javax.net.ssl|DEBUG|13|HttpClient-2-Worker-0|2020-02-19 16:00:14.664 CST|HandshakeContext.java:297|Ignore unsupported cipher suite: TLS_AES_256_GCM_SHA384 for TLS12 javax.net.ssl|DEBUG|13|HttpClient-2-Worker-0|2020-02-19 16:00:14.664 CST|HandshakeContext.java:297|Ignore unsupported cipher suite: TLS_AES_128_GCM_SHA256 for TLS12 javax.net.ssl|DEBUG|13|HttpClient-2-Worker-0|2020-02-19 16:00:14.664 CST|HandshakeContext.java:297|Ignore unsupported cipher suite: TLS_CHACHA20_POLY1305_SHA256 for TLS12 javax.net.ssl|ALL|13|HttpClient-2-Worker-0|2020-02-19 16:00:14.689 CST|SignatureScheme.java:359|Ignore disabled signature scheme: rsa_md5 javax.net.ssl|DEBUG|13|HttpClient-2-Worker-0|2020-02-19 16:00:14.691 CST|SessionTicketExtension.java:396|Stateless resumption not supported javax.net.ssl|DEBUG|13|HttpClient-2-Worker-0|2020-02-19 16:00:14.692 CST|SSLExtensions.java:257|Ignore, context unavailable extension: session_ticket javax.net.ssl|DEBUG|13|HttpClient-2-Worker-0|2020-02-19 16:00:14.692 CST|SSLExtensions.java:257|Ignore, context unavailable extension: cookie javax.net.ssl|DEBUG|13|HttpClient-2-Worker-0|2020-02-19 16:00:14.709 CST|SSLExtensions.java:257|Ignore, context unavailable extension: renegotiation_info javax.net.ssl|DEBUG|13|HttpClient-2-Worker-0|2020-02-19 16:00:14.710 CST|PreSharedKeyExtension.java:666|No session to resume. javax.net.ssl|DEBUG|13|HttpClient-2-Worker-0|2020-02-19 16:00:14.710 CST|SSLExtensions.java:257|Ignore, context unavailable extension: pre_shared_key javax.net.ssl|DEBUG|13|HttpClient-2-Worker-0|2020-02-19 16:00:14.716 CST|ClientHello.java:652|Produced ClientHello handshake message ( "ClientHello": { "client version" : "TLSv1.2", "random" : "DC 2B 6F 46 3D 5E 32 2B C4 05 6B 43 2D 66 1C F7 43 CC CB 18 D8 3E 6A AE 4B 0E 18 5B AC C5 B4 70", "session id" : "73 60 96 4D CA 22 BF AA 7F 3D CD 84 FF AA F8 1F 8C 01 15 79 65 D4 D9 11 53 56 58 33 49 79 A9 03", "cipher suites" : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA(0xC00A), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA(0xC014), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA(0xC009), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA(0xC013), TLS_DHE_RSA_WITH_AES_256_CBC_SHA(0x0039), TLS_DHE_DSS_WITH_AES_256_CBC_SHA(0x0038), TLS_DHE_RSA_WITH_AES_128_CBC_SHA(0x0033), TLS_DHE_DSS_WITH_AES_128_CBC_SHA(0x0032), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA(0xC005), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA(0xC00F), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA(0xC004), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA(0xC00E), TLS_RSA_WITH_AES_256_GCM_SHA384(0x009D), TLS_RSA_WITH_AES_128_GCM_SHA256(0x009C), TLS_RSA_WITH_AES_256_CBC_SHA256(0x003D), TLS_RSA_WITH_AES_128_CBC_SHA256(0x003C), TLS_RSA_WITH_AES_256_CBC_SHA(0x0035), TLS_RSA_WITH_AES_128_CBC_SHA(0x002F), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]", "compression methods" : "00", "extensions" : [ "server_name (0)": { type=host_name (0), value=www.google.com }, "status_request (5)": { "certificate status type": ocsp "OCSP status request": { "responder_id": "request extensions": { } } }, "supported_groups (10)": { "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192] }, "ec_point_formats (11)": { "formats": [uncompressed] }, "signature_algorithms (13)": { "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1] }, "signature_algorithms_cert (50)": { "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1] }, "application_layer_protocol_negotiation (16)": { [h2, http/1.1] }, "status_request_v2 (17)": { "cert status request": { "certificate status type": ocsp_multi "OCSP status request": { "responder_id": "request extensions": { } } } }, "extended_master_secret (23)": { }, "supported_versions (43)": { "versions": [TLSv1.3, TLSv1.2] }, "psk_key_exchange_modes (45)": { "ke_modes": [psk_dhe_ke] }, "key_share (51)": { "client_shares": [ { "named group": x25519 "key_exchange": { 0000: 20 12 C9 23 68 4F 30 E3 7B 07 DC AC D9 3A 09 B6 ..#hO0......:.. 0010: 6E 2C 55 3B 8C 05 7F DB FA 17 CD 36 1E 52 B0 7D n,U;.......6.R.. } }, ] } ] } ) javax.net.ssl|DEBUG|13|HttpClient-2-Worker-0|2020-02-19 16:00:14.738 CST|ServerHello.java:887|Consuming ServerHello handshake message ( "ServerHello": { "server version" : "TLSv1.2", "random" : "66 7C B9 A0 22 03 C5 A6 A3 66 3C 96 2B 0A 11 E9 ED 1C 40 E6 12 72 0B 5E 41 A2 56 E6 89 FC 04 3E", "session id" : "73 60 96 4D CA 22 BF AA 7F 3D CD 84 FF AA F8 1F 8C 01 15 79 65 D4 D9 11 53 56 58 33 49 79 A9 03", "cipher suite" : "TLS_AES_256_GCM_SHA384(0x1302)", "compression methods" : "00", "extensions" : [ "key_share (51)": { "server_share": { "named group": x25519 "key_exchange": { 0000: 9B 50 75 F0 45 65 86 0F 14 61 32 4E 23 FD 73 35 .Pu.Ee...a2N#.s5 0010: 8C 8D 36 15 8C 51 73 5C FF 69 07 71 48 8F B4 5F ..6..Qs\.i.qH.._ } }, }, "supported_versions (43)": { "selected version": [TLSv1.3] } ] } ) javax.net.ssl|DEBUG|13|HttpClient-2-Worker-0|2020-02-19 16:00:14.739 CST|SSLExtensions.java:189|Consumed extension: supported_versions javax.net.ssl|DEBUG|13|HttpClient-2-Worker-0|2020-02-19 16:00:14.739 CST|ServerHello.java:983|Negotiated protocol version: TLSv1.3 javax.net.ssl|DEBUG|13|HttpClient-2-Worker-0|2020-02-19 16:00:14.741 CST|SSLExtensions.java:160|Ignore unsupported extension: server_name javax.net.ssl|DEBUG|13|HttpClient-2-Worker-0|2020-02-19 16:00:14.741 CST|SSLExtensions.java:160|Ignore unsupported extension: max_fragment_length javax.net.ssl|DEBUG|13|HttpClient-2-Worker-0|2020-02-19 16:00:14.742 CST|SSLExtensions.java:160|Ignore unsupported extension: status_request javax.net.ssl|DEBUG|13|HttpClient-2-Worker-0|2020-02-19 16:00:14.742 CST|SSLExtensions.java:160|Ignore unsupported extension: ec_point_formats javax.net.ssl|DEBUG|13|HttpClient-2-Worker-0|2020-02-19 16:00:14.742 CST|SSLExtensions.java:160|Ignore unsupported extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|13|HttpClient-2-Worker-0|2020-02-19 16:00:14.742 CST|SSLExtensions.java:160|Ignore unsupported extension: status_request_v2 javax.net.ssl|DEBUG|13|HttpClient-2-Worker-0|2020-02-19 16:00:14.743 CST|SSLExtensions.java:160|Ignore unsupported extension: extended_master_secret javax.net.ssl|DEBUG|13|HttpClient-2-Worker-0|2020-02-19 16:00:14.743 CST|SSLExtensions.java:160|Ignore unsupported extension: session_ticket javax.net.ssl|DEBUG|13|HttpClient-2-Worker-0|2020-02-19 16:00:14.743 CST|SSLExtensions.java:189|Consumed extension: supported_versions javax.net.ssl|DEBUG|13|HttpClient-2-Worker-0|2020-02-19 16:00:14.746 CST|SSLExtensions.java:189|Consumed extension: key_share javax.net.ssl|DEBUG|13|HttpClient-2-Worker-0|2020-02-19 16:00:14.747 CST|SSLExtensions.java:160|Ignore unsupported extension: renegotiation_info javax.net.ssl|DEBUG|13|HttpClient-2-Worker-0|2020-02-19 16:00:14.747 CST|PreSharedKeyExtension.java:898|Handling pre_shared_key absence. javax.net.ssl|DEBUG|13|HttpClient-2-Worker-0|2020-02-19 16:00:14.747 CST|SSLExtensions.java:204|Ignore unavailable extension: server_name javax.net.ssl|DEBUG|13|HttpClient-2-Worker-0|2020-02-19 16:00:14.747 CST|SSLExtensions.java:204|Ignore unavailable extension: max_fragment_length javax.net.ssl|DEBUG|13|HttpClient-2-Worker-0|2020-02-19 16:00:14.748 CST|SSLExtensions.java:204|Ignore unavailable extension: status_request javax.net.ssl|DEBUG|13|HttpClient-2-Worker-0|2020-02-19 16:00:14.748 CST|SSLExtensions.java:204|Ignore unavailable extension: ec_point_formats javax.net.ssl|DEBUG|13|HttpClient-2-Worker-0|2020-02-19 16:00:14.748 CST|SSLExtensions.java:204|Ignore unavailable extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|13|HttpClient-2-Worker-0|2020-02-19 16:00:14.749 CST|SSLExtensions.java:204|Ignore unavailable extension: status_request_v2 javax.net.ssl|DEBUG|13|HttpClient-2-Worker-0|2020-02-19 16:00:14.749 CST|SSLExtensions.java:204|Ignore unavailable extension: extended_master_secret javax.net.ssl|DEBUG|13|HttpClient-2-Worker-0|2020-02-19 16:00:14.749 CST|SSLExtensions.java:204|Ignore unavailable extension: session_ticket javax.net.ssl|WARNING|13|HttpClient-2-Worker-0|2020-02-19 16:00:14.749 CST|SSLExtensions.java:212|Ignore impact of unsupported extension: supported_versions javax.net.ssl|WARNING|13|HttpClient-2-Worker-0|2020-02-19 16:00:14.750 CST|SSLExtensions.java:212|Ignore impact of unsupported extension: key_share javax.net.ssl|DEBUG|13|HttpClient-2-Worker-0|2020-02-19 16:00:14.750 CST|SSLExtensions.java:204|Ignore unavailable extension: renegotiation_info javax.net.ssl|DEBUG|13|HttpClient-2-Worker-0|2020-02-19 16:00:14.750 CST|SSLExtensions.java:204|Ignore unavailable extension: pre_shared_key javax.net.ssl|DEBUG|13|HttpClient-2-Worker-0|2020-02-19 16:00:14.761 CST|SSLCipher.java:1867|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE countdown value = 137438953472 javax.net.ssl|DEBUG|13|HttpClient-2-Worker-0|2020-02-19 16:00:14.763 CST|SSLCipher.java:2021|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE countdown value = 137438953472 javax.net.ssl|DEBUG|13|HttpClient-2-Worker-0|2020-02-19 16:00:14.764 CST|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message javax.net.ssl|DEBUG|13|HttpClient-2-Worker-0|2020-02-19 16:00:14.778 CST|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message ( "EncryptedExtensions": [ "application_layer_protocol_negotiation (16)": { [h2] } ] ) javax.net.ssl|DEBUG|13|HttpClient-2-Worker-0|2020-02-19 16:00:14.778 CST|SSLExtensions.java:170|Ignore unavailable extension: server_name javax.net.ssl|DEBUG|13|HttpClient-2-Worker-0|2020-02-19 16:00:14.778 CST|SSLExtensions.java:170|Ignore unavailable extension: max_fragment_length javax.net.ssl|DEBUG|13|HttpClient-2-Worker-0|2020-02-19 16:00:14.778 CST|SSLExtensions.java:170|Ignore unavailable extension: supported_groups javax.net.ssl|DEBUG|13|HttpClient-2-Worker-0|2020-02-19 16:00:14.779 CST|SSLExtensions.java:189|Consumed extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|13|HttpClient-2-Worker-0|2020-02-19 16:00:14.779 CST|SSLExtensions.java:204|Ignore unavailable extension: server_name javax.net.ssl|DEBUG|13|HttpClient-2-Worker-0|2020-02-19 16:00:14.779 CST|SSLExtensions.java:204|Ignore unavailable extension: max_fragment_length javax.net.ssl|DEBUG|13|HttpClient-2-Worker-0|2020-02-19 16:00:14.779 CST|SSLExtensions.java:204|Ignore unavailable extension: supported_groups javax.net.ssl|WARNING|13|HttpClient-2-Worker-0|2020-02-19 16:00:14.780 CST|SSLExtensions.java:212|Ignore impact of unsupported extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|13|HttpClient-2-Worker-0|2020-02-19 16:00:14.789 CST|CertificateMessage.java:1154|Consuming server Certificate handshake message ( "Certificate": { "certificate_request_context": "", "certificate_list": [ { "certificate" : { "version" : "v3", "serial number" : "00 D4 B0 87 D4 5A EC 89 BC 02 00 00 00 00 57 9B D4", "signature algorithm": "SHA256withRSA", "issuer" : "CN=GTS CA 1O1, O=Google Trust Services, C=US", "not before" : "2020-01-30 06:01:37.000 CST", "not after" : "2020-04-23 06:01:37.000 CST", "subject" : "CN=www.google.com, O=Google LLC, L=Mountain View, ST=California, C=US", "subject public key" : "EC", "extensions" : [ { ObjectId: 1.3.6.1.4.1.11129.2.4.2 Criticality=false }, { ObjectId: 1.3.6.1.5.5.7.1.1 Criticality=false AuthorityInfoAccess [ [ accessMethod: ocsp accessLocation: URIName: http://ocsp.pki.goog/gts1o1 , accessMethod: caIssuers accessLocation: URIName: http://pki.goog/gsr2/GTS1O1.crt ] ] }, { ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: 98 D1 F8 6E 10 EB CF 9B EC 60 9F 18 90 1B A0 EB ...n.....`...... 0010: 7D 09 FD 2B ...+ ] ] }, { ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:false PathLen: undefined ] }, { ObjectId: 2.5.29.31 Criticality=false CRLDistributionPoints [ [DistributionPoint: [URIName: http://crl.pki.goog/GTS1O1.crl] ]] }, { ObjectId: 2.5.29.32 Criticality=false CertificatePolicies [ [CertificatePolicyId: [2.23.140.1.2.2] [] ] [CertificatePolicyId: [1.3.6.1.4.1.11129.2.5.3] [] ] ] }, { ObjectId: 2.5.29.37 Criticality=false ExtendedKeyUsages [ serverAuth ] }, { ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature ] }, { ObjectId: 2.5.29.17 Criticality=false SubjectAlternativeName [ DNSName: www.google.com ] }, { ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 3A C6 8F 58 05 D3 B4 E3 DB E7 FE 7A 94 8A 89 49 :..X.......z...I 0010: 93 41 52 DF .AR. ] ] } ]} "extensions": { } }, { "certificate" : { "version" : "v3", "serial number" : "01 E3 B4 9A A1 8D 8A A9 81 25 69 50 B8", "signature algorithm": "SHA256withRSA", "issuer" : "CN=GlobalSign, O=GlobalSign, OU=GlobalSign Root CA - R2", "not before" : "2017-06-15 08:00:42.000 CST", "not after" : "2021-12-15 08:00:42.000 CST", "subject" : "CN=GTS CA 1O1, O=Google Trust Services, C=US", "subject public key" : "RSA", "extensions" : [ { ObjectId: 1.3.6.1.5.5.7.1.1 Criticality=false AuthorityInfoAccess [ [ accessMethod: ocsp accessLocation: URIName: http://ocsp.pki.goog/gsr2 ] ] }, { ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: 9B E2 07 57 67 1C 1E C0 6A 06 DE 59 B4 9A 2D DF ...Wg...j..Y..-. 0010: DC 19 86 2E .... ] ] }, { ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:true PathLen:0 ] }, { ObjectId: 2.5.29.31 Criticality=false CRLDistributionPoints [ [DistributionPoint: [URIName: http://crl.pki.goog/gsr2/gsr2.crl] ]] }, { ObjectId: 2.5.29.32 Criticality=false CertificatePolicies [ [CertificatePolicyId: [2.23.140.1.2.2] [PolicyQualifierInfo: [ qualifierID: 1.3.6.1.5.5.7.2.1 qualifier: 0000: 16 1C 68 74 74 70 73 3A 2F 2F 70 6B 69 2E 67 6F ..https://pki.go 0010: 6F 67 2F 72 65 70 6F 73 69 74 6F 72 79 2F og/repository/ ]] ] ] }, { ObjectId: 2.5.29.37 Criticality=false ExtendedKeyUsages [ serverAuth clientAuth ] }, { ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_CertSign Crl_Sign ] }, { ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 98 D1 F8 6E 10 EB CF 9B EC 60 9F 18 90 1B A0 EB ...n.....`...... 0010: 7D 09 FD 2B ...+ ] ] } ]} "extensions": { } }, ] } ) javax.net.ssl|DEBUG|13|HttpClient-2-Worker-0|2020-02-19 16:00:14.792 CST|SSLExtensions.java:170|Ignore unavailable extension: status_request javax.net.ssl|DEBUG|13|HttpClient-2-Worker-0|2020-02-19 16:00:14.792 CST|SSLExtensions.java:170|Ignore unavailable extension: status_request javax.net.ssl|DEBUG|13|HttpClient-2-Worker-0|2020-02-19 16:00:14.866 CST|CertificateVerify.java:1165|Consuming CertificateVerify handshake message ( "CertificateVerify": { "signature algorithm": ecdsa_secp256r1_sha256 "signature": { 0000: 30 44 02 20 62 47 9F CC C1 37 FB 04 41 D0 DA FA 0D. bG...7..A... 0010: BA 42 CB 96 FF 1B 84 9E 05 BC 8E 21 A4 61 4D 4A .B.........!.aMJ 0020: 95 C5 61 1C 02 20 78 FD 28 5A EB 41 DD 9B E2 9E ..a.. x.(Z.A.... 0030: 75 A3 EF 16 86 61 EC 7A EA C1 93 E1 CC 04 E5 C7 u....a.z........ 0040: 6D 34 B9 19 2C F7 m4..,. } } ) javax.net.ssl|DEBUG|13|HttpClient-2-Worker-0|2020-02-19 16:00:14.870 CST|Finished.java:908|Consuming server Finished handshake message ( "Finished": { "verify data": { 0000: F1 64 2E E1 61 01 03 98 29 40 C4 3B D7 45 89 81 .d..a...)@.;.E.. 0010: 9E 5D D2 53 99 42 CA FB BE 75 9E 4D BB 4C 88 66 .].S.B...u.M.L.f 0020: 59 44 A3 F9 6C 8F 76 BF AD 98 1C 9E 4B 36 E2 03 YD..l.v.....K6.. }'} ) javax.net.ssl|DEBUG|13|HttpClient-2-Worker-0|2020-02-19 16:00:14.872 CST|SSLCipher.java:1867|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE countdown value = 137438953472 javax.net.ssl|DEBUG|13|HttpClient-2-Worker-0|2020-02-19 16:00:14.874 CST|Finished.java:683|Produced client Finished handshake message ( "Finished": { "verify data": { 0000: 01 3D 4C 97 75 97 48 08 D2 A9 16 C5 C9 98 A4 03 .=L.u.H......... 0010: 0A E3 B8 3B 48 CE 0D 1E 2E 08 E5 91 06 D3 18 55 ...;H..........U 0020: E3 01 3A 1F 13 1B 89 F5 75 6F 1D 5E C3 80 D3 AA ..:.....uo.^.... }'} ) javax.net.ssl|DEBUG|13|HttpClient-2-Worker-0|2020-02-19 16:00:14.875 CST|SSLCipher.java:2021|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE countdown value = 137438953472 javax.net.ssl|DEBUG|13|HttpClient-2-Worker-0|2020-02-19 16:00:14.926 CST|SSLExtensions.java:132|Ignore unknown or unsupported extension ( "unknown extension (27,242)": { } ) javax.net.ssl|DEBUG|13|HttpClient-2-Worker-0|2020-02-19 16:00:14.931 CST|NewSessionTicket.java:523|Consuming NewSessionTicket message ( "NewSessionTicket": { "ticket_lifetime" : "172,799", "ticket_age_add" : "", "ticket_nonce" : "00", "ticket" : { 0000: 01 61 E9 38 68 12 3B B3 00 F6 F8 C1 DB 33 4E 86 .a.8h.;......3N. 0010: 7C 47 61 21 86 D8 15 33 BF 86 AB 54 59 8B 5C 97 .Ga!...3...TY.\. 0020: 9E C7 EF AA 8F DF 33 50 CE 97 40 82 51 E6 B1 57 ......3P..@.Q..W 0030: CD 8F D8 C9 80 B9 DF 0E 2D 1E 27 29 B5 0D 28 D2 ........-.')..(. 0040: E1 B8 51 47 FE AA 18 91 D5 B2 A4 7C 47 1E D5 48 ..QG........G..H 0050: 08 E5 53 97 B3 87 E7 8E 0D 23 70 90 E5 5E 6D D6 ..S......#p..^m. 0060: A3 25 AE 8A 91 FB EA A5 A6 E3 89 F6 62 94 9F B2 .%..........b... 0070: EA D4 A5 2B 3C 49 4B ED A6 D9 45 73 FF 56 F9 44 ...+", "ticket_nonce" : "01", "ticket" : { 0000: 01 61 E9 38 68 12 3B B3 00 F6 F8 C1 DB 33 4E 86 .a.8h.;......3N. 0010: 7B 92 43 21 28 7E 62 CA E3 56 6D 31 0F 0B 7B 0F ..C!(.b..Vm1.... 0020: 8E 9E D1 E6 BA E1 05 39 CD 2B 19 9C D1 61 9F 7E .......9.+...a.. 0030: A9 4E 51 3D 3B 2D 46 35 71 E4 DE 58 D4 03 11 95 .NQ=;-F5q..X.... 0040: 15 18 FA 37 06 43 D0 65 0A C5 9F A1 20 F4 B9 B1 ...7.C.e.... ... 0050: CA 62 A3 5F B1 D3 03 67 75 4C A5 65 4A ED A3 2E .b._...guL.eJ... 0060: B1 E7 D6 AF 9B 2D B1 8A 57 09 5C 7F 0D 2F B8 5E .....-..W.\../.^ 0070: 5D 0A 30 37 69 13 81 BE 87 C4 03 06 13 6B 20 E1 ].07i........k . 0080: 5A 22 7B 50 95 43 3D 8D 09 88 AE D5 97 79 9D 0B Z".P.C=......y.. 0090: 95 7B 28 22 D0 7A B5 54 7B 47 AC 3F 2E 55 76 47 ..(".z.T.G.?.UvG 00A0: 75 08 F8 1F 1E 14 CC 92 77 56 5D 72 9F 23 A9 E2 u.......wV]r.#.. 00B0: 3B 16 6F 0E B3 96 50 82 D6 24 03 D4 10 94 36 30 ;.o...P..$....60 00C0: 6F 5D 00 7A 05 39 AA DF C5 F8 A7 A5 B4 6E 57 B8 o].z.9.......nW. 00D0: 04 2D 32 77 48 E7 21 CF 43 52 18 B7 23 BB 70 EE .-2wH.!.CR..#.p. 00E0: 22 6E 71 E0 14 55 EA 17 BD 38 B1 48 13 A3 50 35 "nq..U...8.H..P5 00F0: 3D 18 } "extensions" : [ "unknown extension (27,242)": { } ] } ) $6 ==> "Google "