Using CATALINA_BASE: "C:\apache-tomcat-9.0.27" Using CATALINA_HOME: "C:\apache-tomcat-9.0.27" Using CATALINA_TMPDIR: "C:\apache-tomcat-9.0.27\temp" Using JRE_HOME: "C:\TLS_issue\jdk-11.0.2_b2" Using CLASSPATH: "C:\apache-tomcat-9.0.27\bin\bootstrap.jar;C:\apache-tomcat-9.0.27\bin\tomcat-juli.jar" 18-Nov-2019 12:43:47.718 INFO [main] org.apache.catalina.startup.VersionLoggerListener.log Server version name: Apache Tomcat/9.0.27 18-Nov-2019 12:43:47.730 INFO [main] org.apache.catalina.startup.VersionLoggerListener.log Server built: Oct 7 2019 09:57:22 UTC 18-Nov-2019 12:43:47.731 INFO [main] org.apache.catalina.startup.VersionLoggerListener.log Server version number: 9.0.27.0 18-Nov-2019 12:43:47.731 INFO [main] org.apache.catalina.startup.VersionLoggerListener.log OS Name: Windows 7 18-Nov-2019 12:43:47.731 INFO [main] org.apache.catalina.startup.VersionLoggerListener.log OS Version: 6.1 18-Nov-2019 12:43:47.731 INFO [main] org.apache.catalina.startup.VersionLoggerListener.log Architecture: amd64 18-Nov-2019 12:43:47.731 INFO [main] org.apache.catalina.startup.VersionLoggerListener.log Java Home: C:\TLS_issue\jdk-11.0.2_b2 18-Nov-2019 12:43:47.732 INFO [main] org.apache.catalina.startup.VersionLoggerListener.log JVM Version: 11.0.2-ea+2-LTS 18-Nov-2019 12:43:47.732 INFO [main] org.apache.catalina.startup.VersionLoggerListener.log JVM Vendor: Oracle Corporation 18-Nov-2019 12:43:47.732 INFO [main] org.apache.catalina.startup.VersionLoggerListener.log CATALINA_BASE: C:\apache-tomcat-9.0.27 18-Nov-2019 12:43:47.732 INFO [main] org.apache.catalina.startup.VersionLoggerListener.log CATALINA_HOME: C:\apache-tomcat-9.0.27 18-Nov-2019 12:43:47.769 INFO [main] org.apache.catalina.startup.VersionLoggerListener.log Command line argument: --add-opens=java.base/java.lang=ALL-UNNAMED 18-Nov-2019 12:43:47.769 INFO [main] org.apache.catalina.startup.VersionLoggerListener.log Command line argument: --add-opens=java.base/java.io=ALL-UNNAMED 18-Nov-2019 12:43:47.770 INFO [main] org.apache.catalina.startup.VersionLoggerListener.log Command line argument: --add-opens=java.rmi/sun.rmi.transport=ALL-UNNAMED 18-Nov-2019 12:43:47.770 INFO [main] org.apache.catalina.startup.VersionLoggerListener.log Command line argument: -Djava.util.logging.config.file=C:\apache-tomcat-9.0.27\conf\logging.properties 18-Nov-2019 12:43:47.770 INFO [main] org.apache.catalina.startup.VersionLoggerListener.log Command line argument: -Djava.util.logging.manager=org.apache.juli.ClassLoaderLogManager 18-Nov-2019 12:43:47.771 INFO [main] org.apache.catalina.startup.VersionLoggerListener.log Command line argument: -Djdk.tls.ephemeralDHKeySize=2048 18-Nov-2019 12:43:47.772 INFO [main] org.apache.catalina.startup.VersionLoggerListener.log Command line argument: -Djavax.net.debug=ssl:handshake:verbose 18-Nov-2019 12:43:47.773 INFO [main] org.apache.catalina.startup.VersionLoggerListener.log Command line argument: -Djava.protocol.handler.pkgs=org.apache.catalina.webresources 18-Nov-2019 12:43:47.773 INFO [main] org.apache.catalina.startup.VersionLoggerListener.log Command line argument: -Dignore.endorsed.dirs= 18-Nov-2019 12:43:47.773 INFO [main] org.apache.catalina.startup.VersionLoggerListener.log Command line argument: -Dcatalina.base=C:\apache-tomcat-9.0.27 18-Nov-2019 12:43:47.773 INFO [main] org.apache.catalina.startup.VersionLoggerListener.log Command line argument: -Dcatalina.home=C:\apache-tomcat-9.0.27 18-Nov-2019 12:43:47.774 INFO [main] org.apache.catalina.startup.VersionLoggerListener.log Command line argument: -Djava.io.tmpdir=C:\apache-tomcat-9.0.27\temp 18-Nov-2019 12:43:47.774 INFO [main] org.apache.catalina.core.AprLifecycleListener.lifecycleEvent Loaded APR based Apache Tomcat Native library [1.2.23] using APR version [1.7.0]. 18-Nov-2019 12:43:47.774 INFO [main] org.apache.catalina.core.AprLifecycleListener.lifecycleEvent APR capabilities: IPv6 [true], sendfile [true], accept filters [false], random [true]. 18-Nov-2019 12:43:47.775 INFO [main] org.apache.catalina.core.AprLifecycleListener.lifecycleEvent APR/OpenSSL configuration: useAprConnector [false], useOpenSSL [true] 18-Nov-2019 12:43:47.797 INFO [main] org.apache.catalina.core.AprLifecycleListener.initializeSSL OpenSSL successfully initialized [OpenSSL 1.1.1c 28 May 2019] 18-Nov-2019 12:43:48.402 INFO [main] org.apache.coyote.AbstractProtocol.init Initializing ProtocolHandler ["http-nio-8080"] 18-Nov-2019 12:43:48.699 INFO [main] org.apache.coyote.AbstractProtocol.init Initializing ProtocolHandler ["https-jsse-nio-8443"] javax.net.ssl|DEBUG|01|main|2019-11-18 12:43:48.856 IST|SSLCipher.java:437|jdk.tls.keyLimits: entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472 18-Nov-2019 12:43:49.076 FINE [main] org.apache.tomcat.util.net.SSLUtilBase.getEnabled The [protocols] that are active are : [[TLSv1, TLSv1.3, TLSv1.2, SSLv2Hello, TLSv1.1]] 18-Nov-2019 12:43:49.107 FINE [main] org.apache.tomcat.util.net.openssl.ciphers.OpenSSLCipherConfigurationParser.convertForJSSE jsse.openssl.effectiveCiphers 18-Nov-2019 12:43:49.107 FINE [main] org.apache.tomcat.util.net.SSLUtilBase.getEnabled The [ciphers] that are active are : [[TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_AES_256_GCM_SHA384, TLS_DHE_DSS_WITH_AES_256_GCM_SHA384, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, TLS_DHE_RSA_WITH_AES_256_CBC_SHA256, TLS_DHE_DSS_WITH_AES_256_CBC_SHA256, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_DSS_WITH_AES_256_CBC_SHA, TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384, TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384, TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDH_RSA_WITH_AES_256_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_AES_128_GCM_SHA256, TLS_DHE_DSS_WITH_AES_128_GCM_SHA256, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_DSS_WITH_AES_128_CBC_SHA256, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA]] 18-Nov-2019 12:43:49.108 FINE [main] org.apache.tomcat.util.net.SSLUtilBase.getEnabled Some of the specified [ciphers] are not supported by the SSL engine and have been skipped: [[TLS_ECDHE_ECDSA_WITH_AES_256_CCM_8, TLS_ECDHE_ECDSA_WITH_AES_256_CCM, TLS_PSK_DHE_WITH_AES_256_CCM_8, TLS_DHE_PSK_WITH_AES_256_CCM, TLS_DHE_RSA_WITH_AES_256_CCM_8, TLS_DHE_RSA_WITH_AES_256_CCM, TLS_ECDHE_PSK_WITH_AES_256_CBC_SHA384, TLS_ECDHE_PSK_WITH_AES_256_CBC_SHA, TLS_SRP_SHA_DSS_WITH_AES_256_CBC_SHA, TLS_SRP_SHA_RSA_WITH_AES_256_CBC_SHA, TLS_SRP_SHA_WITH_AES_256_CBC_SHA, TLS_RSA_PSK_WITH_AES_256_CBC_SHA384, TLS_DHE_PSK_WITH_AES_256_CBC_SHA384, TLS_RSA_PSK_WITH_AES_256_GCM_SHA384, TLS_DHE_PSK_WITH_AES_256_GCM_SHA384, TLS_DH_DSS_WITH_AES_256_GCM_SHA384, TLS_DH_RSA_WITH_AES_256_GCM_SHA384, TLS_RSA_PSK_WITH_AES_256_CBC_SHA, TLS_DHE_PSK_WITH_AES_256_CBC_SHA, TLS_DH_RSA_WITH_AES_256_CBC_SHA256, TLS_DH_DSS_WITH_AES_256_CBC_SHA256, TLS_DH_RSA_WITH_AES_256_CBC_SHA, TLS_DH_DSS_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256, TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256, TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384, TLS_ECDHE_ECDSA_WITH_CAMELLIA_256_CBC_SHA384, TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384, TLS_ECDHE_ECDSA_WITH_ARIA_256_GCM_SHA384, TLS_RSA_PSK_WITH_CHACHA20_POLY1305_SHA256, TLS_DHE_PSK_WITH_CHACHA20_POLY1305_SHA256, TLS_ECDHE_PSK_WITH_CHACHA20_POLY1305_SHA256, TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256, TLS_ECDHE_PSK_WITH_CAMELLIA_256_CBC_SHA384, TLS_RSA_PSK_WITH_CAMELLIA_256_CBC_SHA384, TLS_DHE_PSK_WITH_CAMELLIA_256_CBC_SHA384, TLS_RSA_PSK_WITH_ARIA_256_GCM_SHA384, TLS_DHE_PSK_WITH_ARIA_256_GCM_SHA384, TLS_DHE_DSS_WITH_ARIA_256_GCM_SHA384, TLS_DHE_RSA_WITH_ARIA_256_GCM_SHA384, TLS_CHACHA20_POLY1305_SHA256, TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256, TLS_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA256, TLS_DH_RSA_WITH_CAMELLIA_256_CBC_SHA256, TLS_DH_DSS_WITH_CAMELLIA_256_CBC_SHA256, TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA, TLS_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA, TLS_DH_RSA_WITH_CAMELLIA_256_CBC_SHA, TLS_DH_DSS_WITH_CAMELLIA_256_CBC_SHA, TLS_ECDH_RSA_WITH_CAMELLIA_256_CBC_SHA384, TLS_ECDH_ECDSA_WITH_CAMELLIA_256_CBC_SHA384, TLS_PSK_WITH_AES_256_CCM_8, TLS_PSK_WITH_AES_256_CCM, TLS_PSK_WITH_AES_256_CBC_SHA384, TLS_PSK_WITH_AES_256_GCM_SHA384, TLS_PSK_WITH_AES_256_CBC_SHA, TLS_PSK_WITH_CHACHA20_POLY1305_SHA256, TLS_PSK_WITH_CAMELLIA_256_CBC_SHA384, TLS_PSK_WITH_ARIA_256_GCM_SHA384, TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8, TLS_ECDHE_ECDSA_WITH_AES_128_CCM, TLS_PSK_DHE_WITH_AES_128_CCM_8, TLS_DHE_PSK_WITH_AES_128_CCM, TLS_DHE_RSA_WITH_AES_128_CCM_8, TLS_DHE_RSA_WITH_AES_128_CCM, TLS_ECDHE_PSK_WITH_AES_128_CBC_SHA256, TLS_ECDHE_PSK_WITH_AES_128_CBC_SHA, TLS_SRP_SHA_DSS_WITH_AES_128_CBC_SHA, TLS_SRP_SHA_RSA_WITH_AES_128_CBC_SHA, TLS_SRP_SHA_WITH_AES_128_CBC_SHA, TLS_AES_128_CCM_8_SHA256, TLS_AES_128_CCM_SHA256, TLS_RSA_PSK_WITH_AES_128_CBC_SHA256, TLS_DHE_PSK_WITH_AES_128_CBC_SHA256, TLS_RSA_PSK_WITH_AES_128_GCM_SHA256, TLS_DHE_PSK_WITH_AES_128_GCM_SHA256, TLS_DH_DSS_WITH_AES_128_GCM_SHA256, TLS_DH_RSA_WITH_AES_128_GCM_SHA256, TLS_RSA_PSK_WITH_AES_128_CBC_SHA, TLS_DHE_PSK_WITH_AES_128_CBC_SHA, TLS_DH_RSA_WITH_AES_128_CBC_SHA256, TLS_DH_DSS_WITH_AES_128_CBC_SHA256, TLS_DH_RSA_WITH_AES_128_CBC_SHA, TLS_DH_DSS_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_CBC_SHA256, TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256, TLS_ECDHE_ECDSA_WITH_ARIA_128_GCM_SHA256, TLS_ECDHE_PSK_WITH_CAMELLIA_128_CBC_SHA256, TLS_RSA_PSK_WITH_CAMELLIA_128_CBC_SHA256, TLS_DHE_PSK_WITH_CAMELLIA_128_CBC_SHA256, TLS_RSA_PSK_WITH_ARIA_128_GCM_SHA256, TLS_DHE_PSK_WITH_ARIA_128_GCM_SHA256, TLS_DHE_DSS_WITH_ARIA_128_GCM_SHA256, TLS_DHE_RSA_WITH_ARIA_128_GCM_SHA256, TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256, TLS_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA256, TLS_DH_RSA_WITH_CAMELLIA_128_CBC_SHA256, TLS_DH_DSS_WITH_CAMELLIA_128_CBC_SHA256, TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA, TLS_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA, TLS_DH_RSA_WITH_CAMELLIA_128_CBC_SHA, TLS_DH_DSS_WITH_CAMELLIA_128_CBC_SHA, TLS_ECDH_RSA_WITH_CAMELLIA_128_CBC_SHA256, TLS_ECDH_ECDSA_WITH_CAMELLIA_128_CBC_SHA256, TLS_PSK_WITH_AES_128_CCM_8, TLS_PSK_WITH_AES_128_CCM, TLS_PSK_WITH_AES_128_CBC_SHA256, TLS_PSK_WITH_AES_128_GCM_SHA256, TLS_PSK_WITH_AES_128_CBC_SHA, TLS_PSK_WITH_CAMELLIA_128_CBC_SHA256, TLS_PSK_WITH_ARIA_128_GCM_SHA256]] 18-Nov-2019 12:43:49.150 INFO [main] org.apache.coyote.AbstractProtocol.init Initializing ProtocolHandler ["ajp-nio-8009"] 18-Nov-2019 12:43:49.160 INFO [main] org.apache.catalina.startup.Catalina.load Server initialization in [1,902] milliseconds 18-Nov-2019 12:43:49.290 INFO [main] org.apache.catalina.core.StandardService.startInternal Starting service [Catalina] 18-Nov-2019 12:43:49.290 INFO [main] org.apache.catalina.core.StandardEngine.startInternal Starting Servlet engine: [Apache Tomcat/9.0.27] 18-Nov-2019 12:43:49.311 INFO [main] org.apache.catalina.startup.HostConfig.deployDirectory Deploying web application directory [C:\apache-tomcat-9.0.27\webapps\docs] 18-Nov-2019 12:43:49.989 WARNING [main] org.apache.catalina.util.SessionIdGeneratorBase.createSecureRandom Creation of SecureRandom instance for session ID generation using [SHA1PRNG] took [145] milliseconds. 18-Nov-2019 12:43:50.017 INFO [main] org.apache.catalina.startup.HostConfig.deployDirectory Deployment of web application directory [C:\apache-tomcat-9.0.27\webapps\docs] has finished in [706] ms 18-Nov-2019 12:43:50.018 INFO [main] org.apache.catalina.startup.HostConfig.deployDirectory Deploying web application directory [C:\apache-tomcat-9.0.27\webapps\examples] 18-Nov-2019 12:43:50.899 INFO [main] org.apache.catalina.startup.HostConfig.deployDirectory Deployment of web application directory [C:\apache-tomcat-9.0.27\webapps\examples] has finished in [881] ms 18-Nov-2019 12:43:50.900 INFO [main] org.apache.catalina.startup.HostConfig.deployDirectory Deploying web application directory [C:\apache-tomcat-9.0.27\webapps\host-manager] 18-Nov-2019 12:43:50.958 INFO [main] org.apache.catalina.startup.HostConfig.deployDirectory Deployment of web application directory [C:\apache-tomcat-9.0.27\webapps\host-manager] has finished in [58] ms 18-Nov-2019 12:43:50.959 INFO [main] org.apache.catalina.startup.HostConfig.deployDirectory Deploying web application directory [C:\apache-tomcat-9.0.27\webapps\manager] 18-Nov-2019 12:43:51.016 INFO [main] org.apache.catalina.startup.HostConfig.deployDirectory Deployment of web application directory [C:\apache-tomcat-9.0.27\webapps\manager] has finished in [57] ms 18-Nov-2019 12:43:51.017 INFO [main] org.apache.catalina.startup.HostConfig.deployDirectory Deploying web application directory [C:\apache-tomcat-9.0.27\webapps\ROOT] 18-Nov-2019 12:43:51.054 INFO [main] org.apache.catalina.startup.HostConfig.deployDirectory Deployment of web application directory [C:\apache-tomcat-9.0.27\webapps\ROOT] has finished in [37] ms 18-Nov-2019 12:43:51.061 INFO [main] org.apache.coyote.AbstractProtocol.start Starting ProtocolHandler ["http-nio-8080"] 18-Nov-2019 12:43:51.083 INFO [main] org.apache.coyote.AbstractProtocol.start Starting ProtocolHandler ["https-jsse-nio-8443"] 18-Nov-2019 12:43:51.093 INFO [main] org.apache.coyote.AbstractProtocol.start Starting ProtocolHandler ["ajp-nio-8009"] 18-Nov-2019 12:43:51.105 INFO [main] org.apache.catalina.startup.Catalina.start Server startup in [1,944] milliseconds 18-Nov-2019 12:44:33.739 FINE [https-jsse-nio-8443-exec-1] org.apache.tomcat.util.net.SecureNioChannel.processSNI The SNI host name extracted for connection [java.nio.channels.SocketChannel[connected local=/0:0:0:0:0:0:0:1:8443 remote=/0:0:0:0:0:0:0:1:63242]] was [localhost] javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 12:44:33.751 IST|HandshakeContext.java:290|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 for TLS10 javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 12:44:33.751 IST|HandshakeContext.java:290|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 for TLS10 javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 12:44:33.751 IST|HandshakeContext.java:290|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLS10 javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 12:44:33.752 IST|HandshakeContext.java:290|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLS10 javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 12:44:33.764 IST|HandshakeContext.java:290|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 for TLS13 javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 12:44:33.764 IST|HandshakeContext.java:290|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 for TLS13 javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 12:44:33.765 IST|HandshakeContext.java:290|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLS13 javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 12:44:33.765 IST|HandshakeContext.java:290|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLS13 javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 12:44:33.765 IST|HandshakeContext.java:290|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA for TLS13 javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 12:44:33.765 IST|HandshakeContext.java:290|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA for TLS13 javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 12:44:33.766 IST|HandshakeContext.java:290|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 for TLS11 javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 12:44:33.766 IST|HandshakeContext.java:290|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 for TLS11 javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 12:44:33.767 IST|HandshakeContext.java:290|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLS11 javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 12:44:33.767 IST|HandshakeContext.java:290|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLS11 javax.net.ssl|WARNING|21|https-jsse-nio-8443-exec-1|2019-11-18 12:44:33.870 IST|SignatureScheme.java:282|Signature algorithm, ed25519, is not supported by the underlying providers javax.net.ssl|WARNING|21|https-jsse-nio-8443-exec-1|2019-11-18 12:44:33.870 IST|SignatureScheme.java:282|Signature algorithm, ed448, is not supported by the underlying providers javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 12:44:33.876 IST|ClientHello.java:806|Consuming ClientHello handshake message ( "ClientHello": { "client version" : "TLSv1.2", "random" : "EB 47 AE 40 89 C8 96 E2 1E 85 8C 6A 37 19 A9 35 23 23 F3 DC 24 B3 6C C1 AD C9 6D F9 BA 5A 53 01", "session id" : "45 8C 3A 7A 03 CB 61 43 61 E6 72 DC 13 2C D5 0A 2D 50 43 1F 43 F6 62 23 D0 99 06 FF B9 13 66 67", "cipher suites" : "[TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_AES_256_GCM_SHA384(0x1302), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), UNKNOWN-CIPHER-SUITE(0xCCA9)(0xCCA9), UNKNOWN-CIPHER-SUITE(0xCCA8)(0xCCA8), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA(0xC00A), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA(0xC009), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA(0xC013), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA(0xC014), TLS_DHE_RSA_WITH_AES_128_CBC_SHA(0x0033), TLS_DHE_RSA_WITH_AES_256_CBC_SHA(0x0039), TLS_RSA_WITH_AES_128_CBC_SHA(0x002F), TLS_RSA_WITH_AES_256_CBC_SHA(0x0035), SSL_RSA_WITH_3DES_EDE_CBC_SHA(0x000A)]", "compression methods" : "00", "extensions" : [ "server_name (0)": { type=host_name (0), value=localhost }, "extended_master_secret (23)": { }, "renegotiation_info (65,281)": { "renegotiated connection": [] }, "supported_groups (10)": { "versions": [x25519, secp256r1, secp384r1, secp521r1, ffdhe2048, ffdhe3072] }, "ec_point_formats (11)": { "formats": [uncompressed] }, "application_layer_protocol_negotiation (16)": { [h2, http/1.1] }, "status_request (5)": { "certificate status type": ocsp "OCSP status request": { "responder_id": "request extensions": { } } }, "key_share (51)": { "client_shares": [ { "named group": x25519 "key_exchange": { 0000: FC 1C D5 FF 08 D6 8D 91 B8 B3 FC B4 72 04 2F 82 ............r./. 0010: 32 A2 CC 81 A7 45 45 06 1F 3E 2E 49 7C 51 CD 57 2....EE..>.I.Q.W } }, { "named group": secp256r1 "key_exchange": { 0000: 04 34 63 8E B4 4F 2A F6 62 A9 AA F7 9E E7 DA A5 .4c..O*.b....... 0010: 20 1F 96 AE A8 51 4E BB DD AB 4F 6A E4 48 A1 03 ....QN...Oj.H.. 0020: E4 A2 D8 4C 5C 63 A4 68 83 66 7C A8 67 FC 8F DD ...L\c.h.f..g... 0030: EC 93 99 9B 0A 1B 7F 3B 07 37 59 EF 36 31 98 54 .......;.7Y.61.T 0040: 14 } }, ] }, "supported_versions (43)": { "versions": [TLSv1.3, TLSv1.2, TLSv1.1, TLSv1] }, "signature_algorithms (13)": { "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp512r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1] } ] } ) javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 12:44:33.877 IST|SSLExtensions.java:167|Consumed extension: supported_versions javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 12:44:33.877 IST|ClientHello.java:836|Negotiated protocol version: TLSv1.3 javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 12:44:33.879 IST|PskKeyExchangeModesExtension.java:294|abort session resumption, no supported psk_dhe_ke PSK key exchange mode javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 12:44:33.880 IST|PreSharedKeyExtension.java:783|Handling pre_shared_key absence. javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 12:44:33.880 IST|ServerNameExtension.java:322|no server name matchers, ignore server name indication javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 12:44:33.881 IST|SSLExtensions.java:167|Consumed extension: server_name javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 12:44:33.881 IST|SSLExtensions.java:148|Ignore unavailable extension: max_fragment_length javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 12:44:33.881 IST|SSLExtensions.java:167|Consumed extension: status_request javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 12:44:33.882 IST|SSLExtensions.java:167|Consumed extension: supported_groups javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 12:44:33.882 IST|SSLExtensions.java:138|Ignore unsupported extension: ec_point_formats javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 12:44:33.882 IST|SSLExtensions.java:167|Consumed extension: signature_algorithms javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 12:44:33.882 IST|SSLExtensions.java:148|Ignore unavailable extension: signature_algorithms_cert javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 12:44:33.884 IST|AlpnExtension.java:274|Ignore server unenabled extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 12:44:33.884 IST|SSLExtensions.java:167|Consumed extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 12:44:33.884 IST|SSLExtensions.java:138|Ignore unsupported extension: status_request_v2 javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 12:44:33.885 IST|SSLExtensions.java:138|Ignore unsupported extension: extended_master_secret javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 12:44:33.885 IST|SSLExtensions.java:148|Ignore unavailable extension: cookie javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 12:44:33.885 IST|KeyShareExtension.java:350|Ignore unsupported named group: x25519 javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 12:44:33.887 IST|SSLExtensions.java:167|Consumed extension: key_share javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 12:44:33.887 IST|SSLExtensions.java:138|Ignore unsupported extension: renegotiation_info javax.net.ssl|ALL|21|https-jsse-nio-8443-exec-1|2019-11-18 12:44:33.888 IST|SignatureScheme.java:358|Ignore disabled signature sheme: rsa_md5 javax.net.ssl|WARNING|21|https-jsse-nio-8443-exec-1|2019-11-18 12:44:33.889 IST|SSLExtensions.java:190|Ignore impact of unsupported extension: server_name javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 12:44:33.889 IST|SSLExtensions.java:182|Ignore unavailable extension: max_fragment_length javax.net.ssl|WARNING|21|https-jsse-nio-8443-exec-1|2019-11-18 12:44:33.889 IST|SSLExtensions.java:190|Ignore impact of unsupported extension: status_request javax.net.ssl|WARNING|21|https-jsse-nio-8443-exec-1|2019-11-18 12:44:33.889 IST|SSLExtensions.java:190|Ignore impact of unsupported extension: supported_groups javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 12:44:33.890 IST|SSLExtensions.java:199|Populated with extension: signature_algorithms javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 12:44:33.890 IST|SSLExtensions.java:182|Ignore unavailable extension: signature_algorithms_cert javax.net.ssl|WARNING|21|https-jsse-nio-8443-exec-1|2019-11-18 12:44:33.891 IST|SSLExtensions.java:190|Ignore impact of unsupported extension: application_layer_protocol_negotiation javax.net.ssl|WARNING|21|https-jsse-nio-8443-exec-1|2019-11-18 12:44:33.891 IST|SSLExtensions.java:190|Ignore impact of unsupported extension: supported_versions javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 12:44:33.891 IST|SSLExtensions.java:182|Ignore unavailable extension: cookie javax.net.ssl|WARNING|21|https-jsse-nio-8443-exec-1|2019-11-18 12:44:33.891 IST|SSLExtensions.java:190|Ignore impact of unsupported extension: key_share javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 12:44:33.891 IST|SSLExtensions.java:182|Ignore unavailable extension: pre_shared_key javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 12:44:33.892 IST|ServerHello.java:711|use cipher suite TLS_AES_128_GCM_SHA256 javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 12:44:33.900 IST|SSLExtensions.java:235|Ignore, context unavailable extension: pre_shared_key javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 12:44:33.902 IST|ServerHello.java:580|Produced ServerHello handshake message ( "ServerHello": { "server version" : "TLSv1.2", "random" : "15 6F 91 95 C2 5E 38 DA C4 E5 77 97 43 C1 09 5F 26 58 43 24 4F E9 CC B0 DC 55 99 2A EB 16 88 A0", "session id" : "45 8C 3A 7A 03 CB 61 43 61 E6 72 DC 13 2C D5 0A 2D 50 43 1F 43 F6 62 23 D0 99 06 FF B9 13 66 67", "cipher suite" : "TLS_AES_128_GCM_SHA256(0x1301)", "compression methods" : "00", "extensions" : [ "supported_versions (43)": { "selected version": [TLSv1.3] }, "key_share (51)": { "server_share": { "named group": secp256r1 "key_exchange": { 0000: 04 80 77 0C FA 5E E2 42 6C BB 2C 9E F1 01 DB 9B ..w..^.Bl.,..... 0010: E5 A3 5B A2 11 D9 7C C0 1B A4 2E 28 47 2B 1F 75 ..[........(G+.u 0020: 78 6D 2D 65 8E CB 36 2A 9D 7D AD 1B 4E 70 EA 78 xm-e..6*....Np.x 0030: 1C 32 73 D8 00 15 67 6E 3A CB 4B C6 C1 C2 97 30 .2s...gn:.K....0 0040: 06 } }, } ] } ) javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 12:44:33.913 IST|SSLCipher.java:1824|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE countdown value = 137438953472 javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 12:44:33.915 IST|SSLCipher.java:1978|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE countdown value = 137438953472 javax.net.ssl|ALL|21|https-jsse-nio-8443-exec-1|2019-11-18 12:44:33.915 IST|ServerNameExtension.java:532|No expected server name indication response javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 12:44:33.915 IST|SSLExtensions.java:235|Ignore, context unavailable extension: server_name javax.net.ssl|ALL|21|https-jsse-nio-8443-exec-1|2019-11-18 12:44:33.916 IST|MaxFragExtension.java:471|Ignore unavailable max_fragment_length extension javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 12:44:33.916 IST|SSLExtensions.java:235|Ignore, context unavailable extension: max_fragment_length javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 12:44:33.917 IST|AlpnExtension.java:363|Ignore unavailable extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 12:44:33.917 IST|SSLExtensions.java:235|Ignore, context unavailable extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 12:44:33.918 IST|EncryptedExtensions.java:137|Produced EncryptedExtensions message ( "EncryptedExtensions": [ "supported_groups (10)": { "versions": [secp256r1, secp384r1, secp521r1, sect283k1, sect283r1, sect409k1, sect409r1, sect571k1, sect571r1, secp256k1, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192] } ] ) javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 12:44:33.919 IST|CertificateRequest.java:821|Produced CertificateRequest message ( "CertificateRequest": { "certificate_request_context": "", "extensions": [ "signature_algorithms (13)": { "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp512r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1] }, "signature_algorithms_cert (50)": { "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp512r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1] } ] } ) javax.net.ssl|ALL|21|https-jsse-nio-8443-exec-1|2019-11-18 12:44:33.921 IST|X509Authentication.java:241|No X.509 cert selected for EC javax.net.ssl|WARNING|21|https-jsse-nio-8443-exec-1|2019-11-18 12:44:33.921 IST|CertificateMessage.java:1059|Unavailable authentication scheme: ecdsa_secp256r1_sha256 javax.net.ssl|ALL|21|https-jsse-nio-8443-exec-1|2019-11-18 12:44:33.921 IST|X509Authentication.java:241|No X.509 cert selected for EC javax.net.ssl|WARNING|21|https-jsse-nio-8443-exec-1|2019-11-18 12:44:33.922 IST|CertificateMessage.java:1059|Unavailable authentication scheme: ecdsa_secp384r1_sha384 javax.net.ssl|ALL|21|https-jsse-nio-8443-exec-1|2019-11-18 12:44:33.922 IST|X509Authentication.java:241|No X.509 cert selected for EC javax.net.ssl|WARNING|21|https-jsse-nio-8443-exec-1|2019-11-18 12:44:33.922 IST|CertificateMessage.java:1059|Unavailable authentication scheme: ecdsa_secp512r1_sha512 javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 12:44:33.924 IST|StatusResponseManager.java:763|Staping disabled or is a resumed session javax.net.ssl|ALL|21|https-jsse-nio-8443-exec-1|2019-11-18 12:44:33.924 IST|CertStatusExtension.java:1111|Stapling is disabled for this connection javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 12:44:33.924 IST|SSLExtensions.java:235|Ignore, context unavailable extension: status_request javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 12:44:33.926 IST|CertificateMessage.java:998|Produced server Certificate message ( "Certificate": { "certificate_request_context": "", "certificate_list": [ { "certificate" : { "version" : "v3", "serial number" : "3B FD 86 4A 58 09 72 F6", "signature algorithm": "SHA512withRSA", "issuer" : "CN=localhost", "not before" : "2019-11-05 13:41:52.000 IST", "not after" : "2020-11-05 13:41:52.000 IST", "subject" : "CN=localhost", "subject public key" : "RSA", "extensions" : [ { ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:false PathLen:2147483647 ] }, { ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_Encipherment Data_Encipherment ] } ]} "extensions": { } }, ] } ) javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 12:44:33.981 IST|CertificateVerify.java:1080|Produced server CertificateVerify handshake message ( "CertificateVerify": { "signature algorithm": rsa_pss_rsae_sha256 "signature": { 0000: 5B 97 5A 6F DF 84 BB 20 1D 19 AC 0B 85 82 B9 CB [.Zo... ........ 0010: 93 4E B6 EE 53 62 BF 84 AC 7B E1 5E 93 A5 A1 09 .N..Sb.....^.... 0020: 36 3A EC B9 4F 8D FC 16 F2 DA 7B E9 58 85 AC B2 6:..O.......X... 0030: 6E 5C E8 3A 2D 53 69 B8 7A C0 23 8C 6A A7 BF DF n\.:-Si.z.#.j... 0040: E1 D8 A7 40 D8 1C 98 AB 8A 56 80 87 FB 0E B7 EC ...@.....V...... 0050: DD 62 EB F3 67 94 30 D1 07 E1 7E 1F 66 A2 F3 60 .b..g.0.....f..` 0060: 82 85 B0 24 26 03 A0 26 BA 3D 5D 69 87 F6 10 3A ...$&..&.=]i...: 0070: A3 D7 D7 2C CB 6B 3C 55 F2 11 63 8C 36 73 32 76 ...,.k } }, ] } ) javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 12:44:36.088 IST|CertificateVerify.java:1128|Consuming CertificateVerify handshake message ( "CertificateVerify": { "signature algorithm": rsa_pss_rsae_sha256 "signature": { 0000: 15 9C 40 3C 1B A4 D6 F8 9F 95 46 10 24 8A B5 C6 ..@<......F.$... 0010: 02 4F 96 3B D3 1F A7 6A 07 FB 3E E1 E6 6E 36 8E .O.;...j..>..n6. 0020: D5 07 95 5D B7 F2 7D BD 27 57 1E EB DC C1 A6 77 ...]....'W.....w 0030: 03 33 65 B9 3C 9E 52 93 F4 F7 24 67 4B 37 E1 3E .3e.<.R...$gK7.> 0040: 98 44 51 3A 99 CD 52 5C 25 A1 DA 4F 5A 8C 67 93 .DQ:..R\%..OZ.g. 0050: E3 F3 B1 F3 09 99 4F 39 62 0F 59 E3 51 DA 3C 69 ......O9b.Y.Q.k......r...wQ.. 0070: A4 AD 70 8B F6 24 B8 0E 55 F6 50 F3 8D F9 74 81 ..p..$..U.P...t. 0080: 12 3C 18 D7 DD 9C F0 42 80 D3 EC 8D C3 3D 75 A6 .<.....B.....=u. 0090: 20 AC 7F 27 F0 9F E4 63 0F 46 22 C8 36 AF 0D 76 ..'...c.F".6..v 00A0: 70 6D BA 28 ED 7F D3 66 9E 31 E2 43 83 7F EC 94 pm.(...f.1.C.... 00B0: 93 BE 63 88 56 24 13 0D C1 62 18 8C E3 24 14 D0 ..c.V$...b...$.. 00C0: 3C 7F BC 15 4F 54 4A 58 D3 E3 AA 37 95 9B 38 5A <...OTJX...7..8Z 00D0: AC 5C 56 25 50 66 B3 E8 9E 79 9B 23 B1 B6 B9 31 .\V%Pf...y.#...1 00E0: 04 F0 C5 81 4E FB FF 36 B9 11 21 66 9C 1C 93 10 ....N..6..!f.... 00F0: 7A 42 1A 28 96 70 1D 06 A5 33 A5 01 B9 24 FA 9B zB.(.p...3...$.. } } ) javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 12:44:36.089 IST|Finished.java:978|Consuming client Finished handshake message ( "Finished": { "verify data": { 0000: A8 E8 E6 A5 CA A0 9C 32 E9 4D 91 76 70 F5 56 67 .......2.M.vp.Vg 0010: 99 80 FD 39 B2 C4 3A 80 00 B5 6F 5A 4D 0A C5 E0 ...9..:...oZM... }'} ) javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 12:44:36.091 IST|SSLCipher.java:1824|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE countdown value = 137438953472 javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 12:44:36.091 IST|Finished.java:1070|Sending new session ticket 18-Nov-2019 12:44:36.093 FINE [https-jsse-nio-8443-exec-4] org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun Error during SSL handshake java.io.IOException: NOT_HANDSHAKING during handshake at org.apache.tomcat.util.net.SecureNioChannel.handshake(SecureNioChannel.java:193) at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1556) at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49) at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128) at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628) at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61) at java.base/java.lang.Thread.run(Thread.java:834) 18-Nov-2019 12:44:36.170 FINE [https-jsse-nio-8443-exec-4] org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper.doClose Calling [org.apache.tomcat.util.net.NioEndpoint@4db49c7f].closeSocket([org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper@51050a26:org.apache.tomcat.util.net.SecureNioChannel@2c9ead00:java.nio.channels.SocketChannel[connected local=/0:0:0:0:0:0:0:1:8443 remote=/0:0:0:0:0:0:0:1:63242]]) java.lang.Exception at org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper.doClose(NioEndpoint.java:1163) at org.apache.tomcat.util.net.SocketWrapperBase.close(SocketWrapperBase.java:402) at org.apache.tomcat.util.net.NioEndpoint$Poller.cancelledKey(NioEndpoint.java:665) at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1586) at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49) at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128) at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628) at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61) at java.base/java.lang.Thread.run(Thread.java:834) javax.net.ssl|ALL|24|https-jsse-nio-8443-exec-4|2019-11-18 12:44:36.170 IST|SSLEngineImpl.java:743|Closing outbound of SSLEngine javax.net.ssl|WARNING|24|https-jsse-nio-8443-exec-4|2019-11-18 12:44:36.172 IST|SSLEngineOutputRecord.java:168|outbound has closed, ignore outbound application data 18-Nov-2019 12:44:36.177 FINE [https-jsse-nio-8443-exec-5] org.apache.tomcat.util.net.SecureNioChannel.processSNI The SNI host name extracted for connection [java.nio.channels.SocketChannel[connected local=/0:0:0:0:0:0:0:1:8443 remote=/0:0:0:0:0:0:0:1:63247]] was [localhost] javax.net.ssl|DEBUG|25|https-jsse-nio-8443-exec-5|2019-11-18 12:44:36.179 IST|HandshakeContext.java:290|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 for TLS10 javax.net.ssl|DEBUG|25|https-jsse-nio-8443-exec-5|2019-11-18 12:44:36.179 IST|HandshakeContext.java:290|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 for TLS10 javax.net.ssl|DEBUG|25|https-jsse-nio-8443-exec-5|2019-11-18 12:44:36.179 IST|HandshakeContext.java:290|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLS10 javax.net.ssl|DEBUG|25|https-jsse-nio-8443-exec-5|2019-11-18 12:44:36.179 IST|HandshakeContext.java:290|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLS10 javax.net.ssl|DEBUG|25|https-jsse-nio-8443-exec-5|2019-11-18 12:44:36.180 IST|HandshakeContext.java:290|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 for TLS13 javax.net.ssl|DEBUG|25|https-jsse-nio-8443-exec-5|2019-11-18 12:44:36.180 IST|HandshakeContext.java:290|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 for TLS13 javax.net.ssl|DEBUG|25|https-jsse-nio-8443-exec-5|2019-11-18 12:44:36.180 IST|HandshakeContext.java:290|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLS13 javax.net.ssl|DEBUG|25|https-jsse-nio-8443-exec-5|2019-11-18 12:44:36.180 IST|HandshakeContext.java:290|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLS13 javax.net.ssl|DEBUG|25|https-jsse-nio-8443-exec-5|2019-11-18 12:44:36.181 IST|HandshakeContext.java:290|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA for TLS13 javax.net.ssl|DEBUG|25|https-jsse-nio-8443-exec-5|2019-11-18 12:44:36.181 IST|HandshakeContext.java:290|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA for TLS13 javax.net.ssl|DEBUG|25|https-jsse-nio-8443-exec-5|2019-11-18 12:44:36.181 IST|HandshakeContext.java:290|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 for TLS11 javax.net.ssl|DEBUG|25|https-jsse-nio-8443-exec-5|2019-11-18 12:44:36.181 IST|HandshakeContext.java:290|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 for TLS11 javax.net.ssl|DEBUG|25|https-jsse-nio-8443-exec-5|2019-11-18 12:44:36.182 IST|HandshakeContext.java:290|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLS11 javax.net.ssl|DEBUG|25|https-jsse-nio-8443-exec-5|2019-11-18 12:44:36.182 IST|HandshakeContext.java:290|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLS11 javax.net.ssl|DEBUG|25|https-jsse-nio-8443-exec-5|2019-11-18 12:44:36.187 IST|ClientHello.java:806|Consuming ClientHello handshake message ( "ClientHello": { "client version" : "TLSv1.2", "random" : "B6 BF 92 5B 2A C6 41 DA 9C 87 BF 98 67 32 A6 F2 1E 61 EB ED EA 3E 51 9F F3 41 B3 0C BD 43 55 7E", "session id" : "10 CF 61 BC E6 AC ED C7 63 EA A9 41 A8 DA 80 72 90 F1 DC C9 B3 F1 42 E1 D4 15 C8 D4 91 D4 29 A7", "cipher suites" : "[TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_AES_256_GCM_SHA384(0x1302), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), UNKNOWN-CIPHER-SUITE(0xCCA9)(0xCCA9), UNKNOWN-CIPHER-SUITE(0xCCA8)(0xCCA8), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA(0xC00A), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA(0xC009), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA(0xC013), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA(0xC014), TLS_DHE_RSA_WITH_AES_128_CBC_SHA(0x0033), TLS_DHE_RSA_WITH_AES_256_CBC_SHA(0x0039), TLS_RSA_WITH_AES_128_CBC_SHA(0x002F), TLS_RSA_WITH_AES_256_CBC_SHA(0x0035), SSL_RSA_WITH_3DES_EDE_CBC_SHA(0x000A)]", "compression methods" : "00", "extensions" : [ "server_name (0)": { type=host_name (0), value=localhost }, "extended_master_secret (23)": { }, "renegotiation_info (65,281)": { "renegotiated connection": [] }, "supported_groups (10)": { "versions": [x25519, secp256r1, secp384r1, secp521r1, ffdhe2048, ffdhe3072] }, "ec_point_formats (11)": { "formats": [uncompressed] }, "application_layer_protocol_negotiation (16)": { [h2, http/1.1] }, "status_request (5)": { "certificate status type": ocsp "OCSP status request": { "responder_id": "request extensions": { } } }, "key_share (51)": { "client_shares": [ { "named group": x25519 "key_exchange": { 0000: 6A BF 46 D3 67 2C 13 F0 F6 1C 27 3A EB 00 08 91 j.F.g,....':.... 0010: CE 41 57 87 B0 D9 7C E9 7C 69 F3 1A 0F 96 71 72 .AW......i....qr } }, { "named group": secp256r1 "key_exchange": { 0000: 04 37 40 81 C9 99 73 BC 8F 71 83 1F EF 97 6B 1B .7@...s..q....k. 0010: 0E 83 F0 CA 1F A0 DF B0 8C 5D FB 70 95 C2 02 1E .........].p.... 0020: 92 A9 1C CB 0D 17 E3 DD D5 16 0C 8D 19 94 F4 B0 ................ 0030: 63 32 87 28 AC FE 85 88 5C 76 7F 74 23 ED F8 C9 c2.(....\v.t#... 0040: E6 } }, ] }, "supported_versions (43)": { "versions": [TLSv1.3, TLSv1.2, TLSv1.1, TLSv1] }, "signature_algorithms (13)": { "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp512r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1] } ] } ) javax.net.ssl|DEBUG|25|https-jsse-nio-8443-exec-5|2019-11-18 12:44:36.188 IST|SSLExtensions.java:167|Consumed extension: supported_versions javax.net.ssl|DEBUG|25|https-jsse-nio-8443-exec-5|2019-11-18 12:44:36.188 IST|ClientHello.java:836|Negotiated protocol version: TLSv1.3 javax.net.ssl|DEBUG|25|https-jsse-nio-8443-exec-5|2019-11-18 12:44:36.188 IST|PskKeyExchangeModesExtension.java:294|abort session resumption, no supported psk_dhe_ke PSK key exchange mode javax.net.ssl|DEBUG|25|https-jsse-nio-8443-exec-5|2019-11-18 12:44:36.188 IST|PreSharedKeyExtension.java:783|Handling pre_shared_key absence. javax.net.ssl|DEBUG|25|https-jsse-nio-8443-exec-5|2019-11-18 12:44:36.189 IST|ServerNameExtension.java:322|no server name matchers, ignore server name indication javax.net.ssl|DEBUG|25|https-jsse-nio-8443-exec-5|2019-11-18 12:44:36.189 IST|SSLExtensions.java:167|Consumed extension: server_name javax.net.ssl|DEBUG|25|https-jsse-nio-8443-exec-5|2019-11-18 12:44:36.189 IST|SSLExtensions.java:148|Ignore unavailable extension: max_fragment_length javax.net.ssl|DEBUG|25|https-jsse-nio-8443-exec-5|2019-11-18 12:44:36.189 IST|SSLExtensions.java:167|Consumed extension: status_request javax.net.ssl|DEBUG|25|https-jsse-nio-8443-exec-5|2019-11-18 12:44:36.189 IST|SSLExtensions.java:167|Consumed extension: supported_groups javax.net.ssl|DEBUG|25|https-jsse-nio-8443-exec-5|2019-11-18 12:44:36.189 IST|SSLExtensions.java:138|Ignore unsupported extension: ec_point_formats javax.net.ssl|DEBUG|25|https-jsse-nio-8443-exec-5|2019-11-18 12:44:36.190 IST|SSLExtensions.java:167|Consumed extension: signature_algorithms javax.net.ssl|DEBUG|25|https-jsse-nio-8443-exec-5|2019-11-18 12:44:36.190 IST|SSLExtensions.java:148|Ignore unavailable extension: signature_algorithms_cert javax.net.ssl|DEBUG|25|https-jsse-nio-8443-exec-5|2019-11-18 12:44:36.190 IST|AlpnExtension.java:274|Ignore server unenabled extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|25|https-jsse-nio-8443-exec-5|2019-11-18 12:44:36.190 IST|SSLExtensions.java:167|Consumed extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|25|https-jsse-nio-8443-exec-5|2019-11-18 12:44:36.190 IST|SSLExtensions.java:138|Ignore unsupported extension: status_request_v2 javax.net.ssl|DEBUG|25|https-jsse-nio-8443-exec-5|2019-11-18 12:44:36.190 IST|SSLExtensions.java:138|Ignore unsupported extension: extended_master_secret javax.net.ssl|DEBUG|25|https-jsse-nio-8443-exec-5|2019-11-18 12:44:36.191 IST|SSLExtensions.java:148|Ignore unavailable extension: cookie javax.net.ssl|DEBUG|25|https-jsse-nio-8443-exec-5|2019-11-18 12:44:36.191 IST|KeyShareExtension.java:350|Ignore unsupported named group: x25519 javax.net.ssl|DEBUG|25|https-jsse-nio-8443-exec-5|2019-11-18 12:44:36.191 IST|SSLExtensions.java:167|Consumed extension: key_share javax.net.ssl|DEBUG|25|https-jsse-nio-8443-exec-5|2019-11-18 12:44:36.191 IST|SSLExtensions.java:138|Ignore unsupported extension: renegotiation_info javax.net.ssl|ALL|25|https-jsse-nio-8443-exec-5|2019-11-18 12:44:36.192 IST|SignatureScheme.java:358|Ignore disabled signature sheme: rsa_md5 javax.net.ssl|WARNING|25|https-jsse-nio-8443-exec-5|2019-11-18 12:44:36.192 IST|SSLExtensions.java:190|Ignore impact of unsupported extension: server_name javax.net.ssl|DEBUG|25|https-jsse-nio-8443-exec-5|2019-11-18 12:44:36.193 IST|SSLExtensions.java:182|Ignore unavailable extension: max_fragment_length javax.net.ssl|WARNING|25|https-jsse-nio-8443-exec-5|2019-11-18 12:44:36.193 IST|SSLExtensions.java:190|Ignore impact of unsupported extension: status_request javax.net.ssl|WARNING|25|https-jsse-nio-8443-exec-5|2019-11-18 12:44:36.193 IST|SSLExtensions.java:190|Ignore impact of unsupported extension: supported_groups javax.net.ssl|DEBUG|25|https-jsse-nio-8443-exec-5|2019-11-18 12:44:36.194 IST|SSLExtensions.java:199|Populated with extension: signature_algorithms javax.net.ssl|DEBUG|25|https-jsse-nio-8443-exec-5|2019-11-18 12:44:36.194 IST|SSLExtensions.java:182|Ignore unavailable extension: signature_algorithms_cert javax.net.ssl|WARNING|25|https-jsse-nio-8443-exec-5|2019-11-18 12:44:36.194 IST|SSLExtensions.java:190|Ignore impact of unsupported extension: application_layer_protocol_negotiation javax.net.ssl|WARNING|25|https-jsse-nio-8443-exec-5|2019-11-18 12:44:36.194 IST|SSLExtensions.java:190|Ignore impact of unsupported extension: supported_versions javax.net.ssl|DEBUG|25|https-jsse-nio-8443-exec-5|2019-11-18 12:44:36.194 IST|SSLExtensions.java:182|Ignore unavailable extension: cookie javax.net.ssl|WARNING|25|https-jsse-nio-8443-exec-5|2019-11-18 12:44:36.194 IST|SSLExtensions.java:190|Ignore impact of unsupported extension: key_share javax.net.ssl|DEBUG|25|https-jsse-nio-8443-exec-5|2019-11-18 12:44:36.195 IST|SSLExtensions.java:182|Ignore unavailable extension: pre_shared_key javax.net.ssl|DEBUG|25|https-jsse-nio-8443-exec-5|2019-11-18 12:44:36.195 IST|ServerHello.java:711|use cipher suite TLS_AES_128_GCM_SHA256 javax.net.ssl|DEBUG|25|https-jsse-nio-8443-exec-5|2019-11-18 12:44:36.197 IST|SSLExtensions.java:235|Ignore, context unavailable extension: pre_shared_key javax.net.ssl|DEBUG|25|https-jsse-nio-8443-exec-5|2019-11-18 12:44:36.198 IST|ServerHello.java:580|Produced ServerHello handshake message ( "ServerHello": { "server version" : "TLSv1.2", "random" : "F7 71 FC 13 3F A3 22 0F 9E 9A 31 E0 F2 AE F8 7D AA 73 69 5E 6D BF 50 4D 4C 56 8F 46 36 20 3F BF", "session id" : "10 CF 61 BC E6 AC ED C7 63 EA A9 41 A8 DA 80 72 90 F1 DC C9 B3 F1 42 E1 D4 15 C8 D4 91 D4 29 A7", "cipher suite" : "TLS_AES_128_GCM_SHA256(0x1301)", "compression methods" : "00", "extensions" : [ "supported_versions (43)": { "selected version": [TLSv1.3] }, "key_share (51)": { "server_share": { "named group": secp256r1 "key_exchange": { 0000: 04 D0 61 BE 99 7F 76 6E B0 71 EF C5 8F 80 07 B9 ..a...vn.q...... 0010: 17 9D C4 C7 1B 9C 77 F9 DE 3D B5 4F C7 2C 51 6E ......w..=.O.,Qn 0020: 67 B4 9E 8A BC FC F6 47 33 98 64 A4 9A 62 2F FA g......G3.d..b/. 0030: 17 43 84 E0 52 FB 1A DE B2 E8 D3 9F AF ED 3F 39 .C..R.........?9 0040: 6F } }, } ] } ) javax.net.ssl|DEBUG|25|https-jsse-nio-8443-exec-5|2019-11-18 12:44:36.203 IST|SSLCipher.java:1824|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE countdown value = 137438953472 javax.net.ssl|DEBUG|25|https-jsse-nio-8443-exec-5|2019-11-18 12:44:36.203 IST|SSLCipher.java:1978|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE countdown value = 137438953472 javax.net.ssl|ALL|25|https-jsse-nio-8443-exec-5|2019-11-18 12:44:36.204 IST|ServerNameExtension.java:532|No expected server name indication response javax.net.ssl|DEBUG|25|https-jsse-nio-8443-exec-5|2019-11-18 12:44:36.204 IST|SSLExtensions.java:235|Ignore, context unavailable extension: server_name javax.net.ssl|ALL|25|https-jsse-nio-8443-exec-5|2019-11-18 12:44:36.204 IST|MaxFragExtension.java:471|Ignore unavailable max_fragment_length extension javax.net.ssl|DEBUG|25|https-jsse-nio-8443-exec-5|2019-11-18 12:44:36.204 IST|SSLExtensions.java:235|Ignore, context unavailable extension: max_fragment_length javax.net.ssl|DEBUG|25|https-jsse-nio-8443-exec-5|2019-11-18 12:44:36.227 IST|AlpnExtension.java:363|Ignore unavailable extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|25|https-jsse-nio-8443-exec-5|2019-11-18 12:44:36.228 IST|SSLExtensions.java:235|Ignore, context unavailable extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|25|https-jsse-nio-8443-exec-5|2019-11-18 12:44:36.228 IST|EncryptedExtensions.java:137|Produced EncryptedExtensions message ( "EncryptedExtensions": [ "supported_groups (10)": { "versions": [secp256r1, secp384r1, secp521r1, sect283k1, sect283r1, sect409k1, sect409r1, sect571k1, sect571r1, secp256k1, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192] } ] ) javax.net.ssl|DEBUG|25|https-jsse-nio-8443-exec-5|2019-11-18 12:44:36.229 IST|CertificateRequest.java:821|Produced CertificateRequest message ( "CertificateRequest": { "certificate_request_context": "", "extensions": [ "signature_algorithms (13)": { "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp512r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1] }, "signature_algorithms_cert (50)": { "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp512r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1] } ] } ) javax.net.ssl|ALL|25|https-jsse-nio-8443-exec-5|2019-11-18 12:44:36.235 IST|X509Authentication.java:241|No X.509 cert selected for EC javax.net.ssl|WARNING|25|https-jsse-nio-8443-exec-5|2019-11-18 12:44:36.236 IST|CertificateMessage.java:1059|Unavailable authentication scheme: ecdsa_secp256r1_sha256 javax.net.ssl|DEBUG|03|Finalizer|2019-11-18 12:44:36.235 IST|SSLSocketImpl.java:473|duplex close of SSLSocket javax.net.ssl|ALL|25|https-jsse-nio-8443-exec-5|2019-11-18 12:44:36.236 IST|X509Authentication.java:241|No X.509 cert selected for EC javax.net.ssl|WARNING|25|https-jsse-nio-8443-exec-5|2019-11-18 12:44:36.236 IST|CertificateMessage.java:1059|Unavailable authentication scheme: ecdsa_secp384r1_sha384 javax.net.ssl|ALL|25|https-jsse-nio-8443-exec-5|2019-11-18 12:44:36.236 IST|X509Authentication.java:241|No X.509 cert selected for EC javax.net.ssl|WARNING|25|https-jsse-nio-8443-exec-5|2019-11-18 12:44:36.236 IST|CertificateMessage.java:1059|Unavailable authentication scheme: ecdsa_secp512r1_sha512 javax.net.ssl|DEBUG|25|https-jsse-nio-8443-exec-5|2019-11-18 12:44:36.237 IST|StatusResponseManager.java:763|Staping disabled or is a resumed session javax.net.ssl|ALL|25|https-jsse-nio-8443-exec-5|2019-11-18 12:44:36.237 IST|CertStatusExtension.java:1111|Stapling is disabled for this connection javax.net.ssl|DEBUG|25|https-jsse-nio-8443-exec-5|2019-11-18 12:44:36.237 IST|SSLExtensions.java:235|Ignore, context unavailable extension: status_request javax.net.ssl|DEBUG|25|https-jsse-nio-8443-exec-5|2019-11-18 12:44:36.238 IST|CertificateMessage.java:998|Produced server Certificate message ( "Certificate": { "certificate_request_context": "", "certificate_list": [ { "certificate" : { "version" : "v3", "serial number" : "3B FD 86 4A 58 09 72 F6", "signature algorithm": "SHA512withRSA", "issuer" : "CN=localhost", "not before" : "2019-11-05 13:41:52.000 IST", "not after" : "2020-11-05 13:41:52.000 IST", "subject" : "CN=localhost", "subject public key" : "RSA", "extensions" : [ { ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:false PathLen:2147483647 ] }, { ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_Encipherment Data_Encipherment ] } ]} "extensions": { } }, ] } ) javax.net.ssl|WARNING|03|Finalizer|2019-11-18 12:44:36.240 IST|SSLSocketImpl.java:494|SSLSocket duplex close failed ( "throwable" : { java.net.SocketException: Socket is not connected at java.base/java.net.Socket.shutdownOutput(Socket.java:1553) at java.base/sun.security.ssl.BaseSSLSocketImpl.shutdownOutput(BaseSSLSocketImpl.java:232) at java.base/sun.security.ssl.SSLSocketImpl.duplexCloseOutput(SSLSocketImpl.java:561) at java.base/sun.security.ssl.SSLSocketImpl.close(SSLSocketImpl.java:479) at java.base/sun.security.ssl.BaseSSLSocketImpl.finalize(BaseSSLSocketImpl.java:275) at java.base/java.lang.System$2.invokeFinalize(System.java:2117) at java.base/java.lang.ref.Finalizer.runFinalizer(Finalizer.java:87) at java.base/java.lang.ref.Finalizer$FinalizerThread.run(Finalizer.java:171)} ) javax.net.ssl|DEBUG|03|Finalizer|2019-11-18 12:44:36.240 IST|SSLSocketImpl.java:473|duplex close of SSLSocket javax.net.ssl|WARNING|03|Finalizer|2019-11-18 12:44:36.241 IST|SSLSocketImpl.java:494|SSLSocket duplex close failed ( "throwable" : { java.net.SocketException: Socket is not connected at java.base/java.net.Socket.shutdownOutput(Socket.java:1553) at java.base/sun.security.ssl.BaseSSLSocketImpl.shutdownOutput(BaseSSLSocketImpl.java:232) at java.base/sun.security.ssl.SSLSocketImpl.duplexCloseOutput(SSLSocketImpl.java:561) at java.base/sun.security.ssl.SSLSocketImpl.close(SSLSocketImpl.java:479) at java.base/sun.security.ssl.BaseSSLSocketImpl.finalize(BaseSSLSocketImpl.java:275) at java.base/java.lang.System$2.invokeFinalize(System.java:2117) at java.base/java.lang.ref.Finalizer.runFinalizer(Finalizer.java:87) at java.base/java.lang.ref.Finalizer$FinalizerThread.run(Finalizer.java:171)} ) javax.net.ssl|DEBUG|25|https-jsse-nio-8443-exec-5|2019-11-18 12:44:36.275 IST|CertificateVerify.java:1080|Produced server CertificateVerify handshake message ( "CertificateVerify": { "signature algorithm": rsa_pss_rsae_sha256 "signature": { 0000: 4E 08 2B 5D C4 56 82 47 6B 6A 4B 68 25 FB 1A 90 N.+].V.GkjKh%... 0010: 1F 04 28 89 C7 12 83 71 8E 25 C8 F0 8D 10 4C A4 ..(....q.%....L. 0020: D0 63 91 E5 A1 EC D5 8E E4 63 AE 00 43 B3 0D 90 .c.......c..C... 0030: EB 9B 3F 74 26 54 AE DD 54 C8 F1 9F 50 69 DF FA ..?t&T..T...Pi.. 0040: 5D F8 4A 31 CE FC FD 98 6F D9 0A 4A 51 F0 A1 56 ].J1....o..JQ..V 0050: E4 AC 29 C1 19 76 69 88 1D 99 8B 12 F5 97 76 89 ..)..vi.......v. 0060: 05 79 1F B7 D6 FA BA 2C 27 A3 28 D3 C9 2A 85 6C .y.....,'.(..*.l 0070: 33 E1 AE 12 E6 6C 73 C3 5F 35 04 30 1F 54 17 44 3....ls._5.0.T.D 0080: 5D F5 EB 82 D5 0A 6E FE 3B B8 20 68 C2 8D FE C9 ].....n.;. h.... 0090: F5 5C 6A 0E A1 40 44 39 D4 3E 57 3E F8 66 B7 5C .\j..@D9.>W>.f.\ 00A0: A1 1E 48 3A E2 59 1E B1 E1 FF F2 A0 5A 67 56 7D ..H:.Y......ZgV. 00B0: 9E 5D DE 9C 17 94 F9 B8 CD 25 99 BA C4 3E C4 C7 .].......%...>.. 00C0: 07 86 F3 41 DB 7B 28 FF BD 9B B4 7C 5E F1 89 08 ...A..(.....^... 00D0: AF 52 3A A2 A7 A2 08 39 D0 B3 8B 91 4A 83 A1 10 .R:....9....J... 00E0: 76 94 35 C4 F6 7D 7B 09 F7 33 A9 3F D7 1D 68 70 v.5......3.?..hp 00F0: 28 43 98 02 37 2C BB C1 D7 56 85 16 07 E0 66 A3 (C..7,...V....f. } } ) javax.net.ssl|DEBUG|25|https-jsse-nio-8443-exec-5|2019-11-18 12:44:36.276 IST|Finished.java:745|Produced server Finished handshake message ( "Finished": { "verify data": { 0000: 46 18 93 F7 5F AB 01 D6 BF ED 85 24 31 58 1F FF F..._......$1X.. 0010: 98 13 11 72 D4 60 8B 27 B9 37 4A 58 83 8A 12 4F ...r.`.'.7JX...O }'} ) javax.net.ssl|DEBUG|25|https-jsse-nio-8443-exec-5|2019-11-18 12:44:36.277 IST|SSLCipher.java:1978|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE countdown value = 137438953472 javax.net.ssl|DEBUG|28|https-jsse-nio-8443-exec-8|2019-11-18 12:44:36.302 IST|ChangeCipherSpec.java:232|Consuming ChangeCipherSpec message javax.net.ssl|DEBUG|28|https-jsse-nio-8443-exec-8|2019-11-18 12:44:36.304 IST|CertificateMessage.java:1154|Consuming client Certificate handshake message ( "Certificate": { "certificate_request_context": "", "certificate_list": [ { "certificate" : { "version" : "v3", "serial number" : "2C 8B E3 32 BC 02 24 C0", "signature algorithm": "SHA512withRSA", "issuer" : "CN=client", "not before" : "2019-11-05 13:43:21.000 IST", "not after" : "2020-11-05 13:43:21.000 IST", "subject" : "CN=client", "subject public key" : "RSA", "extensions" : [ { ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:false PathLen:2147483647 ] }, { ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_Encipherment Data_Encipherment ] } ]} "extensions": { } }, ] } ) javax.net.ssl|DEBUG|28|https-jsse-nio-8443-exec-8|2019-11-18 12:44:36.309 IST|CertificateVerify.java:1128|Consuming CertificateVerify handshake message ( "CertificateVerify": { "signature algorithm": rsa_pss_rsae_sha256 "signature": { 0000: BA DD 06 95 24 43 FE 51 D4 4C 62 5C 24 46 B4 27 ....$C.Q.Lb\$F.' 0010: 9D 40 09 CA 50 F6 99 5E 15 F1 B5 91 FF EE 7C B1 .@..P..^........ 0020: 98 C1 D4 C2 7C E6 67 F0 7B 40 3F 1C 24 52 02 DB ......g..@?.$R.. 0030: B8 9E 24 49 04 E4 23 71 59 D2 37 2E 60 D5 AB 88 ..$I..#qY.7.`... 0040: B1 B3 6C 18 0B E4 02 77 0D EB 4E FC BF 82 0F B4 ..l....w..N..... 0050: 48 A9 5F FE 5F CF 19 62 01 8E C9 A1 76 F4 5A 10 H._._..b....v.Z. 0060: 5E 75 BF 6A 61 54 9E 7E 44 B3 C8 E6 D5 03 80 5B ^u.jaT..D......[ 0070: 6F 2A 47 EB D4 A4 EC 5A 5B B7 A9 3F BF C8 BA C2 o*G....Z[..?.... 0080: E3 47 BD 80 E1 50 72 F9 59 5E 25 D7 B4 1B 5D F8 .G...Pr.Y^%...]. 0090: C3 84 4C 6A 3C 82 24 C4 F5 85 4E E1 6B 9A 38 A6 ..Lj<.$...N.k.8. 00A0: CE D6 15 C3 C2 C1 1C 54 46 B8 1B DA 57 7C E8 12 .......TF...W... 00B0: 09 1C 0F E9 08 13 B8 43 67 B0 5A B7 FC F4 F9 78 .......Cg.Z....x 00C0: 80 C3 1E 78 2D 5F 6F AD A2 64 E2 A6 7A F9 79 24 ...x-_o..d..z.y$ 00D0: 47 4C 2C 4F 28 39 29 E4 5A 69 6C 0D 8D 7E F2 12 GL,O(9).Zil..... 00E0: AD 01 31 C3 AC 4D 6A 6F E4 CD 46 4D 07 29 AE 5E ..1..Mjo..FM.).^ 00F0: 76 D4 C9 E5 33 77 A6 57 2B B0 93 78 98 64 9B 9E v...3w.W+..x.d.. } } ) javax.net.ssl|DEBUG|28|https-jsse-nio-8443-exec-8|2019-11-18 12:44:36.309 IST|Finished.java:978|Consuming client Finished handshake message ( "Finished": { "verify data": { 0000: 33 CD CB 15 61 34 87 AE 66 DA 7B 3E 4A DB B4 4C 3...a4..f..>J..L 0010: 11 72 D7 28 F8 CD C5 A0 7E F8 F2 69 FC 1F DF C3 .r.(.......i.... }'} ) javax.net.ssl|DEBUG|28|https-jsse-nio-8443-exec-8|2019-11-18 12:44:36.310 IST|SSLCipher.java:1824|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE countdown value = 137438953472 javax.net.ssl|DEBUG|28|https-jsse-nio-8443-exec-8|2019-11-18 12:44:36.311 IST|Finished.java:1070|Sending new session ticket 18-Nov-2019 12:44:36.311 FINE [https-jsse-nio-8443-exec-8] org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun Error during SSL handshake java.io.IOException: NOT_HANDSHAKING during handshake at org.apache.tomcat.util.net.SecureNioChannel.handshake(SecureNioChannel.java:193) at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1556) at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49) at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128) at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628) at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61) at java.base/java.lang.Thread.run(Thread.java:834) 18-Nov-2019 12:44:36.319 FINE [https-jsse-nio-8443-exec-8] org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper.doClose Calling [org.apache.tomcat.util.net.NioEndpoint@4db49c7f].closeSocket([org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper@1a68b214:org.apache.tomcat.util.net.SecureNioChannel@1e573506:java.nio.channels.SocketChannel[connected local=/0:0:0:0:0:0:0:1:8443 remote=/0:0:0:0:0:0:0:1:63247]]) java.lang.Exception at org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper.doClose(NioEndpoint.java:1163) at org.apache.tomcat.util.net.SocketWrapperBase.close(SocketWrapperBase.java:402) at org.apache.tomcat.util.net.NioEndpoint$Poller.cancelledKey(NioEndpoint.java:665) at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1586) at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49) at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128) at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628) at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61) at java.base/java.lang.Thread.run(Thread.java:834) javax.net.ssl|ALL|28|https-jsse-nio-8443-exec-8|2019-11-18 12:44:36.319 IST|SSLEngineImpl.java:743|Closing outbound of SSLEngine javax.net.ssl|WARNING|28|https-jsse-nio-8443-exec-8|2019-11-18 12:44:36.320 IST|SSLEngineOutputRecord.java:168|outbound has closed, ignore outbound application data 18-Nov-2019 12:44:36.336 FINE [https-jsse-nio-8443-exec-9] org.apache.tomcat.util.net.SecureNioChannel.processSNI The SNI host name extracted for connection [java.nio.channels.SocketChannel[connected local=/0:0:0:0:0:0:0:1:8443 remote=/0:0:0:0:0:0:0:1:63248]] was [localhost] javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 12:44:36.337 IST|HandshakeContext.java:290|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 for TLS10 javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 12:44:36.337 IST|HandshakeContext.java:290|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 for TLS10 javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 12:44:36.337 IST|HandshakeContext.java:290|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLS10 javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 12:44:36.337 IST|HandshakeContext.java:290|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLS10 javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 12:44:36.338 IST|HandshakeContext.java:290|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 for TLS13 javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 12:44:36.338 IST|HandshakeContext.java:290|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 for TLS13 javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 12:44:36.338 IST|HandshakeContext.java:290|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLS13 javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 12:44:36.338 IST|HandshakeContext.java:290|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLS13 javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 12:44:36.338 IST|HandshakeContext.java:290|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA for TLS13 javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 12:44:36.339 IST|HandshakeContext.java:290|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA for TLS13 javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 12:44:36.339 IST|HandshakeContext.java:290|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 for TLS11 javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 12:44:36.339 IST|HandshakeContext.java:290|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 for TLS11 javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 12:44:36.339 IST|HandshakeContext.java:290|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLS11 javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 12:44:36.339 IST|HandshakeContext.java:290|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLS11 javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 12:44:36.343 IST|ClientHello.java:806|Consuming ClientHello handshake message ( "ClientHello": { "client version" : "TLSv1.2", "random" : "92 45 76 07 FB FA E7 0E A5 42 2F 9A 86 58 A5 E6 F6 78 7D 2E E2 E1 DC 66 F0 18 22 20 9F 85 47 66", "session id" : "EC 31 A7 AE A9 A3 8A 98 3D 7F AE 48 CE 26 CB B1 A7 1F 9C CA AC 8D 69 CF BF D7 F9 19 B8 3D 84 EA", "cipher suites" : "[TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_AES_256_GCM_SHA384(0x1302), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), UNKNOWN-CIPHER-SUITE(0xCCA9)(0xCCA9), UNKNOWN-CIPHER-SUITE(0xCCA8)(0xCCA8), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA(0xC00A), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA(0xC009), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA(0xC013), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA(0xC014), TLS_DHE_RSA_WITH_AES_128_CBC_SHA(0x0033), TLS_DHE_RSA_WITH_AES_256_CBC_SHA(0x0039), TLS_RSA_WITH_AES_128_CBC_SHA(0x002F), TLS_RSA_WITH_AES_256_CBC_SHA(0x0035), SSL_RSA_WITH_3DES_EDE_CBC_SHA(0x000A)]", "compression methods" : "00", "extensions" : [ "server_name (0)": { type=host_name (0), value=localhost }, "extended_master_secret (23)": { }, "renegotiation_info (65,281)": { "renegotiated connection": [] }, "supported_groups (10)": { "versions": [x25519, secp256r1, secp384r1, secp521r1, ffdhe2048, ffdhe3072] }, "ec_point_formats (11)": { "formats": [uncompressed] }, "application_layer_protocol_negotiation (16)": { [h2, http/1.1] }, "status_request (5)": { "certificate status type": ocsp "OCSP status request": { "responder_id": "request extensions": { } } }, "key_share (51)": { "client_shares": [ { "named group": x25519 "key_exchange": { 0000: C7 94 93 24 3B 42 F0 93 D1 29 1B 0E DF 7A DB 84 ...$;B...)...z.. 0010: DE FB 9D 08 DD B2 F2 CE BA 8D EA 94 EA B3 19 53 ...............S } }, { "named group": secp256r1 "key_exchange": { 0000: 04 68 BB 69 AF E3 66 6E 1E 36 16 15 FC 6F 4E AC .h.i..fn.6...oN. 0010: 67 B2 CA F9 60 C9 7D E3 EF D7 81 7E 0C 6C 58 3E g...`........lX> 0020: 1B FA 66 F9 C2 5D AA 8C 86 10 B9 69 9A 72 CA D9 ..f..].....i.r.. 0030: DD 7A A8 2F C2 44 CC A1 3F A6 AF 02 82 56 82 A6 .z./.D..?....V.. 0040: 00 } }, ] }, "supported_versions (43)": { "versions": [TLSv1.3, TLSv1.2, TLSv1.1, TLSv1] }, "signature_algorithms (13)": { "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp512r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1] } ] } ) javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 12:44:36.344 IST|SSLExtensions.java:167|Consumed extension: supported_versions javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 12:44:36.344 IST|ClientHello.java:836|Negotiated protocol version: TLSv1.3 javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 12:44:36.344 IST|PskKeyExchangeModesExtension.java:294|abort session resumption, no supported psk_dhe_ke PSK key exchange mode javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 12:44:36.344 IST|PreSharedKeyExtension.java:783|Handling pre_shared_key absence. javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 12:44:36.344 IST|ServerNameExtension.java:322|no server name matchers, ignore server name indication javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 12:44:36.345 IST|SSLExtensions.java:167|Consumed extension: server_name javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 12:44:36.345 IST|SSLExtensions.java:148|Ignore unavailable extension: max_fragment_length javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 12:44:36.345 IST|SSLExtensions.java:167|Consumed extension: status_request javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 12:44:36.345 IST|SSLExtensions.java:167|Consumed extension: supported_groups javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 12:44:36.345 IST|SSLExtensions.java:138|Ignore unsupported extension: ec_point_formats javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 12:44:36.345 IST|SSLExtensions.java:167|Consumed extension: signature_algorithms javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 12:44:36.346 IST|SSLExtensions.java:148|Ignore unavailable extension: signature_algorithms_cert javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 12:44:36.346 IST|AlpnExtension.java:274|Ignore server unenabled extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 12:44:36.346 IST|SSLExtensions.java:167|Consumed extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 12:44:36.346 IST|SSLExtensions.java:138|Ignore unsupported extension: status_request_v2 javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 12:44:36.346 IST|SSLExtensions.java:138|Ignore unsupported extension: extended_master_secret javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 12:44:36.346 IST|SSLExtensions.java:148|Ignore unavailable extension: cookie javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 12:44:36.346 IST|KeyShareExtension.java:350|Ignore unsupported named group: x25519 javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 12:44:36.347 IST|SSLExtensions.java:167|Consumed extension: key_share javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 12:44:36.347 IST|SSLExtensions.java:138|Ignore unsupported extension: renegotiation_info javax.net.ssl|ALL|29|https-jsse-nio-8443-exec-9|2019-11-18 12:44:36.347 IST|SignatureScheme.java:358|Ignore disabled signature sheme: rsa_md5 javax.net.ssl|WARNING|29|https-jsse-nio-8443-exec-9|2019-11-18 12:44:36.348 IST|SSLExtensions.java:190|Ignore impact of unsupported extension: server_name javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 12:44:36.348 IST|SSLExtensions.java:182|Ignore unavailable extension: max_fragment_length javax.net.ssl|WARNING|29|https-jsse-nio-8443-exec-9|2019-11-18 12:44:36.348 IST|SSLExtensions.java:190|Ignore impact of unsupported extension: status_request javax.net.ssl|WARNING|29|https-jsse-nio-8443-exec-9|2019-11-18 12:44:36.348 IST|SSLExtensions.java:190|Ignore impact of unsupported extension: supported_groups javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 12:44:36.349 IST|SSLExtensions.java:199|Populated with extension: signature_algorithms javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 12:44:36.349 IST|SSLExtensions.java:182|Ignore unavailable extension: signature_algorithms_cert javax.net.ssl|WARNING|29|https-jsse-nio-8443-exec-9|2019-11-18 12:44:36.349 IST|SSLExtensions.java:190|Ignore impact of unsupported extension: application_layer_protocol_negotiation javax.net.ssl|WARNING|29|https-jsse-nio-8443-exec-9|2019-11-18 12:44:36.349 IST|SSLExtensions.java:190|Ignore impact of unsupported extension: supported_versions javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 12:44:36.349 IST|SSLExtensions.java:182|Ignore unavailable extension: cookie javax.net.ssl|WARNING|29|https-jsse-nio-8443-exec-9|2019-11-18 12:44:36.349 IST|SSLExtensions.java:190|Ignore impact of unsupported extension: key_share javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 12:44:36.349 IST|SSLExtensions.java:182|Ignore unavailable extension: pre_shared_key javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 12:44:36.350 IST|ServerHello.java:711|use cipher suite TLS_AES_128_GCM_SHA256 javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 12:44:36.352 IST|SSLExtensions.java:235|Ignore, context unavailable extension: pre_shared_key javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 12:44:36.353 IST|ServerHello.java:580|Produced ServerHello handshake message ( "ServerHello": { "server version" : "TLSv1.2", "random" : "D8 DD 0F 53 29 85 A3 30 77 66 64 B0 EB 87 A1 6B B3 CC BE 84 95 D2 53 64 BB 30 63 70 59 C1 10 B0", "session id" : "EC 31 A7 AE A9 A3 8A 98 3D 7F AE 48 CE 26 CB B1 A7 1F 9C CA AC 8D 69 CF BF D7 F9 19 B8 3D 84 EA", "cipher suite" : "TLS_AES_128_GCM_SHA256(0x1301)", "compression methods" : "00", "extensions" : [ "supported_versions (43)": { "selected version": [TLSv1.3] }, "key_share (51)": { "server_share": { "named group": secp256r1 "key_exchange": { 0000: 04 6D ED 0E B7 22 96 C4 83 B8 6C 67 48 3D 9E E8 .m..."....lgH=.. 0010: 91 22 3E 35 9D AB 21 2E B5 B9 09 D3 89 9A 78 D6 .">5..!.......x. 0020: 86 12 1E 9A AA BE 94 E4 81 40 AB 8D 17 FC 9D D0 .........@...... 0030: FC 9B 71 53 B3 31 61 6C 2F EA 65 AD 06 BC 45 1E ..qS.1al/.e...E. 0040: 6D } }, } ] } ) javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 12:44:36.358 IST|SSLCipher.java:1824|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE countdown value = 137438953472 javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 12:44:36.359 IST|SSLCipher.java:1978|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE countdown value = 137438953472 javax.net.ssl|ALL|29|https-jsse-nio-8443-exec-9|2019-11-18 12:44:36.359 IST|ServerNameExtension.java:532|No expected server name indication response javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 12:44:36.360 IST|SSLExtensions.java:235|Ignore, context unavailable extension: server_name javax.net.ssl|ALL|29|https-jsse-nio-8443-exec-9|2019-11-18 12:44:36.360 IST|MaxFragExtension.java:471|Ignore unavailable max_fragment_length extension javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 12:44:36.360 IST|SSLExtensions.java:235|Ignore, context unavailable extension: max_fragment_length javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 12:44:36.361 IST|AlpnExtension.java:363|Ignore unavailable extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 12:44:36.361 IST|SSLExtensions.java:235|Ignore, context unavailable extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 12:44:36.362 IST|EncryptedExtensions.java:137|Produced EncryptedExtensions message ( "EncryptedExtensions": [ "supported_groups (10)": { "versions": [secp256r1, secp384r1, secp521r1, sect283k1, sect283r1, sect409k1, sect409r1, sect571k1, sect571r1, secp256k1, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192] } ] ) javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 12:44:36.363 IST|CertificateRequest.java:821|Produced CertificateRequest message ( "CertificateRequest": { "certificate_request_context": "", "extensions": [ "signature_algorithms (13)": { "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp512r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1] }, "signature_algorithms_cert (50)": { "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp512r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1] } ] } ) javax.net.ssl|ALL|29|https-jsse-nio-8443-exec-9|2019-11-18 12:44:36.363 IST|X509Authentication.java:241|No X.509 cert selected for EC javax.net.ssl|WARNING|29|https-jsse-nio-8443-exec-9|2019-11-18 12:44:36.364 IST|CertificateMessage.java:1059|Unavailable authentication scheme: ecdsa_secp256r1_sha256 javax.net.ssl|ALL|29|https-jsse-nio-8443-exec-9|2019-11-18 12:44:36.364 IST|X509Authentication.java:241|No X.509 cert selected for EC javax.net.ssl|WARNING|29|https-jsse-nio-8443-exec-9|2019-11-18 12:44:36.364 IST|CertificateMessage.java:1059|Unavailable authentication scheme: ecdsa_secp384r1_sha384 javax.net.ssl|ALL|29|https-jsse-nio-8443-exec-9|2019-11-18 12:44:36.365 IST|X509Authentication.java:241|No X.509 cert selected for EC javax.net.ssl|WARNING|29|https-jsse-nio-8443-exec-9|2019-11-18 12:44:36.365 IST|CertificateMessage.java:1059|Unavailable authentication scheme: ecdsa_secp512r1_sha512 javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 12:44:36.365 IST|StatusResponseManager.java:763|Staping disabled or is a resumed session javax.net.ssl|ALL|29|https-jsse-nio-8443-exec-9|2019-11-18 12:44:36.365 IST|CertStatusExtension.java:1111|Stapling is disabled for this connection javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 12:44:36.366 IST|SSLExtensions.java:235|Ignore, context unavailable extension: status_request javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 12:44:36.367 IST|CertificateMessage.java:998|Produced server Certificate message ( "Certificate": { "certificate_request_context": "", "certificate_list": [ { "certificate" : { "version" : "v3", "serial number" : "3B FD 86 4A 58 09 72 F6", "signature algorithm": "SHA512withRSA", "issuer" : "CN=localhost", "not before" : "2019-11-05 13:41:52.000 IST", "not after" : "2020-11-05 13:41:52.000 IST", "subject" : "CN=localhost", "subject public key" : "RSA", "extensions" : [ { ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:false PathLen:2147483647 ] }, { ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_Encipherment Data_Encipherment ] } ]} "extensions": { } }, ] } ) javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 12:44:36.385 IST|CertificateVerify.java:1080|Produced server CertificateVerify handshake message ( "CertificateVerify": { "signature algorithm": rsa_pss_rsae_sha256 "signature": { 0000: 65 36 FE 06 E1 C4 A6 50 43 B3 C4 FB 39 22 EF D7 e6.....PC...9".. 0010: 76 13 E1 44 62 7A 73 1D 6F 05 B6 14 3C 38 5E 22 v..Dbzs.o...<8^" 0020: 5C 45 5F 87 B4 CB 7E 32 C9 AD A6 E3 80 E7 7B 3A \E_....2.......: 0030: 47 E7 5C E8 2B D0 C7 B3 72 29 45 C4 1F F7 BF FB G.\.+...r)E..... 0040: 54 70 63 95 B5 94 67 34 2E 80 1E 9F 4C BA E2 F5 Tpc...g4....L... 0050: E9 97 5F 29 4F 81 E2 B0 7C A0 16 DB 87 A2 BE FC .._)O........... 0060: 91 8C 60 6E A8 3C 08 6D 57 85 F2 88 58 22 F4 C7 ..`n.<.mW...X".. 0070: CB 42 39 5B 3A 44 C8 2F C8 1A FB E4 D9 76 09 74 .B9[:D./.....v.t 0080: 9D 2C 53 0D 37 D0 E7 F0 89 40 E9 3C 3A D3 43 F4 .,S.7....@.<:.C. 0090: B6 DD D3 1B 41 C4 A9 EC 40 86 D2 E8 6D DD 50 57 ....A...@...m.PW 00A0: CD 54 9A 78 B6 20 A6 FA 57 27 A4 06 37 8D 8A 8B .T.x. ..W'..7... 00B0: 5D E9 E1 4B 9B 9E 29 D1 F3 14 06 93 D6 95 E5 B5 ]..K..)......... 00C0: A0 95 07 F6 EC 94 DD 7B 60 5F 0E 53 21 D5 1C 5A ........`_.S!..Z 00D0: 3A 94 E5 6E 8A 9B 1A 76 17 1C C5 46 F2 A4 F2 B8 :..n...v...F.... 00E0: EC 8A 2F 84 C8 85 4F 54 87 BF 5F 9D AF 45 03 CC ../...OT.._..E.. 00F0: E3 A8 5A 1C 08 30 69 85 93 9C E7 7D ED 00 94 59 ..Z..0i........Y } } ) javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 12:44:36.386 IST|Finished.java:745|Produced server Finished handshake message ( "Finished": { "verify data": { 0000: 53 F6 91 CB 24 88 0F 7A 6B 0A 49 EE 0F 58 2D A1 S...$..zk.I..X-. 0010: 26 70 5D 0F AD 3A 26 E7 C5 9E 07 CE D2 F2 B9 A1 &p]..:&......... }'} ) javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 12:44:36.386 IST|SSLCipher.java:1978|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE countdown value = 137438953472 javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 12:44:36.402 IST|ChangeCipherSpec.java:232|Consuming ChangeCipherSpec message javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 12:44:36.404 IST|CertificateMessage.java:1154|Consuming client Certificate handshake message ( "Certificate": { "certificate_request_context": "", "certificate_list": [ { "certificate" : { "version" : "v3", "serial number" : "2C 8B E3 32 BC 02 24 C0", "signature algorithm": "SHA512withRSA", "issuer" : "CN=client", "not before" : "2019-11-05 13:43:21.000 IST", "not after" : "2020-11-05 13:43:21.000 IST", "subject" : "CN=client", "subject public key" : "RSA", "extensions" : [ { ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:false PathLen:2147483647 ] }, { ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_Encipherment Data_Encipherment ] } ]} "extensions": { } }, ] } ) javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 12:44:36.420 IST|CertificateVerify.java:1128|Consuming CertificateVerify handshake message ( "CertificateVerify": { "signature algorithm": rsa_pss_rsae_sha256 "signature": { 0000: 7B A1 D2 49 BE 65 53 B3 64 D9 5F B9 BE A4 9B BF ...I.eS.d._..... 0010: 0D 34 C5 8F 90 D8 3F 79 F7 D8 8D 61 82 10 5E 26 .4....?y...a..^& 0020: 8C 5F 08 78 80 10 9F 8B CE 9E 91 05 1E 16 0B 95 ._.x............ 0030: 7A A7 B2 AD AD F3 9F A1 7F 24 F4 AB C0 27 BF 0B z........$...'.. 0040: 61 D9 08 13 75 92 26 C7 A0 E2 24 66 F8 7D A6 16 a...u.&...$f.... 0050: CF EA 17 9A A9 F3 86 15 4A C2 9A 27 EA 04 84 06 ........J..'.... 0060: 84 54 4F D2 02 40 5C 64 90 F7 CE 7E 44 21 DE 75 .TO..@\d....D!.u 0070: D0 33 8E 21 B2 25 90 0B 01 B8 79 13 55 13 02 62 .3.!.%....y.U..b 0080: BF B3 BE 76 F1 78 FC BA FA A8 1D D8 7B F2 EA 78 ...v.x.........x 0090: 05 06 A9 F3 81 8E D1 11 3E 8A ED 88 F1 57 96 54 ........>....W.T 00A0: 56 25 11 B1 2C C9 D6 A3 86 3A 05 B8 FA 44 35 4A V%..,....:...D5J 00B0: C5 C3 14 15 41 1E 17 A2 E7 36 21 57 0D 11 E0 35 ....A....6!W...5 00C0: 85 02 AA FF 73 07 D2 B1 3D E0 E3 8B 57 C1 65 86 ....s...=...W.e. 00D0: 00 30 B9 BA 6D 26 28 76 3C 84 90 C1 FA 7B CE EF .0..m&(v<....... 00E0: 80 78 1F 80 F7 86 B9 EE 6D 35 B4 D5 2D 12 DE 2A .x......m5..-..* 00F0: B8 AE 45 3A D4 FE 48 91 3B 4D AE E4 CA D1 35 8D ..E:..H.;M....5. } } ) javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 12:44:36.421 IST|Finished.java:978|Consuming client Finished handshake message ( "Finished": { "verify data": { 0000: 06 9E 13 98 BC 5D 38 96 CA 22 E4 45 BB 67 6F E7 .....]8..".E.go. 0010: 34 B9 9E 38 90 45 46 2F D7 E3 A5 3A 2A 01 82 70 4..8.EF/...:*..p }'} ) javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 12:44:36.422 IST|SSLCipher.java:1824|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE countdown value = 137438953472 javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 12:44:36.422 IST|Finished.java:1070|Sending new session ticket 18-Nov-2019 12:44:36.423 FINE [https-jsse-nio-8443-exec-2] org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun Error during SSL handshake java.io.IOException: NOT_HANDSHAKING during handshake at org.apache.tomcat.util.net.SecureNioChannel.handshake(SecureNioChannel.java:193) at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1556) at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49) at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128) at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628) at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61) at java.base/java.lang.Thread.run(Thread.java:834) 18-Nov-2019 12:44:36.427 FINE [https-jsse-nio-8443-exec-2] org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper.doClose Calling [org.apache.tomcat.util.net.NioEndpoint@4db49c7f].closeSocket([org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper@2e4fe52a:org.apache.tomcat.util.net.SecureNioChannel@2c9ead00:java.nio.channels.SocketChannel[connected local=/0:0:0:0:0:0:0:1:8443 remote=/0:0:0:0:0:0:0:1:63248]]) java.lang.Exception at org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper.doClose(NioEndpoint.java:1163) at org.apache.tomcat.util.net.SocketWrapperBase.close(SocketWrapperBase.java:402) at org.apache.tomcat.util.net.NioEndpoint$Poller.cancelledKey(NioEndpoint.java:665) at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1586) at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49) at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128) at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628) at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61) at java.base/java.lang.Thread.run(Thread.java:834) javax.net.ssl|ALL|22|https-jsse-nio-8443-exec-2|2019-11-18 12:44:36.427 IST|SSLEngineImpl.java:743|Closing outbound of SSLEngine javax.net.ssl|WARNING|22|https-jsse-nio-8443-exec-2|2019-11-18 12:44:36.427 IST|SSLEngineOutputRecord.java:168|outbound has closed, ignore outbound application data 18-Nov-2019 12:44:36.435 FINE [https-jsse-nio-8443-exec-3] org.apache.tomcat.util.net.SecureNioChannel.processSNI The SNI host name extracted for connection [java.nio.channels.SocketChannel[connected local=/0:0:0:0:0:0:0:1:8443 remote=/0:0:0:0:0:0:0:1:63249]] was [localhost] javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 12:44:36.436 IST|HandshakeContext.java:290|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 for TLS10 javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 12:44:36.436 IST|HandshakeContext.java:290|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 for TLS10 javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 12:44:36.437 IST|HandshakeContext.java:290|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLS10 javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 12:44:36.437 IST|HandshakeContext.java:290|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLS10 javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 12:44:36.437 IST|HandshakeContext.java:290|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 for TLS13 javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 12:44:36.438 IST|HandshakeContext.java:290|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 for TLS13 javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 12:44:36.438 IST|HandshakeContext.java:290|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLS13 javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 12:44:36.438 IST|HandshakeContext.java:290|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLS13 javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 12:44:36.439 IST|HandshakeContext.java:290|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA for TLS13 javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 12:44:36.439 IST|HandshakeContext.java:290|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA for TLS13 javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 12:44:36.439 IST|HandshakeContext.java:290|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 for TLS11 javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 12:44:36.440 IST|HandshakeContext.java:290|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 for TLS11 javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 12:44:36.440 IST|HandshakeContext.java:290|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLS11 javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 12:44:36.440 IST|HandshakeContext.java:290|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLS11 javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 12:44:36.445 IST|ClientHello.java:806|Consuming ClientHello handshake message ( "ClientHello": { "client version" : "TLSv1.2", "random" : "7C DB C8 E0 71 E3 D0 6E 64 94 02 69 EA 7C C2 2B 68 D2 2B 34 37 3B 0A 9D 15 1D 2D 60 4B 1A C7 B7", "session id" : "D6 B1 79 59 CA AD 7D EB 4F E3 E5 4E 38 B4 76 A1 09 DB 06 3A 71 AC B6 53 68 85 B2 12 5D 77 3E F5", "cipher suites" : "[TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_AES_256_GCM_SHA384(0x1302), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), UNKNOWN-CIPHER-SUITE(0xCCA9)(0xCCA9), UNKNOWN-CIPHER-SUITE(0xCCA8)(0xCCA8), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA(0xC00A), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA(0xC009), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA(0xC013), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA(0xC014), TLS_DHE_RSA_WITH_AES_128_CBC_SHA(0x0033), TLS_DHE_RSA_WITH_AES_256_CBC_SHA(0x0039), TLS_RSA_WITH_AES_128_CBC_SHA(0x002F), TLS_RSA_WITH_AES_256_CBC_SHA(0x0035), SSL_RSA_WITH_3DES_EDE_CBC_SHA(0x000A)]", "compression methods" : "00", "extensions" : [ "server_name (0)": { type=host_name (0), value=localhost }, "extended_master_secret (23)": { }, "renegotiation_info (65,281)": { "renegotiated connection": [] }, "supported_groups (10)": { "versions": [x25519, secp256r1, secp384r1, secp521r1, ffdhe2048, ffdhe3072] }, "ec_point_formats (11)": { "formats": [uncompressed] }, "application_layer_protocol_negotiation (16)": { [h2, http/1.1] }, "status_request (5)": { "certificate status type": ocsp "OCSP status request": { "responder_id": "request extensions": { } } }, "key_share (51)": { "client_shares": [ { "named group": x25519 "key_exchange": { 0000: 47 B5 72 2B E9 DD 89 E9 77 4D 3B BE 86 56 56 69 G.r+....wM;..VVi 0010: 7A C5 AE C2 04 23 86 80 F6 C6 84 09 F1 8E D0 19 z....#.......... } }, { "named group": secp256r1 "key_exchange": { 0000: 04 5D 87 C5 FF 38 5A AF 08 71 3E 98 2E A6 A5 AE .]...8Z..q>..... 0010: 9F DF 1A C2 0A E1 62 63 1C 84 FB D8 6D 6E 4F 2C ......bc....mnO, 0020: 9B 8E 53 A0 83 2B 05 14 20 70 FB 1A 6F 1E C8 3B ..S..+.. p..o..; 0030: 42 54 F1 C2 E7 08 0E D2 02 04 A1 C4 4E 83 18 73 BT..........N..s 0040: E9 } }, ] }, "supported_versions (43)": { "versions": [TLSv1.3, TLSv1.2, TLSv1.1, TLSv1] }, "signature_algorithms (13)": { "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp512r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1] } ] } ) javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 12:44:36.445 IST|SSLExtensions.java:167|Consumed extension: supported_versions javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 12:44:36.446 IST|ClientHello.java:836|Negotiated protocol version: TLSv1.3 javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 12:44:36.446 IST|PskKeyExchangeModesExtension.java:294|abort session resumption, no supported psk_dhe_ke PSK key exchange mode javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 12:44:36.446 IST|PreSharedKeyExtension.java:783|Handling pre_shared_key absence. javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 12:44:36.447 IST|ServerNameExtension.java:322|no server name matchers, ignore server name indication javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 12:44:36.447 IST|SSLExtensions.java:167|Consumed extension: server_name javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 12:44:36.447 IST|SSLExtensions.java:148|Ignore unavailable extension: max_fragment_length javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 12:44:36.447 IST|SSLExtensions.java:167|Consumed extension: status_request javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 12:44:36.448 IST|SSLExtensions.java:167|Consumed extension: supported_groups javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 12:44:36.448 IST|SSLExtensions.java:138|Ignore unsupported extension: ec_point_formats javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 12:44:36.448 IST|SSLExtensions.java:167|Consumed extension: signature_algorithms javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 12:44:36.448 IST|SSLExtensions.java:148|Ignore unavailable extension: signature_algorithms_cert javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 12:44:36.448 IST|AlpnExtension.java:274|Ignore server unenabled extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 12:44:36.448 IST|SSLExtensions.java:167|Consumed extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 12:44:36.449 IST|SSLExtensions.java:138|Ignore unsupported extension: status_request_v2 javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 12:44:36.449 IST|SSLExtensions.java:138|Ignore unsupported extension: extended_master_secret javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 12:44:36.449 IST|SSLExtensions.java:148|Ignore unavailable extension: cookie javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 12:44:36.449 IST|KeyShareExtension.java:350|Ignore unsupported named group: x25519 javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 12:44:36.450 IST|SSLExtensions.java:167|Consumed extension: key_share javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 12:44:36.450 IST|SSLExtensions.java:138|Ignore unsupported extension: renegotiation_info javax.net.ssl|ALL|23|https-jsse-nio-8443-exec-3|2019-11-18 12:44:36.450 IST|SignatureScheme.java:358|Ignore disabled signature sheme: rsa_md5 javax.net.ssl|WARNING|23|https-jsse-nio-8443-exec-3|2019-11-18 12:44:36.450 IST|SSLExtensions.java:190|Ignore impact of unsupported extension: server_name javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 12:44:36.451 IST|SSLExtensions.java:182|Ignore unavailable extension: max_fragment_length javax.net.ssl|WARNING|23|https-jsse-nio-8443-exec-3|2019-11-18 12:44:36.451 IST|SSLExtensions.java:190|Ignore impact of unsupported extension: status_request javax.net.ssl|WARNING|23|https-jsse-nio-8443-exec-3|2019-11-18 12:44:36.451 IST|SSLExtensions.java:190|Ignore impact of unsupported extension: supported_groups javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 12:44:36.451 IST|SSLExtensions.java:199|Populated with extension: signature_algorithms javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 12:44:36.451 IST|SSLExtensions.java:182|Ignore unavailable extension: signature_algorithms_cert javax.net.ssl|WARNING|23|https-jsse-nio-8443-exec-3|2019-11-18 12:44:36.452 IST|SSLExtensions.java:190|Ignore impact of unsupported extension: application_layer_protocol_negotiation javax.net.ssl|WARNING|23|https-jsse-nio-8443-exec-3|2019-11-18 12:44:36.452 IST|SSLExtensions.java:190|Ignore impact of unsupported extension: supported_versions javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 12:44:36.452 IST|SSLExtensions.java:182|Ignore unavailable extension: cookie javax.net.ssl|WARNING|23|https-jsse-nio-8443-exec-3|2019-11-18 12:44:36.452 IST|SSLExtensions.java:190|Ignore impact of unsupported extension: key_share javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 12:44:36.452 IST|SSLExtensions.java:182|Ignore unavailable extension: pre_shared_key javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 12:44:36.452 IST|ServerHello.java:711|use cipher suite TLS_AES_128_GCM_SHA256 javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 12:44:36.455 IST|SSLExtensions.java:235|Ignore, context unavailable extension: pre_shared_key javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 12:44:36.456 IST|ServerHello.java:580|Produced ServerHello handshake message ( "ServerHello": { "server version" : "TLSv1.2", "random" : "14 C9 1F EF 61 7B 1D C2 4C 8B FB E9 FE EA 42 17 B6 7B 30 8F 87 DE 89 CC BE 8E 67 4A 01 F4 E4 18", "session id" : "D6 B1 79 59 CA AD 7D EB 4F E3 E5 4E 38 B4 76 A1 09 DB 06 3A 71 AC B6 53 68 85 B2 12 5D 77 3E F5", "cipher suite" : "TLS_AES_128_GCM_SHA256(0x1301)", "compression methods" : "00", "extensions" : [ "supported_versions (43)": { "selected version": [TLSv1.3] }, "key_share (51)": { "server_share": { "named group": secp256r1 "key_exchange": { 0000: 04 51 27 52 73 E5 CD 51 BA B3 D6 76 7B 56 00 A1 .Q'Rs..Q...v.V.. 0010: 22 2F 4C 9B 77 FD 95 64 A6 69 F6 61 11 80 F7 2A "/L.w..d.i.a...* 0020: 00 EF 08 2C 57 BC 92 DD ED B6 E7 9B F8 29 AF D3 ...,W........).. 0030: AF 95 0F 47 DE 88 2A 27 B9 77 D0 60 03 60 C9 A1 ...G..*'.w.`.`.. 0040: E6 } }, } ] } ) javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 12:44:36.460 IST|SSLCipher.java:1824|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE countdown value = 137438953472 javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 12:44:36.461 IST|SSLCipher.java:1978|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE countdown value = 137438953472 javax.net.ssl|ALL|23|https-jsse-nio-8443-exec-3|2019-11-18 12:44:36.462 IST|ServerNameExtension.java:532|No expected server name indication response javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 12:44:36.462 IST|SSLExtensions.java:235|Ignore, context unavailable extension: server_name javax.net.ssl|ALL|23|https-jsse-nio-8443-exec-3|2019-11-18 12:44:36.462 IST|MaxFragExtension.java:471|Ignore unavailable max_fragment_length extension javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 12:44:36.462 IST|SSLExtensions.java:235|Ignore, context unavailable extension: max_fragment_length javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 12:44:36.465 IST|AlpnExtension.java:363|Ignore unavailable extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 12:44:36.465 IST|SSLExtensions.java:235|Ignore, context unavailable extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 12:44:36.466 IST|EncryptedExtensions.java:137|Produced EncryptedExtensions message ( "EncryptedExtensions": [ "supported_groups (10)": { "versions": [secp256r1, secp384r1, secp521r1, sect283k1, sect283r1, sect409k1, sect409r1, sect571k1, sect571r1, secp256k1, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192] } ] ) javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 12:44:36.467 IST|CertificateRequest.java:821|Produced CertificateRequest message ( "CertificateRequest": { "certificate_request_context": "", "extensions": [ "signature_algorithms (13)": { "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp512r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1] }, "signature_algorithms_cert (50)": { "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp512r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1] } ] } ) javax.net.ssl|ALL|23|https-jsse-nio-8443-exec-3|2019-11-18 12:44:36.467 IST|X509Authentication.java:241|No X.509 cert selected for EC javax.net.ssl|WARNING|23|https-jsse-nio-8443-exec-3|2019-11-18 12:44:36.467 IST|CertificateMessage.java:1059|Unavailable authentication scheme: ecdsa_secp256r1_sha256 javax.net.ssl|ALL|23|https-jsse-nio-8443-exec-3|2019-11-18 12:44:36.467 IST|X509Authentication.java:241|No X.509 cert selected for EC javax.net.ssl|WARNING|23|https-jsse-nio-8443-exec-3|2019-11-18 12:44:36.468 IST|CertificateMessage.java:1059|Unavailable authentication scheme: ecdsa_secp384r1_sha384 javax.net.ssl|ALL|23|https-jsse-nio-8443-exec-3|2019-11-18 12:44:36.468 IST|X509Authentication.java:241|No X.509 cert selected for EC javax.net.ssl|WARNING|23|https-jsse-nio-8443-exec-3|2019-11-18 12:44:36.468 IST|CertificateMessage.java:1059|Unavailable authentication scheme: ecdsa_secp512r1_sha512 javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 12:44:36.468 IST|StatusResponseManager.java:763|Staping disabled or is a resumed session javax.net.ssl|ALL|23|https-jsse-nio-8443-exec-3|2019-11-18 12:44:36.468 IST|CertStatusExtension.java:1111|Stapling is disabled for this connection javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 12:44:36.468 IST|SSLExtensions.java:235|Ignore, context unavailable extension: status_request javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 12:44:36.469 IST|CertificateMessage.java:998|Produced server Certificate message ( "Certificate": { "certificate_request_context": "", "certificate_list": [ { "certificate" : { "version" : "v3", "serial number" : "3B FD 86 4A 58 09 72 F6", "signature algorithm": "SHA512withRSA", "issuer" : "CN=localhost", "not before" : "2019-11-05 13:41:52.000 IST", "not after" : "2020-11-05 13:41:52.000 IST", "subject" : "CN=localhost", "subject public key" : "RSA", "extensions" : [ { ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:false PathLen:2147483647 ] }, { ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_Encipherment Data_Encipherment ] } ]} "extensions": { } }, ] } ) javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 12:44:36.478 IST|CertificateVerify.java:1080|Produced server CertificateVerify handshake message ( "CertificateVerify": { "signature algorithm": rsa_pss_rsae_sha256 "signature": { 0000: 0A 03 8E 7D 36 4C 6B C0 8B 7C 88 6B FD 6A AE D0 ....6Lk....k.j.. 0010: B6 94 FD 24 7C 08 D5 82 0F 34 36 28 61 58 BA D4 ...$.....46(aX.. 0020: A6 5F 75 EF 01 36 DB FB 1C FF A8 9E 11 8B D9 C0 ._u..6.......... 0030: 2E 6A DC AD EE 12 C0 42 A5 F1 F1 9A D5 B9 FC 0B .j.....B........ 0040: 43 7F 7D 62 2B FA BB 80 76 4D 1A F0 B6 C9 17 A9 C..b+...vM...... 0050: B0 CE 1D 66 D8 EB D3 DB 10 40 7B D5 98 12 4D D2 ...f.....@....M. 0060: 5B 3E D6 FE DE 81 AB EA 30 37 A8 91 1B 64 62 E7 [>......07...db. 0070: D8 EB 6C FD 16 A5 02 65 F9 0A BD 10 F2 80 E2 8B ..l....e........ 0080: 7A 7F 1F 92 E3 05 8B D8 FB 9A A3 59 6A 0D 81 E6 z..........Yj... 0090: 41 D3 03 27 FC 41 7C AE 0A A8 D5 A3 7D 7D E6 83 A..'.A.......... 00A0: 85 43 50 C4 D7 6D 73 FD C7 6D 3B 32 94 0C BB 58 .CP..ms..m;2...X 00B0: C0 A9 86 63 27 33 E4 29 C2 72 E6 C0 0A 22 F3 9B ...c'3.).r...".. 00C0: 24 25 55 D9 D4 7B B8 FA 78 AE 3E EC 07 35 C9 69 $%U.....x.>..5.i 00D0: FE 2A 4F AF F6 48 A6 F1 0A BD 9C 75 2C 3D A3 A3 .*O..H.....u,=.. 00E0: 9C 97 12 85 31 9F 23 45 81 3B 54 DD F7 83 C0 D3 ....1.#E.;T..... 00F0: 2D 3C C8 C0 A1 B8 0F 2B 95 1D 78 C0 F4 5B 8F 78 -<.....+..x..[.x } } ) javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 12:44:36.479 IST|Finished.java:745|Produced server Finished handshake message ( "Finished": { "verify data": { 0000: CC 5C 7A C0 A7 AC DD 81 74 AB FF 4A 95 51 A2 12 .\z.....t..J.Q.. 0010: 2A 47 11 E5 60 77 C7 89 82 C6 B2 64 F6 C5 6B FF *G..`w.....d..k. }'} ) javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 12:44:36.480 IST|SSLCipher.java:1978|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE countdown value = 137438953472 javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 12:44:36.499 IST|ChangeCipherSpec.java:232|Consuming ChangeCipherSpec message javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 12:44:36.501 IST|CertificateMessage.java:1154|Consuming client Certificate handshake message ( "Certificate": { "certificate_request_context": "", "certificate_list": [ { "certificate" : { "version" : "v3", "serial number" : "2C 8B E3 32 BC 02 24 C0", "signature algorithm": "SHA512withRSA", "issuer" : "CN=client", "not before" : "2019-11-05 13:43:21.000 IST", "not after" : "2020-11-05 13:43:21.000 IST", "subject" : "CN=client", "subject public key" : "RSA", "extensions" : [ { ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:false PathLen:2147483647 ] }, { ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_Encipherment Data_Encipherment ] } ]} "extensions": { } }, ] } ) javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 12:44:36.503 IST|CertificateVerify.java:1128|Consuming CertificateVerify handshake message ( "CertificateVerify": { "signature algorithm": rsa_pss_rsae_sha256 "signature": { 0000: 12 3D 73 88 ED AB 23 54 C2 01 73 AB DA F9 E2 D2 .=s...#T..s..... 0010: 81 58 51 A8 BD F7 04 98 46 D9 9D 72 5F B5 7A E1 .XQ.....F..r_.z. 0020: 5E 3B BA 0B 1B A7 F5 22 78 E5 AA E1 45 B0 BE C1 ^;....."x...E... 0030: 56 65 90 14 B0 30 30 BB DF A7 D7 67 9E 06 73 A7 Ve...00....g..s. 0040: 56 94 A9 D8 5C EC EB 66 C8 28 2D CE 97 69 30 F5 V...\..f.(-..i0. 0050: 2C B3 64 40 B4 22 F9 83 0D 69 DB EC 0A 03 03 AD ,.d@."...i...... 0060: A2 2E 24 27 D0 F8 23 85 99 E9 77 17 7B 2D 2A EA ..$'..#...w..-*. 0070: C6 01 3D 25 A3 7F 93 64 7D 7E 9B EC E9 93 DC 9C ..=%...d........ 0080: 0C 28 51 D1 28 3F 5E CD 5F E2 E6 F8 FC AC 91 60 .(Q.(?^._......` 0090: 13 63 1E 59 69 CE 2E F9 4D 13 C1 82 C3 3F DD 99 .c.Yi...M....?.. 00A0: 43 2E B0 4F 9A 8F E7 DC 79 F6 39 BA 2F 02 85 B6 C..O....y.9./... 00B0: 4D E2 F5 EC F7 6D 30 AD D7 0E 07 15 D7 E8 BA 37 M....m0........7 00C0: CE 4F 83 D2 28 B6 C7 2D 89 78 E2 8D 94 E4 16 69 .O..(..-.x.....i 00D0: 88 56 C7 34 AD 8F CB F2 B3 46 BC D2 49 5B 34 CE .V.4.....F..I[4. 00E0: 7C A5 69 3B 3F BA 28 FC BC DD 27 7D D6 9A D8 E8 ..i;?.(...'..... 00F0: 6E 39 8D B8 79 9F B7 FB 79 A5 9F BB AE 6B 6A CD n9..y...y....kj. } } ) javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 12:44:36.504 IST|Finished.java:978|Consuming client Finished handshake message ( "Finished": { "verify data": { 0000: F2 54 56 B6 36 70 5A 23 A0 71 AF 5E 78 0D 26 70 .TV.6pZ#.q.^x.&p 0010: D2 1F 35 43 78 F4 21 85 3C CE 73 B7 76 D4 12 3C ..5Cx.!.<.s.v..< }'} ) javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 12:44:36.505 IST|SSLCipher.java:1824|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE countdown value = 137438953472 javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 12:44:36.505 IST|Finished.java:1070|Sending new session ticket 18-Nov-2019 12:44:36.505 FINE [https-jsse-nio-8443-exec-6] org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun Error during SSL handshake java.io.IOException: NOT_HANDSHAKING during handshake at org.apache.tomcat.util.net.SecureNioChannel.handshake(SecureNioChannel.java:193) at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1556) at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49) at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128) at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628) at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61) at java.base/java.lang.Thread.run(Thread.java:834) 18-Nov-2019 12:44:36.506 FINE [https-jsse-nio-8443-exec-6] org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper.doClose Calling [org.apache.tomcat.util.net.NioEndpoint@4db49c7f].closeSocket([org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper@48111590:org.apache.tomcat.util.net.SecureNioChannel@2c9ead00:java.nio.channels.SocketChannel[connected local=/0:0:0:0:0:0:0:1:8443 remote=/0:0:0:0:0:0:0:1:63249]]) java.lang.Exception at org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper.doClose(NioEndpoint.java:1163) at org.apache.tomcat.util.net.SocketWrapperBase.close(SocketWrapperBase.java:402) at org.apache.tomcat.util.net.NioEndpoint$Poller.cancelledKey(NioEndpoint.java:665) at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1586) at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49) at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128) at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628) at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61) at java.base/java.lang.Thread.run(Thread.java:834) javax.net.ssl|ALL|26|https-jsse-nio-8443-exec-6|2019-11-18 12:44:36.507 IST|SSLEngineImpl.java:743|Closing outbound of SSLEngine javax.net.ssl|WARNING|26|https-jsse-nio-8443-exec-6|2019-11-18 12:44:36.509 IST|SSLEngineOutputRecord.java:168|outbound has closed, ignore outbound application data 18-Nov-2019 12:44:36.520 FINE [https-jsse-nio-8443-exec-7] org.apache.tomcat.util.net.SecureNioChannel.processSNI The SNI host name extracted for connection [java.nio.channels.SocketChannel[connected local=/0:0:0:0:0:0:0:1:8443 remote=/0:0:0:0:0:0:0:1:63250]] was [localhost] javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 12:44:36.521 IST|HandshakeContext.java:290|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 for TLS10 javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 12:44:36.522 IST|HandshakeContext.java:290|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 for TLS10 javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 12:44:36.522 IST|HandshakeContext.java:290|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLS10 javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 12:44:36.522 IST|HandshakeContext.java:290|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLS10 javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 12:44:36.523 IST|HandshakeContext.java:290|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 for TLS13 javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 12:44:36.523 IST|HandshakeContext.java:290|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 for TLS13 javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 12:44:36.523 IST|HandshakeContext.java:290|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLS13 javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 12:44:36.523 IST|HandshakeContext.java:290|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLS13 javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 12:44:36.523 IST|HandshakeContext.java:290|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA for TLS13 javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 12:44:36.524 IST|HandshakeContext.java:290|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA for TLS13 javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 12:44:36.524 IST|HandshakeContext.java:290|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 for TLS11 javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 12:44:36.525 IST|HandshakeContext.java:290|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 for TLS11 javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 12:44:36.525 IST|HandshakeContext.java:290|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLS11 javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 12:44:36.526 IST|HandshakeContext.java:290|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLS11 javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 12:44:36.533 IST|ClientHello.java:806|Consuming ClientHello handshake message ( "ClientHello": { "client version" : "TLSv1.2", "random" : "6B 36 C3 2E 6E 9D 1B F1 D2 0C 8C 33 63 A0 C4 8E BD F7 B5 5D A1 A1 E1 F0 48 BF 4A 60 17 55 14 8B", "session id" : "C5 FB BE EC 5A F7 12 03 D5 E1 6D A0 03 A3 67 F5 B2 A9 5E BB 5C FD DE CE 16 D5 1F 7F 96 EB FF 8A", "cipher suites" : "[TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_AES_256_GCM_SHA384(0x1302), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), UNKNOWN-CIPHER-SUITE(0xCCA9)(0xCCA9), UNKNOWN-CIPHER-SUITE(0xCCA8)(0xCCA8), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA(0xC00A), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA(0xC009), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA(0xC013), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA(0xC014), TLS_DHE_RSA_WITH_AES_128_CBC_SHA(0x0033), TLS_DHE_RSA_WITH_AES_256_CBC_SHA(0x0039), TLS_RSA_WITH_AES_128_CBC_SHA(0x002F), TLS_RSA_WITH_AES_256_CBC_SHA(0x0035), SSL_RSA_WITH_3DES_EDE_CBC_SHA(0x000A)]", "compression methods" : "00", "extensions" : [ "server_name (0)": { type=host_name (0), value=localhost }, "extended_master_secret (23)": { }, "renegotiation_info (65,281)": { "renegotiated connection": [] }, "supported_groups (10)": { "versions": [x25519, secp256r1, secp384r1, secp521r1, ffdhe2048, ffdhe3072] }, "ec_point_formats (11)": { "formats": [uncompressed] }, "application_layer_protocol_negotiation (16)": { [h2, http/1.1] }, "status_request (5)": { "certificate status type": ocsp "OCSP status request": { "responder_id": "request extensions": { } } }, "key_share (51)": { "client_shares": [ { "named group": x25519 "key_exchange": { 0000: 5D 5A E9 67 EF 41 58 92 54 77 F3 98 D3 D5 76 6B ]Z.g.AX.Tw....vk 0010: 6B BF 04 B9 08 2A ED 40 40 B4 4A 78 66 5E A2 6D k....*.@@.Jxf^.m } }, { "named group": secp256r1 "key_exchange": { 0000: 04 16 9F 0B 01 8B 2A F2 2A 52 DE 0A EA B3 F1 B5 ......*.*R...... 0010: AE F9 9E 6B DE 0F 25 AA A6 6D F7 8E 66 C3 04 DF ...k..%..m..f... 0020: BE 88 48 4D 1E 00 FF 7B 79 83 64 2B 82 B7 22 84 ..HM....y.d+..". 0030: 87 37 96 58 C3 52 A1 B9 40 33 1E 86 24 56 EE 99 .7.X.R..@3..$V.. 0040: BD } }, ] }, "supported_versions (43)": { "versions": [TLSv1.3, TLSv1.2, TLSv1.1, TLSv1] }, "signature_algorithms (13)": { "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp512r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1] } ] } ) javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 12:44:36.533 IST|SSLExtensions.java:167|Consumed extension: supported_versions javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 12:44:36.534 IST|ClientHello.java:836|Negotiated protocol version: TLSv1.3 javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 12:44:36.534 IST|PskKeyExchangeModesExtension.java:294|abort session resumption, no supported psk_dhe_ke PSK key exchange mode javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 12:44:36.534 IST|PreSharedKeyExtension.java:783|Handling pre_shared_key absence. javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 12:44:36.534 IST|ServerNameExtension.java:322|no server name matchers, ignore server name indication javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 12:44:36.534 IST|SSLExtensions.java:167|Consumed extension: server_name javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 12:44:36.535 IST|SSLExtensions.java:148|Ignore unavailable extension: max_fragment_length javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 12:44:36.535 IST|SSLExtensions.java:167|Consumed extension: status_request javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 12:44:36.535 IST|SSLExtensions.java:167|Consumed extension: supported_groups javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 12:44:36.535 IST|SSLExtensions.java:138|Ignore unsupported extension: ec_point_formats javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 12:44:36.535 IST|SSLExtensions.java:167|Consumed extension: signature_algorithms javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 12:44:36.535 IST|SSLExtensions.java:148|Ignore unavailable extension: signature_algorithms_cert javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 12:44:36.535 IST|AlpnExtension.java:274|Ignore server unenabled extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 12:44:36.536 IST|SSLExtensions.java:167|Consumed extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 12:44:36.536 IST|SSLExtensions.java:138|Ignore unsupported extension: status_request_v2 javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 12:44:36.536 IST|SSLExtensions.java:138|Ignore unsupported extension: extended_master_secret javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 12:44:36.536 IST|SSLExtensions.java:148|Ignore unavailable extension: cookie javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 12:44:36.536 IST|KeyShareExtension.java:350|Ignore unsupported named group: x25519 javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 12:44:36.536 IST|SSLExtensions.java:167|Consumed extension: key_share javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 12:44:36.537 IST|SSLExtensions.java:138|Ignore unsupported extension: renegotiation_info javax.net.ssl|ALL|27|https-jsse-nio-8443-exec-7|2019-11-18 12:44:36.537 IST|SignatureScheme.java:358|Ignore disabled signature sheme: rsa_md5 javax.net.ssl|WARNING|27|https-jsse-nio-8443-exec-7|2019-11-18 12:44:36.537 IST|SSLExtensions.java:190|Ignore impact of unsupported extension: server_name javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 12:44:36.537 IST|SSLExtensions.java:182|Ignore unavailable extension: max_fragment_length javax.net.ssl|WARNING|27|https-jsse-nio-8443-exec-7|2019-11-18 12:44:36.538 IST|SSLExtensions.java:190|Ignore impact of unsupported extension: status_request javax.net.ssl|WARNING|27|https-jsse-nio-8443-exec-7|2019-11-18 12:44:36.538 IST|SSLExtensions.java:190|Ignore impact of unsupported extension: supported_groups javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 12:44:36.538 IST|SSLExtensions.java:199|Populated with extension: signature_algorithms javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 12:44:36.538 IST|SSLExtensions.java:182|Ignore unavailable extension: signature_algorithms_cert javax.net.ssl|WARNING|27|https-jsse-nio-8443-exec-7|2019-11-18 12:44:36.538 IST|SSLExtensions.java:190|Ignore impact of unsupported extension: application_layer_protocol_negotiation javax.net.ssl|WARNING|27|https-jsse-nio-8443-exec-7|2019-11-18 12:44:36.539 IST|SSLExtensions.java:190|Ignore impact of unsupported extension: supported_versions javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 12:44:36.539 IST|SSLExtensions.java:182|Ignore unavailable extension: cookie javax.net.ssl|WARNING|27|https-jsse-nio-8443-exec-7|2019-11-18 12:44:36.539 IST|SSLExtensions.java:190|Ignore impact of unsupported extension: key_share javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 12:44:36.539 IST|SSLExtensions.java:182|Ignore unavailable extension: pre_shared_key javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 12:44:36.539 IST|ServerHello.java:711|use cipher suite TLS_AES_128_GCM_SHA256 javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 12:44:36.542 IST|SSLExtensions.java:235|Ignore, context unavailable extension: pre_shared_key javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 12:44:36.543 IST|ServerHello.java:580|Produced ServerHello handshake message ( "ServerHello": { "server version" : "TLSv1.2", "random" : "B2 14 0E 21 24 5E 21 A0 94 37 1E A8 F2 71 7C 03 FE E9 B8 B6 7A 13 1B C4 A5 EB 30 55 91 1E 80 DC", "session id" : "C5 FB BE EC 5A F7 12 03 D5 E1 6D A0 03 A3 67 F5 B2 A9 5E BB 5C FD DE CE 16 D5 1F 7F 96 EB FF 8A", "cipher suite" : "TLS_AES_128_GCM_SHA256(0x1301)", "compression methods" : "00", "extensions" : [ "supported_versions (43)": { "selected version": [TLSv1.3] }, "key_share (51)": { "server_share": { "named group": secp256r1 "key_exchange": { 0000: 04 58 FB 7E 3F B8 FF CA EA CF 6A B3 B4 D9 8A 9F .X..?.....j..... 0010: 72 9F 61 FF 43 1D 88 D6 00 80 17 10 C3 C1 97 CF r.a.C........... 0020: 82 84 7B 3B 35 1A E6 E7 F6 53 59 5D 4A 37 60 77 ...;5....SY]J7`w 0030: 24 AE 50 49 59 05 03 6C B4 B9 B8 29 0C 3E 06 34 $.PIY..l...).>.4 0040: CB } }, } ] } ) javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 12:44:36.547 IST|SSLCipher.java:1824|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE countdown value = 137438953472 javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 12:44:36.548 IST|SSLCipher.java:1978|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE countdown value = 137438953472 javax.net.ssl|ALL|27|https-jsse-nio-8443-exec-7|2019-11-18 12:44:36.548 IST|ServerNameExtension.java:532|No expected server name indication response javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 12:44:36.548 IST|SSLExtensions.java:235|Ignore, context unavailable extension: server_name javax.net.ssl|ALL|27|https-jsse-nio-8443-exec-7|2019-11-18 12:44:36.549 IST|MaxFragExtension.java:471|Ignore unavailable max_fragment_length extension javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 12:44:36.549 IST|SSLExtensions.java:235|Ignore, context unavailable extension: max_fragment_length javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 12:44:36.550 IST|AlpnExtension.java:363|Ignore unavailable extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 12:44:36.550 IST|SSLExtensions.java:235|Ignore, context unavailable extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 12:44:36.550 IST|EncryptedExtensions.java:137|Produced EncryptedExtensions message ( "EncryptedExtensions": [ "supported_groups (10)": { "versions": [secp256r1, secp384r1, secp521r1, sect283k1, sect283r1, sect409k1, sect409r1, sect571k1, sect571r1, secp256k1, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192] } ] ) javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 12:44:36.551 IST|CertificateRequest.java:821|Produced CertificateRequest message ( "CertificateRequest": { "certificate_request_context": "", "extensions": [ "signature_algorithms (13)": { "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp512r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1] }, "signature_algorithms_cert (50)": { "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp512r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1] } ] } ) javax.net.ssl|ALL|27|https-jsse-nio-8443-exec-7|2019-11-18 12:44:36.551 IST|X509Authentication.java:241|No X.509 cert selected for EC javax.net.ssl|WARNING|27|https-jsse-nio-8443-exec-7|2019-11-18 12:44:36.551 IST|CertificateMessage.java:1059|Unavailable authentication scheme: ecdsa_secp256r1_sha256 javax.net.ssl|ALL|27|https-jsse-nio-8443-exec-7|2019-11-18 12:44:36.551 IST|X509Authentication.java:241|No X.509 cert selected for EC javax.net.ssl|WARNING|27|https-jsse-nio-8443-exec-7|2019-11-18 12:44:36.551 IST|CertificateMessage.java:1059|Unavailable authentication scheme: ecdsa_secp384r1_sha384 javax.net.ssl|ALL|27|https-jsse-nio-8443-exec-7|2019-11-18 12:44:36.551 IST|X509Authentication.java:241|No X.509 cert selected for EC javax.net.ssl|WARNING|27|https-jsse-nio-8443-exec-7|2019-11-18 12:44:36.553 IST|CertificateMessage.java:1059|Unavailable authentication scheme: ecdsa_secp512r1_sha512 javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 12:44:36.558 IST|StatusResponseManager.java:763|Staping disabled or is a resumed session javax.net.ssl|ALL|27|https-jsse-nio-8443-exec-7|2019-11-18 12:44:36.558 IST|CertStatusExtension.java:1111|Stapling is disabled for this connection javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 12:44:36.559 IST|SSLExtensions.java:235|Ignore, context unavailable extension: status_request javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 12:44:36.560 IST|CertificateMessage.java:998|Produced server Certificate message ( "Certificate": { "certificate_request_context": "", "certificate_list": [ { "certificate" : { "version" : "v3", "serial number" : "3B FD 86 4A 58 09 72 F6", "signature algorithm": "SHA512withRSA", "issuer" : "CN=localhost", "not before" : "2019-11-05 13:41:52.000 IST", "not after" : "2020-11-05 13:41:52.000 IST", "subject" : "CN=localhost", "subject public key" : "RSA", "extensions" : [ { ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:false PathLen:2147483647 ] }, { ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_Encipherment Data_Encipherment ] } ]} "extensions": { } }, ] } ) javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 12:44:36.573 IST|CertificateVerify.java:1080|Produced server CertificateVerify handshake message ( "CertificateVerify": { "signature algorithm": rsa_pss_rsae_sha256 "signature": { 0000: 50 E4 3C 2F 79 FF 23 7C 9D 32 37 2B DE 17 54 7B P. } }, ] } ) javax.net.ssl|DEBUG|2A|https-jsse-nio-8443-exec-10|2019-11-18 12:44:36.602 IST|CertificateVerify.java:1128|Consuming CertificateVerify handshake message ( "CertificateVerify": { "signature algorithm": rsa_pss_rsae_sha256 "signature": { 0000: 70 16 44 21 41 35 DA 15 FA 34 96 75 54 33 EB EB p.D!A5...4.uT3.. 0010: A6 EF B2 9D 32 A0 81 32 D7 04 95 27 1E FE AE 62 ....2..2...'...b 0020: 73 CE D7 F6 04 1A 62 31 BA 1B 1C A8 EF 7C BC FA s.....b1........ 0030: F8 8E 7A ED 34 1B C5 DF A0 1F 80 E3 6C 7E F3 84 ..z.4.......l... 0040: A4 24 F7 DF 4B D9 2C 2D 50 46 77 89 65 98 4B EA .$..K.,-PFw.e.K. 0050: 52 D7 F7 54 3D D7 CA 4A BF 32 34 47 23 C0 56 6E R..T=..J.24G#.Vn 0060: F1 EA 52 E9 8B 19 44 D6 1C 36 97 FF 25 90 22 7C ..R...D..6..%.". 0070: 39 E7 E9 8A 29 19 62 F8 E5 06 CC FD 17 51 40 2A 9...).b......Q@* 0080: DC 9B 13 E8 7B 3A 1D B2 4B 2E 56 69 E6 19 BD 31 .....:..K.Vi...1 0090: DC 4F 60 94 E6 36 0F 4E 9B BC A5 6E 59 63 F1 97 .O`..6.N...nYc.. 00A0: F5 0A AD 28 3F B2 17 F9 14 C7 E2 48 A7 56 D0 3B ...(?......H.V.; 00B0: D0 40 D0 6E 9D B2 6D 5E 13 A1 9D 98 67 15 6D B1 .@.n..m^....g.m. 00C0: 05 FD 72 68 AE 6B 02 3F 25 25 F1 73 2A D0 D3 0A ..rh.k.?%%.s*... 00D0: 8C 5E 6A 7E A0 84 D9 59 0A 08 D7 A5 26 9A C9 B3 .^j....Y....&... 00E0: 77 AA 00 28 28 FA 96 63 32 3E 8F 20 61 61 34 D4 w..((..c2>. aa4. 00F0: 40 6F 55 A7 B7 3F FC DB D1 9A 9A AA 4F 9E 8E AA @oU..?......O... } } ) javax.net.ssl|DEBUG|2A|https-jsse-nio-8443-exec-10|2019-11-18 12:44:36.602 IST|Finished.java:978|Consuming client Finished handshake message ( "Finished": { "verify data": { 0000: 94 AD FC 6F D8 E4 8F 6E 36 50 26 EF 70 14 E0 89 ...o...n6P&.p... 0010: 6C 40 6F D6 4A 89 36 1A B7 97 D3 99 E4 18 90 F9 l@o.J.6......... }'} ) javax.net.ssl|DEBUG|2A|https-jsse-nio-8443-exec-10|2019-11-18 12:44:36.603 IST|SSLCipher.java:1824|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE countdown value = 137438953472 javax.net.ssl|DEBUG|2A|https-jsse-nio-8443-exec-10|2019-11-18 12:44:36.603 IST|Finished.java:1070|Sending new session ticket 18-Nov-2019 12:44:36.603 FINE [https-jsse-nio-8443-exec-10] org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun Error during SSL handshake java.io.IOException: NOT_HANDSHAKING during handshake at org.apache.tomcat.util.net.SecureNioChannel.handshake(SecureNioChannel.java:193) at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1556) at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49) at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128) at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628) at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61) at java.base/java.lang.Thread.run(Thread.java:834) 18-Nov-2019 12:44:36.604 FINE [https-jsse-nio-8443-exec-10] org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper.doClose Calling [org.apache.tomcat.util.net.NioEndpoint@4db49c7f].closeSocket([org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper@18483b01:org.apache.tomcat.util.net.SecureNioChannel@2c9ead00:java.nio.channels.SocketChannel[connected local=/0:0:0:0:0:0:0:1:8443 remote=/0:0:0:0:0:0:0:1:63250]]) java.lang.Exception at org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper.doClose(NioEndpoint.java:1163) at org.apache.tomcat.util.net.SocketWrapperBase.close(SocketWrapperBase.java:402) at org.apache.tomcat.util.net.NioEndpoint$Poller.cancelledKey(NioEndpoint.java:665) at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1586) at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49) at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128) at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628) at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61) at java.base/java.lang.Thread.run(Thread.java:834) javax.net.ssl|ALL|2A|https-jsse-nio-8443-exec-10|2019-11-18 12:44:36.604 IST|SSLEngineImpl.java:743|Closing outbound of SSLEngine javax.net.ssl|WARNING|2A|https-jsse-nio-8443-exec-10|2019-11-18 12:44:36.605 IST|SSLEngineOutputRecord.java:168|outbound has closed, ignore outbound application data 18-Nov-2019 12:44:36.617 FINE [https-jsse-nio-8443-exec-1] org.apache.tomcat.util.net.SecureNioChannel.processSNI The SNI host name extracted for connection [java.nio.channels.SocketChannel[connected local=/0:0:0:0:0:0:0:1:8443 remote=/0:0:0:0:0:0:0:1:63251]] was [localhost] javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 12:44:36.618 IST|HandshakeContext.java:290|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 for TLS10 javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 12:44:36.618 IST|HandshakeContext.java:290|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 for TLS10 javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 12:44:36.619 IST|HandshakeContext.java:290|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLS10 javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 12:44:36.619 IST|HandshakeContext.java:290|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLS10 javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 12:44:36.619 IST|HandshakeContext.java:290|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 for TLS13 javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 12:44:36.619 IST|HandshakeContext.java:290|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 for TLS13 javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 12:44:36.619 IST|HandshakeContext.java:290|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLS13 javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 12:44:36.619 IST|HandshakeContext.java:290|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLS13 javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 12:44:36.619 IST|HandshakeContext.java:290|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA for TLS13 javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 12:44:36.619 IST|HandshakeContext.java:290|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA for TLS13 javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 12:44:36.620 IST|HandshakeContext.java:290|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 for TLS11 javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 12:44:36.620 IST|HandshakeContext.java:290|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 for TLS11 javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 12:44:36.620 IST|HandshakeContext.java:290|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLS11 javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 12:44:36.620 IST|HandshakeContext.java:290|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLS11 javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 12:44:36.623 IST|ClientHello.java:806|Consuming ClientHello handshake message ( "ClientHello": { "client version" : "TLSv1.2", "random" : "73 BA 0E CA 8F 92 41 84 7F A9 C6 24 AB 6C 28 00 8D CE 85 A6 8A C4 B6 13 65 6E D2 98 8D 2C BF 7D", "session id" : "CD 87 95 5F EE 80 C1 45 C4 6D 33 57 02 6E 96 96 23 F1 76 1C A6 6A 20 33 98 06 D8 70 FD 29 E8 65", "cipher suites" : "[TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_AES_256_GCM_SHA384(0x1302), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), UNKNOWN-CIPHER-SUITE(0xCCA9)(0xCCA9), UNKNOWN-CIPHER-SUITE(0xCCA8)(0xCCA8), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA(0xC00A), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA(0xC009), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA(0xC013), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA(0xC014), TLS_DHE_RSA_WITH_AES_128_CBC_SHA(0x0033), TLS_DHE_RSA_WITH_AES_256_CBC_SHA(0x0039), TLS_RSA_WITH_AES_128_CBC_SHA(0x002F), TLS_RSA_WITH_AES_256_CBC_SHA(0x0035), SSL_RSA_WITH_3DES_EDE_CBC_SHA(0x000A)]", "compression methods" : "00", "extensions" : [ "server_name (0)": { type=host_name (0), value=localhost }, "extended_master_secret (23)": { }, "renegotiation_info (65,281)": { "renegotiated connection": [] }, "supported_groups (10)": { "versions": [x25519, secp256r1, secp384r1, secp521r1, ffdhe2048, ffdhe3072] }, "ec_point_formats (11)": { "formats": [uncompressed] }, "application_layer_protocol_negotiation (16)": { [h2, http/1.1] }, "status_request (5)": { "certificate status type": ocsp "OCSP status request": { "responder_id": "request extensions": { } } }, "key_share (51)": { "client_shares": [ { "named group": x25519 "key_exchange": { 0000: 89 3F 14 A4 4C 57 A0 D1 80 4C 68 FF FE A8 FB F2 .?..LW...Lh..... 0010: F4 DB 33 89 5E F7 3B 88 81 4F E2 DE 1D B2 B0 69 ..3.^.;..O.....i } }, { "named group": secp256r1 "key_exchange": { 0000: 04 0D 2F 9A FC 77 84 D1 68 55 1C 88 A6 35 9D 0A ../..w..hU...5.. 0010: B3 A3 39 E9 B6 F3 34 6C 27 A5 53 EA 90 A9 15 CA ..9...4l'.S..... 0020: AF 86 48 7C B8 C9 A9 21 AB 9E B6 2E 28 AD 73 CF ..H....!....(.s. 0030: 01 2F 45 ED 3D 36 E2 2B 56 F6 35 39 1D E0 94 37 ./E.=6.+V.59...7 0040: C4 } }, ] }, "supported_versions (43)": { "versions": [TLSv1.3, TLSv1.2, TLSv1.1, TLSv1] }, "signature_algorithms (13)": { "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp512r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1] } ] } ) javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 12:44:36.623 IST|SSLExtensions.java:167|Consumed extension: supported_versions javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 12:44:36.623 IST|ClientHello.java:836|Negotiated protocol version: TLSv1.3 javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 12:44:36.624 IST|PskKeyExchangeModesExtension.java:294|abort session resumption, no supported psk_dhe_ke PSK key exchange mode javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 12:44:36.624 IST|PreSharedKeyExtension.java:783|Handling pre_shared_key absence. javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 12:44:36.624 IST|ServerNameExtension.java:322|no server name matchers, ignore server name indication javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 12:44:36.624 IST|SSLExtensions.java:167|Consumed extension: server_name javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 12:44:36.624 IST|SSLExtensions.java:148|Ignore unavailable extension: max_fragment_length javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 12:44:36.624 IST|SSLExtensions.java:167|Consumed extension: status_request javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 12:44:36.624 IST|SSLExtensions.java:167|Consumed extension: supported_groups javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 12:44:36.624 IST|SSLExtensions.java:138|Ignore unsupported extension: ec_point_formats javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 12:44:36.625 IST|SSLExtensions.java:167|Consumed extension: signature_algorithms javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 12:44:36.625 IST|SSLExtensions.java:148|Ignore unavailable extension: signature_algorithms_cert javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 12:44:36.625 IST|AlpnExtension.java:274|Ignore server unenabled extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 12:44:36.625 IST|SSLExtensions.java:167|Consumed extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 12:44:36.625 IST|SSLExtensions.java:138|Ignore unsupported extension: status_request_v2 javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 12:44:36.625 IST|SSLExtensions.java:138|Ignore unsupported extension: extended_master_secret javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 12:44:36.625 IST|SSLExtensions.java:148|Ignore unavailable extension: cookie javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 12:44:36.625 IST|KeyShareExtension.java:350|Ignore unsupported named group: x25519 javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 12:44:36.626 IST|SSLExtensions.java:167|Consumed extension: key_share javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 12:44:36.626 IST|SSLExtensions.java:138|Ignore unsupported extension: renegotiation_info javax.net.ssl|ALL|21|https-jsse-nio-8443-exec-1|2019-11-18 12:44:36.626 IST|SignatureScheme.java:358|Ignore disabled signature sheme: rsa_md5 javax.net.ssl|WARNING|21|https-jsse-nio-8443-exec-1|2019-11-18 12:44:36.626 IST|SSLExtensions.java:190|Ignore impact of unsupported extension: server_name javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 12:44:36.626 IST|SSLExtensions.java:182|Ignore unavailable extension: max_fragment_length javax.net.ssl|WARNING|21|https-jsse-nio-8443-exec-1|2019-11-18 12:44:36.626 IST|SSLExtensions.java:190|Ignore impact of unsupported extension: status_request javax.net.ssl|WARNING|21|https-jsse-nio-8443-exec-1|2019-11-18 12:44:36.626 IST|SSLExtensions.java:190|Ignore impact of unsupported extension: supported_groups javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 12:44:36.627 IST|SSLExtensions.java:199|Populated with extension: signature_algorithms javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 12:44:36.627 IST|SSLExtensions.java:182|Ignore unavailable extension: signature_algorithms_cert javax.net.ssl|WARNING|21|https-jsse-nio-8443-exec-1|2019-11-18 12:44:36.627 IST|SSLExtensions.java:190|Ignore impact of unsupported extension: application_layer_protocol_negotiation javax.net.ssl|WARNING|21|https-jsse-nio-8443-exec-1|2019-11-18 12:44:36.627 IST|SSLExtensions.java:190|Ignore impact of unsupported extension: supported_versions javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 12:44:36.627 IST|SSLExtensions.java:182|Ignore unavailable extension: cookie javax.net.ssl|WARNING|21|https-jsse-nio-8443-exec-1|2019-11-18 12:44:36.627 IST|SSLExtensions.java:190|Ignore impact of unsupported extension: key_share javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 12:44:36.627 IST|SSLExtensions.java:182|Ignore unavailable extension: pre_shared_key javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 12:44:36.627 IST|ServerHello.java:711|use cipher suite TLS_AES_128_GCM_SHA256 javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 12:44:36.629 IST|SSLExtensions.java:235|Ignore, context unavailable extension: pre_shared_key javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 12:44:36.630 IST|ServerHello.java:580|Produced ServerHello handshake message ( "ServerHello": { "server version" : "TLSv1.2", "random" : "1D 85 DD D4 34 D7 A1 E5 E8 0E E0 3F F2 02 CB 82 B8 6B 2F CE C8 54 30 5D 66 07 16 3B B8 4A 44 0A", "session id" : "CD 87 95 5F EE 80 C1 45 C4 6D 33 57 02 6E 96 96 23 F1 76 1C A6 6A 20 33 98 06 D8 70 FD 29 E8 65", "cipher suite" : "TLS_AES_128_GCM_SHA256(0x1301)", "compression methods" : "00", "extensions" : [ "supported_versions (43)": { "selected version": [TLSv1.3] }, "key_share (51)": { "server_share": { "named group": secp256r1 "key_exchange": { 0000: 04 4F BA DF 9C 10 1B 7B 44 FC A6 FD EB F5 47 57 .O......D.....GW 0010: 95 3F BC 2D 2B 6B 0C 79 AB 6F 34 E0 A9 61 E8 4D .?.-+k.y.o4..a.M 0020: C8 77 05 0C 9E 82 7C 05 D7 96 52 73 A2 6B 4E 4F .w........Rs.kNO 0030: 89 04 F2 F2 28 17 99 67 79 7A 8D 17 8B EE E4 6C ....(..gyz.....l 0040: 76 } }, } ] } ) javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 12:44:36.634 IST|SSLCipher.java:1824|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE countdown value = 137438953472 javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 12:44:36.635 IST|SSLCipher.java:1978|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE countdown value = 137438953472 javax.net.ssl|ALL|21|https-jsse-nio-8443-exec-1|2019-11-18 12:44:36.635 IST|ServerNameExtension.java:532|No expected server name indication response javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 12:44:36.635 IST|SSLExtensions.java:235|Ignore, context unavailable extension: server_name javax.net.ssl|ALL|21|https-jsse-nio-8443-exec-1|2019-11-18 12:44:36.635 IST|MaxFragExtension.java:471|Ignore unavailable max_fragment_length extension javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 12:44:36.635 IST|SSLExtensions.java:235|Ignore, context unavailable extension: max_fragment_length javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 12:44:36.636 IST|AlpnExtension.java:363|Ignore unavailable extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 12:44:36.636 IST|SSLExtensions.java:235|Ignore, context unavailable extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 12:44:36.636 IST|EncryptedExtensions.java:137|Produced EncryptedExtensions message ( "EncryptedExtensions": [ "supported_groups (10)": { "versions": [secp256r1, secp384r1, secp521r1, sect283k1, sect283r1, sect409k1, sect409r1, sect571k1, sect571r1, secp256k1, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192] } ] ) javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 12:44:36.637 IST|CertificateRequest.java:821|Produced CertificateRequest message ( "CertificateRequest": { "certificate_request_context": "", "extensions": [ "signature_algorithms (13)": { "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp512r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1] }, "signature_algorithms_cert (50)": { "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp512r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1] } ] } ) javax.net.ssl|ALL|21|https-jsse-nio-8443-exec-1|2019-11-18 12:44:36.637 IST|X509Authentication.java:241|No X.509 cert selected for EC javax.net.ssl|WARNING|21|https-jsse-nio-8443-exec-1|2019-11-18 12:44:36.637 IST|CertificateMessage.java:1059|Unavailable authentication scheme: ecdsa_secp256r1_sha256 javax.net.ssl|ALL|21|https-jsse-nio-8443-exec-1|2019-11-18 12:44:36.637 IST|X509Authentication.java:241|No X.509 cert selected for EC javax.net.ssl|WARNING|21|https-jsse-nio-8443-exec-1|2019-11-18 12:44:36.637 IST|CertificateMessage.java:1059|Unavailable authentication scheme: ecdsa_secp384r1_sha384 javax.net.ssl|ALL|21|https-jsse-nio-8443-exec-1|2019-11-18 12:44:36.637 IST|X509Authentication.java:241|No X.509 cert selected for EC javax.net.ssl|WARNING|21|https-jsse-nio-8443-exec-1|2019-11-18 12:44:36.638 IST|CertificateMessage.java:1059|Unavailable authentication scheme: ecdsa_secp512r1_sha512 javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 12:44:36.638 IST|StatusResponseManager.java:763|Staping disabled or is a resumed session javax.net.ssl|ALL|21|https-jsse-nio-8443-exec-1|2019-11-18 12:44:36.638 IST|CertStatusExtension.java:1111|Stapling is disabled for this connection javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 12:44:36.638 IST|SSLExtensions.java:235|Ignore, context unavailable extension: status_request javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 12:44:36.638 IST|CertificateMessage.java:998|Produced server Certificate message ( "Certificate": { "certificate_request_context": "", "certificate_list": [ { "certificate" : { "version" : "v3", "serial number" : "3B FD 86 4A 58 09 72 F6", "signature algorithm": "SHA512withRSA", "issuer" : "CN=localhost", "not before" : "2019-11-05 13:41:52.000 IST", "not after" : "2020-11-05 13:41:52.000 IST", "subject" : "CN=localhost", "subject public key" : "RSA", "extensions" : [ { ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:false PathLen:2147483647 ] }, { ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_Encipherment Data_Encipherment ] } ]} "extensions": { } }, ] } ) javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 12:44:36.649 IST|CertificateVerify.java:1080|Produced server CertificateVerify handshake message ( "CertificateVerify": { "signature algorithm": rsa_pss_rsae_sha256 "signature": { 0000: 86 29 02 57 6A F6 99 16 8F 61 41 CC 6A 0E 31 15 .).Wj....aA.j.1. 0010: 27 89 39 7D 8F 37 CA D1 EC 36 77 C2 FC C1 A5 70 '.9..7...6w....p 0020: 71 11 DA F7 98 DF 01 A2 99 82 C2 42 51 B9 69 2C q..........BQ.i, 0030: 64 B6 C7 5D 19 36 C8 01 D3 8E EA 85 11 96 03 1B d..].6.......... 0040: 9D 0D 16 10 A4 98 D4 E8 1E 29 35 84 94 00 07 75 .........)5....u 0050: 31 4C C3 4E B0 F2 46 43 AD B8 39 0F 0D EC 99 F0 1L.N..FC..9..... 0060: D9 5C 5E 6D 7D AA 42 13 80 7A 29 12 14 19 07 CD .\^m..B..z)..... 0070: A6 BA 03 87 72 9B BE 55 59 7B 72 7B EE ED 41 C6 ....r..UY.r...A. 0080: E0 1D B9 0C EB 27 50 34 14 B6 F7 A0 03 C7 8D 5C .....'P4.......\ 0090: A5 33 DB 7D 2E 83 EC 5C 92 A3 F6 B1 D2 26 4B BF .3.....\.....&K. 00A0: C8 63 9A F4 BC 43 D4 B4 67 71 C2 9A F2 9B 61 33 .c...C..gq....a3 00B0: 87 8A C5 23 48 E3 B4 1B C0 55 2C F0 53 E7 BA 1C ...#H....U,.S... 00C0: 22 F1 D4 D3 9F AD E6 E2 4D F3 D1 FE 73 6A 14 21 ".......M...sj.! 00D0: 10 4E A5 66 11 EB 20 9A 1F 9E 25 40 1F EA 2C 83 .N.f.. ...%@..,. 00E0: 03 36 4D 85 95 40 CF E9 81 E3 BA C1 B2 33 65 F3 .6M..@.......3e. 00F0: 94 5C B9 C2 2F E6 CA B0 3F 8D 4E AA 3E 2A E3 0F .\../...?.N.>*.. } } ) javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 12:44:36.650 IST|Finished.java:745|Produced server Finished handshake message ( "Finished": { "verify data": { 0000: DD 39 FF FE 88 A3 BB E6 89 57 B6 90 B7 91 6C 3B .9.......W....l; 0010: 3B 23 F0 A3 27 A2 56 4F 8B 7B 02 8D FC A7 F7 68 ;#..'.VO.......h }'} ) javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 12:44:36.651 IST|SSLCipher.java:1978|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE countdown value = 137438953472 javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 12:44:36.669 IST|ChangeCipherSpec.java:232|Consuming ChangeCipherSpec message javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 12:44:36.671 IST|CertificateMessage.java:1154|Consuming client Certificate handshake message ( "Certificate": { "certificate_request_context": "", "certificate_list": [ { "certificate" : { "version" : "v3", "serial number" : "2C 8B E3 32 BC 02 24 C0", "signature algorithm": "SHA512withRSA", "issuer" : "CN=client", "not before" : "2019-11-05 13:43:21.000 IST", "not after" : "2020-11-05 13:43:21.000 IST", "subject" : "CN=client", "subject public key" : "RSA", "extensions" : [ { ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:false PathLen:2147483647 ] }, { ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_Encipherment Data_Encipherment ] } ]} "extensions": { } }, ] } ) javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 12:44:36.672 IST|CertificateVerify.java:1128|Consuming CertificateVerify handshake message ( "CertificateVerify": { "signature algorithm": rsa_pss_rsae_sha256 "signature": { 0000: 8A E8 83 A3 2B C4 85 F1 0D 5B 17 FF 8F CC 2D BE ....+....[....-. 0010: A8 14 B6 0A 88 06 BB 5D D8 6A 81 92 3F C4 C5 C5 .......].j..?... 0020: AE 7B F1 97 7D F6 68 D0 DF 0D BB D4 2A 99 74 0B ......h.....*.t. 0030: 0D B7 DA 19 86 6F 05 FC C5 0E C6 87 62 C1 2A 09 .....o......b.*. 0040: 49 23 B1 56 C0 E6 50 D8 3E 29 8A 61 7A 8F 21 AE I#.V..P.>).az.!. 0050: F3 82 CA 30 B8 3F B7 2D 56 E9 13 3D 54 69 78 D7 ...0.?.-V..=Tix. 0060: 7E 3C 71 4A A1 CE E4 0B 28 39 7E 98 E9 0A 6A 46 . }, "renegotiation_info (65,281)": { "renegotiated connection": [] }, "supported_groups (10)": { "versions": [x25519, secp256r1, secp384r1, secp521r1, ffdhe2048, ffdhe3072] }, "ec_point_formats (11)": { "formats": [uncompressed] }, "application_layer_protocol_negotiation (16)": { [h2, http/1.1] }, "status_request (5)": { "certificate status type": ocsp "OCSP status request": { "responder_id": "request extensions": { } } }, "key_share (51)": { "client_shares": [ { "named group": x25519 "key_exchange": { 0000: 5D EE EC 02 37 CC C1 33 49 11 1F 9F 76 48 05 CE ]...7..3I...vH.. 0010: 99 12 BF D1 CA B6 72 32 9D B7 BD 32 39 FF 78 5D ......r2...29.x] } }, { "named group": secp256r1 "key_exchange": { 0000: 04 37 98 D5 20 23 D5 E7 81 8F 40 14 19 37 6F 63 .7.. #....@..7oc 0010: 30 01 BF 50 00 B8 4D 4A 93 6C 6E F0 49 4C CC F3 0..P..MJ.ln.IL.. 0020: 52 42 5A A6 4E 76 E1 D3 FB F5 EC 4F 46 D1 EF 11 RBZ.Nv.....OF... 0030: AA 42 7C 4F 57 E0 1C 9D C3 EE E0 76 1E AC 8D 04 .B.OW......v.... 0040: 7A } }, ] }, "supported_versions (43)": { "versions": [TLSv1.3, TLSv1.2, TLSv1.1, TLSv1] }, "signature_algorithms (13)": { "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp512r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1] } ] } ) javax.net.ssl|DEBUG|25|https-jsse-nio-8443-exec-5|2019-11-18 12:44:36.688 IST|SSLExtensions.java:167|Consumed extension: supported_versions javax.net.ssl|DEBUG|25|https-jsse-nio-8443-exec-5|2019-11-18 12:44:36.688 IST|ClientHello.java:836|Negotiated protocol version: TLSv1.3 javax.net.ssl|DEBUG|25|https-jsse-nio-8443-exec-5|2019-11-18 12:44:36.688 IST|PskKeyExchangeModesExtension.java:294|abort session resumption, no supported psk_dhe_ke PSK key exchange mode javax.net.ssl|DEBUG|25|https-jsse-nio-8443-exec-5|2019-11-18 12:44:36.688 IST|PreSharedKeyExtension.java:783|Handling pre_shared_key absence. javax.net.ssl|DEBUG|25|https-jsse-nio-8443-exec-5|2019-11-18 12:44:36.689 IST|ServerNameExtension.java:322|no server name matchers, ignore server name indication javax.net.ssl|DEBUG|25|https-jsse-nio-8443-exec-5|2019-11-18 12:44:36.689 IST|SSLExtensions.java:167|Consumed extension: server_name javax.net.ssl|DEBUG|25|https-jsse-nio-8443-exec-5|2019-11-18 12:44:36.689 IST|SSLExtensions.java:148|Ignore unavailable extension: max_fragment_length javax.net.ssl|DEBUG|25|https-jsse-nio-8443-exec-5|2019-11-18 12:44:36.689 IST|SSLExtensions.java:167|Consumed extension: status_request javax.net.ssl|DEBUG|25|https-jsse-nio-8443-exec-5|2019-11-18 12:44:36.689 IST|SSLExtensions.java:167|Consumed extension: supported_groups javax.net.ssl|DEBUG|25|https-jsse-nio-8443-exec-5|2019-11-18 12:44:36.690 IST|SSLExtensions.java:138|Ignore unsupported extension: ec_point_formats javax.net.ssl|DEBUG|25|https-jsse-nio-8443-exec-5|2019-11-18 12:44:36.690 IST|SSLExtensions.java:167|Consumed extension: signature_algorithms javax.net.ssl|DEBUG|25|https-jsse-nio-8443-exec-5|2019-11-18 12:44:36.690 IST|SSLExtensions.java:148|Ignore unavailable extension: signature_algorithms_cert javax.net.ssl|DEBUG|25|https-jsse-nio-8443-exec-5|2019-11-18 12:44:36.690 IST|AlpnExtension.java:274|Ignore server unenabled extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|25|https-jsse-nio-8443-exec-5|2019-11-18 12:44:36.690 IST|SSLExtensions.java:167|Consumed extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|25|https-jsse-nio-8443-exec-5|2019-11-18 12:44:36.690 IST|SSLExtensions.java:138|Ignore unsupported extension: status_request_v2 javax.net.ssl|DEBUG|25|https-jsse-nio-8443-exec-5|2019-11-18 12:44:36.690 IST|SSLExtensions.java:138|Ignore unsupported extension: extended_master_secret javax.net.ssl|DEBUG|25|https-jsse-nio-8443-exec-5|2019-11-18 12:44:36.690 IST|SSLExtensions.java:148|Ignore unavailable extension: cookie javax.net.ssl|DEBUG|25|https-jsse-nio-8443-exec-5|2019-11-18 12:44:36.691 IST|KeyShareExtension.java:350|Ignore unsupported named group: x25519 javax.net.ssl|DEBUG|25|https-jsse-nio-8443-exec-5|2019-11-18 12:44:36.691 IST|SSLExtensions.java:167|Consumed extension: key_share javax.net.ssl|DEBUG|25|https-jsse-nio-8443-exec-5|2019-11-18 12:44:36.691 IST|SSLExtensions.java:138|Ignore unsupported extension: renegotiation_info javax.net.ssl|ALL|25|https-jsse-nio-8443-exec-5|2019-11-18 12:44:36.692 IST|SignatureScheme.java:358|Ignore disabled signature sheme: rsa_md5 javax.net.ssl|WARNING|25|https-jsse-nio-8443-exec-5|2019-11-18 12:44:36.692 IST|SSLExtensions.java:190|Ignore impact of unsupported extension: server_name javax.net.ssl|DEBUG|25|https-jsse-nio-8443-exec-5|2019-11-18 12:44:36.692 IST|SSLExtensions.java:182|Ignore unavailable extension: max_fragment_length javax.net.ssl|WARNING|25|https-jsse-nio-8443-exec-5|2019-11-18 12:44:36.692 IST|SSLExtensions.java:190|Ignore impact of unsupported extension: status_request javax.net.ssl|WARNING|25|https-jsse-nio-8443-exec-5|2019-11-18 12:44:36.692 IST|SSLExtensions.java:190|Ignore impact of unsupported extension: supported_groups javax.net.ssl|DEBUG|25|https-jsse-nio-8443-exec-5|2019-11-18 12:44:36.692 IST|SSLExtensions.java:199|Populated with extension: signature_algorithms javax.net.ssl|DEBUG|25|https-jsse-nio-8443-exec-5|2019-11-18 12:44:36.693 IST|SSLExtensions.java:182|Ignore unavailable extension: signature_algorithms_cert javax.net.ssl|WARNING|25|https-jsse-nio-8443-exec-5|2019-11-18 12:44:36.693 IST|SSLExtensions.java:190|Ignore impact of unsupported extension: application_layer_protocol_negotiation javax.net.ssl|WARNING|25|https-jsse-nio-8443-exec-5|2019-11-18 12:44:36.693 IST|SSLExtensions.java:190|Ignore impact of unsupported extension: supported_versions javax.net.ssl|DEBUG|25|https-jsse-nio-8443-exec-5|2019-11-18 12:44:36.693 IST|SSLExtensions.java:182|Ignore unavailable extension: cookie javax.net.ssl|WARNING|25|https-jsse-nio-8443-exec-5|2019-11-18 12:44:36.693 IST|SSLExtensions.java:190|Ignore impact of unsupported extension: key_share javax.net.ssl|DEBUG|25|https-jsse-nio-8443-exec-5|2019-11-18 12:44:36.693 IST|SSLExtensions.java:182|Ignore unavailable extension: pre_shared_key javax.net.ssl|DEBUG|25|https-jsse-nio-8443-exec-5|2019-11-18 12:44:36.693 IST|ServerHello.java:711|use cipher suite TLS_AES_128_GCM_SHA256 javax.net.ssl|DEBUG|25|https-jsse-nio-8443-exec-5|2019-11-18 12:44:36.696 IST|SSLExtensions.java:235|Ignore, context unavailable extension: pre_shared_key javax.net.ssl|DEBUG|25|https-jsse-nio-8443-exec-5|2019-11-18 12:44:36.697 IST|ServerHello.java:580|Produced ServerHello handshake message ( "ServerHello": { "server version" : "TLSv1.2", "random" : "6F D8 68 1F 3A CD AA 04 7C 18 C1 BE 59 69 7A 2C 21 40 BB 74 0F 81 F8 A9 91 9E A3 9A 7E 3F 20 F5", "session id" : "12 9F C2 44 C8 92 26 F1 D2 BC 94 7F 2C 6F A4 44 55 80 8A E5 CD 7F F1 54 C8 44 60 16 9F A9 E5 E8", "cipher suite" : "TLS_AES_128_GCM_SHA256(0x1301)", "compression methods" : "00", "extensions" : [ "supported_versions (43)": { "selected version": [TLSv1.3] }, "key_share (51)": { "server_share": { "named group": secp256r1 "key_exchange": { 0000: 04 05 7F 97 67 86 E8 FE 75 56 60 AB BD 7A 1F 19 ....g...uV`..z.. 0010: 2A 79 1A 18 FA D6 74 1D 1E B8 E0 47 F1 92 C5 84 *y....t....G.... 0020: AB 68 6D BA 18 B7 D7 3B 8E 50 30 73 D6 FF 89 5B .hm....;.P0s...[ 0030: 35 56 5D 50 62 27 AB 0B 89 D7 12 E5 22 86 41 F5 5V]Pb'......".A. 0040: AF } }, } ] } ) javax.net.ssl|DEBUG|25|https-jsse-nio-8443-exec-5|2019-11-18 12:44:36.702 IST|SSLCipher.java:1824|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE countdown value = 137438953472 javax.net.ssl|DEBUG|25|https-jsse-nio-8443-exec-5|2019-11-18 12:44:36.703 IST|SSLCipher.java:1978|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE countdown value = 137438953472 javax.net.ssl|ALL|25|https-jsse-nio-8443-exec-5|2019-11-18 12:44:36.703 IST|ServerNameExtension.java:532|No expected server name indication response javax.net.ssl|DEBUG|25|https-jsse-nio-8443-exec-5|2019-11-18 12:44:36.703 IST|SSLExtensions.java:235|Ignore, context unavailable extension: server_name javax.net.ssl|ALL|25|https-jsse-nio-8443-exec-5|2019-11-18 12:44:36.703 IST|MaxFragExtension.java:471|Ignore unavailable max_fragment_length extension javax.net.ssl|DEBUG|25|https-jsse-nio-8443-exec-5|2019-11-18 12:44:36.703 IST|SSLExtensions.java:235|Ignore, context unavailable extension: max_fragment_length javax.net.ssl|DEBUG|25|https-jsse-nio-8443-exec-5|2019-11-18 12:44:36.704 IST|AlpnExtension.java:363|Ignore unavailable extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|25|https-jsse-nio-8443-exec-5|2019-11-18 12:44:36.704 IST|SSLExtensions.java:235|Ignore, context unavailable extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|25|https-jsse-nio-8443-exec-5|2019-11-18 12:44:36.705 IST|EncryptedExtensions.java:137|Produced EncryptedExtensions message ( "EncryptedExtensions": [ "supported_groups (10)": { "versions": [secp256r1, secp384r1, secp521r1, sect283k1, sect283r1, sect409k1, sect409r1, sect571k1, sect571r1, secp256k1, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192] } ] ) javax.net.ssl|DEBUG|25|https-jsse-nio-8443-exec-5|2019-11-18 12:44:36.705 IST|CertificateRequest.java:821|Produced CertificateRequest message ( "CertificateRequest": { "certificate_request_context": "", "extensions": [ "signature_algorithms (13)": { "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp512r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1] }, "signature_algorithms_cert (50)": { "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp512r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1] } ] } ) javax.net.ssl|ALL|25|https-jsse-nio-8443-exec-5|2019-11-18 12:44:36.705 IST|X509Authentication.java:241|No X.509 cert selected for EC javax.net.ssl|WARNING|25|https-jsse-nio-8443-exec-5|2019-11-18 12:44:36.706 IST|CertificateMessage.java:1059|Unavailable authentication scheme: ecdsa_secp256r1_sha256 javax.net.ssl|ALL|25|https-jsse-nio-8443-exec-5|2019-11-18 12:44:36.706 IST|X509Authentication.java:241|No X.509 cert selected for EC javax.net.ssl|WARNING|25|https-jsse-nio-8443-exec-5|2019-11-18 12:44:36.706 IST|CertificateMessage.java:1059|Unavailable authentication scheme: ecdsa_secp384r1_sha384 javax.net.ssl|ALL|25|https-jsse-nio-8443-exec-5|2019-11-18 12:44:36.706 IST|X509Authentication.java:241|No X.509 cert selected for EC javax.net.ssl|WARNING|25|https-jsse-nio-8443-exec-5|2019-11-18 12:44:36.706 IST|CertificateMessage.java:1059|Unavailable authentication scheme: ecdsa_secp512r1_sha512 javax.net.ssl|DEBUG|25|https-jsse-nio-8443-exec-5|2019-11-18 12:44:36.706 IST|StatusResponseManager.java:763|Staping disabled or is a resumed session javax.net.ssl|ALL|25|https-jsse-nio-8443-exec-5|2019-11-18 12:44:36.706 IST|CertStatusExtension.java:1111|Stapling is disabled for this connection javax.net.ssl|DEBUG|25|https-jsse-nio-8443-exec-5|2019-11-18 12:44:36.706 IST|SSLExtensions.java:235|Ignore, context unavailable extension: status_request javax.net.ssl|DEBUG|25|https-jsse-nio-8443-exec-5|2019-11-18 12:44:36.707 IST|CertificateMessage.java:998|Produced server Certificate message ( "Certificate": { "certificate_request_context": "", "certificate_list": [ { "certificate" : { "version" : "v3", "serial number" : "3B FD 86 4A 58 09 72 F6", "signature algorithm": "SHA512withRSA", "issuer" : "CN=localhost", "not before" : "2019-11-05 13:41:52.000 IST", "not after" : "2020-11-05 13:41:52.000 IST", "subject" : "CN=localhost", "subject public key" : "RSA", "extensions" : [ { ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:false PathLen:2147483647 ] }, { ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_Encipherment Data_Encipherment ] } ]} "extensions": { } }, ] } ) javax.net.ssl|DEBUG|25|https-jsse-nio-8443-exec-5|2019-11-18 12:44:36.720 IST|CertificateVerify.java:1080|Produced server CertificateVerify handshake message ( "CertificateVerify": { "signature algorithm": rsa_pss_rsae_sha256 "signature": { 0000: 44 8D EB EF CF 6A E7 75 27 94 4A 20 DC E9 8B F8 D....j.u'.J .... 0010: 6B 38 BF 76 1E 73 D6 03 20 A4 5A 93 C3 EA A6 9C k8.v.s.. .Z..... 0020: 6D 4A 84 5A 69 5B 48 F5 76 0B A3 1F 5D 90 D4 DB mJ.Zi[H.v...]... 0030: B9 DE 19 D1 E4 D4 4B 8B 27 90 3A 59 B5 17 8B 55 ......K.'.:Y...U 0040: A6 09 2F D2 34 81 7F A6 A6 5B 0D 08 0E F6 E3 A9 ../.4....[...... 0050: 01 97 1A 34 BB 06 DA AF FE E2 79 8A 2A 28 65 BD ...4......y.*(e. 0060: FD 0C 1E C1 56 B3 C2 DB 94 35 2B E4 AB 26 F6 04 ....V....5+..&.. 0070: F9 94 C7 4D 97 F2 4E 52 48 B3 B4 59 E4 46 B5 CB ...M..NRH..Y.F.. 0080: 4C 58 59 35 3F 4F CF 7C F0 77 3B AB C8 3A 34 A3 LXY5?O...w;..:4. 0090: 89 DE FF 78 B1 05 34 01 17 5C 68 02 CE 86 94 E8 ...x..4..\h..... 00A0: 55 E7 F4 86 BC 13 CA 8C D9 B3 E0 22 AE EF 02 D1 U..........".... 00B0: FA 56 33 F1 92 21 8B AF 5B A4 95 3F FC 40 F5 51 .V3..!..[..?.@.Q 00C0: E1 78 C4 58 E6 0F 68 AA 3D 3E 9E 9B 34 39 10 7B .x.X..h.=>..49.. 00D0: 3A 4A A9 7F 91 3C DF 29 95 D3 26 32 72 F0 D7 02 :J...<.)..&2r... 00E0: E2 2F AF 14 FC 5D CB 0F BC F4 8E 83 E9 E8 D1 67 ./...].........g 00F0: 57 CC 4A 82 0E 0C 04 A6 74 37 66 77 9E D7 7A 2F W.J.....t7fw..z/ } } ) javax.net.ssl|DEBUG|25|https-jsse-nio-8443-exec-5|2019-11-18 12:44:36.720 IST|Finished.java:745|Produced server Finished handshake message ( "Finished": { "verify data": { 0000: E7 3B 8B 68 03 29 A2 8B 8A 43 27 3C 9F F2 BA 7C .;.h.)...C'<.... 0010: 68 94 31 E3 24 03 9F 74 91 9E 2E 68 63 72 FD B2 h.1.$..t...hcr.. }'} ) javax.net.ssl|DEBUG|25|https-jsse-nio-8443-exec-5|2019-11-18 12:44:36.721 IST|SSLCipher.java:1978|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE countdown value = 137438953472 javax.net.ssl|DEBUG|28|https-jsse-nio-8443-exec-8|2019-11-18 12:44:36.740 IST|ChangeCipherSpec.java:232|Consuming ChangeCipherSpec message javax.net.ssl|DEBUG|28|https-jsse-nio-8443-exec-8|2019-11-18 12:44:36.743 IST|CertificateMessage.java:1154|Consuming client Certificate handshake message ( "Certificate": { "certificate_request_context": "", "certificate_list": [ { "certificate" : { "version" : "v3", "serial number" : "2C 8B E3 32 BC 02 24 C0", "signature algorithm": "SHA512withRSA", "issuer" : "CN=client", "not before" : "2019-11-05 13:43:21.000 IST", "not after" : "2020-11-05 13:43:21.000 IST", "subject" : "CN=client", "subject public key" : "RSA", "extensions" : [ { ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:false PathLen:2147483647 ] }, { ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_Encipherment Data_Encipherment ] } ]} "extensions": { } }, ] } ) javax.net.ssl|DEBUG|28|https-jsse-nio-8443-exec-8|2019-11-18 12:44:36.745 IST|CertificateVerify.java:1128|Consuming CertificateVerify handshake message ( "CertificateVerify": { "signature algorithm": rsa_pss_rsae_sha256 "signature": { 0000: 39 46 FF 42 08 B3 A5 E6 76 59 24 8F 76 81 51 3F 9F.B....vY$.v.Q? 0010: 71 A1 63 2C FF A5 76 72 A6 2C 20 CD 41 CE A7 D9 q.c,..vr., .A... 0020: BF 69 7B 9F 64 47 27 FB D0 47 32 E7 20 6B 79 9A .i..dG'..G2. ky. 0030: 4B CE 21 2A A3 70 BE 67 B0 73 1D F4 B7 C7 97 B3 K.!*.p.g.s...... 0040: AD 8C 4D DA FF 72 AC 17 A1 64 9F 59 04 61 FD C0 ..M..r...d.Y.a.. 0050: 15 7B 56 D5 80 C9 61 F2 B5 77 D2 60 DA 40 4E 38 ..V...a..w.`.@N8 0060: D5 15 11 E2 AF B2 0C 56 18 B2 D4 D1 08 09 0D 1F .......V........ 0070: C5 AC 00 22 3D BF 69 79 7E E9 C4 D1 4D 5C 86 98 ..."=.iy....M\.. 0080: 99 4D FF B1 2F 83 FC 44 58 10 E2 F1 66 DF 46 D2 .M../..DX...f.F. 0090: 2B 3E BB 62 7C 2A ED 01 6D A1 70 45 BB 1B 77 6B +>.b.*..m.pE..wk 00A0: A6 E1 C2 B4 CA 40 E8 96 8F E1 C9 F0 71 93 2E 01 .....@......q... 00B0: FB 63 EE 15 24 D9 C5 89 68 0D 54 F7 32 E1 AC 16 .c..$...h.T.2... 00C0: AA AF C7 E3 2A 25 E4 5D 82 87 4C 15 44 67 3E 38 ....*%.]..L.Dg>8 00D0: B4 2F B8 A3 95 CB 67 D2 B1 78 D1 81 29 A7 41 0D ./....g..x..).A. 00E0: 9F 00 FC DF 8B 32 84 91 DB 53 8C 56 A7 BA 5A CD .....2...S.V..Z. 00F0: DF E9 2A 58 EB B6 0C 0E A0 76 5C E2 30 03 7B A7 ..*X.....v\.0... } } ) javax.net.ssl|DEBUG|28|https-jsse-nio-8443-exec-8|2019-11-18 12:44:36.746 IST|Finished.java:978|Consuming client Finished handshake message ( "Finished": { "verify data": { 0000: 56 92 C5 65 8C 27 64 59 BB B7 81 C7 A7 47 1E AA V..e.'dY.....G.. 0010: D7 21 92 6E E2 C3 03 A5 08 66 2C 5D 21 91 4C F8 .!.n.....f,]!.L. }'} ) javax.net.ssl|DEBUG|28|https-jsse-nio-8443-exec-8|2019-11-18 12:44:36.746 IST|SSLCipher.java:1824|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE countdown value = 137438953472 javax.net.ssl|DEBUG|28|https-jsse-nio-8443-exec-8|2019-11-18 12:44:36.746 IST|Finished.java:1070|Sending new session ticket 18-Nov-2019 12:44:36.747 FINE [https-jsse-nio-8443-exec-8] org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun Error during SSL handshake java.io.IOException: NOT_HANDSHAKING during handshake at org.apache.tomcat.util.net.SecureNioChannel.handshake(SecureNioChannel.java:193) at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1556) at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49) at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128) at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628) at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61) at java.base/java.lang.Thread.run(Thread.java:834) 18-Nov-2019 12:44:36.747 FINE [https-jsse-nio-8443-exec-8] org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper.doClose Calling [org.apache.tomcat.util.net.NioEndpoint@4db49c7f].closeSocket([org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper@6e7f656a:org.apache.tomcat.util.net.SecureNioChannel@2c9ead00:java.nio.channels.SocketChannel[connected local=/0:0:0:0:0:0:0:1:8443 remote=/0:0:0:0:0:0:0:1:63252]]) java.lang.Exception at org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper.doClose(NioEndpoint.java:1163) at org.apache.tomcat.util.net.SocketWrapperBase.close(SocketWrapperBase.java:402) at org.apache.tomcat.util.net.NioEndpoint$Poller.cancelledKey(NioEndpoint.java:665) at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1586) at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49) at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128) at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628) at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61) at java.base/java.lang.Thread.run(Thread.java:834) javax.net.ssl|ALL|28|https-jsse-nio-8443-exec-8|2019-11-18 12:44:36.747 IST|SSLEngineImpl.java:743|Closing outbound of SSLEngine javax.net.ssl|WARNING|28|https-jsse-nio-8443-exec-8|2019-11-18 12:44:36.748 IST|SSLEngineOutputRecord.java:168|outbound has closed, ignore outbound application data 18-Nov-2019 12:44:36.755 FINE [https-jsse-nio-8443-exec-9] org.apache.tomcat.util.net.SecureNioChannel.processSNI The SNI host name extracted for connection [java.nio.channels.SocketChannel[connected local=/0:0:0:0:0:0:0:1:8443 remote=/0:0:0:0:0:0:0:1:63253]] was [localhost] javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 12:44:36.756 IST|HandshakeContext.java:290|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 for TLS10 javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 12:44:36.756 IST|HandshakeContext.java:290|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 for TLS10 javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 12:44:36.756 IST|HandshakeContext.java:290|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLS10 javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 12:44:36.757 IST|HandshakeContext.java:290|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLS10 javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 12:44:36.757 IST|HandshakeContext.java:290|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 for TLS13 javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 12:44:36.757 IST|HandshakeContext.java:290|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 for TLS13 javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 12:44:36.757 IST|HandshakeContext.java:290|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLS13 javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 12:44:36.757 IST|HandshakeContext.java:290|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLS13 javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 12:44:36.757 IST|HandshakeContext.java:290|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA for TLS13 javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 12:44:36.757 IST|HandshakeContext.java:290|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA for TLS13 javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 12:44:36.757 IST|HandshakeContext.java:290|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 for TLS11 javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 12:44:36.758 IST|HandshakeContext.java:290|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 for TLS11 javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 12:44:36.758 IST|HandshakeContext.java:290|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLS11 javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 12:44:36.758 IST|HandshakeContext.java:290|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLS11 javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 12:44:36.761 IST|ClientHello.java:806|Consuming ClientHello handshake message ( "ClientHello": { "client version" : "TLSv1.2", "random" : "74 3F EF 69 9C 21 3E D3 89 51 E5 14 84 A4 D1 28 09 5E 9E 69 BD ED AA A4 7E 65 1B 94 F0 05 B9 B8", "session id" : "CE 0D FC 65 01 22 60 33 BC 0D F2 06 8A 2E FF 27 30 8E 2C 95 52 3F E9 8D 0B 70 8B 1F 0F 14 CD 85", "cipher suites" : "[TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_AES_256_GCM_SHA384(0x1302), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), UNKNOWN-CIPHER-SUITE(0xCCA9)(0xCCA9), UNKNOWN-CIPHER-SUITE(0xCCA8)(0xCCA8), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA(0xC00A), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA(0xC009), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA(0xC013), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA(0xC014), TLS_DHE_RSA_WITH_AES_128_CBC_SHA(0x0033), TLS_DHE_RSA_WITH_AES_256_CBC_SHA(0x0039), TLS_RSA_WITH_AES_128_CBC_SHA(0x002F), TLS_RSA_WITH_AES_256_CBC_SHA(0x0035), SSL_RSA_WITH_3DES_EDE_CBC_SHA(0x000A)]", "compression methods" : "00", "extensions" : [ "server_name (0)": { type=host_name (0), value=localhost }, "extended_master_secret (23)": { }, "renegotiation_info (65,281)": { "renegotiated connection": [] }, "supported_groups (10)": { "versions": [x25519, secp256r1, secp384r1, secp521r1, ffdhe2048, ffdhe3072] }, "ec_point_formats (11)": { "formats": [uncompressed] }, "application_layer_protocol_negotiation (16)": { [h2, http/1.1] }, "status_request (5)": { "certificate status type": ocsp "OCSP status request": { "responder_id": "request extensions": { } } }, "key_share (51)": { "client_shares": [ { "named group": x25519 "key_exchange": { 0000: 49 84 21 E0 87 53 55 6B 7A 3E 16 38 64 48 6F 20 I.!..SUkz>.8dHo 0010: 7C A8 38 F6 45 BA 5D 99 5D 69 98 1A D7 4F 32 4F ..8.E.].]i...O2O } }, { "named group": secp256r1 "key_exchange": { 0000: 04 80 F0 19 57 C9 53 4B FD 5D D0 D7 8D 1F D4 50 ....W.SK.].....P 0010: 7A 47 8C BC 32 E0 CD D6 C6 0E 0F 38 88 7F 34 48 zG..2......8..4H 0020: 78 C7 91 6C D9 71 95 A1 8A 22 84 A2 1A 95 C0 3C x..l.q...".....< 0030: 12 29 2A 96 7F E7 E3 27 47 AB 60 A8 B5 4D CD 98 .)*....'G.`..M.. 0040: 3A } }, ] }, "supported_versions (43)": { "versions": [TLSv1.3, TLSv1.2, TLSv1.1, TLSv1] }, "signature_algorithms (13)": { "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp512r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1] } ] } ) javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 12:44:36.761 IST|SSLExtensions.java:167|Consumed extension: supported_versions javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 12:44:36.761 IST|ClientHello.java:836|Negotiated protocol version: TLSv1.3 javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 12:44:36.761 IST|PskKeyExchangeModesExtension.java:294|abort session resumption, no supported psk_dhe_ke PSK key exchange mode javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 12:44:36.761 IST|PreSharedKeyExtension.java:783|Handling pre_shared_key absence. javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 12:44:36.762 IST|ServerNameExtension.java:322|no server name matchers, ignore server name indication javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 12:44:36.762 IST|SSLExtensions.java:167|Consumed extension: server_name javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 12:44:36.762 IST|SSLExtensions.java:148|Ignore unavailable extension: max_fragment_length javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 12:44:36.762 IST|SSLExtensions.java:167|Consumed extension: status_request javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 12:44:36.762 IST|SSLExtensions.java:167|Consumed extension: supported_groups javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 12:44:36.762 IST|SSLExtensions.java:138|Ignore unsupported extension: ec_point_formats javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 12:44:36.762 IST|SSLExtensions.java:167|Consumed extension: signature_algorithms javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 12:44:36.762 IST|SSLExtensions.java:148|Ignore unavailable extension: signature_algorithms_cert javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 12:44:36.762 IST|AlpnExtension.java:274|Ignore server unenabled extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 12:44:36.763 IST|SSLExtensions.java:167|Consumed extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 12:44:36.763 IST|SSLExtensions.java:138|Ignore unsupported extension: status_request_v2 javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 12:44:36.763 IST|SSLExtensions.java:138|Ignore unsupported extension: extended_master_secret javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 12:44:36.763 IST|SSLExtensions.java:148|Ignore unavailable extension: cookie javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 12:44:36.763 IST|KeyShareExtension.java:350|Ignore unsupported named group: x25519 javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 12:44:36.763 IST|SSLExtensions.java:167|Consumed extension: key_share javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 12:44:36.763 IST|SSLExtensions.java:138|Ignore unsupported extension: renegotiation_info javax.net.ssl|ALL|29|https-jsse-nio-8443-exec-9|2019-11-18 12:44:36.764 IST|SignatureScheme.java:358|Ignore disabled signature sheme: rsa_md5 javax.net.ssl|WARNING|29|https-jsse-nio-8443-exec-9|2019-11-18 12:44:36.764 IST|SSLExtensions.java:190|Ignore impact of unsupported extension: server_name javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 12:44:36.764 IST|SSLExtensions.java:182|Ignore unavailable extension: max_fragment_length javax.net.ssl|WARNING|29|https-jsse-nio-8443-exec-9|2019-11-18 12:44:36.764 IST|SSLExtensions.java:190|Ignore impact of unsupported extension: status_request javax.net.ssl|WARNING|29|https-jsse-nio-8443-exec-9|2019-11-18 12:44:36.765 IST|SSLExtensions.java:190|Ignore impact of unsupported extension: supported_groups javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 12:44:36.765 IST|SSLExtensions.java:199|Populated with extension: signature_algorithms javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 12:44:36.765 IST|SSLExtensions.java:182|Ignore unavailable extension: signature_algorithms_cert javax.net.ssl|WARNING|29|https-jsse-nio-8443-exec-9|2019-11-18 12:44:36.765 IST|SSLExtensions.java:190|Ignore impact of unsupported extension: application_layer_protocol_negotiation javax.net.ssl|WARNING|29|https-jsse-nio-8443-exec-9|2019-11-18 12:44:36.765 IST|SSLExtensions.java:190|Ignore impact of unsupported extension: supported_versions javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 12:44:36.765 IST|SSLExtensions.java:182|Ignore unavailable extension: cookie javax.net.ssl|WARNING|29|https-jsse-nio-8443-exec-9|2019-11-18 12:44:36.768 IST|SSLExtensions.java:190|Ignore impact of unsupported extension: key_share javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 12:44:36.769 IST|SSLExtensions.java:182|Ignore unavailable extension: pre_shared_key javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 12:44:36.769 IST|ServerHello.java:711|use cipher suite TLS_AES_128_GCM_SHA256 javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 12:44:36.771 IST|SSLExtensions.java:235|Ignore, context unavailable extension: pre_shared_key javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 12:44:36.772 IST|ServerHello.java:580|Produced ServerHello handshake message ( "ServerHello": { "server version" : "TLSv1.2", "random" : "12 7C 71 D1 42 74 99 66 D0 7D 21 0E 30 4F 96 8A 66 48 6C 63 B6 23 38 9E 32 75 9D 65 05 F5 D9 38", "session id" : "CE 0D FC 65 01 22 60 33 BC 0D F2 06 8A 2E FF 27 30 8E 2C 95 52 3F E9 8D 0B 70 8B 1F 0F 14 CD 85", "cipher suite" : "TLS_AES_128_GCM_SHA256(0x1301)", "compression methods" : "00", "extensions" : [ "supported_versions (43)": { "selected version": [TLSv1.3] }, "key_share (51)": { "server_share": { "named group": secp256r1 "key_exchange": { 0000: 04 0C 69 3C 6E D7 CF F9 E5 BA 78 98 9F B7 37 1B ..i } }, ] } ) javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 12:44:36.796 IST|CertificateVerify.java:1080|Produced server CertificateVerify handshake message ( "CertificateVerify": { "signature algorithm": rsa_pss_rsae_sha256 "signature": { 0000: 40 9B 39 84 D6 21 B9 C0 BC 65 6D 21 9F B4 F9 40 @.9..!...em!...@ 0010: D5 A5 CD C9 E8 CB CE 98 FC B3 15 F6 1B 1C 0A 50 ...............P 0020: 18 43 D2 04 0A 69 BD 13 76 CB 53 B6 DB 10 A4 B4 .C...i..v.S..... 0030: C6 93 20 44 C3 78 DF A1 58 5D F2 D5 5C A7 2F 10 .. D.x..X]..\./. 0040: A5 59 19 48 10 09 15 48 EA 6C 7F 11 56 A4 AE FC .Y.H...H.l..V... 0050: 83 CF F7 38 03 12 EA 17 9E 89 8B AD F3 91 22 EE ...8..........". 0060: 5A 15 B0 76 B4 69 43 06 FE 8C A3 85 8B 2D C9 A9 Z..v.iC......-.. 0070: 19 99 B2 90 1A 2D D4 98 49 A2 56 79 72 27 4C 9D .....-..I.Vyr'L. 0080: DD 07 BD 8E 4D 05 BD 97 25 CE 0F 89 AF 00 CC 09 ....M...%....... 0090: 23 D7 11 17 72 35 76 DE 07 58 01 92 50 1B D4 90 #...r5v..X..P... 00A0: 79 DD 03 A7 4A 3D A1 1E 0D E9 4D 80 90 A2 B0 01 y...J=....M..... 00B0: 8D 6A BC 37 51 72 BC 14 86 75 4A 7B AF 52 C5 0E .j.7Qr...uJ..R.. 00C0: C9 27 6F 05 7B EF 8A 91 8F 49 75 22 39 E9 53 6D .'o......Iu"9.Sm 00D0: A2 D0 10 EA 81 80 D9 40 B8 DB 6C 18 C3 FB A2 B9 .......@..l..... 00E0: E5 48 7D FB BE DB D3 68 6E 4B B8 B5 6C 98 A5 99 .H.....hnK..l... 00F0: E7 47 B1 3F 59 06 8F 01 C1 04 84 02 A6 75 A4 48 .G.?Y........u.H } } ) javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 12:44:36.797 IST|Finished.java:745|Produced server Finished handshake message ( "Finished": { "verify data": { 0000: 62 7E D4 04 E2 34 B1 C3 7E E9 6D D8 2C 8D 43 15 b....4....m.,.C. 0010: A0 F5 37 3E 3E F5 29 8E 73 F3 82 F0 45 8C B6 18 ..7>>.).s...E... }'} ) javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 12:44:36.798 IST|SSLCipher.java:1978|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE countdown value = 137438953472 javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 12:44:36.826 IST|ChangeCipherSpec.java:232|Consuming ChangeCipherSpec message javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 12:44:36.828 IST|CertificateMessage.java:1154|Consuming client Certificate handshake message ( "Certificate": { "certificate_request_context": "", "certificate_list": [ { "certificate" : { "version" : "v3", "serial number" : "2C 8B E3 32 BC 02 24 C0", "signature algorithm": "SHA512withRSA", "issuer" : "CN=client", "not before" : "2019-11-05 13:43:21.000 IST", "not after" : "2020-11-05 13:43:21.000 IST", "subject" : "CN=client", "subject public key" : "RSA", "extensions" : [ { ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:false PathLen:2147483647 ] }, { ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_Encipherment Data_Encipherment ] } ]} "extensions": { } }, ] } ) javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 12:44:36.833 IST|CertificateVerify.java:1128|Consuming CertificateVerify handshake message ( "CertificateVerify": { "signature algorithm": rsa_pss_rsae_sha256 "signature": { 0000: BE 69 C2 0B 4E D8 B8 48 C0 6A 6D 88 84 AD A6 85 .i..N..H.jm..... 0010: ED FE BA F3 DA F0 2A 93 D6 CB 0F 4B ED E2 BE 71 ......*....K...q 0020: B3 E6 D7 CD 0B 3C D7 0F 94 7D 69 B8 51 34 98 0E .....<....i.Q4.. 0030: B3 90 37 F5 1B 00 92 5D ED 0A 74 45 DD FD 96 C8 ..7....]..tE.... 0040: 7E 13 E9 58 FB 08 51 EB 7C 29 A1 37 C0 03 4C 72 ...X..Q..).7..Lr 0050: 2D 45 BB 2D B0 B7 AD CB B6 DF 38 D5 56 FF 5D 66 -E.-......8.V.]f 0060: 2E 84 3C 8B 02 47 61 8F 47 B2 6A DB 34 50 44 A3 ..<..Ga.G.j.4PD. 0070: 8E AB A6 89 AE B3 B1 B3 19 7E 8A C1 65 A4 D6 AF ............e... 0080: 8E 47 29 E6 28 57 14 0E 32 B4 9F E4 EC 21 12 A8 .G).(W..2....!.. 0090: 0A 01 8E ED 50 B8 45 CA B5 6B 6F BD 91 D9 E5 79 ....P.E..ko....y 00A0: D1 85 F3 D6 04 25 9F 4C 82 AE 97 CF A3 B4 F2 5B .....%.L.......[ 00B0: 1A C7 0F 46 00 3B F6 33 87 99 9B 85 31 68 75 77 ...F.;.3....1huw 00C0: 45 1E DF B2 B1 39 35 72 4A 23 1C E1 C7 F0 5B 12 E....95rJ#....[. 00D0: 78 83 71 8C 49 E7 71 B6 00 1A C2 BA 88 F1 B6 13 x.q.I.q......... 00E0: D9 E8 A6 46 18 67 68 0C 9F AD 71 9C EC A4 3B 03 ...F.gh...q...;. 00F0: A6 B9 08 7D 36 98 B0 90 22 06 F8 9E E9 D3 8A AA ....6..."....... } } ) javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 12:44:36.833 IST|Finished.java:978|Consuming client Finished handshake message ( "Finished": { "verify data": { 0000: 91 F5 A1 ED 2A 1F 8A 56 1C 8D FB 76 F2 40 FD D0 ....*..V...v.@.. 0010: ED 4E 3E 80 43 46 75 5E 4D 43 41 F6 E0 FD 86 E1 .N>.CFu^MCA..... }'} ) javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 12:44:36.834 IST|SSLCipher.java:1824|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE countdown value = 137438953472 javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 12:44:36.834 IST|Finished.java:1070|Sending new session ticket 18-Nov-2019 12:44:36.834 FINE [https-jsse-nio-8443-exec-2] org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun Error during SSL handshake java.io.IOException: NOT_HANDSHAKING during handshake at org.apache.tomcat.util.net.SecureNioChannel.handshake(SecureNioChannel.java:193) at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1556) at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49) at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128) at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628) at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61) at java.base/java.lang.Thread.run(Thread.java:834) 18-Nov-2019 12:44:36.835 FINE [https-jsse-nio-8443-exec-2] org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper.doClose Calling [org.apache.tomcat.util.net.NioEndpoint@4db49c7f].closeSocket([org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper@f60c7f3:org.apache.tomcat.util.net.SecureNioChannel@1e573506:java.nio.channels.SocketChannel[connected local=/0:0:0:0:0:0:0:1:8443 remote=/0:0:0:0:0:0:0:1:63253]]) java.lang.Exception at org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper.doClose(NioEndpoint.java:1163) at org.apache.tomcat.util.net.SocketWrapperBase.close(SocketWrapperBase.java:402) at org.apache.tomcat.util.net.NioEndpoint$Poller.cancelledKey(NioEndpoint.java:665) at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1586) at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49) at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128) at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628) at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61) at java.base/java.lang.Thread.run(Thread.java:834) javax.net.ssl|ALL|22|https-jsse-nio-8443-exec-2|2019-11-18 12:44:36.835 IST|SSLEngineImpl.java:743|Closing outbound of SSLEngine javax.net.ssl|WARNING|22|https-jsse-nio-8443-exec-2|2019-11-18 12:44:36.838 IST|SSLEngineOutputRecord.java:168|outbound has closed, ignore outbound application data 18-Nov-2019 12:44:36.850 FINE [https-jsse-nio-8443-exec-2] org.apache.tomcat.util.net.SecureNioChannel.processSNI The SNI host name extracted for connection [java.nio.channels.SocketChannel[connected local=/0:0:0:0:0:0:0:1:8443 remote=/0:0:0:0:0:0:0:1:63254]] was [localhost] javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 12:44:36.851 IST|HandshakeContext.java:290|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 for TLS10 javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 12:44:36.851 IST|HandshakeContext.java:290|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 for TLS10 javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 12:44:36.851 IST|HandshakeContext.java:290|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLS10 javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 12:44:36.851 IST|HandshakeContext.java:290|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLS10 javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 12:44:36.851 IST|HandshakeContext.java:290|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 for TLS13 javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 12:44:36.851 IST|HandshakeContext.java:290|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 for TLS13 javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 12:44:36.851 IST|HandshakeContext.java:290|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLS13 javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 12:44:36.851 IST|HandshakeContext.java:290|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLS13 javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 12:44:36.851 IST|HandshakeContext.java:290|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA for TLS13 javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 12:44:36.852 IST|HandshakeContext.java:290|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA for TLS13 javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 12:44:36.852 IST|HandshakeContext.java:290|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 for TLS11 javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 12:44:36.852 IST|HandshakeContext.java:290|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 for TLS11 javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 12:44:36.852 IST|HandshakeContext.java:290|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLS11 javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 12:44:36.852 IST|HandshakeContext.java:290|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLS11 javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 12:44:36.855 IST|ClientHello.java:806|Consuming ClientHello handshake message ( "ClientHello": { "client version" : "TLSv1.2", "random" : "E4 EF AA 50 73 5A 51 DC 0E E7 4C 79 D7 18 0E 5B 8F BA DF 28 27 D7 62 49 66 31 ED BB 75 83 84 1B", "session id" : "3E 2D D7 27 9A F4 45 21 2F 16 62 DB B2 CA D8 33 C2 7C 5B 83 AA 81 E3 2C 92 C3 B0 6B E0 63 E7 02", "cipher suites" : "[TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_AES_256_GCM_SHA384(0x1302), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), UNKNOWN-CIPHER-SUITE(0xCCA9)(0xCCA9), UNKNOWN-CIPHER-SUITE(0xCCA8)(0xCCA8), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA(0xC00A), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA(0xC009), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA(0xC013), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA(0xC014), TLS_DHE_RSA_WITH_AES_128_CBC_SHA(0x0033), TLS_DHE_RSA_WITH_AES_256_CBC_SHA(0x0039), TLS_RSA_WITH_AES_128_CBC_SHA(0x002F), TLS_RSA_WITH_AES_256_CBC_SHA(0x0035), SSL_RSA_WITH_3DES_EDE_CBC_SHA(0x000A)]", "compression methods" : "00", "extensions" : [ "server_name (0)": { type=host_name (0), value=localhost }, "extended_master_secret (23)": { }, "renegotiation_info (65,281)": { "renegotiated connection": [] }, "supported_groups (10)": { "versions": [x25519, secp256r1, secp384r1, secp521r1, ffdhe2048, ffdhe3072] }, "ec_point_formats (11)": { "formats": [uncompressed] }, "application_layer_protocol_negotiation (16)": { [h2, http/1.1] }, "status_request (5)": { "certificate status type": ocsp "OCSP status request": { "responder_id": "request extensions": { } } }, "key_share (51)": { "client_shares": [ { "named group": x25519 "key_exchange": { 0000: B5 8C 66 91 00 CE 4E 5B 75 75 2B 4F A4 E7 3D 0A ..f...N[uu+O..=. 0010: 84 53 07 D9 7D 3F 10 AB A4 DA 5D C5 38 2C 75 19 .S...?....].8,u. } }, { "named group": secp256r1 "key_exchange": { 0000: 04 26 51 48 17 25 38 72 11 05 F8 65 54 F1 7C D0 .&QH.%8r...eT... 0010: 25 16 BA DA E5 C8 7A F5 02 5A 8B A1 0D C2 5E C1 %.....z..Z....^. 0020: AA 0B F6 90 AF C6 9B 60 7C 14 57 9C 83 10 D8 FA .......`..W..... 0030: 81 E6 3D AD 39 5F 31 8F 09 CF 5F 82 27 E8 D8 D0 ..=.9_1..._.'... 0040: 46 } }, ] }, "supported_versions (43)": { "versions": [TLSv1.3, TLSv1.2, TLSv1.1, TLSv1] }, "signature_algorithms (13)": { "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp512r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1] } ] } ) javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 12:44:36.855 IST|SSLExtensions.java:167|Consumed extension: supported_versions javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 12:44:36.855 IST|ClientHello.java:836|Negotiated protocol version: TLSv1.3 javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 12:44:36.855 IST|PskKeyExchangeModesExtension.java:294|abort session resumption, no supported psk_dhe_ke PSK key exchange mode javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 12:44:36.855 IST|PreSharedKeyExtension.java:783|Handling pre_shared_key absence. javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 12:44:36.855 IST|ServerNameExtension.java:322|no server name matchers, ignore server name indication javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 12:44:36.856 IST|SSLExtensions.java:167|Consumed extension: server_name javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 12:44:36.856 IST|SSLExtensions.java:148|Ignore unavailable extension: max_fragment_length javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 12:44:36.856 IST|SSLExtensions.java:167|Consumed extension: status_request javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 12:44:36.856 IST|SSLExtensions.java:167|Consumed extension: supported_groups javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 12:44:36.856 IST|SSLExtensions.java:138|Ignore unsupported extension: ec_point_formats javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 12:44:36.856 IST|SSLExtensions.java:167|Consumed extension: signature_algorithms javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 12:44:36.856 IST|SSLExtensions.java:148|Ignore unavailable extension: signature_algorithms_cert javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 12:44:36.856 IST|AlpnExtension.java:274|Ignore server unenabled extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 12:44:36.856 IST|SSLExtensions.java:167|Consumed extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 12:44:36.857 IST|SSLExtensions.java:138|Ignore unsupported extension: status_request_v2 javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 12:44:36.857 IST|SSLExtensions.java:138|Ignore unsupported extension: extended_master_secret javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 12:44:36.857 IST|SSLExtensions.java:148|Ignore unavailable extension: cookie javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 12:44:36.857 IST|KeyShareExtension.java:350|Ignore unsupported named group: x25519 javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 12:44:36.857 IST|SSLExtensions.java:167|Consumed extension: key_share javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 12:44:36.857 IST|SSLExtensions.java:138|Ignore unsupported extension: renegotiation_info javax.net.ssl|ALL|22|https-jsse-nio-8443-exec-2|2019-11-18 12:44:36.858 IST|SignatureScheme.java:358|Ignore disabled signature sheme: rsa_md5 javax.net.ssl|WARNING|22|https-jsse-nio-8443-exec-2|2019-11-18 12:44:36.858 IST|SSLExtensions.java:190|Ignore impact of unsupported extension: server_name javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 12:44:36.858 IST|SSLExtensions.java:182|Ignore unavailable extension: max_fragment_length javax.net.ssl|WARNING|22|https-jsse-nio-8443-exec-2|2019-11-18 12:44:36.858 IST|SSLExtensions.java:190|Ignore impact of unsupported extension: status_request javax.net.ssl|WARNING|22|https-jsse-nio-8443-exec-2|2019-11-18 12:44:36.858 IST|SSLExtensions.java:190|Ignore impact of unsupported extension: supported_groups javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 12:44:36.859 IST|SSLExtensions.java:199|Populated with extension: signature_algorithms javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 12:44:36.859 IST|SSLExtensions.java:182|Ignore unavailable extension: signature_algorithms_cert javax.net.ssl|WARNING|22|https-jsse-nio-8443-exec-2|2019-11-18 12:44:36.859 IST|SSLExtensions.java:190|Ignore impact of unsupported extension: application_layer_protocol_negotiation javax.net.ssl|WARNING|22|https-jsse-nio-8443-exec-2|2019-11-18 12:44:36.859 IST|SSLExtensions.java:190|Ignore impact of unsupported extension: supported_versions javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 12:44:36.859 IST|SSLExtensions.java:182|Ignore unavailable extension: cookie javax.net.ssl|WARNING|22|https-jsse-nio-8443-exec-2|2019-11-18 12:44:36.859 IST|SSLExtensions.java:190|Ignore impact of unsupported extension: key_share javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 12:44:36.859 IST|SSLExtensions.java:182|Ignore unavailable extension: pre_shared_key javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 12:44:36.859 IST|ServerHello.java:711|use cipher suite TLS_AES_128_GCM_SHA256 javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 12:44:36.862 IST|SSLExtensions.java:235|Ignore, context unavailable extension: pre_shared_key javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 12:44:36.862 IST|ServerHello.java:580|Produced ServerHello handshake message ( "ServerHello": { "server version" : "TLSv1.2", "random" : "F3 AB 1B 72 F8 D1 65 AB E8 21 45 B5 89 B2 05 4F 52 EB 41 4A 5D 67 4E 32 E6 79 26 9B 04 0A 3C 80", "session id" : "3E 2D D7 27 9A F4 45 21 2F 16 62 DB B2 CA D8 33 C2 7C 5B 83 AA 81 E3 2C 92 C3 B0 6B E0 63 E7 02", "cipher suite" : "TLS_AES_128_GCM_SHA256(0x1301)", "compression methods" : "00", "extensions" : [ "supported_versions (43)": { "selected version": [TLSv1.3] }, "key_share (51)": { "server_share": { "named group": secp256r1 "key_exchange": { 0000: 04 B8 74 80 11 CA 31 44 59 D1 F3 E7 82 22 91 5F ..t...1DY...."._ 0010: 9D 3B 40 7A F2 97 B4 91 4B CA 2A 90 A9 A5 68 B3 .;@z....K.*...h. 0020: B2 C5 FC DA CF ED FA FD AB 4F D6 21 FE 74 9D 0A .........O.!.t.. 0030: 37 CB E2 FD 6E AE 11 8A 4B 96 00 3D 7A 28 26 57 7...n...K..=z(&W 0040: 9A } }, } ] } ) javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 12:44:36.867 IST|SSLCipher.java:1824|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE countdown value = 137438953472 javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 12:44:36.867 IST|SSLCipher.java:1978|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE countdown value = 137438953472 javax.net.ssl|ALL|22|https-jsse-nio-8443-exec-2|2019-11-18 12:44:36.867 IST|ServerNameExtension.java:532|No expected server name indication response javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 12:44:36.868 IST|SSLExtensions.java:235|Ignore, context unavailable extension: server_name javax.net.ssl|ALL|22|https-jsse-nio-8443-exec-2|2019-11-18 12:44:36.868 IST|MaxFragExtension.java:471|Ignore unavailable max_fragment_length extension javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 12:44:36.868 IST|SSLExtensions.java:235|Ignore, context unavailable extension: max_fragment_length javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 12:44:36.868 IST|AlpnExtension.java:363|Ignore unavailable extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 12:44:36.868 IST|SSLExtensions.java:235|Ignore, context unavailable extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 12:44:36.869 IST|EncryptedExtensions.java:137|Produced EncryptedExtensions message ( "EncryptedExtensions": [ "supported_groups (10)": { "versions": [secp256r1, secp384r1, secp521r1, sect283k1, sect283r1, sect409k1, sect409r1, sect571k1, sect571r1, secp256k1, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192] } ] ) javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 12:44:36.869 IST|CertificateRequest.java:821|Produced CertificateRequest message ( "CertificateRequest": { "certificate_request_context": "", "extensions": [ "signature_algorithms (13)": { "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp512r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1] }, "signature_algorithms_cert (50)": { "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp512r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1] } ] } ) javax.net.ssl|ALL|22|https-jsse-nio-8443-exec-2|2019-11-18 12:44:36.869 IST|X509Authentication.java:241|No X.509 cert selected for EC javax.net.ssl|WARNING|22|https-jsse-nio-8443-exec-2|2019-11-18 12:44:36.869 IST|CertificateMessage.java:1059|Unavailable authentication scheme: ecdsa_secp256r1_sha256 javax.net.ssl|ALL|22|https-jsse-nio-8443-exec-2|2019-11-18 12:44:36.869 IST|X509Authentication.java:241|No X.509 cert selected for EC javax.net.ssl|WARNING|22|https-jsse-nio-8443-exec-2|2019-11-18 12:44:36.869 IST|CertificateMessage.java:1059|Unavailable authentication scheme: ecdsa_secp384r1_sha384 javax.net.ssl|ALL|22|https-jsse-nio-8443-exec-2|2019-11-18 12:44:36.870 IST|X509Authentication.java:241|No X.509 cert selected for EC javax.net.ssl|WARNING|22|https-jsse-nio-8443-exec-2|2019-11-18 12:44:36.870 IST|CertificateMessage.java:1059|Unavailable authentication scheme: ecdsa_secp512r1_sha512 javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 12:44:36.870 IST|StatusResponseManager.java:763|Staping disabled or is a resumed session javax.net.ssl|ALL|22|https-jsse-nio-8443-exec-2|2019-11-18 12:44:36.870 IST|CertStatusExtension.java:1111|Stapling is disabled for this connection javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 12:44:36.870 IST|SSLExtensions.java:235|Ignore, context unavailable extension: status_request javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 12:44:36.871 IST|CertificateMessage.java:998|Produced server Certificate message ( "Certificate": { "certificate_request_context": "", "certificate_list": [ { "certificate" : { "version" : "v3", "serial number" : "3B FD 86 4A 58 09 72 F6", "signature algorithm": "SHA512withRSA", "issuer" : "CN=localhost", "not before" : "2019-11-05 13:41:52.000 IST", "not after" : "2020-11-05 13:41:52.000 IST", "subject" : "CN=localhost", "subject public key" : "RSA", "extensions" : [ { ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:false PathLen:2147483647 ] }, { ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_Encipherment Data_Encipherment ] } ]} "extensions": { } }, ] } ) javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 12:44:36.881 IST|CertificateVerify.java:1080|Produced server CertificateVerify handshake message ( "CertificateVerify": { "signature algorithm": rsa_pss_rsae_sha256 "signature": { 0000: 25 0C 2D 92 83 6C DA EC 12 23 A7 03 E7 77 96 13 %.-..l...#...w.. 0010: A3 2D 9A BA BC BC 01 7F 64 91 08 84 AD 87 77 CA .-......d.....w. 0020: 41 2F 52 76 76 67 C0 B6 AB B5 CF BF D4 14 AC A8 A/Rvvg.......... 0030: 2B 4F 2E 9A A1 9F 2B 70 84 88 0F 08 D5 08 72 68 +O....+p......rh 0040: F7 52 97 6A 09 30 61 A2 25 46 E4 53 5A 2B 9E 22 .R.j.0a.%F.SZ+." 0050: 06 A2 E4 80 7A B5 17 00 44 6C 96 C3 BC DB 62 92 ....z...Dl....b. 0060: DE 5E 52 B6 B0 7A 95 22 DE 51 D9 22 F7 3D 4D F8 .^R..z.".Q.".=M. 0070: FC 66 9E C0 74 A6 38 D3 4F CD 7D 9E 6D C2 AD B3 .f..t.8.O...m... 0080: 2C FD AB 00 19 D3 19 B5 F6 10 27 71 23 48 97 ED ,.........'q#H.. 0090: 78 6A 02 CB 50 22 CE C4 C9 E2 56 F3 38 72 C7 F5 xj..P"....V.8r.. 00A0: 0F D5 51 62 CC 61 D6 59 BF 1F 9F 7B 44 9E 7C 3D ..Qb.a.Y....D..= 00B0: 73 8C 52 08 C6 24 CE 9F 48 87 26 5A F3 A8 C1 9B s.R..$..H.&Z.... 00C0: 81 E4 AC 52 F6 90 5F 16 46 E2 4C A4 7D EB 57 CC ...R.._.F.L...W. 00D0: 9D A4 AA 8C EB 9B 23 2B 41 B5 05 42 A8 4D 2C 4B ......#+A..B.M,K 00E0: D5 45 87 9D 2F 15 66 49 04 BD 69 6D B3 E6 08 8A .E../.fI..im.... 00F0: 4B 2B F5 0E 30 E5 99 CA 58 A3 9E CE 9D A6 B3 48 K+..0...X......H } } ) javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 12:44:36.882 IST|Finished.java:745|Produced server Finished handshake message ( "Finished": { "verify data": { 0000: C4 17 45 EB 3A 0D D0 45 F0 E5 2D A5 63 91 25 02 ..E.:..E..-.c.%. 0010: 7B 1D B6 BE 7C 9A AB 96 13 F7 FF BC 39 DE 0F 00 ............9... }'} ) javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 12:44:36.884 IST|SSLCipher.java:1978|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE countdown value = 137438953472 javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 12:44:36.904 IST|ChangeCipherSpec.java:232|Consuming ChangeCipherSpec message javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 12:44:36.905 IST|CertificateMessage.java:1154|Consuming client Certificate handshake message ( "Certificate": { "certificate_request_context": "", "certificate_list": [ { "certificate" : { "version" : "v3", "serial number" : "2C 8B E3 32 BC 02 24 C0", "signature algorithm": "SHA512withRSA", "issuer" : "CN=client", "not before" : "2019-11-05 13:43:21.000 IST", "not after" : "2020-11-05 13:43:21.000 IST", "subject" : "CN=client", "subject public key" : "RSA", "extensions" : [ { ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:false PathLen:2147483647 ] }, { ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_Encipherment Data_Encipherment ] } ]} "extensions": { } }, ] } ) javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 12:44:36.911 IST|CertificateVerify.java:1128|Consuming CertificateVerify handshake message ( "CertificateVerify": { "signature algorithm": rsa_pss_rsae_sha256 "signature": { 0000: 6C 7C A4 B5 FE 5D 32 91 71 49 48 0F 23 A2 50 19 l....]2.qIH.#.P. 0010: 4C F5 57 4E 1A 12 12 61 0B 16 7F A9 B5 17 67 2E L.WN...a......g. 0020: 65 FD E6 0C 55 29 A5 CF E3 06 F0 33 72 40 09 24 e...U).....3r@.$ 0030: FD B3 1A 33 72 F2 9C 8A D2 C2 27 5F A0 C7 8F 0B ...3r.....'_.... 0040: AE A9 27 60 16 ED 0F E4 B1 E9 D1 D4 A8 54 C6 68 ..'`.........T.h 0050: 57 9A 51 28 93 46 31 71 FE B0 22 EB 23 96 18 78 W.Q(.F1q..".#..x 0060: DC 2F BF 99 B7 05 67 AA 29 E4 12 47 75 3D 5F F3 ./....g.)..Gu=_. 0070: CA C4 DE A0 80 80 BD 4B 03 FF CA DB 57 E2 7D 54 .......K....W..T 0080: DE 29 5C FA AC 40 4D 5C 89 D3 10 FC 05 8C 4C 9A .)\..@M\......L. 0090: A4 F2 D6 92 06 DE CF B9 93 E8 56 CC 81 87 6E 03 ..........V...n. 00A0: 62 2E AA 5E E5 8D 54 23 89 26 29 34 61 40 C5 62 b..^..T#.&)4a@.b 00B0: 3C 19 7F B2 23 B2 0D A4 94 ED 0C B8 8F C3 9B FF <...#........... 00C0: DA 74 2F 29 DD 1D 90 65 F5 95 8B A1 D0 98 9B ED .t/)...e........ 00D0: C7 85 25 E3 C9 D8 DF BA 6D 03 E8 0C BE 71 2F 64 ..%.....m....q/d 00E0: BC 36 36 D9 B6 32 D4 63 60 71 7E 4E E1 1F 0D 53 .66..2.c`q.N...S 00F0: AF 43 4F E9 69 29 4D 44 1C 99 E9 5D 98 C2 2E E4 .CO.i)MD...].... } } ) javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 12:44:36.911 IST|Finished.java:978|Consuming client Finished handshake message ( "Finished": { "verify data": { 0000: 80 3E 61 C5 70 88 E7 67 3D AE 3E 76 22 C6 E1 EE .>a.p..g=.>v"... 0010: DF 2D 84 6F 30 0A 71 CB F1 A0 2C 7C 99 74 D9 A4 .-.o0.q...,..t.. }'} ) javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 12:44:36.912 IST|SSLCipher.java:1824|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE countdown value = 137438953472 javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 12:44:36.912 IST|Finished.java:1070|Sending new session ticket 18-Nov-2019 12:44:36.912 FINE [https-jsse-nio-8443-exec-6] org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun Error during SSL handshake java.io.IOException: NOT_HANDSHAKING during handshake at org.apache.tomcat.util.net.SecureNioChannel.handshake(SecureNioChannel.java:193) at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1556) at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49) at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128) at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628) at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61) at java.base/java.lang.Thread.run(Thread.java:834) 18-Nov-2019 12:44:36.913 FINE [https-jsse-nio-8443-exec-6] org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper.doClose Calling [org.apache.tomcat.util.net.NioEndpoint@4db49c7f].closeSocket([org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper@78127297:org.apache.tomcat.util.net.SecureNioChannel@2c9ead00:java.nio.channels.SocketChannel[connected local=/0:0:0:0:0:0:0:1:8443 remote=/0:0:0:0:0:0:0:1:63254]]) java.lang.Exception at org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper.doClose(NioEndpoint.java:1163) at org.apache.tomcat.util.net.SocketWrapperBase.close(SocketWrapperBase.java:402) at org.apache.tomcat.util.net.NioEndpoint$Poller.cancelledKey(NioEndpoint.java:665) at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1586) at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49) at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128) at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628) at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61) at java.base/java.lang.Thread.run(Thread.java:834) javax.net.ssl|ALL|26|https-jsse-nio-8443-exec-6|2019-11-18 12:44:36.913 IST|SSLEngineImpl.java:743|Closing outbound of SSLEngine javax.net.ssl|WARNING|26|https-jsse-nio-8443-exec-6|2019-11-18 12:44:36.915 IST|SSLEngineOutputRecord.java:168|outbound has closed, ignore outbound application data 18-Nov-2019 12:44:36.922 FINE [https-jsse-nio-8443-exec-7] org.apache.tomcat.util.net.SecureNioChannel.processSNI The SNI host name extracted for connection [java.nio.channels.SocketChannel[connected local=/0:0:0:0:0:0:0:1:8443 remote=/0:0:0:0:0:0:0:1:63255]] was [localhost] javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 12:44:36.922 IST|HandshakeContext.java:290|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 for TLS10 javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 12:44:36.923 IST|HandshakeContext.java:290|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 for TLS10 javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 12:44:36.923 IST|HandshakeContext.java:290|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLS10 javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 12:44:36.923 IST|HandshakeContext.java:290|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLS10 javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 12:44:36.923 IST|HandshakeContext.java:290|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 for TLS13 javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 12:44:36.923 IST|HandshakeContext.java:290|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 for TLS13 javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 12:44:36.923 IST|HandshakeContext.java:290|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLS13 javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 12:44:36.923 IST|HandshakeContext.java:290|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLS13 javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 12:44:36.923 IST|HandshakeContext.java:290|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA for TLS13 javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 12:44:36.923 IST|HandshakeContext.java:290|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA for TLS13 javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 12:44:36.923 IST|HandshakeContext.java:290|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 for TLS11 javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 12:44:36.923 IST|HandshakeContext.java:290|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 for TLS11 javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 12:44:36.924 IST|HandshakeContext.java:290|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLS11 javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 12:44:36.924 IST|HandshakeContext.java:290|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLS11 javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 12:44:36.926 IST|ClientHello.java:806|Consuming ClientHello handshake message ( "ClientHello": { "client version" : "TLSv1.2", "random" : "15 BB A1 43 14 E8 F4 A9 BC 7D 21 FF 56 48 69 F9 D4 BB D3 AF 03 63 1B CD DE 46 66 32 81 EC 33 B0", "session id" : "6F 2A CB 0E 22 0A FE A7 63 E0 01 00 56 9E 07 00 D4 8F 62 11 14 77 92 5F 3D 83 E9 1B 9C 88 BB 6B", "cipher suites" : "[TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_AES_256_GCM_SHA384(0x1302), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), UNKNOWN-CIPHER-SUITE(0xCCA9)(0xCCA9), UNKNOWN-CIPHER-SUITE(0xCCA8)(0xCCA8), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA(0xC00A), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA(0xC009), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA(0xC013), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA(0xC014), TLS_DHE_RSA_WITH_AES_128_CBC_SHA(0x0033), TLS_DHE_RSA_WITH_AES_256_CBC_SHA(0x0039), TLS_RSA_WITH_AES_128_CBC_SHA(0x002F), TLS_RSA_WITH_AES_256_CBC_SHA(0x0035), SSL_RSA_WITH_3DES_EDE_CBC_SHA(0x000A)]", "compression methods" : "00", "extensions" : [ "server_name (0)": { type=host_name (0), value=localhost }, "extended_master_secret (23)": { }, "renegotiation_info (65,281)": { "renegotiated connection": [] }, "supported_groups (10)": { "versions": [x25519, secp256r1, secp384r1, secp521r1, ffdhe2048, ffdhe3072] }, "ec_point_formats (11)": { "formats": [uncompressed] }, "application_layer_protocol_negotiation (16)": { [h2, http/1.1] }, "status_request (5)": { "certificate status type": ocsp "OCSP status request": { "responder_id": "request extensions": { } } }, "key_share (51)": { "client_shares": [ { "named group": x25519 "key_exchange": { 0000: FC F7 19 78 CB BC 6D 34 8D 1F B2 3D 49 26 BD 65 ...x..m4...=I&.e 0010: E6 F9 A3 85 33 9D 67 9E 7D 4C 9E C9 21 58 24 14 ....3.g..L..!X$. } }, { "named group": secp256r1 "key_exchange": { 0000: 04 A9 92 14 6B 93 74 B3 CA 74 94 16 BA CD C1 CB ....k.t..t...... 0010: F6 FE 50 41 B2 D5 20 35 AD 06 D8 13 69 91 31 1A ..PA.. 5....i.1. 0020: 8B 60 BC 75 9A 22 0C B1 EE 1F 5B 61 DE 87 93 98 .`.u."....[a.... 0030: A4 1B 8D E5 0A 7F AD 6D EE C3 3E 58 57 3B DD 35 .......m..>XW;.5 0040: D5 } }, ] }, "supported_versions (43)": { "versions": [TLSv1.3, TLSv1.2, TLSv1.1, TLSv1] }, "signature_algorithms (13)": { "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp512r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1] } ] } ) javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 12:44:36.926 IST|SSLExtensions.java:167|Consumed extension: supported_versions javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 12:44:36.926 IST|ClientHello.java:836|Negotiated protocol version: TLSv1.3 javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 12:44:36.926 IST|PskKeyExchangeModesExtension.java:294|abort session resumption, no supported psk_dhe_ke PSK key exchange mode javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 12:44:36.926 IST|PreSharedKeyExtension.java:783|Handling pre_shared_key absence. javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 12:44:36.927 IST|ServerNameExtension.java:322|no server name matchers, ignore server name indication javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 12:44:36.927 IST|SSLExtensions.java:167|Consumed extension: server_name javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 12:44:36.927 IST|SSLExtensions.java:148|Ignore unavailable extension: max_fragment_length javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 12:44:36.927 IST|SSLExtensions.java:167|Consumed extension: status_request javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 12:44:36.927 IST|SSLExtensions.java:167|Consumed extension: supported_groups javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 12:44:36.927 IST|SSLExtensions.java:138|Ignore unsupported extension: ec_point_formats javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 12:44:36.927 IST|SSLExtensions.java:167|Consumed extension: signature_algorithms javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 12:44:36.927 IST|SSLExtensions.java:148|Ignore unavailable extension: signature_algorithms_cert javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 12:44:36.928 IST|AlpnExtension.java:274|Ignore server unenabled extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 12:44:36.928 IST|SSLExtensions.java:167|Consumed extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 12:44:36.928 IST|SSLExtensions.java:138|Ignore unsupported extension: status_request_v2 javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 12:44:36.928 IST|SSLExtensions.java:138|Ignore unsupported extension: extended_master_secret javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 12:44:36.928 IST|SSLExtensions.java:148|Ignore unavailable extension: cookie javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 12:44:36.928 IST|KeyShareExtension.java:350|Ignore unsupported named group: x25519 javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 12:44:36.928 IST|SSLExtensions.java:167|Consumed extension: key_share javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 12:44:36.928 IST|SSLExtensions.java:138|Ignore unsupported extension: renegotiation_info javax.net.ssl|ALL|27|https-jsse-nio-8443-exec-7|2019-11-18 12:44:36.929 IST|SignatureScheme.java:358|Ignore disabled signature sheme: rsa_md5 javax.net.ssl|WARNING|27|https-jsse-nio-8443-exec-7|2019-11-18 12:44:36.929 IST|SSLExtensions.java:190|Ignore impact of unsupported extension: server_name javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 12:44:36.929 IST|SSLExtensions.java:182|Ignore unavailable extension: max_fragment_length javax.net.ssl|WARNING|27|https-jsse-nio-8443-exec-7|2019-11-18 12:44:36.929 IST|SSLExtensions.java:190|Ignore impact of unsupported extension: status_request javax.net.ssl|WARNING|27|https-jsse-nio-8443-exec-7|2019-11-18 12:44:36.929 IST|SSLExtensions.java:190|Ignore impact of unsupported extension: supported_groups javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 12:44:36.930 IST|SSLExtensions.java:199|Populated with extension: signature_algorithms javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 12:44:36.930 IST|SSLExtensions.java:182|Ignore unavailable extension: signature_algorithms_cert javax.net.ssl|WARNING|27|https-jsse-nio-8443-exec-7|2019-11-18 12:44:36.930 IST|SSLExtensions.java:190|Ignore impact of unsupported extension: application_layer_protocol_negotiation javax.net.ssl|WARNING|27|https-jsse-nio-8443-exec-7|2019-11-18 12:44:36.930 IST|SSLExtensions.java:190|Ignore impact of unsupported extension: supported_versions javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 12:44:36.930 IST|SSLExtensions.java:182|Ignore unavailable extension: cookie javax.net.ssl|WARNING|27|https-jsse-nio-8443-exec-7|2019-11-18 12:44:36.930 IST|SSLExtensions.java:190|Ignore impact of unsupported extension: key_share javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 12:44:36.930 IST|SSLExtensions.java:182|Ignore unavailable extension: pre_shared_key javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 12:44:36.930 IST|ServerHello.java:711|use cipher suite TLS_AES_128_GCM_SHA256 javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 12:44:36.932 IST|SSLExtensions.java:235|Ignore, context unavailable extension: pre_shared_key javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 12:44:36.933 IST|ServerHello.java:580|Produced ServerHello handshake message ( "ServerHello": { "server version" : "TLSv1.2", "random" : "7F CC F1 6A EE C0 66 7A 94 AF 85 7B FC C1 1B A4 63 F9 43 4D C8 64 C7 E5 0F 2A 32 D3 4A AC 2C C3", "session id" : "6F 2A CB 0E 22 0A FE A7 63 E0 01 00 56 9E 07 00 D4 8F 62 11 14 77 92 5F 3D 83 E9 1B 9C 88 BB 6B", "cipher suite" : "TLS_AES_128_GCM_SHA256(0x1301)", "compression methods" : "00", "extensions" : [ "supported_versions (43)": { "selected version": [TLSv1.3] }, "key_share (51)": { "server_share": { "named group": secp256r1 "key_exchange": { 0000: 04 CD A8 83 9C CB 4E D9 8F BE 72 D6 C1 39 5C ED ......N...r..9\. 0010: E4 0B 38 F0 91 75 05 24 25 F6 31 32 D6 E3 61 5E ..8..u.$%.12..a^ 0020: F0 E5 14 A9 F0 70 B1 58 03 C8 27 8E E6 B8 04 D8 .....p.X..'..... 0030: 6A 29 C4 E9 54 7F 17 C9 FE 54 20 74 37 88 92 8F j)..T....T t7... 0040: 2B } }, } ] } ) javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 12:44:36.937 IST|SSLCipher.java:1824|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE countdown value = 137438953472 javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 12:44:36.938 IST|SSLCipher.java:1978|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE countdown value = 137438953472 javax.net.ssl|ALL|27|https-jsse-nio-8443-exec-7|2019-11-18 12:44:36.938 IST|ServerNameExtension.java:532|No expected server name indication response javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 12:44:36.938 IST|SSLExtensions.java:235|Ignore, context unavailable extension: server_name javax.net.ssl|ALL|27|https-jsse-nio-8443-exec-7|2019-11-18 12:44:36.938 IST|MaxFragExtension.java:471|Ignore unavailable max_fragment_length extension javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 12:44:36.938 IST|SSLExtensions.java:235|Ignore, context unavailable extension: max_fragment_length javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 12:44:36.939 IST|AlpnExtension.java:363|Ignore unavailable extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 12:44:36.939 IST|SSLExtensions.java:235|Ignore, context unavailable extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 12:44:36.939 IST|EncryptedExtensions.java:137|Produced EncryptedExtensions message ( "EncryptedExtensions": [ "supported_groups (10)": { "versions": [secp256r1, secp384r1, secp521r1, sect283k1, sect283r1, sect409k1, sect409r1, sect571k1, sect571r1, secp256k1, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192] } ] ) javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 12:44:36.940 IST|CertificateRequest.java:821|Produced CertificateRequest message ( "CertificateRequest": { "certificate_request_context": "", "extensions": [ "signature_algorithms (13)": { "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp512r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1] }, "signature_algorithms_cert (50)": { "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp512r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1] } ] } ) javax.net.ssl|ALL|27|https-jsse-nio-8443-exec-7|2019-11-18 12:44:36.940 IST|X509Authentication.java:241|No X.509 cert selected for EC javax.net.ssl|WARNING|27|https-jsse-nio-8443-exec-7|2019-11-18 12:44:36.940 IST|CertificateMessage.java:1059|Unavailable authentication scheme: ecdsa_secp256r1_sha256 javax.net.ssl|ALL|27|https-jsse-nio-8443-exec-7|2019-11-18 12:44:36.940 IST|X509Authentication.java:241|No X.509 cert selected for EC javax.net.ssl|WARNING|27|https-jsse-nio-8443-exec-7|2019-11-18 12:44:36.940 IST|CertificateMessage.java:1059|Unavailable authentication scheme: ecdsa_secp384r1_sha384 javax.net.ssl|ALL|27|https-jsse-nio-8443-exec-7|2019-11-18 12:44:36.940 IST|X509Authentication.java:241|No X.509 cert selected for EC javax.net.ssl|WARNING|27|https-jsse-nio-8443-exec-7|2019-11-18 12:44:36.940 IST|CertificateMessage.java:1059|Unavailable authentication scheme: ecdsa_secp512r1_sha512 javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 12:44:36.940 IST|StatusResponseManager.java:763|Staping disabled or is a resumed session javax.net.ssl|ALL|27|https-jsse-nio-8443-exec-7|2019-11-18 12:44:36.940 IST|CertStatusExtension.java:1111|Stapling is disabled for this connection javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 12:44:36.940 IST|SSLExtensions.java:235|Ignore, context unavailable extension: status_request javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 12:44:36.941 IST|CertificateMessage.java:998|Produced server Certificate message ( "Certificate": { "certificate_request_context": "", "certificate_list": [ { "certificate" : { "version" : "v3", "serial number" : "3B FD 86 4A 58 09 72 F6", "signature algorithm": "SHA512withRSA", "issuer" : "CN=localhost", "not before" : "2019-11-05 13:41:52.000 IST", "not after" : "2020-11-05 13:41:52.000 IST", "subject" : "CN=localhost", "subject public key" : "RSA", "extensions" : [ { ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:false PathLen:2147483647 ] }, { ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_Encipherment Data_Encipherment ] } ]} "extensions": { } }, ] } ) javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 12:44:36.951 IST|CertificateVerify.java:1080|Produced server CertificateVerify handshake message ( "CertificateVerify": { "signature algorithm": rsa_pss_rsae_sha256 "signature": { 0000: 71 A6 D5 B0 DB AD 62 23 29 F6 A3 33 E5 60 EA 13 q.....b#)..3.`.. 0010: 23 7A 41 74 86 65 B4 0D 55 A2 83 B5 76 46 3A CF #zAt.e..U...vF:. 0020: 4A F3 56 FE 8D 07 9E 0C AB D8 C7 F4 33 40 9F D1 J.V.........3@.. 0030: CC D5 5D 37 5D 35 1C 31 78 C1 06 73 DE 11 B3 F1 ..]7]5.1x..s.... 0040: 9A 3D 19 19 1E 13 50 9D 98 3D 54 2D D7 F7 E5 6D .=....P..=T-...m 0050: 63 5F 40 4B 0F 2F C1 AA 99 71 40 C4 CB 31 E0 0A c_@K./...q@..1.. 0060: 23 EC 22 96 67 C8 4A 33 D6 E0 21 61 2A EA 86 D0 #.".g.J3..!a*... 0070: D5 00 88 2B 2A 7B 84 39 00 94 C8 CD F0 53 DD 11 ...+*..9.....S.. 0080: EB C4 7B 15 79 4D D7 E3 F8 13 E2 D9 B8 4C 2A EF ....yM.......L*. 0090: 3A AD AD 35 9E FC C9 49 43 26 8D E1 96 DE 8B 7E :..5...IC&...... 00A0: 5F 95 F8 CA B7 EA 6F 0C 8C 58 7B 93 E6 5C 43 4E _.....o..X...\CN 00B0: 6E C6 44 64 14 69 52 83 53 A7 7D 41 13 27 93 26 n.Dd.iR.S..A.'.& 00C0: 96 DB AD D1 F6 81 70 52 93 96 BF 01 EF 30 79 EF ......pR.....0y. 00D0: C9 CC 46 34 66 6F F8 47 3B D5 58 79 5B 36 15 21 ..F4fo.G;.Xy[6.! 00E0: 15 2E 95 F5 E1 C3 E3 36 73 EC 62 F9 D9 F8 13 DC .......6s.b..... 00F0: 2A 7C 12 F6 24 D9 C4 56 DD 00 57 74 A2 29 EC ED *...$..V..Wt.).. } } ) javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 12:44:36.951 IST|Finished.java:745|Produced server Finished handshake message ( "Finished": { "verify data": { 0000: 8E 06 CB 29 12 E1 F7 15 8A 5C EF 75 AE 6B 1E 3D ...).....\.u.k.= 0010: 07 72 A7 26 A3 23 AC 33 D5 D6 79 3D C7 07 E7 08 .r.&.#.3..y=.... }'} ) javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 12:44:36.952 IST|SSLCipher.java:1978|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE countdown value = 137438953472 javax.net.ssl|DEBUG|2A|https-jsse-nio-8443-exec-10|2019-11-18 12:44:36.973 IST|ChangeCipherSpec.java:232|Consuming ChangeCipherSpec message javax.net.ssl|DEBUG|2A|https-jsse-nio-8443-exec-10|2019-11-18 12:44:36.974 IST|CertificateMessage.java:1154|Consuming client Certificate handshake message ( "Certificate": { "certificate_request_context": "", "certificate_list": [ { "certificate" : { "version" : "v3", "serial number" : "2C 8B E3 32 BC 02 24 C0", "signature algorithm": "SHA512withRSA", "issuer" : "CN=client", "not before" : "2019-11-05 13:43:21.000 IST", "not after" : "2020-11-05 13:43:21.000 IST", "subject" : "CN=client", "subject public key" : "RSA", "extensions" : [ { ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:false PathLen:2147483647 ] }, { ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_Encipherment Data_Encipherment ] } ]} "extensions": { } }, ] } ) javax.net.ssl|DEBUG|2A|https-jsse-nio-8443-exec-10|2019-11-18 12:44:36.977 IST|CertificateVerify.java:1128|Consuming CertificateVerify handshake message ( "CertificateVerify": { "signature algorithm": rsa_pss_rsae_sha256 "signature": { 0000: 98 98 BB A0 FA 9A 57 72 62 DA B4 3C BD A1 67 F3 ......Wrb..<..g. 0010: E0 08 00 4A 8B FD 50 D1 A4 21 5C F4 81 08 D9 EA ...J..P..!\..... 0020: 09 A1 9A A0 B2 25 0D 3D 28 86 39 39 F4 36 C9 C1 .....%.=(.99.6.. 0030: F7 34 78 B1 BF 7E 18 FB D3 07 53 64 4D D5 C9 0E .4x.......SdM... 0040: C5 68 6A E2 EE E4 DA 58 C3 35 6B 0E CA 5E 12 C3 .hj....X.5k..^.. 0050: 30 33 BC D9 F1 1A 9F 93 A9 C6 EE 68 5E A7 8E 46 03.........h^..F 0060: 0E F7 5A B9 95 64 CC 47 AE 72 E8 85 D9 DD 12 98 ..Z..d.G.r...... 0070: 09 A1 D1 E9 71 59 E9 16 54 6A 7F E1 7D FD 67 DA ....qY..Tj....g. 0080: C8 EC A6 08 9C 13 DE 16 3C 66 CB FE BD 1C 10 36 .........z...Mo. 00A0: 15 31 89 AA DE 13 20 B8 A1 2B 1E CA 99 44 BD EC .1.... ..+...D.. 00B0: E7 F9 5E B1 83 EC 78 41 BD F5 BB F3 2F 16 65 02 ..^...xA..../.e. 00C0: 2D BB 9C 5A 5E 08 08 CB 59 76 15 F7 AC 7A C2 BE -..Z^...Yv...z.. 00D0: 4A 11 8B 28 73 06 14 83 EB 48 9B E9 E2 1A 8A 0E J..(s....H...... 00E0: F0 0D 34 5A 7A 46 A1 7A 31 2B 8D A0 DD 03 FB EE ..4ZzF.z1+...... 00F0: 88 1B FD A5 BF 7B 74 43 1B CD CE 68 CC 09 05 A2 ......tC...h.... } } ) javax.net.ssl|DEBUG|2A|https-jsse-nio-8443-exec-10|2019-11-18 12:44:36.977 IST|Finished.java:978|Consuming client Finished handshake message ( "Finished": { "verify data": { 0000: A3 A2 7E 11 0A 5F 0C 17 3B 4F 04 D6 32 42 0E AC ....._..;O..2B.. 0010: 3D 35 40 00 FC 68 38 2E 1E B4 34 7D A1 E4 60 C5 =5@..h8...4...`. }'} ) javax.net.ssl|DEBUG|2A|https-jsse-nio-8443-exec-10|2019-11-18 12:44:36.978 IST|SSLCipher.java:1824|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE countdown value = 137438953472 javax.net.ssl|DEBUG|2A|https-jsse-nio-8443-exec-10|2019-11-18 12:44:36.978 IST|Finished.java:1070|Sending new session ticket 18-Nov-2019 12:44:36.978 FINE [https-jsse-nio-8443-exec-10] org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun Error during SSL handshake java.io.IOException: NOT_HANDSHAKING during handshake at org.apache.tomcat.util.net.SecureNioChannel.handshake(SecureNioChannel.java:193) at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1556) at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49) at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128) at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628) at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61) at java.base/java.lang.Thread.run(Thread.java:834) 18-Nov-2019 12:44:36.979 FINE [https-jsse-nio-8443-exec-10] org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper.doClose Calling [org.apache.tomcat.util.net.NioEndpoint@4db49c7f].closeSocket([org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper@31afdf63:org.apache.tomcat.util.net.SecureNioChannel@2c9ead00:java.nio.channels.SocketChannel[connected local=/0:0:0:0:0:0:0:1:8443 remote=/0:0:0:0:0:0:0:1:63255]]) java.lang.Exception at org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper.doClose(NioEndpoint.java:1163) at org.apache.tomcat.util.net.SocketWrapperBase.close(SocketWrapperBase.java:402) at org.apache.tomcat.util.net.NioEndpoint$Poller.cancelledKey(NioEndpoint.java:665) at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1586) at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49) at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128) at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628) at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61) at java.base/java.lang.Thread.run(Thread.java:834) javax.net.ssl|ALL|2A|https-jsse-nio-8443-exec-10|2019-11-18 12:44:36.979 IST|SSLEngineImpl.java:743|Closing outbound of SSLEngine javax.net.ssl|WARNING|2A|https-jsse-nio-8443-exec-10|2019-11-18 12:44:36.981 IST|SSLEngineOutputRecord.java:168|outbound has closed, ignore outbound application data 18-Nov-2019 13:52:01.503 INFO [Thread-5] org.apache.coyote.AbstractProtocol.pause Pausing ProtocolHandler ["http-nio-8080"] 18-Nov-2019 13:52:01.974 FINE [Thread-5] org.apache.tomcat.util.net.AbstractEndpoint.unlockAccept About to unlock socket for:/2606:b400:c11:8026:8044:a57:258b:7f85:8080 18-Nov-2019 13:52:02.076 FINE [Thread-5] org.apache.tomcat.util.net.AbstractEndpoint.unlockAccept Socket unlock completed for:/2606:b400:c11:8026:8044:a57:258b:7f85:8080 18-Nov-2019 13:52:02.082 INFO [Thread-5] org.apache.coyote.AbstractProtocol.pause Pausing ProtocolHandler ["https-jsse-nio-8443"] 18-Nov-2019 13:52:02.633 FINE [Thread-5] org.apache.tomcat.util.net.AbstractEndpoint.unlockAccept About to unlock socket for:/2606:b400:c11:8026:8044:a57:258b:7f85:8443 18-Nov-2019 13:52:02.678 FINE [Thread-5] org.apache.tomcat.util.net.AbstractEndpoint.unlockAccept Socket unlock completed for:/2606:b400:c11:8026:8044:a57:258b:7f85:8443 18-Nov-2019 13:52:02.679 INFO [Thread-5] org.apache.coyote.AbstractProtocol.pause Pausing ProtocolHandler ["ajp-nio-8009"] 18-Nov-2019 13:52:03.217 FINE [Thread-5] org.apache.tomcat.util.net.AbstractEndpoint.unlockAccept About to unlock socket for:/2606:b400:c11:8026:8044:a57:258b:7f85:8009 18-Nov-2019 13:52:03.261 FINE [Thread-5] org.apache.tomcat.util.net.AbstractEndpoint.unlockAccept Socket unlock completed for:/2606:b400:c11:8026:8044:a57:258b:7f85:8009 18-Nov-2019 13:52:03.262 INFO [Thread-5] org.apache.catalina.core.StandardService.stopInternal Stopping service [Catalina] 18-Nov-2019 13:52:03.781 INFO [Thread-5] org.apache.coyote.AbstractProtocol.stop Stopping ProtocolHandler ["http-nio-8080"] 18-Nov-2019 13:52:03.841 INFO [Thread-5] org.apache.coyote.AbstractProtocol.stop Stopping ProtocolHandler ["https-jsse-nio-8443"] 18-Nov-2019 13:52:03.878 INFO [Thread-5] org.apache.coyote.AbstractProtocol.stop Stopping ProtocolHandler ["ajp-nio-8009"] 18-Nov-2019 13:52:03.901 INFO [Thread-5] org.apache.coyote.AbstractProtocol.destroy Destroying ProtocolHandler ["http-nio-8080"] 18-Nov-2019 13:52:03.902 FINE [Thread-5] org.apache.tomcat.util.net.NioEndpoint.unbind Destroy initiated for 0.0.0.0/0.0.0.0:8080 18-Nov-2019 13:52:03.915 FINE [Thread-5] org.apache.tomcat.util.net.NioEndpoint.unbind Destroy completed for 0.0.0.0/0.0.0.0:8080 18-Nov-2019 13:52:03.916 INFO [Thread-5] org.apache.coyote.AbstractProtocol.destroy Destroying ProtocolHandler ["https-jsse-nio-8443"] 18-Nov-2019 13:52:03.917 FINE [Thread-5] org.apache.tomcat.util.net.NioEndpoint.unbind Destroy initiated for 0.0.0.0/0.0.0.0:8443 18-Nov-2019 13:52:03.931 FINE [Thread-5] org.apache.tomcat.util.net.NioEndpoint.unbind Destroy completed for 0.0.0.0/0.0.0.0:8443 18-Nov-2019 13:52:03.932 INFO [Thread-5] org.apache.coyote.AbstractProtocol.destroy Destroying ProtocolHandler ["ajp-nio-8009"] 18-Nov-2019 13:52:03.933 FINE [Thread-5] org.apache.tomcat.util.net.NioEndpoint.unbind Destroy initiated for 0.0.0.0/0.0.0.0:8009 18-Nov-2019 13:52:03.938 FINE [Thread-5] org.apache.tomcat.util.net.NioEndpoint.unbind Destroy completed for 0.0.0.0/0.0.0.0:8009 Terminate batch job (Y/N)? Y