System property jdk.tls.client.cipherSuites is set to 'null' System property jdk.tls.server.cipherSuites is set to 'null' Ignoring disabled cipher suite: SSL_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA Ignoring disabled cipher suite: SSL_DH_anon_EXPORT_WITH_RC4_40_MD5 Ignoring disabled cipher suite: TLS_KRB5_EXPORT_WITH_DES_CBC_40_MD5 Ignoring disabled cipher suite: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA Ignoring disabled cipher suite: SSL_DH_anon_WITH_RC4_128_MD5 Ignoring disabled cipher suite: SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA Ignoring disabled cipher suite: TLS_ECDH_anon_WITH_RC4_128_SHA Ignoring disabled cipher suite: TLS_KRB5_EXPORT_WITH_RC4_40_SHA Ignoring disabled cipher suite: SSL_RSA_EXPORT_WITH_DES40_CBC_SHA Ignoring disabled cipher suite: TLS_KRB5_WITH_RC4_128_SHA Ignoring disabled cipher suite: SSL_RSA_EXPORT_WITH_RC4_40_MD5 Ignoring disabled cipher suite: TLS_KRB5_EXPORT_WITH_DES_CBC_40_SHA Ignoring disabled cipher suite: TLS_KRB5_EXPORT_WITH_RC4_40_MD5 Ignoring disabled cipher suite: TLS_ECDH_ECDSA_WITH_RC4_128_SHA Ignoring disabled cipher suite: TLS_KRB5_WITH_RC4_128_MD5 Ignoring disabled cipher suite: SSL_RSA_WITH_RC4_128_SHA Ignoring disabled cipher suite: TLS_ECDH_RSA_WITH_RC4_128_SHA Ignoring disabled cipher suite: SSL_DH_anon_EXPORT_WITH_DES40_CBC_SHA Ignoring disabled cipher suite: TLS_ECDHE_RSA_WITH_RC4_128_SHA Ignoring disabled cipher suite: SSL_RSA_WITH_RC4_128_MD5 trustStore is: certificates/front/front-truststore.jks trustStore type is: JKS trustStore provider is: the last modified time is: Sun Feb 25 08:40:40 IST 2018 Reload the trust store Reload trust certs Reloaded 1 trust certs adding as trusted cert: Subject: CN=maxant ca, OU=IT, O=maxant, C=CH Issuer: CN=maxant root, OU=IT, O=maxant, C=CH Algorithm: DSA; Serial number: 0x784005e2 Valid from Sun Feb 25 00:31:17 IST 2018 until Sat May 26 00:31:17 IST 2018 keyStore is : certificates/front/front-keystore.jks keyStore type is : JKS keyStore provider is : init keystore init keymanager of type SunX509 *** found key for : front-client chain [0] = [ [ Version: V3 Subject: CN=tech-user-front, OU=IT, O=maxant, C=CH Signature Algorithm: SHA1withDSA, OID = 1.2.840.10040.4.3 Key: Sun DSA Public Key Parameters:DSA p: fd7f5381 1d751229 52df4a9c 2eece4e7 f611b752 3cef4400 c31e3f80 b6512669 455d4022 51fb593d 8d58fabf c5f5ba30 f6cb9b55 6cd7813b 801d346f f26660b7 6b9950a5 a49f9fe8 047b1022 c24fbba9 d7feb7c6 1bf83b57 e7c6a8a6 150f04fb 83f6d3c5 1ec30235 54135a16 9132f675 f3ae2b61 d72aeff2 2203199d d14801c7 q: 9760508f 15230bcc b292b982 a2eb840b f0581cf5 g: f7e1a085 d69b3dde cbbcab5c 36b857b9 7994afbb fa3aea82 f9574c0b 3d078267 5159578e bad4594f e6710710 8180b449 167123e8 4c281613 b7cf0932 8cc8a6e1 3c167a8b 547c8d28 e0a3ae1e 2bb3a675 916ea37f 0bfa2135 62f1fb62 7a01243b cca4f1be a8519089 a883dfe1 5ae59f06 928b665e 807b5525 64014c3b fecf492a y: e09cb3d4 69ffdbb9 ee4f1d06 f601d288 07ec6bc4 dee82f35 3d20ea17 fb317426 6d56f912 a030c969 8bba144e deff5bf5 34849eae 04714a09 6b8dd72e f5743e82 8ee2def3 941b47f6 2d08344a d51782fd 6f386c9e fc3af60f 87c690be 1e8d3315 d13efaf5 9b863b53 7b23a44d a442f886 545d002a 00b2f6d4 a24fb6dd 38573e63 Validity: [From: Sun Feb 25 00:31:19 IST 2018, To: Sat May 26 00:31:19 IST 2018] Issuer: CN=maxant ca, OU=IT, O=maxant, C=CH SerialNumber: [ 1798c8f4] Certificate Extensions: 4 [1]: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: 0C 91 17 EE CB 17 EE ED AC D0 7B 1E A5 82 FC 0F ................ 0010: 9F 3A FF F6 .:.. ] ] [2]: ObjectId: 2.5.29.37 Criticality=false ExtendedKeyUsages [ clientAuth ] [3]: ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_Encipherment ] [4]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 61 2E D3 6D 45 D9 4C BD A4 73 1F EC 94 CB 4D 89 a..mE.L..s....M. 0010: 15 00 E2 90 .... ] ] ] Algorithm: [SHA1withDSA] Signature: 0000: 30 2C 02 14 7E 1B FC 1E 8F A9 56 DA 94 82 73 99 0,........V...s. 0010: 5D 7B F1 9F C1 B7 1A AC 02 14 09 D0 38 49 66 79 ]...........8Ify 0020: 65 99 FF 6A 6D E7 72 16 68 76 12 D9 93 38 e..jm.r.hv...8 ] chain [1] = [ [ Version: V3 Subject: CN=maxant ca, OU=IT, O=maxant, C=CH Signature Algorithm: SHA1withDSA, OID = 1.2.840.10040.4.3 Key: Sun DSA Public Key Parameters:DSA p: fd7f5381 1d751229 52df4a9c 2eece4e7 f611b752 3cef4400 c31e3f80 b6512669 455d4022 51fb593d 8d58fabf c5f5ba30 f6cb9b55 6cd7813b 801d346f f26660b7 6b9950a5 a49f9fe8 047b1022 c24fbba9 d7feb7c6 1bf83b57 e7c6a8a6 150f04fb 83f6d3c5 1ec30235 54135a16 9132f675 f3ae2b61 d72aeff2 2203199d d14801c7 q: 9760508f 15230bcc b292b982 a2eb840b f0581cf5 g: f7e1a085 d69b3dde cbbcab5c 36b857b9 7994afbb fa3aea82 f9574c0b 3d078267 5159578e bad4594f e6710710 8180b449 167123e8 4c281613 b7cf0932 8cc8a6e1 3c167a8b 547c8d28 e0a3ae1e 2bb3a675 916ea37f 0bfa2135 62f1fb62 7a01243b cca4f1be a8519089 a883dfe1 5ae59f06 928b665e 807b5525 64014c3b fecf492a y: c4ca2fd5 b201cf58 5b0c9381 31dd3a55 be945c34 0b86d6ab 3aa68026 cc1cebdf eaf1964c 08e0062b f2269795 e9e83fa2 464fb9cf 9fde043b 245f97b9 86393863 f0974f34 0c938716 90bee46b 7cd226dd 958a4bee 345d434d cbbff883 c664fe33 dbbf27e4 2e8cb40f 7ec5cf09 bb11bad2 1ac6e004 77c15d99 a4f7fdcb 41e6fab2 Validity: [From: Sun Feb 25 00:31:17 IST 2018, To: Sat May 26 00:31:17 IST 2018] Issuer: CN=maxant root, OU=IT, O=maxant, C=CH SerialNumber: [ 784005e2] Certificate Extensions: 3 [1]: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: 28 C9 B2 87 03 4A B7 DB F7 FD 44 9A 5B 5D 61 12 (....J....D.[]a. 0010: A9 8F 7D 3B ...; ] ] [2]: ObjectId: 2.5.29.19 Criticality=false BasicConstraints:[ CA:true PathLen:0 ] [3]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 0C 91 17 EE CB 17 EE ED AC D0 7B 1E A5 82 FC 0F ................ 0010: 9F 3A FF F6 .:.. ] ] ] Algorithm: [SHA1withDSA] Signature: 0000: 30 2C 02 14 24 27 CD 32 9D 61 88 97 54 35 7C 2F 0,..$'.2.a..T5./ 0010: 2C 3B 43 A4 06 58 F0 C8 02 14 03 53 79 1B 9D C4 ,;C..X.....Sy... 0020: AD FC A2 51 08 51 B6 F3 53 12 3D 60 5A C9 ...Q.Q..S.=`Z. ] *** trigger seeding of SecureRandom done seeding SecureRandom Allow unsafe renegotiation: false Allow legacy hello messages: true Is initial handshake: true Is secure renegotiation: false main, setSoTimeout(0) called Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_256_GCM_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_128_GCM_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_256_GCM_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_128_GCM_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1.1 %% No cached client session update handshake state: client_hello[1] upcoming handshake states: server_hello[2] *** ClientHello, TLSv1.2 RandomCookie: random_bytes = {53 AC BB 6D C9 41 C4 E1 9F 40 8C 6F BC D5 0D D4 0E 31 A5 5E 98 3E C1 8E 68 49 91 44 6A 01 23 49} Session ID: {} Cipher Suites: [TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, TLS_RSA_WITH_AES_256_GCM_SHA384, TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, TLS_DHE_DSS_WITH_AES_256_GCM_SHA384, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_DSS_WITH_AES_128_GCM_SHA256, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384, TLS_RSA_WITH_AES_256_CBC_SHA256, TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384, TLS_DHE_RSA_WITH_AES_256_CBC_SHA256, TLS_DHE_DSS_WITH_AES_256_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDH_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_DSS_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256, TLS_RSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_DSS_WITH_AES_128_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA, TLS_EMPTY_RENEGOTIATION_INFO_SCSV] Compression Methods: { 0 } Extension supported_groups, group names: {secp256r1, secp384r1, secp521r1, sect283k1, sect283r1, sect409k1, sect409r1, sect571k1, sect571r1, secp256k1, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192} Extension ec_point_formats, formats: [uncompressed] Extension signature_algorithms, signature_algorithms: SHA512withECDSA, SHA512withRSA, SHA384withECDSA, SHA384withRSA, SHA256withECDSA, SHA256withRSA, SHA256withDSA, SHA1withECDSA, SHA1withRSA, SHA1withDSA Extension extended_master_secret Extension status_request_v2 CertStatusReqItemV2: ocsp_multi, OCSPStatusRequest ResponderIds: Extensions: CertStatusReqItemV2: ocsp, OCSPStatusRequest ResponderIds: Extensions: Extension status_request: ocsp, OCSPStatusRequest ResponderIds: Extensions: *** main, WRITE: TLSv1.2 Handshake, length = 246 main, READ: TLSv1.2 Handshake, length = 2365 check handshake state: server_hello[2] *** ServerHello, TLSv1.2 RandomCookie: random_bytes = {65 BD 1F 4E 38 52 BF BD 80 61 73 54 DB 11 C0 C6 9E 00 57 A8 56 F8 E9 DB CE 12 B6 41 13 2D 75 9C} Session ID: {122, 59, 127, 200, 54, 237, 160, 212, 106, 145, 147, 228, 48, 217, 39, 192, 41, 220, 241, 14, 176, 154, 87, 129, 169, 238, 15, 97, 224, 17, 67, 87} Cipher Suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 Compression Method: 0 Extension renegotiation_info, renegotiated_connection: Extension extended_master_secret *** %% Initialized: [Session-2, TLS_DHE_DSS_WITH_AES_256_GCM_SHA384] ** TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 update handshake state: server_hello[2] upcoming handshake states: server certificate[11] upcoming handshake states: server_key_exchange[12](optional) upcoming handshake states: certificate_request[13](optional) upcoming handshake states: server_hello_done[14] upcoming handshake states: client certificate[11](optional) upcoming handshake states: client_key_exchange[16] upcoming handshake states: certificate_verify[15](optional) upcoming handshake states: client change_cipher_spec[-1] upcoming handshake states: client finished[20] upcoming handshake states: server change_cipher_spec[-1] upcoming handshake states: server finished[20] check handshake state: certificate[11] update handshake state: certificate[11] upcoming handshake states: server_key_exchange[12](optional) upcoming handshake states: certificate_request[13](optional) upcoming handshake states: server_hello_done[14] upcoming handshake states: client certificate[11](optional) upcoming handshake states: client_key_exchange[16] upcoming handshake states: certificate_verify[15](optional) upcoming handshake states: client change_cipher_spec[-1] upcoming handshake states: client finished[20] upcoming handshake states: server change_cipher_spec[-1] upcoming handshake states: server finished[20] *** Certificate chain chain [0] = [ [ Version: V3 Subject: CN=localhost, OU=IT, O=maxant, C=CH Signature Algorithm: SHA1withDSA, OID = 1.2.840.10040.4.3 Key: Sun DSA Public Key Parameters:DSA p: fd7f5381 1d751229 52df4a9c 2eece4e7 f611b752 3cef4400 c31e3f80 b6512669 455d4022 51fb593d 8d58fabf c5f5ba30 f6cb9b55 6cd7813b 801d346f f26660b7 6b9950a5 a49f9fe8 047b1022 c24fbba9 d7feb7c6 1bf83b57 e7c6a8a6 150f04fb 83f6d3c5 1ec30235 54135a16 9132f675 f3ae2b61 d72aeff2 2203199d d14801c7 q: 9760508f 15230bcc b292b982 a2eb840b f0581cf5 g: f7e1a085 d69b3dde cbbcab5c 36b857b9 7994afbb fa3aea82 f9574c0b 3d078267 5159578e bad4594f e6710710 8180b449 167123e8 4c281613 b7cf0932 8cc8a6e1 3c167a8b 547c8d28 e0a3ae1e 2bb3a675 916ea37f 0bfa2135 62f1fb62 7a01243b cca4f1be a8519089 a883dfe1 5ae59f06 928b665e 807b5525 64014c3b fecf492a y: 49fc1788 c5e29b5c e95ff7ca fda63424 450ab6a2 b433a771 c091ec3a b88da30d 93af4a60 f43aa5fa 202523ba 269c7788 2f54d18f 71997223 5b1cfb82 b3753075 a5e6d3ce b4155c5c 533f3002 d84c8b8b fd074924 e27388e6 aa6dd377 d89d2d7d f916a12a f1129589 7dcc92b0 86aa5009 2374b657 0d6a479a f8b0f27b cad01376 Validity: [From: Sun Feb 25 00:31:18 IST 2018, To: Sat May 26 00:31:18 IST 2018] Issuer: CN=maxant ca, OU=IT, O=maxant, C=CH SerialNumber: [ 305e202e] Certificate Extensions: 4 [1]: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: 0C 91 17 EE CB 17 EE ED AC D0 7B 1E A5 82 FC 0F ................ 0010: 9F 3A FF F6 .:.. ] ] [2]: ObjectId: 2.5.29.37 Criticality=false ExtendedKeyUsages [ serverAuth ] [3]: ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_Encipherment ] [4]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 1A 58 4E 5F 65 DD 4C 43 78 63 3E 9E 15 54 C9 A1 .XN_e.LCxc>..T.. 0010: 67 16 3C 38 g.<8 ] ] ] Algorithm: [SHA1withDSA] Signature: 0000: 30 2C 02 14 2B BB 07 9B 0A 7A B6 2E 89 4F 16 AE 0,..+....z...O.. 0010: F8 3C E8 83 E4 AC 4D 22 02 14 73 32 12 B8 8F B6 .<....M"..s2.... 0020: CF BB 01 6E E5 27 C7 C0 A0 53 7F 24 DD 8B ...n.'...S.$.. ] chain [1] = [ [ Version: V3 Subject: CN=maxant ca, OU=IT, O=maxant, C=CH Signature Algorithm: SHA1withDSA, OID = 1.2.840.10040.4.3 Key: Sun DSA Public Key Parameters:DSA p: fd7f5381 1d751229 52df4a9c 2eece4e7 f611b752 3cef4400 c31e3f80 b6512669 455d4022 51fb593d 8d58fabf c5f5ba30 f6cb9b55 6cd7813b 801d346f f26660b7 6b9950a5 a49f9fe8 047b1022 c24fbba9 d7feb7c6 1bf83b57 e7c6a8a6 150f04fb 83f6d3c5 1ec30235 54135a16 9132f675 f3ae2b61 d72aeff2 2203199d d14801c7 q: 9760508f 15230bcc b292b982 a2eb840b f0581cf5 g: f7e1a085 d69b3dde cbbcab5c 36b857b9 7994afbb fa3aea82 f9574c0b 3d078267 5159578e bad4594f e6710710 8180b449 167123e8 4c281613 b7cf0932 8cc8a6e1 3c167a8b 547c8d28 e0a3ae1e 2bb3a675 916ea37f 0bfa2135 62f1fb62 7a01243b cca4f1be a8519089 a883dfe1 5ae59f06 928b665e 807b5525 64014c3b fecf492a y: c4ca2fd5 b201cf58 5b0c9381 31dd3a55 be945c34 0b86d6ab 3aa68026 cc1cebdf eaf1964c 08e0062b f2269795 e9e83fa2 464fb9cf 9fde043b 245f97b9 86393863 f0974f34 0c938716 90bee46b 7cd226dd 958a4bee 345d434d cbbff883 c664fe33 dbbf27e4 2e8cb40f 7ec5cf09 bb11bad2 1ac6e004 77c15d99 a4f7fdcb 41e6fab2 Validity: [From: Sun Feb 25 00:31:17 IST 2018, To: Sat May 26 00:31:17 IST 2018] Issuer: CN=maxant root, OU=IT, O=maxant, C=CH SerialNumber: [ 784005e2] Certificate Extensions: 3 [1]: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: 28 C9 B2 87 03 4A B7 DB F7 FD 44 9A 5B 5D 61 12 (....J....D.[]a. 0010: A9 8F 7D 3B ...; ] ] [2]: ObjectId: 2.5.29.19 Criticality=false BasicConstraints:[ CA:true PathLen:0 ] [3]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 0C 91 17 EE CB 17 EE ED AC D0 7B 1E A5 82 FC 0F ................ 0010: 9F 3A FF F6 .:.. ] ] ] Algorithm: [SHA1withDSA] Signature: 0000: 30 2C 02 14 24 27 CD 32 9D 61 88 97 54 35 7C 2F 0,..$'.2.a..T5./ 0010: 2C 3B 43 A4 06 58 F0 C8 02 14 03 53 79 1B 9D C4 ,;C..X.....Sy... 0020: AD FC A2 51 08 51 B6 F3 53 12 3D 60 5A C9 ...Q.Q..S.=`Z. ] *** Found trusted certificate: [ [ Version: V3 Subject: CN=maxant ca, OU=IT, O=maxant, C=CH Signature Algorithm: SHA1withDSA, OID = 1.2.840.10040.4.3 Key: Sun DSA Public Key Parameters:DSA p: fd7f5381 1d751229 52df4a9c 2eece4e7 f611b752 3cef4400 c31e3f80 b6512669 455d4022 51fb593d 8d58fabf c5f5ba30 f6cb9b55 6cd7813b 801d346f f26660b7 6b9950a5 a49f9fe8 047b1022 c24fbba9 d7feb7c6 1bf83b57 e7c6a8a6 150f04fb 83f6d3c5 1ec30235 54135a16 9132f675 f3ae2b61 d72aeff2 2203199d d14801c7 q: 9760508f 15230bcc b292b982 a2eb840b f0581cf5 g: f7e1a085 d69b3dde cbbcab5c 36b857b9 7994afbb fa3aea82 f9574c0b 3d078267 5159578e bad4594f e6710710 8180b449 167123e8 4c281613 b7cf0932 8cc8a6e1 3c167a8b 547c8d28 e0a3ae1e 2bb3a675 916ea37f 0bfa2135 62f1fb62 7a01243b cca4f1be a8519089 a883dfe1 5ae59f06 928b665e 807b5525 64014c3b fecf492a y: c4ca2fd5 b201cf58 5b0c9381 31dd3a55 be945c34 0b86d6ab 3aa68026 cc1cebdf eaf1964c 08e0062b f2269795 e9e83fa2 464fb9cf 9fde043b 245f97b9 86393863 f0974f34 0c938716 90bee46b 7cd226dd 958a4bee 345d434d cbbff883 c664fe33 dbbf27e4 2e8cb40f 7ec5cf09 bb11bad2 1ac6e004 77c15d99 a4f7fdcb 41e6fab2 Validity: [From: Sun Feb 25 00:31:17 IST 2018, To: Sat May 26 00:31:17 IST 2018] Issuer: CN=maxant root, OU=IT, O=maxant, C=CH SerialNumber: [ 784005e2] Certificate Extensions: 3 [1]: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: 28 C9 B2 87 03 4A B7 DB F7 FD 44 9A 5B 5D 61 12 (....J....D.[]a. 0010: A9 8F 7D 3B ...; ] ] [2]: ObjectId: 2.5.29.19 Criticality=false BasicConstraints:[ CA:true PathLen:0 ] [3]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 0C 91 17 EE CB 17 EE ED AC D0 7B 1E A5 82 FC 0F ................ 0010: 9F 3A FF F6 .:.. ] ] ] Algorithm: [SHA1withDSA] Signature: 0000: 30 2C 02 14 24 27 CD 32 9D 61 88 97 54 35 7C 2F 0,..$'.2.a..T5./ 0010: 2C 3B 43 A4 06 58 F0 C8 02 14 03 53 79 1B 9D C4 ,;C..X.....Sy... 0020: AD FC A2 51 08 51 B6 F3 53 12 3D 60 5A C9 ...Q.Q..S.=`Z. ] check handshake state: server_key_exchange[12] update handshake state: server_key_exchange[12] upcoming handshake states: certificate_request[13](optional) upcoming handshake states: server_hello_done[14] upcoming handshake states: client certificate[11](optional) upcoming handshake states: client_key_exchange[16] upcoming handshake states: certificate_verify[15](optional) upcoming handshake states: client change_cipher_spec[-1] upcoming handshake states: client finished[20] upcoming handshake states: server change_cipher_spec[-1] upcoming handshake states: server finished[20] *** Diffie-Hellman ServerKeyExchange DH Modulus: { 255, 255, 255, 255, 255, 255, 255, 255, 173, 248, 84, 88, 162, 187, 74, 154, 175, 220, 86, 32, 39, 61, 60, 241, 216, 185, 197, 131, 206, 45, 54, 149, 169, 225, 54, 65, 20, 100, 51, 251, 204, 147, 157, 206, 36, 155, 62, 249, 125, 47, 227, 99, 99, 12, 117, 216, 246, 129, 178, 2, 174, 196, 97, 122, 211, 223, 30, 213, 213, 253, 101, 97, 36, 51, 245, 31, 95, 6, 110, 208, 133, 99, 101, 85, 61, 237, 26, 243, 181, 87, 19, 94, 127, 87, 201, 53, 152, 79, 12, 112, 224, 230, 139, 119, 226, 166, 137, 218, 243, 239, 232, 114, 29, 241, 88, 161, 54, 173, 231, 53, 48, 172, 202, 79, 72, 58, 121, 122, 188, 10, 177, 130, 179, 36, 251, 97, 209, 8, 169, 75, 178, 200, 227, 251, 185, 106, 218, 183, 96, 215, 244, 104, 29, 79, 66, 163, 222, 57, 77, 244, 174, 86, 237, 231, 99, 114, 187, 25, 11, 7, 167, 200, 238, 10, 109, 112, 158, 2, 252, 225, 205, 247, 226, 236, 192, 52, 4, 205, 40, 52, 47, 97, 145, 114, 254, 156, 233, 133, 131, 255, 142, 79, 18, 50, 238, 242, 129, 131, 195, 254, 59, 27, 76, 111, 173, 115, 59, 181, 252, 188, 46, 194, 32, 5, 197, 142, 241, 131, 125, 22, 131, 178, 198, 243, 74, 38, 193, 178, 239, 250, 136, 107, 66, 56, 97, 40, 92, 151, 255, 255, 255, 255, 255, 255, 255, 255 } DH Base: { 2 } Server DH Public Key: { 159, 88, 23, 117, 22, 195, 99, 245, 182, 104, 199, 247, 74, 88, 125, 251, 79, 17, 201, 197, 199, 74, 70, 141, 224, 191, 254, 77, 50, 247, 123, 197, 201, 21, 54, 60, 252, 44, 61, 15, 50, 196, 137, 217, 230, 179, 189, 10, 89, 127, 97, 149, 143, 112, 162, 184, 217, 95, 127, 244, 144, 200, 8, 1, 92, 242, 194, 218, 62, 168, 6, 38, 161, 98, 87, 231, 50, 1, 143, 41, 251, 243, 34, 52, 123, 38, 181, 27, 73, 221, 200, 61, 211, 87, 236, 121, 223, 165, 213, 84, 227, 134, 67, 254, 231, 177, 0, 186, 101, 13, 33, 160, 30, 196, 178, 27, 186, 25, 217, 216, 199, 133, 251, 136, 105, 125, 130, 188, 166, 221, 149, 204, 11, 219, 76, 183, 255, 46, 26, 3, 31, 186, 142, 88, 115, 56, 126, 92, 155, 78, 82, 103, 178, 72, 13, 200, 220, 48, 153, 199, 247, 22, 158, 87, 240, 229, 110, 201, 173, 39, 149, 149, 240, 22, 105, 250, 29, 62, 24, 116, 233, 60, 72, 128, 233, 17, 95, 238, 80, 101, 93, 152, 56, 12, 46, 56, 133, 56, 217, 133, 189, 106, 146, 136, 249, 40, 41, 178, 119, 0, 158, 55, 180, 177, 85, 158, 161, 80, 4, 242, 26, 47, 177, 1, 54, 249, 4, 116, 45, 84, 47, 225, 160, 220, 226, 149, 4, 164, 92, 194, 122, 126, 186, 62, 152, 120, 237, 80, 242, 44, 51, 147, 182, 29, 142, 18 } Anonymous check handshake state: certificate_request[13] *** CertificateRequest Cert Types: RSA, DSS, ECDSA Supported Signature Algorithms: SHA512withECDSA, SHA512withRSA, SHA384withECDSA, SHA384withRSA, SHA256withECDSA, SHA256withRSA, SHA256withDSA, SHA1withECDSA, SHA1withRSA, SHA1withDSA Cert Authorities: update handshake state: certificate_request[13] upcoming handshake states: server_hello_done[14] upcoming handshake states: client certificate[11](optional) upcoming handshake states: client_key_exchange[16] upcoming handshake states: certificate_verify[15](optional) upcoming handshake states: client change_cipher_spec[-1] upcoming handshake states: client finished[20] upcoming handshake states: server change_cipher_spec[-1] upcoming handshake states: server finished[20] check handshake state: server_hello_done[14] update handshake state: server_hello_done[14] upcoming handshake states: client certificate[11](optional) upcoming handshake states: client_key_exchange[16] upcoming handshake states: certificate_verify[15](optional) upcoming handshake states: client change_cipher_spec[-1] upcoming handshake states: client finished[20] upcoming handshake states: server change_cipher_spec[-1] upcoming handshake states: server finished[20] *** ServerHelloDone matching alias: front-client *** Certificate chain chain [0] = [ [ Version: V3 Subject: CN=tech-user-front, OU=IT, O=maxant, C=CH Signature Algorithm: SHA1withDSA, OID = 1.2.840.10040.4.3 Key: Sun DSA Public Key Parameters:DSA p: fd7f5381 1d751229 52df4a9c 2eece4e7 f611b752 3cef4400 c31e3f80 b6512669 455d4022 51fb593d 8d58fabf c5f5ba30 f6cb9b55 6cd7813b 801d346f f26660b7 6b9950a5 a49f9fe8 047b1022 c24fbba9 d7feb7c6 1bf83b57 e7c6a8a6 150f04fb 83f6d3c5 1ec30235 54135a16 9132f675 f3ae2b61 d72aeff2 2203199d d14801c7 q: 9760508f 15230bcc b292b982 a2eb840b f0581cf5 g: f7e1a085 d69b3dde cbbcab5c 36b857b9 7994afbb fa3aea82 f9574c0b 3d078267 5159578e bad4594f e6710710 8180b449 167123e8 4c281613 b7cf0932 8cc8a6e1 3c167a8b 547c8d28 e0a3ae1e 2bb3a675 916ea37f 0bfa2135 62f1fb62 7a01243b cca4f1be a8519089 a883dfe1 5ae59f06 928b665e 807b5525 64014c3b fecf492a y: e09cb3d4 69ffdbb9 ee4f1d06 f601d288 07ec6bc4 dee82f35 3d20ea17 fb317426 6d56f912 a030c969 8bba144e deff5bf5 34849eae 04714a09 6b8dd72e f5743e82 8ee2def3 941b47f6 2d08344a d51782fd 6f386c9e fc3af60f 87c690be 1e8d3315 d13efaf5 9b863b53 7b23a44d a442f886 545d002a 00b2f6d4 a24fb6dd 38573e63 Validity: [From: Sun Feb 25 00:31:19 IST 2018, To: Sat May 26 00:31:19 IST 2018] Issuer: CN=maxant ca, OU=IT, O=maxant, C=CH SerialNumber: [ 1798c8f4] Certificate Extensions: 4 [1]: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: 0C 91 17 EE CB 17 EE ED AC D0 7B 1E A5 82 FC 0F ................ 0010: 9F 3A FF F6 .:.. ] ] [2]: ObjectId: 2.5.29.37 Criticality=false ExtendedKeyUsages [ clientAuth ] [3]: ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_Encipherment ] [4]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 61 2E D3 6D 45 D9 4C BD A4 73 1F EC 94 CB 4D 89 a..mE.L..s....M. 0010: 15 00 E2 90 .... ] ] ] Algorithm: [SHA1withDSA] Signature: 0000: 30 2C 02 14 7E 1B FC 1E 8F A9 56 DA 94 82 73 99 0,........V...s. 0010: 5D 7B F1 9F C1 B7 1A AC 02 14 09 D0 38 49 66 79 ]...........8Ify 0020: 65 99 FF 6A 6D E7 72 16 68 76 12 D9 93 38 e..jm.r.hv...8 ] chain [1] = [ [ Version: V3 Subject: CN=maxant ca, OU=IT, O=maxant, C=CH Signature Algorithm: SHA1withDSA, OID = 1.2.840.10040.4.3 Key: Sun DSA Public Key Parameters:DSA p: fd7f5381 1d751229 52df4a9c 2eece4e7 f611b752 3cef4400 c31e3f80 b6512669 455d4022 51fb593d 8d58fabf c5f5ba30 f6cb9b55 6cd7813b 801d346f f26660b7 6b9950a5 a49f9fe8 047b1022 c24fbba9 d7feb7c6 1bf83b57 e7c6a8a6 150f04fb 83f6d3c5 1ec30235 54135a16 9132f675 f3ae2b61 d72aeff2 2203199d d14801c7 q: 9760508f 15230bcc b292b982 a2eb840b f0581cf5 g: f7e1a085 d69b3dde cbbcab5c 36b857b9 7994afbb fa3aea82 f9574c0b 3d078267 5159578e bad4594f e6710710 8180b449 167123e8 4c281613 b7cf0932 8cc8a6e1 3c167a8b 547c8d28 e0a3ae1e 2bb3a675 916ea37f 0bfa2135 62f1fb62 7a01243b cca4f1be a8519089 a883dfe1 5ae59f06 928b665e 807b5525 64014c3b fecf492a y: c4ca2fd5 b201cf58 5b0c9381 31dd3a55 be945c34 0b86d6ab 3aa68026 cc1cebdf eaf1964c 08e0062b f2269795 e9e83fa2 464fb9cf 9fde043b 245f97b9 86393863 f0974f34 0c938716 90bee46b 7cd226dd 958a4bee 345d434d cbbff883 c664fe33 dbbf27e4 2e8cb40f 7ec5cf09 bb11bad2 1ac6e004 77c15d99 a4f7fdcb 41e6fab2 Validity: [From: Sun Feb 25 00:31:17 IST 2018, To: Sat May 26 00:31:17 IST 2018] Issuer: CN=maxant root, OU=IT, O=maxant, C=CH SerialNumber: [ 784005e2] Certificate Extensions: 3 [1]: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: 28 C9 B2 87 03 4A B7 DB F7 FD 44 9A 5B 5D 61 12 (....J....D.[]a. 0010: A9 8F 7D 3B ...; ] ] [2]: ObjectId: 2.5.29.19 Criticality=false BasicConstraints:[ CA:true PathLen:0 ] [3]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 0C 91 17 EE CB 17 EE ED AC D0 7B 1E A5 82 FC 0F ................ 0010: 9F 3A FF F6 .:.. ] ] ] Algorithm: [SHA1withDSA] Signature: 0000: 30 2C 02 14 24 27 CD 32 9D 61 88 97 54 35 7C 2F 0,..$'.2.a..T5./ 0010: 2C 3B 43 A4 06 58 F0 C8 02 14 03 53 79 1B 9D C4 ,;C..X.....Sy... 0020: AD FC A2 51 08 51 B6 F3 53 12 3D 60 5A C9 ...Q.Q..S.=`Z. ] *** update handshake state: certificate[11] upcoming handshake states: client_key_exchange[16] upcoming handshake states: certificate_verify[15](optional) upcoming handshake states: client change_cipher_spec[-1] upcoming handshake states: client finished[20] upcoming handshake states: server change_cipher_spec[-1] upcoming handshake states: server finished[20] *** ClientKeyExchange, DH DH Public key: { 157, 110, 220, 24, 64, 74, 216, 55, 74, 173, 145, 240, 202, 110, 15, 214, 154, 251, 140, 86, 179, 187, 111, 155, 98, 160, 10, 72, 59, 79, 140, 242, 125, 199, 74, 79, 17, 118, 68, 46, 95, 206, 150, 219, 12, 78, 61, 157, 102, 90, 77, 216, 39, 181, 212, 3, 190, 229, 225, 98, 37, 184, 45, 109, 46, 16, 94, 110, 191, 12, 147, 164, 154, 116, 149, 237, 232, 125, 38, 125, 58, 89, 52, 7, 32, 112, 32, 226, 64, 9, 70, 164, 41, 111, 151, 8, 75, 150, 101, 200, 189, 222, 241, 88, 19, 192, 141, 225, 144, 198, 78, 174, 130, 68, 155, 177, 70, 68, 25, 154, 146, 131, 46, 163, 187, 135, 62, 108, 22, 125, 202, 103, 39, 150, 117, 79, 168, 186, 194, 22, 161, 96, 84, 134, 72, 42, 63, 122, 206, 142, 43, 80, 2, 123, 171, 130, 17, 137, 183, 208, 75, 48, 72, 62, 130, 55, 182, 132, 123, 174, 152, 113, 109, 45, 62, 137, 186, 187, 87, 78, 190, 129, 38, 26, 108, 139, 195, 50, 183, 147, 108, 75, 176, 53, 235, 215, 100, 53, 167, 109, 213, 236, 201, 184, 184, 247, 119, 244, 151, 229, 137, 143, 84, 146, 125, 7, 169, 22, 77, 85, 159, 28, 249, 248, 138, 230, 221, 235, 103, 225, 242, 150, 4, 235, 116, 172, 51, 173, 154, 29, 244, 153, 48, 35, 221, 21, 230, 240, 3, 8, 69, 72, 78, 208, 82, 39 } update handshake state: client_key_exchange[16] upcoming handshake states: certificate_verify[15](optional) upcoming handshake states: client change_cipher_spec[-1] upcoming handshake states: client finished[20] upcoming handshake states: server change_cipher_spec[-1] upcoming handshake states: server finished[20] main, WRITE: TLSv1.2 Handshake, length = 1873 SESSION KEYGEN: PreMaster Secret: 0000: 2A 5E 5F 3D 55 2A 4D 60 A3 41 76 A3 11 56 AB 9C *^_=U*M`.Av..V.. 0010: 1F B1 C0 19 B7 D2 DF C8 77 40 C0 D9 69 0A 9C 13 ........w@..i... 0020: 2F 41 7F 8B 68 A5 02 47 52 F2 8B CD 5E 90 D7 2F /A..h..GR...^../ 0030: BC 4B 56 8E 25 DF 56 FD 01 7F 28 FC CD 0F 8B A8 .KV.%.V...(..... 0040: A0 7A C5 F5 87 2D 37 F5 D9 B7 DD AC B0 B9 CE 51 .z...-7........Q 0050: 33 8F C9 A5 EE A5 71 12 0A 13 25 29 AD E3 B8 5F 3.....q...%)..._ 0060: 97 FD 71 AD 58 DF 36 37 C4 DF 00 9A C2 42 39 FB ..q.X.67.....B9. 0070: C5 FE D0 94 EC 3C 7D E6 39 9B 27 67 70 46 28 CA .....<..9.'gpF(. 0080: 8A D9 FF A7 58 60 E8 93 CC C1 FB CD 20 22 E4 D3 ....X`...... ".. 0090: 7F 16 E4 8A D0 4B 0D 0C BA 2F 78 0E 26 FE E5 95 .....K.../x.&... 00A0: 3B 4E CD D6 72 0C A7 7D DA C6 E3 D4 E5 02 67 44 ;N..r.........gD 00B0: 07 E1 EC F2 C5 28 98 77 84 E9 C6 5F 82 15 3F CD .....(.w..._..?. 00C0: 73 55 EE 11 A1 5B 81 FE E4 E0 C0 BC 7A EE C1 1E sU...[......z... 00D0: 81 5B CD 83 8F 29 20 A0 95 73 C4 78 A0 F6 EE 57 .[...) ..s.x...W 00E0: BD 6E 11 C4 48 F4 81 A1 52 3F 8A 37 41 DF 97 A6 .n..H...R?.7A... 00F0: 89 EB 11 BF 84 A9 94 A0 FD F0 21 B2 C3 C5 C3 95 ..........!..... CONNECTION KEYGEN: Client Nonce: 0000: 53 AC BB 6D C9 41 C4 E1 9F 40 8C 6F BC D5 0D D4 S..m.A...@.o.... 0010: 0E 31 A5 5E 98 3E C1 8E 68 49 91 44 6A 01 23 49 .1.^.>..hI.Dj.#I Server Nonce: 0000: 65 BD 1F 4E 38 52 BF BD 80 61 73 54 DB 11 C0 C6 e..N8R...asT.... 0010: 9E 00 57 A8 56 F8 E9 DB CE 12 B6 41 13 2D 75 9C ..W.V......A.-u. Master Secret: 0000: BB CE D6 FA 7F 04 C8 6E 9F A3 8D 2C 63 E3 C7 0D .......n...,c... 0010: A2 FD 9E F7 30 56 48 D3 F1 28 05 94 D0 20 F3 70 ....0VH..(... .p 0020: 8C 01 62 4A BD 86 4E B6 9F 17 13 EF 18 12 28 AC ..bJ..N.......(. ... no MAC keys used for this cipher Client write key: 0000: 56 D0 E5 94 DA 9C 70 54 1B 23 D8 DF 7B 4B E8 6A V.....pT.#...K.j 0010: 65 3E BD 1E 68 3D 87 EB 4A 9B 66 19 9A B9 5D 01 e>..h=..J.f...]. Server write key: 0000: 16 38 84 98 A1 B8 4C A2 84 17 ED 50 28 40 1E 2D .8....L....P(@.- 0010: 4E FE 9D A1 87 F6 EF CE 63 52 8E DD 31 A6 05 1E N.......cR..1... Client write IV: 0000: 0F 3D 76 C2 .=v. Server write IV: 0000: 81 3F CC D7 .?.. *** CertificateVerify Signature Algorithm SHA256withDSA update handshake state: certificate_verify[15] upcoming handshake states: client change_cipher_spec[-1] upcoming handshake states: client finished[20] upcoming handshake states: server change_cipher_spec[-1] upcoming handshake states: server finished[20] main, WRITE: TLSv1.2 Handshake, length = 54 update handshake state: change_cipher_spec upcoming handshake states: client finished[20] upcoming handshake states: server change_cipher_spec[-1] upcoming handshake states: server finished[20] main, WRITE: TLSv1.2 Change Cipher Spec, length = 1 *** Finished verify_data: { 202, 102, 241, 250, 41, 31, 68, 62, 16, 65, 86, 248 } *** update handshake state: finished[20] upcoming handshake states: server change_cipher_spec[-1] upcoming handshake states: server finished[20] main, WRITE: TLSv1.2 Handshake, length = 24 main, READ: TLSv1.2 Change Cipher Spec, length = 1 update handshake state: change_cipher_spec upcoming handshake states: server finished[20] main, READ: TLSv1.2 Handshake, length = 40 check handshake state: finished[20] update handshake state: finished[20] *** Finished verify_data: { 23, 209, 247, 162, 21, 58, 106, 167, 162, 57, 82, 202 } *** %% Cached client session: [Session-2, TLS_DHE_DSS_WITH_AES_256_GCM_SHA384] main, WRITE: TLSv1.2 Application Data, length = 162 main, received EOFException: ignored main, called closeInternal(false) main, SEND TLSv1.2 ALERT: warning, description = close_notify main, WRITE: TLSv1.2 Alert, length = 10 main, called closeSocket(false) main, called close() main, called closeInternal(true) Allow unsafe renegotiation: false Allow legacy hello messages: true Is initial handshake: true Is secure renegotiation: false main, setSoTimeout(0) called Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_256_GCM_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_128_GCM_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_256_GCM_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_128_GCM_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1.1 %% Client cached [Session-2, TLS_DHE_DSS_WITH_AES_256_GCM_SHA384] %% Try resuming [Session-2, TLS_DHE_DSS_WITH_AES_256_GCM_SHA384] from port 62390 update handshake state: client_hello[1] upcoming handshake states: server_hello[2] *** ClientHello, TLSv1.2 RandomCookie: random_bytes = {FF FA DD 78 07 A5 B2 3D D4 FB 77 70 3E 35 99 58 49 CC DD E3 49 2E 7C 01 FB F6 65 D7 D0 58 E4 21} Session ID: {122, 59, 127, 200, 54, 237, 160, 212, 106, 145, 147, 228, 48, 217, 39, 192, 41, 220, 241, 14, 176, 154, 87, 129, 169, 238, 15, 97, 224, 17, 67, 87} Cipher Suites: [TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, TLS_RSA_WITH_AES_256_GCM_SHA384, TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, TLS_DHE_DSS_WITH_AES_256_GCM_SHA384, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_DSS_WITH_AES_128_GCM_SHA256, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384, TLS_RSA_WITH_AES_256_CBC_SHA256, TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384, TLS_DHE_RSA_WITH_AES_256_CBC_SHA256, TLS_DHE_DSS_WITH_AES_256_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDH_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_DSS_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256, TLS_RSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_DSS_WITH_AES_128_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA, TLS_EMPTY_RENEGOTIATION_INFO_SCSV] Compression Methods: { 0 } Extension supported_groups, group names: {secp256r1, secp384r1, secp521r1, sect283k1, sect283r1, sect409k1, sect409r1, sect571k1, sect571r1, secp256k1, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192} Extension ec_point_formats, formats: [uncompressed] Extension signature_algorithms, signature_algorithms: SHA512withECDSA, SHA512withRSA, SHA384withECDSA, SHA384withRSA, SHA256withECDSA, SHA256withRSA, SHA256withDSA, SHA1withECDSA, SHA1withRSA, SHA1withDSA Extension extended_master_secret Extension status_request_v2 CertStatusReqItemV2: ocsp_multi, OCSPStatusRequest ResponderIds: Extensions: CertStatusReqItemV2: ocsp, OCSPStatusRequest ResponderIds: Extensions: Extension status_request: ocsp, OCSPStatusRequest ResponderIds: Extensions: *** main, WRITE: TLSv1.2 Handshake, length = 278 main, READ: TLSv1.2 Handshake, length = 2365 check handshake state: server_hello[2] *** ServerHello, TLSv1.2 RandomCookie: random_bytes = {85 86 C2 8A CB B6 B2 55 A4 05 CB 9A D3 D9 F9 11 4B 0D 1A AE 30 DD AA 10 EC 45 B4 32 A9 BE EC CF} Session ID: {31, 213, 104, 48, 68, 190, 131, 2, 251, 68, 236, 103, 147, 226, 249, 213, 149, 185, 159, 129, 129, 224, 150, 116, 251, 140, 194, 45, 155, 120, 83, 151} Cipher Suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 Compression Method: 0 Extension renegotiation_info, renegotiated_connection: Extension extended_master_secret *** %% Invalidated: [Session-2, TLS_DHE_DSS_WITH_AES_256_GCM_SHA384] %% Initialized: [Session-3, TLS_DHE_DSS_WITH_AES_256_GCM_SHA384] ** TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 update handshake state: server_hello[2] upcoming handshake states: server certificate[11] upcoming handshake states: server_key_exchange[12](optional) upcoming handshake states: certificate_request[13](optional) upcoming handshake states: server_hello_done[14] upcoming handshake states: client certificate[11](optional) upcoming handshake states: client_key_exchange[16] upcoming handshake states: certificate_verify[15](optional) upcoming handshake states: client change_cipher_spec[-1] upcoming handshake states: client finished[20] upcoming handshake states: server change_cipher_spec[-1] upcoming handshake states: server finished[20] check handshake state: certificate[11] update handshake state: certificate[11] upcoming handshake states: server_key_exchange[12](optional) upcoming handshake states: certificate_request[13](optional) upcoming handshake states: server_hello_done[14] upcoming handshake states: client certificate[11](optional) upcoming handshake states: client_key_exchange[16] upcoming handshake states: certificate_verify[15](optional) upcoming handshake states: client change_cipher_spec[-1] upcoming handshake states: client finished[20] upcoming handshake states: server change_cipher_spec[-1] upcoming handshake states: server finished[20] *** Certificate chain chain [0] = [ [ Version: V3 Subject: CN=localhost, OU=IT, O=maxant, C=CH Signature Algorithm: SHA1withDSA, OID = 1.2.840.10040.4.3 Key: Sun DSA Public Key Parameters:DSA p: fd7f5381 1d751229 52df4a9c 2eece4e7 f611b752 3cef4400 c31e3f80 b6512669 455d4022 51fb593d 8d58fabf c5f5ba30 f6cb9b55 6cd7813b 801d346f f26660b7 6b9950a5 a49f9fe8 047b1022 c24fbba9 d7feb7c6 1bf83b57 e7c6a8a6 150f04fb 83f6d3c5 1ec30235 54135a16 9132f675 f3ae2b61 d72aeff2 2203199d d14801c7 q: 9760508f 15230bcc b292b982 a2eb840b f0581cf5 g: f7e1a085 d69b3dde cbbcab5c 36b857b9 7994afbb fa3aea82 f9574c0b 3d078267 5159578e bad4594f e6710710 8180b449 167123e8 4c281613 b7cf0932 8cc8a6e1 3c167a8b 547c8d28 e0a3ae1e 2bb3a675 916ea37f 0bfa2135 62f1fb62 7a01243b cca4f1be a8519089 a883dfe1 5ae59f06 928b665e 807b5525 64014c3b fecf492a y: 49fc1788 c5e29b5c e95ff7ca fda63424 450ab6a2 b433a771 c091ec3a b88da30d 93af4a60 f43aa5fa 202523ba 269c7788 2f54d18f 71997223 5b1cfb82 b3753075 a5e6d3ce b4155c5c 533f3002 d84c8b8b fd074924 e27388e6 aa6dd377 d89d2d7d f916a12a f1129589 7dcc92b0 86aa5009 2374b657 0d6a479a f8b0f27b cad01376 Validity: [From: Sun Feb 25 00:31:18 IST 2018, To: Sat May 26 00:31:18 IST 2018] Issuer: CN=maxant ca, OU=IT, O=maxant, C=CH SerialNumber: [ 305e202e] Certificate Extensions: 4 [1]: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: 0C 91 17 EE CB 17 EE ED AC D0 7B 1E A5 82 FC 0F ................ 0010: 9F 3A FF F6 .:.. ] ] [2]: ObjectId: 2.5.29.37 Criticality=false ExtendedKeyUsages [ serverAuth ] [3]: ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_Encipherment ] [4]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 1A 58 4E 5F 65 DD 4C 43 78 63 3E 9E 15 54 C9 A1 .XN_e.LCxc>..T.. 0010: 67 16 3C 38 g.<8 ] ] ] Algorithm: [SHA1withDSA] Signature: 0000: 30 2C 02 14 2B BB 07 9B 0A 7A B6 2E 89 4F 16 AE 0,..+....z...O.. 0010: F8 3C E8 83 E4 AC 4D 22 02 14 73 32 12 B8 8F B6 .<....M"..s2.... 0020: CF BB 01 6E E5 27 C7 C0 A0 53 7F 24 DD 8B ...n.'...S.$.. ] chain [1] = [ [ Version: V3 Subject: CN=maxant ca, OU=IT, O=maxant, C=CH Signature Algorithm: SHA1withDSA, OID = 1.2.840.10040.4.3 Key: Sun DSA Public Key Parameters:DSA p: fd7f5381 1d751229 52df4a9c 2eece4e7 f611b752 3cef4400 c31e3f80 b6512669 455d4022 51fb593d 8d58fabf c5f5ba30 f6cb9b55 6cd7813b 801d346f f26660b7 6b9950a5 a49f9fe8 047b1022 c24fbba9 d7feb7c6 1bf83b57 e7c6a8a6 150f04fb 83f6d3c5 1ec30235 54135a16 9132f675 f3ae2b61 d72aeff2 2203199d d14801c7 q: 9760508f 15230bcc b292b982 a2eb840b f0581cf5 g: f7e1a085 d69b3dde cbbcab5c 36b857b9 7994afbb fa3aea82 f9574c0b 3d078267 5159578e bad4594f e6710710 8180b449 167123e8 4c281613 b7cf0932 8cc8a6e1 3c167a8b 547c8d28 e0a3ae1e 2bb3a675 916ea37f 0bfa2135 62f1fb62 7a01243b cca4f1be a8519089 a883dfe1 5ae59f06 928b665e 807b5525 64014c3b fecf492a y: c4ca2fd5 b201cf58 5b0c9381 31dd3a55 be945c34 0b86d6ab 3aa68026 cc1cebdf eaf1964c 08e0062b f2269795 e9e83fa2 464fb9cf 9fde043b 245f97b9 86393863 f0974f34 0c938716 90bee46b 7cd226dd 958a4bee 345d434d cbbff883 c664fe33 dbbf27e4 2e8cb40f 7ec5cf09 bb11bad2 1ac6e004 77c15d99 a4f7fdcb 41e6fab2 Validity: [From: Sun Feb 25 00:31:17 IST 2018, To: Sat May 26 00:31:17 IST 2018] Issuer: CN=maxant root, OU=IT, O=maxant, C=CH SerialNumber: [ 784005e2] Certificate Extensions: 3 [1]: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: 28 C9 B2 87 03 4A B7 DB F7 FD 44 9A 5B 5D 61 12 (....J....D.[]a. 0010: A9 8F 7D 3B ...; ] ] [2]: ObjectId: 2.5.29.19 Criticality=false BasicConstraints:[ CA:true PathLen:0 ] [3]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 0C 91 17 EE CB 17 EE ED AC D0 7B 1E A5 82 FC 0F ................ 0010: 9F 3A FF F6 .:.. ] ] ] Algorithm: [SHA1withDSA] Signature: 0000: 30 2C 02 14 24 27 CD 32 9D 61 88 97 54 35 7C 2F 0,..$'.2.a..T5./ 0010: 2C 3B 43 A4 06 58 F0 C8 02 14 03 53 79 1B 9D C4 ,;C..X.....Sy... 0020: AD FC A2 51 08 51 B6 F3 53 12 3D 60 5A C9 ...Q.Q..S.=`Z. ] *** Found trusted certificate: [ [ Version: V3 Subject: CN=maxant ca, OU=IT, O=maxant, C=CH Signature Algorithm: SHA1withDSA, OID = 1.2.840.10040.4.3 Key: Sun DSA Public Key Parameters:DSA p: fd7f5381 1d751229 52df4a9c 2eece4e7 f611b752 3cef4400 c31e3f80 b6512669 455d4022 51fb593d 8d58fabf c5f5ba30 f6cb9b55 6cd7813b 801d346f f26660b7 6b9950a5 a49f9fe8 047b1022 c24fbba9 d7feb7c6 1bf83b57 e7c6a8a6 150f04fb 83f6d3c5 1ec30235 54135a16 9132f675 f3ae2b61 d72aeff2 2203199d d14801c7 q: 9760508f 15230bcc b292b982 a2eb840b f0581cf5 g: f7e1a085 d69b3dde cbbcab5c 36b857b9 7994afbb fa3aea82 f9574c0b 3d078267 5159578e bad4594f e6710710 8180b449 167123e8 4c281613 b7cf0932 8cc8a6e1 3c167a8b 547c8d28 e0a3ae1e 2bb3a675 916ea37f 0bfa2135 62f1fb62 7a01243b cca4f1be a8519089 a883dfe1 5ae59f06 928b665e 807b5525 64014c3b fecf492a y: c4ca2fd5 b201cf58 5b0c9381 31dd3a55 be945c34 0b86d6ab 3aa68026 cc1cebdf eaf1964c 08e0062b f2269795 e9e83fa2 464fb9cf 9fde043b 245f97b9 86393863 f0974f34 0c938716 90bee46b 7cd226dd 958a4bee 345d434d cbbff883 c664fe33 dbbf27e4 2e8cb40f 7ec5cf09 bb11bad2 1ac6e004 77c15d99 a4f7fdcb 41e6fab2 Validity: [From: Sun Feb 25 00:31:17 IST 2018, To: Sat May 26 00:31:17 IST 2018] Issuer: CN=maxant root, OU=IT, O=maxant, C=CH SerialNumber: [ 784005e2] Certificate Extensions: 3 [1]: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: 28 C9 B2 87 03 4A B7 DB F7 FD 44 9A 5B 5D 61 12 (....J....D.[]a. 0010: A9 8F 7D 3B ...; ] ] [2]: ObjectId: 2.5.29.19 Criticality=false BasicConstraints:[ CA:true PathLen:0 ] [3]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 0C 91 17 EE CB 17 EE ED AC D0 7B 1E A5 82 FC 0F ................ 0010: 9F 3A FF F6 .:.. ] ] ] Algorithm: [SHA1withDSA] Signature: 0000: 30 2C 02 14 24 27 CD 32 9D 61 88 97 54 35 7C 2F 0,..$'.2.a..T5./ 0010: 2C 3B 43 A4 06 58 F0 C8 02 14 03 53 79 1B 9D C4 ,;C..X.....Sy... 0020: AD FC A2 51 08 51 B6 F3 53 12 3D 60 5A C9 ...Q.Q..S.=`Z. ] check handshake state: server_key_exchange[12] update handshake state: server_key_exchange[12] upcoming handshake states: certificate_request[13](optional) upcoming handshake states: server_hello_done[14] upcoming handshake states: client certificate[11](optional) upcoming handshake states: client_key_exchange[16] upcoming handshake states: certificate_verify[15](optional) upcoming handshake states: client change_cipher_spec[-1] upcoming handshake states: client finished[20] upcoming handshake states: server change_cipher_spec[-1] upcoming handshake states: server finished[20] *** Diffie-Hellman ServerKeyExchange DH Modulus: { 255, 255, 255, 255, 255, 255, 255, 255, 173, 248, 84, 88, 162, 187, 74, 154, 175, 220, 86, 32, 39, 61, 60, 241, 216, 185, 197, 131, 206, 45, 54, 149, 169, 225, 54, 65, 20, 100, 51, 251, 204, 147, 157, 206, 36, 155, 62, 249, 125, 47, 227, 99, 99, 12, 117, 216, 246, 129, 178, 2, 174, 196, 97, 122, 211, 223, 30, 213, 213, 253, 101, 97, 36, 51, 245, 31, 95, 6, 110, 208, 133, 99, 101, 85, 61, 237, 26, 243, 181, 87, 19, 94, 127, 87, 201, 53, 152, 79, 12, 112, 224, 230, 139, 119, 226, 166, 137, 218, 243, 239, 232, 114, 29, 241, 88, 161, 54, 173, 231, 53, 48, 172, 202, 79, 72, 58, 121, 122, 188, 10, 177, 130, 179, 36, 251, 97, 209, 8, 169, 75, 178, 200, 227, 251, 185, 106, 218, 183, 96, 215, 244, 104, 29, 79, 66, 163, 222, 57, 77, 244, 174, 86, 237, 231, 99, 114, 187, 25, 11, 7, 167, 200, 238, 10, 109, 112, 158, 2, 252, 225, 205, 247, 226, 236, 192, 52, 4, 205, 40, 52, 47, 97, 145, 114, 254, 156, 233, 133, 131, 255, 142, 79, 18, 50, 238, 242, 129, 131, 195, 254, 59, 27, 76, 111, 173, 115, 59, 181, 252, 188, 46, 194, 32, 5, 197, 142, 241, 131, 125, 22, 131, 178, 198, 243, 74, 38, 193, 178, 239, 250, 136, 107, 66, 56, 97, 40, 92, 151, 255, 255, 255, 255, 255, 255, 255, 255 } DH Base: { 2 } Server DH Public Key: { 7, 92, 128, 188, 177, 218, 215, 118, 100, 4, 182, 21, 196, 103, 176, 134, 204, 128, 74, 8, 50, 111, 236, 189, 57, 145, 206, 148, 176, 45, 85, 196, 244, 199, 194, 170, 101, 146, 120, 27, 101, 73, 130, 3, 230, 206, 236, 76, 210, 200, 205, 201, 78, 207, 173, 51, 31, 1, 87, 84, 146, 242, 45, 40, 213, 97, 72, 223, 48, 117, 162, 140, 56, 165, 172, 208, 80, 91, 24, 163, 153, 230, 120, 52, 93, 13, 100, 124, 99, 250, 92, 29, 17, 52, 5, 118, 49, 210, 94, 55, 207, 38, 122, 232, 5, 162, 54, 247, 25, 104, 231, 247, 24, 172, 142, 16, 13, 20, 32, 64, 201, 67, 193, 246, 152, 17, 101, 62, 69, 207, 38, 49, 227, 95, 10, 41, 25, 64, 51, 61, 249, 156, 181, 124, 12, 53, 44, 103, 138, 153, 107, 206, 192, 215, 104, 229, 85, 26, 64, 206, 171, 85, 40, 144, 207, 215, 121, 204, 59, 166, 186, 238, 151, 186, 26, 3, 102, 103, 220, 236, 169, 181, 138, 74, 219, 67, 240, 77, 152, 43, 48, 29, 130, 213, 33, 65, 2, 244, 77, 91, 157, 114, 55, 93, 212, 183, 101, 92, 100, 226, 24, 33, 246, 244, 51, 165, 98, 3, 35, 180, 245, 104, 26, 96, 28, 205, 226, 138, 194, 122, 86, 103, 255, 140, 40, 85, 26, 20, 230, 104, 77, 155, 241, 245, 213, 157, 70, 68, 190, 82, 45, 14, 33, 234, 214, 190 } Anonymous check handshake state: certificate_request[13] *** CertificateRequest Cert Types: RSA, DSS, ECDSA Supported Signature Algorithms: SHA512withECDSA, SHA512withRSA, SHA384withECDSA, SHA384withRSA, SHA256withECDSA, SHA256withRSA, SHA256withDSA, SHA1withECDSA, SHA1withRSA, SHA1withDSA Cert Authorities: update handshake state: certificate_request[13] upcoming handshake states: server_hello_done[14] upcoming handshake states: client certificate[11](optional) upcoming handshake states: client_key_exchange[16] upcoming handshake states: certificate_verify[15](optional) upcoming handshake states: client change_cipher_spec[-1] upcoming handshake states: client finished[20] upcoming handshake states: server change_cipher_spec[-1] upcoming handshake states: server finished[20] check handshake state: server_hello_done[14] update handshake state: server_hello_done[14] upcoming handshake states: client certificate[11](optional) upcoming handshake states: client_key_exchange[16] upcoming handshake states: certificate_verify[15](optional) upcoming handshake states: client change_cipher_spec[-1] upcoming handshake states: client finished[20] upcoming handshake states: server change_cipher_spec[-1] upcoming handshake states: server finished[20] *** ServerHelloDone matching alias: front-client *** Certificate chain chain [0] = [ [ Version: V3 Subject: CN=tech-user-front, OU=IT, O=maxant, C=CH Signature Algorithm: SHA1withDSA, OID = 1.2.840.10040.4.3 Key: Sun DSA Public Key Parameters:DSA p: fd7f5381 1d751229 52df4a9c 2eece4e7 f611b752 3cef4400 c31e3f80 b6512669 455d4022 51fb593d 8d58fabf c5f5ba30 f6cb9b55 6cd7813b 801d346f f26660b7 6b9950a5 a49f9fe8 047b1022 c24fbba9 d7feb7c6 1bf83b57 e7c6a8a6 150f04fb 83f6d3c5 1ec30235 54135a16 9132f675 f3ae2b61 d72aeff2 2203199d d14801c7 q: 9760508f 15230bcc b292b982 a2eb840b f0581cf5 g: f7e1a085 d69b3dde cbbcab5c 36b857b9 7994afbb fa3aea82 f9574c0b 3d078267 5159578e bad4594f e6710710 8180b449 167123e8 4c281613 b7cf0932 8cc8a6e1 3c167a8b 547c8d28 e0a3ae1e 2bb3a675 916ea37f 0bfa2135 62f1fb62 7a01243b cca4f1be a8519089 a883dfe1 5ae59f06 928b665e 807b5525 64014c3b fecf492a y: e09cb3d4 69ffdbb9 ee4f1d06 f601d288 07ec6bc4 dee82f35 3d20ea17 fb317426 6d56f912 a030c969 8bba144e deff5bf5 34849eae 04714a09 6b8dd72e f5743e82 8ee2def3 941b47f6 2d08344a d51782fd 6f386c9e fc3af60f 87c690be 1e8d3315 d13efaf5 9b863b53 7b23a44d a442f886 545d002a 00b2f6d4 a24fb6dd 38573e63 Validity: [From: Sun Feb 25 00:31:19 IST 2018, To: Sat May 26 00:31:19 IST 2018] Issuer: CN=maxant ca, OU=IT, O=maxant, C=CH SerialNumber: [ 1798c8f4] Certificate Extensions: 4 [1]: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: 0C 91 17 EE CB 17 EE ED AC D0 7B 1E A5 82 FC 0F ................ 0010: 9F 3A FF F6 .:.. ] ] [2]: ObjectId: 2.5.29.37 Criticality=false ExtendedKeyUsages [ clientAuth ] [3]: ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_Encipherment ] [4]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 61 2E D3 6D 45 D9 4C BD A4 73 1F EC 94 CB 4D 89 a..mE.L..s....M. 0010: 15 00 E2 90 .... ] ] ] Algorithm: [SHA1withDSA] Signature: 0000: 30 2C 02 14 7E 1B FC 1E 8F A9 56 DA 94 82 73 99 0,........V...s. 0010: 5D 7B F1 9F C1 B7 1A AC 02 14 09 D0 38 49 66 79 ]...........8Ify 0020: 65 99 FF 6A 6D E7 72 16 68 76 12 D9 93 38 e..jm.r.hv...8 ] chain [1] = [ [ Version: V3 Subject: CN=maxant ca, OU=IT, O=maxant, C=CH Signature Algorithm: SHA1withDSA, OID = 1.2.840.10040.4.3 Key: Sun DSA Public Key Parameters:DSA p: fd7f5381 1d751229 52df4a9c 2eece4e7 f611b752 3cef4400 c31e3f80 b6512669 455d4022 51fb593d 8d58fabf c5f5ba30 f6cb9b55 6cd7813b 801d346f f26660b7 6b9950a5 a49f9fe8 047b1022 c24fbba9 d7feb7c6 1bf83b57 e7c6a8a6 150f04fb 83f6d3c5 1ec30235 54135a16 9132f675 f3ae2b61 d72aeff2 2203199d d14801c7 q: 9760508f 15230bcc b292b982 a2eb840b f0581cf5 g: f7e1a085 d69b3dde cbbcab5c 36b857b9 7994afbb fa3aea82 f9574c0b 3d078267 5159578e bad4594f e6710710 8180b449 167123e8 4c281613 b7cf0932 8cc8a6e1 3c167a8b 547c8d28 e0a3ae1e 2bb3a675 916ea37f 0bfa2135 62f1fb62 7a01243b cca4f1be a8519089 a883dfe1 5ae59f06 928b665e 807b5525 64014c3b fecf492a y: c4ca2fd5 b201cf58 5b0c9381 31dd3a55 be945c34 0b86d6ab 3aa68026 cc1cebdf eaf1964c 08e0062b f2269795 e9e83fa2 464fb9cf 9fde043b 245f97b9 86393863 f0974f34 0c938716 90bee46b 7cd226dd 958a4bee 345d434d cbbff883 c664fe33 dbbf27e4 2e8cb40f 7ec5cf09 bb11bad2 1ac6e004 77c15d99 a4f7fdcb 41e6fab2 Validity: [From: Sun Feb 25 00:31:17 IST 2018, To: Sat May 26 00:31:17 IST 2018] Issuer: CN=maxant root, OU=IT, O=maxant, C=CH SerialNumber: [ 784005e2] Certificate Extensions: 3 [1]: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: 28 C9 B2 87 03 4A B7 DB F7 FD 44 9A 5B 5D 61 12 (....J....D.[]a. 0010: A9 8F 7D 3B ...; ] ] [2]: ObjectId: 2.5.29.19 Criticality=false BasicConstraints:[ CA:true PathLen:0 ] [3]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 0C 91 17 EE CB 17 EE ED AC D0 7B 1E A5 82 FC 0F ................ 0010: 9F 3A FF F6 .:.. ] ] ] Algorithm: [SHA1withDSA] Signature: 0000: 30 2C 02 14 24 27 CD 32 9D 61 88 97 54 35 7C 2F 0,..$'.2.a..T5./ 0010: 2C 3B 43 A4 06 58 F0 C8 02 14 03 53 79 1B 9D C4 ,;C..X.....Sy... 0020: AD FC A2 51 08 51 B6 F3 53 12 3D 60 5A C9 ...Q.Q..S.=`Z. ] *** update handshake state: certificate[11] upcoming handshake states: client_key_exchange[16] upcoming handshake states: certificate_verify[15](optional) upcoming handshake states: client change_cipher_spec[-1] upcoming handshake states: client finished[20] upcoming handshake states: server change_cipher_spec[-1] upcoming handshake states: server finished[20] *** ClientKeyExchange, DH DH Public key: { 75, 66, 166, 199, 98, 90, 232, 2, 79, 243, 252, 30, 230, 30, 73, 187, 109, 173, 130, 90, 145, 102, 174, 3, 171, 8, 90, 163, 203, 53, 224, 68, 190, 36, 63, 188, 218, 236, 50, 201, 157, 213, 126, 3, 153, 195, 207, 62, 110, 166, 47, 78, 165, 78, 19, 142, 121, 208, 173, 163, 35, 76, 11, 61, 110, 121, 249, 183, 204, 212, 80, 227, 18, 219, 151, 217, 161, 64, 146, 240, 50, 85, 5, 41, 149, 117, 41, 160, 16, 21, 53, 178, 253, 212, 243, 13, 78, 133, 178, 110, 182, 173, 175, 31, 235, 71, 71, 74, 56, 144, 225, 211, 204, 29, 152, 120, 157, 135, 35, 143, 175, 0, 29, 16, 42, 142, 227, 163, 97, 87, 24, 191, 185, 60, 1, 65, 209, 174, 30, 7, 222, 102, 249, 167, 102, 173, 10, 124, 206, 214, 251, 210, 224, 124, 23, 107, 170, 126, 179, 170, 188, 104, 236, 56, 221, 192, 159, 213, 85, 219, 37, 61, 205, 182, 148, 253, 91, 155, 93, 59, 15, 183, 73, 236, 241, 248, 94, 110, 220, 106, 178, 161, 149, 74, 17, 80, 55, 14, 147, 32, 1, 147, 67, 17, 64, 210, 30, 157, 25, 43, 197, 216, 41, 201, 73, 90, 152, 77, 199, 38, 94, 123, 242, 176, 32, 134, 90, 204, 240, 60, 172, 227, 167, 105, 229, 84, 67, 19, 160, 55, 127, 98, 154, 29, 149, 135, 30, 215, 155, 241, 239, 35, 63, 208, 71, 52 } update handshake state: client_key_exchange[16] upcoming handshake states: certificate_verify[15](optional) upcoming handshake states: client change_cipher_spec[-1] upcoming handshake states: client finished[20] upcoming handshake states: server change_cipher_spec[-1] upcoming handshake states: server finished[20] main, WRITE: TLSv1.2 Handshake, length = 1873 SESSION KEYGEN: PreMaster Secret: 0000: 2B FD D5 28 17 AE 5F E4 1F 16 08 9A 7C C6 3C 1D +..(.._.......<. 0010: 9B 14 DB 38 5C 5A D2 02 3E 38 38 51 3F 2C 49 E1 ...8\Z..>88Q?,I. 0020: F7 82 D5 AD 39 CB 8D 4F 88 AA 3A 16 AB A9 45 76 ....9..O..:...Ev 0030: 99 C9 C3 48 84 F5 F9 4B 2E 74 C5 E7 6B 9A D4 61 ...H...K.t..k..a 0040: 7D 85 E8 CB 28 E4 25 18 28 B8 73 92 9C CD 41 54 ....(.%.(.s...AT 0050: 19 42 86 0C 89 B8 A9 F1 A2 C0 FB 5E FB 55 35 53 .B.........^.U5S 0060: 83 7E D7 2B 10 4C 21 F9 B3 18 E0 D7 1F E1 C8 3C ...+.L!........< 0070: 48 D2 88 38 50 1B 0C 1E A9 98 B9 E7 F5 F9 12 8B H..8P........... 0080: 70 DC 48 90 04 B2 EE 6A 32 62 E9 0E 0F 19 37 64 p.H....j2b....7d 0090: C5 81 7F 7C 60 F7 11 01 81 08 D5 64 DD 70 71 08 ....`......d.pq. 00A0: AA FB 94 B6 FB D5 7F 0F 8F 5F A5 A7 73 6B 17 BC ........._..sk.. 00B0: 81 D0 45 F8 4A 09 67 D6 79 9F 2C 9D 61 24 16 09 ..E.J.g.y.,.a$.. 00C0: 6D 6B B6 8E 97 2E 95 30 E3 CF B6 68 A9 E9 5F D2 mk.....0...h.._. 00D0: 5C AA B4 B3 2D 40 01 10 AF B0 A9 51 78 B2 65 37 \...-@.....Qx.e7 00E0: 9E 6D C1 B1 F2 A5 F1 88 35 F9 28 96 3C 67 58 0E .m......5.(._...q...'i..+. CONNECTION KEYGEN: Client Nonce: 0000: FF FA DD 78 07 A5 B2 3D D4 FB 77 70 3E 35 99 58 ...x...=..wp>5.X 0010: 49 CC DD E3 49 2E 7C 01 FB F6 65 D7 D0 58 E4 21 I...I.....e..X.! Server Nonce: 0000: 85 86 C2 8A CB B6 B2 55 A4 05 CB 9A D3 D9 F9 11 .......U........ 0010: 4B 0D 1A AE 30 DD AA 10 EC 45 B4 32 A9 BE EC CF K...0....E.2.... Master Secret: 0000: EB 6F F5 BE 5D DC 31 3C 32 21 BA ED 44 36 4F 4E .o..].1<2!..D6ON 0010: C7 E0 B8 12 3C 62 9D 82 C2 36 29 04 77 FB 8F 8F ....