Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- trigger seeding of SecureRandom
- done seeding SecureRandom
- trigger seeding of SecureRandom
- done seeding SecureRandom
- Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384
- Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384
- Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA
- Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA
- Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
- Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
- Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA
- Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA
- Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
- Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
- Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256
- Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256
- Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA
- Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA
- Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384
- Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384
- Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_GCM_SHA384
- Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384
- Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
- Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA
- Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384
- Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384
- Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384
- Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_GCM_SHA384
- Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384
- Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
- Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384
- Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA
- Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
- Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
- Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256
- Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384
- Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA
- Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
- Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
- Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384
- Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384
- Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA
- Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
- Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA
- Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
- Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256
- Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA
- Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384
- Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384
- Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_GCM_SHA384
- Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384
- Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
- Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA
- Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384
- Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384
- Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
- Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
- Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256
- Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA
- Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
- Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
- Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
- Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
- Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256
- Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA
- Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
- Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
- Allow unsafe renegotiation: false
- Allow legacy hello messages: true
- Is initial handshake: true
- Is secure renegotiation: false
- Allow unsafe renegotiation: false
- Allow legacy hello messages: true
- Is initial handshake: true
- Is secure renegotiation: false
- Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384
- Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA
- Allow unsafe renegotiation: false
- Allow legacy hello messages: true
- Is initial handshake: true
- Is secure renegotiation: false
- Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 for TLSv1
- Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
- Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA
- Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
- Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256
- Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA
- Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384
- Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384
- Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_GCM_SHA384
- Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384
- Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
- Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA
- Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384
- Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384
- Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
- Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
- Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256
- Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA
- Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
- Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
- No available cipher suite for TLSv1
- Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 for TLSv1.1
- No available cipher suite for TLSv1.1
- %% No cached client session
- *** ClientHello, TLSv1.2
- RandomCookie: GMT: 1459747717 bytes = { 105, 143, 38, 198, 212, 216, 83, 162, 157, 110, 144, 162, 1, 122, 169, 27, 98, 191, 218, 85, 202, 32, 67, 242, 25, 4, 28, 3 }
- Session ID: {}
- Cipher Suites: [TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256]
- Compression Methods: { 0 }
- Extension elliptic_curves, curve names: {secp256r1, sect163k1, sect163r2, secp192r1, secp224r1, sect233k1, sect233r1, sect283k1, sect283r1, secp384r1, sect409k1, sect409r1, secp521r1, sect571k1, sect571r1, secp160k1, secp160r1, secp160r2, sect163r1, secp192k1, sect193r1, sect193r2, secp224k1, sect239k1, secp256k1}
- Extension ec_point_formats, formats: [uncompressed]
- Extension signature_algorithms, signature_algorithms: SHA512withECDSA, SHA512withRSA, SHA384withECDSA, SHA384withRSA, SHA256withECDSA, SHA256withRSA, SHA224withECDSA, SHA224withRSA, SHA1withECDSA, SHA1withRSA, SHA1withDSA
- Extension renegotiation_info, renegotiated_connection: <empty>
- ***
- [write] MD5 and SHA1 hashes: len = 142
- 0000: 01 00 00 8A 03 03 57 02 FC 85 69 8F 26 C6 D4 D8 ......W...i.&...
- 0010: 53 A2 9D 6E 90 A2 01 7A A9 1B 62 BF DA 55 CA 20 S..n...z..b..U.
- 0020: 43 F2 19 04 1C 03 00 00 02 C0 23 01 00 00 5F 00 C.........#..._.
- 0030: 0A 00 34 00 32 00 17 00 01 00 03 00 13 00 15 00 ..4.2...........
- 0040: 06 00 07 00 09 00 0A 00 18 00 0B 00 0C 00 19 00 ................
- 0050: 0D 00 0E 00 0F 00 10 00 11 00 02 00 12 00 04 00 ................
- 0060: 05 00 14 00 08 00 16 00 0B 00 02 01 00 00 0D 00 ................
- 0070: 18 00 16 06 03 06 01 05 03 05 01 04 03 04 01 03 ................
- 0080: 03 03 01 02 03 02 01 02 02 FF 01 00 01 00 ..............
- Thread-1, WRITE: TLSv1.2 Handshake, length = 142
- [Raw write]: length = 147
- 0000: 16 03 03 00 8E 01 00 00 8A 03 03 57 02 FC 85 69 ...........W...i
- 0010: 8F 26 C6 D4 D8 53 A2 9D 6E 90 A2 01 7A A9 1B 62 .&...S..n...z..b
- 0020: BF DA 55 CA 20 43 F2 19 04 1C 03 00 00 02 C0 23 ..U. C.........#
- 0030: 01 00 00 5F 00 0A 00 34 00 32 00 17 00 01 00 03 ..._...4.2......
- 0040: 00 13 00 15 00 06 00 07 00 09 00 0A 00 18 00 0B ................
- 0050: 00 0C 00 19 00 0D 00 0E 00 0F 00 10 00 11 00 02 ................
- 0060: 00 12 00 04 00 05 00 14 00 08 00 16 00 0B 00 02 ................
- 0070: 01 00 00 0D 00 18 00 16 06 03 06 01 05 03 05 01 ................
- 0080: 04 03 04 01 03 03 03 01 02 03 02 01 02 02 FF 01 ................
- 0090: 00 01 00 ...
- Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 for TLSv1
- No available cipher suite for TLSv1
- Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 for TLSv1.1
- No available cipher suite for TLSv1.1
- [Raw read]: length = 5
- 0000: 16 03 03 00 8E .....
- [Raw read]: length = 142
- 0000: 01 00 00 8A 03 03 57 02 FC 85 69 8F 26 C6 D4 D8 ......W...i.&...
- 0010: 53 A2 9D 6E 90 A2 01 7A A9 1B 62 BF DA 55 CA 20 S..n...z..b..U.
- 0020: 43 F2 19 04 1C 03 00 00 02 C0 23 01 00 00 5F 00 C.........#..._.
- 0030: 0A 00 34 00 32 00 17 00 01 00 03 00 13 00 15 00 ..4.2...........
- 0040: 06 00 07 00 09 00 0A 00 18 00 0B 00 0C 00 19 00 ................
- 0050: 0D 00 0E 00 0F 00 10 00 11 00 02 00 12 00 04 00 ................
- 0060: 05 00 14 00 08 00 16 00 0B 00 02 01 00 00 0D 00 ................
- 0070: 18 00 16 06 03 06 01 05 03 05 01 04 03 04 01 03 ................
- 0080: 03 03 01 02 03 02 01 02 02 FF 01 00 01 00 ..............
- Thread-2, READ: TLSv1.2 Handshake, length = 142
- *** ClientHello, TLSv1.2
- RandomCookie: GMT: 1459747717 bytes = { 105, 143, 38, 198, 212, 216, 83, 162, 157, 110, 144, 162, 1, 122, 169, 27, 98, 191, 218, 85, 202, 32, 67, 242, 25, 4, 28, 3 }
- Session ID: {}
- Cipher Suites: [TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256]
- Compression Methods: { 0 }
- Extension elliptic_curves, curve names: {secp256r1, sect163k1, sect163r2, secp192r1, secp224r1, sect233k1, sect233r1, sect283k1, sect283r1, secp384r1, sect409k1, sect409r1, secp521r1, sect571k1, sect571r1, secp160k1, secp160r1, secp160r2, sect163r1, secp192k1, sect193r1, sect193r2, secp224k1, sect239k1, secp256k1}
- Extension ec_point_formats, formats: [uncompressed]
- Extension signature_algorithms, signature_algorithms: SHA512withECDSA, SHA512withRSA, SHA384withECDSA, SHA384withRSA, SHA256withECDSA, SHA256withRSA, SHA224withECDSA, SHA224withRSA, SHA1withECDSA, SHA1withRSA, SHA1withDSA
- Extension renegotiation_info, renegotiated_connection: <empty>
- ***
- [read] MD5 and SHA1 hashes: len = 142
- 0000: 01 00 00 8A 03 03 57 02 FC 85 69 8F 26 C6 D4 D8 ......W...i.&...
- 0010: 53 A2 9D 6E 90 A2 01 7A A9 1B 62 BF DA 55 CA 20 S..n...z..b..U.
- 0020: 43 F2 19 04 1C 03 00 00 02 C0 23 01 00 00 5F 00 C.........#..._.
- 0030: 0A 00 34 00 32 00 17 00 01 00 03 00 13 00 15 00 ..4.2...........
- 0040: 06 00 07 00 09 00 0A 00 18 00 0B 00 0C 00 19 00 ................
- 0050: 0D 00 0E 00 0F 00 10 00 11 00 02 00 12 00 04 00 ................
- 0060: 05 00 14 00 08 00 16 00 0B 00 02 01 00 00 0D 00 ................
- 0070: 18 00 16 06 03 06 01 05 03 05 01 04 03 04 01 03 ................
- 0080: 03 03 01 02 03 02 01 02 02 FF 01 00 01 00 ..............
- %% Initialized: [Session-1, SSL_NULL_WITH_NULL_NULL]
- %% Invalidated: [Session-1, SSL_NULL_WITH_NULL_NULL]
- Thread-2, SEND TLSv1.2 ALERT: fatal, description = handshake_failure
- Thread-2, WRITE: TLSv1.2 Alert, length = 2
- [Raw read]: length = 5
- [Raw write]: length = 7
- 00000000: 15 03 03 00 02 .....
- [Raw read]: length = 2
- 0000: 02 : 2185 0 3 0 3 00 02 02 28 .(
- .....Thread-1, READ: TLSv1.2 Alert, length = 2
- .(
- Thread-1, RECV TLSv1.2 ALERT: fatal, handshake_failure
- Thread-2, called closeSocket()
- Thread-1, called closeSocket()
- Thread-1, handling exception: javax.net.ssl.SSLHandshakeException: Received fatal alert: handshake_failure
- Thread-2, handling exception: javax.net.ssl.SSLHandshakeException: no cipher suites in common
- javax.net.ssl.SSLHandshakeException: Received fatal alert: handshake_failure
- at sun.security.ssl.Alerts.getSSLException(Alerts.java:192)
- at sun.security.ssl.Alerts.getSSLException(Alerts.java:154)
- at sun.security.ssl.SSLSocketImpl.recvAlert(SSLSocketImpl.java:2023)
- at sun.security.ssl.SSLSocketImpl.readRecord(SSLSocketImpl.java:1125)
- at sun.security.ssl.SSLSocketImpl.performInitialHandshake(SSLSocketImpl.java:1375)
- at sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:1403)
- at sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:1387)
- at com.gmail.socraticphoenix.plasma.net.client.ClientThread.run(ClientThread.java:72)
- Process finished with exit code 0
Add Comment
Please, Sign In to add comment