System property jdk.tls.client.cipherSuites is set to 'null' System property jdk.tls.server.cipherSuites is set to 'null' Ignoring disabled cipher suite: SSL_DH_anon_EXPORT_WITH_RC4_40_MD5 Ignoring disabled cipher suite: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA Ignoring disabled cipher suite: SSL_DH_anon_WITH_RC4_128_MD5 Ignoring disabled cipher suite: TLS_ECDH_anon_WITH_RC4_128_SHA Ignoring disabled cipher suite: TLS_KRB5_EXPORT_WITH_RC4_40_SHA Ignoring disabled cipher suite: TLS_KRB5_WITH_RC4_128_SHA Ignoring disabled cipher suite: SSL_RSA_EXPORT_WITH_RC4_40_MD5 Ignoring disabled cipher suite: TLS_KRB5_EXPORT_WITH_RC4_40_MD5 Ignoring disabled cipher suite: TLS_ECDH_ECDSA_WITH_RC4_128_SHA Ignoring disabled cipher suite: TLS_KRB5_WITH_RC4_128_MD5 Ignoring disabled cipher suite: SSL_RSA_WITH_RC4_128_SHA Ignoring disabled cipher suite: TLS_ECDH_RSA_WITH_RC4_128_SHA Ignoring disabled cipher suite: TLS_ECDHE_RSA_WITH_RC4_128_SHA Ignoring disabled cipher suite: SSL_RSA_WITH_RC4_128_MD5 *** found key for : test certificate chain [0] = [ [ Version: V3 Subject: C=US, O=ABC Company, CN=Test Certificate Signature Algorithm: SHA256withECDSA, OID = 1.2.840.10045.4.3.2 Key: Sun EC public key, 384 bits public x coord: 18250667400311942956078515610023748990866358911468767251095613464127253381198027360807602725212201472554614375258576 public y coord: 19390256749293149503582795626387499740755960616358078017095235100514075130865573388359116303584673777973232821325934 parameters: secp384r1 [NIST P-384] (1.3.132.0.34) Validity: [From: Thu Jun 28 18:10:01 IST 2018, To: Mon Dec 31 05:30:00 IST 2035] Issuer: C=US, O=ABC Company, CN=Test Certificate SerialNumber: [ db425278 291a46eb 309d6782 6534038f] Certificate Extensions: 3 [1]: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: 0F A2 FF B2 1F 74 B7 72 75 3B 1C 77 3F A1 6C B4 .....t.ru;.w?.l. 0010: 0A 57 11 DB .W.. ] ] [2]: ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:true PathLen:2147483647 ] [3]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 0F A2 FF B2 1F 74 B7 72 75 3B 1C 77 3F A1 6C B4 .....t.ru;.w?.l. 0010: 0A 57 11 DB .W.. ] ] ] Algorithm: [SHA256withECDSA] Signature: 0000: 30 65 02 30 7D 63 66 5B EA ED 67 DF B9 AB 24 E5 0e.0.cf[..g...$. 0010: 3C BE 2C 60 16 39 D9 24 E6 8B D1 E6 12 F9 30 17 <.,`.9.$......0. 0020: BB 43 7A E0 A6 69 A1 32 20 BF 60 9C 28 1D F0 BE .Cz..i.2 .`.(... 0030: 84 53 F8 79 02 31 00 D2 77 24 E6 47 26 92 E7 27 .S.y.1..w$.G&..' 0040: 20 C8 B1 18 0D 0C F8 20 24 21 52 3D B0 56 90 9E ...... $!R=.V.. 0050: 0B 0F FD BE AA 88 3A 9D 45 1E 57 F8 84 28 9C D8 ......:.E.W..(.. 0060: 6F 2A 1D 9F 8B D5 0E o*..... ] *** adding as trusted cert: Subject: C=US, O=ABC Company, CN=Test Certificate Issuer: C=US, O=ABC Company, CN=Test Certificate Algorithm: EC; Serial number: 0xdb425278291a46eb309d67826534038f Valid from Thu Jun 28 18:10:01 IST 2018 until Mon Dec 31 05:30:00 IST 2035 trigger seeding of SecureRandom done seeding SecureRandom Server URL: https://192.168.137.1:14443/ Wait for connection... Allow unsafe renegotiation: false Allow legacy hello messages: true Is initial handshake: true Is secure renegotiation: false Connection from /192.168.137.1:55277 Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_256_GCM_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_128_GCM_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_256_GCM_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_128_GCM_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1.1 [Raw read]: length = 5 0000: 16 03 01 01 2F ..../ [Raw read]: length = 303 0000: 01 00 01 2B 03 03 9D 91 83 88 4B 42 5E 7D AE 24 ...+......KB^..$ 0010: 8F A3 C1 F3 A5 0C 93 EC 9A AA FD 43 7C 6C 96 10 ...........C.l.. 0020: 90 FB C6 0C 43 F6 00 00 AC C0 30 C0 2C C0 28 C0 ....C.....0.,.(. 0030: 24 C0 14 C0 0A 00 A5 00 A3 00 A1 00 9F 00 6B 00 $.............k. 0040: 6A 00 69 00 68 00 39 00 38 00 37 00 36 00 88 00 j.i.h.9.8.7.6... 0050: 87 00 86 00 85 C0 32 C0 2E C0 2A C0 26 C0 0F C0 ......2...*.&... 0060: 05 00 9D 00 3D 00 35 00 84 C0 2F C0 2B C0 27 C0 ....=.5.../.+.'. 0070: 23 C0 13 C0 09 00 A4 00 A2 00 A0 00 9E 00 67 00 #.............g. 0080: 40 00 3F 00 3E 00 33 00 32 00 31 00 30 00 9A 00 @.?.>.3.2.1.0... 0090: 99 00 98 00 97 00 45 00 44 00 43 00 42 C0 31 C0 ......E.D.C.B.1. 00A0: 2D C0 29 C0 25 C0 0E C0 04 00 9C 00 3C 00 2F 00 -.).%.......<./. 00B0: 96 00 41 00 07 C0 11 C0 07 C0 0C C0 02 00 05 00 ..A............. 00C0: 04 C0 12 C0 08 00 16 00 13 00 10 00 0D C0 0D C0 ................ 00D0: 03 00 0A 00 FF 02 01 00 00 55 00 0B 00 04 03 00 .........U...... 00E0: 01 02 00 0A 00 1C 00 1A 00 17 00 19 00 1C 00 1B ................ 00F0: 00 18 00 1A 00 16 00 0E 00 0D 00 0B 00 0C 00 09 ................ 0100: 00 0A 00 23 00 00 00 0D 00 20 00 1E 06 01 06 02 ...#..... ...... 0110: 06 03 05 01 05 02 05 03 04 01 04 02 04 03 03 01 ................ 0120: 03 02 03 03 02 01 02 02 02 03 00 0F 00 01 01 ............... main, READ: TLSv1 Handshake, length = 303 check handshake state: client_hello[1] update handshake state: client_hello[1] upcoming handshake states: server_hello[2] *** ClientHello, TLSv1.2 RandomCookie: random_bytes = {9D 91 83 88 4B 42 5E 7D AE 24 8F A3 C1 F3 A5 0C 93 EC 9A AA FD 43 7C 6C 96 10 90 FB C6 0C 43 F6} Session ID: {} Cipher Suites: [TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_DH_DSS_WITH_AES_256_GCM_SHA384, TLS_DHE_DSS_WITH_AES_256_GCM_SHA384, TLS_DH_RSA_WITH_AES_256_GCM_SHA384, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, TLS_DHE_RSA_WITH_AES_256_CBC_SHA256, TLS_DHE_DSS_WITH_AES_256_CBC_SHA256, TLS_DH_RSA_WITH_AES_256_CBC_SHA256, TLS_DH_DSS_WITH_AES_256_CBC_SHA256, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_DSS_WITH_AES_256_CBC_SHA, TLS_DH_RSA_WITH_AES_256_CBC_SHA, TLS_DH_DSS_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA, TLS_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA, TLS_DH_RSA_WITH_CAMELLIA_256_CBC_SHA, TLS_DH_DSS_WITH_CAMELLIA_256_CBC_SHA, TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384, TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384, TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDH_RSA_WITH_AES_256_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_256_GCM_SHA384, TLS_RSA_WITH_AES_256_CBC_SHA256, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_CAMELLIA_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_DH_DSS_WITH_AES_128_GCM_SHA256, TLS_DHE_DSS_WITH_AES_128_GCM_SHA256, TLS_DH_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_DSS_WITH_AES_128_CBC_SHA256, TLS_DH_RSA_WITH_AES_128_CBC_SHA256, TLS_DH_DSS_WITH_AES_128_CBC_SHA256, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, TLS_DH_RSA_WITH_AES_128_CBC_SHA, TLS_DH_DSS_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_SEED_CBC_SHA, TLS_DHE_DSS_WITH_SEED_CBC_SHA, TLS_DH_RSA_WITH_SEED_CBC_SHA, TLS_DH_DSS_WITH_SEED_CBC_SHA, TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA, TLS_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA, TLS_DH_RSA_WITH_CAMELLIA_128_CBC_SHA, TLS_DH_DSS_WITH_CAMELLIA_128_CBC_SHA, TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_128_GCM_SHA256, TLS_RSA_WITH_AES_128_CBC_SHA256, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_SEED_CBC_SHA, TLS_RSA_WITH_CAMELLIA_128_CBC_SHA, SSL_RSA_WITH_IDEA_CBC_SHA, TLS_ECDHE_RSA_WITH_RC4_128_SHA, TLS_ECDHE_ECDSA_WITH_RC4_128_SHA, TLS_ECDH_RSA_WITH_RC4_128_SHA, TLS_ECDH_ECDSA_WITH_RC4_128_SHA, SSL_RSA_WITH_RC4_128_SHA, SSL_RSA_WITH_RC4_128_MD5, TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA, SSL_DH_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DH_DSS_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, TLS_EMPTY_RENEGOTIATION_INFO_SCSV] Compression Methods: { 1, 0 } Extension ec_point_formats, formats: [uncompressed, ansiX962_compressed_prime, ansiX962_compressed_char2] Extension elliptic_curves, curve names: {secp256r1, secp521r1, unknown curve 28, unknown curve 27, secp384r1, unknown curve 26, secp256k1, sect571r1, sect571k1, sect409k1, sect409r1, sect283k1, sect283r1} Unsupported extension type_35, data: Extension signature_algorithms, signature_algorithms: SHA512withRSA, Unknown (hash:0x6, signature:0x2), SHA512withECDSA, SHA384withRSA, Unknown (hash:0x5, signature:0x2), SHA384withECDSA, SHA256withRSA, SHA256withDSA, SHA256withECDSA, Unknown (hash:0x3, signature:0x1), Unknown (hash:0x3, signature:0x2), Unknown (hash:0x3, signature:0x3), SHA1withRSA, SHA1withDSA, SHA1withECDSA Unsupported extension type_15, data: 01 *** %% Initialized: [Session-2, SSL_NULL_WITH_NULL_NULL] matching alias: test certificate Standard ciphersuite chosen: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 %% Negotiating: [Session-2, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384] *** ServerHello, TLSv1.2 RandomCookie: random_bytes = {6C 28 B5 7E 91 49 32 F4 33 A4 16 A7 DE 39 30 22 5E 36 6C 0C D4 68 7E 3A E4 36 C0 4A C8 5A 3F 26} Session ID: {71, 249, 48, 90, 134, 145, 152, 84, 139, 89, 71, 218, 32, 111, 231, 48, 141, 192, 199, 200, 142, 221, 98, 52, 107, 226, 239, 157, 253, 194, 110, 127} Cipher Suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 Compression Method: 0 Extension renegotiation_info, renegotiated_connection: *** Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 update handshake state: server_hello[2] upcoming handshake states: server certificate[11] upcoming handshake states: server_key_exchange[12](optional) upcoming handshake states: certificate_request[13](optional) upcoming handshake states: server_hello_done[14] upcoming handshake states: client certificate[11](optional) upcoming handshake states: client_key_exchange[16] upcoming handshake states: certificate_verify[15](optional) upcoming handshake states: client change_cipher_spec[-1] upcoming handshake states: client finished[20] upcoming handshake states: server change_cipher_spec[-1] upcoming handshake states: server finished[20] *** Certificate chain chain [0] = [ [ Version: V3 Subject: C=US, O=ABC Company, CN=Test Certificate Signature Algorithm: SHA256withECDSA, OID = 1.2.840.10045.4.3.2 Key: Sun EC public key, 384 bits public x coord: 18250667400311942956078515610023748990866358911468767251095613464127253381198027360807602725212201472554614375258576 public y coord: 19390256749293149503582795626387499740755960616358078017095235100514075130865573388359116303584673777973232821325934 parameters: secp384r1 [NIST P-384] (1.3.132.0.34) Validity: [From: Thu Jun 28 18:10:01 IST 2018, To: Mon Dec 31 05:30:00 IST 2035] Issuer: C=US, O=ABC Company, CN=Test Certificate SerialNumber: [ db425278 291a46eb 309d6782 6534038f] Certificate Extensions: 3 [1]: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: 0F A2 FF B2 1F 74 B7 72 75 3B 1C 77 3F A1 6C B4 .....t.ru;.w?.l. 0010: 0A 57 11 DB .W.. ] ] [2]: ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:true PathLen:2147483647 ] [3]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 0F A2 FF B2 1F 74 B7 72 75 3B 1C 77 3F A1 6C B4 .....t.ru;.w?.l. 0010: 0A 57 11 DB .W.. ] ] ] Algorithm: [SHA256withECDSA] Signature: 0000: 30 65 02 30 7D 63 66 5B EA ED 67 DF B9 AB 24 E5 0e.0.cf[..g...$. 0010: 3C BE 2C 60 16 39 D9 24 E6 8B D1 E6 12 F9 30 17 <.,`.9.$......0. 0020: BB 43 7A E0 A6 69 A1 32 20 BF 60 9C 28 1D F0 BE .Cz..i.2 .`.(... 0030: 84 53 F8 79 02 31 00 D2 77 24 E6 47 26 92 E7 27 .S.y.1..w$.G&..' 0040: 20 C8 B1 18 0D 0C F8 20 24 21 52 3D B0 56 90 9E ...... $!R=.V.. 0050: 0B 0F FD BE AA 88 3A 9D 45 1E 57 F8 84 28 9C D8 ......:.E.W..(.. 0060: 6F 2A 1D 9F 8B D5 0E o*..... ] *** update handshake state: certificate[11] upcoming handshake states: server_key_exchange[12](optional) upcoming handshake states: certificate_request[13](optional) upcoming handshake states: server_hello_done[14] upcoming handshake states: client certificate[11](optional) upcoming handshake states: client_key_exchange[16] upcoming handshake states: certificate_verify[15](optional) upcoming handshake states: client change_cipher_spec[-1] upcoming handshake states: client finished[20] upcoming handshake states: server change_cipher_spec[-1] upcoming handshake states: server finished[20] *** ECDH ServerKeyExchange Signature Algorithm SHA512withECDSA Server key: Sun EC public key, 256 bits public x coord: 85856167984414307759122293800383320821632267262440496577918959108458733941649 public y coord: 39461815664700024782179057016310390491515111634626707772548863058853437748966 parameters: secp256r1 [NIST P-256, X9.62 prime256v1] (1.2.840.10045.3.1.7) update handshake state: server_key_exchange[12] upcoming handshake states: certificate_request[13](optional) upcoming handshake states: server_hello_done[14] upcoming handshake states: client certificate[11](optional) upcoming handshake states: client_key_exchange[16] upcoming handshake states: certificate_verify[15](optional) upcoming handshake states: client change_cipher_spec[-1] upcoming handshake states: client finished[20] upcoming handshake states: server change_cipher_spec[-1] upcoming handshake states: server finished[20] *** ServerHelloDone update handshake state: server_hello_done[14] upcoming handshake states: client certificate[11](optional) upcoming handshake states: client_key_exchange[16] upcoming handshake states: certificate_verify[15](optional) upcoming handshake states: client change_cipher_spec[-1] upcoming handshake states: client finished[20] upcoming handshake states: server change_cipher_spec[-1] upcoming handshake states: server finished[20] main, WRITE: TLSv1.2 Handshake, length = 801 [Raw write]: length = 806 0000: 16 03 03 03 21 02 00 00 4D 03 03 6C 28 B5 7E 91 ....!...M..l(... 0010: 49 32 F4 33 A4 16 A7 DE 39 30 22 5E 36 6C 0C D4 I2.3....90"^6l.. 0020: 68 7E 3A E4 36 C0 4A C8 5A 3F 26 20 47 F9 30 5A h.:.6.J.Z?& G.0Z 0030: 86 91 98 54 8B 59 47 DA 20 6F E7 30 8D C0 C7 C8 ...T.YG. o.0.... 0040: 8E DD 62 34 6B E2 EF 9D FD C2 6E 7F C0 2C 00 00 ..b4k.....n..,.. 0050: 05 FF 01 00 01 00 0B 00 02 15 00 02 12 00 02 0F ................ 0060: 30 82 02 0B 30 82 01 91 A0 03 02 01 02 02 11 00 0...0........... 0070: DB 42 52 78 29 1A 46 EB 30 9D 67 82 65 34 03 8F .BRx).F.0.g.e4.. 0080: 30 0A 06 08 2A 86 48 CE 3D 04 03 02 30 3E 31 19 0...*.H.=...0>1. 0090: 30 17 06 03 55 04 03 0C 10 54 65 73 74 20 43 65 0...U....Test Ce 00A0: 72 74 69 66 69 63 61 74 65 31 14 30 12 06 03 55 rtificate1.0...U 00B0: 04 0A 0C 0B 41 42 43 20 43 6F 6D 70 61 6E 79 31 ....ABC Company1 00C0: 0B 30 09 06 03 55 04 06 13 02 55 53 30 1E 17 0D .0...U....US0... 00D0: 31 38 30 36 32 38 31 32 34 30 30 31 5A 17 0D 33 180628124001Z..3 00E0: 35 31 32 33 31 30 30 30 30 30 30 5A 30 3E 31 19 51231000000Z0>1. 00F0: 30 17 06 03 55 04 03 0C 10 54 65 73 74 20 43 65 0...U....Test Ce 0100: 72 74 69 66 69 63 61 74 65 31 14 30 12 06 03 55 rtificate1.0...U 0110: 04 0A 0C 0B 41 42 43 20 43 6F 6D 70 61 6E 79 31 ....ABC Company1 0120: 0B 30 09 06 03 55 04 06 13 02 55 53 30 76 30 10 .0...U....US0v0. 0130: 06 07 2A 86 48 CE 3D 02 01 06 05 2B 81 04 00 22 ..*.H.=....+..." 0140: 03 62 00 04 76 93 B4 E2 67 36 CB 54 86 3A F1 9B .b..v...g6.T.:.. 0150: FE 9C 54 41 30 02 74 64 6C FB 1C 44 A6 22 F3 46 ..TA0.tdl..D.".F 0160: 28 37 BB D5 58 C8 09 F0 FE 6A F3 EC 2F 56 46 38 (7..X....j../VF8 0170: 15 D3 19 D0 7D FB 25 73 DD 2E A3 E1 02 65 15 91 ......%s.....e.. 0180: B2 F1 CD B4 17 0D 18 0F 0A 69 36 AA 6F DD 57 07 .........i6.o.W. 0190: 1A AA EB 18 96 D4 19 03 44 9D C3 8F 55 3F E1 09 ........D...U?.. 01A0: E4 F7 D0 6E A3 53 30 51 30 0F 06 03 55 1D 13 01 ...n.S0Q0...U... 01B0: 01 FF 04 05 30 03 01 01 FF 30 1F 06 03 55 1D 23 ....0....0...U.# 01C0: 04 18 30 16 80 14 0F A2 FF B2 1F 74 B7 72 75 3B ..0........t.ru; 01D0: 1C 77 3F A1 6C B4 0A 57 11 DB 30 1D 06 03 55 1D .w?.l..W..0...U. 01E0: 0E 04 16 04 14 0F A2 FF B2 1F 74 B7 72 75 3B 1C ..........t.ru;. 01F0: 77 3F A1 6C B4 0A 57 11 DB 30 0A 06 08 2A 86 48 w?.l..W..0...*.H 0200: CE 3D 04 03 02 03 68 00 30 65 02 30 7D 63 66 5B .=....h.0e.0.cf[ 0210: EA ED 67 DF B9 AB 24 E5 3C BE 2C 60 16 39 D9 24 ..g...$.<.,`.9.$ 0220: E6 8B D1 E6 12 F9 30 17 BB 43 7A E0 A6 69 A1 32 ......0..Cz..i.2 0230: 20 BF 60 9C 28 1D F0 BE 84 53 F8 79 02 31 00 D2 .`.(....S.y.1.. 0240: 77 24 E6 47 26 92 E7 27 20 C8 B1 18 0D 0C F8 20 w$.G&..' ...... 0250: 24 21 52 3D B0 56 90 9E 0B 0F FD BE AA 88 3A 9D $!R=.V........:. 0260: 45 1E 57 F8 84 28 9C D8 6F 2A 1D 9F 8B D5 0E 0C E.W..(..o*...... 0270: 00 00 AF 03 00 17 41 04 BD D0 DE 77 9F 56 EE 37 ......A....w.V.7 0280: 05 F0 6D 02 D7 C9 CE 00 58 B0 5A 03 B0 5C A9 90 ..m.....X.Z..\.. 0290: FB 0F A1 86 FF 20 B3 91 57 3E 98 9D CE D8 25 EA ..... ..W>....%. 02A0: 3F 4B 76 D6 0F F9 A4 42 B4 04 4F 95 A1 AC C0 EE ?Kv....B..O..... 02B0: 0C 6B 8A 15 7A F9 B6 E6 06 03 00 66 30 64 02 30 .k..z......f0d.0 02C0: 6B 33 D6 DA 24 10 AE 02 9C 09 72 EF 37 2F E0 D9 k3..$.....r.7/.. 02D0: E4 E4 0B E9 4E C7 4B 1B 50 EC 7B 02 ED D2 AF 21 ....N.K.P......! 02E0: EB 48 98 1A DF A0 BF 98 7E FC 10 B5 41 41 03 6A .H..........AA.j 02F0: 02 30 53 7A F1 2A 42 CC 5E DD 30 58 98 02 ED 95 .0Sz.*B.^.0X.... 0300: 98 E1 99 4B 46 3A FE 48 41 F2 47 67 DF 88 7D 06 ...KF:.HA.Gg.... 0310: C0 7E BF 85 30 91 CF 56 4D C9 20 6E 57 65 89 36 ....0..VM. nWe.6 0320: 82 4C 0E 00 00 00 .L.... [Raw read]: length = 5 0000: 16 03 03 00 46 ....F [Raw read]: length = 70 0000: 10 00 00 42 41 04 55 F1 54 2C F5 28 C8 90 4E FB ...BA.U.T,.(..N. 0010: 8D 7A EA 05 04 1A 4E E7 FE 0D 6E 13 3B F4 F7 3A .z....N...n.;..: 0020: D7 01 30 14 11 A5 6F 39 AE E6 B9 B2 E6 9A B4 C2 ..0...o9........ 0030: B6 FD 09 E0 89 24 BD 5C 31 AE D6 30 3E CC B3 E2 .....$.\1..0>... 0040: A8 87 73 6F 42 20 ..soB main, READ: TLSv1.2 Handshake, length = 70 check handshake state: client_key_exchange[16] update handshake state: client_key_exchange[16] upcoming handshake states: certificate_verify[15](optional) upcoming handshake states: client change_cipher_spec[-1] upcoming handshake states: client finished[20] upcoming handshake states: server change_cipher_spec[-1] upcoming handshake states: server finished[20] *** ECDHClientKeyExchange ECDH Public value: { 4, 85, 241, 84, 44, 245, 40, 200, 144, 78, 251, 141, 122, 234, 5, 4, 26, 78, 231, 254, 13, 110, 19, 59, 244, 247, 58, 215, 1, 48, 20, 17, 165, 111, 57, 174, 230, 185, 178, 230, 154, 180, 194, 182, 253, 9, 224, 137, 36, 189, 92, 49, 174, 214, 48, 62, 204, 179, 226, 168, 135, 115, 111, 66, 32 } SESSION KEYGEN: PreMaster Secret: 0000: E9 0E D4 EE 01 A9 74 5F 41 20 68 A8 CE F5 76 52 ......t_A h...vR 0010: 3D 07 E8 EE B3 79 A1 C5 62 5B B1 4E 7B 86 13 BB =....y..b[.N.... CONNECTION KEYGEN: Client Nonce: 0000: 9D 91 83 88 4B 42 5E 7D AE 24 8F A3 C1 F3 A5 0C ....KB^..$...... 0010: 93 EC 9A AA FD 43 7C 6C 96 10 90 FB C6 0C 43 F6 .....C.l......C. Server Nonce: 0000: 6C 28 B5 7E 91 49 32 F4 33 A4 16 A7 DE 39 30 22 l(...I2.3....90" 0010: 5E 36 6C 0C D4 68 7E 3A E4 36 C0 4A C8 5A 3F 26 ^6l..h.:.6.J.Z?& Master Secret: 0000: 95 26 1D 62 AC A3 CD FE 91 B5 0B 3A 40 B8 55 A4 .&.b.......:@.U. 0010: 63 22 16 F8 7D 2E 1B 86 5E 89 09 DF 9F 90 08 AF c"......^....... 0020: 5A 6D D5 0C 6A 63 9E 83 28 16 73 D1 B2 AD E0 02 Zm..jc..(.s..... ... no MAC keys used for this cipher Client write key: 0000: 15 79 23 30 44 03 E2 8E B9 F0 4E A2 FE 2B 6F E4 .y#0D.....N..+o. 0010: EF F4 DA BE 24 2B 93 99 5F 19 7E 2E 2A 28 A1 4E ....$+.._...*(.N Server write key: 0000: 0A D7 38 EF D1 F8 57 D9 80 31 FF 79 2E 93 82 B9 ..8...W..1.y.... 0010: CA 42 5F 14 A8 56 8F 9D 9D B6 4B E6 36 2F 5C EF .B_..V....K.6/\. Client write IV: 0000: 9B 71 33 B2 .q3. Server write IV: 0000: EF D8 13 F3 .... [Raw read]: length = 5 0000: 14 03 03 00 01 ..... [Raw read]: length = 1 0000: 01 . main, READ: TLSv1.2 Change Cipher Spec, length = 1 update handshake state: change_cipher_spec upcoming handshake states: client finished[20] upcoming handshake states: server change_cipher_spec[-1] upcoming handshake states: server finished[20] [Raw read]: length = 5 0000: 16 03 03 00 28 ....( [Raw read]: length = 40 0000: 74 4A 35 74 94 0D B4 B0 0F FD 9C CF 46 06 F7 27 tJ5t........F..' 0010: F3 47 A5 2E F4 9C B7 46 22 9B E7 4D F3 C9 B6 35 .G.....F"..M...5 0020: B5 A6 FD 06 82 C8 3E 59 ......>Y main, READ: TLSv1.2 Handshake, length = 40 Padded plaintext after DECRYPTION: len = 16 0000: 14 00 00 0C 0A 54 2C 37 6C 91 BE 4F 12 22 5B 4F .....T,7l..O."[O check handshake state: finished[20] update handshake state: finished[20] upcoming handshake states: server change_cipher_spec[-1] upcoming handshake states: server finished[20] *** Finished verify_data: { 10, 84, 44, 55, 108, 145, 190, 79, 18, 34, 91, 79 } *** update handshake state: change_cipher_spec upcoming handshake states: server finished[20] main, WRITE: TLSv1.2 Change Cipher Spec, length = 1 [Raw write]: length = 6 0000: 14 03 03 00 01 01 ...... *** Finished verify_data: { 178, 188, 51, 5, 180, 148, 210, 237, 251, 4, 31, 196 } *** update handshake state: finished[20] main, WRITE: TLSv1.2 Handshake, length = 24 Padded plaintext before ENCRYPTION: len = 16 0000: 14 00 00 0C B2 BC 33 05 B4 94 D2 ED FB 04 1F C4 ......3......... [Raw write]: length = 45 0000: 16 03 03 00 28 00 00 00 00 00 00 00 00 E8 2E FE ....(........... 0010: 1C BE E1 87 86 8D 68 24 A9 08 CB F4 30 43 A7 56 ......h$....0C.V 0020: B1 46 AD C5 D4 5D E6 79 6E E9 DE 07 C8 .F...].yn.... %% Cached server session: [Session-2, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384] main, WRITE: TLSv1.2 Application Data, length = 33 Padded plaintext before ENCRYPTION: len = 25 0000: 49 20 61 6D 20 4A 61 76 61 20 76 65 72 73 69 6F I am Java versio 0010: 6E 3A 20 39 2E 30 2E 31 0A n: 9.0.1. [Raw write]: length = 54 0000: 17 03 03 00 31 00 00 00 00 00 00 00 01 4E F5 A9 ....1........N.. 0010: 65 AA 40 ED 5D 5C 9F B8 D9 67 F5 FD 92 25 10 54 e.@.]\...g...%.T 0020: 2D D2 A8 A9 2A BD 0D 2E 10 B1 32 22 AF 41 CF 08 -...*.....2".A.. 0030: DA C4 A7 BA 76 37 ....v7 Closing connection... main, called close() main, called closeInternal(true) main, SEND TLSv1.2 ALERT: warning, description = close_notify main, WRITE: TLSv1.2 Alert, length = 10 Padded plaintext before ENCRYPTION: len = 2 0000: 01 00 .. [Raw write]: length = 31 0000: 15 03 03 00 1A 00 00 00 00 00 00 00 02 ED 8A 8E ................ 0010: 59 B5 42 68 62 95 4F 49 19 C9 27 68 E8 5E 8A Y.Bhb.OI..'h.^. main, called closeSocket(true) main, called close() main, called closeInternal(true) Wait for connection... Allow unsafe renegotiation: false Allow legacy hello messages: true Is initial handshake: true Is secure renegotiation: false Connection from /192.168.137.1:55278 Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_256_GCM_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_128_GCM_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_256_GCM_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_128_GCM_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1.1 [Raw read]: length = 5 0000: 16 03 01 01 4F ....O [Raw read]: length = 335 0000: 01 00 01 4B 03 03 B3 02 6E 1B 73 76 B0 89 42 D5 ...K....n.sv..B. 0010: 43 99 9B 91 16 A6 B1 38 A2 8B F1 DA EE 9B 1F A7 C......8........ 0020: E2 61 C1 BF 44 96 20 47 F9 30 5A 86 91 98 54 8B .a..D. G.0Z...T. 0030: 59 47 DA 20 6F E7 30 8D C0 C7 C8 8E DD 62 34 6B YG. o.0......b4k 0040: E2 EF 9D FD C2 6E 7F 00 AC C0 30 C0 2C C0 28 C0 .....n....0.,.(. 0050: 24 C0 14 C0 0A 00 A5 00 A3 00 A1 00 9F 00 6B 00 $.............k. 0060: 6A 00 69 00 68 00 39 00 38 00 37 00 36 00 88 00 j.i.h.9.8.7.6... 0070: 87 00 86 00 85 C0 32 C0 2E C0 2A C0 26 C0 0F C0 ......2...*.&... 0080: 05 00 9D 00 3D 00 35 00 84 C0 2F C0 2B C0 27 C0 ....=.5.../.+.'. 0090: 23 C0 13 C0 09 00 A4 00 A2 00 A0 00 9E 00 67 00 #.............g. 00A0: 40 00 3F 00 3E 00 33 00 32 00 31 00 30 00 9A 00 @.?.>.3.2.1.0... 00B0: 99 00 98 00 97 00 45 00 44 00 43 00 42 C0 31 C0 ......E.D.C.B.1. 00C0: 2D C0 29 C0 25 C0 0E C0 04 00 9C 00 3C 00 2F 00 -.).%.......<./. 00D0: 96 00 41 00 07 C0 11 C0 07 C0 0C C0 02 00 05 00 ..A............. 00E0: 04 C0 12 C0 08 00 16 00 13 00 10 00 0D C0 0D C0 ................ 00F0: 03 00 0A 00 FF 02 01 00 00 55 00 0B 00 04 03 00 .........U...... 0100: 01 02 00 0A 00 1C 00 1A 00 17 00 19 00 1C 00 1B ................ 0110: 00 18 00 1A 00 16 00 0E 00 0D 00 0B 00 0C 00 09 ................ 0120: 00 0A 00 23 00 00 00 0D 00 20 00 1E 06 01 06 02 ...#..... ...... 0130: 06 03 05 01 05 02 05 03 04 01 04 02 04 03 03 01 ................ 0140: 03 02 03 03 02 01 02 02 02 03 00 0F 00 01 01 ............... main, READ: TLSv1 Handshake, length = 335 check handshake state: client_hello[1] update handshake state: client_hello[1] upcoming handshake states: server_hello[2] *** ClientHello, TLSv1.2 RandomCookie: random_bytes = {B3 02 6E 1B 73 76 B0 89 42 D5 43 99 9B 91 16 A6 B1 38 A2 8B F1 DA EE 9B 1F A7 E2 61 C1 BF 44 96} Session ID: {71, 249, 48, 90, 134, 145, 152, 84, 139, 89, 71, 218, 32, 111, 231, 48, 141, 192, 199, 200, 142, 221, 98, 52, 107, 226, 239, 157, 253, 194, 110, 127} Cipher Suites: [TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_DH_DSS_WITH_AES_256_GCM_SHA384, TLS_DHE_DSS_WITH_AES_256_GCM_SHA384, TLS_DH_RSA_WITH_AES_256_GCM_SHA384, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, TLS_DHE_RSA_WITH_AES_256_CBC_SHA256, TLS_DHE_DSS_WITH_AES_256_CBC_SHA256, TLS_DH_RSA_WITH_AES_256_CBC_SHA256, TLS_DH_DSS_WITH_AES_256_CBC_SHA256, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_DSS_WITH_AES_256_CBC_SHA, TLS_DH_RSA_WITH_AES_256_CBC_SHA, TLS_DH_DSS_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA, TLS_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA, TLS_DH_RSA_WITH_CAMELLIA_256_CBC_SHA, TLS_DH_DSS_WITH_CAMELLIA_256_CBC_SHA, TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384, TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384, TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDH_RSA_WITH_AES_256_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_256_GCM_SHA384, TLS_RSA_WITH_AES_256_CBC_SHA256, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_CAMELLIA_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_DH_DSS_WITH_AES_128_GCM_SHA256, TLS_DHE_DSS_WITH_AES_128_GCM_SHA256, TLS_DH_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_DSS_WITH_AES_128_CBC_SHA256, TLS_DH_RSA_WITH_AES_128_CBC_SHA256, TLS_DH_DSS_WITH_AES_128_CBC_SHA256, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, TLS_DH_RSA_WITH_AES_128_CBC_SHA, TLS_DH_DSS_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_SEED_CBC_SHA, TLS_DHE_DSS_WITH_SEED_CBC_SHA, TLS_DH_RSA_WITH_SEED_CBC_SHA, TLS_DH_DSS_WITH_SEED_CBC_SHA, TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA, TLS_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA, TLS_DH_RSA_WITH_CAMELLIA_128_CBC_SHA, TLS_DH_DSS_WITH_CAMELLIA_128_CBC_SHA, TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_128_GCM_SHA256, TLS_RSA_WITH_AES_128_CBC_SHA256, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_SEED_CBC_SHA, TLS_RSA_WITH_CAMELLIA_128_CBC_SHA, SSL_RSA_WITH_IDEA_CBC_SHA, TLS_ECDHE_RSA_WITH_RC4_128_SHA, TLS_ECDHE_ECDSA_WITH_RC4_128_SHA, TLS_ECDH_RSA_WITH_RC4_128_SHA, TLS_ECDH_ECDSA_WITH_RC4_128_SHA, SSL_RSA_WITH_RC4_128_SHA, SSL_RSA_WITH_RC4_128_MD5, TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA, SSL_DH_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DH_DSS_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, TLS_EMPTY_RENEGOTIATION_INFO_SCSV] Compression Methods: { 1, 0 } Extension ec_point_formats, formats: [uncompressed, ansiX962_compressed_prime, ansiX962_compressed_char2] Extension elliptic_curves, curve names: {secp256r1, secp521r1, unknown curve 28, unknown curve 27, secp384r1, unknown curve 26, secp256k1, sect571r1, sect571k1, sect409k1, sect409r1, sect283k1, sect283r1} Unsupported extension type_35, data: Extension signature_algorithms, signature_algorithms: SHA512withRSA, Unknown (hash:0x6, signature:0x2), SHA512withECDSA, SHA384withRSA, Unknown (hash:0x5, signature:0x2), SHA384withECDSA, SHA256withRSA, SHA256withDSA, SHA256withECDSA, Unknown (hash:0x3, signature:0x1), Unknown (hash:0x3, signature:0x2), Unknown (hash:0x3, signature:0x3), SHA1withRSA, SHA1withDSA, SHA1withECDSA Unsupported extension type_15, data: 01 *** %% Resuming [Session-2, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384] *** ServerHello, TLSv1.2 RandomCookie: random_bytes = {A8 D4 F3 7E 0E 53 CA 3C 09 53 B7 4B F9 50 A6 FB 06 EA 3F D3 CA 77 8D C0 1C F0 2F EE F4 37 F9 7D} Session ID: {71, 249, 48, 90, 134, 145, 152, 84, 139, 89, 71, 218, 32, 111, 231, 48, 141, 192, 199, 200, 142, 221, 98, 52, 107, 226, 239, 157, 253, 194, 110, 127} Cipher Suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 Compression Method: 0 Extension renegotiation_info, renegotiated_connection: *** Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 update handshake state: server_hello[2] upcoming handshake states: server change_cipher_spec[-1] upcoming handshake states: server finished[20] upcoming handshake states: client change_cipher_spec[-1] upcoming handshake states: client finished[20] CONNECTION KEYGEN: Client Nonce: 0000: B3 02 6E 1B 73 76 B0 89 42 D5 43 99 9B 91 16 A6 ..n.sv..B.C..... 0010: B1 38 A2 8B F1 DA EE 9B 1F A7 E2 61 C1 BF 44 96 .8.........a..D. Server Nonce: 0000: A8 D4 F3 7E 0E 53 CA 3C 09 53 B7 4B F9 50 A6 FB .....S.<.S.K.P.. 0010: 06 EA 3F D3 CA 77 8D C0 1C F0 2F EE F4 37 F9 7D ..?..w..../..7.. Master Secret: 0000: 95 26 1D 62 AC A3 CD FE 91 B5 0B 3A 40 B8 55 A4 .&.b.......:@.U. 0010: 63 22 16 F8 7D 2E 1B 86 5E 89 09 DF 9F 90 08 AF c"......^....... 0020: 5A 6D D5 0C 6A 63 9E 83 28 16 73 D1 B2 AD E0 02 Zm..jc..(.s..... ... no MAC keys used for this cipher Client write key: 0000: 6B B4 C6 FA 12 D6 CD FF BB AD 04 6A FC 91 34 62 k..........j..4b 0010: 99 8F A1 4E E1 FE FA 45 3A E8 31 9B 72 73 A2 5B ...N...E:.1.rs.[ Server write key: 0000: E0 7F 8C C3 4F 83 36 21 5B 85 B8 CF AC 81 61 55 ....O.6![.....aU 0010: 63 EF E9 91 56 04 F1 DB 39 74 94 68 77 BF 8E 3A c...V...9t.hw..: Client write IV: 0000: 27 7A 4C 28 'zL( Server write IV: 0000: 10 16 56 97 ..V. main, WRITE: TLSv1.2 Handshake, length = 81 [Raw write]: length = 86 0000: 16 03 03 00 51 02 00 00 4D 03 03 A8 D4 F3 7E 0E ....Q...M....... 0010: 53 CA 3C 09 53 B7 4B F9 50 A6 FB 06 EA 3F D3 CA S.<.S.K.P....?.. 0020: 77 8D C0 1C F0 2F EE F4 37 F9 7D 20 47 F9 30 5A w..../..7.. G.0Z 0030: 86 91 98 54 8B 59 47 DA 20 6F E7 30 8D C0 C7 C8 ...T.YG. o.0.... 0040: 8E DD 62 34 6B E2 EF 9D FD C2 6E 7F C0 2C 00 00 ..b4k.....n..,.. 0050: 05 FF 01 00 01 00 ...... update handshake state: change_cipher_spec upcoming handshake states: server finished[20] upcoming handshake states: client change_cipher_spec[-1] upcoming handshake states: client finished[20] main, WRITE: TLSv1.2 Change Cipher Spec, length = 1 [Raw write]: length = 6 0000: 14 03 03 00 01 01 ...... *** Finished verify_data: { 96, 168, 221, 77, 56, 34, 23, 101, 17, 0, 253, 221 } *** update handshake state: finished[20] upcoming handshake states: client change_cipher_spec[-1] upcoming handshake states: client finished[20] main, WRITE: TLSv1.2 Handshake, length = 24 Padded plaintext before ENCRYPTION: len = 16 0000: 14 00 00 0C 60 A8 DD 4D 38 22 17 65 11 00 FD DD ....`..M8".e.... [Raw write]: length = 45 0000: 16 03 03 00 28 00 00 00 00 00 00 00 00 E5 21 68 ....(.........!h 0010: 10 CE F5 21 41 E2 A0 10 DE C3 00 06 35 E8 FA B9 ...!A.......5... 0020: 15 EA F6 DB 1C 64 92 22 50 50 CC EC 8D .....d."PP... [Raw read]: length = 5 0000: 14 03 03 00 01 ..... [Raw read]: length = 1 0000: 01 . main, READ: TLSv1.2 Change Cipher Spec, length = 1 update handshake state: change_cipher_spec upcoming handshake states: client finished[20] [Raw read]: length = 5 0000: 16 03 03 00 28 ....( [Raw read]: length = 40 0000: 48 3A 75 A5 CC AC FC 1D B2 99 BD 7B C9 86 43 72 H:u...........Cr 0010: 3B 0B A7 9B 5D 68 50 99 F9 F0 F1 ED DE E6 FF EC ;...]hP......... 0020: E8 C3 B4 3C 32 D5 48 D3 ...<2.H. main, READ: TLSv1.2 Handshake, length = 40 Padded plaintext after DECRYPTION: len = 16 0000: 14 00 00 0C 37 E1 2D 60 0C B8 C2 65 73 00 17 49 ....7.-`...es..I check handshake state: finished[20] update handshake state: finished[20] *** Finished verify_data: { 55, 225, 45, 96, 12, 184, 194, 101, 115, 0, 23, 73 } *** main, WRITE: TLSv1.2 Application Data, length = 33 Padded plaintext before ENCRYPTION: len = 25 0000: 49 20 61 6D 20 4A 61 76 61 20 76 65 72 73 69 6F I am Java versio 0010: 6E 3A 20 39 2E 30 2E 31 0A n: 9.0.1. [Raw write]: length = 54 0000: 17 03 03 00 31 00 00 00 00 00 00 00 01 46 8F 3B ....1........F.; 0010: 49 A9 E0 A1 60 06 2A 67 D7 CB 93 DC 0C 95 F5 5A I...`.*g.......Z 0020: E5 50 B1 D9 74 77 64 C3 3F AD B5 4C C9 86 A7 05 .P..twd.?..L.... 0030: 3F A9 12 DB 01 0A ?..... Closing connection... main, called close() main, called closeInternal(true) main, SEND TLSv1.2 ALERT: warning, description = close_notify main, WRITE: TLSv1.2 Alert, length = 10 Padded plaintext before ENCRYPTION: len = 2 0000: 01 00 .. [Raw write]: length = 31 0000: 15 03 03 00 1A 00 00 00 00 00 00 00 02 F1 CE 01 ................ 0010: 47 63 13 75 A1 02 C0 D7 CB FA 5E 89 12 BB E9 Gc.u......^.... main, called closeSocket(true) main, called close() main, called closeInternal(true) Wait for connection... Allow unsafe renegotiation: false Allow legacy hello messages: true Is initial handshake: true Is secure renegotiation: false Connection from /192.168.137.1:55279 Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_256_GCM_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_128_GCM_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_256_GCM_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_128_GCM_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1.1 [Raw read]: length = 5 0000: 16 03 01 01 4F ....O [Raw read]: length = 335 0000: 01 00 01 4B 03 03 09 F4 43 67 F5 B7 A0 A5 56 C2 ...K....Cg....V. 0010: BE 20 72 B4 6D DD FB 83 A9 5D 5D E1 D1 88 03 2F . r.m....]]..../ 0020: A2 0D E9 6A D7 3B 20 47 F9 30 5A 86 91 98 54 8B ...j.; G.0Z...T. 0030: 59 47 DA 20 6F E7 30 8D C0 C7 C8 8E DD 62 34 6B YG. o.0......b4k 0040: E2 EF 9D FD C2 6E 7F 00 AC C0 30 C0 2C C0 28 C0 .....n....0.,.(. 0050: 24 C0 14 C0 0A 00 A5 00 A3 00 A1 00 9F 00 6B 00 $.............k. 0060: 6A 00 69 00 68 00 39 00 38 00 37 00 36 00 88 00 j.i.h.9.8.7.6... 0070: 87 00 86 00 85 C0 32 C0 2E C0 2A C0 26 C0 0F C0 ......2...*.&... 0080: 05 00 9D 00 3D 00 35 00 84 C0 2F C0 2B C0 27 C0 ....=.5.../.+.'. 0090: 23 C0 13 C0 09 00 A4 00 A2 00 A0 00 9E 00 67 00 #.............g. 00A0: 40 00 3F 00 3E 00 33 00 32 00 31 00 30 00 9A 00 @.?.>.3.2.1.0... 00B0: 99 00 98 00 97 00 45 00 44 00 43 00 42 C0 31 C0 ......E.D.C.B.1. 00C0: 2D C0 29 C0 25 C0 0E C0 04 00 9C 00 3C 00 2F 00 -.).%.......<./. 00D0: 96 00 41 00 07 C0 11 C0 07 C0 0C C0 02 00 05 00 ..A............. 00E0: 04 C0 12 C0 08 00 16 00 13 00 10 00 0D C0 0D C0 ................ 00F0: 03 00 0A 00 FF 02 01 00 00 55 00 0B 00 04 03 00 .........U...... 0100: 01 02 00 0A 00 1C 00 1A 00 17 00 19 00 1C 00 1B ................ 0110: 00 18 00 1A 00 16 00 0E 00 0D 00 0B 00 0C 00 09 ................ 0120: 00 0A 00 23 00 00 00 0D 00 20 00 1E 06 01 06 02 ...#..... ...... 0130: 06 03 05 01 05 02 05 03 04 01 04 02 04 03 03 01 ................ 0140: 03 02 03 03 02 01 02 02 02 03 00 0F 00 01 01 ............... main, READ: TLSv1 Handshake, length = 335 check handshake state: client_hello[1] update handshake state: client_hello[1] upcoming handshake states: server_hello[2] *** ClientHello, TLSv1.2 RandomCookie: random_bytes = {09 F4 43 67 F5 B7 A0 A5 56 C2 BE 20 72 B4 6D DD FB 83 A9 5D 5D E1 D1 88 03 2F A2 0D E9 6A D7 3B} Session ID: {71, 249, 48, 90, 134, 145, 152, 84, 139, 89, 71, 218, 32, 111, 231, 48, 141, 192, 199, 200, 142, 221, 98, 52, 107, 226, 239, 157, 253, 194, 110, 127} Cipher Suites: [TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_DH_DSS_WITH_AES_256_GCM_SHA384, TLS_DHE_DSS_WITH_AES_256_GCM_SHA384, TLS_DH_RSA_WITH_AES_256_GCM_SHA384, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, TLS_DHE_RSA_WITH_AES_256_CBC_SHA256, TLS_DHE_DSS_WITH_AES_256_CBC_SHA256, TLS_DH_RSA_WITH_AES_256_CBC_SHA256, TLS_DH_DSS_WITH_AES_256_CBC_SHA256, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_DSS_WITH_AES_256_CBC_SHA, TLS_DH_RSA_WITH_AES_256_CBC_SHA, TLS_DH_DSS_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA, TLS_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA, TLS_DH_RSA_WITH_CAMELLIA_256_CBC_SHA, TLS_DH_DSS_WITH_CAMELLIA_256_CBC_SHA, TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384, TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384, TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDH_RSA_WITH_AES_256_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_256_GCM_SHA384, TLS_RSA_WITH_AES_256_CBC_SHA256, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_CAMELLIA_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_DH_DSS_WITH_AES_128_GCM_SHA256, TLS_DHE_DSS_WITH_AES_128_GCM_SHA256, TLS_DH_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_DSS_WITH_AES_128_CBC_SHA256, TLS_DH_RSA_WITH_AES_128_CBC_SHA256, TLS_DH_DSS_WITH_AES_128_CBC_SHA256, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, TLS_DH_RSA_WITH_AES_128_CBC_SHA, TLS_DH_DSS_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_SEED_CBC_SHA, TLS_DHE_DSS_WITH_SEED_CBC_SHA, TLS_DH_RSA_WITH_SEED_CBC_SHA, TLS_DH_DSS_WITH_SEED_CBC_SHA, TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA, TLS_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA, TLS_DH_RSA_WITH_CAMELLIA_128_CBC_SHA, TLS_DH_DSS_WITH_CAMELLIA_128_CBC_SHA, TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_128_GCM_SHA256, TLS_RSA_WITH_AES_128_CBC_SHA256, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_SEED_CBC_SHA, TLS_RSA_WITH_CAMELLIA_128_CBC_SHA, SSL_RSA_WITH_IDEA_CBC_SHA, TLS_ECDHE_RSA_WITH_RC4_128_SHA, TLS_ECDHE_ECDSA_WITH_RC4_128_SHA, TLS_ECDH_RSA_WITH_RC4_128_SHA, TLS_ECDH_ECDSA_WITH_RC4_128_SHA, SSL_RSA_WITH_RC4_128_SHA, SSL_RSA_WITH_RC4_128_MD5, TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA, SSL_DH_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DH_DSS_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, TLS_EMPTY_RENEGOTIATION_INFO_SCSV] Compression Methods: { 1, 0 } Extension ec_point_formats, formats: [uncompressed, ansiX962_compressed_prime, ansiX962_compressed_char2] Extension elliptic_curves, curve names: {secp256r1, secp521r1, unknown curve 28, unknown curve 27, secp384r1, unknown curve 26, secp256k1, sect571r1, sect571k1, sect409k1, sect409r1, sect283k1, sect283r1} Unsupported extension type_35, data: Extension signature_algorithms, signature_algorithms: SHA512withRSA, Unknown (hash:0x6, signature:0x2), SHA512withECDSA, SHA384withRSA, Unknown (hash:0x5, signature:0x2), SHA384withECDSA, SHA256withRSA, SHA256withDSA, SHA256withECDSA, Unknown (hash:0x3, signature:0x1), Unknown (hash:0x3, signature:0x2), Unknown (hash:0x3, signature:0x3), SHA1withRSA, SHA1withDSA, SHA1withECDSA Unsupported extension type_15, data: 01 *** %% Resuming [Session-2, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384] *** ServerHello, TLSv1.2 RandomCookie: random_bytes = {C4 66 4D 8D 17 11 FB 86 A7 AF 26 96 22 A5 2F B0 87 E1 70 F1 3D E7 4A E4 AF D4 92 4B D0 C3 CB 03} Session ID: {71, 249, 48, 90, 134, 145, 152, 84, 139, 89, 71, 218, 32, 111, 231, 48, 141, 192, 199, 200, 142, 221, 98, 52, 107, 226, 239, 157, 253, 194, 110, 127} Cipher Suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 Compression Method: 0 Extension renegotiation_info, renegotiated_connection: *** Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 update handshake state: server_hello[2] upcoming handshake states: server change_cipher_spec[-1] upcoming handshake states: server finished[20] upcoming handshake states: client change_cipher_spec[-1] upcoming handshake states: client finished[20] CONNECTION KEYGEN: Client Nonce: 0000: 09 F4 43 67 F5 B7 A0 A5 56 C2 BE 20 72 B4 6D DD ..Cg....V.. r.m. 0010: FB 83 A9 5D 5D E1 D1 88 03 2F A2 0D E9 6A D7 3B ...]]..../...j.; Server Nonce: 0000: C4 66 4D 8D 17 11 FB 86 A7 AF 26 96 22 A5 2F B0 .fM.......&."./. 0010: 87 E1 70 F1 3D E7 4A E4 AF D4 92 4B D0 C3 CB 03 ..p.=.J....K.... Master Secret: 0000: 95 26 1D 62 AC A3 CD FE 91 B5 0B 3A 40 B8 55 A4 .&.b.......:@.U. 0010: 63 22 16 F8 7D 2E 1B 86 5E 89 09 DF 9F 90 08 AF c"......^....... 0020: 5A 6D D5 0C 6A 63 9E 83 28 16 73 D1 B2 AD E0 02 Zm..jc..(.s..... ... no MAC keys used for this cipher Client write key: 0000: 77 76 59 17 0E D5 CA E6 D5 4A 95 34 4E D3 BD E2 wvY......J.4N... 0010: 11 3B EC A9 FE 11 E7 81 DF DE 9E CE 97 B0 ED A1 .;.............. Server write key: 0000: 00 A8 DB 09 E0 34 3E D6 2E EA 34 FE 03 9D F0 00 .....4>...4..... 0010: 28 5E 7C 47 64 68 76 40 3A BA 63 4B 30 4F 3B 50 (^.Gdhv@:.cK0O;P Client write IV: 0000: 3E 18 A9 72 >..r Server write IV: 0000: EB A2 D9 57 ...W main, WRITE: TLSv1.2 Handshake, length = 81 [Raw write]: length = 86 0000: 16 03 03 00 51 02 00 00 4D 03 03 C4 66 4D 8D 17 ....Q...M...fM.. 0010: 11 FB 86 A7 AF 26 96 22 A5 2F B0 87 E1 70 F1 3D .....&."./...p.= 0020: E7 4A E4 AF D4 92 4B D0 C3 CB 03 20 47 F9 30 5A .J....K.... G.0Z 0030: 86 91 98 54 8B 59 47 DA 20 6F E7 30 8D C0 C7 C8 ...T.YG. o.0.... 0040: 8E DD 62 34 6B E2 EF 9D FD C2 6E 7F C0 2C 00 00 ..b4k.....n..,.. 0050: 05 FF 01 00 01 00 ...... update handshake state: change_cipher_spec upcoming handshake states: server finished[20] upcoming handshake states: client change_cipher_spec[-1] upcoming handshake states: client finished[20] main, WRITE: TLSv1.2 Change Cipher Spec, length = 1 [Raw write]: length = 6 0000: 14 03 03 00 01 01 ...... *** Finished verify_data: { 217, 77, 204, 161, 9, 111, 85, 91, 112, 47, 236, 48 } *** update handshake state: finished[20] upcoming handshake states: client change_cipher_spec[-1] upcoming handshake states: client finished[20] main, WRITE: TLSv1.2 Handshake, length = 24 Padded plaintext before ENCRYPTION: len = 16 0000: 14 00 00 0C D9 4D CC A1 09 6F 55 5B 70 2F EC 30 .....M...oU[p/.0 [Raw write]: length = 45 0000: 16 03 03 00 28 00 00 00 00 00 00 00 00 32 13 1C ....(........2.. 0010: A7 66 75 99 95 C9 25 5D 55 EB F4 59 25 3E E4 53 .fu...%]U..Y%>.S 0020: 23 36 D5 A2 FB 22 C2 3C F1 56 27 13 C8 #6...".<.V'.. [Raw read]: length = 5 0000: 14 03 03 00 01 ..... [Raw read]: length = 1 0000: 01 . main, READ: TLSv1.2 Change Cipher Spec, length = 1 update handshake state: change_cipher_spec upcoming handshake states: client finished[20] [Raw read]: length = 5 0000: 16 03 03 00 28 ....( [Raw read]: length = 40 0000: 7B FE 3C D5 50 63 E6 8D 30 48 0D C8 8C 3D BB 86 ..<.Pc..0H...=.. 0010: 3B DE 02 EB AA 64 F8 98 89 F1 C0 BA 39 4F 90 DB ;....d......9O.. 0020: AE F3 E5 63 69 46 F5 63 ...ciF.c main, READ: TLSv1.2 Handshake, length = 40 Padded plaintext after DECRYPTION: len = 16 0000: 14 00 00 0C 50 5F 47 E0 7A 2A 6D FF DB 5D 51 60 ....P_G.z*m..]Q` check handshake state: finished[20] update handshake state: finished[20] *** Finished verify_data: { 80, 95, 71, 224, 122, 42, 109, 255, 219, 93, 81, 96 } *** main, WRITE: TLSv1.2 Application Data, length = 33 Padded plaintext before ENCRYPTION: len = 25 0000: 49 20 61 6D 20 4A 61 76 61 20 76 65 72 73 69 6F I am Java versio 0010: 6E 3A 20 39 2E 30 2E 31 0A n: 9.0.1. [Raw write]: length = 54 0000: 17 03 03 00 31 00 00 00 00 00 00 00 01 D8 16 AB ....1........... 0010: 89 CF 2D 45 94 ED 00 52 77 D4 67 2E 66 43 CB E7 ..-E...Rw.g.fC.. 0020: BB B3 3B 50 FD 73 87 37 35 AF 98 1C 93 57 D3 1E ..;P.s.75....W.. 0030: 9A 4D CC AB 7F 8D .M.... Closing connection... main, called close() main, called closeInternal(true) main, SEND TLSv1.2 ALERT: warning, description = close_notify main, WRITE: TLSv1.2 Alert, length = 10 Padded plaintext before ENCRYPTION: len = 2 0000: 01 00 .. [Raw write]: length = 31 0000: 15 03 03 00 1A 00 00 00 00 00 00 00 02 04 2C 3E ..............,> 0010: BE 27 B1 B4 7B AC 62 2C 7C 5B 2D B5 DA 5D AC .'....b,.[-..]. main, called closeSocket(true) main, called close() main, called closeInternal(true) Wait for connection... Allow unsafe renegotiation: false Allow legacy hello messages: true Is initial handshake: true Is secure renegotiation: false Connection from /192.168.137.1:55280 Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_256_GCM_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_128_GCM_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_256_GCM_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_128_GCM_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1.1 [Raw read]: length = 5 0000: 16 03 01 01 4F ....O [Raw read]: length = 335 0000: 01 00 01 4B 03 03 BD 3F 82 C3 DF F9 51 15 3C 32 ...K...?....Q.<2 0010: 7D E3 07 CE D2 66 E7 B9 32 F6 97 32 F0 B5 CE 7C .....f..2..2.... 0020: 13 AF 7D 20 10 75 20 47 F9 30 5A 86 91 98 54 8B ... .u G.0Z...T. 0030: 59 47 DA 20 6F E7 30 8D C0 C7 C8 8E DD 62 34 6B YG. o.0......b4k 0040: E2 EF 9D FD C2 6E 7F 00 AC C0 30 C0 2C C0 28 C0 .....n....0.,.(. 0050: 24 C0 14 C0 0A 00 A5 00 A3 00 A1 00 9F 00 6B 00 $.............k. 0060: 6A 00 69 00 68 00 39 00 38 00 37 00 36 00 88 00 j.i.h.9.8.7.6... 0070: 87 00 86 00 85 C0 32 C0 2E C0 2A C0 26 C0 0F C0 ......2...*.&... 0080: 05 00 9D 00 3D 00 35 00 84 C0 2F C0 2B C0 27 C0 ....=.5.../.+.'. 0090: 23 C0 13 C0 09 00 A4 00 A2 00 A0 00 9E 00 67 00 #.............g. 00A0: 40 00 3F 00 3E 00 33 00 32 00 31 00 30 00 9A 00 @.?.>.3.2.1.0... 00B0: 99 00 98 00 97 00 45 00 44 00 43 00 42 C0 31 C0 ......E.D.C.B.1. 00C0: 2D C0 29 C0 25 C0 0E C0 04 00 9C 00 3C 00 2F 00 -.).%.......<./. 00D0: 96 00 41 00 07 C0 11 C0 07 C0 0C C0 02 00 05 00 ..A............. 00E0: 04 C0 12 C0 08 00 16 00 13 00 10 00 0D C0 0D C0 ................ 00F0: 03 00 0A 00 FF 02 01 00 00 55 00 0B 00 04 03 00 .........U...... 0100: 01 02 00 0A 00 1C 00 1A 00 17 00 19 00 1C 00 1B ................ 0110: 00 18 00 1A 00 16 00 0E 00 0D 00 0B 00 0C 00 09 ................ 0120: 00 0A 00 23 00 00 00 0D 00 20 00 1E 06 01 06 02 ...#..... ...... 0130: 06 03 05 01 05 02 05 03 04 01 04 02 04 03 03 01 ................ 0140: 03 02 03 03 02 01 02 02 02 03 00 0F 00 01 01 ............... main, READ: TLSv1 Handshake, length = 335 check handshake state: client_hello[1] update handshake state: client_hello[1] upcoming handshake states: server_hello[2] *** ClientHello, TLSv1.2 RandomCookie: random_bytes = {BD 3F 82 C3 DF F9 51 15 3C 32 7D E3 07 CE D2 66 E7 B9 32 F6 97 32 F0 B5 CE 7C 13 AF 7D 20 10 75} Session ID: {71, 249, 48, 90, 134, 145, 152, 84, 139, 89, 71, 218, 32, 111, 231, 48, 141, 192, 199, 200, 142, 221, 98, 52, 107, 226, 239, 157, 253, 194, 110, 127} Cipher Suites: [TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_DH_DSS_WITH_AES_256_GCM_SHA384, TLS_DHE_DSS_WITH_AES_256_GCM_SHA384, TLS_DH_RSA_WITH_AES_256_GCM_SHA384, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, TLS_DHE_RSA_WITH_AES_256_CBC_SHA256, TLS_DHE_DSS_WITH_AES_256_CBC_SHA256, TLS_DH_RSA_WITH_AES_256_CBC_SHA256, TLS_DH_DSS_WITH_AES_256_CBC_SHA256, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_DSS_WITH_AES_256_CBC_SHA, TLS_DH_RSA_WITH_AES_256_CBC_SHA, TLS_DH_DSS_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA, TLS_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA, TLS_DH_RSA_WITH_CAMELLIA_256_CBC_SHA, TLS_DH_DSS_WITH_CAMELLIA_256_CBC_SHA, TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384, TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384, TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDH_RSA_WITH_AES_256_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_256_GCM_SHA384, TLS_RSA_WITH_AES_256_CBC_SHA256, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_CAMELLIA_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_DH_DSS_WITH_AES_128_GCM_SHA256, TLS_DHE_DSS_WITH_AES_128_GCM_SHA256, TLS_DH_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_DSS_WITH_AES_128_CBC_SHA256, TLS_DH_RSA_WITH_AES_128_CBC_SHA256, TLS_DH_DSS_WITH_AES_128_CBC_SHA256, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, TLS_DH_RSA_WITH_AES_128_CBC_SHA, TLS_DH_DSS_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_SEED_CBC_SHA, TLS_DHE_DSS_WITH_SEED_CBC_SHA, TLS_DH_RSA_WITH_SEED_CBC_SHA, TLS_DH_DSS_WITH_SEED_CBC_SHA, TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA, TLS_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA, TLS_DH_RSA_WITH_CAMELLIA_128_CBC_SHA, TLS_DH_DSS_WITH_CAMELLIA_128_CBC_SHA, TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_128_GCM_SHA256, TLS_RSA_WITH_AES_128_CBC_SHA256, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_SEED_CBC_SHA, TLS_RSA_WITH_CAMELLIA_128_CBC_SHA, SSL_RSA_WITH_IDEA_CBC_SHA, TLS_ECDHE_RSA_WITH_RC4_128_SHA, TLS_ECDHE_ECDSA_WITH_RC4_128_SHA, TLS_ECDH_RSA_WITH_RC4_128_SHA, TLS_ECDH_ECDSA_WITH_RC4_128_SHA, SSL_RSA_WITH_RC4_128_SHA, SSL_RSA_WITH_RC4_128_MD5, TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA, SSL_DH_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DH_DSS_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, TLS_EMPTY_RENEGOTIATION_INFO_SCSV] Compression Methods: { 1, 0 } Extension ec_point_formats, formats: [uncompressed, ansiX962_compressed_prime, ansiX962_compressed_char2] Extension elliptic_curves, curve names: {secp256r1, secp521r1, unknown curve 28, unknown curve 27, secp384r1, unknown curve 26, secp256k1, sect571r1, sect571k1, sect409k1, sect409r1, sect283k1, sect283r1} Unsupported extension type_35, data: Extension signature_algorithms, signature_algorithms: SHA512withRSA, Unknown (hash:0x6, signature:0x2), SHA512withECDSA, SHA384withRSA, Unknown (hash:0x5, signature:0x2), SHA384withECDSA, SHA256withRSA, SHA256withDSA, SHA256withECDSA, Unknown (hash:0x3, signature:0x1), Unknown (hash:0x3, signature:0x2), Unknown (hash:0x3, signature:0x3), SHA1withRSA, SHA1withDSA, SHA1withECDSA Unsupported extension type_15, data: 01 *** %% Resuming [Session-2, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384] *** ServerHello, TLSv1.2 RandomCookie: random_bytes = {DA 8B 30 E7 19 5A B9 D6 6A F7 48 2A 5A 98 EE 91 6B 5B 43 E6 3C 24 4A 2E 8E B5 7C 1D 1B 91 E2 88} Session ID: {71, 249, 48, 90, 134, 145, 152, 84, 139, 89, 71, 218, 32, 111, 231, 48, 141, 192, 199, 200, 142, 221, 98, 52, 107, 226, 239, 157, 253, 194, 110, 127} Cipher Suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 Compression Method: 0 Extension renegotiation_info, renegotiated_connection: *** Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 update handshake state: server_hello[2] upcoming handshake states: server change_cipher_spec[-1] upcoming handshake states: server finished[20] upcoming handshake states: client change_cipher_spec[-1] upcoming handshake states: client finished[20] CONNECTION KEYGEN: Client Nonce: 0000: BD 3F 82 C3 DF F9 51 15 3C 32 7D E3 07 CE D2 66 .?....Q.<2.....f 0010: E7 B9 32 F6 97 32 F0 B5 CE 7C 13 AF 7D 20 10 75 ..2..2....... .u Server Nonce: 0000: DA 8B 30 E7 19 5A B9 D6 6A F7 48 2A 5A 98 EE 91 ..0..Z..j.H*Z... 0010: 6B 5B 43 E6 3C 24 4A 2E 8E B5 7C 1D 1B 91 E2 88 k[C.<$J......... Master Secret: 0000: 95 26 1D 62 AC A3 CD FE 91 B5 0B 3A 40 B8 55 A4 .&.b.......:@.U. 0010: 63 22 16 F8 7D 2E 1B 86 5E 89 09 DF 9F 90 08 AF c"......^....... 0020: 5A 6D D5 0C 6A 63 9E 83 28 16 73 D1 B2 AD E0 02 Zm..jc..(.s..... ... no MAC keys used for this cipher Client write key: 0000: 25 8E E2 BC 50 A3 10 45 52 D0 EE 61 E6 C7 8B 14 %...P..ER..a.... 0010: D9 00 9C 1A 16 02 17 82 C6 10 ED AC 98 B8 BD A0 ................ Server write key: 0000: D3 A6 81 C4 6C 49 7F 77 88 54 0F 34 F8 FD 52 46 ....lI.w.T.4..RF 0010: 5C 89 45 1A 3D 8D 6B 1F 26 A5 29 B2 C5 BE 61 B6 \.E.=.k.&.)...a. Client write IV: 0000: 95 13 D3 FB .... Server write IV: 0000: 23 B9 E4 4D #..M main, WRITE: TLSv1.2 Handshake, length = 81 [Raw write]: length = 86 0000: 16 03 03 00 51 02 00 00 4D 03 03 DA 8B 30 E7 19 ....Q...M....0.. 0010: 5A B9 D6 6A F7 48 2A 5A 98 EE 91 6B 5B 43 E6 3C Z..j.H*Z...k[C.< 0020: 24 4A 2E 8E B5 7C 1D 1B 91 E2 88 20 47 F9 30 5A $J......... G.0Z 0030: 86 91 98 54 8B 59 47 DA 20 6F E7 30 8D C0 C7 C8 ...T.YG. o.0.... 0040: 8E DD 62 34 6B E2 EF 9D FD C2 6E 7F C0 2C 00 00 ..b4k.....n..,.. 0050: 05 FF 01 00 01 00 ...... update handshake state: change_cipher_spec upcoming handshake states: server finished[20] upcoming handshake states: client change_cipher_spec[-1] upcoming handshake states: client finished[20] main, WRITE: TLSv1.2 Change Cipher Spec, length = 1 [Raw write]: length = 6 0000: 14 03 03 00 01 01 ...... *** Finished verify_data: { 9, 226, 146, 57, 166, 13, 30, 88, 40, 94, 58, 175 } *** update handshake state: finished[20] upcoming handshake states: client change_cipher_spec[-1] upcoming handshake states: client finished[20] main, WRITE: TLSv1.2 Handshake, length = 24 Padded plaintext before ENCRYPTION: len = 16 0000: 14 00 00 0C 09 E2 92 39 A6 0D 1E 58 28 5E 3A AF .......9...X(^:. [Raw write]: length = 45 0000: 16 03 03 00 28 00 00 00 00 00 00 00 00 CC 1D AD ....(........... 0010: 1C 21 41 85 2F 1E 04 C7 3E 2E 0A 4E 53 C5 35 73 .!A./...>..NS.5s 0020: 50 76 56 66 3E 64 47 C9 11 79 A9 A9 25 PvVf>dG..y..% [Raw read]: length = 5 0000: 14 03 03 00 01 ..... [Raw read]: length = 1 0000: 01 . main, READ: TLSv1.2 Change Cipher Spec, length = 1 update handshake state: change_cipher_spec upcoming handshake states: client finished[20] [Raw read]: length = 5 0000: 16 03 03 00 28 ....( [Raw read]: length = 40 0000: E7 29 68 A1 E5 3F F3 E2 BD C2 00 01 4A 15 D9 73 .)h..?......J..s 0010: 05 AE 1C 60 29 D4 E2 FF C1 6B 90 94 0E 64 E0 FD ...`)....k...d.. 0020: AB 3A 84 E4 05 DE 43 9D .:....C. main, READ: TLSv1.2 Handshake, length = 40 Padded plaintext after DECRYPTION: len = 16 0000: 14 00 00 0C DD 2F E6 E1 33 5E 14 EF 0F 3D 18 A0 ...../..3^...=.. check handshake state: finished[20] update handshake state: finished[20] *** Finished verify_data: { 221, 47, 230, 225, 51, 94, 20, 239, 15, 61, 24, 160 } *** main, WRITE: TLSv1.2 Application Data, length = 33 Padded plaintext before ENCRYPTION: len = 25 0000: 49 20 61 6D 20 4A 61 76 61 20 76 65 72 73 69 6F I am Java versio 0010: 6E 3A 20 39 2E 30 2E 31 0A n: 9.0.1. [Raw write]: length = 54 0000: 17 03 03 00 31 00 00 00 00 00 00 00 01 63 5C 54 ....1........c\T 0010: BD 14 6A 9B 47 16 07 ED DB D5 AB 22 DD 5E CA FD ..j.G......".^.. 0020: 60 23 05 D9 36 CE 57 05 92 B4 B9 EA 74 5E 6E 55 `#..6.W.....t^nU 0030: D1 32 13 12 2E BE .2.... Closing connection... main, called close() main, called closeInternal(true) main, SEND TLSv1.2 ALERT: warning, description = close_notify main, WRITE: TLSv1.2 Alert, length = 10 Padded plaintext before ENCRYPTION: len = 2 0000: 01 00 .. [Raw write]: length = 31 0000: 15 03 03 00 1A 00 00 00 00 00 00 00 02 C3 7A B6 ..............z. 0010: 35 22 0F A3 E2 57 D4 84 51 86 08 6B 61 46 D3 5"...W..Q..kaF. main, called closeSocket(true) main, called close() main, called closeInternal(true) Wait for connection... Allow unsafe renegotiation: false Allow legacy hello messages: true Is initial handshake: true Is secure renegotiation: false Connection from /192.168.137.1:55281 Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_256_GCM_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_128_GCM_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_256_GCM_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_128_GCM_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1.1 [Raw read]: length = 5 0000: 16 03 01 01 4F ....O [Raw read]: length = 335 0000: 01 00 01 4B 03 03 9A AA A1 CE 10 C3 24 CE 36 CC ...K........$.6. 0010: BA C9 22 87 11 31 10 6B 79 32 91 15 C9 CF 94 C2 .."..1.ky2...... 0020: 14 EC 09 D3 CB C8 20 47 F9 30 5A 86 91 98 54 8B ...... G.0Z...T. 0030: 59 47 DA 20 6F E7 30 8D C0 C7 C8 8E DD 62 34 6B YG. o.0......b4k 0040: E2 EF 9D FD C2 6E 7F 00 AC C0 30 C0 2C C0 28 C0 .....n....0.,.(. 0050: 24 C0 14 C0 0A 00 A5 00 A3 00 A1 00 9F 00 6B 00 $.............k. 0060: 6A 00 69 00 68 00 39 00 38 00 37 00 36 00 88 00 j.i.h.9.8.7.6... 0070: 87 00 86 00 85 C0 32 C0 2E C0 2A C0 26 C0 0F C0 ......2...*.&... 0080: 05 00 9D 00 3D 00 35 00 84 C0 2F C0 2B C0 27 C0 ....=.5.../.+.'. 0090: 23 C0 13 C0 09 00 A4 00 A2 00 A0 00 9E 00 67 00 #.............g. 00A0: 40 00 3F 00 3E 00 33 00 32 00 31 00 30 00 9A 00 @.?.>.3.2.1.0... 00B0: 99 00 98 00 97 00 45 00 44 00 43 00 42 C0 31 C0 ......E.D.C.B.1. 00C0: 2D C0 29 C0 25 C0 0E C0 04 00 9C 00 3C 00 2F 00 -.).%.......<./. 00D0: 96 00 41 00 07 C0 11 C0 07 C0 0C C0 02 00 05 00 ..A............. 00E0: 04 C0 12 C0 08 00 16 00 13 00 10 00 0D C0 0D C0 ................ 00F0: 03 00 0A 00 FF 02 01 00 00 55 00 0B 00 04 03 00 .........U...... 0100: 01 02 00 0A 00 1C 00 1A 00 17 00 19 00 1C 00 1B ................ 0110: 00 18 00 1A 00 16 00 0E 00 0D 00 0B 00 0C 00 09 ................ 0120: 00 0A 00 23 00 00 00 0D 00 20 00 1E 06 01 06 02 ...#..... ...... 0130: 06 03 05 01 05 02 05 03 04 01 04 02 04 03 03 01 ................ 0140: 03 02 03 03 02 01 02 02 02 03 00 0F 00 01 01 ............... main, READ: TLSv1 Handshake, length = 335 check handshake state: client_hello[1] update handshake state: client_hello[1] upcoming handshake states: server_hello[2] *** ClientHello, TLSv1.2 RandomCookie: random_bytes = {9A AA A1 CE 10 C3 24 CE 36 CC BA C9 22 87 11 31 10 6B 79 32 91 15 C9 CF 94 C2 14 EC 09 D3 CB C8} Session ID: {71, 249, 48, 90, 134, 145, 152, 84, 139, 89, 71, 218, 32, 111, 231, 48, 141, 192, 199, 200, 142, 221, 98, 52, 107, 226, 239, 157, 253, 194, 110, 127} Cipher Suites: [TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_DH_DSS_WITH_AES_256_GCM_SHA384, TLS_DHE_DSS_WITH_AES_256_GCM_SHA384, TLS_DH_RSA_WITH_AES_256_GCM_SHA384, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, TLS_DHE_RSA_WITH_AES_256_CBC_SHA256, TLS_DHE_DSS_WITH_AES_256_CBC_SHA256, TLS_DH_RSA_WITH_AES_256_CBC_SHA256, TLS_DH_DSS_WITH_AES_256_CBC_SHA256, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_DSS_WITH_AES_256_CBC_SHA, TLS_DH_RSA_WITH_AES_256_CBC_SHA, TLS_DH_DSS_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA, TLS_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA, TLS_DH_RSA_WITH_CAMELLIA_256_CBC_SHA, TLS_DH_DSS_WITH_CAMELLIA_256_CBC_SHA, TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384, TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384, TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDH_RSA_WITH_AES_256_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_256_GCM_SHA384, TLS_RSA_WITH_AES_256_CBC_SHA256, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_CAMELLIA_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_DH_DSS_WITH_AES_128_GCM_SHA256, TLS_DHE_DSS_WITH_AES_128_GCM_SHA256, TLS_DH_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_DSS_WITH_AES_128_CBC_SHA256, TLS_DH_RSA_WITH_AES_128_CBC_SHA256, TLS_DH_DSS_WITH_AES_128_CBC_SHA256, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, TLS_DH_RSA_WITH_AES_128_CBC_SHA, TLS_DH_DSS_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_SEED_CBC_SHA, TLS_DHE_DSS_WITH_SEED_CBC_SHA, TLS_DH_RSA_WITH_SEED_CBC_SHA, TLS_DH_DSS_WITH_SEED_CBC_SHA, TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA, TLS_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA, TLS_DH_RSA_WITH_CAMELLIA_128_CBC_SHA, TLS_DH_DSS_WITH_CAMELLIA_128_CBC_SHA, TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_128_GCM_SHA256, TLS_RSA_WITH_AES_128_CBC_SHA256, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_SEED_CBC_SHA, TLS_RSA_WITH_CAMELLIA_128_CBC_SHA, SSL_RSA_WITH_IDEA_CBC_SHA, TLS_ECDHE_RSA_WITH_RC4_128_SHA, TLS_ECDHE_ECDSA_WITH_RC4_128_SHA, TLS_ECDH_RSA_WITH_RC4_128_SHA, TLS_ECDH_ECDSA_WITH_RC4_128_SHA, SSL_RSA_WITH_RC4_128_SHA, SSL_RSA_WITH_RC4_128_MD5, TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA, SSL_DH_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DH_DSS_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, TLS_EMPTY_RENEGOTIATION_INFO_SCSV] Compression Methods: { 1, 0 } Extension ec_point_formats, formats: [uncompressed, ansiX962_compressed_prime, ansiX962_compressed_char2] Extension elliptic_curves, curve names: {secp256r1, secp521r1, unknown curve 28, unknown curve 27, secp384r1, unknown curve 26, secp256k1, sect571r1, sect571k1, sect409k1, sect409r1, sect283k1, sect283r1} Unsupported extension type_35, data: Extension signature_algorithms, signature_algorithms: SHA512withRSA, Unknown (hash:0x6, signature:0x2), SHA512withECDSA, SHA384withRSA, Unknown (hash:0x5, signature:0x2), SHA384withECDSA, SHA256withRSA, SHA256withDSA, SHA256withECDSA, Unknown (hash:0x3, signature:0x1), Unknown (hash:0x3, signature:0x2), Unknown (hash:0x3, signature:0x3), SHA1withRSA, SHA1withDSA, SHA1withECDSA Unsupported extension type_15, data: 01 *** %% Resuming [Session-2, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384] *** ServerHello, TLSv1.2 RandomCookie: random_bytes = {A2 88 52 80 29 28 B9 E4 82 55 66 68 8A 90 21 E3 25 5F A7 1D AD D6 0F 69 5C C3 2F 25 F7 46 3B 0F} Session ID: {71, 249, 48, 90, 134, 145, 152, 84, 139, 89, 71, 218, 32, 111, 231, 48, 141, 192, 199, 200, 142, 221, 98, 52, 107, 226, 239, 157, 253, 194, 110, 127} Cipher Suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 Compression Method: 0 Extension renegotiation_info, renegotiated_connection: *** Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 update handshake state: server_hello[2] upcoming handshake states: server change_cipher_spec[-1] upcoming handshake states: server finished[20] upcoming handshake states: client change_cipher_spec[-1] upcoming handshake states: client finished[20] CONNECTION KEYGEN: Client Nonce: 0000: 9A AA A1 CE 10 C3 24 CE 36 CC BA C9 22 87 11 31 ......$.6..."..1 0010: 10 6B 79 32 91 15 C9 CF 94 C2 14 EC 09 D3 CB C8 .ky2............ Server Nonce: 0000: A2 88 52 80 29 28 B9 E4 82 55 66 68 8A 90 21 E3 ..R.)(...Ufh..!. 0010: 25 5F A7 1D AD D6 0F 69 5C C3 2F 25 F7 46 3B 0F %_.....i\./%.F;. Master Secret: 0000: 95 26 1D 62 AC A3 CD FE 91 B5 0B 3A 40 B8 55 A4 .&.b.......:@.U. 0010: 63 22 16 F8 7D 2E 1B 86 5E 89 09 DF 9F 90 08 AF c"......^....... 0020: 5A 6D D5 0C 6A 63 9E 83 28 16 73 D1 B2 AD E0 02 Zm..jc..(.s..... ... no MAC keys used for this cipher Client write key: 0000: C3 27 33 C4 D3 4A C3 32 CA 08 66 35 86 CC EC 95 .'3..J.2..f5.... 0010: 85 86 C8 92 E7 7B D4 44 05 37 D5 B5 AE B1 C2 12 .......D.7...... Server write key: 0000: 2A 33 9E 7B AE 95 E2 71 52 D4 7C 0B C9 63 E4 40 *3.....qR....c.@ 0010: FC 1C 0F CD 1E 04 6C 85 AD 02 DA 47 B2 5C F1 AE ......l....G.\.. Client write IV: 0000: 40 53 96 60 @S.` Server write IV: 0000: 7F 3F B5 D0 .?.. main, WRITE: TLSv1.2 Handshake, length = 81 [Raw write]: length = 86 0000: 16 03 03 00 51 02 00 00 4D 03 03 A2 88 52 80 29 ....Q...M....R.) 0010: 28 B9 E4 82 55 66 68 8A 90 21 E3 25 5F A7 1D AD (...Ufh..!.%_... 0020: D6 0F 69 5C C3 2F 25 F7 46 3B 0F 20 47 F9 30 5A ..i\./%.F;. G.0Z 0030: 86 91 98 54 8B 59 47 DA 20 6F E7 30 8D C0 C7 C8 ...T.YG. o.0.... 0040: 8E DD 62 34 6B E2 EF 9D FD C2 6E 7F C0 2C 00 00 ..b4k.....n..,.. 0050: 05 FF 01 00 01 00 ...... update handshake state: change_cipher_spec upcoming handshake states: server finished[20] upcoming handshake states: client change_cipher_spec[-1] upcoming handshake states: client finished[20] main, WRITE: TLSv1.2 Change Cipher Spec, length = 1 [Raw write]: length = 6 0000: 14 03 03 00 01 01 ...... *** Finished verify_data: { 104, 26, 54, 144, 114, 164, 39, 189, 120, 217, 91, 59 } *** update handshake state: finished[20] upcoming handshake states: client change_cipher_spec[-1] upcoming handshake states: client finished[20] main, WRITE: TLSv1.2 Handshake, length = 24 Padded plaintext before ENCRYPTION: len = 16 0000: 14 00 00 0C 68 1A 36 90 72 A4 27 BD 78 D9 5B 3B ....h.6.r.'.x.[; [Raw write]: length = 45 0000: 16 03 03 00 28 00 00 00 00 00 00 00 00 6F 4F 2B ....(........oO+ 0010: 4E 9B F4 61 B5 15 56 66 84 0F BB 35 C2 D8 20 63 N..a..Vf...5.. c 0020: 3D 67 9E 55 77 AB 69 CC C1 D4 FA BE 3A =g.Uw.i.....: [Raw read]: length = 5 0000: 14 03 03 00 01 ..... [Raw read]: length = 1 0000: 01 . main, READ: TLSv1.2 Change Cipher Spec, length = 1 update handshake state: change_cipher_spec upcoming handshake states: client finished[20] [Raw read]: length = 5 0000: 16 03 03 00 28 ....( [Raw read]: length = 40 0000: 99 12 7D 33 4A 50 40 06 19 B5 14 B3 D9 A4 2A DB ...3JP@.......*. 0010: 57 C0 73 98 58 95 32 43 48 AA 15 21 6A 45 39 BB W.s.X.2CH..!jE9. 0020: 4E A8 11 CA DD 73 6C 03 N....sl. main, READ: TLSv1.2 Handshake, length = 40 Padded plaintext after DECRYPTION: len = 16 0000: 14 00 00 0C E1 89 28 31 27 8F C7 EC F1 66 2E EA ......(1'....f.. check handshake state: finished[20] update handshake state: finished[20] *** Finished verify_data: { 225, 137, 40, 49, 39, 143, 199, 236, 241, 102, 46, 234 } *** main, WRITE: TLSv1.2 Application Data, length = 33 Padded plaintext before ENCRYPTION: len = 25 0000: 49 20 61 6D 20 4A 61 76 61 20 76 65 72 73 69 6F I am Java versio 0010: 6E 3A 20 39 2E 30 2E 31 0A n: 9.0.1. [Raw write]: length = 54 0000: 17 03 03 00 31 00 00 00 00 00 00 00 01 90 7C E4 ....1........... 0010: 93 A9 80 98 90 55 16 02 86 12 37 B5 BA 2B 23 98 .....U....7..+#. 0020: B2 20 1F 1E 4C 69 88 B5 6B 94 A3 AB F9 45 2D CD . ..Li..k....E-. 0030: 17 52 53 4D 39 61 .RSM9a Closing connection... main, called close() main, called closeInternal(true) main, SEND TLSv1.2 ALERT: warning, description = close_notify main, WRITE: TLSv1.2 Alert, length = 10 Padded plaintext before ENCRYPTION: len = 2 0000: 01 00 .. [Raw write]: length = 31 0000: 15 03 03 00 1A 00 00 00 00 00 00 00 02 A7 F1 3E ...............> 0010: FA 5C 9F 36 4E 87 40 9E B1 55 5B 15 8D 29 E0 .\.6N.@..U[..). main, called closeSocket(true) main, called close() main, called closeInternal(true) Wait for connection... Allow unsafe renegotiation: false Allow legacy hello messages: true Is initial handshake: true Is secure renegotiation: false Connection from /192.168.137.1:55282 Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_256_GCM_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_128_GCM_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_256_GCM_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_128_GCM_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1.1 [Raw read]: length = 5 0000: 16 03 01 01 4F ....O [Raw read]: length = 335 0000: 01 00 01 4B 03 03 57 5B 18 3A 68 10 DC 9C 38 10 ...K..W[.:h...8. 0010: 9D 99 40 A4 52 25 22 6A 05 95 A7 AB 76 06 20 E0 ..@.R%"j....v. . 0020: 9C B4 F4 27 47 8C 20 47 F9 30 5A 86 91 98 54 8B ...'G. G.0Z...T. 0030: 59 47 DA 20 6F E7 30 8D C0 C7 C8 8E DD 62 34 6B YG. o.0......b4k 0040: E2 EF 9D FD C2 6E 7F 00 AC C0 30 C0 2C C0 28 C0 .....n....0.,.(. 0050: 24 C0 14 C0 0A 00 A5 00 A3 00 A1 00 9F 00 6B 00 $.............k. 0060: 6A 00 69 00 68 00 39 00 38 00 37 00 36 00 88 00 j.i.h.9.8.7.6... 0070: 87 00 86 00 85 C0 32 C0 2E C0 2A C0 26 C0 0F C0 ......2...*.&... 0080: 05 00 9D 00 3D 00 35 00 84 C0 2F C0 2B C0 27 C0 ....=.5.../.+.'. 0090: 23 C0 13 C0 09 00 A4 00 A2 00 A0 00 9E 00 67 00 #.............g. 00A0: 40 00 3F 00 3E 00 33 00 32 00 31 00 30 00 9A 00 @.?.>.3.2.1.0... 00B0: 99 00 98 00 97 00 45 00 44 00 43 00 42 C0 31 C0 ......E.D.C.B.1. 00C0: 2D C0 29 C0 25 C0 0E C0 04 00 9C 00 3C 00 2F 00 -.).%.......<./. 00D0: 96 00 41 00 07 C0 11 C0 07 C0 0C C0 02 00 05 00 ..A............. 00E0: 04 C0 12 C0 08 00 16 00 13 00 10 00 0D C0 0D C0 ................ 00F0: 03 00 0A 00 FF 02 01 00 00 55 00 0B 00 04 03 00 .........U...... 0100: 01 02 00 0A 00 1C 00 1A 00 17 00 19 00 1C 00 1B ................ 0110: 00 18 00 1A 00 16 00 0E 00 0D 00 0B 00 0C 00 09 ................ 0120: 00 0A 00 23 00 00 00 0D 00 20 00 1E 06 01 06 02 ...#..... ...... 0130: 06 03 05 01 05 02 05 03 04 01 04 02 04 03 03 01 ................ 0140: 03 02 03 03 02 01 02 02 02 03 00 0F 00 01 01 ............... main, READ: TLSv1 Handshake, length = 335 check handshake state: client_hello[1] update handshake state: client_hello[1] upcoming handshake states: server_hello[2] *** ClientHello, TLSv1.2 RandomCookie: random_bytes = {57 5B 18 3A 68 10 DC 9C 38 10 9D 99 40 A4 52 25 22 6A 05 95 A7 AB 76 06 20 E0 9C B4 F4 27 47 8C} Session ID: {71, 249, 48, 90, 134, 145, 152, 84, 139, 89, 71, 218, 32, 111, 231, 48, 141, 192, 199, 200, 142, 221, 98, 52, 107, 226, 239, 157, 253, 194, 110, 127} Cipher Suites: [TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_DH_DSS_WITH_AES_256_GCM_SHA384, TLS_DHE_DSS_WITH_AES_256_GCM_SHA384, TLS_DH_RSA_WITH_AES_256_GCM_SHA384, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, TLS_DHE_RSA_WITH_AES_256_CBC_SHA256, TLS_DHE_DSS_WITH_AES_256_CBC_SHA256, TLS_DH_RSA_WITH_AES_256_CBC_SHA256, TLS_DH_DSS_WITH_AES_256_CBC_SHA256, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_DSS_WITH_AES_256_CBC_SHA, TLS_DH_RSA_WITH_AES_256_CBC_SHA, TLS_DH_DSS_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA, TLS_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA, TLS_DH_RSA_WITH_CAMELLIA_256_CBC_SHA, TLS_DH_DSS_WITH_CAMELLIA_256_CBC_SHA, TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384, TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384, TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDH_RSA_WITH_AES_256_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_256_GCM_SHA384, TLS_RSA_WITH_AES_256_CBC_SHA256, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_CAMELLIA_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_DH_DSS_WITH_AES_128_GCM_SHA256, TLS_DHE_DSS_WITH_AES_128_GCM_SHA256, TLS_DH_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_DSS_WITH_AES_128_CBC_SHA256, TLS_DH_RSA_WITH_AES_128_CBC_SHA256, TLS_DH_DSS_WITH_AES_128_CBC_SHA256, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, TLS_DH_RSA_WITH_AES_128_CBC_SHA, TLS_DH_DSS_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_SEED_CBC_SHA, TLS_DHE_DSS_WITH_SEED_CBC_SHA, TLS_DH_RSA_WITH_SEED_CBC_SHA, TLS_DH_DSS_WITH_SEED_CBC_SHA, TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA, TLS_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA, TLS_DH_RSA_WITH_CAMELLIA_128_CBC_SHA, TLS_DH_DSS_WITH_CAMELLIA_128_CBC_SHA, TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_128_GCM_SHA256, TLS_RSA_WITH_AES_128_CBC_SHA256, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_SEED_CBC_SHA, TLS_RSA_WITH_CAMELLIA_128_CBC_SHA, SSL_RSA_WITH_IDEA_CBC_SHA, TLS_ECDHE_RSA_WITH_RC4_128_SHA, TLS_ECDHE_ECDSA_WITH_RC4_128_SHA, TLS_ECDH_RSA_WITH_RC4_128_SHA, TLS_ECDH_ECDSA_WITH_RC4_128_SHA, SSL_RSA_WITH_RC4_128_SHA, SSL_RSA_WITH_RC4_128_MD5, TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA, SSL_DH_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DH_DSS_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, TLS_EMPTY_RENEGOTIATION_INFO_SCSV] Compression Methods: { 1, 0 } Extension ec_point_formats, formats: [uncompressed, ansiX962_compressed_prime, ansiX962_compressed_char2] Extension elliptic_curves, curve names: {secp256r1, secp521r1, unknown curve 28, unknown curve 27, secp384r1, unknown curve 26, secp256k1, sect571r1, sect571k1, sect409k1, sect409r1, sect283k1, sect283r1} Unsupported extension type_35, data: Extension signature_algorithms, signature_algorithms: SHA512withRSA, Unknown (hash:0x6, signature:0x2), SHA512withECDSA, SHA384withRSA, Unknown (hash:0x5, signature:0x2), SHA384withECDSA, SHA256withRSA, SHA256withDSA, SHA256withECDSA, Unknown (hash:0x3, signature:0x1), Unknown (hash:0x3, signature:0x2), Unknown (hash:0x3, signature:0x3), SHA1withRSA, SHA1withDSA, SHA1withECDSA Unsupported extension type_15, data: 01 *** %% Resuming [Session-2, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384] *** ServerHello, TLSv1.2 RandomCookie: random_bytes = {E6 9E 00 FF 45 61 3B 69 62 F5 DF FB 5B 2E 85 51 95 11 77 D3 58 56 32 9D A4 1A AA DE 18 C3 E0 0F} Session ID: {71, 249, 48, 90, 134, 145, 152, 84, 139, 89, 71, 218, 32, 111, 231, 48, 141, 192, 199, 200, 142, 221, 98, 52, 107, 226, 239, 157, 253, 194, 110, 127} Cipher Suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 Compression Method: 0 Extension renegotiation_info, renegotiated_connection: *** Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 update handshake state: server_hello[2] upcoming handshake states: server change_cipher_spec[-1] upcoming handshake states: server finished[20] upcoming handshake states: client change_cipher_spec[-1] upcoming handshake states: client finished[20] CONNECTION KEYGEN: Client Nonce: 0000: 57 5B 18 3A 68 10 DC 9C 38 10 9D 99 40 A4 52 25 W[.:h...8...@.R% 0010: 22 6A 05 95 A7 AB 76 06 20 E0 9C B4 F4 27 47 8C "j....v. ....'G. Server Nonce: 0000: E6 9E 00 FF 45 61 3B 69 62 F5 DF FB 5B 2E 85 51 ....Ea;ib...[..Q 0010: 95 11 77 D3 58 56 32 9D A4 1A AA DE 18 C3 E0 0F ..w.XV2......... Master Secret: 0000: 95 26 1D 62 AC A3 CD FE 91 B5 0B 3A 40 B8 55 A4 .&.b.......:@.U. 0010: 63 22 16 F8 7D 2E 1B 86 5E 89 09 DF 9F 90 08 AF c"......^....... 0020: 5A 6D D5 0C 6A 63 9E 83 28 16 73 D1 B2 AD E0 02 Zm..jc..(.s..... ... no MAC keys used for this cipher Client write key: 0000: D0 A5 9D FE DF 95 82 53 4B 30 FF 5A 52 A9 DD 8A .......SK0.ZR... 0010: 4B C8 91 7D 36 5A BE E9 0A C8 5B 96 98 46 FA AD K...6Z....[..F.. Server write key: 0000: 77 E2 DD A5 E3 F4 10 2D FD 98 59 25 17 C9 CC 45 w......-..Y%...E 0010: 3F 49 67 CE 4E B2 73 84 83 28 47 CB AD DD 32 C7 ?Ig.N.s..(G...2. Client write IV: 0000: 9A 80 8D 27 ...' Server write IV: 0000: AF A2 7A 83 ..z. main, WRITE: TLSv1.2 Handshake, length = 81 [Raw write]: length = 86 0000: 16 03 03 00 51 02 00 00 4D 03 03 E6 9E 00 FF 45 ....Q...M......E 0010: 61 3B 69 62 F5 DF FB 5B 2E 85 51 95 11 77 D3 58 a;ib...[..Q..w.X 0020: 56 32 9D A4 1A AA DE 18 C3 E0 0F 20 47 F9 30 5A V2......... G.0Z 0030: 86 91 98 54 8B 59 47 DA 20 6F E7 30 8D C0 C7 C8 ...T.YG. o.0.... 0040: 8E DD 62 34 6B E2 EF 9D FD C2 6E 7F C0 2C 00 00 ..b4k.....n..,.. 0050: 05 FF 01 00 01 00 ...... update handshake state: change_cipher_spec upcoming handshake states: server finished[20] upcoming handshake states: client change_cipher_spec[-1] upcoming handshake states: client finished[20] main, WRITE: TLSv1.2 Change Cipher Spec, length = 1 [Raw write]: length = 6 0000: 14 03 03 00 01 01 ...... *** Finished verify_data: { 76, 138, 197, 125, 157, 92, 166, 41, 9, 169, 112, 247 } *** update handshake state: finished[20] upcoming handshake states: client change_cipher_spec[-1] upcoming handshake states: client finished[20] main, WRITE: TLSv1.2 Handshake, length = 24 Padded plaintext before ENCRYPTION: len = 16 0000: 14 00 00 0C 4C 8A C5 7D 9D 5C A6 29 09 A9 70 F7 ....L....\.)..p. [Raw write]: length = 45 0000: 16 03 03 00 28 00 00 00 00 00 00 00 00 0B F0 1B ....(........... 0010: B5 87 BC 00 94 D8 73 DB 68 37 41 B3 A6 04 97 A1 ......s.h7A..... 0020: 01 11 A8 B9 31 CC 0F 43 28 6E B2 9C 7B ....1..C(n... [Raw read]: length = 5 0000: 14 03 03 00 01 ..... [Raw read]: length = 1 0000: 01 . main, READ: TLSv1.2 Change Cipher Spec, length = 1 update handshake state: change_cipher_spec upcoming handshake states: client finished[20] [Raw read]: length = 5 0000: 16 03 03 00 28 ....( [Raw read]: length = 40 0000: 23 D7 A7 BF 3B 2B 9C B8 76 9A 0E 1F 3A E8 4C 98 #...;+..v...:.L. 0010: 78 A5 62 31 5D 61 F7 B5 67 80 03 D0 AB F3 4E E2 x.b1]a..g.....N. 0020: 10 9D 05 FF 10 79 C7 25 .....y.% main, READ: TLSv1.2 Handshake, length = 40 Padded plaintext after DECRYPTION: len = 16 0000: 14 00 00 0C 01 D6 51 0D DA 8E C4 F3 80 65 36 8F ......Q......e6. check handshake state: finished[20] update handshake state: finished[20] *** Finished verify_data: { 1, 214, 81, 13, 218, 142, 196, 243, 128, 101, 54, 143 } *** main, WRITE: TLSv1.2 Application Data, length = 33 Padded plaintext before ENCRYPTION: len = 25 0000: 49 20 61 6D 20 4A 61 76 61 20 76 65 72 73 69 6F I am Java versio 0010: 6E 3A 20 39 2E 30 2E 31 0A n: 9.0.1. [Raw write]: length = 54 0000: 17 03 03 00 31 00 00 00 00 00 00 00 01 4E 48 09 ....1........NH. 0010: 65 18 CA 8C FA 32 B1 EF B9 B4 A7 09 F7 A2 4E 60 e....2........N` 0020: FA 05 3F 6D FF 04 18 E3 55 B0 14 85 0C 7C 5B 53 ..?m....U.....[S 0030: 1F 6B 25 E4 35 18 .k%.5. Closing connection... main, called close() main, called closeInternal(true) main, SEND TLSv1.2 ALERT: warning, description = close_notify main, WRITE: TLSv1.2 Alert, length = 10 Padded plaintext before ENCRYPTION: len = 2 0000: 01 00 .. [Raw write]: length = 31 0000: 15 03 03 00 1A 00 00 00 00 00 00 00 02 65 C9 D6 .............e.. 0010: 1B 8F 4E 52 CB 2C 91 34 1F 94 1F EC 3A 96 1E ..NR.,.4....:.. main, called closeSocket(true) main, called close() main, called closeInternal(true) Wait for connection...