Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Using SSLEngineImpl.
- Allow unsafe renegotiation: false
- Allow legacy hello messages: true
- Is initial handshake: true
- Is secure renegotiation: false
- Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 for TLSv1
- Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 for TLSv1
- Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 for TLSv1
- Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256 for TLSv1
- Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256 for TLSv1
- Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 for TLSv1
- Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 for TLSv1
- Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 for TLSv1.1
- Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 for TLSv1.1
- Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 for TLSv1.1
- Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256 for TLSv1.1
- Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256 for TLSv1.1
- Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 for TLSv1.1
- Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 for TLSv1.1
- grizzly-nio-kernel(4) SelectorRunner, READ: TLSv1.2 Handshake, length = 193
- *** ClientHello, TLSv1.2
- RandomCookie: GMT: 1514403782 bytes = { 142, 61, 136, 72, 137, 244, 42, 246, 112, 41, 96, 44, 174, 39, 247, 135, 239, 8, 216, 123, 79, 228, 113, 10, 254, 188, 14, 184 }
- Session ID: {90, 68, 248, 150, 218, 145, 207, 111, 197, 176, 128, 30, 32, 136, 243, 126, 247, 62, 114, 7, 40, 156, 22, 64, 175, 45, 232, 196, 139, 85, 52, 146}
- Cipher Suites: [TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256, TLS_RSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_DSS_WITH_AES_128_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_DSS_WITH_AES_128_GCM_SHA256, TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA, TLS_EMPTY_RENEGOTIATION_INFO_SCSV]
- Compression Methods: { 0 }
- Extension elliptic_curves, curve names: {secp256r1, secp384r1, secp521r1, sect283k1, sect283r1, sect409k1, sect409r1, sect571k1, sect571r1, secp256k1}
- Extension ec_point_formats, formats: [uncompressed]
- Extension signature_algorithms, signature_algorithms: SHA512withECDSA, SHA512withRSA, SHA384withECDSA, SHA384withRSA, SHA256withECDSA, SHA256withRSA, SHA256withDSA, SHA1withECDSA, SHA1withRSA, SHA1withDSA
- ***
- %% Resuming [Session-1, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256]
- *** ServerHello, TLSv1.2
- RandomCookie: GMT: 1514403782 bytes = { 23, 88, 120, 113, 194, 139, 127, 146, 169, 218, 221, 41, 162, 152, 43, 166, 13, 35, 30, 119, 23, 13, 124, 135, 78, 67, 151, 4 }
- Session ID: {90, 68, 248, 150, 218, 145, 207, 111, 197, 176, 128, 30, 32, 136, 243, 126, 247, 62, 114, 7, 40, 156, 22, 64, 175, 45, 232, 196, 139, 85, 52, 146}
- Cipher Suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
- Compression Method: 0
- Extension renegotiation_info, renegotiated_connection: <empty>
- ***
- Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
- CONNECTION KEYGEN:
- Client Nonce:
- 0000: 5A 44 F8 C6 8E 3D 88 48 89 F4 2A F6 70 29 60 2C ZD...=.H..*.p)`,
- 0010: AE 27 F7 87 EF 08 D8 7B 4F E4 71 0A FE BC 0E B8 .'......O.q.....
- Server Nonce:
- 0000: 5A 44 F8 C6 17 58 78 71 C2 8B 7F 92 A9 DA DD 29 ZD...Xxq.......)
- 0010: A2 98 2B A6 0D 23 1E 77 17 0D 7C 87 4E 43 97 04 ..+..#.w....NC..
- Master Secret:
- 0000: 22 2A A2 57 FF 5C 09 B0 2D 8B 83 7A BC A1 A8 43 "*.W.\..-..z...C
- 0010: 0F D2 8C A4 DA 53 60 CB E1 75 D0 45 5F E1 FD C5 .....S`..u.E_...
- 0020: AD F0 0D 4F 3E E5 2A 25 D4 BF F3 C0 39 92 79 9D ...O>.*%....9.y.
- Client MAC write Secret:
- 0000: 53 DC 83 6B D9 EB 1E CF DC 4D E9 90 48 23 6F F1 S..k.....M..H#o.
- 0010: 4B D1 7E 0E A6 90 62 9D 92 00 E0 AB 0D 8B AF 04 K.....b.........
- Server MAC write Secret:
- 0000: D6 46 58 CF D8 A7 32 73 57 12 69 DC 19 A6 EB 38 .FX...2sW.i....8
- 0010: 5A A5 22 BD D0 12 43 BA 28 34 36 0F 97 1E CA 78 Z."...C.(46....x
- Client write key:
- 0000: 6E C3 06 D5 A3 06 B8 12 BF 1C 38 8F AE 27 4E 28 n.........8..'N(
- Server write key:
- 0000: 55 F0 1E 4E 88 A3 31 30 C3 E1 22 CE 86 DD 04 53 U..N..10.."....S
- ... no IV derived for this protocol
- grizzly-nio-kernel(4) SelectorRunner, WRITE: TLSv1.2 Handshake, length = 81
- grizzly-nio-kernel(4) SelectorRunner, WRITE: TLSv1.2 Change Cipher Spec, length = 1
- *** Finished
- verify_data: { 64, 15, 144, 191, 16, 117, 30, 236, 8, 201, 210, 229 }
- ***
- grizzly-nio-kernel(4) SelectorRunner, WRITE: TLSv1.2 Handshake, length = 80
- grizzly-nio-kernel(4) SelectorRunner, READ: TLSv1.2 Change Cipher Spec, length = 1
- grizzly-nio-kernel(4) SelectorRunner, READ: TLSv1.2 Handshake, length = 80
- *** Finished
- verify_data: { 19, 31, 71, 172, 28, 110, 143, 4, 56, 123, 61, 219 }
- ***
- Hibernate: select this_.cloud_id as cloud_id1_11_0_ from own_cloud this_
- Hibernate: select arrowheadc0_.id as id1_0_0_, arrowheadc0_.address as address2_0_0_, arrowheadc0_.authentication_info as authenti3_0_0_, arrowheadc0_.cloud_name as cloud_na4_0_0_, arrowheadc0_.gatekeeper_service_uri as gatekeep5_0_0_, arrowheadc0_.is_secure as is_secur6_0_0_, arrowheadc0_.operator as operator7_0_0_, arrowheadc0_.port as port8_0_0_ from arrowhead_cloud arrowheadc0_ where arrowheadc0_.id=?
- Hibernate: select this_.cloud_id as cloud_id1_8_0_ from neighbor_cloud this_
- Hibernate: select arrowheadc0_.id as id1_0_0_, arrowheadc0_.address as address2_0_0_, arrowheadc0_.authentication_info as authenti3_0_0_, arrowheadc0_.cloud_name as cloud_na4_0_0_, arrowheadc0_.gatekeeper_service_uri as gatekeep5_0_0_, arrowheadc0_.is_secure as is_secur6_0_0_, arrowheadc0_.operator as operator7_0_0_, arrowheadc0_.port as port8_0_0_ from arrowhead_cloud arrowheadc0_ where arrowheadc0_.id=?
- Allow unsafe renegotiation: false
- Allow legacy hello messages: true
- Is initial handshake: true
- Is secure renegotiation: false
- grizzly-http-server-2, setSoTimeout(30000) called
- Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 for TLSv1
- Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 for TLSv1
- Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 for TLSv1
- Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256 for TLSv1
- Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256 for TLSv1
- Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 for TLSv1
- Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 for TLSv1
- Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 for TLSv1.1
- Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 for TLSv1.1
- Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 for TLSv1.1
- Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256 for TLSv1.1
- Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256 for TLSv1.1
- Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 for TLSv1.1
- Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 for TLSv1.1
- %% No cached client session
- *** ClientHello, TLSv1.2
- RandomCookie: GMT: 1514403782 bytes = { 145, 45, 208, 164, 164, 47, 33, 39, 16, 152, 68, 93, 167, 89, 248, 236, 49, 40, 170, 243, 127, 231, 112, 133, 255, 79, 82, 145 }
- Session ID: {}
- Cipher Suites: [TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256, TLS_RSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_DSS_WITH_AES_128_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_DSS_WITH_AES_128_GCM_SHA256, TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA, TLS_EMPTY_RENEGOTIATION_INFO_SCSV]
- Compression Methods: { 0 }
- Extension elliptic_curves, curve names: {secp256r1, secp384r1, secp521r1, sect283k1, sect283r1, sect409k1, sect409r1, sect571k1, sect571r1, secp256k1}
- Extension ec_point_formats, formats: [uncompressed]
- Extension signature_algorithms, signature_algorithms: SHA512withECDSA, SHA512withRSA, SHA384withECDSA, SHA384withRSA, SHA256withECDSA, SHA256withRSA, SHA256withDSA, SHA1withECDSA, SHA1withRSA, SHA1withDSA
- ***
- grizzly-http-server-2, WRITE: TLSv1.2 Handshake, length = 161
- grizzly-http-server-2, READ: TLSv1.2 Handshake, length = 3250
- *** ServerHello, TLSv1.2
- RandomCookie: GMT: 1514403783 bytes = { 187, 91, 108, 215, 58, 155, 129, 110, 137, 161, 228, 223, 75, 32, 252, 81, 195, 16, 58, 143, 255, 212, 214, 149, 11, 24, 210, 35 }
- Session ID: {90, 68, 248, 199, 217, 210, 203, 88, 111, 63, 253, 153, 169, 132, 74, 213, 143, 10, 201, 25, 105, 21, 249, 156, 58, 58, 84, 67, 123, 172, 7, 158}
- Cipher Suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
- Compression Method: 0
- Extension renegotiation_info, renegotiated_connection: <empty>
- ***
- %% Initialized: [Session-4, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256]
- ** TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
- *** Certificate chain
- chain [0] = [
- [
- Version: V3
- Subject: CN=Gatekeeper.CoreSystems.testcloud1.aitia.arrowhead.eu, ST=Hungary, C=HU, EMAILADDRESS=hegeduscs@aitia.ai
- Signature Algorithm: SHA256withRSA, OID = 1.2.840.113549.1.1.11
- Key: Sun RSA public key, 2048 bits
- modulus: 27329402115678122225764261503397951422747364574513781449753544166943375833204685084567538107689278008686109882866903084328866398777394255794187667080688734578672590115870425850259415291609256283357433542992813482378625718356309166319384351317240884680601857164189449535129129459275197193725981126550855654958536428226964592274158118989484314836945394216213980800655055534411978217491383199685722730452438525552772985614945992141929469751402070594557363602618635978174977839549791873346585743921554196683873451180011405746998850599375862853759839881202325179663605057679634818452164663742333502098982647729107092022931
- public exponent: 65537
- Validity: [From: Mon Jul 11 17:01:25 CEST 2016,
- To: Sat Jul 11 17:01:25 CEST 2026]
- Issuer: CN=TestCloud1.aitia.arrowhead.eu, O=AITIA, L=Budapest, ST=Hungary, C=HU, EMAILADDRESS=hegeduscs@aitia.ai
- SerialNumber: [ 5783b4a8]
- ]
- Algorithm: [SHA256withRSA]
- Signature:
- 0000: 69 70 83 1B B0 4C 86 E6 9E 85 FD EF BA A2 74 89 ip...L........t.
- 0010: AA AA DE DC E1 5C 80 14 8A BC D9 37 B4 B0 CF 61 .....\.....7...a
- 0020: 0B 69 D0 D1 17 F1 87 31 84 4F A4 93 86 64 A4 FD .i.....1.O...d..
- 0030: 83 B7 F3 B2 21 42 56 71 C6 28 A7 C0 01 1C 80 B3 ....!BVq.(......
- 0040: 86 0E 7E 3E 2E A3 83 A4 4A 9A 57 F8 19 0F 42 7D ...>....J.W...B.
- 0050: 06 8C 34 6E 67 73 44 00 2C DB 4D E4 63 CB 80 42 ..4ngsD.,.M.c..B
- 0060: FA E0 0B 8D A6 E5 26 A7 EC 24 21 67 54 23 BB D2 ......&..$!gT#..
- 0070: FD D0 BB F9 77 AB 4B DC AB E4 3B D9 F0 F2 F0 C8 ....w.K...;.....
- 0080: AE 66 77 DE BD 7A F4 00 80 51 9A BC F3 2A 1C 2D .fw..z...Q...*.-
- 0090: DF E1 46 A7 01 5A C8 EC A8 8D 0A 59 1D 4E 17 B2 ..F..Z.....Y.N..
- 00A0: 44 A3 3B 3E 3C BF DD 23 AE C5 C2 8F E7 BA D9 3E D.;><..#.......>
- 00B0: C2 4E C0 23 E8 77 90 28 1E 43 EF 19 01 B7 D9 6F .N.#.w.(.C.....o
- 00C0: C2 0A A1 32 93 CB CC F2 AF 8A 20 B2 37 26 1F F2 ...2...... .7&..
- 00D0: B7 15 22 24 29 6F F9 45 D4 9F 8F 0C 2C 26 2C 78 .."$)o.E....,&,x
- 00E0: 85 29 DA 15 C2 01 F5 F4 A5 E6 A7 6F FF 59 49 42 .).........o.YIB
- 00F0: 30 6D 81 E7 3F 0A 17 70 82 A5 50 34 E6 6A 21 65 0m..?..p..P4.j!e
- ]
- chain [1] = [
- [
- Version: V3
- Subject: CN=TestCloud1.aitia.arrowhead.eu, O=AITIA, L=Budapest, ST=Hungary, C=HU, EMAILADDRESS=hegeduscs@aitia.ai
- Signature Algorithm: SHA256withRSA, OID = 1.2.840.113549.1.1.11
- Key: Sun RSA public key, 2048 bits
- modulus: 25335455530409072998888487188142468130750713358823743359097427303343379809956695722799171867655886461949782462630775415197549997942183924202950506556266518974929427626484350384237194264871189277705903703331314636350552874176218729333812111512125096984545119367011764673643429396351600906631681436634361370604816902974394186743170460451584381856548821788392764038963334570810607282844423560253135621204974887801596742518115887940717956280269669683760737397823349963965399032478931868503491269764853746569417474849307732096566896147074803703196022403527725826797257182856954483072427592737958458243838459065468909005741
- public exponent: 65537
- Validity: [From: Mon Jul 11 16:37:02 CEST 2016,
- To: Sat Jul 11 16:37:02 CEST 2026]
- Issuer: CN=arrowhead.eu, O=Arrowhead Consortium, C=EU, EMAILADDRESS=hegeduscs@aitia.ai
- SerialNumber: [ 5783aee1]
- ]
- Algorithm: [SHA256withRSA]
- Signature:
- 0000: C9 1D 28 73 7C 1A C7 80 A9 A3 A2 58 36 53 8C E2 ..(s.......X6S..
- 0010: DF 65 CF 81 78 59 93 A6 06 CF 98 2E EA B6 7D 16 .e..xY..........
- 0020: 7F AC F1 86 BF FB 0E C5 44 A3 C7 BC D8 D4 B3 76 ........D......v
- 0030: BC 2A 1C 41 62 75 8C DE 9E 4B EE 6A 7E 17 56 5F .*.Abu...K.j..V_
- 0040: F0 21 70 78 C6 1B AE CD 61 EE A3 43 8F 50 E7 6E .!px....a..C.P.n
- 0050: 24 EB 9C B9 AE 8E F9 1E 9D 8A A3 F3 4F F3 20 EA $...........O. .
- 0060: 1B E9 BE AC 1C 16 78 7A A7 94 71 35 37 C3 6A CD ......xz..q57.j.
- 0070: 50 5F FE CC 9F 0D 7C 51 61 CB F3 4B 8A F4 9B 73 P_.....Qa..K...s
- 0080: 8D CC 75 3A 0E A9 DA 20 A3 76 B0 16 57 C8 95 E2 ..u:... .v..W...
- 0090: 0B 3C AA F0 A1 C8 6F 94 45 94 8D BD EB 2C 90 27 .<....o.E....,.'
- 00A0: 2D DC D9 DC 32 E5 61 96 BE 6C 8D 3E 7F DD 1D 77 -...2.a..l.>...w
- 00B0: 91 DC C1 35 A8 2A 36 8C 58 93 73 C6 02 EF A6 1F ...5.*6.X.s.....
- 00C0: BD C2 B7 15 08 93 76 A7 32 D0 30 A8 43 46 DC 30 ......v.2.0.CF.0
- 00D0: 11 98 04 74 C4 67 EC A8 9D 51 87 4E AC 49 D2 68 ...t.g...Q.N.I.h
- 00E0: 8E 1B A6 F6 DD 5B 41 26 5D BB 7F D8 6E 96 B9 E0 .....[A&]...n...
- 00F0: 7E DA 56 B7 E7 47 92 56 3B 17 F4 59 E4 88 BD FE ..V..G.V;..Y....
- ]
- chain [2] = [
- [
- Version: V3
- Subject: CN=arrowhead.eu, O=Arrowhead Consortium, C=EU, EMAILADDRESS=hegeduscs@aitia.ai
- Signature Algorithm: SHA256withRSA, OID = 1.2.840.113549.1.1.11
- Key: Sun RSA public key, 2048 bits
- modulus: 28057648673173649596015723989731153166119607605462644560044283174980952933063834323028449384489202975624862258259462701104223528380881593826354069724644591909392761458654801338675933394233630472899093044680708151113533313220684218076216542533439407677631859894172523237944586604625178010150246597651348877104226799241766171429538315399758546900973055730330754119600045574192733704801050439305781876698617780997207168186967851746167889266150096000384097615777824345169659705918473221289779435029597251429760394554511215657684409000896650467929532540491315976603632814113614763238507383489581524436879233728796764049629
- public exponent: 65537
- Validity: [From: Mon Jul 11 16:13:38 CEST 2016,
- To: Tue Jul 11 16:13:38 CEST 2017]
- Issuer: CN=arrowhead.eu, O=Arrowhead Consortium, C=EU, EMAILADDRESS=hegeduscs@aitia.ai
- SerialNumber: [ 5783a958]
- ]
- Algorithm: [SHA256withRSA]
- Signature:
- 0000: 6E 7A D4 89 98 27 18 8E 51 3F A5 6C 0B 13 51 89 nz...'..Q?.l..Q.
- 0010: 19 FE E9 11 90 B9 98 AB F4 BA 5E A4 B7 C9 27 40 ..........^...'@
- 0020: F9 EE AD 47 9F C0 9F 8C 82 A8 DA 0E B7 A3 0E 0B ...G............
- 0030: 50 FA 1B C2 9E 5C AC 03 17 BD 4A BD 55 1C A4 BC P....\....J.U...
- 0040: B7 AB FB B0 09 3C 88 CD AF 58 9A 46 52 8B 4C 0B .....<...X.FR.L.
- 0050: 6D F9 C0 08 2A AA 51 81 EF 20 23 37 D3 6F 8E 60 m...*.Q.. #7.o.`
- 0060: 44 99 34 41 54 D0 8B B3 7F 1C 92 46 DF 64 71 63 D.4AT......F.dqc
- 0070: 8E 80 C5 3E E9 71 50 50 C0 90 F9 DB 0D DB 89 88 ...>.qPP........
- 0080: DA 7B D3 99 D0 28 B1 29 DD 32 E4 03 08 06 3A 89 .....(.).2....:.
- 0090: D6 4D B6 D4 21 BA E4 9F A6 51 CB A4 B7 8A 31 D6 .M..!....Q....1.
- 00A0: 9E 9D D8 08 0D DC C5 F8 DE FA 2E 14 28 C7 44 29 ............(.D)
- 00B0: 5E 14 23 B9 CC 7B 81 24 E3 6B 43 2E A1 53 41 6A ^.#....$.kC..SAj
- 00C0: 1A 60 B5 2C 4A ED 97 15 B3 BF 7D DF C7 BE 02 1B .`.,J...........
- 00D0: 32 FF B9 5D 41 09 3F 10 70 FB 28 CF 50 47 95 FA 2..]A.?.p.(.PG..
- 00E0: 0C 13 9C F1 9F 24 F2 E9 C2 1F B1 86 8A 89 14 7D .....$..........
- 00F0: 7B E6 70 DD 8A EF 65 77 1E 45 37 AC 57 66 EF 09 ..p...ew.E7.Wf..
- ]
- ***
- %% Invalidated: [Session-4, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256]
- grizzly-http-server-2, SEND TLSv1.2 ALERT: fatal, description = certificate_unknown
- grizzly-http-server-2, WRITE: TLSv1.2 Alert, length = 2
- grizzly-http-server-2, called closeSocket()
- grizzly-http-server-2, handling exception: javax.net.ssl.SSLHandshakeException: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
- grizzly-http-server-2, called close()
- grizzly-http-server-2, called closeInternal(true)
- javax.ws.rs.ProcessingException: HTTP 500 Internal Server Error
- at org.glassfish.jersey.client.ClientRuntime.invoke(ClientRuntime.java:261)
- at org.glassfish.jersey.client.JerseyInvocation$1.call(JerseyInvocation.java:684)
- at org.glassfish.jersey.client.JerseyInvocation$1.call(JerseyInvocation.java:681)
- at org.glassfish.jersey.internal.Errors.process(Errors.java:315)
- at org.glassfish.jersey.internal.Errors.process(Errors.java:297)
- at org.glassfish.jersey.internal.Errors.process(Errors.java:228)
- at org.glassfish.jersey.process.internal.RequestScope.runInScope(RequestScope.java:444)
- at org.glassfish.jersey.client.JerseyInvocation.invoke(JerseyInvocation.java:681)
- at org.glassfish.jersey.client.JerseyInvocation$Builder.method(JerseyInvocation.java:437)
- at org.glassfish.jersey.client.JerseyInvocation$Builder.put(JerseyInvocation.java:326)
- at eu.arrowhead.common.Utility.sendRequest(Utility.java:81)
- at eu.arrowhead.core.gatekeeper.GatekeeperResource.GSDRequest(GatekeeperResource.java:98)
- at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
- at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
- at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
- at java.lang.reflect.Method.invoke(Method.java:498)
- at org.glassfish.jersey.server.model.internal.ResourceMethodInvocationHandlerFactory$1.invoke(ResourceMethodInvocationHandlerFactory.java:81)
- at org.glassfish.jersey.server.model.internal.AbstractJavaResourceMethodDispatcher$1.run(AbstractJavaResourceMethodDispatcher.java:144)
- at org.glassfish.jersey.server.model.internal.AbstractJavaResourceMethodDispatcher.invoke(AbstractJavaResourceMethodDispatcher.java:161)
- at org.glassfish.jersey.server.model.internal.JavaResourceMethodDispatcherProvider$ResponseOutInvoker.doDispatch(JavaResourceMethodDispatcherProvider.java:160)
- at org.glassfish.jersey.server.model.internal.AbstractJavaResourceMethodDispatcher.dispatch(AbstractJavaResourceMethodDispatcher.java:99)
- at org.glassfish.jersey.server.model.ResourceMethodInvoker.invoke(ResourceMethodInvoker.java:389)
- at org.glassfish.jersey.server.model.ResourceMethodInvoker.apply(ResourceMethodInvoker.java:347)
- at org.glassfish.jersey.server.model.ResourceMethodInvoker.apply(ResourceMethodInvoker.java:102)
- at org.glassfish.jersey.server.ServerRuntime$2.run(ServerRuntime.java:326)
- at org.glassfish.jersey.internal.Errors$1.call(Errors.java:271)
- at org.glassfish.jersey.internal.Errors$1.call(Errors.java:267)
- at org.glassfish.jersey.internal.Errors.process(Errors.java:315)
- at org.glassfish.jersey.internal.Errors.process(Errors.java:297)
- at org.glassfish.jersey.internal.Errors.process(Errors.java:267)
- at org.glassfish.jersey.process.internal.RequestScope.runInScope(RequestScope.java:317)
- at org.glassfish.jersey.server.ServerRuntime.process(ServerRuntime.java:305)
- at org.glassfish.jersey.server.ApplicationHandler.handle(ApplicationHandler.java:1154)
- at org.glassfish.jersey.grizzly2.httpserver.GrizzlyHttpContainer.service(GrizzlyHttpContainer.java:384)
- at org.glassfish.grizzly.http.server.HttpHandler$1.run(HttpHandler.java:224)
- at org.glassfish.grizzly.threadpool.AbstractThreadPool$Worker.doWork(AbstractThreadPool.java:591)
- at org.glassfish.grizzly.threadpool.AbstractThreadPool$Worker.run(AbstractThreadPool.java:571)
- at java.lang.Thread.run(Thread.java:745)
- Caused by: javax.ws.rs.WebApplicationException: HTTP 500 Internal Server Error
- at org.eclipse.persistence.jaxb.rs.MOXyJsonProvider.writeTo(MOXyJsonProvider.java:951)
- at org.glassfish.jersey.message.internal.WriterInterceptorExecutor$TerminalWriterInterceptor.invokeWriteTo(WriterInterceptorExecutor.java:265)
- at org.glassfish.jersey.message.internal.WriterInterceptorExecutor$TerminalWriterInterceptor.aroundWriteTo(WriterInterceptorExecutor.java:250)
- at org.glassfish.jersey.message.internal.WriterInterceptorExecutor.proceed(WriterInterceptorExecutor.java:162)
- at org.glassfish.jersey.message.internal.MessageBodyFactory.writeTo(MessageBodyFactory.java:1130)
- at org.glassfish.jersey.client.ClientRequest.doWriteEntity(ClientRequest.java:517)
- at org.glassfish.jersey.client.ClientRequest.writeEntity(ClientRequest.java:499)
- at org.glassfish.jersey.client.internal.HttpUrlConnector._apply(HttpUrlConnector.java:388)
- at org.glassfish.jersey.client.internal.HttpUrlConnector.apply(HttpUrlConnector.java:285)
- at org.glassfish.jersey.client.ClientRuntime.invoke(ClientRuntime.java:252)
- ... 37 more
- Caused by: javax.xml.bind.MarshalException
- - with linked exception:
- [Exception [EclipseLink-25003] (Eclipse Persistence Services - 2.6.0.v20150309-bf26070): org.eclipse.persistence.exceptions.XMLMarshalException
- Exception Description: An error occurred marshalling the object
- Internal Exception: javax.net.ssl.SSLHandshakeException: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target]
- at org.eclipse.persistence.jaxb.JAXBMarshaller.marshal(JAXBMarshaller.java:487)
- at org.eclipse.persistence.jaxb.rs.MOXyJsonProvider.writeTo(MOXyJsonProvider.java:949)
- ... 46 more
- Caused by: Exception [EclipseLink-25003] (Eclipse Persistence Services - 2.6.0.v20150309-bf26070): org.eclipse.persistence.exceptions.XMLMarshalException
- Exception Description: An error occurred marshalling the object
- Internal Exception: javax.net.ssl.SSLHandshakeException: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
- at org.eclipse.persistence.exceptions.XMLMarshalException.marshalException(XMLMarshalException.java:104)
- at org.eclipse.persistence.oxm.record.JSONWriterRecord.flush(JSONWriterRecord.java:762)
- at org.eclipse.persistence.internal.oxm.XMLMarshaller.marshalStreamOrWriter(XMLMarshaller.java:1148)
- at org.eclipse.persistence.internal.oxm.XMLMarshaller.marshal(XMLMarshaller.java:934)
- at org.eclipse.persistence.internal.oxm.XMLMarshaller.marshal(XMLMarshaller.java:877)
- at org.eclipse.persistence.jaxb.JAXBMarshaller.marshal(JAXBMarshaller.java:483)
- ... 47 more
- Caused by: javax.net.ssl.SSLHandshakeException: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
- at sun.security.ssl.Alerts.getSSLException(Alerts.java:192)
- at sun.security.ssl.SSLSocketImpl.fatal(SSLSocketImpl.java:1949)
- at sun.security.ssl.Handshaker.fatalSE(Handshaker.java:302)
- at sun.security.ssl.Handshaker.fatalSE(Handshaker.java:296)
- at sun.security.ssl.ClientHandshaker.serverCertificate(ClientHandshaker.java:1514)
- at sun.security.ssl.ClientHandshaker.processMessage(ClientHandshaker.java:216)
- at sun.security.ssl.Handshaker.processLoop(Handshaker.java:1026)
- at sun.security.ssl.Handshaker.process_record(Handshaker.java:961)
- at sun.security.ssl.SSLSocketImpl.readRecord(SSLSocketImpl.java:1062)
- at sun.security.ssl.SSLSocketImpl.performInitialHandshake(SSLSocketImpl.java:1375)
- at sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:1403)
- at sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:1387)
- at sun.net.www.protocol.https.HttpsClient.afterConnect(HttpsClient.java:559)
- at sun.net.www.protocol.https.AbstractDelegateHttpsURLConnection.connect(AbstractDelegateHttpsURLConnection.java:185)
- at sun.net.www.protocol.http.HttpURLConnection.getOutputStream0(HttpURLConnection.java:1316)
- at sun.net.www.protocol.http.HttpURLConnection.getOutputStream(HttpURLConnection.java:1291)
- at sun.net.www.protocol.https.HttpsURLConnectionImpl.getOutputStream(HttpsURLConnectionImpl.java:250)
- at org.glassfish.jersey.client.internal.HttpUrlConnector$4.getOutputStream(HttpUrlConnector.java:385)
- at org.glassfish.jersey.message.internal.CommittingOutputStream.commitStream(CommittingOutputStream.java:200)
- at org.glassfish.jersey.message.internal.CommittingOutputStream.commitStream(CommittingOutputStream.java:194)
- at org.glassfish.jersey.message.internal.CommittingOutputStream.write(CommittingOutputStream.java:228)
- at org.glassfish.jersey.message.internal.WriterInterceptorExecutor$UnCloseableOutputStream.write(WriterInterceptorExecutor.java:299)
- at org.eclipse.persistence.oxm.record.JSONWriterRecord$OutputStreamOutput.flush(JSONWriterRecord.java:974)
- at org.eclipse.persistence.oxm.record.JSONWriterRecord.flush(JSONWriterRecord.java:760)
- ... 51 more
- Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
- at sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:387)
- at sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:292)
- at sun.security.validator.Validator.validate(Validator.java:260)
- at sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:324)
- at sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:229)
- at sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:124)
- at sun.security.ssl.ClientHandshaker.serverCertificate(ClientHandshaker.java:1496)
- ... 70 more
- Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
- at sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
- at sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
- at java.security.cert.CertPathBuilder.build(CertPathBuilder.java:280)
- at sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:382)
- ... 76 more
- eu.arrowhead.common.exception.UnavailableServerException: Could not get any response from: https://192.168.1.72:8447/gatekeeper/gsd_poll
- at eu.arrowhead.common.Utility.sendRequest(Utility.java:92)
- at eu.arrowhead.core.gatekeeper.GatekeeperResource.GSDRequest(GatekeeperResource.java:98)
- at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
- at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
- at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
- at java.lang.reflect.Method.invoke(Method.java:498)
- at org.glassfish.jersey.server.model.internal.ResourceMethodInvocationHandlerFactory$1.invoke(ResourceMethodInvocationHandlerFactory.java:81)
- at org.glassfish.jersey.server.model.internal.AbstractJavaResourceMethodDispatcher$1.run(AbstractJavaResourceMethodDispatcher.java:144)
- at org.glassfish.jersey.server.model.internal.AbstractJavaResourceMethodDispatcher.invoke(AbstractJavaResourceMethodDispatcher.java:161)
- at org.glassfish.jersey.server.model.internal.JavaResourceMethodDispatcherProvider$ResponseOutInvoker.doDispatch(JavaResourceMethodDispatcherProvider.java:160)
- at org.glassfish.jersey.server.model.internal.AbstractJavaResourceMethodDispatcher.dispatch(AbstractJavaResourceMethodDispatcher.java:99)
- at org.glassfish.jersey.server.model.ResourceMethodInvoker.invoke(ResourceMethodInvoker.java:389)
- at org.glassfish.jersey.server.model.ResourceMethodInvoker.apply(ResourceMethodInvoker.java:347)
- at org.glassfish.jersey.server.model.ResourceMethodInvoker.apply(ResourceMethodInvoker.java:102)
- at org.glassfish.jersey.server.ServerRuntime$2.run(ServerRuntime.java:326)
- at org.glassfish.jersey.internal.Errors$1.call(Errors.java:271)
- at org.glassfish.jersey.internal.Errors$1.call(Errors.java:267)
- at org.glassfish.jersey.internal.Errors.process(Errors.java:315)
- at org.glassfish.jersey.internal.Errors.process(Errors.java:297)
- at org.glassfish.jersey.internal.Errors.process(Errors.java:267)
- at org.glassfish.jersey.process.internal.RequestScope.runInScope(RequestScope.java:317)
- at org.glassfish.jersey.server.ServerRuntime.process(ServerRuntime.java:305)
- at org.glassfish.jersey.server.ApplicationHandler.handle(ApplicationHandler.java:1154)
- at org.glassfish.jersey.grizzly2.httpserver.GrizzlyHttpContainer.service(GrizzlyHttpContainer.java:384)
- at org.glassfish.grizzly.http.server.HttpHandler$1.run(HttpHandler.java:224)
- at org.glassfish.grizzly.threadpool.AbstractThreadPool$Worker.doWork(AbstractThreadPool.java:591)
- at org.glassfish.grizzly.threadpool.AbstractThreadPool$Worker.run(AbstractThreadPool.java:571)
- at java.lang.Thread.run(Thread.java:745)
- grizzly-http-server-2, WRITE: TLSv1.2 Application Data, length = 123
- grizzly-nio-kernel(4) SelectorRunner, READ: TLSv1.2 Alert, length = 64
- grizzly-nio-kernel(4) SelectorRunner, RECV TLSv1.2 ALERT: warning, close_notify
- grizzly-nio-kernel(4) SelectorRunner, closeInboundInternal()
- grizzly-nio-kernel(4) SelectorRunner, closeOutboundInternal()
- grizzly-nio-kernel(4) SelectorRunner, SEND TLSv1.2 ALERT: warning, description = close_notify
- grizzly-nio-kernel(4) SelectorRunner, WRITE: TLSv1.2 Alert, length = 64
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement