Hello,
I am facing a rather annoying issue when using OFBiz trunk on localhost which prevents me from using my preferred Web browsers. The issue is that some of the browsers I use or more precisely the library used by those browsers to do the TLS handshake seems to not accept the default certificate provided by OFBiz. Here is the specific error I get on Chromium: --8<---------------cut here---------------start------------->8--- This site can’t provide a secure connection localhost uses an unsupported protocol. ERR_SSL_VERSION_OR_CIPHER_MISMATCH Unsupported protocol The client and server don't support a common SSL protocol version or cipher suite. --8<---------------cut here---------------end--------------->8--- Which is similar to what I have on GNU Icecat (→ Firefox) --8<---------------cut here---------------start------------->8--- Secure Connection Failed An error occurred during a connection to localhost:8443. Cannot communicate securely with peer: no common encryption algorithm(s). Error code: SSL_ERROR_NO_CYPHER_OVERLAP The page you are trying to view cannot be shown because the authenticity of the received data could not be verified. Please contact the website owners to inform them of this problem. --8<---------------cut here---------------end--------------->8--- I am using a rather exotic GNU/Linux distribution which is GuixSD so it might be difficult for any of you to reproduce the issue. However my guess is that the format of the OFBiz certificate is considered outdated on my machine. As a consequence I would like to try to upgrade that certificate to a more recent format version. Unfortunately I don't know much about SSL/TLS and in particular I don't know what is the proper way to regenerate the OFBiz certificate. The README in “framework/base/config/” mentions the details of that certificate but does not mention the command which has been used to generate it. Does anyone know how I could achieve the regeneration of tha certificate? Thanks. -- Mathieu Lirzin GPG: F2A3 8D7E EB2B 6640 5761 070D 0ADE E100 9460 4D37 |
Administrator
|
Hi Mathieu,
Hold on, I think I can help you but not before tomorrow evening Hopefully someone will beat me on it... Jacques Le 03/03/2019 à 19:00, Mathieu Lirzin a écrit : > Hello, > > I am facing a rather annoying issue when using OFBiz trunk on localhost > which prevents me from using my preferred Web browsers. > > The issue is that some of the browsers I use or more precisely the > library used by those browsers to do the TLS handshake seems to not > accept the default certificate provided by OFBiz. Here is the specific > error I get on Chromium: > > --8<---------------cut here---------------start------------->8--- > This site can’t provide a secure connection localhost uses an unsupported protocol. > ERR_SSL_VERSION_OR_CIPHER_MISMATCH > Unsupported protocol > The client and server don't support a common SSL protocol version or cipher suite. > --8<---------------cut here---------------end--------------->8--- > > Which is similar to what I have on GNU Icecat (→ Firefox) > > --8<---------------cut here---------------start------------->8--- > Secure Connection Failed > > An error occurred during a connection to localhost:8443. Cannot communicate securely with peer: no common encryption algorithm(s). Error code: SSL_ERROR_NO_CYPHER_OVERLAP > > The page you are trying to view cannot be shown because the authenticity of the received data could not be verified. > Please contact the website owners to inform them of this problem. > --8<---------------cut here---------------end--------------->8--- > > I am using a rather exotic GNU/Linux distribution which is GuixSD so it > might be difficult for any of you to reproduce the issue. However my > guess is that the format of the OFBiz certificate is considered outdated > on my machine. As a consequence I would like to try to upgrade that > certificate to a more recent format version. Unfortunately I don't know > much about SSL/TLS and in particular I don't know what is the proper way > to regenerate the OFBiz certificate. > > The README in “framework/base/config/” mentions the details of that > certificate but does not mention the command which has been used to > generate it. Does anyone know how I could achieve the regeneration of > tha certificate? > > Thanks. > |
Hi Mathieu
Perhaps it will help if you could enable SSL debugging (either in your browser or in OFBiz (-Djavax.net.debug=ssl)) and provide details how the SSL handshake happened. Specifically, it would be interesting to see what all protocols your browser presented to OFBiz. It looks like the two could not agree on the cipher suites to use for encryption unless your browser only supports SSL 2.0 which is outdated or TLS 1.3 which is fairly new . I may be saying obvious here but it will help if you can turn on SSL debugging and provide details of the SSL handshake. It will help what ClientHello message looked like when browser initiated communication with OFBiz. For example, here are the details of connection to localhost OFBiz on my machine - Cipher Suite used - TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 Protocol used - TLS 1.2. What I think happened is that both client and server agreed on SSL version but the server does not support any of the list of cipher suites browser supports. Please launch OFBiz JVM with javax.net.debug=ssl and that should help. Thanks and Regards, Girish On Mon, Mar 4, 2019 at 3:54 AM Jacques Le Roux <[hidden email]> wrote: > Hi Mathieu, > > Hold on, I think I can help you but not before tomorrow evening > > Hopefully someone will beat me on it... > > Jacques > > Le 03/03/2019 à 19:00, Mathieu Lirzin a écrit : > > Hello, > > > > I am facing a rather annoying issue when using OFBiz trunk on localhost > > which prevents me from using my preferred Web browsers. > > > > The issue is that some of the browsers I use or more precisely the > > library used by those browsers to do the TLS handshake seems to not > > accept the default certificate provided by OFBiz. Here is the specific > > error I get on Chromium: > > > > --8<---------------cut here---------------start------------->8--- > > This site can’t provide a secure connection localhost uses an > unsupported protocol. > > ERR_SSL_VERSION_OR_CIPHER_MISMATCH > > Unsupported protocol > > The client and server don't support a common SSL protocol version or > cipher suite. > > --8<---------------cut here---------------end--------------->8--- > > > > Which is similar to what I have on GNU Icecat (→ Firefox) > > > > --8<---------------cut here---------------start------------->8--- > > Secure Connection Failed > > > > An error occurred during a connection to localhost:8443. Cannot > communicate securely with peer: no common encryption algorithm(s). Error > code: SSL_ERROR_NO_CYPHER_OVERLAP > > > > The page you are trying to view cannot be shown because the > authenticity of the received data could not be verified. > > Please contact the website owners to inform them of this problem. > > --8<---------------cut here---------------end--------------->8--- > > > > I am using a rather exotic GNU/Linux distribution which is GuixSD so it > > might be difficult for any of you to reproduce the issue. However my > > guess is that the format of the OFBiz certificate is considered outdated > > on my machine. As a consequence I would like to try to upgrade that > > certificate to a more recent format version. Unfortunately I don't know > > much about SSL/TLS and in particular I don't know what is the proper way > > to regenerate the OFBiz certificate. > > > > The README in “framework/base/config/” mentions the details of that > > certificate but does not mention the command which has been used to > > generate it. Does anyone know how I could achieve the regeneration of > > tha certificate? > > > > Thanks. > > > |
Administrator
|
Hi Mathieu,
Did Girish's answer help? (thanks Girish) Jacques Le 04/03/2019 à 08:09, Girish Vasmatkar a écrit : > Hi Mathieu > > Perhaps it will help if you could enable SSL debugging (either in your > browser or in OFBiz (-Djavax.net.debug=ssl)) and provide details how the > SSL handshake happened. Specifically, it would be interesting to see what > all protocols your browser presented to OFBiz. > > It looks like the two could not agree on the cipher suites to use for > encryption unless your browser only supports SSL 2.0 which is outdated or TLS > 1.3 which is fairly new . I may be saying obvious here but it will help if > you can turn on SSL debugging and provide details of the SSL handshake. It > will help what ClientHello message looked like when browser initiated > communication with OFBiz. For example, here are the details of connection > to localhost OFBiz on my machine - > > Cipher Suite used - TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 > Protocol used - TLS 1.2. > > What I think happened is that both client and server agreed on SSL version > but the server does not support any of the list of cipher suites browser > supports. Please launch OFBiz JVM with javax.net.debug=ssl and that should > help. > > Thanks and Regards, > Girish > > > On Mon, Mar 4, 2019 at 3:54 AM Jacques Le Roux <[hidden email]> > wrote: > >> Hi Mathieu, >> >> Hold on, I think I can help you but not before tomorrow evening >> >> Hopefully someone will beat me on it... >> >> Jacques >> >> Le 03/03/2019 à 19:00, Mathieu Lirzin a écrit : >>> Hello, >>> >>> I am facing a rather annoying issue when using OFBiz trunk on localhost >>> which prevents me from using my preferred Web browsers. >>> >>> The issue is that some of the browsers I use or more precisely the >>> library used by those browsers to do the TLS handshake seems to not >>> accept the default certificate provided by OFBiz. Here is the specific >>> error I get on Chromium: >>> >>> --8<---------------cut here---------------start------------->8--- >>> This site can’t provide a secure connection localhost uses an >> unsupported protocol. >>> ERR_SSL_VERSION_OR_CIPHER_MISMATCH >>> Unsupported protocol >>> The client and server don't support a common SSL protocol version or >> cipher suite. >>> --8<---------------cut here---------------end--------------->8--- >>> >>> Which is similar to what I have on GNU Icecat (→ Firefox) >>> >>> --8<---------------cut here---------------start------------->8--- >>> Secure Connection Failed >>> >>> An error occurred during a connection to localhost:8443. Cannot >> communicate securely with peer: no common encryption algorithm(s). Error >> code: SSL_ERROR_NO_CYPHER_OVERLAP >>> The page you are trying to view cannot be shown because the >> authenticity of the received data could not be verified. >>> Please contact the website owners to inform them of this problem. >>> --8<---------------cut here---------------end--------------->8--- >>> >>> I am using a rather exotic GNU/Linux distribution which is GuixSD so it >>> might be difficult for any of you to reproduce the issue. However my >>> guess is that the format of the OFBiz certificate is considered outdated >>> on my machine. As a consequence I would like to try to upgrade that >>> certificate to a more recent format version. Unfortunately I don't know >>> much about SSL/TLS and in particular I don't know what is the proper way >>> to regenerate the OFBiz certificate. >>> >>> The README in “framework/base/config/” mentions the details of that >>> certificate but does not mention the command which has been used to >>> generate it. Does anyone know how I could achieve the regeneration of >>> tha certificate? >>> >>> Thanks. >>> |
Hello Girish and Jacques,
Jacques Le Roux <[hidden email]> writes: > Did Girish's answer help? (thanks Girish) Yes it helps alot. > Le 04/03/2019 à 08:09, Girish Vasmatkar a écrit : >> >> Perhaps it will help if you could enable SSL debugging (either in your >> browser or in OFBiz (-Djavax.net.debug=ssl)) and provide details how the >> SSL handshake happened. Specifically, it would be interesting to see what >> all protocols your browser presented to OFBiz. Here is the log of OFBiz with (-Djavax.net.debug=ssl) with a failing handshake with GNU Icecat: Here is the log with another browser (Epiphany) with a successful handshake: -- Mathieu Lirzin GPG: F2A3 8D7E EB2B 6640 5761 070D 0ADE E100 9460 4D37 |
with the inlined logs:
Mathieu Lirzin <[hidden email]> writes: > Hello Girish and Jacques, > > Jacques Le Roux <[hidden email]> writes: > >> Did Girish's answer help? (thanks Girish) > > Yes it helps alot. > >> Le 04/03/2019 à 08:09, Girish Vasmatkar a écrit : >>> >>> Perhaps it will help if you could enable SSL debugging (either in your >>> browser or in OFBiz (-Djavax.net.debug=ssl)) and provide details how the >>> SSL handshake happened. Specifically, it would be interesting to see what >>> all protocols your browser presented to OFBiz. > > Here is the log of OFBiz with (-Djavax.net.debug=ssl) with a failing > handshake with GNU Icecat: Using SSLEngineImpl. Allow unsafe renegotiation: false Allow legacy hello messages: true Is initial handshake: true Is secure renegotiation: false Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1.1 https-jsse-nio-8443-exec-8, READ: TLSv1 Handshake, length = 512 *** ClientHello, TLSv1.2 RandomCookie: GMT: 1736093966 bytes = { 189, 227, 177, 17, 199, 186, 164, 220, 197, 114, 96, 6, 87, 64, 58, 23, 142, 75, 57, 206, 107, 227, 181, 65, 168, 6, 76, 155 } Session ID: {193, 60, 237, 251, 184, 155, 76, 93, 36, 222, 130, 94, 35, 149, 245, 251, 82, 146, 204, 227, 113, 188, 245, 195, 46, 17, 198, 7, 175, 181, 1, 156} Cipher Suites: [Unknown 0x13:0x1, Unknown 0x13:0x3, Unknown 0x13:0x2, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xcc:0xa9, Unknown 0xcc:0xa8, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA] Compression Methods: { 0 } Extension server_name, server_name: [type=host_name (0), value=localhost] Extension extended_master_secret Extension renegotiation_info, renegotiated_connection: <empty> Extension elliptic_curves, curve names: {unknown curve 29, secp256r1, secp384r1, secp521r1, unknown curve 256, unknown curve 257} Extension ec_point_formats, formats: [uncompressed] Unsupported extension type_35, data: Unsupported extension type_16, data: 00:0c:02:68:32:08:68:74:74:70:2f:31:2e:31 Unsupported extension status_request, data: 01:00:00:00:00 Unsupported extension type_51, data: 00:69:00:1d:00:20:15:8a:11:44:3e:65:b5:86:d5:91:8e:46:d4:4c:f1:05:44:48:a7:43:9e:04:69:69:fe:58:f5:80:ce:bc:d2:58:00:17:00:41:04:b7:0f:c1:73:e5:bf:9d:fd:4c:29:24:07:27:9e:77:1e:fb:30:d2:b8:17:b5:87:1e:f6:61:d1:b3:9c:f8:59:2a:cd:63:07:7f:9b:2f:3d:f9:80:a5:e2:f3:09:3d:e5:91:f4:35:2a:d0:ec:aa:89:ed:6d:63:7c:93:74:a6:0e:e9 Unsupported extension type_43, data: 08:7f:17:03:03:03:02:03:01 Extension signature_algorithms, signature_algorithms: SHA256withECDSA, SHA384withECDSA, SHA512withECDSA, Unknown (hash:0x8, signature:0x4), Unknown (hash:0x8, signature:0x5), Unknown (hash:0x8, signature:0x6), SHA256withRSA, SHA384withRSA, SHA512withRSA, SHA1withECDSA, SHA1withRSA Unsupported extension type_45, data: 01:01 Unsupported extension type_21, data: 00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00 *** %% Initialized: [Session-54, SSL_NULL_WITH_NULL_NULL] https-jsse-nio-8443-exec-8, fatal error: 40: no cipher suites in common javax.net.ssl.SSLHandshakeException: no cipher suites in common %% Invalidated: [Session-54, SSL_NULL_WITH_NULL_NULL] https-jsse-nio-8443-exec-8, SEND TLSv1.2 ALERT: fatal, description = handshake_failure https-jsse-nio-8443-exec-8, WRITE: TLSv1.2 Alert, length = 2 https-jsse-nio-8443-exec-8, fatal: engine already closed. Rethrowing javax.net.ssl.SSLHandshakeException: no cipher suites in common https-jsse-nio-8443-exec-8, called closeOutbound() https-jsse-nio-8443-exec-8, closeOutboundInternal() Using SSLEngineImpl. Allow unsafe renegotiation: false Allow legacy hello messages: true Is initial handshake: true Is secure renegotiation: false Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1.1 https-jsse-nio-8443-exec-3, READ: TLSv1 Handshake, length = 177 *** ClientHello, TLSv1.2 RandomCookie: GMT: 146371561 bytes = { 199, 41, 221, 220, 249, 76, 16, 148, 121, 235, 169, 29, 195, 217, 73, 96, 168, 20, 66, 190, 101, 117, 147, 205, 153, 77, 208, 190 } Session ID: {} Cipher Suites: [TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xcc:0xa9, Unknown 0xcc:0xa8, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA] Compression Methods: { 0 } Extension server_name, server_name: [type=host_name (0), value=localhost] Extension extended_master_secret Extension renegotiation_info, renegotiated_connection: <empty> Extension elliptic_curves, curve names: {unknown curve 29, secp256r1, secp384r1, secp521r1} Extension ec_point_formats, formats: [uncompressed] Unsupported extension type_35, data: Unsupported extension type_16, data: 00:0c:02:68:32:08:68:74:74:70:2f:31:2e:31 Unsupported extension status_request, data: 01:00:00:00:00 Extension signature_algorithms, signature_algorithms: SHA256withECDSA, SHA384withECDSA, SHA512withECDSA, Unknown (hash:0x8, signature:0x4), Unknown (hash:0x8, signature:0x5), Unknown (hash:0x8, signature:0x6), SHA256withRSA, SHA384withRSA, SHA512withRSA, SHA1withECDSA, SHA1withRSA *** %% Initialized: [Session-55, SSL_NULL_WITH_NULL_NULL] https-jsse-nio-8443-exec-3, fatal error: 40: no cipher suites in common javax.net.ssl.SSLHandshakeException: no cipher suites in common %% Invalidated: [Session-55, SSL_NULL_WITH_NULL_NULL] https-jsse-nio-8443-exec-3, SEND TLSv1.2 ALERT: fatal, description = handshake_failure https-jsse-nio-8443-exec-3, WRITE: TLSv1.2 Alert, length = 2 https-jsse-nio-8443-exec-3, fatal: engine already closed. Rethrowing javax.net.ssl.SSLHandshakeException: no cipher suites in common https-jsse-nio-8443-exec-3, called closeOutbound() https-jsse-nio-8443-exec-3, closeOutboundInternal() > Here is the log with another browser (Epiphany) with a successful handshake: Using SSLEngineImpl. Allow unsafe renegotiation: false Allow legacy hello messages: true Is initial handshake: true Is secure renegotiation: false Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1.1 https-jsse-nio-8443-exec-2, READ: TLSv1.2 Alert, length = 26 https-jsse-nio-8443-exec-2, RECV TLSv1.2 ALERT: warning, close_notify https-jsse-nio-8443-exec-2, closeInboundInternal() https-jsse-nio-8443-exec-2, closeOutboundInternal() https-jsse-nio-8443-exec-2, SEND TLSv1.2 ALERT: warning, description = close_notify https-jsse-nio-8443-exec-1, READ: TLSv1 Handshake, length = 512 https-jsse-nio-8443-exec-2, WRITE: TLSv1.2 Alert, length = 26 https-jsse-nio-8443-exec-2, called closeOutbound() *** ClientHello, TLSv1.2 RandomCookie: https-jsse-nio-8443-exec-2, closeOutboundInternal() GMT: 814150594 bytes = { 189, 14, 209, 176, 97, 15, 214, 107, 117, 63, 187, 162, 12, 184, 245, 189, 245, 227, 127, 128, 244, 154, 249, 115, 101, 100, 61, 40 } Session ID: {92, 125, 15, 237, 254, 33, 2, 52, 144, 148, 0, 165, 156, 232, 106, 139, 222, 199, 99, 71, 41, 230, 1, 75, 246, 145, 175, 22, 191, 231, 28, 218} Cipher Suites: [Unknown 0x13:0x2, Unknown 0x13:0x3, Unknown 0x13:0x1, Unknown 0x13:0x4, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa9, Unknown 0xc0:0xad, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0xac, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa8, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xc0:0x9d, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9c, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xaa, Unknown 0xc0:0x9f, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9e, TLS_DHE_RSA_WITH_AES_128_CBC_SHA] Compression Methods: { 0 } Unsupported extension status_request, data: 01:00:00:00:00 Extension elliptic_curves, curve names: {secp256r1, secp384r1, secp521r1, unknown curve 29, unknown curve 256, unknown curve 257, unknown curve 258, unknown curve 259, unknown curve 260} Extension ec_point_formats, formats: [uncompressed] Extension signature_algorithms, signature_algorithms: SHA256withRSA, Unknown (hash:0x8, signature:0x9), Unknown (hash:0x8, signature:0x4), SHA256withECDSA, Unknown (hash:0x8, signature:0x7), SHA384withRSA, Unknown (hash:0x8, signature:0xa), Unknown (hash:0x8, signature:0x5), SHA384withECDSA, SHA512withRSA, Unknown (hash:0x8, signature:0xb), Unknown (hash:0x8, signature:0x6), SHA512withECDSA, SHA1withRSA, SHA1withECDSA Unsupported extension type_35, data: Unsupported extension type_51, data: 00:69:00:17:00:41:04:64:09:13:0a:51:7f:68:f5:63:01:39:08:81:34:af:cd:75:75:98:c8:81:91:0d:6a:2a:22:43:3e:a9:2d:23:48:16:7a:d0:a8:b5:bd:ce:8d:54:25:fd:33:c3:99:bd:42:9f:05:d1:7e:dd:e8:5e:37:fa:7f:dd:e1:6a:ef:a0:b9:00:1d:00:20:e8:f0:72:c3:30:bc:24:4e:cd:5f:14:38:a2:86:9e:84:cd:51:df:a4:6d:72:33:e8:e9:a0:55:8e:4c:60:21:50 Unsupported extension type_43, data: 08:03:04:03:03:03:02:03:01 Extension renegotiation_info, renegotiated_connection: <empty> Extension server_name, server_name: [type=host_name (0), value=localhost] Unsupported extension type_45, data: 02:01:00 Unsupported extension type_28, data: 40:00 Unsupported extension type_21, data: 00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00 *** %% Initialized: [Session-10, SSL_NULL_WITH_NULL_NULL] Standard ciphersuite chosen: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 %% Negotiating: [Session-10, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384] *** ServerHello, TLSv1.2 RandomCookie: GMT: 1551699703 bytes = { 1, 74, 230, 110, 14, 123, 143, 104, 216, 59, 77, 109, 156, 237, 68, 152, 241, 106, 128, 168, 185, 218, 12, 202, 6, 4, 174, 147 } Session ID: {92, 125, 15, 247, 246, 249, 211, 141, 164, 158, 249, 105, 184, 211, 34, 29, 135, 131, 232, 36, 64, 192, 38, 174, 54, 83, 112, 53, 142, 111, 182, 94} Cipher Suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 Compression Method: 0 Extension renegotiation_info, renegotiated_connection: <empty> *** Cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 https-jsse-nio-8443-exec-9, WRITE: TLSv1.2 Application Data, length = 339 *** Certificate chain chain [0] = [ [ Version: V3 Subject: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5 Key: Sun RSA public key, 2048 bits modulus: 21944740401167172627731583459321030363948627215746053925732477915060915436180167456469785746662093119306577380200747716284652995937004530444336851845029170241627465854006145050037178991946925696078563485570896673835545540824265905937881682387179314987285174428010940266412458943894800978345731524307952507729956745301047871771953945124256516782917326981125087548987889540650149121302888872237484100834740328828765018090383963294418357028839734723410564800765871733483849269364796949055153420777966213779145518299141217288017794394762274753999989298548507425930217302947589819396239489846633419099079578249651345685751 public exponent: 65537 Validity: [From: Fri May 30 08:43:19 GMT 2014, To: Mon May 27 08:43:19 GMT 2024] Issuer: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US SerialNumber: [ a6ef7a9a 5368eb27] Certificate Extensions: 3 [1]: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: 78 0D 96 9D FE D3 0B BE 8C C7 E3 EC 67 04 AB 4B x...........g..K 0010: EA E0 00 29 ...) ] ] [2]: ObjectId: 2.5.29.19 Criticality=false BasicConstraints:[ CA:true PathLen:2147483647 ] [3]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 78 0D 96 9D FE D3 0B BE 8C C7 E3 EC 67 04 AB 4B x...........g..K 0010: EA E0 00 29 ...) ] ] ] Algorithm: [SHA1withRSA] Signature: 0000: 19 16 5A 21 99 21 24 98 3C 0A E8 D8 00 AB 44 24 ..Z!.!$.<.....D$ 0010: F2 0C B7 83 D5 9F 96 17 87 E2 1F 1D A3 47 68 C7 .............Gh. 0020: 68 4A CB 56 0E 77 2B E8 1A 9F E7 09 A1 19 77 D0 hJ.V.w+.......w. 0030: 5E CC C1 B3 9A C4 35 3D CB E0 A5 A6 43 5D A3 26 ^.....5=....C].& 0040: A4 91 8A C1 FA 7B 10 EA DC C3 C7 1C 47 DC 97 32 ............G..2 0050: C0 37 80 1C F1 42 10 E3 74 17 FA 3E 60 4A B7 59 .7...B..t..>`J.Y 0060: 92 C1 E0 6F BB F1 BB 9F 82 89 B5 83 D5 AE 1E 90 ...o............ 0070: 0A 89 8D FB 4C C0 C5 9E DC C5 8C C6 2F EE D9 B4 ....L......./... 0080: 95 47 27 2E BE 82 31 6F 76 C0 DB 4C C8 0D 3B 7B .G'...1ov..L..;. 0090: D1 6A BF BD 3B 93 30 04 A2 9E 81 F7 96 28 77 F2 .j..;.0......(w. 00A0: 32 05 68 44 1F B3 30 CE 40 9F 20 F3 B4 2B AA E6 2.hD..0.@. ..+.. 00B0: 40 9B FB 7F 34 6E 3A 99 FD F8 28 F1 8C 9B 56 34 @...4n:...(...V4 00C0: 64 AD 4D 56 39 CB 96 18 50 9B 99 43 80 0A 39 A5 d.MV9...P..C..9. 00D0: 13 7A 6E C5 25 E0 95 4A 92 E5 A8 8B EE 03 49 B4 .zn.%..J......I. 00E0: D9 7C 00 E3 F0 3B A7 BA 40 30 CC 89 55 C6 97 93 .....;..@0..U... 00F0: B5 15 F6 62 D3 B1 74 9C 0B 80 2B 8A D4 03 84 A0 ...b..t...+..... ] *** *** Diffie-Hellman ServerKeyExchange DH Modulus: { 255, 255, 255, 255, 255, 255, 255, 255, 201, 15, 218, 162, 33, 104, 194, 52, 196, 198, 98, 139, 128, 220, 28, 209, 41, 2, 78, 8, 138, 103, 204, 116, 2, 11, 190, 166, 59, 19, 155, 34, 81, 74, 8, 121, 142, 52, 4, 221, 239, 149, 25, 179, 205, 58, 67, 27, 48, 43, 10, 109, 242, 95, 20, 55, 79, 225, 53, 109, 109, 81, 194, 69, 228, 133, 181, 118, 98, 94, 126, 198, 244, 76, 66, 233, 166, 55, 237, 107, 11, 255, 92, 182, 244, 6, 183, 237, 238, 56, 107, 251, 90, 137, 159, 165, 174, 159, 36, 17, 124, 75, 31, 230, 73, 40, 102, 81, 236, 230, 83, 129, 255, 255, 255, 255, 255, 255, 255, 255 } DH Base: { 2 } Server DH Public Key: { 207, 201, 241, 189, 224, 175, 68, 248, 216, 197, 47, 214, 124, 101, 217, 9, 127, 95, 125, 123, 118, 132, 240, 161, 211, 172, 155, 151, 38, 81, 217, 225, 137, 34, 92, 50, 243, 88, 199, 76, 154, 29, 118, 218, 187, 175, 51, 153, 133, 115, 97, 176, 38, 139, 13, 107, 114, 66, 44, 201, 109, 168, 61, 214, 28, 170, 130, 136, 66, 189, 7, 217, 29, 83, 49, 211, 167, 220, 13, 57, 229, 176, 106, 101, 147, https-jsse-nio-8443-exec-9, WRITE: TLSv1.2 Application Data, length = 548 155, 102, 135, 27, 15, 236, 14, 126, 81, 118, 54, 20, 33, 204, 63, 45, 14, 239, 232, 96, 218, 144, 135, 68, 98, 120, 209, 97, 189, 243, 74, 38, 12, 149, 112, 124, 118, 40, 193, 94, 129, 194, 136 } Signature Algorithm SHA256withRSA Signed with a DSA or RSA public key *** ServerHelloDone https-jsse-nio-8443-exec-1, WRITE: TLSv1.2 Handshake, length = 1697 Using SSLEngineImpl. Allow unsafe renegotiation: false Allow legacy hello messages: true Is initial handshake: true Is secure renegotiation: false Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1.1 https-jsse-nio-8443-exec-1, READ: TLSv1 Handshake, length = 512 *** ClientHello, TLSv1.2 RandomCookie: GMT: 891426139 bytes = { 70, 64, 99, 252, 252, 243, 247, 61, 84, 99, 225, 22, 197, 217, 232, 204, 83, 219, 77, 96, 217, 224, 36, 16, 75, 250, 115, 210 } Session ID: {92, 125, 15, 237, 254, 33, 2, 52, 144, 148, 0, 165, 156, 232, 106, 139, 222, 199, 99, 71, 41, 230, 1, 75, 246, 145, 175, 22, 191, 231, 28, 218} Cipher Suites: [Unknown 0x13:0x2, Unknown 0x13:0x3, Unknown 0x13:0x1, Unknown 0x13:0x4, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa9, Unknown 0xc0:0xad, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0xac, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa8, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xc0:0x9d, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9c, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xaa, Unknown 0xc0:0x9f, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9e, TLS_DHE_RSA_WITH_AES_128_CBC_SHA] Compression Methods: { 0 } Unsupported extension status_request, data: 01:00:00:00:00 Extension elliptic_curves, curve names: {secp256r1, secp384r1, secp521r1, unknown curve 29, unknown curve 256, unknown curve 257, unknown curve 258, unknown curve 259, unknown curve 260} Extension ec_point_formats, formats: [uncompressed] Extension signature_algorithms, signature_algorithms: SHA256withRSA, Unknown (hash:0x8, signature:0x9), Unknown (hash:0x8, signature:0x4), SHA256withECDSA, Unknown (hash:0x8, signature:0x7), SHA384withRSA, Unknown (hash:0x8, signature:0xa), Unknown (hash:0x8, signature:0x5), SHA384withECDSA, SHA512withRSA, Unknown (hash:0x8, signature:0xb), Unknown (hash:0x8, signature:0x6), SHA512withECDSA, SHA1withRSA, SHA1withECDSA Unsupported extension type_35, data: Unsupported extension type_51, data: 00:69:00:17:00:41:04:4c:4b:f9:0d:41:a2:d1:e0:cc:78:46:72:f7:54:96:02:a0:a2:d6:14:0b:7a:6e:f1:45:0a:8f:bd:40:4f:eb:26:cb:d1:4d:1c:12:24:25:45:db:9c:f3:85:55:8d:0a:3f:4e:d8:d0:1f:95:1c:46:97:c5:b1:74:e7:c7:38:ed:b4:00:1d:00:20:e1:f7:e1:e0:c6:56:96:45:a4:22:c3:5b:78:3c:d2:1c:ad:eb:c3:85:0d:9e:01:6e:4a:f7:60:5d:14:14:4f:2a Unsupported extension type_43, data: 08:03:04:03:03:03:02:03:01 Extension renegotiation_info, renegotiated_connection: <empty> Extension server_name, server_name: [type=host_name (0), value=localhost] Unsupported extension type_45, data: 02:01:00 Unsupported extension type_28, data: 40:00 Unsupported extension type_21, data: 00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00 *** %% Initialized: [Session-11, SSL_NULL_WITH_NULL_NULL] Standard ciphersuite chosen: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 %% Negotiating: [Session-11, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384] *** ServerHello, TLSv1.2 RandomCookie: GMT: 1551699703 bytes = { 84, 57, 154, 20, 67, 161, 125, 104, 24, 253, 249, 172, 67, 138, 44, 163, 152, 238, 181, 239, 217, 23, 49, 149, 121, 11, 142, 123 } Session ID: {92, 125, 15, 247, 213, 157, 46, 13, 7, 249, 27, 59, 188, 52, 107, 216, 12, 30, 168, 6, 161, 1, 93, 140, 189, 97, 129, 164, 189, 189, 122, 170} Cipher Suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 Compression Method: 0 Extension renegotiation_info, renegotiated_connection: <empty> *** Cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 *** Certificate chain chain [0] = [ [ Version: V3 Subject: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5 Key: Sun RSA public key, 2048 bits modulus: 21944740401167172627731583459321030363948627215746053925732477915060915436180167456469785746662093119306577380200747716284652995937004530444336851845029170241627465854006145050037178991946925696078563485570896673835545540824265905937881682387179314987285174428010940266412458943894800978345731524307952507729956745301047871771953945124256516782917326981125087548987889540650149121302888872237484100834740328828765018090383963294418357028839734723410564800765871733483849269364796949055153420777966213779145518299141217288017794394762274753999989298548507425930217302947589819396239489846633419099079578249651345685751 public exponent: 65537 Validity: [From: Fri May 30 08:43:19 GMT 2014, To: Mon May 27 08:43:19 GMT 2024] Issuer: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US SerialNumber: [ a6ef7a9a 5368eb27] Certificate Extensions: 3 [1]: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: 78 0D 96 9D FE D3 0B BE 8C C7 E3 EC 67 04 AB 4B x...........g..K 0010: EA E0 00 29 ...) ] ] [2]: ObjectId: 2.5.29.19 Criticality=false BasicConstraints:[ CA:true PathLen:2147483647 ] [3]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 78 0D 96 9D FE D3 0B BE 8C C7 E3 EC 67 04 AB 4B x...........g..K 0010: EA E0 00 29 ...) ] ] ] Algorithm: [SHA1withRSA] Signature: 0000: 19 16 5A 21 99 21 24 98 3C 0A E8 D8 00 AB 44 24 ..Z!.!$.<.....D$ 0010: F2 0C B7 83 D5 9F 96 17 87 E2 1F 1D A3 47 68 C7 .............Gh. 0020: 68 4A CB 56 0E 77 2B E8 1A 9F E7 09 A1 19 77 D0 hJ.V.w+.......w. 0030: 5E CC C1 B3 9A C4 35 3D CB E0 A5 A6 43 5D A3 26 ^.....5=....C].& 0040: A4 91 8A C1 FA 7B 10 EA DC C3 C7 1C 47 DC 97 32 ............G..2 0050: C0 37 80 1C F1 42 10 E3 74 17 FA 3E 60 4A B7 59 .7...B..t..>`J.Y 0060: 92 C1 E0 6F BB F1 BB 9F 82 89 B5 83 D5 AE 1E 90 ...o............ 0070: 0A 89 8D FB 4C C0 C5 9E DC C5 8C C6 2F EE D9 B4 ....L......./... 0080: 95 47 27 2E BE 82 31 6F 76 C0 DB 4C C8 0D 3B 7B .G'...1ov..L..;. 0090: D1 6A BF BD 3B 93 30 04 A2 9E 81 F7 96 28 77 F2 .j..;.0......(w. 00A0: 32 05 68 44 1F B3 30 CE 40 9F 20 F3 B4 2B AA E6 2.hD..0.@. ..+.. 00B0: 40 9B FB 7F 34 6E 3A 99 FD F8 28 F1 8C 9B 56 34 @...4n:...(...V4 00C0: 64 AD 4D 56 39 CB 96 18 50 9B 99 43 80 0A 39 A5 d.MV9...P..C..9. 00D0: 13 7A 6E C5 25 E0 95 4A 92 E5 A8 8B EE 03 49 B4 .zn.%..J......I. 00E0: D9 7C 00 E3 F0 3B A7 BA 40 30 CC 89 55 C6 97 93 .....;..@0..U... 00F0: B5 15 F6 62 D3 B1 74 9C 0B 80 2B 8A D4 03 84 A0 ...b..t...+..... ] Using SSLEngineImpl. Allow unsafe renegotiation: false Allow legacy hello messages: true Is initial handshake: true Is secure renegotiation: false Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1 Using SSLEngineImpl. https-jsse-nio-8443-exec-9, WRITE: TLSv1.2 Application Data, length = 286 Allow unsafe renegotiation: false Allow legacy hello messages: true Is initial handshake: true Is secure renegotiation: false Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1.1 https-jsse-nio-8443-exec-5, READ: TLSv1 Handshake, length = 512 https-jsse-nio-8443-exec-3, READ: TLSv1 Handshake, length = 512 https-jsse-nio-8443-exec-4, READ: TLSv1.2 Handshake, length = 134 *** *** ClientHello, TLSv1.2 Using SSLEngineImpl. Allow unsafe renegotiation: false Allow legacy hello messages: true Is initial handshake: true Is secure renegotiation: false Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1.1 RandomCookie: GMT: 937077586 bytes = { 174, 84, 63, 142, 131, 103, 98, 166, 55, 40, 255, 208, 186, 157, 182, 91, 213, 254, 173, 94, 119, 55, 74, 51, 128, 16, 27, 127 } Session ID: {92, 125, 15, 237, 254, 33, 2, 52, 144, 148, 0, 165, 156, 232, 106, 139, 222, 199, 99, 71, 41, 230, 1, 75, 246, 145, 175, 22, 191, 231, 28, 218} Cipher Suites: [Unknown 0x13:0x2, Unknown 0x13:0x3, Unknown 0x13:0x1, Unknown 0x13:0x4, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa9, Unknown 0xc0:0xad, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0xac, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa8, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xc0:0x9d, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9c, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xaa, Unknown 0xc0:0x9f, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9e, TLS_DHE_RSA_WITH_AES_128_CBC_SHA] Compression Methods: { 0 } Unsupported extension status_request, data: 01:00:00:00:00 Extension elliptic_curves, curve names: {secp256r1, secp384r1, secp521r1, unknown curve 29, unknown curve 256, unknown curve 257, unknown curve 258, unknown curve 259, unknown curve 260} Extension ec_point_formats, formats: [uncompressed] Extension signature_algorithms, signature_algorithms: SHA256withRSA, Unknown (hash:0x8, signature:0x9), Unknown (hash:0x8, signature:0x4), SHA256withECDSA, Unknown (hash:0x8, signature:0x7), SHA384withRSA, Unknown (hash:0x8, signature:0xa), Unknown (hash:0x8, signature:0x5), SHA384withECDSA, SHA512withRSA, Unknown (hash:0x8, signature:0xb), Unknown (hash:0x8, signature:0x6), SHA512withECDSA, SHA1withRSA, SHA1withECDSA Unsupported extension type_35, data: Unsupported extension type_51, data: 00:69:00:17:00:41:04:63:49:bf:ec:49:38:e9:99:e5:34:bf:79:d7:44:85:9b:ae:30:19:12:ea:6a:b9:66:e4:ce:a5:bc:ac:5d:fb:69:6c:ff:6e:5f:19:83:88:c1:28:66:40:3c:1a:3c:60:b7:26:38:7a:8d:34:f4:8c:db:b2:5b:36:b1:9f:5b:0b:7f:00:1d:00:20:9e:f1:d0:52:64:c2:20:af:55:dc:18:64:f8:cb:ae:a9:f3:e7:f9:cd:2c:03:6f:96:cf:86:86:88:c4:f5:ca:2e Unsupported extension type_43, data: 08:03:04:03:03:03:02:03:01 Extension renegotiation_info, renegotiated_connection: <empty> Extension server_name, server_name: [type=host_name (0), value=localhost] Unsupported extension type_45, data: 02:01:00 Unsupported extension type_28, data: 40:00 Unsupported extension type_21, data: 00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00 *** %% Initialized: [Session-12, SSL_NULL_WITH_NULL_NULL] *** ClientHello, TLSv1.2 RandomCookie: GMT: -1820512062 bytes = { 64, 6, 99, 211, 116, 173, 108, 226, 253, 149, 49, 235, 200, 156, 119, 226, 92, 124, 69, 218, 214, 105, 68, 37, 151, 243, 120, 41 } Session ID: {92, 125, 15, 237, 254, 33, 2, 52, 144, 148, 0, 165, 156, 232, 106, 139, 222, 199, 99, 71, 41, 230, 1, 75, 246, 145, 175, 22, 191, 231, 28, 218} Cipher Suites: [Unknown 0x13:0x2, Unknown 0x13:0x3, Unknown 0x13:0x1, Unknown 0x13:0x4, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa9, Unknown 0xc0:0xad, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0xac, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa8, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xc0:0x9d, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9c, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xaa, Unknown 0xc0:0x9f, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9e, TLS_DHE_RSA_WITH_AES_128_CBC_SHA] Compression Methods: { 0 } Unsupported extension status_request, data: 01:00:00:00:00 Extension elliptic_curves, curve names: {secp256r1, secp384r1, secp521r1, unknown curve 29, unknown curve 256, unknown curve 257, unknown curve 258, unknown curve 259, unknown curve 260} *** ClientKeyExchange, DH Extension ec_point_formats, formats: [uncompressed] https-jsse-nio-8443-exec-9, WRITE: TLSv1.2 Application Data, length = 53 Standard ciphersuite chosen: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 *** Diffie-Hellman ServerKeyExchange DH Modulus: { 255, 255, 255, 255, 255, 255, 255, 255, https-jsse-nio-8443-exec-6, READ: TLSv1 Handshake, length = 512 201%% Negotiating: [Session-12, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384] *** ServerHello, TLSv1.2 RandomCookie: GMT: 1551699703 bytes = { 189, 88, 236, 195, 16, 20, *** ClientHello, TLSv1.2 RandomCookie: GMT: -2052347668 bytes = { Extension signature_algorithms, signature_algorithms: SHA256withRSA, Unknown (hash:0x8, signature:0x9), Unknown (hash:0x8, signature:0x4), SHA256withECDSA, Unknown (hash:0x8, signature:0x7), SHA384withRSA, Unknown (hash:0x8, signature:0xa), Unknown (hash:0x8, signature:0x5), SHA384withECDSA, SHA512withRSA, Unknown (hash:0x8, signature:0xb), Unknown (hash:0x8, signature:0x6), SHA512withECDSA, SHA1withRSA, SHA1withECDSA DH Public key: { 44, 33, 108, 222, 37, 147, 165, 17, 83, 11, 125, 252, 177, 121, 176, 220, 53, 161, 114, 76, 39, 221, 24, 63, 102, 217, 38, 175, 12, 184, 22, 169, 114, 30, 2, 36, 65, 125, 130, 154, 243, 72, 184, 27, 206, 250, 2, 219, 212, 150, 48, 222, 58, 17, 96, 109, 17, 180, 111, 224, 168, 191, 38, 96, 214, 110, 81, 34, 212, 94, 3, 119, 24, 43, 189, 128, 60, 93, 34, 7, 243, 167, 69, 203, 197, 247, 124, 116, 14, 107, 52, 145, 150, 18, 90, 253, 218, 3, 179, 185, 157, 238, 191, 152, 68, 242, 208, 83, 120, 171, 228, 145, 249, 212, 132, 160, 48, 67, 206, 49, 40, 43, 165, 58, 143, 82, 19, 137 } Unsupported extension type_35, data: Unsupported extension type_51, data: 00:69:00:17:00:41:04:fb:ce:2a:0c:db:49:2b:b8:4c:df:04:e9:fe:c8:83:44:a1:47:5f:59:37:fe:55:ea:46:17:82:64:6a:7f:67:62:19:fd:2f:51:e5:71:ef:51:70:a7:2a:19:88:de:b4:15:41:b6:86:57:a9:a7:16:75:73:ab:fb:f1:e8:6f:e1:17:00:1d:00:20:ec:07:9e:5c:8f:5d:b4:66:c2:f2:55:52:65:25:41:0d:24:27:dc:0d:ad:88:59:19:48:a3:dc:e0:5a:8f:cc:7c Unsupported extension type_43, data: 08:03:04:03:03:03:02:03:01 Extension renegotiation_info, renegotiated_connection: <empty> Extension server_name, server_name: [type=host_name (0), value=localhost] Unsupported extension type_45, data: 02:01:00 Unsupported extension type_28, data: 40:00 Unsupported extension type_21, data: 00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00 *** %% Initialized: [Session-13, SSL_NULL_WITH_NULL_NULL] SESSION KEYGEN: PreMaster Secret: 0000: 14 2B 4A 96 4B DB 65 AE A4 12 66 E4 51 AE B4 4B .+J.K.e...f.Q..K 0010: CC 85 AD 73 25 8E 51 18 27 97 B8 9E 86 63 D2 C6 ...s%.Q.'....c.. 0020: C6 BE 67 E5 8B 8C 0E 78 6F 69 E0 E2 6C C1 48 06 ..g....xoi..l.H. 0030: 71 DA B2 D6 8A 26 D4 5A 05 9D 7E 83 1D 18 93 C3 q....&.Z........ 0040: D3 04 28 1E 43 02 31 03 1B 72 45 4A 80 BE F5 19 ..(.C.1..rEJ.... 0050: D4 EC 73 06 B4 EE FA CC F1 8C 8F 9F 86 5F 81 B6 ..s.........._.. 0060: 25 F4 26 24 F1 BD EB 12 B7 40 30 70 BC 05 FC BC %.&$.....@0p.... 0070: 70 33 59 E9 71 1C C4 23 5D DA DF 4C 8D 06 F1 E7 p3Y.q..#]..L.... Standard ciphersuite chosen: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 %% Negotiating: [Session-13, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384] *** ServerHello, TLSv1.2 RandomCookie: GMT: 1551699703 bytes = { 252, 170, 211, 79, 11, 228, 84, 65, 15, 83, 81, 221, 200, 117, 89, 186, 233, 119, 90, 185CONNECTION KEYGEN: Client Nonce: 0000: 31 87 F4 C2 BD 0E D1 B0 61 0F D6 6B 75 3F BB A2 1.......a..ku?.. 0010: 0C B8 F5 BD F5 E3 7F 80 F4 9A F9 73 65 64 3D 28 ...........sed=( Server Nonce: 0000: 5C 7D 0F F7 01 4A E6 6E 0E 7B 8F 68 D8 3B 4D 6D \....J.n...h.;Mm 0010: 9C ED 44 98 F1 6A 80 A8 B9 DA 0C CA 06 04 AE 93 ..D..j.......... Master Secret: 0000: 4B 25 56 4E 5D FD 49 87 57 95 61 F8 41 E4 31 7C K%VN].I.W.a.A.1. 0010: EA 86 7F 50 6A FC 09 08 52 3E FC 2E 07 97 05 4E ...Pj...R>.....N 0020: 9C FD AC AB 2F 42 F1 ED 15 4C 13 A3 2B 30 20 58 ..../B...L..+0 X ... no MAC keys used for this cipher Client write key: 0000: 97 B5 1F 11 07 50 73 FE 8C 9E ED 35 58 70 A4 BB .....Ps....5Xp.. 0010: 5A EB 7B A0 F8 BC 09 83 67 95 E6 4F 24 8C 74 30 Z.......g..O$.t0 Server write key: 0000: 4C 6A 51 F2 BD FB 38 96 7B 95 F6 1C 5F 5D 09 93 LjQ...8....._].. 0010: F5 61 31 9C 3A 0C 9D 50 20 FB 93 92 E6 89 E6 37 .a1.:..P ......7 Client write IV: 0000: 15 B3 BB A8 .... Server write IV: 0000: A0 38 66 10 .8f. 114, 112, 85, 166, 214, 221, 236, 123, 184, 112, 134, , 15, 218, 162, 33, 104, 194, 52, 196, 198, 98, 139, 128, 220, 28, 209, 41, 2, 78, 8, 138, 103, 204, 116, 2, 11, 190, 166, 59, 19, 155, 34, 81, 74, 8, 121, 142, 52, 4, 221, 239, 149, 25, 179, 205, 58, 67, 27, 48, 43, 10, 109, 242, 95, 20, 55, 79, 225, 53, 109, 109, 81, 194, 69, 228, 133, 181, 118, 98, 94, 126, 198, 244, 76, 66, 233, 166, 55, 237, 107, 11, 255, 92, 182, 244, 6, 183, 237, 238, 56, 107, 251, 90, 137, 159, 165, 174, 159, 36, 17, 124, 75, 31, 230, 73, 40, 102, 81, 236, 230, 83, 129, 255, 255, 255, 255, 255, 255, 255, 255 } 155, DH Base: { 2 } Server DH Public Key: { 134, 63, 21, 208, 230, 233, 175, 114, 39, 141, 112, 190, 98, 170, 50, 62, 188, 50, 255, 139, 99, 214, 188, 84, 72, 83, 180, 84, 119, 199, 203, 23, 228, 34, 201, 57, 130, 183, 252, 53, 152, 17, 186, 166https-jsse-nio-8443-exec-4, READ: TLSv1.2 Change Cipher Spec, length = 1 https-jsse-nio-8443-exec-9, WRITE: TLSv1.2 Application Data, length = 20 2019-03-04 11:45:59,567 |jsse-nio-8443-exec-9 |ServerHitBin |I| Visit delegatorName=default, ServerHitBin delegatorName=default https-jsse-nio-8443-exec-4, READ: TLSv1.2 Handshake, length = 40 2019-03-04 11:45:59,586 |jsse-nio-8443-exec-9 |ControlServlet |T| [[[login(Domain:https://localhost)] Request Done- total:0.433,since last([login(Domain:htt...):0.433]] *** Finished verify_data: { 155, 222, 165, 24, 115, 12, 246, 156, 60, 164, 142, 178 } *** https-jsse-nio-8443-exec-4, WRITE: TLSv1.2 Change Cipher Spec, length = 1 *** Finished verify_data: { 6, 6, 16, 184, 161, 157, 241, 204, 225, 185, 204, 190 } *** , 106, 35, 185, 98, 28, 250, 88, 249 } Session ID: , 2, 255, 71, 96 } Session ID: 64, 104, 42, 166, 221, 165, 130, 152, 79, 44, 74, 66, 234, 105, 217, 162, 156, 55, 120, 122, 122, 100, 89, 111, 1, 89, 172, 237, 227, 121, 153, 61, 228, 161, 19, 115, 184, 42, 124, 190, 204, 189, 222, 120, 130, 193, 146, 0, 91, 96, 21, 216, 12, 212, 121, 122, 185, 188, 213, 232, 141, 115, 36, 88, 98, 138, 166, 244, 88, 246, 108, 235, 28, 181, 191, 203, 95, 70, 83, 147, 235, 212, 94, 154, 107, 232, 137, 63, 123, 156, 188, 229, 8, 225, 216, 246, 95, 134, 1, 192, 30 } Session ID: 49{92, 125, 15, 247, 188, 79, 171, 39, 143, 40, 158, 162, 235, 8, 205, 92, 188, 20, 0, 130, 247, 147, 227, 140, 94, 73, 165, 209, 150, 178, 61, 238} Cipher Suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 Compression Method: 0 https-jsse-nio-8443-exec-9, WRITE: TLSv1.2 Application Data, length = 84 {92, 125, 15, 237, 254, 33, 2, 52, 144, 148, 0, 165, 156, 232, 106, 139, 222, 199, 99, 71, 41, 230, 1, 75, 246, 145, 175, 22, 191, 231, 28, 218} Cipher Suites: [Unknown 0x13:0x2, Unknown 0x13:0x3, Unknown 0x13:0x1, Unknown 0x13:0x4, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa9, Unknown 0xc0:0xad, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0xac, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa8, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xc0:0x9d, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9c, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xaa, Unknown 0xc0:0x9f, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9e, TLS_DHE_RSA_WITH_AES_128_CBC_SHA] Compression Methods: { 0 } Unsupported extension status_request, data: 01:00:00:00:00 Extension elliptic_curves, curve names: {secp256r1, secp384r1, secp521r1, unknown curve 29, unknown curve 256, unknown curve 257, unknown curve 258, unknown curve 259, unknown curve 260} Extension ec_point_formats, formats: [uncompressed] Extension signature_algorithms, signature_algorithms: SHA256withRSA, Unknown (hash:0x8, signature:0x9), Unknown (hash:0x8, signature:0x4), SHA256withECDSA, Unknown (hash:0x8, signature:0x7), SHA384withRSA, Unknown (hash:0x8, signature:0xa), Unknown (hash:0x8, signature:0x5), SHA384withECDSA, SHA512withRSA, Unknown (hash:0x8, signature:0xb), Unknown (hash:0x8, signature:0x6), SHA512withECDSA, SHA1withRSA, SHA1withECDSA Unsupported extension type_35, data: Unsupported extension type_51, data: 00:69:00:17:00:41:04:09:2c:38:aa:5b:66:0a:29:e1:28:22:44:e6:26:34:0f:77:d8:d5:c5:c2:06:5f:9f:ab:05:cb:26:60:db:ac:37:26:61:cc:69:6c:58:20:88:2f:9d:18:72:cf:2e:01:e5:9b:db:9b:26:c8:95:50:a8:66:9c:e6:30:b2:f5:3d:b0:00:1d:00:20:40:c5:6e:d8:93:c4:ca:68:a7:b1:db:d4:c4:a3:5a:61:73:74:57:c9:d5:cf:2f:c1:21:7a:3a:ff:c3:a0:f5:28 Unsupported extension type_43, data: 08:03:04:03:03:03:02:03:01 Extension renegotiation_info, renegotiated_connection: <empty> Extension server_name, server_name: [type=host_name (0), value=localhost] Unsupported extension type_45, data: 02:01:00 Unsupported extension type_28, data: 40:00 Unsupported extension type_21, data: 00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00 *** %% Initialized: [Session-14, SSL_NULL_WITH_NULL_NULL] https-jsse-nio-8443-exec-9, READ: TLSv1.2 Alert, length = 26 {92, 125, 15, 247, 50, 58, 5, 184, 11, 182, 57, 252, 105, 8, 156, 212, 100, 243, 238, 186, 235, 226, 190, 120, 154, 82, 26, 51, 98, 107, 132, 131} Cipher Suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 Compression Method: 0 https-jsse-nio-8443-exec-4, WRITE: TLSv1.2 Handshake, length = 40 Using SSLEngineImpl. %% Cached server session: [Session-10, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384] Allow unsafe renegotiation: false Allow legacy hello messages: true Is initial handshake: true Is secure renegotiation: false Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1.1 Standard ciphersuite chosen: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 %% Negotiating: [Session-14, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384] *** ServerHello, TLSv1.2 RandomCookie: GMT: 1551699703 bytes = { 249, 106, 24, 48, 151, 27, 53, 192, 6, 37, 123, 97, 160, 198, 58, 140, 51, 36, 55, 26, 66, 142, 253, 24, 76, 152, 166, 217 } Session ID: {92, 125, 15, 247, 242, 122, 131, 156, 80, 117, 217, 241, 196, 233, 43, 6, 10, 175, 226, 239, 82, 201, 190, 246, 213, 22, 177, 21, 148, 39, 43, 131} Cipher Suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 Compression Method: 0 Extension renegotiation_info, renegotiated_connection: <empty> *** Cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 *** Certificate chain chain [0] = [ [ Version: V3 Subject: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5 Key: Sun RSA public key, 2048 bits modulus: 21944740401167172627731583459321030363948627215746053925732477915060915436180167456469785746662093119306577380200747716284652995937004530444336851845029170241627465854006145050037178991946925696078563485570896673835545540824265905937881682387179314987285174428010940266412458943894800978345731524307952507729956745301047871771953945124256516782917326981125087548987889540650149121302888872237484100834740328828765018090383963294418357028839734723410564800765871733483849269364796949055153420777966213779145518299141217288017794394762274753999989298548507425930217302947589819396239489846633419099079578249651345685751 public exponent: 65537 Validity: [From: Fri May 30 08:43:19 GMT 2014, To: Mon May 27 08:43:19 GMT 2024] Issuer: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US SerialNumber: [ a6ef7a9a 5368eb27] Certificate Extensions: 3 [1]: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: 78 0D 96 9D FE D3 0B BE 8C C7 E3 EC 67 04 AB 4B x...........g..K 0010: EA E0 00 29 ...) ] ] [2]: ObjectId: 2.5.29.19 Criticality=false BasicConstraints:[ CA:true PathLen:2147483647 ] [3]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 78 0D 96 9D FE D3 0B BE 8C C7 E3 EC 67 04 AB 4B x...........g..K 0010: EA E0 00 29 ...) ] ] ] Algorithm: [SHA1withRSA] Signature: 0000: 19 16 5A 21 99 21 24 98 3C 0A E8 D8 00 AB 44 24 ..Z!.!$.<.....D$ 0010: F2 0C B7 83 D5 9F 96 17 87 E2 1F 1D A3 47 68 C7 .............Gh. 0020: 68 4A CB 56 0E 77 2B E8 1A 9F E7 09 A1 19 77 D0 hJ.V.w+.......w. 0030: 5E CC C1 B3 9A C4 35 3D CB E0 A5 A6 43 5D A3 26 ^.....5=....C].& 0040: A4 91 8A C1 FA 7B 10 EA DC C3 C7 1C 47 DC 97 32 ............G..2 0050: C0 37 80 1C F1 42 10 E3 74 17 FA 3E 60 4A B7 59 .7...B..t..>`J.Y 0060: 92 C1 E0 6F BB F1 BB 9F 82 89 B5 83 D5 AE 1E 90 ...o............ 0070: 0A 89 8D FB 4C C0 C5 9E DC C5 8C C6 2F EE D9 B4 ....L......./... 0080: 95 47 27 2E BE 82 31 6F 76 C0 DB 4C C8 0D 3B 7B .G'...1ov..L..;. 0090: D1 6A BF BD 3B 93 30 04 A2 9E 81 F7 96 28 77 F2 .j..;.0......(w. 00A0: 32 05 68 44 1F B3 30 CE 40 9F 20 F3 B4 2B AA E6 2.hD..0.@. ..+.. 00B0: 40 9B FB 7F 34 6E 3A 99 FD F8 28 F1 8C 9B 56 34 @...4n:...(...V4 00C0: 64 AD 4D 56 39 CB 96 18 50 9B 99 43 80 0A 39 A5 d.MV9...P..C..9. 00D0: 13 7A 6E C5 25 E0 95 4A 92 E5 A8 8B EE 03 49 B4 .zn.%..J......I. 00E0: D9 7C 00 E3 F0 3B A7 BA 40 30 CC 89 55 C6 97 93 .....;..@0..U... 00F0: B5 15 F6 62 D3 B1 74 9C 0B 80 2B 8A D4 03 84 A0 ...b..t...+..... ] *** Extension renegotiation_info, renegotiated_connection: <empty> *** Cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 https-jsse-nio-8443-exec-9, RECV TLSv1.2 ALERT: warning, close_notify https-jsse-nio-8443-exec-9, closeInboundInternal() Extension renegotiation_info, renegotiated_connection: <empty> *** , Cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 https-jsse-nio-8443-exec-9, closeOutboundInternal() *** Certificate chain https-jsse-nio-8443-exec-8, WRITE: TLSv1.2 Application Data, length = 84 chain [0] = [ [ Version: V3 Subject: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5 Key: Sun RSA public key, 2048 bits modulus: 21944740401167172627731583459321030363948627215746053925732477915060915436180167456469785746662093119306577380200747716284652995937004530444336851845029170241627465854006145050037178991946925696078563485570896673835545540824265905937881682387179314987285174428010940266412458943894800978345731524307952507729956745301047871771953945124256516782917326981125087548987889540650149121302888872237484100834740328828765018090383963294418357028839734723410564800765871733483849269364796949055153420777966213779145518299141217288017794394762274753999989298548507425930217302947589819396239489846633419099079578249651345685751 public exponent: 65537 Validity: [From: Fri May 30 08:43:19 GMT 2014, To: Mon May 27 08:43:19 GMT 2024] Issuer: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US SerialNumber: [ a6ef7a9a 5368eb27] Certificate Extensions: 3 [1]: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: 78 0D 96 9D FE D3 0B BE 8C C7 E3 EC 67 04 AB 4B x...........g..K 0010: EA E0 00 29 ...) ] ] [2]: ObjectId: 2.5.29.19 Criticality=false BasicConstraints:[ CA:true PathLen:2147483647 ] [3]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 78 0D 96 9D FE D3 0B BE 8C C7 E3 EC 67 04 AB 4B x...........g..K 0010: EA E0 00 29 ...) ] ] ] Algorithm: [SHA1withRSA] Signature: 0000: 19 16 5A 21 99 21 24 98 3C 0A E8 D8 00 AB 44 24 ..Z!.!$.<.....D$ 0010: F2 0C B7 83 D5 9F 96 17 87 E2 1F 1D A3 47 68 C7 .............Gh. 0020: 68 4A CB 56 0E 77 2B E8 1A 9F E7 09 A1 19 77 D0 hJ.V.w+.......w. 0030: 5E CC C1 B3 9A C4 35 3D CB E0 A5 A6 43 5D A3 26 ^.....5=....C].& 0040: A4 91 8A C1 FA 7B 10 EA DC C3 C7 1C 47 DC 97 32 ............G..2 0050: C0 37 80 1C F1 42 10 E3 74 17 FA 3E 60 4A B7 59 .7...B..t..>`J.Y 0060: 92 C1 E0 6F BB F1 BB 9F 82 89 B5 83 D5 AE 1E 90 ...o............ 0070: 0A 89 8D FB 4C C0 C5 9E DC C5 8C C6 2F EE D9 B4 ....L......./... 0080: 95 47 27 2E BE 82 31 6F 76 C0 DB 4C C8 0D 3B 7B .G'...1ov..L..;. 0090: D1 6A BF BD 3B 93 30 04 A2 9E 81 F7 96 28 77 F2 .j..;.0......(w. 00A0: 32 05 68 44 1F B3 30 CE 40 9F 20 F3 B4 2B AA E6 2.hD..0.@. ..+.. 00B0: 40 9B FB 7F 34 6E 3A 99 FD F8 28 F1 8C 9B 56 34 @...4n:...(...V4 00C0: 64 AD 4D 56 39 CB 96 18 50 9B 99 43 80 0A 39 A5 d.MV9...P..C..9. 00D0: 13 7A 6E C5 25 E0 95 4A 92 E5 A8 8B EE 03 49 B4 .zn.%..J......I. 00E0: D9 7C 00 E3 F0 3B A7 BA 40 30 CC 89 55 C6 97 93 .....;..@0..U... 00F0: B5 15 F6 62 D3 B1 74 9C 0B 80 2B 8A D4 03 84 A0 ...b..t...+..... ] *** Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1.1 https-jsse-nio-8443-exec-8, READ: TLSv1.2 Alert, length = 26 *** Diffie-Hellman ServerKeyExchange DH Modulus: { 255, 255, 255, 255, 255, 255, 255, 255, 201, 15, 218, 162, 33, 104, 194, 52, 196, 198, 98, 139, 128, 220, 28, 209, 41, 2, 78, 8, 138, 103, 204, 116, 2, 11, 190, 166, 59, 19, 155, 34, 81, 74, 8, 121, 142, 52, 4, 221, 239, 149, 25, 179, 205, 58, 67, 27, 48, 43, 10, 109, 242, 95, 20, 55, 79, 225, 53, 109, 109, 81, 194, 69, 228, 133, 181, 118, 98, 94, 126, 198, 244, 76, 66, 233, 166, 55, 237, 107, 11, 255, 92, 182, 244, 6, 183, 237, 238, 56, 107, 251, 90, 137, 159, 165, 174, 159, 36, 17, 124, 75, 31, 230, 73, 40, 102, 81, 236, 230, 83, 129, 255, 255, Using SSLEngineImpl. Allow unsafe renegotiation: false Allow legacy hello messages: true Is initial handshake: true Is secure renegotiation: false Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1.1 https-jsse-nio-8443-exec-4, READ: TLSv1 Handshake, length = 512 *** ClientHello, TLSv1.2 RandomCookie: GMT: 643821250 bytes = { 137, 48, 182, 80, 80, 34, 131, 177, 184, 128, 9, 127, 211, 99, 150, 129, 92, 69, 3, 172, 96, 191, 219, 200, 115, 25, 212, 35 } Session ID: {92, 125, 15, 247, 246, 249, 211, 141, 164, 158, 249, 105, 184, 211, 34, 29, 135, 131, 232, 36, 64, 192, 38, 174, 54, 83, 112, 53, 142, 111, 182, 94} Cipher Suites: [Unknown 0x13:0x2, Unknown 0x13:0x3, Unknown 0x13:0x1, Unknown 0x13:0x4, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa9, Unknown 0xc0:0xad, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0xac, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa8, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xc0:0x9d, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9c, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xaa, Unknown 0xc0:0x9f, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9e, TLS_DHE_RSA_WITH_AES_128_CBC_SHA] Compression Methods: { 0 } Unsupported extension status_request, data: 01:00:00:00:00 Extension elliptic_curves, curve names: {secp256r1, secp384r1, secp521r1, unknown curve 29, unknown curve 256, unknown curve 257, unknown curve 258, unknown curve 259, unknown curve 260} Extension ec_point_formats, formats: [uncompressed] Extension signature_algorithms, signature_algorithms: SHA256withRSA, Unknown (hash:0x8, signature:0x9), Unknown (hash:0x8, signature:0x4), SHA256withECDSA, Unknown (hash:0x8, signature:0x7), SHA384withRSA, Unknown (hash:0x8, signature:0xa), Unknown (hash:0x8, signature:0x5), SHA384withECDSA, SHA512withRSA, Unknown (hash:0x8, signature:0xb), Unknown (hash:0x8, signature:0x6), SHA512withECDSA, SHA1withRSA, SHA1withECDSA Unsupported extension type_35, data: Unsupported extension type_51, data: 00:69:00:17:00:41:04:78:2b:24:a2:10:62:da:65:7e:7f:87:75:d2:71:65:9b:df:5a:cc:85:8a:dd:8f:da:79:7d:22:ec:77:68:7e:b8:ac:e1:a7:b8:49:c7:09:e1:c9:45:bf:0b:31:62:e8:f6:4d:a9:9a:26:ab:fd:ec:b9:cf:f9:9a:98:fc:6a:05:f3:00:1d:00:20:2f:22:42:1e:67:89:6e:49:6a:48:64:f2:8e:92:11:05:92:e5:7d:8d:85:c7:b0:1f:96:3d:14:aa:8e:b8:74:08 Unsupported extension type_43, data: 08:03:04:03:03:03:02:03:01 Extension renegotiation_info, renegotiated_connection: <empty> Extension server_name, server_name: [type=host_name (0), value=localhost] Unsupported extension type_45, data: 02:01:00 Unsupported extension type_28, data: 40:00 Unsupported extension type_21, data: 00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00 *** *** Diffie-Hellman ServerKeyExchange https-jsse-nio-8443-exec-9, SEND TLSv1.2 ALERT: warning, description = close_notify *** Certificate chain https-jsse-nio-8443-exec-9, WRITE: TLSv1.2 Alert, length = 26 https-jsse-nio-8443-exec-9, called closeOutbound() https-jsse-nio-8443-exec-9, closeOutboundInternal() chain [0] = [ [ Version: V3 Subject: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5 Key: Sun RSA public key, 2048 bits modulus: 21944740401167172627731583459321030363948627215746053925732477915060915436180167456469785746662093119306577380200747716284652995937004530444336851845029170241627465854006145050037178991946925696078563485570896673835545540824265905937881682387179314987285174428010940266412458943894800978345731524307952507729956745301047871771953945124256516782917326981125087548987889540650149121302888872237484100834740328828765018090383963294418357028839734723410564800765871733483849269364796949055153420777966213779145518299141217288017794394762274753999989298548507425930217302947589819396239489846633419099079578249651345685751 public exponent: 65537 Validity: [From: Fri May 30 08:43:19 GMT 2014, To: Mon May 27 08:43:19 GMT 2024] Issuer: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US SerialNumber: [ a6ef7a9a 5368eb27] Certificate Extensions: 3 [1]: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: 78 0D 96 9D FE D3 0B BE 8C C7 E3 EC 67 04 AB 4B x...........g..K 0010: EA E0 00 29 ...) ] ] [2]: ObjectId: 2.5.29.19 Criticality=false BasicConstraints:[ CA:true PathLen:2147483647 ] [3]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 78 0D 96 9D FE D3 0B BE 8C C7 E3 EC 67 04 AB 4B x...........g..K 0010: EA E0 00 29 ...) ] ] ] Algorithm: [SHA1withRSA] Signature: 0000: 19 16 5A 21 99 21 24 98 3C 0A E8 D8 00 AB 44 24 ..Z!.!$.<.....D$ 0010: F2 0C B7 83 D5 9F 96 17 87 E2 1F 1D A3 47 68 C7 .............Gh. 0020: 68 4A CB 56 0E 77 2B E8 1A 9F E7 09 A1 19 77 D0 hJ.V.w+.......w. 0030: 5E CC C1 B3 9A C4 35 3D CB E0 A5 A6 43 5D A3 26 ^.....5=....C].& 0040: A4 91 8A C1 FA 7B 10 EA DC C3 C7 1C 47 DC 97 32 ............G..2 0050: C0 37 80 1C F1 42 10 E3 74 17 FA 3E 60 4A B7 59 .7...B..t..>`J.Y 0060: 92 C1 E0 6F BB F1 BB 9F 82 89 B5 83 D5 AE 1E 90 ...o............ 0070: 0A 89 8D FB 4C C0 C5 9E DC C5 8C C6 2F EE D9 B4 ....L......./... 0080: 95 47 27 2E BE 82 31 6F 76 C0 DB 4C C8 0D 3B 7B .G'...1ov..L..;. 0090: D1 6A BF BD 3B 93 30 04 A2 9E 81 F7 96 28 77 F2 .j..;.0......(w. 00A0: 32 05 68 44 1F B3 30 CE 40 9F 20 F3 B4 2B AA E6 2.hD..0.@. ..+.. 00B0: 40 9B FB 7F 34 6E 3A 99 FD F8 28 F1 8C 9B 56 34 @...4n:...(...V4 00C0: 64 AD 4D 56 39 CB 96 18 50 9B 99 43 80 0A 39 A5 d.MV9...P..C..9. 00D0: 13 7A 6E C5 25 E0 95 4A 92 E5 A8 8B EE 03 49 B4 .zn.%..J......I. 00E0: D9 7C 00 E3 F0 3B A7 BA 40 30 CC 89 55 C6 97 93 .....;..@0..U... 00F0: B5 15 F6 62 D3 B1 74 9C 0B 80 2B 8A D4 03 84 A0 ...b..t...+..... ] *** 75, %% Initialized: [Session-15, SSL_NULL_WITH_NULL_NULL] DH Modulus: { 255, 255, 255, 255, 255, 255 } https-jsse-nio-8443-exec-8, RECV TLSv1.2 ALERT: warning, close_notify https-jsse-nio-8443-exec-8, closeInboundInternal() https-jsse-nio-8443-exec-8, closeOutboundInternal() https-jsse-nio-8443-exec-8, SEND TLSv1.2 ALERT: warning, description = close_notify https-jsse-nio-8443-exec-8, WRITE: TLSv1.2 Alert, length = 26 https-jsse-nio-8443-exec-8, called closeOutbound() https-jsse-nio-8443-exec-8, closeOutboundInternal() Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1 255DH Base: { 2 } Server DH Public Key: { 177, 46, 218, 230, 151, 33, 161, 94, 214, 180, 215, 165, 151, 60, 134, 118, 72, 235, 168, 110, 64, 81, 143, 166, 12, 246, 101, 54, 179, 48, 30, 25, 217, 6, 0, 82, 255, 156, 50, 42, 163, 245, 129, 17, 24, 191, 111, 135, 130, 39, 111, 76, 27, 43, 199, 194, 122, 223, 144, 110, 178, 79, 101, 109, 51, 158, 60, 219, 86, 104, 87, 22, 16, 145, 98, 213, 41, 162, 41, 194, 85, 251, 46, 21, 164, 92, 82, 43, 64, 134, 22, 167, 216, 227, 36, 230, 90, 31, 150, 223, 17, 125, 194, 16, 229, 56, 37, 71, 180, 75, 67, 107, 4, 154, 250, 220, 233, 74, 138, 181, 207, 206, 65, 73, 71, 142, 1, 225 } Signature Algorithm SHA256withRSA Signed with a DSA or RSA public key *** ServerHelloDone https-jsse-nio-8443-exec-6, WRITE: TLSv1.2 Handshake, length = 1697 Standard ciphersuite chosen: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 %% Negotiating: [Session-15, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384] *** ServerHello, TLSv1.2 RandomCookie: GMT: 1551699703 bytes = { 198, 11, 117, 179, 159, 93, 48, 227, 13, 155, 36, 80, 90, 158, 84, 220, 89, 20, 35, 144, 216, 180, 203, 23, 217, 172, 24, 58 } Session ID: {92, 125, 15, 247, 11, 132, 70, 127, 210, 91, 74, 138, 226, 252, 111, 170, 226, 8, 142, 158, 184, 98, 97, 19, 34, 33, 55, 248, 219, 15, 65, 161} Cipher Suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 Compression Method: 0 Extension renegotiation_info, renegotiated_connection: <empty> *** Cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 *** Certificate chain 196, 187, 73, 78, 45, 31, 224, 64, 65, 236, 30, 143, 125, 66, 234 } Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1.1 https-jsse-nio-8443-exec-6, READ: TLSv1.2 Handshake, length = 134 *** ClientKeyExchange, DH DH Public key: { 157, 154, 50, 120, 59, 112, 151, 246, 118, 246, 99, 60, 208, 120, 179, 160, 184, 247, 26, 167, 185, 205, 106, 238, 241, 71, 3, 69, 147, 4, 120, 153, 192, 24, 173, 137, 235, 161, 187, 124, 156, 85, 177, 114, 253, 240, 126, 107, 95, 2, 136, 50, 197, 247, 97, 81, 79, 54, 32, 43, 112, 132, 176, 192, 158, 187, 122, 171, 118, 218, 96, 214, 148, 234, 43, 164, 105, 71, 136, 215, 29, 80, 246, 123, 214, 203, 34, 98, 141, 91, 100, 11, 130, 114, 53, 116, 176, 188, 130, 120, 144, 12, 227, 168, 217, 19, 252, 132, 217, 104, 81, 169, 205, 73, 108, 87, 232, 158, 7, 239, 184, 156, 165, 71, 209, 54, 191, 82 } chain [0] = [ [ Version: V3 Subject: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5 Key: Sun RSA public key, 2048 bits modulus: 21944740401167172627731583459321030363948627215746053925732477915060915436180167456469785746662093119306577380200747716284652995937004530444336851845029170241627465854006145050037178991946925696078563485570896673835545540824265905937881682387179314987285174428010940266412458943894800978345731524307952507729956745301047871771953945124256516782917326981125087548987889540650149121302888872237484100834740328828765018090383963294418357028839734723410564800765871733483849269364796949055153420777966213779145518299141217288017794394762274753999989298548507425930217302947589819396239489846633419099079578249651345685751 public exponent: 65537 Validity: [From: Fri May 30 08:43:19 GMT 2014, To: Mon May 27 08:43:19 GMT 2024] Issuer: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US SerialNumber: [ a6ef7a9a 5368eb27] Certificate Extensions: 3 [1]: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: 78 0D 96 9D FE D3 0B BE 8C C7 E3 EC 67 04 AB 4B x...........g..K 0010: EA E0 00 29 ...) ] ] [2]: ObjectId: 2.5.29.19 Criticality=false BasicConstraints:[ CA:true PathLen:2147483647 ] [3]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 78 0D 96 9D FE D3 0B BE 8C C7 E3 EC 67 04 AB 4B x...........g..K 0010: EA E0 00 29 ...) ] ] ] Algorithm: [SHA1withRSA] Signature: 0000: 19 16 5A 21 99 21 24 98 3C 0A E8 D8 00 AB 44 24 ..Z!.!$.<.....D$ 0010: F2 0C B7 83 D5 9F 96 17 87 E2 1F 1D A3 47 68 C7 .............Gh. 0020: 68 4A CB 56 0E 77 2B E8 1A 9F E7 09 A1 19 77 D0 hJ.V.w+.......w. 0030: 5E CC C1 B3 9A C4 35 3D CB E0 A5 A6 43 5D A3 26 ^.....5=....C].& 0040: A4 91 8A C1 FA 7B 10 EA DC C3 C7 1C 47 DC 97 32 ............G..2 0050: C0 37 80 1C F1 42 10 E3 74 17 FA 3E 60 4A B7 59 .7...B..t..>`J.Y 0060: 92 C1 E0 6F BB F1 BB 9F 82 89 B5 83 D5 AE 1E 90 ...o............ 0070: 0A 89 8D FB 4C C0 C5 9E DC C5 8C C6 2F EE D9 B4 ....L......./... 0080: 95 47 27 2E BE 82 31 6F 76 C0 DB 4C C8 0D 3B 7B .G'...1ov..L..;. 0090: D1 6A BF BD 3B 93 30 04 A2 9E 81 F7 96 28 77 F2 .j..;.0......(w. 00A0: 32 05 68 44 1F B3 30 CE 40 9F 20 F3 B4 2B AA E6 2.hD..0.@. ..+.. 00B0: 40 9B FB 7F 34 6E 3A 99 FD F8 28 F1 8C 9B 56 34 @...4n:...(...V4 00C0: 64 AD 4D 56 39 CB 96 18 50 9B 99 43 80 0A 39 A5 d.MV9...P..C..9. 00D0: 13 7A 6E C5 25 E0 95 4A 92 E5 A8 8B EE 03 49 B4 .zn.%..J......I. 00E0: D9 7C 00 E3 F0 3B A7 BA 40 30 CC 89 55 C6 97 93 .....;..@0..U... 00F0: B5 15 F6 62 D3 B1 74 9C 0B 80 2B 8A D4 03 84 A0 ...b..t...+..... ] *** SESSION KEYGEN: PreMaster Secret: 0000: 4C 4C 7D 36 B9 C2 EA 5B 14 A6 33 34 1D 0B E1 4C LL.6...[..34...L 0010: FF 80 50 41 86 7E 0E 53 C8 DD F0 E5 78 2A FC A7 ..PA...S....x*.. 0020: A5 57 35 26 9C C6 DC 32 0A 9F F0 67 B2 E2 97 B6 .W5&...2...g.... 0030: 91 1D BD C5 F7 D1 BD 87 59 AD 5A C6 6F C1 86 93 ........Y.Z.o... 0040: 56 CD E9 09 C2 F1 4B 7D 00 78 FA C0 BF D8 53 44 V.....K..x....SD 0050: E8 BF 14 5A AA 28 59 B6 8B 2A DC 92 ED 16 47 B4 ...Z.(Y..*....G. 0060: BD 3C 66 98 F8 86 61 AB 3B 2C 02 DE FE 0D CB 53 .<f...a.;,.....S 0070: 6D A1 F4 88 82 73 C8 F7 98 CC 42 4A 87 6F 9B DB m....s....BJ.o.. CONNECTION KEYGEN: Client Nonce: 0000: 86 AC A9 EC 72 70 55 A6 D6 DD EC 7B B8 70 86 17 ....rpU......p.. 0010: E4 22 C9 39 82 B7 FC 35 98 11 BA A6 02 FF 47 60 .".9...5......G` Server Nonce: 0000: 5C 7D 0F F7 F9 6A 18 30 97 1B 35 C0 06 25 7B 61 \....j.0..5..%.a 0010: A0 C6 3A 8C 33 24 37 1A 42 8E FD 18 4C 98 A6 D9 ..:.3$7.B...L... Master Secret: 0000: D2 6F 9C 6A E2 98 C7 AC E1 36 49 74 D3 74 72 20 .o.j.....6It.tr 0010: 25 16 88 E3 C0 12 14 B0 66 17 52 9A 94 3B 1E AE %.......f.R..;.. 0020: DD 7E 78 F7 1C 21 74 67 65 7C 55 09 12 54 65 36 ..x..!tge.U..Te6 ... no MAC keys used for this cipher Client write key: 0000: F8 CA 67 96 B0 33 B9 F6 3E EE D8 29 8A 18 70 25 ..g..3..>..)..p% 0010: B0 C2 22 05 1E A2 CC C6 9F 92 62 C9 DB D8 AB 46 ..".......b....F Server write key: 0000: 6F FA 2F 76 B0 CE 3D 38 8B 8C 53 48 3E 16 63 49 o./v..=8..SH>.cI 0010: 29 ED B7 D0 85 DD C8 3B 11 19 71 29 BC 2F C0 43 )......;..q)./.C Client write IV: 0000: 90 75 CF 92 .u.. Server write IV: 0000: C3 17 23 D2 ..#. https-jsse-nio-8443-exec-6, READ: TLSv1.2 Change Cipher Spec, length = 1 https-jsse-nio-8443-exec-6, READ: TLSv1.2 Handshake, length = 40 *** Finished verify_data: { 125, 229, 83, 206, 118, 221, 127, 176, 77, 43, 74, 250 } *** https-jsse-nio-8443-exec-6, WRITE: TLSv1.2 Change Cipher Spec, length = 1 *** Finished verify_data: { 220, 32, 94, 37, 86, 154, 92, 9, 15, 195, 183, 59 } *** Signature Algorithm SHA256withRSA Signed with a DSA or RSA public key *** ServerHelloDone *** Diffie-Hellman ServerKeyExchange DH Modulus: { 255, 255, 255, 255, 255, 255, 255, 255, 201, 15, 218, 162, 33, 104, 194, 52, 196, 198, 98, 139, 128, 220, 28, 209, 41, 2, 78, 8, 138, 103, 204, 116, 2, 11, 190, 166, 59, 19, 155, 34, 81, 74, 8, 121, 142, 52, 4, 221, 239, 149, 25, 179, 205, 58, 67, 27, 48, 43, 10, 109, 242, 95, 20, 55, 79, 225, 53, 109, 109, 81, 194, , 255, 255, 255, 255, 255, 255, 255, 201, *** Diffie-Hellman ServerKeyExchange 15DH Modulus: { 255, 255, 255, 255, 255, 255, 255, 255, 201, 15, 218, 162, 33, 104, 194, 52, 196, 198, 98, 139, 128, 220, 28, 209, 41, 2, 78, 8, 138, 103, 204, 116, 2, 11, 190, 166, 59, 19, 155, 34, 81, 74, 8, 121, 142, 52, 4, 221, 239, 149, 25, 179, 205, 58, 67, 27, 48, 43, 10, 109, 242, 95, 20, 55, 79, 225, 53, 109, 109, 81, 194, 69, 228, 133, 181, 118, 98, 94, 126, 198, 244, 76, 66, 233, 166, 55, 237, 107, 11, 255, 92, 182, 244, 6, 183, 237, 238, 56, 107, 251, 90, 137, 159, 165, 174, 159, 36, 17, 124, 75, 31, 230, 73, 40, 102, 81, 236, 230, 83, 129, 255, 255, 255, 255, 255, 255, 255, 255 } https-jsse-nio-8443-exec-6, WRITE: TLSv1.2 Handshake, length = 40 69, 228, 133, 181, 118, 98, 94, 126, 198, 244, 76, 66, 233, 166, 55, 237, 107, 11, 255, 92, 182, 244, 6, 183, 237, 238, 56, 107, 251, 90, 137, 159, 165, 174, 159, 36, 17, 124, 75, 31, 230, 73, 40, 102, 81, 236, 230, 83, 129, 255, 255, 255, 255, 255, 255, 255, 255 } https-jsse-nio-8443-exec-1, WRITE: TLSv1.2 Handshake, length = 1697 https-jsse-nio-8443-exec-7, READ: TLSv1 Handshake, length = 512 DH Base: { 2 } Server DH Public Key: { 193, 96, 176, 222, 230, 37, 252, 19, 5, 43, 101, 80, 70, 102, 130, 118, 131, 152, 32, 57, 29, 115, 181, 106, 56, 103, 229, 196, 134, 219, 63, 212, 96, 179, 36, 86, 213, 90, 81, 245, 4, 58, 100, 54, 84, 210, 191, 183, 116, 242, 80, 67, 50, 253, 211, 91, 173, 143, 212, 82, 195, 58, 108, 142, 94, 192, 231, 124, 87, 50, 145, 248, 23, 86, 64, 46, 122, 103, 165, 81, 62, 140, 56, 244, 41, 224, 250, 39, 64, 223, 7, 39, 34, 56, 204, 44, 1, 248, 68, 126, 121, 77, 81, 20, 78, 26, 74, 211, 31, 115, 33, 196, 185, 198, 143, 159, 34, 7, 162, 30, 165, 75, 115, 173, 30, 23, 147, 152 } Signature Algorithm SHA256withRSA Signed with a DSA or RSA public key *** ServerHelloDone https-jsse-nio-8443-exec-4, WRITE: TLSv1.2 Handshake, length = 1697 %% Cached server session: [Session-14, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384] DH Base: { 2 } Server DH Public Key: { 70, 38, 125, 98, 236, 23, 27, 22, 194, 211, 229, 253, 113, 86, 193, 213, 189, 160, 201, 194, 165, 143, 35, 222, 55, 108, 224, 113, 136, 247, 119, 255, 38, 167, 5, 67, 240, 61, 189, 136, 208, 229, 118, 220, 251, 141, 36, 156, 74, 98, 117, 235, 180, 84, 153, 139, 114, 161, 108, 133, 123, 63, 193, 121, 68, 167, 18, 183, 79, 252, 161, 177, 41, 85, 193, 92, 167, 191, 42, 54, 87, 60, 213, 143, 93, 116, 122, 227, 157, 37, 40, 44, 135, 232, 156, 208, 179, 219, 176, 42, 238, 51, 230, 16, 155, 11, 223, 98, 92, 102, 24, 13, 252, 30, 137, 81, 233, 185, 167, 116, 70, 131, 130, 117, 144, 239, 35, 50 } Signature Algorithm SHA256withRSA Signed with a DSA or RSA public key *** ServerHelloDone , 218, 162, 33, 104, 194, 52, 196, 198, 98, 139, 128, 220, 28, 209, 41, 2, 78, 8, 138, 103, 204, 116, 2, 11, 190, 166, 59, 19, 155, 34, 81, 74, 8, 121, 142, 52, 4, 221, 239, 149, 25, 179, 205, 58, 67, 27, 48, 43, 10, 109, 242, 95, 20, 55, 79, 225, 53, 109, 109, 81, 194, 69, 228, 133, 181, 118, 98, 94, 126, 198, 244, 76, 66, 233, 166, 55, 237, 107, 11, 255, 92, 182, 244, 6, 183, 237, 238, 56, 107, 251, 90, 137, 159, 165, 174, 159, 36, 17, 124, 75, 31, 230, 73, 40, 102, 81, 236, 230, 83, 129, 255, 255, 255, 255, 255, 255, 255, 255 } DH Base: { 2 } Server DH Public Key: { 217, 93, 254, 238, 74, 68, 192, 30, 45, 154, 168, 126, 223, 188, 188, 211, 23, 82, 229, 4, 203, 84, 246, 79, 209, 112, 187, 23, 136, 40, 120, 87, 228, 233, 170, 48, 169, 12, 71, 25, 8, 194, 208, 158, 244, 169, 96, 249, 26, 146, 81, 65, 55, 117, 56, 39, 217, 149, 79, 35, 120, 140, 70, 159, 60, 191, 88, 188, 142, 205, 168, 124, 168, 227, 63, 194, 245, 114, 199, 28, 96, 77, 92, 216, 122, 186, 226, 142, 45, 235, 188, 201, 127, 22, 123, 9, 77, 251, 179, 139, 197, 105, 182, 47, 237, 45, 167, 34, 245, 143, 156, 101, 223, 218, 239, 63, 147, 168, 245, 151, 61, 224, 1, 76, 140, 51, 14, 10 } Signature Algorithm SHA256withRSA Signed with a DSA or RSA public key *** ServerHelloDone https-jsse-nio-8443-exec-3, WRITE: TLSv1.2 Handshake, length = 1697 https-jsse-nio-8443-exec-5, WRITE: TLSv1.2 Handshake, length = 1697 https-jsse-nio-8443-exec-10, READ: TLSv1.2 Handshake, length = 134 *** ClientHello, TLSv1.2 RandomCookie: GMT: -706604215 bytes = { 196, 111, 179, 208, 244, 129, 162, 107, 156, 95, 201, 27, 64, 190, 101, 179, 175, 152, 138, 37, 220, 22, 85, 26, 42, 30, 238, 85 } Session ID: {92, 125, 15, 237, 254, 33, 2, 52, 144, 148, 0, 165, 156, 232, 106, 139, 222, 199, 99, 71, 41, 230, 1, 75, 246, 145, 175, 22, 191, 231, 28, 218} Cipher Suites: [Unknown 0x13:0x2, Unknown 0x13:0x3, Unknown 0x13:0x1, Unknown 0x13:0x4, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa9, Unknown 0xc0:0xad, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0xac, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa8, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xc0:0x9d, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9c, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xaa, Unknown 0xc0:0x9f, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9e, TLS_DHE_RSA_WITH_AES_128_CBC_SHA] Compression Methods: { 0 } Unsupported extension status_request, data: 01:00:00:00:00 Extension elliptic_curves, curve names: {secp256r1, secp384r1, secp521r1, unknown curve 29, unknown curve 256, unknown curve 257, unknown curve 258, unknown curve 259, unknown curve 260} Extension ec_point_formats, formats: [uncompressed] Extension signature_algorithms, signature_algorithms: SHA256withRSA, Unknown (hash:0x8, signature:0x9), Unknown (hash:0x8, signature:0x4), SHA256withECDSA, Unknown (hash:0x8, signature:0x7), SHA384withRSA, Unknown (hash:0x8, signature:0xa), Unknown (hash:0x8, signature:0x5), SHA384withECDSA, SHA512withRSA, Unknown (hash:0x8, signature:0xb), Unknown (hash:0x8, signature:0x6), SHA512withECDSA, SHA1withRSA, SHA1withECDSA Unsupported extension type_35, data: Unsupported extension type_51, data: 00:69:00:17:00:41:04:ae:26:0e:77:5f:28:ef:c6:07:56:58:e5:86:ad:d2:a9:7f:36:c0:10:9f:b4:2e:3f:6e:38:42:1b:99:da:08:de:71:5e:f8:f6:73:40:34:82:e5:bf:d6:e0:88:5c:5e:76:8d:ac:e8:10:44:c4:a6:31:61:e2:c0:4e:11:a1:c5:d0:00:1d:00:20:ad:5a:7b:16:64:36:ac:fe:0c:1b:a3:66:f3:1c:c5:d6:5c:6d:6d:bf:9e:fd:dd:ba:f2:4a:92:ba:75:36:65:74 Unsupported extension type_43, data: 08:03:04:03:03:03:02:03:01 Extension renegotiation_info, renegotiated_connection: <empty> Extension server_name, server_name: [type=host_name (0), value=localhost] Unsupported extension type_45, data: 02:01:00 Unsupported extension type_28, data: 40:00 Unsupported extension type_21, data: 00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00 *** %% Initialized: [Session-16, SSL_NULL_WITH_NULL_NULL] https-jsse-nio-8443-exec-8, WRITE: TLSv1.2 Application Data, length = 85 https-jsse-nio-8443-exec-9, READ: TLSv1.2 Handshake, length = 134 *** ClientKeyExchange, DH DH Public key: { 208, 16, 173, 145, 228, 230, 22, 149, 101, 4, 218, 106, 213, 64, 141, 224, 237, 45, Using SSLEngineImpl. *** ClientKeyExchange, DH DH Public key: { 99, 58, 152, 205, 251, 195, 178, 244, 230, 142, 181, 100, Allow unsafe renegotiation: false Allow legacy hello messages: true Is initial handshake: true Is secure renegotiation: false 230, 59, 209, 239, 243, 185, 102, 26, 219, 196, 138, 199, 133, 254, 120, 180, 224, 146, 217, 28, 95, 47, 121, 59, 237, 106, 196, 19, 32, 21, 113, 7, 28, 103, 73, 44, 17, 94, 26, 178, 114, 38, 165, 180, 9, 253, 81, 99, 47, 217, 91, 119, 129, 125, 254, 52, 168, 237, 176, 114, 0, 68, 154, 65, 203, 28, 126, 159, 65, 219, 89, 221, 151, 28, 139, 170, 226, 143, 68, 144, 227, 36, 128, 163, 135, 170, 75, 162, 118, 92, 64, 19, 110, 18, 0, 143, 66, 67, 214, 64, 42, 63, 128, 101, 101, 77, 217, 92, 2, 213 } Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1 Standard ciphersuite chosen: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 212%% Negotiating: [Session-16, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384] Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1 https-jsse-nio-8443-exec-4, READ: TLSv1.2 Handshake, length = 134 *** ServerHello, TLSv1.2 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1.1 SESSION KEYGEN: PreMaster Secret: https-jsse-nio-8443-exec-6, READ: TLSv1.2 Alert, length = 26 https-jsse-nio-8443-exec-1, READ: TLSv1.2 Handshake, length = 134 *** ClientKeyExchange, DH DH Public key: { 232, 46, 72, 12, 170, 19, 61, 133, 121, *** ClientKeyExchange, DH DH Public key: { 46, 120, 54, 246, 196, 238, 228, 47, 229, 9, 234, 188, 11, 239, 188, 145, 201, 234, 51, 171, 155, 114, 4, 32, 33, 69, 173, 180, 48, 249, 215, 103, 201, 25, 255, 111, 63, 186, 171, 93, 189, 90, 205, 116, 250, 209, 241, 73, 248, 242, 181, 212, 226, 145, 106, 177, 237, 6, 75, 84, 106, 80, 102, 129, 255, 218, 214, 213, 197, 24, 39, 230, 144, 155, 67, 117, 220, 21, 92, 132, 111, 212, 218, 30, 61, 255, 73, 221, 128, 47, 22, 85, 198, 87, 66, 26, 120, 78, 219, 126, 170, 178, 8, 31, 234, 38, 129, 100, 174, 169, 5, 243, 106, 83, 242, 189, 210, 10, 192, 16, 130, 214, 131, 104, 204, 204, 6, 65 } SESSION KEYGEN: PreMaster Secret: 0000: 59 6D C0 DA 06 E0 FD 3D C8 44 C9 73 91 B6 39 3C Ym.....=.D.s..9< 0010: 41 72 7B 70 F4 3B D7 FE 9C 8F F7 F5 64 56 A4 BD Ar.p.;......dV.. 0020: BB 3E 1F B5 D3 91 5F E6 E1 04 CB 6A 40 46 B4 91 .>...._....j@F.. 0030: 95 D7 0C D9 6B DC EC DD BA FD D8 A2 06 E5 2E 12 ....k........... 0040: 7C 47 5A 01 75 BC E5 2E AC 2F 78 CA CE 0A E5 40 .GZ.u..../x....@ 0050: 8A 17 97 19 52 B2 46 A2 1A D3 0D 02 D2 35 59 C1 ....R.F......5Y. 0060: E6 38 C0 EF DC 67 5C EE 50 B3 34 23 AD 96 4F C3 .8...g\.P.4#..O. 0070: CC 69 A1 04 FE 96 FF 22 E7 86 BB A3 A5 D2 74 32 .i....."......t2 CONNECTION KEYGEN: Client Nonce: 0000: 93 7D 31 C2 40 06 63 D3 74 AD 6C E2 FD 95 31 EB ..1.@.c.t.l...1. 0010: C8 9C 77 E2 5C 7C 45 DA D6 69 44 25 97 F3 78 29 ..w.\.E..iD%..x) Server Nonce: 0000: 5C 7D 0F F7 FC AA D3 4F 0B E4 54 41 0F 53 51 DD \......O..TA.SQ. 0010: C8 75 59 BA E9 77 5A B9 6A 23 B9 62 1C FA 58 F9 .uY..wZ.j#.b..X. Master Secret: 0000: ED D0 E5 18 AE 36 25 39 46 BA 4B C3 EA 22 8E B5 .....6%9F.K..".. 0010: 40 19 5C 46 93 C1 F4 90 3E 66 2F 86 D9 4A F4 CD @.\F....>f/..J.. 0020: A6 0A 77 DA 9A 30 37 FA 68 00 0F CA E7 AE 6F C0 ..w..07.h.....o. ... no MAC keys used for this cipher Client write key: 0000: 91 A4 F4 23 6D 8C 87 45 A4 09 04 67 0D 20 AA E2 ...#m..E...g. .. 0010: 7C EE 48 CB 6E 0C F1 E3 6C B0 0F 72 4B C1 B8 04 ..H.n...l..rK... Server write key: 0000: 0A 3D A5 C5 7D F8 54 B2 DC 99 8B 7D A5 95 05 74 .=....T........t 0010: DF C6 50 34 F3 2F 0B A7 CC 2A EA 00 C8 79 0C 5F ..P4./...*...y._ Client write IV: 0000: 62 96 EB 08 b... Server write IV: 0000: 58 D8 ED CD X... 0000: Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1 RandomCookie: GMT: 1551699704 bytes = { 240, https-jsse-nio-8443-exec-1, READ: TLSv1.2 Change Cipher Spec, length = 1 , 66, 5, 10, 121, 136, 226, 41, 170, 37, 114, 13, 145, 74, 43, 3, 99, 230, 46, 204, 127, 48, 116, 134, 47, 96, 75, 77 } Session ID: {92, 125, 15, 248, 20, 0, 210, 78, 109, 221, 37, 254, 86, 107, 83, 134, 247, 144, 23, 57, 215, 100, 31, 197, 211, 245, 87, 100, 146, 61, 193, 176} Cipher Suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 Compression Method: 0 Extension renegotiation_info, renegotiated_connection: <empty> *** Cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 *** Certificate chain chain [0] = [ [ Version: V3 Subject: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5 Key: Sun RSA public key, 2048 bits modulus: 21944740401167172627731583459321030363948627215746053925732477915060915436180167456469785746662093119306577380200747716284652995937004530444336851845029170241627465854006145050037178991946925696078563485570896673835545540824265905937881682387179314987285174428010940266412458943894800978345731524307952507729956745301047871771953945124256516782917326981125087548987889540650149121302888872237484100834740328828765018090383963294418357028839734723410564800765871733483849269364796949055153420777966213779145518299141217288017794394762274753999989298548507425930217302947589819396239489846633419099079578249651345685751 public exponent: 65537 Validity: [From: Fri May 30 08:43:19 GMT 2014, To: Mon May 27 08:43:19 GMT 2024] Issuer: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US SerialNumber: [ a6ef7a9a 5368eb27] Certificate Extensions: 3 [1]: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: 78 0D 96 9D FE D3 0B BE 8C C7 E3 EC 67 04 AB 4B x...........g..K 0010: EA E0 00 29 ...) ] ] [2]: ObjectId: 2.5.29.19 Criticality=false BasicConstraints:[ CA:true PathLen:2147483647 ] [3]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 78 0D 96 9D FE D3 0B BE 8C C7 E3 EC 67 04 AB 4B x...........g..K 0010: EA E0 00 29 ...) ] ] ] Algorithm: [SHA1withRSA] Signature: 0000: 19 16 5A 21 99 21 24 98 3C 0A E8 D8 00 AB 44 24 ..Z!.!$.<.....D$ 0010: F2 0C B7 83 D5 9F 96 17 87 E2 1F 1D A3 47 68 C7 .............Gh. 0020: 68 4A CB 56 0E 77 2B E8 1A 9F E7 09 A1 19 77 D0 hJ.V.w+.......w. 0030: 5E CC C1 B3 9A C4 35 3D CB E0 A5 A6 43 5D A3 26 ^.....5=....C].& 0040: A4 91 8A C1 FA 7B 10 EA DC C3 C7 1C 47 DC 97 32 ............G..2 0050: C0 37 80 1C F1 42 10 E3 74 17 FA 3E 60 4A B7 59 .7...B..t..>`J.Y 0060: 92 C1 E0 6F BB F1 BB 9F 82 89 B5 83 D5 AE 1E 90 ...o............ 0070: 0A 89 8D FB 4C C0 C5 9E DC C5 8C C6 2F EE D9 B4 ....L......./... 0080: 95 47 27 2E BE 82 31 6F 76 C0 DB 4C C8 0D 3B 7B .G'...1ov..L..;. 0090: D1 6A BF BD 3B 93 30 04 A2 9E 81 F7 96 28 77 F2 .j..;.0......(w. 00A0: 32 05 68 44 1F B3 30 CE 40 9F 20 F3 B4 2B AA E6 2.hD..0.@. ..+.. 00B0: 40 9B FB 7F 34 6E 3A 99 FD F8 28 F1 8C 9B 56 34 @...4n:...(...V4 00C0: 64 AD 4D 56 39 CB 96 18 50 9B 99 43 80 0A 39 A5 d.MV9...P..C..9. 00D0: 13 7A 6E C5 25 E0 95 4A 92 E5 A8 8B EE 03 49 B4 .zn.%..J......I. 00E0: D9 7C 00 E3 F0 3B A7 BA 40 30 CC 89 55 C6 97 93 .....;..@0..U... 00F0: B5 15 F6 62 D3 B1 74 9C 0B 80 2B 8A D4 03 84 A0 ...b..t...+..... ] *** Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1.1 5A C281, https-jsse-nio-8443-exec-6, RECV TLSv1.2 ALERT: warning, close_notify 210, 61, 65, 243, 90, 104, 18, 96, 28, 113, 196, 45, 144, 243, 58, 106, 169, 94, 72, 94, 240, 76, 113, 253, 130, 8, 5, 184, 63, 94, 56, 3, 237, 54, 186, 215, 56, 73, 143, 221, 7, 192, 57, 62, 102, 229, 124, 182, 82, 22, 166, 26, 178, 49, 228, 247, 66, 122, 56, 56, 145, 115, 4, 254, 173, 207, 236, 153, 164, 248, 22, 136, 81, 255, 249, 14, 239, 167, 16, 76, 191, 30, 97, 119, 156, 249, 123, 175, 67, 219, 182, 80, 213, 154, 58, 80, 26, 125, 234, 22, 46, 190, 158, 136, 128, 230, 85, 235, 253, 252, 7, 121, 53, 173, 192, 154, 10, 250 } 65 CB D3 3B F6 53 4C 70 97 C9 BF 3F C6 61 Z.e..;.SLp...?.a *** Diffie-Hellman ServerKeyExchange https-jsse-nio-8443-exec-2, READ: TLSv1 Handshake, length = 512 https-jsse-nio-8443-exec-1, READ: TLSv1.2 Handshake, length = 40 228, 19, 111, 132, 5, 153, 164, 197, 51, 211, 40, 81, 12*** Finished verify_data: { *** ClientHello, TLSv1.2 RandomCookie: DH Modulus: { 255, 255, 255, 255, 255, 255, 255, 255, 201, 15, 218, 162, 33, 104, 194, 52, 196, 198, 98, 139, 128, 220, 28, 209, 41, 2, 78, 8, 138, 103, 204, 116, 2, 11, 190, 166, 59, 19, 155, 34, 81, 74, 8, 121, 142, 52, 4, 221, 239, 149, 25, 179, 205, 58, 67, 27, 48, 43, 10, 109, 242, 95, 20, 55, 79, 225, 53, 109, 109, 81, 194, 69, 228, 133, 181, 118, 98, 94, 126, 198, 244, 76, 66, 233, 166, 55, 237, 107, 11, 255, 92, 182, 244, 6, 183, 237, 238, 56, 107, 251, 90, 137, 159, 165, 174, 159, 36, 17, 124, 75, 31, 230, 73, 40, 102, 81, 236, 230, 83, 129, 255, 255, 255, 255, 255, 255, 255, 255 } 0DH Base: { 2 } Server DH Public Key: { 225, 196, 9, 203, 159, 36, 70, 130, 168, 179, 12, 214, 43, 37, 14, 184, 16, 20, 34, 219, 146, 253, 158, 33, 160, 120, 135, 180, 43, 238, 142, 126, 36, 52, 94, 43, 92, 95, 237, 49, 47, 215, 84, 215, 14, 2, 27, 175, 213, 51, 70, 8, 201, 149, 240, 185, 233, 245, 136, 127, 10, 169, 220, 37, 118, 74, 127, 187, 232, 33, 189, 146, 233, 207, 195, 33, 253, 253, 142, 255, 173, 36, 104, 218, 71, 145, 83, 227, 131, 161, 114, 147, 204, 167, 94, 16, 138, 48, 160, 196, 62, 163, 91, 149, 192, 13, 119, 174, 17, 195, 246, 173, 41, 105, 89, 10, 173, 117, 66, 142, 117, 109, 170, 166, 222, 236, 75, 24 } https-jsse-nio-8443-exec-6, closeInboundInternal() Signature Algorithm SHA256withRSA Signed with a DSA or RSA public key 0GMT: 915489528 bytes = { 180, 177, 67, 45, 220, 94, 41, 31, 176, 92, 88, 131, 209, 94, 66, 79, 36, 219, 209, 125, 40, 70, 151, 96, 157, 186, 199, 228, 116, 209, 49, 40 } *** , 62, 227, 215, 145, 41, 40, 31, 84, 13, 129, 91, 164, 94, 141, 87, 230, 255, 230, 207, 161, 249, 85, 134, 235, 51, 51, 15, 120, 225, 102, 48, 88, 37, 12, 39, 198https-jsse-nio-8443-exec-1, WRITE: TLSv1.2 Change Cipher Spec, length = 1 24, 173, 223, 211, 185, 225, 136, 207 } Session ID: *** ServerHelloDone https-jsse-nio-8443-exec-7, WRITE: TLSv1.2 Handshake, length = 1697 SESSION KEYGEN: PreMaster Secret: 0000: EC 84 E2 AF 4B 91 CF 27 ED FC C7 B8 66 24 4A 45 ....K..'....f$JE 0010: 58 83 59 28 AE DE 2A FC 3F 52 C8 48 B4 86 8C EF X.Y(..*.?R.H.... 0020: 96 1C 7B 8A C8 57 D9 73 9E EE 4D 9A FD 59 C1 46 .....W.s..M..Y.F 0030: 34 67 31 EA CC DA F8 16 4D 7C 23 F6 F2 78 D7 9B 4g1.....M.#..x.. 0040: 6D 1B 29 26 CA 2C DC E5 C8 AA E9 3C 9A D3 1C 75 m.)&.,.....<...u 0050: 80 A6 38 9B 54 5D A5 30 00 3F 62 36 6A 1C 25 69 ..8.T].0.?b6j.%i 0060: CE E1 F5 5D 26 62 D5 9F CB 23 66 C6 DC DB FA D0 ...]&b...#f..... 0070: 9F 04 50 0E F6 6B BE BC 69 54 D4 1A 9A C9 DD B2 ..P..k..iT...... CONNECTION KEYGEN: Client Nonce: 0000: 38 DB AB 52 AE 54 3F 8E 83 67 62 A6 37 28 FF D0 8..R.T?..gb.7(.. 0010: BA 9D B6 5B D5 FE AD 5E 77 37 4A 33 80 10 1B 7F ...[...^w7J3.... Server Nonce: 0000: 5C 7D 0F F7 BD 58 EC C3 10 14 9B EB D4 5E 9A 6B \....X.......^.k 0010: E8 89 3F 7B 9C BC E5 08 E1 D8 F6 5F 86 01 C0 1E ..?........_.... Master Secret: 0000: 35 9F E4 FF 5D CB EE 25 07 42 86 BD 40 41 54 47 5...]..%.B..@ATG 0010: 22 C5 90 43 E2 3F 8D 62 5C EF C8 9B 99 6B 3C A5 "..C.?.b\....k<. 0020: 01 56 09 F5 59 81 B6 69 DD 6F 70 56 27 D1 BB A9 .V..Y..i.opV'... ... no MAC keys used for this cipher Client write key: 0000: F6 28 16 6D F2 29 14 FD CB 09 E9 7D 62 1A 90 18 .(.m.)......b... 0010: E5 9E E5 0F 77 CB 78 E5 22 79 25 5D 3E D1 11 74 ....w.x."y%]>..t Server write key: 0000: 07 51 6B A8 67 B8 A1 01 9B 54 97 E4 79 CC E8 AD .Qk.g....T..y... 0010: 0C DE 7C EC BB 2B 9B 4C 22 8F D3 B1 F8 19 BA 88 .....+.L"....... Client write IV: 0000: 10 9A BF 5B ...[ Server write IV: 0000: DF 04 1F 6C ...l https-jsse-nio-8443-exec-6, closeOutboundInternal() https-jsse-nio-8443-exec-3, READ: TLSv1.2 Handshake, length = 134 1https-jsse-nio-8443-exec-4, READ: TLSv1.2 Change Cipher Spec, length = 1 {92, 125, 15, 247, 242, 122, 131, 156, 80, 117, 217, 241, 196, 233, 43, 6, 10, 175, 226, 239, 82, 201, 190, 246, 213, 22, 177, 21, 148, 39, 43, 131} *** Finished Cipher Suites: [Unknown 0x13:0x2, Unknown 0x13:0x3, Unknown 0x13:0x1, Unknown 0x13:0x4, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa9, Unknown 0xc0:0xad, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0xac, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa8, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xc0:0x9d, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9c, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xaa, Unknown 0xc0:0x9f, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9e, TLS_DHE_RSA_WITH_AES_128_CBC_SHA] Compression Methods: { 0https-jsse-nio-8443-exec-4, READ: TLSv1.2 Handshake, length = 40 , 231, 92, 16, 188, 236, 216, 59, 248, 130, 122, 175, 64, 140, 220, 165, 235, 54, 101, 249, 188, 70, 141, 22, 138, 208, 12, 114, 179, 69, 43, 173, 235, 228, 226, 133, 56, 228, 5, 248, 151, 65, 240, 46, 149, 66, 30, 101, 199, 252, 57, 235, 185, 122, 71, 60, 156, 67, 80, 118, 190, 192, 214, 11, 134, 120, 199 } } Unsupported extension status_request, data: 01:00:00:00:00 Extension elliptic_curves, curve names: {secp256r1, secp384r1, secp521r1, unknown curve 29, unknown curve 256, unknown curve 257, unknown curve 258, unknown curve 259, unknown curve 260} Extension ec_point_formats, formats: [uncompressed] Extension signature_algorithms, signature_algorithms: SHA256withRSA, Unknown (hash:0x8, signature:0x9), Unknown (hash:0x8, signature:0x4), SHA256withECDSA, Unknown (hash:0x8, signature:0x7), SHA384withRSA, Unknown (hash:0x8, signature:0xa), Unknown (hash:0x8, signature:0x5), SHA384withECDSA, SHA512withRSA, Unknown (hash:0x8, signature:0xb), Unknown (hash:0x8, signature:0x6), SHA512withECDSA, SHA1withRSA, SHA1withECDSA Unsupported extension type_35, data: Unsupported extension type_51, data: 00:69:00:17:00:41:04:e5:71:64:63:ab:d5:21:e5:e0:8f:5f:01:36:23:4c:11:7c:4e:ec:a0:36:e8:20:6a:19:d7:a6:96:f7:ae:8f:f0:75:6f:84:31:6c:d9:f5:7e:aa:9e:9d:2f:0d:0e:95:2f:00:64:06:ad:89:a8:91:09:cd:05:7d:22:27:04:f8:79:00:1d:00:20:7f:c9:a3:77:64:c6:cc:dc:c5:6c:ba:d9:df:4c:f2:a5:9b:41:52:eb:54:e7:81:e9:7a:f0:87:62:06:2a:9d:73 Unsupported extension type_43, data: 08:03:04:03:03:03:02:03:01 Extension renegotiation_info, renegotiated_connection: <empty> Extension server_name, server_name: [type=host_name (0), value=localhost] Unsupported extension type_45, data: 02:01:00 Unsupported extension type_28, data: 40:00 Unsupported extension type_21, data: 00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00 *** %% Initialized: [Session-17, SSL_NULL_WITH_NULL_NULL] SESSION KEYGEN: PreMaster Secret: 0000: 53 15 0E 57 81 D4 3F 72 C8 F3 EB 48 2A CE 87 89 S..W..?r...H*... 0010: F9 F3 27 EC 8A 3F 65 5D 13 EB 50 C4 3F 01 38 B5 ..'..?e]..P.?.8. 0020: FA A6 96 DC 2C FF B5 27 01 89 DF 30 D7 98 B0 FC ....,..'...0.... 0030: 11 6D AF FF 57 B7 70 FA F2 21 C0 5B 6A 55 A1 05 .m..W.p..!.[jU.. 0040: 61 52 CB EE EF 5C 32 F2 58 38 BD F3 8C 89 FB EA aR...\2.X8...... 0050: 15 1E C5 BE A0 verify_data: { 36, 140, 166, 251, 242, 132, 240, 1, 173, 233, 78, 233 } *** *** ClientKeyExchange, DH DH Public key: { 183, 105, 72, 155, 174, 61, 85, 44, 148, 245, 41, 252, 1, 127, 50, 68, 236, 105, 47, 121, 185, 243, 220, 146, 158, 27, 2, 49, 162, 47, 102, 240, 49, 27, 26, 167, 147, 109, 146, 18, 83, 11, 141, 182, 182, 20, 168, 127, 48, 27, 96, 155, 76, 165, 183, 113, 231, 32, 47, 8, 129, 74, 221, 88, 102, 249, 151, 140, 201, 51, 130, 38, 8, 43, 47, 212, 51, 104, 107, 91, 9, 61, 100, 10, 84, 201, 180, 215, 231, 53, 114, 245, 86, 111, 190, 165, 240, 125, 20, 199, 70, 65, 228, 59, 113, 164, 148, 69, 54, 217, 103, 140, 119, 16, 79, 217, 2, 38, 134, 91, 160, 73, 57, 40, 84, 224, 138, 84 } 0: B2 F5 EF E4 EA EF B4 BB B6 48 19 3F F6 0B BA 13 .........H.?.... 0020: 68 F9 69 0D C5 EA A2 C1 B4 43 73 D3 98 96 E8 8F h.i......Cs..... 0030: C1 2B 64 5D 8B 46 74 28 A9 01 60 8F 96 6F 13 0E .+d].Ft(..`..o.. 0040: 32 C3 3D A1 D1 4D 15 6E DE 54 BA C4 1B 4B 16 8A 2.=..M.n.T...K.. 0050: 25 79 21 F1 71 ED 5B D2 ED 8C 04 5B F0 5F EE F8 %y!.q.[....[._.. 0060: F5 4D ED 8E BC 96 6E 23 A2 A0 8A 72 DE 59 28 50 .M....n#...r.Y(P 0070: AB AE E4 CF 4E 1D F2 B4 58 AE 49 0A 86 6A 79 48 ....N...X.I..jyH CONNECTION KEYGEN: Client Nonce: 0000: 35 22 15 5B 46 40 63 FC FC F3 F7 3D 54 63 E1 16 5".[F@c....=Tc.. 0010: C5 D9 E8 CC 53 DB 4D 60 D9 E0 24 10 4B FA 73 D2 ....S.M`..$.K.s. Server Nonce: 0000: 5C 7D 0F F7 54 39 9A 14 43 A1 7D 68 18 FD F9 AC \...T9..C..h.... 0010: 43 8A 2C A3 98 EE B5 EF D9 17 31 95 79 0B 8E 7B C.,.......1.y... Master Secret: 0000: 9E AD 80 A5 33 76 EF 56 2B 51 34 CC BE 6C 36 D8 ....3v.V+Q4..l6. 0010: 7F C7 F9 A8 E8 4C FA 92 EA E7 CC 30 41 25 FC 41 .....L.....0A%.A 0020: 47 19 CC 12 BD 35 15 A7 F5 77 42 F1 E7 18 96 67 G....5...wB....g ... no MAC keys used for this cipher Client write key: 0000: A5 AA 55 23 86 74 FF 71 D8 67 F7 BB AF 01 92 D5 ..U#.t.q.g...... 0010: 76 FD 91 B8 65 B4 B6 AD DA 02 02 71 BC 16 4B 8C v...e......q..K. Server write key: 0000: 5F 12 55 DA CF 72 DD 2D C7 64 25 48 44 C6 46 2E _.U..r.-.d%HD.F. 0010: D6 AE F7 B1 2D 44 1F 8A F9 64 6E 7F 66 FA 99 87 ....-D...dn.f... Client write IV: 0000: 2A 27 FD E9 *'.. Server write IV: 0000: 61 C5 8A 36 a..6 https-jsse-nio-8443-exec-6, SEND TLSv1.2 ALERT: warning, description = close_notify https-jsse-nio-8443-exec-1, WRITE: TLSv1.2 Handshake, length = 40 https-jsse-nio-8443-exec-10, READ: TLSv1.2 Change Cipher Spec, length = 1 %% Cached server session: [Session-13, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384] SESSION KEYGEN: PreMaster Secret: 0000: 80 23 6D 07 63 6D F6 39 37 EC 32 3E 53 80 58 B9 .#m.cm.97.2>S.X. 0010: 02 F7 2D 63 BB B3 0F AE F5 FC 5C EA EE 74 B2 F7 ..-c......\..t.. 0020: B2 38 2E A5 64 AB D4 37 7A CD EB 50 73 18 33 42 .8..d..7z..Ps.3B 0030: 4A 4F F0 EB 5F E0 BA 4E 39 6D 77 2C D0 F8 4F F9 JO.._..N9mw,..O. 0040: 20 9B DC A7 B3 DC 81 3D 64 2B BF 16 3E 05 5D 58 ......=d+..>.]X 0050: D0 0E 92 19 B3 A2 A1 4B 2C A1 C8 22 85 74 ED F3 .......K,..".t.. 0060: C1 3F BF 89 B5 2C 11 4D 65 45 13 E7 3C BF 50 2D .?...,.MeE..<.P- 0070: CA A2 95 FC D9 97 AE 8D C9 E0 3B 8B 42 05 84 D3 ..........;.B... F3 45 CD DB 63 C6 B4 B5 83 5B 72 ......E..c....CONNECTION KEYGEN: Client Nonce: 0000: D6 E2 13 49 C4 6F B3 D0 F4 81 A2 6B 9C 5F C9 1B ...I.o.....k._.. 0010: 40 BE 65 B3 AF 98 8A 25 DC 16 55 1A 2A 1E EE 55 @.e....%..U.*..U Server Nonce: 0000: 5C 7D 0F F8 F0 42 05 0A 79 88 E2 29 AA 25 72 0D \....B..y..).%r. 0010: 91 4A 2B 03 63 E6 2E CC 7F 30 74 86 2F 60 4B 4D .J+.c....0t./`KM Master Secret: 0000: 71 F3 01 EF 7A 0C 11 E8 48 B9 4A 98 6B 47 2E B4 q...z...H.J.kG.. 0010: 46 F9 4E 8E 72 DF 20 21 92 8F 30 6C C6 DA 64 E8 F.N.r. !..0l..d. 0020: AB E1 6C 58 8F 18 80 C2 46 25 35 BE E0 A8 16 1E ..lX....F%5..... ... no MAC keys used for this cipher Client write key: 0000: 69 23 48 09 91 82 D0 99 7E 80 5A E0 7A 95 68 51 i#H.......Z.z.hQ 0010: 3B C1 A6 5B B9 DB 43 2F 1A 65 EA 70 4A AA 1E FA ;..[..C/.e.pJ... Server write key: 0000: C4 BC BF 58 79 DA 05 B0 0E A7 16 A9 A5 A7 03 69 ...Xy..........i 0010: 9F B6 89 68 5E D4 6F 8C 4B 47 99 B2 CB 42 A4 C2 ...h^.o.KG...B.. Client write IV: 0000: 9D 44 7E 23 .D.# Server write IV: 0000: CA 6A E3 F1 .j.. Standard ciphersuite chosen: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 %% Negotiating: [Session-17, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384] *** Finished verify_data: { 121, 67https-jsse-nio-8443-exec-3, READ: TLSv1.2 Change Cipher Spec, length = 1 https-jsse-nio-8443-exec-7, WRITE: TLSv1.2 Application Data, length = 86 https-jsse-nio-8443-exec-3, READ: TLSv1.2 Handshake, length = 40 https-jsse-nio-8443-exec-10, READ: TLSv1.2 Handshake, length = 40 *** Finished verify_data: { 19, 161, 222, 140, 146, 193, 131, 64, 167, 92, 160, 139 } *** *** Finished verify_data: { 136, 102, 57, 28, 201, 125, 128, 39, 202, 7, 38, 37 } *** [r https-jsse-nio-8443-exec-6, WRITE: TLSv1.2 Alert, length = 26 https-jsse-nio-8443-exec-3, WRITE: TLSv1.2 Change Cipher Spec, length = 1 https-jsse-nio-8443-exec-6, called closeOutbound() https-jsse-nio-8443-exec-6, closeOutboundInternal() *** Finished verify_data: { 62, 238, 30, 54, 163, 55, 153, 175, 122, 27, 145, 101 } *** 0060: 9C 6A 14 0A 03 95 30 3A D8 F4 2A 01 9A A9 27 DC .j....0:..*...'. 0070: 54 8D 9D F4 9E 57 54 A1 16 13 F9 55 E3 3F EF 56 T....WT....U.?.V https-jsse-nio-8443-exec-7, READ: TLSv1.2 Alert, length = 26 https-jsse-nio-8443-exec-7, RECV TLSv1.2 ALERT: warning, close_notify https-jsse-nio-8443-exec-7, closeInboundInternal() https-jsse-nio-8443-exec-7, closeOutboundInternal() https-jsse-nio-8443-exec-7, SEND TLSv1.2 ALERT: warning, description = close_notify https-jsse-nio-8443-exec-10, WRITE: TLSv1.2 Change Cipher Spec, length = 1 *** ServerHello, TLSv1.2 RandomCookie: , GMT: 1551699704 bytes = { 237, 165, 54, 136, 116, 84, 64, 44, 254, 37, 99, 96, 129, 127, 198, 252, 227, 6, 35, 178, 51, 129, 26, 221, 216, 247, 225, 139 } Session ID: {92, 125, 15, 248, 255, 251, 152, 32, 237, 6, 119, 199, 102, 42, 196, 20, 173, 44, 206, 23, 48, 86, 101, 236, 233, 56, 127, 32, 174, 100, 50, 88} Cipher Suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 Compression Method: 0 Extension renegotiation_info, renegotiated_connection: <empty> *** Cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 *** Certificate chain chain [0] = [ [ Version: V3 Subject: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5 Key: Sun RSA public key, 2048 bits modulus: 21944740401167172627731583459321030363948627215746053925732477915060915436180167456469785746662093119306577380200747716284652995937004530444336851845029170241627465854006145050037178991946925696078563485570896673835545540824265905937881682387179314987285174428010940266412458943894800978345731524307952507729956745301047871771953945124256516782917326981125087548987889540650149121302888872237484100834740328828765018090383963294418357028839734723410564800765871733483849269364796949055153420777966213779145518299141217288017794394762274753999989298548507425930217302947589819396239489846633419099079578249651345685751 public exponent: 65537 Validity: [From: Fri May 30 08:43:19 GMT 2014, To: Mon May 27 08:43:19 GMT 2024] Issuer: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US SerialNumber: [ a6ef7a9a 5368eb27] Certificate Extensions: 3 [1]: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: 78 0D 96 9D FE D3 0B BE 8C C7 E3 EC 67 04 AB 4B x...........g..K 0010: EA E0 00 29 ...) ] ] [2]: ObjectId: 2.5.29.19 Criticality=false BasicConstraints:[ CA:true PathLen:2147483647 ] [3]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 78 0D 96 9D FE D3 0B BE 8C C7 E3 EC 67 04 AB 4B x...........g..K 0010: EA E0 00 29 ...) ] ] ] Algorithm: [SHA1withRSA] Signature: 0000: 19 16 5A 21 99 21 24 98 3C 0A E8 D8 00 AB 44 24 ..Z!.!$.<.....D$ 0010: F2 0C B7 83 D5 9F 96 17 87 E2 1F 1D A3 47 68 C7 .............Gh. 0020: 68 4A CB 56 0E 77 2B E8 1A 9F E7 09 A1 19 77 D0 hJ.V.w+.......w. 0030: 5E CC C1 B3 9A C4 35 3D CB E0 A5 A6 43 5D A3 26 ^.....5=....C].& 0040: A4 91 8A C1 FA 7B 10 EA DC C3 C7 1C 47 DC 97 32 ............G..2 0050: C0 37 80 1C F1 42 10 E3 74 17 FA 3E 60 4A B7 59 .7...B..t..>`J.Y 0060: 92 C1 E0 6F BB F1 BB 9F 82 89 B5 83 D5 AE 1E 90 ...o............ 0070: 0A 89 8D FB 4C C0 C5 9E DC C5 8C C6 2F EE D9 B4 ....L......./... 0080: 95 47 27 2E BE 82 31 6F 76 C0 DB 4C C8 0D 3B 7B .G'...1ov..L..;. 0090: D1 6A BF BD 3B 93 30 04 A2 9E 81 F7 96 28 77 F2 .j..;.0......(w. 00A0: 32 05 68 44 1F B3 30 CE 40 9F 20 F3 B4 2B AA E6 2.hD..0.@. ..+.. 00B0: 40 9B FB 7F 34 6E 3A 99 FD F8 28 F1 8C 9B 56 34 @...4n:...(...V4 00C0: 64 AD 4D 56 39 CB 96 18 50 9B 99 43 80 0A 39 A5 d.MV9...P..C..9. 00D0: 13 7A 6E C5 25 E0 95 4A 92 E5 A8 8B EE 03 49 B4 .zn.%..J......I. 00E0: D9 7C 00 E3 F0 3B A7 BA 40 30 CC 89 55 C6 97 93 .....;..@0..U... 00F0: B5 15 F6 62 D3 B1 74 9C 0B 80 2B 8A D4 03 84 A0 ...b..t...+..... ] *** *** Diffie-Hellman ServerKeyExchange https-jsse-nio-8443-exec-7, WRITE: TLSv1.2 Alert, length = 26 https-jsse-nio-8443-exec-3, WRITE: TLSv1.2 Handshake, length = 40 Using SSLEngineImpl. Allow unsafe renegotiation: false Allow legacy hello messages: true Is initial handshake: true Is secure renegotiation: false https-jsse-nio-8443-exec-7, called closeOutbound() https-jsse-nio-8443-exec-7, closeOutboundInternal() Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1.1 https-jsse-nio-8443-exec-1, READ: TLSv1 Handshake, length = 512 *** ClientHello, TLSv1.2 RandomCookie: GMT: 1436849403 bytes = { 6, 189, 104, 130, 71, 1, 6, 33, 178, 88, 101, 153, 0, 53, 135, 216, DH Modulus: { 255, 255, 255, 255, 255, 255, 255, 255, 201, 15, 218, 162, 33, 104, 194, 52, 196, 198, 98, 139, 128, 220, CONNECTION KEYGEN: Client Nonce: 0000: 26 60 EF C2 89 30 B6 50 50 22 83 B1 B8 80 09 7F &`...0.PP"...... 0010: D3 63 96 81 5C 45 03 AC 60 BF DB C8 73 19 D4 23 .c..\E..`...s..# Server Nonce: 0000: 5C 7D 0F F7 C6 0B 75 B3 9F 5D 30 E3 0D 9B 24 50 \.....u..]0...$P 0010: 5A 9E 54 DC 59 14 23 90 D8 B4 CB 17 D9 AC 18 3A Z.T.Y.#........: Master Secret: 0000: 4C 52 FB 5F 2B 72 5E 35 DE 36 D8 32 C2 BE C1 3C LR._+r^5.6.2...< 0010: F4 4A 0E 4C E7 DF C7 6F 19 2F 6B 76 A5 F0 A7 19 .J.L...o./kv.... 0020: C1 1D 0B 88 4A 66 F4 8D D3 1A FB AB 34 1B 8F 86 ....Jf......4... ... no MAC keys used for this cipher Client write key: 0000: 5C 4B 1E 89 AA F3 8A 41 B1 E9 6A E6 18 F1 38 10 \K.....A..j...8. 0010: 49 50 7F 8E 3C 67 CD 6C 13 53 82 3E 83 79 8A 39 IP..<g.l.S.>.y.9 Server write key: 0000: 6E 58 51 19 9F FD 22 51 A5 7B E3 4F 4A 7F C1 F5 nXQ..."Q...OJ... 0010: 78 98 BB 4B C1 E2 CF AA 53 23 42 5F DC 22 9B 65 x..K....S#B_.".e Client write IV: 0000: 5D 0E 3F F3 ].?. Server write IV: 0000: 39 0A C3 CA 9... *** Finished 184, 88, 90, https-jsse-nio-8443-exec-9, READ: TLSv1.2 Change Cipher Spec, length = 1 verify_data: { 55, 64, 55, 121, 94, 193, 130, 111, 185, 146, 120, 181 } *** %% Cached server session: [Session-16, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384] 28, 209, 41, 2, 78, 8, 138, 103, 204, 116, 2, 11, 190, 166, 59, 19, 155, 34, 81, 74, 8, 121, 142, 52, 4, 221, 239, 149, 25, 179, 205, 58, 67, 27, 48, 43, 10, 109, 242, 95, 20, 55, 79, 225, 53, 109, 109, 81, 194, 69, 228, 133, 181, 118, 98, 94, 126, 198, 244, 76, 66, 233, 166, 55, 237, 107, 11, 255, 92, 182, 244, 6, 183, 237, 154, 77, 46, 154, 60, 54, 1, 44, 133, 100, 249, 205 } Session ID: {92, 125, 15, 247, 50, 58, 5, 184, 11, 182, 57, 252, 105, 8, 156, 212, 100, 243, 238, 186, 235, 226, 190, 120, 154, 82, 26, 51, 98, 107, 132, 131} Cipher Suites: [Unknown 0x13:0x2, Unknown 0x13:0x3, Unknown 0x13:0x1, Unknown 0x13:0x4, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa9, Unknown 0xc0:0xad, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0xac, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa8, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xc0:0x9d, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9c, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xaa, Unknown 0xc0:0x9f, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9e, TLS_DHE_RSA_WITH_AES_128_CBC_SHA] Compression Methods: { 0 } Unsupported extension status_request, data: 01:00:00:00:00 Extension elliptic_curves, curve names: {secp256r1, secp384r1, secp521r1, unknown curve 29, unknown curve 256, unknown curve 257, unknown curve 258, unknown curve 259, unknown curve 260} Extension ec_point_formats, formats: [uncompressed] Extension signature_algorithms, signature_algorithms: SHA256withRSA, Unknown (hash:0x8, signature:0x9), Unknown (hash:0x8, signature:0x4), SHA256withECDSA, Unknown (hash:0x8, signature:0x7), SHA384withRSA, Unknown (hash:0x8, signature:0xa), Unknown (hash:0x8, signature:0x5), SHA384withECDSA, SHA512withRSA, Unknown (hash:0x8, signature:0xb), Unknown (hash:0x8, signature:0x6), SHA512withECDSA, SHA1withRSA, SHA1withECDSA Unsupported extension type_35, data: 238, 56, 107, 251, 90, 137, 159, 165, 174, 159, 36, 17, 124, 75, 31, 230, 73, 40, 102, 81, 236, 230, 83, 129, 255, 255, 255, 255, 255, 255, 255, 255 } DH Base: { 2 } Server DH Public Key: { 176, 192, 181, 32, 179, 39, 86, 3, 132, 12, 91, 93, 129, 76, 31, 96, 93, 138, 140, 190, 60, 233, 248, 132, 28, 194, 113, 168, 99, 92, 165, 234, 205, 142, 217, 187, 41, 225, 204, 31, 195, 6, 77, 247, 231, 176, 72, 55, 62, 52, 14, 170, 113, 228, 100, 66, 238, 16, 32, 27, 253, 27, 92, 215, 88, 36, 204, 148, 84, 109, 26, 178, 89, 10, 4, 255, 40, 200, 153, 89, 198, 42, 47, 219, 232, 250, 34, 255, 13, 93, 132, 9, 237, 181, 185, 245, 36, 95, 43, 124, 138, 204, 229, 70, 128, 80, 170, 82, 251, 6, 235, 217, 109, 82, 50, 186, 107, 224, 112, 104, 152, 179, 250, 122, 195, 90, 100, 152 } Signature Algorithm SHA256withRSA Signed with a DSA or RSA public key *** ServerHelloDone https-jsse-nio-8443-exec-2, WRITE: TLSv1.2 Handshake, length = 1697 https-jsse-nio-8443-exec-6, WRITE: TLSv1.2 Application Data, length = 84 https-jsse-nio-8443-exec-9, READ: TLSv1.2 Handshake, length = 40 *** Finished verify_data: { 83, 228, 84, 181, 59, 83, 24, 38, 238, 91, 52, 225 } *** https-jsse-nio-8443-exec-9, WRITE: TLSv1.2 Change Cipher Spec, length = 1 *** Finished verify_data: { 200, 132, 112, 192, 53, 63, 97, 173, 37, 11, 254, 105 } *** 97, 244, 175, 65, 25, 253, 29 } *** https-jsse-nio-8443-exec-4, WRITE: TLSv1.2 Change Cipher Spec, length = 1 https-jsse-nio-8443-exec-10, WRITE: TLSv1.2 Handshake, length = 40 %% Cached server session: [Session-11, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384] Unsupported extension type_51, data: 00:69:00:17:00:41:04:a0:de:20:6a:76:97:05:95:fa:0c:eb:95:cf:63:e1:39:51:2f:fb:47:71:e3:e4:b1:8d:0d:d1:dc:3c:6d:3e:cd:74:4a:82:ac:2b:a3:6d:a3:a4:33:c8:05:70:81:f8:a8:11:36:cc:92:31:1b:a9:aa:95:7c:32:f6:bd:cd:cc:1b:00:1d:00:20:68:e8:86:62:81:e1:81:66:42:5a:4d:61:0f:d3:93:ad:88:c9:82:68:81:e6:45:c0:ab:ef:af:63:45:be:50:42 Unsupported extension type_43, data: 08:03:04:03:03:03:02:03:01 *** Finished Extension renegotiation_info, renegotiated_connection: <empty> Extension server_name, server_name: [type=host_name (0), value=localhost] Unsupported extension type_45, data: 02:01:00 Unsupported extension type_28, data: 40:00 Unsupported extension type_21, data: 00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00 *** https-jsse-nio-8443-exec-7, READ: TLSv1.2 Alert, length = 26 %% Initialized: [Session-18, SSL_NULL_WITH_NULL_NULL] Using SSLEngineImpl. Allow unsafe renegotiation: false Allow legacy hello messages: true Is initial handshake: true Is secure renegotiation: false Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1 https-jsse-nio-8443-exec-9, WRITE: TLSv1.2 Handshake, length = 40 %% Cached server session: [Session-15, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384] https-jsse-nio-8443-exec-3, READ: TLSv1.2 Handshake, length = 134 verify_data: { 9, 166, 111, 242, 172, 3, 63, 147, 201, 156, 170, 243 } *** https-jsse-nio-8443-exec-7, RECV TLSv1.2 ALERT: warning, close_notify Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1.1 Standard ciphersuite chosen: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 %% Negotiating: [Session-18, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384] *** ServerHello, TLSv1.2 RandomCookie: GMT: 1551699704 bytes = { 56, 67, 40, 67, 125, 206, 3, 6, 85, 158, 195, 157, 56, 132, 207, 80, 124, 131, 27, 132, https-jsse-nio-8443-exec-5, READ: TLSv1 Handshake, length = 512 *** ClientHello, TLSv1.2 RandomCookie: GMT: -1055044290 bytes = { 76, 212, 20, 138, 164, 251, 165, 196, 111, 66, 210, 31, 27, 178, 36, 149, 63, 133, 40, 108, 82, 94, 4, 121, 250, 209, 70, 130 } Session ID: {92, 125, 15, 248, 20, 0, 210, 78, 109, 221, 37, 254, 86, 107, 83, 134, 247, 144, 23, 57, 215, 100, 31, 197, 211, 245, 87, 100, 146, 61, 193, 176} Cipher Suites: [Unknown 0x13:0x2, Unknown 0x13:0x3, Unknown 0x13:0x1, Unknown 0x13:0x4, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa9, Unknown 0xc0:0xad, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0xac, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa8, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xc0:0x9d, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9c, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xaa, Unknown 0xc0:0x9f, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9e, TLS_DHE_RSA_WITH_AES_128_CBC_SHA] https-jsse-nio-8443-exec-4, WRITE: TLSv1.2 Handshake, length = 40 Compression Methods: { 0%% Cached server session: [Session-12, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384] https-jsse-nio-8443-exec-10, WRITE: TLSv1.2 Application Data, length = 85 https-jsse-nio-8443-exec-9, WRITE: TLSv1.2 Application Data, length = 84 201, 230, 69, 80, 44, 121, 220, 191 } Session ID: {92, 125, 15, 248, 200, 196, 227, 184, 135, 186, 255, 75, 149, 164, 169, 164, 148, 13, 252, 15, 135, 65, 154, 146, 2, 108, 179, 97, 13, 116, 9, 30} Cipher Suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 Compression Method: 0 Extension renegotiation_info, renegotiated_connection: <empty> *** Cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 *** Certificate chain https-jsse-nio-8443-exec-7, closeInboundInternal() https-jsse-nio-8443-exec-7, closeOutboundInternal() https-jsse-nio-8443-exec-7, SEND TLSv1.2 ALERT: warning, description = close_notify *** ClientKeyExchange, DH } Unsupported extension status_request, data: 01:00:00:00:00 Extension elliptic_curves, curve names: {secp256r1, secp384r1, secp521r1, unknown curve 29, unknown curve 256, unknown curve 257, unknown curve 258, unknown curve 259, unknown curve 260} Extension ec_point_formats, formats: [uncompressed] Extension signature_algorithms, signature_algorithms: SHA256withRSA, Unknown (hash:0x8, signature:0x9), Unknown (hash:0x8, signature:0x4), SHA256withECDSA, Unknown (hash:0x8, signature:0x7), SHA384withRSA, Unknown (hash:0x8, signature:0xa), Unknown (hash:0x8, signature:0x5), SHA384withECDSA, SHA512withRSA, Unknown (hash:0x8, signature:0xb), Unknown (hash:0x8, signature:0x6), SHA512withECDSA, SHA1withRSA, SHA1withECDSA Unsupported extension type_35, data: Unsupported extension type_51, data: 00:69:00:17:00:41:04:95:bd:17:93:e1:a4:d4:12:48:d7:9c:aa:6a:f0:cd:f7:da:60:59:2a:97:10:8f:4b:ce:3b:5e:f3:ac:7f:2b:09:49:7b:52:28:39:e6:40:93:4d:32:d8:54:39:b7:c4:42:83:66:f8:c5:42:aa:7d:fd:ed:02:36:87:2d:51:2b:c6:00:1d:00:20:e4:5a:c9:e5:31:bc:a3:da:d6:3d:0d:3a:e3:10:70:d0:a9:e3:5b:4b:35:a3:9d:b0:6f:2c:ce:f1:e3:93:73:1d Unsupported extension type_43, data: 08:03:04:03:03:03:02:03:01 Extension renegotiation_info, renegotiated_connection: <empty> Extension server_name, server_name: [type=host_name (0), value=localhost] Unsupported extension type_45, data: 02:01:00 Unsupported extension type_28, data: 40:00 Unsupported extension type_21, data: 00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00 *** chain [0] = [ [ Version: V3 Subject: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5 Key: Sun RSA public key, 2048 bits modulus: 21944740401167172627731583459321030363948627215746053925732477915060915436180167456469785746662093119306577380200747716284652995937004530444336851845029170241627465854006145050037178991946925696078563485570896673835545540824265905937881682387179314987285174428010940266412458943894800978345731524307952507729956745301047871771953945124256516782917326981125087548987889540650149121302888872237484100834740328828765018090383963294418357028839734723410564800765871733483849269364796949055153420777966213779145518299141217288017794394762274753999989298548507425930217302947589819396239489846633419099079578249651345685751 public exponent: 65537 Validity: [From: Fri May 30 08:43:19 GMT 2014, To: Mon May 27 08:43:19 GMT 2024] Issuer: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US SerialNumber: [ a6ef7a9a 5368eb27] Certificate Extensions: 3 [1]: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: 78 0D 96 9D FE D3 0B BE 8C C7 E3 EC 67 04 AB 4B x...........g..K 0010: EA E0 00 29 ...) ] ] [2]: ObjectId: 2.5.29.19 Criticality=false BasicConstraints:[ CA:true PathLen:2147483647 ] [3]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 78 0D 96 9D FE D3 0B BE 8C C7 E3 EC 67 04 AB 4B x...........g..K 0010: EA E0 00 29 ...) ] ] ] Algorithm: [SHA1withRSA] Signature: 0000: 19 16 5A 21 99 21 24 98 3C 0A E8 D8 00 AB 44 24 ..Z!.!$.<.....D$ 0010: F2 0C B7 83 D5 9F 96 17 87 E2 1F 1D A3 47 68 C7 .............Gh. 0020: 68 4A CB 56 0E 77 2B E8 1A 9F E7 09 A1 19 77 D0 hJ.V.w+.......w. 0030: 5E CC C1 B3 9A C4 35 3D CB E0 A5 A6 43 5D A3 26 ^.....5=....C].& 0040: A4 91 8A C1 FA 7B 10 EA DC C3 C7 1C 47 DC 97 32 ............G..2 0050: C0 37 80 1C F1 42 10 E3 74 17 FA 3E 60 4A B7 59 .7...B..t..>`J.Y 0060: 92 C1 E0 6F BB F1 BB 9F 82 89 B5 83 D5 AE 1E 90 ...o............ 0070: 0A 89 8D FB 4C C0 C5 9E DC C5 8C C6 2F EE D9 B4 ....L......./... 0080: 95 47 27 2E BE 82 31 6F 76 C0 DB 4C C8 0D 3B 7B .G'...1ov..L..;. 0090: D1 6A BF BD 3B 93 30 04 A2 9E 81 F7 96 28 77 F2 .j..;.0......(w. 00A0: 32 05 68 44 1F B3 30 CE 40 9F 20 F3 B4 2B AA E6 2.hD..0.@. ..+.. 00B0: 40 9B FB 7F 34 6E 3A 99 FD F8 28 F1 8C 9B 56 34 @...4n:...(...V4 00C0: 64 AD 4D 56 39 CB 96 18 50 9B 99 43 80 0A 39 A5 d.MV9...P..C..9. 00D0: 13 7A 6E C5 25 E0 95 4A 92 E5 A8 8B EE 03 49 B4 .zn.%..J......I. 00E0: D9 7C 00 E3 F0 3B A7 BA 40 30 CC 89 55 C6 97 93 .....;..@0..U... 00F0: B5 15 F6 62 D3 B1 74 9C 0B 80 2B 8A D4 03 84 A0 ...b..t...+..... ] *** %% Initialized: [Session-19, SSL_NULL_WITH_NULL_NULL] https-jsse-nio-8443-exec-8, READ: TLSv1.2 Alert, length = 26 https-jsse-nio-8443-exec-8, RECV TLSv1.2 ALERT: warning, close_notify https-jsse-nio-8443-exec-8, closeInboundInternal() https-jsse-nio-8443-exec-8, closeOutboundInternal() https-jsse-nio-8443-exec-8, SEND TLSv1.2 ALERT: warning, description = close_notify https-jsse-nio-8443-exec-8, WRITE: TLSv1.2 Alert, length = 26 https-jsse-nio-8443-exec-8, called closeOutbound() https-jsse-nio-8443-exec-8, closeOutboundInternal() Standard ciphersuite chosen: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 %% Negotiating: [Session-19, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384] Using SSLEngineImpl. *** ServerHello, TLSv1.2 RandomCookie: GMT: 1551699704 bytes = { 238, 92, 67, 160, 197, 163, 33, 98, 59, 67, 63, 231, 224, 165, 244, 226, 209, 57, 82, 72, 250, 31, 109, 206, 50, 234, 182, 109 } Session ID: {92, 125, 15, 248, 181, 154, 125, 230, 61, 129, 18, 26, 1, 153, 235, 181, 199, 235, 208, 79, 250, 126, 110, 194, 87, 247, 95, 187, 134, 2, 227, 105} Cipher Suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 DH Public key: { 112, 123, 26, 131, 195, 206, 48, 255, 223, 55, 254, 6, 134, 38, 80, 148, 125, 90, 85, 55, 165, 159, 2, 68, 239, 159, 131, 198, 231, 217, 230, 98, 238, 145, 66, 193, 68, 249, 199, 193, 101, 113, 52, 117, 71, 61, 82, 137, 230, 182, 63, 118, 236, 172, 1, 1, 189, 166, 57, 144, 99, 65, 63, 57, 62, 18, 157, 134, 6, 105, 132, 117, 254, 76, 36, 86, 153, 33, 65, 215, 154, 107, 6, 170, 24, 252, 172, 10, 61, 36, 148, 204, 222, 148, 98, 31, 105, 53, 40, 175, 35, 147, 32, 164, 75, 217, 127, 37, 44, 178, 139, 46, 36, 224, 93, 216, 113, 255, 106, 81, 74, 137, 209, 15, 134, 193, 146, 98 } Compression Method: 0 https-jsse-nio-8443-exec-6, WRITE: TLSv1.2 Application Data, length = 86 https-jsse-nio-8443-exec-9, READ: TLSv1.2 Alert, length = 26 https-jsse-nio-8443-exec-9, RECV TLSv1.2 ALERT: warning, close_notify https-jsse-nio-8443-exec-9, closeInboundInternal() https-jsse-nio-8443-exec-9, closeOutboundInternal() https-jsse-nio-8443-exec-9, SEND TLSv1.2 ALERT: warning, description = close_notify https-jsse-nio-8443-exec-9, WRITE: TLSv1.2 Alert, length = 26 https-jsse-nio-8443-exec-9, called closeOutbound() https-jsse-nio-8443-exec-9, closeOutboundInternal() Using SSLEngineImpl. Allow unsafe renegotiation: false Allow legacy hello messages: true Is initial handshake: true Is secure renegotiation: false Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1 SESSION KEYGEN: PreMaster Secret: Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1 0000Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1.1 https-jsse-nio-8443-exec-10, READ: TLSv1 Handshake, length = 512 *** ClientHello, TLSv1.2 RandomCookie: GMT: -1366466477 bytes = { 28, 1, 15, 227, 36, 70, 120, 89, 6, 34, 11, 246, 250, 6, 81, 82, 44, 46, 1, 58, 85, 82, 53, 214, 107, 100, 117, 127 } Session ID: {92, 125, 15, 247, 188, 79, 171, 39, 143, 40, 158, 162, 235, 8, 205, 92, 188, 20, 0, 130, 247, 147, 227, 140, 94, 73, 165, 209, 150, 178, 61, 238} Cipher Suites: [Unknown 0x13:0x2, Unknown 0x13:0x3, Unknown 0x13:0x1, Unknown 0x13:0x4, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa9, Unknown 0xc0:0xad, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0xac, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa8, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xc0:0x9d, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9c, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xaa, Unknown 0xc0:0x9f, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9e, TLS_DHE_RSA_WITH_AES_128_CBC_SHA] Compression Methods: { 0 } Unsupported extension status_request, data: 01:00:00:00:00 Extension elliptic_curves, curve names: {secp256r1, secp384r1, secp521r1, unknown curve 29, unknown curve 256, unknown curve 257, unknown curve 258, unknown curve 259, unknown curve 260} Extension ec_point_formats, formats: [uncompressed] Extension signature_algorithms, signature_algorithms: SHA256withRSA, Unknown (hash:0x8, signature:0x9), Unknown (hash:0x8, signature:0x4), SHA256withECDSA, Unknown (hash:0x8, signature:0x7), SHA384withRSA, Unknown (hash:0x8, signature:0xa), Unknown (hash:0x8, signature:0x5), SHA384withECDSA, SHA512withRSA, Unknown (hash:0x8, signature:0xb), Unknown (hash:0x8, signature:0x6), SHA512withECDSA, SHA1withRSA, SHA1withECDSA Unsupported extension type_35, data: Unsupported extension type_51, data: 00:69:00:17:00:41:04:8a:6f:a0:15:12:36:a1:67:3e:0e:80:d7:a3:e1:52:f7:e8:c3:15:cb:eb:6c:61:aa:2d:c1:1b:e0:35:0b:c1:e5:40:07:8d:97:34:2f:fa:35:75:c0:6d:44:66:08:1f:ef:b8:f2:a1:25:28:c7:d6:8a:4f:91:bc:0f:f2:60:c6:e7:00:1d:00:20:b6:87:72:41:cc:47:b4:88:2a:dc:4d:65:ba:87:68:bb:66:6e:8d:c9:cf:8f:c1:82:da:b9:91:4d:e9:7d:f7:3a Unsupported extension type_43, data: 08:03:04:03:03:03:02:03:01 Extension renegotiation_info, renegotiated_connection: <empty> Extension server_name, server_name: [type=host_name (0), value=localhost] Unsupported extension type_45, data: 02:01:00 Unsupported extension type_28, data: 40:00 Unsupported extension type_21, data: 00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00 *** %% Initialized: [Session-20, SSL_NULL_WITH_NULL_NULL] *** Diffie-Hellman ServerKeyExchange https-jsse-nio-8443-exec-7, WRITE: TLSv1.2 Alert, length = 26 https-jsse-nio-8443-exec-7, called closeOutbound() https-jsse-nio-8443-exec-7, closeOutboundInternal() Allow unsafe renegotiation: false Allow legacy hello messages: true Is initial handshake: true Is secure renegotiation: false Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1.1 https-jsse-nio-8443-exec-4, READ: TLSv1 Handshake, length = 512 *** ClientHello, TLSv1.2 RandomCookie: GMT: -1535037726 bytes = { 58, 45, 98, 33, 14, 204, 193, 137, 93, 175, 216, 234, 83, 249, 183, 99, 227, 138, 194, 124, 125, 175, 126, 117, 92, 92, 16, 32 } Session ID: {92, 125, 15, 247, 188, 79, 171, 39, 143, 40, 158, 162, 235, 8, 205, 92, 188, 20, 0, 130, 247, 147, 227, 140, 94, 73, 165, 209, 150, 178, 61, 238} Cipher Suites: [Unknown 0x13:0x2, Unknown 0x13:0x3, Unknown 0x13:0x1, Unknown 0x13:0x4, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa9, Unknown 0xc0:0xad, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0xac, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa8, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xc0:0x9d, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9c, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xaa, Unknown 0xc0:0x9f, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9e, TLS_DHE_RSA_WITH_AES_128_CBC_SHA] Compression Methods: { 0 } Unsupported extension status_request, data: 01:00:00:00:00 Extension elliptic_curves, curve names: {secp256r1, secp384r1, secp521r1, unknown curve 29, unknown curve 256, unknown curve 257, unknown curve 258, unknown curve 259, unknown curve 260} Extension ec_point_formats, formats: [uncompressed] Extension signature_algorithms, signature_algorithms: SHA256withRSA, Unknown (hash:0x8, signature:0x9), Unknown (hash:0x8, signature:0x4), SHA256withECDSA, Unknown (hash:0x8, signature:0x7), SHA384withRSA, Unknown (hash:0x8, signature:0xa), Unknown (hash:0x8, signature:0x5), SHA384withECDSA, SHA512withRSA, Unknown (hash:0x8, signature:0xb), Unknown (hash:0x8, signature:0x6), SHA512withECDSA, SHA1withRSA, SHA1withECDSA Unsupported extension type_35, data: Unsupported extension type_51, data: 00:69:00:17:00:41:04:b7:b7:1a:06:5c:49:6c:5f:4d:54:8d:35:27:a0:bd:2c:3b:a5:8a:ec:7d:e3:6f:4c:dc:e1:6a:99:10:a5:7c:53:1a:da:c9:7d:a7:5a:94:94:7c:07:e4:c8:f7:93:84:0c:7b:32:92:ab:e7:22:34:a8:64:69:12:07:6b:33:31:8e:00:1d:00:20:21:9d:85:fc:3d:79:67:77:23:1c:c1:c8:1a:f1:e3:43:ed:59:fb:6f:65:ab:5f:96:fa:c6:21:69:ad:ed:8d:03 Unsupported extension type_43, data: 08:03:04:03:03:03:02:03:01 Extension renegotiation_info, renegotiated_connection: <empty> Extension server_name, server_name: [type=host_name (0), value=localhost] Unsupported extension type_45, data: 02:01:00 Unsupported extension type_28, data: 40:00 Unsupported extension type_21, data: 00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00 *** DH Modulus: { 255, 255, 255, 255, 255, 255, 255, 255, 201, 15, 218, 162, 33, 104, 194, 52, 196, 198, 98, 139, 128, 220, 28, 209, 41, 2, 78, 8, 138, 103, 204, 116, 2, 11, 190, 166, 59, 19, 155, 34, 81, 74, 8, 121, 142, 52, 4, 221, 239, 149, 25, 179, 205, 58, 67, 27, 48, 43, 10, 109, 242, 95, 20, 55, 79, 225, 53, 109, 109, 81, 194, 69, 228, 133, 181, 118, 98, 94, 126, 198, 244, 76, 66, 233, 166, 55, 237, 107, 11, 255, 92, 182, 244, 6, 183, 237, 238, 56, 107, 251, 90, 137, 159, 165, 174, 159, 36, 17, 124, 75, 31, 230, 73, 40, 102, 81, 236, 230, 83, 129, 255, 255, 255, 255, 255, 255, 255, 255 } DH Base: { 2https-jsse-nio-8443-exec-8, READ: TLSv1.2 Alert, length = 26 : B3 93 C9 FC 01 81 D2 68 91 77 1E https-jsse-nio-8443-exec-8, RECV TLSv1.2 ALERT: warning, close_notify Extension renegotiation_info, renegotiated_connection: <empty> *** Cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 https-jsse-nio-8443-exec-8, closeInboundInternal() Fhttps-jsse-nio-8443-exec-8, closeOutboundInternal() } Server DH Public Key: { 134, 76, 89, 146, 62, 231, 219, 65, 43, 192, 244, 206, 208, 110, 162, 51, 204, 102, 162, 56, 100, 218, 51, 186, 175, 236, 211, 137, 122, 212, 86, 150, 63, 94, 43, 174, 17, 227, 123, 43, 91, 73, 66, 108, 228, 152, 73, 149, 218, 39, 101, 122, 97, 113, 238, 89, 111, 195, 179, 131, 84, 113, 57, 61, 168, 34, 240, 170, 242, 237, 212, 124, 168, 218, 108, 72, 208, 194, 42, 111, 72, 204, 198, 242, 206, 57, 106, 141, 118, 46, 253, 244, 246, 240, 83, 54, 157, 204, 224, 172, 30, 55, 65, 203, 142, 119, 48, 6, 246, 48, 219, 49, 193, 58, 172, 30, 154, 124, 17, 30, 220, 79, 234, 15, 115, 30, 132, 95 } %% Initialized: [Session-21, SSL_NULL_WITH_NULL_NULL] Standard ciphersuite chosen: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 Using SSLEngineImpl. %% Negotiating: [Session-20, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384] *** ServerHello, TLSv1.2 RandomCookie: Signature Algorithm SHA256withRSA Signed with a DSA or RSA public key https-jsse-nio-8443-exec-8, SEND TLSv1.2 ALERT: warning, description = close_notify *** Certificate chain https-jsse-nio-8443-exec-8, WRITE: TLSv1.2 Alert, length = 26 E CA 22 89 EF .......h.w...".. 0010: 59 0F E9 0C 3E D4 CF A4 C4 FA 12 EA 83 8D 4B B8 Y...>.........K. 0020: 0E 06 97 10 E6 02 BB 1B 63 42 06 52 F2 D5 83 49 ........cB.R...I 0030: E9 2F 20 B3 F1 EA 66 0C 59 0A C4 92 1F 80 36 41 ./ ...f.Y.....6A 0040: 2D FC 0F 1E C7 B0 54 7C CE 99 B4 5D F9 37 E9 CA -.....T....].7.. 0050: 5E 1A A9 C9 76 6A E4 E8 82 5F 9E 1B 4A 2D 5A 37 ^...vj..._..J-Z7 0060: 35 47 17 DF 3F 30 FA 9D 7E 25 BF B5 08 1B 38 27 5G..?0...%....8' 0070: 79 71 3E 91 09 B9 D9 C6 6A 08 74 8C A1 AF C6 EB yq>.....j.t..... CONNECTION KEYGEN: Client Nonce: 0000: 37 91 43 F8 B4 B1 43 2D DC 5E 29 1F B0 5C 58 83 7.C...C-.^)..\X. 0010: D1 5E 42 4F 24 DB D1 7D 18 AD DF D3 B9 E1 88 CF .^BO$........... Server Nonce: 0000: 5C 7D 0F F8 ED A5 36 88 74 54 40 2C FE 25 63 60 \.....6.tT@,.%c` 0010: 81 7F C6 FC E3 06 23 B2 33 81 1A DD D8 F7 E1 8B ......#.3....... Master Secret: 0000: 9F B3 47 D8 DE 50 D8 6A 15 86 50 C7 27 92 2C 36 ..G..P.j..P.'.,6 0010: 52 67 AE 73 4C 2D E6 AA 9F 09 05 47 4C DF D6 58 Rg.sL-.....GL..X 0020: 27 3E 77 BF 29 89 8C BB 7F CF 10 61 57 3E EC F6 '>w.)......aW>.. ... no MAC keys used for this cipher Client write key: 0000: 27 AA CD F2 E5 AA FD 52 22 77 98 F9 EF 7E 69 5C '......R"w....i\ 0010: D7 C8 AF 69 7D 68 95 4B A6 56 45 A3 CE 64 37 BB ...i.h.K.VE..d7. Server write key: 0000: 7D DD FB FC B8 54 0F E0 81 DC 4B B8 45 DC 7F 43 .....T....K.E..C 0010: C5 79 31 E9 67 F2 23 B7 40 45 61 FD A9 B0 A7 01 .y1.g.#.@Ea..... Client write IV: 0000: 06 BF 04 46 ...F Server write IV: 0000: C3 97 9D 58 ...X *** ServerHelloDone https-jsse-nio-8443-exec-1, WRITE: TLSv1.2 Handshake, length = 1697 https-jsse-nio-8443-exec-3, READ: TLSv1.2 Change Cipher Spec, length = 1 https-jsse-nio-8443-exec-3, READ: TLSv1.2 Handshake, length = 40 *** Finished verify_data: { 62, 129, 75, 11, 229, 7, 74, 111, 149, 76, 228, 185 } *** https-jsse-nio-8443-exec-3, WRITE: TLSv1.2 Change Cipher Spec, length = 1 *** Finished verify_data: { 133, 85, 179, 7, 243, 75, 31, 62, 24, 234, 164, 216 } *** GMT: 1551699704 Allow unsafe renegotiation: false Allow legacy hello messages: true Is initial handshake: true Is secure renegotiation: false bytes = { 173, 49, 112, 221, 129, 212, 44, 252, 73, 74, 53, 117, 79, 247, 151, 138Standard ciphersuite chosen: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 chain [0] = [ [ Version: V3 Subject: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5 Key: Sun RSA public key, 2048 bits modulus: 21944740401167172627731583459321030363948627215746053925732477915060915436180167456469785746662093119306577380200747716284652995937004530444336851845029170241627465854006145050037178991946925696078563485570896673835545540824265905937881682387179314987285174428010940266412458943894800978345731524307952507729956745301047871771953945124256516782917326981125087548987889540650149121302888872237484100834740328828765018090383963294418357028839734723410564800765871733483849269364796949055153420777966213779145518299141217288017794394762274753999989298548507425930217302947589819396239489846633419099079578249651345685751 public exponent: 65537 Validity: [From: Fri May 30 08:43:19 GMT 2014, To: Mon May 27 08:43:19 GMT 2024] Issuer: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US SerialNumber: [ a6ef7a9a 5368eb27] Certificate Extensions: 3 [1]: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: 78 0D 96 9D FE D3 0B BE 8C C7 E3 EC 67 04 AB 4B x...........g..K 0010: EA E0 00 29 ...) ] ] [2]: ObjectId: 2.5.29.19 Criticality=false BasicConstraints:[ CA:true PathLen:2147483647 ] [3]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 78 0D 96 9D FE D3 0B BE 8C C7 E3 EC 67 04 AB 4B x...........g..K 0010: EA E0 00 29 ...) ] ] ] Algorithm: [SHA1withRSA] Signature: 0000: 19 16 5A 21 99 21 24 98 3C 0A E8 D8 00 AB 44 24 ..Z!.!$.<.....D$ 0010: F2 0C B7 83 D5 9F 96 17 87 E2 1F 1D A3 47 68 C7 .............Gh. 0020: 68 4A CB 56 0E 77 2B E8 1A 9F E7 09 A1 19 77 D0 hJ.V.w+.......w. 0030: 5E CC C1 B3 9A C4 35 3D CB E0 A5 A6 43 5D A3 26 ^.....5=....C].& 0040: A4 91 8A C1 FA 7B 10 EA DC C3 C7 1C 47 DC 97 32 ............G..2 0050: C0 37 80 1C F1 42 10 E3 74 17 FA 3E 60 4A B7 59 .7...B..t..>`J.Y 0060: 92 C1 E0 6F BB F1 BB 9F 82 89 B5 83 D5 AE 1E 90 ...o............ 0070: 0A 89 8D FB 4C C0 C5 9E DC C5 8C C6 2F EE D9 B4 ....L......./... 0080: 95 47 27 2E BE 82 31 6F 76 C0 DB 4C C8 0D 3B 7B .G'...1ov..L..;. 0090: D1 6A BF BD 3B 93 30 04 A2 9E 81 F7 96 28 77 F2 .j..;.0......(w. 00A0: 32 05 68 44 1F B3 30 CE 40 9F 20 F3 B4 2B AA E6 2.hD..0.@. ..+.. 00B0: 40 9B FB 7F 34 6E 3A 99 FD F8 28 F1 8C 9B 56 34 @...4n:...(...V4 00C0: 64 AD 4D 56 39 CB 96 18 50 9B 99 43 80 0A 39 A5 d.MV9...P..C..9. 00D0: 13 7A 6E C5 25 E0 95 4A 92 E5 A8 8B EE 03 49 B4 .zn.%..J......I. 00E0: D9 7C 00 E3 F0 3B A7 BA 40 30 CC 89 55 C6 97 93 .....;..@0..U... 00F0: B5 15 F6 62 D3 B1 74 9C 0B 80 2B 8A D4 03 84 A0 ...b..t...+..... ] *** https-jsse-nio-8443-exec-8, called closeOutbound() https-jsse-nio-8443-exec-8, closeOutboundInternal() %% Negotiating: [Session-21, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384] *** ServerHello, TLSv1.2 RandomCookie: GMT: 1551699704 bytes = { 109, 234, 190, 192, 92, 252, 194, 226, 139, 199, 97, 180, 252, 245, 38, 245, 60, 162, 4, 234, 76, 47, 39, 186, 171, 29, 139, 29 } Session ID: {92, 125, 15, 248, 93, 114, 159, 202, 158, 231, 130, 170, 240, 207, 79, 78, 139, 64, 227, 229, 102, 241, 205, 156, 132, 129, 45, 27, 166, 93, 182, 26} Cipher Suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 Compression Method: 0 Extension renegotiation_info, renegotiated_connection: <empty> *** Cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 *** Certificate chain chain [0] = [ [ Version: V3 Subject: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5 Key: Sun RSA public key, 2048 bits modulus: 21944740401167172627731583459321030363948627215746053925732477915060915436180167456469785746662093119306577380200747716284652995937004530444336851845029170241627465854006145050037178991946925696078563485570896673835545540824265905937881682387179314987285174428010940266412458943894800978345731524307952507729956745301047871771953945124256516782917326981125087548987889540650149121302888872237484100834740328828765018090383963294418357028839734723410564800765871733483849269364796949055153420777966213779145518299141217288017794394762274753999989298548507425930217302947589819396239489846633419099079578249651345685751 public exponent: 65537 Validity: [From: Fri May 30 08:43:19 GMT 2014, To: Mon May 27 08:43:19 GMT 2024] Issuer: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US SerialNumber: [ a6ef7a9a 5368eb27] Certificate Extensions: 3 [1]: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: 78 0D 96 9D FE D3 0B BE 8C C7 E3 EC 67 04 AB 4B x...........g..K 0010: EA E0 00 29 ...) ] ] [2]: ObjectId: 2.5.29.19 Criticality=false BasicConstraints:[ CA:true PathLen:2147483647 ] [3]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 78 0D 96 9D FE D3 0B BE 8C C7 E3 EC 67 04 AB 4B x...........g..K 0010: EA E0 00 29 ...) ] ] ] Algorithm: [SHA1withRSA] Signature: 0000: 19 16 5A 21 99 21 24 98 3C 0A E8 D8 00 AB 44 24 ..Z!.!$.<.....D$ 0010: F2 0C B7 83 D5 9F 96 17 87 E2 1F 1D A3 47 68 C7 .............Gh. 0020: 68 4A CB 56 0E 77 2B E8 1A 9F E7 09 A1 19 77 D0 hJ.V.w+.......w. 0030: 5E CC C1 B3 9A C4 35 3D CB E0 A5 A6 43 5D A3 26 ^.....5=....C].& 0040: A4 91 8A C1 FA 7B 10 EA DC C3 C7 1C 47 DC 97 32 ............G..2 0050: C0 37 80 1C F1 42 10 E3 74 17 FA 3E 60 4A B7 59 .7...B..t..>`J.Y 0060: 92 C1 E0 6F BB F1 BB 9F 82 89 B5 83 D5 AE 1E 90 ...o............ 0070: 0A 89 8D FB 4C C0 C5 9E DC C5 8C C6 2F EE D9 B4 ....L......./... 0080: 95 47 27 2E BE 82 31 6F 76 C0 DB 4C C8 0D 3B 7B .G'...1ov..L..;. 0090: D1 6A BF BD 3B 93 30 04 A2 9E 81 F7 96 28 77 F2 .j..;.0......(w. 00A0: 32 05 68 44 1F B3 30 CE 40 9F 20 F3 B4 2B AA E6 2.hD..0.@. ..+.. 00B0: 40 9B FB 7F 34 6E 3A 99 FD F8 28 F1 8C 9B 56 34 @...4n:...(...V4 00C0: 64 AD 4D 56 39 CB 96 18 50 9B 99 43 80 0A 39 A5 d.MV9...P..C..9. 00D0: 13 7A 6E C5 25 E0 95 4A 92 E5 A8 8B EE 03 49 B4 .zn.%..J......I. 00E0: D9 7C 00 E3 F0 3B A7 BA 40 30 CC 89 55 C6 97 93 .....;..@0..U... 00F0: B5 15 F6 62 D3 B1 74 9C 0B 80 2B 8A D4 03 84 A0 ...b..t...+..... ] *** , 153, 210, 203, 13, 184, 251, 168, 55, 87, 56, 147, 119 } Session ID: https-jsse-nio-8443-exec-3, WRITE: TLSv1.2 Handshake, length = 40 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1 https-jsse-nio-8443-exec-6, READ: TLSv1.2 Handshake, length = 134 %% Cached server session: [Session-17, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384] Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1.1 https-jsse-nio-8443-exec-2, READ: TLSv1 Handshake, length = 512 *** ClientHello, TLSv1.2 RandomCookie: GMT: -1000894146 bytes = { 254, 153, 12, 25, 187, 185, 72, 106, 24, 52, 177, 89, 57, 204, 113, 28, 171, 221, 60, 129, 76, 100, 152, 52, 187, 181, 67, 9 } Session ID: {92, 125, 15, 248, 109, 55, 116, 167, 27, 228, 106, 188, 55, 81, 119, 10, 225, 231, 251, 111, 24, 107, 135, 82, 189, 63, 153, 62, 46, 5, 125, 15} {92, 125, 15, 247, 188, 79, 171, 39, 143, 40, 158, 162, 235, 8, 205, 92, 188, 20, 0, 130, 247, 147, 227, 140, 94, 73, 165, 209, 150, 178, 61, 238} *** Diffie-Hellman ServerKeyExchange Cipher Suites: [Unknown 0x13:0x2, Unknown 0x13:0x3, Unknown 0x13:0x1, Unknown 0x13:0x4, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa9, Unknown 0xc0:0xad, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0xac, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa8, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xc0:0x9d, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9c, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xaa, Unknown 0xc0:0x9f, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9e, TLS_DHE_RSA_WITH_AES_128_CBC_SHA] Compression Methods: { 0 } Cipher Suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 Compression Method: 0 *** Diffie-Hellman ServerKeyExchange DH Modulus: { 255, 255, 255, 255, 255, 255, 255, 255, 201, 15, 218, 162, 33, 104, 194, 52, 196, 198, 98, 139, 128, 220, 28, 209, 41, 2, 78, 8, 138, 103, 204, 116, 2, 11, 190, 166, 59, 19, 155, 34, 81, 74, 8, 121, 142, 52, 4, 221, 239, 149, 25, 179, 205, 58, 67, 27, 48, 43, 10, 109, 242, 95, 20, 55, 79, 225, 53, 109, 109https-jsse-nio-8443-exec-1, WRITE: TLSv1.2 Application Data, length = 86 *** ClientKeyExchange, DH DH Public key: { 253, 20, 3, 219, 252, 53, 50, 189, 187, 201, 139, 74, 225, 255, 134, 23, 210, 216, 43, 154, 25, 143, 20, 122, 211, 219, 155, 33, 157, 238, 237, 29, 5, 10, 108, 141, 161, 172, 244, 133, 235, 69, 0, 132, 115, 112, 174, 154, 119, 102, 28, 127, 253, 85, 38, 229, 166, 230, 139, 195, 109, 178, 46, 77, 135, 157, 82, 122, 189, 143, 145, 254, 167, 180, 227, 36, 13, 16, 21, 2, 199, 157, 163, 119, 176, 251, 226, 22, 34, 56, 103, 96, 37, 107, 75, 164, 183, 249, 167, 119, 36, 214, 139, 13, 163, 60, 92, 149, 49, 125, 33, 89, 127, 37, 195, 185, 63, 50, 184, 239, 53, 127, 161, 102, 194, 227, 87, 246 } https-jsse-nio-8443-exec-8, READ: TLSv1.2 Alert, length = 26 https-jsse-nio-8443-exec-8, RECV TLSv1.2 ALERT: warning, close_notify https-jsse-nio-8443-exec-8, closeInboundInternal() https-jsse-nio-8443-exec-8, closeOutboundInternal() https-jsse-nio-8443-exec-8, SEND TLSv1.2 ALERT: warning, description = close_notify https-jsse-nio-8443-exec-8, WRITE: TLSv1.2 Alert, length = 26 https-jsse-nio-8443-exec-8, called closeOutbound() https-jsse-nio-8443-exec-8, closeOutboundInternal() SESSION KEYGEN: PreMaster Secret: 0000: 6C 5D D5 D5 FC B7 D1 F1 EC C1 E5 A5 57 05 1F 9C l]..........W... 0010: 09 60 EC 65 95 90 37 B7 F6 A1 35 BF 1E F5 04 9A .`.e..7...5..... 0020: 1B 1F C4 00 85 11 4C 36 D1 F2 FA A7 BE 31 FC 33 ......L6.....1.3 0030: 32 89 85 61 5F C8 CC 3E 60 60 8D 0F 44 77 B7 48 2..a_..>``..Dw.H 0040: 1A 5F 0B 98 78 8C 60 AE 56 60 50 E9 DF 93 6B 36 ._..x.`.V`P...k6 0050: 0F B4 56 00 F9 64 90 AB 0F 60 B2 09 99 32 BE 6A ..V..d...`...2.j 0060: 78 50 06 8C 4E 72 7F E7 DB 29 92 65 BE 22 99 ED xP..Nr...).e.".. 0070: A9 3C 20 3C C3 9D 74 A7 A7 F8 F7 F0 B6 3E 78 BE .< <..t......>x. CONNECTION KEYGEN: Client Nonce: 0000: 56 A5 95 FB 06 BD 68 82 47 01 06 21 B2 58 65 99 V.....h.G..!.Xe. 0010: 00 35 87 D8 9A 4D 2E 9A 3C 36 01 2C 85 64 F9 CD .5...M..<6.,.d.. Server Nonce: 0000: 5C 7D 0F F8 38 43 28 43 7D CE 03 06 55 9E C3 9D \...8C(C....U... 0010: 38 84 CF 50 7C 83 1B 84 C9 E6 45 50 2C 79 DC BF 8..P......EP,y.. Master Secret: 0000: E1 69 CD B4 49 22 EF 7F B5 32 4A 21 46 94 00 8A .i..I"...2J!F... 0010: 53 B0 78 96 50 23 1A AC 02 A8 4F C1 0F 13 0F 47 S.x.P#....O....G 0020: EC 31 1F A3 77 C3 F9 E7 9B 15 4E AD D5 03 EF CE .1..w.....N..... ... no MAC keys used for this cipher Client write key: 0000: FB B3 C9 94 05 76 C1 07 A2 56 44 85 D4 A3 0B FC .....v...VD..... 0010: 95 6B C7 16 37 D3 85 19 B7 5B D6 02 9F 81 79 FE .k..7....[....y. Server write key: 0000: 6F A7 83 37 F8 24 A8 64 B4 5D 89 E6 4B D3 CD 67 o..7.$.d.]..K..g 0010: EE D5 EC 0D 66 EA F0 8A F8 ED 5A AD 7A 06 F5 CE ....f.....Z.z... Client write IV: 0000: 10 BE 5B D2 ..[. Server write IV: 0000: 90 42 5B 0C .B[. , 81, 194, 69, 228, 133, 181, 118, 98Using SSLEngineImpl. Allow unsafe renegotiation: false Allow legacy hello messages: true Is initial handshake: true Is secure renegotiation: false Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1.1 https-jsse-nio-8443-exec-3, READ: TLSv1 Handshake, length = 512 *** ClientHello, TLSv1.2 RandomCookie: GMT: -1196724475 bytes = { 61, 95, 32, 72, 25, 236, 173, 125, 129, 111, 28, 117, 219, 234, 84, 151, 138, 176, 133, 115, 207, 76, 199, 69, 93, 115, 205, 68 } Session ID: {92, 125, 15, 248, 255, 251, 152, 32, 237, 6, 119, 199, 102, 42, 196, 20, 173, 44, 206, 23, 48, 86, 101, 236, 233, 56, 127, 32, 174, 100, 50, 88} Cipher Suites: [Unknown 0x13:0x2, Unknown 0x13:0x3, Unknown 0x13:0x1, Unknown 0x13:0x4, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa9, Unknown 0xc0:0xad, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0xac, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa8, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xc0:0x9d, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9c, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xaa, Unknown 0xc0:0x9f, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9e, TLS_DHE_RSA_WITH_AES_128_CBC_SHA] Extension renegotiation_info, renegotiated_connection: <empty> *** Unsupported extension status_request, data: 01:00:00:00:00 DH Modulus: { 255, 255, 255, 255, 255, 255, 255, 255, 201, 15, 218, 162, 33, 104, 194, 52, 196, 198, 98, 139, 128, 220, 28, 209, 41, 2, 78, 8, 138, 103, 204, 116, 2, 11, 190, 166, 59, 19, 155, 34, 81, 74, 8, 121, 142, 52, 4, 221, 239, 149, 25, 179, 205, 58, 67, 27, 48, 43, 10, 109, 242, 95, 20, 55, 79, 225, 53, 109, 109, 81, 194, 69, 228, 133, 181, 118, 98, 94, 126, 198, 244, 76, 66, 233, 166, 55, 237, 107, 11, 255, 92, 182, 244, 6, 183, 237, 238, 56, 107, 251, 90, 137, 159, 165, 174, 159, 36, 17, 124, 75, 31, 230, 73, 40, 102, 81, 236, 230, 83, 129, 255, 255, 255, 255, 255, 255, 255, 255 } DH Base: { 2 } Server DH Public Key: { 103, 42, 152, 168, 64, 109, 65, 217, 20, 106, 94, 196, 64, 251, 54, 130, 179, 224, 105, 20, 235, 124, 248, 140, 89, 165, 30, 195, 167, 54, 246, 154, 43, 16, 169, 0, 255, 130, 152, 191, 88, 75, 115, 176, 27, 156, 143, 100, 109, 21, 133, 184, 20, 154, 208, 50, 115, 76, 128, 186, 7, 72, 77, 217, 191, 152, 72, 74, 7, 165, 39, 226, 39, 21, 17, 195, 255, 2, 249, 191, 89, 245, 66, 162, 179, 156, 231, 47, 209, 196, 16, 213, 16, 7, 62, 196, 80, 195, 167, 138, 2, 159, 76, 122, 48, 125, 131, 137, 172, 11, 211, 146, 56, 180, 39, 137, 214, 78, 218, 198, 184, 86, 100, 184, 155, 208, 211, 36 } Signature Algorithm SHA256withRSA Signed with a DSA or RSA public key *** ServerHelloDone https-jsse-nio-8443-exec-5, WRITE: TLSv1.2 Handshake, length = 1697 Cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 *** Certificate chain chain [0] = [ [ Version: V3 Subject: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5 Key: Sun RSA public key, 2048 bits modulus: 21944740401167172627731583459321030363948627215746053925732477915060915436180167456469785746662093119306577380200747716284652995937004530444336851845029170241627465854006145050037178991946925696078563485570896673835545540824265905937881682387179314987285174428010940266412458943894800978345731524307952507729956745301047871771953945124256516782917326981125087548987889540650149121302888872237484100834740328828765018090383963294418357028839734723410564800765871733483849269364796949055153420777966213779145518299141217288017794394762274753999989298548507425930217302947589819396239489846633419099079578249651345685751 public exponent: 65537 Validity: [From: Fri May 30 08:43:19 GMT 2014, To: Mon May 27 08:43:19 GMT 2024] Issuer: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US SerialNumber: [ a6ef7a9a 5368eb27] Certificate Extensions: 3 [1]: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: 78 0D 96 9D FE D3 0B BE 8C C7 E3 EC 67 04 AB 4B x...........g..K 0010: EA E0 00 29 ...) ] ] [2]: ObjectId: 2.5.29.19 Criticality=false BasicConstraints:[ CA:true PathLen:2147483647 ] [3]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 78 0D 96 9D FE D3 0B BE 8C C7 E3 EC 67 04 AB 4B x...........g..K 0010: EA E0 00 29 ...) ] ] ] Algorithm: [SHA1withRSA] Signature: 0000: 19 16 5A 21 99 21 24 98 3C 0A E8 D8 00 AB 44 24 ..Z!.!$.<.....D$ 0010: F2 0C B7 83 D5 9F 96 17 87 E2 1F 1D A3 47 68 C7 .............Gh. 0020: 68 4A CB 56 0E 77 2B E8 1A 9F E7 09 A1 19 77 D0 hJ.V.w+.......w. 0030: 5E CC C1 B3 9A C4 35 3D CB E0 A5 A6 43 5D A3 26 ^.....5=....C].& 0040: A4 91 8A C1 FA 7B 10 EA DC C3 C7 1C 47 DC 97 32 ............G..2 0050: C0 37 80 1C F1 42 10 E3 74 17 FA 3E 60 4A B7 59 .7...B..t..>`J.Y 0060: 92 C1 E0 6F BB F1 BB 9F 82 89 B5 83 D5 AE 1E 90 ...o............ 0070: 0A 89 8D FB 4C C0 C5 9E DC C5 8C C6 2F EE D9 B4 ....L......./... 0080: 95 47 27 2E BE 82 31 6F 76 C0 DB 4C C8 0D 3B 7B .G'...1ov..L..;. 0090: D1 6A BF BD 3B 93 30 04 A2 9E 81 F7 96 28 77 F2 .j..;.0......(w. 00A0: 32 05 68 44 1F B3 30 CE 40 9F 20 F3 B4 2B AA E6 2.hD..0.@. ..+.. 00B0: 40 9B FB 7F 34 6E 3A 99 FD F8 28 F1 8C 9B 56 34 @...4n:...(...V4 00C0: 64 AD 4D 56 39 CB 96 18 50 9B 99 43 80 0A 39 A5 d.MV9...P..C..9. 00D0: 13 7A 6E C5 25 E0 95 4A 92 E5 A8 8B EE 03 49 B4 .zn.%..J......I. 00E0: D9 7C 00 E3 F0 3B A7 BA 40 30 CC 89 55 C6 97 93 .....;..@0..U... 00F0: B5 15 F6 62 D3 B1 74 9C 0B 80 2B 8A D4 03 84 A0 ...b..t...+..... ] *** Compression Methods: { 0 } Unsupported extension status_request, data: 01:00:00:00:00 Extension elliptic_curves, curve names: {secp256r1, secp384r1, secp521r1, unknown curve 29, unknown curve 256, unknown curve 257, unknown curve 258, unknown curve 259, unknown curve 260} Extension ec_point_formats, formats: [uncompressed] Extension signature_algorithms, signature_algorithms: SHA256withRSA, Unknown (hash:0x8, signature:0x9), Unknown (hash:0x8, signature:0x4), SHA256withECDSA, Unknown (hash:0x8, signature:0x7), SHA384withRSA, Unknown (hash:0x8, signature:0xa), Unknown (hash:0x8, signature:0x5), SHA384withECDSA, SHA512withRSA, Unknown (hash:0x8, signature:0xb), Unknown (hash:0x8, signature:0x6), SHA512withECDSA, SHA1withRSA, SHA1withECDSA Unsupported extension type_35, data: Unsupported extension type_51, data: 00:69:00:17:00:41:04:ae:1d:20:1e:7f:15:41:01:04:8a:a6:07:87:c1:10:c4:88:20:bb:bc:8f:dd:29:77:bb:a0:76:b8:bc:b6:ff:c9:6b:cf:81:f2:4e:ad:59:95:28:00:ae:74:26:02:a3:74:49:4c:1b:ff:05:27:be:f0:bd:f8:f1:e4:f6:8f:44:b0:00:1d:00:20:aa:12:a9:e9:be:2c:47:22:72:36:db:57:8d:37:fb:e6:76:11:9e:59:4a:ab:dc:47:9d:fb:28:9f:66:7e:64:32 Unsupported extension type_43, data: 08:03:04:03:03:03:02:03:01 Extension renegotiation_info, renegotiated_connection: <empty> Extension server_name, server_name: [type=host_name (0), value=localhost] Unsupported extension type_45, data: 02:01:00 Unsupported extension type_28, data: 40:00 Unsupported extension type_21, data: 00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00 *** %% Initialized: [Session-22, SSL_NULL_WITH_NULL_NULL] Standard ciphersuite chosen: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 %% Negotiating: [Session-22, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384] *** ServerHello, TLSv1.2 RandomCookie: GMT: 1551699705 bytes = { 204, 25, 57, 28, 190, 153, 133, 111, 84, 48, 144, 69, 140, 142, 39, 228, 176, 97, 131, 72, 51, 144, 32, 71, 93, 7, 66, 222 } Session ID: {92, 125, 15, 249, 156, 49, 93, 110, 51, 118, 78, 147, 13, 67, 50, 119, 4, 139, 247, 123, 140, 61, 206, 121, 197, 180, 71, 56, 123, 67, 20, 120} Cipher Suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 Compression Method: 0 Extension renegotiation_info, renegotiated_connection: <empty> *** Cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 *** Certificate chain chain [0] = [ [ Version: V3 Subject: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5 Key: Sun RSA public key, 2048 bits modulus: 21944740401167172627731583459321030363948627215746053925732477915060915436180167456469785746662093119306577380200747716284652995937004530444336851845029170241627465854006145050037178991946925696078563485570896673835545540824265905937881682387179314987285174428010940266412458943894800978345731524307952507729956745301047871771953945124256516782917326981125087548987889540650149121302888872237484100834740328828765018090383963294418357028839734723410564800765871733483849269364796949055153420777966213779145518299141217288017794394762274753999989298548507425930217302947589819396239489846633419099079578249651345685751 public exponent: 65537 Validity: [From: Fri May 30 08:43:19 GMT 2014, To: Mon May 27 08:43:19 GMT 2024] Issuer: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US SerialNumber: [ a6ef7a9a 5368eb27] Certificate Extensions: 3 [1]: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: 78 0D 96 9D FE D3 0B BE 8C C7 E3 EC 67 04 AB 4B x...........g..K 0010: EA E0 00 29 ...) ] ] [2]: ObjectId: 2.5.29.19 Criticality=false BasicConstraints:[ CA:true PathLen:2147483647 ] [3]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 78 0D 96 9D FE D3 0B BE 8C C7 E3 EC 67 04 AB 4B x...........g..K 0010: EA E0 00 29 ...) ] ] ] Algorithm: [SHA1withRSA] Signature: 0000: 19 16 5A 21 99 21 24 98 3C 0A E8 D8 00 AB 44 24 ..Z!.!$.<.....D$ 0010: F2 0C B7 83 D5 9F 96 17 87 E2 1F 1D A3 47 68 C7 .............Gh. 0020: 68 4A CB 56 0E 77 2B E8 1A 9F E7 09 A1 19 77 D0 hJ.V.w+.......w. 0030: 5E CC C1 B3 9A C4 35 3D CB E0 A5 A6 43 5D A3 26 ^.....5=....C].& 0040: A4 91 8A C1 FA 7B 10 EA DC C3 C7 1C 47 DC 97 32 ............G..2 0050: C0 37 80 1C F1 42 10 E3 74 17 FA 3E 60 4A B7 59 .7...B..t..>`J.Y 0060: 92 C1 E0 6F BB F1 BB 9F 82 89 B5 83 D5 AE 1E 90 ...o............ 0070: 0A 89 8D FB 4C C0 C5 9E DC C5 8C C6 2F EE D9 B4 ....L......./... 0080: 95 47 27 2E BE 82 31 6F 76 C0 DB 4C C8 0D 3B 7B .G'...1ov..L..;. 0090: D1 6A BF BD 3B 93 30 04 A2 9E 81 F7 96 28 77 F2 .j..;.0......(w. 00A0: 32 05 68 44 1F B3 30 CE 40 9F 20 F3 B4 2B AA E6 2.hD..0.@. ..+.. 00B0: 40 9B FB 7F 34 6E 3A 99 FD F8 28 F1 8C 9B 56 34 @...4n:...(...V4 00C0: 64 AD 4D 56 39 CB 96 18 50 9B 99 43 80 0A 39 A5 d.MV9...P..C..9. 00D0: 13 7A 6E C5 25 E0 95 4A 92 E5 A8 8B EE 03 49 B4 .zn.%..J......I. 00E0: D9 7C 00 E3 F0 3B A7 BA 40 30 CC 89 55 C6 97 93 .....;..@0..U... 00F0: B5 15 F6 62 D3 B1 74 9C 0B 80 2B 8A D4 03 84 A0 ...b..t...+..... ] *** *** Diffie-Hellman ServerKeyExchange DH Modulus: { 255, 255, 255, 255, 255, 255, 255, 255, 201, 15, 218, 162, 33, 104, 194, 52, 196, 198, 98, 139, 128, 220, 28, 209, 41, 2, 78, 8, 138, 103, 204, 116, 2, 11, 190, 166, 59, 19, 155, 34, 81, 74, 8, 121, 142, 52, 4, 221, 239, 149, 25, 179, 205, 58, 67, 27, 48, 43, 10, 109, 242, 95, 20, 55, 79, 225, 53, 109, 109, 81, 194, 69, 228, 133, 181, 118, 98, 94, 126, 198, 244, 76, 66, 233, 166, 55, 237, 107, 11, 255, 92, 182, 244, 6, 183, 237, 238, 56, 107, 251, 90, 137, 159, 165, 174, 159, 36, 17, 124, 75, 31, 230, 73, 40, 102, 81, 236, 230, 83, 129, 255, 255, 255, 255, 255, 255, 255, 255 } DH Base: { 2 } Server DH Public Key: { 77, 250, 115, 255, 158, 162, 134, 243, 145, 127, 132, 169, 47, 112, 101, 147, 47, 242, 70, 29, 191, 69, 122, 103, 65, 251, 5, 125, 98, 20, 127, 245, 186, 49, 255, 59, 255, 94, 0, 180, 56, 116, 20, 172, 120, 139, 118, 235, 175, 217, 145, 150, 250, 116, 45, 167, 121, 29, 120, 200, 8, 44, 131, 182, 148, 44, 126, 186, 167, 4, 25, 41, 136, 3, 180, 61, 243, 186, 181, 95, 105, 111, 55, 113, 3, 219, 120, 64, 122, 206, 149, 19, 151, 252, 43, 68, 98, 80, 129, 72, 207, 87, 221, 253, 175, 236, 175, 102, 6, 81, 43, 37, 64, 71, 99, 44, 232, 145, 75, 233, 45, 115, 58, 186, 207, 82, 249, 15 } Signature Algorithm SHA256withRSA Signed with a DSA or RSA public key *** ServerHelloDone https-jsse-nio-8443-exec-10, WRITE: TLSv1.2 Handshake, length = 1697 , 94, 126, 198, 244, 76, 66, 233, https-jsse-nio-8443-exec-6, READ: TLSv1.2 Change Cipher Spec, length = 1 166, 55, 237, 107, 11, 255, 92, 182, 244, 6, 183https-jsse-nio-8443-exec-9, READ: TLSv1.2 Handshake, length = 134 Extension elliptic_curves, curve names: {secp256r1, secp384r1, secp521r1, unknown curve 29, unknown curve 256, unknown curve 257, unknown curve 258, unknown curve 259, unknown curve 260} Extension ec_point_formats, formats: [uncompressed] Extension signature_algorithms, signature_algorithms: SHA256withRSA, Unknown (hash:0x8, signature:0x9), Unknown (hash:0x8, signature:0x4), SHA256withECDSA, Unknown (hash:0x8, signature:0x7), SHA384withRSA, Unknown (hash:0x8, signature:0xa), Unknown (hash:0x8, signature:0x5), SHA384withECDSA, SHA512withRSA, Unknown (hash:0x8, signature:0xb), Unknown (hash:0x8, signature:0x6), SHA512withECDSA, SHA1withRSA, SHA1withECDSA , Unsupported extension type_35, data: Unsupported extension type_51, data: 00:69:00:17:00:41:04:7a:4b:59:e0:3f:89:fe:a2:92:9a:49:d0:79:5b:65:36:6d:53:e3:8e:04:5f:e7:75:9b:40:02:8b:42:6b:c6:66:38:86:db:fd:11:30:c3:03:03:ba:66:11:76:fd:9f:23:f1:7f:66:65:74:d2:fb:22:8e:3c:61:71:53:ee:1b:95:00:1d:00:20:26:fe:45:5e:87:7c:8e:7b:0a:0a:42:03:a4:cd:da:e1:cf:0f:ec:f2:08:ff:85:aa:53:8e:c6:67:9d:06:67:46 Unsupported extension type_43, data: 08:03:04:03:03:03:02:03:01 Extension renegotiation_info, renegotiated_connection: <empty> https-jsse-nio-8443-exec-6, READ: TLSv1.2 Handshake, length = 40 *** ClientKeyExchange, DH DH Public key: { 61, 86, 33, 94, 36, 18, 117, 156, 252, 115, 157, 160, 96, 128, 241, 243, 26, 159, 177, 195, 234, 71, 240, 227, 47, 180, 254, 39, 19, 6, 38, 34, 3, 31, 230, 132, 39, 237Extension server_name, server_name: [type=host_name (0), value=localhost] Unsupported extension type_45, data: 02:01:00 Unsupported extension type_28, data: 40:00 Unsupported extension type_21, data: 00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00 *** https-jsse-nio-8443-exec-7, READ: TLSv1.2 Handshake, length = 134 10, 85, 19, 223, 208, 14, 110, 241, 86, 166, 62, 171, 94, 66, 84, 67, 104, 251, 135, 12, 192, 229, 168, 49, 117, 195, 255, 167, 32, 214, 69, 4, 239, 22, 24, 231, 226, 67, 55, 156, 170, 35, 63, 115, 149, 250, 237, 70, 234, 229, 249, 97, 234, 107, 48, 43, 93, 24, 9, 200, 20, 112, 97, 191, 242, 224, 181, 207, 177, 11, 208, 15, 235, 85, 66, 23, 71, 235, 84, 90, 210, 13, 198, 241, 64, 164, 188, 108, 98, 6, 16 } *** Finished %% Initialized: [Session-23, SSL_NULL_WITH_NULL_NULL] SESSION KEYGEN: PreMaster Secret: 0000: FC AB C1 F0 2E 3A C1 15 10 50 A0 8C 5D 06 F5 4A .....:..Standard ciphersuite chosen: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 *** Diffie-Hellman ServerKeyExchange DH Modulus: { 255, 255, 255, 255, 255, 255, 255, 255, 201, 15, 218, 162, 33, 104, 194, 52, 196, 198, 98, 139, 128, 220, 28, 209, 41, 2, 78, 8, 138, 103, 204, 116, 2, 11, 190, 166, 59, 19, 155, 34, 81, 74, 8, 121, 142, 52, 4, 221, 239, 149, 25, 179, 205, 58, 67, 27, 48, 43, 10, 109, 242, 95, 20, 55, 79, 225, 53, 109, 109, 81, 194, 69, 228, 133, 181, 118, 98, 94, 126, 198, 244, 76, 66, 233, 166, 55, 237, , 238, 56, 107, 251, 90, 137, 159, 165, 174, 159, 36, 17, 124, 75, 31, 230, 73, 40, 102, 81, 236, 230, 83, 129, 255, 255, 255, 255, 255, 255, 255, 255 } 107, 11, 255, 92, 182, 244, 6, 183, 237, 238, 56, 107, 251, 90, 137verify_data: { 122, %% Negotiating: [Session-23, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384] *** ClientKeyExchange, DH DH Public key: { 47, 87, 194, *** ServerHello, TLSv1.2 RandomCookie: GMT: 1551699705 bytes = { 250.P, 48, 14, 193, 162, 75, 163, 168, 196, 156, 48, 44, 228, 87, 188, 223, 120, 158, 189, 93, 195, 204, 44, 172, 37, 72, 184, 215 } Session ID: 49, 214, 198, 144, 158, 209, 175, 196, 39, 130, 227, 13, 10, 218, 180, 237, 28, 98, 97, 126, 71, 62, 247, 172, 72, 136, 105, 201, 18, 246, 112, 15, 114, 89, 74, 144, 233, 80, 62, 159, 13, 68, 24, 53, 247, 254, 223, 139, 133, 20, 191, 255, 114, 123, 134, 24, 178, 124, 11, 52, 36, 1, 187, 174, 26, 142, 18, 112, 39, 173, 32, 194, 224, 109, 80, 54, 102, 172, 15, 134, 46, 206, 229, 165, 149, 237, 7, 15, 221, 38, 187, 214, 196, 30, 177, 88, 68, 148, 39, 191, 133, 157, 58, 144, 228, 195, 241, 115, 247, 68, 112, 80, 126, 93, 244, 150, 139, 134, 181, 214, 119, 179, 85, 22, 10488, 128, , 159, 165, 174, 159, 36, 17, 124, 75, 31, 230, 73, 40, 102, 81, 236, 230, 83, 129, 255, 255DH Base: { 2 } , 255, 255, 255, 255, 255, 255 } 99, 24, 98, 69, 215, 48, 102, 21, 208 } *** } {92, 125, 15, 249, 66, 246, 149, 109, 237, 108, 197, 152, 185, 217, 183, 10, 51, 192, 241, 212, 4, 203, 186, 66, 179, 248, 130, 74, 46, 249, 186, 24} Cipher Suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 Compression Method: 0 Extension renegotiation_info, renegotiated_connection: <empty> *** Cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 *** Certificate chain chain [0] = [ [ Version: V3 Subject: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5 Key: Sun RSA public key, 2048 bits modulus: 21944740401167172627731583459321030363948627215746053925732477915060915436180167456469785746662093119306577380200747716284652995937004530444336851845029170241627465854006145050037178991946925696078563485570896673835545540824265905937881682387179314987285174428010940266412458943894800978345731524307952507729956745301047871771953945124256516782917326981125087548987889540650149121302888872237484100834740328828765018090383963294418357028839734723410564800765871733483849269364796949055153420777966213779145518299141217288017794394762274753999989298548507425930217302947589819396239489846633419099079578249651345685751 public exponent: 65537 Validity: [From: Fri May 30 08:43:19 GMT 2014, To: Mon May 27 08:43:19 GMT 2024] Issuer: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US SerialNumber: [ a6ef7a9a 5368eb27] Certificate Extensions: 3 [1]: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: 78 0D 96 9D FE D3 0B BE 8C C7 E3 EC 67 04 AB 4B x...........g..K 0010: EA E0 00 29 ...) ] ] [2]: ObjectId: 2.5.29.19 Criticality=false BasicConstraints:[ CA:true PathLen:2147483647 ] [3]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 78 0D 96 9D FE D3 0B BE 8C C7 E3 EC 67 04 AB 4B x...........g..K 0010: EA E0 00 29 ...) ] ] ] Algorithm: [SHA1withRSA] Signature: 0000: 19 16 5A 21 99 21 24 98 3C 0A E8 D8 00 AB 44 24 ..Z!.!$.<.....D$ 0010: F2 0C B7 83 D5 9F 96 17 87 E2 1F 1D A3 47 68 C7 .............Gh. 0020: 68 4A CB 56 0E 77 2B E8 1A 9F E7 09 A1 19 77 D0 hJ.V.w+.......w. 0030: 5E CC C1 B3 9A C4 35 3D CB E0 A5 A6 43 5D A3 26 ^.....5=....C].& 0040: A4 91 8A C1 FA 7B 10 EA DC C3 C7 1C 47 DC 97 32 ............G..2 0050: C0 37 80 1C F1 42 10 E3 74 17 FA 3E 60 4A B7 59 .7...B..t..>`J.Y 0060: 92 C1 E0 6F BB F1 BB 9F 82 89 B5 83 D5 AE 1E 90 ...o............ 0070: 0A 89 8D FB 4C C0 C5 9E DC C5 8C C6 2F EE D9 B4 ....L......./... 0080: 95 47 27 2E BE 82 31 6F 76 C0 DB 4C C8 0D 3B 7B .G'...1ov..L..;. 0090: D1 6A BF BD 3B 93 30 04 A2 9E 81 F7 96 28 77 F2 .j..;.0......(w. 00A0: 32 05 68 44 1F B3 30 CE 40 9F 20 F3 B4 2B AA E6 2.hD..0.@. ..+.. 00B0: 40 9B FB 7F 34 6E 3A 99 FD F8 28 F1 8C 9B 56 34 @...4n:...(...V4 00C0: 64 AD 4D 56 39 CB 96 18 50 9B 99 43 80 0A 39 A5 d.MV9...P..C..9. 00D0: 13 7A 6E C5 25 E0 95 4A 92 E5 A8 8B EE 03 49 B4 .zn.%..J......I. 00E0: D9 7C 00 E3 F0 3B A7 BA 40 30 CC 89 55 C6 97 93 .....;..@0..U... 00F0: B5 15 F6 62 D3 B1 74 9C 0B 80 2B 8A D4 03 84 A0 ...b..t...+..... ] *** https-jsse-nio-8443-exec-6, WRITE: TLSv1.2 Change Cipher Spec, length = 1 *** Finished verify_data: { 223, 216, 252, 93, 191, 46, 148, 98, 113, 220, 195, 207 } *** SESSION KEYGEN: PreMaster Secret: 0000: AE F5 0F 99 A7 0C FB 48 51 BE 43 FB 3B 03 DD 5B .......HQ.C.;..[ 0010: 5F B2 CB 4B 0A F7 61 0D 3C A6 A2 1B 84 5D FB E1 _..K..a.<....].. 0020: AB F7 3B BC F0 B2 56 FF 20 B7 75 7D 6C 59 71 57 ..;...V. .u.lYqW 0030: 16 98 D8 E7 CB 6B 6C FC 5E 37 B8 31 61 51 63 D1 .....kl.^7.1aQc. 0040: AD BE 0F 25 F6 9E 30 A2 FC F1 08 73 E6 DC 92 8E ...%..0....s.... 0050: 4D A5 98 A3 20 3E 95 9F B6 94 D2 61 08 D9 53 E3 M... >.....a..S. 0060: CF 2F 5F 30 08 34 66 E9 9D 3E 3C E6 15 56 3F 16 ./_0.4f..><..V?. 0070: 86 D8 64 93 0C EB F7 67 54 55 9D FD 16 8C 38 2D ..d....gTU....8- ..]..J 0010: 69 FD 41 7C 76 1D BB EA D5 88 2C 74 F6 C2 56 7F i.A.v.....,t..V. 0020: 1F EA DF 1A 6E 75 62 05 56 52 7D 4E 37 AA 42 E9 ....nub.VR.N7.B. 0030: DC E3 EE AC 13 00 7C 43 8A 27 3C 14 DF EE FB 17 .......C.'<..... 0040: A2 23 BB 99 48 32 E3 60 3E F4 CC 29 24 D7 85 0E .#..H2.`>..)$... 0050: A7 9B BE 71 CB 66 31 39 34 17 60 7A 1F 2C F1 4F ...q.f194.`z.,.O 0060: F6 B3 5C 29 19 60 94 B3 69 14 AD A1 8C 0D C1 16 ..\).`..i....... 0070: FD B8 F9 CB 98 F0 B1 32 22 6D 65 75 4E 74 59 E9 .......2"meuNtY. CONNECTION KEYGEN: Client Nonce: 0000: AF 8D 60 53 1C 01 0F E3 24 46 78 59 06 22 0B F6 ..`S....$FxY.".. 0010: FA 06 51 52 2C 2E 01 3A 55 52 35 D6 6B 64 75 7F ..QR,..:UR5.kdu. Server Nonce: 0000: 5C 7D 0F F8 AD 31 70 DD 81 D4 2C FC 49 4A 35 75 \....1p...,.IJ5u 0010: 4F F7 97 8A 99 D2 CB 0D B8 FB A8 37 57 38 93 77 O..........7W8.w Master Secret: 0000: 33 2F B7 5B B2 5A 3B D3 44 15 BA 34 F8 D2 B3 B8 3/.[.Z;.D..4.... 0010: 08 60 96 30 69 44 14 D3 D5 E0 90 D4 79 05 D7 E8 .`.0iD......y... 0020: 78 BB 57 FB 52 C0 39 75 B5 CF 08 71 35 24 08 D3 x.W.R.9u...q5$.. ... no MAC keys used for this cipher Client write key: 0000: 0F FA 31 1B EF CB 52 02 F6 5A DA F8 05 E1 98 EE ..1...R..Z...... 0010: 95 02 6B A7 60 06 79 CE 76 AC EB 81 FB 81 53 23 ..k.`.y.v.....S# Server write key: 0000: F4 FC 5A 05 71 79 77 D1 23 20 61 65 33 F2 EA 9E ..Z.qyw.# ae3... 0010: 69 56 91 27 11 2F F5 B4 CF E2 9C 15 0B 1C 64 FE iV.'./........d. Client write IV: 0000: 19 C2 33 05 ..3. Server write IV: 0000: FE 06 B6 4F ...O DH Base: { 2 } Server DH Public Key: { 115, 74, 21https-jsse-nio-8443-exec-7, READ: TLSv1.2 Change Cipher Spec, length = 1 https-jsse-nio-8443-exec-7, READ: TLSv1.2 Handshake, length = 40 Server DH Public Key: { 208, 17, 38, 228, 101, 198, 125, 41, 178, 235, 193, 46, 230, 55, 107, 149, 65, 139, 144, 71, 115, 115, 166, 74, 48, 151, 160, 227, 160, 233, 247, 202, 57, 202, 253, 53, 216, 187, 215, 177, 114, 191, 29, 62, 211, 238, 176, 74, 137, 209, 75, 106, 76, 55, 159, 191, 136, 144, 149, 246, 165, 238, 64, 219, 183, 78, 1, 32, 98, 229, 56, 115, 27, 89, 37, 178, 151, 39, 133, 90, 246, 249, 83, 252, 186, 253, 124, 99, 195, 221, 211, 163, 231, 146, 52, 193, 97, 205, 36, 208, 115, 57, 18, 188, 225, 188, 152, 110, 170, 24, 154, 163, 231, 111, 201, 147, 66, 146, 227, 168, 245, 202, 76, 70, 240, 158, 31, 131 } https-jsse-nio-8443-exec-6, WRITE: TLSv1.2 Handshake, length = 40 , 188, 54, 121, 133, 246, 247, 93, 13, 95, 70, 46, 205, 57, 98, 134, 68, 35, 57, 146, 188, 113, 18, 171, 39, 32, 20, 208, 212, 161, 140, 146, 234, 135, 210, 59, 107, 183, 201, 247, 97, 23, 153, 131, 99, 89, 23, 56, 109, 106, 172, 210, 149, 31, 111, 127, 151, 93, 75, 199, 116, 251, 207, 49, 25, 138, 176, 239, 195, 106, 136, 207, 9, 58, 73, 88, 220, 217, 5, 163, 40, 27, 203, 192, 194, 103, 139, 177, 117, 110, 1, 97, 121, 65, 221, 119, 117, 177, 76, 79, 220, 253, 23, 157, 111, 96, 88, 51, 194, 7, 56, 121, 101, 120, 3, 94, 212, 251, 91, 44, 129, 200, 33, 217, 175, 123 } *** Diffie-Hellman ServerKeyExchange DH Modulus: { 255, 255, 255, 255, 255, 255, 255, 255, 201, 15, 218, 162, 33, 104, 194, 52, 196, 198, 98, 139, 128, 220, 28, 209, 41, 2, 78, 8, 138, 103, 204, 116, 2, 11, 190, 166, 59, 19, 155, 34, 81, 74, 8, 121, 142, 52, 4, 221, 239, 149, 25, 179, 205, 58, 67, 27, 48, 43, 10, 109, 242, 95, 20, 55, 79, 225, 53, 109, 109, 81, 194, 69, 228, 133, 181, 118, 98, 94, 126, 198, 244, 76, 66, 233, 166, 55, 237, 107, 11, 255, 92, 182, 244, 6, 183, 237, 238, 56, 107, 251, 90, 137, 159, 165, 174, 159, 36, 17, 124, 75, 31, 230, 73, 40, 102, 81, 236, 230, 83, 129, 255, 255, 255, 255, 255, 255, 255, 255 } DH Base: { 2 } Server DH Public Key: { 154, 87, 177, 142, 48, 5CONNECTION KEYGEN: Client Nonce: 0000: C1 1D 4D 3E 4C D4 14 8A A4 FB A5 C4 6F 42 D2 1F ..M>L.......oB.. 0010: 1B B2 24 95 3F 85 28 6C 52 5E 04 79 FA D1 46 82 ..$.?.(lR^.y..F. Server Nonce: 0000: 5C 7D 0F F8 EE 5C 43 A0 C5 A3 21 62 3B 43 3F E7 \....\C...!b;C?. 0010: E0 A5 F4 E2 D1 39 52 48 FA 1F 6D CE 32 EA B6 6D .....9RH..m.2..m Master Secret: 0000: 44 AC 53 B7 18 19 88 ED 22 80 B4 1B C2 FB 42 EA D.S.....".....B. 0010: BF 39 AC 72 AA D9 CB 44 1C D1 CD 46 AD 20 64 05 .9.r...D...F. d. 0020: AF 7F C5 7B CD 8E 79 64 90 87 D1 1B F1 90 46 52 ......yd......FR ... no MAC keys used for this cipher Client write key: 0000: FA E9 25 D6 85 B7 51 C2 19 F4 63 1C 64 80 53 62 ..%...Q...c.d.Sb 0010: F7 15 74 41 A0 6B 0F 8D 8D D6 F6 20 A8 89 CF 50 ..tA.k..... ...P Server write key: 0000: 5C BA EE 2C 4A 85 5F 9A FC E5 3C B6 98 46 E5 E2 \..,J._...<..F.. 0010: 4E 0E 4A 80 A0 61 01 E4 DB F1 57 89 A4 F1 E2 EB N.J..a....W..... Client write IV: 0000: 25 84 F2 B7 %... Server write IV: 0000: 09 0D F9 39 ...9 , 194, 205, 198, 28, 45, 232, 68, 168, 15, 10, 5, 15, 9, 144, 147, 71, 51, 229, 238, 161, 41, 144, 87, 55, 25, 133, 246, 218, 233, 111, 177, 159, 12, 211, 153, 69, 129, 200, 72, 252, 135, 192, 67, 166, 140, 170, 226, 86, 243, 141, 28, 170, 119, 153, 100, 20, 132, 138, 225, 11, 48, 27, 24, 160, 162, 121, 223, 102, 211, 166, 188, 67, 59, 16, 189, 148, 73, 34, 194, 10, 124, 32, 168, 205, 19, 94, 152, 146, 171, 181, 119, 43, 153, 171, 168, 115, 0, 44, 233, 184, 138, 142, 133, 203, 202, 255, 154, 144, 190, 64, 69, 234, 169, 208, 227, 200, 128, 37, 104, 134, 25, 143 } Signature Algorithm SHA256withRSA Signed with a DSA or RSA public key %% Cached server session: [Session-18, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384] *** ServerHelloDone Signature Algorithm SHA256withRSA Signed with a DSA or RSA public key *** Finished verify_data: { 116, 168, 193, 253, 136, 48, 190, 50, 146, 185, 99, 134 } *** https-jsse-nio-8443-exec-7, WRITE: TLSv1.2 Change Cipher Spec, length = 1 *** Finished verify_data: { 90, 44, 18, 39, 244, 134, 236, 207, 244, 152, 27, 182 } *** *** ServerHelloDone https-jsse-nio-8443-exec-4, WRITE: TLSv1.2 Handshake, length = 1697 https-jsse-nio-8443-exec-7, WRITE: TLSv1.2 Handshake, length = 40 %% Cached server session: [Session-20, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384] Signature Algorithm SHA256withRSA https-jsse-nio-8443-exec-9, READ: TLSv1.2 Change Cipher Spec, length = 1 https-jsse-nio-8443-exec-5, WRITE: TLSv1.2 Application Data, length = 86 https-jsse-nio-8443-exec-1, WRITE: TLSv1.2 Application Data, length = 85 https-jsse-nio-8443-exec-9, READ: TLSv1.2 Handshake, length = 40 Signed with a DSA or RSA public key *** ServerHelloDone https-jsse-nio-8443-exec-2, WRITE: TLSv1.2 Handshake, length = 1697 Using SSLEngineImpl. Allow unsafe renegotiation: false Allow legacy hello messages: true Is initial handshake: true Is secure renegotiation: false Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1.1 https-jsse-nio-8443-exec-3, WRITE: TLSv1.2 Handshake, length = 1697 Using SSLEngineImpl. Allow unsafe renegotiation: false Allow legacy hello messages: true Is initial handshake: true Is secure renegotiation: false Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1.1 https-jsse-nio-8443-exec-3, READ: TLSv1 Handshake, length = 512 *** ClientHello, TLSv1.2 RandomCookie: GMT: 68580738 bytes = { 100, 106, 244, 167, 67, 93, 213, 76, 233, 9, 110, 199, 43, 29, 208, 166, 188, 48, 47, 237, 8, 192, 9, 54, 150, 220, 184, 135 } Session ID: {92, 125, 15, 248, 109, 55, 116, 167, 27, 228, 106, 188, 55, 81, 119, 10, 225, 231, 251, 111, 24, 107, 135, 82, 189, 63, 153, 62, 46, 5, 125, 15} Cipher Suites: [Unknown 0x13:0x2, Unknown 0x13:0x3, Unknown 0x13:0x1, Unknown 0x13:0x4, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa9, Unknown 0xc0:0xad, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0xac, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa8, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xc0:0x9d, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9c, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xaa, Unknown 0xc0:0x9f, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9e, TLS_DHE_RSA_WITH_AES_128_CBC_SHA] Compression Methods: { 0 } Unsupported extension status_request, data: 01:00:00:00:00 Extension elliptic_curves, curve names: {secp256r1, secp384r1, secp521r1, unknown curve 29, unknown curve 256, unknown curve 257, unknown curve 258, unknown curve 259, unknown curve 260} Extension ec_point_formats, formats: [uncompressed] Extension signature_algorithms, signature_algorithms: SHA256withRSA, Unknown (hash:0x8, signature:0x9), Unknown (hash:0x8, signature:0x4), SHA256withECDSA, Unknown (hash:0x8, signature:0x7), SHA384withRSA, Unknown (hash:0x8, signature:0xa), Unknown (hash:0x8, signature:0x5), SHA384withECDSA, SHA512withRSA, Unknown (hash:0x8, signature:0xb), Unknown (hash:0x8, signature:0x6), SHA512withECDSA, SHA1withRSA, SHA1withECDSA Unsupported extension type_35, data: Unsupported extension type_51, data: 00:69:00:17:00:41:04:b6:3c:6e:85:dd:c8:67:2f:78:e1:86:28:58:99:07:25:f3:e1:34:e5:80:2d:ea:f2:c1:be:14:34:95:41:0b:cb:be:5e:08:cb:16:63:f8:5a:b4:4e:f6:a6:0f:67:17:3b:49:5a:cb:1f:33:a9:df:56:59:21:ab:ab:07:39:8d:ec:00:1d:00:20:b4:7d:7b:89:ea:f6:5d:f1:d2:a6:2b:25:5e:68:de:5e:67:55:1a:f6:a9:2a:45:ad:ae:12:fb:16:bf:9e:5d:72 Unsupported extension type_43, data: 08:03:04:03:03:03:02:03:01 Extension renegotiation_info, renegotiated_connection: <empty> Extension server_name, server_name: [type=host_name (0), value=localhost] Unsupported extension type_45, data: 02:01:00 Unsupported extension type_28, data: 40:00 Unsupported extension type_21, data: 00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00 *** *** Finished verify_data: { 67, 20, 75, 84, 132, 170, 242, 157, 61, 222, 131, 185 } *** https-jsse-nio-8443-exec-2, READ: TLSv1 Handshake, length = 512 https-jsse-nio-8443-exec-9, WRITE: TLSv1.2 Change Cipher Spec, length = 1 *** ClientHello, TLSv1.2 RandomCookie: GMT: -398147963 bytes = { 45, 206, 212, 46, 92, 214, 206, 244, 53, 12, 181, 120, 220, 12, 130, 90, 219, 160, 146, 197, 132, 138, 232, 49, 158, 16, 104, 66 } Session ID: *** Finished {92, 125, 15, 248, 109, 55, 116, 167, 27, 228, 106, 188, 55, 81, 119, 10, 225, 231, 251, 111, 24, 107, 135, 82, 189, 63, 153, 62, 46, 5, 125, 15} Cipher Suites: [Unknown 0x13:0x2, Unknown 0x13:0x3, Unknown 0x13:0x1, Unknown 0x13:0x4, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa9, Unknown 0xc0:0xad, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0xac, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa8, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xc0:0x9d, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9c, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xaa, Unknown 0xc0:0x9f, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9e, TLS_DHE_RSA_WITH_AES_128_CBC_SHA] Compression Methods: { 0 } Unsupported extension status_request, data: 01:00:00:00:00 Extension elliptic_curves, curve names: {secp256r1, secp384r1, secp521r1, unknown curve 29, unknown curve 256, unknown curve 257, unknown curve 258, unknown curve 259, unknown curve 260} Extension ec_point_formats, formats: [uncompressed] Extension signature_algorithms, signature_algorithms: SHA256withRSA, Unknown (hash:0x8, signature:0x9), Unknown (hash:0x8, signature:0x4), SHA256withECDSA, Unknown (hash:0x8, signature:0x7), SHA384withRSA, Unknown (hash:0x8, signature:0xa), Unknown (hash:0x8, signature:0x5), SHA384withECDSA, SHA512withRSA, Unknown (hash:0x8, signature:0xb), Unknown (hash:0x8, signature:0x6), SHA512withECDSA, SHA1withRSA, SHA1withECDSA Unsupported extension type_35, data: Unsupported extension type_51, data: 00:69:00:17:00:41:04:97:22:00:73:8d:04:27:d5:da:b7:e7:3c:a2:d6:22:62:87:cd:26:1e:dd:33:5a:8c:ee:24:09:cd:38:1f:d0:5d:fc:2d:a5:11:d5:95:3a:db:0c:e3:08:78:ba:f9:98:0e:b3:21:54:6d:12:6a:e5:5f:5f:92:ee:34:36:52:9b:94:00:1d:00:20:4b:6f:f5:9b:e6:f1:79:f8:c5:1a:5c:56:39:28:ee:e9:12:4c:6a:7a:29:a3:a9:36:b3:44:e5:5f:8e:1b:c5:15 Unsupported extension type_43, data: 08:03:04:03:03:03:02:03:01 Extension renegotiation_info, renegotiated_connection: <empty> Extension server_name, server_name: [type=host_name (0), value=localhost] Unsupported extension type_45, data: 02:01:00 Unsupported extension type_28, data: 40:00 Unsupported extension type_21, data: 00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00 *** %% Initialized: [Session-25, SSL_NULL_WITH_NULL_NULL] Standard ciphersuite chosen: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 %% Negotiating: [Session-25, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384] *** ServerHello, TLSv1.2 RandomCookie: GMT: 1551699705 bytes = { 107, 102, 87, 94, 83, 176, 159, 187, 51, 63, 7, 1, 126, 72, 152, 164, 53, 38, 80, 176, 236, 108, 240, 1, 2, 166, 119, 161 } Session ID: {92, 125, 15, 249, 91, 136, 187, 27, 204, 162, 102, 165, 117, 174, 228, 167, 61, 220, 8, 91, 233, 74, 141, 46, 20, 170, 254, 125, 209, 24, 126, 159} Cipher Suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 Compression Method: 0 Extension renegotiation_info, renegotiated_connection: <empty> *** Cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 *** Certificate chain chain [0] = [ [ Version: V3 Subject: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5 Key: Sun RSA public key, 2048 bits modulus: 21944740401167172627731583459321030363948627215746053925732477915060915436180167456469785746662093119306577380200747716284652995937004530444336851845029170241627465854006145050037178991946925696078563485570896673835545540824265905937881682387179314987285174428010940266412458943894800978345731524307952507729956745301047871771953945124256516782917326981125087548987889540650149121302888872237484100834740328828765018090383963294418357028839734723410564800765871733483849269364796949055153420777966213779145518299141217288017794394762274753999989298548507425930217302947589819396239489846633419099079578249651345685751 public exponent: 65537 Validity: [From: Fri May 30 08:43:19 GMT 2014, To: Mon May 27 08:43:19 GMT 2024] Issuer: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US SerialNumber: [ a6ef7a9a 5368eb27] Certificate Extensions: 3 [1]: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: 78 0D 96 9D FE D3 0B BE 8C C7 E3 EC 67 04 AB 4B x...........g..K 0010: EA E0 00 29 ...) ] ] [2]: ObjectId: 2.5.29.19 Criticality=false BasicConstraints:[ CA:true PathLen:2147483647 ] [3]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 78 0D 96 9D FE D3 0B BE 8C C7 E3 EC 67 04 AB 4B x...........g..K 0010: EA E0 00 29 ...) ] ] ] Algorithm: [SHA1withRSA] Signature: 0000: 19 16 5A 21 99 21 24 98 3C 0A E8 D8 00 AB 44 24 ..Z!.!$.<.....D$ 0010: F2 0C B7 83 D5 9F 96 17 87 E2 1F 1D A3 47 68 C7 .............Gh. 0020: 68 4A CB 56 0E 77 2B E8 1A 9F E7 09 A1 19 77 D0 hJ.V.w+.......w. 0030: 5E CC C1 B3 9A C4 35 3D CB E0 A5 A6 43 5D A3 26 ^.....5=....C].& 0040: A4 91 8A C1 FA 7B 10 EA DC C3 C7 1C 47 DC 97 32 ............G..2 0050: C0 37 80 1C F1 42 10 E3 74 17 FA 3E 60 4A B7 59 .7...B..t..>`J.Y 0060: 92 C1 E0 6F BB F1 BB 9F 82 89 B5 83 D5 AE 1E 90 ...o............ 0070: 0A 89 8D FB 4C C0 C5 9E DC C5 8C C6 2F EE D9 B4 ....L......./... 0080: 95 47 27 2E BE 82 31 6F 76 C0 DB 4C C8 0D 3B 7B .G'...1ov..L..;. 0090: D1 6A BF BD 3B 93 30 04 A2 9E 81 F7 96 28 77 F2 .j..;.0......(w. 00A0: 32 05 68 44 1F B3 30 CE 40 9F 20 F3 B4 2B AA E6 2.hD..0.@. ..+.. 00B0: 40 9B FB 7F 34 6E 3A 99 FD F8 28 F1 8C 9B 56 34 @...4n:...(...V4 00C0: 64 AD 4D 56 39 CB 96 18 50 9B 99 43 80 0A 39 A5 d.MV9...P..C..9. 00D0: 13 7A 6E C5 25 E0 95 4A 92 E5 A8 8B EE 03 49 B4 .zn.%..J......I. 00E0: D9 7C 00 E3 F0 3B A7 BA 40 30 CC 89 55 C6 97 93 .....;..@0..U... 00F0: B5 15 F6 62 D3 B1 74 9C 0B 80 2B 8A D4 03 84 A0 ...b..t...+..... ] *** *** Diffie-Hellman ServerKeyExchange DH Modulus: { 255, 255, 255, 255, 255, 255, 255, 255, 201, 15, 218, 162, 33, 104, 194, 52, 196, 198, 98, 139, 128, 220, 28, 209, 41, 2, 78, 8, 138, 103, 204, 116, 2, 11, 190, 166, 59, 19, 155, 34, 81, 74, 8, 121, 142, 52, 4, 221, 239, 149, 25, 179, 205, 58, 67, 27, 48, 43, 10, 109, 242, 95, 20, 55, 79, 225, 53, 109, 109, 81, 194, https-jsse-nio-8443-exec-10, READ: TLSv1.2 Handshake, length = 134 https-jsse-nio-8443-exec-8, READ: TLSv1.2 Alert, length = 26 https-jsse-nio-8443-exec-7, READ: TLSv1.2 Handshake, length = 134 https-jsse-nio-8443-exec-6, READ: TLSv1.2 Handshake, length = 134 https-jsse-nio-8443-exec-4, READ: TLSv1.2 Alert, length = 26 https-jsse-nio-8443-exec-8, RECV TLSv1.2 ALERT: warning, close_notify https-jsse-nio-8443-exec-8, closeInboundInternal() https-jsse-nio-8443-exec-4, RECV TLSv1.2 ALERT: warning, close_notify verify_data: { 33, 138, 8, 67, 223, 45, 208, 86, 110, 122, 182, 167 } *** %% Initialized: [Session-24, SSL_NULL_WITH_NULL_NULL] https-jsse-nio-8443-exec-4, closeInboundInternal() *** ClientKeyExchange, DH DH Public key: { 119, 187, 66, 26, 49, 127, 49, 152, 116, 47, 8, 113, 18, 241, 94, 10, 42, 248, 98, 163, 163, 214, 66, 49, 143, 20, 63, 121, 72, 253, 21, 7, 105, 229, 142, 237, 255, 100, 254, 123, 123, 151, 131, 133, 37, 49, 81, 125, 204, 61, 15, 158, 178, 49, 192, 84, 48, 81, 188, 87, 205, 201, 68, 194, 173, 134, 143, 168, 145, 15, 77, 141, 185, 94, 202, 181, 65, 254, 249, 170, 37, 56, 158, 113, 161, 100, 90, 131, 168, 203, 156, 157, 136, 192, 94, 196, 155, 114, 204, 97, 1, 140, 191, 69, 40, 221, 4, 182, 173, 155, 124, 190, 163, 56, 65, 61, 89, 185, 151, 237, 248, 59, 124, 47, 125, 179, 243, 222 } Standard ciphersuite chosen: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 %% Negotiating: [Session-24, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384] *** ServerHello, TLSv1.2 RandomCookie: GMT: 1551699705 bytes = { 129, 61, 113, 212, 159, 235, 122, 197, 255, 49, 88, 111, 229, 213, 126, 68, 147, 169, 16, 171, 250, 94, 164, 75, 232, 12, 73, 75 } Session ID: {92, 125, 15, 249, 195, 242, 53, 15, 195, 4, 179, 174, 158, 160, 129, 239, 181, 93, 101, 155, 90, 214, 181, 133, 63, 19, 255, 137, 161, 42, 8, 157} Cipher Suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 Compression Method: 0 Extension renegotiation_info, renegotiated_connection: <empty> *** Cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 *** Certificate chain SESSION KEYGEN: PreMaster Secret: chain [0] = [ [ Version: V3 Subject: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5 Key: Sun RSA public key, 2048 bits modulus: 21944740401167172627731583459321030363948627215746053925732477915060915436180167456469785746662093119306577380200747716284652995937004530444336851845029170241627465854006145050037178991946925696078563485570896673835545540824265905937881682387179314987285174428010940266412458943894800978345731524307952507729956745301047871771953945124256516782917326981125087548987889540650149121302888872237484100834740328828765018090383963294418357028839734723410564800765871733483849269364796949055153420777966213779145518299141217288017794394762274753999989298548507425930217302947589819396239489846633419099079578249651345685751 public exponent: 65537 Validity: [From: Fri May 30 08:43:19 GMT 2014, To: Mon May 27 08:43:19 GMT 2024] Issuer: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US SerialNumber: [ a6ef7a9a 5368eb27] Certificate Extensions: 3 [1]: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: 78 0D 96 9D FE D3 0B BE 8C C7 E3 EC 67 04 AB 4B x...........g..K 0010: EA E0 00 29 ...) ] ] [2]: ObjectId: 2.5.29.19 Criticality=false BasicConstraints:[ CA:true PathLen:2147483647 ] [3]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 78 0D 96 9D FE D3 0B BE 8C C7 E3 EC 67 04 AB 4B x...........g..K 0010: EA E0 00 29 ...) ] ] ] Algorithm: [SHA1withRSA] Signature: 0000: 19 16 5A 21 99 21 24 98 3C 0A E8 D8 00 AB 44 24 ..Z!.!$.<.....D$ 0010: F2 0C B7 83 D5 9F 96 17 87 E2 1F 1D A3 47 68 C7 .............Gh. 0020: 68 4A CB 56 0E 77 2B E8 1A 9F E7 09 A1 19 77 D0 hJ.V.w+.......w. 0030: 5E CC C1 B3 9A C4 35 3D CB E0 A5 A6 43 5D A3 26 ^.....5=....C].& 0040: A4 91 8A C1 FA 7B 10 EA DC C3 C7 1C 47 DC 97 32 ............G..2 0050: C0 37 80 1C F1 42 10 E3 74 17 FA 3E 60 4A B7 59 .7...B..t..>`J.Y 0060: 92 C1 E0 6F BB F1 BB 9F 82 89 B5 83 D5 AE 1E 90 ...o............ 0070: 0A 89 8D FB 4C C0 C5 9E DC C5 8C C6 2F EE D9 B4 ....L......./... 0080: 95 47 27 2E BE 82 31 6F 76 C0 DB 4C C8 0D 3B 7B .G'...1ov..L..;. 0090: D1 6A BF BD 3B 93 30 04 A2 9E 81 F7 96 28 77 F2 .j..;.0......(w. 00A0: 32 05 68 44 1F B3 30 CE 40 9F 20 F3 B4 2B AA E6 2.hD..0.@. ..+.. 00B0: 40 9B FB 7F 34 6E 3A 99 FD F8 28 F1 8C 9B 56 34 @...4n:...(...V4 00C0: 64 AD 4D 56 39 CB 96 18 50 9B 99 43 80 0A 39 A5 d.MV9...P..C..9. 00D0: 13 7A 6E C5 25 E0 95 4A 92 E5 A8 8B EE 03 49 B4 .zn.%..J......I. 00E0: D9 7C 00 E3 F0 3B A7 BA 40 30 CC 89 55 C6 97 93 .....;..@0..U... 00F0: B5 15 F6 62 D3 B1 74 9C 0B 80 2B 8A D4 03 84 A0 ...b..t...+..... ] *** https-jsse-nio-8443-exec-8, closeOutboundInternal() 69, https-jsse-nio-8443-exec-8, SEND TLSv1.2 ALERT: warning, description = close_notify https-jsse-nio-8443-exec-9, WRITE: TLSv1.2 Handshake, length = 40 %% Cached server session: [Session-19, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384] *** ClientKeyExchange, DH DH Public key: { *** ClientKeyExchange, DH DH Public key: { 108, 17, 156, 128, 208, 10, 120, 65, 73, 241, 28, 248, 30, 255, 246, 161, 88, 214, 10, 44, 188, 189, 21, 195, 12, 123, 206, 50, 36, 227, 136, 209, 195, 252, 163, 243, 8, 142, 129, 134, 86, 63, 158, 228, 113, 39, 25, 146, 66, 214, 194, 123, 136, 217, 0, 103, 7, 177, 128, 37, 143, 61, 110, 181, 10, 216, 241, 28, 158, 82, 214, 92, 154, 121, 200, 201, 41, 55, 91, 16, 210, 149, 30, 201, 233, 166, 240, 44, 208, 235, 73, 183, 248, 134, 36, 244, 59, 163, 140, 87, 99, 43, 86, 68, 243, 39, 23, 30, 81, 93, 214, 0000: 06 07 F1 C1 89 D3 EB E5 D6 B5 F7 5F 8E 32 BF 66 ..........._.2.fhttps-jsse-nio-8443-exec-4, closeOutboundInternal() 14https-jsse-nio-8443-exec-4, SEND TLSv1.2 ALERT: warning, description = close_notify 0010: 46 65 9D 56 00 A1 C6 36 F0 A7 AC FD 1B 0C 15 53 Fe.V...6.......S 0020: 97 48 CA 69 69 60 30 1F A6 25 15 B4 4F 07 8B E1 .H.ii`0..%..O... 0030: 62 43 4A D1 16 42 67 A4 9D 9C 98 3F 28 85 07 0F bCJ..Bg....?(... 0040: 4E 17 08 C7 08 8F 2A 81 6C 17 79 39 C4 6C EB 67 N.....*.l.y9.l.g 0050: 58 07 44 E1 48 24 E5 1C BA 82 59 EC 75 15 07 F8 X.D.H$....Y.u...https-jsse-nio-8443-exec-9, WRITE: TLSv1.2 Application Data, length = 85 217https-jsse-nio-8443-exec-8, WRITE: TLSv1.2 Alert, length = 26 https-jsse-nio-8443-exec-8, called closeOutbound() https-jsse-nio-8443-exec-8, closeOutboundInternal() , 66, 16, 254, 103, 7, 170, 44, 138, 77, 38, 128, 244, 97, 136, 232, 13, 228, 121, 226, 78, 119, 40, 107, 98, 127, 243, 53, 221, 102, 84, 125, 139, 65, 182, 194, 12, 97, 54, 211, 216, 92, 142, 200, 178, 100, 80, 219, 170, 221, 39, 20, 108, 139, 4, 28, 102, 10, 190, 134, 199, 197, 102, 108, 100, 54, 15, 203, 218, 135, 77, 26, 119, 86, 220, 126, 69, 89, 227, 136, 12, 64, 195, 16, 204, 249, 95, 30, 226, 22, 116, 178, 182, 175, 44, 8, 125, 83, 163, 182, 146, 169, 164, 113, 70, 122, 228, 226, 44, 161, 92, 194, 67, 74, 195, 229, 220, 72, 202, 161, 79, 253, 152, 170, 212, 34, 151, 227 } SESSION KEYGEN: PreMaster Secret: 0000: 31 CE 18 D8 9D 23 A1 B5 69 8B 38 E0 11 F3 C2 D5 1....#..i.8..... 0010: 8D 8E 9C 85 83 C3 A3 2E 30 34 67 3D BA C7 27 41 ........04g=..'A 0020: AF 7B 9E 04 46 6D 3C 3D 64 25 EF C2 DA 37 91 F2 ....Fm<=d%...7.. 0030: F3 2B 2D C5 4B E3 9E 85 05 89 ED 7A 74 B5 3B BE .+-.K......zt.;. 0040: F7 7E 0D E7 FC E7 A7 D1 7F 7B 49 65 B6 58 99 25 ..........Ie.X.% 0050: DF B5 0D A9 15 CB CF 4E 1C 70 45 51 07 97 B7 F0 .......N.pEQ.... 0060: 03 62 FD F6 7F 36 CB 01 25 0B 02 0E A5 C2 C7 4D .b...6..%......M 0070: 22 3F 6A 3D C8 59 C2 77 44 05 F3 2F 43 99 45 64 "?j=.Y.wD../C.Ed https-jsse-nio-8443-exec-9, READ: TLSv1.2 Alert, length = 26 https-jsse-nio-8443-exec-9, RECV TLSv1.2 ALERT: warning, close_notify CONNECTION KEYGEN: Client Nonce: 0000: A5 81 2F E2 3A 2D 62 21 0E CC C1 89 5D AF D8 EA ../.:-b!....]... 0010: 53 F9 B7 63 E3 8A C2 7C 7D AF 7E 75 5C 5C 10 20 S..c.......u\\. Server Nonce: 0000: 5C 7D 0F F8 6D EA BE C0 5C FC C2 E2 8B C7 61 B4 \...m...\.....a. 0010: FC F5 26 F5 3C A2 04 EA 4C 2F 27 BA AB 1D 8B 1D ..&.<...L/'..... Master Secret: 0000: 6B 4E 29 FC 53 96 4F 27 B5 C5 A9 CF 04 10 4B 55 kN).S.O'......KU 0010: 38 29 FD 18 E5 19 39 F5 21 44 82 10 36 E4 82 C9 8)....9.!D..6... 0020: 9C C9 37 4D C5 01 86 0C 73 B4 4C 11 24 48 78 56 ..7M....s.L.$HxV ... no MAC keys used for this cipher Client write key: 0000: 3E 45 5E D7 E8 09 70 95 90 F3 C1 4C B6 12 39 90 >E^...p....L..9. 0010: 39 64 05 54 4C 30 16 67 26 8C 60 44 40 18 E8 78 9d.TL0.g&.`D@..x Server write key: 0000: FE 96 86 35 A0 74 09 7D EC F8 B2 3C 26 E5 AD 97 ...5.t.....<&... 0010: B8 0F C6 96 C9 9F 89 DE 01 04 85 48 6D 81 C3 28 ...........Hm..( Client write IV: 0000: 9B 8C 75 4B ..uK Server write IV: 0000: 02 F9 BA 1C .... 228, 133, 181, 118, 98, 94, 126, 198, 244, 76, 66, 233, 166, 55, 237, 107, 11, 255, 92, 182, 244, 6, 183, 237, 238, 56, 107, 251, 90, 137, 159, 165, 174, 159, 36, 17, 124, 75, 31, 230, 73, 40, 102, 81, 236, 230, 83, 129, 255, 255, 255, 255, 255, 255, 255, 255 } *** Diffie-Hellman ServerKeyExchange DH Modulus: { https-jsse-nio-8443-exec-9, closeInboundInternal() Using SSLEngineImpl. 0060: 7E 1A A7 BA 7D A0 A2 D4 Allow unsafe renegotiation: false Allow legacy hello messages: true Is initial handshake: true Is secure renegotiation: false https-jsse-nio-8443-exec-4, WRITE: TLSv1.2 Alert, length = 26 , 221, 110, 152, 48, 177, 67, 119, 61, 148, 144, 110, 84, 215, 169, 186, 148 } D9 93 D3 DF FE 7C 1E 75 ...............u 0070: F4 EE 25 43 E4 8E 6A CE ED 61 81 6C 96 26 5B 81 ..%C..j..a.l.&[. CONNECTION KEYGEN: Client Nonce: 0000: C4 58 91 3E FE 99 0C 19 BB B9 48 6A 18 34 B1 59 .X.>......Hj.4.Y 0010: 39 CC 71 1C AB DD 3C 81 4C 64 98 34 BB B5 43 09 9.q...<.Ld.4..C. Server Nonce: 0000: 5C 7D 0F F9 FA 30 0E C1 A2 4B A3 A8 C4 9C 30 2C \....0...K....0, 0010: E4 57 BC DF 78 9E BD 5D C3 CC 2C AC 25 48 B8 D7 .W..x..]..,.%H.. Master Secret: 0000: 3F AE FF 53 5E BE A1 7B B8 AE 96 F8 D7 DA 5E 8B ?..S^.........^. 0010: 73 01 C3 FE 6A D2 69 59 5A 2A EB 68 93 91 5D 01 s...j.iYZ*.h..]. 0020: 9C 6D A6 DC FB 71 31 6C 93 9E 64 96 EE 92 12 38 .m...q1l..d....8 ... no MAC keys used for this cipher Client write key: 0000: CA F3 57 BB 1B 9F B4 DC 4F 81 55 30 2F 36 C2 DA ..W.....O.U0/6.. 0010: B6 61 CE EC 7D 50 31 94 47 D6 39 AE D2 76 37 53 .a...P1.G.9..v7S Server write key: 0000: 1F 90 6D EB D9 6A AD 36 FD B1 33 50 96 A7 03 60 ..m..j.6..3P...` 0010: 9F AE 3A 26 98 6A 0C FD 2F 7B 69 3D 8C 28 88 82 ..:&.j../.i=.(.. Client write IV: 0000: 8A B5 6D FB ..m. Server write IV: 0000: F5 76 83 23 .v.# https-jsse-nio-8443-exec-9, closeOutboundInternal() 255, 255, 255, 255, 255, 255, 255, 255, 201, 15, 218, 162, 33, 104, 194, DH Base: { 2 } https-jsse-nio-8443-exec-10, READ: TLSv1.2 Change Cipher Spec, length = 1 Server DH Public Key: { 108, 72, 156, 59, 22, 114, 111, 178, 29, 114, 80, 255, 193, 191, 177, 52, 131, 240, 91, 170, 85, 235, 52, 99, 114, 209, 197, 66, 33, 228, 85, 52, 196, 198, 98, 139, 128, 220, 28, 209, 41, 2, 78, 8, 138, 103, 204, 116, 2, 11, 190, 166, 59, 19, 155, 34, 81, 74, 8, 121, 142, 52, 4, 221, 239, https-jsse-nio-8443-exec-9, SEND TLSv1.2 ALERT: warning, description = close_notify https-jsse-nio-8443-exec-7, READ: TLSv1.2 Change Cipher Spec, length = 1 SESSION KEYGEN: PreMaster Secret: https-jsse-nio-8443-exec-9, WRITE: TLSv1.2 Alert, length = 26 https-jsse-nio-8443-exec-7, READ: TLSv1.2 Handshake, length = 40 *** Finished verify_data: { 187, 197, 74, 200, 210, 62, 182, 103, 176, 63, 209, 187 } *** https-jsse-nio-8443-exec-7, WRITE: TLSv1.2 Change Cipher Spec, length = 1 *** Finished https-jsse-nio-8443-exec-4, called closeOutbound() Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1 https-jsse-nio-8443-exec-4, closeOutboundInternal() verify_data: { 123, 227, 214, 56, https-jsse-nio-8443-exec-9, called closeOutbound() https-jsse-nio-8443-exec-9, closeOutboundInternal() 0000: D3 A6 A0 0C 7B B3 E7 26 FF 7E 0F 0A 97 27 4D BC .......&.....'M. 00149, 25, 179, 205, 58, 67, 27, 48, 43, 10, 109, 242, 95, 20, 55, 79, 225, 53, 109, 109, 81, 194, 69, 228, 133, 181, 118, 98, 94, 126, 198, 244, 76, 66, 233, 166, 55, 237, 107, 11, 255, 92, 182, 244, 6, 183, 237, 238, 56, 107, 251, 90, 137, 159, 165, 174, 159, 36, 17, 124, 75, 31, 230, 73, 40, 102, 81, 236, 230, 83, 129, 255, 255, 255, 255, 255, 255, 255, 255 } 137, 70, 10, 55, 139, 190, 36, 218, 99, 113, 233, 147, 149, 92, https-jsse-nio-8443-exec-10, READ: TLSv1.2 Handshake, length = 40 221, 209, 8, 224, 218, 139, 248, 243, 168, 226, 97, 196*** Finished verify_data: { 204, 22, 137, 226, 238, 95, 164, 98, 114, 230, 202, 181 } *** DH Base: { 2 } Server DH Public Key: { 234, 42, 47, 127, 252, 84, 16, 254, 126, 141, 50, 23, 219, 84, 22, 110, 12, 85, 199, 24, 211, 55, 168, 25, 165, 4, 181, 27, 57, 211, 96, 243, 190, 167, 102, 83, 17, 253, 189, 8, 204, 127, 128, 217, 136, 119, 250, 44, 98, 245, 242, 236, 251, 180, 27, 237, 25, 225, 74, 59, 200, 52, 218, 24, 55, 170, 65, 204, 106, 200, 238, 102, 201, 140, 27, 233, 24, 56, 69, 1, 26, 150, 23, 176, 139, 161, 95, 130, 140, 222, 220, 39, 173, 63, 138, 153, 32, 193, 212, 160, 83, 232, 39, 134, 233, 221, 137, 210, 32, 207, 239, 142, 172, 215, 90, 31, 210, 68, 119, 14, 208, 85, 164, 22, 24, 142, 187, 31 } 1Signature Algorithm SHA256withRSA Signed with a DSA or RSA public key 0: *** ServerHelloDone 195, 244, 97, 84, 21, 79, 111, 34 } *** Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1 https-jsse-nio-8443-exec-3, WRITE: TLSv1.2 Handshake, length = 1697 17 5A 41 6E 01 B0 43 77 B4 DA CB DD A1 7B A6 FF .ZAn..Cw........ 0020: E1 50 8D 62 68 E8 33 EC BC 2E 18 51 0E 5A 79 23 .P.bh.3....Q.Zy# 0030: 8D 84 28 C2 22 5C EE 06 19 29 6E C4 5B 9E E8 04 ..(."\...)n.[... 0040: 56 35 77 3A 48 52 A3 22 16 16 3C 6E 4F 94 10 00 V5w:HR."..<nO... 0050: 4F 5D D7 51 6C 05 7C A1 80 05 D6 6A 8E 79 43 53 O].Ql......j.yCS 0060: B7 E7 8A 8F 8F FA F9 DD 64 95 4F FA 86 AA 49 0B ........d.O...I. 0070: 59 A6 B9 89 E0 11 BE 0B EC D3 59 BE A0 FC 3C E0 Y.........Y...<. CONNECTION KEYGEN: Client Nonce: 0000: B9 AB 6F 05 3D 5F 20 48 19 EC AD 7D 81 6F 1C 75 ..o.=_ H.....o.u 0010: DB EA 54 97 8A B0 85 73 CF 4C C7 45 5D 73 CD 44 ..T....s.L.E]s.D Server Nonce: 0000: 5C 7D 0F F9 CC 19 39 1C BE 99 85 6F 54 30 90 45 \.....9....oT0.E 0010: 8C 8E 27 E4 B0 61 83 48 33 90 20 47 5D 07 42 DE ..'..a.H3. G].B. Master Secret: 0000: E1 5A 27 5E 40 8F 52 A8 EF 27 54 8A 49 38 5B 47 .Z'^@.R..'T.I8[G 0010: E5 8B 76 4B 75 D4 12 99 26 29 D1 27 2F 2D 1C B8 ..vKu...&).'/-.. 0020: DD B2 C6 4D 77 67 81 2C 98 AC 03 78 B8 93 01 9B ...Mwg.,...x.... ... no MAC keys used for this cipher Client write key: 0000: DD F4 E7 91 2D C7 ED 8B FF FD F0 5E 10 A9 62 22 ....-......^..b" 0010: 43 9F AB 13 4B 7A 10 2E 40 54 75 18 01 1B 69 96 C...Kz..@Tu...i. Server write key: 0000: C7 1C A8 95 CB AD 13 E5 98 3F 87 8D CC 54 FF 3C .........?...T.< 0010: 1D BC AB 9C FB 6F 08 E7 61 84 BA 14 A5 60 87 CD .....o..a....`.. Client write IV: 0000: B7 29 F0 F0 .).. Server write IV: 0000: A9 10 5D E0 ..]. https-jsse-nio-8443-exec-10, WRITE: TLSv1.2 Change Cipher Spec, length = 1 , https-jsse-nio-8443-exec-1, READ: TLSv1.2 Handshake, length = 134 *** Finished verify_data: { 211, 66, 204, 186, 72, 26, 84, 190, https-jsse-nio-8443-exec-7, WRITE: TLSv1.2 Handshake, length = 40 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1.1 https-jsse-nio-8443-exec-6, READ: TLSv1.2 Change Cipher Spec, length = 1 38*** ClientKeyExchange, DH DH Public key: { 47, 187, 37, 217, 229, 117, 168, %% Cached server session: [Session-23, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384] https-jsse-nio-8443-exec-5, READ: TLSv1 Handshake, length = 512 https-jsse-nio-8443-exec-6, READ: TLSv1.2 Handshake, length = 40 183, 112, 82, 63 } *** , 180, 38, 237, 36, 181, 226, 73, 221, 201, 51, 114, 43, 46, 42, 58, 181, 210, 149, 71, 248, 86, 150, 198, 188, 27, 244, 200, 57, 232, 139, 55, 38, 196, 47, 219, 51, 55, 77, 150, 57, 202, 148, 85, 209, 103, 6, 123, 221, 108, 214, 126, 219, 156, 86, 43, 165, 212, 11, 157, 25, 182, 116, 87, 48, 57, 159, 122, 140, 112, 104 } Signature Algorithm SHA256withRSA Signed with a DSA or RSA public key *** ServerHelloDone https-jsse-nio-8443-exec-2, WRITE: TLSv1.2 Handshake, length = 1697 https-jsse-nio-8443-exec-10, WRITE: TLSv1.2 Handshake, length = 40 %% Cached server session: [Session-21, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384] 222, 196, 58, 125, 15, 59, 115, 232, 212, 100, 52, 234, 110, 90, 128, 160, 75, 222, 138, 60, 236, 73, 89, 92, 252, 36, 94, 159, 96, 21, 23, 79, 14, 217, 161, 159, 184, 225, 14, 64, 239, 51, 214, 96, 208, 80, 122, 136, 7, 99, 176, 41, 202, 225, 105, 20, 96, 32, 164, 97, 200, 246, 255, 214, 179, 81, 63, 90, 59, 182, 62, 231, 238, 34, 61, 145, 85, 12, 225, 98, 227, 173, 64, 60, 25, 66, 142, 117, 164, 88, 254, 70, 20, 159, 8, 67, 153, 208, 119, 191, 88, 12, 141, 56, 197, 205, 11, 134, 80, 149, 164, 6, 44, 235, 63, 200, 84, 199, 113, 68, 42 } https-jsse-nio-8443-exec-9, WRITE: TLSv1.2 Application Data, length = 84 *** Finished *** ClientHello, TLSv1.2 RandomCookie: GMT: -1407540691 bytes = { 100, 142, 74, 235, 7, 130, 6, 203, 13, 103, 200, 218, 255, 204, 229, 214, 115, 122, 62, 84, 254, 65, 124, 197, 1, 95, 125, 142 } Session ID: {92, 125, 15, 248, 181, 154, 125, 230, 61, 129, 18, 26, 1, 153, 235, 181, 199, 235, 208, 79, 250, 126, 110, 194, 87, 247, 95, 187, 134, 2, 227, 105} Cipher Suites: [Unknown 0x13:0x2, Unknown 0x13:0x3, Unknown 0x13:0x1, Unknown 0x13:0x4, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa9, Unknown 0xc0:0xad, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0xac, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa8, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xc0:0x9d, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9c, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xaa, Unknown 0xc0:0x9f, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9e, TLS_DHE_RSA_WITH_AES_128_CBC_SHA] Compression Methods: { 0 } Unsupported extension status_request, data: 01:00:00:00:00 Extension elliptic_curves, curve names: {secp256r1, secp384r1, secp521r1, unknown curve 29, unknown curve 256, unknown curve 257, unknown curve 258, unknown curve 259, unknown curve 260} Extension ec_point_formats, formats: [uncompressed] Extension signature_algorithms, signature_algorithms: SHA256withRSA, Unknown (hash:0x8, signature:0x9), Unknown (hash:0x8, signature:0x4), SHA256withECDSA, Unknown (hash:0x8, signature:0x7), SHA384withRSA, Unknown (hash:0x8, signature:0xa), Unknown (hash:0x8, signature:0x5), SHA384withECDSA, SHA512withRSA, Unknown (hash:0x8, signature:0xb), Unknown (hash:0x8, signature:0x6), SHA512withECDSA, SHA1withRSA, SHA1withECDSA Unsupported extension type_35, data: Unsupported extension type_51, data: 00:69:00:17:00:41:04:ea:6e:a1:3d:cc:70:1d:62:32:73:b2:03:da:a5:e6:08:35:5a:0e:cd:3d:ad:4b:bb:70:74:cd:c5:e9:0c:f6:9f:fd:f3:e2:28:bf:a7:47:1e:c6:dd:03:c0:c1:ff:06:20:7f:0e:88:17:c9:71:89:7d:7c:7a:01:89:77:73:9f:45:00:1d:00:20:2c:9d:e8:53:70:37:78:77:59:bd:80:b1:5c:50:38:7c:51:51:76:f2:9a:1a:71:f0:c2:ac:67:c6:ee:d3:a1:22 Unsupported extension type_43, data: 08:03:04:03:03:03:02:03:01 Extension renegotiation_info, renegotiated_connection: <empty> Extension server_name, server_name: [type=host_name (0), value=localhost] Unsupported extension type_45, data: 02:01:00 Unsupported extension type_28, data: 40:00 Unsupported extension type_21, data: 00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00 *** %% Initialized: [Session-26, SSL_NULL_WITH_NULL_NULL] Using SSLEngineImpl. Allow unsafe renegotiation: false Allow legacy hello messages: true Is initial handshake: true Is secure renegotiation: false Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1.1 https-jsse-nio-8443-exec-2, READ: TLSv1 Handshake, length = 512 *** ClientHello, TLSv1.2 RandomCookie: verify_data: { 122, 78, 228, 219, 63, 157, 186, 23, 116, 156, 230, 50 } *** GMT: -669381688 bytes = { 187, 202, 7, 49, 65, 218, 105, 67, 133, 109, 20, 83, 210, 68, 110, 208, 107, 102, 182, 197, 91, 194, 59, 204, 13, 143, 15, 28 } Session ID: {92, 125, 15, 249, 66, 246, 149, 109, 237, 108, 197, 152, 185, 217, 183, 10, 51, 192, 241, 212, 4, 203, 186, 66, 179, 248, 130, 74, 46, 249, 186, 24} Cipher Suites: [Unknown 0x13:0x2, Unknown 0x13:0x3, Unknown 0x13:0x1, Unknown 0x13:0x4, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa9, Unknown 0xc0:0xad, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0xac, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa8, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xc0:0x9d, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9c, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xaa, Unknown 0xc0:0x9f, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9e, TLS_DHE_RSA_WITH_AES_128_CBC_SHA] https-jsse-nio-8443-exec-4, READ: TLSv1.2 Alert, length = 26 https-jsse-nio-8443-exec-7, WRITE: TLSv1.2 Application Data, length = 85 Standard ciphersuite chosen: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 %% Negotiating: [Session-26, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384] https-jsse-nio-8443-exec-4, RECV TLSv1.2 ALERT: warning, close_notify https-jsse-nio-8443-exec-4, closeInboundInternal() https-jsse-nio-8443-exec-4, closeOutboundInternal() https-jsse-nio-8443-exec-4, SEND TLSv1.2 ALERT: warning, description = close_notify https-jsse-nio-8443-exec-4, WRITE: TLSv1.2 Alert, length = 26 https-jsse-nio-8443-exec-4, called closeOutbound() https-jsse-nio-8443-exec-4, closeOutboundInternal() https-jsse-nio-8443-exec-3, READ: TLSv1.2 Handshake, length = 134 SESSION KEYGEN: PreMaster Secret: 0000: 52 92 E4 78 30 28 6C 82 32 31 F1 70 54 0F EC 50 R..x0(l.21.pT..P 0010: 48 1A C6 0B A5 29 E8 7E 16 6A 4C 54 89 41 44 DA H....)...jLT.AD. 0020: 02 BB CB 34 44 88 CC 5D BD D4 87 FC C8 AB 91 11 ...4D..]........ 0030: 41 FE DD A0 95 10 AA 2A DA EB 1D 2D 86 75 B5 EC A......*...-.u.. 0040: A6 E9 E7 23 7B 68 BC F6 3A 45 BB 54 E2 37 D8 E0 ...#.h..:E.T.7.. 0050: 92 70 51 0A 46 81 37 A6 E1 EC E4 22 C7 3F 61 2A .pQ.F.7....".?a* 0060: 47 D9 B4 50 9C 7B 80 45 B3 B9 D2 F2 8E 73 65 95 G..P...E.....se. 0070: B9 AC 8D 42 C0 07 5D E0 EB E3 9B 51 E0 05 7D 7E ...B..]....Q.... *** ServerHello, TLSv1.2 RandomCookie: GMT: 1551699705 bytes = { 45, 154, 102, 90, 88, 165, 149, 227, 47, 102, 27, 133, 149, 125, 136, 0, 224, 23, 78, 120, 150, 217, 16, 224, 242, 236, 241, 240 } Session ID: {92, 125, 15, 249, 14, 195, 194, 111, 161, 3, 34, 99, 124, 78, 235, 106, 195, 192, 56, 64, 253, 184, 107, 141, 133, 130, 225, 46, 214, 255, 68, 213} Cipher Suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 Compression Method: 0 Extension renegotiation_info, renegotiated_connection: <empty> *** Cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 *** Certificate chain https-jsse-nio-8443-exec-7, READ: TLSv1.2 Alert, length = 26 https-jsse-nio-8443-exec-7, RECV TLSv1.2 ALERT: warning, close_notify https-jsse-nio-8443-exec-7, closeInboundInternal() https-jsse-nio-8443-exec-7, closeOutboundInternal() https-jsse-nio-8443-exec-7, SEND TLSv1.2 ALERT: warning, description = close_notify https-jsse-nio-8443-exec-7, WRITE: TLSv1.2 Alert, length = 26 https-jsse-nio-8443-exec-7, called closeOutbound() https-jsse-nio-8443-exec-7, closeOutboundInternal() Compression Methods: { 0 } Unsupported extension status_request, data: 01:00:00:00:00 Extension elliptic_curves, curve names: {secp256r1, secp384r1, secp521r1, unknown curve 29, unknown curve 256, unknown curve 257, unknown curve 258, unknown curve 259, unknown curve 260} Extension ec_point_formats, formats: [uncompressed] Extension signature_algorithms, signature_algorithms: SHA256withRSA, Unknown (hash:0x8, signature:0x9), Unknown (hash:0x8, signature:0x4), SHA256withECDSA, Unknown (hash:0x8, signature:0x7), SHA384withRSA, Unknown (hash:0x8, signature:0xa), Unknown (hash:0x8, signature:0x5), SHA384withECDSA, SHA512withRSA, Unknown (hash:0x8, signature:0xb), Unknown (hash:0x8, signature:0x6), SHA512withECDSA, SHA1withRSA, SHA1withECDSA Unsupported extension type_35, data: Unsupported extension type_51, data: 00:69:00:17:00:41:04:c2:d7:69:f4:41:8a:c6:5f:48:1c:09:b1:9a:f7:41:95:8e:b2:a2:3c:19:bc:3c:c9:df:b3:25:2c:01:76:98:9b:36:ca:8a:64:68:cd:1d:f1:2a:1e:12:f8:55:c8:da:21:fc:66:8f:f7:e5:04:57:ff:e5:99:50:ab:ff:c0:3a:9e:00:1d:00:20:c3:70:7f:67:9f:74:56:24:fa:71:12:59:6f:94:10:4c:9c:6a:16:e2:c5:34:a0:d9:e3:5e:a0:c0:cf:76:89:0d Unsupported extension type_43, data: 08:03:04:03:03:03:02:03:01 Extension renegotiation_info, renegotiated_connection: <empty> Extension server_name, server_name: [type=host_name (0), value=localhost] Unsupported extension type_45, data: 02:01:00 Unsupported extension type_28, data: 40:00 Unsupported extension type_21, data: 00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00 *** https-jsse-nio-8443-exec-6, WRITE: TLSv1.2 Change Cipher Spec, length = 1 *** ClientKeyExchange, DH DH Public key: { 179, 73, 133, 96, 31, 85, 116, 53, 181, 121, 152, 48, 245, 130, 205, 178, 160, 125, 78, 213, 33, 236, 152, 111, 74, 26, 80, 26, 53, 158, 71, 97, 179, 113, 212, 117, 6, 189, 8, 130, 189, 10, 102, 18%% Initialized: [Session-27, SSL_NULL_WITH_NULL_NULL] CONNECTION KEYGEN: Client Nonce: 0000: 04 16 76 82 64 6A F4 A7 43 5D D5 4C E9 09 6E C7 ..v.dj..C].L..n. 0010: 2B 1D D0 A6 BC 30 2F ED 08 C0 09 36 96 DC B8 87 +....0/....6.... Server Nonce: 0000: 5C 7D 0F F9 81 3D 71 D4 9F EB 7A C5 FF 31 58 6F \....=q...z..1Xo 0010: E5 D5 7E 44 93 A9 10 AB FA 5E A4 4B E8 0C 49 4B ...D.....^.K..IK Master Secret: 0000: DE F2 08 1C 72 8A 08 82 24 2D B3 9D 14 7C 5D FC ....r...$-....]. 0010: FE 13 4C E4 CB F6 2C 4F 08 F8 FA F6 4B CF 73 8F ..L...,O....K.s. 0020: 1B BF 4C 8A 07 12 C5 0B 93 B5 1B 50 DA 50 7E E2 ..L........P.P.. ... no MAC keys used for this cipher Client write key: 0000: 2F 62 79 EE C5 B2 DC 7D 63 95 AC 3C E7 5F 2C DA /by.....c..<._,. 0010: F2 55 18 D0 AE AC F1 68 D4 54 71 14 6B 73 6D 8E .U.....h.Tq.ksm. Server write key: 0000: 74 B7 DB E9 78 BA F0 C6 FC F3 F7 B2 AF 8F 7B 67 t...x..........g 0010: DC 08 56 F3 0B 90 3F FE C4 13 31 32 4C AF 40 2A ..V...?...12L.@* Client write IV: 0000: 8F 64 0A 96 .d.. Server write IV: 0000: 1E 4C 16 EA .L.. Using SSLEngineImpl. chain [0] = [ [ Version: V3 Subject: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5 Key: Sun RSA public key, 2048 bits modulus: 21944740401167172627731583459321030363948627215746053925732477915060915436180167456469785746662093119306577380200747716284652995937004530444336851845029170241627465854006145050037178991946925696078563485570896673835545540824265905937881682387179314987285174428010940266412458943894800978345731524307952507729956745301047871771953945124256516782917326981125087548987889540650149121302888872237484100834740328828765018090383963294418357028839734723410564800765871733483849269364796949055153420777966213779145518299141217288017794394762274753999989298548507425930217302947589819396239489846633419099079578249651345685751 public exponent: 65537 Validity: [From: Fri May 30 08:43:19 GMT 2014, To: Mon May 27 08:43:19 GMT 2024] Issuer: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US SerialNumber: [ a6ef7a9a 5368eb27] Certificate Extensions: 3 [1]: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: 78 0D 96 9D FE D3 0B BE 8C C7 E3 EC 67 04 AB 4B x...........g..K 0010: EA E0 00 29 ...) ] ] [2]: ObjectId: 2.5.29.19 Criticality=false BasicConstraints:[ CA:true PathLen:2147483647 ] [3]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 78 0D 96 9D FE D3 0B BE 8C C7 E3 EC 67 04 AB 4B x...........g..K 0010: EA E0 00 29 ...) ] ] ] Algorithm: [SHA1withRSA] Signature: 0000: 19 16 5A 21 99 21 24 98 3C 0A E8 D8 00 AB 44 24 ..Z!.!$.<.....D$ 0010: F2 0C B7 83 D5 9F 96 17 87 E2 1F 1D A3 47 68 C7 .............Gh. 0020: 68 4A CB 56 0E 77 2B E8 1A 9F E7 09 A1 19 77 D0 hJ.V.w+.......w. 0030: 5E CC C1 B3 9A C4 35 3D CB E0 A5 A6 43 5D A3 26 ^.....5=....C].& 0040: A4 91 8A C1 FA 7B 10 EA DC C3 C7 1C 47 DC 97 32 ............G..2 0050: C0 37 80 1C F1 42 10 E3 74 17 FA 3E 60 4A B7 59 .7...B..t..>`J.Y 0060: 92 C1 E0 6F BB F1 BB 9F 82 89 B5 83 D5 AE 1E 90 ...o............ 0070: 0A 89 8D FB 4C C0 C5 9E DC C5 8C C6 2F EE D9 B4 ....L......./... 0080: 95 47 27 2E BE 82 31 6F 76 C0 DB 4C C8 0D 3B 7B .G'...1ov..L..;. 0090: D1 6A BF BD 3B 93 30 04 A2 9E 81 F7 96 28 77 F2 .j..;.0......(w. 00A0: 32 05 68 44 1F B3 30 CE 40 9F 20 F3 B4 2B AA E6 2.hD..0.@. ..+.. 00B0: 40 9B FB 7F 34 6E 3A 99 FD F8 28 F1 8C 9B 56 34 @...4n:...(...V4 00C0: 64 AD 4D 56 39 CB 96 18 50 9B 99 43 80 0A 39 A5 d.MV9...P..C..9. 00D0: 13 7A 6E C5 25 E0 95 4A 92 E5 A8 8B EE 03 49 B4 .zn.%..J......I. 00E0: D9 7C 00 E3 F0 3B A7 BA 40 30 CC 89 55 C6 97 93 .....;..@0..U... 00F0: B5 15 F6 62 D3 B1 74 9C 0B 80 2B 8A D4 03 84 A0 ...b..t...+..... ] *** Allow unsafe renegotiation: false Allow legacy hello messages: true Is initial handshake: true Is secure renegotiation: false https-jsse-nio-8443-exec-1, READ: TLSv1.2 Change Cipher Spec, length = 1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1.1 https-jsse-nio-8443-exec-1, READ: TLSv1.2 Handshake, length = 40 *** Finished verify_data: { 254, 120, 247, 119, 80, 115, 73, 8, 6, 49, 109, 215 } *** Standard ciphersuite chosen: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 , 181, 161, 188, 73, 138, 97, 187, 233, 64, 66, 211, 32, 125, 147, 206, 185, 130, 222, 65, 181, 35, 153, 175, 201, 215, 221, 157, 40, 135, 44, *** Finished %% Negotiating: [Session-27, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384] *** ServerHello, TLSv1.2 RandomCookie: GMT: 1551699705 bytes = { 80, 31, 123, 42, 18, 17, 171, 17, 214, 173, 136, 103, 162, 42, 232, 209, 89, 181, 43, 112, 149, 36, 118, 63, 122, 226, 122, 168 } Session ID: {92, 125, 15, 249, 54, 170, 116, 2, 191, 242, 80, 152, 41, 194, 186, 125, 229, 187, 186, 200, 141, 185, 230, 141, 230, 195, 47, 61, 33, 116, 204, 226} Cipher Suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 Compression Method: 0 Extension renegotiation_info, renegotiated_connection: <empty> *** Cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 *** Certificate chain chain [0] = [ [ Version: V3 Subject: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5 Key: Sun RSA public key, 2048 bits modulus: 21944740401167172627731583459321030363948627215746053925732477915060915436180167456469785746662093119306577380200747716284652995937004530444336851845029170241627465854006145050037178991946925696078563485570896673835545540824265905937881682387179314987285174428010940266412458943894800978345731524307952507729956745301047871771953945124256516782917326981125087548987889540650149121302888872237484100834740328828765018090383963294418357028839734723410564800765871733483849269364796949055153420777966213779145518299141217288017794394762274753999989298548507425930217302947589819396239489846633419099079578249651345685751 public exponent: 65537 Validity: [From: Fri May 30 08:43:19 GMT 2014, To: Mon May 27 08:43:19 GMT 2024] Issuer: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US SerialNumber: [ a6ef7a9a 5368eb27] Certificate Extensions: 3 [1]: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: 78 0D 96 9D FE D3 0B BE 8C C7 E3 EC 67 04 AB 4B x...........g..K 0010: EA E0 00 29 ...) ] ] [2]: ObjectId: 2.5.29.19 Criticality=false BasicConstraints:[ CA:true PathLen:2147483647 ] [3]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 78 0D 96 9D FE D3 0B BE 8C C7 E3 EC 67 04 AB 4B x...........g..K 0010: EA E0 00 29 ...) ] ] ] Algorithm: [SHA1withRSA] Signature: 0000: 19 16 5A 21 99 21 24 98 3C 0A E8 D8 00 AB 44 24 ..Z!.!$.<.....D$ 0010: F2 0C B7 83 D5 9F 96 17 87 E2 1F 1D A3 47 68 C7 .............Gh. 0020: 68 4A CB 56 0E 77 2B E8 1A 9F E7 09 A1 19 77 D0 hJ.V.w+.......w. 0030: 5E CC C1 B3 9A C4 35 3D CB E0 A5 A6 43 5D A3 26 ^.....5=....C].& 0040: A4 91 8A C1 FA 7B 10 EA DC C3 C7 1C 47 DC 97 32 ............G..2 0050: C0 37 80 1C F1 42 10 E3 74 17 FA 3E 60 4A B7 59 .7...B..t..>`J.Y 0060: 92 C1 E0 6F BB F1 BB 9F 82 89 B5 83 D5 AE 1E 90 ...o............ 0070: 0A 89 8D FB 4C C0 C5 9E DC C5 8C C6 2F EE D9 B4 ....L......./... 0080: 95 47 27 2E BE 82 31 6F 76 C0 DB 4C C8 0D 3B 7B .G'...1ov..L..;. 0090: D1 6A BF BD 3B 93 30 04 A2 9E 81 F7 96 28 77 F2 .j..;.0......(w. 00A0: 32 05 68 44 1F B3 30 CE 40 9F 20 F3 B4 2B AA E6 2.hD..0.@. ..+.. 00B0: 40 9B FB 7F 34 6E 3A 99 FD F8 28 F1 8C 9B 56 34 @...4n:...(...V4 00C0: 64 AD 4D 56 39 CB 96 18 50 9B 99 43 80 0A 39 A5 d.MV9...P..C..9. 00D0: 13 7A 6E C5 25 E0 95 4A 92 E5 A8 8B EE 03 49 B4 .zn.%..J......I. 00E0: D9 7C 00 E3 F0 3B A7 BA 40 30 CC 89 55 C6 97 93 .....;..@0..U... 00F0: B5 15 F6 62 D3 B1 74 9C 0B 80 2B 8A D4 03 84 A0 ...b..t...+..... ] *** *** Diffie-Hellman ServerKeyExchange DH Modulus: { 255, 255, 255, 255, 255, 255, 255, 255, 201, 15, 218, 162, 33, 104, 194, 52, 196, 198, 98, 139, 128, 220, 28, 209, 41, 2, 78, 8, 138, 103, 204, 116, 2, 11, 190, 166, 59, 19, 155, 34, 81, 74, 8, 121, 142, 52, 4, 221, 239, 149, 25, 179, 205, 58, 67, 27, 48, 43, 10, 109, 242, 95, 20, 55, 79, 225, 53, 109, 109, 81, 194, 69, 228, 133, 181, 118, 98, 94, 126, 198, 244, 76, 66, 233, 166, 55, 237, 107, 11, 255, 92, 182, 244, 6, 183, 237, 238, 56, 107, 251, 90, 137, 159, 165, 174, 159, 36, 17, 124, 75, 31, 230, 73, 40, 102, 81, 236, 230, 83, 129, 255, 255, 255, 255, 255, 255, 255, 255 } DH Base: { 2 } Server DH Public Key: { 249, 34, 4, 101, 120, 235, 46, 202, 135, 27, 12, 183, 69, 27, 56, 183, 128, 15, 188, 63, 158, 109, 86, 66, 186, 116, 147, 111, 177, 249, 204, 128, 220, 61, 227, 180, 97, 212, 28, 169, 156, 160, 180, 158, 209, 1, 28, 155, 37, 226, 126, 40, 48, 30, 49, 13, 193, 79, 106, 131, 143, 23, 91, 116, 210, 40, 61, 98, 216, 198, 148, 65, 193, 205, 207, 219, 150, 178, 90, 235, 39 } https-jsse-nio-8443-exec-1, WRITE: TLSv1.2 Change Cipher Spec, length = 1 *** Finished verify_data: { 213, 15, 44, 237, 170, 168, 164, 162, 170, 0, 9, 124 } *** SESSION KEYGEN: PreMaster Secret: 0000: EE F3 D6 81 E9 EA F3 21 FD 6F 79 89 BA 30 1D 72 .......!.oy..0.r 0010: BD 14 4A 8D B1 93 0B BB 33 8C 48 60 7C 20 72 78 ..J.....3.H`. rx 0020: 87 F7 AD 67 87 CF A5 3A B2 F6 62 35 3D 9A E5 C2 ...g...:..b5=... 0030: 0F 37 03 82 88 35 06 9C D8 4B A1 0E 1C B0 E1 E0 .7...5...K...... 0040: 73 3F AD 6F 3B C1 36 DC DE A3 E8 5C 60 92 7E C7 s?.o;.6....\`... 0050: AC 98 CD FE CE 81 55 73 BE 69 CC 4F AA F7 06 6A ......Us.i.O...j 0060: 5C 24 A3 D9 11 B7 9F 5F F4 B2 91 2C D1 B5 01 51 \$....._...,...Q 0070: 82 05 5D 02 14 8B 3A ED 34 D8 C7 19 D7 A8 0C 14 ..]...:.4....... *** Diffie-Hellman ServerKeyExchange DH Modulus: { 255, 255, 255, 255, 255, 255, 255, 255, 201, 15, 218, 162, 33, 104, 194, 52, 196, 198, 98, 139, 128, 220, 28, 209, 41, 2, 78, 8, 138, 103, 204, 116, 2, 11, 190, 166, 59, 19, 155, 34, 81, 74, 8, 121, 142, 52, 4, 221, 239, 149, 25, 179, 205, 58, 67, 27, 48, 43, 10, 109, 242, 95, 20, 55, 79, 225, 53, 109, 109, 81, 194, 69, 228, 133, 181, 118, 98, 94, 126, 198, 244, 76, 66, 233, 166, 55, 237, 107, 11, 255, 92, 182, 244, 6, 183, 237, 238, 56, 107, 251, 90, 137, 159, 165, 174, 159, 36, 17, 124, 75, 31, 230, 73, 40, 102, 81, 236, 230, 83, 129, 255, 255, 255, 255, 255, 255, 255, 255 } DH Base: { 2 } Server DH Public Key: { 80, 151, 179, 151, 251, 100, 14, 216, 123, 15, 182, 247, 50, 15, 40, 67, 162, 250, 36, 53, 151, 185, 10, 56, 153, 170, 223, 122, 24, 236, 1, 45, 125, 139, 247, 103, 57, 66, 218, 138, 134, 156, 251, 184, 225, 239, 99, 111, 0, 20, 33, 179, 160, 35, 178, 16, 9, 93, 106, 170, 242, 187, 47, 90, 60, 15, 93, 140, 123, 93, 252, 246, 226, 187, 205, 194, 197, 166, 88, 101, 252, 216, 80, 174, 68, 59, 166, 159, 57, 241, 33, 93, 215, 254, 169, 240, 219, 58, 85, 228, 131, 238, 188, 83, 198, 169, 8, 209, 49, 168, 22, 145, 145, 47, 43, 173, 255, 203, 54, 41, 85, 152, 14, 121, 253, 96, 89, 179 } https-jsse-nio-8443-exec-10, READ: TLSv1 Handshake, length = 512 Signature Algorithm SHA256withRSA Signed with a DSA or RSA public key https-jsse-nio-8443-exec-1, WRITE: TLSv1.2 Handshake, length = 40 *** ServerHelloDone 6%% Cached server session: [Session-24, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384] CONNECTION KEYGEN: Client Nonce: 0000: E8 45 BF 85 2D CE D4 2E 5C D6 CE F4 35 0C B5 78 .E..-...\...5..x 0010: DC 0C 82 5A DB A0 92 C5 84 8A E8 31 9E 10 68 42 ...Z.......1..hB Server Nonce: 0000: 5C 7D 0F F9 6B 66 57 5E 53 B0 9F BB 33 3F 07 01 \...kfW^S...3?.. 0010: 7E 48 98 A4 35 26 50 B0 EC 6C F0 01 02 A6 77 A1 .H..5&P..l....w. Master Secret: 0000: A9 FA DC 5E 37 2E 0E 92 51 86 01 D1 FC DC 88 84 ...^7...Q....... 0010: D6 6A 83 69 B8 34 92 5F F4 98 DD CE 6E 05 25 FF .j.i.4._....n.%. 0020: AE 05 D9 15 93 88 01 21 BA 6E 55 F4 57 6B FF 58 .......!.nU.Wk.X ... no MAC keys used for this cipher Client write key: 0000: B1 9D 52 D8 FC 66 96 78 49 0A 14 54 5F E4 E0 01 ..R..f.xI..T_... 0010: C8 BA EC F8 6F F5 FA 64 AF B8 5C 77 00 68 F5 83 ....o..d..\w.h.. Server write key: 0000: CA AC EA 46 4B DA 60 C2 77 BA E2 26 35 A0 7E F1 ...FK.`.w..&5... 0010: 9D D4 25 CA 3E F9 4B 39 54 BF 6D 07 B8 FA 2D FF ..%.>.K9T.m...-. Client write IV: 0000: 5B 72 2B 8C [r+. Server write IV: 0000: 17 9D 24 C0 ..$. verify_data: { 109, 123, 53, 207, 202, 145, 224, 178, 64, 216, 144, 213 } *** *** ClientHello, TLSv1.2 RandomCookie: GMT: -1445835424 bytes = { 93, 113, https-jsse-nio-8443-exec-3, READ: TLSv1.2 Change Cipher Spec, length = 1 https-jsse-nio-8443-exec-3, READ: TLSv1.2 Handshake, length = 40 https-jsse-nio-8443-exec-6, WRITE: TLSv1.2 Handshake, length = 40 %% Cached server session: [Session-22, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384] https-jsse-nio-8443-exec-2, WRITE: TLSv1.2 Handshake, length = 1697 , 162, 63, 57, 114, 142, 115, 205, 73, 95, 34, 164, 142, 24, 246, 3, 31, 252, 207, 60, 17, 3, 250, 180, 231, 177, 219, 105, 157, 165, 237, 234, 109, 224, 226, 67, 68, 83, 76, 155, 82, 152, 133, 163, 55, 173, 24, 242, 30, 75, 250, 16, 6, 210, 156, 15, 111, 33, 77, 65, 16, 206, 157, 130, 39, 5, 237, 33, 204, 180, 77, 188, 133, 186, 247, 192, 115, 154, 176, 151, 147, 135, 56, 4, 68, 69, 177, 138, 135, 76, 195, 109, 171, 83, 165, 177, 60, 152, 160, 213, 193 } Signature Algorithm SHA256withRSA Signed with a DSA or RSA public key *** ServerHelloDone https-jsse-nio-8443-exec-5, WRITE: TLSv1.2 Handshake, length = 1697 https-jsse-nio-8443-exec-7, WRITE: TLSv1.2 Application Data, length = 84 https-jsse-nio-8443-exec-1, WRITE: TLSv1.2 Application Data, length = 86 *** Finished verify_data: { 9, 216, 105, 120, 42, 26, 130, 219, 218, 43, 136, 236 } *** https-jsse-nio-8443-exec-3, WRITE: TLSv1.2 Change Cipher Spec, length = 1 *** Finished verify_data: { 126, 33, 145, 31, 210, 188, 44, 237, 241, 185, 61, 118 } *** 211https-jsse-nio-8443-exec-3, WRITE: TLSv1.2 Handshake, length = 40 %% Cached server session: [Session-25, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384] , https-jsse-nio-8443-exec-7, READ: TLSv1.2 Handshake, length = 134 230, 40, 177, 3, 127, 110, 55, 83, 130, 57, 195, 152, 48, 217https-jsse-nio-8443-exec-3, READ: TLSv1.2 Handshake, length = 134 Using SSLEngineImpl. Using SSLEngineImpl. Allow unsafe renegotiation: false Allow legacy hello messages: true Is initial handshake: true Is secure renegotiation: false Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1.1 https-jsse-nio-8443-exec-5, READ: TLSv1 Handshake, length = 512 *** ClientHello, TLSv1.2 RandomCookie: GMT: 2053401816 bytes = { 148, 224, 14, 77, 32, 125, 24, 57, 203, 77, 181, 170, 4, 106, 213, 199, 228, 235, 52, 181, 11, 112, 93, 112, 171, 49, 10, 37 } Session ID: {92, 125, 15, 249, 156, 49, 93, 110, 51, 118, 78, 147, 13, 67, 50, 119, 4, 139, 247, 123, 140, 61, 206, 121, 197, 180, 71, 56, 123, 67, 20, 120} Cipher Suites: [Unknown 0x13:0x2, Unknown 0x13:0x3, Unknown 0x13:0x1, Unknown 0x13:0x4, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa9, Unknown 0xc0:0xad, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0xac, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa8, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xc0:0x9d, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9c, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xaa, Unknown 0xc0:0x9f, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9e, TLS_DHE_RSA_WITH_AES_128_CBC_SHA] Compression Methods: { 0 } Unsupported extension status_request, data: 01:00:00:00:00 Extension elliptic_curves, curve names: {secp256r1, secp384r1, secp521r1, unknown curve 29, unknown curve 256, unknown curve 257, unknown curve 258, unknown curve 259, unknown curve 260} Extension ec_point_formats, formats: [uncompressed] Extension signature_algorithms, signature_algorithms: SHA256withRSA, Unknown (hash:0x8, signature:0x9), Unknown (hash:0x8, signature:0x4), SHA256withECDSA, Unknown (hash:0x8, signature:0x7), SHA384withRSA, Unknown (hash:0x8, signature:0xa), Unknown (hash:0x8, signature:0x5), SHA384withECDSA, SHA512withRSA, Unknown (hash:0x8, signature:0xb), Unknown (hash:0x8, signature:0x6), SHA512withECDSA, SHA1withRSA, SHA1withECDSA Unsupported extension type_35, data: Unsupported extension type_51, data: 00:69:00:17:00:41:04:f9:06:ae:3a:6e:b4:87:2a:fa:17:d6:c4:a1:e0:7f:a7:52:81:89:35:22:ce:b1:4e:7d:98:8b:32:1f:ff:a0:f5:b1:d0:6f:18:6c:3a:9f:af:e4:fe:af:cc:f3:b1:46:ea:af:d7:81:d0:5b:fe:84:e3:64:39:8e:83:0a:d2:8d:2a:00:1d:00:20:04:e8:b1:f6:ce:ee:4a:44:2c:85:1b:4c:68:d1:47:d9:c4:9e:83:e8:c7:ba:14:7d:9a:03:44:84:a8:9c:0b:20 Unsupported extension type_43, data: 08:03:04:03:03:03:02:03:01 Extension renegotiation_info, renegotiated_connection: <empty> Extension server_name, server_name: [type=host_name (0), value=localhost] Unsupported extension type_45, data: 02:01:00 Unsupported extension type_28, data: 40:00 Unsupported extension type_21, data: 00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00 *** %% Initialized: [Session-28, SSL_NULL_WITH_NULL_NULL] Standard ciphersuite chosen: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 *** ClientKeyExchange, DH DH Public key: { 48, 34, 64, 24, 169, 248, 73, 199, 172, 0, 53, 197, 133, 94, 1, 70, 20, 133, 212, 110, 67, 193, 147, 251, 211, 241, 172, 249, 40, 136, 249, 104, 176, 108, 236, 138, 221, 229, 138, 95, 20, 190, 23, 133, 254, 135, 8, 208, 29, 148, 3, 232, 220, 14, 178, 18, 91, 41, 233, 18, 133, 160, 199, 16, 74, 14, 148, 119, 193, 72, 180, 136, 227, 104, 159, 200, 249, 195, 136, 110, 43, 165, 113, 78, 149, 130, 79, 14, 90, 117, 196, 45, 47, 214, 59, 52, 141, 124, 109, 186, 28, 69, 1, 18, 28, 47, 2, 252, 137, 190, 111, 13, 192, 154, 57, 127, 33, 51, 211, 81, 252, 179, 48, 82, 135, 189, 138, 230 } https-jsse-nio-8443-exec-8, READ: TLSv1.2 Alert, length = 26 https-jsse-nio-8443-exec-8, RECV TLSv1.2 ALERT: warning, close_notify https-jsse-nio-8443-exec-8, closeInboundInternal() https-jsse-nio-8443-exec-8, closeOutboundInternal() https-jsse-nio-8443-exec-8, SEND TLSv1.2 ALERT: warning, description = close_notify https-jsse-nio-8443-exec-8, WRITE: TLSv1.2 Alert, length = 26 https-jsse-nio-8443-exec-8, called closeOutbound() https-jsse-nio-8443-exec-8, closeOutboundInternal() SESSION KEYGEN: PreMaster Secret: 0000: DC 0C 88 10 59 F4 10 07 C1 F2 1B C8 E6 6E 7D 06 ....Y........n.. 0010: EA 55 E7 B4 A5 91 1D AC 33 5A 8D B7 FB 7D 47 FE .U......3Z....G. 0020: 50 CB 29 99 E4 4A 93 92 54 80 D6 06 76 22 6B AA P.)..J..T...v"k. 0030: 46 A7 34 0F DF 17 EB 88 7B 61 90 AD 93 D6 B7 8B F.4......a...... 0040: 75 4F BD 18 77 E9 1F 69 90 30 B9 B6 44 48 BF 90 uO..w..i.0..DH..https-jsse-nio-8443-exec-9, WRITE: TLSv1.2 Application Data, length = 84 , https-jsse-nio-8443-exec-4, READ: TLSv1.2 Alert, length = 26 0050: DC 56 B8 65 A1 7C 41 E3 44 40 FD 7B 67 BB D7 39 .V.e..A.D@..g..9 0060: 7C A8 9D E7 8E D0 DD D1 A5 6A 52 62 51 42 7B FF .........jRbQB.. 0070: FB 7E 70 B7 50 4D EC D2 80 D2 65 0C 2B FB BE 20 ..p.PM....e.+.. 80, 6, 182, 162, 250, 225, 14, Using SSLEngineImpl. *** ClientKeyExchange, DH DH Public key: { 11, 36, 95, 147, 200, 46, 23, 65, 34, 175, 80, 49, 72, 42, 126, 86, 62, 9, 40, 189, 190, 210, 21, 223, 253, 20, 2, 176, 106, 70, 77, 249, 108, 194, 235, 107, 25, 221, 69, 129, 163, 186, 246, 65, 168, 31, 15, 157, 201, 228, 34, 55, 229, 239, 111, 159, 193, 164, 13, 186, 114, 193, 34, 35, 51, 78, 254, 20, 119, 47, 3, 36, 245, 116, 33, 138, 69, 59, 130, 134, 135, 59, 131, 130, 186, 60, 146, 202, 238, 176, 24, 0, 14, 206, 239, 32, 11, 250, 126, 87, 42, 187, 5, 62, 46, 135, 183, 132, 77, 201, 220, 7, 229, 173, 227, 53, 109, 131, 105, 1, 46, 233, 226, 240, 39, 215, 169, 173 } Allow unsafe renegotiation: false Allow legacy hello messages: true Is initial handshake: true Is secure renegotiation: false %% Negotiating: [Session-28, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384] Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1 CONNECTION KEYGEN: Client Nonce: 0000: D8 1A 0C C8 BB CA 07 31 41 DA 69 43 85 6D 14 53 .......1A.iC.m.S 0010: D2 44 6E D0 6B 66 B6 C5 5B C2 3B CC 0D 8F 0F 1C .Dn.kf..[.;..... Server Nonce: 0000: 5C 7D 0F F9 50 1F 7B 2A 12 11 AB 11 D6 AD 88 67 \...P..*.......g 0010: A2 2A E8 D1 59 B5 2B 70 95 24 76 3F 7A E2 7A A8 .*..Y.+p.$v?z.z. Master Secret: 0000: 4C 3E 9F 8D 91 B9 5E 89 4F F1 CF AB 0A 3B 96 2D L>....^.O....;.- 0010: 65 21 CC 6C A2 3F 26 11 4B FA 66 B1 9A 0E 9E E6 e!.l.?&.K.f..... 0020: E6 0D AF 92 3D 05 53 FB B8 FD 44 30 74 08 97 CA ....=.S...D0t... ... no MAC keys used for this cipher Client write key: 0000: E7 95 1C B0 04 D1 CA 47 F7 86 E5 A6 86 F1 59 9D .......G......Y. 0010: F4 DD 9A AB 7E 82 5D 7B 3A 44 51 ED B8 2C EB 9A ......].:DQ..,.. Server write key: 0000: 43 D0 63 5E 94 0D 92 74 9E 56 06 38 2B E2 66 F6 C.c^...t.V.8+.f. 0010: 43 6C BA EF 67 4F 02 AC C8 C2 F6 CB 63 45 F8 8D Cl..gO......cE.. Client write IV: 0000: 45 0F CF 5E E..^ Server write IV: 0000: CE CA A5 94 .... Allow unsafe renegotiation: false Allow legacy hello messages: true Is initial handshake: true Is secure renegotiation: false 64https-jsse-nio-8443-exec-4, RECV TLSv1.2 ALERT: warning, close_notify https-jsse-nio-8443-exec-4, closeInboundInternal() https-jsse-nio-8443-exec-4, closeOutboundInternal() https-jsse-nio-8443-exec-6, READ: TLSv1.2 Alert, length = 26 , 246, 207, 27 } Session ID: https-jsse-nio-8443-exec-4, SEND TLSv1.2 ALERT: warning, description = close_notify Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1 https-jsse-nio-8443-exec-7, READ: TLSv1.2 Change Cipher Spec, length = 1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1 SESSION KEYGEN: PreMaster Secret: *** ServerHello, TLSv1.2 RandomCookie: https-jsse-nio-8443-exec-7, READ: TLSv1.2 Handshake, length = 40 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1.1 https-jsse-nio-8443-exec-4, WRITE: TLSv1.2 Alert, length = 26 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1 *** Finished verify_data: { 208, 123, 201, 66, 27, 254, 243, 98, 61, 97, 37, 252 } *** https-jsse-nio-8443-exec-4, called closeOutbound() https-jsse-nio-8443-exec-4, closeOutboundInternal() {92, 125, 15, 248, 93, 114, 159, 202, 158, 231, 130, 170, 240, 207, 79, 78, 139, 64, 227, 229, 102, 241, 205, 156, 132, 129, 45, 27, 166, 93, 182, 26} https-jsse-nio-8443-exec-6, RECV TLSv1.2 ALERT: warning, close_notify Cipher Suites: [Unknown 0x13:0x2, Unknown 0x13:0x3, Unknown 0x13:0x1, Unknown 0x13:0x4, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa9, Unknown 0xc0:0xad, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0xac, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa8, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xc0:0x9d, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9c, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xaa, Unknown 0xc0:0x9f, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9e, TLS_DHE_RSA_WITH_AES_128_CBC_SHA] Compression Methods: { 0 } https-jsse-nio-8443-exec-7, WRITE: TLSv1.2 Change Cipher Spec, length = 1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1.1 *** Finished verify_data: { 248, 20, 218, 241, 12, 96, 21, 71, 10, 184, 158, 230 } *** https-jsse-nio-8443-exec-1, READ: TLSv1 Handshake, length = 512 https-jsse-nio-8443-exec-7, WRITE: TLSv1.2 Handshake, length = 40 %% Cached server session: [Session-27, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384] *** ClientHello, TLSv1.2 RandomCookie: GMT: -841722745 bytes = { 65, 228, 116, 172, 228, 143, 92, 103, 78, 107, 151, 92, 0, 5, 248, 89, 203, 135, 220, 33, 22, 217, 207, 96, 221, 63, 138, 53 } Session ID: {92, 125, 15, 249, 91, 136, 187, 27, 204, 162, 102, 165, 117, 174, 228, 167, 61, 220, 8, 91, 233, 74, 141, 46, 20, 170, 254, 125, 209, 24, 126, 159} Cipher Suites: [Unknown 0x13:0x2, Unknown 0x13:0x3, Unknown 0x13:0x1, Unknown 0x13:0x4, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa9, Unknown 0xc0:0xad, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0xac, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa8, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xc0:0x9d, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9c, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xaa, Unknown 0xc0:0x9f, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9e, TLS_DHE_RSA_WITH_AES_128_CBC_SHA] Compression Methods: { 0 } Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1.1 GMT: 1551699706 0000: 3D 0B CD 37 40 B6 31 42 59 C7 DE 09 FD D0 2F 31 =..7@.1BY...../1 0010: CE 03 6A C1 3C 0F FF 9B A0 F2 06 CD EC 5D 19 2E ..j.<........].. 0020: 3B 50 6A 31 50 09 23 01 73 1D 1E 49 BF 18 DD 89 ;Pj1P.#.s..I.... 0030: 82 5B 8F BD 02 13 AD 01 48 BB 89 F2 66 E8 86 6D .[......H...f..m 0040: 78 8A 93 10 74 6E 49 4B 68 B9 D0 CC 8B AE AD CB x...tnIKh....... 0050: E1 C6 36 80 47 90 1F 06 62 74 C3 ED C0 AC A8 9E ..6.G...bt...... 0060: 14 71 6E 4E 42 3E 32 69 A6 AD FF 20 E0 F2 B9 AD .qnNB>2i... .... 0070: DA 05 45 5A C7 16 AC 0B CB 77 9D E6 18 5C A0 3F ..EZ.....w...\.? Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1 Unsupported extension status_request, data: 01:00:00:00:00 Extension elliptic_curves, curve names: {secp256r1, secp384r1, secp521r1, unknown curve 29, unknown curve 256, unknown curve 257, unknown curve 258, unknown curve 259, unknown curve 260} Extension ec_point_formats, formats: [uncompressed] Extension signature_algorithms, signature_algorithms: SHA256withRSA, Unknown (hash:0x8, signature:0x9), Unknown (hash:0x8, signature:0x4), SHA256withECDSA, Unknown (hash:0x8, signature:0x7), SHA384withRSA, Unknown (hash:0x8, signature:0xa), Unknown (hash:0x8, signature:0x5), SHA384withECDSA, SHA512withRSA, Unknown (hash:0x8, signature:0xb), Unknown (hash:0x8, signature:0x6), SHA512withECDSA, SHA1withRSA, SHA1withECDSA Unsupported extension type_35, data: CONNECTION KEYGEN: Client Nonce: 0000: AC 1B A2 2D 64 8E 4A EB 07 82 06 CB 0D 67 C8 DA ...-d.J......g.. 0010: FF CC E5 D6 73 7A 3E 54 FE 41 7C C5 01 5F 7D 8E ....sz>T.A..._.. Server Nonce: 0000: 5C 7D 0F F9 2D 9A 66 5A 58 A5 95 E3 2F 66 1B 85 \...-.fZX.../f.. 0010: 95 7D 88 00 E0 17 4E 78 96 D9 10 E0 F2 EC F1 F0 ......Nx........ Master Secret: 0000: 7D AC 34 6F EF E4 3A 1D 16 BC 23 90 BA AA 95 47 ..4o..:...#....G 0010: 45 DE FE F1 84 AA B8 02 7A 75 A3 BF E7 85 0B C1 E.......zu...... 0020: 48 26 6F 02 A3 55 31 06 7A AE B5 62 E5 6F 90 44 H&o..U1.z..b.o.D ... no MAC keys used for this cipher Client write key: 0000: 5C F0 6C 79 38 9D EA A7 04 66 ED 02 DD 8E 23 C3 \.ly8....f....#. 0010: C1 CC 73 B5 31 25 65 FC C2 23 D6 2E 38 FB 6E 23 ..s.1%e..#..8.n# Server write key: 0000: 89 94 D7 E8 B9 44 AB 35 28 1C 1D 7E 1B 4D 7E F7 .....D.5(....M.. 0010: 8D 83 29 F7 ED AC EB D2 71 5D 1E B2 1B 32 9D AE ..).....q]...2.. Client write IV: 0000: 27 1A F7 1E '... Server write IV: 0000: 97 C2 12 1D .... https-jsse-nio-8443-exec-9, WRITE: TLSv1.2 Application Data, length = 85 bytes = { 204, 189, 225, 252, 251, 151, 86, 169, Unsupported extension status_request, data: 01:00:00:00:00 https-jsse-nio-8443-exec-6, closeInboundInternal() Extension elliptic_curves, curve names: {secp256r1, secp384r1, secp521r1, unknown curve 29, unknown curve 256, unknown curve 257, unknown curve 258, unknown curve 259, unknown curve 260} https-jsse-nio-8443-exec-6, closeOutboundInternal() https-jsse-nio-8443-exec-6, SEND TLSv1.2 ALERT: warning, description = close_notify 220, Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1.1 Unsupported extension type_51, data: 00:69:00:17:00:41:04:d9:c8:0c:3a:d4:ef:f0:1b:d5:04:11:29:95:12:39:7c:43:b3:85:27:b0:0d:78:1f:2c:f2:ae:58:b8:d4:bd:68:62:07:71:9f:04:1a:c3:8a:c9:f8:a3:08:ef:00:e3:3b:56:b7:a4:71:7a:13:25:15:bd:90:93:18:21:64:9f:5b:00:1d:00:20:b4:4f:48:6e:50:c1:59:ed:ea:c6:72:5f:37:2d:7e:a6:3d:37:1f:68:2b:39:38:bf:ea:e1:16:ea:5e:82:ea:4e https-jsse-nio-8443-exec-6, WRITE: TLSv1.2 Alert, length = 26 Unsupported extension type_43, data: 08:03:04:03:03:03:02:03:01 Extension renegotiation_info, renegotiated_connection: <empty> Extension server_name, server_name: [type=host_name (0), value=localhost] Unsupported extension type_45, data: 02:01:00 Unsupported extension type_28, data: 40:00 Unsupported extension type_21, data: 00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00 *** https-jsse-nio-8443-exec-6, called closeOutbound() https-jsse-nio-8443-exec-6, closeOutboundInternal() https-jsse-nio-8443-exec-2, READ: TLSv1 Handshake, length = 512 %% Initialized: [Session-29, SSL_NULL_WITH_NULL_NULL] 225, 63, 17, 125, 96, 238, 54, 43, 21, 156, 232, 216, 58, 228, 154, 248, 174, 204, 10 } Session ID: Using SSLEngineImpl. https-jsse-nio-8443-exec-3, READ: TLSv1.2 Change Cipher Spec, length = 1 https-jsse-nio-8443-exec-9, READ: TLSv1.2 Alert, length = 26 https-jsse-nio-8443-exec-9, RECV TLSv1.2 ALERT: warning, close_notify https-jsse-nio-8443-exec-9, closeInboundInternal() https-jsse-nio-8443-exec-9, closeOutboundInternal() Extension ec_point_formats, formats: [uncompressed] https-jsse-nio-8443-exec-9, SEND TLSv1.2 ALERT: warning, description = close_notify Allow unsafe renegotiation: false Allow legacy hello messages: true Is initial handshake: true Is secure renegotiation: false https-jsse-nio-8443-exec-9, WRITE: TLSv1.2 Alert, length = 26 https-jsse-nio-8443-exec-3, READ: TLSv1.2 Handshake, length = 40 *** Finished verify_data: { 73, 179, 195, 241, 103, 116, 73, 118, 82, 182, 111, 241 } *** https-jsse-nio-8443-exec-3, WRITE: TLSv1.2 Change Cipher Spec, length = 1 *** Finished verify_data: { 7, 128, 252, 155, 154, 205, 9, 249, 54, 152, 253, 104 } *** https-jsse-nio-8443-exec-3, WRITE: TLSv1.2 Handshake, length = 40 %% Cached server session: [Session-26, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384] {92, 125, 15, 250, 225, 182, 144, 58, 48, 185, 18, 246, 100, 222, 33, 147, 194, 167, 240, 162, 177, 41, 139, 155, 196, 114, 95, 42, 38, 51, 126, 110} Cipher Suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 Compression Method: 0 Extension renegotiation_info, renegotiated_connection: <empty> *** Cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 *** Certificate chain Standard ciphersuite chosen: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 %% Negotiating: [Session-29, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384] *** ServerHello, TLSv1.2 RandomCookie: GMT: 1551699706 bytes = { 114, 239, 126, 9, 5, 105, 71, 25, 252, 143, 205, 72, 188, 245, 37, 7, 64, 196, 53, 229, 151, 48, 55, 192, 12, 144, 216, 30 } Session ID: {92, 125, 15, 250, 188, 57, 138, 125, 16, 60, 221, 41, 168, 170, 135, 79, 161, 235, 14, 145, 100, 143, 235, 89, 37, 191, 60, 95, 56, 61, 179, 138} Cipher Suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 Compression Method: 0 Extension renegotiation_info, renegotiated_connection: <empty> *** chain [0] = [ [ Version: V3 Subject: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5 Key: Sun RSA public key, 2048 bits modulus: 21944740401167172627731583459321030363948627215746053925732477915060915436180167456469785746662093119306577380200747716284652995937004530444336851845029170241627465854006145050037178991946925696078563485570896673835545540824265905937881682387179314987285174428010940266412458943894800978345731524307952507729956745301047871771953945124256516782917326981125087548987889540650149121302888872237484100834740328828765018090383963294418357028839734723410564800765871733483849269364796949055153420777966213779145518299141217288017794394762274753999989298548507425930217302947589819396239489846633419099079578249651345685751 public exponent: 65537 Validity: [From: Fri May 30 08:43:19 GMT 2014, To: Mon May 27 08:43:19 GMT 2024] Issuer: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US SerialNumber: [ a6ef7a9a 5368eb27] Certificate Extensions: 3 [1]: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: 78 0D 96 9D FE D3 0B BE 8C C7 E3 EC 67 04 AB 4B x...........g..K 0010: EA E0 00 29 ...) ] ] [2]: ObjectId: 2.5.29.19 Criticality=false BasicConstraints:[ CA:true PathLen:2147483647 ] [3]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 78 0D 96 9D FE D3 0B BE 8C C7 E3 EC 67 04 AB 4B x...........g..K 0010: EA E0 00 29 ...) ] ] ] Algorithm: [SHA1withRSA] Signature: 0000: 19 16 5A 21 99 21 24 98 3C 0A E8 D8 00 AB 44 24 ..Z!.!$.<.....D$ 0010: F2 0C B7 83 D5 9F 96 17 87 E2 1F 1D A3 47 68 C7 .............Gh. 0020: 68 4A CB 56 0E 77 2B E8 1A 9F E7 09 A1 19 77 D0 hJ.V.w+.......w. 0030: 5E CC C1 B3 9A C4 35 3D CB E0 A5 A6 43 5D A3 26 ^.....5=....C].& 0040: A4 91 8A C1 FA 7B 10 EA DC C3 C7 1C 47 DC 97 32 ............G..2 0050: C0 37 80 1C F1 42 10 E3 74 17 FA 3E 60 4A B7 59 .7...B..t..>`J.Y 0060: 92 C1 E0 6F BB F1 BB 9F 82 89 B5 83 D5 AE 1E 90 ...o............ 0070: 0A 89 8D FB 4C C0 C5 9E DC C5 8C C6 2F EE D9 B4 ....L......./... 0080: 95 47 27 2E BE 82 31 6F 76 C0 DB 4C C8 0D 3B 7B .G'...1ov..L..;. 0090: D1 6A BF BD 3B 93 30 04 A2 9E 81 F7 96 28 77 F2 .j..;.0......(w. 00A0: 32 05 68 44 1F B3 30 CE 40 9F 20 F3 B4 2B AA E6 2.hD..0.@. ..+.. 00B0: 40 9B FB 7F 34 6E 3A 99 FD F8 28 F1 8C 9B 56 34 @...4n:...(...V4 00C0: 64 AD 4D 56 39 CB 96 18 50 9B 99 43 80 0A 39 A5 d.MV9...P..C..9. 00D0: 13 7A 6E C5 25 E0 95 4A 92 E5 A8 8B EE 03 49 B4 .zn.%..J......I. 00E0: D9 7C 00 E3 F0 3B A7 BA 40 30 CC 89 55 C6 97 93 .....;..@0..U... 00F0: B5 15 F6 62 D3 B1 74 9C 0B 80 2B 8A D4 03 84 A0 ...b..t...+..... ] *** *** ClientHello, TLSv1.2 RandomCookie: https-jsse-nio-8443-exec-6, WRITE: TLSv1.2 Application Data, length = 85 Cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 *** Certificate chain https-jsse-nio-8443-exec-9, called closeOutbound() https-jsse-nio-8443-exec-9, closeOutboundInternal() Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1 Extension signature_algorithms, signature_algorithms: SHA256withRSA, Unknown (hash:0x8, signature:0x9), Unknown (hash:0x8, signature:0x4), SHA256withECDSA, Unknown (hash:0x8, signature:0x7), SHA384withRSA, Unknown (hash:0x8, signature:0xa), Unknown (hash:0x8, signature:0x5), SHA384withECDSA, SHA512withRSA, Unknown (hash:0x8, signature:0xb), Unknown (hash:0x8, signature:0x6), SHA512withECDSA, SHA1withRSA, SHA1withECDSA Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1.1 https-jsse-nio-8443-exec-4, READ: TLSv1 Handshake, length = 512 *** ClientHello, TLSv1.2 RandomCookie: GMT: -209766810 bytes = { 8, 125, 119, 215, 218, 232, 42, 255, 1, 118, 4, 106, 6, 20, 3, 19, 84, 215, 58, 245, 187, 209, 138, 135, 116, 9, 38, 139 } Session ID: {92, 125, 15, 249, 54, 170, 116, 2, 191, 242, 80, 152, 41, 194, 186, 125, 229, 187, 186, 200, 141, 185, 230, 141, 230, 195, 47, 61, 33, 116, 204, 226} Cipher Suites: [Unknown 0x13:0x2, Unknown 0x13:0x3, Unknown 0x13:0x1, Unknown 0x13:0x4, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa9, Unknown 0xc0:0xad, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0xac, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa8, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xc0:0x9d, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9c, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xaa, Unknown 0xc0:0x9f, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9e, TLS_DHE_RSA_WITH_AES_128_CBC_SHA] Compression Methods: { 0 } GMT: 432589448 bytes = { Unsupported extension status_request, data: 01:00:00:00:00 *** Diffie-Hellman ServerKeyExchange https-jsse-nio-8443-exec-7, READ: TLSv1.2 Alert, length = 26 chain [0] = [ [ Version: V3 Subject: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5 Key: Sun RSA public key, 2048 bits modulus: 21944740401167172627731583459321030363948627215746053925732477915060915436180167456469785746662093119306577380200747716284652995937004530444336851845029170241627465854006145050037178991946925696078563485570896673835545540824265905937881682387179314987285174428010940266412458943894800978345731524307952507729956745301047871771953945124256516782917326981125087548987889540650149121302888872237484100834740328828765018090383963294418357028839734723410564800765871733483849269364796949055153420777966213779145518299141217288017794394762274753999989298548507425930217302947589819396239489846633419099079578249651345685751 public exponent: 65537 Validity: [From: Fri May 30 08:43:19 GMT 2014, To: Mon May 27 08:43:19 GMT 2024] Issuer: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US SerialNumber: [ a6ef7a9a 5368eb27] Certificate Extensions: 3 [1]: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: 78 0D 96 9D FE D3 0B BE 8C C7 E3 EC 67 04 AB 4B x...........g..K 0010: EA E0 00 29 ...) ] ] [2]: ObjectId: 2.5.29.19 Criticality=false BasicConstraints:[ CA:true PathLen:2147483647 ] [3]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 78 0D 96 9D FE D3 0B BE 8C C7 E3 EC 67 04 AB 4B x...........g..K 0010: EA E0 00 29 ...) ] ] ] Algorithm: [SHA1withRSA] Signature: 0000: 19 16 5A 21 99 21 24 98 3C 0A E8 D8 00 AB 44 24 ..Z!.!$.<.....D$ 0010: F2 0C B7 83 D5 9F 96 17 87 E2 1F 1D A3 47 68 C7 .............Gh. 0020: 68 4A CB 56 0E 77 2B E8 1A 9F E7 09 A1 19 77 D0 hJ.V.w+.......w. 0030: 5E CC C1 B3 9A C4 35 3D CB E0 A5 A6 43 5D A3 26 ^.....5=....C].& 0040: A4 91 8A C1 FA 7B 10 EA DC C3 C7 1C 47 DC 97 32 ............G..2 0050: C0 37 80 1C F1 42 10 E3 74 17 FA 3E 60 4A B7 59 .7...B..t..>`J.Y 0060: 92 C1 E0 6F BB F1 BB 9F 82 89 B5 83 D5 AE 1E 90 ...o............ 0070: 0A 89 8D FB 4C C0 C5 9E DC C5 8C C6 2F EE D9 B4 ....L......./... 0080: 95 47 27 2E BE 82 31 6F 76 C0 DB 4C C8 0D 3B 7B .G'...1ov..L..;. 0090: D1 6A BF BD 3B 93 30 04 A2 9E 81 F7 96 28 77 F2 .j..;.0......(w. 00A0: 32 05 68 44 1F B3 30 CE 40 9F 20 F3 B4 2B AA E6 2.hD..0.@. ..+.. 00B0: 40 9B FB 7F 34 6E 3A 99 FD F8 28 F1 8C 9B 56 34 @...4n:...(...V4 00C0: 64 AD 4D 56 39 CB 96 18 50 9B 99 43 80 0A 39 A5 d.MV9...P..C..9. 00D0: 13 7A 6E C5 25 E0 95 4A 92 E5 A8 8B EE 03 49 B4 .zn.%..J......I. 00E0: D9 7C 00 E3 F0 3B A7 BA 40 30 CC 89 55 C6 97 93 .....;..@0..U... 00F0: B5 15 F6 62 D3 B1 74 9C 0B 80 2B 8A D4 03 84 A0 ...b..t...+..... ] *** Unsupported extension type_35, data: Using SSLEngineImpl. Unsupported extension type_51, data: 00:69:00:17:00:41:04:61:04:95:c1:75:8e:e0:83:4e:89:4f:5d:49:44:2f:ba:ef:d1:22:e8:7b:f5:f8:7c:be:01:dd:e0:75:b3:fe:0c:e6:20:40:26:71:58:60:e5:61:59:2d:7c:48:56:43:d0:18:54:42:bb:56:3b:f4:19:df:97:1f:06:35:62:ae:ee:00:1d:00:20:a6:88:a2:a4:d6:99:a2:5b:cb:96:17:43:7d:15:53:91:82:1d:ef:05:95:23:2a:a6:eb:7b:00:c7:e2:1c:51:35 Unsupported extension type_43, data: 08:03:04:03:03:03:02:03:01 Extension renegotiation_info, renegotiated_connection: <empty> Extension server_name, server_name: [type=host_name (0), value=localhost] Unsupported extension type_45, data: 02:01:00 Unsupported extension type_28, data: 40:00 Unsupported extension type_21, data: 00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00 *** Allow unsafe renegotiation: false Allow legacy hello messages: true Is initial handshake: true Is secure renegotiation: false Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1.1 https-jsse-nio-8443-exec-3, READ: TLSv1 Handshake, length = 512 *** ClientHello, TLSv1.2 RandomCookie: GMT: -1728403289 bytes = { 132, 80, 154, 97, 158, 204, 23, 84, 200, 119, 197, 247, 175, 255, 201, 93, 67, 178, 204, 156, 194, 203, 170, 34, 129, 114, 165, 239 } Session ID: {92, 125, 15, 249, 14, 195, 194, 111, 161, 3, 34, 99, 124, 78, 235, 106, 195, 192, 56, 64, 253, 184, 107, 141, 133, 130, 225, 46, 214, 255, 68, 213} Cipher Suites: [Unknown 0x13:0x2, Unknown 0x13:0x3, Unknown 0x13:0x1, Unknown 0x13:0x4, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa9, Unknown 0xc0:0xad, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0xac, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa8, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xc0:0x9d, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9c, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xaa, Unknown 0xc0:0x9f, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9e, TLS_DHE_RSA_WITH_AES_128_CBC_SHA] Compression Methods: { %% Initialized: [Session-30, SSL_NULL_WITH_NULL_NULL] https-jsse-nio-8443-exec-7, RECV TLSv1.2 ALERT: warning, close_notify Extension elliptic_curves, curve names: {secp256r1, secp384r1, secp521r1, unknown curve 29, unknown curve 256, unknown curve 257, unknown curve 258, unknown curve 259, unknown curve 260} Extension ec_point_formats, formats: [uncompressed] Extension signature_algorithms, signature_algorithms: SHA256withRSA, Unknown (hash:0x8, signature:0x9), Unknown (hash:0x8, signature:0x4), SHA256withECDSA, Unknown (hash:0x8, signature:0x7), SHA384withRSA, Unknown (hash:0x8, signature:0xa), Unknown (hash:0x8, signature:0x5), SHA384withECDSA, SHA512withRSA, Unknown (hash:0x8, signature:0xb), Unknown (hash:0x8, signature:0x6), SHA512withECDSA, SHA1withRSA, SHA1withECDSA Unsupported extension type_35, data: Unsupported extension type_51, data: 00:69:00:17:00:41:04:fc:f0:a5:a3:b9:08:96:75:42:53:fb:2a:77:c4:db:56:e4:e7:12:06:6c:c5:bf:b8:fc:fd:b2:97:a2:ed:61:06:7b:4a:de:89:0d:e5:15:e4:66:0c:46:e8:be:4c:55:9c:15:f4:32:8e:ad:62:0b:f8:3a:59:a8:4c:e0:ed:c7:3b:00:1d:00:20:35:d1:28:35:8c:ec:30:7b:61:08:7a:05:27:e8:fa:c6:2e:04:3c:86:a4:64:53:c3:c0:f4:56:23:29:3b:31:47 Unsupported extension type_43, data: 08:03:04:03:03:03:02:03:01 Extension renegotiation_info, renegotiated_connection: <empty> Extension server_name, server_name: [type=host_name (0), value=localhost] Unsupported extension type_45, data: 02:01:00 Unsupported extension type_28, data: 40:00 Unsupported extension type_21, data: 00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00 *** DH Modulus: { 255, 255, 255, 255, 255, 255, 255, 255, 201, 15, 218, 162, 33, 104, 194, 52, 196, 198, 98, 139, 128, 220, 28, 209, 41, 2, 78, 8, 138, 103, 204, 116, 2, 11, 190, 166, 59, 19, 155, 34, 81, 74, 8, 121, 142, 52, 4, 221, 239, 149, 25, 179, 205, 58, 67, 27, 48, 43, 10, 109, 242, 95, 20, 55, 79, 225, 53, 109, 109, 81, 194, 69, 228, 133, 181, 118, 98, 94, 126, 198, 244, 76, 66, 233, 166, 55, 237, 107, 11, 255, 92, 182, 244, 6, 183, 237, 238, 56, 107, 251, 90, 137, 159, 165, 174, 159, 36, 17, 124, 75, 31, 230, 73, 40, 102, 81, 236, 230, 83, 129, 255, 255, 255, 255, 255, 255, 255, 255 } DH Base: { 2 } Server DH Public Key: { 99, 101, 87, 160, 218, 28, 153, 45, 194, 244, 102, 225, 58, 123, 122, 199, 218, 225, 163, 145, 16, 193, 85, 182, 132, 13, 5, 200, 77, 210, 238, 47, 45, 183, 193, 8, 45, 145, 147, 255, 51, 56, 121, 181, 160, 144, 36, 53, 93, 80, 167, 143, 157, 103, 145, 245, 17, 216, 234, 161, 194, 219, 63, 137, 115, 183, 67, 203, 136, 52, 140, 170, 92, 55, 46, 54, 222, 48, 73, 249, 236, 26, 152, 204, 20, 127, 99, 189, 114, 114, 120, 99, 172, 31, 54, 64, 254, 196, 88, 17, 118, 150, 190, 252, 107, 23, 72, 26, 213, 90, 62, 14, 169, 75, 0, 154, 152, 167, 200, 209, 160, 251, 191, 89, 188, 59, 215, 185 } Signature Algorithm SHA256withRSA Signed with a DSA or RSA public key *** ServerHelloDone https-jsse-nio-8443-exec-5, WRITE: TLSv1.2 Handshake, length = 1697 170, 155, 158, 148, 139, 142, 164, 40, 32, 171, 159, 150, 196, 203, 116, 157, 123, 92, 131, 144, 93, 166, 51, 208, 79, 147, 242, 75 } Session ID: {92, 125, 15, 249, 156, 49, 93, 110, 51, 118, 78, 147, 13, 67, 50, 119, 4, 139, 247, 123, 140, 61, 206, 121, 197, 180, 71, 56, 123, 67, 20, 120} Cipher Suites: [Unknown 0x13:0x2, Unknown 0x13:0x3, Unknown 0x13:0x1, Unknown 0x13:0x4, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa9, Unknown 0xc0:0xad, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0xac, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa8, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xc0:0x9d, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9c, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xaa, Unknown 0xc0:0x9f, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9e, TLS_DHE_RSA_WITH_AES_128_CBC_SHA] Compression Methods: { 0 } *** Diffie-Hellman ServerKeyExchange DH Modulus: { 255, 255, 255, 255, 255, 255, 255, 255, 201, 15, 218, 162, 33, 104, 194, 52, 196, 198, 98, 139, 128, 220, 28, 209, 41, 2, 78, 8, 138, 103, 204, 116, 2, 11, 190, 166, 59, 19, 155, 34, 81, 74, 8, 121, 142, 52, 4, 221, 239, 149, 25, 179, 205, 58, 67, 27, 48, 43, 10, 109, 242, 95, 20, 55, 79, 225, 53, 109, 109, 81, 194, 69, 228, 133, 181, 118, 98, 94, 126, 198, 244, 76, 66, 233, 166, 55, 237, 107, 11, 255, 92, 182, 244, 6, 183, 237, 238, 56, 107, 251, 90, 137, 159, 165, 174, 159, 36, 17, 124, 75, 31, 230, 73, 40, 102, 81, 236, 230, 83, 129, 255, 255, 255, 255, 255, 255, 255, 255 } Standard ciphersuite chosen: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 https-jsse-nio-8443-exec-7, closeInboundInternal() 0 } https-jsse-nio-8443-exec-7, closeOutboundInternal() %% Negotiating: [Session-30, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384] DH Base: { 2 } Server DH Public Key: { 98, 157, 138, 146, 236, 151, 82, 94, 95, 210, 143, 94, 192, 189, 146, 219, 232, 17, 188, 9, 106, 228, 97, 32, 89, 196, 210, 102, 41, 82, 247, 203, 246, 135, 146, 172, 41, 147, 211, 249, 33, 218, 1, 211, 178, 5, 0, 145, 117, 62, 203, 82, 212, 32, 21, 187, 230, 23, 166, 158, 200, 249, 12, 223, 202, 31, 248, 202, 78, 14, 74, 83, 40, 63, 38, 53, 157, 74, 239, 184, 43, 218, 129, 126, 116, 65, 226, 108, 15, 201, 161, 254, 137, 163, 204, 45, 139, 176, 207, 129, 118, 54, 189, 255, 170, 174, 11, 236, 180, 163, 61, 50, 6, 237, 117, 92, 46, 22, 230, 101, 178, 107, 210, 75, 119, 167, 2, 86 } Unsupported extension status_request, data: 01:00:00:00:00 https-jsse-nio-8443-exec-5, READ: TLSv1.2 Handshake, length = 133 %% Initialized: [Session-31, SSL_NULL_WITH_NULL_NULL] Extension elliptic_curves, curve names: {secp256r1, secp384r1, secp521r1, unknown curve 29, unknown curve 256, unknown curve 257, unknown curve 258, unknown curve 259, unknown curve 260} Extension ec_point_formats, formats: [uncompressed] Extension signature_algorithms, signature_algorithms: SHA256withRSA, Unknown (hash:0x8, signature:0x9), Unknown (hash:0x8, signature:0x4), SHA256withECDSA, Unknown (hash:0x8, signature:0x7), SHA384withRSA, Unknown (hash:0x8, signature:0xa), Unknown (hash:0x8, signature:0x5), SHA384withECDSA, SHA512withRSA, Unknown (hash:0x8, signature:0xb), Unknown (hash:0x8, signature:0x6), SHA512withECDSA, SHA1withRSA, SHA1withECDSA Unsupported extension type_35, data: Unsupported extension type_51, data: 00:69:00:17:00:41:04:73:2c:23:c4:94:53:65:cd:2b:6f:43:c0:31:99:27:c7:ed:16:3c:cf:0e:c1:b9:3d:06:08:c8:ad:f7:36:9c:26:11:79:df:85:30:9f:bf:8b:44:d5:38:f9:78:54:45:53:cb:c6:4d:9d:13:3d:ef:b3:72:93:52:00:90:df:bd:68:00:1d:00:20:36:8e:48:e1:b2:ee:b7:08:fd:cf:0f:bd:89:50:f6:9f:ce:cd:42:06:ec:89:33:f5:f7:43:36:65:db:6f:11:7e Unsupported extension type_43, data: 08:03:04:03:03:03:02:03:01 Extension renegotiation_info, renegotiated_connection: <empty> Extension server_name, server_name: [type=host_name (0), value=localhost] Unsupported extension type_45, data: 02:01:00 Unsupported extension type_28, data: 40:00 Unsupported extension type_21, data: 00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00 *** Signature Algorithm SHA256withRSA Signed with a DSA or RSA public key *** ServerHello, TLSv1.2 RandomCookie: https-jsse-nio-8443-exec-7, SEND TLSv1.2 ALERT: warning, description = close_notify Unsupported extension status_request, data: 01:00:00:00:00 Extension elliptic_curves, curve names: {secp256r1, secp384r1, secp521r1, unknown curve 29, unknown curve 256, unknown curve 257, unknown curve 258, unknown curve 259, unknown curve 260} Extension ec_point_formats, formats: [uncompressed] https-jsse-nio-8443-exec-7, WRITE: TLSv1.2 Alert, length = 26 GMT: 1551699706 bytes = { 18, 229, 202, 112, 112, 109, 123, 160, 174, 111, 86, 220, 248, 86, 181, 58, 165, 251, 64, 69*** ServerHelloDone Standard ciphersuite chosen: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 %% Negotiating: [Session-31, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384] https-jsse-nio-8443-exec-1, WRITE: TLSv1.2 Handshake, length = 1697 *** ClientKeyExchange, DH , 170, 203, 115, 34, 134, 185, 213, 120 } Session ID: {92, 125, 15, 250, 57, 210, 32, 112, 175, 3, 154, 172, 201, 135, 69, 126, 161, 114, 238, 224, 96, 210, 188, 25, 18, 108, 235, 166, 181, 30, 176, 176} Cipher Suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 Compression Method: 0 Extension renegotiation_info, renegotiated_connection: <empty> *** Cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 *** Certificate chain chain [0] = [ [ Version: V3 Subject: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5 Key: Sun RSA public key, 2048 bits modulus: 21944740401167172627731583459321030363948627215746053925732477915060915436180167456469785746662093119306577380200747716284652995937004530444336851845029170241627465854006145050037178991946925696078563485570896673835545540824265905937881682387179314987285174428010940266412458943894800978345731524307952507729956745301047871771953945124256516782917326981125087548987889540650149121302888872237484100834740328828765018090383963294418357028839734723410564800765871733483849269364796949055153420777966213779145518299141217288017794394762274753999989298548507425930217302947589819396239489846633419099079578249651345685751 public exponent: 65537 Validity: [From: Fri May 30 08:43:19 GMT 2014, To: Mon May 27 08:43:19 GMT 2024] Issuer: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US SerialNumber: [ a6ef7a9a 5368eb27] Certificate Extensions: 3 [1]: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: 78 0D 96 9D FE D3 0B BE 8C C7 E3 EC 67 04 AB 4B x...........g..K 0010: EA E0 00 29 ...) ] ] [2]: ObjectId: 2.5.29.19 Criticality=false BasicConstraints:[ CA:true PathLen:2147483647 ] [3]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 78 0D 96 9D FE D3 0B BE 8C C7 E3 EC 67 04 AB 4B x...........g..K 0010: EA E0 00 29 ...) ] ] ] Algorithm: [SHA1withRSA] Signature: 0000: 19 16 5A 21 99 21 24 98 3C 0A E8 D8 00 AB 44 24 ..Z!.!$.<.....D$ 0010: F2 0C B7 83 D5 9F 96 17 87 E2 1F 1D A3 47 68 C7 .............Gh. 0020: 68 4A CB 56 0E 77 2B E8 1A 9F E7 09 A1 19 77 D0 hJ.V.w+.......w. 0030: 5E CC C1 B3 9A C4 35 3D CB E0 A5 A6 43 5D A3 26 ^.....5=....C].& 0040: A4 91 8A C1 FA 7B 10 EA DC C3 C7 1C 47 DC 97 32 ............G..2 0050: C0 37 80 1C F1 42 10 E3 74 17 FA 3E 60 4A B7 59 .7...B..t..>`J.Y 0060: 92 C1 E0 6F BB F1 BB 9F 82 89 B5 83 D5 AE 1E 90 ...o............ 0070: 0A 89 8D FB 4C C0 C5 9E DC C5 8C C6 2F EE D9 B4 ....L......./... 0080: 95 47 27 2E BE 82 31 6F 76 C0 DB 4C C8 0D 3B 7B .G'...1ov..L..;. 0090: D1 6A BF BD 3B 93 30 04 A2 9E 81 F7 96 28 77 F2 .j..;.0......(w. 00A0: 32 05 68 44 1F B3 30 CE 40 9F 20 F3 B4 2B AA E6 2.hD..0.@. ..+.. 00B0: 40 9B FB 7F 34 6E 3A 99 FD F8 28 F1 8C 9B 56 34 @...4n:...(...V4 00C0: 64 AD 4D 56 39 CB 96 18 50 9B 99 43 80 0A 39 A5 d.MV9...P..C..9. 00D0: 13 7A 6E C5 25 E0 95 4A 92 E5 A8 8B EE 03 49 B4 .zn.%..J......I. 00E0: D9 7C 00 E3 F0 3B A7 BA 40 30 CC 89 55 C6 97 93 .....;..@0..U... 00F0: B5 15 F6 62 D3 B1 74 9C 0B 80 2B 8A D4 03 84 A0 ...b..t...+..... ] *** https-jsse-nio-8443-exec-7, called closeOutbound() %% Initialized: [Session-32, SSL_NULL_WITH_NULL_NULL] https-jsse-nio-8443-exec-7, closeOutboundInternal() Extension signature_algorithms, signature_algorithms: SHA256withRSA, Unknown (hash:0x8, signature:0x9), Unknown (hash:0x8, signature:0x4), SHA256withECDSA, Unknown (hash:0x8, signature:0x7), SHA384withRSA, Unknown (hash:0x8, signature:0xa), Unknown (hash:0x8, signature:0x5), SHA384withECDSA, SHA512withRSA, Unknown (hash:0x8, signature:0xb), Unknown (hash:0x8, signature:0x6), SHA512withECDSA, SHA1withRSA, SHA1withECDSA Standard ciphersuite chosen: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 *** Diffie-Hellman ServerKeyExchange DH Modulus: { 255, 255, 255, 255, 255, 255, 255, 255, 201, 15, 218, 162, 33, 104, 194, 52, 196, 198, 98, 139, 128, 220, 28, 209, 41, 2, 78, 8, 138, 103, 204, 116, 2, 11, 190, 166, 59, 19, 155, 34, 81, 74, 8, 121, 142, 52, 4, 221, 239, 149, 25, 179, 205, 58, 67, 27, 48, 43, 10, 109, 242, 95, 20, 55, 79, 225, 53, 109, 109, 81, 194, 69, 228, 133, 181, 118, 98, 94, 126, 198, 244, 76, 66, 233, 166, 55, 237, 107, 11, 255, 92, 182, 244, 6, 183, 237, 238, 56, 107, 251, 90, 137, 159, 165, 174, 159, 36, 17, 124, 75, 31, 230, 73, 40, 102, 81, 236, 230, 83, 129, 255, 255, 255, 255, 255, 255, 255, 255 } DH Base: { 2 } Server DH Public Key: { https-jsse-nio-8443-exec-8, READ: TLSv1.2 Handshake, length = 134 DH Public key: { 207, 9, 22, 125, 238, 127, 137*** ClientKeyExchange, DH *** ServerHello, TLSv1.2 RandomCookie: GMT: 1551699706 bytes = { 219, 203, 97, 32, 177, 114, 84, 87, 229, 123, 50, 200, 219, 49, 57, 154, 159, 7, 35, 121, 162, 192, 193, 172, 152, 165, 224, 133 } Session ID: DH Public key: { 40, 8, 114, 169, 237, 170, 220, 215, 22, 134, 79, 141, 238, 37, 120, 112, 161, 136, 175, 27, 120, 60, 88, 255, 223, 224, 223, 25, 181, 229, 169, 194, 121, 175, 115, 30, 135, 70, 23, 136, 97, 165, 174, 118, 113, 190, 96, 94, 91, 247, 93, 10, 71, 70, 54, 179, 248, 55, 191, 214, 141, 94, 101, 34, 157, 36, 93, 124, 218, 26, 242, 22, 228, 18, 44, 125, 156, 121, 112, 18, 154, 245, 221, 135, 167, 148, 210, 226, 100, 223, 152, 249, 173, 39, 219, 140, 186, 219, 62, 49, 102, 142, 233, 16, 134, 90, 239, 110, 106, 160, 180, 23, 130, 139, 60, 249, 66, 217, 210, 143, 109, 54, 73, 152, 116, , 163, 35, 145, 201, 165, 191, 112, 147, 146, 200, 21, 177, 190, 224, 39, 211, 88, 207, 38, 181, 145, 222, 173, 233, 191, 197, 140, 72, 171, 215, 35, 214, 61, 220, 172, 228, 203, 163, 214, 150, 36, 152, 139, 50, 78, 106, 251, 169, 214, 1, 187, 61, 60, 222, 127, 11, 191, 95, 56, 200, 147, 150, 176, 6, 241, 1, 176, 173, 86, 66, 179, 238, 36, 157, 19, 158, 194, 128, 126, 51, 254, 104, 224, 44, 123, 217, 196, 2, 55, 0, 94, 6, 131, 2, 156, 183, 49, 217, 193, 48, 109, 122, 135, 105, 66, 215, 196, 140, 165, 173, 229, 124, 2, 116, 167, 187, 37, 82, 125, 40 } 76, 70, 32, 87, 49, 191, 2, 220, 75, 186, 86, 216, 213, 59, 125, 248, 5, 72, 64, 177, 26, 197, 17, 152, 48, 51, 242, 36, 177, 185, 50, 93, 64, 206, 192, 54, 160, 76, 184, 187, 20, 190, 102, 63, 63, 235, 140, 65, 29, 161, 103, 62, 159, 0, 99, 210, 56, 1, 24, 190, 194, 218, 165, 60, 88, 182, 101, 239, 236, 83, 38, 148, 114, 31, 163, 252, 185, 43, 215, 77, 149, 183, 240, 217, 147, 164, 176, 151, 218, 20, 15, 37, 247, 244, 86, 26, 234, 20, 164, 126, 71, 132, 216, 21, 255, 244, 12, 248, 48, 57, 152, 87, 159, 46, 84, 88, 92, 84, 49, 219, 103, 56, 205, 183, 135, 251, 230, 81 } %% Negotiating: [Session-32, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384] Unsupported extension type_35, data: Signature Algorithm SHA256withRSA Signed with a DSA or RSA public key *** ServerHello, TLSv1.2 RandomCookie: SESSION KEYGEN: PreMaster Secret: 111, 113, 0000: 03 39 D8 {92, 125, 15, 250, 176, 170, 42, 70, 43, 66, 137, 224, 204, 10, 80, 179, 178, 154, 87, 102, 209, 236, 188, 198, 134, 85, 75, 127, 43, 153, 140, 198} ACipher Suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 Compression Method: 0 95 } GMT: 1551699706 bytes = { 102, 14, 232, 115, 173, 146, 61, 129, 69, 75, 201, 174, 105, 123, 172, 158, 189, 235, 101, 116, 252, 139, 124, 31, 239, 253, 128, 62 } Session ID: *** ServerHelloDone Unsupported extension type_51, data: 00:69:00:17:00:41:04:10:cb:ce:16:bc:fb:3f:fd:6e:57:0c:4f:8d:cc:7b:a2:64:8b:14:72:f4:94:5b:56:01:0c:1a:c5:8a:5a:4d:99:28:f9:43:1c:4a:fb:86:a1:34:1d:9d:8d:50:8a:4e:17:20:bb:dc:68:aa:5c:d2:11:d9:ce:48:ba:81:79:2d:6c:00:1d:00:20:69:27:3f:a4:00:21:d7:e6:0d:f0:0c:2b:85:38:28:58:ae:b8:0c:28:8b:6a:f2:9a:ef:a0:9e:4e:3c:5e:b8:5c Unsupported extension type_43, data: 08:03:04:03:03:03:02:03:01 Extension renegotiation_info, renegotiated_connection: <empty> Extension server_name, server_name: [type=host_name (0), value=localhost] Unsupported extension type_45, data: 02:01:00 Unsupported extension type_28, data: 40:00 Unsupported extension type_21, data: 00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00 *** {92, 125, 15, 250, 118, 157, 4, 214, 139, 143, 30, 61, 184, 190, 46, 64, 131, 46, 40, 168, 183, 96, 10, 122, 80, 159, 188, 137, 169, 247, 151, 124} Cipher Suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 Compression Method: 0 Extension renegotiation_info, renegotiated_connection: <empty> *** 3Cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 76 E0 AD 90 15 C1 F7 CE 6C 87 6B 24 .9..v.......l.k$ 0010: C0 E8 14 DB 7C A5 C0 68 8D 36 19 83 10 09 5E F0 .......h.6....^. 0020: 44 E6 FE 48 EB 4F B4 1A 2D 5D 43 BF BB 4A 96 7B D..H.O..-]C..J.. 0030: 26 8B 13 4B F6 5D EF 3A 49 9D A0 EA 85 A2 C1 1E &..K.].:I....... 0040: 5B 7B 96 CE 94 F7 F6 E5 B8 02 71 6D D1 2E 8F 6C [.........qm...l 0050: 89 67 55 F2 DB F8 DD B8 06 9F B4 8E 2D 76 C5 93 .gU.........-v.. 0060: 62 0D 75 83 99 B2 9A 3E A3 7D A5 2E 7A C0 DB 81 b.u....>....z... 0070: A3 5C 29 D1 B0 A0 DA 6F E5 4B 8A 2A 13 32 61 EC .\)....o.K.*.2a. CONNECTION KEYGEN: Client Nonce: 0000: 7A 64 6D D8 94 E0 0E 4D 20 7D 18 39 CB 4D B5 AA zdm....M ..9.M.. 0010: 04 6A D5 C7 E4 EB 34 B5 0B 70 5D 70 AB 31 0A 25 .j....4..p]p.1.% Server Nonce: 0000: 5C 7D 0F FA CC BD E1 FC FB 97 56 A9 DC E1 3F 11 \.........V...?. 0010: 7D 60 EE 36 2B 15 9C E8 D8 3A E4 9A F8 AE CC 0A .`.6+....:...... Master Secret: 0000: 3A 28 C6 2E 15 19 8A D0 8E 7F A3 BE 39 8F E0 70 :(..........9..p 0010: D7 36 5F 78 B1 AA 82 4F A0 D8 49 6A 19 CE 67 1A .6_x...O..Ij..g. 0020: D6 BA AE 5C 53 E1 A4 74 EF 93 ED 16 2E D5 E6 79 ...\S..t.......y ... no MAC keys used for this cipher Client write key: 0000: AA 9E E1 93 7B 5A 4C B0 E6 DF 87 B0 46 FD 10 22 .....ZL.....F.." 0010: 9F 81 58 F5 24 1C 53 D1 A8 5A 62 99 CB 7E DC F8 ..X.$.S..Zb..... Server write key: 0000: 7E 63 B6 28 E4 73 A5 16 19 50 85 4C B0 B4 B3 81 .c.(.s...P.L.... 0010: DE 53 74 DE BB 98 72 9B CE 83 BA A7 C8 80 6C A8 .St...r.......l. Client write IV: 0000: C3 C5 46 1B ..F. Server write IV: 0000: D1 F5 B8 CE .... Extension renegotiation_info, renegotiated_connection: <empty> *** SESSION KEYGEN: PreMaster Secret: https-jsse-nio-8443-exec-10, WRITE: TLSv1.2 Handshake, length = 1697 https-jsse-nio-8443-exec-5, READ: TLSv1.2 Change Cipher Spec, length = 1 0000: E3 C7 8A 18 12 33 B4 8E 44 87 D4 EB 9D 17 A8 43 .....3..D......C 0010: 3C F6 14 3F 59 B2 3A 53 D3 F8 9D 3C 7A 60 E2 90 <..?Y.:S...<z`.. 0020: 30 D3 F0 24 1E 59 5A 8B 72 78 F7 02 E1 75 4D D7 0..$.YZ.rx...uM. 0030: 8A 8F E5 1C E9 E7 AF B6 6C D8 7C 63 A1 FC 4E 82 ........l..c..N. 0040: 32 B8 E6 19 58 27 3D 95 D1 19 4E 92 E2 41 43 7B 2...X'=...N..AC. 0050: 6A C1 A5 09 C9 6B DA 2E 0A 32 47 08 D5 41 0B 1A j....k...2G..A.. 0060: C7 F2 A2 EC B7 6C 1A 83 BE 00 36 B3 CA 2A 2B 3D .....l....6..*+= 0070: BB E1 6F 1D 6A BA 22 68 98 B6 88 90 DA 5A E1 80 ..o.j."h.....Z.. CONNECTION KEYGEN: Client Nonce: 0000: CE D4 55 87 41 E4 74 AC E4 8F 5C 67 4E 6B 97 5C ..U.A.t...\gNk.\ 0010: 00 05 F8 59 CB 87 DC 21 16 D9 CF 60 DD 3F 8A 35 ...Y...!...`.?.5 Server Nonce: 0000: 5C 7D 0F FA 72 EF 7E 09 05 69 47 19 FC 8F CD 48 \...r....iG....H 0010: BC F5 25 07 40 C4 35 E5 97 30 37 C0 0C 90 D8 1E ..%.@.5..07..... Master Secret: 0000: 56 56 E3 F8 45 B9 A6 4A B4 01 74 CF 6C 70 80 13 VV..E..J..t.lp.. 0010: 1E FE 50 CC CF 10 F0 AB 55 E5 BB 70 B9 D9 0D 89 ..P.....U..p.... 0020: 03 F4 4C 0B 4F EA 56 23 2C 0E 3B AC F1 7F C4 8B ..L.O.V#,.;..... ... no MAC keys used for this cipher Client write key: 0000: CB 76 AD BF 2F 40 A8 0D BB 56 A0 64 9A 5D 07 76 .v../@...V.d.].v 0010: 0E 69 4C 6C AB F3 8F 5C FE CA 70 81 B9 F2 BF F8 .iLl...\..p..... Server write key: 0000: D3 E6 EF 44 93 93 F8 27 82 1A 29 4C 2E 9D 18 FD ...D...'..)L.... 0010: 44 DE 4D 0B A0 2E 81 ED 56 94 BA 0C 49 62 D0 B6 D.M.....V...Ib.. Client write IV: 0000: DE F8 D2 59 ...Y Server write IV: 0000: 2A 17 85 CF *... Cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 %% Initialized: [Session-33, SSL_NULL_WITH_NULL_NULL] *** Certificate chain *** Certificate chain https-jsse-nio-8443-exec-6, READ: TLSv1.2 Handshake, length = 134 chain [0] = [ [ Version: V3 Subject: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5 Key: Sun RSA public key, 2048 bits modulus: 21944740401167172627731583459321030363948627215746053925732477915060915436180167456469785746662093119306577380200747716284652995937004530444336851845029170241627465854006145050037178991946925696078563485570896673835545540824265905937881682387179314987285174428010940266412458943894800978345731524307952507729956745301047871771953945124256516782917326981125087548987889540650149121302888872237484100834740328828765018090383963294418357028839734723410564800765871733483849269364796949055153420777966213779145518299141217288017794394762274753999989298548507425930217302947589819396239489846633419099079578249651345685751 public exponent: 65537 Validity: [From: Fri May 30 08:43:19 GMT 2014, To: Mon May 27 08:43:19 GMT 2024] Issuer: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US SerialNumber: [ a6ef7a9a 5368eb27] Certificate Extensions: 3 [1]: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: 78 0D 96 9D FE D3 0B BE 8C C7 E3 EC 67 04 AB 4B x...........g..K 0010: EA E0 00 29 ...) ] ] [2]: ObjectId: 2.5.29.19 Criticality=false BasicConstraints:[ CA:true PathLen:2147483647 ] [3]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 78 0D 96 9D FE D3 0B BE 8C C7 E3 EC 67 04 AB 4B x...........g..K 0010: EA E0 00 29 ...) ] ] ] Algorithm: [SHA1withRSA] Signature: 0000: 19 16 5A 21 99 21 24 98 3C 0A E8 D8 00 AB 44 24 ..Z!.!$.<.....D$ 0010: F2 0C B7 83 D5 9F 96 17 87 E2 1F 1D A3 47 68 C7 .............Gh. 0020: 68 4A CB 56 0E 77 2B E8 1A 9F E7 09 A1 19 77 D0 hJ.V.w+.......w. 0030: 5E CC C1 B3 9A C4 35 3D CB E0 A5 A6 43 5D A3 26 ^.....5=....C].& 0040: A4 91 8A C1 FA 7B 10 EA DC C3 C7 1C 47 DC 97 32 ............G..2 0050: C0 37 80 1C F1 42 10 E3 74 17 FA 3E 60 4A B7 59 .7...B..t..>`J.Y 0060: 92 C1 E0 6F BB F1 BB 9F 82 89 B5 83 D5 AE 1E 90 ...o............ 0070: 0A 89 8D FB 4C C0 C5 9E DC C5 8C C6 2F EE D9 B4 ....L......./... 0080: 95 47 27 2E BE 82 31 6F 76 C0 DB 4C C8 0D 3B 7B .G'...1ov..L..;. 0090: D1 6A BF BD 3B 93 30 04 A2 9E 81 F7 96 28 77 F2 .j..;.0......(w. 00A0: 32 05 68 44 1F B3 30 CE 40 9F 20 F3 B4 2B AA E6 2.hD..0.@. ..+.. 00B0: 40 9B FB 7F 34 6E 3A 99 FD F8 28 F1 8C 9B 56 34 @...4n:...(...V4 00C0: 64 AD 4D 56 39 CB 96 18 50 9B 99 43 80 0A 39 A5 d.MV9...P..C..9. 00D0: 13 7A 6E C5 25 E0 95 4A 92 E5 A8 8B EE 03 49 B4 .zn.%..J......I. 00E0: D9 7C 00 E3 F0 3B A7 BA 40 30 CC 89 55 C6 97 93 .....;..@0..U... 00F0: B5 15 F6 62 D3 B1 74 9C 0B 80 2B 8A D4 03 84 A0 ...b..t...+..... ] *** https-jsse-nio-8443-exec-5, READ: TLSv1.2 Handshake, length = 40 Standard ciphersuite chosen: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 %% Negotiating: [Session-33, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384] https-jsse-nio-8443-exec-8, READ: TLSv1.2 Change Cipher Spec, length = 1 *** ClientKeyExchange, DH DH Public key: { 2, 205, 103, 12, 90, 219, 219, 66, 36, 13, 72, 70, 72, 152, 235, 174, 76, 81, 192, 208, 110, 75, 222, 142, 31, 37, 29, 96, 88, 63, 230, 89, 250, 52, 132, 6, 205, 76, 209, 11, 24, 36, 210, 0, 251, 96, 237, 181, 123, 189, 225, 105, 135, 23, 156, 10, 150, 253, 62, 118, 162, 64, 54, 131, 158, 108, 160, 182, 23, 132, 52, 114, 211, 96, 135, 13, 221, 243, 28, 124, 41, 163, 87, 246, 84, 146, 112, 60, 125, 92, 75, 244, 216, 84, 165, 14, 157, 186, 195, 5, 174, 65, 147, 149, 186, 116, 245, 82, https-jsse-nio-8443-exec-8, READ: TLSv1.2 Handshake, length = 40 chain [0] = [ [ Version: V3 Subject: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5 Key: Sun RSA public key, 2048 bits modulus: 21944740401167172627731583459321030363948627215746053925732477915060915436180167456469785746662093119306577380200747716284652995937004530444336851845029170241627465854006145050037178991946925696078563485570896673835545540824265905937881682387179314987285174428010940266412458943894800978345731524307952507729956745301047871771953945124256516782917326981125087548987889540650149121302888872237484100834740328828765018090383963294418357028839734723410564800765871733483849269364796949055153420777966213779145518299141217288017794394762274753999989298548507425930217302947589819396239489846633419099079578249651345685751 public exponent: 65537 Validity: [From: Fri May 30 08:43:19 GMT 2014, To: Mon May 27 08:43:19 GMT 2024] Issuer: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US SerialNumber: [ a6ef7a9a 5368eb27] Certificate Extensions: 3 [1]: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: 78 0D 96 9D FE D3 0B BE 8C C7 E3 EC 67 04 AB 4B x...........g..K 0010: EA E0 00 29 ...) ] ] [2]: ObjectId: 2.5.29.19 Criticality=false BasicConstraints:[ CA:true PathLen:2147483647 ] [3]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 78 0D 96 9D FE D3 0B BE 8C C7 E3 EC 67 04 AB 4B x...........g..K 0010: EA E0 00 29 ...) ] ] ] Algorithm: [SHA1withRSA] Signature: 0000: 19 16 5A 21 99 21 24 98 3C 0A E8 D8 00 AB 44 24 ..Z!.!$.<.....D$ 0010: F2 0C B7 83 D5 9F 96 17 87 E2 1F 1D A3 47 68 C7 .............Gh. 0020: 68 4A CB 56 0E 77 2B E8 1A 9F E7 09 A1 19 77 D0 hJ.V.w+.......w. 0030: 5E CC C1 B3 9A C4 35 3D CB E0 A5 A6 43 5D A3 26 ^.....5=....C].& 0040: A4 91 8A C1 FA 7B 10 EA DC C3 C7 1C 47 DC 97 32 ............G..2 0050: C0 37 80 1C F1 42 10 E3 74 17 FA 3E 60 4A B7 59 .7...B..t..>`J.Y 0060: 92 C1 E0 6F BB F1 BB 9F 82 89 B5 83 D5 AE 1E 90 ...o............ 0070: 0A 89 8D FB 4C C0 C5 9E DC C5 8C C6 2F EE D9 B4 ....L......./... 0080: 95 47 27 2E BE 82 31 6F 76 C0 DB 4C C8 0D 3B 7B .G'...1ov..L..;. 0090: D1 6A BF BD 3B 93 30 04 A2 9E 81 F7 96 28 77 F2 .j..;.0......(w. 00A0: 32 05 68 44 1F B3 30 CE 40 9F 20 F3 B4 2B AA E6 2.hD..0.@. ..+.. 00B0: 40 9B FB 7F 34 6E 3A 99 FD F8 28 F1 8C 9B 56 34 @...4n:...(...V4 00C0: 64 AD 4D 56 39 CB 96 18 50 9B 99 43 80 0A 39 A5 d.MV9...P..C..9. 00D0: 13 7A 6E C5 25 E0 95 4A 92 E5 A8 8B EE 03 49 B4 .zn.%..J......I. 00E0: D9 7C 00 E3 F0 3B A7 BA 40 30 CC 89 55 C6 97 93 .....;..@0..U... 00F0: B5 15 F6 62 D3 B1 74 9C 0B 80 2B 8A D4 03 84 A0 ...b..t...+..... ] *** *** Finished verify_data: { 154, 13, 138, 113, 146, 154, 96, 166, 85, 36, 38, 132 } *** https-jsse-nio-8443-exec-8, WRITE: TLSv1.2 Change Cipher Spec, length = 1 *** Finished verify_data: { 78, 118, 127, 228, 67, 13, 161, 150, 191, 68, 168, 223 } *** 191, 123, 124, 78, 76, 135, 89, 50, 71, 218, 230, 58, 28, 146, 98, 9, 15, 93, 47, 84 } *** ServerHello, TLSv1.2 RandomCookie: GMT: 1551699706 bytes = { 94, 41, 73, 199, 77, 7, 167, 57, 30, 252, 94, 1, 122, 225, 211, 213, 16, 56, 248, 67, 33, 189, 170, 63, 1, 152, 15, 123 } Session ID: {92, 125, 15, 250, 4, 73, 246, 113, 89, 177, 175, 33, 40, 228, 124, 99, 0, 204, 21, 244, 168, 162, 182, 252, 224, 5, 16, 197, 141, 153, 237, 240} Cipher Suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 Compression Method: 0 Extension renegotiation_info, renegotiated_connection: <empty> *** Cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 *** Certificate chain https-jsse-nio-8443-exec-8, WRITE: TLSv1.2 Handshake, length = 40 %% Cached server session: [Session-29, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384] chain [0] = [ [ Version: V3 Subject: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5 Key: Sun RSA public key, 2048 bits modulus: 21944740401167172627731583459321030363948627215746053925732477915060915436180167456469785746662093119306577380200747716284652995937004530444336851845029170241627465854006145050037178991946925696078563485570896673835545540824265905937881682387179314987285174428010940266412458943894800978345731524307952507729956745301047871771953945124256516782917326981125087548987889540650149121302888872237484100834740328828765018090383963294418357028839734723410564800765871733483849269364796949055153420777966213779145518299141217288017794394762274753999989298548507425930217302947589819396239489846633419099079578249651345685751 public exponent: 65537 Validity: [From: Fri May 30 08:43:19 GMT 2014, To: Mon May 27 08:43:19 GMT 2024] Issuer: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US SerialNumber: [ a6ef7a9a 5368eb27] Certificate Extensions: 3 [1]: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: 78 0D 96 9D FE D3 0B BE 8C C7 E3 EC 67 04 AB 4B x...........g..K 0010: EA E0 00 29 ...) ] ] [2]: ObjectId: 2.5.29.19 Criticality=false BasicConstraints:[ CA:true PathLen:2147483647 ] [3]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 78 0D 96 9D FE D3 0B BE 8C C7 E3 EC 67 04 AB 4B x...........g..K 0010: EA E0 00 29 ...) ] ] ] Algorithm: [SHA1withRSA] Signature: 0000: 19 16 5A 21 99 21 24 98 3C 0A E8 D8 00 AB 44 24 ..Z!.!$.<.....D$ 0010: F2 0C B7 83 D5 9F 96 17 87 E2 1F 1D A3 47 68 C7 .............Gh. 0020: 68 4A CB 56 0E 77 2B E8 1A 9F E7 09 A1 19 77 D0 hJ.V.w+.......w. 0030: 5E CC C1 B3 9A C4 35 3D CB E0 A5 A6 43 5D A3 26 ^.....5=....C].& 0040: A4 91 8A C1 FA 7B 10 EA DC C3 C7 1C 47 DC 97 32 ............G..2 0050: C0 37 80 1C F1 42 10 E3 74 17 FA 3E 60 4A B7 59 .7...B..t..>`J.Y 0060: 92 C1 E0 6F BB F1 BB 9F 82 89 B5 83 D5 AE 1E 90 ...o............ 0070: 0A 89 8D FB 4C C0 C5 9E DC C5 8C C6 2F EE D9 B4 ....L......./... 0080: 95 47 27 2E BE 82 31 6F 76 C0 DB 4C C8 0D 3B 7B .G'...1ov..L..;. 0090: D1 6A BF BD 3B 93 30 04 A2 9E 81 F7 96 28 77 F2 .j..;.0......(w. 00A0: 32 05 68 44 1F B3 30 CE 40 9F 20 F3 B4 2B AA E6 2.hD..0.@. ..+.. 00B0: 40 9B FB 7F 34 6E 3A 99 FD F8 28 F1 8C 9B 56 34 @...4n:...(...V4 00C0: 64 AD 4D 56 39 CB 96 18 50 9B 99 43 80 0A 39 A5 d.MV9...P..C..9. 00D0: 13 7A 6E C5 25 E0 95 4A 92 E5 A8 8B EE 03 49 B4 .zn.%..J......I. 00E0: D9 7C 00 E3 F0 3B A7 BA 40 30 CC 89 55 C6 97 93 .....;..@0..U... 00F0: B5 15 F6 62 D3 B1 74 9C 0B 80 2B 8A D4 03 84 A0 ...b..t...+..... ] *** https-jsse-nio-8443-exec-1, WRITE: TLSv1.2 Application Data, length = 84 *** Diffie-Hellman ServerKeyExchange *** Finished verify_data: { 79, 140, 31, 96, 144, 171, 0, 240, 77, 107, 225, 205 } *** *** Diffie-Hellman ServerKeyExchange DH Modulus: { 255, 255, 255, 255, 255, 255, 255, 255, 201, 15, 218, 162, 33, 104, 194, 52, 196, 198, 98, 139, 128, 220, 28, 209, 41, 2, 78, 8, 138, 103, 204, 116, 2, 11, 190, 166, 59, 19, 155, 34, 81, 74, 8, 121, 142, 52, 4, 221, 239, 149, 25, 179, 205, 58, 67, 27, 48, 43, 10, 109, 242, 95, 20, 55, 79, 225, 53, 109, 109, 81, 194, 69, 228, 133, 181, 118, 98, 94, 126, 198, 244, 76, 66, 233, 166, 55, 237, 107, 11, 255, 92, 182, 244, 6, 183, 237, 238, 56, 107, 251, 90, 137, 159, 165, 174, 159, 36, 17, 124, 75, 31, 230, 73, 40, 102, 81, 236, 230, 83, 129, 255, 255, 255, 255, 255, 255, 255, 255 } SESSION KEYGEN: PreMaster Secret: 0000: CC FD BE BF 95 AA 1E 7D 87 95 92 8F 13 7C B6 8C ................ 0010: 6B 88 B7 7C 54 19 88 27 7C DC 43 FC F3 4E CE D8 k...T..'..C..N.. 0020: 0B 56 60 93 35 7E 68 D2 23 49 01 78 47 65 28 05 .V`.5.h.#I.xGe(. 0030: 39 D3 1E 2E 78 11 5E B3 83 D6 B2 17 3F 82 00 5C 9...x.^.....?..\ 0040: 22 6C 50 89 0E EE BF D5 72 ED EC 51 AF D2 37 50 "lP.....r..Q..7P 0050: BD B1 E2 4E AB CE 82 BF BB A9 5F 52 33 22 C1 53 ...N......_R3".S 0060: 0F 23 96 78 EF BF 00 63 A7 19 92 54 4F C1 79 CD .#.x...c...TO.y. 0070: 0A 78 60 F6 81 E2 EA E4 FC E4 EE 05 ED 4F FD C0 .x`..........O.. DH Modulus: { 255, 255, 255, 255, 255, 255, 255, 255, 201, 15, 218, 162, 33, 104, 194, 52, 196, 198, 98, 139, 128, 220, 28, 209, 41, 2, 78, 8, 138, 103, 204DH Base: { 2 } Server DH Public Key: { 51, 129, 216, 109, 60, 157, 212, 224, 205, 22, 27, 53, 23, 229, 22, 126, 29, 239, 177, 56, 208, 237, 6, 2, 147, 133, 156, 25, 213, 112, 54, 22, 206, 174, 51, 240, 64, 42, 89, 189, 33, 246, 219, 118, 245, 223, 52, 23, 70, 115, 38, 68, 4, 24, 156, 124, 163, 86, 233, 237, 213, 60, 126, 194, 124, 74, 82, 239, 86, 202, 159, 153, 175, 218, 81, 105, 46, 238, 63, 20, 223, 13, 117, 39, 5, 210, 17, 53, 50, 251, 95, 187, 113, 111, 174, 98, 81, 40, 55, 17, 103, 237, 178, 193, 161, 127, 21, 198, 146, 11, 51, 206, 240, 205, 68, 226, 36, 20, 136, 248, 218, 37, 118, 222, 19, 39, 170, 140 } https-jsse-nio-8443-exec-1, READ: TLSv1.2 Alert, length = 26 Using SSLEngineImpl. https-jsse-nio-8443-exec-5, WRITE: TLSv1.2 Change Cipher Spec, length = 1 *** Finished Signature Algorithm SHA256withRSA Signed with a DSA or RSA public key , 116, 2*** ServerHelloDone https-jsse-nio-8443-exec-2, WRITE: TLSv1.2 Handshake, length = 1697 https-jsse-nio-8443-exec-1, RECV TLSv1.2 ALERT: warning, close_notify https-jsse-nio-8443-exec-1, closeInboundInternal() https-jsse-nio-8443-exec-1, closeOutboundInternal() https-jsse-nio-8443-exec-1, SEND TLSv1.2 ALERT: warning, description = close_notify https-jsse-nio-8443-exec-1, WRITE: TLSv1.2 Alert, length = 26 https-jsse-nio-8443-exec-1, called closeOutbound() https-jsse-nio-8443-exec-1, closeOutboundInternal() https-jsse-nio-8443-exec-2, READ: TLSv1.2 Handshake, length = 134 CONNECTION KEYGEN: Client Nonce: 0000: AA D2 4D 60 5D 71 D3 E6 28 B1 03 7F 6E 37 53 82 ..M`]q..(...n7S. 0010: 39 C3 98 30 D9 50 06 B6 A2 FA E1 0E 40 F6 CF 1B 9..0.P......@... Server Nonce: 0000: 5C 7D 0F FA 12 E5 CA 70 70 6D 7B A0 AE 6F 56 DC \......ppm...oV. 0010: F8 56 B5 3A A5 FB 40 45 AA CB 73 22 86 B9 D5 78 .V.:..@E..s"...x Master Secret: 0000: 4A C9 D1 75 A0 04 A4 DB 2C 10 98 CE 02 C9 8A 70 J..u....,......p 0010: 5E F0 D7 5B FB E1 8A C8 09 A2 3E D5 DD 9B B0 59 ^..[......>....Y 0020: 26 2D 21 86 2B 6D D6 1D 8E 4F 66 20 FF 7D 8A D1 &-!.+m...Of .... ... no MAC keys used for this cipher Client write key: 0000: D6 2A 7F 90 A2 3E E2 EE D4 EA 9D 16 76 12 00 A9 .*...>......v... 0010: B9 94 AC C6 D1 89 21 C1 0C 90 D2 80 E4 23 03 49 ......!......#.I Server write key: 0000: 19 D1 1F 3F 08 7E FC BC 16 CC 66 A2 54 6E 4C EA ...?......f.TnL. 0010: 7B 06 67 B8 A2 F6 99 1E 58 30 DC 87 E0 FC 12 71 ..g.....X0.....q Client write IV: 0000: 90 28 C7 B1 .(.. Server write IV: 0000: 0F 16 76 57 ..vW *** Diffie-Hellman ServerKeyExchange DH Modulus: { 255, 255, 255, 255, 255, 255, 255, 255, 201, 15, 218, 162, 33, 104, 194, 52, 196, 198, 98, 139, 128, 220, 28, 209, 41, 2, 78, 8, 138, 103, 204, 116, 2, 11, 190, 166, 59, 19, 155, 34, 81, 74, 8, 121, 142, 52, 4, 221, 239, 149, 25, 179, 205, 58, 67, 27, 48, 43, 10, 109, 242, 95, 20, 55, 79, 225, 53, 109, 109, 81, 194, 69, 228, 133, 181, 118, 98, 94, 126, 198, 244, 76, 66, 233, 166, 55, 237, 107, 11, 255, 92, 182, 244, 6, 183, 237, 238, 56, 107, 251, 90, 137, 159, 165, 174, 159, 36, 17, 124, 75, 31, 230, 73, 40, 102, 81, 236, 230, 83, 129, 255, 255, 255, 255, 255, 255, 255, 255 } DH Base: { 2 } Server DH Public Key: { 202, 99, 48, 163, 168, 73, 11, 156, 116, 54, 116, 248, 82, 95, 101, 32, 181, 73, 240, 16, 254, 7, 227, 175, 239, 183, 143, 160, 50, 101, 147, 110, 91, 162, 208, 208, 6, 243, 153, 81, 101, 87, 185, 72, 116, 23, 80, 235, 103, 122, 213, 230, 117, 75, 205, 9, 139, 249, 229, 221, 3, 23, 117, 144, 59, 73, 106, 8, 9, 96, 156, 93, 124, 130, 220, 206, 2, 92, 165, 225, 182, 198, 168, 79, 182, 201, 163, 194, 94, 136, 17, 160, 189, 215, 170, 110, 72, 147, 169, 173, 231, 198, 107, 171, 68, 171, 93, 253, 63, 136, 242, 143, 164, 252, 108, 205, 18, 115, 214, 179, 244, 56, 76, 241, 113, 255, 37, 39 } Signature Algorithm SHA256withRSA Signed with a DSA or RSA public key *** ServerHelloDone https-jsse-nio-8443-exec-3, WRITE: TLSv1.2 Handshake, length = 1697 *** ClientKeyExchange, DH DH Public key: { 160, 29, 73, 44, 17, 180, 148, 57, , 11, 190, 166, 59, 19, 155, 34, 81, 74, 8, 121, 142, 52, 4, 221, 239, 149, 25, 179, 205, 58, 67, 27, 48, 43, 10, 109, 242, 95, 20, 55, 79, 225, 53, 109, 109, 81, 194, 69, 228, 133, 181, 118, 98, 94, 126, 198, 244, 76, 66, 233, 166, 55, 237, 107, 11, 255, 92, 182, 244, 6, 183, 237, 238, 56, 107, 251, 90, 137, 159, 165, 174, 159, 36, 17, 124, 75, 31, 230, 73, 40, 102, 81, 236, 230, 83, 129, 255verify_data: { 196, 35, 51, 171, 27, 228, 165, 82, 166, 116, 123, 251 } *** https-jsse-nio-8443-exec-5, WRITE: TLSv1.2 Handshake, length = 40 %% Cached server session: [Session-28, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384] Allow unsafe renegotiation: false Allow legacy hello messages: true Is initial handshake: true Is secure renegotiation: false 158, 186, 206, 148, 102, 74, 175, 1, 174, 44, 254, 222, 238, 93, 63, 231, 123, 116, 119, 36, 175, 206, 133, 61, 29, 51, 49, 194, https-jsse-nio-8443-exec-6, READ: TLSv1.2 Change Cipher Spec, length = 1 https-jsse-nio-8443-exec-6, READ: TLSv1.2 Handshake, length = 40 *** Finished verify_data: { 74, 73, 59, 127, 115, 30, 239, 167, 169, 230, 133, 39 } *** https-jsse-nio-8443-exec-6, WRITE: TLSv1.2 Change Cipher Spec, length = 1 *** Finished verify_data: { 35, 53, 108, 254, 224, 144, 166, 224, 155, 55, 18, 133 } *** 230, 18, 242, 151, 41, 197, 29, 67, 176, 60, 244, 49https-jsse-nio-8443-exec-6, WRITE: TLSv1.2 Handshake, length = 40 , 255, 255, 255, 255, 255, 255, 255 } DH Base: { 2 } Server DH Public Key: { 135, 78, 42, 49, 195, 63, 134, 248, 237, 130, 134, 60, 174, 36, 217, 124, 161, 141, 177, 250, 194, 49, 234, 39, 99, 86, 154, 210, 16, 18, 199, 47, 68, 5, 66, 172, 168, 50, 227, 41, 104, 246, 24, 67, 203, 116, 13, 187, 199, 197, 188, 206, 177, 203, 66, 115, 244, 243, 237, 232, 246, 25, 203, 34, 254, 160, 130, 103, 110, 76, 122, 138, 19, 167, 69, 181, 27, 248, 169, 236, 84, 112, 175, 45, 164, 216, 176, 55, 174, 211, 164, 244, 148, 230, 176, 139, 46, 61, 74, 30, 216, 49, 43, 226, 161, 42, Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1 https-jsse-nio-8443-exec-9, WRITE: TLSv1.2 Application Data, length = 86 https-jsse-nio-8443-exec-10, READ: TLSv1.2 Handshake, length = 134 *** ClientKeyExchange, DH DH Public key: { 107, 51, 158, 232, 15, 151, 62, 133, 129, 141, 224, 29, 121, 77, 29, 176, 67, 188, 117, 147, 80, 40, 173, 57, 254, 21, 23, 183, 28, 39, 47, 91, 8, 6, 136, 74, 44, 109, 220, 255, 94, 239, 37, 18, 32, 78, 55, 139, 161, 233, 91, 242, 26, 187, 245, 196, 218, 37, 6, 10, 104, 137, 19, 124, 64, 211, 251, 223, 232, 142, 225, 226, 159, 226, 47, 76, 218, 253, 194, 89, 158, 50, 171, 169, 206, 177, 137, 108, 79, 65, 241, 92, 221, 125, 61, 231, 127, 218, 52, 141, 105, 67, 145, 109, 170, 181, 102, 68, 43, 71, 219, 9, 0, 55, 254, 19, 139, 26, 134, 137, 174, 245, 228, 14, 20, 213, 29, 233 } %% Cached server session: [Session-30, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384] , 48, 161, 86, 168, 193, 105, 208, 1, 58, 41, 50, 146, 185, 71, 84, 0, 254, 203, 20, 232, 148, 154, 24, 220, 64, 45, 108, 229, 47, 159, 44, 148, 202, 82, 82, 250, 88, 252, 244, 185, 11, 43, 136, 53, 16, 186, 224, 107, 65, 69, 178, 166, 198, 82, 4, 171, 146, 9, 186, 202, 72, 190, 208, 172, 221, 160, 144, 253, 145, 100, 110, 16, 32, 131, 26, 19, 66, 32, 172, 148 } https-jsse-nio-8443-exec-9, READ: TLSv1.2 Alert, length = 26 https-jsse-nio-8443-exec-9, RECV TLSv1.2 ALERT: warning, close_notify https-jsse-nio-8443-exec-9, closeInboundInternal() https-jsse-nio-8443-exec-9, closeOutboundInternal() https-jsse-nio-8443-exec-9, SEND TLSv1.2 ALERT: warning, description = close_notify https-jsse-nio-8443-exec-9, WRITE: TLSv1.2 Alert, length = 26 https-jsse-nio-8443-exec-9, called closeOutbound() https-jsse-nio-8443-exec-9, closeOutboundInternal() 122, 80, Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1.1 https-jsse-nio-8443-exec-7, READ: TLSv1 Handshake, length = 512 Using SSLEngineImpl. *** ClientHello, TLSv1.2 RandomCookie: GMT: -1688412490 bytes = { 69, 165, 188, 69, 135, 8, 4, 162, 44183, 190, 233, 149, 222, 3, 142, 245, 172, 176, 47, 242, 188, 243, 233, 148, 81, 205, 18, 231 } Allow unsafe renegotiation: false Allow legacy hello messages: true Is initial handshake: true Is secure renegotiation: false Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1.1 Signature Algorithm SHA256withRSA Signed with a DSA or RSA public key SESSION KEYGEN: , 97*** ServerHelloDone https-jsse-nio-8443-exec-1, READ: TLSv1 Handshake, length = 512 https-jsse-nio-8443-exec-4, WRITE: TLSv1.2 Handshake, length = 1697 PreMaster Secret: , 20, 060, 80, 93, 127, 92, 100, 133, 247, 95, 20, 125, 111, 111, 147, 46, 230, 68 } Session ID: {92, 125, 15, 250, 188, 57, 138, 125, 16, 60, 221, 41, 168, 170, 135, 79, 161, 235, 14, 145, 100, 143, 235, 89, 37, 191, 60, 95, 56, 61, 179, 138} Cipher Suites: [Unknown 0x13:0x2, Unknown 0x13:0x3, Unknown 0x13:0x1, Unknown 0x13:0x4, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa9, Unknown 0xc0:0xad, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0xac, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa8, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xc0:0x9d, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9c, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xaa, Unknown 0xc0:0x9f, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9e, TLS_DHE_RSA_WITH_AES_128_CBC_SHA] Compression Methods: { 0 } Unsupported extension status_request, data: 01:00:00:00:00 Extension elliptic_curves, curve names: {secp256r1, secp384r1, secp521r1, unknown curve 29, unknown curve 256, unknown curve 257, unknown curve 258, unknown curve 259, unknown curve 260} Extension ec_point_formats, formats: [uncompressed] https-jsse-nio-8443-exec-8, WRITE: TLSv1.2 Application Data, length = 86 *** ClientHello, TLSv1.2 RandomCookie: GMT: -1604331339 bytes = { 111, 77, 235, 74, 110, 236, 158, 125, 252, 32, 152, 129, 228, 119, 66, 22, 100, 76, 24, 198, 116, 13, 236, 40, 205, 58, 148, 172 } Session ID: {92, 125, 15, 250, 225, 182, 144, 58, 48, 185, 18, 246, 100, 222, 33, 147, 194, 167, 240, 162, 177, 41, 139, 155, 196, 114, 95, 42, 38, 51, 126, 110} Cipher Suites: [Unknown 0x13:0x2, Unknown 0x13:0x3, Unknown 0x13:0x1, Unknown 0x13:0x4, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa9, Unknown 0xc0:0xad, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0xac, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa8, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xc0:0x9d, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9c, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xaa, Unknown 0xc0:0x9f, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9e, TLS_DHE_RSA_WITH_AES_128_CBC_SHA] Compression Methods: { 0 } Unsupported extension status_request, data: 01:00:00:00:00 Extension elliptic_curves, curve names: {secp256r1, secp384r1, secp521r1, unknown curve 29, unknown curve 256, unknown curve 257, unknown curve 258, unknown curve 259, unknown curve 260} Extension ec_point_formats, formats: [uncompressed] Extension signature_algorithms, signature_algorithms: SHA256withRSA, Unknown (hash:0x8, signature:0x9), Unknown (hash:0x8, signature:0x4), SHA256withECDSA, Unknown (hash:0x8, signature:0x7), SHA384withRSA, Unknown (hash:0x8, signature:0xa), Unknown (hash:0x8, signature:0x5), SHA384withECDSA, SHA512withRSA, Unknown (hash:0x8, signature:0xb), Unknown (hash:0x8, signature:0x6), SHA512withECDSA, SHA1withRSA, SHA1withECDSA Unsupported extension type_35, data: Unsupported extension type_51, data: 00:69:00:17:00:41:04:da:51:e9:b8:dc:9b:68:81:aa:6c:6f:86:53:5e:a9:65:f0:fb:95:22:ac:fb:25:e4:6a:30:8e:60:7a:cb:b8:a8:24:a9:05:83:6f:5d:9d:be:47:e3:fc:bb:f8:fa:22:d4:36:b3:44:14:36:7c:fc:f4:e8:40:ac:14:57:4d:59:9e:00:1d:00:20:a5:1b:95:81:2f:ef:45:f4:80:10:c1:10:71:96:92:7f:cc:0b:31:4e:f9:aa:e3:5c:4d:26:b2:24:da:1e:6a:40 Unsupported extension type_43, data: 08:03:04:03:03:03:02:03:01 Extension renegotiation_info, renegotiated_connection: <empty> Extension server_name, server_name: [type=host_name (0), value=localhost] Unsupported extension type_45, data: 02:01:00 Unsupported extension type_28, data: 40:00 Unsupported extension type_21, data: 00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00 *** Extension signature_algorithms, signature_algorithms: SHA256withRSA, Unknown (hash:0x8, signature:0x9), Unknown (hash:0x8, signature:0x4), SHA256withECDSA, Unknown (hash:0x8, signature:0x7), SHA384withRSA, Unknown (hash:0x8, signature:0xa), Unknown (hash:0x8, signature:0x5), SHA384withECDSA, SHA512withRSA, Unknown (hash:0x8, signature:0xb), Unknown (hash:0x8, signature:0x6), SHA512withECDSA, SHA1withRSA, SHA1withECDSA Unsupported extension type_35, data: Unsupported extension type_51, data: 00:69:00:17:00:41:04:37:24:3b:b5:65:f9:9b:18:3d:2a:9d:0e:ae:b9:12:9e:6e:66:81:d3:07:9d:a4:07:56:ea:8b:93:a8:4b:a8:e5:f5:71:6b:97:f0:aa:4e:00:d4:16:3a:80:bd:ad:11:73:dc:ce:52:9e:2c:62:b5:87:6f:58:31:75:06:1a:42:8c:00:1d:00:20:53:cd:90:a5:d4:50:17:d5:e3:8e:7b:dd:64:4e:aa:b5:aa:14:58:66:59:1f:60:be:8d:e0:7f:5a:0e:3d:b9:22 Unsupported extension type_43, data: 08:03:04:03:03:03:02:03:01 Extension renegotiation_info, renegotiated_connection: <empty> Extension server_name, server_name: [type=host_name (0), value=localhost] Unsupported extension type_45, data: 02:01:00 Unsupported extension type_28, data: 40:00 Unsupported extension type_21, data: 00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00 *** SESSION KEYGEN: PreMaster Secret: 0000: 67 D3 E6 1C C8 89 5F 3E FB 1A 36 C6 45 37 81 DB g....._>..6.E7.. 0010: 60 0https-jsse-nio-8443-exec-9, READ: TLSv1.2 Alert, length = 26 https-jsse-nio-8443-exec-9, RECV TLSv1.2 ALERT: warning, close_notify https-jsse-nio-8443-exec-9, closeInboundInternal() https-jsse-nio-8443-exec-9, closeOutboundInternal() https-jsse-nio-8443-exec-9, SEND TLSv1.2 ALERT: warning, description = close_notify https-jsse-nio-8443-exec-9, WRITE: TLSv1.2 Alert, length = 26 %% Initialized: [Session-34, SSL_NULL_WITH_NULL_NULL] 200: DE 79 B3 49 36 44 D0 99 9E 8E 7D 50 24 13 03 00 .y.I6D.....P$... 0010: 73 05 0F 8C EC 68 04 11 A8 3F 8F EE 7B 3E 1A 82 s....h...?...>.. 0020: ED C7 9B Standard ciphersuite chosen: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 %% Negotiating: [Session-34, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384] *** ServerHello, TLSv1.2 RandomCookie: EGMT: 1551699706 bytes = { 209, 150, 182, 197, 83, 144, 79, 119, 247, 69, 84, 159, 37, 6, 175, 188, 233, 204, 186, 25, 197, 113, 11, 178, 39, 232, 195, 43 } Session ID: C3 11 23 C5 42 D8 24 7B A4 C7 82 F6 7B Using SSLEngineImpl. .....#.B.$...... 0030: Allow unsafe renegotiation: false Allow legacy hello messages: true Is initial handshake: true Is secure renegotiation: false https-jsse-nio-8443-exec-6, READ: TLSv1.2 Handshake, length = 134 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1.1 https-jsse-nio-8443-exec-3, READ: TLSv1 Handshake, length = 512 https-jsse-nio-8443-exec-9, called closeOutbound() %% Initialized: [Session-35, SSL_NULL_WITH_NULL_NULL] {92, 125, 15, 250, 222, 28, 56, 143, 109, 254, 171, 255, 146, 211, 173, 127, 164, 151, 85, 161, 82, 252, 1, 187, 219, 71, 210, 215, 89, 19, 2, 22} Cipher Suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 Compression Method: 0 Extension renegotiation_info, renegotiated_connection: <empty> *** Cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 *** ClientHello, TLSv1.2 RandomCookie: GMT: 18804838 bytes = { 234, 159, 26, 79, 158, 58, 152, 5, 57, 236, 83, 234, 64, 161, 172, 181, 47, 227, 16, 247, 141, 175, 241, 55, 238, 87, 254, 72 } Session ID: https-jsse-nio-8443-exec-9, closeOutboundInternal() *** ClientKeyExchange, DH DH Public key: { 2, 245, 22, 12, 225, 155, 102, 114, 60, Standard ciphersuite chosen: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 9%% Negotiating: [Session-35, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384] B2 CB FD A3 E5 42 D4 D4 8B A9 EE 37 AB E4 29 1B .....B.....7..). 00405: 8A EC 4F 00 FF 66 1A 9A 83 7A 13 89 AB 27 0A F2 ..O..f...z...'.. 0050: B1 03 4A 7B 60 71 C0 29 D3 D9 D9 D6 41 86 CC 80 ..J.`q.)....A... 0060: 28 DA 21 A2 86 8A 76 BE 29 96 DC D7 E0 4F B9 CA (.!...v.)....O.. 0070: 8A 4E 03 C4 C0 84 2B 94 FF 33 C8 67 AA 8C 11 DA .N....+..3.g.... 182, 174, 30, 186, 119, 15, 185, 146, 212, 15, 52, 157, 226, 79, 248, 194, 118, 207, 205, 178, 248, 255, 249, 76, 210, 227, 98, 113, 58, 193, 48, 5, 96, 184, 181, 95, 121, 253, 248, 191, 161, 137, 38, 33, 35, 164, 166, 80, 52, 85, 75, 150, 90, 33, 6, 191, 186, 22, 235, 148, 228, 83, 67, 123, 100, 40, 235, 254, 65, 200, 183, 43, 8, 117, 54, 151, 240, 215, 77, 62, 72, 3, 55, 124, 168, 160, 3, 87, 187, 216, 222, 199, 139, 133, 213, 51, 201, 20, 140, 124, 232, 149, 2, 78, 52, 35, 172, 190, 6, 10, 216, 168, 138, 65, 109, 150, 60, 81, 234 } {92, 125, 15, 250, 57, 210, 32, 112, 175, 3, 154, 172, 201, 135, 69, 126, 161, 114, 238, 224, 96, 210, 188, 25, 18, 108, 235, 166, 181, 30, 176, 176} *** Certificate chain Cipher Suites: [Unknown 0x13:0x2, Unknown 0x13:0x3, Unknown 0x13:0x1, Unknown 0x13:0x4, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa9, Unknown 0xc0:0xad, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0xac, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa8, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xc0:0x9d, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9c, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xaa, Unknown 0xc0:0x9f, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9e, TLS_DHE_RSA_WITH_AES_128_CBC_SHA] Compression Methods: { 0 } CONNECTION KEYGEN: Client Nonce: 0000: 1A C9 CB 88 AA 9B 9E 94 8B 8E A4 28 20 AB 9F 96 ...........( ... 0010: C4 CB 74 9D 7B 5C 83 90 5D A6 33 D0 4F 93 F2 4B ..t..\..].3.O..K Server Nonce: 0000: 5C 7D 0F FA 66 0E E8 73 AD 92 3D 81 45 4B C9 AE \...f..s..=.EK.. 0010: 69 7B AC 9E BD EB 65 74 FC 8B 7C 1F EF FD 80 3E i.....et.......> Master Secret: 0000: 21 48 57 4E C5 E7 AD 10 2B E5 A2 F2 76 9A 2B 61 !HWN....+...v.+a 0010: 78 3D 02 01 39 B9 B0 24 DE 03 F9 B3 28 07 44 03 x=..9..$....(.D. 0020: 81 10 26 F9 DF 84 FD DA 38 8D 66 92 F8 3B AD 25 ..&.....8.f..;.% ... no MAC keys used for this cipher Client write key: 0000: 4B 08 D7 E3 26 E0 04 97 2C 78 B5 CF 67 38 36 DD K...&...,x..g86. 0010: EC 42 E4 62 37 ED 61 13 A2 05 C1 70 B1 5C 8D F9 .B.b7.a....p.\.. Server write key: 0000: 02 5E 24 9B 2C 35 F2 D5 E8 FF 21 F6 0A E5 C2 2B .^$.,5....!....+ 0010: 1A 10 D7 CA 41 96 68 CF 76 BC 15 00 35 77 CF 42 ....A.h.v...5w.B Client write IV: 0000: DB CB B1 6A ...j Server write IV: 0000: F9 72 5F D5 .r_. *** ServerHello, TLSv1.2 RandomCookie: GMT: 1551699706 bytes = { 214, 44, 65, 41, 111, 202, 34, 39, 89, 176, 178, 102, 49, 222, 219, 194, 23, 143, 102, 157, 245, 11, 186, 24, 131, 51, 243, 52 } Session ID: {92, 125, 15, 250, 169, 119, 83, 197, 47, 232, 131, 225, 86, 188, 224, 191, 83, 1, 16, 119, 213, 89, 105, 88, 9, 227, 9, 210, 251, 21, 198, 242} Cipher Suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 Compression Method: 0 Extension renegotiation_info, renegotiated_connection: <empty> *** Unsupported extension status_request, data: 01:00:00:00:00 SESSION KEYGEN: PreMaster Secret: chain [0] = [ [ Version: V3 Subject: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5 Key: Sun RSA public key, 2048 bits modulus: 21944740401167172627731583459321030363948627215746053925732477915060915436180167456469785746662093119306577380200747716284652995937004530444336851845029170241627465854006145050037178991946925696078563485570896673835545540824265905937881682387179314987285174428010940266412458943894800978345731524307952507729956745301047871771953945124256516782917326981125087548987889540650149121302888872237484100834740328828765018090383963294418357028839734723410564800765871733483849269364796949055153420777966213779145518299141217288017794394762274753999989298548507425930217302947589819396239489846633419099079578249651345685751 public exponent: 65537 Validity: [From: Fri May 30 08:43:19 GMT 2014, To: Mon May 27 08:43:19 GMT 2024] Issuer: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US SerialNumber: [ a6ef7a9a 5368eb27] Certificate Extensions: 3 [1]: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: 78 0D 96 9D FE D3 0B BE 8C C7 E3 EC 67 04 AB 4B x...........g..K 0010: EA E0 00 29 ...) ] ] [2]: ObjectId: 2.5.29.19 Criticality=false BasicConstraints:[ CA:true PathLen:2147483647 ] [3]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 78 0D 96 9D FE D3 0B BE 8C C7 E3 EC 67 04 AB 4B x...........g..K 0010: EA E0 00 29 ...) ] ] ] Algorithm: [SHA1withRSA] Signature: 0000: 19 16 5A 21 99 21 24 98 3C 0A E8 D8 00 AB 44 24 ..Z!.!$.<.....D$ 0010: F2 0C B7 83 D5 9F 96 17 87 E2 1F 1D A3 47 68 C7 .............Gh. 0020: 68 4A CB 56 0E 77 2B E8 1A 9F E7 09 A1 19 77 D0 hJ.V.w+.......w. 0030: 5E CC C1 B3 9A C4 35 3D CB E0 A5 A6 43 5D A3 26 ^.....5=....C].& 0040: A4 91 8A C1 FA 7B 10 EA DC C3 C7 1C 47 DC 97 32 ............G..2 0050: C0 37 80 1C F1 42 10 E3 74 17 FA 3E 60 4A B7 59 .7...B..t..>`J.Y 0060: 92 C1 E0 6F BB F1 BB 9F 82 89 B5 83 D5 AE 1E 90 ...o............ 0070: 0A 89 8D FB 4C C0 C5 9E DC C5 8C C6 2F EE D9 B4 ....L......./... 0080: 95 47 27 2E BE 82 31 6F 76 C0 DB 4C C8 0D 3B 7B .G'...1ov..L..;. 0090: D1 6A BF BD 3B 93 30 04 A2 9E 81 F7 96 28 77 F2 .j..;.0......(w. 00A0: 32 05 68 44 1F B3 30 CE 40 9F 20 F3 B4 2B AA E6 2.hD..0.@. ..+.. 00B0: 40 9B FB 7F 34 6E 3A 99 FD F8 28 F1 8C 9B 56 34 @...4n:...(...V4 00C0: 64 AD 4D 56 39 CB 96 18 50 9B 99 43 80 0A 39 A5 d.MV9...P..C..9. 00D0: 13 7A 6E C5 25 E0 95 4A 92 E5 A8 8B EE 03 49 B4 .zn.%..J......I. 00E0: D9 7C 00 E3 F0 3B A7 BA 40 30 CC 89 55 C6 97 93 .....;..@0..U... 00F0: B5 15 F6 62 D3 B1 74 9C 0B 80 2B 8A D4 03 84 A0 ...b..t...+..... ] *** 0000: 08 8D 37 40 1E DB BF B0 10 35 13 23 5C 08 56 85 ..7@.....5.#\.V. 0010: F4 45 27 80 F0 DB 57 AE 32 D4 4A B9 01 5C A5 9D .E'...W.2.J..\.. 0020: AA A9 67 AA 96 3F 19 E9 E9 92 43 40 3B 80 E0 10 ..g..?....C@;... 0030: 73 43 BC DA 3D FE BC 69 31 E9 C5 8A 76 DB 03 0C sC..=..i1...v... 0040: A9 82 40 FF AF 07 9F 3D F5 59 66 7E C5 13 4F FC ..@....=.Yf...O. 0050: 32 9C 3D F4 22 C5 81 B9 90 7D 5A 09 28 49 A5 A4 2.=.".....Z.(I.. 0060: 29 FC 04 28 34 7C 03 04 20 41 5C 3C 8F 2F 49 6E )..(4... A\<./In 0070: A9 05 08 B3 99 E3 5C 1E B5 97 30 AF 7A 66 7C E6 ......\...0.zf.. Extension elliptic_curves, curve names: {secp256r1, secp384r1, secp521r1, unknown curve 29, unknown curve 256, unknown curve 257, unknown curve 258, unknown curve 259, unknown curve 260} Cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 https-jsse-nio-8443-exec-5, READ: TLSv1.2 Change Cipher Spec, length = 1 https-jsse-nio-8443-exec-5, READ: TLSv1.2 Handshake, length = 40 CONNECTION KEYGEN: Client Nonce: 0000: F3 7F 36 66 08 7D 77 D7 DA E8 2A FF 01 76 04 6A ..6f..w...*..v.j 0010: 06 14 03 13 54 D7 3A F5 BB D1 8A 87 74 09 26 8B ....T.:.....t.&. Server Nonce: 0000: 5C 7D 0F FA DB CB 61 20 B1 72 54 57 E5 7B 32 C8 \.....a .rTW..2. 0010: DB 31 39 9A 9F 07 23 79 A2 C0 C1 AC 98 A5 E0 85 .19...#y........ Master Secret: 0000: E9 53 E8 CF FF 0F 3F DF 98 60 43 CA B9 A8 F0 33 .S....?..`C....3 0010: 64 13 5E E4 77 D0 53 89 52 76 EF D0 E0 11 AA F5 d.^.w.S.Rv...... 0020: B5 6C 4C C1 74 B4 21 07 FA FE C7 D5 03 A8 87 37 .lL.t.!........7 ... no MAC keys used for this cipher Client write key: 0000: FA 69 80 79 C3 30 71 43 EA 4E 5E 17 1D BC D0 03 .i.y.0qC.N^..... 0010: B5 67 F9 DE 06 8F B1 E6 AA 12 AC BA 42 60 0F 9A .g..........B`.. Server write key: 0000: B4 E3 39 64 07 FB AF 6F 83 08 F9 3F 02 A8 AD F3 ..9d...o...?.... 0010: 08 11 F1 23 E3 62 8B 24 89 7A 61 AF 01 BD 54 2A ...#.b.$.za...T* Client write IV: 0000: A9 CE 3B 62 ..;b Server write IV: 0000: BF 07 89 40 ...@ https-jsse-nio-8443-exec-6, READ: TLSv1.2 Change Cipher Spec, length = 1 https-jsse-nio-8443-exec-6, READ: TLSv1.2 Handshake, length = 40 *** Finished verify_data: { 146, 157, 10, 68, 221, 66, 191, 192, 229, 150, 46, 124 } *** 97 66 93 11 AB A2 FB 42 BE A6 94 E9 F5 `...f.....B..... 0020: 32 https-jsse-nio-8443-exec-6, WRITE: TLSv1.2 Change Cipher Spec, length = 1 *** Finished verify_data: { 101, *** Finished verify_data: { 60, 159, 194, 85, 53, 49, 175, 30, 227, 30, 62, 20 } *** *** Diffie-Hellman ServerKeyExchange DH Modulus: { 255, 255, 255, 255, 255, 255, 255, 255, 201, 15, 218, 162, 33, 104, 194, 52, 196, 198, 98, 139, 128, 220, 28, 209, 41, 2, 78, 8, 138, 103, 204, 116, 2, 11, 190, 166, 59, 19, 155, 34, 81, 74, 8, 121, 142, 52, 4, 221, 239, 149, 25, 179, 205, 58, 67, 27, 48, 43, 10, 109, 242, 95, 20, 55, 79, 225, 53, 109, 109, 81, 194, 69, 228, 133, 181, 118, 98, 94, 126, 198, 244, 76, 66, 233, 166, 55, 237, 107, 11, 255, 92, 182, 244, 6, 183, 237, 238, 56, 107, 251, 90, 137, 159, 165, 174, 159, 36, 17, 124, 75, 31, 230, 73, 40, 102, 81, 236, 230, 83, 129, 255, 255, 255, 255, 255, 255, 255, 255 } DH Base: { 2 } Server DH Public Key: { 254, 204, 232, 184, 110, 206, 110, 5, 39, 89, 89, 213, 118, 55, 130, 17, 147, 216, 204, 132, 112, 148, 155, 107, 67, 206, 111, 132, 131, 71, 0, 251, 141, 156, 65, 178, 93, 47, 239, 47, 153, 161, 238, 227, 39, 59, 44, 142, 94, 117, 179, 29, 255, 38, 105, 33, 197, 98, 209, 138, 224, 86, 136, 94, 66, 254, 200, 164, 129, 162, 27, 116, 151, 125, 106, 172, 132, 39, 73, 122, 222, 96, 49, 247, 80, 162, 255, 126, 133, 40, 114, 65, 193, 241, 98, 103, 247, 177, 102, 29, 253, 0, 145, 208, 248, 57, 201, 3, 135, 158, 204, 204, 28, 48, 173, 26, 173, 224, 21, 37, 143, 40, 253, 247, 75, 162, 160, 168 } Extension ec_point_formats, formats: [uncompressed] *** Certificate chain Signature Algorithm SHA256withRSA Signed with a DSA or RSA public key *** ServerHelloDone https-jsse-nio-8443-exec-7, WRITE: TLSv1.2 Handshake, length = 1697 chain [0] = [ [ Version: V3 Subject: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5 Key: Sun RSA public key, 2048 bits modulus: 21944740401167172627731583459321030363948627215746053925732477915060915436180167456469785746662093119306577380200747716284652995937004530444336851845029170241627465854006145050037178991946925696078563485570896673835545540824265905937881682387179314987285174428010940266412458943894800978345731524307952507729956745301047871771953945124256516782917326981125087548987889540650149121302888872237484100834740328828765018090383963294418357028839734723410564800765871733483849269364796949055153420777966213779145518299141217288017794394762274753999989298548507425930217302947589819396239489846633419099079578249651345685751 public exponent: 65537 Validity: [From: Fri May 30 08:43:19 GMT 2014, To: Mon May 27 08:43:19 GMT 2024] Issuer: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US SerialNumber: [ a6ef7a9a 5368eb27] Certificate Extensions: 3 [1]: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: 78 0D 96 9D FE D3 0B BE 8C C7 E3 EC 67 04 AB 4B x...........g..K 0010: EA E0 00 29 ...) ] ] [2]: ObjectId: 2.5.29.19 Criticality=false BasicConstraints:[ CA:true PathLen:2147483647 ] [3]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 78 0D 96 9D FE D3 0B BE 8C C7 E3 EC 67 04 AB 4B x...........g..K 0010: EA E0 00 29 ...) ] ] ] Algorithm: [SHA1withRSA] Signature: 0000: 19 16 5A 21 99 21 24 98 3C 0A E8 D8 00 AB 44 24 ..Z!.!$.<.....D$ 0010: F2 0C B7 83 D5 9F 96 17 87 E2 1F 1D A3 47 68 C7 .............Gh. 0020: 68 4A CB 56 0E 77 2B E8 1A 9F E7 09 A1 19 77 D0 hJ.V.w+.......w. 0030: 5E CC C1 B3 9A C4 35 3D CB E0 A5 A6 43 5D A3 26 ^.....5=....C].& 0040: A4 91 8A C1 FA 7B 10 EA DC C3 C7 1C 47 DC 97 32 ............G..2 0050: C0 37 80 1C F1 42 10 E3 74 17 FA 3E 60 4A B7 59 .7...B..t..>`J.Y 0060: 92 C1 E0 6F BB F1 BB 9F 82 89 B5 83 D5 AE 1E 90 ...o............ 0070: 0A 89 8D FB 4C C0 C5 9E DC C5 8C C6 2F EE D9 B4 ....L......./... 0080: 95 47 27 2E BE 82 31 6F 76 C0 DB 4C C8 0D 3B 7B .G'...1ov..L..;. 0090: D1 6A BF BD 3B 93 30 04 A2 9E 81 F7 96 28 77 F2 .j..;.0......(w. 00A0: 32 05 68 44 1F B3 30 CE 40 9F 20 F3 B4 2B AA E6 2.hD..0.@. ..+.. 00B0: 40 9B FB 7F 34 6E 3A 99 FD F8 28 F1 8C 9B 56 34 @...4n:...(...V4 00C0: 64 AD 4D 56 39 CB 96 18 50 9B 99 43 80 0A 39 A5 d.MV9...P..C..9. 00D0: 13 7A 6E C5 25 E0 95 4A 92 E5 A8 8B EE 03 49 B4 .zn.%..J......I. 00E0: D9 7C 00 E3 F0 3B A7 BA 40 30 CC 89 55 C6 97 93 .....;..@0..U... 00F0: B5 15 F6 62 D3 B1 74 9C 0B 80 2B 8A D4 03 84 A0 ...b..t...+..... ] *** *** Diffie-Hellman ServerKeyExchange DH Modulus: { 255, 255, 255, 255, 255, 255, 255, 255, 201, 15, 218, 162, 33, 104, 194, 52, 196, 198, 98, 139, 128, 220, 28, 209, 41, 2, 78, 8, 138, 103, 204, 116, 2, 11, 190, 166, 59, 19, 155, 34, 81, 74, 8, 121, 142, 52, 4, 221, 239, 149, 25, 179, 205, 58, 67, 27, 48, 43, 10, 109, 242, 95, 20, 55, 79, 225, 53, 109, 109, 81, 194, 69, 228, 133, 181, 118, 98, 94, 126, 198, 244, 76, 66, 233, 166, 55, 237, 107, 11, 255, 92, 182, 244, 6, 183, 237, 238, 56, 107, 251, 90, 137, 159, 165, 174, 159, 36, 17, 124, 75, 31, 230, 73, 40, 102, 81, 236, 230, 83, 129, 255, 255, 255, 255, 255, 255, 255, 255 } https-jsse-nio-8443-exec-6, WRITE: TLSv1.2 Handshake, length = 40 233, 193, 125, 3, 250, 41, 62, 242, 151, 50, 95 } *** 81 https-jsse-nio-8443-exec-5, WRITE: TLSv1.2 Change Cipher Spec, length = 1 %% Cached server session: [Session-31, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384] *** Finished verify_data: { 29, 191, 226, 237, 223, 169, 118, 72, 13, 133, 75, 172 } *** DH Base: { 2 } Server DH Public Key: { 199, 202, 226, 186, 83, 217, 194, 255, 219, 116, 94, 69, 95, 2, 236, 130, 189, 156, 166, 212, 84, 143, 216, 76, 223, 178, 200, 151, 214, 155, 179, 156, 217, 91, 149, 47, 124, 177, 245, 201, 43, 216, 208, 179, 38, 11, 112, 180, 222, 147, 181, 39, 229, 64, 30, 80, 121, 223, 252, 26, 129, 33, 178, 123, 19, 232, 62, 74, 212, 195, 124, 200, 122, 200, 241, 254, 24, 202, 123, 170, 146, 117, 101, 83, 255, 186, 146, 174, 10, 177, 172, 245, 185, 98, 128, 246, 222, 184, 248, 228, 63, 83, 75, 213, 191, 164, 221, 253, 156, 136, 204, 195, 95, 215, 174, 94, 100, 116, 39, 213, 12, 156, 125, 218, 24, 70, 13, 11 } Signature Algorithm SHA256withRSA Signed with a DSA or RSA public key *** ServerHelloDone https-jsse-nio-8443-exec-1, WRITE: TLSv1.2 Handshake, length = 1697 https-jsse-nio-8443-exec-7, READ: TLSv1.2 Handshake, length = 134 *** ClientKeyExchange, DH DH Public key: { 194, 214, 54, 194, 205, 199, 218, 6, 7, 134, 149, 225, 221, 110, 36, 220, 255, 181, 194, 4, 113, 224, 235, 139, 255, 211, 115, 108, 215, 57, 85, 208, 231, 182, 32, 218, 105, 44, 53, 175, 191, 147, 93, 238, 174, 254, 124, 5, 148, 65, 226, 208, 88, 116, 0, 225, 33, 134, 176, 19, 253, 234, 59, 27, 175, 124, 237, 208, 6, 194, 119, 146, 30, 248, 225, 175, 10, 137, 141, 226, 147, 86, 64, 146, 39, 129, 18, 44, 217, 146, 185, 148, 65, 253, 185, 56, 40, 82, 231, 16, 177, 17, 78, 82, 134, 18, 129, 31, 105, 2, 100, 46, 60, 229, 204, 202, 47, 253, 171, 91, 30, 68, 86, 77, 175, 142, 88, 146 } Extension signature_algorithms, signature_algorithms: SHA256withRSA, Unknown (hash:0x8, signature:0x9), Unknown (hash:0x8, signature:0x4), SHA256withECDSA, Unknown (hash:0x8, signature:0x7), SHA384withRSA, Unknown (hash:0x8, signature:0xa), Unknown (hash:0x8, signature:0x5), SHA384withECDSA, SHA512withRSA, Unknown (hash:0x8, signature:0xb), Unknown (hash:0x8, signature:0x6), SHA512withECDSA, SHA1withRSA, SHA1withECDSA https-jsse-nio-8443-exec-2, READ: TLSv1.2 Handshake, length = 134 https-jsse-nio-8443-exec-9, WRITE: TLSv1.2 Application Data, length = 86 https-jsse-nio-8443-exec-5, WRITE: TLSv1.2 Handshake, length = 40 EC 7E DC 98 20 9F EB D6 B4 B6 18 66 51 CA *** ClientKeyExchange, DH 2DH Public key: { ..... ......fQ. 0030: Using SSLEngineImpl. Unsupported extension type_35, data: B3 50 96 43 7A 2B 22 16 37 B3 38 F0 C6 F4 54 7F Allow unsafe renegotiation: false Allow legacy hello messages: true Is initial handshake: true Is secure renegotiation: false .P.Cz+".7.8...T. 0040: 62 B5 8B DF 70 F0 F5 8D 02 32 45 3E A0 A9 50 8E b...p....2E>..P. 0050: C5 53 65 FB 50 66 E1 55 88 76 00 AB 40 06 0B 26 .Se.Pf.U.v..@..& 0060: 2D 76 A1 8A 98 A1 13 0C 5B 51 83 F2 EC 97 CD 6C -v......[Q.....l 0070: E6 0B 9A D3 7F 28 6B DF 63 FA 9E 87 AB 31 15 F6 .....(k.c....1.. 242, 241, 3, 104, 44, 158, 45, 97, 146, 233, 2, 240, 70, Unsupported extension type_51, data: 00:69:00:17:00:41:04:12:da:be:06:96:e3:11:7c:c3:95:8d:39:95:11:0b:6f:92:46:b4:a8:78:bb:a4:a1:c4:ea:f6:48:27:88:03:03:33:b1:46:3b:69:3a:1a:68:64:b5:d2:60:9f:96:80:fc:1e:91:00:19:45:90:7b:9f:3a:a0:17:7c:d7:3c:c5:d8:00:1d:00:20:9e:f4:22:71:7e:2a:aa:08:65:6e:08:79:7f:b6:64:8d:25:6f:66:8c:64:f0:0a:d9:de:10:f2:3a:9a:d5:87:3d https-jsse-nio-8443-exec-9, READ: TLSv1.2 Alert, length = 26 SESSION KEYGEN: %% Cached server session: [Session-32, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384] https-jsse-nio-8443-exec-9, RECV TLSv1.2 ALERT: warning, close_notify https-jsse-nio-8443-exec-9, closeInboundInternal() https-jsse-nio-8443-exec-9, closeOutboundInternal() Unsupported extension type_43, data: 08:03:04:03:03:03:02:03:01 132, 159, 103, 174, 193, 233, 26, 126, 213, 31, 219, 250, 24, 104, 125, 52, 46, 93, 186, 178, 168, 90, 159, 217, 135, 68, 154, 253, 77, 18, 75, 49, 241, 48, 204, 35, 161, 3, 185, 26, 224, 124, 101, 204, 156, 64, 225, 20, 185, 229, 224, 40, 215, 42, 71, 121, 190, 60, 172, 189, 101, 157, 202, CONNECTION KEYGEN: Client Nonce: 0000: 99 FB A9 A7 84 50 9A 61 9E CC 17 54 C8 77 C5 F7 .....P.a...T.w.. 0010: AF FF C9 5D 43 B2 CC 9C C2 CB AA 22 81 72 A5 EF ...]C......".r.. Server Nonce: 0000: 5C 7D 0F FA 5E 29 49 C7 4D 07 A7 39 1E FC 5E 01 \...^)I.M..9..^. 0010: 7A E1 D3 D5 10 38 F8 43 21 BD AA 3F 01 98 0F 7B z....8.C!..?.... Master Secret: 0000: 9F 46 CC 62 61 03 38 0E 03 51 4C CA DD F8 FB A0 .F.ba.8..QL..... 0010: FD BF E4 67 B9 08 BC D8 E8 14 74 82 FE 31 9D 1B ...g......t..1.. 0020: 36 76 0D 48 33 1B DF 13 4C 7B 1B 63 48 66 1E 61 6v.H3...L..cHf.a ... no MAC keys used for this cipher Client write key: 0000: FA 3B 3F 03 CB 6C 0B E0 FA 90 A8 66 49 5D 96 C4 .;?..l.....fI].. 0010: B1 F3 47 33 C0 9C B4 03 8D DC 53 83 D8 B2 5C 32 ..G3......S...\2 Server write key: 0000: F6 8B DB C5 BB 98 AD 17 4F 43 AF AF C6 5E 40 12 ........OC...^@. 0010: 67 B3 6D 5C D8 E6 41 CC 6E 20 01 55 B1 BA 18 6B g.m\..A.n .U...k Client write IV: 0000: 30 8C 50 D6 0.P. Server write IV: 0000: 72 03 C4 3E r..> Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1 116, 55https-jsse-nio-8443-exec-10, READ: TLSv1.2 Change Cipher Spec, length = 1 https-jsse-nio-8443-exec-1, WRITE: TLSv1.2 Application Data, length = 84 Extension renegotiation_info, renegotiated_connection: <empty> https-jsse-nio-8443-exec-9, SEND TLSv1.2 ALERT: warning, description = close_notify PreMaster Secret: Extension server_name, server_name: [type=host_name (0), value=localhost] , 230, 125, 26, 126, 176, 245, 150, 130, 39, 109, 129, 250, 32, 36, 145, 195, 216, 185, 188, 75, 159, 121, 87, 63, 173, 231, 77, 222, 90, 119, 147, 225, 246, 45, 170, 54, 163, 186, 163, 141, 43, 118, 117, 20, 95, 30, 205, 56, 36, 228 } Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1 Unsupported extension type_45, data: 02:01:00 Unsupported extension type_28, data: 40:00 Unsupported extension type_21, data: 00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00 *** https-jsse-nio-8443-exec-9, WRITE: TLSv1.2 Alert, length = 26 %% Initialized: [Session-36, SSL_NULL_WITH_NULL_NULL] https-jsse-nio-8443-exec-9, called closeOutbound() https-jsse-nio-8443-exec-9, closeOutboundInternal() 0000: C8 B3 D3 E4 B0 18 BC 21 FD 22 D9 FB 3D 79 6C DC .......!."..=yl. 0010: 54 17 1E 93 B5 51 64 5E B9 31 E0 7E 60 FC 56 64 T....Qd^.1..`.Vd 0020https-jsse-nio-8443-exec-10, READ: TLSv1.2 Handshake, length = 40 : SESSION KEYGEN: PreMaster Secret: 0000: 99 0B 00 5E 44 D0 27 F1 7A 28 47 76 97 66 61 CA ...^D.'.z(Gv.fa. 0010: 31 07 54 34 A6 30 C6 33 38 67 1A 47 D6 1B 7F 46 1.T4.0.38g.G...F 0020: 99 69 68 12 C4 02 73 F0 07 B6 81 43 48 A5 CC 24 .ih...s....CH..$ 0030: 1C 65 CA 4E 2C E8 5C C1 21 F7 24 9D 43 49 CE 44 .e.N,.\.!.$.CI.D 0040: 45 CC EB 3F 0A 36 61 B0 35 AB E6 E8 DE 27 9E 2F E..?.6a.5....'./ 0050: 6F 5C AA F9 C0 E8 80 67 AE 2E BB BF 1D DE C4 CB o\.....g........ 0060: 1F 8A CD A0 98 6B FB 0B 86 3C 5A 38 31 E6 B3 E7 .....k...<Z81... 0070: 52 0F 46 4F DA B4 37 FA 10 45 3D 07 E7 85 BC F9 R.FO..7..E=..... CONNECTION KEYGEN: Client Nonce: 0000: A0 60 D9 B5 6F 4D EB 4A 6E EC 9E 7D FC 20 98 81 .`..oM.Jn.... .. 0010: E4 77 42 16 64 4C 18 C6 74 0D EC 28 CD 3A 94 AC .wB.dL..t..(.:.. Server Nonce: 0000: 5C 7D 0F FA D6 2C 41 29 6F CA 22 27 59 B0 B2 66 \....,A)o."'Y..f 0010: 31 DE DB C2 17 8F 66 9D F5 0B BA 18 83 33 F3 34 1.....f......3.4 Master Secret: 0000: 5D 05 8B 48 5A B0 6C D2 01 9D 74 5D 1F 5A 43 F5 ]..HZ.l...t].ZC. 0010: 77 EB 2F AE 69 44 30 8A 40 FE 11 62 D2 86 A2 BB w./.iD0.@..b.... 0020: 4E 9A 41 EE DA F2 8D 80 35 C3 58 96 86 34 B1 D7 N.A.....5.X..4.. ... no MAC keys used for this cipher Client write key: 0000: AE CF B4 46 07 29 B9 09 A4 F9 76 E4 64 F2 C6 F5 ...F.)....v.d... 0010: 6D F4 DA FC E0 B6 CD 18 EF 35 57 69 89 1D BB 6C m........5Wi...l Server write key: 0000: 40 F4 35 4F 25 9E 47 04 42 7E 17 5F 6E 8B 33 DC @.5O%.G.B.._n.3. 0010: 60 A4 94 64 56 40 11 B6 13 A4 D1 27 F5 22 9A 3F `..dV@.....'.".? Client write IV: 0000: 88 C5 4B 6B ..Kk Server write IV: 0000: 07 22 C8 EA .".. Standard ciphersuite chosen: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 1D 3E 88 10 B3 6A A3 78 07 7A 78 D1 64 A6 2F 76 .>...j.x.zx.d./v 0030https-jsse-nio-8443-exec-1, READ: TLSv1.2 Alert, length = 26 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1.1 https-jsse-nio-8443-exec-6, READ: TLSv1 Handshake, length = 512 *** ClientHello, TLSv1.2 RandomCookie: GMT: 24188780 bytes = { 142, 156, 252, 0, 20, 179, 95, 150, 233, 206, 188, 110, 143, 71, 124, 201, 98, 70, 146, 7, 112, 169, 151, 73, 93, 97, 58, 190 } Session ID: {92, 125, 15, 250, 176, 170, 42, 70, 43, 66, 137, 224, 204, 10, 80, 179, 178, 154, 87, 102, 209, 236, 188, 198, 134, 85, 75, 127, 43, 153, 140, 198} Cipher Suites: [Unknown 0x13:0x2, Unknown 0x13:0x3, Unknown 0x13:0x1, Unknown 0x13:0x4, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa9, Unknown 0xc0:0xad, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0xac, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa8, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xc0:0x9d, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9c, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xaa, Unknown 0xc0:0x9f, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9e, TLS_DHE_RSA_WITH_AES_128_CBC_SHA] Compression Methods: { 0 } Using SSLEngineImpl. Unsupported extension status_request, data: 01:00:00:00:00 Extension elliptic_curves, curve names: {secp256r1, secp384r1, secp521r1, unknown curve 29, unknown curve 256, unknown curve 257, unknown curve 258, unknown curve 259, unknown curve 260} Extension ec_point_formats, formats: [uncompressed] Extension signature_algorithms, signature_algorithms: SHA256withRSA, Unknown (hash:0x8, signature:0x9), Unknown (hash:0x8, signature:0x4), SHA256withECDSA, Unknown (hash:0x8, signature:0x7), SHA384withRSA, Unknown (hash:0x8, signature:0xa), Unknown (hash:0x8, signature:0x5), SHA384withECDSA, SHA512withRSA, Unknown (hash:0x8, signature:0xb), Unknown (hash:0x8, signature:0x6), SHA512withECDSA, SHA1withRSA, SHA1withECDSA Unsupported extension type_35, data: Unsupported extension type_51, data: 00:69:00:17:00:41:04:86:69:84:8d:cf:49:95:b6:bc:54:68:ca:f2:d1:21:e0:fc:0b:02:82:ce:8e:99:b2:de:d5:1d:56:85:60:0d:59:6f:34:0a:40:c6:98:6a:fa:dd:f0:b3:1b:a2:59:eb:56:a5:e5:d7:c5:73:1e:78:98:98:69:a9:11:57:c8:64:89:00:1d:00:20:56:fd:31:c1:14:c7:f0:bb:83:e7:d4:c7:2d:02:e8:d1:40:9d:c9:60:b4:50:f8:bf:08:dd:ce:bb:1c:93:e6:33 Unsupported extension type_43, data: 08:03:04:03:03:03:02:03:01 Extension renegotiation_info, renegotiated_connection: <empty> Extension server_name, server_name: [type=host_name (0), value=localhost] Unsupported extension type_45, data: 02:01:00 Unsupported extension type_28, data: 40:00 Unsupported extension type_21, data: 00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00 *** %% Initialized: [Session-37, SSL_NULL_WITH_NULL_NULL] Standard ciphersuite chosen: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 %% Negotiating: [Session-37, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384] *** ServerHello, TLSv1.2 RandomCookie: GMT: 1551699707 bytes = { 17, 211, 119, 160, 167, 69, 139, 33, 176, 131, 203, 90, 198, 84, 249, 58, 64, 167, 137, 4, 143, 164, 184, 23, 182, 37, 69, 128 } Session ID: {92, 125, 15, 251, 90, 198, 138, 52, 9, 18, 162, 17, 164, 113, 131, 184, 23, 228, 183, 72, 242, 145, 57, 97, 33, 105, 168, 157, 166, 45, 229, 203} Cipher Suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 Compression Method: 0 Extension renegotiation_info, renegotiated_connection: <empty> *** Cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 *** Certificate chain chain [0] = [ [ Version: V3 Subject: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5 Key: Sun RSA public key, 2048 bits modulus: 21944740401167172627731583459321030363948627215746053925732477915060915436180167456469785746662093119306577380200747716284652995937004530444336851845029170241627465854006145050037178991946925696078563485570896673835545540824265905937881682387179314987285174428010940266412458943894800978345731524307952507729956745301047871771953945124256516782917326981125087548987889540650149121302888872237484100834740328828765018090383963294418357028839734723410564800765871733483849269364796949055153420777966213779145518299141217288017794394762274753999989298548507425930217302947589819396239489846633419099079578249651345685751 public exponent: 65537 Validity: [From: Fri May 30 08:43:19 GMT 2014, To: Mon May 27 08:43:19 GMT 2024] Issuer: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US SerialNumber: [ a6ef7a9a 5368eb27] Certificate Extensions: 3 [1]: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: 78 0D 96 9D FE D3 0B BE 8C C7 E3 EC 67 04 AB 4B x...........g..K 0010: EA E0 00 29 ...) ] ] [2]: ObjectId: 2.5.29.19 Criticality=false BasicConstraints:[ CA:true PathLen:2147483647 ] [3]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 78 0D 96 9D FE D3 0B BE 8C C7 E3 EC 67 04 AB 4B x...........g..K 0010: EA E0 00 29 ...) ] ] ] Algorithm: [SHA1withRSA] Signature: 0000: 19 16 5A 21 99 21 24 98 3C 0A E8 D8 00 AB 44 24 ..Z!.!$.<.....D$ 0010: F2 0C B7 83 D5 9F 96 17 87 E2 1F 1D A3 47 68 C7 .............Gh. 0020: 68 4A CB 56 0E 77 2B E8 1A 9F E7 09 A1 19 77 D0 hJ.V.w+.......w. 0030: 5E CC C1 B3 9A C4 35 3D CB E0 A5 A6 43 5D A3 26 ^.....5=....C].& 0040: A4 91 8A C1 FA 7B 10 EA DC C3 C7 1C 47 DC 97 32 ............G..2 0050: C0 37 80 1C F1 42 10 E3 74 17 FA 3E 60 4A B7 59 .7...B..t..>`J.Y 0060: 92 C1 E0 6F BB F1 BB 9F 82 89 B5 83 D5 AE 1E 90 ...o............ 0070: 0A 89 8D FB 4C C0 C5 9E DC C5 8C C6 2F EE D9 B4 ....L......./... 0080: 95 47 27 2E BE 82 31 6F 76 C0 DB 4C C8 0D 3B 7B .G'...1ov..L..;. 0090: D1 6A BF BD 3B 93 30 04 A2 9E 81 F7 96 28 77 F2 .j..;.0......(w. 00A0: 32 05 68 44 1F B3 30 CE 40 9F 20 F3 B4 2B AA E6 2.hD..0.@. ..+.. 00B0: 40 9B FB 7F 34 6E 3A 99 FD F8 28 F1 8C 9B 56 34 @...4n:...(...V4 00C0: 64 AD 4D 56 39 CB 96 18 50 9B 99 43 80 0A 39 A5 d.MV9...P..C..9. 00D0: 13 7A 6E C5 25 E0 95 4A 92 E5 A8 8B EE 03 49 B4 .zn.%..J......I. 00E0: D9 7C 00 E3 F0 3B A7 BA 40 30 CC 89 55 C6 97 93 .....;..@0..U... 00F0: B5 15 F6 62 D3 B1 74 9C 0B 80 2B 8A D4 03 84 A0 ...b..t...+..... ] *** https-jsse-nio-8443-exec-1, RECV TLSv1.2 ALERT: warning, close_notify : C9https-jsse-nio-8443-exec-2, READ: TLSv1.2 Change Cipher Spec, length = 1 %% Negotiating: [Session-36, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384] *** ServerHello, TLSv1.2 RandomCookie: GMT: 1551699707 bytes = { 140, 190, 14, 154, 247, 41, 40, 190, 95, 30, 47, 156, 233, 252, 159, 247, 155, 39, 231, 48, 4, 243, 201, 22, 163, 75, 139, 63 } Session ID: *** Finished {92, 125, 15, 251, 58, 67, 243, 201, 226, 98, 196, 139, 131, 32, 127, 66, 185, 104, 196, 98, 135, 68, 173, 5, 56, 144, 68, 93, 20, 11, 26, 114} https-jsse-nio-8443-exec-2, READ: TLSv1.2 Handshake, length = 40 https-jsse-nio-8443-exec-1, closeInboundInternal() https-jsse-nio-8443-exec-1, closeOutboundInternal() https-jsse-nio-8443-exec-1, SEND TLSv1.2 ALERT: warning, description = close_notify https-jsse-nio-8443-exec-1, WRITE: TLSv1.2 Alert, length = 26 https-jsse-nio-8443-exec-1, called closeOutbound() https-jsse-nio-8443-exec-1, closeOutboundInternal() Allow unsafe renegotiation: false Allow legacy hello messages: true Is initial handshake: true Is secure renegotiation: false *** Finished verify_data: { 231, 63, 75, 52, 49, 204, 183, 130, 94, 199, 200, 155 } *** Cipher Suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 Compression Method: 0 Extension renegotiation_info, renegotiated_connection: <empty> *** Cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 *** Diffie-Hellman ServerKeyExchange DH Modulus: { 255, 255, 255, 255, 255, 255, verify_data: { 25, 214, 75, 163, 98, 96, 204, 116, 112, 4, 14, 5 } *** 255, 255, 201, 15, 218, 162, 33, 104, 194, 52, 196, 198, 98, 139, 128, 220, 28, 209, 41, 2, 78, 8, 138, 103, 204, 116, 2, 11, 190, 166, 59, 19, 155, 34, 81, 74, 8, 121, 142, 52, 4, 221, 239, 149, 25, 179, 205, 58, 67, 27, 48, 43, 10, 109, 242, 95, 20, 55, 79, 225, 53, 109, 109, 81, 194, 69, 228, 133, 181, 118, 98, 94, 126, 198, 244, 76, 66, 233, 166, 55, 237, 107, 11, 255, 92, 182, 244, 6, 183, 237, 238, 56, 107, 251, 90, 137, 159, 165, 174, 159, 36, 17, 124, 75, 31, 230, 73, 40, 102, 81, 236, 230, 83, 129, 255, 255, 255, 255, 255, 255, 255, 255 } DH Base: { 2 } Server DH Public Key: { 253, 18, 15, 10, 1, 172, 245, 111, 99, 120, 3, 73, 232, 33, 177, 58, 238, 48, 60, 216, 127, 227, 53, 94, 101, 52, 113, 159, 204, 125, 175, 82, 52, 98, 129, 233, 58, 208, 40, 140, 238, 80, 45, 9, 63, 207, 43, 37, 124, 43, 117, 10, 11, 168, 67, 53, 27, 9, 224, 28, 93, 103, 191, 23, 157, 227, 238, 52, 152, 52, 131, 63, 62, 250, 57, 250, 243, 189, 49, 157, 165, 150, 16, 95, 6, 190, 39, 129, 147, 58, 191, 32, 172, 190, 15, 47, 69, 75, 160, 171, 126, 100, 150, 67, 222, 113, 128, 163, 230, 57, 68, 180, 20, 157, 137, 190, 105, 142, 97, 101, 236, 23, 5, 112, 235, 6, 62, 87 } https-jsse-nio-8443-exec-2, WRITE: TLSv1.2 Change Cipher Spec, length = 1 *** Certificate chain 6Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1.1 chain [0] = [ [ Version: V3 Subject: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5 Key: Sun RSA public key, 2048 bits modulus: 21944740401167172627731583459321030363948627215746053925732477915060915436180167456469785746662093119306577380200747716284652995937004530444336851845029170241627465854006145050037178991946925696078563485570896673835545540824265905937881682387179314987285174428010940266412458943894800978345731524307952507729956745301047871771953945124256516782917326981125087548987889540650149121302888872237484100834740328828765018090383963294418357028839734723410564800765871733483849269364796949055153420777966213779145518299141217288017794394762274753999989298548507425930217302947589819396239489846633419099079578249651345685751 public exponent: 65537 Validity: [From: Fri May 30 08:43:19 GMT 2014, To: Mon May 27 08:43:19 GMT 2024] Issuer: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US SerialNumber: [ a6ef7a9a 5368eb27] Certificate Extensions: 3 [1]: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: 78 0D 96 9D FE D3 0B BE 8C C7 E3 EC 67 04 AB 4B x...........g..K 0010: EA E0 00 29 ...) ] ] [2]: ObjectId: 2.5.29.19 Criticality=false BasicConstraints:[ CA:true PathLen:2147483647 ] [3]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 78 0D 96 9D FE D3 0B BE 8C C7 E3 EC 67 04 AB 4B x...........g..K 0010: EA E0 00 29 ...) ] ] ] Algorithm: [SHA1withRSA] Signature: 0000: 19 16 5A 21 99 21 24 98 3C 0A E8 D8 00 AB 44 24 ..Z!.!$.<.....D$ 0010: F2 0C B7 83 D5 9F 96 17 87 E2 1F 1D A3 47 68 C7 .............Gh. 0020: 68 4A CB 56 0E 77 2B E8 1A 9F E7 09 A1 19 77 D0 hJ.V.w+.......w. 0030: 5E CC C1 B3 9A C4 35 3D CB E0 A5 A6 43 5D A3 26 ^.....5=....C].& 0040: A4 91 8A C1 FA 7B 10 EA DC C3 C7 1C 47 DC 97 32 ............G..2 0050: C0 37 80 1C F1 42 10 E3 74 17 FA 3E 60 4A B7 59 .7...B..t..>`J.Y 0060: 92 C1 E0 6F BB F1 BB 9F 82 89 B5 83 D5 AE 1E 90 ...o............ 0070: 0A 89 8D FB 4C C0 C5 9E DC C5 8C C6 2F EE D9 B4 ....L......./... 0080: 95 47 27 2E BE 82 31 6F 76 C0 DB 4C C8 0D 3B 7B .G'...1ov..L..;. 0090: D1 6A BF BD 3B 93 30 04 A2 9E 81 F7 96 28 77 F2 .j..;.0......(w. 00A0: 32 05 68 44 1F B3 30 CE 40 9F 20 F3 B4 2B AA E6 2.hD..0.@. ..+.. 00B0: 40 9B FB 7F 34 6E 3A 99 FD F8 28 F1 8C 9B 56 34 @...4n:...(...V4 00C0: 64 AD 4D 56 39 CB 96 18 50 9B 99 43 80 0A 39 A5 d.MV9...P..C..9. 00D0: 13 7A 6E C5 25 E0 95 4A 92 E5 A8 8B EE 03 49 B4 .zn.%..J......I. 00E0: D9 7C 00 E3 F0 3B A7 BA 40 30 CC 89 55 C6 97 93 .....;..@0..U... 00F0: B5 15 F6 62 D3 B1 74 9C 0B 80 2B 8A D4 03 84 A0 ...b..t...+..... ] *** *** Diffie-Hellman ServerKeyExchange Signature Algorithm SHA256withRSA Signed with a DSA or RSA public key https-jsse-nio-8443-exec-10, WRITE: TLSv1.2 Change Cipher Spec, length = 1 DH Modulus: { 255, 255, 255, 255, 255, 255, 255, 255, 201, 15, 218, 162, 33, 104, 194, 52, 196, 198, 98, 139, 128, 220, 28, 209, 41, 2, 78, 8, 138, 103, 204, 116, 2, 11, 190, 166, 59, 19, 155, 34, 81, 74, 8, 121, 142, 52, 4, 221, 239, 149, 25, 179, 205, 58, 67, 27, 48, 43, 10, 109, 242, 95, 20, 55, 793, AE 84 75 F5 48 5F 5E 61 C6 2D C7 28 B7 A5 .c..u.H_^a.-.(.. https-jsse-nio-8443-exec-5, READ: TLSv1 Handshake, length = 512 0040: F5 7D F7 79 1A 4F 7A 5B AD 1C EA 24 72 FD 4B 65 ...y.Oz[...$r.Ke *** ClientHello, TLSv1.2 RandomCookie: *** Finished GMT: 1077481513 bytes = { 57, 11, 93, 62, 11, 82, 158, 138, 202, 112, 75, 162, 218, 200, 235, 0, 110, 19, 228, 129, 2, 75, 161, 30, 7, 242, 176, 200 } Session ID: 0050: 6F A1 DE 13 67 54 6F 04 08 59 63 B6 8E E4 02 ED o...gTo..Yc..... 0060: F8 8B 4A 43 FC AE E4 81 0C 98 EC 7F 7D AE 29 81 ..JC..........). 0070: 63 0E 7D 1C 21 EB 1A 63 58 ED 84 71 35 C3 A7 CB c...!..cX..q5... 225*** Finished verify_data: { 107, 145, 52, 24, 33, 207, 46, 106, 198, 62, 243, 150 } *** , 53, 109, 109, 81, 194, 69, 228, *** ServerHelloDone 133, 181, 118, 98, 94, 126, 198, 244, 76, 66, 233, 166, 55, 237, 107, 11, 255, 92, 182, 244, 6, 183, 237, 238, 56, 107, 251, 90, 137, 159, 165, 174, 159, 36, 17, 124, 75, 31, 230, 73, 40, 102, 81, 236, 230, 83, 129, 255, 255, 255, 255, 255, 255, 255, 255 } https-jsse-nio-8443-exec-10, WRITE: TLSv1.2 Handshake, length = 40 CONNECTION KEYGEN: Client Nonce: 0000: 9B 5D DF B6 45 A5 BC 45 87 08 04 A2 2C 61 14 3C .]..E..E....,a.< 0010: 50 5D 7F 5C 64 85 F7 5F 14 7D 6F 6F 93 2E E6 44 P].\d.._..oo...D Server Nonce: 0000: 5C 7D 0F FA D1 96 B6 C5 53 90 4F 77 F7 45 54 9F \.......S.Ow.ET. 0010: 25 06 AF BC E9 CC BA 19 C5 71 0B B2 27 E8 C3 2B %........q..'..+ Master Secret: 0000: 38 ED 80 B8 D7 78 6F E3 25 C6 0C C7 83 46 C1 C4 8....xo.%....F.. 0010: 0B B8 F8 37 59 73 09 66 45 C1 3C 72 EB 23 D7 57 ...7Ys.fE.<r.#.W 0020: 61 90 34 19 74 E9 4E 93 36 39 EF AE CF DD 2A B1 a.4.t.N.69....*. ... no MAC keys used for this cipher Client write key: 0000: 06 25 37 62 1D D3 F6 FB CD 7A FB 48 77 7B 24 69 .%7b.....z.Hw.$i 0010: 52 9D 5E A0 00 4A 8B D9 6E B3 2C DF DA 58 C8 54 R.^..J..n.,..X.T Server write key: 0000: 37 60 97 04 57 67 BA 35 AC 2D F4 ED F1 C7 A7 13 7`..Wg.5.-...... 0010: 2B 12 68 56 F2 26 77 D9 41 89 48 E0 79 29 E1 3B +.hV.&w.A.H.y).; Client write IV: 0000: 3D 6F 50 51 =oPQ Server write IV: 0000: 86 5D A6 8B .].. {92, 125, 15, 250, 118, 157, 4, 214, 139, 143, 30, 61, 184, 190, 46, 64, 131, 46, 40, 168, 183, 96, 10, 122, 80, 159, 188, 137, 169, 247, 151, 124} verify_data: { 234, 232, 60, 235, 33, 40, 214, 151, 146, 82, 218, 89 } *** %% Cached server session: [Session-33, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384] DH Base: { 2 } Server DH Public Key: { 119, 133, 74, 112, 54, 143, 120, 76, 134, 184, 133, 223, 241, 49, 18, 198, 247, 111, 100, 29, 69, 253, 150, 32, 130, 38, 78, 14, 103, 246, 90, 153, 239, 30, 145, 76, 196, 74, 5, 167, 220, 139, 191, 239, 153, 91, 239, 34, 216, 77, 49, 64, 195, 123, 12, 234, 3, 24, 104, 225, 7, 109, 252, 236, 179, 33, 207, 255, 247, 15, 12, 57, 8, 54, 218, 214, 214, 42, 190, 251, 26, 4, 136, 23, 156, 41, 7, 106, 14, 71, 223, 219, 49, 154, 221, 90, 87, 17, 203, 97, 83, 111, 161, 205, 23, 51, 32, 23, 249, 227, 42, 79, 217, 166, 43, 178, 215, 78, 31, 3, 144, 118, 67, 16, 122, 21, 169, 171 } Signature Algorithm SHA256withRSA Signed with a DSA or RSA public key *** ServerHelloDone https-jsse-nio-8443-exec-3, WRITE: TLSv1.2 Handshake, length = 1697 https-jsse-nio-8443-exec-6, WRITE: TLSv1.2 Handshake, length = 1697 https-jsse-nio-8443-exec-7, READ: TLSv1.2 Change Cipher Spec, length = 1 https-jsse-nio-8443-exec-2, WRITE: TLSv1.2 Handshake, length = 40 Cipher Suites: [Unknown 0x13:0x2, Unknown 0x13:0x3, Unknown 0x13:0x1, Unknown 0x13:0x4, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa9, Unknown 0xc0:0xad, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0xac, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa8, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xc0:0x9d, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9c, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xaa, Unknown 0xc0:0x9f, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9e, TLS_DHE_RSA_WITH_AES_128_CBC_SHA] Compression Methods: { 0 } %% Cached server session: [Session-35, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384] Unsupported extension status_request, data: 01:00:00:00:00 https-jsse-nio-8443-exec-7, READ: TLSv1.2 Handshake, length = 40 Extension elliptic_curves, curve names: {secp256r1, secp384r1, secp521r1, unknown curve 29, unknown curve 256, unknown curve 257, unknown curve 258, unknown curve 259, unknown curve 260} Extension ec_point_formats, formats: [uncompressed] Extension signature_algorithms, signature_algorithms: SHA256withRSA, Unknown (hash:0x8, signature:0x9), Unknown (hash:0x8, signature:0x4), SHA256withECDSA, Unknown (hash:0x8, signature:0x7), SHA384withRSA, Unknown (hash:0x8, signature:0xa), Unknown (hash:0x8, signature:0x5), SHA384withECDSA, SHA512withRSA, Unknown (hash:0x8, signature:0xb), Unknown (hash:0x8, signature:0x6), SHA512withECDSA, SHA1withRSA, SHA1withECDSA Unsupported extension type_35, data: Unsupported extension type_51, data: 00:69:00:17:00:41:04:59:44:6a:e1:f3:9f:57:14:93:d0:8b:9e:84:7d:86:f1:1d:bf:bc:d2:31:4d:7c:3e:f4:7d:0d:bf:13:e1:b8:bb:80:e5:f3:f3:13:bc:f9:8e:f9:27:d9:62:ee:8d:10:4e:fd:34:9b:b7:05:19:d2:6e:0c:d2:20:9f:6f:3b:f1:e9:00:1d:00:20:af:01:f3:36:e8:57:a0:a8:cb:45:81:c0:59:e6:58:2e:c3:4f:3d:04:f9:ff:79:79:f8:94:5c:20:4a:b1:96:30 Unsupported extension type_43, data: 08:03:04:03:03:03:02:03:01 Extension renegotiation_info, renegotiated_connection: <empty> Extension server_name, server_name: [type=host_name (0), value=localhost] Unsupported extension type_45, data: 02:01:00 Unsupported extension type_28, data: 40:00 Unsupported extension type_21, data: 00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00 *** *** Finished verify_data: { 42, 223, 45, 227, 102, 183, 221, 153, 132, 54, 82, 180 } *** https-jsse-nio-8443-exec-7, WRITE: TLSv1.2 Change Cipher Spec, length = 1 %% Initialized: [Session-38, SSL_NULL_WITH_NULL_NULL] *** Finished verify_data: { 128, 48, 39, 162, 106, 123, 31, 240, 21, 154, 50, 238 } *** https-jsse-nio-8443-exec-7, WRITE: TLSv1.2 Handshake, length = 40 %% Cached server session: [Session-34, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384] Standard ciphersuite chosen: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 %% Negotiating: [Session-38, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384] *** ServerHello, TLSv1.2 RandomCookie: GMT: 1551699707 bytes = { 137, 22, 220, 42, 157, 37, 238, 211, 52, 207, 179, 52, 54, 118, 130, 0, 0, 155, 239, 76, 99, 28, 184, 190, 234, 199, 81, 158 } Session ID: {92, 125, 15, 251, 81, 53, 15, 29, 214, 99, 168, 187, 1, 61, 35, 114, 128, 66, 29, 32, 85, 113, 210, 152, 168, 201, 72, 85, 116, 212, 176, 100} Cipher Suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 Compression Method: 0 Extension renegotiation_info, renegotiated_connection: <empty> *** Cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 *** Certificate chain chain [0] = [ [ Version: V3 Subject: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5 Key: Sun RSA public key, 2048 bits modulus: 21944740401167172627731583459321030363948627215746053925732477915060915436180167456469785746662093119306577380200747716284652995937004530444336851845029170241627465854006145050037178991946925696078563485570896673835545540824265905937881682387179314987285174428010940266412458943894800978345731524307952507729956745301047871771953945124256516782917326981125087548987889540650149121302888872237484100834740328828765018090383963294418357028839734723410564800765871733483849269364796949055153420777966213779145518299141217288017794394762274753999989298548507425930217302947589819396239489846633419099079578249651345685751 public exponent: 65537 Validity: [From: Fri May 30 08:43:19 GMT 2014, To: Mon May 27 08:43:19 GMT 2024] Issuer: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US SerialNumber: [ a6ef7a9a 5368eb27] Certificate Extensions: 3 [1]: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: 78 0D 96 9D FE D3 0B BE 8C C7 E3 EC 67 04 AB 4B x...........g..K 0010: EA E0 00 29 ...) ] ] [2]: ObjectId: 2.5.29.19 Criticality=false BasicConstraints:[ CA:true PathLen:2147483647 ] [3]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 78 0D 96 9D FE D3 0B BE 8C C7 E3 EC 67 04 AB 4B x...........g..K 0010: EA E0 00 29 ...) ] ] ] Algorithm: [SHA1withRSA] Signature: 0000: 19 16 5A 21 99 21 24 98 3C 0A E8 D8 00 AB 44 24 ..Z!.!$.<.....D$ 0010: F2 0C B7 83 D5 9F 96 17 87 E2 1F 1D A3 47 68 C7 .............Gh. 0020: 68 4A CB 56 0E 77 2B E8 1A 9F E7 09 A1 19 77 D0 hJ.V.w+.......w. 0030: 5E CC C1 B3 9A C4 35 3D CB E0 A5 A6 43 5D A3 26 ^.....5=....C].& 0040: A4 91 8A C1 FA 7B 10 EA DC C3 C7 1C 47 DC 97 32 ............G..2 0050: C0 37 80 1C F1 42 10 E3 74 17 FA 3E 60 4A B7 59 .7...B..t..>`J.Y 0060: 92 C1 E0 6F BB F1 BB 9F 82 89 B5 83 D5 AE 1E 90 ...o............ 0070: 0A 89 8D FB 4C C0 C5 9E DC C5 8C C6 2F EE D9 B4 ....L......./... 0080: 95 47 27 2E BE 82 31 6F 76 C0 DB 4C C8 0D 3B 7B .G'...1ov..L..;. 0090: D1 6A BF BD 3B 93 30 04 A2 9E 81 F7 96 28 77 F2 .j..;.0......(w. 00A0: 32 05 68 44 1F B3 30 CE 40 9F 20 F3 B4 2B AA E6 2.hD..0.@. ..+.. 00B0: 40 9B FB 7F 34 6E 3A 99 FD F8 28 F1 8C 9B 56 34 @...4n:...(...V4 00C0: 64 AD 4D 56 39 CB 96 18 50 9B 99 43 80 0A 39 A5 d.MV9...P..C..9. 00D0: 13 7A 6E C5 25 E0 95 4A 92 E5 A8 8B EE 03 49 B4 .zn.%..J......I. 00E0: D9 7C 00 E3 F0 3B A7 BA 40 30 CC 89 55 C6 97 93 .....;..@0..U... 00F0: B5 15 F6 62 D3 B1 74 9C 0B 80 2B 8A D4 03 84 A0 ...b..t...+..... ] *** https-jsse-nio-8443-exec-2, WRITE: TLSv1.2 Application Data, length = 84 https-jsse-nio-8443-exec-10, READ: TLSv1.2 Handshake, length = 134 https-jsse-nio-8443-exec-7, WRITE: TLSv1.2 Application Data, length = 84 https-jsse-nio-8443-exec-4, WRITE: TLSv1.2 Application Data, length = 83 https-jsse-nio-8443-exec-1, READ: TLSv1.2 Handshake, length = 134 *** Diffie-Hellman ServerKeyExchange *** ClientKeyExchange, DH DH Public key: { 255, 16, 201, 189, 197, 172, 116, 14, 248, 111, 231, 66, 62, 170, 155, 87, 110, 34, 156, 102, 93, 133, 253, 185, 8, 225, 131, 138, 142, 31, 162, 46, 189, 29, 120, 110, 90, 207, 169, 43, 61, 69, 72, 110, 189, 131, 237, 147, 61, 159, 58, 42, 179, 193, 126, 210, 66, 204, 122, 198, 223, 16, 211, 35, 163, 79, 95, 150, 221, 2, 254, 241, 21, 236, 148, 117, 207, 86, 210, 122, 13, 78, 67, 196, 141, 132, 24, 15, 81, 57, 176, 200, 97, 102, 45, 15, 89, 180, 60, 150, 39, 54, 109, 206, 5, 208, 102, 143, 0, 238, 134, 145, 119, 90, 49, 23, 125, 225, 30, 225, 192, 182, 209, 170, 24, 224, 40, 2 } SESSION KEYGEN: PreMaster Secret: 0000: 34 4C 4C EF 26 DE 3C 30 52 5D 3A 9B 1A 85 F9 C5 4LL.&.<0R]:..... 0010: 1A C6 CD 62 41 C3 84 90 3E 7B 3E B1 F2 31 35 EF ...bA...>.>..15. 0020: CC E5 74 7C 13 6C 2F A8 9C F3 1A 51 35 59 1D 29 ..t..l/....Q5Y.) 0030: B3 FE FA EB 72 20 7A 51 D7 21 78 4A 61 89 F0 99 ....r zQ.!xJa... 0040: 69 03 A0 62 99 08 7B BA D3 D9 3B 0F F3 99 61 74 i..b......;...at 0050: 20 5B 42 A5 5C A2 3D F1 1A 8B 8D 95 5D BC 46 2C [B.\.=.....].F, 0060: 73 A8 9D F8 5D D3 68 BD 92 AF 74 B1 60 A9 70 5B s...].h...t.`.p[ 0070: 30 F8 D6 79 00 A4 61 DF 79 52 0E 92 A8 2F 60 06 0..y..a.yR.../`. CONNECTION KEYGEN: Client Nonce: 0000: 01 1F F0 66 EA 9F 1A 4F 9E 3A 98 05 39 EC 53 EA ...f...O.:..9.S. 0010: 40 A1 AC B5 2F E3 10 F7 8D AF F1 37 EE 57 FE 48 @.../......7.W.H Server Nonce: 0000: 5C 7D 0F FB 8C BE 0E 9A F7 29 28 BE 5F 1E 2F 9C \........)(._./. 0010: E9 FC 9F F7 9B 27 E7 30 04 F3 C9 16 A3 4B 8B 3F .....'.0.....K.? Master Secret: 0000: 41 5D EE 4A B3 0B F9 A1 80 5C 81 88 0A 53 A4 36 A].J.....\...S.6 0010: 37 BA C2 EE 67 8D 20 17 35 C3 E4 9A D7 B9 1C 1C 7...g. .5....... 0020: 75 34 6E 63 2F A3 EF 60 1F C3 D7 05 6B 4A FD D4 u4nc/..`....kJ.. ... no MAC keys used for this cipher Client write key: 0000: 11 A3 29 EF 9A 7A 6D 59 C4 40 E2 7D 15 9F 12 B2 ..)..zmY.@...... 0010: 1C B0 0B 81 45 E2 C3 C7 44 9C 56 EC 1A 19 C9 0C ....E...D.V..... Server write key: 0000: 5C 64 51 55 44 69 63 60 6B 7A CC 58 42 39 8A 41 \dQUDic`kz.XB9.A 0010: 61 50 9D 7F 5F 11 BC 1C 93 4A E2 34 D3 57 4E D2 aP.._....J.4.WN. Client write IV: 0000: 24 54 98 4F $T.O Server write IV: 0000: 06 D3 99 59 ...Y *** ClientKeyExchange, DH DH Public key: { 14, 0, 140, 138, 23, 177, 198, 39, 84, 13, 216, 0, 231, 4, 19, 166, 96, 36, 92, 72, 208, 124, 201, 251, 33, 144, 19, 133, 100, 80, 43, 200, 199, 31, 251, 55, 182, 47, 201, 135, 210, 204, 244, 14, 170, 179, 241, 203, 245, 127, 66, 19, 198, 2, 38, 251, 186, 77, 221, 243, 139, 119, 209, 176, 170, 221, 241, 149, 134, 84, 44, 32, 237, 250, 60, 7, 141, 78, 196, 215, 245, 171, 34, 13, 125, 219, 69, 67, 173, 25, 212, 58, 225, 141, 48, 41, 234, 172, 109, 72, 214, 237, 166, 100, 39, 128, 193, 29, 63, 137, 225, 68, 32, 185, 11, 24, 44, 237, 139, 180, 198, 87, 123, 218, 244, 101, 40, 82 } https-jsse-nio-8443-exec-1, READ: TLSv1.2 Change Cipher Spec, length = 1 https-jsse-nio-8443-exec-1, READ: TLSv1.2 Handshake, length = 40 SESSION KEYGEN: https-jsse-nio-8443-exec-9, READ: TLSv1.2 Alert, length = 26 *** Finished verify_data: { 101, 129, 123, 132, 69, 46, 161, 121, 247, 163, 6, 136 } *** https-jsse-nio-8443-exec-1, WRITE: TLSv1.2 Change Cipher Spec, length = 1 *** Finished verify_data: { 40, 27, 140, 240, 135, 45, 19, 197, 190, 145, 8, 63 } *** DH Modulus: { 255, 255, 255, Using SSLEngineImpl. Allow unsafe renegotiation: false Allow legacy hello messages: true Is initial handshake: true Is secure renegotiation: false Using SSLEngineImpl. Using SSLEngineImpl. https-jsse-nio-8443-exec-3, READ: TLSv1.2 Alert, length = 26 PreMaster Secret: https-jsse-nio-8443-exec-9, RECV TLSv1.2 ALERT: warning, close_notify 0000: https-jsse-nio-8443-exec-3, RECV TLSv1.2 ALERT: warning, close_notify https-jsse-nio-8443-exec-3, closeInboundInternal() https-jsse-nio-8443-exec-3, closeOutboundInternal() https-jsse-nio-8443-exec-3, SEND TLSv1.2 ALERT: warning, description = close_notify https-jsse-nio-8443-exec-3, WRITE: TLSv1.2 Alert, length = 26 https-jsse-nio-8443-exec-1, WRITE: TLSv1.2 Handshake, length = 40 %% Cached server session: [Session-36, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384] https-jsse-nio-8443-exec-3, called closeOutbound() https-jsse-nio-8443-exec-3, closeOutboundInternal() 255, 255, 255, 255, 255, 201, 15, 218, 162, 33, 104, 194, 52, 196, 198, 98, 139, 128, 220, 28, 209, 41, 2, 78, 8, 138, 103, 204, 116, 2, 11, 190, 166, 59, 19, 155, 34, 81, 74, 8, 121, 142, 52, 4, 221, 239, 149, 25, 179, 205, 58, 67, 27, 48, 43, 10, 109, 242, 95, 20, 55, 79, 225, 53, 109, 109, 81, 194, 69, 228, 133, 181, 118, 98, 94, 126, 198, 244, 76, 66, 233, 166, 55, 237, 107, 11, 255, 92, 182, 244, 6, 183, 237, 238, 56, 107, 251, 90, 137, 159, 165, 174, 159, 36, 17, 124, 75, 31, 230, 73, 40, 102, 81, 236, 230, 83, 129, 255, 255, 255, 255, 255, 255, 255, 255 } DH Base: { 2 } Server DH Public Key: { 23, 129, 32, 112, 100, 83, 209, 85, 52, 118, 18, 50, 140, 204, 236, 123, 24, 237, 135, 50, 170, 84, 8, 246, 168, 245, 136, 53, 214, 239, 137, 60, 53, 132, 241, 179, 218, 191, 69, 198, 147, 191, 219, 224, 57, 143, 142, 95, 93, 138, 192, 250, 107, 33, 156, 211, 85, 162, 216, 116, 212, 242, 22, 7, 23, 67, 72, 0, 218, 250, 207, 132, 166, 246, 76, 87, 121, 51, 153, 87, 123, 245, 223, 200, 252, 27, 151, 12, 79, 164, 46, 233, 123, 199, 164, 200, 177, 46, 91, 87, 160, 1, 164, 148, 215, 105, 163, 212, 141, 171, 55, 47, 99, 243, 254, 88, 114, 176, 105, 55, 166, 180, 100, 26, 11, 145, 113, 2 } Signature Algorithm SHA256withRSA Signed with a DSA or RSA public key *** ServerHelloDone https-jsse-nio-8443-exec-5, WRITE: TLSv1.2 Handshake, length = 1697 https-jsse-nio-8443-exec-6, READ: TLSv1.2 Alert, length = 26 https-jsse-nio-8443-exec-6, RECV TLSv1.2 ALERT: warning, close_notify https-jsse-nio-8443-exec-6, closeInboundInternal() https-jsse-nio-8443-exec-6, closeOutboundInternal() https-jsse-nio-8443-exec-6, SEND TLSv1.2 ALERT: warning, description = close_notify https-jsse-nio-8443-exec-6, WRITE: TLSv1.2 Alert, length = 26 https-jsse-nio-8443-exec-6, called closeOutbound() https-jsse-nio-8443-exec-6, closeOutboundInternal() https-jsse-nio-8443-exec-3, WRITE: TLSv1.2 Application Data, length = 84 6C 99https-jsse-nio-8443-exec-9, closeInboundInternal() https-jsse-nio-8443-exec-9, closeOutboundInternal() Allow unsafe renegotiation: false Allow legacy hello messages: true Is initial handshake: true Is secure renegotiation: false Allow unsafe renegotiation: false Allow legacy hello messages: true Is initial handshake: true Is secure renegotiation: false Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1.1 https-jsse-nio-8443-exec-4, READ: TLSv1 Handshake, length = 512 *** ClientHello, TLSv1.2 RandomCookie: GMT: 639694063 bytes = { 123, 202, 232, 207, 102, 199, 27, 232, 141, 44, 29, 175, 145, 49, 147, 54, 140, 50, 149, 10, 255, 67, 252, 140, 182, 70, 217, 74 } Session ID: Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1.1 https-jsse-nio-8443-exec-8, READ: TLSv1 Handshake, length = 512 https-jsse-nio-8443-exec-3, READ: TLSv1.2 Alert, length = 26 *** ClientHello, TLSv1.2 RandomCookie: GMT: 1869694621 bytes = { 231, 170https-jsse-nio-8443-exec-3, RECV TLSv1.2 ALERT: warning, close_notify https-jsse-nio-8443-exec-3, closeInboundInternal() https-jsse-nio-8443-exec-3, closeOutboundInternal() https-jsse-nio-8443-exec-3, SEND TLSv1.2 ALERT: warning, description = close_notify {92, 125, 15, 250, 222, 28, 56, 143, 109, 254, 171, 255, 146, 211, 173, 127, 164, 151, 85, 161, 82, 252, 1, 187, 219, 71, 210, 215, 89, 19, 2, 22} Cipher Suites: [Unknown 0x13:0x2, Unknown 0x13:0x3, Unknown 0x13:0x1, Unknown 0x13:0x4, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa9, Unknown 0xc0:0xad, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0xac, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa8, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xc0:0x9d, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9c, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xaa, Unknown 0xc0:0x9f, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9e, TLS_DHE_RSA_WITH_AES_128_CBC_SHA] Compression Methods: { 0 } Unsupported extension status_request, data: 01:00:00:00:00 Extension elliptic_curves, curve names: {secp256r1, secp384r1, secp521r1, unknown curve 29, unknown curve 256, unknown curve 257, unknown curve 258, unknown curve 259, unknown curve 260} Extension ec_point_formats, formats: [uncompressed] Extension signature_algorithms, signature_algorithms: SHA256withRSA, Unknown (hash:0x8, signature:0x9), Unknown (hash:0x8, signature:0x4), SHA256withECDSA, Unknown (hash:0x8, signature:0x7), SHA384withRSA, Unknown (hash:0x8, signature:0xa), Unknown (hash:0x8, signature:0x5), SHA384withECDSA, SHA512withRSA, Unknown (hash:0x8, signature:0xb), Unknown (hash:0x8, signature:0x6), SHA512withECDSA, SHA1withRSA, SHA1withECDSA Unsupported extension type_35, data: Unsupported extension type_51, data: 00:69:00:17:00:41:04:66:79:57:d3:6d:5e:47:98:92:58:30:8c:05:68:52:cc:b4:e2:d7:c1:6d:f1:0c:71:36:2b:d5:fc:90:a9:6f:82:2d:2a:a7:68:55:bd:c1:70:1c:c4:a4:98:d4:68:ac:1d:7a:87:86:ac:ec:33:f5:34:cd:a9:9d:d8:d8:6e:7c:96:00:1d:00:20:01:3c:65:41:91:bd:29:13:fd:3a:10:c6:79:e0:ee:01:77:45:be:8f:61:61:c7:c9:21:0a:bd:f8:87:f2:61:3b Unsupported extension type_43, data: 08:03:04:03:03:03:02:03:01 Extension renegotiation_info, renegotiated_connection: <empty> Extension server_name, server_name: [type=host_name (0), value=localhost] Unsupported extension type_45, data: 02:01:00 Unsupported extension type_28, data: 40:00 Unsupported extension type_21, data: 00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00 *** Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1 https-jsse-nio-8443-exec-9, SEND TLSv1.2 ALERT: warning, description = close_notify A7 C8 6D 58 E9 C8 71 65 3D A6 EF EE F0 EB l...mX..qe=..... 0010Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1 https-jsse-nio-8443-exec-7, READ: TLSv1.2 Handshake, length = 134 Using SSLEngineImpl. Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1.1 https-jsse-nio-8443-exec-2, READ: TLSv1 Handshake, length = 512 *** ClientHello, TLSv1.2 RandomCookie: GMT: 1804453063 bytes = { 133, 116, 204, 52, 188, 129, 0, 25, 252, 8, 226, 194, 174, 78, 85, 15, 77, 6, 116, 135, 31, 29, 2, 195, 198, 58, 246, 28 } Session ID: {92, 125, 15, 250, 222, 28, 56, 143, 109, 254, 171, 255, 146, 211, 173, 127, 164, 151, 85, 161, 82, 252, 1, 187, 219, 71, 210, 215, 89, 19, 2, 22} Cipher Suites: [Unknown 0x13:0x2, Unknown 0x13:0x3, Unknown 0x13:0x1, Unknown 0x13:0x4, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa9, Unknown 0xc0:0xad, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0xac, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa8, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xc0:0x9d, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9c, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xaa, Unknown 0xc0:0x9f, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9e, TLS_DHE_RSA_WITH_AES_128_CBC_SHA] Compression Methods: { 0 } Unsupported extension status_request, data: 01:00:00:00:00 Extension elliptic_curves, curve names: {secp256r1, secp384r1, secp521r1, unknown curve 29, unknown curve 256, unknown curve 257, unknown curve 258, unknown curve 259, unknown curve 260} Extension ec_point_formats, formats: [uncompressed] Extension signature_algorithms, signature_algorithms: SHA256withRSA, Unknown (hash:0x8, signature:0x9), Unknown (hash:0x8, signature:0x4), SHA256withECDSA, Unknown (hash:0x8, signature:0x7), SHA384withRSA, Unknown (hash:0x8, signature:0xa), Unknown (hash:0x8, signature:0x5), SHA384withECDSA, SHA512withRSA, Unknown (hash:0x8, signature:0xb), Unknown (hash:0x8, signature:0x6), SHA512withECDSA, SHA1withRSA, SHA1withECDSA Unsupported extension type_35, data: Unsupported extension type_51, data: 00:69:00:17:00:41:04:7f:0f:be:22:16:61:d8:d7:37:04:88:da:0c:c2:af:a3:44:c1:98:5d:d4:87:7e:0e:5f:1c:48:4e:3b:62:ba:5d:4d:2b:08:03:05:59:52:0a:cd:0b:8c:f9:8b:45:05:98:69:4a:08:d9:ca:33:d4:e5:17:23:e0:6f:e7:73:53:f1:00:1d:00:20:5a:23:b6:78:86:5b:ea:8a:40:ff:fb:2c:4f:e8:84:35:fc:56:e5:10:92:f7:e4:96:6b:71:33:f0:fc:08:e6:51 Unsupported extension type_43, data: 08:03:04:03:03:03:02:03:01 Extension renegotiation_info, renegotiated_connection: <empty> Extension server_name, server_name: [type=host_name (0), value=localhost] Unsupported extension type_45, data: 02:01:00 Unsupported extension type_28, data: 40:00 Unsupported extension type_21, data: 00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00 *** %% Initialized: [Session-40, SSL_NULL_WITH_NULL_NULL] https-jsse-nio-8443-exec-3, WRITE: TLSv1.2 Alert, length = 26 https-jsse-nio-8443-exec-3, called closeOutbound() https-jsse-nio-8443-exec-3, closeOutboundInternal() , 159, 241, 4, 5, 182, 184, 89, 198, 207, 253, 87, 175, 109, 232, 95, 224, 253, 108, 109, 235, 138, 176, 211, 119, 70, 183 } Session ID: {92, 125, 15, 250, 222, 28, 56, 143, 109, 254, 171, 255, 146, 211, 173, 127, 164, 151, 85, 161, 82, 252, 1, 187, 219, 71, 210, 215, 89, 19, 2, 22} Cipher Suites: [Unknown 0x13:0x2, Unknown 0x13:0x3, Unknown 0x13:0x1, Unknown 0x13:0x4, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa9, Unknown 0xc0:0xad, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0xac, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa8, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xc0:0x9d, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9c, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xaa, Unknown 0xc0:0x9f, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9e, TLS_DHE_RSA_WITH_AES_128_CBC_SHA] Compression Methods: { 0 } Unsupported extension status_request, data: 01:00:00:00:00 Extension elliptic_curves, curve names: {secp256r1, secp384r1, secp521r1, unknown curve 29, unknown curve 256, unknown curve 257, unknown curve 258, unknown curve 259, unknown curve 260} Extension ec_point_formats, formats: [uncompressed] Extension signature_algorithms, signature_algorithms: SHA256withRSA, Unknown (hash:0x8, signature:0x9), Unknown (hash:0x8, signature:0x4), SHA256withECDSA, Unknown (hash:0x8, signature:0x7), SHA384withRSA, Unknown (hash:0x8, signature:0xa), Unknown (hash:0x8, signature:0x5), SHA384withECDSA, SHA512withRSA, Unknown (hash:0x8, signature:0xb), Unknown (hash:0x8, signature:0x6), SHA512withECDSA, SHA1withRSA, SHA1withECDSA Unsupported extension type_35, data: Unsupported extension type_51, data: 00:69:00:17:00:41:04:a9:5c:68:01:54:07:f3:e5:e6:09:93:af:a0:42:f2:e1:c6:88:0f:ed:b7:22:61:cb:4a:75:85:f3:28:a8:11:8c:35:f0:b2:bb:f3:95:94:68:de:46:5b:30:66:93:99:5a:49:a0:cc:4b:b2:d0:c8:72:79:a6:1e:8f:21:19:00:1f:00:1d:00:20:81:ea:07:c7:6c:dd:cb:74:bd:82:58:f4:e9:c7:8f:5a:a8:32:32:2e:f6:68:94:06:92:ce:72:b0:13:dd:7a:65 Unsupported extension type_43, data: 08:03:04:03:03:03:02:03:01 Extension renegotiation_info, renegotiated_connection: <empty> Extension server_name, server_name: [type=host_name (0), value=localhost] Unsupported extension type_45, data: 02:01:00 Unsupported extension type_28, data: 40:00 Unsupported extension type_21, data: 00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00 Standard ciphersuite chosen: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 *** ClientKeyExchange, DH : F2 94 F6 AB 5D A3 BF E6 B1 E2 D2 E3 AA C4 A9 FE ....]........... 0%% Initialized: [Session-39, SSL_NULL_WITH_NULL_NULL] https-jsse-nio-8443-exec-9, WRITE: TLSv1.2 Alert, length = 26 020: 59 59 72 D3 B0 37 DE D7 A7 68 66 DA 91 FB B4 6C YYr..7...hf....l 0030: 4B 91 61 EB B5 AF 6D 34 44 7E BC 70 9E B1 FC 0D K.a...m4D..p.... 0040: E0 CD E8 8F 5E 35 AF 0C FD FE 2A E2 39 1E 75 52 ....^5....*.9.uR 0050: 2C 27 37 00 1A 7D F2 4E 93 11 49 D5 C2 7C 82 EA ,'7....N..I..... 0060: 77 66 03 26 3E 1C E1 81 71 2F BE DE 84 42 5F F2 wf.&>...q/...B_. 0070: 60 C2 28 6D 71 AC CA 2D C1 61 C9 Standard ciphersuite chosen: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 DH Public key: { 30, 38, 47, 241, 140, 165, 138, 76, 191, 92, 58, 137, 252, 174, 117, 147, 247, 165, 128, 120, 253, 197, 219, 168, 233, 157, 37, 187, 250, 88, 171, 95, 58, 195, 6, 77, 190, 2, 45, 14, 184, 202, 107, 99, 35, 162, 13, 34, 167, 43, 192, 248, 248, 212, 207, 116, 101, 203, 78, 154, 235, 118, 93, 231, 78, 109, 85, 252, 98, 59, 151, 91, 82, 70, 7, 228, 204, 74, 56, 245, 226, 92, 201, 240, 176, 16, 115, 75, 167, 37, 81, 65, 194, 126, 155, 154, 95, 197, 0, 230, 120, 142, 107, 22, 126, 87, 50, 209, 152, 152, 202, 197, 96, 25, 188, 30, 5, 170, 203, 23, 2, 18, 131, 12, 241, 45, 108, 17 } %% Negotiating: [Session-40, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384] *** Allow unsafe renegotiation: false Allow legacy hello messages: true Is initial handshake: true Is secure renegotiation: false *** ServerHello, TLSv1.2 RandomCookie: GMT: 1551699707 bytes = { 8, 193, 199, 249, Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1 %% Negotiating: [Session-39, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384] *** ServerHello, TLSv1.2 RandomCookie: GMT: 1551699707 bytes = { 225, 74, 106, 52, 191, 141, 29, 96, 121, 100, 156, 63, 209, 216, 155, 136, 180, 35, 4, 175, 173, 175, 191, 189%% Initialized: [Session-41, SSL_NULL_WITH_NULL_NULL] SESSION KEYGEN: PreMaster Secret: 0000: E8 C1 6A B9 1A 9A A9 7B 12 B5 E9 F9 38 13 D9 12 ..j.........8... 0010: AF 83 41 5E C0 88 58 74 91 1C 5B 60 C1 ED 2A D6 ..A^..Xt..[`..*. 0020: 63 96 7A 2E 5E EC 3A D8 0B 9F A5 49 65 2D 0A E9 c.z.^.:....Ie-.. 0030: 0E 16 27 EF 8D 40 28 34 3F 75 F1 BE AB 63 54 72 ..'..@(4?u...cTr 0040: 07 E8 1F 82 17 9A E2 F0 D0 CB A0 52 86 6B 55 A4 ...........R.kU. 0050: CF F0 FB 6A C0 70 47 3A 4A 7A EE 20 38 A7 D6 E2 ...j.pG:Jz. 8... 0060: 33 93 03 9A D9 7B 28 8B 26 E3 11 FC 37 38 5A 97 3.....(.&...78Z. 0070: EF A4 DA 32 E9 43 92 70 95 7C B3 50 9E 38 20 B0 ...2.C.p...P.8 . C7 76 73 C3 A2 `.(mq..-.a..vs.. https-jsse-nio-8443-exec-9, called closeOutbound() https-jsse-nio-8443-exec-9, closeOutboundInternal() Standard ciphersuite chosen: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 %% Negotiating: [Session-41, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384] *** ServerHello, TLSv1.2 RandomCookie: GMT: 1551699707 bytes = { 171, CONNECTION KEYGEN: Client Nonce: 0000: 01 71 17 6C 8E 9C FC 00 14 B3 5F 96 E9 CE BC 6E .q.l......_....n 0010: 8F 47 7C C9 62 46 92 07 70 A9 97 49 5D 61 3A BE .G..bF..p..I]a:. Server Nonce: 0000: 5C 7D 0F FB 11 D3 77 A0 A7 45 8B 21 B0 83 CB 5A \.....w..E.!...Z 0010: C6 54 F9 3A 40 A7 89 04 8F A4 B8 17 B6 25 45 80 .T.:@........%E. Master Secret: 0000: 4C F3 33 BB 74 EE 80 3E 64 43 0E F6 C5 10 59 84 L.3.t..>dC....Y. 0010: BF 40 56 34 7A 0F E9 9F BA D1 24 35 71 55 E7 7C .@V4z.....$5qU.. 0020: 61 10 9B 91 EC 15 AF 99 9E 9B A5 3A E5 BC D2 2B a..........:...+ ... no MAC keys used for this cipher Client write key: 0000: A5 7B 55 A9 00 27 D5 3E FE 39 36 CC 97 1C 78 4A ..U..'.>.96...xJ 0010: CB 9C 57 5B C2 0D 6B 00 20 D2 46 9E 73 BF 64 AC ..W[..k. .F.s.d. Server write key: 0000: 69 42 1F 22 0F 48 AF 00 45 B9 A4 86 AB 4B 40 9E iB.".H..E....K@. 0010: B9 98 BB 5B B1 CE 66 FB 18 46 84 5C 32 88 53 08 ...[..f..F.\2.S. Client write IV: 0000: 96 4B 85 E8 .K.. Server write IV: 0000: EB DA 3F 0F ..?. , 180, 15, 217, 184 } Session ID: {92, 125, 15, 251, 34, 200, 97, 53, 94, 126, 164, 133, 93, 172, 2, 80, 38, 156, 127, 228, 203, 64, 214, 130, 108, 157, 162, 222, 80, 232, 246, 175} Cipher Suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 Compression Method: 0 Extension renegotiation_info, renegotiated_connection: <empty> *** Cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 *** Certificate chain chain [0] = [ [ Version: V3 Subject: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5 Key: Sun RSA public key, 2048 bits modulus: 21944740401167172627731583459321030363948627215746053925732477915060915436180167456469785746662093119306577380200747716284652995937004530444336851845029170241627465854006145050037178991946925696078563485570896673835545540824265905937881682387179314987285174428010940266412458943894800978345731524307952507729956745301047871771953945124256516782917326981125087548987889540650149121302888872237484100834740328828765018090383963294418357028839734723410564800765871733483849269364796949055153420777966213779145518299141217288017794394762274753999989298548507425930217302947589819396239489846633419099079578249651345685751 public exponent: 65537 Validity: [From: Fri May 30 08:43:19 GMT 2014, To: Mon May 27 08:43:19 GMT 2024] Issuer: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US SerialNumber: [ a6ef7a9a 5368eb27] Certificate Extensions: 3 [1]: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: 78 0D 96 9D FE D3 0B BE 8C C7 E3 EC 67 04 AB 4B x...........g..K 0010: EA E0 00 29 ...) ] ] [2]: ObjectId: 2.5.29.19 Criticality=false BasicConstraints:[ CA:true PathLen:2147483647 ] [3]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 78 0D 96 9D FE D3 0B BE 8C C7 E3 EC 67 04 AB 4B x...........g..K 0010: EA E0 00 29 ...) ] ] ] Algorithm: [SHA1withRSA] Signature: 0000: 19 16 5A 21 99 21 24 98 3C 0A E8 D8 00 AB 44 24 ..Z!.!$.<.....D$ 0010: F2 0C B7 83 D5 9F 96 17 87 E2 1F 1D A3 47 68 C7 .............Gh. 0020: 68 4A CB 56 0E 77 2B E8 1A 9F E7 09 A1 19 77 D0 hJ.V.w+.......w. 0030: 5E CC C1 B3 9A C4 35 3D CB E0 A5 A6 43 5D A3 26 ^.....5=....C].& 0040: A4 91 8A C1 FA 7B 10 EA DC C3 C7 1C 47 DC 97 32 ............G..2 0050: C0 37 80 1C F1 42 10 E3 74 17 FA 3E 60 4A B7 59 .7...B..t..>`J.Y 0060: 92 C1 E0 6F BB F1 BB 9F 82 89 B5 83 D5 AE 1E 90 ...o............ 0070: 0A 89 8D FB 4C C0 C5 9E DC C5 8C C6 2F EE D9 B4 ....L......./... 0080: 95 47 27 2E BE 82 31 6F 76 C0 DB 4C C8 0D 3B 7B .G'...1ov..L..;. 0090: D1 6A BF BD 3B 93 30 04 A2 9E 81 F7 96 28 77 F2 .j..;.0......(w. 00A0: 32 05 68 44 1F B3 30 CE 40 9F 20 F3 B4 2B AA E6 2.hD..0.@. ..+.. 00B0: 40 9B FB 7F 34 6E 3A 99 FD F8 28 F1 8C 9B 56 34 @...4n:...(...V4 00C0: 64 AD 4D 56 39 CB 96 18 50 9B 99 43 80 0A 39 A5 d.MV9...P..C..9. 00D0: 13 7A 6E C5 25 E0 95 4A 92 E5 A8 8B EE 03 49 B4 .zn.%..J......I. 00E0: D9 7C 00 E3 F0 3B A7 BA 40 30 CC 89 55 C6 97 93 .....;..@0..U... 00F0: B5 15 F6 62 D3 B1 74 9C 0B 80 2B 8A D4 03 84 A0 ...b..t...+..... ] *** *** Diffie-Hellman ServerKeyExchange DH Modulus: { 255, 255, 255, 255, 255, 255, 255, 255, 201, 15, 218, 162, 33, 104, 194, 52, 196, 198, 98, 139, 128, 220, 28, 209, 41, 2, 78, 8, 138, 103, 204, 116, 2, 11, 190, 166, 59, 19, 155, 34, 81, 74, 8, 121, 142, 52, 4, 221, 239, 149, 25, 179, 205, 58, 67, 27, 48, 43, 10, 109, 242, 95, 20, 55, 79, 225, 53, 109, 109, 81, 194, 69, 228, 133, 181, 118, 98, 94, 126, 198, 244, 76, 66, 233, 166, 55, 237, 107, 11, 255, 92, 182, 244, 6, 183, 237, 238, 56, 107, 251, 90, 137, 159, 165, 174, 159, 36, 17, 124, 75, 31, 230, 73, 40, 102, 81, 236, 230, 83, 129, 255, 255, 255, 255, 255, 255, 255, 255 } Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1.1 https-jsse-nio-8443-exec-1, READ: TLSv1 Handshake, length = 512 *** ClientHello, TLSv1.2 RandomCookie: GMT: 349906884 bytes = { 210, 48, 206, 248, 247, 132, 33, 215, 84, 29, 129, 137, 48, 226, 246, 38, 147, 218, 227, 3, 192, 70, 246, 251, 102, 26, 137, 42 } Session ID: {92, 125, 15, 251, 58, 67, 243, 201, 226, 98, 196, 139, 131, 32, 127, 66, 185, 104, 196, 98, 135, 68, 173, 5, 56, 144, 68, 93, 20, 11, 26, 114} 81, 112, 193, 180, 223, 174, 54, 203, 106, 92, 91, 195, 62, 65, 53, 231, 107, 161, 160, 127, 112, 183, 87, 24 } Session ID: Cipher Suites: [Unknown 0x13:0x2, Unknown 0x13:0x3, Unknown 0x13:0x1, Unknown 0x13:0x4, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa9, Unknown 0xc0:0xad, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0xac, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa8, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xc0:0x9d, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9c, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xaa, Unknown 0xc0:0x9f, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9e, TLS_DHE_RSA_WITH_AES_128_CBC_SHA] Compression Methods: { 0 } Unsupported extension status_request, data: 01:00:00:00:00 Extension elliptic_curves, curve names: {secp256r1, secp384r1, secp521r1, unknown curve 29, unknown curve 256, unknown curve 257, unknown curve 258, unknown curve 259, unknown curve 260} Extension ec_point_formats, formats: [uncompressed] Extension signature_algorithms, signature_algorithms: SHA256withRSA, Unknown (hash:0x8, signature:0x9), Unknown (hash:0x8, signature:0x4), SHA256withECDSA, Unknown (hash:0x8, signature:0x7), SHA384withRSA, Unknown (hash:0x8, signature:0xa), Unknown (hash:0x8, signature:0x5), SHA384withECDSA, SHA512withRSA, Unknown (hash:0x8, signature:0xb), Unknown (hash:0x8, signature:0x6), SHA512withECDSA, SHA1withRSA, SHA1withECDSA Unsupported extension type_35, data: Unsupported extension type_51, data: 00:69:00:17:00:41:04:98:76:63:39:3d:b2:61:e2:19:9c:87:f3:44:33:13:a9:07:34:71:39:b2:a2:29:c8:b6:e5:9d:05:44:5a:2c:0b:6d:32:38:0f:96:c2:29:19:4c:18:e0:ca:31:97:2a:68:c0:11:93:dc:83:f3:61:fa:f3:cf:e3:48:d6:12:9d:c7:00:1d:00:20:67:c9:d0:a0:7c:88:b4:6a:15:09:fd:69:92:93:64:ed:1f:c8:e1:54:34:48:68:22:31:df:90:23:9e:10:a6:5b Unsupported extension type_43, data: 08:03:04:03:03:03:02:03:01 Extension renegotiation_info, renegotiated_connection: <empty> Extension server_name, server_name: [type=host_name (0), value=localhost] Unsupported extension type_45, data: 02:01:00 Unsupported extension type_28, data: 40:00 Unsupported extension type_21, data: 00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00 *** %% Initialized: [Session-42, SSL_NULL_WITH_NULL_NULL] Standard ciphersuite chosen: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 https-jsse-nio-8443-exec-10, READ: TLSv1.2 Change Cipher Spec, length = 1 DH Base: { 2 } Server DH Public Key: { 31, 27, 48, 183, 47, 120, 203, 177, 111, 63, 244, 178, 209, 94, 143, 175, 80, 137, 212, 95, 63, 240, 177, 97, 185, 88, 157, 126, 133, 76, 13, 129, 247, 160, 242, 213, 103, 100, 52, 98, 230, 8, 115, 149, 174, 104, 241, 182, 189, 252, 20, 225, 100, 123, 132, 0, 76, 201, 71, 204, 219, 140, 98, 208, 43, 164, 62, 165, 100, 132, 85, 76, 48, 132, 177, 205, 116, 204, 69, 114, 185, 215, 166, 173, 97, 163, 120, 222, 194, 92, 177, 127, 52, 89, 118, 190, 96, 141, 57, 8, 199, 160, 100, 43, 124, 109, 216, 188, 70, 230, 81, 171, 183, 147, 87, 110, 196, 5, 93, 213, 66, 141, 236, 113, 118, 111, 38, 72 } CONNECTION KEYGEN: Client Nonce: 0000: 40 39 10 29 39 0B 5D 3E 0B 52 9E 8A CA 70 4B A2 @9.)9.]>.R...pK. 0010: DA C8 EB 00 6E 13 E4 81 02 4B A1 1E 07 F2 B0 C8 ....n....K...... Server Nonce: 0000: 5C 7D 0F FB 89 16 DC 2A 9D 25 EE D3 34 CF B3 34 \......*.%..4..4 0010: 36 76 82 00 00 9B EF 4C 63 1C B8 BE EA C7 51 9E 6v.....Lc.....Q. Master Secret: 0000: 1D C2 C1 E3 EC 81 52 25 F3 FD C1 02 16 B7 32 87 ......R%......2. 0010: 95 1B 21 66 D2 3E E6 52 02 89 C9 C4 42 09 DD D5 ..!f.>.R....B... 0020: E0 75 DF F5 02 AD 29 88 3D A4 8C A3 64 0F 2C 8D .u....).=...d.,. ... no MAC keys used for this cipher Client write key: 0000: 4F CF 38 FF 2D D1 CE 5C 4D 53 8E 2D 49 3E AC 87 O.8.-..\MS.-I>.. 0010: 83 8A FC 2B 67 69 DF D2 04 65 F5 70 23 AC D0 90 ...+gi...e.p#... Server write key: 0000: D4 D9 D8 51 68 6B 32 78 CA B3 DC C1 B7 71 65 F3 ...Qhk2x.....qe. 0010: B9 06 9B 99 5B 41 CD D6 64 A8 ED E7 36 9F CA 42 ....[A..d...6..B Client write IV: 0000: 70 7D ED 87 p... Server write IV: 0000: C0 86 A8 E4 .... 25, 211, 27, 5, 103, 166, 191, 135, 80, 93, 209, 43, 8, 31, 118, 150, 104, 173, 183, 6, 182, 182, 207, 162, 105, 180, 9 } Session ID: {92, 125, 15, 251, 98, 164, 143, 61, 151, 3, 152, 25, 146, 252, 164, 101, 37, 43, 64, 174, 127, 142, 237, 219, 70, 175, 178, 89, 130, 249, 155, 86} Cipher Suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 Compression Method: 0 Extension renegotiation_info, renegotiated_connection: <empty> *** Cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 *** Certificate chain chain [0] = [ [ Version: V3 Subject: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5 Key: Sun RSA public key, 2048 bits modulus: 21944740401167172627731583459321030363948627215746053925732477915060915436180167456469785746662093119306577380200747716284652995937004530444336851845029170241627465854006145050037178991946925696078563485570896673835545540824265905937881682387179314987285174428010940266412458943894800978345731524307952507729956745301047871771953945124256516782917326981125087548987889540650149121302888872237484100834740328828765018090383963294418357028839734723410564800765871733483849269364796949055153420777966213779145518299141217288017794394762274753999989298548507425930217302947589819396239489846633419099079578249651345685751 public exponent: 65537 Validity: [From: Fri May 30 08:43:19 GMT 2014, To: Mon May 27 08:43:19 GMT 2024] Issuer: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US SerialNumber: [ a6ef7a9a 5368eb27] Certificate Extensions: 3 [1]: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: 78 0D 96 9D FE D3 0B BE 8C C7 E3 EC 67 04 AB 4B x...........g..K 0010: EA E0 00 29 ...) ] ] [2]: ObjectId: 2.5.29.19 Criticality=false BasicConstraints:[ CA:true PathLen:2147483647 ] [3]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 78 0D 96 9D FE D3 0B BE 8C C7 E3 EC 67 04 AB 4B x...........g..K 0010: EA E0 00 29 ...) ] ] ] Algorithm: [SHA1withRSA] Signature: 0000: 19 16 5A 21 99 21 24 98 3C 0A E8 D8 00 AB 44 24 ..Z!.!$.<.....D$ 0010: F2 0C B7 83 D5 9F 96 17 87 E2 1F 1D A3 47 68 C7 .............Gh. 0020: 68 4A CB 56 0E 77 2B E8 1A 9F E7 09 A1 19 77 D0 hJ.V.w+.......w. 0030: 5E CC C1 B3 9A C4 35 3D CB E0 A5 A6 43 5D A3 26 ^.....5=....C].& 0040: A4 91 8A C1 FA 7B 10 EA DC C3 C7 1C 47 DC 97 32 ............G..2 0050: C0 37 80 1C F1 42 10 E3 74 17 FA 3E 60 4A B7 59 .7...B..t..>`J.Y 0060: 92 C1 E0 6F BB F1 BB 9F 82 89 B5 83 D5 AE 1E 90 ...o............ 0070: 0A 89 8D FB 4C C0 C5 9E DC C5 8C C6 2F EE D9 B4 ....L......./... 0080: 95 47 27 2E BE 82 31 6F 76 C0 DB 4C C8 0D 3B 7B .G'...1ov..L..;. 0090: D1 6A BF BD 3B 93 30 04 A2 9E 81 F7 96 28 77 F2 .j..;.0......(w. 00A0: 32 05 68 44 1F B3 30 CE 40 9F 20 F3 B4 2B AA E6 2.hD..0.@. ..+.. 00B0: 40 9B FB 7F 34 6E 3A 99 FD F8 28 F1 8C 9B 56 34 @...4n:...(...V4 00C0: 64 AD 4D 56 39 CB 96 18 50 9B 99 43 80 0A 39 A5 d.MV9...P..C..9. 00D0: 13 7A 6E C5 25 E0 95 4A 92 E5 A8 8B EE 03 49 B4 .zn.%..J......I. 00E0: D9 7C 00 E3 F0 3B A7 BA 40 30 CC 89 55 C6 97 93 .....;..@0..U... 00F0: B5 15 F6 62 D3 B1 74 9C 0B 80 2B 8A D4 03 84 A0 ...b..t...+..... ] *** Signature Algorithm SHA256withRSA https-jsse-nio-8443-exec-10, READ: TLSv1.2 Handshake, length = 40 *** Finished verify_data: { 133, 13, 51, 61, 222, 81, 163, 117, 86, 63, 42, 27 } *** https-jsse-nio-8443-exec-10, WRITE: TLSv1.2 Change Cipher Spec, length = 1 *** Finished verify_data: { 254, 234, 158, 127, 233, 123, 251, 7, 204, 9, 110, 128 } *** Signed with a DSA or RSA public key %% Negotiating: [Session-42, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384] *** ServerHello, TLSv1.2 RandomCookie: GMT: 1551699707 bytes = { 112, 186, 220, 14, 92, 28, 254, 121, 4, 68, 14, 78, 3, 153, 151, 173, 254, 171, 169, 221, 235, 73, 36, 146, 67, 27, 219, 251 } Session ID: https-jsse-nio-8443-exec-10, WRITE: TLSv1.2 Handshake, length = 40 {92, 125, 15, 251, 114, 214, 202, 211, 214, 210, 209, 207, 146, 65, 120, 23, 13, 124, 139, 100, 141, 124, 98, 162, 42, 193, 9, 123, 8, 6, 123, 188} Cipher Suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 Compression Method: 0 Extension renegotiation_info, renegotiated_connection: <empty> *** Cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 *** Certificate chain chain [0] = [ [ Version: V3 Subject: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5 Key: Sun RSA public key, 2048 bits modulus: 21944740401167172627731583459321030363948627215746053925732477915060915436180167456469785746662093119306577380200747716284652995937004530444336851845029170241627465854006145050037178991946925696078563485570896673835545540824265905937881682387179314987285174428010940266412458943894800978345731524307952507729956745301047871771953945124256516782917326981125087548987889540650149121302888872237484100834740328828765018090383963294418357028839734723410564800765871733483849269364796949055153420777966213779145518299141217288017794394762274753999989298548507425930217302947589819396239489846633419099079578249651345685751 public exponent: 65537 Validity: [From: Fri May 30 08:43:19 GMT 2014, To: Mon May 27 08:43:19 GMT 2024] Issuer: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US SerialNumber: [ a6ef7a9a 5368eb27] Certificate Extensions: 3 [1]: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: 78 0D 96 9D FE D3 0B BE 8C C7 E3 EC 67 04 AB 4B x...........g..K 0010: EA E0 00 29 ...) ] ] [2]: ObjectId: 2.5.29.19 Criticality=false BasicConstraints:[ CA:true PathLen:2147483647 ] [3]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 78 0D 96 9D FE D3 0B BE 8C C7 E3 EC 67 04 AB 4B x...........g..K 0010: EA E0 00 29 ...) ] ] ] Algorithm: [SHA1withRSA] Signature: 0000: 19 16 5A 21 99 21 24 98 3C 0A E8 D8 00 AB 44 24 ..Z!.!$.<.....D$ 0010: F2 0C B7 83 D5 9F 96 17 87 E2 1F 1D A3 47 68 C7 .............Gh. 0020: 68 4A CB 56 0E 77 2B E8 1A 9F E7 09 A1 19 77 D0 hJ.V.w+.......w. 0030: 5E CC C1 B3 9A C4 35 3D CB E0 A5 A6 43 5D A3 26 ^.....5=....C].& 0040: A4 91 8A C1 FA 7B 10 EA DC C3 C7 1C 47 DC 97 32 ............G..2 0050: C0 37 80 1C F1 42 10 E3 74 17 FA 3E 60 4A B7 59 .7...B..t..>`J.Y 0060: 92 C1 E0 6F BB F1 BB 9F 82 89 B5 83 D5 AE 1E 90 ...o............ 0070: 0A 89 8D FB 4C C0 C5 9E DC C5 8C C6 2F EE D9 B4 ....L......./... 0080: 95 47 27 2E BE 82 31 6F 76 C0 DB 4C C8 0D 3B 7B .G'...1ov..L..;. 0090: D1 6A BF BD 3B 93 30 04 A2 9E 81 F7 96 28 77 F2 .j..;.0......(w. 00A0: 32 05 68 44 1F B3 30 CE 40 9F 20 F3 B4 2B AA E6 2.hD..0.@. ..+.. 00B0: 40 9B FB 7F 34 6E 3A 99 FD F8 28 F1 8C 9B 56 34 @...4n:...(...V4 00C0: 64 AD 4D 56 39 CB 96 18 50 9B 99 43 80 0A 39 A5 d.MV9...P..C..9. 00D0: 13 7A 6E C5 25 E0 95 4A 92 E5 A8 8B EE 03 49 B4 .zn.%..J......I. 00E0: D9 7C 00 E3 F0 3B A7 BA 40 30 CC 89 55 C6 97 93 .....;..@0..U... 00F0: B5 15 F6 62 D3 B1 74 9C 0B 80 2B 8A D4 03 84 A0 ...b..t...+..... ] *** {92, 125, 15, 251, 44, 185, 151, 145, 221, 104, 60, 123, 177, 172, 19, 98, 90, 47, 34, 173, 71, 64, 78, 184, 231, 53, 85, 178, 140, 195, 200, 151} Cipher Suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 Compression Method: 0 Extension renegotiation_info, renegotiated_connection: <empty> *** Cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 *** Certificate chain chain [0] = [ [ Version: V3 Subject: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5 Key: Sun RSA public key, 2048 bits modulus: 21944740401167172627731583459321030363948627215746053925732477915060915436180167456469785746662093119306577380200747716284652995937004530444336851845029170241627465854006145050037178991946925696078563485570896673835545540824265905937881682387179314987285174428010940266412458943894800978345731524307952507729956745301047871771953945124256516782917326981125087548987889540650149121302888872237484100834740328828765018090383963294418357028839734723410564800765871733483849269364796949055153420777966213779145518299141217288017794394762274753999989298548507425930217302947589819396239489846633419099079578249651345685751 public exponent: 65537 Validity: [From: Fri May 30 08:43:19 GMT 2014, To: Mon May 27 08:43:19 GMT 2024] Issuer: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US SerialNumber: [ a6ef7a9a 5368eb27] Certificate Extensions: 3 [1]: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: 78 0D 96 9D FE D3 0B BE 8C C7 E3 EC 67 04 AB 4B x...........g..K 0010: EA E0 00 29 ...) ] ] [2]: ObjectId: 2.5.29.19 Criticality=false BasicConstraints:[ CA:true PathLen:2147483647 ] [3]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 78 0D 96 9D FE D3 0B BE 8C C7 E3 EC 67 04 AB 4B x...........g..K 0010: EA E0 00 29 ...) ] ] ] Algorithm: [SHA1withRSA] Signature: 0000: 19 16 5A 21 99 21 24 98 3C 0A E8 D8 00 AB 44 24 ..Z!.!$.<.....D$ 0010: F2 0C B7 83 D5 9F 96 17 87 E2 1F 1D A3 47 68 C7 .............Gh. 0020: 68 4A CB 56 0E 77 2B E8 1A 9F E7 09 A1 19 77 D0 hJ.V.w+.......w. 0030: 5E CC C1 B3 9A C4 35 3D CB E0 A5 A6 43 5D A3 26 ^.....5=....C].& 0040: A4 91 8A C1 FA 7B 10 EA DC C3 C7 1C 47 DC 97 32 ............G..2 0050: C0 37 80 1C F1 42 10 E3 74 17 FA 3E 60 4A B7 59 .7...B..t..>`J.Y 0060: 92 C1 E0 6F BB F1 BB 9F 82 89 B5 83 D5 AE 1E 90 ...o............ 0070: 0A 89 8D FB 4C C0 C5 9E DC C5 8C C6 2F EE D9 B4 ....L......./... 0080: 95 47 27 2E BE 82 31 6F 76 C0 DB 4C C8 0D 3B 7B .G'...1ov..L..;. 0090: D1 6A BF BD 3B 93 30 04 A2 9E 81 F7 96 28 77 F2 .j..;.0......(w. 00A0: 32 05 68 44 1F B3 30 CE 40 9F 20 F3 B4 2B AA E6 2.hD..0.@. ..+.. 00B0: 40 9B FB 7F 34 6E 3A 99 FD F8 28 F1 8C 9B 56 34 @...4n:...(...V4 00C0: 64 AD 4D 56 39 CB 96 18 50 9B 99 43 80 0A 39 A5 d.MV9...P..C..9. 00D0: 13 7A 6E C5 25 E0 95 4A 92 E5 A8 8B EE 03 49 B4 .zn.%..J......I. 00E0: D9 7C 00 E3 F0 3B A7 BA 40 30 CC 89 55 C6 97 93 .....;..@0..U... 00F0: B5 15 F6 62 D3 B1 74 9C 0B 80 2B 8A D4 03 84 A0 ...b..t...+..... ] *** https-jsse-nio-8443-exec-7, READ: TLSv1.2 Change Cipher Spec, length = 1 https-jsse-nio-8443-exec-7, READ: TLSv1.2 Handshake, length = 40 *** Finished verify_data: { 246, 215, 205, 242, 47, 75, 7, 170, 222, 181, 77, 63 } *** https-jsse-nio-8443-exec-7, WRITE: TLSv1.2 Change Cipher Spec, length = 1 *** Finished verify_data: { 120, 25, 238, 96, 133, 237, 168, 69, 213, 29, 125, 107 } *** *** Diffie-Hellman ServerKeyExchange DH Modulus: { 255, 255, 255, 255, 255, 255, 255, 255, 201, 15, 218, 162, 33, 104, 194, 52, 196, 198, 98, 139, 128, 220, 28, 209, 41, 2, 78, 8, 138, 103, 204, 116, 2, 11, 190, 166, 59, 19, 155, 34, 81, 74, 8, 121, 142, 52, 4, 221, 239, 149, 25, 179, 205, 58, 67, 27, 48, 43, 10, 109, 242, 95, 20, 55, 79, 225, 53, 109, 109, 81, 194, 69, 228, 133, 181, 118, 98, 94, 126, 198, 244, 76, 66, 233, 166, 55, 237, 107, 11, 255, 92, 182, 244, 6, 183, 237, 238, 56, 107, 251, 90, 137, 159, 165, 174, 159, 36, 17, 124, 75, 31, 230, 73, 40, 102, 81, 236, 230, 83, 129, 255, 255, 255, 255, 255, 255, 255, 255 } DH Base: { 2 } Server DH Public Key: { 65, 1, 38, 44, 3, 213, 40, 130, 253, 209, 144, 81, 91, 88, 218, 57, 108, 230, 141, 218, 236, 78, 122, 145, 47, 35, 58, 144, 227, 13, 133, 5, 234, 148, 42, 191, 214, 206, 9, 235, 250, 130, 113, 8, 22, 207, 96, 67, 64, 53, 189, 248, 140, 6, 207, 228, 38, 218, 27, 109, 156, 226, 218, 30, 177, 61, 251, 38, 48, *** Diffie-Hellman ServerKeyExchange DH Modulus: { *** ServerHelloDone %% Cached server session: [Session-37, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384] https-jsse-nio-8443-exec-4, WRITE: TLSv1.2 Handshake, length = 1697 255, 255, 255, 255, 255, 255, 255, 255, 201, 15, 218, 162, 33, 104, 194, 52, 196, 198, 98, 139, 128, 220, 28, 209, 41, 2, 78, 8, 138, 103, 204, 116, 2, 11, 190, 166, 59, 19, 155, 34, 81, 74, 8, 121, 142, 52, 4, 221, 239, 149, 25, 179, 205, 58, 67, 27, 48, 43, 10, 109, 242, 95, 20, 55, 79, 225, 53, 109, 109, 81, 194, 69, 228, 133, 181, 118, 98, 94, 126, 198, 244, 76, 66, 233, 166, 55, 237, 107, 11, 255, 92, 182, 244, 6, 183, 237, 238, 56, 107, 251, 90, 137, 159, 165, 174, 159, 36, 17, 124, 75, 31, 230, 73, 40, 102, 81, 236, 230, 83, 129, 255, 255, 255, 255, 255, 255, 255, 255 } DH Base: { 2 } Server DH Public Key: { 150, 179, 3, 125, 194, 181, 61, 45, 78, 41, 155, 232, 195, 248, 155, 227, 80, 153, 156, 215, 177, 76, 254, 218, 216, 179, 7, 69, 176, 236, 30, 193, 219, 222, 140, 183, 217, 143, 70, 105, 178, 79, 172, 142, 84, 156, 208, 192, 13, 92, 18, 40, 24, 194, 9, 162, 122, 123, 61, 162, 111, 84, 191, 229, 54, 132, 2, 119, 236, 232, 160, 32, 45, 185, 164, 136, 101, 93, 209, 246, 109, 215, 244, 224, 189, 106, 190, 7, 123, 42, 176, 29, 217, 218, 164, 148, 177, 165, 115, 30, 183, 242, 221, 78, 32, 216, 29, 12, 36, 102, 50, 177, 213, 15, 190, 71, 200, 234, 114, 173, 186, 80, 177, 76, 23, 102, 108, 246 } Signature Algorithm SHA256withRSA Signed with a DSA or RSA public key *** ServerHelloDone https-jsse-nio-8443-exec-8, WRITE: TLSv1.2 Handshake, length = 1697 *** Diffie-Hellman ServerKeyExchange DH Modulus: { 255, 255, 255, 255, 255, 255, 255, 255, 201, 15, 218, 162, 33, 104, 194, 52, 196, 198, 98, 139, 128, 220, 28, 209, 41, 2, 78, 8, 138, 103, 204, 116, 2, 11, 190, 166, 59, 19, 155, 34, 81, 74, 8, 121, 142, 52, 4, 221, 239, 149, 25, 179, 205, 58, 67, 27, 48, 43, 10, 109, 242, 95, 20, 55, 79, 225, 53, 109, 109, 81, 194, 69, 228, 133, 181, 118, 98, 94, 126, 198, 244, 76, 66, 233, 166, 55, 237, 107, 11, 255, 92, 182, 244, 6, 183, 237, 238, 56, 107, 251, 90, 137, 159, 165, 174, 159, 36, 17, 124, 75, 31, 230, 73, 40, 102, 81, 236, 230, 83, 129, 255, 255, 255, 255, 255, 255, 255, 255 } DH Base: { 2 } Server DH Public Key: { 175, 205, 12, 228, 254, 147, 226, 208, 251, 177, 251, 164, 221, 7, 86, 201, 159, 194, 16, 176, 216, 9, 85, 212, 102, 40, 60, 40, 130, 69, 110, 33, 101, 11, 121, 221, 190, 59, 181, 183, 211, 132, 161, 204, 189, 13, 95, 208, 226, 189, 90, 190, 220, 130, 115, 177, 136, 229, 214, 175, 111, 55, 131, 73, 108, 161, 125, 136, 37, 131, 152, 78, 230, 74, 202, 90, 254, 27, 170, 184, 91, 213, 136, 52, 133, 133, 199, 230, 216, 70, 242, 26, 3, 127, 66, 126, 158, 217, 59, 120, 71, 169, 70, 199, 6, 144, 57, 132, 41, 151, 150, 58, 56, 77, 243, 160, 58, 43, 87, 32, 12, 239, 117, 109, 21, 171, 64, 160 } Signature Algorithm SHA256withRSA Signed with a DSA or RSA public key *** ServerHelloDone https-jsse-nio-8443-exec-1, WRITE: TLSv1.2 Handshake, length = 1697 234https-jsse-nio-8443-exec-7, WRITE: TLSv1.2 Handshake, length = 40 https-jsse-nio-8443-exec-5, READ: TLSv1.2 Handshake, length = 134 %% Cached server session: [Session-38, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384] https-jsse-nio-8443-exec-4, READ: TLSv1.2 Handshake, length = 134 *** ClientKeyExchange, DH DH Public key: { , 164, 16, 57, 201, 221, 241, 201, 31, 60, 202, 146, 21634, 253, 60, 49, 250, 225, 172, 233, 239, 114, 40, 187, 55, 195, 222, 104, 18, 179, 64, 187, 27, 184, 163, 175, 26, 69, 227, 126, 92, 139, 143, 214, 60, 250, 58, 48, 193, 78, 80, 28, 191, 20, 201, 90, 29, 221, 16, 68, 68, 156, 123, 14, 186, 162, 83, 144, 147, 12, 138, 248, 7, 183, 74, 234, 160, 246, 77, 43, 118, 131, 25, 201, 102, 86, 195, 202, 221, 246, 89, 104, 59, 153, 91, 19, 101, 120, 138, 49, 25, 7, 194, 81, 175, 74, 79, 111, 224, 236, 204, 126, 7, 135, 73, 135, 212, 23, 119, 84, 36, 32, 77, 157, 35, 87, 156, 218, 114, 125, 71, 211, 97, 199, 110, 85, 247, 212, 72, 255 } https-jsse-nio-8443-exec-9, WRITE: TLSv1.2 Application Data, length = 83 SESSION KEYGEN: PreMaster Secret: 0000: 3F 3A F5 E1 EF C6 4D 43 60 6A F2 34 41 8A B5 23 ?:....MC`j.4A..# 0010: D8 80 28 4F 1B F1 B2 28 8D 90 42 B5 F7 CF B4 E7 ..(O...(..B..... 0020: 4B F3 8E 1C 55 FD 58 70 62 63 8A 77 6C CB 31 8C K...U.Xpbc.wl.1. 0030: FC 04 5D A0 80 2F 44 B2 67 F8 FD 6B F1 CB 90 9C ..]../D.g..k.... 0040: E9 8F 31 01 82 EC 67 E0 D5 A1 B9 85 4B CD C3 DF ..1...g.....K... 0050: EB 22 B3 62 44 9C 43 2C 14 45 B0 36 EF 43 45 9A .".bD.C,.E.6.CE. 0060: 96 17 59 B7 62 76 2A 07 52 4E 30 F4 F7 F5 96 AB ..Y.bv*.RN0..... 0070: F3 4E 62 21 A3 DB 03 D2 F0 A3 4A 33 26 A6 8A B2 .Nb!......J3&... CONNECTION KEYGEN: Client Nonce: 0000: 15 DB 28 C4 D2 30 CE F8 F7 84 21 D7 54 1D 81 89 ..(..0....!.T... 0010: 30 E2 F6 26 93 DA E3 03 C0 46 F6 FB 66 1A 89 2A 0..&.....F..f..* Server Nonce: 0000: 5C 7D 0F FB 70 BA DC 0E 5C 1C FE 79 04 44 0E 4E \...p...\..y.D.N 0010: 03 99 97 AD FE AB A9 DD EB 49 24 92 43 1B DB FB .........I$.C... Master Secret: 0000: 59 EF B5 03 B1 A8 35 98 E4 25 77 22 A9 76 24 97 Y.....5..%w".v$. 0010: 08 36 47 18 DB 87 DA B9 C1 BE DE 59 4D D0 3A BD .6G........YM.:. 0020: 28 89 CD 4F F0 5C 0F 45 44 A8 43 31 D1 12 9F 7F (..O.\.ED.C1.... ... no MAC keys used for this cipher Client write key: 0000: 0B 87 EB CA 1E 5E 46 0B D5 7B 3E 9F DE AD F4 01 .....^F...>..... 0010: FB 61 B3 E0 13 98 C2 2A 5D 9F AD 55 61 57 D6 A3 .a.....*]..UaW.. Server write key: 0000: 97 09 A1 29 D1 44 3D 6A 1D A1 D2 B7 32 A8 60 51 ...).D=j....2.`Q 0010: 52 7A 3D 53 8C D8 40 B7 BC 0D 21 DA 01 D0 83 D9 Rz=S..@...!..... Client write IV: 0000: 36 0C 41 4F 6.AO Server write IV: 0000: 7E 87 74 5B ..t[ Using SSLEngineImpl. Allow unsafe renegotiation: false Allow legacy hello messages: true Is initial handshake: true Is secure renegotiation: false Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1.1 https-jsse-nio-8443-exec-9, READ: TLSv1.2 Alert, length = 26 https-jsse-nio-8443-exec-6, READ: TLSv1 Handshake, length = 512 *** ClientHello, TLSv1.2 RandomCookie: GMT: -76821081 bytes = { 221, 119, 215, 111, 10, 138, 168, 23, 27, 166, 199, 175, 21, 43, 107, 64, 48, 253, 198, 31, 212, 140, 20, 237, 136, 44, 170, 189 } Session ID: {92, 125, 15, 251, 90, 198, 138, 52, 9, 18, 162, 17, 164, 113, 131, 184, 23, 228, 183, 72, 242, 145, 57, 97, 33, 105, 168, 157, 166, 45, 229, 203} Cipher Suites: [Unknown 0x13:0x2, Unknown 0x13:0x3, Unknown 0x13:0x1, Unknown 0x13:0x4, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa9, Unknown 0xc0:0xad, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0xac, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa8, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xc0:0x9d, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9c, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xaa, Unknown 0xc0:0x9f, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9e, TLS_DHE_RSA_WITH_AES_128_CBC_SHA] Compression Methods: { 0 } Unsupported extension status_request, data: 01:00:00:00:00 Extension elliptic_curves, curve names: {secp256r1, secp384r1, secp521r1, unknown curve 29, unknown curve 256, unknown curve 257, unknown curve 258, unknown curve 259, unknown curve 260} Extension ec_point_formats, formats: [uncompressed] Extension signature_algorithms, signature_algorithms: SHA256withRSA, Unknown (hash:0x8, signature:0x9), Unknown (hash:0x8, signature:0x4), SHA256withECDSA, Unknown (hash:0x8, signature:0x7), SHA384withRSA, Unknown (hash:0x8, signature:0xa), Unknown (hash:0x8, signature:0x5), SHA384withECDSA, SHA512withRSA, Unknown (hash:0x8, signature:0xb), Unknown (hash:0x8, signature:0x6), SHA512withECDSA, SHA1withRSA, SHA1withECDSA Unsupported extension type_35, data: Unsupported extension type_51, data: 00:69:00:17:00:41:04:2b:27:d0:be:58:d4:99:84:63:14:f7:cc:ca:2f:89:91:82:96:9c:9a:70:42:7e:29:a1:93:11:81:ee:21:ff:1b:8d:64:d4:9d:4d:da:60:ec:d4:0c:38:06:92:73:88:fc:a8:ac:6a:e3:ce:d5:59:78:2a:f0:e0:4c:23:56:df:c2:00:1d:00:20:87:89:7a:26:9e:01:de:cb:3e:f0:1a:b9:82:0c:b1:e3:6f:99:05:e2:bb:52:96:af:34:f7:d9:eb:a4:cb:9d:0e Unsupported extension type_43, data: 08:03:04:03:03:03:02:03:01 Extension renegotiation_info, renegotiated_connection: <empty> Extension server_name, server_name: [type=host_name (0), value=localhost] Unsupported extension type_45, data: 02:01:00 Unsupported extension type_28, data: 40:00 Unsupported extension type_21, data: 00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00 *** %% Initialized: [Session-43, SSL_NULL_WITH_NULL_NULL] *** ClientKeyExchange, DH DH Public key: { 234, 135, 194, 219, 221, 7, 16, 79, 39, 160, 241, 38, 109, 35, 11, 20, 30, 43, 227, 159, 59, 109, 3, 144, 125, 239, 158, 126, 126, 115, 241, 23, 133, 134, 39, 111, 221, 71, 223, 232, 85, 151, 211, 7, 138, 13, 41, 187, 187, 13, 154, 84, 88, 208, 18, 47, 172, 237, 0, 69, 112, 109, 90, 232, 91, 197, 103, 55, 233, 153, 206, 155, 196, 39, 79, 51, 66, 242, 177, 198, 35, 117, 17, 222, 149, 173, 185, 80, 96, 135, 166, 155, 82, 154, 154, 183, 73, 107, 255, 96, 124, 143, 11, 96, 39, 157, 186, 51, 72, 127, 195, 180, 123, 58, 229, 149, 129, 227, 65, 251, 96, 149, 62, 121, 203, 79, 60, https-jsse-nio-8443-exec-9, RECV TLSv1.2 ALERT: warning, close_notify 119 } https-jsse-nio-8443-exec-10, READ: TLSv1.2 Handshake, length = 134 https-jsse-nio-8443-exec-8, WRITE: TLSv1.2 Application Data, length = 84 , 1, 204, 197, 144, 17, 200, 187, 10, 162, 20, 13, 69, 87, 237, 85, 184, 66, 237, 79, 90, 5, 182, 71, 47, 57, 56, 28, 237, 197, 134, 10, 91, 244, 25, 76, 16, 194, 160, 228, 54, 42, 102, 43, 198, 99, 49 } Signature Algorithm SHA256withRSA Signed with a DSA or RSA public key *** ServerHelloDone https-jsse-nio-8443-exec-2, WRITE: TLSv1.2 Handshake, length = 1697 https-jsse-nio-8443-exec-5, READ: TLSv1.2 Change Cipher Spec, length = 1 Standard ciphersuite chosen: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 %% Negotiating: [Session-43, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384] *** ServerHello, TLSv1.2 RandomCookie: GMT: 1551699708 bytes = { 92, 201, 66, 245, 51, 252, 61, 225, 9, 107, 118, 157, 173, 237, 7, 102, 85, 125, 187, 141, 165, 192, 181, 90, 106, 234, 157, 84 } Session ID: https-jsse-nio-8443-exec-9, closeInboundInternal() {92, 125, 15, 252, 19, 214, 68, 173, 215, 94, 242, 244, 106, 89, 60, 143, 196, 61, 45, 39, 102, 192, 180, 151, 1, 59, 107, 169, 236, 99, 108, 99} Cipher Suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 Compression Method: 0 Extension renegotiation_info, renegotiated_connection: <empty> *** Cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 *** Certificate chain SESSION KEYGEN: PreMaster Secret: 0000: 04 A2 F1 6B EF 13 49 FB BB 1B 11 49 3E D6 CA 0D ...k..I....I>... 0010: 28 8A 15 81 3A 34 9A 0E CA 8C D3 04 78 18 40 36 (...:4......x.@6 0020: 11 9E C3 46 74 3C 89 0B 7E AC FA 87 3B 18 B3 F1 ...Ft<......;... 0030: 28 F8 87 C6 6E Using SSLEngineImpl. https-jsse-nio-8443-exec-5, READ: TLSv1.2 Handshake, length = 40 Allow unsafe renegotiation: false Allow legacy hello messages: true Is initial handshake: true Is secure renegotiation: false Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1.1 https-jsse-nio-8443-exec-7, READ: TLSv1 Handshake, length = 512 *** ClientHello, TLSv1.2 RandomCookie: GMT: 2008224124 bytes = { 3, 113, 189, 168, 252, 125, 206, 82, 1, 164, 60, 1, 7, 61, 250, 21, 249, 167, 222, 191, 218, 38, 61, 96, 164, 237, 242, 241 } Session ID: {92, 125, 15, 251, 81, 53, 15, 29, 214, 99, 168, 187, 1, 61, 35, 114, 128, 66, 29, 32, 85, 113, 210, 152, 168, 201, 72, 85, 116, 212, 176, 100} Cipher Suites: [Unknown 0x13:0x2, Unknown 0x13:0x3, Unknown 0x13:0x1, Unknown 0x13:0x4, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa9, Unknown 0xc0:0xad, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0xac, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa8, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xc0:0x9d, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9c, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xaa, Unknown 0xc0:0x9f, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9e, TLS_DHE_RSA_WITH_AES_128_CBC_SHA] Compression Methods: { 0 } Unsupported extension status_request, data: 01:00:00:00:00 Extension elliptic_curves, curve names: {secp256r1, secp384r1, secp521r1, unknown curve 29, unknown curve 256, unknown curve 257, unknown curve 258, unknown curve 259, unknown curve 260} Extension ec_point_formats, formats: [uncompressed] Extension signature_algorithms, signature_algorithms: SHA256withRSA, Unknown (hash:0x8, signature:0x9), Unknown (hash:0x8, signature:0x4), SHA256withECDSA, Unknown (hash:0x8, signature:0x7), SHA384withRSA, Unknown (hash:0x8, signature:0xa), Unknown (hash:0x8, signature:0x5), SHA384withECDSA, SHA512withRSA, Unknown (hash:0x8, signature:0xb), Unknown (hash:0x8, signature:0x6), SHA512withECDSA, SHA1withRSA, SHA1withECDSA Unsupported extension type_35, data: Unsupported extension type_51, data: 00:69:00:17:00:41:04:a7:c9:d7:23:aa:6b:c2:61:6f:3e:27:69:19:1c:db:f3:1b:d8:d0:d7:8c:97:9b:80:a7:6e:3e:04:df:2a:6f:d8:dc:4e:86:6b:ef:38:1a:7a:cc:2c:ea:ae:7a:80:31:18:ec:0a:88:e5:50:f9:15:a1:bd:5d:26:25:f0:fc:4c:6b:00:1d:00:20:cc:54:1a:96:10:58:1d:93:8b:70:19:8a:1e:70:28:76:cb:72:7e:32:07:6c:c5:ce:8d:98:5e:78:78:17:90:16 Unsupported extension type_43, data: 08:03:04:03:03:03:02:03:01 Extension renegotiation_info, renegotiated_connection: <empty> https-jsse-nio-8443-exec-1, READ: TLSv1.2 Alert, length = 26 https-jsse-nio-8443-exec-1, RECV TLSv1.2 ALERT: warning, close_notify https-jsse-nio-8443-exec-1, closeInboundInternal() https-jsse-nio-8443-exec-1, closeOutboundInternal() https-jsse-nio-8443-exec-1, SEND TLSv1.2 ALERT: warning, description = close_notify https-jsse-nio-8443-exec-1, WRITE: TLSv1.2 Alert, length = 26 https-jsse-nio-8443-exec-1, called closeOutbound() https-jsse-nio-8443-exec-1, closeOutboundInternal() *** ClientKeyExchange, DH DH Public key: { 104, 42, 185, 126, 28, 217, 163, 126, 163, 130, 68, 198, 53, 22, 139, 219, 174, 187, 225, 232, 168, 157, 116, 149, 100, 30, 134, 63, 9, 126, 26, 145, 33, 197, 107, 119, 10, 133, 160, 25, 86, 7, 4, 224, 81, 7, 225, 6, 118, 217, 180, 37, 60, 35, 195, 10, 148, 247, 51, 207, 34, 243, 188, 21, 189, 206, 171, 56, 81, 84, 142, 63, 111, 84, 231, 136, 178, 21, 63, 1, 120, 63, 228, 142, 110, 232, 24, D158, 10, 11, 26, chain [0] = [ [ Version: V3 Subject: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5 Key: Sun RSA public key, 2048 bits modulus: 21944740401167172627731583459321030363948627215746053925732477915060915436180167456469785746662093119306577380200747716284652995937004530444336851845029170241627465854006145050037178991946925696078563485570896673835545540824265905937881682387179314987285174428010940266412458943894800978345731524307952507729956745301047871771953945124256516782917326981125087548987889540650149121302888872237484100834740328828765018090383963294418357028839734723410564800765871733483849269364796949055153420777966213779145518299141217288017794394762274753999989298548507425930217302947589819396239489846633419099079578249651345685751 public exponent: 65537 Validity: [From: Fri May 30 08:43:19 GMT 2014, To: Mon May 27 08:43:19 GMT 2024] Issuer: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US SerialNumber: [ a6ef7a9a 5368eb27] Certificate Extensions: 3 [1]: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: 78 0D 96 9D FE D3 0B BE 8C C7 E3 EC 67 04 AB 4B x...........g..K 0010: EA E0 00 29 ...) ] ] [2]: ObjectId: 2.5.29.19 Criticality=false BasicConstraints:[ CA:true PathLen:2147483647 ] [3]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 78 0D 96 9D FE D3 0B BE 8C C7 E3 EC 67 04 AB 4B x...........g..K 0010: EA E0 00 29 ...) ] ] ] Algorithm: [SHA1withRSA] Signature: 0000: 19 16 5A 21 99 21 24 98 3C 0A E8 D8 00 AB 44 24 ..Z!.!$.<.....D$ 0010: F2 0C B7 83 D5 9F 96 17 87 E2 1F 1D A3 47 68 C7 .............Gh. 0020: 68 4A CB 56 0E 77 2B E8 1A 9F E7 09 A1 19 77 D0 hJ.V.w+.......w. 0030: 5E CC C1 B3 9A C4 35 3D CB E0 A5 A6 43 5D A3 26 ^.....5=....C].& 0040: A4 91 8A C1 FA 7B 10 EA DC C3 C7 1C 47 DC 97 32 ............G..2 0050: C0 37 80 1C F1 42 10 E3 74 17 FA 3E 60 4A B7 59 .7...B..t..>`J.Y 0060: 92 C1 E0 6F BB F1 BB 9F 82 89 B5 83 D5 AE 1E 90 ...o............ 0070: 0A 89 8D FB 4C C0 C5 9E DC C5 8C C6 2F EE D9 B4 ....L......./... 0080: 95 47 27 2E BE 82 31 6F 76 C0 DB 4C C8 0D 3B 7B .G'...1ov..L..;. 0090: D1 6A BF BD 3B 93 30 04 A2 9E 81 F7 96 28 77 F2 .j..;.0......(w. 00A0: 32 05 68 44 1F B3 30 CE 40 9F 20 F3 B4 2B AA E6 2.hD..0.@. ..+.. 00B0: 40 9B FB 7F 34 6E 3A 99 FD F8 28 F1 8C 9B 56 34 @...4n:...(...V4 00C0: 64 AD 4D 56 39 CB 96 18 50 9B 99 43 80 0A 39 A5 d.MV9...P..C..9. 00D0: 13 7A 6E C5 25 E0 95 4A 92 E5 A8 8B EE 03 49 B4 .zn.%..J......I. 00E0: D9 7C 00 E3 F0 3B A7 BA 40 30 CC 89 55 C6 97 93 .....;..@0..U... 00F0: B5 15 F6 62 D3 B1 74 9C 0B 80 2B 8A D4 03 84 A0 ...b..t...+..... ] *** https-jsse-nio-8443-exec-9, closeOutboundInternal() 223, 76, 73, 55, 162, 254, 112, 250, 181, 203, 137, 31, 209, 13, 68, 176, 106, 49, 128, 208, 236, 54, 140, 20, 225, 108, 93, 143, 102, 190, 56, 139, 73, 156, 56, 21C, 180 } Extension server_name, server_name: [type=host_name (0), value=localhost] Unsupported extension type_45, data: 02:01:00 Unsupported extension type_28, data: 40:00 Unsupported extension type_21, data: 00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00 *** %% Initialized: [Session-44, SSL_NULL_WITH_NULL_NULL] SESSION KEYGEN: PreMaster Secret: 0000: 58 B5 34 F1 96 DF 9C 97 CA E8 CE B2 72 6D D4 AE X.4.........rm.. 0010: AB 0A 3C 91 C4 C5 55 42 0C 50 2B 5E B7 DC 10 69 ..<...UB.P+^...i 0020: 9C C4 B4 E3 76 0A F0 FC DE 26 C6 2F 44 7B 53 60 ....v....&./D.S` 0030: 34 89 8F 90 ED DF 1A 91 20 EF E4 36 C5 97 E5 4A 4....... ..6...J 0040: FC AE C1 9A C0 5B C0 E1 C1 D9 9F D8 F2 12 36 DF .....[........6. 0050: EB 79 01 9F 3C 96 69 6E BF 39 9F B4 E5 1A 5D B0 .y..<.in.9....]. 0060: 9F 7C 1C 41 F1 04 C9 46 9A B4 13 7B 4B 41 3B 01 ...A...F....KA;. 0070: 31 3D FB 33 A8 CB 5E 52 84 90 AE 34 81 44 38 D0 1=.3..^R...4.D8. CONNECTION KEYGEN: Client Nonce: 0000: 6F 71 47 9D E7 AA 9F F1 04 05 B6 B8 59 C6 CF FD oqG.........Y... 0010: 57 AF 6D E8 5F E0 FD 6C 6D EB 8A B0 D3 77 46 B7 W.m._..lm....wF. Server Nonce: 0000: 5C 7D 0F FB AB 19 D3 1B 05 67 A6 BF 87 50 5D D1 \........g...P]. 0010: 2B 08 1F 76 96 68 AD B7 06 B6 B6 CF A2 69 B4 09 +..v.h.......i.. Master Secret: 0000: D5 FC 3E C8 D7 85 17 C4 55 B5 FA 7A EE 54 3A DB ..>.....U..z.T:. 0010: 2D D9 58 E8 90 F4 62 F3 52 45 A5 BA 44 3C FD 86 -.X...b.RE..D<.. 0020: 91 E2 51 F3 F5 F1 39 FF E4 29 7E 07 F7 58 BF F4 ..Q...9..)...X.. ... no MAC keys used for this cipher Client write key: 0000: 5D 68 46 49 C6 CE 06 D9 6E C4 A9 30 BF 7C 69 1C ]hFI....n..0..i. 0010: BF 7B 53 93 5E AF 8F FB 44 34 8A B8 8C 0E 0B 2F ..S.^...D4...../ Server write key: 0000: E8 C9 EE EF CA AF 68 00 8C FD 90 45 00 46 AF 99 ......h....E.F.. 0010: B5 59 9F 24 03 22 3D 39 36 E2 3F FE 75 AF BF 38 .Y.$."=96.?.u..8 Client write IV: 0000: 2F C5 14 23 /..# Server write IV: 0000: BF E4 73 E4 ..s. *** Finished verify_data: { https-jsse-nio-8443-exec-2, READ: TLSv1.2 Handshake, length = 134 127, 96, *** ClientKeyExchange, DH DH Public key: { 206, 182, 67, 65, 140, 162, 245, 19, 40, 222, 127, 152, 0, 151, 182, 139, 67, 163, 219, 141, 105, 155, 164, 184, 251, 111, 26, 219, 217, 80, 224, 91, 0, 215, 10, 199, 34, 97, 153, 52, 149, 153, 220, 239, 28, 70, 68, 251, 36, 15, 123, 245, 37, 229, 129, 22, 160, 94, 165, 173, 231, 231, 85, 150, 148, 3, 197, 50, 34, 16, 98, 235, 123, 192, 137, 23, 78, 170, 33, 189, 8, 168, 114, 109, 112, 171, 243, 151, 247, 52, 161, 110, 194, 211, 221, 188, 146, 98, 199, 117, 42, 160, 128, 48, 161, 74, 13, 180, 227, 212, 158, 125, 229, 141, 44, 129, 91, 78, 140, 165, 25, 156, 132, 39, 110, 125, 139, 27 } *** Diffie-Hellman ServerKeyExchange Standard ciphersuite chosen: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 %% Negotiating: [Session-44, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384] *** ServerHello, TLSv1.2 RandomCookie: GMT: 1551699708 bytes = { 2, 89, 220, 53, 90, 25, 24, 125, 153, 134, 76, 66, 90, 125, 223, 107, 55, 114, 158, 15, 76, 222, 51, 248, 81, 54, 35, 201 } Session ID: {92, 125, 15, 252, 234, 204, 123, 235, 67, 243, 96, 187, 84, 218, 173, 244, 61, 229, 178, 106, 19, 103, 107, 48, 66, 207, 204, 66, 173, 235, 169, 79} Cipher Suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 Compression Method: 0 Extension renegotiation_info, renegotiated_connection: <empty> *** Cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 *** Certificate chain SESSION KEYGEN: PreMaster Secret: 0000: 93 6C 77 AA E4 00 EE EA 31 0A 96 31 52 48 8A 10 .lw.....1..1RH.. 0010: 2C 0D E7 29 85 0E 40 03 49 74 F0 F0 22 FA 1D 03 ,..)..@.It.."... 0020: 46 25 9B 9E 2D 5A 9D DB 14 D6 25 E9https-jsse-nio-8443-exec-9, SEND TLSv1.2 ALERT: warning, description = close_notify DH Modulus: { 255, 255, 255, 255, 255, 255, 255, 255, 201, 15, 218, 162, 33, 104, 194, 52, 196, 198, 98, 139, 128, 220, 28, 209, 41, 2, 78, 8, 138, 103, 204, 116, 2, 11, 190, 166, 59, 19, 155, 34, 81, 74, 8, 121, 142, 52, 4, 221, 239, 149, 25, 179, 205, 58, 67, 27, 48, 43, 10, 109, 242, 95, 20, 55, 79, 225, 53, 109, 109, 81, 194, 69, 228, 133, 181, 118, 98, 94, 126, 198, 244, 76, 66, 233, 166, 55, 237, 107, 11, 255, 92, 182, 244, 6, 183, 237, 238, 56, 107, 251, 90, 137, 159, 165, 174, 159, 36, 17, 124, 75, 31, 230, 73, 40, 102, 81, 236, 230, 83, 129, 255, 255, 255, 255, 255, 255, 255, 255 } chain [0] = [ [ Version: V3 Subject: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5 Key: Sun RSA public key, 2048 bits modulus: 21944740401167172627731583459321030363948627215746053925732477915060915436180167456469785746662093119306577380200747716284652995937004530444336851845029170241627465854006145050037178991946925696078563485570896673835545540824265905937881682387179314987285174428010940266412458943894800978345731524307952507729956745301047871771953945124256516782917326981125087548987889540650149121302888872237484100834740328828765018090383963294418357028839734723410564800765871733483849269364796949055153420777966213779145518299141217288017794394762274753999989298548507425930217302947589819396239489846633419099079578249651345685751 public exponent: 65537 Validity: [From: Fri May 30 08:43:19 GMT 2014, To: Mon May 27 08:43:19 GMT 2024] Issuer: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US SerialNumber: [ a6ef7a9a 5368eb27] Certificate Extensions: 3 [1]: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: 78 0D 96 9D FE D3 0B BE 8C C7 E3 EC 67 04 AB 4B x...........g..K 0010: EA E0 00 29 ...) ] ] [2]: ObjectId: 2.5.29.19 Criticality=false BasicConstraints:[ CA:true PathLen:2147483647 ] [3]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 78 0D 96 9D FE D3 0B BE 8C C7 E3 EC 67 04 AB 4B x...........g..K 0010: EA E0 00 29 ...) ] ] ] Algorithm: [SHA1withRSA] Signature: 0000: 19 16 5A 21 99 21 24 98 3C 0A E8 D8 00 AB 44 24 ..Z!.!$.<.....D$ 0010: F2 0C B7 83 D5 9F 96 17 87 E2 1F 1D A3 47 68 C7 .............Gh. 0020: 68 4A CB 56 0E 77 2B E8 1A 9F E7 09 A1 19 77 D0 hJ.V.w+.......w. 0030: 5E CC C1 B3 9A C4 35 3D CB E0 A5 A6 43 5D A3 26 ^.....5=....C].& 0040: A4 91 8A C1 FA 7B 10 EA DC C3 C7 1C 47 DC 97 32 ............G..2 0050: C0 37 80 1C F1 42 10 E3 74 17 FA 3E 60 4A B7 59 .7...B..t..>`J.Y 0060: 92 C1 E0 6F BB F1 BB 9F 82 89 B5 83 D5 AE 1E 90 ...o............ 0070: 0A 89 8D FB 4C C0 C5 9E DC C5 8C C6 2F EE D9 B4 ....L......./... 0080: 95 47 27 2E BE 82 31 6F 76 C0 DB 4C C8 0D 3B 7B .G'...1ov..L..;. 0090: D1 6A BF BD 3B 93 30 04 A2 9E 81 F7 96 28 77 F2 .j..;.0......(w. 00A0: 32 05 68 44 1F B3 30 CE 40 9F 20 F3 B4 2B AA E6 2.hD..0.@. ..+.. 00B0: 40 9B FB 7F 34 6E 3A 99 FD F8 28 F1 8C 9B 56 34 @...4n:...(...V4 00C0: 64 AD 4D 56 39 CB 96 18 50 9B 99 43 80 0A 39 A5 d.MV9...P..C..9. 00D0: 13 7A 6E C5 25 E0 95 4A 92 E5 A8 8B EE 03 49 B4 .zn.%..J......I. 00E0: D9 7C 00 E3 F0 3B A7 BA 40 30 CC 89 55 C6 97 93 .....;..@0..U... 00F0: B5 15 F6 62 D3 B1 74 9C 0B 80 2B 8A D4 03 84 A0 ...b..t...+..... ] *** 36 B0 8B B1 20 B6 85 DE 96 BA (...n.6... ..... 0040: 42 E5 20 06 26 06 C7 58 C3 F5 E6 6B B7 7F 31 F5 B. .&..X...k..1. 0050: 5D 89 9B C7 DD 78 25 58 79 81 61 03 E0 7A 41 4B ]....x%Xy.a..zAK 0060: 1F 02 79 24 6B E7 86 CD 0E CF A4 06 BA 8E 44 3F ..y$k.........D? 0070: B6 D3 3B 09 E1 82 F2 3C 9E A0 D5 B3 9B 7B 64 C8 ..;....<......d. CONNECTION KEYGEN: Client Nonce: 0000: 26 21 F5 EF 7B CA E8 CF 66 C7 1B E8 8D 2C 1D AF &!......f....,.. 0010: 91 31 93 36 8C 32 95 0A FF 43 FC 8C B6 46 D9 4A .1.6.2...C...F.J Server Nonce: 0000: 5C 7D 0F FB E1 4A 6A 34 BF 8D 1D 60 79 64 9C 3F \....Jj4...`yd.? 0010: D1 D8 9B 88 B4 23 04 AF AD AF BF BD B4 0F D9 B8 .....#.......... Master Secret: 0000: A3 3E F7 50 B8 0F B7 0E F8 12 47 3B 10 06 F7 3E .>.P......G;...> 0010: D9 7D 51 E3 C7 40 6A 87 1A F8 4C E8 DA BE A1 58 ..Q..@j...L....X 0020: 60 45 EB 18 B9 AD 92 31 4D 5B 97 65 16 E1 9B CC `E.....1M[.e.... ... no MAC keys used for this cipher Client write key: 0000: 13 CE 12 82 E2 D2 20 05 A7 6C F9 05 09 4F F7 03 ...... ..l...O.. 0010: 55 90 B9 76 63 72 A2 7C DB D8 B3 7C 76 CE 73 33 U..vcr......v.s3 Server write key: 0000: C4 90 B5 D2 FE 96 9B 28 CE 81 4C 84 59 F9 14 F7 .......(..L.Y... 0010: 51 C5 EF D6 CF DD 93 DA 7A F1 3F 1C 1F ED BE 7D Q.......z.?..... Client write IV: 0000: 47 D6 D2 C3 G... Server write IV: 0000: FE AF 47 2F ..G/ 94, 28, 1, 49, https-jsse-nio-8443-exec-4, READ: TLSv1.2 Change Cipher Spec, length = 1 https-jsse-nio-8443-exec-10, READ: TLSv1.2 Change Cipher Spec, length = 1 23, 3, 240, 6, 123, 78 } *** *** Diffie-Hellman ServerKeyExchange DH Modulus: { 255, 255, 255, 255, 255, 255, 255, 255, 201, 15, 218, 162, 33, 104, 194, 52, 196, 198, 98, 139, 128, 220, 28, 209, 41, 2, 78, 8, 138, 4103, 204, 116, 2, 11DH Base: { 2https-jsse-nio-8443-exec-9, WRITE: TLSv1.2 Alert, length = 26 } https-jsse-nio-8443-exec-4, READ: TLSv1.2 Handshake, length = 40 , 190, 166, 59, 19, 155, 34, 81, 74, 8, 121, 142, 52, 4, 221, 239, 149, 25, 179, 205, 58, 67, 27, 48, 43, 10, 109, 242, 95, 20, 55, 79, 225, 53, 109, 109, 81, 194, 69, 228, 133, 181, 118, 98, 94, 126, 198, 244, 76, 66, 233, 166, 55, 237, 107, 11, 255, 92, 182, 244, 6, 183, 237, 238, 56, 107, 251, 90, 137, 159, 165, 174, 159, 36, 17, 124, 75, 31, 230, 73, 40, 102, 81, 236, 230, 83, 129, 255, 255, 255, 255, 255, 255, 255, 255 } DH Base: { 2 } Server DH Public Key: { 227, 145, 75, 188, 171, 64, 39, 159, 206, 143, 64, 37, 215, 148, 172, 121, 196, 139, 45, 177, 14, 234, 21, 216, 136, 202, 5, 95, 160, 181, 63, 31, 209, 136, 3E, 232, 97, 193, 240, https-jsse-nio-8443-exec-5, WRITE: TLSv1.2 Change Cipher Spec, length = 1 https-jsse-nio-8443-exec-10, READ: TLSv1.2 Handshake, length = 40 *** Finished verify_data: { 249, 185, 203, 233, 207, 156, 155, 199, 24, 152, 156, 151 } *** 169, 105, 246, 230, 53, 213, 127, 106, 133, 86, 151, 132, 227, 240, 73, 33, 174, 24, 254, 42, 230, 101, 159, 59, 100, 59, 229, 132, 184, 93, 165, 125, 239, 226, 160, 126, 185, 28, 102, 131, 97, 83, 248, 168, 87, 45, 36, 181, 14, 222, 140, 25, 108, 99, 80, 56, 12, 238, 86, 209, 236, 54, 211, 142, 21, 33, 40, 97, 129, 4, 61, 156, 53, 243, 218, 227, 119, 235, 87, 212, 89, 140, 161, 231, 239, 3, 96, 16, 223 } Signature Algorithm SHA256withRSA Signed with a DSA or RSA public key *** ServerHelloDone https-jsse-nio-8443-exec-7, WRITE: TLSv1.2 Handshake, length = 1697 67 66 66 F%..-Z....%.Ngff 0030: 94https-jsse-nio-8443-exec-9, called closeOutbound() https-jsse-nio-8443-exec-9, closeOutboundInternal() *** Finished Server DH Public Key: { verify_data: { 208, B6 95 64 45 73 20 FA 1F F8 7E 60 D5 00 8A AF ...dEs ....`.... 0040https-jsse-nio-8443-exec-5, WRITE: TLSv1.2 Handshake, length = 40 *** Finished : 10 16 D7 F0 BB 94 16 45 31 3A E9 E3 2A B3 86 9E .......E1:..*... 0050: D8 8C D5 82 5F BE 10 21 9B 50 08 73 A2 52 12 72 119, 4, 119, 119, 172, 126, 147, 27, 84, 168, 240 } *** 23, 132, 175, 201, 186, 157, 226, 148, 44, 114, 85, 4, 247, 145, 125, 12, 241, 247, 173, 196, 193, 86, 134, 156, 13, 193, 134, 138, 133, 111, 222, 9, 121, 145, 165, 228, 234, 139, 243, 95, 135, 76, 84, 27, 117, 181, 196, 63, 190, 119, 246, 109, 12, 83, 196, 218, 66, 185, 163, 48, 234, 90, 180, 9, 179, 165, 99, 136, 245, 106, 244, 171, 156, 221, 190, 50, 30, 237, 20, 184, 32, 130, 172, 191, 44, 140, 204, 144, 6, 211, 77, 230, 16, 56, 7, 186, 247, 166, 92, 197, 210, 252, 27, 218, 69, 60, 253, 179, 132, 144, 230, 202, 51, 44, 106, 59, 46, 79, 202, 4, 207, 234, 72, 102, 138, 86, 3, 175 } https-jsse-nio-8443-exec-3, READ: TLSv1.2 Handshake, length = 134 Signature Algorithm SHA256withRSA Signed with a DSA or RSA public key https-jsse-nio-8443-exec-4, WRITE: TLSv1.2 Change Cipher Spec, length = 1 ...._..!.P.s.R.r 0060%% Cached server session: [Session-42, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384] verify_data: { 22, 186, 121, 234, 51, 122, 49, 10, 12, 233, 93, 54 } *** : https-jsse-nio-8443-exec-10, WRITE: TLSv1.2 Change Cipher Spec, length = 1 *** Finished *** ClientKeyExchange, DH DH Public key: { 251, 78, 247, 134, 52, 135, 202, 121, 126, 17, 32, 39, 101, 78, 144, 11, 126, 4, 241, 37, 174, 252, 1, 167, 162, 51, 2, 190, 233, 105, 183, 75, 3, 8, 186, 180, 200, 109, 190, 75, 116, 209, 231, 73, 33, 164, 20, 28, 227, 255, 96, *** Finished verify_data: { 216, 193, 112, 192, 26, 227, 20, 79, 245, 226, 46, 160 } *** *** ServerHelloDone verify_data: { 89, 24, 187, 126, 121, 57, 11, 4, 105, 44, 251, 100, 35, 240, 73, 243, 41, 120, 68, 110, 84, 46, 235, 28, 225, 140, 236, 16, 215, 170, 81, 11, 151, 124, 24, 48, 212, 137, 117, 172, 45, 65, 209, 101, 86, 19, 118, 46, 148, 251, 11, 41, 93, 204, 233, 204, https-jsse-nio-8443-exec-4, WRITE: TLSv1.2 Handshake, length = 40 %% Cached server session: [Session-39, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384] 884, 208, 70, 77, 250, 178, 109, 210, 102, 61, 94, 60, 5, 162, 119, 114, 106, 51, 194, 71, 182, 17, 152, 160 } https-jsse-nio-8443-exec-7, WRITE: TLSv1.2 Application Data, length = 84 SESSION KEYGEN: PreMaster Secret: 0000: 77 71 10 9B 16 A7 72 D5 4B 46 15 91 FC 36 E9 2A wq....r.KF...6.* 0010: 14 53 FC CE 62 29 5C 25 49 BC 64 A7 9F C7 65 1B .S..b)\%I.d...e. 0020: 90 5C 6D 9C 0C 02 40 F0 63 7B 3B FF E6 15 FF D1 .\m...@.c.;..... 0030: D9 81 DF 1D B1 18 CB 45 C1 B5 45 F0 8B C4 D2 F8 .......E..E..... 0040: CC 7B FC 97 86 D4 7B BA 20 E5 BE 62 E8 1E 0D B7 ........ ..b.... 0050: A8 EE E9 91 7E 87 84 54 A9 FC 5C 94 E9 C1 B2 0E .......T..\..... 0060: A9 B0 C8 5A 03 B6 95 3A 28 42 80 23 9E 51 CB 24 ...Z...:(B.#.Q.$ 0070: 03 30 59 4B BC 2D 1C 02 96 08 21 84 D2 02 DC 87 .0YK.-....!..... CONNECTION KEYGEN: Client Nonce: 0000: 78 B3 11 7C 03 71 BD A8 FC 7D CE 52 01 A4 3C 01 x....q.....R..<. 0010: 07 3D FA 15 F9 A7 DE BF DA 26 3D 60 A4 ED F2 F1 .=.......&=`.... Server Nonce: 0000: 5C 7D 0F FC 02 59 DC 35 5A 19 18 7D 99 86 4C 42 \....Y.5Z.....LB 0010: 5A 7D DF 6B 37 72 9E 0F 4C DE 33 F8 51 36 23 C9 Z..k7r..L.3.Q6#. Master Secret: 0000: 1F 0C B6 07 D0 0C BE 97 19 C0 61 85 E7 BB 70 D4 ..........a...p. 0010: E9 00 27 3F 07 B6 EF 25 60 55 6A EB E6 01 43 BF ..'?...%`Uj...C. 0020: A4 1F 38 84 01 8D 2B 69 F6 F5 17 D2 25 30 B5 73 ..8...+i....%0.s ... no MAC keys used for this cipher Client write key: 0000: 04 26 C7 40 2B 91 94 9A 5F E3 48 22 A7 32 CE 78 .&.@+..._.H".2.x 0010: 80 8D FB BA B7 B5 8C 17 BE C4 54 1D 3D 33 22 2E ..........T.=3". Server write key: 0000: D2 59 39 34 BF A4 F8 8D F3 F4 F7 0C D6 16 CD 2E .Y94............ 0010: 63 B5 38 DA 42 AB 08 77 1B FA 0D 94 B6 E0 70 15 c.8.B..w......p. Client write IV: 0000: 00 20 A6 29 . .) Server write IV: 0000: 5F E8 3E 96 _.>. https-jsse-nio-8443-exec-6, WRITE: TLSv1.2 Handshake, length = 1697 https-jsse-nio-8443-exec-3, READ: TLSv1.2 Change Cipher Spec, length = 1 https-jsse-nio-8443-exec-3, READ: TLSv1.2 Handshake, length = 40 *** Finished verify_data: { 63, 40, 245, 236, 219, 99, 153, 227, 15, 52, 210, 230 } *** https-jsse-nio-8443-exec-3, WRITE: TLSv1.2 Change Cipher Spec, length = 1 *** Finished verify_data: { 65, 113, 129, 65, 184, 77, 188, 181, 151, 47, 238, 155 } *** 50, 56, 158, 4, 196, 96, 118, 180, 12 } *** Using SSLEngineImpl. https-jsse-nio-8443-exec-5, READ: TLSv1.2 Alert, length = 26 https-jsse-nio-8443-exec-5, RECV TLSv1.2 ALERT: warning, close_notify https-jsse-nio-8443-exec-5, closeInboundInternal() https-jsse-nio-8443-exec-5, closeOutboundInternal() https-jsse-nio-8443-exec-5, SEND TLSv1.2 ALERT: warning, description = close_notify https-jsse-nio-8443-exec-5, WRITE: TLSv1.2 Alert, length = 26 https-jsse-nio-8443-exec-5, called closeOutbound() https-jsse-nio-8443-exec-5, closeOutboundInternal() D 5DAllow unsafe renegotiation: false Allow legacy hello messages: true Is initial handshake: true Is secure renegotiation: false EE EF 60 28 96 BE 23 B2 A3 75 15 CE 91 1A .]..`(..#..u.... 0070: D5 79 F0 56 90 E2 31 43 4F 21 BB 3A 3B CE DB 16 .y.V..1CO!.:;... Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1.1 CONNECTION KEYGEN: Client Nonce: 0000: 6C 8E C5 C7 85 74 CC 34 BC 81 00 19 FC 08 E2 C2 l....t.4........ 0010: AE 4E 55 0F 4D 06 74 87 1F 1D 02 C3 C6 3A F6 1C .NU.M.t......:.. Server Nonce: 0000: 5C 7D 0F FB 08 C1 C7 F9 51 70 C1 B4 DF AE 36 CB \.......Qp....6. 0010: 6A 5C 5B C3 3E 41 35 E7 6B A1 A0 7F 70 B7 57 18 j\[.>A5.k...p.W. Master Secret: 0000: 0B C4 2B 5A 74 E5 3F 8A 17 B5 FF F1 87 79 A8 F2 ..+Zt.?......y.. 0010: 2B BE F1 5B 6C 29 2D 63 21 84 3A 70 9E 14 82 D1 +..[l)-c!.:p.... 0020: 61 3A 43 80 E3 15 BB E2 FB C3 2D 45 BA BD 1B 3D a:C.......-E...= ... no MAC keys used for this cipher Client write key: 0000: 64 F5 5E 5A C7 91 5B 72 9A 04 C1 AF 2B 3E 15 75 d.^Z..[r....+>.u 0010: 4A 39 B6 B7 32 44 4E 2E 79 D9 5C E9 DE 0C 1F 1D J9..2DN.y.\..... Server write key: 0000: 58 3F 86 61 B0 5B BC 99 A4 9A CE EE 92 8E D3 B5 X?.a.[.......... 0010: 2D BA 61 8E B5 EF C6 CA E0 D2 37 C7 0A 8F 0F 9E -.a.......7..... Client write IV: 0000: AD FC AF 3C ...< Server write IV: 0000: 79 6F C2 93 yo.. https-jsse-nio-8443-exec-8, READ: TLSv1 Handshake, length = 512 https-jsse-nio-8443-exec-2, READ: TLSv1.2 Change Cipher Spec, length = 1 https-jsse-nio-8443-exec-2, READ: TLSv1.2 Handshake, length = 40 *** ClientHello, TLSv1.2 RandomCookie: GMT: -2035525656 bytes = { 27, 106, 98, 38, 185, 178, 202, 159, 0, 86, 85, 109, 100, 110, 143, 0, 2, 239, 7, 89, 254, 43, 91, 128, 123, 251, 89, 165 } Session ID: *** Finished verify_data: { 145, 159, 17, 239, 120, 200, 159, 115, 53, 241, 0, 184 } *** {92, 125, 15, 251, 44, 185, 151, 145, 221, 104, 60, 123, 177, 172, 19, 98, 90, 47, 34, 173, 71, 64, 78, 184, 231, 53, 85, 178, 140, 195, 200, 151} Cipher Suites: [Unknown 0x13:0x2, Unknown 0x13:0x3, Unknown 0x13:0x1, Unknown 0x13:0x4, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa9, Unknown 0xc0:0xad, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0xac, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa8, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xc0:0x9d, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9c, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xaa, Unknown 0xc0:0x9f, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9e, TLS_DHE_RSA_WITH_AES_128_CBC_SHA] Compression Methods: { 0 } https-jsse-nio-8443-exec-4, WRITE: TLSv1.2 Application Data, length = 84 https-jsse-nio-8443-exec-7, READ: TLSv1.2 Handshake, length = 134 https-jsse-nio-8443-exec-3, WRITE: TLSv1.2 Handshake, length = 40 %% Cached server session: [Session-44, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384] https-jsse-nio-8443-exec-10, WRITE: TLSv1.2 Handshake, length = 40 %% Cached server session: [Session-41, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384] https-jsse-nio-8443-exec-2, WRITE: TLSv1.2 Change Cipher Spec, length = 1 Unsupported extension status_request, data: 01:00:00:00:00 Extension elliptic_curves, curve names: {secp256r1, secp384r1, secp521r1, unknown curve 29, unknown curve 256, unknown curve 257, unknown curve 258, unknown curve 259, unknown curve 260} Extension ec_point_formats, formats: [uncompressed] Extension signature_algorithms, signature_algorithms: SHA256withRSA, Unknown (hash:0x8, signature:0x9), Unknown (hash:0x8, signature:0x4), SHA256withECDSA, Unknown (hash:0x8, signature:0x7), SHA384withRSA, Unknown (hash:0x8, signature:0xa), Unknown (hash:0x8, signature:0x5), SHA384withECDSA, SHA512withRSA, Unknown (hash:0x8, signature:0xb), Unknown (hash:0x8, signature:0x6), SHA512withECDSA, SHA1withRSA, SHA1withECDSA Unsupported extension type_35, data: Unsupported extension type_51, data: 00:69:00:17:00:41:04:aa:b9:4f:63:e1:3e:6f:a4:31:8b:22:f6:7a:f6:19:15:69:e0:34:95:dd:a2:18:99:72:95:6c:ea:32:80:10:8f:63:a6:3f:46:ec:41:4f:21:80:c0:a2:78:ea:14:ee:8e:86:36:f3:57:bc:5d:c1:93:e3:f6:e4:50:24:63:1b:7d:00:1d:00:20:de:82:7d:ab:bc:51:8f:cb:53:b3:99:40:0b:b1:cb:37:89:5f:11:2a:e5:ab:76:d3:52:c2:81:8b:46:f0:22:18 Unsupported extension type_43, data: 08:03:04:03:03:03:02:03:01 Extension renegotiation_info, renegotiated_connection: <empty> Extension server_name, server_name: [type=host_name (0), value=localhost] Unsupported extension type_45, data: 02:01:00 Unsupported extension type_28, data: 40:00 Unsupported extension type_21, data: 00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00 *** https-jsse-nio-8443-exec-4, READ: TLSv1.2 Alert, length = 26 https-jsse-nio-8443-exec-4, RECV TLSv1.2 ALERT: warning, close_notify https-jsse-nio-8443-exec-4, closeInboundInternal() https-jsse-nio-8443-exec-4, closeOutboundInternal() https-jsse-nio-8443-exec-4, SEND TLSv1.2 ALERT: warning, description = close_notify %% Initialized: [Session-45, SSL_NULL_WITH_NULL_NULL] https-jsse-nio-8443-exec-4, WRITE: TLSv1.2 Alert, length = 26 *** ClientKeyExchange, DH DH Public key: { 251, 127, 14, 237, 78, 181, 42, 59, 51, 87, 114, 96, 189, 102, 77, 48, 120, 147, 89, 255, 198, 144https-jsse-nio-8443-exec-4, called closeOutbound() https-jsse-nio-8443-exec-4, closeOutboundInternal() Using SSLEngineImpl. Allow unsafe renegotiation: false Allow legacy hello messages: true Is initial handshake: true Is secure renegotiation: false Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1.1 *** Finished verify_data: { 100, 155, 118, 191, 12, 193, 206, 247, 223, 190, 134, 102 } *** https-jsse-nio-8443-exec-2, WRITE: TLSv1.2 Handshake, length = 40 %% Cached server session: [Session-40, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384] https-jsse-nio-8443-exec-10, WRITE: TLSv1.2 Application Data, length = 85 https-jsse-nio-8443-exec-1, READ: TLSv1 Handshake, length = 512 *** ClientHello, TLSv1.2 RandomCookie: GMT: -1937946310 bytes = { 195, 26, 41, 129, 65, 164, 106, 98, 138, 108, 165, 35, 123, 51, 198, 185, 25, 149, 241, 217, 172, 232, 168, 66, 110, 179, 14, 3 } Session ID: {92, 125, 15, 251, 34, 200, 97, 53, 94, 126, 164, 133, 93, 172, 2, 80, 38, 156, 127, 228, 203, 64, 214, 130, 108, 157, 162, 222, 80, 232, 246, 175} , 247, 224, 16, 249, 148, 170, 44, 140, 175, 180, 138, 231, 125, 161, 26, 170, 118, 108, 248, 234, 157, 197, 196, 200, 247, 106, 206, 234, 88, 203, 167, 228, 140, 27, 228, 142, 138, 207, 84, 224, 246, 38, 126, 240, 227, 83, 90, 139, 215, 30, 74, 179, 236, 80, 243, 43, 1, 228, 33, 97, 216, 190, 242, 211, 161, 84, 1, 38, 96, 112, 33, 149, 157, 132, 79, 209, 136, 155, 3, 171, 187, 44, 180, 133, 232, 72, 104, 175, 24, 126, 127, 212, 17, 168, 212, 242, 251, 204, 105, 63, 173, 104, 121, 121, 242, 241 } Standard ciphersuite chosen: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 %% Negotiating: [Session-45, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384] *** ServerHello, TLSv1.2 RandomCookie: GMT: 1551699708 bytes = { 202, 158, 51, 83, 20, 200, 183, 210, 228, 94, 37, 79, 167, 249, 164, 37, 148, 33, 245, 81, 171, 200, 189, 101, 11, 46, 120, 255 } Session ID: {92, 125, 15, 252, 51, 87, 165, 165, 120, 110, 66, 38, 3, 40, 89, 19, 169, 125, 79, 184, 1, 165, 46, 1, 151, 77, 249, 14, 117, 90, 30, 141} Cipher Suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 Compression Method: 0 Extension renegotiation_info, renegotiated_connection: <empty> *** Cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 *** Certificate chain SESSION KEYGEN: PreMaster Secret: 0000: B2 D4 E2 DB 7B 22 AC 64 30 A4 60 41 01 66 39 9B .....".d0.`A.f9. 0010: 16chain [0] = [ [ Version: V3 Subject: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5 Key: Sun RSA public key, 2048 bits modulus: 21944740401167172627731583459321030363948627215746053925732477915060915436180167456469785746662093119306577380200747716284652995937004530444336851845029170241627465854006145050037178991946925696078563485570896673835545540824265905937881682387179314987285174428010940266412458943894800978345731524307952507729956745301047871771953945124256516782917326981125087548987889540650149121302888872237484100834740328828765018090383963294418357028839734723410564800765871733483849269364796949055153420777966213779145518299141217288017794394762274753999989298548507425930217302947589819396239489846633419099079578249651345685751 public exponent: 65537 Validity: [From: Fri May 30 08:43:19 GMT 2014, To: Mon May 27 08:43:19 GMT 2024] Issuer: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US SerialNumber: [ a6ef7a9a 5368eb27] Certificate Extensions: 3 [1]: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: 78 0D 96 9D FE D3 0B BE 8C C7 E3 EC 67 04 AB 4B x...........g..K 0010: EA E0 00 29 ...) ] ] [2]: ObjectId: 2.5.29.19 Criticality=false BasicConstraints:[ CA:true PathLen:2147483647 ] [3]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 78 0D 96 9D FE D3 0B BE 8C C7 E3 EC 67 04 AB 4B x...........g..K 0010: EA E0 00 29 ...) ] ] ] Algorithm: [SHA1withRSA] Signature: 0000: 19 16 5A 21 99 21 24 98 3C 0A E8 D8 00 AB 44 24 ..Z!.!$.<.....D$ 0010: F2 0C B7 83 D5 9F 96 17 87 E2 1F 1D A3 47 68 C7 .............Gh. 0020: 68 4A CB 56 0E 77 2B E8 1A 9F E7 09 A1 19 77 D0 hJ.V.w+.......w. 0030: 5E CC C1 B3 9A C4 35 3D CB E0 A5 A6 43 5D A3 26 ^.....5=....C].& 0040: A4 91 8A C1 FA 7B 10 EA DC C3 C7 1C 47 DC 97 32 ............G..2 0050: C0 37 80 1C F1 42 10 E3 74 17 FA 3E 60 4A B7 59 .7...B..t..>`J.Y 0060: 92 C1 E0 6F BB F1 BB 9F 82 89 B5 83 D5 AE 1E 90 ...o............ 0070: 0A 89 8D FB 4C C0 C5 9E DC C5 8C C6 2F EE D9 B4 ....L......./... 0080: 95 47 27 2E BE 82 31 6F 76 C0 DB 4C C8 0D 3B 7B .G'...1ov..L..;. 0090: D1 6A BF BD 3B 93 30 04 A2 9E 81 F7 96 28 77 F2 .j..;.0......(w. 00A0: 32 05 68 44 1F B3 30 CE 40 9F 20 F3 B4 2B AA E6 2.hD..0.@. ..+.. 00B0: 40 9B FB 7F 34 6E 3A 99 FD F8 28 F1 8C 9B 56 34 @...4n:...(...V4 00C0: 64 AD 4D 56 39 CB 96 18 50 9B 99 43 80 0A 39 A5 d.MV9...P..C..9. 00D0: 13 7A 6E C5 25 E0 95 4A 92 E5 A8 8B EE 03 49 B4 .zn.%..J......I. 00E0: D9 7C 00 E3 F0 3B A7 BA 40 30 CC 89 55 C6 97 93 .....;..@0..U... 00F0: B5 15 F6 62 D3 B1 74 9C 0B 80 2B 8A D4 03 84 A0 ...b..t...+..... ] *** Cipher Suites: [Unknown 0x13:0x2, Unknown 0x13:0x3, Unknown 0x13:0x1, Unknown 0x13:0x4, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa9, Unknown 0xc0:0xad, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0xac, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa8, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xc0:0x9d, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9c, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xaa, Unknown 0xc0:0x9f, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9e, TLS_DHE_RSA_WITH_AES_128_CBC_SHA] Compression Methods: { 0 } Unsupported extension status_request, data: 01:00:00:00:00 Extension elliptic_curves, curve names: {secp256r1, secp384r1, secp521r1, unknown curve 29, unknown curve 256, unknown curve 257, unknown curve 258, unknown curve 259, unknown curve 260} Extension ec_point_formats, formats: [uncompressed] Extension signature_algorithms, signature_algorithms: SHA256withRSA, Unknown (hash:0x8, signature:0x9), Unknown (hash:0x8, signature:0x4), SHA256withECDSA, Unknown (hash:0x8, signature:0x7), SHA384withRSA, Unknown (hash:0x8, signature:0xa), Unknown (hash:0x8, signature:0x5), SHA384withECDSA, SHA512withRSA, Unknown (hash:0x8, signature:0xb), Unknown (hash:0x8, signature:0x6), SHA512withECDSA, SHA1withRSA, SHA1withECDSA Unsupported extension type_35, data: Unsupported extension type_51, data: 00:69:00:17:00:41:04:c2:91:f6:07:69:fe:3f:ae:2f:54:9d:20:24:71:d2:51:d3:bb:58:fd:30:1d:b4:ee:f6:cc:72:de:16:8d:b7:13:72:65:0e:f5:4a:02:5f:69:8c:a1:42:eb:f7:33:39:33:a9:38:27:03:db:4b:cf:88:2e:d1:24:80:3f:93:56:d3:00:1d:00:20:17:ed:c7:fa:6a:a5:fc:03:69:63:81:3a:de:47:1c:10:83:8b:06:eb:37:d7:39:52:10:a9:f6:3e:6f:a4:b2:50 Unsupported extension type_43, data: 08:03:04:03:03:03:02:03:01 Extension renegotiation_info, renegotiated_connection: <empty> Extension server_name, server_name: [type=host_name (0), value=localhost] Unsupported extension type_45, data: 02:01:00 Unsupported extension type_28, data: 40:00 Unsupported extension type_21, data: 00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00 *** https-jsse-nio-8443-exec-4, WRITE: TLSv1.2 Application Data, length = 85 https-jsse-nio-8443-exec-3, WRITE: TLSv1.2 Application Data, length = 84 Using SSLEngineImpl. Allow unsafe renegotiation: false Allow legacy hello messages: true Is initial handshake: true Is secure renegotiation: false Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1 https-jsse-nio-8443-exec-6, READ: TLSv1.2 Alert, length = 26 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1.1 Using SSLEngineImpl. %% Initialized: [Session-46, SSL_NULL_WITH_NULL_NULL] Allow unsafe renegotiation: false Allow legacy hello messages: true Is initial handshake: true Is secure renegotiation: false https-jsse-nio-8443-exec-10, READ: TLSv1.2 Alert, length = 26 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1 *** Diffie-Hellman ServerKeyExchange Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1.1 https-jsse-nio-8443-exec-5, READ: TLSv1 Handshake, length = 512 *** ClientHello, TLSv1.2 RandomCookie: GMT: 699740096 bytes = { 152, 165, Standard ciphersuite chosen: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 6E BF A0 1A C7 CF%% Negotiating: [Session-46, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384] 156, 63, DH Modulus: { 255, 255, 255, 255, 255, 255, 255, 255, 201, 15, 218, 162, 33, 104, 194, 52, 196, 198, 98, 139, 128, 220, 28, 209, 41, 2, 78, 8, 138, 103, 204, 116, 2, 11, 190, 166, 59, 19, 155, 34, 81, 74, 8, 121, 142, 52, 4, 221, 239, 149, 25, 179, 205, 58, 67, 27, 48, 43, 10, 109, 242, 95, 20, 55, 79, 225, 53, 109, 109, 81, 194, 69, 228, 133, 181, 118, 98, 94, 126, 198, 244, 76, 66, 233, 166, 55, 237, 107, 11, 255, 92, 182, 244, 6, 183, 237, 238, 56, 107, 251, 90, 137, 159, 165, 174, 159, 36, 17, 124, 75, 31, 230, 73, 40, 102, 81, 236, 230, 83, 129, 255, 255, 255, 255, 255, 255, 255, 255 } DH Base: { 2 } Server DH Public Key: { 124, 65, 21, 235, 20, 180, 214, 192, 26, 146, 86, 206, 227, 168, 250, 55, 27, 248, 130, 96, 112, 128, 82, 251, 125, 44, 20, 27, 225, 133, 223, 209, 18, 35, 119, 108, 56, 235, 42, 37, 211, 45, 194, 219, 111, 31, 62, 1, 33, 5, 24, 10, 181, 105, 239, 19, 40, 128, 6, 27, 104, 210, 158, 200, 154, 159, 67, 205, 96, 58, 231, 183, 149, 185, 192, 222, 118, 161, 162, 188, 63, 24, 199, 50, 189, 81, 186, 133, 98, 160, 195, 252, 129, 187, 7, 14, 227, 104, 230, 225, 127, 44, 171, 170, 122, 37, 207, 49, 74, 204, 67, 13, 113, 59, 195, 94, 202, 98, 127, 190, 155, 164, 26, 166, 39, 243, 250, 173 } https-jsse-nio-8443-exec-10, RECV TLSv1.2 ALERT: warning, close_notify https-jsse-nio-8443-exec-2, READ: TLSv1 Handshake, length = 512 https-jsse-nio-8443-exec-6, RECV TLSv1.2 ALERT: warning, close_notify https-jsse-nio-8443-exec-6, closeInboundInternal() https-jsse-nio-8443-exec-6, closeOutboundInternal() https-jsse-nio-8443-exec-9, READ: TLSv1.2 Alert, length = 26 https-jsse-nio-8443-exec-6, SEND TLSv1.2 ALERT: warning, description = close_notify *** ClientHello, TLSv1.2 https-jsse-nio-8443-exec-9, RECV TLSv1.2 ALERT: warning, close_notify https-jsse-nio-8443-exec-6, WRITE: TLSv1.2 Alert, length = 26 https-jsse-nio-8443-exec-10, closeInboundInternal() https-jsse-nio-8443-exec-10, closeOutboundInternal() Signature Algorithm SHA256withRSA Signed with a DSA or RSA public key *** ServerHello, TLSv1.2 RandomCookie: GMT: 1551699708 bytes = { 0, 239, 144, 5, 221, 147, 156, 33, https-jsse-nio-8443-exec-6, called closeOutbound() https-jsse-nio-8443-exec-6, closeOutboundInternal() A1 3E EE E6 FF 5A 36 99 17 .n......>..254, 122, 158, 193, 119, 38, 66, 177, 208, 155, 35, 69, 189, 233, 192, 168, 210, 101, 250, 141, 204, 154, 233, 197, 243, 5 } Session ID: 199, .Z6.. 0020*** ServerHelloDone https-jsse-nio-8443-exec-10, SEND TLSv1.2 ALERT: warning, description = close_notify https-jsse-nio-8443-exec-8, WRITE: TLSv1.2 Handshake, length = 1697 https-jsse-nio-8443-exec-9, closeInboundInternal() https-jsse-nio-8443-exec-9, closeOutboundInternal() https-jsse-nio-8443-exec-9, SEND TLSv1.2 ALERT: warning, description = close_notify https-jsse-nio-8443-exec-9, WRITE: TLSv1.2 Alert, length = 26 https-jsse-nio-8443-exec-9, called closeOutbound() https-jsse-nio-8443-exec-9, closeOutboundInternal() RandomCookie: GMT: -57624336 bytes = { 206, 132, 157, 97, 3, 184, 20, 221, 2, 132, 42, 150, 195, 81, 207, 63, 149, 120, 1, 100, 72, 30, 75, 187, 162, 144, 98, 65 } Session ID: {92, 125, 15, 251, 114, 214, 202, 211, 214, 210, 209, 207, 146, 65, 120, 23, 13, 124, 139, 100, 141, 124, 98, 162, 42, 193, 9, 123, 8, 6, 123, 188} Cipher Suites: [Unknown 0x13:0x2, Unknown 0x13:0x3, Unknown 0x13:0x1, Unknown 0x13:0x4, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa9, Unknown 0xc0:0xad, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0xac, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa8, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xc0:0x9d, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9c, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xaa, Unknown 0xc0:0x9f, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9e, TLS_DHE_RSA_WITH_AES_128_CBC_SHA] Compression Methods: { 0 } Unsupported extension status_request, data: 01:00:00:00:00 Extension elliptic_curves, curve names: {secp256r1, secp384r1, secp521r1, unknown curve 29, unknown curve 256, unknown curve 257, unknown curve 258, unknown curve 259, unknown curve 260} Extension ec_point_formats, formats: [uncompressed] Extension signature_algorithms, signature_algorithms: SHA256withRSA, Unknown (hash:0x8, signature:0x9), Unknown (hash:0x8, signature:0x4), SHA256withECDSA, Unknown (hash:0x8, signature:0x7), SHA384withRSA, Unknown (hash:0x8, signature:0xa), Unknown (hash:0x8, signature:0x5), SHA384withECDSA, SHA512withRSA, Unknown (hash:0x8, signature:0xb), Unknown (hash:0x8, signature:0x6), SHA512withECDSA, SHA1withRSA, SHA1withECDSA Unsupported extension type_35, data: Unsupported extension type_51, data: 00:69:00:17:00:41:04:21:0a:ce:20:40:30:af:9d:40:47:00:09:54:57:91:b4:c3:63:aa:a1:fd:2a:99:99:8f:0c:ef:f8:f0:57:1d:59:2c:27:3a:37:3f:63:e6:f5:52:5e:97:38:56:5c:2e:98:7b:5f:ae:a3:67:a1:0b:7c:35:80:59:d5:75:80:c1:f2:00:1d:00:20:21:be:b7:28:91:32:fe:3a:be:34:ad:99:3d:1f:94:65:63:3c:1b:a1:2f:06:5d:ff:95:9e:d7:92:67:98:36:0a Unsupported extension type_43, data: 08:03:04:03:03:03:02:03:01 Extension renegotiation_info, renegotiated_connection: <empty> Extension server_name, server_name: [type=host_name (0), value=localhost] Unsupported extension type_45, data: 02:01:00 Unsupported extension type_28, data: 40:00 Unsupported extension type_21, data: 00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00 *** https-jsse-nio-8443-exec-10, WRITE: TLSv1.2 Alert, length = 26 : D8 113, 154, 75, 26, 207, 110, 34, 97, 15, 49, 184, 113, 178, 239, 237, 86, 25 } Session ID: {92, 125, 15, 252, 183, 75, 178, 236, 226, 204, 161, 47, 115, 81, 131, 38, 245, 192, 251, 58, 104, 31, 211, 99, 47, 3, 254, 150, 238, 150, 255, 17} 6Cipher Suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 Compression Method: 0 {92, 125, 15, 251, 114, 214, 202, 211, 214, 210, 209, 207, 146, 65, 120, 23, 13, 124, 139, 100, 141, 124, 98, 162, 42, 193, 9, 123, 8, 6, 123, 188} %% Initialized: [Session-47, SSL_NULL_WITH_NULL_NULL] Cipher Suites: [Unknown 0x13:0x2, Unknown 0x13:0x3, Unknown 0x13:0x1, Unknown 0x13:0x4, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa9, Unknown 0xc0:0xad, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0xac, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa8, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xc0:0x9d, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9c, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xaa, Unknown 0xc0:0x9f, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9e, TLS_DHE_RSA_WITH_AES_128_CBC_SHA] Compression Methods: { 0 } https-jsse-nio-8443-exec-10, called closeOutbound() https-jsse-nio-8443-exec-3, READ: TLSv1.2 Handshake, length = 134 Unsupported extension status_request, data: 01:00:00:00:00 Extension elliptic_curves, curve names: {secp256r1, secp384r1, secp521r1, unknown curve 29, unknown curve 256, unknown curve 257, unknown curve 258, unknown curve 259, unknown curve 260} Extension ec_point_formats, formats: [uncompressed] Extension signature_algorithms, signature_algorithms: SHA256withRSA, Unknown (hash:0x8, signature:0x9), Unknown (hash:0x8, signature:0x4), SHA256withECDSA, Unknown (hash:0x8, signature:0x7), SHA384withRSA, Unknown (hash:0x8, signature:0xa), Unknown (hash:0x8, signature:0x5), SHA384withECDSA, SHA512withRSA, Unknown (hash:0x8, signature:0xb), Unknown (hash:0x8, signature:0x6), SHA512withECDSA, SHA1withRSA, SHA1withECDSA Unsupported extension type_35, data: Unsupported extension type_51, data: 00:69:00:17:00:41:04:a9:8f:9e:f5:39:15:7f:33:f9:e5:15:36:f6:e9:9c:dd:e5:61:89:9b:51:fb:b1:dc:e3:56:3e:9b:e7:0f:6a:64:95:a6:bc:61:61:03:80:f6:f1:23:56:a1:2c:19:de:7e:f4:80:5c:66:0c:8c:40:f1:f6:63:00:76:3d:1f:c2:f3:00:1d:00:20:19:3c:dc:09:00:56:dc:f5:02:17:24:b1:7a:e0:d9:43:79:27:d9:4b:f1:d9:89:d3:47:0c:b7:15:3c:f7:46:76 Unsupported extension type_43, data: 08:03:04:03:03:03:02:03:01 Extension renegotiation_info, renegotiated_connection: <empty> Extension server_name, server_name: [type=host_name (0), value=localhost] Unsupported extension type_45, data: 02:01:00 Unsupported extension type_28, data: 40:00 Unsupported extension type_21, data: 00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00 *** %% Initialized: [Session-48, SSL_NULL_WITH_NULL_NULL] Standard ciphersuite chosen: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 %% Negotiating: [Session-47, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384] *** ServerHello, TLSv1.2 RandomCookie: GMT: 1551699708 bytes = { 93, 40, 199, 139, 242, 41, 57, 189, 149, 232, 149, 26, 171, 200, 28, 126, 117, 49, 96, 26, 24, 158, 119, 211, 237, 159, 207, 33 } Session ID: {92, 125, 15, 252, 66, 67, 19, 245, 174, 255, 220, 155, 242, 80, 54, 130, 173, 58, 185, 182, 240, 144, 2, 51, 69, 246, 178, 11, 254, 190, 233, 136} Cipher Suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 Compression Method: 0 Extension renegotiation_info, renegotiated_connection: <empty> *** Cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 *** Certificate chain Standard ciphersuite chosen: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 %% Negotiating: [Session-48, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384] *** ServerHello, TLSv1.2 RandomCookie: GMT: 1551699708 bytes = { 36, 32, 28, 133, 211, 97, 87, 221, 183, 216, 244, 201, 35, 61, 98chain [0] = [ [ Version: V3 Subject: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5 Key: Sun RSA public key, 2048 bits modulus: 21944740401167172627731583459321030363948627215746053925732477915060915436180167456469785746662093119306577380200747716284652995937004530444336851845029170241627465854006145050037178991946925696078563485570896673835545540824265905937881682387179314987285174428010940266412458943894800978345731524307952507729956745301047871771953945124256516782917326981125087548987889540650149121302888872237484100834740328828765018090383963294418357028839734723410564800765871733483849269364796949055153420777966213779145518299141217288017794394762274753999989298548507425930217302947589819396239489846633419099079578249651345685751 public exponent: 65537 Validity: [From: Fri May 30 08:43:19 GMT 2014, To: Mon May 27 08:43:19 GMT 2024] Issuer: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US SerialNumber: [ a6ef7a9a 5368eb27] Certificate Extensions: 3 [1]: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: 78 0D 96 9D FE D3 0B BE 8C C7 E3 EC 67 04 AB 4B x...........g..K 0010: EA E0 00 29 ...) ] ] [2]: ObjectId: 2.5.29.19 Criticality=false BasicConstraints:[ CA:true PathLen:2147483647 ] [3]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 78 0D 96 9D FE D3 0B BE 8C C7 E3 EC 67 04 AB 4B x...........g..K 0010: EA E0 00 29 ...) ] ] ] Algorithm: [SHA1withRSA] Signature: 0000: 19 16 5A 21 99 21 24 98 3C 0A E8 D8 00 AB 44 24 ..Z!.!$.<.....D$ 0010: F2 0C B7 83 D5 9F 96 17 87 E2 1F 1D A3 47 68 C7 .............Gh. 0020: 68 4A CB 56 0E 77 2B E8 1A 9F E7 09 A1 19 77 D0 hJ.V.w+.......w. 0030: 5E CC C1 B3 9A C4 35 3D CB E0 A5 A6 43 5D A3 26 ^.....5=....C].& 0040: A4 91 8A C1 FA 7B 10 EA DC C3 C7 1C 47 DC 97 32 ............G..2 0050: C0 37 80 1C F1 42 10 E3 74 17 FA 3E 60 4A B7 59 .7...B..t..>`J.Y 0060: 92 C1 E0 6F BB F1 BB 9F 82 89 B5 83 D5 AE 1E 90 ...o............ 0070: 0A 89 8D FB 4C C0 C5 9E DC C5 8C C6 2F EE D9 B4 ....L......./... 0080: 95 47 27 2E BE 82 31 6F 76 C0 DB 4C C8 0D 3B 7B .G'...1ov..L..;. 0090: D1 6A BF BD 3B 93 30 04 A2 9E 81 F7 96 28 77 F2 .j..;.0......(w. 00A0: 32 05 68 44 1F B3 30 CE 40 9F 20 F3 B4 2B AA E6 2.hD..0.@. ..+.. 00B0: 40 9B FB 7F 34 6E 3A 99 FD F8 28 F1 8C 9B 56 34 @...4n:...(...V4 00C0: 64 AD 4D 56 39 CB 96 18 50 9B 99 43 80 0A 39 A5 d.MV9...P..C..9. 00D0: 13 7A 6E C5 25 E0 95 4A 92 E5 A8 8B EE 03 49 B4 .zn.%..J......I. 00E0: D9 7C 00 E3 F0 3B A7 BA 40 30 CC 89 55 C6 97 93 .....;..@0..U... 00F0: B5 15 F6 62 D3 B1 74 9C 0B 80 2B 8A D4 03 84 A0 ...b..t...+..... ] *** Extension renegotiation_info, renegotiated_connection: <empty> *** DCipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 *** Certificate chain 7https-jsse-nio-8443-exec-10, closeOutboundInternal() , 16, 100, 132, 221, 137, 191, 33, 113, 215, 17, 59, 24, 201 } Session ID: {92, 125, 15, 252, 136, 130, 72, 255, 243, 10, 20, 138, 42, 161, 155, 233, 182, 245, 49, 189, 64, 80, 170, 168, 162, 148, 66, 187, 184, 189, 7, 211} Cipher Suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 Compression Method: 0 Extension renegotiation_info, renegotiated_connection: <empty> *** Cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 *** ClientKeyExchange, DH *** Certificate chain *** Diffie-Hellman ServerKeyExchange DH Modulus: { 255, 255, 255, 255, 255, 255, 255, 255, 201, 15, 218, 162, 33, 104, 194, 52, 196, 198, 98, 139, 128, 220, 28chain [0] = [ [ Version: V3 Subject: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5 Key: Sun RSA public key, 2048 bits modulus: 21944740401167172627731583459321030363948627215746053925732477915060915436180167456469785746662093119306577380200747716284652995937004530444336851845029170241627465854006145050037178991946925696078563485570896673835545540824265905937881682387179314987285174428010940266412458943894800978345731524307952507729956745301047871771953945124256516782917326981125087548987889540650149121302888872237484100834740328828765018090383963294418357028839734723410564800765871733483849269364796949055153420777966213779145518299141217288017794394762274753999989298548507425930217302947589819396239489846633419099079578249651345685751 public exponent: 65537 Validity: [From: Fri May 30 08:43:19 GMT 2014, To: Mon May 27 08:43:19 GMT 2024] Issuer: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US SerialNumber: [ a6ef7a9a 5368eb27] Certificate Extensions: 3 [1]: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: 78 0D 96 9D FE D3 0B BE 8C C7 E3 EC 67 04 AB 4B x...........g..K 0010: EA E0 00 29 ...) ] ] [2]: ObjectId: 2.5.29.19 Criticality=false BasicConstraints:[ CA:true PathLen:2147483647 ] [3]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 78 0D 96 9D FE D3 0B BE 8C C7 E3 EC 67 04 AB 4B x...........g..K 0010: EA E0 00 29 ...) ] ] ] Algorithm: [SHA1withRSA] Signature: 0000: 19 16 5A 21 99 21 24 98 3C 0A E8 D8 00 AB 44 24 ..Z!.!$.<.....D$ 0010: F2 0C B7 83 D5 9F 96 17 87 E2 1F 1D A3 47 68 C7 .............Gh. 0020: 68 4A CB 56 0E 77 2B E8 1A 9F E7 09 A1 19 77 D0 hJ.V.w+.......w. 0030: 5E CC C1 B3 9A C4 35 3D CB E0 A5 A6 43 5D A3 26 ^.....5=....C].& 0040: A4 91 8A C1 FA 7B 10 EA DC C3 C7 1C 47 DC 97 32 ............G..2 0050: C0 37 80 1C F1 42 10 E3 74 17 FA 3E 60 4A B7 59 .7...B..t..>`J.Y 0060: 92 C1 E0 6F BB F1 BB 9F 82 89 B5 83 D5 AE 1E 90 ...o............ 0070: 0A 89 8D FB 4C C0 C5 9E DC C5 8C C6 2F EE D9 B4 ....L......./... 0080: 95 47 27 2E BE 82 31 6F 76 C0 DB 4C C8 0D 3B 7B .G'...1ov..L..;. 0090: D1 6A BF BD 3B 93 30 04 A2 9E 81 F7 96 28 77 F2 .j..;.0......(w. 00A0: 32 05 68 44 1F B3 30 CE 40 9F 20 F3 B4 2B AA E6 2.hD..0.@. ..+.. 00B0: 40 9B FB 7F 34 6E 3A 99 FD F8 28 F1 8C 9B 56 34 @...4n:...(...V4 00C0: 64 AD 4D 56 39 CB 96 18 50 9B 99 43 80 0A 39 A5 d.MV9...P..C..9. 00D0: 13 7A 6E C5 25 E0 95 4A 92 E5 A8 8B EE 03 49 B4 .zn.%..J......I. 00E0: D9 7C 00 E3 F0 3B A7 BA 40 30 CC 89 55 C6 97 93 .....;..@0..U... 00F0: B5 15 F6 62 D3 B1 74 9C 0B 80 2B 8A D4 03 84 A0 ...b..t...+..... ] *** E F9chain [0] = [ [ Version: V3 Subject: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5 Key: Sun RSA public key, 2048 bits modulus: 21944740401167172627731583459321030363948627215746053925732477915060915436180167456469785746662093119306577380200747716284652995937004530444336851845029170241627465854006145050037178991946925696078563485570896673835545540824265905937881682387179314987285174428010940266412458943894800978345731524307952507729956745301047871771953945124256516782917326981125087548987889540650149121302888872237484100834740328828765018090383963294418357028839734723410564800765871733483849269364796949055153420777966213779145518299141217288017794394762274753999989298548507425930217302947589819396239489846633419099079578249651345685751 public exponent: 65537 Validity: [From: Fri May 30 08:43:19 GMT 2014, To: Mon May 27 08:43:19 GMT 2024] Issuer: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US SerialNumber: [ a6ef7a9a 5368eb27] Certificate Extensions: 3 [1]: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: 78 0D 96 9D FE D3 0B BE 8C C7 E3 EC 67 04 AB 4B x...........g..K 0010: EA E0 00 29 ...) ] ] [2]: ObjectId: 2.5.29.19 Criticality=false BasicConstraints:[ CA:true PathLen:2147483647 ] [3]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 78 0D 96 9D FE D3 0B BE 8C C7 E3 EC 67 04 AB 4B x...........g..K 0010: EA E0 00 29 ...) ] ] ] Algorithm: [SHA1withRSA] Signature: 0000: 19 16 5A 21 99 21 24 98 3C 0A E8 D8 00 AB 44 24 ..Z!.!$.<.....D$ 0010: F2 0C B7 83 D5 9F 96 17 87 E2 1F 1D A3 47 68 C7 .............Gh. 0020: 68 4A CB 56 0E 77 2B E8 1A 9F E7 09 A1 19 77 D0 hJ.V.w+.......w. 0030: 5E CC C1 B3 9A C4 35 3D CB E0 A5 A6 43 5D A3 26 ^.....5=....C].& 0040: A4 91 8A C1 FA 7B 10 EA DC C3 C7 1C 47 DC 97 32 ............G..2 0050: C0 37 80 1C F1 42 10 E3 74 17 FA 3E 60 4A B7 59 .7...B..t..>`J.Y 0060: 92 C1 E0 6F BB F1 BB 9F 82 89 B5 83 D5 AE 1E 90 ...o............ 0070: 0A 89 8D FB 4C C0 C5 9E DC C5 8C C6 2F EE D9 B4 ....L......./... 0080: 95 47 27 2E BE 82 31 6F 76 C0 DB 4C C8 0D 3B 7B .G'...1ov..L..;. 0090: D1 6A BF BD 3B 93 30 04 A2 9E 81 F7 96 28 77 F2 .j..;.0......(w. 00A0: 32 05 68 44 1F B3 30 CE 40 9F 20 F3 B4 2B AA E6 2.hD..0.@. ..+.. 00B0: 40 9B FB 7F 34 6E 3A 99 FD F8 28 F1 8C 9B 56 34 @...4n:...(...V4 00C0: 64 AD 4D 56 39 CB 96 18 50 9B 99 43 80 0A 39 A5 d.MV9...P..C..9. 00D0: 13 7A 6E C5 25 E0 95 4A 92 E5 A8 8B EE 03 49 B4 .zn.%..J......I. 00E0: D9 7C 00 E3 F0 3B A7 BA 40 30 CC 89 55 C6 97 93 .....;..@0..U... 00F0: B5 15 F6 62 D3 B1 74 9C 0B 80 2B 8A D4 03 84 A0 ...b..t...+..... ] *** C5 E3 79 35 59 00 CE 91 B4 93 B2 68 .m....y5Y......h 0030: 95 30 B4 96 65 4F 54 E2 0A FA 27 05 1D EE BE C2 .0..eOT...'..... 0040: 65 29 79 63 5E E1 C9 3A 0A AE AB DC E2 51 4E FC e)yc^..:.....QN. 0050: 1B 30 A6 8E CA FC 32 CA 15 96 76 12 6C 13 6A 29 .0....2...v.l.j) 0060: E7 81 D1 5B 2C 38 D7 54 0A 31 35 9F 03 44 64 8C ...[,8.T.15..Dd. 0070: 4A AF 47 82 87 64 A6 AE 5A 89 A9 C2 F2 68 94 3E J.G..d..Z....h.> CONNECTION KEYGEN: Client Nonce: 0000: FB 6C CE A7 DD 77 D7 6F 0A 8A A8 17 1B A6 C7 AF .l...w.o........ 0010: 15 2B 6B 40 30 FD C6 1F D4 8C 14 ED 88 2C AA BD .+k@0........,.. Server Nonce: 0000: 5C 7D 0F FC 5C C9 42 F5 33 FC 3D E1 09 6B 76 9D \...\.B.3.=..kv. 0010: AD ED 07 66 55 7D BB 8D A5 C0 B5 5A 6A EA 9D 54 ...fU......Zj..T Master Secret: 0000: 42 2E 96 E8 70 3B 2A A1 C9 93 39 2B DD 95 BE BB B...p;*...9+.... 0010: CF AF C9 61 F9 8D F8 0D 4A 3E 34 EF 40 76 84 49 ...a....J>[hidden email] 0020: C0 59 D5 91 51 F1 63 86 29 16 53 1D 31 44 54 A8 .Y..Q.c.).S.1DT. ... no MAC keys used for this cipher Client write key: 0000: 82 12 40 77 E9 66 2A EE 33 8B 26 F4 B7 2E B4 24 ..@w.f*.3.&....$ 0010: B4 D4 CF EF D3 70 7D 92 AD 1C B7 B0 76 51 C8 E0 .....p......vQ.. Server write key: 0000: F1 33 02 4C 8E 33 85 22 AA 8F FC AE 04 96 C1 1D .3.L.3."........ 0010: FB F5 62 94 9F 66 7F B9 0B 35 60 6E 9D 3D 3F E0 ..b..f...5`n.=?. Client write IV: 0000: D8 E8 95 59 ...Y Server write IV: 0000: 30 2D B5 5B 0-.[ *** Diffie-Hellman ServerKeyExchange DH Modulus: { 255, 255, 255, 255, 255, 255, 255, 255, 201, 15, 218, 162, 33, 104, 194, 52, 196, 198, 98, 139, 128, 220, 28, 209, 41, 2, 78, 8, 138, 103, 204, 116, 2, 11, 190, 166, 59, 19, 155, 34, 81, 74, 8, 121, 142, 52, 4, 221, 239, 149, 25, 179, 205, 58, 67, 27, 48, 43, 10, 109, 242, 95, 20, 55, 79, 225, 53, 109, 109, 81, 194, 69, 228, 133, 181, 118, 98, 94, 126, 198, 244, 76, 66, 233, 166, 55, 237, 107, 11, 255, 92, 182, 244, 6, 183, 237, 238, 56, 107, 251, 90, 137, 159, 165, 174, 159, 36, 17, 124, 75, 31, 230, 73, 40, 102, 81, 236, 230, , 209, 41, 2, 78, 8, 138, 103, 204, 116, 2, 11, 190, 166, 59, 19, 155, 34, 81, 74, 8, 121, 142, 52, 4, 221, 239, 149, 25, 179, 205, 58, 67, 27, 48, 43, 10, 109, 242, 95, 20, 55, 79, 225, 53, 109, 109, 81, 194, 69, 228, 133, 181, 118, 98, 94, 126, 198, 244, 76, 66, 233, 166, 55, 237, 107, 11, 255, 92, 182, 244, 6, 183, 237, 238, 56, 107, 251, 90, 137, 159, 165, 174, 159, 36, 17, 124, 75, 31, 230, 73, 40, 102, 81, 236, 230, 83, 129, 255, 255, 255, 255, 255, 255, 255, 255 } DH Base: { 2 } Server DH Public Key: { 69, 210, 11, 75, 133, 38, 155, 210, 38, 75, 45, 199, 131, 38, 3, 212, 18, 130, 61, 112, 219, 189, 212, 129, 187, 114, 13, 120, 105, 32, 138, 197, 100, 78, 107, 55, 226, 64, 119, 191, 20, 126, 5, 249, 127, 163, 12, 201, 96, 44, 216, 99, 255, 52, 36, 58, 23, 6, 44, 68, 227, 226, 173, 115, 99, 136, 61, 1, 66, 17, 122, 130, 8, 217, 255, 246, 17, 171, 199, 76, 164, 105, 58, 223, 29, 158, 111, 142, 215, 3, 187, 3, 54, 138, 13, 79, 114, 205, 248, 115, 172, 200, 37, 212, 30, 232, 119, 134, 22, 47, 232, 9, 199, 9, 196, 39, 92, 9, 52, 216, 25, 129, 197, 229, 227, 138, 182, 212 } DH Public key: { 72, 178, 32, 128, 183, 120, 121, 225, 139, 62, 186, 146, 97, 112, 75, 121, 237, 220, 142, 123, 27, 32, 10, 3, 175, 83, 97, 177, 47, 192, 73, 133, 130, 159, 241, 50, 36, 210, 100, 93, 62, 24, 20, 100, 32, 63, 39, 74, 111, 56, 81, 240, 252, 69, 122, 25, 254, 156, 93, 22, 169, 151, 58, 120, 248, 78, 42, 253, 80, 211, 65, 17, 244, 138, 61, 111, 117, 121, 251, 88, 114, 57, 170, 42, 92, 136, 58, 20, 40, 75, 252, 142, 138, 215, 79, 242, 55, 204, 81, 119, 239, 149, 20, 217, 92, 122, 25, 134, 129, 63, 100, 79, 118, 30, 66, 74, 191, 6, 109, 223, 16, 150, 141, Signature Algorithm SHA256withRSA Signed with a DSA or RSA public key 83, *** ServerHelloDone https-jsse-nio-8443-exec-7, READ: TLSv1.2 Change Cipher Spec, length = 1 *** Diffie-Hellman ServerKeyExchange DH Modulus: { 255, 255, 255, 255, 255, 255, 255, 255, 201, 15, 218, 162, 33, 104, 194, 52, 196, 198, 98, 139, 128, 220, 28, 209, 41, 2, 78, 8, 138, 103, 204, 116, 2, 11, 190, 166, 59, 19, 155, 34, 81, 74, 8, 121, 142, 52, 4, 221, 239, 149, 25, 179, 205, 58, 67, 27, 48, 43, 10, 109, 242, 95, 20, 55, 79, 225, 53, 109, 109, 81, 194, 69, 228, 133, 181, 118, 98, 94, 126, 198, 244, 76, 66, 233, 166, 55, 237, 107, 11, 255, 92, 182, 244, 6, 183, 237, 238, 56, 107, 251, 90, 137, 159, 165, 174, 159, 36, 17, 124, 75, 31, 230, 73, 40https-jsse-nio-8443-exec-2, WRITE: TLSv1.2 Handshake, length = 1697 1290, 156, 245, 62, 47 } SESSION KEYGEN: PreMaster Secret: 0000: 84 51 99 39 38 75 2D 09 3C ED CA FB 06 22 F1 D8 .Q.98u-.<....".. 0010: 06 E1 89 5B 6A B7 35 5C AD D6 CE 73 76 5D C3 19 ...[j.5\...sv].. 0020: E3 03 BD 33 A1 7F 42 85 24 3E 34 95 4C 4A 3A 59 ...3..B.$>4.LJ:Y 0030: A7 86 F4 5D 33 A0 5F F7 68 9C C2 69 48 C5 FE F3 ...]3._.h..iH... 0040: 4C 6B 51 79 89 9B 0F AF 00 89 DF 63 9D F4 12 78 LkQy.......c...x 0050: 57 71 6F A6 B2 34 15 65 B0 77 95 BD F1 91 ED C6 Wqo..4.e.w...... 0060: 1B 05 CF 77 D3 B9 21 C0 0A E3 27 A4 8C 6E 5C 2A ...w..!...'..n\* 0070: CF B9 1F 03 EB 46 60 EF , 102https-jsse-nio-8443-exec-7, READ: TLSv1.2 Handshake, length = 40 , 81, 236, 230, 83, 8A 6B, 255, 255, 255, 255, 255, 255, 255, 255 } https-jsse-nio-8443-exec-4, READ: TLSv1.2 Handshake, length = 134 DH Base: { 2 } Server DH Public Key: { 128, *** ClientKeyExchange, DH DH Public key: { 255, 46, 82, 157, 71, 34, 81, 92, 66, 156, 181, 39, 21, 95, 200, 218, 221, 191, 243, 56, 78, B4129, 255, 255, 255, 255, 255, 255, 255, 255 } DH Base: { 2 } Server DH Public Key: { 17 1A 58 65 E1 .....F`..k...Xe. 201, 221, 79, 215, 215, 207, 162, 127, 61, 19, 175, 243, 23, 9, 11, 36, 69, 127, 191, 48, 43, 63, 154, 132, 69, 93, 251, 78, 215, 173, 25, 225, 84, 255, 197, 179, 51, 16, 17, 12, 1, 212, 169, 187, 4, 245, 46, 193, 51, 107, 86, 109, 96, 24, 63, 146, 247, 218, 87, 186, 55, 6, 210, 242, 85, 111, 19, 114, 50, 191, 175, 74, 117, 3, 92, 23, 26, 148, 49, 148, 34, 227, 78, 112, 136, 168, 191, 80, 30, 23, 142, 72, 184, 89, 244, 142, 111, 142, 152, 193, 174, 181, 67, 43, 185, 226, 234 } 26, 151, 135, 222, 110, 116, 65, 45, 127, 6, 104, 62, 50, 161, 253, 97, 176, 176, 194, 224, 35, 103, 124, *** Finished 129, CONNECTION KEYGEN: Client Nonce: 0000: 87 AC 58 E8 1B 6A 62 26 B9 B2 CA 9F 00 56 55 6D ..X..jb&.....VUm 0010: 64 6E 8F 00 02 EF 07 59 FE 2B 5B 80 7B FB 59 A5 dn.....Y.+[...Y. Server Nonce: 0000: 5C 7D 0F FC CA 9E 33 53 14 C8 B7 D2 E4 5E 25 4F \.....3S.....^%O 0010: A7 F9 A4 25 94 21 F5 51 AB C8 BD 65 0B 2E 78 FF ...%.!.Q...e..x. Master Secret: 0000: 3A 0E 38 39 8E CA 2F 79 8B 0E 66 69 28 7B 11 18 :.89../y..fi(... 0010: A9 7D 4A 46 33 75 69 23 47 6A 48 F2 96 15 EE 29 ..JF3ui#GjH....) 0020: 3B BD 5A A2 1F 6C C5 3C 14 15 4A AC E1 62 C1 34 ;.Z..l.<..J..b.4 ... no MAC keys used for this cipher Client write key: 0000: 78 DA CD AB 43 AA 38 8E CF C3 3A 5C 4F B5 31 4B x...C.8...:\O.1K 0010: 81 18 51 BA 90 B5 A2 81 94 63 E3 1F 57 AF 5E F8 ..Q......c..W.^. Server write key: 0000: EE DC A2 9B E2 68 51 E6 C4 8F 30 01 CE 0D B9 6F .....hQ...0....o 0010: 1F F5 8D 11 C9 75 26 29 DC 07 12 9D 22 88 95 9A .....u&)...."... Client write IV: 0000: 9C 95 E8 5A ...Z Server write IV: 0000: FE 6D E4 A0 .m.. 87, 161, 9, 12, 209, https-jsse-nio-8443-exec-3, READ: TLSv1.2 Change Cipher Spec, length = 1 SESSION KEYGEN: PreMaster Secret: 123, 15, 11, 158, 23, 55, 97, 195, 124, 110, 112, 15, 7, 53, 221, 50, 124, 206, 160, 224, 85, 150, 34, 216, 220, 51, 7, 15, 232, 39, 127, 4, 173, 87, 181, 154, 171, 168, 19, 245, 152, 104, 161, 23, 69, 170, 117, 0, 136, 129, 102, 21, 249, 107, 215, 235, 201, 228, 221, 210, 186, 68, 226, 83, 159, 54, 141, 134, 218, 95, 224, 201, 36, 93, 112, 204, 110, 126, 216, 150, 23, 204, 67, 115, 82, 72, 38, 229, 26, 253, 245, 160, 29, 202, 242, 127, 122, 215, 198, 117, 236, 122, 229 } Signature Algorithm SHA256withRSA Signed with a DSA or RSA public key *** ServerHelloDone https-jsse-nio-8443-exec-1, WRITE: TLSv1.2 Handshake, length = 1697 verify_data: { 20, 245, 123, 31, 104, 211, 171, 208, 198, 65, 238, 245https-jsse-nio-8443-exec-3, READ: TLSv1.2 Handshake, length = 40 0000: EB DD 8C 01 C6 78 61 C9 BC 10 01 03 57 77 7D A9 .....xa.....Ww.. 0010: AD E1 DE 94 49 F6 6F 6B 0A 57 1A 3F B4 D7 BD BC ....I.ok.W.?.... 0020: 27 1D 4D C7 07 B6 A2 D5 88 98 B6 34 FA 06 A3 9C '.M........4.... 0030: 1A 10 D5 57 45 1B 5A F9 F7 32 82 36 C9 10 6C 00 ...WE.Z..2.6..l. 0040: 1B BC 49 86 7C D0 99 4E 3E 87 A7 BA E4 55 0F A4 ..I....N>....U.. 0050: 1B FD 67 C8 C8 F0 AB E5 1B 9A 50 DF EA 84 2E 33 ..g.......P....3 0060: 08 75 66 70 C5 FD B6 0C 1B 9B 78 B9 DB EB 54 F2 .ufp......x...T. 0070: F3 B5 7C 3F C8 7F 30 D1 7C AE 85 9A 85 EC FE 44 ...?..0........D CONNECTION KEYGEN: Client Nonce: 0000: FD 91 B9 F0 CE 84 9D 61 03 B8 14 DD 02 84 2A 96 .......a......*. 0010: C3 51 CF 3F 95 78 01 64 48 1E 4B BB A2 90 62 41 .Q.?.x.dH.K...bA Server Nonce: 0000: 5C 7D 0F FC 5D 28 C7 8B F2 29 39 BD 95 E8 95 1A \...](...)9..... 0010: AB C8 1C 7E 75 31 60 1A 18 9E 77 D3 ED 9F CF 21 ....u1`...w....! Master Secret: 0000: 22 75 0B 53 1A 8B 99 C1 01 73 DE 7A BF E1 22 D1 "u.S.....s.z..". 0010: F2 09 71 7B E6 0D 6C C6 8B 93 58 68 14 18 D0 CE ..q...l...Xh.... 0020: BB D4 DE C9 21 7B C5 15 AB EC 52 09 26 25 AE 09 ....!.....R.&%.. ... no MAC keys used for this cipher Client write key: 0000: 4D 13 0F 83 89 7B E5 51 51 6B 3F 8A 48 E4 D4 93 M......QQk?.H... 0010: 71 A5 47 27 C2 3D 6B 8C AB 3C 65 18 6B 13 53 B9 q.G'.=k..<e.k.S. Server write key: 0000: B4 A8 F5 EA 71 1B 73 D4 31 0E 20 6B 36 C5 E4 7D ....q.s.1. k6... 0010: F3 E8 A5 CE D9 BD 56 0A C3 C3 6E 60 F7 29 69 9D ......V...n`.)i. Client write IV: 0000: 6A CA AE 70 j..p Server write IV: 0000: 37 66 03 1B 7f.. 201, 176, 155, 160, 103, 251, 61https-jsse-nio-8443-exec-4, READ: TLSv1.2 Change Cipher Spec, length = 1 https-jsse-nio-8443-exec-4, READ: TLSv1.2 Handshake, length = 40 *** Finished verify_data: { 161, 110, 209, 181, 88, 9, 209, 24, 178, 83, 52, 125 } *** https-jsse-nio-8443-exec-4, WRITE: TLSv1.2 Change Cipher Spec, length = 1 *** Finished verify_data: { 174, 168, 145, 241, 96, 64, 33, 175, 147, 122, 160, 138 } *** *** Finished verify_data: { 26, 22, 87, 0, 174, 155, 67, 246https-jsse-nio-8443-exec-4, WRITE: TLSv1.2 Handshake, length = 40 } *** %% Cached server session: [Session-47, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384] https-jsse-nio-8443-exec-7, WRITE: TLSv1.2 Change Cipher Spec, length = 1 *** Finished verify_data: { 13, 12, 230, 221, 74, 61, 16, 61, 233, 26, 123, 141 } *** https-jsse-nio-8443-exec-7, WRITE: TLSv1.2 Handshake, length = 40 %% Cached server session: [Session-43, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384] , 97, 84, 76, 158 } *** https-jsse-nio-8443-exec-3, WRITE: TLSv1.2 Change Cipher Spec, length = 1 *** Finished verify_data: { 109, 26, 182, 36, 215, 82, 172, 204, 141, 87, 2, 119 } *** , 222, 108, 136, 37, 165, 222, 179, 248, 138, 210, 181, 62, 154, 65, 106, 238, 68, 46, 139, 208, 174, 211, 144, 138, 248, 170, 235, 58, 211, 63, 246, 82, 38, 130, 92, 218, 121, 50, 210, 166, 49, 204, 123, 198, 82, 152, 164, 205, 98, 169, 173, 109, 221, 191, 51, 91, 113, 207, 53, 188, 40, 174, 168, 66, 29, 245, 0, 140, 127, 95, 48, 129, 97, 63, 79, 199, 173, 127, 248, 50, 195, 202, 73, 232, 10, 32, 130, 226, 150, 48, 153, 66, 132, 59, 233, 98, 224, 20, 145, 186, 91, 120, 242, 39, 191, 24, 42, 66, 121, 226, 86, 158, 193, 35, 14, 255 } https-jsse-nio-8443-exec-4, READ: TLSv1.2 Handshake, length = 134 Signature Algorithm SHA256withRSA Signed with a DSA or RSA public key https-jsse-nio-8443-exec-3, WRITE: TLSv1.2 Handshake, length = 40 *** ServerHelloDone %% Cached server session: [Session-45, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384] https-jsse-nio-8443-exec-5, WRITE: TLSv1.2 Handshake, length = 1697 Using SSLEngineImpl. Allow unsafe renegotiation: false Allow legacy hello messages: true Is initial handshake: true Is secure renegotiation: false Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1.1 https-jsse-nio-8443-exec-3, READ: TLSv1 Handshake, length = 512 *** ClientHello, TLSv1.2 RandomCookie: GMT: 371784205 bytes = { 70, 201, 194, 186, 32, 109, 127, 212, 37, 12, 42, 163, 149, 127, 128, 88, 250, 67, 80, 174, 5, 9, 121, 109, 247, 163, 138, 64 } Session ID: *** ClientKeyExchange, DH DH Public key: { 20, 79, 3, 104, 71, 168, 228, 249, 216, 199, 64, 211, 179, 73, 126, 151, 108, 35, 83, 16, 209, 230, 0, 142, 111, 13, 238, 17, 182, 91, 241, 13, 26, 8, 3, 54, 43, 242, 114, 241, 113, 194, 172, 68, 52, 7, 141, 153, 8, 218, 197, 77, 166, 105, 185, 33, 208, 159, 107, 9, 60, 237, 196, 107, 198, 203, 63, 3, 242, 123, 201, 77, 125, 17, 117, 251, 238, 184, 193, 14, 15, 61, 255, 245, 255, 76, 127, 115, 184, 113, 123, 233, 71, 36, 1, 106, 44, 21, 147, 64, 0, 210, 16, 240, 20, 195, 9, 19, 230, 85, 72, 66, 153, 71, 239, 29, 139, 37, 149, 190, 68, 129, 63, 92, 72, 222, 157, 29 } SESSION KEYGEN: PreMaster Secret: 0000: F4 06 DC AD A0 1D C9 B4 2A 28 F2 06 F6 C7 23 34 ........*(....#4 0010: 5A 71 2A F5 D3 40 3B 56 13 C6 CA 07 EC D4 72 3E Zq*..@;V......r> 0020: C0 C2 4A 2E 60 39 39 97 E7 6A 6D AF 5F 11 EC 34 ..J.`99..jm._..4 0030: 3B 9B AF 0D 46 25 0C 17 A3 17 64 AA BE 8B 19 9B ;...F%....d..... 0040: 20 AA E7 FF E7 08 29 73 9A C4 46 B4 50 59 B0 A5 .....)s..F.PY.. 0050: D1 CE E9 9A 9B BF 7F EA EA 4F B3 1C 2E DB C9 4A .........O.....J 0060: D8 A9 FC 73 49 EE A8 95 9C E9 49 11 56 84 19 56 ...sI.....I.V..V 0070: BF 56 1C 42 82 92 C8 C9 BB C9 F9 B8 CD 37 99 A9 .V.B.........7.. CONNECTION KEYGEN: Client Nonce: 0000: 8C 7D 49 3A C3 1A 29 81 41 A4 6A 62 8A 6C A5 23 ..I:..).A.jb.l.# 0010: 7B 33 C6 B9 19 95 F1 D9 AC E8 A8 42 6E B3 0E 03 .3.........Bn... Server Nonce: 0000: 5C 7D 0F FC 00 EF FE 7A 9E C1 77 26 42 B1 D0 9B \......z..w&B... 0010: 23 45 BD E9 C0 A8 D2 65 FA 8D CC 9A E9 C5 F3 05 #E.....e........ Master Secret: 0000: B1 4F 49 D0 9C CD EF C9 43 43 26 B8 0F 9A B6 55 .OI.....CC&....U 0010: 67 ED 52 43 57 CA CF B1 A4 AC D0 10 4C 5F 43 89 g.RCW.......L_C. 0020: AC AF F8 C8 A1 3F 44 0D 19 8D E3 AB 72 EA 4B 92 .....?D.....r.K. ... no MAC keys used for this cipher Client write key: 0000: F3 7A 7F C2 9F 8F 1C B3 75 FB 6F 91 24 B6 67 6E .z......u.o.$.gn 0010: AF EC D9 EF 4B 03 3E F0 7A 86 4C 9C 49 6C 93 76 ....K.>.z.L.Il.v Server write key: 0000: BB 1E 8A B6 D0 84 86 2B 63 BE B4 10 FB 07 01 D4 .......+c....... 0010: 4A B5 DA 1E 4D ED F8 E9 3B C7 99 0E 72 C5 35 9D J...M...;...r.5. Client write IV: 0000: 90 73 48 16 .sH. Server write IV: 0000: 46 93 2B D2 F.+. https-jsse-nio-8443-exec-5, WRITE: TLSv1.2 Application Data, length = 84 https-jsse-nio-8443-exec-5, READ: TLSv1.2 Alert, length = 26 https-jsse-nio-8443-exec-5, RECV TLSv1.2 ALERT: warning, close_notify https-jsse-nio-8443-exec-5, closeInboundInternal() https-jsse-nio-8443-exec-5, closeOutboundInternal() https-jsse-nio-8443-exec-5, SEND TLSv1.2 ALERT: warning, description = close_notify https-jsse-nio-8443-exec-5, WRITE: TLSv1.2 Alert, length = 26 https-jsse-nio-8443-exec-5, called closeOutbound() https-jsse-nio-8443-exec-5, closeOutboundInternal() https-jsse-nio-8443-exec-6, READ: TLSv1.2 Handshake, length = 134 https-jsse-nio-8443-exec-4, READ: TLSv1.2 Change Cipher Spec, length = 1 https-jsse-nio-8443-exec-4, READ: TLSv1.2 Handshake, length = 40 Using SSLEngineImpl. *** Finished verify_data: { 172, 160, Allow unsafe renegotiation: false Allow legacy hello messages: true Is initial handshake: true Is secure renegotiation: false Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1.1 https-jsse-nio-8443-exec-7, READ: TLSv1 Handshake, length = 512 *** ClientHello, TLSv1.2 RandomCookie: GMT: 847686297 bytes = { 4, 214, 149, 254, 176, 68, 155, 76, 130, 206, 215, 93, 165, 161, 185, 83, 113, 216, 29, 35, 216, 88, 220, 26, 112, 72, 201, 194 } Session ID: {92, 125, 15, 252, 19, 214, 68, 173, 215, 94, 242, 244, 106, 89, 60, 143, 196, 61, 45, 39, 102, 192, 180, 151, 1, 59, 107, 169, 236, 99, 108, 99} Cipher Suites: [Unknown 0x13:0x2, Unknown 0x13:0x3, Unknown 0x13:0x1, Unknown 0x13:0x4, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa9, Unknown 0xc0:0xad, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0xac, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa8, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xc0:0x9d, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9c, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xaa, Unknown 0xc0:0x9f, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9e, TLS_DHE_RSA_WITH_AES_128_CBC_SHA] Compression Methods: { 0 } Unsupported extension status_request, data: 01:00:00:00:00 Extension elliptic_curves, curve names: {secp256r1, secp384r1, secp521r1, unknown curve 29, unknown curve 256, unknown curve 257, unknown curve 258, unknown curve 259, unknown curve 260} Extension ec_point_formats, formats: [uncompressed] Extension signature_algorithms, signature_algorithms: SHA256withRSA, Unknown (hash:0x8, signature:0x9), Unknown (hash:0x8, signature:0x4), SHA256withECDSA, Unknown (hash:0x8, signature:0x7), SHA384withRSA, Unknown (hash:0x8, signature:0xa), Unknown (hash:0x8, signature:0x5), SHA384withECDSA, SHA512withRSA, Unknown (hash:0x8, signature:0xb), Unknown (hash:0x8, signature:0x6), SHA512withECDSA, SHA1withRSA, SHA1withECDSA Unsupported extension type_35, data: Unsupported extension type_51, data: 00:69:00:17:00:41:04:6b:be:ac:9a:66:1c:57:24:a9:48:e0:05:1b:93:c0:cb:fc:d0:e6:8d:5b:23:46:ea:b9:76:ad:bf:73:0e:54:63:b2:65:f0:5e:0e:62:5a:20:8f:f5:00:05:90:40:32:2b:70:ed:1e:1e:7a:f7:a4:da:4a:f2:f0:44:77:63:31:3c:00:1d:00:20:83:a7:28:99:24:9a:b3:06:24:ae:c9:52:9a:78:85:34:03:e7:21:6a:91:de:6f:6d:0f:9b:4e:ea:e0:6b:37:4b Unsupported extension type_43, data: 08:03:04:03:03:03:02:03:01 Extension renegotiation_info, renegotiated_connection: <empty> Extension server_name, server_name: [type=host_name (0), value=localhost] Unsupported extension type_45, data: 02:01:00 Unsupported extension type_28, data: 40:00 Unsupported extension type_21, data: 00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00 *** https-jsse-nio-8443-exec-2, WRITE: TLSv1.2 Application Data, length = 85 https-jsse-nio-8443-exec-10, WRITE: TLSv1.2 Application Data, length = 84 %% Initialized: [Session-49, SSL_NULL_WITH_NULL_NULL] *** ClientKeyExchange, DH DH Public key: { 207, 122, 105, 11, 98, 9, 71, 87, 164, 188, 219, 37, 93, 155, 236, 95, 72, 157, 16, 245, 182, 18, 12, 139, 52, 242, 196, 81, 130, 203, 166, 38, 56, 252, 85, 114, 60, 189, 236, 233, 9, 201, 95, 86, 67, 171, 9, 123, 210, 238, 135, 132, 223, 222, 252, 64, 232, 224, 24, 4, 214, 176, 53, 159, 146, 52, 96, 28, 134, 159, 51, 200, 93, 98, 82, 135, 74, 170, 149, 22, 242, 45, 240, 147, 140, 179, 152, 50, 144, 115, 213, 144, 42, 104, 229, 199, 42, 223, 81, 125, 10, 85, 226, 243, 56, 212, 178, 41, 158, 194, 171, 140, 7, 194, 72, 155, 115, 133, 179, 16, 98, 59, 134, 255, 58, 28, 59, 222 } https-jsse-nio-8443-exec-8, READ: TLSv1.2 Alert, length = 26 https-jsse-nio-8443-exec-8, RECV TLSv1.2 ALERT: warning, close_notify https-jsse-nio-8443-exec-8, closeInboundInternal() https-jsse-nio-8443-exec-8, closeOutboundInternal() https-jsse-nio-8443-exec-8, SEND TLSv1.2 ALERT: warning, description = close_notify https-jsse-nio-8443-exec-8, WRITE: TLSv1.2 Alert, length = 26 https-jsse-nio-8443-exec-8, called closeOutbound() https-jsse-nio-8443-exec-8, closeOutboundInternal() 59, 207, 125, 140, 195, 206, 222, 67, 124, 23 } *** https-jsse-nio-8443-exec-4, WRITE: TLSv1.2 Change Cipher Spec, length = 1 *** Finished verify_data: { 230, 176, 147, 102, 141, 38, 151, 183, 228, 237, 229, 164 } *** {92, 125, 15, 252, 19, 214, 68, 173, 215, 94, 242, 244, 106, 89, 60, 143, 196, 61, 45, 39, 102, 192, 180, 151, 1, 59, 107, 169, 236, 99, 108, 99} https-jsse-nio-8443-exec-4, WRITE: TLSv1.2 Handshake, length = 40 Standard ciphersuite chosen: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 SESSION KEYGEN: PreMaster Secret: https-jsse-nio-8443-exec-1, READ: TLSv1.2 Alert, length = 26 %% Cached server session: [Session-46, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384] %% Negotiating: [Session-49, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384] https-jsse-nio-8443-exec-1, RECV TLSv1.2 ALERT: warning, close_notify https-jsse-nio-8443-exec-1, closeInboundInternal() https-jsse-nio-8443-exec-1, closeOutboundInternal() *** ServerHello, TLSv1.2 RandomCookie: GMT: 1551699708 bytes = { 0, 75, 157, 93, 79, 167, 119, 255, 19, 186, 32, 122, 163, 232, 167, 128, 235, 92, 22, 223, 101, 150, 248, 135, 154, 81, 124, 73 } Session ID: {92, 125, 15, 252, 253, 51, 152, 0, 104, 161, 63, 9, 70, 98, 196, 252, 42, 141, 176, 24, 10, 171, 244, 105, 60, 139, 248, 0, 175, 70, 119, 188} Cipher Suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 Compression Method: 0 Extension renegotiation_info, renegotiated_connection: <empty> *** Cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 *** Certificate chain chain [0] = [ [ Version: V3 Subject: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5 Key: Sun RSA public key, 2048 bits modulus: 21944740401167172627731583459321030363948627215746053925732477915060915436180167456469785746662093119306577380200747716284652995937004530444336851845029170241627465854006145050037178991946925696078563485570896673835545540824265905937881682387179314987285174428010940266412458943894800978345731524307952507729956745301047871771953945124256516782917326981125087548987889540650149121302888872237484100834740328828765018090383963294418357028839734723410564800765871733483849269364796949055153420777966213779145518299141217288017794394762274753999989298548507425930217302947589819396239489846633419099079578249651345685751 public exponent: 65537 Validity: [From: Fri May 30 08:43:19 GMT 2014, To: Mon May 27 08:43:19 GMT 2024] Issuer: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US SerialNumber: [ a6ef7a9a 5368eb27] Certificate Extensions: 3 [1]: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: 78 0D 96 9D FE D3 0B BE 8C C7 E3 EC 67 04 AB 4B x...........g..K 0010: EA E0 00 29 ...) ] ] [2]: ObjectId: 2.5.29.19 Criticality=false BasicConstraints:[ CA:true PathLen:2147483647 ] [3]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 78 0D 96 9D FE D3 0B BE 8C C7 E3 EC 67 04 AB 4B x...........g..K 0010: EA E0 00 29 ...) ] ] ] Algorithm: [SHA1withRSA] Signature: 0000: 19 16 5A 21 99 21 24 98 3C 0A E8 D8 00 AB 44 24 ..Z!.!$.<.....D$ 0010: F2 0C B7 83 D5 9F 96 17 87 E2 1F 1D A3 47 68 C7 .............Gh. 0020: 68 4A CB 56 0E 77 2B E8 1A 9F E7 09 A1 19 77 D0 hJ.V.w+.......w. 0030: 5E CC C1 B3 9A C4 35 3D CB E0 A5 A6 43 5D A3 26 ^.....5=....C].& 0040: A4 91 8A C1 FA 7B 10 EA DC C3 C7 1C 47 DC 97 32 ............G..2 0050: C0 37 80 1C F1 42 10 E3 74 17 FA 3E 60 4A B7 59 .7...B..t..>`J.Y 0060: 92 C1 E0 6F BB F1 BB 9F 82 89 B5 83 D5 AE 1E 90 ...o............ 0070: 0A 89 8D FB 4C C0 C5 9E DC C5 8C C6 2F EE D9 B4 ....L......./... 0080: 95 47 27 2E BE 82 31 6F 76 C0 DB 4C C8 0D 3B 7B .G'...1ov..L..;. 0090: D1 6A BF BD 3B 93 30 04 A2 9E 81 F7 96 28 77 F2 .j..;.0......(w. 00A0: 32 05 68 44 1F B3 30 CE 40 9F 20 F3 B4 2B AA E6 2.hD..0.@. ..+.. 00B0: 40 9B FB 7F 34 6E 3A 99 FD F8 28 F1 8C 9B 56 34 @...4n:...(...V4 00C0: 64 AD 4D 56 39 CB 96 18 50 9B 99 43 80 0A 39 A5 d.MV9...P..C..9. 00D0: 13 7A 6E C5 25 E0 95 4A 92 E5 A8 8B EE 03 49 B4 .zn.%..J......I. 00E0: D9 7C 00 E3 F0 3B A7 BA 40 30 CC 89 55 C6 97 93 .....;..@0..U... 00F0: B5 15 F6 62 D3 B1 74 9C 0B 80 2B 8A D4 03 84 A0 ...b..t...+..... ] *** Cipher Suites: [Unknown 0x13:0x2, Unknown 0x13:0x3, Unknown 0x13:0x1, Unknown 0x13:0x4, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa9, Unknown 0xc0:0xad, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0xac, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa8, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xc0:0x9d, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9c, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xaa, Unknown 0xc0:0x9f, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9e, TLS_DHE_RSA_WITH_AES_128_CBC_SHA] Compression Methods: { 0 } https-jsse-nio-8443-exec-10, WRITE: TLSv1.2 Application Data, length = 85 Using SSLEngineImpl. Allow unsafe renegotiation: false Allow legacy hello messages: true Is initial handshake: true Is secure renegotiation: false https-jsse-nio-8443-exec-1, SEND TLSv1.2 ALERT: warning, description = close_notify 0000: 98 4B 74 E0 40 F0 5B 2B 89 07 33 73 97 43 61 0D .Kt.@.[+..3s.Ca. 0010: 0B 73 E0 B5 8F FE 1A AB 7C 88 EB 02 B6 B6 BE 1D .s.............. 0020: B1 0F 44 B3 26 FC 6C C4 E4 B8 4B 9C 88 AB 67 3D ..D.&.l...K...g= 0030: 05 9D 21 1B 50 72 03 D6 38 B2 EA B9 6F 2B 9F E0 ..!.Pr..8...o+.. 0040: F0 DA F3 7A 3B FA ED F1 19 08 13 E5 C4 C3 84 49 ...z;..........I 0050: 5C 1F 49 E2 E8 B8 E4 D9 75 44 4B DA A9 70 C9 B6 \.I.....uDK..p.. 0060: 53 68 4A A3 18 C4 61 43 BF F4 54 7D 9A FF 63 C9 ShJ...aC..T...c. 0070: 83 F7 DE FC BD 12 F4 3B 79 2D 3B 98 64 07 76 61 .......;y-;.d.va CONNECTION KEYGEN: Client Nonce: 0000: 2A B5 30 C0 98 A5 9C 3F 90 05 DD 93 9C 21 C7 71 *.0....?.....!.q 0010: 9A 4B 1A CF 6E 22 61 0F 31 B8 71 B2 EF ED 56 19 .K..n"a.1.q...V. Server Nonce: 0000: 5C 7D 0F FC 24 20 1C 85 D3 61 57 DD B7 D8 F4 C9 \...$ ...aW..... 0010: 23 3D 62 10 64 84 DD 89 BF 21 71 D7 11 3B 18 C9 #=b.d....!q..;.. Master Secret: 0000: AA A7 CD 95 30 4A 0B D9 E4 52 D4 95 AF DC 17 50 ....0J...R.....P 0010: 7A 88 F5 E1 13 BB E6 09 53 97 B4 3C E3 72 32 76 z.......S..<.r2v 0020: 08 F4 90 5D 38 2C 0E 8D 4C 3B 3E 77 79 75 10 0A ...]8,..L;>wyu.. ... no MAC keys used for this cipher Client write key: 0000: BF B0 2A 49 32 2E 10 EC 15 24 0D 3B 35 BE 91 2E ..*I2....$.;5... 0010: 1D 5C 2B BE 6A 8F 0C 6F C6 B9 B8 0A A4 48 0F AD .\+.j..o.....H.. Server write key: 0000: BE 82 C2 13 E8 72 2E E1 2F F4 0C 8C 95 6F 83 78 .....r../....o.x 0010: 92 2E 22 99 6E 61 9A D4 69 4D 75 C6 06 6A FD 58 ..".na..iMu..j.X Client write IV: 0000: 3C 1E C2 B2 <... Server write IV: 0000: F4 D2 C1 96 .... Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1.1 https-jsse-nio-8443-exec-2, READ: TLSv1 Handshake, length = 512 *** ClientHello, TLSv1.2 RandomCookie: GMT: -1434817756 bytes = { 222, *** Diffie-Hellman ServerKeyExchange DH Modulus: { 255, 255, 255, 255, 255, 255, 255, 255, 201, 15, 218, 162, 33, 104, 194, 52, 196, 198, 98, 139, 128, 220, 28, 209, 41, 2, 78, 8, 138, 103, 204, 116, 2, 11, 190, 166, 59, 19, 155, 34, 81, 74, 8, 121, 142, 52, 4, 221, 239, 149, 25, 179, 205, 58, 67, 27, 48, 43, 10, 109, 242, 95, 20, 55, 79, 225, 53, 109, 109, 81, 194, 69, 228, 133, 181, 118, 98, 94, 126, 198, 244, 76, 66, 233, 166, 55, 237, 107, 11, 255, 92, 182, 244, 6, 183, 237, 238, 56, 107, 251, 90, 137, 159, 165, 174, 159, 36, 17, 124, 75, 31, 230, 73, 40, 102, 81, 236, 230, 83, 129, 255, 255, 255, 255, 255, 255, 255, 255 } DH Base: { 2 } Server DH Public Key: { 97, 36, 84, 123, 121, 238, 179, 205, 222, 130, 96, 190, 130, 27, 116, 121, 147, 79, 243, 169, 216, 196, 173, 13, 74, 135, 219, 181, 146, 243, 137, 155, 134, 25, 91, 153, 178, 10, 100, 118, 166, 4, 83, 50, 247, 244, 214, 146, 32, 71, 133, 103, 90, 196, 6, 227, 195, 129, 112, 25, 54, 206, 150, 170, 102, 122, 190, 193, 37, 29, 119, 129, 205, 172, 206, 123, 217, 224, 131, 12, 86, 122, 135, 224, 247, 118, 30, 44, 22, 185, 188, 205, 219, 198, 162, 255, 20, 111, 251, 255, 222, 18, 68, 34, 186, 187, 135, 171, 224, 171, 163, 3, 74, 74, 239, 144, 71, 130, 144, 3, 1, 200, 24, 87, 83, 59, 247, 255 } Signature Algorithm SHA256withRSA Signed with a DSA or RSA public key *** ServerHelloDone https-jsse-nio-8443-exec-7, WRITE: TLSv1.2 Handshake, length = 1697 Unsupported extension status_request, data: 01:00:00:00:00 Extension elliptic_curves, curve names: {secp256r1, secp384r1, secp521r1, unknown curve 29, unknown curve 256, unknown curve 257, unknown curve 258, unknown curve 259, unknown curve 260} Extension ec_point_formats, formats: [uncompressed] Extension signature_algorithms, signature_algorithms: SHA256withRSA, Unknown (hash:0x8, signature:0x9), Unknown (hash:0x8, signature:0x4), SHA256withECDSA, Unknown (hash:0x8, signature:0x7), SHA384withRSA, Unknown (hash:0x8, signature:0xa), Unknown (hash:0x8, signature:0x5), SHA384withECDSA, SHA512withRSA, Unknown (hash:0x8, signature:0xb), Unknown (hash:0x8, signature:0x6), SHA512withECDSA, SHA1withRSA, SHA1withECDSA Unsupported extension type_35, data: Unsupported extension type_51, data: 00:69:00:17:00:41:04:f3:f1:fa:8c:d8:db:54:f0:ce:0b:94:f5:03:f9:a5:94:81:41:f7:ad:bf:dd:bb:3c:6c:97:57:85:6f:5e:42:ee:5d:a5:9b:a5:39:cb:2a:e8:45:7f:96:cc:f2:fa:76:b2:9d:3d:36:62:2a:76:94:6d:9f:df:9a:b5:f8:b3:49:f5:00:1d:00:20:56:41:a3:f4:a0:0f:2e:2d:63:79:ff:8b:a7:87:76:a0:2f:68:fb:f6:8f:54:a8:67:c5:50:77:d3:47:7a:f7:30 Unsupported extension type_43, data: 08:03:04:03:03:03:02:03:01 Extension renegotiation_info, renegotiated_connection: <empty> Extension server_name, server_name: [type=host_name (0), value=localhost] Unsupported extension type_45, data: 02:01:00 Unsupported extension type_28, data: 40:00 Unsupported extension type_21, data: 00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00 *** %% Initialized: [Session-50, SSL_NULL_WITH_NULL_NULL] Standard ciphersuite chosen: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 %% Negotiating: [Session-50, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384] *** ServerHello, TLSv1.2 RandomCookie: GMT: 1551699709 bytes = { 18, 88, 171, 251, 100, 242, 33, 84, 66, 22, 218, 54, 217, 56, 148, 138, 93, 215, 79, 37, 196, 75, 38, 4, 202, 218, 105, 49 } Session ID: {92, 125, 15, 253, 224, 128, 197, 188, 177, 250, 115, 207, 150, 244, 22, 145, 238, 62, 23, 97, 97, 77, 240, 160, 72, 36, 39, 200, 168, 156, 77, 18} Cipher Suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 Compression Method: 0 Extension renegotiation_info, renegotiated_connection: <empty> *** Cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 *** Certificate chain https-jsse-nio-8443-exec-8, READ: TLSv1.2 Handshake, length = 134 *** ClientKeyExchange, DH DH Public key: { 101, 50, 236, 168, 1, 251, 117, 64, 161, 70, 96, 91, 71, 214, 229, 182, 176, 128, 225, 114, 39, 35, 174, 231, 6, 141, 41, 147, 48, 95, 88, 24, 30, 22, 29, 212, 117, 54, 85, 108, 148, 37, 92, 185, 98, 174, 57, 49, 7, 170, 191, 67, 175, 224, 88, 228, 202, 217, 193, 68, 56, 126, 140, 192, 245, 199, 30, 226, 97, 182, 94, 163, 47, 15, 83, 229, 250, 73, 228, 55, 241, 245, 228, 175, 227, 187, 69, 33, 97, 97, 174, 246, 203, 156, 78, 17, 103, 20, 31, 242, 211, 25, 171, 175, 139, 192, 111, 116, 85, 152, 20, 39, 52, 128, 127, 1, 158, 242, 106, 66, 136, 143, 36, 191, 252, 195, 181, 157 } 225https-jsse-nio-8443-exec-6, READ: TLSv1.2 Change Cipher Spec, length = 1 https-jsse-nio-8443-exec-6, READ: TLSv1.2 Handshake, length = 40 *** Finished verify_data: { 235, 241, 227, 179, 69, 167, 199, 182, 178, 79, 103, 182 } *** https-jsse-nio-8443-exec-6, WRITE: TLSv1.2 Change Cipher Spec, length = 1 *** Finished verify_data: { 225, 253, 44, 1, 77, 181, 54, 34, 189, 187, 185, 84 } *** https-jsse-nio-8443-exec-10, READ: TLSv1.2 Alert, length = 26 https-jsse-nio-8443-exec-10, RECV TLSv1.2 ALERT: warning, close_notify https-jsse-nio-8443-exec-10, closeInboundInternal() https-jsse-nio-8443-exec-10, closeOutboundInternal() https-jsse-nio-8443-exec-10, SEND TLSv1.2 ALERT: warning, description = close_notify https-jsse-nio-8443-exec-6, WRITE: TLSv1.2 Handshake, length = 40 https-jsse-nio-8443-exec-10, WRITE: TLSv1.2 Alert, length = 26 %% Cached server session: [Session-48, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384] https-jsse-nio-8443-exec-1, WRITE: TLSv1.2 Alert, length = 26 https-jsse-nio-8443-exec-10, called closeOutbound() https-jsse-nio-8443-exec-10, closeOutboundInternal() https-jsse-nio-8443-exec-1, called closeOutbound() https-jsse-nio-8443-exec-1, closeOutboundInternal() , 154, 97, 115, 125, 69, 47, 39, 74, 130, 132, 235, 15, 214, 244, 142, 19, 173, 251, 111, 102, 196, 55, 244, 249, 145, 202 } Session ID: SESSION KEYGEN: PreMaster Secret: 0000: FA 37 87 D1 5D A2 B9 07 41 E5 22 7C 53 5E 18 BF .7..]...A.".S^.. 0010: 14 1E 66 12 1B AA 55 03 E8 89 D7 D0 D9 06 CA B9 ..f...U......... 0020: A1 FA 13 BD CE 14 B5 CB 7C D2 B5 DF D0 1E EE FE ................ 0030: 47 30 73 D6 A0 B2 14 C3 B3 0B 96 2E 19 B5 98 21 G0s............! 0040: CB 0A C0 5E 6C 95 5C 25 A1 C1 FB 78 8C D8 24 75 ...^l.\%...x..$u 0050: 27 1C CB C3 A4 9F 41 F4 58 DC 0B B0 4D E6 42 21 '.....A.X...M.B! 0060: 2D 8D A2 41 51 2E C6 A1 E2 6B C6 5B D2 C1 1D 5D -..AQ....k.[...] 0070: 35 74 48 04 88 EA 3C 38 8C C4 F4 E4 B3 DE 4A F5 5tH...<8......J. CONNECTION KEYGEN: Client Nonce: 0000: 33 87 AB 99 04 D6 95 FE B0 44 9B 4C 82 CE D7 5D 3........D.L...] 0010: A5 A1 B9 53 71 D8 1D 23 D8 58 DC 1A 70 48 C9 C2 ...Sq..#.X..pH.. Server Nonce: 0000: 5C 7D 0F FC 00 4B 9D 5D 4F A7 77 FF 13 BA 20 7A \....K.]O.w... z 0010: A3 E8 A7 80 EB 5C 16 DF 65 96 F8 87 9A 51 7C 49 .....\..e....Q.I Master Secret: 0000: E2 1A DA 76 1E 1C 29 F3 C6 6C 35 30 B5 71 69 1E ...v..)..l50.qi. 0010: 99 8B 65 4E 9B 85 2D C5 6D 6D DF F6 CB CE 0A C5 ..eN..-.mm...... 0020: 32 71 8B 60 49 E0 18 FF 94 35 8C 8D BB 69 72 B0 2q.`I....5...ir. ... no MAC keys used for this cipher Client write key: 0000: F3 FD F7 7D A8 54 69 E5 E9 9C 0E 77 AF 17 CF 3B .....Ti....w...; 0010: 9C 41 A0 2B 3A FE FC 80 FF E7 2E F0 4E D1 6E B5 .A.+:.......N.n. Server write key: 0000: 1E C2 68 75 82 20 08 36 DF 95 7B B2 3A B3 88 CF ..hu. .6....:... 0010: C5 73 48 0C 50 61 B3 A5 A1 B4 73 57 DD 67 ED 20 .sH.Pa....sW.g. Client write IV: 0000: 09 57 C6 0E .W.. Server write IV: 0000: 87 49 96 4F .I.O chain [0] = [ [ Version: V3 Subject: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5 Key: Sun RSA public key, 2048 bits modulus: 21944740401167172627731583459321030363948627215746053925732477915060915436180167456469785746662093119306577380200747716284652995937004530444336851845029170241627465854006145050037178991946925696078563485570896673835545540824265905937881682387179314987285174428010940266412458943894800978345731524307952507729956745301047871771953945124256516782917326981125087548987889540650149121302888872237484100834740328828765018090383963294418357028839734723410564800765871733483849269364796949055153420777966213779145518299141217288017794394762274753999989298548507425930217302947589819396239489846633419099079578249651345685751 public exponent: 65537 Validity: [From: Fri May 30 08:43:19 GMT 2014, To: Mon May 27 08:43:19 GMT 2024] Issuer: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US SerialNumber: [ a6ef7a9a 5368eb27] Certificate Extensions: 3 [1]: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: 78 0D 96 9D FE D3 0B BE 8C C7 E3 EC 67 04 AB 4B x...........g..K 0010: EA E0 00 29 ...) ] ] [2]: ObjectId: 2.5.29.19 Criticality=false BasicConstraints:[ CA:true PathLen:2147483647 ] [3]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 78 0D 96 9D FE D3 0B BE 8C C7 E3 EC 67 04 AB 4B x...........g..K 0010: EA E0 00 29 ...) ] ] ] Algorithm: [SHA1withRSA] Signature: 0000: 19 16 5A 21 99 21 24 98 3C 0A E8 D8 00 AB 44 24 ..Z!.!$.<.....D$ 0010: F2 0C B7 83 D5 9F 96 17 87 E2 1F 1D A3 47 68 C7 .............Gh. 0020: 68 4A CB 56 0E 77 2B E8 1A 9F E7 09 A1 19 77 D0 hJ.V.w+.......w. 0030: 5E CC C1 B3 9A C4 35 3D CB E0 A5 A6 43 5D A3 26 ^.....5=....C].& 0040: A4 91 8A C1 FA 7B 10 EA DC C3 C7 1C 47 DC 97 32 ............G..2 0050: C0 37 80 1C F1 42 10 E3 74 17 FA 3E 60 4A B7 59 .7...B..t..>`J.Y 0060: 92 C1 E0 6F BB F1 BB 9F 82 89 B5 83 D5 AE 1E 90 ...o............ 0070: 0A 89 8D FB 4C C0 C5 9E DC C5 8C C6 2F EE D9 B4 ....L......./... 0080: 95 47 27 2E BE 82 31 6F 76 C0 DB 4C C8 0D 3B 7B .G'...1ov..L..;. 0090: D1 6A BF BD 3B 93 30 04 A2 9E 81 F7 96 28 77 F2 .j..;.0......(w. 00A0: 32 05 68 44 1F B3 30 CE 40 9F 20 F3 B4 2B AA E6 2.hD..0.@. ..+.. 00B0: 40 9B FB 7F 34 6E 3A 99 FD F8 28 F1 8C 9B 56 34 @...4n:...(...V4 00C0: 64 AD 4D 56 39 CB 96 18 50 9B 99 43 80 0A 39 A5 d.MV9...P..C..9. 00D0: 13 7A 6E C5 25 E0 95 4A 92 E5 A8 8B EE 03 49 B4 .zn.%..J......I. 00E0: D9 7C 00 E3 F0 3B A7 BA 40 30 CC 89 55 C6 97 93 .....;..@0..U... 00F0: B5 15 F6 62 D3 B1 74 9C 0B 80 2B 8A D4 03 84 A0 ...b..t...+..... ] *** https-jsse-nio-8443-exec-8, READ: TLSv1.2 Change Cipher Spec, length = 1 https-jsse-nio-8443-exec-8, READ: TLSv1.2 Handshake, length = 40 *** Finished verify_data: { 10, 53, 247, 166, 142, 77, 31, 81, 166, 159, 56, 211 } *** https-jsse-nio-8443-exec-8, WRITE: TLSv1.2 Change Cipher Spec, length = 1 *** Finished verify_data: { 198, 142, 179, 40, 86, 48, 71, 116, 207, 72, 152, 246 } *** https-jsse-nio-8443-exec-5, WRITE: TLSv1.2 Application Data, length = 85 {92, 125, 15, 252, 183, 75, 178, 236, 226, 204, 161, 47, 115, 81, 131, 38, 245, 192, 251, 58, 104, 31, 211, 99, 47, 3, 254, 150, 238, 150, 255, 17} Cipher Suites: [Unknown 0x13:0x2, Unknown 0x13:0x3, Unknown 0x13:0x1, Unknown 0x13:0x4, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa9, Unknown 0xc0:0xad, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0xac, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa8, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xc0:0x9d, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9c, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xaa, Unknown 0xc0:0x9f, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9e, TLS_DHE_RSA_WITH_AES_128_CBC_SHA] Compression Methods: { 0 } Unsupported extension status_request, data: 01:00:00:00:00 Extension elliptic_curves, curve names: {secp256r1, secp384r1, secp521r1, unknown curve 29, unknown curve 256, unknown curve 257, unknown curve 258, unknown curve 259, unknown curve 260} Extension ec_point_formats, formats: [uncompressed] Extension signature_algorithms, signature_algorithms: SHA256withRSA, Unknown (hash:0x8, signature:0x9), Unknown (hash:0x8, signature:0x4), SHA256withECDSA, Unknown (hash:0x8, signature:0x7), SHA384withRSA, Unknown (hash:0x8, signature:0xa), Unknown (hash:0x8, signature:0x5), SHA384withECDSA, SHA512withRSA, Unknown (hash:0x8, signature:0xb), Unknown (hash:0x8, signature:0x6), SHA512withECDSA, SHA1withRSA, SHA1withECDSA Unsupported extension type_35, data: Unsupported extension type_51, data: 00:69:00:17:00:41:04:5a:81:b4:bf:01:3e:d3:6e:82:f3:32:3d:23:cb:21:0c:7a:9d:f5:9c:a3:ef:eb:03:34:d0:b9:8b:92:74:61:b1:6f:02:e1:2f:33:d7:79:8a:ff:84:c0:b1:d8:1f:ae:6c:a1:5d:13:13:61:a5:a0:a5:af:1e:25:ac:94:6a:64:56:00:1d:00:20:66:f0:b7:e5:f3:ad:54:9e:b0:be:7f:da:72:ca:e8:6f:ae:fe:21:e4:07:2a:48:f5:ec:f3:b6:9b:b4:44:26:08 Unsupported extension type_43, data: 08:03:04:03:03:03:02:03:01 Extension renegotiation_info, renegotiated_connection: <empty> Extension server_name, server_name: [type=host_name (0), value=localhost] Unsupported extension type_45, data: 02:01:00 Unsupported extension type_28, data: 40:00 Unsupported extension type_21, data: 00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00 *** *** Diffie-Hellman ServerKeyExchange DH Modulus: { 255, 255, 255, 255, 255, 255, 255, 255, 201, 15, 218, 162, 33, 104, 194, 52, 196, 198, 98, 139, 128, 220, 28, 209, 41, 2, 78, 8, 138, 103, 204, 116, 2, 11, 190, 166, 59, 19, 155, 34, 81, 74, 8, 121, 142https-jsse-nio-8443-exec-8, WRITE: TLSv1.2 Handshake, length = 40 , 52, 4, 221https-jsse-nio-8443-exec-9, READ: TLSv1.2 Alert, length = 26 , 239, 149, 25, 179, 205, 58, 67, 27, 48, 43, 10, 109, 242, 95, 20, 55, 79, 225, 53, 109, 109, 81, 194, 69, 228, 133, https-jsse-nio-8443-exec-9, RECV TLSv1.2 ALERT: warning, close_notify 181, https-jsse-nio-8443-exec-9, closeInboundInternal() 118, https-jsse-nio-8443-exec-9, closeOutboundInternal() 98, 94, 126, 198, 244, 76, 66, 233, 166, 55, 237, 107https-jsse-nio-8443-exec-9, SEND TLSv1.2 ALERT: warning, description = close_notify , 11, 255, 92, 182, 244, 6, 183, 237, 238, 56, https-jsse-nio-8443-exec-9, WRITE: TLSv1.2 Alert, length = 26 107, 251, 90, 137, 159, 165, 174, 159, 36, 17, 124, 75, 31, 230, 73, 40, 102, 81, 236, 230, 83, 129, 255, 255, 255, 255, 255, 255, 255, 255 } %% Initialized: [Session-51, SSL_NULL_WITH_NULL_NULL] DH Base: { 2 } Server DH Public Key: { 212, 187, 90, 201, 59, 246, 179, 172, 157, 160, 233%% Cached server session: [Session-49, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384] https-jsse-nio-8443-exec-9, called closeOutbound() https-jsse-nio-8443-exec-9, closeOutboundInternal() , 36, 72, 30, 143, 242, 54, 202, 167, 169, 206, 61, 162, 163, 112, 4, 130, 245, 251, 249, 185, 50, 168, 158, 117, 23, 147, 150, 31, 190, 71, 154, 54, 190, 124, 20, 67, 220, 51, 29, 197, 194, 80, 93, 228, 24, 155, 138, 102, 254, 169, 238, 0, 134, 31, 177, 151, 202, 134, 210, 89, 106, 65, 123, 174, 6, 251, 141, 12, 243, 94, 203, 61, 113, 240, 185, 242, 73, 46, 220, 50, 159, 75, 14, 191, 142, 155, 245, 117, 58, 150, 151, 226, 114, 211, 14, 252, 111, 92, 167, 97, 217, 110, 204, 27, 184, 9, 118, 112, 106, 192, 125, 78, 253, 38, 186, 163, 86 } Signature Algorithm SHA256withRSA Signed with a DSA or RSA public key *** ServerHelloDone https-jsse-nio-8443-exec-3, WRITE: TLSv1.2 Handshake, length = 1697 Standard ciphersuite chosen: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 %% Negotiating: [Session-51, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384] *** ServerHello, TLSv1.2 RandomCookie: GMT: 1551699709 bytes = { 161, 118, 159, 159, 72, 213, 176, 227, 174, 253, 219, 28, 30, 221, 139, 23, 73, 124, 148, 24, 52, 181, 71, 92, 132, 200, 34, 17 } Session ID: {92, 125, 15, 253, 71, 52, 55, 19, 191, 150, 68, 149, 56, 88, 7, 49, 158, 192, 182, 26, 156, 32, 177, 105, 111, 27, 122, 57, 7, 87, 54, 247} Cipher Suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 Compression Method: 0 Extension renegotiation_info, renegotiated_connection: <empty> *** Cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 *** Certificate chain chain [0] = [ [ Version: V3 Subject: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5 Key: Sun RSA public key, 2048 bits modulus: 21944740401167172627731583459321030363948627215746053925732477915060915436180167456469785746662093119306577380200747716284652995937004530444336851845029170241627465854006145050037178991946925696078563485570896673835545540824265905937881682387179314987285174428010940266412458943894800978345731524307952507729956745301047871771953945124256516782917326981125087548987889540650149121302888872237484100834740328828765018090383963294418357028839734723410564800765871733483849269364796949055153420777966213779145518299141217288017794394762274753999989298548507425930217302947589819396239489846633419099079578249651345685751 public exponent: 65537 Validity: [From: Fri May 30 08:43:19 GMT 2014, To: Mon May 27 08:43:19 GMT 2024] Issuer: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US SerialNumber: [ a6ef7a9a 5368eb27] Certificate Extensions: 3 [1]: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: 78 0D 96 9D FE D3 0B BE 8C C7 E3 EC 67 04 AB 4B x...........g..K 0010: EA E0 00 29 ...) ] ] [2]: ObjectId: 2.5.29.19 Criticality=false BasicConstraints:[ CA:true PathLen:2147483647 ] [3]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 78 0D 96 9D FE D3 0B BE 8C C7 E3 EC 67 04 AB 4B x...........g..K 0010: EA E0 00 29 ...) ] ] ] Algorithm: [SHA1withRSA] Signature: 0000: 19 16 5A 21 99 21 24 98 3C 0A E8 D8 00 AB 44 24 ..Z!.!$.<.....D$ 0010: F2 0C B7 83 D5 9F 96 17 87 E2 1F 1D A3 47 68 C7 .............Gh. 0020: 68 4A CB 56 0E 77 2B E8 1A 9F E7 09 A1 19 77 D0 hJ.V.w+.......w. 0030: 5E CC C1 B3 9A C4 35 3D CB E0 A5 A6 43 5D A3 26 ^.....5=....C].& 0040: A4 91 8A C1 FA 7B 10 EA DC C3 C7 1C 47 DC 97 32 ............G..2 0050: C0 37 80 1C F1 42 10 E3 74 17 FA 3E 60 4A B7 59 .7...B..t..>`J.Y 0060: 92 C1 E0 6F BB F1 BB 9F 82 89 B5 83 D5 AE 1E 90 ...o............ 0070: 0A 89 8D FB 4C C0 C5 9E DC C5 8C C6 2F EE D9 B4 ....L......./... 0080: 95 47 27 2E BE 82 31 6F 76 C0 DB 4C C8 0D 3B 7B .G'...1ov..L..;. 0090: D1 6A BF BD 3B 93 30 04 A2 9E 81 F7 96 28 77 F2 .j..;.0......(w. 00A0: 32 05 68 44 1F B3 30 CE 40 9F 20 F3 B4 2B AA E6 2.hD..0.@. ..+.. 00B0: 40 9B FB 7F 34 6E 3A 99 FD F8 28 F1 8C 9B 56 34 @...4n:...(...V4 00C0: 64 AD 4D 56 39 CB 96 18 50 9B 99 43 80 0A 39 A5 d.MV9...P..C..9. 00D0: 13 7A 6E C5 25 E0 95 4A 92 E5 A8 8B EE 03 49 B4 .zn.%..J......I. 00E0: D9 7C 00 E3 F0 3B A7 BA 40 30 CC 89 55 C6 97 93 .....;..@0..U... 00F0: B5 15 F6 62 D3 B1 74 9C 0B 80 2B 8A D4 03 84 A0 ...b..t...+..... ] *** https-jsse-nio-8443-exec-7, WRITE: TLSv1.2 Application Data, length = 85 Using SSLEngineImpl. https-jsse-nio-8443-exec-1, READ: TLSv1.2 Handshake, length = 134 *** ClientKeyExchange, DH DH Public key: { 101, 170, 38, 209, 198, 232, 93, 161, 22, 237, 112, 129, 195, 85, 33, 231, 30, 31, 245, 172, 251, 102, 211, 41, 26, 17, 100, 41, 167, 188, 77, 236, 161, 216, 242, 44, 88, 237, 169, 232, 72, 38, 33, 229, 60, 128, 239, 232, 137, 41, 208, 15, 89, 141, 97, 227, 112, 162, 180, 242, 5, 30, 84, 82, 67, 118, 34, 213, 233, 27, 254, 161, 20, 4, 209, 152, 158, 203, 96, 238, 104, 180, 45, 100, 57, 48, 199, 212, 168, 199, 82, 130, 199, 78, 212, 3, 71, 138, 136, 176, 62, 175, 116, 95, 83, 81, 136, 38, 183, 76, 139, 39, 127, 42, 72, 60, 34, 231, 182, 209, 129, 134, 219, 54, 244, 6, 101, 64 } SESSION KEYGEN: PreMaster Secret: 0000: EB 78 D0 54 B5 1D 95 4C BC 07 1E B2 A1 B6 F5 1B .x.T...L........ 0010: 78 59 F7 E4 BF 15 04 7C FE 8F 45 16 76 1C F2 60 xY........E.v..` 0020: C6 EF C2 79 26 5E 8F DF F1 DC 6B 9C 91 6B AC AF ...y&^....k..k.. 0030: 57 26 DC 4E 14 85 98 1E E7 E0 2A 2E 07 41 B0 B4 W&.N......*..A.. 0040*** Diffie-Hellman ServerKeyExchange DH Modulus: { 255, 255, 255, 255, 255, 255, 255, 255, 201, 15, 218, 162, 33, 104, 194, 52, 196, 198, 98, 139, 128: 81 51 70 A5 02 94 58 35 2C 08 89 BB 49 97 DB C2 .Qp...X5,...I... 0050: 93 5C EE FA 8A 12 60 C4 E8 95 93 1B 16 D4 CF F4 .\....`......... 0060: F9 40 44 61 61 D4 3A 5E 7C 6A CE A8 37 9D 49 FD .@Daa.:^.j..7.I. 0070: DC C2 52 E5 F1 5D 84 2E E1 8B C3 0A B6 9C E9 A0 ..R..].......... https-jsse-nio-8443-exec-5, READ: TLSv1.2 Alert, length = 26 Allow unsafe renegotiation: false Allow legacy hello messages: true Is initial handshake: true Is secure renegotiation: false Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1 , 220, 28, 209, 41, 2, 78, 8, 138, 103, 204, 116, 2, 11, 190, 166, 59, 19, 155, 34, 81, 74, 8, 121, 142, 52, 4, 221, 239, 149, 25, 179, 205, 58, 67, 27, 48, 43, 10, 109, 242, 95, 20, 55, 79, 225, 53, 109, 109, 81, 194, 69, 228, 133, 181, 118, 98, 94, 126, 198, 244, 76, 66, 233, 166, 55, 237, 107, 11, 255, 92, 182, 244, 6, 183, 237, 238, 56, 107, 251, 90, 137, 159, 165, 174, 159, 36, 17, 124, 75, 31, 230, 73, 40, 102, 81, 236, 230, 83, 129, 255, 255, 255, 255, 255, 255, 255, 255 } DH Base: { 2 } Server DH Public Key: { 45, 220, 192, 14, 237, 101, 8, 1, 55, 159, 0, 25, 241, 65, 206, 132, 55, 147, 40, 255, 232, 233, 211, 60, 199, 1, 154, 34, 208, 174, 50, 65, 176, 183, 235, 184, 54, 237, 153, 206, 111, 194, 218, 250, 223, 173, 174, 239, 156, 2, 220, 132, 173, 38, 145, 133, 23, 42, 144, 248, 166, 6, 162, 56, 5, 228, 159, 66, 167, 216, 247, 93, 114, 85, 250, 107, 248, 100, 249, 21, 182, 45, 8, 91, 162, 15, 69, 197, 213, 104, 227, 13, 203, 248, 83, 229, 202, 103, 196, 123, 16, 114, 144, 126, 73, 106, 63, 187, 210, 28, 200, 167, 124, 127, 70, 21, 214, 186, 194, 162, 215, 145, 124, 194, 73, 26, 230, 215 } https-jsse-nio-8443-exec-5, RECV TLSv1.2 ALERT: warning, close_notify https-jsse-nio-8443-exec-5, closeInboundInternal() https-jsse-nio-8443-exec-5, closeOutboundInternal() Signature Algorithm SHA256withRSA Signed with a DSA or RSA public key Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1.1 *** ServerHelloDone CONNECTION KEYGEN: Client Nonce: 0000: 16 29 FA 0D 46 C9 C2 BA 20 6D 7F D4 25 0C 2A A3 .)..F... m..%.*. 0010: 95 7F 80 58 FA 43 50 AE 05 09 79 6D F7 A3 8A 40 ...X.CP...ym...@ Server Nonce: 0000: 5C 7D 0F FD 12 58 AB FB 64 F2 21 54 42 16 DA 36 \....X..d.!TB..6 0010: D9 38 94 8A 5D D7 4F 25 C4 4B 26 04 CA DA 69 31 .8..].O%.K&...i1 Master Secret: 0000: 3F 25 7B C1 90 3A 4B E3 D2 F1 7C 91 14 EC 18 EA ?%...:K......... 0010: 62 18 68 D2 8F C4 18 CB E9 95 46 6F 7A 9F 10 53 b.h.......Foz..S 0020: 8B 62 8D 27 B0 66 7B A7 DE B3 54 63 D4 C4 97 EE .b.'.f....Tc.... ... no MAC keys used for this cipher Client write key: 0000: 8F B8 62 76 97 B9 75 59 5C 9A 7F 7A A3 F9 94 D4 ..bv..uY\..z.... 0010: E9 86 BA 6F 11 97 B7 9A AE 0A 24 EE DB 9D BB 20 ...o......$.... Server write key: 0000: E9 9B D0 72 14 21 08 6E 59 0E A6 51 A9 F4 D7 D1 ...r.!.nY..Q.... 0010: 24 09 DD 6E 53 45 58 80 6A 17 E5 36 3C 7D 80 08 $..nSEX.j..6<... Client write IV: 0000: B7 A3 13 09 .... Server write IV: 0000: 2A 4A 17 B8 *J.. https-jsse-nio-8443-exec-2, WRITE: TLSv1.2 Handshake, length = 1697 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1.1 https-jsse-nio-8443-exec-5, SEND TLSv1.2 ALERT: warning, description = close_notify Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1.1 https-jsse-nio-8443-exec-5, WRITE: TLSv1.2 Alert, length = 26 https-jsse-nio-8443-exec-5, called closeOutbound() https-jsse-nio-8443-exec-5, closeOutboundInternal() https-jsse-nio-8443-exec-1, READ: TLSv1.2 Change Cipher Spec, length = 1 https-jsse-nio-8443-exec-1, READ: TLSv1.2 Handshake, length = 40 *** Finished verify_data: { 86, 19, 72, 70, 83, 132, 23, 39, 7, 5, 2, 151 } *** https-jsse-nio-8443-exec-1, WRITE: TLSv1.2 Change Cipher Spec, length = 1 *** Finished verify_data: { 25, 14, 247, 250, 10, 179, 159, 214, 170, 52, 96, 106 } *** https-jsse-nio-8443-exec-4, READ: TLSv1 Handshake, length = 512 https-jsse-nio-8443-exec-9, READ: TLSv1.2 Handshake, length = 134 *** ClientKeyExchange, DH DH Public key: { https-jsse-nio-8443-exec-1, WRITE: TLSv1.2 Handshake, length = 40 123, 251, 82, 142, 67, 118, 250, 165, 186, 199, 46, 242, 163, 20, 165, 218, 144, 71, 185, 24, 82, 223, 70, 150, 163, 84, 203, 75, 13, 254, 7, 147, 122, 211, 182, 62, 179, 120, 212, 105, 15, 38, 225, 81, 35, 15, 202, 196, 246, 195, 53, 75, 85, 215, 41, 95, 124, 156, 137, 224, 139, 207, 47, 19, 100, 155, 5, 41, 86, 146, 29, 15, 29, 243, 160, 24, 150, 83, 172, 56, 182, 1, 13, 146, 94, 250, 143, 229, 77, 126, 223, 150, 228, 94, 229, 172, 90, 174, 152, 17, 253, 232, 40, 247, 8, 125, 203, 82, 157, 223, 196, 106, 163, 162, 98, 88, 81, 217, 63, 147, 107, 231, 191, 113, 249, 20, 87, 155 } %% Cached server session: [Session-50, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384] *** ClientHello, TLSv1.2 RandomCookie: GMT: 177259230 bytes = { 115, 130, 237, 105, 43, 69, 29, 251, 221, 224, 124, 0, 154, 40, 218, 98, 124, 37, 167, 155, 24, 45, 205, 228, 146, 160, 193, 158 } Session ID: {92, 125, 15, 252, 253, 51, 152, 0, 104, 161, 63, 9, 70, 98, 196, 252, 42, 141, 176, 24, 10, 171, 244, 105, 60, 139, 248, 0, 175, 70, 119, 188} Cipher Suites: [Unknown 0x13:0x2, Unknown 0x13:0x3, Unknown 0x13:0x1, Unknown 0x13:0x4, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa9, Unknown 0xc0:0xad, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0xac, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa8, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xc0:0x9d, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9c, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xaa, Unknown 0xc0:0x9f, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9e, TLS_DHE_RSA_WITH_AES_128_CBC_SHA] Compression Methods: { 0 } Unsupported extension status_request, data: 01:00:00:00:00 Extension elliptic_curves, curve names: {secp256r1, secp384r1, secp521r1, unknown curve 29, unknown curve 256, unknown curve 257, unknown curve 258, unknown curve 259, unknown curve 260} Extension ec_point_formats, formats: [uncompressed] Extension signature_algorithms, signature_algorithms: SHA256withRSA, Unknown (hash:0x8, signature:0x9), Unknown (hash:0x8, signature:0x4), SHA256withECDSA, Unknown (hash:0x8, signature:0x7), SHA384withRSA, Unknown (hash:0x8, signature:0xa), Unknown (hash:0x8, signature:0x5), SHA384withECDSA, SHA512withRSA, Unknown (hash:0x8, signature:0xb), Unknown (hash:0x8, signature:0x6), SHA512withECDSA, SHA1withRSA, SHA1withECDSA Unsupported extension type_35, data: Unsupported extension type_51, data: 00:69:00:17:00:41:04:15:90:3b:71:95:67:36:2f:52:2c:49:8c:4b:d0:5a:04:42:55:86:a8:cf:f7:ca:fc:6b:fe:1d:a4:80:24:82:58:17:54:c6:70:24:48:1a:74:95:c0:b4:4b:14:41:e4:6a:b0:4e:9a:4f:e1:f6:4d:fe:52:ca:d1:bd:61:50:1c:30:00:1d:00:20:f6:27:3f:36:df:58:1e:dd:80:d9:7d:00:cf:4b:95:d9:b9:8c:9c:5d:a6:90:49:94:43:67:83:28:b1:67:af:21 Unsupported extension type_43, data: 08:03:04:03:03:03:02:03:01 Extension renegotiation_info, renegotiated_connection: <empty> Extension server_name, server_name: [type=host_name (0), value=localhost] Unsupported extension type_45, data: 02:01:00 Unsupported extension type_28, data: 40:00 Unsupported extension type_21, data: 00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00 *** %% Initialized: [Session-52, SSL_NULL_WITH_NULL_NULL] SESSION KEYGEN: PreMaster Secret: 0000: EB B0 BB 97 27 E6 30 DB F1 08 E1 77 E7 06 04 61 ....'.0....w...a 0010: EE C4 07 C7 21 5F E2 F3 F2 36 CE 32 DE 39 71 1A ....!_...6.2.9q. 0020: 03 4C 13 A8 E4 3D E9 19 34 A9 D5 50 24 0E 17 54 .L...=..4..P$..T 0030: 3A 8B 45 64 E4 F4 21 1E 62 8E 12 6C 9D E3 9E EF :.Ed..!.b..l.... 0040: 79 40 BF 83 E9 6D E9 34 CC 53 8E C6 41 DF 06 A0 y@...m.4.S..A... 0050: B2 D0 24 0E CE 4F 32 3C C5 E9 7B 20 A0 35 E7 C4 ..$..O2<... .5.. 0060: 10 58 FC 55 51 95Standard ciphersuite chosen: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 44 C7 EC EE 5D C2 08 DB CD 41 .X.UQ.D...]....A 0070: A0 B1 FF 8A 28 72 7F 90 C8 98 4B C8 41 EF 14 AC ....(r....K.A... %% Negotiating: [Session-52, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384] *** ServerHello, TLSv1.2 RandomCookie: GMT: 1551699709 bytes = { 194, 201, 87, 89, 244, 45, 171, 211, 104, 20, 128, 113, 133, 249, 160, 224, 144, 3, 20, 174, 15, 155, 81, 154, 149, 224, 84, 17 } Session ID: CONNECTION KEYGEN: Client Nonce: 0000: AA 7A 6B 24 DE E1 9A 61 73 7D 45 2F 27 4A 82 84 .zk$...as.E/'J.. 0010: EB 0F D6 F4 8E 13 AD FB 6F 66 C4 37 F4 F9 91 CA ........of.7.... Server Nonce: 0000: 5C 7D 0F FD A1 76 9F 9F 48 D5 B0 E3 AE FD DB 1C \....v..H....... 0010: 1E DD 8B 17 49 7C 94 18 34 B5 47 5C 84 C8 22 11 ....I...4.G\..". Master Secret: 0000: B5 5C 35 49 03 4A ED A6 0E 8E 57 23 E6 FE 6C 4A .\5I.J....W#..lJ 0010: 1A 5C D5 2E 42 BB FA 99 F8 01 1E CA 61 2F 92 D8 .\..B.......a/.. 0020: 37 B9 EE 82 5E 2A 6C DD E5 2F 22 87 89 6F DF 2E 7...^*l../"..o.. ... no MAC keys used for this cipher Client write key: 0000: 1B CB 6B 1F A2 44 8F D7 7D 23 04 0F D1 FA 03 57 ..k..D...#.....W 0010: 57 83 4D 61 F7 FA AE 44 BE A2 F8 1F F1 8E 36 16 W.Ma...D......6. Server write key: 0000: 9F A2 EA E9 6E EC 6C 8F 9D B9 7F 79 3E 92 F9 B5 ....n.l....y>... 0010: C5 E5 1B A3 16 9D 90 5A 51 DC 1A 81 DB CF 72 DF .......ZQ.....r. Client write IV: 0000: E3 9D E4 97 .... Server write IV: 0000: A7 E1 7C 35 ...5 https-jsse-nio-8443-exec-3, WRITE: TLSv1.2 Application Data, length = 85 {92, 125, 15, 253, 197, 233, 46, 155, 150, 88, 74, 241, 255, 108, 90, 40, 17, 146, 237, 153, 172, 11, 47, 81, 254, 193, 205, 249, 150, 192, 196, 9} Cipher Suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 Compression Method: 0 Extension renegotiation_info, renegotiated_connection: <empty> *** Cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 *** Certificate chain https-jsse-nio-8443-exec-9, READ: TLSv1.2 Change Cipher Spec, length = 1 https-jsse-nio-8443-exec-6, READ: TLSv1.2 Alert, length = 26 https-jsse-nio-8443-exec-6, RECV TLSv1.2 ALERT: warning, close_notify https-jsse-nio-8443-exec-6, closeInboundInternal() https-jsse-nio-8443-exec-6, closeOutboundInternal() https-jsse-nio-8443-exec-6, SEND TLSv1.2 ALERT: warning, description = close_notify https-jsse-nio-8443-exec-6, WRITE: TLSv1.2 Alert, length = 26 chain [0] = [ [ Version: V3 Subject: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5 Key: Sun RSA public key, 2048 bits modulus: 21944740401167172627731583459321030363948627215746053925732477915060915436180167456469785746662093119306577380200747716284652995937004530444336851845029170241627465854006145050037178991946925696078563485570896673835545540824265905937881682387179314987285174428010940266412458943894800978345731524307952507729956745301047871771953945124256516782917326981125087548987889540650149121302888872237484100834740328828765018090383963294418357028839734723410564800765871733483849269364796949055153420777966213779145518299141217288017794394762274753999989298548507425930217302947589819396239489846633419099079578249651345685751 public exponent: 65537 Validity: [From: Fri May 30 08:43:19 GMT 2014, To: Mon May 27 08:43:19 GMT 2024] Issuer: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US SerialNumber: [ a6ef7a9a 5368eb27] Certificate Extensions: 3 [1]: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: 78 0D 96 9D FE D3 0B BE 8C C7 E3 EC 67 04 AB 4B x...........g..K 0010: EA E0 00 29 ...) ] ] [2]: ObjectId: 2.5.29.19 Criticality=false BasicConstraints:[ CA:true PathLen:2147483647 ] [3]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 78 0D 96 9D FE D3 0B BE 8C C7 E3 EC 67 04 AB 4B x...........g..K 0010: EA E0 00 29 ...) ] ] ] Algorithm: [SHA1withRSA] Signature: 0000: 19 16 5A 21 99 21 24 98 3C 0A E8 D8 00 AB 44 24 ..Z!.!$.<.....D$ 0010: F2 0C B7 83 D5 9F 96 17 87 E2 1F 1D A3 47 68 C7 .............Gh. 0020: 68 4A CB 56 0E 77 2B E8 1A 9F E7 09 A1 19 77 D0 hJ.V.w+.......w. 0030: 5E CC C1 B3 9A C4 35 3D CB E0 A5 A6 43 5D A3 26 ^.....5=....C].& 0040: A4 91 8A C1 FA 7B 10 EA DC C3 C7 1C 47 DC 97 32 ............G..2 0050: C0 37 80 1C F1 42 10 E3 74 17 FA 3E 60 4A B7 59 .7...B..t..>`J.Y 0060: 92 C1 E0 6F BB F1 BB 9F 82 89 B5 83 D5 AE 1E 90 ...o............ 0070: 0A 89 8D FB 4C C0 C5 9E DC C5 8C C6 2F EE D9 B4 ....L......./... 0080: 95 47 27 2E BE 82 31 6F 76 C0 DB 4C C8 0D 3B 7B .G'...1ov..L..;. 0090: D1 6A BF BD 3B 93 30 04 A2 9E 81 F7 96 28 77 F2 .j..;.0......(w. 00A0: 32 05 68 44 1F B3 30 CE 40 9F 20 F3 B4 2B AA E6 2.hD..0.@. ..+.. 00B0: 40 9B FB 7F 34 6E 3A 99 FD F8 28 F1 8C 9B 56 34 @...4n:...(...V4 00C0: 64 AD 4D 56 39 CB 96 18 50 9B 99 43 80 0A 39 A5 d.MV9...P..C..9. 00D0: 13 7A 6E C5 25 E0 95 4A 92 E5 A8 8B EE 03 49 B4 .zn.%..J......I. 00E0: D9 7C 00 E3 F0 3B A7 BA 40 30 CC 89 55 C6 97 93 .....;..@0..U... 00F0: B5 15 F6 62 D3 B1 74 9C 0B 80 2B 8A D4 03 84 A0 ...b..t...+..... ] *** https-jsse-nio-8443-exec-9, READ: TLSv1.2 Handshake, length = 40 https-jsse-nio-8443-exec-6, called closeOutbound() https-jsse-nio-8443-exec-6, closeOutboundInternal() *** Finished verify_data: { 71, 100, 153, 26, 126, 74, 34, 86, 18, 249, 145, 73 } *** https-jsse-nio-8443-exec-9, WRITE: TLSv1.2 Change Cipher Spec, length = 1 *** Finished verify_data: { 85, 10, 24, 152, 98, 90, 24, 11, 158, 154, 250, 70 } *** https-jsse-nio-8443-exec-9, WRITE: TLSv1.2 Handshake, length = 40 %% Cached server session: [Session-51, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384] https-jsse-nio-8443-exec-2, WRITE: TLSv1.2 Application Data, length = 84 https-jsse-nio-8443-exec-2, READ: TLSv1.2 Alert, length = 26 https-jsse-nio-8443-exec-2, RECV TLSv1.2 ALERT: warning, close_notify https-jsse-nio-8443-exec-2, closeInboundInternal() https-jsse-nio-8443-exec-2, closeOutboundInternal() https-jsse-nio-8443-exec-2, SEND TLSv1.2 ALERT: warning, description = close_notify https-jsse-nio-8443-exec-2, WRITE: TLSv1.2 Alert, length = 26 https-jsse-nio-8443-exec-2, called closeOutbound() https-jsse-nio-8443-exec-2, closeOutboundInternal() *** Diffie-Hellman ServerKeyExchange DH Modulus: { 255, 255, 255, 255, 255, 255, 255, 255, 201, 15, 218, 162, 33, 104, 194, 52, 196, 198, 98, 139, 128, 220, 28, 209, 41, 2, 78, 8, 138, 103, 204, 116, 2, 11, 190, 166, 59, 19, 155, 34, 81, 74, 8, 121, 142, 52, 4, 221, 239, 149, 25, 179, 205, 58, 67, 27, 48, 43, 10, 109, 242, 95, 20, 55, 79, 225, 53, 109, 109, 81, 194, 69, 228, 133, 181, 118, 98, 94, 126, 198, 244, 76, 66, 233, 166, 55, 237, 107, 11, 255, 92, 182, 244, 6, 183, 237, 238, 56, 107, 251, 90, 137, 159, 165, 174, 159, 36, 17, 124, 75, 31, 230, 73, 40, 102, 81, 236, 230, 83, 129, 255, 255, 255, 255, 255, 255, 255, 255 } DH Base: { 2 } Server DH Public Key: { 27, 139, 247, 62, 42, 113, 171, 227, 63, 200, 68, 252, 153, 195, 90, 124, 244, 205, 219, 117, 152, 30, 7, 170, 35, 173, 90, 52, 201, 222, 53, 122, 249, 232, 221, 88, 53, 110, 12, 109, 133, 179, 195, 221, 95, 126, 143, 54, 27, 208, 154, 242, 32, 120, 105, 12, 73, 41, 216, 95, 31, 91, 68, 83, 11, 56, 67, 199, 67, 159, 238, 77, 125, 206, 129, 169, 1, 213, 43, 179, 31, 91, 152, 58, 68, 234, 78, 246, 33, 209, 250, 187, 234, 249, 80, 197, 226, 233, 14, 45, 254, 27, 233, 150, 131, 27, 214, 204, 107, 80, 250, 44, 61, 124, 26, 7, 128, 229, 109, 243, 198, 204, 45, 172, 138, 122, 47, 62 } Signature Algorithm SHA256withRSA Signed with a DSA or RSA public key *** ServerHelloDone https-jsse-nio-8443-exec-4, WRITE: TLSv1.2 Handshake, length = 1697 https-jsse-nio-8443-exec-5, READ: TLSv1.2 Handshake, length = 134 *** ClientKeyExchange, DH DH Public key: { 162, 145, 217, 26, 54, 67, 227, 54, 194, 56, 47, 158, 106, 25, 211, 152, 16, 34, 177, 59, 198, 164, 138, 219, 158, 71, 124, 178, 91, 140, 130, 16, 61, 184, 63, 65, 125, 85, 141, 227, 244, 246, 75, 196, 37, 203, 173, 138, 5, 179, 20, 160, 70, 0, 254, 117, 247, 117, 56, 175, 105, 100, 17, 90, 80, 215, 60, 41, 211, 216, 31, 141, 244, 5, 39, 66, 218, 97, 168, 50, 19, 249, 238, 134, 246, 28, 211, 214, 135, 147, 116, 68, 8, 163, 140, 160, 125, 184, 4, 114, 93, 112, 185, 250, 9, 139, 194, 214, 40, 220, 194, 151, 28, 33, 62, 20, 130, 120, 85, 128, 224, 223, 177, 72, 123, 89, 0, 250 } SESSION KEYGEN: PreMaster Secret: 0000: EC DA 39 02 20 7E 62 DA FB 4E F9 34 D9 FA F9 8A ..9. .b..N.4.... 0010: 5C 36 92 87 9E 92 1A AB E8 BE 2C 08 E1 F6 E7 3C \6........,....< 0020: EB 38 81 DB F4 50 65 EF 27 B3 7F EA 00 7A AD 2B .8...Pe.'....z.+ 0030: F2 7B 02 8B 47 DA A1 78 DE 10 E6 3A DC BA 3B FE ....G..x...:..;. 0040: FE C7 36 68 83 2F 13 25 B7 CF 5A C0 D4 AE BA 8E ..6h./.%..Z..... 0050: B7 78 8D E3 C3 1F 2D 4A 4A C6 4B DB 3A 76 2B 03 .x....-JJ.K.:v+. 0060: 3E 71 B8 A9 79 05 3C F2 B3 FE 11 33 49 D1 C6 78 >q..y.<....3I..x 0070: EC 8D 03 0E 15 52 63 52 A1 B0 D5 54 19 DA F9 FE .....RcR...T.... CONNECTION KEYGEN: Client Nonce: 0000: 0B 91 C3 DE 73 82 ED 69 2B 45 1D FB DD E0 7C 00 ....s..i+E...... 0010: 9A 28 DA 62 7C 25 A7 9B 18 2D CD E4 92 A0 C1 9E .(.b.%...-...... Server Nonce: 0000: 5C 7D 0F FD C2 C9 57 59 F4 2D AB D3 68 14 80 71 \.....WY.-..h..q 0010: 85 F9 A0 E0 90 03 14 AE 0F 9B 51 9A 95 E0 54 11 ..........Q...T. Master Secret: 0000: FE 3D 40 1E 4A 05 E9 E3 9D 8F 9F 4B 37 D4 A1 8D .=@.J......K7... 0010: 15 82 B2 22 9F 62 82 0F AC 82 CD FD 9D AB E2 9D ...".b.......... 0020: AC D0 96 3E FD 92 81 82 93 82 01 DF 20 23 A3 8D ...>........ #.. ... no MAC keys used for this cipher Client write key: 0000: 9B 3B 2C D3 7F FC 42 1F 5C A2 DD 95 A7 07 07 23 .;,...B.\......# 0010: 8F 62 05 30 E7 70 73 AB 18 6A BD CA C8 AC 23 25 .b.0.ps..j....#% Server write key: 0000: 1D BF 2E EF BB AB 0B 0A 12 D4 92 72 18 83 9C 4E ...........r...N 0010: EE EC 95 6B 86 84 5C A8 4E 1A 62 EC CE 7D 78 50 ...k..\.N.b...xP Client write IV: 0000: 1C 52 04 63 .R.c Server write IV: 0000: BA 0C 15 1E .... https-jsse-nio-8443-exec-5, READ: TLSv1.2 Change Cipher Spec, length = 1 https-jsse-nio-8443-exec-5, READ: TLSv1.2 Handshake, length = 40 *** Finished verify_data: { 132, 58, 234, 14, 179, 111, 155, 202, 82, 126, 123, 221 } *** https-jsse-nio-8443-exec-5, WRITE: TLSv1.2 Change Cipher Spec, length = 1 *** Finished verify_data: { 122, 42, 228, 134, 98, 182, 124, 187, 51, 217, 8, 253 } *** https-jsse-nio-8443-exec-5, WRITE: TLSv1.2 Handshake, length = 40 %% Cached server session: [Session-52, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384] https-jsse-nio-8443-exec-8, WRITE: TLSv1.2 Application Data, length = 780 https-jsse-nio-8443-exec-3, WRITE: TLSv1.2 Application Data, length = 16384 https-jsse-nio-8443-exec-3, WRITE: TLSv1.2 Application Data, length = 532 https-jsse-nio-8443-exec-3, WRITE: TLSv1.2 Application Data, length = 16384 https-jsse-nio-8443-exec-3, WRITE: TLSv1.2 Application Data, length = 532 https-jsse-nio-8443-exec-3, WRITE: TLSv1.2 Application Data, length = 4105 https-jsse-nio-8443-exec-6, WRITE: TLSv1.2 Application Data, length = 85 https-jsse-nio-8443-exec-9, READ: TLSv1.2 Alert, length = 26 https-jsse-nio-8443-exec-9, RECV TLSv1.2 ALERT: warning, close_notify https-jsse-nio-8443-exec-9, closeInboundInternal() https-jsse-nio-8443-exec-9, closeOutboundInternal() https-jsse-nio-8443-exec-9, SEND TLSv1.2 ALERT: warning, description = close_notify https-jsse-nio-8443-exec-9, WRITE: TLSv1.2 Alert, length = 26 https-jsse-nio-8443-exec-9, called closeOutbound() https-jsse-nio-8443-exec-9, closeOutboundInternal() Using SSLEngineImpl. Allow unsafe renegotiation: false Allow legacy hello messages: true Is initial handshake: true Is secure renegotiation: false Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1.1 https-jsse-nio-8443-exec-10, READ: TLSv1 Handshake, length = 512 *** ClientHello, TLSv1.2 RandomCookie: GMT: -257878899 bytes = { 55, 221, 96, 200, 190, 101, 249, 225, 37, 168, 210, 193, 158, 137, 160, 162, 234, 84, 237, 71, 57, 196, 125, 73, 96, 43, 66, 163 } Session ID: {92, 125, 15, 253, 197, 233, 46, 155, 150, 88, 74, 241, 255, 108, 90, 40, 17, 146, 237, 153, 172, 11, 47, 81, 254, 193, 205, 249, 150, 192, 196, 9} Cipher Suites: [Unknown 0x13:0x2, Unknown 0x13:0x3, Unknown 0x13:0x1, Unknown 0x13:0x4, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa9, Unknown 0xc0:0xad, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0xac, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa8, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xc0:0x9d, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9c, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xaa, Unknown 0xc0:0x9f, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9e, TLS_DHE_RSA_WITH_AES_128_CBC_SHA] Compression Methods: { 0 } Unsupported extension status_request, data: 01:00:00:00:00 Extension elliptic_curves, curve names: {secp256r1, secp384r1, secp521r1, unknown curve 29, unknown curve 256, unknown curve 257, unknown curve 258, unknown curve 259, unknown curve 260} Extension ec_point_formats, formats: [uncompressed] Extension signature_algorithms, signature_algorithms: SHA256withRSA, Unknown (hash:0x8, signature:0x9), Unknown (hash:0x8, signature:0x4), SHA256withECDSA, Unknown (hash:0x8, signature:0x7), SHA384withRSA, Unknown (hash:0x8, signature:0xa), Unknown (hash:0x8, signature:0x5), SHA384withECDSA, SHA512withRSA, Unknown (hash:0x8, signature:0xb), Unknown (hash:0x8, signature:0x6), SHA512withECDSA, SHA1withRSA, SHA1withECDSA Unsupported extension type_35, data: Unsupported extension type_51, data: 00:69:00:17:00:41:04:5d:b1:1c:f4:7e:b4:9c:7a:36:ac:31:ae:96:6c:e7:78:54:a7:d4:b5:f6:ca:4a:33:a1:f5:5b:84:12:d8:f7:a7:8b:c9:ed:2e:0e:e9:62:7c:34:fb:2d:72:38:45:5f:b4:2c:15:d4:c3:47:18:b0:e6:df:70:6a:27:77:08:b3:04:00:1d:00:20:b1:21:82:98:8c:7d:6a:c4:da:00:21:6e:ce:05:f7:04:a5:58:2d:99:8f:07:63:4d:7f:09:b2:67:cf:24:01:32 Unsupported extension type_43, data: 08:03:04:03:03:03:02:03:01 Extension renegotiation_info, renegotiated_connection: <empty> Extension server_name, server_name: [type=host_name (0), value=localhost] Unsupported extension type_45, data: 02:01:00 Unsupported extension type_28, data: 40:00 Unsupported extension type_21, data: 00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00 *** %% Initialized: [Session-53, SSL_NULL_WITH_NULL_NULL] Standard ciphersuite chosen: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 %% Negotiating: [Session-53, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384] *** ServerHello, TLSv1.2 RandomCookie: GMT: 1551699709 bytes = { 1, 209, 91, 1, 60, 87, 226, 178, 175, 12, 87, 102, 165, 10, 68, 36, 22, 235, 239, 245, 222, 35, 126, 18, 75, 104, 254, 126 } Session ID: {92, 125, 15, 253, 32, 7, 144, 45, 38, 37, 190, 26, 37, 162, 86, 16, 59, 190, 174, 205, 107, 60, 143, 195, 155, 210, 108, 6, 87, 98, 150, 90} Cipher Suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 Compression Method: 0 Extension renegotiation_info, renegotiated_connection: <empty> *** Cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 *** Certificate chain chain [0] = [ [ Version: V3 Subject: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5 Key: Sun RSA public key, 2048 bits modulus: 21944740401167172627731583459321030363948627215746053925732477915060915436180167456469785746662093119306577380200747716284652995937004530444336851845029170241627465854006145050037178991946925696078563485570896673835545540824265905937881682387179314987285174428010940266412458943894800978345731524307952507729956745301047871771953945124256516782917326981125087548987889540650149121302888872237484100834740328828765018090383963294418357028839734723410564800765871733483849269364796949055153420777966213779145518299141217288017794394762274753999989298548507425930217302947589819396239489846633419099079578249651345685751 public exponent: 65537 Validity: [From: Fri May 30 08:43:19 GMT 2014, To: Mon May 27 08:43:19 GMT 2024] Issuer: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US SerialNumber: [ a6ef7a9a 5368eb27] Certificate Extensions: 3 [1]: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: 78 0D 96 9D FE D3 0B BE 8C C7 E3 EC 67 04 AB 4B x...........g..K 0010: EA E0 00 29 ...) ] ] [2]: ObjectId: 2.5.29.19 Criticality=false BasicConstraints:[ CA:true PathLen:2147483647 ] [3]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 78 0D 96 9D FE D3 0B BE 8C C7 E3 EC 67 04 AB 4B x...........g..K 0010: EA E0 00 29 ...) ] ] ] Algorithm: [SHA1withRSA] Signature: 0000: 19 16 5A 21 99 21 24 98 3C 0A E8 D8 00 AB 44 24 ..Z!.!$.<.....D$ 0010: F2 0C B7 83 D5 9F 96 17 87 E2 1F 1D A3 47 68 C7 .............Gh. 0020: 68 4A CB 56 0E 77 2B E8 1A 9F E7 09 A1 19 77 D0 hJ.V.w+.......w. 0030: 5E CC C1 B3 9A C4 35 3D CB E0 A5 A6 43 5D A3 26 ^.....5=....C].& 0040: A4 91 8A C1 FA 7B 10 EA DC C3 C7 1C 47 DC 97 32 ............G..2 0050: C0 37 80 1C F1 42 10 E3 74 17 FA 3E 60 4A B7 59 .7...B..t..>`J.Y 0060: 92 C1 E0 6F BB F1 BB 9F 82 89 B5 83 D5 AE 1E 90 ...o............ 0070: 0A 89 8D FB 4C C0 C5 9E DC C5 8C C6 2F EE D9 B4 ....L......./... 0080: 95 47 27 2E BE 82 31 6F 76 C0 DB 4C C8 0D 3B 7B .G'...1ov..L..;. 0090: D1 6A BF BD 3B 93 30 04 A2 9E 81 F7 96 28 77 F2 .j..;.0......(w. 00A0: 32 05 68 44 1F B3 30 CE 40 9F 20 F3 B4 2B AA E6 2.hD..0.@. ..+.. 00B0: 40 9B FB 7F 34 6E 3A 99 FD F8 28 F1 8C 9B 56 34 @...4n:...(...V4 00C0: 64 AD 4D 56 39 CB 96 18 50 9B 99 43 80 0A 39 A5 d.MV9...P..C..9. 00D0: 13 7A 6E C5 25 E0 95 4A 92 E5 A8 8B EE 03 49 B4 .zn.%..J......I. 00E0: D9 7C 00 E3 F0 3B A7 BA 40 30 CC 89 55 C6 97 93 .....;..@0..U... 00F0: B5 15 F6 62 D3 B1 74 9C 0B 80 2B 8A D4 03 84 A0 ...b..t...+..... ] *** *** Diffie-Hellman ServerKeyExchange DH Modulus: { 255, 255, 255, 255, 255, 255, 255, 255, 201, 15, 218, 162, 33, 104, 194, 52, 196, 198, 98, 139, 128, 220, 28, 209, 41, 2, 78, 8, 138, 103, 204, 116, 2, 11, 190, 166, 59, 19, 155, 34, 81, 74, 8, 121, 142, 52, 4, 221, 239, 149, 25, 179, 205, 58, 67, 27, 48, 43, 10, 109, 242, 95, 20, 55, 79, 225, 53, 109, 109, 81, 194, 69, 228, 133, 181, 118, 98, 94, 126, 198, 244, 76, 66, 233, 166, 55, 237, 107, 11, 255, 92, 182, 244, 6, 183, 237, 238, 56, 107, 251, 90, 137, 159, 165, 174, 159, 36, 17, 124, 75, 31, 230, 73, 40, 102, 81, 236, 230, 83, 129, 255, 255, 255, 255, 255, 255, 255, 255 } DH Base: { 2 } Server DH Public Key: { 171, 216, 108, 168, 73, 165, 103, 110, 49, 234, 142, 159, 76, 2, 240, 214, 50, 112, 115, 26, 79, 6, 30, 238, 194, 169, 225, 206, 236, 55, 142, 40, 74, 229, 44, 26, 202, 38, 207, 165, 80, 101, 17, 135, 248, 79, 137, 193, 150, 164, 236, 138, 195, 39, 55, 70, 14, 8, 87, 235, 127, 228, 15, 247, 231, 173, 18, 206, 161, 171, 134, 52, 120, 152, 76, 103, 33, 111, 129, 136, 115, 95, 163, 58, 155, 195, 85, 3, 189, 156, 234, 213, 173, 218, 208, 59, 47, 52, 186, 139, 71, 156, 70, 196, 254, 129, 3, 244, 162, 165, 45, 82, 197, 41, 108, 105, 75, 20, 226, 45, 243, 156, 43, 164, 67, 82, 153, 142 } Signature Algorithm SHA256withRSA Signed with a DSA or RSA public key *** ServerHelloDone https-jsse-nio-8443-exec-10, WRITE: TLSv1.2 Handshake, length = 1697 https-jsse-nio-8443-exec-7, READ: TLSv1.2 Handshake, length = 134 *** ClientKeyExchange, DH DH Public key: { 141, 109, 126, 164, 107, 49, 49, 3, 193, 248, 25, 16, 20, 83, 109, 114, 141, 190, 75, 35, 80, 131, 22, 12, 220, 218, 242, 127, 176, 87, 9, 49, 52, 149, 56, 84, 146, 234, 174, 126, 136, 80, 128, 250, 7, 153, 137, 191, 40, 174, 90, 189, 168, 15, 38, 25, 48, 155, 143, 67, 43, 135, 162, 53, 65, 242, 84, 224, 178, 164, 145, 72, 244, 83, 5, 20, 252, 90, 129, 248, 18, 2, 219, 229, 49, 154, 59, 124, 19, 170, 98, 140, 170, 200, 220, 134, 181, 121, 191, 91, 222, 17, 195, 184, 32, 109, 125, 12, 60, 80, 116, 232, 110, 100, 28, 158, 150, 49, 174, 60, 108, 218, 187, 71, 84, 47, 119, 226 } SESSION KEYGEN: PreMaster Secret: 0000: 01 22 48 E6 04 9D 47 36 D7 35 64 29 8F 7E 69 E4 ."H...G6.5d)..i. 0010: C2 A6 06 67 82 69 02 67 95 9B C6 B1 8A 67 2D AE ...g.i.g.....g-. 0020: 08 99 E5 56 62 5E 18 48 35 4F 66 A0 89 65 A4 4E ...Vb^.H5Of..e.N 0030: 2F A4 BE 0A 94 C6 4B 80 1D ED FE 1C 49 38 61 1C /.....K.....I8a. 0040: 57 3F AB 53 B8 B4 2F 34 8D 68 3F 1F D7 3C 45 D3 W?.S../4.h?..<E. 0050: 25 10 45 54 96 68 EA B3 33 80 A6 0D 49 21 11 5D %.ET.h..3...I!.] 0060: 3A 3D A3 3C 6A B4 99 CD A8 11 EF BB 7D 3D 4A 5E :=.<j........=J^ 0070: 7D 45 8A 17 ED 6E C8 D7 9D C3 83 90 32 B5 13 20 .E...n......2.. CONNECTION KEYGEN: Client Nonce: 0000: F1 A1 15 8D 37 DD 60 C8 BE 65 F9 E1 25 A8 D2 C1 ....7.`..e..%... 0010: 9E 89 A0 A2 EA 54 ED 47 39 C4 7D 49 60 2B 42 A3 .....T.G9..I`+B. Server Nonce: 0000: 5C 7D 0F FD 01 D1 5B 01 3C 57 E2 B2 AF 0C 57 66 \.....[.<W....Wf 0010: A5 0A 44 24 16 EB EF F5 DE 23 7E 12 4B 68 FE 7E ..D$.....#..Kh.. Master Secret: 0000: A3 63 5F C1 CC A3 80 5E F2 7E 2B 97 AA E4 BD 2D .c_....^..+....- 0010: E4 AF C1 B2 34 48 A4 3E 97 EF 7E 8E 42 9F A8 BF ....4H.>....B... 0020: E6 E3 67 D7 C2 8F C5 1C 20 4F 43 C7 D4 4C DD 15 ..g..... OC..L.. ... no MAC keys used for this cipher Client write key: 0000: E4 BD FF 63 2C 71 12 FB C9 B2 88 26 7A BC 44 3E ...c,q.....&z.D> 0010: CF E0 19 21 0E A4 4E 17 7B 25 C8 A4 61 B8 CC 48 ...!..N..%..a..H Server write key: 0000: ED FA 79 A2 38 53 24 6F 2A B9 C3 D9 63 AF 4A 78 ..y.8S$o*...c.Jx 0010: 84 A1 CB 6C AF 57 FC FC 0C 97 32 26 29 A3 64 65 ...l.W....2&).de Client write IV: 0000: 13 8E 40 E0 ..@. Server write IV: 0000: 06 04 FD D3 .... https-jsse-nio-8443-exec-7, READ: TLSv1.2 Change Cipher Spec, length = 1 https-jsse-nio-8443-exec-7, READ: TLSv1.2 Handshake, length = 40 *** Finished verify_data: { 32, 190, 199, 252, 228, 3, 149, 205, 33, 207, 45, 167 } *** https-jsse-nio-8443-exec-7, WRITE: TLSv1.2 Change Cipher Spec, length = 1 *** Finished verify_data: { 150, 210, 111, 207, 66, 55, 101, 146, 172, 74, 162, 146 } *** https-jsse-nio-8443-exec-7, WRITE: TLSv1.2 Handshake, length = 40 %% Cached server session: [Session-53, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384] https-jsse-nio-8443-exec-5, WRITE: TLSv1.2 Application Data, length = 168 -- Mathieu Lirzin GPG: F2A3 8D7E EB2B 6640 5761 070D 0ADE E100 9460 4D37 |
Hi Mathieu
I tried reproducing the issue you're facing with GNU Icecat by providing the exact cipher suites (that Icecat seems to present in the logs) to my local OFBiz installation. However, the handshake seems to be working for me. There seems to be no issue with respect to the protocol version used. It is all coming down to the fact that Icecat and OFBiz jvm can't settle down on the cipher suite to choose. As for Epiphany, I could see common cipher suites sent by both Icecat and Epiphany and yet OFBiz denying handshake. I'll see if there is more I can extract out of the logs but at the moment I can't think of a proper solution here apart from installing JCE Unlimited Strength in the JVM and see if you can get the handshake working. Thanks and Regards, Girish On Wed, Mar 6, 2019 at 1:17 AM Mathieu Lirzin <[hidden email]> wrote: > with the inlined logs: > > Mathieu Lirzin <[hidden email]> writes: > > > Hello Girish and Jacques, > > > > Jacques Le Roux <[hidden email]> writes: > > > >> Did Girish's answer help? (thanks Girish) > > > > Yes it helps alot. > > > >> Le 04/03/2019 à 08:09, Girish Vasmatkar a écrit : > >>> > >>> Perhaps it will help if you could enable SSL debugging (either in your > >>> browser or in OFBiz (-Djavax.net.debug=ssl)) and provide details how > the > >>> SSL handshake happened. Specifically, it would be interesting to see > what > >>> all protocols your browser presented to OFBiz. > > > > Here is the log of OFBiz with (-Djavax.net.debug=ssl) with a failing > > handshake with GNU Icecat: > > Using SSLEngineImpl. > Allow unsafe renegotiation: false > Allow legacy hello messages: true > Is initial handshake: true > Is secure renegotiation: false > Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for > TLSv1 > Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for > TLSv1 > Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for > TLSv1 > Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for > TLSv1 > Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for > TLSv1.1 > Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for > TLSv1.1 > Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for > TLSv1.1 > Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for > TLSv1.1 > https-jsse-nio-8443-exec-8, READ: TLSv1 Handshake, length = 512 > *** ClientHello, TLSv1.2 > RandomCookie: GMT: 1736093966 bytes = { 189, 227, 177, 17, 199, 186, 164, > 220, 197, 114, 96, 6, 87, 64, 58, 23, 142, 75, 57, 206, 107, 227, 181, 65, > 168, 6, 76, 155 } > Session ID: {193, 60, 237, 251, 184, 155, 76, 93, 36, 222, 130, 94, 35, > 149, 245, 251, 82, 146, 204, 227, 113, 188, 245, 195, 46, 17, 198, 7, 175, > 181, 1, 156} > Cipher Suites: [Unknown 0x13:0x1, Unknown 0x13:0x3, Unknown 0x13:0x2, > TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, > TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xcc:0xa9, Unknown > 0xcc:0xa8, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, > TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, > TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, > TLS_RSA_WITH_AES_256_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA] > Compression Methods: { 0 } > Extension server_name, server_name: [type=host_name (0), value=localhost] > Extension extended_master_secret > Extension renegotiation_info, renegotiated_connection: <empty> > Extension elliptic_curves, curve names: {unknown curve 29, secp256r1, > secp384r1, secp521r1, unknown curve 256, unknown curve 257} > Extension ec_point_formats, formats: [uncompressed] > Unsupported extension type_35, data: > Unsupported extension type_16, data: > 00:0c:02:68:32:08:68:74:74:70:2f:31:2e:31 > Unsupported extension status_request, data: 01:00:00:00:00 > Unsupported extension type_51, data: > 00:69:00:1d:00:20:15:8a:11:44:3e:65:b5:86:d5:91:8e:46:d4:4c:f1:05:44:48:a7:43:9e:04:69:69:fe:58:f5:80:ce:bc:d2:58:00:17:00:41:04:b7:0f:c1:73:e5:bf:9d:fd:4c:29:24:07:27:9e:77:1e:fb:30:d2:b8:17:b5:87:1e:f6:61:d1:b3:9c:f8:59:2a:cd:63:07:7f:9b:2f:3d:f9:80:a5:e2:f3:09:3d:e5:91:f4:35:2a:d0:ec:aa:89:ed:6d:63:7c:93:74:a6:0e:e9 > Unsupported extension type_43, data: 08:7f:17:03:03:03:02:03:01 > Extension signature_algorithms, signature_algorithms: SHA256withECDSA, > SHA384withECDSA, SHA512withECDSA, Unknown (hash:0x8, signature:0x4), > Unknown (hash:0x8, signature:0x5), Unknown (hash:0x8, signature:0x6), > SHA256withRSA, SHA384withRSA, SHA512withRSA, SHA1withECDSA, SHA1withRSA > Unsupported extension type_45, data: 01:01 > Unsupported extension type_21, data: > 00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00 > *** > %% Initialized: [Session-54, SSL_NULL_WITH_NULL_NULL] > https-jsse-nio-8443-exec-8, fatal error: 40: no cipher suites in common > javax.net.ssl.SSLHandshakeException: no cipher suites in common > %% Invalidated: [Session-54, SSL_NULL_WITH_NULL_NULL] > https-jsse-nio-8443-exec-8, SEND TLSv1.2 ALERT: fatal, description = > handshake_failure > https-jsse-nio-8443-exec-8, WRITE: TLSv1.2 Alert, length = 2 > https-jsse-nio-8443-exec-8, fatal: engine already closed. Rethrowing > javax.net.ssl.SSLHandshakeException: no cipher suites in common > https-jsse-nio-8443-exec-8, called closeOutbound() > https-jsse-nio-8443-exec-8, closeOutboundInternal() > Using SSLEngineImpl. > Allow unsafe renegotiation: false > Allow legacy hello messages: true > Is initial handshake: true > Is secure renegotiation: false > Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for > TLSv1 > Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for > TLSv1 > Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for > TLSv1 > Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for > TLSv1 > Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for > TLSv1.1 > Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for > TLSv1.1 > Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for > TLSv1.1 > Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for > TLSv1.1 > https-jsse-nio-8443-exec-3, READ: TLSv1 Handshake, length = 177 > *** ClientHello, TLSv1.2 > RandomCookie: GMT: 146371561 bytes = { 199, 41, 221, 220, 249, 76, 16, > 148, 121, 235, 169, 29, 195, 217, 73, 96, 168, 20, 66, 190, 101, 117, 147, > 205, 153, 77, 208, 190 } > Session ID: {} > Cipher Suites: [TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, > TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xcc:0xa9, Unknown > 0xcc:0xa8, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, > TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, > TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, > TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, > TLS_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_CBC_SHA, > SSL_RSA_WITH_3DES_EDE_CBC_SHA] > Compression Methods: { 0 } > Extension server_name, server_name: [type=host_name (0), value=localhost] > Extension extended_master_secret > Extension renegotiation_info, renegotiated_connection: <empty> > Extension elliptic_curves, curve names: {unknown curve 29, secp256r1, > secp384r1, secp521r1} > Extension ec_point_formats, formats: [uncompressed] > Unsupported extension type_35, data: > Unsupported extension type_16, data: > 00:0c:02:68:32:08:68:74:74:70:2f:31:2e:31 > Unsupported extension status_request, data: 01:00:00:00:00 > Extension signature_algorithms, signature_algorithms: SHA256withECDSA, > SHA384withECDSA, SHA512withECDSA, Unknown (hash:0x8, signature:0x4), > Unknown (hash:0x8, signature:0x5), Unknown (hash:0x8, signature:0x6), > SHA256withRSA, SHA384withRSA, SHA512withRSA, SHA1withECDSA, SHA1withRSA > *** > %% Initialized: [Session-55, SSL_NULL_WITH_NULL_NULL] > https-jsse-nio-8443-exec-3, fatal error: 40: no cipher suites in common > javax.net.ssl.SSLHandshakeException: no cipher suites in common > %% Invalidated: [Session-55, SSL_NULL_WITH_NULL_NULL] > https-jsse-nio-8443-exec-3, SEND TLSv1.2 ALERT: fatal, description = > handshake_failure > https-jsse-nio-8443-exec-3, WRITE: TLSv1.2 Alert, length = 2 > https-jsse-nio-8443-exec-3, fatal: engine already closed. Rethrowing > javax.net.ssl.SSLHandshakeException: no cipher suites in common > https-jsse-nio-8443-exec-3, called closeOutbound() > https-jsse-nio-8443-exec-3, closeOutboundInternal() > > > Here is the log with another browser (Epiphany) with a successful > handshake: > > Using SSLEngineImpl. > Allow unsafe renegotiation: false > Allow legacy hello messages: true > Is initial handshake: true > Is secure renegotiation: false > Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for > TLSv1 > Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for > TLSv1 > Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for > TLSv1 > Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for > TLSv1 > Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for > TLSv1.1 > Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for > TLSv1.1 > Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for > TLSv1.1 > Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for > TLSv1.1 > https-jsse-nio-8443-exec-2, READ: TLSv1.2 Alert, length = 26 > https-jsse-nio-8443-exec-2, RECV TLSv1.2 ALERT: warning, close_notify > https-jsse-nio-8443-exec-2, closeInboundInternal() > https-jsse-nio-8443-exec-2, closeOutboundInternal() > https-jsse-nio-8443-exec-2, SEND TLSv1.2 ALERT: warning, description = > close_notify > https-jsse-nio-8443-exec-1, READ: TLSv1 Handshake, length = 512 > https-jsse-nio-8443-exec-2, WRITE: TLSv1.2 Alert, length = 26 > https-jsse-nio-8443-exec-2, called closeOutbound() > *** ClientHello, TLSv1.2 > RandomCookie: https-jsse-nio-8443-exec-2, closeOutboundInternal() > GMT: 814150594 bytes = { 189, 14, 209, 176, 97, 15, 214, 107, 117, 63, > 187, 162, 12, 184, 245, 189, 245, 227, 127, 128, 244, 154, 249, 115, 101, > 100, 61, 40 } > Session ID: {92, 125, 15, 237, 254, 33, 2, 52, 144, 148, 0, 165, 156, > 232, 106, 139, 222, 199, 99, 71, 41, 230, 1, 75, 246, 145, 175, 22, 191, > 231, 28, 218} > Cipher Suites: [Unknown 0x13:0x2, Unknown 0x13:0x3, Unknown 0x13:0x1, > Unknown 0x13:0x4, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, Unknown > 0xcc:0xa9, Unknown 0xc0:0xad, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, > TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0xac, > TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, > TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa8, > TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, > TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_GCM_SHA384, > Unknown 0xc0:0x9d, TLS_RSA_WITH_AES_256_CBC_SHA, > TLS_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9c, > TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, Unknown > 0xcc:0xaa, Unknown 0xc0:0x9f, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, > TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9e, > TLS_DHE_RSA_WITH_AES_128_CBC_SHA] > Compression Methods: { 0 } > Unsupported extension status_request, data: 01:00:00:00:00 > Extension elliptic_curves, curve names: {secp256r1, secp384r1, secp521r1, > unknown curve 29, unknown curve 256, unknown curve 257, unknown curve 258, > unknown curve 259, unknown curve 260} > Extension ec_point_formats, formats: [uncompressed] > Extension signature_algorithms, signature_algorithms: SHA256withRSA, > Unknown (hash:0x8, signature:0x9), Unknown (hash:0x8, signature:0x4), > SHA256withECDSA, Unknown (hash:0x8, signature:0x7), SHA384withRSA, Unknown > (hash:0x8, signature:0xa), Unknown (hash:0x8, signature:0x5), > SHA384withECDSA, SHA512withRSA, Unknown (hash:0x8, signature:0xb), Unknown > (hash:0x8, signature:0x6), SHA512withECDSA, SHA1withRSA, SHA1withECDSA > Unsupported extension type_35, data: > Unsupported extension type_51, data: > 00:69:00:17:00:41:04:64:09:13:0a:51:7f:68:f5:63:01:39:08:81:34:af:cd:75:75:98:c8:81:91:0d:6a:2a:22:43:3e:a9:2d:23:48:16:7a:d0:a8:b5:bd:ce:8d:54:25:fd:33:c3:99:bd:42:9f:05:d1:7e:dd:e8:5e:37:fa:7f:dd:e1:6a:ef:a0:b9:00:1d:00:20:e8:f0:72:c3:30:bc:24:4e:cd:5f:14:38:a2:86:9e:84:cd:51:df:a4:6d:72:33:e8:e9:a0:55:8e:4c:60:21:50 > Unsupported extension type_43, data: 08:03:04:03:03:03:02:03:01 > Extension renegotiation_info, renegotiated_connection: <empty> > Extension server_name, server_name: [type=host_name (0), value=localhost] > Unsupported extension type_45, data: 02:01:00 > Unsupported extension type_28, data: 40:00 > Unsupported extension type_21, data: > 00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00 > *** > %% Initialized: [Session-10, SSL_NULL_WITH_NULL_NULL] > Standard ciphersuite chosen: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 > %% Negotiating: [Session-10, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384] > *** ServerHello, TLSv1.2 > RandomCookie: GMT: 1551699703 bytes = { 1, 74, 230, 110, 14, 123, 143, > 104, 216, 59, 77, 109, 156, 237, 68, 152, 241, 106, 128, 168, 185, 218, 12, > 202, 6, 4, 174, 147 } > Session ID: {92, 125, 15, 247, 246, 249, 211, 141, 164, 158, 249, 105, > 184, 211, 34, 29, 135, 131, 232, 36, 64, 192, 38, 174, 54, 83, 112, 53, > 142, 111, 182, 94} > Cipher Suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 > Compression Method: 0 > Extension renegotiation_info, renegotiated_connection: <empty> > *** > Cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 > https-jsse-nio-8443-exec-9, WRITE: TLSv1.2 Application Data, length = 339 > *** Certificate chain > chain [0] = [ > [ > Version: V3 > Subject: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, > OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US > Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5 > > Key: Sun RSA public key, 2048 bits > modulus: > 21944740401167172627731583459321030363948627215746053925732477915060915436180167456469785746662093119306577380200747716284652995937004530444336851845029170241627465854006145050037178991946925696078563485570896673835545540824265905937881682387179314987285174428010940266412458943894800978345731524307952507729956745301047871771953945124256516782917326981125087548987889540650149121302888872237484100834740328828765018090383963294418357028839734723410564800765871733483849269364796949055153420777966213779145518299141217288017794394762274753999989298548507425930217302947589819396239489846633419099079578249651345685751 > public exponent: 65537 > Validity: [From: Fri May 30 08:43:19 GMT 2014, > To: Mon May 27 08:43:19 GMT 2024] > Issuer: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, > OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US > SerialNumber: [ a6ef7a9a 5368eb27] > > Certificate Extensions: 3 > [1]: ObjectId: 2.5.29.35 Criticality=false > AuthorityKeyIdentifier [ > KeyIdentifier [ > 0000: 78 0D 96 9D FE D3 0B BE 8C C7 E3 EC 67 04 AB 4B x...........g..K > 0010: EA E0 00 29 ...) > ] > ] > > [2]: ObjectId: 2.5.29.19 Criticality=false > BasicConstraints:[ > CA:true > PathLen:2147483647 > ] > > [3]: ObjectId: 2.5.29.14 Criticality=false > SubjectKeyIdentifier [ > KeyIdentifier [ > 0000: 78 0D 96 9D FE D3 0B BE 8C C7 E3 EC 67 04 AB 4B x...........g..K > 0010: EA E0 00 29 ...) > ] > ] > > ] > Algorithm: [SHA1withRSA] > Signature: > 0000: 19 16 5A 21 99 21 24 98 3C 0A E8 D8 00 AB 44 24 ..Z!.!$.<.....D$ > 0010: F2 0C B7 83 D5 9F 96 17 87 E2 1F 1D A3 47 68 C7 .............Gh. > 0020: 68 4A CB 56 0E 77 2B E8 1A 9F E7 09 A1 19 77 D0 hJ.V.w+.......w. > 0030: 5E CC C1 B3 9A C4 35 3D CB E0 A5 A6 43 5D A3 26 ^.....5=....C].& > 0040: A4 91 8A C1 FA 7B 10 EA DC C3 C7 1C 47 DC 97 32 ............G..2 > 0050: C0 37 80 1C F1 42 10 E3 74 17 FA 3E 60 4A B7 59 .7...B..t..>`J.Y > 0060: 92 C1 E0 6F BB F1 BB 9F 82 89 B5 83 D5 AE 1E 90 ...o............ > 0070: 0A 89 8D FB 4C C0 C5 9E DC C5 8C C6 2F EE D9 B4 ....L......./... > 0080: 95 47 27 2E BE 82 31 6F 76 C0 DB 4C C8 0D 3B 7B .G'...1ov..L..;. > 0090: D1 6A BF BD 3B 93 30 04 A2 9E 81 F7 96 28 77 F2 .j..;.0......(w. > 00A0: 32 05 68 44 1F B3 30 CE 40 9F 20 F3 B4 2B AA E6 2.hD..0.@. ..+.. > 00B0: 40 9B FB 7F 34 6E 3A 99 FD F8 28 F1 8C 9B 56 34 @...4n:...(...V4 > 00C0: 64 AD 4D 56 39 CB 96 18 50 9B 99 43 80 0A 39 A5 d.MV9...P..C..9. > 00D0: 13 7A 6E C5 25 E0 95 4A 92 E5 A8 8B EE 03 49 B4 .zn.%..J......I. > 00E0: D9 7C 00 E3 F0 3B A7 BA 40 30 CC 89 55 C6 97 93 .....;..@0..U... > 00F0: B5 15 F6 62 D3 B1 74 9C 0B 80 2B 8A D4 03 84 A0 ...b..t...+..... > > ] > *** > *** Diffie-Hellman ServerKeyExchange > DH Modulus: { 255, 255, 255, 255, 255, 255, 255, 255, 201, 15, 218, 162, > 33, 104, 194, 52, 196, 198, 98, 139, 128, 220, 28, 209, 41, 2, 78, 8, 138, > 103, 204, 116, 2, 11, 190, 166, 59, 19, 155, 34, 81, 74, 8, 121, 142, 52, > 4, 221, 239, 149, 25, 179, 205, 58, 67, 27, 48, 43, 10, 109, 242, 95, 20, > 55, 79, 225, 53, 109, 109, 81, 194, 69, 228, 133, 181, 118, 98, 94, 126, > 198, 244, 76, 66, 233, 166, 55, 237, 107, 11, 255, 92, 182, 244, 6, 183, > 237, 238, 56, 107, 251, 90, 137, 159, 165, 174, 159, 36, 17, 124, 75, 31, > 230, 73, 40, 102, 81, 236, 230, 83, 129, 255, 255, 255, 255, 255, 255, 255, > 255 } > DH Base: { 2 } > Server DH Public Key: { 207, 201, 241, 189, 224, 175, 68, 248, 216, 197, > 47, 214, 124, 101, 217, 9, 127, 95, 125, 123, 118, 132, 240, 161, 211, 172, > 155, 151, 38, 81, 217, 225, 137, 34, 92, 50, 243, 88, 199, 76, 154, 29, > 118, 218, 187, 175, 51, 153, 133, 115, 97, 176, 38, 139, 13, 107, 114, 66, > 44, 201, 109, 168, 61, 214, 28, 170, 130, 136, 66, 189, 7, 217, 29, 83, 49, > 211, 167, 220, 13, 57, 229, 176, 106, 101, 147, https-jsse-nio-8443-exec-9, > WRITE: TLSv1.2 Application Data, length = 548 > 155, 102, 135, 27, 15, 236, 14, 126, 81, 118, 54, 20, 33, 204, 63, 45, 14, > 239, 232, 96, 218, 144, 135, 68, 98, 120, 209, 97, 189, 243, 74, 38, 12, > 149, 112, 124, 118, 40, 193, 94, 129, 194, 136 } > Signature Algorithm SHA256withRSA > Signed with a DSA or RSA public key > *** ServerHelloDone > https-jsse-nio-8443-exec-1, WRITE: TLSv1.2 Handshake, length = 1697 > Using SSLEngineImpl. > Allow unsafe renegotiation: false > Allow legacy hello messages: true > Is initial handshake: true > Is secure renegotiation: false > Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for > TLSv1 > Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for > TLSv1 > Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for > TLSv1 > Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for > TLSv1 > Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for > TLSv1.1 > Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for > TLSv1.1 > Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for > TLSv1.1 > Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for > TLSv1.1 > https-jsse-nio-8443-exec-1, READ: TLSv1 Handshake, length = 512 > *** ClientHello, TLSv1.2 > RandomCookie: GMT: 891426139 bytes = { 70, 64, 99, 252, 252, 243, 247, > 61, 84, 99, 225, 22, 197, 217, 232, 204, 83, 219, 77, 96, 217, 224, 36, 16, > 75, 250, 115, 210 } > Session ID: {92, 125, 15, 237, 254, 33, 2, 52, 144, 148, 0, 165, 156, > 232, 106, 139, 222, 199, 99, 71, 41, 230, 1, 75, 246, 145, 175, 22, 191, > 231, 28, 218} > Cipher Suites: [Unknown 0x13:0x2, Unknown 0x13:0x3, Unknown 0x13:0x1, > Unknown 0x13:0x4, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, Unknown > 0xcc:0xa9, Unknown 0xc0:0xad, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, > TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0xac, > TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, > TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa8, > TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, > TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_GCM_SHA384, > Unknown 0xc0:0x9d, TLS_RSA_WITH_AES_256_CBC_SHA, > TLS_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9c, > TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, Unknown > 0xcc:0xaa, Unknown 0xc0:0x9f, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, > TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9e, > TLS_DHE_RSA_WITH_AES_128_CBC_SHA] > Compression Methods: { 0 } > Unsupported extension status_request, data: 01:00:00:00:00 > Extension elliptic_curves, curve names: {secp256r1, secp384r1, secp521r1, > unknown curve 29, unknown curve 256, unknown curve 257, unknown curve 258, > unknown curve 259, unknown curve 260} > Extension ec_point_formats, formats: [uncompressed] > Extension signature_algorithms, signature_algorithms: SHA256withRSA, > Unknown (hash:0x8, signature:0x9), Unknown (hash:0x8, signature:0x4), > SHA256withECDSA, Unknown (hash:0x8, signature:0x7), SHA384withRSA, Unknown > (hash:0x8, signature:0xa), Unknown (hash:0x8, signature:0x5), > SHA384withECDSA, SHA512withRSA, Unknown (hash:0x8, signature:0xb), Unknown > (hash:0x8, signature:0x6), SHA512withECDSA, SHA1withRSA, SHA1withECDSA > Unsupported extension type_35, data: > Unsupported extension type_51, data: > 00:69:00:17:00:41:04:4c:4b:f9:0d:41:a2:d1:e0:cc:78:46:72:f7:54:96:02:a0:a2:d6:14:0b:7a:6e:f1:45:0a:8f:bd:40:4f:eb:26:cb:d1:4d:1c:12:24:25:45:db:9c:f3:85:55:8d:0a:3f:4e:d8:d0:1f:95:1c:46:97:c5:b1:74:e7:c7:38:ed:b4:00:1d:00:20:e1:f7:e1:e0:c6:56:96:45:a4:22:c3:5b:78:3c:d2:1c:ad:eb:c3:85:0d:9e:01:6e:4a:f7:60:5d:14:14:4f:2a > Unsupported extension type_43, data: 08:03:04:03:03:03:02:03:01 > Extension renegotiation_info, renegotiated_connection: <empty> > Extension server_name, server_name: [type=host_name (0), value=localhost] > Unsupported extension type_45, data: 02:01:00 > Unsupported extension type_28, data: 40:00 > Unsupported extension type_21, data: > 00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00 > *** > %% Initialized: [Session-11, SSL_NULL_WITH_NULL_NULL] > Standard ciphersuite chosen: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 > %% Negotiating: [Session-11, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384] > *** ServerHello, TLSv1.2 > RandomCookie: GMT: 1551699703 bytes = { 84, 57, 154, 20, 67, 161, 125, > 104, 24, 253, 249, 172, 67, 138, 44, 163, 152, 238, 181, 239, 217, 23, 49, > 149, 121, 11, 142, 123 } > Session ID: {92, 125, 15, 247, 213, 157, 46, 13, 7, 249, 27, 59, 188, 52, > 107, 216, 12, 30, 168, 6, 161, 1, 93, 140, 189, 97, 129, 164, 189, 189, > 122, 170} > Cipher Suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 > Compression Method: 0 > Extension renegotiation_info, renegotiated_connection: <empty> > *** > Cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 > *** Certificate chain > chain [0] = [ > [ > Version: V3 > Subject: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, > OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US > Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5 > > Key: Sun RSA public key, 2048 bits > modulus: > 21944740401167172627731583459321030363948627215746053925732477915060915436180167456469785746662093119306577380200747716284652995937004530444336851845029170241627465854006145050037178991946925696078563485570896673835545540824265905937881682387179314987285174428010940266412458943894800978345731524307952507729956745301047871771953945124256516782917326981125087548987889540650149121302888872237484100834740328828765018090383963294418357028839734723410564800765871733483849269364796949055153420777966213779145518299141217288017794394762274753999989298548507425930217302947589819396239489846633419099079578249651345685751 > public exponent: 65537 > Validity: [From: Fri May 30 08:43:19 GMT 2014, > To: Mon May 27 08:43:19 GMT 2024] > Issuer: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, > OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US > SerialNumber: [ a6ef7a9a 5368eb27] > > Certificate Extensions: 3 > [1]: ObjectId: 2.5.29.35 Criticality=false > AuthorityKeyIdentifier [ > KeyIdentifier [ > 0000: 78 0D 96 9D FE D3 0B BE 8C C7 E3 EC 67 04 AB 4B x...........g..K > 0010: EA E0 00 29 ...) > ] > ] > > [2]: ObjectId: 2.5.29.19 Criticality=false > BasicConstraints:[ > CA:true > PathLen:2147483647 > ] > > [3]: ObjectId: 2.5.29.14 Criticality=false > SubjectKeyIdentifier [ > KeyIdentifier [ > 0000: 78 0D 96 9D FE D3 0B BE 8C C7 E3 EC 67 04 AB 4B x...........g..K > 0010: EA E0 00 29 ...) > ] > ] > > ] > Algorithm: [SHA1withRSA] > Signature: > 0000: 19 16 5A 21 99 21 24 98 3C 0A E8 D8 00 AB 44 24 ..Z!.!$.<.....D$ > 0010: F2 0C B7 83 D5 9F 96 17 87 E2 1F 1D A3 47 68 C7 .............Gh. > 0020: 68 4A CB 56 0E 77 2B E8 1A 9F E7 09 A1 19 77 D0 hJ.V.w+.......w. > 0030: 5E CC C1 B3 9A C4 35 3D CB E0 A5 A6 43 5D A3 26 ^.....5=....C].& > 0040: A4 91 8A C1 FA 7B 10 EA DC C3 C7 1C 47 DC 97 32 ............G..2 > 0050: C0 37 80 1C F1 42 10 E3 74 17 FA 3E 60 4A B7 59 .7...B..t..>`J.Y > 0060: 92 C1 E0 6F BB F1 BB 9F 82 89 B5 83 D5 AE 1E 90 ...o............ > 0070: 0A 89 8D FB 4C C0 C5 9E DC C5 8C C6 2F EE D9 B4 ....L......./... > 0080: 95 47 27 2E BE 82 31 6F 76 C0 DB 4C C8 0D 3B 7B .G'...1ov..L..;. > 0090: D1 6A BF BD 3B 93 30 04 A2 9E 81 F7 96 28 77 F2 .j..;.0......(w. > 00A0: 32 05 68 44 1F B3 30 CE 40 9F 20 F3 B4 2B AA E6 2.hD..0.@. ..+.. > 00B0: 40 9B FB 7F 34 6E 3A 99 FD F8 28 F1 8C 9B 56 34 @...4n:...(...V4 > 00C0: 64 AD 4D 56 39 CB 96 18 50 9B 99 43 80 0A 39 A5 d.MV9...P..C..9. > 00D0: 13 7A 6E C5 25 E0 95 4A 92 E5 A8 8B EE 03 49 B4 .zn.%..J......I. > 00E0: D9 7C 00 E3 F0 3B A7 BA 40 30 CC 89 55 C6 97 93 .....;..@0..U... > 00F0: B5 15 F6 62 D3 B1 74 9C 0B 80 2B 8A D4 03 84 A0 ...b..t...+..... > > ] > Using SSLEngineImpl. > Allow unsafe renegotiation: false > Allow legacy hello messages: true > Is initial handshake: true > Is secure renegotiation: false > Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for > TLSv1 > Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for > TLSv1 > Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for > TLSv1 > Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for > TLSv1 > Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for > TLSv1.1 > Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for > TLSv1.1 > Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for > TLSv1.1 > Using SSLEngineImpl. > https-jsse-nio-8443-exec-9, WRITE: TLSv1.2 Application Data, length = 286 > Allow unsafe renegotiation: false > Allow legacy hello messages: true > Is initial handshake: true > Is secure renegotiation: false > Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for > TLSv1.1 > Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for > TLSv1 > Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for > TLSv1 > Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for > TLSv1 > Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for > TLSv1 > Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for > TLSv1.1 > Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for > TLSv1.1 > Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for > TLSv1.1 > Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for > TLSv1.1 > https-jsse-nio-8443-exec-5, READ: TLSv1 Handshake, length = 512 > https-jsse-nio-8443-exec-3, READ: TLSv1 Handshake, length = 512 > https-jsse-nio-8443-exec-4, READ: TLSv1.2 Handshake, length = 134 > *** > *** ClientHello, TLSv1.2 > Using SSLEngineImpl. > Allow unsafe renegotiation: false > Allow legacy hello messages: true > Is initial handshake: true > Is secure renegotiation: false > Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for > TLSv1 > Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for > TLSv1 > Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for > TLSv1 > Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for > TLSv1 > Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for > TLSv1.1 > Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for > TLSv1.1 > Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for > TLSv1.1 > Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for > TLSv1.1 > RandomCookie: GMT: 937077586 bytes = { 174, 84, 63, 142, 131, 103, 98, > 166, 55, 40, 255, 208, 186, 157, 182, 91, 213, 254, 173, 94, 119, 55, 74, > 51, 128, 16, 27, 127 } > Session ID: {92, 125, 15, 237, 254, 33, 2, 52, 144, 148, 0, 165, 156, > 232, 106, 139, 222, 199, 99, 71, 41, 230, 1, 75, 246, 145, 175, 22, 191, > 231, 28, 218} > Cipher Suites: [Unknown 0x13:0x2, Unknown 0x13:0x3, Unknown 0x13:0x1, > Unknown 0x13:0x4, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, Unknown > 0xcc:0xa9, Unknown 0xc0:0xad, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, > TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0xac, > TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, > TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa8, > TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, > TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_GCM_SHA384, > Unknown 0xc0:0x9d, TLS_RSA_WITH_AES_256_CBC_SHA, > TLS_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9c, > TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, Unknown > 0xcc:0xaa, Unknown 0xc0:0x9f, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, > TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9e, > TLS_DHE_RSA_WITH_AES_128_CBC_SHA] > Compression Methods: { 0 } > Unsupported extension status_request, data: 01:00:00:00:00 > Extension elliptic_curves, curve names: {secp256r1, secp384r1, secp521r1, > unknown curve 29, unknown curve 256, unknown curve 257, unknown curve 258, > unknown curve 259, unknown curve 260} > Extension ec_point_formats, formats: [uncompressed] > Extension signature_algorithms, signature_algorithms: SHA256withRSA, > Unknown (hash:0x8, signature:0x9), Unknown (hash:0x8, signature:0x4), > SHA256withECDSA, Unknown (hash:0x8, signature:0x7), SHA384withRSA, Unknown > (hash:0x8, signature:0xa), Unknown (hash:0x8, signature:0x5), > SHA384withECDSA, SHA512withRSA, Unknown (hash:0x8, signature:0xb), Unknown > (hash:0x8, signature:0x6), SHA512withECDSA, SHA1withRSA, SHA1withECDSA > Unsupported extension type_35, data: > Unsupported extension type_51, data: > 00:69:00:17:00:41:04:63:49:bf:ec:49:38:e9:99:e5:34:bf:79:d7:44:85:9b:ae:30:19:12:ea:6a:b9:66:e4:ce:a5:bc:ac:5d:fb:69:6c:ff:6e:5f:19:83:88:c1:28:66:40:3c:1a:3c:60:b7:26:38:7a:8d:34:f4:8c:db:b2:5b:36:b1:9f:5b:0b:7f:00:1d:00:20:9e:f1:d0:52:64:c2:20:af:55:dc:18:64:f8:cb:ae:a9:f3:e7:f9:cd:2c:03:6f:96:cf:86:86:88:c4:f5:ca:2e > Unsupported extension type_43, data: 08:03:04:03:03:03:02:03:01 > Extension renegotiation_info, renegotiated_connection: <empty> > Extension server_name, server_name: [type=host_name (0), value=localhost] > Unsupported extension type_45, data: 02:01:00 > Unsupported extension type_28, data: 40:00 > Unsupported extension type_21, data: > 00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00 > *** > %% Initialized: [Session-12, SSL_NULL_WITH_NULL_NULL] > *** ClientHello, TLSv1.2 > RandomCookie: GMT: -1820512062 bytes = { 64, 6, 99, 211, 116, 173, 108, > 226, 253, 149, 49, 235, 200, 156, 119, 226, 92, 124, 69, 218, 214, 105, 68, > 37, 151, 243, 120, 41 } > Session ID: {92, 125, 15, 237, 254, 33, 2, 52, 144, 148, 0, 165, 156, > 232, 106, 139, 222, 199, 99, 71, 41, 230, 1, 75, 246, 145, 175, 22, 191, > 231, 28, 218} > Cipher Suites: [Unknown 0x13:0x2, Unknown 0x13:0x3, Unknown 0x13:0x1, > Unknown 0x13:0x4, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, Unknown > 0xcc:0xa9, Unknown 0xc0:0xad, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, > TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0xac, > TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, > TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa8, > TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, > TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_GCM_SHA384, > Unknown 0xc0:0x9d, TLS_RSA_WITH_AES_256_CBC_SHA, > TLS_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9c, > TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, Unknown > 0xcc:0xaa, Unknown 0xc0:0x9f, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, > TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9e, > TLS_DHE_RSA_WITH_AES_128_CBC_SHA] > Compression Methods: { 0 } > Unsupported extension status_request, data: 01:00:00:00:00 > Extension elliptic_curves, curve names: {secp256r1, secp384r1, secp521r1, > unknown curve 29, unknown curve 256, unknown curve 257, unknown curve 258, > unknown curve 259, unknown curve 260} > *** ClientKeyExchange, DH > Extension ec_point_formats, formats: [uncompressed] > https-jsse-nio-8443-exec-9, WRITE: TLSv1.2 Application Data, length = 53 > Standard ciphersuite chosen: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 > *** Diffie-Hellman ServerKeyExchange > DH Modulus: { 255, 255, 255, 255, 255, 255, 255, 255, > https-jsse-nio-8443-exec-6, READ: TLSv1 Handshake, length = 512 > 201%% Negotiating: [Session-12, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384] > *** ServerHello, TLSv1.2 > RandomCookie: GMT: 1551699703 bytes = { 189, 88, 236, 195, 16, 20, *** > ClientHello, TLSv1.2 > RandomCookie: GMT: -2052347668 bytes = { Extension signature_algorithms, > signature_algorithms: SHA256withRSA, Unknown (hash:0x8, signature:0x9), > Unknown (hash:0x8, signature:0x4), SHA256withECDSA, Unknown (hash:0x8, > signature:0x7), SHA384withRSA, Unknown (hash:0x8, signature:0xa), Unknown > (hash:0x8, signature:0x5), SHA384withECDSA, SHA512withRSA, Unknown > (hash:0x8, signature:0xb), Unknown (hash:0x8, signature:0x6), > SHA512withECDSA, SHA1withRSA, SHA1withECDSA > DH Public key: { 44, 33, 108, 222, 37, 147, 165, 17, 83, 11, 125, 252, > 177, 121, 176, 220, 53, 161, 114, 76, 39, 221, 24, 63, 102, 217, 38, 175, > 12, 184, 22, 169, 114, 30, 2, 36, 65, 125, 130, 154, 243, 72, 184, 27, 206, > 250, 2, 219, 212, 150, 48, 222, 58, 17, 96, 109, 17, 180, 111, 224, 168, > 191, 38, 96, 214, 110, 81, 34, 212, 94, 3, 119, 24, 43, 189, 128, 60, 93, > 34, 7, 243, 167, 69, 203, 197, 247, 124, 116, 14, 107, 52, 145, 150, 18, > 90, 253, 218, 3, 179, 185, 157, 238, 191, 152, 68, 242, 208, 83, 120, 171, > 228, 145, 249, 212, 132, 160, 48, 67, 206, 49, 40, 43, 165, 58, 143, 82, > 19, 137 } > Unsupported extension type_35, data: > Unsupported extension type_51, data: > 00:69:00:17:00:41:04:fb:ce:2a:0c:db:49:2b:b8:4c:df:04:e9:fe:c8:83:44:a1:47:5f:59:37:fe:55:ea:46:17:82:64:6a:7f:67:62:19:fd:2f:51:e5:71:ef:51:70:a7:2a:19:88:de:b4:15:41:b6:86:57:a9:a7:16:75:73:ab:fb:f1:e8:6f:e1:17:00:1d:00:20:ec:07:9e:5c:8f:5d:b4:66:c2:f2:55:52:65:25:41:0d:24:27:dc:0d:ad:88:59:19:48:a3:dc:e0:5a:8f:cc:7c > Unsupported extension type_43, data: 08:03:04:03:03:03:02:03:01 > Extension renegotiation_info, renegotiated_connection: <empty> > Extension server_name, server_name: [type=host_name (0), value=localhost] > Unsupported extension type_45, data: 02:01:00 > Unsupported extension type_28, data: 40:00 > Unsupported extension type_21, data: > 00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00 > *** > %% Initialized: [Session-13, SSL_NULL_WITH_NULL_NULL] > SESSION KEYGEN: > PreMaster Secret: > 0000: 14 2B 4A 96 4B DB 65 AE A4 12 66 E4 51 AE B4 4B .+J.K.e...f.Q..K > 0010: CC 85 AD 73 25 8E 51 18 27 97 B8 9E 86 63 D2 C6 ...s%.Q.'....c.. > 0020: C6 BE 67 E5 8B 8C 0E 78 6F 69 E0 E2 6C C1 48 06 ..g....xoi..l.H. > 0030: 71 DA B2 D6 8A 26 D4 5A 05 9D 7E 83 1D 18 93 C3 q....&.Z........ > 0040: D3 04 28 1E 43 02 31 03 1B 72 45 4A 80 BE F5 19 ..(.C.1..rEJ.... > 0050: D4 EC 73 06 B4 EE FA CC F1 8C 8F 9F 86 5F 81 B6 ..s.........._.. > 0060: 25 F4 26 24 F1 BD EB 12 B7 40 30 70 BC 05 FC BC %.&$.....@0p.... > 0070: 70 33 59 E9 71 1C C4 23 5D DA DF 4C 8D 06 F1 E7 p3Y.q..#]..L.... > Standard ciphersuite chosen: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 > %% Negotiating: [Session-13, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384] > *** ServerHello, TLSv1.2 > RandomCookie: GMT: 1551699703 bytes = { 252, 170, 211, 79, 11, 228, 84, > 65, 15, 83, 81, 221, 200, 117, 89, 186, 233, 119, 90, 185CONNECTION KEYGEN: > Client Nonce: > 0000: 31 87 F4 C2 BD 0E D1 B0 61 0F D6 6B 75 3F BB A2 1.......a..ku?.. > 0010: 0C B8 F5 BD F5 E3 7F 80 F4 9A F9 73 65 64 3D 28 ...........sed=( > Server Nonce: > 0000: 5C 7D 0F F7 01 4A E6 6E 0E 7B 8F 68 D8 3B 4D 6D \....J.n...h.;Mm > 0010: 9C ED 44 98 F1 6A 80 A8 B9 DA 0C CA 06 04 AE 93 ..D..j.......... > Master Secret: > 0000: 4B 25 56 4E 5D FD 49 87 57 95 61 F8 41 E4 31 7C K%VN].I.W.a.A.1. > 0010: EA 86 7F 50 6A FC 09 08 52 3E FC 2E 07 97 05 4E ...Pj...R>.....N > 0020: 9C FD AC AB 2F 42 F1 ED 15 4C 13 A3 2B 30 20 58 ..../B...L..+0 X > ... no MAC keys used for this cipher > Client write key: > 0000: 97 B5 1F 11 07 50 73 FE 8C 9E ED 35 58 70 A4 BB .....Ps....5Xp.. > 0010: 5A EB 7B A0 F8 BC 09 83 67 95 E6 4F 24 8C 74 30 Z.......g..O$.t0 > Server write key: > 0000: 4C 6A 51 F2 BD FB 38 96 7B 95 F6 1C 5F 5D 09 93 LjQ...8....._].. > 0010: F5 61 31 9C 3A 0C 9D 50 20 FB 93 92 E6 89 E6 37 .a1.:..P ......7 > Client write IV: > 0000: 15 B3 BB A8 .... > Server write IV: > 0000: A0 38 66 10 .8f. > 114, 112, 85, 166, 214, 221, 236, 123, 184, 112, 134, , 15, 218, 162, 33, > 104, 194, 52, 196, 198, 98, 139, 128, 220, 28, 209, 41, 2, 78, 8, 138, 103, > 204, 116, 2, 11, 190, 166, 59, 19, 155, 34, 81, 74, 8, 121, 142, 52, 4, > 221, 239, 149, 25, 179, 205, 58, 67, 27, 48, 43, 10, 109, 242, 95, 20, 55, > 79, 225, 53, 109, 109, 81, 194, 69, 228, 133, 181, 118, 98, 94, 126, 198, > 244, 76, 66, 233, 166, 55, 237, 107, 11, 255, 92, 182, 244, 6, 183, 237, > 238, 56, 107, 251, 90, 137, 159, 165, 174, 159, 36, 17, 124, 75, 31, 230, > 73, 40, 102, 81, 236, 230, 83, 129, 255, 255, 255, 255, 255, 255, 255, 255 } > 155, DH Base: { 2 } > Server DH Public Key: { 134, 63, 21, 208, 230, 233, 175, 114, 39, 141, > 112, 190, 98, 170, 50, 62, 188, 50, 255, 139, 99, 214, 188, 84, 72, 83, > 180, 84, 119, 199, 203, 23, 228, 34, 201, 57, 130, 183, 252, 53, 152, 17, > 186, 166https-jsse-nio-8443-exec-4, READ: TLSv1.2 Change Cipher Spec, > length = 1 > https-jsse-nio-8443-exec-9, WRITE: TLSv1.2 Application Data, length = 20 > 2019-03-04 11:45:59,567 |jsse-nio-8443-exec-9 |ServerHitBin > |I| Visit delegatorName=default, ServerHitBin delegatorName=default > https-jsse-nio-8443-exec-4, READ: TLSv1.2 Handshake, length = 40 > 2019-03-04 11:45:59,586 |jsse-nio-8443-exec-9 |ControlServlet > |T| [[[login(Domain:https://localhost)] Request Done- total:0.433,since > last([login(Domain:htt...):0.433]] > *** Finished > verify_data: { 155, 222, 165, 24, 115, 12, 246, 156, 60, 164, 142, 178 } > *** > https-jsse-nio-8443-exec-4, WRITE: TLSv1.2 Change Cipher Spec, length = 1 > *** Finished > verify_data: { 6, 6, 16, 184, 161, 157, 241, 204, 225, 185, 204, 190 } > *** > , 106, 35, 185, 98, 28, 250, 88, 249 } > Session ID: , 2, 255, 71, 96 } > Session ID: 64, 104, 42, 166, 221, 165, 130, 152, 79, 44, 74, 66, 234, > 105, 217, 162, 156, 55, 120, 122, 122, 100, 89, 111, 1, 89, 172, 237, 227, > 121, 153, 61, 228, 161, 19, 115, 184, 42, 124, 190, 204, 189, 222, 120, > 130, 193, 146, 0, 91, 96, 21, 216, 12, 212, 121, 122, 185, 188, 213, 232, > 141, 115, 36, 88, 98, 138, 166, 244, 88, 246, 108, 235, 28, 181, 191, 203, > 95, 70, 83, 147, 235, 212, 94, 154, 107, 232, 137, 63, 123, 156, 188, 229, > 8, 225, 216, 246, 95, 134, 1, 192, 30 } > Session ID: 49{92, 125, 15, 247, 188, 79, 171, 39, 143, 40, 158, 162, > 235, 8, 205, 92, 188, 20, 0, 130, 247, 147, 227, 140, 94, 73, 165, 209, > 150, 178, 61, 238} > Cipher Suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 > Compression Method: 0 > https-jsse-nio-8443-exec-9, WRITE: TLSv1.2 Application Data, length = 84 > {92, 125, 15, 237, 254, 33, 2, 52, 144, 148, 0, 165, 156, 232, 106, 139, > 222, 199, 99, 71, 41, 230, 1, 75, 246, 145, 175, 22, 191, 231, 28, 218} > Cipher Suites: [Unknown 0x13:0x2, Unknown 0x13:0x3, Unknown 0x13:0x1, > Unknown 0x13:0x4, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, Unknown > 0xcc:0xa9, Unknown 0xc0:0xad, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, > TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0xac, > TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, > TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa8, > TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, > TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_GCM_SHA384, > Unknown 0xc0:0x9d, TLS_RSA_WITH_AES_256_CBC_SHA, > TLS_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9c, > TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, Unknown > 0xcc:0xaa, Unknown 0xc0:0x9f, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, > TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9e, > TLS_DHE_RSA_WITH_AES_128_CBC_SHA] > Compression Methods: { 0 } > Unsupported extension status_request, data: 01:00:00:00:00 > Extension elliptic_curves, curve names: {secp256r1, secp384r1, secp521r1, > unknown curve 29, unknown curve 256, unknown curve 257, unknown curve 258, > unknown curve 259, unknown curve 260} > Extension ec_point_formats, formats: [uncompressed] > Extension signature_algorithms, signature_algorithms: SHA256withRSA, > Unknown (hash:0x8, signature:0x9), Unknown (hash:0x8, signature:0x4), > SHA256withECDSA, Unknown (hash:0x8, signature:0x7), SHA384withRSA, Unknown > (hash:0x8, signature:0xa), Unknown (hash:0x8, signature:0x5), > SHA384withECDSA, SHA512withRSA, Unknown (hash:0x8, signature:0xb), Unknown > (hash:0x8, signature:0x6), SHA512withECDSA, SHA1withRSA, SHA1withECDSA > Unsupported extension type_35, data: > Unsupported extension type_51, data: > 00:69:00:17:00:41:04:09:2c:38:aa:5b:66:0a:29:e1:28:22:44:e6:26:34:0f:77:d8:d5:c5:c2:06:5f:9f:ab:05:cb:26:60:db:ac:37:26:61:cc:69:6c:58:20:88:2f:9d:18:72:cf:2e:01:e5:9b:db:9b:26:c8:95:50:a8:66:9c:e6:30:b2:f5:3d:b0:00:1d:00:20:40:c5:6e:d8:93:c4:ca:68:a7:b1:db:d4:c4:a3:5a:61:73:74:57:c9:d5:cf:2f:c1:21:7a:3a:ff:c3:a0:f5:28 > Unsupported extension type_43, data: 08:03:04:03:03:03:02:03:01 > Extension renegotiation_info, renegotiated_connection: <empty> > Extension server_name, server_name: [type=host_name (0), value=localhost] > Unsupported extension type_45, data: 02:01:00 > Unsupported extension type_28, data: 40:00 > Unsupported extension type_21, data: > 00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00 > *** > %% Initialized: [Session-14, SSL_NULL_WITH_NULL_NULL] > https-jsse-nio-8443-exec-9, READ: TLSv1.2 Alert, length = 26 > {92, 125, 15, 247, 50, 58, 5, 184, 11, 182, 57, 252, 105, 8, 156, 212, > 100, 243, 238, 186, 235, 226, 190, 120, 154, 82, 26, 51, 98, 107, 132, 131} > Cipher Suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 > Compression Method: 0 > https-jsse-nio-8443-exec-4, WRITE: TLSv1.2 Handshake, length = 40 > Using SSLEngineImpl. > %% Cached server session: [Session-10, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384] > Allow unsafe renegotiation: false > Allow legacy hello messages: true > Is initial handshake: true > Is secure renegotiation: false > Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for > TLSv1 > Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for > TLSv1 > Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for > TLSv1 > Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for > TLSv1 > Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for > TLSv1.1 > Standard ciphersuite chosen: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 > %% Negotiating: [Session-14, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384] > *** ServerHello, TLSv1.2 > RandomCookie: GMT: 1551699703 bytes = { 249, 106, 24, 48, 151, 27, 53, > 192, 6, 37, 123, 97, 160, 198, 58, 140, 51, 36, 55, 26, 66, 142, 253, 24, > 76, 152, 166, 217 } > Session ID: {92, 125, 15, 247, 242, 122, 131, 156, 80, 117, 217, 241, > 196, 233, 43, 6, 10, 175, 226, 239, 82, 201, 190, 246, 213, 22, 177, 21, > 148, 39, 43, 131} > Cipher Suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 > Compression Method: 0 > Extension renegotiation_info, renegotiated_connection: <empty> > *** > Cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 > *** Certificate chain > chain [0] = [ > [ > Version: V3 > Subject: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, > OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US > Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5 > > Key: Sun RSA public key, 2048 bits > modulus: > 21944740401167172627731583459321030363948627215746053925732477915060915436180167456469785746662093119306577380200747716284652995937004530444336851845029170241627465854006145050037178991946925696078563485570896673835545540824265905937881682387179314987285174428010940266412458943894800978345731524307952507729956745301047871771953945124256516782917326981125087548987889540650149121302888872237484100834740328828765018090383963294418357028839734723410564800765871733483849269364796949055153420777966213779145518299141217288017794394762274753999989298548507425930217302947589819396239489846633419099079578249651345685751 > public exponent: 65537 > Validity: [From: Fri May 30 08:43:19 GMT 2014, > To: Mon May 27 08:43:19 GMT 2024] > Issuer: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, > OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US > SerialNumber: [ a6ef7a9a 5368eb27] > > Certificate Extensions: 3 > [1]: ObjectId: 2.5.29.35 Criticality=false > AuthorityKeyIdentifier [ > KeyIdentifier [ > 0000: 78 0D 96 9D FE D3 0B BE 8C C7 E3 EC 67 04 AB 4B x...........g..K > 0010: EA E0 00 29 ...) > ] > ] > > [2]: ObjectId: 2.5.29.19 Criticality=false > BasicConstraints:[ > CA:true > PathLen:2147483647 > ] > > [3]: ObjectId: 2.5.29.14 Criticality=false > SubjectKeyIdentifier [ > KeyIdentifier [ > 0000: 78 0D 96 9D FE D3 0B BE 8C C7 E3 EC 67 04 AB 4B x...........g..K > 0010: EA E0 00 29 ...) > ] > ] > > ] > Algorithm: [SHA1withRSA] > Signature: > 0000: 19 16 5A 21 99 21 24 98 3C 0A E8 D8 00 AB 44 24 ..Z!.!$.<.....D$ > 0010: F2 0C B7 83 D5 9F 96 17 87 E2 1F 1D A3 47 68 C7 .............Gh. > 0020: 68 4A CB 56 0E 77 2B E8 1A 9F E7 09 A1 19 77 D0 hJ.V.w+.......w. > 0030: 5E CC C1 B3 9A C4 35 3D CB E0 A5 A6 43 5D A3 26 ^.....5=....C].& > 0040: A4 91 8A C1 FA 7B 10 EA DC C3 C7 1C 47 DC 97 32 ............G..2 > 0050: C0 37 80 1C F1 42 10 E3 74 17 FA 3E 60 4A B7 59 .7...B..t..>`J.Y > 0060: 92 C1 E0 6F BB F1 BB 9F 82 89 B5 83 D5 AE 1E 90 ...o............ > 0070: 0A 89 8D FB 4C C0 C5 9E DC C5 8C C6 2F EE D9 B4 ....L......./... > 0080: 95 47 27 2E BE 82 31 6F 76 C0 DB 4C C8 0D 3B 7B .G'...1ov..L..;. > 0090: D1 6A BF BD 3B 93 30 04 A2 9E 81 F7 96 28 77 F2 .j..;.0......(w. > 00A0: 32 05 68 44 1F B3 30 CE 40 9F 20 F3 B4 2B AA E6 2.hD..0.@. ..+.. > 00B0: 40 9B FB 7F 34 6E 3A 99 FD F8 28 F1 8C 9B 56 34 @...4n:...(...V4 > 00C0: 64 AD 4D 56 39 CB 96 18 50 9B 99 43 80 0A 39 A5 d.MV9...P..C..9. > 00D0: 13 7A 6E C5 25 E0 95 4A 92 E5 A8 8B EE 03 49 B4 .zn.%..J......I. > 00E0: D9 7C 00 E3 F0 3B A7 BA 40 30 CC 89 55 C6 97 93 .....;..@0..U... > 00F0: B5 15 F6 62 D3 B1 74 9C 0B 80 2B 8A D4 03 84 A0 ...b..t...+..... > > ] > *** > Extension renegotiation_info, renegotiated_connection: <empty> > *** > Cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 > https-jsse-nio-8443-exec-9, RECV TLSv1.2 ALERT: warning, close_notify > https-jsse-nio-8443-exec-9, closeInboundInternal() > Extension renegotiation_info, renegotiated_connection: <empty> > *** > , Cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 > https-jsse-nio-8443-exec-9, closeOutboundInternal() > *** Certificate chain > https-jsse-nio-8443-exec-8, WRITE: TLSv1.2 Application Data, length = 84 > chain [0] = [ > [ > Version: V3 > Subject: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, > OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US > Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5 > > Key: Sun RSA public key, 2048 bits > modulus: > 21944740401167172627731583459321030363948627215746053925732477915060915436180167456469785746662093119306577380200747716284652995937004530444336851845029170241627465854006145050037178991946925696078563485570896673835545540824265905937881682387179314987285174428010940266412458943894800978345731524307952507729956745301047871771953945124256516782917326981125087548987889540650149121302888872237484100834740328828765018090383963294418357028839734723410564800765871733483849269364796949055153420777966213779145518299141217288017794394762274753999989298548507425930217302947589819396239489846633419099079578249651345685751 > public exponent: 65537 > Validity: [From: Fri May 30 08:43:19 GMT 2014, > To: Mon May 27 08:43:19 GMT 2024] > Issuer: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, > OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US > SerialNumber: [ a6ef7a9a 5368eb27] > > Certificate Extensions: 3 > [1]: ObjectId: 2.5.29.35 Criticality=false > AuthorityKeyIdentifier [ > KeyIdentifier [ > 0000: 78 0D 96 9D FE D3 0B BE 8C C7 E3 EC 67 04 AB 4B x...........g..K > 0010: EA E0 00 29 ...) > ] > ] > > [2]: ObjectId: 2.5.29.19 Criticality=false > BasicConstraints:[ > CA:true > PathLen:2147483647 > ] > > [3]: ObjectId: 2.5.29.14 Criticality=false > SubjectKeyIdentifier [ > KeyIdentifier [ > 0000: 78 0D 96 9D FE D3 0B BE 8C C7 E3 EC 67 04 AB 4B x...........g..K > 0010: EA E0 00 29 ...) > ] > ] > > ] > Algorithm: [SHA1withRSA] > Signature: > 0000: 19 16 5A 21 99 21 24 98 3C 0A E8 D8 00 AB 44 24 ..Z!.!$.<.....D$ > 0010: F2 0C B7 83 D5 9F 96 17 87 E2 1F 1D A3 47 68 C7 .............Gh. > 0020: 68 4A CB 56 0E 77 2B E8 1A 9F E7 09 A1 19 77 D0 hJ.V.w+.......w. > 0030: 5E CC C1 B3 9A C4 35 3D CB E0 A5 A6 43 5D A3 26 ^.....5=....C].& > 0040: A4 91 8A C1 FA 7B 10 EA DC C3 C7 1C 47 DC 97 32 ............G..2 > 0050: C0 37 80 1C F1 42 10 E3 74 17 FA 3E 60 4A B7 59 .7...B..t..>`J.Y > 0060: 92 C1 E0 6F BB F1 BB 9F 82 89 B5 83 D5 AE 1E 90 ...o............ > 0070: 0A 89 8D FB 4C C0 C5 9E DC C5 8C C6 2F EE D9 B4 ....L......./... > 0080: 95 47 27 2E BE 82 31 6F 76 C0 DB 4C C8 0D 3B 7B .G'...1ov..L..;. > 0090: D1 6A BF BD 3B 93 30 04 A2 9E 81 F7 96 28 77 F2 .j..;.0......(w. > 00A0: 32 05 68 44 1F B3 30 CE 40 9F 20 F3 B4 2B AA E6 2.hD..0.@. ..+.. > 00B0: 40 9B FB 7F 34 6E 3A 99 FD F8 28 F1 8C 9B 56 34 @...4n:...(...V4 > 00C0: 64 AD 4D 56 39 CB 96 18 50 9B 99 43 80 0A 39 A5 d.MV9...P..C..9. > 00D0: 13 7A 6E C5 25 E0 95 4A 92 E5 A8 8B EE 03 49 B4 .zn.%..J......I. > 00E0: D9 7C 00 E3 F0 3B A7 BA 40 30 CC 89 55 C6 97 93 .....;..@0..U... > 00F0: B5 15 F6 62 D3 B1 74 9C 0B 80 2B 8A D4 03 84 A0 ...b..t...+..... > > ] > *** > Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for > TLSv1.1 > https-jsse-nio-8443-exec-8, READ: TLSv1.2 Alert, length = 26 > *** Diffie-Hellman ServerKeyExchange > DH Modulus: { 255, 255, 255, 255, 255, 255, 255, 255, 201, 15, 218, 162, > 33, 104, 194, 52, 196, 198, 98, 139, 128, 220, 28, 209, 41, 2, 78, 8, 138, > 103, 204, 116, 2, 11, 190, 166, 59, 19, 155, 34, 81, 74, 8, 121, 142, 52, > 4, 221, 239, 149, 25, 179, 205, 58, 67, 27, 48, 43, 10, 109, 242, 95, 20, > 55, 79, 225, 53, 109, 109, 81, 194, 69, 228, 133, 181, 118, 98, 94, 126, > 198, 244, 76, 66, 233, 166, 55, 237, 107, 11, 255, 92, 182, 244, 6, 183, > 237, 238, 56, 107, 251, 90, 137, 159, 165, 174, 159, 36, 17, 124, 75, 31, > 230, 73, 40, 102, 81, 236, 230, 83, 129, 255, 255, Using SSLEngineImpl. > Allow unsafe renegotiation: false > Allow legacy hello messages: true > Is initial handshake: true > Is secure renegotiation: false > Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for > TLSv1 > Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for > TLSv1 > Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for > TLSv1 > Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for > TLSv1 > Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for > TLSv1.1 > Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for > TLSv1.1 > Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for > TLSv1.1 > Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for > TLSv1.1 > https-jsse-nio-8443-exec-4, READ: TLSv1 Handshake, length = 512 > *** ClientHello, TLSv1.2 > RandomCookie: GMT: 643821250 bytes = { 137, 48, 182, 80, 80, 34, 131, > 177, 184, 128, 9, 127, 211, 99, 150, 129, 92, 69, 3, 172, 96, 191, 219, > 200, 115, 25, 212, 35 } > Session ID: {92, 125, 15, 247, 246, 249, 211, 141, 164, 158, 249, 105, > 184, 211, 34, 29, 135, 131, 232, 36, 64, 192, 38, 174, 54, 83, 112, 53, > 142, 111, 182, 94} > Cipher Suites: [Unknown 0x13:0x2, Unknown 0x13:0x3, Unknown 0x13:0x1, > Unknown 0x13:0x4, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, Unknown > 0xcc:0xa9, Unknown 0xc0:0xad, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, > TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0xac, > TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, > TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa8, > TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, > TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_GCM_SHA384, > Unknown 0xc0:0x9d, TLS_RSA_WITH_AES_256_CBC_SHA, > TLS_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9c, > TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, Unknown > 0xcc:0xaa, Unknown 0xc0:0x9f, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, > TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9e, > TLS_DHE_RSA_WITH_AES_128_CBC_SHA] > Compression Methods: { 0 } > Unsupported extension status_request, data: 01:00:00:00:00 > Extension elliptic_curves, curve names: {secp256r1, secp384r1, secp521r1, > unknown curve 29, unknown curve 256, unknown curve 257, unknown curve 258, > unknown curve 259, unknown curve 260} > Extension ec_point_formats, formats: [uncompressed] > Extension signature_algorithms, signature_algorithms: SHA256withRSA, > Unknown (hash:0x8, signature:0x9), Unknown (hash:0x8, signature:0x4), > SHA256withECDSA, Unknown (hash:0x8, signature:0x7), SHA384withRSA, Unknown > (hash:0x8, signature:0xa), Unknown (hash:0x8, signature:0x5), > SHA384withECDSA, SHA512withRSA, Unknown (hash:0x8, signature:0xb), Unknown > (hash:0x8, signature:0x6), SHA512withECDSA, SHA1withRSA, SHA1withECDSA > Unsupported extension type_35, data: > Unsupported extension type_51, data: > 00:69:00:17:00:41:04:78:2b:24:a2:10:62:da:65:7e:7f:87:75:d2:71:65:9b:df:5a:cc:85:8a:dd:8f:da:79:7d:22:ec:77:68:7e:b8:ac:e1:a7:b8:49:c7:09:e1:c9:45:bf:0b:31:62:e8:f6:4d:a9:9a:26:ab:fd:ec:b9:cf:f9:9a:98:fc:6a:05:f3:00:1d:00:20:2f:22:42:1e:67:89:6e:49:6a:48:64:f2:8e:92:11:05:92:e5:7d:8d:85:c7:b0:1f:96:3d:14:aa:8e:b8:74:08 > Unsupported extension type_43, data: 08:03:04:03:03:03:02:03:01 > Extension renegotiation_info, renegotiated_connection: <empty> > Extension server_name, server_name: [type=host_name (0), value=localhost] > Unsupported extension type_45, data: 02:01:00 > Unsupported extension type_28, data: 40:00 > Unsupported extension type_21, data: > 00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00 > *** > *** Diffie-Hellman ServerKeyExchange > https-jsse-nio-8443-exec-9, SEND TLSv1.2 ALERT: warning, description = > close_notify > *** Certificate chain > https-jsse-nio-8443-exec-9, WRITE: TLSv1.2 Alert, length = 26 > https-jsse-nio-8443-exec-9, called closeOutbound() > https-jsse-nio-8443-exec-9, closeOutboundInternal() > chain [0] = [ > [ > Version: V3 > Subject: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, > OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US > Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5 > > Key: Sun RSA public key, 2048 bits > modulus: > 21944740401167172627731583459321030363948627215746053925732477915060915436180167456469785746662093119306577380200747716284652995937004530444336851845029170241627465854006145050037178991946925696078563485570896673835545540824265905937881682387179314987285174428010940266412458943894800978345731524307952507729956745301047871771953945124256516782917326981125087548987889540650149121302888872237484100834740328828765018090383963294418357028839734723410564800765871733483849269364796949055153420777966213779145518299141217288017794394762274753999989298548507425930217302947589819396239489846633419099079578249651345685751 > public exponent: 65537 > Validity: [From: Fri May 30 08:43:19 GMT 2014, > To: Mon May 27 08:43:19 GMT 2024] > Issuer: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, > OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US > SerialNumber: [ a6ef7a9a 5368eb27] > > Certificate Extensions: 3 > [1]: ObjectId: 2.5.29.35 Criticality=false > AuthorityKeyIdentifier [ > KeyIdentifier [ > 0000: 78 0D 96 9D FE D3 0B BE 8C C7 E3 EC 67 04 AB 4B x...........g..K > 0010: EA E0 00 29 ...) > ] > ] > > [2]: ObjectId: 2.5.29.19 Criticality=false > BasicConstraints:[ > CA:true > PathLen:2147483647 > ] > > [3]: ObjectId: 2.5.29.14 Criticality=false > SubjectKeyIdentifier [ > KeyIdentifier [ > 0000: 78 0D 96 9D FE D3 0B BE 8C C7 E3 EC 67 04 AB 4B x...........g..K > 0010: EA E0 00 29 ...) > ] > ] > > ] > Algorithm: [SHA1withRSA] > Signature: > 0000: 19 16 5A 21 99 21 24 98 3C 0A E8 D8 00 AB 44 24 ..Z!.!$.<.....D$ > 0010: F2 0C B7 83 D5 9F 96 17 87 E2 1F 1D A3 47 68 C7 .............Gh. > 0020: 68 4A CB 56 0E 77 2B E8 1A 9F E7 09 A1 19 77 D0 hJ.V.w+.......w. > 0030: 5E CC C1 B3 9A C4 35 3D CB E0 A5 A6 43 5D A3 26 ^.....5=....C].& > 0040: A4 91 8A C1 FA 7B 10 EA DC C3 C7 1C 47 DC 97 32 ............G..2 > 0050: C0 37 80 1C F1 42 10 E3 74 17 FA 3E 60 4A B7 59 .7...B..t..>`J.Y > 0060: 92 C1 E0 6F BB F1 BB 9F 82 89 B5 83 D5 AE 1E 90 ...o............ > 0070: 0A 89 8D FB 4C C0 C5 9E DC C5 8C C6 2F EE D9 B4 ....L......./... > 0080: 95 47 27 2E BE 82 31 6F 76 C0 DB 4C C8 0D 3B 7B .G'...1ov..L..;. > 0090: D1 6A BF BD 3B 93 30 04 A2 9E 81 F7 96 28 77 F2 .j..;.0......(w. > 00A0: 32 05 68 44 1F B3 30 CE 40 9F 20 F3 B4 2B AA E6 2.hD..0.@. ..+.. > 00B0: 40 9B FB 7F 34 6E 3A 99 FD F8 28 F1 8C 9B 56 34 @...4n:...(...V4 > 00C0: 64 AD 4D 56 39 CB 96 18 50 9B 99 43 80 0A 39 A5 d.MV9...P..C..9. > 00D0: 13 7A 6E C5 25 E0 95 4A 92 E5 A8 8B EE 03 49 B4 .zn.%..J......I. > 00E0: D9 7C 00 E3 F0 3B A7 BA 40 30 CC 89 55 C6 97 93 .....;..@0..U... > 00F0: B5 15 F6 62 D3 B1 74 9C 0B 80 2B 8A D4 03 84 A0 ...b..t...+..... > > ] > *** > 75, %% Initialized: [Session-15, SSL_NULL_WITH_NULL_NULL] > DH Modulus: { 255, 255, 255, 255, 255, 255 } > https-jsse-nio-8443-exec-8, RECV TLSv1.2 ALERT: warning, close_notify > https-jsse-nio-8443-exec-8, closeInboundInternal() > https-jsse-nio-8443-exec-8, closeOutboundInternal() > https-jsse-nio-8443-exec-8, SEND TLSv1.2 ALERT: warning, description = > close_notify > https-jsse-nio-8443-exec-8, WRITE: TLSv1.2 Alert, length = 26 > https-jsse-nio-8443-exec-8, called closeOutbound() > https-jsse-nio-8443-exec-8, closeOutboundInternal() > Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for > TLSv1.1 > 255DH Base: { 2 } > Server DH Public Key: { 177, 46, 218, 230, 151, 33, 161, 94, 214, 180, > 215, 165, 151, 60, 134, 118, 72, 235, 168, 110, 64, 81, 143, 166, 12, 246, > 101, 54, 179, 48, 30, 25, 217, 6, 0, 82, 255, 156, 50, 42, 163, 245, 129, > 17, 24, 191, 111, 135, 130, 39, 111, 76, 27, 43, 199, 194, 122, 223, 144, > 110, 178, 79, 101, 109, 51, 158, 60, 219, 86, 104, 87, 22, 16, 145, 98, > 213, 41, 162, 41, 194, 85, 251, 46, 21, 164, 92, 82, 43, 64, 134, 22, 167, > 216, 227, 36, 230, 90, 31, 150, 223, 17, 125, 194, 16, 229, 56, 37, 71, > 180, 75, 67, 107, 4, 154, 250, 220, 233, 74, 138, 181, 207, 206, 65, 73, > 71, 142, 1, 225 } > Signature Algorithm SHA256withRSA > Signed with a DSA or RSA public key > *** ServerHelloDone > https-jsse-nio-8443-exec-6, WRITE: TLSv1.2 Handshake, length = 1697 > Standard ciphersuite chosen: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 > %% Negotiating: [Session-15, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384] > *** ServerHello, TLSv1.2 > RandomCookie: GMT: 1551699703 bytes = { 198, 11, 117, 179, 159, 93, 48, > 227, 13, 155, 36, 80, 90, 158, 84, 220, 89, 20, 35, 144, 216, 180, 203, 23, > 217, 172, 24, 58 } > Session ID: {92, 125, 15, 247, 11, 132, 70, 127, 210, 91, 74, 138, 226, > 252, 111, 170, 226, 8, 142, 158, 184, 98, 97, 19, 34, 33, 55, 248, 219, 15, > 65, 161} > Cipher Suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 > Compression Method: 0 > Extension renegotiation_info, renegotiated_connection: <empty> > *** > Cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 > *** Certificate chain > 196, 187, 73, 78, 45, 31, 224, 64, 65, 236, 30, 143, 125, 66, 234 } > Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for > TLSv1.1 > https-jsse-nio-8443-exec-6, READ: TLSv1.2 Handshake, length = 134 > *** ClientKeyExchange, DH > DH Public key: { 157, 154, 50, 120, 59, 112, 151, 246, 118, 246, 99, 60, > 208, 120, 179, 160, 184, 247, 26, 167, 185, 205, 106, 238, 241, 71, 3, 69, > 147, 4, 120, 153, 192, 24, 173, 137, 235, 161, 187, 124, 156, 85, 177, 114, > 253, 240, 126, 107, 95, 2, 136, 50, 197, 247, 97, 81, 79, 54, 32, 43, 112, > 132, 176, 192, 158, 187, 122, 171, 118, 218, 96, 214, 148, 234, 43, 164, > 105, 71, 136, 215, 29, 80, 246, 123, 214, 203, 34, 98, 141, 91, 100, 11, > 130, 114, 53, 116, 176, 188, 130, 120, 144, 12, 227, 168, 217, 19, 252, > 132, 217, 104, 81, 169, 205, 73, 108, 87, 232, 158, 7, 239, 184, 156, 165, > 71, 209, 54, 191, 82 } > chain [0] = [ > [ > Version: V3 > Subject: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, > OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US > Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5 > > Key: Sun RSA public key, 2048 bits > modulus: > 21944740401167172627731583459321030363948627215746053925732477915060915436180167456469785746662093119306577380200747716284652995937004530444336851845029170241627465854006145050037178991946925696078563485570896673835545540824265905937881682387179314987285174428010940266412458943894800978345731524307952507729956745301047871771953945124256516782917326981125087548987889540650149121302888872237484100834740328828765018090383963294418357028839734723410564800765871733483849269364796949055153420777966213779145518299141217288017794394762274753999989298548507425930217302947589819396239489846633419099079578249651345685751 > public exponent: 65537 > Validity: [From: Fri May 30 08:43:19 GMT 2014, > To: Mon May 27 08:43:19 GMT 2024] > Issuer: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, > OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US > SerialNumber: [ a6ef7a9a 5368eb27] > > Certificate Extensions: 3 > [1]: ObjectId: 2.5.29.35 Criticality=false > AuthorityKeyIdentifier [ > KeyIdentifier [ > 0000: 78 0D 96 9D FE D3 0B BE 8C C7 E3 EC 67 04 AB 4B x...........g..K > 0010: EA E0 00 29 ...) > ] > ] > > [2]: ObjectId: 2.5.29.19 Criticality=false > BasicConstraints:[ > CA:true > PathLen:2147483647 > ] > > [3]: ObjectId: 2.5.29.14 Criticality=false > SubjectKeyIdentifier [ > KeyIdentifier [ > 0000: 78 0D 96 9D FE D3 0B BE 8C C7 E3 EC 67 04 AB 4B x...........g..K > 0010: EA E0 00 29 ...) > ] > ] > > ] > Algorithm: [SHA1withRSA] > Signature: > 0000: 19 16 5A 21 99 21 24 98 3C 0A E8 D8 00 AB 44 24 ..Z!.!$.<.....D$ > 0010: F2 0C B7 83 D5 9F 96 17 87 E2 1F 1D A3 47 68 C7 .............Gh. > 0020: 68 4A CB 56 0E 77 2B E8 1A 9F E7 09 A1 19 77 D0 hJ.V.w+.......w. > 0030: 5E CC C1 B3 9A C4 35 3D CB E0 A5 A6 43 5D A3 26 ^.....5=....C].& > 0040: A4 91 8A C1 FA 7B 10 EA DC C3 C7 1C 47 DC 97 32 ............G..2 > 0050: C0 37 80 1C F1 42 10 E3 74 17 FA 3E 60 4A B7 59 .7...B..t..>`J.Y > 0060: 92 C1 E0 6F BB F1 BB 9F 82 89 B5 83 D5 AE 1E 90 ...o............ > 0070: 0A 89 8D FB 4C C0 C5 9E DC C5 8C C6 2F EE D9 B4 ....L......./... > 0080: 95 47 27 2E BE 82 31 6F 76 C0 DB 4C C8 0D 3B 7B .G'...1ov..L..;. > 0090: D1 6A BF BD 3B 93 30 04 A2 9E 81 F7 96 28 77 F2 .j..;.0......(w. > 00A0: 32 05 68 44 1F B3 30 CE 40 9F 20 F3 B4 2B AA E6 2.hD..0.@. ..+.. > 00B0: 40 9B FB 7F 34 6E 3A 99 FD F8 28 F1 8C 9B 56 34 @...4n:...(...V4 > 00C0: 64 AD 4D 56 39 CB 96 18 50 9B 99 43 80 0A 39 A5 d.MV9...P..C..9. > 00D0: 13 7A 6E C5 25 E0 95 4A 92 E5 A8 8B EE 03 49 B4 .zn.%..J......I. > 00E0: D9 7C 00 E3 F0 3B A7 BA 40 30 CC 89 55 C6 97 93 .....;..@0..U... > 00F0: B5 15 F6 62 D3 B1 74 9C 0B 80 2B 8A D4 03 84 A0 ...b..t...+..... > > ] > *** > SESSION KEYGEN: > PreMaster Secret: > 0000: 4C 4C 7D 36 B9 C2 EA 5B 14 A6 33 34 1D 0B E1 4C LL.6...[..34...L > 0010: FF 80 50 41 86 7E 0E 53 C8 DD F0 E5 78 2A FC A7 ..PA...S....x*.. > 0020: A5 57 35 26 9C C6 DC 32 0A 9F F0 67 B2 E2 97 B6 .W5&...2...g.... > 0030: 91 1D BD C5 F7 D1 BD 87 59 AD 5A C6 6F C1 86 93 ........Y.Z.o... > 0040: 56 CD E9 09 C2 F1 4B 7D 00 78 FA C0 BF D8 53 44 V.....K..x....SD > 0050: E8 BF 14 5A AA 28 59 B6 8B 2A DC 92 ED 16 47 B4 ...Z.(Y..*....G. > 0060: BD 3C 66 98 F8 86 61 AB 3B 2C 02 DE FE 0D CB 53 .<f...a.;,.....S > 0070: 6D A1 F4 88 82 73 C8 F7 98 CC 42 4A 87 6F 9B DB m....s....BJ.o.. > CONNECTION KEYGEN: > Client Nonce: > 0000: 86 AC A9 EC 72 70 55 A6 D6 DD EC 7B B8 70 86 17 ....rpU......p.. > 0010: E4 22 C9 39 82 B7 FC 35 98 11 BA A6 02 FF 47 60 .".9...5......G` > Server Nonce: > 0000: 5C 7D 0F F7 F9 6A 18 30 97 1B 35 C0 06 25 7B 61 \....j.0..5..%.a > 0010: A0 C6 3A 8C 33 24 37 1A 42 8E FD 18 4C 98 A6 D9 ..:.3$7.B...L... > Master Secret: > 0000: D2 6F 9C 6A E2 98 C7 AC E1 36 49 74 D3 74 72 20 .o.j.....6It.tr > 0010: 25 16 88 E3 C0 12 14 B0 66 17 52 9A 94 3B 1E AE %.......f.R..;.. > 0020: DD 7E 78 F7 1C 21 74 67 65 7C 55 09 12 54 65 36 ..x..!tge.U..Te6 > ... no MAC keys used for this cipher > Client write key: > 0000: F8 CA 67 96 B0 33 B9 F6 3E EE D8 29 8A 18 70 25 ..g..3..>..)..p% > 0010: B0 C2 22 05 1E A2 CC C6 9F 92 62 C9 DB D8 AB 46 ..".......b....F > Server write key: > 0000: 6F FA 2F 76 B0 CE 3D 38 8B 8C 53 48 3E 16 63 49 o./v..=8..SH>.cI > 0010: 29 ED B7 D0 85 DD C8 3B 11 19 71 29 BC 2F C0 43 )......;..q)./.C > Client write IV: > 0000: 90 75 CF 92 .u.. > Server write IV: > 0000: C3 17 23 D2 ..#. > https-jsse-nio-8443-exec-6, READ: TLSv1.2 Change Cipher Spec, length = 1 > https-jsse-nio-8443-exec-6, READ: TLSv1.2 Handshake, length = 40 > *** Finished > verify_data: { 125, 229, 83, 206, 118, 221, 127, 176, 77, 43, 74, 250 } > *** > https-jsse-nio-8443-exec-6, WRITE: TLSv1.2 Change Cipher Spec, length = 1 > *** Finished > verify_data: { 220, 32, 94, 37, 86, 154, 92, 9, 15, 195, 183, 59 } > *** > Signature Algorithm SHA256withRSA > Signed with a DSA or RSA public key > *** ServerHelloDone > *** Diffie-Hellman ServerKeyExchange > DH Modulus: { 255, 255, 255, 255, 255, 255, 255, 255, 201, 15, 218, 162, > 33, 104, 194, 52, 196, 198, 98, 139, 128, 220, 28, 209, 41, 2, 78, 8, 138, > 103, 204, 116, 2, 11, 190, 166, 59, 19, 155, 34, 81, 74, 8, 121, 142, 52, > 4, 221, 239, 149, 25, 179, 205, 58, 67, 27, 48, 43, 10, 109, 242, 95, 20, > 55, 79, 225, 53, 109, 109, 81, 194, , 255, 255, 255, 255, 255, 255, 255, > 201, *** Diffie-Hellman ServerKeyExchange > 15DH Modulus: { 255, 255, 255, 255, 255, 255, 255, 255, 201, 15, 218, > 162, 33, 104, 194, 52, 196, 198, 98, 139, 128, 220, 28, 209, 41, 2, 78, 8, > 138, 103, 204, 116, 2, 11, 190, 166, 59, 19, 155, 34, 81, 74, 8, 121, 142, > 52, 4, 221, 239, 149, 25, 179, 205, 58, 67, 27, 48, 43, 10, 109, 242, 95, > 20, 55, 79, 225, 53, 109, 109, 81, 194, 69, 228, 133, 181, 118, 98, 94, > 126, 198, 244, 76, 66, 233, 166, 55, 237, 107, 11, 255, 92, 182, 244, 6, > 183, 237, 238, 56, 107, 251, 90, 137, 159, 165, 174, 159, 36, 17, 124, 75, > 31, 230, 73, 40, 102, 81, 236, 230, 83, 129, 255, 255, 255, 255, 255, 255, > 255, 255 } > https-jsse-nio-8443-exec-6, WRITE: TLSv1.2 Handshake, length = 40 > 69, 228, 133, 181, 118, 98, 94, 126, 198, 244, 76, 66, 233, 166, 55, 237, > 107, 11, 255, 92, 182, 244, 6, 183, 237, 238, 56, 107, 251, 90, 137, 159, > 165, 174, 159, 36, 17, 124, 75, 31, 230, 73, 40, 102, 81, 236, 230, 83, > 129, 255, 255, 255, 255, 255, 255, 255, 255 } > https-jsse-nio-8443-exec-1, WRITE: TLSv1.2 Handshake, length = 1697 > https-jsse-nio-8443-exec-7, READ: TLSv1 Handshake, length = 512 > DH Base: { 2 } > Server DH Public Key: { 193, 96, 176, 222, 230, 37, 252, 19, 5, 43, 101, > 80, 70, 102, 130, 118, 131, 152, 32, 57, 29, 115, 181, 106, 56, 103, 229, > 196, 134, 219, 63, 212, 96, 179, 36, 86, 213, 90, 81, 245, 4, 58, 100, 54, > 84, 210, 191, 183, 116, 242, 80, 67, 50, 253, 211, 91, 173, 143, 212, 82, > 195, 58, 108, 142, 94, 192, 231, 124, 87, 50, 145, 248, 23, 86, 64, 46, > 122, 103, 165, 81, 62, 140, 56, 244, 41, 224, 250, 39, 64, 223, 7, 39, 34, > 56, 204, 44, 1, 248, 68, 126, 121, 77, 81, 20, 78, 26, 74, 211, 31, 115, > 33, 196, 185, 198, 143, 159, 34, 7, 162, 30, 165, 75, 115, 173, 30, 23, > 147, 152 } > Signature Algorithm SHA256withRSA > Signed with a DSA or RSA public key > *** ServerHelloDone > https-jsse-nio-8443-exec-4, WRITE: TLSv1.2 Handshake, length = 1697 > %% Cached server session: [Session-14, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384] > DH Base: { 2 } > Server DH Public Key: { 70, 38, 125, 98, 236, 23, 27, 22, 194, 211, 229, > 253, 113, 86, 193, 213, 189, 160, 201, 194, 165, 143, 35, 222, 55, 108, > 224, 113, 136, 247, 119, 255, 38, 167, 5, 67, 240, 61, 189, 136, 208, 229, > 118, 220, 251, 141, 36, 156, 74, 98, 117, 235, 180, 84, 153, 139, 114, 161, > 108, 133, 123, 63, 193, 121, 68, 167, 18, 183, 79, 252, 161, 177, 41, 85, > 193, 92, 167, 191, 42, 54, 87, 60, 213, 143, 93, 116, 122, 227, 157, 37, > 40, 44, 135, 232, 156, 208, 179, 219, 176, 42, 238, 51, 230, 16, 155, 11, > 223, 98, 92, 102, 24, 13, 252, 30, 137, 81, 233, 185, 167, 116, 70, 131, > 130, 117, 144, 239, 35, 50 } > Signature Algorithm SHA256withRSA > Signed with a DSA or RSA public key > *** ServerHelloDone > , 218, 162, 33, 104, 194, 52, 196, 198, 98, 139, 128, 220, 28, 209, 41, 2, > 78, 8, 138, 103, 204, 116, 2, 11, 190, 166, 59, 19, 155, 34, 81, 74, 8, > 121, 142, 52, 4, 221, 239, 149, 25, 179, 205, 58, 67, 27, 48, 43, 10, 109, > 242, 95, 20, 55, 79, 225, 53, 109, 109, 81, 194, 69, 228, 133, 181, 118, > 98, 94, 126, 198, 244, 76, 66, 233, 166, 55, 237, 107, 11, 255, 92, 182, > 244, 6, 183, 237, 238, 56, 107, 251, 90, 137, 159, 165, 174, 159, 36, 17, > 124, 75, 31, 230, 73, 40, 102, 81, 236, 230, 83, 129, 255, 255, 255, 255, > 255, 255, 255, 255 } > DH Base: { 2 } > Server DH Public Key: { 217, 93, 254, 238, 74, 68, 192, 30, 45, 154, 168, > 126, 223, 188, 188, 211, 23, 82, 229, 4, 203, 84, 246, 79, 209, 112, 187, > 23, 136, 40, 120, 87, 228, 233, 170, 48, 169, 12, 71, 25, 8, 194, 208, 158, > 244, 169, 96, 249, 26, 146, 81, 65, 55, 117, 56, 39, 217, 149, 79, 35, 120, > 140, 70, 159, 60, 191, 88, 188, 142, 205, 168, 124, 168, 227, 63, 194, 245, > 114, 199, 28, 96, 77, 92, 216, 122, 186, 226, 142, 45, 235, 188, 201, 127, > 22, 123, 9, 77, 251, 179, 139, 197, 105, 182, 47, 237, 45, 167, 34, 245, > 143, 156, 101, 223, 218, 239, 63, 147, 168, 245, 151, 61, 224, 1, 76, 140, > 51, 14, 10 } > Signature Algorithm SHA256withRSA > Signed with a DSA or RSA public key > *** ServerHelloDone > https-jsse-nio-8443-exec-3, WRITE: TLSv1.2 Handshake, length = 1697 > https-jsse-nio-8443-exec-5, WRITE: TLSv1.2 Handshake, length = 1697 > https-jsse-nio-8443-exec-10, READ: TLSv1.2 Handshake, length = 134 > *** ClientHello, TLSv1.2 > RandomCookie: GMT: -706604215 bytes = { 196, 111, 179, 208, 244, 129, > 162, 107, 156, 95, 201, 27, 64, 190, 101, 179, 175, 152, 138, 37, 220, 22, > 85, 26, 42, 30, 238, 85 } > Session ID: {92, 125, 15, 237, 254, 33, 2, 52, 144, 148, 0, 165, 156, > 232, 106, 139, 222, 199, 99, 71, 41, 230, 1, 75, 246, 145, 175, 22, 191, > 231, 28, 218} > Cipher Suites: [Unknown 0x13:0x2, Unknown 0x13:0x3, Unknown 0x13:0x1, > Unknown 0x13:0x4, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, Unknown > 0xcc:0xa9, Unknown 0xc0:0xad, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, > TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0xac, > TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, > TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa8, > TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, > TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_GCM_SHA384, > Unknown 0xc0:0x9d, TLS_RSA_WITH_AES_256_CBC_SHA, > TLS_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9c, > TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, Unknown > 0xcc:0xaa, Unknown 0xc0:0x9f, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, > TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9e, > TLS_DHE_RSA_WITH_AES_128_CBC_SHA] > Compression Methods: { 0 } > Unsupported extension status_request, data: 01:00:00:00:00 > Extension elliptic_curves, curve names: {secp256r1, secp384r1, secp521r1, > unknown curve 29, unknown curve 256, unknown curve 257, unknown curve 258, > unknown curve 259, unknown curve 260} > Extension ec_point_formats, formats: [uncompressed] > Extension signature_algorithms, signature_algorithms: SHA256withRSA, > Unknown (hash:0x8, signature:0x9), Unknown (hash:0x8, signature:0x4), > SHA256withECDSA, Unknown (hash:0x8, signature:0x7), SHA384withRSA, Unknown > (hash:0x8, signature:0xa), Unknown (hash:0x8, signature:0x5), > SHA384withECDSA, SHA512withRSA, Unknown (hash:0x8, signature:0xb), Unknown > (hash:0x8, signature:0x6), SHA512withECDSA, SHA1withRSA, SHA1withECDSA > Unsupported extension type_35, data: > Unsupported extension type_51, data: > 00:69:00:17:00:41:04:ae:26:0e:77:5f:28:ef:c6:07:56:58:e5:86:ad:d2:a9:7f:36:c0:10:9f:b4:2e:3f:6e:38:42:1b:99:da:08:de:71:5e:f8:f6:73:40:34:82:e5:bf:d6:e0:88:5c:5e:76:8d:ac:e8:10:44:c4:a6:31:61:e2:c0:4e:11:a1:c5:d0:00:1d:00:20:ad:5a:7b:16:64:36:ac:fe:0c:1b:a3:66:f3:1c:c5:d6:5c:6d:6d:bf:9e:fd:dd:ba:f2:4a:92:ba:75:36:65:74 > Unsupported extension type_43, data: 08:03:04:03:03:03:02:03:01 > Extension renegotiation_info, renegotiated_connection: <empty> > Extension server_name, server_name: [type=host_name (0), value=localhost] > Unsupported extension type_45, data: 02:01:00 > Unsupported extension type_28, data: 40:00 > Unsupported extension type_21, data: > 00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00 > *** > %% Initialized: [Session-16, SSL_NULL_WITH_NULL_NULL] > https-jsse-nio-8443-exec-8, WRITE: TLSv1.2 Application Data, length = 85 > https-jsse-nio-8443-exec-9, READ: TLSv1.2 Handshake, length = 134 > *** ClientKeyExchange, DH > DH Public key: { 208, 16, 173, 145, 228, 230, 22, 149, 101, 4, 218, 106, > 213, 64, 141, 224, 237, 45, Using SSLEngineImpl. > *** ClientKeyExchange, DH > DH Public key: { 99, 58, 152, 205, 251, 195, 178, 244, 230, 142, 181, > 100, Allow unsafe renegotiation: false > Allow legacy hello messages: true > Is initial handshake: true > Is secure renegotiation: false > 230, 59, 209, 239, 243, 185, 102, 26, 219, 196, 138, 199, 133, 254, 120, > 180, 224, 146, 217, 28, 95, 47, 121, 59, 237, 106, 196, 19, 32, 21, 113, 7, > 28, 103, 73, 44, 17, 94, 26, 178, 114, 38, 165, 180, 9, 253, 81, 99, 47, > 217, 91, 119, 129, 125, 254, 52, 168, 237, 176, 114, 0, 68, 154, 65, 203, > 28, 126, 159, 65, 219, 89, 221, 151, 28, 139, 170, 226, 143, 68, 144, 227, > 36, 128, 163, 135, 170, 75, 162, 118, 92, 64, 19, 110, 18, 0, 143, 66, 67, > 214, 64, 42, 63, 128, 101, 101, 77, 217, 92, 2, 213 } > Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for > TLSv1 > Standard ciphersuite chosen: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 > 212%% Negotiating: [Session-16, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384] > Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for > TLSv1 > Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for > TLSv1 > Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for > TLSv1 > https-jsse-nio-8443-exec-4, READ: TLSv1.2 Handshake, length = 134 > *** ServerHello, TLSv1.2 > Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for > TLSv1.1 > Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for > TLSv1.1 > SESSION KEYGEN: > PreMaster Secret: > https-jsse-nio-8443-exec-6, READ: TLSv1.2 Alert, length = 26 > https-jsse-nio-8443-exec-1, READ: TLSv1.2 Handshake, length = 134 > *** ClientKeyExchange, DH > DH Public key: { 232, 46, 72, 12, 170, 19, 61, 133, 121, *** > ClientKeyExchange, DH > DH Public key: { 46, 120, 54, 246, 196, 238, 228, 47, 229, 9, 234, 188, > 11, 239, 188, 145, 201, 234, 51, 171, 155, 114, 4, 32, 33, 69, 173, 180, > 48, 249, 215, 103, 201, 25, 255, 111, 63, 186, 171, 93, 189, 90, 205, 116, > 250, 209, 241, 73, 248, 242, 181, 212, 226, 145, 106, 177, 237, 6, 75, 84, > 106, 80, 102, 129, 255, 218, 214, 213, 197, 24, 39, 230, 144, 155, 67, 117, > 220, 21, 92, 132, 111, 212, 218, 30, 61, 255, 73, 221, 128, 47, 22, 85, > 198, 87, 66, 26, 120, 78, 219, 126, 170, 178, 8, 31, 234, 38, 129, 100, > 174, 169, 5, 243, 106, 83, 242, 189, 210, 10, 192, 16, 130, 214, 131, 104, > 204, 204, 6, 65 } > SESSION KEYGEN: > PreMaster Secret: > 0000: 59 6D C0 DA 06 E0 FD 3D C8 44 C9 73 91 B6 39 3C Ym.....=.D.s..9< > 0010: 41 72 7B 70 F4 3B D7 FE 9C 8F F7 F5 64 56 A4 BD Ar.p.;......dV.. > 0020: BB 3E 1F B5 D3 91 5F E6 E1 04 CB 6A 40 46 B4 91 .>...._....j@F.. > 0030: 95 D7 0C D9 6B DC EC DD BA FD D8 A2 06 E5 2E 12 ....k........... > 0040: 7C 47 5A 01 75 BC E5 2E AC 2F 78 CA CE 0A E5 40 .GZ.u..../x....@ > 0050: 8A 17 97 19 52 B2 46 A2 1A D3 0D 02 D2 35 59 C1 ....R.F......5Y. > 0060: E6 38 C0 EF DC 67 5C EE 50 B3 34 23 AD 96 4F C3 .8...g\.P.4#..O. > 0070: CC 69 A1 04 FE 96 FF 22 E7 86 BB A3 A5 D2 74 32 .i....."......t2 > CONNECTION KEYGEN: > Client Nonce: > 0000: 93 7D 31 C2 40 06 63 D3 74 AD 6C E2 FD 95 31 EB ..1.@.c.t.l...1. > 0010: C8 9C 77 E2 5C 7C 45 DA D6 69 44 25 97 F3 78 29 ..w.\.E..iD%..x) > Server Nonce: > 0000: 5C 7D 0F F7 FC AA D3 4F 0B E4 54 41 0F 53 51 DD \......O..TA.SQ. > 0010: C8 75 59 BA E9 77 5A B9 6A 23 B9 62 1C FA 58 F9 .uY..wZ.j#.b..X. > Master Secret: > 0000: ED D0 E5 18 AE 36 25 39 46 BA 4B C3 EA 22 8E B5 .....6%9F.K..".. > 0010: 40 19 5C 46 93 C1 F4 90 3E 66 2F 86 D9 4A F4 CD @.\F....>f/..J.. > 0020: A6 0A 77 DA 9A 30 37 FA 68 00 0F CA E7 AE 6F C0 ..w..07.h.....o. > ... no MAC keys used for this cipher > Client write key: > 0000: 91 A4 F4 23 6D 8C 87 45 A4 09 04 67 0D 20 AA E2 ...#m..E...g. .. > 0010: 7C EE 48 CB 6E 0C F1 E3 6C B0 0F 72 4B C1 B8 04 ..H.n...l..rK... > Server write key: > 0000: 0A 3D A5 C5 7D F8 54 B2 DC 99 8B 7D A5 95 05 74 .=....T........t > 0010: DF C6 50 34 F3 2F 0B A7 CC 2A EA 00 C8 79 0C 5F ..P4./...*...y._ > Client write IV: > 0000: 62 96 EB 08 b... > Server write IV: > 0000: 58 D8 ED CD X... > 0000: Ignoring unsupported cipher suite: > TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1 > RandomCookie: GMT: 1551699704 bytes = { 240, https-jsse-nio-8443-exec-1, > READ: TLSv1.2 Change Cipher Spec, length = 1 > , 66, 5, 10, 121, 136, 226, 41, 170, 37, 114, 13, 145, 74, 43, 3, 99, 230, > 46, 204, 127, 48, 116, 134, 47, 96, 75, 77 } > Session ID: {92, 125, 15, 248, 20, 0, 210, 78, 109, 221, 37, 254, 86, > 107, 83, 134, 247, 144, 23, 57, 215, 100, 31, 197, 211, 245, 87, 100, 146, > 61, 193, 176} > Cipher Suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 > Compression Method: 0 > Extension renegotiation_info, renegotiated_connection: <empty> > *** > Cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 > *** Certificate chain > chain [0] = [ > [ > Version: V3 > Subject: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, > OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US > Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5 > > Key: Sun RSA public key, 2048 bits > modulus: > 21944740401167172627731583459321030363948627215746053925732477915060915436180167456469785746662093119306577380200747716284652995937004530444336851845029170241627465854006145050037178991946925696078563485570896673835545540824265905937881682387179314987285174428010940266412458943894800978345731524307952507729956745301047871771953945124256516782917326981125087548987889540650149121302888872237484100834740328828765018090383963294418357028839734723410564800765871733483849269364796949055153420777966213779145518299141217288017794394762274753999989298548507425930217302947589819396239489846633419099079578249651345685751 > public exponent: 65537 > Validity: [From: Fri May 30 08:43:19 GMT 2014, > To: Mon May 27 08:43:19 GMT 2024] > Issuer: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, > OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US > SerialNumber: [ a6ef7a9a 5368eb27] > > Certificate Extensions: 3 > [1]: ObjectId: 2.5.29.35 Criticality=false > AuthorityKeyIdentifier [ > KeyIdentifier [ > 0000: 78 0D 96 9D FE D3 0B BE 8C C7 E3 EC 67 04 AB 4B x...........g..K > 0010: EA E0 00 29 ...) > ] > ] > > [2]: ObjectId: 2.5.29.19 Criticality=false > BasicConstraints:[ > CA:true > PathLen:2147483647 > ] > > [3]: ObjectId: 2.5.29.14 Criticality=false > SubjectKeyIdentifier [ > KeyIdentifier [ > 0000: 78 0D 96 9D FE D3 0B BE 8C C7 E3 EC 67 04 AB 4B x...........g..K > 0010: EA E0 00 29 ...) > ] > ] > > ] > Algorithm: [SHA1withRSA] > Signature: > 0000: 19 16 5A 21 99 21 24 98 3C 0A E8 D8 00 AB 44 24 ..Z!.!$.<.....D$ > 0010: F2 0C B7 83 D5 9F 96 17 87 E2 1F 1D A3 47 68 C7 .............Gh. > 0020: 68 4A CB 56 0E 77 2B E8 1A 9F E7 09 A1 19 77 D0 hJ.V.w+.......w. > 0030: 5E CC C1 B3 9A C4 35 3D CB E0 A5 A6 43 5D A3 26 ^.....5=....C].& > 0040: A4 91 8A C1 FA 7B 10 EA DC C3 C7 1C 47 DC 97 32 ............G..2 > 0050: C0 37 80 1C F1 42 10 E3 74 17 FA 3E 60 4A B7 59 .7...B..t..>`J.Y > 0060: 92 C1 E0 6F BB F1 BB 9F 82 89 B5 83 D5 AE 1E 90 ...o............ > 0070: 0A 89 8D FB 4C C0 C5 9E DC C5 8C C6 2F EE D9 B4 ....L......./... > 0080: 95 47 27 2E BE 82 31 6F 76 C0 DB 4C C8 0D 3B 7B .G'...1ov..L..;. > 0090: D1 6A BF BD 3B 93 30 04 A2 9E 81 F7 96 28 77 F2 .j..;.0......(w. > 00A0: 32 05 68 44 1F B3 30 CE 40 9F 20 F3 B4 2B AA E6 2.hD..0.@. ..+.. > 00B0: 40 9B FB 7F 34 6E 3A 99 FD F8 28 F1 8C 9B 56 34 @...4n:...(...V4 > 00C0: 64 AD 4D 56 39 CB 96 18 50 9B 99 43 80 0A 39 A5 d.MV9...P..C..9. > 00D0: 13 7A 6E C5 25 E0 95 4A 92 E5 A8 8B EE 03 49 B4 .zn.%..J......I. > 00E0: D9 7C 00 E3 F0 3B A7 BA 40 30 CC 89 55 C6 97 93 .....;..@0..U... > 00F0: B5 15 F6 62 D3 B1 74 9C 0B 80 2B 8A D4 03 84 A0 ...b..t...+..... > > ] > *** > Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for > TLSv1.1 > 5A C281, https-jsse-nio-8443-exec-6, RECV TLSv1.2 ALERT: warning, > close_notify > 210, 61, 65, 243, 90, 104, 18, 96, 28, 113, 196, 45, 144, 243, 58, 106, > 169, 94, 72, 94, 240, 76, 113, 253, 130, 8, 5, 184, 63, 94, 56, 3, 237, 54, > 186, 215, 56, 73, 143, 221, 7, 192, 57, 62, 102, 229, 124, 182, 82, 22, > 166, 26, 178, 49, 228, 247, 66, 122, 56, 56, 145, 115, 4, 254, 173, 207, > 236, 153, 164, 248, 22, 136, 81, 255, 249, 14, 239, 167, 16, 76, 191, 30, > 97, 119, 156, 249, 123, 175, 67, 219, 182, 80, 213, 154, 58, 80, 26, 125, > 234, 22, 46, 190, 158, 136, 128, 230, 85, 235, 253, 252, 7, 121, 53, 173, > 192, 154, 10, 250 } > 65 CB D3 3B F6 53 4C 70 97 C9 BF 3F C6 61 Z.e..;.SLp...?.a > *** Diffie-Hellman ServerKeyExchange > https-jsse-nio-8443-exec-2, READ: TLSv1 Handshake, length = 512 > https-jsse-nio-8443-exec-1, READ: TLSv1.2 Handshake, length = 40 > 228, 19, 111, 132, 5, 153, 164, 197, 51, 211, 40, 81, 12*** Finished > verify_data: { *** ClientHello, TLSv1.2 > RandomCookie: DH Modulus: { 255, 255, 255, 255, 255, 255, 255, 255, 201, > 15, 218, 162, 33, 104, 194, 52, 196, 198, 98, 139, 128, 220, 28, 209, 41, > 2, 78, 8, 138, 103, 204, 116, 2, 11, 190, 166, 59, 19, 155, 34, 81, 74, 8, > 121, 142, 52, 4, 221, 239, 149, 25, 179, 205, 58, 67, 27, 48, 43, 10, 109, > 242, 95, 20, 55, 79, 225, 53, 109, 109, 81, 194, 69, 228, 133, 181, 118, > 98, 94, 126, 198, 244, 76, 66, 233, 166, 55, 237, 107, 11, 255, 92, 182, > 244, 6, 183, 237, 238, 56, 107, 251, 90, 137, 159, 165, 174, 159, 36, 17, > 124, 75, 31, 230, 73, 40, 102, 81, 236, 230, 83, 129, 255, 255, 255, 255, > 255, 255, 255, 255 } > 0DH Base: { 2 } > Server DH Public Key: { 225, 196, 9, 203, 159, 36, 70, 130, 168, 179, 12, > 214, 43, 37, 14, 184, 16, 20, 34, 219, 146, 253, 158, 33, 160, 120, 135, > 180, 43, 238, 142, 126, 36, 52, 94, 43, 92, 95, 237, 49, 47, 215, 84, 215, > 14, 2, 27, 175, 213, 51, 70, 8, 201, 149, 240, 185, 233, 245, 136, 127, 10, > 169, 220, 37, 118, 74, 127, 187, 232, 33, 189, 146, 233, 207, 195, 33, 253, > 253, 142, 255, 173, 36, 104, 218, 71, 145, 83, 227, 131, 161, 114, 147, > 204, 167, 94, 16, 138, 48, 160, 196, 62, 163, 91, 149, 192, 13, 119, 174, > 17, 195, 246, 173, 41, 105, 89, 10, 173, 117, 66, 142, 117, 109, 170, 166, > 222, 236, 75, 24 } > https-jsse-nio-8443-exec-6, closeInboundInternal() > Signature Algorithm SHA256withRSA > Signed with a DSA or RSA public key > 0GMT: 915489528 bytes = { 180, 177, 67, 45, 220, 94, 41, 31, 176, 92, 88, > 131, 209, 94, 66, 79, 36, 219, 209, 125, 40, 70, 151, 96, 157, 186, 199, > 228, 116, 209, 49, 40 } > *** > , 62, 227, 215, 145, 41, 40, 31, 84, 13, 129, 91, 164, 94, 141, 87, 230, > 255, 230, 207, 161, 249, 85, 134, 235, 51, 51, 15, 120, 225, 102, 48, 88, > 37, 12, 39, 198https-jsse-nio-8443-exec-1, WRITE: TLSv1.2 Change Cipher > Spec, length = 1 > 24, 173, 223, 211, 185, 225, 136, 207 } > Session ID: *** ServerHelloDone > https-jsse-nio-8443-exec-7, WRITE: TLSv1.2 Handshake, length = 1697 > SESSION KEYGEN: > PreMaster Secret: > 0000: EC 84 E2 AF 4B 91 CF 27 ED FC C7 B8 66 24 4A 45 ....K..'....f$JE > 0010: 58 83 59 28 AE DE 2A FC 3F 52 C8 48 B4 86 8C EF X.Y(..*.?R.H.... > 0020: 96 1C 7B 8A C8 57 D9 73 9E EE 4D 9A FD 59 C1 46 .....W.s..M..Y.F > 0030: 34 67 31 EA CC DA F8 16 4D 7C 23 F6 F2 78 D7 9B 4g1.....M.#..x.. > 0040: 6D 1B 29 26 CA 2C DC E5 C8 AA E9 3C 9A D3 1C 75 m.)&.,.....<...u > 0050: 80 A6 38 9B 54 5D A5 30 00 3F 62 36 6A 1C 25 69 ..8.T].0.?b6j.%i > 0060: CE E1 F5 5D 26 62 D5 9F CB 23 66 C6 DC DB FA D0 ...]&b...#f..... > 0070: 9F 04 50 0E F6 6B BE BC 69 54 D4 1A 9A C9 DD B2 ..P..k..iT...... > CONNECTION KEYGEN: > Client Nonce: > 0000: 38 DB AB 52 AE 54 3F 8E 83 67 62 A6 37 28 FF D0 8..R.T?..gb.7(.. > 0010: BA 9D B6 5B D5 FE AD 5E 77 37 4A 33 80 10 1B 7F ...[...^w7J3.... > Server Nonce: > 0000: 5C 7D 0F F7 BD 58 EC C3 10 14 9B EB D4 5E 9A 6B \....X.......^.k > 0010: E8 89 3F 7B 9C BC E5 08 E1 D8 F6 5F 86 01 C0 1E ..?........_.... > Master Secret: > 0000: 35 9F E4 FF 5D CB EE 25 07 42 86 BD 40 41 54 47 5...]..%.B..@ATG > 0010: 22 C5 90 43 E2 3F 8D 62 5C EF C8 9B 99 6B 3C A5 "..C.?.b\....k<. > 0020: 01 56 09 F5 59 81 B6 69 DD 6F 70 56 27 D1 BB A9 .V..Y..i.opV'... > ... no MAC keys used for this cipher > Client write key: > 0000: F6 28 16 6D F2 29 14 FD CB 09 E9 7D 62 1A 90 18 .(.m.)......b... > 0010: E5 9E E5 0F 77 CB 78 E5 22 79 25 5D 3E D1 11 74 ....w.x."y%]>..t > Server write key: > 0000: 07 51 6B A8 67 B8 A1 01 9B 54 97 E4 79 CC E8 AD .Qk.g....T..y... > 0010: 0C DE 7C EC BB 2B 9B 4C 22 8F D3 B1 F8 19 BA 88 .....+.L"....... > Client write IV: > 0000: 10 9A BF 5B ...[ > Server write IV: > 0000: DF 04 1F 6C ...l > https-jsse-nio-8443-exec-6, closeOutboundInternal() > https-jsse-nio-8443-exec-3, READ: TLSv1.2 Handshake, length = 134 > 1https-jsse-nio-8443-exec-4, READ: TLSv1.2 Change Cipher Spec, length = 1 > {92, 125, 15, 247, 242, 122, 131, 156, 80, 117, 217, 241, 196, 233, 43, 6, > 10, 175, 226, 239, 82, 201, 190, 246, 213, 22, 177, 21, 148, 39, 43, 131} > *** Finished > Cipher Suites: [Unknown 0x13:0x2, Unknown 0x13:0x3, Unknown 0x13:0x1, > Unknown 0x13:0x4, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, Unknown > 0xcc:0xa9, Unknown 0xc0:0xad, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, > TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0xac, > TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, > TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa8, > TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, > TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_GCM_SHA384, > Unknown 0xc0:0x9d, TLS_RSA_WITH_AES_256_CBC_SHA, > TLS_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9c, > TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, Unknown > 0xcc:0xaa, Unknown 0xc0:0x9f, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, > TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9e, > TLS_DHE_RSA_WITH_AES_128_CBC_SHA] > Compression Methods: { 0https-jsse-nio-8443-exec-4, READ: TLSv1.2 > Handshake, length = 40 > , 231, 92, 16, 188, 236, 216, 59, 248, 130, 122, 175, 64, 140, 220, 165, > 235, 54, 101, 249, 188, 70, 141, 22, 138, 208, 12, 114, 179, 69, 43, 173, > 235, 228, 226, 133, 56, 228, 5, 248, 151, 65, 240, 46, 149, 66, 30, 101, > 199, 252, 57, 235, 185, 122, 71, 60, 156, 67, 80, 118, 190, 192, 214, 11, > 134, 120, 199 } > } > Unsupported extension status_request, data: 01:00:00:00:00 > Extension elliptic_curves, curve names: {secp256r1, secp384r1, secp521r1, > unknown curve 29, unknown curve 256, unknown curve 257, unknown curve 258, > unknown curve 259, unknown curve 260} > Extension ec_point_formats, formats: [uncompressed] > Extension signature_algorithms, signature_algorithms: SHA256withRSA, > Unknown (hash:0x8, signature:0x9), Unknown (hash:0x8, signature:0x4), > SHA256withECDSA, Unknown (hash:0x8, signature:0x7), SHA384withRSA, Unknown > (hash:0x8, signature:0xa), Unknown (hash:0x8, signature:0x5), > SHA384withECDSA, SHA512withRSA, Unknown (hash:0x8, signature:0xb), Unknown > (hash:0x8, signature:0x6), SHA512withECDSA, SHA1withRSA, SHA1withECDSA > Unsupported extension type_35, data: > Unsupported extension type_51, data: > 00:69:00:17:00:41:04:e5:71:64:63:ab:d5:21:e5:e0:8f:5f:01:36:23:4c:11:7c:4e:ec:a0:36:e8:20:6a:19:d7:a6:96:f7:ae:8f:f0:75:6f:84:31:6c:d9:f5:7e:aa:9e:9d:2f:0d:0e:95:2f:00:64:06:ad:89:a8:91:09:cd:05:7d:22:27:04:f8:79:00:1d:00:20:7f:c9:a3:77:64:c6:cc:dc:c5:6c:ba:d9:df:4c:f2:a5:9b:41:52:eb:54:e7:81:e9:7a:f0:87:62:06:2a:9d:73 > Unsupported extension type_43, data: 08:03:04:03:03:03:02:03:01 > Extension renegotiation_info, renegotiated_connection: <empty> > Extension server_name, server_name: [type=host_name (0), value=localhost] > Unsupported extension type_45, data: 02:01:00 > Unsupported extension type_28, data: 40:00 > Unsupported extension type_21, data: > 00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00 > *** > %% Initialized: [Session-17, SSL_NULL_WITH_NULL_NULL] > SESSION KEYGEN: > PreMaster Secret: > 0000: 53 15 0E 57 81 D4 3F 72 C8 F3 EB 48 2A CE 87 89 S..W..?r...H*... > 0010: F9 F3 27 EC 8A 3F 65 5D 13 EB 50 C4 3F 01 38 B5 ..'..?e]..P.?.8. > 0020: FA A6 96 DC 2C FF B5 27 01 89 DF 30 D7 98 B0 FC ....,..'...0.... > 0030: 11 6D AF FF 57 B7 70 FA F2 21 C0 5B 6A 55 A1 05 .m..W.p..!.[jU.. > 0040: 61 52 CB EE EF 5C 32 F2 58 38 BD F3 8C 89 FB EA aR...\2.X8...... > 0050: 15 1E C5 BE A0 verify_data: { 36, 140, 166, 251, 242, 132, 240, 1, > 173, 233, 78, 233 } > *** > *** ClientKeyExchange, DH > DH Public key: { 183, 105, 72, 155, 174, 61, 85, 44, 148, 245, 41, 252, > 1, 127, 50, 68, 236, 105, 47, 121, 185, 243, 220, 146, 158, 27, 2, 49, 162, > 47, 102, 240, 49, 27, 26, 167, 147, 109, 146, 18, 83, 11, 141, 182, 182, > 20, 168, 127, 48, 27, 96, 155, 76, 165, 183, 113, 231, 32, 47, 8, 129, 74, > 221, 88, 102, 249, 151, 140, 201, 51, 130, 38, 8, 43, 47, 212, 51, 104, > 107, 91, 9, 61, 100, 10, 84, 201, 180, 215, 231, 53, 114, 245, 86, 111, > 190, 165, 240, 125, 20, 199, 70, 65, 228, 59, 113, 164, 148, 69, 54, 217, > 103, 140, 119, 16, 79, 217, 2, 38, 134, 91, 160, 73, 57, 40, 84, 224, 138, > 84 } > 0: B2 F5 EF E4 EA EF B4 BB B6 48 19 3F F6 0B BA 13 .........H.?.... > 0020: 68 F9 69 0D C5 EA A2 C1 B4 43 73 D3 98 96 E8 8F h.i......Cs..... > 0030: C1 2B 64 5D 8B 46 74 28 A9 01 60 8F 96 6F 13 0E .+d].Ft(..`..o.. > 0040: 32 C3 3D A1 D1 4D 15 6E DE 54 BA C4 1B 4B 16 8A 2.=..M.n.T...K.. > 0050: 25 79 21 F1 71 ED 5B D2 ED 8C 04 5B F0 5F EE F8 %y!.q.[....[._.. > 0060: F5 4D ED 8E BC 96 6E 23 A2 A0 8A 72 DE 59 28 50 .M....n#...r.Y(P > 0070: AB AE E4 CF 4E 1D F2 B4 58 AE 49 0A 86 6A 79 48 ....N...X.I..jyH > CONNECTION KEYGEN: > Client Nonce: > 0000: 35 22 15 5B 46 40 63 FC FC F3 F7 3D 54 63 E1 16 5".[F@c....=Tc.. > 0010: C5 D9 E8 CC 53 DB 4D 60 D9 E0 24 10 4B FA 73 D2 ....S.M`..$.K.s. > Server Nonce: > 0000: 5C 7D 0F F7 54 39 9A 14 43 A1 7D 68 18 FD F9 AC \...T9..C..h.... > 0010: 43 8A 2C A3 98 EE B5 EF D9 17 31 95 79 0B 8E 7B C.,.......1.y... > Master Secret: > 0000: 9E AD 80 A5 33 76 EF 56 2B 51 34 CC BE 6C 36 D8 ....3v.V+Q4..l6. > 0010: 7F C7 F9 A8 E8 4C FA 92 EA E7 CC 30 41 25 FC 41 .....L.....0A%.A > 0020: 47 19 CC 12 BD 35 15 A7 F5 77 42 F1 E7 18 96 67 G....5...wB....g > ... no MAC keys used for this cipher > Client write key: > 0000: A5 AA 55 23 86 74 FF 71 D8 67 F7 BB AF 01 92 D5 ..U#.t.q.g...... > 0010: 76 FD 91 B8 65 B4 B6 AD DA 02 02 71 BC 16 4B 8C v...e......q..K. > Server write key: > 0000: 5F 12 55 DA CF 72 DD 2D C7 64 25 48 44 C6 46 2E _.U..r.-.d%HD.F. > 0010: D6 AE F7 B1 2D 44 1F 8A F9 64 6E 7F 66 FA 99 87 ....-D...dn.f... > Client write IV: > 0000: 2A 27 FD E9 *'.. > Server write IV: > 0000: 61 C5 8A 36 |
Hello Girish,
Girish Vasmatkar <[hidden email]> writes: > I tried reproducing the issue you're facing with GNU Icecat by providing > the exact cipher suites (that Icecat seems to present in the logs) to my > local OFBiz installation. However, the handshake seems to be working for me. > > There seems to be no issue with respect to the protocol version used. It is > all coming down to the fact that Icecat and OFBiz jvm can't settle down on > the cipher suite to choose. As for Epiphany, I could see common cipher > suites sent by both Icecat and Epiphany and yet OFBiz denying handshake. > > I'll see if there is more I can extract out of the logs but at the moment I > can't think of a proper solution here apart from installing JCE Unlimited > Strength in the JVM and see if you can get the handshake working. It seems like the issue is coming from the java implementation I am using which is icedtea 3.7 [1]. I tried with OpenJDK 10 which is available on my distro and the SSL handshake issue dissapeared. With OFBiz going to upgrade to Java 11, I think this issue doesn't worth the effort of investigating further. Thank you very much for investigating. [1] https://icedtea.classpath.org/wiki/Main_Page -- Mathieu Lirzin GPG: F2A3 8D7E EB2B 6640 5761 070D 0ADE E100 9460 4D37 |
Free forum by Nabble | Edit this page |