Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- DSAPublicKey|java.security.interfaces.DSAPrivateKey, MessageDigest.MD2=sun.security.provider.MD2}], has type [jks], and contains aliases [1].
- ***
- found key for : 1
- chain [0] = [
- [
- Version: V3
- Subject: CN=dptmt idl Client, OU=dptmt, O=company, L=Muenchen, ST=Bayern, C=DE
- Signature Algorithm: SHA256withRSA, OID = 1.2.840.113549.1.1.11
- Key: Sun RSA public key, 2048 bits
- modulus: 27860372109468830371790848316838048481742654519887106604504021342249868278056806718113887554619983037150521557331897292523040842930086445236509127950495459570292150557509604898405358038854137807096359127569146904297476453192726695185136313908574759238387777498759305752232810964107393692497117808636345359431394776990021057866081521170561127343945767818070787549477409802471248943267422998176614016321076294112969179358226866845527002180567779190490858549267756450568910954848290220357556832590892416238449673262125542289108472881424439999767744520575078981340185000649837947376612558273869711262865508281738149874301
- public exponent: 65537
- Validity: [From: Tue Oct 25 11:50:54 CEST 2016,
- To: Thu Oct 25 11:50:54 CEST 2018]
- Issuer: CN=idl SubCA 2016, O=company, C=DE
- SerialNumber: [ 01]
- Certificate Extensions: 8
- [1]: ObjectId: 1.3.6.1.5.5.7.1.1 Criticality=false
- AuthorityInfoAccess [
- [
- accessMethod: cklmsuers
- accessLocation: URIName: http://downloads.dptmt.company.de/rootcacert2016.cert
- ]
- ]
- [2]: ObjectId: 2.5.29.35 Criticality=false
- AuthorityKeyIdentifier [
- KeyIdentifier [
- 0000: F3 85 C5 44 9F 10 A7 BE AF 8E 6C 54 73 07 31 CB ...D......lTs.1.
- 0010: FB 4F 73 81 .Os.
- ]
- ]
- [3]: ObjectId: 2.5.29.19 Criticality=false
- BasicConstraints:[
- CA:false
- PathLen: undefined
- ]
- [4]: ObjectId: 2.5.29.31 Criticality=false
- CRLDistributionPoints [
- [DistributionPoint:
- [URIName: http://crl.dptmt.company.de/idl.crl]
- ]]
- [5]: ObjectId: 2.5.29.37 Criticality=false
- ExtendedKeyUsages [
- clientAuth
- serverAuth
- ]
- [6]: ObjectId: 2.5.29.15 Criticality=false
- KeyUsage [
- DigitalSignature
- Key_Encipherment
- ]
- [7]: ObjectId: 2.5.29.17 Criticality=false
- SubjectAlternativeName [
- DNSName: localhost
- DNSName: 127.0.0.1
- DNSName: idlconnector.dptmt.company.de
- ]
- [8]: ObjectId: 2.5.29.14 Criticality=false
- SubjectKeyIdentifier [
- KeyIdentifier [
- 0000: 0E 99 C7 92 36 99 D5 66 CA 82 48 9C AF BB DF 61 ....6..f..H....a
- 0010: B8 58 E9 00 .X..
- ]
- ]
- ]
- Algorithm: [SHA256withRSA]
- Signature:
- ....
- ]...
- DSAPublicKey|java.security.interfaces.DSAPrivateKey, MessageDigest.MD2=sun.security.provider.MD2}], has type [jks], and contains aliases [ca, subca].
- adding as trusted cert:
- Subject: CN=idl Root CA 2016, O=company, C=DE
- Issuer: CN=idl Root CA 2016, O=company, C=DE
- Algorithm: RSA; Serial number: 0xf101a133d0b67e79
- Valid from Tue Oct 25 11:49:47 CEST 2016 until Mon Oct 20 11:49:47 CEST 2036
- adding as trusted cert:
- Subject: CN=idl SubCA 2016, O=company, C=DE
- Issuer: CN=idl Root CA 2016, O=company, C=DE
- Algorithm: RSA; Serial number: 0x1
- Valid from Tue Oct 25 11:49:47 CEST 2016 until Wed Oct 23 11:49:47 CEST 2024
- 08:41:08.776 [main] DEBUG org.apache.camel.util.jsse.TrustManagersParameters - TrustManager[] [[sun.security.ssl.X509TrustManagerImpl@1fc0053e]], initialized from TrustManagerFactory [javax.net.ssl.TrustManagerFactory@5217f3d0].
- 08:41:08.779 [main] DEBUG org.apache.camel.util.jsse.SSLContextParameters - SSLContext [javax.net.ssl.SSLContext@29cfd92b], initialized from [SSLContextParameters [keyManagers=KeyManagersParameters [keyStore=KeyStoreParameters [type=null, password=********, provider=null, resource=file:/home/user/GIT/karaf-policy-platform/camel-idl/target/test-classes/jsse/client-keystore.jks, getContext()=null], keyPassword=********, provider=null, algorithm=null, getContext()=null], trustManagers=TrustManagerType [keyStore=KeyStoreParameters [type=null, password=********, provider=null, resource=file:/home/user/GIT/karaf-policy-platform/camel-idl/target/test-classes/jsse/client-truststore.jks, getContext()=null], provider=null, algorithm=null, getContext()=null], secureRandom=null, clientParameters=null, serverParameters=SSLContextServerParameters [clientAuthentication=NONE, getCipherSuites()=null, getCipherSuitesFilter()=null, getSecureSocketProtocols()=null, getSecureSocketProtocolsFilter()=null, getSessionTimeout()=null, getContext()=null], provider=null, secureSocketProtocol=null, certAlias=null, getCipherSuites()=null, getCipherSuitesFilter()=null, getSecureSocketProtocols()=null, getSecureSocketProtocolsFilter()=null, getSessionTimeout()=null, getContext()=null]], is using provider [{Signature.MD5andSHA1withRSA=sun.security.ssl.RSASignature, Alg.Alias.Signature.OID.1.2.840.113549.1.1.2=MD2withRSA, Alg.Alias.KeyManagerFactory.PKIX=NewSunX509, Provider.id name=SunJSSE, KeyManagerFactory.NewSunX509=sun.security.ssl.KeyManagerFactoryImpl$X509, Alg.Alias.Signature.OID.1.3.14.3.2.29=SHA1withRSA, Signature.MD2withRSA=sun.security.rsa.RSASignature$MD2withRSA, Alg.Alias.KeyPairGenerator.OID.1.2.840.113549.1.1=RSA, Provider.id version=1.8, KeyManagerFactory.SunX509=sun.security.ssl.KeyManagerFactoryImpl$SunX509, KeyFactory.RSA=sun.security.rsa.RSAKeyFactory, TrustManagerFactory.SunX509=sun.security.ssl.TrustManagerFactoryImpl$SimpleFactory, Alg.Alias.TrustManagerFactory.X.509=PKIX, SSLContext.TLSv1.2=sun.security.ssl.SSLContextImpl$TLS12Context, SSLContext.TLSv1.1=sun.security.ssl.SSLContextImpl$TLS11Context, Signature.MD5withRSA=sun.security.rsa.RSASignature$MD5withRSA, Alg.Alias.SSLContext.SSLv3=TLSv1, Alg.Alias.SSLContext.SSL=TLS, KeyStore.PKCS12=sun.security.pkcs12.PKCS12KeyStore, Alg.Alias.TrustManagerFactory.SunPKIX=PKIX, Alg.Alias.KeyFactory.OID.1.2.840.113549.1.1=RSA, SSLContext.Default=sun.security.ssl.SSLContextImpl$DefaultSSLContext, Alg.Alias.KeyPairGenerator.1.2.840.113549.1.1=RSA, Provider.id info=Sun JSSE provider(PKCS12, SunX509/PKIX key/trust factories, SSLv3/TLSv1/TLSv1.1/TLSv1.2), Signature.SHA1withRSA=sun.security.rsa.RSASignature$SHA1withRSA, TrustManagerFactory.PKIX=sun.security.ssl.TrustManagerFactoryImpl$PKIXFactory, SSLContext.TLS=sun.security.ssl.SSLContextImpl$TLSContext, SSLContext.TLSv1=sun.security.ssl.SSLContextImpl$TLS10Context, Alg.Alias.Signature.1.3.14.3.2.29=SHA1withRSA, Alg.Alias.Signature.1.2.840.113549.1.1.5=SHA1withRSA, Alg.Alias.TrustManagerFactory.X509=PKIX, Provider.id className=com.sun.net.ssl.internal.ssl.Provider, Alg.Alias.Signature.1.2.840.113549.1.1.4=MD5withRSA, Alg.Alias.KeyFactory.1.2.840.113549.1.1=RSA, Alg.Alias.Signature.1.2.840.113549.1.1.2=MD2withRSA, KeyPairGenerator.RSA=sun.security.rsa.RSAKeyPairGenerator, Alg.Alias.Signature.OID.1.2.840.113549.1.1.5=SHA1withRSA, Alg.Alias.Signature.OID.1.2.840.113549.1.1.4=MD5withRSA}], protocol [TLS], key managers [sun.security.ssl.SunX509KeyManagerImpl@72f46e16], trust managers [sun.security.ssl.X509TrustManagerImpl@1fc0053e], and secure random [null].
- trigger seeding of SecureRandom
- done seeding SecureRandom
- 08:41:08.787 [main] TRACE org.apache.camel.util.jsse.SSLContextParameters - Configuring client and server side SSLContext parameters on SSLContext [javax.net.ssl.SSLContext@29cfd92b]...
- 08:41:08.787 [main] TRACE org.apache.camel.util.jsse.BaseSSLContextParameters - Configuring client and server side SSLContext parameters on SSLContext [javax.net.ssl.SSLContext@29cfd92b]...
- 08:41:08.787 [main] TRACE org.apache.camel.util.jsse.BaseSSLContextParameters - Configured client and server side SSLContext parameters on SSLContext [javax.net.ssl.SSLContext@29cfd92b].
- 08:41:08.787 [main] TRACE org.apache.camel.util.jsse.SSLContextParameters - Overriding server-side SSLContext parameters on SSLContext [javax.net.ssl.SSLContext@29cfd92b] with configured server parameters.
- 08:41:08.787 [main] TRACE org.apache.camel.util.jsse.SSLContextServerParameters - Configuring server-side SSLContext parameters on SSLContext [javax.net.ssl.SSLContext@29cfd92b]...
- 08:41:08.788 [main] TRACE org.apache.camel.util.jsse.SSLContextServerParameters - Configured server-side SSLContext parameters on SSLContext [javax.net.ssl.SSLContext@29cfd92b].
- 08:41:08.788 [main] TRACE org.apache.camel.util.jsse.SSLContextParameters - Configured client and server side SSLContext parameters on SSLContext [javax.net.ssl.SSLContext@29cfd92b].
- 08:41:08.792 [main] TRACE org.apache.camel.util.jsse.SSLContextParameters - Collecting client and server side SSLEngine configurers on SSLContext [javax.net.ssl.SSLContext@29cfd92b]...
- 08:41:08.806 [main] TRACE org.apache.camel.util.jsse.SSLContextParameters - Augmenting SSLEngine configurers with configurers from server parameters on SSLContext [javax.net.ssl.SSLContext@29cfd92b].
- 08:41:08.807 [main] TRACE org.apache.camel.util.jsse.SSLContextParameters - Collected client and server side SSLEngine configurers on SSLContext [javax.net.ssl.SSLContext@29cfd92b].
- 08:41:08.807 [main] TRACE org.apache.camel.util.jsse.SSLContextParameters - Collecting SSLSocketFactory configurers on SSLContext [javax.net.ssl.SSLContext@29cfd92b]...
- 08:41:08.809 [main] TRACE org.apache.camel.util.jsse.SSLContextParameters - Collected SSLSocketFactory configurers on SSLContext [javax.net.ssl.SSLContext@29cfd92b].
- 08:41:08.809 [main] TRACE org.apache.camel.util.jsse.SSLContextParameters - Collecting SSLServerSocketFactory configurers for SSLContext [javax.net.ssl.SSLContext@29cfd92b]...
- 08:41:08.812 [main] TRACE org.apache.camel.util.jsse.SSLContextParameters - Augmenting SSLServerSocketFactory configurers with configurers from server parameters for SSLContext [javax.net.ssl.SSLContext@29cfd92b].
- 08:41:08.813 [main] TRACE org.apache.camel.util.jsse.SSLContextParameters - Collected client and server side SSLServerSocketFactory configurers for SSLContext [javax.net.ssl.SSLContext@29cfd92b].
- 2016-11-07 08:41:08,814 main ERROR Recursive call to appender Console
- 2016-11-07 08:41:08,974 main ERROR Recursive call to appender Console
- 2016-11-07 08:41:08,986 main ERROR Recursive call to appender Console
- 2016-11-07 08:41:08,987 main ERROR Recursive call to appender Console
- 08:41:08.813 [main] DEBUG org.apache.camel.util.jsse.BaseSSLContextParameters - SSLContextDecorator [SSLContext[hash=d78795, provider=SunJSSE version 1.8, protocol=TLS, needClientAuth=false, wantClientAuth=false
- defaultProtocols=TLSv1,TLSv1.1,TLSv1.2
- defaultChiperSuites=TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384,TLS_RSA_WITH_AES_256_CBC_SHA256,TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384,TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384,TLS_DHE_RSA_WITH_AES_256_CBC_SHA256,TLS_DHE_DSS_WITH_AES_256_CBC_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA,TLS_ECDH_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_DSS_WITH_AES_256_CBC_SHA,TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256,TLS_RSA_WITH_AES_128_CBC_SHA256,TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256,TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256,TLS_DHE_RSA_WITH_AES_128_CBC_SHA256,TLS_DHE_DSS_WITH_AES_128_CBC_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_128_CBC_SHA,TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA,TLS_ECDH_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_DSS_WITH_AES_128_CBC_SHA,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384,TLS_DHE_RSA_WITH_AES_256_GCM_SHA384,TLS_DHE_DSS_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256,TLS_DHE_RSA_WITH_AES_128_GCM_SHA256,TLS_DHE_DSS_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA,TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA,SSL_RSA_WITH_3DES_EDE_CBC_SHA,TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA,TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA,SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA,SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA,TLS_EMPTY_RENEGOTIATION_INFO_SCSV
- supportedProtocols=SSLv2Hello,SSLv3,TLSv1,TLSv1.1,TLSv1.2
- supportedChiperSuites=TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384,TLS_RSA_WITH_AES_256_CBC_SHA256,TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384,TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384,TLS_DHE_RSA_WITH_AES_256_CBC_SHA256,TLS_DHE_DSS_WITH_AES_256_CBC_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA,TLS_ECDH_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_DSS_WITH_AES_256_CBC_SHA,TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256,TLS_RSA_WITH_AES_128_CBC_SHA256,TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256,TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256,TLS_DHE_RSA_WITH_AES_128_CBC_SHA256,TLS_DHE_DSS_WITH_AES_128_CBC_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_128_CBC_SHA,TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA,TLS_ECDH_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_DSS_WITH_AES_128_CBC_SHA,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384,TLS_DHE_RSA_WITH_AES_256_GCM_SHA384,TLS_DHE_DSS_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256,TLS_DHE_RSA_WITH_AES_128_GCM_SHA256,TLS_DHE_DSS_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA,TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA,SSL_RSA_WITH_3DES_EDE_CBC_SHA,TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA,TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA,SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA,SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA,TLS_EMPTY_RENEGOTIATION_INFO_SCSV,TLS_DH_anon_WITH_AES_256_GCM_SHA384,TLS_DH_anon_WITH_AES_128_GCM_SHA256,TLS_DH_anon_WITH_AES_256_CBC_SHA256,TLS_ECDH_anon_WITH_AES_256_CBC_SHA,TLS_DH_anon_WITH_AES_256_CBC_SHA,TLS_DH_anon_WITH_AES_128_CBC_SHA256,TLS_ECDH_anon_WITH_AES_128_CBC_SHA,TLS_DH_anon_WITH_AES_128_CBC_SHA,TLS_ECDH_anon_WITH_3DES_EDE_CBC_SHA,SSL_DH_anon_WITH_3DES_EDE_CBC_SHA,SSL_RSA_WITH_DES_CBC_SHA,SSL_DHE_RSA_WITH_DES_CBC_SHA,SSL_DHE_DSS_WITH_DES_CBC_SHA,SSL_DH_anon_WITH_DES_CBC_SHA,SSL_RSA_EXPORT_WITH_DES40_CBC_SHA,SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA,SSL_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA,SSL_DH_anon_EXPORT_WITH_DES40_CBC_SHA,TLS_RSA_WITH_NULL_SHA256,TLS_ECDHE_ECDSA_WITH_NULL_SHA,TLS_ECDHE_RSA_WITH_NULL_SHA,SSL_RSA_WITH_NULL_SHA,TLS_ECDH_ECDSA_WITH_NULL_SHA,TLS_ECDH_RSA_WITH_NULL_SHA,TLS_ECDH_anon_WITH_NULL_SHA,SSL_RSA_WITH_NULL_MD5,TLS_KRB5_WITH_3DES_EDE_CBC_SHA,TLS_KRB5_WITH_3DES_EDE_CBC_MD5,TLS_KRB5_WITH_DES_CBC_SHA,TLS_KRB5_WITH_DES_CBC_MD5,TLS_KRB5_EXPORT_WITH_DES_CBC_40_SHA,TLS_KRB5_EXPORT_WITH_DES_CBC_40_MD5
- ]] decorating SSLContext [javax.net.ssl.SSLContext@29cfd92b].
- 08:41:09.163 [main] TRACE com.ning.http.client.providers.netty.channel.ChannelManager - Number of application's worker threads is 4
- 08:41:09.272 [main] DEBUG org.apache.camel.processor.interceptor.DefaultChannel - Initialize channel for target: 'To[idlclient://localhost:9292/echo]'
- ...
- 08:41:09.416 [main] DEBUG org.eclipse.jetty.util.component.ContainerLifeCycle - org.eclipse.jetty.server.Server@79c4715d added {org.eclipse.jetty.server.handler.ContextHandlerCollection@62577d6[],AUTO}
- 08:41:09.420 [main] TRACE org.apache.camel.util.jsse.SSLContextParameters - Creating SSLContext from SSLContextParameters [SSLContextParameters [keyManagers=KeyManagersParameters [keyStore=KeyStoreParameters [type=null, password=********, provider=null, resource=file:/home/user/GIT/karaf-policy-platform/camel-idl/target/test-classes/jsse/server-keystore.jks, getContext()=null], keyPassword=********, provider=null, algorithm=null, getContext()=null], trustManagers=TrustManagerType [keyStore=KeyStoreParameters [type=null, password=********, provider=null, resource=file:/home/user/GIT/karaf-policy-platform/camel-idl/target/test-classes/jsse/server-truststore.jks, getContext()=null], provider=null, algorithm=null, getContext()=null], secureRandom=null, clientParameters=null, serverParameters=SSLContextServerParameters [clientAuthentication=REQUIRE, getCipherSuites()=null, getCipherSuitesFilter()=null, getSecureSocketProtocols()=null, getSecureSocketProtocolsFilter()=null, getSessionTimeout()=null, getContext()=null], provider=null, secureSocketProtocol=null, certAlias=null, getCipherSuites()=null, getCipherSuitesFilter()=null, getSecureSocketProtocols()=null, getSecureSocketProtocolsFilter()=null, getSessionTimeout()=null, getContext()=CamelContext(camel-1)]].
- 08:41:09.422 [main] INFO org.apache.camel.util.jsse.SSLContextParameters - Available providers: {Alg.Alias.Signature.SHA1/DSA=SHA1withDSA, Alg.Alias.Signature.1.2.840.10040.4.3=SHA1withDSA, Alg.Alias.Signature.DSS=SHA1withDSA, SecureRandom.SHA1PRNG ImplementedIn=Software, KeyStore.JKS=sun.security.provider.JavaKeyStore$DualFormatJKS, Alg.Alias.MessageDigest.SHA-1=SHA, MessageDigest.SHA=sun.security.provider.SHA, KeyStore.CaseExactJKS=sun.security.provider.JavaKeyStore$CaseExactJKS, CertStore.com.sun.security.IndexedCollection ImplementedIn=Software, Signature.SHA256withDSA=sun.security.provider.DSA$SHA256withDSA, Alg.Alias.MessageDigest.OID.1.3.14.3.2.26=SHA, Alg.Alias.Signature.DSA=SHA1withDSA, KeyFactory.DSA ImplementedIn=Software, KeyStore.JKS ImplementedIn=Software, AlgorithmParameters.DSA ImplementedIn=Software, Signature.NONEwithDSA=sun.security.provider.DSA$RawDSA, Alg.Alias.CertificateFactory.X509=X.509, Signature.SHA256withDSA SupportedKeyClasses=java.security.interfaces.DSAPublicKey|java.security.interfaces.DSAPrivateKey, CertStore.com.sun.security.IndexedCollection=sun.security.provider.certpath.IndexedCollectionCertStore, Provider.id className=sun.security.provider.Sun, Alg.Alias.MessageDigest.1.3.14.3.2.26=SHA, Alg.Alias.Signature.SHA-1/DSA=SHA1withDSA, KeyStore.DKS=sun.security.provider.DomainKeyStore$DKS, CertificateFactory.X.509 ImplementedIn=Software, Alg.Alias.Signature.OID.2.16.840.1.101.3.4.3.2=SHA256withDSA, Alg.Alias.Signature.OID.2.16.840.1.101.3.4.3.1=SHA224withDSA, Signature.SHA1withDSA KeySize=1024, Signature.NONEwithDSA KeySize=1024, CertPathValidator.PKIX ImplementedIn=Software, KeyFactory.DSA=sun.security.provider.DSAKeyFactory, Configuration.JavaLoginConfig=sun.security.provider.ConfigFile$Spi, Alg.Alias.Signature.OID.1.2.840.10040.4.3=SHA1withDSA, Alg.Alias.MessageDigest.OID.2.16.840.1.101.3.4.2.4=SHA-224, Alg.Alias.KeyFactory.1.2.840.10040.4.1=DSA, MessageDigest.MD5 ImplementedIn=Software, Alg.Alias.MessageDigest.OID.2.16.840.1.101.3.4.2.3=SHA-512, Alg.Alias.MessageDigest.OID.2.16.840.1.101.3.4.2.2=SHA-384, Alg.Alias.MessageDigest.OID.2.16.840.1.101.3.4.2.1=SHA-256, Alg.Alias.Signature.RawDSA=NONEwithDSA, Provider.id name=SUN, Alg.Alias.AlgorithmParameters.1.2.840.10040.4.1=DSA, CertPathBuilder.PKIX ValidationAlgorithm=RFC3280, Policy.JavaPolicy=sun.security.provider.PolicySpiFile, Signature.SHA224withDSA KeySize=2048, Alg.Alias.AlgorithmParameters.OID.1.2.840.10040.4.1=DSA, Alg.Alias.AlgorithmParameters.1.3.14.3.2.12=DSA, Alg.Alias.Signature.SHA/DSA=SHA1withDSA, Alg.Alias.KeyPairGenerator.1.3.14.3.2.12=DSA, MessageDigest.SHA-384=sun.security.provider.SHA5$SHA384, MessageDigest.SHA-224=sun.security.provider.SHA2$SHA224, Signature.SHA1withDSA ImplementedIn=Software, AlgorithmParameterGenerator.DSA=sun.security.provider.DSAParameterGenerator, Signature.NONEwithDSA SupportedKeyClasses=java.security.interfaces.DSAPublicKey|java.security.interfaces.DSAPrivateKey, SecureRandom.NativePRNGBlocking=sun.security.provider.NativePRNG$Blocking, MessageDigest.SHA-512=sun.security.provider.SHA5$SHA512, Alg.Alias.KeyFactory.OID.1.2.840.10040.4.1=DSA, CertPathBuilder.PKIX=sun.security.provider.certpath.SunCertPathBuilder, Alg.Alias.Signature.1.3.14.3.2.27=SHA1withDSA, Alg.Alias.MessageDigest.2.16.840.1.101.3.4.2.4=SHA-224, CertPathBuilder.PKIX ImplementedIn=Software, Alg.Alias.MessageDigest.2.16.840.1.101.3.4.2.3=SHA-512, Provider.id version=1.8, Alg.Alias.MessageDigest.2.16.840.1.101.3.4.2.2=SHA-384, Signature.SHA256withDSA KeySize=2048, Alg.Alias.MessageDigest.2.16.840.1.101.3.4.2.1=SHA-256, AlgorithmParameters.DSA=sun.security.provider.DSAParameters, Signature.SHA1withDSA SupportedKeyClasses=java.security.interfaces.DSAPublicKey|java.security.interfaces.DSAPrivateKey, CertStore.Collection=sun.security.provider.certpath.CollectionCertStore, AlgorithmParameterGenerator.DSA ImplementedIn=Software, SecureRandom.NativePRNGNonBlocking=sun.security.provider.NativePRNG$NonBlocking, KeyPairGenerator.DSA KeySize=2048, CertStore.LDAP=sun.security.provider.certpath.ldap.LDAPCertStore, CertificateFactory.X.509=sun.security.provider.X509Factory, Alg.Alias.Signature.2.16.840.1.101.3.4.3.2=SHA256withDSA, Alg.Alias.Signature.2.16.840.1.101.3.4.3.1=SHA224withDSA, SecureRandom.NativePRNG=sun.security.provider.NativePRNG, CertStore.LDAP LDAPSchema=RFC2587, CertStore.LDAP ImplementedIn=Software, KeyPairGenerator.DSA ImplementedIn=Software, CertPathValidator.PKIX ValidationAlgorithm=RFC3280, CertStore.Collection ImplementedIn=Software, Signature.SHA224withDSA=sun.security.provider.DSA$SHA224withDSA, Alg.Alias.Signature.1.3.14.3.2.13=SHA1withDSA, CertPathValidator.PKIX=sun.security.provider.certpath.PKIXCertPathValidator, Alg.Alias.MessageDigest.SHA1=SHA, AlgorithmParameterGenerator.DSA KeySize=2048, SecureRandom.SHA1PRNG=sun.security.provider.SecureRandom, Signature.SHA1withDSA=sun.security.provider.DSA$SHA1withDSA, Alg.Alias.KeyFactory.1.3.14.3.2.12=DSA, MessageDigest.SHA ImplementedIn=Software, KeyPairGenerator.DSA=sun.security.provider.DSAKeyPairGenerator, Provider.id info=SUN (DSA key/parameter generation; DSA signing; SHA-1, MD5 digests; SecureRandom; X.509 certificates; JKS & DKS keystores; PKIX CertPathValidator; PKIX CertPathBuilder; LDAP, Collection CertStores, JavaPolicy Policy; JavaLoginConfig Configuration), Alg.Alias.KeyPairGenerator.1.2.840.10040.4.1=DSA, Alg.Alias.Signature.SHAwithDSA=SHA1withDSA, MessageDigest.MD5=sun.security.provider.MD5, Alg.Alias.Signature.DSAWithSHA1=SHA1withDSA, MessageDigest.SHA-256=sun.security.provider.SHA2$SHA256, Alg.Alias.KeyPairGenerator.OID.1.2.840.10040.4.1=DSA, Signature.SHA224withDSA SupportedKeyClasses=java.security.interfaces.DSAPublicKey|java.security.interfaces.DSAPrivateKey, MessageDigest.MD2=sun.security.provider.MD2}.
- 08:41:09.424 [main] TRACE org.apache.camel.util.jsse.KeyManagersParameters - Creating KeyManager[] from KeyManagersParameters [KeyManagersParameters [keyStore=KeyStoreParameters [type=null, password=********, provider=null, resource=file:/home/user/GIT/karaf-policy-platform/camel-idl/target/test-classes/jsse/server-keystore.jks, getContext()=null], keyPassword=********, provider=null, algorithm=null, getContext()=null]].
- 08:41:09.424 [main] DEBUG org.apache.camel.util.jsse.KeyManagersParameters - KeyManagerFactory [javax.net.ssl.KeyManagerFactory@5a12c728], initialized from [KeyManagersParameters [keyStore=KeyStoreParameters [type=null, password=********, provider=null, resource=file:/home/user/GIT/karaf-policy-platform/camel-idl/target/test-classes/jsse/server-keystore.jks, getContext()=null], keyPassword=********, provider=null, algorithm=null, getContext()=null]], is using provider [{Signature.MD5andSHA1withRSA=sun.security.ssl.RSASignature, Alg.Alias.Signature.OID.1.2.840.113549.1.1.2=MD2withRSA, Alg.Alias.KeyManagerFactory.PKIX=NewSunX509, Provider.id name=SunJSSE, KeyManagerFactory.NewSunX509=sun.security.ssl.KeyManagerFactoryImpl$X509, Alg.Alias.Signature.OID.1.3.14.3.2.29=SHA1withRSA, Signature.MD2withRSA=sun.security.rsa.RSASignature$MD2withRSA, Alg.Alias.KeyPairGenerator.OID.1.2.840.113549.1.1=RSA, Provider.id version=1.8, KeyManagerFactory.SunX509=sun.security.ssl.KeyManagerFactoryImpl$SunX509, KeyFactory.RSA=sun.security.rsa.RSAKeyFactory, TrustManagerFactory.SunX509=sun.security.ssl.TrustManagerFactoryImpl$SimpleFactory, Alg.Alias.TrustManagerFactory.X.509=PKIX, SSLContext.TLSv1.2=sun.security.ssl.SSLContextImpl$TLS12Context, SSLContext.TLSv1.1=sun.security.ssl.SSLContextImpl$TLS11Context, Signature.MD5withRSA=sun.security.rsa.RSASignature$MD5withRSA, Alg.Alias.SSLContext.SSLv3=TLSv1, Alg.Alias.SSLContext.SSL=TLS, KeyStore.PKCS12=sun.security.pkcs12.PKCS12KeyStore, Alg.Alias.TrustManagerFactory.SunPKIX=PKIX, Alg.Alias.KeyFactory.OID.1.2.840.113549.1.1=RSA, SSLContext.Default=sun.security.ssl.SSLContextImpl$DefaultSSLContext, Alg.Alias.KeyPairGenerator.1.2.840.113549.1.1=RSA, Provider.id info=Sun JSSE provider(PKCS12, SunX509/PKIX key/trust factories, SSLv3/TLSv1/TLSv1.1/TLSv1.2), Signature.SHA1withRSA=sun.security.rsa.RSASignature$SHA1withRSA, TrustManagerFactory.PKIX=sun.security.ssl.TrustManagerFactoryImpl$PKIXFactory, SSLContext.TLS=sun.security.ssl.SSLContextImpl$TLSContext, SSLContext.TLSv1=sun.security.ssl.SSLContextImpl$TLS10Context, Alg.Alias.Signature.1.3.14.3.2.29=SHA1withRSA, Alg.Alias.Signature.1.2.840.113549.1.1.5=SHA1withRSA, Alg.Alias.TrustManagerFactory.X509=PKIX, Provider.id className=com.sun.net.ssl.internal.ssl.Provider, Alg.Alias.Signature.1.2.840.113549.1.1.4=MD5withRSA, Alg.Alias.KeyFactory.1.2.840.113549.1.1=RSA, Alg.Alias.Signature.1.2.840.113549.1.1.2=MD2withRSA, KeyPairGenerator.RSA=sun.security.rsa.RSAKeyPairGenerator, Alg.Alias.Signature.OID.1.2.840.113549.1.1.5=SHA1withRSA, Alg.Alias.Signature.OID.1.2.840.113549.1.1.4=MD5withRSA}] and algorithm [SunX509].
- ...
- DSAPublicKey|java.security.interfaces.DSAPrivateKey, MessageDigest.MD2=sun.security.provider.MD2}], has type [jks], and contains aliases [1].
- ***
- found key for : 1
- chain [0] = [
- [
- Version: V3
- Subject: CN=dptmt idl Server, OU=dptmt, O=company, L=Muenchen, ST=Bayern, C=DE
- Signature Algorithm: SHA256withRSA, OID = 1.2.840.113549.1.1.11
- Key: Sun RSA public key, 2048 bits
- modulus: 24265231049464539106505059649255465585651493115307358056581570717603244739467158330493118010325173213258506491772197498922706399029200330462742618291144509936480120356296272503499306538942336303080463697984189292966833387737614923972864898800240760207416664061824893745126291826695460786898197370460695259556891071934427400886692754260247730038349343721484423635420635705935836359761031274071091413739324805084922550787664606567944134030814232629673334886705568327174404354909648801515075043226013901967396016637037788735419730523194952586696339618165125854450308484116907246765441745021682797394819952007663800869751
- public exponent: 65537
- Validity: [From: Tue Oct 25 11:50:28 CEST 2016,
- To: Thu Oct 25 11:50:28 CEST 2018]
- Issuer: CN=idl SubCA 2016, O=company, C=DE
- SerialNumber: [ 01]
- Certificate Extensions: 8
- [1]: ObjectId: 1.3.6.1.5.5.7.1.1 Criticality=false
- AuthorityInfoAccess [
- [
- accessMethod: cklmsuers
- accessLocation: URIName: http://downloads.dptmt.company.de/rootcacert2016.cert
- ]
- ]
- [2]: ObjectId: 2.5.29.35 Criticality=false
- AuthorityKeyIdentifier [
- KeyIdentifier [
- 0000: F3 85 C5 44 9F 10 A7 BE AF 8E 6C 54 73 07 31 CB ...D......lTs.1.
- 0010: FB 4F 73 81 .Os.
- ]
- ]
- [3]: ObjectId: 2.5.29.19 Criticality=false
- BasicConstraints:[
- CA:false
- PathLen: undefined
- ]
- [4]: ObjectId: 2.5.29.31 Criticality=false
- CRLDistributionPoints [
- [DistributionPoint:
- [URIName: http://crl.dptmt.company.de/idl.crl]
- ]]
- [5]: ObjectId: 2.5.29.37 Criticality=false
- ExtendedKeyUsages [
- clientAuth
- serverAuth
- ]
- [6]: ObjectId: 2.5.29.15 Criticality=false
- KeyUsage [
- DigitalSignature
- Key_Encipherment
- ]
- [7]: ObjectId: 2.5.29.17 Criticality=false
- SubjectAlternativeName [
- DNSName: localhost
- DNSName: 127.0.0.1
- DNSName: idlconnector.dptmt.company.de
- ]
- [8]: ObjectId: 2.5.29.14 Criticality=false
- SubjectKeyIdentifier [
- KeyIdentifier [
- 0000: C8 39 51 89 74 35 FF AB 07 38 12 79 C0 AA 8C 17 .9Q.t5...8.y....
- 0010: 22 D3 81 34 "..4
- ]
- ]
- ]
- Algorithm: [SHA256withRSA]
- Signature:
- ...
- ]
- ***
- 08:41:09.459 [main] DEBUG org.apache.camel.util.jsse.KeyManagersParameters - KeyManager[] [[sun.security.ssl.SunX509KeyManagerImpl@71652c98]], initialized from KeyManagerFactory [javax.net.ssl.KeyManagerFactory@5a12c728].
- 08:41:09.459 [main] TRACE org.apache.camel.util.jsse.TrustManagersParameters - Creating TrustManager[] from TrustManagersParameters [TrustManagerType [keyStore=KeyStoreParameters [type=null, password=********, provider=null, resource=file:/home/user/GIT/karaf-policy-platform/camel-idl/target/test-classes/jsse/server-truststore.jks, getContext()=null], provider=null, algorithm=null, getContext()=null]]
- 08:41:09.459 [main] DEBUG org.apache.camel.util.jsse.TrustManagersParameters - TrustManagerFactory [javax.net.ssl.TrustManagerFactory@51bde877] is using provider [{Signature.MD5andSHA1withRSA=sun.security.ssl.RSASignature, Alg.Alias.Signature.OID.1.2.840.113549.1.1.2=MD2withRSA, Alg.Alias.KeyManagerFactory.PKIX=NewSunX509, Provider.id name=SunJSSE, KeyManagerFactory.NewSunX509=sun.security.ssl.KeyManagerFactoryImpl$X509, Alg.Alias.Signature.OID.1.3.14.3.2.29=SHA1withRSA, Signature.MD2withRSA=sun.security.rsa.RSASignature$MD2withRSA, Alg.Alias.KeyPairGenerator.OID.1.2.840.113549.1.1=RSA, Provider.id version=1.8, KeyManagerFactory.SunX509=sun.security.ssl.KeyManagerFactoryImpl$SunX509, KeyFactory.RSA=sun.security.rsa.RSAKeyFactory, TrustManagerFactory.SunX509=sun.security.ssl.TrustManagerFactoryImpl$SimpleFactory, Alg.Alias.TrustManagerFactory.X.509=PKIX, SSLContext.TLSv1.2=sun.security.ssl.SSLContextImpl$TLS12Context, SSLContext.TLSv1.1=sun.security.ssl.SSLContextImpl$TLS11Context, Signature.MD5withRSA=sun.security.rsa.RSASignature$MD5withRSA, Alg.Alias.SSLContext.SSLv3=TLSv1, Alg.Alias.SSLContext.SSL=TLS, KeyStore.PKCS12=sun.security.pkcs12.PKCS12KeyStore, Alg.Alias.TrustManagerFactory.SunPKIX=PKIX, Alg.Alias.KeyFactory.OID.1.2.840.113549.1.1=RSA, SSLContext.Default=sun.security.ssl.SSLContextImpl$DefaultSSLContext, Alg.Alias.KeyPairGenerator.1.2.840.113549.1.1=RSA, Provider.id info=Sun JSSE provider(PKCS12, SunX509/PKIX key/trust factories, SSLv3/TLSv1/TLSv1.1/TLSv1.2), Signature.SHA1withRSA=sun.security.rsa.RSASignature$SHA1withRSA, TrustManagerFactory.PKIX=sun.security.ssl.TrustManagerFactoryImpl$PKIXFactory, SSLContext.TLS=sun.security.ssl.SSLContextImpl$TLSContext, SSLContext.TLSv1=sun.security.ssl.SSLContextImpl$TLS10Context, Alg.Alias.Signature.1.3.14.3.2.29=SHA1withRSA, Alg.Alias.Signature.1.2.840.113549.1.1.5=SHA1withRSA, Alg.Alias.TrustManagerFactory.X509=PKIX, Provider.id className=com.sun.net.ssl.internal.ssl.Provider, Alg.Alias.Signature.1.2.840.113549.1.1.4=MD5withRSA, Alg.Alias.KeyFactory.1.2.840.113549.1.1=RSA, Alg.Alias.Signature.1.2.840.113549.1.1.2=MD2withRSA, KeyPairGenerator.RSA=sun.security.rsa.RSAKeyPairGenerator, Alg.Alias.Signature.OID.1.2.840.113549.1.1.5=SHA1withRSA, Alg.Alias.Signature.OID.1.2.840.113549.1.1.4=MD5withRSA}] and algorithm [PKIX].
- 08:41:09.459 [main] TRACE org.apache.camel.util.jsse.KeyStoreParameters - Creating KeyStore instance from KeyStoreParameters [KeyStoreParameters [type=null, password=********, provider=null, resource=file:/home/user/GIT/karaf-policy-platform/camel-idl/target/test-classes/jsse/server-truststore.jks, getContext()=null]].
- ...DSAPublicKey|java.security.interfaces.DSAPrivateKey, MessageDigest.MD2=sun.security.provider.MD2}], has type [jks], and contains aliases [ca, subca].
- adding as trusted cert:
- Subject: CN=idl Root CA 2016, O=company, C=DE
- Issuer: CN=idl Root CA 2016, O=company, C=DE
- Algorithm: RSA; Serial number: 0xf101a133d0b67e79
- Valid from Tue Oct 25 11:49:47 CEST 2016 until Mon Oct 20 11:49:47 CEST 2036
- adding as trusted cert:
- Subject: CN=idl SubCA 2016, O=company, C=DE
- Issuer: CN=idl Root CA 2016, O=company, C=DE
- Algorithm: RSA; Serial number: 0x1
- Valid from Tue Oct 25 11:49:47 CEST 2016 until Wed Oct 23 11:49:47 CEST 2024
- 08:41:09.466 [main] DEBUG org.apache.camel.util.jsse.TrustManagersParameters - TrustManager[] [[sun.security.ssl.X509TrustManagerImpl@2fb68ec6]], initialized from TrustManagerFactory [javax.net.ssl.TrustManagerFactory@51bde877].
- 08:41:09.466 [main] DEBUG org.apache.camel.util.jsse.SSLContextParameters - SSLContext [javax.net.ssl.SSLContext@d71adc2], initialized from [SSLContextParameters [keyManagers=KeyManagersParameters [keyStore=KeyStoreParameters [type=null, password=********, provider=null, resource=file:/home/user/GIT/karaf-policy-platform/camel-idl/target/test-classes/jsse/server-keystore.jks, getContext()=null], keyPassword=********, provider=null, algorithm=null, getContext()=null], trustManagers=TrustManagerType [keyStore=KeyStoreParameters [type=null, password=********, provider=null, resource=file:/home/user/GIT/karaf-policy-platform/camel-idl/target/test-classes/jsse/server-truststore.jks, getContext()=null], provider=null, algorithm=null, getContext()=null], secureRandom=null, clientParameters=null, serverParameters=SSLContextServerParameters [clientAuthentication=REQUIRE, getCipherSuites()=null, getCipherSuitesFilter()=null, getSecureSocketProtocols()=null, getSecureSocketProtocolsFilter()=null, getSessionTimeout()=null, getContext()=null], provider=null, secureSocketProtocol=null, certAlias=null, getCipherSuites()=null, getCipherSuitesFilter()=null, getSecureSocketProtocols()=null, getSecureSocketProtocolsFilter()=null, getSessionTimeout()=null, getContext()=CamelContext(camel-1)]], is using provider [{Signature.MD5andSHA1withRSA=sun.security.ssl.RSASignature, Alg.Alias.Signature.OID.1.2.840.113549.1.1.2=MD2withRSA, Alg.Alias.KeyManagerFactory.PKIX=NewSunX509, Provider.id name=SunJSSE, KeyManagerFactory.NewSunX509=sun.security.ssl.KeyManagerFactoryImpl$X509, Alg.Alias.Signature.OID.1.3.14.3.2.29=SHA1withRSA, Signature.MD2withRSA=sun.security.rsa.RSASignature$MD2withRSA, Alg.Alias.KeyPairGenerator.OID.1.2.840.113549.1.1=RSA, Provider.id version=1.8, KeyManagerFactory.SunX509=sun.security.ssl.KeyManagerFactoryImpl$SunX509, KeyFactory.RSA=sun.security.rsa.RSAKeyFactory, TrustManagerFactory.SunX509=sun.security.ssl.TrustManagerFactoryImpl$SimpleFactory, Alg.Alias.TrustManagerFactory.X.509=PKIX, SSLContext.TLSv1.2=sun.security.ssl.SSLContextImpl$TLS12Context, SSLContext.TLSv1.1=sun.security.ssl.SSLContextImpl$TLS11Context, Signature.MD5withRSA=sun.security.rsa.RSASignature$MD5withRSA, Alg.Alias.SSLContext.SSLv3=TLSv1, Alg.Alias.SSLContext.SSL=TLS, KeyStore.PKCS12=sun.security.pkcs12.PKCS12KeyStore, Alg.Alias.TrustManagerFactory.SunPKIX=PKIX, Alg.Alias.KeyFactory.OID.1.2.840.113549.1.1=RSA, SSLContext.Default=sun.security.ssl.SSLContextImpl$DefaultSSLContext, Alg.Alias.KeyPairGenerator.1.2.840.113549.1.1=RSA, Provider.id info=Sun JSSE provider(PKCS12, SunX509/PKIX key/trust factories, SSLv3/TLSv1/TLSv1.1/TLSv1.2), Signature.SHA1withRSA=sun.security.rsa.RSASignature$SHA1withRSA, TrustManagerFactory.PKIX=sun.security.ssl.TrustManagerFactoryImpl$PKIXFactory, SSLContext.TLS=sun.security.ssl.SSLContextImpl$TLSContext, SSLContext.TLSv1=sun.security.ssl.SSLContextImpl$TLS10Context, Alg.Alias.Signature.1.3.14.3.2.29=SHA1withRSA, Alg.Alias.Signature.1.2.840.113549.1.1.5=SHA1withRSA, Alg.Alias.TrustManagerFactory.X509=PKIX, Provider.id className=com.sun.net.ssl.internal.ssl.Provider, Alg.Alias.Signature.1.2.840.113549.1.1.4=MD5withRSA, Alg.Alias.KeyFactory.1.2.840.113549.1.1=RSA, Alg.Alias.Signature.1.2.840.113549.1.1.2=MD2withRSA, KeyPairGenerator.RSA=sun.security.rsa.RSAKeyPairGenerator, Alg.Alias.Signature.OID.1.2.840.113549.1.1.5=SHA1withRSA, Alg.Alias.Signature.OID.1.2.840.113549.1.1.4=MD5withRSA}], protocol [TLS], key managers [sun.security.ssl.SunX509KeyManagerImpl@71652c98], trust managers [sun.security.ssl.X509TrustManagerImpl@2fb68ec6], and secure random [null].
- trigger seeding of SecureRandom
- done seeding SecureRandom
- 08:41:09.466 [main] TRACE org.apache.camel.util.jsse.SSLContextParameters - Configuring client and server side SSLContext parameters on SSLContext [javax.net.ssl.SSLContext@d71adc2]...
- 08:41:09.467 [main] TRACE org.apache.camel.util.jsse.BaseSSLContextParameters - Configuring client and server side SSLContext parameters on SSLContext [javax.net.ssl.SSLContext@d71adc2]...
- 08:41:09.467 [main] TRACE org.apache.camel.util.jsse.BaseSSLContextParameters - Configured client and server side SSLContext parameters on SSLContext [javax.net.ssl.SSLContext@d71adc2].
- 08:41:09.467 [main] TRACE org.apache.camel.util.jsse.SSLContextParameters - Overriding server-side SSLContext parameters on SSLContext [javax.net.ssl.SSLContext@d71adc2] with configured server parameters.
- 08:41:09.467 [main] TRACE org.apache.camel.util.jsse.SSLContextServerParameters - Configuring server-side SSLContext parameters on SSLContext [javax.net.ssl.SSLContext@d71adc2]...
- 08:41:09.469 [main] TRACE org.apache.camel.util.jsse.SSLContextServerParameters - Configured server-side SSLContext parameters on SSLContext [javax.net.ssl.SSLContext@d71adc2].
- 08:41:09.473 [main] TRACE org.apache.camel.util.jsse.SSLContextParameters - Configured client and server side SSLContext parameters on SSLContext [javax.net.ssl.SSLContext@d71adc2].
- 08:41:09.474 [main] TRACE org.apache.camel.util.jsse.SSLContextParameters - Collecting client and server side SSLEngine configurers on SSLContext [javax.net.ssl.SSLContext@d71adc2]...
- 08:41:09.474 [main] TRACE org.apache.camel.util.jsse.SSLContextParameters - Augmenting SSLEngine configurers with configurers from server parameters on SSLContext [javax.net.ssl.SSLContext@d71adc2].
- 08:41:09.477 [main] TRACE org.apache.camel.util.jsse.SSLContextParameters - Collected client and server side SSLEngine configurers on SSLContext [javax.net.ssl.SSLContext@d71adc2].
- 08:41:09.478 [main] TRACE org.apache.camel.util.jsse.SSLContextParameters - Collecting SSLSocketFactory configurers on SSLContext [javax.net.ssl.SSLContext@d71adc2]...
- 08:41:09.478 [main] TRACE org.apache.camel.util.jsse.SSLContextParameters - Collected SSLSocketFactory configurers on SSLContext [javax.net.ssl.SSLContext@d71adc2].
- 08:41:09.478 [main] TRACE org.apache.camel.util.jsse.SSLContextParameters - Collecting SSLServerSocketFactory configurers for SSLContext [javax.net.ssl.SSLContext@d71adc2]...
- 08:41:09.478 [main] TRACE org.apache.camel.util.jsse.SSLContextParameters - Augmenting SSLServerSocketFactory configurers with configurers from server parameters for SSLContext [javax.net.ssl.SSLContext@d71adc2].
- 08:41:09.478 [main] TRACE org.apache.camel.util.jsse.SSLContextParameters - Collected client and server side SSLServerSocketFactory configurers for SSLContext [javax.net.ssl.SSLContext@d71adc2].
- 08:41:09.478 [main] DEBUG org.apache.camel.util.jsse.BaseSSLContextParameters - SSLContextDecorator [SSLContext[hash=3add81c4, provider=SunJSSE version 1.8, protocol=TLS, needClientAuth=false, wantClientAuth=false
- defaultProtocols=TLSv1,TLSv1.1,TLSv1.2
- ...
- supportedChiperSuites=TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384,TLS_RSA_WITH_AES_256_CBC_SHA256,TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384,TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384,TLS_DHE_RSA_WITH_AES_256_CBC_SHA256,TLS_DHE_DSS_WITH_AES_256_CBC_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA,...
- ]] decorating SSLContext [javax.net.ssl.SSLContext@d71adc2].
- 08:41:09.504 [main] DEBUG org.eclipse.jetty.util.component.ContainerLifeCycle - HttpConnectionFactory@59221b97{HTTP/1.1} added {HttpConfiguration@6ac4944a{32768/8192,8192/8192,...
- 08:41:09.556 [main] DEBUG org.eclipse.jetty.util.component.AbstractLifeCycle - STARTED @4861ms WebSocketComponentSslContextFactory@6d2260db(null,null)
- Using SSLEngineImpl.
- 08:41:09.574 [main] DEBUG org.apache.camel.util.jsse.BaseSSLContextParameters - SSLEngine [7726e185[SSLEngine[hostname=null port=-1] SSL_NULL_WITH_NULL_NULL]] created from SSLContext [javax.net.ssl.SSLContext@d71adc2].
- 08:41:09.574 [main] DEBUG org.apache.camel.util.jsse.BaseSSLContextParameters - Configuring SSLEngine [7726e185[SSLEngine[hostname=null port=-1] SSL_NULL_WITH_NULL_NULL]] with
- explicitly set cipher suites [null],
- cipher suite patterns [null],
- available cipher suites [[TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384, TLS_RSA_WITH_AES_256_CBC_SHA256, TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384, ...
- 08:41:09.575 [main] DEBUG org.apache.camel.util.jsse.BaseSSLContextParameters - Configuring SSLEngine [7726e185[SSLEngine[hostname=null port=-1] SSL_NULL_WITH_NULL_NULL]] with
- explicitly set protocols [null],
- protocol patterns [null],
- available protocols [[SSLv2Hello, TLSv1, TLSv1.1, TLSv1.2]],
- currently enabled protocols [[SSLv2Hello, TLSv1, TLSv1.1, TLSv1.2]],
- and default protocol patterns [Patterns [includes=[.*], excludes=[SSL.*]]].
- Resulting enabled protocols are [[TLSv1, TLSv1.1, TLSv1.2]].
- 08:41:09.575 [main] TRACE org.apache.camel.util.jsse.SSLContextServerParameters - Configuring client-auth on SSLEngine [7726e185[SSLEngine[hostname=null port=-1] SSL_NULL_WITH_NULL_NULL]] to [REQUIRE].
- 08:41:09.579 [main] DEBUG org.eclipse.jetty.util.component.AbstractLifeCycle - STARTED @4885ms SslConnectionFactory@3b718392{SSL-HTTP/1.1}
- 08:41:09.579 [main] DEBUG org.eclipse.jetty.util.component.AbstractLifeCycle - starting HttpConnectionFactory@59221b97{HTTP/1.1}
- 08:41:09.580 [main] DEBUG org.eclipse.jetty.util.component.AbstractLifeCycle - STARTED @4885ms HttpConnectionFactory@59221b97{HTTP/1.1}
- 08:41:09.580 [main] DEBUG org.eclipse.jetty.util.component.AbstractLifeCycle - starting org.eclipse.jetty.server.ServerConnector$ServerConnectorManager@3fcdcf
- 08:41:09.580 [main] DEBUG org.eclipse.jetty.util.component.AbstractLifeCycle - starting org.eclipse.jetty.io.SelectorManager$ManagedSelector@1ad777f keys=-1 selected=-1
- 08:41:09.580 [main] DEBUG org.eclipse.jetty.util.component.AbstractLifeCycle - STARTED @4886ms org.eclipse.jetty.io.SelectorManager$ManagedSelector@1ad777f keys=0 selected=0
- 08:41:09.580 [main] DEBUG org.eclipse.jetty.util.component.AbstractLifeCycle - STARTED @4886ms org.eclipse.jetty.server.ServerConnector$ServerConnectorManager@3fcdcf
- 08:41:09.580 [main] DEBUG org.eclipse.jetty.util.component.ContainerLifeCycle - ServerConnector@49bf29c6{SSL-HTTP/1.1}{localhost:9292} added {acceptor-0@5bbbdd4b,POJO}
- 08:41:09.580 [main] INFO org.eclipse.jetty.server.ServerConnector - Started ServerConnector@49bf29c6{SSL-HTTP/1.1}{localhost:9292}
- 08:41:09.580 [main] DEBUG org.eclipse.jetty.util.component.AbstractLifeCycle - STARTED @4886ms ServerConnector@49bf29c6{SSL-HTTP/1.1}{localhost:9292}
- 08:41:09.581 [main] INFO org.eclipse.jetty.server.Server - Started @4886ms
- 08:41:09.581 [main] DEBUG org.eclipse.jetty.util.component.AbstractLifeCycle - STARTED @4886ms org.eclipse.jetty.server.Server@79c4715d
- 08:41:09.587 [CamelJettyWebSocketServer-31-selector-ServerConnectorManager@3fcdcf/0] DEBUG org.eclipse.jetty.io.SelectorManager - Starting Thread[CamelJettyWebSocketServer-31-selector-ServerConnectorManager@3fcdcf/0,5,main] on org.eclipse.jetty.io.SelectorManager$ManagedSelector@1ad777f keys=0 selected=0
- 08:41:09.588 [CamelJettyWebSocketServer-31-selector-ServerConnectorManager@3fcdcf/0] DEBUG org.eclipse.jetty.io.SelectorManager - Selector loop waiting on select
- 08:41:09.615 [main] DEBUG org.eclipse.jetty.util.component.ContainerLifeCycle - org.eclipse.jetty.servlet.ServletHandler@46292372 added {de.fhg.camel.idl.server.WebsocketComponentServlet-315ba14a@4d1502d==de.fhg.camel.idl.server.WebsocketComponentServlet,-1,true,UNMANAGED}
- 08:41:09.615 [main] DEBUG org.eclipse.jetty.util.component.ContainerLifeCycle - org.eclipse.jetty.servlet.ServletHandler@46292372 added {[/echo]=>de.fhg.camel.idl.server.WebsocketComponentServlet-315ba14a,POJO}
- 08:41:09.615 [main] DEBUG org.eclipse.jetty.servlet.ServletHandler - Chose path=/echo mapped to servlet=de.fhg.camel.idl.server.WebsocketComponentServlet-315ba14a from default=false
- 08:41:09.616 [main] DEBUG org.eclipse.jetty.servlet.ServletHandler - Chose path=/ mapped to servlet=org.eclipse.jetty.servlet.ServletHandler$Default404Servlet-5c371e13 from default=true
- 08:41:09.616 [main] DEBUG org.eclipse.jetty.servlet.ServletHandler - filterNameMap={}
- 08:41:09.616 [main] DEBUG org.eclipse.jetty.servlet.ServletHandler - pathFilters=null
- 08:41:09.616 [main] DEBUG org.eclipse.jetty.servlet.ServletHandler - servletFilterMap=null
- 08:41:09.617 [main] DEBUG org.eclipse.jetty.servlet.ServletHandler - servletPathMap={/echo=de.fhg.camel.idl.server.WebsocketComponentServlet-315ba14a@4d1502d==de.fhg.camel.idl.server.WebsocketComponentServlet,-1,true, /=org.eclipse.jetty.servlet.ServletHandler$Default404Servlet-5c371e13@adf5f9bc==org.eclipse.jetty.servlet.ServletHandler$Default404Servlet,-1,false}
- 08:41:09.618 [main] DEBUG org.eclipse.jetty.servlet.ServletHandler - servletNameMap={org.eclipse.jetty.servlet.ServletHandler$Default404Servlet-5c371e13=org.eclipse.jetty.servlet.ServletHandler$Default404Servlet-5c371e13@adf5f9bc==org.eclipse.jetty.servlet.ServletHandler$Default404Servlet,-1,false, de.fhg.camel.idl.server.WebsocketComponentServlet-315ba14a=de.fhg.camel.idl.server.WebsocketComponentServlet-315ba14a@4d1502d==de.fhg.camel.idl.server.WebsocketComponentServlet,-1,true}
- 08:41:09.618 [main] DEBUG org.eclipse.jetty.util.component.AbstractLifeCycle - starting de.fhg.camel.idl.server.WebsocketComponentServlet-315ba14a@4d1502d==de.fhg.camel.idl.server.WebsocketComponentServlet,-1,true
- 08:41:09.618 [main] DEBUG org.eclipse.jetty.util.component.AbstractLifeCycle - STARTED @4924ms de.fhg.camel.idl.server.WebsocketComponentServlet-315ba14a@4d1502d==de.fhg.camel.idl.server.WebsocketComponentServlet,-1,true
- 08:41:09.620 [main] DEBUG org.eclipse.jetty.servlet.ServletHolder - Servlet.init de.fhg.camel.idl.server.WebsocketComponentServlet@450794b4 for de.fhg.camel.idl.server.WebsocketComponentServlet-315ba14a
- 08:41:09.683 [main] DEBUG org.eclipse.jetty.util.component.ContainerLifeCycle - org.eclipse.jetty.websocket.server.WebSocketServerFactory@6594402a added {org.eclipse.jetty.util.thread.ScheduledExecutorScheduler@2392212b,AUTO}
- 08:41:09.683 [main] DEBUG org.eclipse.jetty.util.component.ContainerLifeCycle - org.eclipse.jetty.websocket.server.WebSocketServerFactory@6594402a added {org.eclipse.jetty.io.MappedByteBufferPool@30f4b1a6,POJO}
- ...
- Finalizer, called closeSocket(true)
- 08:41:09.804 [main] DEBUG org.eclipse.jetty.util.component.ContainerLifeCycle - org.eclipse.jetty.websocket.server.WebSocketServerFactory@110844f6 added {org.eclipse.jetty.util.thread.ScheduledExecutorScheduler@64040287,AUTO}
- 08:41:09.804 [main] DEBUG org.eclipse.jetty.util.component.ContainerLifeCycle - org.eclipse.jetty.websocket.server.WebSocketServerFactory@110844f6 added {org.eclipse.jetty.io.MappedByteBufferPool@30f4b1a6,POJO}
- 08:41:09.810 [main] DEBUG org.eclipse.jetty.util.component.AbstractLifeCycle - starting org.eclipse.jetty.websocket.server.WebSocketServerFactory@110844f6
- 08:41:09.810 [main] DEBUG org.eclipse.jetty.util.component.AbstractLifeCycle - starting org.eclipse.jetty.util.thread.ScheduledExecutorScheduler@64040287
- 08:41:09.810 [main] DEBUG org.eclipse.jetty.util.component.AbstractLifeCycle - STARTED @5116ms org.eclipse.jetty.util.thread.ScheduledExecutorScheduler@64040287
- 08:41:09.811 [main] DEBUG org.eclipse.jetty.util.component.AbstractLifeCycle - STARTED @5116ms org.eclipse.jetty.websocket.server.WebSocketServerFactory@110844f6
- 08:41:09.811 [main] DEBUG de.fhg.camel.idl.server.WebsocketComponent - WebSocket servlet added for the following path : /echo, to the Jetty Server : idlserver:localhost:9292
- 08:41:09.811 [main] DEBUG de.fhg.camel.idl.server.WebsocketComponentServlet - Connecting consumer: Consumer[idlserver://localhost:9292/echo]
- 08:41:09.812 [main] INFO org.apache.camel.impl.DefaultCamelContext - Route: route1 started and consuming from: Endpoint[idlserver://localhost:9292/echo]
- 08:41:09.812 [main] TRACE org.apache.camel.support.ServiceSupport - Starting service
- 08:41:09.812 [main] TRACE org.apache.camel.util.EventHelper - Notifier: org.apache.camel.impl.DefaultRuntimeEndpointRegistry@10567255 is not enabled for the event: Started route: route1
- 08:41:09.812 [main] INFO org.apache.camel.impl.DefaultCamelContext - Total 2 routes, of which 2 is started.
- 08:41:09.814 [main] INFO org.apache.camel.impl.DefaultCamelContext - Apache Camel 2.16.3 (CamelContext: camel-1) started in 1.645 seconds
- 08:41:09.814 [main] TRACE org.apache.camel.util.EventHelper - Notifier: org.apache.camel.impl.DefaultRuntimeEndpointRegistry@10567255 is not enabled for the event: Started CamelContext: camel-1
- 08:41:09.815 [main] DEBUG de.fhg.camel.idl.both.WssProducerConsumerTest - Routing Rules are: [EventDrivenConsumerRoute[Endpoint[direct://input] -> Pipeline[[Channel[Log(foo)[>>> Message from direct to WebSocket Client : ${body}]], Channel[sendTo(Endpoint[idlclient://localhost:9292/echo])], Channel[Log(foo)[>>> Message from WebSocket Client to server: ${body}]]]]], EventDrivenConsumerRoute[Endpoint[idlserver://localhost:9292/echo] -> Pipeline[[Channel[Log(route1)[>>> Message from WebSocket Server to mock: ${body}]], Channel[sendTo(Endpoint[mock://result])]]]]]
- 08:41:10.177 [main] TRACE org.apache.camel.impl.DefaultCamelContext - Getting endpoint with uri: mock:result
- 08:41:10.178 [main] TRACE org.apache.camel.impl.DefaultCamelContext - Getting endpoint with raw uri: mock:result, normalized uri: mock://result
- 08:41:10.181 [main] TRACE org.apache.camel.impl.DefaultCamelContext - Getting endpoint with uri: direct:input
- 08:41:10.182 [main] TRACE org.apache.camel.impl.DefaultCamelContext - Getting endpoint with raw uri: direct:input, normalized uri: direct://input
- 08:41:10.183 [main] TRACE org.apache.camel.impl.SharedProducerServicePool - No free services in pool to acquire for key: Endpoint[direct://input]
- 08:41:10.185 [main] TRACE org.apache.camel.support.ServiceSupport - Starting service
- 08:41:10.185 [main] DEBUG org.apache.camel.component.direct.DirectProducer - Starting producer: Producer[direct://input]
- 08:41:10.185 [main] DEBUG org.apache.camel.impl.ProducerCache - Adding to producer cache with key: Endpoint[direct://input] for producer: Producer[direct://input]
- 08:41:10.197 [main] DEBUG org.apache.camel.impl.ProducerCache - >>>> Endpoint[direct://input] Exchange[][Message: Hello World!]
- 08:41:10.216 [main] TRACE org.apache.camel.impl.DefaultUnitOfWork - UnitOfWork created for ExchangeId: ID-ubuntu-dev-39703-1478504467513-0-1 with Exchange[ID-ubuntu-dev-39703-1478504467513-0-1][Message: Hello World!]
- 08:41:10.236 [main] TRACE org.apache.camel.processor.CamelInternalProcessor - Processing exchange for exchangeId: ID-ubuntu-dev-39703-1478504467513-0-1 -> Exchange[ID-ubuntu-dev-39703-1478504467513-0-1][Message: Hello World!]
- 08:41:10.254 [main] TRACE org.apache.camel.impl.DefaultUnitOfWork - UnitOfWork beforeRoute: foo for ExchangeId: ID-ubuntu-dev-39703-1478504467513-0-1 with Exchange[ID-ubuntu-dev-39703-1478504467513-0-1][Message: Hello World!]
- 08:41:10.280 [main] TRACE org.apache.camel.processor.CamelInternalProcessor - Processing exchange for exchangeId: ID-ubuntu-dev-39703-1478504467513-0-1 -> Exchange[ID-ubuntu-dev-39703-1478504467513-0-1][Message: Hello World!]
- 08:41:10.281 [main] TRACE org.apache.camel.processor.Pipeline - ExchangeId: ID-ubuntu-dev-39703-1478504467513-0-1 should continue routing: true
- 08:41:10.282 [main] TRACE org.apache.camel.processor.Pipeline - Processing exchangeId: ID-ubuntu-dev-39703-1478504467513-0-1 >>> Exchange[ID-ubuntu-dev-39703-1478504467513-0-1][Message: Hello World!]
- 08:41:10.288 [main] TRACE org.apache.camel.processor.CamelInternalProcessor - Processing exchange for exchangeId: ID-ubuntu-dev-39703-1478504467513-0-1 -> Exchange[ID-ubuntu-dev-39703-1478504467513-0-1][Message: Hello World!]
- 08:41:10.294 [main] TRACE org.apache.camel.processor.DefaultErrorHandler - isRunAllowed() -> true (Run allowed if we are not stopped/stopping)
- 08:41:10.306 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Converting java.lang.String -> java.lang.String with value: >>> Message from direct to WebSocket Client :
- 08:41:10.307 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Converting java.lang.String -> java.lang.String with value: Hello World!
- 08:41:10.313 [main] TRACE org.apache.camel.impl.converter.DefaultTypeConverter - Converting java.lang.String -> java.lang.String with value: >>> Message from direct to WebSocket Client : Hello World!
- 08:41:10.314 [main] INFO foo - >>> Message from direct to WebSocket Client : Hello World!
- 08:41:10.316 [main] TRACE org.apache.camel.processor.DefaultErrorHandler - Is exchangeId: ID-ubuntu-dev-39703-1478504467513-0-1 interrupted? false
- 08:41:10.317 [main] TRACE org.apache.camel.processor.DefaultErrorHandler - Is exchangeId: ID-ubuntu-dev-39703-1478504467513-0-1 done? true
- 08:41:10.317 [main] TRACE org.apache.camel.processor.CamelInternalProcessor - Exchange processed and is continued routed synchronously for exchangeId: ID-ubuntu-dev-39703-1478504467513-0-1 -> Exchange[ID-ubuntu-dev-39703-1478504467513-0-1][Message: Hello World!]
- 08:41:10.323 [main] TRACE org.apache.camel.processor.Pipeline - Processing exchangeId: ID-ubuntu-dev-39703-1478504467513-0-1 is continued being processed synchronously
- 08:41:10.326 [main] TRACE org.apache.camel.processor.Pipeline - ExchangeId: ID-ubuntu-dev-39703-1478504467513-0-1 should continue routing: true
- 08:41:10.334 [main] TRACE org.apache.camel.processor.Pipeline - Processing exchangeId: ID-ubuntu-dev-39703-1478504467513-0-1 >>> Exchange[ID-ubuntu-dev-39703-1478504467513-0-1][Message: Hello World!]
- 08:41:10.335 [main] TRACE org.apache.camel.processor.CamelInternalProcessor - Processing exchange for exchangeId: ID-ubuntu-dev-39703-1478504467513-0-1 -> Exchange[ID-ubuntu-dev-39703-1478504467513-0-1][Message: Hello World!]
- 08:41:10.341 [main] TRACE org.apache.camel.processor.DefaultErrorHandler - isRunAllowed() -> true (Run allowed if we are not stopped/stopping)
- 08:41:10.342 [main] DEBUG org.apache.camel.processor.SendProcessor - >>>> Endpoint[idlclient://localhost:9292/echo] Exchange[ID-ubuntu-dev-39703-1478504467513-0-1][Message: Hello World!]
- 08:41:10.343 [main] DEBUG de.fhg.camel.idl.client.WsProducer - Sending out Hello World!
- 08:41:10.343 [main] INFO de.fhg.camel.idl.client.WsEndpoint - Reconnecting websocket: wss://localhost:9292/echo
- 08:41:10.343 [main] DEBUG de.fhg.camel.idl.client.WsEndpoint - Connecting to wss://localhost:9292/echo
- trigger seeding of SecureRandom
- done seeding SecureRandom
- keyStore is :
- keyStore type is : jks
- keyStore provider is :
- init keystore
- init keymanager of type SunX509
- trustStore is: /home/user/GIT/karaf-policy-platform/camel-idl/target/test-classes/jsse/client-truststore.jks
- trustStore type is : jks
- trustStore provider is :
- init truststore
- adding as trusted cert:
- Subject: CN=idl Root CA 2016, O=company, C=DE
- Issuer: CN=idl Root CA 2016, O=company, C=DE
- Algorithm: RSA; Serial number: 0xf101a133d0b67e79
- Valid from Tue Oct 25 11:49:47 CEST 2016 until Mon Oct 20 11:49:47 CEST 2036
- adding as trusted cert:
- Subject: CN=idl SubCA 2016, O=company, C=DE
- Issuer: CN=idl Root CA 2016, O=company, C=DE
- Algorithm: RSA; Serial number: 0x1
- Valid from Tue Oct 25 11:49:47 CEST 2016 until Wed Oct 23 11:49:47 CEST 2024
- trigger seeding of SecureRandom
- done seeding SecureRandom
- Using SSLEngineImpl.
- 08:41:10.718 [CamelJettyWebSocketServer-33-acceptor-0@5bbbdd4b-ServerConnector@49bf29c6{SSL-HTTP/1.1}{localhost:9292}] DEBUG org.eclipse.jetty.io.SelectorManager - Queued change org.eclipse.jetty.io.SelectorManager$ManagedSelector$Accept@42a77092
- 08:41:10.719 [CamelJettyWebSocketServer-31-selector-ServerConnectorManager@3fcdcf/0] DEBUG org.eclipse.jetty.io.SelectorManager - Selector loop woken up from select, 0/0 selected
- 08:41:10.719 [CamelJettyWebSocketServer-31-selector-ServerConnectorManager@3fcdcf/0] DEBUG org.eclipse.jetty.io.SelectorManager - Running change org.eclipse.jetty.io.SelectorManager$ManagedSelector$Accept@42a77092
- 08:41:10.751 [CamelJettyWebSocketServer-31-selector-ServerConnectorManager@3fcdcf/0] DEBUG org.eclipse.jetty.io.AbstractEndPoint - onOpen SelectChannelEndPoint@37823e21{/127.0.0.1:37052<->9292,Open,in,out,-,-,24/30000,null}{io=0,kio=0,kro=0}
- 08:41:10.755 [CamelJettyWebSocketServer-31-selector-ServerConnectorManager@3fcdcf/0] DEBUG org.eclipse.jetty.io.IdleTimeout - SelectChannelEndPoint@37823e21{/127.0.0.1:37052<->9292,Open,in,out,-,-,25/30000,null}{io=0,kio=0,kro=0} idle timeout check, elapsed: 24 ms, remaining: 29976 ms
- Using SSLEngineImpl.
- 08:41:10.758 [CamelJettyWebSocketServer-31-selector-ServerConnectorManager@3fcdcf/0] DEBUG org.apache.camel.util.jsse.BaseSSLContextParameters - SSLEngine [719e7[SSLEngine[hostname=127.0.0.1 port=37052] SSL_NULL_WITH_NULL_NULL]] created from SSLContext [javax.net.ssl.SSLContext@d71adc2].
- 08:41:10.765 [CamelJettyWebSocketServer-31-selector-ServerConnectorManager@3fcdcf/0] DEBUG org.apache.camel.util.jsse.BaseSSLContextParameters - Configuring SSLEngine [719e7[SSLEngine[hostname=127.0.0.1 port=37052] SSL_NULL_WITH_NULL_NULL]] with
- explicitly set cipher suites [null],
- cipher suite patterns [null],
- available cipher suites [[TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384, TLS_RSA_WITH_AES_256_CBC_SHA256, TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384, ...
- 08:41:10.766 [CamelJettyWebSocketServer-31-selector-ServerConnectorManager@3fcdcf/0] DEBUG org.apache.camel.util.jsse.BaseSSLContextParameters - Configuring SSLEngine [719e7[SSLEngine[hostname=127.0.0.1 port=37052] SSL_NULL_WITH_NULL_NULL]] with
- explicitly set protocols [null],
- protocol patterns [null],
- available protocols [[SSLv2Hello, TLSv1, TLSv1.1, TLSv1.2]],
- currently enabled protocols [[SSLv2Hello, TLSv1, TLSv1.1, TLSv1.2]],
- and default protocol patterns [Patterns [includes=[.*], excludes=[SSL.*]]].
- Resulting enabled protocols are [[TLSv1, TLSv1.1, TLSv1.2]].
- 08:41:10.767 [CamelJettyWebSocketServer-31-selector-ServerConnectorManager@3fcdcf/0] TRACE org.apache.camel.util.jsse.SSLContextServerParameters - Configuring client-auth on SSLEngine [719e7[SSLEngine[hostname=127.0.0.1 port=37052] SSL_NULL_WITH_NULL_NULL]] to [REQUIRE].
- Allow unsafe renegotiation: false
- Allow legacy hello messages: true
- Is initial handshake: true
- Is secure renegotiation: false
- Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1
- Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLSv1
- Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 for TLSv1
- Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1
- Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 for TLSv1
- Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1
- Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1
- Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1.1
- Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLSv1.1
- Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1
- Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1.1
- Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 for TLSv1.1
- Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1
- Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1.1
- %% No cached client session
- *** ClientHello, TLSv1.2
- RandomCookie: GMT: 1478504470 bytes = { 118, 102, 115, 108, 204, 31, 229, 18, 41, 169, 176, 19, 119, 133, 81, 128, 58, 47, 96, 4, 255, 130, 185, 18, 85, 157, 56, 41 }
- Session ID: {}
- Cipher Suites: [TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384, TLS_RSA_WITH_AES_256_CBC_SHA256, TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384, ...
- Compression Methods: { 0 }
- Extension elliptic_curves, curve names: {secp256r1, sect163k1, sect163r2, secp192r1, secp224r1, sect233k1, sect233r1, sect283k1, sect283r1, secp384r1, sect409k1, sect409r1, secp521r1, sect571k1, sect571r1, secp160k1, secp160r1, secp160r2, sect163r1, secp192k1, sect193r1, sect193r2, secp224k1, sect239k1, secp256k1}
- Extension ec_point_formats, formats: [uncompressed]
- Extension signature_algorithms, signature_algorithms: SHA512withECDSA, SHA512withRSA, SHA384withECDSA, SHA384withRSA, SHA256withECDSA, SHA256withRSA, SHA256withDSA, SHA224withECDSA, SHA224withRSA, SHA224withDSA, SHA1withECDSA, SHA1withRSA, SHA1withDSA
- ***
- [write] MD5 and SHA1 hashes: len = 239
- 0000: 01 00 00 EB 03 03 58 20 30 16 76 66 73 6C CC 1F ......X 0.vfsl..
- 0010: E5 12 29 A9 B0 13 77 85 51 80 3A 2F 60 04 FF 82 ..)...w.Q.:/`...
- 0020: B9 12 55 9D 38 29 00 00 64 C0 24 C0 28 00 3D C0 ..U.8)..d.$.(.=.
- 0030: 26 C0 2A 00 6B 00 6A C0 0A C0 14 00 35 C0 05 C0 &.*.k.j.....5...
- 0040: 0F 00 39 00 38 C0 23 C0 27 00 3C C0 25 C0 29 00 ..9.8.#.'.<.%.).
- 0050: 67 00 40 C0 09 C0 13 00 2F C0 04 C0 0E 00 33 00 g.@...../.....3.
- 0060: 32 C0 2C C0 2B C0 30 00 9D C0 2E C0 32 00 9F 00 2.,.+.0.....2...
- 0070: A3 C0 2F 00 9C C0 2D C0 31 00 9E 00 A2 C0 08 C0 ../...-.1.......
- 0080: 12 00 0A C0 03 C0 0D 00 16 00 13 00 FF 01 00 00 ................
- 0090: 5E 00 0A 00 34 00 32 00 17 00 01 00 03 00 13 00 ^...4.2.........
- 00A0: 15 00 06 00 07 00 09 00 0A 00 18 00 0B 00 0C 00 ................
- 00B0: 19 00 0D 00 0E 00 0F 00 10 00 11 00 02 00 12 00 ................
- 00C0: 04 00 05 00 14 00 08 00 16 00 0B 00 02 01 00 00 ................
- 00D0: 0D 00 1C 00 1A 06 03 06 01 05 03 05 01 04 03 04 ................
- 00E0: 01 04 02 03 03 03 01 03 02 02 03 02 01 02 02 ...............
- New I/O worker #1, WRITE: TLSv1.2 Handshake, length = 239
- [Raw write]: length = 244
- 0000: 16 03 03 00 EF 01 00 00 EB 03 03 58 20 30 16 76 ...........X 0.v
- 0010: 66 73 6C CC 1F E5 12 29 A9 B0 13 77 85 51 80 3A fsl....)...w.Q.:
- 0020: 2F 60 04 FF 82 B9 12 55 9D 38 29 00 00 64 C0 24 /`.....U.8)..d.$
- 0030: C0 28 00 3D C0 26 C0 2A 00 6B 00 6A C0 0A C0 14 .(.=.&.*.k.j....
- 0040: 00 35 C0 05 C0 0F 00 39 00 38 C0 23 C0 27 00 3C .5.....9.8.#.'.<
- 0050: C0 25 C0 29 00 67 00 40 C0 09 C0 13 00 2F C0 04 .%.).g.@...../..
- 0060: C0 0E 00 33 00 32 C0 2C C0 2B C0 30 00 9D C0 2E ...3.2.,.+.0....
- 0070: C0 32 00 9F 00 A3 C0 2F 00 9C C0 2D C0 31 00 9E .2...../...-.1..
- 0080: 00 A2 C0 08 C0 12 00 0A C0 03 C0 0D 00 16 00 13 ................
- 0090: 00 FF 01 00 00 5E 00 0A 00 34 00 32 00 17 00 01 .....^...4.2....
- 00A0: 00 03 00 13 00 15 00 06 00 07 00 09 00 0A 00 18 ................
- 00B0: 00 0B 00 0C 00 19 00 0D 00 0E 00 0F 00 10 00 11 ................
- 00C0: 00 02 00 12 00 04 00 05 00 14 00 08 00 16 00 0B ................
- 00D0: 00 02 01 00 00 0D 00 1C 00 1A 06 03 06 01 05 03 ................
- 00E0: 05 01 04 03 04 01 04 02 03 03 03 01 03 02 02 03 ................
- 00F0: 02 01 02 02 ....
- 08:41:10.809 [CamelJettyWebSocketServer-31-selector-ServerConnectorManager@3fcdcf/0] DEBUG org.eclipse.jetty.io.IdleTimeout - DecryptedEndPoint@4f49498{/127.0.0.1:37052<->9292,Open,in,out,-,-,2/30000,null}->SelectChannelEndPoint@37823e21{/127.0.0.1:37052<->9292,Open,in,out,-,-,81/30000,null}{io=0,kio=0,kro=0} idle timeout check, elapsed: 1 ms, remaining: 29999 ms
- 08:41:11.000 [CamelJettyWebSocketServer-31-selector-ServerConnectorManager@3fcdcf/0] DEBUG org.eclipse.jetty.server.HttpChannel - new HttpChannelOverHttp@40d049f5{r=0,c=false,a=IDLE,uri=} -> DecryptedEndPoint@4f49498{/127.0.0.1:37052<->9292,Open,in,out,-,-,195/30000,null}->SelectChannelEndPoint@37823e21{/127.0.0.1:37052<->9292,Open,in,out,-,-,273/30000,null}{io=0,kio=0,kro=0},null,HttpChannelState@772152e{s=IDLE i=true a=null}
- 08:41:11.038 [CamelJettyWebSocketServer-31-selector-ServerConnectorManager@3fcdcf/0] DEBUG org.eclipse.jetty.server.HttpConnection - New HTTP Connection HttpConnection@80ef4f3[IDLE,DecryptedEndPoint@4f49498{/127.0.0.1:37052<->9292,Open,in,out,-,-,225/30000,null}->SelectChannelEndPoint@37823e21{/127.0.0.1:37052<->9292,Open,in,out,-,-,308/30000,null}{io=0,kio=0,kro=0}][p=HttpParser{s=START,0 of 0},g=HttpGenerator{s=START},c=HttpChannelOverHttp@40d049f5{r=0,c=false,a=IDLE,uri=}]
- Allow unsafe renegotiation: false
- Allow legacy hello messages: true
- Is initial handshake: true
- Is secure renegotiation: false
- Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1
- Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLSv1
- Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 for TLSv1
- Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1
- Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 for TLSv1
- Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1
- Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1
- Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1.1
- Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLSv1.1
- Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1
- Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1.1
- Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 for TLSv1.1
- Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1
- Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1.1
- 08:41:11.048 [CamelJettyWebSocketServer-31-selector-ServerConnectorManager@3fcdcf/0] DEBUG org.eclipse.jetty.io.AbstractConnection - onOpen SslConnection@3c4546fe{NEED_UNWRAP,eio=-1/-1,di=-1} -> HttpConnection@80ef4f3[IDLE,DecryptedEndPoint@4f49498{/127.0.0.1:37052<->9292,Open,in,out,-,-,241/30000,HttpConnection}->SelectChannelEndPoint@37823e21{/127.0.0.1:37052<->9292,Open,in,out,-,-,319/30000,SslConnection}{io=0,kio=0,kro=0}][p=HttpParser{s=START,0 of 0},g=HttpGenerator{s=START},c=HttpChannelOverHttp@40d049f5{r=0,c=false,a=IDLE,uri=}]
- 08:41:11.056 [CamelJettyWebSocketServer-31-selector-ServerConnectorManager@3fcdcf/0] DEBUG org.eclipse.jetty.io.AbstractConnection - onOpen HttpConnection@80ef4f3[IDLE,DecryptedEndPoint@4f49498{/127.0.0.1:37052<->9292,Open,in,out,-,-,250/30000,HttpConnection}->SelectChannelEndPoint@37823e21{/127.0.0.1:37052<->9292,Open,in,out,-,-,328/30000,SslConnection}{io=0,kio=0,kro=0}][p=HttpParser{s=START,0 of 0},g=HttpGenerator{s=START},c=HttpChannelOverHttp@40d049f5{r=0,c=false,a=IDLE,uri=}]...
- 08:41:11.081 [CamelJettyWebSocketServer-35] DEBUG org.eclipse.jetty.io.ssl.SslConnection - SslConnection@3c4546fe{NEED_UNWRAP,eio=244/-1,di=-1} -> HttpConnection@80ef4f3[FILLING,DecryptedEndPoint@4f49498{/127.0.0.1:37052<->9292,Open,in,out,-,-,21/30000,HttpConnection}->SelectChannelEndPoint@37823e21{/127.0.0.1:37052<->9292,Open,in,out,-,-,1/30000,SslConnection}{io=0,kio=0,kro=1}][p=HttpParser{s=START,0 of 0},g=HttpGenerator{s=START},c=HttpChannelOverHttp@40d049f5{r=0,c=false,a=IDLE,uri=}] filled 244 encrypted bytes
- [Raw read]: length = 5
- 0000: 16 03 03 00 EF .....
- [Raw read]: length = 239
- 0000: 01 00 00 EB 03 03 58 20 30 16 76 66 73 6C CC 1F ......X 0.vfsl..
- 0010: E5 12 29 A9 B0 13 77 85 51 80 3A 2F 60 04 FF 82 ..)...w.Q.:/`...
- 0020: B9 12 55 9D 38 29 00 00 64 C0 24 C0 28 00 3D C0 ..U.8)..d.$.(.=.
- 0030: 26 C0 2A 00 6B 00 6A C0 0A C0 14 00 35 C0 05 C0 &.*.k.j.....5...
- 0040: 0F 00 39 00 38 C0 23 C0 27 00 3C C0 25 C0 29 00 ..9.8.#.'.<.%.).
- 0050: 67 00 40 C0 09 C0 13 00 2F C0 04 C0 0E 00 33 00 g.@...../.....3.
- 0060: 32 C0 2C C0 2B C0 30 00 9D C0 2E C0 32 00 9F 00 2.,.+.0.....2...
- 0070: A3 C0 2F 00 9C C0 2D C0 31 00 9E 00 A2 C0 08 C0 ../...-.1.......
- 0080: 12 00 0A C0 03 C0 0D 00 16 00 13 00 FF 01 00 00 ................
- 0090: 5E 00 0A 00 34 00 32 00 17 00 01 00 03 00 13 00 ^...4.2.........
- 00A0: 15 00 06 00 07 00 09 00 0A 00 18 00 0B 00 0C 00 ................
- 00B0: 19 00 0D 00 0E 00 0F 00 10 00 11 00 02 00 12 00 ................
- 00C0: 04 00 05 00 14 00 08 00 16 00 0B 00 02 01 00 00 ................
- 00D0: 0D 00 1C 00 1A 06 03 06 01 05 03 05 01 04 03 04 ................
- 00E0: 01 04 02 03 03 03 01 03 02 02 03 02 01 02 02 ...............
- CamelJettyWebSocketServer-35, READ: TLSv1.2 Handshake, length = 239
- 08:41:11.084 [CamelJettyWebSocketServer-35] DEBUG org.eclipse.jetty.io.ssl.SslConnection - SslConnection@3c4546fe{NEED_TASK,eio=0/-1,di=-1} -> HttpConnection@80ef4f3[FILLING,DecryptedEndPoint@4f49498{/127.0.0.1:37052<->9292,Open,in,out,-,-,24/30000,HttpConnection}->SelectChannelEndPoint@37823e21{/127.0.0.1:37052<->9292,Open,in,out,-,-,3/30000,SslConnection}{io=0,kio=0,kro=1}][p=HttpParser{s=START,0 of 0},g=HttpGenerator{s=START},c=HttpChannelOverHttp@40d049f5{r=0,c=false,a=IDLE,uri=}] unwrap Status = OK HandshakeStatus = NEED_TASK
- bytesConsumed = 244 bytesProduced = 0
- *** ClientHello, TLSv1.2
- RandomCookie: GMT: 1478504470 bytes = { 118, 102, 115, 108, 204, 31, 229, 18, 41, 169, 176, 19, 119, 133, 81, 128, 58, 47, 96, 4, 255, 130, 185, 18, 85, 157, 56, 41 }
- Session ID: {}
- Cipher Suites: [TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384, TLS_RSA_WITH_AES_256_CBC_SHA256, TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384, TLS_DHE_RSA_WITH_AES_256_CBC_SHA256, TLS_DHE_DSS_WITH_AES_256_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDH_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_DSS_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256, TLS_RSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_DSS_WITH_AES_128_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, TLS_RSA_WITH_AES_256_GCM_SHA384, TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, TLS_DHE_DSS_WITH_AES_256_GCM_SHA384, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_DSS_WITH_AES_128_GCM_SHA256, TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA, TLS_EMPTY_RENEGOTIATION_INFO_SCSV]
- Compression Methods: { 0 }
- Extension elliptic_curves, curve names: {secp256r1, sect163k1, sect163r2, secp192r1, secp224r1, sect233k1, sect233r1, sect283k1, sect283r1, secp384r1, sect409k1, sect409r1, secp521r1, sect571k1, sect571r1, secp160k1, secp160r1, secp160r2, sect163r1, secp192k1, sect193r1, sect193r2, secp224k1, sect239k1, secp256k1}
- Extension ec_point_formats, formats: [uncompressed]
- Extension signature_algorithms, signature_algorithms: SHA512withECDSA, SHA512withRSA, SHA384withECDSA, SHA384withRSA, SHA256withECDSA, SHA256withRSA, SHA256withDSA, SHA224withECDSA, SHA224withRSA, SHA224withDSA, SHA1withECDSA, SHA1withRSA, SHA1withDSA
- ***
- [read] MD5 and SHA1 hashes: len = 239
- 0000: 01 00 00 EB 03 03 58 20 30 16 76 66 73 6C CC 1F ......X 0.vfsl..
- 0010: E5 12 29 A9 B0 13 77 85 51 80 3A 2F 60 04 FF 82 ..)...w.Q.:/`...
- 0020: B9 12 55 9D 38 29 00 00 64 C0 24 C0 28 00 3D C0 ..U.8)..d.$.(.=.
- 0030: 26 C0 2A 00 6B 00 6A C0 0A C0 14 00 35 C0 05 C0 &.*.k.j.....5...
- 0040: 0F 00 39 00 38 C0 23 C0 27 00 3C C0 25 C0 29 00 ..9.8.#.'.<.%.).
- 0050: 67 00 40 C0 09 C0 13 00 2F C0 04 C0 0E 00 33 00 g.@...../.....3.
- 0060: 32 C0 2C C0 2B C0 30 00 9D C0 2E C0 32 00 9F 00 2.,.+.0.....2...
- 0070: A3 C0 2F 00 9C C0 2D C0 31 00 9E 00 A2 C0 08 C0 ../...-.1.......
- 0080: 12 00 0A C0 03 C0 0D 00 16 00 13 00 FF 01 00 00 ................
- 0090: 5E 00 0A 00 34 00 32 00 17 00 01 00 03 00 13 00 ^...4.2.........
- 00A0: 15 00 06 00 07 00 09 00 0A 00 18 00 0B 00 0C 00 ................
- 00B0: 19 00 0D 00 0E 00 0F 00 10 00 11 00 02 00 12 00 ................
- 00C0: 04 00 05 00 14 00 08 00 16 00 0B 00 02 01 00 00 ................
- 00D0: 0D 00 1C 00 1A 06 03 06 01 05 03 05 01 04 03 04 ................
- 00E0: 01 04 02 03 03 03 01 03 02 02 03 02 01 02 02 ...............
- %% Initialized: [Session-1, SSL_NULL_WITH_NULL_NULL]
- matching alias: 1
- %% Negotiating: [Session-1, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384]
- *** ServerHello, TLSv1.2
- RandomCookie: GMT: 1478504471 bytes = { 32, 36, 253, 143, 224, 170, 183, 130, 156, 187, 138, 163, 150, 131, 252, 21, 59, 128, 41, 76, 177, 40, 10, 138, 141, 116, 168, 159 }
- Session ID: {88, 32, 48, 23, 80, 46, 130, 66, 148, 67, 122, 88, 199, 169, 250, 198, 89, 202, 121, 61, 182, 60, 253, 254, 25, 136, 24, 52, 145, 192, 99, 62}
- Cipher Suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
- Compression Method: 0
- Extension renegotiation_info, renegotiated_connection: <empty>
- ***
- Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
- *** Certificate chain
- chain [0] = [
- [
- Version: V3
- Subject: CN=dptmt idl Server, OU=dptmt, O=company, L=Muenchen, ST=Bayern, C=DE
- Signature Algorithm: SHA256withRSA, OID = 1.2.840.113549.1.1.11
- Key: Sun RSA public key, 2048 bits
- modulus: 24265231049464539106505059649255465585651493115307358056581570717603244739467158330493118010325173213258506491772197498922706399029200330462742618291144509936480120356296272503499306538942336303080463697984189292966833387737614923972864898800240760207416664061824893745126291826695460786898197370460695259556891071934427400886692754260247730038349343721484423635420635705935836359761031274071091413739324805084922550787664606567944134030814232629673334886705568327174404354909648801515075043226013901967396016637037788735419730523194952586696339618165125854450308484116907246765441745021682797394819952007663800869751
- public exponent: 65537
- Validity: [From: Tue Oct 25 11:50:28 CEST 2016,
- To: Thu Oct 25 11:50:28 CEST 2018]
- Issuer: CN=idl SubCA 2016, O=company, C=DE
- SerialNumber: [ 01]
- Certificate Extensions: 8
- [1]: ObjectId: 1.3.6.1.5.5.7.1.1 Criticality=false
- AuthorityInfoAccess [
- [
- accessMethod: cklmsuers
- accessLocation: URIName: http://downloads.dptmt.company.de/rootcacert2016.cert
- ]
- ]
- [2]: ObjectId: 2.5.29.35 Criticality=false
- AuthorityKeyIdentifier [
- KeyIdentifier [
- 0000: F3 85 C5 44 9F 10 A7 BE AF 8E 6C 54 73 07 31 CB ...D......lTs.1.
- 0010: FB 4F 73 81 .Os.
- ]
- ]
- [3]: ObjectId: 2.5.29.19 Criticality=false
- BasicConstraints:[
- CA:false
- PathLen: undefined
- ]
- [4]: ObjectId: 2.5.29.31 Criticality=false
- CRLDistributionPoints [
- [DistributionPoint:
- [URIName: http://crl.dptmt.company.de/idl.crl]
- ]]
- [5]: ObjectId: 2.5.29.37 Criticality=false
- ExtendedKeyUsages [
- clientAuth
- serverAuth
- ]
- [6]: ObjectId: 2.5.29.15 Criticality=false
- KeyUsage [
- DigitalSignature
- Key_Encipherment
- ]
- [7]: ObjectId: 2.5.29.17 Criticality=false
- SubjectAlternativeName [
- DNSName: localhost
- DNSName: 127.0.0.1
- DNSName: idlconnector.dptmt.company.de
- ]
- [8]: ObjectId: 2.5.29.14 Criticality=false
- SubjectKeyIdentifier [
- KeyIdentifier [
- 0000: C8 39 51 89 74 35 FF AB 07 38 12 79 C0 AA 8C 17 .9Q.t5...8.y....
- 0010: 22 D3 81 34 "..4
- ]
- ]
- ]
- Algorithm: [SHA256withRSA]
- Signature:
- ...
- ]
- ***
- *** ECDH ServerKeyExchange
- Signature Algorithm SHA512withRSA
- Server key: Sun EC public key, 256 bits
- public x coord: 28847400382242897438936230468661390225193273270317541849731947641016598202380
- public y coord: 44672647556933576846980891280419719564112470643460642037901420136126664747387
- parameters: secp256r1 [NIST P-256, X9.62 prime256v1] (1.2.840.10045.3.1.7)
- *** CertificateRequest
- Cert Types: RSA, DSS, ECDSA
- Supported Signature Algorithms: SHA512withECDSA, SHA512withRSA, SHA384withECDSA, SHA384withRSA, SHA256withECDSA, SHA256withRSA, SHA256withDSA, SHA224withECDSA, SHA224withRSA, SHA224withDSA, SHA1withECDSA, SHA1withRSA, SHA1withDSA
- Cert Authorities:
- <CN=idl Root CA 2016, O=company, C=DE>
- <CN=idl SubCA 2016, O=company, C=DE>
- *** ServerHelloDone
- [write] MD5 and SHA1 hashes: len = 1740
- 0000: 02 00 00 4D 03 03 58 20 30 17 20 24 FD 8F E0 AA ...M..X 0. $....
- 0010: B7 82 9C BB 8A A3 96 83 FC 15 3B 80 29 4C B1 28 ..........;.)L.(
- 0020: 0A 8A 8D 74 A8 9F 20 58 20 30 17 50 2E 82 42 94 ...t.. X 0.P..B.
- 0030: 43 7A 58 C7 A9 FA C6 59 CA 79 3D B6 3C FD FE 19 CzX....Y.y=.<...
- 0040: 88 18 34 91 C0 63 3E C0 28 00 00 05 FF 01 00 01 ..4..c>.(.......
- 0050: 00 0B 00 04 80 00 04 7D 00 04 7A 30 82 04 76 30 ..........z0..v0
- 0060: 82 03 5E A0 03 02 01 02 02 01 01 30 0D 06 09 2A ..^........0...*
- 0070: 86 48 86 F7 0D 01 01 0B 05 00 30 3B 31 0B 30 09 .H........0;1.0.
- 0080: 06 03 55 04 06 13 02 44 45 31 13 30 11 06 03 55 ..U....DE1.0...U
- 0090: 04 0A 0C 0A 46 72 61 75 6E 68 6F 66 65 72 31 17 ....company1.
- 00A0: 30 15 06 03 55 04 03 0C 0E 49 44 53 20 53 75 62 0...U....idl Sub
- 00B0: 43 41 20 32 30 31 36 30 1E 17 0D 31 36 31 30 32 CA 20160...16102
- 00C0: 35 30 39 35 30 32 38 5A 17 0D 31 38 31 30 32 35 5095028Z..181025
- 00D0: 30 39 35 30 32 38 5A 30 71 31 0B 30 09 06 03 55 095028Z0q1.0...U
- 00E0: 04 06 13 02 44 45 31 0F 30 0D 06 03 55 04 08 0C ....DE1.0...U...
- 00F0: 06 42 61 79 65 72 6E 31 11 30 0F 06 03 55 04 07 .Bayern1.0...U..
- 0100: 0C 08 4D 75 65 6E 63 68 65 6E 31 13 30 11 06 03 ..Muenchen1.0...
- 0110: 55 04 0A 0C 0A 46 72 61 75 6E 68 6F 66 65 72 31 U....company1
- 0120: 0E 30 0C 06 03 55 04 0B 0C 05 41 49 53 45 43 31 .0...U....dptmt1
- 0130: 19 30 17 06 03 55 04 03 0C 10 41 49 53 45 43 20 .0...U....dptmt
- 0140: 49 44 53 20 53 65 72 76 65 72 30 82 01 22 30 0D idl Server0.."0.
- 0150: 06 09 2A 86 48 86 F7 0D 01 01 01 05 00 03 82 01 ..*.H...........
- 0160: 0F 00 30 82 01 0A 02 82 01 01 00 C0 37 B8 49 EF ..0.........7.I.
- 0170: 4D 09 7D B5 53 E0 5B 8D 85 F4 2A 37 28 94 8B 67 M...S.[...*7(..g
- 0180: DA 08 20 BC 34 0F 44 30 62 99 81 06 8E 81 4D 55 .. .4.D0b.....MU
- 0190: BE 5E 46 0C 58 7F 57 DE 13 BB C8 90 F6 E6 BD 82 .^F.X.W.........
- 01A0: C3 33 82 E4 D6 7D 46 46 10 BD 03 A9 35 9A F6 5E .3....FF....5..^
- 01B0: 16 33 22 20 48 85 93 B6 54 1B 13 E6 4E 9A 04 CF .3" H...T...N...
- 01C0: 61 85 4A 45 FA B8 73 04 42 F7 ED 87 2C BB 16 E6 a.JE..s.B...,...
- 01D0: D8 55 ED 66 06 95 4D 76 24 03 01 EB 87 5A 9F 20 .U.f..Mv$....Z.
- 01E0: ED C9 69 37 FC B9 C7 DD 3B 17 AA 26 11 09 45 0F ..i7....;..&..E.
- 01F0: BD ED D7 6C 68 0F 36 74 08 BE 9A 8C 76 69 E9 5C ...lh.6t....vi.\
- 0200: A9 F1 97 3D 81 ED 67 A0 49 70 EE 0B 82 47 EC 95 ...=..g.Ip...G..
- 0210: 73 02 E8 EC 04 45 85 5C D6 8E 46 BE 89 17 B1 80 s....E.\..F.....
- 0220: C5 6F 7F B4 7A 88 6C C4 58 5E EE EA 89 00 D3 1B .o..z.l.X^......
- 0230: 03 AE C6 1D 59 18 AB 76 3C 12 3D BD EB 40 6C A3 ....Y..v<.=..@l.
- 0240: 6D D0 96 CA 84 C5 EC 3A E0 98 E9 18 29 A0 7B 7B m......:....)...
- 0250: 2D A5 F5 AA D8 07 E4 E6 5A 25 80 81 35 35 E0 0F -.......Z%..55..
- 0260: 94 EE 9E 55 51 B6 A7 D4 78 E3 77 02 03 01 00 01 ...UQ...x.w.....
- 0270: A3 82 01 4D 30 82 01 49 30 1D 06 03 55 1D 0E 04 ...M0..I0...U...
- 0280: 16 04 14 C8 39 51 89 74 35 FF AB 07 38 12 79 C0 ....9Q.t5...8.y.
- 0290: AA 8C 17 22 D3 81 34 30 1F 06 03 55 1D 23 04 18 ..."..40...U.#..
- 02A0: 30 16 80 14 F3 85 C5 44 9F 10 A7 BE AF 8E 6C 54 0......D......lT
- 02B0: 73 07 31 CB FB 4F 73 81 30 09 06 03 55 1D 13 04 s.1..Os.0...U...
- 02C0: 02 30 00 30 0B 06 03 55 1D 0F 04 04 03 02 05 A0 .0.0...U........
- 02D0: 30 37 06 03 55 1D 1F 04 30 30 2E 30 2C A0 2A A0 07..U...00.0,.*.
- 02E0: 28 86 26 68 74 74 70 3A 2F 2F 63 72 6C 2E 61 69 (.&http://crl.ai
- 02F0: 73 65 63 2E 66 72 61 75 6E 68 6F 66 65 72 2E 64 sec.company.d
- 0300: 65 2F 69 64 73 2E 63 72 6C 30 54 06 08 2B 06 01 e/idl.crl0T..+..
- 0310: 05 05 07 01 01 04 48 30 46 30 44 06 08 2B 06 01 ......H0F0D..+..
- 0320: 05 05 07 30 02 86 38 68 74 74 70 3A 2F 2F 64 6F ...0..8http://do
- 0330: 77 6E 6C 6F 61 64 73 2E 61 69 73 65 63 2E 66 72 wnloads.dptmt.
- 0340: 61 75 6E 68 6F 66 65 72 2E 64 65 2F 72 6F 6F 74 .de/root
- 0350: 63 61 63 65 72 74 32 30 31 36 2E 63 65 72 74 30 cacert2016.cert0
- 0360: 1D 06 03 55 1D 25 04 16 30 14 06 08 2B 06 01 05 ...U.%..0...+...
- 0370: 05 07 03 02 06 08 2B 06 01 05 05 07 03 01 30 41 ......+.......0A
- 0380: 06 03 55 1D 11 04 3A 30 38 82 09 6C 6F 63 61 6C ..U...:08..local
- 0390: 68 6F 73 74 82 09 31 32 37 2E 30 2E 30 2E 31 82 host..127.0.0.1.
- 03A0: 20 69 64 73 63 6F 6E 6E 65 63 74 6F 72 2E 61 69 idlconnector.ai
- 03B0: 73 65 63 2E 66 72 61 75 6E 68 6F 66 65 72 2E 64 sec.company.d
- 03C0: 65 30 0D 06 09 2A 86 48 86 F7 0D 01 01 0B 05 00 e0...*.H........
- 03D0: 03 82 01 01 00 76 25 5E 9D B7 BB D6 C8 E7 01 A2 .....v%^........
- 03E0: 95 60 21 B9 35 06 C6 F2 C1 22 DE C6 69 AC 40 B8 .`!.5...."..i.@.
- 03F0: 85 1B A7 5F 70 AA 0D 51 FB 9A 8E 5C CC 5C A7 7D ..._p..Q...\.\..
- 0400: 91 36 C6 F5 B9 FB 35 EA 9A D0 BD 78 FE 69 0C AA .6....5....x.i..
- 0410: 27 49 16 9B 6D 7E B6 A5 34 46 D5 39 BA 2C 5A 23 'I..m...4F.9.,Z#
- 0420: F5 5E 72 F7 F7 78 CC 69 13 92 C4 20 03 0E 96 A0 .^r..x.i... ....
- 0430: 6F F6 A0 B6 59 E8 0F B6 AA B9 25 F5 A4 AC 53 BC o...Y.....%...S.
- 0440: AF DA 40 B2 18 56 7C 83 01 BD 5A D2 F0 36 EB 0C ..@..V....Z..6..
- 0450: 4B AE E7 B8 5B DA 5B 42 C9 74 34 51 AB C0 08 59 K...[.[B.t4Q...Y
- 0460: 36 30 A6 A2 95 EC E9 7F 45 AC 92 DB 84 2C 27 5B 60......E....,'[
- 0470: AB F1 34 22 22 69 97 C2 86 7D 73 DD 78 1B CB 69 ..4""i....s.x..i
- 0480: A3 1D 4F 93 B2 8E 8E C3 1D 5F 28 C2 B4 0F 2F 1E ..O......_(.../.
- 0490: A9 60 00 1C 79 EB 64 09 AD CA 53 93 AE F5 3B B1 .`..y.d...S...;.
- 04A0: 74 0B 16 D0 9C 8C 44 C8 04 9E 0C 52 43 EA B3 BC t.....D....RC...
- 04B0: 41 D6 16 34 58 A1 5E A9 A7 72 36 1E 82 19 CA 7B A..4X.^..r6.....
- 04C0: F1 70 7E B6 34 0C 03 DF 9D B1 3B 41 F0 E0 57 E6 .p..4.....;A..W.
- 04D0: E8 46 9B BA 54 0C 00 01 49 03 00 17 41 04 3F C7 .F..T...I...A.?.
- 04E0: 0C CD 4A A5 00 FD 6A 97 D3 54 E2 B2 6A BB 07 CD ..J...j..T..j...
- 04F0: E0 31 18 95 AB DE A8 14 FC 94 29 19 08 0C 62 C3 .1........)...b.
- 0500: D2 8E DB 50 51 98 E7 98 19 38 9A 5B 8A 14 90 7A ...PQ....8.[...z
- 0510: 1E A1 3C B7 EF 9F 13 5C 39 93 7D 3D 29 7B 06 01 ..<....\9..=)...
- 0520: 01 00 7F 30 74 59 CA CC DD 39 F2 BC D4 AF 02 F8 ...0tY...9......
- 0530: 79 EF 22 46 69 87 8E DF 1E E9 C4 19 AA DD 01 E8 y."Fi...........
- 0540: B2 0F D2 CB A9 CA 5F 9E B3 B0 C6 D4 8E BB FD F1 ......_.........
- 0550: 8F E5 50 4E F2 A3 6C 43 94 2B 8D E3 5D 58 01 7B ..PN..lC.+..]X..
- 0560: 12 41 E9 E9 61 81 0B 26 16 42 02 37 C6 FD 15 E7 .A..a..&.B.7....
- 0570: 88 A2 82 09 C3 A4 09 FF A9 6F 1E 40 02 D0 1A 54 .........o.@...T
- 0580: 94 B5 E8 C6 1E A6 63 8D 86 E8 A8 AD FA B9 07 3F ......c........?
- 0590: 0E 81 F8 F0 7D D4 6D 8A CD F5 22 AB 2F 77 94 0A ......m..."./w..
- 05A0: 7C 3F F7 F0 E7 82 CD 1F AB 5F 08 FF 9A 24 B3 BC .?......._...$..
- 05B0: 6C CD A0 16 FA A9 4F E7 A9 CB D9 AD BA 9C 2D A6 l.....O.......-.
- 05C0: 03 F4 F0 48 5F 1E 70 31 34 99 65 2F 70 58 59 8C ...H_.p14.e/pXY.
- 05D0: 7A A9 09 29 30 18 7B 29 79 DB 15 12 B1 25 C9 A5 z..)0..)y....%..
- 05E0: 37 FC 84 20 23 65 1F E0 EF 67 CC 66 01 1E 81 C7 7.. #e...g.f....
- 05F0: 94 FC C0 99 F7 FB 2D 61 1B 63 70 2A 24 3A 64 D2 ......-a.cp*$:d.
- 0600: F2 5A C8 FC C1 74 44 76 86 19 76 97 3D FB A9 C9 .Z...tDv..v.=...
- 0610: F1 65 BF 16 6F 2B CA D7 78 97 B0 DC 6C E9 1A F0 .e..o+..x...l...
- 0620: BD E2 0D 00 00 A2 03 01 02 40 00 1A 06 03 06 01 .........@......
- 0630: 05 03 05 01 04 03 04 01 04 02 03 03 03 01 03 02 ................
- 0640: 02 03 02 01 02 02 00 80 00 3F 30 3D 31 0B 30 09 .........?0=1.0.
- 0650: 06 03 55 04 06 13 02 44 45 31 13 30 11 06 03 55 ..U....DE1.0...U
- 0660: 04 0A 0C 0A 46 72 61 75 6E 68 6F 66 65 72 31 19 ....company1.
- 0670: 30 17 06 03 55 04 03 0C 10 49 44 53 20 52 6F 6F 0...U....idl Roo
- 0680: 74 20 43 41 20 32 30 31 36 00 3D 30 3B 31 0B 30 t CA 2016.=0;1.0
- 0690: 09 06 03 55 04 06 13 02 44 45 31 13 30 11 06 03 ...U....DE1.0...
- 06A0: 55 04 0A 0C 0A 46 72 61 75 6E 68 6F 66 65 72 31 U....company1
- 06B0: 17 30 15 06 03 55 04 03 0C 0E 49 44 53 20 53 75 .0...U....idl Su
- 06C0: 62 43 41 20 32 30 31 36 0E 00 00 00 bCA 2016....
- CamelJettyWebSocketServer-35, WRITE: TLSv1.2 Handshake, length = 1740
- 08:41:11.375 [CamelJettyWebSocketServer-35] DEBUG org.eclipse.jetty.io.ssl.SslConnection - SslConnection@3c4546fe{NEED_WRAP,eio=0/-1,di=-1} -> HttpConnection@80ef4f3[FILLING,DecryptedEndPoint@4f49498{/127.0.0.1:37052<->9292,Open,in,out,-,-,315/30000,HttpConnection}->SelectChannelEndPoint@37823e21{/127.0.0.1:37052<->9292,Open,in,out,-,-,295/30000,SslConnection}{io=0,kio=0,kro=1}][p=HttpParser{s=START,0 of 0},g=HttpGenerator{s=START},c=HttpChannelOverHttp@40d049f5{r=0,c=false,a=IDLE,uri=}] unwrap Status = OK HandshakeStatus = NEED_WRAP
- bytesConsumed = 0 bytesProduced = 0
- 08:41:11.375 [CamelJettyWebSocketServer-35] DEBUG org.eclipse.jetty.io.ssl.SslConnection - SslConnection@3c4546fe{NEED_WRAP,eio=0/-1,di=-1} -> HttpConnection@80ef4f3[FILLING,DecryptedEndPoint@4f49498{/127.0.0.1:37052<->9292,Open,in,out,-,-,316/30000,HttpConnection}->SelectChannelEndPoint@37823e21{/127.0.0.1:37052<->9292,Open,in,out,-,-,295/30000,SslConnection}{io=0,kio=0,kro=1}][p=HttpParser{s=START,0 of 0},g=HttpGenerator{s=START},c=HttpChannelOverHttp@40d049f5{r=0,c=false,a=IDLE,uri=}] flush enter [java.nio.HeapByteBuffer[pos=0 lim=0 cap=0]]
- [Raw write]: length = 1745
- 0000: 16 03 03 06 CC 02 00 00 4D 03 03 58 20 30 17 20 ........M..X 0.
- 0010: 24 FD 8F E0 AA B7 82 9C BB 8A A3 96 83 FC 15 3B $..............;
- 0020: 80 29 4C B1 28 0A 8A 8D 74 A8 9F 20 58 20 30 17 .)L.(...t.. X 0.
- 0030: 50 2E 82 42 94 43 7A 58 C7 A9 FA C6 59 CA 79 3D P..B.CzX....Y.y=
- 0040: B6 3C FD FE 19 88 18 34 91 C0 63 3E C0 28 00 00 .<.....4..c>.(..
- 0050: 05 FF 01 00 01 00 0B 00 04 80 00 04 7D 00 04 7A ...............z
- 0060: 30 82 04 76 30 82 03 5E A0 03 02 01 02 02 01 01 0..v0..^........
- 0070: 30 0D 06 09 2A 86 48 86 F7 0D 01 01 0B 05 00 30 0...*.H........0
- 0080: 3B 31 0B 30 09 06 03 55 04 06 13 02 44 45 31 13 ;1.0...U....DE1.
- 0090: 30 11 06 03 55 04 0A 0C 0A 46 72 61 75 6E 68 6F 0...U....compho
- 00A0: 66 65 72 31 17 30 15 06 03 55 04 03 0C 0E 49 44 fer1.0...U....ID
- 00B0: 53 20 53 75 62 43 41 20 32 30 31 36 30 1E 17 0D S SubCA 20160...
- 00C0: 31 36 31 30 32 35 30 39 35 30 32 38 5A 17 0D 31 161025095028Z..1
- 00D0: 38 31 30 32 35 30 39 35 30 32 38 5A 30 71 31 0B 81025095028Z0q1.
- 00E0: 30 09 06 03 55 04 06 13 02 44 45 31 0F 30 0D 06 0...U....DE1.0..
- 00F0: 03 55 04 08 0C 06 42 61 79 65 72 6E 31 11 30 0F .U....Bayern1.0.
- 0100: 06 03 55 04 07 0C 08 4D 75 65 6E 63 68 65 6E 31 ..U....Muenchen1
- 0110: 13 30 11 06 03 55 04 0A 0C 0A 46 72 61 75 6E 68 .0...U....comph
- 0120: 6F 66 65 72 31 0E 30 0C 06 03 55 04 0B 0C 05 41 ofer1.0...U....A
- 0130: 49 53 45 43 31 19 30 17 06 03 55 04 03 0C 10 41 ISEC1.0...U....A
- 0140: 49 53 45 43 20 49 44 53 20 53 65 72 76 65 72 30 ISEC idl Server0
- 0150: 82 01 22 30 0D 06 09 2A 86 48 86 F7 0D 01 01 01 .."0...*.H......
- 0160: 05 00 03 82 01 0F 00 30 82 01 0A 02 82 01 01 00 .......0........
- 0170: C0 37 B8 49 EF 4D 09 7D B5 53 E0 5B 8D 85 F4 2A .7.I.M...S.[...*
- 0180: 37 28 94 8B 67 DA 08 20 BC 34 0F 44 30 62 99 81 7(..g.. .4.D0b..
- 0190: 06 8E 81 4D 55 BE 5E 46 0C 58 7F 57 DE 13 BB C8 ...MU.^F.X.W....
- 01A0: 90 F6 E6 BD 82 C3 33 82 E4 D6 7D 46 46 10 BD 03 ......3....FF...
- 01B0: A9 35 9A F6 5E 16 33 22 20 48 85 93 B6 54 1B 13 .5..^.3" H...T..
- 01C0: E6 4E 9A 04 CF 61 85 4A 45 FA B8 73 04 42 F7 ED .N...a.JE..s.B..
- 01D0: 87 2C BB 16 E6 D8 55 ED 66 06 95 4D 76 24 03 01 .,....U.f..Mv$..
- 01E0: EB 87 5A 9F 20 ED C9 69 37 FC B9 C7 DD 3B 17 AA ..Z. ..i7....;..
- 01F0: 26 11 09 45 0F BD ED D7 6C 68 0F 36 74 08 BE 9A &..E....lh.6t...
- 0200: 8C 76 69 E9 5C A9 F1 97 3D 81 ED 67 A0 49 70 EE .vi.\...=..g.Ip.
- 0210: 0B 82 47 EC 95 73 02 E8 EC 04 45 85 5C D6 8E 46 ..G..s....E.\..F
- 0220: BE 89 17 B1 80 C5 6F 7F B4 7A 88 6C C4 58 5E EE ......o..z.l.X^.
- 0230: EA 89 00 D3 1B 03 AE C6 1D 59 18 AB 76 3C 12 3D .........Y..v<.=
- 0240: BD EB 40 6C A3 6D D0 96 CA 84 C5 EC 3A E0 98 E9 ..@l.m......:...
- 0250: 18 29 A0 7B 7B 2D A5 F5 AA D8 07 E4 E6 5A 25 80 .)...-.......Z%.
- 0260: 81 35 35 E0 0F 94 EE 9E 55 51 B6 A7 D4 78 E3 77 .55.....UQ...x.w
- 0270: 02 03 01 00 01 A3 82 01 4D 30 82 01 49 30 1D 06 ........M0..I0..
- 0280: 03 55 1D 0E 04 16 04 14 C8 39 51 89 74 35 FF AB .U.......9Q.t5..
- 0290: 07 38 12 79 C0 AA 8C 17 22 D3 81 34 30 1F 06 03 .8.y...."..40...
- 02A0: 55 1D 23 04 18 30 16 80 14 F3 85 C5 44 9F 10 A7 U.#..0......D...
- 02B0: BE AF 8E 6C 54 73 07 31 CB FB 4F 73 81 30 09 06 ...lTs.1..Os.0..
- 02C0: 03 55 1D 13 04 02 30 00 30 0B 06 03 55 1D 0F 04 .U....0.0...U...
- 02D0: 04 03 02 05 A0 30 37 06 03 55 1D 1F 04 30 30 2E .....07..U...00.
- 02E0: 30 2C A0 2A A0 28 86 26 68 74 74 70 3A 2F 2F 63 0,.*.(.&http://c
- 02F0: 72 6C 2E 61 69 73 65 63 2E 66 72 61 75 6E 68 6F rl.dptmt.compho
- 0300: 66 65 72 2E 64 65 2F 69 64 73 2E 63 72 6C 30 54 fer.de/idl.crl0T
- 0310: 06 08 2B 06 01 05 05 07 01 01 04 48 30 46 30 44 ..+........H0F0D
- 0320: 06 08 2B 06 01 05 05 07 30 02 86 38 68 74 74 70 ..+.....0..8http
- 0330: 3A 2F 2F 64 6F 77 6E 6C 6F 61 64 73 2E 61 69 73 ://downloads.klm
- 0340: 65 63 2E 66 72 61 75 6E 68 6F 66 65 72 2E 64 65 ec.company.de
- 0350: 2F 72 6F 6F 74 63 61 63 65 72 74 32 30 31 36 2E /rootcacert2016.
- 0360: 63 65 72 74 30 1D 06 03 55 1D 25 04 16 30 14 06 cert0...U.%..0..
- 0370: 08 2B 06 01 05 05 07 03 02 06 08 2B 06 01 05 05 .+.........+....
- 0380: 07 03 01 30 41 06 03 55 1D 11 04 3A 30 38 82 09 ...0A..U...:08..
- 0390: 6C 6F 63 61 6C 68 6F 73 74 82 09 31 32 37 2E 30 localhost..127.0
- 03A0: 2E 30 2E 31 82 20 69 64 73 63 6F 6E 6E 65 63 74 .0.1. idlconnect
- 03B0: 6F 72 2E 61 69 73 65 63 2E 66 72 61 75 6E 68 6F or.dptmt.compho
- 03C0: 66 65 72 2E 64 65 30 0D 06 09 2A 86 48 86 F7 0D fer.de0...*.H...
- 03D0: 01 01 0B 05 00 03 82 01 01 00 76 25 5E 9D B7 BB ..........v%^...
- 03E0: D6 C8 E7 01 A2 95 60 21 B9 35 06 C6 F2 C1 22 DE ......`!.5....".
- 03F0: C6 69 AC 40 B8 85 1B A7 5F 70 AA 0D 51 FB 9A 8E .i.@...._p..Q...
- 0400: 5C CC 5C A7 7D 91 36 C6 F5 B9 FB 35 EA 9A D0 BD \.\...6....5....
- 0410: 78 FE 69 0C AA 27 49 16 9B 6D 7E B6 A5 34 46 D5 x.i..'I..m...4F.
- 0420: 39 BA 2C 5A 23 F5 5E 72 F7 F7 78 CC 69 13 92 C4 9.,Z#.^r..x.i...
- 0430: 20 03 0E 96 A0 6F F6 A0 B6 59 E8 0F B6 AA B9 25 ....o...Y.....%
- 0440: F5 A4 AC 53 BC AF DA 40 B2 18 56 7C 83 01 BD 5A ...S...@..V....Z
- 0450: D2 F0 36 EB 0C 4B AE E7 B8 5B DA 5B 42 C9 74 34 ..6..K...[.[B.t4
- 0460: 51 AB C0 08 59 36 30 A6 A2 95 EC E9 7F 45 AC 92 Q...Y60......E..
- 0470: DB 84 2C 27 5B AB F1 34 22 22 69 97 C2 86 7D 73 ..,'[..4""i....s
- 0480: DD 78 1B CB 69 A3 1D 4F 93 B2 8E 8E C3 1D 5F 28 .x..i..O......_(
- 0490: C2 B4 0F 2F 1E A9 60 00 1C 79 EB 64 09 AD CA 53 .../..`..y.d...S
- 04A0: 93 AE F5 3B B1 74 0B 16 D0 9C 8C 44 C8 04 9E 0C ...;.t.....D....
- 04B0: 52 43 EA B3 BC 41 D6 16 34 58 A1 5E A9 A7 72 36 RC...A..4X.^..r6
- 04C0: 1E 82 19 CA 7B F1 70 7E B6 34 0C 03 DF 9D B1 3B ......p..4.....;
- 04D0: 41 F0 E0 57 E6 E8 46 9B BA 54 0C 00 01 49 03 00 A..W..F..T...I..
- 04E0: 17 41 04 3F C7 0C CD 4A A5 00 FD 6A 97 D3 54 E2 .A.?...J...j..T.
- 04F0: B2 6A BB 07 CD E0 31 18 95 AB DE A8 14 FC 94 29 .j....1........)
- 0500: 19 08 0C 62 C3 D2 8E DB 50 51 98 E7 98 19 38 9A ...b....PQ....8.
- 0510: 5B 8A 14 90 7A 1E A1 3C B7 EF 9F 13 5C 39 93 7D [...z..<....\9..
- 0520: 3D 29 7B 06 01 01 00 7F 30 74 59 CA CC DD 39 F2 =)......0tY...9.
- 0530: BC D4 AF 02 F8 79 EF 22 46 69 87 8E DF 1E E9 C4 .....y."Fi......
- 0540: 19 AA DD 01 E8 B2 0F D2 CB A9 CA 5F 9E B3 B0 C6 ..........._....
- 0550: D4 8E BB FD F1 8F E5 50 4E F2 A3 6C 43 94 2B 8D .......PN..lC.+.
- 0560: E3 5D 58 01 7B 12 41 E9 E9 61 81 0B 26 16 42 02 .]X...A..a..&.B.
- 0570: 37 C6 FD 15 E7 88 A2 82 09 C3 A4 09 FF A9 6F 1E 7.............o.
- 0580: 40 02 D0 1A 54 94 B5 E8 C6 1E A6 63 8D 86 E8 A8 @...T......c....
- 0590: AD FA B9 07 3F 0E 81 F8 F0 7D D4 6D 8A CD F5 22 ....?......m..."
- 05A0: AB 2F 77 94 0A 7C 3F F7 F0 E7 82 CD 1F AB 5F 08 ./w...?......._.
- 05B0: FF 9A 24 B3 BC 6C CD A0 16 FA A9 4F E7 A9 CB D9 ..$..l.....O....
- 05C0: AD BA 9C 2D A6 03 F4 F0 48 5F 1E 70 31 34 99 65 ...-....H_.p14.e
- 05D0: 2F 70 58 59 8C 7A A9 09 29 30 18 7B 29 79 DB 15 /pXY.z..)0..)y..
- 05E0: 12 B1 25 C9 A5 37 FC 84 20 23 65 1F E0 EF 67 CC ..%..7.. #e...g.
- 05F0: 66 01 1E 81 C7 94 FC C0 99 F7 FB 2D 61 1B 63 70 f..........-a.cp
- 0600: 2A 24 3A 64 D2 F2 5A C8 FC C1 74 44 76 86 19 76 *$:d..Z...tDv..v
- 0610: 97 3D FB A9 C9 F1 65 BF 16 6F 2B CA D7 78 97 B0 .=....e..o+..x..
- 0620: DC 6C E9 1A F0 BD E2 0D 00 00 A2 03 01 02 40 00 .l............@.
- 0630: 1A 06 03 06 01 05 03 05 01 04 03 04 01 04 02 03 ................
- 0640: 03 03 01 03 02 02 03 02 01 02 02 00 80 00 3F 30 ..............?0
- 0650: 3D 31 0B 30 09 06 03 55 04 06 13 02 44 45 31 13 =1.0...U....DE1.
- 0660: 30 11 06 03 55 04 0A 0C 0A 46 72 61 75 6E 68 6F 0...U....compho
- 0670: 66 65 72 31 19 30 17 06 03 55 04 03 0C 10 49 44 fer1.0...U....ID
- 0680: 53 20 52 6F 6F 74 20 43 41 20 32 30 31 36 00 3D S Root CA 2016.=
- 0690: 30 3B 31 0B 30 09 06 03 55 04 06 13 02 44 45 31 0;1.0...U....DE1
- 06A0: 13 30 11 06 03 55 04 0A 0C 0A 46 72 61 75 6E 68 .0...U....comph
- 06B0: 6F 66 65 72 31 17 30 15 06 03 55 04 03 0C 0E 49 ofer1.0...U....I
- 06C0: 44 53 20 53 75 62 43 41 20 32 30 31 36 0E 00 00 DS SubCA 2016...
- 06D0: 00 .
- 08:41:11.422 [CamelJettyWebSocketServer-35] DEBUG org.eclipse.jetty.io.ssl.SslConnection - SslConnection@3c4546fe{NEED_UNWRAP,eio=0/1745,di=-1} -> HttpConnection@80ef4f3[FILLING,DecryptedEndPoint@4f49498{/127.0.0.1:37052<->9292,Open,in,out,-,-,357/30000,HttpConnection}->SelectChannelEndPoint@37823e21{/127.0.0.1:37052<->9292,Open,in,out,-,-,336/30000,SslConnection}{io=0,kio=0,kro=1}][p=HttpParser{s=START,0 of 0},g=HttpGenerator{s=START},c=HttpChannelOverHttp@40d049f5{r=0,c=false,a=IDLE,uri=}] wrap Status = OK HandshakeStatus = NEED_UNWRAP
- bytesConsumed = 0 bytesProduced = 1745
- 08:41:11.426 [CamelJettyWebSocketServer-35] DEBUG org.eclipse.jetty.io.ssl.SslConnection - DecryptedEndPoint@4f49498{/127.0.0.1:37052<->9292,Open,in,out,-,-,367/30000,HttpConnection}->SelectChannelEndPoint@37823e21{/127.0.0.1:37052<->9292,Open,in,out,-,-,346/30000,SslConnection}{io=0,kio=0,kro=1} OK HeapByteBuffer@5e1bfeb0[p=0,l=1745,c=17408,r=1745]={<<<\x16\x03\x03\x06\xCc\x02\x00\x00M\x03\x03X 0\x17 $... SubCA 2016\x0e\x00\x00\x00>>>\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00...\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00}
- [Raw read]: length = 5
- 0000: 16 03 03 06 CC .....
- [Raw read]: length = 1740
- 0000: 02 00 00 4D 03 03 58 20 30 17 20 24 FD 8F E0 AA ...M..X 0. $....
- 0010: B7 82 9C BB 8A A3 96 83 FC 15 3B 80 29 4C B1 28 ..........;.)L.(
- 0020: 0A 8A 8D 74 A8 9F 20 58 20 30 17 50 2E 82 42 94 ...t.. X 0.P..B.
- 0030: 43 7A 58 C7 A9 FA C6 59 CA 79 3D B6 3C FD FE 19 CzX....Y.y=.<...
- 0040: 88 18 34 91 C0 63 3E C0 28 00 00 05 FF 01 00 01 ..4..c>.(.......
- 0050: 00 0B 00 04 80 00 04 7D 00 04 7A 30 82 04 76 30 ..........z0..v0
- 0060: 82 03 5E A0 03 02 01 02 02 01 01 30 0D 06 09 2A ..^........0...*
- 0070: 86 48 86 F7 0D 01 01 0B 05 00 30 3B 31 0B 30 09 .H........0;1.0.
- 0080: 06 03 55 04 06 13 02 44 45 31 13 30 11 06 03 55 ..U....DE1.0...U
- 0090: 04 0A 0C 0A 46 72 61 75 6E 68 6F 66 65 72 31 17 ....company1.
- 00A0: 30 15 06 03 55 04 03 0C 0E 49 44 53 20 53 75 62 0...U....idl Sub
- 00B0: 43 41 20 32 30 31 36 30 1E 17 0D 31 36 31 30 32 CA 20160...16102
- 00C0: 35 30 39 35 30 32 38 5A 17 0D 31 38 31 30 32 35 5095028Z..181025
- 00D0: 30 39 35 30 32 38 5A 30 71 31 0B 30 09 06 03 55 095028Z0q1.0...U
- 00E0: 04 06 13 02 44 45 31 0F 30 0D 06 03 55 04 08 0C ....DE1.0...U...
- 00F0: 06 42 61 79 65 72 6E 31 11 30 0F 06 03 55 04 07 .Bayern1.0...U..
- 0100: 0C 08 4D 75 65 6E 63 68 65 6E 31 13 30 11 06 03 ..Muenchen1.0...
- 0110: 55 04 0A 0C 0A 46 72 61 75 6E 68 6F 66 65 72 31 U....company1
- 0120: 0E 30 0C 06 03 55 04 0B 0C 05 41 49 53 45 4308:41:11.435 [CamelJettyWebSocketServer-35] DEBUG org.eclipse.jetty.io.ChannelEndPoint - flushed 1745 SelectChannelEndPoint@37823e21{/127.0.0.1:37052<->9292,Open,in,out,-,-,355/30000,SslConnection}{io=0,kio=0,kro=1}
- 08:41:11.441 [CamelJettyWebSocketServer-35] DEBUG org.eclipse.jetty.io.ssl.SslConnection - SslConnection@3c4546fe{NEED_UNWRAP,eio=0/0,di=-1} -> HttpConnection@80ef4f3[FILLING,DecryptedEndPoint@4f49498{/127.0.0.1:37052<->9292,Open,in,out,-,-,382/30000,HttpConnection}->SelectChannelEndPoint@37823e21{/127.0.0.1:37052<->9292,Open,in,out,-,-,1/30000,SslConnection}{io=0,kio=0,kro=1}][p=HttpParser{s=START,0 of 0},g=HttpGenerator{s=START},c=HttpChannelOverHttp@40d049f5{r=0,c=false,a=IDLE,uri=}] flush exit, consumed 0
- 08:41:11.441 [CamelJettyWebSocketServer-35] DEBUG org.eclipse.jetty.io.ssl.SslConnection - SslConnection@3c4546fe{NEED_UNWRAP,eio=0/-1,di=-1} -> HttpConnection@80ef4f3[FILLING,DecryptedEndPoint@4f49498{/127.0.0.1:37052<->9292,Open,in,out,-,-,382/30000,HttpConnection}->SelectChannelEndPoint@37823e21{/127.0.0.1:37052<->9292,Open,in,out,-,-,1/30000,SslConnection}{io=0,kio=0,kro=1}][p=HttpParser{s=START,0 of 0},g=HttpGenerator{s=START},c=HttpChannelOverHttp@40d049f5{r=0,c=false,a=IDLE,uri=}] unwrap Status = BUFFER_UNDERFLOW HandshakeStatus = NEED_UNWRAP
- bytesConsumed = 0 bytesProduced = 0
- 31 .0...U....dptmt1
- 0130: 19 30 17 06 03 55 04 03 0C 10 41 49 53 45 43 20 .0...U....dptmt
- 0140: 49 44 53 20 53 65 72 76 65 72 30 82 01 22 30 0D idl Server0.."0.
- 0150: 06 09 2A 86 48 86 F7 0D 01 01 01 05 00 03 82 01 ..*.H...........
- 0160: 0F 00 30 82 01 0A 02 82 01 01 00 C0 37 B8 49 EF ..0.........7.I.
- 0170: 4D 09 7D B5 53 E0 5B 8D 85 F4 2A 37 28 94 8B 67 M...S.[...*7(..g
- 0180: DA 08 20 BC 34 0F 44 30 62 99 81 06 8E 81 4D 55 .. .4.D0b.....MU
- 0190: BE 5E 46 0C 58 7F 57 DE 13 BB C8 90 F6 E6 BD 82 .^F.X.W.........
- 01A0: C3 33 82 E4 D6 7D 46 46 10 BD 03 A9 35 9A F6 5E .3....FF....5..^
- 01B0: 16 33 22 20 48 85 93 B6 54 1B 13 E6 4E 9A 04 CF .3" H...T...N...
- 01C0: 61 85 4A 45 FA B8 73 04 42 F7 ED 87 2C BB 16 E6 a.JE..s.B...,...
- 01D0: D8 55 ED 66 06 95 4D 76 24 03 01 EB 87 5A 9F 20 .U.f..Mv$....Z.
- 01E0: ED C9 69 37 FC B9 C7 DD 3B 17 AA 26 11 09 45 0F ..i7....;..&..E.
- 01F0: BD ED D7 6C 68 0F 36 74 08 BE 9A 8C 76 69 E9 5C ...lh.6t....vi.\
- 0200: A9 F1 97 3D 81 ED 67 A0 49 70 EE 0B 82 47 EC 95 ...=..g.Ip...G..
- 0210: 73 02 E8 EC 04 45 85 5C D6 8E 46 BE 89 17 B1 80 s....E.\..F.....
- 0220: C5 6F 7F B4 7A 88 6C C4 58 5E EE EA 89 00 D3 1B .o..z.l.X^......
- 0230: 03 AE C6 1D 59 18 AB 76 3C 12 3D BD EB 40 6C A3 ....Y..v<.=..@l.
- 0240: 6D D0 96 CA 84 C5 EC 3A E0 98 E9 18 29 A0 7B 7B m......:....)...
- 0250: 2D A5 F5 AA D8 07 E4 E6 5A 25 80 81 35 35 E0 0F -.......Z%..55..
- 0260: 94 EE 9E 55 51 B6 A7 D4 78 E3 77 02 03 01 00 01 ...UQ...x.w.....
- 0270: A3 82 01 4D 30 82 01 49 30 1D 06 03 55 1D 0E 04 ...M0..I0...U...
- 0280: 16 04 14 C8 39 51 89 74 35 FF AB 07 38 12 79 C0 ....9Q.t5...8.y.
- 0290: AA 8C 17 22 D3 81 34 30 1F 06 03 55 1D 23 04 18 ..."..40...U.#..
- 02A0: 30 16 80 14 F3 85 C5 44 9F 10 A7 BE AF 8E 6C 54 0......D......lT
- 02B0: 73 07 31 CB FB 4F 73 81 30 09 06 03 55 1D 13 04 s.1..Os.0...U...
- 02C0: 02 30 00 30 0B 06 03 55 1D 0F 04 04 03 02 05 A0 .0.0...U........
- 02D0: 30 37 06 03 55 1D 1F 04 30 30 2E 30 2C A0 2A A0 07..U...00.0,.*.
- 02E0: 28 86 26 68 74 74 70 3A 2F 2F 63 72 6C 2E 61 69 (.&http://crl.ai
- 02F0: 73 65 63 2E 66 72 61 75 6E 68 6F 66 65 72 2E 64 sec.company.d
- 0300: 65 2F 69 64 73 2E 63 72 6C 30 54 06 08 2B 06 01 e/idl.crl0T..+..
- 0310: 05 05 07 01 01 04 48 30 46 30 44 06 08 2B 06 01 ......H0F0D..+..
- 0320: 05 05 07 30 02 86 38 68 74 74 70 3A 2F 2F 64 6F ...0..8http://do
- 0330: 77 6E 6C 6F 61 64 73 2E 61 69 73 65 63 2E 66 72 wnloads.dptmt.co
- 0340: 61 75 6E 68 6F 66 65 72 2E 64 65 2F 72 6F 6F 74 mpan.....de/root
- 0350: 63 61 63 65 72 74 32 30 31 36 2E 63 65 72 74 30 cacert2016.cert0
- 0360: 1D 06 03 55 1D 25 04 16 30 14 06 08 2B 06 01 05 ...U.%..0...+...
- 0370: 05 07 03 02 06 08 2B 06 01 05 05 07 03 01 30 41 ......+.......0A
- 0380: 06 03 55 1D 11 04 3A 30 38 82 09 6C 6F 63 61 6C ..U...:08..local
- 0390: 68 6F 73 74 82 09 31 32 37 2E 30 2E 30 2E 31 82 host..127.0.0.1.
- 03A0: 20 69 64 73 63 6F 6E 6E 65 63 74 6F 72 2E 61 69 idlconnector.ai
- 03B0: 73 65 63 2E 66 72 61 75 6E 68 6F 66 65 72 2E 64 sec.company.d
- 03C0: 65 30 0D 06 09 2A 86 48 86 F7 0D 01 01 0B 05 00 e0...*.H........
- 03D0: 03 82 01 01 00 76 25 5E 9D B7 BB D6 C8 E7 01 A2 .....v%^........
- 03E0: 95 60 21 B9 35 06 C6 F2 C1 22 DE C6 69 AC 40 B8 .`!.5...."..i.@.
- 03F0: 85 1B A7 5F 70 AA 0D 51 FB 9A 8E 5C CC 5C A7 7D ..._p..Q...\.\..
- 0400: 91 36 C6 F5 B9 FB 35 EA 9A D0 BD 78 FE 69 0C AA .6....5....x.i..
- 0410: 27 49 16 9B 6D 7E B6 A5 34 46 D5 39 BA 2C 5A 23 'I..m...4F.9.,Z#
- 0420: F5 5E 72 F7 F7 78 CC 69 13 92 C4 20 03 0E 96 A0 .^r..x.i... ....
- 0430: 6F F6 A0 B6 59 E8 0F B6 AA B9 25 F5 A4 AC 53 BC o...Y.....%...S.
- 0440: AF DA 40 B2 18 56 7C 83 01 BD 5A D2 F0 36 EB 0C ..@..V....Z..6..
- 0450: 4B AE E7 B8 5B DA 5B 42 C9 74 34 51 AB C0 08 59 K...[.[B.t4Q...Y
- 0460: 36 30 A6 A2 95 EC E9 7F 45 AC 92 DB 84 2C 27 5B 60......E....,'[
- 0470: AB F1 34 22 22 69 97 C2 86 7D 73 DD 78 1B CB 69 ..4""i....s.x..i
- 0480: A3 1D 4F 93 B2 8E 8E C3 1D 5F 28 C2 B4 0F 2F 1E ..O......_(.../.
- 0490: A9 60 00 1C 79 EB 64 09 AD CA 53 93 AE F5 3B B1 .`..y.d...S...;.
- 04A0: 74 0B 16 D0 9C 8C 44 C8 04 9E 0C 52 43 EA B3 BC t.....D....RC...
- 04B0: 41 D6 16 34 58 A1 5E A9 A7 72 36 1E 82 19 CA 7B A..4X.^..r6.....
- 04C0: 08:41:11.446 [CamelJettyWebSocketServer-35] DEBUG org.eclipse.jetty.io.ChannelEndPoint - filled 0 SelectChannelEndPoint@37823e21{/127.0.0.1:37052<->9292,Open,in,out,-,-,6/30000,SslConnection}{io=0,kio=0,kro=1}
- 08:41:11.454 [CamelJettyWebSocketServer-35] DEBUG org.eclipse.jetty.io.ssl.SslConnection - SslConnection@3c4546fe{NEED_UNWRAP,eio=0/-1,di=-1} -> HttpConnection@80ef4f3[FILLING,DecryptedEndPoint@4f49498{/127.0.0.1:37052<->9292,Open,in,out,-,-,394/30000,HttpConnection}->SelectChannelEndPoint@37823e21{/127.0.0.1:37052<->9292,Open,in,out,-,-,14/30000,SslConnection}{io=0,kio=0,kro=1}][p=HttpParser{s=START,0 of 0},g=HttpGenerator{s=START},c=HttpChannelOverHttp@40d049f5{r=0,c=false,a=IDLE,uri=}] filled 0 encrypted bytes
- 08:41:11.455 [CamelJettyWebSocketServer-35] DEBUG org.eclipse.jetty.io.ssl.SslConnection - SslConnection@3c4546fe{NEED_UNWRAP,eio=0/-1,di=-1} -> HttpConnection@80ef4f3[FILLING,DecryptedEndPoint@4f49498{/127.0.0.1:37052<->9292,Open,in,out,-,-,396/30000,HttpConnection}->SelectChannelEndPoint@37823e21{/127.0.0.1:37052<->9292,Open,in,out,-,-,15/30000,SslConnection}{io=0,kio=0,kro=1}][p=HttpParser{s=START,0 of 0},g=HttpGenerator{s=START},c=HttpChannelOverHttp@40d049f5{r=0,c=false,a=IDLE,uri=}] unwrap Status = BUFFER_UNDERFLOW HandshakeStatus = NEED_UNWRAP
- bytesConsumed = 0 bytesProduced = 0
- 08:41:11.455 [CamelJettyWebSocketServer-35] DEBUG org.eclipse.jetty.io.ssl.SslConnection - SslConnection@3c4546fe{NEED_UNWRAP,eio=-1/-1,di=-1} -> HttpConnection@80ef4f3[FILLING,DecryptedEndPoint@4f49498{/127.0.0.1:37052<->9292,Open,in,out,-,-,396/30000,HttpConnection}->SelectChannelEndPoint@37823e21{/127.0.0.1:37052<->9292,Open,in,out,-,-,15/30000,SslConnection}{io=0,kio=0,kro=1}][p=HttpParser{s=START,0 of 0},g=HttpGenerator{s=START},c=HttpChannelOverHttp@40d049f5{r=0,c=false,a=IDLE,uri=}] fill exit
- 08:41:11.456 [CamelJettyWebSocketServer-35] DEBUG org.eclipse.jetty.io.ssl.SslConnection - SslConnection@3c4546fe{NEED_UNWRAP,eio=-1/-1,di=-1} -> HttpConnection@80ef4f3[FILLING,DecryptedEndPoint@4f49498{/127.0.0.1:37052<->9292,Open,in,out,-,-,396/30000,HttpConnection}->SelectChannelEndPoint@37823e21{/127.0.0.1:37052<->9292,Open,in,out,-,-,16/30000,SslConnection}{io=0,kio=0,kro=1}][p=HttpParser{s=START,0 of 0},g=HttpGenerator{s=START},c=HttpChannelOverHttp@40d049f5{r=0,c=false,a=IDLE,uri=}] fill enter
- 08:41:11.456 [CamelJettyWebSocketServer-35] DEBUG org.eclipse.jetty.io.ChannelEndPoint - filled 0 SelectChannelEndPoint@37823e21{/127.0.0.1:37052<->9292,Open,in,out,-,-,16/30000,SslConnection}{io=0,kio=0,kro=1}
- 08:41:11.456 [CamelJettyWebSocketServer-35] DEBUG org.eclipse.jetty.io.ssl.SslConnection - SslConnection@3c4546fe{NEED_UNWRAP,eio=0/-1,di=-1} -> HttpConnection@80ef4f3[FILLING,DecryptedEndPoint@4f49498{/127.0.0.1:37052<->9292,Open,in,out,-,-,397/30000,HttpConnection}->SelectChannelEndPoint@37823e21{/127.0.0.1:37052<->9292,Open,in,out,-,-,16/30000,SslConnection}{io=0,kio=0,kro=1}][p=HttpParser{s=START,0 of 0},g=HttpGenerator{s=START},c=HttpChannelOverHttp@40d049f5{r=0,c=false,a=IDLE,uri=}] filled 0 encrypted bytes
- 08:41:11.456 [CamelJettyWebSocketServer-35] DEBUG org.eclipse.jetty.io.ssl.SslConnection - SslConnection@3c4546fe{NEED_UNWRAP,eio=0/-1,di=-1} -> HttpConnection@80ef4f3[FILLING,DecryptedEndPoint@4f49498{/127.0.0.1:37052<->9292,Open,in,out,-,-,397/30000,HttpConnection}->SelectChannelEndPoint@37823e21{/127.0.0.1:37052<->9292,Open,in,out,-,-,16/30000,SslConnection}{io=0,kio=0,kro=1}][p=HttpParser{s=START,0 of 0},g=HttpGenerator{s=START},c=HttpChannelOverHttp@40d049f5{r=0,c=false,a=IDLE,uri=}] unwrap Status = BUFFER_UNDERFLOW HandshakeStatus = NEED_UNWRAP
- bytesConsumed = 0 bytesProduced = 0
- 08:41:11.456 [CamelJettyWebSocketServer-35] DEBUG org.eclipse.jetty.io.ssl.SslConnection - SslConnection@3c4546fe{NEED_UNWRAP,eio=-1/-1,di=-1} -> HttpConnection@80ef4f3[FILLING,DecryptedEndPoint@4f49498{/127.0.0.1:37052<->9292,Open,in,out,-,-,397/30000,HttpConnection}->SelectChannelEndPoint@37823e21{/127.0.0.1:37052<->9292,Open,in,out,-,-,16/30000,SslConnection}{io=0,kio=0,kro=1}][p=HttpParser{s=START,0 of 0},g=HttpGenerator{s=START},c=HttpChannelOverHttp@40d049f5{r=0,c=false,a=IDLE,uri=}] fill exit
- 08:41:11.456 [CamelJettyWebSocketServer-35] DEBUG org.eclipse.jetty.http.HttpParser - parseNext s=START HeapByteBuffer@14eb72fc[p=0,l=0,c=17408,r=0]={<<<>>>\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00...\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00}
- 08:41:11.457 [CamelJettyWebSocketServer-35] DEBUG org.eclipse.jetty.io.AbstractConnection - fillInterested HttpConnection@80ef4f3[FILLING,DecryptedEndPoint@4f49498{/127.0.0.1:37052<->9292,Open,in,out,-,-,398/30000,HttpConnection}->SelectChannelEndPoint@37823e21{/127.0.0.1:37052<->9292,Open,in,out,-,-,17/30000,SslConnection}{io=0,kio=0,kro=1}][p=HttpParser{s=START,0 of 0},g=HttpGenerator{s=START},c=HttpChannelOverHttp@40d049f5{r=0,c=false,a=IDLE,uri=}]
- F1 70 7E B6 34 0C 03 DF 9D B1 3B 41 F0 E0 57 E6 .p..4.....;A..W.
- 04D0: E8 46 9B BA 54 0C 00 01 49 03 00 17 41 04 3F C7 .F..T...I...A.?.
- 04E0: 0C CD 4A A5 00 FD 6A 97 D3 54 E2 B2 6A BB 07 CD ..J...j..T..j...
- 04F0: E0 31 18 95 AB DE A8 14 FC 94 29 19 08 0C 62 C3 .1........)...b.
- 0500: D2 8E DB 50 51 98 E7 98 19 38 9A 5B 8A 14 90 7A ...PQ....8.[...z
- 0510: 1E A1 3C B7 EF 9F 13 5C 39 93 7D 3D 29 7B 06 01 ..<....\9..=)...
- 0520: 01 00 7F 30 74 59 CA CC DD 39 F2 BC D4 AF 02 F8 ...0tY...9......
- 0530: 79 EF 22 46 69 87 8E DF 1E E9 C4 19 AA DD 01 E8 y."Fi...........
- 0540: B2 0F D2 CB A9 CA 5F 9E B3 B0 C6 D4 8E BB FD F1 ......_.........
- 0550: 8F E5 50 4E F2 A3 6C 43 94 2B 8D E3 5D 58 01 7B ..PN..lC.+..]X..
- 0560: 12 41 E9 E9 61 81 0B 26 16 42 02 37 C6 FD 15 E7 .A..a..&.B.7....
- 0570: 88 A2 82 09 C3 A4 09 FF A9 6F 1E 40 02 D0 1A 54 .........o.@...T
- 0580: 94 B5 E8 C6 1E A6 63 8D 86 E8 A8 AD FA B9 07 3F ......c........?
- 0590: 0E 81 F8 F0 7D D4 6D 8A CD F5 22 AB 2F 77 94 0A ......m..."./w..
- 05A0: 7C 3F F7 F0 E7 82 CD 1F AB 5F 08 FF 9A 24 B3 BC .?.....08:41:11.459 [CamelJettyWebSocketServer-35] DEBUG org.eclipse.jetty.io.AbstractConnection - FILLING-->FILLING_FILL_INTERESTED HttpConnection@80ef4f3[FILLING_FILL_INTERESTED,DecryptedEndPoint@4f49498{/127.0.0.1:37052<->9292,Open,in,out,-,-,398/30000,HttpConnection}->SelectChannelEndPoint@37823e21{/127.0.0.1:37052<->9292,Open,in,out,-,-,17/30000,SslConnection}{io=0,kio=0,kro=1}][p=HttpParser{s=START,0 of 0},g=HttpGenerator{s=START},c=HttpChannelOverHttp@40d049f5{r=0,c=false,a=IDLE,uri=}]
- 08:41:11.477 [CamelJettyWebSocketServer-35] DEBUG org.eclipse.jetty.io.AbstractConnection - FILLING_FILL_INTERESTED-->FILL_INTERESTED HttpConnection@80ef4f3[FILL_INTERESTED,DecryptedEndPoint@4f49498{/127.0.0.1:37052<->9292,Open,in,out,-,-,418/30000,HttpConnection}->SelectChannelEndPoint@37823e21{/127.0.0.1:37052<->9292,Open,in,out,-,-,37/30000,SslConnection}{io=0,kio=0,kro=1}][p=HttpParser{s=START,0 of 0},g=HttpGenerator{s=START},c=HttpChannelOverHttp@40d049f5{r=0,c=false,a=IDLE,uri=}]
- 08:41:11.478 [CamelJettyWebSocketServer-35] DEBUG org.eclipse.jetty.io.AbstractConnection - fillInterested SslConnection@3c4546fe{NEED_UNWRAP,eio=-1/-1,di=-1} -> HttpConnection@80ef4f3[FILL_INTERESTED,DecryptedEndPoint@4f49498{/127.0.0.1:37052<->9292,Open,in,out,R,-,1/30000,HttpConnection}->SelectChannelEndPoint@37823e21{/127.0.0.1:37052<->9292,Open,in,out,-,-,38/30000,SslConnection}{io=0,kio=0,kro=1}][p=HttpParser{s=START,0 of 0},g=HttpGenerator{s=START},c=HttpChannelOverHttp@40d049f5{r=0,c=false,a=IDLE,uri=}]
- 08:41:11.478 [CamelJettyWebSocketServer-35] DEBUG org.eclipse.jetty.io.AbstractConnection - IDLE-->FILL_INTERESTED SslConnection@3c4546fe{NEED_UNWRAP,eio=-1/-1,di=-1} -> HttpConnection@80ef4f3[FILL_INTERESTED,DecryptedEndPoint@4f49498{/127.0.0.1:37052<->9292,Open,in,out,R,-,1/30000,HttpConnection}->SelectChannelEndPoint@37823e21{/127.0.0.1:37052<->9292,Open,in,out,-,-,38/30000,SslConnection}{io=0,kio=0,kro=1}][p=HttpParser{s=START,0 of 0},g=HttpGenerator{s=START},c=HttpChannelOverHttp@40d049f5{r=0,c=false,a=IDLE,uri=}]
- 08:41:11.478 [CamelJettyWebSocketServer-35] DEBUG org.eclipse.jetty.io.SelectChannelEndPoint - Local interests updating 0 -> 1 for SelectChannelEndPoint@37823e21{/127.0.0.1:37052<->9292,Open,in,out,R,-,0/30000,SslConnection}{io=1,kio=0,kro=1}
- 08:41:11.478 [CamelJettyWebSocketServer-35] DEBUG org.eclipse.jetty.io.SelectorManager - Queued change org.eclipse.jetty.io.SelectChannelEndPoint$1@431394e9
- .._...$..
- 05B0: 6C CD A0 16 FA A9 4F E7 A9 CB D9 AD BA 9C 2D A6 l.....O.......-.
- 05C0: 03 F4 F0 48 5F 1E 70 31 34 99 65 2F 70 58 59 8C ...H_.p14.e/pXY.
- 05D0: 7A A9 09 29 30 18 7B 29 79 DB 15 12 B1 25 C9 A5 z..)0..)y....%..
- 05E0: 37 FC 84 20 23 65 1F E0 EF 67 CC 66 01 1E 81 C7 7.. #e...g.f....
- 05F0: 94 FC C0 99 F7 FB 2D 61 1B 63 70 2A 24 3A 64 D2 ......-a.cp*$:d.
- 0600: F2 5A C8 FC C1 74 44 76 86 19 76 97 3D FB A9 C9 .Z...tDv..v.=...
- 0610: F1 65 BF 16 6F 2B CA D7 78 97 B0 DC 6C E9 1A F0 .e..o+..x...l...
- 0620: BD E2 0D 00 00 A2 03 01 02 40 00 1A 06 03 06 01 .........@......
- 0630: 05 03 05 01 04 03 08:41:11.479 [CamelJettyWebSocketServer-31-selector-ServerConnectorManager@3fcdcf/0] DEBUG org.eclipse.jetty.io.SelectorManager - Selector loop woken up from select, 0/1 selected
- 08:41:11.484 [CamelJettyWebSocketServer-31-selector-ServerConnectorManager@3fcdcf/0] DEBUG org.eclipse.jetty.io.SelectorManager - Running change org.eclipse.jetty.io.SelectChannelEndPoint$1@431394e9
- 08:41:11.484 [CamelJettyWebSocketServer-31-selector-ServerConnectorManager@3fcdcf/0] DEBUG org.eclipse.jetty.io.SelectChannelEndPoint - Key interests updated 0 -> 1 on SelectChannelEndPoint@37823e21{/127.0.0.1:37052<->9292,Open,in,out,R,-,6/30000,SslConnection}{io=1,kio=1,kro=1}
- 08:41:11.484 [CamelJettyWebSocketServer-31-selector-ServerConnectorManager@3fcdcf/0] DEBUG org.eclipse.jetty.io.SelectorManager - Selector loop waiting on select
- 04 01 04 02 03 03 03 01 03 02 ................
- 0640: 02 03 02 01 02 02 00 80 00 3F 30 3D 31 0B 30 09 .........?0=1.0.
- 0650: 06 03 55 04 06 13 02 44 45 31 13 30 11 06 03 55 ..U....DE1.0...U
- 0660: 04 0A 0C 0A 46 72 61 75 6E 68 6F 66 65 72 31 19 ....company1.
- 0670: 30 17 06 03 55 04 03 0C 10 49 44 53 20 52 6F 6F 0...U....idl Roo
- 0680: 74 20 43 41 20 32 30 31 36 00 3D 30 3B 31 0B 30 t CA 2016.=0;1.0
- 0690: 09 06 03 55 04 06 13 02 44 45 31 13 30 11 06 03 ...U....DE1.0...
- 06A0: 55 04 0A 0C 0A 46 72 61 75 6E 68 6F 66 65 72 31 U....company1
- 06B0: 17 30 15 06 03 55 04 03 0C 0E 49 44 53 20 53 75 .0...U....idl Su
- 06C0: 62 43 41 20 32 30 31 36 0E 00 00 00 bCA 2016....
- New I/O worker #1, READ: TLSv1.2 Handshake, length = 1740
- *** ServerHello, TLSv1.2
- RandomCookie: GMT: 1478504471 bytes = { 32, 36, 253, 143, 224, 170, 183, 130, 156, 187, 138, 163, 150, 131, 252, 21, 59, 128, 41, 76, 177, 40, 10, 138, 141, 116, 168, 159 }
- Session ID: {88, 32, 48, 23, 80, 46, 130, 66, 148, 67, 122, 88, 199, 169, 250, 198, 89, 202, 121, 61, 182, 60, 253, 254, 25, 136, 24, 52, 145, 192, 99, 62}
- Cipher Suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
- Compression Method: 0
- Extension renegotiation_info, renegotiated_connection: <empty>
- ***
- %% Initialized: [Session-2, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384]
- ** TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
- [read] MD5 and SHA1 hashes: len = 81
- 0000: 02 00 00 4D 03 03 58 20 30 17 20 24 FD 8F E0 AA ...M..X 0. $....
- 0010: B7 82 9C BB 8A A3 96 83 FC 15 3B 80 29 4C B1 28 ..........;.)L.(
- 0020: 0A 8A 8D 74 A8 9F 20 58 20 30 17 50 2E 82 42 94 ...t.. X 0.P..B.
- 0030: 43 7A 58 C7 A9 FA C6 59 CA 79 3D B6 3C FD FE 19 CzX....Y.y=.<...
- 0040: 88 18 34 91 C0 63 3E C0 28 00 00 05 FF 01 00 01 ..4..c>.(.......
- 0050: 00 .
- *** Certificate chain
- chain [0] = [
- [
- Version: V3
- Subject: CN=dptmt idl Server, OU=dptmt, O=company, L=Muenchen, ST=Bayern, C=DE
- Signature Algorithm: SHA256withRSA, OID = 1.2.840.113549.1.1.11
- Key: Sun RSA public key, 2048 bits
- modulus: 24265231049464539106505059649255465585651493115307358056581570717603244739467158330493118010325173213258506491772197498922706399029200330462742618291144509936480120356296272503499306538942336303080463697984189292966833387737614923972864898800240760207416664061824893745126291826695460786898197370460695259556891071934427400886692754260247730038349343721484423635420635705935836359761031274071091413739324805084922550787664606567944134030814232629673334886705568327174404354909648801515075043226013901967396016637037788735419730523194952586696339618165125854450308484116907246765441745021682797394819952007663800869751
- public exponent: 65537
- Validity: [From: Tue Oct 25 11:50:28 CEST 2016,
- To: Thu Oct 25 11:50:28 CEST 2018]
- Issuer: CN=idl SubCA 2016, O=company, C=DE
- SerialNumber: [ 01]
- Certificate Extensions: 8
- [1]: ObjectId: 1.3.6.1.5.5.7.1.1 Criticality=false
- AuthorityInfoAccess [
- [
- accessMethod: cklmsuers
- accessLocation: URIName: http://downloads.dptmt.company.de/rootcacert2016.cert
- ]
- ]
- [2]: ObjectId: 2.5.29.35 Criticality=false
- AuthorityKeyIdentifier [
- KeyIdentifier [
- 0000: F3 85 C5 44 9F 10 A7 BE AF 8E 6C 54 73 07 31 CB ...D......lTs.1.
- 0010: FB 4F 73 81 .Os.
- ]
- ]
- [3]: ObjectId: 2.5.29.19 Criticality=false
- BasicConstraints:[
- CA:false
- PathLen: undefined
- ]
- [4]: ObjectId: 2.5.29.31 Criticality=false
- CRLDistributionPoints [
- [DistributionPoint:
- [URIName: http://crl.dptmt.company.de/idl.crl]
- ]]
- [5]: ObjectId: 2.5.29.37 Criticality=false
- ExtendedKeyUsages [
- clientAuth
- serverAuth
- ]
- [6]: ObjectId: 2.5.29.15 Criticality=false
- KeyUsage [
- DigitalSignature
- Key_Encipherment
- ]
- [7]: ObjectId: 2.5.29.17 Criticality=false
- SubjectAlternativeName [
- DNSName: localhost
- DNSName: 127.0.0.1
- DNSName: idlconnector.dptmt.company.de
- ]
- [8]: ObjectId: 2.5.29.14 Criticality=false
- SubjectKeyIdentifier [
- KeyIdentifier [
- 0000: C8 39 51 89 74 35 FF AB 07 38 12 79 C0 AA 8C 17 .9Q.t5...8.y....
- 0010: 22 D3 81 34 "..4
- ]
- ]
- ]
- Algorithm: [SHA256withRSA]
- Signature:
- 0000: 76 25 5E 9D B7 BB D6 C8 E7 01 A2 95 60 21 B9 35 v%^.........`!.5
- 0010: 06 C6 F2 C1 22 DE C6 69 AC 40 B8 85 1B A7 5F 70 ...."..i.@...._p
- 0020: AA 0D 51 FB 9A 8E 5C CC 5C A7 7D 91 36 C6 F5 B9 ..Q...\.\...6...
- 0030: FB 35 EA 9A D0 BD 78 FE 69 0C AA 27 49 16 9B 6D .5....x.i..'I..m
- 0040: 7E B6 A5 34 46 D5 39 BA 2C 5A 23 F5 5E 72 F7 F7 ...4F.9.,Z#.^r..
- 0050: 78 CC 69 13 92 C4 20 03 0E 96 A0 6F F6 A0 B6 59 x.i... ....o...Y
- 0060: E8 0F B6 AA B9 25 F5 A4 AC 53 BC AF DA 40 B2 18 .....%...S...@..
- 0070: 56 7C 83 01 BD 5A D2 F0 36 EB 0C 4B AE E7 B8 5B V....Z..6..K...[
- 0080: DA 5B 42 C9 74 34 51 AB C0 08 59 36 30 A6 A2 95 .[B.t4Q...Y60...
- 0090: EC E9 7F 45 AC 92 DB 84 2C 27 5B AB F1 34 22 22 ...E....,'[..4""
- 00A0: 69 97 C2 86 7D 73 DD 78 1B CB 69 A3 1D 4F 93 B2 i....s.x..i..O..
- 00B0: 8E 8E C3 1D 5F 28 C2 B4 0F 2F 1E A9 60 00 1C 79 ...._(.../..`..y
- 00C0: EB 64 09 AD CA 53 93 AE F5 3B B1 74 0B 16 D0 9C .d...S...;.t....
- 00D0: 8C 44 C8 04 9E 0C 52 43 EA B3 BC 41 D6 16 34 58 .D....RC...A..4X
- 00E0: A1 5E A9 A7 72 36 1E 82 19 CA 7B F1 70 7E B6 34 .^..r6......p..4
- 00F0: 0C 03 DF 9D B1 3B 41 F0 E0 57 E6 E8 46 9B BA 54 .....;A..W..F..T
- ]
- ***
- Found trusted certificate:
- [
- [
- Version: V3
- Subject: CN=idl SubCA 2016, O=company, C=DE
- Signature Algorithm: SHA256withRSA, OID = 1.2.840.113549.1.1.11
- Key: Sun RSA public key, 2048 bits
- modulus: 29592713333094074084405521037823049981181466361044737487147497446972695397366042809385215796726434326933328311370552988368577262436715209911460252556916177532248331501639229163197116023609912475774638379214957242743163757436548531470628253797542773277792032611514716529008453769107276618962360039917851964628381159346641234244662021379393522865453206571008312411743093720812772168885721198742765833949549228969123130434249156482546655634287072771189353189929032603395572035726582659528486073115654611181936722010038057842056847853582714129581066208289832891646598137623672292483867394307805797254240001299989088923941
- public exponent: 65537
- Validity: [From: Tue Oct 25 11:49:47 CEST 2016,
- To: Wed Oct 23 11:49:47 CEST 2024]
- Issuer: CN=idl Root CA 2016, O=company, C=DE
- SerialNumber: [ 01]
- Certificate Extensions: 6
- [1]: ObjectId: 1.3.6.1.5.5.7.1.1 Criticality=false
- AuthorityInfoAccess [
- [
- accessMethod: cklmsuers
- accessLocation: URIName: http://downloads.dptmt.company.de/rootcacert2016.cert
- ]
- ]
- [2]: ObjectId: 2.5.29.35 Criticality=false
- AuthorityKeyIdentifier [
- KeyIdentifier [
- 0000: 7B 98 1D B2 FF 81 B4 DB D8 C2 5F 1D 88 8A AD 1A .........._.....
- 0010: 52 2D 60 2C R-`,
- ]
- ]
- [3]: ObjectId: 2.5.29.19 Criticality=true
- BasicConstraints:[
- CA:true
- PathLen:2147483647
- ]
- [4]: ObjectId: 2.5.29.31 Criticality=false
- CRLDistributionPoints [
- [DistributionPoint:
- [URIName: http://crl.dptmt.company.de/idl.crl]
- ]]
- [5]: ObjectId: 2.5.29.15 Criticality=false
- KeyUsage [
- DigitalSignature
- Key_CertSign
- Crl_Sign
- ]
- [6]: ObjectId: 2.5.29.14 Criticality=false
- SubjectKeyIdentifier [
- KeyIdentifier [
- 0000: F3 85 C5 44 9F 10 A7 BE AF 8E 6C 54 73 07 31 CB ...D......lTs.1.
- 0010: FB 4F 73 81 .Os.
- ]
- ]
- ]
- Algorithm: [SHA256withRSA]
- Signature:
- 0000: 9D AF 8C 90 09 F3 51 1B F2 26 90 1D 71 97 40 8F ......Q..&..q.@.
- 0010: 1C F1 0A 67 D8 5E 81 23 49 ED AA A7 0C 91 74 68 ...g.^.#I.....th
- 0020: D6 93 5D B0 2E 8F 55 3B E4 63 AF 76 8A 28 84 8A ..]...U;.c.v.(..
- 0030: 31 35 50 2A 32 F4 DC F3 8E F9 AC 06 FE 2F FD EB 15P*2......../..
- 0040: F6 D9 01 77 62 F3 B2 3C 72 E0 8E 91 DE DE C3 2D ...wb..<r......-
- 0050: BC DC 1C 5E 4A A1 18 F7 3A 4C 83 BF C5 6B 78 0D ...^J...:L...kx.
- 0060: 96 A5 8C E9 B0 E5 E5 74 EA 94 C0 A6 02 77 46 7C .......t.....wF.
- 0070: 9D 73 E4 8D 80 4B 21 E9 0B 18 E3 E5 B8 43 76 51 .s...K!......CvQ
- 0080: 16 A1 B2 88 A0 68 AE 73 83 D8 5F B0 F0 A9 A9 20 .....h.s.._....
- 0090: BC 85 22 B1 AF 12 69 3A 7E 21 F7 7F 86 4F 6F D4 .."...i:.!...Oo.
- 00A0: 8C 97 90 64 3E F2 72 1C D6 92 0E 5E AA B1 5F 04 ...d>.r....^.._.
- 00B0: 5E 53 41 30 90 6C 5E CA C7 97 45 B5 2A 3E D2 F9 ^SA0.l^...E.*>..
- 00C0: 86 67 F5 2E 60 28 43 9C 5E 60 72 D2 B5 1D 9D 07 .g..`(C.^`r.....
- 00D0: 25 E3 1B 80 B5 9B DE BC 46 15 15 A9 85 6A 74 DC %.......F....jt.
- 00E0: 54 0E 3E ED A4 08 11 9E B5 5D 8C 87 C1 84 17 6C T.>......].....l
- 00F0: 6D 4D 66 95 C7 7A CB 1C C1 CC 8E 8C 29 E5 6D 71 mMf..z......).mq
- ]
- [read] MD5 and SHA1 hashes: len = 1156
- 0000: 0B 00 04 80 00 04 7D 00 04 7A 30 82 04 76 30 82 .........z0..v0.
- 0010: 03 5E A0 03 02 01 02 02 01 01 30 0D 06 09 2A 86 .^........0...*.
- 0020: 48 86 F7 0D 01 01 0B 05 00 30 3B 31 0B 30 09 06 H........0;1.0..
- 0030: 03 55 04 06 13 02 44 45 31 13 30 11 06 03 55 04 .U....DE1.0...U.
- 0040: 0A 0C 0A 46 72 61 75 6E 68 6F 66 65 72 31 17 30 ...company1.0
- 0050: 15 06 03 55 04 03 0C 0E 49 44 53 20 53 75 62 43 ...U....idl SubC
- 0060: 41 20 32 30 31 36 30 1E 17 0D 31 36 31 30 32 35 A 20160...161025
- 0070: 30 39 35 30 32 38 5A 17 0D 31 38 31 30 32 35 30 095028Z..1810250
- 0080: 39 35 30 32 38 5A 30 71 31 0B 30 09 06 03 55 04 95028Z0q1.0...U.
- 0090: 06 13 02 44 45 31 0F 30 0D 06 03 55 04 08 0C 06 ...DE1.0...U....
- 00A0: 42 61 79 65 72 6E 31 11 30 0F 06 03 55 04 07 0C Bayern1.0...U...
- 00B0: 08 4D 75 65 6E 63 68 65 6E 31 13 30 11 06 03 55 .Muenchen1.0...U
- 00C0: 04 0A 0C 0A 46 72 61 75 6E 68 6F 66 65 72 31 0E ....company1.
- 00D0: 30 0C 06 03 55 04 0B 0C 05 41 49 53 45 43 31 19 0...U....dptmt1.
- 00E0: 30 17 06 03 55 04 03 0C 10 41 49 53 45 43 20 49 0...U....dptmt I
- 00F0: 44 53 20 53 65 72 76 65 72 30 82 01 22 30 0D 06 DS Server0.."0..
- 0100: 09 2A 86 48 86 F7 0D 01 01 01 05 00 03 82 01 0F .*.H............
- 0110: 00 30 82 01 0A 02 82 01 01 00 C0 37 B8 49 EF 4D .0.........7.I.M
- 0120: 09 7D B5 53 E0 5B 8D 85 F4 2A 37 28 94 8B 67 DA ...S.[...*7(..g.
- 0130: 08 20 BC 34 0F 44 30 62 99 81 06 8E 81 4D 55 BE . .4.D0b.....MU.
- 0140: 5E 46 0C 58 7F 57 DE 13 BB C8 90 F6 E6 BD 82 C3 ^F.X.W..........
- 0150: 33 82 E4 D6 7D 46 46 10 BD 03 A9 35 9A F6 5E 16 3....FF....5..^.
- 0160: 33 22 20 48 85 93 B6 54 1B 13 E6 4E 9A 04 CF 61 3" H...T...N...a
- 0170: 85 4A 45 FA B8 73 04 42 F7 ED 87 2C BB 16 E6 D8 .JE..s.B...,....
- 0180: 55 ED 66 06 95 4D 76 24 03 01 EB 87 5A 9F 20 ED U.f..Mv$....Z. .
- 0190: C9 69 37 FC B9 C7 DD 3B 17 AA 26 11 09 45 0F BD .i7....;..&..E..
- 01A0: ED D7 6C 68 0F 36 74 08 BE 9A 8C 76 69 E9 5C A9 ..lh.6t....vi.\.
- 01B0: F1 97 3D 81 ED 67 A0 49 70 EE 0B 82 47 EC 95 73 ..=..g.Ip...G..s
- 01C0: 02 E8 EC 04 45 85 5C D6 8E 46 BE 89 17 B1 80 C5 ....E.\..F......
- 01D0: 6F 7F B4 7A 88 6C C4 58 5E EE EA 89 00 D3 1B 03 o..z.l.X^.......
- 01E0: AE C6 1D 59 18 AB 76 3C 12 3D BD EB 40 6C A3 6D ...Y..v<.=..@l.m
- 01F0: D0 96 CA 84 C5 EC 3A E0 98 E9 18 29 A0 7B 7B 2D ......:....)...-
- 0200: A5 F5 AA D8 07 E4 E6 5A 25 80 81 35 35 E0 0F 94 .......Z%..55...
- 0210: EE 9E 55 51 B6 A7 D4 78 E3 77 02 03 01 00 01 A3 ..UQ...x.w......
- 0220: 82 01 4D 30 82 01 49 30 1D 06 03 55 1D 0E 04 16 ..M0..I0...U....
- 0230: 04 14 C8 39 51 89 74 35 FF AB 07 38 12 79 C0 AA ...9Q.t5...8.y..
- 0240: 8C 17 22 D3 81 34 30 1F 06 03 55 1D 23 04 18 30 .."..40...U.#..0
- 0250: 16 80 14 F3 85 C5 44 9F 10 A7 BE AF 8E 6C 54 73 ......D......lTs
- 0260: 07 31 CB FB 4F 73 81 30 09 06 03 55 1D 13 04 02 .1..Os.0...U....
- 0270: 30 00 30 0B 06 03 55 1D 0F 04 04 03 02 05 A0 30 0.0...U........0
- 0280: 37 06 03 55 1D 1F 04 30 30 2E 30 2C A0 2A A0 28 7..U...00.0,.*.(
- 0290: 86 26 68 74 74 70 3A 2F 2F 63 72 6C 2E 61 69 73 .&http://crl.klm
- 02A0: 65 63 2E 66 72 61 75 6E 68 6F 66 65 72 2E 64 65 ec.company.de
- 02B0: 2F 69 64 73 2E 63 72 6C 30 54 06 08 2B 06 01 05 /idl.crl0T..+...
- 02C0: 05 07 01 01 04 48 30 46 30 44 06 08 2B 06 01 05 .....H0F0D..+...
- 02D0: 05 07 30 02 86 38 68 74 74 70 3A 2F 2F 64 6F 77 ..0..8http://dow
- 02E0: 6E 6C 6F 61 64 73 2E 61 69 73 65 63 2E 66 72 61 nloads.dptmt.com
- 02F0: 75 6E 68 6F 66 65 72 2E 64 65 2F 72 6F 6F 74 63 pany,...de/rootc
- 0300: 61 63 65 72 74 32 30 31 36 2E 63 65 72 74 30 1D acert2016.cert0.
- 0310: 06 03 55 1D 25 04 16 30 14 06 08 2B 06 01 05 05 ..U.%..0...+....
- 0320: 07 03 02 06 08 2B 06 01 05 05 07 03 01 30 41 06 .....+.......0A.
- 0330: 03 55 1D 11 04 3A 30 38 82 09 6C 6F 63 61 6C 68 .U...:08..localh
- 0340: 6F 73 74 82 09 31 32 37 2E 30 2E 30 2E 31 82 20 ost..127.0.0.1.
- 0350: 69 64 73 63 6F 6E 6E 65 63 74 6F 72 2E 61 69 73 idlconnector.klm
- 0360: 65 63 2E 66 72 61 75 6E 68 6F 66 65 72 2E 64 65 ec.company.de
- 0370: 30 0D 06 09 2A 86 48 86 F7 0D 01 01 0B 05 00 03 0...*.H.........
- 0380: 82 01 01 00 76 25 5E 9D B7 BB D6 C8 E7 01 A2 95 ....v%^.........
- 0390: 60 21 B9 35 06 C6 F2 C1 22 DE C6 69 AC 40 B8 85 `!.5...."..i.@..
- 03A0: 1B A7 5F 70 AA 0D 51 FB 9A 8E 5C CC 5C A7 7D 91 .._p..Q...\.\...
- 03B0: 36 C6 F5 B9 FB 35 EA 9A D0 BD 78 FE 69 0C AA 27 6....5....x.i..'
- 03C0: 49 16 9B 6D 7E B6 A5 34 46 D5 39 BA 2C 5A 23 F5 I..m...4F.9.,Z#.
- 03D0: 5E 72 F7 F7 78 CC 69 13 92 C4 20 03 0E 96 A0 6F ^r..x.i... ....o
- 03E0: F6 A0 B6 59 E8 0F B6 AA B9 25 F5 A4 AC 53 BC AF ...Y.....%...S..
- 03F0: DA 40 B2 18 56 7C 83 01 BD 5A D2 F0 36 EB 0C 4B .@..V....Z..6..K
- 0400: AE E7 B8 5B DA 5B 42 C9 74 34 51 AB C0 08 59 36 ...[.[B.t4Q...Y6
- 0410: 30 A6 A2 95 EC E9 7F 45 AC 92 DB 84 2C 27 5B AB 0......E....,'[.
- 0420: F1 34 22 22 69 97 C2 86 7D 73 DD 78 1B CB 69 A3 .4""i....s.x..i.
- 0430: 1D 4F 93 B2 8E 8E C3 1D 5F 28 C2 B4 0F 2F 1E A9 .O......_(.../..
- 0440: 60 00 1C 79 EB 64 09 AD CA 53 93 AE F5 3B B1 74 `..y.d...S...;.t
- 0450: 0B 16 D0 9C 8C 44 C8 04 9E 0C 52 43 EA B3 BC 41 .....D....RC...A
- 0460: D6 16 34 58 A1 5E A9 A7 72 36 1E 82 19 CA 7B F1 ..4X.^..r6......
- 0470: 70 7E B6 34 0C 03 DF 9D B1 3B 41 F0 E0 57 E6 E8 p..4.....;A..W..
- 0480: 46 9B BA 54 F..T
- *** ECDH ServerKeyExchange
- Signature Algorithm SHA512withRSA
- Server key: Sun EC public key, 256 bits
- public x coord: 28847400382242897438936230468661390225193273270317541849731947641016598202380
- public y coord: 44672647556933576846980891280419719564112470643460642037901420136126664747387
- parameters: secp256r1 [NIST P-256, X9.62 prime256v1] (1.2.840.10045.3.1.7)
- [read] MD5 and SHA1 hashes: len = 333
- 0000: 0C 00 01 49 03 00 17 41 04 3F C7 0C CD 4A A5 00 ...I...A.?...J..
- 0010: FD 6A 97 D3 54 E2 B2 6A BB 07 CD E0 31 18 95 AB .j..T..j....1...
- 0020: DE A8 14 FC 94 29 19 08 0C 62 C3 D2 8E DB 50 51 .....)...b....PQ
- 0030: 98 E7 98 19 38 9A 5B 8A 14 90 7A 1E A1 3C B7 EF ....8.[...z..<..
- 0040: 9F 13 5C 39 93 7D 3D 29 7B 06 01 01 00 7F 30 74 ..\9..=)......0t
- 0050: 59 CA CC DD 39 F2 BC D4 AF 02 F8 79 EF 22 46 69 Y...9......y."Fi
- 0060: 87 8E DF 1E E9 C4 19 AA DD 01 E8 B2 0F D2 CB A9 ................
- 0070: CA 5F 9E B3 B0 C6 D4 8E BB FD F1 8F E5 50 4E F2 ._...........PN.
- 0080: A3 6C 43 94 2B 8D E3 5D 58 01 7B 12 41 E9 E9 61 .lC.+..]X...A..a
- 0090: 81 0B 26 16 42 02 37 C6 FD 15 E7 88 A2 82 09 C3 ..&.B.7.........
- 00A0: A4 09 FF A9 6F 1E 40 02 D0 1A 54 94 B5 E8 C6 1E ....o.@...T.....
- 00B0: A6 63 8D 86 E8 A8 AD FA B9 07 3F 0E 81 F8 F0 7D .c........?.....
- 00C0: D4 6D 8A CD F5 22 AB 2F 77 94 0A 7C 3F F7 F0 E7 .m..."./w...?...
- 00D0: 82 CD 1F AB 5F 08 FF 9A 24 B3 BC 6C CD A0 16 FA ...._...$..l....
- 00E0: A9 4F E7 A9 CB D9 AD BA 9C 2D A6 03 F4 F0 48 5F .O.......-....H_
- 00F0: 1E 70 31 34 99 65 2F 70 58 59 8C 7A A9 09 29 30 .p14.e/pXY.z..)0
- 0100: 18 7B 29 79 DB 15 12 B1 25 C9 A5 37 FC 84 20 23 ..)y....%..7.. #
- 0110: 65 1F E0 EF 67 CC 66 01 1E 81 C7 94 FC C0 99 F7 e...g.f.........
- 0120: FB 2D 61 1B 63 70 2A 24 3A 64 D2 F2 5A C8 FC C1 .-a.cp*$:d..Z...
- 0130: 74 44 76 86 19 76 97 3D FB A9 C9 F1 65 BF 16 6F tDv..v.=....e..o
- 0140: 2B CA D7 78 97 B0 DC 6C E9 1A F0 BD E2 +..x...l.....
- *** CertificateRequest
- Cert Types: RSA, DSS, ECDSA
- Supported Signature Algorithms: SHA512withECDSA, SHA512withRSA, SHA384withECDSA, SHA384withRSA, SHA256withECDSA, SHA256withRSA, SHA256withDSA, SHA224withECDSA, SHA224withRSA, SHA224withDSA, SHA1withECDSA, SHA1withRSA, SHA1withDSA
- Cert Authorities:
- <CN=idl Root CA 2016, O=company, C=DE>
- <CN=idl SubCA 2016, O=company, C=DE>
- [read] MD5 and SHA1 hashes: len = 166
- 0000: 0D 00 00 A2 03 01 02 40 00 1A 06 03 06 01 05 03 .......@........
- 0010: 05 01 04 03 04 01 04 02 03 03 03 01 03 02 02 03 ................
- 0020: 02 01 02 02 00 80 00 3F 30 3D 31 0B 30 09 06 03 .......?0=1.0...
- 0030: 55 04 06 13 02 44 45 31 13 30 11 06 03 55 04 0A U....DE1.0...U..
- 0040: 0C 0A 46 72 61 75 6E 68 6F 66 65 72 31 19 30 17 ..company1.0.
- 0050: 06 03 55 04 03 0C 10 49 44 53 20 52 6F 6F 74 20 ..U....idl Root
- 0060: 43 41 20 32 30 31 36 00 3D 30 3B 31 0B 30 09 06 CA 2016.=0;1.0..
- 0070: 03 55 04 06 13 02 44 45 31 13 30 11 06 03 55 04 .U....DE1.0...U.
- 0080: 0A 0C 0A 46 72 61 75 6E 68 6F 66 65 72 31 17 30 ...company1.0
- 0090: 15 06 03 55 04 03 0C 0E 49 44 53 20 53 75 62 43 ...U....idl SubC
- 00A0: 41 20 32 30 31 36 A 2016
- *** ServerHelloDone
- [read] MD5 and SHA1 hashes: len = 4
- 0000: 0E 00 00 00 ....
- Warning: no suitable certificate found - continuing without client authentication
- *** Certificate chain
- <Empty>
- ***
- *** ECDHClientKeyExchange
- ECDH Public value: { 4, 91, 248, 212, 145, 28, 169, 178, 48, 172, 129, 243, 170, 16, 140, 69, 215, 44, 8, 159, 191, 180, 48, 86, 203, 58, 158, 147, 139, 22, 20, 147, 67, 224, 102, 23, 172, 145, 89, 82, 8, 194, 175, 6, 126, 196, 231, 108, 184, 110, 115, 10, 89, 105, 100, 164, 178, 190, 255, 192, 248, 0, 234, 76, 67 }
- [write] MD5 and SHA1 hashes: len = 77
- 0000: 0B 00 00 03 00 00 00 10 00 00 42 41 04 5B F8 D4 ..........BA.[..
- 0010: 91 1C A9 B2 30 AC 81 F3 AA 10 8C 45 D7 2C 08 9F ....0......E.,..
- 0020: BF B4 30 56 CB 3A 9E 93 8B 16 14 93 43 E0 66 17 ..0V.:......C.f.
- 0030: AC 91 59 52 08 C2 AF 06 7E C4 E7 6C B8 6E 73 0A ..YR.......l.ns.
- 0040: 59 69 64 A4 B2 BE FF C0 F8 00 EA 4C 43 Yid........LC
- New I/O worker #1, WRITE: TLSv1.2 Handshake, length = 77
- SESSION KEYGEN:
- PreMaster Secret:
- 0000: B7 E4 F1 C6 4C F2 E2 C4 83 17 49 81 ED 18 3F BE ....L.....I...?.
- 0010: BA A9 F2 63 81 5F 39 4F 46 85 2C 23 B4 C9 F3 F4 ...c._9OF.,#....
- CONNECTION KEYGEN:
- Client Nonce:
- 0000: 58 20 30 16 76 66 73 6C CC 1F E5 12 29 A9 B0 13 X 0.vfsl....)...
- 0010: 77 85 51 80 3A 2F 60 04 FF 82 B9 12 55 9D 38 29 w.Q.:/`.....U.8)
- Server Nonce:
- 0000: 58 20 30 17 20 24 FD 8F E0 AA B7 82 9C BB 8A A3 X 0. $..........
- 0010: 96 83 FC 15 3B 80 29 4C B1 28 0A 8A 8D 74 A8 9F ....;.)L.(...t..
- Master Secret:
- 0000: 4B 95 CF C8 DA 90 BE 17 95 32 1F 50 7B 5B 5D 33 K........2.P.[]3
- 0010: 05 40 23 D0 9B 8A 61 D3 22 18 8C E9 F0 26 D2 1A .@#...a."....&..
- 0020: 8F 8A 71 71 49 65 F8 1A 93 EA D3 39 BF 77 83 00 ..qqIe.....9.w..
- Client MAC write Secret:
- 0000: DE A3 75 B1 57 58 B1 4A AB 47 96 48 5F 9A 8E 58 ..u.WX.J.G.H_..X
- 0010: 64 41 ED E4 42 5C A8 7C D5 7D F1 44 3B 86 7B DC dA..B\.....D;...
- 0020: 6A 39 40 5A 7B 0C E8 CD 29 C3 88 91 61 86 AD 62 j9@Z....)...a..b
- Server MAC write Secret:
- 0000: 8E 93 9C A8 CA A1 C8 48 6E 58 E5 DD 6E 76 F6 95 .......HnX..nv..
- 0010: E0 9B E4 23 F5 70 C3 E2 47 8D 8D 2D F6 59 50 2C ...#.p..G..-.YP,
- 0020: D7 42 A0 45 E4 44 3B 41 FB 8A EA 62 EA EC FB 55 .B.E.D;A...b...U
- Client write key:
- 0000: 3F 16 FF 03 20 0B 27 CA 41 F6 9F E2 BD 6E DC 34 ?... .'.A....n.4
- 0010: 37 C0 31 0D 89 2D 5D F2 0B F0 42 29 6D 49 5A 45 7.1..-]...B)mIZE
- Server write key:
- 0000: 41 5D D5 66 2D E1 89 E5 54 6D 21 F3 BF 1B 39 B8 A].f-...Tm!...9.
- 0010: 97 63 48 2A 5C C8 64 34 18 E6 D7 28 FC 7E 8B 35 .cH*\.d4...(...5
- ... no IV derived for this protocol
- New I/O worker #1, WRITE: TLSv1.2 Change Cipher Spec, length = 1
- *** Finished
- verify_data: { 99, 243, 110, 215, 154, 6, 238, 190, 185, 65, 205, 89 }
- ***
- [write] MD5 and SHA1 hashes: len = 16
- 0000: 14 00 00 0C 63 F3 6E D7 9A 06 EE BE B9 41 CD 59 ....c.n......A.Y
- Padded plaintext before ENCRYPTION: len = 96
- 0000: F9 FF 92 76 B6 92 42 3C 8B A2 65 66 F9 E3 8C 88 ...v..B<..ef....
- 0010: 14 00 00 0C 63 F3 6E D7 9A 06 EE BE B9 41 CD 59 ....c.n......A.Y
- 0020: 11 12 9F 5F AA BA D6 7E BE 9F 64 E4 CE 8B 7C AF ..._......d.....
- 0030: 38 91 95 33 DA F5 04 FA 60 58 79 DD E7 00 67 48 8..3....`Xy...gH
- 0040: E5 2F 65 C0 3B 9E BF E2 88 5F AA BA 8D A0 EE F6 ./e.;...._......
- 0050: 0F 0F 0F 0F 0F 0F 0F 0F 0F 0F 0F 0F 0F 0F 0F 0F ................
- New I/O worker #1, WRITE: TLSv1.2 Handshake, length = 96
- [Raw write]: length = 82
- 0000: 16 03 03 00 4D 0B 00 00 03 00 00 00 10 00 00 42 ....M..........B
- 0010: 41 04 5B F8 D4 91 1C A9 B2 30 AC 81 F3 AA 10 8C A.[......0......
- 0020: 45 D7 2C 08 9F BF B4 30 56 CB 3A 9E 93 8B 16 14 E.,....0V.:.....
- 0030: 93 43 E0 66 17 AC 91 59 52 08 C2 AF 06 7E C4 E7 .C.f...YR.......
- 0040: 6C B8 6E 73 0A 59 69 64 A4 B2 BE FF C0 F8 00 EA l.ns.Yid........
- 0050: 4C 43 LC
- 08:41:11.655 [CamelJettyWebSocketServer-31-selector-ServerConnectorManager@3fcdcf/0] DEBUG org.eclipse.jetty.io.SelectorManager - Selector loop woken up from select, 1/1 selected
- 08:41:11.655 [CamelJettyWebSocketServer-31-selector-ServerConnectorManager@3fcdcf/0] DEBUG org.eclipse.jetty.io.SelectChannelEndPoint - Key interests updated 1 -> 0 on SelectChannelEndPoint@37823e21{/127.0.0.1:37052<->9292,Open,in,out,R,-,177/30000,SslConnection}{io=1,kio=0,kro=1}
- 08:41:11.655 [CamelJettyWebSocketServer-31-selector-ServerConnectorManager@3fcdcf/0] DEBUG org.eclipse.jetty.io.SelectChannelEndPoint - Local interests updating 1 -> 0 for SelectChannelEndPoint@37823e21{/127.0.0.1:37052<->9292,Open,in,out,R,-,177/30000,SslConnection}{io=0,kio=0,kro=1}
- 08:41:11.655 [CamelJettyWebSocketServer-31-selector-ServerConnectorManager@3fcdcf/0] DEBUG org.eclipse.jetty.io.SelectorManager - Queued change org.eclipse.jetty.io.SelectChannelEndPoint$1@431394e9
- 08:41:11.655 [CamelJettyWebSocketServer-31-selector-ServerConnectorManager@3fcdcf/0] DEBUG org.eclipse.jetty.io.AbstractConnection - FILL_INTERESTED-->FILLING SslConnection@3c4546fe{NEED_UNWRAP,eio=-1/-1,di=-1} -> HttpConnection@80ef4f3[FILL_INTERESTED,DecryptedEndPoint@4f49498{/127.0.0.1:37052<->9292,Open,in,out,R,-,178/30000,HttpConnection}->SelectChannelEndPoint@37823e21{/127.0.0.1:37052<->9292,Open,in,out,-,-,177/30000,SslConnection}{io=0,kio=0,kro=1}][p=HttpParser{s=START,0 of 0},g=HttpGenerator{s=START},c=HttpChannelOverHttp@40d049f5{r=0,c=false,a=IDLE,uri=}]
- 08:41:11.655 [CamelJettyWebSocketServer-31-selector-ServerConnectorManager@3fcdcf/0] DEBUG org.eclipse.jetty.io.ssl.SslConnection - onFillable enter DecryptedEndPoint@4f49498{/127.0.0.1:37052<->9292,Open,in,out,R,-,178/30000,HttpConnection}->SelectChannelEndPoint@37823e21{/127.0.0.1:37052<->9292,Open,in,out,-,-,177/30000,SslConnection}{io=0,kio=0,kro=1}
- 08:41:11.655 [CamelJettyWebSocketServer-31-selector-ServerConnectorManager@3fcdcf/0] DEBUG org.eclipse.jetty.io.AbstractConnection - FILL_INTERESTED-->FILLING HttpConnection@80ef4f3[FILLING,DecryptedEndPoint@4f49498{/127.0.0.1:37052<->9292,Open,in,out,-,-,178/30000,HttpConnection}->SelectChannelEndPoint@37823e21{/127.0.0.1:37052<->9292,Open,in,out,-,-,177/30000,SslConnection}{io=0,kio=0,kro=1}][p=HttpParser{s=START,0 of 0},g=HttpGenerator{s=START},c=HttpChannelOverHttp@40d049f5{r=0,c=false,a=IDLE,uri=}]
- 08:41:11.655 [CamelJettyWebSocketServer-31-selector-ServerConnectorManager@3fcdcf/0] DEBUG org.eclipse.jetty.io.ssl.SslConnection - onFillable exit DecryptedEndPoint@4f49498{/127.0.0.1:37052<->9292,Open,in,out,-,-,178/30000,HttpConnection}->SelectChannelEndPoint@37823e21{/127.0.0.1:37052<->9292,Open,in,out,-,-,177/30000,SslConnection}{io=0,kio=0,kro=1}
- 08:41:11.656 [CamelJettyWebSocketServer-31-selector-ServerConnectorManager@3fcdcf/0] DEBUG org.eclipse.jetty.io.AbstractConnection - FILLING-->IDLE SslConnection@3c4546fe{NEED_UNWRAP,eio=-1/-1,di=-1} -> HttpConnection@80ef4f3[FILLING,DecryptedEndPoint@4f49498{/127.0.0.1:37052<->9292,Open,in,out,-,-,178/30000,HttpConnection}->SelectChannelEndPoint@37823e21{/127.0.0.1:37052<->9292,Open,in,out,-,-,177/30000,SslConnection}{io=0,kio=0,kro=1}][p=HttpParser{s=START,0 of 0},g=HttpGenerator{s=START},c=HttpChannelOverHttp@40d049f5{r=0,c=false,a=IDLE,uri=}]
- 08:41:11.656 [CamelJettyWebSocketServer-31-selector-ServerConnectorManager@3fcdcf/0] DEBUG org.eclipse.jetty.io.SelectorManager - Running change org.eclipse.jetty.io.SelectChannelEndPoint$1@431394e9
- 08:41:11.656 [CamelJettyWebSocketServer-31-selector-ServerConnectorManager@3fcdcf/0] DEBUG org.eclipse.jetty.io.SelectorManager - Selector loop waiting on select
- 08:41:11.656 [CamelJettyWebSocketServer-40] DEBUG org.eclipse.jetty.server.HttpConnection - HttpConnection@80ef4f3[FILLING,DecryptedEndPoint@4f49498{/127.0.0.1:37052<->9292,Open,in,out,-,-,178/30000,HttpConnection}->SelectChannelEndPoint@37823e21{/127.0.0.1:37052<->9292,Open,in,out,-,-,177/30000,SslConnection}{io=0,kio=0,kro=1}][p=HttpParser{s=START,0 of 0},g=HttpGenerator{s=START},c=HttpChannelOverHttp@40d049f5{r=0,c=false,a=IDLE,uri=}] onFillable HttpChannelState@772152e{s=IDLE i=true a=null}
- 08:41:11.656 [CamelJettyWebSocketServer-40] DEBUG org.eclipse.jetty.io.ssl.SslConnection - SslConnection@3c4546fe{NEED_UNWRAP,eio=-1/-1,di=-1} -> HttpConnection@80ef4f3[FILLING,DecryptedEndPoint@4f49498{/127.0.0.1:37052<->9292,Open,in,out,-,-,179/30000,HttpConnection}->SelectChannelEndPoint@37823e21{/127.0.0.1:37052<->9292,Open,in,out,-,-,178/30000,SslConnection}{io=0,kio=0,kro=1}][p=HttpParser{s=START,0 of 0},g=HttpGenerator{s=START},c=HttpChannelOverHttp@40d049f5{r=0,c=false,a=IDLE,uri=}] fill enter
- 08:41:11.656 [CamelJettyWebSocketServer-40] DEBUG org.eclipse.jetty.io.ChannelEndPoint - filled 82 SelectChannelEndPoint@37823e21{/127.0.0.1:37052<->9292,Open,in,out,-,-,178/30000,SslConnection}{io=0,kio=0,kro=1}
- [Raw write]: length = 6
- 0000: 14 03 03 00 01 01 ......
- [Raw write]: length = 101
- 0000: 16 03 03 00 60 A5 F0 52 24 AD 16 62 01 87 73 1E ....`..R$..b..s.
- 0010: 82 F2 C8 7D 18 C0 5C D1 D0 58 BC 13 0D 9B 5F EF ......\..X...._.
- 0020: 56 93 1B 66 8E B1 F1 8F 82 8E 9B 64 84 A4 85 21 V..f.......d...!
- 0030: F8 BF B1 7A 14 68 64 E2 09 A5 BC 68 0A D3 96 AF ...z.hd....h....
- 0040: 97 FA 91 A1 F5 5E D6 BF F1 EE 39 FB E3 DD 27 16 .....^....9...'.
- 0050: A5 66 86 FD 4C 08:41:11.656 [CamelJettyWebSocketServer-40] DEBUG org.eclipse.jetty.io.ssl.SslConnection - SslConnection@3c4546fe{NEED_UNWRAP,eio=82/-1,di=-1} -> HttpConnection@80ef4f3[FILLING,DecryptedEndPoint@4f49498{/127.0.0.1:37052<->9292,Open,in,out,-,-,179/30000,HttpConnection}->SelectChannelEndPoint@37823e21{/127.0.0.1:37052<->9292,Open,in,out,-,-,0/30000,SslConnection}{io=0,kio=0,kro=1}][p=HttpParser{s=START,0 of 0},g=HttpGenerator{s=START},c=HttpChannelOverHttp@40d049f5{r=0,c=false,a=IDLE,uri=}] filled 82 encrypted bytes
- E5 28 74 84 36 9F 56 D8 11 0C 38 .f..L.(t.6.V...8
- 0060: 38 2C AC 97 6C [Raw read]: length = 5
- 8,..l
- 0000: 16 03 03 00 4D ....M
- [Raw read]: length = 77
- 0000: 0B 00 00 03 00 00 00 10 00 00 42 41 04 5B F8 D4 ..........BA.[..
- 0010: 91 1C A9 B2 30 AC 81 F3 AA 10 8C 45 D7 2C 08 9F ....0......E.,..
- 0020: BF B4 30 56 CB 3A 9E 93 8B 16 14 93 43 E0 66 17 ..0V.:......C.f.
- 0030: AC 91 59 52 08 C2 AF 06 7E C4 E7 6C B8 6E 73 0A ..YR.......l.ns.
- 0040: 59 69 64 A4 B2 BE FF C0 F8 00 EA 4C 43 Yid........LC
- CamelJettyWebSocketServer-40, READ: TLSv1.2 Handshake, length = 77
- 08:41:11.666 [CamelJettyWebSocketServer-40] DEBUG org.eclipse.jetty.io.ssl.SslConnection - SslConnection@3c4546fe{NEED_TASK,eio=0/-1,di=-1} -> HttpConnection@80ef4f3[FILLING,DecryptedEndPoint@4f49498{/127.0.0.1:37052<->9292,Open,in,out,-,-,189/30000,HttpConnection}->SelectChannelEndPoint@37823e21{/127.0.0.1:37052<->9292,Open,in,out,-,-,10/30000,SslConnection}{io=0,kio=0,kro=1}][p=HttpParser{s=START,0 of 0},g=HttpGenerator{s=START},c=HttpChannelOverHttp@40d049f5{r=0,c=false,a=IDLE,uri=}] unwrap Status = OK HandshakeStatus = NEED_TASK
- bytesConsumed = 82 bytesProduced = 0
- *** Certificate chain
- <Empty>
- ***
- CamelJettyWebSocketServer-40, fatal error: 42: null cert chain
- javax.net.ssl.SSLHandshakeException: null cert chain
- %% Invalidated: [Session-1, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384]
- CamelJettyWebSocketServer-40, SEND TLSv1.2 ALERT: fatal, description = bad_certificate
- CamelJettyWebSocketServer-40, WRITE: TLSv1.2 Alert, length = 2
- CamelJettyWebSocketServer-40, fatal: engine already closed. Rethrowing javax.net.ssl.SSLHandshakeException: null cert chain
- 08:41:11.667 [CamelJettyWebSocketServer-40] DEBUG org.eclipse.jetty.io.AbstractEndPoint - onClose SelectChannelEndPoint@37823e21{/127.0.0.1:37052<->9292,CLOSED,in,out,-,-,11/30000,SslConnection}{io=0,kio=0,kro=1}
- 08:41:11.667 [CamelJettyWebSocketServer-40] DEBUG org.eclipse.jetty.io.ChannelEndPoint - close SelectChannelEndPoint@37823e21{/127.0.0.1:37052<->9292,CLOSED,in,out,-,-,11/30000,SslConnection}{io=0,kio=0,kro=1}
- 08:41:11.668 [CamelJettyWebSocketServer-40] DEBUG org.eclipse.jetty.io.SelectorManager - Destroyed SelectChannelEndPoint@37823e21{/127.0.0.1:37052<->9292,CLOSED,ISHUT,OSHUT,-,-,12/30000,SslConnection}{io=0,kio=-1,kro=-1}
- 08:41:11.669 [New I/O worker #1] DEBUG com.ning.http.client.providers.netty.handler.Processor - Unexpected I/O exception on channel [id: 0x4ff2cb8f, /127.0.0.1:37052 => localhost/127.0.0.1:9292]
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement