Uploaded image for project: 'JDK'
  1. JDK
  2. JDK-8253242

Client is not using agreed protocol for session resumption

XMLWordPrintable

      Old code (8u251), ClientHello example.

      ClientHello: TLSv1.2 with required extensions.
      ServerHello: TLSv1 with required extensions (Subset from ClientHello)
      Abbreviated ClintHello: TLSv1 with required extensions.
       
      *** ClientHello, TLSv1.2
      RandomCookie: GMT: 1600167876 bytes = { 38, 123, 176, 70, 79, 27, 118, 173, 214, 89, 107, 22, 40, 18, 159, 26, 43, 180, 112, 55, 119, 174, 232, 197, 12, 178, 107, 217 }
      Session ID: {}
      Cipher Suites: [TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDH_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_DSS_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA, TLS_EMPTY_RENEGOTIATION_INFO_SCSV, TLS_ECDH_anon_WITH_AES_256_CBC_SHA, TLS_DH_anon_WITH_AES_256_CBC_SHA, TLS_ECDH_anon_WITH_AES_128_CBC_SHA, TLS_DH_anon_WITH_AES_128_CBC_SHA, TLS_ECDH_anon_WITH_3DES_EDE_CBC_SHA, SSL_DH_anon_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_DES_CBC_SHA, SSL_DHE_RSA_WITH_DES_CBC_SHA, SSL_DHE_DSS_WITH_DES_CBC_SHA, SSL_DH_anon_WITH_DES_CBC_SHA, SSL_RSA_EXPORT_WITH_DES40_CBC_SHA, SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA, SSL_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA, SSL_DH_anon_EXPORT_WITH_DES40_CBC_SHA, TLS_ECDHE_ECDSA_WITH_NULL_SHA, TLS_ECDHE_RSA_WITH_NULL_SHA, SSL_RSA_WITH_NULL_SHA, TLS_ECDH_ECDSA_WITH_NULL_SHA, TLS_ECDH_RSA_WITH_NULL_SHA, TLS_ECDH_anon_WITH_NULL_SHA, SSL_RSA_WITH_NULL_MD5, TLS_KRB5_WITH_3DES_EDE_CBC_SHA, TLS_KRB5_WITH_3DES_EDE_CBC_MD5, TLS_KRB5_WITH_DES_CBC_SHA, TLS_KRB5_WITH_DES_CBC_MD5, TLS_KRB5_EXPORT_WITH_DES_CBC_40_SHA, TLS_KRB5_EXPORT_WITH_DES_CBC_40_MD5]
      Compression Methods: { 0 }
      Extension elliptic_curves, curve names: {secp256r1, secp384r1, secp521r1}
      Extension ec_point_formats, formats: [uncompressed]
      Extension signature_algorithms, signature_algorithms: SHA512withECDSA, SHA512withRSA, SHA384withECDSA, SHA384withRSA, SHA256withECDSA, SHA256withRSA, SHA256withDSA, SHA224withECDSA, SHA224withRSA, SHA224withDSA, SHA1withECDSA, SHA1withRSA, SHA1withDSA, MD5withRSA
      Extension extended_master_secret
      ***
      main, WRITE: TLSv1.2 Handshake, length = 199

      *** ServerHello, TLSv1
      RandomCookie: GMT: 1600167877 bytes = { 246, 43, 140, 77, 216, 11, 143, 14, 206, 78, 175, 198, 32, 14, 212, 202, 126, 36, 4, 221, 173, 193, 253, 13, 93, 13, 60, 231 }
      Session ID: {95, 97, 160, 197, 44, 40, 250, 155, 174, 12, 132, 6, 37, 115, 181, 9, 72, 255, 187, 123, 251, 112, 110, 133, 173, 32, 207, 23, 136, 199, 64, 12}
      Cipher Suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
      Compression Method: 0
      Extension renegotiation_info, renegotiated_connection: <empty>
      Extension extended_master_secret
      ***
      Thread-0, WRITE: TLSv1 Handshake, length = 1617


      %% Try resuming [Session-4, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA] from port 58516

      *** ClientHello, TLSv1
      RandomCookie: GMT: 1600167880 bytes = { 151, 85, 167, 5, 91, 48, 178, 178, 160, 82, 133, 4, 149, 244, 188, 76, 42, 131, 21, 150, 57, 41, 99, 157, 252, 94, 47, 141 }
      Session ID: {95, 97, 160, 197, 44, 40, 250, 155, 174, 12, 132, 6, 37, 115, 181, 9, 72, 255, 187, 123, 251, 112, 110, 133, 173, 32, 207, 23, 136, 199, 64, 12}
      Cipher Suites: [TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDH_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_DSS_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA, TLS_EMPTY_RENEGOTIATION_INFO_SCSV, TLS_ECDH_anon_WITH_AES_256_CBC_SHA, TLS_DH_anon_WITH_AES_256_CBC_SHA, TLS_ECDH_anon_WITH_AES_128_CBC_SHA, TLS_DH_anon_WITH_AES_128_CBC_SHA, TLS_ECDH_anon_WITH_3DES_EDE_CBC_SHA, SSL_DH_anon_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_DES_CBC_SHA, SSL_DHE_RSA_WITH_DES_CBC_SHA, SSL_DHE_DSS_WITH_DES_CBC_SHA, SSL_DH_anon_WITH_DES_CBC_SHA, SSL_RSA_EXPORT_WITH_DES40_CBC_SHA, SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA, SSL_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA, SSL_DH_anon_EXPORT_WITH_DES40_CBC_SHA, TLS_ECDHE_ECDSA_WITH_NULL_SHA, TLS_ECDHE_RSA_WITH_NULL_SHA, SSL_RSA_WITH_NULL_SHA, TLS_ECDH_ECDSA_WITH_NULL_SHA, TLS_ECDH_RSA_WITH_NULL_SHA, TLS_ECDH_anon_WITH_NULL_SHA, SSL_RSA_WITH_NULL_MD5, TLS_KRB5_WITH_3DES_EDE_CBC_SHA, TLS_KRB5_WITH_3DES_EDE_CBC_MD5, TLS_KRB5_WITH_DES_CBC_SHA, TLS_KRB5_WITH_DES_CBC_MD5, TLS_KRB5_EXPORT_WITH_DES_CBC_40_SHA, TLS_KRB5_EXPORT_WITH_DES_CBC_40_MD5]
      Compression Methods: { 0 }
      Extension elliptic_curves, curve names: {secp256r1, secp384r1, secp521r1}
      Extension ec_point_formats, formats: [uncompressed]
      Extension extended_master_secret

      main, WRITE: TLSv1 Handshake, length = 197



      With ssl refactored code

      ClientHello: TLSv1.2 with required extensions.
      ServerHello: TLSv1 with required extensions (Subset from ClientHello)
      Abbreviated ClintHello: Only version updated to TLSv1 but all other are TLSv1.2 type (TLSv1.2 ClientHello object with TLSv1 version type).

