Log started: Wed, 10 Jun 2015 13:23:32 -0700 Java Web Start 11.51.2.16 Using JRE version 1.8.0_51-b16 Java HotSpot(TM) Client VM X509KeyManager passed to SSLContext.init(): need an X509ExtendedKeyManager for SSLEngine use trigger seeding of SecureRandom done seeding SecureRandom Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 Allow unsafe renegotiation: false Allow legacy hello messages: true Is initial handshake: true Is secure renegotiation: false Java Web Start Main Thread, setSoTimeout(0) called Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 for TLSv1.1 %% No cached client session *** ClientHello, TLSv1.2 RandomCookie: GMT: 1433902020 bytes = { 38, 119, 79, 87, 137, 6, 159, 86, 134, 24, 3, 13, 133, 8, 151, 57, 19, 216, 90, 98, 50, 162, 44, 195, 245, 199, 200, 138 } Session ID: {} Cipher Suites: [TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256, TLS_RSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_DSS_WITH_AES_128_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_DSS_WITH_AES_128_GCM_SHA256, TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA, TLS_EMPTY_RENEGOTIATION_INFO_SCSV] Compression Methods: { 0 } Extension elliptic_curves, curve names: {secp256r1, sect163k1, sect163r2, secp192r1, secp224r1, sect233k1, sect233r1, sect283k1, sect283r1, secp384r1, sect409k1, sect409r1, secp521r1, sect571k1, sect571r1, secp160k1, secp160r1, secp160r2, sect163r1, secp192k1, sect193r1, sect193r2, secp224k1, sect239k1, secp256k1} Extension ec_point_formats, formats: [uncompressed] Extension signature_algorithms, signature_algorithms: SHA512withECDSA, SHA512withRSA, SHA384withECDSA, SHA384withRSA, SHA256withECDSA, SHA256withRSA, SHA224withECDSA, SHA224withRSA, SHA1withECDSA, SHA1withRSA, SHA1withDSA, MD5withRSA *** Java Web Start Main Thread, WRITE: TLSv1.2 Handshake, length = 195 Java Web Start Main Thread, READ: TLSv1 Handshake, length = 1465 *** ServerHello, TLSv1 RandomCookie: GMT: 1433902028 bytes = { 146, 40, 93, 160, 26, 62, 37, 97, 38, 148, 248, 160, 22, 208, 158, 70, 112, 227, 6, 111, 113, 92, 114, 196, 136, 111, 27, 86 } Session ID: {64, 74, 0, 0, 124, 242, 62, 134, 71, 58, 30, 124, 136, 41, 52, 117, 195, 171, 115, 134, 48, 248, 181, 190, 123, 84, 62, 189, 88, 233, 21, 54} Cipher Suite: TLS_RSA_WITH_AES_128_CBC_SHA Compression Method: 0 Extension renegotiation_info, renegotiated_connection: *** %% Initialized: [Session-1, TLS_RSA_WITH_AES_128_CBC_SHA] ** TLS_RSA_WITH_AES_128_CBC_SHA *** Certificate chain chain [0] = [ [ Version: V3 Subject: CN=dan, OU=Test, O=Oracle, ST=CA, C=US Signature Algorithm: SHA256withRSA, OID = 1.2.840.113549.1.1.11 Key: Sun RSA public key, 2048 bits modulus: 27993800329023506915188619937271073675146531754788656107091985839151221862956338660826083129307150299177076284927991039444425558608748586185501453381350031509010983827567837732358657008599408295712364829220775090997081135518958109857589576926141558932552245139006180802682152879425941672165491708704274822508509790090280409136905763815540974504871865424441967155500742973933231552413698265953703372042016370786259247265523915810183271065561834150991240902083054508495535295536147129309792303053577725565695417921470016939423833336117790167245101378899510456944492050424721996316349253989237480157324834028741000498233 public exponent: 65537 Validity: [From: Tue Jun 09 16:13:29 PDT 2015, To: Sat Jun 18 16:13:29 PDT 2016] Issuer: CN=Deploy, OU=DEV, O=Oracle, L=Santa Clara, ST=CA, C=US SerialNumber: [ 1000] Certificate Extensions: 7 [1]: ObjectId: 2.16.840.1.113730.1.13 Criticality=false Extension unknown: DER encoded OCTET string = 0000: 04 26 16 24 4F 70 65 6E 53 53 4C 20 47 65 6E 65 .&.$OpenSSL Gene 0010: 72 61 74 65 64 20 53 65 72 76 65 72 20 43 65 72 rated Server Cer 0020: 74 69 66 69 63 61 74 65 tificate [2]: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: 1A CC 30 E0 B0 23 2A 68 19 60 42 30 C2 68 C8 1C ..0..#*h.`B0.h.. 0010: 06 FD 39 E5 ..9. ] [CN=Deploy, OU=DEV, O=Oracle, L=Santa Clara, ST=CA, C=US] SerialNumber: [ 976af296 a1bbcfaf] ] [3]: ObjectId: 2.5.29.19 Criticality=false BasicConstraints:[ CA:false PathLen: undefined ] [4]: ObjectId: 2.5.29.37 Criticality=false ExtendedKeyUsages [ serverAuth ] [5]: ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_Encipherment ] [6]: ObjectId: 2.16.840.1.113730.1.1 Criticality=false NetscapeCertType [ SSL server ] [7]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 03 60 18 99 86 2F C3 6E 7B 46 FB F3 FE 55 C5 8F .`.../.n.F...U.. 0010: 4D 4A 28 B9 MJ(. ] ] ] Algorithm: [SHA256withRSA] Signature: 0000: 32 FA 27 95 DB 98 65 FC CD 86 03 57 C9 3A 91 6A 2.'...e....W.:.j 0010: 25 A7 8C 5A 5B ED 8A 7E 3F 1F F6 85 B0 A4 B4 51 %..Z[...?......Q 0020: 85 68 90 BB 1F F8 3E 3E DA 69 08 6F B0 D0 57 C4 .h....>>.i.o..W. 0030: 35 0C 57 0C AF 31 5F 63 AC AB 56 E8 45 D5 3A A1 5.W..1_c..V.E.:. 0040: CF 6E B5 06 EB 5E A1 63 7E 70 A1 8B 2B 50 E3 30 .n...^.c.p..+P.0 0050: 8E 3F FF C7 DB 0C 26 EC 44 0A 6B 4F 86 CE E1 3A .?....&.D.kO...: 0060: CB 8E E9 FE B0 06 0A CC F7 00 E6 81 AB E8 78 9C ..............x. 0070: 68 3D 2B 2D BC AE 64 41 15 29 77 6A 19 BC 25 A6 h=+-..dA.)wj..%. 0080: EC B3 EB F4 4F 48 64 68 7B 0E B5 86 2E 09 6F 16 ....OHdh......o. 0090: FE 7E 24 6D 4E F0 AD 7F 21 17 72 88 AB 10 40 45 ..$mN...!.r...@E 00A0: 90 9C E6 D9 D9 10 AA 36 65 F9 16 3C 66 FF CD 30 .......6e..L...F@..+. 00F0: 90 FC 98 17 9F 78 6F 45 01 4E 5A B5 C0 34 A9 E9 .....xoE.NZ..4.. 0100: E1 43 B6 D2 2D BD 2E 85 44 9D A9 0D 2F 9B 66 ED .C..-...D.../.f. 0110: A2 31 FD 6D A5 E5 37 3D 3B 9C 23 20 F4 67 CA DC .1.m..7=;.# .g.. 0120: 37 08 47 D2 71 5B 27 93 B1 2F D0 44 9F 41 72 95 7.G.q['../.D.Ar. 0130: BB 9E 1D 81 7E DE C1 A9 96 1F 03 34 FB AD 7C 75 ...........4...u 0140: 6A 01 4C CA C0 34 6E 86 C9 8C D8 99 07 F7 FF D4 j.L..4n......... 0150: 77 6F F1 88 D6 0D 93 16 E8 3A 75 6A 08 6D 1B A2 wo.......:uj.m.. 0160: 51 F8 A5 6E 8A 1D 66 68 0B C2 36 2B FE 26 6E 5D Q..n..fh..6+.&n] 0170: DD 6B 2C 47 60 AD 83 C9 51 30 63 CC 00 1F F5 F2 .k,G`...Q0c..... 0180: FB 66 1E 52 16 E9 3F EC E7 43 5C F1 25 C0 BE 57 .f.R..?..C\.%..W 0190: 36 3F AC C2 F2 7D 7D 8C 9E 54 10 DE 27 6D 22 CE 6?.......T..'m". 01A0: A0 35 A8 1A D9 90 BA 5C 39 21 7A 3B 83 9D F6 62 .5.....\9!z;...b 01B0: D1 ED CD BD AA F7 75 CB F0 C4 6F B0 39 8B A3 D2 ......u...o.9... 01C0: 02 B9 2F AC 79 97 85 8F 78 A2 91 29 F1 CB 10 1B ../.y...x..).... 01D0: DC D9 10 D0 F9 A7 31 92 4B F0 45 93 1A 61 08 FE ......1.K.E..a.. 01E0: 55 E3 6D C5 4F 92 CF DB 3B 4B EE 2A 5E BB 7B CA U.m.O...;K.*^... 01F0: 13 0D A4 63 4F 29 9B 63 5C 71 FD 8D B6 28 52 3A ...cO).c\q...(R: ] *** adding as trusted cert: Subject: CN=Deploy, OU=DEV, O=Oracle, L=Santa Clara, ST=CA, C=US Issuer: CN=Deploy, OU=DEV, O=Oracle, L=Santa Clara, ST=CA, C=US Algorithm: RSA; Serial number: 0x976af296a1bbcfaf Valid from Tue Jun 09 15:54:03 PDT 2015 until Mon Jun 04 15:54:03 PDT 2035 Found trusted certificate: [ [ Version: V3 Subject: CN=Deploy, OU=DEV, O=Oracle, L=Santa Clara, ST=CA, C=US Signature Algorithm: SHA256withRSA, OID = 1.2.840.113549.1.1.11 Key: Sun RSA public key, 4096 bits modulus: 849953258605127028430388653187571693119994603253831509944165695948902333870652735485009179639332025059264510613513770058528116684955645364459059463774339759118238379559080228690635540023391127586736185629196108061422937551286886635161255424199937594422811584962764315992728818530330323323660630236599075046457514476831659401493595510701048798034367059978259449272818133235319159134123820048323324329808897202797459598751693689998475936585527654230297604365393816247703563416375036706742962673642696810724706557458499409200954368951393777573856916462816783412022353876755426998970906700935490633855201485905827918775287412562289407042643402824874928173230719037435488978231773066240646576912504954234995052482298969384390834399974479716112224019920903020802742961606783763122459898194221100335606064673963678579325277397942640530866375920383800073637679989603832901168500797931424323053774855078887727162833129883132625775035195111214838620594468999685799420938367850542805221593382978825246937771937962016273756048415501829287008368050568706316532539184393917227978969408067173250133438946243738983371890224018502259162230114631373205542118723148721310604808430483895913748158296789187896927353231265870991688535466912936858549035641 public exponent: 65537 Validity: [From: Tue Jun 09 15:54:03 PDT 2015, To: Mon Jun 04 15:54:03 PDT 2035] Issuer: CN=Deploy, OU=DEV, O=Oracle, L=Santa Clara, ST=CA, C=US SerialNumber: [ 976af296 a1bbcfaf] Certificate Extensions: 3 [1]: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: 1A CC 30 E0 B0 23 2A 68 19 60 42 30 C2 68 C8 1C ..0..#*h.`B0.h.. 0010: 06 FD 39 E5 ..9. ] ] [2]: ObjectId: 2.5.29.19 Criticality=false BasicConstraints:[ CA:true PathLen:2147483647 ] [3]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 1A CC 30 E0 B0 23 2A 68 19 60 42 30 C2 68 C8 1C ..0..#*h.`B0.h.. 0010: 06 FD 39 E5 ..9. ] ] ] Algorithm: [SHA256withRSA] Signature: 0000: 0B CA DE CF F4 24 AA 8A 11 2B B7 35 DB F2 ED F7 .....$...+.5.... 0010: F8 77 7C CB 35 D3 1B 42 26 4D 70 34 24 A9 01 25 .w..5..B&Mp4$..% 0020: D1 FF E2 AA A9 CF A1 F0 D8 95 17 50 AB 4F 0D 79 ...........P.O.y 0030: 7C E9 BA 9A 27 26 C8 C4 60 D1 7F BA 3A 7E D5 5B ....'&..`...:..[ 0040: AE 19 4A CC AC 8D 5B B8 62 8C 43 71 CC A3 2D EA ..J...[.b.Cq..-. 0050: 76 13 F4 09 12 B1 31 CA 05 A4 77 C6 78 EF 5C 0F v.....1...w.x.\. 0060: 57 B9 62 96 D4 1C 78 1F 1A F9 BE B3 79 5A C7 8E W.b...x.....yZ.. 0070: FE B6 2B 7F FC 03 6C 0D 2B 23 C6 DF 09 B3 F9 1D ..+...l.+#...... 0080: B2 49 A8 78 C9 E3 3F 0A 0C 43 B3 22 4C 79 FC 68 .I.x..?..C."Ly.h 0090: E9 74 14 CC 51 39 89 91 AC 9B 62 7C 67 D2 8B DA .t..Q9....b.g... 00A0: 22 4E DB 3A BD B1 3A 55 1E C4 9E 6A D4 45 8C FD "N.:..:U...j.E.. 00B0: 9A 3C 1E F5 2F AF 8E B9 88 E0 67 A3 FA 71 80 C5 .<../.....g..q.. 00C0: A3 59 84 36 28 29 FF 79 88 09 7B 99 D9 65 76 A2 .Y.6().y.....ev. 00D0: 86 F1 E0 24 E7 11 12 58 12 B8 00 A5 61 7D 20 C4 ...$...X....a. . 00E0: C6 AF 47 2B 5B 3D 37 9D FD 37 51 F1 0E 2A 1C E8 ..G+[=7..7Q..*.. 00F0: F8 B5 AA 2D 07 F9 D2 94 0C 5C E5 46 7C 2C 01 69 ...-.....\.F.,.i 0100: 2A 9B B4 22 E5 FA B4 38 26 14 F2 C1 18 E6 30 86 *.."...8&.....0. 0110: 98 14 4B 9C BF CF C1 BB 49 CC 51 94 99 48 6A AF ..K.....I.Q..Hj. 0120: EF 91 6D 29 64 4E 96 E5 E1 6C 2A D1 30 8A 5C 4C ..m)dN...l*.0.\L 0130: B0 1D 14 8D 39 43 E5 53 8E 22 31 24 20 91 19 F7 ....9C.S."1$ ... 0140: 3F BD 95 31 11 38 11 0B 77 1C AD 9E A9 9E D3 B3 ?..1.8..w....... 0150: E4 14 DD 01 D9 DA 04 ED 3A 47 07 9C AE BF FA E9 ........:G...... 0160: 69 72 27 8C 36 21 98 B6 FC 23 2A 6A F0 59 77 08 ir'.6!...#*j.Yw. 0170: BF D0 9F AE 5E 0B B7 F4 65 74 8C 47 C5 E6 EF 7C ....^...et.G.... 0180: 11 2C 11 86 83 93 2D A6 61 10 85 EB 99 80 4A A5 .,....-.a.....J. 0190: D2 94 C9 5D FA 96 59 19 FD 0D 5A 8A F3 24 37 D7 ...]..Y...Z..$7. 01A0: A1 7E 51 60 3A 8E 2C 13 1D 27 73 C7 85 EC 8B 99 ..Q`:.,..'s..... 01B0: BB 23 21 2A 97 62 BE 3D 7F BE A6 51 E3 0F CA A1 .#!*.b.=...Q.... 01C0: 43 7A 1C A7 89 A2 50 D2 08 0C 86 DE E6 D8 03 77 Cz....P........w 01D0: 79 1C 34 3F 19 66 DA 20 1C 23 01 28 12 9B A8 8C y.4?.f. .#.(.... 01E0: 82 FD 29 76 D3 04 C9 71 9C F4 F8 1C 33 12 0C 1B ..)v...q....3... 01F0: 02 1E 4D FB 18 83 C5 A3 38 C6 99 DC 0B 88 D2 88 ..M.....8....... ] *** ServerHelloDone *** ClientKeyExchange, RSA PreMasterSecret, TLSv1 Java Web Start Main Thread, WRITE: TLSv1 Handshake, length = 262 SESSION KEYGEN: PreMaster Secret: 0000: 03 03 21 E1 B4 49 2F 8E 0B 10 0C 3C B1 12 5F 95 ..!..I/....<.._. 0010: 9C AC BC 89 CB 5A 55 F6 0B 76 6C CB FC 3B 93 76 .....ZU..vl..;.v 0020: C6 0B 02 16 CE DC C0 02 20 C4 C0 04 20 27 9C 6A ........ ... '.j CONNECTION KEYGEN: Client Nonce: 0000: 55 78 9C C4 26 77 4F 57 89 06 9F 56 86 18 03 0D Ux..&wOW...V.... 0010: 85 08 97 39 13 D8 5A 62 32 A2 2C C3 F5 C7 C8 8A ...9..Zb2.,..... Server Nonce: 0000: 55 78 9C CC 92 28 5D A0 1A 3E 25 61 26 94 F8 A0 Ux...(]..>%a&... 0010: 16 D0 9E 46 70 E3 06 6F 71 5C 72 C4 88 6F 1B 56 ...Fp..oq\r..o.V Master Secret: 0000: 94 07 81 5C 46 F9 C4 71 08 C4 44 1C 25 9F CC ED ...\F..q..D.%... 0010: 6C 35 E3 41 D9 6D 1B 19 BC D4 50 82 E7 83 95 DD l5.A.m....P..... 0020: 64 A8 85 B5 20 8B 4D C5 5F 0F 75 02 C1 19 88 6C d... .M._.u....l Client MAC write Secret: 0000: 54 31 AB 01 01 B1 B5 D2 CB 9B E1 76 E5 2D F9 A4 T1.........v.-.. 0010: 28 93 BF 4A (..J Server MAC write Secret: 0000: 14 85 9A 07 FC AB F9 3F DA DA E6 81 EC 86 9F DB .......?........ 0010: C2 89 D8 C5 .... Client write key: 0000: CF 92 A8 6A A4 A4 06 03 E3 98 ED C1 21 BB 58 73 ...j........!.Xs Server write key: 0000: 59 B6 AF BA F6 77 69 F1 2D 3C CD FB 8C 58 09 33 Y....wi.-<...X.3 Client write IV: 0000: AC E5 C8 09 A4 F7 83 E3 28 2A 84 56 BC E0 31 64 ........(*.V..1d Server write IV: 0000: 41 90 DF 68 D6 05 95 97 C9 65 79 BC 50 4F 59 4D A..h.....ey.POYM Java Web Start Main Thread, WRITE: TLSv1 Change Cipher Spec, length = 1 *** Finished verify_data: { 0, 110, 160, 54, 240, 181, 71, 212, 172, 195, 161, 225 } *** Java Web Start Main Thread, WRITE: TLSv1 Handshake, length = 48 Java Web Start Main Thread, READ: TLSv1 Change Cipher Spec, length = 1 Java Web Start Main Thread, READ: TLSv1 Handshake, length = 48 *** Finished verify_data: { 92, 228, 184, 144, 183, 171, 213, 48, 223, 187, 158, 184 } *** %% Cached client session: [Session-1, TLS_RSA_WITH_AES_128_CBC_SHA] Java Web Start Main Thread, WRITE: TLSv1 Application Data, length = 336 Java Web Start Main Thread, READ: TLSv1 Handshake, length = 32 Allow unsafe renegotiation: false Allow legacy hello messages: true Is initial handshake: false Is secure renegotiation: true Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 for TLSv1.1 *** HelloRequest (empty) %% Client cached [Session-1, TLS_RSA_WITH_AES_128_CBC_SHA] %% Try resuming [Session-1, TLS_RSA_WITH_AES_128_CBC_SHA] from port 59366 *** ClientHello, TLSv1 RandomCookie: GMT: 1433902021 bytes = { 239, 85, 114, 7, 251, 21, 163, 21, 234, 102, 53, 170, 184, 31, 185, 212, 35, 122, 136, 112, 147, 117, 117, 100, 57, 103, 95, 202 } Session ID: {64, 74, 0, 0, 124, 242, 62, 134, 71, 58, 30, 124, 136, 41, 52, 117, 195, 171, 115, 134, 48, 248, 181, 190, 123, 84, 62, 189, 88, 233, 21, 54} Cipher Suites: [TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256, TLS_RSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_DSS_WITH_AES_128_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_DSS_WITH_AES_128_GCM_SHA256, TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA] Compression Methods: { 0 } Extension elliptic_curves, curve names: {secp256r1, sect163k1, sect163r2, secp192r1, secp224r1, sect233k1, sect233r1, sect283k1, sect283r1, secp384r1, sect409k1, sect409r1, secp521r1, sect571k1, sect571r1, secp160k1, secp160r1, secp160r2, sect163r1, secp192k1, sect193r1, sect193r2, secp224k1, sect239k1, secp256k1} Extension ec_point_formats, formats: [uncompressed] Extension renegotiation_info, renegotiated_connection: 00:6e:a0:36:f0:b5:47:d4:ac:c3:a1:e1 *** Java Web Start Main Thread, WRITE: TLSv1 Handshake, length = 240 Java Web Start Main Thread, READ: TLSv1 Handshake, length = 3152 *** ServerHello, TLSv1 RandomCookie: GMT: 1433902028 bytes = { 62, 183, 177, 85, 96, 182, 25, 229, 236, 121, 123, 251, 5, 98, 171, 39, 13, 124, 125, 194, 167, 73, 56, 234, 190, 10, 228, 176 } Session ID: {212, 70, 0, 0, 25, 219, 62, 221, 57, 41, 16, 208, 56, 57, 181, 179, 188, 136, 202, 61, 229, 68, 135, 142, 20, 162, 23, 143, 75, 36, 147, 53} Cipher Suite: TLS_RSA_WITH_AES_128_CBC_SHA Compression Method: 0 Extension renegotiation_info, renegotiated_connection: 00:6e:a0:36:f0:b5:47:d4:ac:c3:a1:e1:5c:e4:b8:90:b7:ab:d5:30:df:bb:9e:b8 *** %% Initialized: [Session-2, TLS_RSA_WITH_AES_128_CBC_SHA] ** TLS_RSA_WITH_AES_128_CBC_SHA *** Certificate chain chain [0] = [ [ Version: V3 Subject: CN=dan, OU=Test, O=Oracle, ST=CA, C=US Signature Algorithm: SHA256withRSA, OID = 1.2.840.113549.1.1.11 Key: Sun RSA public key, 2048 bits modulus: 27993800329023506915188619937271073675146531754788656107091985839151221862956338660826083129307150299177076284927991039444425558608748586185501453381350031509010983827567837732358657008599408295712364829220775090997081135518958109857589576926141558932552245139006180802682152879425941672165491708704274822508509790090280409136905763815540974504871865424441967155500742973933231552413698265953703372042016370786259247265523915810183271065561834150991240902083054508495535295536147129309792303053577725565695417921470016939423833336117790167245101378899510456944492050424721996316349253989237480157324834028741000498233 public exponent: 65537 Validity: [From: Tue Jun 09 16:13:29 PDT 2015, To: Sat Jun 18 16:13:29 PDT 2016] Issuer: CN=Deploy, OU=DEV, O=Oracle, L=Santa Clara, ST=CA, C=US SerialNumber: [ 1000] Certificate Extensions: 7 [1]: ObjectId: 2.16.840.1.113730.1.13 Criticality=false Extension unknown: DER encoded OCTET string = 0000: 04 26 16 24 4F 70 65 6E 53 53 4C 20 47 65 6E 65 .&.$OpenSSL Gene 0010: 72 61 74 65 64 20 53 65 72 76 65 72 20 43 65 72 rated Server Cer 0020: 74 69 66 69 63 61 74 65 tificate [2]: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: 1A CC 30 E0 B0 23 2A 68 19 60 42 30 C2 68 C8 1C ..0..#*h.`B0.h.. 0010: 06 FD 39 E5 ..9. ] [CN=Deploy, OU=DEV, O=Oracle, L=Santa Clara, ST=CA, C=US] SerialNumber: [ 976af296 a1bbcfaf] ] [3]: ObjectId: 2.5.29.19 Criticality=false BasicConstraints:[ CA:false PathLen: undefined ] [4]: ObjectId: 2.5.29.37 Criticality=false ExtendedKeyUsages [ serverAuth ] [5]: ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_Encipherment ] [6]: ObjectId: 2.16.840.1.113730.1.1 Criticality=false NetscapeCertType [ SSL server ] [7]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 03 60 18 99 86 2F C3 6E 7B 46 FB F3 FE 55 C5 8F .`.../.n.F...U.. 0010: 4D 4A 28 B9 MJ(. ] ] ] Algorithm: [SHA256withRSA] Signature: 0000: 32 FA 27 95 DB 98 65 FC CD 86 03 57 C9 3A 91 6A 2.'...e....W.:.j 0010: 25 A7 8C 5A 5B ED 8A 7E 3F 1F F6 85 B0 A4 B4 51 %..Z[...?......Q 0020: 85 68 90 BB 1F F8 3E 3E DA 69 08 6F B0 D0 57 C4 .h....>>.i.o..W. 0030: 35 0C 57 0C AF 31 5F 63 AC AB 56 E8 45 D5 3A A1 5.W..1_c..V.E.:. 0040: CF 6E B5 06 EB 5E A1 63 7E 70 A1 8B 2B 50 E3 30 .n...^.c.p..+P.0 0050: 8E 3F FF C7 DB 0C 26 EC 44 0A 6B 4F 86 CE E1 3A .?....&.D.kO...: 0060: CB 8E E9 FE B0 06 0A CC F7 00 E6 81 AB E8 78 9C ..............x. 0070: 68 3D 2B 2D BC AE 64 41 15 29 77 6A 19 BC 25 A6 h=+-..dA.)wj..%. 0080: EC B3 EB F4 4F 48 64 68 7B 0E B5 86 2E 09 6F 16 ....OHdh......o. 0090: FE 7E 24 6D 4E F0 AD 7F 21 17 72 88 AB 10 40 45 ..$mN...!.r...@E 00A0: 90 9C E6 D9 D9 10 AA 36 65 F9 16 3C 66 FF CD 30 .......6e..L...F@..+. 00F0: 90 FC 98 17 9F 78 6F 45 01 4E 5A B5 C0 34 A9 E9 .....xoE.NZ..4.. 0100: E1 43 B6 D2 2D BD 2E 85 44 9D A9 0D 2F 9B 66 ED .C..-...D.../.f. 0110: A2 31 FD 6D A5 E5 37 3D 3B 9C 23 20 F4 67 CA DC .1.m..7=;.# .g.. 0120: 37 08 47 D2 71 5B 27 93 B1 2F D0 44 9F 41 72 95 7.G.q['../.D.Ar. 0130: BB 9E 1D 81 7E DE C1 A9 96 1F 03 34 FB AD 7C 75 ...........4...u 0140: 6A 01 4C CA C0 34 6E 86 C9 8C D8 99 07 F7 FF D4 j.L..4n......... 0150: 77 6F F1 88 D6 0D 93 16 E8 3A 75 6A 08 6D 1B A2 wo.......:uj.m.. 0160: 51 F8 A5 6E 8A 1D 66 68 0B C2 36 2B FE 26 6E 5D Q..n..fh..6+.&n] 0170: DD 6B 2C 47 60 AD 83 C9 51 30 63 CC 00 1F F5 F2 .k,G`...Q0c..... 0180: FB 66 1E 52 16 E9 3F EC E7 43 5C F1 25 C0 BE 57 .f.R..?..C\.%..W 0190: 36 3F AC C2 F2 7D 7D 8C 9E 54 10 DE 27 6D 22 CE 6?.......T..'m". 01A0: A0 35 A8 1A D9 90 BA 5C 39 21 7A 3B 83 9D F6 62 .5.....\9!z;...b 01B0: D1 ED CD BD AA F7 75 CB F0 C4 6F B0 39 8B A3 D2 ......u...o.9... 01C0: 02 B9 2F AC 79 97 85 8F 78 A2 91 29 F1 CB 10 1B ../.y...x..).... 01D0: DC D9 10 D0 F9 A7 31 92 4B F0 45 93 1A 61 08 FE ......1.K.E..a.. 01E0: 55 E3 6D C5 4F 92 CF DB 3B 4B EE 2A 5E BB 7B CA U.m.O...;K.*^... 01F0: 13 0D A4 63 4F 29 9B 63 5C 71 FD 8D B6 28 52 3A ...cO).c\q...(R: ] *** *** CertificateRequest Cert Types: RSA, DSS, ECDSA Cert Authorities: *** ServerHelloDone ssl: KeyMgr: getting aliases: [Client Dan (verified: OK), test testl (verified: OK)] ssl: Ignoring alias Client Dan: key algorithm does not match ssl: Ignoring alias test testl: key algorithm does not match ssl: KeyMgr: no matching alias found ssl: Ignoring alias Client Dan: key algorithm does not match ssl: Ignoring alias test testl: key algorithm does not match ssl: KeyMgr: no matching alias found *** Certificate chain chain [0] = [ [ Version: V3 Subject: CN=Client Dan, OU=DT, O=Oracle, ST=CA, C=US Signature Algorithm: SHA256withRSA, OID = 1.2.840.113549.1.1.11 Key: Sun RSA public key, 2048 bits modulus: 25041167234775516209191536628623554777565383090132086621648953332096188060178264453951062245373026678900806631803201242153012863620306180291650308065728058725371502399634595673335624987186925360108483413989007050442140599195843481712747433628813692094403826422162619175616021483896340983175963054251732596203189838821479908442902564116220884226235439223121816215426580437846340378795658979390484291603745983809778742894900300599813134776854161020903021723346684155649004430053145377057091248407221435223646705022416390050199799718748450589449827050606884254389363322360084564710559130123559059677644223204275542036977 public exponent: 65537 Validity: [From: Tue Jun 09 16:32:36 PDT 2015, To: Sat Jun 18 16:32:36 PDT 2016] Issuer: CN=Deploy, OU=DEV, O=Oracle, L=Santa Clara, ST=CA, C=US SerialNumber: [ 1001] Certificate Extensions: 4 [1]: ObjectId: 2.16.840.1.113730.1.13 Criticality=false Extension unknown: DER encoded OCTET string = 0000: 04 1F 16 1D 4F 70 65 6E 53 53 4C 20 47 65 6E 65 ....OpenSSL Gene 0010: 72 61 74 65 64 20 43 65 72 74 69 66 69 63 61 74 rated Certificat 0020: 65 e [2]: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: 1A CC 30 E0 B0 23 2A 68 19 60 42 30 C2 68 C8 1C ..0..#*h.`B0.h.. 0010: 06 FD 39 E5 ..9. ] ] [3]: ObjectId: 2.5.29.19 Criticality=false BasicConstraints:[ CA:false PathLen: undefined ] [4]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 9B 03 A7 E4 0B 7F 0D 6D 19 81 1C 8A 69 B2 2F 11 .......m....i./. 0010: 49 1E 70 91 I.p. ] ] ] Algorithm: [SHA256withRSA] Signature: 0000: 3B B9 0E 1F 87 68 AA 22 8D 9C FA 50 27 C2 B4 A5 ;....h."...P'... 0010: A5 F8 E4 56 E5 BB BB AB 6D 10 3B 18 52 86 AB 1A ...V....m.;.R... 0020: 40 B3 0E 42 E7 98 E6 75 02 5D 3A 4E 69 4F F0 5E @..B...u.]:NiO.^ 0030: B2 A9 92 3A B9 5D 85 41 06 1A BB 21 89 EC 2C 1D ...:.].A...!..,. 0040: 9F 28 39 58 69 F4 8F 3F 32 E4 C0 36 50 B4 22 2D .(9Xi..?2..6P."- 0050: 41 AC 8C 45 56 00 A0 20 59 0D 36 5D 3B 8E 1C 59 A..EV.. Y.6];..Y 0060: E0 2D A4 52 E4 A7 2E 6C 63 1C 00 9C 65 71 90 99 .-.R...lc...eq.. 0070: 9D 51 5E 9A 42 CB 3F BB 3C 6C 7E AB 2C CB B3 1F .Q^.B.?./..9.p..J 0120: FF 36 E1 66 A5 E8 32 C3 5A AC 2D B8 F1 A0 83 5B .6.f..2.Z.-....[ 0130: 4E 7B AB 75 1B 55 B0 80 39 1E 05 48 A4 D2 56 16 N..u.U..9..H..V. 0140: F2 56 39 CC 1E DB A9 A1 F1 10 54 7D 79 C7 B0 9C .V9.......T.y... 0150: 0F 33 F1 60 C1 BD CD 77 49 72 86 77 68 34 39 3E .3.`...wIr.wh49> 0160: 5B 13 87 36 1E 41 22 A2 2C 81 EC 71 40 40 9A FA [..6.A".,..q@@.. 0170: 5D DB 18 61 B0 B1 A4 A2 3E 20 68 9F 7E 4F 90 CF ]..a....> h..O.. 0180: 0B 1B 26 27 9F 35 CC C7 74 84 14 65 AF 0D 49 39 ..&'.5..t..e..I9 0190: 7A ED 87 CB 2C 7B AC 9F BB D0 B4 48 A3 8D 00 FA z...,......H.... 01A0: 75 71 6E 17 D8 00 EF 8F 2A DD A2 A1 B8 4F A4 DE uqn.....*....O.. 01B0: F9 20 C2 C1 5F D0 9A 53 DF D8 23 33 36 99 81 63 . .._..S..#36..c 01C0: 9B 32 97 90 8A 78 E3 B0 FD DA EE 97 BD 7C 92 B4 .2...x.......... 01D0: C0 C8 75 6C 81 84 43 D5 4C 2E 46 4C 4B 9C 96 70 ..ul..C.L.FLK..p 01E0: AE 50 19 2A 04 E8 CF 5B 09 17 EF 97 CC 0E 9B AD .P.*...[........ 01F0: D3 54 D4 21 94 C0 49 EC DA 8B 9B 12 E2 3F D5 09 .T.!..I......?.. ] chain [1] = [ [ Version: V3 Subject: CN=Deploy, OU=DEV, O=Oracle, L=Santa Clara, ST=CA, C=US Signature Algorithm: SHA256withRSA, OID = 1.2.840.113549.1.1.11 Key: Sun RSA public key, 4096 bits modulus: 849953258605127028430388653187571693119994603253831509944165695948902333870652735485009179639332025059264510613513770058528116684955645364459059463774339759118238379559080228690635540023391127586736185629196108061422937551286886635161255424199937594422811584962764315992728818530330323323660630236599075046457514476831659401493595510701048798034367059978259449272818133235319159134123820048323324329808897202797459598751693689998475936585527654230297604365393816247703563416375036706742962673642696810724706557458499409200954368951393777573856916462816783412022353876755426998970906700935490633855201485905827918775287412562289407042643402824874928173230719037435488978231773066240646576912504954234995052482298969384390834399974479716112224019920903020802742961606783763122459898194221100335606064673963678579325277397942640530866375920383800073637679989603832901168500797931424323053774855078887727162833129883132625775035195111214838620594468999685799420938367850542805221593382978825246937771937962016273756048415501829287008368050568706316532539184393917227978969408067173250133438946243738983371890224018502259162230114631373205542118723148721310604808430483895913748158296789187896927353231265870991688535466912936858549035641 public exponent: 65537 Validity: [From: Tue Jun 09 15:54:03 PDT 2015, To: Mon Jun 04 15:54:03 PDT 2035] Issuer: CN=Deploy, OU=DEV, O=Oracle, L=Santa Clara, ST=CA, C=US SerialNumber: [ 976af296 a1bbcfaf] Certificate Extensions: 3 [1]: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: 1A CC 30 E0 B0 23 2A 68 19 60 42 30 C2 68 C8 1C ..0..#*h.`B0.h.. 0010: 06 FD 39 E5 ..9. ] ] [2]: ObjectId: 2.5.29.19 Criticality=false BasicConstraints:[ CA:true PathLen:2147483647 ] [3]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 1A CC 30 E0 B0 23 2A 68 19 60 42 30 C2 68 C8 1C ..0..#*h.`B0.h.. 0010: 06 FD 39 E5 ..9. ] ] ] Algorithm: [SHA256withRSA] Signature: 0000: 0B CA DE CF F4 24 AA 8A 11 2B B7 35 DB F2 ED F7 .....$...+.5.... 0010: F8 77 7C CB 35 D3 1B 42 26 4D 70 34 24 A9 01 25 .w..5..B&Mp4$..% 0020: D1 FF E2 AA A9 CF A1 F0 D8 95 17 50 AB 4F 0D 79 ...........P.O.y 0030: 7C E9 BA 9A 27 26 C8 C4 60 D1 7F BA 3A 7E D5 5B ....'&..`...:..[ 0040: AE 19 4A CC AC 8D 5B B8 62 8C 43 71 CC A3 2D EA ..J...[.b.Cq..-. 0050: 76 13 F4 09 12 B1 31 CA 05 A4 77 C6 78 EF 5C 0F v.....1...w.x.\. 0060: 57 B9 62 96 D4 1C 78 1F 1A F9 BE B3 79 5A C7 8E W.b...x.....yZ.. 0070: FE B6 2B 7F FC 03 6C 0D 2B 23 C6 DF 09 B3 F9 1D ..+...l.+#...... 0080: B2 49 A8 78 C9 E3 3F 0A 0C 43 B3 22 4C 79 FC 68 .I.x..?..C."Ly.h 0090: E9 74 14 CC 51 39 89 91 AC 9B 62 7C 67 D2 8B DA .t..Q9....b.g... 00A0: 22 4E DB 3A BD B1 3A 55 1E C4 9E 6A D4 45 8C FD "N.:..:U...j.E.. 00B0: 9A 3C 1E F5 2F AF 8E B9 88 E0 67 A3 FA 71 80 C5 .<../.....g..q.. 00C0: A3 59 84 36 28 29 FF 79 88 09 7B 99 D9 65 76 A2 .Y.6().y.....ev. 00D0: 86 F1 E0 24 E7 11 12 58 12 B8 00 A5 61 7D 20 C4 ...$...X....a. . 00E0: C6 AF 47 2B 5B 3D 37 9D FD 37 51 F1 0E 2A 1C E8 ..G+[=7..7Q..*.. 00F0: F8 B5 AA 2D 07 F9 D2 94 0C 5C E5 46 7C 2C 01 69 ...-.....\.F.,.i 0100: 2A 9B B4 22 E5 FA B4 38 26 14 F2 C1 18 E6 30 86 *.."...8&.....0. 0110: 98 14 4B 9C BF CF C1 BB 49 CC 51 94 99 48 6A AF ..K.....I.Q..Hj. 0120: EF 91 6D 29 64 4E 96 E5 E1 6C 2A D1 30 8A 5C 4C ..m)dN...l*.0.\L 0130: B0 1D 14 8D 39 43 E5 53 8E 22 31 24 20 91 19 F7 ....9C.S."1$ ... 0140: 3F BD 95 31 11 38 11 0B 77 1C AD 9E A9 9E D3 B3 ?..1.8..w....... 0150: E4 14 DD 01 D9 DA 04 ED 3A 47 07 9C AE BF FA E9 ........:G...... 0160: 69 72 27 8C 36 21 98 B6 FC 23 2A 6A F0 59 77 08 ir'.6!...#*j.Yw. 0170: BF D0 9F AE 5E 0B B7 F4 65 74 8C 47 C5 E6 EF 7C ....^...et.G.... 0180: 11 2C 11 86 83 93 2D A6 61 10 85 EB 99 80 4A A5 .,....-.a.....J. 0190: D2 94 C9 5D FA 96 59 19 FD 0D 5A 8A F3 24 37 D7 ...]..Y...Z..$7. 01A0: A1 7E 51 60 3A 8E 2C 13 1D 27 73 C7 85 EC 8B 99 ..Q`:.,..'s..... 01B0: BB 23 21 2A 97 62 BE 3D 7F BE A6 51 E3 0F CA A1 .#!*.b.=...Q.... 01C0: 43 7A 1C A7 89 A2 50 D2 08 0C 86 DE E6 D8 03 77 Cz....P........w 01D0: 79 1C 34 3F 19 66 DA 20 1C 23 01 28 12 9B A8 8C y.4?.f. .#.(.... 01E0: 82 FD 29 76 D3 04 C9 71 9C F4 F8 1C 33 12 0C 1B ..)v...q....3... 01F0: 02 1E 4D FB 18 83 C5 A3 38 C6 99 DC 0B 88 D2 88 ..M.....8....... ] *** *** ClientKeyExchange, RSA PreMasterSecret, TLSv1 Java Web Start Main Thread, WRITE: TLSv1 Handshake, length = 2928 SESSION KEYGEN: PreMaster Secret: 0000: 03 01 B3 3A 62 04 50 4E 7E 50 C4 E5 B8 93 C8 9A ...:b.PN.P...... 0010: 86 5D 8E 5F C6 8D AD BA 69 0A 59 60 85 28 E4 A9 .]._....i.Y`.(.. 0020: 92 0A E2 10 62 AF 2E 03 AA 49 45 34 46 B3 61 C3 ....b....IE4F.a. CONNECTION KEYGEN: Client Nonce: 0000: 55 78 9C C5 EF 55 72 07 FB 15 A3 15 EA 66 35 AA Ux...Ur......f5. 0010: B8 1F B9 D4 23 7A 88 70 93 75 75 64 39 67 5F CA ....#z.p.uud9g_. Server Nonce: 0000: 55 78 9C CC 3E B7 B1 55 60 B6 19 E5 EC 79 7B FB Ux..>..U`....y.. 0010: 05 62 AB 27 0D 7C 7D C2 A7 49 38 EA BE 0A E4 B0 .b.'.....I8..... Master Secret: 0000: 59 62 AB F9 8F 37 CD 5A 32 3B 41 E1 CC 10 6A EB Yb...7.Z2;A...j. 0010: DE 57 5C B4 55 E9 74 A1 BB 4C 2C 9D D6 15 A5 22 .W\.U.t..L,...." 0020: 93 90 FE 39 D9 51 B1 3E 79 AD 06 2C 68 3D C5 E9 ...9.Q.>y..,h=.. Client MAC write Secret: 0000: 65 77 D1 A7 BA 75 D2 3D 22 AE 26 A9 92 B4 D8 A5 ew...u.=".&..... 0010: 30 98 C6 61 0..a Server MAC write Secret: 0000: EF CF D8 68 34 B0 9C DE 3A 68 32 39 A6 39 21 BB ...h4...:h29.9!. 0010: E3 2D BF A0 .-.. Client write key: 0000: B1 35 17 07 57 3F A8 FB 32 D3 7E B1 E5 62 1C 7F .5..W?..2....b.. Server write key: 0000: 4C 44 DE 51 18 DA 8C 33 35 DF FF B1 22 0D 8A A5 LD.Q...35..."... Client write IV: 0000: 3E 9E 75 0A EE 60 21 2F 0A AE F1 E7 95 38 CE B7 >.u..`!/.....8.. Server write IV: 0000: 6A 90 E8 17 31 33 6B 7D 11 98 6A 96 8A 7E 51 9A j...13k...j...Q. *** CertificateVerify Java Web Start Main Thread, WRITE: TLSv1 Handshake, length = 288 Java Web Start Main Thread, WRITE: TLSv1 Change Cipher Spec, length = 32 *** Finished verify_data: { 91, 100, 180, 123, 82, 174, 32, 202, 217, 210, 42, 179 } *** Java Web Start Main Thread, WRITE: TLSv1 Handshake, length = 48 Java Web Start Main Thread, handling exception: java.net.SocketException: Connection reset %% Invalidated: [Session-1, TLS_RSA_WITH_AES_128_CBC_SHA] %% Invalidated: [Session-2, TLS_RSA_WITH_AES_128_CBC_SHA] Java Web Start Main Thread, SEND TLSv1 ALERT: fatal, description = unexpected_message Java Web Start Main Thread, WRITE: TLSv1 Alert, length = 32 Java Web Start Main Thread, Exception sending alert: java.net.SocketException: Connection reset by peer: socket write error Java Web Start Main Thread, called closeSocket() Java Web Start Main Thread, called close() Java Web Start Main Thread, called closeInternal(true) Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 Allow unsafe renegotiation: false Allow legacy hello messages: true Is initial handshake: true Is secure renegotiation: false Java Web Start Main Thread, setSoTimeout(0) called Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 for TLSv1.1 %% No cached client session *** ClientHello, TLSv1.2 RandomCookie: GMT: 1433902033 bytes = { 192, 109, 55, 62, 209, 244, 253, 90, 206, 54, 66, 1, 159, 112, 194, 45, 100, 28, 136, 116, 74, 25, 9, 212, 187, 17, 176, 202 } Session ID: {} Cipher Suites: [TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256, TLS_RSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_DSS_WITH_AES_128_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_DSS_WITH_AES_128_GCM_SHA256, TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA, TLS_EMPTY_RENEGOTIATION_INFO_SCSV] Compression Methods: { 0 } Extension elliptic_curves, curve names: {secp256r1, sect163k1, sect163r2, secp192r1, secp224r1, sect233k1, sect233r1, sect283k1, sect283r1, secp384r1, sect409k1, sect409r1, secp521r1, sect571k1, sect571r1, secp160k1, secp160r1, secp160r2, sect163r1, secp192k1, sect193r1, sect193r2, secp224k1, sect239k1, secp256k1} Extension ec_point_formats, formats: [uncompressed] Extension signature_algorithms, signature_algorithms: SHA512withECDSA, SHA512withRSA, SHA384withECDSA, SHA384withRSA, SHA256withECDSA, SHA256withRSA, SHA224withECDSA, SHA224withRSA, SHA1withECDSA, SHA1withRSA, SHA1withDSA, MD5withRSA *** Java Web Start Main Thread, WRITE: TLSv1.2 Handshake, length = 195 Java Web Start Main Thread, READ: TLSv1 Handshake, length = 1465 *** ServerHello, TLSv1 RandomCookie: GMT: 1433902040 bytes = { 14, 127, 51, 65, 169, 35, 94, 80, 245, 181, 175, 189, 193, 124, 216, 176, 178, 60, 161, 229, 73, 122, 33, 221, 119, 248, 39, 39 } Session ID: {166, 64, 0, 0, 234, 53, 112, 178, 203, 193, 250, 28, 240, 223, 225, 232, 47, 31, 44, 134, 233, 250, 0, 143, 95, 183, 168, 156, 244, 162, 67, 152} Cipher Suite: TLS_RSA_WITH_AES_128_CBC_SHA Compression Method: 0 Extension renegotiation_info, renegotiated_connection: *** %% Initialized: [Session-3, TLS_RSA_WITH_AES_128_CBC_SHA] ** TLS_RSA_WITH_AES_128_CBC_SHA *** Certificate chain chain [0] = [ [ Version: V3 Subject: CN=dan, OU=Test, O=Oracle, ST=CA, C=US Signature Algorithm: SHA256withRSA, OID = 1.2.840.113549.1.1.11 Key: Sun RSA public key, 2048 bits modulus: 27993800329023506915188619937271073675146531754788656107091985839151221862956338660826083129307150299177076284927991039444425558608748586185501453381350031509010983827567837732358657008599408295712364829220775090997081135518958109857589576926141558932552245139006180802682152879425941672165491708704274822508509790090280409136905763815540974504871865424441967155500742973933231552413698265953703372042016370786259247265523915810183271065561834150991240902083054508495535295536147129309792303053577725565695417921470016939423833336117790167245101378899510456944492050424721996316349253989237480157324834028741000498233 public exponent: 65537 Validity: [From: Tue Jun 09 16:13:29 PDT 2015, To: Sat Jun 18 16:13:29 PDT 2016] Issuer: CN=Deploy, OU=DEV, O=Oracle, L=Santa Clara, ST=CA, C=US SerialNumber: [ 1000] Certificate Extensions: 7 [1]: ObjectId: 2.16.840.1.113730.1.13 Criticality=false Extension unknown: DER encoded OCTET string = 0000: 04 26 16 24 4F 70 65 6E 53 53 4C 20 47 65 6E 65 .&.$OpenSSL Gene 0010: 72 61 74 65 64 20 53 65 72 76 65 72 20 43 65 72 rated Server Cer 0020: 74 69 66 69 63 61 74 65 tificate [2]: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: 1A CC 30 E0 B0 23 2A 68 19 60 42 30 C2 68 C8 1C ..0..#*h.`B0.h.. 0010: 06 FD 39 E5 ..9. ] [CN=Deploy, OU=DEV, O=Oracle, L=Santa Clara, ST=CA, C=US] SerialNumber: [ 976af296 a1bbcfaf] ] [3]: ObjectId: 2.5.29.19 Criticality=false BasicConstraints:[ CA:false PathLen: undefined ] [4]: ObjectId: 2.5.29.37 Criticality=false ExtendedKeyUsages [ serverAuth ] [5]: ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_Encipherment ] [6]: ObjectId: 2.16.840.1.113730.1.1 Criticality=false NetscapeCertType [ SSL server ] [7]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 03 60 18 99 86 2F C3 6E 7B 46 FB F3 FE 55 C5 8F .`.../.n.F...U.. 0010: 4D 4A 28 B9 MJ(. ] ] ] Algorithm: [SHA256withRSA] Signature: 0000: 32 FA 27 95 DB 98 65 FC CD 86 03 57 C9 3A 91 6A 2.'...e....W.:.j 0010: 25 A7 8C 5A 5B ED 8A 7E 3F 1F F6 85 B0 A4 B4 51 %..Z[...?......Q 0020: 85 68 90 BB 1F F8 3E 3E DA 69 08 6F B0 D0 57 C4 .h....>>.i.o..W. 0030: 35 0C 57 0C AF 31 5F 63 AC AB 56 E8 45 D5 3A A1 5.W..1_c..V.E.:. 0040: CF 6E B5 06 EB 5E A1 63 7E 70 A1 8B 2B 50 E3 30 .n...^.c.p..+P.0 0050: 8E 3F FF C7 DB 0C 26 EC 44 0A 6B 4F 86 CE E1 3A .?....&.D.kO...: 0060: CB 8E E9 FE B0 06 0A CC F7 00 E6 81 AB E8 78 9C ..............x. 0070: 68 3D 2B 2D BC AE 64 41 15 29 77 6A 19 BC 25 A6 h=+-..dA.)wj..%. 0080: EC B3 EB F4 4F 48 64 68 7B 0E B5 86 2E 09 6F 16 ....OHdh......o. 0090: FE 7E 24 6D 4E F0 AD 7F 21 17 72 88 AB 10 40 45 ..$mN...!.r...@E 00A0: 90 9C E6 D9 D9 10 AA 36 65 F9 16 3C 66 FF CD 30 .......6e..L...F@..+. 00F0: 90 FC 98 17 9F 78 6F 45 01 4E 5A B5 C0 34 A9 E9 .....xoE.NZ..4.. 0100: E1 43 B6 D2 2D BD 2E 85 44 9D A9 0D 2F 9B 66 ED .C..-...D.../.f. 0110: A2 31 FD 6D A5 E5 37 3D 3B 9C 23 20 F4 67 CA DC .1.m..7=;.# .g.. 0120: 37 08 47 D2 71 5B 27 93 B1 2F D0 44 9F 41 72 95 7.G.q['../.D.Ar. 0130: BB 9E 1D 81 7E DE C1 A9 96 1F 03 34 FB AD 7C 75 ...........4...u 0140: 6A 01 4C CA C0 34 6E 86 C9 8C D8 99 07 F7 FF D4 j.L..4n......... 0150: 77 6F F1 88 D6 0D 93 16 E8 3A 75 6A 08 6D 1B A2 wo.......:uj.m.. 0160: 51 F8 A5 6E 8A 1D 66 68 0B C2 36 2B FE 26 6E 5D Q..n..fh..6+.&n] 0170: DD 6B 2C 47 60 AD 83 C9 51 30 63 CC 00 1F F5 F2 .k,G`...Q0c..... 0180: FB 66 1E 52 16 E9 3F EC E7 43 5C F1 25 C0 BE 57 .f.R..?..C\.%..W 0190: 36 3F AC C2 F2 7D 7D 8C 9E 54 10 DE 27 6D 22 CE 6?.......T..'m". 01A0: A0 35 A8 1A D9 90 BA 5C 39 21 7A 3B 83 9D F6 62 .5.....\9!z;...b 01B0: D1 ED CD BD AA F7 75 CB F0 C4 6F B0 39 8B A3 D2 ......u...o.9... 01C0: 02 B9 2F AC 79 97 85 8F 78 A2 91 29 F1 CB 10 1B ../.y...x..).... 01D0: DC D9 10 D0 F9 A7 31 92 4B F0 45 93 1A 61 08 FE ......1.K.E..a.. 01E0: 55 E3 6D C5 4F 92 CF DB 3B 4B EE 2A 5E BB 7B CA U.m.O...;K.*^... 01F0: 13 0D A4 63 4F 29 9B 63 5C 71 FD 8D B6 28 52 3A ...cO).c\q...(R: ] *** *** ServerHelloDone *** ClientKeyExchange, RSA PreMasterSecret, TLSv1 Java Web Start Main Thread, WRITE: TLSv1 Handshake, length = 262 SESSION KEYGEN: PreMaster Secret: 0000: 03 03 FF 33 D8 66 B2 1E 84 15 19 75 A8 BC 70 06 ...3.f.....u..p. 0010: 24 10 E3 1B EE F5 54 64 0F 79 A8 45 30 47 0A 0A $.....Td.y.E0G.. 0020: B4 03 CB 7B 77 E3 A9 43 DB A1 59 26 98 A4 35 68 ....w..C..Y&..5h CONNECTION KEYGEN: Client Nonce: 0000: 55 78 9C D1 C0 6D 37 3E D1 F4 FD 5A CE 36 42 01 Ux...m7>...Z.6B. 0010: 9F 70 C2 2D 64 1C 88 74 4A 19 09 D4 BB 11 B0 CA .p.-d..tJ....... Server Nonce: 0000: 55 78 9C D8 0E 7F 33 41 A9 23 5E 50 F5 B5 AF BD Ux....3A.#^P.... 0010: C1 7C D8 B0 B2 3C A1 E5 49 7A 21 DD 77 F8 27 27 .....<..Iz!.w.'' Master Secret: 0000: 79 45 FD FB 5B B4 A4 33 CB AA 68 14 DC 7A 8C 2C yE..[..3..h..z., 0010: 52 CE CB DF 17 C0 E4 EC 9C 11 6F 5C 6D 2D 28 48 R.........o\m-(H 0020: 10 E7 68 91 7E 4B 86 01 3F 8D DE 29 C0 6E 55 5A ..h..K..?..).nUZ Client MAC write Secret: 0000: 44 4A B4 43 0B BC 80 EE C2 3B 02 65 F8 AC 21 C5 DJ.C.....;.e..!. 0010: F4 FD A5 5D ...] Server MAC write Secret: 0000: 0E 38 1F 2E DD BE 14 39 EB D9 18 6D C4 5B ED D5 .8.....9...m.[.. 0010: DC B5 BF A0 .... Client write key: 0000: 3D EB 34 83 98 D3 EF FF 3F B0 EE 7E 29 56 39 48 =.4.....?...)V9H Server write key: 0000: 50 2D 33 0B 72 98 8F 2B F2 74 48 46 CB 62 DF 24 P-3.r..+.tHF.b.$ Client write IV: 0000: 5A AB FE 7D CF EF A6 BD FF AC 45 71 E9 28 31 9D Z.........Eq.(1. Server write IV: 0000: FB 23 C9 ED 15 FA BA 34 2E 4D 16 0E 9E 8D B1 3E .#.....4.M.....> Java Web Start Main Thread, WRITE: TLSv1 Change Cipher Spec, length = 1 *** Finished verify_data: { 44, 41, 82, 12, 210, 185, 111, 59, 197, 240, 220, 23 } *** Java Web Start Main Thread, WRITE: TLSv1 Handshake, length = 48 Java Web Start Main Thread, READ: TLSv1 Change Cipher Spec, length = 1 Java Web Start Main Thread, READ: TLSv1 Handshake, length = 48 *** Finished verify_data: { 223, 132, 164, 96, 204, 33, 176, 1, 169, 25, 59, 142 } *** %% Cached client session: [Session-3, TLS_RSA_WITH_AES_128_CBC_SHA] Java Web Start Main Thread, WRITE: TLSv1 Application Data, length = 336 Java Web Start Main Thread, READ: TLSv1 Handshake, length = 32 Allow unsafe renegotiation: false Allow legacy hello messages: true Is initial handshake: false Is secure renegotiation: true Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 for TLSv1.1 *** HelloRequest (empty) %% Client cached [Session-3, TLS_RSA_WITH_AES_128_CBC_SHA] %% Try resuming [Session-3, TLS_RSA_WITH_AES_128_CBC_SHA] from port 59370 *** ClientHello, TLSv1 RandomCookie: GMT: 1433902033 bytes = { 125, 216, 24, 23, 41, 153, 125, 65, 179, 65, 24, 67, 94, 72, 23, 14, 66, 126, 74, 11, 53, 133, 103, 241, 12, 147, 12, 220 } Session ID: {166, 64, 0, 0, 234, 53, 112, 178, 203, 193, 250, 28, 240, 223, 225, 232, 47, 31, 44, 134, 233, 250, 0, 143, 95, 183, 168, 156, 244, 162, 67, 152} Cipher Suites: [TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256, TLS_RSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_DSS_WITH_AES_128_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_DSS_WITH_AES_128_GCM_SHA256, TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA] Compression Methods: { 0 } Extension elliptic_curves, curve names: {secp256r1, sect163k1, sect163r2, secp192r1, secp224r1, sect233k1, sect233r1, sect283k1, sect283r1, secp384r1, sect409k1, sect409r1, secp521r1, sect571k1, sect571r1, secp160k1, secp160r1, secp160r2, sect163r1, secp192k1, sect193r1, sect193r2, secp224k1, sect239k1, secp256k1} Extension ec_point_formats, formats: [uncompressed] Extension renegotiation_info, renegotiated_connection: 2c:29:52:0c:d2:b9:6f:3b:c5:f0:dc:17 *** Java Web Start Main Thread, WRITE: TLSv1 Handshake, length = 240 Java Web Start Main Thread, READ: TLSv1 Handshake, length = 3152 *** ServerHello, TLSv1 RandomCookie: GMT: 1433902040 bytes = { 165, 152, 19, 200, 182, 81, 8, 198, 171, 174, 206, 33, 137, 118, 94, 172, 239, 93, 14, 107, 14, 57, 74, 64, 195, 9, 193, 1 } Session ID: {96, 38, 0, 0, 53, 150, 64, 2, 62, 209, 120, 201, 65, 154, 190, 205, 59, 153, 1, 68, 223, 170, 121, 175, 9, 142, 163, 179, 161, 23, 64, 112} Cipher Suite: TLS_RSA_WITH_AES_128_CBC_SHA Compression Method: 0 Extension renegotiation_info, renegotiated_connection: 2c:29:52:0c:d2:b9:6f:3b:c5:f0:dc:17:df:84:a4:60:cc:21:b0:01:a9:19:3b:8e *** %% Initialized: [Session-4, TLS_RSA_WITH_AES_128_CBC_SHA] ** TLS_RSA_WITH_AES_128_CBC_SHA *** Certificate chain chain [0] = [ [ Version: V3 Subject: CN=dan, OU=Test, O=Oracle, ST=CA, C=US Signature Algorithm: SHA256withRSA, OID = 1.2.840.113549.1.1.11 Key: Sun RSA public key, 2048 bits modulus: 27993800329023506915188619937271073675146531754788656107091985839151221862956338660826083129307150299177076284927991039444425558608748586185501453381350031509010983827567837732358657008599408295712364829220775090997081135518958109857589576926141558932552245139006180802682152879425941672165491708704274822508509790090280409136905763815540974504871865424441967155500742973933231552413698265953703372042016370786259247265523915810183271065561834150991240902083054508495535295536147129309792303053577725565695417921470016939423833336117790167245101378899510456944492050424721996316349253989237480157324834028741000498233 public exponent: 65537 Validity: [From: Tue Jun 09 16:13:29 PDT 2015, To: Sat Jun 18 16:13:29 PDT 2016] Issuer: CN=Deploy, OU=DEV, O=Oracle, L=Santa Clara, ST=CA, C=US SerialNumber: [ 1000] Certificate Extensions: 7 [1]: ObjectId: 2.16.840.1.113730.1.13 Criticality=false Extension unknown: DER encoded OCTET string = 0000: 04 26 16 24 4F 70 65 6E 53 53 4C 20 47 65 6E 65 .&.$OpenSSL Gene 0010: 72 61 74 65 64 20 53 65 72 76 65 72 20 43 65 72 rated Server Cer 0020: 74 69 66 69 63 61 74 65 tificate [2]: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: 1A CC 30 E0 B0 23 2A 68 19 60 42 30 C2 68 C8 1C ..0..#*h.`B0.h.. 0010: 06 FD 39 E5 ..9. ] [CN=Deploy, OU=DEV, O=Oracle, L=Santa Clara, ST=CA, C=US] SerialNumber: [ 976af296 a1bbcfaf] ] [3]: ObjectId: 2.5.29.19 Criticality=false BasicConstraints:[ CA:false PathLen: undefined ] [4]: ObjectId: 2.5.29.37 Criticality=false ExtendedKeyUsages [ serverAuth ] [5]: ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_Encipherment ] [6]: ObjectId: 2.16.840.1.113730.1.1 Criticality=false NetscapeCertType [ SSL server ] [7]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 03 60 18 99 86 2F C3 6E 7B 46 FB F3 FE 55 C5 8F .`.../.n.F...U.. 0010: 4D 4A 28 B9 MJ(. ] ] ] Algorithm: [SHA256withRSA] Signature: 0000: 32 FA 27 95 DB 98 65 FC CD 86 03 57 C9 3A 91 6A 2.'...e....W.:.j 0010: 25 A7 8C 5A 5B ED 8A 7E 3F 1F F6 85 B0 A4 B4 51 %..Z[...?......Q 0020: 85 68 90 BB 1F F8 3E 3E DA 69 08 6F B0 D0 57 C4 .h....>>.i.o..W. 0030: 35 0C 57 0C AF 31 5F 63 AC AB 56 E8 45 D5 3A A1 5.W..1_c..V.E.:. 0040: CF 6E B5 06 EB 5E A1 63 7E 70 A1 8B 2B 50 E3 30 .n...^.c.p..+P.0 0050: 8E 3F FF C7 DB 0C 26 EC 44 0A 6B 4F 86 CE E1 3A .?....&.D.kO...: 0060: CB 8E E9 FE B0 06 0A CC F7 00 E6 81 AB E8 78 9C ..............x. 0070: 68 3D 2B 2D BC AE 64 41 15 29 77 6A 19 BC 25 A6 h=+-..dA.)wj..%. 0080: EC B3 EB F4 4F 48 64 68 7B 0E B5 86 2E 09 6F 16 ....OHdh......o. 0090: FE 7E 24 6D 4E F0 AD 7F 21 17 72 88 AB 10 40 45 ..$mN...!.r...@E 00A0: 90 9C E6 D9 D9 10 AA 36 65 F9 16 3C 66 FF CD 30 .......6e..L...F@..+. 00F0: 90 FC 98 17 9F 78 6F 45 01 4E 5A B5 C0 34 A9 E9 .....xoE.NZ..4.. 0100: E1 43 B6 D2 2D BD 2E 85 44 9D A9 0D 2F 9B 66 ED .C..-...D.../.f. 0110: A2 31 FD 6D A5 E5 37 3D 3B 9C 23 20 F4 67 CA DC .1.m..7=;.# .g.. 0120: 37 08 47 D2 71 5B 27 93 B1 2F D0 44 9F 41 72 95 7.G.q['../.D.Ar. 0130: BB 9E 1D 81 7E DE C1 A9 96 1F 03 34 FB AD 7C 75 ...........4...u 0140: 6A 01 4C CA C0 34 6E 86 C9 8C D8 99 07 F7 FF D4 j.L..4n......... 0150: 77 6F F1 88 D6 0D 93 16 E8 3A 75 6A 08 6D 1B A2 wo.......:uj.m.. 0160: 51 F8 A5 6E 8A 1D 66 68 0B C2 36 2B FE 26 6E 5D Q..n..fh..6+.&n] 0170: DD 6B 2C 47 60 AD 83 C9 51 30 63 CC 00 1F F5 F2 .k,G`...Q0c..... 0180: FB 66 1E 52 16 E9 3F EC E7 43 5C F1 25 C0 BE 57 .f.R..?..C\.%..W 0190: 36 3F AC C2 F2 7D 7D 8C 9E 54 10 DE 27 6D 22 CE 6?.......T..'m". 01A0: A0 35 A8 1A D9 90 BA 5C 39 21 7A 3B 83 9D F6 62 .5.....\9!z;...b 01B0: D1 ED CD BD AA F7 75 CB F0 C4 6F B0 39 8B A3 D2 ......u...o.9... 01C0: 02 B9 2F AC 79 97 85 8F 78 A2 91 29 F1 CB 10 1B ../.y...x..).... 01D0: DC D9 10 D0 F9 A7 31 92 4B F0 45 93 1A 61 08 FE ......1.K.E..a.. 01E0: 55 E3 6D C5 4F 92 CF DB 3B 4B EE 2A 5E BB 7B CA U.m.O...;K.*^... 01F0: 13 0D A4 63 4F 29 9B 63 5C 71 FD 8D B6 28 52 3A ...cO).c\q...(R: ] *** *** CertificateRequest Cert Types: RSA, DSS, ECDSA Cert Authorities: *** ServerHelloDone ssl: KeyMgr: getting aliases: [Client Dan (verified: OK), test testl (verified: OK)] ssl: Ignoring alias Client Dan: key algorithm does not match ssl: Ignoring alias test testl: key algorithm does not match ssl: KeyMgr: no matching alias found ssl: Ignoring alias Client Dan: key algorithm does not match ssl: Ignoring alias test testl: key algorithm does not match ssl: KeyMgr: no matching alias found *** Certificate chain chain [0] = [ [ Version: V3 Subject: CN=Client Dan, OU=DT, O=Oracle, ST=CA, C=US Signature Algorithm: SHA256withRSA, OID = 1.2.840.113549.1.1.11 Key: Sun RSA public key, 2048 bits modulus: 25041167234775516209191536628623554777565383090132086621648953332096188060178264453951062245373026678900806631803201242153012863620306180291650308065728058725371502399634595673335624987186925360108483413989007050442140599195843481712747433628813692094403826422162619175616021483896340983175963054251732596203189838821479908442902564116220884226235439223121816215426580437846340378795658979390484291603745983809778742894900300599813134776854161020903021723346684155649004430053145377057091248407221435223646705022416390050199799718748450589449827050606884254389363322360084564710559130123559059677644223204275542036977 public exponent: 65537 Validity: [From: Tue Jun 09 16:32:36 PDT 2015, To: Sat Jun 18 16:32:36 PDT 2016] Issuer: CN=Deploy, OU=DEV, O=Oracle, L=Santa Clara, ST=CA, C=US SerialNumber: [ 1001] Certificate Extensions: 4 [1]: ObjectId: 2.16.840.1.113730.1.13 Criticality=false Extension unknown: DER encoded OCTET string = 0000: 04 1F 16 1D 4F 70 65 6E 53 53 4C 20 47 65 6E 65 ....OpenSSL Gene 0010: 72 61 74 65 64 20 43 65 72 74 69 66 69 63 61 74 rated Certificat 0020: 65 e [2]: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: 1A CC 30 E0 B0 23 2A 68 19 60 42 30 C2 68 C8 1C ..0..#*h.`B0.h.. 0010: 06 FD 39 E5 ..9. ] ] [3]: ObjectId: 2.5.29.19 Criticality=false BasicConstraints:[ CA:false PathLen: undefined ] [4]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 9B 03 A7 E4 0B 7F 0D 6D 19 81 1C 8A 69 B2 2F 11 .......m....i./. 0010: 49 1E 70 91 I.p. ] ] ] Algorithm: [SHA256withRSA] Signature: 0000: 3B B9 0E 1F 87 68 AA 22 8D 9C FA 50 27 C2 B4 A5 ;....h."...P'... 0010: A5 F8 E4 56 E5 BB BB AB 6D 10 3B 18 52 86 AB 1A ...V....m.;.R... 0020: 40 B3 0E 42 E7 98 E6 75 02 5D 3A 4E 69 4F F0 5E @..B...u.]:NiO.^ 0030: B2 A9 92 3A B9 5D 85 41 06 1A BB 21 89 EC 2C 1D ...:.].A...!..,. 0040: 9F 28 39 58 69 F4 8F 3F 32 E4 C0 36 50 B4 22 2D .(9Xi..?2..6P."- 0050: 41 AC 8C 45 56 00 A0 20 59 0D 36 5D 3B 8E 1C 59 A..EV.. Y.6];..Y 0060: E0 2D A4 52 E4 A7 2E 6C 63 1C 00 9C 65 71 90 99 .-.R...lc...eq.. 0070: 9D 51 5E 9A 42 CB 3F BB 3C 6C 7E AB 2C CB B3 1F .Q^.B.?./..9.p..J 0120: FF 36 E1 66 A5 E8 32 C3 5A AC 2D B8 F1 A0 83 5B .6.f..2.Z.-....[ 0130: 4E 7B AB 75 1B 55 B0 80 39 1E 05 48 A4 D2 56 16 N..u.U..9..H..V. 0140: F2 56 39 CC 1E DB A9 A1 F1 10 54 7D 79 C7 B0 9C .V9.......T.y... 0150: 0F 33 F1 60 C1 BD CD 77 49 72 86 77 68 34 39 3E .3.`...wIr.wh49> 0160: 5B 13 87 36 1E 41 22 A2 2C 81 EC 71 40 40 9A FA [..6.A".,..q@@.. 0170: 5D DB 18 61 B0 B1 A4 A2 3E 20 68 9F 7E 4F 90 CF ]..a....> h..O.. 0180: 0B 1B 26 27 9F 35 CC C7 74 84 14 65 AF 0D 49 39 ..&'.5..t..e..I9 0190: 7A ED 87 CB 2C 7B AC 9F BB D0 B4 48 A3 8D 00 FA z...,......H.... 01A0: 75 71 6E 17 D8 00 EF 8F 2A DD A2 A1 B8 4F A4 DE uqn.....*....O.. 01B0: F9 20 C2 C1 5F D0 9A 53 DF D8 23 33 36 99 81 63 . .._..S..#36..c 01C0: 9B 32 97 90 8A 78 E3 B0 FD DA EE 97 BD 7C 92 B4 .2...x.......... 01D0: C0 C8 75 6C 81 84 43 D5 4C 2E 46 4C 4B 9C 96 70 ..ul..C.L.FLK..p 01E0: AE 50 19 2A 04 E8 CF 5B 09 17 EF 97 CC 0E 9B AD .P.*...[........ 01F0: D3 54 D4 21 94 C0 49 EC DA 8B 9B 12 E2 3F D5 09 .T.!..I......?.. ] chain [1] = [ [ Version: V3 Subject: CN=Deploy, OU=DEV, O=Oracle, L=Santa Clara, ST=CA, C=US Signature Algorithm: SHA256withRSA, OID = 1.2.840.113549.1.1.11 Key: Sun RSA public key, 4096 bits modulus: 849953258605127028430388653187571693119994603253831509944165695948902333870652735485009179639332025059264510613513770058528116684955645364459059463774339759118238379559080228690635540023391127586736185629196108061422937551286886635161255424199937594422811584962764315992728818530330323323660630236599075046457514476831659401493595510701048798034367059978259449272818133235319159134123820048323324329808897202797459598751693689998475936585527654230297604365393816247703563416375036706742962673642696810724706557458499409200954368951393777573856916462816783412022353876755426998970906700935490633855201485905827918775287412562289407042643402824874928173230719037435488978231773066240646576912504954234995052482298969384390834399974479716112224019920903020802742961606783763122459898194221100335606064673963678579325277397942640530866375920383800073637679989603832901168500797931424323053774855078887727162833129883132625775035195111214838620594468999685799420938367850542805221593382978825246937771937962016273756048415501829287008368050568706316532539184393917227978969408067173250133438946243738983371890224018502259162230114631373205542118723148721310604808430483895913748158296789187896927353231265870991688535466912936858549035641 public exponent: 65537 Validity: [From: Tue Jun 09 15:54:03 PDT 2015, To: Mon Jun 04 15:54:03 PDT 2035] Issuer: CN=Deploy, OU=DEV, O=Oracle, L=Santa Clara, ST=CA, C=US SerialNumber: [ 976af296 a1bbcfaf] Certificate Extensions: 3 [1]: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: 1A CC 30 E0 B0 23 2A 68 19 60 42 30 C2 68 C8 1C ..0..#*h.`B0.h.. 0010: 06 FD 39 E5 ..9. ] ] [2]: ObjectId: 2.5.29.19 Criticality=false BasicConstraints:[ CA:true PathLen:2147483647 ] [3]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 1A CC 30 E0 B0 23 2A 68 19 60 42 30 C2 68 C8 1C ..0..#*h.`B0.h.. 0010: 06 FD 39 E5 ..9. ] ] ] Algorithm: [SHA256withRSA] Signature: 0000: 0B CA DE CF F4 24 AA 8A 11 2B B7 35 DB F2 ED F7 .....$...+.5.... 0010: F8 77 7C CB 35 D3 1B 42 26 4D 70 34 24 A9 01 25 .w..5..B&Mp4$..% 0020: D1 FF E2 AA A9 CF A1 F0 D8 95 17 50 AB 4F 0D 79 ...........P.O.y 0030: 7C E9 BA 9A 27 26 C8 C4 60 D1 7F BA 3A 7E D5 5B ....'&..`...:..[ 0040: AE 19 4A CC AC 8D 5B B8 62 8C 43 71 CC A3 2D EA ..J...[.b.Cq..-. 0050: 76 13 F4 09 12 B1 31 CA 05 A4 77 C6 78 EF 5C 0F v.....1...w.x.\. 0060: 57 B9 62 96 D4 1C 78 1F 1A F9 BE B3 79 5A C7 8E W.b...x.....yZ.. 0070: FE B6 2B 7F FC 03 6C 0D 2B 23 C6 DF 09 B3 F9 1D ..+...l.+#...... 0080: B2 49 A8 78 C9 E3 3F 0A 0C 43 B3 22 4C 79 FC 68 .I.x..?..C."Ly.h 0090: E9 74 14 CC 51 39 89 91 AC 9B 62 7C 67 D2 8B DA .t..Q9....b.g... 00A0: 22 4E DB 3A BD B1 3A 55 1E C4 9E 6A D4 45 8C FD "N.:..:U...j.E.. 00B0: 9A 3C 1E F5 2F AF 8E B9 88 E0 67 A3 FA 71 80 C5 .<../.....g..q.. 00C0: A3 59 84 36 28 29 FF 79 88 09 7B 99 D9 65 76 A2 .Y.6().y.....ev. 00D0: 86 F1 E0 24 E7 11 12 58 12 B8 00 A5 61 7D 20 C4 ...$...X....a. . 00E0: C6 AF 47 2B 5B 3D 37 9D FD 37 51 F1 0E 2A 1C E8 ..G+[=7..7Q..*.. 00F0: F8 B5 AA 2D 07 F9 D2 94 0C 5C E5 46 7C 2C 01 69 ...-.....\.F.,.i 0100: 2A 9B B4 22 E5 FA B4 38 26 14 F2 C1 18 E6 30 86 *.."...8&.....0. 0110: 98 14 4B 9C BF CF C1 BB 49 CC 51 94 99 48 6A AF ..K.....I.Q..Hj. 0120: EF 91 6D 29 64 4E 96 E5 E1 6C 2A D1 30 8A 5C 4C ..m)dN...l*.0.\L 0130: B0 1D 14 8D 39 43 E5 53 8E 22 31 24 20 91 19 F7 ....9C.S."1$ ... 0140: 3F BD 95 31 11 38 11 0B 77 1C AD 9E A9 9E D3 B3 ?..1.8..w....... 0150: E4 14 DD 01 D9 DA 04 ED 3A 47 07 9C AE BF FA E9 ........:G...... 0160: 69 72 27 8C 36 21 98 B6 FC 23 2A 6A F0 59 77 08 ir'.6!...#*j.Yw. 0170: BF D0 9F AE 5E 0B B7 F4 65 74 8C 47 C5 E6 EF 7C ....^...et.G.... 0180: 11 2C 11 86 83 93 2D A6 61 10 85 EB 99 80 4A A5 .,....-.a.....J. 0190: D2 94 C9 5D FA 96 59 19 FD 0D 5A 8A F3 24 37 D7 ...]..Y...Z..$7. 01A0: A1 7E 51 60 3A 8E 2C 13 1D 27 73 C7 85 EC 8B 99 ..Q`:.,..'s..... 01B0: BB 23 21 2A 97 62 BE 3D 7F BE A6 51 E3 0F CA A1 .#!*.b.=...Q.... 01C0: 43 7A 1C A7 89 A2 50 D2 08 0C 86 DE E6 D8 03 77 Cz....P........w 01D0: 79 1C 34 3F 19 66 DA 20 1C 23 01 28 12 9B A8 8C y.4?.f. .#.(.... 01E0: 82 FD 29 76 D3 04 C9 71 9C F4 F8 1C 33 12 0C 1B ..)v...q....3... 01F0: 02 1E 4D FB 18 83 C5 A3 38 C6 99 DC 0B 88 D2 88 ..M.....8....... ] *** *** ClientKeyExchange, RSA PreMasterSecret, TLSv1 Java Web Start Main Thread, WRITE: TLSv1 Handshake, length = 2928 Java Web Start Main Thread, waiting for close_notify or alert: state 3 Java Web Start Main Thread, Exception while waiting for close java.net.SocketException: Connection reset Java Web Start Main Thread, handling exception: java.net.SocketException: Connection reset %% Invalidated: [Session-3, TLS_RSA_WITH_AES_128_CBC_SHA] %% Invalidated: [Session-4, TLS_RSA_WITH_AES_128_CBC_SHA] Java Web Start Main Thread, SEND TLSv1 ALERT: fatal, description = unexpected_message Java Web Start Main Thread, WRITE: TLSv1 Alert, length = 32 Java Web Start Main Thread, Exception sending alert: java.net.SocketException: Connection reset by peer: socket write error Java Web Start Main Thread, called closeSocket() Java Web Start Main Thread, called close() Java Web Start Main Thread, called closeInternal(true) Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 Allow unsafe renegotiation: false Allow legacy hello messages: true Is initial handshake: true Is secure renegotiation: false Java Web Start Main Thread, setSoTimeout(0) called Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 for TLSv1.1 %% No cached client session *** ClientHello, TLSv1.2 RandomCookie: GMT: 1433902436 bytes = { 17, 67, 52, 63, 202, 97, 14, 69, 12, 134, 176, 148, 63, 176, 170, 107, 0, 146, 226, 68, 115, 178, 152, 152, 249, 131, 72, 222 } Session ID: {} Cipher Suites: [TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256, TLS_RSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_DSS_WITH_AES_128_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_DSS_WITH_AES_128_GCM_SHA256, TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA, TLS_EMPTY_RENEGOTIATION_INFO_SCSV] Compression Methods: { 0 } Extension elliptic_curves, curve names: {secp256r1, sect163k1, sect163r2, secp192r1, secp224r1, sect233k1, sect233r1, sect283k1, sect283r1, secp384r1, sect409k1, sect409r1, secp521r1, sect571k1, sect571r1, secp160k1, secp160r1, secp160r2, sect163r1, secp192k1, sect193r1, sect193r2, secp224k1, sect239k1, secp256k1} Extension ec_point_formats, formats: [uncompressed] Extension signature_algorithms, signature_algorithms: SHA512withECDSA, SHA512withRSA, SHA384withECDSA, SHA384withRSA, SHA256withECDSA, SHA256withRSA, SHA224withECDSA, SHA224withRSA, SHA1withECDSA, SHA1withRSA, SHA1withDSA, MD5withRSA *** Java Web Start Main Thread, WRITE: TLSv1.2 Handshake, length = 195 Java Web Start Main Thread, READ: TLSv1 Handshake, length = 1465 *** ServerHello, TLSv1 RandomCookie: GMT: 1433902446 bytes = { 9, 153, 33, 3, 159, 17, 192, 243, 190, 217, 31, 211, 193, 66, 178, 253, 76, 192, 63, 18, 110, 218, 151, 179, 151, 219, 52, 126 } Session ID: {190, 30, 0, 0, 225, 38, 108, 111, 122, 223, 168, 67, 74, 150, 217, 91, 130, 173, 48, 24, 130, 12, 137, 189, 19, 218, 114, 227, 160, 187, 84, 46} Cipher Suite: TLS_RSA_WITH_AES_128_CBC_SHA Compression Method: 0 Extension renegotiation_info, renegotiated_connection: *** %% Initialized: [Session-5, TLS_RSA_WITH_AES_128_CBC_SHA] ** TLS_RSA_WITH_AES_128_CBC_SHA *** Certificate chain chain [0] = [ [ Version: V3 Subject: CN=dan, OU=Test, O=Oracle, ST=CA, C=US Signature Algorithm: SHA256withRSA, OID = 1.2.840.113549.1.1.11 Key: Sun RSA public key, 2048 bits modulus: 27993800329023506915188619937271073675146531754788656107091985839151221862956338660826083129307150299177076284927991039444425558608748586185501453381350031509010983827567837732358657008599408295712364829220775090997081135518958109857589576926141558932552245139006180802682152879425941672165491708704274822508509790090280409136905763815540974504871865424441967155500742973933231552413698265953703372042016370786259247265523915810183271065561834150991240902083054508495535295536147129309792303053577725565695417921470016939423833336117790167245101378899510456944492050424721996316349253989237480157324834028741000498233 public exponent: 65537 Validity: [From: Tue Jun 09 16:13:29 PDT 2015, To: Sat Jun 18 16:13:29 PDT 2016] Issuer: CN=Deploy, OU=DEV, O=Oracle, L=Santa Clara, ST=CA, C=US SerialNumber: [ 1000] Certificate Extensions: 7 [1]: ObjectId: 2.16.840.1.113730.1.13 Criticality=false Extension unknown: DER encoded OCTET string = 0000: 04 26 16 24 4F 70 65 6E 53 53 4C 20 47 65 6E 65 .&.$OpenSSL Gene 0010: 72 61 74 65 64 20 53 65 72 76 65 72 20 43 65 72 rated Server Cer 0020: 74 69 66 69 63 61 74 65 tificate [2]: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: 1A CC 30 E0 B0 23 2A 68 19 60 42 30 C2 68 C8 1C ..0..#*h.`B0.h.. 0010: 06 FD 39 E5 ..9. ] [CN=Deploy, OU=DEV, O=Oracle, L=Santa Clara, ST=CA, C=US] SerialNumber: [ 976af296 a1bbcfaf] ] [3]: ObjectId: 2.5.29.19 Criticality=false BasicConstraints:[ CA:false PathLen: undefined ] [4]: ObjectId: 2.5.29.37 Criticality=false ExtendedKeyUsages [ serverAuth ] [5]: ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_Encipherment ] [6]: ObjectId: 2.16.840.1.113730.1.1 Criticality=false NetscapeCertType [ SSL server ] [7]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 03 60 18 99 86 2F C3 6E 7B 46 FB F3 FE 55 C5 8F .`.../.n.F...U.. 0010: 4D 4A 28 B9 MJ(. ] ] ] Algorithm: [SHA256withRSA] Signature: 0000: 32 FA 27 95 DB 98 65 FC CD 86 03 57 C9 3A 91 6A 2.'...e....W.:.j 0010: 25 A7 8C 5A 5B ED 8A 7E 3F 1F F6 85 B0 A4 B4 51 %..Z[...?......Q 0020: 85 68 90 BB 1F F8 3E 3E DA 69 08 6F B0 D0 57 C4 .h....>>.i.o..W. 0030: 35 0C 57 0C AF 31 5F 63 AC AB 56 E8 45 D5 3A A1 5.W..1_c..V.E.:. 0040: CF 6E B5 06 EB 5E A1 63 7E 70 A1 8B 2B 50 E3 30 .n...^.c.p..+P.0 0050: 8E 3F FF C7 DB 0C 26 EC 44 0A 6B 4F 86 CE E1 3A .?....&.D.kO...: 0060: CB 8E E9 FE B0 06 0A CC F7 00 E6 81 AB E8 78 9C ..............x. 0070: 68 3D 2B 2D BC AE 64 41 15 29 77 6A 19 BC 25 A6 h=+-..dA.)wj..%. 0080: EC B3 EB F4 4F 48 64 68 7B 0E B5 86 2E 09 6F 16 ....OHdh......o. 0090: FE 7E 24 6D 4E F0 AD 7F 21 17 72 88 AB 10 40 45 ..$mN...!.r...@E 00A0: 90 9C E6 D9 D9 10 AA 36 65 F9 16 3C 66 FF CD 30 .......6e..L...F@..+. 00F0: 90 FC 98 17 9F 78 6F 45 01 4E 5A B5 C0 34 A9 E9 .....xoE.NZ..4.. 0100: E1 43 B6 D2 2D BD 2E 85 44 9D A9 0D 2F 9B 66 ED .C..-...D.../.f. 0110: A2 31 FD 6D A5 E5 37 3D 3B 9C 23 20 F4 67 CA DC .1.m..7=;.# .g.. 0120: 37 08 47 D2 71 5B 27 93 B1 2F D0 44 9F 41 72 95 7.G.q['../.D.Ar. 0130: BB 9E 1D 81 7E DE C1 A9 96 1F 03 34 FB AD 7C 75 ...........4...u 0140: 6A 01 4C CA C0 34 6E 86 C9 8C D8 99 07 F7 FF D4 j.L..4n......... 0150: 77 6F F1 88 D6 0D 93 16 E8 3A 75 6A 08 6D 1B A2 wo.......:uj.m.. 0160: 51 F8 A5 6E 8A 1D 66 68 0B C2 36 2B FE 26 6E 5D Q..n..fh..6+.&n] 0170: DD 6B 2C 47 60 AD 83 C9 51 30 63 CC 00 1F F5 F2 .k,G`...Q0c..... 0180: FB 66 1E 52 16 E9 3F EC E7 43 5C F1 25 C0 BE 57 .f.R..?..C\.%..W 0190: 36 3F AC C2 F2 7D 7D 8C 9E 54 10 DE 27 6D 22 CE 6?.......T..'m". 01A0: A0 35 A8 1A D9 90 BA 5C 39 21 7A 3B 83 9D F6 62 .5.....\9!z;...b 01B0: D1 ED CD BD AA F7 75 CB F0 C4 6F B0 39 8B A3 D2 ......u...o.9... 01C0: 02 B9 2F AC 79 97 85 8F 78 A2 91 29 F1 CB 10 1B ../.y...x..).... 01D0: DC D9 10 D0 F9 A7 31 92 4B F0 45 93 1A 61 08 FE ......1.K.E..a.. 01E0: 55 E3 6D C5 4F 92 CF DB 3B 4B EE 2A 5E BB 7B CA U.m.O...;K.*^... 01F0: 13 0D A4 63 4F 29 9B 63 5C 71 FD 8D B6 28 52 3A ...cO).c\q...(R: ] *** *** ServerHelloDone *** ClientKeyExchange, RSA PreMasterSecret, TLSv1 Java Web Start Main Thread, WRITE: TLSv1 Handshake, length = 262 SESSION KEYGEN: PreMaster Secret: 0000: 03 03 DA F3 1A 4B AE 78 9F AE EB 90 91 AB CC 9D .....K.x........ 0010: F6 3F 03 BB F0 B3 48 E3 2C 1D F8 6E CB 70 08 B9 .?....H.,..n.p.. 0020: BE 1D 3C 9F 13 0A 22 CD 43 C0 AF 09 6D 37 72 F2 ..<...".C...m7r. CONNECTION KEYGEN: Client Nonce: 0000: 55 78 9D 64 11 43 34 3F CA 61 0E 45 0C 86 B0 94 Ux.d.C4?.a.E.... 0010: 3F B0 AA 6B 00 92 E2 44 73 B2 98 98 F9 83 48 DE ?..k...Ds.....H. Server Nonce: 0000: 55 78 9D 6E 09 99 21 03 9F 11 C0 F3 BE D9 1F D3 Ux.n..!......... 0010: C1 42 B2 FD 4C C0 3F 12 6E DA 97 B3 97 DB 34 7E .B..L.?.n.....4. Master Secret: 0000: 0A B5 74 2D 00 C6 3A 1A 8D E7 41 5B 94 5C F7 C7 ..t-..:...A[.\.. 0010: 3D BA 57 D4 AB A9 86 42 50 A8 CC FF F4 78 F5 4D =.W....BP....x.M 0020: CB 6E 77 54 28 34 4F 25 FF 6D 93 84 41 AC F4 49 .nwT(4O%.m..A..I Client MAC write Secret: 0000: 7D 58 4B 4F BD 1C 38 12 D7 2A 1D E0 94 BC E0 87 .XKO..8..*...... 0010: AA A0 DF 67 ...g Server MAC write Secret: 0000: 55 AD E7 5C 2C CC 3E E1 F8 35 C1 CB 82 19 45 D6 U..\,.>..5....E. 0010: 91 38 49 7D .8I. Client write key: 0000: 84 1B A8 AD 67 EA 4A 63 51 D3 40 68 CE 96 FE 9B ....g.JcQ.@h.... Server write key: 0000: 64 CE DA A7 04 95 BE 75 61 1E C9 48 70 D4 47 ED d......ua..Hp.G. Client write IV: 0000: 18 25 99 05 AE E4 D7 10 9A 5F 42 FD D4 BA 7A BC .%......._B...z. Server write IV: 0000: 02 E4 91 7C A5 7E B2 EA 68 67 11 C7 73 71 FA FA ........hg..sq.. Java Web Start Main Thread, WRITE: TLSv1 Change Cipher Spec, length = 1 *** Finished verify_data: { 21, 222, 73, 56, 28, 119, 84, 76, 121, 106, 204, 63 } *** Java Web Start Main Thread, WRITE: TLSv1 Handshake, length = 48 Java Web Start Main Thread, READ: TLSv1 Change Cipher Spec, length = 1 Java Web Start Main Thread, READ: TLSv1 Handshake, length = 48 *** Finished verify_data: { 155, 171, 127, 142, 133, 58, 227, 185, 132, 60, 113, 187 } *** %% Cached client session: [Session-5, TLS_RSA_WITH_AES_128_CBC_SHA] Java Web Start Main Thread, WRITE: TLSv1 Application Data, length = 304 Java Web Start Main Thread, READ: TLSv1 Handshake, length = 32 Allow unsafe renegotiation: false Allow legacy hello messages: true Is initial handshake: false Is secure renegotiation: true Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 for TLSv1.1 *** HelloRequest (empty) %% Client cached [Session-5, TLS_RSA_WITH_AES_128_CBC_SHA] %% Try resuming [Session-5, TLS_RSA_WITH_AES_128_CBC_SHA] from port 59386 *** ClientHello, TLSv1 RandomCookie: GMT: 1433902437 bytes = { 186, 135, 81, 231, 222, 149, 99, 206, 150, 124, 120, 38, 105, 66, 223, 171, 132, 80, 85, 89, 90, 148, 134, 83, 241, 163, 93, 161 } Session ID: {190, 30, 0, 0, 225, 38, 108, 111, 122, 223, 168, 67, 74, 150, 217, 91, 130, 173, 48, 24, 130, 12, 137, 189, 19, 218, 114, 227, 160, 187, 84, 46} Cipher Suites: [TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256, TLS_RSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_DSS_WITH_AES_128_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_DSS_WITH_AES_128_GCM_SHA256, TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA] Compression Methods: { 0 } Extension elliptic_curves, curve names: {secp256r1, sect163k1, sect163r2, secp192r1, secp224r1, sect233k1, sect233r1, sect283k1, sect283r1, secp384r1, sect409k1, sect409r1, secp521r1, sect571k1, sect571r1, secp160k1, secp160r1, secp160r2, sect163r1, secp192k1, sect193r1, sect193r2, secp224k1, sect239k1, secp256k1} Extension ec_point_formats, formats: [uncompressed] Extension renegotiation_info, renegotiated_connection: 15:de:49:38:1c:77:54:4c:79:6a:cc:3f *** Java Web Start Main Thread, WRITE: TLSv1 Handshake, length = 240 Java Web Start Main Thread, READ: TLSv1 Handshake, length = 3152 *** ServerHello, TLSv1 RandomCookie: GMT: 1433902446 bytes = { 219, 14, 239, 159, 128, 28, 37, 74, 226, 142, 32, 26, 189, 108, 209, 14, 102, 153, 80, 7, 193, 132, 45, 233, 183, 241, 138, 250 } Session ID: {156, 77, 0, 0, 236, 132, 66, 214, 46, 161, 13, 122, 251, 194, 100, 45, 99, 125, 76, 157, 143, 4, 111, 166, 15, 37, 133, 120, 59, 150, 170, 254} Cipher Suite: TLS_RSA_WITH_AES_128_CBC_SHA Compression Method: 0 Extension renegotiation_info, renegotiated_connection: 15:de:49:38:1c:77:54:4c:79:6a:cc:3f:9b:ab:7f:8e:85:3a:e3:b9:84:3c:71:bb *** %% Initialized: [Session-6, TLS_RSA_WITH_AES_128_CBC_SHA] ** TLS_RSA_WITH_AES_128_CBC_SHA *** Certificate chain chain [0] = [ [ Version: V3 Subject: CN=dan, OU=Test, O=Oracle, ST=CA, C=US Signature Algorithm: SHA256withRSA, OID = 1.2.840.113549.1.1.11 Key: Sun RSA public key, 2048 bits modulus: 27993800329023506915188619937271073675146531754788656107091985839151221862956338660826083129307150299177076284927991039444425558608748586185501453381350031509010983827567837732358657008599408295712364829220775090997081135518958109857589576926141558932552245139006180802682152879425941672165491708704274822508509790090280409136905763815540974504871865424441967155500742973933231552413698265953703372042016370786259247265523915810183271065561834150991240902083054508495535295536147129309792303053577725565695417921470016939423833336117790167245101378899510456944492050424721996316349253989237480157324834028741000498233 public exponent: 65537 Validity: [From: Tue Jun 09 16:13:29 PDT 2015, To: Sat Jun 18 16:13:29 PDT 2016] Issuer: CN=Deploy, OU=DEV, O=Oracle, L=Santa Clara, ST=CA, C=US SerialNumber: [ 1000] Certificate Extensions: 7 [1]: ObjectId: 2.16.840.1.113730.1.13 Criticality=false Extension unknown: DER encoded OCTET string = 0000: 04 26 16 24 4F 70 65 6E 53 53 4C 20 47 65 6E 65 .&.$OpenSSL Gene 0010: 72 61 74 65 64 20 53 65 72 76 65 72 20 43 65 72 rated Server Cer 0020: 74 69 66 69 63 61 74 65 tificate [2]: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: 1A CC 30 E0 B0 23 2A 68 19 60 42 30 C2 68 C8 1C ..0..#*h.`B0.h.. 0010: 06 FD 39 E5 ..9. ] [CN=Deploy, OU=DEV, O=Oracle, L=Santa Clara, ST=CA, C=US] SerialNumber: [ 976af296 a1bbcfaf] ] [3]: ObjectId: 2.5.29.19 Criticality=false BasicConstraints:[ CA:false PathLen: undefined ] [4]: ObjectId: 2.5.29.37 Criticality=false ExtendedKeyUsages [ serverAuth ] [5]: ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_Encipherment ] [6]: ObjectId: 2.16.840.1.113730.1.1 Criticality=false NetscapeCertType [ SSL server ] [7]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 03 60 18 99 86 2F C3 6E 7B 46 FB F3 FE 55 C5 8F .`.../.n.F...U.. 0010: 4D 4A 28 B9 MJ(. ] ] ] Algorithm: [SHA256withRSA] Signature: 0000: 32 FA 27 95 DB 98 65 FC CD 86 03 57 C9 3A 91 6A 2.'...e....W.:.j 0010: 25 A7 8C 5A 5B ED 8A 7E 3F 1F F6 85 B0 A4 B4 51 %..Z[...?......Q 0020: 85 68 90 BB 1F F8 3E 3E DA 69 08 6F B0 D0 57 C4 .h....>>.i.o..W. 0030: 35 0C 57 0C AF 31 5F 63 AC AB 56 E8 45 D5 3A A1 5.W..1_c..V.E.:. 0040: CF 6E B5 06 EB 5E A1 63 7E 70 A1 8B 2B 50 E3 30 .n...^.c.p..+P.0 0050: 8E 3F FF C7 DB 0C 26 EC 44 0A 6B 4F 86 CE E1 3A .?....&.D.kO...: 0060: CB 8E E9 FE B0 06 0A CC F7 00 E6 81 AB E8 78 9C ..............x. 0070: 68 3D 2B 2D BC AE 64 41 15 29 77 6A 19 BC 25 A6 h=+-..dA.)wj..%. 0080: EC B3 EB F4 4F 48 64 68 7B 0E B5 86 2E 09 6F 16 ....OHdh......o. 0090: FE 7E 24 6D 4E F0 AD 7F 21 17 72 88 AB 10 40 45 ..$mN...!.r...@E 00A0: 90 9C E6 D9 D9 10 AA 36 65 F9 16 3C 66 FF CD 30 .......6e..L...F@..+. 00F0: 90 FC 98 17 9F 78 6F 45 01 4E 5A B5 C0 34 A9 E9 .....xoE.NZ..4.. 0100: E1 43 B6 D2 2D BD 2E 85 44 9D A9 0D 2F 9B 66 ED .C..-...D.../.f. 0110: A2 31 FD 6D A5 E5 37 3D 3B 9C 23 20 F4 67 CA DC .1.m..7=;.# .g.. 0120: 37 08 47 D2 71 5B 27 93 B1 2F D0 44 9F 41 72 95 7.G.q['../.D.Ar. 0130: BB 9E 1D 81 7E DE C1 A9 96 1F 03 34 FB AD 7C 75 ...........4...u 0140: 6A 01 4C CA C0 34 6E 86 C9 8C D8 99 07 F7 FF D4 j.L..4n......... 0150: 77 6F F1 88 D6 0D 93 16 E8 3A 75 6A 08 6D 1B A2 wo.......:uj.m.. 0160: 51 F8 A5 6E 8A 1D 66 68 0B C2 36 2B FE 26 6E 5D Q..n..fh..6+.&n] 0170: DD 6B 2C 47 60 AD 83 C9 51 30 63 CC 00 1F F5 F2 .k,G`...Q0c..... 0180: FB 66 1E 52 16 E9 3F EC E7 43 5C F1 25 C0 BE 57 .f.R..?..C\.%..W 0190: 36 3F AC C2 F2 7D 7D 8C 9E 54 10 DE 27 6D 22 CE 6?.......T..'m". 01A0: A0 35 A8 1A D9 90 BA 5C 39 21 7A 3B 83 9D F6 62 .5.....\9!z;...b 01B0: D1 ED CD BD AA F7 75 CB F0 C4 6F B0 39 8B A3 D2 ......u...o.9... 01C0: 02 B9 2F AC 79 97 85 8F 78 A2 91 29 F1 CB 10 1B ../.y...x..).... 01D0: DC D9 10 D0 F9 A7 31 92 4B F0 45 93 1A 61 08 FE ......1.K.E..a.. 01E0: 55 E3 6D C5 4F 92 CF DB 3B 4B EE 2A 5E BB 7B CA U.m.O...;K.*^... 01F0: 13 0D A4 63 4F 29 9B 63 5C 71 FD 8D B6 28 52 3A ...cO).c\q...(R: ] *** *** CertificateRequest Cert Types: RSA, DSS, ECDSA Cert Authorities: *** ServerHelloDone ssl: KeyMgr: getting aliases: [Client Dan (verified: OK), test testl (verified: OK)] ssl: Ignoring alias Client Dan: key algorithm does not match ssl: Ignoring alias test testl: key algorithm does not match ssl: KeyMgr: no matching alias found ssl: Ignoring alias Client Dan: key algorithm does not match ssl: Ignoring alias test testl: key algorithm does not match ssl: KeyMgr: no matching alias found *** Certificate chain chain [0] = [ [ Version: V3 Subject: CN=Client Dan, OU=DT, O=Oracle, ST=CA, C=US Signature Algorithm: SHA256withRSA, OID = 1.2.840.113549.1.1.11 Key: Sun RSA public key, 2048 bits modulus: 25041167234775516209191536628623554777565383090132086621648953332096188060178264453951062245373026678900806631803201242153012863620306180291650308065728058725371502399634595673335624987186925360108483413989007050442140599195843481712747433628813692094403826422162619175616021483896340983175963054251732596203189838821479908442902564116220884226235439223121816215426580437846340378795658979390484291603745983809778742894900300599813134776854161020903021723346684155649004430053145377057091248407221435223646705022416390050199799718748450589449827050606884254389363322360084564710559130123559059677644223204275542036977 public exponent: 65537 Validity: [From: Tue Jun 09 16:32:36 PDT 2015, To: Sat Jun 18 16:32:36 PDT 2016] Issuer: CN=Deploy, OU=DEV, O=Oracle, L=Santa Clara, ST=CA, C=US SerialNumber: [ 1001] Certificate Extensions: 4 [1]: ObjectId: 2.16.840.1.113730.1.13 Criticality=false Extension unknown: DER encoded OCTET string = 0000: 04 1F 16 1D 4F 70 65 6E 53 53 4C 20 47 65 6E 65 ....OpenSSL Gene 0010: 72 61 74 65 64 20 43 65 72 74 69 66 69 63 61 74 rated Certificat 0020: 65 e [2]: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: 1A CC 30 E0 B0 23 2A 68 19 60 42 30 C2 68 C8 1C ..0..#*h.`B0.h.. 0010: 06 FD 39 E5 ..9. ] ] [3]: ObjectId: 2.5.29.19 Criticality=false BasicConstraints:[ CA:false PathLen: undefined ] [4]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 9B 03 A7 E4 0B 7F 0D 6D 19 81 1C 8A 69 B2 2F 11 .......m....i./. 0010: 49 1E 70 91 I.p. ] ] ] Algorithm: [SHA256withRSA] Signature: 0000: 3B B9 0E 1F 87 68 AA 22 8D 9C FA 50 27 C2 B4 A5 ;....h."...P'... 0010: A5 F8 E4 56 E5 BB BB AB 6D 10 3B 18 52 86 AB 1A ...V....m.;.R... 0020: 40 B3 0E 42 E7 98 E6 75 02 5D 3A 4E 69 4F F0 5E @..B...u.]:NiO.^ 0030: B2 A9 92 3A B9 5D 85 41 06 1A BB 21 89 EC 2C 1D ...:.].A...!..,. 0040: 9F 28 39 58 69 F4 8F 3F 32 E4 C0 36 50 B4 22 2D .(9Xi..?2..6P."- 0050: 41 AC 8C 45 56 00 A0 20 59 0D 36 5D 3B 8E 1C 59 A..EV.. Y.6];..Y 0060: E0 2D A4 52 E4 A7 2E 6C 63 1C 00 9C 65 71 90 99 .-.R...lc...eq.. 0070: 9D 51 5E 9A 42 CB 3F BB 3C 6C 7E AB 2C CB B3 1F .Q^.B.?./..9.p..J 0120: FF 36 E1 66 A5 E8 32 C3 5A AC 2D B8 F1 A0 83 5B .6.f..2.Z.-....[ 0130: 4E 7B AB 75 1B 55 B0 80 39 1E 05 48 A4 D2 56 16 N..u.U..9..H..V. 0140: F2 56 39 CC 1E DB A9 A1 F1 10 54 7D 79 C7 B0 9C .V9.......T.y... 0150: 0F 33 F1 60 C1 BD CD 77 49 72 86 77 68 34 39 3E .3.`...wIr.wh49> 0160: 5B 13 87 36 1E 41 22 A2 2C 81 EC 71 40 40 9A FA [..6.A".,..q@@.. 0170: 5D DB 18 61 B0 B1 A4 A2 3E 20 68 9F 7E 4F 90 CF ]..a....> h..O.. 0180: 0B 1B 26 27 9F 35 CC C7 74 84 14 65 AF 0D 49 39 ..&'.5..t..e..I9 0190: 7A ED 87 CB 2C 7B AC 9F BB D0 B4 48 A3 8D 00 FA z...,......H.... 01A0: 75 71 6E 17 D8 00 EF 8F 2A DD A2 A1 B8 4F A4 DE uqn.....*....O.. 01B0: F9 20 C2 C1 5F D0 9A 53 DF D8 23 33 36 99 81 63 . .._..S..#36..c 01C0: 9B 32 97 90 8A 78 E3 B0 FD DA EE 97 BD 7C 92 B4 .2...x.......... 01D0: C0 C8 75 6C 81 84 43 D5 4C 2E 46 4C 4B 9C 96 70 ..ul..C.L.FLK..p 01E0: AE 50 19 2A 04 E8 CF 5B 09 17 EF 97 CC 0E 9B AD .P.*...[........ 01F0: D3 54 D4 21 94 C0 49 EC DA 8B 9B 12 E2 3F D5 09 .T.!..I......?.. ] chain [1] = [ [ Version: V3 Subject: CN=Deploy, OU=DEV, O=Oracle, L=Santa Clara, ST=CA, C=US Signature Algorithm: SHA256withRSA, OID = 1.2.840.113549.1.1.11 Key: Sun RSA public key, 4096 bits modulus: 849953258605127028430388653187571693119994603253831509944165695948902333870652735485009179639332025059264510613513770058528116684955645364459059463774339759118238379559080228690635540023391127586736185629196108061422937551286886635161255424199937594422811584962764315992728818530330323323660630236599075046457514476831659401493595510701048798034367059978259449272818133235319159134123820048323324329808897202797459598751693689998475936585527654230297604365393816247703563416375036706742962673642696810724706557458499409200954368951393777573856916462816783412022353876755426998970906700935490633855201485905827918775287412562289407042643402824874928173230719037435488978231773066240646576912504954234995052482298969384390834399974479716112224019920903020802742961606783763122459898194221100335606064673963678579325277397942640530866375920383800073637679989603832901168500797931424323053774855078887727162833129883132625775035195111214838620594468999685799420938367850542805221593382978825246937771937962016273756048415501829287008368050568706316532539184393917227978969408067173250133438946243738983371890224018502259162230114631373205542118723148721310604808430483895913748158296789187896927353231265870991688535466912936858549035641 public exponent: 65537 Validity: [From: Tue Jun 09 15:54:03 PDT 2015, To: Mon Jun 04 15:54:03 PDT 2035] Issuer: CN=Deploy, OU=DEV, O=Oracle, L=Santa Clara, ST=CA, C=US SerialNumber: [ 976af296 a1bbcfaf] Certificate Extensions: 3 [1]: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: 1A CC 30 E0 B0 23 2A 68 19 60 42 30 C2 68 C8 1C ..0..#*h.`B0.h.. 0010: 06 FD 39 E5 ..9. ] ] [2]: ObjectId: 2.5.29.19 Criticality=false BasicConstraints:[ CA:true PathLen:2147483647 ] [3]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 1A CC 30 E0 B0 23 2A 68 19 60 42 30 C2 68 C8 1C ..0..#*h.`B0.h.. 0010: 06 FD 39 E5 ..9. ] ] ] Algorithm: [SHA256withRSA] Signature: 0000: 0B CA DE CF F4 24 AA 8A 11 2B B7 35 DB F2 ED F7 .....$...+.5.... 0010: F8 77 7C CB 35 D3 1B 42 26 4D 70 34 24 A9 01 25 .w..5..B&Mp4$..% 0020: D1 FF E2 AA A9 CF A1 F0 D8 95 17 50 AB 4F 0D 79 ...........P.O.y 0030: 7C E9 BA 9A 27 26 C8 C4 60 D1 7F BA 3A 7E D5 5B ....'&..`...:..[ 0040: AE 19 4A CC AC 8D 5B B8 62 8C 43 71 CC A3 2D EA ..J...[.b.Cq..-. 0050: 76 13 F4 09 12 B1 31 CA 05 A4 77 C6 78 EF 5C 0F v.....1...w.x.\. 0060: 57 B9 62 96 D4 1C 78 1F 1A F9 BE B3 79 5A C7 8E W.b...x.....yZ.. 0070: FE B6 2B 7F FC 03 6C 0D 2B 23 C6 DF 09 B3 F9 1D ..+...l.+#...... 0080: B2 49 A8 78 C9 E3 3F 0A 0C 43 B3 22 4C 79 FC 68 .I.x..?..C."Ly.h 0090: E9 74 14 CC 51 39 89 91 AC 9B 62 7C 67 D2 8B DA .t..Q9....b.g... 00A0: 22 4E DB 3A BD B1 3A 55 1E C4 9E 6A D4 45 8C FD "N.:..:U...j.E.. 00B0: 9A 3C 1E F5 2F AF 8E B9 88 E0 67 A3 FA 71 80 C5 .<../.....g..q.. 00C0: A3 59 84 36 28 29 FF 79 88 09 7B 99 D9 65 76 A2 .Y.6().y.....ev. 00D0: 86 F1 E0 24 E7 11 12 58 12 B8 00 A5 61 7D 20 C4 ...$...X....a. . 00E0: C6 AF 47 2B 5B 3D 37 9D FD 37 51 F1 0E 2A 1C E8 ..G+[=7..7Q..*.. 00F0: F8 B5 AA 2D 07 F9 D2 94 0C 5C E5 46 7C 2C 01 69 ...-.....\.F.,.i 0100: 2A 9B B4 22 E5 FA B4 38 26 14 F2 C1 18 E6 30 86 *.."...8&.....0. 0110: 98 14 4B 9C BF CF C1 BB 49 CC 51 94 99 48 6A AF ..K.....I.Q..Hj. 0120: EF 91 6D 29 64 4E 96 E5 E1 6C 2A D1 30 8A 5C 4C ..m)dN...l*.0.\L 0130: B0 1D 14 8D 39 43 E5 53 8E 22 31 24 20 91 19 F7 ....9C.S."1$ ... 0140: 3F BD 95 31 11 38 11 0B 77 1C AD 9E A9 9E D3 B3 ?..1.8..w....... 0150: E4 14 DD 01 D9 DA 04 ED 3A 47 07 9C AE BF FA E9 ........:G...... 0160: 69 72 27 8C 36 21 98 B6 FC 23 2A 6A F0 59 77 08 ir'.6!...#*j.Yw. 0170: BF D0 9F AE 5E 0B B7 F4 65 74 8C 47 C5 E6 EF 7C ....^...et.G.... 0180: 11 2C 11 86 83 93 2D A6 61 10 85 EB 99 80 4A A5 .,....-.a.....J. 0190: D2 94 C9 5D FA 96 59 19 FD 0D 5A 8A F3 24 37 D7 ...]..Y...Z..$7. 01A0: A1 7E 51 60 3A 8E 2C 13 1D 27 73 C7 85 EC 8B 99 ..Q`:.,..'s..... 01B0: BB 23 21 2A 97 62 BE 3D 7F BE A6 51 E3 0F CA A1 .#!*.b.=...Q.... 01C0: 43 7A 1C A7 89 A2 50 D2 08 0C 86 DE E6 D8 03 77 Cz....P........w 01D0: 79 1C 34 3F 19 66 DA 20 1C 23 01 28 12 9B A8 8C y.4?.f. .#.(.... 01E0: 82 FD 29 76 D3 04 C9 71 9C F4 F8 1C 33 12 0C 1B ..)v...q....3... 01F0: 02 1E 4D FB 18 83 C5 A3 38 C6 99 DC 0B 88 D2 88 ..M.....8....... ] *** *** ClientKeyExchange, RSA PreMasterSecret, TLSv1 Java Web Start Main Thread, WRITE: TLSv1 Handshake, length = 2928 Java Web Start Main Thread, waiting for close_notify or alert: state 3 Java Web Start Main Thread, Exception while waiting for close java.net.SocketException: Connection reset Java Web Start Main Thread, handling exception: java.net.SocketException: Connection reset %% Invalidated: [Session-5, TLS_RSA_WITH_AES_128_CBC_SHA] %% Invalidated: [Session-6, TLS_RSA_WITH_AES_128_CBC_SHA] Java Web Start Main Thread, SEND TLSv1 ALERT: fatal, description = unexpected_message Java Web Start Main Thread, WRITE: TLSv1 Alert, length = 32 Java Web Start Main Thread, Exception sending alert: java.net.SocketException: Connection reset by peer: socket write error Java Web Start Main Thread, called closeSocket() Java Web Start Main Thread, called close() Java Web Start Main Thread, called closeInternal(true) Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 Allow unsafe renegotiation: false Allow legacy hello messages: true Is initial handshake: true Is secure renegotiation: false Java Web Start Main Thread, setSoTimeout(0) called Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 for TLSv1.1 %% No cached client session *** ClientHello, TLSv1.2 RandomCookie: GMT: 1433902962 bytes = { 74, 122, 162, 137, 103, 125, 60, 197, 156, 106, 28, 147, 78, 236, 42, 75, 39, 76, 207, 81, 1, 213, 41, 77, 128, 200, 175, 204 } Session ID: {} Cipher Suites: [TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256, TLS_RSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_DSS_WITH_AES_128_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_DSS_WITH_AES_128_GCM_SHA256, TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA, TLS_EMPTY_RENEGOTIATION_INFO_SCSV] Compression Methods: { 0 } Extension elliptic_curves, curve names: {secp256r1, sect163k1, sect163r2, secp192r1, secp224r1, sect233k1, sect233r1, sect283k1, sect283r1, secp384r1, sect409k1, sect409r1, secp521r1, sect571k1, sect571r1, secp160k1, secp160r1, secp160r2, sect163r1, secp192k1, sect193r1, sect193r2, secp224k1, sect239k1, secp256k1} Extension ec_point_formats, formats: [uncompressed] Extension signature_algorithms, signature_algorithms: SHA512withECDSA, SHA512withRSA, SHA384withECDSA, SHA384withRSA, SHA256withECDSA, SHA256withRSA, SHA224withECDSA, SHA224withRSA, SHA1withECDSA, SHA1withRSA, SHA1withDSA, MD5withRSA *** Java Web Start Main Thread, WRITE: TLSv1.2 Handshake, length = 195 Java Web Start Main Thread, READ: TLSv1 Handshake, length = 1465 *** ServerHello, TLSv1 RandomCookie: GMT: 1433902962 bytes = { 179, 208, 85, 20, 34, 206, 209, 20, 40, 112, 94, 224, 181, 45, 100, 151, 74, 191, 167, 87, 156, 164, 144, 40, 26, 28, 80, 81 } Session ID: {212, 26, 0, 0, 216, 146, 195, 99, 131, 40, 110, 87, 240, 139, 195, 92, 228, 83, 9, 81, 210, 91, 209, 209, 157, 132, 197, 40, 204, 223, 149, 225} Cipher Suite: TLS_RSA_WITH_AES_128_CBC_SHA Compression Method: 0 Extension renegotiation_info, renegotiated_connection: *** %% Initialized: [Session-7, TLS_RSA_WITH_AES_128_CBC_SHA] ** TLS_RSA_WITH_AES_128_CBC_SHA *** Certificate chain Finalizer, called close() Finalizer, called closeInternal(true) Finalizer, called closeSocket(true) chain [0] = [ [ Version: V3 Subject: CN=dan, OU=Test, O=Oracle, ST=CA, C=US Signature Algorithm: SHA256withRSA, OID = 1.2.840.113549.1.1.11 Key: Sun RSA public key, 2048 bits modulus: 27993800329023506915188619937271073675146531754788656107091985839151221862956338660826083129307150299177076284927991039444425558608748586185501453381350031509010983827567837732358657008599408295712364829220775090997081135518958109857589576926141558932552245139006180802682152879425941672165491708704274822508509790090280409136905763815540974504871865424441967155500742973933231552413698265953703372042016370786259247265523915810183271065561834150991240902083054508495535295536147129309792303053577725565695417921470016939423833336117790167245101378899510456944492050424721996316349253989237480157324834028741000498233 public exponent: 65537 Validity: [From: Tue Jun 09 16:13:29 PDT 2015, To: Sat Jun 18 16:13:29 PDT 2016] Issuer: CN=Deploy, OU=DEV, O=Oracle, L=Santa Clara, ST=CA, C=US SerialNumber: [ 1000] Certificate Extensions: 7 [1]: ObjectId: 2.16.840.1.113730.1.13 Criticality=false Extension unknown: DER encoded OCTET string = 0000: 04 26 16 24 4F 70 65 6E 53 53 4C 20 47 65 6E 65 .&.$OpenSSL Gene 0010: 72 61 74 65 64 20 53 65 72 76 65 72 20 43 65 72 rated Server Cer 0020: 74 69 66 69 63 61 74 65 tificate [2]: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: 1A CC 30 E0 B0 23 2A 68 19 60 42 30 C2 68 C8 1C ..0..#*h.`B0.h.. 0010: 06 FD 39 E5 ..9. ] [CN=Deploy, OU=DEV, O=Oracle, L=Santa Clara, ST=CA, C=US] SerialNumber: [ 976af296 a1bbcfaf] ] [3]: ObjectId: 2.5.29.19 Criticality=false BasicConstraints:[ CA:false PathLen: undefined ] [4]: ObjectId: 2.5.29.37 Criticality=false ExtendedKeyUsages [ serverAuth ] [5]: ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_Encipherment ] [6]: ObjectId: 2.16.840.1.113730.1.1 Criticality=false NetscapeCertType [ SSL server ] [7]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 03 60 18 99 86 2F C3 6E 7B 46 FB F3 FE 55 C5 8F .`.../.n.F...U.. 0010: 4D 4A 28 B9 MJ(. ] ] ] Algorithm: [SHA256withRSA] Signature: 0000: 32 FA 27 95 DB 98 65 FC CD 86 03 57 C9 3A 91 6A 2.'...e....W.:.j 0010: 25 A7 8C 5A 5B ED 8A 7E 3F 1F F6 85 B0 A4 B4 51 %..Z[...?......Q 0020: 85 68 90 BB 1F F8 3E 3E DA 69 08 6F B0 D0 57 C4 .h....>>.i.o..W. 0030: 35 0C 57 0C AF 31 5F 63 AC AB 56 E8 45 D5 3A A1 5.W..1_c..V.E.:. 0040: CF 6E B5 06 EB 5E A1 63 7E 70 A1 8B 2B 50 E3 30 .n...^.c.p..+P.0 0050: 8E 3F FF C7 DB 0C 26 EC 44 0A 6B 4F 86 CE E1 3A .?....&.D.kO...: 0060: CB 8E E9 FE B0 06 0A CC F7 00 E6 81 AB E8 78 9C ..............x. 0070: 68 3D 2B 2D BC AE 64 41 15 29 77 6A 19 BC 25 A6 h=+-..dA.)wj..%. 0080: EC B3 EB F4 4F 48 64 68 7B 0E B5 86 2E 09 6F 16 ....OHdh......o. 0090: FE 7E 24 6D 4E F0 AD 7F 21 17 72 88 AB 10 40 45 ..$mN...!.r...@E 00A0: 90 9C E6 D9 D9 10 AA 36 65 F9 16 3C 66 FF CD 30 .......6e..L...F@..+. 00F0: 90 FC 98 17 9F 78 6F 45 01 4E 5A B5 C0 34 A9 E9 .....xoE.NZ..4.. 0100: E1 43 B6 D2 2D BD 2E 85 44 9D A9 0D 2F 9B 66 ED .C..-...D.../.f. 0110: A2 31 FD 6D A5 E5 37 3D 3B 9C 23 20 F4 67 CA DC .1.m..7=;.# .g.. 0120: 37 08 47 D2 71 5B 27 93 B1 2F D0 44 9F 41 72 95 7.G.q['../.D.Ar. 0130: BB 9E 1D 81 7E DE C1 A9 96 1F 03 34 FB AD 7C 75 ...........4...u 0140: 6A 01 4C CA C0 34 6E 86 C9 8C D8 99 07 F7 FF D4 j.L..4n......... 0150: 77 6F F1 88 D6 0D 93 16 E8 3A 75 6A 08 6D 1B A2 wo.......:uj.m.. 0160: 51 F8 A5 6E 8A 1D 66 68 0B C2 36 2B FE 26 6E 5D Q..n..fh..6+.&n] 0170: DD 6B 2C 47 60 AD 83 C9 51 30 63 CC 00 1F F5 F2 .k,G`...Q0c..... 0180: FB 66 1E 52 16 E9 3F EC E7 43 5C F1 25 C0 BE 57 .f.R..?..C\.%..W 0190: 36 3F AC C2 F2 7D 7D 8C 9E 54 10 DE 27 6D 22 CE 6?.......T..'m". 01A0: A0 35 A8 1A D9 90 BA 5C 39 21 7A 3B 83 9D F6 62 .5.....\9!z;...b 01B0: D1 ED CD BD AA F7 75 CB F0 C4 6F B0 39 8B A3 D2 ......u...o.9... 01C0: 02 B9 2F AC 79 97 85 8F 78 A2 91 29 F1 CB 10 1B ../.y...x..).... 01D0: DC D9 10 D0 F9 A7 31 92 4B F0 45 93 1A 61 08 FE ......1.K.E..a.. 01E0: 55 E3 6D C5 4F 92 CF DB 3B 4B EE 2A 5E BB 7B CA U.m.O...;K.*^... 01F0: 13 0D A4 63 4F 29 9B 63 5C 71 FD 8D B6 28 52 3A ...cO).c\q...(R: ] *** *** ServerHelloDone *** ClientKeyExchange, RSA PreMasterSecret, TLSv1 Java Web Start Main Thread, WRITE: TLSv1 Handshake, length = 262 SESSION KEYGEN: PreMaster Secret: 0000: 03 03 6A F8 FB D2 DC 25 21 C4 13 83 ED 0B DD F2 ..j....%!....... 0010: 16 86 AE E8 22 E0 4B 51 F4 AC A9 A3 21 F8 B1 29 ....".KQ....!..) 0020: 87 56 F1 C2 70 68 CD DA 53 45 CB 8C 17 5E 5E D1 .V..ph..SE...^^. CONNECTION KEYGEN: Client Nonce: 0000: 55 78 9F 72 4A 7A A2 89 67 7D 3C C5 9C 6A 1C 93 Ux.rJz..g.<..j.. 0010: 4E EC 2A 4B 27 4C CF 51 01 D5 29 4D 80 C8 AF CC N.*K'L.Q..)M.... Server Nonce: 0000: 55 78 9F 72 B3 D0 55 14 22 CE D1 14 28 70 5E E0 Ux.r..U."...(p^. 0010: B5 2D 64 97 4A BF A7 57 9C A4 90 28 1A 1C 50 51 .-d.J..W...(..PQ Master Secret: 0000: 59 D3 8B 39 84 A1 F1 85 6C D7 05 CC A5 82 FC 00 Y..9....l....... 0010: D2 26 6E 5B 1F 54 78 AD 9B FA 7D FF 5B 78 62 79 .&n[.Tx.....[xby 0020: 46 28 F5 94 8B F4 9A B2 78 95 02 74 ED 60 4C EF F(......x..t.`L. Client MAC write Secret: 0000: 82 3B 44 E2 E9 6B BB C1 02 AC 4E B9 D0 13 52 10 .;D..k....N...R. 0010: 59 14 CB D4 Y... Server MAC write Secret: 0000: 51 12 FD F3 5C 82 AF 16 AD 04 93 F4 EA 3F 83 A2 Q...\........?.. 0010: 26 AC 2D 6E &.-n Client write key: 0000: 97 F1 A1 FE CE A6 7D 7D BC 5C 38 17 7A 28 7B 86 .........\8.z(.. Server write key: 0000: 28 9B 8A B7 44 9A A5 07 76 95 31 8A FE 89 27 79 (...D...v.1...'y Client write IV: 0000: CD FC 5F FD BF 6A A7 49 E8 E0 E5 43 96 D8 23 1A .._..j.I...C..#. Server write IV: 0000: C7 56 E0 F7 22 9B 23 A4 D1 11 ED 06 FB EB 5A E5 .V..".#.......Z. Java Web Start Main Thread, WRITE: TLSv1 Change Cipher Spec, length = 1 *** Finished verify_data: { 126, 89, 131, 170, 109, 89, 102, 160, 24, 253, 201, 166 } *** Java Web Start Main Thread, WRITE: TLSv1 Handshake, length = 48 Java Web Start Main Thread, READ: TLSv1 Change Cipher Spec, length = 1 Java Web Start Main Thread, READ: TLSv1 Handshake, length = 48 *** Finished verify_data: { 1, 110, 246, 227, 187, 78, 15, 99, 206, 161, 70, 198 } *** %% Cached client session: [Session-7, TLS_RSA_WITH_AES_128_CBC_SHA] Java Web Start Main Thread, WRITE: TLSv1 Application Data, length = 336 Java Web Start Main Thread, READ: TLSv1 Handshake, length = 32 Allow unsafe renegotiation: false Allow legacy hello messages: true Is initial handshake: false Is secure renegotiation: true Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 for TLSv1.1 *** HelloRequest (empty) %% Client cached [Session-7, TLS_RSA_WITH_AES_128_CBC_SHA] %% Try resuming [Session-7, TLS_RSA_WITH_AES_128_CBC_SHA] from port 59435 *** ClientHello, TLSv1 RandomCookie: GMT: 1433902962 bytes = { 250, 204, 249, 156, 155, 77, 234, 191, 50, 60, 106, 67, 73, 151, 101, 13, 113, 93, 21, 241, 177, 45, 37, 121, 226, 50, 14, 114 } Session ID: {212, 26, 0, 0, 216, 146, 195, 99, 131, 40, 110, 87, 240, 139, 195, 92, 228, 83, 9, 81, 210, 91, 209, 209, 157, 132, 197, 40, 204, 223, 149, 225} Cipher Suites: [TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256, TLS_RSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_DSS_WITH_AES_128_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_DSS_WITH_AES_128_GCM_SHA256, TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA] Compression Methods: { 0 } Extension elliptic_curves, curve names: {secp256r1, sect163k1, sect163r2, secp192r1, secp224r1, sect233k1, sect233r1, sect283k1, sect283r1, secp384r1, sect409k1, sect409r1, secp521r1, sect571k1, sect571r1, secp160k1, secp160r1, secp160r2, sect163r1, secp192k1, sect193r1, sect193r2, secp224k1, sect239k1, secp256k1} Extension ec_point_formats, formats: [uncompressed] Extension renegotiation_info, renegotiated_connection: 7e:59:83:aa:6d:59:66:a0:18:fd:c9:a6 *** Java Web Start Main Thread, WRITE: TLSv1 Handshake, length = 240 Java Web Start Main Thread, READ: TLSv1 Handshake, length = 3152 *** ServerHello, TLSv1 RandomCookie: GMT: 1433902962 bytes = { 166, 22, 188, 189, 153, 139, 194, 213, 157, 207, 29, 137, 48, 113, 202, 52, 235, 123, 180, 113, 19, 217, 52, 230, 123, 214, 88, 97 } Session ID: {107, 45, 0, 0, 219, 137, 251, 18, 102, 35, 166, 92, 79, 127, 109, 44, 78, 209, 118, 192, 186, 211, 92, 11, 182, 170, 242, 148, 193, 186, 53, 100} Cipher Suite: TLS_RSA_WITH_AES_128_CBC_SHA Compression Method: 0 Extension renegotiation_info, renegotiated_connection: 7e:59:83:aa:6d:59:66:a0:18:fd:c9:a6:01:6e:f6:e3:bb:4e:0f:63:ce:a1:46:c6 *** %% Initialized: [Session-8, TLS_RSA_WITH_AES_128_CBC_SHA] ** TLS_RSA_WITH_AES_128_CBC_SHA *** Certificate chain chain [0] = [ [ Version: V3 Subject: CN=dan, OU=Test, O=Oracle, ST=CA, C=US Signature Algorithm: SHA256withRSA, OID = 1.2.840.113549.1.1.11 Key: Sun RSA public key, 2048 bits modulus: 27993800329023506915188619937271073675146531754788656107091985839151221862956338660826083129307150299177076284927991039444425558608748586185501453381350031509010983827567837732358657008599408295712364829220775090997081135518958109857589576926141558932552245139006180802682152879425941672165491708704274822508509790090280409136905763815540974504871865424441967155500742973933231552413698265953703372042016370786259247265523915810183271065561834150991240902083054508495535295536147129309792303053577725565695417921470016939423833336117790167245101378899510456944492050424721996316349253989237480157324834028741000498233 public exponent: 65537 Validity: [From: Tue Jun 09 16:13:29 PDT 2015, To: Sat Jun 18 16:13:29 PDT 2016] Issuer: CN=Deploy, OU=DEV, O=Oracle, L=Santa Clara, ST=CA, C=US SerialNumber: [ 1000] Certificate Extensions: 7 [1]: ObjectId: 2.16.840.1.113730.1.13 Criticality=false Extension unknown: DER encoded OCTET string = 0000: 04 26 16 24 4F 70 65 6E 53 53 4C 20 47 65 6E 65 .&.$OpenSSL Gene 0010: 72 61 74 65 64 20 53 65 72 76 65 72 20 43 65 72 rated Server Cer 0020: 74 69 66 69 63 61 74 65 tificate [2]: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: 1A CC 30 E0 B0 23 2A 68 19 60 42 30 C2 68 C8 1C ..0..#*h.`B0.h.. 0010: 06 FD 39 E5 ..9. ] [CN=Deploy, OU=DEV, O=Oracle, L=Santa Clara, ST=CA, C=US] SerialNumber: [ 976af296 a1bbcfaf] ] [3]: ObjectId: 2.5.29.19 Criticality=false BasicConstraints:[ CA:false PathLen: undefined ] [4]: ObjectId: 2.5.29.37 Criticality=false ExtendedKeyUsages [ serverAuth ] [5]: ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_Encipherment ] [6]: ObjectId: 2.16.840.1.113730.1.1 Criticality=false NetscapeCertType [ SSL server ] [7]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 03 60 18 99 86 2F C3 6E 7B 46 FB F3 FE 55 C5 8F .`.../.n.F...U.. 0010: 4D 4A 28 B9 MJ(. ] ] ] Algorithm: [SHA256withRSA] Signature: 0000: 32 FA 27 95 DB 98 65 FC CD 86 03 57 C9 3A 91 6A 2.'...e....W.:.j 0010: 25 A7 8C 5A 5B ED 8A 7E 3F 1F F6 85 B0 A4 B4 51 %..Z[...?......Q 0020: 85 68 90 BB 1F F8 3E 3E DA 69 08 6F B0 D0 57 C4 .h....>>.i.o..W. 0030: 35 0C 57 0C AF 31 5F 63 AC AB 56 E8 45 D5 3A A1 5.W..1_c..V.E.:. 0040: CF 6E B5 06 EB 5E A1 63 7E 70 A1 8B 2B 50 E3 30 .n...^.c.p..+P.0 0050: 8E 3F FF C7 DB 0C 26 EC 44 0A 6B 4F 86 CE E1 3A .?....&.D.kO...: 0060: CB 8E E9 FE B0 06 0A CC F7 00 E6 81 AB E8 78 9C ..............x. 0070: 68 3D 2B 2D BC AE 64 41 15 29 77 6A 19 BC 25 A6 h=+-..dA.)wj..%. 0080: EC B3 EB F4 4F 48 64 68 7B 0E B5 86 2E 09 6F 16 ....OHdh......o. 0090: FE 7E 24 6D 4E F0 AD 7F 21 17 72 88 AB 10 40 45 ..$mN...!.r...@E 00A0: 90 9C E6 D9 D9 10 AA 36 65 F9 16 3C 66 FF CD 30 .......6e..L...F@..+. 00F0: 90 FC 98 17 9F 78 6F 45 01 4E 5A B5 C0 34 A9 E9 .....xoE.NZ..4.. 0100: E1 43 B6 D2 2D BD 2E 85 44 9D A9 0D 2F 9B 66 ED .C..-...D.../.f. 0110: A2 31 FD 6D A5 E5 37 3D 3B 9C 23 20 F4 67 CA DC .1.m..7=;.# .g.. 0120: 37 08 47 D2 71 5B 27 93 B1 2F D0 44 9F 41 72 95 7.G.q['../.D.Ar. 0130: BB 9E 1D 81 7E DE C1 A9 96 1F 03 34 FB AD 7C 75 ...........4...u 0140: 6A 01 4C CA C0 34 6E 86 C9 8C D8 99 07 F7 FF D4 j.L..4n......... 0150: 77 6F F1 88 D6 0D 93 16 E8 3A 75 6A 08 6D 1B A2 wo.......:uj.m.. 0160: 51 F8 A5 6E 8A 1D 66 68 0B C2 36 2B FE 26 6E 5D Q..n..fh..6+.&n] 0170: DD 6B 2C 47 60 AD 83 C9 51 30 63 CC 00 1F F5 F2 .k,G`...Q0c..... 0180: FB 66 1E 52 16 E9 3F EC E7 43 5C F1 25 C0 BE 57 .f.R..?..C\.%..W 0190: 36 3F AC C2 F2 7D 7D 8C 9E 54 10 DE 27 6D 22 CE 6?.......T..'m". 01A0: A0 35 A8 1A D9 90 BA 5C 39 21 7A 3B 83 9D F6 62 .5.....\9!z;...b 01B0: D1 ED CD BD AA F7 75 CB F0 C4 6F B0 39 8B A3 D2 ......u...o.9... 01C0: 02 B9 2F AC 79 97 85 8F 78 A2 91 29 F1 CB 10 1B ../.y...x..).... 01D0: DC D9 10 D0 F9 A7 31 92 4B F0 45 93 1A 61 08 FE ......1.K.E..a.. 01E0: 55 E3 6D C5 4F 92 CF DB 3B 4B EE 2A 5E BB 7B CA U.m.O...;K.*^... 01F0: 13 0D A4 63 4F 29 9B 63 5C 71 FD 8D B6 28 52 3A ...cO).c\q...(R: ] *** *** CertificateRequest Cert Types: RSA, DSS, ECDSA Cert Authorities: *** ServerHelloDone ssl: KeyMgr: getting aliases: [Client Dan (verified: OK), test testl (verified: OK)] ssl: Ignoring alias Client Dan: key algorithm does not match ssl: Ignoring alias test testl: key algorithm does not match ssl: KeyMgr: no matching alias found ssl: Ignoring alias Client Dan: key algorithm does not match ssl: Ignoring alias test testl: key algorithm does not match ssl: KeyMgr: no matching alias found *** Certificate chain chain [0] = [ [ Version: V3 Subject: CN=Client Dan, OU=DT, O=Oracle, ST=CA, C=US Signature Algorithm: SHA256withRSA, OID = 1.2.840.113549.1.1.11 Key: Sun RSA public key, 2048 bits modulus: 25041167234775516209191536628623554777565383090132086621648953332096188060178264453951062245373026678900806631803201242153012863620306180291650308065728058725371502399634595673335624987186925360108483413989007050442140599195843481712747433628813692094403826422162619175616021483896340983175963054251732596203189838821479908442902564116220884226235439223121816215426580437846340378795658979390484291603745983809778742894900300599813134776854161020903021723346684155649004430053145377057091248407221435223646705022416390050199799718748450589449827050606884254389363322360084564710559130123559059677644223204275542036977 public exponent: 65537 Validity: [From: Tue Jun 09 16:32:36 PDT 2015, To: Sat Jun 18 16:32:36 PDT 2016] Issuer: CN=Deploy, OU=DEV, O=Oracle, L=Santa Clara, ST=CA, C=US SerialNumber: [ 1001] Certificate Extensions: 4 [1]: ObjectId: 2.16.840.1.113730.1.13 Criticality=false Extension unknown: DER encoded OCTET string = 0000: 04 1F 16 1D 4F 70 65 6E 53 53 4C 20 47 65 6E 65 ....OpenSSL Gene 0010: 72 61 74 65 64 20 43 65 72 74 69 66 69 63 61 74 rated Certificat 0020: 65 e [2]: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: 1A CC 30 E0 B0 23 2A 68 19 60 42 30 C2 68 C8 1C ..0..#*h.`B0.h.. 0010: 06 FD 39 E5 ..9. ] ] [3]: ObjectId: 2.5.29.19 Criticality=false BasicConstraints:[ CA:false PathLen: undefined ] [4]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 9B 03 A7 E4 0B 7F 0D 6D 19 81 1C 8A 69 B2 2F 11 .......m....i./. 0010: 49 1E 70 91 I.p. ] ] ] Algorithm: [SHA256withRSA] Signature: 0000: 3B B9 0E 1F 87 68 AA 22 8D 9C FA 50 27 C2 B4 A5 ;....h."...P'... 0010: A5 F8 E4 56 E5 BB BB AB 6D 10 3B 18 52 86 AB 1A ...V....m.;.R... 0020: 40 B3 0E 42 E7 98 E6 75 02 5D 3A 4E 69 4F F0 5E @..B...u.]:NiO.^ 0030: B2 A9 92 3A B9 5D 85 41 06 1A BB 21 89 EC 2C 1D ...:.].A...!..,. 0040: 9F 28 39 58 69 F4 8F 3F 32 E4 C0 36 50 B4 22 2D .(9Xi..?2..6P."- 0050: 41 AC 8C 45 56 00 A0 20 59 0D 36 5D 3B 8E 1C 59 A..EV.. Y.6];..Y 0060: E0 2D A4 52 E4 A7 2E 6C 63 1C 00 9C 65 71 90 99 .-.R...lc...eq.. 0070: 9D 51 5E 9A 42 CB 3F BB 3C 6C 7E AB 2C CB B3 1F .Q^.B.?./..9.p..J 0120: FF 36 E1 66 A5 E8 32 C3 5A AC 2D B8 F1 A0 83 5B .6.f..2.Z.-....[ 0130: 4E 7B AB 75 1B 55 B0 80 39 1E 05 48 A4 D2 56 16 N..u.U..9..H..V. 0140: F2 56 39 CC 1E DB A9 A1 F1 10 54 7D 79 C7 B0 9C .V9.......T.y... 0150: 0F 33 F1 60 C1 BD CD 77 49 72 86 77 68 34 39 3E .3.`...wIr.wh49> 0160: 5B 13 87 36 1E 41 22 A2 2C 81 EC 71 40 40 9A FA [..6.A".,..q@@.. 0170: 5D DB 18 61 B0 B1 A4 A2 3E 20 68 9F 7E 4F 90 CF ]..a....> h..O.. 0180: 0B 1B 26 27 9F 35 CC C7 74 84 14 65 AF 0D 49 39 ..&'.5..t..e..I9 0190: 7A ED 87 CB 2C 7B AC 9F BB D0 B4 48 A3 8D 00 FA z...,......H.... 01A0: 75 71 6E 17 D8 00 EF 8F 2A DD A2 A1 B8 4F A4 DE uqn.....*....O.. 01B0: F9 20 C2 C1 5F D0 9A 53 DF D8 23 33 36 99 81 63 . .._..S..#36..c 01C0: 9B 32 97 90 8A 78 E3 B0 FD DA EE 97 BD 7C 92 B4 .2...x.......... 01D0: C0 C8 75 6C 81 84 43 D5 4C 2E 46 4C 4B 9C 96 70 ..ul..C.L.FLK..p 01E0: AE 50 19 2A 04 E8 CF 5B 09 17 EF 97 CC 0E 9B AD .P.*...[........ 01F0: D3 54 D4 21 94 C0 49 EC DA 8B 9B 12 E2 3F D5 09 .T.!..I......?.. ] chain [1] = [ [ Version: V3 Subject: CN=Deploy, OU=DEV, O=Oracle, L=Santa Clara, ST=CA, C=US Signature Algorithm: SHA256withRSA, OID = 1.2.840.113549.1.1.11 Key: Sun RSA public key, 4096 bits modulus: 849953258605127028430388653187571693119994603253831509944165695948902333870652735485009179639332025059264510613513770058528116684955645364459059463774339759118238379559080228690635540023391127586736185629196108061422937551286886635161255424199937594422811584962764315992728818530330323323660630236599075046457514476831659401493595510701048798034367059978259449272818133235319159134123820048323324329808897202797459598751693689998475936585527654230297604365393816247703563416375036706742962673642696810724706557458499409200954368951393777573856916462816783412022353876755426998970906700935490633855201485905827918775287412562289407042643402824874928173230719037435488978231773066240646576912504954234995052482298969384390834399974479716112224019920903020802742961606783763122459898194221100335606064673963678579325277397942640530866375920383800073637679989603832901168500797931424323053774855078887727162833129883132625775035195111214838620594468999685799420938367850542805221593382978825246937771937962016273756048415501829287008368050568706316532539184393917227978969408067173250133438946243738983371890224018502259162230114631373205542118723148721310604808430483895913748158296789187896927353231265870991688535466912936858549035641 public exponent: 65537 Validity: [From: Tue Jun 09 15:54:03 PDT 2015, To: Mon Jun 04 15:54:03 PDT 2035] Issuer: CN=Deploy, OU=DEV, O=Oracle, L=Santa Clara, ST=CA, C=US SerialNumber: [ 976af296 a1bbcfaf] Certificate Extensions: 3 [1]: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: 1A CC 30 E0 B0 23 2A 68 19 60 42 30 C2 68 C8 1C ..0..#*h.`B0.h.. 0010: 06 FD 39 E5 ..9. ] ] [2]: ObjectId: 2.5.29.19 Criticality=false BasicConstraints:[ CA:true PathLen:2147483647 ] [3]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 1A CC 30 E0 B0 23 2A 68 19 60 42 30 C2 68 C8 1C ..0..#*h.`B0.h.. 0010: 06 FD 39 E5 ..9. ] ] ] Algorithm: [SHA256withRSA] Signature: 0000: 0B CA DE CF F4 24 AA 8A 11 2B B7 35 DB F2 ED F7 .....$...+.5.... 0010: F8 77 7C CB 35 D3 1B 42 26 4D 70 34 24 A9 01 25 .w..5..B&Mp4$..% 0020: D1 FF E2 AA A9 CF A1 F0 D8 95 17 50 AB 4F 0D 79 ...........P.O.y 0030: 7C E9 BA 9A 27 26 C8 C4 60 D1 7F BA 3A 7E D5 5B ....'&..`...:..[ 0040: AE 19 4A CC AC 8D 5B B8 62 8C 43 71 CC A3 2D EA ..J...[.b.Cq..-. 0050: 76 13 F4 09 12 B1 31 CA 05 A4 77 C6 78 EF 5C 0F v.....1...w.x.\. 0060: 57 B9 62 96 D4 1C 78 1F 1A F9 BE B3 79 5A C7 8E W.b...x.....yZ.. 0070: FE B6 2B 7F FC 03 6C 0D 2B 23 C6 DF 09 B3 F9 1D ..+...l.+#...... 0080: B2 49 A8 78 C9 E3 3F 0A 0C 43 B3 22 4C 79 FC 68 .I.x..?..C."Ly.h 0090: E9 74 14 CC 51 39 89 91 AC 9B 62 7C 67 D2 8B DA .t..Q9....b.g... 00A0: 22 4E DB 3A BD B1 3A 55 1E C4 9E 6A D4 45 8C FD "N.:..:U...j.E.. 00B0: 9A 3C 1E F5 2F AF 8E B9 88 E0 67 A3 FA 71 80 C5 .<../.....g..q.. 00C0: A3 59 84 36 28 29 FF 79 88 09 7B 99 D9 65 76 A2 .Y.6().y.....ev. 00D0: 86 F1 E0 24 E7 11 12 58 12 B8 00 A5 61 7D 20 C4 ...$...X....a. . 00E0: C6 AF 47 2B 5B 3D 37 9D FD 37 51 F1 0E 2A 1C E8 ..G+[=7..7Q..*.. 00F0: F8 B5 AA 2D 07 F9 D2 94 0C 5C E5 46 7C 2C 01 69 ...-.....\.F.,.i 0100: 2A 9B B4 22 E5 FA B4 38 26 14 F2 C1 18 E6 30 86 *.."...8&.....0. 0110: 98 14 4B 9C BF CF C1 BB 49 CC 51 94 99 48 6A AF ..K.....I.Q..Hj. 0120: EF 91 6D 29 64 4E 96 E5 E1 6C 2A D1 30 8A 5C 4C ..m)dN...l*.0.\L 0130: B0 1D 14 8D 39 43 E5 53 8E 22 31 24 20 91 19 F7 ....9C.S."1$ ... 0140: 3F BD 95 31 11 38 11 0B 77 1C AD 9E A9 9E D3 B3 ?..1.8..w....... 0150: E4 14 DD 01 D9 DA 04 ED 3A 47 07 9C AE BF FA E9 ........:G...... 0160: 69 72 27 8C 36 21 98 B6 FC 23 2A 6A F0 59 77 08 ir'.6!...#*j.Yw. 0170: BF D0 9F AE 5E 0B B7 F4 65 74 8C 47 C5 E6 EF 7C ....^...et.G.... 0180: 11 2C 11 86 83 93 2D A6 61 10 85 EB 99 80 4A A5 .,....-.a.....J. 0190: D2 94 C9 5D FA 96 59 19 FD 0D 5A 8A F3 24 37 D7 ...]..Y...Z..$7. 01A0: A1 7E 51 60 3A 8E 2C 13 1D 27 73 C7 85 EC 8B 99 ..Q`:.,..'s..... 01B0: BB 23 21 2A 97 62 BE 3D 7F BE A6 51 E3 0F CA A1 .#!*.b.=...Q.... 01C0: 43 7A 1C A7 89 A2 50 D2 08 0C 86 DE E6 D8 03 77 Cz....P........w 01D0: 79 1C 34 3F 19 66 DA 20 1C 23 01 28 12 9B A8 8C y.4?.f. .#.(.... 01E0: 82 FD 29 76 D3 04 C9 71 9C F4 F8 1C 33 12 0C 1B ..)v...q....3... 01F0: 02 1E 4D FB 18 83 C5 A3 38 C6 99 DC 0B 88 D2 88 ..M.....8....... ] *** *** ClientKeyExchange, RSA PreMasterSecret, TLSv1 Java Web Start Main Thread, WRITE: TLSv1 Handshake, length = 2928 SESSION KEYGEN: PreMaster Secret: 0000: 03 01 E0 70 9A 55 9F 4F 1A 4C DA 0B 0F A8 B0 E4 ...p.U.O.L...... 0010: BD A4 53 C6 FE E9 42 C4 A3 71 8E 48 2D 74 F5 7A ..S...B..q.H-t.z 0020: 28 1F B2 A1 B6 62 9F EB D5 15 E1 D7 85 31 5C 30 (....b.......1\0 CONNECTION KEYGEN: Client Nonce: 0000: 55 78 9F 72 FA CC F9 9C 9B 4D EA BF 32 3C 6A 43 Ux.r.....M..2.j....*j.9[. Server write IV: 0000: C8 99 56 1D CE 37 95 45 73 BC CA 7B 81 67 AD 4D ..V..7.Es....g.M *** CertificateVerify Java Web Start Main Thread, WRITE: TLSv1 Handshake, length = 288 Java Web Start Main Thread, WRITE: TLSv1 Change Cipher Spec, length = 32 *** Finished verify_data: { 126, 26, 4, 121, 99, 250, 212, 41, 201, 112, 173, 213 } *** Java Web Start Main Thread, WRITE: TLSv1 Handshake, length = 48 Java Web Start Main Thread, handling exception: java.net.SocketException: Connection reset %% Invalidated: [Session-7, TLS_RSA_WITH_AES_128_CBC_SHA] %% Invalidated: [Session-8, TLS_RSA_WITH_AES_128_CBC_SHA] Java Web Start Main Thread, SEND TLSv1 ALERT: fatal, description = unexpected_message Java Web Start Main Thread, WRITE: TLSv1 Alert, length = 32 Java Web Start Main Thread, Exception sending alert: java.net.SocketException: Connection reset by peer: socket write error Java Web Start Main Thread, called closeSocket() Java Web Start Main Thread, called close() Java Web Start Main Thread, called closeInternal(true) Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384 Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 Allow unsafe renegotiation: false Allow legacy hello messages: true Is initial handshake: true Is secure renegotiation: false Java Web Start Main Thread, setSoTimeout(0) called Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 for TLSv1.1 %% No cached client session *** ClientHello, TLSv1.2 RandomCookie: GMT: 1433902965 bytes = { 25, 119, 14, 197, 22, 24, 255, 35, 105, 141, 100, 129, 177, 172, 53, 134, 233, 216, 166, 123, 250, 220, 59, 32, 254, 8, 83, 39 } Session ID: {} Cipher Suites: [TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256, TLS_RSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_DSS_WITH_AES_128_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_DSS_WITH_AES_128_GCM_SHA256, TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA, TLS_EMPTY_RENEGOTIATION_INFO_SCSV] Compression Methods: { 0 } Extension elliptic_curves, curve names: {secp256r1, sect163k1, sect163r2, secp192r1, secp224r1, sect233k1, sect233r1, sect283k1, sect283r1, secp384r1, sect409k1, sect409r1, secp521r1, sect571k1, sect571r1, secp160k1, secp160r1, secp160r2, sect163r1, secp192k1, sect193r1, sect193r2, secp224k1, sect239k1, secp256k1} Extension ec_point_formats, formats: [uncompressed] Extension signature_algorithms, signature_algorithms: SHA512withECDSA, SHA512withRSA, SHA384withECDSA, SHA384withRSA, SHA256withECDSA, SHA256withRSA, SHA224withECDSA, SHA224withRSA, SHA1withECDSA, SHA1withRSA, SHA1withDSA, MD5withRSA *** Java Web Start Main Thread, WRITE: TLSv1.2 Handshake, length = 195 Java Web Start Main Thread, READ: TLSv1 Handshake, length = 1465 *** ServerHello, TLSv1 RandomCookie: GMT: 1433902965 bytes = { 108, 77, 232, 28, 25, 153, 196, 21, 18, 127, 159, 238, 55, 237, 198, 104, 182, 155, 38, 210, 114, 134, 217, 206, 34, 79, 221, 197 } Session ID: {204, 61, 0, 0, 251, 26, 174, 25, 135, 232, 47, 80, 163, 25, 241, 227, 56, 40, 118, 21, 35, 28, 50, 130, 28, 230, 44, 12, 3, 250, 32, 26} Cipher Suite: TLS_RSA_WITH_AES_128_CBC_SHA Compression Method: 0 Extension renegotiation_info, renegotiated_connection: *** %% Initialized: [Session-9, TLS_RSA_WITH_AES_128_CBC_SHA] ** TLS_RSA_WITH_AES_128_CBC_SHA *** Certificate chain chain [0] = [ [ Version: V3 Subject: CN=dan, OU=Test, O=Oracle, ST=CA, C=US Signature Algorithm: SHA256withRSA, OID = 1.2.840.113549.1.1.11 Key: Sun RSA public key, 2048 bits modulus: 27993800329023506915188619937271073675146531754788656107091985839151221862956338660826083129307150299177076284927991039444425558608748586185501453381350031509010983827567837732358657008599408295712364829220775090997081135518958109857589576926141558932552245139006180802682152879425941672165491708704274822508509790090280409136905763815540974504871865424441967155500742973933231552413698265953703372042016370786259247265523915810183271065561834150991240902083054508495535295536147129309792303053577725565695417921470016939423833336117790167245101378899510456944492050424721996316349253989237480157324834028741000498233 public exponent: 65537 Validity: [From: Tue Jun 09 16:13:29 PDT 2015, To: Sat Jun 18 16:13:29 PDT 2016] Issuer: CN=Deploy, OU=DEV, O=Oracle, L=Santa Clara, ST=CA, C=US SerialNumber: [ 1000] Certificate Extensions: 7 [1]: ObjectId: 2.16.840.1.113730.1.13 Criticality=false Extension unknown: DER encoded OCTET string = 0000: 04 26 16 24 4F 70 65 6E 53 53 4C 20 47 65 6E 65 .&.$OpenSSL Gene 0010: 72 61 74 65 64 20 53 65 72 76 65 72 20 43 65 72 rated Server Cer 0020: 74 69 66 69 63 61 74 65 tificate [2]: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: 1A CC 30 E0 B0 23 2A 68 19 60 42 30 C2 68 C8 1C ..0..#*h.`B0.h.. 0010: 06 FD 39 E5 ..9. ] [CN=Deploy, OU=DEV, O=Oracle, L=Santa Clara, ST=CA, C=US] SerialNumber: [ 976af296 a1bbcfaf] ] [3]: ObjectId: 2.5.29.19 Criticality=false BasicConstraints:[ CA:false PathLen: undefined ] [4]: ObjectId: 2.5.29.37 Criticality=false ExtendedKeyUsages [ serverAuth ] [5]: ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_Encipherment ] [6]: ObjectId: 2.16.840.1.113730.1.1 Criticality=false NetscapeCertType [ SSL server ] [7]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 03 60 18 99 86 2F C3 6E 7B 46 FB F3 FE 55 C5 8F .`.../.n.F...U.. 0010: 4D 4A 28 B9 MJ(. ] ] ] Algorithm: [SHA256withRSA] Signature: 0000: 32 FA 27 95 DB 98 65 FC CD 86 03 57 C9 3A 91 6A 2.'...e....W.:.j 0010: 25 A7 8C 5A 5B ED 8A 7E 3F 1F F6 85 B0 A4 B4 51 %..Z[...?......Q 0020: 85 68 90 BB 1F F8 3E 3E DA 69 08 6F B0 D0 57 C4 .h....>>.i.o..W. 0030: 35 0C 57 0C AF 31 5F 63 AC AB 56 E8 45 D5 3A A1 5.W..1_c..V.E.:. 0040: CF 6E B5 06 EB 5E A1 63 7E 70 A1 8B 2B 50 E3 30 .n...^.c.p..+P.0 0050: 8E 3F FF C7 DB 0C 26 EC 44 0A 6B 4F 86 CE E1 3A .?....&.D.kO...: 0060: CB 8E E9 FE B0 06 0A CC F7 00 E6 81 AB E8 78 9C ..............x. 0070: 68 3D 2B 2D BC AE 64 41 15 29 77 6A 19 BC 25 A6 h=+-..dA.)wj..%. 0080: EC B3 EB F4 4F 48 64 68 7B 0E B5 86 2E 09 6F 16 ....OHdh......o. 0090: FE 7E 24 6D 4E F0 AD 7F 21 17 72 88 AB 10 40 45 ..$mN...!.r...@E 00A0: 90 9C E6 D9 D9 10 AA 36 65 F9 16 3C 66 FF CD 30 .......6e..L...F@..+. 00F0: 90 FC 98 17 9F 78 6F 45 01 4E 5A B5 C0 34 A9 E9 .....xoE.NZ..4.. 0100: E1 43 B6 D2 2D BD 2E 85 44 9D A9 0D 2F 9B 66 ED .C..-...D.../.f. 0110: A2 31 FD 6D A5 E5 37 3D 3B 9C 23 20 F4 67 CA DC .1.m..7=;.# .g.. 0120: 37 08 47 D2 71 5B 27 93 B1 2F D0 44 9F 41 72 95 7.G.q['../.D.Ar. 0130: BB 9E 1D 81 7E DE C1 A9 96 1F 03 34 FB AD 7C 75 ...........4...u 0140: 6A 01 4C CA C0 34 6E 86 C9 8C D8 99 07 F7 FF D4 j.L..4n......... 0150: 77 6F F1 88 D6 0D 93 16 E8 3A 75 6A 08 6D 1B A2 wo.......:uj.m.. 0160: 51 F8 A5 6E 8A 1D 66 68 0B C2 36 2B FE 26 6E 5D Q..n..fh..6+.&n] 0170: DD 6B 2C 47 60 AD 83 C9 51 30 63 CC 00 1F F5 F2 .k,G`...Q0c..... 0180: FB 66 1E 52 16 E9 3F EC E7 43 5C F1 25 C0 BE 57 .f.R..?..C\.%..W 0190: 36 3F AC C2 F2 7D 7D 8C 9E 54 10 DE 27 6D 22 CE 6?.......T..'m". 01A0: A0 35 A8 1A D9 90 BA 5C 39 21 7A 3B 83 9D F6 62 .5.....\9!z;...b 01B0: D1 ED CD BD AA F7 75 CB F0 C4 6F B0 39 8B A3 D2 ......u...o.9... 01C0: 02 B9 2F AC 79 97 85 8F 78 A2 91 29 F1 CB 10 1B ../.y...x..).... 01D0: DC D9 10 D0 F9 A7 31 92 4B F0 45 93 1A 61 08 FE ......1.K.E..a.. 01E0: 55 E3 6D C5 4F 92 CF DB 3B 4B EE 2A 5E BB 7B CA U.m.O...;K.*^... 01F0: 13 0D A4 63 4F 29 9B 63 5C 71 FD 8D B6 28 52 3A ...cO).c\q...(R: ] *** *** ServerHelloDone *** ClientKeyExchange, RSA PreMasterSecret, TLSv1 Java Web Start Main Thread, WRITE: TLSv1 Handshake, length = 262 SESSION KEYGEN: PreMaster Secret: 0000: 03 03 98 11 BB B5 61 03 19 CB 71 C6 B5 B1 C2 EB ......a...q..... 0010: B9 1C F3 E0 90 E8 85 56 75 62 B9 03 03 0D CF 2F .......Vub...../ 0020: 3E 89 E5 C9 9E 20 1A E8 E7 E2 00 F3 36 F8 B3 9B >.... ......6... CONNECTION KEYGEN: Client Nonce: 0000: 55 78 9F 75 19 77 0E C5 16 18 FF 23 69 8D 64 81 Ux.u.w.....#i.d. 0010: B1 AC 35 86 E9 D8 A6 7B FA DC 3B 20 FE 08 53 27 ..5.......; ..S' Server Nonce: 0000: 55 78 9F 75 6C 4D E8 1C 19 99 C4 15 12 7F 9F EE Ux.ulM.......... 0010: 37 ED C6 68 B6 9B 26 D2 72 86 D9 CE 22 4F DD C5 7..h..&.r..."O.. Master Secret: 0000: AE 68 B1 D0 53 A3 87 AE DE 02 4C 56 9E 66 4D BC .h..S.....LV.fM. 0010: A9 0C DF 64 AD 9B 90 B4 2A 2C 9D AD 4C A2 83 A4 ...d....*,..L... 0020: 1B 55 D1 7A 68 37 85 0E 50 6A 1C 49 DD EA 98 B3 .U.zh7..Pj.I.... Client MAC write Secret: 0000: 82 B7 67 40 37 28 99 79 E1 BB 82 CC E3 01 8B B2 ..g@7(.y........ 0010: C8 8A 2F 3D ../= Server MAC write Secret: 0000: DF 83 07 28 C0 C8 A3 6A E1 E5 CE 6E C9 34 61 A3 ...(...j...n.4a. 0010: 6E 42 43 2A nBC* Client write key: 0000: 68 C5 CF DF 45 7B 1D 42 42 C0 32 93 D2 81 90 44 h...E..BB.2....D Server write key: 0000: 65 D2 C0 7A 44 4B CD B8 D1 EC AC 86 2F 23 72 47 e..zDK....../#rG Client write IV: 0000: F9 6E DE 80 0E 61 F9 82 1A 52 FB DD 52 6E 99 3A .n...a...R..Rn.: Server write IV: 0000: 4F E6 EC 80 45 66 D5 F5 EB BE 6F D4 E6 5C 3E D3 O...Ef....o..\>. Java Web Start Main Thread, WRITE: TLSv1 Change Cipher Spec, length = 1 *** Finished verify_data: { 244, 90, 217, 45, 108, 17, 3, 13, 73, 109, 223, 109 } *** Java Web Start Main Thread, WRITE: TLSv1 Handshake, length = 48 Java Web Start Main Thread, READ: TLSv1 Change Cipher Spec, length = 1 Java Web Start Main Thread, READ: TLSv1 Handshake, length = 48 *** Finished verify_data: { 88, 99, 72, 109, 92, 142, 150, 86, 97, 237, 29, 220 } *** %% Cached client session: [Session-9, TLS_RSA_WITH_AES_128_CBC_SHA] Java Web Start Main Thread, WRITE: TLSv1 Application Data, length = 336 Java Web Start Main Thread, READ: TLSv1 Handshake, length = 32 Allow unsafe renegotiation: false Allow legacy hello messages: true Is initial handshake: false Is secure renegotiation: true Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 for TLSv1.1 *** HelloRequest (empty) %% Client cached [Session-9, TLS_RSA_WITH_AES_128_CBC_SHA] %% Try resuming [Session-9, TLS_RSA_WITH_AES_128_CBC_SHA] from port 59436 *** ClientHello, TLSv1 RandomCookie: GMT: 1433902965 bytes = { 29, 171, 106, 237, 220, 182, 110, 140, 92, 55, 153, 213, 56, 116, 47, 221, 10, 114, 230, 152, 210, 47, 113, 30, 197, 155, 99, 231 } Session ID: {204, 61, 0, 0, 251, 26, 174, 25, 135, 232, 47, 80, 163, 25, 241, 227, 56, 40, 118, 21, 35, 28, 50, 130, 28, 230, 44, 12, 3, 250, 32, 26} Cipher Suites: [TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256, TLS_RSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_DSS_WITH_AES_128_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_DSS_WITH_AES_128_GCM_SHA256, TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA] Compression Methods: { 0 } Extension elliptic_curves, curve names: {secp256r1, sect163k1, sect163r2, secp192r1, secp224r1, sect233k1, sect233r1, sect283k1, sect283r1, secp384r1, sect409k1, sect409r1, secp521r1, sect571k1, sect571r1, secp160k1, secp160r1, secp160r2, sect163r1, secp192k1, sect193r1, sect193r2, secp224k1, sect239k1, secp256k1} Extension ec_point_formats, formats: [uncompressed] Extension renegotiation_info, renegotiated_connection: f4:5a:d9:2d:6c:11:03:0d:49:6d:df:6d *** Java Web Start Main Thread, WRITE: TLSv1 Handshake, length = 240 Java Web Start Main Thread, READ: TLSv1 Handshake, length = 3152 *** ServerHello, TLSv1 RandomCookie: GMT: 1433902965 bytes = { 39, 159, 192, 236, 123, 179, 184, 221, 141, 39, 255, 251, 160, 250, 153, 56, 167, 140, 241, 150, 104, 169, 208, 136, 18, 229, 207, 140 } Session ID: {152, 36, 0, 0, 224, 78, 127, 140, 83, 166, 243, 161, 55, 46, 186, 80, 231, 161, 129, 250, 101, 216, 190, 149, 125, 231, 85, 36, 66, 220, 129, 210} Cipher Suite: TLS_RSA_WITH_AES_128_CBC_SHA Compression Method: 0 Extension renegotiation_info, renegotiated_connection: f4:5a:d9:2d:6c:11:03:0d:49:6d:df:6d:58:63:48:6d:5c:8e:96:56:61:ed:1d:dc *** %% Initialized: [Session-10, TLS_RSA_WITH_AES_128_CBC_SHA] ** TLS_RSA_WITH_AES_128_CBC_SHA *** Certificate chain chain [0] = [ [ Version: V3 Subject: CN=dan, OU=Test, O=Oracle, ST=CA, C=US Signature Algorithm: SHA256withRSA, OID = 1.2.840.113549.1.1.11 Key: Sun RSA public key, 2048 bits modulus: 27993800329023506915188619937271073675146531754788656107091985839151221862956338660826083129307150299177076284927991039444425558608748586185501453381350031509010983827567837732358657008599408295712364829220775090997081135518958109857589576926141558932552245139006180802682152879425941672165491708704274822508509790090280409136905763815540974504871865424441967155500742973933231552413698265953703372042016370786259247265523915810183271065561834150991240902083054508495535295536147129309792303053577725565695417921470016939423833336117790167245101378899510456944492050424721996316349253989237480157324834028741000498233 public exponent: 65537 Validity: [From: Tue Jun 09 16:13:29 PDT 2015, To: Sat Jun 18 16:13:29 PDT 2016] Issuer: CN=Deploy, OU=DEV, O=Oracle, L=Santa Clara, ST=CA, C=US SerialNumber: [ 1000] Certificate Extensions: 7 [1]: ObjectId: 2.16.840.1.113730.1.13 Criticality=false Extension unknown: DER encoded OCTET string = 0000: 04 26 16 24 4F 70 65 6E 53 53 4C 20 47 65 6E 65 .&.$OpenSSL Gene 0010: 72 61 74 65 64 20 53 65 72 76 65 72 20 43 65 72 rated Server Cer 0020: 74 69 66 69 63 61 74 65 tificate [2]: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: 1A CC 30 E0 B0 23 2A 68 19 60 42 30 C2 68 C8 1C ..0..#*h.`B0.h.. 0010: 06 FD 39 E5 ..9. ] [CN=Deploy, OU=DEV, O=Oracle, L=Santa Clara, ST=CA, C=US] SerialNumber: [ 976af296 a1bbcfaf] ] [3]: ObjectId: 2.5.29.19 Criticality=false BasicConstraints:[ CA:false PathLen: undefined ] [4]: ObjectId: 2.5.29.37 Criticality=false ExtendedKeyUsages [ serverAuth ] [5]: ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_Encipherment ] [6]: ObjectId: 2.16.840.1.113730.1.1 Criticality=false NetscapeCertType [ SSL server ] [7]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 03 60 18 99 86 2F C3 6E 7B 46 FB F3 FE 55 C5 8F .`.../.n.F...U.. 0010: 4D 4A 28 B9 MJ(. ] ] ] Algorithm: [SHA256withRSA] Signature: 0000: 32 FA 27 95 DB 98 65 FC CD 86 03 57 C9 3A 91 6A 2.'...e....W.:.j 0010: 25 A7 8C 5A 5B ED 8A 7E 3F 1F F6 85 B0 A4 B4 51 %..Z[...?......Q 0020: 85 68 90 BB 1F F8 3E 3E DA 69 08 6F B0 D0 57 C4 .h....>>.i.o..W. 0030: 35 0C 57 0C AF 31 5F 63 AC AB 56 E8 45 D5 3A A1 5.W..1_c..V.E.:. 0040: CF 6E B5 06 EB 5E A1 63 7E 70 A1 8B 2B 50 E3 30 .n...^.c.p..+P.0 0050: 8E 3F FF C7 DB 0C 26 EC 44 0A 6B 4F 86 CE E1 3A .?....&.D.kO...: 0060: CB 8E E9 FE B0 06 0A CC F7 00 E6 81 AB E8 78 9C ..............x. 0070: 68 3D 2B 2D BC AE 64 41 15 29 77 6A 19 BC 25 A6 h=+-..dA.)wj..%. 0080: EC B3 EB F4 4F 48 64 68 7B 0E B5 86 2E 09 6F 16 ....OHdh......o. 0090: FE 7E 24 6D 4E F0 AD 7F 21 17 72 88 AB 10 40 45 ..$mN...!.r...@E 00A0: 90 9C E6 D9 D9 10 AA 36 65 F9 16 3C 66 FF CD 30 .......6e..L...F@..+. 00F0: 90 FC 98 17 9F 78 6F 45 01 4E 5A B5 C0 34 A9 E9 .....xoE.NZ..4.. 0100: E1 43 B6 D2 2D BD 2E 85 44 9D A9 0D 2F 9B 66 ED .C..-...D.../.f. 0110: A2 31 FD 6D A5 E5 37 3D 3B 9C 23 20 F4 67 CA DC .1.m..7=;.# .g.. 0120: 37 08 47 D2 71 5B 27 93 B1 2F D0 44 9F 41 72 95 7.G.q['../.D.Ar. 0130: BB 9E 1D 81 7E DE C1 A9 96 1F 03 34 FB AD 7C 75 ...........4...u 0140: 6A 01 4C CA C0 34 6E 86 C9 8C D8 99 07 F7 FF D4 j.L..4n......... 0150: 77 6F F1 88 D6 0D 93 16 E8 3A 75 6A 08 6D 1B A2 wo.......:uj.m.. 0160: 51 F8 A5 6E 8A 1D 66 68 0B C2 36 2B FE 26 6E 5D Q..n..fh..6+.&n] 0170: DD 6B 2C 47 60 AD 83 C9 51 30 63 CC 00 1F F5 F2 .k,G`...Q0c..... 0180: FB 66 1E 52 16 E9 3F EC E7 43 5C F1 25 C0 BE 57 .f.R..?..C\.%..W 0190: 36 3F AC C2 F2 7D 7D 8C 9E 54 10 DE 27 6D 22 CE 6?.......T..'m". 01A0: A0 35 A8 1A D9 90 BA 5C 39 21 7A 3B 83 9D F6 62 .5.....\9!z;...b 01B0: D1 ED CD BD AA F7 75 CB F0 C4 6F B0 39 8B A3 D2 ......u...o.9... 01C0: 02 B9 2F AC 79 97 85 8F 78 A2 91 29 F1 CB 10 1B ../.y...x..).... 01D0: DC D9 10 D0 F9 A7 31 92 4B F0 45 93 1A 61 08 FE ......1.K.E..a.. 01E0: 55 E3 6D C5 4F 92 CF DB 3B 4B EE 2A 5E BB 7B CA U.m.O...;K.*^... 01F0: 13 0D A4 63 4F 29 9B 63 5C 71 FD 8D B6 28 52 3A ...cO).c\q...(R: ] *** *** CertificateRequest Cert Types: RSA, DSS, ECDSA Cert Authorities: *** ServerHelloDone ssl: KeyMgr: getting aliases: [Client Dan (verified: OK), test testl (verified: OK)] ssl: Ignoring alias Client Dan: key algorithm does not match ssl: Ignoring alias test testl: key algorithm does not match ssl: KeyMgr: no matching alias found ssl: Ignoring alias Client Dan: key algorithm does not match ssl: Ignoring alias test testl: key algorithm does not match ssl: KeyMgr: no matching alias found *** Certificate chain chain [0] = [ [ Version: V3 Subject: CN=test testl, O=swift, C=ww Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5 Key: Sun RSA public key, 2048 bits modulus: 21868768541075605405865440306479178906821655345922548188172410088892015545098800408364486401080553186811324788030836055172689133601217549406737345183971851229983105722616212595535898868275061464134686290878259136019639341523873006951915161176570010606585591052735274046309401032484328118557993065541521446262344450903874324035420364132649758752242555421947054012734922264803773401914638700828729583111490140910116573248467661478290273763396272055613872800515191756597948075509029010411510063045631408982594596870282476934482016340649491776629331426724309948946005518554085613732290827843905676822342605497337095016531 public exponent: 65537 Validity: [From: Fri Nov 14 08:09:29 PST 2014, To: Sat Nov 14 08:39:29 PST 2015] Issuer: O=swift SerialNumber: [ 52c63b9e] Certificate Extensions: 10 [1]: ObjectId: 1.2.840.113533.7.65.0 Criticality=false Extension unknown: DER encoded OCTET string = 0000: 04 0C 30 0A 1B 04 56 38 2E 31 03 02 03 A8 ..0...V8.1.... [2]: ObjectId: 2.16.840.1.113730.1.2 Criticality=false Extension unknown: DER encoded OCTET string = 0000: 04 1C 16 1A 68 74 74 70 73 3A 2F 2F 53 49 54 45 ....https://SITE 0010: 5F 4E 41 4D 45 2F 63 64 61 2D 63 67 69 2F _NAME/cda-cgi/ [3]: ObjectId: 2.16.840.1.113730.1.3 Criticality=false Extension unknown: DER encoded OCTET string = 0000: 04 3D 16 3B 63 6C 69 65 6E 74 63 67 69 2E 65 78 .=.;clientcgi.ex 0010: 65 3F 61 63 74 69 6F 6E 3D 63 68 65 63 6B 52 65 e?action=checkRe 0020: 76 6F 63 61 74 69 6F 6E 26 26 43 52 4C 3D 63 6E vocation&&CRL=cn 0030: 3D 43 52 4C 31 34 33 26 73 65 72 69 61 6C 3D =CRL143&serial= [4]: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: BB FD 9F AD 0D F0 82 0B 97 3F BC 57 E3 76 B9 AE .........?.W.v.. 0010: 93 F1 80 37 ...7 ] ] [5]: ObjectId: 2.5.29.19 Criticality=false BasicConstraints:[ CA:false PathLen: undefined ] [6]: ObjectId: 2.5.29.31 Criticality=false CRLDistributionPoints [ [DistributionPoint: [CN=CRL143, O=swift] ]] [7]: ObjectId: 2.5.29.15 Criticality=false KeyUsage [ DigitalSignature Key_Encipherment ] [8]: ObjectId: 2.16.840.1.113730.1.1 Criticality=false NetscapeCertType [ SSL client S/MIME ] [9]: ObjectId: 2.5.29.16 Criticality=false PrivateKeyUsage: [ From: Fri Nov 14 08:09:29 PST 2014, To: Mon Jul 27 21:39:29 PDT 2015] [10]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 9A 71 C3 4E D9 96 17 4A 75 40 5C 42 12 8B B4 75 .q.N...Ju@\B...u 0010: DE 11 CE 55 ...U ] ] ] Algorithm: [SHA1withRSA] Signature: 0000: 04 CD B5 40 BB 43 26 1A D7 95 61 3B 68 B5 73 C5 ...@.C&...a;h.s. 0010: 10 D3 11 51 01 E5 78 68 7E 99 01 7A 16 49 CA D4 ...Q..xh...z.I.. 0020: B8 32 BC CE 9E 36 4A 8C AB 69 1C C6 99 16 BC 94 .2...6J..i...... 0030: 49 43 4D 13 33 3E 5F 24 A4 73 D3 F9 CE C9 B3 04 ICM.3>_$.s...... 0040: E4 83 43 28 D3 76 5C 0E 34 2D 69 70 DD 88 4D 80 ..C(.v\.4-ip..M. 0050: 4C 1F 4B 28 08 80 5C 3A 91 02 05 CD 65 91 5E F0 L.K(..\:....e.^. 0060: 1B E1 0E 57 81 96 F3 08 B4 A5 9D D3 35 6B 72 4C ...W........5krL 0070: 95 5C 61 1F 06 28 B0 26 7C 7E 43 B0 85 B4 40 49 .\a..(.&..C...@I 0080: 20 54 89 20 44 B9 CD 77 80 C1 35 01 B5 49 02 67 T. D..w..5..I.g 0090: 1B 88 B7 C5 1B 15 7F E6 EB 17 90 54 F1 30 B3 D0 ...........T.0.. 00A0: 9F FF A6 47 C9 42 96 BC 00 78 05 F6 86 A4 4E CE ...G.B...x....N. 00B0: 5D 65 B6 3F BE 61 D8 8A 27 31 6A BE E1 0A ED A9 ]e.?.a..'1j..... 00C0: E3 69 F7 90 91 3A 55 1C 84 B0 75 7F 64 6C 88 DD .i...:U...u.dl.. 00D0: CF 30 00 65 24 88 2F 4A DA 0C 46 AD 20 C0 02 44 .0.e$./J..F. ..D 00E0: 9B 0F B1 17 A1 76 F1 58 F4 24 61 62 61 16 55 1F .....v.X.$aba.U. 00F0: 31 31 95 F5 1E 1A 3E 4C C8 01 F5 F1 70 E2 26 6B 11....>L....p.&k ] chain [1] = [ [ Version: V3 Subject: O=swift Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5 Key: Sun RSA public key, 2048 bits modulus: 24969475168460113793521526972106723697399303141699907397960388940267950379650898769228749246007086995170692124487318006483410555459243377881386357993588426674122956046601804649484656882213760916095984863712455250079731598797979194677807828286850683497084373569288420699977198804466504755629205718466904592374980964478879193177215429910975162134513974614711370936681253019590216641837745182421570946522915369849018197389353353828262622325840416715742599235113948142991196065438195731616117575168667859464041535859808391415261298959276403894337803431437626410357845753081354566054751159521989197408618271791666994843239 public exponent: 65537 Validity: [From: Mon Aug 14 08:33:00 PDT 2006, To: Fri Aug 14 09:03:00 PDT 2026] Issuer: O=swift SerialNumber: [ 44e09eaa] Certificate Extensions: 8 [1]: ObjectId: 1.2.840.113533.7.65.0 Criticality=false Extension unknown: DER encoded OCTET string = 0000: 04 10 30 0E 1B 08 56 37 2E 31 3A 34 2E 30 03 02 ..0...V7.1:4.0.. 0010: 04 90 .. [2]: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: BB FD 9F AD 0D F0 82 0B 97 3F BC 57 E3 76 B9 AE .........?.W.v.. 0010: 93 F1 80 37 ...7 ] ] [3]: ObjectId: 2.5.29.19 Criticality=false BasicConstraints:[ CA:true PathLen:2147483647 ] [4]: ObjectId: 2.5.29.31 Criticality=false CRLDistributionPoints [ [DistributionPoint: [CN=CRL1, O=swift] ]] [5]: ObjectId: 2.5.29.15 Criticality=false KeyUsage [ Key_CertSign Crl_Sign ] [6]: ObjectId: 2.16.840.1.113730.1.1 Criticality=false NetscapeCertType [ SSL CA S/MIME CA Object Signing CA] [7]: ObjectId: 2.5.29.16 Criticality=false PrivateKeyUsage: [ From: Mon Aug 14 08:33:00 PDT 2006, To: Fri Aug 14 09:03:00 PDT 2026] [8]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: BB FD 9F AD 0D F0 82 0B 97 3F BC 57 E3 76 B9 AE .........?.W.v.. 0010: 93 F1 80 37 ...7 ] ] ] Algorithm: [SHA1withRSA] Signature: 0000: 7C C5 90 CE 44 67 10 63 1C CA 32 7F F0 C7 AC D5 ....Dg.c..2..... 0010: 02 74 79 D1 01 38 94 00 D7 7E 1D 70 0D 39 CD 1B .ty..8.....p.9.. 0020: 0D 61 3D 8A 01 17 30 2D EB E1 55 9D 46 2D 33 9E .a=...0-..U.F-3. 0030: 83 39 15 8E 7A AA 9F A8 35 AF 84 0E 36 E1 04 F0 .9..z...5...6... 0040: 5A E9 D5 BF 97 C6 58 EA 82 07 E5 56 CD 87 85 66 Z.....X....V...f 0050: 1B 10 66 10 92 C0 44 C8 27 D9 EA C4 49 52 85 2F ..f...D.'...IR./ 0060: E8 B6 EB 85 24 13 BB 15 DC 8A 14 82 2B 3B C2 14 ....$.......+;.. 0070: 1A 73 02 31 86 66 95 5D 59 95 12 1D F3 C8 FB 11 .s.1.f.]Y....... 0080: 5E A2 D6 AC AA B6 6D 89 AD FB DE BA AD 4A D6 DA ^.....m......J.. 0090: C3 A9 8B 83 F3 D2 B8 03 23 38 B1 54 A2 3E F9 77 ........#8.T.>.w 00A0: 0E 63 72 FD F2 3D DE 23 33 67 67 FA 65 54 63 66 .cr..=.#3gg.eTcf 00B0: 6C 20 2A CD 29 61 23 CE 61 D4 AA D7 43 60 55 00 l *.)a#.a...C`U. 00C0: 75 53 8E F1 FD 1D A3 43 91 5B 1A 6B 08 53 69 A7 uS.....C.[.k.Si. 00D0: 53 AD 25 C8 DB B2 2A 0F E7 31 A5 A2 17 5F 18 C7 S.%...*..1..._.. 00E0: CE 7F F8 66 28 D6 60 89 2D BB 01 21 2F 9B 4A D2 ...f(.`.-..!/.J. 00F0: C7 8A 21 C0 B4 CF 22 67 C2 84 CD 69 6D 3B AF 67 ..!..."g...im;.g ] *** *** ClientKeyExchange, RSA PreMasterSecret, TLSv1 Java Web Start Main Thread, WRITE: TLSv1 Handshake, length = 2288 SESSION KEYGEN: PreMaster Secret: 0000: 03 01 CB 5B 2D BA 62 C3 98 4C 13 AD E7 33 B2 47 ...[-.b..L...3.G 0010: F5 42 52 CE 7C 06 B3 2B 6E 0F 9A C7 CF F9 88 AB .BR....+n....... 0020: 99 8F A1 F3 AE C7 04 64 2F D5 85 A7 FF 10 04 28 .......d/......( CONNECTION KEYGEN: Client Nonce: 0000: 55 78 9F 75 1D AB 6A ED DC B6 6E 8C 5C 37 99 D5 Ux.u..j...n.\7.. 0010: 38 74 2F DD 0A 72 E6 98 D2 2F 71 1E C5 9B 63 E7 8t/..r.../q...c. Server Nonce: 0000: 55 78 9F 75 27 9F C0 EC 7B B3 B8 DD 8D 27 FF FB Ux.u'........'.. 0010: A0 FA 99 38 A7 8C F1 96 68 A9 D0 88 12 E5 CF 8C ...8....h....... Master Secret: 0000: 5A FA CF 46 A1 60 FB 26 9D DC 66 77 9E 6C 77 4A Z..F.`.&..fw.lwJ 0010: D5 B5 6F E8 7A 92 D9 B1 FD A4 C6 AB 43 6D 5B B9 ..o.z.......Cm[. 0020: 56 65 14 7F D0 E8 9D BA 43 F6 2B C2 3B CD BB 75 Ve......C.+.;..u Client MAC write Secret: 0000: 3F CA 89 2C 39 88 DD 36 95 E0 94 16 E9 25 CE 58 ?..,9..6.....%.X 0010: E7 36 2F E8 .6/. Server MAC write Secret: 0000: 31 56 FE 26 C6 49 8D 1D 5F BD 2D 65 95 72 98 07 1V.&.I.._.-e.r.. 0010: 0C 28 8C 79 .(.y Client write key: 0000: 29 19 BE 3B 0B 9D AD 3E 12 2E 13 BC A6 A4 3C FE )..;...>......<. Server write key: 0000: DC 91 E6 4E 71 FC 01 7A 49 65 62 56 BC 6D 1F B0 ...Nq..zIebV.m.. Client write IV: 0000: 33 07 55 27 61 89 75 60 A6 9F 96 31 70 D0 60 9E 3.U'a.u`...1p.`. Server write IV: 0000: 31 09 7C F0 0F FA D6 79 39 53 8C 98 23 D2 58 89 1......y9S..#.X. *** CertificateVerify Java Web Start Main Thread, WRITE: TLSv1 Handshake, length = 288 Java Web Start Main Thread, WRITE: TLSv1 Change Cipher Spec, length = 32 *** Finished verify_data: { 41, 37, 119, 33, 236, 101, 197, 202, 50, 179, 9, 250 } *** Java Web Start Main Thread, WRITE: TLSv1 Handshake, length = 48 Java Web Start Main Thread, handling exception: java.net.SocketException: Connection reset %% Invalidated: [Session-9, TLS_RSA_WITH_AES_128_CBC_SHA] %% Invalidated: [Session-10, TLS_RSA_WITH_AES_128_CBC_SHA] Java Web Start Main Thread, SEND TLSv1 ALERT: fatal, description = unexpected_message Java Web Start Main Thread, WRITE: TLSv1 Alert, length = 32 Java Web Start Main Thread, Exception sending alert: java.net.SocketException: Connection reset by peer: socket write error Java Web Start Main Thread, called closeSocket() Java Web Start Main Thread, called close() Java Web Start Main Thread, called closeInternal(true) #### Java Web Start Error: #### Could not load file/URL specified: https://dan/QuickTest/testapplet.jnlp