[ 5] *** |
[ 5] found key for : lisa |
[ 5] chain [0] = [ |
[ 5] [ |
[ 5] Version: V3 |
[ 5] Subject: CN=Lisa, OU=Lisa, O=Lisa, L=Dallas, ST=Texas, C=US, EMAILADDRESS=support@itko.com |
[ 5] Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5 |
[ 5] |
[ 5] Key: Sun RSA public key, 1024 bits |
[ 5] modulus: 107577342571485428802393728049184265786056348388364405824138117397977455761833138845329880593678805610027793821217939298848284286683543926634250841496293888229172692948746730869670908754188073542091973621265074265583182385560072567366227383567380577316296862528343858318946945517967854106447414857653511333997 |
[ 5] public exponent: 65537 |
[ 5] Validity: [From: Fri Aug 20 21:37:30 IST 2010, |
[ 5] To: Tue Jan 05 21:37:30 IST 2038] |
[ 5] Issuer: CN=Lisa, OU=Lisa, O=Lisa, L=Dallas, ST=Texas, C=US, EMAILADDRESS=support@itko.com |
[ 5] SerialNumber: [ 4c6ea842] |
[ 5] |
[ 5] ] |
[ 5] Algorithm: [SHA1withRSA] |
[ 5] Signature: |
[ 5] 0000: 2B 7F 77 08 DE 2F 74 E3 CD 0F 58 D8 57 D9 08 2E +.w../t...X.W... |
[ 5] 0010: AC 57 A7 02 81 07 B7 F8 5B 68 AE 22 22 C6 75 EE .W......[h."".u. |
[ 5] 0020: C2 41 B6 23 DE ED 17 F8 21 AE 3B ED B6 EA 1A 17 .A.#....!.;..... |
[ 5] 0030: A4 5F 95 FD BE AE 74 DA 75 64 19 D6 60 0A 63 61 ._....t.ud..`.ca |
[ 5] 0040: B6 2A E1 FB 06 C5 36 E5 00 0C EB 20 EF FA 82 29 .*....6.... ...) |
[ 5] 0050: 40 39 EA 61 3A 27 CF 4F 00 18 33 E8 31 4C E4 C5 @9.a:'.O..3.1L.. |
[ 5] 0060: 44 98 60 15 80 FE 85 FB BF BD 95 AB 35 14 F7 16 D.`.........5... |
[ 5] 0070: 9D 58 F5 26 10 B7 76 7D 43 20 A7 4B F4 ED EE CF .X.&..v.C .K.... |
[ 5] |
[ 5] ] |
[ 5] *** |
[ 5] X509KeyManager passed to SSLContext.init(): need an X509ExtendedKeyManager for SSLEngine use |
[ 5] trigger seeding of SecureRandom |
[ 5] done seeding SecureRandom |
[ 5] Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 |
[ 5] Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA |
[ 5] Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 |
[ 5] Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA |
[ 5] Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 |
[ 5] Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 |
[ 5] Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA |
[ 5] Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384 |
[ 5] Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 |
[ 5] Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_GCM_SHA384 |
[ 5] Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 |
[ 5] Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 |
[ 5] Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA |
[ 5] Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384 |
[ 5] Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 |
[ 5] Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 |
[ 5] Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA |
[ 5] Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 |
[ 5] Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA |
[ 5] Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA |
[ 5] Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 |
[ 5] Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 |
[ 5] Ignoring unavailable cipher suite: TLS_DH_anon_WITH_AES_256_CBC_SHA |
[ 5] Ignoring unavailable cipher suite: TLS_DH_anon_WITH_AES_256_CBC_SHA256 |
[ 5] Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA |
[ 5] Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 |
[ 5] Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA |
[ 5] Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 |
[ 5] Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 |
[ 5] Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA |
[ 5] Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384 |
[ 5] Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 |
[ 5] Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_GCM_SHA384 |
[ 5] Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 |
[ 5] Ignoring unavailable cipher suite: TLS_ECDH_anon_WITH_AES_256_CBC_SHA |
[ 5] Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 |
[ 5] Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA |
[ 5] Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384 |
[ 5] Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 |
[ 5] Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 |
[ 5] Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA |
[ 5] Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 |
[ 5] Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA |
[ 5] Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA |
[ 5] Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 |
[ 5] Ignoring unavailable cipher suite: TLS_DH_anon_WITH_AES_256_GCM_SHA384 |
[ 5] Execute REST Node, setSoTimeout(180000) called |
[ 5] Allow unsafe renegotiation: false |
[ 5] Allow legacy hello messages: true |
[ 5] Is initial handshake: true |
[ 5] Is secure renegotiation: false |
[ 5] Ignoring disabled protocol: SSLv3 |
[ 5] Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 for TLSv1 |
[ 5] Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 for TLSv1 |
[ 5] Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 for TLSv1 |
