-
Bug
-
Resolution: Not an Issue
-
P3
-
None
-
8u65
*** ClientHello, TLSv1
RandomCookie: GMT: 1498014313 bytes = { 173, 87, 70, 154, 94, 166, 135, 161,
99, 168, 152,
71, 173, 28, 15, 99, 229, 217, 227, 4, 70, 120, 24, 31, 20, 206, 34, 103 }
Session ID: {89, 74, 226, 84, 78, 70, 158, 181, 55, 182, 215, 247, 61, 60,
177, 103, 159, 2
15, 195, 152, 207, 29, 119, 54, 1, 224, 47, 149, 66, 200, 113, 237}
Cipher Suites: [TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA,
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TL
S_RSA_WITH_AES_128_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA,
TLS_ECDH_RSA_WITH_AES_128_C
BC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA,
TLS_ECDHE_ECDSA_
WITH_3DES_EDE_CBC_SHA, TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA,
SSL_RSA_WITH_3DES_EDE_CBC_SHA, T
LS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA,
SSL_DHE_RSA_WITH_3D
ES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA,
TLS_ECDHE_ECDSA_WITH_RC4_128_SHA, TLS_ECD
HE_RSA_WITH_RC4_128_SHA, SSL_RSA_WITH_RC4_128_SHA,
TLS_ECDH_ECDSA_WITH_RC4_128_SHA, TLS_ECDH
_RSA_WITH_RC4_128_SHA, SSL_RSA_WITH_RC4_128_MD5,
TLS_EMPTY_RENEGOTIATION_INFO_SCSV]
...
%% Negotiating: [Session-25, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA]
*** ServerHello, TLSv1
...
Cipher Suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
Compression Method: 0
Extension renegotiation_info, renegotiated_connection: <empty>
...
*** ECDH ServerKeyExchange
*** CertificateRequest
Cert Types: RSA, DSS, ECDSA
*** ServerHelloDone
...
ExecuteThread: '3' for queue: 'weblogic.socket.Muxer', READ: TLSv1 Change
Cipher Spec, lengt
h = 1
xecuteThread: '3' for queue: 'weblogic.socket.Muxer', READ: TLSv1 Handshake,
length = 48
Padded plaintext after DECRYPTION: len = 48
0000: 6E 8B 61 EA 59 08 E7 C5 BF FE 86 9B 3E B0 60 BB n.a.Y.......>.`.
0010: EF A9 23 DD 78 C7 13 5B 65 A9 1C A5 30 45 BF 2D ..#.x..[e...0E.-
0020: EF B6 17 4D 55 A0 83 10 FE E9 76 A2 5F CA 17 63 ...MU.....v._..c
ExecuteThread: '3' for queue: 'weblogic.socket.Muxer', fatal error: 40:
Invalid Padding leng
th: 99
javax.crypto.BadPaddingException: Invalid Padding length: 99
%% Invalidated: [Session-25, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA]
ExecuteThread: '3' for queue: 'weblogic.socket.Muxer', SEND TLSv1 ALERT:
fatal, description = handshake_failure
ExecuteThread: '3' for queue: 'weblogic.socket.Muxer', WRITE: TLSv1 Alert, length = 2
ExecuteThread: '3' for queue: 'weblogic.socket.Muxer', fatal: engine already closed. Rethro wing javax.net.ssl.SSLHandshakeException: Invalid Padding length: 99
ExecuteThread: '3' for queue: 'weblogic.socket.Muxer', called closeOutbound()
ExecuteThread: '3' for queue: 'weblogic.socket.Muxer',
closeOutboundInternal()
RandomCookie: GMT: 1498014313 bytes = { 173, 87, 70, 154, 94, 166, 135, 161,
99, 168, 152,
71, 173, 28, 15, 99, 229, 217, 227, 4, 70, 120, 24, 31, 20, 206, 34, 103 }
Session ID: {89, 74, 226, 84, 78, 70, 158, 181, 55, 182, 215, 247, 61, 60,
177, 103, 159, 2
15, 195, 152, 207, 29, 119, 54, 1, 224, 47, 149, 66, 200, 113, 237}
Cipher Suites: [TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA,
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TL
S_RSA_WITH_AES_128_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA,
TLS_ECDH_RSA_WITH_AES_128_C
BC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA,
TLS_ECDHE_ECDSA_
WITH_3DES_EDE_CBC_SHA, TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA,
SSL_RSA_WITH_3DES_EDE_CBC_SHA, T
LS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA,
SSL_DHE_RSA_WITH_3D
ES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA,
TLS_ECDHE_ECDSA_WITH_RC4_128_SHA, TLS_ECD
HE_RSA_WITH_RC4_128_SHA, SSL_RSA_WITH_RC4_128_SHA,
TLS_ECDH_ECDSA_WITH_RC4_128_SHA, TLS_ECDH
_RSA_WITH_RC4_128_SHA, SSL_RSA_WITH_RC4_128_MD5,
TLS_EMPTY_RENEGOTIATION_INFO_SCSV]
...
%% Negotiating: [Session-25, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA]
*** ServerHello, TLSv1
...
Cipher Suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
Compression Method: 0
Extension renegotiation_info, renegotiated_connection: <empty>
...
*** ECDH ServerKeyExchange
*** CertificateRequest
Cert Types: RSA, DSS, ECDSA
*** ServerHelloDone
...
ExecuteThread: '3' for queue: 'weblogic.socket.Muxer', READ: TLSv1 Change
Cipher Spec, lengt
h = 1
xecuteThread: '3' for queue: 'weblogic.socket.Muxer', READ: TLSv1 Handshake,
length = 48
Padded plaintext after DECRYPTION: len = 48
0000: 6E 8B 61 EA 59 08 E7 C5 BF FE 86 9B 3E B0 60 BB n.a.Y.......>.`.
0010: EF A9 23 DD 78 C7 13 5B 65 A9 1C A5 30 45 BF 2D ..#.x..[e...0E.-
0020: EF B6 17 4D 55 A0 83 10 FE E9 76 A2 5F CA 17 63 ...MU.....v._..c
ExecuteThread: '3' for queue: 'weblogic.socket.Muxer', fatal error: 40:
Invalid Padding leng
th: 99
javax.crypto.BadPaddingException: Invalid Padding length: 99
%% Invalidated: [Session-25, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA]
ExecuteThread: '3' for queue: 'weblogic.socket.Muxer', SEND TLSv1 ALERT:
fatal, description = handshake_failure
ExecuteThread: '3' for queue: 'weblogic.socket.Muxer', WRITE: TLSv1 Alert, length = 2
ExecuteThread: '3' for queue: 'weblogic.socket.Muxer', fatal: engine already closed. Rethro wing javax.net.ssl.SSLHandshakeException: Invalid Padding length: 99
ExecuteThread: '3' for queue: 'weblogic.socket.Muxer', called closeOutbound()
ExecuteThread: '3' for queue: 'weblogic.socket.Muxer',
closeOutboundInternal()