Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1.1
[ 2] Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 for TLSv1.1
[ 2] Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1
[ 2] Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1.1
[ 2] %% No cached client session
[ 2] *** ClientHello, TLSv1.2
[ 2] RandomCookie: GMT: 1503655122 bytes = { 214, 203, 47, 6, 26, 120, 231, 49, 34, 113, 12, 165, 38, 29, 45, 225, 3, 141, 150, 239, 11, 133, 104, 123, 126, 189, 108, 21 }
[ 2] Session ID: {}
[ 2] Cipher Suites: [TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384, TLS_RSA_WITH_AES_256_CBC_SHA256, TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384, TLS_DHE_RSA_WITH_AES_256_CBC_SHA256, TLS_DHE_DSS_WITH_AES_256_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDH_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_DSS_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256, TLS_RSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_DSS_WITH_AES_128_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, TLS_RSA_WITH_AES_256_GCM_SHA384, TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, TLS_DHE_DSS_WITH_AES_256_GCM_SHA384, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_DSS_WITH_AES_128_GCM_SHA256, TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA, TLS_EMPTY_RENEGOTIATION_INFO_SCSV, TLS_DH_anon_WITH_AES_256_GCM_SHA384, TLS_DH_anon_WITH_AES_128_GCM_SHA256, TLS_DH_anon_WITH_AES_256_CBC_SHA256, TLS_ECDH_anon_WITH_AES_256_CBC_SHA, TLS_DH_anon_WITH_AES_256_CBC_SHA, TLS_DH_anon_WITH_
[ 2] AES_128_CBC_SHA256, TLS_ECDH_anon_WITH_AES_128_CBC_SHA, TLS_DH_anon_WITH_AES_128_CBC_SHA, TLS_ECDH_anon_WITH_3DES_EDE_CBC_SHA, SSL_DH_anon_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_DES_CBC_SHA, SSL_DHE_RSA_WITH_DES_CBC_SHA, SSL_DHE_DSS_WITH_DES_CBC_SHA, SSL_DH_anon_WITH_DES_CBC_SHA, SSL_RSA_EXPORT_WITH_DES40_CBC_SHA, SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA, SSL_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA, SSL_DH_anon_EXPORT_WITH_DES40_CBC_SHA, TLS_RSA_WITH_NULL_SHA256, TLS_ECDHE_ECDSA_WITH_NULL_SHA, TLS_ECDHE_RSA_WITH_NULL_SHA, SSL_RSA_WITH_NULL_SHA, TLS_ECDH_ECDSA_WITH_NULL_SHA, TLS_ECDH_RSA_WITH_NULL_SHA, TLS_ECDH_anon_WITH_NULL_SHA, SSL_RSA_WITH_NULL_MD5, TLS_KRB5_WITH_3DES_EDE_CBC_SHA, TLS_KRB5_WITH_3DES_EDE_CBC_MD5, TLS_KRB5_WITH_DES_CBC_SHA, TLS_KRB5_WITH_DES_CBC_MD5, TLS_KRB5_EXPORT_WITH_DES_CBC_40_SHA, TLS_KRB5_EXPORT_WITH_DES_CBC_40_MD5]
[ 2] Compression Methods: { 0 }
[ 2] Extension elliptic_curves, curve names: {secp256r1, sect163k1, sect163r2, secp192r1, secp224r1, sect233k1, sect233r1, sect283k1, sect283r1, secp384r1, sect409k1, sect409r1, secp521r1, sect571k1, sect571r1, secp160k1, secp160r1, secp160r2, sect163r1, secp192k1, sect193r1, sect193r2, secp224k1, sect239k1, secp256k1}
[ 2] Extension ec_point_formats, formats: [uncompressed]