[ 5] Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256 for TLSv1 |
[ 5] Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256 for TLSv1 |
[ 5] Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 for TLSv1 |
[ 5] Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 for TLSv1 |
[ 5] Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 |
[ 5] Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 |
[ 5] Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 |
[ 5] Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256 |
[ 5] Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256 |
[ 5] Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 |
[ 5] Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 |
[ 5] Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 |
[ 5] Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 |
[ 5] Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_128_GCM_SHA256 |
[ 5] Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256 |
[ 5] Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256 |
[ 5] Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 |
[ 5] Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 |
[ 5] Ignoring unsupported cipher suite: TLS_DH_anon_WITH_AES_128_GCM_SHA256 |
[ 5] Ignoring unsupported cipher suite: TLS_DH_anon_WITH_AES_128_CBC_SHA256 |
[ 5] Ignoring unsupported cipher suite: TLS_RSA_WITH_NULL_SHA256 |
[ 5] %% No cached client session |
[ 5] *** ClientHello, TLSv1 |
[ 5] RandomCookie: GMT: 1506681132 bytes = { 211, 64, 179, 124, 177, 128, 143, 20, 220, 151, 79, 109, 14, 128, 43, 128, 151, 172, 47, 82, 197, 118, 25, 233, 41, 199, 147, 48 } |
[ 5] Session ID: {} |
[ 5] Cipher Suites: [TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA, TLS_EMPTY_RENEGOTIATION_INFO_SCSV, TLS_ECDH_anon_WITH_AES_128_CBC_SHA, TLS_DH_anon_WITH_AES_128_CBC_SHA, TLS_ECDH_anon_WITH_3DES_EDE_CBC_SHA, SSL_DH_anon_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_DES_CBC_SHA, SSL_DHE_RSA_WITH_DES_CBC_SHA, SSL_DHE_DSS_WITH_DES_CBC_SHA, SSL_DH_anon_WITH_DES_CBC_SHA, SSL_RSA_EXPORT_WITH_DES40_CBC_SHA, SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA, SSL_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA, SSL_DH_anon_EXPORT_WITH_DES40_CBC_SHA, TLS_ECDHE_ECDSA_WITH_NULL_SHA, TLS_ECDHE_RSA_WITH_NULL_SHA, SSL_RSA_WITH_NULL_SHA, TLS_ECDH_ECDSA_WITH_NULL_SHA, TLS_ECDH_RSA_WITH_NULL_SHA, TLS_ECDH_anon_WITH_NULL_SHA, SSL_RSA_WITH_NULL_MD5, TLS_KRB5_WITH_3DES_EDE_CBC_SHA, TLS_KRB5_WITH_3DES_EDE_CBC_MD5, TLS_KRB5_WITH_DES_CBC_SHA, TLS_KRB5_WITH_DES_CBC_MD5, TLS_KRB5_EXPORT_WITH_DES_CBC_40_SHA, TLS_KRB5_EXPORT_WITH_DES_CBC_40_MD5] |
[ 5] Compression Methods: { 0 } |
[ 5] Extension elliptic_curves, curve names: {secp256r1, sect163k1, sect163r2, secp192r1, secp224r1, sect233k1, sect233r1, sect283k1, sect283r1, secp384r1, sect409k1, sect409r1, secp521r1, sect571k1, sect571r1, secp160k1, secp160r1, secp160r2, sect163r1, secp192k1, sect193r1, sect193r2, secp224k1, sect239k1, secp256k1} |
[ 5] Extension ec_point_formats, formats: [uncompressed] |
[ 5] *** |
[ 5] Execute REST Node, WRITE: TLSv1 Handshake, length = 187 |
[ 5] Execute REST Node, WRITE: SSLv2 client hello message, length = 179 |
[ 5] Execute REST Node, READ: TLSv1 Alert, length = 2 |
[ 5] Execute REST Node, RECV TLSv1.2 ALERT: fatal, handshake_failure |
[ 5] Execute REST Node, called closeSocket() |
[ 5] Execute REST Node, handling exception: javax.net.ssl.SSLHandshakeException: Received fatal alert: handshake_failure |
[ 5] Execute REST Node, called close() |
[ 5] Execute REST Node, called closeInternal(true) |
[ 5] [SSL Handshake Summary] Thread [Execute REST Node] |
[ 5] [SSL Handshake Summary] Can not be sure if Client or Server |
[ 5] [SSL Handshake Summary] *†‡ indicates linked optional steps |
[ 5] [SSL Handshake Summary] |
[ 5] [SSL Handshake Summary] 1 RUN Client Hello --> |
[ 5] [SSL Handshake Summary] 2 UNKNOWN <-- Server Hello |
[ 5] [SSL Handshake Summary] 3* UNKNOWN <-- Server Certificate (Public Key) |
[ 5] [SSL Handshake Summary] 4† UNKNOWN <-- Request Client Certificate |
[ 5] [SSL Handshake Summary] 5* UNKNOWN Verify and Trust Server Certificate v |
[ 5] [SSL Handshake Summary] 6‡ UNKNOWN <-- Server Key Exchange |
[ 5] [SSL Handshake Summary] 7 UNKNOWN <-- Server Hello Done |
[ 5] [SSL Handshake Summary] 8† UNKNOWN Client Certificate (Public Key) --> |
[ 5] [SSL Handshake Summary] 9† UNKNOWN v Verify and Trust Client Certificate |
[ 5] [SSL Handshake Summary] 10 UNKNOWN Client Key Exchange --> |
[ 5] [SSL Handshake Summary] 11† UNKNOWN Certificate Verify Confirmation --> |
[ 5] [SSL Handshake Summary] 12 UNKNOWN Client Change Cipher Spec --> |
[ 5] [SSL Handshake Summary] 13 UNKNOWN Client Finished --> |
[ 5] [SSL Handshake Summary] 14 UNKNOWN <-- Server Change Cipher Spec |
[ 5] [SSL Handshake Summary] 15 UNKNOWN <-- Server Finished |
[ 5] [SSL Handshake Summary] |
[ 5] [SSL Handshake Summary] RECV TLSv1.2 ALERT: fatal, handshake_failure |
[ 5] [SSL Handshake Summary] javax.net.ssl.SSLHandshakeException: Received fatal alert: handshake_failure |
[ 5] [SSL Handshake Summary] See Alert or Exception for details |