      "ClientHello": {
        "client version" : "TLSv1.2",
        "random" : "A9 08 5B BC 28 22 9E 91 F3 22 E2 03 18 1E 05 07 89 E1 FB A4 B1 B0 74 D9 D7 D2 39 83 F7 B4 88 28",
        "session id" : "",
        "cipher suites" : "[TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_RSA_WITH_AES_256_GCM_SHA384(0x009D), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_RSA_WITH_AES_128_GCM_SHA256(0x009C), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_RSA_WITH_AES_256_CBC_SHA256(0x003D), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA(0xC00A), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA(0xC014), TLS_RSA_WITH_AES_256_CBC_SHA(0x0035), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA(0xC005), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA(0xC00F), TLS_DHE_RSA_WITH_AES_256_CBC_SHA(0x0039), TLS_DHE_DSS_WITH_AES_256_CBC_SHA(0x0038), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_RSA_WITH_AES_128_CBC_SHA256(0x003C), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA(0xC009), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA(0xC013), TLS_RSA_WITH_AES_128_CBC_SHA(0x002F), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA(0xC004), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA(0xC00E), TLS_DHE_RSA_WITH_AES_128_CBC_SHA(0x0033), TLS_DHE_DSS_WITH_AES_128_CBC_SHA(0x0032), TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA(0xC008), TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA(0xC012), SSL_RSA_WITH_3DES_EDE_CBC_SHA(0x000A), TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA(0xC003), TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA(0xC00D), SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA(0x0016), SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA(0x0013), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF), TLS_DH_anon_WITH_AES_256_GCM_SHA384(0x00A7), TLS_DH_anon_WITH_AES_128_GCM_SHA256(0x00A6), TLS_DH_anon_WITH_AES_256_CBC_SHA256(0x006D), TLS_ECDH_anon_WITH_AES_256_CBC_SHA(0xC019), TLS_DH_anon_WITH_AES_256_CBC_SHA(0x003A), TLS_DH_anon_WITH_AES_128_CBC_SHA256(0x006C), TLS_ECDH_anon_WITH_AES_128_CBC_SHA(0xC018), TLS_DH_anon_WITH_AES_128_CBC_SHA(0x0034), TLS_ECDH_anon_WITH_3DES_EDE_CBC_SHA(0xC017), SSL_DH_anon_WITH_3DES_EDE_CBC_SHA(0x001B), SSL_RSA_WITH_DES_CBC_SHA(0x0009), SSL_DHE_RSA_WITH_DES_CBC_SHA(0x0015), SSL_DHE_DSS_WITH_DES_CBC_SHA(0x0012), SSL_DH_anon_WITH_DES_CBC_SHA(0x001A), SSL_RSA_EXPORT_WITH_DES40_CBC_SHA(0x0008), SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA(0x0014), SSL_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA(0x0011), SSL_DH_anon_EXPORT_WITH_DES40_CBC_SHA(0x0019), TLS_RSA_WITH_NULL_SHA256(0x003B), TLS_ECDHE_ECDSA_WITH_NULL_SHA(0xC006), TLS_ECDHE_RSA_WITH_NULL_SHA(0xC010), SSL_RSA_WITH_NULL_SHA(0x0002), TLS_ECDH_ECDSA_WITH_NULL_SHA(0xC001), TLS_ECDH_RSA_WITH_NULL_SHA(0xC00B), TLS_ECDH_anon_WITH_NULL_SHA(0xC015), SSL_RSA_WITH_NULL_MD5(0x0001), TLS_KRB5_WITH_3DES_EDE_CBC_SHA(0x001F), TLS_KRB5_WITH_3DES_EDE_CBC_MD5(0x0023), TLS_KRB5_WITH_DES_CBC_SHA(0x001E), TLS_KRB5_WITH_DES_CBC_MD5(0x0022), TLS_KRB5_EXPORT_WITH_DES_CBC_40_SHA(0x0026), TLS_KRB5_EXPORT_WITH_DES_CBC_40_MD5(0x0029)]",
        "compression methods" : "00",
        "extensions" : [
          "supported_groups (10)": {
            "versions": [secp256r1, secp384r1, secp521r1, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
          },
          "ec_point_formats (11)": {
            "formats": [uncompressed]
          },
          "signature_algorithms (13)": {
            "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1, rsa_md5]
          },
          "signature_algorithms_cert (50)": {
            "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1, rsa_md5]
          },
          "extended_master_secret (23)": {
            <empty>
          },
          "supported_versions (43)": {
            "versions": [TLSv1.2, TLSv1.1, TLSv1]
          }
        ]
      }
      )
      javax.net.ssl|FINE|01|main|2020-09-16 06:35:52.332 UTC|SSLSocketOutputRecord.java:258|WRITE: TLS12 handshake, length = 344

      javax.net.ssl|FINE|13|Thread-0|2020-09-16 06:35:52.413 UTC|ServerHello.java:363|Produced ServerHello handshake message (
      "ServerHello": {
       "server version" : "TLSv1",
        "random" : "E9 33 43 7E 50 2E CC 70 24 49 C2 E1 4F 3F 86 E5 BF 48 29 F1 C0 A4 E4 83 4B C1 25 68 D4 3A 26 60",
        "session id" : "F5 FB AE EE 7E 6C 24 03 D9 01 75 7D 65 8F BB 78 55 39 55 56 48 3D B8 DC 76 14 2C F1 57 04 9F 66",
        "cipher suite" : "TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA(0xC014)",
        "compression methods" : "00",
        "extensions" : [
          "extended_master_secret (23)": {
            <empty>
          },
          "renegotiation_info (65,281)": {
            "renegotiated connection": [<no renegotiated connection>]
          }
        ]
      }
      )

      javax.net.ssl|FINE|13|Thread-0|2020-09-16 06:35:52.413 UTC|SSLSocketOutputRecord.java:258|WRITE: TLS10 handshake, length = 85


      javax.net.ssl|ALL|01|main|2020-09-16 06:35:52.671 UTC|ClientHello.java:453|Try resuming session (
      Session(1600238152418|TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA)
      )

      javax.net.ssl|FINE|01|main|2020-09-16 06:35:52.676 UTC|ClientHello.java:567|Produced ClientHello handshake message (
      "ClientHello": {
        "client version" : "TLSv1",
        "random" : "97 C5 82 FB 19 76 54 C9 BF 2C A4 97 CE 0C 07 DA 85 F1 56 CB 42 E8 75 69 CC FE 27 B0 85 86 C3 BF",
        "session id" : "F5 FB AE EE 7E 6C 24 03 D9 01 75 7D 65 8F BB 78 55 39 55 56 48 3D B8 DC 76 14 2C F1 57 04 9F 66",
        "cipher suites" : "[TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_RSA_WITH_AES_256_GCM_SHA384(0x009D), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_RSA_WITH_AES_128_GCM_SHA256(0x009C), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_RSA_WITH_AES_256_CBC_SHA256(0x003D), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA(0xC00A), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA(0xC014), TLS_RSA_WITH_AES_256_CBC_SHA(0x0035), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA(0xC005), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA(0xC00F), TLS_DHE_RSA_WITH_AES_256_CBC_SHA(0x0039), TLS_DHE_DSS_WITH_AES_256_CBC_SHA(0x0038), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_RSA_WITH_AES_128_CBC_SHA256(0x003C), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA(0xC009), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA(0xC013), TLS_RSA_WITH_AES_128_CBC_SHA(0x002F), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA(0xC004), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA(0xC00E), TLS_DHE_RSA_WITH_AES_128_CBC_SHA(0x0033), TLS_DHE_DSS_WITH_AES_128_CBC_SHA(0x0032), TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA(0xC008), TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA(0xC012), SSL_RSA_WITH_3DES_EDE_CBC_SHA(0x000A), TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA(0xC003), TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA(0xC00D), SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA(0x0016), SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA(0x0013), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF), TLS_DH_anon_WITH_AES_256_GCM_SHA384(0x00A7), TLS_DH_anon_WITH_AES_128_GCM_SHA256(0x00A6), TLS_DH_anon_WITH_AES_256_CBC_SHA256(0x006D), TLS_ECDH_anon_WITH_AES_256_CBC_SHA(0xC019), TLS_DH_anon_WITH_AES_256_CBC_SHA(0x003A), TLS_DH_anon_WITH_AES_128_CBC_SHA256(0x006C), TLS_ECDH_anon_WITH_AES_128_CBC_SHA(0xC018), TLS_DH_anon_WITH_AES_128_CBC_SHA(0x0034), TLS_ECDH_anon_WITH_3DES_EDE_CBC_SHA(0xC017), SSL_DH_anon_WITH_3DES_EDE_CBC_SHA(0x001B), SSL_RSA_WITH_DES_CBC_SHA(0x0009), SSL_DHE_RSA_WITH_DES_CBC_SHA(0x0015), SSL_DHE_DSS_WITH_DES_CBC_SHA(0x0012), SSL_DH_anon_WITH_DES_CBC_SHA(0x001A), SSL_RSA_EXPORT_WITH_DES40_CBC_SHA(0x0008), SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA(0x0014), SSL_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA(0x0011), SSL_DH_anon_EXPORT_WITH_DES40_CBC_SHA(0x0019), TLS_RSA_WITH_NULL_SHA256(0x003B), TLS_ECDHE_ECDSA_WITH_NULL_SHA(0xC006), TLS_ECDHE_RSA_WITH_NULL_SHA(0xC010), SSL_RSA_WITH_NULL_SHA(0x0002), TLS_ECDH_ECDSA_WITH_NULL_SHA(0xC001), TLS_ECDH_RSA_WITH_NULL_SHA(0xC00B), TLS_ECDH_anon_WITH_NULL_SHA(0xC015), SSL_RSA_WITH_NULL_MD5(0x0001), TLS_KRB5_WITH_3DES_EDE_CBC_SHA(0x001F), TLS_KRB5_WITH_3DES_EDE_CBC_MD5(0x0023), TLS_KRB5_WITH_DES_CBC_SHA(0x001E), TLS_KRB5_WITH_DES_CBC_MD5(0x0022), TLS_KRB5_EXPORT_WITH_DES_CBC_40_SHA(0x0026), TLS_KRB5_EXPORT_WITH_DES_CBC_40_MD5(0x0029)]",
        "compression methods" : "00",
        "extensions" : [
          "supported_groups (10)": {
            "versions": [secp256r1, secp384r1, secp521r1, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
          },
          "ec_point_formats (11)": {
            "formats": [uncompressed]
          },
          "signature_algorithms (13)": {
            "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1, rsa_md5]
          },
          "signature_algorithms_cert (50)": {
            "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1, rsa_md5]
          },
          "extended_master_secret (23)": {
            <empty>
          },
          "supported_versions (43)": {
            "versions": [TLSv1.2, TLSv1.1, TLSv1]
          }
        ]
      }
      )

      javax.net.ssl|FINE|01|main|2020-09-16 06:35:52.677 UTC|SSLSocketOutputRecord.java:258|WRITE: TLS12 handshake, length = 376

            xuelei Xuelei Fan
            pkoppula Prasadarao Koppula (Inactive)
            Votes:
            0 Vote for this issue
            Watchers:
            5 Start watching this issue

              Created:
              Updated:
              Resolved: