Using CATALINA_BASE: "C:\apache-tomcat-9.0.27" Using CATALINA_HOME: "C:\apache-tomcat-9.0.27" Using CATALINA_TMPDIR: "C:\apache-tomcat-9.0.27\temp" Using JRE_HOME: "C:\TLS_issue\jdk-11.0.6_b4" Using CLASSPATH: "C:\apache-tomcat-9.0.27\bin\bootstrap.jar;C:\apache-tomcat-9.0.27\bin\tomcat-juli.jar" 18-Nov-2019 11:22:16.325 INFO [main] org.apache.catalina.startup.VersionLoggerListener.log Server version name: Apache Tomcat/9.0.27 18-Nov-2019 11:22:16.348 INFO [main] org.apache.catalina.startup.VersionLoggerListener.log Server built: Oct 7 2019 09:57:22 UTC 18-Nov-2019 11:22:16.350 INFO [main] org.apache.catalina.startup.VersionLoggerListener.log Server version number: 9.0.27.0 18-Nov-2019 11:22:16.351 INFO [main] org.apache.catalina.startup.VersionLoggerListener.log OS Name: Windows 7 18-Nov-2019 11:22:16.352 INFO [main] org.apache.catalina.startup.VersionLoggerListener.log OS Version: 6.1 18-Nov-2019 11:22:16.352 INFO [main] org.apache.catalina.startup.VersionLoggerListener.log Architecture: amd64 18-Nov-2019 11:22:16.353 INFO [main] org.apache.catalina.startup.VersionLoggerListener.log Java Home: C:\TLS_issue\jdk-11.0.6_b4 18-Nov-2019 11:22:16.354 INFO [main] org.apache.catalina.startup.VersionLoggerListener.log JVM Version: 11.0.6+4-LTS 18-Nov-2019 11:22:16.356 INFO [main] org.apache.catalina.startup.VersionLoggerListener.log JVM Vendor: Oracle Corporation 18-Nov-2019 11:22:16.356 INFO [main] org.apache.catalina.startup.VersionLoggerListener.log CATALINA_BASE: C:\apache-tomcat-9.0.27 18-Nov-2019 11:22:16.357 INFO [main] org.apache.catalina.startup.VersionLoggerListener.log CATALINA_HOME: C:\apache-tomcat-9.0.27 18-Nov-2019 11:22:16.480 INFO [main] org.apache.catalina.startup.VersionLoggerListener.log Command line argument: --add-opens=java.base/java.lang=ALL-UNNAMED 18-Nov-2019 11:22:16.481 INFO [main] org.apache.catalina.startup.VersionLoggerListener.log Command line argument: --add-opens=java.base/java.io=ALL-UNNAMED 18-Nov-2019 11:22:16.482 INFO [main] org.apache.catalina.startup.VersionLoggerListener.log Command line argument: --add-opens=java.rmi/sun.rmi.transport=ALL-UNNAMED 18-Nov-2019 11:22:16.483 INFO [main] org.apache.catalina.startup.VersionLoggerListener.log Command line argument: -Djava.util.logging.config.file=C:\apache-tomcat-9.0.27\conf\logging.properties 18-Nov-2019 11:22:16.484 INFO [main] org.apache.catalina.startup.VersionLoggerListener.log Command line argument: -Djava.util.logging.manager=org.apache.juli.ClassLoaderLogManager 18-Nov-2019 11:22:16.484 INFO [main] org.apache.catalina.startup.VersionLoggerListener.log Command line argument: -Djdk.tls.ephemeralDHKeySize=2048 18-Nov-2019 11:22:16.489 INFO [main] org.apache.catalina.startup.VersionLoggerListener.log Command line argument: -Djavax.net.debug=ssl:handshake:verbose 18-Nov-2019 11:22:16.490 INFO [main] org.apache.catalina.startup.VersionLoggerListener.log Command line argument: -Djava.protocol.handler.pkgs=org.apache.catalina.webresources 18-Nov-2019 11:22:16.491 INFO [main] org.apache.catalina.startup.VersionLoggerListener.log Command line argument: -Dignore.endorsed.dirs= 18-Nov-2019 11:22:16.491 INFO [main] org.apache.catalina.startup.VersionLoggerListener.log Command line argument: -Dcatalina.base=C:\apache-tomcat-9.0.27 18-Nov-2019 11:22:16.492 INFO [main] org.apache.catalina.startup.VersionLoggerListener.log Command line argument: -Dcatalina.home=C:\apache-tomcat-9.0.27 18-Nov-2019 11:22:16.493 INFO [main] org.apache.catalina.startup.VersionLoggerListener.log Command line argument: -Djava.io.tmpdir=C:\apache-tomcat-9.0.27\temp 18-Nov-2019 11:22:16.494 INFO [main] org.apache.catalina.core.AprLifecycleListener.lifecycleEvent Loaded APR based Apache Tomcat Native library [1.2.23] using APR version [1.7.0]. 18-Nov-2019 11:22:16.496 INFO [main] org.apache.catalina.core.AprLifecycleListener.lifecycleEvent APR capabilities: IPv6 [true], sendfile [true], accept filters [false], random [true]. 18-Nov-2019 11:22:16.497 INFO [main] org.apache.catalina.core.AprLifecycleListener.lifecycleEvent APR/OpenSSL configuration: useAprConnector [false], useOpenSSL [true] 18-Nov-2019 11:22:16.589 INFO [main] org.apache.catalina.core.AprLifecycleListener.initializeSSL OpenSSL successfully initialized [OpenSSL 1.1.1c 28 May 2019] 18-Nov-2019 11:22:18.759 INFO [main] org.apache.coyote.AbstractProtocol.init Initializing ProtocolHandler ["http-nio-8080"] 18-Nov-2019 11:22:20.042 INFO [main] org.apache.coyote.AbstractProtocol.init Initializing ProtocolHandler ["https-jsse-nio-8443"] javax.net.ssl|DEBUG|01|main|2019-11-18 11:22:20.278 IST|SSLCipher.java:437|jdk.tls.keyLimits: entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472 18-Nov-2019 11:22:21.273 FINE [main] org.apache.tomcat.util.net.SSLUtilBase.getEnabled The [protocols] that are active are : [[TLSv1, TLSv1.3, TLSv1.2, SSLv2Hello, TLSv1.1]] 18-Nov-2019 11:22:21.349 FINE [main] org.apache.tomcat.util.net.openssl.ciphers.OpenSSLCipherConfigurationParser.convertForJSSE jsse.openssl.effectiveCiphers 18-Nov-2019 11:22:21.350 FINE [main] org.apache.tomcat.util.net.SSLUtilBase.getEnabled The [ciphers] that are active are : [[TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_AES_256_GCM_SHA384, TLS_DHE_DSS_WITH_AES_256_GCM_SHA384, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, TLS_DHE_RSA_WITH_AES_256_CBC_SHA256, TLS_DHE_DSS_WITH_AES_256_CBC_SHA256, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_DSS_WITH_AES_256_CBC_SHA, TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384, TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384, TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDH_RSA_WITH_AES_256_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_AES_128_GCM_SHA256, TLS_DHE_DSS_WITH_AES_128_GCM_SHA256, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_DSS_WITH_AES_128_CBC_SHA256, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA]] 18-Nov-2019 11:22:21.353 FINE [main] org.apache.tomcat.util.net.SSLUtilBase.getEnabled Some of the specified [ciphers] are not supported by the SSL engine and have been skipped: [[TLS_ECDHE_ECDSA_WITH_AES_256_CCM_8, TLS_ECDHE_ECDSA_WITH_AES_256_CCM, TLS_PSK_DHE_WITH_AES_256_CCM_8, TLS_DHE_PSK_WITH_AES_256_CCM, TLS_DHE_RSA_WITH_AES_256_CCM_8, TLS_DHE_RSA_WITH_AES_256_CCM, TLS_ECDHE_PSK_WITH_AES_256_CBC_SHA384, TLS_ECDHE_PSK_WITH_AES_256_CBC_SHA, TLS_SRP_SHA_DSS_WITH_AES_256_CBC_SHA, TLS_SRP_SHA_RSA_WITH_AES_256_CBC_SHA, TLS_SRP_SHA_WITH_AES_256_CBC_SHA, TLS_RSA_PSK_WITH_AES_256_CBC_SHA384, TLS_DHE_PSK_WITH_AES_256_CBC_SHA384, TLS_RSA_PSK_WITH_AES_256_GCM_SHA384, TLS_DHE_PSK_WITH_AES_256_GCM_SHA384, TLS_DH_DSS_WITH_AES_256_GCM_SHA384, TLS_DH_RSA_WITH_AES_256_GCM_SHA384, TLS_RSA_PSK_WITH_AES_256_CBC_SHA, TLS_DHE_PSK_WITH_AES_256_CBC_SHA, TLS_DH_RSA_WITH_AES_256_CBC_SHA256, TLS_DH_DSS_WITH_AES_256_CBC_SHA256, TLS_DH_RSA_WITH_AES_256_CBC_SHA, TLS_DH_DSS_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256, TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256, TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384, TLS_ECDHE_ECDSA_WITH_CAMELLIA_256_CBC_SHA384, TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384, TLS_ECDHE_ECDSA_WITH_ARIA_256_GCM_SHA384, TLS_RSA_PSK_WITH_CHACHA20_POLY1305_SHA256, TLS_DHE_PSK_WITH_CHACHA20_POLY1305_SHA256, TLS_ECDHE_PSK_WITH_CHACHA20_POLY1305_SHA256, TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256, TLS_ECDHE_PSK_WITH_CAMELLIA_256_CBC_SHA384, TLS_RSA_PSK_WITH_CAMELLIA_256_CBC_SHA384, TLS_DHE_PSK_WITH_CAMELLIA_256_CBC_SHA384, TLS_RSA_PSK_WITH_ARIA_256_GCM_SHA384, TLS_DHE_PSK_WITH_ARIA_256_GCM_SHA384, TLS_DHE_DSS_WITH_ARIA_256_GCM_SHA384, TLS_DHE_RSA_WITH_ARIA_256_GCM_SHA384, TLS_CHACHA20_POLY1305_SHA256, TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256, TLS_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA256, TLS_DH_RSA_WITH_CAMELLIA_256_CBC_SHA256, TLS_DH_DSS_WITH_CAMELLIA_256_CBC_SHA256, TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA, TLS_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA, TLS_DH_RSA_WITH_CAMELLIA_256_CBC_SHA, TLS_DH_DSS_WITH_CAMELLIA_256_CBC_SHA, TLS_ECDH_RSA_WITH_CAMELLIA_256_CBC_SHA384, TLS_ECDH_ECDSA_WITH_CAMELLIA_256_CBC_SHA384, TLS_PSK_WITH_AES_256_CCM_8, TLS_PSK_WITH_AES_256_CCM, TLS_PSK_WITH_AES_256_CBC_SHA384, TLS_PSK_WITH_AES_256_GCM_SHA384, TLS_PSK_WITH_AES_256_CBC_SHA, TLS_PSK_WITH_CHACHA20_POLY1305_SHA256, TLS_PSK_WITH_CAMELLIA_256_CBC_SHA384, TLS_PSK_WITH_ARIA_256_GCM_SHA384, TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8, TLS_ECDHE_ECDSA_WITH_AES_128_CCM, TLS_PSK_DHE_WITH_AES_128_CCM_8, TLS_DHE_PSK_WITH_AES_128_CCM, TLS_DHE_RSA_WITH_AES_128_CCM_8, TLS_DHE_RSA_WITH_AES_128_CCM, TLS_ECDHE_PSK_WITH_AES_128_CBC_SHA256, TLS_ECDHE_PSK_WITH_AES_128_CBC_SHA, TLS_SRP_SHA_DSS_WITH_AES_128_CBC_SHA, TLS_SRP_SHA_RSA_WITH_AES_128_CBC_SHA, TLS_SRP_SHA_WITH_AES_128_CBC_SHA, TLS_AES_128_CCM_8_SHA256, TLS_AES_128_CCM_SHA256, TLS_RSA_PSK_WITH_AES_128_CBC_SHA256, TLS_DHE_PSK_WITH_AES_128_CBC_SHA256, TLS_RSA_PSK_WITH_AES_128_GCM_SHA256, TLS_DHE_PSK_WITH_AES_128_GCM_SHA256, TLS_DH_DSS_WITH_AES_128_GCM_SHA256, TLS_DH_RSA_WITH_AES_128_GCM_SHA256, TLS_RSA_PSK_WITH_AES_128_CBC_SHA, TLS_DHE_PSK_WITH_AES_128_CBC_SHA, TLS_DH_RSA_WITH_AES_128_CBC_SHA256, TLS_DH_DSS_WITH_AES_128_CBC_SHA256, TLS_DH_RSA_WITH_AES_128_CBC_SHA, TLS_DH_DSS_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_CBC_SHA256, TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256, TLS_ECDHE_ECDSA_WITH_ARIA_128_GCM_SHA256, TLS_ECDHE_PSK_WITH_CAMELLIA_128_CBC_SHA256, TLS_RSA_PSK_WITH_CAMELLIA_128_CBC_SHA256, TLS_DHE_PSK_WITH_CAMELLIA_128_CBC_SHA256, TLS_RSA_PSK_WITH_ARIA_128_GCM_SHA256, TLS_DHE_PSK_WITH_ARIA_128_GCM_SHA256, TLS_DHE_DSS_WITH_ARIA_128_GCM_SHA256, TLS_DHE_RSA_WITH_ARIA_128_GCM_SHA256, TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256, TLS_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA256, TLS_DH_RSA_WITH_CAMELLIA_128_CBC_SHA256, TLS_DH_DSS_WITH_CAMELLIA_128_CBC_SHA256, TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA, TLS_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA, TLS_DH_RSA_WITH_CAMELLIA_128_CBC_SHA, TLS_DH_DSS_WITH_CAMELLIA_128_CBC_SHA, TLS_ECDH_RSA_WITH_CAMELLIA_128_CBC_SHA256, TLS_ECDH_ECDSA_WITH_CAMELLIA_128_CBC_SHA256, TLS_PSK_WITH_AES_128_CCM_8, TLS_PSK_WITH_AES_128_CCM, TLS_PSK_WITH_AES_128_CBC_SHA256, TLS_PSK_WITH_AES_128_GCM_SHA256, TLS_PSK_WITH_AES_128_CBC_SHA, TLS_PSK_WITH_CAMELLIA_128_CBC_SHA256, TLS_PSK_WITH_ARIA_128_GCM_SHA256]] 18-Nov-2019 11:22:21.615 INFO [main] org.apache.coyote.AbstractProtocol.init Initializing ProtocolHandler ["ajp-nio-8009"] 18-Nov-2019 11:22:21.665 INFO [main] org.apache.catalina.startup.Catalina.load Server initialization in [7,062] milliseconds 18-Nov-2019 11:22:22.065 INFO [main] org.apache.catalina.core.StandardService.startInternal Starting service [Catalina] 18-Nov-2019 11:22:22.067 INFO [main] org.apache.catalina.core.StandardEngine.startInternal Starting Servlet engine: [Apache Tomcat/9.0.27] 18-Nov-2019 11:22:22.132 INFO [main] org.apache.catalina.startup.HostConfig.deployDirectory Deploying web application directory [C:\apache-tomcat-9.0.27\webapps\docs] 18-Nov-2019 11:22:24.886 WARNING [main] org.apache.catalina.util.SessionIdGeneratorBase.createSecureRandom Creation of SecureRandom instance for session ID generation using [SHA1PRNG] took [774] milliseconds. 18-Nov-2019 11:22:25.039 INFO [main] org.apache.catalina.startup.HostConfig.deployDirectory Deployment of web application directory [C:\apache-tomcat-9.0.27\webapps\docs] has finished in [2,907] ms 18-Nov-2019 11:22:25.041 INFO [main] org.apache.catalina.startup.HostConfig.deployDirectory Deploying web application directory [C:\apache-tomcat-9.0.27\webapps\examples] javax.net.ssl|DEBUG|03|Finalizer|2019-11-18 11:22:26.371 IST|SSLSocketImpl.java:473|duplex close of SSLSocket javax.net.ssl|WARNING|03|Finalizer|2019-11-18 11:22:26.386 IST|SSLSocketImpl.java:494|SSLSocket duplex close failed ( "throwable" : { java.net.SocketException: Socket is not connected at java.base/java.net.Socket.shutdownOutput(Socket.java:1570) at java.base/sun.security.ssl.BaseSSLSocketImpl.shutdownOutput(BaseSSLSocketImpl.java:232) at java.base/sun.security.ssl.SSLSocketImpl.duplexCloseOutput(SSLSocketImpl.java:561) at java.base/sun.security.ssl.SSLSocketImpl.close(SSLSocketImpl.java:479) at java.base/sun.security.ssl.BaseSSLSocketImpl.finalize(BaseSSLSocketImpl.java:275) at java.base/java.lang.System$2.invokeFinalize(System.java:2120) at java.base/java.lang.ref.Finalizer.runFinalizer(Finalizer.java:87) at java.base/java.lang.ref.Finalizer$FinalizerThread.run(Finalizer.java:171)} ) javax.net.ssl|DEBUG|03|Finalizer|2019-11-18 11:22:26.387 IST|SSLSocketImpl.java:473|duplex close of SSLSocket javax.net.ssl|WARNING|03|Finalizer|2019-11-18 11:22:26.393 IST|SSLSocketImpl.java:494|SSLSocket duplex close failed ( "throwable" : { java.net.SocketException: Socket is not connected at java.base/java.net.Socket.shutdownOutput(Socket.java:1570) at java.base/sun.security.ssl.BaseSSLSocketImpl.shutdownOutput(BaseSSLSocketImpl.java:232) at java.base/sun.security.ssl.SSLSocketImpl.duplexCloseOutput(SSLSocketImpl.java:561) at java.base/sun.security.ssl.SSLSocketImpl.close(SSLSocketImpl.java:479) at java.base/sun.security.ssl.BaseSSLSocketImpl.finalize(BaseSSLSocketImpl.java:275) at java.base/java.lang.System$2.invokeFinalize(System.java:2120) at java.base/java.lang.ref.Finalizer.runFinalizer(Finalizer.java:87) at java.base/java.lang.ref.Finalizer$FinalizerThread.run(Finalizer.java:171)} ) 18-Nov-2019 11:22:28.952 INFO [main] org.apache.catalina.startup.HostConfig.deployDirectory Deployment of web application directory [C:\apache-tomcat-9.0.27\webapps\examples] has finished in [3,910] ms 18-Nov-2019 11:22:28.954 INFO [main] org.apache.catalina.startup.HostConfig.deployDirectory Deploying web application directory [C:\apache-tomcat-9.0.27\webapps\host-manager] 18-Nov-2019 11:22:29.405 INFO [main] org.apache.catalina.startup.HostConfig.deployDirectory Deployment of web application directory [C:\apache-tomcat-9.0.27\webapps\host-manager] has finished in [451] ms 18-Nov-2019 11:22:29.409 INFO [main] org.apache.catalina.startup.HostConfig.deployDirectory Deploying web application directory [C:\apache-tomcat-9.0.27\webapps\manager] 18-Nov-2019 11:22:29.756 INFO [main] org.apache.catalina.startup.HostConfig.deployDirectory Deployment of web application directory [C:\apache-tomcat-9.0.27\webapps\manager] has finished in [350] ms 18-Nov-2019 11:22:29.758 INFO [main] org.apache.catalina.startup.HostConfig.deployDirectory Deploying web application directory [C:\apache-tomcat-9.0.27\webapps\ROOT] 18-Nov-2019 11:22:29.930 INFO [main] org.apache.catalina.startup.HostConfig.deployDirectory Deployment of web application directory [C:\apache-tomcat-9.0.27\webapps\ROOT] has finished in [169] ms 18-Nov-2019 11:22:29.948 INFO [main] org.apache.coyote.AbstractProtocol.start Starting ProtocolHandler ["http-nio-8080"] 18-Nov-2019 11:22:30.456 INFO [main] org.apache.coyote.AbstractProtocol.start Starting ProtocolHandler ["https-jsse-nio-8443"] 18-Nov-2019 11:22:30.606 INFO [main] org.apache.coyote.AbstractProtocol.start Starting ProtocolHandler ["ajp-nio-8009"] 18-Nov-2019 11:22:30.799 INFO [main] org.apache.catalina.startup.Catalina.start Server startup in [9,131] milliseconds 18-Nov-2019 11:23:57.301 FINE [https-jsse-nio-8443-exec-3] org.apache.tomcat.util.net.SecureNioChannel.processSNI The SNI host name extracted for connection [java.nio.channels.SocketChannel[connected local=/0:0:0:0:0:0:0:1:8443 remote=/0:0:0:0:0:0:0:1:62335]] was [localhost] javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:57.316 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 for TLS10 javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:57.317 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 for TLS10 javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:57.317 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLS10 javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:57.317 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLS10 javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:57.332 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 for TLS13 javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:57.332 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 for TLS13 javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:57.332 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLS13 javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:57.332 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLS13 javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:57.333 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA for TLS13 javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:57.333 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA for TLS13 javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:57.333 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 for TLS11 javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:57.333 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 for TLS11 javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:57.333 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLS11 javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:57.333 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLS11 javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:57.364 IST|SSLExtensions.java:131|Ignore unknown or unsupported extension ( "unknown extension (28)": { 0000: 40 01 @. } ) javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:57.367 IST|SSLExtensions.java:131|Ignore unknown or unsupported extension ( "unknown extension (21)": { 0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0090: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ............... } ) javax.net.ssl|WARNING|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:57.398 IST|SignatureScheme.java:284|Signature algorithm, ed25519, is not supported by the underlying providers javax.net.ssl|WARNING|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:57.399 IST|SignatureScheme.java:284|Signature algorithm, ed448, is not supported by the underlying providers javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:57.404 IST|ClientHello.java:806|Consuming ClientHello handshake message ( "ClientHello": { "client version" : "TLSv1.2", "random" : "EE EF DD 5F AF CB 8F 6E F0 BF FC F4 EB 14 BB FF 1C 2D EE B2 F0 5C 93 9C C0 72 E2 2A 1B 80 BE 25", "session id" : "48 37 14 73 22 ED 7C EA DA 99 95 89 74 88 43 42 5E 8B 79 2B 1B 77 0A A6 66 D8 BA E4 FF 7F 3D 62", "cipher suites" : "[TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_AES_256_GCM_SHA384(0x1302), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), UNKNOWN-CIPHER-SUITE(0xCCA9)(0xCCA9), UNKNOWN-CIPHER-SUITE(0xCCA8)(0xCCA8), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA(0xC00A), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA(0xC009), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA(0xC013), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA(0xC014), TLS_DHE_RSA_WITH_AES_128_CBC_SHA(0x0033), TLS_DHE_RSA_WITH_AES_256_CBC_SHA(0x0039), TLS_RSA_WITH_AES_128_CBC_SHA(0x002F), TLS_RSA_WITH_AES_256_CBC_SHA(0x0035), SSL_RSA_WITH_3DES_EDE_CBC_SHA(0x000A)]", "compression methods" : "00", "extensions" : [ "server_name (0)": { type=host_name (0), value=localhost }, "extended_master_secret (23)": { }, "renegotiation_info (65,281)": { "renegotiated connection": [] }, "supported_groups (10)": { "versions": [x25519, secp256r1, secp384r1, secp521r1, ffdhe2048, ffdhe3072] }, "ec_point_formats (11)": { "formats": [uncompressed] }, "application_layer_protocol_negotiation (16)": { [h2, http/1.1] }, "status_request (5)": { "certificate status type": ocsp "OCSP status request": { "responder_id": "request extensions": { } } }, "key_share (51)": { "client_shares": [ { "named group": x25519 "key_exchange": { 0000: 02 D6 A0 A6 80 3D 93 88 62 19 6F DE A5 22 E8 D1 .....=..b.o..".. 0010: DA 4A 30 39 22 5F 0C 34 7E 03 8F 1E D4 39 5A 7C .J09"_.4.....9Z. } }, { "named group": secp256r1 "key_exchange": { 0000: 04 1A 6B A3 34 77 DE 0E 33 53 86 87 EC C0 A7 4F ..k.4w..3S.....O 0010: C4 8F FB C4 F5 C7 37 FA A5 D8 F9 FE EC 73 0B 4A ......7......s.J 0020: E8 49 4E C4 91 28 68 86 55 56 99 54 3A E7 47 CB .IN..(h.UV.T:.G. 0030: EA CA 47 90 22 59 B5 6D 3B 51 51 D4 64 73 D6 F8 ..G."Y.m;QQ.ds.. 0040: 54 } }, ] }, "supported_versions (43)": { "versions": [TLSv1.3, TLSv1.2, TLSv1.1, TLSv1] }, "signature_algorithms (13)": { "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1] }, "unknown extension (28)": { 0000: 40 01 @. }, "unknown extension (21)": { 0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0090: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ............... } ] } ) javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:57.405 IST|SSLExtensions.java:188|Consumed extension: supported_versions javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:57.405 IST|ClientHello.java:836|Negotiated protocol version: TLSv1.3 javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:57.406 IST|PskKeyExchangeModesExtension.java:294|abort session resumption, no supported psk_dhe_ke PSK key exchange mode javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:57.407 IST|PreSharedKeyExtension.java:809|Handling pre_shared_key absence. javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:57.407 IST|ServerNameExtension.java:328|no server name matchers, ignore server name indication javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:57.407 IST|SSLExtensions.java:188|Consumed extension: server_name javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:57.407 IST|SSLExtensions.java:169|Ignore unavailable extension: max_fragment_length javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:57.408 IST|SSLExtensions.java:188|Consumed extension: status_request javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:57.408 IST|SSLExtensions.java:188|Consumed extension: supported_groups javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:57.408 IST|SSLExtensions.java:159|Ignore unsupported extension: ec_point_formats javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:57.408 IST|SSLExtensions.java:188|Consumed extension: signature_algorithms javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:57.408 IST|SSLExtensions.java:169|Ignore unavailable extension: signature_algorithms_cert javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:57.408 IST|AlpnExtension.java:274|Ignore server unenabled extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:57.409 IST|SSLExtensions.java:188|Consumed extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:57.409 IST|SSLExtensions.java:159|Ignore unsupported extension: status_request_v2 javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:57.409 IST|SSLExtensions.java:159|Ignore unsupported extension: extended_master_secret javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:57.409 IST|SSLExtensions.java:169|Ignore unavailable extension: cookie javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:57.410 IST|KeyShareExtension.java:350|Ignore unsupported named group: x25519 javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:57.411 IST|SSLExtensions.java:188|Consumed extension: key_share javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:57.412 IST|SSLExtensions.java:159|Ignore unsupported extension: renegotiation_info javax.net.ssl|ALL|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:57.413 IST|SignatureScheme.java:360|Ignore disabled signature scheme: rsa_md5 javax.net.ssl|WARNING|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:57.414 IST|SSLExtensions.java:211|Ignore impact of unsupported extension: server_name javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:57.414 IST|SSLExtensions.java:203|Ignore unavailable extension: max_fragment_length javax.net.ssl|WARNING|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:57.414 IST|SSLExtensions.java:211|Ignore impact of unsupported extension: status_request javax.net.ssl|WARNING|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:57.414 IST|SSLExtensions.java:211|Ignore impact of unsupported extension: supported_groups javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:57.415 IST|SSLExtensions.java:220|Populated with extension: signature_algorithms javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:57.415 IST|SSLExtensions.java:203|Ignore unavailable extension: signature_algorithms_cert javax.net.ssl|WARNING|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:57.415 IST|SSLExtensions.java:211|Ignore impact of unsupported extension: application_layer_protocol_negotiation javax.net.ssl|WARNING|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:57.416 IST|SSLExtensions.java:211|Ignore impact of unsupported extension: supported_versions javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:57.416 IST|SSLExtensions.java:203|Ignore unavailable extension: cookie javax.net.ssl|WARNING|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:57.416 IST|SSLExtensions.java:211|Ignore impact of unsupported extension: key_share javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:57.416 IST|SSLExtensions.java:203|Ignore unavailable extension: pre_shared_key javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:57.416 IST|ServerHello.java:729|use cipher suite TLS_AES_128_GCM_SHA256 javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:57.447 IST|SSLExtensions.java:256|Ignore, context unavailable extension: pre_shared_key javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:57.448 IST|ServerHello.java:580|Produced ServerHello handshake message ( "ServerHello": { "server version" : "TLSv1.2", "random" : "5B 29 7C 29 4E 3B 7E CE 89 0C A4 AA 1D 96 C2 FE 12 42 AE 1B A2 A4 1F 08 F7 65 B2 A2 DC FF C0 5A", "session id" : "48 37 14 73 22 ED 7C EA DA 99 95 89 74 88 43 42 5E 8B 79 2B 1B 77 0A A6 66 D8 BA E4 FF 7F 3D 62", "cipher suite" : "TLS_AES_128_GCM_SHA256(0x1301)", "compression methods" : "00", "extensions" : [ "supported_versions (43)": { "selected version": [TLSv1.3] }, "key_share (51)": { "server_share": { "named group": secp256r1 "key_exchange": { 0000: 04 50 10 DC A4 CA C5 3A C6 88 73 95 55 88 5B D9 .P.....:..s.U.[. 0010: 05 8F C1 EC F9 5C 81 7A C2 C4 C4 BF C8 6E 31 CB .....\.z.....n1. 0020: 0F F7 77 07 4F 9C 98 78 D7 10 91 5A 59 20 58 16 ..w.O..x...ZY X. 0030: 65 E9 8E EB FE DC 20 41 CF 1A 7F 86 C3 91 8E A7 e..... A........ 0040: 4A } }, } ] } ) javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:57.480 IST|SSLCipher.java:1824|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE countdown value = 137438953472 javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:57.485 IST|SSLCipher.java:1978|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE countdown value = 137438953472 javax.net.ssl|ALL|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:57.486 IST|ServerNameExtension.java:538|No expected server name indication response javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:57.486 IST|SSLExtensions.java:256|Ignore, context unavailable extension: server_name javax.net.ssl|ALL|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:57.487 IST|MaxFragExtension.java:471|Ignore unavailable max_fragment_length extension javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:57.487 IST|SSLExtensions.java:256|Ignore, context unavailable extension: max_fragment_length javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:57.490 IST|AlpnExtension.java:363|Ignore unavailable extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:57.490 IST|SSLExtensions.java:256|Ignore, context unavailable extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:57.490 IST|EncryptedExtensions.java:137|Produced EncryptedExtensions message ( "EncryptedExtensions": [ "supported_groups (10)": { "versions": [secp256r1, secp384r1, secp521r1, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192] } ] ) javax.net.ssl|ALL|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:57.492 IST|SignatureScheme.java:365|Ignore inactive signature scheme: dsa_sha256 javax.net.ssl|ALL|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:57.493 IST|SignatureScheme.java:365|Ignore inactive signature scheme: dsa_sha1 javax.net.ssl|ALL|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:57.493 IST|SignatureScheme.java:365|Ignore inactive signature scheme: rsa_md5 javax.net.ssl|ALL|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:57.494 IST|SignatureScheme.java:365|Ignore inactive signature scheme: dsa_sha256 javax.net.ssl|ALL|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:57.494 IST|SignatureScheme.java:365|Ignore inactive signature scheme: dsa_sha1 javax.net.ssl|ALL|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:57.494 IST|SignatureScheme.java:365|Ignore inactive signature scheme: rsa_md5 javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:57.497 IST|CertificateRequest.java:882|Produced CertificateRequest message ( "CertificateRequest": { "certificate_request_context": "", "extensions": [ "signature_algorithms (13)": { "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1] }, "signature_algorithms_cert (50)": { "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1] } ] } ) javax.net.ssl|ALL|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:57.501 IST|X509Authentication.java:264|No X.509 cert selected for EC javax.net.ssl|WARNING|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:57.501 IST|CertificateMessage.java:1063|Unavailable authentication scheme: ecdsa_secp256r1_sha256 javax.net.ssl|ALL|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:57.501 IST|X509Authentication.java:264|No X.509 cert selected for EC javax.net.ssl|WARNING|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:57.502 IST|CertificateMessage.java:1063|Unavailable authentication scheme: ecdsa_secp384r1_sha384 javax.net.ssl|ALL|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:57.502 IST|X509Authentication.java:264|No X.509 cert selected for EC javax.net.ssl|WARNING|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:57.502 IST|CertificateMessage.java:1063|Unavailable authentication scheme: ecdsa_secp521r1_sha512 javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:57.503 IST|StatusResponseManager.java:763|Staping disabled or is a resumed session javax.net.ssl|ALL|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:57.504 IST|CertStatusExtension.java:1117|Stapling is disabled for this connection javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:57.504 IST|SSLExtensions.java:256|Ignore, context unavailable extension: status_request javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:57.508 IST|CertificateMessage.java:1002|Produced server Certificate message ( "Certificate": { "certificate_request_context": "", "certificate_list": [ { "certificate" : { "version" : "v3", "serial number" : "3B FD 86 4A 58 09 72 F6", "signature algorithm": "SHA512withRSA", "issuer" : "CN=localhost", "not before" : "2019-11-05 13:41:52.000 IST", "not after" : "2020-11-05 13:41:52.000 IST", "subject" : "CN=localhost", "subject public key" : "RSA", "extensions" : [ { ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:false PathLen:2147483647 ] }, { ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_Encipherment Data_Encipherment ] } ]} "extensions": { } }, ] } ) javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:57.580 IST|CertificateVerify.java:1113|Produced server CertificateVerify handshake message ( "CertificateVerify": { "signature algorithm": rsa_pss_rsae_sha256 "signature": { 0000: 22 B6 62 A4 ED 42 B3 A5 5F DF 27 0C 7C B1 0D 13 ".b..B.._.'..... 0010: C8 74 6E 84 B7 E3 6C C8 47 A3 62 33 C1 74 F9 37 .tn...l.G.b3.t.7 0020: FA A1 A0 30 46 32 92 54 78 13 E1 EE A4 86 E6 F1 ...0F2.Tx....... 0030: A3 89 69 B0 5A 7B 08 3E 7A 63 9B 43 27 DF 3C 8D ..i.Z..>zc.C'.<. 0040: B6 F5 33 D1 01 E5 2F A1 5D 49 EA 83 50 91 BB B8 ..3.../.]I..P... 0050: 06 DE 17 43 C7 AC 64 2A EC FE 50 6B 85 A2 51 F8 ...C..d*..Pk..Q. 0060: 08 B5 53 18 AE B5 90 37 73 30 25 93 5D 59 23 00 ..S....7s0%.]Y#. 0070: EE 32 2F 59 76 2C BC 8E 1C 81 7A 7A 1B CF CA 91 .2/Yv,....zz.... 0080: F3 83 73 68 3B 3E 00 85 74 9B 47 73 E9 5B 3B 00 ..sh;>..t.Gs.[;. 0090: 65 3E 57 3A 88 EA 57 A4 9E 40 7C E5 2B 49 4C E7 e>W:..W..@..+IL. 00A0: F0 31 8B BB D3 53 0B D8 C8 39 47 49 75 31 1D 78 .1...S...9GIu1.x 00B0: 96 FD 47 00 24 16 BF F5 36 3F D6 C2 FD D3 20 6C ..G.$...6?.... l 00C0: B7 A6 EF 33 6C D0 78 A4 92 D6 0C 5F 8F 1B D5 A7 ...3l.x...._.... 00D0: 01 4A 99 D1 B3 72 0B 65 9D 22 A9 60 92 45 8A 1A .J...r.e.".`.E.. 00E0: AE 99 A3 32 84 D3 01 19 36 E3 21 65 11 AC 22 72 ...2....6.!e.."r 00F0: F7 91 10 4A 70 55 1B 55 4D E4 7E 36 70 EF 54 42 ...JpU.UM..6p.TB } } ) javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:57.618 IST|Finished.java:773|Produced server Finished handshake message ( "Finished": { "verify data": { 0000: 20 27 2D 8A 53 0C AA 7E 72 CD C6 F1 EB 49 D0 59 '-.S...r....I.Y 0010: 68 36 A3 50 E5 78 46 47 19 27 87 1D BB F8 2B F9 h6.P.xFG.'....+. }'} ) javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:57.630 IST|SSLCipher.java:1978|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE countdown value = 137438953472 javax.net.ssl|DEBUG|25|https-jsse-nio-8443-exec-5|2019-11-18 11:23:59.361 IST|ChangeCipherSpec.java:250|Consuming ChangeCipherSpec message javax.net.ssl|DEBUG|25|https-jsse-nio-8443-exec-5|2019-11-18 11:23:59.365 IST|CertificateMessage.java:1158|Consuming client Certificate handshake message ( "Certificate": { "certificate_request_context": "", "certificate_list": [ { "certificate" : { "version" : "v3", "serial number" : "2C 8B E3 32 BC 02 24 C0", "signature algorithm": "SHA512withRSA", "issuer" : "CN=client", "not before" : "2019-11-05 13:43:21.000 IST", "not after" : "2020-11-05 13:43:21.000 IST", "subject" : "CN=client", "subject public key" : "RSA", "extensions" : [ { ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:false PathLen:2147483647 ] }, { ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_Encipherment Data_Encipherment ] } ]} "extensions": { } }, ] } ) javax.net.ssl|DEBUG|25|https-jsse-nio-8443-exec-5|2019-11-18 11:23:59.373 IST|CertificateVerify.java:1165|Consuming CertificateVerify handshake message ( "CertificateVerify": { "signature algorithm": rsa_pss_rsae_sha256 "signature": { 0000: 82 AF 0F 8B 90 00 AF AD 4D 07 56 1A 7D F8 48 4C ........M.V...HL 0010: C2 A7 FE 37 E7 3B FE CB 3F 78 4D F7 42 1B 9A 8E ...7.;..?xM.B... 0020: 56 37 02 5F 48 34 88 BE 94 A4 CF ED 7F 93 80 E7 V7._H4.......... 0030: BC DE CF 88 AD 8B 4D A6 DE B1 9A 52 5C 09 57 45 ......M....R\.WE 0040: 7C 88 4E BB 6D C9 73 57 6C 55 88 22 02 08 D9 65 ..N.m.sWlU."...e 0050: AE 8A 13 13 0B 3F AF B7 FD BD E1 6F 51 5F 2D EA .....?.....oQ_-. 0060: 34 0A 56 06 50 14 30 B5 E4 FF 7B 8A 06 6D 4C 3F 4.V.P.0......mL? 0070: E2 D1 1A F7 7C 09 48 52 A3 60 14 FB 08 C6 30 59 ......HR.`....0Y 0080: 58 AB 80 05 15 46 10 F4 C9 FF BF D4 CD CF 8E BA X....F.......... 0090: 99 66 20 02 8C FE 71 6D 75 82 5A F2 91 6D 00 59 .f ...qmu.Z..m.Y 00A0: 16 E7 9F 68 2B BC 99 72 74 FD 77 37 56 23 2D B9 ...h+..rt.w7V#-. 00B0: DE 42 BF AC AE 03 56 96 E7 B4 33 F3 0F E3 E5 94 .B....V...3..... 00C0: F2 0B 30 42 9C 63 AA 4D A0 66 E0 90 B0 EF D8 7E ..0B.c.M.f...... 00D0: 75 28 89 2F 23 F8 DF C6 EB 05 A3 4C 45 39 5C 2F u(./#......LE9\/ 00E0: C8 10 0C 5F AF AC 1A 0E 87 31 29 2B 0E 8B 70 87 ..._.....1)+..p. 00F0: D3 7F 94 1A CA AE 1B E9 EB 50 35 54 87 9D 14 15 .........P5T.... } } ) javax.net.ssl|DEBUG|25|https-jsse-nio-8443-exec-5|2019-11-18 11:23:59.375 IST|Finished.java:1044|Consuming client Finished handshake message ( "Finished": { "verify data": { 0000: 9D 00 FA 18 8F E9 2D EF 46 00 5B AC 1D D0 39 D3 ......-.F.[...9. 0010: 5C 3C 94 E2 5D 11 BA 53 3D 63 C4 43 0C 68 44 3B \<..]..S=c.C.hD; }'} ) javax.net.ssl|DEBUG|25|https-jsse-nio-8443-exec-5|2019-11-18 11:23:59.376 IST|SSLCipher.java:1824|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE countdown value = 137438953472 javax.net.ssl|DEBUG|25|https-jsse-nio-8443-exec-5|2019-11-18 11:23:59.377 IST|Finished.java:1148|Sending new session ticket 18-Nov-2019 11:23:59.377 FINE [https-jsse-nio-8443-exec-5] org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun Error during SSL handshake java.io.IOException: NOT_HANDSHAKING during handshake at org.apache.tomcat.util.net.SecureNioChannel.handshake(SecureNioChannel.java:193) at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1556) at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49) at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128) at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628) at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61) at java.base/java.lang.Thread.run(Thread.java:834) 18-Nov-2019 11:23:59.466 FINE [https-jsse-nio-8443-exec-5] org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper.doClose Calling [org.apache.tomcat.util.net.NioEndpoint@42b2b293].closeSocket([org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper@7ceb72b7:org.apache.tomcat.util.net.SecureNioChannel@64ca208a:java.nio.channels.SocketChannel[connected local=/0:0:0:0:0:0:0:1:8443 remote=/0:0:0:0:0:0:0:1:62335]]) java.lang.Exception at org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper.doClose(NioEndpoint.java:1163) at org.apache.tomcat.util.net.SocketWrapperBase.close(SocketWrapperBase.java:402) at org.apache.tomcat.util.net.NioEndpoint$Poller.cancelledKey(NioEndpoint.java:665) at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1586) at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49) at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128) at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628) at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61) at java.base/java.lang.Thread.run(Thread.java:834) javax.net.ssl|ALL|25|https-jsse-nio-8443-exec-5|2019-11-18 11:23:59.466 IST|SSLEngineImpl.java:756|Closing outbound of SSLEngine javax.net.ssl|WARNING|25|https-jsse-nio-8443-exec-5|2019-11-18 11:23:59.467 IST|SSLEngineOutputRecord.java:168|outbound has closed, ignore outbound application data 18-Nov-2019 11:23:59.473 FINE [https-jsse-nio-8443-exec-2] org.apache.tomcat.util.net.SecureNioChannel.processSNI The SNI host name extracted for connection [java.nio.channels.SocketChannel[connected local=/0:0:0:0:0:0:0:1:8443 remote=/0:0:0:0:0:0:0:1:62336]] was [localhost] javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 11:23:59.474 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 for TLS10 javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 11:23:59.475 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 for TLS10 javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 11:23:59.475 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLS10 javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 11:23:59.475 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLS10 javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 11:23:59.476 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 for TLS13 javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 11:23:59.477 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 for TLS13 javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 11:23:59.477 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLS13 javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 11:23:59.477 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLS13 javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 11:23:59.477 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA for TLS13 javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 11:23:59.478 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA for TLS13 javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 11:23:59.478 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 for TLS11 javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 11:23:59.478 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 for TLS11 javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 11:23:59.478 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLS11 javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 11:23:59.478 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLS11 javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 11:23:59.481 IST|SSLExtensions.java:131|Ignore unknown or unsupported extension ( "unknown extension (28)": { 0000: 40 01 @. } ) javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 11:23:59.483 IST|SSLExtensions.java:131|Ignore unknown or unsupported extension ( "unknown extension (21)": { 0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0090: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ............... } ) javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 11:23:59.487 IST|ClientHello.java:806|Consuming ClientHello handshake message ( "ClientHello": { "client version" : "TLSv1.2", "random" : "63 E1 60 37 29 08 04 47 5D 30 6A AE 14 6C 42 02 FB 5B E1 89 3E 9B D8 DD A8 3E 7E 1E 1E 3A 7A 01", "session id" : "BD 9E FE 35 5E 66 6A B1 0E 3E A8 56 6A D6 18 1A 15 70 51 DA 18 B3 8B 68 10 4E CC EA 08 42 BC BD", "cipher suites" : "[TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_AES_256_GCM_SHA384(0x1302), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), UNKNOWN-CIPHER-SUITE(0xCCA9)(0xCCA9), UNKNOWN-CIPHER-SUITE(0xCCA8)(0xCCA8), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA(0xC00A), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA(0xC009), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA(0xC013), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA(0xC014), TLS_DHE_RSA_WITH_AES_128_CBC_SHA(0x0033), TLS_DHE_RSA_WITH_AES_256_CBC_SHA(0x0039), TLS_RSA_WITH_AES_128_CBC_SHA(0x002F), TLS_RSA_WITH_AES_256_CBC_SHA(0x0035), SSL_RSA_WITH_3DES_EDE_CBC_SHA(0x000A)]", "compression methods" : "00", "extensions" : [ "server_name (0)": { type=host_name (0), value=localhost }, "extended_master_secret (23)": { }, "renegotiation_info (65,281)": { "renegotiated connection": [] }, "supported_groups (10)": { "versions": [x25519, secp256r1, secp384r1, secp521r1, ffdhe2048, ffdhe3072] }, "ec_point_formats (11)": { "formats": [uncompressed] }, "application_layer_protocol_negotiation (16)": { [h2, http/1.1] }, "status_request (5)": { "certificate status type": ocsp "OCSP status request": { "responder_id": "request extensions": { } } }, "key_share (51)": { "client_shares": [ { "named group": x25519 "key_exchange": { 0000: F5 9E 4C CB 16 1E 5D F3 7F 03 B1 57 69 E4 4E 3E ..L...]....Wi.N> 0010: BB 46 B1 66 99 AC E0 78 F6 21 44 D6 68 41 50 33 .F.f...x.!D.hAP3 } }, { "named group": secp256r1 "key_exchange": { 0000: 04 F8 D8 DD F7 26 E2 86 C6 9D 4B FE B6 42 EE BC .....&....K..B.. 0010: 6B 3D EF 28 28 C9 96 10 6E 42 B5 3B 28 33 75 5F k=.((...nB.;(3u_ 0020: 2B 0D B0 A6 A6 57 2A 83 9E 3A 79 BF A7 71 22 4A +....W*..:y..q"J 0030: 47 F0 B3 9B EA 92 26 BA 7F 8C 8E D4 EA 06 44 41 G.....&.......DA 0040: BF } }, ] }, "supported_versions (43)": { "versions": [TLSv1.3, TLSv1.2, TLSv1.1, TLSv1] }, "signature_algorithms (13)": { "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1] }, "unknown extension (28)": { 0000: 40 01 @. }, "unknown extension (21)": { 0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0090: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ............... } ] } ) javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 11:23:59.487 IST|SSLExtensions.java:188|Consumed extension: supported_versions javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 11:23:59.488 IST|ClientHello.java:836|Negotiated protocol version: TLSv1.3 javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 11:23:59.488 IST|PskKeyExchangeModesExtension.java:294|abort session resumption, no supported psk_dhe_ke PSK key exchange mode javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 11:23:59.488 IST|PreSharedKeyExtension.java:809|Handling pre_shared_key absence. javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 11:23:59.488 IST|ServerNameExtension.java:328|no server name matchers, ignore server name indication javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 11:23:59.489 IST|SSLExtensions.java:188|Consumed extension: server_name javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 11:23:59.489 IST|SSLExtensions.java:169|Ignore unavailable extension: max_fragment_length javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 11:23:59.489 IST|SSLExtensions.java:188|Consumed extension: status_request javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 11:23:59.489 IST|SSLExtensions.java:188|Consumed extension: supported_groups javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 11:23:59.490 IST|SSLExtensions.java:159|Ignore unsupported extension: ec_point_formats javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 11:23:59.490 IST|SSLExtensions.java:188|Consumed extension: signature_algorithms javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 11:23:59.490 IST|SSLExtensions.java:169|Ignore unavailable extension: signature_algorithms_cert javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 11:23:59.490 IST|AlpnExtension.java:274|Ignore server unenabled extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 11:23:59.491 IST|SSLExtensions.java:188|Consumed extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 11:23:59.491 IST|SSLExtensions.java:159|Ignore unsupported extension: status_request_v2 javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 11:23:59.491 IST|SSLExtensions.java:159|Ignore unsupported extension: extended_master_secret javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 11:23:59.491 IST|SSLExtensions.java:169|Ignore unavailable extension: cookie javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 11:23:59.491 IST|KeyShareExtension.java:350|Ignore unsupported named group: x25519 javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 11:23:59.492 IST|SSLExtensions.java:188|Consumed extension: key_share javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 11:23:59.492 IST|SSLExtensions.java:159|Ignore unsupported extension: renegotiation_info javax.net.ssl|ALL|22|https-jsse-nio-8443-exec-2|2019-11-18 11:23:59.493 IST|SignatureScheme.java:360|Ignore disabled signature scheme: rsa_md5 javax.net.ssl|WARNING|22|https-jsse-nio-8443-exec-2|2019-11-18 11:23:59.493 IST|SSLExtensions.java:211|Ignore impact of unsupported extension: server_name javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 11:23:59.493 IST|SSLExtensions.java:203|Ignore unavailable extension: max_fragment_length javax.net.ssl|WARNING|22|https-jsse-nio-8443-exec-2|2019-11-18 11:23:59.494 IST|SSLExtensions.java:211|Ignore impact of unsupported extension: status_request javax.net.ssl|WARNING|22|https-jsse-nio-8443-exec-2|2019-11-18 11:23:59.494 IST|SSLExtensions.java:211|Ignore impact of unsupported extension: supported_groups javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 11:23:59.494 IST|SSLExtensions.java:220|Populated with extension: signature_algorithms javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 11:23:59.495 IST|SSLExtensions.java:203|Ignore unavailable extension: signature_algorithms_cert javax.net.ssl|WARNING|22|https-jsse-nio-8443-exec-2|2019-11-18 11:23:59.495 IST|SSLExtensions.java:211|Ignore impact of unsupported extension: application_layer_protocol_negotiation javax.net.ssl|WARNING|22|https-jsse-nio-8443-exec-2|2019-11-18 11:23:59.495 IST|SSLExtensions.java:211|Ignore impact of unsupported extension: supported_versions javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 11:23:59.496 IST|SSLExtensions.java:203|Ignore unavailable extension: cookie javax.net.ssl|WARNING|22|https-jsse-nio-8443-exec-2|2019-11-18 11:23:59.496 IST|SSLExtensions.java:211|Ignore impact of unsupported extension: key_share javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 11:23:59.496 IST|SSLExtensions.java:203|Ignore unavailable extension: pre_shared_key javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 11:23:59.496 IST|ServerHello.java:729|use cipher suite TLS_AES_128_GCM_SHA256 javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 11:23:59.501 IST|SSLExtensions.java:256|Ignore, context unavailable extension: pre_shared_key javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 11:23:59.502 IST|ServerHello.java:580|Produced ServerHello handshake message ( "ServerHello": { "server version" : "TLSv1.2", "random" : "A1 C0 BD D9 DD FF 34 3A F5 8F AC A6 96 99 68 5A BE 82 BF BE B5 A7 36 E8 03 32 DC CD 09 32 6B 48", "session id" : "BD 9E FE 35 5E 66 6A B1 0E 3E A8 56 6A D6 18 1A 15 70 51 DA 18 B3 8B 68 10 4E CC EA 08 42 BC BD", "cipher suite" : "TLS_AES_128_GCM_SHA256(0x1301)", "compression methods" : "00", "extensions" : [ "supported_versions (43)": { "selected version": [TLSv1.3] }, "key_share (51)": { "server_share": { "named group": secp256r1 "key_exchange": { 0000: 04 67 BE 60 48 95 9B 53 F3 1D 98 97 F5 45 E8 68 .g.`H..S.....E.h 0010: 7A 7B 1F 5B 5F 3E D5 91 D3 E7 61 78 C1 F3 28 05 z..[_>....ax..(. 0020: 2B C5 F5 F0 FE 9A D5 ED 35 93 F6 82 01 E0 38 7F +.......5.....8. 0030: 38 9A 7E 49 80 A2 29 BB AF 70 13 29 B5 26 D6 E3 8..I..)..p.).&.. 0040: 20 } }, } ] } ) javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 11:23:59.510 IST|SSLCipher.java:1824|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE countdown value = 137438953472 javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 11:23:59.511 IST|SSLCipher.java:1978|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE countdown value = 137438953472 javax.net.ssl|ALL|22|https-jsse-nio-8443-exec-2|2019-11-18 11:23:59.511 IST|ServerNameExtension.java:538|No expected server name indication response javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 11:23:59.511 IST|SSLExtensions.java:256|Ignore, context unavailable extension: server_name javax.net.ssl|ALL|22|https-jsse-nio-8443-exec-2|2019-11-18 11:23:59.512 IST|MaxFragExtension.java:471|Ignore unavailable max_fragment_length extension javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 11:23:59.512 IST|SSLExtensions.java:256|Ignore, context unavailable extension: max_fragment_length javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 11:23:59.513 IST|AlpnExtension.java:363|Ignore unavailable extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 11:23:59.513 IST|SSLExtensions.java:256|Ignore, context unavailable extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 11:23:59.513 IST|EncryptedExtensions.java:137|Produced EncryptedExtensions message ( "EncryptedExtensions": [ "supported_groups (10)": { "versions": [secp256r1, secp384r1, secp521r1, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192] } ] ) javax.net.ssl|ALL|22|https-jsse-nio-8443-exec-2|2019-11-18 11:23:59.514 IST|SignatureScheme.java:365|Ignore inactive signature scheme: dsa_sha256 javax.net.ssl|ALL|22|https-jsse-nio-8443-exec-2|2019-11-18 11:23:59.514 IST|SignatureScheme.java:365|Ignore inactive signature scheme: dsa_sha1 javax.net.ssl|ALL|22|https-jsse-nio-8443-exec-2|2019-11-18 11:23:59.515 IST|SignatureScheme.java:365|Ignore inactive signature scheme: rsa_md5 javax.net.ssl|ALL|22|https-jsse-nio-8443-exec-2|2019-11-18 11:23:59.515 IST|SignatureScheme.java:365|Ignore inactive signature scheme: dsa_sha256 javax.net.ssl|ALL|22|https-jsse-nio-8443-exec-2|2019-11-18 11:23:59.515 IST|SignatureScheme.java:365|Ignore inactive signature scheme: dsa_sha1 javax.net.ssl|ALL|22|https-jsse-nio-8443-exec-2|2019-11-18 11:23:59.516 IST|SignatureScheme.java:365|Ignore inactive signature scheme: rsa_md5 javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 11:23:59.517 IST|CertificateRequest.java:882|Produced CertificateRequest message ( "CertificateRequest": { "certificate_request_context": "", "extensions": [ "signature_algorithms (13)": { "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1] }, "signature_algorithms_cert (50)": { "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1] } ] } ) javax.net.ssl|ALL|22|https-jsse-nio-8443-exec-2|2019-11-18 11:23:59.517 IST|X509Authentication.java:264|No X.509 cert selected for EC javax.net.ssl|WARNING|22|https-jsse-nio-8443-exec-2|2019-11-18 11:23:59.517 IST|CertificateMessage.java:1063|Unavailable authentication scheme: ecdsa_secp256r1_sha256 javax.net.ssl|ALL|22|https-jsse-nio-8443-exec-2|2019-11-18 11:23:59.518 IST|X509Authentication.java:264|No X.509 cert selected for EC javax.net.ssl|WARNING|22|https-jsse-nio-8443-exec-2|2019-11-18 11:23:59.518 IST|CertificateMessage.java:1063|Unavailable authentication scheme: ecdsa_secp384r1_sha384 javax.net.ssl|ALL|22|https-jsse-nio-8443-exec-2|2019-11-18 11:23:59.518 IST|X509Authentication.java:264|No X.509 cert selected for EC javax.net.ssl|WARNING|22|https-jsse-nio-8443-exec-2|2019-11-18 11:23:59.518 IST|CertificateMessage.java:1063|Unavailable authentication scheme: ecdsa_secp521r1_sha512 javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 11:23:59.519 IST|StatusResponseManager.java:763|Staping disabled or is a resumed session javax.net.ssl|ALL|22|https-jsse-nio-8443-exec-2|2019-11-18 11:23:59.519 IST|CertStatusExtension.java:1117|Stapling is disabled for this connection javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 11:23:59.519 IST|SSLExtensions.java:256|Ignore, context unavailable extension: status_request javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 11:23:59.520 IST|CertificateMessage.java:1002|Produced server Certificate message ( "Certificate": { "certificate_request_context": "", "certificate_list": [ { "certificate" : { "version" : "v3", "serial number" : "3B FD 86 4A 58 09 72 F6", "signature algorithm": "SHA512withRSA", "issuer" : "CN=localhost", "not before" : "2019-11-05 13:41:52.000 IST", "not after" : "2020-11-05 13:41:52.000 IST", "subject" : "CN=localhost", "subject public key" : "RSA", "extensions" : [ { ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:false PathLen:2147483647 ] }, { ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_Encipherment Data_Encipherment ] } ]} "extensions": { } }, ] } ) javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 11:23:59.608 IST|CertificateVerify.java:1113|Produced server CertificateVerify handshake message ( "CertificateVerify": { "signature algorithm": rsa_pss_rsae_sha256 "signature": { 0000: 89 3E 7A CE DB ED 0D BC 34 FB 9B 69 80 F0 18 4F .>z.....4..i...O 0010: AF 2D C6 05 0C 30 53 5A 0E A2 38 B5 02 7A 78 21 .-...0SZ..8..zx! 0020: 44 26 74 AF 45 0D 91 C3 0A 85 BD 75 5D 67 23 B0 D&t.E......u]g#. 0030: 74 F1 A1 12 12 FA CE 6C D1 9C ED CE 97 91 59 1B t......l......Y. 0040: C0 A1 65 46 09 38 8E 51 8F 93 C0 95 56 7C DC 19 ..eF.8.Q....V... 0050: A5 3F 86 B2 5D 9C 59 5C 68 8E 4C F6 7F 96 00 A2 .?..].Y\h.L..... 0060: 52 58 8B EF 71 40 90 CA 49 71 52 2B 60 82 28 78 RX..q@..IqR+`.(x 0070: 7E FC 48 60 55 64 CF 5D 35 48 D6 D2 A2 2F D4 1B ..H`Ud.]5H.../.. 0080: 75 10 9A 3C 65 34 37 89 E7 B1 AE 29 9F BC F9 CF u.. } }, ] } ) javax.net.ssl|DEBUG|2A|https-jsse-nio-8443-exec-10|2019-11-18 11:23:59.691 IST|CertificateVerify.java:1165|Consuming CertificateVerify handshake message ( "CertificateVerify": { "signature algorithm": rsa_pss_rsae_sha256 "signature": { 0000: 3D 28 4D 76 A7 EE 4E 5B 77 A3 A4 BF 2E 4A C5 04 =(Mv..N[w....J.. 0010: C7 DC E4 3F F6 29 98 53 61 FD 75 EE CA 94 4F A5 ...?.).Sa.u...O. 0020: 98 46 11 80 B5 9D 17 70 CC 91 F0 E2 4F D9 F9 C2 .F.....p....O... 0030: 02 72 EE DF 70 D0 CF CA CA 78 76 68 39 62 FC D7 .r..p....xvh9b.. 0040: EF A8 6C 31 2A 6A 1D 2C DB BC F6 9F 52 EE 50 A2 ..l1*j.,....R.P. 0050: C7 74 7F 8B 34 A8 FF E8 4C D1 B1 B6 87 CA C3 34 .t..4...L......4 0060: CE E6 99 F4 D3 5B 21 94 B6 93 FE AA AE B8 88 32 .....[!........2 0070: F5 B0 BF 5F F1 30 27 36 C0 0B CD 41 4B 23 41 17 ..._.0'6...AK#A. 0080: 14 83 C0 54 6B 14 38 74 8C 6A 4A 9D CC 11 4E 14 ...Tk.8t.jJ...N. 0090: A6 41 CB 6D FE 48 1C B9 BE 3F E6 47 C3 4F AA 0B .A.m.H...?.G.O.. 00A0: 8F C7 CF C8 DC 24 6F 1D 60 2A 9F 67 C3 16 3B 1C .....$o.`*.g..;. 00B0: 93 E0 7E DA 6D 79 C5 A3 DE E7 BB EB D6 7C 78 7C ....my........x. 00C0: 06 0D EA FA 44 A2 3A 2E 08 92 C0 9A 45 88 E6 4D ....D.:.....E..M 00D0: 7C 0F 5C A5 1B 83 B6 23 27 B0 EE 5D 09 5B 80 9F ..\....#'..].[.. 00E0: A4 FE AB F6 D4 93 99 13 01 BC B6 D0 E9 C7 4B E9 ..............K. 00F0: EA F0 24 74 E8 32 D3 30 03 74 FE F7 3F 32 83 C9 ..$t.2.0.t..?2.. } } ) javax.net.ssl|DEBUG|2A|https-jsse-nio-8443-exec-10|2019-11-18 11:23:59.692 IST|Finished.java:1044|Consuming client Finished handshake message ( "Finished": { "verify data": { 0000: 25 E2 EF 9D 52 EC 62 C5 39 99 4D 61 AC 3B FA FC %...R.b.9.Ma.;.. 0010: 37 E0 01 DE 04 F9 00 0F 46 72 4A 5F 8F 33 5D 4E 7.......FrJ_.3]N }'} ) javax.net.ssl|DEBUG|2A|https-jsse-nio-8443-exec-10|2019-11-18 11:23:59.693 IST|SSLCipher.java:1824|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE countdown value = 137438953472 javax.net.ssl|DEBUG|2A|https-jsse-nio-8443-exec-10|2019-11-18 11:23:59.694 IST|Finished.java:1148|Sending new session ticket 18-Nov-2019 11:23:59.694 FINE [https-jsse-nio-8443-exec-10] org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun Error during SSL handshake java.io.IOException: NOT_HANDSHAKING during handshake at org.apache.tomcat.util.net.SecureNioChannel.handshake(SecureNioChannel.java:193) at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1556) at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49) at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128) at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628) at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61) at java.base/java.lang.Thread.run(Thread.java:834) 18-Nov-2019 11:23:59.696 FINE [https-jsse-nio-8443-exec-10] org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper.doClose Calling [org.apache.tomcat.util.net.NioEndpoint@42b2b293].closeSocket([org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper@3f42c705:org.apache.tomcat.util.net.SecureNioChannel@64ca208a:java.nio.channels.SocketChannel[connected local=/0:0:0:0:0:0:0:1:8443 remote=/0:0:0:0:0:0:0:1:62336]]) java.lang.Exception at org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper.doClose(NioEndpoint.java:1163) at org.apache.tomcat.util.net.SocketWrapperBase.close(SocketWrapperBase.java:402) at org.apache.tomcat.util.net.NioEndpoint$Poller.cancelledKey(NioEndpoint.java:665) at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1586) at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49) at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128) at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628) at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61) at java.base/java.lang.Thread.run(Thread.java:834) javax.net.ssl|ALL|2A|https-jsse-nio-8443-exec-10|2019-11-18 11:23:59.697 IST|SSLEngineImpl.java:756|Closing outbound of SSLEngine javax.net.ssl|WARNING|2A|https-jsse-nio-8443-exec-10|2019-11-18 11:23:59.697 IST|SSLEngineOutputRecord.java:168|outbound has closed, ignore outbound application data 18-Nov-2019 11:23:59.723 FINE [https-jsse-nio-8443-exec-4] org.apache.tomcat.util.net.SecureNioChannel.processSNI The SNI host name extracted for connection [java.nio.channels.SocketChannel[connected local=/0:0:0:0:0:0:0:1:8443 remote=/0:0:0:0:0:0:0:1:62337]] was [localhost] javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:23:59.725 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 for TLS10 javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:23:59.725 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 for TLS10 javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:23:59.725 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLS10 javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:23:59.725 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLS10 javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:23:59.727 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 for TLS13 javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:23:59.727 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 for TLS13 javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:23:59.727 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLS13 javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:23:59.731 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLS13 javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:23:59.731 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA for TLS13 javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:23:59.731 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA for TLS13 javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:23:59.731 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 for TLS11 javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:23:59.733 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 for TLS11 javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:23:59.733 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLS11 javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:23:59.733 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLS11 javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:23:59.738 IST|SSLExtensions.java:131|Ignore unknown or unsupported extension ( "unknown extension (28)": { 0000: 40 01 @. } ) javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:23:59.739 IST|SSLExtensions.java:131|Ignore unknown or unsupported extension ( "unknown extension (21)": { 0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0090: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ............... } ) javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:23:59.743 IST|ClientHello.java:806|Consuming ClientHello handshake message ( "ClientHello": { "client version" : "TLSv1.2", "random" : "B4 6B E4 69 02 14 F1 FB 17 17 4F 43 C0 0F 71 0C 5E F5 F1 72 85 88 37 6F B8 95 A8 26 94 56 CB 05", "session id" : "0E 79 5D C6 C8 DC CD C8 DF F6 45 88 48 57 C8 D4 32 27 18 8A 0F 97 CE 3D F5 8A 32 58 EC 42 0D 12", "cipher suites" : "[TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_AES_256_GCM_SHA384(0x1302), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), UNKNOWN-CIPHER-SUITE(0xCCA9)(0xCCA9), UNKNOWN-CIPHER-SUITE(0xCCA8)(0xCCA8), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA(0xC00A), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA(0xC009), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA(0xC013), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA(0xC014), TLS_DHE_RSA_WITH_AES_128_CBC_SHA(0x0033), TLS_DHE_RSA_WITH_AES_256_CBC_SHA(0x0039), TLS_RSA_WITH_AES_128_CBC_SHA(0x002F), TLS_RSA_WITH_AES_256_CBC_SHA(0x0035), SSL_RSA_WITH_3DES_EDE_CBC_SHA(0x000A)]", "compression methods" : "00", "extensions" : [ "server_name (0)": { type=host_name (0), value=localhost }, "extended_master_secret (23)": { }, "renegotiation_info (65,281)": { "renegotiated connection": [] }, "supported_groups (10)": { "versions": [x25519, secp256r1, secp384r1, secp521r1, ffdhe2048, ffdhe3072] }, "ec_point_formats (11)": { "formats": [uncompressed] }, "application_layer_protocol_negotiation (16)": { [h2, http/1.1] }, "status_request (5)": { "certificate status type": ocsp "OCSP status request": { "responder_id": "request extensions": { } } }, "key_share (51)": { "client_shares": [ { "named group": x25519 "key_exchange": { 0000: AC 62 4B 12 71 BD CB 85 6E 02 8B 0E 5A 6A 4D 7A .bK.q...n...ZjMz 0010: 86 84 8B CB C4 C3 FC A3 02 8D 39 6A AA A6 68 12 ..........9j..h. } }, { "named group": secp256r1 "key_exchange": { 0000: 04 17 87 94 01 65 97 FE 27 DD D2 72 00 D1 C6 BD .....e..'..r.... 0010: D3 E0 E3 0B 9A 99 F0 48 0A C3 99 6E 5B 14 0F 4D .......H...n[..M 0020: 4A DB 66 A3 1B CF 59 8A F7 65 13 6F B3 41 BE D2 J.f...Y..e.o.A.. 0030: B3 EB E5 1E B8 81 5E 1D 07 8B E1 DC B2 E0 42 F0 ......^.......B. 0040: 4C } }, ] }, "supported_versions (43)": { "versions": [TLSv1.3, TLSv1.2, TLSv1.1, TLSv1] }, "signature_algorithms (13)": { "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1] }, "unknown extension (28)": { 0000: 40 01 @. }, "unknown extension (21)": { 0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0090: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ............... } ] } ) javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:23:59.743 IST|SSLExtensions.java:188|Consumed extension: supported_versions javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:23:59.743 IST|ClientHello.java:836|Negotiated protocol version: TLSv1.3 javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:23:59.744 IST|PskKeyExchangeModesExtension.java:294|abort session resumption, no supported psk_dhe_ke PSK key exchange mode javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:23:59.744 IST|PreSharedKeyExtension.java:809|Handling pre_shared_key absence. javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:23:59.744 IST|ServerNameExtension.java:328|no server name matchers, ignore server name indication javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:23:59.744 IST|SSLExtensions.java:188|Consumed extension: server_name javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:23:59.744 IST|SSLExtensions.java:169|Ignore unavailable extension: max_fragment_length javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:23:59.745 IST|SSLExtensions.java:188|Consumed extension: status_request javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:23:59.745 IST|SSLExtensions.java:188|Consumed extension: supported_groups javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:23:59.745 IST|SSLExtensions.java:159|Ignore unsupported extension: ec_point_formats javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:23:59.745 IST|SSLExtensions.java:188|Consumed extension: signature_algorithms javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:23:59.745 IST|SSLExtensions.java:169|Ignore unavailable extension: signature_algorithms_cert javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:23:59.745 IST|AlpnExtension.java:274|Ignore server unenabled extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:23:59.746 IST|SSLExtensions.java:188|Consumed extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:23:59.746 IST|SSLExtensions.java:159|Ignore unsupported extension: status_request_v2 javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:23:59.746 IST|SSLExtensions.java:159|Ignore unsupported extension: extended_master_secret javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:23:59.746 IST|SSLExtensions.java:169|Ignore unavailable extension: cookie javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:23:59.746 IST|KeyShareExtension.java:350|Ignore unsupported named group: x25519 javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:23:59.747 IST|SSLExtensions.java:188|Consumed extension: key_share javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:23:59.747 IST|SSLExtensions.java:159|Ignore unsupported extension: renegotiation_info javax.net.ssl|ALL|24|https-jsse-nio-8443-exec-4|2019-11-18 11:23:59.747 IST|SignatureScheme.java:360|Ignore disabled signature scheme: rsa_md5 javax.net.ssl|WARNING|24|https-jsse-nio-8443-exec-4|2019-11-18 11:23:59.748 IST|SSLExtensions.java:211|Ignore impact of unsupported extension: server_name javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:23:59.748 IST|SSLExtensions.java:203|Ignore unavailable extension: max_fragment_length javax.net.ssl|WARNING|24|https-jsse-nio-8443-exec-4|2019-11-18 11:23:59.748 IST|SSLExtensions.java:211|Ignore impact of unsupported extension: status_request javax.net.ssl|WARNING|24|https-jsse-nio-8443-exec-4|2019-11-18 11:23:59.748 IST|SSLExtensions.java:211|Ignore impact of unsupported extension: supported_groups javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:23:59.748 IST|SSLExtensions.java:220|Populated with extension: signature_algorithms javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:23:59.749 IST|SSLExtensions.java:203|Ignore unavailable extension: signature_algorithms_cert javax.net.ssl|WARNING|24|https-jsse-nio-8443-exec-4|2019-11-18 11:23:59.749 IST|SSLExtensions.java:211|Ignore impact of unsupported extension: application_layer_protocol_negotiation javax.net.ssl|WARNING|24|https-jsse-nio-8443-exec-4|2019-11-18 11:23:59.749 IST|SSLExtensions.java:211|Ignore impact of unsupported extension: supported_versions javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:23:59.749 IST|SSLExtensions.java:203|Ignore unavailable extension: cookie javax.net.ssl|WARNING|24|https-jsse-nio-8443-exec-4|2019-11-18 11:23:59.749 IST|SSLExtensions.java:211|Ignore impact of unsupported extension: key_share javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:23:59.749 IST|SSLExtensions.java:203|Ignore unavailable extension: pre_shared_key javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:23:59.750 IST|ServerHello.java:729|use cipher suite TLS_AES_128_GCM_SHA256 javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:23:59.753 IST|SSLExtensions.java:256|Ignore, context unavailable extension: pre_shared_key javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:23:59.755 IST|ServerHello.java:580|Produced ServerHello handshake message ( "ServerHello": { "server version" : "TLSv1.2", "random" : "BD 99 1C 1F 23 77 BF 92 D8 B5 47 68 F4 CC 05 FC EE 99 3A EC FE 80 17 F7 51 84 21 30 78 BB 6E C7", "session id" : "0E 79 5D C6 C8 DC CD C8 DF F6 45 88 48 57 C8 D4 32 27 18 8A 0F 97 CE 3D F5 8A 32 58 EC 42 0D 12", "cipher suite" : "TLS_AES_128_GCM_SHA256(0x1301)", "compression methods" : "00", "extensions" : [ "supported_versions (43)": { "selected version": [TLSv1.3] }, "key_share (51)": { "server_share": { "named group": secp256r1 "key_exchange": { 0000: 04 62 EB FC 0A 1C 23 86 D8 2F EC 1B 45 63 84 71 .b....#../..Ec.q 0010: A0 C0 35 8B 35 EC 9A 7A A9 EC 56 0C B0 12 B3 9A ..5.5..z..V..... 0020: 35 C4 33 7E 93 42 96 77 D0 B5 0E BD 7C C3 79 E2 5.3..B.w......y. 0030: 8E BF C9 6F D7 73 9A 6E AF 2D 54 1D D9 9D A9 0C ...o.s.n.-T..... 0040: 9C } }, } ] } ) javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:23:59.772 IST|SSLCipher.java:1824|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE countdown value = 137438953472 javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:23:59.773 IST|SSLCipher.java:1978|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE countdown value = 137438953472 javax.net.ssl|ALL|24|https-jsse-nio-8443-exec-4|2019-11-18 11:23:59.773 IST|ServerNameExtension.java:538|No expected server name indication response javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:23:59.773 IST|SSLExtensions.java:256|Ignore, context unavailable extension: server_name javax.net.ssl|ALL|24|https-jsse-nio-8443-exec-4|2019-11-18 11:23:59.780 IST|MaxFragExtension.java:471|Ignore unavailable max_fragment_length extension javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:23:59.783 IST|SSLExtensions.java:256|Ignore, context unavailable extension: max_fragment_length javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:23:59.784 IST|AlpnExtension.java:363|Ignore unavailable extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:23:59.784 IST|SSLExtensions.java:256|Ignore, context unavailable extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:23:59.785 IST|EncryptedExtensions.java:137|Produced EncryptedExtensions message ( "EncryptedExtensions": [ "supported_groups (10)": { "versions": [secp256r1, secp384r1, secp521r1, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192] } ] ) javax.net.ssl|ALL|24|https-jsse-nio-8443-exec-4|2019-11-18 11:23:59.786 IST|SignatureScheme.java:365|Ignore inactive signature scheme: dsa_sha256 javax.net.ssl|ALL|24|https-jsse-nio-8443-exec-4|2019-11-18 11:23:59.786 IST|SignatureScheme.java:365|Ignore inactive signature scheme: dsa_sha1 javax.net.ssl|ALL|24|https-jsse-nio-8443-exec-4|2019-11-18 11:23:59.787 IST|SignatureScheme.java:365|Ignore inactive signature scheme: rsa_md5 javax.net.ssl|ALL|24|https-jsse-nio-8443-exec-4|2019-11-18 11:23:59.789 IST|SignatureScheme.java:365|Ignore inactive signature scheme: dsa_sha256 javax.net.ssl|ALL|24|https-jsse-nio-8443-exec-4|2019-11-18 11:23:59.789 IST|SignatureScheme.java:365|Ignore inactive signature scheme: dsa_sha1 javax.net.ssl|ALL|24|https-jsse-nio-8443-exec-4|2019-11-18 11:23:59.789 IST|SignatureScheme.java:365|Ignore inactive signature scheme: rsa_md5 javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:23:59.791 IST|CertificateRequest.java:882|Produced CertificateRequest message ( "CertificateRequest": { "certificate_request_context": "", "extensions": [ "signature_algorithms (13)": { "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1] }, "signature_algorithms_cert (50)": { "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1] } ] } ) javax.net.ssl|ALL|24|https-jsse-nio-8443-exec-4|2019-11-18 11:23:59.794 IST|X509Authentication.java:264|No X.509 cert selected for EC javax.net.ssl|WARNING|24|https-jsse-nio-8443-exec-4|2019-11-18 11:23:59.795 IST|CertificateMessage.java:1063|Unavailable authentication scheme: ecdsa_secp256r1_sha256 javax.net.ssl|ALL|24|https-jsse-nio-8443-exec-4|2019-11-18 11:23:59.797 IST|X509Authentication.java:264|No X.509 cert selected for EC javax.net.ssl|WARNING|24|https-jsse-nio-8443-exec-4|2019-11-18 11:23:59.809 IST|CertificateMessage.java:1063|Unavailable authentication scheme: ecdsa_secp384r1_sha384 javax.net.ssl|ALL|24|https-jsse-nio-8443-exec-4|2019-11-18 11:23:59.810 IST|X509Authentication.java:264|No X.509 cert selected for EC javax.net.ssl|WARNING|24|https-jsse-nio-8443-exec-4|2019-11-18 11:23:59.810 IST|CertificateMessage.java:1063|Unavailable authentication scheme: ecdsa_secp521r1_sha512 javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:23:59.810 IST|StatusResponseManager.java:763|Staping disabled or is a resumed session javax.net.ssl|ALL|24|https-jsse-nio-8443-exec-4|2019-11-18 11:23:59.810 IST|CertStatusExtension.java:1117|Stapling is disabled for this connection javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:23:59.810 IST|SSLExtensions.java:256|Ignore, context unavailable extension: status_request javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:23:59.811 IST|CertificateMessage.java:1002|Produced server Certificate message ( "Certificate": { "certificate_request_context": "", "certificate_list": [ { "certificate" : { "version" : "v3", "serial number" : "3B FD 86 4A 58 09 72 F6", "signature algorithm": "SHA512withRSA", "issuer" : "CN=localhost", "not before" : "2019-11-05 13:41:52.000 IST", "not after" : "2020-11-05 13:41:52.000 IST", "subject" : "CN=localhost", "subject public key" : "RSA", "extensions" : [ { ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:false PathLen:2147483647 ] }, { ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_Encipherment Data_Encipherment ] } ]} "extensions": { } }, ] } ) javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:23:59.835 IST|CertificateVerify.java:1113|Produced server CertificateVerify handshake message ( "CertificateVerify": { "signature algorithm": rsa_pss_rsae_sha256 "signature": { 0000: 54 33 CF 48 B2 CE 11 2E 67 5A F0 38 A2 8C 61 BB T3.H....gZ.8..a. 0010: A8 9C 6A 04 01 57 50 64 78 2D BB 45 48 13 8E 45 ..j..WPdx-.EH..E 0020: B1 F5 74 9A 96 5A 35 A7 36 4E E7 20 0C 98 2F EF ..t..Z5.6N. ../. 0030: 28 E0 D8 92 CE 0F 91 99 C8 DC FE E9 AC 11 5F 47 (............._G 0040: 53 DF 8F 1B 7A BC 73 55 62 A4 D0 3D 43 BF EF E6 S...z.sUb..=C... 0050: 4F 95 26 D1 73 63 D8 75 16 FF 84 F9 B4 F5 BC 97 O.&.sc.u........ 0060: 13 F1 3C 1A A7 7C C7 AC 5E 7B B3 D5 91 4D DF 83 ..<.....^....M.. 0070: 83 61 12 57 55 82 46 F6 12 44 30 A9 D6 80 DD D4 .a.WU.F..D0..... 0080: 0E 18 54 F1 D0 AD 6C 6B 58 8C 1F 08 90 B7 AA D6 ..T...lkX....... 0090: 55 A7 6C 58 9F 68 38 C9 F9 8C 11 61 37 FB 20 07 U.lX.h8....a7. . 00A0: 1B B2 EC 72 EC 33 69 C9 97 8D 6C B2 B4 86 8A 9B ...r.3i...l..... 00B0: 32 8D 58 63 A7 4A B9 73 0B 14 18 A3 39 84 96 99 2.Xc.J.s....9... 00C0: 10 6E 17 1C 32 96 DF 11 16 70 D6 41 8D 46 29 B5 .n..2....p.A.F). 00D0: A9 E7 4D 9B 43 E7 29 3C 8B A7 CB BA 33 5B 1D 4F ..M.C.)<....3[.O 00E0: F9 AF 8D CB C1 C0 8F 42 6D 47 32 5B ED 90 01 AD .......BmG2[.... 00F0: A8 48 DC 0F 8E 56 80 84 20 AA EB 59 FA 99 D3 4B .H...V.. ..Y...K } } ) javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:23:59.836 IST|Finished.java:773|Produced server Finished handshake message ( "Finished": { "verify data": { 0000: A2 9D D3 CB C5 20 12 46 C8 9C 1A 3E F8 31 16 FE ..... .F...>.1.. 0010: 1F 82 C9 0E 01 BE 18 AC 08 58 85 1F C3 F5 7D 6F .........X.....o }'} ) javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:23:59.837 IST|SSLCipher.java:1978|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE countdown value = 137438953472 javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 11:23:59.880 IST|ChangeCipherSpec.java:250|Consuming ChangeCipherSpec message javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 11:23:59.882 IST|CertificateMessage.java:1158|Consuming client Certificate handshake message ( "Certificate": { "certificate_request_context": "", "certificate_list": [ { "certificate" : { "version" : "v3", "serial number" : "2C 8B E3 32 BC 02 24 C0", "signature algorithm": "SHA512withRSA", "issuer" : "CN=client", "not before" : "2019-11-05 13:43:21.000 IST", "not after" : "2020-11-05 13:43:21.000 IST", "subject" : "CN=client", "subject public key" : "RSA", "extensions" : [ { ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:false PathLen:2147483647 ] }, { ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_Encipherment Data_Encipherment ] } ]} "extensions": { } }, ] } ) javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 11:23:59.884 IST|CertificateVerify.java:1165|Consuming CertificateVerify handshake message ( "CertificateVerify": { "signature algorithm": rsa_pss_rsae_sha256 "signature": { 0000: 30 B7 86 37 F3 18 46 F1 7B 15 44 8A CF 5E CB EB 0..7..F...D..^.. 0010: E2 CE 22 F7 FD 25 9D 33 AF BA 3B F1 B3 A1 77 1A .."..%.3..;...w. 0020: 80 F9 53 E5 97 5B 76 7D 92 6B FE 29 10 8D A5 67 ..S..[v..k.)...g 0030: 41 D5 3A 12 8E 34 11 3E 95 3D 24 56 DE A5 61 9C A.:..4.>.=$V..a. 0040: 48 3F 43 B2 DD EF 04 E2 7F 89 71 C9 4C 55 BB 1B H?C.......q.LU.. 0050: 8E 15 AB 0C A0 C0 B7 D5 5D 90 C0 FA 80 A9 77 73 ........].....ws 0060: BF 06 E5 28 EF 5D A7 DD E7 98 E7 0B 61 DE 47 05 ...(.]......a.G. 0070: C7 98 49 15 DB 5E 04 CD 41 F9 F4 5C 11 8D 8F 47 ..I..^..A..\...G 0080: 47 14 2D 2D AD 31 7C 62 B0 04 29 F4 8A 70 6C A2 G.--.1.b..)..pl. 0090: 58 93 3E A0 92 C3 23 2C EB 30 F1 C9 3F F3 3E 5F X.>...#,.0..?.>_ 00A0: E8 FE FB 01 59 FD 66 0C C9 0C 1D 84 E9 FF 00 77 ....Y.f........w 00B0: A3 FC 63 53 DF FE 62 BA 24 33 BA CC 41 00 5A 80 ..cS..b.$3..A.Z. 00C0: 39 8A 24 BB 5C 55 26 BC 66 17 CE 54 DE 71 74 AE 9.$.\U&.f..T.qt. 00D0: 6C E9 10 70 AF 56 F3 41 C4 EB 81 81 88 B7 33 92 l..p.V.A......3. 00E0: E3 5D 7B CC FD 9C 6C 93 AB 00 69 90 84 83 4C A8 .]....l...i...L. 00F0: 0B 99 44 38 B8 3B 13 C4 46 95 6B 7D D4 EF 8C 24 ..D8.;..F.k....$ } } ) javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 11:23:59.885 IST|Finished.java:1044|Consuming client Finished handshake message ( "Finished": { "verify data": { 0000: ED C9 D0 65 09 3D 2B 15 C9 A8 7D ED 0E 62 9B 2F ...e.=+......b./ 0010: 04 88 A0 66 DB A7 32 4D 13 AF 58 8C 7E 28 3D 27 ...f..2M..X..(=' }'} ) javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 11:23:59.886 IST|SSLCipher.java:1824|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE countdown value = 137438953472 javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 11:23:59.886 IST|Finished.java:1148|Sending new session ticket 18-Nov-2019 11:23:59.887 FINE [https-jsse-nio-8443-exec-1] org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun Error during SSL handshake java.io.IOException: NOT_HANDSHAKING during handshake at org.apache.tomcat.util.net.SecureNioChannel.handshake(SecureNioChannel.java:193) at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1556) at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49) at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128) at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628) at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61) at java.base/java.lang.Thread.run(Thread.java:834) 18-Nov-2019 11:23:59.888 FINE [https-jsse-nio-8443-exec-1] org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper.doClose Calling [org.apache.tomcat.util.net.NioEndpoint@42b2b293].closeSocket([org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper@4ea04aa0:org.apache.tomcat.util.net.SecureNioChannel@64ca208a:java.nio.channels.SocketChannel[connected local=/0:0:0:0:0:0:0:1:8443 remote=/0:0:0:0:0:0:0:1:62337]]) java.lang.Exception at org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper.doClose(NioEndpoint.java:1163) at org.apache.tomcat.util.net.SocketWrapperBase.close(SocketWrapperBase.java:402) at org.apache.tomcat.util.net.NioEndpoint$Poller.cancelledKey(NioEndpoint.java:665) at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1586) at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49) at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128) at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628) at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61) at java.base/java.lang.Thread.run(Thread.java:834) javax.net.ssl|ALL|21|https-jsse-nio-8443-exec-1|2019-11-18 11:23:59.889 IST|SSLEngineImpl.java:756|Closing outbound of SSLEngine javax.net.ssl|WARNING|21|https-jsse-nio-8443-exec-1|2019-11-18 11:23:59.889 IST|SSLEngineOutputRecord.java:168|outbound has closed, ignore outbound application data 18-Nov-2019 11:23:59.899 FINE [https-jsse-nio-8443-exec-3] org.apache.tomcat.util.net.SecureNioChannel.processSNI The SNI host name extracted for connection [java.nio.channels.SocketChannel[connected local=/0:0:0:0:0:0:0:1:8443 remote=/0:0:0:0:0:0:0:1:62338]] was [localhost] javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:59.900 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 for TLS10 javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:59.900 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 for TLS10 javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:59.900 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLS10 javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:59.901 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLS10 javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:59.901 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 for TLS13 javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:59.901 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 for TLS13 javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:59.901 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLS13 javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:59.901 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLS13 javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:59.901 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA for TLS13 javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:59.901 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA for TLS13 javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:59.902 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 for TLS11 javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:59.902 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 for TLS11 javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:59.902 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLS11 javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:59.902 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLS11 javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:59.905 IST|SSLExtensions.java:131|Ignore unknown or unsupported extension ( "unknown extension (28)": { 0000: 40 01 @. } ) javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:59.906 IST|SSLExtensions.java:131|Ignore unknown or unsupported extension ( "unknown extension (21)": { 0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0090: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ............... } ) javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:59.909 IST|ClientHello.java:806|Consuming ClientHello handshake message ( "ClientHello": { "client version" : "TLSv1.2", "random" : "2A 73 AD E1 EB AF 7E 2E D0 9E F9 6E AB C1 AE 30 32 F2 8B A8 AC 29 2C F1 A1 09 DB 0B 5E 3C F1 9E", "session id" : "84 F7 A4 85 70 1F 9D CB 9B 39 32 A0 4B 0C BA EA 1C 0E 99 41 ED 16 42 33 D4 DD B8 C3 21 5D 4E EC", "cipher suites" : "[TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_AES_256_GCM_SHA384(0x1302), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), UNKNOWN-CIPHER-SUITE(0xCCA9)(0xCCA9), UNKNOWN-CIPHER-SUITE(0xCCA8)(0xCCA8), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA(0xC00A), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA(0xC009), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA(0xC013), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA(0xC014), TLS_DHE_RSA_WITH_AES_128_CBC_SHA(0x0033), TLS_DHE_RSA_WITH_AES_256_CBC_SHA(0x0039), TLS_RSA_WITH_AES_128_CBC_SHA(0x002F), TLS_RSA_WITH_AES_256_CBC_SHA(0x0035), SSL_RSA_WITH_3DES_EDE_CBC_SHA(0x000A)]", "compression methods" : "00", "extensions" : [ "server_name (0)": { type=host_name (0), value=localhost }, "extended_master_secret (23)": { }, "renegotiation_info (65,281)": { "renegotiated connection": [] }, "supported_groups (10)": { "versions": [x25519, secp256r1, secp384r1, secp521r1, ffdhe2048, ffdhe3072] }, "ec_point_formats (11)": { "formats": [uncompressed] }, "application_layer_protocol_negotiation (16)": { [h2, http/1.1] }, "status_request (5)": { "certificate status type": ocsp "OCSP status request": { "responder_id": "request extensions": { } } }, "key_share (51)": { "client_shares": [ { "named group": x25519 "key_exchange": { 0000: E3 77 E5 0A 58 68 EB 1E 0F D2 6D D4 39 94 A5 7E .w..Xh....m.9... 0010: 85 B0 A5 17 1F A8 B9 29 2F 2D 38 CE 50 7B 8D 65 .......)/-8.P..e } }, { "named group": secp256r1 "key_exchange": { 0000: 04 8E 9E DA A2 DA 4E B1 A6 36 A8 77 AD 96 84 3F ......N..6.w...? 0010: 91 18 6F 0D 86 64 47 47 29 14 E5 2A F4 F4 D8 38 ..o..dGG)..*...8 0020: 1D F6 49 9E F0 AB 46 02 0C FA 84 F0 D2 1D 37 82 ..I...F.......7. 0030: 74 3A 19 7B AC 79 8F A9 D9 4D 85 BE A8 30 58 71 t:...y...M...0Xq 0040: 75 } }, ] }, "supported_versions (43)": { "versions": [TLSv1.3, TLSv1.2, TLSv1.1, TLSv1] }, "signature_algorithms (13)": { "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1] }, "unknown extension (28)": { 0000: 40 01 @. }, "unknown extension (21)": { 0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0090: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ............... } ] } ) javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:59.909 IST|SSLExtensions.java:188|Consumed extension: supported_versions javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:59.909 IST|ClientHello.java:836|Negotiated protocol version: TLSv1.3 javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:59.909 IST|PskKeyExchangeModesExtension.java:294|abort session resumption, no supported psk_dhe_ke PSK key exchange mode javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:59.909 IST|PreSharedKeyExtension.java:809|Handling pre_shared_key absence. javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:59.910 IST|ServerNameExtension.java:328|no server name matchers, ignore server name indication javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:59.910 IST|SSLExtensions.java:188|Consumed extension: server_name javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:59.910 IST|SSLExtensions.java:169|Ignore unavailable extension: max_fragment_length javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:59.910 IST|SSLExtensions.java:188|Consumed extension: status_request javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:59.910 IST|SSLExtensions.java:188|Consumed extension: supported_groups javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:59.910 IST|SSLExtensions.java:159|Ignore unsupported extension: ec_point_formats javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:59.910 IST|SSLExtensions.java:188|Consumed extension: signature_algorithms javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:59.910 IST|SSLExtensions.java:169|Ignore unavailable extension: signature_algorithms_cert javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:59.911 IST|AlpnExtension.java:274|Ignore server unenabled extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:59.911 IST|SSLExtensions.java:188|Consumed extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:59.911 IST|SSLExtensions.java:159|Ignore unsupported extension: status_request_v2 javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:59.911 IST|SSLExtensions.java:159|Ignore unsupported extension: extended_master_secret javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:59.911 IST|SSLExtensions.java:169|Ignore unavailable extension: cookie javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:59.911 IST|KeyShareExtension.java:350|Ignore unsupported named group: x25519 javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:59.912 IST|SSLExtensions.java:188|Consumed extension: key_share javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:59.912 IST|SSLExtensions.java:159|Ignore unsupported extension: renegotiation_info javax.net.ssl|ALL|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:59.912 IST|SignatureScheme.java:360|Ignore disabled signature scheme: rsa_md5 javax.net.ssl|WARNING|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:59.913 IST|SSLExtensions.java:211|Ignore impact of unsupported extension: server_name javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:59.913 IST|SSLExtensions.java:203|Ignore unavailable extension: max_fragment_length javax.net.ssl|WARNING|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:59.913 IST|SSLExtensions.java:211|Ignore impact of unsupported extension: status_request javax.net.ssl|WARNING|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:59.913 IST|SSLExtensions.java:211|Ignore impact of unsupported extension: supported_groups javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:59.914 IST|SSLExtensions.java:220|Populated with extension: signature_algorithms javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:59.914 IST|SSLExtensions.java:203|Ignore unavailable extension: signature_algorithms_cert javax.net.ssl|WARNING|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:59.914 IST|SSLExtensions.java:211|Ignore impact of unsupported extension: application_layer_protocol_negotiation javax.net.ssl|WARNING|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:59.914 IST|SSLExtensions.java:211|Ignore impact of unsupported extension: supported_versions javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:59.914 IST|SSLExtensions.java:203|Ignore unavailable extension: cookie javax.net.ssl|WARNING|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:59.914 IST|SSLExtensions.java:211|Ignore impact of unsupported extension: key_share javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:59.914 IST|SSLExtensions.java:203|Ignore unavailable extension: pre_shared_key javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:59.914 IST|ServerHello.java:729|use cipher suite TLS_AES_128_GCM_SHA256 javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:59.918 IST|SSLExtensions.java:256|Ignore, context unavailable extension: pre_shared_key javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:59.918 IST|ServerHello.java:580|Produced ServerHello handshake message ( "ServerHello": { "server version" : "TLSv1.2", "random" : "63 2C 11 59 75 FC 7D FC 10 E8 4A 0D 17 D6 E5 DC 60 E3 28 10 C8 D6 37 DA 55 2E B6 8F 2C 3B 7A 48", "session id" : "84 F7 A4 85 70 1F 9D CB 9B 39 32 A0 4B 0C BA EA 1C 0E 99 41 ED 16 42 33 D4 DD B8 C3 21 5D 4E EC", "cipher suite" : "TLS_AES_128_GCM_SHA256(0x1301)", "compression methods" : "00", "extensions" : [ "supported_versions (43)": { "selected version": [TLSv1.3] }, "key_share (51)": { "server_share": { "named group": secp256r1 "key_exchange": { 0000: 04 51 4A 02 17 C9 C2 C3 19 4A 18 3B 0F A9 87 17 .QJ......J.;.... 0010: FA 45 B7 59 8B 39 10 9E 1F 79 2F 92 77 A4 AD A8 .E.Y.9...y/.w... 0020: 7A ED A8 D6 79 2A 57 18 0B 2D E7 F2 C1 DD E7 63 z...y*W..-.....c 0030: 8D CD 4D 8E E2 46 C3 80 33 13 B7 68 C6 94 11 14 ..M..F..3..h.... 0040: B0 } }, } ] } ) javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:59.924 IST|SSLCipher.java:1824|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE countdown value = 137438953472 javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:59.925 IST|SSLCipher.java:1978|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE countdown value = 137438953472 javax.net.ssl|ALL|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:59.925 IST|ServerNameExtension.java:538|No expected server name indication response javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:59.925 IST|SSLExtensions.java:256|Ignore, context unavailable extension: server_name javax.net.ssl|ALL|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:59.926 IST|MaxFragExtension.java:471|Ignore unavailable max_fragment_length extension javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:59.926 IST|SSLExtensions.java:256|Ignore, context unavailable extension: max_fragment_length javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:59.926 IST|AlpnExtension.java:363|Ignore unavailable extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:59.927 IST|SSLExtensions.java:256|Ignore, context unavailable extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:59.927 IST|EncryptedExtensions.java:137|Produced EncryptedExtensions message ( "EncryptedExtensions": [ "supported_groups (10)": { "versions": [secp256r1, secp384r1, secp521r1, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192] } ] ) javax.net.ssl|ALL|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:59.927 IST|SignatureScheme.java:365|Ignore inactive signature scheme: dsa_sha256 javax.net.ssl|ALL|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:59.928 IST|SignatureScheme.java:365|Ignore inactive signature scheme: dsa_sha1 javax.net.ssl|ALL|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:59.928 IST|SignatureScheme.java:365|Ignore inactive signature scheme: rsa_md5 javax.net.ssl|ALL|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:59.928 IST|SignatureScheme.java:365|Ignore inactive signature scheme: dsa_sha256 javax.net.ssl|ALL|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:59.929 IST|SignatureScheme.java:365|Ignore inactive signature scheme: dsa_sha1 javax.net.ssl|ALL|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:59.929 IST|SignatureScheme.java:365|Ignore inactive signature scheme: rsa_md5 javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:59.930 IST|CertificateRequest.java:882|Produced CertificateRequest message ( "CertificateRequest": { "certificate_request_context": "", "extensions": [ "signature_algorithms (13)": { "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1] }, "signature_algorithms_cert (50)": { "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1] } ] } ) javax.net.ssl|ALL|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:59.930 IST|X509Authentication.java:264|No X.509 cert selected for EC javax.net.ssl|WARNING|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:59.930 IST|CertificateMessage.java:1063|Unavailable authentication scheme: ecdsa_secp256r1_sha256 javax.net.ssl|ALL|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:59.930 IST|X509Authentication.java:264|No X.509 cert selected for EC javax.net.ssl|WARNING|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:59.930 IST|CertificateMessage.java:1063|Unavailable authentication scheme: ecdsa_secp384r1_sha384 javax.net.ssl|ALL|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:59.931 IST|X509Authentication.java:264|No X.509 cert selected for EC javax.net.ssl|WARNING|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:59.931 IST|CertificateMessage.java:1063|Unavailable authentication scheme: ecdsa_secp521r1_sha512 javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:59.931 IST|StatusResponseManager.java:763|Staping disabled or is a resumed session javax.net.ssl|ALL|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:59.931 IST|CertStatusExtension.java:1117|Stapling is disabled for this connection javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:59.931 IST|SSLExtensions.java:256|Ignore, context unavailable extension: status_request javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:59.932 IST|CertificateMessage.java:1002|Produced server Certificate message ( "Certificate": { "certificate_request_context": "", "certificate_list": [ { "certificate" : { "version" : "v3", "serial number" : "3B FD 86 4A 58 09 72 F6", "signature algorithm": "SHA512withRSA", "issuer" : "CN=localhost", "not before" : "2019-11-05 13:41:52.000 IST", "not after" : "2020-11-05 13:41:52.000 IST", "subject" : "CN=localhost", "subject public key" : "RSA", "extensions" : [ { ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:false PathLen:2147483647 ] }, { ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_Encipherment Data_Encipherment ] } ]} "extensions": { } }, ] } ) javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:59.943 IST|CertificateVerify.java:1113|Produced server CertificateVerify handshake message ( "CertificateVerify": { "signature algorithm": rsa_pss_rsae_sha256 "signature": { 0000: 3E 9A 1C 4A D1 48 DA F7 92 A6 8B 40 FD D4 39 FF >..J.H.....@..9. 0010: 3B 40 22 45 42 B5 F4 CA EB E9 70 76 AF E3 34 B6 ;@"EB.....pv..4. 0020: 99 05 EB 16 14 DE 82 43 B7 C3 32 03 A0 46 68 E1 .......C..2..Fh. 0030: 48 28 5B 03 48 1E 76 D1 03 AE 74 88 EA 3F 45 8E H([.H.v...t..?E. 0040: 4C D1 40 61 6C 0F 42 8B C4 44 87 E9 2E B0 17 93 L.@al.B..D...... 0050: B8 13 90 A5 D5 D4 30 FA 9C 9C DE 22 87 0F 49 D3 ......0...."..I. 0060: 33 B3 46 9D 6E 6D 8B B2 84 CA 75 89 B1 6E AF 18 3.F.nm....u..n.. 0070: EE B5 A5 9A 4E F0 50 E5 48 91 34 D5 86 06 49 D7 ....N.P.H.4...I. 0080: 0B 5F C2 3A 38 BE 98 F6 67 0F 8E 59 4E FA 7E 62 ._.:8...g..YN..b 0090: 24 5E 75 AF 82 CB 95 35 07 09 C3 DE 70 51 26 02 $^u....5....pQ&. 00A0: EA DA 19 CD 4C 2C C1 FD 2A 7C FE 79 83 4E 9A 4D ....L,..*..y.N.M 00B0: 33 78 F4 91 AA E9 EA A6 91 3A 34 2C 94 93 EF 80 3x.......:4,.... 00C0: 85 74 C5 7F 52 ED 3A AD EE 9C 76 4F 92 82 06 BF .t..R.:...vO.... 00D0: 9D BC 60 4A D2 D0 8B 76 FD FD 94 93 5B AD D5 4C ..`J...v....[..L 00E0: 92 AB 24 9E 1A 62 B2 F9 A8 CA C0 4B BF 87 88 50 ..$..b.....K...P 00F0: 61 97 0D 8A 4C 13 AE FD B5 D5 B1 98 65 3D 58 C8 a...L.......e=X. } } ) javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:59.944 IST|Finished.java:773|Produced server Finished handshake message ( "Finished": { "verify data": { 0000: C9 1C 2B 13 0F B3 EE 97 80 5B 90 78 BC 2A AE B2 ..+......[.x.*.. 0010: 71 F8 2C C2 1E 1D EB F0 AD 42 32 8F 8B C9 4D 30 q.,......B2...M0 }'} ) javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:23:59.971 IST|SSLCipher.java:1978|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE countdown value = 137438953472 javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 11:23:59.997 IST|ChangeCipherSpec.java:250|Consuming ChangeCipherSpec message javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:00.000 IST|CertificateMessage.java:1158|Consuming client Certificate handshake message ( "Certificate": { "certificate_request_context": "", "certificate_list": [ { "certificate" : { "version" : "v3", "serial number" : "2C 8B E3 32 BC 02 24 C0", "signature algorithm": "SHA512withRSA", "issuer" : "CN=client", "not before" : "2019-11-05 13:43:21.000 IST", "not after" : "2020-11-05 13:43:21.000 IST", "subject" : "CN=client", "subject public key" : "RSA", "extensions" : [ { ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:false PathLen:2147483647 ] }, { ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_Encipherment Data_Encipherment ] } ]} "extensions": { } }, ] } ) javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:00.002 IST|CertificateVerify.java:1165|Consuming CertificateVerify handshake message ( "CertificateVerify": { "signature algorithm": rsa_pss_rsae_sha256 "signature": { 0000: 98 EA 01 9A 3A 4B 5E DF 00 13 DD B4 DA 78 27 D1 ....:K^......x'. 0010: 7C 47 6F 88 90 2F 8D 64 E1 F4 17 D0 56 02 34 2A .Go../.d....V.4* 0020: 18 ED 85 01 81 84 21 C7 B1 F0 AF B8 14 FE BC A4 ......!......... 0030: 1B 2E 55 10 3E 98 6A 7B 0D CC CE F9 C9 CC A9 32 ..U.>.j........2 0040: D8 0F 54 9E A0 26 84 BC E5 F2 38 88 CF 43 FA EA ..T..&....8..C.. 0050: 50 67 68 87 C6 53 B1 DD 12 16 E6 9E 8E CF 9A 6F Pgh..S.........o 0060: D3 9A 49 4C 49 E0 D9 C8 2E 02 33 CF F4 F8 05 6A ..ILI.....3....j 0070: 76 55 C7 94 83 40 77 55 0E F7 96 56 9F 40 9A 6F vU...@wU...V.@.o 0080: DD 32 23 15 36 87 29 EF 79 2A 00 0E 48 7E 01 90 .2#.6.).y*..H... 0090: 4A E6 68 1A 46 48 0C 87 2F F5 7B BC D6 3C 42 46 J.h.FH../.... }, "renegotiation_info (65,281)": { "renegotiated connection": [] }, "supported_groups (10)": { "versions": [x25519, secp256r1, secp384r1, secp521r1, ffdhe2048, ffdhe3072] }, "ec_point_formats (11)": { "formats": [uncompressed] }, "application_layer_protocol_negotiation (16)": { [h2, http/1.1] }, "status_request (5)": { "certificate status type": ocsp "OCSP status request": { "responder_id": "request extensions": { } } }, "key_share (51)": { "client_shares": [ { "named group": x25519 "key_exchange": { 0000: 8D 30 92 EC AD 1D 37 4B 6A C8 3D 89 96 EA 80 E6 .0....7Kj.=..... 0010: 99 3A 90 06 F2 99 F0 1A 81 94 52 40 7C D9 B9 44 .:........R@...D } }, { "named group": secp256r1 "key_exchange": { 0000: 04 DA 5F 3B 06 80 64 14 FA 90 21 A3 03 E4 06 F9 .._;..d...!..... 0010: C1 82 CE 96 75 1A 43 80 8D 77 F4 56 D2 E4 17 53 ....u.C..w.V...S 0020: 29 BB 80 CB A1 02 67 97 94 A3 31 EF 87 3C 96 6F ).....g...1..<.o 0030: 2B 47 E0 94 47 CF 53 FC 1A C7 65 76 3C 2E DA AA +G..G.S...ev<... 0040: 24 } }, ] }, "supported_versions (43)": { "versions": [TLSv1.3, TLSv1.2, TLSv1.1, TLSv1] }, "signature_algorithms (13)": { "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1] }, "unknown extension (28)": { 0000: 40 01 @. }, "unknown extension (21)": { 0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0090: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ............... } ] } ) javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:00.026 IST|SSLExtensions.java:188|Consumed extension: supported_versions javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:00.026 IST|ClientHello.java:836|Negotiated protocol version: TLSv1.3 javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:00.026 IST|PskKeyExchangeModesExtension.java:294|abort session resumption, no supported psk_dhe_ke PSK key exchange mode javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:00.030 IST|PreSharedKeyExtension.java:809|Handling pre_shared_key absence. javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:00.030 IST|ServerNameExtension.java:328|no server name matchers, ignore server name indication javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:00.030 IST|SSLExtensions.java:188|Consumed extension: server_name javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:00.031 IST|SSLExtensions.java:169|Ignore unavailable extension: max_fragment_length javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:00.031 IST|SSLExtensions.java:188|Consumed extension: status_request javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:00.031 IST|SSLExtensions.java:188|Consumed extension: supported_groups javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:00.032 IST|SSLExtensions.java:159|Ignore unsupported extension: ec_point_formats javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:00.032 IST|SSLExtensions.java:188|Consumed extension: signature_algorithms javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:00.032 IST|SSLExtensions.java:169|Ignore unavailable extension: signature_algorithms_cert javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:00.032 IST|AlpnExtension.java:274|Ignore server unenabled extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:00.032 IST|SSLExtensions.java:188|Consumed extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:00.033 IST|SSLExtensions.java:159|Ignore unsupported extension: status_request_v2 javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:00.033 IST|SSLExtensions.java:159|Ignore unsupported extension: extended_master_secret javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:00.033 IST|SSLExtensions.java:169|Ignore unavailable extension: cookie javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:00.033 IST|KeyShareExtension.java:350|Ignore unsupported named group: x25519 javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:00.033 IST|SSLExtensions.java:188|Consumed extension: key_share javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:00.034 IST|SSLExtensions.java:159|Ignore unsupported extension: renegotiation_info javax.net.ssl|ALL|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:00.034 IST|SignatureScheme.java:360|Ignore disabled signature scheme: rsa_md5 javax.net.ssl|WARNING|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:00.034 IST|SSLExtensions.java:211|Ignore impact of unsupported extension: server_name javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:00.035 IST|SSLExtensions.java:203|Ignore unavailable extension: max_fragment_length javax.net.ssl|WARNING|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:00.035 IST|SSLExtensions.java:211|Ignore impact of unsupported extension: status_request javax.net.ssl|WARNING|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:00.035 IST|SSLExtensions.java:211|Ignore impact of unsupported extension: supported_groups javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:00.036 IST|SSLExtensions.java:220|Populated with extension: signature_algorithms javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:00.036 IST|SSLExtensions.java:203|Ignore unavailable extension: signature_algorithms_cert javax.net.ssl|WARNING|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:00.036 IST|SSLExtensions.java:211|Ignore impact of unsupported extension: application_layer_protocol_negotiation javax.net.ssl|WARNING|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:00.036 IST|SSLExtensions.java:211|Ignore impact of unsupported extension: supported_versions javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:00.036 IST|SSLExtensions.java:203|Ignore unavailable extension: cookie javax.net.ssl|WARNING|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:00.036 IST|SSLExtensions.java:211|Ignore impact of unsupported extension: key_share javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:00.036 IST|SSLExtensions.java:203|Ignore unavailable extension: pre_shared_key javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:00.036 IST|ServerHello.java:729|use cipher suite TLS_AES_128_GCM_SHA256 javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:00.039 IST|SSLExtensions.java:256|Ignore, context unavailable extension: pre_shared_key javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:00.041 IST|ServerHello.java:580|Produced ServerHello handshake message ( "ServerHello": { "server version" : "TLSv1.2", "random" : "1E C8 95 46 26 44 B4 39 4D A5 CE 25 60 FE 86 FF BF 33 28 EC A1 37 BB 7A CA 38 A1 67 C1 E2 39 84", "session id" : "B4 47 33 32 CF 4C 49 AB FF FA B7 B1 1C 6A 2F 91 5B D1 84 81 F3 C5 04 53 67 62 38 6E 9A 7D 42 BF", "cipher suite" : "TLS_AES_128_GCM_SHA256(0x1301)", "compression methods" : "00", "extensions" : [ "supported_versions (43)": { "selected version": [TLSv1.3] }, "key_share (51)": { "server_share": { "named group": secp256r1 "key_exchange": { 0000: 04 E2 82 15 91 37 00 7A AF 2E E5 E1 6F DF CC 2F .....7.z....o../ 0010: B3 B5 62 9A D0 5B 6E 40 C4 D5 6D FA 28 1C 84 7C ..b..[n@..m.(... 0020: A0 C1 E3 68 61 32 23 01 0A E2 DE E8 D7 42 7F 4C ...ha2#......B.L 0030: 73 E4 5F F2 62 78 AA D4 77 12 77 76 84 7A E0 3F s._.bx..w.wv.z.? 0040: B3 } }, } ] } ) javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:00.046 IST|SSLCipher.java:1824|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE countdown value = 137438953472 javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:00.047 IST|SSLCipher.java:1978|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE countdown value = 137438953472 javax.net.ssl|ALL|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:00.047 IST|ServerNameExtension.java:538|No expected server name indication response javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:00.048 IST|SSLExtensions.java:256|Ignore, context unavailable extension: server_name javax.net.ssl|ALL|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:00.048 IST|MaxFragExtension.java:471|Ignore unavailable max_fragment_length extension javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:00.048 IST|SSLExtensions.java:256|Ignore, context unavailable extension: max_fragment_length javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:00.048 IST|AlpnExtension.java:363|Ignore unavailable extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:00.049 IST|SSLExtensions.java:256|Ignore, context unavailable extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:00.049 IST|EncryptedExtensions.java:137|Produced EncryptedExtensions message ( "EncryptedExtensions": [ "supported_groups (10)": { "versions": [secp256r1, secp384r1, secp521r1, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192] } ] ) javax.net.ssl|ALL|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:00.049 IST|SignatureScheme.java:365|Ignore inactive signature scheme: dsa_sha256 javax.net.ssl|ALL|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:00.050 IST|SignatureScheme.java:365|Ignore inactive signature scheme: dsa_sha1 javax.net.ssl|ALL|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:00.050 IST|SignatureScheme.java:365|Ignore inactive signature scheme: rsa_md5 javax.net.ssl|ALL|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:00.050 IST|SignatureScheme.java:365|Ignore inactive signature scheme: dsa_sha256 javax.net.ssl|ALL|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:00.050 IST|SignatureScheme.java:365|Ignore inactive signature scheme: dsa_sha1 javax.net.ssl|ALL|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:00.050 IST|SignatureScheme.java:365|Ignore inactive signature scheme: rsa_md5 javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:00.051 IST|CertificateRequest.java:882|Produced CertificateRequest message ( "CertificateRequest": { "certificate_request_context": "", "extensions": [ "signature_algorithms (13)": { "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1] }, "signature_algorithms_cert (50)": { "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1] } ] } ) javax.net.ssl|ALL|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:00.051 IST|X509Authentication.java:264|No X.509 cert selected for EC javax.net.ssl|WARNING|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:00.051 IST|CertificateMessage.java:1063|Unavailable authentication scheme: ecdsa_secp256r1_sha256 javax.net.ssl|ALL|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:00.052 IST|X509Authentication.java:264|No X.509 cert selected for EC javax.net.ssl|WARNING|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:00.052 IST|CertificateMessage.java:1063|Unavailable authentication scheme: ecdsa_secp384r1_sha384 javax.net.ssl|ALL|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:00.052 IST|X509Authentication.java:264|No X.509 cert selected for EC javax.net.ssl|WARNING|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:00.052 IST|CertificateMessage.java:1063|Unavailable authentication scheme: ecdsa_secp521r1_sha512 javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:00.052 IST|StatusResponseManager.java:763|Staping disabled or is a resumed session javax.net.ssl|ALL|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:00.052 IST|CertStatusExtension.java:1117|Stapling is disabled for this connection javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:00.052 IST|SSLExtensions.java:256|Ignore, context unavailable extension: status_request javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:00.053 IST|CertificateMessage.java:1002|Produced server Certificate message ( "Certificate": { "certificate_request_context": "", "certificate_list": [ { "certificate" : { "version" : "v3", "serial number" : "3B FD 86 4A 58 09 72 F6", "signature algorithm": "SHA512withRSA", "issuer" : "CN=localhost", "not before" : "2019-11-05 13:41:52.000 IST", "not after" : "2020-11-05 13:41:52.000 IST", "subject" : "CN=localhost", "subject public key" : "RSA", "extensions" : [ { ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:false PathLen:2147483647 ] }, { ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_Encipherment Data_Encipherment ] } ]} "extensions": { } }, ] } ) javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:00.064 IST|CertificateVerify.java:1113|Produced server CertificateVerify handshake message ( "CertificateVerify": { "signature algorithm": rsa_pss_rsae_sha256 "signature": { 0000: 83 05 E7 5C E9 89 77 64 04 8D CA 63 C7 B0 27 9F ...\..wd...c..'. 0010: DC 5C A0 8A DA 6E 0E 23 D4 A6 95 01 0B 03 47 48 .\...n.#......GH 0020: 74 4E C0 85 EC D6 C8 36 AB 7C DF 8B AB 7E 63 53 tN.....6......cS 0030: AA F4 D0 84 13 23 D3 1D 61 80 4B 8D 55 CA C2 38 .....#..a.K.U..8 0040: AB E6 05 49 39 30 3F 36 02 0D 74 32 07 D9 F3 C4 ...I90?6..t2.... 0050: 90 A5 7F 69 92 6D C0 87 41 AC BA 23 A5 69 EB 7F ...i.m..A..#.i.. 0060: 84 4E E5 C7 24 F6 1E 37 A3 C7 17 AB 85 C5 82 FB .N..$..7........ 0070: 91 47 32 81 29 C9 19 43 EE 0A F9 2E 37 C3 89 FA .G2.)..C....7... 0080: 90 B8 22 B5 49 16 CD 65 AC C9 13 D0 EB DE 75 64 ..".I..e......ud 0090: BC 7E EE 62 EB 36 A3 C8 E9 F4 F1 A5 C8 B2 E9 ED ...b.6.......... 00A0: D9 92 05 59 D3 D0 24 44 7C 22 89 68 B1 0E BE 6C ...Y..$D.".h...l 00B0: 59 BD A7 B2 CD 40 79 B5 76 98 BD 81 0E 6D F8 7F Y....@y.v....m.. 00C0: F5 22 D7 C8 33 0D 62 07 3C 2E A8 02 CE 9A 66 CA ."..3.b.<.....f. 00D0: AD C4 45 A8 EF E9 AA C7 06 49 BA F0 C8 EA 8F 98 ..E......I...... 00E0: 2F 10 CE 92 04 38 3A A7 29 6B CA 6D 88 94 32 06 /....8:.)k.m..2. 00F0: 78 1E B4 E1 68 24 A0 ED DD 36 C5 1F 71 3E 48 EF x...h$...6..q>H. } } ) javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:00.065 IST|Finished.java:773|Produced server Finished handshake message ( "Finished": { "verify data": { 0000: B0 D2 60 17 AC 9F 30 2C 76 9D 74 40 57 54 CC D6 ..`...0,v.t@WT.. 0010: 1D CC 65 CA A6 CE 99 23 AC 4F D0 16 BF D4 9D 5C ..e....#.O.....\ }'} ) javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:00.066 IST|SSLCipher.java:1978|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE countdown value = 137438953472 javax.net.ssl|DEBUG|28|https-jsse-nio-8443-exec-8|2019-11-18 11:24:00.087 IST|ChangeCipherSpec.java:250|Consuming ChangeCipherSpec message javax.net.ssl|DEBUG|28|https-jsse-nio-8443-exec-8|2019-11-18 11:24:00.089 IST|CertificateMessage.java:1158|Consuming client Certificate handshake message ( "Certificate": { "certificate_request_context": "", "certificate_list": [ { "certificate" : { "version" : "v3", "serial number" : "2C 8B E3 32 BC 02 24 C0", "signature algorithm": "SHA512withRSA", "issuer" : "CN=client", "not before" : "2019-11-05 13:43:21.000 IST", "not after" : "2020-11-05 13:43:21.000 IST", "subject" : "CN=client", "subject public key" : "RSA", "extensions" : [ { ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:false PathLen:2147483647 ] }, { ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_Encipherment Data_Encipherment ] } ]} "extensions": { } }, ] } ) javax.net.ssl|DEBUG|28|https-jsse-nio-8443-exec-8|2019-11-18 11:24:00.091 IST|CertificateVerify.java:1165|Consuming CertificateVerify handshake message ( "CertificateVerify": { "signature algorithm": rsa_pss_rsae_sha256 "signature": { 0000: 71 90 63 F1 78 8C 52 A2 54 41 F4 F3 E6 3A 2A 6B q.c.x.R.TA...:*k 0010: 49 3D E1 B9 F2 FE 75 10 AE 36 1A 6F 9B BC DF 1E I=....u..6.o.... 0020: 37 0A E2 9E 72 1A 25 6F 4A C3 7F 68 67 41 28 AB 7...r.%oJ..hgA(. 0030: 45 7F 27 D9 5F E1 8F B7 31 88 FE AA 8C D8 0E B2 E.'._...1....... 0040: 96 44 D6 41 DF A8 7A 10 D1 2E B3 F5 D5 3B 06 DF .D.A..z......;.. 0050: 50 0D ED 4D 93 8A C5 19 78 84 EC A7 11 13 E4 DB P..M....x....... 0060: C4 8F F1 F8 06 05 9A CB C9 9E FD A5 59 DB FA AC ............Y... 0070: 1C 80 3C 4B 6E B9 44 DC 3C CD F7 C3 0B 89 AD 7C .. }, "renegotiation_info (65,281)": { "renegotiated connection": [] }, "supported_groups (10)": { "versions": [x25519, secp256r1, secp384r1, secp521r1, ffdhe2048, ffdhe3072] }, "ec_point_formats (11)": { "formats": [uncompressed] }, "application_layer_protocol_negotiation (16)": { [h2, http/1.1] }, "status_request (5)": { "certificate status type": ocsp "OCSP status request": { "responder_id": "request extensions": { } } }, "key_share (51)": { "client_shares": [ { "named group": x25519 "key_exchange": { 0000: E6 8E A2 A8 A4 F6 BE 30 D0 02 C7 5D 2F 31 48 00 .......0...]/1H. 0010: 95 FD FD 75 53 F5 88 DE D2 18 5B 85 E4 1B C1 59 ...uS.....[....Y } }, { "named group": secp256r1 "key_exchange": { 0000: 04 63 C7 AF 5C 24 5D C4 C5 2B 7B 90 C4 56 62 B9 .c..\$]..+...Vb. 0010: B1 C5 71 52 2B 14 5F 0F 86 81 95 51 D8 3B 2A DA ..qR+._....Q.;*. 0020: A1 9C E2 31 0B 5C 02 6A 63 A5 A5 5A 7D D6 6C 00 ...1.\.jc..Z..l. 0030: AA 42 95 C5 80 90 CE A2 46 F8 D9 F1 C2 47 7D 1F .B......F....G.. 0040: 4B } }, ] }, "supported_versions (43)": { "versions": [TLSv1.3, TLSv1.2, TLSv1.1, TLSv1] }, "signature_algorithms (13)": { "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1] }, "unknown extension (28)": { 0000: 40 01 @. }, "unknown extension (21)": { 0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0090: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ............... } ] } ) javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:00.110 IST|SSLExtensions.java:188|Consumed extension: supported_versions javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:00.110 IST|ClientHello.java:836|Negotiated protocol version: TLSv1.3 javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:00.110 IST|PskKeyExchangeModesExtension.java:294|abort session resumption, no supported psk_dhe_ke PSK key exchange mode javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:00.110 IST|PreSharedKeyExtension.java:809|Handling pre_shared_key absence. javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:00.110 IST|ServerNameExtension.java:328|no server name matchers, ignore server name indication javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:00.110 IST|SSLExtensions.java:188|Consumed extension: server_name javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:00.110 IST|SSLExtensions.java:169|Ignore unavailable extension: max_fragment_length javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:00.110 IST|SSLExtensions.java:188|Consumed extension: status_request javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:00.110 IST|SSLExtensions.java:188|Consumed extension: supported_groups javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:00.110 IST|SSLExtensions.java:159|Ignore unsupported extension: ec_point_formats javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:00.111 IST|SSLExtensions.java:188|Consumed extension: signature_algorithms javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:00.111 IST|SSLExtensions.java:169|Ignore unavailable extension: signature_algorithms_cert javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:00.111 IST|AlpnExtension.java:274|Ignore server unenabled extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:00.111 IST|SSLExtensions.java:188|Consumed extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:00.111 IST|SSLExtensions.java:159|Ignore unsupported extension: status_request_v2 javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:00.111 IST|SSLExtensions.java:159|Ignore unsupported extension: extended_master_secret javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:00.111 IST|SSLExtensions.java:169|Ignore unavailable extension: cookie javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:00.111 IST|KeyShareExtension.java:350|Ignore unsupported named group: x25519 javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:00.111 IST|SSLExtensions.java:188|Consumed extension: key_share javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:00.111 IST|SSLExtensions.java:159|Ignore unsupported extension: renegotiation_info javax.net.ssl|ALL|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:00.112 IST|SignatureScheme.java:360|Ignore disabled signature scheme: rsa_md5 javax.net.ssl|WARNING|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:00.112 IST|SSLExtensions.java:211|Ignore impact of unsupported extension: server_name javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:00.112 IST|SSLExtensions.java:203|Ignore unavailable extension: max_fragment_length javax.net.ssl|WARNING|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:00.112 IST|SSLExtensions.java:211|Ignore impact of unsupported extension: status_request javax.net.ssl|WARNING|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:00.112 IST|SSLExtensions.java:211|Ignore impact of unsupported extension: supported_groups javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:00.113 IST|SSLExtensions.java:220|Populated with extension: signature_algorithms javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:00.113 IST|SSLExtensions.java:203|Ignore unavailable extension: signature_algorithms_cert javax.net.ssl|WARNING|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:00.113 IST|SSLExtensions.java:211|Ignore impact of unsupported extension: application_layer_protocol_negotiation javax.net.ssl|WARNING|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:00.113 IST|SSLExtensions.java:211|Ignore impact of unsupported extension: supported_versions javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:00.113 IST|SSLExtensions.java:203|Ignore unavailable extension: cookie javax.net.ssl|WARNING|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:00.113 IST|SSLExtensions.java:211|Ignore impact of unsupported extension: key_share javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:00.113 IST|SSLExtensions.java:203|Ignore unavailable extension: pre_shared_key javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:00.113 IST|ServerHello.java:729|use cipher suite TLS_AES_128_GCM_SHA256 javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:00.116 IST|SSLExtensions.java:256|Ignore, context unavailable extension: pre_shared_key javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:00.117 IST|ServerHello.java:580|Produced ServerHello handshake message ( "ServerHello": { "server version" : "TLSv1.2", "random" : "2E CC F0 B8 35 9D F3 E3 FD A1 8E 63 7C 5B 90 F9 22 10 19 32 B5 0B 7A 46 6E 2C 5B A2 CC CD 3D 67", "session id" : "6A 5A 76 88 5A 11 B0 BF 8E F5 14 6C 44 72 EB A8 9B 10 53 4B FB 41 65 2E 15 94 6A 72 B5 76 E1 83", "cipher suite" : "TLS_AES_128_GCM_SHA256(0x1301)", "compression methods" : "00", "extensions" : [ "supported_versions (43)": { "selected version": [TLSv1.3] }, "key_share (51)": { "server_share": { "named group": secp256r1 "key_exchange": { 0000: 04 88 3A E8 30 C4 98 23 3D 45 7E AD 02 60 AA 24 ..:.0..#=E...`.$ 0010: E0 E4 03 A2 4D E3 AB FD DE 41 F2 13 D8 05 56 CE ....M....A....V. 0020: 1A 1D EC 96 3B B2 5B DD 8B F1 51 EB 02 D8 E8 8F ....;.[...Q..... 0030: 41 57 EF 36 AB F5 24 4C CD 0F 8F A8 E7 FA A3 52 AW.6..$L.......R 0040: 63 } }, } ] } ) javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:00.122 IST|SSLCipher.java:1824|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE countdown value = 137438953472 javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:00.122 IST|SSLCipher.java:1978|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE countdown value = 137438953472 javax.net.ssl|ALL|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:00.122 IST|ServerNameExtension.java:538|No expected server name indication response javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:00.122 IST|SSLExtensions.java:256|Ignore, context unavailable extension: server_name javax.net.ssl|ALL|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:00.123 IST|MaxFragExtension.java:471|Ignore unavailable max_fragment_length extension javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:00.123 IST|SSLExtensions.java:256|Ignore, context unavailable extension: max_fragment_length javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:00.123 IST|AlpnExtension.java:363|Ignore unavailable extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:00.123 IST|SSLExtensions.java:256|Ignore, context unavailable extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:00.123 IST|EncryptedExtensions.java:137|Produced EncryptedExtensions message ( "EncryptedExtensions": [ "supported_groups (10)": { "versions": [secp256r1, secp384r1, secp521r1, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192] } ] ) javax.net.ssl|ALL|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:00.124 IST|SignatureScheme.java:365|Ignore inactive signature scheme: dsa_sha256 javax.net.ssl|ALL|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:00.124 IST|SignatureScheme.java:365|Ignore inactive signature scheme: dsa_sha1 javax.net.ssl|ALL|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:00.124 IST|SignatureScheme.java:365|Ignore inactive signature scheme: rsa_md5 javax.net.ssl|ALL|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:00.125 IST|SignatureScheme.java:365|Ignore inactive signature scheme: dsa_sha256 javax.net.ssl|ALL|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:00.125 IST|SignatureScheme.java:365|Ignore inactive signature scheme: dsa_sha1 javax.net.ssl|ALL|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:00.125 IST|SignatureScheme.java:365|Ignore inactive signature scheme: rsa_md5 javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:00.125 IST|CertificateRequest.java:882|Produced CertificateRequest message ( "CertificateRequest": { "certificate_request_context": "", "extensions": [ "signature_algorithms (13)": { "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1] }, "signature_algorithms_cert (50)": { "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1] } ] } ) javax.net.ssl|ALL|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:00.125 IST|X509Authentication.java:264|No X.509 cert selected for EC javax.net.ssl|WARNING|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:00.126 IST|CertificateMessage.java:1063|Unavailable authentication scheme: ecdsa_secp256r1_sha256 javax.net.ssl|ALL|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:00.126 IST|X509Authentication.java:264|No X.509 cert selected for EC javax.net.ssl|WARNING|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:00.126 IST|CertificateMessage.java:1063|Unavailable authentication scheme: ecdsa_secp384r1_sha384 javax.net.ssl|ALL|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:00.126 IST|X509Authentication.java:264|No X.509 cert selected for EC javax.net.ssl|WARNING|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:00.126 IST|CertificateMessage.java:1063|Unavailable authentication scheme: ecdsa_secp521r1_sha512 javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:00.126 IST|StatusResponseManager.java:763|Staping disabled or is a resumed session javax.net.ssl|ALL|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:00.126 IST|CertStatusExtension.java:1117|Stapling is disabled for this connection javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:00.126 IST|SSLExtensions.java:256|Ignore, context unavailable extension: status_request javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:00.127 IST|CertificateMessage.java:1002|Produced server Certificate message ( "Certificate": { "certificate_request_context": "", "certificate_list": [ { "certificate" : { "version" : "v3", "serial number" : "3B FD 86 4A 58 09 72 F6", "signature algorithm": "SHA512withRSA", "issuer" : "CN=localhost", "not before" : "2019-11-05 13:41:52.000 IST", "not after" : "2020-11-05 13:41:52.000 IST", "subject" : "CN=localhost", "subject public key" : "RSA", "extensions" : [ { ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:false PathLen:2147483647 ] }, { ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_Encipherment Data_Encipherment ] } ]} "extensions": { } }, ] } ) javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:00.138 IST|CertificateVerify.java:1113|Produced server CertificateVerify handshake message ( "CertificateVerify": { "signature algorithm": rsa_pss_rsae_sha256 "signature": { 0000: 19 8F 50 90 82 0E E7 76 06 63 69 EF F3 6C DA 67 ..P....v.ci..l.g 0010: 3A F9 BC 08 E8 0B 1C D0 92 44 3C 8F C3 B3 48 B9 :........D<...H. 0020: 6F AD E4 FB 23 04 40 BD 3D D0 B4 E4 B0 07 CA 63 o...#.@.=......c 0030: 5B 43 D5 D4 A7 9B 98 F2 B2 B5 86 16 E5 63 25 D4 [C...........c%. 0040: 46 C7 36 D8 3E E9 2E 6D E4 E8 F0 B7 82 8A 1D 75 F.6.>..m.......u 0050: 5E B1 70 C7 12 36 CF E5 6F F3 6A 1E C7 5E 5A A9 ^.p..6..o.j..^Z. 0060: 56 A7 9D DD A3 2D 68 1F FE 09 7A EC 28 D1 6B 77 V....-h...z.(.kw 0070: 69 A7 AC 7B 52 20 CA 03 2F 1D F3 65 EC 41 81 F0 i...R ../..e.A.. 0080: A1 98 14 79 03 14 5A B2 B1 8C 5A 92 E7 D7 1F E9 ...y..Z...Z..... 0090: 29 69 E6 6F A7 BB D9 7F 2B 30 5B 63 BD 5D E7 A6 )i.o....+0[c.].. 00A0: 46 93 85 F6 DE C9 B5 41 1F F9 1A CE 21 87 75 D0 F......A....!.u. 00B0: 0D 56 96 96 7C DC 3C 6E 48 B0 F0 74 44 8C EE 9F .V.... } }, ] } ) javax.net.ssl|DEBUG|25|https-jsse-nio-8443-exec-5|2019-11-18 11:24:00.165 IST|CertificateVerify.java:1165|Consuming CertificateVerify handshake message ( "CertificateVerify": { "signature algorithm": rsa_pss_rsae_sha256 "signature": { 0000: 30 89 D2 43 CE F6 F9 CC 2C 25 25 05 4F 63 13 6A 0..C....,%%.Oc.j 0010: 17 4E 48 17 FB FE CF 51 2D 56 86 CC B7 48 A7 9E .NH....Q-V...H.. 0020: 60 79 E8 3C 06 A3 00 57 6E F5 5B 18 A3 F0 90 8F `y.<...Wn.[..... 0030: 99 0B 69 BA A8 A1 8B 7C 62 53 4F F4 39 E9 90 75 ..i.....bSO.9..u 0040: E1 CC 72 7B 66 6F CD 8D 58 D5 D8 CF E6 3F 22 5D ..r.fo..X....?"] 0050: DA 4B 57 D8 1D 14 EB 41 ED A1 83 AC 6F FD 4A 36 .KW....A....o.J6 0060: 53 AD C4 3D 29 C1 31 A9 A1 83 5B 7E 3B AD CD 49 S..=).1...[.;..I 0070: 87 0F 34 B0 97 3B 0E 14 2B A2 7D 27 66 9E E8 CB ..4..;..+..'f... 0080: 36 E7 A4 C1 32 9C 70 9E 92 60 14 EE 48 C5 BD 80 6...2.p..`..H... 0090: F7 F4 37 A8 C9 FD 7B 61 94 90 C4 45 7D 6B AA 79 ..7....a...E.k.y 00A0: 26 28 24 B9 A7 D3 C1 AE E4 25 D1 B2 41 4F 04 17 &($......%..AO.. 00B0: 3F 4D 4F 53 31 9D 68 59 2D 1C 75 92 8B E8 C1 4D ?MOS1.hY-.u....M 00C0: CD F0 99 12 07 E0 B4 CE 29 0F 43 F5 DB 2F B7 14 ........).C../.. 00D0: 31 3B 52 15 5D 67 76 D5 77 1A 20 43 D9 18 9C DE 1;R.]gv.w. C.... 00E0: 03 D9 70 79 4C 02 C5 1D 15 22 FF B1 4B 84 B8 73 ..pyL...."..K..s 00F0: 02 21 FE 10 58 5D CA E3 2D 56 E7 18 26 1A D8 7B .!..X]..-V..&... } } ) javax.net.ssl|DEBUG|25|https-jsse-nio-8443-exec-5|2019-11-18 11:24:00.166 IST|Finished.java:1044|Consuming client Finished handshake message ( "Finished": { "verify data": { 0000: EC 9A D9 13 39 6F BC 56 04 6F FD 52 C9 F6 8C A5 ....9o.V.o.R.... 0010: 33 8A 72 B1 AA 1F 7B 25 57 DB 03 B9 98 C9 03 A4 3.r....%W....... }'} ) javax.net.ssl|DEBUG|25|https-jsse-nio-8443-exec-5|2019-11-18 11:24:00.166 IST|SSLCipher.java:1824|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE countdown value = 137438953472 javax.net.ssl|DEBUG|25|https-jsse-nio-8443-exec-5|2019-11-18 11:24:00.167 IST|Finished.java:1148|Sending new session ticket 18-Nov-2019 11:24:00.167 FINE [https-jsse-nio-8443-exec-5] org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun Error during SSL handshake java.io.IOException: NOT_HANDSHAKING during handshake at org.apache.tomcat.util.net.SecureNioChannel.handshake(SecureNioChannel.java:193) at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1556) at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49) at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128) at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628) at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61) at java.base/java.lang.Thread.run(Thread.java:834) 18-Nov-2019 11:24:00.168 FINE [https-jsse-nio-8443-exec-5] org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper.doClose Calling [org.apache.tomcat.util.net.NioEndpoint@42b2b293].closeSocket([org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper@1989dbdc:org.apache.tomcat.util.net.SecureNioChannel@102a92e:java.nio.channels.SocketChannel[connected local=/0:0:0:0:0:0:0:1:8443 remote=/0:0:0:0:0:0:0:1:62340]]) java.lang.Exception at org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper.doClose(NioEndpoint.java:1163) at org.apache.tomcat.util.net.SocketWrapperBase.close(SocketWrapperBase.java:402) at org.apache.tomcat.util.net.NioEndpoint$Poller.cancelledKey(NioEndpoint.java:665) at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1586) at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49) at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128) at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628) at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61) at java.base/java.lang.Thread.run(Thread.java:834) javax.net.ssl|ALL|25|https-jsse-nio-8443-exec-5|2019-11-18 11:24:00.168 IST|SSLEngineImpl.java:756|Closing outbound of SSLEngine javax.net.ssl|WARNING|25|https-jsse-nio-8443-exec-5|2019-11-18 11:24:00.169 IST|SSLEngineOutputRecord.java:168|outbound has closed, ignore outbound application data 18-Nov-2019 11:24:00.175 FINE [https-jsse-nio-8443-exec-2] org.apache.tomcat.util.net.SecureNioChannel.processSNI The SNI host name extracted for connection [java.nio.channels.SocketChannel[connected local=/0:0:0:0:0:0:0:1:8443 remote=/0:0:0:0:0:0:0:1:62341]] was [localhost] javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 11:24:00.176 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 for TLS10 javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 11:24:00.176 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 for TLS10 javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 11:24:00.176 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLS10 javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 11:24:00.176 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLS10 javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 11:24:00.176 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 for TLS13 javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 11:24:00.176 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 for TLS13 javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 11:24:00.177 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLS13 javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 11:24:00.177 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLS13 javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 11:24:00.177 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA for TLS13 javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 11:24:00.177 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA for TLS13 javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 11:24:00.177 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 for TLS11 javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 11:24:00.177 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 for TLS11 javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 11:24:00.177 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLS11 javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 11:24:00.177 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLS11 javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 11:24:00.179 IST|SSLExtensions.java:131|Ignore unknown or unsupported extension ( "unknown extension (28)": { 0000: 40 01 @. } ) javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 11:24:00.180 IST|SSLExtensions.java:131|Ignore unknown or unsupported extension ( "unknown extension (21)": { 0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0090: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ............... } ) javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 11:24:00.183 IST|ClientHello.java:806|Consuming ClientHello handshake message ( "ClientHello": { "client version" : "TLSv1.2", "random" : "3B B9 D4 26 AF C9 29 85 AF 13 45 84 01 54 E7 D3 93 ED C1 F9 47 71 F1 98 C8 04 18 F8 80 0C A7 33", "session id" : "95 4E 22 48 F7 C0 E9 6E 1D 30 75 F9 FA 4E 35 08 9B 88 49 42 89 FA EB 83 4B 4F 67 5F DF EB 92 C5", "cipher suites" : "[TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_AES_256_GCM_SHA384(0x1302), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), UNKNOWN-CIPHER-SUITE(0xCCA9)(0xCCA9), UNKNOWN-CIPHER-SUITE(0xCCA8)(0xCCA8), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA(0xC00A), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA(0xC009), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA(0xC013), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA(0xC014), TLS_DHE_RSA_WITH_AES_128_CBC_SHA(0x0033), TLS_DHE_RSA_WITH_AES_256_CBC_SHA(0x0039), TLS_RSA_WITH_AES_128_CBC_SHA(0x002F), TLS_RSA_WITH_AES_256_CBC_SHA(0x0035), SSL_RSA_WITH_3DES_EDE_CBC_SHA(0x000A)]", "compression methods" : "00", "extensions" : [ "server_name (0)": { type=host_name (0), value=localhost }, "extended_master_secret (23)": { }, "renegotiation_info (65,281)": { "renegotiated connection": [] }, "supported_groups (10)": { "versions": [x25519, secp256r1, secp384r1, secp521r1, ffdhe2048, ffdhe3072] }, "ec_point_formats (11)": { "formats": [uncompressed] }, "application_layer_protocol_negotiation (16)": { [h2, http/1.1] }, "status_request (5)": { "certificate status type": ocsp "OCSP status request": { "responder_id": "request extensions": { } } }, "key_share (51)": { "client_shares": [ { "named group": x25519 "key_exchange": { 0000: 7E 85 0F 09 18 23 7E 16 9D EE ED E9 64 30 AE 24 .....#......d0.$ 0010: 1B 82 CC B8 60 38 BA 63 F2 40 7D BE 23 56 EE 03 ....`8.c.@..#V.. } }, { "named group": secp256r1 "key_exchange": { 0000: 04 4B 6F BB D2 13 E3 5F C7 33 4A 22 EC F2 3E FE .Ko...._.3J"..>. 0010: DD A4 A2 1E 6A 95 96 84 59 E1 B6 E0 3F 8C D6 58 ....j...Y...?..X 0020: F6 27 AE 42 9B 70 A2 24 30 CB 0B C0 5D B1 97 19 .'.B.p.$0...]... 0030: B5 2A E6 B4 9C A0 EC A0 9C 1A 3B 32 76 BC 61 6A .*........;2v.aj 0040: C9 } }, ] }, "supported_versions (43)": { "versions": [TLSv1.3, TLSv1.2, TLSv1.1, TLSv1] }, "signature_algorithms (13)": { "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1] }, "unknown extension (28)": { 0000: 40 01 @. }, "unknown extension (21)": { 0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0090: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ............... } ] } ) javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 11:24:00.197 IST|SSLExtensions.java:188|Consumed extension: supported_versions javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 11:24:00.197 IST|ClientHello.java:836|Negotiated protocol version: TLSv1.3 javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 11:24:00.197 IST|PskKeyExchangeModesExtension.java:294|abort session resumption, no supported psk_dhe_ke PSK key exchange mode javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 11:24:00.197 IST|PreSharedKeyExtension.java:809|Handling pre_shared_key absence. javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 11:24:00.197 IST|ServerNameExtension.java:328|no server name matchers, ignore server name indication javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 11:24:00.197 IST|SSLExtensions.java:188|Consumed extension: server_name javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 11:24:00.197 IST|SSLExtensions.java:169|Ignore unavailable extension: max_fragment_length javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 11:24:00.198 IST|SSLExtensions.java:188|Consumed extension: status_request javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 11:24:00.198 IST|SSLExtensions.java:188|Consumed extension: supported_groups javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 11:24:00.198 IST|SSLExtensions.java:159|Ignore unsupported extension: ec_point_formats javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 11:24:00.198 IST|SSLExtensions.java:188|Consumed extension: signature_algorithms javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 11:24:00.198 IST|SSLExtensions.java:169|Ignore unavailable extension: signature_algorithms_cert javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 11:24:00.198 IST|AlpnExtension.java:274|Ignore server unenabled extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 11:24:00.198 IST|SSLExtensions.java:188|Consumed extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 11:24:00.198 IST|SSLExtensions.java:159|Ignore unsupported extension: status_request_v2 javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 11:24:00.198 IST|SSLExtensions.java:159|Ignore unsupported extension: extended_master_secret javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 11:24:00.198 IST|SSLExtensions.java:169|Ignore unavailable extension: cookie javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 11:24:00.198 IST|KeyShareExtension.java:350|Ignore unsupported named group: x25519 javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 11:24:00.199 IST|SSLExtensions.java:188|Consumed extension: key_share javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 11:24:00.199 IST|SSLExtensions.java:159|Ignore unsupported extension: renegotiation_info javax.net.ssl|ALL|22|https-jsse-nio-8443-exec-2|2019-11-18 11:24:00.199 IST|SignatureScheme.java:360|Ignore disabled signature scheme: rsa_md5 javax.net.ssl|WARNING|22|https-jsse-nio-8443-exec-2|2019-11-18 11:24:00.199 IST|SSLExtensions.java:211|Ignore impact of unsupported extension: server_name javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 11:24:00.199 IST|SSLExtensions.java:203|Ignore unavailable extension: max_fragment_length javax.net.ssl|WARNING|22|https-jsse-nio-8443-exec-2|2019-11-18 11:24:00.200 IST|SSLExtensions.java:211|Ignore impact of unsupported extension: status_request javax.net.ssl|WARNING|22|https-jsse-nio-8443-exec-2|2019-11-18 11:24:00.200 IST|SSLExtensions.java:211|Ignore impact of unsupported extension: supported_groups javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 11:24:00.200 IST|SSLExtensions.java:220|Populated with extension: signature_algorithms javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 11:24:00.200 IST|SSLExtensions.java:203|Ignore unavailable extension: signature_algorithms_cert javax.net.ssl|WARNING|22|https-jsse-nio-8443-exec-2|2019-11-18 11:24:00.200 IST|SSLExtensions.java:211|Ignore impact of unsupported extension: application_layer_protocol_negotiation javax.net.ssl|WARNING|22|https-jsse-nio-8443-exec-2|2019-11-18 11:24:00.200 IST|SSLExtensions.java:211|Ignore impact of unsupported extension: supported_versions javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 11:24:00.200 IST|SSLExtensions.java:203|Ignore unavailable extension: cookie javax.net.ssl|WARNING|22|https-jsse-nio-8443-exec-2|2019-11-18 11:24:00.200 IST|SSLExtensions.java:211|Ignore impact of unsupported extension: key_share javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 11:24:00.200 IST|SSLExtensions.java:203|Ignore unavailable extension: pre_shared_key javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 11:24:00.200 IST|ServerHello.java:729|use cipher suite TLS_AES_128_GCM_SHA256 javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 11:24:00.203 IST|SSLExtensions.java:256|Ignore, context unavailable extension: pre_shared_key javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 11:24:00.204 IST|ServerHello.java:580|Produced ServerHello handshake message ( "ServerHello": { "server version" : "TLSv1.2", "random" : "90 0E CD 35 9D 41 57 9A 0A BF B3 0B 0F B1 03 A2 7D 00 AA BD AF B9 63 64 81 43 2F 4D 1F 66 4D F9", "session id" : "95 4E 22 48 F7 C0 E9 6E 1D 30 75 F9 FA 4E 35 08 9B 88 49 42 89 FA EB 83 4B 4F 67 5F DF EB 92 C5", "cipher suite" : "TLS_AES_128_GCM_SHA256(0x1301)", "compression methods" : "00", "extensions" : [ "supported_versions (43)": { "selected version": [TLSv1.3] }, "key_share (51)": { "server_share": { "named group": secp256r1 "key_exchange": { 0000: 04 8C 94 52 64 9E 6C F8 28 CA C1 C6 BC 22 D4 64 ...Rd.l.(....".d 0010: A2 BD 55 F9 E6 EE 27 CE 5D 92 11 CC EF 1E 2A 6D ..U...'.].....*m 0020: 02 A3 A9 A9 5F 26 76 7D 45 CA E9 DC 96 0C 7B 25 ...._&v.E......% 0030: E5 E8 C7 07 C0 CC BD 76 4A 3F D7 41 37 0B 2E 0B .......vJ?.A7... 0040: D3 } }, } ] } ) javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 11:24:00.209 IST|SSLCipher.java:1824|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE countdown value = 137438953472 javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 11:24:00.209 IST|SSLCipher.java:1978|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE countdown value = 137438953472 javax.net.ssl|ALL|22|https-jsse-nio-8443-exec-2|2019-11-18 11:24:00.210 IST|ServerNameExtension.java:538|No expected server name indication response javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 11:24:00.210 IST|SSLExtensions.java:256|Ignore, context unavailable extension: server_name javax.net.ssl|ALL|22|https-jsse-nio-8443-exec-2|2019-11-18 11:24:00.210 IST|MaxFragExtension.java:471|Ignore unavailable max_fragment_length extension javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 11:24:00.210 IST|SSLExtensions.java:256|Ignore, context unavailable extension: max_fragment_length javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 11:24:00.210 IST|AlpnExtension.java:363|Ignore unavailable extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 11:24:00.210 IST|SSLExtensions.java:256|Ignore, context unavailable extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 11:24:00.211 IST|EncryptedExtensions.java:137|Produced EncryptedExtensions message ( "EncryptedExtensions": [ "supported_groups (10)": { "versions": [secp256r1, secp384r1, secp521r1, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192] } ] ) javax.net.ssl|ALL|22|https-jsse-nio-8443-exec-2|2019-11-18 11:24:00.211 IST|SignatureScheme.java:365|Ignore inactive signature scheme: dsa_sha256 javax.net.ssl|ALL|22|https-jsse-nio-8443-exec-2|2019-11-18 11:24:00.211 IST|SignatureScheme.java:365|Ignore inactive signature scheme: dsa_sha1 javax.net.ssl|ALL|22|https-jsse-nio-8443-exec-2|2019-11-18 11:24:00.211 IST|SignatureScheme.java:365|Ignore inactive signature scheme: rsa_md5 javax.net.ssl|ALL|22|https-jsse-nio-8443-exec-2|2019-11-18 11:24:00.212 IST|SignatureScheme.java:365|Ignore inactive signature scheme: dsa_sha256 javax.net.ssl|ALL|22|https-jsse-nio-8443-exec-2|2019-11-18 11:24:00.212 IST|SignatureScheme.java:365|Ignore inactive signature scheme: dsa_sha1 javax.net.ssl|ALL|22|https-jsse-nio-8443-exec-2|2019-11-18 11:24:00.212 IST|SignatureScheme.java:365|Ignore inactive signature scheme: rsa_md5 javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 11:24:00.212 IST|CertificateRequest.java:882|Produced CertificateRequest message ( "CertificateRequest": { "certificate_request_context": "", "extensions": [ "signature_algorithms (13)": { "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1] }, "signature_algorithms_cert (50)": { "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1] } ] } ) javax.net.ssl|ALL|22|https-jsse-nio-8443-exec-2|2019-11-18 11:24:00.213 IST|X509Authentication.java:264|No X.509 cert selected for EC javax.net.ssl|WARNING|22|https-jsse-nio-8443-exec-2|2019-11-18 11:24:00.213 IST|CertificateMessage.java:1063|Unavailable authentication scheme: ecdsa_secp256r1_sha256 javax.net.ssl|ALL|22|https-jsse-nio-8443-exec-2|2019-11-18 11:24:00.213 IST|X509Authentication.java:264|No X.509 cert selected for EC javax.net.ssl|WARNING|22|https-jsse-nio-8443-exec-2|2019-11-18 11:24:00.213 IST|CertificateMessage.java:1063|Unavailable authentication scheme: ecdsa_secp384r1_sha384 javax.net.ssl|ALL|22|https-jsse-nio-8443-exec-2|2019-11-18 11:24:00.213 IST|X509Authentication.java:264|No X.509 cert selected for EC javax.net.ssl|WARNING|22|https-jsse-nio-8443-exec-2|2019-11-18 11:24:00.213 IST|CertificateMessage.java:1063|Unavailable authentication scheme: ecdsa_secp521r1_sha512 javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 11:24:00.213 IST|StatusResponseManager.java:763|Staping disabled or is a resumed session javax.net.ssl|ALL|22|https-jsse-nio-8443-exec-2|2019-11-18 11:24:00.213 IST|CertStatusExtension.java:1117|Stapling is disabled for this connection javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 11:24:00.213 IST|SSLExtensions.java:256|Ignore, context unavailable extension: status_request javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 11:24:00.214 IST|CertificateMessage.java:1002|Produced server Certificate message ( "Certificate": { "certificate_request_context": "", "certificate_list": [ { "certificate" : { "version" : "v3", "serial number" : "3B FD 86 4A 58 09 72 F6", "signature algorithm": "SHA512withRSA", "issuer" : "CN=localhost", "not before" : "2019-11-05 13:41:52.000 IST", "not after" : "2020-11-05 13:41:52.000 IST", "subject" : "CN=localhost", "subject public key" : "RSA", "extensions" : [ { ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:false PathLen:2147483647 ] }, { ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_Encipherment Data_Encipherment ] } ]} "extensions": { } }, ] } ) javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 11:24:00.226 IST|CertificateVerify.java:1113|Produced server CertificateVerify handshake message ( "CertificateVerify": { "signature algorithm": rsa_pss_rsae_sha256 "signature": { 0000: 74 12 C6 AC C7 21 63 90 0C D2 AF 93 4B E1 9A 33 t....!c.....K..3 0010: E3 8C 8A 33 C7 74 6E 23 39 9A A6 0A F4 26 BB D3 ...3.tn#9....&.. 0020: 24 DE 16 57 B5 AF 69 06 86 8A 99 78 74 E5 17 29 $..W..i....xt..) 0030: 0B 98 21 A9 68 47 10 A2 01 6B 2C CE CC AE 37 0E ..!.hG...k,...7. 0040: 92 C1 99 C0 95 31 BD F6 E6 84 B9 38 C9 0C BA 22 .....1.....8..." 0050: BB 28 04 66 9F 27 99 37 AD 85 51 B6 88 4B 51 73 .(.f.'.7..Q..KQs 0060: 37 CB 79 71 53 3C 00 09 2E 50 7F 36 B8 28 EC A3 7.yqS<...P.6.(.. 0070: 9D A8 D5 45 E9 75 77 C4 AF 6D EC 0D F2 13 E6 19 ...E.uw..m...... 0080: F4 D9 D4 7B F2 93 30 A3 30 25 71 9F C8 17 AC 4F ......0.0%q....O 0090: 9D 2E 7D 5C AD 9A F5 F9 B9 7C F2 ED BB A4 42 49 ...\..........BI 00A0: 46 BA A2 93 2A 3F 0B 9D 32 50 12 28 04 EB 99 8A F...*?..2P.(.... 00B0: 24 E9 2F F2 7D 21 BA 61 AE 0E 2A 6A 68 85 A8 A4 $./..!.a..*jh... 00C0: D5 7D 51 7C FA 07 DC 6D F4 4F 03 36 DF 52 44 62 ..Q....m.O.6.RDb 00D0: 98 E9 28 F2 7A 97 9B DC 6B 27 DD CF 0A 75 0B C8 ..(.z...k'...u.. 00E0: 1E 52 B1 51 F3 1C B0 9D C6 CC 13 0A 8C 63 CB AA .R.Q.........c.. 00F0: 17 22 F9 75 27 F4 48 F8 A3 DD 2E B5 4E 36 4C C3 .".u'.H.....N6L. } } ) javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 11:24:00.227 IST|Finished.java:773|Produced server Finished handshake message ( "Finished": { "verify data": { 0000: 99 62 B3 36 8C A6 D6 12 A0 E1 47 D5 CB 31 A9 8C .b.6......G..1.. 0010: C0 3A A9 B3 A5 D2 9C A9 48 90 38 7E DF B0 6C F5 .:......H.8...l. }'} ) javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 11:24:00.228 IST|SSLCipher.java:1978|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE countdown value = 137438953472 javax.net.ssl|DEBUG|2A|https-jsse-nio-8443-exec-10|2019-11-18 11:24:00.247 IST|ChangeCipherSpec.java:250|Consuming ChangeCipherSpec message javax.net.ssl|DEBUG|2A|https-jsse-nio-8443-exec-10|2019-11-18 11:24:00.248 IST|CertificateMessage.java:1158|Consuming client Certificate handshake message ( "Certificate": { "certificate_request_context": "", "certificate_list": [ { "certificate" : { "version" : "v3", "serial number" : "2C 8B E3 32 BC 02 24 C0", "signature algorithm": "SHA512withRSA", "issuer" : "CN=client", "not before" : "2019-11-05 13:43:21.000 IST", "not after" : "2020-11-05 13:43:21.000 IST", "subject" : "CN=client", "subject public key" : "RSA", "extensions" : [ { ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:false PathLen:2147483647 ] }, { ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_Encipherment Data_Encipherment ] } ]} "extensions": { } }, ] } ) javax.net.ssl|DEBUG|2A|https-jsse-nio-8443-exec-10|2019-11-18 11:24:00.250 IST|CertificateVerify.java:1165|Consuming CertificateVerify handshake message ( "CertificateVerify": { "signature algorithm": rsa_pss_rsae_sha256 "signature": { 0000: 4C 8C C3 B5 23 DC F1 7F EF 91 4D E3 E0 9F B3 81 L...#.....M..... 0010: 0C 7F 52 3E BB 98 21 BA C5 C6 00 3B AD 6C 87 1A ..R>..!....;.l.. 0020: DE AA 8E 17 F2 A5 D8 28 07 2B 72 B0 83 92 BC 53 .......(.+r....S 0030: 72 44 98 B9 11 2A F5 F7 C8 FD 1F 39 33 0F E4 67 rD...*.....93..g 0040: FF 65 CE 67 BD 16 75 65 9D 7B E2 21 21 76 37 F6 .e.g..ue...!!v7. 0050: E9 01 29 9E 00 99 7D 56 3E CC 11 F6 A1 C2 FD 1C ..)....V>....... 0060: CC 13 18 76 59 E3 FB E2 44 58 93 0E 3F BE 76 FF ...vY...DX..?.v. 0070: 71 28 56 FE 81 4A 05 3A 7D DD 06 06 C7 78 C5 E7 q(V..J.:.....x.. 0080: AA 7F C1 DB AF 9E D3 28 54 7C 6E 2C 5C D6 02 00 .......(T.n,\... 0090: 14 C0 37 01 50 A2 9C C3 F6 73 62 4E EC 25 FA 08 ..7.P....sbN.%.. 00A0: 4F 54 4F F2 02 B1 EA 19 C4 89 FB C6 E3 7C 0A 4C OTO............L 00B0: 5C A4 E8 30 C3 87 99 AE AE 9A C3 7C E5 EB 83 D7 \..0............ 00C0: 3C 06 E3 89 3C C7 7B D5 E4 01 F8 DB 19 40 CE 8F <...<........@.. 00D0: D8 96 27 BC 4E 26 57 E4 6B F7 F3 A5 3B DC 45 45 ..'.N&W.k...;.EE 00E0: E8 5F EE 0A 08 ED EE 64 41 38 15 E4 BD E7 BF 94 ._.....dA8...... 00F0: 83 BE 55 CA BD A7 80 17 4B 0D A0 07 D1 00 9C DD ..U.....K....... } } ) javax.net.ssl|DEBUG|2A|https-jsse-nio-8443-exec-10|2019-11-18 11:24:00.251 IST|Finished.java:1044|Consuming client Finished handshake message ( "Finished": { "verify data": { 0000: 95 8B 74 81 55 57 30 C9 76 EA D8 11 20 A7 3D 06 ..t.UW0.v... .=. 0010: AD 59 2F 9C 13 0D 91 BE EF 69 EA AC 2F EC D0 02 .Y/......i../... }'} ) javax.net.ssl|DEBUG|2A|https-jsse-nio-8443-exec-10|2019-11-18 11:24:00.251 IST|SSLCipher.java:1824|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE countdown value = 137438953472 javax.net.ssl|DEBUG|2A|https-jsse-nio-8443-exec-10|2019-11-18 11:24:00.252 IST|Finished.java:1148|Sending new session ticket 18-Nov-2019 11:24:00.252 FINE [https-jsse-nio-8443-exec-10] org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun Error during SSL handshake java.io.IOException: NOT_HANDSHAKING during handshake at org.apache.tomcat.util.net.SecureNioChannel.handshake(SecureNioChannel.java:193) at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1556) at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49) at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128) at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628) at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61) at java.base/java.lang.Thread.run(Thread.java:834) 18-Nov-2019 11:24:00.253 FINE [https-jsse-nio-8443-exec-10] org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper.doClose Calling [org.apache.tomcat.util.net.NioEndpoint@42b2b293].closeSocket([org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper@70b824a6:org.apache.tomcat.util.net.SecureNioChannel@102a92e:java.nio.channels.SocketChannel[connected local=/0:0:0:0:0:0:0:1:8443 remote=/0:0:0:0:0:0:0:1:62341]]) java.lang.Exception at org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper.doClose(NioEndpoint.java:1163) at org.apache.tomcat.util.net.SocketWrapperBase.close(SocketWrapperBase.java:402) at org.apache.tomcat.util.net.NioEndpoint$Poller.cancelledKey(NioEndpoint.java:665) at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1586) at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49) at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128) at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628) at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61) at java.base/java.lang.Thread.run(Thread.java:834) javax.net.ssl|ALL|2A|https-jsse-nio-8443-exec-10|2019-11-18 11:24:00.253 IST|SSLEngineImpl.java:756|Closing outbound of SSLEngine javax.net.ssl|WARNING|2A|https-jsse-nio-8443-exec-10|2019-11-18 11:24:00.253 IST|SSLEngineOutputRecord.java:168|outbound has closed, ignore outbound application data 18-Nov-2019 11:24:00.260 FINE [https-jsse-nio-8443-exec-4] org.apache.tomcat.util.net.SecureNioChannel.processSNI The SNI host name extracted for connection [java.nio.channels.SocketChannel[connected local=/0:0:0:0:0:0:0:1:8443 remote=/0:0:0:0:0:0:0:1:62342]] was [localhost] javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:00.262 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 for TLS10 javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:00.262 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 for TLS10 javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:00.262 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLS10 javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:00.262 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLS10 javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:00.262 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 for TLS13 javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:00.262 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 for TLS13 javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:00.263 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLS13 javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:00.263 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLS13 javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:00.263 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA for TLS13 javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:00.263 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA for TLS13 javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:00.263 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 for TLS11 javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:00.263 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 for TLS11 javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:00.263 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLS11 javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:00.263 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLS11 javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:00.265 IST|SSLExtensions.java:131|Ignore unknown or unsupported extension ( "unknown extension (28)": { 0000: 40 01 @. } ) javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:00.265 IST|SSLExtensions.java:131|Ignore unknown or unsupported extension ( "unknown extension (21)": { 0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0090: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ............... } ) javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:00.268 IST|ClientHello.java:806|Consuming ClientHello handshake message ( "ClientHello": { "client version" : "TLSv1.2", "random" : "05 A7 36 B5 05 8B BB B6 D0 D2 CC 40 93 BB 22 01 60 C0 2B 06 E0 49 62 0D B7 87 42 BD 3B 24 77 0C", "session id" : "5F 06 3C F1 F6 81 3C F2 C2 94 60 A0 33 EE 10 11 71 31 5C 62 42 8B ED FA B1 38 7A 37 72 96 0D 19", "cipher suites" : "[TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_AES_256_GCM_SHA384(0x1302), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), UNKNOWN-CIPHER-SUITE(0xCCA9)(0xCCA9), UNKNOWN-CIPHER-SUITE(0xCCA8)(0xCCA8), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA(0xC00A), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA(0xC009), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA(0xC013), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA(0xC014), TLS_DHE_RSA_WITH_AES_128_CBC_SHA(0x0033), TLS_DHE_RSA_WITH_AES_256_CBC_SHA(0x0039), TLS_RSA_WITH_AES_128_CBC_SHA(0x002F), TLS_RSA_WITH_AES_256_CBC_SHA(0x0035), SSL_RSA_WITH_3DES_EDE_CBC_SHA(0x000A)]", "compression methods" : "00", "extensions" : [ "server_name (0)": { type=host_name (0), value=localhost }, "extended_master_secret (23)": { }, "renegotiation_info (65,281)": { "renegotiated connection": [] }, "supported_groups (10)": { "versions": [x25519, secp256r1, secp384r1, secp521r1, ffdhe2048, ffdhe3072] }, "ec_point_formats (11)": { "formats": [uncompressed] }, "application_layer_protocol_negotiation (16)": { [h2, http/1.1] }, "status_request (5)": { "certificate status type": ocsp "OCSP status request": { "responder_id": "request extensions": { } } }, "key_share (51)": { "client_shares": [ { "named group": x25519 "key_exchange": { 0000: 98 F1 6B C2 64 E2 10 AF 3D 21 08 4E F5 1F C6 50 ..k.d...=!.N...P 0010: 13 93 67 3D 5F E0 F9 05 60 B5 B8 D0 0B 83 44 1D ..g=_...`.....D. } }, { "named group": secp256r1 "key_exchange": { 0000: 04 71 94 43 A0 DC FD 5C FA 54 B2 E8 A0 17 46 48 .q.C...\.T....FH 0010: 81 46 18 6D 49 95 71 3C 89 28 30 34 AA 62 14 AB .F.mI.q<.(04.b.. 0020: D2 EE 68 BF 79 20 B7 C3 C3 D4 10 1A 40 68 06 C3 ..h.y ......@h.. 0030: 44 E6 25 F4 9B 5C D7 B8 9F E5 87 E1 FA 9B 22 BC D.%..\........". 0040: C6 } }, ] }, "supported_versions (43)": { "versions": [TLSv1.3, TLSv1.2, TLSv1.1, TLSv1] }, "signature_algorithms (13)": { "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1] }, "unknown extension (28)": { 0000: 40 01 @. }, "unknown extension (21)": { 0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0090: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ............... } ] } ) javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:00.268 IST|SSLExtensions.java:188|Consumed extension: supported_versions javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:00.268 IST|ClientHello.java:836|Negotiated protocol version: TLSv1.3 javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:00.268 IST|PskKeyExchangeModesExtension.java:294|abort session resumption, no supported psk_dhe_ke PSK key exchange mode javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:00.268 IST|PreSharedKeyExtension.java:809|Handling pre_shared_key absence. javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:00.268 IST|ServerNameExtension.java:328|no server name matchers, ignore server name indication javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:00.268 IST|SSLExtensions.java:188|Consumed extension: server_name javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:00.269 IST|SSLExtensions.java:169|Ignore unavailable extension: max_fragment_length javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:00.269 IST|SSLExtensions.java:188|Consumed extension: status_request javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:00.269 IST|SSLExtensions.java:188|Consumed extension: supported_groups javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:00.269 IST|SSLExtensions.java:159|Ignore unsupported extension: ec_point_formats javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:00.269 IST|SSLExtensions.java:188|Consumed extension: signature_algorithms javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:00.269 IST|SSLExtensions.java:169|Ignore unavailable extension: signature_algorithms_cert javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:00.269 IST|AlpnExtension.java:274|Ignore server unenabled extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:00.269 IST|SSLExtensions.java:188|Consumed extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:00.269 IST|SSLExtensions.java:159|Ignore unsupported extension: status_request_v2 javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:00.269 IST|SSLExtensions.java:159|Ignore unsupported extension: extended_master_secret javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:00.269 IST|SSLExtensions.java:169|Ignore unavailable extension: cookie javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:00.270 IST|KeyShareExtension.java:350|Ignore unsupported named group: x25519 javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:00.270 IST|SSLExtensions.java:188|Consumed extension: key_share javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:00.270 IST|SSLExtensions.java:159|Ignore unsupported extension: renegotiation_info javax.net.ssl|ALL|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:00.270 IST|SignatureScheme.java:360|Ignore disabled signature scheme: rsa_md5 javax.net.ssl|WARNING|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:00.271 IST|SSLExtensions.java:211|Ignore impact of unsupported extension: server_name javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:00.271 IST|SSLExtensions.java:203|Ignore unavailable extension: max_fragment_length javax.net.ssl|WARNING|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:00.271 IST|SSLExtensions.java:211|Ignore impact of unsupported extension: status_request javax.net.ssl|WARNING|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:00.271 IST|SSLExtensions.java:211|Ignore impact of unsupported extension: supported_groups javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:00.271 IST|SSLExtensions.java:220|Populated with extension: signature_algorithms javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:00.271 IST|SSLExtensions.java:203|Ignore unavailable extension: signature_algorithms_cert javax.net.ssl|WARNING|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:00.271 IST|SSLExtensions.java:211|Ignore impact of unsupported extension: application_layer_protocol_negotiation javax.net.ssl|WARNING|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:00.271 IST|SSLExtensions.java:211|Ignore impact of unsupported extension: supported_versions javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:00.271 IST|SSLExtensions.java:203|Ignore unavailable extension: cookie javax.net.ssl|WARNING|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:00.272 IST|SSLExtensions.java:211|Ignore impact of unsupported extension: key_share javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:00.272 IST|SSLExtensions.java:203|Ignore unavailable extension: pre_shared_key javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:00.272 IST|ServerHello.java:729|use cipher suite TLS_AES_128_GCM_SHA256 javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:00.301 IST|SSLExtensions.java:256|Ignore, context unavailable extension: pre_shared_key javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:00.302 IST|ServerHello.java:580|Produced ServerHello handshake message ( "ServerHello": { "server version" : "TLSv1.2", "random" : "CF 39 5D 1F 23 A3 5B 15 3D 44 0B 1F 37 94 4A 66 4F 2E 35 31 B6 47 E2 19 31 3C E8 32 05 D7 CB 69", "session id" : "5F 06 3C F1 F6 81 3C F2 C2 94 60 A0 33 EE 10 11 71 31 5C 62 42 8B ED FA B1 38 7A 37 72 96 0D 19", "cipher suite" : "TLS_AES_128_GCM_SHA256(0x1301)", "compression methods" : "00", "extensions" : [ "supported_versions (43)": { "selected version": [TLSv1.3] }, "key_share (51)": { "server_share": { "named group": secp256r1 "key_exchange": { 0000: 04 62 D3 8A B7 AD 56 01 20 88 35 71 AC 81 4E A7 .b....V. .5q..N. 0010: 12 0E 89 08 8C E1 03 95 3E D1 B9 D4 70 74 F1 91 ........>...pt.. 0020: 84 CA B5 75 B0 7D 6D CE 0C 63 9C 7F 6A D0 43 DE ...u..m..c..j.C. 0030: EB 81 60 2D 96 77 C6 6D 0B A0 C2 01 8E 6E 3E 61 ..`-.w.m.....n>a 0040: 51 } }, } ] } ) javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:00.309 IST|SSLCipher.java:1824|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE countdown value = 137438953472 javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:00.309 IST|SSLCipher.java:1978|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE countdown value = 137438953472 javax.net.ssl|ALL|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:00.309 IST|ServerNameExtension.java:538|No expected server name indication response javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:00.310 IST|SSLExtensions.java:256|Ignore, context unavailable extension: server_name javax.net.ssl|ALL|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:00.310 IST|MaxFragExtension.java:471|Ignore unavailable max_fragment_length extension javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:00.310 IST|SSLExtensions.java:256|Ignore, context unavailable extension: max_fragment_length javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:00.310 IST|AlpnExtension.java:363|Ignore unavailable extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:00.310 IST|SSLExtensions.java:256|Ignore, context unavailable extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:00.310 IST|EncryptedExtensions.java:137|Produced EncryptedExtensions message ( "EncryptedExtensions": [ "supported_groups (10)": { "versions": [secp256r1, secp384r1, secp521r1, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192] } ] ) javax.net.ssl|ALL|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:00.311 IST|SignatureScheme.java:365|Ignore inactive signature scheme: dsa_sha256 javax.net.ssl|ALL|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:00.311 IST|SignatureScheme.java:365|Ignore inactive signature scheme: dsa_sha1 javax.net.ssl|ALL|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:00.311 IST|SignatureScheme.java:365|Ignore inactive signature scheme: rsa_md5 javax.net.ssl|ALL|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:00.311 IST|SignatureScheme.java:365|Ignore inactive signature scheme: dsa_sha256 javax.net.ssl|ALL|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:00.311 IST|SignatureScheme.java:365|Ignore inactive signature scheme: dsa_sha1 javax.net.ssl|ALL|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:00.312 IST|SignatureScheme.java:365|Ignore inactive signature scheme: rsa_md5 javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:00.312 IST|CertificateRequest.java:882|Produced CertificateRequest message ( "CertificateRequest": { "certificate_request_context": "", "extensions": [ "signature_algorithms (13)": { "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1] }, "signature_algorithms_cert (50)": { "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1] } ] } ) javax.net.ssl|ALL|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:00.312 IST|X509Authentication.java:264|No X.509 cert selected for EC javax.net.ssl|WARNING|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:00.312 IST|CertificateMessage.java:1063|Unavailable authentication scheme: ecdsa_secp256r1_sha256 javax.net.ssl|ALL|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:00.312 IST|X509Authentication.java:264|No X.509 cert selected for EC javax.net.ssl|WARNING|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:00.312 IST|CertificateMessage.java:1063|Unavailable authentication scheme: ecdsa_secp384r1_sha384 javax.net.ssl|ALL|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:00.312 IST|X509Authentication.java:264|No X.509 cert selected for EC javax.net.ssl|WARNING|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:00.313 IST|CertificateMessage.java:1063|Unavailable authentication scheme: ecdsa_secp521r1_sha512 javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:00.313 IST|StatusResponseManager.java:763|Staping disabled or is a resumed session javax.net.ssl|ALL|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:00.313 IST|CertStatusExtension.java:1117|Stapling is disabled for this connection javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:00.313 IST|SSLExtensions.java:256|Ignore, context unavailable extension: status_request javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:00.313 IST|CertificateMessage.java:1002|Produced server Certificate message ( "Certificate": { "certificate_request_context": "", "certificate_list": [ { "certificate" : { "version" : "v3", "serial number" : "3B FD 86 4A 58 09 72 F6", "signature algorithm": "SHA512withRSA", "issuer" : "CN=localhost", "not before" : "2019-11-05 13:41:52.000 IST", "not after" : "2020-11-05 13:41:52.000 IST", "subject" : "CN=localhost", "subject public key" : "RSA", "extensions" : [ { ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:false PathLen:2147483647 ] }, { ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_Encipherment Data_Encipherment ] } ]} "extensions": { } }, ] } ) javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:00.324 IST|CertificateVerify.java:1113|Produced server CertificateVerify handshake message ( "CertificateVerify": { "signature algorithm": rsa_pss_rsae_sha256 "signature": { 0000: 60 C5 99 90 3E DC B1 15 53 6D 16 AB 3F DD 46 0E `...>...Sm..?.F. 0010: 9E 48 79 78 93 E7 F1 00 5E 62 59 6C 0D 9F 66 8C .Hyx....^bYl..f. 0020: 74 80 74 2D 46 29 71 00 3D 35 48 B0 B4 93 65 EE t.t-F)q.=5H...e. 0030: 47 F1 96 49 A3 BD D3 40 A1 76 10 87 C8 42 2C D1 G..I...@.v...B,. 0040: 85 C7 5F 2C 1B D1 FC 39 41 97 FE 94 7B 82 38 2F .._,...9A.....8/ 0050: AD D3 A9 04 6F B8 F1 DD 98 99 FC 79 F2 E7 40 42 ....o......y..@B 0060: 48 8C 39 76 B9 06 72 64 DB 21 5C 2B E3 93 28 74 H.9v..rd.!\+..(t 0070: 45 83 FB 20 FC 72 52 9C F9 FE DB AD 58 A6 EE FE E.. .rR.....X... 0080: BD FA 68 BC E7 AF 5E 5C 25 4C F1 0C EC 27 53 F2 ..h...^\%L...'S. 0090: 57 76 C8 44 16 B8 92 03 5D 12 F5 1F 7B 0B A6 13 Wv.D....]....... 00A0: 1B 33 09 68 DC 80 F6 8E 62 6B 3E D7 70 16 C0 AD .3.h....bk>.p... 00B0: 51 29 DF 87 FE F0 55 30 C2 45 7B C4 C0 7D E2 E6 Q)....U0.E...... 00C0: 30 F3 16 6A 23 CF 7C 43 48 77 DB 42 08 F4 B2 40 0..j#..CHw.B...@ 00D0: 61 80 E9 5F 50 9C 52 1C 40 C2 2B DA FE BF 9C 4B a.._P.R.@.+....K 00E0: C1 A3 76 87 D8 3A FD 8B F7 2A 5C 15 EA 39 75 6F ..v..:...*\..9uo 00F0: F3 5A CE B8 4B 87 91 8B 55 50 B4 6F 2F 99 4C EE .Z..K...UP.o/.L. } } ) javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:00.324 IST|Finished.java:773|Produced server Finished handshake message ( "Finished": { "verify data": { 0000: E6 3A 59 48 4F 16 69 F3 7E 29 07 04 4F 6A 1F BF .:YHO.i..)..Oj.. 0010: 23 3B B2 D4 4E 1D B6 2D 50 EA 9D 9C BA 1F D8 D8 #;..N..-P....... }'} ) javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:00.325 IST|SSLCipher.java:1978|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE countdown value = 137438953472 javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 11:24:00.362 IST|ChangeCipherSpec.java:250|Consuming ChangeCipherSpec message javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 11:24:00.364 IST|CertificateMessage.java:1158|Consuming client Certificate handshake message ( "Certificate": { "certificate_request_context": "", "certificate_list": [ { "certificate" : { "version" : "v3", "serial number" : "2C 8B E3 32 BC 02 24 C0", "signature algorithm": "SHA512withRSA", "issuer" : "CN=client", "not before" : "2019-11-05 13:43:21.000 IST", "not after" : "2020-11-05 13:43:21.000 IST", "subject" : "CN=client", "subject public key" : "RSA", "extensions" : [ { ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:false PathLen:2147483647 ] }, { ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_Encipherment Data_Encipherment ] } ]} "extensions": { } }, ] } ) javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 11:24:00.368 IST|CertificateVerify.java:1165|Consuming CertificateVerify handshake message ( "CertificateVerify": { "signature algorithm": rsa_pss_rsae_sha256 "signature": { 0000: 2E 3B 18 58 09 EE 4E D0 B4 BB D7 EC C1 9E 16 17 .;.X..N......... 0010: 73 E8 C9 19 0E 61 CB E6 15 95 45 E8 83 D6 D1 24 s....a....E....$ 0020: 63 37 15 84 6D 76 DB 6A 34 FA 32 AE 04 6D 64 A8 c7..mv.j4.2..md. 0030: DA BB 17 45 AD A0 F2 8D 54 7C 48 56 4C C1 1D A5 ...E....T.HVL... 0040: E1 CD 81 5A 51 24 00 78 BD D7 2C 08 CA 5B 3F 79 ...ZQ$.x..,..[?y 0050: FE 25 58 69 5A 7B 57 FD E1 88 E5 49 51 49 2C 23 .%XiZ.W....IQI,# 0060: 10 5C E6 A7 88 52 6B 31 15 8E 8D 65 8A E0 35 B8 .\...Rk1...e..5. 0070: F9 EB B9 A3 87 9A 19 C6 AD B1 40 CA 5B 41 75 AC ..........@.[Au. 0080: 1A B4 37 5C 51 45 6C 04 22 C5 5A EB B3 F3 56 1F ..7\QEl.".Z...V. 0090: 2B E7 02 4A 62 43 58 DF 6A 51 D5 86 72 F8 10 B5 +..JbCX.jQ..r... 00A0: 9C 5A B6 32 6A 41 4A D8 08 E5 4F C5 AC E1 F0 28 .Z.2jAJ...O....( 00B0: 3A DF 81 DD 45 E8 86 28 8C 63 71 4E D9 41 CB E1 :...E..(.cqN.A.. 00C0: 8E 94 05 2A 61 E6 5A F9 0B 38 6F 22 FD 23 65 16 ...*a.Z..8o".#e. 00D0: 2D B9 34 15 85 07 1E 93 0D CA 5E 01 DD A7 A7 56 -.4.......^....V 00E0: E7 78 8D 7B 12 AE 20 B1 C0 88 A9 08 C9 AD F5 D5 .x.... ......... 00F0: A9 1C F6 DC 36 07 1C D7 7C A8 61 F7 FE 88 44 9E ....6.....a...D. } } ) javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 11:24:00.368 IST|Finished.java:1044|Consuming client Finished handshake message ( "Finished": { "verify data": { 0000: AE BE 46 E0 3B 16 99 06 3B 1D 5D 54 82 6F B4 F1 ..F.;...;.]T.o.. 0010: 9F D7 A2 85 E9 6C D2 8F A3 C5 76 AE B1 56 B1 DE .....l....v..V.. }'} ) javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 11:24:00.369 IST|SSLCipher.java:1824|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE countdown value = 137438953472 javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 11:24:00.369 IST|Finished.java:1148|Sending new session ticket 18-Nov-2019 11:24:00.370 FINE [https-jsse-nio-8443-exec-1] org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun Error during SSL handshake java.io.IOException: NOT_HANDSHAKING during handshake at org.apache.tomcat.util.net.SecureNioChannel.handshake(SecureNioChannel.java:193) at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1556) at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49) at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128) at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628) at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61) at java.base/java.lang.Thread.run(Thread.java:834) 18-Nov-2019 11:24:00.371 FINE [https-jsse-nio-8443-exec-1] org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper.doClose Calling [org.apache.tomcat.util.net.NioEndpoint@42b2b293].closeSocket([org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper@445821d0:org.apache.tomcat.util.net.SecureNioChannel@102a92e:java.nio.channels.SocketChannel[connected local=/0:0:0:0:0:0:0:1:8443 remote=/0:0:0:0:0:0:0:1:62342]]) java.lang.Exception at org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper.doClose(NioEndpoint.java:1163) at org.apache.tomcat.util.net.SocketWrapperBase.close(SocketWrapperBase.java:402) at org.apache.tomcat.util.net.NioEndpoint$Poller.cancelledKey(NioEndpoint.java:665) at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1586) at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49) at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128) at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628) at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61) at java.base/java.lang.Thread.run(Thread.java:834) javax.net.ssl|ALL|21|https-jsse-nio-8443-exec-1|2019-11-18 11:24:00.371 IST|SSLEngineImpl.java:756|Closing outbound of SSLEngine javax.net.ssl|WARNING|21|https-jsse-nio-8443-exec-1|2019-11-18 11:24:00.385 IST|SSLEngineOutputRecord.java:168|outbound has closed, ignore outbound application data 18-Nov-2019 11:24:00.392 FINE [https-jsse-nio-8443-exec-3] org.apache.tomcat.util.net.SecureNioChannel.processSNI The SNI host name extracted for connection [java.nio.channels.SocketChannel[connected local=/0:0:0:0:0:0:0:1:8443 remote=/0:0:0:0:0:0:0:1:62343]] was [localhost] javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:00.392 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 for TLS10 javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:00.393 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 for TLS10 javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:00.393 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLS10 javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:00.393 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLS10 javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:00.393 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 for TLS13 javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:00.393 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 for TLS13 javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:00.393 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLS13 javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:00.393 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLS13 javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:00.393 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA for TLS13 javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:00.393 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA for TLS13 javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:00.393 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 for TLS11 javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:00.394 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 for TLS11 javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:00.394 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLS11 javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:00.394 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLS11 javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:00.420 IST|SSLExtensions.java:131|Ignore unknown or unsupported extension ( "unknown extension (28)": { 0000: 40 01 @. } ) javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:00.421 IST|SSLExtensions.java:131|Ignore unknown or unsupported extension ( "unknown extension (21)": { 0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0090: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ............... } ) javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:00.424 IST|ClientHello.java:806|Consuming ClientHello handshake message ( "ClientHello": { "client version" : "TLSv1.2", "random" : "4B 7D BB 48 D7 F3 68 D8 23 55 90 70 63 96 FA BF 76 DC EA EE 79 26 7F 46 98 CD EA A6 AA 02 67 DE", "session id" : "A5 22 DD 25 FC EF 57 2F 52 A7 37 A7 0A A0 9A 59 CF AB 95 83 FC 22 A1 E7 7F 4C 36 DC 86 88 EF CD", "cipher suites" : "[TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_AES_256_GCM_SHA384(0x1302), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), UNKNOWN-CIPHER-SUITE(0xCCA9)(0xCCA9), UNKNOWN-CIPHER-SUITE(0xCCA8)(0xCCA8), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA(0xC00A), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA(0xC009), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA(0xC013), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA(0xC014), TLS_DHE_RSA_WITH_AES_128_CBC_SHA(0x0033), TLS_DHE_RSA_WITH_AES_256_CBC_SHA(0x0039), TLS_RSA_WITH_AES_128_CBC_SHA(0x002F), TLS_RSA_WITH_AES_256_CBC_SHA(0x0035), SSL_RSA_WITH_3DES_EDE_CBC_SHA(0x000A)]", "compression methods" : "00", "extensions" : [ "server_name (0)": { type=host_name (0), value=localhost }, "extended_master_secret (23)": { }, "renegotiation_info (65,281)": { "renegotiated connection": [] }, "supported_groups (10)": { "versions": [x25519, secp256r1, secp384r1, secp521r1, ffdhe2048, ffdhe3072] }, "ec_point_formats (11)": { "formats": [uncompressed] }, "application_layer_protocol_negotiation (16)": { [h2, http/1.1] }, "status_request (5)": { "certificate status type": ocsp "OCSP status request": { "responder_id": "request extensions": { } } }, "key_share (51)": { "client_shares": [ { "named group": x25519 "key_exchange": { 0000: D4 CA 21 DC E6 26 6C 40 FC EA 1F 05 20 98 2D 9C ..!..&l@.... .-. 0010: 86 98 4A 37 FD A7 A6 D9 7E 9B 53 27 BF 82 A5 2A ..J7......S'...* } }, { "named group": secp256r1 "key_exchange": { 0000: 04 2B 25 DB C0 F0 6B 13 9C 3F 2B E0 01 54 00 8C .+%...k..?+..T.. 0010: 7C 30 1E 87 55 98 60 31 57 73 25 28 EE CF 11 53 .0..U.`1Ws%(...S 0020: E4 C7 F0 57 0E 70 57 FE BB 9E AC 9A D8 8A CE 08 ...W.pW......... 0030: 88 8D E6 43 C6 E1 D2 61 6F 0F E8 04 E7 E4 59 0D ...C...ao.....Y. 0040: 67 } }, ] }, "supported_versions (43)": { "versions": [TLSv1.3, TLSv1.2, TLSv1.1, TLSv1] }, "signature_algorithms (13)": { "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1] }, "unknown extension (28)": { 0000: 40 01 @. }, "unknown extension (21)": { 0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0090: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ............... } ] } ) javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:00.424 IST|SSLExtensions.java:188|Consumed extension: supported_versions javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:00.424 IST|ClientHello.java:836|Negotiated protocol version: TLSv1.3 javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:00.424 IST|PskKeyExchangeModesExtension.java:294|abort session resumption, no supported psk_dhe_ke PSK key exchange mode javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:00.424 IST|PreSharedKeyExtension.java:809|Handling pre_shared_key absence. javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:00.425 IST|ServerNameExtension.java:328|no server name matchers, ignore server name indication javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:00.425 IST|SSLExtensions.java:188|Consumed extension: server_name javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:00.425 IST|SSLExtensions.java:169|Ignore unavailable extension: max_fragment_length javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:00.425 IST|SSLExtensions.java:188|Consumed extension: status_request javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:00.425 IST|SSLExtensions.java:188|Consumed extension: supported_groups javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:00.425 IST|SSLExtensions.java:159|Ignore unsupported extension: ec_point_formats javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:00.425 IST|SSLExtensions.java:188|Consumed extension: signature_algorithms javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:00.425 IST|SSLExtensions.java:169|Ignore unavailable extension: signature_algorithms_cert javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:00.425 IST|AlpnExtension.java:274|Ignore server unenabled extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:00.425 IST|SSLExtensions.java:188|Consumed extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:00.425 IST|SSLExtensions.java:159|Ignore unsupported extension: status_request_v2 javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:00.425 IST|SSLExtensions.java:159|Ignore unsupported extension: extended_master_secret javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:00.425 IST|SSLExtensions.java:169|Ignore unavailable extension: cookie javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:00.425 IST|KeyShareExtension.java:350|Ignore unsupported named group: x25519 javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:00.426 IST|SSLExtensions.java:188|Consumed extension: key_share javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:00.426 IST|SSLExtensions.java:159|Ignore unsupported extension: renegotiation_info javax.net.ssl|ALL|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:00.426 IST|SignatureScheme.java:360|Ignore disabled signature scheme: rsa_md5 javax.net.ssl|WARNING|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:00.426 IST|SSLExtensions.java:211|Ignore impact of unsupported extension: server_name javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:00.426 IST|SSLExtensions.java:203|Ignore unavailable extension: max_fragment_length javax.net.ssl|WARNING|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:00.426 IST|SSLExtensions.java:211|Ignore impact of unsupported extension: status_request javax.net.ssl|WARNING|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:00.427 IST|SSLExtensions.java:211|Ignore impact of unsupported extension: supported_groups javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:00.427 IST|SSLExtensions.java:220|Populated with extension: signature_algorithms javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:00.427 IST|SSLExtensions.java:203|Ignore unavailable extension: signature_algorithms_cert javax.net.ssl|WARNING|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:00.427 IST|SSLExtensions.java:211|Ignore impact of unsupported extension: application_layer_protocol_negotiation javax.net.ssl|WARNING|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:00.427 IST|SSLExtensions.java:211|Ignore impact of unsupported extension: supported_versions javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:00.427 IST|SSLExtensions.java:203|Ignore unavailable extension: cookie javax.net.ssl|WARNING|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:00.427 IST|SSLExtensions.java:211|Ignore impact of unsupported extension: key_share javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:00.427 IST|SSLExtensions.java:203|Ignore unavailable extension: pre_shared_key javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:00.427 IST|ServerHello.java:729|use cipher suite TLS_AES_128_GCM_SHA256 javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:00.432 IST|SSLExtensions.java:256|Ignore, context unavailable extension: pre_shared_key javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:00.433 IST|ServerHello.java:580|Produced ServerHello handshake message ( "ServerHello": { "server version" : "TLSv1.2", "random" : "79 C9 A2 42 54 7C 25 E8 43 C0 57 E3 9B D1 E3 20 77 95 F7 B8 26 6E 34 1B 2F 51 AB 64 94 73 C2 EA", "session id" : "A5 22 DD 25 FC EF 57 2F 52 A7 37 A7 0A A0 9A 59 CF AB 95 83 FC 22 A1 E7 7F 4C 36 DC 86 88 EF CD", "cipher suite" : "TLS_AES_128_GCM_SHA256(0x1301)", "compression methods" : "00", "extensions" : [ "supported_versions (43)": { "selected version": [TLSv1.3] }, "key_share (51)": { "server_share": { "named group": secp256r1 "key_exchange": { 0000: 04 CA E1 7F 34 FA 26 22 FB 98 DA 3E 85 40 5C 7B ....4.&"...>.@\. 0010: 8F 1D 00 31 39 D2 69 B9 9A B1 1E E8 51 68 30 D7 ...19.i.....Qh0. 0020: 1B C2 0C 27 91 78 8B FA BE B8 E2 C2 45 BC 4D 27 ...'.x......E.M' 0030: 06 60 36 18 DF F5 1B CE 6E B6 C1 19 65 3D 1E 74 .`6.....n...e=.t 0040: B0 } }, } ] } ) javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:00.439 IST|SSLCipher.java:1824|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE countdown value = 137438953472 javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:00.446 IST|SSLCipher.java:1978|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE countdown value = 137438953472 javax.net.ssl|ALL|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:00.446 IST|ServerNameExtension.java:538|No expected server name indication response javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:00.446 IST|SSLExtensions.java:256|Ignore, context unavailable extension: server_name javax.net.ssl|ALL|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:00.446 IST|MaxFragExtension.java:471|Ignore unavailable max_fragment_length extension javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:00.446 IST|SSLExtensions.java:256|Ignore, context unavailable extension: max_fragment_length javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:00.446 IST|AlpnExtension.java:363|Ignore unavailable extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:00.446 IST|SSLExtensions.java:256|Ignore, context unavailable extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:00.447 IST|EncryptedExtensions.java:137|Produced EncryptedExtensions message ( "EncryptedExtensions": [ "supported_groups (10)": { "versions": [secp256r1, secp384r1, secp521r1, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192] } ] ) javax.net.ssl|ALL|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:00.447 IST|SignatureScheme.java:365|Ignore inactive signature scheme: dsa_sha256 javax.net.ssl|ALL|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:00.447 IST|SignatureScheme.java:365|Ignore inactive signature scheme: dsa_sha1 javax.net.ssl|ALL|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:00.447 IST|SignatureScheme.java:365|Ignore inactive signature scheme: rsa_md5 javax.net.ssl|ALL|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:00.447 IST|SignatureScheme.java:365|Ignore inactive signature scheme: dsa_sha256 javax.net.ssl|ALL|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:00.448 IST|SignatureScheme.java:365|Ignore inactive signature scheme: dsa_sha1 javax.net.ssl|ALL|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:00.448 IST|SignatureScheme.java:365|Ignore inactive signature scheme: rsa_md5 javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:00.448 IST|CertificateRequest.java:882|Produced CertificateRequest message ( "CertificateRequest": { "certificate_request_context": "", "extensions": [ "signature_algorithms (13)": { "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1] }, "signature_algorithms_cert (50)": { "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1] } ] } ) javax.net.ssl|ALL|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:00.448 IST|X509Authentication.java:264|No X.509 cert selected for EC javax.net.ssl|WARNING|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:00.448 IST|CertificateMessage.java:1063|Unavailable authentication scheme: ecdsa_secp256r1_sha256 javax.net.ssl|ALL|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:00.448 IST|X509Authentication.java:264|No X.509 cert selected for EC javax.net.ssl|WARNING|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:00.448 IST|CertificateMessage.java:1063|Unavailable authentication scheme: ecdsa_secp384r1_sha384 javax.net.ssl|ALL|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:00.448 IST|X509Authentication.java:264|No X.509 cert selected for EC javax.net.ssl|WARNING|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:00.448 IST|CertificateMessage.java:1063|Unavailable authentication scheme: ecdsa_secp521r1_sha512 javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:00.449 IST|StatusResponseManager.java:763|Staping disabled or is a resumed session javax.net.ssl|ALL|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:00.449 IST|CertStatusExtension.java:1117|Stapling is disabled for this connection javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:00.449 IST|SSLExtensions.java:256|Ignore, context unavailable extension: status_request javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:00.449 IST|CertificateMessage.java:1002|Produced server Certificate message ( "Certificate": { "certificate_request_context": "", "certificate_list": [ { "certificate" : { "version" : "v3", "serial number" : "3B FD 86 4A 58 09 72 F6", "signature algorithm": "SHA512withRSA", "issuer" : "CN=localhost", "not before" : "2019-11-05 13:41:52.000 IST", "not after" : "2020-11-05 13:41:52.000 IST", "subject" : "CN=localhost", "subject public key" : "RSA", "extensions" : [ { ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:false PathLen:2147483647 ] }, { ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_Encipherment Data_Encipherment ] } ]} "extensions": { } }, ] } ) javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:00.461 IST|CertificateVerify.java:1113|Produced server CertificateVerify handshake message ( "CertificateVerify": { "signature algorithm": rsa_pss_rsae_sha256 "signature": { 0000: 6B 02 91 14 FF 04 90 C1 31 E1 41 5C D5 E1 7A B1 k.......1.A\..z. 0010: 50 C8 4D B7 25 8F EF A6 E7 41 34 48 3C 69 FF 1F P.M.%....A4H } }, ] } ) javax.net.ssl|DEBUG|25|https-jsse-nio-8443-exec-5|2019-11-18 11:24:00.492 IST|CertificateVerify.java:1165|Consuming CertificateVerify handshake message ( "CertificateVerify": { "signature algorithm": rsa_pss_rsae_sha256 "signature": { 0000: 5B 1F 98 B0 A2 27 48 27 A1 15 BB 77 63 25 77 F0 [....'H'...wc%w. 0010: F0 70 BF CD 80 EC 73 95 63 38 04 AB C2 B2 F2 E5 .p....s.c8...... 0020: EB 14 40 13 C7 FE A8 3D 6A D1 0E FC 3D AE 40 FB ..@....=j...=.@. 0030: C1 EC 77 F6 C9 C5 B1 4A C1 0B FC 84 D3 DD 74 95 ..w....J......t. 0040: 9D 84 D0 88 C0 8F F4 A6 74 6A 55 8F 75 AD 36 25 ........tjU.u.6% 0050: BA 85 1E 3B A2 9A 41 C1 4C B7 47 83 B2 BF 50 02 ...;..A.L.G...P. 0060: DE 1D 82 79 81 B3 54 80 16 6B 5D 48 F8 39 F2 EE ...y..T..k]H.9.. 0070: 24 C7 D8 44 A4 C3 49 C3 C6 F5 03 02 01 6A B3 5A $..D..I......j.Z 0080: 88 96 EA 47 EB A4 E3 4C 9D BA F4 43 B0 B7 30 7A ...G...L...C..0z 0090: F1 CF 7F F6 77 B8 5F 71 4D 67 06 FD 1A 29 BF 4A ....w._qMg...).J 00A0: 45 20 A8 90 7F D1 2C 89 A6 98 72 5E 64 13 E5 2E E ....,...r^d... 00B0: DB 51 C3 C8 E6 59 EA 66 46 A2 64 DB B0 C0 37 A6 .Q...Y.fF.d...7. 00C0: A0 91 05 44 1C BC 2C F4 29 3E FD 24 7F FF BC 4E ...D..,.)>.$...N 00D0: 9E A9 A2 FD 01 48 AE 8F B8 B0 45 C2 DD 38 02 5B .....H....E..8.[ 00E0: 59 F5 6A CE A0 6D C3 09 76 5A 63 97 55 6D B8 AD Y.j..m..vZc.Um.. 00F0: A9 F6 E6 9F 8A 32 2D 24 F5 4C 9B 18 AE 3F 4C 42 .....2-$.L...?LB } } ) javax.net.ssl|DEBUG|25|https-jsse-nio-8443-exec-5|2019-11-18 11:24:00.493 IST|Finished.java:1044|Consuming client Finished handshake message ( "Finished": { "verify data": { 0000: 79 D2 96 4C A4 1B 8E 98 EF 5B 99 18 83 DF E7 47 y..L.....[.....G 0010: DA E4 97 18 E3 09 B3 5C 9B F7 52 10 9D 8D 59 BC .......\..R...Y. }'} ) javax.net.ssl|DEBUG|25|https-jsse-nio-8443-exec-5|2019-11-18 11:24:00.493 IST|SSLCipher.java:1824|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE countdown value = 137438953472 javax.net.ssl|DEBUG|25|https-jsse-nio-8443-exec-5|2019-11-18 11:24:00.494 IST|Finished.java:1148|Sending new session ticket 18-Nov-2019 11:24:00.494 FINE [https-jsse-nio-8443-exec-5] org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun Error during SSL handshake java.io.IOException: NOT_HANDSHAKING during handshake at org.apache.tomcat.util.net.SecureNioChannel.handshake(SecureNioChannel.java:193) at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1556) at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49) at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128) at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628) at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61) at java.base/java.lang.Thread.run(Thread.java:834) 18-Nov-2019 11:24:00.495 FINE [https-jsse-nio-8443-exec-5] org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper.doClose Calling [org.apache.tomcat.util.net.NioEndpoint@42b2b293].closeSocket([org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper@52ec4229:org.apache.tomcat.util.net.SecureNioChannel@102a92e:java.nio.channels.SocketChannel[connected local=/0:0:0:0:0:0:0:1:8443 remote=/0:0:0:0:0:0:0:1:62343]]) java.lang.Exception at org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper.doClose(NioEndpoint.java:1163) at org.apache.tomcat.util.net.SocketWrapperBase.close(SocketWrapperBase.java:402) at org.apache.tomcat.util.net.NioEndpoint$Poller.cancelledKey(NioEndpoint.java:665) at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1586) at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49) at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128) at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628) at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61) at java.base/java.lang.Thread.run(Thread.java:834) javax.net.ssl|ALL|25|https-jsse-nio-8443-exec-5|2019-11-18 11:24:00.495 IST|SSLEngineImpl.java:756|Closing outbound of SSLEngine javax.net.ssl|WARNING|25|https-jsse-nio-8443-exec-5|2019-11-18 11:24:00.503 IST|SSLEngineOutputRecord.java:168|outbound has closed, ignore outbound application data 18-Nov-2019 11:24:00.510 FINE [https-jsse-nio-8443-exec-6] org.apache.tomcat.util.net.SecureNioChannel.processSNI The SNI host name extracted for connection [java.nio.channels.SocketChannel[connected local=/0:0:0:0:0:0:0:1:8443 remote=/0:0:0:0:0:0:0:1:62344]] was [localhost] javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:00.511 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 for TLS10 javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:00.511 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 for TLS10 javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:00.511 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLS10 javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:00.511 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLS10 javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:00.512 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 for TLS13 javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:00.512 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 for TLS13 javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:00.512 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLS13 javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:00.512 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLS13 javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:00.512 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA for TLS13 javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:00.512 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA for TLS13 javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:00.512 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 for TLS11 javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:00.512 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 for TLS11 javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:00.512 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLS11 javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:00.512 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLS11 javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:00.516 IST|SSLExtensions.java:131|Ignore unknown or unsupported extension ( "unknown extension (28)": { 0000: 40 01 @. } ) javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:00.516 IST|SSLExtensions.java:131|Ignore unknown or unsupported extension ( "unknown extension (21)": { 0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0090: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ............... } ) javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:00.518 IST|ClientHello.java:806|Consuming ClientHello handshake message ( "ClientHello": { "client version" : "TLSv1.2", "random" : "C5 77 31 EC FD 51 69 2E 38 B9 94 16 AD EB 4D EE 02 34 BC EE 4A F9 57 DB 47 97 A7 0D B5 DB 73 6F", "session id" : "1F 96 C7 B3 B0 01 6A 98 D0 89 1D 33 E0 CB 18 06 08 3C F8 E6 30 29 80 5B A2 39 E0 ED A2 7D F0 5F", "cipher suites" : "[TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_AES_256_GCM_SHA384(0x1302), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), UNKNOWN-CIPHER-SUITE(0xCCA9)(0xCCA9), UNKNOWN-CIPHER-SUITE(0xCCA8)(0xCCA8), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA(0xC00A), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA(0xC009), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA(0xC013), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA(0xC014), TLS_DHE_RSA_WITH_AES_128_CBC_SHA(0x0033), TLS_DHE_RSA_WITH_AES_256_CBC_SHA(0x0039), TLS_RSA_WITH_AES_128_CBC_SHA(0x002F), TLS_RSA_WITH_AES_256_CBC_SHA(0x0035), SSL_RSA_WITH_3DES_EDE_CBC_SHA(0x000A)]", "compression methods" : "00", "extensions" : [ "server_name (0)": { type=host_name (0), value=localhost }, "extended_master_secret (23)": { }, "renegotiation_info (65,281)": { "renegotiated connection": [] }, "supported_groups (10)": { "versions": [x25519, secp256r1, secp384r1, secp521r1, ffdhe2048, ffdhe3072] }, "ec_point_formats (11)": { "formats": [uncompressed] }, "application_layer_protocol_negotiation (16)": { [h2, http/1.1] }, "status_request (5)": { "certificate status type": ocsp "OCSP status request": { "responder_id": "request extensions": { } } }, "key_share (51)": { "client_shares": [ { "named group": x25519 "key_exchange": { 0000: 8B 59 3B 7E EC 56 FF 2B D5 4F 19 D7 7F F3 A3 61 .Y;..V.+.O.....a 0010: 95 47 B4 52 16 88 0D 68 F0 44 92 83 69 8F E0 4B .G.R...h.D..i..K } }, { "named group": secp256r1 "key_exchange": { 0000: 04 E4 82 33 7A 53 74 8D 8F CF 23 C5 2F 40 32 A7 ...3zSt...#./@2. 0010: 98 3D 61 DB 46 E2 25 C7 2E 2D 7E 32 BE D3 DC 33 .=a.F.%..-.2...3 0020: 38 0B 05 A5 05 87 7D F5 B4 C2 EE 87 13 74 60 BC 8............t`. 0030: 14 40 C6 75 01 41 FB 7E A8 39 7C BD E1 F8 C9 AE .@.u.A...9...... 0040: 7B } }, ] }, "supported_versions (43)": { "versions": [TLSv1.3, TLSv1.2, TLSv1.1, TLSv1] }, "signature_algorithms (13)": { "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1] }, "unknown extension (28)": { 0000: 40 01 @. }, "unknown extension (21)": { 0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0090: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ............... } ] } ) javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:00.518 IST|SSLExtensions.java:188|Consumed extension: supported_versions javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:00.518 IST|ClientHello.java:836|Negotiated protocol version: TLSv1.3 javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:00.519 IST|PskKeyExchangeModesExtension.java:294|abort session resumption, no supported psk_dhe_ke PSK key exchange mode javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:00.519 IST|PreSharedKeyExtension.java:809|Handling pre_shared_key absence. javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:00.519 IST|ServerNameExtension.java:328|no server name matchers, ignore server name indication javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:00.519 IST|SSLExtensions.java:188|Consumed extension: server_name javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:00.519 IST|SSLExtensions.java:169|Ignore unavailable extension: max_fragment_length javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:00.519 IST|SSLExtensions.java:188|Consumed extension: status_request javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:00.519 IST|SSLExtensions.java:188|Consumed extension: supported_groups javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:00.519 IST|SSLExtensions.java:159|Ignore unsupported extension: ec_point_formats javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:00.519 IST|SSLExtensions.java:188|Consumed extension: signature_algorithms javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:00.519 IST|SSLExtensions.java:169|Ignore unavailable extension: signature_algorithms_cert javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:00.519 IST|AlpnExtension.java:274|Ignore server unenabled extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:00.519 IST|SSLExtensions.java:188|Consumed extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:00.520 IST|SSLExtensions.java:159|Ignore unsupported extension: status_request_v2 javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:00.520 IST|SSLExtensions.java:159|Ignore unsupported extension: extended_master_secret javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:00.520 IST|SSLExtensions.java:169|Ignore unavailable extension: cookie javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:00.520 IST|KeyShareExtension.java:350|Ignore unsupported named group: x25519 javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:00.520 IST|SSLExtensions.java:188|Consumed extension: key_share javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:00.520 IST|SSLExtensions.java:159|Ignore unsupported extension: renegotiation_info javax.net.ssl|ALL|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:00.520 IST|SignatureScheme.java:360|Ignore disabled signature scheme: rsa_md5 javax.net.ssl|WARNING|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:00.521 IST|SSLExtensions.java:211|Ignore impact of unsupported extension: server_name javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:00.521 IST|SSLExtensions.java:203|Ignore unavailable extension: max_fragment_length javax.net.ssl|WARNING|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:00.521 IST|SSLExtensions.java:211|Ignore impact of unsupported extension: status_request javax.net.ssl|WARNING|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:00.521 IST|SSLExtensions.java:211|Ignore impact of unsupported extension: supported_groups javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:00.521 IST|SSLExtensions.java:220|Populated with extension: signature_algorithms javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:00.521 IST|SSLExtensions.java:203|Ignore unavailable extension: signature_algorithms_cert javax.net.ssl|WARNING|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:00.521 IST|SSLExtensions.java:211|Ignore impact of unsupported extension: application_layer_protocol_negotiation javax.net.ssl|WARNING|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:00.521 IST|SSLExtensions.java:211|Ignore impact of unsupported extension: supported_versions javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:00.522 IST|SSLExtensions.java:203|Ignore unavailable extension: cookie javax.net.ssl|WARNING|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:00.522 IST|SSLExtensions.java:211|Ignore impact of unsupported extension: key_share javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:00.522 IST|SSLExtensions.java:203|Ignore unavailable extension: pre_shared_key javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:00.522 IST|ServerHello.java:729|use cipher suite TLS_AES_128_GCM_SHA256 javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:00.524 IST|SSLExtensions.java:256|Ignore, context unavailable extension: pre_shared_key javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:00.525 IST|ServerHello.java:580|Produced ServerHello handshake message ( "ServerHello": { "server version" : "TLSv1.2", "random" : "B7 6A B9 38 C4 32 C1 D7 B9 50 52 2D 7F F9 98 BA 44 CA 5A 1C F2 DF D9 FA AF 8D 6E 5D D6 B2 F7 63", "session id" : "1F 96 C7 B3 B0 01 6A 98 D0 89 1D 33 E0 CB 18 06 08 3C F8 E6 30 29 80 5B A2 39 E0 ED A2 7D F0 5F", "cipher suite" : "TLS_AES_128_GCM_SHA256(0x1301)", "compression methods" : "00", "extensions" : [ "supported_versions (43)": { "selected version": [TLSv1.3] }, "key_share (51)": { "server_share": { "named group": secp256r1 "key_exchange": { 0000: 04 B1 7A 9E 6C 99 13 63 8D 18 C9 0E AF B5 E1 78 ..z.l..c.......x 0010: 9D 47 5D 5A 48 1D CE 00 E4 01 EA E0 1E 37 45 D6 .G]ZH........7E. 0020: 02 4C DE 62 B7 A5 34 33 06 00 45 9E 14 48 56 52 .L.b..43..E..HVR 0030: FF 81 C4 28 10 1E 79 45 BD B3 E7 B5 0B 17 DA A9 ...(..yE........ 0040: E9 } }, } ] } ) javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:00.531 IST|SSLCipher.java:1824|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE countdown value = 137438953472 javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:00.531 IST|SSLCipher.java:1978|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE countdown value = 137438953472 javax.net.ssl|ALL|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:00.531 IST|ServerNameExtension.java:538|No expected server name indication response javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:00.532 IST|SSLExtensions.java:256|Ignore, context unavailable extension: server_name javax.net.ssl|ALL|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:00.532 IST|MaxFragExtension.java:471|Ignore unavailable max_fragment_length extension javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:00.532 IST|SSLExtensions.java:256|Ignore, context unavailable extension: max_fragment_length javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:00.532 IST|AlpnExtension.java:363|Ignore unavailable extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:00.532 IST|SSLExtensions.java:256|Ignore, context unavailable extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:00.533 IST|EncryptedExtensions.java:137|Produced EncryptedExtensions message ( "EncryptedExtensions": [ "supported_groups (10)": { "versions": [secp256r1, secp384r1, secp521r1, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192] } ] ) javax.net.ssl|ALL|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:00.533 IST|SignatureScheme.java:365|Ignore inactive signature scheme: dsa_sha256 javax.net.ssl|ALL|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:00.533 IST|SignatureScheme.java:365|Ignore inactive signature scheme: dsa_sha1 javax.net.ssl|ALL|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:00.533 IST|SignatureScheme.java:365|Ignore inactive signature scheme: rsa_md5 javax.net.ssl|ALL|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:00.533 IST|SignatureScheme.java:365|Ignore inactive signature scheme: dsa_sha256 javax.net.ssl|ALL|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:00.534 IST|SignatureScheme.java:365|Ignore inactive signature scheme: dsa_sha1 javax.net.ssl|ALL|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:00.534 IST|SignatureScheme.java:365|Ignore inactive signature scheme: rsa_md5 javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:00.534 IST|CertificateRequest.java:882|Produced CertificateRequest message ( "CertificateRequest": { "certificate_request_context": "", "extensions": [ "signature_algorithms (13)": { "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1] }, "signature_algorithms_cert (50)": { "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1] } ] } ) javax.net.ssl|ALL|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:00.534 IST|X509Authentication.java:264|No X.509 cert selected for EC javax.net.ssl|WARNING|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:00.534 IST|CertificateMessage.java:1063|Unavailable authentication scheme: ecdsa_secp256r1_sha256 javax.net.ssl|ALL|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:00.534 IST|X509Authentication.java:264|No X.509 cert selected for EC javax.net.ssl|WARNING|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:00.535 IST|CertificateMessage.java:1063|Unavailable authentication scheme: ecdsa_secp384r1_sha384 javax.net.ssl|ALL|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:00.535 IST|X509Authentication.java:264|No X.509 cert selected for EC javax.net.ssl|WARNING|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:00.535 IST|CertificateMessage.java:1063|Unavailable authentication scheme: ecdsa_secp521r1_sha512 javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:00.535 IST|StatusResponseManager.java:763|Staping disabled or is a resumed session javax.net.ssl|ALL|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:00.535 IST|CertStatusExtension.java:1117|Stapling is disabled for this connection javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:00.535 IST|SSLExtensions.java:256|Ignore, context unavailable extension: status_request javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:00.536 IST|CertificateMessage.java:1002|Produced server Certificate message ( "Certificate": { "certificate_request_context": "", "certificate_list": [ { "certificate" : { "version" : "v3", "serial number" : "3B FD 86 4A 58 09 72 F6", "signature algorithm": "SHA512withRSA", "issuer" : "CN=localhost", "not before" : "2019-11-05 13:41:52.000 IST", "not after" : "2020-11-05 13:41:52.000 IST", "subject" : "CN=localhost", "subject public key" : "RSA", "extensions" : [ { ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:false PathLen:2147483647 ] }, { ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_Encipherment Data_Encipherment ] } ]} "extensions": { } }, ] } ) javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:00.546 IST|CertificateVerify.java:1113|Produced server CertificateVerify handshake message ( "CertificateVerify": { "signature algorithm": rsa_pss_rsae_sha256 "signature": { 0000: 0D FF B3 37 6A 5A 70 9B FD 8A 47 20 E9 C3 AD FD ...7jZp...G .... 0010: 55 3A BA EA F8 BA FB 5F 6C 71 2A 90 8C FD 88 10 U:....._lq*..... 0020: F9 31 B4 5A E6 B9 4C 5E 79 3C 90 37 85 DD 74 84 .1.Z..L^y<.7..t. 0030: E3 0B 7D 8A F4 60 E8 9A DB C5 8C 87 0A B3 B0 4D .....`.........M 0040: 84 5F 88 C0 5F 0E 39 A8 3B B2 62 C8 68 EF E3 5C ._.._.9.;.b.h..\ 0050: E0 6E E3 8F FA 69 4C 64 5D 22 68 55 46 2F 34 DC .n...iLd]"hUF/4. 0060: 99 A7 26 53 73 93 01 60 3B 05 5F CA 22 97 2C FE ..&Ss..`;._.".,. 0070: B1 4A 5D C2 27 04 C2 D9 A9 A1 A3 B9 76 42 E7 1E .J].'.......vB.. 0080: F1 70 39 C0 04 18 81 6A 4F 0E E3 0A 73 76 9C 0A .p9....jO...sv.. 0090: 7F 5E 52 06 FE 17 96 8F 10 DF FB 1C 09 96 72 89 .^R...........r. 00A0: C0 4B 0B 42 6E 51 6C D9 9D 51 5C F4 64 CC FB 7A .K.BnQl..Q\.d..z 00B0: D5 EA 27 1B 49 E8 C3 C7 CE 39 93 0C 34 14 29 90 ..'.I....9..4.). 00C0: 6D 06 83 22 E8 36 E9 CB 77 08 04 7B B0 39 D7 4A m..".6..w....9.J 00D0: AA 0D 76 11 C3 CF 4B 9F C9 A2 B0 83 39 61 B5 45 ..v...K.....9a.E 00E0: 05 EE C1 6E 1A 88 F5 25 C2 5E AB F5 BF F1 31 FD ...n...%.^....1. 00F0: 0C DD 5D DD 90 0D 6E E5 07 63 B0 4C 39 41 39 4C ..]...n..c.L9A9L } } ) javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:00.547 IST|Finished.java:773|Produced server Finished handshake message ( "Finished": { "verify data": { 0000: 03 A2 5C E4 50 D8 6A 7D AA 3E 75 8E 81 9D 88 72 ..\.P.j..>u....r 0010: A1 48 F7 A7 E0 1A 48 40 70 EE B3 01 9E 68 EC 6D .H....H@p....h.m }'} ) javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:00.548 IST|SSLCipher.java:1978|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE countdown value = 137438953472 javax.net.ssl|DEBUG|28|https-jsse-nio-8443-exec-8|2019-11-18 11:24:00.584 IST|ChangeCipherSpec.java:250|Consuming ChangeCipherSpec message javax.net.ssl|DEBUG|28|https-jsse-nio-8443-exec-8|2019-11-18 11:24:00.585 IST|CertificateMessage.java:1158|Consuming client Certificate handshake message ( "Certificate": { "certificate_request_context": "", "certificate_list": [ { "certificate" : { "version" : "v3", "serial number" : "2C 8B E3 32 BC 02 24 C0", "signature algorithm": "SHA512withRSA", "issuer" : "CN=client", "not before" : "2019-11-05 13:43:21.000 IST", "not after" : "2020-11-05 13:43:21.000 IST", "subject" : "CN=client", "subject public key" : "RSA", "extensions" : [ { ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:false PathLen:2147483647 ] }, { ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_Encipherment Data_Encipherment ] } ]} "extensions": { } }, ] } ) javax.net.ssl|DEBUG|28|https-jsse-nio-8443-exec-8|2019-11-18 11:24:00.587 IST|CertificateVerify.java:1165|Consuming CertificateVerify handshake message ( "CertificateVerify": { "signature algorithm": rsa_pss_rsae_sha256 "signature": { 0000: 81 DF F8 BA DB 5D 34 6C AF 3E 34 EB 92 7A 3E 31 .....]4l.>4..z>1 0010: 03 51 68 63 6B B6 7C 3B 4A 46 BC 9D C2 09 74 8D .Qhck..;JF....t. 0020: 59 9E 7C 69 AE C3 C7 FB 2C 0F F7 D0 35 32 D6 3E Y..i....,...52.> 0030: 87 E9 A1 C3 14 3A 19 0C 45 95 9F 4F D4 BE F2 48 .....:..E..O...H 0040: EF D2 9A 4F 83 05 7A FC B3 59 40 B5 0C 02 F9 9C ...O..z..Y@..... 0050: D7 06 8E A4 89 D2 51 25 80 EE D7 4A 12 50 6A 0B ......Q%...J.Pj. 0060: F6 77 AB 5D 8D 60 A6 A1 B3 12 F9 CF E1 8D BD DC .w.].`.......... 0070: BD 6C CA 05 47 2D 8D 38 88 99 BA C1 CC 2E 06 69 .l..G-.8.......i 0080: B2 E0 F3 D1 C2 78 43 23 FF 30 7B 10 4A E4 7F 46 .....xC#.0..J..F 0090: B2 10 95 BE 0F 88 6E 67 55 EC 7A A8 FE B1 19 8A ......ngU.z..... 00A0: 12 06 31 36 B3 30 D5 E4 8F 24 E7 11 D9 C0 22 2B ..16.0...$...."+ 00B0: EC B2 00 D3 47 AC 8F 77 2E AE 1D C7 50 1F 1E 4E ....G..w....P..N 00C0: 76 2B C7 83 43 6B CF 0B EA 4C 76 F4 71 B3 44 39 v+..Ck...Lv.q.D9 00D0: 46 92 3C DC E7 40 49 6D 16 F0 EB 4D 21 83 5E F5 F.<..@Im...M!.^. 00E0: C6 87 A1 C5 97 37 65 73 23 73 95 A7 B9 E4 F9 55 .....7es#s.....U 00F0: 21 80 E7 BD EF BA 0D 6B 16 D0 6C 1F F5 C4 5B 51 !......k..l...[Q } } ) javax.net.ssl|DEBUG|28|https-jsse-nio-8443-exec-8|2019-11-18 11:24:00.587 IST|Finished.java:1044|Consuming client Finished handshake message ( "Finished": { "verify data": { 0000: 30 9C 98 10 49 08 B6 50 20 3C BC 42 A6 AA A9 80 0...I..P <.B.... 0010: 2A 47 72 30 90 CD 1B BB 0E BC EC 14 8E CF 30 83 *Gr0..........0. }'} ) javax.net.ssl|DEBUG|28|https-jsse-nio-8443-exec-8|2019-11-18 11:24:00.588 IST|SSLCipher.java:1824|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE countdown value = 137438953472 javax.net.ssl|DEBUG|28|https-jsse-nio-8443-exec-8|2019-11-18 11:24:00.588 IST|Finished.java:1148|Sending new session ticket 18-Nov-2019 11:24:00.588 FINE [https-jsse-nio-8443-exec-8] org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun Error during SSL handshake java.io.IOException: NOT_HANDSHAKING during handshake at org.apache.tomcat.util.net.SecureNioChannel.handshake(SecureNioChannel.java:193) at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1556) at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49) at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128) at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628) at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61) at java.base/java.lang.Thread.run(Thread.java:834) 18-Nov-2019 11:24:00.589 FINE [https-jsse-nio-8443-exec-8] org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper.doClose Calling [org.apache.tomcat.util.net.NioEndpoint@42b2b293].closeSocket([org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper@7cddc73d:org.apache.tomcat.util.net.SecureNioChannel@102a92e:java.nio.channels.SocketChannel[connected local=/0:0:0:0:0:0:0:1:8443 remote=/0:0:0:0:0:0:0:1:62344]]) java.lang.Exception at org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper.doClose(NioEndpoint.java:1163) at org.apache.tomcat.util.net.SocketWrapperBase.close(SocketWrapperBase.java:402) at org.apache.tomcat.util.net.NioEndpoint$Poller.cancelledKey(NioEndpoint.java:665) at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1586) at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49) at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128) at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628) at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61) at java.base/java.lang.Thread.run(Thread.java:834) javax.net.ssl|ALL|28|https-jsse-nio-8443-exec-8|2019-11-18 11:24:00.589 IST|SSLEngineImpl.java:756|Closing outbound of SSLEngine javax.net.ssl|WARNING|28|https-jsse-nio-8443-exec-8|2019-11-18 11:24:00.591 IST|SSLEngineOutputRecord.java:168|outbound has closed, ignore outbound application data 18-Nov-2019 11:24:23.414 FINE [https-jsse-nio-8443-exec-7] org.apache.tomcat.util.net.SecureNioChannel.processSNI The SNI host name extracted for connection [java.nio.channels.SocketChannel[connected local=/0:0:0:0:0:0:0:1:8443 remote=/0:0:0:0:0:0:0:1:62358]] was [localhost] javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:23.416 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 for TLS10 javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:23.418 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 for TLS10 javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:23.419 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLS10 javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:23.419 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLS10 javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:23.420 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 for TLS13 javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:23.420 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 for TLS13 javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:23.420 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLS13 javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:23.420 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLS13 javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:23.421 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA for TLS13 javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:23.421 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA for TLS13 javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:23.421 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 for TLS11 javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:23.422 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 for TLS11 javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:23.422 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLS11 javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:23.422 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLS11 javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:23.428 IST|SSLExtensions.java:131|Ignore unknown or unsupported extension ( "unknown extension (28)": { 0000: 40 01 @. } ) javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:23.429 IST|SSLExtensions.java:131|Ignore unknown or unsupported extension ( "unknown extension (21)": { 0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0090: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ............... } ) javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:23.435 IST|ClientHello.java:806|Consuming ClientHello handshake message ( "ClientHello": { "client version" : "TLSv1.2", "random" : "64 89 EF 59 FE 13 40 3A 66 12 42 1B 01 6F EC 33 00 24 90 B6 1E 56 F6 0E C9 CA A2 41 C9 8A 0B 10", "session id" : "BE 47 36 8F 8D A0 E0 1A 80 92 D4 EF F0 5F 4B 7E 7E A2 32 E8 06 5C 52 60 29 F3 95 D6 9F 29 34 44", "cipher suites" : "[TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_AES_256_GCM_SHA384(0x1302), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), UNKNOWN-CIPHER-SUITE(0xCCA9)(0xCCA9), UNKNOWN-CIPHER-SUITE(0xCCA8)(0xCCA8), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA(0xC00A), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA(0xC009), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA(0xC013), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA(0xC014), TLS_DHE_RSA_WITH_AES_128_CBC_SHA(0x0033), TLS_DHE_RSA_WITH_AES_256_CBC_SHA(0x0039), TLS_RSA_WITH_AES_128_CBC_SHA(0x002F), TLS_RSA_WITH_AES_256_CBC_SHA(0x0035), SSL_RSA_WITH_3DES_EDE_CBC_SHA(0x000A)]", "compression methods" : "00", "extensions" : [ "server_name (0)": { type=host_name (0), value=localhost }, "extended_master_secret (23)": { }, "renegotiation_info (65,281)": { "renegotiated connection": [] }, "supported_groups (10)": { "versions": [x25519, secp256r1, secp384r1, secp521r1, ffdhe2048, ffdhe3072] }, "ec_point_formats (11)": { "formats": [uncompressed] }, "application_layer_protocol_negotiation (16)": { [h2, http/1.1] }, "status_request (5)": { "certificate status type": ocsp "OCSP status request": { "responder_id": "request extensions": { } } }, "key_share (51)": { "client_shares": [ { "named group": x25519 "key_exchange": { 0000: CE 3D F8 1E 85 A5 9D B5 51 81 6A 3E 47 C5 55 6E .=......Q.j>G.Un 0010: 2B 46 15 47 07 C6 86 F2 07 C5 09 E6 51 8F A9 3A +F.G........Q..: } }, { "named group": secp256r1 "key_exchange": { 0000: 04 7A 53 B9 10 01 6A 54 D8 CF 08 3C 03 29 9F A7 .zS...jT...<.).. 0010: 02 84 CB 93 31 9E 3B 0A 12 73 40 37 A6 17 C8 08 ....1.;..s@7.... 0020: ED C3 52 20 CA 99 0E AD 3C 0F 34 48 BF 21 93 4A ..R ....<.4H.!.J 0030: 90 6D 0B 39 FB 21 F4 DE 41 FD D5 B2 92 69 5F F4 .m.9.!..A....i_. 0040: 7B } }, ] }, "supported_versions (43)": { "versions": [TLSv1.3, TLSv1.2, TLSv1.1, TLSv1] }, "signature_algorithms (13)": { "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1] }, "unknown extension (28)": { 0000: 40 01 @. }, "unknown extension (21)": { 0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0090: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ............... } ] } ) javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:23.436 IST|SSLExtensions.java:188|Consumed extension: supported_versions javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:23.436 IST|ClientHello.java:836|Negotiated protocol version: TLSv1.3 javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:23.437 IST|PskKeyExchangeModesExtension.java:294|abort session resumption, no supported psk_dhe_ke PSK key exchange mode javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:23.437 IST|PreSharedKeyExtension.java:809|Handling pre_shared_key absence. javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:23.437 IST|ServerNameExtension.java:328|no server name matchers, ignore server name indication javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:23.438 IST|SSLExtensions.java:188|Consumed extension: server_name javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:23.438 IST|SSLExtensions.java:169|Ignore unavailable extension: max_fragment_length javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:23.438 IST|SSLExtensions.java:188|Consumed extension: status_request javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:23.439 IST|SSLExtensions.java:188|Consumed extension: supported_groups javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:23.439 IST|SSLExtensions.java:159|Ignore unsupported extension: ec_point_formats javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:23.439 IST|SSLExtensions.java:188|Consumed extension: signature_algorithms javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:23.439 IST|SSLExtensions.java:169|Ignore unavailable extension: signature_algorithms_cert javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:23.440 IST|AlpnExtension.java:274|Ignore server unenabled extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:23.440 IST|SSLExtensions.java:188|Consumed extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:23.440 IST|SSLExtensions.java:159|Ignore unsupported extension: status_request_v2 javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:23.441 IST|SSLExtensions.java:159|Ignore unsupported extension: extended_master_secret javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:23.441 IST|SSLExtensions.java:169|Ignore unavailable extension: cookie javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:23.441 IST|KeyShareExtension.java:350|Ignore unsupported named group: x25519 javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:23.443 IST|SSLExtensions.java:188|Consumed extension: key_share javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:23.443 IST|SSLExtensions.java:159|Ignore unsupported extension: renegotiation_info javax.net.ssl|ALL|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:23.445 IST|SignatureScheme.java:360|Ignore disabled signature scheme: rsa_md5 javax.net.ssl|WARNING|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:23.446 IST|SSLExtensions.java:211|Ignore impact of unsupported extension: server_name javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:23.446 IST|SSLExtensions.java:203|Ignore unavailable extension: max_fragment_length javax.net.ssl|WARNING|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:23.446 IST|SSLExtensions.java:211|Ignore impact of unsupported extension: status_request javax.net.ssl|WARNING|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:23.446 IST|SSLExtensions.java:211|Ignore impact of unsupported extension: supported_groups javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:23.448 IST|SSLExtensions.java:220|Populated with extension: signature_algorithms javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:23.449 IST|SSLExtensions.java:203|Ignore unavailable extension: signature_algorithms_cert javax.net.ssl|WARNING|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:23.449 IST|SSLExtensions.java:211|Ignore impact of unsupported extension: application_layer_protocol_negotiation javax.net.ssl|WARNING|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:23.450 IST|SSLExtensions.java:211|Ignore impact of unsupported extension: supported_versions javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:23.450 IST|SSLExtensions.java:203|Ignore unavailable extension: cookie javax.net.ssl|WARNING|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:23.450 IST|SSLExtensions.java:211|Ignore impact of unsupported extension: key_share javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:23.451 IST|SSLExtensions.java:203|Ignore unavailable extension: pre_shared_key javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:23.451 IST|ServerHello.java:729|use cipher suite TLS_AES_128_GCM_SHA256 javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:23.461 IST|SSLExtensions.java:256|Ignore, context unavailable extension: pre_shared_key javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:23.466 IST|ServerHello.java:580|Produced ServerHello handshake message ( "ServerHello": { "server version" : "TLSv1.2", "random" : "F8 32 08 BF D4 82 B5 E0 27 C3 38 29 32 FD AB FA 9A 2A 06 2C 7F BB 3A A1 E3 19 EC BD 27 81 82 59", "session id" : "BE 47 36 8F 8D A0 E0 1A 80 92 D4 EF F0 5F 4B 7E 7E A2 32 E8 06 5C 52 60 29 F3 95 D6 9F 29 34 44", "cipher suite" : "TLS_AES_128_GCM_SHA256(0x1301)", "compression methods" : "00", "extensions" : [ "supported_versions (43)": { "selected version": [TLSv1.3] }, "key_share (51)": { "server_share": { "named group": secp256r1 "key_exchange": { 0000: 04 F3 4B A3 0C 23 B1 CB DF 37 8F FD CC 04 73 CB ..K..#...7....s. 0010: 29 F8 AA FE 78 3A 20 AE DA DA 34 24 2E BB D5 83 )...x: ...4$.... 0020: F8 6B FB 9C BF 00 6A 38 96 AD CB 17 C5 09 48 AA .k....j8......H. 0030: C0 77 80 CE DE 19 1F F2 60 AE 06 48 F9 35 9E 51 .w......`..H.5.Q 0040: AF } }, } ] } ) javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:23.481 IST|SSLCipher.java:1824|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE countdown value = 137438953472 javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:23.483 IST|SSLCipher.java:1978|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE countdown value = 137438953472 javax.net.ssl|ALL|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:23.484 IST|ServerNameExtension.java:538|No expected server name indication response javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:23.484 IST|SSLExtensions.java:256|Ignore, context unavailable extension: server_name javax.net.ssl|ALL|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:23.484 IST|MaxFragExtension.java:471|Ignore unavailable max_fragment_length extension javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:23.485 IST|SSLExtensions.java:256|Ignore, context unavailable extension: max_fragment_length javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:23.486 IST|AlpnExtension.java:363|Ignore unavailable extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:23.486 IST|SSLExtensions.java:256|Ignore, context unavailable extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:23.487 IST|EncryptedExtensions.java:137|Produced EncryptedExtensions message ( "EncryptedExtensions": [ "supported_groups (10)": { "versions": [secp256r1, secp384r1, secp521r1, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192] } ] ) javax.net.ssl|ALL|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:23.488 IST|SignatureScheme.java:365|Ignore inactive signature scheme: dsa_sha256 javax.net.ssl|ALL|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:23.489 IST|SignatureScheme.java:365|Ignore inactive signature scheme: dsa_sha1 javax.net.ssl|ALL|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:23.489 IST|SignatureScheme.java:365|Ignore inactive signature scheme: rsa_md5 javax.net.ssl|ALL|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:23.490 IST|SignatureScheme.java:365|Ignore inactive signature scheme: dsa_sha256 javax.net.ssl|ALL|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:23.490 IST|SignatureScheme.java:365|Ignore inactive signature scheme: dsa_sha1 javax.net.ssl|ALL|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:23.491 IST|SignatureScheme.java:365|Ignore inactive signature scheme: rsa_md5 javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:23.492 IST|CertificateRequest.java:882|Produced CertificateRequest message ( "CertificateRequest": { "certificate_request_context": "", "extensions": [ "signature_algorithms (13)": { "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1] }, "signature_algorithms_cert (50)": { "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1] } ] } ) javax.net.ssl|ALL|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:23.492 IST|X509Authentication.java:264|No X.509 cert selected for EC javax.net.ssl|WARNING|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:23.493 IST|CertificateMessage.java:1063|Unavailable authentication scheme: ecdsa_secp256r1_sha256 javax.net.ssl|ALL|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:23.493 IST|X509Authentication.java:264|No X.509 cert selected for EC javax.net.ssl|WARNING|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:23.493 IST|CertificateMessage.java:1063|Unavailable authentication scheme: ecdsa_secp384r1_sha384 javax.net.ssl|ALL|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:23.493 IST|X509Authentication.java:264|No X.509 cert selected for EC javax.net.ssl|WARNING|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:23.494 IST|CertificateMessage.java:1063|Unavailable authentication scheme: ecdsa_secp521r1_sha512 javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:23.494 IST|StatusResponseManager.java:763|Staping disabled or is a resumed session javax.net.ssl|ALL|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:23.494 IST|CertStatusExtension.java:1117|Stapling is disabled for this connection javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:23.495 IST|SSLExtensions.java:256|Ignore, context unavailable extension: status_request javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:23.496 IST|CertificateMessage.java:1002|Produced server Certificate message ( "Certificate": { "certificate_request_context": "", "certificate_list": [ { "certificate" : { "version" : "v3", "serial number" : "3B FD 86 4A 58 09 72 F6", "signature algorithm": "SHA512withRSA", "issuer" : "CN=localhost", "not before" : "2019-11-05 13:41:52.000 IST", "not after" : "2020-11-05 13:41:52.000 IST", "subject" : "CN=localhost", "subject public key" : "RSA", "extensions" : [ { ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:false PathLen:2147483647 ] }, { ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_Encipherment Data_Encipherment ] } ]} "extensions": { } }, ] } ) javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:23.534 IST|CertificateVerify.java:1113|Produced server CertificateVerify handshake message ( "CertificateVerify": { "signature algorithm": rsa_pss_rsae_sha256 "signature": { 0000: 1E 4E 06 CD 92 A9 51 A5 19 71 F7 61 6B EB A8 97 .N....Q..q.ak... 0010: 89 97 C3 55 B0 50 CA 00 83 CA 06 82 63 93 2D 06 ...U.P......c.-. 0020: 2B 31 B4 A8 7E C9 4B 95 29 89 BF D3 43 3D BF 19 +1....K.)...C=.. 0030: 53 9C DF 9C 60 3B EA 8F EE E8 9A 51 CD 72 78 47 S...`;.....Q.rxG 0040: 91 3C C8 BB 79 1C F1 E9 8E 9D 78 A8 CF 7C 23 A3 .<..y.....x...#. 0050: 9F 26 04 31 B6 2C 40 7F 67 49 9B D1 AD E3 D3 3A .&.1.,@.gI.....: 0060: 7A 33 99 B1 AD ED 13 78 CA 87 CE 0F D1 C6 E6 06 z3.....x........ 0070: 02 CE 01 3F 4B 6F 2B A6 61 BB AA 07 11 A6 1E D5 ...?Ko+.a....... 0080: 08 26 77 20 2F 7D 5A 3D DE BC 43 0A B1 5E EF F2 .&w /.Z=..C..^.. 0090: 15 74 68 26 CB B8 E8 37 59 BC F7 34 EE 03 DD 90 .th&...7Y..4.... 00A0: B7 B8 17 8A 4C 08 93 FF 90 E9 3D 19 55 10 4C 48 ....L.....=.U.LH 00B0: 44 F2 8A 31 CD 64 09 73 3C D3 C8 A1 2A 9F 97 27 D..1.d.s<...*..' 00C0: 16 0A 5D 3C AC EB 76 58 32 5B 69 82 86 0F 2D AA ..]<..vX2[i...-. 00D0: E1 B1 AE 12 BC BF 12 6F A1 EF 4A 3A AE AD 30 F1 .......o..J:..0. 00E0: BF E0 7D EB A6 E7 11 30 2E D7 E8 10 27 90 14 64 .......0....'..d 00F0: 15 69 39 E4 28 18 A9 D1 70 D8 97 77 BA 95 F6 75 .i9.(...p..w...u } } ) javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:23.536 IST|Finished.java:773|Produced server Finished handshake message ( "Finished": { "verify data": { 0000: 26 56 6F 72 90 E1 02 FC E3 28 9E 44 D9 67 47 2D &Vor.....(.D.gG- 0010: 3A 64 CE 36 CE CA 87 96 30 F0 C4 7C 62 AE 25 C5 :d.6....0...b.%. }'} ) javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:23.537 IST|SSLCipher.java:1978|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE countdown value = 137438953472 javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 11:24:23.601 IST|ChangeCipherSpec.java:250|Consuming ChangeCipherSpec message javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 11:24:23.604 IST|CertificateMessage.java:1158|Consuming client Certificate handshake message ( "Certificate": { "certificate_request_context": "", "certificate_list": [ { "certificate" : { "version" : "v3", "serial number" : "2C 8B E3 32 BC 02 24 C0", "signature algorithm": "SHA512withRSA", "issuer" : "CN=client", "not before" : "2019-11-05 13:43:21.000 IST", "not after" : "2020-11-05 13:43:21.000 IST", "subject" : "CN=client", "subject public key" : "RSA", "extensions" : [ { ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:false PathLen:2147483647 ] }, { ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_Encipherment Data_Encipherment ] } ]} "extensions": { } }, ] } ) javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 11:24:23.608 IST|CertificateVerify.java:1165|Consuming CertificateVerify handshake message ( "CertificateVerify": { "signature algorithm": rsa_pss_rsae_sha256 "signature": { 0000: 89 D2 50 A8 76 17 22 6C 6F 0F 08 C6 0C A6 A1 84 ..P.v."lo....... 0010: AF D7 81 21 E4 5B 21 DD F2 EA DA 1C 13 74 BB DA ...!.[!......t.. 0020: 0C EB DF 60 87 35 4E 62 5C 6E 14 21 E9 25 D2 6A ...`.5Nb\n.!.%.j 0030: 04 30 19 70 E9 6D 68 E9 7C B4 8C 14 75 AA 64 32 .0.p.mh.....u.d2 0040: CF 76 84 74 83 90 13 15 4C C5 18 A0 31 A9 29 A6 .v.t....L...1.). 0050: 2B E8 75 E4 73 EF ED BB B5 75 39 FD 6D 6B 2A 00 +.u.s....u9.mk*. 0060: 77 8D 89 CC E1 BC 13 02 5A 05 1F E3 CE 96 26 60 w.......Z.....&` 0070: 1E D1 21 32 0D 9B 0C A3 61 0B AE 96 03 04 71 66 ..!2....a.....qf 0080: 5A 67 6D E9 D1 98 61 AD 1B 2A 2E 37 7F 2E 5A E3 Zgm...a..*.7..Z. 0090: BA 0E CB 49 D1 8D 10 4C E2 29 F5 60 05 ED 5E 38 ...I...L.).`..^8 00A0: F8 B6 E8 3E 2A FF F9 16 2C 8D 63 D1 29 00 72 31 ...>*...,.c.).r1 00B0: 8B C2 DA 50 D3 0E A1 46 42 C0 1E 9D 22 9D 64 2A ...P...FB...".d* 00C0: 01 18 AF 92 48 09 E6 82 F6 49 7A 58 DE EC 97 37 ....H....IzX...7 00D0: 17 24 AC 4B F4 F4 7A 51 08 EC 1C CF 1F 5E E6 10 .$.K..zQ.....^.. 00E0: 43 39 FD 0D D3 93 C6 9D 01 25 5E 3C 40 04 45 84 C9.......%^<@.E. 00F0: D7 26 E2 59 68 05 F5 39 C9 32 F9 42 4C 39 C3 18 .&.Yh..9.2.BL9.. } } ) javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 11:24:23.609 IST|Finished.java:1044|Consuming client Finished handshake message ( "Finished": { "verify data": { 0000: 32 48 48 0A 49 4D 13 58 A8 3D F2 6A C4 E1 7A EC 2HH.IM.X.=.j..z. 0010: C6 F1 9A 26 BF 24 12 E2 5A 60 34 C2 A4 BE 6F EC ...&.$..Z`4...o. }'} ) javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 11:24:23.610 IST|SSLCipher.java:1824|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE countdown value = 137438953472 javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 11:24:23.611 IST|Finished.java:1148|Sending new session ticket 18-Nov-2019 11:24:23.612 FINE [https-jsse-nio-8443-exec-2] org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun Error during SSL handshake java.io.IOException: NOT_HANDSHAKING during handshake at org.apache.tomcat.util.net.SecureNioChannel.handshake(SecureNioChannel.java:193) at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1556) at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49) at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128) at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628) at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61) at java.base/java.lang.Thread.run(Thread.java:834) 18-Nov-2019 11:24:23.613 FINE [https-jsse-nio-8443-exec-2] org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper.doClose Calling [org.apache.tomcat.util.net.NioEndpoint@42b2b293].closeSocket([org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper@7a0d585c:org.apache.tomcat.util.net.SecureNioChannel@102a92e:java.nio.channels.SocketChannel[connected local=/0:0:0:0:0:0:0:1:8443 remote=/0:0:0:0:0:0:0:1:62358]]) java.lang.Exception at org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper.doClose(NioEndpoint.java:1163) at org.apache.tomcat.util.net.SocketWrapperBase.close(SocketWrapperBase.java:402) at org.apache.tomcat.util.net.NioEndpoint$Poller.cancelledKey(NioEndpoint.java:665) at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1586) at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49) at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128) at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628) at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61) at java.base/java.lang.Thread.run(Thread.java:834) javax.net.ssl|ALL|22|https-jsse-nio-8443-exec-2|2019-11-18 11:24:23.615 IST|SSLEngineImpl.java:756|Closing outbound of SSLEngine javax.net.ssl|WARNING|22|https-jsse-nio-8443-exec-2|2019-11-18 11:24:23.616 IST|SSLEngineOutputRecord.java:168|outbound has closed, ignore outbound application data 18-Nov-2019 11:24:24.043 FINE [https-jsse-nio-8443-exec-9] org.apache.tomcat.util.net.SecureNioChannel.processSNI The SNI host name extracted for connection [java.nio.channels.SocketChannel[connected local=/0:0:0:0:0:0:0:1:8443 remote=/0:0:0:0:0:0:0:1:62359]] was [localhost] javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:24.046 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 for TLS10 javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:24.046 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 for TLS10 javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:24.046 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLS10 javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:24.047 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLS10 javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:24.047 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 for TLS13 javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:24.047 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 for TLS13 javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:24.048 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLS13 javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:24.048 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLS13 javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:24.048 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA for TLS13 javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:24.048 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA for TLS13 javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:24.049 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 for TLS11 javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:24.049 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 for TLS11 javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:24.049 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLS11 javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:24.049 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLS11 javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:24.054 IST|SSLExtensions.java:131|Ignore unknown or unsupported extension ( "unknown extension (28)": { 0000: 40 01 @. } ) javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:24.056 IST|SSLExtensions.java:131|Ignore unknown or unsupported extension ( "unknown extension (21)": { 0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0090: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ............... } ) javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:24.069 IST|ClientHello.java:806|Consuming ClientHello handshake message ( "ClientHello": { "client version" : "TLSv1.2", "random" : "9F EC 38 E4 6A 42 8F 94 B3 C6 62 22 2B D1 49 2F 82 5A 50 A8 E8 CB D8 17 30 69 C5 BD 5A 6D A2 75", "session id" : "F9 E5 1D 01 6B AD 3C D0 83 49 AB CD F8 C9 12 41 C3 1D 6D 15 FD C8 A0 B7 E7 50 15 D2 2C 99 3B B0", "cipher suites" : "[TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_AES_256_GCM_SHA384(0x1302), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), UNKNOWN-CIPHER-SUITE(0xCCA9)(0xCCA9), UNKNOWN-CIPHER-SUITE(0xCCA8)(0xCCA8), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA(0xC00A), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA(0xC009), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA(0xC013), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA(0xC014), TLS_DHE_RSA_WITH_AES_128_CBC_SHA(0x0033), TLS_DHE_RSA_WITH_AES_256_CBC_SHA(0x0039), TLS_RSA_WITH_AES_128_CBC_SHA(0x002F), TLS_RSA_WITH_AES_256_CBC_SHA(0x0035), SSL_RSA_WITH_3DES_EDE_CBC_SHA(0x000A)]", "compression methods" : "00", "extensions" : [ "server_name (0)": { type=host_name (0), value=localhost }, "extended_master_secret (23)": { }, "renegotiation_info (65,281)": { "renegotiated connection": [] }, "supported_groups (10)": { "versions": [x25519, secp256r1, secp384r1, secp521r1, ffdhe2048, ffdhe3072] }, "ec_point_formats (11)": { "formats": [uncompressed] }, "application_layer_protocol_negotiation (16)": { [h2, http/1.1] }, "status_request (5)": { "certificate status type": ocsp "OCSP status request": { "responder_id": "request extensions": { } } }, "key_share (51)": { "client_shares": [ { "named group": x25519 "key_exchange": { 0000: 95 88 36 A0 23 20 FC AF D5 04 90 9D 83 E1 F2 16 ..6.# .......... 0010: D3 A0 84 2A 4F 7E 91 AA B6 0A 4F F0 7E 47 B7 51 ...*O.....O..G.Q } }, { "named group": secp256r1 "key_exchange": { 0000: 04 31 71 AC 4F DF 50 9D 35 E0 0C 06 7A 71 48 DB .1q.O.P.5...zqH. 0010: 54 4B 31 F8 D6 19 48 BD 66 FD AD C4 37 F4 F9 88 TK1...H.f...7... 0020: 99 0C 5D 36 FE 30 F6 0E CE D2 19 39 61 44 DE 28 ..]6.0.....9aD.( 0030: 28 D1 F1 33 B4 49 31 6B 7B 9F 4B 25 BF 41 07 F1 (..3.I1k..K%.A.. 0040: B1 } }, ] }, "supported_versions (43)": { "versions": [TLSv1.3, TLSv1.2, TLSv1.1, TLSv1] }, "signature_algorithms (13)": { "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1] }, "unknown extension (28)": { 0000: 40 01 @. }, "unknown extension (21)": { 0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0090: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ............... } ] } ) javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:24.070 IST|SSLExtensions.java:188|Consumed extension: supported_versions javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:24.070 IST|ClientHello.java:836|Negotiated protocol version: TLSv1.3 javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:24.070 IST|PskKeyExchangeModesExtension.java:294|abort session resumption, no supported psk_dhe_ke PSK key exchange mode javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:24.071 IST|PreSharedKeyExtension.java:809|Handling pre_shared_key absence. javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:24.071 IST|ServerNameExtension.java:328|no server name matchers, ignore server name indication javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:24.071 IST|SSLExtensions.java:188|Consumed extension: server_name javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:24.071 IST|SSLExtensions.java:169|Ignore unavailable extension: max_fragment_length javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:24.072 IST|SSLExtensions.java:188|Consumed extension: status_request javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:24.072 IST|SSLExtensions.java:188|Consumed extension: supported_groups javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:24.072 IST|SSLExtensions.java:159|Ignore unsupported extension: ec_point_formats javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:24.072 IST|SSLExtensions.java:188|Consumed extension: signature_algorithms javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:24.072 IST|SSLExtensions.java:169|Ignore unavailable extension: signature_algorithms_cert javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:24.073 IST|AlpnExtension.java:274|Ignore server unenabled extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:24.073 IST|SSLExtensions.java:188|Consumed extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:24.073 IST|SSLExtensions.java:159|Ignore unsupported extension: status_request_v2 javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:24.073 IST|SSLExtensions.java:159|Ignore unsupported extension: extended_master_secret javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:24.074 IST|SSLExtensions.java:169|Ignore unavailable extension: cookie javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:24.074 IST|KeyShareExtension.java:350|Ignore unsupported named group: x25519 javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:24.079 IST|SSLExtensions.java:188|Consumed extension: key_share javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:24.079 IST|SSLExtensions.java:159|Ignore unsupported extension: renegotiation_info javax.net.ssl|ALL|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:24.081 IST|SignatureScheme.java:360|Ignore disabled signature scheme: rsa_md5 javax.net.ssl|WARNING|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:24.081 IST|SSLExtensions.java:211|Ignore impact of unsupported extension: server_name javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:24.082 IST|SSLExtensions.java:203|Ignore unavailable extension: max_fragment_length javax.net.ssl|WARNING|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:24.082 IST|SSLExtensions.java:211|Ignore impact of unsupported extension: status_request javax.net.ssl|WARNING|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:24.082 IST|SSLExtensions.java:211|Ignore impact of unsupported extension: supported_groups javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:24.083 IST|SSLExtensions.java:220|Populated with extension: signature_algorithms javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:24.083 IST|SSLExtensions.java:203|Ignore unavailable extension: signature_algorithms_cert javax.net.ssl|WARNING|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:24.083 IST|SSLExtensions.java:211|Ignore impact of unsupported extension: application_layer_protocol_negotiation javax.net.ssl|WARNING|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:24.084 IST|SSLExtensions.java:211|Ignore impact of unsupported extension: supported_versions javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:24.084 IST|SSLExtensions.java:203|Ignore unavailable extension: cookie javax.net.ssl|WARNING|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:24.084 IST|SSLExtensions.java:211|Ignore impact of unsupported extension: key_share javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:24.084 IST|SSLExtensions.java:203|Ignore unavailable extension: pre_shared_key javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:24.084 IST|ServerHello.java:729|use cipher suite TLS_AES_128_GCM_SHA256 javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:24.103 IST|SSLExtensions.java:256|Ignore, context unavailable extension: pre_shared_key javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:24.140 IST|ServerHello.java:580|Produced ServerHello handshake message ( "ServerHello": { "server version" : "TLSv1.2", "random" : "8E 36 60 AB 6A 41 59 EE 75 03 3A DC C0 4E 79 61 20 64 A6 BF C7 D8 0A 08 63 F2 D0 FD AF C9 4D B1", "session id" : "F9 E5 1D 01 6B AD 3C D0 83 49 AB CD F8 C9 12 41 C3 1D 6D 15 FD C8 A0 B7 E7 50 15 D2 2C 99 3B B0", "cipher suite" : "TLS_AES_128_GCM_SHA256(0x1301)", "compression methods" : "00", "extensions" : [ "supported_versions (43)": { "selected version": [TLSv1.3] }, "key_share (51)": { "server_share": { "named group": secp256r1 "key_exchange": { 0000: 04 AB 03 6F CD 32 67 59 A7 24 A9 9C 5D 3E 8A 5E ...o.2gY.$..]>.^ 0010: 84 23 E5 7E 58 BB 7E 9B 1C 76 2D 98 DA 0A 70 18 .#..X....v-...p. 0020: D7 8E C6 40 0F FB 81 CA AB E2 B9 0C BE B0 23 35 ...@..........#5 0030: 4F 59 57 2D AE D2 8A AC D0 DD 93 CA FC 3E 6B 4C OYW-.........>kL 0040: CD } }, } ] } ) javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:24.156 IST|SSLCipher.java:1824|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE countdown value = 137438953472 javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:24.158 IST|SSLCipher.java:1978|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE countdown value = 137438953472 javax.net.ssl|ALL|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:24.159 IST|ServerNameExtension.java:538|No expected server name indication response javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:24.159 IST|SSLExtensions.java:256|Ignore, context unavailable extension: server_name javax.net.ssl|ALL|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:24.159 IST|MaxFragExtension.java:471|Ignore unavailable max_fragment_length extension javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:24.160 IST|SSLExtensions.java:256|Ignore, context unavailable extension: max_fragment_length javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:24.167 IST|AlpnExtension.java:363|Ignore unavailable extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:24.167 IST|SSLExtensions.java:256|Ignore, context unavailable extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:24.174 IST|EncryptedExtensions.java:137|Produced EncryptedExtensions message ( "EncryptedExtensions": [ "supported_groups (10)": { "versions": [secp256r1, secp384r1, secp521r1, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192] } ] ) javax.net.ssl|ALL|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:24.176 IST|SignatureScheme.java:365|Ignore inactive signature scheme: dsa_sha256 javax.net.ssl|ALL|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:24.186 IST|SignatureScheme.java:365|Ignore inactive signature scheme: dsa_sha1 javax.net.ssl|ALL|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:24.187 IST|SignatureScheme.java:365|Ignore inactive signature scheme: rsa_md5 javax.net.ssl|ALL|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:24.188 IST|SignatureScheme.java:365|Ignore inactive signature scheme: dsa_sha256 javax.net.ssl|ALL|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:24.188 IST|SignatureScheme.java:365|Ignore inactive signature scheme: dsa_sha1 javax.net.ssl|ALL|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:24.188 IST|SignatureScheme.java:365|Ignore inactive signature scheme: rsa_md5 javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:24.192 IST|CertificateRequest.java:882|Produced CertificateRequest message ( "CertificateRequest": { "certificate_request_context": "", "extensions": [ "signature_algorithms (13)": { "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1] }, "signature_algorithms_cert (50)": { "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1] } ] } ) javax.net.ssl|ALL|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:24.192 IST|X509Authentication.java:264|No X.509 cert selected for EC javax.net.ssl|WARNING|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:24.192 IST|CertificateMessage.java:1063|Unavailable authentication scheme: ecdsa_secp256r1_sha256 javax.net.ssl|ALL|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:24.193 IST|X509Authentication.java:264|No X.509 cert selected for EC javax.net.ssl|WARNING|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:24.193 IST|CertificateMessage.java:1063|Unavailable authentication scheme: ecdsa_secp384r1_sha384 javax.net.ssl|ALL|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:24.193 IST|X509Authentication.java:264|No X.509 cert selected for EC javax.net.ssl|WARNING|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:24.193 IST|CertificateMessage.java:1063|Unavailable authentication scheme: ecdsa_secp521r1_sha512 javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:24.194 IST|StatusResponseManager.java:763|Staping disabled or is a resumed session javax.net.ssl|ALL|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:24.194 IST|CertStatusExtension.java:1117|Stapling is disabled for this connection javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:24.194 IST|SSLExtensions.java:256|Ignore, context unavailable extension: status_request javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:24.196 IST|CertificateMessage.java:1002|Produced server Certificate message ( "Certificate": { "certificate_request_context": "", "certificate_list": [ { "certificate" : { "version" : "v3", "serial number" : "3B FD 86 4A 58 09 72 F6", "signature algorithm": "SHA512withRSA", "issuer" : "CN=localhost", "not before" : "2019-11-05 13:41:52.000 IST", "not after" : "2020-11-05 13:41:52.000 IST", "subject" : "CN=localhost", "subject public key" : "RSA", "extensions" : [ { ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:false PathLen:2147483647 ] }, { ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_Encipherment Data_Encipherment ] } ]} "extensions": { } }, ] } ) javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:24.236 IST|CertificateVerify.java:1113|Produced server CertificateVerify handshake message ( "CertificateVerify": { "signature algorithm": rsa_pss_rsae_sha256 "signature": { 0000: 65 B4 D1 9A 48 4B FC B2 52 8C A6 13 03 6D 68 69 e...HK..R....mhi 0010: E5 91 CC 85 B8 EB A9 28 09 C3 8A 28 30 A1 A7 B3 .......(...(0... 0020: B8 1B A8 58 C2 A6 55 3A 7C 14 1F 67 20 93 D1 0C ...X..U:...g ... 0030: EB 32 DD 8D FF 63 A7 3A D6 7D 0D 15 7B F2 E6 ED .2...c.:........ 0040: 59 29 A8 AE 76 5D 00 B1 D8 FF AB 08 B8 85 03 64 Y)..v].........d 0050: 61 24 4C 0C E6 10 7C C1 6B 0F 54 49 B0 09 BE B5 a$L.....k.TI.... 0060: DD A4 14 A2 A0 C4 CF 42 18 0E 0F F7 FA 30 6C 03 .......B.....0l. 0070: AB 50 AD 01 B2 45 29 A3 DA 50 26 6C 93 1D 4C DA .P...E)..P&l..L. 0080: 4D E0 85 BF 7A 26 81 CA 29 DD F8 21 87 EC 4D 4D M...z&..)..!..MM 0090: 1C 83 FB F3 0F 31 41 4C F9 C4 84 C3 D2 76 36 89 .....1AL.....v6. 00A0: A6 E8 9C C1 3B E4 08 25 03 D6 13 03 2E 19 87 E3 ....;..%........ 00B0: F0 DF 61 55 D3 95 00 38 7F 57 51 F7 88 0A A1 41 ..aU...8.WQ....A 00C0: 47 E8 C3 4E 8F 2C 10 A6 6F 6F 7B A9 DD C7 8A FA G..N.,..oo...... 00D0: F0 0E 9A 9C 9C 88 62 39 8D 0A 73 9A 0D 80 22 D8 ......b9..s...". 00E0: C8 0C 90 1A D2 66 18 48 C6 50 F6 F7 3E CA B1 B7 .....f.H.P..>... 00F0: 12 6C C7 33 F2 D7 4A 41 35 2F 37 BC 2C 55 17 DF .l.3..JA5/7.,U.. } } ) javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:24.237 IST|Finished.java:773|Produced server Finished handshake message ( "Finished": { "verify data": { 0000: A3 1F DF 26 C6 F7 7C 35 6B E8 5D 9D 3C 04 C0 21 ...&...5k.].<..! 0010: E8 E2 27 FC A0 01 0C F8 05 9A 92 21 38 7E 2C 3A ..'........!8.,: }'} ) javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:24.239 IST|SSLCipher.java:1978|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE countdown value = 137438953472 javax.net.ssl|DEBUG|2A|https-jsse-nio-8443-exec-10|2019-11-18 11:24:24.297 IST|ChangeCipherSpec.java:250|Consuming ChangeCipherSpec message javax.net.ssl|DEBUG|2A|https-jsse-nio-8443-exec-10|2019-11-18 11:24:24.300 IST|CertificateMessage.java:1158|Consuming client Certificate handshake message ( "Certificate": { "certificate_request_context": "", "certificate_list": [ { "certificate" : { "version" : "v3", "serial number" : "2C 8B E3 32 BC 02 24 C0", "signature algorithm": "SHA512withRSA", "issuer" : "CN=client", "not before" : "2019-11-05 13:43:21.000 IST", "not after" : "2020-11-05 13:43:21.000 IST", "subject" : "CN=client", "subject public key" : "RSA", "extensions" : [ { ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:false PathLen:2147483647 ] }, { ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_Encipherment Data_Encipherment ] } ]} "extensions": { } }, ] } ) javax.net.ssl|DEBUG|2A|https-jsse-nio-8443-exec-10|2019-11-18 11:24:24.304 IST|CertificateVerify.java:1165|Consuming CertificateVerify handshake message ( "CertificateVerify": { "signature algorithm": rsa_pss_rsae_sha256 "signature": { 0000: BC 78 2F 6F EE 87 D6 36 EA F7 77 C2 67 EF 2F AD .x/o...6..w.g./. 0010: 6D DC 0E 1E EF 14 21 E4 A0 D7 B3 81 86 30 E8 31 m.....!......0.1 0020: 48 23 16 E5 88 08 55 69 35 B4 EB 19 C1 CD BC D3 H#....Ui5....... 0030: 10 DA 0A 7F F9 BA 89 AD 84 B0 79 CC A8 6B DE E5 ..........y..k.. 0040: A0 35 D8 31 CF CE B8 35 C3 4E 9C 1F 8B 10 78 32 .5.1...5.N....x2 0050: 58 D4 10 2D 5C 74 2B 1A E0 F2 EF CE 0B D5 DD A9 X..-\t+......... 0060: 20 BB 6C B6 43 A2 AE 3D F3 B1 9A 31 86 8B CB C4 .l.C..=...1.... 0070: C3 A5 BB 2B E2 59 95 7D 68 61 A3 8A E0 0E EA 58 ...+.Y..ha.....X 0080: 6C 57 C6 CD D1 BC 23 E4 EB DC FD CE 8F 3B B8 E6 lW....#......;.. 0090: E6 07 6E 99 2C A3 DC 98 99 88 2F 9A 89 E0 5E 40 ..n.,...../...^@ 00A0: CA 25 3E BF FE 5B A7 34 AC 1B E2 49 79 86 C8 60 .%>..[.4...Iy..` 00B0: 44 67 F9 F0 FD 3E E5 2D 6A 0D 02 F6 50 C2 9A 33 Dg...>.-j...P..3 00C0: 69 93 FE 26 9F CE 03 45 10 72 16 17 33 B3 A1 BD i..&...E.r..3... 00D0: 74 D0 F8 C9 03 C0 8A 13 0B 68 21 5F 46 9F F4 EA t........h!_F... 00E0: FD 6A 42 7F 9D 97 D1 D7 3E DD 91 EF FD C2 BB 65 .jB.....>......e 00F0: 97 7D 24 92 7F 9A F0 38 D2 C6 BE B1 FE 66 E9 D9 ..$....8.....f.. } } ) javax.net.ssl|DEBUG|2A|https-jsse-nio-8443-exec-10|2019-11-18 11:24:24.306 IST|Finished.java:1044|Consuming client Finished handshake message ( "Finished": { "verify data": { 0000: 60 6E CA 74 61 A5 EE 94 9A 15 26 92 A2 71 71 87 `n.ta.....&..qq. 0010: ED E1 A4 61 5F 39 DD 57 03 A6 4C 8E 0B 70 BC 92 ...a_9.W..L..p.. }'} ) javax.net.ssl|DEBUG|2A|https-jsse-nio-8443-exec-10|2019-11-18 11:24:24.307 IST|SSLCipher.java:1824|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE countdown value = 137438953472 javax.net.ssl|DEBUG|2A|https-jsse-nio-8443-exec-10|2019-11-18 11:24:24.308 IST|Finished.java:1148|Sending new session ticket 18-Nov-2019 11:24:24.309 FINE [https-jsse-nio-8443-exec-10] org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun Error during SSL handshake java.io.IOException: NOT_HANDSHAKING during handshake at org.apache.tomcat.util.net.SecureNioChannel.handshake(SecureNioChannel.java:193) at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1556) at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49) at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128) at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628) at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61) at java.base/java.lang.Thread.run(Thread.java:834) 18-Nov-2019 11:24:24.311 FINE [https-jsse-nio-8443-exec-10] org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper.doClose Calling [org.apache.tomcat.util.net.NioEndpoint@42b2b293].closeSocket([org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper@21bb566c:org.apache.tomcat.util.net.SecureNioChannel@102a92e:java.nio.channels.SocketChannel[connected local=/0:0:0:0:0:0:0:1:8443 remote=/0:0:0:0:0:0:0:1:62359]]) java.lang.Exception at org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper.doClose(NioEndpoint.java:1163) at org.apache.tomcat.util.net.SocketWrapperBase.close(SocketWrapperBase.java:402) at org.apache.tomcat.util.net.NioEndpoint$Poller.cancelledKey(NioEndpoint.java:665) at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1586) at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49) at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128) at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628) at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61) at java.base/java.lang.Thread.run(Thread.java:834) javax.net.ssl|ALL|2A|https-jsse-nio-8443-exec-10|2019-11-18 11:24:24.312 IST|SSLEngineImpl.java:756|Closing outbound of SSLEngine javax.net.ssl|WARNING|2A|https-jsse-nio-8443-exec-10|2019-11-18 11:24:24.313 IST|SSLEngineOutputRecord.java:168|outbound has closed, ignore outbound application data 18-Nov-2019 11:24:24.336 FINE [https-jsse-nio-8443-exec-4] org.apache.tomcat.util.net.SecureNioChannel.processSNI The SNI host name extracted for connection [java.nio.channels.SocketChannel[connected local=/0:0:0:0:0:0:0:1:8443 remote=/0:0:0:0:0:0:0:1:62360]] was [localhost] javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:24.339 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 for TLS10 javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:24.339 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 for TLS10 javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:24.340 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLS10 javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:24.340 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLS10 javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:24.341 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 for TLS13 javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:24.341 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 for TLS13 javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:24.341 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLS13 javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:24.341 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLS13 javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:24.342 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA for TLS13 javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:24.342 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA for TLS13 javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:24.343 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 for TLS11 javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:24.343 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 for TLS11 javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:24.343 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLS11 javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:24.343 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLS11 javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:24.348 IST|SSLExtensions.java:131|Ignore unknown or unsupported extension ( "unknown extension (28)": { 0000: 40 01 @. } ) javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:24.350 IST|SSLExtensions.java:131|Ignore unknown or unsupported extension ( "unknown extension (21)": { 0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0090: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ............... } ) javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:24.356 IST|ClientHello.java:806|Consuming ClientHello handshake message ( "ClientHello": { "client version" : "TLSv1.2", "random" : "DD 25 FF D8 E4 2E 93 D7 9A EF 6E E0 65 1F DF E0 C2 DB 84 51 87 CB DA 39 66 6F 53 CA DF 78 FF CB", "session id" : "37 5C 5B 33 17 45 D8 AF 49 38 A6 86 EB 0A E9 C9 8B 66 EA 3B C2 8D 67 A0 06 75 C8 92 71 E9 E8 B3", "cipher suites" : "[TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_AES_256_GCM_SHA384(0x1302), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), UNKNOWN-CIPHER-SUITE(0xCCA9)(0xCCA9), UNKNOWN-CIPHER-SUITE(0xCCA8)(0xCCA8), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA(0xC00A), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA(0xC009), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA(0xC013), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA(0xC014), TLS_DHE_RSA_WITH_AES_128_CBC_SHA(0x0033), TLS_DHE_RSA_WITH_AES_256_CBC_SHA(0x0039), TLS_RSA_WITH_AES_128_CBC_SHA(0x002F), TLS_RSA_WITH_AES_256_CBC_SHA(0x0035), SSL_RSA_WITH_3DES_EDE_CBC_SHA(0x000A)]", "compression methods" : "00", "extensions" : [ "server_name (0)": { type=host_name (0), value=localhost }, "extended_master_secret (23)": { }, "renegotiation_info (65,281)": { "renegotiated connection": [] }, "supported_groups (10)": { "versions": [x25519, secp256r1, secp384r1, secp521r1, ffdhe2048, ffdhe3072] }, "ec_point_formats (11)": { "formats": [uncompressed] }, "application_layer_protocol_negotiation (16)": { [h2, http/1.1] }, "status_request (5)": { "certificate status type": ocsp "OCSP status request": { "responder_id": "request extensions": { } } }, "key_share (51)": { "client_shares": [ { "named group": x25519 "key_exchange": { 0000: FB 3A 95 3C 76 FD B7 00 C9 96 EC 3F 34 8A 10 A3 .:. } }, ] } ) javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:24.456 IST|CertificateVerify.java:1113|Produced server CertificateVerify handshake message ( "CertificateVerify": { "signature algorithm": rsa_pss_rsae_sha256 "signature": { 0000: 1B BD D8 ED 90 D6 FD 54 6E 7D 8C C8 95 E0 64 39 .......Tn.....d9 0010: 3B F1 D8 70 BB 66 AA AC E0 6F 2F 44 37 02 9C 38 ;..p.f...o/D7..8 0020: FF F2 FB 48 92 69 87 EB 7E 40 83 FA FA 22 77 FD ...H.i...@..."w. 0030: 09 52 99 5C 9B 07 5C 02 4B E6 C4 7F 9F 0E 00 01 .R.\..\.K....... 0040: CB 15 D7 AC 68 B2 A2 7D C8 53 99 CF 78 B3 1C 24 ....h....S..x..$ 0050: 79 49 AE AA 2D B2 22 DB 8F A5 6F 83 9E 55 31 0C yI..-."...o..U1. 0060: 0C 59 1C BE DA B6 47 BD A5 69 99 F1 A8 5B 81 CB .Y....G..i...[.. 0070: 9E FB 57 0B D9 A5 25 4B B8 52 63 6E 4A BA C6 54 ..W...%K.RcnJ..T 0080: AE 40 CF 1C 65 B8 9A 7C 01 24 18 93 32 DC 78 01 .@..e....$..2.x. 0090: 8E DF FC 27 69 67 59 48 7E C2 0E 2A 24 E6 5A 8E ...'igYH...*$.Z. 00A0: 0E 1D 77 A6 64 B1 CB 3B D2 8E A9 AD C0 40 2F 9C ..w.d..;.....@/. 00B0: A6 2B 5F C1 19 2F DD 23 7A B1 6E 5F E4 6A CA 23 .+_../.#z.n_.j.# 00C0: 54 6F 9A 6B DA BF 92 E8 2F 7D 40 5D CF F7 74 32 To.k..../.@]..t2 00D0: D8 B7 F8 DB 08 29 CF 07 00 FC 4F 15 94 6B 84 90 .....)....O..k.. 00E0: 86 90 F0 31 D5 DF 27 A2 8D D7 D3 16 E9 FB EF 28 ...1..'........( 00F0: BE 36 B2 A9 2F 99 EA 13 6B 78 1C B0 2D E5 56 2C .6../...kx..-.V, } } ) javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:24.457 IST|Finished.java:773|Produced server Finished handshake message ( "Finished": { "verify data": { 0000: 0B F0 19 D0 C3 95 0E 6A AD 24 27 0B 64 5D EE 2C .......j.$'.d]., 0010: F8 50 53 34 9D 7E 79 46 57 6D C3 51 76 2F 83 8A .PS4..yFWm.Qv/.. }'} ) javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:24.459 IST|SSLCipher.java:1978|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE countdown value = 137438953472 javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 11:24:24.511 IST|ChangeCipherSpec.java:250|Consuming ChangeCipherSpec message javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 11:24:24.518 IST|CertificateMessage.java:1158|Consuming client Certificate handshake message ( "Certificate": { "certificate_request_context": "", "certificate_list": [ { "certificate" : { "version" : "v3", "serial number" : "2C 8B E3 32 BC 02 24 C0", "signature algorithm": "SHA512withRSA", "issuer" : "CN=client", "not before" : "2019-11-05 13:43:21.000 IST", "not after" : "2020-11-05 13:43:21.000 IST", "subject" : "CN=client", "subject public key" : "RSA", "extensions" : [ { ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:false PathLen:2147483647 ] }, { ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_Encipherment Data_Encipherment ] } ]} "extensions": { } }, ] } ) javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 11:24:24.522 IST|CertificateVerify.java:1165|Consuming CertificateVerify handshake message ( "CertificateVerify": { "signature algorithm": rsa_pss_rsae_sha256 "signature": { 0000: 0F 02 82 7B E6 FE 13 2F 7A 75 24 3E 85 7E D5 96 ......./zu$>.... 0010: 3C 7A 10 FB CC C6 31 54 36 9C 20 F8 70 43 D1 0C }, "renegotiation_info (65,281)": { "renegotiated connection": [] }, "supported_groups (10)": { "versions": [x25519, secp256r1, secp384r1, secp521r1, ffdhe2048, ffdhe3072] }, "ec_point_formats (11)": { "formats": [uncompressed] }, "application_layer_protocol_negotiation (16)": { [h2, http/1.1] }, "status_request (5)": { "certificate status type": ocsp "OCSP status request": { "responder_id": "request extensions": { } } }, "key_share (51)": { "client_shares": [ { "named group": x25519 "key_exchange": { 0000: C4 FB 68 75 92 16 8B C2 FD CF 12 45 36 7C 67 5D ..hu.......E6.g] 0010: 11 0E DA 37 BD 3B 60 2D 8E CE 05 08 2F 2E 1E 50 ...7.;`-..../..P } }, { "named group": secp256r1 "key_exchange": { 0000: 04 B9 D2 C1 7E 78 F7 3B 5C 23 FB 7F 48 02 A4 14 .....x.;\#..H... 0010: 25 11 53 A6 99 66 43 6A A0 AF 5A 8A E4 46 05 88 %.S..fCj..Z..F.. 0020: 1A 5B D7 B0 7D 01 41 3F FF AE 7F 4D DF 67 D6 8C .[....A?...M.g.. 0030: DC 83 88 15 C9 C7 A7 89 AA B5 BC 4D 27 CA CE 91 ...........M'... 0040: BA } }, ] }, "supported_versions (43)": { "versions": [TLSv1.3, TLSv1.2, TLSv1.1, TLSv1] }, "signature_algorithms (13)": { "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1] }, "unknown extension (28)": { 0000: 40 01 @. }, "unknown extension (21)": { 0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0090: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ............... } ] } ) javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:24.591 IST|SSLExtensions.java:188|Consumed extension: supported_versions javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:24.591 IST|ClientHello.java:836|Negotiated protocol version: TLSv1.3 javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:24.591 IST|PskKeyExchangeModesExtension.java:294|abort session resumption, no supported psk_dhe_ke PSK key exchange mode javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:24.591 IST|PreSharedKeyExtension.java:809|Handling pre_shared_key absence. javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:24.592 IST|ServerNameExtension.java:328|no server name matchers, ignore server name indication javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:24.592 IST|SSLExtensions.java:188|Consumed extension: server_name javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:24.592 IST|SSLExtensions.java:169|Ignore unavailable extension: max_fragment_length javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:24.592 IST|SSLExtensions.java:188|Consumed extension: status_request javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:24.593 IST|SSLExtensions.java:188|Consumed extension: supported_groups javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:24.593 IST|SSLExtensions.java:159|Ignore unsupported extension: ec_point_formats javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:24.593 IST|SSLExtensions.java:188|Consumed extension: signature_algorithms javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:24.593 IST|SSLExtensions.java:169|Ignore unavailable extension: signature_algorithms_cert javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:24.594 IST|AlpnExtension.java:274|Ignore server unenabled extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:24.594 IST|SSLExtensions.java:188|Consumed extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:24.594 IST|SSLExtensions.java:159|Ignore unsupported extension: status_request_v2 javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:24.594 IST|SSLExtensions.java:159|Ignore unsupported extension: extended_master_secret javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:24.594 IST|SSLExtensions.java:169|Ignore unavailable extension: cookie javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:24.595 IST|KeyShareExtension.java:350|Ignore unsupported named group: x25519 javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:24.596 IST|SSLExtensions.java:188|Consumed extension: key_share javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:24.596 IST|SSLExtensions.java:159|Ignore unsupported extension: renegotiation_info javax.net.ssl|ALL|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:24.598 IST|SignatureScheme.java:360|Ignore disabled signature scheme: rsa_md5 javax.net.ssl|WARNING|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:24.598 IST|SSLExtensions.java:211|Ignore impact of unsupported extension: server_name javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:24.598 IST|SSLExtensions.java:203|Ignore unavailable extension: max_fragment_length javax.net.ssl|WARNING|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:24.599 IST|SSLExtensions.java:211|Ignore impact of unsupported extension: status_request javax.net.ssl|WARNING|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:24.599 IST|SSLExtensions.java:211|Ignore impact of unsupported extension: supported_groups javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:24.600 IST|SSLExtensions.java:220|Populated with extension: signature_algorithms javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:24.600 IST|SSLExtensions.java:203|Ignore unavailable extension: signature_algorithms_cert javax.net.ssl|WARNING|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:24.600 IST|SSLExtensions.java:211|Ignore impact of unsupported extension: application_layer_protocol_negotiation javax.net.ssl|WARNING|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:24.601 IST|SSLExtensions.java:211|Ignore impact of unsupported extension: supported_versions javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:24.601 IST|SSLExtensions.java:203|Ignore unavailable extension: cookie javax.net.ssl|WARNING|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:24.601 IST|SSLExtensions.java:211|Ignore impact of unsupported extension: key_share javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:24.601 IST|SSLExtensions.java:203|Ignore unavailable extension: pre_shared_key javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:24.602 IST|ServerHello.java:729|use cipher suite TLS_AES_128_GCM_SHA256 javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:24.609 IST|SSLExtensions.java:256|Ignore, context unavailable extension: pre_shared_key javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:24.611 IST|ServerHello.java:580|Produced ServerHello handshake message ( "ServerHello": { "server version" : "TLSv1.2", "random" : "34 06 05 B6 49 86 96 DB C1 63 E2 2B 21 B6 4B 96 D5 BA E8 EB 00 20 91 9A 75 D0 AA D1 55 EC 16 7C", "session id" : "AF B6 DA E2 23 28 F8 C1 AB 62 0B 05 70 5C 86 F9 BC 0B 57 72 7D FD 08 F7 31 62 7A A1 29 7A 71 FC", "cipher suite" : "TLS_AES_128_GCM_SHA256(0x1301)", "compression methods" : "00", "extensions" : [ "supported_versions (43)": { "selected version": [TLSv1.3] }, "key_share (51)": { "server_share": { "named group": secp256r1 "key_exchange": { 0000: 04 6F 81 96 EC 5A DF A1 88 74 92 D8 A9 00 2F 59 .o...Z...t..../Y 0010: 8A B6 7E 96 0A 2A 94 FD 97 D5 E4 37 25 E9 70 7F .....*.....7%.p. 0020: 73 61 4D A8 E1 F7 0C 40 E7 47 15 24 55 A3 95 7D saM....@.G.$U... 0030: 64 6E AF B6 6C EB 3D 15 5B 8C 64 5B 82 1F 45 B2 dn..l.=.[.d[..E. 0040: 5F } }, } ] } ) javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:24.628 IST|SSLCipher.java:1824|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE countdown value = 137438953472 javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:24.632 IST|SSLCipher.java:1978|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE countdown value = 137438953472 javax.net.ssl|ALL|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:24.632 IST|ServerNameExtension.java:538|No expected server name indication response javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:24.633 IST|SSLExtensions.java:256|Ignore, context unavailable extension: server_name javax.net.ssl|ALL|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:24.633 IST|MaxFragExtension.java:471|Ignore unavailable max_fragment_length extension javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:24.633 IST|SSLExtensions.java:256|Ignore, context unavailable extension: max_fragment_length javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:24.634 IST|AlpnExtension.java:363|Ignore unavailable extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:24.634 IST|SSLExtensions.java:256|Ignore, context unavailable extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:24.635 IST|EncryptedExtensions.java:137|Produced EncryptedExtensions message ( "EncryptedExtensions": [ "supported_groups (10)": { "versions": [secp256r1, secp384r1, secp521r1, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192] } ] ) javax.net.ssl|ALL|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:24.636 IST|SignatureScheme.java:365|Ignore inactive signature scheme: dsa_sha256 javax.net.ssl|ALL|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:24.637 IST|SignatureScheme.java:365|Ignore inactive signature scheme: dsa_sha1 javax.net.ssl|ALL|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:24.637 IST|SignatureScheme.java:365|Ignore inactive signature scheme: rsa_md5 javax.net.ssl|ALL|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:24.638 IST|SignatureScheme.java:365|Ignore inactive signature scheme: dsa_sha256 javax.net.ssl|ALL|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:24.638 IST|SignatureScheme.java:365|Ignore inactive signature scheme: dsa_sha1 javax.net.ssl|ALL|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:24.639 IST|SignatureScheme.java:365|Ignore inactive signature scheme: rsa_md5 javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:24.640 IST|CertificateRequest.java:882|Produced CertificateRequest message ( "CertificateRequest": { "certificate_request_context": "", "extensions": [ "signature_algorithms (13)": { "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1] }, "signature_algorithms_cert (50)": { "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1] } ] } ) javax.net.ssl|ALL|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:24.640 IST|X509Authentication.java:264|No X.509 cert selected for EC javax.net.ssl|WARNING|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:24.640 IST|CertificateMessage.java:1063|Unavailable authentication scheme: ecdsa_secp256r1_sha256 javax.net.ssl|ALL|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:24.641 IST|X509Authentication.java:264|No X.509 cert selected for EC javax.net.ssl|WARNING|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:24.641 IST|CertificateMessage.java:1063|Unavailable authentication scheme: ecdsa_secp384r1_sha384 javax.net.ssl|ALL|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:24.641 IST|X509Authentication.java:264|No X.509 cert selected for EC javax.net.ssl|WARNING|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:24.641 IST|CertificateMessage.java:1063|Unavailable authentication scheme: ecdsa_secp521r1_sha512 javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:24.642 IST|StatusResponseManager.java:763|Staping disabled or is a resumed session javax.net.ssl|ALL|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:24.642 IST|CertStatusExtension.java:1117|Stapling is disabled for this connection javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:24.642 IST|SSLExtensions.java:256|Ignore, context unavailable extension: status_request javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:24.645 IST|CertificateMessage.java:1002|Produced server Certificate message ( "Certificate": { "certificate_request_context": "", "certificate_list": [ { "certificate" : { "version" : "v3", "serial number" : "3B FD 86 4A 58 09 72 F6", "signature algorithm": "SHA512withRSA", "issuer" : "CN=localhost", "not before" : "2019-11-05 13:41:52.000 IST", "not after" : "2020-11-05 13:41:52.000 IST", "subject" : "CN=localhost", "subject public key" : "RSA", "extensions" : [ { ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:false PathLen:2147483647 ] }, { ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_Encipherment Data_Encipherment ] } ]} "extensions": { } }, ] } ) javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:24.682 IST|CertificateVerify.java:1113|Produced server CertificateVerify handshake message ( "CertificateVerify": { "signature algorithm": rsa_pss_rsae_sha256 "signature": { 0000: 47 98 60 A3 AF 70 2A EB 8B F5 98 69 7F 5F 08 E1 G.`..p*....i._.. 0010: F1 6A 06 C6 1C 7A 73 3A 17 D4 C3 47 AB 61 18 70 .j...zs:...G.a.p 0020: 76 C8 42 0A 49 26 D0 91 EC AA 86 69 8B 2C 51 93 v.B.I&.....i.,Q. 0030: 1D E6 14 7D DE 33 B6 EE 43 B4 E1 BE 09 86 90 1C .....3..C....... 0040: 25 8F 09 74 93 4A 52 2C 4E AA 4E 21 B1 B2 D6 E3 %..t.JR,N.N!.... 0050: 1E E9 D3 20 29 CA 47 F8 1F CF B4 E5 00 E4 88 79 ... ).G........y 0060: 59 9B E3 46 4E 9C AF CC 81 C1 FE D2 9A 2B 24 86 Y..FN........+$. 0070: 65 E1 F3 B2 C1 B7 56 ED 11 10 44 F0 9D 90 F7 7B e.....V...D..... 0080: 6A E8 4C E2 4A B1 BB 23 EE 77 88 C1 B9 AA FD 24 j.L.J..#.w.....$ 0090: 5A D7 CD 93 02 E9 6E 00 4B A7 1B 56 B9 B7 E9 41 Z.....n.K..V...A 00A0: F5 5B 4B C0 C8 D0 08 E7 39 67 98 99 BE 93 12 A4 .[K.....9g...... 00B0: 27 D6 41 B4 EF D6 48 7C BD EB 4E AC A5 DF D1 0E '.A...H...N..... 00C0: E0 05 24 E9 A1 83 93 83 E6 BE EC B6 9A 10 3A 47 ..$...........:G 00D0: AF 30 7F 04 9A 3E E6 9F C6 64 99 A4 63 CC 02 17 .0...>...d..c... 00E0: C8 40 14 D5 20 35 23 B0 E8 B2 4E 3D E6 2D F2 EA .@.. 5#...N=.-.. 00F0: 5F 68 A4 14 75 C3 C7 E9 ED 66 27 CA F2 23 D6 13 _h..u....f'..#.. } } ) javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:24.684 IST|Finished.java:773|Produced server Finished handshake message ( "Finished": { "verify data": { 0000: 53 A1 7F FB 94 DB DC 4E 61 E1 E9 CE D4 6D A5 2C S......Na....m., 0010: 6F F0 50 AA E0 4A EF 6D 02 08 1D 1C A4 10 D2 57 o.P..J.m.......W }'} ) javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:24.686 IST|SSLCipher.java:1978|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE countdown value = 137438953472 javax.net.ssl|DEBUG|25|https-jsse-nio-8443-exec-5|2019-11-18 11:24:24.989 IST|ChangeCipherSpec.java:250|Consuming ChangeCipherSpec message javax.net.ssl|DEBUG|25|https-jsse-nio-8443-exec-5|2019-11-18 11:24:24.993 IST|CertificateMessage.java:1158|Consuming client Certificate handshake message ( "Certificate": { "certificate_request_context": "", "certificate_list": [ { "certificate" : { "version" : "v3", "serial number" : "2C 8B E3 32 BC 02 24 C0", "signature algorithm": "SHA512withRSA", "issuer" : "CN=client", "not before" : "2019-11-05 13:43:21.000 IST", "not after" : "2020-11-05 13:43:21.000 IST", "subject" : "CN=client", "subject public key" : "RSA", "extensions" : [ { ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:false PathLen:2147483647 ] }, { ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_Encipherment Data_Encipherment ] } ]} "extensions": { } }, ] } ) javax.net.ssl|DEBUG|25|https-jsse-nio-8443-exec-5|2019-11-18 11:24:24.997 IST|CertificateVerify.java:1165|Consuming CertificateVerify handshake message ( "CertificateVerify": { "signature algorithm": rsa_pss_rsae_sha256 "signature": { 0000: 27 36 06 DE 43 42 13 F1 A3 17 FB E9 C9 86 5D C5 '6..CB........]. 0010: 01 86 C4 01 3E 88 AD 4F B1 3B 98 46 99 73 20 D4 ....>..O.;.F.s . 0020: FB 79 98 0E 8E DC EC EB CF 4B 9E 30 50 CE 56 A9 .y.......K.0P.V. 0030: D3 E1 A9 8D C7 FB 7C A1 28 1B 1E D0 F1 7E 46 F5 ........(.....F. 0040: 8B 5A 03 3E 9E 38 19 45 DA 9B 3C F6 01 03 46 45 .Z.>.8.E..<...FE 0050: 12 87 86 30 FC A5 04 91 9C 8D A7 ED C3 79 DE 41 ...0.........y.A 0060: E5 A0 15 8B 8B 92 8E 20 DC B6 A4 FC 1A 6E 5A DE ....... .....nZ. 0070: D4 B3 2E A9 B0 31 70 59 AE DA 34 AE AA E7 7F 48 .....1pY..4....H 0080: 54 69 83 6B 43 93 AB D7 FE 40 44 63 E3 39 C7 EE Ti.kC....@Dc.9.. 0090: F3 71 8A 03 14 03 B6 4E 71 63 72 AB E3 34 7B CC .q.....Nqcr..4.. 00A0: 97 F3 B5 22 36 94 D7 84 0A 97 68 5E C8 2A 15 08 ..."6.....h^.*.. 00B0: 9E B5 86 2C 4F 97 3B 2E 12 D6 0F E0 EC 6D 11 6A ...,O.;......m.j 00C0: A3 40 7B A3 25 19 43 58 2F B5 B8 51 2F 01 C4 58 .@..%.CX/..Q/..X 00D0: B8 BB AD 2A 41 CB 13 01 9E 3A FB 97 85 2A 57 10 ...*A....:...*W. 00E0: 0D 38 AB CE C9 1D 41 8E A5 63 32 7D 61 0D 02 BC .8....A..c2.a... 00F0: 03 66 72 DD BD F6 B2 EA 1F E6 6F 0F 51 CF 62 30 .fr.......o.Q.b0 } } ) javax.net.ssl|DEBUG|25|https-jsse-nio-8443-exec-5|2019-11-18 11:24:24.999 IST|Finished.java:1044|Consuming client Finished handshake message ( "Finished": { "verify data": { 0000: CE 8A AA 65 F6 66 2E E8 00 E1 13 ED F3 47 89 49 ...e.f.......G.I 0010: 1E 1F C8 37 0E DB 05 F2 F4 61 95 E7 4E B4 A9 6D ...7.....a..N..m }'} ) javax.net.ssl|DEBUG|25|https-jsse-nio-8443-exec-5|2019-11-18 11:24:25.000 IST|SSLCipher.java:1824|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE countdown value = 137438953472 javax.net.ssl|DEBUG|25|https-jsse-nio-8443-exec-5|2019-11-18 11:24:25.000 IST|Finished.java:1148|Sending new session ticket 18-Nov-2019 11:24:25.001 FINE [https-jsse-nio-8443-exec-5] org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun Error during SSL handshake java.io.IOException: NOT_HANDSHAKING during handshake at org.apache.tomcat.util.net.SecureNioChannel.handshake(SecureNioChannel.java:193) at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1556) at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49) at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128) at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628) at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61) at java.base/java.lang.Thread.run(Thread.java:834) 18-Nov-2019 11:24:25.002 FINE [https-jsse-nio-8443-exec-5] org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper.doClose Calling [org.apache.tomcat.util.net.NioEndpoint@42b2b293].closeSocket([org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper@31ff17c7:org.apache.tomcat.util.net.SecureNioChannel@102a92e:java.nio.channels.SocketChannel[connected local=/0:0:0:0:0:0:0:1:8443 remote=/0:0:0:0:0:0:0:1:62361]]) java.lang.Exception at org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper.doClose(NioEndpoint.java:1163) at org.apache.tomcat.util.net.SocketWrapperBase.close(SocketWrapperBase.java:402) at org.apache.tomcat.util.net.NioEndpoint$Poller.cancelledKey(NioEndpoint.java:665) at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1586) at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49) at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128) at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628) at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61) at java.base/java.lang.Thread.run(Thread.java:834) javax.net.ssl|ALL|25|https-jsse-nio-8443-exec-5|2019-11-18 11:24:25.003 IST|SSLEngineImpl.java:756|Closing outbound of SSLEngine javax.net.ssl|WARNING|25|https-jsse-nio-8443-exec-5|2019-11-18 11:24:25.004 IST|SSLEngineOutputRecord.java:168|outbound has closed, ignore outbound application data 18-Nov-2019 11:24:25.028 FINE [https-jsse-nio-8443-exec-6] org.apache.tomcat.util.net.SecureNioChannel.processSNI The SNI host name extracted for connection [java.nio.channels.SocketChannel[connected local=/0:0:0:0:0:0:0:1:8443 remote=/0:0:0:0:0:0:0:1:62362]] was [localhost] javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:25.030 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 for TLS10 javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:25.031 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 for TLS10 javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:25.031 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLS10 javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:25.031 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLS10 javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:25.031 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 for TLS13 javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:25.032 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 for TLS13 javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:25.032 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLS13 javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:25.032 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLS13 javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:25.032 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA for TLS13 javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:25.033 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA for TLS13 javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:25.033 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 for TLS11 javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:25.033 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 for TLS11 javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:25.034 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLS11 javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:25.034 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLS11 javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:25.040 IST|SSLExtensions.java:131|Ignore unknown or unsupported extension ( "unknown extension (28)": { 0000: 40 01 @. } ) javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:25.041 IST|SSLExtensions.java:131|Ignore unknown or unsupported extension ( "unknown extension (21)": { 0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0090: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ............... } ) javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:25.047 IST|ClientHello.java:806|Consuming ClientHello handshake message ( "ClientHello": { "client version" : "TLSv1.2", "random" : "7A 0D AE 08 4A C1 3E DC 9E 18 77 56 87 87 56 DD B2 F9 26 07 52 E8 C6 F0 75 28 B1 12 FC 1B 43 0F", "session id" : "D4 E1 8F 97 E1 A2 E0 BC 5A 72 E9 3F C6 4D A3 80 32 2B 51 58 AA 92 58 48 BD E5 96 A8 A4 BF 02 11", "cipher suites" : "[TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_AES_256_GCM_SHA384(0x1302), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), UNKNOWN-CIPHER-SUITE(0xCCA9)(0xCCA9), UNKNOWN-CIPHER-SUITE(0xCCA8)(0xCCA8), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA(0xC00A), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA(0xC009), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA(0xC013), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA(0xC014), TLS_DHE_RSA_WITH_AES_128_CBC_SHA(0x0033), TLS_DHE_RSA_WITH_AES_256_CBC_SHA(0x0039), TLS_RSA_WITH_AES_128_CBC_SHA(0x002F), TLS_RSA_WITH_AES_256_CBC_SHA(0x0035), SSL_RSA_WITH_3DES_EDE_CBC_SHA(0x000A)]", "compression methods" : "00", "extensions" : [ "server_name (0)": { type=host_name (0), value=localhost }, "extended_master_secret (23)": { }, "renegotiation_info (65,281)": { "renegotiated connection": [] }, "supported_groups (10)": { "versions": [x25519, secp256r1, secp384r1, secp521r1, ffdhe2048, ffdhe3072] }, "ec_point_formats (11)": { "formats": [uncompressed] }, "application_layer_protocol_negotiation (16)": { [h2, http/1.1] }, "status_request (5)": { "certificate status type": ocsp "OCSP status request": { "responder_id": "request extensions": { } } }, "key_share (51)": { "client_shares": [ { "named group": x25519 "key_exchange": { 0000: 0A A6 36 5E 0B 40 A2 2D D5 82 0A 65 04 CB 39 C1 ..6^.@.-...e..9. 0010: 8E A5 67 E4 A5 7F 14 B0 DF 93 93 DB 6F 13 AB 4E ..g.........o..N } }, { "named group": secp256r1 "key_exchange": { 0000: 04 0B 5E 43 E7 B5 43 56 2D E8 4B A9 E1 9D 7D 6D ..^C..CV-.K....m 0010: E0 A4 53 E7 9F 36 C5 36 98 E5 46 DA A2 38 59 FC ..S..6.6..F..8Y. 0020: 57 44 01 3F 02 5C 4E 15 74 CB B8 A5 E3 4F 7D 4C WD.?.\N.t....O.L 0030: 0C 9D B0 BB 34 28 DC 6D 8C EA 87 27 2C A5 15 DD ....4(.m...',... 0040: C0 } }, ] }, "supported_versions (43)": { "versions": [TLSv1.3, TLSv1.2, TLSv1.1, TLSv1] }, "signature_algorithms (13)": { "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1] }, "unknown extension (28)": { 0000: 40 01 @. }, "unknown extension (21)": { 0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0090: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ............... } ] } ) javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:25.047 IST|SSLExtensions.java:188|Consumed extension: supported_versions javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:25.048 IST|ClientHello.java:836|Negotiated protocol version: TLSv1.3 javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:25.048 IST|PskKeyExchangeModesExtension.java:294|abort session resumption, no supported psk_dhe_ke PSK key exchange mode javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:25.048 IST|PreSharedKeyExtension.java:809|Handling pre_shared_key absence. javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:25.049 IST|ServerNameExtension.java:328|no server name matchers, ignore server name indication javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:25.049 IST|SSLExtensions.java:188|Consumed extension: server_name javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:25.049 IST|SSLExtensions.java:169|Ignore unavailable extension: max_fragment_length javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:25.049 IST|SSLExtensions.java:188|Consumed extension: status_request javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:25.050 IST|SSLExtensions.java:188|Consumed extension: supported_groups javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:25.050 IST|SSLExtensions.java:159|Ignore unsupported extension: ec_point_formats javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:25.050 IST|SSLExtensions.java:188|Consumed extension: signature_algorithms javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:25.050 IST|SSLExtensions.java:169|Ignore unavailable extension: signature_algorithms_cert javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:25.051 IST|AlpnExtension.java:274|Ignore server unenabled extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:25.051 IST|SSLExtensions.java:188|Consumed extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:25.051 IST|SSLExtensions.java:159|Ignore unsupported extension: status_request_v2 javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:25.051 IST|SSLExtensions.java:159|Ignore unsupported extension: extended_master_secret javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:25.052 IST|SSLExtensions.java:169|Ignore unavailable extension: cookie javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:25.052 IST|KeyShareExtension.java:350|Ignore unsupported named group: x25519 javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:25.053 IST|SSLExtensions.java:188|Consumed extension: key_share javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:25.053 IST|SSLExtensions.java:159|Ignore unsupported extension: renegotiation_info javax.net.ssl|ALL|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:25.054 IST|SignatureScheme.java:360|Ignore disabled signature scheme: rsa_md5 javax.net.ssl|WARNING|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:25.055 IST|SSLExtensions.java:211|Ignore impact of unsupported extension: server_name javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:25.055 IST|SSLExtensions.java:203|Ignore unavailable extension: max_fragment_length javax.net.ssl|WARNING|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:25.056 IST|SSLExtensions.java:211|Ignore impact of unsupported extension: status_request javax.net.ssl|WARNING|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:25.056 IST|SSLExtensions.java:211|Ignore impact of unsupported extension: supported_groups javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:25.057 IST|SSLExtensions.java:220|Populated with extension: signature_algorithms javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:25.059 IST|SSLExtensions.java:203|Ignore unavailable extension: signature_algorithms_cert javax.net.ssl|WARNING|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:25.059 IST|SSLExtensions.java:211|Ignore impact of unsupported extension: application_layer_protocol_negotiation javax.net.ssl|WARNING|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:25.059 IST|SSLExtensions.java:211|Ignore impact of unsupported extension: supported_versions javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:25.059 IST|SSLExtensions.java:203|Ignore unavailable extension: cookie javax.net.ssl|WARNING|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:25.060 IST|SSLExtensions.java:211|Ignore impact of unsupported extension: key_share javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:25.060 IST|SSLExtensions.java:203|Ignore unavailable extension: pre_shared_key javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:25.060 IST|ServerHello.java:729|use cipher suite TLS_AES_128_GCM_SHA256 javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:25.074 IST|SSLExtensions.java:256|Ignore, context unavailable extension: pre_shared_key javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:25.076 IST|ServerHello.java:580|Produced ServerHello handshake message ( "ServerHello": { "server version" : "TLSv1.2", "random" : "E1 9B 47 C9 EC 64 70 E3 0C 41 F3 AE 7F 50 81 67 89 50 52 A6 A7 22 5E AE 8D 81 09 1C 93 CE 30 C9", "session id" : "D4 E1 8F 97 E1 A2 E0 BC 5A 72 E9 3F C6 4D A3 80 32 2B 51 58 AA 92 58 48 BD E5 96 A8 A4 BF 02 11", "cipher suite" : "TLS_AES_128_GCM_SHA256(0x1301)", "compression methods" : "00", "extensions" : [ "supported_versions (43)": { "selected version": [TLSv1.3] }, "key_share (51)": { "server_share": { "named group": secp256r1 "key_exchange": { 0000: 04 28 CA 85 93 0D 42 7B 96 3C 32 98 84 2B 2E 75 .(....B..<2..+.u 0010: 0C 72 51 68 CD 70 05 54 15 39 A5 A2 51 41 26 69 .rQh.p.T.9..QA&i 0020: 66 08 48 29 BF 88 81 B4 D9 77 58 E4 34 EC 0E F3 f.H).....wX.4... 0030: 2C 40 14 3C 42 91 DD BA F8 67 B6 DA 2E 38 2D 0D ,@. } }, ] } ) javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:25.182 IST|CertificateVerify.java:1113|Produced server CertificateVerify handshake message ( "CertificateVerify": { "signature algorithm": rsa_pss_rsae_sha256 "signature": { 0000: 39 22 84 77 6F 92 A4 CD 1C FD 57 20 A2 87 98 22 9".wo.....W ..." 0010: 4E 49 B6 E0 4E 78 95 61 63 6D 8C B1 A9 37 41 D7 NI..Nx.acm...7A. 0020: 16 0D 14 DA 7B C3 91 49 6E 9D 61 F2 39 95 54 D6 .......In.a.9.T. 0030: 71 AD 04 5A BD 4C AC 62 7E 45 85 27 9D 44 5B D6 q..Z.L.b.E.'.D[. 0040: 08 EF 83 B4 A2 EF 8B 24 AE BF E8 DF 44 B4 94 DB .......$....D... 0050: AF 19 85 FE 53 DF 34 B2 B6 5E 3A CF 23 FB 16 AC ....S.4..^:.#... 0060: DA DD 51 20 D4 E7 F8 7F 25 87 AF 23 5E 7A A4 6B ..Q ....%..#^z.k 0070: 5A D1 AE C6 7A 9B 90 7D F4 8A C3 1E 35 D8 DD 61 Z...z.......5..a 0080: 2B 30 B7 2B 9A BC 1D A8 83 B4 61 B0 4A FC 8F F4 +0.+......a.J... 0090: 91 8D 5A 3C 07 CE B0 81 BD 40 96 99 06 C7 ED D3 ..Z<.....@...... 00A0: 86 17 A8 2C 13 A0 93 67 30 A3 63 51 C8 CD DB EF ...,...g0.cQ.... 00B0: A1 72 F7 B4 C7 B0 CD CF 49 3C 32 49 4D AB 2E C4 .r......I<2IM... 00C0: 7F CA 19 E9 22 BB E6 05 2C 29 FA E8 82 32 C6 01 ...."...,)...2.. 00D0: C9 96 45 99 4B C3 7C 57 90 21 FC 4B 94 96 49 96 ..E.K..W.!.K..I. 00E0: 22 E9 E9 6B C0 24 22 1F 05 9D 80 A1 6A 12 38 3E "..k.$".....j.8> 00F0: 95 0F 15 91 96 C4 86 E7 EE AD 20 2B 4E BE 88 74 .......... +N..t } } ) javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:25.183 IST|Finished.java:773|Produced server Finished handshake message ( "Finished": { "verify data": { 0000: 1F F7 44 59 2C 08 0E EF 35 E4 63 50 B3 4E 41 92 ..DY,...5.cP.NA. 0010: 02 4A CA FF 15 F2 03 9A 48 6C EF D5 44 4C 31 3F .J......Hl..DL1? }'} ) javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:25.184 IST|SSLCipher.java:1978|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE countdown value = 137438953472 javax.net.ssl|DEBUG|28|https-jsse-nio-8443-exec-8|2019-11-18 11:24:25.251 IST|ChangeCipherSpec.java:250|Consuming ChangeCipherSpec message javax.net.ssl|DEBUG|28|https-jsse-nio-8443-exec-8|2019-11-18 11:24:25.256 IST|CertificateMessage.java:1158|Consuming client Certificate handshake message ( "Certificate": { "certificate_request_context": "", "certificate_list": [ { "certificate" : { "version" : "v3", "serial number" : "2C 8B E3 32 BC 02 24 C0", "signature algorithm": "SHA512withRSA", "issuer" : "CN=client", "not before" : "2019-11-05 13:43:21.000 IST", "not after" : "2020-11-05 13:43:21.000 IST", "subject" : "CN=client", "subject public key" : "RSA", "extensions" : [ { ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:false PathLen:2147483647 ] }, { ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_Encipherment Data_Encipherment ] } ]} "extensions": { } }, ] } ) javax.net.ssl|DEBUG|28|https-jsse-nio-8443-exec-8|2019-11-18 11:24:25.261 IST|CertificateVerify.java:1165|Consuming CertificateVerify handshake message ( "CertificateVerify": { "signature algorithm": rsa_pss_rsae_sha256 "signature": { 0000: 15 A3 78 FF 68 5B DB 68 ED 57 41 50 D5 3C 85 BA ..x.h[.h.WAP.<.. 0010: FC 62 57 5F B7 B8 11 40 51 B8 5D 0F EF 68 15 F1 .bW_...@Q.]..h.. 0020: 21 2B 64 85 7D B2 AF 0C 1B D4 1C 0D D5 BE 0B 6B !+d............k 0030: F7 C6 AE 25 CD E4 CF 1E 26 E0 07 FD 8A A0 D8 5D ...%....&......] 0040: 20 2E EF F6 C3 6D D0 4B 7B 2C 32 28 6A 06 A7 03 ....m.K.,2(j... 0050: 35 39 FF B2 84 23 F7 55 7D 75 AE 6D BE 1A 20 3E 59...#.U.u.m.. > 0060: DE C8 77 BB B9 43 41 A6 F5 C5 E6 E8 4F E6 E9 96 ..w..CA.....O... 0070: 88 0A 99 98 24 26 B9 D1 12 77 3D E1 34 98 37 FD ....$&...w=.4.7. 0080: DC E8 2F 58 90 ED 64 99 B2 17 52 4F A1 A5 5C 89 ../X..d...RO..\. 0090: 63 1A 70 A1 FA 1B 1A 54 9C A8 79 CB 59 31 8E EF c.p....T..y.Y1.. 00A0: 8D 8D 21 89 A0 2D 57 7D 0F 50 8E 1F C4 14 53 BA ..!..-W..P....S. 00B0: A5 D9 64 43 4B 0D 9C 7D 12 0A CD 45 2D E9 D9 0B ..dCK......E-... 00C0: 30 E6 CF 14 63 07 18 41 80 B1 4B 1E 2F C5 A8 50 0...c..A..K./..P 00D0: 85 F7 96 FA FD B2 8F A8 E0 E2 03 D8 44 7F 54 78 ............D.Tx 00E0: 51 31 65 23 DF 2A DF 57 D8 AC AB 63 CB 73 BF 85 Q1e#.*.W...c.s.. 00F0: 2D 4D DB 1E 81 77 0F 64 F1 7A 6E 16 3A 70 AE 28 -M...w.d.zn.:p.( } } ) javax.net.ssl|DEBUG|28|https-jsse-nio-8443-exec-8|2019-11-18 11:24:25.263 IST|Finished.java:1044|Consuming client Finished handshake message ( "Finished": { "verify data": { 0000: AB AB 20 37 32 D5 90 70 E0 49 7E FE 0E 0F 11 3F .. 72..p.I.....? 0010: B6 0B 21 C2 24 AD 87 7E 68 C9 16 C6 8E E9 12 3E ..!.$...h......> }'} ) javax.net.ssl|DEBUG|28|https-jsse-nio-8443-exec-8|2019-11-18 11:24:25.264 IST|SSLCipher.java:1824|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE countdown value = 137438953472 javax.net.ssl|DEBUG|28|https-jsse-nio-8443-exec-8|2019-11-18 11:24:25.265 IST|Finished.java:1148|Sending new session ticket 18-Nov-2019 11:24:25.265 FINE [https-jsse-nio-8443-exec-8] org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun Error during SSL handshake java.io.IOException: NOT_HANDSHAKING during handshake at org.apache.tomcat.util.net.SecureNioChannel.handshake(SecureNioChannel.java:193) at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1556) at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49) at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128) at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628) at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61) at java.base/java.lang.Thread.run(Thread.java:834) 18-Nov-2019 11:24:25.267 FINE [https-jsse-nio-8443-exec-8] org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper.doClose Calling [org.apache.tomcat.util.net.NioEndpoint@42b2b293].closeSocket([org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper@e04f2a0:org.apache.tomcat.util.net.SecureNioChannel@102a92e:java.nio.channels.SocketChannel[connected local=/0:0:0:0:0:0:0:1:8443 remote=/0:0:0:0:0:0:0:1:62362]]) java.lang.Exception at org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper.doClose(NioEndpoint.java:1163) at org.apache.tomcat.util.net.SocketWrapperBase.close(SocketWrapperBase.java:402) at org.apache.tomcat.util.net.NioEndpoint$Poller.cancelledKey(NioEndpoint.java:665) at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1586) at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49) at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128) at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628) at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61) at java.base/java.lang.Thread.run(Thread.java:834) javax.net.ssl|ALL|28|https-jsse-nio-8443-exec-8|2019-11-18 11:24:25.268 IST|SSLEngineImpl.java:756|Closing outbound of SSLEngine javax.net.ssl|WARNING|28|https-jsse-nio-8443-exec-8|2019-11-18 11:24:25.269 IST|SSLEngineOutputRecord.java:168|outbound has closed, ignore outbound application data 18-Nov-2019 11:24:25.348 FINE [https-jsse-nio-8443-exec-7] org.apache.tomcat.util.net.SecureNioChannel.processSNI The SNI host name extracted for connection [java.nio.channels.SocketChannel[connected local=/0:0:0:0:0:0:0:1:8443 remote=/0:0:0:0:0:0:0:1:62363]] was [localhost] javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:25.350 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 for TLS10 javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:25.351 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 for TLS10 javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:25.351 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLS10 javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:25.351 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLS10 javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:25.351 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 for TLS13 javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:25.352 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 for TLS13 javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:25.352 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLS13 javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:25.352 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLS13 javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:25.352 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA for TLS13 javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:25.352 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA for TLS13 javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:25.353 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 for TLS11 javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:25.353 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 for TLS11 javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:25.353 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLS11 javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:25.353 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLS11 javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:25.358 IST|SSLExtensions.java:131|Ignore unknown or unsupported extension ( "unknown extension (28)": { 0000: 40 01 @. } ) javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:25.359 IST|SSLExtensions.java:131|Ignore unknown or unsupported extension ( "unknown extension (21)": { 0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0090: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ............... } ) javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:25.901 IST|ClientHello.java:806|Consuming ClientHello handshake message ( "ClientHello": { "client version" : "TLSv1.2", "random" : "92 B9 66 B3 0D 3B 68 A6 CC D0 A6 F9 7D 43 DD D1 CF 81 9B D2 48 C0 9F C3 31 AD 38 18 1D D4 37 04", "session id" : "EC A5 0B BE CB 06 6E 14 E0 B0 56 4F CC 0F EC BD 8C 0D A8 7A C2 82 21 E4 15 C2 FA 12 2F 03 3A 3E", "cipher suites" : "[TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_AES_256_GCM_SHA384(0x1302), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), UNKNOWN-CIPHER-SUITE(0xCCA9)(0xCCA9), UNKNOWN-CIPHER-SUITE(0xCCA8)(0xCCA8), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA(0xC00A), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA(0xC009), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA(0xC013), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA(0xC014), TLS_DHE_RSA_WITH_AES_128_CBC_SHA(0x0033), TLS_DHE_RSA_WITH_AES_256_CBC_SHA(0x0039), TLS_RSA_WITH_AES_128_CBC_SHA(0x002F), TLS_RSA_WITH_AES_256_CBC_SHA(0x0035), SSL_RSA_WITH_3DES_EDE_CBC_SHA(0x000A)]", "compression methods" : "00", "extensions" : [ "server_name (0)": { type=host_name (0), value=localhost }, "extended_master_secret (23)": { }, "renegotiation_info (65,281)": { "renegotiated connection": [] }, "supported_groups (10)": { "versions": [x25519, secp256r1, secp384r1, secp521r1, ffdhe2048, ffdhe3072] }, "ec_point_formats (11)": { "formats": [uncompressed] }, "application_layer_protocol_negotiation (16)": { [h2, http/1.1] }, "status_request (5)": { "certificate status type": ocsp "OCSP status request": { "responder_id": "request extensions": { } } }, "key_share (51)": { "client_shares": [ { "named group": x25519 "key_exchange": { 0000: AE C9 E6 A7 F7 AA 6F E4 D2 9A 06 8A 3A 82 37 DB ......o.....:.7. 0010: EF 7D 83 48 D9 DA 04 E6 73 53 EF A9 F5 A9 58 01 ...H....sS....X. } }, { "named group": secp256r1 "key_exchange": { 0000: 04 6B 3C F5 8C 52 C8 1A 09 FA 07 CD E1 16 AD 03 .k<..R.......... 0010: AF B0 4C C5 1A 9C 12 C7 38 28 AD 46 39 46 8B 25 ..L.....8(.F9F.% 0020: FA 3A 72 AB 7F FC 02 3B 2D 37 2A 2C 35 71 4D 03 .:r....;-7*,5qM. 0030: 5A 8B F9 CB C6 BD 9D 02 E9 14 20 F8 D2 AC 1F 99 Z......... ..... 0040: 21 } }, ] }, "supported_versions (43)": { "versions": [TLSv1.3, TLSv1.2, TLSv1.1, TLSv1] }, "signature_algorithms (13)": { "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1] }, "unknown extension (28)": { 0000: 40 01 @. }, "unknown extension (21)": { 0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0090: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ............... } ] } ) javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:25.902 IST|SSLExtensions.java:188|Consumed extension: supported_versions javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:25.902 IST|ClientHello.java:836|Negotiated protocol version: TLSv1.3 javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:25.902 IST|PskKeyExchangeModesExtension.java:294|abort session resumption, no supported psk_dhe_ke PSK key exchange mode javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:25.903 IST|PreSharedKeyExtension.java:809|Handling pre_shared_key absence. javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:25.903 IST|ServerNameExtension.java:328|no server name matchers, ignore server name indication javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:25.903 IST|SSLExtensions.java:188|Consumed extension: server_name javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:25.903 IST|SSLExtensions.java:169|Ignore unavailable extension: max_fragment_length javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:25.904 IST|SSLExtensions.java:188|Consumed extension: status_request javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:25.904 IST|SSLExtensions.java:188|Consumed extension: supported_groups javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:25.904 IST|SSLExtensions.java:159|Ignore unsupported extension: ec_point_formats javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:25.904 IST|SSLExtensions.java:188|Consumed extension: signature_algorithms javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:25.905 IST|SSLExtensions.java:169|Ignore unavailable extension: signature_algorithms_cert javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:25.905 IST|AlpnExtension.java:274|Ignore server unenabled extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:25.905 IST|SSLExtensions.java:188|Consumed extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:25.905 IST|SSLExtensions.java:159|Ignore unsupported extension: status_request_v2 javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:25.905 IST|SSLExtensions.java:159|Ignore unsupported extension: extended_master_secret javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:25.906 IST|SSLExtensions.java:169|Ignore unavailable extension: cookie javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:25.906 IST|KeyShareExtension.java:350|Ignore unsupported named group: x25519 javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:25.907 IST|SSLExtensions.java:188|Consumed extension: key_share javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:25.907 IST|SSLExtensions.java:159|Ignore unsupported extension: renegotiation_info javax.net.ssl|ALL|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:25.908 IST|SignatureScheme.java:360|Ignore disabled signature scheme: rsa_md5 javax.net.ssl|WARNING|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:25.909 IST|SSLExtensions.java:211|Ignore impact of unsupported extension: server_name javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:25.909 IST|SSLExtensions.java:203|Ignore unavailable extension: max_fragment_length javax.net.ssl|WARNING|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:25.909 IST|SSLExtensions.java:211|Ignore impact of unsupported extension: status_request javax.net.ssl|WARNING|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:25.909 IST|SSLExtensions.java:211|Ignore impact of unsupported extension: supported_groups javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:25.911 IST|SSLExtensions.java:220|Populated with extension: signature_algorithms javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:25.911 IST|SSLExtensions.java:203|Ignore unavailable extension: signature_algorithms_cert javax.net.ssl|WARNING|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:25.911 IST|SSLExtensions.java:211|Ignore impact of unsupported extension: application_layer_protocol_negotiation javax.net.ssl|WARNING|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:25.912 IST|SSLExtensions.java:211|Ignore impact of unsupported extension: supported_versions javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:25.912 IST|SSLExtensions.java:203|Ignore unavailable extension: cookie javax.net.ssl|WARNING|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:25.912 IST|SSLExtensions.java:211|Ignore impact of unsupported extension: key_share javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:25.912 IST|SSLExtensions.java:203|Ignore unavailable extension: pre_shared_key javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:25.912 IST|ServerHello.java:729|use cipher suite TLS_AES_128_GCM_SHA256 javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:25.934 IST|SSLExtensions.java:256|Ignore, context unavailable extension: pre_shared_key javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:25.936 IST|ServerHello.java:580|Produced ServerHello handshake message ( "ServerHello": { "server version" : "TLSv1.2", "random" : "69 26 A5 E9 63 E6 51 17 4D 37 A0 2A DA A1 EA 2B DD 15 6E 01 77 85 B5 69 22 95 8A 84 F1 DB 9A 07", "session id" : "EC A5 0B BE CB 06 6E 14 E0 B0 56 4F CC 0F EC BD 8C 0D A8 7A C2 82 21 E4 15 C2 FA 12 2F 03 3A 3E", "cipher suite" : "TLS_AES_128_GCM_SHA256(0x1301)", "compression methods" : "00", "extensions" : [ "supported_versions (43)": { "selected version": [TLSv1.3] }, "key_share (51)": { "server_share": { "named group": secp256r1 "key_exchange": { 0000: 04 90 89 65 6C B0 48 4E 2E 3C 21 4D C9 44 CB 23 ...el.HN. } }, ] } ) javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:27.252 IST|CertificateVerify.java:1113|Produced server CertificateVerify handshake message ( "CertificateVerify": { "signature algorithm": rsa_pss_rsae_sha256 "signature": { 0000: 03 86 DE CF 34 9B 04 FE 40 7E 5E CD 44 91 06 D1 ....4...@.^.D... 0010: 93 0D 9F 6E A8 C8 23 71 F9 B2 26 04 CF 1C BF 36 ...n..#q..&....6 0020: B9 04 65 30 CA 7B C4 9E B9 A9 B5 42 E7 82 4F E3 ..e0.......B..O. 0030: 78 CF F0 62 FD DD 21 97 67 32 0C 52 BF 3E C5 27 x..b..!.g2.R.>.' 0040: 3D 23 9A AB 59 DA EF B3 0D A2 83 05 ED BE 5E 26 =#..Y.........^& 0050: 1B B1 6F AC A7 4E AB 53 48 26 39 23 0C FA 94 C4 ..o..N.SH&9#.... 0060: 98 5E 2A F0 3E D2 D9 F0 B7 3F A7 FD 84 96 46 A8 .^*.>....?....F. 0070: 42 1D 36 44 BD 1A AC 96 5C 85 C4 2A A6 91 52 26 B.6D....\..*..R& 0080: 3E C2 B1 47 B2 8A 63 44 01 BE 94 03 0D 1C 58 07 >..G..cD......X. 0090: 25 02 76 46 54 1B DD D2 11 86 F4 12 D4 A8 A5 6B %.vFT..........k 00A0: 82 0A FC CA C7 CD 37 B1 84 68 A9 D3 CD DF FB 45 ......7..h.....E 00B0: AA EE A5 4E 60 88 7C B4 5F 63 01 E5 AC 05 DB 21 ...N`..._c.....! 00C0: 41 CE 49 E3 6A 6B BC D9 8F 38 DC 8B 1F C1 FD EC A.I.jk...8...... 00D0: 63 79 67 1D C7 A9 18 2B A1 FE 9C 0E BD 39 73 0D cyg....+.....9s. 00E0: CE E5 2D 2A D9 84 48 D3 E8 5F 2E DF 01 D4 89 FA ..-*..H.._...... 00F0: 9B 80 D2 89 82 F7 20 A4 3C FA 3A 76 BB 4C 24 EC ...... .<.:v.L$. } } ) javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:27.253 IST|Finished.java:773|Produced server Finished handshake message ( "Finished": { "verify data": { 0000: 11 8E 6C 87 05 C6 F9 53 D6 D9 0B 16 C8 83 8C 1E ..l....S........ 0010: 43 F0 AA F8 86 00 3F F2 23 3D 10 78 B3 50 32 D7 C.....?.#=.x.P2. }'} ) javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-18 11:24:27.255 IST|SSLCipher.java:1978|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE countdown value = 137438953472 javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 11:24:27.326 IST|ChangeCipherSpec.java:250|Consuming ChangeCipherSpec message javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 11:24:27.329 IST|CertificateMessage.java:1158|Consuming client Certificate handshake message ( "Certificate": { "certificate_request_context": "", "certificate_list": [ { "certificate" : { "version" : "v3", "serial number" : "2C 8B E3 32 BC 02 24 C0", "signature algorithm": "SHA512withRSA", "issuer" : "CN=client", "not before" : "2019-11-05 13:43:21.000 IST", "not after" : "2020-11-05 13:43:21.000 IST", "subject" : "CN=client", "subject public key" : "RSA", "extensions" : [ { ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:false PathLen:2147483647 ] }, { ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_Encipherment Data_Encipherment ] } ]} "extensions": { } }, ] } ) javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 11:24:27.332 IST|CertificateVerify.java:1165|Consuming CertificateVerify handshake message ( "CertificateVerify": { "signature algorithm": rsa_pss_rsae_sha256 "signature": { 0000: 09 46 07 84 7A 9F 27 24 79 BA 13 75 C2 51 86 F6 .F..z.'$y..u.Q.. 0010: 5E 5B 33 45 92 D5 AB 92 2E 00 1D 5C 9E 87 33 F7 ^[3E.......\..3. 0020: 63 28 BC F1 4C 8B 38 C9 64 6C 94 B6 84 E4 6D E7 c(..L.8.dl....m. 0030: 13 2A 90 27 6A 39 AE AB 78 98 AA 12 16 F1 29 8B .*.'j9..x.....). 0040: 19 73 44 D9 CF 81 7C 38 BA 06 67 9A 9E 91 B0 45 .sD....8..g....E 0050: 0D 9B BB 63 96 D0 2B D4 7B 7C ED C0 C8 10 0C A7 ...c..+......... 0060: 56 7D 3D CC D1 A0 D8 C2 73 C6 A0 62 93 0F D5 0E V.=.....s..b.... 0070: C5 B0 A3 50 86 15 30 27 C8 8F 1D 1A 7B D7 B3 F5 ...P..0'........ 0080: E9 92 BB A9 5C E7 20 E0 19 40 12 A5 8F D3 83 FF ....\. ..@...... 0090: 9D 4E DD 3D 32 73 77 99 7E 7A F4 97 B7 95 F8 31 .N.=2sw..z.....1 00A0: 96 F7 D6 C8 1F DE AA 45 8A 26 01 96 C0 32 30 A7 .......E.&...20. 00B0: 60 16 E6 67 7F 58 A6 CB 6C 22 08 39 F1 62 B9 8B `..g.X..l".9.b.. 00C0: CA 83 73 68 74 23 8A C0 00 A1 2A 8F C9 DD 82 F9 ..sht#....*..... 00D0: FE 97 31 DE BD A7 97 41 5B 9B C6 A7 0E 95 99 56 ..1....A[......V 00E0: F6 EA 0D A2 AA D9 EC 48 ED 86 72 E7 E3 30 71 BD .......H..r..0q. 00F0: 20 6D 4B 7D 04 75 7F 99 EE 46 D6 37 FE 43 BB 19 mK..u...F.7.C.. } } ) javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 11:24:27.333 IST|Finished.java:1044|Consuming client Finished handshake message ( "Finished": { "verify data": { 0000: 95 EA EC FA 92 21 CB FD 60 4A B6 D2 87 28 54 72 .....!..`J...(Tr 0010: 5A 4C DE B2 70 E5 F6 B1 32 31 2C 3B 62 EE 95 9C ZL..p...21,;b... }'} ) javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 11:24:27.335 IST|SSLCipher.java:1824|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE countdown value = 137438953472 javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-18 11:24:27.335 IST|Finished.java:1148|Sending new session ticket 18-Nov-2019 11:24:27.336 FINE [https-jsse-nio-8443-exec-2] org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun Error during SSL handshake java.io.IOException: NOT_HANDSHAKING during handshake at org.apache.tomcat.util.net.SecureNioChannel.handshake(SecureNioChannel.java:193) at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1556) at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49) at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128) at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628) at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61) at java.base/java.lang.Thread.run(Thread.java:834) 18-Nov-2019 11:24:27.337 FINE [https-jsse-nio-8443-exec-2] org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper.doClose Calling [org.apache.tomcat.util.net.NioEndpoint@42b2b293].closeSocket([org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper@afdc1a8:org.apache.tomcat.util.net.SecureNioChannel@102a92e:java.nio.channels.SocketChannel[connected local=/0:0:0:0:0:0:0:1:8443 remote=/0:0:0:0:0:0:0:1:62363]]) java.lang.Exception at org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper.doClose(NioEndpoint.java:1163) at org.apache.tomcat.util.net.SocketWrapperBase.close(SocketWrapperBase.java:402) at org.apache.tomcat.util.net.NioEndpoint$Poller.cancelledKey(NioEndpoint.java:665) at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1586) at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49) at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128) at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628) at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61) at java.base/java.lang.Thread.run(Thread.java:834) javax.net.ssl|ALL|22|https-jsse-nio-8443-exec-2|2019-11-18 11:24:27.338 IST|SSLEngineImpl.java:756|Closing outbound of SSLEngine javax.net.ssl|WARNING|22|https-jsse-nio-8443-exec-2|2019-11-18 11:24:27.339 IST|SSLEngineOutputRecord.java:168|outbound has closed, ignore outbound application data 18-Nov-2019 11:24:27.402 FINE [https-jsse-nio-8443-exec-9] org.apache.tomcat.util.net.SecureNioChannel.processSNI The SNI host name extracted for connection [java.nio.channels.SocketChannel[connected local=/0:0:0:0:0:0:0:1:8443 remote=/0:0:0:0:0:0:0:1:62364]] was [localhost] javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:27.404 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 for TLS10 javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:27.404 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 for TLS10 javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:27.405 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLS10 javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:27.405 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLS10 javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:27.405 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 for TLS13 javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:27.405 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 for TLS13 javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:27.406 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLS13 javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:27.406 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLS13 javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:27.406 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA for TLS13 javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:27.406 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA for TLS13 javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:27.407 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 for TLS11 javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:27.407 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 for TLS11 javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:27.407 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLS11 javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:27.407 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLS11 javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:27.417 IST|SSLExtensions.java:131|Ignore unknown or unsupported extension ( "unknown extension (28)": { 0000: 40 01 @. } ) javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:27.418 IST|SSLExtensions.java:131|Ignore unknown or unsupported extension ( "unknown extension (21)": { 0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0090: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ............... } ) javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:27.423 IST|ClientHello.java:806|Consuming ClientHello handshake message ( "ClientHello": { "client version" : "TLSv1.2", "random" : "00 7E 31 01 D6 77 44 E8 6C 63 FD 21 A5 7C 2E EE 98 73 A4 8B 23 B1 F3 70 B6 EF 57 6D 23 B7 2C 09", "session id" : "5A D8 09 0A E0 57 9B 83 EF 52 4F 70 15 91 BF AD 45 B8 5C E7 0A BB AE 1E D4 C3 1A 87 AA 61 8D 96", "cipher suites" : "[TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_AES_256_GCM_SHA384(0x1302), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), UNKNOWN-CIPHER-SUITE(0xCCA9)(0xCCA9), UNKNOWN-CIPHER-SUITE(0xCCA8)(0xCCA8), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA(0xC00A), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA(0xC009), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA(0xC013), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA(0xC014), TLS_DHE_RSA_WITH_AES_128_CBC_SHA(0x0033), TLS_DHE_RSA_WITH_AES_256_CBC_SHA(0x0039), TLS_RSA_WITH_AES_128_CBC_SHA(0x002F), TLS_RSA_WITH_AES_256_CBC_SHA(0x0035), SSL_RSA_WITH_3DES_EDE_CBC_SHA(0x000A)]", "compression methods" : "00", "extensions" : [ "server_name (0)": { type=host_name (0), value=localhost }, "extended_master_secret (23)": { }, "renegotiation_info (65,281)": { "renegotiated connection": [] }, "supported_groups (10)": { "versions": [x25519, secp256r1, secp384r1, secp521r1, ffdhe2048, ffdhe3072] }, "ec_point_formats (11)": { "formats": [uncompressed] }, "application_layer_protocol_negotiation (16)": { [h2, http/1.1] }, "status_request (5)": { "certificate status type": ocsp "OCSP status request": { "responder_id": "request extensions": { } } }, "key_share (51)": { "client_shares": [ { "named group": x25519 "key_exchange": { 0000: B7 93 C7 2C D1 B4 22 7D E3 C4 24 11 8F FB 65 C2 ...,.."...$...e. 0010: 8C E6 2F D3 92 1A BF F0 E5 40 41 9B 6E 7F B7 4C ../......@A.n..L } }, { "named group": secp256r1 "key_exchange": { 0000: 04 80 F3 0E 24 0D A1 73 93 98 B7 C9 5B 47 C6 9B ....$..s....[G.. 0010: 16 AF C2 E4 76 E5 B0 BA 09 17 E5 E9 E7 B0 20 E9 ....v......... . 0020: DA 43 6C 6D D9 A4 B1 1F ED F7 15 8E 77 A5 59 6C .Clm........w.Yl 0030: 87 88 56 77 C6 CD 61 B1 3A 61 29 F0 88 9B 80 40 ..Vw..a.:a)....@ 0040: 25 } }, ] }, "supported_versions (43)": { "versions": [TLSv1.3, TLSv1.2, TLSv1.1, TLSv1] }, "signature_algorithms (13)": { "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1] }, "unknown extension (28)": { 0000: 40 01 @. }, "unknown extension (21)": { 0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0090: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ............... } ] } ) javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:27.423 IST|SSLExtensions.java:188|Consumed extension: supported_versions javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:27.424 IST|ClientHello.java:836|Negotiated protocol version: TLSv1.3 javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:27.424 IST|PskKeyExchangeModesExtension.java:294|abort session resumption, no supported psk_dhe_ke PSK key exchange mode javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:27.425 IST|PreSharedKeyExtension.java:809|Handling pre_shared_key absence. javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:27.425 IST|ServerNameExtension.java:328|no server name matchers, ignore server name indication javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:27.425 IST|SSLExtensions.java:188|Consumed extension: server_name javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:27.425 IST|SSLExtensions.java:169|Ignore unavailable extension: max_fragment_length javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:27.426 IST|SSLExtensions.java:188|Consumed extension: status_request javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:27.426 IST|SSLExtensions.java:188|Consumed extension: supported_groups javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:27.426 IST|SSLExtensions.java:159|Ignore unsupported extension: ec_point_formats javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:27.426 IST|SSLExtensions.java:188|Consumed extension: signature_algorithms javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:27.426 IST|SSLExtensions.java:169|Ignore unavailable extension: signature_algorithms_cert javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:27.427 IST|AlpnExtension.java:274|Ignore server unenabled extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:27.427 IST|SSLExtensions.java:188|Consumed extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:27.427 IST|SSLExtensions.java:159|Ignore unsupported extension: status_request_v2 javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:27.427 IST|SSLExtensions.java:159|Ignore unsupported extension: extended_master_secret javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:27.427 IST|SSLExtensions.java:169|Ignore unavailable extension: cookie javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:27.428 IST|KeyShareExtension.java:350|Ignore unsupported named group: x25519 javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:27.428 IST|SSLExtensions.java:188|Consumed extension: key_share javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:27.428 IST|SSLExtensions.java:159|Ignore unsupported extension: renegotiation_info javax.net.ssl|ALL|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:27.430 IST|SignatureScheme.java:360|Ignore disabled signature scheme: rsa_md5 javax.net.ssl|WARNING|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:27.430 IST|SSLExtensions.java:211|Ignore impact of unsupported extension: server_name javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:27.430 IST|SSLExtensions.java:203|Ignore unavailable extension: max_fragment_length javax.net.ssl|WARNING|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:27.431 IST|SSLExtensions.java:211|Ignore impact of unsupported extension: status_request javax.net.ssl|WARNING|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:27.431 IST|SSLExtensions.java:211|Ignore impact of unsupported extension: supported_groups javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:27.432 IST|SSLExtensions.java:220|Populated with extension: signature_algorithms javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:27.432 IST|SSLExtensions.java:203|Ignore unavailable extension: signature_algorithms_cert javax.net.ssl|WARNING|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:27.432 IST|SSLExtensions.java:211|Ignore impact of unsupported extension: application_layer_protocol_negotiation javax.net.ssl|WARNING|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:27.432 IST|SSLExtensions.java:211|Ignore impact of unsupported extension: supported_versions javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:27.432 IST|SSLExtensions.java:203|Ignore unavailable extension: cookie javax.net.ssl|WARNING|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:27.433 IST|SSLExtensions.java:211|Ignore impact of unsupported extension: key_share javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:27.433 IST|SSLExtensions.java:203|Ignore unavailable extension: pre_shared_key javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:27.433 IST|ServerHello.java:729|use cipher suite TLS_AES_128_GCM_SHA256 javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:27.492 IST|SSLExtensions.java:256|Ignore, context unavailable extension: pre_shared_key javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:27.494 IST|ServerHello.java:580|Produced ServerHello handshake message ( "ServerHello": { "server version" : "TLSv1.2", "random" : "FD C0 69 D2 A8 09 73 CA 34 E4 56 53 26 94 D7 F6 16 0E 3F 7D 5E 78 B5 62 D5 42 EE B6 E0 54 22 CD", "session id" : "5A D8 09 0A E0 57 9B 83 EF 52 4F 70 15 91 BF AD 45 B8 5C E7 0A BB AE 1E D4 C3 1A 87 AA 61 8D 96", "cipher suite" : "TLS_AES_128_GCM_SHA256(0x1301)", "compression methods" : "00", "extensions" : [ "supported_versions (43)": { "selected version": [TLSv1.3] }, "key_share (51)": { "server_share": { "named group": secp256r1 "key_exchange": { 0000: 04 8A B8 01 23 19 99 98 0C E7 67 41 0B 69 A5 41 ....#.....gA.i.A 0010: E1 BD 26 AB DC 7C F4 77 9F AD B2 43 EE FC 72 B2 ..&....w...C..r. 0020: 48 D4 16 D4 4C CF BE 8E 05 13 F2 00 29 9E FD 14 H...L.......)... 0030: 3C 84 3F BE A3 5C 5A 29 10 51 42 8C AF 3A BF 04 <.?..\Z).QB..:.. 0040: A7 } }, } ] } ) javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:27.511 IST|SSLCipher.java:1824|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE countdown value = 137438953472 javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:27.512 IST|SSLCipher.java:1978|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE countdown value = 137438953472 javax.net.ssl|ALL|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:27.512 IST|ServerNameExtension.java:538|No expected server name indication response javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:27.513 IST|SSLExtensions.java:256|Ignore, context unavailable extension: server_name javax.net.ssl|ALL|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:27.513 IST|MaxFragExtension.java:471|Ignore unavailable max_fragment_length extension javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:27.513 IST|SSLExtensions.java:256|Ignore, context unavailable extension: max_fragment_length javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:27.514 IST|AlpnExtension.java:363|Ignore unavailable extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:27.514 IST|SSLExtensions.java:256|Ignore, context unavailable extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:27.514 IST|EncryptedExtensions.java:137|Produced EncryptedExtensions message ( "EncryptedExtensions": [ "supported_groups (10)": { "versions": [secp256r1, secp384r1, secp521r1, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192] } ] ) javax.net.ssl|ALL|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:27.516 IST|SignatureScheme.java:365|Ignore inactive signature scheme: dsa_sha256 javax.net.ssl|ALL|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:27.516 IST|SignatureScheme.java:365|Ignore inactive signature scheme: dsa_sha1 javax.net.ssl|ALL|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:27.516 IST|SignatureScheme.java:365|Ignore inactive signature scheme: rsa_md5 javax.net.ssl|ALL|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:27.520 IST|SignatureScheme.java:365|Ignore inactive signature scheme: dsa_sha256 javax.net.ssl|ALL|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:27.521 IST|SignatureScheme.java:365|Ignore inactive signature scheme: dsa_sha1 javax.net.ssl|ALL|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:27.521 IST|SignatureScheme.java:365|Ignore inactive signature scheme: rsa_md5 javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:27.522 IST|CertificateRequest.java:882|Produced CertificateRequest message ( "CertificateRequest": { "certificate_request_context": "", "extensions": [ "signature_algorithms (13)": { "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1] }, "signature_algorithms_cert (50)": { "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1] } ] } ) javax.net.ssl|ALL|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:27.522 IST|X509Authentication.java:264|No X.509 cert selected for EC javax.net.ssl|WARNING|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:27.523 IST|CertificateMessage.java:1063|Unavailable authentication scheme: ecdsa_secp256r1_sha256 javax.net.ssl|ALL|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:27.523 IST|X509Authentication.java:264|No X.509 cert selected for EC javax.net.ssl|WARNING|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:27.523 IST|CertificateMessage.java:1063|Unavailable authentication scheme: ecdsa_secp384r1_sha384 javax.net.ssl|ALL|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:27.523 IST|X509Authentication.java:264|No X.509 cert selected for EC javax.net.ssl|WARNING|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:27.524 IST|CertificateMessage.java:1063|Unavailable authentication scheme: ecdsa_secp521r1_sha512 javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:27.524 IST|StatusResponseManager.java:763|Staping disabled or is a resumed session javax.net.ssl|ALL|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:27.524 IST|CertStatusExtension.java:1117|Stapling is disabled for this connection javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:27.524 IST|SSLExtensions.java:256|Ignore, context unavailable extension: status_request javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:27.526 IST|CertificateMessage.java:1002|Produced server Certificate message ( "Certificate": { "certificate_request_context": "", "certificate_list": [ { "certificate" : { "version" : "v3", "serial number" : "3B FD 86 4A 58 09 72 F6", "signature algorithm": "SHA512withRSA", "issuer" : "CN=localhost", "not before" : "2019-11-05 13:41:52.000 IST", "not after" : "2020-11-05 13:41:52.000 IST", "subject" : "CN=localhost", "subject public key" : "RSA", "extensions" : [ { ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:false PathLen:2147483647 ] }, { ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_Encipherment Data_Encipherment ] } ]} "extensions": { } }, ] } ) javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:27.570 IST|CertificateVerify.java:1113|Produced server CertificateVerify handshake message ( "CertificateVerify": { "signature algorithm": rsa_pss_rsae_sha256 "signature": { 0000: 35 B8 62 4B 76 70 B4 9A E4 9B C7 B5 76 4B BE F8 5.bKvp......vK.. 0010: 5A 51 43 94 FB A3 B7 00 1A 56 80 71 66 9E FB 4C ZQC......V.qf..L 0020: BA B2 53 F3 72 9A B4 AC 50 0A 5E 51 C7 51 B6 E3 ..S.r...P.^Q.Q.. 0030: CA 1A A7 C8 EE 68 16 B8 9C EC BC B2 B0 49 F4 8C .....h.......I.. 0040: 7A 7E 12 34 3F 14 9E B0 1A 9A 4B C3 75 B1 6D CC z..4?.....K.u.m. 0050: 21 55 69 DE 42 A7 90 29 FF 0E 7A 77 BF 38 62 E2 !Ui.B..)..zw.8b. 0060: 77 0B 18 55 1B F4 9A 4E 42 1C 5D C4 CD 23 49 E3 w..U...NB.]..#I. 0070: E8 0C 6A F1 DF A0 F3 1E 83 1A 0A 02 02 72 80 61 ..j..........r.a 0080: F1 A5 57 A3 AB 9D 32 C6 32 E8 B5 55 60 56 77 F9 ..W...2.2..U`Vw. 0090: 0A BB 71 E9 DA F0 C8 B4 A1 E6 39 9B EA B9 41 E4 ..q.......9...A. 00A0: A7 EF C1 6D AA 57 05 A4 3E D8 86 A7 22 5F 91 30 ...m.W..>..."_.0 00B0: 9C 64 4F 99 6B F5 DE 03 A5 9C 48 8D C7 68 EB AE .dO.k.....H..h.. 00C0: 9F A2 63 58 DC 10 92 1E 52 10 88 1C 50 30 AD FA ..cX....R...P0.. 00D0: 9D F8 06 24 1B AF 6B EA 91 C8 CC E1 35 8C C4 90 ...$..k.....5... 00E0: AD 36 E3 A5 10 A5 49 62 C0 6B AD 46 4E 61 6F 47 .6....Ib.k.FNaoG 00F0: 19 A0 DB 65 22 3A A9 CA 69 DA 93 F7 6C 43 9E EC ...e":..i...lC.. } } ) javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:27.572 IST|Finished.java:773|Produced server Finished handshake message ( "Finished": { "verify data": { 0000: 79 50 5A C3 12 A6 2F 07 AC 73 F0 60 25 78 B0 E0 yPZ.../..s.`%x.. 0010: C6 3B 80 AE 3D 42 05 E1 53 6F A6 D2 B0 FD E0 C3 .;..=B..So...... }'} ) javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-18 11:24:27.587 IST|SSLCipher.java:1978|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE countdown value = 137438953472 javax.net.ssl|DEBUG|2A|https-jsse-nio-8443-exec-10|2019-11-18 11:24:27.654 IST|ChangeCipherSpec.java:250|Consuming ChangeCipherSpec message javax.net.ssl|DEBUG|2A|https-jsse-nio-8443-exec-10|2019-11-18 11:24:27.660 IST|CertificateMessage.java:1158|Consuming client Certificate handshake message ( "Certificate": { "certificate_request_context": "", "certificate_list": [ { "certificate" : { "version" : "v3", "serial number" : "2C 8B E3 32 BC 02 24 C0", "signature algorithm": "SHA512withRSA", "issuer" : "CN=client", "not before" : "2019-11-05 13:43:21.000 IST", "not after" : "2020-11-05 13:43:21.000 IST", "subject" : "CN=client", "subject public key" : "RSA", "extensions" : [ { ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:false PathLen:2147483647 ] }, { ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_Encipherment Data_Encipherment ] } ]} "extensions": { } }, ] } ) javax.net.ssl|DEBUG|2A|https-jsse-nio-8443-exec-10|2019-11-18 11:24:27.666 IST|CertificateVerify.java:1165|Consuming CertificateVerify handshake message ( "CertificateVerify": { "signature algorithm": rsa_pss_rsae_sha256 "signature": { 0000: 4B 2B B0 05 F4 36 53 68 80 E1 98 D3 94 38 40 AB K+...6Sh.....8@. 0010: B4 88 D6 7E 7E A1 23 28 F5 31 11 40 7A 05 0B 17 ......#(.1.@z... 0020: A3 2F 74 05 A6 A7 A2 FA F7 A4 98 3B 40 68 52 06 ./t........;@hR. 0030: CE 08 FC 2D F9 64 2A 60 83 6B 48 E4 A2 DD AF C7 ...-.d*`.kH..... 0040: DA E5 CE 35 5E 2B 44 09 2C 60 E8 A0 5C E5 85 34 ...5^+D.,`..\..4 0050: C0 38 A1 AA FD 5A 90 AE D6 BF 8B 8E AE 51 09 EB .8...Z.......Q.. 0060: B8 E9 A3 87 82 6D 66 54 36 33 DB 46 DA 96 36 F2 .....mfT63.F..6. 0070: 01 9B 1A 35 44 9A B6 C2 7C 5C A0 CC 09 45 0C 83 ...5D....\...E.. 0080: 9E 68 87 D9 D3 5F F3 8B 5B 03 43 1F 1F D8 F3 06 .h..._..[.C..... 0090: 9D C8 B4 FF 69 66 69 6E AE D3 68 84 C0 24 52 6A ....ifin..h..$Rj 00A0: DD CB 66 9A 7E AC 67 69 19 5A 5C 3D 65 C2 3B F9 ..f...gi.Z\=e.;. 00B0: 3A 9D 66 7A A7 DD E9 70 6E 56 1E 47 16 14 61 2D :.fz...pnV.G..a- 00C0: 76 59 EB BB EB DF 2A 25 11 95 E8 BB FC 07 A3 90 vY....*%........ 00D0: A9 7A FC 38 0E DC 72 A4 A2 04 11 AA 07 29 2A 86 .z.8..r......)*. 00E0: 8A A2 D3 77 03 C7 F3 C5 92 31 64 CF 27 B1 8A 84 ...w.....1d.'... 00F0: 47 41 55 DF 26 15 77 0B F8 75 99 42 4F AD A7 FD GAU.&.w..u.BO... } } ) javax.net.ssl|DEBUG|2A|https-jsse-nio-8443-exec-10|2019-11-18 11:24:27.669 IST|Finished.java:1044|Consuming client Finished handshake message ( "Finished": { "verify data": { 0000: 1E D7 F7 B8 C9 9E FE BF 21 83 59 89 76 B5 F3 3E ........!.Y.v..> 0010: 07 56 C3 40 09 F6 F6 B1 03 7F FE 1D 22 91 C1 AA .V.@........"... }'} ) javax.net.ssl|DEBUG|2A|https-jsse-nio-8443-exec-10|2019-11-18 11:24:27.670 IST|SSLCipher.java:1824|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE countdown value = 137438953472 javax.net.ssl|DEBUG|2A|https-jsse-nio-8443-exec-10|2019-11-18 11:24:27.671 IST|Finished.java:1148|Sending new session ticket 18-Nov-2019 11:24:27.672 FINE [https-jsse-nio-8443-exec-10] org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun Error during SSL handshake java.io.IOException: NOT_HANDSHAKING during handshake at org.apache.tomcat.util.net.SecureNioChannel.handshake(SecureNioChannel.java:193) at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1556) at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49) at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128) at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628) at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61) at java.base/java.lang.Thread.run(Thread.java:834) 18-Nov-2019 11:24:27.674 FINE [https-jsse-nio-8443-exec-10] org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper.doClose Calling [org.apache.tomcat.util.net.NioEndpoint@42b2b293].closeSocket([org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper@414cdd81:org.apache.tomcat.util.net.SecureNioChannel@102a92e:java.nio.channels.SocketChannel[connected local=/0:0:0:0:0:0:0:1:8443 remote=/0:0:0:0:0:0:0:1:62364]]) java.lang.Exception at org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper.doClose(NioEndpoint.java:1163) at org.apache.tomcat.util.net.SocketWrapperBase.close(SocketWrapperBase.java:402) at org.apache.tomcat.util.net.NioEndpoint$Poller.cancelledKey(NioEndpoint.java:665) at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1586) at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49) at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128) at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628) at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61) at java.base/java.lang.Thread.run(Thread.java:834) javax.net.ssl|ALL|2A|https-jsse-nio-8443-exec-10|2019-11-18 11:24:27.674 IST|SSLEngineImpl.java:756|Closing outbound of SSLEngine javax.net.ssl|WARNING|2A|https-jsse-nio-8443-exec-10|2019-11-18 11:24:27.675 IST|SSLEngineOutputRecord.java:168|outbound has closed, ignore outbound application data 18-Nov-2019 11:24:27.697 FINE [https-jsse-nio-8443-exec-4] org.apache.tomcat.util.net.SecureNioChannel.processSNI The SNI host name extracted for connection [java.nio.channels.SocketChannel[connected local=/0:0:0:0:0:0:0:1:8443 remote=/0:0:0:0:0:0:0:1:62365]] was [localhost] javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:27.700 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 for TLS10 javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:27.700 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 for TLS10 javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:27.700 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLS10 javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:27.700 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLS10 javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:27.701 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 for TLS13 javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:27.701 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 for TLS13 javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:27.701 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLS13 javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:27.701 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLS13 javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:27.702 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA for TLS13 javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:27.702 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA for TLS13 javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:27.702 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 for TLS11 javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:27.703 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 for TLS11 javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:27.703 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLS11 javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:27.703 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLS11 javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:27.708 IST|SSLExtensions.java:131|Ignore unknown or unsupported extension ( "unknown extension (28)": { 0000: 40 01 @. } ) javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:27.710 IST|SSLExtensions.java:131|Ignore unknown or unsupported extension ( "unknown extension (21)": { 0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0090: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ............... } ) javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:27.721 IST|ClientHello.java:806|Consuming ClientHello handshake message ( "ClientHello": { "client version" : "TLSv1.2", "random" : "57 82 07 04 DD B5 72 00 88 1E 7F B3 E0 10 3E FE 2B B4 51 84 80 B3 CE 99 99 07 C8 80 CD 35 1A 2D", "session id" : "B1 33 3A 3E 1B D0 42 42 CA E8 67 1A FA 0A 48 46 71 25 76 FA 7A 2D FB 94 2D 34 FC 7C 49 7E 98 C5", "cipher suites" : "[TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_AES_256_GCM_SHA384(0x1302), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), UNKNOWN-CIPHER-SUITE(0xCCA9)(0xCCA9), UNKNOWN-CIPHER-SUITE(0xCCA8)(0xCCA8), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA(0xC00A), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA(0xC009), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA(0xC013), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA(0xC014), TLS_DHE_RSA_WITH_AES_128_CBC_SHA(0x0033), TLS_DHE_RSA_WITH_AES_256_CBC_SHA(0x0039), TLS_RSA_WITH_AES_128_CBC_SHA(0x002F), TLS_RSA_WITH_AES_256_CBC_SHA(0x0035), SSL_RSA_WITH_3DES_EDE_CBC_SHA(0x000A)]", "compression methods" : "00", "extensions" : [ "server_name (0)": { type=host_name (0), value=localhost }, "extended_master_secret (23)": { }, "renegotiation_info (65,281)": { "renegotiated connection": [] }, "supported_groups (10)": { "versions": [x25519, secp256r1, secp384r1, secp521r1, ffdhe2048, ffdhe3072] }, "ec_point_formats (11)": { "formats": [uncompressed] }, "application_layer_protocol_negotiation (16)": { [h2, http/1.1] }, "status_request (5)": { "certificate status type": ocsp "OCSP status request": { "responder_id": "request extensions": { } } }, "key_share (51)": { "client_shares": [ { "named group": x25519 "key_exchange": { 0000: 6F 8A AA 44 EF D5 04 EC 07 91 D6 48 F1 BC F7 00 o..D.......H.... 0010: A7 50 C8 47 42 CC 12 F1 11 B5 7C 63 15 D9 78 01 .P.GB......c..x. } }, { "named group": secp256r1 "key_exchange": { 0000: 04 B4 AD E3 B9 55 9F 88 E7 83 50 49 A3 9C F5 C5 .....U....PI.... 0010: 05 E0 18 69 C3 4A 45 C0 60 BB 55 DB F1 3D 04 37 ...i.JE.`.U..=.7 0020: 1B 18 8D 29 9C 01 D3 04 06 FB 84 6F 99 5A 8F A0 ...).......o.Z.. 0030: 19 0A 1E DE 82 88 64 58 20 FC 66 EC E1 B0 51 4F ......dX .f...QO 0040: 7A } }, ] }, "supported_versions (43)": { "versions": [TLSv1.3, TLSv1.2, TLSv1.1, TLSv1] }, "signature_algorithms (13)": { "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1] }, "unknown extension (28)": { 0000: 40 01 @. }, "unknown extension (21)": { 0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0090: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ............... } ] } ) javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:27.722 IST|SSLExtensions.java:188|Consumed extension: supported_versions javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:27.722 IST|ClientHello.java:836|Negotiated protocol version: TLSv1.3 javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:27.722 IST|PskKeyExchangeModesExtension.java:294|abort session resumption, no supported psk_dhe_ke PSK key exchange mode javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:27.723 IST|PreSharedKeyExtension.java:809|Handling pre_shared_key absence. javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:27.723 IST|ServerNameExtension.java:328|no server name matchers, ignore server name indication javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:27.724 IST|SSLExtensions.java:188|Consumed extension: server_name javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:27.724 IST|SSLExtensions.java:169|Ignore unavailable extension: max_fragment_length javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:27.724 IST|SSLExtensions.java:188|Consumed extension: status_request javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:27.724 IST|SSLExtensions.java:188|Consumed extension: supported_groups javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:27.725 IST|SSLExtensions.java:159|Ignore unsupported extension: ec_point_formats javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:27.725 IST|SSLExtensions.java:188|Consumed extension: signature_algorithms javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:27.725 IST|SSLExtensions.java:169|Ignore unavailable extension: signature_algorithms_cert javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:27.725 IST|AlpnExtension.java:274|Ignore server unenabled extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:27.726 IST|SSLExtensions.java:188|Consumed extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:27.726 IST|SSLExtensions.java:159|Ignore unsupported extension: status_request_v2 javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:27.726 IST|SSLExtensions.java:159|Ignore unsupported extension: extended_master_secret javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:27.726 IST|SSLExtensions.java:169|Ignore unavailable extension: cookie javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:27.727 IST|KeyShareExtension.java:350|Ignore unsupported named group: x25519 javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:27.727 IST|SSLExtensions.java:188|Consumed extension: key_share javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:27.728 IST|SSLExtensions.java:159|Ignore unsupported extension: renegotiation_info javax.net.ssl|ALL|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:27.729 IST|SignatureScheme.java:360|Ignore disabled signature scheme: rsa_md5 javax.net.ssl|WARNING|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:27.730 IST|SSLExtensions.java:211|Ignore impact of unsupported extension: server_name javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:27.730 IST|SSLExtensions.java:203|Ignore unavailable extension: max_fragment_length javax.net.ssl|WARNING|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:27.730 IST|SSLExtensions.java:211|Ignore impact of unsupported extension: status_request javax.net.ssl|WARNING|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:27.731 IST|SSLExtensions.java:211|Ignore impact of unsupported extension: supported_groups javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:27.731 IST|SSLExtensions.java:220|Populated with extension: signature_algorithms javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:27.732 IST|SSLExtensions.java:203|Ignore unavailable extension: signature_algorithms_cert javax.net.ssl|WARNING|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:27.732 IST|SSLExtensions.java:211|Ignore impact of unsupported extension: application_layer_protocol_negotiation javax.net.ssl|WARNING|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:27.732 IST|SSLExtensions.java:211|Ignore impact of unsupported extension: supported_versions javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:27.732 IST|SSLExtensions.java:203|Ignore unavailable extension: cookie javax.net.ssl|WARNING|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:27.733 IST|SSLExtensions.java:211|Ignore impact of unsupported extension: key_share javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:27.733 IST|SSLExtensions.java:203|Ignore unavailable extension: pre_shared_key javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:27.733 IST|ServerHello.java:729|use cipher suite TLS_AES_128_GCM_SHA256 javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:27.743 IST|SSLExtensions.java:256|Ignore, context unavailable extension: pre_shared_key javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:27.745 IST|ServerHello.java:580|Produced ServerHello handshake message ( "ServerHello": { "server version" : "TLSv1.2", "random" : "32 13 33 92 E7 C2 75 17 74 53 AB E4 AA 2B B7 63 BF 60 F8 05 57 C3 9E F3 1F 6D 74 2B 0A 7A 38 BC", "session id" : "B1 33 3A 3E 1B D0 42 42 CA E8 67 1A FA 0A 48 46 71 25 76 FA 7A 2D FB 94 2D 34 FC 7C 49 7E 98 C5", "cipher suite" : "TLS_AES_128_GCM_SHA256(0x1301)", "compression methods" : "00", "extensions" : [ "supported_versions (43)": { "selected version": [TLSv1.3] }, "key_share (51)": { "server_share": { "named group": secp256r1 "key_exchange": { 0000: 04 E9 3F B4 56 D7 BE F6 C8 83 1E 66 09 5E 3B D4 ..?.V......f.^;. 0010: 32 C9 78 26 AC 0E E7 BB EA 0F 94 AD 8E C4 10 0F 2.x&............ 0020: CD 27 72 12 10 18 E7 4B 56 66 FB D1 0E D3 2C 36 .'r....KVf....,6 0030: EB E0 1D 1D 6F 46 B7 4C 2F E4 EE FE 96 72 47 CF ....oF.L/....rG. 0040: 5E } }, } ] } ) javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:27.759 IST|SSLCipher.java:1824|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE countdown value = 137438953472 javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:27.760 IST|SSLCipher.java:1978|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE countdown value = 137438953472 javax.net.ssl|ALL|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:27.761 IST|ServerNameExtension.java:538|No expected server name indication response javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:27.761 IST|SSLExtensions.java:256|Ignore, context unavailable extension: server_name javax.net.ssl|ALL|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:27.761 IST|MaxFragExtension.java:471|Ignore unavailable max_fragment_length extension javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:27.761 IST|SSLExtensions.java:256|Ignore, context unavailable extension: max_fragment_length javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:27.762 IST|AlpnExtension.java:363|Ignore unavailable extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:27.763 IST|SSLExtensions.java:256|Ignore, context unavailable extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:27.763 IST|EncryptedExtensions.java:137|Produced EncryptedExtensions message ( "EncryptedExtensions": [ "supported_groups (10)": { "versions": [secp256r1, secp384r1, secp521r1, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192] } ] ) javax.net.ssl|ALL|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:27.764 IST|SignatureScheme.java:365|Ignore inactive signature scheme: dsa_sha256 javax.net.ssl|ALL|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:27.765 IST|SignatureScheme.java:365|Ignore inactive signature scheme: dsa_sha1 javax.net.ssl|ALL|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:27.765 IST|SignatureScheme.java:365|Ignore inactive signature scheme: rsa_md5 javax.net.ssl|ALL|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:27.766 IST|SignatureScheme.java:365|Ignore inactive signature scheme: dsa_sha256 javax.net.ssl|ALL|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:27.766 IST|SignatureScheme.java:365|Ignore inactive signature scheme: dsa_sha1 javax.net.ssl|ALL|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:27.766 IST|SignatureScheme.java:365|Ignore inactive signature scheme: rsa_md5 javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:27.768 IST|CertificateRequest.java:882|Produced CertificateRequest message ( "CertificateRequest": { "certificate_request_context": "", "extensions": [ "signature_algorithms (13)": { "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1] }, "signature_algorithms_cert (50)": { "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1] } ] } ) javax.net.ssl|ALL|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:27.769 IST|X509Authentication.java:264|No X.509 cert selected for EC javax.net.ssl|WARNING|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:27.769 IST|CertificateMessage.java:1063|Unavailable authentication scheme: ecdsa_secp256r1_sha256 javax.net.ssl|ALL|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:27.770 IST|X509Authentication.java:264|No X.509 cert selected for EC javax.net.ssl|WARNING|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:27.770 IST|CertificateMessage.java:1063|Unavailable authentication scheme: ecdsa_secp384r1_sha384 javax.net.ssl|ALL|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:27.770 IST|X509Authentication.java:264|No X.509 cert selected for EC javax.net.ssl|WARNING|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:27.770 IST|CertificateMessage.java:1063|Unavailable authentication scheme: ecdsa_secp521r1_sha512 javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:27.771 IST|StatusResponseManager.java:763|Staping disabled or is a resumed session javax.net.ssl|ALL|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:27.771 IST|CertStatusExtension.java:1117|Stapling is disabled for this connection javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:27.771 IST|SSLExtensions.java:256|Ignore, context unavailable extension: status_request javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:27.773 IST|CertificateMessage.java:1002|Produced server Certificate message ( "Certificate": { "certificate_request_context": "", "certificate_list": [ { "certificate" : { "version" : "v3", "serial number" : "3B FD 86 4A 58 09 72 F6", "signature algorithm": "SHA512withRSA", "issuer" : "CN=localhost", "not before" : "2019-11-05 13:41:52.000 IST", "not after" : "2020-11-05 13:41:52.000 IST", "subject" : "CN=localhost", "subject public key" : "RSA", "extensions" : [ { ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:false PathLen:2147483647 ] }, { ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_Encipherment Data_Encipherment ] } ]} "extensions": { } }, ] } ) javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:27.812 IST|CertificateVerify.java:1113|Produced server CertificateVerify handshake message ( "CertificateVerify": { "signature algorithm": rsa_pss_rsae_sha256 "signature": { 0000: 5D 9C F1 AA 3A EA A1 84 28 6E 99 2C 73 49 9D 35 ]...:...(n.,sI.5 0010: 92 1C 47 C1 85 07 36 45 82 84 23 31 50 FA 26 6F ..G...6E..#1P.&o 0020: 18 F2 3C C0 E8 F7 04 07 69 ED 2D 8D 4C 92 C9 01 ..<.....i.-.L... 0030: F7 ED 23 FD DE 49 2C BB D0 FB 6F 50 07 5F 25 70 ..#..I,...oP._%p 0040: 16 C9 4C F7 C2 FC 10 BA B8 03 F1 2A EC 6E 54 99 ..L........*.nT. 0050: EE 3A 8A B5 AB F1 7B 02 38 CA 9F 8A 0C DE 01 A2 .:......8....... 0060: 65 32 78 4B EC 78 A0 2A 5A D0 B3 2C 4D 10 98 4A e2xK.x.*Z..,M..J 0070: 16 CF 40 FF 7D 6F 54 F8 6D AD 60 C4 09 AA 99 B6 ..@..oT.m.`..... 0080: 95 5B F5 FC 16 F5 D6 32 03 AA F6 93 3D BA EC E1 .[.....2....=... 0090: 2E 6B 55 AA DE B5 F6 FD 6B 12 6B E8 5D AF 53 1C .kU.....k.k.].S. 00A0: 0B 21 B2 5F 8C B6 AE D1 EC F1 87 23 F5 6B 99 0C .!._.......#.k.. 00B0: CA 36 9C 2E 4C 8F 3E 56 51 F3 3B 4D 68 96 A1 7E .6..L.>VQ.;Mh... 00C0: 9B 20 64 22 09 75 CA 43 DA 62 D3 2E 86 57 D5 AA . d".u.C.b...W.. 00D0: 05 73 A0 74 59 BC FC 7C C7 33 72 A3 D6 CB 36 79 .s.tY....3r...6y 00E0: D3 2F 23 0C 0D 10 78 7C 63 17 E4 D5 CF D2 AC 87 ./#...x.c....... 00F0: BF 18 CC 0E 25 35 13 C6 00 79 ED 7D 93 0F 64 D1 ....%5...y....d. } } ) javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:27.813 IST|Finished.java:773|Produced server Finished handshake message ( "Finished": { "verify data": { 0000: 54 87 62 73 82 F8 60 65 7F 78 7B BF D6 85 D8 CC T.bs..`e.x...... 0010: 8D 4D 87 35 EB EC 9F 81 5C E0 C0 3D A3 BF A5 41 .M.5....\..=...A }'} ) javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-18 11:24:27.816 IST|SSLCipher.java:1978|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE countdown value = 137438953472 javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 11:24:27.986 IST|ChangeCipherSpec.java:250|Consuming ChangeCipherSpec message javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 11:24:27.990 IST|CertificateMessage.java:1158|Consuming client Certificate handshake message ( "Certificate": { "certificate_request_context": "", "certificate_list": [ { "certificate" : { "version" : "v3", "serial number" : "2C 8B E3 32 BC 02 24 C0", "signature algorithm": "SHA512withRSA", "issuer" : "CN=client", "not before" : "2019-11-05 13:43:21.000 IST", "not after" : "2020-11-05 13:43:21.000 IST", "subject" : "CN=client", "subject public key" : "RSA", "extensions" : [ { ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:false PathLen:2147483647 ] }, { ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_Encipherment Data_Encipherment ] } ]} "extensions": { } }, ] } ) javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 11:24:27.997 IST|CertificateVerify.java:1165|Consuming CertificateVerify handshake message ( "CertificateVerify": { "signature algorithm": rsa_pss_rsae_sha256 "signature": { 0000: 0A 04 21 2A D0 CD BA 25 B9 EB AA C1 8A 58 89 A5 ..!*...%.....X.. 0010: BF 66 0B 45 47 78 60 A1 AB 1A 6B 6D E7 1D C1 DC .f.EGx`...km.... 0020: 18 85 8E 67 EC AD 53 C3 4F D4 84 C9 E1 73 74 A9 ...g..S.O....st. 0030: 75 4C DA B9 FD 50 43 B4 A4 D6 49 D8 82 A6 2A 49 uL...PC...I...*I 0040: 36 47 D1 66 71 B9 A4 FC F4 3F 0B 46 74 18 F6 E5 6G.fq....?.Ft... 0050: DC 68 50 07 F1 1E A6 C2 66 21 36 64 D5 02 86 1B .hP.....f!6d.... 0060: 54 AA C4 AD 82 E8 07 00 0B 54 0B CB 5C C9 83 A0 T........T..\... 0070: 78 F3 C2 B7 D2 79 CE 8C 95 97 85 E0 1D 3F 26 8F x....y.......?&. 0080: 61 A3 BA 50 9C C1 D9 30 96 5D 3B E8 04 79 77 FB a..P...0.];..yw. 0090: 78 7F 16 3E 40 2A 95 62 63 03 61 CB C8 48 1D 25 x..>@*.bc.a..H.% 00A0: 14 B9 3D 74 8A 30 FA EA 32 F7 83 13 8F 69 8C EE ..=t.0..2....i.. 00B0: 7E 6B B0 0F EE 59 4E DB 1D 04 4D B5 D1 3E 83 82 .k...YN...M..>.. 00C0: E6 BE B2 31 AF 06 F8 AA 0D BD 16 CC B3 57 03 32 ...1.........W.2 00D0: B6 54 46 78 D3 03 91 FA 5D FE 19 D2 71 00 C1 F1 .TFx....]...q... 00E0: B1 DA 27 1B 7A 03 AF 68 52 E6 EB 98 95 AC A5 EB ..'.z..hR....... 00F0: A3 EB B3 AE D1 52 58 BC 16 D5 C7 2E 11 39 47 59 .....RX......9GY } } ) javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 11:24:27.999 IST|Finished.java:1044|Consuming client Finished handshake message ( "Finished": { "verify data": { 0000: 00 63 69 74 3D 17 15 D2 A5 B8 75 2B 66 78 3D 60 .cit=.....u+fx=` 0010: E2 74 45 DD 29 5D 44 32 5F 5F 88 4D 73 CB 95 F1 .tE.)]D2__.Ms... }'} ) javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 11:24:28.000 IST|SSLCipher.java:1824|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE countdown value = 137438953472 javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-18 11:24:28.001 IST|Finished.java:1148|Sending new session ticket 18-Nov-2019 11:24:28.001 FINE [https-jsse-nio-8443-exec-1] org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun Error during SSL handshake java.io.IOException: NOT_HANDSHAKING during handshake at org.apache.tomcat.util.net.SecureNioChannel.handshake(SecureNioChannel.java:193) at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1556) at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49) at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128) at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628) at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61) at java.base/java.lang.Thread.run(Thread.java:834) 18-Nov-2019 11:24:28.003 FINE [https-jsse-nio-8443-exec-1] org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper.doClose Calling [org.apache.tomcat.util.net.NioEndpoint@42b2b293].closeSocket([org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper@34040848:org.apache.tomcat.util.net.SecureNioChannel@102a92e:java.nio.channels.SocketChannel[connected local=/0:0:0:0:0:0:0:1:8443 remote=/0:0:0:0:0:0:0:1:62365]]) java.lang.Exception at org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper.doClose(NioEndpoint.java:1163) at org.apache.tomcat.util.net.SocketWrapperBase.close(SocketWrapperBase.java:402) at org.apache.tomcat.util.net.NioEndpoint$Poller.cancelledKey(NioEndpoint.java:665) at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1586) at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49) at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128) at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628) at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61) at java.base/java.lang.Thread.run(Thread.java:834) javax.net.ssl|ALL|21|https-jsse-nio-8443-exec-1|2019-11-18 11:24:28.003 IST|SSLEngineImpl.java:756|Closing outbound of SSLEngine javax.net.ssl|WARNING|21|https-jsse-nio-8443-exec-1|2019-11-18 11:24:28.004 IST|SSLEngineOutputRecord.java:168|outbound has closed, ignore outbound application data 18-Nov-2019 11:24:28.062 FINE [https-jsse-nio-8443-exec-3] org.apache.tomcat.util.net.SecureNioChannel.processSNI The SNI host name extracted for connection [java.nio.channels.SocketChannel[connected local=/0:0:0:0:0:0:0:1:8443 remote=/0:0:0:0:0:0:0:1:62368]] was [localhost] javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:28.065 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 for TLS10 javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:28.066 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 for TLS10 javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:28.066 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLS10 javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:28.066 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLS10 javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:28.067 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 for TLS13 javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:28.067 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 for TLS13 javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:28.067 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLS13 javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:28.068 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLS13 javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:28.068 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA for TLS13 javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:28.068 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA for TLS13 javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:28.069 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 for TLS11 javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:28.069 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 for TLS11 javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:28.125 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLS11 javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:28.126 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLS11 javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:28.130 IST|SSLExtensions.java:131|Ignore unknown or unsupported extension ( "unknown extension (28)": { 0000: 40 01 @. } ) javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:28.131 IST|SSLExtensions.java:131|Ignore unknown or unsupported extension ( "unknown extension (21)": { 0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0090: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ............... } ) javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:28.137 IST|ClientHello.java:806|Consuming ClientHello handshake message ( "ClientHello": { "client version" : "TLSv1.2", "random" : "E3 F2 EC BB CF FB FF 35 5A E8 07 6D B2 C2 66 F6 F9 5E 85 B3 47 38 6B CB D4 56 C4 32 04 DD B8 42", "session id" : "3D 2F 1B D6 A5 A0 9F D4 2E 16 1D 8A 3C FE 64 5A 53 B1 36 E9 30 68 D3 9E 72 C8 8C BE C2 9F 57 99", "cipher suites" : "[TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_AES_256_GCM_SHA384(0x1302), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), UNKNOWN-CIPHER-SUITE(0xCCA9)(0xCCA9), UNKNOWN-CIPHER-SUITE(0xCCA8)(0xCCA8), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA(0xC00A), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA(0xC009), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA(0xC013), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA(0xC014), TLS_DHE_RSA_WITH_AES_128_CBC_SHA(0x0033), TLS_DHE_RSA_WITH_AES_256_CBC_SHA(0x0039), TLS_RSA_WITH_AES_128_CBC_SHA(0x002F), TLS_RSA_WITH_AES_256_CBC_SHA(0x0035), SSL_RSA_WITH_3DES_EDE_CBC_SHA(0x000A)]", "compression methods" : "00", "extensions" : [ "server_name (0)": { type=host_name (0), value=localhost }, "extended_master_secret (23)": { }, "renegotiation_info (65,281)": { "renegotiated connection": [] }, "supported_groups (10)": { "versions": [x25519, secp256r1, secp384r1, secp521r1, ffdhe2048, ffdhe3072] }, "ec_point_formats (11)": { "formats": [uncompressed] }, "application_layer_protocol_negotiation (16)": { [h2, http/1.1] }, "status_request (5)": { "certificate status type": ocsp "OCSP status request": { "responder_id": "request extensions": { } } }, "key_share (51)": { "client_shares": [ { "named group": x25519 "key_exchange": { 0000: A5 5F E7 B0 E5 D8 22 40 85 0D AA A0 73 AC B2 0D ._...."@....s... 0010: C7 61 71 66 2A D7 9D 98 A7 0E 05 8D 79 A3 35 7A .aqf*.......y.5z } }, { "named group": secp256r1 "key_exchange": { 0000: 04 22 28 83 FD CD 38 C3 A9 E4 C5 EE 69 07 BF 49 ."(...8.....i..I 0010: C0 0E 57 68 12 69 85 EE 58 E3 A8 79 0D DE C0 26 ..Wh.i..X..y...& 0020: AE BE F8 7F 85 37 B7 CD 2D F8 85 4B 9C D1 60 5B .....7..-..K..`[ 0030: F9 E4 ED 8D FD EB 28 29 24 10 E0 4F 66 3A DA 27 ......()$..Of:.' 0040: 54 } }, ] }, "supported_versions (43)": { "versions": [TLSv1.3, TLSv1.2, TLSv1.1, TLSv1] }, "signature_algorithms (13)": { "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1] }, "unknown extension (28)": { 0000: 40 01 @. }, "unknown extension (21)": { 0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0090: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ............... } ] } ) javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:28.138 IST|SSLExtensions.java:188|Consumed extension: supported_versions javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:28.138 IST|ClientHello.java:836|Negotiated protocol version: TLSv1.3 javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:28.138 IST|PskKeyExchangeModesExtension.java:294|abort session resumption, no supported psk_dhe_ke PSK key exchange mode javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:28.138 IST|PreSharedKeyExtension.java:809|Handling pre_shared_key absence. javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:28.139 IST|ServerNameExtension.java:328|no server name matchers, ignore server name indication javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:28.139 IST|SSLExtensions.java:188|Consumed extension: server_name javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:28.140 IST|SSLExtensions.java:169|Ignore unavailable extension: max_fragment_length javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:28.140 IST|SSLExtensions.java:188|Consumed extension: status_request javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:28.141 IST|SSLExtensions.java:188|Consumed extension: supported_groups javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:28.141 IST|SSLExtensions.java:159|Ignore unsupported extension: ec_point_formats javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:28.141 IST|SSLExtensions.java:188|Consumed extension: signature_algorithms javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:28.142 IST|SSLExtensions.java:169|Ignore unavailable extension: signature_algorithms_cert javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:28.142 IST|AlpnExtension.java:274|Ignore server unenabled extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:28.142 IST|SSLExtensions.java:188|Consumed extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:28.142 IST|SSLExtensions.java:159|Ignore unsupported extension: status_request_v2 javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:28.150 IST|SSLExtensions.java:159|Ignore unsupported extension: extended_master_secret javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:28.151 IST|SSLExtensions.java:169|Ignore unavailable extension: cookie javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:28.151 IST|KeyShareExtension.java:350|Ignore unsupported named group: x25519 javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:28.152 IST|SSLExtensions.java:188|Consumed extension: key_share javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:28.152 IST|SSLExtensions.java:159|Ignore unsupported extension: renegotiation_info javax.net.ssl|ALL|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:28.153 IST|SignatureScheme.java:360|Ignore disabled signature scheme: rsa_md5 javax.net.ssl|WARNING|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:28.154 IST|SSLExtensions.java:211|Ignore impact of unsupported extension: server_name javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:28.155 IST|SSLExtensions.java:203|Ignore unavailable extension: max_fragment_length javax.net.ssl|WARNING|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:28.155 IST|SSLExtensions.java:211|Ignore impact of unsupported extension: status_request javax.net.ssl|WARNING|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:28.155 IST|SSLExtensions.java:211|Ignore impact of unsupported extension: supported_groups javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:28.156 IST|SSLExtensions.java:220|Populated with extension: signature_algorithms javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:28.157 IST|SSLExtensions.java:203|Ignore unavailable extension: signature_algorithms_cert javax.net.ssl|WARNING|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:28.157 IST|SSLExtensions.java:211|Ignore impact of unsupported extension: application_layer_protocol_negotiation javax.net.ssl|WARNING|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:28.157 IST|SSLExtensions.java:211|Ignore impact of unsupported extension: supported_versions javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:28.157 IST|SSLExtensions.java:203|Ignore unavailable extension: cookie javax.net.ssl|WARNING|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:28.158 IST|SSLExtensions.java:211|Ignore impact of unsupported extension: key_share javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:28.158 IST|SSLExtensions.java:203|Ignore unavailable extension: pre_shared_key javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:28.158 IST|ServerHello.java:729|use cipher suite TLS_AES_128_GCM_SHA256 javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:28.166 IST|SSLExtensions.java:256|Ignore, context unavailable extension: pre_shared_key javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:28.168 IST|ServerHello.java:580|Produced ServerHello handshake message ( "ServerHello": { "server version" : "TLSv1.2", "random" : "E6 8B 6D 92 3C 17 DC 2D F6 92 BC 5E 8D EE DA 3B BE 50 C2 11 34 CF 2C 42 85 60 26 34 84 1B 6A 9C", "session id" : "3D 2F 1B D6 A5 A0 9F D4 2E 16 1D 8A 3C FE 64 5A 53 B1 36 E9 30 68 D3 9E 72 C8 8C BE C2 9F 57 99", "cipher suite" : "TLS_AES_128_GCM_SHA256(0x1301)", "compression methods" : "00", "extensions" : [ "supported_versions (43)": { "selected version": [TLSv1.3] }, "key_share (51)": { "server_share": { "named group": secp256r1 "key_exchange": { 0000: 04 6E 67 D2 54 22 1E 2E 08 67 B9 5F DF 21 08 CD .ng.T"...g._.!.. 0010: C7 4F E3 EE 2D E7 CA B1 48 E3 51 9E 39 D8 AE AC .O..-...H.Q.9... 0020: 3C 30 2D CB 76 96 D7 23 74 0D F9 C5 7A 62 CF A5 <0-.v..#t...zb.. 0030: E4 10 E4 6C BE 33 5E E1 C3 78 FA 86 9B C6 F5 F1 ...l.3^..x...... 0040: 9E } }, } ] } ) javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:28.185 IST|SSLCipher.java:1824|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE countdown value = 137438953472 javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:28.186 IST|SSLCipher.java:1978|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE countdown value = 137438953472 javax.net.ssl|ALL|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:28.186 IST|ServerNameExtension.java:538|No expected server name indication response javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:28.186 IST|SSLExtensions.java:256|Ignore, context unavailable extension: server_name javax.net.ssl|ALL|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:28.186 IST|MaxFragExtension.java:471|Ignore unavailable max_fragment_length extension javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:28.187 IST|SSLExtensions.java:256|Ignore, context unavailable extension: max_fragment_length javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:28.188 IST|AlpnExtension.java:363|Ignore unavailable extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:28.188 IST|SSLExtensions.java:256|Ignore, context unavailable extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:28.188 IST|EncryptedExtensions.java:137|Produced EncryptedExtensions message ( "EncryptedExtensions": [ "supported_groups (10)": { "versions": [secp256r1, secp384r1, secp521r1, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192] } ] ) javax.net.ssl|ALL|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:28.189 IST|SignatureScheme.java:365|Ignore inactive signature scheme: dsa_sha256 javax.net.ssl|ALL|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:28.190 IST|SignatureScheme.java:365|Ignore inactive signature scheme: dsa_sha1 javax.net.ssl|ALL|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:28.190 IST|SignatureScheme.java:365|Ignore inactive signature scheme: rsa_md5 javax.net.ssl|ALL|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:28.191 IST|SignatureScheme.java:365|Ignore inactive signature scheme: dsa_sha256 javax.net.ssl|ALL|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:28.191 IST|SignatureScheme.java:365|Ignore inactive signature scheme: dsa_sha1 javax.net.ssl|ALL|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:28.192 IST|SignatureScheme.java:365|Ignore inactive signature scheme: rsa_md5 javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:28.193 IST|CertificateRequest.java:882|Produced CertificateRequest message ( "CertificateRequest": { "certificate_request_context": "", "extensions": [ "signature_algorithms (13)": { "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1] }, "signature_algorithms_cert (50)": { "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1] } ] } ) javax.net.ssl|ALL|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:28.193 IST|X509Authentication.java:264|No X.509 cert selected for EC javax.net.ssl|WARNING|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:28.193 IST|CertificateMessage.java:1063|Unavailable authentication scheme: ecdsa_secp256r1_sha256 javax.net.ssl|ALL|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:28.194 IST|X509Authentication.java:264|No X.509 cert selected for EC javax.net.ssl|WARNING|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:28.194 IST|CertificateMessage.java:1063|Unavailable authentication scheme: ecdsa_secp384r1_sha384 javax.net.ssl|ALL|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:28.194 IST|X509Authentication.java:264|No X.509 cert selected for EC javax.net.ssl|WARNING|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:28.194 IST|CertificateMessage.java:1063|Unavailable authentication scheme: ecdsa_secp521r1_sha512 javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:28.195 IST|StatusResponseManager.java:763|Staping disabled or is a resumed session javax.net.ssl|ALL|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:28.195 IST|CertStatusExtension.java:1117|Stapling is disabled for this connection javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:28.195 IST|SSLExtensions.java:256|Ignore, context unavailable extension: status_request javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:28.197 IST|CertificateMessage.java:1002|Produced server Certificate message ( "Certificate": { "certificate_request_context": "", "certificate_list": [ { "certificate" : { "version" : "v3", "serial number" : "3B FD 86 4A 58 09 72 F6", "signature algorithm": "SHA512withRSA", "issuer" : "CN=localhost", "not before" : "2019-11-05 13:41:52.000 IST", "not after" : "2020-11-05 13:41:52.000 IST", "subject" : "CN=localhost", "subject public key" : "RSA", "extensions" : [ { ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:false PathLen:2147483647 ] }, { ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_Encipherment Data_Encipherment ] } ]} "extensions": { } }, ] } ) javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:28.228 IST|CertificateVerify.java:1113|Produced server CertificateVerify handshake message ( "CertificateVerify": { "signature algorithm": rsa_pss_rsae_sha256 "signature": { 0000: 4E 63 2D 99 8E F6 94 89 F5 56 FA DA E0 8F 08 8A Nc-......V...... 0010: 21 3D FD B5 91 BC E3 26 E1 37 B9 F2 34 F8 B4 DF !=.....&.7..4... 0020: 44 EB 20 99 FC 6E 07 64 CD 11 5C 92 B4 B4 0B D2 D. ..n.d..\..... 0030: 5E 7B 1D 38 26 D5 6F 2B DC 5C 95 64 4F FA B4 F5 ^..8&.o+.\.dO... 0040: C3 C3 56 26 65 F5 23 A0 53 61 89 B6 9A D4 D5 D6 ..V&e.#.Sa...... 0050: 17 5C BD A1 01 70 7B AB 33 94 0D 58 72 0C 04 EE .\...p..3..Xr... 0060: 77 DD 45 C6 09 36 F6 D1 8D EA B1 87 43 BB B1 82 w.E..6......C... 0070: 58 4E A1 6D 67 AA 77 38 C4 94 3F A6 9D D6 A9 B6 XN.mg.w8..?..... 0080: D3 5B 54 81 30 87 E8 83 C6 3E 95 1E 87 65 BC 14 .[T.0....>...e.. 0090: 80 B9 00 3A D8 06 FC E6 8F FB E9 4F 77 87 15 52 ...:.......Ow..R 00A0: 7E CB AA E0 91 56 99 5A 04 6B 57 97 7E C0 37 1F .....V.Z.kW...7. 00B0: 2B 76 30 B6 08 F4 27 1F AB E2 09 D0 0E 4C 63 AC +v0...'......Lc. 00C0: 0A 28 99 85 07 2B 20 58 CB 18 AB 1D 3B 4D 52 78 .(...+ X....;MRx 00D0: 2C 3C 84 77 A1 B6 A1 43 86 74 21 02 40 35 E0 D5 ,<.w...C.t!.@5.. 00E0: 2A 51 71 D7 70 A8 89 94 36 9B 0C B6 E7 BD 3B 7D *Qq.p...6.....;. 00F0: 32 D9 23 DB 7D 74 08 3A 27 DE 5D 68 A7 F0 32 2C 2.#..t.:'.]h..2, } } ) javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:28.230 IST|Finished.java:773|Produced server Finished handshake message ( "Finished": { "verify data": { 0000: AF 0F 40 2B 97 56 4F C2 F4 D5 33 92 FE A2 08 2C ..@+.VO...3...., 0010: 88 3E A0 4F 22 30 6F 92 66 E6 1F E9 E7 CC F2 C9 .>.O"0o.f....... }'} ) javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-18 11:24:28.231 IST|SSLCipher.java:1978|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE countdown value = 137438953472 javax.net.ssl|DEBUG|25|https-jsse-nio-8443-exec-5|2019-11-18 11:24:28.316 IST|ChangeCipherSpec.java:250|Consuming ChangeCipherSpec message javax.net.ssl|DEBUG|25|https-jsse-nio-8443-exec-5|2019-11-18 11:24:28.319 IST|CertificateMessage.java:1158|Consuming client Certificate handshake message ( "Certificate": { "certificate_request_context": "", "certificate_list": [ { "certificate" : { "version" : "v3", "serial number" : "2C 8B E3 32 BC 02 24 C0", "signature algorithm": "SHA512withRSA", "issuer" : "CN=client", "not before" : "2019-11-05 13:43:21.000 IST", "not after" : "2020-11-05 13:43:21.000 IST", "subject" : "CN=client", "subject public key" : "RSA", "extensions" : [ { ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:false PathLen:2147483647 ] }, { ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_Encipherment Data_Encipherment ] } ]} "extensions": { } }, ] } ) javax.net.ssl|DEBUG|25|https-jsse-nio-8443-exec-5|2019-11-18 11:24:28.324 IST|CertificateVerify.java:1165|Consuming CertificateVerify handshake message ( "CertificateVerify": { "signature algorithm": rsa_pss_rsae_sha256 "signature": { 0000: 62 1E 17 86 B2 4C 99 4B 62 48 43 8F B2 4D EB F8 b....L.KbHC..M.. 0010: 2C F2 21 9F A5 35 AF 43 0D 84 94 78 C3 7D 6E 46 ,.!..5.C...x..nF 0020: FA EF 42 58 28 51 84 06 65 C7 71 C0 CC 3F 01 F1 ..BX(Q..e.q..?.. 0030: 96 21 0E 01 B4 34 50 F6 AA 4A 4E BE 78 47 1A 85 .!...4P..JN.xG.. 0040: C2 10 10 92 D0 83 26 B6 60 0B 23 6A 0E 50 20 C0 ......&.`.#j.P . 0050: 3C E3 4D 22 B5 FF 0D 4C EE C5 02 C2 DA 91 7B CC <.M"...L........ 0060: D3 9E AC 7C 54 E3 B4 83 D5 12 AB 1C 78 D2 0D FB ....T.......x... 0070: B3 9D 2C 23 9C F2 9D 12 D6 2F F9 44 A2 D0 3E FC ..,#...../.D..>. 0080: 1F EF 4D 03 84 4B E0 FA 4D 49 20 5E 2C 84 75 54 ..M..K..MI ^,.uT 0090: 93 D0 38 8B 33 1D 18 04 CC B6 0D 3B 98 A9 40 07 ..8.3......;..@. 00A0: D2 EB F7 64 98 56 CA 16 3F 0E 24 13 69 C6 56 39 ...d.V..?.$.i.V9 00B0: 67 95 F8 04 05 6D BE 0A 15 67 0C BF 11 2E 65 7C g....m...g....e. 00C0: 5F 0C 8B 90 7F 05 BB 34 CA 1C 8D 1E 65 6A F9 AE _......4....ej.. 00D0: 2A EB 61 64 BF CF EB 81 7E DD 0C AD 80 C7 04 D5 *.ad............ 00E0: E4 D5 C1 15 3D A5 73 4C F1 A3 AE 8C 54 E5 8B 99 ....=.sL....T... 00F0: 86 E7 9E 8F 46 5D 9E 4D 13 6B CD 76 81 87 D9 1E ....F].M.k.v.... } } ) javax.net.ssl|DEBUG|25|https-jsse-nio-8443-exec-5|2019-11-18 11:24:28.328 IST|Finished.java:1044|Consuming client Finished handshake message ( "Finished": { "verify data": { 0000: 9C A5 4E 06 CE B8 4B 5F 6E BD D7 5E A8 11 AE C9 ..N...K_n..^.... 0010: 75 93 7E 6D 08 71 7B 92 8D C0 5E 92 67 8B 90 72 u..m.q....^.g..r }'} ) javax.net.ssl|DEBUG|25|https-jsse-nio-8443-exec-5|2019-11-18 11:24:28.329 IST|SSLCipher.java:1824|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE countdown value = 137438953472 javax.net.ssl|DEBUG|25|https-jsse-nio-8443-exec-5|2019-11-18 11:24:28.330 IST|Finished.java:1148|Sending new session ticket 18-Nov-2019 11:24:28.331 FINE [https-jsse-nio-8443-exec-5] org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun Error during SSL handshake java.io.IOException: NOT_HANDSHAKING during handshake at org.apache.tomcat.util.net.SecureNioChannel.handshake(SecureNioChannel.java:193) at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1556) at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49) at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128) at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628) at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61) at java.base/java.lang.Thread.run(Thread.java:834) 18-Nov-2019 11:24:28.335 FINE [https-jsse-nio-8443-exec-5] org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper.doClose Calling [org.apache.tomcat.util.net.NioEndpoint@42b2b293].closeSocket([org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper@651e92d2:org.apache.tomcat.util.net.SecureNioChannel@102a92e:java.nio.channels.SocketChannel[connected local=/0:0:0:0:0:0:0:1:8443 remote=/0:0:0:0:0:0:0:1:62368]]) java.lang.Exception at org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper.doClose(NioEndpoint.java:1163) at org.apache.tomcat.util.net.SocketWrapperBase.close(SocketWrapperBase.java:402) at org.apache.tomcat.util.net.NioEndpoint$Poller.cancelledKey(NioEndpoint.java:665) at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1586) at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49) at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128) at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628) at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61) at java.base/java.lang.Thread.run(Thread.java:834) javax.net.ssl|ALL|25|https-jsse-nio-8443-exec-5|2019-11-18 11:24:28.342 IST|SSLEngineImpl.java:756|Closing outbound of SSLEngine javax.net.ssl|WARNING|25|https-jsse-nio-8443-exec-5|2019-11-18 11:24:28.344 IST|SSLEngineOutputRecord.java:168|outbound has closed, ignore outbound application data 18-Nov-2019 11:24:28.371 FINE [https-jsse-nio-8443-exec-6] org.apache.tomcat.util.net.SecureNioChannel.processSNI The SNI host name extracted for connection [java.nio.channels.SocketChannel[connected local=/0:0:0:0:0:0:0:1:8443 remote=/0:0:0:0:0:0:0:1:62369]] was [localhost] javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:28.373 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 for TLS10 javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:28.374 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 for TLS10 javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:28.374 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLS10 javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:28.374 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLS10 javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:28.375 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 for TLS13 javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:28.375 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 for TLS13 javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:28.375 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLS13 javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:28.376 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLS13 javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:28.376 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA for TLS13 javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:28.376 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA for TLS13 javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:28.377 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 for TLS11 javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:28.377 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 for TLS11 javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:28.378 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLS11 javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:28.378 IST|HandshakeContext.java:296|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLS11 javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:28.383 IST|SSLExtensions.java:131|Ignore unknown or unsupported extension ( "unknown extension (28)": { 0000: 40 01 @. } ) javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:28.384 IST|SSLExtensions.java:131|Ignore unknown or unsupported extension ( "unknown extension (21)": { 0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0090: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ............... } ) javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:28.390 IST|ClientHello.java:806|Consuming ClientHello handshake message ( "ClientHello": { "client version" : "TLSv1.2", "random" : "B0 0F 72 91 72 E7 DB E6 0D 8F 70 5D AB 6F C0 93 24 F8 61 6A 7B 18 89 57 76 36 96 8D 23 AC 62 28", "session id" : "0A 19 8B 1C 8E 75 50 36 43 D2 42 9F 4A B9 79 0C 30 28 89 F3 6E 86 0F 66 DC 12 A8 35 58 04 66 8E", "cipher suites" : "[TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_AES_256_GCM_SHA384(0x1302), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), UNKNOWN-CIPHER-SUITE(0xCCA9)(0xCCA9), UNKNOWN-CIPHER-SUITE(0xCCA8)(0xCCA8), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA(0xC00A), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA(0xC009), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA(0xC013), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA(0xC014), TLS_DHE_RSA_WITH_AES_128_CBC_SHA(0x0033), TLS_DHE_RSA_WITH_AES_256_CBC_SHA(0x0039), TLS_RSA_WITH_AES_128_CBC_SHA(0x002F), TLS_RSA_WITH_AES_256_CBC_SHA(0x0035), SSL_RSA_WITH_3DES_EDE_CBC_SHA(0x000A)]", "compression methods" : "00", "extensions" : [ "server_name (0)": { type=host_name (0), value=localhost }, "extended_master_secret (23)": { }, "renegotiation_info (65,281)": { "renegotiated connection": [] }, "supported_groups (10)": { "versions": [x25519, secp256r1, secp384r1, secp521r1, ffdhe2048, ffdhe3072] }, "ec_point_formats (11)": { "formats": [uncompressed] }, "application_layer_protocol_negotiation (16)": { [h2, http/1.1] }, "status_request (5)": { "certificate status type": ocsp "OCSP status request": { "responder_id": "request extensions": { } } }, "key_share (51)": { "client_shares": [ { "named group": x25519 "key_exchange": { 0000: 2B 56 D4 AD 21 84 E5 87 6A 40 48 94 EF 7A 9B D9 +V..!...j@H..z.. 0010: 26 92 83 19 3F 32 84 4C 0C CE BB 8F 6A B0 81 19 &...?2.L....j... } }, { "named group": secp256r1 "key_exchange": { 0000: 04 C8 3A 19 4C CD 6B 0D 71 5F 1D 85 5F D3 B8 B5 ..:.L.k.q_.._... 0010: 7A C4 4A A9 80 FF 83 2B AB 8A 6A A3 33 84 D8 69 z.J....+..j.3..i 0020: 25 C4 C2 1D F4 88 E2 4B 39 7F C0 1C 48 FE 12 AC %......K9...H... 0030: 6C 56 0A D5 BE 86 52 23 3E BA AC F0 CE E7 CA 79 lV....R#>......y 0040: 55 } }, ] }, "supported_versions (43)": { "versions": [TLSv1.3, TLSv1.2, TLSv1.1, TLSv1] }, "signature_algorithms (13)": { "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1] }, "unknown extension (28)": { 0000: 40 01 @. }, "unknown extension (21)": { 0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0090: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ............... } ] } ) javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:28.390 IST|SSLExtensions.java:188|Consumed extension: supported_versions javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:28.390 IST|ClientHello.java:836|Negotiated protocol version: TLSv1.3 javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:28.391 IST|PskKeyExchangeModesExtension.java:294|abort session resumption, no supported psk_dhe_ke PSK key exchange mode javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:28.391 IST|PreSharedKeyExtension.java:809|Handling pre_shared_key absence. javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:28.392 IST|ServerNameExtension.java:328|no server name matchers, ignore server name indication javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:28.392 IST|SSLExtensions.java:188|Consumed extension: server_name javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:28.392 IST|SSLExtensions.java:169|Ignore unavailable extension: max_fragment_length javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:28.393 IST|SSLExtensions.java:188|Consumed extension: status_request javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:28.393 IST|SSLExtensions.java:188|Consumed extension: supported_groups javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:28.393 IST|SSLExtensions.java:159|Ignore unsupported extension: ec_point_formats javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:28.394 IST|SSLExtensions.java:188|Consumed extension: signature_algorithms javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:28.394 IST|SSLExtensions.java:169|Ignore unavailable extension: signature_algorithms_cert javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:28.394 IST|AlpnExtension.java:274|Ignore server unenabled extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:28.395 IST|SSLExtensions.java:188|Consumed extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:28.395 IST|SSLExtensions.java:159|Ignore unsupported extension: status_request_v2 javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:28.395 IST|SSLExtensions.java:159|Ignore unsupported extension: extended_master_secret javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:28.395 IST|SSLExtensions.java:169|Ignore unavailable extension: cookie javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:28.396 IST|KeyShareExtension.java:350|Ignore unsupported named group: x25519 javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:28.396 IST|SSLExtensions.java:188|Consumed extension: key_share javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:28.396 IST|SSLExtensions.java:159|Ignore unsupported extension: renegotiation_info javax.net.ssl|ALL|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:28.398 IST|SignatureScheme.java:360|Ignore disabled signature scheme: rsa_md5 javax.net.ssl|WARNING|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:28.399 IST|SSLExtensions.java:211|Ignore impact of unsupported extension: server_name javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:28.399 IST|SSLExtensions.java:203|Ignore unavailable extension: max_fragment_length javax.net.ssl|WARNING|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:28.399 IST|SSLExtensions.java:211|Ignore impact of unsupported extension: status_request javax.net.ssl|WARNING|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:28.399 IST|SSLExtensions.java:211|Ignore impact of unsupported extension: supported_groups javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:28.400 IST|SSLExtensions.java:220|Populated with extension: signature_algorithms javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:28.400 IST|SSLExtensions.java:203|Ignore unavailable extension: signature_algorithms_cert javax.net.ssl|WARNING|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:28.401 IST|SSLExtensions.java:211|Ignore impact of unsupported extension: application_layer_protocol_negotiation javax.net.ssl|WARNING|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:28.401 IST|SSLExtensions.java:211|Ignore impact of unsupported extension: supported_versions javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:28.401 IST|SSLExtensions.java:203|Ignore unavailable extension: cookie javax.net.ssl|WARNING|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:28.401 IST|SSLExtensions.java:211|Ignore impact of unsupported extension: key_share javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:28.401 IST|SSLExtensions.java:203|Ignore unavailable extension: pre_shared_key javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:28.402 IST|ServerHello.java:729|use cipher suite TLS_AES_128_GCM_SHA256 javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:28.411 IST|SSLExtensions.java:256|Ignore, context unavailable extension: pre_shared_key javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:28.413 IST|ServerHello.java:580|Produced ServerHello handshake message ( "ServerHello": { "server version" : "TLSv1.2", "random" : "B3 A2 00 B3 1D 34 BB A0 BF 43 8F 8A C4 68 E9 DE 47 EE F7 DB 46 89 7C 0D 2A F4 F5 3F 1B 04 EE 32", "session id" : "0A 19 8B 1C 8E 75 50 36 43 D2 42 9F 4A B9 79 0C 30 28 89 F3 6E 86 0F 66 DC 12 A8 35 58 04 66 8E", "cipher suite" : "TLS_AES_128_GCM_SHA256(0x1301)", "compression methods" : "00", "extensions" : [ "supported_versions (43)": { "selected version": [TLSv1.3] }, "key_share (51)": { "server_share": { "named group": secp256r1 "key_exchange": { 0000: 04 7D 8E 5E 3E DA 33 67 29 23 38 EE 00 17 CE A9 ...^>.3g)#8..... 0010: B8 DA 06 26 E2 FE A2 52 57 49 50 E4 39 F5 A5 F4 ...&...RWIP.9... 0020: AF 4B 64 E4 80 32 3B AE 3A 39 C2 DC 3F 29 A5 48 .Kd..2;.:9..?).H 0030: 68 3D BD AF 0F 01 B6 29 1C 74 20 C6 81 B6 F3 23 h=.....).t ....# 0040: B8 } }, } ] } ) javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:28.431 IST|SSLCipher.java:1824|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE countdown value = 137438953472 javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:28.432 IST|SSLCipher.java:1978|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE countdown value = 137438953472 javax.net.ssl|ALL|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:28.432 IST|ServerNameExtension.java:538|No expected server name indication response javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:28.432 IST|SSLExtensions.java:256|Ignore, context unavailable extension: server_name javax.net.ssl|ALL|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:28.433 IST|MaxFragExtension.java:471|Ignore unavailable max_fragment_length extension javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:28.433 IST|SSLExtensions.java:256|Ignore, context unavailable extension: max_fragment_length javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:28.434 IST|AlpnExtension.java:363|Ignore unavailable extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:28.434 IST|SSLExtensions.java:256|Ignore, context unavailable extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:28.434 IST|EncryptedExtensions.java:137|Produced EncryptedExtensions message ( "EncryptedExtensions": [ "supported_groups (10)": { "versions": [secp256r1, secp384r1, secp521r1, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192] } ] ) javax.net.ssl|ALL|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:28.435 IST|SignatureScheme.java:365|Ignore inactive signature scheme: dsa_sha256 javax.net.ssl|ALL|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:28.436 IST|SignatureScheme.java:365|Ignore inactive signature scheme: dsa_sha1 javax.net.ssl|ALL|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:28.436 IST|SignatureScheme.java:365|Ignore inactive signature scheme: rsa_md5 javax.net.ssl|ALL|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:28.437 IST|SignatureScheme.java:365|Ignore inactive signature scheme: dsa_sha256 javax.net.ssl|ALL|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:28.437 IST|SignatureScheme.java:365|Ignore inactive signature scheme: dsa_sha1 javax.net.ssl|ALL|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:28.437 IST|SignatureScheme.java:365|Ignore inactive signature scheme: rsa_md5 javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:28.439 IST|CertificateRequest.java:882|Produced CertificateRequest message ( "CertificateRequest": { "certificate_request_context": "", "extensions": [ "signature_algorithms (13)": { "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1] }, "signature_algorithms_cert (50)": { "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1] } ] } ) javax.net.ssl|ALL|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:28.440 IST|X509Authentication.java:264|No X.509 cert selected for EC javax.net.ssl|WARNING|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:28.440 IST|CertificateMessage.java:1063|Unavailable authentication scheme: ecdsa_secp256r1_sha256 javax.net.ssl|ALL|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:28.440 IST|X509Authentication.java:264|No X.509 cert selected for EC javax.net.ssl|WARNING|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:28.440 IST|CertificateMessage.java:1063|Unavailable authentication scheme: ecdsa_secp384r1_sha384 javax.net.ssl|ALL|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:28.441 IST|X509Authentication.java:264|No X.509 cert selected for EC javax.net.ssl|WARNING|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:28.441 IST|CertificateMessage.java:1063|Unavailable authentication scheme: ecdsa_secp521r1_sha512 javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:28.441 IST|StatusResponseManager.java:763|Staping disabled or is a resumed session javax.net.ssl|ALL|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:28.442 IST|CertStatusExtension.java:1117|Stapling is disabled for this connection javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:28.442 IST|SSLExtensions.java:256|Ignore, context unavailable extension: status_request javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:28.444 IST|CertificateMessage.java:1002|Produced server Certificate message ( "Certificate": { "certificate_request_context": "", "certificate_list": [ { "certificate" : { "version" : "v3", "serial number" : "3B FD 86 4A 58 09 72 F6", "signature algorithm": "SHA512withRSA", "issuer" : "CN=localhost", "not before" : "2019-11-05 13:41:52.000 IST", "not after" : "2020-11-05 13:41:52.000 IST", "subject" : "CN=localhost", "subject public key" : "RSA", "extensions" : [ { ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:false PathLen:2147483647 ] }, { ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_Encipherment Data_Encipherment ] } ]} "extensions": { } }, ] } ) javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:28.488 IST|CertificateVerify.java:1113|Produced server CertificateVerify handshake message ( "CertificateVerify": { "signature algorithm": rsa_pss_rsae_sha256 "signature": { 0000: 07 DD 67 5F 59 E6 EE 84 36 4F 6C D5 7B 28 EA 30 ..g_Y...6Ol..(.0 0010: 4A A6 39 8A F3 A0 B4 D7 A5 56 94 56 83 6F A0 97 J.9......V.V.o.. 0020: 1B 84 42 04 AA B9 C9 3C 5F C4 0E BB F9 76 54 B4 ..B....<_....vT. 0030: 32 C2 25 50 AC 42 F8 32 9D 42 81 2C 07 71 24 56 2.%P.B.2.B.,.q$V 0040: 34 47 A2 CF 2D D9 9B E5 43 01 DA 2C 6F 2A 63 0F 4G..-...C..,o*c. 0050: A1 7D 4E E1 EF 9A DF 72 EC C2 E0 13 A1 51 9B F6 ..N....r.....Q.. 0060: 31 F5 4D FC B5 20 E1 A7 8F E3 88 4E 7A 81 FC 1B 1.M.. .....Nz... 0070: D1 CF FF 71 19 4D A2 C1 39 58 2C A8 30 63 D4 6F ...q.M..9X,.0c.o 0080: CD 84 FC F6 EB 5E 70 06 30 93 19 3D BE 00 D3 B2 .....^p.0..=.... 0090: 34 35 C6 53 0B A5 CD 81 EE 0C 03 A7 BA C5 92 56 45.S...........V 00A0: 64 FE 8B AC FA F7 5E 9B 52 90 86 5C E8 F4 52 9A d.....^.R..\..R. 00B0: FB 16 D8 3B 40 9F 44 FF 02 2A F8 43 DE D5 A6 DC ...;@.D..*.C.... 00C0: BE D7 C5 C6 E3 B8 BA F0 B2 38 23 BE 8B B4 D0 6B .........8#....k 00D0: 8F A5 9D 70 AE D2 3A A9 43 EA BA C3 08 C8 D2 7C ...p..:.C....... 00E0: 44 92 38 81 40 F1 A1 A9 FE 27 70 5A DC 30 6E 84 D.8.@....'pZ.0n. 00F0: 2D BC A2 FA D0 C1 38 7A 3B 4A 76 93 A6 17 FA 24 -.....8z;Jv....$ } } ) javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:28.490 IST|Finished.java:773|Produced server Finished handshake message ( "Finished": { "verify data": { 0000: 8F BD 72 EE E0 5E 91 A9 2F 11 7A 2E 07 49 5D 85 ..r..^../.z..I]. 0010: 25 C9 0E B9 D7 CB EA 30 B6 F6 4B 49 A6 DF D7 6E %......0..KI...n }'} ) javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-18 11:24:28.492 IST|SSLCipher.java:1978|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE countdown value = 137438953472 javax.net.ssl|DEBUG|28|https-jsse-nio-8443-exec-8|2019-11-18 11:24:28.575 IST|ChangeCipherSpec.java:250|Consuming ChangeCipherSpec message javax.net.ssl|DEBUG|28|https-jsse-nio-8443-exec-8|2019-11-18 11:24:28.579 IST|CertificateMessage.java:1158|Consuming client Certificate handshake message ( "Certificate": { "certificate_request_context": "", "certificate_list": [ { "certificate" : { "version" : "v3", "serial number" : "2C 8B E3 32 BC 02 24 C0", "signature algorithm": "SHA512withRSA", "issuer" : "CN=client", "not before" : "2019-11-05 13:43:21.000 IST", "not after" : "2020-11-05 13:43:21.000 IST", "subject" : "CN=client", "subject public key" : "RSA", "extensions" : [ { ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:false PathLen:2147483647 ] }, { ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_Encipherment Data_Encipherment ] } ]} "extensions": { } }, ] } ) javax.net.ssl|DEBUG|28|https-jsse-nio-8443-exec-8|2019-11-18 11:24:28.586 IST|CertificateVerify.java:1165|Consuming CertificateVerify handshake message ( "CertificateVerify": { "signature algorithm": rsa_pss_rsae_sha256 "signature": { 0000: 5A EC 04 0F 25 3E 0D 46 67 99 65 64 93 28 82 70 Z...%>.Fg.ed.(.p 0010: 67 4A 25 99 B6 1A 23 01 9A 8E 47 10 A7 EF F7 38 gJ%...#...G....8 0020: 65 CC B7 D5 37 05 D3 09 5B 6E D2 B3 26 62 6F ED e...7...[n..&bo. 0030: EE 89 A3 E1 01 F6 B5 7A 93 15 B1 37 54 56 E8 E9 .......z...7TV.. 0040: 28 1E 49 29 41 FD 1F AD 8F 27 85 FD DD 84 2C ED (.I)A....'....,. 0050: 6D 26 1A 21 0C A1 ED 64 21 A6 58 9D 68 0B 53 AF m&.!...d!.X.h.S. 0060: 41 3B FC 3A E1 7B 35 D1 96 76 16 C9 B8 51 FD 78 A;.:..5..v...Q.x 0070: B2 9F ED B6 2E EE 08 5E 7A 98 20 E0 14 8A 9E 28 .......^z. ....( 0080: 33 80 E1 9F 01 E1 55 D6 84 10 21 80 93 5C 2E B9 3.....U...!..\.. 0090: 6E DE 01 7A D4 E8 7A EE D8 40 5B E5 BD 78 B7 B6 n..z..z..@[..x.. 00A0: CF 2E F0 64 34 D3 A6 1D 1C 79 FC 30 13 22 82 0A ...d4....y.0.".. 00B0: 73 D8 DD 25 26 67 AB 18 EC B8 10 60 FC 36 84 52 s..%&g.....`.6.R 00C0: D8 3D 73 6C 43 04 77 6C D7 C3 BF 0E ED C9 AA 72 .=slC.wl.......r 00D0: D1 28 0B 2F 16 EE AD 88 2B CE FD 25 CC 1E A6 1B .(./....+..%.... 00E0: 39 51 F1 48 6D 70 40 55 70 C7 BC 8E 75 6B 18 22 9Q.Hmp@Up...uk." 00F0: C6 0A 90 D3 AF DC 5E C3 BE C9 83 4D 06 6E 24 7D ......^....M.n$. } } ) javax.net.ssl|DEBUG|28|https-jsse-nio-8443-exec-8|2019-11-18 11:24:28.587 IST|Finished.java:1044|Consuming client Finished handshake message ( "Finished": { "verify data": { 0000: 54 57 53 C8 F7 DC 73 6B C8 7F E9 DD 06 AB A1 EE TWS...sk........ 0010: D5 DD D4 DD ED 24 03 50 E7 8C D9 B4 F6 A5 DE BE .....$.P........ }'} ) javax.net.ssl|DEBUG|28|https-jsse-nio-8443-exec-8|2019-11-18 11:24:28.588 IST|SSLCipher.java:1824|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE countdown value = 137438953472 javax.net.ssl|DEBUG|28|https-jsse-nio-8443-exec-8|2019-11-18 11:24:28.589 IST|Finished.java:1148|Sending new session ticket 18-Nov-2019 11:24:28.589 FINE [https-jsse-nio-8443-exec-8] org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun Error during SSL handshake java.io.IOException: NOT_HANDSHAKING during handshake at org.apache.tomcat.util.net.SecureNioChannel.handshake(SecureNioChannel.java:193) at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1556) at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49) at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128) at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628) at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61) at java.base/java.lang.Thread.run(Thread.java:834) 18-Nov-2019 11:24:28.591 FINE [https-jsse-nio-8443-exec-8] org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper.doClose Calling [org.apache.tomcat.util.net.NioEndpoint@42b2b293].closeSocket([org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper@3cb8bf96:org.apache.tomcat.util.net.SecureNioChannel@102a92e:java.nio.channels.SocketChannel[connected local=/0:0:0:0:0:0:0:1:8443 remote=/0:0:0:0:0:0:0:1:62369]]) java.lang.Exception at org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper.doClose(NioEndpoint.java:1163) at org.apache.tomcat.util.net.SocketWrapperBase.close(SocketWrapperBase.java:402) at org.apache.tomcat.util.net.NioEndpoint$Poller.cancelledKey(NioEndpoint.java:665) at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1586) at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49) at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128) at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628) at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61) at java.base/java.lang.Thread.run(Thread.java:834) javax.net.ssl|ALL|28|https-jsse-nio-8443-exec-8|2019-11-18 11:24:28.591 IST|SSLEngineImpl.java:756|Closing outbound of SSLEngine javax.net.ssl|WARNING|28|https-jsse-nio-8443-exec-8|2019-11-18 11:24:28.592 IST|SSLEngineOutputRecord.java:168|outbound has closed, ignore outbound application data 18-Nov-2019 11:25:46.986 INFO [Thread-5] org.apache.coyote.AbstractProtocol.pause Pausing ProtocolHandler ["http-nio-8080"] 18-Nov-2019 11:25:47.310 FINE [Thread-5] org.apache.tomcat.util.net.AbstractEndpoint.unlockAccept About to unlock socket for:/2606:b400:c11:8026:8044:a57:258b:7f85:8080 18-Nov-2019 11:25:47.348 FINE [Thread-5] org.apache.tomcat.util.net.AbstractEndpoint.unlockAccept Socket unlock completed for:/2606:b400:c11:8026:8044:a57:258b:7f85:8080 18-Nov-2019 11:25:47.349 INFO [Thread-5] org.apache.coyote.AbstractProtocol.pause Pausing ProtocolHandler ["https-jsse-nio-8443"] 18-Nov-2019 11:25:47.669 FINE [Thread-5] org.apache.tomcat.util.net.AbstractEndpoint.unlockAccept About to unlock socket for:/2606:b400:c11:8026:8044:a57:258b:7f85:8443 18-Nov-2019 11:25:47.702 FINE [Thread-5] org.apache.tomcat.util.net.AbstractEndpoint.unlockAccept Socket unlock completed for:/2606:b400:c11:8026:8044:a57:258b:7f85:8443 18-Nov-2019 11:25:47.703 INFO [Thread-5] org.apache.coyote.AbstractProtocol.pause Pausing ProtocolHandler ["ajp-nio-8009"] 18-Nov-2019 11:25:48.141 FINE [Thread-5] org.apache.tomcat.util.net.AbstractEndpoint.unlockAccept About to unlock socket for:/2606:b400:c11:8026:8044:a57:258b:7f85:8009 18-Nov-2019 11:25:48.180 FINE [Thread-5] org.apache.tomcat.util.net.AbstractEndpoint.unlockAccept Socket unlock completed for:/2606:b400:c11:8026:8044:a57:258b:7f85:8009 18-Nov-2019 11:25:48.182 INFO [Thread-5] org.apache.catalina.core.StandardService.stopInternal Stopping service [Catalina] 18-Nov-2019 11:25:48.399 INFO [Thread-5] org.apache.coyote.AbstractProtocol.stop Stopping ProtocolHandler ["http-nio-8080"] 18-Nov-2019 11:25:48.408 INFO [Thread-5] org.apache.coyote.AbstractProtocol.stop Stopping ProtocolHandler ["https-jsse-nio-8443"] 18-Nov-2019 11:25:48.413 INFO [Thread-5] org.apache.coyote.AbstractProtocol.stop Stopping ProtocolHandler ["ajp-nio-8009"] 18-Nov-2019 11:25:48.417 INFO [Thread-5] org.apache.coyote.AbstractProtocol.destroy Destroying ProtocolHandler ["http-nio-8080"] 18-Nov-2019 11:25:48.417 FINE [Thread-5] org.apache.tomcat.util.net.NioEndpoint.unbind Destroy initiated for 0.0.0.0/0.0.0.0:8080 18-Nov-2019 11:25:48.419 FINE [Thread-5] org.apache.tomcat.util.net.NioEndpoint.unbind Destroy completed for 0.0.0.0/0.0.0.0:8080 18-Nov-2019 11:25:48.419 INFO [Thread-5] org.apache.coyote.AbstractProtocol.destroy Destroying ProtocolHandler ["https-jsse-nio-8443"] 18-Nov-2019 11:25:48.419 FINE [Thread-5] org.apache.tomcat.util.net.NioEndpoint.unbind Destroy initiated for 0.0.0.0/0.0.0.0:8443 18-Nov-2019 11:25:48.421 FINE [Thread-5] org.apache.tomcat.util.net.NioEndpoint.unbind Destroy completed for 0.0.0.0/0.0.0.0:8443 18-Nov-2019 11:25:48.421 INFO [Thread-5] org.apache.coyote.AbstractProtocol.destroy Destroying ProtocolHandler ["ajp-nio-8009"] 18-Nov-2019 11:25:48.422 FINE [Thread-5] org.apache.tomcat.util.net.NioEndpoint.unbind Destroy initiated for 0.0.0.0/0.0.0.0:8009 18-Nov-2019 11:25:48.423 FINE [Thread-5] org.apache.tomcat.util.net.NioEndpoint.unbind Destroy completed for 0.0.0.0/0.0.0.0:8009 Terminate batch job (Y/N)? Y