Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Connecting to www.velocityfrequentflyer.com
- trigger seeding of SecureRandom
- done seeding SecureRandom
- Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384
- Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA
- Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
- Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA
- Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
- Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256
- Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA
- Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384
- Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384
- Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_GCM_SHA384
- Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384
- Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
- Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA
- Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384
- Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384
- Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
- Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
- Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256
- Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA
- Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
- Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
- Allow unsafe renegotiation: false
- Allow legacy hello messages: true
- Is initial handshake: true
- Is secure renegotiation: false
- Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 for TLSv1
- Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 for TLSv1
- Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 for TLSv1
- Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256 for TLSv1
- Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256 for TLSv1
- Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 for TLSv1
- Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 for TLSv1
- Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 for TLSv1.1
- Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 for TLSv1.1
- Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 for TLSv1.1
- Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256 for TLSv1.1
- Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256 for TLSv1.1
- Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 for TLSv1.1
- Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 for TLSv1.1
- %% No cached client session
- *** ClientHello, TLSv1.2
- RandomCookie: GMT: 1423011347 bytes = { 44, 36, 241, 143, 148, 251, 215, 144, 167, 78, 198, 210, 234, 209, 26, 173, 52, 64, 246, 29, 146, 206, 123, 63, 177, 77, 190, 219 }
- Session ID: {}
- Cipher Suites: [TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256, TLS_RSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_DSS_WITH_AES_128_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_DSS_WITH_AES_128_GCM_SHA256, TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA, TLS_EMPTY_RENEGOTIATION_INFO_SCSV]
- Compression Methods: { 0 }
- Extension elliptic_curves, curve names: {secp256r1, sect163k1, sect163r2, secp192r1, secp224r1, sect233k1, sect233r1, sect283k1, sect283r1, secp384r1, sect409k1, sect409r1, secp521r1, sect571k1, sect571r1, secp160k1, secp160r1, secp160r2, sect163r1, secp192k1, sect193r1, sect193r2, secp224k1, sect239k1, secp256k1}
- Extension ec_point_formats, formats: [uncompressed]
- Extension signature_algorithms, signature_algorithms: SHA512withECDSA, SHA512withRSA, SHA384withECDSA, SHA384withRSA, SHA256withECDSA, SHA256withRSA, SHA224withECDSA, SHA224withRSA, SHA1withECDSA, SHA1withRSA, SHA1withDSA, MD5withRSA
- Extension server_name, server_name: [type=host_name (0), value=www.velocityfrequentflyer.com]
- ***
- [write] MD5 and SHA1 hashes: len = 233
- 0000: 01 00 00 E5 03 03 55 D1 6E 13 2C 24 F1 8F 94 FB ......U.n.,$....
- 0010: D7 90 A7 4E C6 D2 EA D1 1A AD 34 40 F6 1D 92 CE ...N......4@....
- 0020: 7B 3F B1 4D BE DB 00 00 3A C0 23 C0 27 00 3C C0 .?.M....:.#.'.<.
- 0030: 25 C0 29 00 67 00 40 C0 09 C0 13 00 2F C0 04 C0 %.).g.@...../...
- 0040: 0E 00 33 00 32 C0 2B C0 2F 00 9C C0 2D C0 31 00 ..3.2.+./...-.1.
- 0050: 9E 00 A2 C0 08 C0 12 00 0A C0 03 C0 0D 00 16 00 ................
- 0060: 13 00 FF 01 00 00 82 00 0A 00 34 00 32 00 17 00 ..........4.2...
- 0070: 01 00 03 00 13 00 15 00 06 00 07 00 09 00 0A 00 ................
- 0080: 18 00 0B 00 0C 00 19 00 0D 00 0E 00 0F 00 10 00 ................
- 0090: 11 00 02 00 12 00 04 00 05 00 14 00 08 00 16 00 ................
- 00A0: 0B 00 02 01 00 00 0D 00 1A 00 18 06 03 06 01 05 ................
- 00B0: 03 05 01 04 03 04 01 03 03 03 01 02 03 02 01 02 ................
- 00C0: 02 01 01 00 00 00 22 00 20 00 00 1D 77 77 77 2E ......". ...www.
- 00D0: 76 65 6C 6F 63 69 74 79 66 72 65 71 75 65 6E 74 velocityfrequent
- 00E0: 66 6C 79 65 72 2E 63 6F 6D flyer.com
- main, WRITE: TLSv1.2 Handshake, length = 233
- [Raw write]: length = 238
- 0000: 16 03 03 00 E9 01 00 00 E5 03 03 55 D1 6E 13 2C ...........U.n.,
- 0010: 24 F1 8F 94 FB D7 90 A7 4E C6 D2 EA D1 1A AD 34 $.......N......4
- 0020: 40 F6 1D 92 CE 7B 3F B1 4D BE DB 00 00 3A C0 23 @.....?.M....:.#
- 0030: C0 27 00 3C C0 25 C0 29 00 67 00 40 C0 09 C0 13 .'.<.%.).g.@....
- 0040: 00 2F C0 04 C0 0E 00 33 00 32 C0 2B C0 2F 00 9C ./.....3.2.+./..
- 0050: C0 2D C0 31 00 9E 00 A2 C0 08 C0 12 00 0A C0 03 .-.1............
- 0060: C0 0D 00 16 00 13 00 FF 01 00 00 82 00 0A 00 34 ...............4
- 0070: 00 32 00 17 00 01 00 03 00 13 00 15 00 06 00 07 .2..............
- 0080: 00 09 00 0A 00 18 00 0B 00 0C 00 19 00 0D 00 0E ................
- 0090: 00 0F 00 10 00 11 00 02 00 12 00 04 00 05 00 14 ................
- 00A0: 00 08 00 16 00 0B 00 02 01 00 00 0D 00 1A 00 18 ................
- 00B0: 06 03 06 01 05 03 05 01 04 03 04 01 03 03 03 01 ................
- 00C0: 02 03 02 01 02 02 01 01 00 00 00 22 00 20 00 00 ...........". ..
- 00D0: 1D 77 77 77 2E 76 65 6C 6F 63 69 74 79 66 72 65 .www.velocityfre
- 00E0: 71 75 65 6E 74 66 6C 79 65 72 2E 63 6F 6D quentflyer.com
- [Raw read]: length = 5
- 0000: 15 03 03 00 02 .....
- [Raw read]: length = 2
- 0000: 02 28 .(
- main, READ: TLSv1.2 Alert, length = 2
- main, RECV TLSv1.2 ALERT: fatal, handshake_failure
- main, called closeSocket()
- main, handling exception: javax.net.ssl.SSLHandshakeException: Received fatal alert: handshake_failure
- Exception in thread "main" javax.net.ssl.SSLHandshakeException: Received fatal alert: handshake_failure
- at sun.security.ssl.Alerts.getSSLException(Unknown Source)
- at sun.security.ssl.Alerts.getSSLException(Unknown Source)
- at sun.security.ssl.SSLSocketImpl.recvAlert(Unknown Source)
- at sun.security.ssl.SSLSocketImpl.readRecord(Unknown Source)
- at sun.security.ssl.SSLSocketImpl.performInitialHandshake(Unknown Source)
- at sun.security.ssl.SSLSocketImpl.startHandshake(Unknown Source)
- at sun.security.ssl.SSLSocketImpl.startHandshake(Unknown Source)
- at sslconnecting.Sslconnecting.main(Sslconnecting.java:33)
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement