-
Bug
-
Resolution: Incomplete
-
P3
-
None
-
8u25
-
x86_64
-
windows_7
FULL PRODUCT VERSION :
Client JRE version:
---------------------------
java version "1.8.0_25"
Java(TM) SE Runtime Environment (build 1.8.0_25-b18)
Java HotSpot(TM) 64-Bit Server VM (build 25.25-b02, mixed mode)
Server JRE version:
----------------------------
java version "1.7.0_45"
Java(TM) SE Runtime Environment (build 1.7.0_45-b18)
Java HotSpot(TM) 64-Bit Server VM (build 24.45-b08, mixed mode)
ADDITIONAL OS VERSION INFORMATION :
Client OS:
---------------
* Windows 7 Professional SP1
* Microsoft Windows [Version 6.1.7601]
Server OS:
----------------
* SLES 11 SP3 (SuSE Linux Enterprise Server)
* Linux sentinel-dev-05 3.0.76-0.11-default #1 SMP Fri Jun 14 08:21:43 UTC 2013 (ccab990) x86_64 x86_64 x86_64 GNU/Linux
A DESCRIPTION OF THE PROBLEM :
The SSL / TLS handshake between a "Java 1.7 TLS 1.1 server" and a "Java 1.8 client" fails in my environment with the following exception on the server side:
java.security.NoSuchAlgorithmException: no such algorithm: SunTls12MasterSecret for provider SunPKCS11-NSSfips
Following are the details of the server and the client in my environment:
Server:
-----------
* The server uses Java 1.7u45 and is running in FIPS 140 compliant mode as mentioned in http://docs.oracle.com/javase/7/docs/technotes/guides/security/jsse/FIPS.html.
* The server uses Mozilla Network Security Services (NSS) version 3.14.3 as the cryptographic provider.
* The server is running on SLES 11 SP3 (SuSE Linux Enterprise Server) operating system and uses the following NSS RPMS provided by the OS:
* mozilla-nss-3.14.3-0.11.11
* mozilla-nss-tools-3.14.3-0.11.11
* mozilla-nspr-4.9.6-0.3.1
* libfreebl3-3.14.3-0.11.11
* libsoftokn3-3.14.3-0.11.11
* An important point to note is that NSS version 3.14.3 DOES NOT support TLS 1.2.
* The server uses Java 1.7u45 because of the Java bug "8028192 Use of PKCS11-NSS provider in FIPS mode broken" introduced in Java 1.7u51. See "Known Issues" section "Area: security-libs/javax.net.ssl" in http://www.oracle.com/technetwork/java/javase/7u51-relnotes-2085002.html for more details.
Client:
----------
* The client is a Java Swing based client application which is launched using Java Web Start.
* The client uses Java 1.8u25 and is running on Windows 7 Professional SP1 operating system.
* Since the server does not support TLS 1.2, TLS 1.2 has been disabled in the client side in the "Advanced" tab of the Java Control Panel as mentioned in https://docs.oracle.com/javase/8/docs/technotes/guides/deploy/jcp.html#A1153011.
Issue:
---------
* Since the server does not support TLS 1.2, I disabled TLS 1.2 on the client side.
* Issue is that the handshake fails "even after" disabling TLS 1.2 on the client side.
Additional observations:
----------------------------------
* The same scenario works fine if Java 1.7 (any version) is used and TLS 1.2 is disabled on the client side.
* The same exception "java.security.NoSuchAlgorithmException: no such algorithm: SunTls12MasterSecret for provider SunPKCS11-NSSfips" is thrown in the server side if Java 1.7 (any version) is used and TLS 1.2 is enabled in the client side.
* It fails if Java 1.8 (any version) is used in the client side, even after disabling TLS 1.2.
Server side SSL debug logs:
----------------------------------------
* It seems that the handshake is first initiated with TLS 1.1 using the cipher TLS_RSA_WITH_AES_128_CBC_SHA.
* After this, for some reason, the handshake is re-initiated with TLS 1.2 using the cipher TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 which fails with the exception "java.security.NoSuchAlgorithmException: no such algorithm: SunTls12MasterSecret for provider SunPKCS11-NSSfips".
* See "Error Message(s)" section for detailed SSL debug logs.
REGRESSION. Last worked in version 7u72
ADDITIONAL REGRESSION INFORMATION:
It was working with the following JRE versions in the client and the server:
Client JRE version:
---------------------------
java version "1.7.0_72"
Java(TM) SE Runtime Environment (build 1.7.0_72-b14)
Java HotSpot(TM) 64-Bit Server VM (build 24.72-b04, mixed mode)
Server JRE version:
----------------------------
java version "1.7.0_45"
Java(TM) SE Runtime Environment (build 1.7.0_45-b18)
Java HotSpot(TM) 64-Bit Server VM (build 24.45-b08, mixed mode)
EXPECTED VERSUS ACTUAL BEHAVIOR :
EXPECTED -
* With Java 1.7 u72 on the client side, the TLS handshake worked fine if TLS 1.2 is disabled in the Java Control Panel in the client machine.
* Similarly, with Java 1.8u25 on the client side, it is expected that the TLS handshake will work fine if TLS 1.2 is disabled in the Java Control Panel in the client machine.
ACTUAL -
With Java 1.8u25 on the client side, the TLS handshake fails even if TLS 1.2 is disabled in the Java Control Panel in the client machine.
ERROR MESSAGES/STACK TRACES THAT OCCUR :
Server side SSL debug logs:
=======================
Server TLS 1.1 Java 1.7u45 + Client Java 1.7u72 "TLS 1.2 disabled" - works:
============================================================
2014/12/01 13:21:01 | INFO | jvm 1 | *** ClientHello, TLSv1
2014/12/01 13:21:01 | INFO | jvm 1 | RandomCookie: GMT: 1417420005 bytes = { 182, 127, 131, 236, 1, 250, 57, 121, 183, 198, 221, 74, 140, 57, 181, 52, 147, 229, 192, 226, 0, 75, 213, 197, 142, 176, 144, 102 }
2014/12/01 13:21:01 | INFO | jvm 1 | Session ID: {84, 124, 28, 199, 170, 182, 64, 91, 37, 151, 80, 102, 223, 64, 21, 30, 57, 160, 79, 40, 52, 118, 169, 75, 23, 147, 96, 114, 95, 74, 105, 36}
2014/12/01 13:21:01 | INFO | jvm 1 | Cipher Suites: [TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, TLS_EMPTY_RENEGOTIATION_INFO_SCSV]
2014/12/01 13:21:01 | INFO | jvm 1 | Compression Methods: { 0 }
2014/12/01 13:21:01 | INFO | jvm 1 | Extension elliptic_curves, curve names: {secp256r1, sect163k1, sect163r2, secp192r1, secp224r1, sect233k1, sect233r1, sect283k1, sect283r1, secp384r1, sect409k1, sect409r1, secp521r1, sect571k1, sect571r1}
2014/12/01 13:21:01 | INFO | jvm 1 | Extension ec_point_formats, formats: [uncompressed]
2014/12/01 13:21:01 | INFO | jvm 1 | ***
2014/12/01 13:21:01 | INFO | jvm 1 | %% Resuming [Session-236, TLS_RSA_WITH_AES_128_CBC_SHA]
2014/12/01 13:21:01 | INFO | jvm 1 | *** ServerHello, TLSv1
2014/12/01 13:21:01 | INFO | jvm 1 | RandomCookie: GMT: 1417420005 bytes = { 176, 222, 143, 54, 186, 6, 117, 144, 98, 121, 120, 235, 91, 6, 71, 80, 97, 233, 53, 250, 34, 73, 90, 155, 201, 44, 94, 2 }
2014/12/01 13:21:01 | INFO | jvm 1 | Session ID: {84, 124, 28, 199, 170, 182, 64, 91, 37, 151, 80, 102, 223, 64, 21, 30, 57, 160, 79, 40, 52, 118, 169, 75, 23, 147, 96, 114, 95, 74, 105, 36}
2014/12/01 13:21:01 | INFO | jvm 1 | Cipher Suite: TLS_RSA_WITH_AES_128_CBC_SHA
2014/12/01 13:21:01 | INFO | jvm 1 | Compression Method: 0
2014/12/01 13:21:01 | INFO | jvm 1 | Extension renegotiation_info, renegotiated_connection: <empty>
2014/12/01 13:21:01 | INFO | jvm 1 | ***
2014/12/01 13:21:01 | INFO | jvm 1 | Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA
2014/12/01 13:21:01 | INFO | jvm 1 | CONNECTION KEYGEN:
2014/12/01 13:21:01 | INFO | jvm 1 | Client Nonce:
2014/12/01 13:21:01 | INFO | jvm 1 | 0000: 54 7C 1D E5 B6 7F 83 EC 01 FA 39 79 B7 C6 DD 4A T.........9y...J
2014/12/01 13:21:01 | INFO | jvm 1 | 0010: 8C 39 B5 34 93 E5 C0 E2 00 4B D5 C5 8E B0 90 66 .9.4.....K.....f
2014/12/01 13:21:01 | INFO | jvm 1 | Server Nonce:
2014/12/01 13:21:01 | INFO | jvm 1 | 0000: 54 7C 1D E5 B0 DE 8F 36 BA 06 75 90 62 79 78 EB T......6..u.byx.
2014/12/01 13:21:01 | INFO | jvm 1 | 0010: 5B 06 47 50 61 E9 35 FA 22 49 5A 9B C9 2C 5E 02 [.GPa.5."IZ..,^.
2014/12/01 13:21:01 | INFO | jvm 1 | Master Secret:
2014/12/01 13:21:01 | INFO | jvm 1 | (key bytes not available)
2014/12/01 13:21:01 | INFO | jvm 1 | Client MAC write Secret:
2014/12/01 13:21:01 | INFO | jvm 1 | (key bytes not available)
2014/12/01 13:21:01 | INFO | jvm 1 | Server MAC write Secret:
2014/12/01 13:21:01 | INFO | jvm 1 | (key bytes not available)
2014/12/01 13:21:01 | INFO | jvm 1 | Client write key:
2014/12/01 13:21:01 | INFO | jvm 1 | (key bytes not available)
2014/12/01 13:21:01 | INFO | jvm 1 | Server write key:
2014/12/01 13:21:01 | INFO | jvm 1 | (key bytes not available)
2014/12/01 13:21:01 | INFO | jvm 1 | Client write IV:
2014/12/01 13:21:01 | INFO | jvm 1 | 0000: 9A A6 00 7E 3B 75 38 71 3F 5D AB 60 E7 6A 8A AB ....;u8q?].`.j..
2014/12/01 13:21:01 | INFO | jvm 1 | Server write IV:
2014/12/01 13:21:01 | INFO | jvm 1 | 0000: 22 28 85 D3 CB EC 1D 23 53 7B 55 8A C7 B9 50 FD "(.....#S.U...P.
2014/12/01 13:21:01 | INFO | jvm 1 | qtp1981883520-744, WRITE: TLSv1 Handshake, length = 81
2014/12/01 13:21:01 | INFO | jvm 1 | qtp1981883520-744, WRITE: TLSv1 Change Cipher Spec, length = 1
2014/12/01 13:21:01 | INFO | jvm 1 | *** Finished
2014/12/01 13:21:01 | INFO | jvm 1 | verify_data: { 145, 37, 85, 144, 215, 46, 162, 105, 169, 40, 17, 94 }
2014/12/01 13:21:01 | INFO | jvm 1 | ***
2014/12/01 13:21:01 | INFO | jvm 1 | qtp1981883520-744, WRITE: TLSv1 Handshake, length = 48
2014/12/01 13:21:01 | INFO | jvm 1 | qtp1981883520-964 - /RESTServices/objects/event-filter, READ: TLSv1 Handshake, length = 81
2014/12/01 13:21:01 | INFO | jvm 1 | *** ServerHello, TLSv1
2014/12/01 13:21:01 | INFO | jvm 1 | RandomCookie: GMT: 1417420005 bytes = { 176, 222, 143, 54, 186, 6, 117, 144, 98, 121, 120, 235, 91, 6, 71, 80, 97, 233, 53, 250, 34, 73, 90, 155, 201, 44, 94, 2 }
2014/12/01 13:21:01 | INFO | jvm 1 | Session ID: {84, 124, 28, 199, 170, 182, 64, 91, 37, 151, 80, 102, 223, 64, 21, 30, 57, 160, 79, 40, 52, 118, 169, 75, 23, 147, 96, 114, 95, 74, 105, 36}
2014/12/01 13:21:01 | INFO | jvm 1 | Cipher Suite: TLS_RSA_WITH_AES_128_CBC_SHA
2014/12/01 13:21:01 | INFO | jvm 1 | Compression Method: 0
2014/12/01 13:21:01 | INFO | jvm 1 | Extension renegotiation_info, renegotiated_connection: <empty>
2014/12/01 13:21:01 | INFO | jvm 1 | ***
2014/12/01 13:21:01 | INFO | jvm 1 | CONNECTION KEYGEN:
2014/12/01 13:21:01 | INFO | jvm 1 | Client Nonce:
2014/12/01 13:21:01 | INFO | jvm 1 | 0000: 54 7C 1D E5 B6 7F 83 EC 01 FA 39 79 B7 C6 DD 4A T.........9y...J
2014/12/01 13:21:01 | INFO | jvm 1 | 0010: 8C 39 B5 34 93 E5 C0 E2 00 4B D5 C5 8E B0 90 66 .9.4.....K.....f
2014/12/01 13:21:01 | INFO | jvm 1 | Server Nonce:
2014/12/01 13:21:01 | INFO | jvm 1 | 0000: 54 7C 1D E5 B0 DE 8F 36 BA 06 75 90 62 79 78 EB T......6..u.byx.
2014/12/01 13:21:01 | INFO | jvm 1 | 0010: 5B 06 47 50 61 E9 35 FA 22 49 5A 9B C9 2C 5E 02 [.GPa.5."IZ..,^.
2014/12/01 13:21:01 | INFO | jvm 1 | Master Secret:
2014/12/01 13:21:01 | INFO | jvm 1 | (key bytes not available)
2014/12/01 13:21:01 | INFO | jvm 1 | Client MAC write Secret:
2014/12/01 13:21:01 | INFO | jvm 1 | (key bytes not available)
2014/12/01 13:21:01 | INFO | jvm 1 | Server MAC write Secret:
2014/12/01 13:21:01 | INFO | jvm 1 | (key bytes not available)
2014/12/01 13:21:01 | INFO | jvm 1 | Client write key:
2014/12/01 13:21:01 | INFO | jvm 1 | (key bytes not available)
2014/12/01 13:21:01 | INFO | jvm 1 | Server write key:
2014/12/01 13:21:01 | INFO | jvm 1 | (key bytes not available)
2014/12/01 13:21:01 | INFO | jvm 1 | Client write IV:
2014/12/01 13:21:01 | INFO | jvm 1 | 0000: 9A A6 00 7E 3B 75 38 71 3F 5D AB 60 E7 6A 8A AB ....;u8q?].`.j..
2014/12/01 13:21:01 | INFO | jvm 1 | Server write IV:
2014/12/01 13:21:01 | INFO | jvm 1 | 0000: 22 28 85 D3 CB EC 1D 23 53 7B 55 8A C7 B9 50 FD "(.....#S.U...P.
2014/12/01 13:21:01 | INFO | jvm 1 | %% Server resumed [Session-237, TLS_RSA_WITH_AES_128_CBC_SHA]
2014/12/01 13:21:01 | INFO | jvm 1 | qtp1981883520-964 - /RESTServices/objects/event-filter, READ: TLSv1 Change Cipher Spec, length = 1
2014/12/01 13:21:01 | INFO | jvm 1 | qtp1981883520-964 - /RESTServices/objects/event-filter, READ: TLSv1 Handshake, length = 48
2014/12/01 13:21:01 | INFO | jvm 1 | *** Finished
2014/12/01 13:21:01 | INFO | jvm 1 | verify_data: { 145, 37, 85, 144, 215, 46, 162, 105, 169, 40, 17, 94 }
2014/12/01 13:21:01 | INFO | jvm 1 | ***
2014/12/01 13:21:01 | INFO | jvm 1 | qtp1981883520-964 - /RESTServices/objects/event-filter, WRITE: TLSv1 Change Cipher Spec, length = 1
2014/12/01 13:21:01 | INFO | jvm 1 | qtp1981883520-746, READ: TLSv1 Change Cipher Spec, length = 1
2014/12/01 13:21:01 | INFO | jvm 1 | *** Finished
2014/12/01 13:21:01 | INFO | jvm 1 | verify_data: { 146, 223, 228, 227, 40, 161, 188, 163, 136, 220, 130, 197 }
2014/12/01 13:21:01 | INFO | jvm 1 | ***
2014/12/01 13:21:01 | INFO | jvm 1 | qtp1981883520-964 - /RESTServices/objects/event-filter, WRITE: TLSv1 Handshake, length = 48
2014/12/01 13:21:01 | INFO | jvm 1 | qtp1981883520-300, READ: TLSv1 Handshake, length = 48
2014/12/01 13:21:01 | INFO | jvm 1 | *** Finished
2014/12/01 13:21:01 | INFO | jvm 1 | verify_data: { 146, 223, 228, 227, 40, 161, 188, 163, 136, 220, 130, 197 }
2014/12/01 13:21:01 | INFO | jvm 1 | ***
2014/12/01 13:21:01 | INFO | jvm 1 | qtp1981883520-964 - /RESTServices/objects/event-filter, WRITE: TLSv1 Application Data, length = 3280
2014/12/01 13:21:01 | INFO | jvm 1 | qtp1981883520-300 - /AuthServices/auth/tokens/1VpLk6LKEt77KwxnaTggavuI6T4BAooCiqAgmw6EAkp5KMVD%2BPUXdOzp6XncOfduhoURXUlW1leZSeaXtl%2F%2BufpeMwURgmHw3Op%2BxltNEJihBQPnubVV2M6o9c%2FLF2T4HjEhEQJRXCo2y00Bmtykz60kCiahgSCaBIYP0CQ2JzIp8BPiMz4xHltaTY5%2BbhljHDcIo9exuni%2F0%2B8OBp0RboLOaGgdeqNhb1h%2BSk2EEsAFKDaC%2BLlF4N1%2Bp0t08K6CDycDfNIffyaGQ73V3D1glye1HiBvm6OX11cEghgGwCOT2JVBVN7x9fUL9p3SFwtNZOgERpxE4OulLPTccuP4PMGwLMs%2BZ73PYeRgBI7jGD7GSh0LQedT66Xx2AwsLrDD%2B3pqBGEATcODhVHdWgCxG1pN0nPCCMau%2FwvTXayLV6Y74Gp2zG4%2F%2BNTCvh1wQ%2FeHlr4DGSGjg1yj%2BzC2ATaIyuiC5nbDPbc%2B%2FVE07luVyAiQHUY%2B%2BrD%2Bd4hAkAIvPAOrgx4Xe4D7c4s%2F8dbLF2BOuMD0EgRTIFZpeDZMgL7GFJh%2Fbqq5joANrzxEZe5ZqHlLmOYVlTi%2FYO9xlrCxn3iGhg5A8f8SrvehulvZGV4CXhQ3O2fsPlhepidrFo1Yc3yU8TE%2B0vfPNwjvle%2Bg3iL9df0xT9%2FS6usmZqElAJ%2Bp%2FHmuxgtaSKzMhgJdDLiZyjpcTBsJZauemvtsmIa0RPcZ0w6X3ZN%2BbLtPF2nJu7p%2Flbus3vUaqjxMpdxjtFCmeZ0%2BH%2Fjd9jJ72onzjGL3G8hmxz0ZeTOT7l7NYL%2BJtON2KRsHVoz2OG5jA26roLXC91CENQQRXbFCxJ7iTZdLePcQauiwGxyPqhtytNPfiUm7pxyIaS6Ye5Hb0cqMHQ7wFYHGx9RSlrmkx7iw83x5yzaUdDTsewVzwLqDvaFFHMQhMeiyKZOKK1vyTHq44rfMHixKM242fuKIYrDcDUfj6UJXk1XqsFtpOQ8kUXEbg%2FCJPm6kE6tAv9hBuwcidpeeM0cI2jmeFNfFJQqk5%2BdvEXjv8SoKS5DfQlL9rQ3wMW3ExttiWtVNu6wlMXgROI5eKNMp6RAOmXEU6XAMvVMGW4UUKed0cU9wNs5wipQQS9LUVNhwGUPu6Z0kLZnM6%2BnqotC1BaFr3LXB0%2BSFcsQdRQoK1xO9Q7A5H%2Fwd4tWNZ0E8E%2BUB2pcbeH%2BBTDhIDj3dO8yyZE%2BMY2FKarTC4ILC5KJCDhoCbXYFL9zTBXcVFKn8kFeBPmVisc3V4%2B%2BRfATS%2BFdIOI7ijh%2Bvz7AkuZqS0ohsVApTZ1kuGDKYq%2FRw4JGESkXygp31RAtA65BlQ4EUKDty5EiHG8eaaxKzWgnWSfPJtj8fC2PK79tto2EZJ38ZYMR6obMGcnukexYHcMqHmoqu6BiRu%2B0ayvN4z2xXzvBpkQZpjDObGa6Mc6QWonE6xxwNMkibXmOxZtYB4bThPjdJLRSPJh9u1NVQw85J7p5Hc4lMvZw%2FD6%2FmJQf7hM9P%2BmKYugkgZiQ1vqwh9HiccB2K3zQuo%2BPUwrnEOnp84i%2BCuRVzxrxPQ3jtnQtGl5PjgnVnArkjrdP1JGhTFUUxWeye%2BgkoYl25MBv5imerbSE1eJy2z8WqJ2quofZOg0sPK%2BDOOBoDlfJPG0r30rYq%2BCmXr2aFDtNextGkRFJhzmTzgrSqaM6lPsM60rbhTXvRsO0wWl%2FOk9Tw8t1RAVt5LZFmRkv7xTLUOTc1xTJAPCWRtOMwFEl7uhQ5%2FtjftHPEFPaMumAcZTei7mzh8wDRU9sI1Wms9s0NsdCO4pjn%2B%2F1zWvT5QlleCClVeT1L9dFx%2BISFc9bqufO%2BzxS9hc1jpGT5G8g0snEWHjeKFvUYc3Caj3BtzmddytcgTJ%2Be2uQW5YvUwXmVKpZzWiKS8yHHXLcwMHMh6jI6ojR3cAty6%2B6poc95FVpW7zwmNak3xDYs6M5l8zS31bmbnM7D8TDAYT8fHompzYrtU9uztfMVjpX5PPA2%2By05T1QKUocdTzaeRtFyCw%2FCetHz9vxTOwSHHVAPA3pNDIPjwRPsYmtw4exokLzBh9H8Mt7Ifj7iNQKnVpFKQHjQ1wEmamnQOEkcJbbt6SXEgTzl7r3iY2l5E96LD%2Fa%2BLH1Xtx78Sk4OR2DGj2XVazm6yZYN0Ih%2FzQW7n7s3CbQ69k11kgToDMwSBrBaL4blw%2BBBzu4mXx7LDwdOw8CCFbdCTTGMKVCaA78jiaXSKlhFpB2D6J0e8UEPeyO5JV0M5Lj0jV8SyO%2Bk5dExuP5UNvVKplt23ZffkmFzYlZ6pfjd7R%2F3%2FKm5nz38Xvgj1DiO4CGJwa%2BfNCsXP7c2oQdQ64entw71lTldf8WGu5gm8LLpAt9ovenC%2F67cgTdeb4JyF4KTOD%2BXQK7lLFEeHjitF7LKhJJ7RUYcRm8X%2FQ7ayw%2FiHyX%2Fh1fWIPIhqgaLv803KQQZZ1VjTZxXr%2Buv3PM3YfaNwHDKYc6EFXBUB8igrC%2FLIMw8YDmAMhCoA%2Bi7n6dhFAHvNnrWAfQtocuaFgWGx6R1yQ8UeknlYRpUQyz4ZZX6qzC7RgRuLt6VPq%2BFmy1wSJw6AK2yuHb1Iip7oAXLVlir0hyA2PbCbB2FaQm6Fm9elR10OTMeQiOyauFkq6RfMjAi0yVNE5zjOmC%2B1TcWemUvqYWPq6wQ78lcFyYHqu5BmrfRqw547%2BSiRsUtSoINOIdROa%2FSVB0A3znnFtXknYPo7l7hBrsWzeO1SuKNcasR1bT%2BWgfQ97SoV8%2B7YyY9ENWjVnzr0VwA44rH1QG1GYG6Mc7qBdwlXjnmGQfo1eiLlxsjuiV0bSa%2BytfVbwziuvjYKNlQCmrj33uRUwynFmhfb%2F8U%2BG3X%2Byj%2B7ffAj0ePX6S8%2FAc%3D, WRITE: TLSv1 Application Data, length = 179
2014/12/01 13:21:01 | INFO | jvm 1 | qtp1981883520-964 - /RESTServices/objects/event-filter, READ: TLSv1 Application Data, length = 208
2014/12/01 13:21:01 | INFO | jvm 1 | qtp1981883520-300 - /AuthServices/auth/tokens/1VpLk6LKEt77KwxnaTggavuI6T4BAooCiqAgmw6EAkp5KMVD%2BPUXdOzp6XncOfduhoURXUlW1leZSeaXtl%2F%2BufpeMwURgmHw3Op%2BxltNEJihBQPnubVV2M6o9c%2FLF2T4HjEhEQJRXCo2y00Bmtykz60kCiahgSCaBIYP0CQ2JzIp8BPiMz4xHltaTY5%2BbhljHDcIo9exuni%2F0%2B8OBp0RboLOaGgdeqNhb1h%2BSk2EEsAFKDaC%2BLlF4N1%2Bp0t08K6CDycDfNIffyaGQ73V3D1glye1HiBvm6OX11cEghgGwCOT2JVBVN7x9fUL9p3SFwtNZOgERpxE4OulLPTccuP4PMGwLMs%2BZ73PYeRgBI7jGD7GSh0LQedT66Xx2AwsLrDD%2B3pqBGEATcODhVHdWgCxG1pN0nPCCMau%2FwvTXayLV6Y74Gp2zG4%2F%2BNTCvh1wQ%2FeHlr4DGSGjg1yj%2BzC2ATaIyuiC5nbDPbc%2B%2FVE07luVyAiQHUY%2B%2BrD%2Bd4hAkAIvPAOrgx4Xe4D7c4s%2F8dbLF2BOuMD0EgRTIFZpeDZMgL7GFJh%2Fbqq5joANrzxEZe5ZqHlLmOYVlTi%2FYO9xlrCxn3iGhg5A8f8SrvehulvZGV4CXhQ3O2fsPlhepidrFo1Yc3yU8TE%2B0vfPNwjvle%2Bg3iL9df0xT9%2FS6usmZqElAJ%2Bp%2FHmuxgtaSKzMhgJdDLiZyjpcTBsJZauemvtsmIa0RPcZ0w6X3ZN%2BbLtPF2nJu7p%2Flbus3vUaqjxMpdxjtFCmeZ0%2BH%2Fjd9jJ72onzjGL3G8hmxz0ZeTOT7l7NYL%2BJtON2KRsHVoz2OG5jA26roLXC91CENQQRXbFCxJ7iTZdLePcQauiwGxyPqhtytNPfiUm7pxyIaS6Ye5Hb0cqMHQ7wFYHGx9RSlrmkx7iw83x5yzaUdDTsewVzwLqDvaFFHMQhMeiyKZOKK1vyTHq44rfMHixKM242fuKIYrDcDUfj6UJXk1XqsFtpOQ8kUXEbg%2FCJPm6kE6tAv9hBuwcidpeeM0cI2jmeFNfFJQqk5%2BdvEXjv8SoKS5DfQlL9rQ3wMW3ExttiWtVNu6wlMXgROI5eKNMp6RAOmXEU6XAMvVMGW4UUKed0cU9wNs5wipQQS9LUVNhwGUPu6Z0kLZnM6%2BnqotC1BaFr3LXB0%2BSFcsQdRQoK1xO9Q7A5H%2Fwd4tWNZ0E8E%2BUB2pcbeH%2BBTDhIDj3dO8yyZE%2BMY2FKarTC4ILC5KJCDhoCbXYFL9zTBXcVFKn8kFeBPmVisc3V4%2B%2BRfATS%2BFdIOI7ijh%2Bvz7AkuZqS0ohsVApTZ1kuGDKYq%2FRw4JGESkXygp31RAtA65BlQ4EUKDty5EiHG8eaaxKzWgnWSfPJtj8fC2PK79tto2EZJ38ZYMR6obMGcnukexYHcMqHmoqu6BiRu%2B0ayvN4z2xXzvBpkQZpjDObGa6Mc6QWonE6xxwNMkibXmOxZtYB4bThPjdJLRSPJh9u1NVQw85J7p5Hc4lMvZw%2FD6%2FmJQf7hM9P%2BmKYugkgZiQ1vqwh9HiccB2K3zQuo%2BPUwrnEOnp84i%2BCuRVzxrxPQ3jtnQtGl5PjgnVnArkjrdP1JGhTFUUxWeye%2BgkoYl25MBv5imerbSE1eJy2z8WqJ2quofZOg0sPK%2BDOOBoDlfJPG0r30rYq%2BCmXr2aFDtNextGkRFJhzmTzgrSqaM6lPsM60rbhTXvRsO0wWl%2FOk9Tw8t1RAVt5LZFmRkv7xTLUOTc1xTJAPCWRtOMwFEl7uhQ5%2FtjftHPEFPaMumAcZTei7mzh8wDRU9sI1Wms9s0NsdCO4pjn%2B%2F1zWvT5QlleCClVeT1L9dFx%2BISFc9bqufO%2BzxS9hc1jpGT5G8g0snEWHjeKFvUYc3Caj3BtzmddytcgTJ%2Be2uQW5YvUwXmVKpZzWiKS8yHHXLcwMHMh6jI6ojR3cAty6%2B6poc95FVpW7zwmNak3xDYs6M5l8zS31bmbnM7D8TDAYT8fHompzYrtU9uztfMVjpX5PPA2%2By05T1QKUocdTzaeRtFyCw%2FCetHz9vxTOwSHHVAPA3pNDIPjwRPsYmtw4exokLzBh9H8Mt7Ifj7iNQKnVpFKQHjQ1wEmamnQOEkcJbbt6SXEgTzl7r3iY2l5E96LD%2Fa%2BLH1Xtx78Sk4OR2DGj2XVazm6yZYN0Ih%2FzQW7n7s3CbQ69k11kgToDMwSBrBaL4blw%2BBBzu4mXx7LDwdOw8CCFbdCTTGMKVCaA78jiaXSKlhFpB2D6J0e8UEPeyO5JV0M5Lj0jV8SyO%2Bk5dExuP5UNvVKplt23ZffkmFzYlZ6pfjd7R%2F3%2FKm5nz38Xvgj1DiO4CGJwa%2BfNCsXP7c2oQdQ64entw71lTldf8WGu5gm8LLpAt9ovenC%2F67cgTdeb4JyF4KTOD%2BXQK7lLFEeHjitF7LKhJJ7RUYcRm8X%2FQ7ayw%2FiHyX%2Fh1fWIPIhqgaLv803KQQZZ1VjTZxXr%2Buv3PM3YfaNwHDKYc6EFXBUB8igrC%2FLIMw8YDmAMhCoA%2Bi7n6dhFAHvNnrWAfQtocuaFgWGx6R1yQ8UeknlYRpUQyz4ZZX6qzC7RgRuLt6VPq%2BFmy1wSJw6AK2yuHb1Iip7oAXLVlir0hyA2PbCbB2FaQm6Fm9elR10OTMeQiOyauFkq6RfMjAi0yVNE5zjOmC%2B1TcWemUvqYWPq6wQ78lcFyYHqu5BmrfRqw547%2BSiRsUtSoINOIdROa%2FSVB0A3znnFtXknYPo7l7hBrsWzeO1SuKNcasR1bT%2BWgfQ97SoV8%2B7YyY9ENWjVnzr0VwA44rH1QG1GYG6Mc7qBdwlXjnmGQfo1eiLlxsjuiV0bSa%2BytfVbwziuvjYKNlQCmrj33uRUwynFmhfb%2F8U%2BG3X%2Byj%2B7ffAj0ePX6S8%2FAc%3D, WRITE: TLSv1 Application Data, length = 1
2014/12/01 13:21:01 | INFO | jvm 1 | qtp1981883520-300 - /AuthServices/auth/tokens/1VpLk6LKEt77KwxnaTggavuI6T4BAooCiqAgmw6EAkp5KMVD%2BPUXdOzp6XncOfduhoURXUlW1leZSeaXtl%2F%2BufpeMwURgmHw3Op%2BxltNEJihBQPnubVV2M6o9c%2FLF2T4HjEhEQJRXCo2y00Bmtykz60kCiahgSCaBIYP0CQ2JzIp8BPiMz4xHltaTY5%2BbhljHDcIo9exuni%2F0%2B8OBp0RboLOaGgdeqNhb1h%2BSk2EEsAFKDaC%2BLlF4N1%2Bp0t08K6CDycDfNIffyaGQ73V3D1glye1HiBvm6OX11cEghgGwCOT2JVBVN7x9fUL9p3SFwtNZOgERpxE4OulLPTccuP4PMGwLMs%2BZ73PYeRgBI7jGD7GSh0LQedT66Xx2AwsLrDD%2B3pqBGEATcODhVHdWgCxG1pN0nPCCMau%2FwvTXayLV6Y74Gp2zG4%2F%2BNTCvh1wQ%2FeHlr4DGSGjg1yj%2BzC2ATaIyuiC5nbDPbc%2B%2FVE07luVyAiQHUY%2B%2BrD%2Bd4hAkAIvPAOrgx4Xe4D7c4s%2F8dbLF2BOuMD0EgRTIFZpeDZMgL7GFJh%2Fbqq5joANrzxEZe5ZqHlLmOYVlTi%2FYO9xlrCxn3iGhg5A8f8SrvehulvZGV4CXhQ3O2fsPlhepidrFo1Yc3yU8TE%2B0vfPNwjvle%2Bg3iL9df0xT9%2FS6usmZqElAJ%2Bp%2FHmuxgtaSKzMhgJdDLiZyjpcTBsJZauemvtsmIa0RPcZ0w6X3ZN%2BbLtPF2nJu7p%2Flbus3vUaqjxMpdxjtFCmeZ0%2BH%2Fjd9jJ72onzjGL3G8hmxz0ZeTOT7l7NYL%2BJtON2KRsHVoz2OG5jA26roLXC91CENQQRXbFCxJ7iTZdLePcQauiwGxyPqhtytNPfiUm7pxyIaS6Ye5Hb0cqMHQ7wFYHGx9RSlrmkx7iw83x5yzaUdDTsewVzwLqDvaFFHMQhMeiyKZOKK1vyTHq44rfMHixKM242fuKIYrDcDUfj6UJXk1XqsFtpOQ8kUXEbg%2FCJPm6kE6tAv9hBuwcidpeeM0cI2jmeFNfFJQqk5%2BdvEXjv8SoKS5DfQlL9rQ3wMW3ExttiWtVNu6wlMXgROI5eKNMp6RAOmXEU6XAMvVMGW4UUKed0cU9wNs5wipQQS9LUVNhwGUPu6Z0kLZnM6%2BnqotC1BaFr3LXB0%2BSFcsQdRQoK1xO9Q7A5H%2Fwd4tWNZ0E8E%2BUB2pcbeH%2BBTDhIDj3dO8yyZE%2BMY2FKarTC4ILC5KJCDhoCbXYFL9zTBXcVFKn8kFeBPmVisc3V4%2B%2BRfATS%2BFdIOI7ijh%2Bvz7AkuZqS0ohsVApTZ1kuGDKYq%2FRw4JGESkXygp31RAtA65BlQ4EUKDty5EiHG8eaaxKzWgnWSfPJtj8fC2PK79tto2EZJ38ZYMR6obMGcnukexYHcMqHmoqu6BiRu%2B0ayvN4z2xXzvBpkQZpjDObGa6Mc6QWonE6xxwNMkibXmOxZtYB4bThPjdJLRSPJh9u1NVQw85J7p5Hc4lMvZw%2FD6%2FmJQf7hM9P%2BmKYugkgZiQ1vqwh9HiccB2K3zQuo%2BPUwrnEOnp84i%2BCuRVzxrxPQ3jtnQtGl5PjgnVnArkjrdP1JGhTFUUxWeye%2BgkoYl25MBv5imerbSE1eJy2z8WqJ2quofZOg0sPK%2BDOOBoDlfJPG0r30rYq%2BCmXr2aFDtNextGkRFJhzmTzgrSqaM6lPsM60rbhTXvRsO0wWl%2FOk9Tw8t1RAVt5LZFmRkv7xTLUOTc1xTJAPCWRtOMwFEl7uhQ5%2FtjftHPEFPaMumAcZTei7mzh8wDRU9sI1Wms9s0NsdCO4pjn%2B%2F1zWvT5QlleCClVeT1L9dFx%2BISFc9bqufO%2BzxS9hc1jpGT5G8g0snEWHjeKFvUYc3Caj3BtzmddytcgTJ%2Be2uQW5YvUwXmVKpZzWiKS8yHHXLcwMHMh6jI6ojR3cAty6%2B6poc95FVpW7zwmNak3xDYs6M5l8zS31bmbnM7D8TDAYT8fHompzYrtU9uztfMVjpX5PPA2%2By05T1QKUocdTzaeRtFyCw%2FCetHz9vxTOwSHHVAPA3pNDIPjwRPsYmtw4exokLzBh9H8Mt7Ifj7iNQKnVpFKQHjQ1wEmamnQOEkcJbbt6SXEgTzl7r3iY2l5E96LD%2Fa%2BLH1Xtx78Sk4OR2DGj2XVazm6yZYN0Ih%2FzQW7n7s3CbQ69k11kgToDMwSBrBaL4blw%2BBBzu4mXx7LDwdOw8CCFbdCTTGMKVCaA78jiaXSKlhFpB2D6J0e8UEPeyO5JV0M5Lj0jV8SyO%2Bk5dExuP5UNvVKplt23ZffkmFzYlZ6pfjd7R%2F3%2FKm5nz38Xvgj1DiO4CGJwa%2BfNCsXP7c2oQdQ64entw71lTldf8WGu5gm8LLpAt9ovenC%2F67cgTdeb4JyF4KTOD%2BXQK7lLFEeHjitF7LKhJJ7RUYcRm8X%2FQ7ayw%2FiHyX%2Fh1fWIPIhqgaLv803KQQZZ1VjTZxXr%2Buv3PM3YfaNwHDKYc6EFXBUB8igrC%2FLIMw8YDmAMhCoA%2Bi7n6dhFAHvNnrWAfQtocuaFgWGx6R1yQ8UeknlYRpUQyz4ZZX6qzC7RgRuLt6VPq%2BFmy1wSJw6AK2yuHb1Iip7oAXLVlir0hyA2PbCbB2FaQm6Fm9elR10OTMeQiOyauFkq6RfMjAi0yVNE5zjOmC%2B1TcWemUvqYWPq6wQ78lcFyYHqu5BmrfRqw547%2BSiRsUtSoINOIdROa%2FSVB0A3znnFtXknYPo7l7hBrsWzeO1SuKNcasR1bT%2BWgfQ97SoV8%2B7YyY9ENWjVnzr0VwA44rH1QG1GYG6Mc7qBdwlXjnmGQfo1eiLlxsjuiV0bSa%2BytfVbwziuvjYKNlQCmrj33uRUwynFmhfb%2F8U%2BG3X%2Byj%2B7ffAj0ePX6S8%2FAc%3D, WRITE: TLSv1 Application Data, length = 686
Server TLS 1.1 Java 1.7u45 + Client Java 1.7u72 "TLS 1.2 enabled" - fails as expected:
====================================================================
2014/11/28 14:47:49 | INFO | jvm 1 | *** ClientHello, TLSv1.2
2014/11/28 14:47:49 | INFO | jvm 1 | RandomCookie: GMT: 1417166019 bytes = { 107, 154, 244, 7, 50, 34, 114, 139, 60, 147, 43, 186, 201, 97, 180, 45, 102, 183, 180, 134, 87, 70, 218, 9, 115, 218, 109, 114 }
2014/11/28 14:47:49 | INFO | jvm 1 | Session ID: {}
2014/11/28 14:47:49 | INFO | jvm 1 | Cipher Suites: [TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA, TLS_ECDHE_ECDSA_WITH_RC4_128_SHA, TLS_ECDHE_RSA_WITH_RC4_128_SHA, SSL_RSA_WITH_RC4_128_SHA, TLS_ECDH_ECDSA_WITH_RC4_128_SHA, TLS_ECDH_RSA_WITH_RC4_128_SHA, SSL_RSA_WITH_RC4_128_MD5, TLS_EMPTY_RENEGOTIATION_INFO_SCSV]
2014/11/28 14:47:49 | INFO | jvm 1 | Compression Methods: { 0 }
2014/11/28 14:47:49 | INFO | jvm 1 | Extension elliptic_curves, curve names: {secp256r1, sect163k1, sect163r2, secp192r1, secp224r1, sect233k1, sect233r1, sect283k1, sect283r1, secp384r1, sect409k1, sect409r1, secp521r1, sect571k1, sect571r1, secp160k1, secp160r1, secp160r2, sect163r1, secp192k1, sect193r1, sect193r2, secp224k1, sect239k1, secp256k1}
2014/11/28 14:47:49 | INFO | jvm 1 | Extension ec_point_formats, formats: [uncompressed]
2014/11/28 14:47:49 | INFO | jvm 1 | Extension signature_algorithms, signature_algorithms: SHA512withECDSA, SHA512withRSA, SHA384withECDSA, SHA384withRSA, SHA256withECDSA, SHA256withRSA, SHA224withECDSA, SHA224withRSA, SHA1withECDSA, SHA1withRSA, SHA1withDSA, MD5withRSA
2014/11/28 14:47:49 | INFO | jvm 1 | ***
2014/11/28 14:47:49 | INFO | jvm 1 | %% Initialized: [Session-95, SSL_NULL_WITH_NULL_NULL]
2014/11/28 14:47:49 | INFO | jvm 1 | %% Negotiating: [Session-95, TLS_RSA_WITH_AES_128_CBC_SHA]
2014/11/28 14:47:49 | INFO | jvm 1 | *** ServerHello, TLSv1.2
2014/11/28 14:47:49 | INFO | jvm 1 | RandomCookie: GMT: 1417166013 bytes = { 57, 9, 10, 41, 45, 206, 6, 181, 178, 162, 127, 0, 166, 201, 56, 15, 174, 121, 138, 209, 14, 126, 216, 246, 167, 113, 236, 116 }
2014/11/28 14:47:49 | INFO | jvm 1 | Session ID: {84, 120, 61, 189, 232, 152, 93, 94, 158, 221, 201, 90, 219, 229, 47, 6, 123, 46, 20, 82, 140, 122, 2, 73, 137, 235, 83, 136, 91, 83, 211, 132}
2014/11/28 14:47:49 | INFO | jvm 1 | Cipher Suite: TLS_RSA_WITH_AES_128_CBC_SHA
2014/11/28 14:47:49 | INFO | jvm 1 | Compression Method: 0
2014/11/28 14:47:49 | INFO | jvm 1 | Extension renegotiation_info, renegotiated_connection: <empty>
2014/11/28 14:47:49 | INFO | jvm 1 | ***
2014/11/28 14:47:49 | INFO | jvm 1 | Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA
2014/11/28 14:47:49 | INFO | jvm 1 | *** Certificate chain
2014/11/28 14:47:49 | INFO | jvm 1 | chain [0] = [
2014/11/28 14:47:49 | INFO | jvm 1 | [
2014/11/28 14:47:49 | INFO | jvm 1 | Version: V3
2014/11/28 14:47:49 | INFO | jvm 1 | Subject: CN=dev-05.labs.blr.com, O=server
2014/11/28 14:47:49 | INFO | jvm 1 | Signature Algorithm: SHA256withRSA, OID = 1.2.840.113549.1.1.11
2014/11/28 14:47:49 | INFO | jvm 1 |
2014/11/28 14:47:49 | INFO | jvm 1 | Key: SunPKCS11-NSSfips RSA public key, 2048 bits (id 1, session object)
2014/11/28 14:47:49 | INFO | jvm 1 | modulus: 19751124565775544542661601941034719218747286997557229376272410409764009924174952830102822006739940996361158891315994655677031683410457285645708620145915789088144941408425439122384306771006790672852952487887077643219829713631271285091822690455402307000211724434432943370113476924425722411995320247744734057517566666508974254720742261526685687656494544221796453195966155694205640019924093341684193258103280171653517687458035087335731929833587535142452049552301009807817546366586239918288540321429443922231821575519420587811789981092934767950075857907111279056051594689275813767976468618202672668356345198890748632149983
2014/11/28 14:47:49 | INFO | jvm 1 | public exponent: 65537
2014/11/28 14:47:49 | INFO | jvm 1 | Validity: [From: Tue Nov 25 14:37:52 IST 2014,
2014/11/28 14:47:49 | INFO | jvm 1 | To: Thu Nov 01 14:37:52 IST 2114]
2014/11/28 14:47:49 | INFO | jvm 1 | Issuer: CN=dev-05.labs.blr.com, O=server
2014/11/28 14:47:49 | INFO | jvm 1 | SerialNumber: [ 0d54f951]
2014/11/28 14:47:49 | INFO | jvm 1 |
2014/11/28 14:47:49 | INFO | jvm 1 | Certificate Extensions: 1
2014/11/28 14:47:49 | INFO | jvm 1 | [1]: ObjectId: 2.5.29.14 Criticality=false
2014/11/28 14:47:49 | INFO | jvm 1 | SubjectKeyIdentifier [
2014/11/28 14:47:49 | INFO | jvm 1 | KeyIdentifier [
2014/11/28 14:47:49 | INFO | jvm 1 | 0000: 94 2D EB EF E8 04 5F 84 B2 BA F6 A5 C9 58 D3 79 .-...._......X.y
2014/11/28 14:47:49 | INFO | jvm 1 | 0010: 44 8F 40 07 D.@.
2014/11/28 14:47:49 | INFO | jvm 1 | ]
2014/11/28 14:47:49 | INFO | jvm 1 | ]
2014/11/28 14:47:49 | INFO | jvm 1 |
2014/11/28 14:47:49 | INFO | jvm 1 | ]
2014/11/28 14:47:49 | INFO | jvm 1 | Algorithm: [SHA256withRSA]
2014/11/28 14:47:49 | INFO | jvm 1 | Signature:
2014/11/28 14:47:49 | INFO | jvm 1 | 0000: 39 59 42 B8 26 F6 64 7E CA C1 33 7C 60 6A FC 80 9YB.&.d...3.`j..
2014/11/28 14:47:49 | INFO | jvm 1 | 0010: 5F AF 51 89 98 B7 AC 0C 27 DA A1 60 AD 5B 87 11 _.Q.....'..`.[..
2014/11/28 14:47:49 | INFO | jvm 1 | 0020: D8 95 E3 37 D2 CB E3 8A 6F CF 82 F3 4C AA B6 42 ...7....o...L..B
2014/11/28 14:47:49 | INFO | jvm 1 | 0030: F5 8B 67 0B D9 F2 3E FA FE 81 C5 77 78 47 E2 61 ..g...>....wxG.a
2014/11/28 14:47:49 | INFO | jvm 1 | 0040: 33 DC 97 CB FC 04 1D 99 18 84 C3 DC 28 8D 14 D7 3...........(...
2014/11/28 14:47:49 | INFO | jvm 1 | 0050: AF 71 1C E6 41 FC D1 71 CB C3 50 66 5E 28 AF EB .q..A..q..Pf^(..
2014/11/28 14:47:49 | INFO | jvm 1 | 0060: AF 80 52 CC 89 BE 0D 0B 58 1C CA 1C 34 36 BA 96 ..R.....X...46..
2014/11/28 14:47:49 | INFO | jvm 1 | 0070: F2 FE 18 73 6B F7 09 35 94 AC 8E CB F2 83 47 62 ...sk..5......Gb
2014/11/28 14:47:49 | INFO | jvm 1 | 0080: 20 FD 64 64 72 D6 89 D7 77 A7 D0 17 43 7E FF 44 .ddr...w...C..D
2014/11/28 14:47:49 | INFO | jvm 1 | 0090: 57 B5 1D 27 24 1D F5 87 86 E9 29 EF DE E7 D2 2E W..'$.....).....
2014/11/28 14:47:49 | INFO | jvm 1 | 00A0: 32 EE 3D 82 7C 53 7E 93 E9 5F 5E 9C 62 F5 31 C7 2.=..S..._^.b.1.
2014/11/28 14:47:49 | INFO | jvm 1 | 00B0: 9E 54 58 50 01 EE 58 18 81 6D 52 C0 EB CA CA 52 .TXP..X..mR....R
2014/11/28 14:47:49 | INFO | jvm 1 | 00C0: 26 CC 3C 9D E5 60 BE BE A1 E6 D5 79 66 F9 0C FD &.<..`.....yf...
2014/11/28 14:47:49 | INFO | jvm 1 | 00D0: BB 9E 36 E5 31 FC D4 68 8A 06 8D A0 0B 68 BA 2B ..6.1..h.....h.+
2014/11/28 14:47:49 | INFO | jvm 1 | 00E0: 1E AF 51 4A 6C BC 2D 7D B4 04 EA D6 DA 28 9B 64 ..QJl.-......(.d
2014/11/28 14:47:49 | INFO | jvm 1 | 00F0: F9 FF 35 7B E7 91 02 01 37 E7 C2 AA 8D 1E 48 22 ..5.....7.....H"
2014/11/28 14:47:49 | INFO | jvm 1 |
2014/11/28 14:47:49 | INFO | jvm 1 | ]
2014/11/28 14:47:49 | INFO | jvm 1 | ***
2014/11/28 14:47:49 | INFO | jvm 1 | *** ServerHelloDone
2014/11/28 14:47:49 | INFO | jvm 1 | qtp1981883520-299, WRITE: TLSv1.2 Handshake, length = 904
2014/11/28 14:47:49 | INFO | jvm 1 | qtp1981883520-302, READ: TLSv1.2 Handshake, length = 262
2014/11/28 14:47:49 | INFO | jvm 1 | unable to get the plaintext of the premaster secret
2014/11/28 14:47:49 | INFO | jvm 1 | *** ClientKeyExchange, RSA PreMasterSecret, TLSv1.2
2014/11/28 14:47:49 | INFO | jvm 1 | SESSION KEYGEN:
2014/11/28 14:47:49 | INFO | jvm 1 | PreMaster Secret:
2014/11/28 14:47:49 | INFO | jvm 1 | (key bytes not available)
2014/11/28 14:47:49 | INFO | jvm 1 | RSA master secret generation error:
2014/11/28 14:47:49 | INFO | jvm 1 | java.security.NoSuchAlgorithmException: no such algorithm: SunTls12MasterSecret for provider SunPKCS11-NSSfips
2014/11/28 14:47:49 | INFO | jvm 1 | at sun.security.jca.GetInstance.getService(GetInstance.java:100)
2014/11/28 14:47:49 | INFO | jvm 1 | at javax.crypto.JceSecurity.getInstance(JceSecurity.java:109)
2014/11/28 14:47:49 | INFO | jvm 1 | at javax.crypto.KeyGenerator.getInstance(KeyGenerator.java:287)
2014/11/28 14:47:49 | INFO | jvm 1 | at sun.security.ssl.JsseJce.getKeyGenerator(JsseJce.java:269)
2014/11/28 14:47:49 | INFO | jvm 1 | at sun.security.ssl.Handshaker.calculateMasterSecret(Handshaker.java:1052)
2014/11/28 14:47:49 | INFO | jvm 1 | at sun.security.ssl.Handshaker.calculateKeys(Handshaker.java:999)
2014/11/28 14:47:49 | INFO | jvm 1 | at sun.security.ssl.ServerHandshaker.processMessage(ServerHandshaker.java:234)
2014/11/28 14:47:49 | INFO | jvm 1 | at sun.security.ssl.Handshaker.processLoop(Handshaker.java:868)
2014/11/28 14:47:49 | INFO | jvm 1 | at sun.security.ssl.Handshaker$1.run(Handshaker.java:808)
2014/11/28 14:47:49 | INFO | jvm 1 | at sun.security.ssl.Handshaker$1.run(Handshaker.java:806)
2014/11/28 14:47:49 | INFO | jvm 1 | at java.security.AccessController.doPrivileged(Native Method)
2014/11/28 14:47:49 | INFO | jvm 1 | at sun.security.ssl.Handshaker$DelegatedTask.run(Handshaker.java:1299)
2014/11/28 14:47:49 | INFO | jvm 1 | at org.eclipse.jetty.io.nio.SslConnection.process(SslConnection.java:375)
2014/11/28 14:47:49 | INFO | jvm 1 | at org.eclipse.jetty.io.nio.SslConnection.handle(SslConnection.java:193)
2014/11/28 14:47:49 | INFO | jvm 1 | at org.eclipse.jetty.io.nio.SelectChannelEndPoint.handle(SelectChannelEndPoint.java:696)
2014/11/28 14:47:49 | INFO | jvm 1 | at org.eclipse.jetty.io.nio.SelectChannelEndPoint$1.run(SelectChannelEndPoint.java:53)
2014/11/28 14:47:49 | INFO | jvm 1 | at org.eclipse.jetty.util.thread.QueuedThreadPool.runJob(QueuedThreadPool.java:608)
2014/11/28 14:47:49 | INFO | jvm 1 | at org.eclipse.jetty.util.thread.QueuedThreadPool$3.run(QueuedThreadPool.java:543)
2014/11/28 14:47:49 | INFO | jvm 1 | at java.lang.Thread.run(Thread.java:744)
2014/11/28 14:47:49 | INFO | jvm 1 | Generating a random fake premaster secret
2014/11/28 14:47:49 | INFO | jvm 1 | qtp1981883520-302, fatal error: 80: problem unwrapping net record
2014/11/28 14:47:49 | INFO | jvm 1 | java.lang.RuntimeException: Could not generate dummy secret
2014/11/28 14:47:49 | INFO | jvm 1 | %% Invalidated: [Session-95, TLS_RSA_WITH_AES_128_CBC_SHA]
2014/11/28 14:47:49 | INFO | jvm 1 | qtp1981883520-302, SEND TLSv1.2 ALERT: fatal, description = internal_error
2014/11/28 14:47:49 | INFO | jvm 1 | qtp1981883520-302, WRITE: TLSv1.2 Alert, length = 2
2014/11/28 14:47:49 | INFO | jvm 1 | Fri Nov 28 14:47:49 IST 2014|WARNING|qtp1981883520-302|base.util.JavaLoggingLog4jAppender.append
2014/11/28 14:47:49 | INFO | jvm 1 | handle failed
2014/11/28 14:47:49 | INFO | jvm 1 | java.lang.RuntimeException: Could not generate dummy secret
2014/11/28 14:47:49 | INFO | jvm 1 | at sun.security.ssl.Handshaker.checkThrown(Handshaker.java:1359)
2014/11/28 14:47:49 | INFO | jvm 1 | at sun.security.ssl.SSLEngineImpl.checkTaskThrown(SSLEngineImpl.java:513)
2014/11/28 14:47:49 | INFO | jvm 1 | at sun.security.ssl.SSLEngineImpl.readNetRecord(SSLEngineImpl.java:790)
2014/11/28 14:47:49 | INFO | jvm 1 | at sun.security.ssl.SSLEngineImpl.unwrap(SSLEngineImpl.java:758)
2014/11/28 14:47:49 | INFO | jvm 1 | at javax.net.ssl.SSLEngine.unwrap(SSLEngine.java:624)
2014/11/28 14:47:49 | INFO | jvm 1 | at org.eclipse.jetty.io.nio.SslConnection.unwrap(SslConnection.java:536)
2014/11/28 14:47:49 | INFO | jvm 1 | at org.eclipse.jetty.io.nio.SslConnection.process(SslConnection.java:401)
2014/11/28 14:47:49 | INFO | jvm 1 | at org.eclipse.jetty.io.nio.SslConnection.handle(SslConnection.java:193)
2014/11/28 14:47:49 | INFO | jvm 1 | at org.eclipse.jetty.io.nio.SelectChannelEndPoint.handle(SelectChannelEndPoint.java:696)
2014/11/28 14:47:49 | INFO | jvm 1 | at org.eclipse.jetty.io.nio.SelectChannelEndPoint$1.run(SelectChannelEndPoint.java:53)
2014/11/28 14:47:49 | INFO | jvm 1 | at org.eclipse.jetty.util.thread.QueuedThreadPool.runJob(QueuedThreadPool.java:608)
2014/11/28 14:47:49 | INFO | jvm 1 | at org.eclipse.jetty.util.thread.QueuedThreadPool$3.run(QueuedThreadPool.java:543)
2014/11/28 14:47:49 | INFO | jvm 1 | at java.lang.Thread.run(Thread.java:744)
2014/11/28 14:47:49 | INFO | jvm 1 | Caused by: java.lang.RuntimeException: Could not generate dummy secret
2014/11/28 14:47:49 | INFO | jvm 1 | at sun.security.ssl.RSAClientKeyExchange.generateDummySecret(RSAClientKeyExchange.java:272)
2014/11/28 14:47:49 | INFO | jvm 1 | at sun.security.ssl.Handshaker.calculateMasterSecret(Handshaker.java:1069)
2014/11/28 14:47:49 | INFO | jvm 1 | at sun.security.ssl.Handshaker.calculateKeys(Handshaker.java:999)
2014/11/28 14:47:49 | INFO | jvm 1 | at sun.security.ssl.ServerHandshaker.processMessage(ServerHandshaker.java:234)
2014/11/28 14:47:49 | INFO | jvm 1 | at sun.security.ssl.Handshaker.processLoop(Handshaker.java:868)
2014/11/28 14:47:49 | INFO | jvm 1 | at sun.security.ssl.Handshaker$1.run(Handshaker.java:808)
2014/11/28 14:47:49 | INFO | jvm 1 | at sun.security.ssl.Handshaker$1.run(Handshaker.java:806)
2014/11/28 14:47:49 | INFO | jvm 1 | at java.security.AccessController.doPrivileged(Native Method)
2014/11/28 14:47:49 | INFO | jvm 1 | at sun.security.ssl.Handshaker$DelegatedTask.run(Handshaker.java:1299)
2014/11/28 14:47:49 | INFO | jvm 1 | at org.eclipse.jetty.io.nio.SslConnection.process(SslConnection.java:375)
2014/11/28 14:47:49 | INFO | jvm 1 | ... 6 more
2014/11/28 14:47:49 | INFO | jvm 1 | Caused by: java.security.NoSuchAlgorithmException: no such algorithm: SunTls12RsaPremasterSecret for provider SunPKCS11-NSSfips
2014/11/28 14:47:49 | INFO | jvm 1 | at sun.security.jca.GetInstance.getService(GetInstance.java:100)
2014/11/28 14:47:49 | INFO | jvm 1 | at javax.crypto.JceSecurity.getInstance(JceSecurity.java:109)
2014/11/28 14:47:49 | INFO | jvm 1 | at javax.crypto.KeyGenerator.getInstance(KeyGenerator.java:287)
2014/11/28 14:47:49 | INFO | jvm 1 | at sun.security.ssl.JsseJce.getKeyGenerator(JsseJce.java:269)
2014/11/28 14:47:49 | INFO | jvm 1 | at sun.security.ssl.RSAClientKeyExchange.generateDummySecret(RSAClientKeyExchange.java:267)
2014/11/28 14:47:49 | INFO | jvm 1 | ... 15 more
Server TLS 1.1 Java 1.7u45 + Client Java 1.8u25 "TLS 1.2 enabled" - fails as expected:
====================================================================
2014/11/28 14:58:37 | INFO | jvm 1 | *** ClientHello, TLSv1.2
2014/11/28 14:58:37 | INFO | jvm 1 | RandomCookie: GMT: 1417166923 bytes = { 171, 73, 75, 248, 48, 224, 231, 112, 25, 221, 98, 98, 232, 106, 76, 86, 207, 12, 221, 37, 128, 220, 22, 132, 177, 121, 154, 215 }
2014/11/28 14:58:37 | INFO | jvm 1 | Session ID: {}
2014/11/28 14:58:37 | INFO | jvm 1 | Cipher Suites: [TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256, TLS_RSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_DSS_WITH_AES_128_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_DSS_WITH_AES_128_GCM_SHA256, TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA, TLS_ECDHE_ECDSA_WITH_RC4_128_SHA, TLS_ECDHE_RSA_WITH_RC4_128_SHA, SSL_RSA_WITH_RC4_128_SHA, TLS_ECDH_ECDSA_WITH_RC4_128_SHA, TLS_ECDH_RSA_WITH_RC4_128_SHA, SSL_RSA_WITH_RC4_128_MD5, TLS_EMPTY_RENEGOTIATION_INFO_SCSV]
2014/11/28 14:58:37 | INFO | jvm 1 | Compression Methods: { 0 }
2014/11/28 14:58:37 | INFO | jvm 1 | Extension elliptic_curves, curve names: {secp256r1, sect163k1, sect163r2, secp192r1, secp224r1, sect233k1, sect233r1, sect283k1, sect283r1, secp384r1, sect409k1, sect409r1, secp521r1, sect571k1, sect571r1, secp160k1, secp160r1, secp160r2, sect163r1, secp192k1, sect193r1, sect193r2, secp224k1, sect239k1, secp256k1}
2014/11/28 14:58:37 | INFO | jvm 1 | Extension ec_point_formats, formats: [uncompressed]
2014/11/28 14:58:37 | INFO | jvm 1 | Extension signature_algorithms, signature_algorithms: SHA512withECDSA, SHA512withRSA, SHA384withECDSA, SHA384withRSA, SHA256withECDSA, SHA256withRSA, SHA224withECDSA, SHA224withRSA, SHA1withECDSA, SHA1withRSA, SHA1withDSA, MD5withRSA
2014/11/28 14:58:37 | INFO | jvm 1 | ***
2014/11/28 14:58:37 | INFO | jvm 1 | %% Initialized: [Session-130, SSL_NULL_WITH_NULL_NULL]
2014/11/28 14:58:37 | INFO | jvm 1 | %% Negotiating: [Session-130, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256]
2014/11/28 14:58:37 | INFO | jvm 1 | *** ServerHello, TLSv1.2
2014/11/28 14:58:37 | INFO | jvm 1 | RandomCookie: GMT: 1417166917 bytes = { 105, 84, 85, 145, 18, 72, 77, 194, 55, 163, 191, 172, 161, 236, 55, 167, 76, 124, 138, 45, 71, 219, 99, 173, 9, 121, 107, 89 }
2014/11/28 14:58:37 | INFO | jvm 1 | Session ID: {84, 120, 64, 69, 203, 197, 46, 45, 46, 191, 11, 155, 195, 69, 106, 200, 150, 187, 100, 208, 203, 117, 133, 115, 137, 193, 217, 81, 4, 130, 36, 11}
2014/11/28 14:58:37 | INFO | jvm 1 | Cipher Suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
2014/11/28 14:58:37 | INFO | jvm 1 | Compression Method: 0
2014/11/28 14:58:37 | INFO | jvm 1 | Extension renegotiation_info, renegotiated_connection: <empty>
2014/11/28 14:58:37 | INFO | jvm 1 | ***
2014/11/28 14:58:37 | INFO | jvm 1 | Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
2014/11/28 14:58:37 | INFO | jvm 1 | *** Certificate chain
2014/11/28 14:58:37 | INFO | jvm 1 | chain [0] = [
2014/11/28 14:58:37 | INFO | jvm 1 | [
2014/11/28 14:58:37 | INFO | jvm 1 | Version: V3
2014/11/28 14:58:37 | INFO | jvm 1 | Subject: CN=dev-05.labs.blr.com, O=server
2014/11/28 14:58:37 | INFO | jvm 1 | Signature Algorithm: SHA256withRSA, OID = 1.2.840.113549.1.1.11
2014/11/28 14:58:37 | INFO | jvm 1 |
2014/11/28 14:58:37 | INFO | jvm 1 | Key: SunPKCS11-NSSfips RSA public key, 2048 bits (id 1, session object)
2014/11/28 14:58:37 | INFO | jvm 1 | modulus: 19751124565775544542661601941034719218747286997557229376272410409764009924174952830102822006739940996361158891315994655677031683410457285645708620145915789088144941408425439122384306771006790672852952487887077643219829713631271285091822690455402307000211724434432943370113476924425722411995320247744734057517566666508974254720742261526685687656494544221796453195966155694205640019924093341684193258103280171653517687458035087335731929833587535142452049552301009807817546366586239918288540321429443922231821575519420587811789981092934767950075857907111279056051594689275813767976468618202672668356345198890748632149983
2014/11/28 14:58:37 | INFO | jvm 1 | public exponent: 65537
2014/11/28 14:58:37 | INFO | jvm 1 | Validity: [From: Tue Nov 25 14:37:52 IST 2014,
2014/11/28 14:58:37 | INFO | jvm 1 | To: Thu Nov 01 14:37:52 IST 2114]
2014/11/28 14:58:37 | INFO | jvm 1 | Issuer: CN=dev-05.labs.blr.com, O=server
2014/11/28 14:58:37 | INFO | jvm 1 | SerialNumber: [ 0d54f951]
2014/11/28 14:58:37 | INFO | jvm 1 |
2014/11/28 14:58:37 | INFO | jvm 1 | Certificate Extensions: 1
2014/11/28 14:58:37 | INFO | jvm 1 | [1]: ObjectId: 2.5.29.14 Criticality=false
2014/11/28 14:58:37 | INFO | jvm 1 | SubjectKeyIdentifier [
2014/11/28 14:58:37 | INFO | jvm 1 | KeyIdentifier [
2014/11/28 14:58:37 | INFO | jvm 1 | 0000: 94 2D EB EF E8 04 5F 84 B2 BA F6 A5 C9 58 D3 79 .-...._......X.y
2014/11/28 14:58:37 | INFO | jvm 1 | 0010: 44 8F 40 07 D.@.
2014/11/28 14:58:37 | INFO | jvm 1 | ]
2014/11/28 14:58:37 | INFO | jvm 1 | ]
2014/11/28 14:58:37 | INFO | jvm 1 |
2014/11/28 14:58:37 | INFO | jvm 1 | ]
2014/11/28 14:58:37 | INFO | jvm 1 | Algorithm: [SHA256withRSA]
2014/11/28 14:58:37 | INFO | jvm 1 | Signature:
2014/11/28 14:58:37 | INFO | jvm 1 | 0000: 39 59 42 B8 26 F6 64 7E CA C1 33 7C 60 6A FC 80 9YB.&.d...3.`j..
2014/11/28 14:58:37 | INFO | jvm 1 | 0010: 5F AF 51 89 98 B7 AC 0C 27 DA A1 60 AD 5B 87 11 _.Q.....'..`.[..
2014/11/28 14:58:37 | INFO | jvm 1 | 0020: D8 95 E3 37 D2 CB E3 8A 6F CF 82 F3 4C AA B6 42 ...7....o...L..B
2014/11/28 14:58:37 | INFO | jvm 1 | 0030: F5 8B 67 0B D9 F2 3E FA FE 81 C5 77 78 47 E2 61 ..g...>....wxG.a
2014/11/28 14:58:37 | INFO | jvm 1 | 0040: 33 DC 97 CB FC 04 1D 99 18 84 C3 DC 28 8D 14 D7 3...........(...
2014/11/28 14:58:37 | INFO | jvm 1 | 0050: AF 71 1C E6 41 FC D1 71 CB C3 50 66 5E 28 AF EB .q..A..q..Pf^(..
2014/11/28 14:58:37 | INFO | jvm 1 | 0060: AF 80 52 CC 89 BE 0D 0B 58 1C CA 1C 34 36 BA 96 ..R.....X...46..
2014/11/28 14:58:37 | INFO | jvm 1 | 0070: F2 FE 18 73 6B F7 09 35 94 AC 8E CB F2 83 47 62 ...sk..5......Gb
2014/11/28 14:58:37 | INFO | jvm 1 | 0080: 20 FD 64 64 72 D6 89 D7 77 A7 D0 17 43 7E FF 44 .ddr...w...C..D
2014/11/28 14:58:37 | INFO | jvm 1 | 0090: 57 B5 1D 27 24 1D F5 87 86 E9 29 EF DE E7 D2 2E W..'$.....).....
2014/11/28 14:58:37 | INFO | jvm 1 | 00A0: 32 EE 3D 82 7C 53 7E 93 E9 5F 5E 9C 62 F5 31 C7 2.=..S..._^.b.1.
2014/11/28 14:58:37 | INFO | jvm 1 | 00B0: 9E 54 58 50 01 EE 58 18 81 6D 52 C0 EB CA CA 52 .TXP..X..mR....R
2014/11/28 14:58:37 | INFO | jvm 1 | 00C0: 26 CC 3C 9D E5 60 BE BE A1 E6 D5 79 66 F9 0C FD &.<..`.....yf...
2014/11/28 14:58:37 | INFO | jvm 1 | 00D0: BB 9E 36 E5 31 FC D4 68 8A 06 8D A0 0B 68 BA 2B ..6.1..h.....h.+
2014/11/28 14:58:37 | INFO | jvm 1 | 00E0: 1E AF 51 4A 6C BC 2D 7D B4 04 EA D6 DA 28 9B 64 ..QJl.-......(.d
2014/11/28 14:58:37 | INFO | jvm 1 | 00F0: F9 FF 35 7B E7 91 02 01 37 E7 C2 AA 8D 1E 48 22 ..5.....7.....H"
2014/11/28 14:58:37 | INFO | jvm 1 |
2014/11/28 14:58:37 | INFO | jvm 1 | ]
2014/11/28 14:58:37 | INFO | jvm 1 | ***
2014/11/28 14:58:37 | INFO | jvm 1 | *** ECDH ServerKeyExchange
2014/11/28 14:58:37 | INFO | jvm 1 | Signature Algorithm SHA512withRSA
2014/11/28 14:58:37 | INFO | jvm 1 | Server key: SunPKCS11-NSSfips EC public key, 256 bits (id 1630, session object)
2014/11/28 14:58:37 | INFO | jvm 1 | public x coord: 80735727379809715013484157397151092743423932306787640386795065732439830384956
2014/11/28 14:58:37 | INFO | jvm 1 | public y coord: 75722714462348537277457245937237972579533729551403184089329526197651361616309
2014/11/28 14:58:37 | INFO | jvm 1 | parameters: secp256r1 [NIST P-256, X9.62 prime256v1] (1.2.840.10045.3.1.7)
2014/11/28 14:58:37 | INFO | jvm 1 | *** ServerHelloDone
2014/11/28 14:58:37 | INFO | jvm 1 | qtp1981883520-744, WRITE: TLSv1.2 Handshake, length = 1237
2014/11/28 14:58:37 | INFO | jvm 1 | qtp1981883520-300, READ: TLSv1.2 Handshake, length = 70
2014/11/28 14:58:37 | INFO | jvm 1 | *** ECDHClientKeyExchange
2014/11/28 14:58:37 | INFO | jvm 1 | ECDH Public value: { 4, 136, 246, 34, 252, 176, 247, 237, 161, 228, 245, 141, 5, 237, 180, 149, 66, 18, 105, 95, 10, 75, 231, 192, 15, 15, 254, 54, 129, 203, 161, 244, 6, 22, 49, 17, 235, 156, 147, 2, 140, 67, 12, 232, 111, 18, 3, 225, 229, 15, 163, 203, 9, 136, 152, 241, 38, 169, 134, 249, 92, 39, 3, 177, 117 }
2014/11/28 14:58:37 | INFO | jvm 1 | SESSION KEYGEN:
2014/11/28 14:58:37 | INFO | jvm 1 | PreMaster Secret:
2014/11/28 14:58:37 | INFO | jvm 1 | (key bytes not available)
2014/11/28 14:58:37 | INFO | jvm 1 | qtp1981883520-300, fatal error: 80: problem unwrapping net record
2014/11/28 14:58:37 | INFO | jvm 1 | java.lang.RuntimeException: java.security.NoSuchAlgorithmException: no such algorithm: SunTls12MasterSecret for provider SunPKCS11-NSSfips
2014/11/28 14:58:37 | INFO | jvm 1 | %% Invalidated: [Session-130, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256]
2014/11/28 14:58:37 | INFO | jvm 1 | qtp1981883520-300, SEND TLSv1.2 ALERT: fatal, description = internal_error
2014/11/28 14:58:37 | INFO | jvm 1 | qtp1981883520-300, WRITE: TLSv1.2 Alert, length = 2
2014/11/28 14:58:37 | INFO | jvm 1 | Fri Nov 28 14:58:37 IST 2014|WARNING|qtp1981883520-300|base.util.JavaLoggingLog4jAppender.append
2014/11/28 14:58:37 | INFO | jvm 1 | handle failed
2014/11/28 14:58:37 | INFO | jvm 1 | java.lang.RuntimeException: java.security.NoSuchAlgorithmException: no such algorithm: SunTls12MasterSecret for provider SunPKCS11-NSSfips
2014/11/28 14:58:37 | INFO | jvm 1 | at sun.security.ssl.Handshaker.checkThrown(Handshaker.java:1359)
2014/11/28 14:58:37 | INFO | jvm 1 | at sun.security.ssl.SSLEngineImpl.checkTaskThrown(SSLEngineImpl.java:513)
2014/11/28 14:58:37 | INFO | jvm 1 | at sun.security.ssl.SSLEngineImpl.readNetRecord(SSLEngineImpl.java:790)
2014/11/28 14:58:37 | INFO | jvm 1 | at sun.security.ssl.SSLEngineImpl.unwrap(SSLEngineImpl.java:758)
2014/11/28 14:58:37 | INFO | jvm 1 | at javax.net.ssl.SSLEngine.unwrap(SSLEngine.java:624)
2014/11/28 14:58:37 | INFO | jvm 1 | at org.eclipse.jetty.io.nio.SslConnection.unwrap(SslConnection.java:536)
2014/11/28 14:58:37 | INFO | jvm 1 | at org.eclipse.jetty.io.nio.SslConnection.process(SslConnection.java:401)
2014/11/28 14:58:37 | INFO | jvm 1 | at org.eclipse.jetty.io.nio.SslConnection.handle(SslConnection.java:193)
2014/11/28 14:58:37 | INFO | jvm 1 | at org.eclipse.jetty.io.nio.SelectChannelEndPoint.handle(SelectChannelEndPoint.java:696)
2014/11/28 14:58:37 | INFO | jvm 1 | at org.eclipse.jetty.io.nio.SelectChannelEndPoint$1.run(SelectChannelEndPoint.java:53)
2014/11/28 14:58:37 | INFO | jvm 1 | at org.eclipse.jetty.util.thread.QueuedThreadPool.runJob(QueuedThreadPool.java:608)
2014/11/28 14:58:37 | INFO | jvm 1 | at org.eclipse.jetty.util.thread.QueuedThreadPool$3.run(QueuedThreadPool.java:543)
2014/11/28 14:58:37 | INFO | jvm 1 | at java.lang.Thread.run(Thread.java:744)
2014/11/28 14:58:37 | INFO | jvm 1 | Caused by: java.security.ProviderException: java.security.NoSuchAlgorithmException: no such algorithm: SunTls12MasterSecret for provider SunPKCS11-NSSfips
2014/11/28 14:58:37 | INFO | jvm 1 | at sun.security.ssl.Handshaker.calculateMasterSecret(Handshaker.java:1060)
2014/11/28 14:58:37 | INFO | jvm 1 | at sun.security.ssl.Handshaker.calculateKeys(Handshaker.java:999)
2014/11/28 14:58:37 | INFO | jvm 1 | at sun.security.ssl.ServerHandshaker.processMessage(ServerHandshaker.java:234)
2014/11/28 14:58:37 | INFO | jvm 1 | at sun.security.ssl.Handshaker.processLoop(Handshaker.java:868)
2014/11/28 14:58:37 | INFO | jvm 1 | at sun.security.ssl.Handshaker$1.run(Handshaker.java:808)
2014/11/28 14:58:37 | INFO | jvm 1 | at sun.security.ssl.Handshaker$1.run(Handshaker.java:806)
2014/11/28 14:58:37 | INFO | jvm 1 | at java.security.AccessController.doPrivileged(Native Method)
2014/11/28 14:58:37 | INFO | jvm 1 | at sun.security.ssl.Handshaker$DelegatedTask.run(Handshaker.java:1299)
2014/11/28 14:58:37 | INFO | jvm 1 | at org.eclipse.jetty.io.nio.SslConnection.process(SslConnection.java:375)
2014/11/28 14:58:37 | INFO | jvm 1 | ... 6 more
2014/11/28 14:58:37 | INFO | jvm 1 | Caused by: java.security.NoSuchAlgorithmException: no such algorithm: SunTls12MasterSecret for provider SunPKCS11-NSSfips
2014/11/28 14:58:37 | INFO | jvm 1 | at sun.security.jca.GetInstance.getService(GetInstance.java:100)
2014/11/28 14:58:37 | INFO | jvm 1 | at javax.crypto.JceSecurity.getInstance(JceSecurity.java:109)
2014/11/28 14:58:37 | INFO | jvm 1 | at javax.crypto.KeyGenerator.getInstance(KeyGenerator.java:287)
2014/11/28 14:58:37 | INFO | jvm 1 | at sun.security.ssl.JsseJce.getKeyGenerator(JsseJce.java:269)
2014/11/28 14:58:37 | INFO | jvm 1 | at sun.security.ssl.Handshaker.calculateMasterSecret(Handshaker.java:1052)
2014/11/28 14:58:37 | INFO | jvm 1 | ... 14 more
Server TLS 1.1 Java 1.7u45 + Client Java 1.8u25 "TLS 1.2 disabled" - still fails which is unexpected:
====================================================================
2014/11/28 15:03:38 | INFO | jvm 1 | *** ClientHello, TLSv1.1
2014/11/28 15:03:38 | INFO | jvm 1 | RandomCookie: GMT: 1417167224 bytes = { 55, 212, 126, 68, 49, 1, 205, 58, 112, 15, 1, 9, 38, 31, 58, 188, 229, 115, 10, 61, 249, 209, 98, 140, 149, 113, 149, 231 }
2014/11/28 15:03:38 | INFO | jvm 1 | Session ID: {84, 120, 65, 114, 3, 180, 96, 53, 232, 47, 28, 70, 58, 150, 117, 9, 169, 7, 94, 233, 94, 198, 136, 202, 240, 130, 18, 23, 89, 10, 220, 111}
2014/11/28 15:03:38 | INFO | jvm 1 | Cipher Suites: [TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_anon_WITH_AES_128_CBC_SHA, TLS_ECDH_anon_WITH_3DES_EDE_CBC_SHA]
2014/11/28 15:03:38 | INFO | jvm 1 | Compression Methods: { 0 }
2014/11/28 15:03:38 | INFO | jvm 1 | Extension elliptic_curves, curve names: {secp256r1, sect163k1, sect163r2, secp192r1, secp224r1, sect233k1, sect233r1, sect283k1, sect283r1, secp384r1, sect409k1, sect409r1, secp521r1, sect571k1, sect571r1, secp160k1, secp160r1, secp160r2, sect163r1, secp192k1, sect193r1, sect193r2, secp224k1, sect239k1, secp256k1}
2014/11/28 15:03:38 | INFO | jvm 1 | Extension ec_point_formats, formats: [uncompressed]
2014/11/28 15:03:38 | INFO | jvm 1 | Extension renegotiation_info, renegotiated_connection: <empty>
2014/11/28 15:03:38 | INFO | jvm 1 | ***
2014/11/28 15:03:38 | INFO | jvm 1 | %% Resuming [Session-135, TLS_RSA_WITH_AES_128_CBC_SHA]
2014/11/28 15:03:38 | INFO | jvm 1 | *** ServerHello, TLSv1.1
2014/11/28 15:03:38 | INFO | jvm 1 | RandomCookie: GMT: 1417167218 bytes = { 175, 0, 103, 107, 78, 20, 172, 204, 4, 196, 148, 153, 126, 87, 188, 255, 85, 219, 140, 39, 41, 136, 51, 33, 169, 31, 36, 150 }
2014/11/28 15:03:38 | INFO | jvm 1 | Session ID: {84, 120, 65, 114, 3, 180, 96, 53, 232, 47, 28, 70, 58, 150, 117, 9, 169, 7, 94, 233, 94, 198, 136, 202, 240, 130, 18, 23, 89, 10, 220, 111}
2014/11/28 15:03:38 | INFO | jvm 1 | Cipher Suite: TLS_RSA_WITH_AES_128_CBC_SHA
2014/11/28 15:03:38 | INFO | jvm 1 | Compression Method: 0
2014/11/28 15:03:38 | INFO | jvm 1 | Extension renegotiation_info, renegotiated_connection: <empty>
2014/11/28 15:03:38 | INFO | jvm 1 | ***
2014/11/28 15:03:38 | INFO | jvm 1 | Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA
2014/11/28 15:03:38 | INFO | jvm 1 | CONNECTION KEYGEN:
2014/11/28 15:03:38 | INFO | jvm 1 | Client Nonce:
2014/11/28 15:03:38 | INFO | jvm 1 | 0000: 54 78 41 78 37 D4 7E 44 31 01 CD 3A 70 0F 01 09 TxAx7..D1..:p...
2014/11/28 15:03:38 | INFO | jvm 1 | 0010: 26 1F 3A BC E5 73 0A 3D F9 D1 62 8C 95 71 95 E7 &.:..s.=..b..q..
2014/11/28 15:03:38 | INFO | jvm 1 | Server Nonce:
2014/11/28 15:03:38 | INFO | jvm 1 | 0000: 54 78 41 72 AF 00 67 6B 4E 14 AC CC 04 C4 94 99 TxAr..gkN.......
2014/11/28 15:03:38 | INFO | jvm 1 | 0010: 7E 57 BC FF 55 DB 8C 27 29 88 33 21 A9 1F 24 96 .W..U..').3!..$.
2014/11/28 15:03:38 | INFO | jvm 1 | Master Secret:
2014/11/28 15:03:38 | INFO | jvm 1 | (key bytes not available)
2014/11/28 15:03:38 | INFO | jvm 1 | Client MAC write Secret:
2014/11/28 15:03:38 | INFO | jvm 1 | (key bytes not available)
2014/11/28 15:03:38 | INFO | jvm 1 | Server MAC write Secret:
2014/11/28 15:03:38 | INFO | jvm 1 | (key bytes not available)
2014/11/28 15:03:38 | INFO | jvm 1 | Client write key:
2014/11/28 15:03:38 | INFO | jvm 1 | (key bytes not available)
2014/11/28 15:03:38 | INFO | jvm 1 | Server write key:
2014/11/28 15:03:38 | INFO | jvm 1 | (key bytes not available)
2014/11/28 15:03:38 | INFO | jvm 1 | ... no IV derived for this protocol
2014/11/28 15:03:38 | INFO | jvm 1 | qtp1981883520-300, WRITE: TLSv1.1 Handshake, length = 81
2014/11/28 15:03:38 | INFO | jvm 1 | qtp1981883520-300, WRITE: TLSv1.1 Change Cipher Spec, length = 1
2014/11/28 15:03:38 | INFO | jvm 1 | *** Finished
2014/11/28 15:03:38 | INFO | jvm 1 | verify_data: { 205, 73, 239, 162, 189, 111, 93, 112, 252, 191, 178, 72 }
2014/11/28 15:03:38 | INFO | jvm 1 | ***
2014/11/28 15:03:38 | INFO | jvm 1 | qtp1981883520-300, WRITE: TLSv1.1 Handshake, length = 64
2014/11/28 15:03:38 | INFO | jvm 1 | qtp1981883520-299, READ: TLSv1.1 Change Cipher Spec, length = 1
2014/11/28 15:03:38 | INFO | jvm 1 | qtp1981883520-299, READ: TLSv1.1 Handshake, length = 64
2014/11/28 15:03:38 | INFO | jvm 1 | *** Finished
2014/11/28 15:03:38 | INFO | jvm 1 | verify_data: { 19, 183, 83, 202, 63, 74, 163, 0, 247, 151, 206, 20 }
2014/11/28 15:03:38 | INFO | jvm 1 | ***
2014/11/28 15:03:38 | INFO | jvm 1 | qtp1981883520-299 - /AuthServices/auth/tokens, WRITE: TLSv1.1 Application Data, length = 184
2014/11/28 15:03:38 | INFO | jvm 1 | qtp1981883520-299 - /AuthServices/auth/tokens, WRITE: TLSv1.1 Application Data, length = 2987
2014/11/28 15:03:38 | INFO | jvm 1 | qtp1981883520-299, WRITE: TLSv1.1 Application Data, length = 5
2014/11/28 15:03:38 | INFO | jvm 1 | Allow unsafe renegotiation: false
2014/11/28 15:03:38 | INFO | jvm 1 | Allow legacy hello messages: true
2014/11/28 15:03:38 | INFO | jvm 1 | Is initial handshake: true
2014/11/28 15:03:38 | INFO | jvm 1 | Is secure renegotiation: false
2014/11/28 15:03:38 | INFO | jvm 1 | Is secure renegotiation: false
2014/11/28 15:03:38 | INFO | jvm 1 | Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 for TLSv1
2014/11/28 15:03:38 | INFO | jvm 1 | Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 for TLSv1
2014/11/28 15:03:38 | INFO | jvm 1 | Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 for TLSv1
2014/11/28 15:03:38 | INFO | jvm 1 | Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256 for TLSv1
2014/11/28 15:03:38 | INFO | jvm 1 | Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256 for TLSv1
2014/11/28 15:03:38 | INFO | jvm 1 | Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 for TLSv1
2014/11/28 15:03:38 | INFO | jvm 1 | Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 for TLSv1
2014/11/28 15:03:38 | INFO | jvm 1 | Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 for TLSv1.1
2014/11/28 15:03:38 | INFO | jvm 1 | Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 for TLSv1.1
2014/11/28 15:03:38 | INFO | jvm 1 | Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256 for TLSv1.1
2014/11/28 15:03:38 | INFO | jvm 1 | Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256 for TLSv1.1
2014/11/28 15:03:38 | INFO | jvm 1 | Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 for TLSv1.1
2014/11/28 15:03:38 | INFO | jvm 1 | Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 for TLSv1.1
2014/11/28 15:03:38 | INFO | jvm 1 | Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 for TLSv1.1
2014/11/28 15:03:38 | INFO | jvm 1 | Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 for TLSv1.1
2014/11/28 15:03:40 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
2014/11/28 15:03:40 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA
2014/11/28 15:03:40 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA
2014/11/28 15:03:40 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA
2014/11/28 15:03:40 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256
2014/11/28 15:03:40 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256
2014/11/28 15:03:40 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
2014/11/28 15:03:40 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
2014/11/28 15:03:40 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384
2014/11/28 15:03:40 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA
2014/11/28 15:03:40 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384
2014/11/28 15:03:40 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
2014/11/28 15:03:40 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
2014/11/28 15:03:40 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA
2014/11/28 15:03:40 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA
2014/11/28 15:03:40 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA
2014/11/28 15:03:40 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384
2014/11/28 15:03:40 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384
2014/11/28 15:03:42 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
2014/11/28 15:03:42 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA
2014/11/28 15:03:42 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA
2014/11/28 15:03:42 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256
2014/11/28 15:03:42 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256
2014/11/28 15:03:42 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256
2014/11/28 15:03:42 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256
2014/11/28 15:03:42 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
2014/11/28 15:03:42 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
2014/11/28 15:03:42 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
2014/11/28 15:03:42 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
2014/11/28 15:03:42 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384
2014/11/28 15:03:42 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA
2014/11/28 15:03:42 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA
2014/11/28 15:03:42 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384
2014/11/28 15:03:42 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
2014/11/28 15:03:42 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA
2014/11/28 15:03:42 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA
2014/11/28 15:03:42 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384
2014/11/28 15:03:43 | INFO | jvm 1 | Thread-31, READ: TLSv1.2 Handshake, length = 207
2014/11/28 15:03:43 | INFO | jvm 1 | *** ClientHello, TLSv1.2
2014/11/28 15:03:43 | INFO | jvm 1 | RandomCookie: GMT: 1417167229 bytes = { 209, 207, 128, 77, 244, 126, 201, 133, 122, 149, 46, 174, 146, 131, 232, 171, 236, 114, 188, 239, 89, 136, 179, 55, 42, 35, 10, 208 }
2014/11/28 15:03:43 | INFO | jvm 1 | Session ID: {}
2014/11/28 15:03:43 | INFO | jvm 1 | Session ID: {}
2014/11/28 15:03:43 | INFO | jvm 1 | Cipher Suites: [TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256, TLS_RSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_DSS_WITH_AES_128_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_DSS_WITH_AES_128_GCM_SHA256, TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA, TLS_ECDHE_ECDSA_WITH_RC4_128_SHA, TLS_ECDHE_RSA_WITH_RC4_128_SHA, SSL_RSA_WITH_RC4_128_SHA, TLS_ECDH_ECDSA_WITH_RC4_128_SHA, TLS_ECDH_RSA_WITH_RC4_128_SHA, SSL_RSA_WITH_RC4_128_MD5, TLS_EMPTY_RENEGOTIATION_INFO_SCSV]
2014/11/28 15:03:43 | INFO | jvm 1 | Compression Methods: { 0 }
2014/11/28 15:03:43 | INFO | jvm 1 | Compression Methods: { 0 }
2014/11/28 15:03:43 | INFO | jvm 1 | Extension elliptic_curves, curve names: {secp256r1, sect163k1, sect163r2, secp192r1, secp224r1, sect233k1, sect233r1, sect283k1, sect283r1, secp384r1, sect409k1, sect409r1, secp521r1, sect571k1, sect571r1, secp160k1, secp160r1, secp160r2, sect163r1, secp192k1, sect193r1, sect193r2, secp224k1, sect239k1, secp256k1}
2014/11/28 15:03:43 | INFO | jvm 1 | Extension ec_point_formats, formats: [uncompressed]
2014/11/28 15:03:43 | INFO | jvm 1 | Extension ec_point_formats, formats: [uncompressed]
2014/11/28 15:03:43 | INFO | jvm 1 | Extension signature_algorithms, signature_algorithms: SHA512withECDSA, SHA512withRSA, SHA384withECDSA, SHA384withRSA, SHA256withECDSA, SHA256withRSA, SHA224withECDSA, SHA224withRSA, SHA1withECDSA, SHA1withRSA, SHA1withDSA, MD5withRSA
2014/11/28 15:03:43 | INFO | jvm 1 | ***
2014/11/28 15:03:43 | INFO | jvm 1 | %% Initialized: [Session-136, SSL_NULL_WITH_NULL_NULL]
2014/11/28 15:03:43 | INFO | jvm 1 | %% Initialized: [Session-136, SSL_NULL_WITH_NULL_NULL]
2014/11/28 15:03:43 | INFO | jvm 1 | %% Negotiating: [Session-136, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256]
2014/11/28 15:03:43 | INFO | jvm 1 | *** ServerHello, TLSv1.2
2014/11/28 15:03:43 | INFO | jvm 1 | RandomCookie: GMT: 1417167223 bytes = { 117, 144, 129, 63, 132, 34, 26, 83, 118, 25, 122, 135, 116, 24, 242, 213, 196, 31, 25, 127, 155, 153, 6, 132, 244, 45, 21, 235 }
2014/11/28 15:03:43 | INFO | jvm 1 | RandomCookie: GMT: 1417167223 bytes = { 117, 144, 129, 63, 132, 34, 26, 83, 118, 25, 122, 135, 116, 24, 242, 213, 196, 31, 25, 127, 155, 153, 6, 132, 244, 45, 21, 235 }
2014/11/28 15:03:43 | INFO | jvm 1 | Session ID: {84, 120, 65, 119, 78, 220, 0, 216, 29, 255, 202, 86, 198, 210, 97, 121, 235, 184, 87, 232, 34, 43, 85, 29, 148, 43, 201, 241, 189, 70, 130, 185}
2014/11/28 15:03:43 | INFO | jvm 1 | Cipher Suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
2014/11/28 15:03:43 | INFO | jvm 1 | Compression Method: 0
2014/11/28 15:03:43 | INFO | jvm 1 | Extension renegotiation_info, renegotiated_connection: <empty>
2014/11/28 15:03:43 | INFO | jvm 1 | ***
2014/11/28 15:03:43 | INFO | jvm 1 | Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
2014/11/28 15:03:43 | INFO | jvm 1 | *** Certificate chain
2014/11/28 15:03:43 | INFO | jvm 1 | chain [0] = [
2014/11/28 15:03:43 | INFO | jvm 1 | [
2014/11/28 15:03:43 | INFO | jvm 1 | Version: V3
2014/11/28 15:03:43 | INFO | jvm 1 | Subject: CN=dev-05.labs.blr.com, O=server
2014/11/28 15:03:43 | INFO | jvm 1 | Signature Algorithm: SHA256withRSA, OID = 1.2.840.113549.1.1.11
2014/11/28 15:03:43 | INFO | jvm 1 |
2014/11/28 15:03:43 | INFO | jvm 1 | Key: SunPKCS11-NSSfips RSA public key, 2048 bits (id 1, session object)
2014/11/28 15:03:43 | INFO | jvm 1 | Key: SunPKCS11-NSSfips RSA public key, 2048 bits (id 1, session object)
2014/11/28 15:03:43 | INFO | jvm 1 | modulus: 19751124565775544542661601941034719218747286997557229376272410409764009924174952830102822006739940996361158891315994655677031683410457285645708620145915789088144941408425439122384306771006790672852952487887077643219829713631271285091822690455402307000211724434432943370113476924425722411995320247744734057517566666508974254720742261526685687656494544221796453195966155694205640019924093341684193258103280171653517687458035087335731929833587535142452049552301009807817546366586239918288540321429443922231821575519420587811789981092934767950075857907111279056051594689275813767976468618202672668356345198890748632149983
2014/11/28 15:03:43 | INFO | jvm 1 | public exponent: 65537
2014/11/28 15:03:43 | INFO | jvm 1 | public exponent: 65537
2014/11/28 15:03:43 | INFO | jvm 1 | Validity: [From: Tue Nov 25 14:37:52 IST 2014,
2014/11/28 15:03:43 | INFO | jvm 1 | To: Thu Nov 01 14:37:52 IST 2114]
2014/11/28 15:03:43 | INFO | jvm 1 | Issuer: CN=dev-05.labs.blr.com, O=server
2014/11/28 15:03:43 | INFO | jvm 1 | SerialNumber: [ 0d54f951]
2014/11/28 15:03:43 | INFO | jvm 1 |
2014/11/28 15:03:43 | INFO | jvm 1 | Certificate Extensions: 1
2014/11/28 15:03:43 | INFO | jvm 1 | [1]: ObjectId: 2.5.29.14 Criticality=false
2014/11/28 15:03:43 | INFO | jvm 1 | SubjectKeyIdentifier [
2014/11/28 15:03:43 | INFO | jvm 1 | KeyIdentifier [
2014/11/28 15:03:43 | INFO | jvm 1 | 0000: 94 2D EB EF E8 04 5F 84 B2 BA F6 A5 C9 58 D3 79 .-...._......X.y
2014/11/28 15:03:43 | INFO | jvm 1 | 0010: 44 8F 40 07 D.@.
2014/11/28 15:03:43 | INFO | jvm 1 | ]
2014/11/28 15:03:43 | INFO | jvm 1 | ]
2014/11/28 15:03:43 | INFO | jvm 1 |
2014/11/28 15:03:43 | INFO | jvm 1 | ]
2014/11/28 15:03:43 | INFO | jvm 1 | Algorithm: [SHA256withRSA]
2014/11/28 15:03:43 | INFO | jvm 1 | Signature:
2014/11/28 15:03:43 | INFO | jvm 1 | 0000: 39 59 42 B8 26 F6 64 7E CA C1 33 7C 60 6A FC 80 9YB.&.d...3.`j..
2014/11/28 15:03:43 | INFO | jvm 1 | 0010: 5F AF 51 89 98 B7 AC 0C 27 DA A1 60 AD 5B 87 11 _.Q.....'..`.[..
2014/11/28 15:03:43 | INFO | jvm 1 | 0020: D8 95 E3 37 D2 CB E3 8A 6F CF 82 F3 4C AA B6 42 ...7....o...L..B
2014/11/28 15:03:43 | INFO | jvm 1 | 0030: F5 8B 67 0B D9 F2 3E FA FE 81 C5 77 78 47 E2 61 ..g...>....wxG.a
2014/11/28 15:03:43 | INFO | jvm 1 | 0040: 33 DC 97 CB FC 04 1D 99 18 84 C3 DC 28 8D 14 D7 3...........(...
2014/11/28 15:03:43 | INFO | jvm 1 | 0050: AF 71 1C E6 41 FC D1 71 CB C3 50 66 5E 28 AF EB .q..A..q..Pf^(..
2014/11/28 15:03:43 | INFO | jvm 1 | 0060: AF 80 52 CC 89 BE 0D 0B 58 1C CA 1C 34 36 BA 96 ..R.....X...46..
2014/11/28 15:03:43 | INFO | jvm 1 | 0070: F2 FE 18 73 6B F7 09 35 94 AC 8E CB F2 83 47 62 ...sk..5......Gb
2014/11/28 15:03:43 | INFO | jvm 1 | 0080: 20 FD 64 64 72 D6 89 D7 77 A7 D0 17 43 7E FF 44 .ddr...w...C..D
2014/11/28 15:03:43 | INFO | jvm 1 | 0090: 57 B5 1D 27 24 1D F5 87 86 E9 29 EF DE E7 D2 2E W..'$.....).....
2014/11/28 15:03:43 | INFO | jvm 1 | 00A0: 32 EE 3D 82 7C 53 7E 93 E9 5F 5E 9C 62 F5 31 C7 2.=..S..._^.b.1.
2014/11/28 15:03:43 | INFO | jvm 1 | 00B0: 9E 54 58 50 01 EE 58 18 81 6D 52 C0 EB CA CA 52 .TXP..X..mR....R
2014/11/28 15:03:43 | INFO | jvm 1 | 00C0: 26 CC 3C 9D E5 60 BE BE A1 E6 D5 79 66 F9 0C FD &.<..`.....yf...
2014/11/28 15:03:43 | INFO | jvm 1 | 00D0: BB 9E 36 E5 31 FC D4 68 8A 06 8D A0 0B 68 BA 2B ..6.1..h.....h.+
2014/11/28 15:03:43 | INFO | jvm 1 | 00E0: 1E AF 51 4A 6C BC 2D 7D B4 04 EA D6 DA 28 9B 64 ..QJl.-......(.d
2014/11/28 15:03:43 | INFO | jvm 1 | 00F0: F9 FF 35 7B E7 91 02 01 37 E7 C2 AA 8D 1E 48 22 ..5.....7.....H"
2014/11/28 15:03:43 | INFO | jvm 1 |
2014/11/28 15:03:43 | INFO | jvm 1 | ]
2014/11/28 15:03:43 | INFO | jvm 1 | ***
2014/11/28 15:03:43 | INFO | jvm 1 | *** ECDH ServerKeyExchange
2014/11/28 15:03:43 | INFO | jvm 1 | Signature Algorithm SHA512withRSA
2014/11/28 15:03:43 | INFO | jvm 1 | Server key: SunPKCS11-NSSfips EC public key, 256 bits (id 1668, session object)
2014/11/28 15:03:43 | INFO | jvm 1 | public x coord: 22811020849167726801730368600918463139597169803826118722525163464343792847845
2014/11/28 15:03:43 | INFO | jvm 1 | public y coord: 73886304187565809239631250457098470068449769526968865962213829575389354072377
2014/11/28 15:03:43 | INFO | jvm 1 | parameters: secp256r1 [NIST P-256, X9.62 prime256v1] (1.2.840.10045.3.1.7)
2014/11/28 15:03:43 | INFO | jvm 1 | *** ServerHelloDone
2014/11/28 15:03:43 | INFO | jvm 1 | Thread-31, WRITE: TLSv1.2 Handshake, length = 1237
2014/11/28 15:03:43 | INFO | jvm 1 | Thread-31, READ: TLSv1.2 Handshake, length = 70
2014/11/28 15:03:43 | INFO | jvm 1 | *** ECDHClientKeyExchange
2014/11/28 15:03:43 | INFO | jvm 1 | ECDH Public value: { 4, 121, 116, 89, 85, 251, 91, 15, 91, 227, 244, 77, 243, 1, 197, 145, 33, 117, 182, 143, 76, 42, 19, 121, 131, 88, 88, 58, 225, 42, 50, 178, 100, 17, 18, 128, 220, 237, 192, 247, 67, 173, 13, 185, 114, 213, 250, 172, 58, 145, 158, 237, 115, 94, 129, 246, 254, 151, 126, 190, 182, 240, 45, 57, 62 }
2014/11/28 15:03:43 | INFO | jvm 1 | SESSION KEYGEN:
2014/11/28 15:03:43 | INFO | jvm 1 | PreMaster Secret:
2014/11/28 15:03:43 | INFO | jvm 1 | (key bytes not available)
2014/11/28 15:03:43 | INFO | jvm 1 | Thread-31, handling exception: java.security.ProviderException: java.security.NoSuchAlgorithmException: no such algorithm: SunTls12MasterSecret for provider SunPKCS11-NSSfips
2014/11/28 15:03:43 | INFO | jvm 1 | %% Invalidated: [Session-136, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256]
2014/11/28 15:03:43 | INFO | jvm 1 | Thread-31, SEND TLSv1.2 ALERT: fatal, description = internal_error
2014/11/28 15:03:43 | INFO | jvm 1 | Thread-31, WRITE: TLSv1.2 Alert, length = 2
2014/11/28 15:03:43 | INFO | jvm 1 | Thread-31, called closeSocket()
2014/11/28 15:03:43 | INFO | jvm 1 | Thread-31, IOException in getSession(): javax.net.ssl.SSLException: java.security.ProviderException: java.security.NoSuchAlgorithmException: no such algorithm: SunTls12MasterSecret for provider SunPKCS11-NSSfips
2014/11/28 15:03:43 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
2014/11/28 15:03:43 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA
2014/11/28 15:03:43 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA
2014/11/28 15:03:43 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256
2014/11/28 15:03:43 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256
2014/11/28 15:03:43 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
2014/11/28 15:03:43 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
2014/11/28 15:03:43 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384
2014/11/28 15:03:43 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA
2014/11/28 15:03:43 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384
2014/11/28 15:03:43 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
2014/11/28 15:03:43 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA
2014/11/28 15:03:43 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA
2014/11/28 15:03:43 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384
2014/11/28 15:03:43 | INFO | jvm 1 | Fri Nov 28 15:03:43 IST 2014|WARNING|Thread-601|ccs.comp.clientproxy.ProxiedClientListener$ProxyConnection.run
2014/11/28 15:03:43 | INFO | jvm 1 | Error processing requests from proxied client : unestablished
2014/11/28 15:03:43 | INFO | jvm 1 | Caused by: java.security.NoSuchAlgorithmException: no such algorithm: SunTls12MasterSecret for provider SunPKCS11-NSSfips (java.security.ProviderException); Root cause: no such algorithm: SunTls12MasterSecret for provider SunPKCS11-NSSfips (java.security.NoSuchAlgorithmException)
2014/11/28 15:03:43 | INFO | jvm 1 | javax.net.ssl.SSLException: Connection has been shutdown: javax.net.ssl.SSLException: java.security.ProviderException: java.security.NoSuchAlgorithmException: no such algorithm: SunTls12MasterSecret for provider SunPKCS11-NSSfips
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.ssl.SSLSocketImpl.checkEOF(SSLSocketImpl.java:1476)
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.ssl.AppInputStream.read(AppInputStream.java:92)
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.ssl.AppInputStream.read(AppInputStream.java:69)
2014/11/28 15:03:43 | INFO | jvm 1 | at java.io.DataInputStream.readByte(DataInputStream.java:265)
2014/11/28 15:03:43 | INFO | jvm 1 | at ccs.comp.clientproxy.ProxiedClientListener$ProxyConnection.getNext(ProxiedClientListener.java:438)
2014/11/28 15:03:43 | INFO | jvm 1 | at ccs.comp.clientproxy.ProxiedClientListener$ProxyConnection.run(ProxiedClientListener.java:245)
2014/11/28 15:03:43 | INFO | jvm 1 | Caused by: javax.net.ssl.SSLException: java.security.ProviderException: java.security.NoSuchAlgorithmException: no such algorithm: SunTls12MasterSecret for provider SunPKCS11-NSSfips
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.ssl.Alerts.getSSLException(Alerts.java:208)
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.ssl.SSLSocketImpl.fatal(SSLSocketImpl.java:1884)
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.ssl.SSLSocketImpl.fatal(SSLSocketImpl.java:1842)
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.ssl.SSLSocketImpl.handleException(SSLSocketImpl.java:1825)
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:1346)
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.ssl.SSLSocketImpl.getSession(SSLSocketImpl.java:2171)
2014/11/28 15:03:43 | INFO | jvm 1 | at ccs.comp.clientproxy.ProxiedClientListener.listen(ProxiedClientListener.java:126)
2014/11/28 15:03:43 | INFO | jvm 1 | at ccs.comp.clientproxy.ProxiedClientListener.run(ProxiedClientListener.java:105)
2014/11/28 15:03:43 | INFO | jvm 1 | Caused by: java.security.ProviderException: java.security.NoSuchAlgorithmException: no such algorithm: SunTls12MasterSecret for provider SunPKCS11-NSSfips
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.ssl.Handshaker.calculateMasterSecret(Handshaker.java:1060)
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.ssl.Handshaker.calculateKeys(Handshaker.java:999)
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.ssl.ServerHandshaker.processMessage(ServerHandshaker.java:234)
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.ssl.Handshaker.processLoop(Handshaker.java:868)
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.ssl.Handshaker.process_record(Handshaker.java:804)
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.ssl.SSLSocketImpl.readRecord(SSLSocketImpl.java:1016)
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.ssl.SSLSocketImpl.performInitialHandshake(SSLSocketImpl.java:1312)
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:1339)
2014/11/28 15:03:43 | INFO | jvm 1 | ... 3 more
2014/11/28 15:03:43 | INFO | jvm 1 | Caused by: java.security.NoSuchAlgorithmException: no such algorithm: SunTls12MasterSecret for provider SunPKCS11-NSSfips
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.jca.GetInstance.getService(GetInstance.java:100)
2014/11/28 15:03:43 | INFO | jvm 1 | at javax.crypto.JceSecurity.getInstance(JceSecurity.java:109)
2014/11/28 15:03:43 | INFO | jvm 1 | at javax.crypto.KeyGenerator.getInstance(KeyGenerator.java:287)
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.ssl.JsseJce.getKeyGenerator(JsseJce.java:269)
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.ssl.Handshaker.calculateMasterSecret(Handshaker.java:1052)
2014/11/28 15:03:43 | INFO | jvm 1 | ... 10 more
2014/11/28 15:03:43 | INFO | jvm 1 |
2014/11/28 15:03:43 | INFO | jvm 1 | Fri Nov 28 15:03:43 IST 2014|SEVERE|Thread-601|Could not determine class.Could not determine method
2014/11/28 15:03:43 | INFO | jvm 1 |
2014/11/28 15:03:43 | INFO | jvm 1 | Caused by: java.security.NoSuchAlgorithmException: no such algorithm: SunTls12MasterSecret for provider SunPKCS11-NSSfips (java.security.ProviderException); Root cause: no such algorithm: SunTls12MasterSecret for provider SunPKCS11-NSSfips (java.security.NoSuchAlgorithmException)
2014/11/28 15:03:43 | INFO | jvm 1 | javax.net.ssl.SSLException: Connection has been shutdown: javax.net.ssl.SSLException: java.security.ProviderException: java.security.NoSuchAlgorithmException: no such algorithm: SunTls12MasterSecret for provider SunPKCS11-NSSfips
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.ssl.SSLSocketImpl.checkEOF(SSLSocketImpl.java:1476)
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.ssl.AppInputStream.read(AppInputStream.java:92)
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.ssl.AppInputStream.read(AppInputStream.java:69)
2014/11/28 15:03:43 | INFO | jvm 1 | at java.io.DataInputStream.readByte(DataInputStream.java:265)
2014/11/28 15:03:43 | INFO | jvm 1 | at ccs.comp.clientproxy.ProxiedClientListener$ProxyConnection.getNext(ProxiedClientListener.java:438)
2014/11/28 15:03:43 | INFO | jvm 1 | at ccs.comp.clientproxy.ProxiedClientListener$ProxyConnection.run(ProxiedClientListener.java:245)
2014/11/28 15:03:43 | INFO | jvm 1 | Caused by: javax.net.ssl.SSLException: java.security.ProviderException: java.security.NoSuchAlgorithmException: no such algorithm: SunTls12MasterSecret for provider SunPKCS11-NSSfips
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.ssl.Alerts.getSSLException(Alerts.java:208)
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.ssl.SSLSocketImpl.fatal(SSLSocketImpl.java:1884)
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.ssl.SSLSocketImpl.fatal(SSLSocketImpl.java:1842)
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.ssl.SSLSocketImpl.handleException(SSLSocketImpl.java:1825)
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:1346)
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.ssl.SSLSocketImpl.getSession(SSLSocketImpl.java:2171)
2014/11/28 15:03:43 | INFO | jvm 1 | at ccs.comp.clientproxy.ProxiedClientListener.listen(ProxiedClientListener.java:126)
2014/11/28 15:03:43 | INFO | jvm 1 | at ccs.comp.clientproxy.ProxiedClientListener.run(ProxiedClientListener.java:105)
2014/11/28 15:03:43 | INFO | jvm 1 | Caused by: java.security.ProviderException: java.security.NoSuchAlgorithmException: no such algorithm: SunTls12MasterSecret for provider SunPKCS11-NSSfips
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.ssl.Handshaker.calculateMasterSecret(Handshaker.java:1060)
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.ssl.Handshaker.calculateKeys(Handshaker.java:999)
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.ssl.ServerHandshaker.processMessage(ServerHandshaker.java:234)
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.ssl.Handshaker.processLoop(Handshaker.java:868)
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.ssl.Handshaker.process_record(Handshaker.java:804)
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.ssl.SSLSocketImpl.readRecord(SSLSocketImpl.java:1016)
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.ssl.SSLSocketImpl.performInitialHandshake(SSLSocketImpl.java:1312)
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:1339)
2014/11/28 15:03:43 | INFO | jvm 1 | ... 3 more
2014/11/28 15:03:43 | INFO | jvm 1 | Caused by: java.security.NoSuchAlgorithmException: no such algorithm: SunTls12MasterSecret for provider SunPKCS11-NSSfips
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.jca.GetInstance.getService(GetInstance.java:100)
2014/11/28 15:03:43 | INFO | jvm 1 | at javax.crypto.JceSecurity.getInstance(JceSecurity.java:109)
2014/11/28 15:03:43 | INFO | jvm 1 | at javax.crypto.KeyGenerator.getInstance(KeyGenerator.java:287)
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.ssl.JsseJce.getKeyGenerator(JsseJce.java:269)
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.ssl.Handshaker.calculateMasterSecret(Handshaker.java:1052)
2014/11/28 15:03:43 | INFO | jvm 1 | ... 10 more
2014/11/28 15:03:43 | INFO | jvm 1 |
2014/11/28 15:03:43 | INFO | jvm 1 | Thread-601, called close()
2014/11/28 15:03:43 | INFO | jvm 1 | Thread-601, called closeInternal(true)
2014/11/28 15:03:43 | INFO | jvm 1 | Allow unsafe renegotiation: false
2014/11/28 15:03:43 | INFO | jvm 1 | Allow legacy hello messages: true
2014/11/28 15:03:43 | INFO | jvm 1 | Is initial handshake: true
2014/11/28 15:03:43 | INFO | jvm 1 | Is secure renegotiation: false
2014/11/28 15:03:43 | INFO | jvm 1 | Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 for TLSv1
2014/11/28 15:03:43 | INFO | jvm 1 | Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 for TLSv1
2014/11/28 15:03:43 | INFO | jvm 1 | Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256 for TLSv1
2014/11/28 15:03:43 | INFO | jvm 1 | Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256 for TLSv1
2014/11/28 15:03:43 | INFO | jvm 1 | Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 for TLSv1
2014/11/28 15:03:43 | INFO | jvm 1 | Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 for TLSv1
2014/11/28 15:03:43 | INFO | jvm 1 | Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 for TLSv1.1
2014/11/28 15:03:43 | INFO | jvm 1 | Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 for TLSv1.1
2014/11/28 15:03:43 | INFO | jvm 1 | Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256 for TLSv1.1
2014/11/28 15:03:43 | INFO | jvm 1 | Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256 for TLSv1.1
2014/11/28 15:03:43 | INFO | jvm 1 | Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 for TLSv1.1
2014/11/28 15:03:43 | INFO | jvm 1 | Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 for TLSv1.1
2014/11/28 15:03:43 | INFO | jvm 1 | [1]: ObjectId: 2.5.29.14 Criticality=false
2014/11/28 15:03:43 | INFO | jvm 1 | SubjectKeyIdentifier [
2014/11/28 15:03:43 | INFO | jvm 1 | KeyIdentifier [
2014/11/28 15:03:43 | INFO | jvm 1 | 0000: 94 2D EB EF E8 04 5F 84 B2 BA F6 A5 C9 58 D3 79 .-...._......X.y
2014/11/28 15:03:43 | INFO | jvm 1 | 0010: 44 8F 40 07 D.@.
2014/11/28 15:03:43 | INFO | jvm 1 | ]
2014/11/28 15:03:43 | INFO | jvm 1 | ]
2014/11/28 15:03:43 | INFO | jvm 1 |
2014/11/28 15:03:43 | INFO | jvm 1 | ]
2014/11/28 15:03:43 | INFO | jvm 1 | Algorithm: [SHA256withRSA]
2014/11/28 15:03:43 | INFO | jvm 1 | Signature:
2014/11/28 15:03:43 | INFO | jvm 1 | 0000: 39 59 42 B8 26 F6 64 7E CA C1 33 7C 60 6A FC 80 9YB.&.d...3.`j..
2014/11/28 15:03:43 | INFO | jvm 1 | 0010: 5F AF 51 89 98 B7 AC 0C 27 DA A1 60 AD 5B 87 11 _.Q.....'..`.[..
2014/11/28 15:03:43 | INFO | jvm 1 | 0020: D8 95 E3 37 D2 CB E3 8A 6F CF 82 F3 4C AA B6 42 ...7....o...L..B
2014/11/28 15:03:43 | INFO | jvm 1 | 0030: F5 8B 67 0B D9 F2 3E FA FE 81 C5 77 78 47 E2 61 ..g...>....wxG.a
2014/11/28 15:03:43 | INFO | jvm 1 | 0040: 33 DC 97 CB FC 04 1D 99 18 84 C3 DC 28 8D 14 D7 3...........(...
2014/11/28 15:03:43 | INFO | jvm 1 | 0050: AF 71 1C E6 41 FC D1 71 CB C3 50 66 5E 28 AF EB .q..A..q..Pf^(..
2014/11/28 15:03:43 | INFO | jvm 1 | 0060: AF 80 52 CC 89 BE 0D 0B 58 1C CA 1C 34 36 BA 96 ..R.....X...46..
2014/11/28 15:03:43 | INFO | jvm 1 | 0070: F2 FE 18 73 6B F7 09 35 94 AC 8E CB F2 83 47 62 ...sk..5......Gb
2014/11/28 15:03:43 | INFO | jvm 1 | 0080: 20 FD 64 64 72 D6 89 D7 77 A7 D0 17 43 7E FF 44 .ddr...w...C..D
2014/11/28 15:03:43 | INFO | jvm 1 | 0090: 57 B5 1D 27 24 1D F5 87 86 E9 29 EF DE E7 D2 2E W..'$.....).....
2014/11/28 15:03:43 | INFO | jvm 1 | 00A0: 32 EE 3D 82 7C 53 7E 93 E9 5F 5E 9C 62 F5 31 C7 2.=..S..._^.b.1.
2014/11/28 15:03:43 | INFO | jvm 1 | 00B0: 9E 54 58 50 01 EE 58 18 81 6D 52 C0 EB CA CA 52 .TXP..X..mR....R
2014/11/28 15:03:43 | INFO | jvm 1 | 00C0: 26 CC 3C 9D E5 60 BE BE A1 E6 D5 79 66 F9 0C FD &.<..`.....yf...
2014/11/28 15:03:43 | INFO | jvm 1 | 00D0: BB 9E 36 E5 31 FC D4 68 8A 06 8D A0 0B 68 BA 2B ..6.1..h.....h.+
2014/11/28 15:03:43 | INFO | jvm 1 | 00E0: 1E AF 51 4A 6C BC 2D 7D B4 04 EA D6 DA 28 9B 64 ..QJl.-......(.d
2014/11/28 15:03:43 | INFO | jvm 1 | 00F0: F9 FF 35 7B E7 91 02 01 37 E7 C2 AA 8D 1E 48 22 ..5.....7.....H"
2014/11/28 15:03:43 | INFO | jvm 1 |
2014/11/28 15:03:43 | INFO | jvm 1 | ]
2014/11/28 15:03:43 | INFO | jvm 1 | ***
2014/11/28 15:03:43 | INFO | jvm 1 | *** ECDH ServerKeyExchange
2014/11/28 15:03:43 | INFO | jvm 1 | Signature Algorithm SHA512withRSA
2014/11/28 15:03:43 | INFO | jvm 1 | Server key: SunPKCS11-NSSfips EC public key, 256 bits (id 1668, session object)
2014/11/28 15:03:43 | INFO | jvm 1 | public x coord: 22811020849167726801730368600918463139597169803826118722525163464343792847845
2014/11/28 15:03:43 | INFO | jvm 1 | public y coord: 73886304187565809239631250457098470068449769526968865962213829575389354072377
2014/11/28 15:03:43 | INFO | jvm 1 | parameters: secp256r1 [NIST P-256, X9.62 prime256v1] (1.2.840.10045.3.1.7)
2014/11/28 15:03:43 | INFO | jvm 1 | *** ServerHelloDone
2014/11/28 15:03:43 | INFO | jvm 1 | Thread-31, WRITE: TLSv1.2 Handshake, length = 1237
2014/11/28 15:03:43 | INFO | jvm 1 | Thread-31, READ: TLSv1.2 Handshake, length = 70
2014/11/28 15:03:43 | INFO | jvm 1 | *** ECDHClientKeyExchange
2014/11/28 15:03:43 | INFO | jvm 1 | ECDH Public value: { 4, 121, 116, 89, 85, 251, 91, 15, 91, 227, 244, 77, 243, 1, 197, 145, 33, 117, 182, 143, 76, 42, 19, 121, 131, 88, 88, 58, 225, 42, 50, 178, 100, 17, 18, 128, 220, 237, 192, 247, 67, 173, 13, 185, 114, 213, 250, 172, 58, 145, 158, 237, 115, 94, 129, 246, 254, 151, 126, 190, 182, 240, 45, 57, 62 }
2014/11/28 15:03:43 | INFO | jvm 1 | SESSION KEYGEN:
2014/11/28 15:03:43 | INFO | jvm 1 | PreMaster Secret:
2014/11/28 15:03:43 | INFO | jvm 1 | (key bytes not available)
2014/11/28 15:03:43 | INFO | jvm 1 | Thread-31, handling exception: java.security.ProviderException: java.security.NoSuchAlgorithmException: no such algorithm: SunTls12MasterSecret for provider SunPKCS11-NSSfips
2014/11/28 15:03:43 | INFO | jvm 1 | %% Invalidated: [Session-136, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256]
2014/11/28 15:03:43 | INFO | jvm 1 | Thread-31, SEND TLSv1.2 ALERT: fatal, description = internal_error
2014/11/28 15:03:43 | INFO | jvm 1 | Thread-31, WRITE: TLSv1.2 Alert, length = 2
2014/11/28 15:03:43 | INFO | jvm 1 | Thread-31, called closeSocket()
2014/11/28 15:03:43 | INFO | jvm 1 | Thread-31, IOException in getSession(): javax.net.ssl.SSLException: java.security.ProviderException: java.security.NoSuchAlgorithmException: no such algorithm: SunTls12MasterSecret for provider SunPKCS11-NSSfips
2014/11/28 15:03:43 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
2014/11/28 15:03:43 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA
2014/11/28 15:03:43 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA
2014/11/28 15:03:43 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256
2014/11/28 15:03:43 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256
2014/11/28 15:03:43 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
2014/11/28 15:03:43 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
2014/11/28 15:03:43 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384
2014/11/28 15:03:43 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA
2014/11/28 15:03:43 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384
2014/11/28 15:03:43 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
2014/11/28 15:03:43 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA
2014/11/28 15:03:43 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA
2014/11/28 15:03:43 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384
2014/11/28 15:03:43 | INFO | jvm 1 | Fri Nov 28 15:03:43 IST 2014|WARNING|Thread-601|ccs.comp.clientproxy.ProxiedClientListener$ProxyConnection.run
2014/11/28 15:03:43 | INFO | jvm 1 | Error processing requests from proxied client : unestablished
2014/11/28 15:03:43 | INFO | jvm 1 | Caused by: java.security.NoSuchAlgorithmException: no such algorithm: SunTls12MasterSecret for provider SunPKCS11-NSSfips (java.security.ProviderException); Root cause: no such algorithm: SunTls12MasterSecret for provider SunPKCS11-NSSfips (java.security.NoSuchAlgorithmException)
2014/11/28 15:03:43 | INFO | jvm 1 | javax.net.ssl.SSLException: Connection has been shutdown: javax.net.ssl.SSLException: java.security.ProviderException: java.security.NoSuchAlgorithmException: no such algorithm: SunTls12MasterSecret for provider SunPKCS11-NSSfips
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.ssl.SSLSocketImpl.checkEOF(SSLSocketImpl.java:1476)
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.ssl.AppInputStream.read(AppInputStream.java:92)
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.ssl.AppInputStream.read(AppInputStream.java:69)
2014/11/28 15:03:43 | INFO | jvm 1 | at java.io.DataInputStream.readByte(DataInputStream.java:265)
2014/11/28 15:03:43 | INFO | jvm 1 | at ccs.comp.clientproxy.ProxiedClientListener$ProxyConnection.getNext(ProxiedClientListener.java:438)
2014/11/28 15:03:43 | INFO | jvm 1 | at ccs.comp.clientproxy.ProxiedClientListener$ProxyConnection.run(ProxiedClientListener.java:245)
2014/11/28 15:03:43 | INFO | jvm 1 | Caused by: javax.net.ssl.SSLException: java.security.ProviderException: java.security.NoSuchAlgorithmException: no such algorithm: SunTls12MasterSecret for provider SunPKCS11-NSSfips
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.ssl.Alerts.getSSLException(Alerts.java:208)
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.ssl.SSLSocketImpl.fatal(SSLSocketImpl.java:1884)
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.ssl.SSLSocketImpl.fatal(SSLSocketImpl.java:1842)
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.ssl.SSLSocketImpl.handleException(SSLSocketImpl.java:1825)
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:1346)
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.ssl.SSLSocketImpl.getSession(SSLSocketImpl.java:2171)
2014/11/28 15:03:43 | INFO | jvm 1 | at ccs.comp.clientproxy.ProxiedClientListener.listen(ProxiedClientListener.java:126)
2014/11/28 15:03:43 | INFO | jvm 1 | at ccs.comp.clientproxy.ProxiedClientListener.run(ProxiedClientListener.java:105)
2014/11/28 15:03:43 | INFO | jvm 1 | Caused by: java.security.ProviderException: java.security.NoSuchAlgorithmException: no such algorithm: SunTls12MasterSecret for provider SunPKCS11-NSSfips
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.ssl.Handshaker.calculateMasterSecret(Handshaker.java:1060)
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.ssl.Handshaker.calculateKeys(Handshaker.java:999)
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.ssl.ServerHandshaker.processMessage(ServerHandshaker.java:234)
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.ssl.Handshaker.processLoop(Handshaker.java:868)
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.ssl.Handshaker.process_record(Handshaker.java:804)
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.ssl.SSLSocketImpl.readRecord(SSLSocketImpl.java:1016)
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.ssl.SSLSocketImpl.performInitialHandshake(SSLSocketImpl.java:1312)
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:1339)
2014/11/28 15:03:43 | INFO | jvm 1 | ... 3 more
2014/11/28 15:03:43 | INFO | jvm 1 | Caused by: java.security.NoSuchAlgorithmException: no such algorithm: SunTls12MasterSecret for provider SunPKCS11-NSSfips
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.jca.GetInstance.getService(GetInstance.java:100)
2014/11/28 15:03:43 | INFO | jvm 1 | at javax.crypto.JceSecurity.getInstance(JceSecurity.java:109)
2014/11/28 15:03:43 | INFO | jvm 1 | at javax.crypto.KeyGenerator.getInstance(KeyGenerator.java:287)
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.ssl.JsseJce.getKeyGenerator(JsseJce.java:269)
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.ssl.Handshaker.calculateMasterSecret(Handshaker.java:1052)
2014/11/28 15:03:43 | INFO | jvm 1 | ... 10 more
2014/11/28 15:03:43 | INFO | jvm 1 |
2014/11/28 15:03:43 | INFO | jvm 1 | Fri Nov 28 15:03:43 IST 2014|SEVERE|Thread-601|Could not determine class.Could not determine method
2014/11/28 15:03:43 | INFO | jvm 1 |
2014/11/28 15:03:43 | INFO | jvm 1 | Caused by: java.security.NoSuchAlgorithmException: no such algorithm: SunTls12MasterSecret for provider SunPKCS11-NSSfips (java.security.ProviderException); Root cause: no such algorithm: SunTls12MasterSecret for provider SunPKCS11-NSSfips (java.security.NoSuchAlgorithmException)
2014/11/28 15:03:43 | INFO | jvm 1 | javax.net.ssl.SSLException: Connection has been shutdown: javax.net.ssl.SSLException: java.security.ProviderException: java.security.NoSuchAlgorithmException: no such algorithm: SunTls12MasterSecret for provider SunPKCS11-NSSfips
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.ssl.SSLSocketImpl.checkEOF(SSLSocketImpl.java:1476)
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.ssl.AppInputStream.read(AppInputStream.java:92)
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.ssl.AppInputStream.read(AppInputStream.java:69)
2014/11/28 15:03:43 | INFO | jvm 1 | at java.io.DataInputStream.readByte(DataInputStream.java:265)
2014/11/28 15:03:43 | INFO | jvm 1 | at ccs.comp.clientproxy.ProxiedClientListener$ProxyConnection.getNext(ProxiedClientListener.java:438)
2014/11/28 15:03:43 | INFO | jvm 1 | at ccs.comp.clientproxy.ProxiedClientListener$ProxyConnection.run(ProxiedClientListener.java:245)
2014/11/28 15:03:43 | INFO | jvm 1 | Caused by: javax.net.ssl.SSLException: java.security.ProviderException: java.security.NoSuchAlgorithmException: no such algorithm: SunTls12MasterSecret for provider SunPKCS11-NSSfips
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.ssl.Alerts.getSSLException(Alerts.java:208)
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.ssl.SSLSocketImpl.fatal(SSLSocketImpl.java:1884)
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.ssl.SSLSocketImpl.fatal(SSLSocketImpl.java:1842)
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.ssl.SSLSocketImpl.handleException(SSLSocketImpl.java:1825)
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:1346)
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.ssl.SSLSocketImpl.getSession(SSLSocketImpl.java:2171)
2014/11/28 15:03:43 | INFO | jvm 1 | at ccs.comp.clientproxy.ProxiedClientListener.listen(ProxiedClientListener.java:126)
2014/11/28 15:03:43 | INFO | jvm 1 | at ccs.comp.clientproxy.ProxiedClientListener.run(ProxiedClientListener.java:105)
2014/11/28 15:03:43 | INFO | jvm 1 | Caused by: java.security.ProviderException: java.security.NoSuchAlgorithmException: no such algorithm: SunTls12MasterSecret for provider SunPKCS11-NSSfips
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.ssl.Handshaker.calculateMasterSecret(Handshaker.java:1060)
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.ssl.Handshaker.calculateKeys(Handshaker.java:999)
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.ssl.ServerHandshaker.processMessage(ServerHandshaker.java:234)
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.ssl.Handshaker.processLoop(Handshaker.java:868)
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.ssl.Handshaker.process_record(Handshaker.java:804)
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.ssl.SSLSocketImpl.readRecord(SSLSocketImpl.java:1016)
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.ssl.SSLSocketImpl.performInitialHandshake(SSLSocketImpl.java:1312)
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:1339)
2014/11/28 15:03:43 | INFO | jvm 1 | ... 3 more
2014/11/28 15:03:43 | INFO | jvm 1 | Caused by: java.security.NoSuchAlgorithmException: no such algorithm: SunTls12MasterSecret for provider SunPKCS11-NSSfips
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.jca.GetInstance.getService(GetInstance.java:100)
2014/11/28 15:03:43 | INFO | jvm 1 | at javax.crypto.JceSecurity.getInstance(JceSecurity.java:109)
2014/11/28 15:03:43 | INFO | jvm 1 | at javax.crypto.KeyGenerator.getInstance(KeyGenerator.java:287)
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.ssl.JsseJce.getKeyGenerator(JsseJce.java:269)
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.ssl.Handshaker.calculateMasterSecret(Handshaker.java:1052)
2014/11/28 15:03:43 | INFO | jvm 1 | ... 10 more
2014/11/28 15:03:43 | INFO | jvm 1 |
2014/11/28 15:03:43 | INFO | jvm 1 | Thread-601, called close()
2014/11/28 15:03:43 | INFO | jvm 1 | Thread-601, called closeInternal(true)
2014/11/28 15:03:43 | INFO | jvm 1 | Allow unsafe renegotiation: false
2014/11/28 15:03:43 | INFO | jvm 1 | Allow legacy hello messages: true
2014/11/28 15:03:43 | INFO | jvm 1 | Is initial handshake: true
2014/11/28 15:03:43 | INFO | jvm 1 | Is secure renegotiation: false
2014/11/28 15:03:43 | INFO | jvm 1 | Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 for TLSv1
2014/11/28 15:03:43 | INFO | jvm 1 | Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 for TLSv1
2014/11/28 15:03:43 | INFO | jvm 1 | Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256 for TLSv1
2014/11/28 15:03:43 | INFO | jvm 1 | Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256 for TLSv1
2014/11/28 15:03:43 | INFO | jvm 1 | Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 for TLSv1
2014/11/28 15:03:43 | INFO | jvm 1 | Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 for TLSv1
2014/11/28 15:03:43 | INFO | jvm 1 | Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 for TLSv1.1
2014/11/28 15:03:43 | INFO | jvm 1 | Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 for TLSv1.1
2014/11/28 15:03:43 | INFO | jvm 1 | Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256 for TLSv1.1
2014/11/28 15:03:43 | INFO | jvm 1 | Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256 for TLSv1.1
2014/11/28 15:03:43 | INFO | jvm 1 | Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 for TLSv1.1
2014/11/28 15:03:43 | INFO | jvm 1 | Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 for TLSv1.1
2014/11/28 15:03:43 | INFO | jvm 1 | qtp1981883520-744, READ: TLSv1.1 Alert, length = 48
2014/11/28 15:03:43 | INFO | jvm 1 | qtp1981883520-744, RECV TLSv1.1 ALERT: warning, close_notify
2014/11/28 15:03:43 | INFO | jvm 1 | qtp1981883520-744, closeInboundInternal()
2014/11/28 15:03:43 | INFO | jvm 1 | qtp1981883520-744, closeOutboundInternal()
2014/11/28 15:03:43 | INFO | jvm 1 | qtp1981883520-744, SEND TLSv1.1 ALERT: warning, description = close_notify
2014/11/28 15:03:43 | INFO | jvm 1 | qtp1981883520-744, WRITE: TLSv1.1 Alert, length = 48
2014/11/28 15:03:44 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
2014/11/28 15:03:44 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA
2014/11/28 15:03:44 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA
2014/11/28 15:03:44 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256
2014/11/28 15:03:44 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256
2014/11/28 15:03:44 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
2014/11/28 15:03:44 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
2014/11/28 15:03:44 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384
2014/11/28 15:03:44 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA
2014/11/28 15:03:44 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384
2014/11/28 15:03:44 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
2014/11/28 15:03:44 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA
2014/11/28 15:03:44 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA
2014/11/28 15:03:44 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384
2014/11/28 15:03:46 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
2014/11/28 15:03:46 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA
2014/11/28 15:03:46 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA
2014/11/28 15:03:46 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256
2014/11/28 15:03:46 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256
2014/11/28 15:03:46 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
2014/11/28 15:03:46 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
2014/11/28 15:03:46 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384
2014/11/28 15:03:46 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA
2014/11/28 15:03:46 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384
2014/11/28 15:03:46 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
2014/11/28 15:03:46 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA
2014/11/28 15:03:46 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA
2014/11/28 15:03:46 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384
2014/11/28 15:03:47 | INFO | jvm 1 | Thread-31, handling exception: java.net.SocketException: Connection reset
2014/11/28 15:03:47 | INFO | jvm 1 | Thread-31, SEND TLSv1 ALERT: fatal, description = unexpected_message
2014/11/28 15:03:47 | INFO | jvm 1 | Thread-31, WRITE: TLSv1 Alert, length = 2
2014/11/28 15:03:47 | INFO | jvm 1 | Thread-31, Exception sending alert: java.net.SocketException: Broken pipe
2014/11/28 15:03:47 | INFO | jvm 1 | Thread-31, called closeSocket()
2014/11/28 15:03:47 | INFO | jvm 1 | Thread-31, IOException in getSession(): java.net.SocketException: Connection reset
2014/11/28 15:03:47 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
2014/11/28 15:03:47 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA
2014/11/28 15:03:47 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA
2014/11/28 15:03:47 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256
2014/11/28 15:03:47 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256
2014/11/28 15:03:47 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
2014/11/28 15:03:47 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
2014/11/28 15:03:47 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384
2014/11/28 15:03:47 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA
2014/11/28 15:03:47 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384
2014/11/28 15:03:47 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
2014/11/28 15:03:47 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA
2014/11/28 15:03:47 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA
2014/11/28 15:03:47 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384
2014/11/28 15:03:47 | INFO | jvm 1 | Fri Nov 28 15:03:47 IST 2014|WARNING|Thread-603|ccs.comp.clientproxy.ProxiedClientListener$ProxyConnection.run
2014/11/28 15:03:47 | INFO | jvm 1 | Error processing requests from proxied client : unestablished
2014/11/28 15:03:47 | INFO | jvm 1 | Caused by: java.net.SocketException: Connection reset (javax.net.ssl.SSLException); Root cause: Connection reset (java.net.SocketException)
2014/11/28 15:03:47 | INFO | jvm 1 | javax.net.ssl.SSLException: Connection has been shutdown: javax.net.ssl.SSLException: java.net.SocketException: Connection reset
2014/11/28 15:03:47 | INFO | jvm 1 | at sun.security.ssl.SSLSocketImpl.checkEOF(SSLSocketImpl.java:1476)
2014/11/28 15:03:47 | INFO | jvm 1 | at sun.security.ssl.AppInputStream.read(AppInputStream.java:92)
2014/11/28 15:03:47 | INFO | jvm 1 | at sun.security.ssl.AppInputStream.read(AppInputStream.java:69)
2014/11/28 15:03:47 | INFO | jvm 1 | at java.io.DataInputStream.readByte(DataInputStream.java:265)
2014/11/28 15:03:47 | INFO | jvm 1 | at ccs.comp.clientproxy.ProxiedClientListener$ProxyConnection.getNext(ProxiedClientListener.java:438)
2014/11/28 15:03:47 | INFO | jvm 1 | at ccs.comp.clientproxy.ProxiedClientListener$ProxyConnection.run(ProxiedClientListener.java:245)
2014/11/28 15:03:47 | INFO | jvm 1 | Caused by: javax.net.ssl.SSLException: java.net.SocketException: Connection reset
2014/11/28 15:03:47 | INFO | jvm 1 | at sun.security.ssl.Alerts.getSSLException(Alerts.java:208)
2014/11/28 15:03:47 | INFO | jvm 1 | at sun.security.ssl.SSLSocketImpl.fatal(SSLSocketImpl.java:1884)
2014/11/28 15:03:47 | INFO | jvm 1 | at sun.security.ssl.SSLSocketImpl.fatal(SSLSocketImpl.java:1842)
2014/11/28 15:03:47 | INFO | jvm 1 | at sun.security.ssl.SSLSocketImpl.handleException(SSLSocketImpl.java:1806)
2014/11/28 15:03:47 | INFO | jvm 1 | at sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:1346)
2014/11/28 15:03:47 | INFO | jvm 1 | at sun.security.ssl.SSLSocketImpl.getSession(SSLSocketImpl.java:2171)
2014/11/28 15:03:47 | INFO | jvm 1 | at ccs.comp.clientproxy.ProxiedClientListener.listen(ProxiedClientListener.java:126)
2014/11/28 15:03:47 | INFO | jvm 1 | at ccs.comp.clientproxy.ProxiedClientListener.run(ProxiedClientListener.java:105)
2014/11/28 15:03:47 | INFO | jvm 1 | Caused by: java.net.SocketException: Connection reset
2014/11/28 15:03:47 | INFO | jvm 1 | at java.net.SocketInputStream.read(SocketInputStream.java:196)
2014/11/28 15:03:47 | INFO | jvm 1 | at java.net.SocketInputStream.read(SocketInputStream.java:122)
2014/11/28 15:03:47 | INFO | jvm 1 | at sun.security.ssl.InputRecord.readFully(InputRecord.java:442)
2014/11/28 15:03:47 | INFO | jvm 1 | at sun.security.ssl.InputRecord.read(InputRecord.java:480)
2014/11/28 15:03:47 | INFO | jvm 1 | at sun.security.ssl.SSLSocketImpl.readRecord(SSLSocketImpl.java:927)
2014/11/28 15:03:47 | INFO | jvm 1 | at sun.security.ssl.SSLSocketImpl.performInitialHandshake(SSLSocketImpl.java:1312)
2014/11/28 15:03:47 | INFO | jvm 1 | at sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:1339)
2014/11/28 15:03:47 | INFO | jvm 1 | ... 3 more
2014/11/28 15:03:47 | INFO | jvm 1 |
2014/11/28 15:03:47 | INFO | jvm 1 | Fri Nov 28 15:03:47 IST 2014|SEVERE|Thread-603|Could not determine class.Could not determine method
2014/11/28 15:03:47 | INFO | jvm 1 |
2014/11/28 15:03:47 | INFO | jvm 1 | Caused by: java.net.SocketException: Connection reset (javax.net.ssl.SSLException); Root cause: Connection reset (java.net.SocketException)
2014/11/28 15:03:47 | INFO | jvm 1 | javax.net.ssl.SSLException: Connection has been shutdown: javax.net.ssl.SSLException: java.net.SocketException: Connection reset
2014/11/28 15:03:47 | INFO | jvm 1 | at sun.security.ssl.SSLSocketImpl.checkEOF(SSLSocketImpl.java:1476)
2014/11/28 15:03:47 | INFO | jvm 1 | at sun.security.ssl.AppInputStream.read(AppInputStream.java:92)
2014/11/28 15:03:47 | INFO | jvm 1 | at sun.security.ssl.AppInputStream.read(AppInputStream.java:69)
2014/11/28 15:03:47 | INFO | jvm 1 | at java.io.DataInputStream.readByte(DataInputStream.java:265)
2014/11/28 15:03:47 | INFO | jvm 1 | at ccs.comp.clientproxy.ProxiedClientListener$ProxyConnection.getNext(ProxiedClientListener.java:438)
2014/11/28 15:03:47 | INFO | jvm 1 | at ccs.comp.clientproxy.ProxiedClientListener$ProxyConnection.run(ProxiedClientListener.java:245)
2014/11/28 15:03:47 | INFO | jvm 1 | Caused by: javax.net.ssl.SSLException: java.net.SocketException: Connection reset
2014/11/28 15:03:47 | INFO | jvm 1 | at sun.security.ssl.Alerts.getSSLException(Alerts.java:208)
2014/11/28 15:03:47 | INFO | jvm 1 | at sun.security.ssl.SSLSocketImpl.fatal(SSLSocketImpl.java:1884)
2014/11/28 15:03:47 | INFO | jvm 1 | at sun.security.ssl.SSLSocketImpl.fatal(SSLSocketImpl.java:1842)
2014/11/28 15:03:47 | INFO | jvm 1 | at sun.security.ssl.SSLSocketImpl.handleException(SSLSocketImpl.java:1806)
2014/11/28 15:03:47 | INFO | jvm 1 | at sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:1346)
2014/11/28 15:03:47 | INFO | jvm 1 | at sun.security.ssl.SSLSocketImpl.getSession(SSLSocketImpl.java:2171)
2014/11/28 15:03:47 | INFO | jvm 1 | at ccs.comp.clientproxy.ProxiedClientListener.listen(ProxiedClientListener.java:126)
2014/11/28 15:03:47 | INFO | jvm 1 | at ccs.comp.clientproxy.ProxiedClientListener.run(ProxiedClientListener.java:105)
2014/11/28 15:03:47 | INFO | jvm 1 | Caused by: java.net.SocketException: Connection reset
2014/11/28 15:03:47 | INFO | jvm 1 | at java.net.SocketInputStream.read(SocketInputStream.java:196)
2014/11/28 15:03:47 | INFO | jvm 1 | at java.net.SocketInputStream.read(SocketInputStream.java:122)
2014/11/28 15:03:47 | INFO | jvm 1 | at sun.security.ssl.InputRecord.readFully(InputRecord.java:442)
2014/11/28 15:03:47 | INFO | jvm 1 | at sun.security.ssl.InputRecord.read(InputRecord.java:480)
2014/11/28 15:03:47 | INFO | jvm 1 | at sun.security.ssl.SSLSocketImpl.readRecord(SSLSocketImpl.java:927)
2014/11/28 15:03:47 | INFO | jvm 1 | at sun.security.ssl.SSLSocketImpl.performInitialHandshake(SSLSocketImpl.java:1312)
2014/11/28 15:03:47 | INFO | jvm 1 | at sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:1339)
2014/11/28 15:03:47 | INFO | jvm 1 | ... 3 more
2014/11/28 15:03:47 | INFO | jvm 1 |
2014/11/28 15:03:47 | INFO | jvm 1 | Thread-603, called close()
2014/11/28 15:03:47 | INFO | jvm 1 | Thread-603, called closeInternal(true)
2014/11/28 15:03:47 | INFO | jvm 1 | at java.io.DataInputStream.readByte(DataInputStream.java:265)
2014/11/28 15:03:47 | INFO | jvm 1 | at ccs.comp.clientproxy.ProxiedClientListener$ProxyConnection.getNext(ProxiedClientListener.java:438)
2014/11/28 15:03:47 | INFO | jvm 1 | at ccs.comp.clientproxy.ProxiedClientListener$ProxyConnection.run(ProxiedClientListener.java:245)
2014/11/28 15:03:47 | INFO | jvm 1 | Caused by: javax.net.ssl.SSLException: java.net.SocketException: Connection reset
2014/11/28 15:03:47 | INFO | jvm 1 | at sun.security.ssl.Alerts.getSSLException(Alerts.java:208)
2014/11/28 15:03:47 | INFO | jvm 1 | at sun.security.ssl.SSLSocketImpl.fatal(SSLSocketImpl.java:1884)
2014/11/28 15:03:47 | INFO | jvm 1 | at sun.security.ssl.SSLSocketImpl.fatal(SSLSocketImpl.java:1842)
2014/11/28 15:03:47 | INFO | jvm 1 | at sun.security.ssl.SSLSocketImpl.handleException(SSLSocketImpl.java:1806)
2014/11/28 15:03:47 | INFO | jvm 1 | at sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:1346)
2014/11/28 15:03:47 | INFO | jvm 1 | at sun.security.ssl.SSLSocketImpl.getSession(SSLSocketImpl.java:2171)
2014/11/28 15:03:47 | INFO | jvm 1 | at ccs.comp.clientproxy.ProxiedClientListener.listen(ProxiedClientListener.java:126)
2014/11/28 15:03:47 | INFO | jvm 1 | at ccs.comp.clientproxy.ProxiedClientListener.run(ProxiedClientListener.java:105)
2014/11/28 15:03:47 | INFO | jvm 1 | Caused by: java.net.SocketException: Connection reset
2014/11/28 15:03:47 | INFO | jvm 1 | at java.net.SocketInputStream.read(SocketInputStream.java:196)
2014/11/28 15:03:47 | INFO | jvm 1 | at java.net.SocketInputStream.read(SocketInputStream.java:122)
2014/11/28 15:03:47 | INFO | jvm 1 | at sun.security.ssl.InputRecord.readFully(InputRecord.java:442)
2014/11/28 15:03:47 | INFO | jvm 1 | at sun.security.ssl.InputRecord.read(InputRecord.java:480)
2014/11/28 15:03:47 | INFO | jvm 1 | at sun.security.ssl.SSLSocketImpl.readRecord(SSLSocketImpl.java:927)
2014/11/28 15:03:47 | INFO | jvm 1 | at sun.security.ssl.SSLSocketImpl.performInitialHandshake(SSLSocketImpl.java:1312)
2014/11/28 15:03:47 | INFO | jvm 1 | at sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:1339)
2014/11/28 15:03:47 | INFO | jvm 1 | ... 3 more
2014/11/28 15:03:47 | INFO | jvm 1 |
2014/11/28 15:03:47 | INFO | jvm 1 | Fri Nov 28 15:03:47 IST 2014|SEVERE|Thread-603|Could not determine class.Could not determine method
2014/11/28 15:03:47 | INFO | jvm 1 |
2014/11/28 15:03:47 | INFO | jvm 1 | Caused by: java.net.SocketException: Connection reset (javax.net.ssl.SSLException); Root cause: Connection reset (java.net.SocketException)
2014/11/28 15:03:47 | INFO | jvm 1 | javax.net.ssl.SSLException: Connection has been shutdown: javax.net.ssl.SSLException: java.net.SocketException: Connection reset
2014/11/28 15:03:47 | INFO | jvm 1 | at sun.security.ssl.SSLSocketImpl.checkEOF(SSLSocketImpl.java:1476)
2014/11/28 15:03:47 | INFO | jvm 1 | at sun.security.ssl.AppInputStream.read(AppInputStream.java:92)
2014/11/28 15:03:47 | INFO | jvm 1 | at sun.security.ssl.AppInputStream.read(AppInputStream.java:69)
2014/11/28 15:03:47 | INFO | jvm 1 | at java.io.DataInputStream.readByte(DataInputStream.java:265)
2014/11/28 15:03:47 | INFO | jvm 1 | at ccs.comp.clientproxy.ProxiedClientListener$ProxyConnection.getNext(ProxiedClientListener.java:438)
2014/11/28 15:03:47 | INFO | jvm 1 | at ccs.comp.clientproxy.ProxiedClientListener$ProxyConnection.run(ProxiedClientListener.java:245)
2014/11/28 15:03:47 | INFO | jvm 1 | Caused by: javax.net.ssl.SSLException: java.net.SocketException: Connection reset
2014/11/28 15:03:47 | INFO | jvm 1 | at sun.security.ssl.Alerts.getSSLException(Alerts.java:208)
2014/11/28 15:03:47 | INFO | jvm 1 | at sun.security.ssl.SSLSocketImpl.fatal(SSLSocketImpl.java:1884)
2014/11/28 15:03:47 | INFO | jvm 1 | at sun.security.ssl.SSLSocketImpl.fatal(SSLSocketImpl.java:1842)
2014/11/28 15:03:47 | INFO | jvm 1 | at sun.security.ssl.SSLSocketImpl.handleException(SSLSocketImpl.java:1806)
2014/11/28 15:03:47 | INFO | jvm 1 | at sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:1346)
2014/11/28 15:03:47 | INFO | jvm 1 | at sun.security.ssl.SSLSocketImpl.getSession(SSLSocketImpl.java:2171)
2014/11/28 15:03:47 | INFO | jvm 1 | at ccs.comp.clientproxy.ProxiedClientListener.listen(ProxiedClientListener.java:126)
2014/11/28 15:03:47 | INFO | jvm 1 | at ccs.comp.clientproxy.ProxiedClientListener.run(ProxiedClientListener.java:105)
2014/11/28 15:03:47 | INFO | jvm 1 | Caused by: java.net.SocketException: Connection reset
2014/11/28 15:03:47 | INFO | jvm 1 | at java.net.SocketInputStream.read(SocketInputStream.java:196)
2014/11/28 15:03:47 | INFO | jvm 1 | at java.net.SocketInputStream.read(SocketInputStream.java:122)
2014/11/28 15:03:47 | INFO | jvm 1 | at sun.security.ssl.InputRecord.readFully(InputRecord.java:442)
2014/11/28 15:03:47 | INFO | jvm 1 | at sun.security.ssl.InputRecord.read(InputRecord.java:480)
2014/11/28 15:03:47 | INFO | jvm 1 | at sun.security.ssl.SSLSocketImpl.readRecord(SSLSocketImpl.java:927)
2014/11/28 15:03:47 | INFO | jvm 1 | at sun.security.ssl.SSLSocketImpl.performInitialHandshake(SSLSocketImpl.java:1312)
2014/11/28 15:03:47 | INFO | jvm 1 | at sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:1339)
2014/11/28 15:03:47 | INFO | jvm 1 | ... 3 more
2014/11/28 15:03:47 | INFO | jvm 1 |
2014/11/28 15:03:47 | INFO | jvm 1 | Thread-603, called close()
2014/11/28 15:03:47 | INFO | jvm 1 | Thread-603, called closeInternal(true)
REPRODUCIBILITY :
This bug can be reproduced always.
CUSTOMER SUBMITTED WORKAROUND :
One of the workarounds for this issue is to use Java 1.7u72 in the client with "TLS 1.2 disabled" in the Java Control Panel of the client machine. But this is not ideal since Java 1.7u72 is an older version.
Client JRE version:
---------------------------
java version "1.8.0_25"
Java(TM) SE Runtime Environment (build 1.8.0_25-b18)
Java HotSpot(TM) 64-Bit Server VM (build 25.25-b02, mixed mode)
Server JRE version:
----------------------------
java version "1.7.0_45"
Java(TM) SE Runtime Environment (build 1.7.0_45-b18)
Java HotSpot(TM) 64-Bit Server VM (build 24.45-b08, mixed mode)
ADDITIONAL OS VERSION INFORMATION :
Client OS:
---------------
* Windows 7 Professional SP1
* Microsoft Windows [Version 6.1.7601]
Server OS:
----------------
* SLES 11 SP3 (SuSE Linux Enterprise Server)
* Linux sentinel-dev-05 3.0.76-0.11-default #1 SMP Fri Jun 14 08:21:43 UTC 2013 (ccab990) x86_64 x86_64 x86_64 GNU/Linux
A DESCRIPTION OF THE PROBLEM :
The SSL / TLS handshake between a "Java 1.7 TLS 1.1 server" and a "Java 1.8 client" fails in my environment with the following exception on the server side:
java.security.NoSuchAlgorithmException: no such algorithm: SunTls12MasterSecret for provider SunPKCS11-NSSfips
Following are the details of the server and the client in my environment:
Server:
-----------
* The server uses Java 1.7u45 and is running in FIPS 140 compliant mode as mentioned in http://docs.oracle.com/javase/7/docs/technotes/guides/security/jsse/FIPS.html.
* The server uses Mozilla Network Security Services (NSS) version 3.14.3 as the cryptographic provider.
* The server is running on SLES 11 SP3 (SuSE Linux Enterprise Server) operating system and uses the following NSS RPMS provided by the OS:
* mozilla-nss-3.14.3-0.11.11
* mozilla-nss-tools-3.14.3-0.11.11
* mozilla-nspr-4.9.6-0.3.1
* libfreebl3-3.14.3-0.11.11
* libsoftokn3-3.14.3-0.11.11
* An important point to note is that NSS version 3.14.3 DOES NOT support TLS 1.2.
* The server uses Java 1.7u45 because of the Java bug "8028192 Use of PKCS11-NSS provider in FIPS mode broken" introduced in Java 1.7u51. See "Known Issues" section "Area: security-libs/javax.net.ssl" in http://www.oracle.com/technetwork/java/javase/7u51-relnotes-2085002.html for more details.
Client:
----------
* The client is a Java Swing based client application which is launched using Java Web Start.
* The client uses Java 1.8u25 and is running on Windows 7 Professional SP1 operating system.
* Since the server does not support TLS 1.2, TLS 1.2 has been disabled in the client side in the "Advanced" tab of the Java Control Panel as mentioned in https://docs.oracle.com/javase/8/docs/technotes/guides/deploy/jcp.html#A1153011.
Issue:
---------
* Since the server does not support TLS 1.2, I disabled TLS 1.2 on the client side.
* Issue is that the handshake fails "even after" disabling TLS 1.2 on the client side.
Additional observations:
----------------------------------
* The same scenario works fine if Java 1.7 (any version) is used and TLS 1.2 is disabled on the client side.
* The same exception "java.security.NoSuchAlgorithmException: no such algorithm: SunTls12MasterSecret for provider SunPKCS11-NSSfips" is thrown in the server side if Java 1.7 (any version) is used and TLS 1.2 is enabled in the client side.
* It fails if Java 1.8 (any version) is used in the client side, even after disabling TLS 1.2.
Server side SSL debug logs:
----------------------------------------
* It seems that the handshake is first initiated with TLS 1.1 using the cipher TLS_RSA_WITH_AES_128_CBC_SHA.
* After this, for some reason, the handshake is re-initiated with TLS 1.2 using the cipher TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 which fails with the exception "java.security.NoSuchAlgorithmException: no such algorithm: SunTls12MasterSecret for provider SunPKCS11-NSSfips".
* See "Error Message(s)" section for detailed SSL debug logs.
REGRESSION. Last worked in version 7u72
ADDITIONAL REGRESSION INFORMATION:
It was working with the following JRE versions in the client and the server:
Client JRE version:
---------------------------
java version "1.7.0_72"
Java(TM) SE Runtime Environment (build 1.7.0_72-b14)
Java HotSpot(TM) 64-Bit Server VM (build 24.72-b04, mixed mode)
Server JRE version:
----------------------------
java version "1.7.0_45"
Java(TM) SE Runtime Environment (build 1.7.0_45-b18)
Java HotSpot(TM) 64-Bit Server VM (build 24.45-b08, mixed mode)
EXPECTED VERSUS ACTUAL BEHAVIOR :
EXPECTED -
* With Java 1.7 u72 on the client side, the TLS handshake worked fine if TLS 1.2 is disabled in the Java Control Panel in the client machine.
* Similarly, with Java 1.8u25 on the client side, it is expected that the TLS handshake will work fine if TLS 1.2 is disabled in the Java Control Panel in the client machine.
ACTUAL -
With Java 1.8u25 on the client side, the TLS handshake fails even if TLS 1.2 is disabled in the Java Control Panel in the client machine.
ERROR MESSAGES/STACK TRACES THAT OCCUR :
Server side SSL debug logs:
=======================
Server TLS 1.1 Java 1.7u45 + Client Java 1.7u72 "TLS 1.2 disabled" - works:
============================================================
2014/12/01 13:21:01 | INFO | jvm 1 | *** ClientHello, TLSv1
2014/12/01 13:21:01 | INFO | jvm 1 | RandomCookie: GMT: 1417420005 bytes = { 182, 127, 131, 236, 1, 250, 57, 121, 183, 198, 221, 74, 140, 57, 181, 52, 147, 229, 192, 226, 0, 75, 213, 197, 142, 176, 144, 102 }
2014/12/01 13:21:01 | INFO | jvm 1 | Session ID: {84, 124, 28, 199, 170, 182, 64, 91, 37, 151, 80, 102, 223, 64, 21, 30, 57, 160, 79, 40, 52, 118, 169, 75, 23, 147, 96, 114, 95, 74, 105, 36}
2014/12/01 13:21:01 | INFO | jvm 1 | Cipher Suites: [TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, TLS_EMPTY_RENEGOTIATION_INFO_SCSV]
2014/12/01 13:21:01 | INFO | jvm 1 | Compression Methods: { 0 }
2014/12/01 13:21:01 | INFO | jvm 1 | Extension elliptic_curves, curve names: {secp256r1, sect163k1, sect163r2, secp192r1, secp224r1, sect233k1, sect233r1, sect283k1, sect283r1, secp384r1, sect409k1, sect409r1, secp521r1, sect571k1, sect571r1}
2014/12/01 13:21:01 | INFO | jvm 1 | Extension ec_point_formats, formats: [uncompressed]
2014/12/01 13:21:01 | INFO | jvm 1 | ***
2014/12/01 13:21:01 | INFO | jvm 1 | %% Resuming [Session-236, TLS_RSA_WITH_AES_128_CBC_SHA]
2014/12/01 13:21:01 | INFO | jvm 1 | *** ServerHello, TLSv1
2014/12/01 13:21:01 | INFO | jvm 1 | RandomCookie: GMT: 1417420005 bytes = { 176, 222, 143, 54, 186, 6, 117, 144, 98, 121, 120, 235, 91, 6, 71, 80, 97, 233, 53, 250, 34, 73, 90, 155, 201, 44, 94, 2 }
2014/12/01 13:21:01 | INFO | jvm 1 | Session ID: {84, 124, 28, 199, 170, 182, 64, 91, 37, 151, 80, 102, 223, 64, 21, 30, 57, 160, 79, 40, 52, 118, 169, 75, 23, 147, 96, 114, 95, 74, 105, 36}
2014/12/01 13:21:01 | INFO | jvm 1 | Cipher Suite: TLS_RSA_WITH_AES_128_CBC_SHA
2014/12/01 13:21:01 | INFO | jvm 1 | Compression Method: 0
2014/12/01 13:21:01 | INFO | jvm 1 | Extension renegotiation_info, renegotiated_connection: <empty>
2014/12/01 13:21:01 | INFO | jvm 1 | ***
2014/12/01 13:21:01 | INFO | jvm 1 | Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA
2014/12/01 13:21:01 | INFO | jvm 1 | CONNECTION KEYGEN:
2014/12/01 13:21:01 | INFO | jvm 1 | Client Nonce:
2014/12/01 13:21:01 | INFO | jvm 1 | 0000: 54 7C 1D E5 B6 7F 83 EC 01 FA 39 79 B7 C6 DD 4A T.........9y...J
2014/12/01 13:21:01 | INFO | jvm 1 | 0010: 8C 39 B5 34 93 E5 C0 E2 00 4B D5 C5 8E B0 90 66 .9.4.....K.....f
2014/12/01 13:21:01 | INFO | jvm 1 | Server Nonce:
2014/12/01 13:21:01 | INFO | jvm 1 | 0000: 54 7C 1D E5 B0 DE 8F 36 BA 06 75 90 62 79 78 EB T......6..u.byx.
2014/12/01 13:21:01 | INFO | jvm 1 | 0010: 5B 06 47 50 61 E9 35 FA 22 49 5A 9B C9 2C 5E 02 [.GPa.5."IZ..,^.
2014/12/01 13:21:01 | INFO | jvm 1 | Master Secret:
2014/12/01 13:21:01 | INFO | jvm 1 | (key bytes not available)
2014/12/01 13:21:01 | INFO | jvm 1 | Client MAC write Secret:
2014/12/01 13:21:01 | INFO | jvm 1 | (key bytes not available)
2014/12/01 13:21:01 | INFO | jvm 1 | Server MAC write Secret:
2014/12/01 13:21:01 | INFO | jvm 1 | (key bytes not available)
2014/12/01 13:21:01 | INFO | jvm 1 | Client write key:
2014/12/01 13:21:01 | INFO | jvm 1 | (key bytes not available)
2014/12/01 13:21:01 | INFO | jvm 1 | Server write key:
2014/12/01 13:21:01 | INFO | jvm 1 | (key bytes not available)
2014/12/01 13:21:01 | INFO | jvm 1 | Client write IV:
2014/12/01 13:21:01 | INFO | jvm 1 | 0000: 9A A6 00 7E 3B 75 38 71 3F 5D AB 60 E7 6A 8A AB ....;u8q?].`.j..
2014/12/01 13:21:01 | INFO | jvm 1 | Server write IV:
2014/12/01 13:21:01 | INFO | jvm 1 | 0000: 22 28 85 D3 CB EC 1D 23 53 7B 55 8A C7 B9 50 FD "(.....#S.U...P.
2014/12/01 13:21:01 | INFO | jvm 1 | qtp1981883520-744, WRITE: TLSv1 Handshake, length = 81
2014/12/01 13:21:01 | INFO | jvm 1 | qtp1981883520-744, WRITE: TLSv1 Change Cipher Spec, length = 1
2014/12/01 13:21:01 | INFO | jvm 1 | *** Finished
2014/12/01 13:21:01 | INFO | jvm 1 | verify_data: { 145, 37, 85, 144, 215, 46, 162, 105, 169, 40, 17, 94 }
2014/12/01 13:21:01 | INFO | jvm 1 | ***
2014/12/01 13:21:01 | INFO | jvm 1 | qtp1981883520-744, WRITE: TLSv1 Handshake, length = 48
2014/12/01 13:21:01 | INFO | jvm 1 | qtp1981883520-964 - /RESTServices/objects/event-filter, READ: TLSv1 Handshake, length = 81
2014/12/01 13:21:01 | INFO | jvm 1 | *** ServerHello, TLSv1
2014/12/01 13:21:01 | INFO | jvm 1 | RandomCookie: GMT: 1417420005 bytes = { 176, 222, 143, 54, 186, 6, 117, 144, 98, 121, 120, 235, 91, 6, 71, 80, 97, 233, 53, 250, 34, 73, 90, 155, 201, 44, 94, 2 }
2014/12/01 13:21:01 | INFO | jvm 1 | Session ID: {84, 124, 28, 199, 170, 182, 64, 91, 37, 151, 80, 102, 223, 64, 21, 30, 57, 160, 79, 40, 52, 118, 169, 75, 23, 147, 96, 114, 95, 74, 105, 36}
2014/12/01 13:21:01 | INFO | jvm 1 | Cipher Suite: TLS_RSA_WITH_AES_128_CBC_SHA
2014/12/01 13:21:01 | INFO | jvm 1 | Compression Method: 0
2014/12/01 13:21:01 | INFO | jvm 1 | Extension renegotiation_info, renegotiated_connection: <empty>
2014/12/01 13:21:01 | INFO | jvm 1 | ***
2014/12/01 13:21:01 | INFO | jvm 1 | CONNECTION KEYGEN:
2014/12/01 13:21:01 | INFO | jvm 1 | Client Nonce:
2014/12/01 13:21:01 | INFO | jvm 1 | 0000: 54 7C 1D E5 B6 7F 83 EC 01 FA 39 79 B7 C6 DD 4A T.........9y...J
2014/12/01 13:21:01 | INFO | jvm 1 | 0010: 8C 39 B5 34 93 E5 C0 E2 00 4B D5 C5 8E B0 90 66 .9.4.....K.....f
2014/12/01 13:21:01 | INFO | jvm 1 | Server Nonce:
2014/12/01 13:21:01 | INFO | jvm 1 | 0000: 54 7C 1D E5 B0 DE 8F 36 BA 06 75 90 62 79 78 EB T......6..u.byx.
2014/12/01 13:21:01 | INFO | jvm 1 | 0010: 5B 06 47 50 61 E9 35 FA 22 49 5A 9B C9 2C 5E 02 [.GPa.5."IZ..,^.
2014/12/01 13:21:01 | INFO | jvm 1 | Master Secret:
2014/12/01 13:21:01 | INFO | jvm 1 | (key bytes not available)
2014/12/01 13:21:01 | INFO | jvm 1 | Client MAC write Secret:
2014/12/01 13:21:01 | INFO | jvm 1 | (key bytes not available)
2014/12/01 13:21:01 | INFO | jvm 1 | Server MAC write Secret:
2014/12/01 13:21:01 | INFO | jvm 1 | (key bytes not available)
2014/12/01 13:21:01 | INFO | jvm 1 | Client write key:
2014/12/01 13:21:01 | INFO | jvm 1 | (key bytes not available)
2014/12/01 13:21:01 | INFO | jvm 1 | Server write key:
2014/12/01 13:21:01 | INFO | jvm 1 | (key bytes not available)
2014/12/01 13:21:01 | INFO | jvm 1 | Client write IV:
2014/12/01 13:21:01 | INFO | jvm 1 | 0000: 9A A6 00 7E 3B 75 38 71 3F 5D AB 60 E7 6A 8A AB ....;u8q?].`.j..
2014/12/01 13:21:01 | INFO | jvm 1 | Server write IV:
2014/12/01 13:21:01 | INFO | jvm 1 | 0000: 22 28 85 D3 CB EC 1D 23 53 7B 55 8A C7 B9 50 FD "(.....#S.U...P.
2014/12/01 13:21:01 | INFO | jvm 1 | %% Server resumed [Session-237, TLS_RSA_WITH_AES_128_CBC_SHA]
2014/12/01 13:21:01 | INFO | jvm 1 | qtp1981883520-964 - /RESTServices/objects/event-filter, READ: TLSv1 Change Cipher Spec, length = 1
2014/12/01 13:21:01 | INFO | jvm 1 | qtp1981883520-964 - /RESTServices/objects/event-filter, READ: TLSv1 Handshake, length = 48
2014/12/01 13:21:01 | INFO | jvm 1 | *** Finished
2014/12/01 13:21:01 | INFO | jvm 1 | verify_data: { 145, 37, 85, 144, 215, 46, 162, 105, 169, 40, 17, 94 }
2014/12/01 13:21:01 | INFO | jvm 1 | ***
2014/12/01 13:21:01 | INFO | jvm 1 | qtp1981883520-964 - /RESTServices/objects/event-filter, WRITE: TLSv1 Change Cipher Spec, length = 1
2014/12/01 13:21:01 | INFO | jvm 1 | qtp1981883520-746, READ: TLSv1 Change Cipher Spec, length = 1
2014/12/01 13:21:01 | INFO | jvm 1 | *** Finished
2014/12/01 13:21:01 | INFO | jvm 1 | verify_data: { 146, 223, 228, 227, 40, 161, 188, 163, 136, 220, 130, 197 }
2014/12/01 13:21:01 | INFO | jvm 1 | ***
2014/12/01 13:21:01 | INFO | jvm 1 | qtp1981883520-964 - /RESTServices/objects/event-filter, WRITE: TLSv1 Handshake, length = 48
2014/12/01 13:21:01 | INFO | jvm 1 | qtp1981883520-300, READ: TLSv1 Handshake, length = 48
2014/12/01 13:21:01 | INFO | jvm 1 | *** Finished
2014/12/01 13:21:01 | INFO | jvm 1 | verify_data: { 146, 223, 228, 227, 40, 161, 188, 163, 136, 220, 130, 197 }
2014/12/01 13:21:01 | INFO | jvm 1 | ***
2014/12/01 13:21:01 | INFO | jvm 1 | qtp1981883520-964 - /RESTServices/objects/event-filter, WRITE: TLSv1 Application Data, length = 3280
2014/12/01 13:21:01 | INFO | jvm 1 | qtp1981883520-300 - /AuthServices/auth/tokens/1VpLk6LKEt77KwxnaTggavuI6T4BAooCiqAgmw6EAkp5KMVD%2BPUXdOzp6XncOfduhoURXUlW1leZSeaXtl%2F%2BufpeMwURgmHw3Op%2BxltNEJihBQPnubVV2M6o9c%2FLF2T4HjEhEQJRXCo2y00Bmtykz60kCiahgSCaBIYP0CQ2JzIp8BPiMz4xHltaTY5%2BbhljHDcIo9exuni%2F0%2B8OBp0RboLOaGgdeqNhb1h%2BSk2EEsAFKDaC%2BLlF4N1%2Bp0t08K6CDycDfNIffyaGQ73V3D1glye1HiBvm6OX11cEghgGwCOT2JVBVN7x9fUL9p3SFwtNZOgERpxE4OulLPTccuP4PMGwLMs%2BZ73PYeRgBI7jGD7GSh0LQedT66Xx2AwsLrDD%2B3pqBGEATcODhVHdWgCxG1pN0nPCCMau%2FwvTXayLV6Y74Gp2zG4%2F%2BNTCvh1wQ%2FeHlr4DGSGjg1yj%2BzC2ATaIyuiC5nbDPbc%2B%2FVE07luVyAiQHUY%2B%2BrD%2Bd4hAkAIvPAOrgx4Xe4D7c4s%2F8dbLF2BOuMD0EgRTIFZpeDZMgL7GFJh%2Fbqq5joANrzxEZe5ZqHlLmOYVlTi%2FYO9xlrCxn3iGhg5A8f8SrvehulvZGV4CXhQ3O2fsPlhepidrFo1Yc3yU8TE%2B0vfPNwjvle%2Bg3iL9df0xT9%2FS6usmZqElAJ%2Bp%2FHmuxgtaSKzMhgJdDLiZyjpcTBsJZauemvtsmIa0RPcZ0w6X3ZN%2BbLtPF2nJu7p%2Flbus3vUaqjxMpdxjtFCmeZ0%2BH%2Fjd9jJ72onzjGL3G8hmxz0ZeTOT7l7NYL%2BJtON2KRsHVoz2OG5jA26roLXC91CENQQRXbFCxJ7iTZdLePcQauiwGxyPqhtytNPfiUm7pxyIaS6Ye5Hb0cqMHQ7wFYHGx9RSlrmkx7iw83x5yzaUdDTsewVzwLqDvaFFHMQhMeiyKZOKK1vyTHq44rfMHixKM242fuKIYrDcDUfj6UJXk1XqsFtpOQ8kUXEbg%2FCJPm6kE6tAv9hBuwcidpeeM0cI2jmeFNfFJQqk5%2BdvEXjv8SoKS5DfQlL9rQ3wMW3ExttiWtVNu6wlMXgROI5eKNMp6RAOmXEU6XAMvVMGW4UUKed0cU9wNs5wipQQS9LUVNhwGUPu6Z0kLZnM6%2BnqotC1BaFr3LXB0%2BSFcsQdRQoK1xO9Q7A5H%2Fwd4tWNZ0E8E%2BUB2pcbeH%2BBTDhIDj3dO8yyZE%2BMY2FKarTC4ILC5KJCDhoCbXYFL9zTBXcVFKn8kFeBPmVisc3V4%2B%2BRfATS%2BFdIOI7ijh%2Bvz7AkuZqS0ohsVApTZ1kuGDKYq%2FRw4JGESkXygp31RAtA65BlQ4EUKDty5EiHG8eaaxKzWgnWSfPJtj8fC2PK79tto2EZJ38ZYMR6obMGcnukexYHcMqHmoqu6BiRu%2B0ayvN4z2xXzvBpkQZpjDObGa6Mc6QWonE6xxwNMkibXmOxZtYB4bThPjdJLRSPJh9u1NVQw85J7p5Hc4lMvZw%2FD6%2FmJQf7hM9P%2BmKYugkgZiQ1vqwh9HiccB2K3zQuo%2BPUwrnEOnp84i%2BCuRVzxrxPQ3jtnQtGl5PjgnVnArkjrdP1JGhTFUUxWeye%2BgkoYl25MBv5imerbSE1eJy2z8WqJ2quofZOg0sPK%2BDOOBoDlfJPG0r30rYq%2BCmXr2aFDtNextGkRFJhzmTzgrSqaM6lPsM60rbhTXvRsO0wWl%2FOk9Tw8t1RAVt5LZFmRkv7xTLUOTc1xTJAPCWRtOMwFEl7uhQ5%2FtjftHPEFPaMumAcZTei7mzh8wDRU9sI1Wms9s0NsdCO4pjn%2B%2F1zWvT5QlleCClVeT1L9dFx%2BISFc9bqufO%2BzxS9hc1jpGT5G8g0snEWHjeKFvUYc3Caj3BtzmddytcgTJ%2Be2uQW5YvUwXmVKpZzWiKS8yHHXLcwMHMh6jI6ojR3cAty6%2B6poc95FVpW7zwmNak3xDYs6M5l8zS31bmbnM7D8TDAYT8fHompzYrtU9uztfMVjpX5PPA2%2By05T1QKUocdTzaeRtFyCw%2FCetHz9vxTOwSHHVAPA3pNDIPjwRPsYmtw4exokLzBh9H8Mt7Ifj7iNQKnVpFKQHjQ1wEmamnQOEkcJbbt6SXEgTzl7r3iY2l5E96LD%2Fa%2BLH1Xtx78Sk4OR2DGj2XVazm6yZYN0Ih%2FzQW7n7s3CbQ69k11kgToDMwSBrBaL4blw%2BBBzu4mXx7LDwdOw8CCFbdCTTGMKVCaA78jiaXSKlhFpB2D6J0e8UEPeyO5JV0M5Lj0jV8SyO%2Bk5dExuP5UNvVKplt23ZffkmFzYlZ6pfjd7R%2F3%2FKm5nz38Xvgj1DiO4CGJwa%2BfNCsXP7c2oQdQ64entw71lTldf8WGu5gm8LLpAt9ovenC%2F67cgTdeb4JyF4KTOD%2BXQK7lLFEeHjitF7LKhJJ7RUYcRm8X%2FQ7ayw%2FiHyX%2Fh1fWIPIhqgaLv803KQQZZ1VjTZxXr%2Buv3PM3YfaNwHDKYc6EFXBUB8igrC%2FLIMw8YDmAMhCoA%2Bi7n6dhFAHvNnrWAfQtocuaFgWGx6R1yQ8UeknlYRpUQyz4ZZX6qzC7RgRuLt6VPq%2BFmy1wSJw6AK2yuHb1Iip7oAXLVlir0hyA2PbCbB2FaQm6Fm9elR10OTMeQiOyauFkq6RfMjAi0yVNE5zjOmC%2B1TcWemUvqYWPq6wQ78lcFyYHqu5BmrfRqw547%2BSiRsUtSoINOIdROa%2FSVB0A3znnFtXknYPo7l7hBrsWzeO1SuKNcasR1bT%2BWgfQ97SoV8%2B7YyY9ENWjVnzr0VwA44rH1QG1GYG6Mc7qBdwlXjnmGQfo1eiLlxsjuiV0bSa%2BytfVbwziuvjYKNlQCmrj33uRUwynFmhfb%2F8U%2BG3X%2Byj%2B7ffAj0ePX6S8%2FAc%3D, WRITE: TLSv1 Application Data, length = 179
2014/12/01 13:21:01 | INFO | jvm 1 | qtp1981883520-964 - /RESTServices/objects/event-filter, READ: TLSv1 Application Data, length = 208
2014/12/01 13:21:01 | INFO | jvm 1 | qtp1981883520-300 - /AuthServices/auth/tokens/1VpLk6LKEt77KwxnaTggavuI6T4BAooCiqAgmw6EAkp5KMVD%2BPUXdOzp6XncOfduhoURXUlW1leZSeaXtl%2F%2BufpeMwURgmHw3Op%2BxltNEJihBQPnubVV2M6o9c%2FLF2T4HjEhEQJRXCo2y00Bmtykz60kCiahgSCaBIYP0CQ2JzIp8BPiMz4xHltaTY5%2BbhljHDcIo9exuni%2F0%2B8OBp0RboLOaGgdeqNhb1h%2BSk2EEsAFKDaC%2BLlF4N1%2Bp0t08K6CDycDfNIffyaGQ73V3D1glye1HiBvm6OX11cEghgGwCOT2JVBVN7x9fUL9p3SFwtNZOgERpxE4OulLPTccuP4PMGwLMs%2BZ73PYeRgBI7jGD7GSh0LQedT66Xx2AwsLrDD%2B3pqBGEATcODhVHdWgCxG1pN0nPCCMau%2FwvTXayLV6Y74Gp2zG4%2F%2BNTCvh1wQ%2FeHlr4DGSGjg1yj%2BzC2ATaIyuiC5nbDPbc%2B%2FVE07luVyAiQHUY%2B%2BrD%2Bd4hAkAIvPAOrgx4Xe4D7c4s%2F8dbLF2BOuMD0EgRTIFZpeDZMgL7GFJh%2Fbqq5joANrzxEZe5ZqHlLmOYVlTi%2FYO9xlrCxn3iGhg5A8f8SrvehulvZGV4CXhQ3O2fsPlhepidrFo1Yc3yU8TE%2B0vfPNwjvle%2Bg3iL9df0xT9%2FS6usmZqElAJ%2Bp%2FHmuxgtaSKzMhgJdDLiZyjpcTBsJZauemvtsmIa0RPcZ0w6X3ZN%2BbLtPF2nJu7p%2Flbus3vUaqjxMpdxjtFCmeZ0%2BH%2Fjd9jJ72onzjGL3G8hmxz0ZeTOT7l7NYL%2BJtON2KRsHVoz2OG5jA26roLXC91CENQQRXbFCxJ7iTZdLePcQauiwGxyPqhtytNPfiUm7pxyIaS6Ye5Hb0cqMHQ7wFYHGx9RSlrmkx7iw83x5yzaUdDTsewVzwLqDvaFFHMQhMeiyKZOKK1vyTHq44rfMHixKM242fuKIYrDcDUfj6UJXk1XqsFtpOQ8kUXEbg%2FCJPm6kE6tAv9hBuwcidpeeM0cI2jmeFNfFJQqk5%2BdvEXjv8SoKS5DfQlL9rQ3wMW3ExttiWtVNu6wlMXgROI5eKNMp6RAOmXEU6XAMvVMGW4UUKed0cU9wNs5wipQQS9LUVNhwGUPu6Z0kLZnM6%2BnqotC1BaFr3LXB0%2BSFcsQdRQoK1xO9Q7A5H%2Fwd4tWNZ0E8E%2BUB2pcbeH%2BBTDhIDj3dO8yyZE%2BMY2FKarTC4ILC5KJCDhoCbXYFL9zTBXcVFKn8kFeBPmVisc3V4%2B%2BRfATS%2BFdIOI7ijh%2Bvz7AkuZqS0ohsVApTZ1kuGDKYq%2FRw4JGESkXygp31RAtA65BlQ4EUKDty5EiHG8eaaxKzWgnWSfPJtj8fC2PK79tto2EZJ38ZYMR6obMGcnukexYHcMqHmoqu6BiRu%2B0ayvN4z2xXzvBpkQZpjDObGa6Mc6QWonE6xxwNMkibXmOxZtYB4bThPjdJLRSPJh9u1NVQw85J7p5Hc4lMvZw%2FD6%2FmJQf7hM9P%2BmKYugkgZiQ1vqwh9HiccB2K3zQuo%2BPUwrnEOnp84i%2BCuRVzxrxPQ3jtnQtGl5PjgnVnArkjrdP1JGhTFUUxWeye%2BgkoYl25MBv5imerbSE1eJy2z8WqJ2quofZOg0sPK%2BDOOBoDlfJPG0r30rYq%2BCmXr2aFDtNextGkRFJhzmTzgrSqaM6lPsM60rbhTXvRsO0wWl%2FOk9Tw8t1RAVt5LZFmRkv7xTLUOTc1xTJAPCWRtOMwFEl7uhQ5%2FtjftHPEFPaMumAcZTei7mzh8wDRU9sI1Wms9s0NsdCO4pjn%2B%2F1zWvT5QlleCClVeT1L9dFx%2BISFc9bqufO%2BzxS9hc1jpGT5G8g0snEWHjeKFvUYc3Caj3BtzmddytcgTJ%2Be2uQW5YvUwXmVKpZzWiKS8yHHXLcwMHMh6jI6ojR3cAty6%2B6poc95FVpW7zwmNak3xDYs6M5l8zS31bmbnM7D8TDAYT8fHompzYrtU9uztfMVjpX5PPA2%2By05T1QKUocdTzaeRtFyCw%2FCetHz9vxTOwSHHVAPA3pNDIPjwRPsYmtw4exokLzBh9H8Mt7Ifj7iNQKnVpFKQHjQ1wEmamnQOEkcJbbt6SXEgTzl7r3iY2l5E96LD%2Fa%2BLH1Xtx78Sk4OR2DGj2XVazm6yZYN0Ih%2FzQW7n7s3CbQ69k11kgToDMwSBrBaL4blw%2BBBzu4mXx7LDwdOw8CCFbdCTTGMKVCaA78jiaXSKlhFpB2D6J0e8UEPeyO5JV0M5Lj0jV8SyO%2Bk5dExuP5UNvVKplt23ZffkmFzYlZ6pfjd7R%2F3%2FKm5nz38Xvgj1DiO4CGJwa%2BfNCsXP7c2oQdQ64entw71lTldf8WGu5gm8LLpAt9ovenC%2F67cgTdeb4JyF4KTOD%2BXQK7lLFEeHjitF7LKhJJ7RUYcRm8X%2FQ7ayw%2FiHyX%2Fh1fWIPIhqgaLv803KQQZZ1VjTZxXr%2Buv3PM3YfaNwHDKYc6EFXBUB8igrC%2FLIMw8YDmAMhCoA%2Bi7n6dhFAHvNnrWAfQtocuaFgWGx6R1yQ8UeknlYRpUQyz4ZZX6qzC7RgRuLt6VPq%2BFmy1wSJw6AK2yuHb1Iip7oAXLVlir0hyA2PbCbB2FaQm6Fm9elR10OTMeQiOyauFkq6RfMjAi0yVNE5zjOmC%2B1TcWemUvqYWPq6wQ78lcFyYHqu5BmrfRqw547%2BSiRsUtSoINOIdROa%2FSVB0A3znnFtXknYPo7l7hBrsWzeO1SuKNcasR1bT%2BWgfQ97SoV8%2B7YyY9ENWjVnzr0VwA44rH1QG1GYG6Mc7qBdwlXjnmGQfo1eiLlxsjuiV0bSa%2BytfVbwziuvjYKNlQCmrj33uRUwynFmhfb%2F8U%2BG3X%2Byj%2B7ffAj0ePX6S8%2FAc%3D, WRITE: TLSv1 Application Data, length = 1
2014/12/01 13:21:01 | INFO | jvm 1 | qtp1981883520-300 - /AuthServices/auth/tokens/1VpLk6LKEt77KwxnaTggavuI6T4BAooCiqAgmw6EAkp5KMVD%2BPUXdOzp6XncOfduhoURXUlW1leZSeaXtl%2F%2BufpeMwURgmHw3Op%2BxltNEJihBQPnubVV2M6o9c%2FLF2T4HjEhEQJRXCo2y00Bmtykz60kCiahgSCaBIYP0CQ2JzIp8BPiMz4xHltaTY5%2BbhljHDcIo9exuni%2F0%2B8OBp0RboLOaGgdeqNhb1h%2BSk2EEsAFKDaC%2BLlF4N1%2Bp0t08K6CDycDfNIffyaGQ73V3D1glye1HiBvm6OX11cEghgGwCOT2JVBVN7x9fUL9p3SFwtNZOgERpxE4OulLPTccuP4PMGwLMs%2BZ73PYeRgBI7jGD7GSh0LQedT66Xx2AwsLrDD%2B3pqBGEATcODhVHdWgCxG1pN0nPCCMau%2FwvTXayLV6Y74Gp2zG4%2F%2BNTCvh1wQ%2FeHlr4DGSGjg1yj%2BzC2ATaIyuiC5nbDPbc%2B%2FVE07luVyAiQHUY%2B%2BrD%2Bd4hAkAIvPAOrgx4Xe4D7c4s%2F8dbLF2BOuMD0EgRTIFZpeDZMgL7GFJh%2Fbqq5joANrzxEZe5ZqHlLmOYVlTi%2FYO9xlrCxn3iGhg5A8f8SrvehulvZGV4CXhQ3O2fsPlhepidrFo1Yc3yU8TE%2B0vfPNwjvle%2Bg3iL9df0xT9%2FS6usmZqElAJ%2Bp%2FHmuxgtaSKzMhgJdDLiZyjpcTBsJZauemvtsmIa0RPcZ0w6X3ZN%2BbLtPF2nJu7p%2Flbus3vUaqjxMpdxjtFCmeZ0%2BH%2Fjd9jJ72onzjGL3G8hmxz0ZeTOT7l7NYL%2BJtON2KRsHVoz2OG5jA26roLXC91CENQQRXbFCxJ7iTZdLePcQauiwGxyPqhtytNPfiUm7pxyIaS6Ye5Hb0cqMHQ7wFYHGx9RSlrmkx7iw83x5yzaUdDTsewVzwLqDvaFFHMQhMeiyKZOKK1vyTHq44rfMHixKM242fuKIYrDcDUfj6UJXk1XqsFtpOQ8kUXEbg%2FCJPm6kE6tAv9hBuwcidpeeM0cI2jmeFNfFJQqk5%2BdvEXjv8SoKS5DfQlL9rQ3wMW3ExttiWtVNu6wlMXgROI5eKNMp6RAOmXEU6XAMvVMGW4UUKed0cU9wNs5wipQQS9LUVNhwGUPu6Z0kLZnM6%2BnqotC1BaFr3LXB0%2BSFcsQdRQoK1xO9Q7A5H%2Fwd4tWNZ0E8E%2BUB2pcbeH%2BBTDhIDj3dO8yyZE%2BMY2FKarTC4ILC5KJCDhoCbXYFL9zTBXcVFKn8kFeBPmVisc3V4%2B%2BRfATS%2BFdIOI7ijh%2Bvz7AkuZqS0ohsVApTZ1kuGDKYq%2FRw4JGESkXygp31RAtA65BlQ4EUKDty5EiHG8eaaxKzWgnWSfPJtj8fC2PK79tto2EZJ38ZYMR6obMGcnukexYHcMqHmoqu6BiRu%2B0ayvN4z2xXzvBpkQZpjDObGa6Mc6QWonE6xxwNMkibXmOxZtYB4bThPjdJLRSPJh9u1NVQw85J7p5Hc4lMvZw%2FD6%2FmJQf7hM9P%2BmKYugkgZiQ1vqwh9HiccB2K3zQuo%2BPUwrnEOnp84i%2BCuRVzxrxPQ3jtnQtGl5PjgnVnArkjrdP1JGhTFUUxWeye%2BgkoYl25MBv5imerbSE1eJy2z8WqJ2quofZOg0sPK%2BDOOBoDlfJPG0r30rYq%2BCmXr2aFDtNextGkRFJhzmTzgrSqaM6lPsM60rbhTXvRsO0wWl%2FOk9Tw8t1RAVt5LZFmRkv7xTLUOTc1xTJAPCWRtOMwFEl7uhQ5%2FtjftHPEFPaMumAcZTei7mzh8wDRU9sI1Wms9s0NsdCO4pjn%2B%2F1zWvT5QlleCClVeT1L9dFx%2BISFc9bqufO%2BzxS9hc1jpGT5G8g0snEWHjeKFvUYc3Caj3BtzmddytcgTJ%2Be2uQW5YvUwXmVKpZzWiKS8yHHXLcwMHMh6jI6ojR3cAty6%2B6poc95FVpW7zwmNak3xDYs6M5l8zS31bmbnM7D8TDAYT8fHompzYrtU9uztfMVjpX5PPA2%2By05T1QKUocdTzaeRtFyCw%2FCetHz9vxTOwSHHVAPA3pNDIPjwRPsYmtw4exokLzBh9H8Mt7Ifj7iNQKnVpFKQHjQ1wEmamnQOEkcJbbt6SXEgTzl7r3iY2l5E96LD%2Fa%2BLH1Xtx78Sk4OR2DGj2XVazm6yZYN0Ih%2FzQW7n7s3CbQ69k11kgToDMwSBrBaL4blw%2BBBzu4mXx7LDwdOw8CCFbdCTTGMKVCaA78jiaXSKlhFpB2D6J0e8UEPeyO5JV0M5Lj0jV8SyO%2Bk5dExuP5UNvVKplt23ZffkmFzYlZ6pfjd7R%2F3%2FKm5nz38Xvgj1DiO4CGJwa%2BfNCsXP7c2oQdQ64entw71lTldf8WGu5gm8LLpAt9ovenC%2F67cgTdeb4JyF4KTOD%2BXQK7lLFEeHjitF7LKhJJ7RUYcRm8X%2FQ7ayw%2FiHyX%2Fh1fWIPIhqgaLv803KQQZZ1VjTZxXr%2Buv3PM3YfaNwHDKYc6EFXBUB8igrC%2FLIMw8YDmAMhCoA%2Bi7n6dhFAHvNnrWAfQtocuaFgWGx6R1yQ8UeknlYRpUQyz4ZZX6qzC7RgRuLt6VPq%2BFmy1wSJw6AK2yuHb1Iip7oAXLVlir0hyA2PbCbB2FaQm6Fm9elR10OTMeQiOyauFkq6RfMjAi0yVNE5zjOmC%2B1TcWemUvqYWPq6wQ78lcFyYHqu5BmrfRqw547%2BSiRsUtSoINOIdROa%2FSVB0A3znnFtXknYPo7l7hBrsWzeO1SuKNcasR1bT%2BWgfQ97SoV8%2B7YyY9ENWjVnzr0VwA44rH1QG1GYG6Mc7qBdwlXjnmGQfo1eiLlxsjuiV0bSa%2BytfVbwziuvjYKNlQCmrj33uRUwynFmhfb%2F8U%2BG3X%2Byj%2B7ffAj0ePX6S8%2FAc%3D, WRITE: TLSv1 Application Data, length = 686
Server TLS 1.1 Java 1.7u45 + Client Java 1.7u72 "TLS 1.2 enabled" - fails as expected:
====================================================================
2014/11/28 14:47:49 | INFO | jvm 1 | *** ClientHello, TLSv1.2
2014/11/28 14:47:49 | INFO | jvm 1 | RandomCookie: GMT: 1417166019 bytes = { 107, 154, 244, 7, 50, 34, 114, 139, 60, 147, 43, 186, 201, 97, 180, 45, 102, 183, 180, 134, 87, 70, 218, 9, 115, 218, 109, 114 }
2014/11/28 14:47:49 | INFO | jvm 1 | Session ID: {}
2014/11/28 14:47:49 | INFO | jvm 1 | Cipher Suites: [TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA, TLS_ECDHE_ECDSA_WITH_RC4_128_SHA, TLS_ECDHE_RSA_WITH_RC4_128_SHA, SSL_RSA_WITH_RC4_128_SHA, TLS_ECDH_ECDSA_WITH_RC4_128_SHA, TLS_ECDH_RSA_WITH_RC4_128_SHA, SSL_RSA_WITH_RC4_128_MD5, TLS_EMPTY_RENEGOTIATION_INFO_SCSV]
2014/11/28 14:47:49 | INFO | jvm 1 | Compression Methods: { 0 }
2014/11/28 14:47:49 | INFO | jvm 1 | Extension elliptic_curves, curve names: {secp256r1, sect163k1, sect163r2, secp192r1, secp224r1, sect233k1, sect233r1, sect283k1, sect283r1, secp384r1, sect409k1, sect409r1, secp521r1, sect571k1, sect571r1, secp160k1, secp160r1, secp160r2, sect163r1, secp192k1, sect193r1, sect193r2, secp224k1, sect239k1, secp256k1}
2014/11/28 14:47:49 | INFO | jvm 1 | Extension ec_point_formats, formats: [uncompressed]
2014/11/28 14:47:49 | INFO | jvm 1 | Extension signature_algorithms, signature_algorithms: SHA512withECDSA, SHA512withRSA, SHA384withECDSA, SHA384withRSA, SHA256withECDSA, SHA256withRSA, SHA224withECDSA, SHA224withRSA, SHA1withECDSA, SHA1withRSA, SHA1withDSA, MD5withRSA
2014/11/28 14:47:49 | INFO | jvm 1 | ***
2014/11/28 14:47:49 | INFO | jvm 1 | %% Initialized: [Session-95, SSL_NULL_WITH_NULL_NULL]
2014/11/28 14:47:49 | INFO | jvm 1 | %% Negotiating: [Session-95, TLS_RSA_WITH_AES_128_CBC_SHA]
2014/11/28 14:47:49 | INFO | jvm 1 | *** ServerHello, TLSv1.2
2014/11/28 14:47:49 | INFO | jvm 1 | RandomCookie: GMT: 1417166013 bytes = { 57, 9, 10, 41, 45, 206, 6, 181, 178, 162, 127, 0, 166, 201, 56, 15, 174, 121, 138, 209, 14, 126, 216, 246, 167, 113, 236, 116 }
2014/11/28 14:47:49 | INFO | jvm 1 | Session ID: {84, 120, 61, 189, 232, 152, 93, 94, 158, 221, 201, 90, 219, 229, 47, 6, 123, 46, 20, 82, 140, 122, 2, 73, 137, 235, 83, 136, 91, 83, 211, 132}
2014/11/28 14:47:49 | INFO | jvm 1 | Cipher Suite: TLS_RSA_WITH_AES_128_CBC_SHA
2014/11/28 14:47:49 | INFO | jvm 1 | Compression Method: 0
2014/11/28 14:47:49 | INFO | jvm 1 | Extension renegotiation_info, renegotiated_connection: <empty>
2014/11/28 14:47:49 | INFO | jvm 1 | ***
2014/11/28 14:47:49 | INFO | jvm 1 | Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA
2014/11/28 14:47:49 | INFO | jvm 1 | *** Certificate chain
2014/11/28 14:47:49 | INFO | jvm 1 | chain [0] = [
2014/11/28 14:47:49 | INFO | jvm 1 | [
2014/11/28 14:47:49 | INFO | jvm 1 | Version: V3
2014/11/28 14:47:49 | INFO | jvm 1 | Subject: CN=dev-05.labs.blr.com, O=server
2014/11/28 14:47:49 | INFO | jvm 1 | Signature Algorithm: SHA256withRSA, OID = 1.2.840.113549.1.1.11
2014/11/28 14:47:49 | INFO | jvm 1 |
2014/11/28 14:47:49 | INFO | jvm 1 | Key: SunPKCS11-NSSfips RSA public key, 2048 bits (id 1, session object)
2014/11/28 14:47:49 | INFO | jvm 1 | modulus: 19751124565775544542661601941034719218747286997557229376272410409764009924174952830102822006739940996361158891315994655677031683410457285645708620145915789088144941408425439122384306771006790672852952487887077643219829713631271285091822690455402307000211724434432943370113476924425722411995320247744734057517566666508974254720742261526685687656494544221796453195966155694205640019924093341684193258103280171653517687458035087335731929833587535142452049552301009807817546366586239918288540321429443922231821575519420587811789981092934767950075857907111279056051594689275813767976468618202672668356345198890748632149983
2014/11/28 14:47:49 | INFO | jvm 1 | public exponent: 65537
2014/11/28 14:47:49 | INFO | jvm 1 | Validity: [From: Tue Nov 25 14:37:52 IST 2014,
2014/11/28 14:47:49 | INFO | jvm 1 | To: Thu Nov 01 14:37:52 IST 2114]
2014/11/28 14:47:49 | INFO | jvm 1 | Issuer: CN=dev-05.labs.blr.com, O=server
2014/11/28 14:47:49 | INFO | jvm 1 | SerialNumber: [ 0d54f951]
2014/11/28 14:47:49 | INFO | jvm 1 |
2014/11/28 14:47:49 | INFO | jvm 1 | Certificate Extensions: 1
2014/11/28 14:47:49 | INFO | jvm 1 | [1]: ObjectId: 2.5.29.14 Criticality=false
2014/11/28 14:47:49 | INFO | jvm 1 | SubjectKeyIdentifier [
2014/11/28 14:47:49 | INFO | jvm 1 | KeyIdentifier [
2014/11/28 14:47:49 | INFO | jvm 1 | 0000: 94 2D EB EF E8 04 5F 84 B2 BA F6 A5 C9 58 D3 79 .-...._......X.y
2014/11/28 14:47:49 | INFO | jvm 1 | 0010: 44 8F 40 07 D.@.
2014/11/28 14:47:49 | INFO | jvm 1 | ]
2014/11/28 14:47:49 | INFO | jvm 1 | ]
2014/11/28 14:47:49 | INFO | jvm 1 |
2014/11/28 14:47:49 | INFO | jvm 1 | ]
2014/11/28 14:47:49 | INFO | jvm 1 | Algorithm: [SHA256withRSA]
2014/11/28 14:47:49 | INFO | jvm 1 | Signature:
2014/11/28 14:47:49 | INFO | jvm 1 | 0000: 39 59 42 B8 26 F6 64 7E CA C1 33 7C 60 6A FC 80 9YB.&.d...3.`j..
2014/11/28 14:47:49 | INFO | jvm 1 | 0010: 5F AF 51 89 98 B7 AC 0C 27 DA A1 60 AD 5B 87 11 _.Q.....'..`.[..
2014/11/28 14:47:49 | INFO | jvm 1 | 0020: D8 95 E3 37 D2 CB E3 8A 6F CF 82 F3 4C AA B6 42 ...7....o...L..B
2014/11/28 14:47:49 | INFO | jvm 1 | 0030: F5 8B 67 0B D9 F2 3E FA FE 81 C5 77 78 47 E2 61 ..g...>....wxG.a
2014/11/28 14:47:49 | INFO | jvm 1 | 0040: 33 DC 97 CB FC 04 1D 99 18 84 C3 DC 28 8D 14 D7 3...........(...
2014/11/28 14:47:49 | INFO | jvm 1 | 0050: AF 71 1C E6 41 FC D1 71 CB C3 50 66 5E 28 AF EB .q..A..q..Pf^(..
2014/11/28 14:47:49 | INFO | jvm 1 | 0060: AF 80 52 CC 89 BE 0D 0B 58 1C CA 1C 34 36 BA 96 ..R.....X...46..
2014/11/28 14:47:49 | INFO | jvm 1 | 0070: F2 FE 18 73 6B F7 09 35 94 AC 8E CB F2 83 47 62 ...sk..5......Gb
2014/11/28 14:47:49 | INFO | jvm 1 | 0080: 20 FD 64 64 72 D6 89 D7 77 A7 D0 17 43 7E FF 44 .ddr...w...C..D
2014/11/28 14:47:49 | INFO | jvm 1 | 0090: 57 B5 1D 27 24 1D F5 87 86 E9 29 EF DE E7 D2 2E W..'$.....).....
2014/11/28 14:47:49 | INFO | jvm 1 | 00A0: 32 EE 3D 82 7C 53 7E 93 E9 5F 5E 9C 62 F5 31 C7 2.=..S..._^.b.1.
2014/11/28 14:47:49 | INFO | jvm 1 | 00B0: 9E 54 58 50 01 EE 58 18 81 6D 52 C0 EB CA CA 52 .TXP..X..mR....R
2014/11/28 14:47:49 | INFO | jvm 1 | 00C0: 26 CC 3C 9D E5 60 BE BE A1 E6 D5 79 66 F9 0C FD &.<..`.....yf...
2014/11/28 14:47:49 | INFO | jvm 1 | 00D0: BB 9E 36 E5 31 FC D4 68 8A 06 8D A0 0B 68 BA 2B ..6.1..h.....h.+
2014/11/28 14:47:49 | INFO | jvm 1 | 00E0: 1E AF 51 4A 6C BC 2D 7D B4 04 EA D6 DA 28 9B 64 ..QJl.-......(.d
2014/11/28 14:47:49 | INFO | jvm 1 | 00F0: F9 FF 35 7B E7 91 02 01 37 E7 C2 AA 8D 1E 48 22 ..5.....7.....H"
2014/11/28 14:47:49 | INFO | jvm 1 |
2014/11/28 14:47:49 | INFO | jvm 1 | ]
2014/11/28 14:47:49 | INFO | jvm 1 | ***
2014/11/28 14:47:49 | INFO | jvm 1 | *** ServerHelloDone
2014/11/28 14:47:49 | INFO | jvm 1 | qtp1981883520-299, WRITE: TLSv1.2 Handshake, length = 904
2014/11/28 14:47:49 | INFO | jvm 1 | qtp1981883520-302, READ: TLSv1.2 Handshake, length = 262
2014/11/28 14:47:49 | INFO | jvm 1 | unable to get the plaintext of the premaster secret
2014/11/28 14:47:49 | INFO | jvm 1 | *** ClientKeyExchange, RSA PreMasterSecret, TLSv1.2
2014/11/28 14:47:49 | INFO | jvm 1 | SESSION KEYGEN:
2014/11/28 14:47:49 | INFO | jvm 1 | PreMaster Secret:
2014/11/28 14:47:49 | INFO | jvm 1 | (key bytes not available)
2014/11/28 14:47:49 | INFO | jvm 1 | RSA master secret generation error:
2014/11/28 14:47:49 | INFO | jvm 1 | java.security.NoSuchAlgorithmException: no such algorithm: SunTls12MasterSecret for provider SunPKCS11-NSSfips
2014/11/28 14:47:49 | INFO | jvm 1 | at sun.security.jca.GetInstance.getService(GetInstance.java:100)
2014/11/28 14:47:49 | INFO | jvm 1 | at javax.crypto.JceSecurity.getInstance(JceSecurity.java:109)
2014/11/28 14:47:49 | INFO | jvm 1 | at javax.crypto.KeyGenerator.getInstance(KeyGenerator.java:287)
2014/11/28 14:47:49 | INFO | jvm 1 | at sun.security.ssl.JsseJce.getKeyGenerator(JsseJce.java:269)
2014/11/28 14:47:49 | INFO | jvm 1 | at sun.security.ssl.Handshaker.calculateMasterSecret(Handshaker.java:1052)
2014/11/28 14:47:49 | INFO | jvm 1 | at sun.security.ssl.Handshaker.calculateKeys(Handshaker.java:999)
2014/11/28 14:47:49 | INFO | jvm 1 | at sun.security.ssl.ServerHandshaker.processMessage(ServerHandshaker.java:234)
2014/11/28 14:47:49 | INFO | jvm 1 | at sun.security.ssl.Handshaker.processLoop(Handshaker.java:868)
2014/11/28 14:47:49 | INFO | jvm 1 | at sun.security.ssl.Handshaker$1.run(Handshaker.java:808)
2014/11/28 14:47:49 | INFO | jvm 1 | at sun.security.ssl.Handshaker$1.run(Handshaker.java:806)
2014/11/28 14:47:49 | INFO | jvm 1 | at java.security.AccessController.doPrivileged(Native Method)
2014/11/28 14:47:49 | INFO | jvm 1 | at sun.security.ssl.Handshaker$DelegatedTask.run(Handshaker.java:1299)
2014/11/28 14:47:49 | INFO | jvm 1 | at org.eclipse.jetty.io.nio.SslConnection.process(SslConnection.java:375)
2014/11/28 14:47:49 | INFO | jvm 1 | at org.eclipse.jetty.io.nio.SslConnection.handle(SslConnection.java:193)
2014/11/28 14:47:49 | INFO | jvm 1 | at org.eclipse.jetty.io.nio.SelectChannelEndPoint.handle(SelectChannelEndPoint.java:696)
2014/11/28 14:47:49 | INFO | jvm 1 | at org.eclipse.jetty.io.nio.SelectChannelEndPoint$1.run(SelectChannelEndPoint.java:53)
2014/11/28 14:47:49 | INFO | jvm 1 | at org.eclipse.jetty.util.thread.QueuedThreadPool.runJob(QueuedThreadPool.java:608)
2014/11/28 14:47:49 | INFO | jvm 1 | at org.eclipse.jetty.util.thread.QueuedThreadPool$3.run(QueuedThreadPool.java:543)
2014/11/28 14:47:49 | INFO | jvm 1 | at java.lang.Thread.run(Thread.java:744)
2014/11/28 14:47:49 | INFO | jvm 1 | Generating a random fake premaster secret
2014/11/28 14:47:49 | INFO | jvm 1 | qtp1981883520-302, fatal error: 80: problem unwrapping net record
2014/11/28 14:47:49 | INFO | jvm 1 | java.lang.RuntimeException: Could not generate dummy secret
2014/11/28 14:47:49 | INFO | jvm 1 | %% Invalidated: [Session-95, TLS_RSA_WITH_AES_128_CBC_SHA]
2014/11/28 14:47:49 | INFO | jvm 1 | qtp1981883520-302, SEND TLSv1.2 ALERT: fatal, description = internal_error
2014/11/28 14:47:49 | INFO | jvm 1 | qtp1981883520-302, WRITE: TLSv1.2 Alert, length = 2
2014/11/28 14:47:49 | INFO | jvm 1 | Fri Nov 28 14:47:49 IST 2014|WARNING|qtp1981883520-302|base.util.JavaLoggingLog4jAppender.append
2014/11/28 14:47:49 | INFO | jvm 1 | handle failed
2014/11/28 14:47:49 | INFO | jvm 1 | java.lang.RuntimeException: Could not generate dummy secret
2014/11/28 14:47:49 | INFO | jvm 1 | at sun.security.ssl.Handshaker.checkThrown(Handshaker.java:1359)
2014/11/28 14:47:49 | INFO | jvm 1 | at sun.security.ssl.SSLEngineImpl.checkTaskThrown(SSLEngineImpl.java:513)
2014/11/28 14:47:49 | INFO | jvm 1 | at sun.security.ssl.SSLEngineImpl.readNetRecord(SSLEngineImpl.java:790)
2014/11/28 14:47:49 | INFO | jvm 1 | at sun.security.ssl.SSLEngineImpl.unwrap(SSLEngineImpl.java:758)
2014/11/28 14:47:49 | INFO | jvm 1 | at javax.net.ssl.SSLEngine.unwrap(SSLEngine.java:624)
2014/11/28 14:47:49 | INFO | jvm 1 | at org.eclipse.jetty.io.nio.SslConnection.unwrap(SslConnection.java:536)
2014/11/28 14:47:49 | INFO | jvm 1 | at org.eclipse.jetty.io.nio.SslConnection.process(SslConnection.java:401)
2014/11/28 14:47:49 | INFO | jvm 1 | at org.eclipse.jetty.io.nio.SslConnection.handle(SslConnection.java:193)
2014/11/28 14:47:49 | INFO | jvm 1 | at org.eclipse.jetty.io.nio.SelectChannelEndPoint.handle(SelectChannelEndPoint.java:696)
2014/11/28 14:47:49 | INFO | jvm 1 | at org.eclipse.jetty.io.nio.SelectChannelEndPoint$1.run(SelectChannelEndPoint.java:53)
2014/11/28 14:47:49 | INFO | jvm 1 | at org.eclipse.jetty.util.thread.QueuedThreadPool.runJob(QueuedThreadPool.java:608)
2014/11/28 14:47:49 | INFO | jvm 1 | at org.eclipse.jetty.util.thread.QueuedThreadPool$3.run(QueuedThreadPool.java:543)
2014/11/28 14:47:49 | INFO | jvm 1 | at java.lang.Thread.run(Thread.java:744)
2014/11/28 14:47:49 | INFO | jvm 1 | Caused by: java.lang.RuntimeException: Could not generate dummy secret
2014/11/28 14:47:49 | INFO | jvm 1 | at sun.security.ssl.RSAClientKeyExchange.generateDummySecret(RSAClientKeyExchange.java:272)
2014/11/28 14:47:49 | INFO | jvm 1 | at sun.security.ssl.Handshaker.calculateMasterSecret(Handshaker.java:1069)
2014/11/28 14:47:49 | INFO | jvm 1 | at sun.security.ssl.Handshaker.calculateKeys(Handshaker.java:999)
2014/11/28 14:47:49 | INFO | jvm 1 | at sun.security.ssl.ServerHandshaker.processMessage(ServerHandshaker.java:234)
2014/11/28 14:47:49 | INFO | jvm 1 | at sun.security.ssl.Handshaker.processLoop(Handshaker.java:868)
2014/11/28 14:47:49 | INFO | jvm 1 | at sun.security.ssl.Handshaker$1.run(Handshaker.java:808)
2014/11/28 14:47:49 | INFO | jvm 1 | at sun.security.ssl.Handshaker$1.run(Handshaker.java:806)
2014/11/28 14:47:49 | INFO | jvm 1 | at java.security.AccessController.doPrivileged(Native Method)
2014/11/28 14:47:49 | INFO | jvm 1 | at sun.security.ssl.Handshaker$DelegatedTask.run(Handshaker.java:1299)
2014/11/28 14:47:49 | INFO | jvm 1 | at org.eclipse.jetty.io.nio.SslConnection.process(SslConnection.java:375)
2014/11/28 14:47:49 | INFO | jvm 1 | ... 6 more
2014/11/28 14:47:49 | INFO | jvm 1 | Caused by: java.security.NoSuchAlgorithmException: no such algorithm: SunTls12RsaPremasterSecret for provider SunPKCS11-NSSfips
2014/11/28 14:47:49 | INFO | jvm 1 | at sun.security.jca.GetInstance.getService(GetInstance.java:100)
2014/11/28 14:47:49 | INFO | jvm 1 | at javax.crypto.JceSecurity.getInstance(JceSecurity.java:109)
2014/11/28 14:47:49 | INFO | jvm 1 | at javax.crypto.KeyGenerator.getInstance(KeyGenerator.java:287)
2014/11/28 14:47:49 | INFO | jvm 1 | at sun.security.ssl.JsseJce.getKeyGenerator(JsseJce.java:269)
2014/11/28 14:47:49 | INFO | jvm 1 | at sun.security.ssl.RSAClientKeyExchange.generateDummySecret(RSAClientKeyExchange.java:267)
2014/11/28 14:47:49 | INFO | jvm 1 | ... 15 more
Server TLS 1.1 Java 1.7u45 + Client Java 1.8u25 "TLS 1.2 enabled" - fails as expected:
====================================================================
2014/11/28 14:58:37 | INFO | jvm 1 | *** ClientHello, TLSv1.2
2014/11/28 14:58:37 | INFO | jvm 1 | RandomCookie: GMT: 1417166923 bytes = { 171, 73, 75, 248, 48, 224, 231, 112, 25, 221, 98, 98, 232, 106, 76, 86, 207, 12, 221, 37, 128, 220, 22, 132, 177, 121, 154, 215 }
2014/11/28 14:58:37 | INFO | jvm 1 | Session ID: {}
2014/11/28 14:58:37 | INFO | jvm 1 | Cipher Suites: [TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256, TLS_RSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_DSS_WITH_AES_128_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_DSS_WITH_AES_128_GCM_SHA256, TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA, TLS_ECDHE_ECDSA_WITH_RC4_128_SHA, TLS_ECDHE_RSA_WITH_RC4_128_SHA, SSL_RSA_WITH_RC4_128_SHA, TLS_ECDH_ECDSA_WITH_RC4_128_SHA, TLS_ECDH_RSA_WITH_RC4_128_SHA, SSL_RSA_WITH_RC4_128_MD5, TLS_EMPTY_RENEGOTIATION_INFO_SCSV]
2014/11/28 14:58:37 | INFO | jvm 1 | Compression Methods: { 0 }
2014/11/28 14:58:37 | INFO | jvm 1 | Extension elliptic_curves, curve names: {secp256r1, sect163k1, sect163r2, secp192r1, secp224r1, sect233k1, sect233r1, sect283k1, sect283r1, secp384r1, sect409k1, sect409r1, secp521r1, sect571k1, sect571r1, secp160k1, secp160r1, secp160r2, sect163r1, secp192k1, sect193r1, sect193r2, secp224k1, sect239k1, secp256k1}
2014/11/28 14:58:37 | INFO | jvm 1 | Extension ec_point_formats, formats: [uncompressed]
2014/11/28 14:58:37 | INFO | jvm 1 | Extension signature_algorithms, signature_algorithms: SHA512withECDSA, SHA512withRSA, SHA384withECDSA, SHA384withRSA, SHA256withECDSA, SHA256withRSA, SHA224withECDSA, SHA224withRSA, SHA1withECDSA, SHA1withRSA, SHA1withDSA, MD5withRSA
2014/11/28 14:58:37 | INFO | jvm 1 | ***
2014/11/28 14:58:37 | INFO | jvm 1 | %% Initialized: [Session-130, SSL_NULL_WITH_NULL_NULL]
2014/11/28 14:58:37 | INFO | jvm 1 | %% Negotiating: [Session-130, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256]
2014/11/28 14:58:37 | INFO | jvm 1 | *** ServerHello, TLSv1.2
2014/11/28 14:58:37 | INFO | jvm 1 | RandomCookie: GMT: 1417166917 bytes = { 105, 84, 85, 145, 18, 72, 77, 194, 55, 163, 191, 172, 161, 236, 55, 167, 76, 124, 138, 45, 71, 219, 99, 173, 9, 121, 107, 89 }
2014/11/28 14:58:37 | INFO | jvm 1 | Session ID: {84, 120, 64, 69, 203, 197, 46, 45, 46, 191, 11, 155, 195, 69, 106, 200, 150, 187, 100, 208, 203, 117, 133, 115, 137, 193, 217, 81, 4, 130, 36, 11}
2014/11/28 14:58:37 | INFO | jvm 1 | Cipher Suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
2014/11/28 14:58:37 | INFO | jvm 1 | Compression Method: 0
2014/11/28 14:58:37 | INFO | jvm 1 | Extension renegotiation_info, renegotiated_connection: <empty>
2014/11/28 14:58:37 | INFO | jvm 1 | ***
2014/11/28 14:58:37 | INFO | jvm 1 | Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
2014/11/28 14:58:37 | INFO | jvm 1 | *** Certificate chain
2014/11/28 14:58:37 | INFO | jvm 1 | chain [0] = [
2014/11/28 14:58:37 | INFO | jvm 1 | [
2014/11/28 14:58:37 | INFO | jvm 1 | Version: V3
2014/11/28 14:58:37 | INFO | jvm 1 | Subject: CN=dev-05.labs.blr.com, O=server
2014/11/28 14:58:37 | INFO | jvm 1 | Signature Algorithm: SHA256withRSA, OID = 1.2.840.113549.1.1.11
2014/11/28 14:58:37 | INFO | jvm 1 |
2014/11/28 14:58:37 | INFO | jvm 1 | Key: SunPKCS11-NSSfips RSA public key, 2048 bits (id 1, session object)
2014/11/28 14:58:37 | INFO | jvm 1 | modulus: 19751124565775544542661601941034719218747286997557229376272410409764009924174952830102822006739940996361158891315994655677031683410457285645708620145915789088144941408425439122384306771006790672852952487887077643219829713631271285091822690455402307000211724434432943370113476924425722411995320247744734057517566666508974254720742261526685687656494544221796453195966155694205640019924093341684193258103280171653517687458035087335731929833587535142452049552301009807817546366586239918288540321429443922231821575519420587811789981092934767950075857907111279056051594689275813767976468618202672668356345198890748632149983
2014/11/28 14:58:37 | INFO | jvm 1 | public exponent: 65537
2014/11/28 14:58:37 | INFO | jvm 1 | Validity: [From: Tue Nov 25 14:37:52 IST 2014,
2014/11/28 14:58:37 | INFO | jvm 1 | To: Thu Nov 01 14:37:52 IST 2114]
2014/11/28 14:58:37 | INFO | jvm 1 | Issuer: CN=dev-05.labs.blr.com, O=server
2014/11/28 14:58:37 | INFO | jvm 1 | SerialNumber: [ 0d54f951]
2014/11/28 14:58:37 | INFO | jvm 1 |
2014/11/28 14:58:37 | INFO | jvm 1 | Certificate Extensions: 1
2014/11/28 14:58:37 | INFO | jvm 1 | [1]: ObjectId: 2.5.29.14 Criticality=false
2014/11/28 14:58:37 | INFO | jvm 1 | SubjectKeyIdentifier [
2014/11/28 14:58:37 | INFO | jvm 1 | KeyIdentifier [
2014/11/28 14:58:37 | INFO | jvm 1 | 0000: 94 2D EB EF E8 04 5F 84 B2 BA F6 A5 C9 58 D3 79 .-...._......X.y
2014/11/28 14:58:37 | INFO | jvm 1 | 0010: 44 8F 40 07 D.@.
2014/11/28 14:58:37 | INFO | jvm 1 | ]
2014/11/28 14:58:37 | INFO | jvm 1 | ]
2014/11/28 14:58:37 | INFO | jvm 1 |
2014/11/28 14:58:37 | INFO | jvm 1 | ]
2014/11/28 14:58:37 | INFO | jvm 1 | Algorithm: [SHA256withRSA]
2014/11/28 14:58:37 | INFO | jvm 1 | Signature:
2014/11/28 14:58:37 | INFO | jvm 1 | 0000: 39 59 42 B8 26 F6 64 7E CA C1 33 7C 60 6A FC 80 9YB.&.d...3.`j..
2014/11/28 14:58:37 | INFO | jvm 1 | 0010: 5F AF 51 89 98 B7 AC 0C 27 DA A1 60 AD 5B 87 11 _.Q.....'..`.[..
2014/11/28 14:58:37 | INFO | jvm 1 | 0020: D8 95 E3 37 D2 CB E3 8A 6F CF 82 F3 4C AA B6 42 ...7....o...L..B
2014/11/28 14:58:37 | INFO | jvm 1 | 0030: F5 8B 67 0B D9 F2 3E FA FE 81 C5 77 78 47 E2 61 ..g...>....wxG.a
2014/11/28 14:58:37 | INFO | jvm 1 | 0040: 33 DC 97 CB FC 04 1D 99 18 84 C3 DC 28 8D 14 D7 3...........(...
2014/11/28 14:58:37 | INFO | jvm 1 | 0050: AF 71 1C E6 41 FC D1 71 CB C3 50 66 5E 28 AF EB .q..A..q..Pf^(..
2014/11/28 14:58:37 | INFO | jvm 1 | 0060: AF 80 52 CC 89 BE 0D 0B 58 1C CA 1C 34 36 BA 96 ..R.....X...46..
2014/11/28 14:58:37 | INFO | jvm 1 | 0070: F2 FE 18 73 6B F7 09 35 94 AC 8E CB F2 83 47 62 ...sk..5......Gb
2014/11/28 14:58:37 | INFO | jvm 1 | 0080: 20 FD 64 64 72 D6 89 D7 77 A7 D0 17 43 7E FF 44 .ddr...w...C..D
2014/11/28 14:58:37 | INFO | jvm 1 | 0090: 57 B5 1D 27 24 1D F5 87 86 E9 29 EF DE E7 D2 2E W..'$.....).....
2014/11/28 14:58:37 | INFO | jvm 1 | 00A0: 32 EE 3D 82 7C 53 7E 93 E9 5F 5E 9C 62 F5 31 C7 2.=..S..._^.b.1.
2014/11/28 14:58:37 | INFO | jvm 1 | 00B0: 9E 54 58 50 01 EE 58 18 81 6D 52 C0 EB CA CA 52 .TXP..X..mR....R
2014/11/28 14:58:37 | INFO | jvm 1 | 00C0: 26 CC 3C 9D E5 60 BE BE A1 E6 D5 79 66 F9 0C FD &.<..`.....yf...
2014/11/28 14:58:37 | INFO | jvm 1 | 00D0: BB 9E 36 E5 31 FC D4 68 8A 06 8D A0 0B 68 BA 2B ..6.1..h.....h.+
2014/11/28 14:58:37 | INFO | jvm 1 | 00E0: 1E AF 51 4A 6C BC 2D 7D B4 04 EA D6 DA 28 9B 64 ..QJl.-......(.d
2014/11/28 14:58:37 | INFO | jvm 1 | 00F0: F9 FF 35 7B E7 91 02 01 37 E7 C2 AA 8D 1E 48 22 ..5.....7.....H"
2014/11/28 14:58:37 | INFO | jvm 1 |
2014/11/28 14:58:37 | INFO | jvm 1 | ]
2014/11/28 14:58:37 | INFO | jvm 1 | ***
2014/11/28 14:58:37 | INFO | jvm 1 | *** ECDH ServerKeyExchange
2014/11/28 14:58:37 | INFO | jvm 1 | Signature Algorithm SHA512withRSA
2014/11/28 14:58:37 | INFO | jvm 1 | Server key: SunPKCS11-NSSfips EC public key, 256 bits (id 1630, session object)
2014/11/28 14:58:37 | INFO | jvm 1 | public x coord: 80735727379809715013484157397151092743423932306787640386795065732439830384956
2014/11/28 14:58:37 | INFO | jvm 1 | public y coord: 75722714462348537277457245937237972579533729551403184089329526197651361616309
2014/11/28 14:58:37 | INFO | jvm 1 | parameters: secp256r1 [NIST P-256, X9.62 prime256v1] (1.2.840.10045.3.1.7)
2014/11/28 14:58:37 | INFO | jvm 1 | *** ServerHelloDone
2014/11/28 14:58:37 | INFO | jvm 1 | qtp1981883520-744, WRITE: TLSv1.2 Handshake, length = 1237
2014/11/28 14:58:37 | INFO | jvm 1 | qtp1981883520-300, READ: TLSv1.2 Handshake, length = 70
2014/11/28 14:58:37 | INFO | jvm 1 | *** ECDHClientKeyExchange
2014/11/28 14:58:37 | INFO | jvm 1 | ECDH Public value: { 4, 136, 246, 34, 252, 176, 247, 237, 161, 228, 245, 141, 5, 237, 180, 149, 66, 18, 105, 95, 10, 75, 231, 192, 15, 15, 254, 54, 129, 203, 161, 244, 6, 22, 49, 17, 235, 156, 147, 2, 140, 67, 12, 232, 111, 18, 3, 225, 229, 15, 163, 203, 9, 136, 152, 241, 38, 169, 134, 249, 92, 39, 3, 177, 117 }
2014/11/28 14:58:37 | INFO | jvm 1 | SESSION KEYGEN:
2014/11/28 14:58:37 | INFO | jvm 1 | PreMaster Secret:
2014/11/28 14:58:37 | INFO | jvm 1 | (key bytes not available)
2014/11/28 14:58:37 | INFO | jvm 1 | qtp1981883520-300, fatal error: 80: problem unwrapping net record
2014/11/28 14:58:37 | INFO | jvm 1 | java.lang.RuntimeException: java.security.NoSuchAlgorithmException: no such algorithm: SunTls12MasterSecret for provider SunPKCS11-NSSfips
2014/11/28 14:58:37 | INFO | jvm 1 | %% Invalidated: [Session-130, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256]
2014/11/28 14:58:37 | INFO | jvm 1 | qtp1981883520-300, SEND TLSv1.2 ALERT: fatal, description = internal_error
2014/11/28 14:58:37 | INFO | jvm 1 | qtp1981883520-300, WRITE: TLSv1.2 Alert, length = 2
2014/11/28 14:58:37 | INFO | jvm 1 | Fri Nov 28 14:58:37 IST 2014|WARNING|qtp1981883520-300|base.util.JavaLoggingLog4jAppender.append
2014/11/28 14:58:37 | INFO | jvm 1 | handle failed
2014/11/28 14:58:37 | INFO | jvm 1 | java.lang.RuntimeException: java.security.NoSuchAlgorithmException: no such algorithm: SunTls12MasterSecret for provider SunPKCS11-NSSfips
2014/11/28 14:58:37 | INFO | jvm 1 | at sun.security.ssl.Handshaker.checkThrown(Handshaker.java:1359)
2014/11/28 14:58:37 | INFO | jvm 1 | at sun.security.ssl.SSLEngineImpl.checkTaskThrown(SSLEngineImpl.java:513)
2014/11/28 14:58:37 | INFO | jvm 1 | at sun.security.ssl.SSLEngineImpl.readNetRecord(SSLEngineImpl.java:790)
2014/11/28 14:58:37 | INFO | jvm 1 | at sun.security.ssl.SSLEngineImpl.unwrap(SSLEngineImpl.java:758)
2014/11/28 14:58:37 | INFO | jvm 1 | at javax.net.ssl.SSLEngine.unwrap(SSLEngine.java:624)
2014/11/28 14:58:37 | INFO | jvm 1 | at org.eclipse.jetty.io.nio.SslConnection.unwrap(SslConnection.java:536)
2014/11/28 14:58:37 | INFO | jvm 1 | at org.eclipse.jetty.io.nio.SslConnection.process(SslConnection.java:401)
2014/11/28 14:58:37 | INFO | jvm 1 | at org.eclipse.jetty.io.nio.SslConnection.handle(SslConnection.java:193)
2014/11/28 14:58:37 | INFO | jvm 1 | at org.eclipse.jetty.io.nio.SelectChannelEndPoint.handle(SelectChannelEndPoint.java:696)
2014/11/28 14:58:37 | INFO | jvm 1 | at org.eclipse.jetty.io.nio.SelectChannelEndPoint$1.run(SelectChannelEndPoint.java:53)
2014/11/28 14:58:37 | INFO | jvm 1 | at org.eclipse.jetty.util.thread.QueuedThreadPool.runJob(QueuedThreadPool.java:608)
2014/11/28 14:58:37 | INFO | jvm 1 | at org.eclipse.jetty.util.thread.QueuedThreadPool$3.run(QueuedThreadPool.java:543)
2014/11/28 14:58:37 | INFO | jvm 1 | at java.lang.Thread.run(Thread.java:744)
2014/11/28 14:58:37 | INFO | jvm 1 | Caused by: java.security.ProviderException: java.security.NoSuchAlgorithmException: no such algorithm: SunTls12MasterSecret for provider SunPKCS11-NSSfips
2014/11/28 14:58:37 | INFO | jvm 1 | at sun.security.ssl.Handshaker.calculateMasterSecret(Handshaker.java:1060)
2014/11/28 14:58:37 | INFO | jvm 1 | at sun.security.ssl.Handshaker.calculateKeys(Handshaker.java:999)
2014/11/28 14:58:37 | INFO | jvm 1 | at sun.security.ssl.ServerHandshaker.processMessage(ServerHandshaker.java:234)
2014/11/28 14:58:37 | INFO | jvm 1 | at sun.security.ssl.Handshaker.processLoop(Handshaker.java:868)
2014/11/28 14:58:37 | INFO | jvm 1 | at sun.security.ssl.Handshaker$1.run(Handshaker.java:808)
2014/11/28 14:58:37 | INFO | jvm 1 | at sun.security.ssl.Handshaker$1.run(Handshaker.java:806)
2014/11/28 14:58:37 | INFO | jvm 1 | at java.security.AccessController.doPrivileged(Native Method)
2014/11/28 14:58:37 | INFO | jvm 1 | at sun.security.ssl.Handshaker$DelegatedTask.run(Handshaker.java:1299)
2014/11/28 14:58:37 | INFO | jvm 1 | at org.eclipse.jetty.io.nio.SslConnection.process(SslConnection.java:375)
2014/11/28 14:58:37 | INFO | jvm 1 | ... 6 more
2014/11/28 14:58:37 | INFO | jvm 1 | Caused by: java.security.NoSuchAlgorithmException: no such algorithm: SunTls12MasterSecret for provider SunPKCS11-NSSfips
2014/11/28 14:58:37 | INFO | jvm 1 | at sun.security.jca.GetInstance.getService(GetInstance.java:100)
2014/11/28 14:58:37 | INFO | jvm 1 | at javax.crypto.JceSecurity.getInstance(JceSecurity.java:109)
2014/11/28 14:58:37 | INFO | jvm 1 | at javax.crypto.KeyGenerator.getInstance(KeyGenerator.java:287)
2014/11/28 14:58:37 | INFO | jvm 1 | at sun.security.ssl.JsseJce.getKeyGenerator(JsseJce.java:269)
2014/11/28 14:58:37 | INFO | jvm 1 | at sun.security.ssl.Handshaker.calculateMasterSecret(Handshaker.java:1052)
2014/11/28 14:58:37 | INFO | jvm 1 | ... 14 more
Server TLS 1.1 Java 1.7u45 + Client Java 1.8u25 "TLS 1.2 disabled" - still fails which is unexpected:
====================================================================
2014/11/28 15:03:38 | INFO | jvm 1 | *** ClientHello, TLSv1.1
2014/11/28 15:03:38 | INFO | jvm 1 | RandomCookie: GMT: 1417167224 bytes = { 55, 212, 126, 68, 49, 1, 205, 58, 112, 15, 1, 9, 38, 31, 58, 188, 229, 115, 10, 61, 249, 209, 98, 140, 149, 113, 149, 231 }
2014/11/28 15:03:38 | INFO | jvm 1 | Session ID: {84, 120, 65, 114, 3, 180, 96, 53, 232, 47, 28, 70, 58, 150, 117, 9, 169, 7, 94, 233, 94, 198, 136, 202, 240, 130, 18, 23, 89, 10, 220, 111}
2014/11/28 15:03:38 | INFO | jvm 1 | Cipher Suites: [TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_anon_WITH_AES_128_CBC_SHA, TLS_ECDH_anon_WITH_3DES_EDE_CBC_SHA]
2014/11/28 15:03:38 | INFO | jvm 1 | Compression Methods: { 0 }
2014/11/28 15:03:38 | INFO | jvm 1 | Extension elliptic_curves, curve names: {secp256r1, sect163k1, sect163r2, secp192r1, secp224r1, sect233k1, sect233r1, sect283k1, sect283r1, secp384r1, sect409k1, sect409r1, secp521r1, sect571k1, sect571r1, secp160k1, secp160r1, secp160r2, sect163r1, secp192k1, sect193r1, sect193r2, secp224k1, sect239k1, secp256k1}
2014/11/28 15:03:38 | INFO | jvm 1 | Extension ec_point_formats, formats: [uncompressed]
2014/11/28 15:03:38 | INFO | jvm 1 | Extension renegotiation_info, renegotiated_connection: <empty>
2014/11/28 15:03:38 | INFO | jvm 1 | ***
2014/11/28 15:03:38 | INFO | jvm 1 | %% Resuming [Session-135, TLS_RSA_WITH_AES_128_CBC_SHA]
2014/11/28 15:03:38 | INFO | jvm 1 | *** ServerHello, TLSv1.1
2014/11/28 15:03:38 | INFO | jvm 1 | RandomCookie: GMT: 1417167218 bytes = { 175, 0, 103, 107, 78, 20, 172, 204, 4, 196, 148, 153, 126, 87, 188, 255, 85, 219, 140, 39, 41, 136, 51, 33, 169, 31, 36, 150 }
2014/11/28 15:03:38 | INFO | jvm 1 | Session ID: {84, 120, 65, 114, 3, 180, 96, 53, 232, 47, 28, 70, 58, 150, 117, 9, 169, 7, 94, 233, 94, 198, 136, 202, 240, 130, 18, 23, 89, 10, 220, 111}
2014/11/28 15:03:38 | INFO | jvm 1 | Cipher Suite: TLS_RSA_WITH_AES_128_CBC_SHA
2014/11/28 15:03:38 | INFO | jvm 1 | Compression Method: 0
2014/11/28 15:03:38 | INFO | jvm 1 | Extension renegotiation_info, renegotiated_connection: <empty>
2014/11/28 15:03:38 | INFO | jvm 1 | ***
2014/11/28 15:03:38 | INFO | jvm 1 | Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA
2014/11/28 15:03:38 | INFO | jvm 1 | CONNECTION KEYGEN:
2014/11/28 15:03:38 | INFO | jvm 1 | Client Nonce:
2014/11/28 15:03:38 | INFO | jvm 1 | 0000: 54 78 41 78 37 D4 7E 44 31 01 CD 3A 70 0F 01 09 TxAx7..D1..:p...
2014/11/28 15:03:38 | INFO | jvm 1 | 0010: 26 1F 3A BC E5 73 0A 3D F9 D1 62 8C 95 71 95 E7 &.:..s.=..b..q..
2014/11/28 15:03:38 | INFO | jvm 1 | Server Nonce:
2014/11/28 15:03:38 | INFO | jvm 1 | 0000: 54 78 41 72 AF 00 67 6B 4E 14 AC CC 04 C4 94 99 TxAr..gkN.......
2014/11/28 15:03:38 | INFO | jvm 1 | 0010: 7E 57 BC FF 55 DB 8C 27 29 88 33 21 A9 1F 24 96 .W..U..').3!..$.
2014/11/28 15:03:38 | INFO | jvm 1 | Master Secret:
2014/11/28 15:03:38 | INFO | jvm 1 | (key bytes not available)
2014/11/28 15:03:38 | INFO | jvm 1 | Client MAC write Secret:
2014/11/28 15:03:38 | INFO | jvm 1 | (key bytes not available)
2014/11/28 15:03:38 | INFO | jvm 1 | Server MAC write Secret:
2014/11/28 15:03:38 | INFO | jvm 1 | (key bytes not available)
2014/11/28 15:03:38 | INFO | jvm 1 | Client write key:
2014/11/28 15:03:38 | INFO | jvm 1 | (key bytes not available)
2014/11/28 15:03:38 | INFO | jvm 1 | Server write key:
2014/11/28 15:03:38 | INFO | jvm 1 | (key bytes not available)
2014/11/28 15:03:38 | INFO | jvm 1 | ... no IV derived for this protocol
2014/11/28 15:03:38 | INFO | jvm 1 | qtp1981883520-300, WRITE: TLSv1.1 Handshake, length = 81
2014/11/28 15:03:38 | INFO | jvm 1 | qtp1981883520-300, WRITE: TLSv1.1 Change Cipher Spec, length = 1
2014/11/28 15:03:38 | INFO | jvm 1 | *** Finished
2014/11/28 15:03:38 | INFO | jvm 1 | verify_data: { 205, 73, 239, 162, 189, 111, 93, 112, 252, 191, 178, 72 }
2014/11/28 15:03:38 | INFO | jvm 1 | ***
2014/11/28 15:03:38 | INFO | jvm 1 | qtp1981883520-300, WRITE: TLSv1.1 Handshake, length = 64
2014/11/28 15:03:38 | INFO | jvm 1 | qtp1981883520-299, READ: TLSv1.1 Change Cipher Spec, length = 1
2014/11/28 15:03:38 | INFO | jvm 1 | qtp1981883520-299, READ: TLSv1.1 Handshake, length = 64
2014/11/28 15:03:38 | INFO | jvm 1 | *** Finished
2014/11/28 15:03:38 | INFO | jvm 1 | verify_data: { 19, 183, 83, 202, 63, 74, 163, 0, 247, 151, 206, 20 }
2014/11/28 15:03:38 | INFO | jvm 1 | ***
2014/11/28 15:03:38 | INFO | jvm 1 | qtp1981883520-299 - /AuthServices/auth/tokens, WRITE: TLSv1.1 Application Data, length = 184
2014/11/28 15:03:38 | INFO | jvm 1 | qtp1981883520-299 - /AuthServices/auth/tokens, WRITE: TLSv1.1 Application Data, length = 2987
2014/11/28 15:03:38 | INFO | jvm 1 | qtp1981883520-299, WRITE: TLSv1.1 Application Data, length = 5
2014/11/28 15:03:38 | INFO | jvm 1 | Allow unsafe renegotiation: false
2014/11/28 15:03:38 | INFO | jvm 1 | Allow legacy hello messages: true
2014/11/28 15:03:38 | INFO | jvm 1 | Is initial handshake: true
2014/11/28 15:03:38 | INFO | jvm 1 | Is secure renegotiation: false
2014/11/28 15:03:38 | INFO | jvm 1 | Is secure renegotiation: false
2014/11/28 15:03:38 | INFO | jvm 1 | Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 for TLSv1
2014/11/28 15:03:38 | INFO | jvm 1 | Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 for TLSv1
2014/11/28 15:03:38 | INFO | jvm 1 | Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 for TLSv1
2014/11/28 15:03:38 | INFO | jvm 1 | Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256 for TLSv1
2014/11/28 15:03:38 | INFO | jvm 1 | Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256 for TLSv1
2014/11/28 15:03:38 | INFO | jvm 1 | Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 for TLSv1
2014/11/28 15:03:38 | INFO | jvm 1 | Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 for TLSv1
2014/11/28 15:03:38 | INFO | jvm 1 | Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 for TLSv1.1
2014/11/28 15:03:38 | INFO | jvm 1 | Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 for TLSv1.1
2014/11/28 15:03:38 | INFO | jvm 1 | Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256 for TLSv1.1
2014/11/28 15:03:38 | INFO | jvm 1 | Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256 for TLSv1.1
2014/11/28 15:03:38 | INFO | jvm 1 | Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 for TLSv1.1
2014/11/28 15:03:38 | INFO | jvm 1 | Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 for TLSv1.1
2014/11/28 15:03:38 | INFO | jvm 1 | Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 for TLSv1.1
2014/11/28 15:03:38 | INFO | jvm 1 | Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 for TLSv1.1
2014/11/28 15:03:40 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
2014/11/28 15:03:40 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA
2014/11/28 15:03:40 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA
2014/11/28 15:03:40 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA
2014/11/28 15:03:40 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256
2014/11/28 15:03:40 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256
2014/11/28 15:03:40 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
2014/11/28 15:03:40 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
2014/11/28 15:03:40 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384
2014/11/28 15:03:40 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA
2014/11/28 15:03:40 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384
2014/11/28 15:03:40 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
2014/11/28 15:03:40 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
2014/11/28 15:03:40 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA
2014/11/28 15:03:40 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA
2014/11/28 15:03:40 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA
2014/11/28 15:03:40 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384
2014/11/28 15:03:40 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384
2014/11/28 15:03:42 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
2014/11/28 15:03:42 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA
2014/11/28 15:03:42 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA
2014/11/28 15:03:42 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256
2014/11/28 15:03:42 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256
2014/11/28 15:03:42 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256
2014/11/28 15:03:42 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256
2014/11/28 15:03:42 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
2014/11/28 15:03:42 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
2014/11/28 15:03:42 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
2014/11/28 15:03:42 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
2014/11/28 15:03:42 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384
2014/11/28 15:03:42 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA
2014/11/28 15:03:42 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA
2014/11/28 15:03:42 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384
2014/11/28 15:03:42 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
2014/11/28 15:03:42 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA
2014/11/28 15:03:42 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA
2014/11/28 15:03:42 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384
2014/11/28 15:03:43 | INFO | jvm 1 | Thread-31, READ: TLSv1.2 Handshake, length = 207
2014/11/28 15:03:43 | INFO | jvm 1 | *** ClientHello, TLSv1.2
2014/11/28 15:03:43 | INFO | jvm 1 | RandomCookie: GMT: 1417167229 bytes = { 209, 207, 128, 77, 244, 126, 201, 133, 122, 149, 46, 174, 146, 131, 232, 171, 236, 114, 188, 239, 89, 136, 179, 55, 42, 35, 10, 208 }
2014/11/28 15:03:43 | INFO | jvm 1 | Session ID: {}
2014/11/28 15:03:43 | INFO | jvm 1 | Session ID: {}
2014/11/28 15:03:43 | INFO | jvm 1 | Cipher Suites: [TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256, TLS_RSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_DSS_WITH_AES_128_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_DSS_WITH_AES_128_GCM_SHA256, TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA, TLS_ECDHE_ECDSA_WITH_RC4_128_SHA, TLS_ECDHE_RSA_WITH_RC4_128_SHA, SSL_RSA_WITH_RC4_128_SHA, TLS_ECDH_ECDSA_WITH_RC4_128_SHA, TLS_ECDH_RSA_WITH_RC4_128_SHA, SSL_RSA_WITH_RC4_128_MD5, TLS_EMPTY_RENEGOTIATION_INFO_SCSV]
2014/11/28 15:03:43 | INFO | jvm 1 | Compression Methods: { 0 }
2014/11/28 15:03:43 | INFO | jvm 1 | Compression Methods: { 0 }
2014/11/28 15:03:43 | INFO | jvm 1 | Extension elliptic_curves, curve names: {secp256r1, sect163k1, sect163r2, secp192r1, secp224r1, sect233k1, sect233r1, sect283k1, sect283r1, secp384r1, sect409k1, sect409r1, secp521r1, sect571k1, sect571r1, secp160k1, secp160r1, secp160r2, sect163r1, secp192k1, sect193r1, sect193r2, secp224k1, sect239k1, secp256k1}
2014/11/28 15:03:43 | INFO | jvm 1 | Extension ec_point_formats, formats: [uncompressed]
2014/11/28 15:03:43 | INFO | jvm 1 | Extension ec_point_formats, formats: [uncompressed]
2014/11/28 15:03:43 | INFO | jvm 1 | Extension signature_algorithms, signature_algorithms: SHA512withECDSA, SHA512withRSA, SHA384withECDSA, SHA384withRSA, SHA256withECDSA, SHA256withRSA, SHA224withECDSA, SHA224withRSA, SHA1withECDSA, SHA1withRSA, SHA1withDSA, MD5withRSA
2014/11/28 15:03:43 | INFO | jvm 1 | ***
2014/11/28 15:03:43 | INFO | jvm 1 | %% Initialized: [Session-136, SSL_NULL_WITH_NULL_NULL]
2014/11/28 15:03:43 | INFO | jvm 1 | %% Initialized: [Session-136, SSL_NULL_WITH_NULL_NULL]
2014/11/28 15:03:43 | INFO | jvm 1 | %% Negotiating: [Session-136, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256]
2014/11/28 15:03:43 | INFO | jvm 1 | *** ServerHello, TLSv1.2
2014/11/28 15:03:43 | INFO | jvm 1 | RandomCookie: GMT: 1417167223 bytes = { 117, 144, 129, 63, 132, 34, 26, 83, 118, 25, 122, 135, 116, 24, 242, 213, 196, 31, 25, 127, 155, 153, 6, 132, 244, 45, 21, 235 }
2014/11/28 15:03:43 | INFO | jvm 1 | RandomCookie: GMT: 1417167223 bytes = { 117, 144, 129, 63, 132, 34, 26, 83, 118, 25, 122, 135, 116, 24, 242, 213, 196, 31, 25, 127, 155, 153, 6, 132, 244, 45, 21, 235 }
2014/11/28 15:03:43 | INFO | jvm 1 | Session ID: {84, 120, 65, 119, 78, 220, 0, 216, 29, 255, 202, 86, 198, 210, 97, 121, 235, 184, 87, 232, 34, 43, 85, 29, 148, 43, 201, 241, 189, 70, 130, 185}
2014/11/28 15:03:43 | INFO | jvm 1 | Cipher Suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
2014/11/28 15:03:43 | INFO | jvm 1 | Compression Method: 0
2014/11/28 15:03:43 | INFO | jvm 1 | Extension renegotiation_info, renegotiated_connection: <empty>
2014/11/28 15:03:43 | INFO | jvm 1 | ***
2014/11/28 15:03:43 | INFO | jvm 1 | Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
2014/11/28 15:03:43 | INFO | jvm 1 | *** Certificate chain
2014/11/28 15:03:43 | INFO | jvm 1 | chain [0] = [
2014/11/28 15:03:43 | INFO | jvm 1 | [
2014/11/28 15:03:43 | INFO | jvm 1 | Version: V3
2014/11/28 15:03:43 | INFO | jvm 1 | Subject: CN=dev-05.labs.blr.com, O=server
2014/11/28 15:03:43 | INFO | jvm 1 | Signature Algorithm: SHA256withRSA, OID = 1.2.840.113549.1.1.11
2014/11/28 15:03:43 | INFO | jvm 1 |
2014/11/28 15:03:43 | INFO | jvm 1 | Key: SunPKCS11-NSSfips RSA public key, 2048 bits (id 1, session object)
2014/11/28 15:03:43 | INFO | jvm 1 | Key: SunPKCS11-NSSfips RSA public key, 2048 bits (id 1, session object)
2014/11/28 15:03:43 | INFO | jvm 1 | modulus: 19751124565775544542661601941034719218747286997557229376272410409764009924174952830102822006739940996361158891315994655677031683410457285645708620145915789088144941408425439122384306771006790672852952487887077643219829713631271285091822690455402307000211724434432943370113476924425722411995320247744734057517566666508974254720742261526685687656494544221796453195966155694205640019924093341684193258103280171653517687458035087335731929833587535142452049552301009807817546366586239918288540321429443922231821575519420587811789981092934767950075857907111279056051594689275813767976468618202672668356345198890748632149983
2014/11/28 15:03:43 | INFO | jvm 1 | public exponent: 65537
2014/11/28 15:03:43 | INFO | jvm 1 | public exponent: 65537
2014/11/28 15:03:43 | INFO | jvm 1 | Validity: [From: Tue Nov 25 14:37:52 IST 2014,
2014/11/28 15:03:43 | INFO | jvm 1 | To: Thu Nov 01 14:37:52 IST 2114]
2014/11/28 15:03:43 | INFO | jvm 1 | Issuer: CN=dev-05.labs.blr.com, O=server
2014/11/28 15:03:43 | INFO | jvm 1 | SerialNumber: [ 0d54f951]
2014/11/28 15:03:43 | INFO | jvm 1 |
2014/11/28 15:03:43 | INFO | jvm 1 | Certificate Extensions: 1
2014/11/28 15:03:43 | INFO | jvm 1 | [1]: ObjectId: 2.5.29.14 Criticality=false
2014/11/28 15:03:43 | INFO | jvm 1 | SubjectKeyIdentifier [
2014/11/28 15:03:43 | INFO | jvm 1 | KeyIdentifier [
2014/11/28 15:03:43 | INFO | jvm 1 | 0000: 94 2D EB EF E8 04 5F 84 B2 BA F6 A5 C9 58 D3 79 .-...._......X.y
2014/11/28 15:03:43 | INFO | jvm 1 | 0010: 44 8F 40 07 D.@.
2014/11/28 15:03:43 | INFO | jvm 1 | ]
2014/11/28 15:03:43 | INFO | jvm 1 | ]
2014/11/28 15:03:43 | INFO | jvm 1 |
2014/11/28 15:03:43 | INFO | jvm 1 | ]
2014/11/28 15:03:43 | INFO | jvm 1 | Algorithm: [SHA256withRSA]
2014/11/28 15:03:43 | INFO | jvm 1 | Signature:
2014/11/28 15:03:43 | INFO | jvm 1 | 0000: 39 59 42 B8 26 F6 64 7E CA C1 33 7C 60 6A FC 80 9YB.&.d...3.`j..
2014/11/28 15:03:43 | INFO | jvm 1 | 0010: 5F AF 51 89 98 B7 AC 0C 27 DA A1 60 AD 5B 87 11 _.Q.....'..`.[..
2014/11/28 15:03:43 | INFO | jvm 1 | 0020: D8 95 E3 37 D2 CB E3 8A 6F CF 82 F3 4C AA B6 42 ...7....o...L..B
2014/11/28 15:03:43 | INFO | jvm 1 | 0030: F5 8B 67 0B D9 F2 3E FA FE 81 C5 77 78 47 E2 61 ..g...>....wxG.a
2014/11/28 15:03:43 | INFO | jvm 1 | 0040: 33 DC 97 CB FC 04 1D 99 18 84 C3 DC 28 8D 14 D7 3...........(...
2014/11/28 15:03:43 | INFO | jvm 1 | 0050: AF 71 1C E6 41 FC D1 71 CB C3 50 66 5E 28 AF EB .q..A..q..Pf^(..
2014/11/28 15:03:43 | INFO | jvm 1 | 0060: AF 80 52 CC 89 BE 0D 0B 58 1C CA 1C 34 36 BA 96 ..R.....X...46..
2014/11/28 15:03:43 | INFO | jvm 1 | 0070: F2 FE 18 73 6B F7 09 35 94 AC 8E CB F2 83 47 62 ...sk..5......Gb
2014/11/28 15:03:43 | INFO | jvm 1 | 0080: 20 FD 64 64 72 D6 89 D7 77 A7 D0 17 43 7E FF 44 .ddr...w...C..D
2014/11/28 15:03:43 | INFO | jvm 1 | 0090: 57 B5 1D 27 24 1D F5 87 86 E9 29 EF DE E7 D2 2E W..'$.....).....
2014/11/28 15:03:43 | INFO | jvm 1 | 00A0: 32 EE 3D 82 7C 53 7E 93 E9 5F 5E 9C 62 F5 31 C7 2.=..S..._^.b.1.
2014/11/28 15:03:43 | INFO | jvm 1 | 00B0: 9E 54 58 50 01 EE 58 18 81 6D 52 C0 EB CA CA 52 .TXP..X..mR....R
2014/11/28 15:03:43 | INFO | jvm 1 | 00C0: 26 CC 3C 9D E5 60 BE BE A1 E6 D5 79 66 F9 0C FD &.<..`.....yf...
2014/11/28 15:03:43 | INFO | jvm 1 | 00D0: BB 9E 36 E5 31 FC D4 68 8A 06 8D A0 0B 68 BA 2B ..6.1..h.....h.+
2014/11/28 15:03:43 | INFO | jvm 1 | 00E0: 1E AF 51 4A 6C BC 2D 7D B4 04 EA D6 DA 28 9B 64 ..QJl.-......(.d
2014/11/28 15:03:43 | INFO | jvm 1 | 00F0: F9 FF 35 7B E7 91 02 01 37 E7 C2 AA 8D 1E 48 22 ..5.....7.....H"
2014/11/28 15:03:43 | INFO | jvm 1 |
2014/11/28 15:03:43 | INFO | jvm 1 | ]
2014/11/28 15:03:43 | INFO | jvm 1 | ***
2014/11/28 15:03:43 | INFO | jvm 1 | *** ECDH ServerKeyExchange
2014/11/28 15:03:43 | INFO | jvm 1 | Signature Algorithm SHA512withRSA
2014/11/28 15:03:43 | INFO | jvm 1 | Server key: SunPKCS11-NSSfips EC public key, 256 bits (id 1668, session object)
2014/11/28 15:03:43 | INFO | jvm 1 | public x coord: 22811020849167726801730368600918463139597169803826118722525163464343792847845
2014/11/28 15:03:43 | INFO | jvm 1 | public y coord: 73886304187565809239631250457098470068449769526968865962213829575389354072377
2014/11/28 15:03:43 | INFO | jvm 1 | parameters: secp256r1 [NIST P-256, X9.62 prime256v1] (1.2.840.10045.3.1.7)
2014/11/28 15:03:43 | INFO | jvm 1 | *** ServerHelloDone
2014/11/28 15:03:43 | INFO | jvm 1 | Thread-31, WRITE: TLSv1.2 Handshake, length = 1237
2014/11/28 15:03:43 | INFO | jvm 1 | Thread-31, READ: TLSv1.2 Handshake, length = 70
2014/11/28 15:03:43 | INFO | jvm 1 | *** ECDHClientKeyExchange
2014/11/28 15:03:43 | INFO | jvm 1 | ECDH Public value: { 4, 121, 116, 89, 85, 251, 91, 15, 91, 227, 244, 77, 243, 1, 197, 145, 33, 117, 182, 143, 76, 42, 19, 121, 131, 88, 88, 58, 225, 42, 50, 178, 100, 17, 18, 128, 220, 237, 192, 247, 67, 173, 13, 185, 114, 213, 250, 172, 58, 145, 158, 237, 115, 94, 129, 246, 254, 151, 126, 190, 182, 240, 45, 57, 62 }
2014/11/28 15:03:43 | INFO | jvm 1 | SESSION KEYGEN:
2014/11/28 15:03:43 | INFO | jvm 1 | PreMaster Secret:
2014/11/28 15:03:43 | INFO | jvm 1 | (key bytes not available)
2014/11/28 15:03:43 | INFO | jvm 1 | Thread-31, handling exception: java.security.ProviderException: java.security.NoSuchAlgorithmException: no such algorithm: SunTls12MasterSecret for provider SunPKCS11-NSSfips
2014/11/28 15:03:43 | INFO | jvm 1 | %% Invalidated: [Session-136, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256]
2014/11/28 15:03:43 | INFO | jvm 1 | Thread-31, SEND TLSv1.2 ALERT: fatal, description = internal_error
2014/11/28 15:03:43 | INFO | jvm 1 | Thread-31, WRITE: TLSv1.2 Alert, length = 2
2014/11/28 15:03:43 | INFO | jvm 1 | Thread-31, called closeSocket()
2014/11/28 15:03:43 | INFO | jvm 1 | Thread-31, IOException in getSession(): javax.net.ssl.SSLException: java.security.ProviderException: java.security.NoSuchAlgorithmException: no such algorithm: SunTls12MasterSecret for provider SunPKCS11-NSSfips
2014/11/28 15:03:43 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
2014/11/28 15:03:43 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA
2014/11/28 15:03:43 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA
2014/11/28 15:03:43 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256
2014/11/28 15:03:43 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256
2014/11/28 15:03:43 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
2014/11/28 15:03:43 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
2014/11/28 15:03:43 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384
2014/11/28 15:03:43 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA
2014/11/28 15:03:43 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384
2014/11/28 15:03:43 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
2014/11/28 15:03:43 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA
2014/11/28 15:03:43 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA
2014/11/28 15:03:43 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384
2014/11/28 15:03:43 | INFO | jvm 1 | Fri Nov 28 15:03:43 IST 2014|WARNING|Thread-601|ccs.comp.clientproxy.ProxiedClientListener$ProxyConnection.run
2014/11/28 15:03:43 | INFO | jvm 1 | Error processing requests from proxied client : unestablished
2014/11/28 15:03:43 | INFO | jvm 1 | Caused by: java.security.NoSuchAlgorithmException: no such algorithm: SunTls12MasterSecret for provider SunPKCS11-NSSfips (java.security.ProviderException); Root cause: no such algorithm: SunTls12MasterSecret for provider SunPKCS11-NSSfips (java.security.NoSuchAlgorithmException)
2014/11/28 15:03:43 | INFO | jvm 1 | javax.net.ssl.SSLException: Connection has been shutdown: javax.net.ssl.SSLException: java.security.ProviderException: java.security.NoSuchAlgorithmException: no such algorithm: SunTls12MasterSecret for provider SunPKCS11-NSSfips
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.ssl.SSLSocketImpl.checkEOF(SSLSocketImpl.java:1476)
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.ssl.AppInputStream.read(AppInputStream.java:92)
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.ssl.AppInputStream.read(AppInputStream.java:69)
2014/11/28 15:03:43 | INFO | jvm 1 | at java.io.DataInputStream.readByte(DataInputStream.java:265)
2014/11/28 15:03:43 | INFO | jvm 1 | at ccs.comp.clientproxy.ProxiedClientListener$ProxyConnection.getNext(ProxiedClientListener.java:438)
2014/11/28 15:03:43 | INFO | jvm 1 | at ccs.comp.clientproxy.ProxiedClientListener$ProxyConnection.run(ProxiedClientListener.java:245)
2014/11/28 15:03:43 | INFO | jvm 1 | Caused by: javax.net.ssl.SSLException: java.security.ProviderException: java.security.NoSuchAlgorithmException: no such algorithm: SunTls12MasterSecret for provider SunPKCS11-NSSfips
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.ssl.Alerts.getSSLException(Alerts.java:208)
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.ssl.SSLSocketImpl.fatal(SSLSocketImpl.java:1884)
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.ssl.SSLSocketImpl.fatal(SSLSocketImpl.java:1842)
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.ssl.SSLSocketImpl.handleException(SSLSocketImpl.java:1825)
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:1346)
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.ssl.SSLSocketImpl.getSession(SSLSocketImpl.java:2171)
2014/11/28 15:03:43 | INFO | jvm 1 | at ccs.comp.clientproxy.ProxiedClientListener.listen(ProxiedClientListener.java:126)
2014/11/28 15:03:43 | INFO | jvm 1 | at ccs.comp.clientproxy.ProxiedClientListener.run(ProxiedClientListener.java:105)
2014/11/28 15:03:43 | INFO | jvm 1 | Caused by: java.security.ProviderException: java.security.NoSuchAlgorithmException: no such algorithm: SunTls12MasterSecret for provider SunPKCS11-NSSfips
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.ssl.Handshaker.calculateMasterSecret(Handshaker.java:1060)
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.ssl.Handshaker.calculateKeys(Handshaker.java:999)
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.ssl.ServerHandshaker.processMessage(ServerHandshaker.java:234)
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.ssl.Handshaker.processLoop(Handshaker.java:868)
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.ssl.Handshaker.process_record(Handshaker.java:804)
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.ssl.SSLSocketImpl.readRecord(SSLSocketImpl.java:1016)
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.ssl.SSLSocketImpl.performInitialHandshake(SSLSocketImpl.java:1312)
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:1339)
2014/11/28 15:03:43 | INFO | jvm 1 | ... 3 more
2014/11/28 15:03:43 | INFO | jvm 1 | Caused by: java.security.NoSuchAlgorithmException: no such algorithm: SunTls12MasterSecret for provider SunPKCS11-NSSfips
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.jca.GetInstance.getService(GetInstance.java:100)
2014/11/28 15:03:43 | INFO | jvm 1 | at javax.crypto.JceSecurity.getInstance(JceSecurity.java:109)
2014/11/28 15:03:43 | INFO | jvm 1 | at javax.crypto.KeyGenerator.getInstance(KeyGenerator.java:287)
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.ssl.JsseJce.getKeyGenerator(JsseJce.java:269)
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.ssl.Handshaker.calculateMasterSecret(Handshaker.java:1052)
2014/11/28 15:03:43 | INFO | jvm 1 | ... 10 more
2014/11/28 15:03:43 | INFO | jvm 1 |
2014/11/28 15:03:43 | INFO | jvm 1 | Fri Nov 28 15:03:43 IST 2014|SEVERE|Thread-601|Could not determine class.Could not determine method
2014/11/28 15:03:43 | INFO | jvm 1 |
2014/11/28 15:03:43 | INFO | jvm 1 | Caused by: java.security.NoSuchAlgorithmException: no such algorithm: SunTls12MasterSecret for provider SunPKCS11-NSSfips (java.security.ProviderException); Root cause: no such algorithm: SunTls12MasterSecret for provider SunPKCS11-NSSfips (java.security.NoSuchAlgorithmException)
2014/11/28 15:03:43 | INFO | jvm 1 | javax.net.ssl.SSLException: Connection has been shutdown: javax.net.ssl.SSLException: java.security.ProviderException: java.security.NoSuchAlgorithmException: no such algorithm: SunTls12MasterSecret for provider SunPKCS11-NSSfips
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.ssl.SSLSocketImpl.checkEOF(SSLSocketImpl.java:1476)
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.ssl.AppInputStream.read(AppInputStream.java:92)
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.ssl.AppInputStream.read(AppInputStream.java:69)
2014/11/28 15:03:43 | INFO | jvm 1 | at java.io.DataInputStream.readByte(DataInputStream.java:265)
2014/11/28 15:03:43 | INFO | jvm 1 | at ccs.comp.clientproxy.ProxiedClientListener$ProxyConnection.getNext(ProxiedClientListener.java:438)
2014/11/28 15:03:43 | INFO | jvm 1 | at ccs.comp.clientproxy.ProxiedClientListener$ProxyConnection.run(ProxiedClientListener.java:245)
2014/11/28 15:03:43 | INFO | jvm 1 | Caused by: javax.net.ssl.SSLException: java.security.ProviderException: java.security.NoSuchAlgorithmException: no such algorithm: SunTls12MasterSecret for provider SunPKCS11-NSSfips
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.ssl.Alerts.getSSLException(Alerts.java:208)
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.ssl.SSLSocketImpl.fatal(SSLSocketImpl.java:1884)
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.ssl.SSLSocketImpl.fatal(SSLSocketImpl.java:1842)
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.ssl.SSLSocketImpl.handleException(SSLSocketImpl.java:1825)
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:1346)
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.ssl.SSLSocketImpl.getSession(SSLSocketImpl.java:2171)
2014/11/28 15:03:43 | INFO | jvm 1 | at ccs.comp.clientproxy.ProxiedClientListener.listen(ProxiedClientListener.java:126)
2014/11/28 15:03:43 | INFO | jvm 1 | at ccs.comp.clientproxy.ProxiedClientListener.run(ProxiedClientListener.java:105)
2014/11/28 15:03:43 | INFO | jvm 1 | Caused by: java.security.ProviderException: java.security.NoSuchAlgorithmException: no such algorithm: SunTls12MasterSecret for provider SunPKCS11-NSSfips
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.ssl.Handshaker.calculateMasterSecret(Handshaker.java:1060)
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.ssl.Handshaker.calculateKeys(Handshaker.java:999)
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.ssl.ServerHandshaker.processMessage(ServerHandshaker.java:234)
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.ssl.Handshaker.processLoop(Handshaker.java:868)
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.ssl.Handshaker.process_record(Handshaker.java:804)
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.ssl.SSLSocketImpl.readRecord(SSLSocketImpl.java:1016)
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.ssl.SSLSocketImpl.performInitialHandshake(SSLSocketImpl.java:1312)
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:1339)
2014/11/28 15:03:43 | INFO | jvm 1 | ... 3 more
2014/11/28 15:03:43 | INFO | jvm 1 | Caused by: java.security.NoSuchAlgorithmException: no such algorithm: SunTls12MasterSecret for provider SunPKCS11-NSSfips
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.jca.GetInstance.getService(GetInstance.java:100)
2014/11/28 15:03:43 | INFO | jvm 1 | at javax.crypto.JceSecurity.getInstance(JceSecurity.java:109)
2014/11/28 15:03:43 | INFO | jvm 1 | at javax.crypto.KeyGenerator.getInstance(KeyGenerator.java:287)
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.ssl.JsseJce.getKeyGenerator(JsseJce.java:269)
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.ssl.Handshaker.calculateMasterSecret(Handshaker.java:1052)
2014/11/28 15:03:43 | INFO | jvm 1 | ... 10 more
2014/11/28 15:03:43 | INFO | jvm 1 |
2014/11/28 15:03:43 | INFO | jvm 1 | Thread-601, called close()
2014/11/28 15:03:43 | INFO | jvm 1 | Thread-601, called closeInternal(true)
2014/11/28 15:03:43 | INFO | jvm 1 | Allow unsafe renegotiation: false
2014/11/28 15:03:43 | INFO | jvm 1 | Allow legacy hello messages: true
2014/11/28 15:03:43 | INFO | jvm 1 | Is initial handshake: true
2014/11/28 15:03:43 | INFO | jvm 1 | Is secure renegotiation: false
2014/11/28 15:03:43 | INFO | jvm 1 | Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 for TLSv1
2014/11/28 15:03:43 | INFO | jvm 1 | Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 for TLSv1
2014/11/28 15:03:43 | INFO | jvm 1 | Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256 for TLSv1
2014/11/28 15:03:43 | INFO | jvm 1 | Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256 for TLSv1
2014/11/28 15:03:43 | INFO | jvm 1 | Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 for TLSv1
2014/11/28 15:03:43 | INFO | jvm 1 | Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 for TLSv1
2014/11/28 15:03:43 | INFO | jvm 1 | Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 for TLSv1.1
2014/11/28 15:03:43 | INFO | jvm 1 | Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 for TLSv1.1
2014/11/28 15:03:43 | INFO | jvm 1 | Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256 for TLSv1.1
2014/11/28 15:03:43 | INFO | jvm 1 | Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256 for TLSv1.1
2014/11/28 15:03:43 | INFO | jvm 1 | Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 for TLSv1.1
2014/11/28 15:03:43 | INFO | jvm 1 | Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 for TLSv1.1
2014/11/28 15:03:43 | INFO | jvm 1 | [1]: ObjectId: 2.5.29.14 Criticality=false
2014/11/28 15:03:43 | INFO | jvm 1 | SubjectKeyIdentifier [
2014/11/28 15:03:43 | INFO | jvm 1 | KeyIdentifier [
2014/11/28 15:03:43 | INFO | jvm 1 | 0000: 94 2D EB EF E8 04 5F 84 B2 BA F6 A5 C9 58 D3 79 .-...._......X.y
2014/11/28 15:03:43 | INFO | jvm 1 | 0010: 44 8F 40 07 D.@.
2014/11/28 15:03:43 | INFO | jvm 1 | ]
2014/11/28 15:03:43 | INFO | jvm 1 | ]
2014/11/28 15:03:43 | INFO | jvm 1 |
2014/11/28 15:03:43 | INFO | jvm 1 | ]
2014/11/28 15:03:43 | INFO | jvm 1 | Algorithm: [SHA256withRSA]
2014/11/28 15:03:43 | INFO | jvm 1 | Signature:
2014/11/28 15:03:43 | INFO | jvm 1 | 0000: 39 59 42 B8 26 F6 64 7E CA C1 33 7C 60 6A FC 80 9YB.&.d...3.`j..
2014/11/28 15:03:43 | INFO | jvm 1 | 0010: 5F AF 51 89 98 B7 AC 0C 27 DA A1 60 AD 5B 87 11 _.Q.....'..`.[..
2014/11/28 15:03:43 | INFO | jvm 1 | 0020: D8 95 E3 37 D2 CB E3 8A 6F CF 82 F3 4C AA B6 42 ...7....o...L..B
2014/11/28 15:03:43 | INFO | jvm 1 | 0030: F5 8B 67 0B D9 F2 3E FA FE 81 C5 77 78 47 E2 61 ..g...>....wxG.a
2014/11/28 15:03:43 | INFO | jvm 1 | 0040: 33 DC 97 CB FC 04 1D 99 18 84 C3 DC 28 8D 14 D7 3...........(...
2014/11/28 15:03:43 | INFO | jvm 1 | 0050: AF 71 1C E6 41 FC D1 71 CB C3 50 66 5E 28 AF EB .q..A..q..Pf^(..
2014/11/28 15:03:43 | INFO | jvm 1 | 0060: AF 80 52 CC 89 BE 0D 0B 58 1C CA 1C 34 36 BA 96 ..R.....X...46..
2014/11/28 15:03:43 | INFO | jvm 1 | 0070: F2 FE 18 73 6B F7 09 35 94 AC 8E CB F2 83 47 62 ...sk..5......Gb
2014/11/28 15:03:43 | INFO | jvm 1 | 0080: 20 FD 64 64 72 D6 89 D7 77 A7 D0 17 43 7E FF 44 .ddr...w...C..D
2014/11/28 15:03:43 | INFO | jvm 1 | 0090: 57 B5 1D 27 24 1D F5 87 86 E9 29 EF DE E7 D2 2E W..'$.....).....
2014/11/28 15:03:43 | INFO | jvm 1 | 00A0: 32 EE 3D 82 7C 53 7E 93 E9 5F 5E 9C 62 F5 31 C7 2.=..S..._^.b.1.
2014/11/28 15:03:43 | INFO | jvm 1 | 00B0: 9E 54 58 50 01 EE 58 18 81 6D 52 C0 EB CA CA 52 .TXP..X..mR....R
2014/11/28 15:03:43 | INFO | jvm 1 | 00C0: 26 CC 3C 9D E5 60 BE BE A1 E6 D5 79 66 F9 0C FD &.<..`.....yf...
2014/11/28 15:03:43 | INFO | jvm 1 | 00D0: BB 9E 36 E5 31 FC D4 68 8A 06 8D A0 0B 68 BA 2B ..6.1..h.....h.+
2014/11/28 15:03:43 | INFO | jvm 1 | 00E0: 1E AF 51 4A 6C BC 2D 7D B4 04 EA D6 DA 28 9B 64 ..QJl.-......(.d
2014/11/28 15:03:43 | INFO | jvm 1 | 00F0: F9 FF 35 7B E7 91 02 01 37 E7 C2 AA 8D 1E 48 22 ..5.....7.....H"
2014/11/28 15:03:43 | INFO | jvm 1 |
2014/11/28 15:03:43 | INFO | jvm 1 | ]
2014/11/28 15:03:43 | INFO | jvm 1 | ***
2014/11/28 15:03:43 | INFO | jvm 1 | *** ECDH ServerKeyExchange
2014/11/28 15:03:43 | INFO | jvm 1 | Signature Algorithm SHA512withRSA
2014/11/28 15:03:43 | INFO | jvm 1 | Server key: SunPKCS11-NSSfips EC public key, 256 bits (id 1668, session object)
2014/11/28 15:03:43 | INFO | jvm 1 | public x coord: 22811020849167726801730368600918463139597169803826118722525163464343792847845
2014/11/28 15:03:43 | INFO | jvm 1 | public y coord: 73886304187565809239631250457098470068449769526968865962213829575389354072377
2014/11/28 15:03:43 | INFO | jvm 1 | parameters: secp256r1 [NIST P-256, X9.62 prime256v1] (1.2.840.10045.3.1.7)
2014/11/28 15:03:43 | INFO | jvm 1 | *** ServerHelloDone
2014/11/28 15:03:43 | INFO | jvm 1 | Thread-31, WRITE: TLSv1.2 Handshake, length = 1237
2014/11/28 15:03:43 | INFO | jvm 1 | Thread-31, READ: TLSv1.2 Handshake, length = 70
2014/11/28 15:03:43 | INFO | jvm 1 | *** ECDHClientKeyExchange
2014/11/28 15:03:43 | INFO | jvm 1 | ECDH Public value: { 4, 121, 116, 89, 85, 251, 91, 15, 91, 227, 244, 77, 243, 1, 197, 145, 33, 117, 182, 143, 76, 42, 19, 121, 131, 88, 88, 58, 225, 42, 50, 178, 100, 17, 18, 128, 220, 237, 192, 247, 67, 173, 13, 185, 114, 213, 250, 172, 58, 145, 158, 237, 115, 94, 129, 246, 254, 151, 126, 190, 182, 240, 45, 57, 62 }
2014/11/28 15:03:43 | INFO | jvm 1 | SESSION KEYGEN:
2014/11/28 15:03:43 | INFO | jvm 1 | PreMaster Secret:
2014/11/28 15:03:43 | INFO | jvm 1 | (key bytes not available)
2014/11/28 15:03:43 | INFO | jvm 1 | Thread-31, handling exception: java.security.ProviderException: java.security.NoSuchAlgorithmException: no such algorithm: SunTls12MasterSecret for provider SunPKCS11-NSSfips
2014/11/28 15:03:43 | INFO | jvm 1 | %% Invalidated: [Session-136, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256]
2014/11/28 15:03:43 | INFO | jvm 1 | Thread-31, SEND TLSv1.2 ALERT: fatal, description = internal_error
2014/11/28 15:03:43 | INFO | jvm 1 | Thread-31, WRITE: TLSv1.2 Alert, length = 2
2014/11/28 15:03:43 | INFO | jvm 1 | Thread-31, called closeSocket()
2014/11/28 15:03:43 | INFO | jvm 1 | Thread-31, IOException in getSession(): javax.net.ssl.SSLException: java.security.ProviderException: java.security.NoSuchAlgorithmException: no such algorithm: SunTls12MasterSecret for provider SunPKCS11-NSSfips
2014/11/28 15:03:43 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
2014/11/28 15:03:43 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA
2014/11/28 15:03:43 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA
2014/11/28 15:03:43 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256
2014/11/28 15:03:43 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256
2014/11/28 15:03:43 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
2014/11/28 15:03:43 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
2014/11/28 15:03:43 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384
2014/11/28 15:03:43 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA
2014/11/28 15:03:43 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384
2014/11/28 15:03:43 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
2014/11/28 15:03:43 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA
2014/11/28 15:03:43 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA
2014/11/28 15:03:43 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384
2014/11/28 15:03:43 | INFO | jvm 1 | Fri Nov 28 15:03:43 IST 2014|WARNING|Thread-601|ccs.comp.clientproxy.ProxiedClientListener$ProxyConnection.run
2014/11/28 15:03:43 | INFO | jvm 1 | Error processing requests from proxied client : unestablished
2014/11/28 15:03:43 | INFO | jvm 1 | Caused by: java.security.NoSuchAlgorithmException: no such algorithm: SunTls12MasterSecret for provider SunPKCS11-NSSfips (java.security.ProviderException); Root cause: no such algorithm: SunTls12MasterSecret for provider SunPKCS11-NSSfips (java.security.NoSuchAlgorithmException)
2014/11/28 15:03:43 | INFO | jvm 1 | javax.net.ssl.SSLException: Connection has been shutdown: javax.net.ssl.SSLException: java.security.ProviderException: java.security.NoSuchAlgorithmException: no such algorithm: SunTls12MasterSecret for provider SunPKCS11-NSSfips
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.ssl.SSLSocketImpl.checkEOF(SSLSocketImpl.java:1476)
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.ssl.AppInputStream.read(AppInputStream.java:92)
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.ssl.AppInputStream.read(AppInputStream.java:69)
2014/11/28 15:03:43 | INFO | jvm 1 | at java.io.DataInputStream.readByte(DataInputStream.java:265)
2014/11/28 15:03:43 | INFO | jvm 1 | at ccs.comp.clientproxy.ProxiedClientListener$ProxyConnection.getNext(ProxiedClientListener.java:438)
2014/11/28 15:03:43 | INFO | jvm 1 | at ccs.comp.clientproxy.ProxiedClientListener$ProxyConnection.run(ProxiedClientListener.java:245)
2014/11/28 15:03:43 | INFO | jvm 1 | Caused by: javax.net.ssl.SSLException: java.security.ProviderException: java.security.NoSuchAlgorithmException: no such algorithm: SunTls12MasterSecret for provider SunPKCS11-NSSfips
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.ssl.Alerts.getSSLException(Alerts.java:208)
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.ssl.SSLSocketImpl.fatal(SSLSocketImpl.java:1884)
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.ssl.SSLSocketImpl.fatal(SSLSocketImpl.java:1842)
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.ssl.SSLSocketImpl.handleException(SSLSocketImpl.java:1825)
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:1346)
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.ssl.SSLSocketImpl.getSession(SSLSocketImpl.java:2171)
2014/11/28 15:03:43 | INFO | jvm 1 | at ccs.comp.clientproxy.ProxiedClientListener.listen(ProxiedClientListener.java:126)
2014/11/28 15:03:43 | INFO | jvm 1 | at ccs.comp.clientproxy.ProxiedClientListener.run(ProxiedClientListener.java:105)
2014/11/28 15:03:43 | INFO | jvm 1 | Caused by: java.security.ProviderException: java.security.NoSuchAlgorithmException: no such algorithm: SunTls12MasterSecret for provider SunPKCS11-NSSfips
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.ssl.Handshaker.calculateMasterSecret(Handshaker.java:1060)
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.ssl.Handshaker.calculateKeys(Handshaker.java:999)
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.ssl.ServerHandshaker.processMessage(ServerHandshaker.java:234)
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.ssl.Handshaker.processLoop(Handshaker.java:868)
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.ssl.Handshaker.process_record(Handshaker.java:804)
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.ssl.SSLSocketImpl.readRecord(SSLSocketImpl.java:1016)
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.ssl.SSLSocketImpl.performInitialHandshake(SSLSocketImpl.java:1312)
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:1339)
2014/11/28 15:03:43 | INFO | jvm 1 | ... 3 more
2014/11/28 15:03:43 | INFO | jvm 1 | Caused by: java.security.NoSuchAlgorithmException: no such algorithm: SunTls12MasterSecret for provider SunPKCS11-NSSfips
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.jca.GetInstance.getService(GetInstance.java:100)
2014/11/28 15:03:43 | INFO | jvm 1 | at javax.crypto.JceSecurity.getInstance(JceSecurity.java:109)
2014/11/28 15:03:43 | INFO | jvm 1 | at javax.crypto.KeyGenerator.getInstance(KeyGenerator.java:287)
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.ssl.JsseJce.getKeyGenerator(JsseJce.java:269)
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.ssl.Handshaker.calculateMasterSecret(Handshaker.java:1052)
2014/11/28 15:03:43 | INFO | jvm 1 | ... 10 more
2014/11/28 15:03:43 | INFO | jvm 1 |
2014/11/28 15:03:43 | INFO | jvm 1 | Fri Nov 28 15:03:43 IST 2014|SEVERE|Thread-601|Could not determine class.Could not determine method
2014/11/28 15:03:43 | INFO | jvm 1 |
2014/11/28 15:03:43 | INFO | jvm 1 | Caused by: java.security.NoSuchAlgorithmException: no such algorithm: SunTls12MasterSecret for provider SunPKCS11-NSSfips (java.security.ProviderException); Root cause: no such algorithm: SunTls12MasterSecret for provider SunPKCS11-NSSfips (java.security.NoSuchAlgorithmException)
2014/11/28 15:03:43 | INFO | jvm 1 | javax.net.ssl.SSLException: Connection has been shutdown: javax.net.ssl.SSLException: java.security.ProviderException: java.security.NoSuchAlgorithmException: no such algorithm: SunTls12MasterSecret for provider SunPKCS11-NSSfips
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.ssl.SSLSocketImpl.checkEOF(SSLSocketImpl.java:1476)
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.ssl.AppInputStream.read(AppInputStream.java:92)
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.ssl.AppInputStream.read(AppInputStream.java:69)
2014/11/28 15:03:43 | INFO | jvm 1 | at java.io.DataInputStream.readByte(DataInputStream.java:265)
2014/11/28 15:03:43 | INFO | jvm 1 | at ccs.comp.clientproxy.ProxiedClientListener$ProxyConnection.getNext(ProxiedClientListener.java:438)
2014/11/28 15:03:43 | INFO | jvm 1 | at ccs.comp.clientproxy.ProxiedClientListener$ProxyConnection.run(ProxiedClientListener.java:245)
2014/11/28 15:03:43 | INFO | jvm 1 | Caused by: javax.net.ssl.SSLException: java.security.ProviderException: java.security.NoSuchAlgorithmException: no such algorithm: SunTls12MasterSecret for provider SunPKCS11-NSSfips
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.ssl.Alerts.getSSLException(Alerts.java:208)
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.ssl.SSLSocketImpl.fatal(SSLSocketImpl.java:1884)
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.ssl.SSLSocketImpl.fatal(SSLSocketImpl.java:1842)
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.ssl.SSLSocketImpl.handleException(SSLSocketImpl.java:1825)
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:1346)
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.ssl.SSLSocketImpl.getSession(SSLSocketImpl.java:2171)
2014/11/28 15:03:43 | INFO | jvm 1 | at ccs.comp.clientproxy.ProxiedClientListener.listen(ProxiedClientListener.java:126)
2014/11/28 15:03:43 | INFO | jvm 1 | at ccs.comp.clientproxy.ProxiedClientListener.run(ProxiedClientListener.java:105)
2014/11/28 15:03:43 | INFO | jvm 1 | Caused by: java.security.ProviderException: java.security.NoSuchAlgorithmException: no such algorithm: SunTls12MasterSecret for provider SunPKCS11-NSSfips
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.ssl.Handshaker.calculateMasterSecret(Handshaker.java:1060)
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.ssl.Handshaker.calculateKeys(Handshaker.java:999)
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.ssl.ServerHandshaker.processMessage(ServerHandshaker.java:234)
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.ssl.Handshaker.processLoop(Handshaker.java:868)
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.ssl.Handshaker.process_record(Handshaker.java:804)
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.ssl.SSLSocketImpl.readRecord(SSLSocketImpl.java:1016)
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.ssl.SSLSocketImpl.performInitialHandshake(SSLSocketImpl.java:1312)
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:1339)
2014/11/28 15:03:43 | INFO | jvm 1 | ... 3 more
2014/11/28 15:03:43 | INFO | jvm 1 | Caused by: java.security.NoSuchAlgorithmException: no such algorithm: SunTls12MasterSecret for provider SunPKCS11-NSSfips
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.jca.GetInstance.getService(GetInstance.java:100)
2014/11/28 15:03:43 | INFO | jvm 1 | at javax.crypto.JceSecurity.getInstance(JceSecurity.java:109)
2014/11/28 15:03:43 | INFO | jvm 1 | at javax.crypto.KeyGenerator.getInstance(KeyGenerator.java:287)
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.ssl.JsseJce.getKeyGenerator(JsseJce.java:269)
2014/11/28 15:03:43 | INFO | jvm 1 | at sun.security.ssl.Handshaker.calculateMasterSecret(Handshaker.java:1052)
2014/11/28 15:03:43 | INFO | jvm 1 | ... 10 more
2014/11/28 15:03:43 | INFO | jvm 1 |
2014/11/28 15:03:43 | INFO | jvm 1 | Thread-601, called close()
2014/11/28 15:03:43 | INFO | jvm 1 | Thread-601, called closeInternal(true)
2014/11/28 15:03:43 | INFO | jvm 1 | Allow unsafe renegotiation: false
2014/11/28 15:03:43 | INFO | jvm 1 | Allow legacy hello messages: true
2014/11/28 15:03:43 | INFO | jvm 1 | Is initial handshake: true
2014/11/28 15:03:43 | INFO | jvm 1 | Is secure renegotiation: false
2014/11/28 15:03:43 | INFO | jvm 1 | Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 for TLSv1
2014/11/28 15:03:43 | INFO | jvm 1 | Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 for TLSv1
2014/11/28 15:03:43 | INFO | jvm 1 | Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256 for TLSv1
2014/11/28 15:03:43 | INFO | jvm 1 | Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256 for TLSv1
2014/11/28 15:03:43 | INFO | jvm 1 | Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 for TLSv1
2014/11/28 15:03:43 | INFO | jvm 1 | Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 for TLSv1
2014/11/28 15:03:43 | INFO | jvm 1 | Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 for TLSv1.1
2014/11/28 15:03:43 | INFO | jvm 1 | Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 for TLSv1.1
2014/11/28 15:03:43 | INFO | jvm 1 | Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256 for TLSv1.1
2014/11/28 15:03:43 | INFO | jvm 1 | Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256 for TLSv1.1
2014/11/28 15:03:43 | INFO | jvm 1 | Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 for TLSv1.1
2014/11/28 15:03:43 | INFO | jvm 1 | Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 for TLSv1.1
2014/11/28 15:03:43 | INFO | jvm 1 | qtp1981883520-744, READ: TLSv1.1 Alert, length = 48
2014/11/28 15:03:43 | INFO | jvm 1 | qtp1981883520-744, RECV TLSv1.1 ALERT: warning, close_notify
2014/11/28 15:03:43 | INFO | jvm 1 | qtp1981883520-744, closeInboundInternal()
2014/11/28 15:03:43 | INFO | jvm 1 | qtp1981883520-744, closeOutboundInternal()
2014/11/28 15:03:43 | INFO | jvm 1 | qtp1981883520-744, SEND TLSv1.1 ALERT: warning, description = close_notify
2014/11/28 15:03:43 | INFO | jvm 1 | qtp1981883520-744, WRITE: TLSv1.1 Alert, length = 48
2014/11/28 15:03:44 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
2014/11/28 15:03:44 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA
2014/11/28 15:03:44 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA
2014/11/28 15:03:44 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256
2014/11/28 15:03:44 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256
2014/11/28 15:03:44 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
2014/11/28 15:03:44 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
2014/11/28 15:03:44 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384
2014/11/28 15:03:44 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA
2014/11/28 15:03:44 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384
2014/11/28 15:03:44 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
2014/11/28 15:03:44 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA
2014/11/28 15:03:44 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA
2014/11/28 15:03:44 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384
2014/11/28 15:03:46 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
2014/11/28 15:03:46 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA
2014/11/28 15:03:46 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA
2014/11/28 15:03:46 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256
2014/11/28 15:03:46 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256
2014/11/28 15:03:46 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
2014/11/28 15:03:46 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
2014/11/28 15:03:46 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384
2014/11/28 15:03:46 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA
2014/11/28 15:03:46 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384
2014/11/28 15:03:46 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
2014/11/28 15:03:46 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA
2014/11/28 15:03:46 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA
2014/11/28 15:03:46 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384
2014/11/28 15:03:47 | INFO | jvm 1 | Thread-31, handling exception: java.net.SocketException: Connection reset
2014/11/28 15:03:47 | INFO | jvm 1 | Thread-31, SEND TLSv1 ALERT: fatal, description = unexpected_message
2014/11/28 15:03:47 | INFO | jvm 1 | Thread-31, WRITE: TLSv1 Alert, length = 2
2014/11/28 15:03:47 | INFO | jvm 1 | Thread-31, Exception sending alert: java.net.SocketException: Broken pipe
2014/11/28 15:03:47 | INFO | jvm 1 | Thread-31, called closeSocket()
2014/11/28 15:03:47 | INFO | jvm 1 | Thread-31, IOException in getSession(): java.net.SocketException: Connection reset
2014/11/28 15:03:47 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
2014/11/28 15:03:47 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA
2014/11/28 15:03:47 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA
2014/11/28 15:03:47 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256
2014/11/28 15:03:47 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256
2014/11/28 15:03:47 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
2014/11/28 15:03:47 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
2014/11/28 15:03:47 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384
2014/11/28 15:03:47 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA
2014/11/28 15:03:47 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384
2014/11/28 15:03:47 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
2014/11/28 15:03:47 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA
2014/11/28 15:03:47 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA
2014/11/28 15:03:47 | INFO | jvm 1 | Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384
2014/11/28 15:03:47 | INFO | jvm 1 | Fri Nov 28 15:03:47 IST 2014|WARNING|Thread-603|ccs.comp.clientproxy.ProxiedClientListener$ProxyConnection.run
2014/11/28 15:03:47 | INFO | jvm 1 | Error processing requests from proxied client : unestablished
2014/11/28 15:03:47 | INFO | jvm 1 | Caused by: java.net.SocketException: Connection reset (javax.net.ssl.SSLException); Root cause: Connection reset (java.net.SocketException)
2014/11/28 15:03:47 | INFO | jvm 1 | javax.net.ssl.SSLException: Connection has been shutdown: javax.net.ssl.SSLException: java.net.SocketException: Connection reset
2014/11/28 15:03:47 | INFO | jvm 1 | at sun.security.ssl.SSLSocketImpl.checkEOF(SSLSocketImpl.java:1476)
2014/11/28 15:03:47 | INFO | jvm 1 | at sun.security.ssl.AppInputStream.read(AppInputStream.java:92)
2014/11/28 15:03:47 | INFO | jvm 1 | at sun.security.ssl.AppInputStream.read(AppInputStream.java:69)
2014/11/28 15:03:47 | INFO | jvm 1 | at java.io.DataInputStream.readByte(DataInputStream.java:265)
2014/11/28 15:03:47 | INFO | jvm 1 | at ccs.comp.clientproxy.ProxiedClientListener$ProxyConnection.getNext(ProxiedClientListener.java:438)
2014/11/28 15:03:47 | INFO | jvm 1 | at ccs.comp.clientproxy.ProxiedClientListener$ProxyConnection.run(ProxiedClientListener.java:245)
2014/11/28 15:03:47 | INFO | jvm 1 | Caused by: javax.net.ssl.SSLException: java.net.SocketException: Connection reset
2014/11/28 15:03:47 | INFO | jvm 1 | at sun.security.ssl.Alerts.getSSLException(Alerts.java:208)
2014/11/28 15:03:47 | INFO | jvm 1 | at sun.security.ssl.SSLSocketImpl.fatal(SSLSocketImpl.java:1884)
2014/11/28 15:03:47 | INFO | jvm 1 | at sun.security.ssl.SSLSocketImpl.fatal(SSLSocketImpl.java:1842)
2014/11/28 15:03:47 | INFO | jvm 1 | at sun.security.ssl.SSLSocketImpl.handleException(SSLSocketImpl.java:1806)
2014/11/28 15:03:47 | INFO | jvm 1 | at sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:1346)
2014/11/28 15:03:47 | INFO | jvm 1 | at sun.security.ssl.SSLSocketImpl.getSession(SSLSocketImpl.java:2171)
2014/11/28 15:03:47 | INFO | jvm 1 | at ccs.comp.clientproxy.ProxiedClientListener.listen(ProxiedClientListener.java:126)
2014/11/28 15:03:47 | INFO | jvm 1 | at ccs.comp.clientproxy.ProxiedClientListener.run(ProxiedClientListener.java:105)
2014/11/28 15:03:47 | INFO | jvm 1 | Caused by: java.net.SocketException: Connection reset
2014/11/28 15:03:47 | INFO | jvm 1 | at java.net.SocketInputStream.read(SocketInputStream.java:196)
2014/11/28 15:03:47 | INFO | jvm 1 | at java.net.SocketInputStream.read(SocketInputStream.java:122)
2014/11/28 15:03:47 | INFO | jvm 1 | at sun.security.ssl.InputRecord.readFully(InputRecord.java:442)
2014/11/28 15:03:47 | INFO | jvm 1 | at sun.security.ssl.InputRecord.read(InputRecord.java:480)
2014/11/28 15:03:47 | INFO | jvm 1 | at sun.security.ssl.SSLSocketImpl.readRecord(SSLSocketImpl.java:927)
2014/11/28 15:03:47 | INFO | jvm 1 | at sun.security.ssl.SSLSocketImpl.performInitialHandshake(SSLSocketImpl.java:1312)
2014/11/28 15:03:47 | INFO | jvm 1 | at sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:1339)
2014/11/28 15:03:47 | INFO | jvm 1 | ... 3 more
2014/11/28 15:03:47 | INFO | jvm 1 |
2014/11/28 15:03:47 | INFO | jvm 1 | Fri Nov 28 15:03:47 IST 2014|SEVERE|Thread-603|Could not determine class.Could not determine method
2014/11/28 15:03:47 | INFO | jvm 1 |
2014/11/28 15:03:47 | INFO | jvm 1 | Caused by: java.net.SocketException: Connection reset (javax.net.ssl.SSLException); Root cause: Connection reset (java.net.SocketException)
2014/11/28 15:03:47 | INFO | jvm 1 | javax.net.ssl.SSLException: Connection has been shutdown: javax.net.ssl.SSLException: java.net.SocketException: Connection reset
2014/11/28 15:03:47 | INFO | jvm 1 | at sun.security.ssl.SSLSocketImpl.checkEOF(SSLSocketImpl.java:1476)
2014/11/28 15:03:47 | INFO | jvm 1 | at sun.security.ssl.AppInputStream.read(AppInputStream.java:92)
2014/11/28 15:03:47 | INFO | jvm 1 | at sun.security.ssl.AppInputStream.read(AppInputStream.java:69)
2014/11/28 15:03:47 | INFO | jvm 1 | at java.io.DataInputStream.readByte(DataInputStream.java:265)
2014/11/28 15:03:47 | INFO | jvm 1 | at ccs.comp.clientproxy.ProxiedClientListener$ProxyConnection.getNext(ProxiedClientListener.java:438)
2014/11/28 15:03:47 | INFO | jvm 1 | at ccs.comp.clientproxy.ProxiedClientListener$ProxyConnection.run(ProxiedClientListener.java:245)
2014/11/28 15:03:47 | INFO | jvm 1 | Caused by: javax.net.ssl.SSLException: java.net.SocketException: Connection reset
2014/11/28 15:03:47 | INFO | jvm 1 | at sun.security.ssl.Alerts.getSSLException(Alerts.java:208)
2014/11/28 15:03:47 | INFO | jvm 1 | at sun.security.ssl.SSLSocketImpl.fatal(SSLSocketImpl.java:1884)
2014/11/28 15:03:47 | INFO | jvm 1 | at sun.security.ssl.SSLSocketImpl.fatal(SSLSocketImpl.java:1842)
2014/11/28 15:03:47 | INFO | jvm 1 | at sun.security.ssl.SSLSocketImpl.handleException(SSLSocketImpl.java:1806)
2014/11/28 15:03:47 | INFO | jvm 1 | at sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:1346)
2014/11/28 15:03:47 | INFO | jvm 1 | at sun.security.ssl.SSLSocketImpl.getSession(SSLSocketImpl.java:2171)
2014/11/28 15:03:47 | INFO | jvm 1 | at ccs.comp.clientproxy.ProxiedClientListener.listen(ProxiedClientListener.java:126)
2014/11/28 15:03:47 | INFO | jvm 1 | at ccs.comp.clientproxy.ProxiedClientListener.run(ProxiedClientListener.java:105)
2014/11/28 15:03:47 | INFO | jvm 1 | Caused by: java.net.SocketException: Connection reset
2014/11/28 15:03:47 | INFO | jvm 1 | at java.net.SocketInputStream.read(SocketInputStream.java:196)
2014/11/28 15:03:47 | INFO | jvm 1 | at java.net.SocketInputStream.read(SocketInputStream.java:122)
2014/11/28 15:03:47 | INFO | jvm 1 | at sun.security.ssl.InputRecord.readFully(InputRecord.java:442)
2014/11/28 15:03:47 | INFO | jvm 1 | at sun.security.ssl.InputRecord.read(InputRecord.java:480)
2014/11/28 15:03:47 | INFO | jvm 1 | at sun.security.ssl.SSLSocketImpl.readRecord(SSLSocketImpl.java:927)
2014/11/28 15:03:47 | INFO | jvm 1 | at sun.security.ssl.SSLSocketImpl.performInitialHandshake(SSLSocketImpl.java:1312)
2014/11/28 15:03:47 | INFO | jvm 1 | at sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:1339)
2014/11/28 15:03:47 | INFO | jvm 1 | ... 3 more
2014/11/28 15:03:47 | INFO | jvm 1 |
2014/11/28 15:03:47 | INFO | jvm 1 | Thread-603, called close()
2014/11/28 15:03:47 | INFO | jvm 1 | Thread-603, called closeInternal(true)
2014/11/28 15:03:47 | INFO | jvm 1 | at java.io.DataInputStream.readByte(DataInputStream.java:265)
2014/11/28 15:03:47 | INFO | jvm 1 | at ccs.comp.clientproxy.ProxiedClientListener$ProxyConnection.getNext(ProxiedClientListener.java:438)
2014/11/28 15:03:47 | INFO | jvm 1 | at ccs.comp.clientproxy.ProxiedClientListener$ProxyConnection.run(ProxiedClientListener.java:245)
2014/11/28 15:03:47 | INFO | jvm 1 | Caused by: javax.net.ssl.SSLException: java.net.SocketException: Connection reset
2014/11/28 15:03:47 | INFO | jvm 1 | at sun.security.ssl.Alerts.getSSLException(Alerts.java:208)
2014/11/28 15:03:47 | INFO | jvm 1 | at sun.security.ssl.SSLSocketImpl.fatal(SSLSocketImpl.java:1884)
2014/11/28 15:03:47 | INFO | jvm 1 | at sun.security.ssl.SSLSocketImpl.fatal(SSLSocketImpl.java:1842)
2014/11/28 15:03:47 | INFO | jvm 1 | at sun.security.ssl.SSLSocketImpl.handleException(SSLSocketImpl.java:1806)
2014/11/28 15:03:47 | INFO | jvm 1 | at sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:1346)
2014/11/28 15:03:47 | INFO | jvm 1 | at sun.security.ssl.SSLSocketImpl.getSession(SSLSocketImpl.java:2171)
2014/11/28 15:03:47 | INFO | jvm 1 | at ccs.comp.clientproxy.ProxiedClientListener.listen(ProxiedClientListener.java:126)
2014/11/28 15:03:47 | INFO | jvm 1 | at ccs.comp.clientproxy.ProxiedClientListener.run(ProxiedClientListener.java:105)
2014/11/28 15:03:47 | INFO | jvm 1 | Caused by: java.net.SocketException: Connection reset
2014/11/28 15:03:47 | INFO | jvm 1 | at java.net.SocketInputStream.read(SocketInputStream.java:196)
2014/11/28 15:03:47 | INFO | jvm 1 | at java.net.SocketInputStream.read(SocketInputStream.java:122)
2014/11/28 15:03:47 | INFO | jvm 1 | at sun.security.ssl.InputRecord.readFully(InputRecord.java:442)
2014/11/28 15:03:47 | INFO | jvm 1 | at sun.security.ssl.InputRecord.read(InputRecord.java:480)
2014/11/28 15:03:47 | INFO | jvm 1 | at sun.security.ssl.SSLSocketImpl.readRecord(SSLSocketImpl.java:927)
2014/11/28 15:03:47 | INFO | jvm 1 | at sun.security.ssl.SSLSocketImpl.performInitialHandshake(SSLSocketImpl.java:1312)
2014/11/28 15:03:47 | INFO | jvm 1 | at sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:1339)
2014/11/28 15:03:47 | INFO | jvm 1 | ... 3 more
2014/11/28 15:03:47 | INFO | jvm 1 |
2014/11/28 15:03:47 | INFO | jvm 1 | Fri Nov 28 15:03:47 IST 2014|SEVERE|Thread-603|Could not determine class.Could not determine method
2014/11/28 15:03:47 | INFO | jvm 1 |
2014/11/28 15:03:47 | INFO | jvm 1 | Caused by: java.net.SocketException: Connection reset (javax.net.ssl.SSLException); Root cause: Connection reset (java.net.SocketException)
2014/11/28 15:03:47 | INFO | jvm 1 | javax.net.ssl.SSLException: Connection has been shutdown: javax.net.ssl.SSLException: java.net.SocketException: Connection reset
2014/11/28 15:03:47 | INFO | jvm 1 | at sun.security.ssl.SSLSocketImpl.checkEOF(SSLSocketImpl.java:1476)
2014/11/28 15:03:47 | INFO | jvm 1 | at sun.security.ssl.AppInputStream.read(AppInputStream.java:92)
2014/11/28 15:03:47 | INFO | jvm 1 | at sun.security.ssl.AppInputStream.read(AppInputStream.java:69)
2014/11/28 15:03:47 | INFO | jvm 1 | at java.io.DataInputStream.readByte(DataInputStream.java:265)
2014/11/28 15:03:47 | INFO | jvm 1 | at ccs.comp.clientproxy.ProxiedClientListener$ProxyConnection.getNext(ProxiedClientListener.java:438)
2014/11/28 15:03:47 | INFO | jvm 1 | at ccs.comp.clientproxy.ProxiedClientListener$ProxyConnection.run(ProxiedClientListener.java:245)
2014/11/28 15:03:47 | INFO | jvm 1 | Caused by: javax.net.ssl.SSLException: java.net.SocketException: Connection reset
2014/11/28 15:03:47 | INFO | jvm 1 | at sun.security.ssl.Alerts.getSSLException(Alerts.java:208)
2014/11/28 15:03:47 | INFO | jvm 1 | at sun.security.ssl.SSLSocketImpl.fatal(SSLSocketImpl.java:1884)
2014/11/28 15:03:47 | INFO | jvm 1 | at sun.security.ssl.SSLSocketImpl.fatal(SSLSocketImpl.java:1842)
2014/11/28 15:03:47 | INFO | jvm 1 | at sun.security.ssl.SSLSocketImpl.handleException(SSLSocketImpl.java:1806)
2014/11/28 15:03:47 | INFO | jvm 1 | at sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:1346)
2014/11/28 15:03:47 | INFO | jvm 1 | at sun.security.ssl.SSLSocketImpl.getSession(SSLSocketImpl.java:2171)
2014/11/28 15:03:47 | INFO | jvm 1 | at ccs.comp.clientproxy.ProxiedClientListener.listen(ProxiedClientListener.java:126)
2014/11/28 15:03:47 | INFO | jvm 1 | at ccs.comp.clientproxy.ProxiedClientListener.run(ProxiedClientListener.java:105)
2014/11/28 15:03:47 | INFO | jvm 1 | Caused by: java.net.SocketException: Connection reset
2014/11/28 15:03:47 | INFO | jvm 1 | at java.net.SocketInputStream.read(SocketInputStream.java:196)
2014/11/28 15:03:47 | INFO | jvm 1 | at java.net.SocketInputStream.read(SocketInputStream.java:122)
2014/11/28 15:03:47 | INFO | jvm 1 | at sun.security.ssl.InputRecord.readFully(InputRecord.java:442)
2014/11/28 15:03:47 | INFO | jvm 1 | at sun.security.ssl.InputRecord.read(InputRecord.java:480)
2014/11/28 15:03:47 | INFO | jvm 1 | at sun.security.ssl.SSLSocketImpl.readRecord(SSLSocketImpl.java:927)
2014/11/28 15:03:47 | INFO | jvm 1 | at sun.security.ssl.SSLSocketImpl.performInitialHandshake(SSLSocketImpl.java:1312)
2014/11/28 15:03:47 | INFO | jvm 1 | at sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:1339)
2014/11/28 15:03:47 | INFO | jvm 1 | ... 3 more
2014/11/28 15:03:47 | INFO | jvm 1 |
2014/11/28 15:03:47 | INFO | jvm 1 | Thread-603, called close()
2014/11/28 15:03:47 | INFO | jvm 1 | Thread-603, called closeInternal(true)
REPRODUCIBILITY :
This bug can be reproduced always.
CUSTOMER SUBMITTED WORKAROUND :
One of the workarounds for this issue is to use Java 1.7u72 in the client with "TLS 1.2 disabled" in the Java Control Panel of the client machine. But this is not ideal since Java 1.7u72 is an older version.