Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- [Thr 773] IcmWorkerHandleRequest: worker 1 got the semaphore
- [Thr 773] REQ TRACE BEGIN: 9/5695/1
- [Thr 773] REQUEST:
- Type: ACCEPT_CONNECTION Index = 6765
- [Thr 773] CONNECTION (id=9/5695):
- used: 1, type: default, role: Server(1), stateful: 0
- NI_HDL: 165, protocol: HTTPS(2)
- local host: 134.58.14.188:44322 ()
- remote host: 10.112.0.20:57617 ()
- status: NOP
- connect time: 04.07.2018 16:54:16
- MPI request: <0> MPI response: <0> MPI next: <0>
- request_buf_size: 0 response_buf_size: 0
- request_buf_used: 0 response_buf_used: 0
- request_buf_offset: 0 response_buf_offset: 0
- [Thr 773] MPI:6 create pipe a00000030000da0 1
- [Thr 773] MPI<25ea>6#1 Open( ANONYMOUS 6 1 ) -> 6
- [Thr 773] MPI<25ea>6#2 Open( ANONYMOUS 6 0 ) -> 6
- [Thr 773] MPI:19 create pipe a000000300027a0 1
- [Thr 773] Wed Jul 4 16:54:16:268 2018
- [Thr 773] MPI<25eb>13#1 Open( ANONYMOUS 19 0 ) -> 19
- [Thr 773] MPI<25eb>13#2 Open( ANONYMOUS 19 1 ) -> 19
- [Thr 773] ->> SapSSLSessionInit(&sssl_hdl=1111c5800, role=2 (SERVER), auth_type=0 (NO_CLIENT_CERT))
- [Thr 773] <<- SapSSLSessionInit()==SAP_O_K
- [Thr 773] in: args = "role=2 (SERVER), auth_type=0 (NO_CLIENT_CERT)"
- [Thr 773] out: sssl_hdl = 1133566f0
- [Thr 773] ->> SapSSLSetNiHdl(sssl_hdl=1133566f0, ni_hdl=165)
- [Thr 773] SSL NI-hdl 165: local=134.58.14.188:44322 peer=10.112.0.20:57617
- [Thr 773] <<- SapSSLSetNiHdl(sssl_hdl=1133566f0, ni_hdl=165)==SAP_O_K
- [Thr 773] ->> SapSSLSessionStartNB(sssl_hdl=1133566f0, flags=00000000, timeout=500, &IOstat=1111c580c)
- [Thr 773] NiIBlockMode: leave blockmode for hdl 165 FALSE
- [Thr 773] NiIHdlGetStatus: hdl 165/sock 28 ok, data pending (len=1)
- [Thr 773] SSL:SiRecv(sock= 28)== 0 (SI_OK) (in=16, max=16)
- [Thr 773] SSL:SiRecv(sock= 28)== 0 (SI_OK) (in=190, max=208)
- [Thr 773] (3,1) ClientHello (clv=3,3) TLSextSNI="poq.cc.kuleuven.be"
- [Thr 773] CCL[SSL]: Srv-000000A9: ClientHello: version: 3.3 (TLSv1.2) [ssl3_parse_client_hello]
- [Thr 773] CCL[SSL]: Srv-000000A9: ClientHello: Client offers 14 cipher suite(s) and SCSV(s):
- [Thr 773] Unknown ID: (0x0a, 0x0a), decimal (10, 10)
- [Thr 773] TLS_ECDHE_ECDSA_WITH_AES128_GCM_SHA256
- [Thr 773] TLS_ECDHE_RSA_WITH_AES128_GCM_SHA256
- [Thr 773] TLS_ECDHE_ECDSA_WITH_AES256_GCM_SHA384
- [Thr 773] TLS_ECDHE_RSA_WITH_AES256_GCM_SHA384
- [Thr 773] Unknown ID: (0xcc, 0xa9), decimal (204, 169)
- [Thr 773] Unknown ID: (0xcc, 0xa8), decimal (204, 168)
- [Thr 773] TLS_ECDHE_RSA_WITH_AES128_CBC_SHA
- [Thr 773] TLS_ECDHE_RSA_WITH_AES256_CBC_SHA
- [Thr 773] TLS_RSA_WITH_AES128_GCM_SHA256
- [Thr 773] TLS_RSA_WITH_AES256_GCM_SHA384
- [Thr 773] TLS_RSA_WITH_AES128_CBC_SHA
- [Thr 773] TLS_RSA_WITH_AES256_CBC_SHA
- [Thr 773] TLS_RSA_WITH_3DES_EDE_CBC_SHA
- [Thr 773] [ssl_bytes_to_cipher_suites]
- [Thr 773] CCL[SSL]: Srv-000000A9: Received TLS Extensions:
- [Thr 773] Id: 35466 - unknown extension type
- [Thr 773] Id: 65281 - renegotiation_info [RFC5746]
- [Thr 773] Id: 0 - server_name [RFC6066]
- [Thr 773] Id: 23 - unknown extension type
- [Thr 773] Id: 35 - SessionTicket TLS [RFC4507]
- [Thr 773] Id: 13 - signature_algorithms [RFC5246]
- [Thr 773] Id: 5 - status_request [RFC6066]
- [Thr 773] Id: 18 - signed_certificate_timestamp [RFC6962]
- [Thr 773] Id: 16 - application_layer_protocol_negotiation [RFC7301]
- [Thr 773] Id: 30032 - unknown extension type
- [Thr 773] Id: 11 - ec_point_formats [RFC4492]
- [Thr 773] Id: 10 - elliptic_curves [RFC4492]
- [Thr 773] Id: 39578 - unknown extension type
- [Thr 773] [ssl_parse_clienthello_tlsext]
- [Thr 773] CCL[SSL]: Srv-000000A9: NameType: host_name. [ssl_parse_ext_server_name]
- [Thr 773] CCL[SSL]: Srv-000000A9: NameType host_name (0): poq.cc.kuleuven.be [tls_check_host_name]
- [Thr 773] CCL[SSL]: Srv-000000A9: Client requested for new session [ssl3_evaluate_client_hello]
- [Thr 773] CCL[SSL]: Srv-000000A9: Creating new session. Performing full handshake [ssl3_evaluate_client_hello]
- [Thr 773] CCL[SSL]: Srv-000000A9: Sending ServerHello version 3.3. (TLSv1.2) [ssl3_send_server_hello]
- [Thr 773] CCL[SSL]: Srv-000000A9: ServerHello: Negotiated protocol version : 3.3. [ssl3_send_server_hello]
- [Thr 773] CCL[SSL]: Srv-000000A9: ServerHello: Negotiated cipher suite is TLS_RSA_WITH_AES128_GCM_SHA256 [ssl3_send_server_hello]
- [Thr 773] CCL[SSL]: Srv-000000A9: Sending own certificate [ssl3_output_cert_chain]
- [Thr 773] CCL[SSL]: Srv-000000A9: Own TLS certificate:
- [Thr 773] Subject: CN=localhost, OU=ssl-enabled-server, O=app-server
- [Thr 773] Issuer: CN=localhost, OU=ssl-enabled-server, O=app-server
- [Thr 773] Serial Number: A7:76:70:2D
- [Thr 773] [ssl3_output_cert_chain]
- [Thr 773] CCL[SSL]: Srv-000000A9: No client authentication required [ssl3_accept]
- [Thr 773] SSL:SSL_read(netin= 206) handshake, processed= 206
- [Thr 773] SSL:SiSend(sock= 28)== 0 (SI_OK) (out=665 of 665)
- [Thr 773] SSL:SiRecv(sock= 28)==13 (SI_ETIMEOUT) (in=0, max=16)
- [Thr 773] --> SSL:SiPoll(sock=28, evt=R, timeout= 500 ms)
- [Thr 773] <-- SSL:SiPoll(sock=28, evt=R, slept = 0 ms) Ready
- [Thr 773] SSL:SiRecv(sock= 28)== 0 (SI_OK) (in=16, max=16)
- [Thr 773] SSL:SiRecv(sock= 28)== 0 (SI_OK) (in=128, max=128)
- [Thr 773] SSL:SSL_read(netin= 139) handshake, processed= 139
- [Thr 773] SSL:SiRecv(sock= 28)== 0 (SI_OK) (in=16, max=16)
- [Thr 773] SSL:SSL_read(netin= 6) handshake, processed= 6
- [Thr 773] SSL:SiRecv(sock= 28)== 0 (SI_OK) (in=30, max=48)
- [Thr 773] CCL[SSL]: Srv-000000A9: ########## TLSv1.2 connection with anonymous client established ########## [ssl3_accept]
- [Thr 773] Wed Jul 4 16:54:16:270 2018
- [Thr 773] SSL:SSL_read(netin= 45) handshake, processed= 45
- [Thr 773] SSL:SiSend(sock= 28)== 0 (SI_OK) (out=51 of 51)
- [Thr 773] Server-configured Ciphersuites: "TLS_RSA_WITH_AES128_GCM_SHA256:TLS_RSA_WITH_AES256_GCM_SHA384:TLS_RSA_WITH_AES128_CBC_SHA:TLS_RSA_WITH_AES256_CBC_SHA:TLS_RSA_WITH_RC4_128_SHA:TLS_RSA_WITH_RC4_128_MD5:TLS_RSA_WITH_3DES_EDE_CBC_SHA"
- [Thr 773] Client-offered Ciphersuites: "TLS_ECDHE_ECDSA_WITH_AES128_GCM_SHA256:TLS_ECDHE_RSA_WITH_AES128_GCM_SHA256:TLS_ECDHE_ECDSA_WITH_AES256_GCM_SHA384:TLS_ECDHE_RSA_WITH_AES256_GCM_SHA384:TLS_ECDHE_RSA_WITH_AES128_CBC_SHA:TLS_ECDHE_RSA_WITH_AES256_CBC_SHA:TLS_RSA_WITH_AES128_GCM_SHA256:TLS_RSA_WITH_AES256_GCM_SHA384:TLS_RSA_WITH_AES128_CBC_SHA:TLS_RSA_WITH_AES256_CBC_SHA:TLS_RSA_WITH_3DES_EDE_CBC_SHA:TLS_RFC5746_INFO_SCSV"
- [Thr 773] No Client Certificate
- [Thr 773] New session (TLSv1.2, TLS_RSA_WITH_AES128_GCM_SHA256{00,9c})
- [Thr 773] HexDump of new SSL session ID { &buf= 113354f9c, buf_len= 32 }
- [Thr 773] 00000: b6 91 a6 1c 8d 78 ac 2e 3e e0 96 fc a0 c1 e6 0b .....x.. >.......
- [Thr 773] 00010: c3 d5 9c c0 32 74 ef a4 03 86 a0 29 84 ac 4f 91 ....2t.. ...)..O.
- [Thr 773] SapSSLISessionStartFin(sssl_hdl=1133566f0)==SAP_O_K
- [Thr 773] in/out: status = "new SSL session,TLSv1.2,TLS_RSA_WITH_AES128_GCM_SHA256, client cert NOT requested"
- [Thr 773] <<- SapSSLSessionStartNB(sssl_hdl=1133566f0)==SAP_O_K
- [Thr 773] in/out: ... = "fl=00000000, timeout=500, io=idle"
- [Thr 773] IcmPlCheckRetVal: Next status: READ_REQUEST(1)
- [Thr 773] ->> SapSSLReadPendingNB(sssl_hdl=1133566f0, &plen=(nil), &more=(nil), &ios=11316c394)
- [Thr 773] <<- SapSSLReadPendingNB(sssl_hdl=1133566f0)==SAP_O_K
- [Thr 773] in/out: ... = "pendlen=0, more=N, io=idle"
- [Thr 773] IcmReadFromConn(id=9/5695): request new MPI (0/0)
- [Thr 773] IcmLowOnBlocks: mpi buffer space free (cur/limit/unreserved): 0/716/896)
- [Thr 773] MPI<25ea>6#3 GetOutbuf 0 ad2a0 65536 (0) -> a000000300ad2c0 20971520 MPI_OK
- [Thr 773] IcmMpiGetOutbuf: Set MPI Header with type 1 at a000000300ad2c0, len=80
- [Thr 773] IcmMpiSetHeaderData: Set MPI Header with type 1 at a000000300ad2c0, len=80
- [Thr 773] ->> SapSSLReadPendingNB(sssl_hdl=1133566f0, &plen=11316c214, &more=11316c210, &ios=11316c218)
- [Thr 773] <<- SapSSLReadPendingNB(sssl_hdl=1133566f0)==SAP_O_K
- [Thr 773] in/out: ... = "pendlen=0, more=N, io=idle"
- [Thr 773] NiIPeek: peek successful for hdl 165 (r)
- [Thr 773] ->> SapSSLReadNB(sssl_hdl=1133566f0, buf=a000000300ad310, buf_max=65455, flags=00000000, timeout=500, &bMoreData=11316c210, &IOstate=11316c218, &readlen=11316c21c)
- [Thr 773] SSL:SiRecv(sock= 28)== 0 (SI_OK) (in=16, max=16)
- [Thr 773] SSL:SiRecv(sock= 28)== 0 (SI_OK) (in=445, max=464)
- [Thr 773] SSL:SSL_read(reclen= 461) data, out= 432
- [Thr 773] <<- SapSSLReadNB(sssl_hdl=1133566f0)==SAP_O_K
- [Thr 773] in/out: ... = "fl=0x00, max=65455, got=432, more=N, io=idle"
- [Thr 773] ->> SapSSLReadPendingNB(sssl_hdl=1133566f0, &plen=11316c214, &more=11316c210, &ios=11316c218)
- [Thr 773] <<- SapSSLReadPendingNB(sssl_hdl=1133566f0)==SAP_O_K
- [Thr 773] in/out: ... = "pendlen=0, more=N, io=idle"
- [Thr 773] NiIPeek: peek for hdl 165 timed out (r; 0ms)
- [Thr 773] IcmReadFromConn(id=9/5695): no SSL data available
- [Thr 773] IcmReadFromConn(id=9/5695): read 432 bytes, 1 readops (timeout 0)
- [Thr 773] BINDUMP of content denied
- [Thr 773] HttpPlugInHandleNetData(rqid=9/5695/1): role: Server(1), status: 1
- [Thr 773] content-length: 0/0, buf_len: 432, buf_offset: 0, buf_status: 0
- [Thr 773] Wed Jul 4 16:54:16:271 2018
- [Thr 773] ICT: IctIHttpOpenMessage: 11582c030 typ=1
- [Thr 773] IctCheckIfValidHostname: Check [poq.cc.kuleuven.be:44322] len 24
- [Thr 773] HttpParseRequestHeader: no content length set
- [Thr 773] HttpParseRequestHeader: no transfer-encoding set
- [Thr 773] HttpParseRequestHeader: Version: 1001
- [Thr 773] HttpParseRequestHeader: Keep-Alive: 1
- [Thr 773] HTTP request (raw) [9/5695/1]:
- [Thr 773] GET /DataManager.svc HTTP/1.1
- [Thr 773] host: poq.cc.kuleuven.be:44322
- [Thr 773] connection: keep-alive
- [Thr 773] upgrade-insecure-requests: 1
- [Thr 773] user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.99 Safari/537.36
- [Thr 773] accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
- [Thr 773] accept-encoding: gzip, deflate, br
- [Thr 773] accept-language: nl-NL,nl;q=0.9,en-US;q=0.8,en;q=0.7
- [Thr 773] Connection Info: role=Server, local=par0189:44322, peer=10.112.0.20, protocol=HTTPS
- [Thr 773] ->> SapSSLGetPeerInfo(sssl_hdl=1133566f0, &cert=11316ac38, &cert_len=11316ac30,
- [Thr 773] &subject_dn=11316ac40, &issuer_dn=11316ac48, &csuite_name=11316ac50)
- [Thr 773] <<- SapSSLGetPeerInfo(sssl_hdl=1133566f0)==SAP_O_K
- [Thr 773] out: cert_len = <no cert>
- [Thr 773] out: csuite_name = "TLS_RSA_WITH_AES128_GCM_SHA256"
- [Thr 773] sap-cancel-on-close not found
- [Thr 773] IcmLockVhostTable: exclusive=0 timeout=-1-> 0
- [Thr 773] IcmMakeVhostIndexKey: key='datamanagek.cc.qop 4432244322r.svc eb.nevuelu 134.58.14.188 ????????????'
- [Thr 773] IcmLookupVhostTable: 1117d9c90 vhost=poq.cc.kuleuven.be, vport=44322, phost=134.58.14.188, pport=44322, urlprefix=/DataManager.svc, lock=1 -> rc=0
- [Thr 773] IcmLockVhostTable: -> 0
- [Thr 773] IcmLookupVhostTable: 1117d9c90 vhost=poq.cc.kuleuven.be, vport=44322, phost=134.58.14.188, pport=44322, urlprefix=/DataManager.svc, lock=1 -> vidx=-1 rl=1 rc=0
- [Thr 773] IcrFindTargetSystem: SYX found for vhost: poq.cc.kuleuven.be addr: 134.58.14.188:44322 url: /DataManager.svc
- [Thr 773] HttpGetRouteTargetSystem: SID='SYX'
- [Thr 773] IcmLockVhostTable: exclusive=0 timeout=-1-> 0
- [Thr 773] IcmLockVhostTable: -> 0
- [Thr 773] IcmLookupVhostTableBySystemName: 1117d9c90 systemName=SYX, lock=1 -> rc=0
- [Thr 773] HttpGetCgpVirtHost: found vhostRunlevel = 1
- [Thr 773] HttpGetVirtHost: active runlevel = 1
- [Thr 773] HttpSrvHdlRequest: method: 1; path: /DataManager.svc
- [Thr 773] Handler 0: HttpAuthHandler matches url: /DataManager.svc
- [Thr 773] Handler 1: HttpModHandler matches url: /DataManager.svc
- [Thr 773] Handler 3: HttpWebDispHandler matches url: /DataManager.svc
- [Thr 773] HttpSubHandlerMatch: add reference to table 11316fb10, now 2 references, 1 tables used
- [Thr 773] HttpSubHandlerCall: Call Handler: HttpAuthHandler (113178ad0/11316fb10), task=TASK_REQUEST(1), header_len=432
- [Thr 773] HttpDoesRouteTargetSystemMatch: No expectedSystem supplied.
- [Thr 773] Wed Jul 4 16:54:16:271 2018
- [Thr 773] >> start >> CsiGetInstance(1131791f0)
- [Thr 773] << end << CsiGetInstance(1131791f0) returned inst=11317f610
- [Thr 773] >> start >> CsiExecute(11317f610,113165c90,16,1,113165c80,113165c60,0)
- [Thr 773] >> VsaScan(11317f6f0,11317ee10,11317f270,11317ef70,NULL) >>
- [Thr 773] << VsaScan(11317f6f0,11317ee10,11317f270,11317ef70,NULL) = 0 <<
- [Thr 773] << end << CsiExecute(CSI_RC==OK)
- [Thr 773] >> start >> CsiFreeInstance(11317f610)
- [Thr 773] << end << CsiFreeInstance(CSI_RC==OK)
- [Thr 773] ->> SapSSLGetPeerInfo(sssl_hdl=1133566f0, &cert=113167ea0, &cert_len=113167e80,
- [Thr 773] &subject_dn=113167ea8, &issuer_dn=113167eb0, &csuite_name=113167eb8)
- [Thr 773] <<- SapSSLGetPeerInfo(sssl_hdl=1133566f0)==SAP_O_K
- [Thr 773] out: cert_len = <no cert>
- [Thr 773] out: csuite_name = "TLS_RSA_WITH_AES128_GCM_SHA256"
- [Thr 773] HttpSubHandlerItDeactivate: handler 0: HttpAuthHandler
- [Thr 773] HttpSubHandlerCall: Call Handler: HttpModHandler (113177f50/11316fb10), task=TASK_REQUEST(1), header_len=432
- [Thr 773] HttpModHandler: process 1, header_len 432
- [Thr 773] ->> SapSSLGetPeerInfo(sssl_hdl=1133566f0, &cert=11314b8e8, &cert_len=11314b8e0,
- [Thr 773] &subject_dn=11314b8f0, &issuer_dn=11314b8f8, &csuite_name=11314b900)
- [Thr 773] <<- SapSSLGetPeerInfo(sssl_hdl=1133566f0)==SAP_O_K
- [Thr 773] out: cert_len = <no cert>
- [Thr 773] out: csuite_name = "TLS_RSA_WITH_AES128_GCM_SHA256"
- [Thr 773] HttpModGetDefRules: determined the defactions: COMPAT_HANDLING ADD_SSL_CONNINFO_TO_HEADER (176)
- [Thr 773] HttpModExecuteRule: execute RewriteRule [0] "RegIRewriteUrl ^/abc(.*) /nwa"
- [Thr 773] HttpModExecuteRule: apply pattern "^/abc(.*)" to path: "/DataManager.svc"
- [Thr 773] HttpModExecuteRule: execute RewriteRule [1] "RegIRewriteUrl ^/ZAdapter(.*) /XISOAPAdapter/MessageServlet?j_user=WX_ADMISS&j_password=Adm1s678&channel=:Z_CM_Admission:Z_CM_Admission&version=3.0&Sender.Service=Z_CM_Admission&Interface=http://webservice.kuleuven.be/ToelatingStudenten/ToelatingStudenten_OUT"
- [Thr 773] HttpModExecuteRule: apply pattern "^/ZAdapter(.*)" to path: "/DataManager.svc"
- [Thr 773] HttpModExecuteRule: execute RewriteRule [2] "RegIRewriteUrl ^/YAdapter(.*) /XISOAPAdapter/MessageServlet?j_user=WX_ADMISS&j_password=Adm1s678&channel=:Z_CM_Admission:Z_CM_Admission&version=3.0&Sender.Service=Z_CM_Admission&Interface=http://webservice.kuleuven.be/ToelatingStudenten/ToelatingStudenten_OUT"
- [Thr 773] HttpModExecuteRule: apply pattern "^/YAdapter(.*)" to path: "/DataManager.svc"
- [Thr 773] HttpModHandler: webdisp: add x-forwarded-for: par0189
- [Thr 773] HttpModHandler: add clientprotocol: https
- [Thr 773] HttpGetRouteTargetSystem: using existing SID=SYX
- [Thr 773] HttpGetRouteTargetSystem: SID='SYX'
- [Thr 773] HttpGetRouteTargetSystem: using existing SID=SYX
- [Thr 773] HttpGetRouteTargetSystem: SID='SYX'
- [Thr 773] HttpGetRouteTargetSystem: using existing SID=SYX
- [Thr 773] HttpGetRouteTargetSystem: SID='SYX'
- [Thr 773] HttpGetRouteTargetSystem: using existing SID=SYX
- [Thr 773] HttpGetRouteTargetSystem: SID='SYX'
- [Thr 773] ->> SapSSLGetPeerInfo2(sssl_hdl=1133566f0, &cert_array=11314bc10, &cert_array_size=11314bb90,
- [Thr 773] &cipher_id=11314bc08, &cipher_id_len=11314bb8c, &cipher_key_size=11314bb88)
- [Thr 773] <<- SapSSLGetPeerInfo2(sssl_hdl=1133566f0)==SAP_O_K
- [Thr 773] in/out: ... = "#certs= 0, keysize= 128, cipher= 009c"
- [Thr 773] HttpModHandler: add cert to headers: cert_array_len=0, cipher_id_len=2, cipher_size=128
- [Thr 773] Wed Jul 4 16:54:16:272 2018
- [Thr 773] cipher_suite: 009c
- [Thr 773] HttpGetRouteTargetSystem: using existing SID=SYX
- [Thr 773] HttpGetRouteTargetSystem: SID='SYX'
- [Thr 773] HttpModHandler: perform the actions: COMPAT_HANDLING ADD_SSL_CONNINFO_TO_HEADER (176)
- [Thr 773] MPI<25ea>6#4 GetOutbuf -1 7d1e0 65536 (0) -> a0000003007d200 20971520 MPI_OK
- [Thr 773] IcmMpiGetOutbuf: Set MPI Header with type 1 at a0000003007d200, len=80
- [Thr 773] IcmMpiSetHeaderData: Set MPI Header with type 1 at a0000003007d200, len=80
- [Thr 773] HttpModHandler: serialize new http header
- [Thr 773] ICT: IctHttpCloseMessage( 11582c030 ) -> u=0 rc=0
- [Thr 773] ICT: IctIHttpOpenMessage: 11582c030 typ=1
- [Thr 773] BINDUMP of content denied
- [Thr 773] MPI<25ea>6#5 DiscardOutbuf 0 0 0 7d1e0 0 0 -> a0000003007d1e0 MPI_OK
- [Thr 773] HTTP request (rewritten) [9/5695/1]:
- [Thr 773] GET /DataManager.svc HTTP/1.1
- [Thr 773] host: poq.cc.kuleuven.be:44322
- [Thr 773] connection: keep-alive
- [Thr 773] upgrade-insecure-requests: 1
- [Thr 773] user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.99 Safari/537.36
- [Thr 773] accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
- [Thr 773] accept-encoding: gzip, deflate, br
- [Thr 773] accept-language: nl-NL,nl;q=0.9,en-US;q=0.8,en;q=0.7
- [Thr 773] x-forwarded-for: 10.112.0.20
- [Thr 773] clientprotocol: https
- [Thr 773] ssl_cipher_usekeysize: 128
- [Thr 773] ssl_cipher_suite: 009c
- [Thr 773] HttpSubHandlerItDeactivate: handler 1: HttpModHandler
- [Thr 773] HttpSubHandlerCall: Call Handler: HttpWebDispHandler (113182350/11316fb10), task=TASK_REQUEST(1), header_len=537
- [Thr 773] HttpRouteHandler: 1 537 113182350 (nil)
- [Thr 773] HTR: creating new connection 113188680
- [Thr 773] HTR: HTTP version = 1001.
- [Thr 773] HTR: connection = 'keep-alive'
- [Thr 773] HttpGetRouteTargetSystem: using existing SID=SYX
- [Thr 773] HttpGetRouteTargetSystem: SID='SYX'
- [Thr 773] ICT: IctLookupPathTable() -> 0
- [Thr 773] HTR: permission table entry match for PERMIT
- [Thr 773] HTR: routing destination type = J2EE .
- [Thr 773] HTR: lookup load balancing cookie 'saplb_*'
- [Thr 773] HTR: HtrIExtractSessionID -> '' 0
- [Thr 773] HTR: stateless request (no valid session ID found) or initial request for stored session id
- [Thr 773] ICR: IcrIGetMinLoadServer: server 'SAP_WDISP_EXTSRV_0_D70BCA888465AC8F'2 delta=40 load=0/0 valid=1 resp=1 capacity=100
- [Thr 773] Wed Jul 4 16:54:16:272 2018
- [Thr 773] ICR: IcrIFindMatchingPort for prot=1 stack=2 vhost=-1
- [Thr 773] ICR: IcrIFindMatchingPort: compare with 443 prot=1 vhost=-1 f=8, active=TRUE
- [Thr 773] ICR: IcrIFindMatchingPort: found port 443 prot=1 vhost=-1 f=8
- [Thr 773] ICR: IcrIGetMinLoadServer: near-zero load #0: SAP_WDISP_EXTSRV_0_D70BCA888465AC8F
- [Thr 773] ICR: IcrAttachToServer: next destination server 'SAP_WDISP_EXTSRV_0_D70BCA888465AC8F'2 100 1 0 port:443/1/-1
- [Thr 773] HTR: rwl shared lock 'SAP_WDISP_EXTSRV_0_D70BCA888465AC8F' -> 0 (2879)
- [Thr 773] IcmIConnPoolAllocEntry: no unused entry for pool 113332030 found (reuse conn: 0)
- [Thr 773] IcmIConnPoolAllocEntry: try to create new entry for pool 113332030
- [Thr 773] IcmConnPoolAllocSlot: allocated entry 113411960[0] of pool 113332030
- [Thr 773] NiHLGetNodeAddr: found hostname 'services.syx-graphics.com' in cache (valid-name)
- [Thr 773] NiHLGetNodeAddr: retrying to get address for 'services.syx-graphics.com'
- [Thr 773] addrinfo of 'services.syx-graphics.com':
- [Thr 773] 0: 91.183.178.201:0 'extern69.syx.be' RAW (0-2-3-0-16)
- [Thr 773] NiHLGetNodeAddr: got hostname 'services.syx-graphics.com' from operating system
- [Thr 773] NiIGetNodeAddr: hostname 'services.syx-graphics.com' = addr 91.183.178.201
- [Thr 773] NiIGetServNo: servicename '443' = port 443
- [Thr 773] NiICreateHandle: hdl 218 state NI_INITIAL_CON
- [Thr 773] NiILocalCheck: SiBind failed (sirc=7;68-Can't assign requested address 91.183.178.201)
- [Thr 773] NiIInitSocket: set default settings for new hdl 218/sock 35 (I4; ST)
- [Thr 773] BufSize: Min 65536 Rcv 16384 Snd 16384
- [Thr 773] NiIBlockMode: set blockmode for hdl 218 FALSE
- [Thr 773] NiIConnectSocket: hdl 218 is connecting to 91.183.178.201:443 (timeout=5000)
- [Thr 773] SiPeekPendConn: connection of sock 35 established
- [Thr 773] NiICheckPendConnection: connection of hdl 218 to 91.183.178.201:443 established
- [Thr 773] NiIConnect: hdl 218 took local address 134.58.14.152:63866
- [Thr 773] NiIConnect: state of hdl 218 NI_CONNECTED
- [Thr 773] IcmConnPoolConnect: Connection to host: services.syx-graphics.com, service: 443 established (nihdl=218)
- [Thr 773] ->> SapSSLSessionInit(&sssl_hdl=113164400, role=1 (CLIENT), auth_type=3 (USE_CLIENT_CERT))
- [Thr 773] <<- SapSSLSessionInit()==SAP_O_K
- [Thr 773] in: args = "role=1 (CLIENT), auth_type=3 (USE_CLIENT_CERT)"
- [Thr 773] out: sssl_hdl = 1144bde90
- [Thr 773] ->> SapSSLSetNiHdl(sssl_hdl=1144bde90, ni_hdl=218)
- [Thr 773] SSL NI-hdl 218: local=134.58.14.152:63866 peer=91.183.178.201:443
- [Thr 773] <<- SapSSLSetNiHdl(sssl_hdl=1144bde90, ni_hdl=218)==SAP_O_K
- [Thr 773] ->> SapSSLSetTargetHostname(sssl_hdl=1144bde90, &hostname=113359c10)
- [Thr 773] <<- SapSSLSetTargetHostname(sssl_hdl=1144bde90)==SAP_O_K
- [Thr 773] in: hostname = "services.syx-graphics.com"
- [Thr 773] Wed Jul 4 16:54:16:280 2018
- [Thr 773] ->> SapSSLSetSessionParam(sssl_hdl=1144bde90, sparam=TLSEXT_SNI_HOSTNAME, iarg=0, parg=113359c10)
- [Thr 773] <<- SapSSLSetSessionParam(sssl_hdl=1144bde90)==SAP_O_K
- [Thr 773] in: sssl_hdl = 1144bde90
- [Thr 773] in: sparam = "TLSEXT_SNI_HOSTNAME"
- [Thr 773] in: iarg = 0
- [Thr 773] in: parg = "services.syx-graphics.com"
- [Thr 773] ->> SapSSLSessionStartNB(sssl_hdl=1144bde90, flags=00000000, timeout=80000, &IOstat=113164224)
- [Thr 773] NiIBlockMode: leave blockmode for hdl 218 FALSE
- [Thr 773] NiIHdlGetStatus: hdl 218/sock 35 ok, no data pending
- [Thr 773] SapISSLUseSessionCache(): Creating NEW session (0 cached)
- [Thr 773] CCL[SSL]: Cli-000000AA: Have no session to be resumed. Performing full handshake [ssl3_client_hello]
- [Thr 773] CCL[SSL]: Cli-000000AA: ClientHello: Offering protocol version 3.3 (TLSv1.2) [ssl3_get_client_hello_version]
- [Thr 773] CCL[SSL]: Cli-000000AA: ClientHello: no session resumption requested (empty session ID) [ssl3_client_hello]
- [Thr 773] CCL[SSL]: Cli-000000AA: Summary: Offering 15 cipher suite(s) and SCSV(s):
- [Thr 773] < 0> : TLS_ECDHE_RSA_WITH_AES128_GCM_SHA256
- [Thr 773] < 1> : TLS_ECDHE_RSA_WITH_AES256_GCM_SHA384
- [Thr 773] < 2> : TLS_ECDHE_RSA_WITH_AES128_CBC_SHA
- [Thr 773] < 3> : TLS_ECDHE_RSA_WITH_AES256_CBC_SHA384
- [Thr 773] < 4> : TLS_ECDHE_RSA_WITH_AES256_CBC_SHA
- [Thr 773] < 5> : TLS_ECDHE_ECDSA_WITH_AES128_GCM_SHA256
- [Thr 773] < 6> : TLS_ECDHE_ECDSA_WITH_AES256_GCM_SHA384
- [Thr 773] < 7> : TLS_ECDHE_ECDSA_WITH_AES128_CBC_SHA
- [Thr 773] < 8> : TLS_ECDHE_ECDSA_WITH_AES256_CBC_SHA384
- [Thr 773] < 9> : TLS_ECDHE_ECDSA_WITH_AES256_CBC_SHA
- [Thr 773] <10> : TLS_RSA_WITH_AES128_GCM_SHA256
- [Thr 773] <11> : TLS_RSA_WITH_AES256_GCM_SHA384
- [Thr 773] <12> : TLS_RSA_WITH_AES128_CBC_SHA
- [Thr 773] <13> : TLS_RSA_WITH_AES256_CBC_SHA
- [Thr 773] <14> : Signaling cipher suite value (SCSV) secure renegotiation (RFC5746)
- [Thr 773] [ssl_cipher_suites_to_bytes]
- [Thr 773] CCL[SSL]: Cli-000000AA: Sending SSLv3/TLS ClientHello [ssl3_client_hello]
- [Thr 773] SSL:SiSend(sock= 35)== 0 (SI_OK) (out=157 of 157)
- [Thr 773] SSL:SiRecv(sock= 35)==13 (SI_ETIMEOUT) (in=0, max=16)
- [Thr 773] --> SSL:SiPoll(sock=35, evt=R, timeout=80000 ms)
- [Thr 773] <-- SSL:SiPoll(sock=35, evt=R, slept = 20 ms) Ready
- [Thr 773] SSL:SiRecv(sock= 35)== 0 (SI_OK) (in=16, max=16)
- [Thr 773] SSL:SiRecv(sock= 35)== 0 (SI_OK) (in=2880, max=5280)
- [Thr 773] SSL:SiRecv(sock= 35)==13 (SI_ETIMEOUT) (in=0, max=2400)
- [Thr 773] --> SSL:SiPoll(sock=35, evt=R, timeout=79980 ms)
- [Thr 773] <-- SSL:SiPoll(sock=35, evt=R, slept = 0 ms) Ready
- [Thr 773] SSL:SiRecv(sock= 35)== 0 (SI_OK) (in=2383, max=2400)
- [Thr 773] CCL[SSL]: Cli-000000AA: ServerHello: Negotiated version: 3.3 (TLSv1.2). [ssl3_get_server_hello]
- [Thr 773] CCL[SSL]: Cli-000000AA: On receiving ServerHello: Creating new session. [ssl3_get_server_hello]
- [Thr 773] CCL[SSL]: Cli-000000AA: Used protocol version: TLSv1.2 [ssl3_get_server_hello]
- [Thr 773] CCL[SSL]: Cli-000000AA: ServerHello: Negotiated cipher suite: TLS_ECDHE_RSA_WITH_AES256_GCM_SHA384 [ssl3_get_server_hello]
- [Thr 773] CCL[SSL]: Cli-000000AA: Received server certificate chain. [ssl3_decode_server_certificate]
- [Thr 773] CCL[SSL]: Cli-000000AA: Server certificate details:
- [Thr 773] Subject: CN=*.syx-graphics.com, OU=PositiveSSL Wildcard, OU=Domain Control Validated
- [Thr 773] Issuer: CN=COMODO RSA Domain Validation Secure Server CA, O=COMODO CA Limited, L=Salford, SP=Greater Manchester, C=GB
- [Thr 773] Serial Number: 40:CF:13:FB:6F:F0:4D:E9:80:BB:77:8B:19:8C:E7
- [Thr 773] [ssl3_decode_server_certificate]
- [Thr 773] CCL[SSL]: Cli-000000AA: Server CA certificate details:
- [Thr 773] Subject: CN=COMODO RSA Domain Validation Secure Server CA, O=COMODO CA Limited, L=Salford, SP=Greater Manchester, C=GB
- [Thr 773] Issuer: CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, SP=Greater Manchester, C=GB
- [Thr 773] Serial Number: 2B:2E:6E:EA:D9:75:36:6C:14:8A:6E:DB:A3:7C:8C:07
- [Thr 773] [s3_build_path_from_message]
- [Thr 773] CCL[SSL]: Cli-000000AA: Server CA certificate details:
- [Thr 773] Subject: CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, SP=Greater Manchester, C=GB
- [Thr 773] Issuer: CN=AddTrust External CA Root, OU=AddTrust External TTP Network, O=AddTrust AB, C=SE
- [Thr 773] Serial Number: 27:66:EE:56:EB:49:F3:8E:AB:D7:70:A2:FC:84:DE:22
- [Thr 773] [s3_build_path_from_message]
- [Thr 773] CCL[VERIFY]: Cli-000000AA: Verification result of SSL server certificate (successful)
- [Thr 773] Verification result header:
- [Thr 773] Verified certificate:
- [Thr 773] Subject: CN=*.syx-graphics.com, OU=PositiveSSL Wildcard, OU=Domain Control Validated
- [Thr 773] Issuer: CN=COMODO RSA Domain Validation Secure Server CA, O=COMODO CA Limited, L=Salford, SP=Greater Manchester, C=GB
- [Thr 773] Serial Number: 40:CF:13:FB:6F:F0:4D:E9:80:BB:77:8B:19:8C:E7
- [Thr 773] -----BEGIN CERTIFICATE-----
- [Thr 773] MIIGXDCCBUSgAwIBAgIPQM8T+2/wTemAu3eLGYznMA0GCSqGSIb3DQEBCwUAMIGQ
- [Thr 773] MQswCQYDVQQGEwJHQjEbMBkGA1UECBMSR3JlYXRlciBNYW5jaGVzdGVyMRAwDgYD
- [Thr 773] VQQHEwdTYWxmb3JkMRowGAYDVQQKExFDT01PRE8gQ0EgTGltaXRlZDE2MDQGA1UE
- [Thr 773] AxMtQ09NT0RPIFJTQSBEb21haW4gVmFsaWRhdGlvbiBTZWN1cmUgU2VydmVyIENB
- [Thr 773] MB4XDTE2MDkyMzAwMDAwMFoXDTE4MTAwOTIzNTk1OVowXzEhMB8GA1UECxMYRG9t
- [Thr 773] YWluIENvbnRyb2wgVmFsaWRhdGVkMR0wGwYDVQQLExRQb3NpdGl2ZVNTTCBXaWxk
- [Thr 773] Y2FyZDEbMBkGA1UEAwwSKi5zeXgtZ3JhcGhpY3MuY29tMIICIjANBgkqhkiG9w0B
- [Thr 773] AQEFAAOCAg8AMIICCgKCAgEAvJH5cJpZi1vIWmaCWfgy3vGYN10RWLxfux+V8mVL
- [Thr 773] OTW994/hADjTCdaspQNw3AJ/5Ao/P0o3xthpSCLstGiMjmRf48z3prEOfwMt7LmR
- [Thr 773] ZfD5NiobDCnwW5wkTkRkcvKP1NhyV7S/JP0eA5h6CAXr42ADZG2bwHOSN6cj4hpd
- [Thr 773] TAR6JFdGSCvvjoB4tGYGTPajBIh6wqZJxV0EFfQDZG64GDzk9nuHVCELZ9WMEO3U
- [Thr 773] 4+UkN+YuKPmYBqvByuX5tNrNx34NCBN7w1ksfmIH2q3uBfjKGZsztsz4/+KpsUxa
- [Thr 773] LDYZEpeQ4H8sVW/AInBMYY4vFNDKzzek7XSVvMy/dDuBm6egyR6cd+gKA4OkvpWE
- [Thr 773] aDtEddy6WfOQJXsrx5m96dJypcvp0GpN4mca4CJphz9Onn1+B6bt5KrE1gHTOhfq
- [Thr 773] iLGMiF72ie3kpuPn0AngHNMgtV+vv2J5OVoXo7rkWjDp8/5mFoU18RbASwbSUnYu
- [Thr 773] 85wW2RgL5wAZ9B+C0rQd+9rpUEMUXoHm90WHRyhAmwhRGwW5Q0zSfxI83o2F6K6J
- [Thr 773] OFNQdAZsnHOLzw/TCsHRcc5DUSEigtZfWOCMFRhasKV/Ai4OPNGhwBlTpZEPE4Mm
- [Thr 773] UF7vyWgAhRkyTBPirIew42FgHJ07xhtrHtwDuN58CjcWWqKMsuuizrR2mVmY8MYn
- [Thr 773] +pMCAwEAAaOCAeEwggHdMB8GA1UdIwQYMBaAFJCvajqUWgvYkOoSVnPfQ7Q6KNrn
- [Thr 773] MB0GA1UdDgQWBBRQoXyAnyjKHwbhOMFewMoDr9wlCzAOBgNVHQ8BAf8EBAMCBaAw
- [Thr 773] DAYDVR0TAQH/BAIwADAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwTwYD
- [Thr 773] VR0gBEgwRjA6BgsrBgEEAbIxAQICBzArMCkGCCsGAQUFBwIBFh1odHRwczovL3Nl
- [Thr 773] Y3VyZS5jb21vZG8uY29tL0NQUzAIBgZngQwBAgEwVAYDVR0fBE0wSzBJoEegRYZD
- [Thr 773] aHR0cDovL2NybC5jb21vZG9jYS5jb20vQ09NT0RPUlNBRG9tYWluVmFsaWRhdGlv
- [Thr 773] blNlY3VyZVNlcnZlckNBLmNybDCBhQYIKwYBBQUHAQEEeTB3ME8GCCsGAQUFBzAC
- [Thr 773] hkNodHRwOi8vY3J0LmNvbW9kb2NhLmNvbS9DT01PRE9SU0FEb21haW5WYWxpZGF0
- [Thr 773] aW9uU2VjdXJlU2VydmVyQ0EuY3J0MCQGCCsGAQUFBzABhhhodHRwOi8vb2NzcC5j
- [Thr 773] b21vZG9jYS5jb20wLwYDVR0RBCgwJoISKi5zeXgtZ3JhcGhpY3MuY29tghBzeXgt
- [Thr 773] Z3JhcGhpY3MuY29tMA0GCSqGSIb3DQEBCwUAA4IBAQBOw9aQeGq21DEHNYHBgtSu
- [Thr 773] 4DKGqCh2abb+lxGGd35RLX8m6M/Qj3lkojxdvBHke7ZVKUmuU+hl03xKxoKibgMc
- [Thr 773] H4NoN5e/lCTYGo89JKgqN1+CMVXUlkKCwHPPxfWqpCYp6J/yc8moA1HusqyWuQJd
- [Thr 773] 4z4GuMt83lIDoV0lkJxOj2GE0HnRoVg4ul6ttf/cAKmS8R3LdG2Al9a2v0yeyAvj
- [Thr 773] bTERaoi4E+sC6X1sieRD0CYcT67I8eUJ7u6iPcKmTrO8zahskcAzJ8mtqtcMj3cJ
- [Thr 773] mTpylFlSHMqrXNeCEqd8/91WLgaAx+m75zt2MrOz7Wr9QqPlps/4hPU1XQRB95tT
- [Thr 773] -----END CERTIFICATE-----
- [Thr 773] Certificate verification result:
- [Thr 773] Certificate:
- [Thr 773] Subject: CN=*.syx-graphics.com, OU=PositiveSSL Wildcard, OU=Domain Control Validated
- [Thr 773] Verification result:
- [Thr 773] Status: Successful
- [Thr 773] DirectlyTrusted: Successful
- [Thr 773] Trust in PSE:
- [Thr 773] Token URI : tokpse:/usr/sap/POQ/J00/sec/SAPSSLC.pse
- [Thr 773] Trusted certificate : CN=poq, OU=ICTS, L=Heverlee, O=KU Leuven, SP=Vlaams-Brabant, C=BE
- [Thr 773] Trusted certificate : CN=VeriSign Universal Root Certification Authority, OU="(c) 2008 VeriSign, Inc. - For authorized use only", OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US
- [Thr 773] Trusted certificate : CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, SP=Greater Manchester, C=GB
- [Thr 773] Trusted certificate : CN=COMODO RSA Domain Validation Secure Server CA, O=COMODO CA Limited, L=Salford, SP=Greater Manchester, C=GB
- [Thr 773] Trusted certificate : CN=AddTrust External CA Root, OU=AddTrust External TTP Network, O=AddTrust AB, C=SE
- [Thr 773] Trusted certificate : CN=Symantec Class 3 Secure Server SHA256 SSL CA, OU=Symantec Trust Network, O=Symantec Corporation, C=US
- [Thr 773] Trusted certificate : CN=*.syx-graphics.com, OU=PositiveSSL Wildcard, OU=Domain Control Validated
- [Thr 773] [sec_VerificationContext_check_Certificate3]
- [Thr 773] CCL[SSL]: Cli-000000AA: No client authentication requested [ssl3_check_for_certificate_request]
- [Thr 773] SSL:SSL_read(netin= 5279) handshake, processed= 5279
- [Thr 773] SSL:SiSend(sock= 35)== 0 (SI_OK) (out=126 of 126)
- [Thr 773] SSL:SiRecv(sock= 35)==13 (SI_ETIMEOUT) (in=0, max=16)
- [Thr 773] --> SSL:SiPoll(sock=35, evt=R, timeout=79980 ms)
- [Thr 773] <-- SSL:SiPoll(sock=35, evt=R, slept = 7 ms) Ready
- [Thr 773] Wed Jul 4 16:54:16:313 2018
- [Thr 773] SSL:SiRecv(sock= 35)== 0 (SI_OK) (in=16, max=16)
- [Thr 773] SSL:SSL_read(netin= 6) handshake, processed= 6
- [Thr 773] SSL:SiRecv(sock= 35)== 0 (SI_OK) (in=35, max=48)
- [Thr 773] CCL[SSL]: Cli-000000AA: ########## TLSv1.2 connection with this server established: CN=*.syx-graphics.com, OU=PositiveSSL Wildcard, OU=Domain Control Validated ########## [ssl3_connect]
- [Thr 773] SSL:SSL_read(netin= 45) handshake, processed= 45
- [Thr 773] SSLSessionStart: new SSL session (TLSv1.2) no CertRequest
- [Thr 773] Server Certificate available (FCPath-Len= 2)
- [Thr 773] No certificate request received from Server
- [Thr 773] secussl_AddSSL2Cache(): Creating new SSSL_CACHE entry
- [Thr 773] Client SSL cache cleanup: 0 removed, 0 still in cache (max 500)
- [Thr 773] HexDump of new SSL session ID { &buf= 1144be11c, buf_len= 32 }
- [Thr 773] 00000: 7c 4c 00 00 2e 04 a5 1a cb 33 93 38 8e b7 c6 b6 |L...... .3.8....
- [Thr 773] 00010: cf 72 87 8c b4 39 bf df 83 be a8 28 3f c5 72 51 .r...9.. ...(?.rQ
- [Thr 773] Base64-Dump of peer certificate (len=1632 bytes)
- [Thr 773]
- [Thr 773] -----BEGIN CERTIFICATE-----
- [Thr 773] MIIGXDCCBUSgAwIBAgIPQM8T+2/wTemAu3eLGYznMA0GCSqGSIb3DQEBCwUAMIGQ
- [Thr 773] MQswCQYDVQQGEwJHQjEbMBkGA1UECBMSR3JlYXRlciBNYW5jaGVzdGVyMRAwDgYD
- [Thr 773] VQQHEwdTYWxmb3JkMRowGAYDVQQKExFDT01PRE8gQ0EgTGltaXRlZDE2MDQGA1UE
- [Thr 773] AxMtQ09NT0RPIFJTQSBEb21haW4gVmFsaWRhdGlvbiBTZWN1cmUgU2VydmVyIENB
- [Thr 773] MB4XDTE2MDkyMzAwMDAwMFoXDTE4MTAwOTIzNTk1OVowXzEhMB8GA1UECxMYRG9t
- [Thr 773] YWluIENvbnRyb2wgVmFsaWRhdGVkMR0wGwYDVQQLExRQb3NpdGl2ZVNTTCBXaWxk
- [Thr 773] Y2FyZDEbMBkGA1UEAwwSKi5zeXgtZ3JhcGhpY3MuY29tMIICIjANBgkqhkiG9w0B
- [Thr 773] AQEFAAOCAg8AMIICCgKCAgEAvJH5cJpZi1vIWmaCWfgy3vGYN10RWLxfux+V8mVL
- [Thr 773] OTW994/hADjTCdaspQNw3AJ/5Ao/P0o3xthpSCLstGiMjmRf48z3prEOfwMt7LmR
- [Thr 773] ZfD5NiobDCnwW5wkTkRkcvKP1NhyV7S/JP0eA5h6CAXr42ADZG2bwHOSN6cj4hpd
- [Thr 773] TAR6JFdGSCvvjoB4tGYGTPajBIh6wqZJxV0EFfQDZG64GDzk9nuHVCELZ9WMEO3U
- [Thr 773] 4+UkN+YuKPmYBqvByuX5tNrNx34NCBN7w1ksfmIH2q3uBfjKGZsztsz4/+KpsUxa
- [Thr 773] LDYZEpeQ4H8sVW/AInBMYY4vFNDKzzek7XSVvMy/dDuBm6egyR6cd+gKA4OkvpWE
- [Thr 773] aDtEddy6WfOQJXsrx5m96dJypcvp0GpN4mca4CJphz9Onn1+B6bt5KrE1gHTOhfq
- [Thr 773] iLGMiF72ie3kpuPn0AngHNMgtV+vv2J5OVoXo7rkWjDp8/5mFoU18RbASwbSUnYu
- [Thr 773] 85wW2RgL5wAZ9B+C0rQd+9rpUEMUXoHm90WHRyhAmwhRGwW5Q0zSfxI83o2F6K6J
- [Thr 773] OFNQdAZsnHOLzw/TCsHRcc5DUSEigtZfWOCMFRhasKV/Ai4OPNGhwBlTpZEPE4Mm
- [Thr 773] UF7vyWgAhRkyTBPirIew42FgHJ07xhtrHtwDuN58CjcWWqKMsuuizrR2mVmY8MYn
- [Thr 773] +pMCAwEAAaOCAeEwggHdMB8GA1UdIwQYMBaAFJCvajqUWgvYkOoSVnPfQ7Q6KNrn
- [Thr 773] MB0GA1UdDgQWBBRQoXyAnyjKHwbhOMFewMoDr9wlCzAOBgNVHQ8BAf8EBAMCBaAw
- [Thr 773] DAYDVR0TAQH/BAIwADAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwTwYD
- [Thr 773] VR0gBEgwRjA6BgsrBgEEAbIxAQICBzArMCkGCCsGAQUFBwIBFh1odHRwczovL3Nl
- [Thr 773] Y3VyZS5jb21vZG8uY29tL0NQUzAIBgZngQwBAgEwVAYDVR0fBE0wSzBJoEegRYZD
- [Thr 773] aHR0cDovL2NybC5jb21vZG9jYS5jb20vQ09NT0RPUlNBRG9tYWluVmFsaWRhdGlv
- [Thr 773] blNlY3VyZVNlcnZlckNBLmNybDCBhQYIKwYBBQUHAQEEeTB3ME8GCCsGAQUFBzAC
- [Thr 773] hkNodHRwOi8vY3J0LmNvbW9kb2NhLmNvbS9DT01PRE9SU0FEb21haW5WYWxpZGF0
- [Thr 773] aW9uU2VjdXJlU2VydmVyQ0EuY3J0MCQGCCsGAQUFBzABhhhodHRwOi8vb2NzcC5j
- [Thr 773] b21vZG9jYS5jb20wLwYDVR0RBCgwJoISKi5zeXgtZ3JhcGhpY3MuY29tghBzeXgt
- [Thr 773] Z3JhcGhpY3MuY29tMA0GCSqGSIb3DQEBCwUAA4IBAQBOw9aQeGq21DEHNYHBgtSu
- [Thr 773] 4DKGqCh2abb+lxGGd35RLX8m6M/Qj3lkojxdvBHke7ZVKUmuU+hl03xKxoKibgMc
- [Thr 773] H4NoN5e/lCTYGo89JKgqN1+CMVXUlkKCwHPPxfWqpCYp6J/yc8moA1HusqyWuQJd
- [Thr 773] 4z4GuMt83lIDoV0lkJxOj2GE0HnRoVg4ul6ttf/cAKmS8R3LdG2Al9a2v0yeyAvj
- [Thr 773] bTERaoi4E+sC6X1sieRD0CYcT67I8eUJ7u6iPcKmTrO8zahskcAzJ8mtqtcMj3cJ
- [Thr 773] mTpylFlSHMqrXNeCEqd8/91WLgaAx+m75zt2MrOz7Wr9QqPlps/4hPU1XQRB95tT
- [Thr 773] -----END CERTIFICATE-----
- [Thr 773] Subject Alt Names: dNSName=syx-graphics.com, dNSName=*.syx-graphics.com
- [Thr 773] MatchTargetName("services.syx-graphics.com", dNSName="*.syx-graphics.com") == WILDCARD match
- [Thr 773] SapSSLISessionStartFin(sssl_hdl=1144bde90)==SAP_O_K
- [Thr 773] in/out: status = "new SSL session,TLSv1.2,TLS_ECDHE_RSA_WITH_AES256_GCM_SHA384"
- [Thr 773] Subject DN = "CN=*.syx-graphics.com, OU=PositiveSSL Wildcard, OU=Domain Control Validated"
- [Thr 773] Issuer DN = "CN=COMODO RSA Domain Validation Secure Server CA, O=COMODO CA Limited, L=Salford, SP=Greater Manchester, C=GB"
- [Thr 773] <<- SapSSLSessionStartNB(sssl_hdl=1144bde90)==SAP_O_K
- [Thr 773] in/out: ... = "fl=00000000, timeout=80000, io=idle"
- [Thr 773] IcmConnPoolNewEntry: created new entry 113411960[0] for pool 113332030 (nihdl=218, ssl=1144bde90)
- [Thr 773] ICR: IcrAttachToServer('!J2EES' 2 2 4 1 port:443/1/-1) 0-> 0
- [Thr 773] HTTP request [9/5695/1] dispatched to SID='SYX', destination='SAP_WDISP_EXTSRV_0_D70BCA888465AC8F'
- [Thr 773] HTR: routing to destination 'SAP_WDISP_EXTSRV_0_D70BCA888465AC8F' (balanceable=0)
- [Thr 773] server triggered
- [Thr 773] Pool Entry 113411960:
- [Thr 773] NI: 218, SSL: 1144bde90, allocated: 1, inuse: 1, desc: 113359b30
- [Thr 773] local host: 134.58.14.152:63866
- [Thr 773] remote host: 91.183.178.201:443
- [Thr 773] HTR: forwarding buffer to server (537)
- [Thr 773] BINDUMP of content denied
- [Thr 773] ->> SapSSLWriteNB(sssl_hdl=1144bde90, buf=a000000300ad310, len=537, flags=00000000, timeout=100000, &IOstate=113164b94, &written=113164b98)
- [Thr 773] SSL:SSL_write(len=537) net=566 (out=537 of 537, prev=0)
- [Thr 773] SSL:SiSend(sock= 35)== 0 (SI_OK) (out=566 of 566)
- [Thr 773] <<- SapSSLWriteNB(sssl_hdl=1144bde90)==SAP_O_K
- [Thr 773] in/out: ... = "buf= a000000300ad310, written= 537 of 537 (all) io=idle"
- [Thr 773] IcmPlFlushBuf: SapSSLWriteNB (537 bytes) wrote 537, rc=0
- [Thr 773] MPI<25ea>6#6 DiscardOutbuf 3 0 0 ad2a0 0 0 -> a000000300ad2a0 MPI_OK
- [Thr 773] HttpSrvHdlRequest: Subhandler rc=704
- [Thr 773] Wed Jul 4 16:54:16:314 2018
- [Thr 773] IcmPlCheckRetVal: Next status: WRITE_RESPONSE(4)
- [Thr 773] IcmHandleNetRead(id=9/5695): read_len: 432, HandleNetData returned: 4
- [Thr 773] IcmHandleNetRead(id=9/5695): status 1 -> 4
- [Thr 773] ->> SapSSLReadPendingNB(sssl_hdl=1133566f0, &plen=11316c3a8, &more=11316c390, &ios=11316c394)
- [Thr 773] <<- SapSSLReadPendingNB(sssl_hdl=1133566f0)==SAP_O_K
- [Thr 773] in/out: ... = "pendlen=0, more=N, io=idle"
- [Thr 773] IcmReadFromPartner(id=9/5695): read with maximum timeout 500
- [Thr 773] IcmReadFromPartner(id=9/5695): request new MPI (0/0)
- [Thr 773] IcmLowOnBlocks: mpi buffer space free (cur/limit/unreserved): 0/716/896)
- [Thr 773] MPI<25eb>13#3 GetOutbuf -1 ad2a0 65536 (0) -> a000000300ad2c0 20971520 MPI_OK
- [Thr 773] IcmMpiGetOutbuf: Set MPI Header with type 1 at a000000300ad2c0, len=80
- [Thr 773] IcmMpiSetHeaderData: Set MPI Header with type 1 at a000000300ad2c0, len=80
- [Thr 773] ->> SapSSLReadPendingNB(sssl_hdl=1144bde90, &plen=11316c240, &more=11316c230, &ios=11316c238)
- [Thr 773] <<- SapSSLReadPendingNB(sssl_hdl=1144bde90)==SAP_O_K
- [Thr 773] in/out: ... = "pendlen=0, more=N, io=idle"
- [Thr 773] NiIPeek: peek successful for hdl 218 (r)
- [Thr 773] ->> SapSSLReadNB(sssl_hdl=1144bde90, buf=a000000300ad310, buf_max=65455, flags=00000000, timeout=500, &bMoreData=11316c230, &IOstate=11316c238, &readlen=11316c23c)
- [Thr 773] SSL:SiRecv(sock= 35)== 0 (SI_OK) (in=16, max=16)
- [Thr 773] SSL:SiRecv(sock= 35)== 0 (SI_OK) (in=505, max=512)
- [Thr 773] SSL:SSL_read(reclen= 521) data, out= 492
- [Thr 773] <<- SapSSLReadNB(sssl_hdl=1144bde90)==SAP_O_K
- [Thr 773] in/out: ... = "fl=0x00, max=65455, got=492, more=N, io=idle"
- [Thr 773] ->> SapSSLReadPendingNB(sssl_hdl=1144bde90, &plen=11316c240, &more=11316c230, &ios=11316c238)
- [Thr 773] <<- SapSSLReadPendingNB(sssl_hdl=1144bde90)==SAP_O_K
- [Thr 773] in/out: ... = "pendlen=0, more=N, io=idle"
- [Thr 773] NiIPeek: peek successful for hdl 218 (r)
- [Thr 773] ->> SapSSLReadNB(sssl_hdl=1144bde90, buf=a000000300ad4fc, buf_max=64963, flags=00000000, timeout=0, &bMoreData=11316c230, &IOstate=11316c238, &readlen=11316c23c)
- [Thr 773] SSL:SiRecv(sock= 35)== 0 (SI_OK) (in=0, max=16) EOF!
- [Thr 773] <<- SapSSLReadNB(sssl_hdl=1144bde90)==SSSLERR_CONN_CLOSED
- [Thr 773] ->> SapSSLErrorName(rc=-10)
- [Thr 773] <<- SapSSLErrorName()==SSSLERR_CONN_CLOSED
- [Thr 773] IcmReadFromPartner(id=9/5695): SapSSLReadNB failed (-10): SSSLERR_CONN_CLOSED, ssl_io_status: 0
- [Thr 773] IcmReadFromPartner(id=9/5695): connection broken (len=0,492)
- [Thr 773] ConnPoolCloseNiHdl:
- [Thr 773] Pool Entry: 113411960:
- [Thr 773] NI: 218, SSL: 1144bde90, allocated: 1, inuse: 1, desc: 113359b30
- [Thr 773] ->> SapSSLSessionDoneNB(&sssl_hdl=113411990)
- [Thr 773] CCL[SSL]: Cli-000000AA: Sending alert of level WARNING: close notify [ssl3_send_alert]
- [Thr 773] SSL:SiSend(sock= 35)== 0 (SI_OK) (out=31 of 31)
- [Thr 773] CCL[SSL]: Cli-000000AA: ########## SSL connection cleaned up and destroyed. ########## [SSL_free]
- [Thr 773] Wed Jul 4 16:54:16:321 2018
- [Thr 773] <<- SapSSLSessionDoneNB()==SAP_O_K
- [Thr 773] in: sssl_hdl = 1144bde90
- [Thr 773] in/out: ... ni_hdl = 218
- [Thr 773] NiICloseHandle: shutdown and close hdl 218/sock 35
- [Thr 773] BINDUMP of content denied
- [Thr 773] PlugInHandleServData(rqid=9/5695/1): role: Server(1), status: 3
- [Thr 773] content-length: 0/-1, buf_len: 492, buf_offset: 0, buf_status: 6
- [Thr 773] ICT: IctIHttpOpenMessage: 116ad1e10 typ=2
- [Thr 773] HttpParseResponseHeader: no transfer-encoding set
- [Thr 773] HttpParseResponseHeader: Version: 1001
- [Thr 773] HttpParseResponseHeader: Keep-Alive: 0
- [Thr 773] HTTP response (raw) [9/5695/1]:
- [Thr 773] HTTP/1.1 404 Not Found
- [Thr 773] content-type: text/html; charset=us-ascii
- [Thr 773] server: Microsoft-HTTPAPI/2.0
- [Thr 773] date: Wed, 04 Jul 2018 14:54:16 GMT
- [Thr 773] connection: close
- [Thr 773] content-length: 315
- [Thr 773] Connection Info: role=Server, local=par0189:44322, peer=10.112.0.20, protocol=HTTPS
- [Thr 773] HttpSrvHdlResponse: body_complete: 1, native: 1, follow_up: 0
- [Thr 773] HttpSrvHdlResponse: flags: 1060869, handle_resp: 8192
- [Thr 773] HttpSubHandlerItActivate: handler 2: HttpWebDispHandler
- [Thr 773] HttpSrvHdlResponse: native: 1, flags & NATIVE: 0
- [Thr 773] HttpSubHandlerCall: Call Handler: HttpWebDispHandler (113182350/11316fb10), task=TASK_RESPONSE(2), header_len=177
- [Thr 773] HttpRouteHandler: 2 177 113182350 113188680
- [Thr 773] HTR: receiving first buffer of response 177 492 116ad1e10
- [Thr 773] ICR: IcrUpdateServerStatistics( 'SAP_WDISP_EXTSRV_0_D70BCA888465AC8F' 6790 ) -> 0
- [Thr 773] HTR: HTTP version = 1001.
- [Thr 773] HTR: connection = 'close'
- [Thr 773] HTR: connection keepalive = 0.
- [Thr 773] HTR: content-length = 315
- [Thr 773] HTR: forwarding buffer to client 492 492 492 1 (492 0)
- [Thr 773] HTR: last buffer received.
- [Thr 773] HttpSrvHdlResponse: body_complete: 1, native: 0, follow_up: 0
- [Thr 773] HttpSubHandlerItDeactivate: handler 2: HttpWebDispHandler
- [Thr 773] HttpSrvHdlResponse: flags: 12293, handle_resp: 8192
- [Thr 773] HttpSubHandlerItActivate: handler 1: HttpModHandler
- [Thr 773] HttpSrvHdlResponse: native: 0, flags & NATIVE: 0
- [Thr 773] HttpSubHandlerCall: Call Handler: HttpModHandler (113177f50/11316fb10), task=TASK_RESPONSE(2), header_len=177
- [Thr 773] HttpModHandler: process 2, header_len 177
- [Thr 773] HttpModGetDefRules: determined the defactions: COMPAT_HANDLING (144)
- [Thr 773] Wed Jul 4 16:54:16:321 2018
- [Thr 773] HttpGetRouteTargetSystem: using existing SID=SYX
- [Thr 773] HttpGetRouteTargetSystem: SID='SYX'
- [Thr 773] HttpModHandler: perform the actions: COMPAT_HANDLING (144)
- [Thr 773] HttpModHandler: Response not rewritten
- [Thr 773] HttpSrvHdlResponse: flags: 12293, handle_resp: 8192
- [Thr 773] HttpSubHandlerItActivate: handler 0: HttpAuthHandler
- [Thr 773] HttpSrvHdlResponse: native: 0, flags & NATIVE: 0
- [Thr 773] HttpSubHandlerCall: Call Handler: HttpAuthHandler (113178ad0/11316fb10), task=TASK_RESPONSE(2), header_len=177
- [Thr 773] IcmNetBufWrapBuf: allocated netbuf: 1111aba40, blocks used: 1
- [Thr 773] IcmNetBufWrapBuf: allocated netbuf: 1111aba40
- [Thr 773] ICR: closing pooled connection 113411960
- [Thr 773] ConnPoolCloseNiHdl:
- [Thr 773] Pool Entry: 113411960:
- [Thr 773] NI: -1, SSL: (nil), allocated: 1, inuse: 1, desc: 113359b30
- [Thr 773] IcrDetachFromServer: closing port 443/1/-1
- [Thr 773] IcmConnPoolFreeEntry: free conn pool entry 113411960[0] in pool 113332030 (nihdl=-1, ssl=(nil))
- [Thr 773] HTR: decrement load factor: 40 -> 0 (d=40)
- [Thr 773] IcrFreeConnResources: 1111c55b0
- [Thr 773] IcmPlDetachContext(id=9/5695): detaching from context (4)
- [Thr 773] IcmConnInitContext: context initialized
- [Thr 773] HTR: rwl unlock 'SAP_WDISP_EXTSRV_0_D70BCA888465AC8F' -> 0 (3198)
- [Thr 773] ICR: IcrDetachFromServer -> 0
- [Thr 773] HTR: HtrCleanupConnection -> 0
- [Thr 773] HttpSrvHdlResponse: RET_CLOSE
- [Thr 773] PlugInHandleServData: HttpSrvHdlResponse returned: 702
- [Thr 773] IcmPlCheckRetVal: Plugin retval: PLUGIN_RET_CLOSE (702)
- [Thr 773] IcmHandleReadFromPartner(id=9/5695): HandleServData returned: 702
- [Thr 773] BINDUMP of content denied
- [Thr 773] IcmWriteToConn(id=9/5695): prepared to write data to partner (len = 492, timeout = 2000)
- [Thr 773] ->> SapSSLWriteNB(sssl_hdl=1133566f0, buf=a000000300ad310, len=492, flags=00000000, timeout=2000, &IOstate=11316c220, &written=11316c224)
- [Thr 773] SSL:SSL_write(len=492) net=521 (out=492 of 492, prev=0)
- [Thr 773] SSL:SiSend(sock= 28)== 0 (SI_OK) (out=521 of 521)
- [Thr 773] <<- SapSSLWriteNB(sssl_hdl=1133566f0)==SAP_O_K
- [Thr 773] in/out: ... = "buf= a000000300ad310, written= 492 of 492 (all) io=idle"
- [Thr 773] IcmWriteToConn(id=9/5695): wrote data to partner (len = 492)
- [Thr 773] IcmNetBufFree: free netbuf: 1111aba40 out of 1 used
- [Thr 773] MPI<25eb>13#4 DiscardOutbuf 3 0 0 ad2a0 0 0 -> a000000300ad2a0 MPI_OK
- [Thr 773] PlugInStopConn: role: Server(1), error: OK(0), write_err: 0
- [Thr 773] HttpSubHandlerClose: Call Handler: HttpAuthHandler (113178ad0/11316fb10), task=TASK_CLOSE(3)
- [Thr 773] HttpSubHandlerClose: Call Handler: HttpModHandler (113177f50/11316fb10), task=TASK_CLOSE(3)
- [Thr 773] Wed Jul 4 16:54:16:321 2018
- [Thr 773] HttpModHandler: process 3, header_len 0
- [Thr 773] HttpSubHandlerClose: Call Handler: HttpWebDispHandler (113182350/11316fb10), task=TASK_CLOSE(3)
- [Thr 773] HttpRouteHandler: 3 0 113182350 (nil)
- [Thr 773] HTR: HtrCleanupConnection -> 0
- [Thr 773] HttpSubHandlerClose: remove reference to table 11316fb10, now 1 references, 1 tables used
- [Thr 773] ICT: IctHttpCloseMessage( 11582c030 ) -> u=0 rc=0
- [Thr 773] ICT: IctHttpCloseMessage( 116ad1e10 ) -> u=0 rc=0
- [Thr 773] ->> SapSSLSessionDoneNB(&sssl_hdl=1111c5800)
- [Thr 773] CCL[SSL]: Srv-000000A9: Sending alert of level WARNING: close notify [ssl3_send_alert]
- [Thr 773] SSL:SiSend(sock= 28)== 0 (SI_OK) (out=31 of 31)
- [Thr 773] CCL[SSL]: Srv-000000A9: ########## SSL connection cleaned up and destroyed. ########## [SSL_free]
- [Thr 773] <<- SapSSLSessionDoneNB()==SAP_O_K
- [Thr 773] in: sssl_hdl = 1133566f0
- [Thr 773] in/out: ... ni_hdl = 165
- [Thr 773] MPI<25ea>6#7 Close( 6 ) opt=4 del=0( 1 0 ) wakeup=0-> MPI_OK
- [Thr 773] MPI<25ea>6#9 Delete( 6 ) -> MPI_OK
- [Thr 773] MPI<25ea>6#8 Close( 6 ) opt=4 del=1( 0 0 ) wakeup=0-> MPI_OK
- [Thr 773] MPI<25eb>13#5 Close( 13 ) opt=4 del=0( 0 1 ) wakeup=0-> MPI_OK
- [Thr 773] MPI<25eb>13#7 Delete( 13 ) -> MPI_OK
- [Thr 773] MPI<25eb>13#6 Close( 13 ) opt=4 del=1( 0 0 ) wakeup=0-> MPI_OK
- [Thr 773] NiIShutdownHandle: shutdown -w of hdl 165
- [Thr 773] NiIPeek: peek successful for hdl 165 (r)
- [Thr 773] NiIRead: hdl 165 SSLState 0
- [Thr 773] NiIRead: SiRecv failed for hdl 165/sock 28
- [Thr 773] (SI_ECONN_BROKEN/0; I4; ST; P=10.112.0.20:57617; L=???)
- [Thr 773] NiICloseHandle: shutdown and close hdl 165/sock 28
- [Thr 773] IcmConnClose: Connection 9/5695 closed
- [Thr 773] IcmServDecrRefCount: par0189:44322 - new serv_ref_count: 0
- [Thr 773] REQ TRACE END: 9/5695/1
- [Thr 773] IcmWorkerThread: Thread 1: Waiting for event
Add Comment
Please, Sign In to add comment