Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Using SSLEngineImpl.
- Allow unsafe renegotiation: true
- Allow legacy hello messages: true
- Is initial handshake: true
- Is secure renegotiation: false
- Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1
- Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLSv1
- Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 for TLSv1
- Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1
- Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 for TLSv1
- Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1
- Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1
- Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1.1
- Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLSv1.1
- Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1
- Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1.1
- Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 for TLSv1.1
- Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1
- Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1.1
- [Raw read]: length = 5
- 0000: 16 03 03 00 AD .....
- [Raw read]: length = 173
- 0000: 01 00 00 A9 03 03 56 D7 34 F6 2B C5 42 5D 66 DC ......V.4.+.B]f.
- 0010: 60 B8 FA 71 AA 01 6B 79 11 EC 33 5F BC 5A 58 8F `..q..ky..3_.ZX.
- 0020: 7E F2 62 C5 B3 B4 00 00 34 C0 28 C0 27 C0 14 C0 ..b.....4.(.'...
- 0030: 13 00 9F 00 9E 00 9D 00 9C 00 3D 00 3C 00 35 00 ..........=.<.5.
- 0040: 2F C0 2C C0 2B C0 24 C0 23 C0 0A C0 09 00 6A 00 /.,.+.$.#.....j.
- 0050: 40 00 38 00 32 00 0A 00 13 00 05 00 04 01 00 00 @.8.2...........
- 0060: 4C 00 00 00 17 00 15 00 00 12 6B 6F 61 6C 61 2E L.........hostname.
- 0070: 63 73 67 69 63 6F 72 70 2E 63 6F 6D 00 0A 00 06 domainname.com....
- 0080: 00 04 00 17 00 18 00 0B 00 02 01 00 00 0D 00 14 ................
- 0090: 00 12 06 01 06 03 04 01 05 01 02 01 04 03 05 03 ................
- 00A0: 02 03 02 02 00 17 00 00 FF 01 00 01 00 .............
- catalina-exec-1, READ: TLSv1.2 Handshake, length = 173
- *** ClientHello, TLSv1.2
- RandomCookie: GMT: 1440166902 bytes = { 43, 197, 66, 93, 102, 220, 96, 184, 250, 113, 170, 1, 107, 121, 17, 236, 51, 95, 188, 90, 88, 143, 126, 242, 98, 197, 179, 180 }
- Session ID: {}
- Cipher Suites: [TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, TLS_RSA_WITH_AES_256_GCM_SHA384, TLS_RSA_WITH_AES_128_GCM_SHA256, TLS_RSA_WITH_AES_256_CBC_SHA256, TLS_RSA_WITH_AES_128_CBC_SHA256, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_256_CBC_SHA256, TLS_DHE_DSS_WITH_AES_128_CBC_SHA256, TLS_DHE_DSS_WITH_AES_256_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_RC4_128_SHA, SSL_RSA_WITH_RC4_128_MD5]
- Compression Methods: { 0 }
- Extension server_name, server_name: [type=host_name (0), value=hostname.domainname.com]
- Extension elliptic_curves, curve names: {secp256r1, secp384r1}
- Extension ec_point_formats, formats: [uncompressed]
- Extension signature_algorithms, signature_algorithms: SHA512withRSA, SHA512withECDSA, SHA256withRSA, SHA384withRSA, SHA1withRSA, SHA256withECDSA, SHA384withECDSA, SHA1withECDSA, SHA1withDSA
- Unsupported extension type_23, data:
- Extension renegotiation_info, renegotiated_connection: <empty>
- ***
- [read] MD5 and SHA1 hashes: len = 173
- 0000: 01 00 00 A9 03 03 56 D7 34 F6 2B C5 42 5D 66 DC ......V.4.+.B]f.
- 0010: 60 B8 FA 71 AA 01 6B 79 11 EC 33 5F BC 5A 58 8F `..q..ky..3_.ZX.
- 0020: 7E F2 62 C5 B3 B4 00 00 34 C0 28 C0 27 C0 14 C0 ..b.....4.(.'...
- 0030: 13 00 9F 00 9E 00 9D 00 9C 00 3D 00 3C 00 35 00 ..........=.<.5.
- 0040: 2F C0 2C C0 2B C0 24 C0 23 C0 0A C0 09 00 6A 00 /.,.+.$.#.....j.
- 0050: 40 00 38 00 32 00 0A 00 13 00 05 00 04 01 00 00 @.8.2...........
- 0060: 4C 00 00 00 17 00 15 00 00 12 6B 6F 61 6C 61 2E L.........hostname.
- 0070: 63 73 67 69 63 6F 72 70 2E 63 6F 6D 00 0A 00 06 domainname.com....
- 0080: 00 04 00 17 00 18 00 0B 00 02 01 00 00 0D 00 14 ................
- 0090: 00 12 06 01 06 03 04 01 05 01 02 01 04 03 05 03 ................
- 00A0: 02 03 02 02 00 17 00 00 FF 01 00 01 00 .............
- %% Initialized: [Session-1, SSL_NULL_WITH_NULL_NULL]
- catalina-exec-1, fatal error: 40: no cipher suites in common
- javax.net.ssl.SSLHandshakeException: no cipher suites in common
- %% Invalidated: [Session-1, SSL_NULL_WITH_NULL_NULL]
- catalina-exec-1, SEND TLSv1.2 ALERT: fatal, description = handshake_failure
- catalina-exec-1, WRITE: TLSv1.2 Alert, length = 2
- catalina-exec-1, fatal: engine already closed. Rethrowing javax.net.ssl.SSLHandshakeException: no cipher suites in common
- [Raw write]: length = 7
- 0000: 15 03 03 00 02 02 28 ......(
- catalina-exec-1, called closeOutbound()
- catalina-exec-1, closeOutboundInternal()
Add Comment
Please, Sign In to add comment