Using CATALINA_BASE: "C:\apache-tomcat-9.0.27" Using CATALINA_HOME: "C:\apache-tomcat-9.0.27" Using CATALINA_TMPDIR: "C:\apache-tomcat-9.0.27\temp" Using JRE_HOME: "C:\TLS_issue\jdk-11.0.2_b1" Using CLASSPATH: "C:\apache-tomcat-9.0.27\bin\bootstrap.jar;C:\apache-tomcat-9.0.27\bin\tomcat-juli.jar" 18-Nov-2019 12:27:20.391 INFO [main] org.apache.catalina.startup.VersionLoggerListener.log Server version name: Apache Tomcat/9.0.27 18-Nov-2019 12:27:20.403 INFO [main] org.apache.catalina.startup.VersionLoggerListener.log Server built: Oct 7 2019 09:57:22 UTC 18-Nov-2019 12:27:20.404 INFO [main] org.apache.catalina.startup.VersionLoggerListener.log Server version number: 9.0.27.0 18-Nov-2019 12:27:20.407 INFO [main] org.apache.catalina.startup.VersionLoggerListener.log OS Name: Windows 7 18-Nov-2019 12:27:20.407 INFO [main] org.apache.catalina.startup.VersionLoggerListener.log OS Version: 6.1 18-Nov-2019 12:27:20.407 INFO [main] org.apache.catalina.startup.VersionLoggerListener.log Architecture: amd64 18-Nov-2019 12:27:20.407 INFO [main] org.apache.catalina.startup.VersionLoggerListener.log Java Home: C:\TLS_issue\jdk-11.0.2_b1 18-Nov-2019 12:27:20.408 INFO [main] org.apache.catalina.startup.VersionLoggerListener.log JVM Version: 11.0.2+1-LTS 18-Nov-2019 12:27:20.408 INFO [main] org.apache.catalina.startup.VersionLoggerListener.log JVM Vendor: Oracle Corporation 18-Nov-2019 12:27:20.408 INFO [main] org.apache.catalina.startup.VersionLoggerListener.log CATALINA_BASE: C:\apache-tomcat-9.0.27 18-Nov-2019 12:27:20.408 INFO [main] org.apache.catalina.startup.VersionLoggerListener.log CATALINA_HOME: C:\apache-tomcat-9.0.27 18-Nov-2019 12:27:20.432 INFO [main] org.apache.catalina.startup.VersionLoggerListener.log Command line argument: --add-opens=java.base/java.lang=ALL-UNNAMED 18-Nov-2019 12:27:20.433 INFO [main] org.apache.catalina.startup.VersionLoggerListener.log Command line argument: --add-opens=java.base/java.io=ALL-UNNAMED 18-Nov-2019 12:27:20.434 INFO [main] org.apache.catalina.startup.VersionLoggerListener.log Command line argument: --add-opens=java.rmi/sun.rmi.transport=ALL-UNNAMED 18-Nov-2019 12:27:20.434 INFO [main] org.apache.catalina.startup.VersionLoggerListener.log Command line argument: -Djava.util.logging.config.file=C:\apache-tomcat-9.0.27\conf\logging.properties 18-Nov-2019 12:27:20.434 INFO [main] org.apache.catalina.startup.VersionLoggerListener.log Command line argument: -Djava.util.logging.manager=org.apache.juli.ClassLoaderLogManager 18-Nov-2019 12:27:20.435 INFO [main] org.apache.catalina.startup.VersionLoggerListener.log Command line argument: -Djdk.tls.ephemeralDHKeySize=2048 18-Nov-2019 12:27:20.435 INFO [main] org.apache.catalina.startup.VersionLoggerListener.log Command line argument: -Djavax.net.debug=ssl:handshake:verbose 18-Nov-2019 12:27:20.435 INFO [main] org.apache.catalina.startup.VersionLoggerListener.log Command line argument: -Djava.protocol.handler.pkgs=org.apache.catalina.webresources 18-Nov-2019 12:27:20.436 INFO [main] org.apache.catalina.startup.VersionLoggerListener.log Command line argument: -Dignore.endorsed.dirs= 18-Nov-2019 12:27:20.436 INFO [main] org.apache.catalina.startup.VersionLoggerListener.log Command line argument: -Dcatalina.base=C:\apache-tomcat-9.0.27 18-Nov-2019 12:27:20.436 INFO [main] org.apache.catalina.startup.VersionLoggerListener.log Command line argument: -Dcatalina.home=C:\apache-tomcat-9.0.27 18-Nov-2019 12:27:20.436 INFO [main] org.apache.catalina.startup.VersionLoggerListener.log Command line argument: -Djava.io.tmpdir=C:\apache-tomcat-9.0.27\temp 18-Nov-2019 12:27:20.436 INFO [main] org.apache.catalina.core.AprLifecycleListener.lifecycleEvent Loaded APR based Apache Tomcat Native library [1.2.23] using APR version [1.7.0]. 18-Nov-2019 12:27:20.436 INFO [main] org.apache.catalina.core.AprLifecycleListener.lifecycleEvent APR capabilities: IPv6 [true], sendfile [true], accept filters [false], random [true]. 18-Nov-2019 12:27:20.437 INFO [main] org.apache.catalina.core.AprLifecycleListener.lifecycleEvent APR/OpenSSL configuration: useAprConnector [false], useOpenSSL [true] 18-Nov-2019 12:27:20.460 INFO [main] org.apache.catalina.core.AprLifecycleListener.initializeSSL OpenSSL successfully initialized [OpenSSL 1.1.1c 28 May 2019] 18-Nov-2019 12:27:21.040 INFO [main] org.apache.coyote.AbstractProtocol.init Initializing ProtocolHandler ["http-nio-8080"] 18-Nov-2019 12:27:21.262 INFO [main] org.apache.coyote.AbstractProtocol.init Initializing ProtocolHandler ["https-jsse-nio-8443"] javax.net.ssl|DEBUG|01|main|2019-11-18 12:27:21.390 IST|SSLCipher.java:437|jdk.tls.keyLimits: entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472 18-Nov-2019 12:27:21.560 FINE [main] org.apache.tomcat.util.net.SSLUtilBase.getEnabled The [protocols] that are active are : [[TLSv1, TLSv1.3, TLSv1.2, SSLv2Hello, TLSv1.1]] 18-Nov-2019 12:27:21.581 FINE [main] org.apache.tomcat.util.net.openssl.ciphers.OpenSSLCipherConfigurationParser.convertForJSSE jsse.openssl.effectiveCiphers 18-Nov-2019 12:27:21.581 FINE [main] org.apache.tomcat.util.net.SSLUtilBase.getEnabled The [ciphers] that are active are : [[TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_AES_256_GCM_SHA384, TLS_DHE_DSS_WITH_AES_256_GCM_SHA384, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, TLS_DHE_RSA_WITH_AES_256_CBC_SHA256, TLS_DHE_DSS_WITH_AES_256_CBC_SHA256, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_DSS_WITH_AES_256_CBC_SHA, TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384, TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384, TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDH_RSA_WITH_AES_256_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_AES_128_GCM_SHA256, TLS_DHE_DSS_WITH_AES_128_GCM_SHA256, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_DSS_WITH_AES_128_CBC_SHA256, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA]] 18-Nov-2019 12:27:21.582 FINE [main] org.apache.tomcat.util.net.SSLUtilBase.getEnabled Some of the specified [ciphers] are not supported by the SSL engine and have been skipped: [[TLS_ECDHE_ECDSA_WITH_AES_256_CCM_8, TLS_ECDHE_ECDSA_WITH_AES_256_CCM, TLS_PSK_DHE_WITH_AES_256_CCM_8, TLS_DHE_PSK_WITH_AES_256_CCM, TLS_DHE_RSA_WITH_AES_256_CCM_8, TLS_DHE_RSA_WITH_AES_256_CCM, TLS_ECDHE_PSK_WITH_AES_256_CBC_SHA384, TLS_ECDHE_PSK_WITH_AES_256_CBC_SHA, TLS_SRP_SHA_DSS_WITH_AES_256_CBC_SHA, TLS_SRP_SHA_RSA_WITH_AES_256_CBC_SHA, TLS_SRP_SHA_WITH_AES_256_CBC_SHA, TLS_RSA_PSK_WITH_AES_256_CBC_SHA384, TLS_DHE_PSK_WITH_AES_256_CBC_SHA384, TLS_RSA_PSK_WITH_AES_256_GCM_SHA384, TLS_DHE_PSK_WITH_AES_256_GCM_SHA384, TLS_DH_DSS_WITH_AES_256_GCM_SHA384, TLS_DH_RSA_WITH_AES_256_GCM_SHA384, TLS_RSA_PSK_WITH_AES_256_CBC_SHA, TLS_DHE_PSK_WITH_AES_256_CBC_SHA, TLS_DH_RSA_WITH_AES_256_CBC_SHA256, TLS_DH_DSS_WITH_AES_256_CBC_SHA256, TLS_DH_RSA_WITH_AES_256_CBC_SHA, TLS_DH_DSS_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256, TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256, TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384, TLS_ECDHE_ECDSA_WITH_CAMELLIA_256_CBC_SHA384, TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384, TLS_ECDHE_ECDSA_WITH_ARIA_256_GCM_SHA384, TLS_RSA_PSK_WITH_CHACHA20_POLY1305_SHA256, TLS_DHE_PSK_WITH_CHACHA20_POLY1305_SHA256, TLS_ECDHE_PSK_WITH_CHACHA20_POLY1305_SHA256, TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256, TLS_ECDHE_PSK_WITH_CAMELLIA_256_CBC_SHA384, TLS_RSA_PSK_WITH_CAMELLIA_256_CBC_SHA384, TLS_DHE_PSK_WITH_CAMELLIA_256_CBC_SHA384, TLS_RSA_PSK_WITH_ARIA_256_GCM_SHA384, TLS_DHE_PSK_WITH_ARIA_256_GCM_SHA384, TLS_DHE_DSS_WITH_ARIA_256_GCM_SHA384, TLS_DHE_RSA_WITH_ARIA_256_GCM_SHA384, TLS_CHACHA20_POLY1305_SHA256, TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256, TLS_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA256, TLS_DH_RSA_WITH_CAMELLIA_256_CBC_SHA256, TLS_DH_DSS_WITH_CAMELLIA_256_CBC_SHA256, TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA, TLS_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA, TLS_DH_RSA_WITH_CAMELLIA_256_CBC_SHA, TLS_DH_DSS_WITH_CAMELLIA_256_CBC_SHA, TLS_ECDH_RSA_WITH_CAMELLIA_256_CBC_SHA384, TLS_ECDH_ECDSA_WITH_CAMELLIA_256_CBC_SHA384, TLS_PSK_WITH_AES_256_CCM_8, TLS_PSK_WITH_AES_256_CCM, TLS_PSK_WITH_AES_256_CBC_SHA384, TLS_PSK_WITH_AES_256_GCM_SHA384, TLS_PSK_WITH_AES_256_CBC_SHA, TLS_PSK_WITH_CHACHA20_POLY1305_SHA256, TLS_PSK_WITH_CAMELLIA_256_CBC_SHA384, TLS_PSK_WITH_ARIA_256_GCM_SHA384, TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8, TLS_ECDHE_ECDSA_WITH_AES_128_CCM, TLS_PSK_DHE_WITH_AES_128_CCM_8, TLS_DHE_PSK_WITH_AES_128_CCM, TLS_DHE_RSA_WITH_AES_128_CCM_8, TLS_DHE_RSA_WITH_AES_128_CCM, TLS_ECDHE_PSK_WITH_AES_128_CBC_SHA256, TLS_ECDHE_PSK_WITH_AES_128_CBC_SHA, TLS_SRP_SHA_DSS_WITH_AES_128_CBC_SHA, TLS_SRP_SHA_RSA_WITH_AES_128_CBC_SHA, TLS_SRP_SHA_WITH_AES_128_CBC_SHA, TLS_AES_128_CCM_8_SHA256, TLS_AES_128_CCM_SHA256, TLS_RSA_PSK_WITH_AES_128_CBC_SHA256, TLS_DHE_PSK_WITH_AES_128_CBC_SHA256, TLS_RSA_PSK_WITH_AES_128_GCM_SHA256, TLS_DHE_PSK_WITH_AES_128_GCM_SHA256, TLS_DH_DSS_WITH_AES_128_GCM_SHA256, TLS_DH_RSA_WITH_AES_128_GCM_SHA256, TLS_RSA_PSK_WITH_AES_128_CBC_SHA, TLS_DHE_PSK_WITH_AES_128_CBC_SHA, TLS_DH_RSA_WITH_AES_128_CBC_SHA256, TLS_DH_DSS_WITH_AES_128_CBC_SHA256, TLS_DH_RSA_WITH_AES_128_CBC_SHA, TLS_DH_DSS_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_CBC_SHA256, TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256, TLS_ECDHE_ECDSA_WITH_ARIA_128_GCM_SHA256, TLS_ECDHE_PSK_WITH_CAMELLIA_128_CBC_SHA256, TLS_RSA_PSK_WITH_CAMELLIA_128_CBC_SHA256, TLS_DHE_PSK_WITH_CAMELLIA_128_CBC_SHA256, TLS_RSA_PSK_WITH_ARIA_128_GCM_SHA256, TLS_DHE_PSK_WITH_ARIA_128_GCM_SHA256, TLS_DHE_DSS_WITH_ARIA_128_GCM_SHA256, TLS_DHE_RSA_WITH_ARIA_128_GCM_SHA256, TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256, TLS_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA256, TLS_DH_RSA_WITH_CAMELLIA_128_CBC_SHA256, TLS_DH_DSS_WITH_CAMELLIA_128_CBC_SHA256, TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA, TLS_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA, TLS_DH_RSA_WITH_CAMELLIA_128_CBC_SHA, TLS_DH_DSS_WITH_CAMELLIA_128_CBC_SHA, TLS_ECDH_RSA_WITH_CAMELLIA_128_CBC_SHA256, TLS_ECDH_ECDSA_WITH_CAMELLIA_128_CBC_SHA256, TLS_PSK_WITH_AES_128_CCM_8, TLS_PSK_WITH_AES_128_CCM, TLS_PSK_WITH_AES_128_CBC_SHA256, TLS_PSK_WITH_AES_128_GCM_SHA256, TLS_PSK_WITH_AES_128_CBC_SHA, TLS_PSK_WITH_CAMELLIA_128_CBC_SHA256, TLS_PSK_WITH_ARIA_128_GCM_SHA256]] javax.net.ssl|DEBUG|03|Finalizer|2019-11-18 12:27:21.627 IST|SSLSocketImpl.java:473|duplex close of SSLSocket javax.net.ssl|WARNING|03|Finalizer|2019-11-18 12:27:21.629 IST|SSLSocketImpl.java:494|SSLSocket duplex close failed ( "throwable" : { java.net.SocketException: Socket is not connected at java.base/java.net.Socket.shutdownOutput(Socket.java:1553) at java.base/sun.security.ssl.BaseSSLSocketImpl.shutdownOutput(BaseSSLSocketImpl.java:232) at java.base/sun.security.ssl.SSLSocketImpl.duplexCloseOutput(SSLSocketImpl.java:561) at java.base/sun.security.ssl.SSLSocketImpl.close(SSLSocketImpl.java:479) at java.base/sun.security.ssl.BaseSSLSocketImpl.finalize(BaseSSLSocketImpl.java:275) at java.base/java.lang.System$2.invokeFinalize(System.java:2117) at java.base/java.lang.ref.Finalizer.runFinalizer(Finalizer.java:87) at java.base/java.lang.ref.Finalizer$FinalizerThread.run(Finalizer.java:171)} ) javax.net.ssl|DEBUG|03|Finalizer|2019-11-18 12:27:21.630 IST|SSLSocketImpl.java:473|duplex close of SSLSocket javax.net.ssl|WARNING|03|Finalizer|2019-11-18 12:27:21.632 IST|SSLSocketImpl.java:494|SSLSocket duplex close failed ( "throwable" : { java.net.SocketException: Socket is not connected at java.base/java.net.Socket.shutdownOutput(Socket.java:1553) at java.base/sun.security.ssl.BaseSSLSocketImpl.shutdownOutput(BaseSSLSocketImpl.java:232) at java.base/sun.security.ssl.SSLSocketImpl.duplexCloseOutput(SSLSocketImpl.java:561) at java.base/sun.security.ssl.SSLSocketImpl.close(SSLSocketImpl.java:479) at java.base/sun.security.ssl.BaseSSLSocketImpl.finalize(BaseSSLSocketImpl.java:275) at java.base/java.lang.System$2.invokeFinalize(System.java:2117) at java.base/java.lang.ref.Finalizer.runFinalizer(Finalizer.java:87) at java.base/java.lang.ref.Finalizer$FinalizerThread.run(Finalizer.java:171)} ) 18-Nov-2019 12:27:21.638 INFO [main] org.apache.coyote.AbstractProtocol.init Initializing ProtocolHandler ["ajp-nio-8009"] 18-Nov-2019 12:27:21.643 INFO [main] org.apache.catalina.startup.Catalina.load Server initialization in [1,705] milliseconds 18-Nov-2019 12:27:21.756 INFO [main] org.apache.catalina.core.StandardService.startInternal Starting service [Catalina] 18-Nov-2019 12:27:21.757 INFO [main] org.apache.catalina.core.StandardEngine.startInternal Starting Servlet engine: [Apache Tomcat/9.0.27] 18-Nov-2019 12:27:21.774 INFO [main] org.apache.catalina.startup.HostConfig.deployDirectory Deploying web application directory [C:\apache-tomcat-9.0.27\webapps\docs] 18-Nov-2019 12:27:22.402 WARNING [main] org.apache.catalina.util.SessionIdGeneratorBase.createSecureRandom Creation of SecureRandom instance for session ID generation using [SHA1PRNG] took [175] milliseconds. 18-Nov-2019 12:27:22.435 INFO [main] org.apache.catalina.startup.HostConfig.deployDirectory Deployment of web application directory [C:\apache-tomcat-9.0.27\webapps\docs] has finished in [661] ms 18-Nov-2019 12:27:22.436 INFO [main] org.apache.catalina.startup.HostConfig.deployDirectory Deploying web application directory [C:\apache-tomcat-9.0.27\webapps\examples] 18-Nov-2019 12:27:23.259 INFO [main] org.apache.catalina.startup.HostConfig.deployDirectory Deployment of web application directory [C:\apache-tomcat-9.0.27\webapps\examples] has finished in [823] ms 18-Nov-2019 12:27:23.259 INFO [main] org.apache.catalina.startup.HostConfig.deployDirectory Deploying web application directory [C:\apache-tomcat-9.0.27\webapps\host-manager] 18-Nov-2019 12:27:23.322 INFO [main] org.apache.catalina.startup.HostConfig.deployDirectory Deployment of web application directory [C:\apache-tomcat-9.0.27\webapps\host-manager] has finished in [63] ms 18-Nov-2019 12:27:23.323 INFO [main] org.apache.catalina.startup.HostConfig.deployDirectory Deploying web application directory [C:\apache-tomcat-9.0.27\webapps\manager] 18-Nov-2019 12:27:23.372 INFO [main] org.apache.catalina.startup.HostConfig.deployDirectory Deployment of web application directory [C:\apache-tomcat-9.0.27\webapps\manager] has finished in [48] ms 18-Nov-2019 12:27:23.372 INFO [main] org.apache.catalina.startup.HostConfig.deployDirectory Deploying web application directory [C:\apache-tomcat-9.0.27\webapps\ROOT] 18-Nov-2019 12:27:23.415 INFO [main] org.apache.catalina.startup.HostConfig.deployDirectory Deployment of web application directory [C:\apache-tomcat-9.0.27\webapps\ROOT] has finished in [42] ms 18-Nov-2019 12:27:23.420 INFO [main] org.apache.coyote.AbstractProtocol.start Starting ProtocolHandler ["http-nio-8080"] 18-Nov-2019 12:27:23.441 INFO [main] org.apache.coyote.AbstractProtocol.start Starting ProtocolHandler ["https-jsse-nio-8443"] 18-Nov-2019 12:27:23.458 INFO [main] org.apache.coyote.AbstractProtocol.start Starting ProtocolHandler ["ajp-nio-8009"] 18-Nov-2019 12:27:23.484 INFO [main] org.apache.catalina.startup.Catalina.start Server startup in [1,839] milliseconds 18-Nov-2019 12:32:53.444 FINE [https-jsse-nio-8443-exec-1] org.apache.tomcat.util.net.SecureNioChannel.processSNI The SNI host name extracted for connection [java.nio.channels.SocketChannel[connected local=/0:0:0:0:0:0:0:1:8443 remote=/0:0:0:0:0:0:0:1:62978]] was [localhost] javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 12:32:53.463 IST|HandshakeContext.java:290|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 for TLS10 javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 12:32:53.463 IST|HandshakeContext.java:290|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 for TLS10 javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 12:32:53.464 IST|HandshakeContext.java:290|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLS10 javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 12:32:53.464 IST|HandshakeContext.java:290|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLS10 javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 12:32:53.477 IST|HandshakeContext.java:290|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 for TLS13 javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 12:32:53.477 IST|HandshakeContext.java:290|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 for TLS13 javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 12:32:53.478 IST|HandshakeContext.java:290|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLS13 javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 12:32:53.478 IST|HandshakeContext.java:290|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLS13 javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 12:32:53.478 IST|HandshakeContext.java:290|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA for TLS13 javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 12:32:53.479 IST|HandshakeContext.java:290|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA for TLS13 javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 12:32:53.479 IST|HandshakeContext.java:290|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 for TLS11 javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 12:32:53.479 IST|HandshakeContext.java:290|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 for TLS11 javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 12:32:53.480 IST|HandshakeContext.java:290|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLS11 javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 12:32:53.480 IST|HandshakeContext.java:290|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLS11 javax.net.ssl|WARNING|21|https-jsse-nio-8443-exec-1|2019-11-18 12:32:53.566 IST|SignatureScheme.java:282|Signature algorithm, ed25519, is not supported by the underlying providers javax.net.ssl|WARNING|21|https-jsse-nio-8443-exec-1|2019-11-18 12:32:53.567 IST|SignatureScheme.java:282|Signature algorithm, ed448, is not supported by the underlying providers javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 12:32:53.573 IST|ClientHello.java:806|Consuming ClientHello handshake message ( "ClientHello": { "client version" : "TLSv1.2", "random" : "28 0E 48 6D EA 70 C6 65 19 CE B8 A9 7C 5A B3 9F A6 53 C1 A7 21 76 97 AD 92 A3 B6 B9 35 49 8F AD", "session id" : "82 90 D8 45 2F 9F 65 CA E3 B1 69 12 8E E8 9B 3A E0 33 F4 9B BC 32 C9 76 08 AB 61 1A 4F 98 27 D4", "cipher suites" : "[TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_AES_256_GCM_SHA384(0x1302), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), UNKNOWN-CIPHER-SUITE(0xCCA9)(0xCCA9), UNKNOWN-CIPHER-SUITE(0xCCA8)(0xCCA8), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA(0xC00A), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA(0xC009), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA(0xC013), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA(0xC014), TLS_DHE_RSA_WITH_AES_128_CBC_SHA(0x0033), TLS_DHE_RSA_WITH_AES_256_CBC_SHA(0x0039), TLS_RSA_WITH_AES_128_CBC_SHA(0x002F), TLS_RSA_WITH_AES_256_CBC_SHA(0x0035), SSL_RSA_WITH_3DES_EDE_CBC_SHA(0x000A)]", "compression methods" : "00", "extensions" : [ "server_name (0)": { type=host_name (0), value=localhost }, "extended_master_secret (23)": { }, "renegotiation_info (65,281)": { "renegotiated connection": [] }, "supported_groups (10)": { "versions": [x25519, secp256r1, secp384r1, secp521r1, ffdhe2048, ffdhe3072] }, "ec_point_formats (11)": { "formats": [uncompressed] }, "application_layer_protocol_negotiation (16)": { [h2, http/1.1] }, "status_request (5)": { "certificate status type": ocsp "OCSP status request": { "responder_id": "request extensions": { } } }, "key_share (51)": { "client_shares": [ { "named group": x25519 "key_exchange": { 0000: 89 02 ED FB E9 28 4C D0 6B 8F FA 02 6C C1 22 7E .....(L.k...l.". 0010: 8C 97 5C 91 87 BA 57 AD D4 7B 05 7C 9C F5 D1 12 ..\...W......... } }, { "named group": secp256r1 "key_exchange": { 0000: 04 C0 15 66 03 40 03 D1 C9 D2 67 5C 41 B0 C0 77 ...f.@....g\A..w 0010: BB DD 36 40 78 1D 7A 76 E4 98 65 23 80 5B 20 18 ..6@x.zv..e#.[ . 0020: 93 EF 25 A1 F9 6E D7 9E 28 8B 79 64 09 A5 B1 15 ..%..n..(.yd.... 0030: 84 EC B7 02 1C 7C 2F FF 60 1C F5 1E 48 CB C3 5B ....../.`...H..[ 0040: E3 } }, ] }, "supported_versions (43)": { "versions": [TLSv1.3, TLSv1.2, TLSv1.1, TLSv1] }, "signature_algorithms (13)": { "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp512r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1] } ] } ) javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 12:32:53.574 IST|SSLExtensions.java:167|Consumed extension: supported_versions javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 12:32:53.574 IST|ClientHello.java:836|Negotiated protocol version: TLSv1.3 javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 12:32:53.576 IST|PskKeyExchangeModesExtension.java:294|abort session resumption, no supported psk_dhe_ke PSK key exchange mode javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 12:32:53.577 IST|PreSharedKeyExtension.java:783|Handling pre_shared_key absence. javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 12:32:53.577 IST|ServerNameExtension.java:322|no server name matchers, ignore server name indication javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 12:32:53.578 IST|SSLExtensions.java:167|Consumed extension: server_name javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 12:32:53.578 IST|SSLExtensions.java:148|Ignore unavailable extension: max_fragment_length javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 12:32:53.578 IST|SSLExtensions.java:167|Consumed extension: status_request javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 12:32:53.578 IST|SSLExtensions.java:167|Consumed extension: supported_groups javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 12:32:53.579 IST|SSLExtensions.java:138|Ignore unsupported extension: ec_point_formats javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 12:32:53.579 IST|SSLExtensions.java:167|Consumed extension: signature_algorithms javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 12:32:53.579 IST|SSLExtensions.java:148|Ignore unavailable extension: signature_algorithms_cert javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 12:32:53.579 IST|AlpnExtension.java:274|Ignore server unenabled extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 12:32:53.580 IST|SSLExtensions.java:167|Consumed extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 12:32:53.580 IST|SSLExtensions.java:138|Ignore unsupported extension: status_request_v2 javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 12:32:53.580 IST|SSLExtensions.java:138|Ignore unsupported extension: extended_master_secret javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 12:32:53.580 IST|SSLExtensions.java:148|Ignore unavailable extension: cookie javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 12:32:53.581 IST|KeyShareExtension.java:350|Ignore unsupported named group: x25519 javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 12:32:53.583 IST|SSLExtensions.java:167|Consumed extension: key_share javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 12:32:53.583 IST|SSLExtensions.java:138|Ignore unsupported extension: renegotiation_info javax.net.ssl|ALL|21|https-jsse-nio-8443-exec-1|2019-11-18 12:32:53.584 IST|SignatureScheme.java:358|Ignore disabled signature sheme: rsa_md5 javax.net.ssl|WARNING|21|https-jsse-nio-8443-exec-1|2019-11-18 12:32:53.585 IST|SSLExtensions.java:190|Ignore impact of unsupported extension: server_name javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 12:32:53.586 IST|SSLExtensions.java:182|Ignore unavailable extension: max_fragment_length javax.net.ssl|WARNING|21|https-jsse-nio-8443-exec-1|2019-11-18 12:32:53.586 IST|SSLExtensions.java:190|Ignore impact of unsupported extension: status_request javax.net.ssl|WARNING|21|https-jsse-nio-8443-exec-1|2019-11-18 12:32:53.586 IST|SSLExtensions.java:190|Ignore impact of unsupported extension: supported_groups javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 12:32:53.587 IST|SSLExtensions.java:199|Populated with extension: signature_algorithms javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 12:32:53.587 IST|SSLExtensions.java:182|Ignore unavailable extension: signature_algorithms_cert javax.net.ssl|WARNING|21|https-jsse-nio-8443-exec-1|2019-11-18 12:32:53.587 IST|SSLExtensions.java:190|Ignore impact of unsupported extension: application_layer_protocol_negotiation javax.net.ssl|WARNING|21|https-jsse-nio-8443-exec-1|2019-11-18 12:32:53.588 IST|SSLExtensions.java:190|Ignore impact of unsupported extension: supported_versions javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 12:32:53.588 IST|SSLExtensions.java:182|Ignore unavailable extension: cookie javax.net.ssl|ERROR|21|https-jsse-nio-8443-exec-1|2019-11-18 12:32:53.590 IST|TransportContext.java:313|Fatal (HANDSHAKE_FAILURE): pre_shared_key key extension is offered without a psk_key_exchange_modes extension ( "throwable" : { javax.net.ssl.SSLHandshakeException: pre_shared_key key extension is offered without a psk_key_exchange_modes extension at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:128) at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:117) at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:308) at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:264) at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:255) at java.base/sun.security.ssl.PskKeyExchangeModesExtension$PskKeyExchangeModesOnTradeAbsence.absent(PskKeyExchangeModesExtension.java:327) at java.base/sun.security.ssl.SSLExtension.absentOnTrade(SSLExtension.java:572) at java.base/sun.security.ssl.SSLExtensions.consumeOnTrade(SSLExtensions.java:180) at java.base/sun.security.ssl.ServerHello$T13ServerHelloProducer.produce(ServerHello.java:522) at java.base/sun.security.ssl.SSLHandshake.produce(SSLHandshake.java:436) at java.base/sun.security.ssl.ClientHello$T13ClientHelloConsumer.goServerHello(ClientHello.java:1224) at java.base/sun.security.ssl.ClientHello$T13ClientHelloConsumer.consume(ClientHello.java:1160) at java.base/sun.security.ssl.ClientHello$ClientHelloConsumer.onClientHello(ClientHello.java:849) at java.base/sun.security.ssl.ClientHello$ClientHelloConsumer.consume(ClientHello.java:810) at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392) at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:444) at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1065) at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1052) at java.base/java.security.AccessController.doPrivileged(Native Method) at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:999) at org.apache.tomcat.util.net.SecureNioChannel.tasks(SecureNioChannel.java:443) at org.apache.tomcat.util.net.SecureNioChannel.handshakeUnwrap(SecureNioChannel.java:507) at org.apache.tomcat.util.net.SecureNioChannel.handshake(SecureNioChannel.java:238) at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1556) at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49) at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128) at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628) at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61) at java.base/java.lang.Thread.run(Thread.java:834)} ) 18-Nov-2019 12:32:53.592 FINE [https-jsse-nio-8443-exec-1] org.apache.tomcat.util.net.SecureNioChannel.handshake Handshake failed during wrap javax.net.ssl.SSLHandshakeException: pre_shared_key key extension is offered without a psk_key_exchange_modes extension at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:128) at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:117) at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:308) at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:264) at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:255) at java.base/sun.security.ssl.PskKeyExchangeModesExtension$PskKeyExchangeModesOnTradeAbsence.absent(PskKeyExchangeModesExtension.java:327) at java.base/sun.security.ssl.SSLExtension.absentOnTrade(SSLExtension.java:572) at java.base/sun.security.ssl.SSLExtensions.consumeOnTrade(SSLExtensions.java:180) at java.base/sun.security.ssl.ServerHello$T13ServerHelloProducer.produce(ServerHello.java:522) at java.base/sun.security.ssl.SSLHandshake.produce(SSLHandshake.java:436) at java.base/sun.security.ssl.ClientHello$T13ClientHelloConsumer.goServerHello(ClientHello.java:1224) at java.base/sun.security.ssl.ClientHello$T13ClientHelloConsumer.consume(ClientHello.java:1160) at java.base/sun.security.ssl.ClientHello$ClientHelloConsumer.onClientHello(ClientHello.java:849) at java.base/sun.security.ssl.ClientHello$ClientHelloConsumer.consume(ClientHello.java:810) at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392) at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:444) at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1065) at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1052) at java.base/java.security.AccessController.doPrivileged(Native Method) at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:999) at org.apache.tomcat.util.net.SecureNioChannel.tasks(SecureNioChannel.java:443) at org.apache.tomcat.util.net.SecureNioChannel.handshakeUnwrap(SecureNioChannel.java:507) at org.apache.tomcat.util.net.SecureNioChannel.handshake(SecureNioChannel.java:238) at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1556) at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49) at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128) at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628) at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61) at java.base/java.lang.Thread.run(Thread.java:834) javax.net.ssl|WARNING|21|https-jsse-nio-8443-exec-1|2019-11-18 12:32:53.593 IST|SSLEngineOutputRecord.java:168|outbound has closed, ignore outbound application data 18-Nov-2019 12:32:53.693 FINE [https-jsse-nio-8443-exec-1] org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper.doClose Calling [org.apache.tomcat.util.net.NioEndpoint@6e9c2f0f].closeSocket([org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper@426da8fe:org.apache.tomcat.util.net.SecureNioChannel@6a5acca5:java.nio.channels.SocketChannel[connected local=/0:0:0:0:0:0:0:1:8443 remote=/0:0:0:0:0:0:0:1:62978]]) java.lang.Exception at org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper.doClose(NioEndpoint.java:1163) at org.apache.tomcat.util.net.SocketWrapperBase.close(SocketWrapperBase.java:402) at org.apache.tomcat.util.net.NioEndpoint$Poller.cancelledKey(NioEndpoint.java:665) at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1586) at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49) at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128) at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628) at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61) at java.base/java.lang.Thread.run(Thread.java:834) 18-Nov-2019 12:35:57.690 INFO [Thread-5] org.apache.coyote.AbstractProtocol.pause Pausing ProtocolHandler ["http-nio-8080"] 18-Nov-2019 12:35:58.085 FINE [Thread-5] org.apache.tomcat.util.net.AbstractEndpoint.unlockAccept About to unlock socket for:/2606:b400:c11:8026:8044:a57:258b:7f85:8080 18-Nov-2019 12:35:58.142 FINE [Thread-5] org.apache.tomcat.util.net.AbstractEndpoint.unlockAccept Socket unlock completed for:/2606:b400:c11:8026:8044:a57:258b:7f85:8080 18-Nov-2019 12:35:58.154 INFO [Thread-5] org.apache.coyote.AbstractProtocol.pause Pausing ProtocolHandler ["https-jsse-nio-8443"] 18-Nov-2019 12:35:58.572 FINE [Thread-5] org.apache.tomcat.util.net.AbstractEndpoint.unlockAccept About to unlock socket for:/2606:b400:c11:8026:8044:a57:258b:7f85:8443 18-Nov-2019 12:35:58.607 FINE [Thread-5] org.apache.tomcat.util.net.AbstractEndpoint.unlockAccept Socket unlock completed for:/2606:b400:c11:8026:8044:a57:258b:7f85:8443 18-Nov-2019 12:35:58.608 INFO [Thread-5] org.apache.coyote.AbstractProtocol.pause Pausing ProtocolHandler ["ajp-nio-8009"] 18-Nov-2019 12:35:59.011 FINE [Thread-5] org.apache.tomcat.util.net.AbstractEndpoint.unlockAccept About to unlock socket for:/2606:b400:c11:8026:8044:a57:258b:7f85:8009 18-Nov-2019 12:35:59.045 FINE [Thread-5] org.apache.tomcat.util.net.AbstractEndpoint.unlockAccept Socket unlock completed for:/2606:b400:c11:8026:8044:a57:258b:7f85:8009 18-Nov-2019 12:35:59.046 INFO [Thread-5] org.apache.catalina.core.StandardService.stopInternal Stopping service [Catalina] 18-Nov-2019 12:35:59.213 INFO [Thread-5] org.apache.coyote.AbstractProtocol.stop Stopping ProtocolHandler ["http-nio-8080"] 18-Nov-2019 12:35:59.225 INFO [Thread-5] org.apache.coyote.AbstractProtocol.stop Stopping ProtocolHandler ["https-jsse-nio-8443"] 18-Nov-2019 12:35:59.245 INFO [Thread-5] org.apache.coyote.AbstractProtocol.stop Stopping ProtocolHandler ["ajp-nio-8009"] 18-Nov-2019 12:35:59.254 INFO [Thread-5] org.apache.coyote.AbstractProtocol.destroy Destroying ProtocolHandler ["http-nio-8080"] 18-Nov-2019 12:35:59.255 FINE [Thread-5] org.apache.tomcat.util.net.NioEndpoint.unbind Destroy initiated for 0.0.0.0/0.0.0.0:8080 18-Nov-2019 12:35:59.259 FINE [Thread-5] org.apache.tomcat.util.net.NioEndpoint.unbind Destroy completed for 0.0.0.0/0.0.0.0:8080 18-Nov-2019 12:35:59.260 INFO [Thread-5] org.apache.coyote.AbstractProtocol.destroy Destroying ProtocolHandler ["https-jsse-nio-8443"] 18-Nov-2019 12:35:59.261 FINE [Thread-5] org.apache.tomcat.util.net.NioEndpoint.unbind Destroy initiated for 0.0.0.0/0.0.0.0:8443 18-Nov-2019 12:35:59.265 FINE [Thread-5] org.apache.tomcat.util.net.NioEndpoint.unbind Destroy completed for 0.0.0.0/0.0.0.0:8443 18-Nov-2019 12:35:59.266 INFO [Thread-5] org.apache.coyote.AbstractProtocol.destroy Destroying ProtocolHandler ["ajp-nio-8009"] 18-Nov-2019 12:35:59.266 FINE [Thread-5] org.apache.tomcat.util.net.NioEndpoint.unbind Destroy initiated for 0.0.0.0/0.0.0.0:8009 18-Nov-2019 12:35:59.268 FINE [Thread-5] org.apache.tomcat.util.net.NioEndpoint.unbind Destroy completed for 0.0.0.0/0.0.0.0:8009 Terminate batch job (Y/N)? Y