Log started: Wed, 10 Jun 2015 13:47:37 -0700 Java Web Start 11.51.2.16 Using JRE version 1.8.0_51-b16 Java HotSpot(TM) Client VM X509KeyManager passed to SSLContext.init(): need an X509ExtendedKeyManager for SSLEngine use trigger seeding of SecureRandom done seeding SecureRandom Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 Allow unsafe renegotiation: false Allow legacy hello messages: true Is initial handshake: true Is secure renegotiation: false Java Web Start Main Thread, setSoTimeout(0) called Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256 Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_128_GCM_SHA256 Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256 Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 %% No cached client session *** ClientHello, TLSv1 RandomCookie: GMT: 1433903722 bytes = { 4, 117, 219, 114, 107, 202, 15, 125, 132, 28, 204, 111, 228, 253, 159, 1, 49, 177, 29, 139, 246, 122, 43, 105, 44, 245, 53, 215 } Session ID: {} Cipher Suites: [TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA, TLS_EMPTY_RENEGOTIATION_INFO_SCSV] Compression Methods: { 0 } Extension elliptic_curves, curve names: {secp256r1, sect163k1, sect163r2, secp192r1, secp224r1, sect233k1, sect233r1, sect283k1, sect283r1, secp384r1, sect409k1, sect409r1, secp521r1, sect571k1, sect571r1, secp160k1, secp160r1, secp160r2, sect163r1, secp192k1, sect193r1, sect193r2, secp224k1, sect239k1, secp256k1} Extension ec_point_formats, formats: [uncompressed] *** Java Web Start Main Thread, WRITE: TLSv1 Handshake, length = 137 Java Web Start Main Thread, READ: TLSv1 Handshake, length = 1465 *** ServerHello, TLSv1 RandomCookie: GMT: 1433903722 bytes = { 133, 192, 2, 176, 207, 171, 199, 123, 6, 0, 200, 24, 106, 100, 236, 46, 99, 20, 38, 175, 30, 157, 66, 15, 71, 133, 191, 207 } Session ID: {42, 43, 0, 0, 229, 23, 183, 217, 90, 98, 243, 176, 41, 35, 41, 74, 120, 172, 8, 108, 17, 8, 42, 29, 63, 116, 173, 60, 121, 89, 250, 94} Cipher Suite: TLS_RSA_WITH_AES_128_CBC_SHA Compression Method: 0 Extension renegotiation_info, renegotiated_connection: *** %% Initialized: [Session-1, TLS_RSA_WITH_AES_128_CBC_SHA] ** TLS_RSA_WITH_AES_128_CBC_SHA *** Certificate chain chain [0] = [ [ Version: V3 Subject: CN=dan, OU=Test, O=Oracle, ST=CA, C=US Signature Algorithm: SHA256withRSA, OID = 1.2.840.113549.1.1.11 Key: Sun RSA public key, 2048 bits modulus: 27993800329023506915188619937271073675146531754788656107091985839151221862956338660826083129307150299177076284927991039444425558608748586185501453381350031509010983827567837732358657008599408295712364829220775090997081135518958109857589576926141558932552245139006180802682152879425941672165491708704274822508509790090280409136905763815540974504871865424441967155500742973933231552413698265953703372042016370786259247265523915810183271065561834150991240902083054508495535295536147129309792303053577725565695417921470016939423833336117790167245101378899510456944492050424721996316349253989237480157324834028741000498233 public exponent: 65537 Validity: [From: Tue Jun 09 16:13:29 PDT 2015, To: Sat Jun 18 16:13:29 PDT 2016] Issuer: CN=Deploy, OU=DEV, O=Oracle, L=Santa Clara, ST=CA, C=US SerialNumber: [ 1000] Certificate Extensions: 7 [1]: ObjectId: 2.16.840.1.113730.1.13 Criticality=false Extension unknown: DER encoded OCTET string = 0000: 04 26 16 24 4F 70 65 6E 53 53 4C 20 47 65 6E 65 .&.$OpenSSL Gene 0010: 72 61 74 65 64 20 53 65 72 76 65 72 20 43 65 72 rated Server Cer 0020: 74 69 66 69 63 61 74 65 tificate [2]: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: 1A CC 30 E0 B0 23 2A 68 19 60 42 30 C2 68 C8 1C ..0..#*h.`B0.h.. 0010: 06 FD 39 E5 ..9. ] [CN=Deploy, OU=DEV, O=Oracle, L=Santa Clara, ST=CA, C=US] SerialNumber: [ 976af296 a1bbcfaf] ] [3]: ObjectId: 2.5.29.19 Criticality=false BasicConstraints:[ CA:false PathLen: undefined ] [4]: ObjectId: 2.5.29.37 Criticality=false ExtendedKeyUsages [ serverAuth ] [5]: ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_Encipherment ] [6]: ObjectId: 2.16.840.1.113730.1.1 Criticality=false NetscapeCertType [ SSL server ] [7]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 03 60 18 99 86 2F C3 6E 7B 46 FB F3 FE 55 C5 8F .`.../.n.F...U.. 0010: 4D 4A 28 B9 MJ(. ] ] ] Algorithm: [SHA256withRSA] Signature: 0000: 32 FA 27 95 DB 98 65 FC CD 86 03 57 C9 3A 91 6A 2.'...e....W.:.j 0010: 25 A7 8C 5A 5B ED 8A 7E 3F 1F F6 85 B0 A4 B4 51 %..Z[...?......Q 0020: 85 68 90 BB 1F F8 3E 3E DA 69 08 6F B0 D0 57 C4 .h....>>.i.o..W. 0030: 35 0C 57 0C AF 31 5F 63 AC AB 56 E8 45 D5 3A A1 5.W..1_c..V.E.:. 0040: CF 6E B5 06 EB 5E A1 63 7E 70 A1 8B 2B 50 E3 30 .n...^.c.p..+P.0 0050: 8E 3F FF C7 DB 0C 26 EC 44 0A 6B 4F 86 CE E1 3A .?....&.D.kO...: 0060: CB 8E E9 FE B0 06 0A CC F7 00 E6 81 AB E8 78 9C ..............x. 0070: 68 3D 2B 2D BC AE 64 41 15 29 77 6A 19 BC 25 A6 h=+-..dA.)wj..%. 0080: EC B3 EB F4 4F 48 64 68 7B 0E B5 86 2E 09 6F 16 ....OHdh......o. 0090: FE 7E 24 6D 4E F0 AD 7F 21 17 72 88 AB 10 40 45 ..$mN...!.r...@E 00A0: 90 9C E6 D9 D9 10 AA 36 65 F9 16 3C 66 FF CD 30 .......6e..L...F@..+. 00F0: 90 FC 98 17 9F 78 6F 45 01 4E 5A B5 C0 34 A9 E9 .....xoE.NZ..4.. 0100: E1 43 B6 D2 2D BD 2E 85 44 9D A9 0D 2F 9B 66 ED .C..-...D.../.f. 0110: A2 31 FD 6D A5 E5 37 3D 3B 9C 23 20 F4 67 CA DC .1.m..7=;.# .g.. 0120: 37 08 47 D2 71 5B 27 93 B1 2F D0 44 9F 41 72 95 7.G.q['../.D.Ar. 0130: BB 9E 1D 81 7E DE C1 A9 96 1F 03 34 FB AD 7C 75 ...........4...u 0140: 6A 01 4C CA C0 34 6E 86 C9 8C D8 99 07 F7 FF D4 j.L..4n......... 0150: 77 6F F1 88 D6 0D 93 16 E8 3A 75 6A 08 6D 1B A2 wo.......:uj.m.. 0160: 51 F8 A5 6E 8A 1D 66 68 0B C2 36 2B FE 26 6E 5D Q..n..fh..6+.&n] 0170: DD 6B 2C 47 60 AD 83 C9 51 30 63 CC 00 1F F5 F2 .k,G`...Q0c..... 0180: FB 66 1E 52 16 E9 3F EC E7 43 5C F1 25 C0 BE 57 .f.R..?..C\.%..W 0190: 36 3F AC C2 F2 7D 7D 8C 9E 54 10 DE 27 6D 22 CE 6?.......T..'m". 01A0: A0 35 A8 1A D9 90 BA 5C 39 21 7A 3B 83 9D F6 62 .5.....\9!z;...b 01B0: D1 ED CD BD AA F7 75 CB F0 C4 6F B0 39 8B A3 D2 ......u...o.9... 01C0: 02 B9 2F AC 79 97 85 8F 78 A2 91 29 F1 CB 10 1B ../.y...x..).... 01D0: DC D9 10 D0 F9 A7 31 92 4B F0 45 93 1A 61 08 FE ......1.K.E..a.. 01E0: 55 E3 6D C5 4F 92 CF DB 3B 4B EE 2A 5E BB 7B CA U.m.O...;K.*^... 01F0: 13 0D A4 63 4F 29 9B 63 5C 71 FD 8D B6 28 52 3A ...cO).c\q...(R: ] *** adding as trusted cert: Subject: CN=Deploy, OU=DEV, O=Oracle, L=Santa Clara, ST=CA, C=US Issuer: CN=Deploy, OU=DEV, O=Oracle, L=Santa Clara, ST=CA, C=US Algorithm: RSA; Serial number: 0x976af296a1bbcfaf Valid from Tue Jun 09 15:54:03 PDT 2015 until Mon Jun 04 15:54:03 PDT 2035 Found trusted certificate: [ [ Version: V3 Subject: CN=Deploy, OU=DEV, O=Oracle, L=Santa Clara, ST=CA, C=US Signature Algorithm: SHA256withRSA, OID = 1.2.840.113549.1.1.11 Key: Sun RSA public key, 4096 bits modulus: 849953258605127028430388653187571693119994603253831509944165695948902333870652735485009179639332025059264510613513770058528116684955645364459059463774339759118238379559080228690635540023391127586736185629196108061422937551286886635161255424199937594422811584962764315992728818530330323323660630236599075046457514476831659401493595510701048798034367059978259449272818133235319159134123820048323324329808897202797459598751693689998475936585527654230297604365393816247703563416375036706742962673642696810724706557458499409200954368951393777573856916462816783412022353876755426998970906700935490633855201485905827918775287412562289407042643402824874928173230719037435488978231773066240646576912504954234995052482298969384390834399974479716112224019920903020802742961606783763122459898194221100335606064673963678579325277397942640530866375920383800073637679989603832901168500797931424323053774855078887727162833129883132625775035195111214838620594468999685799420938367850542805221593382978825246937771937962016273756048415501829287008368050568706316532539184393917227978969408067173250133438946243738983371890224018502259162230114631373205542118723148721310604808430483895913748158296789187896927353231265870991688535466912936858549035641 public exponent: 65537 Validity: [From: Tue Jun 09 15:54:03 PDT 2015, To: Mon Jun 04 15:54:03 PDT 2035] Issuer: CN=Deploy, OU=DEV, O=Oracle, L=Santa Clara, ST=CA, C=US SerialNumber: [ 976af296 a1bbcfaf] Certificate Extensions: 3 [1]: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: 1A CC 30 E0 B0 23 2A 68 19 60 42 30 C2 68 C8 1C ..0..#*h.`B0.h.. 0010: 06 FD 39 E5 ..9. ] ] [2]: ObjectId: 2.5.29.19 Criticality=false BasicConstraints:[ CA:true PathLen:2147483647 ] [3]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 1A CC 30 E0 B0 23 2A 68 19 60 42 30 C2 68 C8 1C ..0..#*h.`B0.h.. 0010: 06 FD 39 E5 ..9. ] ] ] Algorithm: [SHA256withRSA] Signature: 0000: 0B CA DE CF F4 24 AA 8A 11 2B B7 35 DB F2 ED F7 .....$...+.5.... 0010: F8 77 7C CB 35 D3 1B 42 26 4D 70 34 24 A9 01 25 .w..5..B&Mp4$..% 0020: D1 FF E2 AA A9 CF A1 F0 D8 95 17 50 AB 4F 0D 79 ...........P.O.y 0030: 7C E9 BA 9A 27 26 C8 C4 60 D1 7F BA 3A 7E D5 5B ....'&..`...:..[ 0040: AE 19 4A CC AC 8D 5B B8 62 8C 43 71 CC A3 2D EA ..J...[.b.Cq..-. 0050: 76 13 F4 09 12 B1 31 CA 05 A4 77 C6 78 EF 5C 0F v.....1...w.x.\. 0060: 57 B9 62 96 D4 1C 78 1F 1A F9 BE B3 79 5A C7 8E W.b...x.....yZ.. 0070: FE B6 2B 7F FC 03 6C 0D 2B 23 C6 DF 09 B3 F9 1D ..+...l.+#...... 0080: B2 49 A8 78 C9 E3 3F 0A 0C 43 B3 22 4C 79 FC 68 .I.x..?..C."Ly.h 0090: E9 74 14 CC 51 39 89 91 AC 9B 62 7C 67 D2 8B DA .t..Q9....b.g... 00A0: 22 4E DB 3A BD B1 3A 55 1E C4 9E 6A D4 45 8C FD "N.:..:U...j.E.. 00B0: 9A 3C 1E F5 2F AF 8E B9 88 E0 67 A3 FA 71 80 C5 .<../.....g..q.. 00C0: A3 59 84 36 28 29 FF 79 88 09 7B 99 D9 65 76 A2 .Y.6().y.....ev. 00D0: 86 F1 E0 24 E7 11 12 58 12 B8 00 A5 61 7D 20 C4 ...$...X....a. . 00E0: C6 AF 47 2B 5B 3D 37 9D FD 37 51 F1 0E 2A 1C E8 ..G+[=7..7Q..*.. 00F0: F8 B5 AA 2D 07 F9 D2 94 0C 5C E5 46 7C 2C 01 69 ...-.....\.F.,.i 0100: 2A 9B B4 22 E5 FA B4 38 26 14 F2 C1 18 E6 30 86 *.."...8&.....0. 0110: 98 14 4B 9C BF CF C1 BB 49 CC 51 94 99 48 6A AF ..K.....I.Q..Hj. 0120: EF 91 6D 29 64 4E 96 E5 E1 6C 2A D1 30 8A 5C 4C ..m)dN...l*.0.\L 0130: B0 1D 14 8D 39 43 E5 53 8E 22 31 24 20 91 19 F7 ....9C.S."1$ ... 0140: 3F BD 95 31 11 38 11 0B 77 1C AD 9E A9 9E D3 B3 ?..1.8..w....... 0150: E4 14 DD 01 D9 DA 04 ED 3A 47 07 9C AE BF FA E9 ........:G...... 0160: 69 72 27 8C 36 21 98 B6 FC 23 2A 6A F0 59 77 08 ir'.6!...#*j.Yw. 0170: BF D0 9F AE 5E 0B B7 F4 65 74 8C 47 C5 E6 EF 7C ....^...et.G.... 0180: 11 2C 11 86 83 93 2D A6 61 10 85 EB 99 80 4A A5 .,....-.a.....J. 0190: D2 94 C9 5D FA 96 59 19 FD 0D 5A 8A F3 24 37 D7 ...]..Y...Z..$7. 01A0: A1 7E 51 60 3A 8E 2C 13 1D 27 73 C7 85 EC 8B 99 ..Q`:.,..'s..... 01B0: BB 23 21 2A 97 62 BE 3D 7F BE A6 51 E3 0F CA A1 .#!*.b.=...Q.... 01C0: 43 7A 1C A7 89 A2 50 D2 08 0C 86 DE E6 D8 03 77 Cz....P........w 01D0: 79 1C 34 3F 19 66 DA 20 1C 23 01 28 12 9B A8 8C y.4?.f. .#.(.... 01E0: 82 FD 29 76 D3 04 C9 71 9C F4 F8 1C 33 12 0C 1B ..)v...q....3... 01F0: 02 1E 4D FB 18 83 C5 A3 38 C6 99 DC 0B 88 D2 88 ..M.....8....... ] *** ServerHelloDone *** ClientKeyExchange, RSA PreMasterSecret, TLSv1 Java Web Start Main Thread, WRITE: TLSv1 Handshake, length = 262 SESSION KEYGEN: PreMaster Secret: 0000: 03 01 31 6D 9A 79 D3 65 7C 1D A1 EF 32 85 1F 46 ..1m.y.e....2..F 0010: 89 A2 E0 24 89 B2 6A D7 CE FD 6E E0 42 EB 4A CF ...$..j...n.B.J. 0020: 4B F9 89 CF 9C 3B 8B F6 8D FA 75 69 CB 26 7F 23 K....;....ui.&.# CONNECTION KEYGEN: Client Nonce: 0000: 55 78 A2 6A 04 75 DB 72 6B CA 0F 7D 84 1C CC 6F Ux.j.u.rk......o 0010: E4 FD 9F 01 31 B1 1D 8B F6 7A 2B 69 2C F5 35 D7 ....1....z+i,.5. Server Nonce: 0000: 55 78 A2 6A 85 C0 02 B0 CF AB C7 7B 06 00 C8 18 Ux.j............ 0010: 6A 64 EC 2E 63 14 26 AF 1E 9D 42 0F 47 85 BF CF jd..c.&...B.G... Master Secret: 0000: AC 85 18 FF A6 53 7B B5 68 41 2B 1B 07 FA B7 A8 .....S..hA+..... 0010: BD 99 C8 E7 D7 66 FB AA B9 25 31 A2 00 42 7F FF .....f...%1..B.. 0020: F3 C5 AE 57 CE 3A 53 50 FB 86 3B 8E F7 AB FF 46 ...W.:SP..;....F Client MAC write Secret: 0000: 82 62 2E 84 A2 89 96 84 F6 ED 85 B7 A9 F3 02 D2 .b.............. 0010: 9D CB 12 76 ...v Server MAC write Secret: 0000: 21 A5 89 59 0B 88 02 B0 63 21 E4 0D 9F 1B 06 45 !..Y....c!.....E 0010: D6 90 C5 37 ...7 Client write key: 0000: C2 8B E4 D8 34 25 39 1D 95 D3 57 B0 7E BC 30 9E ....4%9...W...0. Server write key: 0000: E7 CC C4 3E 85 D7 8B 41 95 E4 3C 41 64 28 AC 73 ...>...A..>.i.o..W. 0030: 35 0C 57 0C AF 31 5F 63 AC AB 56 E8 45 D5 3A A1 5.W..1_c..V.E.:. 0040: CF 6E B5 06 EB 5E A1 63 7E 70 A1 8B 2B 50 E3 30 .n...^.c.p..+P.0 0050: 8E 3F FF C7 DB 0C 26 EC 44 0A 6B 4F 86 CE E1 3A .?....&.D.kO...: 0060: CB 8E E9 FE B0 06 0A CC F7 00 E6 81 AB E8 78 9C ..............x. 0070: 68 3D 2B 2D BC AE 64 41 15 29 77 6A 19 BC 25 A6 h=+-..dA.)wj..%. 0080: EC B3 EB F4 4F 48 64 68 7B 0E B5 86 2E 09 6F 16 ....OHdh......o. 0090: FE 7E 24 6D 4E F0 AD 7F 21 17 72 88 AB 10 40 45 ..$mN...!.r...@E 00A0: 90 9C E6 D9 D9 10 AA 36 65 F9 16 3C 66 FF CD 30 .......6e..L...F@..+. 00F0: 90 FC 98 17 9F 78 6F 45 01 4E 5A B5 C0 34 A9 E9 .....xoE.NZ..4.. 0100: E1 43 B6 D2 2D BD 2E 85 44 9D A9 0D 2F 9B 66 ED .C..-...D.../.f. 0110: A2 31 FD 6D A5 E5 37 3D 3B 9C 23 20 F4 67 CA DC .1.m..7=;.# .g.. 0120: 37 08 47 D2 71 5B 27 93 B1 2F D0 44 9F 41 72 95 7.G.q['../.D.Ar. 0130: BB 9E 1D 81 7E DE C1 A9 96 1F 03 34 FB AD 7C 75 ...........4...u 0140: 6A 01 4C CA C0 34 6E 86 C9 8C D8 99 07 F7 FF D4 j.L..4n......... 0150: 77 6F F1 88 D6 0D 93 16 E8 3A 75 6A 08 6D 1B A2 wo.......:uj.m.. 0160: 51 F8 A5 6E 8A 1D 66 68 0B C2 36 2B FE 26 6E 5D Q..n..fh..6+.&n] 0170: DD 6B 2C 47 60 AD 83 C9 51 30 63 CC 00 1F F5 F2 .k,G`...Q0c..... 0180: FB 66 1E 52 16 E9 3F EC E7 43 5C F1 25 C0 BE 57 .f.R..?..C\.%..W 0190: 36 3F AC C2 F2 7D 7D 8C 9E 54 10 DE 27 6D 22 CE 6?.......T..'m". 01A0: A0 35 A8 1A D9 90 BA 5C 39 21 7A 3B 83 9D F6 62 .5.....\9!z;...b 01B0: D1 ED CD BD AA F7 75 CB F0 C4 6F B0 39 8B A3 D2 ......u...o.9... 01C0: 02 B9 2F AC 79 97 85 8F 78 A2 91 29 F1 CB 10 1B ../.y...x..).... 01D0: DC D9 10 D0 F9 A7 31 92 4B F0 45 93 1A 61 08 FE ......1.K.E..a.. 01E0: 55 E3 6D C5 4F 92 CF DB 3B 4B EE 2A 5E BB 7B CA U.m.O...;K.*^... 01F0: 13 0D A4 63 4F 29 9B 63 5C 71 FD 8D B6 28 52 3A ...cO).c\q...(R: ] *** *** CertificateRequest Cert Types: RSA, DSS, ECDSA Cert Authorities: *** ServerHelloDone ssl: KeyMgr: getting aliases: [Client Dan (verified: OK), test testl (verified: OK)] ssl: Ignoring alias Client Dan: key algorithm does not match ssl: Ignoring alias test testl: key algorithm does not match ssl: KeyMgr: no matching alias found ssl: Ignoring alias Client Dan: key algorithm does not match ssl: Ignoring alias test testl: key algorithm does not match ssl: KeyMgr: no matching alias found *** Certificate chain chain [0] = [ [ Version: V3 Subject: CN=Client Dan, OU=DT, O=Oracle, ST=CA, C=US Signature Algorithm: SHA256withRSA, OID = 1.2.840.113549.1.1.11 Key: Sun RSA public key, 2048 bits modulus: 25041167234775516209191536628623554777565383090132086621648953332096188060178264453951062245373026678900806631803201242153012863620306180291650308065728058725371502399634595673335624987186925360108483413989007050442140599195843481712747433628813692094403826422162619175616021483896340983175963054251732596203189838821479908442902564116220884226235439223121816215426580437846340378795658979390484291603745983809778742894900300599813134776854161020903021723346684155649004430053145377057091248407221435223646705022416390050199799718748450589449827050606884254389363322360084564710559130123559059677644223204275542036977 public exponent: 65537 Validity: [From: Tue Jun 09 16:32:36 PDT 2015, To: Sat Jun 18 16:32:36 PDT 2016] Issuer: CN=Deploy, OU=DEV, O=Oracle, L=Santa Clara, ST=CA, C=US SerialNumber: [ 1001] Certificate Extensions: 4 [1]: ObjectId: 2.16.840.1.113730.1.13 Criticality=false Extension unknown: DER encoded OCTET string = 0000: 04 1F 16 1D 4F 70 65 6E 53 53 4C 20 47 65 6E 65 ....OpenSSL Gene 0010: 72 61 74 65 64 20 43 65 72 74 69 66 69 63 61 74 rated Certificat 0020: 65 e [2]: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: 1A CC 30 E0 B0 23 2A 68 19 60 42 30 C2 68 C8 1C ..0..#*h.`B0.h.. 0010: 06 FD 39 E5 ..9. ] ] [3]: ObjectId: 2.5.29.19 Criticality=false BasicConstraints:[ CA:false PathLen: undefined ] [4]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 9B 03 A7 E4 0B 7F 0D 6D 19 81 1C 8A 69 B2 2F 11 .......m....i./. 0010: 49 1E 70 91 I.p. ] ] ] Algorithm: [SHA256withRSA] Signature: 0000: 3B B9 0E 1F 87 68 AA 22 8D 9C FA 50 27 C2 B4 A5 ;....h."...P'... 0010: A5 F8 E4 56 E5 BB BB AB 6D 10 3B 18 52 86 AB 1A ...V....m.;.R... 0020: 40 B3 0E 42 E7 98 E6 75 02 5D 3A 4E 69 4F F0 5E @..B...u.]:NiO.^ 0030: B2 A9 92 3A B9 5D 85 41 06 1A BB 21 89 EC 2C 1D ...:.].A...!..,. 0040: 9F 28 39 58 69 F4 8F 3F 32 E4 C0 36 50 B4 22 2D .(9Xi..?2..6P."- 0050: 41 AC 8C 45 56 00 A0 20 59 0D 36 5D 3B 8E 1C 59 A..EV.. Y.6];..Y 0060: E0 2D A4 52 E4 A7 2E 6C 63 1C 00 9C 65 71 90 99 .-.R...lc...eq.. 0070: 9D 51 5E 9A 42 CB 3F BB 3C 6C 7E AB 2C CB B3 1F .Q^.B.?./..9.p..J 0120: FF 36 E1 66 A5 E8 32 C3 5A AC 2D B8 F1 A0 83 5B .6.f..2.Z.-....[ 0130: 4E 7B AB 75 1B 55 B0 80 39 1E 05 48 A4 D2 56 16 N..u.U..9..H..V. 0140: F2 56 39 CC 1E DB A9 A1 F1 10 54 7D 79 C7 B0 9C .V9.......T.y... 0150: 0F 33 F1 60 C1 BD CD 77 49 72 86 77 68 34 39 3E .3.`...wIr.wh49> 0160: 5B 13 87 36 1E 41 22 A2 2C 81 EC 71 40 40 9A FA [..6.A".,..q@@.. 0170: 5D DB 18 61 B0 B1 A4 A2 3E 20 68 9F 7E 4F 90 CF ]..a....> h..O.. 0180: 0B 1B 26 27 9F 35 CC C7 74 84 14 65 AF 0D 49 39 ..&'.5..t..e..I9 0190: 7A ED 87 CB 2C 7B AC 9F BB D0 B4 48 A3 8D 00 FA z...,......H.... 01A0: 75 71 6E 17 D8 00 EF 8F 2A DD A2 A1 B8 4F A4 DE uqn.....*....O.. 01B0: F9 20 C2 C1 5F D0 9A 53 DF D8 23 33 36 99 81 63 . .._..S..#36..c 01C0: 9B 32 97 90 8A 78 E3 B0 FD DA EE 97 BD 7C 92 B4 .2...x.......... 01D0: C0 C8 75 6C 81 84 43 D5 4C 2E 46 4C 4B 9C 96 70 ..ul..C.L.FLK..p 01E0: AE 50 19 2A 04 E8 CF 5B 09 17 EF 97 CC 0E 9B AD .P.*...[........ 01F0: D3 54 D4 21 94 C0 49 EC DA 8B 9B 12 E2 3F D5 09 .T.!..I......?.. ] chain [1] = [ [ Version: V3 Subject: CN=Deploy, OU=DEV, O=Oracle, L=Santa Clara, ST=CA, C=US Signature Algorithm: SHA256withRSA, OID = 1.2.840.113549.1.1.11 Key: Sun RSA public key, 4096 bits modulus: 849953258605127028430388653187571693119994603253831509944165695948902333870652735485009179639332025059264510613513770058528116684955645364459059463774339759118238379559080228690635540023391127586736185629196108061422937551286886635161255424199937594422811584962764315992728818530330323323660630236599075046457514476831659401493595510701048798034367059978259449272818133235319159134123820048323324329808897202797459598751693689998475936585527654230297604365393816247703563416375036706742962673642696810724706557458499409200954368951393777573856916462816783412022353876755426998970906700935490633855201485905827918775287412562289407042643402824874928173230719037435488978231773066240646576912504954234995052482298969384390834399974479716112224019920903020802742961606783763122459898194221100335606064673963678579325277397942640530866375920383800073637679989603832901168500797931424323053774855078887727162833129883132625775035195111214838620594468999685799420938367850542805221593382978825246937771937962016273756048415501829287008368050568706316532539184393917227978969408067173250133438946243738983371890224018502259162230114631373205542118723148721310604808430483895913748158296789187896927353231265870991688535466912936858549035641 public exponent: 65537 Validity: [From: Tue Jun 09 15:54:03 PDT 2015, To: Mon Jun 04 15:54:03 PDT 2035] Issuer: CN=Deploy, OU=DEV, O=Oracle, L=Santa Clara, ST=CA, C=US SerialNumber: [ 976af296 a1bbcfaf] Certificate Extensions: 3 [1]: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: 1A CC 30 E0 B0 23 2A 68 19 60 42 30 C2 68 C8 1C ..0..#*h.`B0.h.. 0010: 06 FD 39 E5 ..9. ] ] [2]: ObjectId: 2.5.29.19 Criticality=false BasicConstraints:[ CA:true PathLen:2147483647 ] [3]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 1A CC 30 E0 B0 23 2A 68 19 60 42 30 C2 68 C8 1C ..0..#*h.`B0.h.. 0010: 06 FD 39 E5 ..9. ] ] ] Algorithm: [SHA256withRSA] Signature: 0000: 0B CA DE CF F4 24 AA 8A 11 2B B7 35 DB F2 ED F7 .....$...+.5.... 0010: F8 77 7C CB 35 D3 1B 42 26 4D 70 34 24 A9 01 25 .w..5..B&Mp4$..% 0020: D1 FF E2 AA A9 CF A1 F0 D8 95 17 50 AB 4F 0D 79 ...........P.O.y 0030: 7C E9 BA 9A 27 26 C8 C4 60 D1 7F BA 3A 7E D5 5B ....'&..`...:..[ 0040: AE 19 4A CC AC 8D 5B B8 62 8C 43 71 CC A3 2D EA ..J...[.b.Cq..-. 0050: 76 13 F4 09 12 B1 31 CA 05 A4 77 C6 78 EF 5C 0F v.....1...w.x.\. 0060: 57 B9 62 96 D4 1C 78 1F 1A F9 BE B3 79 5A C7 8E W.b...x.....yZ.. 0070: FE B6 2B 7F FC 03 6C 0D 2B 23 C6 DF 09 B3 F9 1D ..+...l.+#...... 0080: B2 49 A8 78 C9 E3 3F 0A 0C 43 B3 22 4C 79 FC 68 .I.x..?..C."Ly.h 0090: E9 74 14 CC 51 39 89 91 AC 9B 62 7C 67 D2 8B DA .t..Q9....b.g... 00A0: 22 4E DB 3A BD B1 3A 55 1E C4 9E 6A D4 45 8C FD "N.:..:U...j.E.. 00B0: 9A 3C 1E F5 2F AF 8E B9 88 E0 67 A3 FA 71 80 C5 .<../.....g..q.. 00C0: A3 59 84 36 28 29 FF 79 88 09 7B 99 D9 65 76 A2 .Y.6().y.....ev. 00D0: 86 F1 E0 24 E7 11 12 58 12 B8 00 A5 61 7D 20 C4 ...$...X....a. . 00E0: C6 AF 47 2B 5B 3D 37 9D FD 37 51 F1 0E 2A 1C E8 ..G+[=7..7Q..*.. 00F0: F8 B5 AA 2D 07 F9 D2 94 0C 5C E5 46 7C 2C 01 69 ...-.....\.F.,.i 0100: 2A 9B B4 22 E5 FA B4 38 26 14 F2 C1 18 E6 30 86 *.."...8&.....0. 0110: 98 14 4B 9C BF CF C1 BB 49 CC 51 94 99 48 6A AF ..K.....I.Q..Hj. 0120: EF 91 6D 29 64 4E 96 E5 E1 6C 2A D1 30 8A 5C 4C ..m)dN...l*.0.\L 0130: B0 1D 14 8D 39 43 E5 53 8E 22 31 24 20 91 19 F7 ....9C.S."1$ ... 0140: 3F BD 95 31 11 38 11 0B 77 1C AD 9E A9 9E D3 B3 ?..1.8..w....... 0150: E4 14 DD 01 D9 DA 04 ED 3A 47 07 9C AE BF FA E9 ........:G...... 0160: 69 72 27 8C 36 21 98 B6 FC 23 2A 6A F0 59 77 08 ir'.6!...#*j.Yw. 0170: BF D0 9F AE 5E 0B B7 F4 65 74 8C 47 C5 E6 EF 7C ....^...et.G.... 0180: 11 2C 11 86 83 93 2D A6 61 10 85 EB 99 80 4A A5 .,....-.a.....J. 0190: D2 94 C9 5D FA 96 59 19 FD 0D 5A 8A F3 24 37 D7 ...]..Y...Z..$7. 01A0: A1 7E 51 60 3A 8E 2C 13 1D 27 73 C7 85 EC 8B 99 ..Q`:.,..'s..... 01B0: BB 23 21 2A 97 62 BE 3D 7F BE A6 51 E3 0F CA A1 .#!*.b.=...Q.... 01C0: 43 7A 1C A7 89 A2 50 D2 08 0C 86 DE E6 D8 03 77 Cz....P........w 01D0: 79 1C 34 3F 19 66 DA 20 1C 23 01 28 12 9B A8 8C y.4?.f. .#.(.... 01E0: 82 FD 29 76 D3 04 C9 71 9C F4 F8 1C 33 12 0C 1B ..)v...q....3... 01F0: 02 1E 4D FB 18 83 C5 A3 38 C6 99 DC 0B 88 D2 88 ..M.....8....... ] *** *** ClientKeyExchange, RSA PreMasterSecret, TLSv1 Java Web Start Main Thread, WRITE: TLSv1 Handshake, length = 2928 SESSION KEYGEN: PreMaster Secret: 0000: 03 01 71 1C E1 76 21 2A C1 C9 DD AD 41 5C BE E3 ..q..v!*....A\.. 0010: A4 AE AA DA FC DA BB C8 54 31 4B 0B EE 25 95 E6 ........T1K..%.. 0020: 41 F0 12 7E 13 18 42 78 8A E2 99 49 12 75 EB B1 A.....Bx...I.u.. CONNECTION KEYGEN: Client Nonce: 0000: 55 78 A2 6A DC 81 86 CF DC CE 17 84 3A EB A2 19 Ux.j........:... 0010: F5 08 AA CB 6D 5A 77 15 13 CC 50 8B 61 9F 8F C6 ....mZw...P.a... Server Nonce: 0000: 55 78 A2 6A 8D EA 58 85 0E 2F 6A 35 1D AE 69 BD Ux.j..X../j5..i. 0010: 3D 50 8F CB 1E C5 9B B2 DD 39 3F 60 B9 A4 42 DF =P.......9?`..B. Master Secret: 0000: C7 4C 6F 25 9E 26 5C FB 3B C1 AB 68 F8 57 A4 82 .Lo%.&\.;..h.W.. 0010: 20 EA 4D 26 E8 93 91 E5 29 F1 86 67 4D B8 BD 2F .M&....)..gM../ 0020: 89 91 03 03 08 E7 97 83 45 AF 9B C6 77 BB 5B D7 ........E...w.[. Client MAC write Secret: 0000: EE 23 B4 7A 8A D1 39 00 A5 0F 6C 87 7C 7F 75 8A .#.z..9...l...u. 0010: 2B 0B 66 D8 +.f. Server MAC write Secret: 0000: 95 07 B4 6A 14 D2 39 7F 8B B9 64 C0 E5 44 5B 50 ...j..9...d..D[P 0010: 51 DC 49 44 Q.ID Client write key: 0000: 44 EA 07 D6 05 CB 8B EB 3B 1D B9 61 2A 5E E2 F6 D.......;..a*^.. Server write key: 0000: E0 58 70 34 8C B6 1A A3 02 07 55 3C E0 99 11 56 .Xp4......U<...V Client write IV: 0000: 12 32 68 CC 1F A3 FE 8C 11 5C E8 A1 B1 32 95 AE .2h......\...2.. Server write IV: 0000: 25 1D DC 85 71 76 D2 BA C6 0D 7F 0C 8D 61 50 BB %...qv.......aP. *** CertificateVerify Java Web Start Main Thread, WRITE: TLSv1 Handshake, length = 288 Java Web Start Main Thread, WRITE: TLSv1 Change Cipher Spec, length = 32 *** Finished verify_data: { 95, 170, 41, 136, 150, 173, 60, 129, 194, 124, 224, 75 } *** Java Web Start Main Thread, WRITE: TLSv1 Handshake, length = 48 Java Web Start Main Thread, READ: TLSv1 Change Cipher Spec, length = 32 Java Web Start Main Thread, READ: TLSv1 Handshake, length = 48 *** Finished verify_data: { 142, 95, 11, 28, 40, 208, 207, 243, 36, 171, 129, 18 } *** %% Cached client session: [Session-2, TLS_RSA_WITH_AES_128_CBC_SHA] Java Web Start Main Thread, READ: TLSv1 Application Data, length = 912 network: Created version ID: 1.8.0.51 network: Created version ID: 1.8 basic: LaunchDesc.selectJRE(false, false) returning selected jre: null cache: registerReference: com.sun.deploy.cache.MemoryCache$CachedResourceReference@ef62b56a: 3 network: Created version ID: 8.0.51 cache: registerReference: com.sun.deploy.cache.MemoryCache$CachedResourceReference@ef62b56a: 4 temp: new XMLParser with source: temp: Test Oracle temp: returning ROOT as follows: Test Oracle temp: returning LaunchDesc from XMLFormat.parse(): Test Oracle network: Created version ID: 1.8.0.45 network: Created version ID: 1.8.0.51 network: Created version ID: 1.8.0.45 network: Created version ID: 1.8.0.51 network: Created version ID: 1.8.0.51 network: Created version ID: 1.8 network: Created version ID: 8.0.51 network: Created version ID: 1.8.0.45 network: Created version ID: 1.8.0.51 network: Created version ID: 1.8.0.51 network: Created version ID: 1.8 cache: Clean up the reference queue: https://dan/QuickTest/testpoc.jarjnlp cache: deregisterReference: com.sun.deploy.cache.MemoryCache$CachedResourceReference@ef62b56a: 3 cache: Clean up the reference queue: https://dan/QuickTest/testpoc.jarjnlp cache: deregisterReference: com.sun.deploy.cache.MemoryCache$CachedResourceReference@ef62b56a: 2 cache: Clean up the reference queue: https://dan/QuickTest/testpoc.jarjnlp cache: deregisterReference: com.sun.deploy.cache.MemoryCache$CachedResourceReference@ef62b56a: 1 cache: delayedRemoveResource: https://dan/QuickTest/testpoc.jarjnlp network: Created version ID: 8.0.51 network: Created version ID: 1.8.0.45 network: Created version ID: 1.8.0.51 basic: LaunchDesc.selectJRE(false, false) returning selected jre: null network: Created version ID: 1.8.0.45 network: Created version ID: 1.8.0.51 network: Created version ID: 1.8.0.45 network: Created version ID: 1.8.0.51 network: Created version ID: 1.8.0.51 network: Created version ID: 1.8 network: Created version ID: 8.0.51 network: Created version ID: 1.8.0.45 network: Created version ID: 1.8.0.51 network: Created version ID: 1.8.0.51 network: Created version ID: 1.8 network: Created version ID: 8.0.51 network: Created version ID: 1.8.0.45 network: Created version ID: 1.8.0.51 basic: LaunchDesc.selectJRE(false, false) returning selected jre: null basic: LaunchDesc.selectJRE(false, false) returning selected jre: null basic: LaunchDesc.selectJRE(false, false) returning selected jre: null basic: LaunchDesc.selectJRE(false, false) returning selected jre: null basic: LaunchDesc.selectJRE(false, false) returning selected jre: null basic: LaunchDesc.selectJRE(false, false) returning selected jre: null basic: LaunchDesc.selectJRE(false, false) returning selected jre: null network: Cache entry not found [url: https://dan/QuickTest/testpoc.jar, version: null] cache: JNLPPreverifyClassLoader.initialize: FAILED: https://dan/QuickTest/testpoc.jar basic: Plugin2ClassLoader.addURL2 called for https://dan/QuickTest/testpoc.jar basic: Plugin2ClassLoader.drainPendingURLs addURL called for https://dan/QuickTest/testpoc.jar basic: LaunchDesc.selectJRE(false, false) returning selected jre: null basic: LaunchDesc.selectJRE(false, false) returning selected jre: null basic: LaunchDesc.selectJRE(false, false) returning selected jre: null basic: LaunchDesc.selectJRE(false, false) returning selected jre: null basic: LaunchDesc.selectJRE(false, false) returning selected jre: null network: LaunchDownload: concurrent downloads from LD: 4 network: Total size to download: -1 security: Security check for progress jars: allSigned=true network: Cache entry not found [url: https://dan/QuickTest/testpoc.jar, version: null] network: Cache entry not found [url: https://dan/QuickTest/testpoc.jar, version: null] network: Connecting https://dan/QuickTest/testpoc.jar with proxy=DIRECT Thread-9, setSoTimeout(0) called Thread-9, WRITE: TLSv1 Application Data, length = 320 Thread-9, READ: TLSv1 Application Data, length = 10384 network: ResponseCode for https://dan/QuickTest/testpoc.jar : 200 network: Encoding for https://dan/QuickTest/testpoc.jar : null network: Server response: (length: 10117, lastModified: Mon Mar 30 10:29:49 PDT 2015, downloadVersion: null, mimeType: application/java-archive) network: Cache entry not found [url: https://dan/QuickTest/testpoc.jar, version: null] network: CleanupThread used 4 us network: Downloading resource: https://dan/QuickTest/testpoc.jar Content-Length: 10,117 Content-Encoding: null network: Wrote URL https://dan/QuickTest/testpoc.jar to File C:\Users\datitov.ORADEV\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\53\5357ea75-6181c999-temp network: Disconnect connection to https://dan/QuickTest/testpoc.jar security: Blacklist revocation check is enabled security: blacklist: Reconstruct cache security: blacklist: created: NEED_CREATE, lastModified: 1433969264635 security: blacklist: check contains rlqjVtQ/n5efACqcguBI8LiTzAV/NqBRDmbOZvKe5xg=, state now NEED_CREATE security: blacklist: check raw C:\Users\datitov.ORADEV\AppData\LocalLow\Sun\Java\Deployment\security\blacklist.dynamic, false security: blacklist: check raw C:\Program Files (x86)\Java\jre1.8.0_51\lib\security\blacklist, false security: blacklist: check raw C:\Users\datitov.ORADEV\AppData\LocalLow\Sun\Java\Deployment\security\blacklist, false security: blacklist: save cache to C:\Users\datitov.ORADEV\AppData\LocalLow\Sun\Java\Deployment\cache\security\blacklist.cache security: Trusted libraries list check is enabled security: Trusted libraries list file not found cache: Create from verifier: JarSigningData{hasOnlySignedEntries=true, hasSingleCodeSource=true, hasMissingSignedEntries=false} network: Cache: Enable a new CacheEntry: https://dan/QuickTest/testpoc.jar network: CleanupThread used 1 us network: Downloaded https://dan/QuickTest/testpoc.jar: C:\Users\datitov.ORADEV\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\53\5357ea75-6181c999 cache: Adding MemoryCache entry: https://dan/QuickTest/testpoc.jar cache: registerReference: com.sun.deploy.cache.MemoryCache$CachedResourceReference@10a3fca2: 1 network: Download Progress: jarsDone: 1 basic: LaunchDesc.selectJRE(false, false) returning selected jre: null basic: LaunchDesc location: https://dan/QuickTest/testpoc.jarjnlp basic: LaunchDesc.selectJRE(false, false) returning selected jre: null network: Created version ID: 1.8.0.51 network: Created version ID: 1.8 network: Created version ID: 8.0.51 network: Created version ID: 1.8.0.51 network: Created version ID: 1.8 network: Created version ID: 8.0.51 network: Created version ID: 1.8.0.51 network: Created version ID: 1.8 basic: No valid JFX runtime at [C:\Program Files (x86)\Java\jre1.8.0_51\bin\javaw.exe] basic: No valid JFX runtime at [C:\Program Files (x86)\Java\jre1.8.0_51\bin\javaw.exe] network: Created version ID: 8.0.51 network: Created version ID: 1.8.0.51 network: Created version ID: 1.8 basic: No valid JFX runtime at [C:\Program Files (x86)\Java\jre1.8.0_51\bin\javaw.exe] basic: No valid JFX runtime at [C:\Program Files (x86)\Java\jre1.8.0_51\bin\javaw.exe] network: Created version ID: 8.0.51 network: Created version ID: 1.8.0.51 network: Created version ID: 1.8 basic: No valid JFX runtime at [C:\Program Files (x86)\Java\jre1.8.0_51\bin\javaw.exe] basic: No valid JFX runtime at [C:\Program Files (x86)\Java\jre1.8.0_51\bin\javaw.exe] network: Created version ID: 8.0.51 network: Created version ID: 1.8.0.45 network: Created version ID: 1.8.0.51 network: Created version ID: 1.8.0.45 network: Created version ID: 1.8.0.51 network: Created version ID: 1.8.0.51 network: Created version ID: 1.8 network: Created version ID: 8.0.51 network: Created version ID: 1.8.0.45 network: Created version ID: 1.8.0.51 network: Created version ID: 1.8.0.51 network: Created version ID: 1.8 network: Created version ID: 8.0.51 network: Created version ID: 1.8.0.45 network: Created version ID: 1.8.0.51 basic: LaunchDesc.selectJRE(false, true) returning selected jre: null network: Created version ID: 1.8.0.51 network: Created version ID: 1.8.0.45 network: Created version ID: 1.8.0.51 network: Created version ID: 1.8 network: Created version ID: 8.0.51 network: Created version ID: 1.8.0.51 network: Created version ID: 1.8.0.45 network: Created version ID: 1.8.0.51 network: Created version ID: 1.8.0.45 basic: LaunchDesc.selectJRE(true, false) returning selected jre: JREInfo for index 0: platform is: 1.8 product is: 1.8.0_51 location is: http://java.sun.com/products/autodl/j2se path is: C:\Program Files (x86)\Java\jre1.8.0_51\bin\javaw.exe args is: native platform is: Windows, x86 [ x86, 32bit ] JavaFX runtime is: JavaFX 8.0.51 found at C:\Program Files (x86)\Java\jre1.8.0_51\ enabled is: true registered is: true system is: false network: Created version ID: 1.8.0.51 network: Created version ID: 1.8.0.45 network: Created version ID: 1.0+ network: Created version ID: 7.0 cache: registerReference: com.sun.deploy.cache.MemoryCache$CachedResourceReference@10a3fca2: 2 cache: registerReference: com.sun.deploy.cache.MemoryCache$CachedResourceReference@10a3fca2: 3 security: Validating cached jar url=https://dan/QuickTest/testpoc.jar ffile=C:\Users\datitov.ORADEV\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\53\5357ea75-6181c999 com.sun.deploy.cache.CachedJarFile@d4141c security: Trust for: https://dan/QuickTest/testpoc.jar has ended: Wed Dec 31 16:00:00 PST 1969 security: Trust for: https://dan/QuickTest/testpoc.jar has ended: Wed Dec 31 16:00:00 PST 1969 security: Validating cached jar url=https://dan/QuickTest/testpoc.jar ffile=C:\Users\datitov.ORADEV\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\53\5357ea75-6181c999 com.sun.deploy.cache.CachedJarFile@d4141c security: Trust for: https://dan/QuickTest/testpoc.jar has ended: Wed Dec 31 16:00:00 PST 1969 security: Missing Codebase manifest attribute for: https://dan/QuickTest/testpoc.jar security: Missing Application-Library-Allowable-Codebase manifest attribute for: https://dan/QuickTest/testpoc.jar security: Loading certificates from Deployment session certificate store security: Loaded certificates from Deployment session certificate store security: Loading certificates from Deployment session certificate store security: Loaded certificates from Deployment session certificate store security: Loading certificates from Deployment session certificate store security: Loaded certificates from Deployment session certificate store security: Loading certificates from Deployment session certificate store security: Loaded certificates from Deployment session certificate store security: Loading Root CA certificates from C:\Users\datitov.ORADEV\AppData\LocalLow\Sun\Java\Deployment\security\trusted.cacerts security: Loaded Root CA certificates from C:\Users\datitov.ORADEV\AppData\LocalLow\Sun\Java\Deployment\security\trusted.cacerts security: Loading Root CA certificates from C:\Program Files (x86)\Java\jre1.8.0_51\lib\security\cacerts security: Loaded Root CA certificates from C:\Program Files (x86)\Java\jre1.8.0_51\lib\security\cacerts security: Obtain certificate collection in Root CA certificate store security: Obtain certificate collection in Root CA certificate store security: Obtain certificate collection in Root CA certificate store security: Obtain certificate collection in Root CA certificate store security: SHA-256Certificate finger print: 5184FC1E50375F7FF3BE8F0E847759111918604DFE3CEAF1D22BA20DE1C193E1 security: SHA-256Certificate finger print: 0CFC19DB681B014BFE3F23CB3A78B67208B4E3D8D7B6A7B1807F7CD6ECB2A54E security: SHA-256Certificate finger print: 8420DFBE376F414BF4C0A81E6936D24CCC03F304835B86C7A39142FCA723A689 security: SHA-256Certificate finger print: A4B6B3996FC2F306B3FD8681BD63413D8C5009CC4FA329C2CCF0E2FA1B140305 security: SHA-256Certificate finger print: A4B6B3996FC2F306B3FD8681BD63413D8C5009CC4FA329C2CCF0E2FA1B140305 security: The OCSP support is enabled security: The CRL support is enabled network: Connecting http://ocsp.verisign.com/ with proxy=DIRECT network: Connecting socket://ocsp.verisign.com:80 with proxy=DIRECT security: OCSP Response: GOOD network: Connecting http://ocsp.verisign.com/ with proxy=DIRECT security: OCSP Response: GOOD network: Connecting http://sf.symcd.com/ with proxy=DIRECT network: Connecting socket://sf.symcd.com:80 with proxy=DIRECT security: OCSP Response: GOOD security: Certificate validation succeeded using OCSP/CRL security: Saving certificates in Deployment session certificate store security: Saved certificates in Deployment session certificate store cache: Clean up the reference queue: https://dan/QuickTest/testpoc.jar cache: deregisterReference: com.sun.deploy.cache.MemoryCache$CachedResourceReference@10a3fca2: 2 security: Verifying permission attribute in main jar: https://dan/QuickTest/testpoc.jar network: Created version ID: 1.8.0.51 network: Created version ID: 1.8.0.45 Missing Application-Name manifest attribute for: https://dan/QuickTest/testpoc.jar security: Saving certificates in Deployment session certificate store security: Saved certificates in Deployment session certificate store cache: registerReference: com.sun.deploy.cache.MemoryCache$CachedResourceReference@10a3fca2: 3 security: SHA-256Certificate finger print: 5184FC1E50375F7FF3BE8F0E847759111918604DFE3CEAF1D22BA20DE1C193E1 security: Decision time stored for ai: Appinfo: type = 2 title = null vendor = Oracle from = https://dan/QuickTest/testpoc.jarjnlp security = 1 lapURL = https://dan/QuickTest/testpoc.jarjnlp appArgs = Test Oracle basic: passing security checks; secureArgs:true, allSigned:false network: Created version ID: 1.8.0.51 network: Created version ID: 1.8.0.45 basic: continuing launch in this VM network: LDUpdater: started background update check basic: JNLP2ClassLoader.findClass: poc.ImgApplet: try again .. basic: JNLP2ClassLoader.getPermissions() security: Grant connect perm for https://dan/QuickTest/testpoc.jar : java.security.Permissions@20abce ( ("java.net.URLPermission" "https://dan:443/-" "*:*") ("java.net.URLPermission" "https://dan:443" "*:*") ) security: Missing Codebase manifest attribute for: https://dan/QuickTest/testpoc.jar security: Missing Application-Library-Allowable-Codebase manifest attribute for: https://dan/QuickTest/testpoc.jar security: JAVAWS AppPolicy Permission requested for: https://dan/QuickTest/testpoc.jar security: Missing Codebase manifest attribute for: https://dan/QuickTest/testpoc.jar security: Missing Application-Library-Allowable-Codebase manifest attribute for: https://dan/QuickTest/testpoc.jar security: Add sandbox permissions basic: JNLP2ClassLoader.getPermissions() X security: Missing Codebase manifest attribute for: https://dan/QuickTest/testpoc.jar security: Missing Application-Library-Allowable-Codebase manifest attribute for: https://dan/QuickTest/testpoc.jar security: SSV validation: running: 1.8.0_51 requested: null range: 1.8.0_45 javaVersionParam: null Rule Set version: null network: Created version ID: 1.8.0.51 network: Created version ID: 1.8.0.45 network: Created version ID: 1.8.0.51 security: Ask user or DRS to use latest security: continue with running version security: Missing Codebase manifest attribute for: https://dan/QuickTest/testpoc.jar security: Missing Application-Library-Allowable-Codebase manifest attribute for: https://dan/QuickTest/testpoc.jar basic: Applet loaded. basic: Applet resized and added to parent container basic: PERF: AppletExecutionRunnable - applet.init() BEGIN ; jvmLaunch dt -1 us, pluginInit dt 104272728709 us, TotalTime: 104272728708 us basic: Applet initialized basic: Starting applet basic: completed perf rollup network: Cache entry not found [url: http://dan/crossdomain.xml, version: null] network: Connecting http://dan/crossdomain.xml with proxy=DIRECT network: Connecting socket://dan:80 with proxy=DIRECT java.io.IOException: Server returned HTTP response code: 403 for URL: http://dan/crossdomain.xml at sun.net.www.protocol.http.HttpURLConnection.getInputStream0(Unknown Source) at sun.net.www.protocol.http.HttpURLConnection.access$200(Unknown Source) at sun.net.www.protocol.http.HttpURLConnection$9.run(Unknown Source) at sun.net.www.protocol.http.HttpURLConnection$9.run(Unknown Source) at java.security.AccessController.doPrivileged(Native Method) at java.security.AccessController.doPrivileged(Unknown Source) at sun.net.www.protocol.http.HttpURLConnection.getInputStream(Unknown Source) at com.sun.deploy.net.CrossDomainXML.check(Unknown Source) at com.sun.deploy.net.CrossDomainXML.check(Unknown Source) at sun.plugin2.applet.SecurityManagerHelper.checkConnectHelper(Unknown Source) at sun.plugin2.applet.AWTAppletSecurityManager.checkConnect(Unknown Source) at java.net.InetAddress.getAllByName0(Unknown Source) at java.net.InetAddress.getAllByName(Unknown Source) at java.net.InetAddress.getAllByName(Unknown Source) at java.net.InetAddress.getByName(Unknown Source) at java.net.URLStreamHandler.getHostAddress(Unknown Source) at java.net.URLStreamHandler.hashCode(Unknown Source) at java.net.URL.hashCode(Unknown Source) at sun.net.www.protocol.jar.Handler.hashCode(Unknown Source) at java.net.URL.hashCode(Unknown Source) at java.util.HashMap.hash(Unknown Source) at java.util.HashMap.get(Unknown Source) at sun.misc.SoftCache.get(Unknown Source) at sun.awt.SunToolkit.getImageFromHash(Unknown Source) at sun.awt.SunToolkit.getImage(Unknown Source) at poc.ImgApplet.start(ImgApplet.java:12) at com.sun.deploy.uitoolkit.impl.awt.AWTAppletAdapter.start(Unknown Source) at sun.plugin2.applet.Plugin2Manager$AppletExecutionRunnable.run(Unknown Source) at java.lang.Thread.run(Unknown Source) java.security.AccessControlException: access denied ("java.net.SocketPermission" "dan" "resolve") at java.security.AccessControlContext.checkPermission(Unknown Source) at java.security.AccessController.checkPermission(Unknown Source) at java.lang.SecurityManager.checkPermission(Unknown Source) at java.lang.SecurityManager.checkConnect(Unknown Source) at sun.plugin2.applet.SecurityManagerHelper.checkConnectHelper(Unknown Source) at sun.plugin2.applet.AWTAppletSecurityManager.checkConnect(Unknown Source) at java.net.InetAddress.getAllByName0(Unknown Source) at java.net.InetAddress.getAllByName(Unknown Source) at java.net.InetAddress.getAllByName(Unknown Source) at java.net.InetAddress.getByName(Unknown Source) at com.sun.deploy.net.CrossDomainXML.addAccess(Unknown Source) at com.sun.deploy.net.CrossDomainXML.allowNoAccess(Unknown Source) at com.sun.deploy.net.CrossDomainXML.check(Unknown Source) at sun.plugin2.applet.SecurityManagerHelper.checkConnectHelper(Unknown Source) at sun.plugin2.applet.AWTAppletSecurityManager.checkConnect(Unknown Source) at java.net.InetAddress.getAllByName0(Unknown Source) at java.net.InetAddress.getAllByName(Unknown Source) at java.net.InetAddress.getAllByName(Unknown Source) at java.net.InetAddress.getByName(Unknown Source) at java.net.URLStreamHandler.getHostAddress(Unknown Source) at java.net.URLStreamHandler.hashCode(Unknown Source) at java.net.URL.hashCode(Unknown Source) at sun.net.www.protocol.jar.Handler.hashCode(Unknown Source) at java.net.URL.hashCode(Unknown Source) at java.util.HashMap.hash(Unknown Source) at java.util.HashMap.get(Unknown Source) at sun.misc.SoftCache.get(Unknown Source) at sun.awt.SunToolkit.getImageFromHash(Unknown Source) at sun.awt.SunToolkit.getImage(Unknown Source) at poc.ImgApplet.start(ImgApplet.java:12) at com.sun.deploy.uitoolkit.impl.awt.AWTAppletAdapter.start(Unknown Source) at sun.plugin2.applet.Plugin2Manager$AppletExecutionRunnable.run(Unknown Source) at java.lang.Thread.run(Unknown Source) basic: Applet made visible basic: Applet started basic: Told clients applet is started Plugin2Manager calling stopFailed() because of exception during AppContext.dispose()