[ 2] Extension signature_algorithms, signature_algorithms: SHA512withECDSA, SHA512withRSA, SHA384withECDSA, SHA384withRSA, SHA256withECDSA, SHA256withRSA, SHA256withDSA, SHA1withECDSA, SHA1withRSA, SHA1withDSA
[ 2] ***
[ 2] ProcDlgThreadCallbk@2ce54912, WRITE: TLSv1.2 Handshake, length = 297
[ 2] ProcDlgThreadCallbk@2ce54912, READ: TLSv1 Handshake, length = 2348
[ 2] *** ServerHello, TLSv1
[ 2] RandomCookie: GMT: 1503655122 bytes = { 7, 39, 142, 70, 70, 242, 19, 74, 60, 236, 140, 10, 116, 104, 155, 201, 23, 176, 38, 111, 21, 9, 147, 241, 54, 184, 24, 132 }
[ 2] Session ID: {90, 160, 245, 210, 44, 207, 116, 203, 161, 106, 125, 244, 205, 215, 167, 192, 214, 133, 18, 127, 215, 198, 101, 16, 219, 10, 254, 36, 14, 199, 202, 129}
[ 2] Cipher Suite: TLS_RSA_WITH_AES_256_CBC_SHA
[ 2] Compression Method: 0
[ 2] Extension renegotiation_info, renegotiated_connection:
[ 2] ***
[ 2] %% Initialized: [Session-8, TLS_RSA_WITH_AES_256_CBC_SHA]
[ 2] ** TLS_RSA_WITH_AES_256_CBC_SHA
[ 2] *** Certificate chain
[ 2] chain [0] = [
[ 2] [
[ 2] Version: V3
[ 2] Subject: EMAILADDRESS=duty.sysprog@bankwest.com.au, CN=bbbb.mps2.bankwest.com, OU=BWA Group Services Pty Ltd, O=Commonwealth Bank of Australia, L=Perth, ST=WA, C=AU
[ 2] Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5
[ 2]
[ 2] Key: Sun RSA public key, 2048 bits
[ 2] modulus: 26440769111413576055346839927364392822027480382790481478154498185491321589829289662408844753951890388938985607312352111414251608577990009729445664992742403913155746840181967655356518558322629282182583615689380822595800210339328637885490480860545027038715111210571037622416127220560351150048294136574846346365791587173066371523198548147310260273352942815933864283398318401632092577707597452700338537719827614956958594507443530072095300695973883457133934160204107666396622875131539050578776316876089050918544752977206314745801342895873881627784166265682182434552424151460241666993656198380889999487666985386934137244429
[ 2] public exponent: 65537
[ 2] Validity: [From: Wed May 20 09:24:59 AWST 2015,
[ 2] To: Sat May 19 09:24:59 AWST 2018]
[ 2] Issuer: CN=Bankwest Web Enrolment CA, O=Bank of Western Australia Ltd, C=AU
[ 2] SerialNumber: [ 6f1973df 00000000 03d5]
[ 2]
[ 2] Certificate Extensions: 9
[ 2] [1]: ObjectId: 1.3.6.1.4.1.311.21.10 Criticality=false
[ 2] Extension unknown: DER encoded OCTET string =
[ 2] 0000: 04 1A 30 18 30 0A 06 08 2B 06 01 05 05 07 03 02 ..0.0...+.......
[ 2] 0010: 30 0A 06 08 2B 06 01 05 05 07 03 01 0...+.......
[ 2]
[ 2]
[ 2] [2]: ObjectId: 1.3.6.1.4.1.311.21.7 Criticality=false
[ 2] Extension unknown: DER encoded OCTET string =
[ 2] 0000: 04 30 30 2E 06 26 2B 06 01 04 01 82 37 15 08 83 .00..&+.....7...
[ 2] 0010: CF D4 7B 81 B8 CB 6E 82 AD 99 1A 85 F2 EB 54 84 ......n.......T.
[ 2] 0020: 93 E1 4B 18 86 F4 9F 7C 81 AF B9 71 02 01 64 02 ..K........q..d.
[ 2] 0030: 01 0A ..
[ 2]
[ 2]
[ 2] [3]: ObjectId: 1.3.6.1.5.5.7.1.1 Criticality=false
[ 2] AuthorityInfoAccess [
[ 2] [
[ 2] accessMethod: caIssuers
[ 2] accessLocation: URIName: ldap:///CN=Bankwest%20Web%20Enrolment%20CA,CN=AIA,CN=Public%20Key%20Services
[ 2] ,CN=Services,CN=Configuration,DC=rtdomau,DC=local?cACertificate?base?objectClass=certificationAuthority
[ 2] ,
[ 2] accessMethod: caIssuers
[ 2] accessLocation: URIName: http://cdp.rtdomau.local/CertData/CBDCERT004.rtdomau.local_Bankwest%20Web%20Enrolment%20CA.crt
[ 2] ,
[ 2] accessMethod: caIssuers
[ 2] accessLocation: URIName: http://cbdcert004.rtdomau.local/CertEnroll/CBDCERT004.rtdomau.local_Bankwest%20Web%20Enrolment%20CA.crt
[ 2] ]
[ 2] ]
[ 2]
[ 2] [4]: ObjectId: 2.5.29.35 Criticality=false
[ 2] AuthorityKeyIdentifier [
[ 2] KeyIdentifier [
[ 2] 0000: D1 AA C0 AE 25 4F 6D 98 66 E0 EF 60 43 BF 85 6D ....%Om.f..`C..m
[ 2] 0010: 81 8E 60 0B ..`.
[ 2] ]
[ 2] ]
[ 2]
[ 2] [5]: ObjectId: 2.5.29.31 Criticality=false
[ 2] CRLDistributionPoints [
[ 2] [DistributionPoint:
[ 2] [URIName: ldap:///CN=Bankwest%20Web%20Enrolment%20CA,CN=CBDCERT004,CN=CDP,CN=Public%20Key%20Services,CN=Services,CN=Configuration,DC=rtdomau,DC=local?certificateRevocationList?base?objectClass=cRLDistributionPoint, URIName: http://cdp.rtdomau.local/CertData/Bankwest%20Web%20Enrolment%20CA.crl]
[ 2] ]]
[ 2]
[ 2] [6]: ObjectId: 2.5.29.37 Criticality=false
[ 2] ExtendedKeyUsages [
[ 2] clientAuth
[ 2] serverAuth
[ 2] ]
[ 2]
[ 2] [7]: ObjectId: 2.5.29.15 Criticality=false
[ 2] KeyUsage [
[ 2] DigitalSignature
[ 2] Key_Encipherment
[ 2] Data_Encipherment
[ 2] ]
[ 2]
[ 2] [8]: ObjectId: 2.5.29.17 Criticality=false
[ 2] SubjectAlternativeName [
[ 2] DNSName: bbbb.mps2.bankwest.com
[ 2] DNSName: bbbb.bankwest.com
[ 2] ]
[ 2]
[ 2] [9]: ObjectId: 2.5.29.14 Criticality=false
[ 2] SubjectKeyIdentifier [
[ 2] KeyIdentifier [
[ 2] 0000: 25 85 82 DD 97 13 E6 94 6B 67 A2 F8 0B 2A 40 E9 %.......kg...*@.
[ 2] 0010: DB 52 22 C8 .R".
[ 2] ]
[ 2] ]
[ 2]
[ 2] ]
[ 2] Algorithm: [SHA1withRSA]
[ 2] Signature:
[ 2] 0000: 67 14 99 DF F5 34 2B CF 6C 89 44 34 ED 2C 8F 93 g....4+.l.D4.,..
[ 2] 0010: 4E 51 2E 05 77 18 2A A9 7C 04 0D BA DD 37 D6 45 NQ..w.*......7.E
[ 2] 0020: 96 95 07 56 84 23 40 C0 91 1C 30 A3 5B DA 20 18 ...V.#@...0.[. .
[ 2] 0030: 99 B6 D0 F9 EF ED F7 9A A8 A2 27 16 9D 61 9E 2D ..........'..a.-
[ 2] 0040: 55 43 18 A8 39 C8 BD B2 90 FA 0F 41 9D 79 C0 E6 UC..9......A.y..
[ 2] 0050: 4F 7F 2E 7F 17
[ 2] 81 32 9E 18 D8 F2 57 05 16 21 95 O.....2....W..!.
[ 2] 0060: 44 B8 D0 0A 2D 14 51 A2 18 CD 98 EC 16 19 5C 3F D...-.Q.......\?
[ 2] 0070: C3 F6 BC A9 9B F9 67 C7 68 34 0E 57 5C 04 78 41 ......g.h4.W\.xA
[ 2] 0080: 96 0B 4F 01 74 D7 7E F7 B7 11 F0 99 2C 69 72 4C ..O.t.......,irL
[ 2] 0090: 7E 8D 4E 81 C3 1C 79 3D 1A B6 BB 45 02 73 23 87 ..N...y=...E.s#.
[ 2] 00A0: 63 AF 65 DF 99 AE F1 8D D6 BF D6 73 88 51 6B 32 c.e........s.Qk2
[ 2] 00B0: CF B0 B7 D5 87 74 78 F5 C2 66 23 B6 B0 57 EE C2 .....tx..f#..W..
[ 2] 00C0: EE E2 50 25 08 2C 60 EA 4D DA 6B 5A C7 AA 3D E2 ..P%.,`.M.kZ..=.
[ 2] 00D0: 65 FD 97 C0 C6 29 05 3B CA C8 5B F6 D9 67 20 4B e....).;..[..g K
[ 2] 00E0: DC A8 FF 98 9C C2 B1 BA 36 CB E8 96 E0 12 26 EE ........6.....&.
[ 2] 00F0: E0 69 07 9C 68 0E 38 C3 1F 2D 4D FB 2B 1F 27 A9 .i..h.8..-M.+.'.
[ 2]
[ 2] ]
[ 2] ***
[ 2] *** CertificateRequest
[ 2] Cert Types: RSA, DSS, ECDSA
[ 2] Cert Authorities:
[ 2] <emailaddress=duty.sysprog@bankwest.com.au, cn="bbbb.mps2.bankwest.com," ou="BWA" group="" services="" pty="" ltd,="" o="Commonwealth" bank="" of="" australia,="" l="Perth," st="WA," c="AU">
[ 2] <cn=bankwest root="" ca,="" o="Bank" of="" western="" australia="" ltd,="" c="AU">
[ 2] *** ServerHelloDone
[ 2] *** Certificate chain
[ 2] chain [0] = [
[ 2] [
[ 2] Version: V3
[ 2] Subject: CN=Lisa, OU=Lisa, O=Lisa, L=Dallas, ST=Texas, C=US, EMAILADDRESS=support@itko.com
[ 2] Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5
[ 2]
[ 2] Key: Sun RSA public key, 1024 bits
[ 2] modulus: 107577342571485428802393728049184265786056348388364405824138117397977455761833138845329880593678805610027793821217939298848284286683543926634250841496293888229172692948746730869670908754188073542091973621265074265583182385560072567366227383567380577316296862528343858318946945517967854106447414857653511333997
[ 2] public exponent: 65537
[ 2] Validity: [From: Sat Aug 21 00:07:30 AWST 2010,
[ 2] To: Wed Jan 06 00:07:30 AWST 2038]
[ 2] Issuer: CN=Lisa, OU=Lisa, O=Lisa, L=Dallas, ST=Texas, C=US, EMAILADDRESS=support@itko.com
[ 2] SerialNumber: [ 4c6ea842]
[ 2]
[ 2] ]
[ 2] Algorithm: [SHA1withRSA]
[ 2] Signature:
[ 2] 0000: 2B 7F 77 08 DE 2F 74 E3 CD 0F 58 D8 57 D9 08 2E +.w../t...X.W...
[ 2] 0010: AC 57 A7 02 81 07 B7 F8 5B 68 AE 22 22 C6 75 EE .W......[h."".u.
[ 2] 0020: C2 41 B6 23 DE ED 17 F8 21 AE 3B ED B6 EA 1A 17 .A.#....!.;.....
[ 2] 0030: A4 5F 95 FD BE AE 74 DA 75 64 19 D6 60 0A 63 61 ._....t.ud..`.ca
[ 2] 0040: B6 2A E1 FB 06 C5 36 E5 00 0C EB 20 EF FA 82 29 .*....6.... ...)
[ 2] 0050: 40 39 EA 61 3A 27 CF 4F 00 18 33 E8 31 4C E4 C5 @9.a:'.O..3.1L..
[ 2] 0060: 44 98 60 15 80 FE 85 FB BF BD 95 AB 35 14 F7 16 D.`.........5...
[ 2] 0070: 9D 58 F5 26 10 B7 76 7D 43 20 A7 4B F4 ED EE CF .X.&..v.C .K....
[ 2]
[ 2] ]
[ 2] ***
[ 2] *** ClientKeyExchange, RSA PreMasterSecret, TLSv1
[ 2] ProcDlgThreadCallbk@2ce54912, WRITE: TLSv1 Handshake, length = 899
[ 2] SESSION KEYGEN:
[ 2] PreMaster Secret:
[ 2] 0000: 03 03 5B FB 01 8E 6F 3B 13 7C 24 9F 38 B4 CD E5 ..[...o;..$.8...
[ 2] 0010: 60 E9 8A 85 66 49 36 FC 9B 99 64 6D B8 3C E4 4A `...fI6...dm.<.J
[ 2] 0020: 6C D4 88 A1 D5 E6 B8 A4 63 F9 2E 76 75 F5 AB 85 l.......c..vu...
[ 2] CONNECTION KEYGEN:
[ 2] Client Nonce:
[ 2] 0000: 5A A0 F5 D2 D6 CB 2F 06 1A 78 E7 31 22 71 0C A5 Z...../..x.1"q..
[ 2] 0010: 26 1D 2D E1 03 8D 96 EF 0B 85 68 7B 7E BD 6C 15 &.-.......h...l.
[ 2] Server Nonce:
[ 2] 0000: 5A A0 F5 D2 07 27 8E 46 46 F2 13 4A 3C EC 8C 0A Z....'.FF..J<...
[ 2] 0010: 74 68 9B C9 17 B0 26 6F 15 09 93 F1 36 B8 18 84 th....&o....6...
[ 2] Master Secret:
[ 2] 0000: 79 7E F2 7D 9A EC DB 1D 09 DB 4A 3A 23 1E C9 EC y.........J:#...
[ 2] 0010: 61 14 A6 85 83 35 CA 01 F9 B3 B2 3E D2 17 77 F0 a....5.....>..w.
[ 2] 0020: 19 79 16 30 37 7E 83 06 4C E8 D0 16 C9 B8 63 FB .y.07...L.....c.
[ 2] Client MAC write Secret:
[ 2] 0000: BF 80 B3 B5 40 CD 29 54 EA 89 FD 7D 2C 60 2E 54 ....@.)T....,`.T
[ 2] 0010: BD 7D A7 0D ....
[ 2] Server MAC write Secret:
[ 2] 0000: 41 16 64 60 A8 AC E4 B5 A6 F4 D4 13 02 43 B7 A5 A.d`.........C..
[ 2] 0010: 7E 64 CF 61 .d.a
[ 2] Client write key:
[ 2] 0000: 2A 41 3D D7 E7 27 7F 50 93 A8 5D 49 D1 D7 60 C9 *A=..'.P..]I..`.
[ 2] 0010: 14 D8 9E 54 F9 50 6D 82 74 16 A1 14 A5 D0 A9 BE ...T.Pm.t.......
[ 2] Server write key:
[ 2] 0000: D6 65 BD C5 44 65 16 1E AD C3 FC 5E B2 4B B6 B9 .e..De.....^.K..
[ 2] 0010: 6C FB 91 F4 6D 45 F7 C5 E2 40 45 94 00 C8 66 7A l...mE...@E...fz
[ 2] Client write IV:
[ 2] 0000: 7D CB E2 95 C9 46 1A D8 AA B9 1B 83 2C 32 8F 9F .....F......,2..
[ 2] Server write IV:
[ 2] 0000: ED A7 7D 83 E9 34 BD CE EA 61 94 0A E5 03 AE 57 .....4...a.....W
[ 2] *** CertificateVerify
[ 2] ProcDlgThreadCallbk@2ce54912, WRITE: TLSv1 Handshake, length = 134
[ 2] ProcDlgThreadCallbk@2ce54912, WRITE: TLSv1 Change Cipher Spec, length = 1
[ 2] ProcDlgThreadCallbk@2ce54912, handling exception: java.net.SocketException: Software caused connection abort: socket write error
[ 2] %% Invalidated: [Session-8, TLS_RSA_WITH_AES_256_CBC_SHA]
[ 2] ProcDlgThreadCallbk@2ce54912, SEND TLSv1 ALERT: fatal, description = unexpected_message
[ 2] ProcDlgThreadCallbk@2ce54912, WRITE: TLSv1 Alert, length = 2
[ 2] ProcDlgThreadCallbk@2ce54912, Exception sending alert: java.net.SocketException: Software caused connection abort: socket write error
[ 2] ProcDlgThreadCallbk@2ce54912, called closeSocket()
[ 2] ProcDlgThreadCallbk@2ce54912, called close()
[ 2] ProcDlgThreadCallbk@2ce54912, called closeInternal(true)
[ 2] [SSL Handshake Summary] Thread [ProcDlgThreadCallbk@2ce54912]
[ 2] [SSL Handshake Summary] Acting as a Client
[ 2] [SSL Handshake Summary] *†‡ indicates linked optional steps
[ 2] [SSL Handshake Summary]
[ 2] [SSL Handshake Summary] 1 RUN Client Hello -->
[ 2] [SSL Handshake Summary] 2 RUN <-- Server Hello
[ 2] [SSL Handshake Summary] 3* RUN <-- Server Certificate (Public Key)
[ 2] [SSL Handshake Summary] 4† RUN <-- Request Client Certificate
[ 2] [SSL Handshake Summary] 5* UNKNOWN Verify and Trust Server Certificate v
[ 2] [SSL Handshake Summary] 6‡ SKIPPED <-- Server Key Exchange
[ 2] [SSL Handshake Summary] 7 RUN <-- Server Hello Done
[ 2] [SSL Handshake Summary] 8† RUN Client Certificate (Public Key) -->
[ 2] [SSL Handshake Summary] 9† UNKNOWN v Verify and Trust Client Certificate
[ 2] [SSL Handshake Summary] 10 RUN Client Key Exchange -->
[ 2] [SSL Handshake Summary] 11† RUN Certificate Verify Confirmation -->
[ 2] [SSL Handshake Summary] 12 RUN Client Change Cipher Spec -->
[ 2] [SSL Handshake Summary] 13 UNKNOWN Client Finished -->
[ 2] [SSL Handshake Summary] 14 UNKNOWN <-- Server Change Cipher Spec
[ 2] [SSL Handshake Summary] 15 UNKNOWN <-- Server Finished
[ 2] [SSL Handshake Summary]
[ 2] [SSL Handshake Summary] SEND TLSv1 ALERT: fatal, description = unexpected_message
[ 2] [SSL Handshake Summary] java.net.SocketException: Software caused connection abort: socket write error
[ 2] [SSL Handshake Summary] See Alert or Exception for details
[ 1] Finalizer, called close()
[ 1] Finalizer, called closeInternal(true)
[ 1] Finalizer, called close()
[ 1] Finalizer, called closeInternal(true)
[ 1] Finalizer, called close()
[ 1] Finalizer, called closeInternal(true)
[ 1] Finalizer, called close()
[ 1] Finalizer, called closeInternal(true)

Outcomes