Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Allow unsafe renegotiation: false
- Allow legacy hello messages: true
- Is initial handshake: true
- Is secure renegotiation: false
- http-bio-8443-Acceptor-0, setSoTimeout(60000) called
- Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1
- Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 for TLSv1
- Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLSv1
- Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1
- Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1.1
- Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 for TLSv1.1
- Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLSv1.1
- Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1.1
- http-bio-8443-exec-11, READ: TLSv1 Handshake, length = 205
- http-bio-8443-exec-11, handling exception: javax.net.ssl.SSLProtocolException: Illegal server name, type=host_name(0), name=localhost., value=6c:6f:63:61:6c:68:6f:73:74:2e
- http-bio-8443-exec-11, SEND TLSv1.2 ALERT: fatal, description = unexpected_message
- http-bio-8443-exec-11, WRITE: TLSv1.2 Alert, length = 2
- http-bio-8443-exec-11, called closeSocket()
- http-bio-8443-exec-11, IOException in getSession(): javax.net.ssl.SSLProtocolException: Illegal server name, type=host_name(0), name=localhost., value=6c:6f:63:61:6c:68:6f:73:74:2e
- http-bio-8443-exec-11, called close()
- http-bio-8443-exec-11, called closeInternal(true)
- Allow unsafe renegotiation: false
- Allow legacy hello messages: true
- Is initial handshake: true
- Is secure renegotiation: false
- http-bio-8443-Acceptor-0, setSoTimeout(60000) called
- Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1
- Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 for TLSv1
- Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLSv1
- Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1
- Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1.1
- Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 for TLSv1.1
- Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLSv1.1
- Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1.1
- http-bio-8443-exec-12, READ: TLSv1 Handshake, length = 173
- http-bio-8443-exec-12, handling exception: javax.net.ssl.SSLProtocolException: Illegal server name, type=host_name(0), name=localhost., value=6c:6f:63:61:6c:68:6f:73:74:2e
- http-bio-8443-exec-12, SEND TLSv1.2 ALERT: fatal, description = unexpected_message
- http-bio-8443-exec-12, WRITE: TLSv1.2 Alert, length = 2
- http-bio-8443-exec-12, called closeSocket()
- http-bio-8443-exec-12, IOException in getSession(): javax.net.ssl.SSLProtocolException: Illegal server name, type=host_name(0), name=localhost., value=6c:6f:63:61:6c:68:6f:73:74:2e
- http-bio-8443-exec-12, called close()
- http-bio-8443-exec-12, called closeInternal(true)
- Allow unsafe renegotiation: false
- Allow legacy hello messages: true
- Is initial handshake: true
- Is secure renegotiation: false
- http-bio-8443-Acceptor-0, setSoTimeout(60000) called
- Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1
- Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 for TLSv1
- Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLSv1
- Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1
- Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1.1
- Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 for TLSv1.1
- Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLSv1.1
- Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1.1
- http-bio-8443-exec-13, READ: TLSv1 Handshake, length = 173
- http-bio-8443-exec-13, handling exception: javax.net.ssl.SSLProtocolException: Illegal server name, type=host_name(0), name=localhost., value=6c:6f:63:61:6c:68:6f:73:74:2e
- http-bio-8443-exec-13, SEND TLSv1.2 ALERT: fatal, description = unexpected_message
- http-bio-8443-exec-13, WRITE: TLSv1.2 Alert, length = 2
- http-bio-8443-exec-13, called closeSocket()
- http-bio-8443-exec-13, IOException in getSession(): javax.net.ssl.SSLProtocolException: Illegal server name, type=host_name(0), name=localhost., value=6c:6f:63:61:6c:68:6f:73:74:2e
- http-bio-8443-exec-13, called close()
- http-bio-8443-exec-13, called closeInternal(true)
- Allow unsafe renegotiation: false
- Allow legacy hello messages: true
- Is initial handshake: true
- Is secure renegotiation: false
- http-bio-8443-Acceptor-0, setSoTimeout(60000) called
- Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1
- Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 for TLSv1
- Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLSv1
- Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1
- Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1.1
- Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 for TLSv1.1
- Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLSv1.1
- Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1.1
- http-bio-8443-exec-14, READ: SSLv3 Handshake, length = 63
- *** ClientHello, SSLv3
- RandomCookie: GMT: 620948181 bytes = { 65, 92, 108, 70, 83, 205, 3, 15, 67, 125, 159, 223, 245, 239, 63, 112, 235, 125, 117, 98, 9, 12, 44, 246, 15, 219, 242, 210 }
- Session ID: {}
- Cipher Suites: [TLS_EMPTY_RENEGOTIATION_INFO_SCSV, Unknown 0x56:0x0, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_RC4_128_SHA, SSL_RSA_WITH_RC4_128_MD5]
- Compression Methods: { 0 }
- ***
- [read] MD5 and SHA1 hashes: len = 63
- 0000: 01 00 00 3B 03 00 25 03 EB D5 41 5C 6C 46 53 CD ...;..%...A\lFS.
- 0010: 03 0F 43 7D 9F DF F5 EF 3F 70 EB 7D 75 62 09 0C ..C.....?p..ub..
- 0020: 2C F6 0F DB F2 D2 00 00 14 00 FF 56 00 00 33 00 ,..........V..3.
- 0030: 32 00 39 00 2F 00 35 00 0A 00 05 00 04 01 00 2.9./.5........
- http-bio-8443-exec-14, SEND TLSv1.2 ALERT: fatal, description = handshake_failure
- http-bio-8443-exec-14, WRITE: TLSv1.2 Alert, length = 2
- http-bio-8443-exec-14, called closeSocket()
- http-bio-8443-exec-14, handling exception: javax.net.ssl.SSLHandshakeException: Client requested protocol SSLv3 not enabled or not supported
- http-bio-8443-exec-14, IOException in getSession(): javax.net.ssl.SSLHandshakeException: Client requested protocol SSLv3 not enabled or not supported
- http-bio-8443-exec-14, called close()
- http-bio-8443-exec-14, called closeInternal(true)
- Nov 12, 2014 9:38:23 AM org.apache.catalina.core.StandardServer await
- INFO: A valid shutdown command was received via the shutdown port. Stopping the Server instance.
- Nov 12, 2014 9:38:23 AM org.apache.coyote.AbstractProtocol pause
- INFO: Pausing ProtocolHandler ["http-nio-8080"]
- Nov 12, 2014 9:38:23 AM org.apache.coyote.AbstractProtocol pause
- INFO: Pausing ProtocolHandler ["http-bio-8443"]
- Allow unsafe renegotiation: false
- Allow legacy hello messages: true
- Is initial handshake: true
- Is secure renegotiation: false
- http-bio-8443-Acceptor-0, called close()
- http-bio-8443-Acceptor-0, called closeInternal(true)
- http-bio-8443-Acceptor-0, called closeSocket(true)
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement