Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Using SSLEngineImpl.
- Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384
- Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA
- Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
- Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA
- Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
- Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256
- Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA
- Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384
- Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384
- Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_GCM_SHA384
- Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384
- Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
- Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA
- Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384
- Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384
- Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
- Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
- Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256
- Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA
- Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
- Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
- Allow unsafe renegotiation: false
- Allow legacy hello messages: true
- Is initial handshake: true
- Is secure renegotiation: false
- Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 for TLSv1
- Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 for TLSv1
- Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 for TLSv1
- Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256 for TLSv1
- Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256 for TLSv1
- Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 for TLSv1
- Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 for TLSv1
- Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 for TLSv1.1
- Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 for TLSv1.1
- Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 for TLSv1.1
- Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256 for TLSv1.1
- Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256 for TLSv1.1
- Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 for TLSv1.1
- Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 for TLSv1.1
- grizzly-nio-kernel(4) SelectorRunner, READ: TLSv1.2 Handshake, length = 161
- *** ClientHello, TLSv1.2
- RandomCookie: GMT: 1514403782 bytes = { 145, 45, 208, 164, 164, 47, 33, 39, 16, 152, 68, 93, 167, 89, 248, 236, 49, 40, 170, 243, 127, 231, 112, 133, 255, 79, 82, 145 }
- Session ID: {}
- Cipher Suites: [TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256, TLS_RSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_DSS_WITH_AES_128_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_DSS_WITH_AES_128_GCM_SHA256, TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA, TLS_EMPTY_RENEGOTIATION_INFO_SCSV]
- Compression Methods: { 0 }
- Extension elliptic_curves, curve names: {secp256r1, secp384r1, secp521r1, sect283k1, sect283r1, sect409k1, sect409r1, sect571k1, sect571r1, secp256k1}
- Extension ec_point_formats, formats: [uncompressed]
- Extension signature_algorithms, signature_algorithms: SHA512withECDSA, SHA512withRSA, SHA384withECDSA, SHA384withRSA, SHA256withECDSA, SHA256withRSA, Unknown (hash:0x4, signature:0x2), SHA1withECDSA, SHA1withRSA, SHA1withDSA
- ***
- %% Initialized: [Session-3, SSL_NULL_WITH_NULL_NULL]
- %% Negotiating: [Session-3, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256]
- *** ServerHello, TLSv1.2
- RandomCookie: GMT: 1514403783 bytes = { 187, 91, 108, 215, 58, 155, 129, 110, 137, 161, 228, 223, 75, 32, 252, 81, 195, 16, 58, 143, 255, 212, 214, 149, 11, 24, 210, 35 }
- Session ID: {90, 68, 248, 199, 217, 210, 203, 88, 111, 63, 253, 153, 169, 132, 74, 213, 143, 10, 201, 25, 105, 21, 249, 156, 58, 58, 84, 67, 123, 172, 7, 158}
- Cipher Suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
- Compression Method: 0
- Extension renegotiation_info, renegotiated_connection: <empty>
- ***
- Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
- *** Certificate chain
- chain [0] = [
- [
- Version: V3
- Subject: CN=Gatekeeper.CoreSystems.testcloud1.aitia.arrowhead.eu, ST=Hungary, C=HU, EMAILADDRESS=hegeduscs@aitia.ai
- Signature Algorithm: SHA256withRSA, OID = 1.2.840.113549.1.1.11
- Key: Sun RSA public key, 2048 bits
- modulus: 27329402115678122225764261503397951422747364574513781449753544166943375833204685084567538107689278008686109882866903084328866398777394255794187667080688734578672590115870425850259415291609256283357433542992813482378625718356309166319384351317240884680601857164189449535129129459275197193725981126550855654958536428226964592274158118989484314836945394216213980800655055534411978217491383199685722730452438525552772985614945992141929469751402070594557363602618635978174977839549791873346585743921554196683873451180011405746998850599375862853759839881202325179663605057679634818452164663742333502098982647729107092022931
- public exponent: 65537
- Validity: [From: Mon Jul 11 17:01:25 CEST 2016,
- To: Sat Jul 11 17:01:25 CEST 2026]
- Issuer: CN=TestCloud1.aitia.arrowhead.eu, O=AITIA, L=Budapest, ST=Hungary, C=HU, EMAILADDRESS=hegeduscs@aitia.ai
- SerialNumber: [ 5783b4a8]
- ]
- Algorithm: [SHA256withRSA]
- Signature:
- 0000: 69 70 83 1B B0 4C 86 E6 9E 85 FD EF BA A2 74 89 ip...L........t.
- 0010: AA AA DE DC E1 5C 80 14 8A BC D9 37 B4 B0 CF 61 .....\.....7...a
- 0020: 0B 69 D0 D1 17 F1 87 31 84 4F A4 93 86 64 A4 FD .i.....1.O...d..
- 0030: 83 B7 F3 B2 21 42 56 71 C6 28 A7 C0 01 1C 80 B3 ....!BVq.(......
- 0040: 86 0E 7E 3E 2E A3 83 A4 4A 9A 57 F8 19 0F 42 7D ...>....J.W...B.
- 0050: 06 8C 34 6E 67 73 44 00 2C DB 4D E4 63 CB 80 42 ..4ngsD.,.M.c..B
- 0060: FA E0 0B 8D A6 E5 26 A7 EC 24 21 67 54 23 BB D2 ......&..$!gT#..
- 0070: FD D0 BB F9 77 AB 4B DC AB E4 3B D9 F0 F2 F0 C8 ....w.K...;.....
- 0080: AE 66 77 DE BD 7A F4 00 80 51 9A BC F3 2A 1C 2D .fw..z...Q...*.-
- 0090: DF E1 46 A7 01 5A C8 EC A8 8D 0A 59 1D 4E 17 B2 ..F..Z.....Y.N..
- 00A0: 44 A3 3B 3E 3C BF DD 23 AE C5 C2 8F E7 BA D9 3E D.;><..#.......>
- 00B0: C2 4E C0 23 E8 77 90 28 1E 43 EF 19 01 B7 D9 6F .N.#.w.(.C.....o
- 00C0: C2 0A A1 32 93 CB CC F2 AF 8A 20 B2 37 26 1F F2 ...2...... .7&..
- 00D0: B7 15 22 24 29 6F F9 45 D4 9F 8F 0C 2C 26 2C 78 .."$)o.E....,&,x
- 00E0: 85 29 DA 15 C2 01 F5 F4 A5 E6 A7 6F FF 59 49 42 .).........o.YIB
- 00F0: 30 6D 81 E7 3F 0A 17 70 82 A5 50 34 E6 6A 21 65 0m..?..p..P4.j!e
- ]
- chain [1] = [
- [
- Version: V3
- Subject: CN=TestCloud1.aitia.arrowhead.eu, O=AITIA, L=Budapest, ST=Hungary, C=HU, EMAILADDRESS=hegeduscs@aitia.ai
- Signature Algorithm: SHA256withRSA, OID = 1.2.840.113549.1.1.11
- Key: Sun RSA public key, 2048 bits
- modulus: 25335455530409072998888487188142468130750713358823743359097427303343379809956695722799171867655886461949782462630775415197549997942183924202950506556266518974929427626484350384237194264871189277705903703331314636350552874176218729333812111512125096984545119367011764673643429396351600906631681436634361370604816902974394186743170460451584381856548821788392764038963334570810607282844423560253135621204974887801596742518115887940717956280269669683760737397823349963965399032478931868503491269764853746569417474849307732096566896147074803703196022403527725826797257182856954483072427592737958458243838459065468909005741
- public exponent: 65537
- Validity: [From: Mon Jul 11 16:37:02 CEST 2016,
- To: Sat Jul 11 16:37:02 CEST 2026]
- Issuer: CN=arrowhead.eu, O=Arrowhead Consortium, C=EU, EMAILADDRESS=hegeduscs@aitia.ai
- SerialNumber: [ 5783aee1]
- ]
- Algorithm: [SHA256withRSA]
- Signature:
- 0000: C9 1D 28 73 7C 1A C7 80 A9 A3 A2 58 36 53 8C E2 ..(s.......X6S..
- 0010: DF 65 CF 81 78 59 93 A6 06 CF 98 2E EA B6 7D 16 .e..xY..........
- 0020: 7F AC F1 86 BF FB 0E C5 44 A3 C7 BC D8 D4 B3 76 ........D......v
- 0030: BC 2A 1C 41 62 75 8C DE 9E 4B EE 6A 7E 17 56 5F .*.Abu...K.j..V_
- 0040: F0 21 70 78 C6 1B AE CD 61 EE A3 43 8F 50 E7 6E .!px....a..C.P.n
- 0050: 24 EB 9C B9 AE 8E F9 1E 9D 8A A3 F3 4F F3 20 EA $...........O. .
- 0060: 1B E9 BE AC 1C 16 78 7A A7 94 71 35 37 C3 6A CD ......xz..q57.j.
- 0070: 50 5F FE CC 9F 0D 7C 51 61 CB F3 4B 8A F4 9B 73 P_.....Qa..K...s
- 0080: 8D CC 75 3A 0E A9 DA 20 A3 76 B0 16 57 C8 95 E2 ..u:... .v..W...
- 0090: 0B 3C AA F0 A1 C8 6F 94 45 94 8D BD EB 2C 90 27 .<....o.E....,.'
- 00A0: 2D DC D9 DC 32 E5 61 96 BE 6C 8D 3E 7F DD 1D 77 -...2.a..l.>...w
- 00B0: 91 DC C1 35 A8 2A 36 8C 58 93 73 C6 02 EF A6 1F ...5.*6.X.s.....
- 00C0: BD C2 B7 15 08 93 76 A7 32 D0 30 A8 43 46 DC 30 ......v.2.0.CF.0
- 00D0: 11 98 04 74 C4 67 EC A8 9D 51 87 4E AC 49 D2 68 ...t.g...Q.N.I.h
- 00E0: 8E 1B A6 F6 DD 5B 41 26 5D BB 7F D8 6E 96 B9 E0 .....[A&]...n...
- 00F0: 7E DA 56 B7 E7 47 92 56 3B 17 F4 59 E4 88 BD FE ..V..G.V;..Y....
- ]
- chain [2] = [
- [
- Version: V3
- Subject: CN=arrowhead.eu, O=Arrowhead Consortium, C=EU, EMAILADDRESS=hegeduscs@aitia.ai
- Signature Algorithm: SHA256withRSA, OID = 1.2.840.113549.1.1.11
- Key: Sun RSA public key, 2048 bits
- modulus: 28057648673173649596015723989731153166119607605462644560044283174980952933063834323028449384489202975624862258259462701104223528380881593826354069724644591909392761458654801338675933394233630472899093044680708151113533313220684218076216542533439407677631859894172523237944586604625178010150246597651348877104226799241766171429538315399758546900973055730330754119600045574192733704801050439305781876698617780997207168186967851746167889266150096000384097615777824345169659705918473221289779435029597251429760394554511215657684409000896650467929532540491315976603632814113614763238507383489581524436879233728796764049629
- public exponent: 65537
- Validity: [From: Mon Jul 11 16:13:38 CEST 2016,
- To: Tue Jul 11 16:13:38 CEST 2017]
- Issuer: CN=arrowhead.eu, O=Arrowhead Consortium, C=EU, EMAILADDRESS=hegeduscs@aitia.ai
- SerialNumber: [ 5783a958]
- ]
- Algorithm: [SHA256withRSA]
- Signature:
- 0000: 6E 7A D4 89 98 27 18 8E 51 3F A5 6C 0B 13 51 89 nz...'..Q?.l..Q.
- 0010: 19 FE E9 11 90 B9 98 AB F4 BA 5E A4 B7 C9 27 40 ..........^...'@
- 0020: F9 EE AD 47 9F C0 9F 8C 82 A8 DA 0E B7 A3 0E 0B ...G............
- 0030: 50 FA 1B C2 9E 5C AC 03 17 BD 4A BD 55 1C A4 BC P....\....J.U...
- 0040: B7 AB FB B0 09 3C 88 CD AF 58 9A 46 52 8B 4C 0B .....<...X.FR.L.
- 0050: 6D F9 C0 08 2A AA 51 81 EF 20 23 37 D3 6F 8E 60 m...*.Q.. #7.o.`
- 0060: 44 99 34 41 54 D0 8B B3 7F 1C 92 46 DF 64 71 63 D.4AT......F.dqc
- 0070: 8E 80 C5 3E E9 71 50 50 C0 90 F9 DB 0D DB 89 88 ...>.qPP........
- 0080: DA 7B D3 99 D0 28 B1 29 DD 32 E4 03 08 06 3A 89 .....(.).2....:.
- 0090: D6 4D B6 D4 21 BA E4 9F A6 51 CB A4 B7 8A 31 D6 .M..!....Q....1.
- 00A0: 9E 9D D8 08 0D DC C5 F8 DE FA 2E 14 28 C7 44 29 ............(.D)
- 00B0: 5E 14 23 B9 CC 7B 81 24 E3 6B 43 2E A1 53 41 6A ^.#....$.kC..SAj
- 00C0: 1A 60 B5 2C 4A ED 97 15 B3 BF 7D DF C7 BE 02 1B .`.,J...........
- 00D0: 32 FF B9 5D 41 09 3F 10 70 FB 28 CF 50 47 95 FA 2..]A.?.p.(.PG..
- 00E0: 0C 13 9C F1 9F 24 F2 E9 C2 1F B1 86 8A 89 14 7D .....$..........
- 00F0: 7B E6 70 DD 8A EF 65 77 1E 45 37 AC 57 66 EF 09 ..p...ew.E7.Wf..
- ]
- ***
- *** ECDH ServerKeyExchange
- Signature Algorithm SHA512withRSA
- Server key: Sun EC public key, 256 bits
- public x coord: 37183157797950750462840169333208907131169145994024490661603782694689994615867
- public y coord: 17717328271339448037942148722115307704849775109362629489439187181166207502233
- parameters: secp256r1 [NIST P-256, X9.62 prime256v1] (1.2.840.10045.3.1.7)
- *** CertificateRequest
- Cert Types: RSA, DSS, ECDSA
- Supported Signature Algorithms: SHA512withECDSA, SHA512withRSA, SHA384withECDSA, SHA384withRSA, SHA256withECDSA, SHA256withRSA, SHA1withECDSA, SHA1withRSA, SHA1withDSA
- Cert Authorities:
- <CN=TestCloud1.aitia.arrowhead.eu, O=AITIA, L=Budapest, ST=Hungary, C=HU, EMAILADDRESS=hegeduscs@aitia.ai>
- *** ServerHelloDone
- grizzly-nio-kernel(4) SelectorRunner, WRITE: TLSv1.2 Handshake, length = 3250
- grizzly-nio-kernel(4) SelectorRunner, READ: TLSv1.2 Alert, length = 2
- grizzly-nio-kernel(4) SelectorRunner, RECV TLSv1.2 ALERT: fatal, certificate_unknown
- grizzly-nio-kernel(4) SelectorRunner, fatal: engine already closed. Rethrowing javax.net.ssl.SSLException: Received fatal alert: certificate_unknown
- grizzly-nio-kernel(4) SelectorRunner, fatal: engine already closed. Rethrowing javax.net.ssl.SSLException: Received fatal alert: certificate_unknown
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement