Using CATALINA_BASE: "C:\apache-tomcat-9.0.27" Using CATALINA_HOME: "C:\apache-tomcat-9.0.27" Using CATALINA_TMPDIR: "C:\apache-tomcat-9.0.27\temp" Using JRE_HOME: "C:\Program Files\Java\jdk-13.0.1" Using CLASSPATH: "C:\apache-tomcat-9.0.27\bin\bootstrap.jar;C:\apache-tomcat-9.0.27\bin\tomcat-juli.jar" NOTE: Picked up JDK_JAVA_OPTIONS: --add-opens=java.base/java.lang=ALL-UNNAMED --add-opens=java.base/java.io=ALL-UNNAMED --add-opens=java.rmi/sun.rmi.transport=ALL-UNNAMED 15-Nov-2019 12:32:15.050 INFO [main] org.apache.catalina.startup.VersionLoggerListener.log Server version name: Apache Tomcat/9.0.27 15-Nov-2019 12:32:15.066 INFO [main] org.apache.catalina.startup.VersionLoggerListener.log Server built: Oct 7 2019 09:57:22 UTC 15-Nov-2019 12:32:15.068 INFO [main] org.apache.catalina.startup.VersionLoggerListener.log Server version number: 9.0.27.0 15-Nov-2019 12:32:15.069 INFO [main] org.apache.catalina.startup.VersionLoggerListener.log OS Name: Windows 7 15-Nov-2019 12:32:15.072 INFO [main] org.apache.catalina.startup.VersionLoggerListener.log OS Version: 6.1 15-Nov-2019 12:32:15.072 INFO [main] org.apache.catalina.startup.VersionLoggerListener.log Architecture: amd64 15-Nov-2019 12:32:15.073 INFO [main] org.apache.catalina.startup.VersionLoggerListener.log Java Home: C:\Program Files\Java\jdk-13.0.1 15-Nov-2019 12:32:15.074 INFO [main] org.apache.catalina.startup.VersionLoggerListener.log JVM Version: 13.0.1+9 15-Nov-2019 12:32:15.075 INFO [main] org.apache.catalina.startup.VersionLoggerListener.log JVM Vendor: Oracle Corporation 15-Nov-2019 12:32:15.075 INFO [main] org.apache.catalina.startup.VersionLoggerListener.log CATALINA_BASE: C:\apache-tomcat-9.0.27 15-Nov-2019 12:32:15.076 INFO [main] org.apache.catalina.startup.VersionLoggerListener.log CATALINA_HOME: C:\apache-tomcat-9.0.27 15-Nov-2019 12:32:15.208 INFO [main] org.apache.catalina.startup.VersionLoggerListener.log Command line argument: --add-opens=java.base/java.lang=ALL-UNNAMED 15-Nov-2019 12:32:15.209 INFO [main] org.apache.catalina.startup.VersionLoggerListener.log Command line argument: --add-opens=java.base/java.io=ALL-UNNAMED 15-Nov-2019 12:32:15.210 INFO [main] org.apache.catalina.startup.VersionLoggerListener.log Command line argument: --add-opens=java.rmi/sun.rmi.transport=ALL-UNNAMED 15-Nov-2019 12:32:15.211 INFO [main] org.apache.catalina.startup.VersionLoggerListener.log Command line argument: -Djava.util.logging.config.file=C:\apache-tomcat-9.0.27\conf\logging.properties 15-Nov-2019 12:32:15.212 INFO [main] org.apache.catalina.startup.VersionLoggerListener.log Command line argument: -Djava.util.logging.manager=org.apache.juli.ClassLoaderLogManager 15-Nov-2019 12:32:15.212 INFO [main] org.apache.catalina.startup.VersionLoggerListener.log Command line argument: -Djdk.tls.ephemeralDHKeySize=2048 15-Nov-2019 12:32:15.213 INFO [main] org.apache.catalina.startup.VersionLoggerListener.log Command line argument: -Djavax.net.debug=ssl:handshake:verbose 15-Nov-2019 12:32:15.213 INFO [main] org.apache.catalina.startup.VersionLoggerListener.log Command line argument: -Djava.protocol.handler.pkgs=org.apache.catalina.webresources 15-Nov-2019 12:32:15.214 INFO [main] org.apache.catalina.startup.VersionLoggerListener.log Command line argument: -Dignore.endorsed.dirs= 15-Nov-2019 12:32:15.214 INFO [main] org.apache.catalina.startup.VersionLoggerListener.log Command line argument: -Dcatalina.base=C:\apache-tomcat-9.0.27 15-Nov-2019 12:32:15.215 INFO [main] org.apache.catalina.startup.VersionLoggerListener.log Command line argument: -Dcatalina.home=C:\apache-tomcat-9.0.27 15-Nov-2019 12:32:15.216 INFO [main] org.apache.catalina.startup.VersionLoggerListener.log Command line argument: -Djava.io.tmpdir=C:\apache-tomcat-9.0.27\temp 15-Nov-2019 12:32:15.216 INFO [main] org.apache.catalina.core.AprLifecycleListener.lifecycleEvent Loaded APR based Apache Tomcat Native library [1.2.23] using APR version [1.7.0]. 15-Nov-2019 12:32:15.217 INFO [main] org.apache.catalina.core.AprLifecycleListener.lifecycleEvent APR capabilities: IPv6 [true], sendfile [true], accept filters [false], random [true]. 15-Nov-2019 12:32:15.218 INFO [main] org.apache.catalina.core.AprLifecycleListener.lifecycleEvent APR/OpenSSL configuration: useAprConnector [false], useOpenSSL [true] 15-Nov-2019 12:32:15.270 INFO [main] org.apache.catalina.core.AprLifecycleListener.initializeSSL OpenSSL successfully initialized [OpenSSL 1.1.1c 28 May 2019] 15-Nov-2019 12:32:16.738 INFO [main] org.apache.coyote.AbstractProtocol.init Initializing ProtocolHandler ["http-nio-8080"] 15-Nov-2019 12:32:17.818 INFO [main] org.apache.coyote.AbstractProtocol.init Initializing ProtocolHandler ["https-jsse-nio-8443"] javax.net.ssl|DEBUG|01|main|2019-11-15 12:32:18.195 IST|SSLCipher.java:465|jdk.tls.keyLimits: entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472 javax.net.ssl|WARNING|01|main|2019-11-15 12:32:18.794 IST|SignatureScheme.java:283|Signature algorithm, ed25519, is not supported by the underlying providers javax.net.ssl|WARNING|01|main|2019-11-15 12:32:18.797 IST|SignatureScheme.java:283|Signature algorithm, ed448, is not supported by the underlying providers 15-Nov-2019 12:32:18.853 FINE [main] org.apache.tomcat.util.net.SSLUtilBase.getEnabled The [protocols] that are active are : [[TLSv1, TLSv1.3, TLSv1.2, SSLv2Hello, TLSv1.1]] 15-Nov-2019 12:32:18.912 FINE [main] org.apache.tomcat.util.net.openssl.ciphers.OpenSSLCipherConfigurationParser.convertForJSSE jsse.openssl.effectiveCiphers 15-Nov-2019 12:32:18.914 FINE [main] org.apache.tomcat.util.net.SSLUtilBase.getEnabled The [ciphers] that are active are : [[TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_AES_256_GCM_SHA384, TLS_DHE_DSS_WITH_AES_256_GCM_SHA384, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, TLS_DHE_RSA_WITH_AES_256_CBC_SHA256, TLS_DHE_DSS_WITH_AES_256_CBC_SHA256, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_DSS_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256, TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256, TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256, TLS_CHACHA20_POLY1305_SHA256, TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384, TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384, TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDH_RSA_WITH_AES_256_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_AES_128_GCM_SHA256, TLS_DHE_DSS_WITH_AES_128_GCM_SHA256, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_DSS_WITH_AES_128_CBC_SHA256, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA]] 15-Nov-2019 12:32:18.916 FINE [main] org.apache.tomcat.util.net.SSLUtilBase.getEnabled Some of the specified [ciphers] are not supported by the SSL engine and have been skipped: [[TLS_ECDHE_ECDSA_WITH_AES_256_CCM_8, TLS_ECDHE_ECDSA_WITH_AES_256_CCM, TLS_PSK_DHE_WITH_AES_256_CCM_8, TLS_DHE_PSK_WITH_AES_256_CCM, TLS_DHE_RSA_WITH_AES_256_CCM_8, TLS_DHE_RSA_WITH_AES_256_CCM, TLS_ECDHE_PSK_WITH_AES_256_CBC_SHA384, TLS_ECDHE_PSK_WITH_AES_256_CBC_SHA, TLS_SRP_SHA_DSS_WITH_AES_256_CBC_SHA, TLS_SRP_SHA_RSA_WITH_AES_256_CBC_SHA, TLS_SRP_SHA_WITH_AES_256_CBC_SHA, TLS_RSA_PSK_WITH_AES_256_CBC_SHA384, TLS_DHE_PSK_WITH_AES_256_CBC_SHA384, TLS_RSA_PSK_WITH_AES_256_GCM_SHA384, TLS_DHE_PSK_WITH_AES_256_GCM_SHA384, TLS_DH_DSS_WITH_AES_256_GCM_SHA384, TLS_DH_RSA_WITH_AES_256_GCM_SHA384, TLS_RSA_PSK_WITH_AES_256_CBC_SHA, TLS_DHE_PSK_WITH_AES_256_CBC_SHA, TLS_DH_RSA_WITH_AES_256_CBC_SHA256, TLS_DH_DSS_WITH_AES_256_CBC_SHA256, TLS_DH_RSA_WITH_AES_256_CBC_SHA, TLS_DH_DSS_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384, TLS_ECDHE_ECDSA_WITH_CAMELLIA_256_CBC_SHA384, TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384, TLS_ECDHE_ECDSA_WITH_ARIA_256_GCM_SHA384, TLS_RSA_PSK_WITH_CHACHA20_POLY1305_SHA256, TLS_DHE_PSK_WITH_CHACHA20_POLY1305_SHA256, TLS_ECDHE_PSK_WITH_CHACHA20_POLY1305_SHA256, TLS_ECDHE_PSK_WITH_CAMELLIA_256_CBC_SHA384, TLS_RSA_PSK_WITH_CAMELLIA_256_CBC_SHA384, TLS_DHE_PSK_WITH_CAMELLIA_256_CBC_SHA384, TLS_RSA_PSK_WITH_ARIA_256_GCM_SHA384, TLS_DHE_PSK_WITH_ARIA_256_GCM_SHA384, TLS_DHE_DSS_WITH_ARIA_256_GCM_SHA384, TLS_DHE_RSA_WITH_ARIA_256_GCM_SHA384, TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256, TLS_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA256, TLS_DH_RSA_WITH_CAMELLIA_256_CBC_SHA256, TLS_DH_DSS_WITH_CAMELLIA_256_CBC_SHA256, TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA, TLS_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA, TLS_DH_RSA_WITH_CAMELLIA_256_CBC_SHA, TLS_DH_DSS_WITH_CAMELLIA_256_CBC_SHA, TLS_ECDH_RSA_WITH_CAMELLIA_256_CBC_SHA384, TLS_ECDH_ECDSA_WITH_CAMELLIA_256_CBC_SHA384, TLS_PSK_WITH_AES_256_CCM_8, TLS_PSK_WITH_AES_256_CCM, TLS_PSK_WITH_AES_256_CBC_SHA384, TLS_PSK_WITH_AES_256_GCM_SHA384, TLS_PSK_WITH_AES_256_CBC_SHA, TLS_PSK_WITH_CHACHA20_POLY1305_SHA256, TLS_PSK_WITH_CAMELLIA_256_CBC_SHA384, TLS_PSK_WITH_ARIA_256_GCM_SHA384, TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8, TLS_ECDHE_ECDSA_WITH_AES_128_CCM, TLS_PSK_DHE_WITH_AES_128_CCM_8, TLS_DHE_PSK_WITH_AES_128_CCM, TLS_DHE_RSA_WITH_AES_128_CCM_8, TLS_DHE_RSA_WITH_AES_128_CCM, TLS_ECDHE_PSK_WITH_AES_128_CBC_SHA256, TLS_ECDHE_PSK_WITH_AES_128_CBC_SHA, TLS_SRP_SHA_DSS_WITH_AES_128_CBC_SHA, TLS_SRP_SHA_RSA_WITH_AES_128_CBC_SHA, TLS_SRP_SHA_WITH_AES_128_CBC_SHA, TLS_AES_128_CCM_8_SHA256, TLS_AES_128_CCM_SHA256, TLS_RSA_PSK_WITH_AES_128_CBC_SHA256, TLS_DHE_PSK_WITH_AES_128_CBC_SHA256, TLS_RSA_PSK_WITH_AES_128_GCM_SHA256, TLS_DHE_PSK_WITH_AES_128_GCM_SHA256, TLS_DH_DSS_WITH_AES_128_GCM_SHA256, TLS_DH_RSA_WITH_AES_128_GCM_SHA256, TLS_RSA_PSK_WITH_AES_128_CBC_SHA, TLS_DHE_PSK_WITH_AES_128_CBC_SHA, TLS_DH_RSA_WITH_AES_128_CBC_SHA256, TLS_DH_DSS_WITH_AES_128_CBC_SHA256, TLS_DH_RSA_WITH_AES_128_CBC_SHA, TLS_DH_DSS_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_CBC_SHA256, TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256, TLS_ECDHE_ECDSA_WITH_ARIA_128_GCM_SHA256, TLS_ECDHE_PSK_WITH_CAMELLIA_128_CBC_SHA256, TLS_RSA_PSK_WITH_CAMELLIA_128_CBC_SHA256, TLS_DHE_PSK_WITH_CAMELLIA_128_CBC_SHA256, TLS_RSA_PSK_WITH_ARIA_128_GCM_SHA256, TLS_DHE_PSK_WITH_ARIA_128_GCM_SHA256, TLS_DHE_DSS_WITH_ARIA_128_GCM_SHA256, TLS_DHE_RSA_WITH_ARIA_128_GCM_SHA256, TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256, TLS_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA256, TLS_DH_RSA_WITH_CAMELLIA_128_CBC_SHA256, TLS_DH_DSS_WITH_CAMELLIA_128_CBC_SHA256, TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA, TLS_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA, TLS_DH_RSA_WITH_CAMELLIA_128_CBC_SHA, TLS_DH_DSS_WITH_CAMELLIA_128_CBC_SHA, TLS_ECDH_RSA_WITH_CAMELLIA_128_CBC_SHA256, TLS_ECDH_ECDSA_WITH_CAMELLIA_128_CBC_SHA256, TLS_PSK_WITH_AES_128_CCM_8, TLS_PSK_WITH_AES_128_CCM, TLS_PSK_WITH_AES_128_CBC_SHA256, TLS_PSK_WITH_AES_128_GCM_SHA256, TLS_PSK_WITH_AES_128_CBC_SHA, TLS_PSK_WITH_CAMELLIA_128_CBC_SHA256, TLS_PSK_WITH_ARIA_128_GCM_SHA256]] 15-Nov-2019 12:32:19.008 INFO [main] org.apache.coyote.AbstractProtocol.init Initializing ProtocolHandler ["ajp-nio-8009"] 15-Nov-2019 12:32:19.020 INFO [main] org.apache.catalina.startup.Catalina.load Server initialization in [4,928] milliseconds 15-Nov-2019 12:32:19.197 INFO [main] org.apache.catalina.core.StandardService.startInternal Starting service [Catalina] 15-Nov-2019 12:32:19.198 INFO [main] org.apache.catalina.core.StandardEngine.startInternal Starting Servlet engine: [Apache Tomcat/9.0.27] 15-Nov-2019 12:32:19.236 INFO [main] org.apache.catalina.startup.HostConfig.deployDirectory Deploying web application directory [C:\apache-tomcat-9.0.27\webapps\docs] 15-Nov-2019 12:32:21.400 WARNING [main] org.apache.catalina.util.SessionIdGeneratorBase.createSecureRandom Creation of SecureRandom instance for session ID generation using [SHA1PRNG] took [628] milliseconds. 15-Nov-2019 12:32:21.471 INFO [main] org.apache.catalina.startup.HostConfig.deployDirectory Deployment of web application directory [C:\apache-tomcat-9.0.27\webapps\docs] has finished in [2,235] ms 15-Nov-2019 12:32:21.472 INFO [main] org.apache.catalina.startup.HostConfig.deployDirectory Deploying web application directory [C:\apache-tomcat-9.0.27\webapps\examples] 15-Nov-2019 12:32:23.754 INFO [main] org.apache.catalina.startup.HostConfig.deployDirectory Deployment of web application directory [C:\apache-tomcat-9.0.27\webapps\examples] has finished in [2,282] ms 15-Nov-2019 12:32:23.756 INFO [main] org.apache.catalina.startup.HostConfig.deployDirectory Deploying web application directory [C:\apache-tomcat-9.0.27\webapps\host-manager] 15-Nov-2019 12:32:24.009 INFO [main] org.apache.catalina.startup.HostConfig.deployDirectory Deployment of web application directory [C:\apache-tomcat-9.0.27\webapps\host-manager] has finished in [252] ms 15-Nov-2019 12:32:24.013 INFO [main] org.apache.catalina.startup.HostConfig.deployDirectory Deploying web application directory [C:\apache-tomcat-9.0.27\webapps\manager] 15-Nov-2019 12:32:24.225 INFO [main] org.apache.catalina.startup.HostConfig.deployDirectory Deployment of web application directory [C:\apache-tomcat-9.0.27\webapps\manager] has finished in [212] ms 15-Nov-2019 12:32:24.227 INFO [main] org.apache.catalina.startup.HostConfig.deployDirectory Deploying web application directory [C:\apache-tomcat-9.0.27\webapps\ROOT] 15-Nov-2019 12:32:24.420 INFO [main] org.apache.catalina.startup.HostConfig.deployDirectory Deployment of web application directory [C:\apache-tomcat-9.0.27\webapps\ROOT] has finished in [192] ms 15-Nov-2019 12:32:24.439 INFO [main] org.apache.coyote.AbstractProtocol.start Starting ProtocolHandler ["http-nio-8080"] 15-Nov-2019 12:32:24.527 INFO [main] org.apache.coyote.AbstractProtocol.start Starting ProtocolHandler ["https-jsse-nio-8443"] 15-Nov-2019 12:32:24.552 INFO [main] org.apache.coyote.AbstractProtocol.start Starting ProtocolHandler ["ajp-nio-8009"] 15-Nov-2019 12:32:24.570 INFO [main] org.apache.catalina.startup.Catalina.start Server startup in [5,543] milliseconds 15-Nov-2019 12:34:05.967 FINE [https-jsse-nio-8443-exec-1] org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun Error during SSL handshake java.io.IOException: Found an plain text HTTP request on what should be an encrypted TLS connection at org.apache.tomcat.util.net.SecureNioChannel.processSNI(SecureNioChannel.java:322) at org.apache.tomcat.util.net.SecureNioChannel.handshake(SecureNioChannel.java:175) at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1556) at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49) at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128) at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628) at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61) at java.base/java.lang.Thread.run(Thread.java:830) 15-Nov-2019 12:34:06.362 FINE [https-jsse-nio-8443-exec-1] org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper.doClose Calling [org.apache.tomcat.util.net.NioEndpoint@7bbe663e].closeSocket([org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper@73f252ec:org.apache.tomcat.util.net.SecureNioChannel@7182441e:java.nio.channels.SocketChannel[connected local=/0:0:0:0:0:0:0:1:8443 remote=/0:0:0:0:0:0:0:1:65294]]) java.lang.Exception at org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper.doClose(NioEndpoint.java:1163) at org.apache.tomcat.util.net.SocketWrapperBase.close(SocketWrapperBase.java:402) at org.apache.tomcat.util.net.NioEndpoint$Poller.cancelledKey(NioEndpoint.java:665) at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1586) at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49) at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128) at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628) at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61) at java.base/java.lang.Thread.run(Thread.java:830) 15-Nov-2019 12:34:06.366 SEVERE [https-jsse-nio-8443-exec-1] org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper.doClose Failed to close channel java.lang.NullPointerException at org.apache.tomcat.util.net.SecureNioChannel.close(SecureNioChannel.java:534) at org.apache.tomcat.util.net.SecureNioChannel.close(SecureNioChannel.java:560) at org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper.doClose(NioEndpoint.java:1169) at org.apache.tomcat.util.net.SocketWrapperBase.close(SocketWrapperBase.java:402) at org.apache.tomcat.util.net.NioEndpoint$Poller.cancelledKey(NioEndpoint.java:665) at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1586) at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49) at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128) at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628) at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61) at java.base/java.lang.Thread.run(Thread.java:830) 15-Nov-2019 12:34:06.431 FINE [https-jsse-nio-8443-exec-2] org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun Error during SSL handshake java.io.IOException: Found an plain text HTTP request on what should be an encrypted TLS connection at org.apache.tomcat.util.net.SecureNioChannel.processSNI(SecureNioChannel.java:322) at org.apache.tomcat.util.net.SecureNioChannel.handshake(SecureNioChannel.java:175) at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1556) at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49) at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128) at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628) at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61) at java.base/java.lang.Thread.run(Thread.java:830) 15-Nov-2019 12:34:06.450 FINE [https-jsse-nio-8443-exec-2] org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper.doClose Calling [org.apache.tomcat.util.net.NioEndpoint@7bbe663e].closeSocket([org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper@2d342ff5:org.apache.tomcat.util.net.SecureNioChannel@290bbe0c:java.nio.channels.SocketChannel[connected local=/0:0:0:0:0:0:0:1:8443 remote=/0:0:0:0:0:0:0:1:65295]]) java.lang.Exception at org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper.doClose(NioEndpoint.java:1163) at org.apache.tomcat.util.net.SocketWrapperBase.close(SocketWrapperBase.java:402) at org.apache.tomcat.util.net.NioEndpoint$Poller.cancelledKey(NioEndpoint.java:665) at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1586) at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49) at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128) at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628) at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61) at java.base/java.lang.Thread.run(Thread.java:830) 15-Nov-2019 12:34:06.452 SEVERE [https-jsse-nio-8443-exec-2] org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper.doClose Failed to close channel java.lang.NullPointerException at org.apache.tomcat.util.net.SecureNioChannel.close(SecureNioChannel.java:534) at org.apache.tomcat.util.net.SecureNioChannel.close(SecureNioChannel.java:560) at org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper.doClose(NioEndpoint.java:1169) at org.apache.tomcat.util.net.SocketWrapperBase.close(SocketWrapperBase.java:402) at org.apache.tomcat.util.net.NioEndpoint$Poller.cancelledKey(NioEndpoint.java:665) at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1586) at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49) at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128) at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628) at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61) at java.base/java.lang.Thread.run(Thread.java:830) 15-Nov-2019 12:34:10.800 FINE [https-jsse-nio-8443-exec-3] org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper.doClose Calling [org.apache.tomcat.util.net.NioEndpoint@7bbe663e].closeSocket([org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper@2e9d0767:org.apache.tomcat.util.net.SecureNioChannel@205aed1c:java.nio.channels.SocketChannel[connected local=/0:0:0:0:0:0:0:1:8443 remote=/0:0:0:0:0:0:0:1:65293]]) java.lang.Exception at org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper.doClose(NioEndpoint.java:1163) at org.apache.tomcat.util.net.SocketWrapperBase.close(SocketWrapperBase.java:402) at org.apache.tomcat.util.net.NioEndpoint$Poller.cancelledKey(NioEndpoint.java:665) at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1586) at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49) at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128) at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628) at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61) at java.base/java.lang.Thread.run(Thread.java:830) 15-Nov-2019 12:34:10.802 SEVERE [https-jsse-nio-8443-exec-3] org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper.doClose Failed to close channel java.lang.NullPointerException at org.apache.tomcat.util.net.SecureNioChannel.close(SecureNioChannel.java:534) at org.apache.tomcat.util.net.SecureNioChannel.close(SecureNioChannel.java:560) at org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper.doClose(NioEndpoint.java:1169) at org.apache.tomcat.util.net.SocketWrapperBase.close(SocketWrapperBase.java:402) at org.apache.tomcat.util.net.NioEndpoint$Poller.cancelledKey(NioEndpoint.java:665) at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1586) at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49) at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128) at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628) at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61) at java.base/java.lang.Thread.run(Thread.java:830) 15-Nov-2019 12:34:51.858 FINE [https-jsse-nio-8443-exec-4] org.apache.tomcat.util.net.SecureNioChannel.processSNI The SNI host name extracted for connection [java.nio.channels.SocketChannel[connected local=/0:0:0:0:0:0:0:1:8443 remote=/0:0:0:0:0:0:0:1:65302]] was [localhost] javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:34:51.892 IST|HandshakeContext.java:297|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 for TLS10 javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:34:51.896 IST|HandshakeContext.java:297|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 for TLS10 javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:34:51.897 IST|HandshakeContext.java:297|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLS10 javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:34:51.898 IST|HandshakeContext.java:297|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLS10 javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:34:51.930 IST|HandshakeContext.java:297|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 for TLS13 javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:34:51.931 IST|HandshakeContext.java:297|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 for TLS13 javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:34:51.932 IST|HandshakeContext.java:297|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLS13 javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:34:51.933 IST|HandshakeContext.java:297|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLS13 javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:34:51.934 IST|HandshakeContext.java:297|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA for TLS13 javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:34:51.935 IST|HandshakeContext.java:297|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA for TLS13 javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:34:51.938 IST|HandshakeContext.java:297|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 for TLS11 javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:34:51.938 IST|HandshakeContext.java:297|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 for TLS11 javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:34:51.939 IST|HandshakeContext.java:297|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLS11 javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:34:51.939 IST|HandshakeContext.java:297|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLS11 javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:34:51.998 IST|SSLExtensions.java:132|Ignore unknown or unsupported extension ( "unknown extension (28)": { 0000: 40 01 @. } ) javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:34:52.004 IST|SSLExtensions.java:132|Ignore unknown or unsupported extension ( "unknown extension (21)": { 0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0090: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ............... } ) javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:34:52.069 IST|ClientHello.java:808|Consuming ClientHello handshake message ( "ClientHello": { "client version" : "TLSv1.2", "random" : "4D 6E 04 8B 84 3F FA 09 0E B4 AF FC 0A 5B 09 F8 B0 3E BC 88 20 28 F0 94 66 8D 19 B3 71 54 05 2F", "session id" : "A7 15 19 A4 28 67 61 6A 78 2C DB D7 E1 3C 45 3D ED 2B E7 6F 8F B7 A7 3B A1 2E 47 FA 6B BF C4 F3", "cipher suites" : "[TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_AES_256_GCM_SHA384(0x1302), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA(0xC00A), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA(0xC009), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA(0xC013), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA(0xC014), TLS_DHE_RSA_WITH_AES_128_CBC_SHA(0x0033), TLS_DHE_RSA_WITH_AES_256_CBC_SHA(0x0039), TLS_RSA_WITH_AES_128_CBC_SHA(0x002F), TLS_RSA_WITH_AES_256_CBC_SHA(0x0035), SSL_RSA_WITH_3DES_EDE_CBC_SHA(0x000A)]", "compression methods" : "00", "extensions" : [ "server_name (0)": { type=host_name (0), value=localhost }, "extended_master_secret (23)": { }, "renegotiation_info (65,281)": { "renegotiated connection": [] }, "supported_groups (10)": { "versions": [x25519, secp256r1, secp384r1, secp521r1, ffdhe2048, ffdhe3072] }, "ec_point_formats (11)": { "formats": [uncompressed] }, "application_layer_protocol_negotiation (16)": { [h2, http/1.1] }, "status_request (5)": { "certificate status type": ocsp "OCSP status request": { "responder_id": "request extensions": { } } }, "key_share (51)": { "client_shares": [ { "named group": x25519 "key_exchange": { 0000: 45 7C 01 BF 99 9E 7B DE CC 37 37 32 F1 CE 6F 01 E........772..o. 0010: 40 E4 B4 33 10 5B B0 B1 4B FF 81 32 EC AD E6 56 @..3.[..K..2...V } }, { "named group": secp256r1 "key_exchange": { 0000: 04 05 9B CC EF 2F B3 7F 51 94 3E 01 81 F1 5C E0 ...../..Q.>...\. 0010: 3B 99 7D E6 A3 D4 AD 49 B2 9A B0 43 05 BD CA 0B ;......I...C.... 0020: 2B BE 64 C0 5A 4A 7C 3E 0F C8 4B E2 F3 27 22 BA +.d.ZJ.>..K..'". 0030: 1D 28 42 B0 6B 62 D2 EA 86 B6 F2 9F E1 33 AC 56 .(B.kb.......3.V 0040: 29 } }, ] }, "supported_versions (43)": { "versions": [TLSv1.3, TLSv1.2, TLSv1.1, TLSv1] }, "signature_algorithms (13)": { "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1] }, "unknown extension (28)": { 0000: 40 01 @. }, "unknown extension (21)": { 0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0090: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ............... } ] } ) javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:34:52.070 IST|SSLExtensions.java:189|Consumed extension: supported_versions javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:34:52.070 IST|ClientHello.java:838|Negotiated protocol version: TLSv1.3 javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:34:52.072 IST|PskKeyExchangeModesExtension.java:293|abort session resumption, no supported psk_dhe_ke PSK key exchange mode javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:34:52.073 IST|PreSharedKeyExtension.java:840|Handling pre_shared_key absence. javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:34:52.074 IST|ServerNameExtension.java:327|no server name matchers, ignore server name indication javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:34:52.075 IST|SSLExtensions.java:189|Consumed extension: server_name javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:34:52.075 IST|SSLExtensions.java:170|Ignore unavailable extension: max_fragment_length javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:34:52.077 IST|SSLExtensions.java:189|Consumed extension: status_request javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:34:52.078 IST|SSLExtensions.java:189|Consumed extension: supported_groups javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:34:52.079 IST|SSLExtensions.java:160|Ignore unsupported extension: ec_point_formats javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:34:52.080 IST|SSLExtensions.java:189|Consumed extension: signature_algorithms javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:34:52.080 IST|SSLExtensions.java:170|Ignore unavailable extension: signature_algorithms_cert javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:34:52.081 IST|AlpnExtension.java:277|Ignore server unenabled extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:34:52.081 IST|SSLExtensions.java:189|Consumed extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:34:52.082 IST|SSLExtensions.java:160|Ignore unsupported extension: status_request_v2 javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:34:52.082 IST|SSLExtensions.java:160|Ignore unsupported extension: extended_master_secret javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:34:52.083 IST|SSLExtensions.java:160|Ignore unsupported extension: session_ticket javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:34:52.083 IST|SSLExtensions.java:170|Ignore unavailable extension: cookie javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:34:52.098 IST|SSLExtensions.java:189|Consumed extension: key_share javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:34:52.099 IST|SSLExtensions.java:160|Ignore unsupported extension: renegotiation_info javax.net.ssl|ALL|24|https-jsse-nio-8443-exec-4|2019-11-15 12:34:52.101 IST|SignatureScheme.java:359|Ignore disabled signature scheme: rsa_md5 javax.net.ssl|WARNING|24|https-jsse-nio-8443-exec-4|2019-11-15 12:34:52.103 IST|SSLExtensions.java:212|Ignore impact of unsupported extension: server_name javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:34:52.103 IST|SSLExtensions.java:204|Ignore unavailable extension: max_fragment_length javax.net.ssl|WARNING|24|https-jsse-nio-8443-exec-4|2019-11-15 12:34:52.104 IST|SSLExtensions.java:212|Ignore impact of unsupported extension: status_request javax.net.ssl|WARNING|24|https-jsse-nio-8443-exec-4|2019-11-15 12:34:52.104 IST|SSLExtensions.java:212|Ignore impact of unsupported extension: supported_groups javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:34:52.106 IST|SSLExtensions.java:221|Populated with extension: signature_algorithms javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:34:52.107 IST|SSLExtensions.java:204|Ignore unavailable extension: signature_algorithms_cert javax.net.ssl|WARNING|24|https-jsse-nio-8443-exec-4|2019-11-15 12:34:52.107 IST|SSLExtensions.java:212|Ignore impact of unsupported extension: application_layer_protocol_negotiation javax.net.ssl|WARNING|24|https-jsse-nio-8443-exec-4|2019-11-15 12:34:52.108 IST|SSLExtensions.java:212|Ignore impact of unsupported extension: supported_versions javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:34:52.108 IST|SSLExtensions.java:204|Ignore unavailable extension: cookie javax.net.ssl|WARNING|24|https-jsse-nio-8443-exec-4|2019-11-15 12:34:52.108 IST|SSLExtensions.java:212|Ignore impact of unsupported extension: key_share javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:34:52.109 IST|SSLExtensions.java:204|Ignore unavailable extension: pre_shared_key javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:34:52.110 IST|ServerHello.java:733|use cipher suite TLS_AES_128_GCM_SHA256 javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:34:52.162 IST|SSLExtensions.java:257|Ignore, context unavailable extension: pre_shared_key javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:34:52.165 IST|ServerHello.java:587|Produced ServerHello handshake message ( "ServerHello": { "server version" : "TLSv1.2", "random" : "3D 20 03 6C 14 23 02 30 E9 FF 5E CE 30 54 08 DA E5 5F A9 C0 A6 F6 1E 11 A2 08 8C 57 7A BA 61 BD", "session id" : "A7 15 19 A4 28 67 61 6A 78 2C DB D7 E1 3C 45 3D ED 2B E7 6F 8F B7 A7 3B A1 2E 47 FA 6B BF C4 F3", "cipher suite" : "TLS_AES_128_GCM_SHA256(0x1301)", "compression methods" : "00", "extensions" : [ "supported_versions (43)": { "selected version": [TLSv1.3] }, "key_share (51)": { "server_share": { "named group": x25519 "key_exchange": { 0000: 72 FC 7D 73 ED A5 D7 92 94 43 91 03 5C 37 5D AD r..s.....C..\7]. 0010: 77 9C B5 4D 3E 18 45 0B 70 2F 84 1C C8 F2 34 05 w..M>.E.p/....4. } }, } ] } ) javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:34:52.218 IST|SSLCipher.java:1867|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE countdown value = 137438953472 javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:34:52.229 IST|SSLCipher.java:2021|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE countdown value = 137438953472 javax.net.ssl|ALL|24|https-jsse-nio-8443-exec-4|2019-11-15 12:34:52.231 IST|ServerNameExtension.java:537|No expected server name indication response javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:34:52.237 IST|SSLExtensions.java:257|Ignore, context unavailable extension: server_name javax.net.ssl|ALL|24|https-jsse-nio-8443-exec-4|2019-11-15 12:34:52.238 IST|MaxFragExtension.java:469|Ignore unavailable max_fragment_length extension javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:34:52.239 IST|SSLExtensions.java:257|Ignore, context unavailable extension: max_fragment_length javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:34:52.242 IST|AlpnExtension.java:365|Ignore unavailable extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:34:52.243 IST|SSLExtensions.java:257|Ignore, context unavailable extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:34:52.245 IST|EncryptedExtensions.java:137|Produced EncryptedExtensions message ( "EncryptedExtensions": [ "supported_groups (10)": { "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192] } ] ) javax.net.ssl|ALL|24|https-jsse-nio-8443-exec-4|2019-11-15 12:34:52.249 IST|SignatureScheme.java:364|Ignore inactive signature scheme: dsa_sha256 javax.net.ssl|ALL|24|https-jsse-nio-8443-exec-4|2019-11-15 12:34:52.250 IST|SignatureScheme.java:364|Ignore inactive signature scheme: dsa_sha1 javax.net.ssl|ALL|24|https-jsse-nio-8443-exec-4|2019-11-15 12:34:52.251 IST|SignatureScheme.java:364|Ignore inactive signature scheme: rsa_md5 javax.net.ssl|ALL|24|https-jsse-nio-8443-exec-4|2019-11-15 12:34:52.254 IST|SignatureScheme.java:364|Ignore inactive signature scheme: dsa_sha256 javax.net.ssl|ALL|24|https-jsse-nio-8443-exec-4|2019-11-15 12:34:52.255 IST|SignatureScheme.java:364|Ignore inactive signature scheme: dsa_sha1 javax.net.ssl|ALL|24|https-jsse-nio-8443-exec-4|2019-11-15 12:34:52.256 IST|SignatureScheme.java:364|Ignore inactive signature scheme: rsa_md5 javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:34:52.259 IST|CertificateRequest.java:882|Produced CertificateRequest message ( "CertificateRequest": { "certificate_request_context": "", "extensions": [ "signature_algorithms (13)": { "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1] }, "signature_algorithms_cert (50)": { "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1] } ] } ) javax.net.ssl|ALL|24|https-jsse-nio-8443-exec-4|2019-11-15 12:34:52.263 IST|X509Authentication.java:295|No X.509 cert selected for EC javax.net.ssl|WARNING|24|https-jsse-nio-8443-exec-4|2019-11-15 12:34:52.264 IST|CertificateMessage.java:1062|Unavailable authentication scheme: ecdsa_secp256r1_sha256 javax.net.ssl|ALL|24|https-jsse-nio-8443-exec-4|2019-11-15 12:34:52.266 IST|X509Authentication.java:295|No X.509 cert selected for EC javax.net.ssl|WARNING|24|https-jsse-nio-8443-exec-4|2019-11-15 12:34:52.269 IST|CertificateMessage.java:1062|Unavailable authentication scheme: ecdsa_secp384r1_sha384 javax.net.ssl|ALL|24|https-jsse-nio-8443-exec-4|2019-11-15 12:34:52.270 IST|X509Authentication.java:295|No X.509 cert selected for EC javax.net.ssl|WARNING|24|https-jsse-nio-8443-exec-4|2019-11-15 12:34:52.271 IST|CertificateMessage.java:1062|Unavailable authentication scheme: ecdsa_secp521r1_sha512 javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:34:52.276 IST|StatusResponseManager.java:763|Staping disabled or is a resumed session javax.net.ssl|ALL|24|https-jsse-nio-8443-exec-4|2019-11-15 12:34:52.278 IST|CertStatusExtension.java:1115|Stapling is disabled for this connection javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:34:52.281 IST|SSLExtensions.java:257|Ignore, context unavailable extension: status_request javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:34:52.307 IST|CertificateMessage.java:1001|Produced server Certificate message ( "Certificate": { "certificate_request_context": "", "certificate_list": [ { "certificate" : { "version" : "v3", "serial number" : "3B FD 86 4A 58 09 72 F6", "signature algorithm": "SHA512withRSA", "issuer" : "CN=localhost", "not before" : "2019-11-05 13:41:52.000 IST", "not after" : "2020-11-05 13:41:52.000 IST", "subject" : "CN=localhost", "subject public key" : "RSA", "extensions" : [ { ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:false PathLen:2147483647 ] }, { ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_Encipherment Data_Encipherment ] } ]} "extensions": { } }, ] } ) javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:34:52.504 IST|CertificateVerify.java:1080|Produced server CertificateVerify handshake message ( "CertificateVerify": { "signature algorithm": rsa_pss_rsae_sha256 "signature": { 0000: 7D 3E 5A 21 0A DF F2 B2 56 9F 10 55 3B A2 78 CD .>Z!....V..U;.x. 0010: 95 AF 13 DC D1 CA C1 BF 3C A5 A2 D1 21 F6 11 FE ........<...!... 0020: EC 98 35 94 4B 42 29 98 87 5A 07 04 84 84 4D 9C ..5.KB)..Z....M. 0030: 31 7B FB 29 F2 F9 4E 09 DA DB 8E 6A 59 34 7C D5 1..)..N....jY4.. 0040: 0B 46 CB 86 49 CF AA 84 A7 70 87 9F B7 26 55 19 .F..I....p...&U. 0050: 86 1A F1 EE 50 9A 40 3C 07 FB 7C 3D 9C 20 13 8A ....P.@<...=. .. 0060: 6C D6 7C C7 AC ED C7 32 ED 6C F6 BD BB 37 5D DE l......2.l...7]. 0070: 8E C9 26 71 5B 32 33 42 E1 82 FA F9 D4 71 A3 66 ..&q[23B.....q.f 0080: AA C2 4F 21 33 3A 96 A6 4D D5 54 55 69 86 78 4A ..O!3:..M.TUi.xJ 0090: FB 72 AF 08 DD 5B 68 80 BD 1F 62 31 A3 39 9D 77 .r...[h...b1.9.w 00A0: 70 74 4C F4 BF 63 59 6E 2F DB 3C 4A F3 70 DC 2E ptL..cYn/.[.....f.4 00C0: 77 E9 DF 01 7E 8A BE 97 4F DC F0 F9 B6 28 2F 66 w.......O....(/f 00D0: 91 8D 09 C5 DF 32 39 8D 36 E3 D1 12 1B DE 8A 10 .....29.6....... 00E0: 4B 38 BD 44 38 F1 25 CB 4F 22 BC C3 99 CA 9D 76 K8.D8.%.O".....v 00F0: B5 20 87 CB 59 3F E3 80 7B E8 75 2C 59 E7 B5 0C . ..Y?....u,Y... } } ) javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:34:52.511 IST|Finished.java:767|Produced server Finished handshake message ( "Finished": { "verify data": { 0000: 24 75 28 20 7C 25 17 E2 8A 33 BA 19 B4 9F D7 BD $u( .%...3...... 0010: F9 BD 32 81 48 C4 31 3D DA 10 DF 9D 1B C0 3D B0 ..2.H.1=......=. }'} ) javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:34:52.515 IST|SSLCipher.java:2021|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE countdown value = 137438953472 javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-15 12:34:54.924 IST|Alert.java:238|Received alert message ( "Alert": { "level" : "fatal", "description": "bad_certificate" } ) javax.net.ssl|ERROR|27|https-jsse-nio-8443-exec-7|2019-11-15 12:34:54.929 IST|TransportContext.java:316|Fatal (BAD_CERTIFICATE): Received fatal alert: bad_certificate ( "throwable" : { javax.net.ssl.SSLHandshakeException: Received fatal alert: bad_certificate at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131) at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:117) at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:311) at java.base/sun.security.ssl.Alert$AlertConsumer.consume(Alert.java:285) at java.base/sun.security.ssl.TransportContext.dispatch(TransportContext.java:184) at java.base/sun.security.ssl.SSLTransport.decode(SSLTransport.java:164) at java.base/sun.security.ssl.SSLEngineImpl.decode(SSLEngineImpl.java:729) at java.base/sun.security.ssl.SSLEngineImpl.readRecord(SSLEngineImpl.java:684) at java.base/sun.security.ssl.SSLEngineImpl.unwrap(SSLEngineImpl.java:499) at java.base/sun.security.ssl.SSLEngineImpl.unwrap(SSLEngineImpl.java:475) at java.base/javax.net.ssl.SSLEngine.unwrap(SSLEngine.java:634) at org.apache.tomcat.util.net.SecureNioChannel.handshakeUnwrap(SecureNioChannel.java:499) at org.apache.tomcat.util.net.SecureNioChannel.handshake(SecureNioChannel.java:238) at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1556) at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49) at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128) at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628) at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61) at java.base/java.lang.Thread.run(Thread.java:830)} ) 15-Nov-2019 12:34:54.932 FINE [https-jsse-nio-8443-exec-7] org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun Error during SSL handshake javax.net.ssl.SSLHandshakeException: Received fatal alert: bad_certificate at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131) at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:117) at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:311) at java.base/sun.security.ssl.Alert$AlertConsumer.consume(Alert.java:285) at java.base/sun.security.ssl.TransportContext.dispatch(TransportContext.java:184) at java.base/sun.security.ssl.SSLTransport.decode(SSLTransport.java:164) at java.base/sun.security.ssl.SSLEngineImpl.decode(SSLEngineImpl.java:729) at java.base/sun.security.ssl.SSLEngineImpl.readRecord(SSLEngineImpl.java:684) at java.base/sun.security.ssl.SSLEngineImpl.unwrap(SSLEngineImpl.java:499) at java.base/sun.security.ssl.SSLEngineImpl.unwrap(SSLEngineImpl.java:475) at java.base/javax.net.ssl.SSLEngine.unwrap(SSLEngine.java:634) at org.apache.tomcat.util.net.SecureNioChannel.handshakeUnwrap(SecureNioChannel.java:499) at org.apache.tomcat.util.net.SecureNioChannel.handshake(SecureNioChannel.java:238) at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1556) at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49) at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128) at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628) at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61) at java.base/java.lang.Thread.run(Thread.java:830) 15-Nov-2019 12:34:54.936 FINE [https-jsse-nio-8443-exec-7] org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper.doClose Calling [org.apache.tomcat.util.net.NioEndpoint@7bbe663e].closeSocket([org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper@7d53ebea:org.apache.tomcat.util.net.SecureNioChannel@28cdd70:java.nio.channels.SocketChannel[connected local=/0:0:0:0:0:0:0:1:8443 remote=/0:0:0:0:0:0:0:1:65302]]) java.lang.Exception at org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper.doClose(NioEndpoint.java:1163) at org.apache.tomcat.util.net.SocketWrapperBase.close(SocketWrapperBase.java:402) at org.apache.tomcat.util.net.NioEndpoint$Poller.cancelledKey(NioEndpoint.java:665) at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1586) at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49) at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128) at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628) at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61) at java.base/java.lang.Thread.run(Thread.java:830) 15-Nov-2019 12:35:06.502 FINE [https-jsse-nio-8443-exec-8] org.apache.tomcat.util.net.SecureNioChannel.processSNI The SNI host name extracted for connection [java.nio.channels.SocketChannel[connected local=/0:0:0:0:0:0:0:1:8443 remote=/0:0:0:0:0:0:0:1:65308]] was [localhost] javax.net.ssl|DEBUG|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:06.506 IST|HandshakeContext.java:297|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 for TLS10 javax.net.ssl|DEBUG|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:06.507 IST|HandshakeContext.java:297|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 for TLS10 javax.net.ssl|DEBUG|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:06.510 IST|HandshakeContext.java:297|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLS10 javax.net.ssl|DEBUG|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:06.510 IST|HandshakeContext.java:297|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLS10 javax.net.ssl|DEBUG|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:06.513 IST|HandshakeContext.java:297|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 for TLS13 javax.net.ssl|DEBUG|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:06.514 IST|HandshakeContext.java:297|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 for TLS13 javax.net.ssl|DEBUG|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:06.514 IST|HandshakeContext.java:297|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLS13 javax.net.ssl|DEBUG|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:06.515 IST|HandshakeContext.java:297|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLS13 javax.net.ssl|DEBUG|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:06.515 IST|HandshakeContext.java:297|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA for TLS13 javax.net.ssl|DEBUG|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:06.515 IST|HandshakeContext.java:297|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA for TLS13 javax.net.ssl|DEBUG|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:06.516 IST|HandshakeContext.java:297|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 for TLS11 javax.net.ssl|DEBUG|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:06.517 IST|HandshakeContext.java:297|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 for TLS11 javax.net.ssl|DEBUG|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:06.517 IST|HandshakeContext.java:297|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLS11 javax.net.ssl|DEBUG|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:06.518 IST|HandshakeContext.java:297|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLS11 javax.net.ssl|DEBUG|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:06.523 IST|SSLExtensions.java:132|Ignore unknown or unsupported extension ( "unknown extension (28)": { 0000: 40 01 @. } ) javax.net.ssl|DEBUG|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:06.525 IST|SSLExtensions.java:132|Ignore unknown or unsupported extension ( "unknown extension (21)": { 0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0090: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ............... } ) javax.net.ssl|DEBUG|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:06.538 IST|ClientHello.java:808|Consuming ClientHello handshake message ( "ClientHello": { "client version" : "TLSv1.2", "random" : "39 B2 83 FB 2E 0D A3 8B FD 82 82 9F D2 74 26 A9 E6 CA 9F F0 83 2A D5 74 35 A7 85 F8 96 6D 89 0A", "session id" : "93 45 C8 C3 F1 FE A1 2C 29 AB 2D CC 9E 12 38 E1 C7 91 30 20 A3 CD A2 16 4B F2 77 6F 05 72 FB 05", "cipher suites" : "[TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_AES_256_GCM_SHA384(0x1302), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA(0xC00A), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA(0xC009), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA(0xC013), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA(0xC014), TLS_DHE_RSA_WITH_AES_128_CBC_SHA(0x0033), TLS_DHE_RSA_WITH_AES_256_CBC_SHA(0x0039), TLS_RSA_WITH_AES_128_CBC_SHA(0x002F), TLS_RSA_WITH_AES_256_CBC_SHA(0x0035), SSL_RSA_WITH_3DES_EDE_CBC_SHA(0x000A)]", "compression methods" : "00", "extensions" : [ "server_name (0)": { type=host_name (0), value=localhost }, "extended_master_secret (23)": { }, "renegotiation_info (65,281)": { "renegotiated connection": [] }, "supported_groups (10)": { "versions": [x25519, secp256r1, secp384r1, secp521r1, ffdhe2048, ffdhe3072] }, "ec_point_formats (11)": { "formats": [uncompressed] }, "application_layer_protocol_negotiation (16)": { [h2, http/1.1] }, "status_request (5)": { "certificate status type": ocsp "OCSP status request": { "responder_id": "request extensions": { } } }, "key_share (51)": { "client_shares": [ { "named group": x25519 "key_exchange": { 0000: 2E CD C9 2A 02 A6 74 46 C6 2B D5 D3 22 30 48 D8 ...*..tF.+.."0H. 0010: 09 81 D9 4E 1C A2 3D 39 93 47 06 9B 98 38 8F 6F ...N..=9.G...8.o } }, { "named group": secp256r1 "key_exchange": { 0000: 04 62 BD 80 E5 08 AD 56 32 35 DC 61 46 B1 C6 29 .b.....V25.aF..) 0010: 16 62 3B 35 AC 84 4A AB 02 DB C4 4B AC A4 2D 86 .b;5..J....K..-. 0020: A1 A3 EB DB B3 E2 94 2F AD FF D2 43 4A CB E5 93 ......./...CJ... 0030: 46 FE 28 1A D6 1D 91 9E F0 38 59 0B 0B 33 78 3C F.(......8Y..3x< 0040: 16 } }, ] }, "supported_versions (43)": { "versions": [TLSv1.3, TLSv1.2, TLSv1.1, TLSv1] }, "signature_algorithms (13)": { "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1] }, "unknown extension (28)": { 0000: 40 01 @. }, "unknown extension (21)": { 0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0090: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ............... } ] } ) javax.net.ssl|DEBUG|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:06.538 IST|SSLExtensions.java:189|Consumed extension: supported_versions javax.net.ssl|DEBUG|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:06.539 IST|ClientHello.java:838|Negotiated protocol version: TLSv1.3 javax.net.ssl|DEBUG|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:06.539 IST|PskKeyExchangeModesExtension.java:293|abort session resumption, no supported psk_dhe_ke PSK key exchange mode javax.net.ssl|DEBUG|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:06.539 IST|PreSharedKeyExtension.java:840|Handling pre_shared_key absence. javax.net.ssl|DEBUG|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:06.540 IST|ServerNameExtension.java:327|no server name matchers, ignore server name indication javax.net.ssl|DEBUG|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:06.540 IST|SSLExtensions.java:189|Consumed extension: server_name javax.net.ssl|DEBUG|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:06.541 IST|SSLExtensions.java:170|Ignore unavailable extension: max_fragment_length javax.net.ssl|DEBUG|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:06.541 IST|SSLExtensions.java:189|Consumed extension: status_request javax.net.ssl|DEBUG|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:06.542 IST|SSLExtensions.java:189|Consumed extension: supported_groups javax.net.ssl|DEBUG|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:06.542 IST|SSLExtensions.java:160|Ignore unsupported extension: ec_point_formats javax.net.ssl|DEBUG|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:06.545 IST|SSLExtensions.java:189|Consumed extension: signature_algorithms javax.net.ssl|DEBUG|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:06.546 IST|SSLExtensions.java:170|Ignore unavailable extension: signature_algorithms_cert javax.net.ssl|DEBUG|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:06.546 IST|AlpnExtension.java:277|Ignore server unenabled extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:06.547 IST|SSLExtensions.java:189|Consumed extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:06.547 IST|SSLExtensions.java:160|Ignore unsupported extension: status_request_v2 javax.net.ssl|DEBUG|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:06.548 IST|SSLExtensions.java:160|Ignore unsupported extension: extended_master_secret javax.net.ssl|DEBUG|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:06.548 IST|SSLExtensions.java:160|Ignore unsupported extension: session_ticket javax.net.ssl|DEBUG|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:06.549 IST|SSLExtensions.java:170|Ignore unavailable extension: cookie javax.net.ssl|DEBUG|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:06.551 IST|SSLExtensions.java:189|Consumed extension: key_share javax.net.ssl|DEBUG|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:06.551 IST|SSLExtensions.java:160|Ignore unsupported extension: renegotiation_info javax.net.ssl|ALL|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:06.553 IST|SignatureScheme.java:359|Ignore disabled signature scheme: rsa_md5 javax.net.ssl|WARNING|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:06.555 IST|SSLExtensions.java:212|Ignore impact of unsupported extension: server_name javax.net.ssl|DEBUG|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:06.555 IST|SSLExtensions.java:204|Ignore unavailable extension: max_fragment_length javax.net.ssl|WARNING|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:06.556 IST|SSLExtensions.java:212|Ignore impact of unsupported extension: status_request javax.net.ssl|WARNING|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:06.556 IST|SSLExtensions.java:212|Ignore impact of unsupported extension: supported_groups javax.net.ssl|DEBUG|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:06.558 IST|SSLExtensions.java:221|Populated with extension: signature_algorithms javax.net.ssl|DEBUG|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:06.559 IST|SSLExtensions.java:204|Ignore unavailable extension: signature_algorithms_cert javax.net.ssl|WARNING|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:06.559 IST|SSLExtensions.java:212|Ignore impact of unsupported extension: application_layer_protocol_negotiation javax.net.ssl|WARNING|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:06.560 IST|SSLExtensions.java:212|Ignore impact of unsupported extension: supported_versions javax.net.ssl|DEBUG|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:06.560 IST|SSLExtensions.java:204|Ignore unavailable extension: cookie javax.net.ssl|WARNING|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:06.561 IST|SSLExtensions.java:212|Ignore impact of unsupported extension: key_share javax.net.ssl|DEBUG|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:06.561 IST|SSLExtensions.java:204|Ignore unavailable extension: pre_shared_key javax.net.ssl|DEBUG|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:06.562 IST|ServerHello.java:733|use cipher suite TLS_AES_128_GCM_SHA256 javax.net.ssl|DEBUG|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:06.573 IST|SSLExtensions.java:257|Ignore, context unavailable extension: pre_shared_key javax.net.ssl|DEBUG|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:06.575 IST|ServerHello.java:587|Produced ServerHello handshake message ( "ServerHello": { "server version" : "TLSv1.2", "random" : "1B 08 A5 30 32 9D E4 52 68 55 C9 1A 07 AA 11 4C 5E BA D5 29 B4 42 E0 51 E9 98 48 BF 35 A6 43 EC", "session id" : "93 45 C8 C3 F1 FE A1 2C 29 AB 2D CC 9E 12 38 E1 C7 91 30 20 A3 CD A2 16 4B F2 77 6F 05 72 FB 05", "cipher suite" : "TLS_AES_128_GCM_SHA256(0x1301)", "compression methods" : "00", "extensions" : [ "supported_versions (43)": { "selected version": [TLSv1.3] }, "key_share (51)": { "server_share": { "named group": x25519 "key_exchange": { 0000: B5 F3 8D 15 7A 5B 01 36 18 BB 1E 4B B9 17 57 A7 ....z[.6...K..W. 0010: 4B 16 E3 17 FD 7A 73 E1 B0 87 A5 E7 CE FB DE 53 K....zs........S } }, } ] } ) javax.net.ssl|DEBUG|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:06.586 IST|SSLCipher.java:1867|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE countdown value = 137438953472 javax.net.ssl|DEBUG|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:06.588 IST|SSLCipher.java:2021|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE countdown value = 137438953472 javax.net.ssl|ALL|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:06.588 IST|ServerNameExtension.java:537|No expected server name indication response javax.net.ssl|DEBUG|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:06.589 IST|SSLExtensions.java:257|Ignore, context unavailable extension: server_name javax.net.ssl|ALL|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:06.589 IST|MaxFragExtension.java:469|Ignore unavailable max_fragment_length extension javax.net.ssl|DEBUG|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:06.590 IST|SSLExtensions.java:257|Ignore, context unavailable extension: max_fragment_length javax.net.ssl|DEBUG|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:06.591 IST|AlpnExtension.java:365|Ignore unavailable extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:06.592 IST|SSLExtensions.java:257|Ignore, context unavailable extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:06.593 IST|EncryptedExtensions.java:137|Produced EncryptedExtensions message ( "EncryptedExtensions": [ "supported_groups (10)": { "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192] } ] ) javax.net.ssl|ALL|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:06.594 IST|SignatureScheme.java:364|Ignore inactive signature scheme: dsa_sha256 javax.net.ssl|ALL|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:06.594 IST|SignatureScheme.java:364|Ignore inactive signature scheme: dsa_sha1 javax.net.ssl|ALL|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:06.595 IST|SignatureScheme.java:364|Ignore inactive signature scheme: rsa_md5 javax.net.ssl|ALL|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:06.596 IST|SignatureScheme.java:364|Ignore inactive signature scheme: dsa_sha256 javax.net.ssl|ALL|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:06.596 IST|SignatureScheme.java:364|Ignore inactive signature scheme: dsa_sha1 javax.net.ssl|ALL|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:06.597 IST|SignatureScheme.java:364|Ignore inactive signature scheme: rsa_md5 javax.net.ssl|DEBUG|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:06.600 IST|CertificateRequest.java:882|Produced CertificateRequest message ( "CertificateRequest": { "certificate_request_context": "", "extensions": [ "signature_algorithms (13)": { "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1] }, "signature_algorithms_cert (50)": { "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1] } ] } ) javax.net.ssl|ALL|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:06.601 IST|X509Authentication.java:295|No X.509 cert selected for EC javax.net.ssl|WARNING|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:06.602 IST|CertificateMessage.java:1062|Unavailable authentication scheme: ecdsa_secp256r1_sha256 javax.net.ssl|ALL|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:06.602 IST|X509Authentication.java:295|No X.509 cert selected for EC javax.net.ssl|WARNING|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:06.602 IST|CertificateMessage.java:1062|Unavailable authentication scheme: ecdsa_secp384r1_sha384 javax.net.ssl|ALL|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:06.603 IST|X509Authentication.java:295|No X.509 cert selected for EC javax.net.ssl|WARNING|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:06.603 IST|CertificateMessage.java:1062|Unavailable authentication scheme: ecdsa_secp521r1_sha512 javax.net.ssl|DEBUG|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:06.603 IST|StatusResponseManager.java:763|Staping disabled or is a resumed session javax.net.ssl|ALL|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:06.604 IST|CertStatusExtension.java:1115|Stapling is disabled for this connection javax.net.ssl|DEBUG|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:06.604 IST|SSLExtensions.java:257|Ignore, context unavailable extension: status_request javax.net.ssl|DEBUG|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:06.606 IST|CertificateMessage.java:1001|Produced server Certificate message ( "Certificate": { "certificate_request_context": "", "certificate_list": [ { "certificate" : { "version" : "v3", "serial number" : "3B FD 86 4A 58 09 72 F6", "signature algorithm": "SHA512withRSA", "issuer" : "CN=localhost", "not before" : "2019-11-05 13:41:52.000 IST", "not after" : "2020-11-05 13:41:52.000 IST", "subject" : "CN=localhost", "subject public key" : "RSA", "extensions" : [ { ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:false PathLen:2147483647 ] }, { ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_Encipherment Data_Encipherment ] } ]} "extensions": { } }, ] } ) javax.net.ssl|DEBUG|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:06.719 IST|CertificateVerify.java:1080|Produced server CertificateVerify handshake message ( "CertificateVerify": { "signature algorithm": rsa_pss_rsae_sha256 "signature": { 0000: 24 B8 FE 16 D1 70 77 D7 5D 37 DF 6B 2B 71 DE DE $....pw.]7.k+q.. 0010: 6A E5 3D 82 91 60 C2 11 73 E6 30 19 0A 8F 60 D0 j.=..`..s.0...`. 0020: 38 0A D6 1B 3A B4 86 10 09 FF 7D 5D 7E BA 40 06 8...:......]..@. 0030: D9 4D DE 0D 02 0C 63 5B AD E2 E2 FD 59 C3 5A 31 .M....c[....Y.Z1 0040: 9B 0D 39 FF F8 C6 A9 7E AC 25 BF F8 31 D7 0D 37 ..9......%..1..7 0050: 0B DE 78 29 F1 A6 19 75 6B 2E 1E 63 A5 85 F4 55 ..x)...uk..c...U 0060: A8 DB 99 49 A6 84 11 10 58 D6 77 6E 86 CD D9 9E ...I....X.wn.... 0070: 16 AE 31 44 38 28 E3 9D 8B 96 EC D2 E1 2E 3F 3D ..1D8(........?= 0080: 64 B4 C0 D5 E0 A9 27 B5 D7 2D 1B 3E 65 02 23 BB d.....'..-.>e.#. 0090: 9E 04 57 D9 22 AA D6 D5 1B E5 13 8B 81 94 F4 58 ..W."..........X 00A0: 62 09 D0 D7 70 B8 DF 07 F3 EE BA 1D 98 77 5F 97 b...p........w_. 00B0: 9A 24 75 46 FD 93 A4 2E 1D B3 F4 8D 62 72 53 FA .$uF........brS. 00C0: 28 30 19 F8 10 5C 4A FA 7C B2 01 41 4D 36 45 75 (0...\J....AM6Eu 00D0: 08 4F 3A 01 2B F2 46 79 C8 B3 75 D5 D4 DB 7A 38 .O:.+.Fy..u...z8 00E0: 31 80 2A 41 65 74 39 ED 1F 40 9A C2 F1 6D 7F AC 1.*Aet9..@...m.. 00F0: CE 4A 10 CA 7E 20 67 7F 45 A5 92 C8 69 39 A4 FC .J... g.E...i9.. } } ) javax.net.ssl|DEBUG|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:06.738 IST|Finished.java:767|Produced server Finished handshake message ( "Finished": { "verify data": { 0000: F6 19 91 96 1C BF 0B E1 94 D4 23 03 3F AF FE 58 ..........#.?..X 0010: 79 AE 0D 64 4D A5 1C F1 8D BB 7F 12 13 53 1B 62 y..dM........S.b }'} ) javax.net.ssl|DEBUG|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:06.742 IST|SSLCipher.java:2021|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE countdown value = 137438953472 javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-15 12:35:06.802 IST|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-15 12:35:06.810 IST|CertificateMessage.java:1156|Consuming client Certificate handshake message ( "Certificate": { "certificate_request_context": "", "certificate_list": [ { "certificate" : { "version" : "v3", "serial number" : "2C 8B E3 32 BC 02 24 C0", "signature algorithm": "SHA512withRSA", "issuer" : "CN=client", "not before" : "2019-11-05 13:43:21.000 IST", "not after" : "2020-11-05 13:43:21.000 IST", "subject" : "CN=client", "subject public key" : "RSA", "extensions" : [ { ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:false PathLen:2147483647 ] }, { ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_Encipherment Data_Encipherment ] } ]} "extensions": { } }, ] } ) javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-15 12:35:06.832 IST|CertificateVerify.java:1128|Consuming CertificateVerify handshake message ( "CertificateVerify": { "signature algorithm": rsa_pss_rsae_sha256 "signature": { 0000: 15 AF 0E 1A 77 03 BD 13 72 BE 53 95 AA AF E9 0E ....w...r.S..... 0010: 0F 0B 88 7F 41 C9 09 1D 63 AE A4 D9 45 1D E7 DF ....A...c...E... 0020: AF E3 51 EE 84 2D 79 99 D8 FA 48 9A 3C 3C E6 08 ..Q..-y...H.<<.. 0030: E1 02 3F FD 03 26 29 1D B0 F8 E2 99 54 FB 3E EC ..?..&).....T.>. 0040: 03 37 84 DD E6 29 65 2B 9D 05 7D 7E 3E F2 D3 FD .7...)e+....>... 0050: 8E D8 FB A9 E7 27 BC 9C 54 7D 99 01 38 75 6E 79 .....'..T...8uny 0060: 7B 37 57 7E 17 89 A8 6E 24 CA D9 38 AE 1F 47 3D .7W....n$..8..G= 0070: 60 DD 12 64 D1 9A 8D 1F F7 1E F3 92 5B 17 A7 2F `..d........[../ 0080: A2 72 FA 0F 90 A2 45 0F AB 58 60 81 F2 29 EE 3C .r....E..X`..).< 0090: 46 00 75 59 66 79 46 75 10 71 C0 68 56 51 26 D7 F.uYfyFu.q.hVQ&. 00A0: 87 B7 A5 E1 A7 42 7A 46 A4 EB AD 8C 24 2B C7 02 .....BzF....$+.. 00B0: 87 D1 DA 72 35 DE F1 A7 AC 0D 92 A5 A7 C5 EC 16 ...r5........... 00C0: 53 10 DF 9E B5 83 DC 4D 47 0B 39 CB DC FF F5 9E S......MG.9..... 00D0: 2C 16 79 BB 0E BF 99 FB 15 46 3B E7 05 3B 7C A2 ,.y......F;..;.. 00E0: 23 D4 48 98 72 26 BA 7F 1B 43 7A A6 55 28 ED AA #.H.r&...Cz.U(.. 00F0: 13 70 83 B6 47 A9 38 8F E4 2F 50 CE 9F 69 F5 10 .p..G.8../P..i.. } } ) javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-15 12:35:06.836 IST|Finished.java:1010|Consuming client Finished handshake message ( "Finished": { "verify data": { 0000: 96 C8 49 56 3D 60 E6 F0 76 6F B3 C3 B5 5E E3 03 ..IV=`..vo...^.. 0010: E2 78 91 3C DF 77 CD EB 5A 2B F1 1F 60 E4 6A 47 .x.<.w..Z+..`.jG }'} ) javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-15 12:35:06.839 IST|SSLCipher.java:1867|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE countdown value = 137438953472 javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-15 12:35:06.842 IST|Finished.java:1110|Sending new session ticket 15-Nov-2019 12:35:06.844 FINE [https-jsse-nio-8443-exec-1] org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun Error during SSL handshake java.io.IOException: NOT_HANDSHAKING during handshake at org.apache.tomcat.util.net.SecureNioChannel.handshake(SecureNioChannel.java:193) at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1556) at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49) at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128) at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628) at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61) at java.base/java.lang.Thread.run(Thread.java:830) 15-Nov-2019 12:35:06.845 FINE [https-jsse-nio-8443-exec-1] org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper.doClose Calling [org.apache.tomcat.util.net.NioEndpoint@7bbe663e].closeSocket([org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper@36202f73:org.apache.tomcat.util.net.SecureNioChannel@28cdd70:java.nio.channels.SocketChannel[connected local=/0:0:0:0:0:0:0:1:8443 remote=/0:0:0:0:0:0:0:1:65308]]) java.lang.Exception at org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper.doClose(NioEndpoint.java:1163) at org.apache.tomcat.util.net.SocketWrapperBase.close(SocketWrapperBase.java:402) at org.apache.tomcat.util.net.NioEndpoint$Poller.cancelledKey(NioEndpoint.java:665) at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1586) at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49) at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128) at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628) at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61) at java.base/java.lang.Thread.run(Thread.java:830) javax.net.ssl|ALL|21|https-jsse-nio-8443-exec-1|2019-11-15 12:35:06.846 IST|SSLEngineImpl.java:818|Closing outbound of SSLEngine javax.net.ssl|WARNING|21|https-jsse-nio-8443-exec-1|2019-11-15 12:35:06.847 IST|SSLEngineOutputRecord.java:173|outbound has closed, ignore outbound application data 15-Nov-2019 12:35:06.886 FINE [https-jsse-nio-8443-exec-2] org.apache.tomcat.util.net.SecureNioChannel.processSNI The SNI host name extracted for connection [java.nio.channels.SocketChannel[connected local=/0:0:0:0:0:0:0:1:8443 remote=/0:0:0:0:0:0:0:1:65309]] was [localhost] javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:06.888 IST|HandshakeContext.java:297|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 for TLS10 javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:06.890 IST|HandshakeContext.java:297|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 for TLS10 javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:06.890 IST|HandshakeContext.java:297|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLS10 javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:06.891 IST|HandshakeContext.java:297|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLS10 javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:06.892 IST|HandshakeContext.java:297|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 for TLS13 javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:06.893 IST|HandshakeContext.java:297|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 for TLS13 javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:06.893 IST|HandshakeContext.java:297|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLS13 javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:06.894 IST|HandshakeContext.java:297|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLS13 javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:06.894 IST|HandshakeContext.java:297|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA for TLS13 javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:06.895 IST|HandshakeContext.java:297|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA for TLS13 javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:06.897 IST|HandshakeContext.java:297|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 for TLS11 javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:06.898 IST|HandshakeContext.java:297|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 for TLS11 javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:06.898 IST|HandshakeContext.java:297|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLS11 javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:06.899 IST|HandshakeContext.java:297|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLS11 javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:06.913 IST|SSLExtensions.java:132|Ignore unknown or unsupported extension ( "unknown extension (28)": { 0000: 40 01 @. } ) javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:06.917 IST|SSLExtensions.java:132|Ignore unknown or unsupported extension ( "unknown extension (21)": { 0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0090: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ............... } ) javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:06.933 IST|ClientHello.java:808|Consuming ClientHello handshake message ( "ClientHello": { "client version" : "TLSv1.2", "random" : "13 DF 4E 76 AA 9B 78 09 52 DF 26 7B CB 7E B6 39 55 50 4F A8 34 2B 2C 50 0F 93 78 7A 91 9B A4 31", "session id" : "6D 4C 9A 10 BA 55 CD D6 28 07 2D A8 73 F1 A7 E0 35 85 D4 7C B0 DB 07 57 66 F9 71 EB 7C 17 BB EC", "cipher suites" : "[TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_AES_256_GCM_SHA384(0x1302), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA(0xC00A), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA(0xC009), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA(0xC013), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA(0xC014), TLS_DHE_RSA_WITH_AES_128_CBC_SHA(0x0033), TLS_DHE_RSA_WITH_AES_256_CBC_SHA(0x0039), TLS_RSA_WITH_AES_128_CBC_SHA(0x002F), TLS_RSA_WITH_AES_256_CBC_SHA(0x0035), SSL_RSA_WITH_3DES_EDE_CBC_SHA(0x000A)]", "compression methods" : "00", "extensions" : [ "server_name (0)": { type=host_name (0), value=localhost }, "extended_master_secret (23)": { }, "renegotiation_info (65,281)": { "renegotiated connection": [] }, "supported_groups (10)": { "versions": [x25519, secp256r1, secp384r1, secp521r1, ffdhe2048, ffdhe3072] }, "ec_point_formats (11)": { "formats": [uncompressed] }, "application_layer_protocol_negotiation (16)": { [h2, http/1.1] }, "status_request (5)": { "certificate status type": ocsp "OCSP status request": { "responder_id": "request extensions": { } } }, "key_share (51)": { "client_shares": [ { "named group": x25519 "key_exchange": { 0000: 85 AF BB CA 32 89 7C 10 7B 42 B2 6B FE CA 7A 9D ....2....B.k..z. 0010: B4 5D D6 F8 C2 92 C5 E0 10 E7 7E 7C 34 D2 7D 1A .]..........4... } }, { "named group": secp256r1 "key_exchange": { 0000: 04 4F B8 00 09 36 3F D5 3B 46 8A 3B F5 2D 01 A4 .O...6?.;F.;.-.. 0010: AA CA A9 7D 9B B7 4F CA 29 07 6C 7F C8 86 BB 2A ......O.).l....* 0020: 0B 68 9F 08 2D F7 07 7B 46 98 ED 13 F2 57 AA EE .h..-...F....W.. 0030: E9 04 9B B1 B2 13 BA 57 68 7D F1 AE DE F2 BC 88 .......Wh....... 0040: F9 } }, ] }, "supported_versions (43)": { "versions": [TLSv1.3, TLSv1.2, TLSv1.1, TLSv1] }, "signature_algorithms (13)": { "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1] }, "unknown extension (28)": { 0000: 40 01 @. }, "unknown extension (21)": { 0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0090: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ............... } ] } ) javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:06.934 IST|SSLExtensions.java:189|Consumed extension: supported_versions javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:06.934 IST|ClientHello.java:838|Negotiated protocol version: TLSv1.3 javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:06.935 IST|PskKeyExchangeModesExtension.java:293|abort session resumption, no supported psk_dhe_ke PSK key exchange mode javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:06.935 IST|PreSharedKeyExtension.java:840|Handling pre_shared_key absence. javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:06.936 IST|ServerNameExtension.java:327|no server name matchers, ignore server name indication javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:06.937 IST|SSLExtensions.java:189|Consumed extension: server_name javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:06.937 IST|SSLExtensions.java:170|Ignore unavailable extension: max_fragment_length javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:06.938 IST|SSLExtensions.java:189|Consumed extension: status_request javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:06.938 IST|SSLExtensions.java:189|Consumed extension: supported_groups javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:06.939 IST|SSLExtensions.java:160|Ignore unsupported extension: ec_point_formats javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:06.939 IST|SSLExtensions.java:189|Consumed extension: signature_algorithms javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:06.940 IST|SSLExtensions.java:170|Ignore unavailable extension: signature_algorithms_cert javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:06.941 IST|AlpnExtension.java:277|Ignore server unenabled extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:06.941 IST|SSLExtensions.java:189|Consumed extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:06.942 IST|SSLExtensions.java:160|Ignore unsupported extension: status_request_v2 javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:06.942 IST|SSLExtensions.java:160|Ignore unsupported extension: extended_master_secret javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:06.943 IST|SSLExtensions.java:160|Ignore unsupported extension: session_ticket javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:06.943 IST|SSLExtensions.java:170|Ignore unavailable extension: cookie javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:06.945 IST|SSLExtensions.java:189|Consumed extension: key_share javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:06.947 IST|SSLExtensions.java:160|Ignore unsupported extension: renegotiation_info javax.net.ssl|ALL|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:06.949 IST|SignatureScheme.java:359|Ignore disabled signature scheme: rsa_md5 javax.net.ssl|WARNING|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:06.950 IST|SSLExtensions.java:212|Ignore impact of unsupported extension: server_name javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:06.951 IST|SSLExtensions.java:204|Ignore unavailable extension: max_fragment_length javax.net.ssl|WARNING|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:06.951 IST|SSLExtensions.java:212|Ignore impact of unsupported extension: status_request javax.net.ssl|WARNING|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:06.952 IST|SSLExtensions.java:212|Ignore impact of unsupported extension: supported_groups javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:06.954 IST|SSLExtensions.java:221|Populated with extension: signature_algorithms javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:06.955 IST|SSLExtensions.java:204|Ignore unavailable extension: signature_algorithms_cert javax.net.ssl|WARNING|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:06.956 IST|SSLExtensions.java:212|Ignore impact of unsupported extension: application_layer_protocol_negotiation javax.net.ssl|WARNING|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:06.956 IST|SSLExtensions.java:212|Ignore impact of unsupported extension: supported_versions javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:06.957 IST|SSLExtensions.java:204|Ignore unavailable extension: cookie javax.net.ssl|WARNING|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:06.958 IST|SSLExtensions.java:212|Ignore impact of unsupported extension: key_share javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:06.958 IST|SSLExtensions.java:204|Ignore unavailable extension: pre_shared_key javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:06.959 IST|ServerHello.java:733|use cipher suite TLS_AES_128_GCM_SHA256 javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:06.966 IST|SSLExtensions.java:257|Ignore, context unavailable extension: pre_shared_key javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:06.969 IST|ServerHello.java:587|Produced ServerHello handshake message ( "ServerHello": { "server version" : "TLSv1.2", "random" : "EF 05 5A 0E 37 EA 3B 86 60 4E 72 79 4B 6C A3 5F 7B 41 CF F3 0E 7A 9F AC E0 7E E0 20 4D 75 5D 2C", "session id" : "6D 4C 9A 10 BA 55 CD D6 28 07 2D A8 73 F1 A7 E0 35 85 D4 7C B0 DB 07 57 66 F9 71 EB 7C 17 BB EC", "cipher suite" : "TLS_AES_128_GCM_SHA256(0x1301)", "compression methods" : "00", "extensions" : [ "supported_versions (43)": { "selected version": [TLSv1.3] }, "key_share (51)": { "server_share": { "named group": x25519 "key_exchange": { 0000: BB A2 50 F3 41 C2 01 01 EB F1 1B 22 3D 18 44 64 ..P.A......"=.Dd 0010: 15 44 48 0C 5A B8 87 8D A2 C4 2F 47 A0 92 80 62 .DH.Z...../G...b } }, } ] } ) javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:06.979 IST|SSLCipher.java:1867|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE countdown value = 137438953472 javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:06.988 IST|SSLCipher.java:2021|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE countdown value = 137438953472 javax.net.ssl|ALL|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:06.989 IST|ServerNameExtension.java:537|No expected server name indication response javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:06.990 IST|SSLExtensions.java:257|Ignore, context unavailable extension: server_name javax.net.ssl|ALL|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:06.991 IST|MaxFragExtension.java:469|Ignore unavailable max_fragment_length extension javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:06.991 IST|SSLExtensions.java:257|Ignore, context unavailable extension: max_fragment_length javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:06.994 IST|AlpnExtension.java:365|Ignore unavailable extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:06.994 IST|SSLExtensions.java:257|Ignore, context unavailable extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:06.996 IST|EncryptedExtensions.java:137|Produced EncryptedExtensions message ( "EncryptedExtensions": [ "supported_groups (10)": { "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192] } ] ) javax.net.ssl|ALL|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:06.998 IST|SignatureScheme.java:364|Ignore inactive signature scheme: dsa_sha256 javax.net.ssl|ALL|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:06.999 IST|SignatureScheme.java:364|Ignore inactive signature scheme: dsa_sha1 javax.net.ssl|ALL|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:07.000 IST|SignatureScheme.java:364|Ignore inactive signature scheme: rsa_md5 javax.net.ssl|ALL|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:07.001 IST|SignatureScheme.java:364|Ignore inactive signature scheme: dsa_sha256 javax.net.ssl|ALL|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:07.002 IST|SignatureScheme.java:364|Ignore inactive signature scheme: dsa_sha1 javax.net.ssl|ALL|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:07.003 IST|SignatureScheme.java:364|Ignore inactive signature scheme: rsa_md5 javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:07.006 IST|CertificateRequest.java:882|Produced CertificateRequest message ( "CertificateRequest": { "certificate_request_context": "", "extensions": [ "signature_algorithms (13)": { "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1] }, "signature_algorithms_cert (50)": { "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1] } ] } ) javax.net.ssl|ALL|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:07.007 IST|X509Authentication.java:295|No X.509 cert selected for EC javax.net.ssl|WARNING|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:07.009 IST|CertificateMessage.java:1062|Unavailable authentication scheme: ecdsa_secp256r1_sha256 javax.net.ssl|ALL|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:07.010 IST|X509Authentication.java:295|No X.509 cert selected for EC javax.net.ssl|WARNING|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:07.011 IST|CertificateMessage.java:1062|Unavailable authentication scheme: ecdsa_secp384r1_sha384 javax.net.ssl|ALL|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:07.011 IST|X509Authentication.java:295|No X.509 cert selected for EC javax.net.ssl|WARNING|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:07.012 IST|CertificateMessage.java:1062|Unavailable authentication scheme: ecdsa_secp521r1_sha512 javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:07.013 IST|StatusResponseManager.java:763|Staping disabled or is a resumed session javax.net.ssl|ALL|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:07.013 IST|CertStatusExtension.java:1115|Stapling is disabled for this connection javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:07.014 IST|SSLExtensions.java:257|Ignore, context unavailable extension: status_request javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:07.017 IST|CertificateMessage.java:1001|Produced server Certificate message ( "Certificate": { "certificate_request_context": "", "certificate_list": [ { "certificate" : { "version" : "v3", "serial number" : "3B FD 86 4A 58 09 72 F6", "signature algorithm": "SHA512withRSA", "issuer" : "CN=localhost", "not before" : "2019-11-05 13:41:52.000 IST", "not after" : "2020-11-05 13:41:52.000 IST", "subject" : "CN=localhost", "subject public key" : "RSA", "extensions" : [ { ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:false PathLen:2147483647 ] }, { ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_Encipherment Data_Encipherment ] } ]} "extensions": { } }, ] } ) javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:07.123 IST|CertificateVerify.java:1080|Produced server CertificateVerify handshake message ( "CertificateVerify": { "signature algorithm": rsa_pss_rsae_sha256 "signature": { 0000: 6A D4 15 76 1D 4B 32 3D FA FE 59 23 8F 97 53 75 j..v.K2=..Y#..Su 0010: 3B 9C 99 4D 9C 3C 7D CE CA 85 C0 9E F9 A1 CE 6C ;..M.<.........l 0020: E9 50 BD C6 15 80 33 6C 13 CE 89 F2 1D 53 CD 40 .P....3l.....S.@ 0030: C9 D1 7B 4E 48 66 70 D2 DE 31 00 75 60 60 59 8A ...NHfp..1.u``Y. 0040: 9B 8D FE 27 1A F8 C5 0D 68 FF 14 2A E2 52 82 77 ...'....h..*.R.w 0050: D2 17 C1 A0 11 94 63 E6 EB 53 BA A6 0E AB 40 AE ......c..S....@. 0060: CD 65 2C 28 4E 7D E1 36 BC 5E 6D AB 06 71 3D 42 .e,(N..6.^m..q=B 0070: 2B 8F 4A 92 BD F0 13 D5 7C 8D BE AD F4 91 6E 51 +.J...........nQ 0080: EC 73 7E DE 84 B2 F1 1D E1 64 9B 8E 63 DD 54 D1 .s.......d..c.T. 0090: 92 CD D8 DD 15 89 2E B1 20 A2 C9 0B D8 B4 CE 1E ........ ....... 00A0: 8E 79 31 52 D6 06 7E 15 0C ED 39 E3 8E C1 88 91 .y1R......9..... 00B0: 14 91 1C DC E4 72 24 36 7C 48 EF F5 C3 2D E3 94 .....r$6.H...-.. 00C0: 99 DA 37 A6 97 E5 23 68 76 73 D3 A3 DE 4D A0 3E ..7...#hvs...M.> 00D0: F8 5D 66 81 5B F2 1F 21 53 9D BB 7C 5C 3F 0F 24 .]f.[..!S...\?.$ 00E0: 83 92 B2 6A A9 9E 87 E0 93 D8 58 9F 68 77 9A 66 ...j......X.hw.f 00F0: 68 94 B4 20 21 0C F5 CE 6B DE 32 F3 E1 FD AF 38 h.. !...k.2....8 } } ) javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:07.130 IST|Finished.java:767|Produced server Finished handshake message ( "Finished": { "verify data": { 0000: E3 95 5C BC BB 4B 10 E7 C1 6C E6 08 54 27 69 65 ..\..K...l..T'ie 0010: 29 78 D3 BF 97 AE FF 9B 8E 44 0B 1C 09 6D E8 88 )x.......D...m.. }'} ) javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:07.134 IST|SSLCipher.java:2021|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE countdown value = 137438953472 javax.net.ssl|DEBUG|25|https-jsse-nio-8443-exec-5|2019-11-15 12:35:07.199 IST|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message javax.net.ssl|DEBUG|25|https-jsse-nio-8443-exec-5|2019-11-15 12:35:07.205 IST|CertificateMessage.java:1156|Consuming client Certificate handshake message ( "Certificate": { "certificate_request_context": "", "certificate_list": [ { "certificate" : { "version" : "v3", "serial number" : "2C 8B E3 32 BC 02 24 C0", "signature algorithm": "SHA512withRSA", "issuer" : "CN=client", "not before" : "2019-11-05 13:43:21.000 IST", "not after" : "2020-11-05 13:43:21.000 IST", "subject" : "CN=client", "subject public key" : "RSA", "extensions" : [ { ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:false PathLen:2147483647 ] }, { ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_Encipherment Data_Encipherment ] } ]} "extensions": { } }, ] } ) javax.net.ssl|DEBUG|25|https-jsse-nio-8443-exec-5|2019-11-15 12:35:07.212 IST|CertificateVerify.java:1128|Consuming CertificateVerify handshake message ( "CertificateVerify": { "signature algorithm": rsa_pss_rsae_sha256 "signature": { 0000: 96 32 7A 32 85 A3 6A 73 4C 60 6C 55 E2 36 89 7B .2z2..jsL`lU.6.. 0010: AB 00 FF AD 37 1B 60 12 14 5E E6 E5 A2 D9 16 CE ....7.`..^...... 0020: 29 B9 08 A9 48 68 44 87 ED 6B 69 4D 8B 82 2F 40 )...HhD..kiM../@ 0030: 9F FE 7D 02 7E 53 B2 6C 7E A7 C6 0E EE 9C 8B FA .....S.l........ 0040: 67 07 2E 00 1C 4A B5 CF F1 02 54 51 21 74 83 F3 g....J....TQ!t.. 0050: 9B 3C 3B AA 9E A4 FC A0 98 68 63 92 2C C5 B8 9F .<;......hc.,... 0060: D7 83 B4 A1 0B D5 CC E1 36 7B 05 56 C4 BA 6D 7F ........6..V..m. 0070: BA F2 FE 42 8A E6 06 88 0A A7 AF 98 10 B4 97 18 ...B............ 0080: E4 12 1D E1 4E A4 F0 47 EA 91 08 B1 39 31 26 95 ....N..G....91&. 0090: 8D 37 7F 82 F3 BA FC 24 54 99 85 72 A9 A7 E4 5C .7.....$T..r...\ 00A0: B8 3F 73 3B 96 4E 45 8E 4A 4E 12 4E 22 90 7C 88 .?s;.NE.JN.N"... 00B0: 8F 9D 10 E2 9C 82 37 33 F6 9A 90 88 21 DC 1B F7 ......73....!... 00C0: 2E 6B C8 11 FB F1 57 A1 58 49 61 A4 ED 8F F4 87 .k....W.XIa..... 00D0: CF 4E A1 1F 8F DA 03 71 74 4D 3C 6D F1 80 7C 86 .N.....qtM }, "renegotiation_info (65,281)": { "renegotiated connection": [] }, "supported_groups (10)": { "versions": [x25519, secp256r1, secp384r1, secp521r1, ffdhe2048, ffdhe3072] }, "ec_point_formats (11)": { "formats": [uncompressed] }, "application_layer_protocol_negotiation (16)": { [h2, http/1.1] }, "status_request (5)": { "certificate status type": ocsp "OCSP status request": { "responder_id": "request extensions": { } } }, "key_share (51)": { "client_shares": [ { "named group": x25519 "key_exchange": { 0000: 91 F6 90 47 17 4B 9E 56 B3 80 56 E7 01 B6 60 54 ...G.K.V..V...`T 0010: DB 6B 21 42 C0 F4 DF B5 AF 72 DC BE 2C 0F BE 01 .k!B.....r..,... } }, { "named group": secp256r1 "key_exchange": { 0000: 04 32 98 7F 59 C6 7D 7C 9E A5 3C 72 12 F4 6A 9B .2..Y..... } }, ] } ) javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-15 12:35:07.410 IST|CertificateVerify.java:1080|Produced server CertificateVerify handshake message ( "CertificateVerify": { "signature algorithm": rsa_pss_rsae_sha256 "signature": { 0000: 70 18 70 90 B0 FD 38 BE CA D5 38 96 86 8D 66 D8 p.p...8...8...f. 0010: 57 AB F8 DC 9A 01 B0 E3 8B CA 31 4A E7 C3 90 33 W.........1J...3 0020: EB 7D 93 E7 E2 44 B8 E8 49 57 5F 30 15 01 CF 0C .....D..IW_0.... 0030: B7 7B 36 25 D5 03 C9 7F 35 98 D8 69 5B 3B 2F 5A ..6%....5..i[;/Z 0040: 62 AF CB 7C 9C 63 F4 47 25 72 B4 DC DC 13 15 1D b....c.G%r...... 0050: 05 21 1B 5A 07 6D C2 A3 63 2E CC 4E 93 62 07 F9 .!.Z.m..c..N.b.. 0060: A9 1B B9 03 44 F1 42 64 0B 84 94 F7 03 D4 7C 8C ....D.Bd........ 0070: 41 99 33 C6 30 58 27 2B 3E 14 1D 9C 1E DF 36 69 A.3.0X'+>.....6i 0080: F9 59 53 71 F3 FD 7E F2 44 F9 6F 15 E4 31 2A 7B .YSq....D.o..1*. 0090: 3D E7 72 6E E1 D0 C8 18 C3 2A 19 C3 65 45 BA CE =.rn.....*..eE.. 00A0: 6D C4 D9 D1 7A 4F A2 04 90 67 51 04 49 BE 9D A3 m...zO...gQ.I... 00B0: 9A FA B8 DF 89 94 15 58 90 A8 58 65 C6 A2 6B D6 .......X..Xe..k. 00C0: 38 28 9C F1 DD C2 FB 53 BE 32 93 26 EA C0 F5 FD 8(.....S.2.&.... 00D0: 5C 0F 5A 80 CF 5D 8D 20 2A C9 7B 06 00 BB 26 F9 \.Z..]. *.....&. 00E0: 6D C2 7A 76 88 42 B6 DC BA 31 56 B0 5D 6A 07 FD m.zv.B...1V.]j.. 00F0: D3 D0 0F 65 79 45 E7 BA 4E F1 09 51 AB 96 83 FF ...eyE..N..Q.... } } ) javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-15 12:35:07.414 IST|Finished.java:767|Produced server Finished handshake message ( "Finished": { "verify data": { 0000: 03 22 20 1D 26 6B 06 5D 94 DF C9 68 25 79 A9 E1 ." .&k.]...h%y.. 0010: 35 40 38 46 EC AE 4D AB 6F B3 BD 56 3D 73 CD 59 5@8F..M.o..V=s.Y }'} ) javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-15 12:35:07.417 IST|SSLCipher.java:2021|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE countdown value = 137438953472 javax.net.ssl|DEBUG|2A|https-jsse-nio-8443-exec-10|2019-11-15 12:35:07.462 IST|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message javax.net.ssl|DEBUG|2A|https-jsse-nio-8443-exec-10|2019-11-15 12:35:07.466 IST|CertificateMessage.java:1156|Consuming client Certificate handshake message ( "Certificate": { "certificate_request_context": "", "certificate_list": [ { "certificate" : { "version" : "v3", "serial number" : "2C 8B E3 32 BC 02 24 C0", "signature algorithm": "SHA512withRSA", "issuer" : "CN=client", "not before" : "2019-11-05 13:43:21.000 IST", "not after" : "2020-11-05 13:43:21.000 IST", "subject" : "CN=client", "subject public key" : "RSA", "extensions" : [ { ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:false PathLen:2147483647 ] }, { ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_Encipherment Data_Encipherment ] } ]} "extensions": { } }, ] } ) javax.net.ssl|DEBUG|2A|https-jsse-nio-8443-exec-10|2019-11-15 12:35:07.474 IST|CertificateVerify.java:1128|Consuming CertificateVerify handshake message ( "CertificateVerify": { "signature algorithm": rsa_pss_rsae_sha256 "signature": { 0000: 8E 1F B9 BF 36 6B 40 B1 F2 6A 87 40 4C 5B 62 15 ....6k@..j.@L[b. 0010: EE FC DB 61 7E 6F D7 03 C1 3A 18 39 D5 77 1D 4D ...a.o...:.9.w.M 0020: AA EA F1 FB 2A 90 09 90 A3 F2 9C A9 35 96 0A 1C ....*.......5... 0030: 83 34 11 7F 8C 42 97 F6 CA 52 87 28 0C 24 1B 68 .4...B...R.(.$.h 0040: 02 B3 92 89 C7 8F 73 50 60 E6 D6 2A 9A 02 AB A6 ......sP`..*.... 0050: 7B CE 5D 65 2C 09 75 85 81 DB 6A 5D EB 4E 6C 16 ..]e,.u...j].Nl. 0060: 93 44 F2 FF CC 37 86 6B 16 D3 DB 06 EB 99 3E AA .D...7.k......>. 0070: 7D 6A 94 63 71 53 E8 19 55 DE C3 4B 0F 1E 4D CC .j.cqS..U..K..M. 0080: 75 E7 53 DA 68 EF E1 9A BC 99 C5 07 62 1A 6A C0 u.S.h.......b.j. 0090: 57 9D 9E 35 68 B1 60 9D C4 7E 07 10 E7 18 C6 6A W..5h.`........j 00A0: 46 F0 80 68 B0 B5 65 6B E7 EB 10 22 F2 E4 9A 88 F..h..ek...".... 00B0: 32 5F 26 24 80 D6 BC 95 CF 35 BD 4B 37 C5 FA BD 2_&$.....5.K7... 00C0: 8A 3B 61 8F 10 7F 43 B6 F2 78 2D 46 45 6F A9 0E .;a...C..x-FEo.. 00D0: FB 74 1B 34 14 23 37 3D AD 39 C6 CC 3F FB 81 75 .t.4.#7=.9..?..u 00E0: 8C 20 0D 13 DF E0 79 5C C4 79 A5 DE C0 B8 AE EF . ....y\.y...... 00F0: 6A D6 C8 1C 4C DB 78 7F 1B 40 42 30 03 C0 80 B5 j...L.x..@B0.... } } ) javax.net.ssl|DEBUG|2A|https-jsse-nio-8443-exec-10|2019-11-15 12:35:07.477 IST|Finished.java:1010|Consuming client Finished handshake message ( "Finished": { "verify data": { 0000: F9 EA 08 45 BF 56 D2 54 AE C1 78 AC F2 6B 05 54 ...E.V.T..x..k.T 0010: 05 AF F2 3C 2A 6C 6A B8 56 90 34 E2 F7 5F 19 E3 ...<*lj.V.4.._.. }'} ) javax.net.ssl|DEBUG|2A|https-jsse-nio-8443-exec-10|2019-11-15 12:35:07.479 IST|SSLCipher.java:1867|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE countdown value = 137438953472 javax.net.ssl|DEBUG|2A|https-jsse-nio-8443-exec-10|2019-11-15 12:35:07.481 IST|Finished.java:1110|Sending new session ticket 15-Nov-2019 12:35:07.482 FINE [https-jsse-nio-8443-exec-10] org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun Error during SSL handshake java.io.IOException: NOT_HANDSHAKING during handshake at org.apache.tomcat.util.net.SecureNioChannel.handshake(SecureNioChannel.java:193) at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1556) at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49) at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128) at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628) at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61) at java.base/java.lang.Thread.run(Thread.java:830) 15-Nov-2019 12:35:07.485 FINE [https-jsse-nio-8443-exec-10] org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper.doClose Calling [org.apache.tomcat.util.net.NioEndpoint@7bbe663e].closeSocket([org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper@36cdb9e5:org.apache.tomcat.util.net.SecureNioChannel@28cdd70:java.nio.channels.SocketChannel[connected local=/0:0:0:0:0:0:0:1:8443 remote=/0:0:0:0:0:0:0:1:65310]]) java.lang.Exception at org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper.doClose(NioEndpoint.java:1163) at org.apache.tomcat.util.net.SocketWrapperBase.close(SocketWrapperBase.java:402) at org.apache.tomcat.util.net.NioEndpoint$Poller.cancelledKey(NioEndpoint.java:665) at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1586) at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49) at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128) at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628) at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61) at java.base/java.lang.Thread.run(Thread.java:830) javax.net.ssl|ALL|2A|https-jsse-nio-8443-exec-10|2019-11-15 12:35:07.486 IST|SSLEngineImpl.java:818|Closing outbound of SSLEngine javax.net.ssl|WARNING|2A|https-jsse-nio-8443-exec-10|2019-11-15 12:35:07.487 IST|SSLEngineOutputRecord.java:173|outbound has closed, ignore outbound application data 15-Nov-2019 12:35:07.512 FINE [https-jsse-nio-8443-exec-9] org.apache.tomcat.util.net.SecureNioChannel.processSNI The SNI host name extracted for connection [java.nio.channels.SocketChannel[connected local=/0:0:0:0:0:0:0:1:8443 remote=/0:0:0:0:0:0:0:1:65311]] was [localhost] javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-15 12:35:07.516 IST|HandshakeContext.java:297|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 for TLS10 javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-15 12:35:07.517 IST|HandshakeContext.java:297|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 for TLS10 javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-15 12:35:07.518 IST|HandshakeContext.java:297|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLS10 javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-15 12:35:07.518 IST|HandshakeContext.java:297|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLS10 javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-15 12:35:07.519 IST|HandshakeContext.java:297|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 for TLS13 javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-15 12:35:07.520 IST|HandshakeContext.java:297|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 for TLS13 javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-15 12:35:07.520 IST|HandshakeContext.java:297|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLS13 javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-15 12:35:07.521 IST|HandshakeContext.java:297|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLS13 javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-15 12:35:07.521 IST|HandshakeContext.java:297|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA for TLS13 javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-15 12:35:07.522 IST|HandshakeContext.java:297|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA for TLS13 javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-15 12:35:07.523 IST|HandshakeContext.java:297|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 for TLS11 javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-15 12:35:07.524 IST|HandshakeContext.java:297|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 for TLS11 javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-15 12:35:07.524 IST|HandshakeContext.java:297|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLS11 javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-15 12:35:07.525 IST|HandshakeContext.java:297|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLS11 javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-15 12:35:07.534 IST|SSLExtensions.java:132|Ignore unknown or unsupported extension ( "unknown extension (28)": { 0000: 40 01 @. } ) javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-15 12:35:07.537 IST|SSLExtensions.java:132|Ignore unknown or unsupported extension ( "unknown extension (21)": { 0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0090: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ............... } ) javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-15 12:35:07.548 IST|ClientHello.java:808|Consuming ClientHello handshake message ( "ClientHello": { "client version" : "TLSv1.2", "random" : "DF D0 D1 64 FC A0 4D 22 5F 91 E8 88 77 E8 FD 9F 8A C9 46 30 D5 AA 70 CF 29 1F CE FB D6 B3 2F 48", "session id" : "39 09 DA 3E 3A DA 27 49 A8 39 21 A9 20 08 05 A4 2E F7 3D 6D 42 EC 5C 2B 54 73 41 3C 12 C5 F4 3C", "cipher suites" : "[TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_AES_256_GCM_SHA384(0x1302), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA(0xC00A), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA(0xC009), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA(0xC013), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA(0xC014), TLS_DHE_RSA_WITH_AES_128_CBC_SHA(0x0033), TLS_DHE_RSA_WITH_AES_256_CBC_SHA(0x0039), TLS_RSA_WITH_AES_128_CBC_SHA(0x002F), TLS_RSA_WITH_AES_256_CBC_SHA(0x0035), SSL_RSA_WITH_3DES_EDE_CBC_SHA(0x000A)]", "compression methods" : "00", "extensions" : [ "server_name (0)": { type=host_name (0), value=localhost }, "extended_master_secret (23)": { }, "renegotiation_info (65,281)": { "renegotiated connection": [] }, "supported_groups (10)": { "versions": [x25519, secp256r1, secp384r1, secp521r1, ffdhe2048, ffdhe3072] }, "ec_point_formats (11)": { "formats": [uncompressed] }, "application_layer_protocol_negotiation (16)": { [h2, http/1.1] }, "status_request (5)": { "certificate status type": ocsp "OCSP status request": { "responder_id": "request extensions": { } } }, "key_share (51)": { "client_shares": [ { "named group": x25519 "key_exchange": { 0000: 60 86 06 06 18 51 C5 BD 03 84 A7 81 D4 CE 1E C1 `....Q.......... 0010: 11 C0 9C 9B 8D C8 E9 67 77 8D 11 C3 7D B7 E8 5B .......gw......[ } }, { "named group": secp256r1 "key_exchange": { 0000: 04 1D 98 0A 7A 02 E1 8C E6 0D 99 56 E5 F7 EF 39 ....z......V...9 0010: 5B 60 DD 5A 96 0F B3 4A 7B 9F 5F 03 2B 1C 8D FC [`.Z...J.._.+... 0020: A7 CE F9 B2 FB 13 0F 24 D6 5A 5B F5 70 E2 2B 07 .......$.Z[.p.+. 0030: E9 6D 50 A5 E6 A9 C1 88 7F 99 92 BF 2E 6D 71 1B .mP..........mq. 0040: 2C } }, ] }, "supported_versions (43)": { "versions": [TLSv1.3, TLSv1.2, TLSv1.1, TLSv1] }, "signature_algorithms (13)": { "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1] }, "unknown extension (28)": { 0000: 40 01 @. }, "unknown extension (21)": { 0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0090: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ............... } ] } ) javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-15 12:35:07.617 IST|SSLExtensions.java:189|Consumed extension: supported_versions javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-15 12:35:07.618 IST|ClientHello.java:838|Negotiated protocol version: TLSv1.3 javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-15 12:35:07.618 IST|PskKeyExchangeModesExtension.java:293|abort session resumption, no supported psk_dhe_ke PSK key exchange mode javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-15 12:35:07.619 IST|PreSharedKeyExtension.java:840|Handling pre_shared_key absence. javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-15 12:35:07.620 IST|ServerNameExtension.java:327|no server name matchers, ignore server name indication javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-15 12:35:07.621 IST|SSLExtensions.java:189|Consumed extension: server_name javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-15 12:35:07.621 IST|SSLExtensions.java:170|Ignore unavailable extension: max_fragment_length javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-15 12:35:07.622 IST|SSLExtensions.java:189|Consumed extension: status_request javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-15 12:35:07.622 IST|SSLExtensions.java:189|Consumed extension: supported_groups javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-15 12:35:07.623 IST|SSLExtensions.java:160|Ignore unsupported extension: ec_point_formats javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-15 12:35:07.623 IST|SSLExtensions.java:189|Consumed extension: signature_algorithms javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-15 12:35:07.624 IST|SSLExtensions.java:170|Ignore unavailable extension: signature_algorithms_cert javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-15 12:35:07.625 IST|AlpnExtension.java:277|Ignore server unenabled extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-15 12:35:07.626 IST|SSLExtensions.java:189|Consumed extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-15 12:35:07.626 IST|SSLExtensions.java:160|Ignore unsupported extension: status_request_v2 javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-15 12:35:07.627 IST|SSLExtensions.java:160|Ignore unsupported extension: extended_master_secret javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-15 12:35:07.627 IST|SSLExtensions.java:160|Ignore unsupported extension: session_ticket javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-15 12:35:07.628 IST|SSLExtensions.java:170|Ignore unavailable extension: cookie javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-15 12:35:07.629 IST|SSLExtensions.java:189|Consumed extension: key_share javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-15 12:35:07.630 IST|SSLExtensions.java:160|Ignore unsupported extension: renegotiation_info javax.net.ssl|ALL|29|https-jsse-nio-8443-exec-9|2019-11-15 12:35:07.631 IST|SignatureScheme.java:359|Ignore disabled signature scheme: rsa_md5 javax.net.ssl|WARNING|29|https-jsse-nio-8443-exec-9|2019-11-15 12:35:07.633 IST|SSLExtensions.java:212|Ignore impact of unsupported extension: server_name javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-15 12:35:07.633 IST|SSLExtensions.java:204|Ignore unavailable extension: max_fragment_length javax.net.ssl|WARNING|29|https-jsse-nio-8443-exec-9|2019-11-15 12:35:07.634 IST|SSLExtensions.java:212|Ignore impact of unsupported extension: status_request javax.net.ssl|WARNING|29|https-jsse-nio-8443-exec-9|2019-11-15 12:35:07.635 IST|SSLExtensions.java:212|Ignore impact of unsupported extension: supported_groups javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-15 12:35:07.636 IST|SSLExtensions.java:221|Populated with extension: signature_algorithms javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-15 12:35:07.638 IST|SSLExtensions.java:204|Ignore unavailable extension: signature_algorithms_cert javax.net.ssl|WARNING|29|https-jsse-nio-8443-exec-9|2019-11-15 12:35:07.639 IST|SSLExtensions.java:212|Ignore impact of unsupported extension: application_layer_protocol_negotiation javax.net.ssl|WARNING|29|https-jsse-nio-8443-exec-9|2019-11-15 12:35:07.639 IST|SSLExtensions.java:212|Ignore impact of unsupported extension: supported_versions javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-15 12:35:07.640 IST|SSLExtensions.java:204|Ignore unavailable extension: cookie javax.net.ssl|WARNING|29|https-jsse-nio-8443-exec-9|2019-11-15 12:35:07.640 IST|SSLExtensions.java:212|Ignore impact of unsupported extension: key_share javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-15 12:35:07.641 IST|SSLExtensions.java:204|Ignore unavailable extension: pre_shared_key javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-15 12:35:07.642 IST|ServerHello.java:733|use cipher suite TLS_AES_128_GCM_SHA256 javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-15 12:35:07.648 IST|SSLExtensions.java:257|Ignore, context unavailable extension: pre_shared_key javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-15 12:35:07.651 IST|ServerHello.java:587|Produced ServerHello handshake message ( "ServerHello": { "server version" : "TLSv1.2", "random" : "CD CA B2 A5 7F DF 06 58 0F 73 98 FB CD 0D F1 13 9B 76 69 89 74 CF 65 21 92 7D 30 05 8A 04 0A 76", "session id" : "39 09 DA 3E 3A DA 27 49 A8 39 21 A9 20 08 05 A4 2E F7 3D 6D 42 EC 5C 2B 54 73 41 3C 12 C5 F4 3C", "cipher suite" : "TLS_AES_128_GCM_SHA256(0x1301)", "compression methods" : "00", "extensions" : [ "supported_versions (43)": { "selected version": [TLSv1.3] }, "key_share (51)": { "server_share": { "named group": x25519 "key_exchange": { 0000: F7 9C 47 B1 AA F5 F0 F5 68 AF A8 93 C2 C5 45 F4 ..G.....h.....E. 0010: CA 64 BE 53 0D 76 64 E1 CF C4 9A C2 82 E8 67 09 .d.S.vd.......g. } }, } ] } ) javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-15 12:35:07.658 IST|SSLCipher.java:1867|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE countdown value = 137438953472 javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-15 12:35:07.660 IST|SSLCipher.java:2021|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE countdown value = 137438953472 javax.net.ssl|ALL|29|https-jsse-nio-8443-exec-9|2019-11-15 12:35:07.661 IST|ServerNameExtension.java:537|No expected server name indication response javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-15 12:35:07.662 IST|SSLExtensions.java:257|Ignore, context unavailable extension: server_name javax.net.ssl|ALL|29|https-jsse-nio-8443-exec-9|2019-11-15 12:35:07.662 IST|MaxFragExtension.java:469|Ignore unavailable max_fragment_length extension javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-15 12:35:07.663 IST|SSLExtensions.java:257|Ignore, context unavailable extension: max_fragment_length javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-15 12:35:07.665 IST|AlpnExtension.java:365|Ignore unavailable extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-15 12:35:07.665 IST|SSLExtensions.java:257|Ignore, context unavailable extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-15 12:35:07.666 IST|EncryptedExtensions.java:137|Produced EncryptedExtensions message ( "EncryptedExtensions": [ "supported_groups (10)": { "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192] } ] ) javax.net.ssl|ALL|29|https-jsse-nio-8443-exec-9|2019-11-15 12:35:07.668 IST|SignatureScheme.java:364|Ignore inactive signature scheme: dsa_sha256 javax.net.ssl|ALL|29|https-jsse-nio-8443-exec-9|2019-11-15 12:35:07.669 IST|SignatureScheme.java:364|Ignore inactive signature scheme: dsa_sha1 javax.net.ssl|ALL|29|https-jsse-nio-8443-exec-9|2019-11-15 12:35:07.670 IST|SignatureScheme.java:364|Ignore inactive signature scheme: rsa_md5 javax.net.ssl|ALL|29|https-jsse-nio-8443-exec-9|2019-11-15 12:35:07.673 IST|SignatureScheme.java:364|Ignore inactive signature scheme: dsa_sha256 javax.net.ssl|ALL|29|https-jsse-nio-8443-exec-9|2019-11-15 12:35:07.674 IST|SignatureScheme.java:364|Ignore inactive signature scheme: dsa_sha1 javax.net.ssl|ALL|29|https-jsse-nio-8443-exec-9|2019-11-15 12:35:07.674 IST|SignatureScheme.java:364|Ignore inactive signature scheme: rsa_md5 javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-15 12:35:07.677 IST|CertificateRequest.java:882|Produced CertificateRequest message ( "CertificateRequest": { "certificate_request_context": "", "extensions": [ "signature_algorithms (13)": { "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1] }, "signature_algorithms_cert (50)": { "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1] } ] } ) javax.net.ssl|ALL|29|https-jsse-nio-8443-exec-9|2019-11-15 12:35:07.677 IST|X509Authentication.java:295|No X.509 cert selected for EC javax.net.ssl|WARNING|29|https-jsse-nio-8443-exec-9|2019-11-15 12:35:07.678 IST|CertificateMessage.java:1062|Unavailable authentication scheme: ecdsa_secp256r1_sha256 javax.net.ssl|ALL|29|https-jsse-nio-8443-exec-9|2019-11-15 12:35:07.678 IST|X509Authentication.java:295|No X.509 cert selected for EC javax.net.ssl|WARNING|29|https-jsse-nio-8443-exec-9|2019-11-15 12:35:07.679 IST|CertificateMessage.java:1062|Unavailable authentication scheme: ecdsa_secp384r1_sha384 javax.net.ssl|ALL|29|https-jsse-nio-8443-exec-9|2019-11-15 12:35:07.679 IST|X509Authentication.java:295|No X.509 cert selected for EC javax.net.ssl|WARNING|29|https-jsse-nio-8443-exec-9|2019-11-15 12:35:07.680 IST|CertificateMessage.java:1062|Unavailable authentication scheme: ecdsa_secp521r1_sha512 javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-15 12:35:07.680 IST|StatusResponseManager.java:763|Staping disabled or is a resumed session javax.net.ssl|ALL|29|https-jsse-nio-8443-exec-9|2019-11-15 12:35:07.681 IST|CertStatusExtension.java:1115|Stapling is disabled for this connection javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-15 12:35:07.681 IST|SSLExtensions.java:257|Ignore, context unavailable extension: status_request javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-15 12:35:07.685 IST|CertificateMessage.java:1001|Produced server Certificate message ( "Certificate": { "certificate_request_context": "", "certificate_list": [ { "certificate" : { "version" : "v3", "serial number" : "3B FD 86 4A 58 09 72 F6", "signature algorithm": "SHA512withRSA", "issuer" : "CN=localhost", "not before" : "2019-11-05 13:41:52.000 IST", "not after" : "2020-11-05 13:41:52.000 IST", "subject" : "CN=localhost", "subject public key" : "RSA", "extensions" : [ { ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:false PathLen:2147483647 ] }, { ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_Encipherment Data_Encipherment ] } ]} "extensions": { } }, ] } ) javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-15 12:35:07.732 IST|CertificateVerify.java:1080|Produced server CertificateVerify handshake message ( "CertificateVerify": { "signature algorithm": rsa_pss_rsae_sha256 "signature": { 0000: 36 2D 20 69 A0 12 A1 AB DC F8 1C 42 44 D4 03 81 6- i.......BD... 0010: EC 08 78 C3 29 26 2F DA 5C C4 F7 BF 6D 0A C9 EB ..x.)&/.\...m... 0020: 5B 24 AB EF F4 59 01 DB F5 30 A6 8E C8 CA AF 25 [$...Y...0.....% 0030: E4 BC 60 36 D5 C6 21 59 A1 E0 E6 09 B0 8F 1B 26 ..`6..!Y.......& 0040: C3 2E 75 FB 5A F4 5F 22 02 EB FF 83 ED 09 6A 41 ..u.Z._"......jA 0050: FA 30 6B 2D 28 4C 1B 0E E9 4B 94 19 FF FA EA 5B .0k-(L...K.....[ 0060: FE 8B CB 96 A3 01 28 4B 49 C5 D7 56 4B 06 4C 37 ......(KI..VK.L7 0070: 82 96 22 31 89 BD FD AE E3 70 A6 4E 6C 0F 67 EA .."1.....p.Nl.g. 0080: 14 86 77 6B AF C8 58 D6 8D 23 93 11 5F 07 F0 00 ..wk..X..#.._... 0090: 04 DD 5E B8 0F 87 9D 4F EF 8D A2 93 51 E3 70 19 ..^....O....Q.p. 00A0: C6 0E D9 B9 C0 84 AF 5A 65 13 3B CC 4B 60 E8 F3 .......Ze.;.K`.. 00B0: 5A 29 34 CC FB 83 97 93 55 A9 EA 01 36 09 7B 8B Z)4.....U...6... 00C0: B5 CB F7 AB F9 71 82 8A C8 42 FF 42 23 C8 5B A8 .....q...B.B#.[. 00D0: A7 3C FE 75 1A 90 38 C8 9D 00 85 38 68 49 A5 82 .<.u..8....8hI.. 00E0: 24 06 CF 81 14 FC 5A 79 7D 69 92 CB 40 E9 B6 E8 $.....Zy.i..@... 00F0: 84 A9 DD DF B6 67 E1 56 6C 21 EA 7E ED 2B 23 8D .....g.Vl!...+#. } } ) javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-15 12:35:07.734 IST|Finished.java:767|Produced server Finished handshake message ( "Finished": { "verify data": { 0000: 3A 51 54 ED 10 5C DD 17 16 5C 86 DB E5 75 47 68 :QT..\...\...uGh 0010: E2 2D BC A0 B0 5B F4 7E 5D 54 A1 B8 C7 E2 8E D9 .-...[..]T...... }'} ) javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-15 12:35:07.737 IST|SSLCipher.java:2021|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE countdown value = 137438953472 javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-15 12:35:07.792 IST|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-15 12:35:07.800 IST|CertificateMessage.java:1156|Consuming client Certificate handshake message ( "Certificate": { "certificate_request_context": "", "certificate_list": [ { "certificate" : { "version" : "v3", "serial number" : "2C 8B E3 32 BC 02 24 C0", "signature algorithm": "SHA512withRSA", "issuer" : "CN=client", "not before" : "2019-11-05 13:43:21.000 IST", "not after" : "2020-11-05 13:43:21.000 IST", "subject" : "CN=client", "subject public key" : "RSA", "extensions" : [ { ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:false PathLen:2147483647 ] }, { ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_Encipherment Data_Encipherment ] } ]} "extensions": { } }, ] } ) javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-15 12:35:07.816 IST|CertificateVerify.java:1128|Consuming CertificateVerify handshake message ( "CertificateVerify": { "signature algorithm": rsa_pss_rsae_sha256 "signature": { 0000: 96 D9 E1 F5 A9 1B 72 E7 A1 D9 97 B0 AC 34 11 7E ......r......4.. 0010: 2F 85 11 24 D2 35 BC 60 81 6F B9 CA FA 6A 3C 26 /..$.5.`.o...j<& 0020: 7B 65 B9 59 47 83 67 79 F0 DF FC CE CF 55 F6 D4 .e.YG.gy.....U.. 0030: 8A DD 10 34 B0 CA B7 B6 95 65 0B E7 D6 56 46 39 ...4.....e...VF9 0040: 44 5C 86 66 E8 38 45 80 4D AA 25 19 8E 85 8A F8 D\.f.8E.M.%..... 0050: 1A 07 F7 54 57 84 B7 BA 26 7F E8 28 63 84 32 12 ...TW...&..(c.2. 0060: F5 0A F4 C3 7E F7 C8 B5 2D 43 47 C2 C8 42 43 60 ........-CG..BC` 0070: AA E1 34 95 07 33 D7 E4 23 35 1A 39 33 1B CF 98 ..4..3..#5.93... 0080: 4E 8F F2 98 C3 64 A0 4A 79 71 8A 43 67 2B 20 BA N....d.Jyq.Cg+ . 0090: 2E 3F 6B D7 60 71 3B 69 84 86 DD 44 3C 18 F1 A3 .?k.`q;i...D<... 00A0: 3A 59 41 7E 07 34 08 4E BF A1 22 FD AB F9 E6 A6 :YA..4.N.."..... 00B0: AD B0 BB 80 38 E0 D3 92 16 16 16 E1 1A 36 BB 79 ....8........6.y 00C0: A0 BB 63 55 58 68 F2 46 88 30 5D 77 3F 69 92 80 ..cUXh.F.0]w?i.. 00D0: B3 2C A0 1B C9 27 5E A2 FE 17 CA 26 BB 3E 65 38 .,...'^....&.>e8 00E0: 7A 1A D0 6D F8 27 61 8B 2C 0A CE 14 35 ED 1F 12 z..m.'a.,...5... 00F0: 83 C4 84 1A 5F CA 10 1D 81 56 CF ED 84 44 35 9A ...._....V...D5. } } ) javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-15 12:35:07.818 IST|Finished.java:1010|Consuming client Finished handshake message ( "Finished": { "verify data": { 0000: 2D 87 5D 4F 44 BB 74 1D 64 13 CF 27 2D 55 47 1F -.]OD.t.d..'-UG. 0010: 64 7E 98 E0 FC 8A A0 D1 CF 3F CC 1C F7 EF 62 00 d........?....b. }'} ) javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-15 12:35:07.821 IST|SSLCipher.java:1867|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE countdown value = 137438953472 javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-15 12:35:07.822 IST|Finished.java:1110|Sending new session ticket 15-Nov-2019 12:35:07.823 FINE [https-jsse-nio-8443-exec-3] org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun Error during SSL handshake java.io.IOException: NOT_HANDSHAKING during handshake at org.apache.tomcat.util.net.SecureNioChannel.handshake(SecureNioChannel.java:193) at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1556) at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49) at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128) at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628) at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61) at java.base/java.lang.Thread.run(Thread.java:830) 15-Nov-2019 12:35:07.827 FINE [https-jsse-nio-8443-exec-3] org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper.doClose Calling [org.apache.tomcat.util.net.NioEndpoint@7bbe663e].closeSocket([org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper@18e53fb9:org.apache.tomcat.util.net.SecureNioChannel@28cdd70:java.nio.channels.SocketChannel[connected local=/0:0:0:0:0:0:0:1:8443 remote=/0:0:0:0:0:0:0:1:65311]]) java.lang.Exception at org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper.doClose(NioEndpoint.java:1163) at org.apache.tomcat.util.net.SocketWrapperBase.close(SocketWrapperBase.java:402) at org.apache.tomcat.util.net.NioEndpoint$Poller.cancelledKey(NioEndpoint.java:665) at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1586) at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49) at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128) at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628) at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61) at java.base/java.lang.Thread.run(Thread.java:830) javax.net.ssl|ALL|23|https-jsse-nio-8443-exec-3|2019-11-15 12:35:07.828 IST|SSLEngineImpl.java:818|Closing outbound of SSLEngine javax.net.ssl|WARNING|23|https-jsse-nio-8443-exec-3|2019-11-15 12:35:07.829 IST|SSLEngineOutputRecord.java:173|outbound has closed, ignore outbound application data 15-Nov-2019 12:35:07.858 FINE [https-jsse-nio-8443-exec-4] org.apache.tomcat.util.net.SecureNioChannel.processSNI The SNI host name extracted for connection [java.nio.channels.SocketChannel[connected local=/0:0:0:0:0:0:0:1:8443 remote=/0:0:0:0:0:0:0:1:65312]] was [localhost] javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:07.862 IST|HandshakeContext.java:297|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 for TLS10 javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:07.863 IST|HandshakeContext.java:297|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 for TLS10 javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:07.864 IST|HandshakeContext.java:297|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLS10 javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:07.864 IST|HandshakeContext.java:297|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLS10 javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:07.865 IST|HandshakeContext.java:297|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 for TLS13 javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:07.866 IST|HandshakeContext.java:297|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 for TLS13 javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:07.866 IST|HandshakeContext.java:297|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLS13 javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:07.867 IST|HandshakeContext.java:297|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLS13 javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:07.867 IST|HandshakeContext.java:297|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA for TLS13 javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:07.867 IST|HandshakeContext.java:297|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA for TLS13 javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:07.868 IST|HandshakeContext.java:297|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 for TLS11 javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:07.869 IST|HandshakeContext.java:297|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 for TLS11 javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:07.869 IST|HandshakeContext.java:297|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLS11 javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:07.870 IST|HandshakeContext.java:297|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLS11 javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:07.884 IST|SSLExtensions.java:132|Ignore unknown or unsupported extension ( "unknown extension (28)": { 0000: 40 01 @. } ) javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:07.886 IST|SSLExtensions.java:132|Ignore unknown or unsupported extension ( "unknown extension (21)": { 0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0090: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ............... } ) javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:07.896 IST|ClientHello.java:808|Consuming ClientHello handshake message ( "ClientHello": { "client version" : "TLSv1.2", "random" : "FE 6F 87 10 35 56 C3 9D DA 9E 8A E6 52 5D 65 59 D2 CB B0 52 96 0B 05 E0 15 44 DB 65 A8 CC 88 09", "session id" : "58 C7 4E 5E 93 E9 AC 49 23 C1 4B 31 83 E0 45 9E 70 3B EB 3D D3 DE E3 C3 D8 1C F7 5C 04 D0 58 61", "cipher suites" : "[TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_AES_256_GCM_SHA384(0x1302), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA(0xC00A), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA(0xC009), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA(0xC013), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA(0xC014), TLS_DHE_RSA_WITH_AES_128_CBC_SHA(0x0033), TLS_DHE_RSA_WITH_AES_256_CBC_SHA(0x0039), TLS_RSA_WITH_AES_128_CBC_SHA(0x002F), TLS_RSA_WITH_AES_256_CBC_SHA(0x0035), SSL_RSA_WITH_3DES_EDE_CBC_SHA(0x000A)]", "compression methods" : "00", "extensions" : [ "server_name (0)": { type=host_name (0), value=localhost }, "extended_master_secret (23)": { }, "renegotiation_info (65,281)": { "renegotiated connection": [] }, "supported_groups (10)": { "versions": [x25519, secp256r1, secp384r1, secp521r1, ffdhe2048, ffdhe3072] }, "ec_point_formats (11)": { "formats": [uncompressed] }, "application_layer_protocol_negotiation (16)": { [h2, http/1.1] }, "status_request (5)": { "certificate status type": ocsp "OCSP status request": { "responder_id": "request extensions": { } } }, "key_share (51)": { "client_shares": [ { "named group": x25519 "key_exchange": { 0000: 54 B0 3D BB A1 D3 9C 82 C6 47 90 30 3B B4 EB C2 T.=......G.0;... 0010: 16 53 89 3D 3B F6 8A F8 73 A8 DF 29 B8 9D 47 65 .S.=;...s..)..Ge } }, { "named group": secp256r1 "key_exchange": { 0000: 04 28 B3 CA 2C C5 59 63 51 A6 E9 BF 23 42 51 A2 .(..,.YcQ...#BQ. 0010: 40 B6 ED 41 2F FA 05 97 C7 DC DE EE C9 17 02 11 @..A/........... 0020: 49 10 F7 61 A8 34 9E 7E 90 9F E3 EB 29 F9 05 16 I..a.4......)... 0030: F3 9A E8 0B 0B C5 41 B0 2E FD 44 FE 66 0D D6 95 ......A...D.f... 0040: BA } }, ] }, "supported_versions (43)": { "versions": [TLSv1.3, TLSv1.2, TLSv1.1, TLSv1] }, "signature_algorithms (13)": { "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1] }, "unknown extension (28)": { 0000: 40 01 @. }, "unknown extension (21)": { 0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0090: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ............... } ] } ) javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:07.897 IST|SSLExtensions.java:189|Consumed extension: supported_versions javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:07.898 IST|ClientHello.java:838|Negotiated protocol version: TLSv1.3 javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:07.898 IST|PskKeyExchangeModesExtension.java:293|abort session resumption, no supported psk_dhe_ke PSK key exchange mode javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:07.898 IST|PreSharedKeyExtension.java:840|Handling pre_shared_key absence. javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:07.899 IST|ServerNameExtension.java:327|no server name matchers, ignore server name indication javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:07.899 IST|SSLExtensions.java:189|Consumed extension: server_name javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:07.900 IST|SSLExtensions.java:170|Ignore unavailable extension: max_fragment_length javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:07.900 IST|SSLExtensions.java:189|Consumed extension: status_request javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:07.900 IST|SSLExtensions.java:189|Consumed extension: supported_groups javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:07.901 IST|SSLExtensions.java:160|Ignore unsupported extension: ec_point_formats javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:07.901 IST|SSLExtensions.java:189|Consumed extension: signature_algorithms javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:07.902 IST|SSLExtensions.java:170|Ignore unavailable extension: signature_algorithms_cert javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:07.902 IST|AlpnExtension.java:277|Ignore server unenabled extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:07.903 IST|SSLExtensions.java:189|Consumed extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:07.903 IST|SSLExtensions.java:160|Ignore unsupported extension: status_request_v2 javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:07.903 IST|SSLExtensions.java:160|Ignore unsupported extension: extended_master_secret javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:07.904 IST|SSLExtensions.java:160|Ignore unsupported extension: session_ticket javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:07.905 IST|SSLExtensions.java:170|Ignore unavailable extension: cookie javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:07.906 IST|SSLExtensions.java:189|Consumed extension: key_share javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:07.906 IST|SSLExtensions.java:160|Ignore unsupported extension: renegotiation_info javax.net.ssl|ALL|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:07.908 IST|SignatureScheme.java:359|Ignore disabled signature scheme: rsa_md5 javax.net.ssl|WARNING|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:07.909 IST|SSLExtensions.java:212|Ignore impact of unsupported extension: server_name javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:07.909 IST|SSLExtensions.java:204|Ignore unavailable extension: max_fragment_length javax.net.ssl|WARNING|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:07.910 IST|SSLExtensions.java:212|Ignore impact of unsupported extension: status_request javax.net.ssl|WARNING|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:07.910 IST|SSLExtensions.java:212|Ignore impact of unsupported extension: supported_groups javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:07.911 IST|SSLExtensions.java:221|Populated with extension: signature_algorithms javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:07.912 IST|SSLExtensions.java:204|Ignore unavailable extension: signature_algorithms_cert javax.net.ssl|WARNING|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:07.912 IST|SSLExtensions.java:212|Ignore impact of unsupported extension: application_layer_protocol_negotiation javax.net.ssl|WARNING|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:07.913 IST|SSLExtensions.java:212|Ignore impact of unsupported extension: supported_versions javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:07.913 IST|SSLExtensions.java:204|Ignore unavailable extension: cookie javax.net.ssl|WARNING|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:07.914 IST|SSLExtensions.java:212|Ignore impact of unsupported extension: key_share javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:07.915 IST|SSLExtensions.java:204|Ignore unavailable extension: pre_shared_key javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:07.915 IST|ServerHello.java:733|use cipher suite TLS_AES_128_GCM_SHA256 javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:07.928 IST|SSLExtensions.java:257|Ignore, context unavailable extension: pre_shared_key javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:07.930 IST|ServerHello.java:587|Produced ServerHello handshake message ( "ServerHello": { "server version" : "TLSv1.2", "random" : "BB FB 01 9F 2A 7F 77 3F D9 B1 15 08 1D F5 D4 45 77 4F 3E 70 C1 45 A6 EA 9B 2B E7 66 44 29 02 17", "session id" : "58 C7 4E 5E 93 E9 AC 49 23 C1 4B 31 83 E0 45 9E 70 3B EB 3D D3 DE E3 C3 D8 1C F7 5C 04 D0 58 61", "cipher suite" : "TLS_AES_128_GCM_SHA256(0x1301)", "compression methods" : "00", "extensions" : [ "supported_versions (43)": { "selected version": [TLSv1.3] }, "key_share (51)": { "server_share": { "named group": x25519 "key_exchange": { 0000: D0 D0 DA 22 C0 22 B0 3D 0A 1E FB 39 FB FD 9D 54 ...".".=...9...T 0010: 58 21 01 F8 D6 83 2E 07 CC B4 66 C7 7E 34 BD 52 X!........f..4.R } }, } ] } ) javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:07.939 IST|SSLCipher.java:1867|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE countdown value = 137438953472 javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:07.941 IST|SSLCipher.java:2021|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE countdown value = 137438953472 javax.net.ssl|ALL|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:07.941 IST|ServerNameExtension.java:537|No expected server name indication response javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:07.942 IST|SSLExtensions.java:257|Ignore, context unavailable extension: server_name javax.net.ssl|ALL|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:07.942 IST|MaxFragExtension.java:469|Ignore unavailable max_fragment_length extension javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:07.943 IST|SSLExtensions.java:257|Ignore, context unavailable extension: max_fragment_length javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:07.953 IST|AlpnExtension.java:365|Ignore unavailable extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:07.954 IST|SSLExtensions.java:257|Ignore, context unavailable extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:07.955 IST|EncryptedExtensions.java:137|Produced EncryptedExtensions message ( "EncryptedExtensions": [ "supported_groups (10)": { "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192] } ] ) javax.net.ssl|ALL|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:07.957 IST|SignatureScheme.java:364|Ignore inactive signature scheme: dsa_sha256 javax.net.ssl|ALL|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:07.959 IST|SignatureScheme.java:364|Ignore inactive signature scheme: dsa_sha1 javax.net.ssl|ALL|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:07.959 IST|SignatureScheme.java:364|Ignore inactive signature scheme: rsa_md5 javax.net.ssl|ALL|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:07.960 IST|SignatureScheme.java:364|Ignore inactive signature scheme: dsa_sha256 javax.net.ssl|ALL|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:07.961 IST|SignatureScheme.java:364|Ignore inactive signature scheme: dsa_sha1 javax.net.ssl|ALL|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:07.962 IST|SignatureScheme.java:364|Ignore inactive signature scheme: rsa_md5 javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:07.977 IST|CertificateRequest.java:882|Produced CertificateRequest message ( "CertificateRequest": { "certificate_request_context": "", "extensions": [ "signature_algorithms (13)": { "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1] }, "signature_algorithms_cert (50)": { "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1] } ] } ) javax.net.ssl|ALL|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:07.978 IST|X509Authentication.java:295|No X.509 cert selected for EC javax.net.ssl|WARNING|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:07.978 IST|CertificateMessage.java:1062|Unavailable authentication scheme: ecdsa_secp256r1_sha256 javax.net.ssl|ALL|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:07.979 IST|X509Authentication.java:295|No X.509 cert selected for EC javax.net.ssl|WARNING|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:07.980 IST|CertificateMessage.java:1062|Unavailable authentication scheme: ecdsa_secp384r1_sha384 javax.net.ssl|ALL|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:07.980 IST|X509Authentication.java:295|No X.509 cert selected for EC javax.net.ssl|WARNING|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:07.981 IST|CertificateMessage.java:1062|Unavailable authentication scheme: ecdsa_secp521r1_sha512 javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:07.981 IST|StatusResponseManager.java:763|Staping disabled or is a resumed session javax.net.ssl|ALL|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:07.981 IST|CertStatusExtension.java:1115|Stapling is disabled for this connection javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:07.982 IST|SSLExtensions.java:257|Ignore, context unavailable extension: status_request javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:07.984 IST|CertificateMessage.java:1001|Produced server Certificate message ( "Certificate": { "certificate_request_context": "", "certificate_list": [ { "certificate" : { "version" : "v3", "serial number" : "3B FD 86 4A 58 09 72 F6", "signature algorithm": "SHA512withRSA", "issuer" : "CN=localhost", "not before" : "2019-11-05 13:41:52.000 IST", "not after" : "2020-11-05 13:41:52.000 IST", "subject" : "CN=localhost", "subject public key" : "RSA", "extensions" : [ { ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:false PathLen:2147483647 ] }, { ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_Encipherment Data_Encipherment ] } ]} "extensions": { } }, ] } ) javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:08.036 IST|CertificateVerify.java:1080|Produced server CertificateVerify handshake message ( "CertificateVerify": { "signature algorithm": rsa_pss_rsae_sha256 "signature": { 0000: 65 20 4A 6C DD 7A 24 56 63 39 69 AE 63 2D 2A 40 e Jl.z$Vc9i.c-*@ 0010: D3 58 3D B9 71 64 18 39 15 D1 1E 3C EE 88 00 C2 .X=.qd.9...<.... 0020: 1C 2E 22 CF 1D 66 7C 64 AE B6 21 93 85 95 1C E4 .."..f.d..!..... 0030: 49 37 ED D3 A4 F5 6A A9 08 63 A6 4A 81 B7 94 F7 I7....j..c.J.... 0040: BF 1D FC 46 16 89 32 10 FE 4A 21 B9 4F E9 F8 66 ...F..2..J!.O..f 0050: 5E 63 BD 97 87 FB 11 52 54 76 FA 96 91 0D 76 95 ^c.....RTv....v. 0060: 58 98 AB AE 99 8D 98 FF 70 68 52 D8 61 E3 9D 2C X.......phR.a.., 0070: 8E 72 5B 91 3F BF 2F 5D 07 64 9B 41 B5 61 60 F2 .r[.?./].d.A.a`. 0080: 21 74 83 09 71 81 ED 04 50 2A 9F EA CF 66 A1 A8 !t..q...P*...f.. 0090: 8F BE AA A2 75 E0 12 62 60 34 2E CD BC 17 F0 11 ....u..b`4...... 00A0: 1B A5 87 D6 E7 EC 3A 51 B4 00 F4 AA 41 2B 5E AF ......:Q....A+^. 00B0: 24 CD A4 C8 26 45 04 51 33 60 24 F0 2D F4 93 D8 $...&E.Q3`$.-... 00C0: AC CB 8E ED 21 F1 72 8B E4 9C 79 B4 73 50 D8 55 ....!.r...y.sP.U 00D0: 48 FF 0B 57 E1 8A 2D 48 B8 3C 0D 83 CE F9 A9 D2 H..W..-H.<...... 00E0: 3B EB C6 B3 F4 6C 42 2D 6B 4A 00 68 FE 54 82 13 ;....lB-kJ.h.T.. 00F0: FE 04 AC AE C4 5D 0A B3 A6 89 D3 75 CB 40 9B D0 .....].....u.@.. } } ) javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:08.038 IST|Finished.java:767|Produced server Finished handshake message ( "Finished": { "verify data": { 0000: 0E E4 FE 48 E3 C9 02 4F 6B E1 A5 56 00 A2 77 36 ...H...Ok..V..w6 0010: ED E8 98 03 1B 1B 7C 12 4F D2 A7 BD 76 A1 56 94 ........O...v.V. }'} ) javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:08.041 IST|SSLCipher.java:2021|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE countdown value = 137438953472 javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-15 12:35:08.083 IST|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-15 12:35:08.088 IST|CertificateMessage.java:1156|Consuming client Certificate handshake message ( "Certificate": { "certificate_request_context": "", "certificate_list": [ { "certificate" : { "version" : "v3", "serial number" : "2C 8B E3 32 BC 02 24 C0", "signature algorithm": "SHA512withRSA", "issuer" : "CN=client", "not before" : "2019-11-05 13:43:21.000 IST", "not after" : "2020-11-05 13:43:21.000 IST", "subject" : "CN=client", "subject public key" : "RSA", "extensions" : [ { ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:false PathLen:2147483647 ] }, { ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_Encipherment Data_Encipherment ] } ]} "extensions": { } }, ] } ) javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-15 12:35:08.091 IST|CertificateVerify.java:1128|Consuming CertificateVerify handshake message ( "CertificateVerify": { "signature algorithm": rsa_pss_rsae_sha256 "signature": { 0000: 3E BA 34 82 D1 BB 77 93 79 D3 F1 63 67 41 0F B9 >.4...w.y..cgA.. 0010: 47 3D B9 62 B2 2F 99 8F 3F 72 1C 76 B5 D2 B9 58 G=.b./..?r.v...X 0020: 06 E2 30 69 55 F6 AE 8D 8D 18 A3 C6 BF A8 95 1B ..0iU........... 0030: 3C E4 C4 D3 78 59 1E 38 2E 04 87 0F 21 C3 8F DE <...xY.8....!... 0040: 73 F9 D7 8D CB FD BF F7 C0 B4 B6 CD FF AF 6D C3 s.............m. 0050: 4B 06 C6 55 5C 63 AC 87 65 3E 74 06 75 D8 CA 42 K..U\c..e>t.u..B 0060: 31 01 81 3E 95 F2 E0 02 9C 9F 50 57 D8 F8 4C 5B 1..>......PW..L[ 0070: 5D F2 F3 4D 42 36 05 C5 E0 3D B6 58 35 04 7C 8B ]..MB6...=.X5... 0080: BF 80 77 1C 7D 44 08 68 E0 C1 76 36 36 20 41 F1 ..w..D.h..v66 A. 0090: 10 29 C4 70 31 F0 55 67 44 CF B8 C3 A3 E7 5C A5 .).p1.UgD.....\. 00A0: 6E 27 AD A4 80 20 FD 67 26 09 DF 9B 87 77 7A D4 n'... .g&....wz. 00B0: 69 D8 04 18 50 1F A3 91 2B 7B 64 C6 2C 20 5A D6 i...P...+.d., Z. 00C0: BE 96 69 E8 4D 21 AD FF 2A 23 7C BF 20 18 10 54 ..i.M!..*#.. ..T 00D0: 52 06 22 D6 C4 B6 E7 04 4D 7A 40 02 25 50 5C 21 R.".....Mz@.%P\! 00E0: 6A BE 83 73 91 C8 BB E1 AF EE CC ED 56 65 A4 3A j..s........Ve.: 00F0: 19 0E A6 59 00 40 5C C5 5B FA B7 E2 DC B3 72 B7 ...Y.@\.[.....r. } } ) javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-15 12:35:08.093 IST|Finished.java:1010|Consuming client Finished handshake message ( "Finished": { "verify data": { 0000: 8E BE AD 37 18 F9 52 D4 41 D3 F0 11 36 9A 90 19 ...7..R.A...6... 0010: 1D D8 7C 5D 6A 46 36 5E FD C0 7E CC A3 12 E5 5E ...]jF6^.......^ }'} ) javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-15 12:35:08.095 IST|SSLCipher.java:1867|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE countdown value = 137438953472 javax.net.ssl|DEBUG|27|https-jsse-nio-8443-exec-7|2019-11-15 12:35:08.096 IST|Finished.java:1110|Sending new session ticket 15-Nov-2019 12:35:08.096 FINE [https-jsse-nio-8443-exec-7] org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun Error during SSL handshake java.io.IOException: NOT_HANDSHAKING during handshake at org.apache.tomcat.util.net.SecureNioChannel.handshake(SecureNioChannel.java:193) at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1556) at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49) at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128) at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628) at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61) at java.base/java.lang.Thread.run(Thread.java:830) 15-Nov-2019 12:35:08.098 FINE [https-jsse-nio-8443-exec-7] org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper.doClose Calling [org.apache.tomcat.util.net.NioEndpoint@7bbe663e].closeSocket([org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper@1b79fe7e:org.apache.tomcat.util.net.SecureNioChannel@28cdd70:java.nio.channels.SocketChannel[connected local=/0:0:0:0:0:0:0:1:8443 remote=/0:0:0:0:0:0:0:1:65312]]) java.lang.Exception at org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper.doClose(NioEndpoint.java:1163) at org.apache.tomcat.util.net.SocketWrapperBase.close(SocketWrapperBase.java:402) at org.apache.tomcat.util.net.NioEndpoint$Poller.cancelledKey(NioEndpoint.java:665) at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1586) at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49) at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128) at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628) at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61) at java.base/java.lang.Thread.run(Thread.java:830) javax.net.ssl|ALL|27|https-jsse-nio-8443-exec-7|2019-11-15 12:35:08.099 IST|SSLEngineImpl.java:818|Closing outbound of SSLEngine javax.net.ssl|WARNING|27|https-jsse-nio-8443-exec-7|2019-11-15 12:35:08.099 IST|SSLEngineOutputRecord.java:173|outbound has closed, ignore outbound application data 15-Nov-2019 12:35:08.124 FINE [https-jsse-nio-8443-exec-8] org.apache.tomcat.util.net.SecureNioChannel.processSNI The SNI host name extracted for connection [java.nio.channels.SocketChannel[connected local=/0:0:0:0:0:0:0:1:8443 remote=/0:0:0:0:0:0:0:1:65313]] was [localhost] javax.net.ssl|DEBUG|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:08.126 IST|HandshakeContext.java:297|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 for TLS10 javax.net.ssl|DEBUG|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:08.127 IST|HandshakeContext.java:297|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 for TLS10 javax.net.ssl|DEBUG|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:08.127 IST|HandshakeContext.java:297|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLS10 javax.net.ssl|DEBUG|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:08.128 IST|HandshakeContext.java:297|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLS10 javax.net.ssl|DEBUG|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:08.128 IST|HandshakeContext.java:297|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 for TLS13 javax.net.ssl|DEBUG|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:08.128 IST|HandshakeContext.java:297|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 for TLS13 javax.net.ssl|DEBUG|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:08.129 IST|HandshakeContext.java:297|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLS13 javax.net.ssl|DEBUG|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:08.129 IST|HandshakeContext.java:297|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLS13 javax.net.ssl|DEBUG|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:08.129 IST|HandshakeContext.java:297|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA for TLS13 javax.net.ssl|DEBUG|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:08.129 IST|HandshakeContext.java:297|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA for TLS13 javax.net.ssl|DEBUG|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:08.130 IST|HandshakeContext.java:297|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 for TLS11 javax.net.ssl|DEBUG|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:08.130 IST|HandshakeContext.java:297|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 for TLS11 javax.net.ssl|DEBUG|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:08.130 IST|HandshakeContext.java:297|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLS11 javax.net.ssl|DEBUG|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:08.130 IST|HandshakeContext.java:297|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLS11 javax.net.ssl|DEBUG|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:08.139 IST|SSLExtensions.java:132|Ignore unknown or unsupported extension ( "unknown extension (28)": { 0000: 40 01 @. } ) javax.net.ssl|DEBUG|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:08.141 IST|SSLExtensions.java:132|Ignore unknown or unsupported extension ( "unknown extension (21)": { 0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0090: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ............... } ) javax.net.ssl|DEBUG|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:08.152 IST|ClientHello.java:808|Consuming ClientHello handshake message ( "ClientHello": { "client version" : "TLSv1.2", "random" : "EB 0B 1B 64 29 13 60 15 AC 51 8A E8 21 31 68 04 90 8F 03 50 D4 C7 A1 6C EE F9 22 25 32 E7 BA 34", "session id" : "45 50 6B CF F8 0B 6B 80 2C 7D 07 EF 10 41 A9 AD 3D CC CF 1F F3 BA 5B C7 B5 AE D0 F5 27 0E C8 FC", "cipher suites" : "[TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_AES_256_GCM_SHA384(0x1302), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA(0xC00A), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA(0xC009), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA(0xC013), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA(0xC014), TLS_DHE_RSA_WITH_AES_128_CBC_SHA(0x0033), TLS_DHE_RSA_WITH_AES_256_CBC_SHA(0x0039), TLS_RSA_WITH_AES_128_CBC_SHA(0x002F), TLS_RSA_WITH_AES_256_CBC_SHA(0x0035), SSL_RSA_WITH_3DES_EDE_CBC_SHA(0x000A)]", "compression methods" : "00", "extensions" : [ "server_name (0)": { type=host_name (0), value=localhost }, "extended_master_secret (23)": { }, "renegotiation_info (65,281)": { "renegotiated connection": [] }, "supported_groups (10)": { "versions": [x25519, secp256r1, secp384r1, secp521r1, ffdhe2048, ffdhe3072] }, "ec_point_formats (11)": { "formats": [uncompressed] }, "application_layer_protocol_negotiation (16)": { [h2, http/1.1] }, "status_request (5)": { "certificate status type": ocsp "OCSP status request": { "responder_id": "request extensions": { } } }, "key_share (51)": { "client_shares": [ { "named group": x25519 "key_exchange": { 0000: C2 A8 33 3A F6 69 53 87 11 91 4B D0 4E E8 E9 F0 ..3:.iS...K.N... 0010: 98 5D 58 2B 35 DD 73 B4 5C 43 C3 1F A8 10 D1 4E .]X+5.s.\C.....N } }, { "named group": secp256r1 "key_exchange": { 0000: 04 68 E8 D1 54 9A 03 5D D2 11 F4 C2 7E D1 EF F3 .h..T..]........ 0010: BC C6 D4 5A 12 43 56 62 B9 91 C7 C4 24 10 5E 32 ...Z.CVb....$.^2 0020: 5E 18 FB 6D 65 5D 0F FE 4F 31 9A BE 23 03 FA 67 ^..me]..O1..#..g 0030: CE 42 6C F0 94 2E 23 C7 FA AF 4B E9 A0 3A B2 37 .Bl...#...K..:.7 0040: B8 } }, ] }, "supported_versions (43)": { "versions": [TLSv1.3, TLSv1.2, TLSv1.1, TLSv1] }, "signature_algorithms (13)": { "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1] }, "unknown extension (28)": { 0000: 40 01 @. }, "unknown extension (21)": { 0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0090: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ............... } ] } ) javax.net.ssl|DEBUG|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:08.153 IST|SSLExtensions.java:189|Consumed extension: supported_versions javax.net.ssl|DEBUG|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:08.154 IST|ClientHello.java:838|Negotiated protocol version: TLSv1.3 javax.net.ssl|DEBUG|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:08.154 IST|PskKeyExchangeModesExtension.java:293|abort session resumption, no supported psk_dhe_ke PSK key exchange mode javax.net.ssl|DEBUG|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:08.155 IST|PreSharedKeyExtension.java:840|Handling pre_shared_key absence. javax.net.ssl|DEBUG|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:08.155 IST|ServerNameExtension.java:327|no server name matchers, ignore server name indication javax.net.ssl|DEBUG|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:08.156 IST|SSLExtensions.java:189|Consumed extension: server_name javax.net.ssl|DEBUG|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:08.156 IST|SSLExtensions.java:170|Ignore unavailable extension: max_fragment_length javax.net.ssl|DEBUG|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:08.157 IST|SSLExtensions.java:189|Consumed extension: status_request javax.net.ssl|DEBUG|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:08.157 IST|SSLExtensions.java:189|Consumed extension: supported_groups javax.net.ssl|DEBUG|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:08.158 IST|SSLExtensions.java:160|Ignore unsupported extension: ec_point_formats javax.net.ssl|DEBUG|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:08.158 IST|SSLExtensions.java:189|Consumed extension: signature_algorithms javax.net.ssl|DEBUG|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:08.158 IST|SSLExtensions.java:170|Ignore unavailable extension: signature_algorithms_cert javax.net.ssl|DEBUG|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:08.159 IST|AlpnExtension.java:277|Ignore server unenabled extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:08.159 IST|SSLExtensions.java:189|Consumed extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:08.159 IST|SSLExtensions.java:160|Ignore unsupported extension: status_request_v2 javax.net.ssl|DEBUG|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:08.160 IST|SSLExtensions.java:160|Ignore unsupported extension: extended_master_secret javax.net.ssl|DEBUG|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:08.160 IST|SSLExtensions.java:160|Ignore unsupported extension: session_ticket javax.net.ssl|DEBUG|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:08.160 IST|SSLExtensions.java:170|Ignore unavailable extension: cookie javax.net.ssl|DEBUG|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:08.162 IST|SSLExtensions.java:189|Consumed extension: key_share javax.net.ssl|DEBUG|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:08.162 IST|SSLExtensions.java:160|Ignore unsupported extension: renegotiation_info javax.net.ssl|ALL|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:08.164 IST|SignatureScheme.java:359|Ignore disabled signature scheme: rsa_md5 javax.net.ssl|WARNING|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:08.164 IST|SSLExtensions.java:212|Ignore impact of unsupported extension: server_name javax.net.ssl|DEBUG|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:08.165 IST|SSLExtensions.java:204|Ignore unavailable extension: max_fragment_length javax.net.ssl|WARNING|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:08.165 IST|SSLExtensions.java:212|Ignore impact of unsupported extension: status_request javax.net.ssl|WARNING|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:08.165 IST|SSLExtensions.java:212|Ignore impact of unsupported extension: supported_groups javax.net.ssl|DEBUG|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:08.166 IST|SSLExtensions.java:221|Populated with extension: signature_algorithms javax.net.ssl|DEBUG|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:08.167 IST|SSLExtensions.java:204|Ignore unavailable extension: signature_algorithms_cert javax.net.ssl|WARNING|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:08.167 IST|SSLExtensions.java:212|Ignore impact of unsupported extension: application_layer_protocol_negotiation javax.net.ssl|WARNING|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:08.167 IST|SSLExtensions.java:212|Ignore impact of unsupported extension: supported_versions javax.net.ssl|DEBUG|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:08.168 IST|SSLExtensions.java:204|Ignore unavailable extension: cookie javax.net.ssl|WARNING|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:08.168 IST|SSLExtensions.java:212|Ignore impact of unsupported extension: key_share javax.net.ssl|DEBUG|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:08.168 IST|SSLExtensions.java:204|Ignore unavailable extension: pre_shared_key javax.net.ssl|DEBUG|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:08.169 IST|ServerHello.java:733|use cipher suite TLS_AES_128_GCM_SHA256 javax.net.ssl|DEBUG|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:08.177 IST|SSLExtensions.java:257|Ignore, context unavailable extension: pre_shared_key javax.net.ssl|DEBUG|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:08.181 IST|ServerHello.java:587|Produced ServerHello handshake message ( "ServerHello": { "server version" : "TLSv1.2", "random" : "56 15 C1 12 A0 99 9D FE F9 F8 6A B5 2A 54 E8 65 20 D7 9D CE 2B 95 B3 C6 0E 07 8D 0D 3E 8B 7E C0", "session id" : "45 50 6B CF F8 0B 6B 80 2C 7D 07 EF 10 41 A9 AD 3D CC CF 1F F3 BA 5B C7 B5 AE D0 F5 27 0E C8 FC", "cipher suite" : "TLS_AES_128_GCM_SHA256(0x1301)", "compression methods" : "00", "extensions" : [ "supported_versions (43)": { "selected version": [TLSv1.3] }, "key_share (51)": { "server_share": { "named group": x25519 "key_exchange": { 0000: A0 7F 05 AC 0A A2 38 45 2E 61 A5 92 C4 3B 1E D0 ......8E.a...;.. 0010: B1 7F 4C 34 B4 91 B3 9B 1F D7 A5 F4 B6 69 87 25 ..L4.........i.% } }, } ] } ) javax.net.ssl|DEBUG|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:08.189 IST|SSLCipher.java:1867|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE countdown value = 137438953472 javax.net.ssl|DEBUG|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:08.190 IST|SSLCipher.java:2021|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE countdown value = 137438953472 javax.net.ssl|ALL|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:08.191 IST|ServerNameExtension.java:537|No expected server name indication response javax.net.ssl|DEBUG|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:08.192 IST|SSLExtensions.java:257|Ignore, context unavailable extension: server_name javax.net.ssl|ALL|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:08.192 IST|MaxFragExtension.java:469|Ignore unavailable max_fragment_length extension javax.net.ssl|DEBUG|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:08.193 IST|SSLExtensions.java:257|Ignore, context unavailable extension: max_fragment_length javax.net.ssl|DEBUG|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:08.194 IST|AlpnExtension.java:365|Ignore unavailable extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:08.195 IST|SSLExtensions.java:257|Ignore, context unavailable extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:08.196 IST|EncryptedExtensions.java:137|Produced EncryptedExtensions message ( "EncryptedExtensions": [ "supported_groups (10)": { "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192] } ] ) javax.net.ssl|ALL|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:08.198 IST|SignatureScheme.java:364|Ignore inactive signature scheme: dsa_sha256 javax.net.ssl|ALL|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:08.198 IST|SignatureScheme.java:364|Ignore inactive signature scheme: dsa_sha1 javax.net.ssl|ALL|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:08.199 IST|SignatureScheme.java:364|Ignore inactive signature scheme: rsa_md5 javax.net.ssl|ALL|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:08.200 IST|SignatureScheme.java:364|Ignore inactive signature scheme: dsa_sha256 javax.net.ssl|ALL|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:08.201 IST|SignatureScheme.java:364|Ignore inactive signature scheme: dsa_sha1 javax.net.ssl|ALL|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:08.201 IST|SignatureScheme.java:364|Ignore inactive signature scheme: rsa_md5 javax.net.ssl|DEBUG|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:08.203 IST|CertificateRequest.java:882|Produced CertificateRequest message ( "CertificateRequest": { "certificate_request_context": "", "extensions": [ "signature_algorithms (13)": { "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1] }, "signature_algorithms_cert (50)": { "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1] } ] } ) javax.net.ssl|ALL|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:08.205 IST|X509Authentication.java:295|No X.509 cert selected for EC javax.net.ssl|WARNING|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:08.206 IST|CertificateMessage.java:1062|Unavailable authentication scheme: ecdsa_secp256r1_sha256 javax.net.ssl|ALL|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:08.206 IST|X509Authentication.java:295|No X.509 cert selected for EC javax.net.ssl|WARNING|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:08.207 IST|CertificateMessage.java:1062|Unavailable authentication scheme: ecdsa_secp384r1_sha384 javax.net.ssl|ALL|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:08.207 IST|X509Authentication.java:295|No X.509 cert selected for EC javax.net.ssl|WARNING|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:08.207 IST|CertificateMessage.java:1062|Unavailable authentication scheme: ecdsa_secp521r1_sha512 javax.net.ssl|DEBUG|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:08.208 IST|StatusResponseManager.java:763|Staping disabled or is a resumed session javax.net.ssl|ALL|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:08.208 IST|CertStatusExtension.java:1115|Stapling is disabled for this connection javax.net.ssl|DEBUG|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:08.208 IST|SSLExtensions.java:257|Ignore, context unavailable extension: status_request javax.net.ssl|DEBUG|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:08.211 IST|CertificateMessage.java:1001|Produced server Certificate message ( "Certificate": { "certificate_request_context": "", "certificate_list": [ { "certificate" : { "version" : "v3", "serial number" : "3B FD 86 4A 58 09 72 F6", "signature algorithm": "SHA512withRSA", "issuer" : "CN=localhost", "not before" : "2019-11-05 13:41:52.000 IST", "not after" : "2020-11-05 13:41:52.000 IST", "subject" : "CN=localhost", "subject public key" : "RSA", "extensions" : [ { ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:false PathLen:2147483647 ] }, { ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_Encipherment Data_Encipherment ] } ]} "extensions": { } }, ] } ) javax.net.ssl|DEBUG|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:08.245 IST|CertificateVerify.java:1080|Produced server CertificateVerify handshake message ( "CertificateVerify": { "signature algorithm": rsa_pss_rsae_sha256 "signature": { 0000: 0A E1 EF 01 41 99 23 F9 C0 85 B5 AF 08 AB 17 BB ....A.#......... 0010: E1 9B BD 83 EE DA 26 BC BC 5E 98 D1 7D F4 15 22 ......&..^....." 0020: F1 C0 F8 63 A4 12 8B 1A 94 DD 75 6D 9E CC F8 AD ...c......um.... 0030: 8E 00 A7 7A F0 14 6C 11 F5 37 BB F6 8F 0C 1A 38 ...z..l..7.....8 0040: 91 22 9D 2B 55 6D FE 86 A1 47 17 77 1B 9A 0D DD .".+Um...G.w.... 0050: 7C A9 86 BF CA BC 83 2B 41 05 31 9E 6C 60 F6 66 .......+A.1.l`.f 0060: 51 61 FA 75 26 A5 68 C5 9B 3E 9E FB 03 9E 69 85 Qa.u&.h..>....i. 0070: 0E 4F 97 C4 36 3E 3A 3B A3 4C 61 46 EA 5B BF 18 .O..6>:;.LaF.[.. 0080: 46 67 4B F0 E7 F9 93 DB 7F 23 03 EE 1F 2B 5F A0 FgK......#...+_. 0090: 5E F5 81 EA 0D 70 D8 2B 2E 93 31 38 30 56 E1 F0 ^....p.+..180V.. 00A0: 80 51 3B 8A AA 9F CC B0 E2 F5 8C EA DD 66 4F AE .Q;..........fO. 00B0: 3E BB 03 02 CA E5 88 99 6F A4 56 4F C2 59 5E CD >.......o.VO.Y^. 00C0: 47 B1 0C E0 C7 8A 08 E6 1D EC 46 6A 90 B0 70 8A G.........Fj..p. 00D0: 8B 04 8C 41 04 87 41 83 36 C2 8F 08 4C 72 F8 04 ...A..A.6...Lr.. 00E0: 55 97 46 21 16 C5 CE 3B 80 82 42 2C C1 2D 90 9D U.F!...;..B,.-.. 00F0: 23 D0 F4 DE E4 03 D8 6D 34 E0 2E 7E E1 A4 2B E9 #......m4.....+. } } ) javax.net.ssl|DEBUG|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:08.247 IST|Finished.java:767|Produced server Finished handshake message ( "Finished": { "verify data": { 0000: 57 71 DC 13 A9 05 CB 8A 4F 0B 6E D0 63 87 89 24 Wq......O.n.c..$ 0010: 25 EE 20 03 71 90 9D AA 40 D9 CD E5 72 67 DC C2 %. .q...@...rg.. }'} ) javax.net.ssl|DEBUG|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:08.249 IST|SSLCipher.java:2021|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE countdown value = 137438953472 javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-15 12:35:08.295 IST|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-15 12:35:08.299 IST|CertificateMessage.java:1156|Consuming client Certificate handshake message ( "Certificate": { "certificate_request_context": "", "certificate_list": [ { "certificate" : { "version" : "v3", "serial number" : "2C 8B E3 32 BC 02 24 C0", "signature algorithm": "SHA512withRSA", "issuer" : "CN=client", "not before" : "2019-11-05 13:43:21.000 IST", "not after" : "2020-11-05 13:43:21.000 IST", "subject" : "CN=client", "subject public key" : "RSA", "extensions" : [ { ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:false PathLen:2147483647 ] }, { ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_Encipherment Data_Encipherment ] } ]} "extensions": { } }, ] } ) javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-15 12:35:08.307 IST|CertificateVerify.java:1128|Consuming CertificateVerify handshake message ( "CertificateVerify": { "signature algorithm": rsa_pss_rsae_sha256 "signature": { 0000: 93 2B 6C 5E B1 69 BE B2 10 03 46 8C BE 5A 55 83 .+l^.i....F..ZU. 0010: E8 E3 7B A1 4C D9 08 B6 E1 C7 06 B6 B0 43 ED 96 ....L........C.. 0020: 62 0F 95 F9 80 9E 02 D6 42 A0 0E E5 5B 86 AE CF b.......B...[... 0030: BE DD C1 72 BF CC 4C 5C DE 91 85 C9 86 AB B9 63 ...r..L\.......c 0040: E4 3A 47 DD FB D6 AA 27 2B 15 D5 6C 77 ED 03 67 .:G....'+..lw..g 0050: 08 E2 38 C4 0B 33 6C FD D1 EA 31 A9 92 7F E1 D6 ..8..3l...1..... 0060: E7 8E FC E1 CC 11 DA 6F B0 71 0F 79 3B 4C 88 B0 .......o.q.y;L.. 0070: EB 77 F1 60 5C 14 5C 48 E9 F9 54 D1 81 70 70 91 .w.`\.\H..T..pp. 0080: 36 A8 95 E8 46 41 56 F6 87 8C C7 09 C7 BB 08 9F 6...FAV......... 0090: 96 17 AB 93 E0 F4 E0 D7 00 00 4C 82 56 A1 1A DA ..........L.V... 00A0: 81 AB 6D 87 D4 28 09 83 FC 35 40 70 BA 17 09 AE ..m..(...5@p.... 00B0: 30 D0 1D 68 66 FD 03 4C 07 52 78 48 DF EF DA 94 0..hf..L.RxH.... 00C0: 94 25 A7 00 35 86 EA 57 61 C4 9C A3 4A DD 6E 7B .%..5..Wa...J.n. 00D0: 70 75 5E 48 13 7C 2F C8 B2 FA 59 0A 40 5D B7 34 pu^H../...Y.@].4 00E0: 12 5C EE 44 F3 85 80 D1 49 E4 EE B6 32 BE 16 CF .\.D....I...2... 00F0: 83 87 36 9C F6 8D 94 1F 3A C4 4D 30 A3 8D AB 55 ..6.....:.M0...U } } ) javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-15 12:35:08.308 IST|Finished.java:1010|Consuming client Finished handshake message ( "Finished": { "verify data": { 0000: EE 32 CE DC 62 BE 43 8C 31 6F 14 F5 21 9D 42 16 .2..b.C.1o..!.B. 0010: C9 5C 19 23 BB F5 06 05 FA D2 42 CE 9D 45 53 30 .\.#......B..ES0 }'} ) javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-15 12:35:08.310 IST|SSLCipher.java:1867|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE countdown value = 137438953472 javax.net.ssl|DEBUG|21|https-jsse-nio-8443-exec-1|2019-11-15 12:35:08.311 IST|Finished.java:1110|Sending new session ticket 15-Nov-2019 12:35:08.311 FINE [https-jsse-nio-8443-exec-1] org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun Error during SSL handshake java.io.IOException: NOT_HANDSHAKING during handshake at org.apache.tomcat.util.net.SecureNioChannel.handshake(SecureNioChannel.java:193) at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1556) at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49) at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128) at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628) at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61) at java.base/java.lang.Thread.run(Thread.java:830) 15-Nov-2019 12:35:08.314 FINE [https-jsse-nio-8443-exec-1] org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper.doClose Calling [org.apache.tomcat.util.net.NioEndpoint@7bbe663e].closeSocket([org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper@f5b7e21:org.apache.tomcat.util.net.SecureNioChannel@28cdd70:java.nio.channels.SocketChannel[connected local=/0:0:0:0:0:0:0:1:8443 remote=/0:0:0:0:0:0:0:1:65313]]) java.lang.Exception at org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper.doClose(NioEndpoint.java:1163) at org.apache.tomcat.util.net.SocketWrapperBase.close(SocketWrapperBase.java:402) at org.apache.tomcat.util.net.NioEndpoint$Poller.cancelledKey(NioEndpoint.java:665) at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1586) at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49) at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128) at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628) at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61) at java.base/java.lang.Thread.run(Thread.java:830) javax.net.ssl|ALL|21|https-jsse-nio-8443-exec-1|2019-11-15 12:35:08.315 IST|SSLEngineImpl.java:818|Closing outbound of SSLEngine javax.net.ssl|WARNING|21|https-jsse-nio-8443-exec-1|2019-11-15 12:35:08.315 IST|SSLEngineOutputRecord.java:173|outbound has closed, ignore outbound application data 15-Nov-2019 12:35:08.339 FINE [https-jsse-nio-8443-exec-2] org.apache.tomcat.util.net.SecureNioChannel.processSNI The SNI host name extracted for connection [java.nio.channels.SocketChannel[connected local=/0:0:0:0:0:0:0:1:8443 remote=/0:0:0:0:0:0:0:1:65314]] was [localhost] javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:08.342 IST|HandshakeContext.java:297|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 for TLS10 javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:08.342 IST|HandshakeContext.java:297|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 for TLS10 javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:08.343 IST|HandshakeContext.java:297|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLS10 javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:08.343 IST|HandshakeContext.java:297|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLS10 javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:08.344 IST|HandshakeContext.java:297|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 for TLS13 javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:08.344 IST|HandshakeContext.java:297|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 for TLS13 javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:08.344 IST|HandshakeContext.java:297|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLS13 javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:08.345 IST|HandshakeContext.java:297|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLS13 javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:08.345 IST|HandshakeContext.java:297|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA for TLS13 javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:08.345 IST|HandshakeContext.java:297|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA for TLS13 javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:08.346 IST|HandshakeContext.java:297|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 for TLS11 javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:08.346 IST|HandshakeContext.java:297|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 for TLS11 javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:08.346 IST|HandshakeContext.java:297|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLS11 javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:08.346 IST|HandshakeContext.java:297|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLS11 javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:08.353 IST|SSLExtensions.java:132|Ignore unknown or unsupported extension ( "unknown extension (28)": { 0000: 40 01 @. } ) javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:08.355 IST|SSLExtensions.java:132|Ignore unknown or unsupported extension ( "unknown extension (21)": { 0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0090: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ............... } ) javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:08.363 IST|ClientHello.java:808|Consuming ClientHello handshake message ( "ClientHello": { "client version" : "TLSv1.2", "random" : "3A D9 79 A8 90 C1 0B F4 05 35 DD 94 BF B0 44 D0 DB 40 7D 1D F0 41 D1 48 F1 AF C2 74 D8 A8 A7 82", "session id" : "94 6D E6 8E 1E DF EA DE E3 18 F5 89 48 F8 3C 0C E7 27 A4 C1 B1 F2 C3 0B FC AB 6D E1 B9 61 08 8A", "cipher suites" : "[TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_AES_256_GCM_SHA384(0x1302), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA(0xC00A), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA(0xC009), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA(0xC013), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA(0xC014), TLS_DHE_RSA_WITH_AES_128_CBC_SHA(0x0033), TLS_DHE_RSA_WITH_AES_256_CBC_SHA(0x0039), TLS_RSA_WITH_AES_128_CBC_SHA(0x002F), TLS_RSA_WITH_AES_256_CBC_SHA(0x0035), SSL_RSA_WITH_3DES_EDE_CBC_SHA(0x000A)]", "compression methods" : "00", "extensions" : [ "server_name (0)": { type=host_name (0), value=localhost }, "extended_master_secret (23)": { }, "renegotiation_info (65,281)": { "renegotiated connection": [] }, "supported_groups (10)": { "versions": [x25519, secp256r1, secp384r1, secp521r1, ffdhe2048, ffdhe3072] }, "ec_point_formats (11)": { "formats": [uncompressed] }, "application_layer_protocol_negotiation (16)": { [h2, http/1.1] }, "status_request (5)": { "certificate status type": ocsp "OCSP status request": { "responder_id": "request extensions": { } } }, "key_share (51)": { "client_shares": [ { "named group": x25519 "key_exchange": { 0000: 43 5A A5 FC 79 8A E8 F2 6E D7 01 C6 D3 F8 DA 8C CZ..y...n....... 0010: 26 88 9A 11 96 6F A8 F3 D7 0A C8 C9 53 FD 7C 3B &....o......S..; } }, { "named group": secp256r1 "key_exchange": { 0000: 04 92 53 F8 46 1B CD 67 56 A8 8F AB 89 88 F4 A0 ..S.F..gV....... 0010: B1 17 8F 4E 29 B8 2F 3F 1C 57 B9 AD BC E7 AA 28 ...N)./?.W.....( 0020: AC CD 69 51 EE 61 66 9F 01 F6 C9 04 C7 85 C8 53 ..iQ.af........S 0030: 55 EF 96 D8 C6 4D D6 AC F7 78 5C 46 6E 76 AC 34 U....M...x\Fnv.4 0040: CB } }, ] }, "supported_versions (43)": { "versions": [TLSv1.3, TLSv1.2, TLSv1.1, TLSv1] }, "signature_algorithms (13)": { "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1] }, "unknown extension (28)": { 0000: 40 01 @. }, "unknown extension (21)": { 0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0090: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ............... } ] } ) javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:08.364 IST|SSLExtensions.java:189|Consumed extension: supported_versions javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:08.364 IST|ClientHello.java:838|Negotiated protocol version: TLSv1.3 javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:08.365 IST|PskKeyExchangeModesExtension.java:293|abort session resumption, no supported psk_dhe_ke PSK key exchange mode javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:08.366 IST|PreSharedKeyExtension.java:840|Handling pre_shared_key absence. javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:08.367 IST|ServerNameExtension.java:327|no server name matchers, ignore server name indication javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:08.367 IST|SSLExtensions.java:189|Consumed extension: server_name javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:08.368 IST|SSLExtensions.java:170|Ignore unavailable extension: max_fragment_length javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:08.368 IST|SSLExtensions.java:189|Consumed extension: status_request javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:08.369 IST|SSLExtensions.java:189|Consumed extension: supported_groups javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:08.369 IST|SSLExtensions.java:160|Ignore unsupported extension: ec_point_formats javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:08.370 IST|SSLExtensions.java:189|Consumed extension: signature_algorithms javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:08.370 IST|SSLExtensions.java:170|Ignore unavailable extension: signature_algorithms_cert javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:08.371 IST|AlpnExtension.java:277|Ignore server unenabled extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:08.371 IST|SSLExtensions.java:189|Consumed extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:08.371 IST|SSLExtensions.java:160|Ignore unsupported extension: status_request_v2 javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:08.372 IST|SSLExtensions.java:160|Ignore unsupported extension: extended_master_secret javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:08.372 IST|SSLExtensions.java:160|Ignore unsupported extension: session_ticket javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:08.372 IST|SSLExtensions.java:170|Ignore unavailable extension: cookie javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:08.374 IST|SSLExtensions.java:189|Consumed extension: key_share javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:08.374 IST|SSLExtensions.java:160|Ignore unsupported extension: renegotiation_info javax.net.ssl|ALL|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:08.376 IST|SignatureScheme.java:359|Ignore disabled signature scheme: rsa_md5 javax.net.ssl|WARNING|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:08.377 IST|SSLExtensions.java:212|Ignore impact of unsupported extension: server_name javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:08.384 IST|SSLExtensions.java:204|Ignore unavailable extension: max_fragment_length javax.net.ssl|WARNING|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:08.385 IST|SSLExtensions.java:212|Ignore impact of unsupported extension: status_request javax.net.ssl|WARNING|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:08.386 IST|SSLExtensions.java:212|Ignore impact of unsupported extension: supported_groups javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:08.387 IST|SSLExtensions.java:221|Populated with extension: signature_algorithms javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:08.387 IST|SSLExtensions.java:204|Ignore unavailable extension: signature_algorithms_cert javax.net.ssl|WARNING|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:08.388 IST|SSLExtensions.java:212|Ignore impact of unsupported extension: application_layer_protocol_negotiation javax.net.ssl|WARNING|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:08.388 IST|SSLExtensions.java:212|Ignore impact of unsupported extension: supported_versions javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:08.388 IST|SSLExtensions.java:204|Ignore unavailable extension: cookie javax.net.ssl|WARNING|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:08.388 IST|SSLExtensions.java:212|Ignore impact of unsupported extension: key_share javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:08.389 IST|SSLExtensions.java:204|Ignore unavailable extension: pre_shared_key javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:08.389 IST|ServerHello.java:733|use cipher suite TLS_AES_128_GCM_SHA256 javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:08.397 IST|SSLExtensions.java:257|Ignore, context unavailable extension: pre_shared_key javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:08.400 IST|ServerHello.java:587|Produced ServerHello handshake message ( "ServerHello": { "server version" : "TLSv1.2", "random" : "8E 25 CB F6 BA 81 62 82 02 16 0B E8 68 6B 6A D8 A3 A6 23 F5 4C 38 23 AD 2D A6 2A EC 7B DC DE 22", "session id" : "94 6D E6 8E 1E DF EA DE E3 18 F5 89 48 F8 3C 0C E7 27 A4 C1 B1 F2 C3 0B FC AB 6D E1 B9 61 08 8A", "cipher suite" : "TLS_AES_128_GCM_SHA256(0x1301)", "compression methods" : "00", "extensions" : [ "supported_versions (43)": { "selected version": [TLSv1.3] }, "key_share (51)": { "server_share": { "named group": x25519 "key_exchange": { 0000: 10 8E 49 F7 7E F6 C5 DB E8 69 96 7C 8E ED 51 66 ..I......i....Qf 0010: 97 B7 DD 4C 97 06 22 5E CF 5C 3C D7 64 92 A7 13 ...L.."^.\<.d... } }, } ] } ) javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:08.407 IST|SSLCipher.java:1867|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE countdown value = 137438953472 javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:08.409 IST|SSLCipher.java:2021|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE countdown value = 137438953472 javax.net.ssl|ALL|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:08.409 IST|ServerNameExtension.java:537|No expected server name indication response javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:08.410 IST|SSLExtensions.java:257|Ignore, context unavailable extension: server_name javax.net.ssl|ALL|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:08.410 IST|MaxFragExtension.java:469|Ignore unavailable max_fragment_length extension javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:08.410 IST|SSLExtensions.java:257|Ignore, context unavailable extension: max_fragment_length javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:08.412 IST|AlpnExtension.java:365|Ignore unavailable extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:08.412 IST|SSLExtensions.java:257|Ignore, context unavailable extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:08.413 IST|EncryptedExtensions.java:137|Produced EncryptedExtensions message ( "EncryptedExtensions": [ "supported_groups (10)": { "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192] } ] ) javax.net.ssl|ALL|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:08.415 IST|SignatureScheme.java:364|Ignore inactive signature scheme: dsa_sha256 javax.net.ssl|ALL|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:08.415 IST|SignatureScheme.java:364|Ignore inactive signature scheme: dsa_sha1 javax.net.ssl|ALL|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:08.415 IST|SignatureScheme.java:364|Ignore inactive signature scheme: rsa_md5 javax.net.ssl|ALL|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:08.417 IST|SignatureScheme.java:364|Ignore inactive signature scheme: dsa_sha256 javax.net.ssl|ALL|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:08.417 IST|SignatureScheme.java:364|Ignore inactive signature scheme: dsa_sha1 javax.net.ssl|ALL|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:08.417 IST|SignatureScheme.java:364|Ignore inactive signature scheme: rsa_md5 javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:08.420 IST|CertificateRequest.java:882|Produced CertificateRequest message ( "CertificateRequest": { "certificate_request_context": "", "extensions": [ "signature_algorithms (13)": { "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1] }, "signature_algorithms_cert (50)": { "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1] } ] } ) javax.net.ssl|ALL|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:08.424 IST|X509Authentication.java:295|No X.509 cert selected for EC javax.net.ssl|WARNING|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:08.425 IST|CertificateMessage.java:1062|Unavailable authentication scheme: ecdsa_secp256r1_sha256 javax.net.ssl|ALL|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:08.425 IST|X509Authentication.java:295|No X.509 cert selected for EC javax.net.ssl|WARNING|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:08.425 IST|CertificateMessage.java:1062|Unavailable authentication scheme: ecdsa_secp384r1_sha384 javax.net.ssl|ALL|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:08.426 IST|X509Authentication.java:295|No X.509 cert selected for EC javax.net.ssl|WARNING|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:08.427 IST|CertificateMessage.java:1062|Unavailable authentication scheme: ecdsa_secp521r1_sha512 javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:08.427 IST|StatusResponseManager.java:763|Staping disabled or is a resumed session javax.net.ssl|ALL|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:08.428 IST|CertStatusExtension.java:1115|Stapling is disabled for this connection javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:08.428 IST|SSLExtensions.java:257|Ignore, context unavailable extension: status_request javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:08.431 IST|CertificateMessage.java:1001|Produced server Certificate message ( "Certificate": { "certificate_request_context": "", "certificate_list": [ { "certificate" : { "version" : "v3", "serial number" : "3B FD 86 4A 58 09 72 F6", "signature algorithm": "SHA512withRSA", "issuer" : "CN=localhost", "not before" : "2019-11-05 13:41:52.000 IST", "not after" : "2020-11-05 13:41:52.000 IST", "subject" : "CN=localhost", "subject public key" : "RSA", "extensions" : [ { ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:false PathLen:2147483647 ] }, { ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_Encipherment Data_Encipherment ] } ]} "extensions": { } }, ] } ) javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:08.468 IST|CertificateVerify.java:1080|Produced server CertificateVerify handshake message ( "CertificateVerify": { "signature algorithm": rsa_pss_rsae_sha256 "signature": { 0000: 63 D1 8F DF A0 FD 65 D2 0A FB 71 46 43 05 F7 75 c.....e...qFC..u 0010: 67 26 8B F9 77 BD C7 46 18 24 0C 69 87 3C 60 9A g&..w..F.$.i.<`. 0020: 90 F4 FE 8C 11 0F 8B 1C 68 7E 38 2A 0C B7 56 5A ........h.8*..VZ 0030: DB 46 F1 6E 33 68 46 B4 F8 56 C8 E2 40 95 C4 95 .F.n3hF..V..@... 0040: 9A 9F C8 51 70 8E F8 06 AC 30 5E 92 B3 24 22 06 ...Qp....0^..$". 0050: D6 6C 66 8E 2B 2C 7A E5 7C A4 99 18 66 15 2F 44 .lf.+,z.....f./D 0060: F4 EE 8E 8A 89 D9 FC 2E 0B 24 FC 8C CF 34 F6 52 .........$...4.R 0070: AA F8 3C EF 1E 46 DD 2B 4A 37 D1 97 3C 04 5F C4 ..<..F.+J7..<._. 0080: 21 70 7D 14 C6 D3 66 69 B7 FC 60 29 E5 D9 5D 97 !p....fi..`)..]. 0090: 4E 23 57 AC C8 7E CB 26 AE 90 A2 6A B7 A6 5F 5D N#W....&...j.._] 00A0: F9 0F 9E E3 F5 79 16 7B 73 93 5A 7E 7C 06 D6 BE .....y..s.Z..... 00B0: 24 9B A1 B9 C4 AD 80 D8 21 91 43 A4 D5 8D 04 58 $.......!.C....X 00C0: 72 37 4E 73 EA DC DD D8 E5 72 1F 51 D0 BC 75 D7 r7Ns.....r.Q..u. 00D0: C3 72 ED 84 57 BC 29 4C CA A1 84 33 8D E8 31 3B .r..W.)L...3..1; 00E0: 77 6A 02 C3 D0 FF CD 98 35 AB E3 93 C7 30 64 BC wj......5....0d. 00F0: C8 50 51 7D C7 D7 03 C6 27 0D 55 C0 ED A9 A9 75 .PQ.....'.U....u } } ) javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:08.470 IST|Finished.java:767|Produced server Finished handshake message ( "Finished": { "verify data": { 0000: BA C0 BB 1D 72 5B 29 29 D2 52 49 74 07 FD D7 9D ....r[)).RIt.... 0010: C3 08 A2 F0 07 AF 28 D9 A8 92 12 DE 8C BE 3A D9 ......(.......:. }'} ) javax.net.ssl|DEBUG|22|https-jsse-nio-8443-exec-2|2019-11-15 12:35:08.472 IST|SSLCipher.java:2021|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE countdown value = 137438953472 javax.net.ssl|DEBUG|25|https-jsse-nio-8443-exec-5|2019-11-15 12:35:08.524 IST|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message javax.net.ssl|DEBUG|25|https-jsse-nio-8443-exec-5|2019-11-15 12:35:08.530 IST|CertificateMessage.java:1156|Consuming client Certificate handshake message ( "Certificate": { "certificate_request_context": "", "certificate_list": [ { "certificate" : { "version" : "v3", "serial number" : "2C 8B E3 32 BC 02 24 C0", "signature algorithm": "SHA512withRSA", "issuer" : "CN=client", "not before" : "2019-11-05 13:43:21.000 IST", "not after" : "2020-11-05 13:43:21.000 IST", "subject" : "CN=client", "subject public key" : "RSA", "extensions" : [ { ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:false PathLen:2147483647 ] }, { ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_Encipherment Data_Encipherment ] } ]} "extensions": { } }, ] } ) javax.net.ssl|DEBUG|25|https-jsse-nio-8443-exec-5|2019-11-15 12:35:08.537 IST|CertificateVerify.java:1128|Consuming CertificateVerify handshake message ( "CertificateVerify": { "signature algorithm": rsa_pss_rsae_sha256 "signature": { 0000: 81 F1 14 A7 B2 A0 31 07 08 F2 FE CF 55 FF 46 6F ......1.....U.Fo 0010: F2 1B D8 83 66 EE 1A 92 56 40 C6 B7 82 58 C7 F0 ....f...V@...X.. 0020: 19 BA 37 8A 30 71 40 1C 59 53 99 A6 44 58 6C 02 ..7.0q@.YS..DXl. 0030: BD 9C 9E 15 58 95 7E 71 0E 81 30 52 42 5A 70 85 ....X..q..0RBZp. 0040: EE 2B A7 BA 6E 34 D1 E5 DD 43 27 CF FF 98 0D BC .+..n4...C'..... 0050: 70 81 EC 68 76 DE F1 3A B2 09 D7 B7 66 FA F4 64 p..hv..:....f..d 0060: E5 87 C7 E6 8B A8 F8 1A 12 FC 3F 7D 50 03 62 73 ..........?.P.bs 0070: D9 A4 9D 6F 17 D3 98 07 8A 20 ED EE AE EC 84 2A ...o..... .....* 0080: D0 CF 80 6B C5 9B 4C 50 FE C0 7A B9 98 8E 48 D2 ...k..LP..z...H. 0090: AD 32 C0 EE 4E B3 30 9B 71 66 35 4B EF 78 A7 09 .2..N.0.qf5K.x.. 00A0: A3 FF 61 AE BD A4 19 EA DF 14 ED 5D 79 53 93 A2 ..a........]yS.. 00B0: F7 37 59 0E D3 46 B4 19 2C 45 FC 5F 4D F6 68 01 .7Y..F..,E._M.h. 00C0: DC 04 2B 84 7F D2 BD F8 89 17 A2 82 CE 59 6B AE ..+..........Yk. 00D0: 9D 07 A4 0A 14 EB 7E 9B 42 9C 3C 2F 3A E3 20 1C ........B..5.7.. } } ) javax.net.ssl|DEBUG|25|https-jsse-nio-8443-exec-5|2019-11-15 12:35:08.538 IST|Finished.java:1010|Consuming client Finished handshake message ( "Finished": { "verify data": { 0000: 8A 02 1B B2 0F 76 FB BC B2 FB 2D FA C1 45 9D 8F .....v....-..E.. 0010: D6 A8 05 4B F2 47 3B 0B F6 5F 3F 6F B6 BB AF D3 ...K.G;.._?o.... }'} ) javax.net.ssl|DEBUG|25|https-jsse-nio-8443-exec-5|2019-11-15 12:35:08.540 IST|SSLCipher.java:1867|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE countdown value = 137438953472 javax.net.ssl|DEBUG|25|https-jsse-nio-8443-exec-5|2019-11-15 12:35:08.541 IST|Finished.java:1110|Sending new session ticket 15-Nov-2019 12:35:08.542 FINE [https-jsse-nio-8443-exec-5] org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun Error during SSL handshake java.io.IOException: NOT_HANDSHAKING during handshake at org.apache.tomcat.util.net.SecureNioChannel.handshake(SecureNioChannel.java:193) at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1556) at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49) at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128) at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628) at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61) at java.base/java.lang.Thread.run(Thread.java:830) 15-Nov-2019 12:35:08.543 FINE [https-jsse-nio-8443-exec-5] org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper.doClose Calling [org.apache.tomcat.util.net.NioEndpoint@7bbe663e].closeSocket([org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper@597fb889:org.apache.tomcat.util.net.SecureNioChannel@28cdd70:java.nio.channels.SocketChannel[connected local=/0:0:0:0:0:0:0:1:8443 remote=/0:0:0:0:0:0:0:1:65314]]) java.lang.Exception at org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper.doClose(NioEndpoint.java:1163) at org.apache.tomcat.util.net.SocketWrapperBase.close(SocketWrapperBase.java:402) at org.apache.tomcat.util.net.NioEndpoint$Poller.cancelledKey(NioEndpoint.java:665) at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1586) at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49) at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128) at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628) at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61) at java.base/java.lang.Thread.run(Thread.java:830) javax.net.ssl|ALL|25|https-jsse-nio-8443-exec-5|2019-11-15 12:35:08.544 IST|SSLEngineImpl.java:818|Closing outbound of SSLEngine javax.net.ssl|WARNING|25|https-jsse-nio-8443-exec-5|2019-11-15 12:35:08.545 IST|SSLEngineOutputRecord.java:173|outbound has closed, ignore outbound application data 15-Nov-2019 12:35:08.604 FINE [https-jsse-nio-8443-exec-6] org.apache.tomcat.util.net.SecureNioChannel.processSNI The SNI host name extracted for connection [java.nio.channels.SocketChannel[connected local=/0:0:0:0:0:0:0:1:8443 remote=/0:0:0:0:0:0:0:1:65315]] was [localhost] javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-15 12:35:08.607 IST|HandshakeContext.java:297|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 for TLS10 javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-15 12:35:08.607 IST|HandshakeContext.java:297|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 for TLS10 javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-15 12:35:08.608 IST|HandshakeContext.java:297|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLS10 javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-15 12:35:08.608 IST|HandshakeContext.java:297|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLS10 javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-15 12:35:08.609 IST|HandshakeContext.java:297|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 for TLS13 javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-15 12:35:08.609 IST|HandshakeContext.java:297|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 for TLS13 javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-15 12:35:08.609 IST|HandshakeContext.java:297|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLS13 javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-15 12:35:08.609 IST|HandshakeContext.java:297|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLS13 javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-15 12:35:08.610 IST|HandshakeContext.java:297|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA for TLS13 javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-15 12:35:08.610 IST|HandshakeContext.java:297|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA for TLS13 javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-15 12:35:08.610 IST|HandshakeContext.java:297|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 for TLS11 javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-15 12:35:08.611 IST|HandshakeContext.java:297|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 for TLS11 javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-15 12:35:08.611 IST|HandshakeContext.java:297|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLS11 javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-15 12:35:08.611 IST|HandshakeContext.java:297|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLS11 javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-15 12:35:08.623 IST|SSLExtensions.java:132|Ignore unknown or unsupported extension ( "unknown extension (28)": { 0000: 40 01 @. } ) javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-15 12:35:08.625 IST|SSLExtensions.java:132|Ignore unknown or unsupported extension ( "unknown extension (21)": { 0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0090: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ............... } ) javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-15 12:35:08.634 IST|ClientHello.java:808|Consuming ClientHello handshake message ( "ClientHello": { "client version" : "TLSv1.2", "random" : "4F 00 93 5C A6 4A 69 37 7C 0A 05 A6 EE 07 7B 86 4A C5 52 36 6B DD 9A DB 6A 69 E2 DA 75 B5 AB B4", "session id" : "A9 A9 3C 98 3E 88 F1 28 A4 AE B3 59 47 4E C9 4F 99 5E B0 E6 51 2E C8 A3 0D 76 58 32 A7 5C 07 BB", "cipher suites" : "[TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_AES_256_GCM_SHA384(0x1302), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA(0xC00A), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA(0xC009), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA(0xC013), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA(0xC014), TLS_DHE_RSA_WITH_AES_128_CBC_SHA(0x0033), TLS_DHE_RSA_WITH_AES_256_CBC_SHA(0x0039), TLS_RSA_WITH_AES_128_CBC_SHA(0x002F), TLS_RSA_WITH_AES_256_CBC_SHA(0x0035), SSL_RSA_WITH_3DES_EDE_CBC_SHA(0x000A)]", "compression methods" : "00", "extensions" : [ "server_name (0)": { type=host_name (0), value=localhost }, "extended_master_secret (23)": { }, "renegotiation_info (65,281)": { "renegotiated connection": [] }, "supported_groups (10)": { "versions": [x25519, secp256r1, secp384r1, secp521r1, ffdhe2048, ffdhe3072] }, "ec_point_formats (11)": { "formats": [uncompressed] }, "application_layer_protocol_negotiation (16)": { [h2, http/1.1] }, "status_request (5)": { "certificate status type": ocsp "OCSP status request": { "responder_id": "request extensions": { } } }, "key_share (51)": { "client_shares": [ { "named group": x25519 "key_exchange": { 0000: 66 F9 C2 6F AA 1F 26 49 90 C5 E7 F7 D3 22 A5 43 f..o..&I.....".C 0010: D6 F8 E1 F2 84 17 C8 E3 9C 8F 6E D5 C7 95 A9 17 ..........n..... } }, { "named group": secp256r1 "key_exchange": { 0000: 04 91 B4 FB 24 65 2C 4F 19 16 48 2B 20 C6 5D 07 ....$e,O..H+ .]. 0010: DF 56 79 C1 A3 C5 E1 F1 91 18 DE 6A 53 2C 1B BC .Vy........jS,.. 0020: FB 63 CD 28 FD E6 78 03 50 C4 82 A3 01 D9 1B E8 .c.(..x.P....... 0030: BA 06 3F E9 BD 5B F4 21 F8 F2 37 F6 45 7E 4F DE ..?..[.!..7.E.O. 0040: 35 } }, ] }, "supported_versions (43)": { "versions": [TLSv1.3, TLSv1.2, TLSv1.1, TLSv1] }, "signature_algorithms (13)": { "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1] }, "unknown extension (28)": { 0000: 40 01 @. }, "unknown extension (21)": { 0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0090: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ............... } ] } ) javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-15 12:35:08.634 IST|SSLExtensions.java:189|Consumed extension: supported_versions javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-15 12:35:08.635 IST|ClientHello.java:838|Negotiated protocol version: TLSv1.3 javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-15 12:35:08.635 IST|PskKeyExchangeModesExtension.java:293|abort session resumption, no supported psk_dhe_ke PSK key exchange mode javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-15 12:35:08.636 IST|PreSharedKeyExtension.java:840|Handling pre_shared_key absence. javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-15 12:35:08.636 IST|ServerNameExtension.java:327|no server name matchers, ignore server name indication javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-15 12:35:08.636 IST|SSLExtensions.java:189|Consumed extension: server_name javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-15 12:35:08.637 IST|SSLExtensions.java:170|Ignore unavailable extension: max_fragment_length javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-15 12:35:08.637 IST|SSLExtensions.java:189|Consumed extension: status_request javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-15 12:35:08.637 IST|SSLExtensions.java:189|Consumed extension: supported_groups javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-15 12:35:08.638 IST|SSLExtensions.java:160|Ignore unsupported extension: ec_point_formats javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-15 12:35:08.638 IST|SSLExtensions.java:189|Consumed extension: signature_algorithms javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-15 12:35:08.638 IST|SSLExtensions.java:170|Ignore unavailable extension: signature_algorithms_cert javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-15 12:35:08.638 IST|AlpnExtension.java:277|Ignore server unenabled extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-15 12:35:08.638 IST|SSLExtensions.java:189|Consumed extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-15 12:35:08.639 IST|SSLExtensions.java:160|Ignore unsupported extension: status_request_v2 javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-15 12:35:08.639 IST|SSLExtensions.java:160|Ignore unsupported extension: extended_master_secret javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-15 12:35:08.639 IST|SSLExtensions.java:160|Ignore unsupported extension: session_ticket javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-15 12:35:08.639 IST|SSLExtensions.java:170|Ignore unavailable extension: cookie javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-15 12:35:08.640 IST|SSLExtensions.java:189|Consumed extension: key_share javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-15 12:35:08.641 IST|SSLExtensions.java:160|Ignore unsupported extension: renegotiation_info javax.net.ssl|ALL|26|https-jsse-nio-8443-exec-6|2019-11-15 12:35:08.643 IST|SignatureScheme.java:359|Ignore disabled signature scheme: rsa_md5 javax.net.ssl|WARNING|26|https-jsse-nio-8443-exec-6|2019-11-15 12:35:08.644 IST|SSLExtensions.java:212|Ignore impact of unsupported extension: server_name javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-15 12:35:08.644 IST|SSLExtensions.java:204|Ignore unavailable extension: max_fragment_length javax.net.ssl|WARNING|26|https-jsse-nio-8443-exec-6|2019-11-15 12:35:08.644 IST|SSLExtensions.java:212|Ignore impact of unsupported extension: status_request javax.net.ssl|WARNING|26|https-jsse-nio-8443-exec-6|2019-11-15 12:35:08.644 IST|SSLExtensions.java:212|Ignore impact of unsupported extension: supported_groups javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-15 12:35:08.645 IST|SSLExtensions.java:221|Populated with extension: signature_algorithms javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-15 12:35:08.646 IST|SSLExtensions.java:204|Ignore unavailable extension: signature_algorithms_cert javax.net.ssl|WARNING|26|https-jsse-nio-8443-exec-6|2019-11-15 12:35:08.646 IST|SSLExtensions.java:212|Ignore impact of unsupported extension: application_layer_protocol_negotiation javax.net.ssl|WARNING|26|https-jsse-nio-8443-exec-6|2019-11-15 12:35:08.646 IST|SSLExtensions.java:212|Ignore impact of unsupported extension: supported_versions javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-15 12:35:08.647 IST|SSLExtensions.java:204|Ignore unavailable extension: cookie javax.net.ssl|WARNING|26|https-jsse-nio-8443-exec-6|2019-11-15 12:35:08.647 IST|SSLExtensions.java:212|Ignore impact of unsupported extension: key_share javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-15 12:35:08.647 IST|SSLExtensions.java:204|Ignore unavailable extension: pre_shared_key javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-15 12:35:08.647 IST|ServerHello.java:733|use cipher suite TLS_AES_128_GCM_SHA256 javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-15 12:35:08.653 IST|SSLExtensions.java:257|Ignore, context unavailable extension: pre_shared_key javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-15 12:35:08.655 IST|ServerHello.java:587|Produced ServerHello handshake message ( "ServerHello": { "server version" : "TLSv1.2", "random" : "5A AE 85 9D AD 34 19 90 42 AA 39 48 7A 28 F0 96 37 89 5B 1B 2F 5D F7 82 56 1B A8 B1 6A FF 0A 2D", "session id" : "A9 A9 3C 98 3E 88 F1 28 A4 AE B3 59 47 4E C9 4F 99 5E B0 E6 51 2E C8 A3 0D 76 58 32 A7 5C 07 BB", "cipher suite" : "TLS_AES_128_GCM_SHA256(0x1301)", "compression methods" : "00", "extensions" : [ "supported_versions (43)": { "selected version": [TLSv1.3] }, "key_share (51)": { "server_share": { "named group": x25519 "key_exchange": { 0000: 36 39 D4 E6 D8 64 6E 4F 3F D0 0B 0F AC 7B 5A F9 69...dnO?.....Z. 0010: 11 3B CE FB 76 B3 40 19 31 50 FA 21 33 E4 1C 50 .;..v.@.1P.!3..P } }, } ] } ) javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-15 12:35:08.661 IST|SSLCipher.java:1867|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE countdown value = 137438953472 javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-15 12:35:08.663 IST|SSLCipher.java:2021|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE countdown value = 137438953472 javax.net.ssl|ALL|26|https-jsse-nio-8443-exec-6|2019-11-15 12:35:08.663 IST|ServerNameExtension.java:537|No expected server name indication response javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-15 12:35:08.664 IST|SSLExtensions.java:257|Ignore, context unavailable extension: server_name javax.net.ssl|ALL|26|https-jsse-nio-8443-exec-6|2019-11-15 12:35:08.664 IST|MaxFragExtension.java:469|Ignore unavailable max_fragment_length extension javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-15 12:35:08.664 IST|SSLExtensions.java:257|Ignore, context unavailable extension: max_fragment_length javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-15 12:35:08.665 IST|AlpnExtension.java:365|Ignore unavailable extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-15 12:35:08.666 IST|SSLExtensions.java:257|Ignore, context unavailable extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-15 12:35:08.667 IST|EncryptedExtensions.java:137|Produced EncryptedExtensions message ( "EncryptedExtensions": [ "supported_groups (10)": { "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192] } ] ) javax.net.ssl|ALL|26|https-jsse-nio-8443-exec-6|2019-11-15 12:35:08.669 IST|SignatureScheme.java:364|Ignore inactive signature scheme: dsa_sha256 javax.net.ssl|ALL|26|https-jsse-nio-8443-exec-6|2019-11-15 12:35:08.669 IST|SignatureScheme.java:364|Ignore inactive signature scheme: dsa_sha1 javax.net.ssl|ALL|26|https-jsse-nio-8443-exec-6|2019-11-15 12:35:08.670 IST|SignatureScheme.java:364|Ignore inactive signature scheme: rsa_md5 javax.net.ssl|ALL|26|https-jsse-nio-8443-exec-6|2019-11-15 12:35:08.671 IST|SignatureScheme.java:364|Ignore inactive signature scheme: dsa_sha256 javax.net.ssl|ALL|26|https-jsse-nio-8443-exec-6|2019-11-15 12:35:08.672 IST|SignatureScheme.java:364|Ignore inactive signature scheme: dsa_sha1 javax.net.ssl|ALL|26|https-jsse-nio-8443-exec-6|2019-11-15 12:35:08.672 IST|SignatureScheme.java:364|Ignore inactive signature scheme: rsa_md5 javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-15 12:35:08.674 IST|CertificateRequest.java:882|Produced CertificateRequest message ( "CertificateRequest": { "certificate_request_context": "", "extensions": [ "signature_algorithms (13)": { "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1] }, "signature_algorithms_cert (50)": { "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1] } ] } ) javax.net.ssl|ALL|26|https-jsse-nio-8443-exec-6|2019-11-15 12:35:08.675 IST|X509Authentication.java:295|No X.509 cert selected for EC javax.net.ssl|WARNING|26|https-jsse-nio-8443-exec-6|2019-11-15 12:35:08.675 IST|CertificateMessage.java:1062|Unavailable authentication scheme: ecdsa_secp256r1_sha256 javax.net.ssl|ALL|26|https-jsse-nio-8443-exec-6|2019-11-15 12:35:08.675 IST|X509Authentication.java:295|No X.509 cert selected for EC javax.net.ssl|WARNING|26|https-jsse-nio-8443-exec-6|2019-11-15 12:35:08.676 IST|CertificateMessage.java:1062|Unavailable authentication scheme: ecdsa_secp384r1_sha384 javax.net.ssl|ALL|26|https-jsse-nio-8443-exec-6|2019-11-15 12:35:08.676 IST|X509Authentication.java:295|No X.509 cert selected for EC javax.net.ssl|WARNING|26|https-jsse-nio-8443-exec-6|2019-11-15 12:35:08.676 IST|CertificateMessage.java:1062|Unavailable authentication scheme: ecdsa_secp521r1_sha512 javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-15 12:35:08.677 IST|StatusResponseManager.java:763|Staping disabled or is a resumed session javax.net.ssl|ALL|26|https-jsse-nio-8443-exec-6|2019-11-15 12:35:08.677 IST|CertStatusExtension.java:1115|Stapling is disabled for this connection javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-15 12:35:08.679 IST|SSLExtensions.java:257|Ignore, context unavailable extension: status_request javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-15 12:35:08.681 IST|CertificateMessage.java:1001|Produced server Certificate message ( "Certificate": { "certificate_request_context": "", "certificate_list": [ { "certificate" : { "version" : "v3", "serial number" : "3B FD 86 4A 58 09 72 F6", "signature algorithm": "SHA512withRSA", "issuer" : "CN=localhost", "not before" : "2019-11-05 13:41:52.000 IST", "not after" : "2020-11-05 13:41:52.000 IST", "subject" : "CN=localhost", "subject public key" : "RSA", "extensions" : [ { ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:false PathLen:2147483647 ] }, { ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_Encipherment Data_Encipherment ] } ]} "extensions": { } }, ] } ) javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-15 12:35:08.718 IST|CertificateVerify.java:1080|Produced server CertificateVerify handshake message ( "CertificateVerify": { "signature algorithm": rsa_pss_rsae_sha256 "signature": { 0000: 56 86 6B 54 17 DC 85 C3 27 D6 CF CC D0 3C 5E FE V.kT....'....<^. 0010: 8B 07 01 83 FA 11 74 6C BF 77 A2 AD 52 4B 55 E5 ......tl.w..RKU. 0020: CD CF 0B 82 F1 74 65 03 CA 40 BE E8 9C 8D 29 EF .....te..@....). 0030: E9 E5 B4 95 EE C1 CF 7F 5B 82 AC 01 52 E2 69 BD ........[...R.i. 0040: 68 33 8C 1F B7 68 21 7D 92 21 61 5B E0 24 EC 9F h3...h!..!a[.$.. 0050: 43 0F EF A8 4E 73 8D 61 81 0B 6D 56 83 04 AA D8 C...Ns.a..mV.... 0060: 6A D6 25 CD D0 EB F5 FC 40 09 F8 17 CD 01 EB 19 j.%.....@....... 0070: AE A5 8E 36 D2 60 83 4B 6D 7F C7 5C 3A 55 93 DF ...6.`.Km..\:U.. 0080: 59 7B EB CD 07 24 67 EF 91 24 9E 90 BD C7 BE 35 Y....$g..$.....5 0090: F3 DF A8 BB C4 16 21 1C CC CD 41 A7 5B 88 21 99 ......!...A.[.!. 00A0: 99 58 B2 EA 72 93 55 6C D3 D7 43 C8 79 EF CC C0 .X..r.Ul..C.y... 00B0: 39 E1 D6 2D 1C C0 EA 19 C6 16 D9 D8 6D 6D 35 F8 9..-........mm5. 00C0: 77 D8 F7 A8 E5 E7 83 2A 1F 3B 30 7D 83 76 FA A3 w......*.;0..v.. 00D0: 89 56 E6 10 0A C8 12 06 F7 80 83 BB E9 E3 5C 7E .V............\. 00E0: 79 D2 DB D9 EB 8C C5 2A B1 F4 E9 82 F9 B5 64 61 y......*......da 00F0: C2 CE 87 4C A9 44 B2 84 43 7C AE EE A4 61 22 3F ...L.D..C....a"? } } ) javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-15 12:35:08.720 IST|Finished.java:767|Produced server Finished handshake message ( "Finished": { "verify data": { 0000: CB 4D 45 3E 85 FD A3 43 28 2C 5C 19 F5 65 FB 4F .ME>...C(,\..e.O 0010: 17 88 C6 28 D0 01 71 53 5A 0B 31 C7 EC D4 A0 D0 ...(..qSZ.1..... }'} ) javax.net.ssl|DEBUG|26|https-jsse-nio-8443-exec-6|2019-11-15 12:35:08.723 IST|SSLCipher.java:2021|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE countdown value = 137438953472 javax.net.ssl|DEBUG|2A|https-jsse-nio-8443-exec-10|2019-11-15 12:35:08.801 IST|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message javax.net.ssl|DEBUG|2A|https-jsse-nio-8443-exec-10|2019-11-15 12:35:08.814 IST|CertificateMessage.java:1156|Consuming client Certificate handshake message ( "Certificate": { "certificate_request_context": "", "certificate_list": [ { "certificate" : { "version" : "v3", "serial number" : "2C 8B E3 32 BC 02 24 C0", "signature algorithm": "SHA512withRSA", "issuer" : "CN=client", "not before" : "2019-11-05 13:43:21.000 IST", "not after" : "2020-11-05 13:43:21.000 IST", "subject" : "CN=client", "subject public key" : "RSA", "extensions" : [ { ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:false PathLen:2147483647 ] }, { ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_Encipherment Data_Encipherment ] } ]} "extensions": { } }, ] } ) javax.net.ssl|DEBUG|2A|https-jsse-nio-8443-exec-10|2019-11-15 12:35:08.819 IST|CertificateVerify.java:1128|Consuming CertificateVerify handshake message ( "CertificateVerify": { "signature algorithm": rsa_pss_rsae_sha256 "signature": { 0000: 4B 92 3E 23 B5 2E 2B 27 14 94 CB 35 4D 73 FF 32 K.>#..+'...5Ms.2 0010: 6A FA FB A4 E1 90 5F F6 45 6A 4D 06 BC CF D1 12 j....._.EjM..... 0020: 64 5F CC 25 A9 FD A7 50 45 CC 7D 07 77 E3 30 6C d_.%...PE...w.0l 0030: 82 D8 9E F9 CA A3 2F 9F 43 F3 35 19 7B 59 A6 04 ....../.C.5..Y.. 0040: 55 01 A2 26 33 39 AA 94 F1 CA E2 DC 62 FE 07 A4 U..&39......b... 0050: FB 9E 04 8B 69 F7 39 97 77 25 0A A3 EA F2 5F 4A ....i.9.w%...._J 0060: 71 3D 23 6B FF 94 62 58 BF FB FB 48 AF 1B AF 7B q=#k..bX...H.... 0070: AE 88 B3 6B 6C 07 F2 69 AC 2C 02 95 61 5C 4D 32 ...kl..i.,..a\M2 0080: 95 FA 32 C2 16 5F C5 9C E6 0C 37 7B C3 F8 49 FE ..2.._....7...I. 0090: BE 94 AD 99 A4 8E DA AF 63 20 EF 45 FF E7 8A D4 ........c .E.... 00A0: AD 0F FD 49 DB A3 93 67 55 57 2D 52 CD FD 18 C6 ...I...gUW-R.... 00B0: 2B CC 8D C8 F7 7F B7 06 1B 21 B8 B9 DD 76 70 B7 +........!...vp. 00C0: B6 FF 82 C3 4F 75 1B 3B F3 B5 30 72 DB DE 77 E6 ....Ou.;..0r..w. 00D0: 62 3B 27 8D 11 6A ED 23 19 2B EE 10 F5 D7 DC 99 b;'..j.#.+...... 00E0: 28 26 DB 35 01 4C 8D CC 06 04 67 0B 4D F4 F1 1F (&.5.L....g.M... 00F0: BD C9 F9 CA 76 2C B6 CB 6B 95 6B F4 D8 AD BA 84 ....v,..k.k..... } } ) javax.net.ssl|DEBUG|2A|https-jsse-nio-8443-exec-10|2019-11-15 12:35:08.821 IST|Finished.java:1010|Consuming client Finished handshake message ( "Finished": { "verify data": { 0000: B1 39 A9 BD 60 17 B0 DA 6E ED 25 C4 E7 27 17 1A .9..`...n.%..'.. 0010: D2 51 35 CE 92 F7 EF AB C4 A4 9B 42 05 63 3F A8 .Q5........B.c?. }'} ) javax.net.ssl|DEBUG|2A|https-jsse-nio-8443-exec-10|2019-11-15 12:35:08.822 IST|SSLCipher.java:1867|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE countdown value = 137438953472 javax.net.ssl|DEBUG|2A|https-jsse-nio-8443-exec-10|2019-11-15 12:35:08.823 IST|Finished.java:1110|Sending new session ticket 15-Nov-2019 12:35:08.823 FINE [https-jsse-nio-8443-exec-10] org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun Error during SSL handshake java.io.IOException: NOT_HANDSHAKING during handshake at org.apache.tomcat.util.net.SecureNioChannel.handshake(SecureNioChannel.java:193) at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1556) at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49) at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128) at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628) at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61) at java.base/java.lang.Thread.run(Thread.java:830) 15-Nov-2019 12:35:08.825 FINE [https-jsse-nio-8443-exec-10] org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper.doClose Calling [org.apache.tomcat.util.net.NioEndpoint@7bbe663e].closeSocket([org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper@1d94c344:org.apache.tomcat.util.net.SecureNioChannel@28cdd70:java.nio.channels.SocketChannel[connected local=/0:0:0:0:0:0:0:1:8443 remote=/0:0:0:0:0:0:0:1:65315]]) java.lang.Exception at org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper.doClose(NioEndpoint.java:1163) at org.apache.tomcat.util.net.SocketWrapperBase.close(SocketWrapperBase.java:402) at org.apache.tomcat.util.net.NioEndpoint$Poller.cancelledKey(NioEndpoint.java:665) at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1586) at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49) at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128) at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628) at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61) at java.base/java.lang.Thread.run(Thread.java:830) javax.net.ssl|ALL|2A|https-jsse-nio-8443-exec-10|2019-11-15 12:35:08.826 IST|SSLEngineImpl.java:818|Closing outbound of SSLEngine javax.net.ssl|WARNING|2A|https-jsse-nio-8443-exec-10|2019-11-15 12:35:08.826 IST|SSLEngineOutputRecord.java:173|outbound has closed, ignore outbound application data 15-Nov-2019 12:35:08.852 FINE [https-jsse-nio-8443-exec-9] org.apache.tomcat.util.net.SecureNioChannel.processSNI The SNI host name extracted for connection [java.nio.channels.SocketChannel[connected local=/0:0:0:0:0:0:0:1:8443 remote=/0:0:0:0:0:0:0:1:65316]] was [localhost] javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-15 12:35:08.855 IST|HandshakeContext.java:297|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 for TLS10 javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-15 12:35:08.856 IST|HandshakeContext.java:297|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 for TLS10 javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-15 12:35:08.856 IST|HandshakeContext.java:297|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLS10 javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-15 12:35:08.856 IST|HandshakeContext.java:297|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLS10 javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-15 12:35:08.857 IST|HandshakeContext.java:297|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 for TLS13 javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-15 12:35:08.857 IST|HandshakeContext.java:297|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 for TLS13 javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-15 12:35:08.857 IST|HandshakeContext.java:297|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLS13 javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-15 12:35:08.858 IST|HandshakeContext.java:297|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLS13 javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-15 12:35:08.858 IST|HandshakeContext.java:297|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA for TLS13 javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-15 12:35:08.858 IST|HandshakeContext.java:297|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA for TLS13 javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-15 12:35:08.859 IST|HandshakeContext.java:297|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 for TLS11 javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-15 12:35:08.859 IST|HandshakeContext.java:297|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 for TLS11 javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-15 12:35:08.859 IST|HandshakeContext.java:297|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLS11 javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-15 12:35:08.860 IST|HandshakeContext.java:297|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLS11 javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-15 12:35:08.866 IST|SSLExtensions.java:132|Ignore unknown or unsupported extension ( "unknown extension (28)": { 0000: 40 01 @. } ) javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-15 12:35:08.868 IST|SSLExtensions.java:132|Ignore unknown or unsupported extension ( "unknown extension (21)": { 0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0090: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ............... } ) javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-15 12:35:08.878 IST|ClientHello.java:808|Consuming ClientHello handshake message ( "ClientHello": { "client version" : "TLSv1.2", "random" : "AA E4 22 C5 FC 31 08 F5 B7 65 09 E0 CD C0 7D 58 79 EC C5 21 D0 FB 1E 86 DA FC AF 2A 04 AC EF C6", "session id" : "04 E8 0A CF CB FC 04 F9 B0 15 1E FE CB 8B 08 60 D9 C5 8A AB 7B 76 94 1A F4 F0 9F C9 CD 79 68 2E", "cipher suites" : "[TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_AES_256_GCM_SHA384(0x1302), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA(0xC00A), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA(0xC009), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA(0xC013), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA(0xC014), TLS_DHE_RSA_WITH_AES_128_CBC_SHA(0x0033), TLS_DHE_RSA_WITH_AES_256_CBC_SHA(0x0039), TLS_RSA_WITH_AES_128_CBC_SHA(0x002F), TLS_RSA_WITH_AES_256_CBC_SHA(0x0035), SSL_RSA_WITH_3DES_EDE_CBC_SHA(0x000A)]", "compression methods" : "00", "extensions" : [ "server_name (0)": { type=host_name (0), value=localhost }, "extended_master_secret (23)": { }, "renegotiation_info (65,281)": { "renegotiated connection": [] }, "supported_groups (10)": { "versions": [x25519, secp256r1, secp384r1, secp521r1, ffdhe2048, ffdhe3072] }, "ec_point_formats (11)": { "formats": [uncompressed] }, "application_layer_protocol_negotiation (16)": { [h2, http/1.1] }, "status_request (5)": { "certificate status type": ocsp "OCSP status request": { "responder_id": "request extensions": { } } }, "key_share (51)": { "client_shares": [ { "named group": x25519 "key_exchange": { 0000: 4D C6 BA DA C0 C3 C8 34 AE 59 FA 8A 9B BA AA AB M......4.Y...... 0010: 94 D6 1A A0 44 4A 5B A0 69 B8 42 83 4F DC 64 38 ....DJ[.i.B.O.d8 } }, { "named group": secp256r1 "key_exchange": { 0000: 04 EC C9 C4 52 35 93 C4 4C 85 01 DE AC EB 9F 92 ....R5..L....... 0010: F3 DB E3 D4 2B 67 E3 16 44 DB FC C7 13 66 8B 13 ....+g..D....f.. 0020: 6D 82 6E 2A 60 7B 6A BB 49 4D 9B 59 3C 66 5D F9 m.n*`.j.IM.Y } }, ] } ) javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-15 12:35:08.980 IST|CertificateVerify.java:1080|Produced server CertificateVerify handshake message ( "CertificateVerify": { "signature algorithm": rsa_pss_rsae_sha256 "signature": { 0000: 77 47 C2 49 11 4E 8D 3D 90 51 33 13 70 77 94 C2 wG.I.N.=.Q3.pw.. 0010: F0 C8 52 7B 99 08 8E 53 2E CD 51 F8 6D 6C 0E 52 ..R....S..Q.ml.R 0020: 94 C5 B0 21 D3 8F 59 86 0F 3E 64 DC 93 CC 07 E7 ...!..Y..>d..... 0030: 01 F7 6A C1 59 82 14 6F 58 E5 68 84 00 1D CD 96 ..j.Y..oX.h..... 0040: 92 C6 E7 3B D7 6F 9F F7 99 B7 65 D7 5E 8A E9 19 ...;.o....e.^... 0050: 67 61 C2 C0 67 7C 19 D8 87 23 5A 6F E9 7D 33 57 ga..g....#Zo..3W 0060: 03 37 E2 04 A4 F4 B6 C4 59 AD 3E 6A E2 CA 6B 0B .7......Y.>j..k. 0070: 0A E2 F9 D8 10 9D DF 5D D9 1E B6 F1 49 F7 FA 18 .......]....I... 0080: 4B C4 40 A2 34 3F EF 48 26 B0 C7 0B 3E C4 61 01 K.@.4?.H&...>.a. 0090: BA 53 2B A3 CD 5E B4 CA 0F C1 3F 05 57 EA A9 6C .S+..^....?.W..l 00A0: 55 C0 AD E8 FE DC B9 23 C7 DE 49 2E 50 B3 81 54 U......#..I.P..T 00B0: 76 A6 C5 84 D8 C9 4F 95 B4 61 77 C9 01 F6 F4 71 v.....O..aw....q 00C0: B4 42 94 54 9A 9D AC 6C 45 D1 A2 F3 DF AE 85 A9 .B.T...lE....... 00D0: 4F 25 68 34 0C 9D 05 3F E2 18 60 B2 28 80 18 16 O%h4...?..`.(... 00E0: 6B 7C DF B4 E1 98 17 9B 71 07 82 2D 24 B4 59 56 k.......q..-$.YV 00F0: 9E C4 9A B9 12 84 72 56 D8 4D 5B 3C AE E8 28 3C ......rV.M[<..(< } } ) javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-15 12:35:08.982 IST|Finished.java:767|Produced server Finished handshake message ( "Finished": { "verify data": { 0000: 77 BD 29 4A 3F DD 98 5C AF F0 2E CD F6 69 C2 C6 w.)J?..\.....i.. 0010: E3 61 F8 C0 2C B4 39 19 EE 30 62 06 F9 5F 7A BC .a..,.9..0b.._z. }'} ) javax.net.ssl|DEBUG|29|https-jsse-nio-8443-exec-9|2019-11-15 12:35:08.991 IST|SSLCipher.java:2021|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE countdown value = 137438953472 javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-15 12:35:09.048 IST|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-15 12:35:09.052 IST|CertificateMessage.java:1156|Consuming client Certificate handshake message ( "Certificate": { "certificate_request_context": "", "certificate_list": [ { "certificate" : { "version" : "v3", "serial number" : "2C 8B E3 32 BC 02 24 C0", "signature algorithm": "SHA512withRSA", "issuer" : "CN=client", "not before" : "2019-11-05 13:43:21.000 IST", "not after" : "2020-11-05 13:43:21.000 IST", "subject" : "CN=client", "subject public key" : "RSA", "extensions" : [ { ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:false PathLen:2147483647 ] }, { ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_Encipherment Data_Encipherment ] } ]} "extensions": { } }, ] } ) javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-15 12:35:09.056 IST|CertificateVerify.java:1128|Consuming CertificateVerify handshake message ( "CertificateVerify": { "signature algorithm": rsa_pss_rsae_sha256 "signature": { 0000: 0A 34 51 89 4C A1 56 30 2B B8 85 CE 90 48 D8 81 .4Q.L.V0+....H.. 0010: 8A 8E 48 E8 A7 E1 21 1A B5 6D 73 76 20 16 7B F6 ..H...!..msv ... 0020: 13 4F 2F F4 9C 8A 25 A9 57 27 6A 83 A1 D4 3C 97 .O/...%.W'j...<. 0030: E2 E3 D4 BC 53 35 0E 30 C2 7B 05 32 E0 CF BE F1 ....S5.0...2.... 0040: 36 28 49 04 19 16 6C DA EA B7 28 D9 BB 33 31 70 6(I...l...(..31p 0050: 31 C6 89 46 59 90 FA CC 60 5E 8A E5 09 E5 0D E7 1..FY...`^...... 0060: 7F 42 D3 95 A1 A4 73 11 94 07 73 A3 96 B8 AC 5A .B....s...s....Z 0070: 3A DE 40 53 98 40 02 E8 CE 47 4C 84 E2 7C C5 23 :.@S.@...GL....# 0080: 09 0B 07 DB 93 90 1C BF 02 43 E1 31 E5 A4 A8 68 .........C.1...h 0090: 6A 59 AD 3F BA 53 28 32 2D 5F 70 16 99 33 DD DA jY.?.S(2-_p..3.. 00A0: 50 1B D7 3C 3C F1 59 F4 0C 5C 95 2E A8 15 2A 94 P..<<.Y..\....*. 00B0: E9 A4 D0 B5 CD D4 70 87 82 45 20 81 91 B3 84 DD ......p..E ..... 00C0: DE 9D B3 C6 B5 A0 1A 0A 9F F5 12 E3 DA DC 2E 1B ................ 00D0: 95 E3 3D 23 72 F3 5E 0B 8E 1A 9B 8A 1C B6 34 A9 ..=#r.^.......4. 00E0: 9B 4F 43 4C C3 91 CF 4D 54 AF 3F C5 57 C6 F5 9A .OCL...MT.?.W... 00F0: 32 D8 08 3B 5C 3E F7 7B D9 98 11 76 0F 7C B1 51 2..;\>.....v...Q } } ) javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-15 12:35:09.058 IST|Finished.java:1010|Consuming client Finished handshake message ( "Finished": { "verify data": { 0000: 13 0C F3 96 F6 58 48 F7 CE 50 75 FC B1 6E 47 FE .....XH..Pu..nG. 0010: 1D 13 96 72 2F 9A E4 BA 8E 5F 40 5D C5 F8 71 3A ...r/...._@]..q: }'} ) javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-15 12:35:09.059 IST|SSLCipher.java:1867|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE countdown value = 137438953472 javax.net.ssl|DEBUG|23|https-jsse-nio-8443-exec-3|2019-11-15 12:35:09.060 IST|Finished.java:1110|Sending new session ticket 15-Nov-2019 12:35:09.060 FINE [https-jsse-nio-8443-exec-3] org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun Error during SSL handshake java.io.IOException: NOT_HANDSHAKING during handshake at org.apache.tomcat.util.net.SecureNioChannel.handshake(SecureNioChannel.java:193) at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1556) at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49) at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128) at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628) at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61) at java.base/java.lang.Thread.run(Thread.java:830) 15-Nov-2019 12:35:09.062 FINE [https-jsse-nio-8443-exec-3] org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper.doClose Calling [org.apache.tomcat.util.net.NioEndpoint@7bbe663e].closeSocket([org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper@f8ff213:org.apache.tomcat.util.net.SecureNioChannel@28cdd70:java.nio.channels.SocketChannel[connected local=/0:0:0:0:0:0:0:1:8443 remote=/0:0:0:0:0:0:0:1:65316]]) java.lang.Exception at org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper.doClose(NioEndpoint.java:1163) at org.apache.tomcat.util.net.SocketWrapperBase.close(SocketWrapperBase.java:402) at org.apache.tomcat.util.net.NioEndpoint$Poller.cancelledKey(NioEndpoint.java:665) at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1586) at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49) at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128) at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628) at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61) at java.base/java.lang.Thread.run(Thread.java:830) javax.net.ssl|ALL|23|https-jsse-nio-8443-exec-3|2019-11-15 12:35:09.063 IST|SSLEngineImpl.java:818|Closing outbound of SSLEngine javax.net.ssl|WARNING|23|https-jsse-nio-8443-exec-3|2019-11-15 12:35:09.064 IST|SSLEngineOutputRecord.java:173|outbound has closed, ignore outbound application data 15-Nov-2019 12:35:09.098 FINE [https-jsse-nio-8443-exec-4] org.apache.tomcat.util.net.SecureNioChannel.processSNI The SNI host name extracted for connection [java.nio.channels.SocketChannel[connected local=/0:0:0:0:0:0:0:1:8443 remote=/0:0:0:0:0:0:0:1:65317]] was [localhost] javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:09.101 IST|HandshakeContext.java:297|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 for TLS10 javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:09.102 IST|HandshakeContext.java:297|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 for TLS10 javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:09.102 IST|HandshakeContext.java:297|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLS10 javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:09.102 IST|HandshakeContext.java:297|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLS10 javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:09.103 IST|HandshakeContext.java:297|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 for TLS13 javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:09.103 IST|HandshakeContext.java:297|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 for TLS13 javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:09.104 IST|HandshakeContext.java:297|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLS13 javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:09.104 IST|HandshakeContext.java:297|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLS13 javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:09.104 IST|HandshakeContext.java:297|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA for TLS13 javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:09.104 IST|HandshakeContext.java:297|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA for TLS13 javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:09.105 IST|HandshakeContext.java:297|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 for TLS11 javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:09.105 IST|HandshakeContext.java:297|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 for TLS11 javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:09.105 IST|HandshakeContext.java:297|Ignore unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLS11 javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:09.106 IST|HandshakeContext.java:297|Ignore unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLS11 javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:09.111 IST|SSLExtensions.java:132|Ignore unknown or unsupported extension ( "unknown extension (28)": { 0000: 40 01 @. } ) javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:09.113 IST|SSLExtensions.java:132|Ignore unknown or unsupported extension ( "unknown extension (21)": { 0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0090: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ............... } ) javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:09.122 IST|ClientHello.java:808|Consuming ClientHello handshake message ( "ClientHello": { "client version" : "TLSv1.2", "random" : "F3 C0 AE B1 2B 07 DB 51 81 D3 C6 56 10 9E 68 01 ED C2 80 E3 D5 5E 84 38 69 B5 F5 21 46 94 F7 E8", "session id" : "4D 0D BB 6C 97 9E 79 CA 4B 1E E4 3A 4A E8 50 51 3E 00 80 63 38 96 1A 52 BB 70 65 86 CC 60 57 3F", "cipher suites" : "[TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_AES_256_GCM_SHA384(0x1302), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA(0xC00A), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA(0xC009), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA(0xC013), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA(0xC014), TLS_DHE_RSA_WITH_AES_128_CBC_SHA(0x0033), TLS_DHE_RSA_WITH_AES_256_CBC_SHA(0x0039), TLS_RSA_WITH_AES_128_CBC_SHA(0x002F), TLS_RSA_WITH_AES_256_CBC_SHA(0x0035), SSL_RSA_WITH_3DES_EDE_CBC_SHA(0x000A)]", "compression methods" : "00", "extensions" : [ "server_name (0)": { type=host_name (0), value=localhost }, "extended_master_secret (23)": { }, "renegotiation_info (65,281)": { "renegotiated connection": [] }, "supported_groups (10)": { "versions": [x25519, secp256r1, secp384r1, secp521r1, ffdhe2048, ffdhe3072] }, "ec_point_formats (11)": { "formats": [uncompressed] }, "application_layer_protocol_negotiation (16)": { [h2, http/1.1] }, "status_request (5)": { "certificate status type": ocsp "OCSP status request": { "responder_id": "request extensions": { } } }, "key_share (51)": { "client_shares": [ { "named group": x25519 "key_exchange": { 0000: B6 DF 8C 54 A0 22 73 05 75 70 AB C8 5C 2E 16 07 ...T."s.up..\... 0010: 19 F1 FB 74 64 D5 A2 B6 5C CB B2 AE 86 4C E7 52 ...td...\....L.R } }, { "named group": secp256r1 "key_exchange": { 0000: 04 1A AE D6 DB B0 46 02 35 2D 3A 59 61 41 CD B2 ......F.5-:YaA.. 0010: B7 B0 80 FE 0B E5 39 99 F3 29 94 54 26 1F 89 28 ......9..).T&..( 0020: C5 5B E6 00 08 86 51 C5 CA 4B C1 C5 D0 BB 56 88 .[....Q..K....V. 0030: F5 89 83 C0 4A FB 95 17 E4 6E 35 C1 54 62 B1 92 ....J....n5.Tb.. 0040: 00 } }, ] }, "supported_versions (43)": { "versions": [TLSv1.3, TLSv1.2, TLSv1.1, TLSv1] }, "signature_algorithms (13)": { "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1] }, "unknown extension (28)": { 0000: 40 01 @. }, "unknown extension (21)": { 0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0090: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ............... } ] } ) javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:09.122 IST|SSLExtensions.java:189|Consumed extension: supported_versions javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:09.123 IST|ClientHello.java:838|Negotiated protocol version: TLSv1.3 javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:09.123 IST|PskKeyExchangeModesExtension.java:293|abort session resumption, no supported psk_dhe_ke PSK key exchange mode javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:09.123 IST|PreSharedKeyExtension.java:840|Handling pre_shared_key absence. javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:09.124 IST|ServerNameExtension.java:327|no server name matchers, ignore server name indication javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:09.124 IST|SSLExtensions.java:189|Consumed extension: server_name javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:09.124 IST|SSLExtensions.java:170|Ignore unavailable extension: max_fragment_length javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:09.125 IST|SSLExtensions.java:189|Consumed extension: status_request javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:09.125 IST|SSLExtensions.java:189|Consumed extension: supported_groups javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:09.125 IST|SSLExtensions.java:160|Ignore unsupported extension: ec_point_formats javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:09.125 IST|SSLExtensions.java:189|Consumed extension: signature_algorithms javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:09.126 IST|SSLExtensions.java:170|Ignore unavailable extension: signature_algorithms_cert javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:09.126 IST|AlpnExtension.java:277|Ignore server unenabled extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:09.126 IST|SSLExtensions.java:189|Consumed extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:09.126 IST|SSLExtensions.java:160|Ignore unsupported extension: status_request_v2 javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:09.127 IST|SSLExtensions.java:160|Ignore unsupported extension: extended_master_secret javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:09.127 IST|SSLExtensions.java:160|Ignore unsupported extension: session_ticket javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:09.127 IST|SSLExtensions.java:170|Ignore unavailable extension: cookie javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:09.130 IST|SSLExtensions.java:189|Consumed extension: key_share javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:09.130 IST|SSLExtensions.java:160|Ignore unsupported extension: renegotiation_info javax.net.ssl|ALL|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:09.132 IST|SignatureScheme.java:359|Ignore disabled signature scheme: rsa_md5 javax.net.ssl|WARNING|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:09.133 IST|SSLExtensions.java:212|Ignore impact of unsupported extension: server_name javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:09.133 IST|SSLExtensions.java:204|Ignore unavailable extension: max_fragment_length javax.net.ssl|WARNING|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:09.134 IST|SSLExtensions.java:212|Ignore impact of unsupported extension: status_request javax.net.ssl|WARNING|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:09.134 IST|SSLExtensions.java:212|Ignore impact of unsupported extension: supported_groups javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:09.135 IST|SSLExtensions.java:221|Populated with extension: signature_algorithms javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:09.135 IST|SSLExtensions.java:204|Ignore unavailable extension: signature_algorithms_cert javax.net.ssl|WARNING|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:09.135 IST|SSLExtensions.java:212|Ignore impact of unsupported extension: application_layer_protocol_negotiation javax.net.ssl|WARNING|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:09.136 IST|SSLExtensions.java:212|Ignore impact of unsupported extension: supported_versions javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:09.136 IST|SSLExtensions.java:204|Ignore unavailable extension: cookie javax.net.ssl|WARNING|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:09.136 IST|SSLExtensions.java:212|Ignore impact of unsupported extension: key_share javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:09.137 IST|SSLExtensions.java:204|Ignore unavailable extension: pre_shared_key javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:09.137 IST|ServerHello.java:733|use cipher suite TLS_AES_128_GCM_SHA256 javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:09.142 IST|SSLExtensions.java:257|Ignore, context unavailable extension: pre_shared_key javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:09.143 IST|ServerHello.java:587|Produced ServerHello handshake message ( "ServerHello": { "server version" : "TLSv1.2", "random" : "00 B3 E6 87 C5 2D B1 EE 98 3B 3D 4B B5 F9 FD 9C 71 3F 86 35 34 0E 85 B4 CE 6F FC 35 51 56 EF E8", "session id" : "4D 0D BB 6C 97 9E 79 CA 4B 1E E4 3A 4A E8 50 51 3E 00 80 63 38 96 1A 52 BB 70 65 86 CC 60 57 3F", "cipher suite" : "TLS_AES_128_GCM_SHA256(0x1301)", "compression methods" : "00", "extensions" : [ "supported_versions (43)": { "selected version": [TLSv1.3] }, "key_share (51)": { "server_share": { "named group": x25519 "key_exchange": { 0000: D7 24 99 11 AC E1 3B 95 E2 F2 59 5C AC E1 1F 99 .$....;...Y\.... 0010: D9 7D 89 25 D3 8E F3 43 7F 6C 8D CF 96 A0 37 04 ...%...C.l....7. } }, } ] } ) javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:09.156 IST|SSLCipher.java:1867|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE countdown value = 137438953472 javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:09.158 IST|SSLCipher.java:2021|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE countdown value = 137438953472 javax.net.ssl|ALL|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:09.158 IST|ServerNameExtension.java:537|No expected server name indication response javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:09.158 IST|SSLExtensions.java:257|Ignore, context unavailable extension: server_name javax.net.ssl|ALL|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:09.159 IST|MaxFragExtension.java:469|Ignore unavailable max_fragment_length extension javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:09.159 IST|SSLExtensions.java:257|Ignore, context unavailable extension: max_fragment_length javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:09.164 IST|AlpnExtension.java:365|Ignore unavailable extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:09.164 IST|SSLExtensions.java:257|Ignore, context unavailable extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:09.165 IST|EncryptedExtensions.java:137|Produced EncryptedExtensions message ( "EncryptedExtensions": [ "supported_groups (10)": { "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192] } ] ) javax.net.ssl|ALL|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:09.166 IST|SignatureScheme.java:364|Ignore inactive signature scheme: dsa_sha256 javax.net.ssl|ALL|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:09.167 IST|SignatureScheme.java:364|Ignore inactive signature scheme: dsa_sha1 javax.net.ssl|ALL|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:09.167 IST|SignatureScheme.java:364|Ignore inactive signature scheme: rsa_md5 javax.net.ssl|ALL|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:09.168 IST|SignatureScheme.java:364|Ignore inactive signature scheme: dsa_sha256 javax.net.ssl|ALL|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:09.169 IST|SignatureScheme.java:364|Ignore inactive signature scheme: dsa_sha1 javax.net.ssl|ALL|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:09.169 IST|SignatureScheme.java:364|Ignore inactive signature scheme: rsa_md5 javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:09.170 IST|CertificateRequest.java:882|Produced CertificateRequest message ( "CertificateRequest": { "certificate_request_context": "", "extensions": [ "signature_algorithms (13)": { "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1] }, "signature_algorithms_cert (50)": { "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1] } ] } ) javax.net.ssl|ALL|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:09.171 IST|X509Authentication.java:295|No X.509 cert selected for EC javax.net.ssl|WARNING|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:09.171 IST|CertificateMessage.java:1062|Unavailable authentication scheme: ecdsa_secp256r1_sha256 javax.net.ssl|ALL|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:09.171 IST|X509Authentication.java:295|No X.509 cert selected for EC javax.net.ssl|WARNING|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:09.171 IST|CertificateMessage.java:1062|Unavailable authentication scheme: ecdsa_secp384r1_sha384 javax.net.ssl|ALL|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:09.172 IST|X509Authentication.java:295|No X.509 cert selected for EC javax.net.ssl|WARNING|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:09.172 IST|CertificateMessage.java:1062|Unavailable authentication scheme: ecdsa_secp521r1_sha512 javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:09.172 IST|StatusResponseManager.java:763|Staping disabled or is a resumed session javax.net.ssl|ALL|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:09.172 IST|CertStatusExtension.java:1115|Stapling is disabled for this connection javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:09.173 IST|SSLExtensions.java:257|Ignore, context unavailable extension: status_request javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:09.175 IST|CertificateMessage.java:1001|Produced server Certificate message ( "Certificate": { "certificate_request_context": "", "certificate_list": [ { "certificate" : { "version" : "v3", "serial number" : "3B FD 86 4A 58 09 72 F6", "signature algorithm": "SHA512withRSA", "issuer" : "CN=localhost", "not before" : "2019-11-05 13:41:52.000 IST", "not after" : "2020-11-05 13:41:52.000 IST", "subject" : "CN=localhost", "subject public key" : "RSA", "extensions" : [ { ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:false PathLen:2147483647 ] }, { ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_Encipherment Data_Encipherment ] } ]} "extensions": { } }, ] } ) javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:09.214 IST|CertificateVerify.java:1080|Produced server CertificateVerify handshake message ( "CertificateVerify": { "signature algorithm": rsa_pss_rsae_sha256 "signature": { 0000: 7D F7 B7 D7 A1 3B BE F9 AA 6E EA 07 C5 F9 68 C7 .....;...n....h. 0010: 02 22 D2 57 BF 5E 4A DC 20 1E 04 31 C5 93 51 B0 .".W.^J. ..1..Q. 0020: 83 A4 2E 15 F1 79 43 9E BE 9B F4 2C 24 E1 0F AF .....yC....,$... 0030: 0E EA 85 B1 A3 13 AB B0 55 05 C5 BF 83 C2 6B F7 ........U.....k. 0040: D9 7D 07 ED 52 FC 21 12 CE 41 3A C1 D2 FC 1A 21 ....R.!..A:....! 0050: 36 93 E4 D0 E7 DB 7C 45 F0 DD E6 C3 1D A5 53 61 6......E......Sa 0060: AD 41 83 8A 17 AB 5D 5F 73 A3 78 DE F0 A0 8F 82 .A....]_s.x..... 0070: F4 C4 24 8A 79 F3 1E E1 18 7E 37 B1 07 D0 6B 17 ..$.y.....7...k. 0080: 5F D8 2C 0D 00 F3 A3 6D 8D 26 D7 D1 2B AF 88 03 _.,....m.&..+... 0090: 5D 12 E1 15 74 49 74 EC 53 08 95 53 01 62 20 95 ]...tIt.S..S.b . 00A0: F7 0C 6B 9C 5E 6C 99 50 67 E6 FE AB 77 72 3E 03 ..k.^l.Pg...wr>. 00B0: 9E E5 31 DF 5E AB 70 E6 32 89 3F 98 EE CA 12 A2 ..1.^.p.2.?..... 00C0: 05 31 56 58 38 0C C0 90 74 14 B6 17 CB A1 78 1E .1VX8...t.....x. 00D0: 94 DD 39 3E 8B FA 24 28 EE 3E CA 22 48 22 0D 1A ..9>..$(.>."H".. 00E0: 85 D9 57 87 AE C2 EC A2 62 31 D8 76 7E 84 BF 20 ..W.....b1.v... 00F0: 09 FA 32 E2 1D 80 4C F5 12 1C 15 5B B4 C0 D9 3D ..2...L....[...= } } ) javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:09.216 IST|Finished.java:767|Produced server Finished handshake message ( "Finished": { "verify data": { 0000: E5 0B A4 A7 B7 39 FE 40 57 1A A4 6B 13 D6 53 49 .....9.@W..k..SI 0010: 10 12 4C F0 74 E8 A9 CE 5A F8 7E 10 1E 66 A7 0D ..L.t...Z....f.. }'} ) javax.net.ssl|DEBUG|24|https-jsse-nio-8443-exec-4|2019-11-15 12:35:09.227 IST|SSLCipher.java:2021|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE countdown value = 137438953472 javax.net.ssl|DEBUG|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:09.328 IST|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message javax.net.ssl|DEBUG|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:09.332 IST|CertificateMessage.java:1156|Consuming client Certificate handshake message ( "Certificate": { "certificate_request_context": "", "certificate_list": [ { "certificate" : { "version" : "v3", "serial number" : "2C 8B E3 32 BC 02 24 C0", "signature algorithm": "SHA512withRSA", "issuer" : "CN=client", "not before" : "2019-11-05 13:43:21.000 IST", "not after" : "2020-11-05 13:43:21.000 IST", "subject" : "CN=client", "subject public key" : "RSA", "extensions" : [ { ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:false PathLen:2147483647 ] }, { ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_Encipherment Data_Encipherment ] } ]} "extensions": { } }, ] } ) javax.net.ssl|DEBUG|28|https-jsse-nio-8443-exec-8|2019-11-15 12:35:09.338 IST|CertificateVerify.java:1128|Consuming CertificateVerify handshake message ( "CertificateVerify": { "signature algorithm": rsa_pss_rsae_sha256 "signature": { 0000: 31 22 28 BA 8F A6 BE 0B AD 48 4D 66 19 3A D9 68 1"(......HMf.:.h 0010: 26 FC 78 D8 37 38 A7 33 3C B0 CD 8A 62 8B BD 94 &.x.78.3<...b... 0020: BE 40 87 A3 CC AE 25 7B EA A0 DB CA 76 B9 59 BE .@....%.....v.Y. 0030: F0 E9 40 B6 97 F9 9B 7C 77 8C FD 6A E8 9D EA 3C ..@.....w..j...< 0040: F1 62 2E 3C 56 65 EC 82 8B 1D 3D CE 8E 29 3D 95 .b.