Updating SSL certificate version

Previous Topic Next Topic
 
classic Classic list List threaded Threaded
8 messages Options
Reply | Threaded
Open this post in threaded view
|

Updating SSL certificate version

Mathieu Lirzin
Hello,

I am facing a rather annoying issue when using OFBiz trunk on localhost
which prevents me from using my preferred Web browsers.

The issue is that some of the browsers I use or more precisely the
library used by those browsers to do the TLS handshake seems to not
accept the default certificate provided by OFBiz.  Here is the specific
error I get on Chromium:

--8<---------------cut here---------------start------------->8---
This site can’t provide a secure connection localhost uses an unsupported protocol.
ERR_SSL_VERSION_OR_CIPHER_MISMATCH
Unsupported protocol
The client and server don't support a common SSL protocol version or cipher suite.
--8<---------------cut here---------------end--------------->8---

Which is similar to what I have on GNU Icecat (→ Firefox)

--8<---------------cut here---------------start------------->8---
Secure Connection Failed

An error occurred during a connection to localhost:8443. Cannot communicate securely with peer: no common encryption algorithm(s). Error code: SSL_ERROR_NO_CYPHER_OVERLAP

    The page you are trying to view cannot be shown because the authenticity of the received data could not be verified.
    Please contact the website owners to inform them of this problem.
--8<---------------cut here---------------end--------------->8---

I am using a rather exotic GNU/Linux distribution which is GuixSD so it
might be difficult for any of you to reproduce the issue. However my
guess is that the format of the OFBiz certificate is considered outdated
on my machine.  As a consequence I would like to try to upgrade that
certificate to a more recent format version.  Unfortunately I don't know
much about SSL/TLS and in particular I don't know what is the proper way
to regenerate the OFBiz certificate.

The README in “framework/base/config/” mentions the details of that
certificate but does not mention the command which has been used to
generate it.  Does anyone know how I could achieve the regeneration of
tha certificate?

Thanks.

--
Mathieu Lirzin
GPG: F2A3 8D7E EB2B 6640 5761  070D 0ADE E100 9460 4D37
Reply | Threaded
Open this post in threaded view
|

Re: Updating SSL certificate version

Jacques Le Roux
Administrator
Hi Mathieu,

Hold on, I think I can help you but not before tomorrow evening

Hopefully someone will beat me on it...

Jacques

Le 03/03/2019 à 19:00, Mathieu Lirzin a écrit :

> Hello,
>
> I am facing a rather annoying issue when using OFBiz trunk on localhost
> which prevents me from using my preferred Web browsers.
>
> The issue is that some of the browsers I use or more precisely the
> library used by those browsers to do the TLS handshake seems to not
> accept the default certificate provided by OFBiz.  Here is the specific
> error I get on Chromium:
>
> --8<---------------cut here---------------start------------->8---
> This site can’t provide a secure connection localhost uses an unsupported protocol.
> ERR_SSL_VERSION_OR_CIPHER_MISMATCH
> Unsupported protocol
> The client and server don't support a common SSL protocol version or cipher suite.
> --8<---------------cut here---------------end--------------->8---
>
> Which is similar to what I have on GNU Icecat (→ Firefox)
>
> --8<---------------cut here---------------start------------->8---
> Secure Connection Failed
>
> An error occurred during a connection to localhost:8443. Cannot communicate securely with peer: no common encryption algorithm(s). Error code: SSL_ERROR_NO_CYPHER_OVERLAP
>
>      The page you are trying to view cannot be shown because the authenticity of the received data could not be verified.
>      Please contact the website owners to inform them of this problem.
> --8<---------------cut here---------------end--------------->8---
>
> I am using a rather exotic GNU/Linux distribution which is GuixSD so it
> might be difficult for any of you to reproduce the issue. However my
> guess is that the format of the OFBiz certificate is considered outdated
> on my machine.  As a consequence I would like to try to upgrade that
> certificate to a more recent format version.  Unfortunately I don't know
> much about SSL/TLS and in particular I don't know what is the proper way
> to regenerate the OFBiz certificate.
>
> The README in “framework/base/config/” mentions the details of that
> certificate but does not mention the command which has been used to
> generate it.  Does anyone know how I could achieve the regeneration of
> tha certificate?
>
> Thanks.
>
grv
Reply | Threaded
Open this post in threaded view
|

Re: Updating SSL certificate version

grv
Hi Mathieu

Perhaps it will help if you could enable SSL debugging (either in your
browser or in OFBiz (-Djavax.net.debug=ssl)) and provide details how the
SSL handshake happened. Specifically, it would be interesting to see what
all protocols your browser presented to OFBiz.

It looks like the two could not agree on the cipher suites to use for
encryption unless your browser only supports SSL 2.0 which is outdated or TLS
1.3 which is fairly new . I may be saying obvious here but it will help if
you can turn on SSL debugging and provide details of the SSL handshake. It
will help what ClientHello message looked like when browser initiated
communication with OFBiz. For example, here are the details of connection
to localhost OFBiz on my machine -

Cipher Suite used - TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
Protocol used - TLS 1.2.

What I think happened is that both client and server agreed on SSL version
but the server does not support any of the list of cipher suites browser
supports. Please launch OFBiz JVM with javax.net.debug=ssl and that should
help.

Thanks and Regards,
Girish


On Mon, Mar 4, 2019 at 3:54 AM Jacques Le Roux <[hidden email]>
wrote:

> Hi Mathieu,
>
> Hold on, I think I can help you but not before tomorrow evening
>
> Hopefully someone will beat me on it...
>
> Jacques
>
> Le 03/03/2019 à 19:00, Mathieu Lirzin a écrit :
> > Hello,
> >
> > I am facing a rather annoying issue when using OFBiz trunk on localhost
> > which prevents me from using my preferred Web browsers.
> >
> > The issue is that some of the browsers I use or more precisely the
> > library used by those browsers to do the TLS handshake seems to not
> > accept the default certificate provided by OFBiz.  Here is the specific
> > error I get on Chromium:
> >
> > --8<---------------cut here---------------start------------->8---
> > This site can’t provide a secure connection localhost uses an
> unsupported protocol.
> > ERR_SSL_VERSION_OR_CIPHER_MISMATCH
> > Unsupported protocol
> > The client and server don't support a common SSL protocol version or
> cipher suite.
> > --8<---------------cut here---------------end--------------->8---
> >
> > Which is similar to what I have on GNU Icecat (→ Firefox)
> >
> > --8<---------------cut here---------------start------------->8---
> > Secure Connection Failed
> >
> > An error occurred during a connection to localhost:8443. Cannot
> communicate securely with peer: no common encryption algorithm(s). Error
> code: SSL_ERROR_NO_CYPHER_OVERLAP
> >
> >      The page you are trying to view cannot be shown because the
> authenticity of the received data could not be verified.
> >      Please contact the website owners to inform them of this problem.
> > --8<---------------cut here---------------end--------------->8---
> >
> > I am using a rather exotic GNU/Linux distribution which is GuixSD so it
> > might be difficult for any of you to reproduce the issue. However my
> > guess is that the format of the OFBiz certificate is considered outdated
> > on my machine.  As a consequence I would like to try to upgrade that
> > certificate to a more recent format version.  Unfortunately I don't know
> > much about SSL/TLS and in particular I don't know what is the proper way
> > to regenerate the OFBiz certificate.
> >
> > The README in “framework/base/config/” mentions the details of that
> > certificate but does not mention the command which has been used to
> > generate it.  Does anyone know how I could achieve the regeneration of
> > tha certificate?
> >
> > Thanks.
> >
>
Reply | Threaded
Open this post in threaded view
|

Re: Updating SSL certificate version

Jacques Le Roux
Administrator
Hi Mathieu,

Did Girish's answer help? (thanks Girish)

Jacques

Le 04/03/2019 à 08:09, Girish Vasmatkar a écrit :

> Hi Mathieu
>
> Perhaps it will help if you could enable SSL debugging (either in your
> browser or in OFBiz (-Djavax.net.debug=ssl)) and provide details how the
> SSL handshake happened. Specifically, it would be interesting to see what
> all protocols your browser presented to OFBiz.
>
> It looks like the two could not agree on the cipher suites to use for
> encryption unless your browser only supports SSL 2.0 which is outdated or TLS
> 1.3 which is fairly new . I may be saying obvious here but it will help if
> you can turn on SSL debugging and provide details of the SSL handshake. It
> will help what ClientHello message looked like when browser initiated
> communication with OFBiz. For example, here are the details of connection
> to localhost OFBiz on my machine -
>
> Cipher Suite used - TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
> Protocol used - TLS 1.2.
>
> What I think happened is that both client and server agreed on SSL version
> but the server does not support any of the list of cipher suites browser
> supports. Please launch OFBiz JVM with javax.net.debug=ssl and that should
> help.
>
> Thanks and Regards,
> Girish
>
>
> On Mon, Mar 4, 2019 at 3:54 AM Jacques Le Roux <[hidden email]>
> wrote:
>
>> Hi Mathieu,
>>
>> Hold on, I think I can help you but not before tomorrow evening
>>
>> Hopefully someone will beat me on it...
>>
>> Jacques
>>
>> Le 03/03/2019 à 19:00, Mathieu Lirzin a écrit :
>>> Hello,
>>>
>>> I am facing a rather annoying issue when using OFBiz trunk on localhost
>>> which prevents me from using my preferred Web browsers.
>>>
>>> The issue is that some of the browsers I use or more precisely the
>>> library used by those browsers to do the TLS handshake seems to not
>>> accept the default certificate provided by OFBiz.  Here is the specific
>>> error I get on Chromium:
>>>
>>> --8<---------------cut here---------------start------------->8---
>>> This site can’t provide a secure connection localhost uses an
>> unsupported protocol.
>>> ERR_SSL_VERSION_OR_CIPHER_MISMATCH
>>> Unsupported protocol
>>> The client and server don't support a common SSL protocol version or
>> cipher suite.
>>> --8<---------------cut here---------------end--------------->8---
>>>
>>> Which is similar to what I have on GNU Icecat (→ Firefox)
>>>
>>> --8<---------------cut here---------------start------------->8---
>>> Secure Connection Failed
>>>
>>> An error occurred during a connection to localhost:8443. Cannot
>> communicate securely with peer: no common encryption algorithm(s). Error
>> code: SSL_ERROR_NO_CYPHER_OVERLAP
>>>       The page you are trying to view cannot be shown because the
>> authenticity of the received data could not be verified.
>>>       Please contact the website owners to inform them of this problem.
>>> --8<---------------cut here---------------end--------------->8---
>>>
>>> I am using a rather exotic GNU/Linux distribution which is GuixSD so it
>>> might be difficult for any of you to reproduce the issue. However my
>>> guess is that the format of the OFBiz certificate is considered outdated
>>> on my machine.  As a consequence I would like to try to upgrade that
>>> certificate to a more recent format version.  Unfortunately I don't know
>>> much about SSL/TLS and in particular I don't know what is the proper way
>>> to regenerate the OFBiz certificate.
>>>
>>> The README in “framework/base/config/” mentions the details of that
>>> certificate but does not mention the command which has been used to
>>> generate it.  Does anyone know how I could achieve the regeneration of
>>> tha certificate?
>>>
>>> Thanks.
>>>
Reply | Threaded
Open this post in threaded view
|

Re: Updating SSL certificate version

Mathieu Lirzin
Hello Girish and Jacques,

Jacques Le Roux <[hidden email]> writes:

> Did Girish's answer help? (thanks Girish)

Yes it helps alot.

> Le 04/03/2019 à 08:09, Girish Vasmatkar a écrit :
>>
>> Perhaps it will help if you could enable SSL debugging (either in your
>> browser or in OFBiz (-Djavax.net.debug=ssl)) and provide details how the
>> SSL handshake happened. Specifically, it would be interesting to see what
>> all protocols your browser presented to OFBiz.

Here is the log of OFBiz with (-Djavax.net.debug=ssl) with a failing
handshake with GNU Icecat:



Here is the log with another browser (Epiphany) with a successful handshake:



--
Mathieu Lirzin
GPG: F2A3 8D7E EB2B 6640 5761  070D 0ADE E100 9460 4D37
Reply | Threaded
Open this post in threaded view
|

Re: Updating SSL certificate version

Mathieu Lirzin
with the inlined logs:

Mathieu Lirzin <[hidden email]> writes:

> Hello Girish and Jacques,
>
> Jacques Le Roux <[hidden email]> writes:
>
>> Did Girish's answer help? (thanks Girish)
>
> Yes it helps alot.
>
>> Le 04/03/2019 à 08:09, Girish Vasmatkar a écrit :
>>>
>>> Perhaps it will help if you could enable SSL debugging (either in your
>>> browser or in OFBiz (-Djavax.net.debug=ssl)) and provide details how the
>>> SSL handshake happened. Specifically, it would be interesting to see what
>>> all protocols your browser presented to OFBiz.
>
> Here is the log of OFBiz with (-Djavax.net.debug=ssl) with a failing
> handshake with GNU Icecat:

Using SSLEngineImpl.
Allow unsafe renegotiation: false
Allow legacy hello messages: true
Is initial handshake: true
Is secure renegotiation: false
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1.1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1.1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1.1
https-jsse-nio-8443-exec-8, READ: TLSv1 Handshake, length = 512
*** ClientHello, TLSv1.2
RandomCookie:  GMT: 1736093966 bytes = { 189, 227, 177, 17, 199, 186, 164, 220, 197, 114, 96, 6, 87, 64, 58, 23, 142, 75, 57, 206, 107, 227, 181, 65, 168, 6, 76, 155 }
Session ID:  {193, 60, 237, 251, 184, 155, 76, 93, 36, 222, 130, 94, 35, 149, 245, 251, 82, 146, 204, 227, 113, 188, 245, 195, 46, 17, 198, 7, 175, 181, 1, 156}
Cipher Suites: [Unknown 0x13:0x1, Unknown 0x13:0x3, Unknown 0x13:0x2, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xcc:0xa9, Unknown 0xcc:0xa8, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA]
Compression Methods:  { 0 }
Extension server_name, server_name: [type=host_name (0), value=localhost]
Extension extended_master_secret
Extension renegotiation_info, renegotiated_connection: <empty>
Extension elliptic_curves, curve names: {unknown curve 29, secp256r1, secp384r1, secp521r1, unknown curve 256, unknown curve 257}
Extension ec_point_formats, formats: [uncompressed]
Unsupported extension type_35, data:
Unsupported extension type_16, data: 00:0c:02:68:32:08:68:74:74:70:2f:31:2e:31
Unsupported extension status_request, data: 01:00:00:00:00
Unsupported extension type_51, data: 00:69:00:1d:00:20:15:8a:11:44:3e:65:b5:86:d5:91:8e:46:d4:4c:f1:05:44:48:a7:43:9e:04:69:69:fe:58:f5:80:ce:bc:d2:58:00:17:00:41:04:b7:0f:c1:73:e5:bf:9d:fd:4c:29:24:07:27:9e:77:1e:fb:30:d2:b8:17:b5:87:1e:f6:61:d1:b3:9c:f8:59:2a:cd:63:07:7f:9b:2f:3d:f9:80:a5:e2:f3:09:3d:e5:91:f4:35:2a:d0:ec:aa:89:ed:6d:63:7c:93:74:a6:0e:e9
Unsupported extension type_43, data: 08:7f:17:03:03:03:02:03:01
Extension signature_algorithms, signature_algorithms: SHA256withECDSA, SHA384withECDSA, SHA512withECDSA, Unknown (hash:0x8, signature:0x4), Unknown (hash:0x8, signature:0x5), Unknown (hash:0x8, signature:0x6), SHA256withRSA, SHA384withRSA, SHA512withRSA, SHA1withECDSA, SHA1withRSA
Unsupported extension type_45, data: 01:01
Unsupported extension type_21, data: 00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00
***
%% Initialized:  [Session-54, SSL_NULL_WITH_NULL_NULL]
https-jsse-nio-8443-exec-8, fatal error: 40: no cipher suites in common
javax.net.ssl.SSLHandshakeException: no cipher suites in common
%% Invalidated:  [Session-54, SSL_NULL_WITH_NULL_NULL]
https-jsse-nio-8443-exec-8, SEND TLSv1.2 ALERT:  fatal, description = handshake_failure
https-jsse-nio-8443-exec-8, WRITE: TLSv1.2 Alert, length = 2
https-jsse-nio-8443-exec-8, fatal: engine already closed.  Rethrowing javax.net.ssl.SSLHandshakeException: no cipher suites in common
https-jsse-nio-8443-exec-8, called closeOutbound()
https-jsse-nio-8443-exec-8, closeOutboundInternal()
Using SSLEngineImpl.
Allow unsafe renegotiation: false
Allow legacy hello messages: true
Is initial handshake: true
Is secure renegotiation: false
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1.1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1.1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1.1
https-jsse-nio-8443-exec-3, READ: TLSv1 Handshake, length = 177
*** ClientHello, TLSv1.2
RandomCookie:  GMT: 146371561 bytes = { 199, 41, 221, 220, 249, 76, 16, 148, 121, 235, 169, 29, 195, 217, 73, 96, 168, 20, 66, 190, 101, 117, 147, 205, 153, 77, 208, 190 }
Session ID:  {}
Cipher Suites: [TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xcc:0xa9, Unknown 0xcc:0xa8, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA]
Compression Methods:  { 0 }
Extension server_name, server_name: [type=host_name (0), value=localhost]
Extension extended_master_secret
Extension renegotiation_info, renegotiated_connection: <empty>
Extension elliptic_curves, curve names: {unknown curve 29, secp256r1, secp384r1, secp521r1}
Extension ec_point_formats, formats: [uncompressed]
Unsupported extension type_35, data:
Unsupported extension type_16, data: 00:0c:02:68:32:08:68:74:74:70:2f:31:2e:31
Unsupported extension status_request, data: 01:00:00:00:00
Extension signature_algorithms, signature_algorithms: SHA256withECDSA, SHA384withECDSA, SHA512withECDSA, Unknown (hash:0x8, signature:0x4), Unknown (hash:0x8, signature:0x5), Unknown (hash:0x8, signature:0x6), SHA256withRSA, SHA384withRSA, SHA512withRSA, SHA1withECDSA, SHA1withRSA
***
%% Initialized:  [Session-55, SSL_NULL_WITH_NULL_NULL]
https-jsse-nio-8443-exec-3, fatal error: 40: no cipher suites in common
javax.net.ssl.SSLHandshakeException: no cipher suites in common
%% Invalidated:  [Session-55, SSL_NULL_WITH_NULL_NULL]
https-jsse-nio-8443-exec-3, SEND TLSv1.2 ALERT:  fatal, description = handshake_failure
https-jsse-nio-8443-exec-3, WRITE: TLSv1.2 Alert, length = 2
https-jsse-nio-8443-exec-3, fatal: engine already closed.  Rethrowing javax.net.ssl.SSLHandshakeException: no cipher suites in common
https-jsse-nio-8443-exec-3, called closeOutbound()
https-jsse-nio-8443-exec-3, closeOutboundInternal()

> Here is the log with another browser (Epiphany) with a successful handshake:

Using SSLEngineImpl.
Allow unsafe renegotiation: false
Allow legacy hello messages: true
Is initial handshake: true
Is secure renegotiation: false
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1.1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1.1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1.1
https-jsse-nio-8443-exec-2, READ: TLSv1.2 Alert, length = 26
https-jsse-nio-8443-exec-2, RECV TLSv1.2 ALERT:  warning, close_notify
https-jsse-nio-8443-exec-2, closeInboundInternal()
https-jsse-nio-8443-exec-2, closeOutboundInternal()
https-jsse-nio-8443-exec-2, SEND TLSv1.2 ALERT:  warning, description = close_notify
https-jsse-nio-8443-exec-1, READ: TLSv1 Handshake, length = 512
https-jsse-nio-8443-exec-2, WRITE: TLSv1.2 Alert, length = 26
https-jsse-nio-8443-exec-2, called closeOutbound()
*** ClientHello, TLSv1.2
RandomCookie:  https-jsse-nio-8443-exec-2, closeOutboundInternal()
GMT: 814150594 bytes = { 189, 14, 209, 176, 97, 15, 214, 107, 117, 63, 187, 162, 12, 184, 245, 189, 245, 227, 127, 128, 244, 154, 249, 115, 101, 100, 61, 40 }
Session ID:  {92, 125, 15, 237, 254, 33, 2, 52, 144, 148, 0, 165, 156, 232, 106, 139, 222, 199, 99, 71, 41, 230, 1, 75, 246, 145, 175, 22, 191, 231, 28, 218}
Cipher Suites: [Unknown 0x13:0x2, Unknown 0x13:0x3, Unknown 0x13:0x1, Unknown 0x13:0x4, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa9, Unknown 0xc0:0xad, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0xac, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa8, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xc0:0x9d, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9c, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xaa, Unknown 0xc0:0x9f, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9e, TLS_DHE_RSA_WITH_AES_128_CBC_SHA]
Compression Methods:  { 0 }
Unsupported extension status_request, data: 01:00:00:00:00
Extension elliptic_curves, curve names: {secp256r1, secp384r1, secp521r1, unknown curve 29, unknown curve 256, unknown curve 257, unknown curve 258, unknown curve 259, unknown curve 260}
Extension ec_point_formats, formats: [uncompressed]
Extension signature_algorithms, signature_algorithms: SHA256withRSA, Unknown (hash:0x8, signature:0x9), Unknown (hash:0x8, signature:0x4), SHA256withECDSA, Unknown (hash:0x8, signature:0x7), SHA384withRSA, Unknown (hash:0x8, signature:0xa), Unknown (hash:0x8, signature:0x5), SHA384withECDSA, SHA512withRSA, Unknown (hash:0x8, signature:0xb), Unknown (hash:0x8, signature:0x6), SHA512withECDSA, SHA1withRSA, SHA1withECDSA
Unsupported extension type_35, data:
Unsupported extension type_51, data: 00:69:00:17:00:41:04:64:09:13:0a:51:7f:68:f5:63:01:39:08:81:34:af:cd:75:75:98:c8:81:91:0d:6a:2a:22:43:3e:a9:2d:23:48:16:7a:d0:a8:b5:bd:ce:8d:54:25:fd:33:c3:99:bd:42:9f:05:d1:7e:dd:e8:5e:37:fa:7f:dd:e1:6a:ef:a0:b9:00:1d:00:20:e8:f0:72:c3:30:bc:24:4e:cd:5f:14:38:a2:86:9e:84:cd:51:df:a4:6d:72:33:e8:e9:a0:55:8e:4c:60:21:50
Unsupported extension type_43, data: 08:03:04:03:03:03:02:03:01
Extension renegotiation_info, renegotiated_connection: <empty>
Extension server_name, server_name: [type=host_name (0), value=localhost]
Unsupported extension type_45, data: 02:01:00
Unsupported extension type_28, data: 40:00
Unsupported extension type_21, data: 00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00
***
%% Initialized:  [Session-10, SSL_NULL_WITH_NULL_NULL]
Standard ciphersuite chosen: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
%% Negotiating:  [Session-10, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384]
*** ServerHello, TLSv1.2
RandomCookie:  GMT: 1551699703 bytes = { 1, 74, 230, 110, 14, 123, 143, 104, 216, 59, 77, 109, 156, 237, 68, 152, 241, 106, 128, 168, 185, 218, 12, 202, 6, 4, 174, 147 }
Session ID:  {92, 125, 15, 247, 246, 249, 211, 141, 164, 158, 249, 105, 184, 211, 34, 29, 135, 131, 232, 36, 64, 192, 38, 174, 54, 83, 112, 53, 142, 111, 182, 94}
Cipher Suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
Compression Method: 0
Extension renegotiation_info, renegotiated_connection: <empty>
***
Cipher suite:  TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
https-jsse-nio-8443-exec-9, WRITE: TLSv1.2 Application Data, length = 339
*** Certificate chain
chain [0] = [
[
  Version: V3
  Subject: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US
  Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5

  Key:  Sun RSA public key, 2048 bits
  modulus: 21944740401167172627731583459321030363948627215746053925732477915060915436180167456469785746662093119306577380200747716284652995937004530444336851845029170241627465854006145050037178991946925696078563485570896673835545540824265905937881682387179314987285174428010940266412458943894800978345731524307952507729956745301047871771953945124256516782917326981125087548987889540650149121302888872237484100834740328828765018090383963294418357028839734723410564800765871733483849269364796949055153420777966213779145518299141217288017794394762274753999989298548507425930217302947589819396239489846633419099079578249651345685751
  public exponent: 65537
  Validity: [From: Fri May 30 08:43:19 GMT 2014,
               To: Mon May 27 08:43:19 GMT 2024]
  Issuer: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US
  SerialNumber: [    a6ef7a9a 5368eb27]

Certificate Extensions: 3
[1]: ObjectId: 2.5.29.35 Criticality=false
AuthorityKeyIdentifier [
KeyIdentifier [
0000: 78 0D 96 9D FE D3 0B BE   8C C7 E3 EC 67 04 AB 4B  x...........g..K
0010: EA E0 00 29                                        ...)
]
]

[2]: ObjectId: 2.5.29.19 Criticality=false
BasicConstraints:[
  CA:true
  PathLen:2147483647
]

[3]: ObjectId: 2.5.29.14 Criticality=false
SubjectKeyIdentifier [
KeyIdentifier [
0000: 78 0D 96 9D FE D3 0B BE   8C C7 E3 EC 67 04 AB 4B  x...........g..K
0010: EA E0 00 29                                        ...)
]
]

]
  Algorithm: [SHA1withRSA]
  Signature:
0000: 19 16 5A 21 99 21 24 98   3C 0A E8 D8 00 AB 44 24  ..Z!.!$.<.....D$
0010: F2 0C B7 83 D5 9F 96 17   87 E2 1F 1D A3 47 68 C7  .............Gh.
0020: 68 4A CB 56 0E 77 2B E8   1A 9F E7 09 A1 19 77 D0  hJ.V.w+.......w.
0030: 5E CC C1 B3 9A C4 35 3D   CB E0 A5 A6 43 5D A3 26  ^.....5=....C].&
0040: A4 91 8A C1 FA 7B 10 EA   DC C3 C7 1C 47 DC 97 32  ............G..2
0050: C0 37 80 1C F1 42 10 E3   74 17 FA 3E 60 4A B7 59  .7...B..t..>`J.Y
0060: 92 C1 E0 6F BB F1 BB 9F   82 89 B5 83 D5 AE 1E 90  ...o............
0070: 0A 89 8D FB 4C C0 C5 9E   DC C5 8C C6 2F EE D9 B4  ....L......./...
0080: 95 47 27 2E BE 82 31 6F   76 C0 DB 4C C8 0D 3B 7B  .G'...1ov..L..;.
0090: D1 6A BF BD 3B 93 30 04   A2 9E 81 F7 96 28 77 F2  .j..;.0......(w.
00A0: 32 05 68 44 1F B3 30 CE   40 9F 20 F3 B4 2B AA E6  2.hD..0.@. ..+..
00B0: 40 9B FB 7F 34 6E 3A 99   FD F8 28 F1 8C 9B 56 34  @...4n:...(...V4
00C0: 64 AD 4D 56 39 CB 96 18   50 9B 99 43 80 0A 39 A5  d.MV9...P..C..9.
00D0: 13 7A 6E C5 25 E0 95 4A   92 E5 A8 8B EE 03 49 B4  .zn.%..J......I.
00E0: D9 7C 00 E3 F0 3B A7 BA   40 30 CC 89 55 C6 97 93  .....;..@0..U...
00F0: B5 15 F6 62 D3 B1 74 9C   0B 80 2B 8A D4 03 84 A0  ...b..t...+.....

]
***
*** Diffie-Hellman ServerKeyExchange
DH Modulus:  { 255, 255, 255, 255, 255, 255, 255, 255, 201, 15, 218, 162, 33, 104, 194, 52, 196, 198, 98, 139, 128, 220, 28, 209, 41, 2, 78, 8, 138, 103, 204, 116, 2, 11, 190, 166, 59, 19, 155, 34, 81, 74, 8, 121, 142, 52, 4, 221, 239, 149, 25, 179, 205, 58, 67, 27, 48, 43, 10, 109, 242, 95, 20, 55, 79, 225, 53, 109, 109, 81, 194, 69, 228, 133, 181, 118, 98, 94, 126, 198, 244, 76, 66, 233, 166, 55, 237, 107, 11, 255, 92, 182, 244, 6, 183, 237, 238, 56, 107, 251, 90, 137, 159, 165, 174, 159, 36, 17, 124, 75, 31, 230, 73, 40, 102, 81, 236, 230, 83, 129, 255, 255, 255, 255, 255, 255, 255, 255 }
DH Base:  { 2 }
Server DH Public Key:  { 207, 201, 241, 189, 224, 175, 68, 248, 216, 197, 47, 214, 124, 101, 217, 9, 127, 95, 125, 123, 118, 132, 240, 161, 211, 172, 155, 151, 38, 81, 217, 225, 137, 34, 92, 50, 243, 88, 199, 76, 154, 29, 118, 218, 187, 175, 51, 153, 133, 115, 97, 176, 38, 139, 13, 107, 114, 66, 44, 201, 109, 168, 61, 214, 28, 170, 130, 136, 66, 189, 7, 217, 29, 83, 49, 211, 167, 220, 13, 57, 229, 176, 106, 101, 147, https-jsse-nio-8443-exec-9, WRITE: TLSv1.2 Application Data, length = 548
155, 102, 135, 27, 15, 236, 14, 126, 81, 118, 54, 20, 33, 204, 63, 45, 14, 239, 232, 96, 218, 144, 135, 68, 98, 120, 209, 97, 189, 243, 74, 38, 12, 149, 112, 124, 118, 40, 193, 94, 129, 194, 136 }
Signature Algorithm SHA256withRSA
Signed with a DSA or RSA public key
*** ServerHelloDone
https-jsse-nio-8443-exec-1, WRITE: TLSv1.2 Handshake, length = 1697
Using SSLEngineImpl.
Allow unsafe renegotiation: false
Allow legacy hello messages: true
Is initial handshake: true
Is secure renegotiation: false
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1.1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1.1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1.1
https-jsse-nio-8443-exec-1, READ: TLSv1 Handshake, length = 512
*** ClientHello, TLSv1.2
RandomCookie:  GMT: 891426139 bytes = { 70, 64, 99, 252, 252, 243, 247, 61, 84, 99, 225, 22, 197, 217, 232, 204, 83, 219, 77, 96, 217, 224, 36, 16, 75, 250, 115, 210 }
Session ID:  {92, 125, 15, 237, 254, 33, 2, 52, 144, 148, 0, 165, 156, 232, 106, 139, 222, 199, 99, 71, 41, 230, 1, 75, 246, 145, 175, 22, 191, 231, 28, 218}
Cipher Suites: [Unknown 0x13:0x2, Unknown 0x13:0x3, Unknown 0x13:0x1, Unknown 0x13:0x4, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa9, Unknown 0xc0:0xad, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0xac, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa8, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xc0:0x9d, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9c, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xaa, Unknown 0xc0:0x9f, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9e, TLS_DHE_RSA_WITH_AES_128_CBC_SHA]
Compression Methods:  { 0 }
Unsupported extension status_request, data: 01:00:00:00:00
Extension elliptic_curves, curve names: {secp256r1, secp384r1, secp521r1, unknown curve 29, unknown curve 256, unknown curve 257, unknown curve 258, unknown curve 259, unknown curve 260}
Extension ec_point_formats, formats: [uncompressed]
Extension signature_algorithms, signature_algorithms: SHA256withRSA, Unknown (hash:0x8, signature:0x9), Unknown (hash:0x8, signature:0x4), SHA256withECDSA, Unknown (hash:0x8, signature:0x7), SHA384withRSA, Unknown (hash:0x8, signature:0xa), Unknown (hash:0x8, signature:0x5), SHA384withECDSA, SHA512withRSA, Unknown (hash:0x8, signature:0xb), Unknown (hash:0x8, signature:0x6), SHA512withECDSA, SHA1withRSA, SHA1withECDSA
Unsupported extension type_35, data:
Unsupported extension type_51, data: 00:69:00:17:00:41:04:4c:4b:f9:0d:41:a2:d1:e0:cc:78:46:72:f7:54:96:02:a0:a2:d6:14:0b:7a:6e:f1:45:0a:8f:bd:40:4f:eb:26:cb:d1:4d:1c:12:24:25:45:db:9c:f3:85:55:8d:0a:3f:4e:d8:d0:1f:95:1c:46:97:c5:b1:74:e7:c7:38:ed:b4:00:1d:00:20:e1:f7:e1:e0:c6:56:96:45:a4:22:c3:5b:78:3c:d2:1c:ad:eb:c3:85:0d:9e:01:6e:4a:f7:60:5d:14:14:4f:2a
Unsupported extension type_43, data: 08:03:04:03:03:03:02:03:01
Extension renegotiation_info, renegotiated_connection: <empty>
Extension server_name, server_name: [type=host_name (0), value=localhost]
Unsupported extension type_45, data: 02:01:00
Unsupported extension type_28, data: 40:00
Unsupported extension type_21, data: 00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00
***
%% Initialized:  [Session-11, SSL_NULL_WITH_NULL_NULL]
Standard ciphersuite chosen: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
%% Negotiating:  [Session-11, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384]
*** ServerHello, TLSv1.2
RandomCookie:  GMT: 1551699703 bytes = { 84, 57, 154, 20, 67, 161, 125, 104, 24, 253, 249, 172, 67, 138, 44, 163, 152, 238, 181, 239, 217, 23, 49, 149, 121, 11, 142, 123 }
Session ID:  {92, 125, 15, 247, 213, 157, 46, 13, 7, 249, 27, 59, 188, 52, 107, 216, 12, 30, 168, 6, 161, 1, 93, 140, 189, 97, 129, 164, 189, 189, 122, 170}
Cipher Suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
Compression Method: 0
Extension renegotiation_info, renegotiated_connection: <empty>
***
Cipher suite:  TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
*** Certificate chain
chain [0] = [
[
  Version: V3
  Subject: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US
  Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5

  Key:  Sun RSA public key, 2048 bits
  modulus: 21944740401167172627731583459321030363948627215746053925732477915060915436180167456469785746662093119306577380200747716284652995937004530444336851845029170241627465854006145050037178991946925696078563485570896673835545540824265905937881682387179314987285174428010940266412458943894800978345731524307952507729956745301047871771953945124256516782917326981125087548987889540650149121302888872237484100834740328828765018090383963294418357028839734723410564800765871733483849269364796949055153420777966213779145518299141217288017794394762274753999989298548507425930217302947589819396239489846633419099079578249651345685751
  public exponent: 65537
  Validity: [From: Fri May 30 08:43:19 GMT 2014,
               To: Mon May 27 08:43:19 GMT 2024]
  Issuer: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US
  SerialNumber: [    a6ef7a9a 5368eb27]

Certificate Extensions: 3
[1]: ObjectId: 2.5.29.35 Criticality=false
AuthorityKeyIdentifier [
KeyIdentifier [
0000: 78 0D 96 9D FE D3 0B BE   8C C7 E3 EC 67 04 AB 4B  x...........g..K
0010: EA E0 00 29                                        ...)
]
]

[2]: ObjectId: 2.5.29.19 Criticality=false
BasicConstraints:[
  CA:true
  PathLen:2147483647
]

[3]: ObjectId: 2.5.29.14 Criticality=false
SubjectKeyIdentifier [
KeyIdentifier [
0000: 78 0D 96 9D FE D3 0B BE   8C C7 E3 EC 67 04 AB 4B  x...........g..K
0010: EA E0 00 29                                        ...)
]
]

]
  Algorithm: [SHA1withRSA]
  Signature:
0000: 19 16 5A 21 99 21 24 98   3C 0A E8 D8 00 AB 44 24  ..Z!.!$.<.....D$
0010: F2 0C B7 83 D5 9F 96 17   87 E2 1F 1D A3 47 68 C7  .............Gh.
0020: 68 4A CB 56 0E 77 2B E8   1A 9F E7 09 A1 19 77 D0  hJ.V.w+.......w.
0030: 5E CC C1 B3 9A C4 35 3D   CB E0 A5 A6 43 5D A3 26  ^.....5=....C].&
0040: A4 91 8A C1 FA 7B 10 EA   DC C3 C7 1C 47 DC 97 32  ............G..2
0050: C0 37 80 1C F1 42 10 E3   74 17 FA 3E 60 4A B7 59  .7...B..t..>`J.Y
0060: 92 C1 E0 6F BB F1 BB 9F   82 89 B5 83 D5 AE 1E 90  ...o............
0070: 0A 89 8D FB 4C C0 C5 9E   DC C5 8C C6 2F EE D9 B4  ....L......./...
0080: 95 47 27 2E BE 82 31 6F   76 C0 DB 4C C8 0D 3B 7B  .G'...1ov..L..;.
0090: D1 6A BF BD 3B 93 30 04   A2 9E 81 F7 96 28 77 F2  .j..;.0......(w.
00A0: 32 05 68 44 1F B3 30 CE   40 9F 20 F3 B4 2B AA E6  2.hD..0.@. ..+..
00B0: 40 9B FB 7F 34 6E 3A 99   FD F8 28 F1 8C 9B 56 34  @...4n:...(...V4
00C0: 64 AD 4D 56 39 CB 96 18   50 9B 99 43 80 0A 39 A5  d.MV9...P..C..9.
00D0: 13 7A 6E C5 25 E0 95 4A   92 E5 A8 8B EE 03 49 B4  .zn.%..J......I.
00E0: D9 7C 00 E3 F0 3B A7 BA   40 30 CC 89 55 C6 97 93  .....;..@0..U...
00F0: B5 15 F6 62 D3 B1 74 9C   0B 80 2B 8A D4 03 84 A0  ...b..t...+.....

]
Using SSLEngineImpl.
Allow unsafe renegotiation: false
Allow legacy hello messages: true
Is initial handshake: true
Is secure renegotiation: false
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1.1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1.1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1
Using SSLEngineImpl.
https-jsse-nio-8443-exec-9, WRITE: TLSv1.2 Application Data, length = 286
Allow unsafe renegotiation: false
Allow legacy hello messages: true
Is initial handshake: true
Is secure renegotiation: false
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1.1
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1.1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1.1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1.1
https-jsse-nio-8443-exec-5, READ: TLSv1 Handshake, length = 512
https-jsse-nio-8443-exec-3, READ: TLSv1 Handshake, length = 512
https-jsse-nio-8443-exec-4, READ: TLSv1.2 Handshake, length = 134
***
*** ClientHello, TLSv1.2
Using SSLEngineImpl.
Allow unsafe renegotiation: false
Allow legacy hello messages: true
Is initial handshake: true
Is secure renegotiation: false
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1.1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1.1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1.1
RandomCookie:  GMT: 937077586 bytes = { 174, 84, 63, 142, 131, 103, 98, 166, 55, 40, 255, 208, 186, 157, 182, 91, 213, 254, 173, 94, 119, 55, 74, 51, 128, 16, 27, 127 }
Session ID:  {92, 125, 15, 237, 254, 33, 2, 52, 144, 148, 0, 165, 156, 232, 106, 139, 222, 199, 99, 71, 41, 230, 1, 75, 246, 145, 175, 22, 191, 231, 28, 218}
Cipher Suites: [Unknown 0x13:0x2, Unknown 0x13:0x3, Unknown 0x13:0x1, Unknown 0x13:0x4, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa9, Unknown 0xc0:0xad, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0xac, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa8, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xc0:0x9d, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9c, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xaa, Unknown 0xc0:0x9f, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9e, TLS_DHE_RSA_WITH_AES_128_CBC_SHA]
Compression Methods:  { 0 }
Unsupported extension status_request, data: 01:00:00:00:00
Extension elliptic_curves, curve names: {secp256r1, secp384r1, secp521r1, unknown curve 29, unknown curve 256, unknown curve 257, unknown curve 258, unknown curve 259, unknown curve 260}
Extension ec_point_formats, formats: [uncompressed]
Extension signature_algorithms, signature_algorithms: SHA256withRSA, Unknown (hash:0x8, signature:0x9), Unknown (hash:0x8, signature:0x4), SHA256withECDSA, Unknown (hash:0x8, signature:0x7), SHA384withRSA, Unknown (hash:0x8, signature:0xa), Unknown (hash:0x8, signature:0x5), SHA384withECDSA, SHA512withRSA, Unknown (hash:0x8, signature:0xb), Unknown (hash:0x8, signature:0x6), SHA512withECDSA, SHA1withRSA, SHA1withECDSA
Unsupported extension type_35, data:
Unsupported extension type_51, data: 00:69:00:17:00:41:04:63:49:bf:ec:49:38:e9:99:e5:34:bf:79:d7:44:85:9b:ae:30:19:12:ea:6a:b9:66:e4:ce:a5:bc:ac:5d:fb:69:6c:ff:6e:5f:19:83:88:c1:28:66:40:3c:1a:3c:60:b7:26:38:7a:8d:34:f4:8c:db:b2:5b:36:b1:9f:5b:0b:7f:00:1d:00:20:9e:f1:d0:52:64:c2:20:af:55:dc:18:64:f8:cb:ae:a9:f3:e7:f9:cd:2c:03:6f:96:cf:86:86:88:c4:f5:ca:2e
Unsupported extension type_43, data: 08:03:04:03:03:03:02:03:01
Extension renegotiation_info, renegotiated_connection: <empty>
Extension server_name, server_name: [type=host_name (0), value=localhost]
Unsupported extension type_45, data: 02:01:00
Unsupported extension type_28, data: 40:00
Unsupported extension type_21, data: 00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00
***
%% Initialized:  [Session-12, SSL_NULL_WITH_NULL_NULL]
*** ClientHello, TLSv1.2
RandomCookie:  GMT: -1820512062 bytes = { 64, 6, 99, 211, 116, 173, 108, 226, 253, 149, 49, 235, 200, 156, 119, 226, 92, 124, 69, 218, 214, 105, 68, 37, 151, 243, 120, 41 }
Session ID:  {92, 125, 15, 237, 254, 33, 2, 52, 144, 148, 0, 165, 156, 232, 106, 139, 222, 199, 99, 71, 41, 230, 1, 75, 246, 145, 175, 22, 191, 231, 28, 218}
Cipher Suites: [Unknown 0x13:0x2, Unknown 0x13:0x3, Unknown 0x13:0x1, Unknown 0x13:0x4, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa9, Unknown 0xc0:0xad, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0xac, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa8, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xc0:0x9d, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9c, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xaa, Unknown 0xc0:0x9f, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9e, TLS_DHE_RSA_WITH_AES_128_CBC_SHA]
Compression Methods:  { 0 }
Unsupported extension status_request, data: 01:00:00:00:00
Extension elliptic_curves, curve names: {secp256r1, secp384r1, secp521r1, unknown curve 29, unknown curve 256, unknown curve 257, unknown curve 258, unknown curve 259, unknown curve 260}
*** ClientKeyExchange, DH
Extension ec_point_formats, formats: [uncompressed]
https-jsse-nio-8443-exec-9, WRITE: TLSv1.2 Application Data, length = 53
Standard ciphersuite chosen: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
*** Diffie-Hellman ServerKeyExchange
DH Modulus:  { 255, 255, 255, 255, 255, 255, 255, 255, https-jsse-nio-8443-exec-6, READ: TLSv1 Handshake, length = 512
201%% Negotiating:  [Session-12, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384]
*** ServerHello, TLSv1.2
RandomCookie:  GMT: 1551699703 bytes = { 189, 88, 236, 195, 16, 20, *** ClientHello, TLSv1.2
RandomCookie:  GMT: -2052347668 bytes = { Extension signature_algorithms, signature_algorithms: SHA256withRSA, Unknown (hash:0x8, signature:0x9), Unknown (hash:0x8, signature:0x4), SHA256withECDSA, Unknown (hash:0x8, signature:0x7), SHA384withRSA, Unknown (hash:0x8, signature:0xa), Unknown (hash:0x8, signature:0x5), SHA384withECDSA, SHA512withRSA, Unknown (hash:0x8, signature:0xb), Unknown (hash:0x8, signature:0x6), SHA512withECDSA, SHA1withRSA, SHA1withECDSA
DH Public key:  { 44, 33, 108, 222, 37, 147, 165, 17, 83, 11, 125, 252, 177, 121, 176, 220, 53, 161, 114, 76, 39, 221, 24, 63, 102, 217, 38, 175, 12, 184, 22, 169, 114, 30, 2, 36, 65, 125, 130, 154, 243, 72, 184, 27, 206, 250, 2, 219, 212, 150, 48, 222, 58, 17, 96, 109, 17, 180, 111, 224, 168, 191, 38, 96, 214, 110, 81, 34, 212, 94, 3, 119, 24, 43, 189, 128, 60, 93, 34, 7, 243, 167, 69, 203, 197, 247, 124, 116, 14, 107, 52, 145, 150, 18, 90, 253, 218, 3, 179, 185, 157, 238, 191, 152, 68, 242, 208, 83, 120, 171, 228, 145, 249, 212, 132, 160, 48, 67, 206, 49, 40, 43, 165, 58, 143, 82, 19, 137 }
Unsupported extension type_35, data:
Unsupported extension type_51, data: 00:69:00:17:00:41:04:fb:ce:2a:0c:db:49:2b:b8:4c:df:04:e9:fe:c8:83:44:a1:47:5f:59:37:fe:55:ea:46:17:82:64:6a:7f:67:62:19:fd:2f:51:e5:71:ef:51:70:a7:2a:19:88:de:b4:15:41:b6:86:57:a9:a7:16:75:73:ab:fb:f1:e8:6f:e1:17:00:1d:00:20:ec:07:9e:5c:8f:5d:b4:66:c2:f2:55:52:65:25:41:0d:24:27:dc:0d:ad:88:59:19:48:a3:dc:e0:5a:8f:cc:7c
Unsupported extension type_43, data: 08:03:04:03:03:03:02:03:01
Extension renegotiation_info, renegotiated_connection: <empty>
Extension server_name, server_name: [type=host_name (0), value=localhost]
Unsupported extension type_45, data: 02:01:00
Unsupported extension type_28, data: 40:00
Unsupported extension type_21, data: 00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00
***
%% Initialized:  [Session-13, SSL_NULL_WITH_NULL_NULL]
SESSION KEYGEN:
PreMaster Secret:
0000: 14 2B 4A 96 4B DB 65 AE   A4 12 66 E4 51 AE B4 4B  .+J.K.e...f.Q..K
0010: CC 85 AD 73 25 8E 51 18   27 97 B8 9E 86 63 D2 C6  ...s%.Q.'....c..
0020: C6 BE 67 E5 8B 8C 0E 78   6F 69 E0 E2 6C C1 48 06  ..g....xoi..l.H.
0030: 71 DA B2 D6 8A 26 D4 5A   05 9D 7E 83 1D 18 93 C3  q....&.Z........
0040: D3 04 28 1E 43 02 31 03   1B 72 45 4A 80 BE F5 19  ..(.C.1..rEJ....
0050: D4 EC 73 06 B4 EE FA CC   F1 8C 8F 9F 86 5F 81 B6  ..s.........._..
0060: 25 F4 26 24 F1 BD EB 12   B7 40 30 70 BC 05 FC BC  %.&$.....@0p....
0070: 70 33 59 E9 71 1C C4 23   5D DA DF 4C 8D 06 F1 E7  p3Y.q..#]..L....
Standard ciphersuite chosen: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
%% Negotiating:  [Session-13, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384]
*** ServerHello, TLSv1.2
RandomCookie:  GMT: 1551699703 bytes = { 252, 170, 211, 79, 11, 228, 84, 65, 15, 83, 81, 221, 200, 117, 89, 186, 233, 119, 90, 185CONNECTION KEYGEN:
Client Nonce:
0000: 31 87 F4 C2 BD 0E D1 B0   61 0F D6 6B 75 3F BB A2  1.......a..ku?..
0010: 0C B8 F5 BD F5 E3 7F 80   F4 9A F9 73 65 64 3D 28  ...........sed=(
Server Nonce:
0000: 5C 7D 0F F7 01 4A E6 6E   0E 7B 8F 68 D8 3B 4D 6D  \....J.n...h.;Mm
0010: 9C ED 44 98 F1 6A 80 A8   B9 DA 0C CA 06 04 AE 93  ..D..j..........
Master Secret:
0000: 4B 25 56 4E 5D FD 49 87   57 95 61 F8 41 E4 31 7C  K%VN].I.W.a.A.1.
0010: EA 86 7F 50 6A FC 09 08   52 3E FC 2E 07 97 05 4E  ...Pj...R>.....N
0020: 9C FD AC AB 2F 42 F1 ED   15 4C 13 A3 2B 30 20 58  ..../B...L..+0 X
... no MAC keys used for this cipher
Client write key:
0000: 97 B5 1F 11 07 50 73 FE   8C 9E ED 35 58 70 A4 BB  .....Ps....5Xp..
0010: 5A EB 7B A0 F8 BC 09 83   67 95 E6 4F 24 8C 74 30  Z.......g..O$.t0
Server write key:
0000: 4C 6A 51 F2 BD FB 38 96   7B 95 F6 1C 5F 5D 09 93  LjQ...8....._]..
0010: F5 61 31 9C 3A 0C 9D 50   20 FB 93 92 E6 89 E6 37  .a1.:..P ......7
Client write IV:
0000: 15 B3 BB A8                                        ....
Server write IV:
0000: A0 38 66 10                                        .8f.
114, 112, 85, 166, 214, 221, 236, 123, 184, 112, 134, , 15, 218, 162, 33, 104, 194, 52, 196, 198, 98, 139, 128, 220, 28, 209, 41, 2, 78, 8, 138, 103, 204, 116, 2, 11, 190, 166, 59, 19, 155, 34, 81, 74, 8, 121, 142, 52, 4, 221, 239, 149, 25, 179, 205, 58, 67, 27, 48, 43, 10, 109, 242, 95, 20, 55, 79, 225, 53, 109, 109, 81, 194, 69, 228, 133, 181, 118, 98, 94, 126, 198, 244, 76, 66, 233, 166, 55, 237, 107, 11, 255, 92, 182, 244, 6, 183, 237, 238, 56, 107, 251, 90, 137, 159, 165, 174, 159, 36, 17, 124, 75, 31, 230, 73, 40, 102, 81, 236, 230, 83, 129, 255, 255, 255, 255, 255, 255, 255, 255 }
155, DH Base:  { 2 }
Server DH Public Key:  { 134, 63, 21, 208, 230, 233, 175, 114, 39, 141, 112, 190, 98, 170, 50, 62, 188, 50, 255, 139, 99, 214, 188, 84, 72, 83, 180, 84, 119, 199, 203, 23, 228, 34, 201, 57, 130, 183, 252, 53, 152, 17, 186, 166https-jsse-nio-8443-exec-4, READ: TLSv1.2 Change Cipher Spec, length = 1
https-jsse-nio-8443-exec-9, WRITE: TLSv1.2 Application Data, length = 20
2019-03-04 11:45:59,567 |jsse-nio-8443-exec-9 |ServerHitBin                  |I| Visit delegatorName=default, ServerHitBin delegatorName=default
https-jsse-nio-8443-exec-4, READ: TLSv1.2 Handshake, length = 40
2019-03-04 11:45:59,586 |jsse-nio-8443-exec-9 |ControlServlet                |T| [[[login(Domain:https://localhost)] Request Done- total:0.433,since last([login(Domain:htt...):0.433]]
*** Finished
verify_data:  { 155, 222, 165, 24, 115, 12, 246, 156, 60, 164, 142, 178 }
***
https-jsse-nio-8443-exec-4, WRITE: TLSv1.2 Change Cipher Spec, length = 1
*** Finished
verify_data:  { 6, 6, 16, 184, 161, 157, 241, 204, 225, 185, 204, 190 }
***
, 106, 35, 185, 98, 28, 250, 88, 249 }
Session ID:  , 2, 255, 71, 96 }
Session ID:  64, 104, 42, 166, 221, 165, 130, 152, 79, 44, 74, 66, 234, 105, 217, 162, 156, 55, 120, 122, 122, 100, 89, 111, 1, 89, 172, 237, 227, 121, 153, 61, 228, 161, 19, 115, 184, 42, 124, 190, 204, 189, 222, 120, 130, 193, 146, 0, 91, 96, 21, 216, 12, 212, 121, 122, 185, 188, 213, 232, 141, 115, 36, 88, 98, 138, 166, 244, 88, 246, 108, 235, 28, 181, 191, 203, 95, 70, 83, 147, 235, 212, 94, 154, 107, 232, 137, 63, 123, 156, 188, 229, 8, 225, 216, 246, 95, 134, 1, 192, 30 }
Session ID:  49{92, 125, 15, 247, 188, 79, 171, 39, 143, 40, 158, 162, 235, 8, 205, 92, 188, 20, 0, 130, 247, 147, 227, 140, 94, 73, 165, 209, 150, 178, 61, 238}
Cipher Suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
Compression Method: 0
https-jsse-nio-8443-exec-9, WRITE: TLSv1.2 Application Data, length = 84
{92, 125, 15, 237, 254, 33, 2, 52, 144, 148, 0, 165, 156, 232, 106, 139, 222, 199, 99, 71, 41, 230, 1, 75, 246, 145, 175, 22, 191, 231, 28, 218}
Cipher Suites: [Unknown 0x13:0x2, Unknown 0x13:0x3, Unknown 0x13:0x1, Unknown 0x13:0x4, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa9, Unknown 0xc0:0xad, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0xac, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa8, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xc0:0x9d, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9c, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xaa, Unknown 0xc0:0x9f, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9e, TLS_DHE_RSA_WITH_AES_128_CBC_SHA]
Compression Methods:  { 0 }
Unsupported extension status_request, data: 01:00:00:00:00
Extension elliptic_curves, curve names: {secp256r1, secp384r1, secp521r1, unknown curve 29, unknown curve 256, unknown curve 257, unknown curve 258, unknown curve 259, unknown curve 260}
Extension ec_point_formats, formats: [uncompressed]
Extension signature_algorithms, signature_algorithms: SHA256withRSA, Unknown (hash:0x8, signature:0x9), Unknown (hash:0x8, signature:0x4), SHA256withECDSA, Unknown (hash:0x8, signature:0x7), SHA384withRSA, Unknown (hash:0x8, signature:0xa), Unknown (hash:0x8, signature:0x5), SHA384withECDSA, SHA512withRSA, Unknown (hash:0x8, signature:0xb), Unknown (hash:0x8, signature:0x6), SHA512withECDSA, SHA1withRSA, SHA1withECDSA
Unsupported extension type_35, data:
Unsupported extension type_51, data: 00:69:00:17:00:41:04:09:2c:38:aa:5b:66:0a:29:e1:28:22:44:e6:26:34:0f:77:d8:d5:c5:c2:06:5f:9f:ab:05:cb:26:60:db:ac:37:26:61:cc:69:6c:58:20:88:2f:9d:18:72:cf:2e:01:e5:9b:db:9b:26:c8:95:50:a8:66:9c:e6:30:b2:f5:3d:b0:00:1d:00:20:40:c5:6e:d8:93:c4:ca:68:a7:b1:db:d4:c4:a3:5a:61:73:74:57:c9:d5:cf:2f:c1:21:7a:3a:ff:c3:a0:f5:28
Unsupported extension type_43, data: 08:03:04:03:03:03:02:03:01
Extension renegotiation_info, renegotiated_connection: <empty>
Extension server_name, server_name: [type=host_name (0), value=localhost]
Unsupported extension type_45, data: 02:01:00
Unsupported extension type_28, data: 40:00
Unsupported extension type_21, data: 00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00
***
%% Initialized:  [Session-14, SSL_NULL_WITH_NULL_NULL]
https-jsse-nio-8443-exec-9, READ: TLSv1.2 Alert, length = 26
{92, 125, 15, 247, 50, 58, 5, 184, 11, 182, 57, 252, 105, 8, 156, 212, 100, 243, 238, 186, 235, 226, 190, 120, 154, 82, 26, 51, 98, 107, 132, 131}
Cipher Suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
Compression Method: 0
https-jsse-nio-8443-exec-4, WRITE: TLSv1.2 Handshake, length = 40
Using SSLEngineImpl.
%% Cached server session: [Session-10, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384]
Allow unsafe renegotiation: false
Allow legacy hello messages: true
Is initial handshake: true
Is secure renegotiation: false
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1.1
Standard ciphersuite chosen: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
%% Negotiating:  [Session-14, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384]
*** ServerHello, TLSv1.2
RandomCookie:  GMT: 1551699703 bytes = { 249, 106, 24, 48, 151, 27, 53, 192, 6, 37, 123, 97, 160, 198, 58, 140, 51, 36, 55, 26, 66, 142, 253, 24, 76, 152, 166, 217 }
Session ID:  {92, 125, 15, 247, 242, 122, 131, 156, 80, 117, 217, 241, 196, 233, 43, 6, 10, 175, 226, 239, 82, 201, 190, 246, 213, 22, 177, 21, 148, 39, 43, 131}
Cipher Suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
Compression Method: 0
Extension renegotiation_info, renegotiated_connection: <empty>
***
Cipher suite:  TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
*** Certificate chain
chain [0] = [
[
  Version: V3
  Subject: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US
  Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5

  Key:  Sun RSA public key, 2048 bits
  modulus: 21944740401167172627731583459321030363948627215746053925732477915060915436180167456469785746662093119306577380200747716284652995937004530444336851845029170241627465854006145050037178991946925696078563485570896673835545540824265905937881682387179314987285174428010940266412458943894800978345731524307952507729956745301047871771953945124256516782917326981125087548987889540650149121302888872237484100834740328828765018090383963294418357028839734723410564800765871733483849269364796949055153420777966213779145518299141217288017794394762274753999989298548507425930217302947589819396239489846633419099079578249651345685751
  public exponent: 65537
  Validity: [From: Fri May 30 08:43:19 GMT 2014,
               To: Mon May 27 08:43:19 GMT 2024]
  Issuer: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US
  SerialNumber: [    a6ef7a9a 5368eb27]

Certificate Extensions: 3
[1]: ObjectId: 2.5.29.35 Criticality=false
AuthorityKeyIdentifier [
KeyIdentifier [
0000: 78 0D 96 9D FE D3 0B BE   8C C7 E3 EC 67 04 AB 4B  x...........g..K
0010: EA E0 00 29                                        ...)
]
]

[2]: ObjectId: 2.5.29.19 Criticality=false
BasicConstraints:[
  CA:true
  PathLen:2147483647
]

[3]: ObjectId: 2.5.29.14 Criticality=false
SubjectKeyIdentifier [
KeyIdentifier [
0000: 78 0D 96 9D FE D3 0B BE   8C C7 E3 EC 67 04 AB 4B  x...........g..K
0010: EA E0 00 29                                        ...)
]
]

]
  Algorithm: [SHA1withRSA]
  Signature:
0000: 19 16 5A 21 99 21 24 98   3C 0A E8 D8 00 AB 44 24  ..Z!.!$.<.....D$
0010: F2 0C B7 83 D5 9F 96 17   87 E2 1F 1D A3 47 68 C7  .............Gh.
0020: 68 4A CB 56 0E 77 2B E8   1A 9F E7 09 A1 19 77 D0  hJ.V.w+.......w.
0030: 5E CC C1 B3 9A C4 35 3D   CB E0 A5 A6 43 5D A3 26  ^.....5=....C].&
0040: A4 91 8A C1 FA 7B 10 EA   DC C3 C7 1C 47 DC 97 32  ............G..2
0050: C0 37 80 1C F1 42 10 E3   74 17 FA 3E 60 4A B7 59  .7...B..t..>`J.Y
0060: 92 C1 E0 6F BB F1 BB 9F   82 89 B5 83 D5 AE 1E 90  ...o............
0070: 0A 89 8D FB 4C C0 C5 9E   DC C5 8C C6 2F EE D9 B4  ....L......./...
0080: 95 47 27 2E BE 82 31 6F   76 C0 DB 4C C8 0D 3B 7B  .G'...1ov..L..;.
0090: D1 6A BF BD 3B 93 30 04   A2 9E 81 F7 96 28 77 F2  .j..;.0......(w.
00A0: 32 05 68 44 1F B3 30 CE   40 9F 20 F3 B4 2B AA E6  2.hD..0.@. ..+..
00B0: 40 9B FB 7F 34 6E 3A 99   FD F8 28 F1 8C 9B 56 34  @...4n:...(...V4
00C0: 64 AD 4D 56 39 CB 96 18   50 9B 99 43 80 0A 39 A5  d.MV9...P..C..9.
00D0: 13 7A 6E C5 25 E0 95 4A   92 E5 A8 8B EE 03 49 B4  .zn.%..J......I.
00E0: D9 7C 00 E3 F0 3B A7 BA   40 30 CC 89 55 C6 97 93  .....;..@0..U...
00F0: B5 15 F6 62 D3 B1 74 9C   0B 80 2B 8A D4 03 84 A0  ...b..t...+.....

]
***
Extension renegotiation_info, renegotiated_connection: <empty>
***
Cipher suite:  TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
https-jsse-nio-8443-exec-9, RECV TLSv1.2 ALERT:  warning, close_notify
https-jsse-nio-8443-exec-9, closeInboundInternal()
Extension renegotiation_info, renegotiated_connection: <empty>
***
, Cipher suite:  TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
https-jsse-nio-8443-exec-9, closeOutboundInternal()
*** Certificate chain
https-jsse-nio-8443-exec-8, WRITE: TLSv1.2 Application Data, length = 84
chain [0] = [
[
  Version: V3
  Subject: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US
  Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5

  Key:  Sun RSA public key, 2048 bits
  modulus: 21944740401167172627731583459321030363948627215746053925732477915060915436180167456469785746662093119306577380200747716284652995937004530444336851845029170241627465854006145050037178991946925696078563485570896673835545540824265905937881682387179314987285174428010940266412458943894800978345731524307952507729956745301047871771953945124256516782917326981125087548987889540650149121302888872237484100834740328828765018090383963294418357028839734723410564800765871733483849269364796949055153420777966213779145518299141217288017794394762274753999989298548507425930217302947589819396239489846633419099079578249651345685751
  public exponent: 65537
  Validity: [From: Fri May 30 08:43:19 GMT 2014,
               To: Mon May 27 08:43:19 GMT 2024]
  Issuer: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US
  SerialNumber: [    a6ef7a9a 5368eb27]

Certificate Extensions: 3
[1]: ObjectId: 2.5.29.35 Criticality=false
AuthorityKeyIdentifier [
KeyIdentifier [
0000: 78 0D 96 9D FE D3 0B BE   8C C7 E3 EC 67 04 AB 4B  x...........g..K
0010: EA E0 00 29                                        ...)
]
]

[2]: ObjectId: 2.5.29.19 Criticality=false
BasicConstraints:[
  CA:true
  PathLen:2147483647
]

[3]: ObjectId: 2.5.29.14 Criticality=false
SubjectKeyIdentifier [
KeyIdentifier [
0000: 78 0D 96 9D FE D3 0B BE   8C C7 E3 EC 67 04 AB 4B  x...........g..K
0010: EA E0 00 29                                        ...)
]
]

]
  Algorithm: [SHA1withRSA]
  Signature:
0000: 19 16 5A 21 99 21 24 98   3C 0A E8 D8 00 AB 44 24  ..Z!.!$.<.....D$
0010: F2 0C B7 83 D5 9F 96 17   87 E2 1F 1D A3 47 68 C7  .............Gh.
0020: 68 4A CB 56 0E 77 2B E8   1A 9F E7 09 A1 19 77 D0  hJ.V.w+.......w.
0030: 5E CC C1 B3 9A C4 35 3D   CB E0 A5 A6 43 5D A3 26  ^.....5=....C].&
0040: A4 91 8A C1 FA 7B 10 EA   DC C3 C7 1C 47 DC 97 32  ............G..2
0050: C0 37 80 1C F1 42 10 E3   74 17 FA 3E 60 4A B7 59  .7...B..t..>`J.Y
0060: 92 C1 E0 6F BB F1 BB 9F   82 89 B5 83 D5 AE 1E 90  ...o............
0070: 0A 89 8D FB 4C C0 C5 9E   DC C5 8C C6 2F EE D9 B4  ....L......./...
0080: 95 47 27 2E BE 82 31 6F   76 C0 DB 4C C8 0D 3B 7B  .G'...1ov..L..;.
0090: D1 6A BF BD 3B 93 30 04   A2 9E 81 F7 96 28 77 F2  .j..;.0......(w.
00A0: 32 05 68 44 1F B3 30 CE   40 9F 20 F3 B4 2B AA E6  2.hD..0.@. ..+..
00B0: 40 9B FB 7F 34 6E 3A 99   FD F8 28 F1 8C 9B 56 34  @...4n:...(...V4
00C0: 64 AD 4D 56 39 CB 96 18   50 9B 99 43 80 0A 39 A5  d.MV9...P..C..9.
00D0: 13 7A 6E C5 25 E0 95 4A   92 E5 A8 8B EE 03 49 B4  .zn.%..J......I.
00E0: D9 7C 00 E3 F0 3B A7 BA   40 30 CC 89 55 C6 97 93  .....;..@0..U...
00F0: B5 15 F6 62 D3 B1 74 9C   0B 80 2B 8A D4 03 84 A0  ...b..t...+.....

]
***
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1.1
https-jsse-nio-8443-exec-8, READ: TLSv1.2 Alert, length = 26
*** Diffie-Hellman ServerKeyExchange
DH Modulus:  { 255, 255, 255, 255, 255, 255, 255, 255, 201, 15, 218, 162, 33, 104, 194, 52, 196, 198, 98, 139, 128, 220, 28, 209, 41, 2, 78, 8, 138, 103, 204, 116, 2, 11, 190, 166, 59, 19, 155, 34, 81, 74, 8, 121, 142, 52, 4, 221, 239, 149, 25, 179, 205, 58, 67, 27, 48, 43, 10, 109, 242, 95, 20, 55, 79, 225, 53, 109, 109, 81, 194, 69, 228, 133, 181, 118, 98, 94, 126, 198, 244, 76, 66, 233, 166, 55, 237, 107, 11, 255, 92, 182, 244, 6, 183, 237, 238, 56, 107, 251, 90, 137, 159, 165, 174, 159, 36, 17, 124, 75, 31, 230, 73, 40, 102, 81, 236, 230, 83, 129, 255, 255, Using SSLEngineImpl.
Allow unsafe renegotiation: false
Allow legacy hello messages: true
Is initial handshake: true
Is secure renegotiation: false
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1.1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1.1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1.1
https-jsse-nio-8443-exec-4, READ: TLSv1 Handshake, length = 512
*** ClientHello, TLSv1.2
RandomCookie:  GMT: 643821250 bytes = { 137, 48, 182, 80, 80, 34, 131, 177, 184, 128, 9, 127, 211, 99, 150, 129, 92, 69, 3, 172, 96, 191, 219, 200, 115, 25, 212, 35 }
Session ID:  {92, 125, 15, 247, 246, 249, 211, 141, 164, 158, 249, 105, 184, 211, 34, 29, 135, 131, 232, 36, 64, 192, 38, 174, 54, 83, 112, 53, 142, 111, 182, 94}
Cipher Suites: [Unknown 0x13:0x2, Unknown 0x13:0x3, Unknown 0x13:0x1, Unknown 0x13:0x4, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa9, Unknown 0xc0:0xad, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0xac, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa8, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xc0:0x9d, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9c, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xaa, Unknown 0xc0:0x9f, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9e, TLS_DHE_RSA_WITH_AES_128_CBC_SHA]
Compression Methods:  { 0 }
Unsupported extension status_request, data: 01:00:00:00:00
Extension elliptic_curves, curve names: {secp256r1, secp384r1, secp521r1, unknown curve 29, unknown curve 256, unknown curve 257, unknown curve 258, unknown curve 259, unknown curve 260}
Extension ec_point_formats, formats: [uncompressed]
Extension signature_algorithms, signature_algorithms: SHA256withRSA, Unknown (hash:0x8, signature:0x9), Unknown (hash:0x8, signature:0x4), SHA256withECDSA, Unknown (hash:0x8, signature:0x7), SHA384withRSA, Unknown (hash:0x8, signature:0xa), Unknown (hash:0x8, signature:0x5), SHA384withECDSA, SHA512withRSA, Unknown (hash:0x8, signature:0xb), Unknown (hash:0x8, signature:0x6), SHA512withECDSA, SHA1withRSA, SHA1withECDSA
Unsupported extension type_35, data:
Unsupported extension type_51, data: 00:69:00:17:00:41:04:78:2b:24:a2:10:62:da:65:7e:7f:87:75:d2:71:65:9b:df:5a:cc:85:8a:dd:8f:da:79:7d:22:ec:77:68:7e:b8:ac:e1:a7:b8:49:c7:09:e1:c9:45:bf:0b:31:62:e8:f6:4d:a9:9a:26:ab:fd:ec:b9:cf:f9:9a:98:fc:6a:05:f3:00:1d:00:20:2f:22:42:1e:67:89:6e:49:6a:48:64:f2:8e:92:11:05:92:e5:7d:8d:85:c7:b0:1f:96:3d:14:aa:8e:b8:74:08
Unsupported extension type_43, data: 08:03:04:03:03:03:02:03:01
Extension renegotiation_info, renegotiated_connection: <empty>
Extension server_name, server_name: [type=host_name (0), value=localhost]
Unsupported extension type_45, data: 02:01:00
Unsupported extension type_28, data: 40:00
Unsupported extension type_21, data: 00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00
***
*** Diffie-Hellman ServerKeyExchange
https-jsse-nio-8443-exec-9, SEND TLSv1.2 ALERT:  warning, description = close_notify
*** Certificate chain
https-jsse-nio-8443-exec-9, WRITE: TLSv1.2 Alert, length = 26
https-jsse-nio-8443-exec-9, called closeOutbound()
https-jsse-nio-8443-exec-9, closeOutboundInternal()
chain [0] = [
[
  Version: V3
  Subject: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US
  Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5

  Key:  Sun RSA public key, 2048 bits
  modulus: 21944740401167172627731583459321030363948627215746053925732477915060915436180167456469785746662093119306577380200747716284652995937004530444336851845029170241627465854006145050037178991946925696078563485570896673835545540824265905937881682387179314987285174428010940266412458943894800978345731524307952507729956745301047871771953945124256516782917326981125087548987889540650149121302888872237484100834740328828765018090383963294418357028839734723410564800765871733483849269364796949055153420777966213779145518299141217288017794394762274753999989298548507425930217302947589819396239489846633419099079578249651345685751
  public exponent: 65537
  Validity: [From: Fri May 30 08:43:19 GMT 2014,
               To: Mon May 27 08:43:19 GMT 2024]
  Issuer: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US
  SerialNumber: [    a6ef7a9a 5368eb27]

Certificate Extensions: 3
[1]: ObjectId: 2.5.29.35 Criticality=false
AuthorityKeyIdentifier [
KeyIdentifier [
0000: 78 0D 96 9D FE D3 0B BE   8C C7 E3 EC 67 04 AB 4B  x...........g..K
0010: EA E0 00 29                                        ...)
]
]

[2]: ObjectId: 2.5.29.19 Criticality=false
BasicConstraints:[
  CA:true
  PathLen:2147483647
]

[3]: ObjectId: 2.5.29.14 Criticality=false
SubjectKeyIdentifier [
KeyIdentifier [
0000: 78 0D 96 9D FE D3 0B BE   8C C7 E3 EC 67 04 AB 4B  x...........g..K
0010: EA E0 00 29                                        ...)
]
]

]
  Algorithm: [SHA1withRSA]
  Signature:
0000: 19 16 5A 21 99 21 24 98   3C 0A E8 D8 00 AB 44 24  ..Z!.!$.<.....D$
0010: F2 0C B7 83 D5 9F 96 17   87 E2 1F 1D A3 47 68 C7  .............Gh.
0020: 68 4A CB 56 0E 77 2B E8   1A 9F E7 09 A1 19 77 D0  hJ.V.w+.......w.
0030: 5E CC C1 B3 9A C4 35 3D   CB E0 A5 A6 43 5D A3 26  ^.....5=....C].&
0040: A4 91 8A C1 FA 7B 10 EA   DC C3 C7 1C 47 DC 97 32  ............G..2
0050: C0 37 80 1C F1 42 10 E3   74 17 FA 3E 60 4A B7 59  .7...B..t..>`J.Y
0060: 92 C1 E0 6F BB F1 BB 9F   82 89 B5 83 D5 AE 1E 90  ...o............
0070: 0A 89 8D FB 4C C0 C5 9E   DC C5 8C C6 2F EE D9 B4  ....L......./...
0080: 95 47 27 2E BE 82 31 6F   76 C0 DB 4C C8 0D 3B 7B  .G'...1ov..L..;.
0090: D1 6A BF BD 3B 93 30 04   A2 9E 81 F7 96 28 77 F2  .j..;.0......(w.
00A0: 32 05 68 44 1F B3 30 CE   40 9F 20 F3 B4 2B AA E6  2.hD..0.@. ..+..
00B0: 40 9B FB 7F 34 6E 3A 99   FD F8 28 F1 8C 9B 56 34  @...4n:...(...V4
00C0: 64 AD 4D 56 39 CB 96 18   50 9B 99 43 80 0A 39 A5  d.MV9...P..C..9.
00D0: 13 7A 6E C5 25 E0 95 4A   92 E5 A8 8B EE 03 49 B4  .zn.%..J......I.
00E0: D9 7C 00 E3 F0 3B A7 BA   40 30 CC 89 55 C6 97 93  .....;..@0..U...
00F0: B5 15 F6 62 D3 B1 74 9C   0B 80 2B 8A D4 03 84 A0  ...b..t...+.....

]
***
75, %% Initialized:  [Session-15, SSL_NULL_WITH_NULL_NULL]
DH Modulus:  { 255, 255, 255, 255, 255, 255 }
https-jsse-nio-8443-exec-8, RECV TLSv1.2 ALERT:  warning, close_notify
https-jsse-nio-8443-exec-8, closeInboundInternal()
https-jsse-nio-8443-exec-8, closeOutboundInternal()
https-jsse-nio-8443-exec-8, SEND TLSv1.2 ALERT:  warning, description = close_notify
https-jsse-nio-8443-exec-8, WRITE: TLSv1.2 Alert, length = 26
https-jsse-nio-8443-exec-8, called closeOutbound()
https-jsse-nio-8443-exec-8, closeOutboundInternal()
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1
255DH Base:  { 2 }
Server DH Public Key:  { 177, 46, 218, 230, 151, 33, 161, 94, 214, 180, 215, 165, 151, 60, 134, 118, 72, 235, 168, 110, 64, 81, 143, 166, 12, 246, 101, 54, 179, 48, 30, 25, 217, 6, 0, 82, 255, 156, 50, 42, 163, 245, 129, 17, 24, 191, 111, 135, 130, 39, 111, 76, 27, 43, 199, 194, 122, 223, 144, 110, 178, 79, 101, 109, 51, 158, 60, 219, 86, 104, 87, 22, 16, 145, 98, 213, 41, 162, 41, 194, 85, 251, 46, 21, 164, 92, 82, 43, 64, 134, 22, 167, 216, 227, 36, 230, 90, 31, 150, 223, 17, 125, 194, 16, 229, 56, 37, 71, 180, 75, 67, 107, 4, 154, 250, 220, 233, 74, 138, 181, 207, 206, 65, 73, 71, 142, 1, 225 }
Signature Algorithm SHA256withRSA
Signed with a DSA or RSA public key
*** ServerHelloDone
https-jsse-nio-8443-exec-6, WRITE: TLSv1.2 Handshake, length = 1697
Standard ciphersuite chosen: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
%% Negotiating:  [Session-15, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384]
*** ServerHello, TLSv1.2
RandomCookie:  GMT: 1551699703 bytes = { 198, 11, 117, 179, 159, 93, 48, 227, 13, 155, 36, 80, 90, 158, 84, 220, 89, 20, 35, 144, 216, 180, 203, 23, 217, 172, 24, 58 }
Session ID:  {92, 125, 15, 247, 11, 132, 70, 127, 210, 91, 74, 138, 226, 252, 111, 170, 226, 8, 142, 158, 184, 98, 97, 19, 34, 33, 55, 248, 219, 15, 65, 161}
Cipher Suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
Compression Method: 0
Extension renegotiation_info, renegotiated_connection: <empty>
***
Cipher suite:  TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
*** Certificate chain
196, 187, 73, 78, 45, 31, 224, 64, 65, 236, 30, 143, 125, 66, 234 }
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1.1
https-jsse-nio-8443-exec-6, READ: TLSv1.2 Handshake, length = 134
*** ClientKeyExchange, DH
DH Public key:  { 157, 154, 50, 120, 59, 112, 151, 246, 118, 246, 99, 60, 208, 120, 179, 160, 184, 247, 26, 167, 185, 205, 106, 238, 241, 71, 3, 69, 147, 4, 120, 153, 192, 24, 173, 137, 235, 161, 187, 124, 156, 85, 177, 114, 253, 240, 126, 107, 95, 2, 136, 50, 197, 247, 97, 81, 79, 54, 32, 43, 112, 132, 176, 192, 158, 187, 122, 171, 118, 218, 96, 214, 148, 234, 43, 164, 105, 71, 136, 215, 29, 80, 246, 123, 214, 203, 34, 98, 141, 91, 100, 11, 130, 114, 53, 116, 176, 188, 130, 120, 144, 12, 227, 168, 217, 19, 252, 132, 217, 104, 81, 169, 205, 73, 108, 87, 232, 158, 7, 239, 184, 156, 165, 71, 209, 54, 191, 82 }
chain [0] = [
[
  Version: V3
  Subject: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US
  Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5

  Key:  Sun RSA public key, 2048 bits
  modulus: 21944740401167172627731583459321030363948627215746053925732477915060915436180167456469785746662093119306577380200747716284652995937004530444336851845029170241627465854006145050037178991946925696078563485570896673835545540824265905937881682387179314987285174428010940266412458943894800978345731524307952507729956745301047871771953945124256516782917326981125087548987889540650149121302888872237484100834740328828765018090383963294418357028839734723410564800765871733483849269364796949055153420777966213779145518299141217288017794394762274753999989298548507425930217302947589819396239489846633419099079578249651345685751
  public exponent: 65537
  Validity: [From: Fri May 30 08:43:19 GMT 2014,
               To: Mon May 27 08:43:19 GMT 2024]
  Issuer: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US
  SerialNumber: [    a6ef7a9a 5368eb27]

Certificate Extensions: 3
[1]: ObjectId: 2.5.29.35 Criticality=false
AuthorityKeyIdentifier [
KeyIdentifier [
0000: 78 0D 96 9D FE D3 0B BE   8C C7 E3 EC 67 04 AB 4B  x...........g..K
0010: EA E0 00 29                                        ...)
]
]

[2]: ObjectId: 2.5.29.19 Criticality=false
BasicConstraints:[
  CA:true
  PathLen:2147483647
]

[3]: ObjectId: 2.5.29.14 Criticality=false
SubjectKeyIdentifier [
KeyIdentifier [
0000: 78 0D 96 9D FE D3 0B BE   8C C7 E3 EC 67 04 AB 4B  x...........g..K
0010: EA E0 00 29                                        ...)
]
]

]
  Algorithm: [SHA1withRSA]
  Signature:
0000: 19 16 5A 21 99 21 24 98   3C 0A E8 D8 00 AB 44 24  ..Z!.!$.<.....D$
0010: F2 0C B7 83 D5 9F 96 17   87 E2 1F 1D A3 47 68 C7  .............Gh.
0020: 68 4A CB 56 0E 77 2B E8   1A 9F E7 09 A1 19 77 D0  hJ.V.w+.......w.
0030: 5E CC C1 B3 9A C4 35 3D   CB E0 A5 A6 43 5D A3 26  ^.....5=....C].&
0040: A4 91 8A C1 FA 7B 10 EA   DC C3 C7 1C 47 DC 97 32  ............G..2
0050: C0 37 80 1C F1 42 10 E3   74 17 FA 3E 60 4A B7 59  .7...B..t..>`J.Y
0060: 92 C1 E0 6F BB F1 BB 9F   82 89 B5 83 D5 AE 1E 90  ...o............
0070: 0A 89 8D FB 4C C0 C5 9E   DC C5 8C C6 2F EE D9 B4  ....L......./...
0080: 95 47 27 2E BE 82 31 6F   76 C0 DB 4C C8 0D 3B 7B  .G'...1ov..L..;.
0090: D1 6A BF BD 3B 93 30 04   A2 9E 81 F7 96 28 77 F2  .j..;.0......(w.
00A0: 32 05 68 44 1F B3 30 CE   40 9F 20 F3 B4 2B AA E6  2.hD..0.@. ..+..
00B0: 40 9B FB 7F 34 6E 3A 99   FD F8 28 F1 8C 9B 56 34  @...4n:...(...V4
00C0: 64 AD 4D 56 39 CB 96 18   50 9B 99 43 80 0A 39 A5  d.MV9...P..C..9.
00D0: 13 7A 6E C5 25 E0 95 4A   92 E5 A8 8B EE 03 49 B4  .zn.%..J......I.
00E0: D9 7C 00 E3 F0 3B A7 BA   40 30 CC 89 55 C6 97 93  .....;..@0..U...
00F0: B5 15 F6 62 D3 B1 74 9C   0B 80 2B 8A D4 03 84 A0  ...b..t...+.....

]
***
SESSION KEYGEN:
PreMaster Secret:
0000: 4C 4C 7D 36 B9 C2 EA 5B   14 A6 33 34 1D 0B E1 4C  LL.6...[..34...L
0010: FF 80 50 41 86 7E 0E 53   C8 DD F0 E5 78 2A FC A7  ..PA...S....x*..
0020: A5 57 35 26 9C C6 DC 32   0A 9F F0 67 B2 E2 97 B6  .W5&...2...g....
0030: 91 1D BD C5 F7 D1 BD 87   59 AD 5A C6 6F C1 86 93  ........Y.Z.o...
0040: 56 CD E9 09 C2 F1 4B 7D   00 78 FA C0 BF D8 53 44  V.....K..x....SD
0050: E8 BF 14 5A AA 28 59 B6   8B 2A DC 92 ED 16 47 B4  ...Z.(Y..*....G.
0060: BD 3C 66 98 F8 86 61 AB   3B 2C 02 DE FE 0D CB 53  .<f...a.;,.....S
0070: 6D A1 F4 88 82 73 C8 F7   98 CC 42 4A 87 6F 9B DB  m....s....BJ.o..
CONNECTION KEYGEN:
Client Nonce:
0000: 86 AC A9 EC 72 70 55 A6   D6 DD EC 7B B8 70 86 17  ....rpU......p..
0010: E4 22 C9 39 82 B7 FC 35   98 11 BA A6 02 FF 47 60  .".9...5......G`
Server Nonce:
0000: 5C 7D 0F F7 F9 6A 18 30   97 1B 35 C0 06 25 7B 61  \....j.0..5..%.a
0010: A0 C6 3A 8C 33 24 37 1A   42 8E FD 18 4C 98 A6 D9  ..:.3$7.B...L...
Master Secret:
0000: D2 6F 9C 6A E2 98 C7 AC   E1 36 49 74 D3 74 72 20  .o.j.....6It.tr
0010: 25 16 88 E3 C0 12 14 B0   66 17 52 9A 94 3B 1E AE  %.......f.R..;..
0020: DD 7E 78 F7 1C 21 74 67   65 7C 55 09 12 54 65 36  ..x..!tge.U..Te6
... no MAC keys used for this cipher
Client write key:
0000: F8 CA 67 96 B0 33 B9 F6   3E EE D8 29 8A 18 70 25  ..g..3..>..)..p%
0010: B0 C2 22 05 1E A2 CC C6   9F 92 62 C9 DB D8 AB 46  ..".......b....F
Server write key:
0000: 6F FA 2F 76 B0 CE 3D 38   8B 8C 53 48 3E 16 63 49  o./v..=8..SH>.cI
0010: 29 ED B7 D0 85 DD C8 3B   11 19 71 29 BC 2F C0 43  )......;..q)./.C
Client write IV:
0000: 90 75 CF 92                                        .u..
Server write IV:
0000: C3 17 23 D2                                        ..#.
https-jsse-nio-8443-exec-6, READ: TLSv1.2 Change Cipher Spec, length = 1
https-jsse-nio-8443-exec-6, READ: TLSv1.2 Handshake, length = 40
*** Finished
verify_data:  { 125, 229, 83, 206, 118, 221, 127, 176, 77, 43, 74, 250 }
***
https-jsse-nio-8443-exec-6, WRITE: TLSv1.2 Change Cipher Spec, length = 1
*** Finished
verify_data:  { 220, 32, 94, 37, 86, 154, 92, 9, 15, 195, 183, 59 }
***
Signature Algorithm SHA256withRSA
Signed with a DSA or RSA public key
*** ServerHelloDone
*** Diffie-Hellman ServerKeyExchange
DH Modulus:  { 255, 255, 255, 255, 255, 255, 255, 255, 201, 15, 218, 162, 33, 104, 194, 52, 196, 198, 98, 139, 128, 220, 28, 209, 41, 2, 78, 8, 138, 103, 204, 116, 2, 11, 190, 166, 59, 19, 155, 34, 81, 74, 8, 121, 142, 52, 4, 221, 239, 149, 25, 179, 205, 58, 67, 27, 48, 43, 10, 109, 242, 95, 20, 55, 79, 225, 53, 109, 109, 81, 194, , 255, 255, 255, 255, 255, 255, 255, 201, *** Diffie-Hellman ServerKeyExchange
15DH Modulus:  { 255, 255, 255, 255, 255, 255, 255, 255, 201, 15, 218, 162, 33, 104, 194, 52, 196, 198, 98, 139, 128, 220, 28, 209, 41, 2, 78, 8, 138, 103, 204, 116, 2, 11, 190, 166, 59, 19, 155, 34, 81, 74, 8, 121, 142, 52, 4, 221, 239, 149, 25, 179, 205, 58, 67, 27, 48, 43, 10, 109, 242, 95, 20, 55, 79, 225, 53, 109, 109, 81, 194, 69, 228, 133, 181, 118, 98, 94, 126, 198, 244, 76, 66, 233, 166, 55, 237, 107, 11, 255, 92, 182, 244, 6, 183, 237, 238, 56, 107, 251, 90, 137, 159, 165, 174, 159, 36, 17, 124, 75, 31, 230, 73, 40, 102, 81, 236, 230, 83, 129, 255, 255, 255, 255, 255, 255, 255, 255 }
https-jsse-nio-8443-exec-6, WRITE: TLSv1.2 Handshake, length = 40
69, 228, 133, 181, 118, 98, 94, 126, 198, 244, 76, 66, 233, 166, 55, 237, 107, 11, 255, 92, 182, 244, 6, 183, 237, 238, 56, 107, 251, 90, 137, 159, 165, 174, 159, 36, 17, 124, 75, 31, 230, 73, 40, 102, 81, 236, 230, 83, 129, 255, 255, 255, 255, 255, 255, 255, 255 }
https-jsse-nio-8443-exec-1, WRITE: TLSv1.2 Handshake, length = 1697
https-jsse-nio-8443-exec-7, READ: TLSv1 Handshake, length = 512
DH Base:  { 2 }
Server DH Public Key:  { 193, 96, 176, 222, 230, 37, 252, 19, 5, 43, 101, 80, 70, 102, 130, 118, 131, 152, 32, 57, 29, 115, 181, 106, 56, 103, 229, 196, 134, 219, 63, 212, 96, 179, 36, 86, 213, 90, 81, 245, 4, 58, 100, 54, 84, 210, 191, 183, 116, 242, 80, 67, 50, 253, 211, 91, 173, 143, 212, 82, 195, 58, 108, 142, 94, 192, 231, 124, 87, 50, 145, 248, 23, 86, 64, 46, 122, 103, 165, 81, 62, 140, 56, 244, 41, 224, 250, 39, 64, 223, 7, 39, 34, 56, 204, 44, 1, 248, 68, 126, 121, 77, 81, 20, 78, 26, 74, 211, 31, 115, 33, 196, 185, 198, 143, 159, 34, 7, 162, 30, 165, 75, 115, 173, 30, 23, 147, 152 }
Signature Algorithm SHA256withRSA
Signed with a DSA or RSA public key
*** ServerHelloDone
https-jsse-nio-8443-exec-4, WRITE: TLSv1.2 Handshake, length = 1697
%% Cached server session: [Session-14, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384]
DH Base:  { 2 }
Server DH Public Key:  { 70, 38, 125, 98, 236, 23, 27, 22, 194, 211, 229, 253, 113, 86, 193, 213, 189, 160, 201, 194, 165, 143, 35, 222, 55, 108, 224, 113, 136, 247, 119, 255, 38, 167, 5, 67, 240, 61, 189, 136, 208, 229, 118, 220, 251, 141, 36, 156, 74, 98, 117, 235, 180, 84, 153, 139, 114, 161, 108, 133, 123, 63, 193, 121, 68, 167, 18, 183, 79, 252, 161, 177, 41, 85, 193, 92, 167, 191, 42, 54, 87, 60, 213, 143, 93, 116, 122, 227, 157, 37, 40, 44, 135, 232, 156, 208, 179, 219, 176, 42, 238, 51, 230, 16, 155, 11, 223, 98, 92, 102, 24, 13, 252, 30, 137, 81, 233, 185, 167, 116, 70, 131, 130, 117, 144, 239, 35, 50 }
Signature Algorithm SHA256withRSA
Signed with a DSA or RSA public key
*** ServerHelloDone
, 218, 162, 33, 104, 194, 52, 196, 198, 98, 139, 128, 220, 28, 209, 41, 2, 78, 8, 138, 103, 204, 116, 2, 11, 190, 166, 59, 19, 155, 34, 81, 74, 8, 121, 142, 52, 4, 221, 239, 149, 25, 179, 205, 58, 67, 27, 48, 43, 10, 109, 242, 95, 20, 55, 79, 225, 53, 109, 109, 81, 194, 69, 228, 133, 181, 118, 98, 94, 126, 198, 244, 76, 66, 233, 166, 55, 237, 107, 11, 255, 92, 182, 244, 6, 183, 237, 238, 56, 107, 251, 90, 137, 159, 165, 174, 159, 36, 17, 124, 75, 31, 230, 73, 40, 102, 81, 236, 230, 83, 129, 255, 255, 255, 255, 255, 255, 255, 255 }
DH Base:  { 2 }
Server DH Public Key:  { 217, 93, 254, 238, 74, 68, 192, 30, 45, 154, 168, 126, 223, 188, 188, 211, 23, 82, 229, 4, 203, 84, 246, 79, 209, 112, 187, 23, 136, 40, 120, 87, 228, 233, 170, 48, 169, 12, 71, 25, 8, 194, 208, 158, 244, 169, 96, 249, 26, 146, 81, 65, 55, 117, 56, 39, 217, 149, 79, 35, 120, 140, 70, 159, 60, 191, 88, 188, 142, 205, 168, 124, 168, 227, 63, 194, 245, 114, 199, 28, 96, 77, 92, 216, 122, 186, 226, 142, 45, 235, 188, 201, 127, 22, 123, 9, 77, 251, 179, 139, 197, 105, 182, 47, 237, 45, 167, 34, 245, 143, 156, 101, 223, 218, 239, 63, 147, 168, 245, 151, 61, 224, 1, 76, 140, 51, 14, 10 }
Signature Algorithm SHA256withRSA
Signed with a DSA or RSA public key
*** ServerHelloDone
https-jsse-nio-8443-exec-3, WRITE: TLSv1.2 Handshake, length = 1697
https-jsse-nio-8443-exec-5, WRITE: TLSv1.2 Handshake, length = 1697
https-jsse-nio-8443-exec-10, READ: TLSv1.2 Handshake, length = 134
*** ClientHello, TLSv1.2
RandomCookie:  GMT: -706604215 bytes = { 196, 111, 179, 208, 244, 129, 162, 107, 156, 95, 201, 27, 64, 190, 101, 179, 175, 152, 138, 37, 220, 22, 85, 26, 42, 30, 238, 85 }
Session ID:  {92, 125, 15, 237, 254, 33, 2, 52, 144, 148, 0, 165, 156, 232, 106, 139, 222, 199, 99, 71, 41, 230, 1, 75, 246, 145, 175, 22, 191, 231, 28, 218}
Cipher Suites: [Unknown 0x13:0x2, Unknown 0x13:0x3, Unknown 0x13:0x1, Unknown 0x13:0x4, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa9, Unknown 0xc0:0xad, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0xac, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa8, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xc0:0x9d, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9c, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xaa, Unknown 0xc0:0x9f, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9e, TLS_DHE_RSA_WITH_AES_128_CBC_SHA]
Compression Methods:  { 0 }
Unsupported extension status_request, data: 01:00:00:00:00
Extension elliptic_curves, curve names: {secp256r1, secp384r1, secp521r1, unknown curve 29, unknown curve 256, unknown curve 257, unknown curve 258, unknown curve 259, unknown curve 260}
Extension ec_point_formats, formats: [uncompressed]
Extension signature_algorithms, signature_algorithms: SHA256withRSA, Unknown (hash:0x8, signature:0x9), Unknown (hash:0x8, signature:0x4), SHA256withECDSA, Unknown (hash:0x8, signature:0x7), SHA384withRSA, Unknown (hash:0x8, signature:0xa), Unknown (hash:0x8, signature:0x5), SHA384withECDSA, SHA512withRSA, Unknown (hash:0x8, signature:0xb), Unknown (hash:0x8, signature:0x6), SHA512withECDSA, SHA1withRSA, SHA1withECDSA
Unsupported extension type_35, data:
Unsupported extension type_51, data: 00:69:00:17:00:41:04:ae:26:0e:77:5f:28:ef:c6:07:56:58:e5:86:ad:d2:a9:7f:36:c0:10:9f:b4:2e:3f:6e:38:42:1b:99:da:08:de:71:5e:f8:f6:73:40:34:82:e5:bf:d6:e0:88:5c:5e:76:8d:ac:e8:10:44:c4:a6:31:61:e2:c0:4e:11:a1:c5:d0:00:1d:00:20:ad:5a:7b:16:64:36:ac:fe:0c:1b:a3:66:f3:1c:c5:d6:5c:6d:6d:bf:9e:fd:dd:ba:f2:4a:92:ba:75:36:65:74
Unsupported extension type_43, data: 08:03:04:03:03:03:02:03:01
Extension renegotiation_info, renegotiated_connection: <empty>
Extension server_name, server_name: [type=host_name (0), value=localhost]
Unsupported extension type_45, data: 02:01:00
Unsupported extension type_28, data: 40:00
Unsupported extension type_21, data: 00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00
***
%% Initialized:  [Session-16, SSL_NULL_WITH_NULL_NULL]
https-jsse-nio-8443-exec-8, WRITE: TLSv1.2 Application Data, length = 85
https-jsse-nio-8443-exec-9, READ: TLSv1.2 Handshake, length = 134
*** ClientKeyExchange, DH
DH Public key:  { 208, 16, 173, 145, 228, 230, 22, 149, 101, 4, 218, 106, 213, 64, 141, 224, 237, 45, Using SSLEngineImpl.
*** ClientKeyExchange, DH
DH Public key:  { 99, 58, 152, 205, 251, 195, 178, 244, 230, 142, 181, 100, Allow unsafe renegotiation: false
Allow legacy hello messages: true
Is initial handshake: true
Is secure renegotiation: false
230, 59, 209, 239, 243, 185, 102, 26, 219, 196, 138, 199, 133, 254, 120, 180, 224, 146, 217, 28, 95, 47, 121, 59, 237, 106, 196, 19, 32, 21, 113, 7, 28, 103, 73, 44, 17, 94, 26, 178, 114, 38, 165, 180, 9, 253, 81, 99, 47, 217, 91, 119, 129, 125, 254, 52, 168, 237, 176, 114, 0, 68, 154, 65, 203, 28, 126, 159, 65, 219, 89, 221, 151, 28, 139, 170, 226, 143, 68, 144, 227, 36, 128, 163, 135, 170, 75, 162, 118, 92, 64, 19, 110, 18, 0, 143, 66, 67, 214, 64, 42, 63, 128, 101, 101, 77, 217, 92, 2, 213 }
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1
Standard ciphersuite chosen: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
212%% Negotiating:  [Session-16, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384]
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1
https-jsse-nio-8443-exec-4, READ: TLSv1.2 Handshake, length = 134
*** ServerHello, TLSv1.2
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1.1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1.1
SESSION KEYGEN:
PreMaster Secret:
https-jsse-nio-8443-exec-6, READ: TLSv1.2 Alert, length = 26
https-jsse-nio-8443-exec-1, READ: TLSv1.2 Handshake, length = 134
*** ClientKeyExchange, DH
DH Public key:  { 232, 46, 72, 12, 170, 19, 61, 133, 121, *** ClientKeyExchange, DH
DH Public key:  { 46, 120, 54, 246, 196, 238, 228, 47, 229, 9, 234, 188, 11, 239, 188, 145, 201, 234, 51, 171, 155, 114, 4, 32, 33, 69, 173, 180, 48, 249, 215, 103, 201, 25, 255, 111, 63, 186, 171, 93, 189, 90, 205, 116, 250, 209, 241, 73, 248, 242, 181, 212, 226, 145, 106, 177, 237, 6, 75, 84, 106, 80, 102, 129, 255, 218, 214, 213, 197, 24, 39, 230, 144, 155, 67, 117, 220, 21, 92, 132, 111, 212, 218, 30, 61, 255, 73, 221, 128, 47, 22, 85, 198, 87, 66, 26, 120, 78, 219, 126, 170, 178, 8, 31, 234, 38, 129, 100, 174, 169, 5, 243, 106, 83, 242, 189, 210, 10, 192, 16, 130, 214, 131, 104, 204, 204, 6, 65 }
SESSION KEYGEN:
PreMaster Secret:
0000: 59 6D C0 DA 06 E0 FD 3D   C8 44 C9 73 91 B6 39 3C  Ym.....=.D.s..9<
0010: 41 72 7B 70 F4 3B D7 FE   9C 8F F7 F5 64 56 A4 BD  Ar.p.;......dV..
0020: BB 3E 1F B5 D3 91 5F E6   E1 04 CB 6A 40 46 B4 91  .>...._....j@F..
0030: 95 D7 0C D9 6B DC EC DD   BA FD D8 A2 06 E5 2E 12  ....k...........
0040: 7C 47 5A 01 75 BC E5 2E   AC 2F 78 CA CE 0A E5 40  .GZ.u..../x....@
0050: 8A 17 97 19 52 B2 46 A2   1A D3 0D 02 D2 35 59 C1  ....R.F......5Y.
0060: E6 38 C0 EF DC 67 5C EE   50 B3 34 23 AD 96 4F C3  .8...g\.P.4#..O.
0070: CC 69 A1 04 FE 96 FF 22   E7 86 BB A3 A5 D2 74 32  .i....."......t2
CONNECTION KEYGEN:
Client Nonce:
0000: 93 7D 31 C2 40 06 63 D3   74 AD 6C E2 FD 95 31 EB  ..1.@.c.t.l...1.
0010: C8 9C 77 E2 5C 7C 45 DA   D6 69 44 25 97 F3 78 29  ..w.\.E..iD%..x)
Server Nonce:
0000: 5C 7D 0F F7 FC AA D3 4F   0B E4 54 41 0F 53 51 DD  \......O..TA.SQ.
0010: C8 75 59 BA E9 77 5A B9   6A 23 B9 62 1C FA 58 F9  .uY..wZ.j#.b..X.
Master Secret:
0000: ED D0 E5 18 AE 36 25 39   46 BA 4B C3 EA 22 8E B5  .....6%9F.K.."..
0010: 40 19 5C 46 93 C1 F4 90   3E 66 2F 86 D9 4A F4 CD  @.\F....>f/..J..
0020: A6 0A 77 DA 9A 30 37 FA   68 00 0F CA E7 AE 6F C0  ..w..07.h.....o.
... no MAC keys used for this cipher
Client write key:
0000: 91 A4 F4 23 6D 8C 87 45   A4 09 04 67 0D 20 AA E2  ...#m..E...g. ..
0010: 7C EE 48 CB 6E 0C F1 E3   6C B0 0F 72 4B C1 B8 04  ..H.n...l..rK...
Server write key:
0000: 0A 3D A5 C5 7D F8 54 B2   DC 99 8B 7D A5 95 05 74  .=....T........t
0010: DF C6 50 34 F3 2F 0B A7   CC 2A EA 00 C8 79 0C 5F  ..P4./...*...y._
Client write IV:
0000: 62 96 EB 08                                        b...
Server write IV:
0000: 58 D8 ED CD                                        X...
0000: Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1
RandomCookie:  GMT: 1551699704 bytes = { 240, https-jsse-nio-8443-exec-1, READ: TLSv1.2 Change Cipher Spec, length = 1
, 66, 5, 10, 121, 136, 226, 41, 170, 37, 114, 13, 145, 74, 43, 3, 99, 230, 46, 204, 127, 48, 116, 134, 47, 96, 75, 77 }
Session ID:  {92, 125, 15, 248, 20, 0, 210, 78, 109, 221, 37, 254, 86, 107, 83, 134, 247, 144, 23, 57, 215, 100, 31, 197, 211, 245, 87, 100, 146, 61, 193, 176}
Cipher Suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
Compression Method: 0
Extension renegotiation_info, renegotiated_connection: <empty>
***
Cipher suite:  TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
*** Certificate chain
chain [0] = [
[
  Version: V3
  Subject: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US
  Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5

  Key:  Sun RSA public key, 2048 bits
  modulus: 21944740401167172627731583459321030363948627215746053925732477915060915436180167456469785746662093119306577380200747716284652995937004530444336851845029170241627465854006145050037178991946925696078563485570896673835545540824265905937881682387179314987285174428010940266412458943894800978345731524307952507729956745301047871771953945124256516782917326981125087548987889540650149121302888872237484100834740328828765018090383963294418357028839734723410564800765871733483849269364796949055153420777966213779145518299141217288017794394762274753999989298548507425930217302947589819396239489846633419099079578249651345685751
  public exponent: 65537
  Validity: [From: Fri May 30 08:43:19 GMT 2014,
               To: Mon May 27 08:43:19 GMT 2024]
  Issuer: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US
  SerialNumber: [    a6ef7a9a 5368eb27]

Certificate Extensions: 3
[1]: ObjectId: 2.5.29.35 Criticality=false
AuthorityKeyIdentifier [
KeyIdentifier [
0000: 78 0D 96 9D FE D3 0B BE   8C C7 E3 EC 67 04 AB 4B  x...........g..K
0010: EA E0 00 29                                        ...)
]
]

[2]: ObjectId: 2.5.29.19 Criticality=false
BasicConstraints:[
  CA:true
  PathLen:2147483647
]

[3]: ObjectId: 2.5.29.14 Criticality=false
SubjectKeyIdentifier [
KeyIdentifier [
0000: 78 0D 96 9D FE D3 0B BE   8C C7 E3 EC 67 04 AB 4B  x...........g..K
0010: EA E0 00 29                                        ...)
]
]

]
  Algorithm: [SHA1withRSA]
  Signature:
0000: 19 16 5A 21 99 21 24 98   3C 0A E8 D8 00 AB 44 24  ..Z!.!$.<.....D$
0010: F2 0C B7 83 D5 9F 96 17   87 E2 1F 1D A3 47 68 C7  .............Gh.
0020: 68 4A CB 56 0E 77 2B E8   1A 9F E7 09 A1 19 77 D0  hJ.V.w+.......w.
0030: 5E CC C1 B3 9A C4 35 3D   CB E0 A5 A6 43 5D A3 26  ^.....5=....C].&
0040: A4 91 8A C1 FA 7B 10 EA   DC C3 C7 1C 47 DC 97 32  ............G..2
0050: C0 37 80 1C F1 42 10 E3   74 17 FA 3E 60 4A B7 59  .7...B..t..>`J.Y
0060: 92 C1 E0 6F BB F1 BB 9F   82 89 B5 83 D5 AE 1E 90  ...o............
0070: 0A 89 8D FB 4C C0 C5 9E   DC C5 8C C6 2F EE D9 B4  ....L......./...
0080: 95 47 27 2E BE 82 31 6F   76 C0 DB 4C C8 0D 3B 7B  .G'...1ov..L..;.
0090: D1 6A BF BD 3B 93 30 04   A2 9E 81 F7 96 28 77 F2  .j..;.0......(w.
00A0: 32 05 68 44 1F B3 30 CE   40 9F 20 F3 B4 2B AA E6  2.hD..0.@. ..+..
00B0: 40 9B FB 7F 34 6E 3A 99   FD F8 28 F1 8C 9B 56 34  @...4n:...(...V4
00C0: 64 AD 4D 56 39 CB 96 18   50 9B 99 43 80 0A 39 A5  d.MV9...P..C..9.
00D0: 13 7A 6E C5 25 E0 95 4A   92 E5 A8 8B EE 03 49 B4  .zn.%..J......I.
00E0: D9 7C 00 E3 F0 3B A7 BA   40 30 CC 89 55 C6 97 93  .....;..@0..U...
00F0: B5 15 F6 62 D3 B1 74 9C   0B 80 2B 8A D4 03 84 A0  ...b..t...+.....

]
***
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1.1
5A C281, https-jsse-nio-8443-exec-6, RECV TLSv1.2 ALERT:  warning, close_notify
210, 61, 65, 243, 90, 104, 18, 96, 28, 113, 196, 45, 144, 243, 58, 106, 169, 94, 72, 94, 240, 76, 113, 253, 130, 8, 5, 184, 63, 94, 56, 3, 237, 54, 186, 215, 56, 73, 143, 221, 7, 192, 57, 62, 102, 229, 124, 182, 82, 22, 166, 26, 178, 49, 228, 247, 66, 122, 56, 56, 145, 115, 4, 254, 173, 207, 236, 153, 164, 248, 22, 136, 81, 255, 249, 14, 239, 167, 16, 76, 191, 30, 97, 119, 156, 249, 123, 175, 67, 219, 182, 80, 213, 154, 58, 80, 26, 125, 234, 22, 46, 190, 158, 136, 128, 230, 85, 235, 253, 252, 7, 121, 53, 173, 192, 154, 10, 250 }
 65 CB D3 3B F6 53   4C 70 97 C9 BF 3F C6 61  Z.e..;.SLp...?.a
*** Diffie-Hellman ServerKeyExchange
https-jsse-nio-8443-exec-2, READ: TLSv1 Handshake, length = 512
https-jsse-nio-8443-exec-1, READ: TLSv1.2 Handshake, length = 40
228, 19, 111, 132, 5, 153, 164, 197, 51, 211, 40, 81, 12*** Finished
verify_data:  { *** ClientHello, TLSv1.2
RandomCookie:  DH Modulus:  { 255, 255, 255, 255, 255, 255, 255, 255, 201, 15, 218, 162, 33, 104, 194, 52, 196, 198, 98, 139, 128, 220, 28, 209, 41, 2, 78, 8, 138, 103, 204, 116, 2, 11, 190, 166, 59, 19, 155, 34, 81, 74, 8, 121, 142, 52, 4, 221, 239, 149, 25, 179, 205, 58, 67, 27, 48, 43, 10, 109, 242, 95, 20, 55, 79, 225, 53, 109, 109, 81, 194, 69, 228, 133, 181, 118, 98, 94, 126, 198, 244, 76, 66, 233, 166, 55, 237, 107, 11, 255, 92, 182, 244, 6, 183, 237, 238, 56, 107, 251, 90, 137, 159, 165, 174, 159, 36, 17, 124, 75, 31, 230, 73, 40, 102, 81, 236, 230, 83, 129, 255, 255, 255, 255, 255, 255, 255, 255 }
0DH Base:  { 2 }
Server DH Public Key:  { 225, 196, 9, 203, 159, 36, 70, 130, 168, 179, 12, 214, 43, 37, 14, 184, 16, 20, 34, 219, 146, 253, 158, 33, 160, 120, 135, 180, 43, 238, 142, 126, 36, 52, 94, 43, 92, 95, 237, 49, 47, 215, 84, 215, 14, 2, 27, 175, 213, 51, 70, 8, 201, 149, 240, 185, 233, 245, 136, 127, 10, 169, 220, 37, 118, 74, 127, 187, 232, 33, 189, 146, 233, 207, 195, 33, 253, 253, 142, 255, 173, 36, 104, 218, 71, 145, 83, 227, 131, 161, 114, 147, 204, 167, 94, 16, 138, 48, 160, 196, 62, 163, 91, 149, 192, 13, 119, 174, 17, 195, 246, 173, 41, 105, 89, 10, 173, 117, 66, 142, 117, 109, 170, 166, 222, 236, 75, 24 }
https-jsse-nio-8443-exec-6, closeInboundInternal()
Signature Algorithm SHA256withRSA
Signed with a DSA or RSA public key
0GMT: 915489528 bytes = { 180, 177, 67, 45, 220, 94, 41, 31, 176, 92, 88, 131, 209, 94, 66, 79, 36, 219, 209, 125, 40, 70, 151, 96, 157, 186, 199, 228, 116, 209, 49, 40 }
***
, 62, 227, 215, 145, 41, 40, 31, 84, 13, 129, 91, 164, 94, 141, 87, 230, 255, 230, 207, 161, 249, 85, 134, 235, 51, 51, 15, 120, 225, 102, 48, 88, 37, 12, 39, 198https-jsse-nio-8443-exec-1, WRITE: TLSv1.2 Change Cipher Spec, length = 1
24, 173, 223, 211, 185, 225, 136, 207 }
Session ID:  *** ServerHelloDone
https-jsse-nio-8443-exec-7, WRITE: TLSv1.2 Handshake, length = 1697
SESSION KEYGEN:
PreMaster Secret:
0000: EC 84 E2 AF 4B 91 CF 27   ED FC C7 B8 66 24 4A 45  ....K..'....f$JE
0010: 58 83 59 28 AE DE 2A FC   3F 52 C8 48 B4 86 8C EF  X.Y(..*.?R.H....
0020: 96 1C 7B 8A C8 57 D9 73   9E EE 4D 9A FD 59 C1 46  .....W.s..M..Y.F
0030: 34 67 31 EA CC DA F8 16   4D 7C 23 F6 F2 78 D7 9B  4g1.....M.#..x..
0040: 6D 1B 29 26 CA 2C DC E5   C8 AA E9 3C 9A D3 1C 75  m.)&.,.....<...u
0050: 80 A6 38 9B 54 5D A5 30   00 3F 62 36 6A 1C 25 69  ..8.T].0.?b6j.%i
0060: CE E1 F5 5D 26 62 D5 9F   CB 23 66 C6 DC DB FA D0  ...]&b...#f.....
0070: 9F 04 50 0E F6 6B BE BC   69 54 D4 1A 9A C9 DD B2  ..P..k..iT......
CONNECTION KEYGEN:
Client Nonce:
0000: 38 DB AB 52 AE 54 3F 8E   83 67 62 A6 37 28 FF D0  8..R.T?..gb.7(..
0010: BA 9D B6 5B D5 FE AD 5E   77 37 4A 33 80 10 1B 7F  ...[...^w7J3....
Server Nonce:
0000: 5C 7D 0F F7 BD 58 EC C3   10 14 9B EB D4 5E 9A 6B  \....X.......^.k
0010: E8 89 3F 7B 9C BC E5 08   E1 D8 F6 5F 86 01 C0 1E  ..?........_....
Master Secret:
0000: 35 9F E4 FF 5D CB EE 25   07 42 86 BD 40 41 54 47  5...]..%.B..@ATG
0010: 22 C5 90 43 E2 3F 8D 62   5C EF C8 9B 99 6B 3C A5  "..C.?.b\....k<.
0020: 01 56 09 F5 59 81 B6 69   DD 6F 70 56 27 D1 BB A9  .V..Y..i.opV'...
... no MAC keys used for this cipher
Client write key:
0000: F6 28 16 6D F2 29 14 FD   CB 09 E9 7D 62 1A 90 18  .(.m.)......b...
0010: E5 9E E5 0F 77 CB 78 E5   22 79 25 5D 3E D1 11 74  ....w.x."y%]>..t
Server write key:
0000: 07 51 6B A8 67 B8 A1 01   9B 54 97 E4 79 CC E8 AD  .Qk.g....T..y...
0010: 0C DE 7C EC BB 2B 9B 4C   22 8F D3 B1 F8 19 BA 88  .....+.L".......
Client write IV:
0000: 10 9A BF 5B                                        ...[
Server write IV:
0000: DF 04 1F 6C                                        ...l
https-jsse-nio-8443-exec-6, closeOutboundInternal()
https-jsse-nio-8443-exec-3, READ: TLSv1.2 Handshake, length = 134
1https-jsse-nio-8443-exec-4, READ: TLSv1.2 Change Cipher Spec, length = 1
{92, 125, 15, 247, 242, 122, 131, 156, 80, 117, 217, 241, 196, 233, 43, 6, 10, 175, 226, 239, 82, 201, 190, 246, 213, 22, 177, 21, 148, 39, 43, 131}
*** Finished
Cipher Suites: [Unknown 0x13:0x2, Unknown 0x13:0x3, Unknown 0x13:0x1, Unknown 0x13:0x4, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa9, Unknown 0xc0:0xad, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0xac, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa8, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xc0:0x9d, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9c, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xaa, Unknown 0xc0:0x9f, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9e, TLS_DHE_RSA_WITH_AES_128_CBC_SHA]
Compression Methods:  { 0https-jsse-nio-8443-exec-4, READ: TLSv1.2 Handshake, length = 40
, 231, 92, 16, 188, 236, 216, 59, 248, 130, 122, 175, 64, 140, 220, 165, 235, 54, 101, 249, 188, 70, 141, 22, 138, 208, 12, 114, 179, 69, 43, 173, 235, 228, 226, 133, 56, 228, 5, 248, 151, 65, 240, 46, 149, 66, 30, 101, 199, 252, 57, 235, 185, 122, 71, 60, 156, 67, 80, 118, 190, 192, 214, 11, 134, 120, 199 }
 }
Unsupported extension status_request, data: 01:00:00:00:00
Extension elliptic_curves, curve names: {secp256r1, secp384r1, secp521r1, unknown curve 29, unknown curve 256, unknown curve 257, unknown curve 258, unknown curve 259, unknown curve 260}
Extension ec_point_formats, formats: [uncompressed]
Extension signature_algorithms, signature_algorithms: SHA256withRSA, Unknown (hash:0x8, signature:0x9), Unknown (hash:0x8, signature:0x4), SHA256withECDSA, Unknown (hash:0x8, signature:0x7), SHA384withRSA, Unknown (hash:0x8, signature:0xa), Unknown (hash:0x8, signature:0x5), SHA384withECDSA, SHA512withRSA, Unknown (hash:0x8, signature:0xb), Unknown (hash:0x8, signature:0x6), SHA512withECDSA, SHA1withRSA, SHA1withECDSA
Unsupported extension type_35, data:
Unsupported extension type_51, data: 00:69:00:17:00:41:04:e5:71:64:63:ab:d5:21:e5:e0:8f:5f:01:36:23:4c:11:7c:4e:ec:a0:36:e8:20:6a:19:d7:a6:96:f7:ae:8f:f0:75:6f:84:31:6c:d9:f5:7e:aa:9e:9d:2f:0d:0e:95:2f:00:64:06:ad:89:a8:91:09:cd:05:7d:22:27:04:f8:79:00:1d:00:20:7f:c9:a3:77:64:c6:cc:dc:c5:6c:ba:d9:df:4c:f2:a5:9b:41:52:eb:54:e7:81:e9:7a:f0:87:62:06:2a:9d:73
Unsupported extension type_43, data: 08:03:04:03:03:03:02:03:01
Extension renegotiation_info, renegotiated_connection: <empty>
Extension server_name, server_name: [type=host_name (0), value=localhost]
Unsupported extension type_45, data: 02:01:00
Unsupported extension type_28, data: 40:00
Unsupported extension type_21, data: 00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00
***
%% Initialized:  [Session-17, SSL_NULL_WITH_NULL_NULL]
SESSION KEYGEN:
PreMaster Secret:
0000: 53 15 0E 57 81 D4 3F 72   C8 F3 EB 48 2A CE 87 89  S..W..?r...H*...
0010: F9 F3 27 EC 8A 3F 65 5D   13 EB 50 C4 3F 01 38 B5  ..'..?e]..P.?.8.
0020: FA A6 96 DC 2C FF B5 27   01 89 DF 30 D7 98 B0 FC  ....,..'...0....
0030: 11 6D AF FF 57 B7 70 FA   F2 21 C0 5B 6A 55 A1 05  .m..W.p..!.[jU..
0040: 61 52 CB EE EF 5C 32 F2   58 38 BD F3 8C 89 FB EA  aR...\2.X8......
0050: 15 1E C5 BE A0 verify_data:  { 36, 140, 166, 251, 242, 132, 240, 1, 173, 233, 78, 233 }
***
*** ClientKeyExchange, DH
DH Public key:  { 183, 105, 72, 155, 174, 61, 85, 44, 148, 245, 41, 252, 1, 127, 50, 68, 236, 105, 47, 121, 185, 243, 220, 146, 158, 27, 2, 49, 162, 47, 102, 240, 49, 27, 26, 167, 147, 109, 146, 18, 83, 11, 141, 182, 182, 20, 168, 127, 48, 27, 96, 155, 76, 165, 183, 113, 231, 32, 47, 8, 129, 74, 221, 88, 102, 249, 151, 140, 201, 51, 130, 38, 8, 43, 47, 212, 51, 104, 107, 91, 9, 61, 100, 10, 84, 201, 180, 215, 231, 53, 114, 245, 86, 111, 190, 165, 240, 125, 20, 199, 70, 65, 228, 59, 113, 164, 148, 69, 54, 217, 103, 140, 119, 16, 79, 217, 2, 38, 134, 91, 160, 73, 57, 40, 84, 224, 138, 84 }
0: B2 F5 EF E4 EA EF B4 BB   B6 48 19 3F F6 0B BA 13  .........H.?....
0020: 68 F9 69 0D C5 EA A2 C1   B4 43 73 D3 98 96 E8 8F  h.i......Cs.....
0030: C1 2B 64 5D 8B 46 74 28   A9 01 60 8F 96 6F 13 0E  .+d].Ft(..`..o..
0040: 32 C3 3D A1 D1 4D 15 6E   DE 54 BA C4 1B 4B 16 8A  2.=..M.n.T...K..
0050: 25 79 21 F1 71 ED 5B D2   ED 8C 04 5B F0 5F EE F8  %y!.q.[....[._..
0060: F5 4D ED 8E BC 96 6E 23   A2 A0 8A 72 DE 59 28 50  .M....n#...r.Y(P
0070: AB AE E4 CF 4E 1D F2 B4   58 AE 49 0A 86 6A 79 48  ....N...X.I..jyH
CONNECTION KEYGEN:
Client Nonce:
0000: 35 22 15 5B 46 40 63 FC   FC F3 F7 3D 54 63 E1 16  5".[F@c....=Tc..
0010: C5 D9 E8 CC 53 DB 4D 60   D9 E0 24 10 4B FA 73 D2  ....S.M`..$.K.s.
Server Nonce:
0000: 5C 7D 0F F7 54 39 9A 14   43 A1 7D 68 18 FD F9 AC  \...T9..C..h....
0010: 43 8A 2C A3 98 EE B5 EF   D9 17 31 95 79 0B 8E 7B  C.,.......1.y...
Master Secret:
0000: 9E AD 80 A5 33 76 EF 56   2B 51 34 CC BE 6C 36 D8  ....3v.V+Q4..l6.
0010: 7F C7 F9 A8 E8 4C FA 92   EA E7 CC 30 41 25 FC 41  .....L.....0A%.A
0020: 47 19 CC 12 BD 35 15 A7   F5 77 42 F1 E7 18 96 67  G....5...wB....g
... no MAC keys used for this cipher
Client write key:
0000: A5 AA 55 23 86 74 FF 71   D8 67 F7 BB AF 01 92 D5  ..U#.t.q.g......
0010: 76 FD 91 B8 65 B4 B6 AD   DA 02 02 71 BC 16 4B 8C  v...e......q..K.
Server write key:
0000: 5F 12 55 DA CF 72 DD 2D   C7 64 25 48 44 C6 46 2E  _.U..r.-.d%HD.F.
0010: D6 AE F7 B1 2D 44 1F 8A   F9 64 6E 7F 66 FA 99 87  ....-D...dn.f...
Client write IV:
0000: 2A 27 FD E9                                        *'..
Server write IV:
0000: 61 C5 8A 36                                        a..6
https-jsse-nio-8443-exec-6, SEND TLSv1.2 ALERT:  warning, description = close_notify
https-jsse-nio-8443-exec-1, WRITE: TLSv1.2 Handshake, length = 40
https-jsse-nio-8443-exec-10, READ: TLSv1.2 Change Cipher Spec, length = 1
%% Cached server session: [Session-13, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384]
SESSION KEYGEN:
PreMaster Secret:
0000: 80 23 6D 07 63 6D F6 39   37 EC 32 3E 53 80 58 B9  .#m.cm.97.2>S.X.
0010: 02 F7 2D 63 BB B3 0F AE   F5 FC 5C EA EE 74 B2 F7  ..-c......\..t..
0020: B2 38 2E A5 64 AB D4 37   7A CD EB 50 73 18 33 42  .8..d..7z..Ps.3B
0030: 4A 4F F0 EB 5F E0 BA 4E   39 6D 77 2C D0 F8 4F F9  JO.._..N9mw,..O.
0040: 20 9B DC A7 B3 DC 81 3D   64 2B BF 16 3E 05 5D 58   ......=d+..>.]X
0050: D0 0E 92 19 B3 A2 A1 4B   2C A1 C8 22 85 74 ED F3  .......K,..".t..
0060: C1 3F BF 89 B5 2C 11 4D   65 45 13 E7 3C BF 50 2D  .?...,.MeE..<.P-
0070: CA A2 95 FC D9 97 AE 8D   C9 E0 3B 8B 42 05 84 D3  ..........;.B...
F3 45 CD   DB 63 C6 B4 B5 83 5B 72  ......E..c....CONNECTION KEYGEN:
Client Nonce:
0000: D6 E2 13 49 C4 6F B3 D0   F4 81 A2 6B 9C 5F C9 1B  ...I.o.....k._..
0010: 40 BE 65 B3 AF 98 8A 25   DC 16 55 1A 2A 1E EE 55  @.e....%..U.*..U
Server Nonce:
0000: 5C 7D 0F F8 F0 42 05 0A   79 88 E2 29 AA 25 72 0D  \....B..y..).%r.
0010: 91 4A 2B 03 63 E6 2E CC   7F 30 74 86 2F 60 4B 4D  .J+.c....0t./`KM
Master Secret:
0000: 71 F3 01 EF 7A 0C 11 E8   48 B9 4A 98 6B 47 2E B4  q...z...H.J.kG..
0010: 46 F9 4E 8E 72 DF 20 21   92 8F 30 6C C6 DA 64 E8  F.N.r. !..0l..d.
0020: AB E1 6C 58 8F 18 80 C2   46 25 35 BE E0 A8 16 1E  ..lX....F%5.....
... no MAC keys used for this cipher
Client write key:
0000: 69 23 48 09 91 82 D0 99   7E 80 5A E0 7A 95 68 51  i#H.......Z.z.hQ
0010: 3B C1 A6 5B B9 DB 43 2F   1A 65 EA 70 4A AA 1E FA  ;..[..C/.e.pJ...
Server write key:
0000: C4 BC BF 58 79 DA 05 B0   0E A7 16 A9 A5 A7 03 69  ...Xy..........i
0010: 9F B6 89 68 5E D4 6F 8C   4B 47 99 B2 CB 42 A4 C2  ...h^.o.KG...B..
Client write IV:
0000: 9D 44 7E 23                                        .D.#
Server write IV:
0000: CA 6A E3 F1                                        .j..
Standard ciphersuite chosen: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
%% Negotiating:  [Session-17, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384]
*** Finished
verify_data:  { 121, 67https-jsse-nio-8443-exec-3, READ: TLSv1.2 Change Cipher Spec, length = 1
https-jsse-nio-8443-exec-7, WRITE: TLSv1.2 Application Data, length = 86
https-jsse-nio-8443-exec-3, READ: TLSv1.2 Handshake, length = 40
https-jsse-nio-8443-exec-10, READ: TLSv1.2 Handshake, length = 40
*** Finished
verify_data:  { 19, 161, 222, 140, 146, 193, 131, 64, 167, 92, 160, 139 }
***
*** Finished
verify_data:  { 136, 102, 57, 28, 201, 125, 128, 39, 202, 7, 38, 37 }
***
[r
https-jsse-nio-8443-exec-6, WRITE: TLSv1.2 Alert, length = 26
https-jsse-nio-8443-exec-3, WRITE: TLSv1.2 Change Cipher Spec, length = 1
https-jsse-nio-8443-exec-6, called closeOutbound()
https-jsse-nio-8443-exec-6, closeOutboundInternal()
*** Finished
verify_data:  { 62, 238, 30, 54, 163, 55, 153, 175, 122, 27, 145, 101 }
***
0060: 9C 6A 14 0A 03 95 30 3A   D8 F4 2A 01 9A A9 27 DC  .j....0:..*...'.
0070: 54 8D 9D F4 9E 57 54 A1   16 13 F9 55 E3 3F EF 56  T....WT....U.?.V
https-jsse-nio-8443-exec-7, READ: TLSv1.2 Alert, length = 26
https-jsse-nio-8443-exec-7, RECV TLSv1.2 ALERT:  warning, close_notify
https-jsse-nio-8443-exec-7, closeInboundInternal()
https-jsse-nio-8443-exec-7, closeOutboundInternal()
https-jsse-nio-8443-exec-7, SEND TLSv1.2 ALERT:  warning, description = close_notify
https-jsse-nio-8443-exec-10, WRITE: TLSv1.2 Change Cipher Spec, length = 1
*** ServerHello, TLSv1.2
RandomCookie:  , GMT: 1551699704 bytes = { 237, 165, 54, 136, 116, 84, 64, 44, 254, 37, 99, 96, 129, 127, 198, 252, 227, 6, 35, 178, 51, 129, 26, 221, 216, 247, 225, 139 }
Session ID:  {92, 125, 15, 248, 255, 251, 152, 32, 237, 6, 119, 199, 102, 42, 196, 20, 173, 44, 206, 23, 48, 86, 101, 236, 233, 56, 127, 32, 174, 100, 50, 88}
Cipher Suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
Compression Method: 0
Extension renegotiation_info, renegotiated_connection: <empty>
***
Cipher suite:  TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
*** Certificate chain
chain [0] = [
[
  Version: V3
  Subject: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US
  Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5

  Key:  Sun RSA public key, 2048 bits
  modulus: 21944740401167172627731583459321030363948627215746053925732477915060915436180167456469785746662093119306577380200747716284652995937004530444336851845029170241627465854006145050037178991946925696078563485570896673835545540824265905937881682387179314987285174428010940266412458943894800978345731524307952507729956745301047871771953945124256516782917326981125087548987889540650149121302888872237484100834740328828765018090383963294418357028839734723410564800765871733483849269364796949055153420777966213779145518299141217288017794394762274753999989298548507425930217302947589819396239489846633419099079578249651345685751
  public exponent: 65537
  Validity: [From: Fri May 30 08:43:19 GMT 2014,
               To: Mon May 27 08:43:19 GMT 2024]
  Issuer: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US
  SerialNumber: [    a6ef7a9a 5368eb27]

Certificate Extensions: 3
[1]: ObjectId: 2.5.29.35 Criticality=false
AuthorityKeyIdentifier [
KeyIdentifier [
0000: 78 0D 96 9D FE D3 0B BE   8C C7 E3 EC 67 04 AB 4B  x...........g..K
0010: EA E0 00 29                                        ...)
]
]

[2]: ObjectId: 2.5.29.19 Criticality=false
BasicConstraints:[
  CA:true
  PathLen:2147483647
]

[3]: ObjectId: 2.5.29.14 Criticality=false
SubjectKeyIdentifier [
KeyIdentifier [
0000: 78 0D 96 9D FE D3 0B BE   8C C7 E3 EC 67 04 AB 4B  x...........g..K
0010: EA E0 00 29                                        ...)
]
]

]
  Algorithm: [SHA1withRSA]
  Signature:
0000: 19 16 5A 21 99 21 24 98   3C 0A E8 D8 00 AB 44 24  ..Z!.!$.<.....D$
0010: F2 0C B7 83 D5 9F 96 17   87 E2 1F 1D A3 47 68 C7  .............Gh.
0020: 68 4A CB 56 0E 77 2B E8   1A 9F E7 09 A1 19 77 D0  hJ.V.w+.......w.
0030: 5E CC C1 B3 9A C4 35 3D   CB E0 A5 A6 43 5D A3 26  ^.....5=....C].&
0040: A4 91 8A C1 FA 7B 10 EA   DC C3 C7 1C 47 DC 97 32  ............G..2
0050: C0 37 80 1C F1 42 10 E3   74 17 FA 3E 60 4A B7 59  .7...B..t..>`J.Y
0060: 92 C1 E0 6F BB F1 BB 9F   82 89 B5 83 D5 AE 1E 90  ...o............
0070: 0A 89 8D FB 4C C0 C5 9E   DC C5 8C C6 2F EE D9 B4  ....L......./...
0080: 95 47 27 2E BE 82 31 6F   76 C0 DB 4C C8 0D 3B 7B  .G'...1ov..L..;.
0090: D1 6A BF BD 3B 93 30 04   A2 9E 81 F7 96 28 77 F2  .j..;.0......(w.
00A0: 32 05 68 44 1F B3 30 CE   40 9F 20 F3 B4 2B AA E6  2.hD..0.@. ..+..
00B0: 40 9B FB 7F 34 6E 3A 99   FD F8 28 F1 8C 9B 56 34  @...4n:...(...V4
00C0: 64 AD 4D 56 39 CB 96 18   50 9B 99 43 80 0A 39 A5  d.MV9...P..C..9.
00D0: 13 7A 6E C5 25 E0 95 4A   92 E5 A8 8B EE 03 49 B4  .zn.%..J......I.
00E0: D9 7C 00 E3 F0 3B A7 BA   40 30 CC 89 55 C6 97 93  .....;..@0..U...
00F0: B5 15 F6 62 D3 B1 74 9C   0B 80 2B 8A D4 03 84 A0  ...b..t...+.....

]
***
*** Diffie-Hellman ServerKeyExchange
https-jsse-nio-8443-exec-7, WRITE: TLSv1.2 Alert, length = 26
https-jsse-nio-8443-exec-3, WRITE: TLSv1.2 Handshake, length = 40
Using SSLEngineImpl.
Allow unsafe renegotiation: false
Allow legacy hello messages: true
Is initial handshake: true
Is secure renegotiation: false
https-jsse-nio-8443-exec-7, called closeOutbound()
https-jsse-nio-8443-exec-7, closeOutboundInternal()
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1.1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1.1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1.1
https-jsse-nio-8443-exec-1, READ: TLSv1 Handshake, length = 512
*** ClientHello, TLSv1.2
RandomCookie:  GMT: 1436849403 bytes = { 6, 189, 104, 130, 71, 1, 6, 33, 178, 88, 101, 153, 0, 53, 135, 216, DH Modulus:  { 255, 255, 255, 255, 255, 255, 255, 255, 201, 15, 218, 162, 33, 104, 194, 52, 196, 198, 98, 139, 128, 220, CONNECTION KEYGEN:
Client Nonce:
0000: 26 60 EF C2 89 30 B6 50   50 22 83 B1 B8 80 09 7F  &`...0.PP"......
0010: D3 63 96 81 5C 45 03 AC   60 BF DB C8 73 19 D4 23  .c..\E..`...s..#
Server Nonce:
0000: 5C 7D 0F F7 C6 0B 75 B3   9F 5D 30 E3 0D 9B 24 50  \.....u..]0...$P
0010: 5A 9E 54 DC 59 14 23 90   D8 B4 CB 17 D9 AC 18 3A  Z.T.Y.#........:
Master Secret:
0000: 4C 52 FB 5F 2B 72 5E 35   DE 36 D8 32 C2 BE C1 3C  LR._+r^5.6.2...<
0010: F4 4A 0E 4C E7 DF C7 6F   19 2F 6B 76 A5 F0 A7 19  .J.L...o./kv....
0020: C1 1D 0B 88 4A 66 F4 8D   D3 1A FB AB 34 1B 8F 86  ....Jf......4...
... no MAC keys used for this cipher
Client write key:
0000: 5C 4B 1E 89 AA F3 8A 41   B1 E9 6A E6 18 F1 38 10  \K.....A..j...8.
0010: 49 50 7F 8E 3C 67 CD 6C   13 53 82 3E 83 79 8A 39  IP..<g.l.S.>.y.9
Server write key:
0000: 6E 58 51 19 9F FD 22 51   A5 7B E3 4F 4A 7F C1 F5  nXQ..."Q...OJ...
0010: 78 98 BB 4B C1 E2 CF AA   53 23 42 5F DC 22 9B 65  x..K....S#B_.".e
Client write IV:
0000: 5D 0E 3F F3                                        ].?.
Server write IV:
0000: 39 0A C3 CA                                        9...
*** Finished
184, 88, 90, https-jsse-nio-8443-exec-9, READ: TLSv1.2 Change Cipher Spec, length = 1
verify_data:  { 55, 64, 55, 121, 94, 193, 130, 111, 185, 146, 120, 181 }
***
%% Cached server session: [Session-16, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384]
28, 209, 41, 2, 78, 8, 138, 103, 204, 116, 2, 11, 190, 166, 59, 19, 155, 34, 81, 74, 8, 121, 142, 52, 4, 221, 239, 149, 25, 179, 205, 58, 67, 27, 48, 43, 10, 109, 242, 95, 20, 55, 79, 225, 53, 109, 109, 81, 194, 69, 228, 133, 181, 118, 98, 94, 126, 198, 244, 76, 66, 233, 166, 55, 237, 107, 11, 255, 92, 182, 244, 6, 183, 237, 154, 77, 46, 154, 60, 54, 1, 44, 133, 100, 249, 205 }
Session ID:  {92, 125, 15, 247, 50, 58, 5, 184, 11, 182, 57, 252, 105, 8, 156, 212, 100, 243, 238, 186, 235, 226, 190, 120, 154, 82, 26, 51, 98, 107, 132, 131}
Cipher Suites: [Unknown 0x13:0x2, Unknown 0x13:0x3, Unknown 0x13:0x1, Unknown 0x13:0x4, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa9, Unknown 0xc0:0xad, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0xac, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa8, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xc0:0x9d, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9c, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xaa, Unknown 0xc0:0x9f, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9e, TLS_DHE_RSA_WITH_AES_128_CBC_SHA]
Compression Methods:  { 0 }
Unsupported extension status_request, data: 01:00:00:00:00
Extension elliptic_curves, curve names: {secp256r1, secp384r1, secp521r1, unknown curve 29, unknown curve 256, unknown curve 257, unknown curve 258, unknown curve 259, unknown curve 260}
Extension ec_point_formats, formats: [uncompressed]
Extension signature_algorithms, signature_algorithms: SHA256withRSA, Unknown (hash:0x8, signature:0x9), Unknown (hash:0x8, signature:0x4), SHA256withECDSA, Unknown (hash:0x8, signature:0x7), SHA384withRSA, Unknown (hash:0x8, signature:0xa), Unknown (hash:0x8, signature:0x5), SHA384withECDSA, SHA512withRSA, Unknown (hash:0x8, signature:0xb), Unknown (hash:0x8, signature:0x6), SHA512withECDSA, SHA1withRSA, SHA1withECDSA
Unsupported extension type_35, data:
238, 56, 107, 251, 90, 137, 159, 165, 174, 159, 36, 17, 124, 75, 31, 230, 73, 40, 102, 81, 236, 230, 83, 129, 255, 255, 255, 255, 255, 255, 255, 255 }
DH Base:  { 2 }
Server DH Public Key:  { 176, 192, 181, 32, 179, 39, 86, 3, 132, 12, 91, 93, 129, 76, 31, 96, 93, 138, 140, 190, 60, 233, 248, 132, 28, 194, 113, 168, 99, 92, 165, 234, 205, 142, 217, 187, 41, 225, 204, 31, 195, 6, 77, 247, 231, 176, 72, 55, 62, 52, 14, 170, 113, 228, 100, 66, 238, 16, 32, 27, 253, 27, 92, 215, 88, 36, 204, 148, 84, 109, 26, 178, 89, 10, 4, 255, 40, 200, 153, 89, 198, 42, 47, 219, 232, 250, 34, 255, 13, 93, 132, 9, 237, 181, 185, 245, 36, 95, 43, 124, 138, 204, 229, 70, 128, 80, 170, 82, 251, 6, 235, 217, 109, 82, 50, 186, 107, 224, 112, 104, 152, 179, 250, 122, 195, 90, 100, 152 }
Signature Algorithm SHA256withRSA
Signed with a DSA or RSA public key
*** ServerHelloDone
https-jsse-nio-8443-exec-2, WRITE: TLSv1.2 Handshake, length = 1697
https-jsse-nio-8443-exec-6, WRITE: TLSv1.2 Application Data, length = 84
https-jsse-nio-8443-exec-9, READ: TLSv1.2 Handshake, length = 40
*** Finished
verify_data:  { 83, 228, 84, 181, 59, 83, 24, 38, 238, 91, 52, 225 }
***
https-jsse-nio-8443-exec-9, WRITE: TLSv1.2 Change Cipher Spec, length = 1
*** Finished
verify_data:  { 200, 132, 112, 192, 53, 63, 97, 173, 37, 11, 254, 105 }
***
97, 244, 175, 65, 25, 253, 29 }
***
https-jsse-nio-8443-exec-4, WRITE: TLSv1.2 Change Cipher Spec, length = 1
https-jsse-nio-8443-exec-10, WRITE: TLSv1.2 Handshake, length = 40
%% Cached server session: [Session-11, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384]
Unsupported extension type_51, data: 00:69:00:17:00:41:04:a0:de:20:6a:76:97:05:95:fa:0c:eb:95:cf:63:e1:39:51:2f:fb:47:71:e3:e4:b1:8d:0d:d1:dc:3c:6d:3e:cd:74:4a:82:ac:2b:a3:6d:a3:a4:33:c8:05:70:81:f8:a8:11:36:cc:92:31:1b:a9:aa:95:7c:32:f6:bd:cd:cc:1b:00:1d:00:20:68:e8:86:62:81:e1:81:66:42:5a:4d:61:0f:d3:93:ad:88:c9:82:68:81:e6:45:c0:ab:ef:af:63:45:be:50:42
Unsupported extension type_43, data: 08:03:04:03:03:03:02:03:01
*** Finished
Extension renegotiation_info, renegotiated_connection: <empty>
Extension server_name, server_name: [type=host_name (0), value=localhost]
Unsupported extension type_45, data: 02:01:00
Unsupported extension type_28, data: 40:00
Unsupported extension type_21, data: 00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00
***
https-jsse-nio-8443-exec-7, READ: TLSv1.2 Alert, length = 26
%% Initialized:  [Session-18, SSL_NULL_WITH_NULL_NULL]
Using SSLEngineImpl.
Allow unsafe renegotiation: false
Allow legacy hello messages: true
Is initial handshake: true
Is secure renegotiation: false
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1
https-jsse-nio-8443-exec-9, WRITE: TLSv1.2 Handshake, length = 40
%% Cached server session: [Session-15, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384]
https-jsse-nio-8443-exec-3, READ: TLSv1.2 Handshake, length = 134
verify_data:  { 9, 166, 111, 242, 172, 3, 63, 147, 201, 156, 170, 243 }
***
https-jsse-nio-8443-exec-7, RECV TLSv1.2 ALERT:  warning, close_notify
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1.1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1.1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1.1
Standard ciphersuite chosen: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
%% Negotiating:  [Session-18, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384]
*** ServerHello, TLSv1.2
RandomCookie:  GMT: 1551699704 bytes = { 56, 67, 40, 67, 125, 206, 3, 6, 85, 158, 195, 157, 56, 132, 207, 80, 124, 131, 27, 132, https-jsse-nio-8443-exec-5, READ: TLSv1 Handshake, length = 512
*** ClientHello, TLSv1.2
RandomCookie:  GMT: -1055044290 bytes = { 76, 212, 20, 138, 164, 251, 165, 196, 111, 66, 210, 31, 27, 178, 36, 149, 63, 133, 40, 108, 82, 94, 4, 121, 250, 209, 70, 130 }
Session ID:  {92, 125, 15, 248, 20, 0, 210, 78, 109, 221, 37, 254, 86, 107, 83, 134, 247, 144, 23, 57, 215, 100, 31, 197, 211, 245, 87, 100, 146, 61, 193, 176}
Cipher Suites: [Unknown 0x13:0x2, Unknown 0x13:0x3, Unknown 0x13:0x1, Unknown 0x13:0x4, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa9, Unknown 0xc0:0xad, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0xac, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa8, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xc0:0x9d, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9c, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xaa, Unknown 0xc0:0x9f, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9e, TLS_DHE_RSA_WITH_AES_128_CBC_SHA]
https-jsse-nio-8443-exec-4, WRITE: TLSv1.2 Handshake, length = 40
Compression Methods:  { 0%% Cached server session: [Session-12, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384]
https-jsse-nio-8443-exec-10, WRITE: TLSv1.2 Application Data, length = 85
https-jsse-nio-8443-exec-9, WRITE: TLSv1.2 Application Data, length = 84
201, 230, 69, 80, 44, 121, 220, 191 }
Session ID:  {92, 125, 15, 248, 200, 196, 227, 184, 135, 186, 255, 75, 149, 164, 169, 164, 148, 13, 252, 15, 135, 65, 154, 146, 2, 108, 179, 97, 13, 116, 9, 30}
Cipher Suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
Compression Method: 0
Extension renegotiation_info, renegotiated_connection: <empty>
***
Cipher suite:  TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
*** Certificate chain
https-jsse-nio-8443-exec-7, closeInboundInternal()
https-jsse-nio-8443-exec-7, closeOutboundInternal()
https-jsse-nio-8443-exec-7, SEND TLSv1.2 ALERT:  warning, description = close_notify
*** ClientKeyExchange, DH
 }
Unsupported extension status_request, data: 01:00:00:00:00
Extension elliptic_curves, curve names: {secp256r1, secp384r1, secp521r1, unknown curve 29, unknown curve 256, unknown curve 257, unknown curve 258, unknown curve 259, unknown curve 260}
Extension ec_point_formats, formats: [uncompressed]
Extension signature_algorithms, signature_algorithms: SHA256withRSA, Unknown (hash:0x8, signature:0x9), Unknown (hash:0x8, signature:0x4), SHA256withECDSA, Unknown (hash:0x8, signature:0x7), SHA384withRSA, Unknown (hash:0x8, signature:0xa), Unknown (hash:0x8, signature:0x5), SHA384withECDSA, SHA512withRSA, Unknown (hash:0x8, signature:0xb), Unknown (hash:0x8, signature:0x6), SHA512withECDSA, SHA1withRSA, SHA1withECDSA
Unsupported extension type_35, data:
Unsupported extension type_51, data: 00:69:00:17:00:41:04:95:bd:17:93:e1:a4:d4:12:48:d7:9c:aa:6a:f0:cd:f7:da:60:59:2a:97:10:8f:4b:ce:3b:5e:f3:ac:7f:2b:09:49:7b:52:28:39:e6:40:93:4d:32:d8:54:39:b7:c4:42:83:66:f8:c5:42:aa:7d:fd:ed:02:36:87:2d:51:2b:c6:00:1d:00:20:e4:5a:c9:e5:31:bc:a3:da:d6:3d:0d:3a:e3:10:70:d0:a9:e3:5b:4b:35:a3:9d:b0:6f:2c:ce:f1:e3:93:73:1d
Unsupported extension type_43, data: 08:03:04:03:03:03:02:03:01
Extension renegotiation_info, renegotiated_connection: <empty>
Extension server_name, server_name: [type=host_name (0), value=localhost]
Unsupported extension type_45, data: 02:01:00
Unsupported extension type_28, data: 40:00
Unsupported extension type_21, data: 00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00
***
chain [0] = [
[
  Version: V3
  Subject: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US
  Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5

  Key:  Sun RSA public key, 2048 bits
  modulus: 21944740401167172627731583459321030363948627215746053925732477915060915436180167456469785746662093119306577380200747716284652995937004530444336851845029170241627465854006145050037178991946925696078563485570896673835545540824265905937881682387179314987285174428010940266412458943894800978345731524307952507729956745301047871771953945124256516782917326981125087548987889540650149121302888872237484100834740328828765018090383963294418357028839734723410564800765871733483849269364796949055153420777966213779145518299141217288017794394762274753999989298548507425930217302947589819396239489846633419099079578249651345685751
  public exponent: 65537
  Validity: [From: Fri May 30 08:43:19 GMT 2014,
               To: Mon May 27 08:43:19 GMT 2024]
  Issuer: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US
  SerialNumber: [    a6ef7a9a 5368eb27]

Certificate Extensions: 3
[1]: ObjectId: 2.5.29.35 Criticality=false
AuthorityKeyIdentifier [
KeyIdentifier [
0000: 78 0D 96 9D FE D3 0B BE   8C C7 E3 EC 67 04 AB 4B  x...........g..K
0010: EA E0 00 29                                        ...)
]
]

[2]: ObjectId: 2.5.29.19 Criticality=false
BasicConstraints:[
  CA:true
  PathLen:2147483647
]

[3]: ObjectId: 2.5.29.14 Criticality=false
SubjectKeyIdentifier [
KeyIdentifier [
0000: 78 0D 96 9D FE D3 0B BE   8C C7 E3 EC 67 04 AB 4B  x...........g..K
0010: EA E0 00 29                                        ...)
]
]

]
  Algorithm: [SHA1withRSA]
  Signature:
0000: 19 16 5A 21 99 21 24 98   3C 0A E8 D8 00 AB 44 24  ..Z!.!$.<.....D$
0010: F2 0C B7 83 D5 9F 96 17   87 E2 1F 1D A3 47 68 C7  .............Gh.
0020: 68 4A CB 56 0E 77 2B E8   1A 9F E7 09 A1 19 77 D0  hJ.V.w+.......w.
0030: 5E CC C1 B3 9A C4 35 3D   CB E0 A5 A6 43 5D A3 26  ^.....5=....C].&
0040: A4 91 8A C1 FA 7B 10 EA   DC C3 C7 1C 47 DC 97 32  ............G..2
0050: C0 37 80 1C F1 42 10 E3   74 17 FA 3E 60 4A B7 59  .7...B..t..>`J.Y
0060: 92 C1 E0 6F BB F1 BB 9F   82 89 B5 83 D5 AE 1E 90  ...o............
0070: 0A 89 8D FB 4C C0 C5 9E   DC C5 8C C6 2F EE D9 B4  ....L......./...
0080: 95 47 27 2E BE 82 31 6F   76 C0 DB 4C C8 0D 3B 7B  .G'...1ov..L..;.
0090: D1 6A BF BD 3B 93 30 04   A2 9E 81 F7 96 28 77 F2  .j..;.0......(w.
00A0: 32 05 68 44 1F B3 30 CE   40 9F 20 F3 B4 2B AA E6  2.hD..0.@. ..+..
00B0: 40 9B FB 7F 34 6E 3A 99   FD F8 28 F1 8C 9B 56 34  @...4n:...(...V4
00C0: 64 AD 4D 56 39 CB 96 18   50 9B 99 43 80 0A 39 A5  d.MV9...P..C..9.
00D0: 13 7A 6E C5 25 E0 95 4A   92 E5 A8 8B EE 03 49 B4  .zn.%..J......I.
00E0: D9 7C 00 E3 F0 3B A7 BA   40 30 CC 89 55 C6 97 93  .....;..@0..U...
00F0: B5 15 F6 62 D3 B1 74 9C   0B 80 2B 8A D4 03 84 A0  ...b..t...+.....

]
***
%% Initialized:  [Session-19, SSL_NULL_WITH_NULL_NULL]
https-jsse-nio-8443-exec-8, READ: TLSv1.2 Alert, length = 26
https-jsse-nio-8443-exec-8, RECV TLSv1.2 ALERT:  warning, close_notify
https-jsse-nio-8443-exec-8, closeInboundInternal()
https-jsse-nio-8443-exec-8, closeOutboundInternal()
https-jsse-nio-8443-exec-8, SEND TLSv1.2 ALERT:  warning, description = close_notify
https-jsse-nio-8443-exec-8, WRITE: TLSv1.2 Alert, length = 26
https-jsse-nio-8443-exec-8, called closeOutbound()
https-jsse-nio-8443-exec-8, closeOutboundInternal()
Standard ciphersuite chosen: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
%% Negotiating:  [Session-19, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384]
Using SSLEngineImpl.
*** ServerHello, TLSv1.2
RandomCookie:  GMT: 1551699704 bytes = { 238, 92, 67, 160, 197, 163, 33, 98, 59, 67, 63, 231, 224, 165, 244, 226, 209, 57, 82, 72, 250, 31, 109, 206, 50, 234, 182, 109 }
Session ID:  {92, 125, 15, 248, 181, 154, 125, 230, 61, 129, 18, 26, 1, 153, 235, 181, 199, 235, 208, 79, 250, 126, 110, 194, 87, 247, 95, 187, 134, 2, 227, 105}
Cipher Suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
DH Public key:  { 112, 123, 26, 131, 195, 206, 48, 255, 223, 55, 254, 6, 134, 38, 80, 148, 125, 90, 85, 55, 165, 159, 2, 68, 239, 159, 131, 198, 231, 217, 230, 98, 238, 145, 66, 193, 68, 249, 199, 193, 101, 113, 52, 117, 71, 61, 82, 137, 230, 182, 63, 118, 236, 172, 1, 1, 189, 166, 57, 144, 99, 65, 63, 57, 62, 18, 157, 134, 6, 105, 132, 117, 254, 76, 36, 86, 153, 33, 65, 215, 154, 107, 6, 170, 24, 252, 172, 10, 61, 36, 148, 204, 222, 148, 98, 31, 105, 53, 40, 175, 35, 147, 32, 164, 75, 217, 127, 37, 44, 178, 139, 46, 36, 224, 93, 216, 113, 255, 106, 81, 74, 137, 209, 15, 134, 193, 146, 98 }
Compression Method: 0
https-jsse-nio-8443-exec-6, WRITE: TLSv1.2 Application Data, length = 86
https-jsse-nio-8443-exec-9, READ: TLSv1.2 Alert, length = 26
https-jsse-nio-8443-exec-9, RECV TLSv1.2 ALERT:  warning, close_notify
https-jsse-nio-8443-exec-9, closeInboundInternal()
https-jsse-nio-8443-exec-9, closeOutboundInternal()
https-jsse-nio-8443-exec-9, SEND TLSv1.2 ALERT:  warning, description = close_notify
https-jsse-nio-8443-exec-9, WRITE: TLSv1.2 Alert, length = 26
https-jsse-nio-8443-exec-9, called closeOutbound()
https-jsse-nio-8443-exec-9, closeOutboundInternal()
Using SSLEngineImpl.
Allow unsafe renegotiation: false
Allow legacy hello messages: true
Is initial handshake: true
Is secure renegotiation: false
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1
SESSION KEYGEN:
PreMaster Secret:
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1.1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1.1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1
0000Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1.1
https-jsse-nio-8443-exec-10, READ: TLSv1 Handshake, length = 512
*** ClientHello, TLSv1.2
RandomCookie:  GMT: -1366466477 bytes = { 28, 1, 15, 227, 36, 70, 120, 89, 6, 34, 11, 246, 250, 6, 81, 82, 44, 46, 1, 58, 85, 82, 53, 214, 107, 100, 117, 127 }
Session ID:  {92, 125, 15, 247, 188, 79, 171, 39, 143, 40, 158, 162, 235, 8, 205, 92, 188, 20, 0, 130, 247, 147, 227, 140, 94, 73, 165, 209, 150, 178, 61, 238}
Cipher Suites: [Unknown 0x13:0x2, Unknown 0x13:0x3, Unknown 0x13:0x1, Unknown 0x13:0x4, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa9, Unknown 0xc0:0xad, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0xac, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa8, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xc0:0x9d, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9c, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xaa, Unknown 0xc0:0x9f, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9e, TLS_DHE_RSA_WITH_AES_128_CBC_SHA]
Compression Methods:  { 0 }
Unsupported extension status_request, data: 01:00:00:00:00
Extension elliptic_curves, curve names: {secp256r1, secp384r1, secp521r1, unknown curve 29, unknown curve 256, unknown curve 257, unknown curve 258, unknown curve 259, unknown curve 260}
Extension ec_point_formats, formats: [uncompressed]
Extension signature_algorithms, signature_algorithms: SHA256withRSA, Unknown (hash:0x8, signature:0x9), Unknown (hash:0x8, signature:0x4), SHA256withECDSA, Unknown (hash:0x8, signature:0x7), SHA384withRSA, Unknown (hash:0x8, signature:0xa), Unknown (hash:0x8, signature:0x5), SHA384withECDSA, SHA512withRSA, Unknown (hash:0x8, signature:0xb), Unknown (hash:0x8, signature:0x6), SHA512withECDSA, SHA1withRSA, SHA1withECDSA
Unsupported extension type_35, data:
Unsupported extension type_51, data: 00:69:00:17:00:41:04:8a:6f:a0:15:12:36:a1:67:3e:0e:80:d7:a3:e1:52:f7:e8:c3:15:cb:eb:6c:61:aa:2d:c1:1b:e0:35:0b:c1:e5:40:07:8d:97:34:2f:fa:35:75:c0:6d:44:66:08:1f:ef:b8:f2:a1:25:28:c7:d6:8a:4f:91:bc:0f:f2:60:c6:e7:00:1d:00:20:b6:87:72:41:cc:47:b4:88:2a:dc:4d:65:ba:87:68:bb:66:6e:8d:c9:cf:8f:c1:82:da:b9:91:4d:e9:7d:f7:3a
Unsupported extension type_43, data: 08:03:04:03:03:03:02:03:01
Extension renegotiation_info, renegotiated_connection: <empty>
Extension server_name, server_name: [type=host_name (0), value=localhost]
Unsupported extension type_45, data: 02:01:00
Unsupported extension type_28, data: 40:00
Unsupported extension type_21, data: 00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00
***
%% Initialized:  [Session-20, SSL_NULL_WITH_NULL_NULL]
*** Diffie-Hellman ServerKeyExchange
https-jsse-nio-8443-exec-7, WRITE: TLSv1.2 Alert, length = 26
https-jsse-nio-8443-exec-7, called closeOutbound()
https-jsse-nio-8443-exec-7, closeOutboundInternal()
Allow unsafe renegotiation: false
Allow legacy hello messages: true
Is initial handshake: true
Is secure renegotiation: false
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1.1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1.1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1.1
https-jsse-nio-8443-exec-4, READ: TLSv1 Handshake, length = 512
*** ClientHello, TLSv1.2
RandomCookie:  GMT: -1535037726 bytes = { 58, 45, 98, 33, 14, 204, 193, 137, 93, 175, 216, 234, 83, 249, 183, 99, 227, 138, 194, 124, 125, 175, 126, 117, 92, 92, 16, 32 }
Session ID:  {92, 125, 15, 247, 188, 79, 171, 39, 143, 40, 158, 162, 235, 8, 205, 92, 188, 20, 0, 130, 247, 147, 227, 140, 94, 73, 165, 209, 150, 178, 61, 238}
Cipher Suites: [Unknown 0x13:0x2, Unknown 0x13:0x3, Unknown 0x13:0x1, Unknown 0x13:0x4, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa9, Unknown 0xc0:0xad, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0xac, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa8, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xc0:0x9d, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9c, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xaa, Unknown 0xc0:0x9f, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9e, TLS_DHE_RSA_WITH_AES_128_CBC_SHA]
Compression Methods:  { 0 }
Unsupported extension status_request, data: 01:00:00:00:00
Extension elliptic_curves, curve names: {secp256r1, secp384r1, secp521r1, unknown curve 29, unknown curve 256, unknown curve 257, unknown curve 258, unknown curve 259, unknown curve 260}
Extension ec_point_formats, formats: [uncompressed]
Extension signature_algorithms, signature_algorithms: SHA256withRSA, Unknown (hash:0x8, signature:0x9), Unknown (hash:0x8, signature:0x4), SHA256withECDSA, Unknown (hash:0x8, signature:0x7), SHA384withRSA, Unknown (hash:0x8, signature:0xa), Unknown (hash:0x8, signature:0x5), SHA384withECDSA, SHA512withRSA, Unknown (hash:0x8, signature:0xb), Unknown (hash:0x8, signature:0x6), SHA512withECDSA, SHA1withRSA, SHA1withECDSA
Unsupported extension type_35, data:
Unsupported extension type_51, data: 00:69:00:17:00:41:04:b7:b7:1a:06:5c:49:6c:5f:4d:54:8d:35:27:a0:bd:2c:3b:a5:8a:ec:7d:e3:6f:4c:dc:e1:6a:99:10:a5:7c:53:1a:da:c9:7d:a7:5a:94:94:7c:07:e4:c8:f7:93:84:0c:7b:32:92:ab:e7:22:34:a8:64:69:12:07:6b:33:31:8e:00:1d:00:20:21:9d:85:fc:3d:79:67:77:23:1c:c1:c8:1a:f1:e3:43:ed:59:fb:6f:65:ab:5f:96:fa:c6:21:69:ad:ed:8d:03
Unsupported extension type_43, data: 08:03:04:03:03:03:02:03:01
Extension renegotiation_info, renegotiated_connection: <empty>
Extension server_name, server_name: [type=host_name (0), value=localhost]
Unsupported extension type_45, data: 02:01:00
Unsupported extension type_28, data: 40:00
Unsupported extension type_21, data: 00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00
***
DH Modulus:  { 255, 255, 255, 255, 255, 255, 255, 255, 201, 15, 218, 162, 33, 104, 194, 52, 196, 198, 98, 139, 128, 220, 28, 209, 41, 2, 78, 8, 138, 103, 204, 116, 2, 11, 190, 166, 59, 19, 155, 34, 81, 74, 8, 121, 142, 52, 4, 221, 239, 149, 25, 179, 205, 58, 67, 27, 48, 43, 10, 109, 242, 95, 20, 55, 79, 225, 53, 109, 109, 81, 194, 69, 228, 133, 181, 118, 98, 94, 126, 198, 244, 76, 66, 233, 166, 55, 237, 107, 11, 255, 92, 182, 244, 6, 183, 237, 238, 56, 107, 251, 90, 137, 159, 165, 174, 159, 36, 17, 124, 75, 31, 230, 73, 40, 102, 81, 236, 230, 83, 129, 255, 255, 255, 255, 255, 255, 255, 255 }
DH Base:  { 2https-jsse-nio-8443-exec-8, READ: TLSv1.2 Alert, length = 26
: B3 93 C9 FC 01 81 D2 68   91 77 1E https-jsse-nio-8443-exec-8, RECV TLSv1.2 ALERT:  warning, close_notify
Extension renegotiation_info, renegotiated_connection: <empty>
***
Cipher suite:  TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
https-jsse-nio-8443-exec-8, closeInboundInternal()
Fhttps-jsse-nio-8443-exec-8, closeOutboundInternal()
 }
Server DH Public Key:  { 134, 76, 89, 146, 62, 231, 219, 65, 43, 192, 244, 206, 208, 110, 162, 51, 204, 102, 162, 56, 100, 218, 51, 186, 175, 236, 211, 137, 122, 212, 86, 150, 63, 94, 43, 174, 17, 227, 123, 43, 91, 73, 66, 108, 228, 152, 73, 149, 218, 39, 101, 122, 97, 113, 238, 89, 111, 195, 179, 131, 84, 113, 57, 61, 168, 34, 240, 170, 242, 237, 212, 124, 168, 218, 108, 72, 208, 194, 42, 111, 72, 204, 198, 242, 206, 57, 106, 141, 118, 46, 253, 244, 246, 240, 83, 54, 157, 204, 224, 172, 30, 55, 65, 203, 142, 119, 48, 6, 246, 48, 219, 49, 193, 58, 172, 30, 154, 124, 17, 30, 220, 79, 234, 15, 115, 30, 132, 95 }
%% Initialized:  [Session-21, SSL_NULL_WITH_NULL_NULL]
Standard ciphersuite chosen: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
Using SSLEngineImpl.
%% Negotiating:  [Session-20, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384]
*** ServerHello, TLSv1.2
RandomCookie:  Signature Algorithm SHA256withRSA
Signed with a DSA or RSA public key
https-jsse-nio-8443-exec-8, SEND TLSv1.2 ALERT:  warning, description = close_notify
*** Certificate chain
https-jsse-nio-8443-exec-8, WRITE: TLSv1.2 Alert, length = 26
E CA 22 89 EF  .......h.w..."..
0010: 59 0F E9 0C 3E D4 CF A4   C4 FA 12 EA 83 8D 4B B8  Y...>.........K.
0020: 0E 06 97 10 E6 02 BB 1B   63 42 06 52 F2 D5 83 49  ........cB.R...I
0030: E9 2F 20 B3 F1 EA 66 0C   59 0A C4 92 1F 80 36 41  ./ ...f.Y.....6A
0040: 2D FC 0F 1E C7 B0 54 7C   CE 99 B4 5D F9 37 E9 CA  -.....T....].7..
0050: 5E 1A A9 C9 76 6A E4 E8   82 5F 9E 1B 4A 2D 5A 37  ^...vj..._..J-Z7
0060: 35 47 17 DF 3F 30 FA 9D   7E 25 BF B5 08 1B 38 27  5G..?0...%....8'
0070: 79 71 3E 91 09 B9 D9 C6   6A 08 74 8C A1 AF C6 EB  yq>.....j.t.....
CONNECTION KEYGEN:
Client Nonce:
0000: 37 91 43 F8 B4 B1 43 2D   DC 5E 29 1F B0 5C 58 83  7.C...C-.^)..\X.
0010: D1 5E 42 4F 24 DB D1 7D   18 AD DF D3 B9 E1 88 CF  .^BO$...........
Server Nonce:
0000: 5C 7D 0F F8 ED A5 36 88   74 54 40 2C FE 25 63 60  \.....6.tT@,.%c`
0010: 81 7F C6 FC E3 06 23 B2   33 81 1A DD D8 F7 E1 8B  ......#.3.......
Master Secret:
0000: 9F B3 47 D8 DE 50 D8 6A   15 86 50 C7 27 92 2C 36  ..G..P.j..P.'.,6
0010: 52 67 AE 73 4C 2D E6 AA   9F 09 05 47 4C DF D6 58  Rg.sL-.....GL..X
0020: 27 3E 77 BF 29 89 8C BB   7F CF 10 61 57 3E EC F6  '>w.)......aW>..
... no MAC keys used for this cipher
Client write key:
0000: 27 AA CD F2 E5 AA FD 52   22 77 98 F9 EF 7E 69 5C  '......R"w....i\
0010: D7 C8 AF 69 7D 68 95 4B   A6 56 45 A3 CE 64 37 BB  ...i.h.K.VE..d7.
Server write key:
0000: 7D DD FB FC B8 54 0F E0   81 DC 4B B8 45 DC 7F 43  .....T....K.E..C
0010: C5 79 31 E9 67 F2 23 B7   40 45 61 FD A9 B0 A7 01  .y1.g.#.@Ea.....
Client write IV:
0000: 06 BF 04 46                                        ...F
Server write IV:
0000: C3 97 9D 58                                        ...X
*** ServerHelloDone
https-jsse-nio-8443-exec-1, WRITE: TLSv1.2 Handshake, length = 1697
https-jsse-nio-8443-exec-3, READ: TLSv1.2 Change Cipher Spec, length = 1
https-jsse-nio-8443-exec-3, READ: TLSv1.2 Handshake, length = 40
*** Finished
verify_data:  { 62, 129, 75, 11, 229, 7, 74, 111, 149, 76, 228, 185 }
***
https-jsse-nio-8443-exec-3, WRITE: TLSv1.2 Change Cipher Spec, length = 1
*** Finished
verify_data:  { 133, 85, 179, 7, 243, 75, 31, 62, 24, 234, 164, 216 }
***
GMT: 1551699704 Allow unsafe renegotiation: false
Allow legacy hello messages: true
Is initial handshake: true
Is secure renegotiation: false
bytes = { 173, 49, 112, 221, 129, 212, 44, 252, 73, 74, 53, 117, 79, 247, 151, 138Standard ciphersuite chosen: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
chain [0] = [
[
  Version: V3
  Subject: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US
  Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5

  Key:  Sun RSA public key, 2048 bits
  modulus: 21944740401167172627731583459321030363948627215746053925732477915060915436180167456469785746662093119306577380200747716284652995937004530444336851845029170241627465854006145050037178991946925696078563485570896673835545540824265905937881682387179314987285174428010940266412458943894800978345731524307952507729956745301047871771953945124256516782917326981125087548987889540650149121302888872237484100834740328828765018090383963294418357028839734723410564800765871733483849269364796949055153420777966213779145518299141217288017794394762274753999989298548507425930217302947589819396239489846633419099079578249651345685751
  public exponent: 65537
  Validity: [From: Fri May 30 08:43:19 GMT 2014,
               To: Mon May 27 08:43:19 GMT 2024]
  Issuer: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US
  SerialNumber: [    a6ef7a9a 5368eb27]

Certificate Extensions: 3
[1]: ObjectId: 2.5.29.35 Criticality=false
AuthorityKeyIdentifier [
KeyIdentifier [
0000: 78 0D 96 9D FE D3 0B BE   8C C7 E3 EC 67 04 AB 4B  x...........g..K
0010: EA E0 00 29                                        ...)
]
]

[2]: ObjectId: 2.5.29.19 Criticality=false
BasicConstraints:[
  CA:true
  PathLen:2147483647
]

[3]: ObjectId: 2.5.29.14 Criticality=false
SubjectKeyIdentifier [
KeyIdentifier [
0000: 78 0D 96 9D FE D3 0B BE   8C C7 E3 EC 67 04 AB 4B  x...........g..K
0010: EA E0 00 29                                        ...)
]
]

]
  Algorithm: [SHA1withRSA]
  Signature:
0000: 19 16 5A 21 99 21 24 98   3C 0A E8 D8 00 AB 44 24  ..Z!.!$.<.....D$
0010: F2 0C B7 83 D5 9F 96 17   87 E2 1F 1D A3 47 68 C7  .............Gh.
0020: 68 4A CB 56 0E 77 2B E8   1A 9F E7 09 A1 19 77 D0  hJ.V.w+.......w.
0030: 5E CC C1 B3 9A C4 35 3D   CB E0 A5 A6 43 5D A3 26  ^.....5=....C].&
0040: A4 91 8A C1 FA 7B 10 EA   DC C3 C7 1C 47 DC 97 32  ............G..2
0050: C0 37 80 1C F1 42 10 E3   74 17 FA 3E 60 4A B7 59  .7...B..t..>`J.Y
0060: 92 C1 E0 6F BB F1 BB 9F   82 89 B5 83 D5 AE 1E 90  ...o............
0070: 0A 89 8D FB 4C C0 C5 9E   DC C5 8C C6 2F EE D9 B4  ....L......./...
0080: 95 47 27 2E BE 82 31 6F   76 C0 DB 4C C8 0D 3B 7B  .G'...1ov..L..;.
0090: D1 6A BF BD 3B 93 30 04   A2 9E 81 F7 96 28 77 F2  .j..;.0......(w.
00A0: 32 05 68 44 1F B3 30 CE   40 9F 20 F3 B4 2B AA E6  2.hD..0.@. ..+..
00B0: 40 9B FB 7F 34 6E 3A 99   FD F8 28 F1 8C 9B 56 34  @...4n:...(...V4
00C0: 64 AD 4D 56 39 CB 96 18   50 9B 99 43 80 0A 39 A5  d.MV9...P..C..9.
00D0: 13 7A 6E C5 25 E0 95 4A   92 E5 A8 8B EE 03 49 B4  .zn.%..J......I.
00E0: D9 7C 00 E3 F0 3B A7 BA   40 30 CC 89 55 C6 97 93  .....;..@0..U...
00F0: B5 15 F6 62 D3 B1 74 9C   0B 80 2B 8A D4 03 84 A0  ...b..t...+.....

]
***
https-jsse-nio-8443-exec-8, called closeOutbound()
https-jsse-nio-8443-exec-8, closeOutboundInternal()
%% Negotiating:  [Session-21, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384]
*** ServerHello, TLSv1.2
RandomCookie:  GMT: 1551699704 bytes = { 109, 234, 190, 192, 92, 252, 194, 226, 139, 199, 97, 180, 252, 245, 38, 245, 60, 162, 4, 234, 76, 47, 39, 186, 171, 29, 139, 29 }
Session ID:  {92, 125, 15, 248, 93, 114, 159, 202, 158, 231, 130, 170, 240, 207, 79, 78, 139, 64, 227, 229, 102, 241, 205, 156, 132, 129, 45, 27, 166, 93, 182, 26}
Cipher Suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
Compression Method: 0
Extension renegotiation_info, renegotiated_connection: <empty>
***
Cipher suite:  TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
*** Certificate chain
chain [0] = [
[
  Version: V3
  Subject: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US
  Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5

  Key:  Sun RSA public key, 2048 bits
  modulus: 21944740401167172627731583459321030363948627215746053925732477915060915436180167456469785746662093119306577380200747716284652995937004530444336851845029170241627465854006145050037178991946925696078563485570896673835545540824265905937881682387179314987285174428010940266412458943894800978345731524307952507729956745301047871771953945124256516782917326981125087548987889540650149121302888872237484100834740328828765018090383963294418357028839734723410564800765871733483849269364796949055153420777966213779145518299141217288017794394762274753999989298548507425930217302947589819396239489846633419099079578249651345685751
  public exponent: 65537
  Validity: [From: Fri May 30 08:43:19 GMT 2014,
               To: Mon May 27 08:43:19 GMT 2024]
  Issuer: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US
  SerialNumber: [    a6ef7a9a 5368eb27]

Certificate Extensions: 3
[1]: ObjectId: 2.5.29.35 Criticality=false
AuthorityKeyIdentifier [
KeyIdentifier [
0000: 78 0D 96 9D FE D3 0B BE   8C C7 E3 EC 67 04 AB 4B  x...........g..K
0010: EA E0 00 29                                        ...)
]
]

[2]: ObjectId: 2.5.29.19 Criticality=false
BasicConstraints:[
  CA:true
  PathLen:2147483647
]

[3]: ObjectId: 2.5.29.14 Criticality=false
SubjectKeyIdentifier [
KeyIdentifier [
0000: 78 0D 96 9D FE D3 0B BE   8C C7 E3 EC 67 04 AB 4B  x...........g..K
0010: EA E0 00 29                                        ...)
]
]

]
  Algorithm: [SHA1withRSA]
  Signature:
0000: 19 16 5A 21 99 21 24 98   3C 0A E8 D8 00 AB 44 24  ..Z!.!$.<.....D$
0010: F2 0C B7 83 D5 9F 96 17   87 E2 1F 1D A3 47 68 C7  .............Gh.
0020: 68 4A CB 56 0E 77 2B E8   1A 9F E7 09 A1 19 77 D0  hJ.V.w+.......w.
0030: 5E CC C1 B3 9A C4 35 3D   CB E0 A5 A6 43 5D A3 26  ^.....5=....C].&
0040: A4 91 8A C1 FA 7B 10 EA   DC C3 C7 1C 47 DC 97 32  ............G..2
0050: C0 37 80 1C F1 42 10 E3   74 17 FA 3E 60 4A B7 59  .7...B..t..>`J.Y
0060: 92 C1 E0 6F BB F1 BB 9F   82 89 B5 83 D5 AE 1E 90  ...o............
0070: 0A 89 8D FB 4C C0 C5 9E   DC C5 8C C6 2F EE D9 B4  ....L......./...
0080: 95 47 27 2E BE 82 31 6F   76 C0 DB 4C C8 0D 3B 7B  .G'...1ov..L..;.
0090: D1 6A BF BD 3B 93 30 04   A2 9E 81 F7 96 28 77 F2  .j..;.0......(w.
00A0: 32 05 68 44 1F B3 30 CE   40 9F 20 F3 B4 2B AA E6  2.hD..0.@. ..+..
00B0: 40 9B FB 7F 34 6E 3A 99   FD F8 28 F1 8C 9B 56 34  @...4n:...(...V4
00C0: 64 AD 4D 56 39 CB 96 18   50 9B 99 43 80 0A 39 A5  d.MV9...P..C..9.
00D0: 13 7A 6E C5 25 E0 95 4A   92 E5 A8 8B EE 03 49 B4  .zn.%..J......I.
00E0: D9 7C 00 E3 F0 3B A7 BA   40 30 CC 89 55 C6 97 93  .....;..@0..U...
00F0: B5 15 F6 62 D3 B1 74 9C   0B 80 2B 8A D4 03 84 A0  ...b..t...+.....

]
***
, 153, 210, 203, 13, 184, 251, 168, 55, 87, 56, 147, 119 }
Session ID:  https-jsse-nio-8443-exec-3, WRITE: TLSv1.2 Handshake, length = 40
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1
https-jsse-nio-8443-exec-6, READ: TLSv1.2 Handshake, length = 134
%% Cached server session: [Session-17, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384]
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1.1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1.1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1.1
https-jsse-nio-8443-exec-2, READ: TLSv1 Handshake, length = 512
*** ClientHello, TLSv1.2
RandomCookie:  GMT: -1000894146 bytes = { 254, 153, 12, 25, 187, 185, 72, 106, 24, 52, 177, 89, 57, 204, 113, 28, 171, 221, 60, 129, 76, 100, 152, 52, 187, 181, 67, 9 }
Session ID:  {92, 125, 15, 248, 109, 55, 116, 167, 27, 228, 106, 188, 55, 81, 119, 10, 225, 231, 251, 111, 24, 107, 135, 82, 189, 63, 153, 62, 46, 5, 125, 15}
{92, 125, 15, 247, 188, 79, 171, 39, 143, 40, 158, 162, 235, 8, 205, 92, 188, 20, 0, 130, 247, 147, 227, 140, 94, 73, 165, 209, 150, 178, 61, 238}
*** Diffie-Hellman ServerKeyExchange
Cipher Suites: [Unknown 0x13:0x2, Unknown 0x13:0x3, Unknown 0x13:0x1, Unknown 0x13:0x4, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa9, Unknown 0xc0:0xad, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0xac, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa8, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xc0:0x9d, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9c, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xaa, Unknown 0xc0:0x9f, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9e, TLS_DHE_RSA_WITH_AES_128_CBC_SHA]
Compression Methods:  { 0 }
Cipher Suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
Compression Method: 0
*** Diffie-Hellman ServerKeyExchange
DH Modulus:  { 255, 255, 255, 255, 255, 255, 255, 255, 201, 15, 218, 162, 33, 104, 194, 52, 196, 198, 98, 139, 128, 220, 28, 209, 41, 2, 78, 8, 138, 103, 204, 116, 2, 11, 190, 166, 59, 19, 155, 34, 81, 74, 8, 121, 142, 52, 4, 221, 239, 149, 25, 179, 205, 58, 67, 27, 48, 43, 10, 109, 242, 95, 20, 55, 79, 225, 53, 109, 109https-jsse-nio-8443-exec-1, WRITE: TLSv1.2 Application Data, length = 86
*** ClientKeyExchange, DH
DH Public key:  { 253, 20, 3, 219, 252, 53, 50, 189, 187, 201, 139, 74, 225, 255, 134, 23, 210, 216, 43, 154, 25, 143, 20, 122, 211, 219, 155, 33, 157, 238, 237, 29, 5, 10, 108, 141, 161, 172, 244, 133, 235, 69, 0, 132, 115, 112, 174, 154, 119, 102, 28, 127, 253, 85, 38, 229, 166, 230, 139, 195, 109, 178, 46, 77, 135, 157, 82, 122, 189, 143, 145, 254, 167, 180, 227, 36, 13, 16, 21, 2, 199, 157, 163, 119, 176, 251, 226, 22, 34, 56, 103, 96, 37, 107, 75, 164, 183, 249, 167, 119, 36, 214, 139, 13, 163, 60, 92, 149, 49, 125, 33, 89, 127, 37, 195, 185, 63, 50, 184, 239, 53, 127, 161, 102, 194, 227, 87, 246 }
https-jsse-nio-8443-exec-8, READ: TLSv1.2 Alert, length = 26
https-jsse-nio-8443-exec-8, RECV TLSv1.2 ALERT:  warning, close_notify
https-jsse-nio-8443-exec-8, closeInboundInternal()
https-jsse-nio-8443-exec-8, closeOutboundInternal()
https-jsse-nio-8443-exec-8, SEND TLSv1.2 ALERT:  warning, description = close_notify
https-jsse-nio-8443-exec-8, WRITE: TLSv1.2 Alert, length = 26
https-jsse-nio-8443-exec-8, called closeOutbound()
https-jsse-nio-8443-exec-8, closeOutboundInternal()
SESSION KEYGEN:
PreMaster Secret:
0000: 6C 5D D5 D5 FC B7 D1 F1   EC C1 E5 A5 57 05 1F 9C  l]..........W...
0010: 09 60 EC 65 95 90 37 B7   F6 A1 35 BF 1E F5 04 9A  .`.e..7...5.....
0020: 1B 1F C4 00 85 11 4C 36   D1 F2 FA A7 BE 31 FC 33  ......L6.....1.3
0030: 32 89 85 61 5F C8 CC 3E   60 60 8D 0F 44 77 B7 48  2..a_..>``..Dw.H
0040: 1A 5F 0B 98 78 8C 60 AE   56 60 50 E9 DF 93 6B 36  ._..x.`.V`P...k6
0050: 0F B4 56 00 F9 64 90 AB   0F 60 B2 09 99 32 BE 6A  ..V..d...`...2.j
0060: 78 50 06 8C 4E 72 7F E7   DB 29 92 65 BE 22 99 ED  xP..Nr...).e."..
0070: A9 3C 20 3C C3 9D 74 A7   A7 F8 F7 F0 B6 3E 78 BE  .< <..t......>x.
CONNECTION KEYGEN:
Client Nonce:
0000: 56 A5 95 FB 06 BD 68 82   47 01 06 21 B2 58 65 99  V.....h.G..!.Xe.
0010: 00 35 87 D8 9A 4D 2E 9A   3C 36 01 2C 85 64 F9 CD  .5...M..<6.,.d..
Server Nonce:
0000: 5C 7D 0F F8 38 43 28 43   7D CE 03 06 55 9E C3 9D  \...8C(C....U...
0010: 38 84 CF 50 7C 83 1B 84   C9 E6 45 50 2C 79 DC BF  8..P......EP,y..
Master Secret:
0000: E1 69 CD B4 49 22 EF 7F   B5 32 4A 21 46 94 00 8A  .i..I"...2J!F...
0010: 53 B0 78 96 50 23 1A AC   02 A8 4F C1 0F 13 0F 47  S.x.P#....O....G
0020: EC 31 1F A3 77 C3 F9 E7   9B 15 4E AD D5 03 EF CE  .1..w.....N.....
... no MAC keys used for this cipher
Client write key:
0000: FB B3 C9 94 05 76 C1 07   A2 56 44 85 D4 A3 0B FC  .....v...VD.....
0010: 95 6B C7 16 37 D3 85 19   B7 5B D6 02 9F 81 79 FE  .k..7....[....y.
Server write key:
0000: 6F A7 83 37 F8 24 A8 64   B4 5D 89 E6 4B D3 CD 67  o..7.$.d.]..K..g
0010: EE D5 EC 0D 66 EA F0 8A   F8 ED 5A AD 7A 06 F5 CE  ....f.....Z.z...
Client write IV:
0000: 10 BE 5B D2                                        ..[.
Server write IV:
0000: 90 42 5B 0C                                        .B[.
, 81, 194, 69, 228, 133, 181, 118, 98Using SSLEngineImpl.
Allow unsafe renegotiation: false
Allow legacy hello messages: true
Is initial handshake: true
Is secure renegotiation: false
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1.1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1.1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1.1
https-jsse-nio-8443-exec-3, READ: TLSv1 Handshake, length = 512
*** ClientHello, TLSv1.2
RandomCookie:  GMT: -1196724475 bytes = { 61, 95, 32, 72, 25, 236, 173, 125, 129, 111, 28, 117, 219, 234, 84, 151, 138, 176, 133, 115, 207, 76, 199, 69, 93, 115, 205, 68 }
Session ID:  {92, 125, 15, 248, 255, 251, 152, 32, 237, 6, 119, 199, 102, 42, 196, 20, 173, 44, 206, 23, 48, 86, 101, 236, 233, 56, 127, 32, 174, 100, 50, 88}
Cipher Suites: [Unknown 0x13:0x2, Unknown 0x13:0x3, Unknown 0x13:0x1, Unknown 0x13:0x4, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa9, Unknown 0xc0:0xad, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0xac, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa8, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xc0:0x9d, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9c, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xaa, Unknown 0xc0:0x9f, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9e, TLS_DHE_RSA_WITH_AES_128_CBC_SHA]
Extension renegotiation_info, renegotiated_connection: <empty>
***
Unsupported extension status_request, data: 01:00:00:00:00
DH Modulus:  { 255, 255, 255, 255, 255, 255, 255, 255, 201, 15, 218, 162, 33, 104, 194, 52, 196, 198, 98, 139, 128, 220, 28, 209, 41, 2, 78, 8, 138, 103, 204, 116, 2, 11, 190, 166, 59, 19, 155, 34, 81, 74, 8, 121, 142, 52, 4, 221, 239, 149, 25, 179, 205, 58, 67, 27, 48, 43, 10, 109, 242, 95, 20, 55, 79, 225, 53, 109, 109, 81, 194, 69, 228, 133, 181, 118, 98, 94, 126, 198, 244, 76, 66, 233, 166, 55, 237, 107, 11, 255, 92, 182, 244, 6, 183, 237, 238, 56, 107, 251, 90, 137, 159, 165, 174, 159, 36, 17, 124, 75, 31, 230, 73, 40, 102, 81, 236, 230, 83, 129, 255, 255, 255, 255, 255, 255, 255, 255 }
DH Base:  { 2 }
Server DH Public Key:  { 103, 42, 152, 168, 64, 109, 65, 217, 20, 106, 94, 196, 64, 251, 54, 130, 179, 224, 105, 20, 235, 124, 248, 140, 89, 165, 30, 195, 167, 54, 246, 154, 43, 16, 169, 0, 255, 130, 152, 191, 88, 75, 115, 176, 27, 156, 143, 100, 109, 21, 133, 184, 20, 154, 208, 50, 115, 76, 128, 186, 7, 72, 77, 217, 191, 152, 72, 74, 7, 165, 39, 226, 39, 21, 17, 195, 255, 2, 249, 191, 89, 245, 66, 162, 179, 156, 231, 47, 209, 196, 16, 213, 16, 7, 62, 196, 80, 195, 167, 138, 2, 159, 76, 122, 48, 125, 131, 137, 172, 11, 211, 146, 56, 180, 39, 137, 214, 78, 218, 198, 184, 86, 100, 184, 155, 208, 211, 36 }
Signature Algorithm SHA256withRSA
Signed with a DSA or RSA public key
*** ServerHelloDone
https-jsse-nio-8443-exec-5, WRITE: TLSv1.2 Handshake, length = 1697
Cipher suite:  TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
*** Certificate chain
chain [0] = [
[
  Version: V3
  Subject: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US
  Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5

  Key:  Sun RSA public key, 2048 bits
  modulus: 21944740401167172627731583459321030363948627215746053925732477915060915436180167456469785746662093119306577380200747716284652995937004530444336851845029170241627465854006145050037178991946925696078563485570896673835545540824265905937881682387179314987285174428010940266412458943894800978345731524307952507729956745301047871771953945124256516782917326981125087548987889540650149121302888872237484100834740328828765018090383963294418357028839734723410564800765871733483849269364796949055153420777966213779145518299141217288017794394762274753999989298548507425930217302947589819396239489846633419099079578249651345685751
  public exponent: 65537
  Validity: [From: Fri May 30 08:43:19 GMT 2014,
               To: Mon May 27 08:43:19 GMT 2024]
  Issuer: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US
  SerialNumber: [    a6ef7a9a 5368eb27]

Certificate Extensions: 3
[1]: ObjectId: 2.5.29.35 Criticality=false
AuthorityKeyIdentifier [
KeyIdentifier [
0000: 78 0D 96 9D FE D3 0B BE   8C C7 E3 EC 67 04 AB 4B  x...........g..K
0010: EA E0 00 29                                        ...)
]
]

[2]: ObjectId: 2.5.29.19 Criticality=false
BasicConstraints:[
  CA:true
  PathLen:2147483647
]

[3]: ObjectId: 2.5.29.14 Criticality=false
SubjectKeyIdentifier [
KeyIdentifier [
0000: 78 0D 96 9D FE D3 0B BE   8C C7 E3 EC 67 04 AB 4B  x...........g..K
0010: EA E0 00 29                                        ...)
]
]

]
  Algorithm: [SHA1withRSA]
  Signature:
0000: 19 16 5A 21 99 21 24 98   3C 0A E8 D8 00 AB 44 24  ..Z!.!$.<.....D$
0010: F2 0C B7 83 D5 9F 96 17   87 E2 1F 1D A3 47 68 C7  .............Gh.
0020: 68 4A CB 56 0E 77 2B E8   1A 9F E7 09 A1 19 77 D0  hJ.V.w+.......w.
0030: 5E CC C1 B3 9A C4 35 3D   CB E0 A5 A6 43 5D A3 26  ^.....5=....C].&
0040: A4 91 8A C1 FA 7B 10 EA   DC C3 C7 1C 47 DC 97 32  ............G..2
0050: C0 37 80 1C F1 42 10 E3   74 17 FA 3E 60 4A B7 59  .7...B..t..>`J.Y
0060: 92 C1 E0 6F BB F1 BB 9F   82 89 B5 83 D5 AE 1E 90  ...o............
0070: 0A 89 8D FB 4C C0 C5 9E   DC C5 8C C6 2F EE D9 B4  ....L......./...
0080: 95 47 27 2E BE 82 31 6F   76 C0 DB 4C C8 0D 3B 7B  .G'...1ov..L..;.
0090: D1 6A BF BD 3B 93 30 04   A2 9E 81 F7 96 28 77 F2  .j..;.0......(w.
00A0: 32 05 68 44 1F B3 30 CE   40 9F 20 F3 B4 2B AA E6  2.hD..0.@. ..+..
00B0: 40 9B FB 7F 34 6E 3A 99   FD F8 28 F1 8C 9B 56 34  @...4n:...(...V4
00C0: 64 AD 4D 56 39 CB 96 18   50 9B 99 43 80 0A 39 A5  d.MV9...P..C..9.
00D0: 13 7A 6E C5 25 E0 95 4A   92 E5 A8 8B EE 03 49 B4  .zn.%..J......I.
00E0: D9 7C 00 E3 F0 3B A7 BA   40 30 CC 89 55 C6 97 93  .....;..@0..U...
00F0: B5 15 F6 62 D3 B1 74 9C   0B 80 2B 8A D4 03 84 A0  ...b..t...+.....

]
***
Compression Methods:  { 0 }
Unsupported extension status_request, data: 01:00:00:00:00
Extension elliptic_curves, curve names: {secp256r1, secp384r1, secp521r1, unknown curve 29, unknown curve 256, unknown curve 257, unknown curve 258, unknown curve 259, unknown curve 260}
Extension ec_point_formats, formats: [uncompressed]
Extension signature_algorithms, signature_algorithms: SHA256withRSA, Unknown (hash:0x8, signature:0x9), Unknown (hash:0x8, signature:0x4), SHA256withECDSA, Unknown (hash:0x8, signature:0x7), SHA384withRSA, Unknown (hash:0x8, signature:0xa), Unknown (hash:0x8, signature:0x5), SHA384withECDSA, SHA512withRSA, Unknown (hash:0x8, signature:0xb), Unknown (hash:0x8, signature:0x6), SHA512withECDSA, SHA1withRSA, SHA1withECDSA
Unsupported extension type_35, data:
Unsupported extension type_51, data: 00:69:00:17:00:41:04:ae:1d:20:1e:7f:15:41:01:04:8a:a6:07:87:c1:10:c4:88:20:bb:bc:8f:dd:29:77:bb:a0:76:b8:bc:b6:ff:c9:6b:cf:81:f2:4e:ad:59:95:28:00:ae:74:26:02:a3:74:49:4c:1b:ff:05:27:be:f0:bd:f8:f1:e4:f6:8f:44:b0:00:1d:00:20:aa:12:a9:e9:be:2c:47:22:72:36:db:57:8d:37:fb:e6:76:11:9e:59:4a:ab:dc:47:9d:fb:28:9f:66:7e:64:32
Unsupported extension type_43, data: 08:03:04:03:03:03:02:03:01
Extension renegotiation_info, renegotiated_connection: <empty>
Extension server_name, server_name: [type=host_name (0), value=localhost]
Unsupported extension type_45, data: 02:01:00
Unsupported extension type_28, data: 40:00
Unsupported extension type_21, data: 00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00
***
%% Initialized:  [Session-22, SSL_NULL_WITH_NULL_NULL]
Standard ciphersuite chosen: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
%% Negotiating:  [Session-22, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384]
*** ServerHello, TLSv1.2
RandomCookie:  GMT: 1551699705 bytes = { 204, 25, 57, 28, 190, 153, 133, 111, 84, 48, 144, 69, 140, 142, 39, 228, 176, 97, 131, 72, 51, 144, 32, 71, 93, 7, 66, 222 }
Session ID:  {92, 125, 15, 249, 156, 49, 93, 110, 51, 118, 78, 147, 13, 67, 50, 119, 4, 139, 247, 123, 140, 61, 206, 121, 197, 180, 71, 56, 123, 67, 20, 120}
Cipher Suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
Compression Method: 0
Extension renegotiation_info, renegotiated_connection: <empty>
***
Cipher suite:  TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
*** Certificate chain
chain [0] = [
[
  Version: V3
  Subject: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US
  Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5

  Key:  Sun RSA public key, 2048 bits
  modulus: 21944740401167172627731583459321030363948627215746053925732477915060915436180167456469785746662093119306577380200747716284652995937004530444336851845029170241627465854006145050037178991946925696078563485570896673835545540824265905937881682387179314987285174428010940266412458943894800978345731524307952507729956745301047871771953945124256516782917326981125087548987889540650149121302888872237484100834740328828765018090383963294418357028839734723410564800765871733483849269364796949055153420777966213779145518299141217288017794394762274753999989298548507425930217302947589819396239489846633419099079578249651345685751
  public exponent: 65537
  Validity: [From: Fri May 30 08:43:19 GMT 2014,
               To: Mon May 27 08:43:19 GMT 2024]
  Issuer: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US
  SerialNumber: [    a6ef7a9a 5368eb27]

Certificate Extensions: 3
[1]: ObjectId: 2.5.29.35 Criticality=false
AuthorityKeyIdentifier [
KeyIdentifier [
0000: 78 0D 96 9D FE D3 0B BE   8C C7 E3 EC 67 04 AB 4B  x...........g..K
0010: EA E0 00 29                                        ...)
]
]

[2]: ObjectId: 2.5.29.19 Criticality=false
BasicConstraints:[
  CA:true
  PathLen:2147483647
]

[3]: ObjectId: 2.5.29.14 Criticality=false
SubjectKeyIdentifier [
KeyIdentifier [
0000: 78 0D 96 9D FE D3 0B BE   8C C7 E3 EC 67 04 AB 4B  x...........g..K
0010: EA E0 00 29                                        ...)
]
]

]
  Algorithm: [SHA1withRSA]
  Signature:
0000: 19 16 5A 21 99 21 24 98   3C 0A E8 D8 00 AB 44 24  ..Z!.!$.<.....D$
0010: F2 0C B7 83 D5 9F 96 17   87 E2 1F 1D A3 47 68 C7  .............Gh.
0020: 68 4A CB 56 0E 77 2B E8   1A 9F E7 09 A1 19 77 D0  hJ.V.w+.......w.
0030: 5E CC C1 B3 9A C4 35 3D   CB E0 A5 A6 43 5D A3 26  ^.....5=....C].&
0040: A4 91 8A C1 FA 7B 10 EA   DC C3 C7 1C 47 DC 97 32  ............G..2
0050: C0 37 80 1C F1 42 10 E3   74 17 FA 3E 60 4A B7 59  .7...B..t..>`J.Y
0060: 92 C1 E0 6F BB F1 BB 9F   82 89 B5 83 D5 AE 1E 90  ...o............
0070: 0A 89 8D FB 4C C0 C5 9E   DC C5 8C C6 2F EE D9 B4  ....L......./...
0080: 95 47 27 2E BE 82 31 6F   76 C0 DB 4C C8 0D 3B 7B  .G'...1ov..L..;.
0090: D1 6A BF BD 3B 93 30 04   A2 9E 81 F7 96 28 77 F2  .j..;.0......(w.
00A0: 32 05 68 44 1F B3 30 CE   40 9F 20 F3 B4 2B AA E6  2.hD..0.@. ..+..
00B0: 40 9B FB 7F 34 6E 3A 99   FD F8 28 F1 8C 9B 56 34  @...4n:...(...V4
00C0: 64 AD 4D 56 39 CB 96 18   50 9B 99 43 80 0A 39 A5  d.MV9...P..C..9.
00D0: 13 7A 6E C5 25 E0 95 4A   92 E5 A8 8B EE 03 49 B4  .zn.%..J......I.
00E0: D9 7C 00 E3 F0 3B A7 BA   40 30 CC 89 55 C6 97 93  .....;..@0..U...
00F0: B5 15 F6 62 D3 B1 74 9C   0B 80 2B 8A D4 03 84 A0  ...b..t...+.....

]
***
*** Diffie-Hellman ServerKeyExchange
DH Modulus:  { 255, 255, 255, 255, 255, 255, 255, 255, 201, 15, 218, 162, 33, 104, 194, 52, 196, 198, 98, 139, 128, 220, 28, 209, 41, 2, 78, 8, 138, 103, 204, 116, 2, 11, 190, 166, 59, 19, 155, 34, 81, 74, 8, 121, 142, 52, 4, 221, 239, 149, 25, 179, 205, 58, 67, 27, 48, 43, 10, 109, 242, 95, 20, 55, 79, 225, 53, 109, 109, 81, 194, 69, 228, 133, 181, 118, 98, 94, 126, 198, 244, 76, 66, 233, 166, 55, 237, 107, 11, 255, 92, 182, 244, 6, 183, 237, 238, 56, 107, 251, 90, 137, 159, 165, 174, 159, 36, 17, 124, 75, 31, 230, 73, 40, 102, 81, 236, 230, 83, 129, 255, 255, 255, 255, 255, 255, 255, 255 }
DH Base:  { 2 }
Server DH Public Key:  { 77, 250, 115, 255, 158, 162, 134, 243, 145, 127, 132, 169, 47, 112, 101, 147, 47, 242, 70, 29, 191, 69, 122, 103, 65, 251, 5, 125, 98, 20, 127, 245, 186, 49, 255, 59, 255, 94, 0, 180, 56, 116, 20, 172, 120, 139, 118, 235, 175, 217, 145, 150, 250, 116, 45, 167, 121, 29, 120, 200, 8, 44, 131, 182, 148, 44, 126, 186, 167, 4, 25, 41, 136, 3, 180, 61, 243, 186, 181, 95, 105, 111, 55, 113, 3, 219, 120, 64, 122, 206, 149, 19, 151, 252, 43, 68, 98, 80, 129, 72, 207, 87, 221, 253, 175, 236, 175, 102, 6, 81, 43, 37, 64, 71, 99, 44, 232, 145, 75, 233, 45, 115, 58, 186, 207, 82, 249, 15 }
Signature Algorithm SHA256withRSA
Signed with a DSA or RSA public key
*** ServerHelloDone
https-jsse-nio-8443-exec-10, WRITE: TLSv1.2 Handshake, length = 1697
, 94, 126, 198, 244, 76, 66, 233, https-jsse-nio-8443-exec-6, READ: TLSv1.2 Change Cipher Spec, length = 1
166, 55, 237, 107, 11, 255, 92, 182, 244, 6, 183https-jsse-nio-8443-exec-9, READ: TLSv1.2 Handshake, length = 134
Extension elliptic_curves, curve names: {secp256r1, secp384r1, secp521r1, unknown curve 29, unknown curve 256, unknown curve 257, unknown curve 258, unknown curve 259, unknown curve 260}
Extension ec_point_formats, formats: [uncompressed]
Extension signature_algorithms, signature_algorithms: SHA256withRSA, Unknown (hash:0x8, signature:0x9), Unknown (hash:0x8, signature:0x4), SHA256withECDSA, Unknown (hash:0x8, signature:0x7), SHA384withRSA, Unknown (hash:0x8, signature:0xa), Unknown (hash:0x8, signature:0x5), SHA384withECDSA, SHA512withRSA, Unknown (hash:0x8, signature:0xb), Unknown (hash:0x8, signature:0x6), SHA512withECDSA, SHA1withRSA, SHA1withECDSA
, Unsupported extension type_35, data:
Unsupported extension type_51, data: 00:69:00:17:00:41:04:7a:4b:59:e0:3f:89:fe:a2:92:9a:49:d0:79:5b:65:36:6d:53:e3:8e:04:5f:e7:75:9b:40:02:8b:42:6b:c6:66:38:86:db:fd:11:30:c3:03:03:ba:66:11:76:fd:9f:23:f1:7f:66:65:74:d2:fb:22:8e:3c:61:71:53:ee:1b:95:00:1d:00:20:26:fe:45:5e:87:7c:8e:7b:0a:0a:42:03:a4:cd:da:e1:cf:0f:ec:f2:08:ff:85:aa:53:8e:c6:67:9d:06:67:46
Unsupported extension type_43, data: 08:03:04:03:03:03:02:03:01
Extension renegotiation_info, renegotiated_connection: <empty>
https-jsse-nio-8443-exec-6, READ: TLSv1.2 Handshake, length = 40
*** ClientKeyExchange, DH
DH Public key:  { 61, 86, 33, 94, 36, 18, 117, 156, 252, 115, 157, 160, 96, 128, 241, 243, 26, 159, 177, 195, 234, 71, 240, 227, 47, 180, 254, 39, 19, 6, 38, 34, 3, 31, 230, 132, 39, 237Extension server_name, server_name: [type=host_name (0), value=localhost]
Unsupported extension type_45, data: 02:01:00
Unsupported extension type_28, data: 40:00
Unsupported extension type_21, data: 00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00
***
https-jsse-nio-8443-exec-7, READ: TLSv1.2 Handshake, length = 134
10, 85, 19, 223, 208, 14, 110, 241, 86, 166, 62, 171, 94, 66, 84, 67, 104, 251, 135, 12, 192, 229, 168, 49, 117, 195, 255, 167, 32, 214, 69, 4, 239, 22, 24, 231, 226, 67, 55, 156, 170, 35, 63, 115, 149, 250, 237, 70, 234, 229, 249, 97, 234, 107, 48, 43, 93, 24, 9, 200, 20, 112, 97, 191, 242, 224, 181, 207, 177, 11, 208, 15, 235, 85, 66, 23, 71, 235, 84, 90, 210, 13, 198, 241, 64, 164, 188, 108, 98, 6, 16 }
*** Finished
%% Initialized:  [Session-23, SSL_NULL_WITH_NULL_NULL]
SESSION KEYGEN:
PreMaster Secret:
0000: FC AB C1 F0 2E 3A C1 15   10 50 A0 8C 5D 06 F5 4A  .....:..Standard ciphersuite chosen: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
*** Diffie-Hellman ServerKeyExchange
DH Modulus:  { 255, 255, 255, 255, 255, 255, 255, 255, 201, 15, 218, 162, 33, 104, 194, 52, 196, 198, 98, 139, 128, 220, 28, 209, 41, 2, 78, 8, 138, 103, 204, 116, 2, 11, 190, 166, 59, 19, 155, 34, 81, 74, 8, 121, 142, 52, 4, 221, 239, 149, 25, 179, 205, 58, 67, 27, 48, 43, 10, 109, 242, 95, 20, 55, 79, 225, 53, 109, 109, 81, 194, 69, 228, 133, 181, 118, 98, 94, 126, 198, 244, 76, 66, 233, 166, 55, 237, , 238, 56, 107, 251, 90, 137, 159, 165, 174, 159, 36, 17, 124, 75, 31, 230, 73, 40, 102, 81, 236, 230, 83, 129, 255, 255, 255, 255, 255, 255, 255, 255 }
107, 11, 255, 92, 182, 244, 6, 183, 237, 238, 56, 107, 251, 90, 137verify_data:  { 122, %% Negotiating:  [Session-23, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384]
*** ClientKeyExchange, DH
DH Public key:  { 47, 87, 194, *** ServerHello, TLSv1.2
RandomCookie:  GMT: 1551699705 bytes = { 250.P, 48, 14, 193, 162, 75, 163, 168, 196, 156, 48, 44, 228, 87, 188, 223, 120, 158, 189, 93, 195, 204, 44, 172, 37, 72, 184, 215 }
Session ID:  49, 214, 198, 144, 158, 209, 175, 196, 39, 130, 227, 13, 10, 218, 180, 237, 28, 98, 97, 126, 71, 62, 247, 172, 72, 136, 105, 201, 18, 246, 112, 15, 114, 89, 74, 144, 233, 80, 62, 159, 13, 68, 24, 53, 247, 254, 223, 139, 133, 20, 191, 255, 114, 123, 134, 24, 178, 124, 11, 52, 36, 1, 187, 174, 26, 142, 18, 112, 39, 173, 32, 194, 224, 109, 80, 54, 102, 172, 15, 134, 46, 206, 229, 165, 149, 237, 7, 15, 221, 38, 187, 214, 196, 30, 177, 88, 68, 148, 39, 191, 133, 157, 58, 144, 228, 195, 241, 115, 247, 68, 112, 80, 126, 93, 244, 150, 139, 134, 181, 214, 119, 179, 85, 22, 10488, 128, , 159, 165, 174, 159, 36, 17, 124, 75, 31, 230, 73, 40, 102, 81, 236, 230, 83, 129, 255, 255DH Base:  { 2 }
, 255, 255, 255, 255, 255, 255 }
99, 24, 98, 69, 215, 48, 102, 21, 208 }
***
 }
{92, 125, 15, 249, 66, 246, 149, 109, 237, 108, 197, 152, 185, 217, 183, 10, 51, 192, 241, 212, 4, 203, 186, 66, 179, 248, 130, 74, 46, 249, 186, 24}
Cipher Suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
Compression Method: 0
Extension renegotiation_info, renegotiated_connection: <empty>
***
Cipher suite:  TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
*** Certificate chain
chain [0] = [
[
  Version: V3
  Subject: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US
  Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5

  Key:  Sun RSA public key, 2048 bits
  modulus: 21944740401167172627731583459321030363948627215746053925732477915060915436180167456469785746662093119306577380200747716284652995937004530444336851845029170241627465854006145050037178991946925696078563485570896673835545540824265905937881682387179314987285174428010940266412458943894800978345731524307952507729956745301047871771953945124256516782917326981125087548987889540650149121302888872237484100834740328828765018090383963294418357028839734723410564800765871733483849269364796949055153420777966213779145518299141217288017794394762274753999989298548507425930217302947589819396239489846633419099079578249651345685751
  public exponent: 65537
  Validity: [From: Fri May 30 08:43:19 GMT 2014,
               To: Mon May 27 08:43:19 GMT 2024]
  Issuer: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US
  SerialNumber: [    a6ef7a9a 5368eb27]

Certificate Extensions: 3
[1]: ObjectId: 2.5.29.35 Criticality=false
AuthorityKeyIdentifier [
KeyIdentifier [
0000: 78 0D 96 9D FE D3 0B BE   8C C7 E3 EC 67 04 AB 4B  x...........g..K
0010: EA E0 00 29                                        ...)
]
]

[2]: ObjectId: 2.5.29.19 Criticality=false
BasicConstraints:[
  CA:true
  PathLen:2147483647
]

[3]: ObjectId: 2.5.29.14 Criticality=false
SubjectKeyIdentifier [
KeyIdentifier [
0000: 78 0D 96 9D FE D3 0B BE   8C C7 E3 EC 67 04 AB 4B  x...........g..K
0010: EA E0 00 29                                        ...)
]
]

]
  Algorithm: [SHA1withRSA]
  Signature:
0000: 19 16 5A 21 99 21 24 98   3C 0A E8 D8 00 AB 44 24  ..Z!.!$.<.....D$
0010: F2 0C B7 83 D5 9F 96 17   87 E2 1F 1D A3 47 68 C7  .............Gh.
0020: 68 4A CB 56 0E 77 2B E8   1A 9F E7 09 A1 19 77 D0  hJ.V.w+.......w.
0030: 5E CC C1 B3 9A C4 35 3D   CB E0 A5 A6 43 5D A3 26  ^.....5=....C].&
0040: A4 91 8A C1 FA 7B 10 EA   DC C3 C7 1C 47 DC 97 32  ............G..2
0050: C0 37 80 1C F1 42 10 E3   74 17 FA 3E 60 4A B7 59  .7...B..t..>`J.Y
0060: 92 C1 E0 6F BB F1 BB 9F   82 89 B5 83 D5 AE 1E 90  ...o............
0070: 0A 89 8D FB 4C C0 C5 9E   DC C5 8C C6 2F EE D9 B4  ....L......./...
0080: 95 47 27 2E BE 82 31 6F   76 C0 DB 4C C8 0D 3B 7B  .G'...1ov..L..;.
0090: D1 6A BF BD 3B 93 30 04   A2 9E 81 F7 96 28 77 F2  .j..;.0......(w.
00A0: 32 05 68 44 1F B3 30 CE   40 9F 20 F3 B4 2B AA E6  2.hD..0.@. ..+..
00B0: 40 9B FB 7F 34 6E 3A 99   FD F8 28 F1 8C 9B 56 34  @...4n:...(...V4
00C0: 64 AD 4D 56 39 CB 96 18   50 9B 99 43 80 0A 39 A5  d.MV9...P..C..9.
00D0: 13 7A 6E C5 25 E0 95 4A   92 E5 A8 8B EE 03 49 B4  .zn.%..J......I.
00E0: D9 7C 00 E3 F0 3B A7 BA   40 30 CC 89 55 C6 97 93  .....;..@0..U...
00F0: B5 15 F6 62 D3 B1 74 9C   0B 80 2B 8A D4 03 84 A0  ...b..t...+.....

]
***
https-jsse-nio-8443-exec-6, WRITE: TLSv1.2 Change Cipher Spec, length = 1
*** Finished
verify_data:  { 223, 216, 252, 93, 191, 46, 148, 98, 113, 220, 195, 207 }
***
SESSION KEYGEN:
PreMaster Secret:
0000: AE F5 0F 99 A7 0C FB 48   51 BE 43 FB 3B 03 DD 5B  .......HQ.C.;..[
0010: 5F B2 CB 4B 0A F7 61 0D   3C A6 A2 1B 84 5D FB E1  _..K..a.<....]..
0020: AB F7 3B BC F0 B2 56 FF   20 B7 75 7D 6C 59 71 57  ..;...V. .u.lYqW
0030: 16 98 D8 E7 CB 6B 6C FC   5E 37 B8 31 61 51 63 D1  .....kl.^7.1aQc.
0040: AD BE 0F 25 F6 9E 30 A2   FC F1 08 73 E6 DC 92 8E  ...%..0....s....
0050: 4D A5 98 A3 20 3E 95 9F   B6 94 D2 61 08 D9 53 E3  M... >.....a..S.
0060: CF 2F 5F 30 08 34 66 E9   9D 3E 3C E6 15 56 3F 16  ./_0.4f..><..V?.
0070: 86 D8 64 93 0C EB F7 67   54 55 9D FD 16 8C 38 2D  ..d....gTU....8-
..]..J
0010: 69 FD 41 7C 76 1D BB EA   D5 88 2C 74 F6 C2 56 7F  i.A.v.....,t..V.
0020: 1F EA DF 1A 6E 75 62 05   56 52 7D 4E 37 AA 42 E9  ....nub.VR.N7.B.
0030: DC E3 EE AC 13 00 7C 43   8A 27 3C 14 DF EE FB 17  .......C.'<.....
0040: A2 23 BB 99 48 32 E3 60   3E F4 CC 29 24 D7 85 0E  .#..H2.`>..)$...
0050: A7 9B BE 71 CB 66 31 39   34 17 60 7A 1F 2C F1 4F  ...q.f194.`z.,.O
0060: F6 B3 5C 29 19 60 94 B3   69 14 AD A1 8C 0D C1 16  ..\).`..i.......
0070: FD B8 F9 CB 98 F0 B1 32   22 6D 65 75 4E 74 59 E9  .......2"meuNtY.
CONNECTION KEYGEN:
Client Nonce:
0000: AF 8D 60 53 1C 01 0F E3   24 46 78 59 06 22 0B F6  ..`S....$FxY."..
0010: FA 06 51 52 2C 2E 01 3A   55 52 35 D6 6B 64 75 7F  ..QR,..:UR5.kdu.
Server Nonce:
0000: 5C 7D 0F F8 AD 31 70 DD   81 D4 2C FC 49 4A 35 75  \....1p...,.IJ5u
0010: 4F F7 97 8A 99 D2 CB 0D   B8 FB A8 37 57 38 93 77  O..........7W8.w
Master Secret:
0000: 33 2F B7 5B B2 5A 3B D3   44 15 BA 34 F8 D2 B3 B8  3/.[.Z;.D..4....
0010: 08 60 96 30 69 44 14 D3   D5 E0 90 D4 79 05 D7 E8  .`.0iD......y...
0020: 78 BB 57 FB 52 C0 39 75   B5 CF 08 71 35 24 08 D3  x.W.R.9u...q5$..
... no MAC keys used for this cipher
Client write key:
0000: 0F FA 31 1B EF CB 52 02   F6 5A DA F8 05 E1 98 EE  ..1...R..Z......
0010: 95 02 6B A7 60 06 79 CE   76 AC EB 81 FB 81 53 23  ..k.`.y.v.....S#
Server write key:
0000: F4 FC 5A 05 71 79 77 D1   23 20 61 65 33 F2 EA 9E  ..Z.qyw.# ae3...
0010: 69 56 91 27 11 2F F5 B4   CF E2 9C 15 0B 1C 64 FE  iV.'./........d.
Client write IV:
0000: 19 C2 33 05                                        ..3.
Server write IV:
0000: FE 06 B6 4F                                        ...O
DH Base:  { 2 }
Server DH Public Key:  { 115, 74, 21https-jsse-nio-8443-exec-7, READ: TLSv1.2 Change Cipher Spec, length = 1
https-jsse-nio-8443-exec-7, READ: TLSv1.2 Handshake, length = 40
Server DH Public Key:  { 208, 17, 38, 228, 101, 198, 125, 41, 178, 235, 193, 46, 230, 55, 107, 149, 65, 139, 144, 71, 115, 115, 166, 74, 48, 151, 160, 227, 160, 233, 247, 202, 57, 202, 253, 53, 216, 187, 215, 177, 114, 191, 29, 62, 211, 238, 176, 74, 137, 209, 75, 106, 76, 55, 159, 191, 136, 144, 149, 246, 165, 238, 64, 219, 183, 78, 1, 32, 98, 229, 56, 115, 27, 89, 37, 178, 151, 39, 133, 90, 246, 249, 83, 252, 186, 253, 124, 99, 195, 221, 211, 163, 231, 146, 52, 193, 97, 205, 36, 208, 115, 57, 18, 188, 225, 188, 152, 110, 170, 24, 154, 163, 231, 111, 201, 147, 66, 146, 227, 168, 245, 202, 76, 70, 240, 158, 31, 131 }
https-jsse-nio-8443-exec-6, WRITE: TLSv1.2 Handshake, length = 40
, 188, 54, 121, 133, 246, 247, 93, 13, 95, 70, 46, 205, 57, 98, 134, 68, 35, 57, 146, 188, 113, 18, 171, 39, 32, 20, 208, 212, 161, 140, 146, 234, 135, 210, 59, 107, 183, 201, 247, 97, 23, 153, 131, 99, 89, 23, 56, 109, 106, 172, 210, 149, 31, 111, 127, 151, 93, 75, 199, 116, 251, 207, 49, 25, 138, 176, 239, 195, 106, 136, 207, 9, 58, 73, 88, 220, 217, 5, 163, 40, 27, 203, 192, 194, 103, 139, 177, 117, 110, 1, 97, 121, 65, 221, 119, 117, 177, 76, 79, 220, 253, 23, 157, 111, 96, 88, 51, 194, 7, 56, 121, 101, 120, 3, 94, 212, 251, 91, 44, 129, 200, 33, 217, 175, 123 }
*** Diffie-Hellman ServerKeyExchange
DH Modulus:  { 255, 255, 255, 255, 255, 255, 255, 255, 201, 15, 218, 162, 33, 104, 194, 52, 196, 198, 98, 139, 128, 220, 28, 209, 41, 2, 78, 8, 138, 103, 204, 116, 2, 11, 190, 166, 59, 19, 155, 34, 81, 74, 8, 121, 142, 52, 4, 221, 239, 149, 25, 179, 205, 58, 67, 27, 48, 43, 10, 109, 242, 95, 20, 55, 79, 225, 53, 109, 109, 81, 194, 69, 228, 133, 181, 118, 98, 94, 126, 198, 244, 76, 66, 233, 166, 55, 237, 107, 11, 255, 92, 182, 244, 6, 183, 237, 238, 56, 107, 251, 90, 137, 159, 165, 174, 159, 36, 17, 124, 75, 31, 230, 73, 40, 102, 81, 236, 230, 83, 129, 255, 255, 255, 255, 255, 255, 255, 255 }
DH Base:  { 2 }
Server DH Public Key:  { 154, 87, 177, 142, 48, 5CONNECTION KEYGEN:
Client Nonce:
0000: C1 1D 4D 3E 4C D4 14 8A   A4 FB A5 C4 6F 42 D2 1F  ..M>L.......oB..
0010: 1B B2 24 95 3F 85 28 6C   52 5E 04 79 FA D1 46 82  ..$.?.(lR^.y..F.
Server Nonce:
0000: 5C 7D 0F F8 EE 5C 43 A0   C5 A3 21 62 3B 43 3F E7  \....\C...!b;C?.
0010: E0 A5 F4 E2 D1 39 52 48   FA 1F 6D CE 32 EA B6 6D  .....9RH..m.2..m
Master Secret:
0000: 44 AC 53 B7 18 19 88 ED   22 80 B4 1B C2 FB 42 EA  D.S.....".....B.
0010: BF 39 AC 72 AA D9 CB 44   1C D1 CD 46 AD 20 64 05  .9.r...D...F. d.
0020: AF 7F C5 7B CD 8E 79 64   90 87 D1 1B F1 90 46 52  ......yd......FR
... no MAC keys used for this cipher
Client write key:
0000: FA E9 25 D6 85 B7 51 C2   19 F4 63 1C 64 80 53 62  ..%...Q...c.d.Sb
0010: F7 15 74 41 A0 6B 0F 8D   8D D6 F6 20 A8 89 CF 50  ..tA.k..... ...P
Server write key:
0000: 5C BA EE 2C 4A 85 5F 9A   FC E5 3C B6 98 46 E5 E2  \..,J._...<..F..
0010: 4E 0E 4A 80 A0 61 01 E4   DB F1 57 89 A4 F1 E2 EB  N.J..a....W.....
Client write IV:
0000: 25 84 F2 B7                                        %...
Server write IV:
0000: 09 0D F9 39                                        ...9
, 194, 205, 198, 28, 45, 232, 68, 168, 15, 10, 5, 15, 9, 144, 147, 71, 51, 229, 238, 161, 41, 144, 87, 55, 25, 133, 246, 218, 233, 111, 177, 159, 12, 211, 153, 69, 129, 200, 72, 252, 135, 192, 67, 166, 140, 170, 226, 86, 243, 141, 28, 170, 119, 153, 100, 20, 132, 138, 225, 11, 48, 27, 24, 160, 162, 121, 223, 102, 211, 166, 188, 67, 59, 16, 189, 148, 73, 34, 194, 10, 124, 32, 168, 205, 19, 94, 152, 146, 171, 181, 119, 43, 153, 171, 168, 115, 0, 44, 233, 184, 138, 142, 133, 203, 202, 255, 154, 144, 190, 64, 69, 234, 169, 208, 227, 200, 128, 37, 104, 134, 25, 143 }
Signature Algorithm SHA256withRSA
Signed with a DSA or RSA public key
%% Cached server session: [Session-18, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384]
*** ServerHelloDone
Signature Algorithm SHA256withRSA
Signed with a DSA or RSA public key
*** Finished
verify_data:  { 116, 168, 193, 253, 136, 48, 190, 50, 146, 185, 99, 134 }
***
https-jsse-nio-8443-exec-7, WRITE: TLSv1.2 Change Cipher Spec, length = 1
*** Finished
verify_data:  { 90, 44, 18, 39, 244, 134, 236, 207, 244, 152, 27, 182 }
***
*** ServerHelloDone
https-jsse-nio-8443-exec-4, WRITE: TLSv1.2 Handshake, length = 1697
https-jsse-nio-8443-exec-7, WRITE: TLSv1.2 Handshake, length = 40
%% Cached server session: [Session-20, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384]
Signature Algorithm SHA256withRSA
https-jsse-nio-8443-exec-9, READ: TLSv1.2 Change Cipher Spec, length = 1
https-jsse-nio-8443-exec-5, WRITE: TLSv1.2 Application Data, length = 86
https-jsse-nio-8443-exec-1, WRITE: TLSv1.2 Application Data, length = 85
https-jsse-nio-8443-exec-9, READ: TLSv1.2 Handshake, length = 40
Signed with a DSA or RSA public key
*** ServerHelloDone
https-jsse-nio-8443-exec-2, WRITE: TLSv1.2 Handshake, length = 1697
Using SSLEngineImpl.
Allow unsafe renegotiation: false
Allow legacy hello messages: true
Is initial handshake: true
Is secure renegotiation: false
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1.1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1.1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1.1
https-jsse-nio-8443-exec-3, WRITE: TLSv1.2 Handshake, length = 1697
Using SSLEngineImpl.
Allow unsafe renegotiation: false
Allow legacy hello messages: true
Is initial handshake: true
Is secure renegotiation: false
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1.1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1.1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1.1
https-jsse-nio-8443-exec-3, READ: TLSv1 Handshake, length = 512
*** ClientHello, TLSv1.2
RandomCookie:  GMT: 68580738 bytes = { 100, 106, 244, 167, 67, 93, 213, 76, 233, 9, 110, 199, 43, 29, 208, 166, 188, 48, 47, 237, 8, 192, 9, 54, 150, 220, 184, 135 }
Session ID:  {92, 125, 15, 248, 109, 55, 116, 167, 27, 228, 106, 188, 55, 81, 119, 10, 225, 231, 251, 111, 24, 107, 135, 82, 189, 63, 153, 62, 46, 5, 125, 15}
Cipher Suites: [Unknown 0x13:0x2, Unknown 0x13:0x3, Unknown 0x13:0x1, Unknown 0x13:0x4, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa9, Unknown 0xc0:0xad, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0xac, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa8, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xc0:0x9d, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9c, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xaa, Unknown 0xc0:0x9f, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9e, TLS_DHE_RSA_WITH_AES_128_CBC_SHA]
Compression Methods:  { 0 }
Unsupported extension status_request, data: 01:00:00:00:00
Extension elliptic_curves, curve names: {secp256r1, secp384r1, secp521r1, unknown curve 29, unknown curve 256, unknown curve 257, unknown curve 258, unknown curve 259, unknown curve 260}
Extension ec_point_formats, formats: [uncompressed]
Extension signature_algorithms, signature_algorithms: SHA256withRSA, Unknown (hash:0x8, signature:0x9), Unknown (hash:0x8, signature:0x4), SHA256withECDSA, Unknown (hash:0x8, signature:0x7), SHA384withRSA, Unknown (hash:0x8, signature:0xa), Unknown (hash:0x8, signature:0x5), SHA384withECDSA, SHA512withRSA, Unknown (hash:0x8, signature:0xb), Unknown (hash:0x8, signature:0x6), SHA512withECDSA, SHA1withRSA, SHA1withECDSA
Unsupported extension type_35, data:
Unsupported extension type_51, data: 00:69:00:17:00:41:04:b6:3c:6e:85:dd:c8:67:2f:78:e1:86:28:58:99:07:25:f3:e1:34:e5:80:2d:ea:f2:c1:be:14:34:95:41:0b:cb:be:5e:08:cb:16:63:f8:5a:b4:4e:f6:a6:0f:67:17:3b:49:5a:cb:1f:33:a9:df:56:59:21:ab:ab:07:39:8d:ec:00:1d:00:20:b4:7d:7b:89:ea:f6:5d:f1:d2:a6:2b:25:5e:68:de:5e:67:55:1a:f6:a9:2a:45:ad:ae:12:fb:16:bf:9e:5d:72
Unsupported extension type_43, data: 08:03:04:03:03:03:02:03:01
Extension renegotiation_info, renegotiated_connection: <empty>
Extension server_name, server_name: [type=host_name (0), value=localhost]
Unsupported extension type_45, data: 02:01:00
Unsupported extension type_28, data: 40:00
Unsupported extension type_21, data: 00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00
***
*** Finished
verify_data:  { 67, 20, 75, 84, 132, 170, 242, 157, 61, 222, 131, 185 }
***
https-jsse-nio-8443-exec-2, READ: TLSv1 Handshake, length = 512
https-jsse-nio-8443-exec-9, WRITE: TLSv1.2 Change Cipher Spec, length = 1
*** ClientHello, TLSv1.2
RandomCookie:  GMT: -398147963 bytes = { 45, 206, 212, 46, 92, 214, 206, 244, 53, 12, 181, 120, 220, 12, 130, 90, 219, 160, 146, 197, 132, 138, 232, 49, 158, 16, 104, 66 }
Session ID:  *** Finished
{92, 125, 15, 248, 109, 55, 116, 167, 27, 228, 106, 188, 55, 81, 119, 10, 225, 231, 251, 111, 24, 107, 135, 82, 189, 63, 153, 62, 46, 5, 125, 15}
Cipher Suites: [Unknown 0x13:0x2, Unknown 0x13:0x3, Unknown 0x13:0x1, Unknown 0x13:0x4, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa9, Unknown 0xc0:0xad, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0xac, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa8, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xc0:0x9d, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9c, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xaa, Unknown 0xc0:0x9f, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9e, TLS_DHE_RSA_WITH_AES_128_CBC_SHA]
Compression Methods:  { 0 }
Unsupported extension status_request, data: 01:00:00:00:00
Extension elliptic_curves, curve names: {secp256r1, secp384r1, secp521r1, unknown curve 29, unknown curve 256, unknown curve 257, unknown curve 258, unknown curve 259, unknown curve 260}
Extension ec_point_formats, formats: [uncompressed]
Extension signature_algorithms, signature_algorithms: SHA256withRSA, Unknown (hash:0x8, signature:0x9), Unknown (hash:0x8, signature:0x4), SHA256withECDSA, Unknown (hash:0x8, signature:0x7), SHA384withRSA, Unknown (hash:0x8, signature:0xa), Unknown (hash:0x8, signature:0x5), SHA384withECDSA, SHA512withRSA, Unknown (hash:0x8, signature:0xb), Unknown (hash:0x8, signature:0x6), SHA512withECDSA, SHA1withRSA, SHA1withECDSA
Unsupported extension type_35, data:
Unsupported extension type_51, data: 00:69:00:17:00:41:04:97:22:00:73:8d:04:27:d5:da:b7:e7:3c:a2:d6:22:62:87:cd:26:1e:dd:33:5a:8c:ee:24:09:cd:38:1f:d0:5d:fc:2d:a5:11:d5:95:3a:db:0c:e3:08:78:ba:f9:98:0e:b3:21:54:6d:12:6a:e5:5f:5f:92:ee:34:36:52:9b:94:00:1d:00:20:4b:6f:f5:9b:e6:f1:79:f8:c5:1a:5c:56:39:28:ee:e9:12:4c:6a:7a:29:a3:a9:36:b3:44:e5:5f:8e:1b:c5:15
Unsupported extension type_43, data: 08:03:04:03:03:03:02:03:01
Extension renegotiation_info, renegotiated_connection: <empty>
Extension server_name, server_name: [type=host_name (0), value=localhost]
Unsupported extension type_45, data: 02:01:00
Unsupported extension type_28, data: 40:00
Unsupported extension type_21, data: 00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00
***
%% Initialized:  [Session-25, SSL_NULL_WITH_NULL_NULL]
Standard ciphersuite chosen: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
%% Negotiating:  [Session-25, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384]
*** ServerHello, TLSv1.2
RandomCookie:  GMT: 1551699705 bytes = { 107, 102, 87, 94, 83, 176, 159, 187, 51, 63, 7, 1, 126, 72, 152, 164, 53, 38, 80, 176, 236, 108, 240, 1, 2, 166, 119, 161 }
Session ID:  {92, 125, 15, 249, 91, 136, 187, 27, 204, 162, 102, 165, 117, 174, 228, 167, 61, 220, 8, 91, 233, 74, 141, 46, 20, 170, 254, 125, 209, 24, 126, 159}
Cipher Suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
Compression Method: 0
Extension renegotiation_info, renegotiated_connection: <empty>
***
Cipher suite:  TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
*** Certificate chain
chain [0] = [
[
  Version: V3
  Subject: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US
  Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5

  Key:  Sun RSA public key, 2048 bits
  modulus: 21944740401167172627731583459321030363948627215746053925732477915060915436180167456469785746662093119306577380200747716284652995937004530444336851845029170241627465854006145050037178991946925696078563485570896673835545540824265905937881682387179314987285174428010940266412458943894800978345731524307952507729956745301047871771953945124256516782917326981125087548987889540650149121302888872237484100834740328828765018090383963294418357028839734723410564800765871733483849269364796949055153420777966213779145518299141217288017794394762274753999989298548507425930217302947589819396239489846633419099079578249651345685751
  public exponent: 65537
  Validity: [From: Fri May 30 08:43:19 GMT 2014,
               To: Mon May 27 08:43:19 GMT 2024]
  Issuer: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US
  SerialNumber: [    a6ef7a9a 5368eb27]

Certificate Extensions: 3
[1]: ObjectId: 2.5.29.35 Criticality=false
AuthorityKeyIdentifier [
KeyIdentifier [
0000: 78 0D 96 9D FE D3 0B BE   8C C7 E3 EC 67 04 AB 4B  x...........g..K
0010: EA E0 00 29                                        ...)
]
]

[2]: ObjectId: 2.5.29.19 Criticality=false
BasicConstraints:[
  CA:true
  PathLen:2147483647
]

[3]: ObjectId: 2.5.29.14 Criticality=false
SubjectKeyIdentifier [
KeyIdentifier [
0000: 78 0D 96 9D FE D3 0B BE   8C C7 E3 EC 67 04 AB 4B  x...........g..K
0010: EA E0 00 29                                        ...)
]
]

]
  Algorithm: [SHA1withRSA]
  Signature:
0000: 19 16 5A 21 99 21 24 98   3C 0A E8 D8 00 AB 44 24  ..Z!.!$.<.....D$
0010: F2 0C B7 83 D5 9F 96 17   87 E2 1F 1D A3 47 68 C7  .............Gh.
0020: 68 4A CB 56 0E 77 2B E8   1A 9F E7 09 A1 19 77 D0  hJ.V.w+.......w.
0030: 5E CC C1 B3 9A C4 35 3D   CB E0 A5 A6 43 5D A3 26  ^.....5=....C].&
0040: A4 91 8A C1 FA 7B 10 EA   DC C3 C7 1C 47 DC 97 32  ............G..2
0050: C0 37 80 1C F1 42 10 E3   74 17 FA 3E 60 4A B7 59  .7...B..t..>`J.Y
0060: 92 C1 E0 6F BB F1 BB 9F   82 89 B5 83 D5 AE 1E 90  ...o............
0070: 0A 89 8D FB 4C C0 C5 9E   DC C5 8C C6 2F EE D9 B4  ....L......./...
0080: 95 47 27 2E BE 82 31 6F   76 C0 DB 4C C8 0D 3B 7B  .G'...1ov..L..;.
0090: D1 6A BF BD 3B 93 30 04   A2 9E 81 F7 96 28 77 F2  .j..;.0......(w.
00A0: 32 05 68 44 1F B3 30 CE   40 9F 20 F3 B4 2B AA E6  2.hD..0.@. ..+..
00B0: 40 9B FB 7F 34 6E 3A 99   FD F8 28 F1 8C 9B 56 34  @...4n:...(...V4
00C0: 64 AD 4D 56 39 CB 96 18   50 9B 99 43 80 0A 39 A5  d.MV9...P..C..9.
00D0: 13 7A 6E C5 25 E0 95 4A   92 E5 A8 8B EE 03 49 B4  .zn.%..J......I.
00E0: D9 7C 00 E3 F0 3B A7 BA   40 30 CC 89 55 C6 97 93  .....;..@0..U...
00F0: B5 15 F6 62 D3 B1 74 9C   0B 80 2B 8A D4 03 84 A0  ...b..t...+.....

]
***
*** Diffie-Hellman ServerKeyExchange
DH Modulus:  { 255, 255, 255, 255, 255, 255, 255, 255, 201, 15, 218, 162, 33, 104, 194, 52, 196, 198, 98, 139, 128, 220, 28, 209, 41, 2, 78, 8, 138, 103, 204, 116, 2, 11, 190, 166, 59, 19, 155, 34, 81, 74, 8, 121, 142, 52, 4, 221, 239, 149, 25, 179, 205, 58, 67, 27, 48, 43, 10, 109, 242, 95, 20, 55, 79, 225, 53, 109, 109, 81, 194, https-jsse-nio-8443-exec-10, READ: TLSv1.2 Handshake, length = 134
https-jsse-nio-8443-exec-8, READ: TLSv1.2 Alert, length = 26
https-jsse-nio-8443-exec-7, READ: TLSv1.2 Handshake, length = 134
https-jsse-nio-8443-exec-6, READ: TLSv1.2 Handshake, length = 134
https-jsse-nio-8443-exec-4, READ: TLSv1.2 Alert, length = 26
https-jsse-nio-8443-exec-8, RECV TLSv1.2 ALERT:  warning, close_notify
https-jsse-nio-8443-exec-8, closeInboundInternal()
https-jsse-nio-8443-exec-4, RECV TLSv1.2 ALERT:  warning, close_notify
verify_data:  { 33, 138, 8, 67, 223, 45, 208, 86, 110, 122, 182, 167 }
***
%% Initialized:  [Session-24, SSL_NULL_WITH_NULL_NULL]
https-jsse-nio-8443-exec-4, closeInboundInternal()
*** ClientKeyExchange, DH
DH Public key:  { 119, 187, 66, 26, 49, 127, 49, 152, 116, 47, 8, 113, 18, 241, 94, 10, 42, 248, 98, 163, 163, 214, 66, 49, 143, 20, 63, 121, 72, 253, 21, 7, 105, 229, 142, 237, 255, 100, 254, 123, 123, 151, 131, 133, 37, 49, 81, 125, 204, 61, 15, 158, 178, 49, 192, 84, 48, 81, 188, 87, 205, 201, 68, 194, 173, 134, 143, 168, 145, 15, 77, 141, 185, 94, 202, 181, 65, 254, 249, 170, 37, 56, 158, 113, 161, 100, 90, 131, 168, 203, 156, 157, 136, 192, 94, 196, 155, 114, 204, 97, 1, 140, 191, 69, 40, 221, 4, 182, 173, 155, 124, 190, 163, 56, 65, 61, 89, 185, 151, 237, 248, 59, 124, 47, 125, 179, 243, 222 }
Standard ciphersuite chosen: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
%% Negotiating:  [Session-24, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384]
*** ServerHello, TLSv1.2
RandomCookie:  GMT: 1551699705 bytes = { 129, 61, 113, 212, 159, 235, 122, 197, 255, 49, 88, 111, 229, 213, 126, 68, 147, 169, 16, 171, 250, 94, 164, 75, 232, 12, 73, 75 }
Session ID:  {92, 125, 15, 249, 195, 242, 53, 15, 195, 4, 179, 174, 158, 160, 129, 239, 181, 93, 101, 155, 90, 214, 181, 133, 63, 19, 255, 137, 161, 42, 8, 157}
Cipher Suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
Compression Method: 0
Extension renegotiation_info, renegotiated_connection: <empty>
***
Cipher suite:  TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
*** Certificate chain
SESSION KEYGEN:
PreMaster Secret:
chain [0] = [
[
  Version: V3
  Subject: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US
  Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5

  Key:  Sun RSA public key, 2048 bits
  modulus: 21944740401167172627731583459321030363948627215746053925732477915060915436180167456469785746662093119306577380200747716284652995937004530444336851845029170241627465854006145050037178991946925696078563485570896673835545540824265905937881682387179314987285174428010940266412458943894800978345731524307952507729956745301047871771953945124256516782917326981125087548987889540650149121302888872237484100834740328828765018090383963294418357028839734723410564800765871733483849269364796949055153420777966213779145518299141217288017794394762274753999989298548507425930217302947589819396239489846633419099079578249651345685751
  public exponent: 65537
  Validity: [From: Fri May 30 08:43:19 GMT 2014,
               To: Mon May 27 08:43:19 GMT 2024]
  Issuer: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US
  SerialNumber: [    a6ef7a9a 5368eb27]

Certificate Extensions: 3
[1]: ObjectId: 2.5.29.35 Criticality=false
AuthorityKeyIdentifier [
KeyIdentifier [
0000: 78 0D 96 9D FE D3 0B BE   8C C7 E3 EC 67 04 AB 4B  x...........g..K
0010: EA E0 00 29                                        ...)
]
]

[2]: ObjectId: 2.5.29.19 Criticality=false
BasicConstraints:[
  CA:true
  PathLen:2147483647
]

[3]: ObjectId: 2.5.29.14 Criticality=false
SubjectKeyIdentifier [
KeyIdentifier [
0000: 78 0D 96 9D FE D3 0B BE   8C C7 E3 EC 67 04 AB 4B  x...........g..K
0010: EA E0 00 29                                        ...)
]
]

]
  Algorithm: [SHA1withRSA]
  Signature:
0000: 19 16 5A 21 99 21 24 98   3C 0A E8 D8 00 AB 44 24  ..Z!.!$.<.....D$
0010: F2 0C B7 83 D5 9F 96 17   87 E2 1F 1D A3 47 68 C7  .............Gh.
0020: 68 4A CB 56 0E 77 2B E8   1A 9F E7 09 A1 19 77 D0  hJ.V.w+.......w.
0030: 5E CC C1 B3 9A C4 35 3D   CB E0 A5 A6 43 5D A3 26  ^.....5=....C].&
0040: A4 91 8A C1 FA 7B 10 EA   DC C3 C7 1C 47 DC 97 32  ............G..2
0050: C0 37 80 1C F1 42 10 E3   74 17 FA 3E 60 4A B7 59  .7...B..t..>`J.Y
0060: 92 C1 E0 6F BB F1 BB 9F   82 89 B5 83 D5 AE 1E 90  ...o............
0070: 0A 89 8D FB 4C C0 C5 9E   DC C5 8C C6 2F EE D9 B4  ....L......./...
0080: 95 47 27 2E BE 82 31 6F   76 C0 DB 4C C8 0D 3B 7B  .G'...1ov..L..;.
0090: D1 6A BF BD 3B 93 30 04   A2 9E 81 F7 96 28 77 F2  .j..;.0......(w.
00A0: 32 05 68 44 1F B3 30 CE   40 9F 20 F3 B4 2B AA E6  2.hD..0.@. ..+..
00B0: 40 9B FB 7F 34 6E 3A 99   FD F8 28 F1 8C 9B 56 34  @...4n:...(...V4
00C0: 64 AD 4D 56 39 CB 96 18   50 9B 99 43 80 0A 39 A5  d.MV9...P..C..9.
00D0: 13 7A 6E C5 25 E0 95 4A   92 E5 A8 8B EE 03 49 B4  .zn.%..J......I.
00E0: D9 7C 00 E3 F0 3B A7 BA   40 30 CC 89 55 C6 97 93  .....;..@0..U...
00F0: B5 15 F6 62 D3 B1 74 9C   0B 80 2B 8A D4 03 84 A0  ...b..t...+.....

]
***
https-jsse-nio-8443-exec-8, closeOutboundInternal()
69, https-jsse-nio-8443-exec-8, SEND TLSv1.2 ALERT:  warning, description = close_notify
https-jsse-nio-8443-exec-9, WRITE: TLSv1.2 Handshake, length = 40
%% Cached server session: [Session-19, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384]
*** ClientKeyExchange, DH
DH Public key:  { *** ClientKeyExchange, DH
DH Public key:  { 108, 17, 156, 128, 208, 10, 120, 65, 73, 241, 28, 248, 30, 255, 246, 161, 88, 214, 10, 44, 188, 189, 21, 195, 12, 123, 206, 50, 36, 227, 136, 209, 195, 252, 163, 243, 8, 142, 129, 134, 86, 63, 158, 228, 113, 39, 25, 146, 66, 214, 194, 123, 136, 217, 0, 103, 7, 177, 128, 37, 143, 61, 110, 181, 10, 216, 241, 28, 158, 82, 214, 92, 154, 121, 200, 201, 41, 55, 91, 16, 210, 149, 30, 201, 233, 166, 240, 44, 208, 235, 73, 183, 248, 134, 36, 244, 59, 163, 140, 87, 99, 43, 86, 68, 243, 39, 23, 30, 81, 93, 214, 0000: 06 07 F1 C1 89 D3 EB E5   D6 B5 F7 5F 8E 32 BF 66  ..........._.2.fhttps-jsse-nio-8443-exec-4, closeOutboundInternal()
14https-jsse-nio-8443-exec-4, SEND TLSv1.2 ALERT:  warning, description = close_notify

0010: 46 65 9D 56 00 A1 C6 36   F0 A7 AC FD 1B 0C 15 53  Fe.V...6.......S
0020: 97 48 CA 69 69 60 30 1F   A6 25 15 B4 4F 07 8B E1  .H.ii`0..%..O...
0030: 62 43 4A D1 16 42 67 A4   9D 9C 98 3F 28 85 07 0F  bCJ..Bg....?(...
0040: 4E 17 08 C7 08 8F 2A 81   6C 17 79 39 C4 6C EB 67  N.....*.l.y9.l.g
0050: 58 07 44 E1 48 24 E5 1C   BA 82 59 EC 75 15 07 F8  X.D.H$....Y.u...https-jsse-nio-8443-exec-9, WRITE: TLSv1.2 Application Data, length = 85
217https-jsse-nio-8443-exec-8, WRITE: TLSv1.2 Alert, length = 26
https-jsse-nio-8443-exec-8, called closeOutbound()
https-jsse-nio-8443-exec-8, closeOutboundInternal()
, 66, 16, 254, 103, 7, 170, 44, 138, 77, 38, 128, 244, 97, 136, 232, 13, 228, 121, 226, 78, 119, 40, 107, 98, 127, 243, 53, 221, 102, 84, 125, 139, 65, 182, 194, 12, 97, 54, 211, 216, 92, 142, 200, 178, 100, 80, 219, 170, 221, 39, 20, 108, 139, 4, 28, 102, 10, 190, 134, 199, 197, 102, 108, 100, 54, 15, 203, 218, 135, 77, 26, 119, 86, 220, 126, 69, 89, 227, 136, 12, 64, 195, 16, 204, 249, 95, 30, 226, 22, 116, 178, 182, 175, 44, 8, 125, 83, 163, 182, 146, 169, 164, 113, 70, 122, 228, 226, 44, 161, 92, 194, 67, 74, 195, 229, 220, 72, 202, 161, 79, 253, 152, 170, 212, 34, 151, 227 }
SESSION KEYGEN:
PreMaster Secret:
0000: 31 CE 18 D8 9D 23 A1 B5   69 8B 38 E0 11 F3 C2 D5  1....#..i.8.....
0010: 8D 8E 9C 85 83 C3 A3 2E   30 34 67 3D BA C7 27 41  ........04g=..'A
0020: AF 7B 9E 04 46 6D 3C 3D   64 25 EF C2 DA 37 91 F2  ....Fm<=d%...7..
0030: F3 2B 2D C5 4B E3 9E 85   05 89 ED 7A 74 B5 3B BE  .+-.K......zt.;.
0040: F7 7E 0D E7 FC E7 A7 D1   7F 7B 49 65 B6 58 99 25  ..........Ie.X.%
0050: DF B5 0D A9 15 CB CF 4E   1C 70 45 51 07 97 B7 F0  .......N.pEQ....
0060: 03 62 FD F6 7F 36 CB 01   25 0B 02 0E A5 C2 C7 4D  .b...6..%......M
0070: 22 3F 6A 3D C8 59 C2 77   44 05 F3 2F 43 99 45 64  "?j=.Y.wD../C.Ed
https-jsse-nio-8443-exec-9, READ: TLSv1.2 Alert, length = 26
https-jsse-nio-8443-exec-9, RECV TLSv1.2 ALERT:  warning, close_notify
CONNECTION KEYGEN:
Client Nonce:
0000: A5 81 2F E2 3A 2D 62 21   0E CC C1 89 5D AF D8 EA  ../.:-b!....]...
0010: 53 F9 B7 63 E3 8A C2 7C   7D AF 7E 75 5C 5C 10 20  S..c.......u\\.
Server Nonce:
0000: 5C 7D 0F F8 6D EA BE C0   5C FC C2 E2 8B C7 61 B4  \...m...\.....a.
0010: FC F5 26 F5 3C A2 04 EA   4C 2F 27 BA AB 1D 8B 1D  ..&.<...L/'.....
Master Secret:
0000: 6B 4E 29 FC 53 96 4F 27   B5 C5 A9 CF 04 10 4B 55  kN).S.O'......KU
0010: 38 29 FD 18 E5 19 39 F5   21 44 82 10 36 E4 82 C9  8)....9.!D..6...
0020: 9C C9 37 4D C5 01 86 0C   73 B4 4C 11 24 48 78 56  ..7M....s.L.$HxV
... no MAC keys used for this cipher
Client write key:
0000: 3E 45 5E D7 E8 09 70 95   90 F3 C1 4C B6 12 39 90  >E^...p....L..9.
0010: 39 64 05 54 4C 30 16 67   26 8C 60 44 40 18 E8 78  9d.TL0.g&.`D@..x
Server write key:
0000: FE 96 86 35 A0 74 09 7D   EC F8 B2 3C 26 E5 AD 97  ...5.t.....<&...
0010: B8 0F C6 96 C9 9F 89 DE   01 04 85 48 6D 81 C3 28  ...........Hm..(
Client write IV:
0000: 9B 8C 75 4B                                        ..uK
Server write IV:
0000: 02 F9 BA 1C                                        ....
228, 133, 181, 118, 98, 94, 126, 198, 244, 76, 66, 233, 166, 55, 237, 107, 11, 255, 92, 182, 244, 6, 183, 237, 238, 56, 107, 251, 90, 137, 159, 165, 174, 159, 36, 17, 124, 75, 31, 230, 73, 40, 102, 81, 236, 230, 83, 129, 255, 255, 255, 255, 255, 255, 255, 255 }
*** Diffie-Hellman ServerKeyExchange
DH Modulus:  { https-jsse-nio-8443-exec-9, closeInboundInternal()
Using SSLEngineImpl.

0060: 7E 1A A7 BA 7D A0 A2 D4 Allow unsafe renegotiation: false
Allow legacy hello messages: true
Is initial handshake: true
Is secure renegotiation: false
https-jsse-nio-8443-exec-4, WRITE: TLSv1.2 Alert, length = 26
, 221, 110, 152, 48, 177, 67, 119, 61, 148, 144, 110, 84, 215, 169, 186, 148 }
  D9 93 D3 DF FE 7C 1E 75  ...............u
0070: F4 EE 25 43 E4 8E 6A CE   ED 61 81 6C 96 26 5B 81  ..%C..j..a.l.&[.
CONNECTION KEYGEN:
Client Nonce:
0000: C4 58 91 3E FE 99 0C 19   BB B9 48 6A 18 34 B1 59  .X.>......Hj.4.Y
0010: 39 CC 71 1C AB DD 3C 81   4C 64 98 34 BB B5 43 09  9.q...<.Ld.4..C.
Server Nonce:
0000: 5C 7D 0F F9 FA 30 0E C1   A2 4B A3 A8 C4 9C 30 2C  \....0...K....0,
0010: E4 57 BC DF 78 9E BD 5D   C3 CC 2C AC 25 48 B8 D7  .W..x..]..,.%H..
Master Secret:
0000: 3F AE FF 53 5E BE A1 7B   B8 AE 96 F8 D7 DA 5E 8B  ?..S^.........^.
0010: 73 01 C3 FE 6A D2 69 59   5A 2A EB 68 93 91 5D 01  s...j.iYZ*.h..].
0020: 9C 6D A6 DC FB 71 31 6C   93 9E 64 96 EE 92 12 38  .m...q1l..d....8
... no MAC keys used for this cipher
Client write key:
0000: CA F3 57 BB 1B 9F B4 DC   4F 81 55 30 2F 36 C2 DA  ..W.....O.U0/6..
0010: B6 61 CE EC 7D 50 31 94   47 D6 39 AE D2 76 37 53  .a...P1.G.9..v7S
Server write key:
0000: 1F 90 6D EB D9 6A AD 36   FD B1 33 50 96 A7 03 60  ..m..j.6..3P...`
0010: 9F AE 3A 26 98 6A 0C FD   2F 7B 69 3D 8C 28 88 82  ..:&.j../.i=.(..
Client write IV:
0000: 8A B5 6D FB                                        ..m.
Server write IV:
0000: F5 76 83 23                                        .v.#
https-jsse-nio-8443-exec-9, closeOutboundInternal()
255, 255, 255, 255, 255, 255, 255, 255, 201, 15, 218, 162, 33, 104, 194, DH Base:  { 2 }
https-jsse-nio-8443-exec-10, READ: TLSv1.2 Change Cipher Spec, length = 1
Server DH Public Key:  { 108, 72, 156, 59, 22, 114, 111, 178, 29, 114, 80, 255, 193, 191, 177, 52, 131, 240, 91, 170, 85, 235, 52, 99, 114, 209, 197, 66, 33, 228, 85, 52, 196, 198, 98, 139, 128, 220, 28, 209, 41, 2, 78, 8, 138, 103, 204, 116, 2, 11, 190, 166, 59, 19, 155, 34, 81, 74, 8, 121, 142, 52, 4, 221, 239, https-jsse-nio-8443-exec-9, SEND TLSv1.2 ALERT:  warning, description = close_notify
https-jsse-nio-8443-exec-7, READ: TLSv1.2 Change Cipher Spec, length = 1
SESSION KEYGEN:
PreMaster Secret:
https-jsse-nio-8443-exec-9, WRITE: TLSv1.2 Alert, length = 26
https-jsse-nio-8443-exec-7, READ: TLSv1.2 Handshake, length = 40
*** Finished
verify_data:  { 187, 197, 74, 200, 210, 62, 182, 103, 176, 63, 209, 187 }
***
https-jsse-nio-8443-exec-7, WRITE: TLSv1.2 Change Cipher Spec, length = 1
*** Finished
https-jsse-nio-8443-exec-4, called closeOutbound()
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1
https-jsse-nio-8443-exec-4, closeOutboundInternal()
verify_data:  { 123, 227, 214, 56, https-jsse-nio-8443-exec-9, called closeOutbound()
https-jsse-nio-8443-exec-9, closeOutboundInternal()
0000: D3 A6 A0 0C 7B B3 E7 26   FF 7E 0F 0A 97 27 4D BC  .......&.....'M.
00149, 25, 179, 205, 58, 67, 27, 48, 43, 10, 109, 242, 95, 20, 55, 79, 225, 53, 109, 109, 81, 194, 69, 228, 133, 181, 118, 98, 94, 126, 198, 244, 76, 66, 233, 166, 55, 237, 107, 11, 255, 92, 182, 244, 6, 183, 237, 238, 56, 107, 251, 90, 137, 159, 165, 174, 159, 36, 17, 124, 75, 31, 230, 73, 40, 102, 81, 236, 230, 83, 129, 255, 255, 255, 255, 255, 255, 255, 255 }
137, 70, 10, 55, 139, 190, 36, 218, 99, 113, 233, 147, 149, 92, https-jsse-nio-8443-exec-10, READ: TLSv1.2 Handshake, length = 40
221, 209, 8, 224, 218, 139, 248, 243, 168, 226, 97, 196*** Finished
verify_data:  { 204, 22, 137, 226, 238, 95, 164, 98, 114, 230, 202, 181 }
***
DH Base:  { 2 }
Server DH Public Key:  { 234, 42, 47, 127, 252, 84, 16, 254, 126, 141, 50, 23, 219, 84, 22, 110, 12, 85, 199, 24, 211, 55, 168, 25, 165, 4, 181, 27, 57, 211, 96, 243, 190, 167, 102, 83, 17, 253, 189, 8, 204, 127, 128, 217, 136, 119, 250, 44, 98, 245, 242, 236, 251, 180, 27, 237, 25, 225, 74, 59, 200, 52, 218, 24, 55, 170, 65, 204, 106, 200, 238, 102, 201, 140, 27, 233, 24, 56, 69, 1, 26, 150, 23, 176, 139, 161, 95, 130, 140, 222, 220, 39, 173, 63, 138, 153, 32, 193, 212, 160, 83, 232, 39, 134, 233, 221, 137, 210, 32, 207, 239, 142, 172, 215, 90, 31, 210, 68, 119, 14, 208, 85, 164, 22, 24, 142, 187, 31 }
1Signature Algorithm SHA256withRSA
Signed with a DSA or RSA public key
0: *** ServerHelloDone
195, 244, 97, 84, 21, 79, 111, 34 }
***
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1
https-jsse-nio-8443-exec-3, WRITE: TLSv1.2 Handshake, length = 1697
17 5A 41 6E 01 B0 43 77   B4 DA CB DD A1 7B A6 FF  .ZAn..Cw........
0020: E1 50 8D 62 68 E8 33 EC   BC 2E 18 51 0E 5A 79 23  .P.bh.3....Q.Zy#
0030: 8D 84 28 C2 22 5C EE 06   19 29 6E C4 5B 9E E8 04  ..(."\...)n.[...
0040: 56 35 77 3A 48 52 A3 22   16 16 3C 6E 4F 94 10 00  V5w:HR."..<nO...
0050: 4F 5D D7 51 6C 05 7C A1   80 05 D6 6A 8E 79 43 53  O].Ql......j.yCS
0060: B7 E7 8A 8F 8F FA F9 DD   64 95 4F FA 86 AA 49 0B  ........d.O...I.
0070: 59 A6 B9 89 E0 11 BE 0B   EC D3 59 BE A0 FC 3C E0  Y.........Y...<.
CONNECTION KEYGEN:
Client Nonce:
0000: B9 AB 6F 05 3D 5F 20 48   19 EC AD 7D 81 6F 1C 75  ..o.=_ H.....o.u
0010: DB EA 54 97 8A B0 85 73   CF 4C C7 45 5D 73 CD 44  ..T....s.L.E]s.D
Server Nonce:
0000: 5C 7D 0F F9 CC 19 39 1C   BE 99 85 6F 54 30 90 45  \.....9....oT0.E
0010: 8C 8E 27 E4 B0 61 83 48   33 90 20 47 5D 07 42 DE  ..'..a.H3. G].B.
Master Secret:
0000: E1 5A 27 5E 40 8F 52 A8   EF 27 54 8A 49 38 5B 47  .Z'^@.R..'T.I8[G
0010: E5 8B 76 4B 75 D4 12 99   26 29 D1 27 2F 2D 1C B8  ..vKu...&).'/-..
0020: DD B2 C6 4D 77 67 81 2C   98 AC 03 78 B8 93 01 9B  ...Mwg.,...x....
... no MAC keys used for this cipher
Client write key:
0000: DD F4 E7 91 2D C7 ED 8B   FF FD F0 5E 10 A9 62 22  ....-......^..b"
0010: 43 9F AB 13 4B 7A 10 2E   40 54 75 18 01 1B 69 96  C...Kz..@Tu...i.
Server write key:
0000: C7 1C A8 95 CB AD 13 E5   98 3F 87 8D CC 54 FF 3C  .........?...T.<
0010: 1D BC AB 9C FB 6F 08 E7   61 84 BA 14 A5 60 87 CD  .....o..a....`..
Client write IV:
0000: B7 29 F0 F0                                        .)..
Server write IV:
0000: A9 10 5D E0                                        ..].
https-jsse-nio-8443-exec-10, WRITE: TLSv1.2 Change Cipher Spec, length = 1
, https-jsse-nio-8443-exec-1, READ: TLSv1.2 Handshake, length = 134
*** Finished
verify_data:  { 211, 66, 204, 186, 72, 26, 84, 190, https-jsse-nio-8443-exec-7, WRITE: TLSv1.2 Handshake, length = 40
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1.1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1.1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1.1
https-jsse-nio-8443-exec-6, READ: TLSv1.2 Change Cipher Spec, length = 1
38*** ClientKeyExchange, DH
DH Public key:  { 47, 187, 37, 217, 229, 117, 168, %% Cached server session: [Session-23, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384]
https-jsse-nio-8443-exec-5, READ: TLSv1 Handshake, length = 512
https-jsse-nio-8443-exec-6, READ: TLSv1.2 Handshake, length = 40
183, 112, 82, 63 }
***
, 180, 38, 237, 36, 181, 226, 73, 221, 201, 51, 114, 43, 46, 42, 58, 181, 210, 149, 71, 248, 86, 150, 198, 188, 27, 244, 200, 57, 232, 139, 55, 38, 196, 47, 219, 51, 55, 77, 150, 57, 202, 148, 85, 209, 103, 6, 123, 221, 108, 214, 126, 219, 156, 86, 43, 165, 212, 11, 157, 25, 182, 116, 87, 48, 57, 159, 122, 140, 112, 104 }
Signature Algorithm SHA256withRSA
Signed with a DSA or RSA public key
*** ServerHelloDone
https-jsse-nio-8443-exec-2, WRITE: TLSv1.2 Handshake, length = 1697
https-jsse-nio-8443-exec-10, WRITE: TLSv1.2 Handshake, length = 40
%% Cached server session: [Session-21, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384]
222, 196, 58, 125, 15, 59, 115, 232, 212, 100, 52, 234, 110, 90, 128, 160, 75, 222, 138, 60, 236, 73, 89, 92, 252, 36, 94, 159, 96, 21, 23, 79, 14, 217, 161, 159, 184, 225, 14, 64, 239, 51, 214, 96, 208, 80, 122, 136, 7, 99, 176, 41, 202, 225, 105, 20, 96, 32, 164, 97, 200, 246, 255, 214, 179, 81, 63, 90, 59, 182, 62, 231, 238, 34, 61, 145, 85, 12, 225, 98, 227, 173, 64, 60, 25, 66, 142, 117, 164, 88, 254, 70, 20, 159, 8, 67, 153, 208, 119, 191, 88, 12, 141, 56, 197, 205, 11, 134, 80, 149, 164, 6, 44, 235, 63, 200, 84, 199, 113, 68, 42 }
https-jsse-nio-8443-exec-9, WRITE: TLSv1.2 Application Data, length = 84
*** Finished
*** ClientHello, TLSv1.2
RandomCookie:  GMT: -1407540691 bytes = { 100, 142, 74, 235, 7, 130, 6, 203, 13, 103, 200, 218, 255, 204, 229, 214, 115, 122, 62, 84, 254, 65, 124, 197, 1, 95, 125, 142 }
Session ID:  {92, 125, 15, 248, 181, 154, 125, 230, 61, 129, 18, 26, 1, 153, 235, 181, 199, 235, 208, 79, 250, 126, 110, 194, 87, 247, 95, 187, 134, 2, 227, 105}
Cipher Suites: [Unknown 0x13:0x2, Unknown 0x13:0x3, Unknown 0x13:0x1, Unknown 0x13:0x4, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa9, Unknown 0xc0:0xad, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0xac, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa8, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xc0:0x9d, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9c, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xaa, Unknown 0xc0:0x9f, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9e, TLS_DHE_RSA_WITH_AES_128_CBC_SHA]
Compression Methods:  { 0 }
Unsupported extension status_request, data: 01:00:00:00:00
Extension elliptic_curves, curve names: {secp256r1, secp384r1, secp521r1, unknown curve 29, unknown curve 256, unknown curve 257, unknown curve 258, unknown curve 259, unknown curve 260}
Extension ec_point_formats, formats: [uncompressed]
Extension signature_algorithms, signature_algorithms: SHA256withRSA, Unknown (hash:0x8, signature:0x9), Unknown (hash:0x8, signature:0x4), SHA256withECDSA, Unknown (hash:0x8, signature:0x7), SHA384withRSA, Unknown (hash:0x8, signature:0xa), Unknown (hash:0x8, signature:0x5), SHA384withECDSA, SHA512withRSA, Unknown (hash:0x8, signature:0xb), Unknown (hash:0x8, signature:0x6), SHA512withECDSA, SHA1withRSA, SHA1withECDSA
Unsupported extension type_35, data:
Unsupported extension type_51, data: 00:69:00:17:00:41:04:ea:6e:a1:3d:cc:70:1d:62:32:73:b2:03:da:a5:e6:08:35:5a:0e:cd:3d:ad:4b:bb:70:74:cd:c5:e9:0c:f6:9f:fd:f3:e2:28:bf:a7:47:1e:c6:dd:03:c0:c1:ff:06:20:7f:0e:88:17:c9:71:89:7d:7c:7a:01:89:77:73:9f:45:00:1d:00:20:2c:9d:e8:53:70:37:78:77:59:bd:80:b1:5c:50:38:7c:51:51:76:f2:9a:1a:71:f0:c2:ac:67:c6:ee:d3:a1:22
Unsupported extension type_43, data: 08:03:04:03:03:03:02:03:01
Extension renegotiation_info, renegotiated_connection: <empty>
Extension server_name, server_name: [type=host_name (0), value=localhost]
Unsupported extension type_45, data: 02:01:00
Unsupported extension type_28, data: 40:00
Unsupported extension type_21, data: 00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00
***
%% Initialized:  [Session-26, SSL_NULL_WITH_NULL_NULL]
Using SSLEngineImpl.
Allow unsafe renegotiation: false
Allow legacy hello messages: true
Is initial handshake: true
Is secure renegotiation: false
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1.1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1.1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1.1
https-jsse-nio-8443-exec-2, READ: TLSv1 Handshake, length = 512
*** ClientHello, TLSv1.2
RandomCookie:  verify_data:  { 122, 78, 228, 219, 63, 157, 186, 23, 116, 156, 230, 50 }
***
GMT: -669381688 bytes = { 187, 202, 7, 49, 65, 218, 105, 67, 133, 109, 20, 83, 210, 68, 110, 208, 107, 102, 182, 197, 91, 194, 59, 204, 13, 143, 15, 28 }
Session ID:  {92, 125, 15, 249, 66, 246, 149, 109, 237, 108, 197, 152, 185, 217, 183, 10, 51, 192, 241, 212, 4, 203, 186, 66, 179, 248, 130, 74, 46, 249, 186, 24}
Cipher Suites: [Unknown 0x13:0x2, Unknown 0x13:0x3, Unknown 0x13:0x1, Unknown 0x13:0x4, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa9, Unknown 0xc0:0xad, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0xac, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa8, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xc0:0x9d, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9c, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xaa, Unknown 0xc0:0x9f, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9e, TLS_DHE_RSA_WITH_AES_128_CBC_SHA]
https-jsse-nio-8443-exec-4, READ: TLSv1.2 Alert, length = 26
https-jsse-nio-8443-exec-7, WRITE: TLSv1.2 Application Data, length = 85
Standard ciphersuite chosen: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
%% Negotiating:  [Session-26, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384]
https-jsse-nio-8443-exec-4, RECV TLSv1.2 ALERT:  warning, close_notify
https-jsse-nio-8443-exec-4, closeInboundInternal()
https-jsse-nio-8443-exec-4, closeOutboundInternal()
https-jsse-nio-8443-exec-4, SEND TLSv1.2 ALERT:  warning, description = close_notify
https-jsse-nio-8443-exec-4, WRITE: TLSv1.2 Alert, length = 26
https-jsse-nio-8443-exec-4, called closeOutbound()
https-jsse-nio-8443-exec-4, closeOutboundInternal()
https-jsse-nio-8443-exec-3, READ: TLSv1.2 Handshake, length = 134
SESSION KEYGEN:
PreMaster Secret:
0000: 52 92 E4 78 30 28 6C 82   32 31 F1 70 54 0F EC 50  R..x0(l.21.pT..P
0010: 48 1A C6 0B A5 29 E8 7E   16 6A 4C 54 89 41 44 DA  H....)...jLT.AD.
0020: 02 BB CB 34 44 88 CC 5D   BD D4 87 FC C8 AB 91 11  ...4D..]........
0030: 41 FE DD A0 95 10 AA 2A   DA EB 1D 2D 86 75 B5 EC  A......*...-.u..
0040: A6 E9 E7 23 7B 68 BC F6   3A 45 BB 54 E2 37 D8 E0  ...#.h..:E.T.7..
0050: 92 70 51 0A 46 81 37 A6   E1 EC E4 22 C7 3F 61 2A  .pQ.F.7....".?a*
0060: 47 D9 B4 50 9C 7B 80 45   B3 B9 D2 F2 8E 73 65 95  G..P...E.....se.
0070: B9 AC 8D 42 C0 07 5D E0   EB E3 9B 51 E0 05 7D 7E  ...B..]....Q....
*** ServerHello, TLSv1.2
RandomCookie:  GMT: 1551699705 bytes = { 45, 154, 102, 90, 88, 165, 149, 227, 47, 102, 27, 133, 149, 125, 136, 0, 224, 23, 78, 120, 150, 217, 16, 224, 242, 236, 241, 240 }
Session ID:  {92, 125, 15, 249, 14, 195, 194, 111, 161, 3, 34, 99, 124, 78, 235, 106, 195, 192, 56, 64, 253, 184, 107, 141, 133, 130, 225, 46, 214, 255, 68, 213}
Cipher Suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
Compression Method: 0
Extension renegotiation_info, renegotiated_connection: <empty>
***
Cipher suite:  TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
*** Certificate chain
https-jsse-nio-8443-exec-7, READ: TLSv1.2 Alert, length = 26
https-jsse-nio-8443-exec-7, RECV TLSv1.2 ALERT:  warning, close_notify
https-jsse-nio-8443-exec-7, closeInboundInternal()
https-jsse-nio-8443-exec-7, closeOutboundInternal()
https-jsse-nio-8443-exec-7, SEND TLSv1.2 ALERT:  warning, description = close_notify
https-jsse-nio-8443-exec-7, WRITE: TLSv1.2 Alert, length = 26
https-jsse-nio-8443-exec-7, called closeOutbound()
https-jsse-nio-8443-exec-7, closeOutboundInternal()
Compression Methods:  { 0 }
Unsupported extension status_request, data: 01:00:00:00:00
Extension elliptic_curves, curve names: {secp256r1, secp384r1, secp521r1, unknown curve 29, unknown curve 256, unknown curve 257, unknown curve 258, unknown curve 259, unknown curve 260}
Extension ec_point_formats, formats: [uncompressed]
Extension signature_algorithms, signature_algorithms: SHA256withRSA, Unknown (hash:0x8, signature:0x9), Unknown (hash:0x8, signature:0x4), SHA256withECDSA, Unknown (hash:0x8, signature:0x7), SHA384withRSA, Unknown (hash:0x8, signature:0xa), Unknown (hash:0x8, signature:0x5), SHA384withECDSA, SHA512withRSA, Unknown (hash:0x8, signature:0xb), Unknown (hash:0x8, signature:0x6), SHA512withECDSA, SHA1withRSA, SHA1withECDSA
Unsupported extension type_35, data:
Unsupported extension type_51, data: 00:69:00:17:00:41:04:c2:d7:69:f4:41:8a:c6:5f:48:1c:09:b1:9a:f7:41:95:8e:b2:a2:3c:19:bc:3c:c9:df:b3:25:2c:01:76:98:9b:36:ca:8a:64:68:cd:1d:f1:2a:1e:12:f8:55:c8:da:21:fc:66:8f:f7:e5:04:57:ff:e5:99:50:ab:ff:c0:3a:9e:00:1d:00:20:c3:70:7f:67:9f:74:56:24:fa:71:12:59:6f:94:10:4c:9c:6a:16:e2:c5:34:a0:d9:e3:5e:a0:c0:cf:76:89:0d
Unsupported extension type_43, data: 08:03:04:03:03:03:02:03:01
Extension renegotiation_info, renegotiated_connection: <empty>
Extension server_name, server_name: [type=host_name (0), value=localhost]
Unsupported extension type_45, data: 02:01:00
Unsupported extension type_28, data: 40:00
Unsupported extension type_21, data: 00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00
***
https-jsse-nio-8443-exec-6, WRITE: TLSv1.2 Change Cipher Spec, length = 1
*** ClientKeyExchange, DH
DH Public key:  { 179, 73, 133, 96, 31, 85, 116, 53, 181, 121, 152, 48, 245, 130, 205, 178, 160, 125, 78, 213, 33, 236, 152, 111, 74, 26, 80, 26, 53, 158, 71, 97, 179, 113, 212, 117, 6, 189, 8, 130, 189, 10, 102, 18%% Initialized:  [Session-27, SSL_NULL_WITH_NULL_NULL]
CONNECTION KEYGEN:
Client Nonce:
0000: 04 16 76 82 64 6A F4 A7   43 5D D5 4C E9 09 6E C7  ..v.dj..C].L..n.
0010: 2B 1D D0 A6 BC 30 2F ED   08 C0 09 36 96 DC B8 87  +....0/....6....
Server Nonce:
0000: 5C 7D 0F F9 81 3D 71 D4   9F EB 7A C5 FF 31 58 6F  \....=q...z..1Xo
0010: E5 D5 7E 44 93 A9 10 AB   FA 5E A4 4B E8 0C 49 4B  ...D.....^.K..IK
Master Secret:
0000: DE F2 08 1C 72 8A 08 82   24 2D B3 9D 14 7C 5D FC  ....r...$-....].
0010: FE 13 4C E4 CB F6 2C 4F   08 F8 FA F6 4B CF 73 8F  ..L...,O....K.s.
0020: 1B BF 4C 8A 07 12 C5 0B   93 B5 1B 50 DA 50 7E E2  ..L........P.P..
... no MAC keys used for this cipher
Client write key:
0000: 2F 62 79 EE C5 B2 DC 7D   63 95 AC 3C E7 5F 2C DA  /by.....c..<._,.
0010: F2 55 18 D0 AE AC F1 68   D4 54 71 14 6B 73 6D 8E  .U.....h.Tq.ksm.
Server write key:
0000: 74 B7 DB E9 78 BA F0 C6   FC F3 F7 B2 AF 8F 7B 67  t...x..........g
0010: DC 08 56 F3 0B 90 3F FE   C4 13 31 32 4C AF 40 2A  ..V...?...12L.@*
Client write IV:
0000: 8F 64 0A 96                                        .d..
Server write IV:
0000: 1E 4C 16 EA                                        .L..
Using SSLEngineImpl.
chain [0] = [
[
  Version: V3
  Subject: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US
  Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5

  Key:  Sun RSA public key, 2048 bits
  modulus: 21944740401167172627731583459321030363948627215746053925732477915060915436180167456469785746662093119306577380200747716284652995937004530444336851845029170241627465854006145050037178991946925696078563485570896673835545540824265905937881682387179314987285174428010940266412458943894800978345731524307952507729956745301047871771953945124256516782917326981125087548987889540650149121302888872237484100834740328828765018090383963294418357028839734723410564800765871733483849269364796949055153420777966213779145518299141217288017794394762274753999989298548507425930217302947589819396239489846633419099079578249651345685751
  public exponent: 65537
  Validity: [From: Fri May 30 08:43:19 GMT 2014,
               To: Mon May 27 08:43:19 GMT 2024]
  Issuer: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US
  SerialNumber: [    a6ef7a9a 5368eb27]

Certificate Extensions: 3
[1]: ObjectId: 2.5.29.35 Criticality=false
AuthorityKeyIdentifier [
KeyIdentifier [
0000: 78 0D 96 9D FE D3 0B BE   8C C7 E3 EC 67 04 AB 4B  x...........g..K
0010: EA E0 00 29                                        ...)
]
]

[2]: ObjectId: 2.5.29.19 Criticality=false
BasicConstraints:[
  CA:true
  PathLen:2147483647
]

[3]: ObjectId: 2.5.29.14 Criticality=false
SubjectKeyIdentifier [
KeyIdentifier [
0000: 78 0D 96 9D FE D3 0B BE   8C C7 E3 EC 67 04 AB 4B  x...........g..K
0010: EA E0 00 29                                        ...)
]
]

]
  Algorithm: [SHA1withRSA]
  Signature:
0000: 19 16 5A 21 99 21 24 98   3C 0A E8 D8 00 AB 44 24  ..Z!.!$.<.....D$
0010: F2 0C B7 83 D5 9F 96 17   87 E2 1F 1D A3 47 68 C7  .............Gh.
0020: 68 4A CB 56 0E 77 2B E8   1A 9F E7 09 A1 19 77 D0  hJ.V.w+.......w.
0030: 5E CC C1 B3 9A C4 35 3D   CB E0 A5 A6 43 5D A3 26  ^.....5=....C].&
0040: A4 91 8A C1 FA 7B 10 EA   DC C3 C7 1C 47 DC 97 32  ............G..2
0050: C0 37 80 1C F1 42 10 E3   74 17 FA 3E 60 4A B7 59  .7...B..t..>`J.Y
0060: 92 C1 E0 6F BB F1 BB 9F   82 89 B5 83 D5 AE 1E 90  ...o............
0070: 0A 89 8D FB 4C C0 C5 9E   DC C5 8C C6 2F EE D9 B4  ....L......./...
0080: 95 47 27 2E BE 82 31 6F   76 C0 DB 4C C8 0D 3B 7B  .G'...1ov..L..;.
0090: D1 6A BF BD 3B 93 30 04   A2 9E 81 F7 96 28 77 F2  .j..;.0......(w.
00A0: 32 05 68 44 1F B3 30 CE   40 9F 20 F3 B4 2B AA E6  2.hD..0.@. ..+..
00B0: 40 9B FB 7F 34 6E 3A 99   FD F8 28 F1 8C 9B 56 34  @...4n:...(...V4
00C0: 64 AD 4D 56 39 CB 96 18   50 9B 99 43 80 0A 39 A5  d.MV9...P..C..9.
00D0: 13 7A 6E C5 25 E0 95 4A   92 E5 A8 8B EE 03 49 B4  .zn.%..J......I.
00E0: D9 7C 00 E3 F0 3B A7 BA   40 30 CC 89 55 C6 97 93  .....;..@0..U...
00F0: B5 15 F6 62 D3 B1 74 9C   0B 80 2B 8A D4 03 84 A0  ...b..t...+.....

]
***
Allow unsafe renegotiation: false
Allow legacy hello messages: true
Is initial handshake: true
Is secure renegotiation: false
https-jsse-nio-8443-exec-1, READ: TLSv1.2 Change Cipher Spec, length = 1
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1.1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1.1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1.1
https-jsse-nio-8443-exec-1, READ: TLSv1.2 Handshake, length = 40
*** Finished
verify_data:  { 254, 120, 247, 119, 80, 115, 73, 8, 6, 49, 109, 215 }
***
Standard ciphersuite chosen: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
, 181, 161, 188, 73, 138, 97, 187, 233, 64, 66, 211, 32, 125, 147, 206, 185, 130, 222, 65, 181, 35, 153, 175, 201, 215, 221, 157, 40, 135, 44, *** Finished
%% Negotiating:  [Session-27, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384]
*** ServerHello, TLSv1.2
RandomCookie:  GMT: 1551699705 bytes = { 80, 31, 123, 42, 18, 17, 171, 17, 214, 173, 136, 103, 162, 42, 232, 209, 89, 181, 43, 112, 149, 36, 118, 63, 122, 226, 122, 168 }
Session ID:  {92, 125, 15, 249, 54, 170, 116, 2, 191, 242, 80, 152, 41, 194, 186, 125, 229, 187, 186, 200, 141, 185, 230, 141, 230, 195, 47, 61, 33, 116, 204, 226}
Cipher Suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
Compression Method: 0
Extension renegotiation_info, renegotiated_connection: <empty>
***
Cipher suite:  TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
*** Certificate chain
chain [0] = [
[
  Version: V3
  Subject: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US
  Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5

  Key:  Sun RSA public key, 2048 bits
  modulus: 21944740401167172627731583459321030363948627215746053925732477915060915436180167456469785746662093119306577380200747716284652995937004530444336851845029170241627465854006145050037178991946925696078563485570896673835545540824265905937881682387179314987285174428010940266412458943894800978345731524307952507729956745301047871771953945124256516782917326981125087548987889540650149121302888872237484100834740328828765018090383963294418357028839734723410564800765871733483849269364796949055153420777966213779145518299141217288017794394762274753999989298548507425930217302947589819396239489846633419099079578249651345685751
  public exponent: 65537
  Validity: [From: Fri May 30 08:43:19 GMT 2014,
               To: Mon May 27 08:43:19 GMT 2024]
  Issuer: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US
  SerialNumber: [    a6ef7a9a 5368eb27]

Certificate Extensions: 3
[1]: ObjectId: 2.5.29.35 Criticality=false
AuthorityKeyIdentifier [
KeyIdentifier [
0000: 78 0D 96 9D FE D3 0B BE   8C C7 E3 EC 67 04 AB 4B  x...........g..K
0010: EA E0 00 29                                        ...)
]
]

[2]: ObjectId: 2.5.29.19 Criticality=false
BasicConstraints:[
  CA:true
  PathLen:2147483647
]

[3]: ObjectId: 2.5.29.14 Criticality=false
SubjectKeyIdentifier [
KeyIdentifier [
0000: 78 0D 96 9D FE D3 0B BE   8C C7 E3 EC 67 04 AB 4B  x...........g..K
0010: EA E0 00 29                                        ...)
]
]

]
  Algorithm: [SHA1withRSA]
  Signature:
0000: 19 16 5A 21 99 21 24 98   3C 0A E8 D8 00 AB 44 24  ..Z!.!$.<.....D$
0010: F2 0C B7 83 D5 9F 96 17   87 E2 1F 1D A3 47 68 C7  .............Gh.
0020: 68 4A CB 56 0E 77 2B E8   1A 9F E7 09 A1 19 77 D0  hJ.V.w+.......w.
0030: 5E CC C1 B3 9A C4 35 3D   CB E0 A5 A6 43 5D A3 26  ^.....5=....C].&
0040: A4 91 8A C1 FA 7B 10 EA   DC C3 C7 1C 47 DC 97 32  ............G..2
0050: C0 37 80 1C F1 42 10 E3   74 17 FA 3E 60 4A B7 59  .7...B..t..>`J.Y
0060: 92 C1 E0 6F BB F1 BB 9F   82 89 B5 83 D5 AE 1E 90  ...o............
0070: 0A 89 8D FB 4C C0 C5 9E   DC C5 8C C6 2F EE D9 B4  ....L......./...
0080: 95 47 27 2E BE 82 31 6F   76 C0 DB 4C C8 0D 3B 7B  .G'...1ov..L..;.
0090: D1 6A BF BD 3B 93 30 04   A2 9E 81 F7 96 28 77 F2  .j..;.0......(w.
00A0: 32 05 68 44 1F B3 30 CE   40 9F 20 F3 B4 2B AA E6  2.hD..0.@. ..+..
00B0: 40 9B FB 7F 34 6E 3A 99   FD F8 28 F1 8C 9B 56 34  @...4n:...(...V4
00C0: 64 AD 4D 56 39 CB 96 18   50 9B 99 43 80 0A 39 A5  d.MV9...P..C..9.
00D0: 13 7A 6E C5 25 E0 95 4A   92 E5 A8 8B EE 03 49 B4  .zn.%..J......I.
00E0: D9 7C 00 E3 F0 3B A7 BA   40 30 CC 89 55 C6 97 93  .....;..@0..U...
00F0: B5 15 F6 62 D3 B1 74 9C   0B 80 2B 8A D4 03 84 A0  ...b..t...+.....

]
***
*** Diffie-Hellman ServerKeyExchange
DH Modulus:  { 255, 255, 255, 255, 255, 255, 255, 255, 201, 15, 218, 162, 33, 104, 194, 52, 196, 198, 98, 139, 128, 220, 28, 209, 41, 2, 78, 8, 138, 103, 204, 116, 2, 11, 190, 166, 59, 19, 155, 34, 81, 74, 8, 121, 142, 52, 4, 221, 239, 149, 25, 179, 205, 58, 67, 27, 48, 43, 10, 109, 242, 95, 20, 55, 79, 225, 53, 109, 109, 81, 194, 69, 228, 133, 181, 118, 98, 94, 126, 198, 244, 76, 66, 233, 166, 55, 237, 107, 11, 255, 92, 182, 244, 6, 183, 237, 238, 56, 107, 251, 90, 137, 159, 165, 174, 159, 36, 17, 124, 75, 31, 230, 73, 40, 102, 81, 236, 230, 83, 129, 255, 255, 255, 255, 255, 255, 255, 255 }
DH Base:  { 2 }
Server DH Public Key:  { 249, 34, 4, 101, 120, 235, 46, 202, 135, 27, 12, 183, 69, 27, 56, 183, 128, 15, 188, 63, 158, 109, 86, 66, 186, 116, 147, 111, 177, 249, 204, 128, 220, 61, 227, 180, 97, 212, 28, 169, 156, 160, 180, 158, 209, 1, 28, 155, 37, 226, 126, 40, 48, 30, 49, 13, 193, 79, 106, 131, 143, 23, 91, 116, 210, 40, 61, 98, 216, 198, 148, 65, 193, 205, 207, 219, 150, 178, 90, 235, 39 }
https-jsse-nio-8443-exec-1, WRITE: TLSv1.2 Change Cipher Spec, length = 1
*** Finished
verify_data:  { 213, 15, 44, 237, 170, 168, 164, 162, 170, 0, 9, 124 }
***
SESSION KEYGEN:
PreMaster Secret:
0000: EE F3 D6 81 E9 EA F3 21   FD 6F 79 89 BA 30 1D 72  .......!.oy..0.r
0010: BD 14 4A 8D B1 93 0B BB   33 8C 48 60 7C 20 72 78  ..J.....3.H`. rx
0020: 87 F7 AD 67 87 CF A5 3A   B2 F6 62 35 3D 9A E5 C2  ...g...:..b5=...
0030: 0F 37 03 82 88 35 06 9C   D8 4B A1 0E 1C B0 E1 E0  .7...5...K......
0040: 73 3F AD 6F 3B C1 36 DC   DE A3 E8 5C 60 92 7E C7  s?.o;.6....\`...
0050: AC 98 CD FE CE 81 55 73   BE 69 CC 4F AA F7 06 6A  ......Us.i.O...j
0060: 5C 24 A3 D9 11 B7 9F 5F   F4 B2 91 2C D1 B5 01 51  \$....._...,...Q
0070: 82 05 5D 02 14 8B 3A ED   34 D8 C7 19 D7 A8 0C 14  ..]...:.4.......
*** Diffie-Hellman ServerKeyExchange
DH Modulus:  { 255, 255, 255, 255, 255, 255, 255, 255, 201, 15, 218, 162, 33, 104, 194, 52, 196, 198, 98, 139, 128, 220, 28, 209, 41, 2, 78, 8, 138, 103, 204, 116, 2, 11, 190, 166, 59, 19, 155, 34, 81, 74, 8, 121, 142, 52, 4, 221, 239, 149, 25, 179, 205, 58, 67, 27, 48, 43, 10, 109, 242, 95, 20, 55, 79, 225, 53, 109, 109, 81, 194, 69, 228, 133, 181, 118, 98, 94, 126, 198, 244, 76, 66, 233, 166, 55, 237, 107, 11, 255, 92, 182, 244, 6, 183, 237, 238, 56, 107, 251, 90, 137, 159, 165, 174, 159, 36, 17, 124, 75, 31, 230, 73, 40, 102, 81, 236, 230, 83, 129, 255, 255, 255, 255, 255, 255, 255, 255 }
DH Base:  { 2 }
Server DH Public Key:  { 80, 151, 179, 151, 251, 100, 14, 216, 123, 15, 182, 247, 50, 15, 40, 67, 162, 250, 36, 53, 151, 185, 10, 56, 153, 170, 223, 122, 24, 236, 1, 45, 125, 139, 247, 103, 57, 66, 218, 138, 134, 156, 251, 184, 225, 239, 99, 111, 0, 20, 33, 179, 160, 35, 178, 16, 9, 93, 106, 170, 242, 187, 47, 90, 60, 15, 93, 140, 123, 93, 252, 246, 226, 187, 205, 194, 197, 166, 88, 101, 252, 216, 80, 174, 68, 59, 166, 159, 57, 241, 33, 93, 215, 254, 169, 240, 219, 58, 85, 228, 131, 238, 188, 83, 198, 169, 8, 209, 49, 168, 22, 145, 145, 47, 43, 173, 255, 203, 54, 41, 85, 152, 14, 121, 253, 96, 89, 179 }
https-jsse-nio-8443-exec-10, READ: TLSv1 Handshake, length = 512
Signature Algorithm SHA256withRSA
Signed with a DSA or RSA public key
https-jsse-nio-8443-exec-1, WRITE: TLSv1.2 Handshake, length = 40
*** ServerHelloDone
6%% Cached server session: [Session-24, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384]
CONNECTION KEYGEN:
Client Nonce:
0000: E8 45 BF 85 2D CE D4 2E   5C D6 CE F4 35 0C B5 78  .E..-...\...5..x
0010: DC 0C 82 5A DB A0 92 C5   84 8A E8 31 9E 10 68 42  ...Z.......1..hB
Server Nonce:
0000: 5C 7D 0F F9 6B 66 57 5E   53 B0 9F BB 33 3F 07 01  \...kfW^S...3?..
0010: 7E 48 98 A4 35 26 50 B0   EC 6C F0 01 02 A6 77 A1  .H..5&P..l....w.
Master Secret:
0000: A9 FA DC 5E 37 2E 0E 92   51 86 01 D1 FC DC 88 84  ...^7...Q.......
0010: D6 6A 83 69 B8 34 92 5F   F4 98 DD CE 6E 05 25 FF  .j.i.4._....n.%.
0020: AE 05 D9 15 93 88 01 21   BA 6E 55 F4 57 6B FF 58  .......!.nU.Wk.X
... no MAC keys used for this cipher
Client write key:
0000: B1 9D 52 D8 FC 66 96 78   49 0A 14 54 5F E4 E0 01  ..R..f.xI..T_...
0010: C8 BA EC F8 6F F5 FA 64   AF B8 5C 77 00 68 F5 83  ....o..d..\w.h..
Server write key:
0000: CA AC EA 46 4B DA 60 C2   77 BA E2 26 35 A0 7E F1  ...FK.`.w..&5...
0010: 9D D4 25 CA 3E F9 4B 39   54 BF 6D 07 B8 FA 2D FF  ..%.>.K9T.m...-.
Client write IV:
0000: 5B 72 2B 8C                                        [r+.
Server write IV:
0000: 17 9D 24 C0                                        ..$.
verify_data:  { 109, 123, 53, 207, 202, 145, 224, 178, 64, 216, 144, 213 }
***
*** ClientHello, TLSv1.2
RandomCookie:  GMT: -1445835424 bytes = { 93, 113, https-jsse-nio-8443-exec-3, READ: TLSv1.2 Change Cipher Spec, length = 1
https-jsse-nio-8443-exec-3, READ: TLSv1.2 Handshake, length = 40
https-jsse-nio-8443-exec-6, WRITE: TLSv1.2 Handshake, length = 40
%% Cached server session: [Session-22, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384]
https-jsse-nio-8443-exec-2, WRITE: TLSv1.2 Handshake, length = 1697
, 162, 63, 57, 114, 142, 115, 205, 73, 95, 34, 164, 142, 24, 246, 3, 31, 252, 207, 60, 17, 3, 250, 180, 231, 177, 219, 105, 157, 165, 237, 234, 109, 224, 226, 67, 68, 83, 76, 155, 82, 152, 133, 163, 55, 173, 24, 242, 30, 75, 250, 16, 6, 210, 156, 15, 111, 33, 77, 65, 16, 206, 157, 130, 39, 5, 237, 33, 204, 180, 77, 188, 133, 186, 247, 192, 115, 154, 176, 151, 147, 135, 56, 4, 68, 69, 177, 138, 135, 76, 195, 109, 171, 83, 165, 177, 60, 152, 160, 213, 193 }
Signature Algorithm SHA256withRSA
Signed with a DSA or RSA public key
*** ServerHelloDone
https-jsse-nio-8443-exec-5, WRITE: TLSv1.2 Handshake, length = 1697
https-jsse-nio-8443-exec-7, WRITE: TLSv1.2 Application Data, length = 84
https-jsse-nio-8443-exec-1, WRITE: TLSv1.2 Application Data, length = 86
*** Finished
verify_data:  { 9, 216, 105, 120, 42, 26, 130, 219, 218, 43, 136, 236 }
***
https-jsse-nio-8443-exec-3, WRITE: TLSv1.2 Change Cipher Spec, length = 1
*** Finished
verify_data:  { 126, 33, 145, 31, 210, 188, 44, 237, 241, 185, 61, 118 }
***
211https-jsse-nio-8443-exec-3, WRITE: TLSv1.2 Handshake, length = 40
%% Cached server session: [Session-25, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384]
, https-jsse-nio-8443-exec-7, READ: TLSv1.2 Handshake, length = 134
230, 40, 177, 3, 127, 110, 55, 83, 130, 57, 195, 152, 48, 217https-jsse-nio-8443-exec-3, READ: TLSv1.2 Handshake, length = 134
Using SSLEngineImpl.
Using SSLEngineImpl.
Allow unsafe renegotiation: false
Allow legacy hello messages: true
Is initial handshake: true
Is secure renegotiation: false
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1.1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1.1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1.1
https-jsse-nio-8443-exec-5, READ: TLSv1 Handshake, length = 512
*** ClientHello, TLSv1.2
RandomCookie:  GMT: 2053401816 bytes = { 148, 224, 14, 77, 32, 125, 24, 57, 203, 77, 181, 170, 4, 106, 213, 199, 228, 235, 52, 181, 11, 112, 93, 112, 171, 49, 10, 37 }
Session ID:  {92, 125, 15, 249, 156, 49, 93, 110, 51, 118, 78, 147, 13, 67, 50, 119, 4, 139, 247, 123, 140, 61, 206, 121, 197, 180, 71, 56, 123, 67, 20, 120}
Cipher Suites: [Unknown 0x13:0x2, Unknown 0x13:0x3, Unknown 0x13:0x1, Unknown 0x13:0x4, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa9, Unknown 0xc0:0xad, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0xac, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa8, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xc0:0x9d, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9c, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xaa, Unknown 0xc0:0x9f, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9e, TLS_DHE_RSA_WITH_AES_128_CBC_SHA]
Compression Methods:  { 0 }
Unsupported extension status_request, data: 01:00:00:00:00
Extension elliptic_curves, curve names: {secp256r1, secp384r1, secp521r1, unknown curve 29, unknown curve 256, unknown curve 257, unknown curve 258, unknown curve 259, unknown curve 260}
Extension ec_point_formats, formats: [uncompressed]
Extension signature_algorithms, signature_algorithms: SHA256withRSA, Unknown (hash:0x8, signature:0x9), Unknown (hash:0x8, signature:0x4), SHA256withECDSA, Unknown (hash:0x8, signature:0x7), SHA384withRSA, Unknown (hash:0x8, signature:0xa), Unknown (hash:0x8, signature:0x5), SHA384withECDSA, SHA512withRSA, Unknown (hash:0x8, signature:0xb), Unknown (hash:0x8, signature:0x6), SHA512withECDSA, SHA1withRSA, SHA1withECDSA
Unsupported extension type_35, data:
Unsupported extension type_51, data: 00:69:00:17:00:41:04:f9:06:ae:3a:6e:b4:87:2a:fa:17:d6:c4:a1:e0:7f:a7:52:81:89:35:22:ce:b1:4e:7d:98:8b:32:1f:ff:a0:f5:b1:d0:6f:18:6c:3a:9f:af:e4:fe:af:cc:f3:b1:46:ea:af:d7:81:d0:5b:fe:84:e3:64:39:8e:83:0a:d2:8d:2a:00:1d:00:20:04:e8:b1:f6:ce:ee:4a:44:2c:85:1b:4c:68:d1:47:d9:c4:9e:83:e8:c7:ba:14:7d:9a:03:44:84:a8:9c:0b:20
Unsupported extension type_43, data: 08:03:04:03:03:03:02:03:01
Extension renegotiation_info, renegotiated_connection: <empty>
Extension server_name, server_name: [type=host_name (0), value=localhost]
Unsupported extension type_45, data: 02:01:00
Unsupported extension type_28, data: 40:00
Unsupported extension type_21, data: 00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00
***
%% Initialized:  [Session-28, SSL_NULL_WITH_NULL_NULL]
Standard ciphersuite chosen: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
*** ClientKeyExchange, DH
DH Public key:  { 48, 34, 64, 24, 169, 248, 73, 199, 172, 0, 53, 197, 133, 94, 1, 70, 20, 133, 212, 110, 67, 193, 147, 251, 211, 241, 172, 249, 40, 136, 249, 104, 176, 108, 236, 138, 221, 229, 138, 95, 20, 190, 23, 133, 254, 135, 8, 208, 29, 148, 3, 232, 220, 14, 178, 18, 91, 41, 233, 18, 133, 160, 199, 16, 74, 14, 148, 119, 193, 72, 180, 136, 227, 104, 159, 200, 249, 195, 136, 110, 43, 165, 113, 78, 149, 130, 79, 14, 90, 117, 196, 45, 47, 214, 59, 52, 141, 124, 109, 186, 28, 69, 1, 18, 28, 47, 2, 252, 137, 190, 111, 13, 192, 154, 57, 127, 33, 51, 211, 81, 252, 179, 48, 82, 135, 189, 138, 230 }
https-jsse-nio-8443-exec-8, READ: TLSv1.2 Alert, length = 26
https-jsse-nio-8443-exec-8, RECV TLSv1.2 ALERT:  warning, close_notify
https-jsse-nio-8443-exec-8, closeInboundInternal()
https-jsse-nio-8443-exec-8, closeOutboundInternal()
https-jsse-nio-8443-exec-8, SEND TLSv1.2 ALERT:  warning, description = close_notify
https-jsse-nio-8443-exec-8, WRITE: TLSv1.2 Alert, length = 26
https-jsse-nio-8443-exec-8, called closeOutbound()
https-jsse-nio-8443-exec-8, closeOutboundInternal()
SESSION KEYGEN:
PreMaster Secret:
0000: DC 0C 88 10 59 F4 10 07   C1 F2 1B C8 E6 6E 7D 06  ....Y........n..
0010: EA 55 E7 B4 A5 91 1D AC   33 5A 8D B7 FB 7D 47 FE  .U......3Z....G.
0020: 50 CB 29 99 E4 4A 93 92   54 80 D6 06 76 22 6B AA  P.)..J..T...v"k.
0030: 46 A7 34 0F DF 17 EB 88   7B 61 90 AD 93 D6 B7 8B  F.4......a......
0040: 75 4F BD 18 77 E9 1F 69   90 30 B9 B6 44 48 BF 90  uO..w..i.0..DH..https-jsse-nio-8443-exec-9, WRITE: TLSv1.2 Application Data, length = 84
, https-jsse-nio-8443-exec-4, READ: TLSv1.2 Alert, length = 26

0050: DC 56 B8 65 A1 7C 41 E3   44 40 FD 7B 67 BB D7 39  .V.e..A.D@..g..9
0060: 7C A8 9D E7 8E D0 DD D1   A5 6A 52 62 51 42 7B FF  .........jRbQB..
0070: FB 7E 70 B7 50 4D EC D2   80 D2 65 0C 2B FB BE 20  ..p.PM....e.+..
80, 6, 182, 162, 250, 225, 14, Using SSLEngineImpl.
*** ClientKeyExchange, DH
DH Public key:  { 11, 36, 95, 147, 200, 46, 23, 65, 34, 175, 80, 49, 72, 42, 126, 86, 62, 9, 40, 189, 190, 210, 21, 223, 253, 20, 2, 176, 106, 70, 77, 249, 108, 194, 235, 107, 25, 221, 69, 129, 163, 186, 246, 65, 168, 31, 15, 157, 201, 228, 34, 55, 229, 239, 111, 159, 193, 164, 13, 186, 114, 193, 34, 35, 51, 78, 254, 20, 119, 47, 3, 36, 245, 116, 33, 138, 69, 59, 130, 134, 135, 59, 131, 130, 186, 60, 146, 202, 238, 176, 24, 0, 14, 206, 239, 32, 11, 250, 126, 87, 42, 187, 5, 62, 46, 135, 183, 132, 77, 201, 220, 7, 229, 173, 227, 53, 109, 131, 105, 1, 46, 233, 226, 240, 39, 215, 169, 173 }
Allow unsafe renegotiation: false
Allow legacy hello messages: true
Is initial handshake: true
Is secure renegotiation: false
%% Negotiating:  [Session-28, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384]
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1
CONNECTION KEYGEN:
Client Nonce:
0000: D8 1A 0C C8 BB CA 07 31   41 DA 69 43 85 6D 14 53  .......1A.iC.m.S
0010: D2 44 6E D0 6B 66 B6 C5   5B C2 3B CC 0D 8F 0F 1C  .Dn.kf..[.;.....
Server Nonce:
0000: 5C 7D 0F F9 50 1F 7B 2A   12 11 AB 11 D6 AD 88 67  \...P..*.......g
0010: A2 2A E8 D1 59 B5 2B 70   95 24 76 3F 7A E2 7A A8  .*..Y.+p.$v?z.z.
Master Secret:
0000: 4C 3E 9F 8D 91 B9 5E 89   4F F1 CF AB 0A 3B 96 2D  L>....^.O....;.-
0010: 65 21 CC 6C A2 3F 26 11   4B FA 66 B1 9A 0E 9E E6  e!.l.?&.K.f.....
0020: E6 0D AF 92 3D 05 53 FB   B8 FD 44 30 74 08 97 CA  ....=.S...D0t...
... no MAC keys used for this cipher
Client write key:
0000: E7 95 1C B0 04 D1 CA 47   F7 86 E5 A6 86 F1 59 9D  .......G......Y.
0010: F4 DD 9A AB 7E 82 5D 7B   3A 44 51 ED B8 2C EB 9A  ......].:DQ..,..
Server write key:
0000: 43 D0 63 5E 94 0D 92 74   9E 56 06 38 2B E2 66 F6  C.c^...t.V.8+.f.
0010: 43 6C BA EF 67 4F 02 AC   C8 C2 F6 CB 63 45 F8 8D  Cl..gO......cE..
Client write IV:
0000: 45 0F CF 5E                                        E..^
Server write IV:
0000: CE CA A5 94                                        ....
Allow unsafe renegotiation: false
Allow legacy hello messages: true
Is initial handshake: true
Is secure renegotiation: false
64https-jsse-nio-8443-exec-4, RECV TLSv1.2 ALERT:  warning, close_notify
https-jsse-nio-8443-exec-4, closeInboundInternal()
https-jsse-nio-8443-exec-4, closeOutboundInternal()
https-jsse-nio-8443-exec-6, READ: TLSv1.2 Alert, length = 26
, 246, 207, 27 }
Session ID:  https-jsse-nio-8443-exec-4, SEND TLSv1.2 ALERT:  warning, description = close_notify
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1
https-jsse-nio-8443-exec-7, READ: TLSv1.2 Change Cipher Spec, length = 1
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1
SESSION KEYGEN:
PreMaster Secret:
*** ServerHello, TLSv1.2
RandomCookie:  https-jsse-nio-8443-exec-7, READ: TLSv1.2 Handshake, length = 40
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1.1
https-jsse-nio-8443-exec-4, WRITE: TLSv1.2 Alert, length = 26
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1.1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1.1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1
*** Finished
verify_data:  { 208, 123, 201, 66, 27, 254, 243, 98, 61, 97, 37, 252 }
***
https-jsse-nio-8443-exec-4, called closeOutbound()
https-jsse-nio-8443-exec-4, closeOutboundInternal()
{92, 125, 15, 248, 93, 114, 159, 202, 158, 231, 130, 170, 240, 207, 79, 78, 139, 64, 227, 229, 102, 241, 205, 156, 132, 129, 45, 27, 166, 93, 182, 26}
https-jsse-nio-8443-exec-6, RECV TLSv1.2 ALERT:  warning, close_notify
Cipher Suites: [Unknown 0x13:0x2, Unknown 0x13:0x3, Unknown 0x13:0x1, Unknown 0x13:0x4, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa9, Unknown 0xc0:0xad, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0xac, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa8, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xc0:0x9d, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9c, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xaa, Unknown 0xc0:0x9f, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9e, TLS_DHE_RSA_WITH_AES_128_CBC_SHA]
Compression Methods:  { 0 }
https-jsse-nio-8443-exec-7, WRITE: TLSv1.2 Change Cipher Spec, length = 1
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1.1
*** Finished
verify_data:  { 248, 20, 218, 241, 12, 96, 21, 71, 10, 184, 158, 230 }
***
https-jsse-nio-8443-exec-1, READ: TLSv1 Handshake, length = 512
https-jsse-nio-8443-exec-7, WRITE: TLSv1.2 Handshake, length = 40
%% Cached server session: [Session-27, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384]
*** ClientHello, TLSv1.2
RandomCookie:  GMT: -841722745 bytes = { 65, 228, 116, 172, 228, 143, 92, 103, 78, 107, 151, 92, 0, 5, 248, 89, 203, 135, 220, 33, 22, 217, 207, 96, 221, 63, 138, 53 }
Session ID:  {92, 125, 15, 249, 91, 136, 187, 27, 204, 162, 102, 165, 117, 174, 228, 167, 61, 220, 8, 91, 233, 74, 141, 46, 20, 170, 254, 125, 209, 24, 126, 159}
Cipher Suites: [Unknown 0x13:0x2, Unknown 0x13:0x3, Unknown 0x13:0x1, Unknown 0x13:0x4, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa9, Unknown 0xc0:0xad, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0xac, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa8, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xc0:0x9d, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9c, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xaa, Unknown 0xc0:0x9f, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9e, TLS_DHE_RSA_WITH_AES_128_CBC_SHA]
Compression Methods:  { 0 }
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1.1
GMT: 1551699706 0000: 3D 0B CD 37 40 B6 31 42   59 C7 DE 09 FD D0 2F 31  =..7@.1BY...../1
0010: CE 03 6A C1 3C 0F FF 9B   A0 F2 06 CD EC 5D 19 2E  ..j.<........]..
0020: 3B 50 6A 31 50 09 23 01   73 1D 1E 49 BF 18 DD 89  ;Pj1P.#.s..I....
0030: 82 5B 8F BD 02 13 AD 01   48 BB 89 F2 66 E8 86 6D  .[......H...f..m
0040: 78 8A 93 10 74 6E 49 4B   68 B9 D0 CC 8B AE AD CB  x...tnIKh.......
0050: E1 C6 36 80 47 90 1F 06   62 74 C3 ED C0 AC A8 9E  ..6.G...bt......
0060: 14 71 6E 4E 42 3E 32 69   A6 AD FF 20 E0 F2 B9 AD  .qnNB>2i... ....
0070: DA 05 45 5A C7 16 AC 0B   CB 77 9D E6 18 5C A0 3F  ..EZ.....w...\.?
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1
Unsupported extension status_request, data: 01:00:00:00:00
Extension elliptic_curves, curve names: {secp256r1, secp384r1, secp521r1, unknown curve 29, unknown curve 256, unknown curve 257, unknown curve 258, unknown curve 259, unknown curve 260}
Extension ec_point_formats, formats: [uncompressed]
Extension signature_algorithms, signature_algorithms: SHA256withRSA, Unknown (hash:0x8, signature:0x9), Unknown (hash:0x8, signature:0x4), SHA256withECDSA, Unknown (hash:0x8, signature:0x7), SHA384withRSA, Unknown (hash:0x8, signature:0xa), Unknown (hash:0x8, signature:0x5), SHA384withECDSA, SHA512withRSA, Unknown (hash:0x8, signature:0xb), Unknown (hash:0x8, signature:0x6), SHA512withECDSA, SHA1withRSA, SHA1withECDSA
Unsupported extension type_35, data:
CONNECTION KEYGEN:
Client Nonce:
0000: AC 1B A2 2D 64 8E 4A EB   07 82 06 CB 0D 67 C8 DA  ...-d.J......g..
0010: FF CC E5 D6 73 7A 3E 54   FE 41 7C C5 01 5F 7D 8E  ....sz>T.A..._..
Server Nonce:
0000: 5C 7D 0F F9 2D 9A 66 5A   58 A5 95 E3 2F 66 1B 85  \...-.fZX.../f..
0010: 95 7D 88 00 E0 17 4E 78   96 D9 10 E0 F2 EC F1 F0  ......Nx........
Master Secret:
0000: 7D AC 34 6F EF E4 3A 1D   16 BC 23 90 BA AA 95 47  ..4o..:...#....G
0010: 45 DE FE F1 84 AA B8 02   7A 75 A3 BF E7 85 0B C1  E.......zu......
0020: 48 26 6F 02 A3 55 31 06   7A AE B5 62 E5 6F 90 44  H&o..U1.z..b.o.D
... no MAC keys used for this cipher
Client write key:
0000: 5C F0 6C 79 38 9D EA A7   04 66 ED 02 DD 8E 23 C3  \.ly8....f....#.
0010: C1 CC 73 B5 31 25 65 FC   C2 23 D6 2E 38 FB 6E 23  ..s.1%e..#..8.n#
Server write key:
0000: 89 94 D7 E8 B9 44 AB 35   28 1C 1D 7E 1B 4D 7E F7  .....D.5(....M..
0010: 8D 83 29 F7 ED AC EB D2   71 5D 1E B2 1B 32 9D AE  ..).....q]...2..
Client write IV:
0000: 27 1A F7 1E                                        '...
Server write IV:
0000: 97 C2 12 1D                                        ....
https-jsse-nio-8443-exec-9, WRITE: TLSv1.2 Application Data, length = 85
bytes = { 204, 189, 225, 252, 251, 151, 86, 169, Unsupported extension status_request, data: 01:00:00:00:00
https-jsse-nio-8443-exec-6, closeInboundInternal()
Extension elliptic_curves, curve names: {secp256r1, secp384r1, secp521r1, unknown curve 29, unknown curve 256, unknown curve 257, unknown curve 258, unknown curve 259, unknown curve 260}
https-jsse-nio-8443-exec-6, closeOutboundInternal()
https-jsse-nio-8443-exec-6, SEND TLSv1.2 ALERT:  warning, description = close_notify
220, Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1.1
Unsupported extension type_51, data: 00:69:00:17:00:41:04:d9:c8:0c:3a:d4:ef:f0:1b:d5:04:11:29:95:12:39:7c:43:b3:85:27:b0:0d:78:1f:2c:f2:ae:58:b8:d4:bd:68:62:07:71:9f:04:1a:c3:8a:c9:f8:a3:08:ef:00:e3:3b:56:b7:a4:71:7a:13:25:15:bd:90:93:18:21:64:9f:5b:00:1d:00:20:b4:4f:48:6e:50:c1:59:ed:ea:c6:72:5f:37:2d:7e:a6:3d:37:1f:68:2b:39:38:bf:ea:e1:16:ea:5e:82:ea:4e
https-jsse-nio-8443-exec-6, WRITE: TLSv1.2 Alert, length = 26
Unsupported extension type_43, data: 08:03:04:03:03:03:02:03:01
Extension renegotiation_info, renegotiated_connection: <empty>
Extension server_name, server_name: [type=host_name (0), value=localhost]
Unsupported extension type_45, data: 02:01:00
Unsupported extension type_28, data: 40:00
Unsupported extension type_21, data: 00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00
***
https-jsse-nio-8443-exec-6, called closeOutbound()
https-jsse-nio-8443-exec-6, closeOutboundInternal()
https-jsse-nio-8443-exec-2, READ: TLSv1 Handshake, length = 512
%% Initialized:  [Session-29, SSL_NULL_WITH_NULL_NULL]
225, 63, 17, 125, 96, 238, 54, 43, 21, 156, 232, 216, 58, 228, 154, 248, 174, 204, 10 }
Session ID:  Using SSLEngineImpl.
https-jsse-nio-8443-exec-3, READ: TLSv1.2 Change Cipher Spec, length = 1
https-jsse-nio-8443-exec-9, READ: TLSv1.2 Alert, length = 26
https-jsse-nio-8443-exec-9, RECV TLSv1.2 ALERT:  warning, close_notify
https-jsse-nio-8443-exec-9, closeInboundInternal()
https-jsse-nio-8443-exec-9, closeOutboundInternal()
Extension ec_point_formats, formats: [uncompressed]
https-jsse-nio-8443-exec-9, SEND TLSv1.2 ALERT:  warning, description = close_notify
Allow unsafe renegotiation: false
Allow legacy hello messages: true
Is initial handshake: true
Is secure renegotiation: false
https-jsse-nio-8443-exec-9, WRITE: TLSv1.2 Alert, length = 26
https-jsse-nio-8443-exec-3, READ: TLSv1.2 Handshake, length = 40
*** Finished
verify_data:  { 73, 179, 195, 241, 103, 116, 73, 118, 82, 182, 111, 241 }
***
https-jsse-nio-8443-exec-3, WRITE: TLSv1.2 Change Cipher Spec, length = 1
*** Finished
verify_data:  { 7, 128, 252, 155, 154, 205, 9, 249, 54, 152, 253, 104 }
***
https-jsse-nio-8443-exec-3, WRITE: TLSv1.2 Handshake, length = 40
%% Cached server session: [Session-26, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384]
{92, 125, 15, 250, 225, 182, 144, 58, 48, 185, 18, 246, 100, 222, 33, 147, 194, 167, 240, 162, 177, 41, 139, 155, 196, 114, 95, 42, 38, 51, 126, 110}
Cipher Suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
Compression Method: 0
Extension renegotiation_info, renegotiated_connection: <empty>
***
Cipher suite:  TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
*** Certificate chain
Standard ciphersuite chosen: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
%% Negotiating:  [Session-29, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384]
*** ServerHello, TLSv1.2
RandomCookie:  GMT: 1551699706 bytes = { 114, 239, 126, 9, 5, 105, 71, 25, 252, 143, 205, 72, 188, 245, 37, 7, 64, 196, 53, 229, 151, 48, 55, 192, 12, 144, 216, 30 }
Session ID:  {92, 125, 15, 250, 188, 57, 138, 125, 16, 60, 221, 41, 168, 170, 135, 79, 161, 235, 14, 145, 100, 143, 235, 89, 37, 191, 60, 95, 56, 61, 179, 138}
Cipher Suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
Compression Method: 0
Extension renegotiation_info, renegotiated_connection: <empty>
***
chain [0] = [
[
  Version: V3
  Subject: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US
  Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5

  Key:  Sun RSA public key, 2048 bits
  modulus: 21944740401167172627731583459321030363948627215746053925732477915060915436180167456469785746662093119306577380200747716284652995937004530444336851845029170241627465854006145050037178991946925696078563485570896673835545540824265905937881682387179314987285174428010940266412458943894800978345731524307952507729956745301047871771953945124256516782917326981125087548987889540650149121302888872237484100834740328828765018090383963294418357028839734723410564800765871733483849269364796949055153420777966213779145518299141217288017794394762274753999989298548507425930217302947589819396239489846633419099079578249651345685751
  public exponent: 65537
  Validity: [From: Fri May 30 08:43:19 GMT 2014,
               To: Mon May 27 08:43:19 GMT 2024]
  Issuer: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US
  SerialNumber: [    a6ef7a9a 5368eb27]

Certificate Extensions: 3
[1]: ObjectId: 2.5.29.35 Criticality=false
AuthorityKeyIdentifier [
KeyIdentifier [
0000: 78 0D 96 9D FE D3 0B BE   8C C7 E3 EC 67 04 AB 4B  x...........g..K
0010: EA E0 00 29                                        ...)
]
]

[2]: ObjectId: 2.5.29.19 Criticality=false
BasicConstraints:[
  CA:true
  PathLen:2147483647
]

[3]: ObjectId: 2.5.29.14 Criticality=false
SubjectKeyIdentifier [
KeyIdentifier [
0000: 78 0D 96 9D FE D3 0B BE   8C C7 E3 EC 67 04 AB 4B  x...........g..K
0010: EA E0 00 29                                        ...)
]
]

]
  Algorithm: [SHA1withRSA]
  Signature:
0000: 19 16 5A 21 99 21 24 98   3C 0A E8 D8 00 AB 44 24  ..Z!.!$.<.....D$
0010: F2 0C B7 83 D5 9F 96 17   87 E2 1F 1D A3 47 68 C7  .............Gh.
0020: 68 4A CB 56 0E 77 2B E8   1A 9F E7 09 A1 19 77 D0  hJ.V.w+.......w.
0030: 5E CC C1 B3 9A C4 35 3D   CB E0 A5 A6 43 5D A3 26  ^.....5=....C].&
0040: A4 91 8A C1 FA 7B 10 EA   DC C3 C7 1C 47 DC 97 32  ............G..2
0050: C0 37 80 1C F1 42 10 E3   74 17 FA 3E 60 4A B7 59  .7...B..t..>`J.Y
0060: 92 C1 E0 6F BB F1 BB 9F   82 89 B5 83 D5 AE 1E 90  ...o............
0070: 0A 89 8D FB 4C C0 C5 9E   DC C5 8C C6 2F EE D9 B4  ....L......./...
0080: 95 47 27 2E BE 82 31 6F   76 C0 DB 4C C8 0D 3B 7B  .G'...1ov..L..;.
0090: D1 6A BF BD 3B 93 30 04   A2 9E 81 F7 96 28 77 F2  .j..;.0......(w.
00A0: 32 05 68 44 1F B3 30 CE   40 9F 20 F3 B4 2B AA E6  2.hD..0.@. ..+..
00B0: 40 9B FB 7F 34 6E 3A 99   FD F8 28 F1 8C 9B 56 34  @...4n:...(...V4
00C0: 64 AD 4D 56 39 CB 96 18   50 9B 99 43 80 0A 39 A5  d.MV9...P..C..9.
00D0: 13 7A 6E C5 25 E0 95 4A   92 E5 A8 8B EE 03 49 B4  .zn.%..J......I.
00E0: D9 7C 00 E3 F0 3B A7 BA   40 30 CC 89 55 C6 97 93  .....;..@0..U...
00F0: B5 15 F6 62 D3 B1 74 9C   0B 80 2B 8A D4 03 84 A0  ...b..t...+.....

]
***
*** ClientHello, TLSv1.2
RandomCookie:  https-jsse-nio-8443-exec-6, WRITE: TLSv1.2 Application Data, length = 85
Cipher suite:  TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
*** Certificate chain
https-jsse-nio-8443-exec-9, called closeOutbound()
https-jsse-nio-8443-exec-9, closeOutboundInternal()
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1.1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1.1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1
Extension signature_algorithms, signature_algorithms: SHA256withRSA, Unknown (hash:0x8, signature:0x9), Unknown (hash:0x8, signature:0x4), SHA256withECDSA, Unknown (hash:0x8, signature:0x7), SHA384withRSA, Unknown (hash:0x8, signature:0xa), Unknown (hash:0x8, signature:0x5), SHA384withECDSA, SHA512withRSA, Unknown (hash:0x8, signature:0xb), Unknown (hash:0x8, signature:0x6), SHA512withECDSA, SHA1withRSA, SHA1withECDSA
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1.1
https-jsse-nio-8443-exec-4, READ: TLSv1 Handshake, length = 512
*** ClientHello, TLSv1.2
RandomCookie:  GMT: -209766810 bytes = { 8, 125, 119, 215, 218, 232, 42, 255, 1, 118, 4, 106, 6, 20, 3, 19, 84, 215, 58, 245, 187, 209, 138, 135, 116, 9, 38, 139 }
Session ID:  {92, 125, 15, 249, 54, 170, 116, 2, 191, 242, 80, 152, 41, 194, 186, 125, 229, 187, 186, 200, 141, 185, 230, 141, 230, 195, 47, 61, 33, 116, 204, 226}
Cipher Suites: [Unknown 0x13:0x2, Unknown 0x13:0x3, Unknown 0x13:0x1, Unknown 0x13:0x4, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa9, Unknown 0xc0:0xad, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0xac, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa8, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xc0:0x9d, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9c, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xaa, Unknown 0xc0:0x9f, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9e, TLS_DHE_RSA_WITH_AES_128_CBC_SHA]
Compression Methods:  { 0 }
GMT: 432589448 bytes = { Unsupported extension status_request, data: 01:00:00:00:00
*** Diffie-Hellman ServerKeyExchange
https-jsse-nio-8443-exec-7, READ: TLSv1.2 Alert, length = 26
chain [0] = [
[
  Version: V3
  Subject: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US
  Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5

  Key:  Sun RSA public key, 2048 bits
  modulus: 21944740401167172627731583459321030363948627215746053925732477915060915436180167456469785746662093119306577380200747716284652995937004530444336851845029170241627465854006145050037178991946925696078563485570896673835545540824265905937881682387179314987285174428010940266412458943894800978345731524307952507729956745301047871771953945124256516782917326981125087548987889540650149121302888872237484100834740328828765018090383963294418357028839734723410564800765871733483849269364796949055153420777966213779145518299141217288017794394762274753999989298548507425930217302947589819396239489846633419099079578249651345685751
  public exponent: 65537
  Validity: [From: Fri May 30 08:43:19 GMT 2014,
               To: Mon May 27 08:43:19 GMT 2024]
  Issuer: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US
  SerialNumber: [    a6ef7a9a 5368eb27]

Certificate Extensions: 3
[1]: ObjectId: 2.5.29.35 Criticality=false
AuthorityKeyIdentifier [
KeyIdentifier [
0000: 78 0D 96 9D FE D3 0B BE   8C C7 E3 EC 67 04 AB 4B  x...........g..K
0010: EA E0 00 29                                        ...)
]
]

[2]: ObjectId: 2.5.29.19 Criticality=false
BasicConstraints:[
  CA:true
  PathLen:2147483647
]

[3]: ObjectId: 2.5.29.14 Criticality=false
SubjectKeyIdentifier [
KeyIdentifier [
0000: 78 0D 96 9D FE D3 0B BE   8C C7 E3 EC 67 04 AB 4B  x...........g..K
0010: EA E0 00 29                                        ...)
]
]

]
  Algorithm: [SHA1withRSA]
  Signature:
0000: 19 16 5A 21 99 21 24 98   3C 0A E8 D8 00 AB 44 24  ..Z!.!$.<.....D$
0010: F2 0C B7 83 D5 9F 96 17   87 E2 1F 1D A3 47 68 C7  .............Gh.
0020: 68 4A CB 56 0E 77 2B E8   1A 9F E7 09 A1 19 77 D0  hJ.V.w+.......w.
0030: 5E CC C1 B3 9A C4 35 3D   CB E0 A5 A6 43 5D A3 26  ^.....5=....C].&
0040: A4 91 8A C1 FA 7B 10 EA   DC C3 C7 1C 47 DC 97 32  ............G..2
0050: C0 37 80 1C F1 42 10 E3   74 17 FA 3E 60 4A B7 59  .7...B..t..>`J.Y
0060: 92 C1 E0 6F BB F1 BB 9F   82 89 B5 83 D5 AE 1E 90  ...o............
0070: 0A 89 8D FB 4C C0 C5 9E   DC C5 8C C6 2F EE D9 B4  ....L......./...
0080: 95 47 27 2E BE 82 31 6F   76 C0 DB 4C C8 0D 3B 7B  .G'...1ov..L..;.
0090: D1 6A BF BD 3B 93 30 04   A2 9E 81 F7 96 28 77 F2  .j..;.0......(w.
00A0: 32 05 68 44 1F B3 30 CE   40 9F 20 F3 B4 2B AA E6  2.hD..0.@. ..+..
00B0: 40 9B FB 7F 34 6E 3A 99   FD F8 28 F1 8C 9B 56 34  @...4n:...(...V4
00C0: 64 AD 4D 56 39 CB 96 18   50 9B 99 43 80 0A 39 A5  d.MV9...P..C..9.
00D0: 13 7A 6E C5 25 E0 95 4A   92 E5 A8 8B EE 03 49 B4  .zn.%..J......I.
00E0: D9 7C 00 E3 F0 3B A7 BA   40 30 CC 89 55 C6 97 93  .....;..@0..U...
00F0: B5 15 F6 62 D3 B1 74 9C   0B 80 2B 8A D4 03 84 A0  ...b..t...+.....

]
***
Unsupported extension type_35, data:
Using SSLEngineImpl.
Unsupported extension type_51, data: 00:69:00:17:00:41:04:61:04:95:c1:75:8e:e0:83:4e:89:4f:5d:49:44:2f:ba:ef:d1:22:e8:7b:f5:f8:7c:be:01:dd:e0:75:b3:fe:0c:e6:20:40:26:71:58:60:e5:61:59:2d:7c:48:56:43:d0:18:54:42:bb:56:3b:f4:19:df:97:1f:06:35:62:ae:ee:00:1d:00:20:a6:88:a2:a4:d6:99:a2:5b:cb:96:17:43:7d:15:53:91:82:1d:ef:05:95:23:2a:a6:eb:7b:00:c7:e2:1c:51:35
Unsupported extension type_43, data: 08:03:04:03:03:03:02:03:01
Extension renegotiation_info, renegotiated_connection: <empty>
Extension server_name, server_name: [type=host_name (0), value=localhost]
Unsupported extension type_45, data: 02:01:00
Unsupported extension type_28, data: 40:00
Unsupported extension type_21, data: 00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00
***
Allow unsafe renegotiation: false
Allow legacy hello messages: true
Is initial handshake: true
Is secure renegotiation: false
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1.1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1.1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1.1
https-jsse-nio-8443-exec-3, READ: TLSv1 Handshake, length = 512
*** ClientHello, TLSv1.2
RandomCookie:  GMT: -1728403289 bytes = { 132, 80, 154, 97, 158, 204, 23, 84, 200, 119, 197, 247, 175, 255, 201, 93, 67, 178, 204, 156, 194, 203, 170, 34, 129, 114, 165, 239 }
Session ID:  {92, 125, 15, 249, 14, 195, 194, 111, 161, 3, 34, 99, 124, 78, 235, 106, 195, 192, 56, 64, 253, 184, 107, 141, 133, 130, 225, 46, 214, 255, 68, 213}
Cipher Suites: [Unknown 0x13:0x2, Unknown 0x13:0x3, Unknown 0x13:0x1, Unknown 0x13:0x4, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa9, Unknown 0xc0:0xad, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0xac, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa8, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xc0:0x9d, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9c, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xaa, Unknown 0xc0:0x9f, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9e, TLS_DHE_RSA_WITH_AES_128_CBC_SHA]
Compression Methods:  { %% Initialized:  [Session-30, SSL_NULL_WITH_NULL_NULL]
https-jsse-nio-8443-exec-7, RECV TLSv1.2 ALERT:  warning, close_notify
Extension elliptic_curves, curve names: {secp256r1, secp384r1, secp521r1, unknown curve 29, unknown curve 256, unknown curve 257, unknown curve 258, unknown curve 259, unknown curve 260}
Extension ec_point_formats, formats: [uncompressed]
Extension signature_algorithms, signature_algorithms: SHA256withRSA, Unknown (hash:0x8, signature:0x9), Unknown (hash:0x8, signature:0x4), SHA256withECDSA, Unknown (hash:0x8, signature:0x7), SHA384withRSA, Unknown (hash:0x8, signature:0xa), Unknown (hash:0x8, signature:0x5), SHA384withECDSA, SHA512withRSA, Unknown (hash:0x8, signature:0xb), Unknown (hash:0x8, signature:0x6), SHA512withECDSA, SHA1withRSA, SHA1withECDSA
Unsupported extension type_35, data:
Unsupported extension type_51, data: 00:69:00:17:00:41:04:fc:f0:a5:a3:b9:08:96:75:42:53:fb:2a:77:c4:db:56:e4:e7:12:06:6c:c5:bf:b8:fc:fd:b2:97:a2:ed:61:06:7b:4a:de:89:0d:e5:15:e4:66:0c:46:e8:be:4c:55:9c:15:f4:32:8e:ad:62:0b:f8:3a:59:a8:4c:e0:ed:c7:3b:00:1d:00:20:35:d1:28:35:8c:ec:30:7b:61:08:7a:05:27:e8:fa:c6:2e:04:3c:86:a4:64:53:c3:c0:f4:56:23:29:3b:31:47
Unsupported extension type_43, data: 08:03:04:03:03:03:02:03:01
Extension renegotiation_info, renegotiated_connection: <empty>
Extension server_name, server_name: [type=host_name (0), value=localhost]
Unsupported extension type_45, data: 02:01:00
Unsupported extension type_28, data: 40:00
Unsupported extension type_21, data: 00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00
***
DH Modulus:  { 255, 255, 255, 255, 255, 255, 255, 255, 201, 15, 218, 162, 33, 104, 194, 52, 196, 198, 98, 139, 128, 220, 28, 209, 41, 2, 78, 8, 138, 103, 204, 116, 2, 11, 190, 166, 59, 19, 155, 34, 81, 74, 8, 121, 142, 52, 4, 221, 239, 149, 25, 179, 205, 58, 67, 27, 48, 43, 10, 109, 242, 95, 20, 55, 79, 225, 53, 109, 109, 81, 194, 69, 228, 133, 181, 118, 98, 94, 126, 198, 244, 76, 66, 233, 166, 55, 237, 107, 11, 255, 92, 182, 244, 6, 183, 237, 238, 56, 107, 251, 90, 137, 159, 165, 174, 159, 36, 17, 124, 75, 31, 230, 73, 40, 102, 81, 236, 230, 83, 129, 255, 255, 255, 255, 255, 255, 255, 255 }
DH Base:  { 2 }
Server DH Public Key:  { 99, 101, 87, 160, 218, 28, 153, 45, 194, 244, 102, 225, 58, 123, 122, 199, 218, 225, 163, 145, 16, 193, 85, 182, 132, 13, 5, 200, 77, 210, 238, 47, 45, 183, 193, 8, 45, 145, 147, 255, 51, 56, 121, 181, 160, 144, 36, 53, 93, 80, 167, 143, 157, 103, 145, 245, 17, 216, 234, 161, 194, 219, 63, 137, 115, 183, 67, 203, 136, 52, 140, 170, 92, 55, 46, 54, 222, 48, 73, 249, 236, 26, 152, 204, 20, 127, 99, 189, 114, 114, 120, 99, 172, 31, 54, 64, 254, 196, 88, 17, 118, 150, 190, 252, 107, 23, 72, 26, 213, 90, 62, 14, 169, 75, 0, 154, 152, 167, 200, 209, 160, 251, 191, 89, 188, 59, 215, 185 }
Signature Algorithm SHA256withRSA
Signed with a DSA or RSA public key
*** ServerHelloDone
https-jsse-nio-8443-exec-5, WRITE: TLSv1.2 Handshake, length = 1697
170, 155, 158, 148, 139, 142, 164, 40, 32, 171, 159, 150, 196, 203, 116, 157, 123, 92, 131, 144, 93, 166, 51, 208, 79, 147, 242, 75 }
Session ID:  {92, 125, 15, 249, 156, 49, 93, 110, 51, 118, 78, 147, 13, 67, 50, 119, 4, 139, 247, 123, 140, 61, 206, 121, 197, 180, 71, 56, 123, 67, 20, 120}
Cipher Suites: [Unknown 0x13:0x2, Unknown 0x13:0x3, Unknown 0x13:0x1, Unknown 0x13:0x4, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa9, Unknown 0xc0:0xad, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0xac, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa8, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xc0:0x9d, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9c, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xaa, Unknown 0xc0:0x9f, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9e, TLS_DHE_RSA_WITH_AES_128_CBC_SHA]
Compression Methods:  { 0 }
*** Diffie-Hellman ServerKeyExchange
DH Modulus:  { 255, 255, 255, 255, 255, 255, 255, 255, 201, 15, 218, 162, 33, 104, 194, 52, 196, 198, 98, 139, 128, 220, 28, 209, 41, 2, 78, 8, 138, 103, 204, 116, 2, 11, 190, 166, 59, 19, 155, 34, 81, 74, 8, 121, 142, 52, 4, 221, 239, 149, 25, 179, 205, 58, 67, 27, 48, 43, 10, 109, 242, 95, 20, 55, 79, 225, 53, 109, 109, 81, 194, 69, 228, 133, 181, 118, 98, 94, 126, 198, 244, 76, 66, 233, 166, 55, 237, 107, 11, 255, 92, 182, 244, 6, 183, 237, 238, 56, 107, 251, 90, 137, 159, 165, 174, 159, 36, 17, 124, 75, 31, 230, 73, 40, 102, 81, 236, 230, 83, 129, 255, 255, 255, 255, 255, 255, 255, 255 }
Standard ciphersuite chosen: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
https-jsse-nio-8443-exec-7, closeInboundInternal()
0 }
https-jsse-nio-8443-exec-7, closeOutboundInternal()
%% Negotiating:  [Session-30, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384]
DH Base:  { 2 }
Server DH Public Key:  { 98, 157, 138, 146, 236, 151, 82, 94, 95, 210, 143, 94, 192, 189, 146, 219, 232, 17, 188, 9, 106, 228, 97, 32, 89, 196, 210, 102, 41, 82, 247, 203, 246, 135, 146, 172, 41, 147, 211, 249, 33, 218, 1, 211, 178, 5, 0, 145, 117, 62, 203, 82, 212, 32, 21, 187, 230, 23, 166, 158, 200, 249, 12, 223, 202, 31, 248, 202, 78, 14, 74, 83, 40, 63, 38, 53, 157, 74, 239, 184, 43, 218, 129, 126, 116, 65, 226, 108, 15, 201, 161, 254, 137, 163, 204, 45, 139, 176, 207, 129, 118, 54, 189, 255, 170, 174, 11, 236, 180, 163, 61, 50, 6, 237, 117, 92, 46, 22, 230, 101, 178, 107, 210, 75, 119, 167, 2, 86 }
Unsupported extension status_request, data: 01:00:00:00:00
https-jsse-nio-8443-exec-5, READ: TLSv1.2 Handshake, length = 133
%% Initialized:  [Session-31, SSL_NULL_WITH_NULL_NULL]
Extension elliptic_curves, curve names: {secp256r1, secp384r1, secp521r1, unknown curve 29, unknown curve 256, unknown curve 257, unknown curve 258, unknown curve 259, unknown curve 260}
Extension ec_point_formats, formats: [uncompressed]
Extension signature_algorithms, signature_algorithms: SHA256withRSA, Unknown (hash:0x8, signature:0x9), Unknown (hash:0x8, signature:0x4), SHA256withECDSA, Unknown (hash:0x8, signature:0x7), SHA384withRSA, Unknown (hash:0x8, signature:0xa), Unknown (hash:0x8, signature:0x5), SHA384withECDSA, SHA512withRSA, Unknown (hash:0x8, signature:0xb), Unknown (hash:0x8, signature:0x6), SHA512withECDSA, SHA1withRSA, SHA1withECDSA
Unsupported extension type_35, data:
Unsupported extension type_51, data: 00:69:00:17:00:41:04:73:2c:23:c4:94:53:65:cd:2b:6f:43:c0:31:99:27:c7:ed:16:3c:cf:0e:c1:b9:3d:06:08:c8:ad:f7:36:9c:26:11:79:df:85:30:9f:bf:8b:44:d5:38:f9:78:54:45:53:cb:c6:4d:9d:13:3d:ef:b3:72:93:52:00:90:df:bd:68:00:1d:00:20:36:8e:48:e1:b2:ee:b7:08:fd:cf:0f:bd:89:50:f6:9f:ce:cd:42:06:ec:89:33:f5:f7:43:36:65:db:6f:11:7e
Unsupported extension type_43, data: 08:03:04:03:03:03:02:03:01
Extension renegotiation_info, renegotiated_connection: <empty>
Extension server_name, server_name: [type=host_name (0), value=localhost]
Unsupported extension type_45, data: 02:01:00
Unsupported extension type_28, data: 40:00
Unsupported extension type_21, data: 00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00
***
Signature Algorithm SHA256withRSA
Signed with a DSA or RSA public key
*** ServerHello, TLSv1.2
RandomCookie:  https-jsse-nio-8443-exec-7, SEND TLSv1.2 ALERT:  warning, description = close_notify
Unsupported extension status_request, data: 01:00:00:00:00
Extension elliptic_curves, curve names: {secp256r1, secp384r1, secp521r1, unknown curve 29, unknown curve 256, unknown curve 257, unknown curve 258, unknown curve 259, unknown curve 260}
Extension ec_point_formats, formats: [uncompressed]
https-jsse-nio-8443-exec-7, WRITE: TLSv1.2 Alert, length = 26
GMT: 1551699706 bytes = { 18, 229, 202, 112, 112, 109, 123, 160, 174, 111, 86, 220, 248, 86, 181, 58, 165, 251, 64, 69*** ServerHelloDone
Standard ciphersuite chosen: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
%% Negotiating:  [Session-31, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384]
https-jsse-nio-8443-exec-1, WRITE: TLSv1.2 Handshake, length = 1697
*** ClientKeyExchange, DH
, 170, 203, 115, 34, 134, 185, 213, 120 }
Session ID:  {92, 125, 15, 250, 57, 210, 32, 112, 175, 3, 154, 172, 201, 135, 69, 126, 161, 114, 238, 224, 96, 210, 188, 25, 18, 108, 235, 166, 181, 30, 176, 176}
Cipher Suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
Compression Method: 0
Extension renegotiation_info, renegotiated_connection: <empty>
***
Cipher suite:  TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
*** Certificate chain
chain [0] = [
[
  Version: V3
  Subject: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US
  Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5

  Key:  Sun RSA public key, 2048 bits
  modulus: 21944740401167172627731583459321030363948627215746053925732477915060915436180167456469785746662093119306577380200747716284652995937004530444336851845029170241627465854006145050037178991946925696078563485570896673835545540824265905937881682387179314987285174428010940266412458943894800978345731524307952507729956745301047871771953945124256516782917326981125087548987889540650149121302888872237484100834740328828765018090383963294418357028839734723410564800765871733483849269364796949055153420777966213779145518299141217288017794394762274753999989298548507425930217302947589819396239489846633419099079578249651345685751
  public exponent: 65537
  Validity: [From: Fri May 30 08:43:19 GMT 2014,
               To: Mon May 27 08:43:19 GMT 2024]
  Issuer: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US
  SerialNumber: [    a6ef7a9a 5368eb27]

Certificate Extensions: 3
[1]: ObjectId: 2.5.29.35 Criticality=false
AuthorityKeyIdentifier [
KeyIdentifier [
0000: 78 0D 96 9D FE D3 0B BE   8C C7 E3 EC 67 04 AB 4B  x...........g..K
0010: EA E0 00 29                                        ...)
]
]

[2]: ObjectId: 2.5.29.19 Criticality=false
BasicConstraints:[
  CA:true
  PathLen:2147483647
]

[3]: ObjectId: 2.5.29.14 Criticality=false
SubjectKeyIdentifier [
KeyIdentifier [
0000: 78 0D 96 9D FE D3 0B BE   8C C7 E3 EC 67 04 AB 4B  x...........g..K
0010: EA E0 00 29                                        ...)
]
]

]
  Algorithm: [SHA1withRSA]
  Signature:
0000: 19 16 5A 21 99 21 24 98   3C 0A E8 D8 00 AB 44 24  ..Z!.!$.<.....D$
0010: F2 0C B7 83 D5 9F 96 17   87 E2 1F 1D A3 47 68 C7  .............Gh.
0020: 68 4A CB 56 0E 77 2B E8   1A 9F E7 09 A1 19 77 D0  hJ.V.w+.......w.
0030: 5E CC C1 B3 9A C4 35 3D   CB E0 A5 A6 43 5D A3 26  ^.....5=....C].&
0040: A4 91 8A C1 FA 7B 10 EA   DC C3 C7 1C 47 DC 97 32  ............G..2
0050: C0 37 80 1C F1 42 10 E3   74 17 FA 3E 60 4A B7 59  .7...B..t..>`J.Y
0060: 92 C1 E0 6F BB F1 BB 9F   82 89 B5 83 D5 AE 1E 90  ...o............
0070: 0A 89 8D FB 4C C0 C5 9E   DC C5 8C C6 2F EE D9 B4  ....L......./...
0080: 95 47 27 2E BE 82 31 6F   76 C0 DB 4C C8 0D 3B 7B  .G'...1ov..L..;.
0090: D1 6A BF BD 3B 93 30 04   A2 9E 81 F7 96 28 77 F2  .j..;.0......(w.
00A0: 32 05 68 44 1F B3 30 CE   40 9F 20 F3 B4 2B AA E6  2.hD..0.@. ..+..
00B0: 40 9B FB 7F 34 6E 3A 99   FD F8 28 F1 8C 9B 56 34  @...4n:...(...V4
00C0: 64 AD 4D 56 39 CB 96 18   50 9B 99 43 80 0A 39 A5  d.MV9...P..C..9.
00D0: 13 7A 6E C5 25 E0 95 4A   92 E5 A8 8B EE 03 49 B4  .zn.%..J......I.
00E0: D9 7C 00 E3 F0 3B A7 BA   40 30 CC 89 55 C6 97 93  .....;..@0..U...
00F0: B5 15 F6 62 D3 B1 74 9C   0B 80 2B 8A D4 03 84 A0  ...b..t...+.....

]
***
https-jsse-nio-8443-exec-7, called closeOutbound()
%% Initialized:  [Session-32, SSL_NULL_WITH_NULL_NULL]
https-jsse-nio-8443-exec-7, closeOutboundInternal()
Extension signature_algorithms, signature_algorithms: SHA256withRSA, Unknown (hash:0x8, signature:0x9), Unknown (hash:0x8, signature:0x4), SHA256withECDSA, Unknown (hash:0x8, signature:0x7), SHA384withRSA, Unknown (hash:0x8, signature:0xa), Unknown (hash:0x8, signature:0x5), SHA384withECDSA, SHA512withRSA, Unknown (hash:0x8, signature:0xb), Unknown (hash:0x8, signature:0x6), SHA512withECDSA, SHA1withRSA, SHA1withECDSA
Standard ciphersuite chosen: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
*** Diffie-Hellman ServerKeyExchange
DH Modulus:  { 255, 255, 255, 255, 255, 255, 255, 255, 201, 15, 218, 162, 33, 104, 194, 52, 196, 198, 98, 139, 128, 220, 28, 209, 41, 2, 78, 8, 138, 103, 204, 116, 2, 11, 190, 166, 59, 19, 155, 34, 81, 74, 8, 121, 142, 52, 4, 221, 239, 149, 25, 179, 205, 58, 67, 27, 48, 43, 10, 109, 242, 95, 20, 55, 79, 225, 53, 109, 109, 81, 194, 69, 228, 133, 181, 118, 98, 94, 126, 198, 244, 76, 66, 233, 166, 55, 237, 107, 11, 255, 92, 182, 244, 6, 183, 237, 238, 56, 107, 251, 90, 137, 159, 165, 174, 159, 36, 17, 124, 75, 31, 230, 73, 40, 102, 81, 236, 230, 83, 129, 255, 255, 255, 255, 255, 255, 255, 255 }
DH Base:  { 2 }
Server DH Public Key:  { https-jsse-nio-8443-exec-8, READ: TLSv1.2 Handshake, length = 134
DH Public key:  { 207, 9, 22, 125, 238, 127, 137*** ClientKeyExchange, DH
*** ServerHello, TLSv1.2
RandomCookie:  GMT: 1551699706 bytes = { 219, 203, 97, 32, 177, 114, 84, 87, 229, 123, 50, 200, 219, 49, 57, 154, 159, 7, 35, 121, 162, 192, 193, 172, 152, 165, 224, 133 }
Session ID:  DH Public key:  { 40, 8, 114, 169, 237, 170, 220, 215, 22, 134, 79, 141, 238, 37, 120, 112, 161, 136, 175, 27, 120, 60, 88, 255, 223, 224, 223, 25, 181, 229, 169, 194, 121, 175, 115, 30, 135, 70, 23, 136, 97, 165, 174, 118, 113, 190, 96, 94, 91, 247, 93, 10, 71, 70, 54, 179, 248, 55, 191, 214, 141, 94, 101, 34, 157, 36, 93, 124, 218, 26, 242, 22, 228, 18, 44, 125, 156, 121, 112, 18, 154, 245, 221, 135, 167, 148, 210, 226, 100, 223, 152, 249, 173, 39, 219, 140, 186, 219, 62, 49, 102, 142, 233, 16, 134, 90, 239, 110, 106, 160, 180, 23, 130, 139, 60, 249, 66, 217, 210, 143, 109, 54, 73, 152, 116, , 163, 35, 145, 201, 165, 191, 112, 147, 146, 200, 21, 177, 190, 224, 39, 211, 88, 207, 38, 181, 145, 222, 173, 233, 191, 197, 140, 72, 171, 215, 35, 214, 61, 220, 172, 228, 203, 163, 214, 150, 36, 152, 139, 50, 78, 106, 251, 169, 214, 1, 187, 61, 60, 222, 127, 11, 191, 95, 56, 200, 147, 150, 176, 6, 241, 1, 176, 173, 86, 66, 179, 238, 36, 157, 19, 158, 194, 128, 126, 51, 254, 104, 224, 44, 123, 217, 196, 2, 55, 0, 94, 6, 131, 2, 156, 183, 49, 217, 193, 48, 109, 122, 135, 105, 66, 215, 196, 140, 165, 173, 229, 124, 2, 116, 167, 187, 37, 82, 125, 40 }
76, 70, 32, 87, 49, 191, 2, 220, 75, 186, 86, 216, 213, 59, 125, 248, 5, 72, 64, 177, 26, 197, 17, 152, 48, 51, 242, 36, 177, 185, 50, 93, 64, 206, 192, 54, 160, 76, 184, 187, 20, 190, 102, 63, 63, 235, 140, 65, 29, 161, 103, 62, 159, 0, 99, 210, 56, 1, 24, 190, 194, 218, 165, 60, 88, 182, 101, 239, 236, 83, 38, 148, 114, 31, 163, 252, 185, 43, 215, 77, 149, 183, 240, 217, 147, 164, 176, 151, 218, 20, 15, 37, 247, 244, 86, 26, 234, 20, 164, 126, 71, 132, 216, 21, 255, 244, 12, 248, 48, 57, 152, 87, 159, 46, 84, 88, 92, 84, 49, 219, 103, 56, 205, 183, 135, 251, 230, 81 }
%% Negotiating:  [Session-32, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384]
Unsupported extension type_35, data:
Signature Algorithm SHA256withRSA
Signed with a DSA or RSA public key
*** ServerHello, TLSv1.2
RandomCookie:  SESSION KEYGEN:
PreMaster Secret:
111, 113, 0000: 03 39 D8 {92, 125, 15, 250, 176, 170, 42, 70, 43, 66, 137, 224, 204, 10, 80, 179, 178, 154, 87, 102, 209, 236, 188, 198, 134, 85, 75, 127, 43, 153, 140, 198}
ACipher Suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
Compression Method: 0
95 }
GMT: 1551699706 bytes = { 102, 14, 232, 115, 173, 146, 61, 129, 69, 75, 201, 174, 105, 123, 172, 158, 189, 235, 101, 116, 252, 139, 124, 31, 239, 253, 128, 62 }
Session ID:  *** ServerHelloDone
Unsupported extension type_51, data: 00:69:00:17:00:41:04:10:cb:ce:16:bc:fb:3f:fd:6e:57:0c:4f:8d:cc:7b:a2:64:8b:14:72:f4:94:5b:56:01:0c:1a:c5:8a:5a:4d:99:28:f9:43:1c:4a:fb:86:a1:34:1d:9d:8d:50:8a:4e:17:20:bb:dc:68:aa:5c:d2:11:d9:ce:48:ba:81:79:2d:6c:00:1d:00:20:69:27:3f:a4:00:21:d7:e6:0d:f0:0c:2b:85:38:28:58:ae:b8:0c:28:8b:6a:f2:9a:ef:a0:9e:4e:3c:5e:b8:5c
Unsupported extension type_43, data: 08:03:04:03:03:03:02:03:01
Extension renegotiation_info, renegotiated_connection: <empty>
Extension server_name, server_name: [type=host_name (0), value=localhost]
Unsupported extension type_45, data: 02:01:00
Unsupported extension type_28, data: 40:00
Unsupported extension type_21, data: 00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00
***
{92, 125, 15, 250, 118, 157, 4, 214, 139, 143, 30, 61, 184, 190, 46, 64, 131, 46, 40, 168, 183, 96, 10, 122, 80, 159, 188, 137, 169, 247, 151, 124}
Cipher Suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
Compression Method: 0
Extension renegotiation_info, renegotiated_connection: <empty>
***
3Cipher suite:  TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
 76 E0 AD 90   15 C1 F7 CE 6C 87 6B 24  .9..v.......l.k$
0010: C0 E8 14 DB 7C A5 C0 68   8D 36 19 83 10 09 5E F0  .......h.6....^.
0020: 44 E6 FE 48 EB 4F B4 1A   2D 5D 43 BF BB 4A 96 7B  D..H.O..-]C..J..
0030: 26 8B 13 4B F6 5D EF 3A   49 9D A0 EA 85 A2 C1 1E  &..K.].:I.......
0040: 5B 7B 96 CE 94 F7 F6 E5   B8 02 71 6D D1 2E 8F 6C  [.........qm...l
0050: 89 67 55 F2 DB F8 DD B8   06 9F B4 8E 2D 76 C5 93  .gU.........-v..
0060: 62 0D 75 83 99 B2 9A 3E   A3 7D A5 2E 7A C0 DB 81  b.u....>....z...
0070: A3 5C 29 D1 B0 A0 DA 6F   E5 4B 8A 2A 13 32 61 EC  .\)....o.K.*.2a.
CONNECTION KEYGEN:
Client Nonce:
0000: 7A 64 6D D8 94 E0 0E 4D   20 7D 18 39 CB 4D B5 AA  zdm....M ..9.M..
0010: 04 6A D5 C7 E4 EB 34 B5   0B 70 5D 70 AB 31 0A 25  .j....4..p]p.1.%
Server Nonce:
0000: 5C 7D 0F FA CC BD E1 FC   FB 97 56 A9 DC E1 3F 11  \.........V...?.
0010: 7D 60 EE 36 2B 15 9C E8   D8 3A E4 9A F8 AE CC 0A  .`.6+....:......
Master Secret:
0000: 3A 28 C6 2E 15 19 8A D0   8E 7F A3 BE 39 8F E0 70  :(..........9..p
0010: D7 36 5F 78 B1 AA 82 4F   A0 D8 49 6A 19 CE 67 1A  .6_x...O..Ij..g.
0020: D6 BA AE 5C 53 E1 A4 74   EF 93 ED 16 2E D5 E6 79  ...\S..t.......y
... no MAC keys used for this cipher
Client write key:
0000: AA 9E E1 93 7B 5A 4C B0   E6 DF 87 B0 46 FD 10 22  .....ZL.....F.."
0010: 9F 81 58 F5 24 1C 53 D1   A8 5A 62 99 CB 7E DC F8  ..X.$.S..Zb.....
Server write key:
0000: 7E 63 B6 28 E4 73 A5 16   19 50 85 4C B0 B4 B3 81  .c.(.s...P.L....
0010: DE 53 74 DE BB 98 72 9B   CE 83 BA A7 C8 80 6C A8  .St...r.......l.
Client write IV:
0000: C3 C5 46 1B                                        ..F.
Server write IV:
0000: D1 F5 B8 CE                                        ....
Extension renegotiation_info, renegotiated_connection: <empty>
***
SESSION KEYGEN:
PreMaster Secret:
https-jsse-nio-8443-exec-10, WRITE: TLSv1.2 Handshake, length = 1697
https-jsse-nio-8443-exec-5, READ: TLSv1.2 Change Cipher Spec, length = 1
0000: E3 C7 8A 18 12 33 B4 8E   44 87 D4 EB 9D 17 A8 43  .....3..D......C
0010: 3C F6 14 3F 59 B2 3A 53   D3 F8 9D 3C 7A 60 E2 90  <..?Y.:S...<z`..
0020: 30 D3 F0 24 1E 59 5A 8B   72 78 F7 02 E1 75 4D D7  0..$.YZ.rx...uM.
0030: 8A 8F E5 1C E9 E7 AF B6   6C D8 7C 63 A1 FC 4E 82  ........l..c..N.
0040: 32 B8 E6 19 58 27 3D 95   D1 19 4E 92 E2 41 43 7B  2...X'=...N..AC.
0050: 6A C1 A5 09 C9 6B DA 2E   0A 32 47 08 D5 41 0B 1A  j....k...2G..A..
0060: C7 F2 A2 EC B7 6C 1A 83   BE 00 36 B3 CA 2A 2B 3D  .....l....6..*+=
0070: BB E1 6F 1D 6A BA 22 68   98 B6 88 90 DA 5A E1 80  ..o.j."h.....Z..
CONNECTION KEYGEN:
Client Nonce:
0000: CE D4 55 87 41 E4 74 AC   E4 8F 5C 67 4E 6B 97 5C  ..U.A.t...\gNk.\
0010: 00 05 F8 59 CB 87 DC 21   16 D9 CF 60 DD 3F 8A 35  ...Y...!...`.?.5
Server Nonce:
0000: 5C 7D 0F FA 72 EF 7E 09   05 69 47 19 FC 8F CD 48  \...r....iG....H
0010: BC F5 25 07 40 C4 35 E5   97 30 37 C0 0C 90 D8 1E  ..%.@.5..07.....
Master Secret:
0000: 56 56 E3 F8 45 B9 A6 4A   B4 01 74 CF 6C 70 80 13  VV..E..J..t.lp..
0010: 1E FE 50 CC CF 10 F0 AB   55 E5 BB 70 B9 D9 0D 89  ..P.....U..p....
0020: 03 F4 4C 0B 4F EA 56 23   2C 0E 3B AC F1 7F C4 8B  ..L.O.V#,.;.....
... no MAC keys used for this cipher
Client write key:
0000: CB 76 AD BF 2F 40 A8 0D   BB 56 A0 64 9A 5D 07 76  .v../@...V.d.].v
0010: 0E 69 4C 6C AB F3 8F 5C   FE CA 70 81 B9 F2 BF F8  .iLl...\..p.....
Server write key:
0000: D3 E6 EF 44 93 93 F8 27   82 1A 29 4C 2E 9D 18 FD  ...D...'..)L....
0010: 44 DE 4D 0B A0 2E 81 ED   56 94 BA 0C 49 62 D0 B6  D.M.....V...Ib..
Client write IV:
0000: DE F8 D2 59                                        ...Y
Server write IV:
0000: 2A 17 85 CF                                        *...
Cipher suite:  TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
%% Initialized:  [Session-33, SSL_NULL_WITH_NULL_NULL]
*** Certificate chain
*** Certificate chain
https-jsse-nio-8443-exec-6, READ: TLSv1.2 Handshake, length = 134
chain [0] = [
[
  Version: V3
  Subject: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US
  Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5

  Key:  Sun RSA public key, 2048 bits
  modulus: 21944740401167172627731583459321030363948627215746053925732477915060915436180167456469785746662093119306577380200747716284652995937004530444336851845029170241627465854006145050037178991946925696078563485570896673835545540824265905937881682387179314987285174428010940266412458943894800978345731524307952507729956745301047871771953945124256516782917326981125087548987889540650149121302888872237484100834740328828765018090383963294418357028839734723410564800765871733483849269364796949055153420777966213779145518299141217288017794394762274753999989298548507425930217302947589819396239489846633419099079578249651345685751
  public exponent: 65537
  Validity: [From: Fri May 30 08:43:19 GMT 2014,
               To: Mon May 27 08:43:19 GMT 2024]
  Issuer: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US
  SerialNumber: [    a6ef7a9a 5368eb27]

Certificate Extensions: 3
[1]: ObjectId: 2.5.29.35 Criticality=false
AuthorityKeyIdentifier [
KeyIdentifier [
0000: 78 0D 96 9D FE D3 0B BE   8C C7 E3 EC 67 04 AB 4B  x...........g..K
0010: EA E0 00 29                                        ...)
]
]

[2]: ObjectId: 2.5.29.19 Criticality=false
BasicConstraints:[
  CA:true
  PathLen:2147483647
]

[3]: ObjectId: 2.5.29.14 Criticality=false
SubjectKeyIdentifier [
KeyIdentifier [
0000: 78 0D 96 9D FE D3 0B BE   8C C7 E3 EC 67 04 AB 4B  x...........g..K
0010: EA E0 00 29                                        ...)
]
]

]
  Algorithm: [SHA1withRSA]
  Signature:
0000: 19 16 5A 21 99 21 24 98   3C 0A E8 D8 00 AB 44 24  ..Z!.!$.<.....D$
0010: F2 0C B7 83 D5 9F 96 17   87 E2 1F 1D A3 47 68 C7  .............Gh.
0020: 68 4A CB 56 0E 77 2B E8   1A 9F E7 09 A1 19 77 D0  hJ.V.w+.......w.
0030: 5E CC C1 B3 9A C4 35 3D   CB E0 A5 A6 43 5D A3 26  ^.....5=....C].&
0040: A4 91 8A C1 FA 7B 10 EA   DC C3 C7 1C 47 DC 97 32  ............G..2
0050: C0 37 80 1C F1 42 10 E3   74 17 FA 3E 60 4A B7 59  .7...B..t..>`J.Y
0060: 92 C1 E0 6F BB F1 BB 9F   82 89 B5 83 D5 AE 1E 90  ...o............
0070: 0A 89 8D FB 4C C0 C5 9E   DC C5 8C C6 2F EE D9 B4  ....L......./...
0080: 95 47 27 2E BE 82 31 6F   76 C0 DB 4C C8 0D 3B 7B  .G'...1ov..L..;.
0090: D1 6A BF BD 3B 93 30 04   A2 9E 81 F7 96 28 77 F2  .j..;.0......(w.
00A0: 32 05 68 44 1F B3 30 CE   40 9F 20 F3 B4 2B AA E6  2.hD..0.@. ..+..
00B0: 40 9B FB 7F 34 6E 3A 99   FD F8 28 F1 8C 9B 56 34  @...4n:...(...V4
00C0: 64 AD 4D 56 39 CB 96 18   50 9B 99 43 80 0A 39 A5  d.MV9...P..C..9.
00D0: 13 7A 6E C5 25 E0 95 4A   92 E5 A8 8B EE 03 49 B4  .zn.%..J......I.
00E0: D9 7C 00 E3 F0 3B A7 BA   40 30 CC 89 55 C6 97 93  .....;..@0..U...
00F0: B5 15 F6 62 D3 B1 74 9C   0B 80 2B 8A D4 03 84 A0  ...b..t...+.....

]
***
https-jsse-nio-8443-exec-5, READ: TLSv1.2 Handshake, length = 40
Standard ciphersuite chosen: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
%% Negotiating:  [Session-33, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384]
https-jsse-nio-8443-exec-8, READ: TLSv1.2 Change Cipher Spec, length = 1
*** ClientKeyExchange, DH
DH Public key:  { 2, 205, 103, 12, 90, 219, 219, 66, 36, 13, 72, 70, 72, 152, 235, 174, 76, 81, 192, 208, 110, 75, 222, 142, 31, 37, 29, 96, 88, 63, 230, 89, 250, 52, 132, 6, 205, 76, 209, 11, 24, 36, 210, 0, 251, 96, 237, 181, 123, 189, 225, 105, 135, 23, 156, 10, 150, 253, 62, 118, 162, 64, 54, 131, 158, 108, 160, 182, 23, 132, 52, 114, 211, 96, 135, 13, 221, 243, 28, 124, 41, 163, 87, 246, 84, 146, 112, 60, 125, 92, 75, 244, 216, 84, 165, 14, 157, 186, 195, 5, 174, 65, 147, 149, 186, 116, 245, 82, https-jsse-nio-8443-exec-8, READ: TLSv1.2 Handshake, length = 40
chain [0] = [
[
  Version: V3
  Subject: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US
  Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5

  Key:  Sun RSA public key, 2048 bits
  modulus: 21944740401167172627731583459321030363948627215746053925732477915060915436180167456469785746662093119306577380200747716284652995937004530444336851845029170241627465854006145050037178991946925696078563485570896673835545540824265905937881682387179314987285174428010940266412458943894800978345731524307952507729956745301047871771953945124256516782917326981125087548987889540650149121302888872237484100834740328828765018090383963294418357028839734723410564800765871733483849269364796949055153420777966213779145518299141217288017794394762274753999989298548507425930217302947589819396239489846633419099079578249651345685751
  public exponent: 65537
  Validity: [From: Fri May 30 08:43:19 GMT 2014,
               To: Mon May 27 08:43:19 GMT 2024]
  Issuer: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US
  SerialNumber: [    a6ef7a9a 5368eb27]

Certificate Extensions: 3
[1]: ObjectId: 2.5.29.35 Criticality=false
AuthorityKeyIdentifier [
KeyIdentifier [
0000: 78 0D 96 9D FE D3 0B BE   8C C7 E3 EC 67 04 AB 4B  x...........g..K
0010: EA E0 00 29                                        ...)
]
]

[2]: ObjectId: 2.5.29.19 Criticality=false
BasicConstraints:[
  CA:true
  PathLen:2147483647
]

[3]: ObjectId: 2.5.29.14 Criticality=false
SubjectKeyIdentifier [
KeyIdentifier [
0000: 78 0D 96 9D FE D3 0B BE   8C C7 E3 EC 67 04 AB 4B  x...........g..K
0010: EA E0 00 29                                        ...)
]
]

]
  Algorithm: [SHA1withRSA]
  Signature:
0000: 19 16 5A 21 99 21 24 98   3C 0A E8 D8 00 AB 44 24  ..Z!.!$.<.....D$
0010: F2 0C B7 83 D5 9F 96 17   87 E2 1F 1D A3 47 68 C7  .............Gh.
0020: 68 4A CB 56 0E 77 2B E8   1A 9F E7 09 A1 19 77 D0  hJ.V.w+.......w.
0030: 5E CC C1 B3 9A C4 35 3D   CB E0 A5 A6 43 5D A3 26  ^.....5=....C].&
0040: A4 91 8A C1 FA 7B 10 EA   DC C3 C7 1C 47 DC 97 32  ............G..2
0050: C0 37 80 1C F1 42 10 E3   74 17 FA 3E 60 4A B7 59  .7...B..t..>`J.Y
0060: 92 C1 E0 6F BB F1 BB 9F   82 89 B5 83 D5 AE 1E 90  ...o............
0070: 0A 89 8D FB 4C C0 C5 9E   DC C5 8C C6 2F EE D9 B4  ....L......./...
0080: 95 47 27 2E BE 82 31 6F   76 C0 DB 4C C8 0D 3B 7B  .G'...1ov..L..;.
0090: D1 6A BF BD 3B 93 30 04   A2 9E 81 F7 96 28 77 F2  .j..;.0......(w.
00A0: 32 05 68 44 1F B3 30 CE   40 9F 20 F3 B4 2B AA E6  2.hD..0.@. ..+..
00B0: 40 9B FB 7F 34 6E 3A 99   FD F8 28 F1 8C 9B 56 34  @...4n:...(...V4
00C0: 64 AD 4D 56 39 CB 96 18   50 9B 99 43 80 0A 39 A5  d.MV9...P..C..9.
00D0: 13 7A 6E C5 25 E0 95 4A   92 E5 A8 8B EE 03 49 B4  .zn.%..J......I.
00E0: D9 7C 00 E3 F0 3B A7 BA   40 30 CC 89 55 C6 97 93  .....;..@0..U...
00F0: B5 15 F6 62 D3 B1 74 9C   0B 80 2B 8A D4 03 84 A0  ...b..t...+.....

]
***
*** Finished
verify_data:  { 154, 13, 138, 113, 146, 154, 96, 166, 85, 36, 38, 132 }
***
https-jsse-nio-8443-exec-8, WRITE: TLSv1.2 Change Cipher Spec, length = 1
*** Finished
verify_data:  { 78, 118, 127, 228, 67, 13, 161, 150, 191, 68, 168, 223 }
***
191, 123, 124, 78, 76, 135, 89, 50, 71, 218, 230, 58, 28, 146, 98, 9, 15, 93, 47, 84 }
*** ServerHello, TLSv1.2
RandomCookie:  GMT: 1551699706 bytes = { 94, 41, 73, 199, 77, 7, 167, 57, 30, 252, 94, 1, 122, 225, 211, 213, 16, 56, 248, 67, 33, 189, 170, 63, 1, 152, 15, 123 }
Session ID:  {92, 125, 15, 250, 4, 73, 246, 113, 89, 177, 175, 33, 40, 228, 124, 99, 0, 204, 21, 244, 168, 162, 182, 252, 224, 5, 16, 197, 141, 153, 237, 240}
Cipher Suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
Compression Method: 0
Extension renegotiation_info, renegotiated_connection: <empty>
***
Cipher suite:  TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
*** Certificate chain
https-jsse-nio-8443-exec-8, WRITE: TLSv1.2 Handshake, length = 40
%% Cached server session: [Session-29, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384]
chain [0] = [
[
  Version: V3
  Subject: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US
  Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5

  Key:  Sun RSA public key, 2048 bits
  modulus: 21944740401167172627731583459321030363948627215746053925732477915060915436180167456469785746662093119306577380200747716284652995937004530444336851845029170241627465854006145050037178991946925696078563485570896673835545540824265905937881682387179314987285174428010940266412458943894800978345731524307952507729956745301047871771953945124256516782917326981125087548987889540650149121302888872237484100834740328828765018090383963294418357028839734723410564800765871733483849269364796949055153420777966213779145518299141217288017794394762274753999989298548507425930217302947589819396239489846633419099079578249651345685751
  public exponent: 65537
  Validity: [From: Fri May 30 08:43:19 GMT 2014,
               To: Mon May 27 08:43:19 GMT 2024]
  Issuer: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US
  SerialNumber: [    a6ef7a9a 5368eb27]

Certificate Extensions: 3
[1]: ObjectId: 2.5.29.35 Criticality=false
AuthorityKeyIdentifier [
KeyIdentifier [
0000: 78 0D 96 9D FE D3 0B BE   8C C7 E3 EC 67 04 AB 4B  x...........g..K
0010: EA E0 00 29                                        ...)
]
]

[2]: ObjectId: 2.5.29.19 Criticality=false
BasicConstraints:[
  CA:true
  PathLen:2147483647
]

[3]: ObjectId: 2.5.29.14 Criticality=false
SubjectKeyIdentifier [
KeyIdentifier [
0000: 78 0D 96 9D FE D3 0B BE   8C C7 E3 EC 67 04 AB 4B  x...........g..K
0010: EA E0 00 29                                        ...)
]
]

]
  Algorithm: [SHA1withRSA]
  Signature:
0000: 19 16 5A 21 99 21 24 98   3C 0A E8 D8 00 AB 44 24  ..Z!.!$.<.....D$
0010: F2 0C B7 83 D5 9F 96 17   87 E2 1F 1D A3 47 68 C7  .............Gh.
0020: 68 4A CB 56 0E 77 2B E8   1A 9F E7 09 A1 19 77 D0  hJ.V.w+.......w.
0030: 5E CC C1 B3 9A C4 35 3D   CB E0 A5 A6 43 5D A3 26  ^.....5=....C].&
0040: A4 91 8A C1 FA 7B 10 EA   DC C3 C7 1C 47 DC 97 32  ............G..2
0050: C0 37 80 1C F1 42 10 E3   74 17 FA 3E 60 4A B7 59  .7...B..t..>`J.Y
0060: 92 C1 E0 6F BB F1 BB 9F   82 89 B5 83 D5 AE 1E 90  ...o............
0070: 0A 89 8D FB 4C C0 C5 9E   DC C5 8C C6 2F EE D9 B4  ....L......./...
0080: 95 47 27 2E BE 82 31 6F   76 C0 DB 4C C8 0D 3B 7B  .G'...1ov..L..;.
0090: D1 6A BF BD 3B 93 30 04   A2 9E 81 F7 96 28 77 F2  .j..;.0......(w.
00A0: 32 05 68 44 1F B3 30 CE   40 9F 20 F3 B4 2B AA E6  2.hD..0.@. ..+..
00B0: 40 9B FB 7F 34 6E 3A 99   FD F8 28 F1 8C 9B 56 34  @...4n:...(...V4
00C0: 64 AD 4D 56 39 CB 96 18   50 9B 99 43 80 0A 39 A5  d.MV9...P..C..9.
00D0: 13 7A 6E C5 25 E0 95 4A   92 E5 A8 8B EE 03 49 B4  .zn.%..J......I.
00E0: D9 7C 00 E3 F0 3B A7 BA   40 30 CC 89 55 C6 97 93  .....;..@0..U...
00F0: B5 15 F6 62 D3 B1 74 9C   0B 80 2B 8A D4 03 84 A0  ...b..t...+.....

]
***
https-jsse-nio-8443-exec-1, WRITE: TLSv1.2 Application Data, length = 84
*** Diffie-Hellman ServerKeyExchange
*** Finished
verify_data:  { 79, 140, 31, 96, 144, 171, 0, 240, 77, 107, 225, 205 }
***
*** Diffie-Hellman ServerKeyExchange
DH Modulus:  { 255, 255, 255, 255, 255, 255, 255, 255, 201, 15, 218, 162, 33, 104, 194, 52, 196, 198, 98, 139, 128, 220, 28, 209, 41, 2, 78, 8, 138, 103, 204, 116, 2, 11, 190, 166, 59, 19, 155, 34, 81, 74, 8, 121, 142, 52, 4, 221, 239, 149, 25, 179, 205, 58, 67, 27, 48, 43, 10, 109, 242, 95, 20, 55, 79, 225, 53, 109, 109, 81, 194, 69, 228, 133, 181, 118, 98, 94, 126, 198, 244, 76, 66, 233, 166, 55, 237, 107, 11, 255, 92, 182, 244, 6, 183, 237, 238, 56, 107, 251, 90, 137, 159, 165, 174, 159, 36, 17, 124, 75, 31, 230, 73, 40, 102, 81, 236, 230, 83, 129, 255, 255, 255, 255, 255, 255, 255, 255 }
SESSION KEYGEN:
PreMaster Secret:
0000: CC FD BE BF 95 AA 1E 7D   87 95 92 8F 13 7C B6 8C  ................
0010: 6B 88 B7 7C 54 19 88 27   7C DC 43 FC F3 4E CE D8  k...T..'..C..N..
0020: 0B 56 60 93 35 7E 68 D2   23 49 01 78 47 65 28 05  .V`.5.h.#I.xGe(.
0030: 39 D3 1E 2E 78 11 5E B3   83 D6 B2 17 3F 82 00 5C  9...x.^.....?..\
0040: 22 6C 50 89 0E EE BF D5   72 ED EC 51 AF D2 37 50  "lP.....r..Q..7P
0050: BD B1 E2 4E AB CE 82 BF   BB A9 5F 52 33 22 C1 53  ...N......_R3".S
0060: 0F 23 96 78 EF BF 00 63   A7 19 92 54 4F C1 79 CD  .#.x...c...TO.y.
0070: 0A 78 60 F6 81 E2 EA E4   FC E4 EE 05 ED 4F FD C0  .x`..........O..
DH Modulus:  { 255, 255, 255, 255, 255, 255, 255, 255, 201, 15, 218, 162, 33, 104, 194, 52, 196, 198, 98, 139, 128, 220, 28, 209, 41, 2, 78, 8, 138, 103, 204DH Base:  { 2 }
Server DH Public Key:  { 51, 129, 216, 109, 60, 157, 212, 224, 205, 22, 27, 53, 23, 229, 22, 126, 29, 239, 177, 56, 208, 237, 6, 2, 147, 133, 156, 25, 213, 112, 54, 22, 206, 174, 51, 240, 64, 42, 89, 189, 33, 246, 219, 118, 245, 223, 52, 23, 70, 115, 38, 68, 4, 24, 156, 124, 163, 86, 233, 237, 213, 60, 126, 194, 124, 74, 82, 239, 86, 202, 159, 153, 175, 218, 81, 105, 46, 238, 63, 20, 223, 13, 117, 39, 5, 210, 17, 53, 50, 251, 95, 187, 113, 111, 174, 98, 81, 40, 55, 17, 103, 237, 178, 193, 161, 127, 21, 198, 146, 11, 51, 206, 240, 205, 68, 226, 36, 20, 136, 248, 218, 37, 118, 222, 19, 39, 170, 140 }
https-jsse-nio-8443-exec-1, READ: TLSv1.2 Alert, length = 26
Using SSLEngineImpl.
https-jsse-nio-8443-exec-5, WRITE: TLSv1.2 Change Cipher Spec, length = 1
*** Finished
Signature Algorithm SHA256withRSA
Signed with a DSA or RSA public key
, 116, 2*** ServerHelloDone
https-jsse-nio-8443-exec-2, WRITE: TLSv1.2 Handshake, length = 1697
https-jsse-nio-8443-exec-1, RECV TLSv1.2 ALERT:  warning, close_notify
https-jsse-nio-8443-exec-1, closeInboundInternal()
https-jsse-nio-8443-exec-1, closeOutboundInternal()
https-jsse-nio-8443-exec-1, SEND TLSv1.2 ALERT:  warning, description = close_notify
https-jsse-nio-8443-exec-1, WRITE: TLSv1.2 Alert, length = 26
https-jsse-nio-8443-exec-1, called closeOutbound()
https-jsse-nio-8443-exec-1, closeOutboundInternal()
https-jsse-nio-8443-exec-2, READ: TLSv1.2 Handshake, length = 134
CONNECTION KEYGEN:
Client Nonce:
0000: AA D2 4D 60 5D 71 D3 E6   28 B1 03 7F 6E 37 53 82  ..M`]q..(...n7S.
0010: 39 C3 98 30 D9 50 06 B6   A2 FA E1 0E 40 F6 CF 1B  9..0.P......@...
Server Nonce:
0000: 5C 7D 0F FA 12 E5 CA 70   70 6D 7B A0 AE 6F 56 DC  \......ppm...oV.
0010: F8 56 B5 3A A5 FB 40 45   AA CB 73 22 86 B9 D5 78  .V.:..@E..s"...x
Master Secret:
0000: 4A C9 D1 75 A0 04 A4 DB   2C 10 98 CE 02 C9 8A 70  J..u....,......p
0010: 5E F0 D7 5B FB E1 8A C8   09 A2 3E D5 DD 9B B0 59  ^..[......>....Y
0020: 26 2D 21 86 2B 6D D6 1D   8E 4F 66 20 FF 7D 8A D1  &-!.+m...Of ....
... no MAC keys used for this cipher
Client write key:
0000: D6 2A 7F 90 A2 3E E2 EE   D4 EA 9D 16 76 12 00 A9  .*...>......v...
0010: B9 94 AC C6 D1 89 21 C1   0C 90 D2 80 E4 23 03 49  ......!......#.I
Server write key:
0000: 19 D1 1F 3F 08 7E FC BC   16 CC 66 A2 54 6E 4C EA  ...?......f.TnL.
0010: 7B 06 67 B8 A2 F6 99 1E   58 30 DC 87 E0 FC 12 71  ..g.....X0.....q
Client write IV:
0000: 90 28 C7 B1                                        .(..
Server write IV:
0000: 0F 16 76 57                                        ..vW
*** Diffie-Hellman ServerKeyExchange
DH Modulus:  { 255, 255, 255, 255, 255, 255, 255, 255, 201, 15, 218, 162, 33, 104, 194, 52, 196, 198, 98, 139, 128, 220, 28, 209, 41, 2, 78, 8, 138, 103, 204, 116, 2, 11, 190, 166, 59, 19, 155, 34, 81, 74, 8, 121, 142, 52, 4, 221, 239, 149, 25, 179, 205, 58, 67, 27, 48, 43, 10, 109, 242, 95, 20, 55, 79, 225, 53, 109, 109, 81, 194, 69, 228, 133, 181, 118, 98, 94, 126, 198, 244, 76, 66, 233, 166, 55, 237, 107, 11, 255, 92, 182, 244, 6, 183, 237, 238, 56, 107, 251, 90, 137, 159, 165, 174, 159, 36, 17, 124, 75, 31, 230, 73, 40, 102, 81, 236, 230, 83, 129, 255, 255, 255, 255, 255, 255, 255, 255 }
DH Base:  { 2 }
Server DH Public Key:  { 202, 99, 48, 163, 168, 73, 11, 156, 116, 54, 116, 248, 82, 95, 101, 32, 181, 73, 240, 16, 254, 7, 227, 175, 239, 183, 143, 160, 50, 101, 147, 110, 91, 162, 208, 208, 6, 243, 153, 81, 101, 87, 185, 72, 116, 23, 80, 235, 103, 122, 213, 230, 117, 75, 205, 9, 139, 249, 229, 221, 3, 23, 117, 144, 59, 73, 106, 8, 9, 96, 156, 93, 124, 130, 220, 206, 2, 92, 165, 225, 182, 198, 168, 79, 182, 201, 163, 194, 94, 136, 17, 160, 189, 215, 170, 110, 72, 147, 169, 173, 231, 198, 107, 171, 68, 171, 93, 253, 63, 136, 242, 143, 164, 252, 108, 205, 18, 115, 214, 179, 244, 56, 76, 241, 113, 255, 37, 39 }
Signature Algorithm SHA256withRSA
Signed with a DSA or RSA public key
*** ServerHelloDone
https-jsse-nio-8443-exec-3, WRITE: TLSv1.2 Handshake, length = 1697
*** ClientKeyExchange, DH
DH Public key:  { 160, 29, 73, 44, 17, 180, 148, 57, , 11, 190, 166, 59, 19, 155, 34, 81, 74, 8, 121, 142, 52, 4, 221, 239, 149, 25, 179, 205, 58, 67, 27, 48, 43, 10, 109, 242, 95, 20, 55, 79, 225, 53, 109, 109, 81, 194, 69, 228, 133, 181, 118, 98, 94, 126, 198, 244, 76, 66, 233, 166, 55, 237, 107, 11, 255, 92, 182, 244, 6, 183, 237, 238, 56, 107, 251, 90, 137, 159, 165, 174, 159, 36, 17, 124, 75, 31, 230, 73, 40, 102, 81, 236, 230, 83, 129, 255verify_data:  { 196, 35, 51, 171, 27, 228, 165, 82, 166, 116, 123, 251 }
***
https-jsse-nio-8443-exec-5, WRITE: TLSv1.2 Handshake, length = 40
%% Cached server session: [Session-28, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384]
Allow unsafe renegotiation: false
Allow legacy hello messages: true
Is initial handshake: true
Is secure renegotiation: false
158, 186, 206, 148, 102, 74, 175, 1, 174, 44, 254, 222, 238, 93, 63, 231, 123, 116, 119, 36, 175, 206, 133, 61, 29, 51, 49, 194, https-jsse-nio-8443-exec-6, READ: TLSv1.2 Change Cipher Spec, length = 1
https-jsse-nio-8443-exec-6, READ: TLSv1.2 Handshake, length = 40
*** Finished
verify_data:  { 74, 73, 59, 127, 115, 30, 239, 167, 169, 230, 133, 39 }
***
https-jsse-nio-8443-exec-6, WRITE: TLSv1.2 Change Cipher Spec, length = 1
*** Finished
verify_data:  { 35, 53, 108, 254, 224, 144, 166, 224, 155, 55, 18, 133 }
***
230, 18, 242, 151, 41, 197, 29, 67, 176, 60, 244, 49https-jsse-nio-8443-exec-6, WRITE: TLSv1.2 Handshake, length = 40
, 255, 255, 255, 255, 255, 255, 255 }
DH Base:  { 2 }
Server DH Public Key:  { 135, 78, 42, 49, 195, 63, 134, 248, 237, 130, 134, 60, 174, 36, 217, 124, 161, 141, 177, 250, 194, 49, 234, 39, 99, 86, 154, 210, 16, 18, 199, 47, 68, 5, 66, 172, 168, 50, 227, 41, 104, 246, 24, 67, 203, 116, 13, 187, 199, 197, 188, 206, 177, 203, 66, 115, 244, 243, 237, 232, 246, 25, 203, 34, 254, 160, 130, 103, 110, 76, 122, 138, 19, 167, 69, 181, 27, 248, 169, 236, 84, 112, 175, 45, 164, 216, 176, 55, 174, 211, 164, 244, 148, 230, 176, 139, 46, 61, 74, 30, 216, 49, 43, 226, 161, 42, Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1
https-jsse-nio-8443-exec-9, WRITE: TLSv1.2 Application Data, length = 86
https-jsse-nio-8443-exec-10, READ: TLSv1.2 Handshake, length = 134
*** ClientKeyExchange, DH
DH Public key:  { 107, 51, 158, 232, 15, 151, 62, 133, 129, 141, 224, 29, 121, 77, 29, 176, 67, 188, 117, 147, 80, 40, 173, 57, 254, 21, 23, 183, 28, 39, 47, 91, 8, 6, 136, 74, 44, 109, 220, 255, 94, 239, 37, 18, 32, 78, 55, 139, 161, 233, 91, 242, 26, 187, 245, 196, 218, 37, 6, 10, 104, 137, 19, 124, 64, 211, 251, 223, 232, 142, 225, 226, 159, 226, 47, 76, 218, 253, 194, 89, 158, 50, 171, 169, 206, 177, 137, 108, 79, 65, 241, 92, 221, 125, 61, 231, 127, 218, 52, 141, 105, 67, 145, 109, 170, 181, 102, 68, 43, 71, 219, 9, 0, 55, 254, 19, 139, 26, 134, 137, 174, 245, 228, 14, 20, 213, 29, 233 }
%% Cached server session: [Session-30, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384]
, 48, 161, 86, 168, 193, 105, 208, 1, 58, 41, 50, 146, 185, 71, 84, 0, 254, 203, 20, 232, 148, 154, 24, 220, 64, 45, 108, 229, 47, 159, 44, 148, 202, 82, 82, 250, 88, 252, 244, 185, 11, 43, 136, 53, 16, 186, 224, 107, 65, 69, 178, 166, 198, 82, 4, 171, 146, 9, 186, 202, 72, 190, 208, 172, 221, 160, 144, 253, 145, 100, 110, 16, 32, 131, 26, 19, 66, 32, 172, 148 }
https-jsse-nio-8443-exec-9, READ: TLSv1.2 Alert, length = 26
https-jsse-nio-8443-exec-9, RECV TLSv1.2 ALERT:  warning, close_notify
https-jsse-nio-8443-exec-9, closeInboundInternal()
https-jsse-nio-8443-exec-9, closeOutboundInternal()
https-jsse-nio-8443-exec-9, SEND TLSv1.2 ALERT:  warning, description = close_notify
https-jsse-nio-8443-exec-9, WRITE: TLSv1.2 Alert, length = 26
https-jsse-nio-8443-exec-9, called closeOutbound()
https-jsse-nio-8443-exec-9, closeOutboundInternal()
122, 80, Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1.1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1.1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1.1
https-jsse-nio-8443-exec-7, READ: TLSv1 Handshake, length = 512
Using SSLEngineImpl.
*** ClientHello, TLSv1.2
RandomCookie:  GMT: -1688412490 bytes = { 69, 165, 188, 69, 135, 8, 4, 162, 44183, 190, 233, 149, 222, 3, 142, 245, 172, 176, 47, 242, 188, 243, 233, 148, 81, 205, 18, 231 }
Allow unsafe renegotiation: false
Allow legacy hello messages: true
Is initial handshake: true
Is secure renegotiation: false
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1.1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1.1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1.1
Signature Algorithm SHA256withRSA
Signed with a DSA or RSA public key
SESSION KEYGEN:
, 97*** ServerHelloDone
https-jsse-nio-8443-exec-1, READ: TLSv1 Handshake, length = 512
https-jsse-nio-8443-exec-4, WRITE: TLSv1.2 Handshake, length = 1697
PreMaster Secret:
, 20, 060, 80, 93, 127, 92, 100, 133, 247, 95, 20, 125, 111, 111, 147, 46, 230, 68 }
Session ID:  {92, 125, 15, 250, 188, 57, 138, 125, 16, 60, 221, 41, 168, 170, 135, 79, 161, 235, 14, 145, 100, 143, 235, 89, 37, 191, 60, 95, 56, 61, 179, 138}
Cipher Suites: [Unknown 0x13:0x2, Unknown 0x13:0x3, Unknown 0x13:0x1, Unknown 0x13:0x4, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa9, Unknown 0xc0:0xad, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0xac, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa8, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xc0:0x9d, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9c, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xaa, Unknown 0xc0:0x9f, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9e, TLS_DHE_RSA_WITH_AES_128_CBC_SHA]
Compression Methods:  { 0 }
Unsupported extension status_request, data: 01:00:00:00:00
Extension elliptic_curves, curve names: {secp256r1, secp384r1, secp521r1, unknown curve 29, unknown curve 256, unknown curve 257, unknown curve 258, unknown curve 259, unknown curve 260}
Extension ec_point_formats, formats: [uncompressed]
https-jsse-nio-8443-exec-8, WRITE: TLSv1.2 Application Data, length = 86
*** ClientHello, TLSv1.2
RandomCookie:  GMT: -1604331339 bytes = { 111, 77, 235, 74, 110, 236, 158, 125, 252, 32, 152, 129, 228, 119, 66, 22, 100, 76, 24, 198, 116, 13, 236, 40, 205, 58, 148, 172 }
Session ID:  {92, 125, 15, 250, 225, 182, 144, 58, 48, 185, 18, 246, 100, 222, 33, 147, 194, 167, 240, 162, 177, 41, 139, 155, 196, 114, 95, 42, 38, 51, 126, 110}
Cipher Suites: [Unknown 0x13:0x2, Unknown 0x13:0x3, Unknown 0x13:0x1, Unknown 0x13:0x4, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa9, Unknown 0xc0:0xad, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0xac, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa8, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xc0:0x9d, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9c, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xaa, Unknown 0xc0:0x9f, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9e, TLS_DHE_RSA_WITH_AES_128_CBC_SHA]
Compression Methods:  { 0 }
Unsupported extension status_request, data: 01:00:00:00:00
Extension elliptic_curves, curve names: {secp256r1, secp384r1, secp521r1, unknown curve 29, unknown curve 256, unknown curve 257, unknown curve 258, unknown curve 259, unknown curve 260}
Extension ec_point_formats, formats: [uncompressed]
Extension signature_algorithms, signature_algorithms: SHA256withRSA, Unknown (hash:0x8, signature:0x9), Unknown (hash:0x8, signature:0x4), SHA256withECDSA, Unknown (hash:0x8, signature:0x7), SHA384withRSA, Unknown (hash:0x8, signature:0xa), Unknown (hash:0x8, signature:0x5), SHA384withECDSA, SHA512withRSA, Unknown (hash:0x8, signature:0xb), Unknown (hash:0x8, signature:0x6), SHA512withECDSA, SHA1withRSA, SHA1withECDSA
Unsupported extension type_35, data:
Unsupported extension type_51, data: 00:69:00:17:00:41:04:da:51:e9:b8:dc:9b:68:81:aa:6c:6f:86:53:5e:a9:65:f0:fb:95:22:ac:fb:25:e4:6a:30:8e:60:7a:cb:b8:a8:24:a9:05:83:6f:5d:9d:be:47:e3:fc:bb:f8:fa:22:d4:36:b3:44:14:36:7c:fc:f4:e8:40:ac:14:57:4d:59:9e:00:1d:00:20:a5:1b:95:81:2f:ef:45:f4:80:10:c1:10:71:96:92:7f:cc:0b:31:4e:f9:aa:e3:5c:4d:26:b2:24:da:1e:6a:40
Unsupported extension type_43, data: 08:03:04:03:03:03:02:03:01
Extension renegotiation_info, renegotiated_connection: <empty>
Extension server_name, server_name: [type=host_name (0), value=localhost]
Unsupported extension type_45, data: 02:01:00
Unsupported extension type_28, data: 40:00
Unsupported extension type_21, data: 00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00
***
Extension signature_algorithms, signature_algorithms: SHA256withRSA, Unknown (hash:0x8, signature:0x9), Unknown (hash:0x8, signature:0x4), SHA256withECDSA, Unknown (hash:0x8, signature:0x7), SHA384withRSA, Unknown (hash:0x8, signature:0xa), Unknown (hash:0x8, signature:0x5), SHA384withECDSA, SHA512withRSA, Unknown (hash:0x8, signature:0xb), Unknown (hash:0x8, signature:0x6), SHA512withECDSA, SHA1withRSA, SHA1withECDSA
Unsupported extension type_35, data:
Unsupported extension type_51, data: 00:69:00:17:00:41:04:37:24:3b:b5:65:f9:9b:18:3d:2a:9d:0e:ae:b9:12:9e:6e:66:81:d3:07:9d:a4:07:56:ea:8b:93:a8:4b:a8:e5:f5:71:6b:97:f0:aa:4e:00:d4:16:3a:80:bd:ad:11:73:dc:ce:52:9e:2c:62:b5:87:6f:58:31:75:06:1a:42:8c:00:1d:00:20:53:cd:90:a5:d4:50:17:d5:e3:8e:7b:dd:64:4e:aa:b5:aa:14:58:66:59:1f:60:be:8d:e0:7f:5a:0e:3d:b9:22
Unsupported extension type_43, data: 08:03:04:03:03:03:02:03:01
Extension renegotiation_info, renegotiated_connection: <empty>
Extension server_name, server_name: [type=host_name (0), value=localhost]
Unsupported extension type_45, data: 02:01:00
Unsupported extension type_28, data: 40:00
Unsupported extension type_21, data: 00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00
***
SESSION KEYGEN:
PreMaster Secret:
0000: 67 D3 E6 1C C8 89 5F 3E   FB 1A 36 C6 45 37 81 DB  g....._>..6.E7..
0010: 60 0https-jsse-nio-8443-exec-9, READ: TLSv1.2 Alert, length = 26
https-jsse-nio-8443-exec-9, RECV TLSv1.2 ALERT:  warning, close_notify
https-jsse-nio-8443-exec-9, closeInboundInternal()
https-jsse-nio-8443-exec-9, closeOutboundInternal()
https-jsse-nio-8443-exec-9, SEND TLSv1.2 ALERT:  warning, description = close_notify
https-jsse-nio-8443-exec-9, WRITE: TLSv1.2 Alert, length = 26
%% Initialized:  [Session-34, SSL_NULL_WITH_NULL_NULL]
200: DE 79 B3 49 36 44 D0 99   9E 8E 7D 50 24 13 03 00  .y.I6D.....P$...
0010: 73 05 0F 8C EC 68 04 11   A8 3F 8F EE 7B 3E 1A 82  s....h...?...>..
0020: ED C7 9B Standard ciphersuite chosen: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
%% Negotiating:  [Session-34, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384]
*** ServerHello, TLSv1.2
RandomCookie:  EGMT: 1551699706 bytes = { 209, 150, 182, 197, 83, 144, 79, 119, 247, 69, 84, 159, 37, 6, 175, 188, 233, 204, 186, 25, 197, 113, 11, 178, 39, 232, 195, 43 }
Session ID:  C3 11 23 C5 42   D8 24 7B A4 C7 82 F6 7B Using SSLEngineImpl.
  .....#.B.$......
0030: Allow unsafe renegotiation: false
Allow legacy hello messages: true
Is initial handshake: true
Is secure renegotiation: false
https-jsse-nio-8443-exec-6, READ: TLSv1.2 Handshake, length = 134
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1.1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1.1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1.1
https-jsse-nio-8443-exec-3, READ: TLSv1 Handshake, length = 512
https-jsse-nio-8443-exec-9, called closeOutbound()
%% Initialized:  [Session-35, SSL_NULL_WITH_NULL_NULL]
{92, 125, 15, 250, 222, 28, 56, 143, 109, 254, 171, 255, 146, 211, 173, 127, 164, 151, 85, 161, 82, 252, 1, 187, 219, 71, 210, 215, 89, 19, 2, 22}
Cipher Suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
Compression Method: 0
Extension renegotiation_info, renegotiated_connection: <empty>
***
Cipher suite:  TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
*** ClientHello, TLSv1.2
RandomCookie:  GMT: 18804838 bytes = { 234, 159, 26, 79, 158, 58, 152, 5, 57, 236, 83, 234, 64, 161, 172, 181, 47, 227, 16, 247, 141, 175, 241, 55, 238, 87, 254, 72 }
Session ID:  https-jsse-nio-8443-exec-9, closeOutboundInternal()
*** ClientKeyExchange, DH
DH Public key:  { 2, 245, 22, 12, 225, 155, 102, 114, 60, Standard ciphersuite chosen: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
9%% Negotiating:  [Session-35, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384]
B2 CB FD A3 E5 42 D4 D4   8B A9 EE 37 AB E4 29 1B  .....B.....7..).
00405: 8A EC 4F 00 FF 66 1A 9A   83 7A 13 89 AB 27 0A F2  ..O..f...z...'..
0050: B1 03 4A 7B 60 71 C0 29   D3 D9 D9 D6 41 86 CC 80  ..J.`q.)....A...
0060: 28 DA 21 A2 86 8A 76 BE   29 96 DC D7 E0 4F B9 CA  (.!...v.)....O..
0070: 8A 4E 03 C4 C0 84 2B 94   FF 33 C8 67 AA 8C 11 DA  .N....+..3.g....
182, 174, 30, 186, 119, 15, 185, 146, 212, 15, 52, 157, 226, 79, 248, 194, 118, 207, 205, 178, 248, 255, 249, 76, 210, 227, 98, 113, 58, 193, 48, 5, 96, 184, 181, 95, 121, 253, 248, 191, 161, 137, 38, 33, 35, 164, 166, 80, 52, 85, 75, 150, 90, 33, 6, 191, 186, 22, 235, 148, 228, 83, 67, 123, 100, 40, 235, 254, 65, 200, 183, 43, 8, 117, 54, 151, 240, 215, 77, 62, 72, 3, 55, 124, 168, 160, 3, 87, 187, 216, 222, 199, 139, 133, 213, 51, 201, 20, 140, 124, 232, 149, 2, 78, 52, 35, 172, 190, 6, 10, 216, 168, 138, 65, 109, 150, 60, 81, 234 }
{92, 125, 15, 250, 57, 210, 32, 112, 175, 3, 154, 172, 201, 135, 69, 126, 161, 114, 238, 224, 96, 210, 188, 25, 18, 108, 235, 166, 181, 30, 176, 176}
*** Certificate chain
Cipher Suites: [Unknown 0x13:0x2, Unknown 0x13:0x3, Unknown 0x13:0x1, Unknown 0x13:0x4, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa9, Unknown 0xc0:0xad, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0xac, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa8, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xc0:0x9d, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9c, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xaa, Unknown 0xc0:0x9f, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9e, TLS_DHE_RSA_WITH_AES_128_CBC_SHA]
Compression Methods:  { 0 }
CONNECTION KEYGEN:
Client Nonce:
0000: 1A C9 CB 88 AA 9B 9E 94   8B 8E A4 28 20 AB 9F 96  ...........( ...
0010: C4 CB 74 9D 7B 5C 83 90   5D A6 33 D0 4F 93 F2 4B  ..t..\..].3.O..K
Server Nonce:
0000: 5C 7D 0F FA 66 0E E8 73   AD 92 3D 81 45 4B C9 AE  \...f..s..=.EK..
0010: 69 7B AC 9E BD EB 65 74   FC 8B 7C 1F EF FD 80 3E  i.....et.......>
Master Secret:
0000: 21 48 57 4E C5 E7 AD 10   2B E5 A2 F2 76 9A 2B 61  !HWN....+...v.+a
0010: 78 3D 02 01 39 B9 B0 24   DE 03 F9 B3 28 07 44 03  x=..9..$....(.D.
0020: 81 10 26 F9 DF 84 FD DA   38 8D 66 92 F8 3B AD 25  ..&.....8.f..;.%
... no MAC keys used for this cipher
Client write key:
0000: 4B 08 D7 E3 26 E0 04 97   2C 78 B5 CF 67 38 36 DD  K...&...,x..g86.
0010: EC 42 E4 62 37 ED 61 13   A2 05 C1 70 B1 5C 8D F9  .B.b7.a....p.\..
Server write key:
0000: 02 5E 24 9B 2C 35 F2 D5   E8 FF 21 F6 0A E5 C2 2B  .^$.,5....!....+
0010: 1A 10 D7 CA 41 96 68 CF   76 BC 15 00 35 77 CF 42  ....A.h.v...5w.B
Client write IV:
0000: DB CB B1 6A                                        ...j
Server write IV:
0000: F9 72 5F D5                                        .r_.
 *** ServerHello, TLSv1.2
RandomCookie:  GMT: 1551699706 bytes = { 214, 44, 65, 41, 111, 202, 34, 39, 89, 176, 178, 102, 49, 222, 219, 194, 23, 143, 102, 157, 245, 11, 186, 24, 131, 51, 243, 52 }
Session ID:  {92, 125, 15, 250, 169, 119, 83, 197, 47, 232, 131, 225, 86, 188, 224, 191, 83, 1, 16, 119, 213, 89, 105, 88, 9, 227, 9, 210, 251, 21, 198, 242}
Cipher Suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
Compression Method: 0
Extension renegotiation_info, renegotiated_connection: <empty>
***
Unsupported extension status_request, data: 01:00:00:00:00
SESSION KEYGEN:
PreMaster Secret:
chain [0] = [
[
  Version: V3
  Subject: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US
  Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5

  Key:  Sun RSA public key, 2048 bits
  modulus: 21944740401167172627731583459321030363948627215746053925732477915060915436180167456469785746662093119306577380200747716284652995937004530444336851845029170241627465854006145050037178991946925696078563485570896673835545540824265905937881682387179314987285174428010940266412458943894800978345731524307952507729956745301047871771953945124256516782917326981125087548987889540650149121302888872237484100834740328828765018090383963294418357028839734723410564800765871733483849269364796949055153420777966213779145518299141217288017794394762274753999989298548507425930217302947589819396239489846633419099079578249651345685751
  public exponent: 65537
  Validity: [From: Fri May 30 08:43:19 GMT 2014,
               To: Mon May 27 08:43:19 GMT 2024]
  Issuer: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US
  SerialNumber: [    a6ef7a9a 5368eb27]

Certificate Extensions: 3
[1]: ObjectId: 2.5.29.35 Criticality=false
AuthorityKeyIdentifier [
KeyIdentifier [
0000: 78 0D 96 9D FE D3 0B BE   8C C7 E3 EC 67 04 AB 4B  x...........g..K
0010: EA E0 00 29                                        ...)
]
]

[2]: ObjectId: 2.5.29.19 Criticality=false
BasicConstraints:[
  CA:true
  PathLen:2147483647
]

[3]: ObjectId: 2.5.29.14 Criticality=false
SubjectKeyIdentifier [
KeyIdentifier [
0000: 78 0D 96 9D FE D3 0B BE   8C C7 E3 EC 67 04 AB 4B  x...........g..K
0010: EA E0 00 29                                        ...)
]
]

]
  Algorithm: [SHA1withRSA]
  Signature:
0000: 19 16 5A 21 99 21 24 98   3C 0A E8 D8 00 AB 44 24  ..Z!.!$.<.....D$
0010: F2 0C B7 83 D5 9F 96 17   87 E2 1F 1D A3 47 68 C7  .............Gh.
0020: 68 4A CB 56 0E 77 2B E8   1A 9F E7 09 A1 19 77 D0  hJ.V.w+.......w.
0030: 5E CC C1 B3 9A C4 35 3D   CB E0 A5 A6 43 5D A3 26  ^.....5=....C].&
0040: A4 91 8A C1 FA 7B 10 EA   DC C3 C7 1C 47 DC 97 32  ............G..2
0050: C0 37 80 1C F1 42 10 E3   74 17 FA 3E 60 4A B7 59  .7...B..t..>`J.Y
0060: 92 C1 E0 6F BB F1 BB 9F   82 89 B5 83 D5 AE 1E 90  ...o............
0070: 0A 89 8D FB 4C C0 C5 9E   DC C5 8C C6 2F EE D9 B4  ....L......./...
0080: 95 47 27 2E BE 82 31 6F   76 C0 DB 4C C8 0D 3B 7B  .G'...1ov..L..;.
0090: D1 6A BF BD 3B 93 30 04   A2 9E 81 F7 96 28 77 F2  .j..;.0......(w.
00A0: 32 05 68 44 1F B3 30 CE   40 9F 20 F3 B4 2B AA E6  2.hD..0.@. ..+..
00B0: 40 9B FB 7F 34 6E 3A 99   FD F8 28 F1 8C 9B 56 34  @...4n:...(...V4
00C0: 64 AD 4D 56 39 CB 96 18   50 9B 99 43 80 0A 39 A5  d.MV9...P..C..9.
00D0: 13 7A 6E C5 25 E0 95 4A   92 E5 A8 8B EE 03 49 B4  .zn.%..J......I.
00E0: D9 7C 00 E3 F0 3B A7 BA   40 30 CC 89 55 C6 97 93  .....;..@0..U...
00F0: B5 15 F6 62 D3 B1 74 9C   0B 80 2B 8A D4 03 84 A0  ...b..t...+.....

]
***
0000: 08 8D 37 40 1E DB BF B0   10 35 13 23 5C 08 56 85  ..7@.....5.#\.V.
0010: F4 45 27 80 F0 DB 57 AE   32 D4 4A B9 01 5C A5 9D  .E'...W.2.J..\..
0020: AA A9 67 AA 96 3F 19 E9   E9 92 43 40 3B 80 E0 10  ..g..?....C@;...
0030: 73 43 BC DA 3D FE BC 69   31 E9 C5 8A 76 DB 03 0C  sC..=..i1...v...
0040: A9 82 40 FF AF 07 9F 3D   F5 59 66 7E C5 13 4F FC  ..@....=.Yf...O.
0050: 32 9C 3D F4 22 C5 81 B9   90 7D 5A 09 28 49 A5 A4  2.=.".....Z.(I..
0060: 29 FC 04 28 34 7C 03 04   20 41 5C 3C 8F 2F 49 6E  )..(4... A\<./In
0070: A9 05 08 B3 99 E3 5C 1E   B5 97 30 AF 7A 66 7C E6  ......\...0.zf..
Extension elliptic_curves, curve names: {secp256r1, secp384r1, secp521r1, unknown curve 29, unknown curve 256, unknown curve 257, unknown curve 258, unknown curve 259, unknown curve 260}
Cipher suite:  TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
https-jsse-nio-8443-exec-5, READ: TLSv1.2 Change Cipher Spec, length = 1
https-jsse-nio-8443-exec-5, READ: TLSv1.2 Handshake, length = 40
CONNECTION KEYGEN:
Client Nonce:
0000: F3 7F 36 66 08 7D 77 D7   DA E8 2A FF 01 76 04 6A  ..6f..w...*..v.j
0010: 06 14 03 13 54 D7 3A F5   BB D1 8A 87 74 09 26 8B  ....T.:.....t.&.
Server Nonce:
0000: 5C 7D 0F FA DB CB 61 20   B1 72 54 57 E5 7B 32 C8  \.....a .rTW..2.
0010: DB 31 39 9A 9F 07 23 79   A2 C0 C1 AC 98 A5 E0 85  .19...#y........
Master Secret:
0000: E9 53 E8 CF FF 0F 3F DF   98 60 43 CA B9 A8 F0 33  .S....?..`C....3
0010: 64 13 5E E4 77 D0 53 89   52 76 EF D0 E0 11 AA F5  d.^.w.S.Rv......
0020: B5 6C 4C C1 74 B4 21 07   FA FE C7 D5 03 A8 87 37  .lL.t.!........7
... no MAC keys used for this cipher
Client write key:
0000: FA 69 80 79 C3 30 71 43   EA 4E 5E 17 1D BC D0 03  .i.y.0qC.N^.....
0010: B5 67 F9 DE 06 8F B1 E6   AA 12 AC BA 42 60 0F 9A  .g..........B`..
Server write key:
0000: B4 E3 39 64 07 FB AF 6F   83 08 F9 3F 02 A8 AD F3  ..9d...o...?....
0010: 08 11 F1 23 E3 62 8B 24   89 7A 61 AF 01 BD 54 2A  ...#.b.$.za...T*
Client write IV:
0000: A9 CE 3B 62                                        ..;b
Server write IV:
0000: BF 07 89 40                                        ...@
https-jsse-nio-8443-exec-6, READ: TLSv1.2 Change Cipher Spec, length = 1
https-jsse-nio-8443-exec-6, READ: TLSv1.2 Handshake, length = 40
*** Finished
verify_data:  { 146, 157, 10, 68, 221, 66, 191, 192, 229, 150, 46, 124 }
***
97 66 93 11 AB   A2 FB 42 BE A6 94 E9 F5  `...f.....B.....
0020: 32 https-jsse-nio-8443-exec-6, WRITE: TLSv1.2 Change Cipher Spec, length = 1
*** Finished
verify_data:  { 101, *** Finished
verify_data:  { 60, 159, 194, 85, 53, 49, 175, 30, 227, 30, 62, 20 }
***
*** Diffie-Hellman ServerKeyExchange
DH Modulus:  { 255, 255, 255, 255, 255, 255, 255, 255, 201, 15, 218, 162, 33, 104, 194, 52, 196, 198, 98, 139, 128, 220, 28, 209, 41, 2, 78, 8, 138, 103, 204, 116, 2, 11, 190, 166, 59, 19, 155, 34, 81, 74, 8, 121, 142, 52, 4, 221, 239, 149, 25, 179, 205, 58, 67, 27, 48, 43, 10, 109, 242, 95, 20, 55, 79, 225, 53, 109, 109, 81, 194, 69, 228, 133, 181, 118, 98, 94, 126, 198, 244, 76, 66, 233, 166, 55, 237, 107, 11, 255, 92, 182, 244, 6, 183, 237, 238, 56, 107, 251, 90, 137, 159, 165, 174, 159, 36, 17, 124, 75, 31, 230, 73, 40, 102, 81, 236, 230, 83, 129, 255, 255, 255, 255, 255, 255, 255, 255 }
DH Base:  { 2 }
Server DH Public Key:  { 254, 204, 232, 184, 110, 206, 110, 5, 39, 89, 89, 213, 118, 55, 130, 17, 147, 216, 204, 132, 112, 148, 155, 107, 67, 206, 111, 132, 131, 71, 0, 251, 141, 156, 65, 178, 93, 47, 239, 47, 153, 161, 238, 227, 39, 59, 44, 142, 94, 117, 179, 29, 255, 38, 105, 33, 197, 98, 209, 138, 224, 86, 136, 94, 66, 254, 200, 164, 129, 162, 27, 116, 151, 125, 106, 172, 132, 39, 73, 122, 222, 96, 49, 247, 80, 162, 255, 126, 133, 40, 114, 65, 193, 241, 98, 103, 247, 177, 102, 29, 253, 0, 145, 208, 248, 57, 201, 3, 135, 158, 204, 204, 28, 48, 173, 26, 173, 224, 21, 37, 143, 40, 253, 247, 75, 162, 160, 168 }
Extension ec_point_formats, formats: [uncompressed]
*** Certificate chain
Signature Algorithm SHA256withRSA
Signed with a DSA or RSA public key
*** ServerHelloDone
https-jsse-nio-8443-exec-7, WRITE: TLSv1.2 Handshake, length = 1697
chain [0] = [
[
  Version: V3
  Subject: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US
  Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5

  Key:  Sun RSA public key, 2048 bits
  modulus: 21944740401167172627731583459321030363948627215746053925732477915060915436180167456469785746662093119306577380200747716284652995937004530444336851845029170241627465854006145050037178991946925696078563485570896673835545540824265905937881682387179314987285174428010940266412458943894800978345731524307952507729956745301047871771953945124256516782917326981125087548987889540650149121302888872237484100834740328828765018090383963294418357028839734723410564800765871733483849269364796949055153420777966213779145518299141217288017794394762274753999989298548507425930217302947589819396239489846633419099079578249651345685751
  public exponent: 65537
  Validity: [From: Fri May 30 08:43:19 GMT 2014,
               To: Mon May 27 08:43:19 GMT 2024]
  Issuer: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US
  SerialNumber: [    a6ef7a9a 5368eb27]

Certificate Extensions: 3
[1]: ObjectId: 2.5.29.35 Criticality=false
AuthorityKeyIdentifier [
KeyIdentifier [
0000: 78 0D 96 9D FE D3 0B BE   8C C7 E3 EC 67 04 AB 4B  x...........g..K
0010: EA E0 00 29                                        ...)
]
]

[2]: ObjectId: 2.5.29.19 Criticality=false
BasicConstraints:[
  CA:true
  PathLen:2147483647
]

[3]: ObjectId: 2.5.29.14 Criticality=false
SubjectKeyIdentifier [
KeyIdentifier [
0000: 78 0D 96 9D FE D3 0B BE   8C C7 E3 EC 67 04 AB 4B  x...........g..K
0010: EA E0 00 29                                        ...)
]
]

]
  Algorithm: [SHA1withRSA]
  Signature:
0000: 19 16 5A 21 99 21 24 98   3C 0A E8 D8 00 AB 44 24  ..Z!.!$.<.....D$
0010: F2 0C B7 83 D5 9F 96 17   87 E2 1F 1D A3 47 68 C7  .............Gh.
0020: 68 4A CB 56 0E 77 2B E8   1A 9F E7 09 A1 19 77 D0  hJ.V.w+.......w.
0030: 5E CC C1 B3 9A C4 35 3D   CB E0 A5 A6 43 5D A3 26  ^.....5=....C].&
0040: A4 91 8A C1 FA 7B 10 EA   DC C3 C7 1C 47 DC 97 32  ............G..2
0050: C0 37 80 1C F1 42 10 E3   74 17 FA 3E 60 4A B7 59  .7...B..t..>`J.Y
0060: 92 C1 E0 6F BB F1 BB 9F   82 89 B5 83 D5 AE 1E 90  ...o............
0070: 0A 89 8D FB 4C C0 C5 9E   DC C5 8C C6 2F EE D9 B4  ....L......./...
0080: 95 47 27 2E BE 82 31 6F   76 C0 DB 4C C8 0D 3B 7B  .G'...1ov..L..;.
0090: D1 6A BF BD 3B 93 30 04   A2 9E 81 F7 96 28 77 F2  .j..;.0......(w.
00A0: 32 05 68 44 1F B3 30 CE   40 9F 20 F3 B4 2B AA E6  2.hD..0.@. ..+..
00B0: 40 9B FB 7F 34 6E 3A 99   FD F8 28 F1 8C 9B 56 34  @...4n:...(...V4
00C0: 64 AD 4D 56 39 CB 96 18   50 9B 99 43 80 0A 39 A5  d.MV9...P..C..9.
00D0: 13 7A 6E C5 25 E0 95 4A   92 E5 A8 8B EE 03 49 B4  .zn.%..J......I.
00E0: D9 7C 00 E3 F0 3B A7 BA   40 30 CC 89 55 C6 97 93  .....;..@0..U...
00F0: B5 15 F6 62 D3 B1 74 9C   0B 80 2B 8A D4 03 84 A0  ...b..t...+.....

]
***
*** Diffie-Hellman ServerKeyExchange
DH Modulus:  { 255, 255, 255, 255, 255, 255, 255, 255, 201, 15, 218, 162, 33, 104, 194, 52, 196, 198, 98, 139, 128, 220, 28, 209, 41, 2, 78, 8, 138, 103, 204, 116, 2, 11, 190, 166, 59, 19, 155, 34, 81, 74, 8, 121, 142, 52, 4, 221, 239, 149, 25, 179, 205, 58, 67, 27, 48, 43, 10, 109, 242, 95, 20, 55, 79, 225, 53, 109, 109, 81, 194, 69, 228, 133, 181, 118, 98, 94, 126, 198, 244, 76, 66, 233, 166, 55, 237, 107, 11, 255, 92, 182, 244, 6, 183, 237, 238, 56, 107, 251, 90, 137, 159, 165, 174, 159, 36, 17, 124, 75, 31, 230, 73, 40, 102, 81, 236, 230, 83, 129, 255, 255, 255, 255, 255, 255, 255, 255 }
https-jsse-nio-8443-exec-6, WRITE: TLSv1.2 Handshake, length = 40
233, 193, 125, 3, 250, 41, 62, 242, 151, 50, 95 }
***
81 https-jsse-nio-8443-exec-5, WRITE: TLSv1.2 Change Cipher Spec, length = 1
%% Cached server session: [Session-31, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384]
*** Finished
verify_data:  { 29, 191, 226, 237, 223, 169, 118, 72, 13, 133, 75, 172 }
***
DH Base:  { 2 }
Server DH Public Key:  { 199, 202, 226, 186, 83, 217, 194, 255, 219, 116, 94, 69, 95, 2, 236, 130, 189, 156, 166, 212, 84, 143, 216, 76, 223, 178, 200, 151, 214, 155, 179, 156, 217, 91, 149, 47, 124, 177, 245, 201, 43, 216, 208, 179, 38, 11, 112, 180, 222, 147, 181, 39, 229, 64, 30, 80, 121, 223, 252, 26, 129, 33, 178, 123, 19, 232, 62, 74, 212, 195, 124, 200, 122, 200, 241, 254, 24, 202, 123, 170, 146, 117, 101, 83, 255, 186, 146, 174, 10, 177, 172, 245, 185, 98, 128, 246, 222, 184, 248, 228, 63, 83, 75, 213, 191, 164, 221, 253, 156, 136, 204, 195, 95, 215, 174, 94, 100, 116, 39, 213, 12, 156, 125, 218, 24, 70, 13, 11 }
Signature Algorithm SHA256withRSA
Signed with a DSA or RSA public key
*** ServerHelloDone
https-jsse-nio-8443-exec-1, WRITE: TLSv1.2 Handshake, length = 1697
https-jsse-nio-8443-exec-7, READ: TLSv1.2 Handshake, length = 134
*** ClientKeyExchange, DH
DH Public key:  { 194, 214, 54, 194, 205, 199, 218, 6, 7, 134, 149, 225, 221, 110, 36, 220, 255, 181, 194, 4, 113, 224, 235, 139, 255, 211, 115, 108, 215, 57, 85, 208, 231, 182, 32, 218, 105, 44, 53, 175, 191, 147, 93, 238, 174, 254, 124, 5, 148, 65, 226, 208, 88, 116, 0, 225, 33, 134, 176, 19, 253, 234, 59, 27, 175, 124, 237, 208, 6, 194, 119, 146, 30, 248, 225, 175, 10, 137, 141, 226, 147, 86, 64, 146, 39, 129, 18, 44, 217, 146, 185, 148, 65, 253, 185, 56, 40, 82, 231, 16, 177, 17, 78, 82, 134, 18, 129, 31, 105, 2, 100, 46, 60, 229, 204, 202, 47, 253, 171, 91, 30, 68, 86, 77, 175, 142, 88, 146 }
Extension signature_algorithms, signature_algorithms: SHA256withRSA, Unknown (hash:0x8, signature:0x9), Unknown (hash:0x8, signature:0x4), SHA256withECDSA, Unknown (hash:0x8, signature:0x7), SHA384withRSA, Unknown (hash:0x8, signature:0xa), Unknown (hash:0x8, signature:0x5), SHA384withECDSA, SHA512withRSA, Unknown (hash:0x8, signature:0xb), Unknown (hash:0x8, signature:0x6), SHA512withECDSA, SHA1withRSA, SHA1withECDSA
https-jsse-nio-8443-exec-2, READ: TLSv1.2 Handshake, length = 134
https-jsse-nio-8443-exec-9, WRITE: TLSv1.2 Application Data, length = 86
https-jsse-nio-8443-exec-5, WRITE: TLSv1.2 Handshake, length = 40
EC 7E DC 98 20 9F   EB D6 B4 B6 18 66 51 CA  *** ClientKeyExchange, DH
2DH Public key:  { ..... ......fQ.
0030: Using SSLEngineImpl.
Unsupported extension type_35, data:
B3 50 96 43 7A 2B 22 16   37 B3 38 F0 C6 F4 54 7F Allow unsafe renegotiation: false
Allow legacy hello messages: true
Is initial handshake: true
Is secure renegotiation: false
 .P.Cz+".7.8...T.
0040: 62 B5 8B DF 70 F0 F5 8D   02 32 45 3E A0 A9 50 8E  b...p....2E>..P.
0050: C5 53 65 FB 50 66 E1 55   88 76 00 AB 40 06 0B 26  .Se.Pf.U.v..@..&
0060: 2D 76 A1 8A 98 A1 13 0C   5B 51 83 F2 EC 97 CD 6C  -v......[Q.....l
0070: E6 0B 9A D3 7F 28 6B DF   63 FA 9E 87 AB 31 15 F6  .....(k.c....1..
242, 241, 3, 104, 44, 158, 45, 97, 146, 233, 2, 240, 70, Unsupported extension type_51, data: 00:69:00:17:00:41:04:12:da:be:06:96:e3:11:7c:c3:95:8d:39:95:11:0b:6f:92:46:b4:a8:78:bb:a4:a1:c4:ea:f6:48:27:88:03:03:33:b1:46:3b:69:3a:1a:68:64:b5:d2:60:9f:96:80:fc:1e:91:00:19:45:90:7b:9f:3a:a0:17:7c:d7:3c:c5:d8:00:1d:00:20:9e:f4:22:71:7e:2a:aa:08:65:6e:08:79:7f:b6:64:8d:25:6f:66:8c:64:f0:0a:d9:de:10:f2:3a:9a:d5:87:3d
https-jsse-nio-8443-exec-9, READ: TLSv1.2 Alert, length = 26
SESSION KEYGEN:
%% Cached server session: [Session-32, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384]
https-jsse-nio-8443-exec-9, RECV TLSv1.2 ALERT:  warning, close_notify
https-jsse-nio-8443-exec-9, closeInboundInternal()
https-jsse-nio-8443-exec-9, closeOutboundInternal()
Unsupported extension type_43, data: 08:03:04:03:03:03:02:03:01
132, 159, 103, 174, 193, 233, 26, 126, 213, 31, 219, 250, 24, 104, 125, 52, 46, 93, 186, 178, 168, 90, 159, 217, 135, 68, 154, 253, 77, 18, 75, 49, 241, 48, 204, 35, 161, 3, 185, 26, 224, 124, 101, 204, 156, 64, 225, 20, 185, 229, 224, 40, 215, 42, 71, 121, 190, 60, 172, 189, 101, 157, 202, CONNECTION KEYGEN:
Client Nonce:
0000: 99 FB A9 A7 84 50 9A 61   9E CC 17 54 C8 77 C5 F7  .....P.a...T.w..
0010: AF FF C9 5D 43 B2 CC 9C   C2 CB AA 22 81 72 A5 EF  ...]C......".r..
Server Nonce:
0000: 5C 7D 0F FA 5E 29 49 C7   4D 07 A7 39 1E FC 5E 01  \...^)I.M..9..^.
0010: 7A E1 D3 D5 10 38 F8 43   21 BD AA 3F 01 98 0F 7B  z....8.C!..?....
Master Secret:
0000: 9F 46 CC 62 61 03 38 0E   03 51 4C CA DD F8 FB A0  .F.ba.8..QL.....
0010: FD BF E4 67 B9 08 BC D8   E8 14 74 82 FE 31 9D 1B  ...g......t..1..
0020: 36 76 0D 48 33 1B DF 13   4C 7B 1B 63 48 66 1E 61  6v.H3...L..cHf.a
... no MAC keys used for this cipher
Client write key:
0000: FA 3B 3F 03 CB 6C 0B E0   FA 90 A8 66 49 5D 96 C4  .;?..l.....fI]..
0010: B1 F3 47 33 C0 9C B4 03   8D DC 53 83 D8 B2 5C 32  ..G3......S...\2
Server write key:
0000: F6 8B DB C5 BB 98 AD 17   4F 43 AF AF C6 5E 40 12  ........OC...^@.
0010: 67 B3 6D 5C D8 E6 41 CC   6E 20 01 55 B1 BA 18 6B  g.m\..A.n .U...k
Client write IV:
0000: 30 8C 50 D6                                        0.P.
Server write IV:
0000: 72 03 C4 3E                                        r..>
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1
116, 55https-jsse-nio-8443-exec-10, READ: TLSv1.2 Change Cipher Spec, length = 1
https-jsse-nio-8443-exec-1, WRITE: TLSv1.2 Application Data, length = 84
Extension renegotiation_info, renegotiated_connection: <empty>
https-jsse-nio-8443-exec-9, SEND TLSv1.2 ALERT:  warning, description = close_notify
PreMaster Secret:
Extension server_name, server_name: [type=host_name (0), value=localhost]
, 230, 125, 26, 126, 176, 245, 150, 130, 39, 109, 129, 250, 32, 36, 145, 195, 216, 185, 188, 75, 159, 121, 87, 63, 173, 231, 77, 222, 90, 119, 147, 225, 246, 45, 170, 54, 163, 186, 163, 141, 43, 118, 117, 20, 95, 30, 205, 56, 36, 228 }
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1
Unsupported extension type_45, data: 02:01:00
Unsupported extension type_28, data: 40:00
Unsupported extension type_21, data: 00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00
***
https-jsse-nio-8443-exec-9, WRITE: TLSv1.2 Alert, length = 26
%% Initialized:  [Session-36, SSL_NULL_WITH_NULL_NULL]
https-jsse-nio-8443-exec-9, called closeOutbound()
https-jsse-nio-8443-exec-9, closeOutboundInternal()
0000: C8 B3 D3 E4 B0 18 BC 21   FD 22 D9 FB 3D 79 6C DC  .......!."..=yl.
0010: 54 17 1E 93 B5 51 64 5E   B9 31 E0 7E 60 FC 56 64  T....Qd^.1..`.Vd
0020https-jsse-nio-8443-exec-10, READ: TLSv1.2 Handshake, length = 40
: SESSION KEYGEN:
PreMaster Secret:
0000: 99 0B 00 5E 44 D0 27 F1   7A 28 47 76 97 66 61 CA  ...^D.'.z(Gv.fa.
0010: 31 07 54 34 A6 30 C6 33   38 67 1A 47 D6 1B 7F 46  1.T4.0.38g.G...F
0020: 99 69 68 12 C4 02 73 F0   07 B6 81 43 48 A5 CC 24  .ih...s....CH..$
0030: 1C 65 CA 4E 2C E8 5C C1   21 F7 24 9D 43 49 CE 44  .e.N,.\.!.$.CI.D
0040: 45 CC EB 3F 0A 36 61 B0   35 AB E6 E8 DE 27 9E 2F  E..?.6a.5....'./
0050: 6F 5C AA F9 C0 E8 80 67   AE 2E BB BF 1D DE C4 CB  o\.....g........
0060: 1F 8A CD A0 98 6B FB 0B   86 3C 5A 38 31 E6 B3 E7  .....k...<Z81...
0070: 52 0F 46 4F DA B4 37 FA   10 45 3D 07 E7 85 BC F9  R.FO..7..E=.....
CONNECTION KEYGEN:
Client Nonce:
0000: A0 60 D9 B5 6F 4D EB 4A   6E EC 9E 7D FC 20 98 81  .`..oM.Jn.... ..
0010: E4 77 42 16 64 4C 18 C6   74 0D EC 28 CD 3A 94 AC  .wB.dL..t..(.:..
Server Nonce:
0000: 5C 7D 0F FA D6 2C 41 29   6F CA 22 27 59 B0 B2 66  \....,A)o."'Y..f
0010: 31 DE DB C2 17 8F 66 9D   F5 0B BA 18 83 33 F3 34  1.....f......3.4
Master Secret:
0000: 5D 05 8B 48 5A B0 6C D2   01 9D 74 5D 1F 5A 43 F5  ]..HZ.l...t].ZC.
0010: 77 EB 2F AE 69 44 30 8A   40 FE 11 62 D2 86 A2 BB  w./.iD0.@..b....
0020: 4E 9A 41 EE DA F2 8D 80   35 C3 58 96 86 34 B1 D7  N.A.....5.X..4..
... no MAC keys used for this cipher
Client write key:
0000: AE CF B4 46 07 29 B9 09   A4 F9 76 E4 64 F2 C6 F5  ...F.)....v.d...
0010: 6D F4 DA FC E0 B6 CD 18   EF 35 57 69 89 1D BB 6C  m........5Wi...l
Server write key:
0000: 40 F4 35 4F 25 9E 47 04   42 7E 17 5F 6E 8B 33 DC  @.5O%.G.B.._n.3.
0010: 60 A4 94 64 56 40 11 B6   13 A4 D1 27 F5 22 9A 3F  `..dV@.....'.".?
Client write IV:
0000: 88 C5 4B 6B                                        ..Kk
Server write IV:
0000: 07 22 C8 EA                                        ."..
Standard ciphersuite chosen: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
1D 3E 88 10 B3 6A A3 78   07 7A 78 D1 64 A6 2F 76  .>...j.x.zx.d./v
0030https-jsse-nio-8443-exec-1, READ: TLSv1.2 Alert, length = 26
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1.1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1.1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1.1
https-jsse-nio-8443-exec-6, READ: TLSv1 Handshake, length = 512
*** ClientHello, TLSv1.2
RandomCookie:  GMT: 24188780 bytes = { 142, 156, 252, 0, 20, 179, 95, 150, 233, 206, 188, 110, 143, 71, 124, 201, 98, 70, 146, 7, 112, 169, 151, 73, 93, 97, 58, 190 }
Session ID:  {92, 125, 15, 250, 176, 170, 42, 70, 43, 66, 137, 224, 204, 10, 80, 179, 178, 154, 87, 102, 209, 236, 188, 198, 134, 85, 75, 127, 43, 153, 140, 198}
Cipher Suites: [Unknown 0x13:0x2, Unknown 0x13:0x3, Unknown 0x13:0x1, Unknown 0x13:0x4, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa9, Unknown 0xc0:0xad, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0xac, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa8, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xc0:0x9d, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9c, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xaa, Unknown 0xc0:0x9f, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9e, TLS_DHE_RSA_WITH_AES_128_CBC_SHA]
Compression Methods:  { 0 }
Using SSLEngineImpl.
Unsupported extension status_request, data: 01:00:00:00:00
Extension elliptic_curves, curve names: {secp256r1, secp384r1, secp521r1, unknown curve 29, unknown curve 256, unknown curve 257, unknown curve 258, unknown curve 259, unknown curve 260}
Extension ec_point_formats, formats: [uncompressed]
Extension signature_algorithms, signature_algorithms: SHA256withRSA, Unknown (hash:0x8, signature:0x9), Unknown (hash:0x8, signature:0x4), SHA256withECDSA, Unknown (hash:0x8, signature:0x7), SHA384withRSA, Unknown (hash:0x8, signature:0xa), Unknown (hash:0x8, signature:0x5), SHA384withECDSA, SHA512withRSA, Unknown (hash:0x8, signature:0xb), Unknown (hash:0x8, signature:0x6), SHA512withECDSA, SHA1withRSA, SHA1withECDSA
Unsupported extension type_35, data:
Unsupported extension type_51, data: 00:69:00:17:00:41:04:86:69:84:8d:cf:49:95:b6:bc:54:68:ca:f2:d1:21:e0:fc:0b:02:82:ce:8e:99:b2:de:d5:1d:56:85:60:0d:59:6f:34:0a:40:c6:98:6a:fa:dd:f0:b3:1b:a2:59:eb:56:a5:e5:d7:c5:73:1e:78:98:98:69:a9:11:57:c8:64:89:00:1d:00:20:56:fd:31:c1:14:c7:f0:bb:83:e7:d4:c7:2d:02:e8:d1:40:9d:c9:60:b4:50:f8:bf:08:dd:ce:bb:1c:93:e6:33
Unsupported extension type_43, data: 08:03:04:03:03:03:02:03:01
Extension renegotiation_info, renegotiated_connection: <empty>
Extension server_name, server_name: [type=host_name (0), value=localhost]
Unsupported extension type_45, data: 02:01:00
Unsupported extension type_28, data: 40:00
Unsupported extension type_21, data: 00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00
***
%% Initialized:  [Session-37, SSL_NULL_WITH_NULL_NULL]
Standard ciphersuite chosen: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
%% Negotiating:  [Session-37, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384]
*** ServerHello, TLSv1.2
RandomCookie:  GMT: 1551699707 bytes = { 17, 211, 119, 160, 167, 69, 139, 33, 176, 131, 203, 90, 198, 84, 249, 58, 64, 167, 137, 4, 143, 164, 184, 23, 182, 37, 69, 128 }
Session ID:  {92, 125, 15, 251, 90, 198, 138, 52, 9, 18, 162, 17, 164, 113, 131, 184, 23, 228, 183, 72, 242, 145, 57, 97, 33, 105, 168, 157, 166, 45, 229, 203}
Cipher Suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
Compression Method: 0
Extension renegotiation_info, renegotiated_connection: <empty>
***
Cipher suite:  TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
*** Certificate chain
chain [0] = [
[
  Version: V3
  Subject: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US
  Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5

  Key:  Sun RSA public key, 2048 bits
  modulus: 21944740401167172627731583459321030363948627215746053925732477915060915436180167456469785746662093119306577380200747716284652995937004530444336851845029170241627465854006145050037178991946925696078563485570896673835545540824265905937881682387179314987285174428010940266412458943894800978345731524307952507729956745301047871771953945124256516782917326981125087548987889540650149121302888872237484100834740328828765018090383963294418357028839734723410564800765871733483849269364796949055153420777966213779145518299141217288017794394762274753999989298548507425930217302947589819396239489846633419099079578249651345685751
  public exponent: 65537
  Validity: [From: Fri May 30 08:43:19 GMT 2014,
               To: Mon May 27 08:43:19 GMT 2024]
  Issuer: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US
  SerialNumber: [    a6ef7a9a 5368eb27]

Certificate Extensions: 3
[1]: ObjectId: 2.5.29.35 Criticality=false
AuthorityKeyIdentifier [
KeyIdentifier [
0000: 78 0D 96 9D FE D3 0B BE   8C C7 E3 EC 67 04 AB 4B  x...........g..K
0010: EA E0 00 29                                        ...)
]
]

[2]: ObjectId: 2.5.29.19 Criticality=false
BasicConstraints:[
  CA:true
  PathLen:2147483647
]

[3]: ObjectId: 2.5.29.14 Criticality=false
SubjectKeyIdentifier [
KeyIdentifier [
0000: 78 0D 96 9D FE D3 0B BE   8C C7 E3 EC 67 04 AB 4B  x...........g..K
0010: EA E0 00 29                                        ...)
]
]

]
  Algorithm: [SHA1withRSA]
  Signature:
0000: 19 16 5A 21 99 21 24 98   3C 0A E8 D8 00 AB 44 24  ..Z!.!$.<.....D$
0010: F2 0C B7 83 D5 9F 96 17   87 E2 1F 1D A3 47 68 C7  .............Gh.
0020: 68 4A CB 56 0E 77 2B E8   1A 9F E7 09 A1 19 77 D0  hJ.V.w+.......w.
0030: 5E CC C1 B3 9A C4 35 3D   CB E0 A5 A6 43 5D A3 26  ^.....5=....C].&
0040: A4 91 8A C1 FA 7B 10 EA   DC C3 C7 1C 47 DC 97 32  ............G..2
0050: C0 37 80 1C F1 42 10 E3   74 17 FA 3E 60 4A B7 59  .7...B..t..>`J.Y
0060: 92 C1 E0 6F BB F1 BB 9F   82 89 B5 83 D5 AE 1E 90  ...o............
0070: 0A 89 8D FB 4C C0 C5 9E   DC C5 8C C6 2F EE D9 B4  ....L......./...
0080: 95 47 27 2E BE 82 31 6F   76 C0 DB 4C C8 0D 3B 7B  .G'...1ov..L..;.
0090: D1 6A BF BD 3B 93 30 04   A2 9E 81 F7 96 28 77 F2  .j..;.0......(w.
00A0: 32 05 68 44 1F B3 30 CE   40 9F 20 F3 B4 2B AA E6  2.hD..0.@. ..+..
00B0: 40 9B FB 7F 34 6E 3A 99   FD F8 28 F1 8C 9B 56 34  @...4n:...(...V4
00C0: 64 AD 4D 56 39 CB 96 18   50 9B 99 43 80 0A 39 A5  d.MV9...P..C..9.
00D0: 13 7A 6E C5 25 E0 95 4A   92 E5 A8 8B EE 03 49 B4  .zn.%..J......I.
00E0: D9 7C 00 E3 F0 3B A7 BA   40 30 CC 89 55 C6 97 93  .....;..@0..U...
00F0: B5 15 F6 62 D3 B1 74 9C   0B 80 2B 8A D4 03 84 A0  ...b..t...+.....

]
***
https-jsse-nio-8443-exec-1, RECV TLSv1.2 ALERT:  warning, close_notify
: C9https-jsse-nio-8443-exec-2, READ: TLSv1.2 Change Cipher Spec, length = 1
%% Negotiating:  [Session-36, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384]
*** ServerHello, TLSv1.2
RandomCookie:  GMT: 1551699707 bytes = { 140, 190, 14, 154, 247, 41, 40, 190, 95, 30, 47, 156, 233, 252, 159, 247, 155, 39, 231, 48, 4, 243, 201, 22, 163, 75, 139, 63 }
Session ID:  *** Finished
{92, 125, 15, 251, 58, 67, 243, 201, 226, 98, 196, 139, 131, 32, 127, 66, 185, 104, 196, 98, 135, 68, 173, 5, 56, 144, 68, 93, 20, 11, 26, 114}
https-jsse-nio-8443-exec-2, READ: TLSv1.2 Handshake, length = 40
 https-jsse-nio-8443-exec-1, closeInboundInternal()
https-jsse-nio-8443-exec-1, closeOutboundInternal()
https-jsse-nio-8443-exec-1, SEND TLSv1.2 ALERT:  warning, description = close_notify
https-jsse-nio-8443-exec-1, WRITE: TLSv1.2 Alert, length = 26
https-jsse-nio-8443-exec-1, called closeOutbound()
https-jsse-nio-8443-exec-1, closeOutboundInternal()
Allow unsafe renegotiation: false
Allow legacy hello messages: true
Is initial handshake: true
Is secure renegotiation: false
*** Finished
verify_data:  { 231, 63, 75, 52, 49, 204, 183, 130, 94, 199, 200, 155 }
***
Cipher Suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
Compression Method: 0
Extension renegotiation_info, renegotiated_connection: <empty>
***
Cipher suite:  TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
*** Diffie-Hellman ServerKeyExchange
DH Modulus:  { 255, 255, 255, 255, 255, 255, verify_data:  { 25, 214, 75, 163, 98, 96, 204, 116, 112, 4, 14, 5 }
***
255, 255, 201, 15, 218, 162, 33, 104, 194, 52, 196, 198, 98, 139, 128, 220, 28, 209, 41, 2, 78, 8, 138, 103, 204, 116, 2, 11, 190, 166, 59, 19, 155, 34, 81, 74, 8, 121, 142, 52, 4, 221, 239, 149, 25, 179, 205, 58, 67, 27, 48, 43, 10, 109, 242, 95, 20, 55, 79, 225, 53, 109, 109, 81, 194, 69, 228, 133, 181, 118, 98, 94, 126, 198, 244, 76, 66, 233, 166, 55, 237, 107, 11, 255, 92, 182, 244, 6, 183, 237, 238, 56, 107, 251, 90, 137, 159, 165, 174, 159, 36, 17, 124, 75, 31, 230, 73, 40, 102, 81, 236, 230, 83, 129, 255, 255, 255, 255, 255, 255, 255, 255 }
DH Base:  { 2 }
Server DH Public Key:  { 253, 18, 15, 10, 1, 172, 245, 111, 99, 120, 3, 73, 232, 33, 177, 58, 238, 48, 60, 216, 127, 227, 53, 94, 101, 52, 113, 159, 204, 125, 175, 82, 52, 98, 129, 233, 58, 208, 40, 140, 238, 80, 45, 9, 63, 207, 43, 37, 124, 43, 117, 10, 11, 168, 67, 53, 27, 9, 224, 28, 93, 103, 191, 23, 157, 227, 238, 52, 152, 52, 131, 63, 62, 250, 57, 250, 243, 189, 49, 157, 165, 150, 16, 95, 6, 190, 39, 129, 147, 58, 191, 32, 172, 190, 15, 47, 69, 75, 160, 171, 126, 100, 150, 67, 222, 113, 128, 163, 230, 57, 68, 180, 20, 157, 137, 190, 105, 142, 97, 101, 236, 23, 5, 112, 235, 6, 62, 87 }
https-jsse-nio-8443-exec-2, WRITE: TLSv1.2 Change Cipher Spec, length = 1
*** Certificate chain
6Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1.1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1.1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1.1
chain [0] = [
[
  Version: V3
  Subject: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US
  Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5

  Key:  Sun RSA public key, 2048 bits
  modulus: 21944740401167172627731583459321030363948627215746053925732477915060915436180167456469785746662093119306577380200747716284652995937004530444336851845029170241627465854006145050037178991946925696078563485570896673835545540824265905937881682387179314987285174428010940266412458943894800978345731524307952507729956745301047871771953945124256516782917326981125087548987889540650149121302888872237484100834740328828765018090383963294418357028839734723410564800765871733483849269364796949055153420777966213779145518299141217288017794394762274753999989298548507425930217302947589819396239489846633419099079578249651345685751
  public exponent: 65537
  Validity: [From: Fri May 30 08:43:19 GMT 2014,
               To: Mon May 27 08:43:19 GMT 2024]
  Issuer: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US
  SerialNumber: [    a6ef7a9a 5368eb27]

Certificate Extensions: 3
[1]: ObjectId: 2.5.29.35 Criticality=false
AuthorityKeyIdentifier [
KeyIdentifier [
0000: 78 0D 96 9D FE D3 0B BE   8C C7 E3 EC 67 04 AB 4B  x...........g..K
0010: EA E0 00 29                                        ...)
]
]

[2]: ObjectId: 2.5.29.19 Criticality=false
BasicConstraints:[
  CA:true
  PathLen:2147483647
]

[3]: ObjectId: 2.5.29.14 Criticality=false
SubjectKeyIdentifier [
KeyIdentifier [
0000: 78 0D 96 9D FE D3 0B BE   8C C7 E3 EC 67 04 AB 4B  x...........g..K
0010: EA E0 00 29                                        ...)
]
]

]
  Algorithm: [SHA1withRSA]
  Signature:
0000: 19 16 5A 21 99 21 24 98   3C 0A E8 D8 00 AB 44 24  ..Z!.!$.<.....D$
0010: F2 0C B7 83 D5 9F 96 17   87 E2 1F 1D A3 47 68 C7  .............Gh.
0020: 68 4A CB 56 0E 77 2B E8   1A 9F E7 09 A1 19 77 D0  hJ.V.w+.......w.
0030: 5E CC C1 B3 9A C4 35 3D   CB E0 A5 A6 43 5D A3 26  ^.....5=....C].&
0040: A4 91 8A C1 FA 7B 10 EA   DC C3 C7 1C 47 DC 97 32  ............G..2
0050: C0 37 80 1C F1 42 10 E3   74 17 FA 3E 60 4A B7 59  .7...B..t..>`J.Y
0060: 92 C1 E0 6F BB F1 BB 9F   82 89 B5 83 D5 AE 1E 90  ...o............
0070: 0A 89 8D FB 4C C0 C5 9E   DC C5 8C C6 2F EE D9 B4  ....L......./...
0080: 95 47 27 2E BE 82 31 6F   76 C0 DB 4C C8 0D 3B 7B  .G'...1ov..L..;.
0090: D1 6A BF BD 3B 93 30 04   A2 9E 81 F7 96 28 77 F2  .j..;.0......(w.
00A0: 32 05 68 44 1F B3 30 CE   40 9F 20 F3 B4 2B AA E6  2.hD..0.@. ..+..
00B0: 40 9B FB 7F 34 6E 3A 99   FD F8 28 F1 8C 9B 56 34  @...4n:...(...V4
00C0: 64 AD 4D 56 39 CB 96 18   50 9B 99 43 80 0A 39 A5  d.MV9...P..C..9.
00D0: 13 7A 6E C5 25 E0 95 4A   92 E5 A8 8B EE 03 49 B4  .zn.%..J......I.
00E0: D9 7C 00 E3 F0 3B A7 BA   40 30 CC 89 55 C6 97 93  .....;..@0..U...
00F0: B5 15 F6 62 D3 B1 74 9C   0B 80 2B 8A D4 03 84 A0  ...b..t...+.....

]
***
*** Diffie-Hellman ServerKeyExchange
Signature Algorithm SHA256withRSA
Signed with a DSA or RSA public key
https-jsse-nio-8443-exec-10, WRITE: TLSv1.2 Change Cipher Spec, length = 1
DH Modulus:  { 255, 255, 255, 255, 255, 255, 255, 255, 201, 15, 218, 162, 33, 104, 194, 52, 196, 198, 98, 139, 128, 220, 28, 209, 41, 2, 78, 8, 138, 103, 204, 116, 2, 11, 190, 166, 59, 19, 155, 34, 81, 74, 8, 121, 142, 52, 4, 221, 239, 149, 25, 179, 205, 58, 67, 27, 48, 43, 10, 109, 242, 95, 20, 55, 793,  AE 84 75 F5 48 5F   5E 61 C6 2D C7 28 B7 A5  .c..u.H_^a.-.(..
https-jsse-nio-8443-exec-5, READ: TLSv1 Handshake, length = 512
0040: F5 7D F7 79 1A 4F 7A 5B   AD 1C EA 24 72 FD 4B 65  ...y.Oz[...$r.Ke
*** ClientHello, TLSv1.2
RandomCookie:  *** Finished
GMT: 1077481513 bytes = { 57, 11, 93, 62, 11, 82, 158, 138, 202, 112, 75, 162, 218, 200, 235, 0, 110, 19, 228, 129, 2, 75, 161, 30, 7, 242, 176, 200 }
Session ID:  0050: 6F A1 DE 13 67 54 6F 04   08 59 63 B6 8E E4 02 ED  o...gTo..Yc.....
0060: F8 8B 4A 43 FC AE E4 81   0C 98 EC 7F 7D AE 29 81  ..JC..........).
0070: 63 0E 7D 1C 21 EB 1A 63   58 ED 84 71 35 C3 A7 CB  c...!..cX..q5...
225*** Finished
verify_data:  { 107, 145, 52, 24, 33, 207, 46, 106, 198, 62, 243, 150 }
***
, 53, 109, 109, 81, 194, 69, 228, *** ServerHelloDone
133, 181, 118, 98, 94, 126, 198, 244, 76, 66, 233, 166, 55, 237, 107, 11, 255, 92, 182, 244, 6, 183, 237, 238, 56, 107, 251, 90, 137, 159, 165, 174, 159, 36, 17, 124, 75, 31, 230, 73, 40, 102, 81, 236, 230, 83, 129, 255, 255, 255, 255, 255, 255, 255, 255 }
https-jsse-nio-8443-exec-10, WRITE: TLSv1.2 Handshake, length = 40
CONNECTION KEYGEN:
Client Nonce:
0000: 9B 5D DF B6 45 A5 BC 45   87 08 04 A2 2C 61 14 3C  .]..E..E....,a.<
0010: 50 5D 7F 5C 64 85 F7 5F   14 7D 6F 6F 93 2E E6 44  P].\d.._..oo...D
Server Nonce:
0000: 5C 7D 0F FA D1 96 B6 C5   53 90 4F 77 F7 45 54 9F  \.......S.Ow.ET.
0010: 25 06 AF BC E9 CC BA 19   C5 71 0B B2 27 E8 C3 2B  %........q..'..+
Master Secret:
0000: 38 ED 80 B8 D7 78 6F E3   25 C6 0C C7 83 46 C1 C4  8....xo.%....F..
0010: 0B B8 F8 37 59 73 09 66   45 C1 3C 72 EB 23 D7 57  ...7Ys.fE.<r.#.W
0020: 61 90 34 19 74 E9 4E 93   36 39 EF AE CF DD 2A B1  a.4.t.N.69....*.
... no MAC keys used for this cipher
Client write key:
0000: 06 25 37 62 1D D3 F6 FB   CD 7A FB 48 77 7B 24 69  .%7b.....z.Hw.$i
0010: 52 9D 5E A0 00 4A 8B D9   6E B3 2C DF DA 58 C8 54  R.^..J..n.,..X.T
Server write key:
0000: 37 60 97 04 57 67 BA 35   AC 2D F4 ED F1 C7 A7 13  7`..Wg.5.-......
0010: 2B 12 68 56 F2 26 77 D9   41 89 48 E0 79 29 E1 3B  +.hV.&w.A.H.y).;
Client write IV:
0000: 3D 6F 50 51                                        =oPQ
Server write IV:
0000: 86 5D A6 8B                                        .]..
{92, 125, 15, 250, 118, 157, 4, 214, 139, 143, 30, 61, 184, 190, 46, 64, 131, 46, 40, 168, 183, 96, 10, 122, 80, 159, 188, 137, 169, 247, 151, 124}
verify_data:  { 234, 232, 60, 235, 33, 40, 214, 151, 146, 82, 218, 89 }
***
%% Cached server session: [Session-33, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384]
DH Base:  { 2 }
Server DH Public Key:  { 119, 133, 74, 112, 54, 143, 120, 76, 134, 184, 133, 223, 241, 49, 18, 198, 247, 111, 100, 29, 69, 253, 150, 32, 130, 38, 78, 14, 103, 246, 90, 153, 239, 30, 145, 76, 196, 74, 5, 167, 220, 139, 191, 239, 153, 91, 239, 34, 216, 77, 49, 64, 195, 123, 12, 234, 3, 24, 104, 225, 7, 109, 252, 236, 179, 33, 207, 255, 247, 15, 12, 57, 8, 54, 218, 214, 214, 42, 190, 251, 26, 4, 136, 23, 156, 41, 7, 106, 14, 71, 223, 219, 49, 154, 221, 90, 87, 17, 203, 97, 83, 111, 161, 205, 23, 51, 32, 23, 249, 227, 42, 79, 217, 166, 43, 178, 215, 78, 31, 3, 144, 118, 67, 16, 122, 21, 169, 171 }
Signature Algorithm SHA256withRSA
Signed with a DSA or RSA public key
*** ServerHelloDone
https-jsse-nio-8443-exec-3, WRITE: TLSv1.2 Handshake, length = 1697
https-jsse-nio-8443-exec-6, WRITE: TLSv1.2 Handshake, length = 1697
https-jsse-nio-8443-exec-7, READ: TLSv1.2 Change Cipher Spec, length = 1
https-jsse-nio-8443-exec-2, WRITE: TLSv1.2 Handshake, length = 40
Cipher Suites: [Unknown 0x13:0x2, Unknown 0x13:0x3, Unknown 0x13:0x1, Unknown 0x13:0x4, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa9, Unknown 0xc0:0xad, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0xac, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa8, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xc0:0x9d, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9c, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xaa, Unknown 0xc0:0x9f, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9e, TLS_DHE_RSA_WITH_AES_128_CBC_SHA]
Compression Methods:  { 0 }
%% Cached server session: [Session-35, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384]
Unsupported extension status_request, data: 01:00:00:00:00
https-jsse-nio-8443-exec-7, READ: TLSv1.2 Handshake, length = 40
Extension elliptic_curves, curve names: {secp256r1, secp384r1, secp521r1, unknown curve 29, unknown curve 256, unknown curve 257, unknown curve 258, unknown curve 259, unknown curve 260}
Extension ec_point_formats, formats: [uncompressed]
Extension signature_algorithms, signature_algorithms: SHA256withRSA, Unknown (hash:0x8, signature:0x9), Unknown (hash:0x8, signature:0x4), SHA256withECDSA, Unknown (hash:0x8, signature:0x7), SHA384withRSA, Unknown (hash:0x8, signature:0xa), Unknown (hash:0x8, signature:0x5), SHA384withECDSA, SHA512withRSA, Unknown (hash:0x8, signature:0xb), Unknown (hash:0x8, signature:0x6), SHA512withECDSA, SHA1withRSA, SHA1withECDSA
Unsupported extension type_35, data:
Unsupported extension type_51, data: 00:69:00:17:00:41:04:59:44:6a:e1:f3:9f:57:14:93:d0:8b:9e:84:7d:86:f1:1d:bf:bc:d2:31:4d:7c:3e:f4:7d:0d:bf:13:e1:b8:bb:80:e5:f3:f3:13:bc:f9:8e:f9:27:d9:62:ee:8d:10:4e:fd:34:9b:b7:05:19:d2:6e:0c:d2:20:9f:6f:3b:f1:e9:00:1d:00:20:af:01:f3:36:e8:57:a0:a8:cb:45:81:c0:59:e6:58:2e:c3:4f:3d:04:f9:ff:79:79:f8:94:5c:20:4a:b1:96:30
Unsupported extension type_43, data: 08:03:04:03:03:03:02:03:01
Extension renegotiation_info, renegotiated_connection: <empty>
Extension server_name, server_name: [type=host_name (0), value=localhost]
Unsupported extension type_45, data: 02:01:00
Unsupported extension type_28, data: 40:00
Unsupported extension type_21, data: 00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00
***
*** Finished
verify_data:  { 42, 223, 45, 227, 102, 183, 221, 153, 132, 54, 82, 180 }
***
https-jsse-nio-8443-exec-7, WRITE: TLSv1.2 Change Cipher Spec, length = 1
%% Initialized:  [Session-38, SSL_NULL_WITH_NULL_NULL]
*** Finished
verify_data:  { 128, 48, 39, 162, 106, 123, 31, 240, 21, 154, 50, 238 }
***
https-jsse-nio-8443-exec-7, WRITE: TLSv1.2 Handshake, length = 40
%% Cached server session: [Session-34, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384]
Standard ciphersuite chosen: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
%% Negotiating:  [Session-38, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384]
*** ServerHello, TLSv1.2
RandomCookie:  GMT: 1551699707 bytes = { 137, 22, 220, 42, 157, 37, 238, 211, 52, 207, 179, 52, 54, 118, 130, 0, 0, 155, 239, 76, 99, 28, 184, 190, 234, 199, 81, 158 }
Session ID:  {92, 125, 15, 251, 81, 53, 15, 29, 214, 99, 168, 187, 1, 61, 35, 114, 128, 66, 29, 32, 85, 113, 210, 152, 168, 201, 72, 85, 116, 212, 176, 100}
Cipher Suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
Compression Method: 0
Extension renegotiation_info, renegotiated_connection: <empty>
***
Cipher suite:  TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
*** Certificate chain
chain [0] = [
[
  Version: V3
  Subject: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US
  Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5

  Key:  Sun RSA public key, 2048 bits
  modulus: 21944740401167172627731583459321030363948627215746053925732477915060915436180167456469785746662093119306577380200747716284652995937004530444336851845029170241627465854006145050037178991946925696078563485570896673835545540824265905937881682387179314987285174428010940266412458943894800978345731524307952507729956745301047871771953945124256516782917326981125087548987889540650149121302888872237484100834740328828765018090383963294418357028839734723410564800765871733483849269364796949055153420777966213779145518299141217288017794394762274753999989298548507425930217302947589819396239489846633419099079578249651345685751
  public exponent: 65537
  Validity: [From: Fri May 30 08:43:19 GMT 2014,
               To: Mon May 27 08:43:19 GMT 2024]
  Issuer: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US
  SerialNumber: [    a6ef7a9a 5368eb27]

Certificate Extensions: 3
[1]: ObjectId: 2.5.29.35 Criticality=false
AuthorityKeyIdentifier [
KeyIdentifier [
0000: 78 0D 96 9D FE D3 0B BE   8C C7 E3 EC 67 04 AB 4B  x...........g..K
0010: EA E0 00 29                                        ...)
]
]

[2]: ObjectId: 2.5.29.19 Criticality=false
BasicConstraints:[
  CA:true
  PathLen:2147483647
]

[3]: ObjectId: 2.5.29.14 Criticality=false
SubjectKeyIdentifier [
KeyIdentifier [
0000: 78 0D 96 9D FE D3 0B BE   8C C7 E3 EC 67 04 AB 4B  x...........g..K
0010: EA E0 00 29                                        ...)
]
]

]
  Algorithm: [SHA1withRSA]
  Signature:
0000: 19 16 5A 21 99 21 24 98   3C 0A E8 D8 00 AB 44 24  ..Z!.!$.<.....D$
0010: F2 0C B7 83 D5 9F 96 17   87 E2 1F 1D A3 47 68 C7  .............Gh.
0020: 68 4A CB 56 0E 77 2B E8   1A 9F E7 09 A1 19 77 D0  hJ.V.w+.......w.
0030: 5E CC C1 B3 9A C4 35 3D   CB E0 A5 A6 43 5D A3 26  ^.....5=....C].&
0040: A4 91 8A C1 FA 7B 10 EA   DC C3 C7 1C 47 DC 97 32  ............G..2
0050: C0 37 80 1C F1 42 10 E3   74 17 FA 3E 60 4A B7 59  .7...B..t..>`J.Y
0060: 92 C1 E0 6F BB F1 BB 9F   82 89 B5 83 D5 AE 1E 90  ...o............
0070: 0A 89 8D FB 4C C0 C5 9E   DC C5 8C C6 2F EE D9 B4  ....L......./...
0080: 95 47 27 2E BE 82 31 6F   76 C0 DB 4C C8 0D 3B 7B  .G'...1ov..L..;.
0090: D1 6A BF BD 3B 93 30 04   A2 9E 81 F7 96 28 77 F2  .j..;.0......(w.
00A0: 32 05 68 44 1F B3 30 CE   40 9F 20 F3 B4 2B AA E6  2.hD..0.@. ..+..
00B0: 40 9B FB 7F 34 6E 3A 99   FD F8 28 F1 8C 9B 56 34  @...4n:...(...V4
00C0: 64 AD 4D 56 39 CB 96 18   50 9B 99 43 80 0A 39 A5  d.MV9...P..C..9.
00D0: 13 7A 6E C5 25 E0 95 4A   92 E5 A8 8B EE 03 49 B4  .zn.%..J......I.
00E0: D9 7C 00 E3 F0 3B A7 BA   40 30 CC 89 55 C6 97 93  .....;..@0..U...
00F0: B5 15 F6 62 D3 B1 74 9C   0B 80 2B 8A D4 03 84 A0  ...b..t...+.....

]
***
https-jsse-nio-8443-exec-2, WRITE: TLSv1.2 Application Data, length = 84
https-jsse-nio-8443-exec-10, READ: TLSv1.2 Handshake, length = 134
https-jsse-nio-8443-exec-7, WRITE: TLSv1.2 Application Data, length = 84
https-jsse-nio-8443-exec-4, WRITE: TLSv1.2 Application Data, length = 83
https-jsse-nio-8443-exec-1, READ: TLSv1.2 Handshake, length = 134
*** Diffie-Hellman ServerKeyExchange
*** ClientKeyExchange, DH
DH Public key:  { 255, 16, 201, 189, 197, 172, 116, 14, 248, 111, 231, 66, 62, 170, 155, 87, 110, 34, 156, 102, 93, 133, 253, 185, 8, 225, 131, 138, 142, 31, 162, 46, 189, 29, 120, 110, 90, 207, 169, 43, 61, 69, 72, 110, 189, 131, 237, 147, 61, 159, 58, 42, 179, 193, 126, 210, 66, 204, 122, 198, 223, 16, 211, 35, 163, 79, 95, 150, 221, 2, 254, 241, 21, 236, 148, 117, 207, 86, 210, 122, 13, 78, 67, 196, 141, 132, 24, 15, 81, 57, 176, 200, 97, 102, 45, 15, 89, 180, 60, 150, 39, 54, 109, 206, 5, 208, 102, 143, 0, 238, 134, 145, 119, 90, 49, 23, 125, 225, 30, 225, 192, 182, 209, 170, 24, 224, 40, 2 }
SESSION KEYGEN:
PreMaster Secret:
0000: 34 4C 4C EF 26 DE 3C 30   52 5D 3A 9B 1A 85 F9 C5  4LL.&.<0R]:.....
0010: 1A C6 CD 62 41 C3 84 90   3E 7B 3E B1 F2 31 35 EF  ...bA...>.>..15.
0020: CC E5 74 7C 13 6C 2F A8   9C F3 1A 51 35 59 1D 29  ..t..l/....Q5Y.)
0030: B3 FE FA EB 72 20 7A 51   D7 21 78 4A 61 89 F0 99  ....r zQ.!xJa...
0040: 69 03 A0 62 99 08 7B BA   D3 D9 3B 0F F3 99 61 74  i..b......;...at
0050: 20 5B 42 A5 5C A2 3D F1   1A 8B 8D 95 5D BC 46 2C   [B.\.=.....].F,
0060: 73 A8 9D F8 5D D3 68 BD   92 AF 74 B1 60 A9 70 5B  s...].h...t.`.p[
0070: 30 F8 D6 79 00 A4 61 DF   79 52 0E 92 A8 2F 60 06  0..y..a.yR.../`.
CONNECTION KEYGEN:
Client Nonce:
0000: 01 1F F0 66 EA 9F 1A 4F   9E 3A 98 05 39 EC 53 EA  ...f...O.:..9.S.
0010: 40 A1 AC B5 2F E3 10 F7   8D AF F1 37 EE 57 FE 48  @.../......7.W.H
Server Nonce:
0000: 5C 7D 0F FB 8C BE 0E 9A   F7 29 28 BE 5F 1E 2F 9C  \........)(._./.
0010: E9 FC 9F F7 9B 27 E7 30   04 F3 C9 16 A3 4B 8B 3F  .....'.0.....K.?
Master Secret:
0000: 41 5D EE 4A B3 0B F9 A1   80 5C 81 88 0A 53 A4 36  A].J.....\...S.6
0010: 37 BA C2 EE 67 8D 20 17   35 C3 E4 9A D7 B9 1C 1C  7...g. .5.......
0020: 75 34 6E 63 2F A3 EF 60   1F C3 D7 05 6B 4A FD D4  u4nc/..`....kJ..
... no MAC keys used for this cipher
Client write key:
0000: 11 A3 29 EF 9A 7A 6D 59   C4 40 E2 7D 15 9F 12 B2  ..)..zmY.@......
0010: 1C B0 0B 81 45 E2 C3 C7   44 9C 56 EC 1A 19 C9 0C  ....E...D.V.....
Server write key:
0000: 5C 64 51 55 44 69 63 60   6B 7A CC 58 42 39 8A 41  \dQUDic`kz.XB9.A
0010: 61 50 9D 7F 5F 11 BC 1C   93 4A E2 34 D3 57 4E D2  aP.._....J.4.WN.
Client write IV:
0000: 24 54 98 4F                                        $T.O
Server write IV:
0000: 06 D3 99 59                                        ...Y
*** ClientKeyExchange, DH
DH Public key:  { 14, 0, 140, 138, 23, 177, 198, 39, 84, 13, 216, 0, 231, 4, 19, 166, 96, 36, 92, 72, 208, 124, 201, 251, 33, 144, 19, 133, 100, 80, 43, 200, 199, 31, 251, 55, 182, 47, 201, 135, 210, 204, 244, 14, 170, 179, 241, 203, 245, 127, 66, 19, 198, 2, 38, 251, 186, 77, 221, 243, 139, 119, 209, 176, 170, 221, 241, 149, 134, 84, 44, 32, 237, 250, 60, 7, 141, 78, 196, 215, 245, 171, 34, 13, 125, 219, 69, 67, 173, 25, 212, 58, 225, 141, 48, 41, 234, 172, 109, 72, 214, 237, 166, 100, 39, 128, 193, 29, 63, 137, 225, 68, 32, 185, 11, 24, 44, 237, 139, 180, 198, 87, 123, 218, 244, 101, 40, 82 }
https-jsse-nio-8443-exec-1, READ: TLSv1.2 Change Cipher Spec, length = 1
https-jsse-nio-8443-exec-1, READ: TLSv1.2 Handshake, length = 40
SESSION KEYGEN:
https-jsse-nio-8443-exec-9, READ: TLSv1.2 Alert, length = 26
*** Finished
verify_data:  { 101, 129, 123, 132, 69, 46, 161, 121, 247, 163, 6, 136 }
***
https-jsse-nio-8443-exec-1, WRITE: TLSv1.2 Change Cipher Spec, length = 1
*** Finished
verify_data:  { 40, 27, 140, 240, 135, 45, 19, 197, 190, 145, 8, 63 }
***
DH Modulus:  { 255, 255, 255, Using SSLEngineImpl.
Allow unsafe renegotiation: false
Allow legacy hello messages: true
Is initial handshake: true
Is secure renegotiation: false
Using SSLEngineImpl.
Using SSLEngineImpl.
https-jsse-nio-8443-exec-3, READ: TLSv1.2 Alert, length = 26
PreMaster Secret:
https-jsse-nio-8443-exec-9, RECV TLSv1.2 ALERT:  warning, close_notify
0000: https-jsse-nio-8443-exec-3, RECV TLSv1.2 ALERT:  warning, close_notify
https-jsse-nio-8443-exec-3, closeInboundInternal()
https-jsse-nio-8443-exec-3, closeOutboundInternal()
https-jsse-nio-8443-exec-3, SEND TLSv1.2 ALERT:  warning, description = close_notify
https-jsse-nio-8443-exec-3, WRITE: TLSv1.2 Alert, length = 26
https-jsse-nio-8443-exec-1, WRITE: TLSv1.2 Handshake, length = 40
%% Cached server session: [Session-36, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384]
https-jsse-nio-8443-exec-3, called closeOutbound()
https-jsse-nio-8443-exec-3, closeOutboundInternal()
255, 255, 255, 255, 255, 201, 15, 218, 162, 33, 104, 194, 52, 196, 198, 98, 139, 128, 220, 28, 209, 41, 2, 78, 8, 138, 103, 204, 116, 2, 11, 190, 166, 59, 19, 155, 34, 81, 74, 8, 121, 142, 52, 4, 221, 239, 149, 25, 179, 205, 58, 67, 27, 48, 43, 10, 109, 242, 95, 20, 55, 79, 225, 53, 109, 109, 81, 194, 69, 228, 133, 181, 118, 98, 94, 126, 198, 244, 76, 66, 233, 166, 55, 237, 107, 11, 255, 92, 182, 244, 6, 183, 237, 238, 56, 107, 251, 90, 137, 159, 165, 174, 159, 36, 17, 124, 75, 31, 230, 73, 40, 102, 81, 236, 230, 83, 129, 255, 255, 255, 255, 255, 255, 255, 255 }
DH Base:  { 2 }
Server DH Public Key:  { 23, 129, 32, 112, 100, 83, 209, 85, 52, 118, 18, 50, 140, 204, 236, 123, 24, 237, 135, 50, 170, 84, 8, 246, 168, 245, 136, 53, 214, 239, 137, 60, 53, 132, 241, 179, 218, 191, 69, 198, 147, 191, 219, 224, 57, 143, 142, 95, 93, 138, 192, 250, 107, 33, 156, 211, 85, 162, 216, 116, 212, 242, 22, 7, 23, 67, 72, 0, 218, 250, 207, 132, 166, 246, 76, 87, 121, 51, 153, 87, 123, 245, 223, 200, 252, 27, 151, 12, 79, 164, 46, 233, 123, 199, 164, 200, 177, 46, 91, 87, 160, 1, 164, 148, 215, 105, 163, 212, 141, 171, 55, 47, 99, 243, 254, 88, 114, 176, 105, 55, 166, 180, 100, 26, 11, 145, 113, 2 }
Signature Algorithm SHA256withRSA
Signed with a DSA or RSA public key
*** ServerHelloDone
https-jsse-nio-8443-exec-5, WRITE: TLSv1.2 Handshake, length = 1697
https-jsse-nio-8443-exec-6, READ: TLSv1.2 Alert, length = 26
https-jsse-nio-8443-exec-6, RECV TLSv1.2 ALERT:  warning, close_notify
https-jsse-nio-8443-exec-6, closeInboundInternal()
https-jsse-nio-8443-exec-6, closeOutboundInternal()
https-jsse-nio-8443-exec-6, SEND TLSv1.2 ALERT:  warning, description = close_notify
https-jsse-nio-8443-exec-6, WRITE: TLSv1.2 Alert, length = 26
https-jsse-nio-8443-exec-6, called closeOutbound()
https-jsse-nio-8443-exec-6, closeOutboundInternal()
https-jsse-nio-8443-exec-3, WRITE: TLSv1.2 Application Data, length = 84
6C 99https-jsse-nio-8443-exec-9, closeInboundInternal()
https-jsse-nio-8443-exec-9, closeOutboundInternal()
Allow unsafe renegotiation: false
Allow legacy hello messages: true
Is initial handshake: true
Is secure renegotiation: false
Allow unsafe renegotiation: false
Allow legacy hello messages: true
Is initial handshake: true
Is secure renegotiation: false
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1.1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1.1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1.1
https-jsse-nio-8443-exec-4, READ: TLSv1 Handshake, length = 512
*** ClientHello, TLSv1.2
RandomCookie:  GMT: 639694063 bytes = { 123, 202, 232, 207, 102, 199, 27, 232, 141, 44, 29, 175, 145, 49, 147, 54, 140, 50, 149, 10, 255, 67, 252, 140, 182, 70, 217, 74 }
Session ID:  Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1.1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1.1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1.1
https-jsse-nio-8443-exec-8, READ: TLSv1 Handshake, length = 512
https-jsse-nio-8443-exec-3, READ: TLSv1.2 Alert, length = 26
*** ClientHello, TLSv1.2
RandomCookie:  GMT: 1869694621 bytes = { 231, 170https-jsse-nio-8443-exec-3, RECV TLSv1.2 ALERT:  warning, close_notify
https-jsse-nio-8443-exec-3, closeInboundInternal()
https-jsse-nio-8443-exec-3, closeOutboundInternal()
https-jsse-nio-8443-exec-3, SEND TLSv1.2 ALERT:  warning, description = close_notify
{92, 125, 15, 250, 222, 28, 56, 143, 109, 254, 171, 255, 146, 211, 173, 127, 164, 151, 85, 161, 82, 252, 1, 187, 219, 71, 210, 215, 89, 19, 2, 22}
Cipher Suites: [Unknown 0x13:0x2, Unknown 0x13:0x3, Unknown 0x13:0x1, Unknown 0x13:0x4, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa9, Unknown 0xc0:0xad, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0xac, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa8, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xc0:0x9d, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9c, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xaa, Unknown 0xc0:0x9f, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9e, TLS_DHE_RSA_WITH_AES_128_CBC_SHA]
Compression Methods:  { 0 }
Unsupported extension status_request, data: 01:00:00:00:00
Extension elliptic_curves, curve names: {secp256r1, secp384r1, secp521r1, unknown curve 29, unknown curve 256, unknown curve 257, unknown curve 258, unknown curve 259, unknown curve 260}
Extension ec_point_formats, formats: [uncompressed]
Extension signature_algorithms, signature_algorithms: SHA256withRSA, Unknown (hash:0x8, signature:0x9), Unknown (hash:0x8, signature:0x4), SHA256withECDSA, Unknown (hash:0x8, signature:0x7), SHA384withRSA, Unknown (hash:0x8, signature:0xa), Unknown (hash:0x8, signature:0x5), SHA384withECDSA, SHA512withRSA, Unknown (hash:0x8, signature:0xb), Unknown (hash:0x8, signature:0x6), SHA512withECDSA, SHA1withRSA, SHA1withECDSA
Unsupported extension type_35, data:
Unsupported extension type_51, data: 00:69:00:17:00:41:04:66:79:57:d3:6d:5e:47:98:92:58:30:8c:05:68:52:cc:b4:e2:d7:c1:6d:f1:0c:71:36:2b:d5:fc:90:a9:6f:82:2d:2a:a7:68:55:bd:c1:70:1c:c4:a4:98:d4:68:ac:1d:7a:87:86:ac:ec:33:f5:34:cd:a9:9d:d8:d8:6e:7c:96:00:1d:00:20:01:3c:65:41:91:bd:29:13:fd:3a:10:c6:79:e0:ee:01:77:45:be:8f:61:61:c7:c9:21:0a:bd:f8:87:f2:61:3b
Unsupported extension type_43, data: 08:03:04:03:03:03:02:03:01
Extension renegotiation_info, renegotiated_connection: <empty>
Extension server_name, server_name: [type=host_name (0), value=localhost]
Unsupported extension type_45, data: 02:01:00
Unsupported extension type_28, data: 40:00
Unsupported extension type_21, data: 00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00
***
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1
https-jsse-nio-8443-exec-9, SEND TLSv1.2 ALERT:  warning, description = close_notify
 A7 C8 6D 58 E9 C8   71 65 3D A6 EF EE F0 EB  l...mX..qe=.....
0010Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1
https-jsse-nio-8443-exec-7, READ: TLSv1.2 Handshake, length = 134
Using SSLEngineImpl.
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1.1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1.1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1.1
https-jsse-nio-8443-exec-2, READ: TLSv1 Handshake, length = 512
*** ClientHello, TLSv1.2
RandomCookie:  GMT: 1804453063 bytes = { 133, 116, 204, 52, 188, 129, 0, 25, 252, 8, 226, 194, 174, 78, 85, 15, 77, 6, 116, 135, 31, 29, 2, 195, 198, 58, 246, 28 }
Session ID:  {92, 125, 15, 250, 222, 28, 56, 143, 109, 254, 171, 255, 146, 211, 173, 127, 164, 151, 85, 161, 82, 252, 1, 187, 219, 71, 210, 215, 89, 19, 2, 22}
Cipher Suites: [Unknown 0x13:0x2, Unknown 0x13:0x3, Unknown 0x13:0x1, Unknown 0x13:0x4, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa9, Unknown 0xc0:0xad, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0xac, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa8, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xc0:0x9d, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9c, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xaa, Unknown 0xc0:0x9f, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9e, TLS_DHE_RSA_WITH_AES_128_CBC_SHA]
Compression Methods:  { 0 }
Unsupported extension status_request, data: 01:00:00:00:00
Extension elliptic_curves, curve names: {secp256r1, secp384r1, secp521r1, unknown curve 29, unknown curve 256, unknown curve 257, unknown curve 258, unknown curve 259, unknown curve 260}
Extension ec_point_formats, formats: [uncompressed]
Extension signature_algorithms, signature_algorithms: SHA256withRSA, Unknown (hash:0x8, signature:0x9), Unknown (hash:0x8, signature:0x4), SHA256withECDSA, Unknown (hash:0x8, signature:0x7), SHA384withRSA, Unknown (hash:0x8, signature:0xa), Unknown (hash:0x8, signature:0x5), SHA384withECDSA, SHA512withRSA, Unknown (hash:0x8, signature:0xb), Unknown (hash:0x8, signature:0x6), SHA512withECDSA, SHA1withRSA, SHA1withECDSA
Unsupported extension type_35, data:
Unsupported extension type_51, data: 00:69:00:17:00:41:04:7f:0f:be:22:16:61:d8:d7:37:04:88:da:0c:c2:af:a3:44:c1:98:5d:d4:87:7e:0e:5f:1c:48:4e:3b:62:ba:5d:4d:2b:08:03:05:59:52:0a:cd:0b:8c:f9:8b:45:05:98:69:4a:08:d9:ca:33:d4:e5:17:23:e0:6f:e7:73:53:f1:00:1d:00:20:5a:23:b6:78:86:5b:ea:8a:40:ff:fb:2c:4f:e8:84:35:fc:56:e5:10:92:f7:e4:96:6b:71:33:f0:fc:08:e6:51
Unsupported extension type_43, data: 08:03:04:03:03:03:02:03:01
Extension renegotiation_info, renegotiated_connection: <empty>
Extension server_name, server_name: [type=host_name (0), value=localhost]
Unsupported extension type_45, data: 02:01:00
Unsupported extension type_28, data: 40:00
Unsupported extension type_21, data: 00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00
***
%% Initialized:  [Session-40, SSL_NULL_WITH_NULL_NULL]
https-jsse-nio-8443-exec-3, WRITE: TLSv1.2 Alert, length = 26
https-jsse-nio-8443-exec-3, called closeOutbound()
https-jsse-nio-8443-exec-3, closeOutboundInternal()
, 159, 241, 4, 5, 182, 184, 89, 198, 207, 253, 87, 175, 109, 232, 95, 224, 253, 108, 109, 235, 138, 176, 211, 119, 70, 183 }
Session ID:  {92, 125, 15, 250, 222, 28, 56, 143, 109, 254, 171, 255, 146, 211, 173, 127, 164, 151, 85, 161, 82, 252, 1, 187, 219, 71, 210, 215, 89, 19, 2, 22}
Cipher Suites: [Unknown 0x13:0x2, Unknown 0x13:0x3, Unknown 0x13:0x1, Unknown 0x13:0x4, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa9, Unknown 0xc0:0xad, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0xac, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa8, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xc0:0x9d, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9c, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xaa, Unknown 0xc0:0x9f, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9e, TLS_DHE_RSA_WITH_AES_128_CBC_SHA]
Compression Methods:  { 0 }
Unsupported extension status_request, data: 01:00:00:00:00
Extension elliptic_curves, curve names: {secp256r1, secp384r1, secp521r1, unknown curve 29, unknown curve 256, unknown curve 257, unknown curve 258, unknown curve 259, unknown curve 260}
Extension ec_point_formats, formats: [uncompressed]
Extension signature_algorithms, signature_algorithms: SHA256withRSA, Unknown (hash:0x8, signature:0x9), Unknown (hash:0x8, signature:0x4), SHA256withECDSA, Unknown (hash:0x8, signature:0x7), SHA384withRSA, Unknown (hash:0x8, signature:0xa), Unknown (hash:0x8, signature:0x5), SHA384withECDSA, SHA512withRSA, Unknown (hash:0x8, signature:0xb), Unknown (hash:0x8, signature:0x6), SHA512withECDSA, SHA1withRSA, SHA1withECDSA
Unsupported extension type_35, data:
Unsupported extension type_51, data: 00:69:00:17:00:41:04:a9:5c:68:01:54:07:f3:e5:e6:09:93:af:a0:42:f2:e1:c6:88:0f:ed:b7:22:61:cb:4a:75:85:f3:28:a8:11:8c:35:f0:b2:bb:f3:95:94:68:de:46:5b:30:66:93:99:5a:49:a0:cc:4b:b2:d0:c8:72:79:a6:1e:8f:21:19:00:1f:00:1d:00:20:81:ea:07:c7:6c:dd:cb:74:bd:82:58:f4:e9:c7:8f:5a:a8:32:32:2e:f6:68:94:06:92:ce:72:b0:13:dd:7a:65
Unsupported extension type_43, data: 08:03:04:03:03:03:02:03:01
Extension renegotiation_info, renegotiated_connection: <empty>
Extension server_name, server_name: [type=host_name (0), value=localhost]
Unsupported extension type_45, data: 02:01:00
Unsupported extension type_28, data: 40:00
Unsupported extension type_21, data: 00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00
Standard ciphersuite chosen: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
*** ClientKeyExchange, DH
: F2 94 F6 AB 5D A3 BF E6   B1 E2 D2 E3 AA C4 A9 FE  ....]...........
0%% Initialized:  [Session-39, SSL_NULL_WITH_NULL_NULL]
https-jsse-nio-8443-exec-9, WRITE: TLSv1.2 Alert, length = 26
020: 59 59 72 D3 B0 37 DE D7   A7 68 66 DA 91 FB B4 6C  YYr..7...hf....l
0030: 4B 91 61 EB B5 AF 6D 34   44 7E BC 70 9E B1 FC 0D  K.a...m4D..p....
0040: E0 CD E8 8F 5E 35 AF 0C   FD FE 2A E2 39 1E 75 52  ....^5....*.9.uR
0050: 2C 27 37 00 1A 7D F2 4E   93 11 49 D5 C2 7C 82 EA  ,'7....N..I.....
0060: 77 66 03 26 3E 1C E1 81   71 2F BE DE 84 42 5F F2  wf.&>...q/...B_.
0070: 60 C2 28 6D 71 AC CA 2D   C1 61 C9 Standard ciphersuite chosen: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
DH Public key:  { 30, 38, 47, 241, 140, 165, 138, 76, 191, 92, 58, 137, 252, 174, 117, 147, 247, 165, 128, 120, 253, 197, 219, 168, 233, 157, 37, 187, 250, 88, 171, 95, 58, 195, 6, 77, 190, 2, 45, 14, 184, 202, 107, 99, 35, 162, 13, 34, 167, 43, 192, 248, 248, 212, 207, 116, 101, 203, 78, 154, 235, 118, 93, 231, 78, 109, 85, 252, 98, 59, 151, 91, 82, 70, 7, 228, 204, 74, 56, 245, 226, 92, 201, 240, 176, 16, 115, 75, 167, 37, 81, 65, 194, 126, 155, 154, 95, 197, 0, 230, 120, 142, 107, 22, 126, 87, 50, 209, 152, 152, 202, 197, 96, 25, 188, 30, 5, 170, 203, 23, 2, 18, 131, 12, 241, 45, 108, 17 }
%% Negotiating:  [Session-40, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384]
***
Allow unsafe renegotiation: false
Allow legacy hello messages: true
Is initial handshake: true
Is secure renegotiation: false
*** ServerHello, TLSv1.2
RandomCookie:  GMT: 1551699707 bytes = { 8, 193, 199, 249, Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1
%% Negotiating:  [Session-39, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384]
*** ServerHello, TLSv1.2
RandomCookie:  GMT: 1551699707 bytes = { 225, 74, 106, 52, 191, 141, 29, 96, 121, 100, 156, 63, 209, 216, 155, 136, 180, 35, 4, 175, 173, 175, 191, 189%% Initialized:  [Session-41, SSL_NULL_WITH_NULL_NULL]
SESSION KEYGEN:
PreMaster Secret:
0000: E8 C1 6A B9 1A 9A A9 7B   12 B5 E9 F9 38 13 D9 12  ..j.........8...
0010: AF 83 41 5E C0 88 58 74   91 1C 5B 60 C1 ED 2A D6  ..A^..Xt..[`..*.
0020: 63 96 7A 2E 5E EC 3A D8   0B 9F A5 49 65 2D 0A E9  c.z.^.:....Ie-..
0030: 0E 16 27 EF 8D 40 28 34   3F 75 F1 BE AB 63 54 72  ..'..@(4?u...cTr
0040: 07 E8 1F 82 17 9A E2 F0   D0 CB A0 52 86 6B 55 A4  ...........R.kU.
0050: CF F0 FB 6A C0 70 47 3A   4A 7A EE 20 38 A7 D6 E2  ...j.pG:Jz. 8...
0060: 33 93 03 9A D9 7B 28 8B   26 E3 11 FC 37 38 5A 97  3.....(.&...78Z.
0070: EF A4 DA 32 E9 43 92 70   95 7C B3 50 9E 38 20 B0  ...2.C.p...P.8 .
C7 76 73 C3 A2  `.(mq..-.a..vs..
https-jsse-nio-8443-exec-9, called closeOutbound()
https-jsse-nio-8443-exec-9, closeOutboundInternal()
Standard ciphersuite chosen: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
%% Negotiating:  [Session-41, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384]
*** ServerHello, TLSv1.2
RandomCookie:  GMT: 1551699707 bytes = { 171, CONNECTION KEYGEN:
Client Nonce:
0000: 01 71 17 6C 8E 9C FC 00   14 B3 5F 96 E9 CE BC 6E  .q.l......_....n
0010: 8F 47 7C C9 62 46 92 07   70 A9 97 49 5D 61 3A BE  .G..bF..p..I]a:.
Server Nonce:
0000: 5C 7D 0F FB 11 D3 77 A0   A7 45 8B 21 B0 83 CB 5A  \.....w..E.!...Z
0010: C6 54 F9 3A 40 A7 89 04   8F A4 B8 17 B6 25 45 80  .T.:@........%E.
Master Secret:
0000: 4C F3 33 BB 74 EE 80 3E   64 43 0E F6 C5 10 59 84  L.3.t..>dC....Y.
0010: BF 40 56 34 7A 0F E9 9F   BA D1 24 35 71 55 E7 7C  .@V4z.....$5qU..
0020: 61 10 9B 91 EC 15 AF 99   9E 9B A5 3A E5 BC D2 2B  a..........:...+
... no MAC keys used for this cipher
Client write key:
0000: A5 7B 55 A9 00 27 D5 3E   FE 39 36 CC 97 1C 78 4A  ..U..'.>.96...xJ
0010: CB 9C 57 5B C2 0D 6B 00   20 D2 46 9E 73 BF 64 AC  ..W[..k. .F.s.d.
Server write key:
0000: 69 42 1F 22 0F 48 AF 00   45 B9 A4 86 AB 4B 40 9E  iB.".H..E....K@.
0010: B9 98 BB 5B B1 CE 66 FB   18 46 84 5C 32 88 53 08  ...[..f..F.\2.S.
Client write IV:
0000: 96 4B 85 E8                                        .K..
Server write IV:
0000: EB DA 3F 0F                                        ..?.
, 180, 15, 217, 184 }
Session ID:  {92, 125, 15, 251, 34, 200, 97, 53, 94, 126, 164, 133, 93, 172, 2, 80, 38, 156, 127, 228, 203, 64, 214, 130, 108, 157, 162, 222, 80, 232, 246, 175}
Cipher Suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
Compression Method: 0
Extension renegotiation_info, renegotiated_connection: <empty>
***
Cipher suite:  TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
*** Certificate chain
chain [0] = [
[
  Version: V3
  Subject: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US
  Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5

  Key:  Sun RSA public key, 2048 bits
  modulus: 21944740401167172627731583459321030363948627215746053925732477915060915436180167456469785746662093119306577380200747716284652995937004530444336851845029170241627465854006145050037178991946925696078563485570896673835545540824265905937881682387179314987285174428010940266412458943894800978345731524307952507729956745301047871771953945124256516782917326981125087548987889540650149121302888872237484100834740328828765018090383963294418357028839734723410564800765871733483849269364796949055153420777966213779145518299141217288017794394762274753999989298548507425930217302947589819396239489846633419099079578249651345685751
  public exponent: 65537
  Validity: [From: Fri May 30 08:43:19 GMT 2014,
               To: Mon May 27 08:43:19 GMT 2024]
  Issuer: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US
  SerialNumber: [    a6ef7a9a 5368eb27]

Certificate Extensions: 3
[1]: ObjectId: 2.5.29.35 Criticality=false
AuthorityKeyIdentifier [
KeyIdentifier [
0000: 78 0D 96 9D FE D3 0B BE   8C C7 E3 EC 67 04 AB 4B  x...........g..K
0010: EA E0 00 29                                        ...)
]
]

[2]: ObjectId: 2.5.29.19 Criticality=false
BasicConstraints:[
  CA:true
  PathLen:2147483647
]

[3]: ObjectId: 2.5.29.14 Criticality=false
SubjectKeyIdentifier [
KeyIdentifier [
0000: 78 0D 96 9D FE D3 0B BE   8C C7 E3 EC 67 04 AB 4B  x...........g..K
0010: EA E0 00 29                                        ...)
]
]

]
  Algorithm: [SHA1withRSA]
  Signature:
0000: 19 16 5A 21 99 21 24 98   3C 0A E8 D8 00 AB 44 24  ..Z!.!$.<.....D$
0010: F2 0C B7 83 D5 9F 96 17   87 E2 1F 1D A3 47 68 C7  .............Gh.
0020: 68 4A CB 56 0E 77 2B E8   1A 9F E7 09 A1 19 77 D0  hJ.V.w+.......w.
0030: 5E CC C1 B3 9A C4 35 3D   CB E0 A5 A6 43 5D A3 26  ^.....5=....C].&
0040: A4 91 8A C1 FA 7B 10 EA   DC C3 C7 1C 47 DC 97 32  ............G..2
0050: C0 37 80 1C F1 42 10 E3   74 17 FA 3E 60 4A B7 59  .7...B..t..>`J.Y
0060: 92 C1 E0 6F BB F1 BB 9F   82 89 B5 83 D5 AE 1E 90  ...o............
0070: 0A 89 8D FB 4C C0 C5 9E   DC C5 8C C6 2F EE D9 B4  ....L......./...
0080: 95 47 27 2E BE 82 31 6F   76 C0 DB 4C C8 0D 3B 7B  .G'...1ov..L..;.
0090: D1 6A BF BD 3B 93 30 04   A2 9E 81 F7 96 28 77 F2  .j..;.0......(w.
00A0: 32 05 68 44 1F B3 30 CE   40 9F 20 F3 B4 2B AA E6  2.hD..0.@. ..+..
00B0: 40 9B FB 7F 34 6E 3A 99   FD F8 28 F1 8C 9B 56 34  @...4n:...(...V4
00C0: 64 AD 4D 56 39 CB 96 18   50 9B 99 43 80 0A 39 A5  d.MV9...P..C..9.
00D0: 13 7A 6E C5 25 E0 95 4A   92 E5 A8 8B EE 03 49 B4  .zn.%..J......I.
00E0: D9 7C 00 E3 F0 3B A7 BA   40 30 CC 89 55 C6 97 93  .....;..@0..U...
00F0: B5 15 F6 62 D3 B1 74 9C   0B 80 2B 8A D4 03 84 A0  ...b..t...+.....

]
***
*** Diffie-Hellman ServerKeyExchange
DH Modulus:  { 255, 255, 255, 255, 255, 255, 255, 255, 201, 15, 218, 162, 33, 104, 194, 52, 196, 198, 98, 139, 128, 220, 28, 209, 41, 2, 78, 8, 138, 103, 204, 116, 2, 11, 190, 166, 59, 19, 155, 34, 81, 74, 8, 121, 142, 52, 4, 221, 239, 149, 25, 179, 205, 58, 67, 27, 48, 43, 10, 109, 242, 95, 20, 55, 79, 225, 53, 109, 109, 81, 194, 69, 228, 133, 181, 118, 98, 94, 126, 198, 244, 76, 66, 233, 166, 55, 237, 107, 11, 255, 92, 182, 244, 6, 183, 237, 238, 56, 107, 251, 90, 137, 159, 165, 174, 159, 36, 17, 124, 75, 31, 230, 73, 40, 102, 81, 236, 230, 83, 129, 255, 255, 255, 255, 255, 255, 255, 255 }
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1.1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1.1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1.1
https-jsse-nio-8443-exec-1, READ: TLSv1 Handshake, length = 512
*** ClientHello, TLSv1.2
RandomCookie:  GMT: 349906884 bytes = { 210, 48, 206, 248, 247, 132, 33, 215, 84, 29, 129, 137, 48, 226, 246, 38, 147, 218, 227, 3, 192, 70, 246, 251, 102, 26, 137, 42 }
Session ID:  {92, 125, 15, 251, 58, 67, 243, 201, 226, 98, 196, 139, 131, 32, 127, 66, 185, 104, 196, 98, 135, 68, 173, 5, 56, 144, 68, 93, 20, 11, 26, 114}
81, 112, 193, 180, 223, 174, 54, 203, 106, 92, 91, 195, 62, 65, 53, 231, 107, 161, 160, 127, 112, 183, 87, 24 }
Session ID:  Cipher Suites: [Unknown 0x13:0x2, Unknown 0x13:0x3, Unknown 0x13:0x1, Unknown 0x13:0x4, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa9, Unknown 0xc0:0xad, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0xac, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa8, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xc0:0x9d, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9c, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xaa, Unknown 0xc0:0x9f, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9e, TLS_DHE_RSA_WITH_AES_128_CBC_SHA]
Compression Methods:  { 0 }
Unsupported extension status_request, data: 01:00:00:00:00
Extension elliptic_curves, curve names: {secp256r1, secp384r1, secp521r1, unknown curve 29, unknown curve 256, unknown curve 257, unknown curve 258, unknown curve 259, unknown curve 260}
Extension ec_point_formats, formats: [uncompressed]
Extension signature_algorithms, signature_algorithms: SHA256withRSA, Unknown (hash:0x8, signature:0x9), Unknown (hash:0x8, signature:0x4), SHA256withECDSA, Unknown (hash:0x8, signature:0x7), SHA384withRSA, Unknown (hash:0x8, signature:0xa), Unknown (hash:0x8, signature:0x5), SHA384withECDSA, SHA512withRSA, Unknown (hash:0x8, signature:0xb), Unknown (hash:0x8, signature:0x6), SHA512withECDSA, SHA1withRSA, SHA1withECDSA
Unsupported extension type_35, data:
Unsupported extension type_51, data: 00:69:00:17:00:41:04:98:76:63:39:3d:b2:61:e2:19:9c:87:f3:44:33:13:a9:07:34:71:39:b2:a2:29:c8:b6:e5:9d:05:44:5a:2c:0b:6d:32:38:0f:96:c2:29:19:4c:18:e0:ca:31:97:2a:68:c0:11:93:dc:83:f3:61:fa:f3:cf:e3:48:d6:12:9d:c7:00:1d:00:20:67:c9:d0:a0:7c:88:b4:6a:15:09:fd:69:92:93:64:ed:1f:c8:e1:54:34:48:68:22:31:df:90:23:9e:10:a6:5b
Unsupported extension type_43, data: 08:03:04:03:03:03:02:03:01
Extension renegotiation_info, renegotiated_connection: <empty>
Extension server_name, server_name: [type=host_name (0), value=localhost]
Unsupported extension type_45, data: 02:01:00
Unsupported extension type_28, data: 40:00
Unsupported extension type_21, data: 00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00
***
%% Initialized:  [Session-42, SSL_NULL_WITH_NULL_NULL]
Standard ciphersuite chosen: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
https-jsse-nio-8443-exec-10, READ: TLSv1.2 Change Cipher Spec, length = 1
DH Base:  { 2 }
Server DH Public Key:  { 31, 27, 48, 183, 47, 120, 203, 177, 111, 63, 244, 178, 209, 94, 143, 175, 80, 137, 212, 95, 63, 240, 177, 97, 185, 88, 157, 126, 133, 76, 13, 129, 247, 160, 242, 213, 103, 100, 52, 98, 230, 8, 115, 149, 174, 104, 241, 182, 189, 252, 20, 225, 100, 123, 132, 0, 76, 201, 71, 204, 219, 140, 98, 208, 43, 164, 62, 165, 100, 132, 85, 76, 48, 132, 177, 205, 116, 204, 69, 114, 185, 215, 166, 173, 97, 163, 120, 222, 194, 92, 177, 127, 52, 89, 118, 190, 96, 141, 57, 8, 199, 160, 100, 43, 124, 109, 216, 188, 70, 230, 81, 171, 183, 147, 87, 110, 196, 5, 93, 213, 66, 141, 236, 113, 118, 111, 38, 72 }
CONNECTION KEYGEN:
Client Nonce:
0000: 40 39 10 29 39 0B 5D 3E   0B 52 9E 8A CA 70 4B A2  @9.)9.]>.R...pK.
0010: DA C8 EB 00 6E 13 E4 81   02 4B A1 1E 07 F2 B0 C8  ....n....K......
Server Nonce:
0000: 5C 7D 0F FB 89 16 DC 2A   9D 25 EE D3 34 CF B3 34  \......*.%..4..4
0010: 36 76 82 00 00 9B EF 4C   63 1C B8 BE EA C7 51 9E  6v.....Lc.....Q.
Master Secret:
0000: 1D C2 C1 E3 EC 81 52 25   F3 FD C1 02 16 B7 32 87  ......R%......2.
0010: 95 1B 21 66 D2 3E E6 52   02 89 C9 C4 42 09 DD D5  ..!f.>.R....B...
0020: E0 75 DF F5 02 AD 29 88   3D A4 8C A3 64 0F 2C 8D  .u....).=...d.,.
... no MAC keys used for this cipher
Client write key:
0000: 4F CF 38 FF 2D D1 CE 5C   4D 53 8E 2D 49 3E AC 87  O.8.-..\MS.-I>..
0010: 83 8A FC 2B 67 69 DF D2   04 65 F5 70 23 AC D0 90  ...+gi...e.p#...
Server write key:
0000: D4 D9 D8 51 68 6B 32 78   CA B3 DC C1 B7 71 65 F3  ...Qhk2x.....qe.
0010: B9 06 9B 99 5B 41 CD D6   64 A8 ED E7 36 9F CA 42  ....[A..d...6..B
Client write IV:
0000: 70 7D ED 87                                        p...
Server write IV:
0000: C0 86 A8 E4                                        ....
25, 211, 27, 5, 103, 166, 191, 135, 80, 93, 209, 43, 8, 31, 118, 150, 104, 173, 183, 6, 182, 182, 207, 162, 105, 180, 9 }
Session ID:  {92, 125, 15, 251, 98, 164, 143, 61, 151, 3, 152, 25, 146, 252, 164, 101, 37, 43, 64, 174, 127, 142, 237, 219, 70, 175, 178, 89, 130, 249, 155, 86}
Cipher Suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
Compression Method: 0
Extension renegotiation_info, renegotiated_connection: <empty>
***
Cipher suite:  TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
*** Certificate chain
chain [0] = [
[
  Version: V3
  Subject: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US
  Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5

  Key:  Sun RSA public key, 2048 bits
  modulus: 21944740401167172627731583459321030363948627215746053925732477915060915436180167456469785746662093119306577380200747716284652995937004530444336851845029170241627465854006145050037178991946925696078563485570896673835545540824265905937881682387179314987285174428010940266412458943894800978345731524307952507729956745301047871771953945124256516782917326981125087548987889540650149121302888872237484100834740328828765018090383963294418357028839734723410564800765871733483849269364796949055153420777966213779145518299141217288017794394762274753999989298548507425930217302947589819396239489846633419099079578249651345685751
  public exponent: 65537
  Validity: [From: Fri May 30 08:43:19 GMT 2014,
               To: Mon May 27 08:43:19 GMT 2024]
  Issuer: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US
  SerialNumber: [    a6ef7a9a 5368eb27]

Certificate Extensions: 3
[1]: ObjectId: 2.5.29.35 Criticality=false
AuthorityKeyIdentifier [
KeyIdentifier [
0000: 78 0D 96 9D FE D3 0B BE   8C C7 E3 EC 67 04 AB 4B  x...........g..K
0010: EA E0 00 29                                        ...)
]
]

[2]: ObjectId: 2.5.29.19 Criticality=false
BasicConstraints:[
  CA:true
  PathLen:2147483647
]

[3]: ObjectId: 2.5.29.14 Criticality=false
SubjectKeyIdentifier [
KeyIdentifier [
0000: 78 0D 96 9D FE D3 0B BE   8C C7 E3 EC 67 04 AB 4B  x...........g..K
0010: EA E0 00 29                                        ...)
]
]

]
  Algorithm: [SHA1withRSA]
  Signature:
0000: 19 16 5A 21 99 21 24 98   3C 0A E8 D8 00 AB 44 24  ..Z!.!$.<.....D$
0010: F2 0C B7 83 D5 9F 96 17   87 E2 1F 1D A3 47 68 C7  .............Gh.
0020: 68 4A CB 56 0E 77 2B E8   1A 9F E7 09 A1 19 77 D0  hJ.V.w+.......w.
0030: 5E CC C1 B3 9A C4 35 3D   CB E0 A5 A6 43 5D A3 26  ^.....5=....C].&
0040: A4 91 8A C1 FA 7B 10 EA   DC C3 C7 1C 47 DC 97 32  ............G..2
0050: C0 37 80 1C F1 42 10 E3   74 17 FA 3E 60 4A B7 59  .7...B..t..>`J.Y
0060: 92 C1 E0 6F BB F1 BB 9F   82 89 B5 83 D5 AE 1E 90  ...o............
0070: 0A 89 8D FB 4C C0 C5 9E   DC C5 8C C6 2F EE D9 B4  ....L......./...
0080: 95 47 27 2E BE 82 31 6F   76 C0 DB 4C C8 0D 3B 7B  .G'...1ov..L..;.
0090: D1 6A BF BD 3B 93 30 04   A2 9E 81 F7 96 28 77 F2  .j..;.0......(w.
00A0: 32 05 68 44 1F B3 30 CE   40 9F 20 F3 B4 2B AA E6  2.hD..0.@. ..+..
00B0: 40 9B FB 7F 34 6E 3A 99   FD F8 28 F1 8C 9B 56 34  @...4n:...(...V4
00C0: 64 AD 4D 56 39 CB 96 18   50 9B 99 43 80 0A 39 A5  d.MV9...P..C..9.
00D0: 13 7A 6E C5 25 E0 95 4A   92 E5 A8 8B EE 03 49 B4  .zn.%..J......I.
00E0: D9 7C 00 E3 F0 3B A7 BA   40 30 CC 89 55 C6 97 93  .....;..@0..U...
00F0: B5 15 F6 62 D3 B1 74 9C   0B 80 2B 8A D4 03 84 A0  ...b..t...+.....

]
***
Signature Algorithm SHA256withRSA
https-jsse-nio-8443-exec-10, READ: TLSv1.2 Handshake, length = 40
*** Finished
verify_data:  { 133, 13, 51, 61, 222, 81, 163, 117, 86, 63, 42, 27 }
***
https-jsse-nio-8443-exec-10, WRITE: TLSv1.2 Change Cipher Spec, length = 1
*** Finished
verify_data:  { 254, 234, 158, 127, 233, 123, 251, 7, 204, 9, 110, 128 }
***
Signed with a DSA or RSA public key
%% Negotiating:  [Session-42, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384]
*** ServerHello, TLSv1.2
RandomCookie:  GMT: 1551699707 bytes = { 112, 186, 220, 14, 92, 28, 254, 121, 4, 68, 14, 78, 3, 153, 151, 173, 254, 171, 169, 221, 235, 73, 36, 146, 67, 27, 219, 251 }
Session ID:  https-jsse-nio-8443-exec-10, WRITE: TLSv1.2 Handshake, length = 40
{92, 125, 15, 251, 114, 214, 202, 211, 214, 210, 209, 207, 146, 65, 120, 23, 13, 124, 139, 100, 141, 124, 98, 162, 42, 193, 9, 123, 8, 6, 123, 188}
Cipher Suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
Compression Method: 0
Extension renegotiation_info, renegotiated_connection: <empty>
***
Cipher suite:  TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
*** Certificate chain
chain [0] = [
[
  Version: V3
  Subject: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US
  Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5

  Key:  Sun RSA public key, 2048 bits
  modulus: 21944740401167172627731583459321030363948627215746053925732477915060915436180167456469785746662093119306577380200747716284652995937004530444336851845029170241627465854006145050037178991946925696078563485570896673835545540824265905937881682387179314987285174428010940266412458943894800978345731524307952507729956745301047871771953945124256516782917326981125087548987889540650149121302888872237484100834740328828765018090383963294418357028839734723410564800765871733483849269364796949055153420777966213779145518299141217288017794394762274753999989298548507425930217302947589819396239489846633419099079578249651345685751
  public exponent: 65537
  Validity: [From: Fri May 30 08:43:19 GMT 2014,
               To: Mon May 27 08:43:19 GMT 2024]
  Issuer: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US
  SerialNumber: [    a6ef7a9a 5368eb27]

Certificate Extensions: 3
[1]: ObjectId: 2.5.29.35 Criticality=false
AuthorityKeyIdentifier [
KeyIdentifier [
0000: 78 0D 96 9D FE D3 0B BE   8C C7 E3 EC 67 04 AB 4B  x...........g..K
0010: EA E0 00 29                                        ...)
]
]

[2]: ObjectId: 2.5.29.19 Criticality=false
BasicConstraints:[
  CA:true
  PathLen:2147483647
]

[3]: ObjectId: 2.5.29.14 Criticality=false
SubjectKeyIdentifier [
KeyIdentifier [
0000: 78 0D 96 9D FE D3 0B BE   8C C7 E3 EC 67 04 AB 4B  x...........g..K
0010: EA E0 00 29                                        ...)
]
]

]
  Algorithm: [SHA1withRSA]
  Signature:
0000: 19 16 5A 21 99 21 24 98   3C 0A E8 D8 00 AB 44 24  ..Z!.!$.<.....D$
0010: F2 0C B7 83 D5 9F 96 17   87 E2 1F 1D A3 47 68 C7  .............Gh.
0020: 68 4A CB 56 0E 77 2B E8   1A 9F E7 09 A1 19 77 D0  hJ.V.w+.......w.
0030: 5E CC C1 B3 9A C4 35 3D   CB E0 A5 A6 43 5D A3 26  ^.....5=....C].&
0040: A4 91 8A C1 FA 7B 10 EA   DC C3 C7 1C 47 DC 97 32  ............G..2
0050: C0 37 80 1C F1 42 10 E3   74 17 FA 3E 60 4A B7 59  .7...B..t..>`J.Y
0060: 92 C1 E0 6F BB F1 BB 9F   82 89 B5 83 D5 AE 1E 90  ...o............
0070: 0A 89 8D FB 4C C0 C5 9E   DC C5 8C C6 2F EE D9 B4  ....L......./...
0080: 95 47 27 2E BE 82 31 6F   76 C0 DB 4C C8 0D 3B 7B  .G'...1ov..L..;.
0090: D1 6A BF BD 3B 93 30 04   A2 9E 81 F7 96 28 77 F2  .j..;.0......(w.
00A0: 32 05 68 44 1F B3 30 CE   40 9F 20 F3 B4 2B AA E6  2.hD..0.@. ..+..
00B0: 40 9B FB 7F 34 6E 3A 99   FD F8 28 F1 8C 9B 56 34  @...4n:...(...V4
00C0: 64 AD 4D 56 39 CB 96 18   50 9B 99 43 80 0A 39 A5  d.MV9...P..C..9.
00D0: 13 7A 6E C5 25 E0 95 4A   92 E5 A8 8B EE 03 49 B4  .zn.%..J......I.
00E0: D9 7C 00 E3 F0 3B A7 BA   40 30 CC 89 55 C6 97 93  .....;..@0..U...
00F0: B5 15 F6 62 D3 B1 74 9C   0B 80 2B 8A D4 03 84 A0  ...b..t...+.....

]
***
{92, 125, 15, 251, 44, 185, 151, 145, 221, 104, 60, 123, 177, 172, 19, 98, 90, 47, 34, 173, 71, 64, 78, 184, 231, 53, 85, 178, 140, 195, 200, 151}
Cipher Suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
Compression Method: 0
Extension renegotiation_info, renegotiated_connection: <empty>
***
Cipher suite:  TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
*** Certificate chain
chain [0] = [
[
  Version: V3
  Subject: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US
  Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5

  Key:  Sun RSA public key, 2048 bits
  modulus: 21944740401167172627731583459321030363948627215746053925732477915060915436180167456469785746662093119306577380200747716284652995937004530444336851845029170241627465854006145050037178991946925696078563485570896673835545540824265905937881682387179314987285174428010940266412458943894800978345731524307952507729956745301047871771953945124256516782917326981125087548987889540650149121302888872237484100834740328828765018090383963294418357028839734723410564800765871733483849269364796949055153420777966213779145518299141217288017794394762274753999989298548507425930217302947589819396239489846633419099079578249651345685751
  public exponent: 65537
  Validity: [From: Fri May 30 08:43:19 GMT 2014,
               To: Mon May 27 08:43:19 GMT 2024]
  Issuer: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US
  SerialNumber: [    a6ef7a9a 5368eb27]

Certificate Extensions: 3
[1]: ObjectId: 2.5.29.35 Criticality=false
AuthorityKeyIdentifier [
KeyIdentifier [
0000: 78 0D 96 9D FE D3 0B BE   8C C7 E3 EC 67 04 AB 4B  x...........g..K
0010: EA E0 00 29                                        ...)
]
]

[2]: ObjectId: 2.5.29.19 Criticality=false
BasicConstraints:[
  CA:true
  PathLen:2147483647
]

[3]: ObjectId: 2.5.29.14 Criticality=false
SubjectKeyIdentifier [
KeyIdentifier [
0000: 78 0D 96 9D FE D3 0B BE   8C C7 E3 EC 67 04 AB 4B  x...........g..K
0010: EA E0 00 29                                        ...)
]
]

]
  Algorithm: [SHA1withRSA]
  Signature:
0000: 19 16 5A 21 99 21 24 98   3C 0A E8 D8 00 AB 44 24  ..Z!.!$.<.....D$
0010: F2 0C B7 83 D5 9F 96 17   87 E2 1F 1D A3 47 68 C7  .............Gh.
0020: 68 4A CB 56 0E 77 2B E8   1A 9F E7 09 A1 19 77 D0  hJ.V.w+.......w.
0030: 5E CC C1 B3 9A C4 35 3D   CB E0 A5 A6 43 5D A3 26  ^.....5=....C].&
0040: A4 91 8A C1 FA 7B 10 EA   DC C3 C7 1C 47 DC 97 32  ............G..2
0050: C0 37 80 1C F1 42 10 E3   74 17 FA 3E 60 4A B7 59  .7...B..t..>`J.Y
0060: 92 C1 E0 6F BB F1 BB 9F   82 89 B5 83 D5 AE 1E 90  ...o............
0070: 0A 89 8D FB 4C C0 C5 9E   DC C5 8C C6 2F EE D9 B4  ....L......./...
0080: 95 47 27 2E BE 82 31 6F   76 C0 DB 4C C8 0D 3B 7B  .G'...1ov..L..;.
0090: D1 6A BF BD 3B 93 30 04   A2 9E 81 F7 96 28 77 F2  .j..;.0......(w.
00A0: 32 05 68 44 1F B3 30 CE   40 9F 20 F3 B4 2B AA E6  2.hD..0.@. ..+..
00B0: 40 9B FB 7F 34 6E 3A 99   FD F8 28 F1 8C 9B 56 34  @...4n:...(...V4
00C0: 64 AD 4D 56 39 CB 96 18   50 9B 99 43 80 0A 39 A5  d.MV9...P..C..9.
00D0: 13 7A 6E C5 25 E0 95 4A   92 E5 A8 8B EE 03 49 B4  .zn.%..J......I.
00E0: D9 7C 00 E3 F0 3B A7 BA   40 30 CC 89 55 C6 97 93  .....;..@0..U...
00F0: B5 15 F6 62 D3 B1 74 9C   0B 80 2B 8A D4 03 84 A0  ...b..t...+.....

]
***
https-jsse-nio-8443-exec-7, READ: TLSv1.2 Change Cipher Spec, length = 1
https-jsse-nio-8443-exec-7, READ: TLSv1.2 Handshake, length = 40
*** Finished
verify_data:  { 246, 215, 205, 242, 47, 75, 7, 170, 222, 181, 77, 63 }
***
https-jsse-nio-8443-exec-7, WRITE: TLSv1.2 Change Cipher Spec, length = 1
*** Finished
verify_data:  { 120, 25, 238, 96, 133, 237, 168, 69, 213, 29, 125, 107 }
***
*** Diffie-Hellman ServerKeyExchange
DH Modulus:  { 255, 255, 255, 255, 255, 255, 255, 255, 201, 15, 218, 162, 33, 104, 194, 52, 196, 198, 98, 139, 128, 220, 28, 209, 41, 2, 78, 8, 138, 103, 204, 116, 2, 11, 190, 166, 59, 19, 155, 34, 81, 74, 8, 121, 142, 52, 4, 221, 239, 149, 25, 179, 205, 58, 67, 27, 48, 43, 10, 109, 242, 95, 20, 55, 79, 225, 53, 109, 109, 81, 194, 69, 228, 133, 181, 118, 98, 94, 126, 198, 244, 76, 66, 233, 166, 55, 237, 107, 11, 255, 92, 182, 244, 6, 183, 237, 238, 56, 107, 251, 90, 137, 159, 165, 174, 159, 36, 17, 124, 75, 31, 230, 73, 40, 102, 81, 236, 230, 83, 129, 255, 255, 255, 255, 255, 255, 255, 255 }
DH Base:  { 2 }
Server DH Public Key:  { 65, 1, 38, 44, 3, 213, 40, 130, 253, 209, 144, 81, 91, 88, 218, 57, 108, 230, 141, 218, 236, 78, 122, 145, 47, 35, 58, 144, 227, 13, 133, 5, 234, 148, 42, 191, 214, 206, 9, 235, 250, 130, 113, 8, 22, 207, 96, 67, 64, 53, 189, 248, 140, 6, 207, 228, 38, 218, 27, 109, 156, 226, 218, 30, 177, 61, 251, 38, 48, *** Diffie-Hellman ServerKeyExchange
DH Modulus:  { *** ServerHelloDone
%% Cached server session: [Session-37, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384]
https-jsse-nio-8443-exec-4, WRITE: TLSv1.2 Handshake, length = 1697
255, 255, 255, 255, 255, 255, 255, 255, 201, 15, 218, 162, 33, 104, 194, 52, 196, 198, 98, 139, 128, 220, 28, 209, 41, 2, 78, 8, 138, 103, 204, 116, 2, 11, 190, 166, 59, 19, 155, 34, 81, 74, 8, 121, 142, 52, 4, 221, 239, 149, 25, 179, 205, 58, 67, 27, 48, 43, 10, 109, 242, 95, 20, 55, 79, 225, 53, 109, 109, 81, 194, 69, 228, 133, 181, 118, 98, 94, 126, 198, 244, 76, 66, 233, 166, 55, 237, 107, 11, 255, 92, 182, 244, 6, 183, 237, 238, 56, 107, 251, 90, 137, 159, 165, 174, 159, 36, 17, 124, 75, 31, 230, 73, 40, 102, 81, 236, 230, 83, 129, 255, 255, 255, 255, 255, 255, 255, 255 }
DH Base:  { 2 }
Server DH Public Key:  { 150, 179, 3, 125, 194, 181, 61, 45, 78, 41, 155, 232, 195, 248, 155, 227, 80, 153, 156, 215, 177, 76, 254, 218, 216, 179, 7, 69, 176, 236, 30, 193, 219, 222, 140, 183, 217, 143, 70, 105, 178, 79, 172, 142, 84, 156, 208, 192, 13, 92, 18, 40, 24, 194, 9, 162, 122, 123, 61, 162, 111, 84, 191, 229, 54, 132, 2, 119, 236, 232, 160, 32, 45, 185, 164, 136, 101, 93, 209, 246, 109, 215, 244, 224, 189, 106, 190, 7, 123, 42, 176, 29, 217, 218, 164, 148, 177, 165, 115, 30, 183, 242, 221, 78, 32, 216, 29, 12, 36, 102, 50, 177, 213, 15, 190, 71, 200, 234, 114, 173, 186, 80, 177, 76, 23, 102, 108, 246 }
Signature Algorithm SHA256withRSA
Signed with a DSA or RSA public key
*** ServerHelloDone
https-jsse-nio-8443-exec-8, WRITE: TLSv1.2 Handshake, length = 1697
*** Diffie-Hellman ServerKeyExchange
DH Modulus:  { 255, 255, 255, 255, 255, 255, 255, 255, 201, 15, 218, 162, 33, 104, 194, 52, 196, 198, 98, 139, 128, 220, 28, 209, 41, 2, 78, 8, 138, 103, 204, 116, 2, 11, 190, 166, 59, 19, 155, 34, 81, 74, 8, 121, 142, 52, 4, 221, 239, 149, 25, 179, 205, 58, 67, 27, 48, 43, 10, 109, 242, 95, 20, 55, 79, 225, 53, 109, 109, 81, 194, 69, 228, 133, 181, 118, 98, 94, 126, 198, 244, 76, 66, 233, 166, 55, 237, 107, 11, 255, 92, 182, 244, 6, 183, 237, 238, 56, 107, 251, 90, 137, 159, 165, 174, 159, 36, 17, 124, 75, 31, 230, 73, 40, 102, 81, 236, 230, 83, 129, 255, 255, 255, 255, 255, 255, 255, 255 }
DH Base:  { 2 }
Server DH Public Key:  { 175, 205, 12, 228, 254, 147, 226, 208, 251, 177, 251, 164, 221, 7, 86, 201, 159, 194, 16, 176, 216, 9, 85, 212, 102, 40, 60, 40, 130, 69, 110, 33, 101, 11, 121, 221, 190, 59, 181, 183, 211, 132, 161, 204, 189, 13, 95, 208, 226, 189, 90, 190, 220, 130, 115, 177, 136, 229, 214, 175, 111, 55, 131, 73, 108, 161, 125, 136, 37, 131, 152, 78, 230, 74, 202, 90, 254, 27, 170, 184, 91, 213, 136, 52, 133, 133, 199, 230, 216, 70, 242, 26, 3, 127, 66, 126, 158, 217, 59, 120, 71, 169, 70, 199, 6, 144, 57, 132, 41, 151, 150, 58, 56, 77, 243, 160, 58, 43, 87, 32, 12, 239, 117, 109, 21, 171, 64, 160 }
Signature Algorithm SHA256withRSA
Signed with a DSA or RSA public key
*** ServerHelloDone
https-jsse-nio-8443-exec-1, WRITE: TLSv1.2 Handshake, length = 1697
234https-jsse-nio-8443-exec-7, WRITE: TLSv1.2 Handshake, length = 40
https-jsse-nio-8443-exec-5, READ: TLSv1.2 Handshake, length = 134
%% Cached server session: [Session-38, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384]
https-jsse-nio-8443-exec-4, READ: TLSv1.2 Handshake, length = 134
*** ClientKeyExchange, DH
DH Public key:  { , 164, 16, 57, 201, 221, 241, 201, 31, 60, 202, 146, 21634, 253, 60, 49, 250, 225, 172, 233, 239, 114, 40, 187, 55, 195, 222, 104, 18, 179, 64, 187, 27, 184, 163, 175, 26, 69, 227, 126, 92, 139, 143, 214, 60, 250, 58, 48, 193, 78, 80, 28, 191, 20, 201, 90, 29, 221, 16, 68, 68, 156, 123, 14, 186, 162, 83, 144, 147, 12, 138, 248, 7, 183, 74, 234, 160, 246, 77, 43, 118, 131, 25, 201, 102, 86, 195, 202, 221, 246, 89, 104, 59, 153, 91, 19, 101, 120, 138, 49, 25, 7, 194, 81, 175, 74, 79, 111, 224, 236, 204, 126, 7, 135, 73, 135, 212, 23, 119, 84, 36, 32, 77, 157, 35, 87, 156, 218, 114, 125, 71, 211, 97, 199, 110, 85, 247, 212, 72, 255 }
https-jsse-nio-8443-exec-9, WRITE: TLSv1.2 Application Data, length = 83
SESSION KEYGEN:
PreMaster Secret:
0000: 3F 3A F5 E1 EF C6 4D 43   60 6A F2 34 41 8A B5 23  ?:....MC`j.4A..#
0010: D8 80 28 4F 1B F1 B2 28   8D 90 42 B5 F7 CF B4 E7  ..(O...(..B.....
0020: 4B F3 8E 1C 55 FD 58 70   62 63 8A 77 6C CB 31 8C  K...U.Xpbc.wl.1.
0030: FC 04 5D A0 80 2F 44 B2   67 F8 FD 6B F1 CB 90 9C  ..]../D.g..k....
0040: E9 8F 31 01 82 EC 67 E0   D5 A1 B9 85 4B CD C3 DF  ..1...g.....K...
0050: EB 22 B3 62 44 9C 43 2C   14 45 B0 36 EF 43 45 9A  .".bD.C,.E.6.CE.
0060: 96 17 59 B7 62 76 2A 07   52 4E 30 F4 F7 F5 96 AB  ..Y.bv*.RN0.....
0070: F3 4E 62 21 A3 DB 03 D2   F0 A3 4A 33 26 A6 8A B2  .Nb!......J3&...
CONNECTION KEYGEN:
Client Nonce:
0000: 15 DB 28 C4 D2 30 CE F8   F7 84 21 D7 54 1D 81 89  ..(..0....!.T...
0010: 30 E2 F6 26 93 DA E3 03   C0 46 F6 FB 66 1A 89 2A  0..&.....F..f..*
Server Nonce:
0000: 5C 7D 0F FB 70 BA DC 0E   5C 1C FE 79 04 44 0E 4E  \...p...\..y.D.N
0010: 03 99 97 AD FE AB A9 DD   EB 49 24 92 43 1B DB FB  .........I$.C...
Master Secret:
0000: 59 EF B5 03 B1 A8 35 98   E4 25 77 22 A9 76 24 97  Y.....5..%w".v$.
0010: 08 36 47 18 DB 87 DA B9   C1 BE DE 59 4D D0 3A BD  .6G........YM.:.
0020: 28 89 CD 4F F0 5C 0F 45   44 A8 43 31 D1 12 9F 7F  (..O.\.ED.C1....
... no MAC keys used for this cipher
Client write key:
0000: 0B 87 EB CA 1E 5E 46 0B   D5 7B 3E 9F DE AD F4 01  .....^F...>.....
0010: FB 61 B3 E0 13 98 C2 2A   5D 9F AD 55 61 57 D6 A3  .a.....*]..UaW..
Server write key:
0000: 97 09 A1 29 D1 44 3D 6A   1D A1 D2 B7 32 A8 60 51  ...).D=j....2.`Q
0010: 52 7A 3D 53 8C D8 40 B7   BC 0D 21 DA 01 D0 83 D9  Rz=S..@...!.....
Client write IV:
0000: 36 0C 41 4F                                        6.AO
Server write IV:
0000: 7E 87 74 5B                                        ..t[
Using SSLEngineImpl.
Allow unsafe renegotiation: false
Allow legacy hello messages: true
Is initial handshake: true
Is secure renegotiation: false
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1.1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1.1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1.1
https-jsse-nio-8443-exec-9, READ: TLSv1.2 Alert, length = 26
https-jsse-nio-8443-exec-6, READ: TLSv1 Handshake, length = 512
*** ClientHello, TLSv1.2
RandomCookie:  GMT: -76821081 bytes = { 221, 119, 215, 111, 10, 138, 168, 23, 27, 166, 199, 175, 21, 43, 107, 64, 48, 253, 198, 31, 212, 140, 20, 237, 136, 44, 170, 189 }
Session ID:  {92, 125, 15, 251, 90, 198, 138, 52, 9, 18, 162, 17, 164, 113, 131, 184, 23, 228, 183, 72, 242, 145, 57, 97, 33, 105, 168, 157, 166, 45, 229, 203}
Cipher Suites: [Unknown 0x13:0x2, Unknown 0x13:0x3, Unknown 0x13:0x1, Unknown 0x13:0x4, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa9, Unknown 0xc0:0xad, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0xac, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa8, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xc0:0x9d, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9c, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xaa, Unknown 0xc0:0x9f, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9e, TLS_DHE_RSA_WITH_AES_128_CBC_SHA]
Compression Methods:  { 0 }
Unsupported extension status_request, data: 01:00:00:00:00
Extension elliptic_curves, curve names: {secp256r1, secp384r1, secp521r1, unknown curve 29, unknown curve 256, unknown curve 257, unknown curve 258, unknown curve 259, unknown curve 260}
Extension ec_point_formats, formats: [uncompressed]
Extension signature_algorithms, signature_algorithms: SHA256withRSA, Unknown (hash:0x8, signature:0x9), Unknown (hash:0x8, signature:0x4), SHA256withECDSA, Unknown (hash:0x8, signature:0x7), SHA384withRSA, Unknown (hash:0x8, signature:0xa), Unknown (hash:0x8, signature:0x5), SHA384withECDSA, SHA512withRSA, Unknown (hash:0x8, signature:0xb), Unknown (hash:0x8, signature:0x6), SHA512withECDSA, SHA1withRSA, SHA1withECDSA
Unsupported extension type_35, data:
Unsupported extension type_51, data: 00:69:00:17:00:41:04:2b:27:d0:be:58:d4:99:84:63:14:f7:cc:ca:2f:89:91:82:96:9c:9a:70:42:7e:29:a1:93:11:81:ee:21:ff:1b:8d:64:d4:9d:4d:da:60:ec:d4:0c:38:06:92:73:88:fc:a8:ac:6a:e3:ce:d5:59:78:2a:f0:e0:4c:23:56:df:c2:00:1d:00:20:87:89:7a:26:9e:01:de:cb:3e:f0:1a:b9:82:0c:b1:e3:6f:99:05:e2:bb:52:96:af:34:f7:d9:eb:a4:cb:9d:0e
Unsupported extension type_43, data: 08:03:04:03:03:03:02:03:01
Extension renegotiation_info, renegotiated_connection: <empty>
Extension server_name, server_name: [type=host_name (0), value=localhost]
Unsupported extension type_45, data: 02:01:00
Unsupported extension type_28, data: 40:00
Unsupported extension type_21, data: 00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00
***
%% Initialized:  [Session-43, SSL_NULL_WITH_NULL_NULL]
*** ClientKeyExchange, DH
DH Public key:  { 234, 135, 194, 219, 221, 7, 16, 79, 39, 160, 241, 38, 109, 35, 11, 20, 30, 43, 227, 159, 59, 109, 3, 144, 125, 239, 158, 126, 126, 115, 241, 23, 133, 134, 39, 111, 221, 71, 223, 232, 85, 151, 211, 7, 138, 13, 41, 187, 187, 13, 154, 84, 88, 208, 18, 47, 172, 237, 0, 69, 112, 109, 90, 232, 91, 197, 103, 55, 233, 153, 206, 155, 196, 39, 79, 51, 66, 242, 177, 198, 35, 117, 17, 222, 149, 173, 185, 80, 96, 135, 166, 155, 82, 154, 154, 183, 73, 107, 255, 96, 124, 143, 11, 96, 39, 157, 186, 51, 72, 127, 195, 180, 123, 58, 229, 149, 129, 227, 65, 251, 96, 149, 62, 121, 203, 79, 60, https-jsse-nio-8443-exec-9, RECV TLSv1.2 ALERT:  warning, close_notify
119 }
https-jsse-nio-8443-exec-10, READ: TLSv1.2 Handshake, length = 134
https-jsse-nio-8443-exec-8, WRITE: TLSv1.2 Application Data, length = 84
, 1, 204, 197, 144, 17, 200, 187, 10, 162, 20, 13, 69, 87, 237, 85, 184, 66, 237, 79, 90, 5, 182, 71, 47, 57, 56, 28, 237, 197, 134, 10, 91, 244, 25, 76, 16, 194, 160, 228, 54, 42, 102, 43, 198, 99, 49 }
Signature Algorithm SHA256withRSA
Signed with a DSA or RSA public key
*** ServerHelloDone
https-jsse-nio-8443-exec-2, WRITE: TLSv1.2 Handshake, length = 1697
https-jsse-nio-8443-exec-5, READ: TLSv1.2 Change Cipher Spec, length = 1
Standard ciphersuite chosen: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
%% Negotiating:  [Session-43, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384]
*** ServerHello, TLSv1.2
RandomCookie:  GMT: 1551699708 bytes = { 92, 201, 66, 245, 51, 252, 61, 225, 9, 107, 118, 157, 173, 237, 7, 102, 85, 125, 187, 141, 165, 192, 181, 90, 106, 234, 157, 84 }
Session ID:  https-jsse-nio-8443-exec-9, closeInboundInternal()
{92, 125, 15, 252, 19, 214, 68, 173, 215, 94, 242, 244, 106, 89, 60, 143, 196, 61, 45, 39, 102, 192, 180, 151, 1, 59, 107, 169, 236, 99, 108, 99}
Cipher Suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
Compression Method: 0
Extension renegotiation_info, renegotiated_connection: <empty>
***
Cipher suite:  TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
*** Certificate chain
SESSION KEYGEN:
PreMaster Secret:
0000: 04 A2 F1 6B EF 13 49 FB   BB 1B 11 49 3E D6 CA 0D  ...k..I....I>...
0010: 28 8A 15 81 3A 34 9A 0E   CA 8C D3 04 78 18 40 36  (...:4......x.@6
0020: 11 9E C3 46 74 3C 89 0B   7E AC FA 87 3B 18 B3 F1  ...Ft<......;...
0030: 28 F8 87 C6 6E Using SSLEngineImpl.
https-jsse-nio-8443-exec-5, READ: TLSv1.2 Handshake, length = 40
Allow unsafe renegotiation: false
Allow legacy hello messages: true
Is initial handshake: true
Is secure renegotiation: false
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1.1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1.1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1.1
https-jsse-nio-8443-exec-7, READ: TLSv1 Handshake, length = 512
*** ClientHello, TLSv1.2
RandomCookie:  GMT: 2008224124 bytes = { 3, 113, 189, 168, 252, 125, 206, 82, 1, 164, 60, 1, 7, 61, 250, 21, 249, 167, 222, 191, 218, 38, 61, 96, 164, 237, 242, 241 }
Session ID:  {92, 125, 15, 251, 81, 53, 15, 29, 214, 99, 168, 187, 1, 61, 35, 114, 128, 66, 29, 32, 85, 113, 210, 152, 168, 201, 72, 85, 116, 212, 176, 100}
Cipher Suites: [Unknown 0x13:0x2, Unknown 0x13:0x3, Unknown 0x13:0x1, Unknown 0x13:0x4, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa9, Unknown 0xc0:0xad, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0xac, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa8, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xc0:0x9d, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9c, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xaa, Unknown 0xc0:0x9f, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9e, TLS_DHE_RSA_WITH_AES_128_CBC_SHA]
Compression Methods:  { 0 }
Unsupported extension status_request, data: 01:00:00:00:00
Extension elliptic_curves, curve names: {secp256r1, secp384r1, secp521r1, unknown curve 29, unknown curve 256, unknown curve 257, unknown curve 258, unknown curve 259, unknown curve 260}
Extension ec_point_formats, formats: [uncompressed]
Extension signature_algorithms, signature_algorithms: SHA256withRSA, Unknown (hash:0x8, signature:0x9), Unknown (hash:0x8, signature:0x4), SHA256withECDSA, Unknown (hash:0x8, signature:0x7), SHA384withRSA, Unknown (hash:0x8, signature:0xa), Unknown (hash:0x8, signature:0x5), SHA384withECDSA, SHA512withRSA, Unknown (hash:0x8, signature:0xb), Unknown (hash:0x8, signature:0x6), SHA512withECDSA, SHA1withRSA, SHA1withECDSA
Unsupported extension type_35, data:
Unsupported extension type_51, data: 00:69:00:17:00:41:04:a7:c9:d7:23:aa:6b:c2:61:6f:3e:27:69:19:1c:db:f3:1b:d8:d0:d7:8c:97:9b:80:a7:6e:3e:04:df:2a:6f:d8:dc:4e:86:6b:ef:38:1a:7a:cc:2c:ea:ae:7a:80:31:18:ec:0a:88:e5:50:f9:15:a1:bd:5d:26:25:f0:fc:4c:6b:00:1d:00:20:cc:54:1a:96:10:58:1d:93:8b:70:19:8a:1e:70:28:76:cb:72:7e:32:07:6c:c5:ce:8d:98:5e:78:78:17:90:16
Unsupported extension type_43, data: 08:03:04:03:03:03:02:03:01
Extension renegotiation_info, renegotiated_connection: <empty>
https-jsse-nio-8443-exec-1, READ: TLSv1.2 Alert, length = 26
https-jsse-nio-8443-exec-1, RECV TLSv1.2 ALERT:  warning, close_notify
https-jsse-nio-8443-exec-1, closeInboundInternal()
https-jsse-nio-8443-exec-1, closeOutboundInternal()
https-jsse-nio-8443-exec-1, SEND TLSv1.2 ALERT:  warning, description = close_notify
https-jsse-nio-8443-exec-1, WRITE: TLSv1.2 Alert, length = 26
https-jsse-nio-8443-exec-1, called closeOutbound()
https-jsse-nio-8443-exec-1, closeOutboundInternal()
*** ClientKeyExchange, DH
DH Public key:  { 104, 42, 185, 126, 28, 217, 163, 126, 163, 130, 68, 198, 53, 22, 139, 219, 174, 187, 225, 232, 168, 157, 116, 149, 100, 30, 134, 63, 9, 126, 26, 145, 33, 197, 107, 119, 10, 133, 160, 25, 86, 7, 4, 224, 81, 7, 225, 6, 118, 217, 180, 37, 60, 35, 195, 10, 148, 247, 51, 207, 34, 243, 188, 21, 189, 206, 171, 56, 81, 84, 142, 63, 111, 84, 231, 136, 178, 21, 63, 1, 120, 63, 228, 142, 110, 232, 24, D158, 10, 11, 26, chain [0] = [
[
  Version: V3
  Subject: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US
  Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5

  Key:  Sun RSA public key, 2048 bits
  modulus: 21944740401167172627731583459321030363948627215746053925732477915060915436180167456469785746662093119306577380200747716284652995937004530444336851845029170241627465854006145050037178991946925696078563485570896673835545540824265905937881682387179314987285174428010940266412458943894800978345731524307952507729956745301047871771953945124256516782917326981125087548987889540650149121302888872237484100834740328828765018090383963294418357028839734723410564800765871733483849269364796949055153420777966213779145518299141217288017794394762274753999989298548507425930217302947589819396239489846633419099079578249651345685751
  public exponent: 65537
  Validity: [From: Fri May 30 08:43:19 GMT 2014,
               To: Mon May 27 08:43:19 GMT 2024]
  Issuer: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US
  SerialNumber: [    a6ef7a9a 5368eb27]

Certificate Extensions: 3
[1]: ObjectId: 2.5.29.35 Criticality=false
AuthorityKeyIdentifier [
KeyIdentifier [
0000: 78 0D 96 9D FE D3 0B BE   8C C7 E3 EC 67 04 AB 4B  x...........g..K
0010: EA E0 00 29                                        ...)
]
]

[2]: ObjectId: 2.5.29.19 Criticality=false
BasicConstraints:[
  CA:true
  PathLen:2147483647
]

[3]: ObjectId: 2.5.29.14 Criticality=false
SubjectKeyIdentifier [
KeyIdentifier [
0000: 78 0D 96 9D FE D3 0B BE   8C C7 E3 EC 67 04 AB 4B  x...........g..K
0010: EA E0 00 29                                        ...)
]
]

]
  Algorithm: [SHA1withRSA]
  Signature:
0000: 19 16 5A 21 99 21 24 98   3C 0A E8 D8 00 AB 44 24  ..Z!.!$.<.....D$
0010: F2 0C B7 83 D5 9F 96 17   87 E2 1F 1D A3 47 68 C7  .............Gh.
0020: 68 4A CB 56 0E 77 2B E8   1A 9F E7 09 A1 19 77 D0  hJ.V.w+.......w.
0030: 5E CC C1 B3 9A C4 35 3D   CB E0 A5 A6 43 5D A3 26  ^.....5=....C].&
0040: A4 91 8A C1 FA 7B 10 EA   DC C3 C7 1C 47 DC 97 32  ............G..2
0050: C0 37 80 1C F1 42 10 E3   74 17 FA 3E 60 4A B7 59  .7...B..t..>`J.Y
0060: 92 C1 E0 6F BB F1 BB 9F   82 89 B5 83 D5 AE 1E 90  ...o............
0070: 0A 89 8D FB 4C C0 C5 9E   DC C5 8C C6 2F EE D9 B4  ....L......./...
0080: 95 47 27 2E BE 82 31 6F   76 C0 DB 4C C8 0D 3B 7B  .G'...1ov..L..;.
0090: D1 6A BF BD 3B 93 30 04   A2 9E 81 F7 96 28 77 F2  .j..;.0......(w.
00A0: 32 05 68 44 1F B3 30 CE   40 9F 20 F3 B4 2B AA E6  2.hD..0.@. ..+..
00B0: 40 9B FB 7F 34 6E 3A 99   FD F8 28 F1 8C 9B 56 34  @...4n:...(...V4
00C0: 64 AD 4D 56 39 CB 96 18   50 9B 99 43 80 0A 39 A5  d.MV9...P..C..9.
00D0: 13 7A 6E C5 25 E0 95 4A   92 E5 A8 8B EE 03 49 B4  .zn.%..J......I.
00E0: D9 7C 00 E3 F0 3B A7 BA   40 30 CC 89 55 C6 97 93  .....;..@0..U...
00F0: B5 15 F6 62 D3 B1 74 9C   0B 80 2B 8A D4 03 84 A0  ...b..t...+.....

]
***
https-jsse-nio-8443-exec-9, closeOutboundInternal()
223, 76, 73, 55, 162, 254, 112, 250, 181, 203, 137, 31, 209, 13, 68, 176, 106, 49, 128, 208, 236, 54, 140, 20, 225, 108, 93, 143, 102, 190, 56, 139, 73, 156, 56, 21C, 180 }
Extension server_name, server_name: [type=host_name (0), value=localhost]
Unsupported extension type_45, data: 02:01:00
Unsupported extension type_28, data: 40:00
Unsupported extension type_21, data: 00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00
***
%% Initialized:  [Session-44, SSL_NULL_WITH_NULL_NULL]
SESSION KEYGEN:
PreMaster Secret:
0000: 58 B5 34 F1 96 DF 9C 97   CA E8 CE B2 72 6D D4 AE  X.4.........rm..
0010: AB 0A 3C 91 C4 C5 55 42   0C 50 2B 5E B7 DC 10 69  ..<...UB.P+^...i
0020: 9C C4 B4 E3 76 0A F0 FC   DE 26 C6 2F 44 7B 53 60  ....v....&./D.S`
0030: 34 89 8F 90 ED DF 1A 91   20 EF E4 36 C5 97 E5 4A  4....... ..6...J
0040: FC AE C1 9A C0 5B C0 E1   C1 D9 9F D8 F2 12 36 DF  .....[........6.
0050: EB 79 01 9F 3C 96 69 6E   BF 39 9F B4 E5 1A 5D B0  .y..<.in.9....].
0060: 9F 7C 1C 41 F1 04 C9 46   9A B4 13 7B 4B 41 3B 01  ...A...F....KA;.
0070: 31 3D FB 33 A8 CB 5E 52   84 90 AE 34 81 44 38 D0  1=.3..^R...4.D8.
CONNECTION KEYGEN:
Client Nonce:
0000: 6F 71 47 9D E7 AA 9F F1   04 05 B6 B8 59 C6 CF FD  oqG.........Y...
0010: 57 AF 6D E8 5F E0 FD 6C   6D EB 8A B0 D3 77 46 B7  W.m._..lm....wF.
Server Nonce:
0000: 5C 7D 0F FB AB 19 D3 1B   05 67 A6 BF 87 50 5D D1  \........g...P].
0010: 2B 08 1F 76 96 68 AD B7   06 B6 B6 CF A2 69 B4 09  +..v.h.......i..
Master Secret:
0000: D5 FC 3E C8 D7 85 17 C4   55 B5 FA 7A EE 54 3A DB  ..>.....U..z.T:.
0010: 2D D9 58 E8 90 F4 62 F3   52 45 A5 BA 44 3C FD 86  -.X...b.RE..D<..
0020: 91 E2 51 F3 F5 F1 39 FF   E4 29 7E 07 F7 58 BF F4  ..Q...9..)...X..
... no MAC keys used for this cipher
Client write key:
0000: 5D 68 46 49 C6 CE 06 D9   6E C4 A9 30 BF 7C 69 1C  ]hFI....n..0..i.
0010: BF 7B 53 93 5E AF 8F FB   44 34 8A B8 8C 0E 0B 2F  ..S.^...D4...../
Server write key:
0000: E8 C9 EE EF CA AF 68 00   8C FD 90 45 00 46 AF 99  ......h....E.F..
0010: B5 59 9F 24 03 22 3D 39   36 E2 3F FE 75 AF BF 38  .Y.$."=96.?.u..8
Client write IV:
0000: 2F C5 14 23                                        /..#
Server write IV:
0000: BF E4 73 E4                                        ..s.
*** Finished
verify_data:  { https-jsse-nio-8443-exec-2, READ: TLSv1.2 Handshake, length = 134
127, 96, *** ClientKeyExchange, DH
DH Public key:  { 206, 182, 67, 65, 140, 162, 245, 19, 40, 222, 127, 152, 0, 151, 182, 139, 67, 163, 219, 141, 105, 155, 164, 184, 251, 111, 26, 219, 217, 80, 224, 91, 0, 215, 10, 199, 34, 97, 153, 52, 149, 153, 220, 239, 28, 70, 68, 251, 36, 15, 123, 245, 37, 229, 129, 22, 160, 94, 165, 173, 231, 231, 85, 150, 148, 3, 197, 50, 34, 16, 98, 235, 123, 192, 137, 23, 78, 170, 33, 189, 8, 168, 114, 109, 112, 171, 243, 151, 247, 52, 161, 110, 194, 211, 221, 188, 146, 98, 199, 117, 42, 160, 128, 48, 161, 74, 13, 180, 227, 212, 158, 125, 229, 141, 44, 129, 91, 78, 140, 165, 25, 156, 132, 39, 110, 125, 139, 27 }
*** Diffie-Hellman ServerKeyExchange
Standard ciphersuite chosen: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
%% Negotiating:  [Session-44, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384]
*** ServerHello, TLSv1.2
RandomCookie:  GMT: 1551699708 bytes = { 2, 89, 220, 53, 90, 25, 24, 125, 153, 134, 76, 66, 90, 125, 223, 107, 55, 114, 158, 15, 76, 222, 51, 248, 81, 54, 35, 201 }
Session ID:   {92, 125, 15, 252, 234, 204, 123, 235, 67, 243, 96, 187, 84, 218, 173, 244, 61, 229, 178, 106, 19, 103, 107, 48, 66, 207, 204, 66, 173, 235, 169, 79}
Cipher Suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
Compression Method: 0
Extension renegotiation_info, renegotiated_connection: <empty>
***
Cipher suite:  TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
*** Certificate chain
SESSION KEYGEN:
PreMaster Secret:
0000: 93 6C 77 AA E4 00 EE EA   31 0A 96 31 52 48 8A 10  .lw.....1..1RH..
0010: 2C 0D E7 29 85 0E 40 03   49 74 F0 F0 22 FA 1D 03  ,..)..@.It.."...
0020: 46 25 9B 9E 2D 5A 9D DB   14 D6 25 E9https-jsse-nio-8443-exec-9, SEND TLSv1.2 ALERT:  warning, description = close_notify
DH Modulus:  { 255, 255, 255, 255, 255, 255, 255, 255, 201, 15, 218, 162, 33, 104, 194, 52, 196, 198, 98, 139, 128, 220, 28, 209, 41, 2, 78, 8, 138, 103, 204, 116, 2, 11, 190, 166, 59, 19, 155, 34, 81, 74, 8, 121, 142, 52, 4, 221, 239, 149, 25, 179, 205, 58, 67, 27, 48, 43, 10, 109, 242, 95, 20, 55, 79, 225, 53, 109, 109, 81, 194, 69, 228, 133, 181, 118, 98, 94, 126, 198, 244, 76, 66, 233, 166, 55, 237, 107, 11, 255, 92, 182, 244, 6, 183, 237, 238, 56, 107, 251, 90, 137, 159, 165, 174, 159, 36, 17, 124, 75, 31, 230, 73, 40, 102, 81, 236, 230, 83, 129, 255, 255, 255, 255, 255, 255, 255, 255 }
 chain [0] = [
[
  Version: V3
  Subject: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US
  Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5

  Key:  Sun RSA public key, 2048 bits
  modulus: 21944740401167172627731583459321030363948627215746053925732477915060915436180167456469785746662093119306577380200747716284652995937004530444336851845029170241627465854006145050037178991946925696078563485570896673835545540824265905937881682387179314987285174428010940266412458943894800978345731524307952507729956745301047871771953945124256516782917326981125087548987889540650149121302888872237484100834740328828765018090383963294418357028839734723410564800765871733483849269364796949055153420777966213779145518299141217288017794394762274753999989298548507425930217302947589819396239489846633419099079578249651345685751
  public exponent: 65537
  Validity: [From: Fri May 30 08:43:19 GMT 2014,
               To: Mon May 27 08:43:19 GMT 2024]
  Issuer: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US
  SerialNumber: [    a6ef7a9a 5368eb27]

Certificate Extensions: 3
[1]: ObjectId: 2.5.29.35 Criticality=false
AuthorityKeyIdentifier [
KeyIdentifier [
0000: 78 0D 96 9D FE D3 0B BE   8C C7 E3 EC 67 04 AB 4B  x...........g..K
0010: EA E0 00 29                                        ...)
]
]

[2]: ObjectId: 2.5.29.19 Criticality=false
BasicConstraints:[
  CA:true
  PathLen:2147483647
]

[3]: ObjectId: 2.5.29.14 Criticality=false
SubjectKeyIdentifier [
KeyIdentifier [
0000: 78 0D 96 9D FE D3 0B BE   8C C7 E3 EC 67 04 AB 4B  x...........g..K
0010: EA E0 00 29                                        ...)
]
]

]
  Algorithm: [SHA1withRSA]
  Signature:
0000: 19 16 5A 21 99 21 24 98   3C 0A E8 D8 00 AB 44 24  ..Z!.!$.<.....D$
0010: F2 0C B7 83 D5 9F 96 17   87 E2 1F 1D A3 47 68 C7  .............Gh.
0020: 68 4A CB 56 0E 77 2B E8   1A 9F E7 09 A1 19 77 D0  hJ.V.w+.......w.
0030: 5E CC C1 B3 9A C4 35 3D   CB E0 A5 A6 43 5D A3 26  ^.....5=....C].&
0040: A4 91 8A C1 FA 7B 10 EA   DC C3 C7 1C 47 DC 97 32  ............G..2
0050: C0 37 80 1C F1 42 10 E3   74 17 FA 3E 60 4A B7 59  .7...B..t..>`J.Y
0060: 92 C1 E0 6F BB F1 BB 9F   82 89 B5 83 D5 AE 1E 90  ...o............
0070: 0A 89 8D FB 4C C0 C5 9E   DC C5 8C C6 2F EE D9 B4  ....L......./...
0080: 95 47 27 2E BE 82 31 6F   76 C0 DB 4C C8 0D 3B 7B  .G'...1ov..L..;.
0090: D1 6A BF BD 3B 93 30 04   A2 9E 81 F7 96 28 77 F2  .j..;.0......(w.
00A0: 32 05 68 44 1F B3 30 CE   40 9F 20 F3 B4 2B AA E6  2.hD..0.@. ..+..
00B0: 40 9B FB 7F 34 6E 3A 99   FD F8 28 F1 8C 9B 56 34  @...4n:...(...V4
00C0: 64 AD 4D 56 39 CB 96 18   50 9B 99 43 80 0A 39 A5  d.MV9...P..C..9.
00D0: 13 7A 6E C5 25 E0 95 4A   92 E5 A8 8B EE 03 49 B4  .zn.%..J......I.
00E0: D9 7C 00 E3 F0 3B A7 BA   40 30 CC 89 55 C6 97 93  .....;..@0..U...
00F0: B5 15 F6 62 D3 B1 74 9C   0B 80 2B 8A D4 03 84 A0  ...b..t...+.....

]
***
36 B0   8B B1 20 B6 85 DE 96 BA  (...n.6... .....
0040: 42 E5 20 06 26 06 C7 58   C3 F5 E6 6B B7 7F 31 F5  B. .&..X...k..1.
0050: 5D 89 9B C7 DD 78 25 58   79 81 61 03 E0 7A 41 4B  ]....x%Xy.a..zAK
0060: 1F 02 79 24 6B E7 86 CD   0E CF A4 06 BA 8E 44 3F  ..y$k.........D?
0070: B6 D3 3B 09 E1 82 F2 3C   9E A0 D5 B3 9B 7B 64 C8  ..;....<......d.
CONNECTION KEYGEN:
Client Nonce:
0000: 26 21 F5 EF 7B CA E8 CF   66 C7 1B E8 8D 2C 1D AF  &!......f....,..
0010: 91 31 93 36 8C 32 95 0A   FF 43 FC 8C B6 46 D9 4A  .1.6.2...C...F.J
Server Nonce:
0000: 5C 7D 0F FB E1 4A 6A 34   BF 8D 1D 60 79 64 9C 3F  \....Jj4...`yd.?
0010: D1 D8 9B 88 B4 23 04 AF   AD AF BF BD B4 0F D9 B8  .....#..........
Master Secret:
0000: A3 3E F7 50 B8 0F B7 0E   F8 12 47 3B 10 06 F7 3E  .>.P......G;...>
0010: D9 7D 51 E3 C7 40 6A 87   1A F8 4C E8 DA BE A1 58  ..Q..@j...L....X
0020: 60 45 EB 18 B9 AD 92 31   4D 5B 97 65 16 E1 9B CC  `E.....1M[.e....
... no MAC keys used for this cipher
Client write key:
0000: 13 CE 12 82 E2 D2 20 05   A7 6C F9 05 09 4F F7 03  ...... ..l...O..
0010: 55 90 B9 76 63 72 A2 7C   DB D8 B3 7C 76 CE 73 33  U..vcr......v.s3
Server write key:
0000: C4 90 B5 D2 FE 96 9B 28   CE 81 4C 84 59 F9 14 F7  .......(..L.Y...
0010: 51 C5 EF D6 CF DD 93 DA   7A F1 3F 1C 1F ED BE 7D  Q.......z.?.....
Client write IV:
0000: 47 D6 D2 C3                                        G...
Server write IV:
0000: FE AF 47 2F                                        ..G/
94, 28, 1, 49, https-jsse-nio-8443-exec-4, READ: TLSv1.2 Change Cipher Spec, length = 1
https-jsse-nio-8443-exec-10, READ: TLSv1.2 Change Cipher Spec, length = 1
23, 3, 240, 6, 123, 78 }
***
*** Diffie-Hellman ServerKeyExchange
DH Modulus:  { 255, 255, 255, 255, 255, 255, 255, 255, 201, 15, 218, 162, 33, 104, 194, 52, 196, 198, 98, 139, 128, 220, 28, 209, 41, 2, 78, 8, 138, 4103, 204, 116, 2, 11DH Base:  { 2https-jsse-nio-8443-exec-9, WRITE: TLSv1.2 Alert, length = 26
 }
https-jsse-nio-8443-exec-4, READ: TLSv1.2 Handshake, length = 40
, 190, 166, 59, 19, 155, 34, 81, 74, 8, 121, 142, 52, 4, 221, 239, 149, 25, 179, 205, 58, 67, 27, 48, 43, 10, 109, 242, 95, 20, 55, 79, 225, 53, 109, 109, 81, 194, 69, 228, 133, 181, 118, 98, 94, 126, 198, 244, 76, 66, 233, 166, 55, 237, 107, 11, 255, 92, 182, 244, 6, 183, 237, 238, 56, 107, 251, 90, 137, 159, 165, 174, 159, 36, 17, 124, 75, 31, 230, 73, 40, 102, 81, 236, 230, 83, 129, 255, 255, 255, 255, 255, 255, 255, 255 }
DH Base:  { 2 }
Server DH Public Key:  { 227, 145, 75, 188, 171, 64, 39, 159, 206, 143, 64, 37, 215, 148, 172, 121, 196, 139, 45, 177, 14, 234, 21, 216, 136, 202, 5, 95, 160, 181, 63, 31, 209, 136, 3E, 232, 97, 193, 240, https-jsse-nio-8443-exec-5, WRITE: TLSv1.2 Change Cipher Spec, length = 1
https-jsse-nio-8443-exec-10, READ: TLSv1.2 Handshake, length = 40
*** Finished
verify_data:  { 249, 185, 203, 233, 207, 156, 155, 199, 24, 152, 156, 151 }
***
169, 105, 246, 230, 53, 213, 127, 106, 133, 86, 151, 132, 227, 240, 73, 33, 174, 24, 254, 42, 230, 101, 159, 59, 100, 59, 229, 132, 184, 93, 165, 125, 239, 226, 160, 126, 185, 28, 102, 131, 97, 83, 248, 168, 87, 45, 36, 181, 14, 222, 140, 25, 108, 99, 80, 56, 12, 238, 86, 209, 236, 54, 211, 142, 21, 33, 40, 97, 129, 4, 61, 156, 53, 243, 218, 227, 119, 235, 87, 212, 89, 140, 161, 231, 239, 3, 96, 16, 223 }
Signature Algorithm SHA256withRSA
Signed with a DSA or RSA public key
*** ServerHelloDone
https-jsse-nio-8443-exec-7, WRITE: TLSv1.2 Handshake, length = 1697
 67 66 66  F%..-Z....%.Ngff
0030: 94https-jsse-nio-8443-exec-9, called closeOutbound()
https-jsse-nio-8443-exec-9, closeOutboundInternal()
*** Finished
Server DH Public Key:  { verify_data:  { 208,  B6 95 64 45 73 20 FA   1F F8 7E 60 D5 00 8A AF  ...dEs ....`....
0040https-jsse-nio-8443-exec-5, WRITE: TLSv1.2 Handshake, length = 40
*** Finished
: 10 16 D7 F0 BB 94 16 45   31 3A E9 E3 2A B3 86 9E  .......E1:..*...
0050: D8 8C D5 82 5F BE 10 21   9B 50 08 73 A2 52 12 72  119, 4, 119, 119, 172, 126, 147, 27, 84, 168, 240 }
***
23, 132, 175, 201, 186, 157, 226, 148, 44, 114, 85, 4, 247, 145, 125, 12, 241, 247, 173, 196, 193, 86, 134, 156, 13, 193, 134, 138, 133, 111, 222, 9, 121, 145, 165, 228, 234, 139, 243, 95, 135, 76, 84, 27, 117, 181, 196, 63, 190, 119, 246, 109, 12, 83, 196, 218, 66, 185, 163, 48, 234, 90, 180, 9, 179, 165, 99, 136, 245, 106, 244, 171, 156, 221, 190, 50, 30, 237, 20, 184, 32, 130, 172, 191, 44, 140, 204, 144, 6, 211, 77, 230, 16, 56, 7, 186, 247, 166, 92, 197, 210, 252, 27, 218, 69, 60, 253, 179, 132, 144, 230, 202, 51, 44, 106, 59, 46, 79, 202, 4, 207, 234, 72, 102, 138, 86, 3, 175 }
https-jsse-nio-8443-exec-3, READ: TLSv1.2 Handshake, length = 134
Signature Algorithm SHA256withRSA
Signed with a DSA or RSA public key
https-jsse-nio-8443-exec-4, WRITE: TLSv1.2 Change Cipher Spec, length = 1
...._..!.P.s.R.r
0060%% Cached server session: [Session-42, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384]
verify_data:  { 22, 186, 121, 234, 51, 122, 49, 10, 12, 233, 93, 54 }
***
: https-jsse-nio-8443-exec-10, WRITE: TLSv1.2 Change Cipher Spec, length = 1
*** Finished
*** ClientKeyExchange, DH
DH Public key:  { 251, 78, 247, 134, 52, 135, 202, 121, 126, 17, 32, 39, 101, 78, 144, 11, 126, 4, 241, 37, 174, 252, 1, 167, 162, 51, 2, 190, 233, 105, 183, 75, 3, 8, 186, 180, 200, 109, 190, 75, 116, 209, 231, 73, 33, 164, 20, 28, 227, 255, 96, *** Finished
verify_data:  { 216, 193, 112, 192, 26, 227, 20, 79, 245, 226, 46, 160 }
***
*** ServerHelloDone
verify_data:  { 89, 24, 187, 126, 121, 57, 11, 4, 105, 44, 251, 100, 35, 240, 73, 243, 41, 120, 68, 110, 84, 46, 235, 28, 225, 140, 236, 16, 215, 170, 81, 11, 151, 124, 24, 48, 212, 137, 117, 172, 45, 65, 209, 101, 86, 19, 118, 46, 148, 251, 11, 41, 93, 204, 233, 204, https-jsse-nio-8443-exec-4, WRITE: TLSv1.2 Handshake, length = 40
%% Cached server session: [Session-39, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384]
884, 208, 70, 77, 250, 178, 109, 210, 102, 61, 94, 60, 5, 162, 119, 114, 106, 51, 194, 71, 182, 17, 152, 160 }
https-jsse-nio-8443-exec-7, WRITE: TLSv1.2 Application Data, length = 84
SESSION KEYGEN:
PreMaster Secret:
0000: 77 71 10 9B 16 A7 72 D5   4B 46 15 91 FC 36 E9 2A  wq....r.KF...6.*
0010: 14 53 FC CE 62 29 5C 25   49 BC 64 A7 9F C7 65 1B  .S..b)\%I.d...e.
0020: 90 5C 6D 9C 0C 02 40 F0   63 7B 3B FF E6 15 FF D1  .\m...@.c.;.....
0030: D9 81 DF 1D B1 18 CB 45   C1 B5 45 F0 8B C4 D2 F8  .......E..E.....
0040: CC 7B FC 97 86 D4 7B BA   20 E5 BE 62 E8 1E 0D B7  ........ ..b....
0050: A8 EE E9 91 7E 87 84 54   A9 FC 5C 94 E9 C1 B2 0E  .......T..\.....
0060: A9 B0 C8 5A 03 B6 95 3A   28 42 80 23 9E 51 CB 24  ...Z...:(B.#.Q.$
0070: 03 30 59 4B BC 2D 1C 02   96 08 21 84 D2 02 DC 87  .0YK.-....!.....
CONNECTION KEYGEN:
Client Nonce:
0000: 78 B3 11 7C 03 71 BD A8   FC 7D CE 52 01 A4 3C 01  x....q.....R..<.
0010: 07 3D FA 15 F9 A7 DE BF   DA 26 3D 60 A4 ED F2 F1  .=.......&=`....
Server Nonce:
0000: 5C 7D 0F FC 02 59 DC 35   5A 19 18 7D 99 86 4C 42  \....Y.5Z.....LB
0010: 5A 7D DF 6B 37 72 9E 0F   4C DE 33 F8 51 36 23 C9  Z..k7r..L.3.Q6#.
Master Secret:
0000: 1F 0C B6 07 D0 0C BE 97   19 C0 61 85 E7 BB 70 D4  ..........a...p.
0010: E9 00 27 3F 07 B6 EF 25   60 55 6A EB E6 01 43 BF  ..'?...%`Uj...C.
0020: A4 1F 38 84 01 8D 2B 69   F6 F5 17 D2 25 30 B5 73  ..8...+i....%0.s
... no MAC keys used for this cipher
Client write key:
0000: 04 26 C7 40 2B 91 94 9A   5F E3 48 22 A7 32 CE 78  .&.@+..._.H".2.x
0010: 80 8D FB BA B7 B5 8C 17   BE C4 54 1D 3D 33 22 2E  ..........T.=3".
Server write key:
0000: D2 59 39 34 BF A4 F8 8D   F3 F4 F7 0C D6 16 CD 2E  .Y94............
0010: 63 B5 38 DA 42 AB 08 77   1B FA 0D 94 B6 E0 70 15  c.8.B..w......p.
Client write IV:
0000: 00 20 A6 29                                        . .)
Server write IV:
0000: 5F E8 3E 96                                        _.>.
https-jsse-nio-8443-exec-6, WRITE: TLSv1.2 Handshake, length = 1697
https-jsse-nio-8443-exec-3, READ: TLSv1.2 Change Cipher Spec, length = 1
https-jsse-nio-8443-exec-3, READ: TLSv1.2 Handshake, length = 40
*** Finished
verify_data:  { 63, 40, 245, 236, 219, 99, 153, 227, 15, 52, 210, 230 }
***
https-jsse-nio-8443-exec-3, WRITE: TLSv1.2 Change Cipher Spec, length = 1
*** Finished
verify_data:  { 65, 113, 129, 65, 184, 77, 188, 181, 151, 47, 238, 155 }
***
50, 56, 158, 4, 196, 96, 118, 180, 12 }
***
Using SSLEngineImpl.
https-jsse-nio-8443-exec-5, READ: TLSv1.2 Alert, length = 26
https-jsse-nio-8443-exec-5, RECV TLSv1.2 ALERT:  warning, close_notify
https-jsse-nio-8443-exec-5, closeInboundInternal()
https-jsse-nio-8443-exec-5, closeOutboundInternal()
https-jsse-nio-8443-exec-5, SEND TLSv1.2 ALERT:  warning, description = close_notify
https-jsse-nio-8443-exec-5, WRITE: TLSv1.2 Alert, length = 26
https-jsse-nio-8443-exec-5, called closeOutbound()
https-jsse-nio-8443-exec-5, closeOutboundInternal()
D 5DAllow unsafe renegotiation: false
Allow legacy hello messages: true
Is initial handshake: true
Is secure renegotiation: false
 EE EF 60 28 96 BE   23 B2 A3 75 15 CE 91 1A  .]..`(..#..u....
0070: D5 79 F0 56 90 E2 31 43   4F 21 BB 3A 3B CE DB 16  .y.V..1CO!.:;...
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1.1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1.1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1.1
CONNECTION KEYGEN:
Client Nonce:
0000: 6C 8E C5 C7 85 74 CC 34   BC 81 00 19 FC 08 E2 C2  l....t.4........
0010: AE 4E 55 0F 4D 06 74 87   1F 1D 02 C3 C6 3A F6 1C  .NU.M.t......:..
Server Nonce:
0000: 5C 7D 0F FB 08 C1 C7 F9   51 70 C1 B4 DF AE 36 CB  \.......Qp....6.
0010: 6A 5C 5B C3 3E 41 35 E7   6B A1 A0 7F 70 B7 57 18  j\[.>A5.k...p.W.
Master Secret:
0000: 0B C4 2B 5A 74 E5 3F 8A   17 B5 FF F1 87 79 A8 F2  ..+Zt.?......y..
0010: 2B BE F1 5B 6C 29 2D 63   21 84 3A 70 9E 14 82 D1  +..[l)-c!.:p....
0020: 61 3A 43 80 E3 15 BB E2   FB C3 2D 45 BA BD 1B 3D  a:C.......-E...=
... no MAC keys used for this cipher
Client write key:
0000: 64 F5 5E 5A C7 91 5B 72   9A 04 C1 AF 2B 3E 15 75  d.^Z..[r....+>.u
0010: 4A 39 B6 B7 32 44 4E 2E   79 D9 5C E9 DE 0C 1F 1D  J9..2DN.y.\.....
Server write key:
0000: 58 3F 86 61 B0 5B BC 99   A4 9A CE EE 92 8E D3 B5  X?.a.[..........
0010: 2D BA 61 8E B5 EF C6 CA   E0 D2 37 C7 0A 8F 0F 9E  -.a.......7.....
Client write IV:
0000: AD FC AF 3C                                        ...<
Server write IV:
0000: 79 6F C2 93                                        yo..
https-jsse-nio-8443-exec-8, READ: TLSv1 Handshake, length = 512
https-jsse-nio-8443-exec-2, READ: TLSv1.2 Change Cipher Spec, length = 1
https-jsse-nio-8443-exec-2, READ: TLSv1.2 Handshake, length = 40
*** ClientHello, TLSv1.2
RandomCookie:  GMT: -2035525656 bytes = { 27, 106, 98, 38, 185, 178, 202, 159, 0, 86, 85, 109, 100, 110, 143, 0, 2, 239, 7, 89, 254, 43, 91, 128, 123, 251, 89, 165 }
Session ID:  *** Finished
verify_data:  { 145, 159, 17, 239, 120, 200, 159, 115, 53, 241, 0, 184 }
***
{92, 125, 15, 251, 44, 185, 151, 145, 221, 104, 60, 123, 177, 172, 19, 98, 90, 47, 34, 173, 71, 64, 78, 184, 231, 53, 85, 178, 140, 195, 200, 151}
Cipher Suites: [Unknown 0x13:0x2, Unknown 0x13:0x3, Unknown 0x13:0x1, Unknown 0x13:0x4, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa9, Unknown 0xc0:0xad, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0xac, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa8, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xc0:0x9d, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9c, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xaa, Unknown 0xc0:0x9f, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9e, TLS_DHE_RSA_WITH_AES_128_CBC_SHA]
Compression Methods:  { 0 }
https-jsse-nio-8443-exec-4, WRITE: TLSv1.2 Application Data, length = 84
https-jsse-nio-8443-exec-7, READ: TLSv1.2 Handshake, length = 134
https-jsse-nio-8443-exec-3, WRITE: TLSv1.2 Handshake, length = 40
%% Cached server session: [Session-44, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384]
https-jsse-nio-8443-exec-10, WRITE: TLSv1.2 Handshake, length = 40
%% Cached server session: [Session-41, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384]
https-jsse-nio-8443-exec-2, WRITE: TLSv1.2 Change Cipher Spec, length = 1
Unsupported extension status_request, data: 01:00:00:00:00
Extension elliptic_curves, curve names: {secp256r1, secp384r1, secp521r1, unknown curve 29, unknown curve 256, unknown curve 257, unknown curve 258, unknown curve 259, unknown curve 260}
Extension ec_point_formats, formats: [uncompressed]
Extension signature_algorithms, signature_algorithms: SHA256withRSA, Unknown (hash:0x8, signature:0x9), Unknown (hash:0x8, signature:0x4), SHA256withECDSA, Unknown (hash:0x8, signature:0x7), SHA384withRSA, Unknown (hash:0x8, signature:0xa), Unknown (hash:0x8, signature:0x5), SHA384withECDSA, SHA512withRSA, Unknown (hash:0x8, signature:0xb), Unknown (hash:0x8, signature:0x6), SHA512withECDSA, SHA1withRSA, SHA1withECDSA
Unsupported extension type_35, data:
Unsupported extension type_51, data: 00:69:00:17:00:41:04:aa:b9:4f:63:e1:3e:6f:a4:31:8b:22:f6:7a:f6:19:15:69:e0:34:95:dd:a2:18:99:72:95:6c:ea:32:80:10:8f:63:a6:3f:46:ec:41:4f:21:80:c0:a2:78:ea:14:ee:8e:86:36:f3:57:bc:5d:c1:93:e3:f6:e4:50:24:63:1b:7d:00:1d:00:20:de:82:7d:ab:bc:51:8f:cb:53:b3:99:40:0b:b1:cb:37:89:5f:11:2a:e5:ab:76:d3:52:c2:81:8b:46:f0:22:18
Unsupported extension type_43, data: 08:03:04:03:03:03:02:03:01
Extension renegotiation_info, renegotiated_connection: <empty>
Extension server_name, server_name: [type=host_name (0), value=localhost]
Unsupported extension type_45, data: 02:01:00
Unsupported extension type_28, data: 40:00
Unsupported extension type_21, data: 00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00
***
https-jsse-nio-8443-exec-4, READ: TLSv1.2 Alert, length = 26
https-jsse-nio-8443-exec-4, RECV TLSv1.2 ALERT:  warning, close_notify
https-jsse-nio-8443-exec-4, closeInboundInternal()
https-jsse-nio-8443-exec-4, closeOutboundInternal()
https-jsse-nio-8443-exec-4, SEND TLSv1.2 ALERT:  warning, description = close_notify
%% Initialized:  [Session-45, SSL_NULL_WITH_NULL_NULL]
https-jsse-nio-8443-exec-4, WRITE: TLSv1.2 Alert, length = 26
*** ClientKeyExchange, DH
DH Public key:  { 251, 127, 14, 237, 78, 181, 42, 59, 51, 87, 114, 96, 189, 102, 77, 48, 120, 147, 89, 255, 198, 144https-jsse-nio-8443-exec-4, called closeOutbound()
https-jsse-nio-8443-exec-4, closeOutboundInternal()
Using SSLEngineImpl.
Allow unsafe renegotiation: false
Allow legacy hello messages: true
Is initial handshake: true
Is secure renegotiation: false
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1.1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1.1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1.1
*** Finished
verify_data:  { 100, 155, 118, 191, 12, 193, 206, 247, 223, 190, 134, 102 }
***
https-jsse-nio-8443-exec-2, WRITE: TLSv1.2 Handshake, length = 40
%% Cached server session: [Session-40, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384]
https-jsse-nio-8443-exec-10, WRITE: TLSv1.2 Application Data, length = 85
https-jsse-nio-8443-exec-1, READ: TLSv1 Handshake, length = 512
*** ClientHello, TLSv1.2
RandomCookie:  GMT: -1937946310 bytes = { 195, 26, 41, 129, 65, 164, 106, 98, 138, 108, 165, 35, 123, 51, 198, 185, 25, 149, 241, 217, 172, 232, 168, 66, 110, 179, 14, 3 }
Session ID:  {92, 125, 15, 251, 34, 200, 97, 53, 94, 126, 164, 133, 93, 172, 2, 80, 38, 156, 127, 228, 203, 64, 214, 130, 108, 157, 162, 222, 80, 232, 246, 175}
, 247, 224, 16, 249, 148, 170, 44, 140, 175, 180, 138, 231, 125, 161, 26, 170, 118, 108, 248, 234, 157, 197, 196, 200, 247, 106, 206, 234, 88, 203, 167, 228, 140, 27, 228, 142, 138, 207, 84, 224, 246, 38, 126, 240, 227, 83, 90, 139, 215, 30, 74, 179, 236, 80, 243, 43, 1, 228, 33, 97, 216, 190, 242, 211, 161, 84, 1, 38, 96, 112, 33, 149, 157, 132, 79, 209, 136, 155, 3, 171, 187, 44, 180, 133, 232, 72, 104, 175, 24, 126, 127, 212, 17, 168, 212, 242, 251, 204, 105, 63, 173, 104, 121, 121, 242, 241 }
Standard ciphersuite chosen: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
%% Negotiating:  [Session-45, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384]
*** ServerHello, TLSv1.2
RandomCookie:  GMT: 1551699708 bytes = { 202, 158, 51, 83, 20, 200, 183, 210, 228, 94, 37, 79, 167, 249, 164, 37, 148, 33, 245, 81, 171, 200, 189, 101, 11, 46, 120, 255 }
Session ID:  {92, 125, 15, 252, 51, 87, 165, 165, 120, 110, 66, 38, 3, 40, 89, 19, 169, 125, 79, 184, 1, 165, 46, 1, 151, 77, 249, 14, 117, 90, 30, 141}
Cipher Suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
Compression Method: 0
Extension renegotiation_info, renegotiated_connection: <empty>
***
Cipher suite:  TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
*** Certificate chain
SESSION KEYGEN:
PreMaster Secret:
0000: B2 D4 E2 DB 7B 22 AC 64   30 A4 60 41 01 66 39 9B  .....".d0.`A.f9.
0010: 16chain [0] = [
[
  Version: V3
  Subject: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US
  Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5

  Key:  Sun RSA public key, 2048 bits
  modulus: 21944740401167172627731583459321030363948627215746053925732477915060915436180167456469785746662093119306577380200747716284652995937004530444336851845029170241627465854006145050037178991946925696078563485570896673835545540824265905937881682387179314987285174428010940266412458943894800978345731524307952507729956745301047871771953945124256516782917326981125087548987889540650149121302888872237484100834740328828765018090383963294418357028839734723410564800765871733483849269364796949055153420777966213779145518299141217288017794394762274753999989298548507425930217302947589819396239489846633419099079578249651345685751
  public exponent: 65537
  Validity: [From: Fri May 30 08:43:19 GMT 2014,
               To: Mon May 27 08:43:19 GMT 2024]
  Issuer: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US
  SerialNumber: [    a6ef7a9a 5368eb27]

Certificate Extensions: 3
[1]: ObjectId: 2.5.29.35 Criticality=false
AuthorityKeyIdentifier [
KeyIdentifier [
0000: 78 0D 96 9D FE D3 0B BE   8C C7 E3 EC 67 04 AB 4B  x...........g..K
0010: EA E0 00 29                                        ...)
]
]

[2]: ObjectId: 2.5.29.19 Criticality=false
BasicConstraints:[
  CA:true
  PathLen:2147483647
]

[3]: ObjectId: 2.5.29.14 Criticality=false
SubjectKeyIdentifier [
KeyIdentifier [
0000: 78 0D 96 9D FE D3 0B BE   8C C7 E3 EC 67 04 AB 4B  x...........g..K
0010: EA E0 00 29                                        ...)
]
]

]
  Algorithm: [SHA1withRSA]
  Signature:
0000: 19 16 5A 21 99 21 24 98   3C 0A E8 D8 00 AB 44 24  ..Z!.!$.<.....D$
0010: F2 0C B7 83 D5 9F 96 17   87 E2 1F 1D A3 47 68 C7  .............Gh.
0020: 68 4A CB 56 0E 77 2B E8   1A 9F E7 09 A1 19 77 D0  hJ.V.w+.......w.
0030: 5E CC C1 B3 9A C4 35 3D   CB E0 A5 A6 43 5D A3 26  ^.....5=....C].&
0040: A4 91 8A C1 FA 7B 10 EA   DC C3 C7 1C 47 DC 97 32  ............G..2
0050: C0 37 80 1C F1 42 10 E3   74 17 FA 3E 60 4A B7 59  .7...B..t..>`J.Y
0060: 92 C1 E0 6F BB F1 BB 9F   82 89 B5 83 D5 AE 1E 90  ...o............
0070: 0A 89 8D FB 4C C0 C5 9E   DC C5 8C C6 2F EE D9 B4  ....L......./...
0080: 95 47 27 2E BE 82 31 6F   76 C0 DB 4C C8 0D 3B 7B  .G'...1ov..L..;.
0090: D1 6A BF BD 3B 93 30 04   A2 9E 81 F7 96 28 77 F2  .j..;.0......(w.
00A0: 32 05 68 44 1F B3 30 CE   40 9F 20 F3 B4 2B AA E6  2.hD..0.@. ..+..
00B0: 40 9B FB 7F 34 6E 3A 99   FD F8 28 F1 8C 9B 56 34  @...4n:...(...V4
00C0: 64 AD 4D 56 39 CB 96 18   50 9B 99 43 80 0A 39 A5  d.MV9...P..C..9.
00D0: 13 7A 6E C5 25 E0 95 4A   92 E5 A8 8B EE 03 49 B4  .zn.%..J......I.
00E0: D9 7C 00 E3 F0 3B A7 BA   40 30 CC 89 55 C6 97 93  .....;..@0..U...
00F0: B5 15 F6 62 D3 B1 74 9C   0B 80 2B 8A D4 03 84 A0  ...b..t...+.....

]
***
Cipher Suites: [Unknown 0x13:0x2, Unknown 0x13:0x3, Unknown 0x13:0x1, Unknown 0x13:0x4, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa9, Unknown 0xc0:0xad, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0xac, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa8, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xc0:0x9d, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9c, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xaa, Unknown 0xc0:0x9f, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9e, TLS_DHE_RSA_WITH_AES_128_CBC_SHA]
Compression Methods:  { 0 }
Unsupported extension status_request, data: 01:00:00:00:00
Extension elliptic_curves, curve names: {secp256r1, secp384r1, secp521r1, unknown curve 29, unknown curve 256, unknown curve 257, unknown curve 258, unknown curve 259, unknown curve 260}
Extension ec_point_formats, formats: [uncompressed]
Extension signature_algorithms, signature_algorithms: SHA256withRSA, Unknown (hash:0x8, signature:0x9), Unknown (hash:0x8, signature:0x4), SHA256withECDSA, Unknown (hash:0x8, signature:0x7), SHA384withRSA, Unknown (hash:0x8, signature:0xa), Unknown (hash:0x8, signature:0x5), SHA384withECDSA, SHA512withRSA, Unknown (hash:0x8, signature:0xb), Unknown (hash:0x8, signature:0x6), SHA512withECDSA, SHA1withRSA, SHA1withECDSA
Unsupported extension type_35, data:
Unsupported extension type_51, data: 00:69:00:17:00:41:04:c2:91:f6:07:69:fe:3f:ae:2f:54:9d:20:24:71:d2:51:d3:bb:58:fd:30:1d:b4:ee:f6:cc:72:de:16:8d:b7:13:72:65:0e:f5:4a:02:5f:69:8c:a1:42:eb:f7:33:39:33:a9:38:27:03:db:4b:cf:88:2e:d1:24:80:3f:93:56:d3:00:1d:00:20:17:ed:c7:fa:6a:a5:fc:03:69:63:81:3a:de:47:1c:10:83:8b:06:eb:37:d7:39:52:10:a9:f6:3e:6f:a4:b2:50
Unsupported extension type_43, data: 08:03:04:03:03:03:02:03:01
Extension renegotiation_info, renegotiated_connection: <empty>
Extension server_name, server_name: [type=host_name (0), value=localhost]
Unsupported extension type_45, data: 02:01:00
Unsupported extension type_28, data: 40:00
Unsupported extension type_21, data: 00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00
***
https-jsse-nio-8443-exec-4, WRITE: TLSv1.2 Application Data, length = 85
https-jsse-nio-8443-exec-3, WRITE: TLSv1.2 Application Data, length = 84
Using SSLEngineImpl.
Allow unsafe renegotiation: false
Allow legacy hello messages: true
Is initial handshake: true
Is secure renegotiation: false
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1
https-jsse-nio-8443-exec-6, READ: TLSv1.2 Alert, length = 26
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1.1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1.1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1.1
Using SSLEngineImpl.
%% Initialized:  [Session-46, SSL_NULL_WITH_NULL_NULL]
Allow unsafe renegotiation: false
Allow legacy hello messages: true
Is initial handshake: true
Is secure renegotiation: false
https-jsse-nio-8443-exec-10, READ: TLSv1.2 Alert, length = 26
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1
*** Diffie-Hellman ServerKeyExchange
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1.1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1.1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1.1
https-jsse-nio-8443-exec-5, READ: TLSv1 Handshake, length = 512
*** ClientHello, TLSv1.2
RandomCookie:  GMT: 699740096 bytes = { 152, 165, Standard ciphersuite chosen: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
 6E BF A0 1A C7 CF%% Negotiating:  [Session-46, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384]
156, 63, DH Modulus:  { 255, 255, 255, 255, 255, 255, 255, 255, 201, 15, 218, 162, 33, 104, 194, 52, 196, 198, 98, 139, 128, 220, 28, 209, 41, 2, 78, 8, 138, 103, 204, 116, 2, 11, 190, 166, 59, 19, 155, 34, 81, 74, 8, 121, 142, 52, 4, 221, 239, 149, 25, 179, 205, 58, 67, 27, 48, 43, 10, 109, 242, 95, 20, 55, 79, 225, 53, 109, 109, 81, 194, 69, 228, 133, 181, 118, 98, 94, 126, 198, 244, 76, 66, 233, 166, 55, 237, 107, 11, 255, 92, 182, 244, 6, 183, 237, 238, 56, 107, 251, 90, 137, 159, 165, 174, 159, 36, 17, 124, 75, 31, 230, 73, 40, 102, 81, 236, 230, 83, 129, 255, 255, 255, 255, 255, 255, 255, 255 }
DH Base:  { 2 }
Server DH Public Key:  { 124, 65, 21, 235, 20, 180, 214, 192, 26, 146, 86, 206, 227, 168, 250, 55, 27, 248, 130, 96, 112, 128, 82, 251, 125, 44, 20, 27, 225, 133, 223, 209, 18, 35, 119, 108, 56, 235, 42, 37, 211, 45, 194, 219, 111, 31, 62, 1, 33, 5, 24, 10, 181, 105, 239, 19, 40, 128, 6, 27, 104, 210, 158, 200, 154, 159, 67, 205, 96, 58, 231, 183, 149, 185, 192, 222, 118, 161, 162, 188, 63, 24, 199, 50, 189, 81, 186, 133, 98, 160, 195, 252, 129, 187, 7, 14, 227, 104, 230, 225, 127, 44, 171, 170, 122, 37, 207, 49, 74, 204, 67, 13, 113, 59, 195, 94, 202, 98, 127, 190, 155, 164, 26, 166, 39, 243, 250, 173 }
https-jsse-nio-8443-exec-10, RECV TLSv1.2 ALERT:  warning, close_notify
https-jsse-nio-8443-exec-2, READ: TLSv1 Handshake, length = 512
https-jsse-nio-8443-exec-6, RECV TLSv1.2 ALERT:  warning, close_notify
https-jsse-nio-8443-exec-6, closeInboundInternal()
https-jsse-nio-8443-exec-6, closeOutboundInternal()
https-jsse-nio-8443-exec-9, READ: TLSv1.2 Alert, length = 26
https-jsse-nio-8443-exec-6, SEND TLSv1.2 ALERT:  warning, description = close_notify
*** ClientHello, TLSv1.2
https-jsse-nio-8443-exec-9, RECV TLSv1.2 ALERT:  warning, close_notify
https-jsse-nio-8443-exec-6, WRITE: TLSv1.2 Alert, length = 26
https-jsse-nio-8443-exec-10, closeInboundInternal()
https-jsse-nio-8443-exec-10, closeOutboundInternal()
Signature Algorithm SHA256withRSA
Signed with a DSA or RSA public key
*** ServerHello, TLSv1.2
RandomCookie:  GMT: 1551699708 bytes = { 0, 239, 144, 5, 221, 147, 156, 33, https-jsse-nio-8443-exec-6, called closeOutbound()
https-jsse-nio-8443-exec-6, closeOutboundInternal()
 A1   3E EE E6 FF 5A 36 99 17  .n......>..254, 122, 158, 193, 119, 38, 66, 177, 208, 155, 35, 69, 189, 233, 192, 168, 210, 101, 250, 141, 204, 154, 233, 197, 243, 5 }
Session ID:  199, .Z6..
0020*** ServerHelloDone
https-jsse-nio-8443-exec-10, SEND TLSv1.2 ALERT:  warning, description = close_notify
https-jsse-nio-8443-exec-8, WRITE: TLSv1.2 Handshake, length = 1697
https-jsse-nio-8443-exec-9, closeInboundInternal()
https-jsse-nio-8443-exec-9, closeOutboundInternal()
https-jsse-nio-8443-exec-9, SEND TLSv1.2 ALERT:  warning, description = close_notify
https-jsse-nio-8443-exec-9, WRITE: TLSv1.2 Alert, length = 26
https-jsse-nio-8443-exec-9, called closeOutbound()
https-jsse-nio-8443-exec-9, closeOutboundInternal()
RandomCookie:  GMT: -57624336 bytes = { 206, 132, 157, 97, 3, 184, 20, 221, 2, 132, 42, 150, 195, 81, 207, 63, 149, 120, 1, 100, 72, 30, 75, 187, 162, 144, 98, 65 }
Session ID:  {92, 125, 15, 251, 114, 214, 202, 211, 214, 210, 209, 207, 146, 65, 120, 23, 13, 124, 139, 100, 141, 124, 98, 162, 42, 193, 9, 123, 8, 6, 123, 188}
Cipher Suites: [Unknown 0x13:0x2, Unknown 0x13:0x3, Unknown 0x13:0x1, Unknown 0x13:0x4, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa9, Unknown 0xc0:0xad, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0xac, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa8, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xc0:0x9d, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9c, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xaa, Unknown 0xc0:0x9f, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9e, TLS_DHE_RSA_WITH_AES_128_CBC_SHA]
Compression Methods:  { 0 }
Unsupported extension status_request, data: 01:00:00:00:00
Extension elliptic_curves, curve names: {secp256r1, secp384r1, secp521r1, unknown curve 29, unknown curve 256, unknown curve 257, unknown curve 258, unknown curve 259, unknown curve 260}
Extension ec_point_formats, formats: [uncompressed]
Extension signature_algorithms, signature_algorithms: SHA256withRSA, Unknown (hash:0x8, signature:0x9), Unknown (hash:0x8, signature:0x4), SHA256withECDSA, Unknown (hash:0x8, signature:0x7), SHA384withRSA, Unknown (hash:0x8, signature:0xa), Unknown (hash:0x8, signature:0x5), SHA384withECDSA, SHA512withRSA, Unknown (hash:0x8, signature:0xb), Unknown (hash:0x8, signature:0x6), SHA512withECDSA, SHA1withRSA, SHA1withECDSA
Unsupported extension type_35, data:
Unsupported extension type_51, data: 00:69:00:17:00:41:04:21:0a:ce:20:40:30:af:9d:40:47:00:09:54:57:91:b4:c3:63:aa:a1:fd:2a:99:99:8f:0c:ef:f8:f0:57:1d:59:2c:27:3a:37:3f:63:e6:f5:52:5e:97:38:56:5c:2e:98:7b:5f:ae:a3:67:a1:0b:7c:35:80:59:d5:75:80:c1:f2:00:1d:00:20:21:be:b7:28:91:32:fe:3a:be:34:ad:99:3d:1f:94:65:63:3c:1b:a1:2f:06:5d:ff:95:9e:d7:92:67:98:36:0a
Unsupported extension type_43, data: 08:03:04:03:03:03:02:03:01
Extension renegotiation_info, renegotiated_connection: <empty>
Extension server_name, server_name: [type=host_name (0), value=localhost]
Unsupported extension type_45, data: 02:01:00
Unsupported extension type_28, data: 40:00
Unsupported extension type_21, data: 00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00
***
https-jsse-nio-8443-exec-10, WRITE: TLSv1.2 Alert, length = 26
: D8 113, 154, 75, 26, 207, 110, 34, 97, 15, 49, 184, 113, 178, 239, 237, 86, 25 }
Session ID:  {92, 125, 15, 252, 183, 75, 178, 236, 226, 204, 161, 47, 115, 81, 131, 38, 245, 192, 251, 58, 104, 31, 211, 99, 47, 3, 254, 150, 238, 150, 255, 17}
6Cipher Suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
Compression Method: 0
{92, 125, 15, 251, 114, 214, 202, 211, 214, 210, 209, 207, 146, 65, 120, 23, 13, 124, 139, 100, 141, 124, 98, 162, 42, 193, 9, 123, 8, 6, 123, 188}
%% Initialized:  [Session-47, SSL_NULL_WITH_NULL_NULL]
Cipher Suites: [Unknown 0x13:0x2, Unknown 0x13:0x3, Unknown 0x13:0x1, Unknown 0x13:0x4, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa9, Unknown 0xc0:0xad, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0xac, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa8, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xc0:0x9d, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9c, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xaa, Unknown 0xc0:0x9f, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9e, TLS_DHE_RSA_WITH_AES_128_CBC_SHA]
Compression Methods:  { 0 }
https-jsse-nio-8443-exec-10, called closeOutbound()
https-jsse-nio-8443-exec-3, READ: TLSv1.2 Handshake, length = 134
Unsupported extension status_request, data: 01:00:00:00:00
Extension elliptic_curves, curve names: {secp256r1, secp384r1, secp521r1, unknown curve 29, unknown curve 256, unknown curve 257, unknown curve 258, unknown curve 259, unknown curve 260}
Extension ec_point_formats, formats: [uncompressed]
Extension signature_algorithms, signature_algorithms: SHA256withRSA, Unknown (hash:0x8, signature:0x9), Unknown (hash:0x8, signature:0x4), SHA256withECDSA, Unknown (hash:0x8, signature:0x7), SHA384withRSA, Unknown (hash:0x8, signature:0xa), Unknown (hash:0x8, signature:0x5), SHA384withECDSA, SHA512withRSA, Unknown (hash:0x8, signature:0xb), Unknown (hash:0x8, signature:0x6), SHA512withECDSA, SHA1withRSA, SHA1withECDSA
Unsupported extension type_35, data:
Unsupported extension type_51, data: 00:69:00:17:00:41:04:a9:8f:9e:f5:39:15:7f:33:f9:e5:15:36:f6:e9:9c:dd:e5:61:89:9b:51:fb:b1:dc:e3:56:3e:9b:e7:0f:6a:64:95:a6:bc:61:61:03:80:f6:f1:23:56:a1:2c:19:de:7e:f4:80:5c:66:0c:8c:40:f1:f6:63:00:76:3d:1f:c2:f3:00:1d:00:20:19:3c:dc:09:00:56:dc:f5:02:17:24:b1:7a:e0:d9:43:79:27:d9:4b:f1:d9:89:d3:47:0c:b7:15:3c:f7:46:76
Unsupported extension type_43, data: 08:03:04:03:03:03:02:03:01
Extension renegotiation_info, renegotiated_connection: <empty>
Extension server_name, server_name: [type=host_name (0), value=localhost]
Unsupported extension type_45, data: 02:01:00
Unsupported extension type_28, data: 40:00
Unsupported extension type_21, data: 00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00
***
%% Initialized:  [Session-48, SSL_NULL_WITH_NULL_NULL]
Standard ciphersuite chosen: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
%% Negotiating:  [Session-47, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384]
*** ServerHello, TLSv1.2
RandomCookie:  GMT: 1551699708 bytes = { 93, 40, 199, 139, 242, 41, 57, 189, 149, 232, 149, 26, 171, 200, 28, 126, 117, 49, 96, 26, 24, 158, 119, 211, 237, 159, 207, 33 }
Session ID:  {92, 125, 15, 252, 66, 67, 19, 245, 174, 255, 220, 155, 242, 80, 54, 130, 173, 58, 185, 182, 240, 144, 2, 51, 69, 246, 178, 11, 254, 190, 233, 136}
Cipher Suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
Compression Method: 0
Extension renegotiation_info, renegotiated_connection: <empty>
***
Cipher suite:  TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
*** Certificate chain
Standard ciphersuite chosen: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
%% Negotiating:  [Session-48, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384]
*** ServerHello, TLSv1.2
RandomCookie:  GMT: 1551699708 bytes = { 36, 32, 28, 133, 211, 97, 87, 221, 183, 216, 244, 201, 35, 61, 98chain [0] = [
[
  Version: V3
  Subject: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US
  Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5

  Key:  Sun RSA public key, 2048 bits
  modulus: 21944740401167172627731583459321030363948627215746053925732477915060915436180167456469785746662093119306577380200747716284652995937004530444336851845029170241627465854006145050037178991946925696078563485570896673835545540824265905937881682387179314987285174428010940266412458943894800978345731524307952507729956745301047871771953945124256516782917326981125087548987889540650149121302888872237484100834740328828765018090383963294418357028839734723410564800765871733483849269364796949055153420777966213779145518299141217288017794394762274753999989298548507425930217302947589819396239489846633419099079578249651345685751
  public exponent: 65537
  Validity: [From: Fri May 30 08:43:19 GMT 2014,
               To: Mon May 27 08:43:19 GMT 2024]
  Issuer: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US
  SerialNumber: [    a6ef7a9a 5368eb27]

Certificate Extensions: 3
[1]: ObjectId: 2.5.29.35 Criticality=false
AuthorityKeyIdentifier [
KeyIdentifier [
0000: 78 0D 96 9D FE D3 0B BE   8C C7 E3 EC 67 04 AB 4B  x...........g..K
0010: EA E0 00 29                                        ...)
]
]

[2]: ObjectId: 2.5.29.19 Criticality=false
BasicConstraints:[
  CA:true
  PathLen:2147483647
]

[3]: ObjectId: 2.5.29.14 Criticality=false
SubjectKeyIdentifier [
KeyIdentifier [
0000: 78 0D 96 9D FE D3 0B BE   8C C7 E3 EC 67 04 AB 4B  x...........g..K
0010: EA E0 00 29                                        ...)
]
]

]
  Algorithm: [SHA1withRSA]
  Signature:
0000: 19 16 5A 21 99 21 24 98   3C 0A E8 D8 00 AB 44 24  ..Z!.!$.<.....D$
0010: F2 0C B7 83 D5 9F 96 17   87 E2 1F 1D A3 47 68 C7  .............Gh.
0020: 68 4A CB 56 0E 77 2B E8   1A 9F E7 09 A1 19 77 D0  hJ.V.w+.......w.
0030: 5E CC C1 B3 9A C4 35 3D   CB E0 A5 A6 43 5D A3 26  ^.....5=....C].&
0040: A4 91 8A C1 FA 7B 10 EA   DC C3 C7 1C 47 DC 97 32  ............G..2
0050: C0 37 80 1C F1 42 10 E3   74 17 FA 3E 60 4A B7 59  .7...B..t..>`J.Y
0060: 92 C1 E0 6F BB F1 BB 9F   82 89 B5 83 D5 AE 1E 90  ...o............
0070: 0A 89 8D FB 4C C0 C5 9E   DC C5 8C C6 2F EE D9 B4  ....L......./...
0080: 95 47 27 2E BE 82 31 6F   76 C0 DB 4C C8 0D 3B 7B  .G'...1ov..L..;.
0090: D1 6A BF BD 3B 93 30 04   A2 9E 81 F7 96 28 77 F2  .j..;.0......(w.
00A0: 32 05 68 44 1F B3 30 CE   40 9F 20 F3 B4 2B AA E6  2.hD..0.@. ..+..
00B0: 40 9B FB 7F 34 6E 3A 99   FD F8 28 F1 8C 9B 56 34  @...4n:...(...V4
00C0: 64 AD 4D 56 39 CB 96 18   50 9B 99 43 80 0A 39 A5  d.MV9...P..C..9.
00D0: 13 7A 6E C5 25 E0 95 4A   92 E5 A8 8B EE 03 49 B4  .zn.%..J......I.
00E0: D9 7C 00 E3 F0 3B A7 BA   40 30 CC 89 55 C6 97 93  .....;..@0..U...
00F0: B5 15 F6 62 D3 B1 74 9C   0B 80 2B 8A D4 03 84 A0  ...b..t...+.....

]
***
Extension renegotiation_info, renegotiated_connection: <empty>
***
DCipher suite:  TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
 *** Certificate chain
7https-jsse-nio-8443-exec-10, closeOutboundInternal()
, 16, 100, 132, 221, 137, 191, 33, 113, 215, 17, 59, 24, 201 }
Session ID:  {92, 125, 15, 252, 136, 130, 72, 255, 243, 10, 20, 138, 42, 161, 155, 233, 182, 245, 49, 189, 64, 80, 170, 168, 162, 148, 66, 187, 184, 189, 7, 211}
Cipher Suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
Compression Method: 0
Extension renegotiation_info, renegotiated_connection: <empty>
***
Cipher suite:  TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
*** ClientKeyExchange, DH
*** Certificate chain
*** Diffie-Hellman ServerKeyExchange
DH Modulus:  { 255, 255, 255, 255, 255, 255, 255, 255, 201, 15, 218, 162, 33, 104, 194, 52, 196, 198, 98, 139, 128, 220, 28chain [0] = [
[
  Version: V3
  Subject: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US
  Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5

  Key:  Sun RSA public key, 2048 bits
  modulus: 21944740401167172627731583459321030363948627215746053925732477915060915436180167456469785746662093119306577380200747716284652995937004530444336851845029170241627465854006145050037178991946925696078563485570896673835545540824265905937881682387179314987285174428010940266412458943894800978345731524307952507729956745301047871771953945124256516782917326981125087548987889540650149121302888872237484100834740328828765018090383963294418357028839734723410564800765871733483849269364796949055153420777966213779145518299141217288017794394762274753999989298548507425930217302947589819396239489846633419099079578249651345685751
  public exponent: 65537
  Validity: [From: Fri May 30 08:43:19 GMT 2014,
               To: Mon May 27 08:43:19 GMT 2024]
  Issuer: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US
  SerialNumber: [    a6ef7a9a 5368eb27]

Certificate Extensions: 3
[1]: ObjectId: 2.5.29.35 Criticality=false
AuthorityKeyIdentifier [
KeyIdentifier [
0000: 78 0D 96 9D FE D3 0B BE   8C C7 E3 EC 67 04 AB 4B  x...........g..K
0010: EA E0 00 29                                        ...)
]
]

[2]: ObjectId: 2.5.29.19 Criticality=false
BasicConstraints:[
  CA:true
  PathLen:2147483647
]

[3]: ObjectId: 2.5.29.14 Criticality=false
SubjectKeyIdentifier [
KeyIdentifier [
0000: 78 0D 96 9D FE D3 0B BE   8C C7 E3 EC 67 04 AB 4B  x...........g..K
0010: EA E0 00 29                                        ...)
]
]

]
  Algorithm: [SHA1withRSA]
  Signature:
0000: 19 16 5A 21 99 21 24 98   3C 0A E8 D8 00 AB 44 24  ..Z!.!$.<.....D$
0010: F2 0C B7 83 D5 9F 96 17   87 E2 1F 1D A3 47 68 C7  .............Gh.
0020: 68 4A CB 56 0E 77 2B E8   1A 9F E7 09 A1 19 77 D0  hJ.V.w+.......w.
0030: 5E CC C1 B3 9A C4 35 3D   CB E0 A5 A6 43 5D A3 26  ^.....5=....C].&
0040: A4 91 8A C1 FA 7B 10 EA   DC C3 C7 1C 47 DC 97 32  ............G..2
0050: C0 37 80 1C F1 42 10 E3   74 17 FA 3E 60 4A B7 59  .7...B..t..>`J.Y
0060: 92 C1 E0 6F BB F1 BB 9F   82 89 B5 83 D5 AE 1E 90  ...o............
0070: 0A 89 8D FB 4C C0 C5 9E   DC C5 8C C6 2F EE D9 B4  ....L......./...
0080: 95 47 27 2E BE 82 31 6F   76 C0 DB 4C C8 0D 3B 7B  .G'...1ov..L..;.
0090: D1 6A BF BD 3B 93 30 04   A2 9E 81 F7 96 28 77 F2  .j..;.0......(w.
00A0: 32 05 68 44 1F B3 30 CE   40 9F 20 F3 B4 2B AA E6  2.hD..0.@. ..+..
00B0: 40 9B FB 7F 34 6E 3A 99   FD F8 28 F1 8C 9B 56 34  @...4n:...(...V4
00C0: 64 AD 4D 56 39 CB 96 18   50 9B 99 43 80 0A 39 A5  d.MV9...P..C..9.
00D0: 13 7A 6E C5 25 E0 95 4A   92 E5 A8 8B EE 03 49 B4  .zn.%..J......I.
00E0: D9 7C 00 E3 F0 3B A7 BA   40 30 CC 89 55 C6 97 93  .....;..@0..U...
00F0: B5 15 F6 62 D3 B1 74 9C   0B 80 2B 8A D4 03 84 A0  ...b..t...+.....

]
***
E F9chain [0] = [
[
  Version: V3
  Subject: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US
  Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5

  Key:  Sun RSA public key, 2048 bits
  modulus: 21944740401167172627731583459321030363948627215746053925732477915060915436180167456469785746662093119306577380200747716284652995937004530444336851845029170241627465854006145050037178991946925696078563485570896673835545540824265905937881682387179314987285174428010940266412458943894800978345731524307952507729956745301047871771953945124256516782917326981125087548987889540650149121302888872237484100834740328828765018090383963294418357028839734723410564800765871733483849269364796949055153420777966213779145518299141217288017794394762274753999989298548507425930217302947589819396239489846633419099079578249651345685751
  public exponent: 65537
  Validity: [From: Fri May 30 08:43:19 GMT 2014,
               To: Mon May 27 08:43:19 GMT 2024]
  Issuer: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US
  SerialNumber: [    a6ef7a9a 5368eb27]

Certificate Extensions: 3
[1]: ObjectId: 2.5.29.35 Criticality=false
AuthorityKeyIdentifier [
KeyIdentifier [
0000: 78 0D 96 9D FE D3 0B BE   8C C7 E3 EC 67 04 AB 4B  x...........g..K
0010: EA E0 00 29                                        ...)
]
]

[2]: ObjectId: 2.5.29.19 Criticality=false
BasicConstraints:[
  CA:true
  PathLen:2147483647
]

[3]: ObjectId: 2.5.29.14 Criticality=false
SubjectKeyIdentifier [
KeyIdentifier [
0000: 78 0D 96 9D FE D3 0B BE   8C C7 E3 EC 67 04 AB 4B  x...........g..K
0010: EA E0 00 29                                        ...)
]
]

]
  Algorithm: [SHA1withRSA]
  Signature:
0000: 19 16 5A 21 99 21 24 98   3C 0A E8 D8 00 AB 44 24  ..Z!.!$.<.....D$
0010: F2 0C B7 83 D5 9F 96 17   87 E2 1F 1D A3 47 68 C7  .............Gh.
0020: 68 4A CB 56 0E 77 2B E8   1A 9F E7 09 A1 19 77 D0  hJ.V.w+.......w.
0030: 5E CC C1 B3 9A C4 35 3D   CB E0 A5 A6 43 5D A3 26  ^.....5=....C].&
0040: A4 91 8A C1 FA 7B 10 EA   DC C3 C7 1C 47 DC 97 32  ............G..2
0050: C0 37 80 1C F1 42 10 E3   74 17 FA 3E 60 4A B7 59  .7...B..t..>`J.Y
0060: 92 C1 E0 6F BB F1 BB 9F   82 89 B5 83 D5 AE 1E 90  ...o............
0070: 0A 89 8D FB 4C C0 C5 9E   DC C5 8C C6 2F EE D9 B4  ....L......./...
0080: 95 47 27 2E BE 82 31 6F   76 C0 DB 4C C8 0D 3B 7B  .G'...1ov..L..;.
0090: D1 6A BF BD 3B 93 30 04   A2 9E 81 F7 96 28 77 F2  .j..;.0......(w.
00A0: 32 05 68 44 1F B3 30 CE   40 9F 20 F3 B4 2B AA E6  2.hD..0.@. ..+..
00B0: 40 9B FB 7F 34 6E 3A 99   FD F8 28 F1 8C 9B 56 34  @...4n:...(...V4
00C0: 64 AD 4D 56 39 CB 96 18   50 9B 99 43 80 0A 39 A5  d.MV9...P..C..9.
00D0: 13 7A 6E C5 25 E0 95 4A   92 E5 A8 8B EE 03 49 B4  .zn.%..J......I.
00E0: D9 7C 00 E3 F0 3B A7 BA   40 30 CC 89 55 C6 97 93  .....;..@0..U...
00F0: B5 15 F6 62 D3 B1 74 9C   0B 80 2B 8A D4 03 84 A0  ...b..t...+.....

]
***
 C5 E3 79 35   59 00 CE 91 B4 93 B2 68  .m....y5Y......h
0030: 95 30 B4 96 65 4F 54 E2   0A FA 27 05 1D EE BE C2  .0..eOT...'.....
0040: 65 29 79 63 5E E1 C9 3A   0A AE AB DC E2 51 4E FC  e)yc^..:.....QN.
0050: 1B 30 A6 8E CA FC 32 CA   15 96 76 12 6C 13 6A 29  .0....2...v.l.j)
0060: E7 81 D1 5B 2C 38 D7 54   0A 31 35 9F 03 44 64 8C  ...[,8.T.15..Dd.
0070: 4A AF 47 82 87 64 A6 AE   5A 89 A9 C2 F2 68 94 3E  J.G..d..Z....h.>
CONNECTION KEYGEN:
Client Nonce:
0000: FB 6C CE A7 DD 77 D7 6F   0A 8A A8 17 1B A6 C7 AF  .l...w.o........
0010: 15 2B 6B 40 30 FD C6 1F   D4 8C 14 ED 88 2C AA BD  .+k@0........,..
Server Nonce:
0000: 5C 7D 0F FC 5C C9 42 F5   33 FC 3D E1 09 6B 76 9D  \...\.B.3.=..kv.
0010: AD ED 07 66 55 7D BB 8D   A5 C0 B5 5A 6A EA 9D 54  ...fU......Zj..T
Master Secret:
0000: 42 2E 96 E8 70 3B 2A A1   C9 93 39 2B DD 95 BE BB  B...p;*...9+....
0010: CF AF C9 61 F9 8D F8 0D   4A 3E 34 EF 40 76 84 49  ...a....J>[hidden email]
0020: C0 59 D5 91 51 F1 63 86   29 16 53 1D 31 44 54 A8  .Y..Q.c.).S.1DT.
... no MAC keys used for this cipher
Client write key:
0000: 82 12 40 77 E9 66 2A EE   33 8B 26 F4 B7 2E B4 24  ..@w.f*.3.&....$
0010: B4 D4 CF EF D3 70 7D 92   AD 1C B7 B0 76 51 C8 E0  .....p......vQ..
Server write key:
0000: F1 33 02 4C 8E 33 85 22   AA 8F FC AE 04 96 C1 1D  .3.L.3."........
0010: FB F5 62 94 9F 66 7F B9   0B 35 60 6E 9D 3D 3F E0  ..b..f...5`n.=?.
Client write IV:
0000: D8 E8 95 59                                        ...Y
Server write IV:
0000: 30 2D B5 5B                                        0-.[
*** Diffie-Hellman ServerKeyExchange
DH Modulus:  { 255, 255, 255, 255, 255, 255, 255, 255, 201, 15, 218, 162, 33, 104, 194, 52, 196, 198, 98, 139, 128, 220, 28, 209, 41, 2, 78, 8, 138, 103, 204, 116, 2, 11, 190, 166, 59, 19, 155, 34, 81, 74, 8, 121, 142, 52, 4, 221, 239, 149, 25, 179, 205, 58, 67, 27, 48, 43, 10, 109, 242, 95, 20, 55, 79, 225, 53, 109, 109, 81, 194, 69, 228, 133, 181, 118, 98, 94, 126, 198, 244, 76, 66, 233, 166, 55, 237, 107, 11, 255, 92, 182, 244, 6, 183, 237, 238, 56, 107, 251, 90, 137, 159, 165, 174, 159, 36, 17, 124, 75, 31, 230, 73, 40, 102, 81, 236, 230, , 209, 41, 2, 78, 8, 138, 103, 204, 116, 2, 11, 190, 166, 59, 19, 155, 34, 81, 74, 8, 121, 142, 52, 4, 221, 239, 149, 25, 179, 205, 58, 67, 27, 48, 43, 10, 109, 242, 95, 20, 55, 79, 225, 53, 109, 109, 81, 194, 69, 228, 133, 181, 118, 98, 94, 126, 198, 244, 76, 66, 233, 166, 55, 237, 107, 11, 255, 92, 182, 244, 6, 183, 237, 238, 56, 107, 251, 90, 137, 159, 165, 174, 159, 36, 17, 124, 75, 31, 230, 73, 40, 102, 81, 236, 230, 83, 129, 255, 255, 255, 255, 255, 255, 255, 255 }
DH Base:  { 2 }
Server DH Public Key:  { 69, 210, 11, 75, 133, 38, 155, 210, 38, 75, 45, 199, 131, 38, 3, 212, 18, 130, 61, 112, 219, 189, 212, 129, 187, 114, 13, 120, 105, 32, 138, 197, 100, 78, 107, 55, 226, 64, 119, 191, 20, 126, 5, 249, 127, 163, 12, 201, 96, 44, 216, 99, 255, 52, 36, 58, 23, 6, 44, 68, 227, 226, 173, 115, 99, 136, 61, 1, 66, 17, 122, 130, 8, 217, 255, 246, 17, 171, 199, 76, 164, 105, 58, 223, 29, 158, 111, 142, 215, 3, 187, 3, 54, 138, 13, 79, 114, 205, 248, 115, 172, 200, 37, 212, 30, 232, 119, 134, 22, 47, 232, 9, 199, 9, 196, 39, 92, 9, 52, 216, 25, 129, 197, 229, 227, 138, 182, 212 }
DH Public key:  { 72, 178, 32, 128, 183, 120, 121, 225, 139, 62, 186, 146, 97, 112, 75, 121, 237, 220, 142, 123, 27, 32, 10, 3, 175, 83, 97, 177, 47, 192, 73, 133, 130, 159, 241, 50, 36, 210, 100, 93, 62, 24, 20, 100, 32, 63, 39, 74, 111, 56, 81, 240, 252, 69, 122, 25, 254, 156, 93, 22, 169, 151, 58, 120, 248, 78, 42, 253, 80, 211, 65, 17, 244, 138, 61, 111, 117, 121, 251, 88, 114, 57, 170, 42, 92, 136, 58, 20, 40, 75, 252, 142, 138, 215, 79, 242, 55, 204, 81, 119, 239, 149, 20, 217, 92, 122, 25, 134, 129, 63, 100, 79, 118, 30, 66, 74, 191, 6, 109, 223, 16, 150, 141, Signature Algorithm SHA256withRSA
Signed with a DSA or RSA public key
83, *** ServerHelloDone
https-jsse-nio-8443-exec-7, READ: TLSv1.2 Change Cipher Spec, length = 1
*** Diffie-Hellman ServerKeyExchange
DH Modulus:  { 255, 255, 255, 255, 255, 255, 255, 255, 201, 15, 218, 162, 33, 104, 194, 52, 196, 198, 98, 139, 128, 220, 28, 209, 41, 2, 78, 8, 138, 103, 204, 116, 2, 11, 190, 166, 59, 19, 155, 34, 81, 74, 8, 121, 142, 52, 4, 221, 239, 149, 25, 179, 205, 58, 67, 27, 48, 43, 10, 109, 242, 95, 20, 55, 79, 225, 53, 109, 109, 81, 194, 69, 228, 133, 181, 118, 98, 94, 126, 198, 244, 76, 66, 233, 166, 55, 237, 107, 11, 255, 92, 182, 244, 6, 183, 237, 238, 56, 107, 251, 90, 137, 159, 165, 174, 159, 36, 17, 124, 75, 31, 230, 73, 40https-jsse-nio-8443-exec-2, WRITE: TLSv1.2 Handshake, length = 1697
1290, 156, 245, 62, 47 }
SESSION KEYGEN:
PreMaster Secret:
0000: 84 51 99 39 38 75 2D 09   3C ED CA FB 06 22 F1 D8  .Q.98u-.<...."..
0010: 06 E1 89 5B 6A B7 35 5C   AD D6 CE 73 76 5D C3 19  ...[j.5\...sv]..
0020: E3 03 BD 33 A1 7F 42 85   24 3E 34 95 4C 4A 3A 59  ...3..B.$>4.LJ:Y
0030: A7 86 F4 5D 33 A0 5F F7   68 9C C2 69 48 C5 FE F3  ...]3._.h..iH...
0040: 4C 6B 51 79 89 9B 0F AF   00 89 DF 63 9D F4 12 78  LkQy.......c...x
0050: 57 71 6F A6 B2 34 15 65   B0 77 95 BD F1 91 ED C6  Wqo..4.e.w......
0060: 1B 05 CF 77 D3 B9 21 C0   0A E3 27 A4 8C 6E 5C 2A  ...w..!...'..n\*
0070: CF B9 1F 03 EB 46 60 EF , 102https-jsse-nio-8443-exec-7, READ: TLSv1.2 Handshake, length = 40
, 81, 236, 230, 83,   8A 6B, 255, 255, 255, 255, 255, 255, 255, 255 }
https-jsse-nio-8443-exec-4, READ: TLSv1.2 Handshake, length = 134
DH Base:  { 2 }
Server DH Public Key:  { 128, *** ClientKeyExchange, DH
DH Public key:  { 255, 46, 82, 157, 71, 34, 81, 92, 66, 156, 181, 39, 21, 95, 200, 218, 221, 191, 243, 56, 78,  B4129, 255, 255, 255, 255, 255, 255, 255, 255 }
DH Base:  { 2 }
Server DH Public Key:  {  17 1A 58 65 E1  .....F`..k...Xe.
201, 221, 79, 215, 215, 207, 162, 127, 61, 19, 175, 243, 23, 9, 11, 36, 69, 127, 191, 48, 43, 63, 154, 132, 69, 93, 251, 78, 215, 173, 25, 225, 84, 255, 197, 179, 51, 16, 17, 12, 1, 212, 169, 187, 4, 245, 46, 193, 51, 107, 86, 109, 96, 24, 63, 146, 247, 218, 87, 186, 55, 6, 210, 242, 85, 111, 19, 114, 50, 191, 175, 74, 117, 3, 92, 23, 26, 148, 49, 148, 34, 227, 78, 112, 136, 168, 191, 80, 30, 23, 142, 72, 184, 89, 244, 142, 111, 142, 152, 193, 174, 181, 67, 43, 185, 226, 234 }
26, 151, 135, 222, 110, 116, 65, 45, 127, 6, 104, 62, 50, 161, 253, 97, 176, 176, 194, 224, 35, 103, 124, *** Finished
129, CONNECTION KEYGEN:
Client Nonce:
0000: 87 AC 58 E8 1B 6A 62 26   B9 B2 CA 9F 00 56 55 6D  ..X..jb&.....VUm
0010: 64 6E 8F 00 02 EF 07 59   FE 2B 5B 80 7B FB 59 A5  dn.....Y.+[...Y.
Server Nonce:
0000: 5C 7D 0F FC CA 9E 33 53   14 C8 B7 D2 E4 5E 25 4F  \.....3S.....^%O
0010: A7 F9 A4 25 94 21 F5 51   AB C8 BD 65 0B 2E 78 FF  ...%.!.Q...e..x.
Master Secret:
0000: 3A 0E 38 39 8E CA 2F 79   8B 0E 66 69 28 7B 11 18  :.89../y..fi(...
0010: A9 7D 4A 46 33 75 69 23   47 6A 48 F2 96 15 EE 29  ..JF3ui#GjH....)
0020: 3B BD 5A A2 1F 6C C5 3C   14 15 4A AC E1 62 C1 34  ;.Z..l.<..J..b.4
... no MAC keys used for this cipher
Client write key:
0000: 78 DA CD AB 43 AA 38 8E   CF C3 3A 5C 4F B5 31 4B  x...C.8...:\O.1K
0010: 81 18 51 BA 90 B5 A2 81   94 63 E3 1F 57 AF 5E F8  ..Q......c..W.^.
Server write key:
0000: EE DC A2 9B E2 68 51 E6   C4 8F 30 01 CE 0D B9 6F  .....hQ...0....o
0010: 1F F5 8D 11 C9 75 26 29   DC 07 12 9D 22 88 95 9A  .....u&)...."...
Client write IV:
0000: 9C 95 E8 5A                                        ...Z
Server write IV:
0000: FE 6D E4 A0                                        .m..
87, 161, 9, 12, 209, https-jsse-nio-8443-exec-3, READ: TLSv1.2 Change Cipher Spec, length = 1
SESSION KEYGEN:
PreMaster Secret:
123, 15, 11, 158, 23, 55, 97, 195, 124, 110, 112, 15, 7, 53, 221, 50, 124, 206, 160, 224, 85, 150, 34, 216, 220, 51, 7, 15, 232, 39, 127, 4, 173, 87, 181, 154, 171, 168, 19, 245, 152, 104, 161, 23, 69, 170, 117, 0, 136, 129, 102, 21, 249, 107, 215, 235, 201, 228, 221, 210, 186, 68, 226, 83, 159, 54, 141, 134, 218, 95, 224, 201, 36, 93, 112, 204, 110, 126, 216, 150, 23, 204, 67, 115, 82, 72, 38, 229, 26, 253, 245, 160, 29, 202, 242, 127, 122, 215, 198, 117, 236, 122, 229 }
Signature Algorithm SHA256withRSA
Signed with a DSA or RSA public key
*** ServerHelloDone
https-jsse-nio-8443-exec-1, WRITE: TLSv1.2 Handshake, length = 1697
verify_data:  { 20, 245, 123, 31, 104, 211, 171, 208, 198, 65, 238, 245https-jsse-nio-8443-exec-3, READ: TLSv1.2 Handshake, length = 40
0000: EB DD 8C 01 C6 78 61 C9   BC 10 01 03 57 77 7D A9  .....xa.....Ww..
0010: AD E1 DE 94 49 F6 6F 6B   0A 57 1A 3F B4 D7 BD BC  ....I.ok.W.?....
0020: 27 1D 4D C7 07 B6 A2 D5   88 98 B6 34 FA 06 A3 9C  '.M........4....
0030: 1A 10 D5 57 45 1B 5A F9   F7 32 82 36 C9 10 6C 00  ...WE.Z..2.6..l.
0040: 1B BC 49 86 7C D0 99 4E   3E 87 A7 BA E4 55 0F A4  ..I....N>....U..
0050: 1B FD 67 C8 C8 F0 AB E5   1B 9A 50 DF EA 84 2E 33  ..g.......P....3
0060: 08 75 66 70 C5 FD B6 0C   1B 9B 78 B9 DB EB 54 F2  .ufp......x...T.
0070: F3 B5 7C 3F C8 7F 30 D1   7C AE 85 9A 85 EC FE 44  ...?..0........D
CONNECTION KEYGEN:
Client Nonce:
0000: FD 91 B9 F0 CE 84 9D 61   03 B8 14 DD 02 84 2A 96  .......a......*.
0010: C3 51 CF 3F 95 78 01 64   48 1E 4B BB A2 90 62 41  .Q.?.x.dH.K...bA
Server Nonce:
0000: 5C 7D 0F FC 5D 28 C7 8B   F2 29 39 BD 95 E8 95 1A  \...](...)9.....
0010: AB C8 1C 7E 75 31 60 1A   18 9E 77 D3 ED 9F CF 21  ....u1`...w....!
Master Secret:
0000: 22 75 0B 53 1A 8B 99 C1   01 73 DE 7A BF E1 22 D1  "u.S.....s.z..".
0010: F2 09 71 7B E6 0D 6C C6   8B 93 58 68 14 18 D0 CE  ..q...l...Xh....
0020: BB D4 DE C9 21 7B C5 15   AB EC 52 09 26 25 AE 09  ....!.....R.&%..
... no MAC keys used for this cipher
Client write key:
0000: 4D 13 0F 83 89 7B E5 51   51 6B 3F 8A 48 E4 D4 93  M......QQk?.H...
0010: 71 A5 47 27 C2 3D 6B 8C   AB 3C 65 18 6B 13 53 B9  q.G'.=k..<e.k.S.
Server write key:
0000: B4 A8 F5 EA 71 1B 73 D4   31 0E 20 6B 36 C5 E4 7D  ....q.s.1. k6...
0010: F3 E8 A5 CE D9 BD 56 0A   C3 C3 6E 60 F7 29 69 9D  ......V...n`.)i.
Client write IV:
0000: 6A CA AE 70                                        j..p
Server write IV:
0000: 37 66 03 1B                                        7f..
201, 176, 155, 160, 103, 251, 61https-jsse-nio-8443-exec-4, READ: TLSv1.2 Change Cipher Spec, length = 1
https-jsse-nio-8443-exec-4, READ: TLSv1.2 Handshake, length = 40
*** Finished
verify_data:  { 161, 110, 209, 181, 88, 9, 209, 24, 178, 83, 52, 125 }
***
https-jsse-nio-8443-exec-4, WRITE: TLSv1.2 Change Cipher Spec, length = 1
*** Finished
verify_data:  { 174, 168, 145, 241, 96, 64, 33, 175, 147, 122, 160, 138 }
***
*** Finished
verify_data:  { 26, 22, 87, 0, 174, 155, 67, 246https-jsse-nio-8443-exec-4, WRITE: TLSv1.2 Handshake, length = 40
 }
***
%% Cached server session: [Session-47, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384]
https-jsse-nio-8443-exec-7, WRITE: TLSv1.2 Change Cipher Spec, length = 1
*** Finished
verify_data:  { 13, 12, 230, 221, 74, 61, 16, 61, 233, 26, 123, 141 }
***
https-jsse-nio-8443-exec-7, WRITE: TLSv1.2 Handshake, length = 40
%% Cached server session: [Session-43, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384]
, 97, 84, 76, 158 }
***
https-jsse-nio-8443-exec-3, WRITE: TLSv1.2 Change Cipher Spec, length = 1
*** Finished
verify_data:  { 109, 26, 182, 36, 215, 82, 172, 204, 141, 87, 2, 119 }
***
, 222, 108, 136, 37, 165, 222, 179, 248, 138, 210, 181, 62, 154, 65, 106, 238, 68, 46, 139, 208, 174, 211, 144, 138, 248, 170, 235, 58, 211, 63, 246, 82, 38, 130, 92, 218, 121, 50, 210, 166, 49, 204, 123, 198, 82, 152, 164, 205, 98, 169, 173, 109, 221, 191, 51, 91, 113, 207, 53, 188, 40, 174, 168, 66, 29, 245, 0, 140, 127, 95, 48, 129, 97, 63, 79, 199, 173, 127, 248, 50, 195, 202, 73, 232, 10, 32, 130, 226, 150, 48, 153, 66, 132, 59, 233, 98, 224, 20, 145, 186, 91, 120, 242, 39, 191, 24, 42, 66, 121, 226, 86, 158, 193, 35, 14, 255 }
https-jsse-nio-8443-exec-4, READ: TLSv1.2 Handshake, length = 134
Signature Algorithm SHA256withRSA
Signed with a DSA or RSA public key
https-jsse-nio-8443-exec-3, WRITE: TLSv1.2 Handshake, length = 40
*** ServerHelloDone
%% Cached server session: [Session-45, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384]
https-jsse-nio-8443-exec-5, WRITE: TLSv1.2 Handshake, length = 1697
Using SSLEngineImpl.
Allow unsafe renegotiation: false
Allow legacy hello messages: true
Is initial handshake: true
Is secure renegotiation: false
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1.1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1.1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1.1
https-jsse-nio-8443-exec-3, READ: TLSv1 Handshake, length = 512
*** ClientHello, TLSv1.2
RandomCookie:  GMT: 371784205 bytes = { 70, 201, 194, 186, 32, 109, 127, 212, 37, 12, 42, 163, 149, 127, 128, 88, 250, 67, 80, 174, 5, 9, 121, 109, 247, 163, 138, 64 }
Session ID:  *** ClientKeyExchange, DH
DH Public key:  { 20, 79, 3, 104, 71, 168, 228, 249, 216, 199, 64, 211, 179, 73, 126, 151, 108, 35, 83, 16, 209, 230, 0, 142, 111, 13, 238, 17, 182, 91, 241, 13, 26, 8, 3, 54, 43, 242, 114, 241, 113, 194, 172, 68, 52, 7, 141, 153, 8, 218, 197, 77, 166, 105, 185, 33, 208, 159, 107, 9, 60, 237, 196, 107, 198, 203, 63, 3, 242, 123, 201, 77, 125, 17, 117, 251, 238, 184, 193, 14, 15, 61, 255, 245, 255, 76, 127, 115, 184, 113, 123, 233, 71, 36, 1, 106, 44, 21, 147, 64, 0, 210, 16, 240, 20, 195, 9, 19, 230, 85, 72, 66, 153, 71, 239, 29, 139, 37, 149, 190, 68, 129, 63, 92, 72, 222, 157, 29 }
SESSION KEYGEN:
PreMaster Secret:
0000: F4 06 DC AD A0 1D C9 B4   2A 28 F2 06 F6 C7 23 34  ........*(....#4
0010: 5A 71 2A F5 D3 40 3B 56   13 C6 CA 07 EC D4 72 3E  Zq*..@;V......r>
0020: C0 C2 4A 2E 60 39 39 97   E7 6A 6D AF 5F 11 EC 34  ..J.`99..jm._..4
0030: 3B 9B AF 0D 46 25 0C 17   A3 17 64 AA BE 8B 19 9B  ;...F%....d.....
0040: 20 AA E7 FF E7 08 29 73   9A C4 46 B4 50 59 B0 A5   .....)s..F.PY..
0050: D1 CE E9 9A 9B BF 7F EA   EA 4F B3 1C 2E DB C9 4A  .........O.....J
0060: D8 A9 FC 73 49 EE A8 95   9C E9 49 11 56 84 19 56  ...sI.....I.V..V
0070: BF 56 1C 42 82 92 C8 C9   BB C9 F9 B8 CD 37 99 A9  .V.B.........7..
CONNECTION KEYGEN:
Client Nonce:
0000: 8C 7D 49 3A C3 1A 29 81   41 A4 6A 62 8A 6C A5 23  ..I:..).A.jb.l.#
0010: 7B 33 C6 B9 19 95 F1 D9   AC E8 A8 42 6E B3 0E 03  .3.........Bn...
Server Nonce:
0000: 5C 7D 0F FC 00 EF FE 7A   9E C1 77 26 42 B1 D0 9B  \......z..w&B...
0010: 23 45 BD E9 C0 A8 D2 65   FA 8D CC 9A E9 C5 F3 05  #E.....e........
Master Secret:
0000: B1 4F 49 D0 9C CD EF C9   43 43 26 B8 0F 9A B6 55  .OI.....CC&....U
0010: 67 ED 52 43 57 CA CF B1   A4 AC D0 10 4C 5F 43 89  g.RCW.......L_C.
0020: AC AF F8 C8 A1 3F 44 0D   19 8D E3 AB 72 EA 4B 92  .....?D.....r.K.
... no MAC keys used for this cipher
Client write key:
0000: F3 7A 7F C2 9F 8F 1C B3   75 FB 6F 91 24 B6 67 6E  .z......u.o.$.gn
0010: AF EC D9 EF 4B 03 3E F0   7A 86 4C 9C 49 6C 93 76  ....K.>.z.L.Il.v
Server write key:
0000: BB 1E 8A B6 D0 84 86 2B   63 BE B4 10 FB 07 01 D4  .......+c.......
0010: 4A B5 DA 1E 4D ED F8 E9   3B C7 99 0E 72 C5 35 9D  J...M...;...r.5.
Client write IV:
0000: 90 73 48 16                                        .sH.
Server write IV:
0000: 46 93 2B D2                                        F.+.
https-jsse-nio-8443-exec-5, WRITE: TLSv1.2 Application Data, length = 84
https-jsse-nio-8443-exec-5, READ: TLSv1.2 Alert, length = 26
https-jsse-nio-8443-exec-5, RECV TLSv1.2 ALERT:  warning, close_notify
https-jsse-nio-8443-exec-5, closeInboundInternal()
https-jsse-nio-8443-exec-5, closeOutboundInternal()
https-jsse-nio-8443-exec-5, SEND TLSv1.2 ALERT:  warning, description = close_notify
https-jsse-nio-8443-exec-5, WRITE: TLSv1.2 Alert, length = 26
https-jsse-nio-8443-exec-5, called closeOutbound()
https-jsse-nio-8443-exec-5, closeOutboundInternal()
https-jsse-nio-8443-exec-6, READ: TLSv1.2 Handshake, length = 134
https-jsse-nio-8443-exec-4, READ: TLSv1.2 Change Cipher Spec, length = 1
https-jsse-nio-8443-exec-4, READ: TLSv1.2 Handshake, length = 40
Using SSLEngineImpl.
*** Finished
verify_data:  { 172, 160, Allow unsafe renegotiation: false
Allow legacy hello messages: true
Is initial handshake: true
Is secure renegotiation: false
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1.1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1.1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1.1
https-jsse-nio-8443-exec-7, READ: TLSv1 Handshake, length = 512
*** ClientHello, TLSv1.2
RandomCookie:  GMT: 847686297 bytes = { 4, 214, 149, 254, 176, 68, 155, 76, 130, 206, 215, 93, 165, 161, 185, 83, 113, 216, 29, 35, 216, 88, 220, 26, 112, 72, 201, 194 }
Session ID:  {92, 125, 15, 252, 19, 214, 68, 173, 215, 94, 242, 244, 106, 89, 60, 143, 196, 61, 45, 39, 102, 192, 180, 151, 1, 59, 107, 169, 236, 99, 108, 99}
Cipher Suites: [Unknown 0x13:0x2, Unknown 0x13:0x3, Unknown 0x13:0x1, Unknown 0x13:0x4, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa9, Unknown 0xc0:0xad, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0xac, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa8, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xc0:0x9d, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9c, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xaa, Unknown 0xc0:0x9f, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9e, TLS_DHE_RSA_WITH_AES_128_CBC_SHA]
Compression Methods:  { 0 }
Unsupported extension status_request, data: 01:00:00:00:00
Extension elliptic_curves, curve names: {secp256r1, secp384r1, secp521r1, unknown curve 29, unknown curve 256, unknown curve 257, unknown curve 258, unknown curve 259, unknown curve 260}
Extension ec_point_formats, formats: [uncompressed]
Extension signature_algorithms, signature_algorithms: SHA256withRSA, Unknown (hash:0x8, signature:0x9), Unknown (hash:0x8, signature:0x4), SHA256withECDSA, Unknown (hash:0x8, signature:0x7), SHA384withRSA, Unknown (hash:0x8, signature:0xa), Unknown (hash:0x8, signature:0x5), SHA384withECDSA, SHA512withRSA, Unknown (hash:0x8, signature:0xb), Unknown (hash:0x8, signature:0x6), SHA512withECDSA, SHA1withRSA, SHA1withECDSA
Unsupported extension type_35, data:
Unsupported extension type_51, data: 00:69:00:17:00:41:04:6b:be:ac:9a:66:1c:57:24:a9:48:e0:05:1b:93:c0:cb:fc:d0:e6:8d:5b:23:46:ea:b9:76:ad:bf:73:0e:54:63:b2:65:f0:5e:0e:62:5a:20:8f:f5:00:05:90:40:32:2b:70:ed:1e:1e:7a:f7:a4:da:4a:f2:f0:44:77:63:31:3c:00:1d:00:20:83:a7:28:99:24:9a:b3:06:24:ae:c9:52:9a:78:85:34:03:e7:21:6a:91:de:6f:6d:0f:9b:4e:ea:e0:6b:37:4b
Unsupported extension type_43, data: 08:03:04:03:03:03:02:03:01
Extension renegotiation_info, renegotiated_connection: <empty>
Extension server_name, server_name: [type=host_name (0), value=localhost]
Unsupported extension type_45, data: 02:01:00
Unsupported extension type_28, data: 40:00
Unsupported extension type_21, data: 00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00
***
https-jsse-nio-8443-exec-2, WRITE: TLSv1.2 Application Data, length = 85
https-jsse-nio-8443-exec-10, WRITE: TLSv1.2 Application Data, length = 84
%% Initialized:  [Session-49, SSL_NULL_WITH_NULL_NULL]
*** ClientKeyExchange, DH
DH Public key:  { 207, 122, 105, 11, 98, 9, 71, 87, 164, 188, 219, 37, 93, 155, 236, 95, 72, 157, 16, 245, 182, 18, 12, 139, 52, 242, 196, 81, 130, 203, 166, 38, 56, 252, 85, 114, 60, 189, 236, 233, 9, 201, 95, 86, 67, 171, 9, 123, 210, 238, 135, 132, 223, 222, 252, 64, 232, 224, 24, 4, 214, 176, 53, 159, 146, 52, 96, 28, 134, 159, 51, 200, 93, 98, 82, 135, 74, 170, 149, 22, 242, 45, 240, 147, 140, 179, 152, 50, 144, 115, 213, 144, 42, 104, 229, 199, 42, 223, 81, 125, 10, 85, 226, 243, 56, 212, 178, 41, 158, 194, 171, 140, 7, 194, 72, 155, 115, 133, 179, 16, 98, 59, 134, 255, 58, 28, 59, 222 }
https-jsse-nio-8443-exec-8, READ: TLSv1.2 Alert, length = 26
https-jsse-nio-8443-exec-8, RECV TLSv1.2 ALERT:  warning, close_notify
https-jsse-nio-8443-exec-8, closeInboundInternal()
https-jsse-nio-8443-exec-8, closeOutboundInternal()
https-jsse-nio-8443-exec-8, SEND TLSv1.2 ALERT:  warning, description = close_notify
https-jsse-nio-8443-exec-8, WRITE: TLSv1.2 Alert, length = 26
https-jsse-nio-8443-exec-8, called closeOutbound()
https-jsse-nio-8443-exec-8, closeOutboundInternal()
59, 207, 125, 140, 195, 206, 222, 67, 124, 23 }
***
https-jsse-nio-8443-exec-4, WRITE: TLSv1.2 Change Cipher Spec, length = 1
*** Finished
verify_data:  { 230, 176, 147, 102, 141, 38, 151, 183, 228, 237, 229, 164 }
***
{92, 125, 15, 252, 19, 214, 68, 173, 215, 94, 242, 244, 106, 89, 60, 143, 196, 61, 45, 39, 102, 192, 180, 151, 1, 59, 107, 169, 236, 99, 108, 99}
https-jsse-nio-8443-exec-4, WRITE: TLSv1.2 Handshake, length = 40
Standard ciphersuite chosen: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
SESSION KEYGEN:
PreMaster Secret:
https-jsse-nio-8443-exec-1, READ: TLSv1.2 Alert, length = 26
%% Cached server session: [Session-46, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384]
%% Negotiating:  [Session-49, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384]
https-jsse-nio-8443-exec-1, RECV TLSv1.2 ALERT:  warning, close_notify
https-jsse-nio-8443-exec-1, closeInboundInternal()
https-jsse-nio-8443-exec-1, closeOutboundInternal()
*** ServerHello, TLSv1.2
RandomCookie:  GMT: 1551699708 bytes = { 0, 75, 157, 93, 79, 167, 119, 255, 19, 186, 32, 122, 163, 232, 167, 128, 235, 92, 22, 223, 101, 150, 248, 135, 154, 81, 124, 73 }
Session ID:  {92, 125, 15, 252, 253, 51, 152, 0, 104, 161, 63, 9, 70, 98, 196, 252, 42, 141, 176, 24, 10, 171, 244, 105, 60, 139, 248, 0, 175, 70, 119, 188}
Cipher Suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
Compression Method: 0
Extension renegotiation_info, renegotiated_connection: <empty>
***
Cipher suite:  TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
*** Certificate chain
chain [0] = [
[
  Version: V3
  Subject: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US
  Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5

  Key:  Sun RSA public key, 2048 bits
  modulus: 21944740401167172627731583459321030363948627215746053925732477915060915436180167456469785746662093119306577380200747716284652995937004530444336851845029170241627465854006145050037178991946925696078563485570896673835545540824265905937881682387179314987285174428010940266412458943894800978345731524307952507729956745301047871771953945124256516782917326981125087548987889540650149121302888872237484100834740328828765018090383963294418357028839734723410564800765871733483849269364796949055153420777966213779145518299141217288017794394762274753999989298548507425930217302947589819396239489846633419099079578249651345685751
  public exponent: 65537
  Validity: [From: Fri May 30 08:43:19 GMT 2014,
               To: Mon May 27 08:43:19 GMT 2024]
  Issuer: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US
  SerialNumber: [    a6ef7a9a 5368eb27]

Certificate Extensions: 3
[1]: ObjectId: 2.5.29.35 Criticality=false
AuthorityKeyIdentifier [
KeyIdentifier [
0000: 78 0D 96 9D FE D3 0B BE   8C C7 E3 EC 67 04 AB 4B  x...........g..K
0010: EA E0 00 29                                        ...)
]
]

[2]: ObjectId: 2.5.29.19 Criticality=false
BasicConstraints:[
  CA:true
  PathLen:2147483647
]

[3]: ObjectId: 2.5.29.14 Criticality=false
SubjectKeyIdentifier [
KeyIdentifier [
0000: 78 0D 96 9D FE D3 0B BE   8C C7 E3 EC 67 04 AB 4B  x...........g..K
0010: EA E0 00 29                                        ...)
]
]

]
  Algorithm: [SHA1withRSA]
  Signature:
0000: 19 16 5A 21 99 21 24 98   3C 0A E8 D8 00 AB 44 24  ..Z!.!$.<.....D$
0010: F2 0C B7 83 D5 9F 96 17   87 E2 1F 1D A3 47 68 C7  .............Gh.
0020: 68 4A CB 56 0E 77 2B E8   1A 9F E7 09 A1 19 77 D0  hJ.V.w+.......w.
0030: 5E CC C1 B3 9A C4 35 3D   CB E0 A5 A6 43 5D A3 26  ^.....5=....C].&
0040: A4 91 8A C1 FA 7B 10 EA   DC C3 C7 1C 47 DC 97 32  ............G..2
0050: C0 37 80 1C F1 42 10 E3   74 17 FA 3E 60 4A B7 59  .7...B..t..>`J.Y
0060: 92 C1 E0 6F BB F1 BB 9F   82 89 B5 83 D5 AE 1E 90  ...o............
0070: 0A 89 8D FB 4C C0 C5 9E   DC C5 8C C6 2F EE D9 B4  ....L......./...
0080: 95 47 27 2E BE 82 31 6F   76 C0 DB 4C C8 0D 3B 7B  .G'...1ov..L..;.
0090: D1 6A BF BD 3B 93 30 04   A2 9E 81 F7 96 28 77 F2  .j..;.0......(w.
00A0: 32 05 68 44 1F B3 30 CE   40 9F 20 F3 B4 2B AA E6  2.hD..0.@. ..+..
00B0: 40 9B FB 7F 34 6E 3A 99   FD F8 28 F1 8C 9B 56 34  @...4n:...(...V4
00C0: 64 AD 4D 56 39 CB 96 18   50 9B 99 43 80 0A 39 A5  d.MV9...P..C..9.
00D0: 13 7A 6E C5 25 E0 95 4A   92 E5 A8 8B EE 03 49 B4  .zn.%..J......I.
00E0: D9 7C 00 E3 F0 3B A7 BA   40 30 CC 89 55 C6 97 93  .....;..@0..U...
00F0: B5 15 F6 62 D3 B1 74 9C   0B 80 2B 8A D4 03 84 A0  ...b..t...+.....

]
***
Cipher Suites: [Unknown 0x13:0x2, Unknown 0x13:0x3, Unknown 0x13:0x1, Unknown 0x13:0x4, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa9, Unknown 0xc0:0xad, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0xac, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa8, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xc0:0x9d, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9c, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xaa, Unknown 0xc0:0x9f, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9e, TLS_DHE_RSA_WITH_AES_128_CBC_SHA]
Compression Methods:  { 0 }
https-jsse-nio-8443-exec-10, WRITE: TLSv1.2 Application Data, length = 85
Using SSLEngineImpl.
Allow unsafe renegotiation: false
Allow legacy hello messages: true
Is initial handshake: true
Is secure renegotiation: false
https-jsse-nio-8443-exec-1, SEND TLSv1.2 ALERT:  warning, description = close_notify
0000: 98 4B 74 E0 40 F0 5B 2B   89 07 33 73 97 43 61 0D  .Kt.@.[+..3s.Ca.
0010: 0B 73 E0 B5 8F FE 1A AB   7C 88 EB 02 B6 B6 BE 1D  .s..............
0020: B1 0F 44 B3 26 FC 6C C4   E4 B8 4B 9C 88 AB 67 3D  ..D.&.l...K...g=
0030: 05 9D 21 1B 50 72 03 D6   38 B2 EA B9 6F 2B 9F E0  ..!.Pr..8...o+..
0040: F0 DA F3 7A 3B FA ED F1   19 08 13 E5 C4 C3 84 49  ...z;..........I
0050: 5C 1F 49 E2 E8 B8 E4 D9   75 44 4B DA A9 70 C9 B6  \.I.....uDK..p..
0060: 53 68 4A A3 18 C4 61 43   BF F4 54 7D 9A FF 63 C9  ShJ...aC..T...c.
0070: 83 F7 DE FC BD 12 F4 3B   79 2D 3B 98 64 07 76 61  .......;y-;.d.va
CONNECTION KEYGEN:
Client Nonce:
0000: 2A B5 30 C0 98 A5 9C 3F   90 05 DD 93 9C 21 C7 71  *.0....?.....!.q
0010: 9A 4B 1A CF 6E 22 61 0F   31 B8 71 B2 EF ED 56 19  .K..n"a.1.q...V.
Server Nonce:
0000: 5C 7D 0F FC 24 20 1C 85   D3 61 57 DD B7 D8 F4 C9  \...$ ...aW.....
0010: 23 3D 62 10 64 84 DD 89   BF 21 71 D7 11 3B 18 C9  #=b.d....!q..;..
Master Secret:
0000: AA A7 CD 95 30 4A 0B D9   E4 52 D4 95 AF DC 17 50  ....0J...R.....P
0010: 7A 88 F5 E1 13 BB E6 09   53 97 B4 3C E3 72 32 76  z.......S..<.r2v
0020: 08 F4 90 5D 38 2C 0E 8D   4C 3B 3E 77 79 75 10 0A  ...]8,..L;>wyu..
... no MAC keys used for this cipher
Client write key:
0000: BF B0 2A 49 32 2E 10 EC   15 24 0D 3B 35 BE 91 2E  ..*I2....$.;5...
0010: 1D 5C 2B BE 6A 8F 0C 6F   C6 B9 B8 0A A4 48 0F AD  .\+.j..o.....H..
Server write key:
0000: BE 82 C2 13 E8 72 2E E1   2F F4 0C 8C 95 6F 83 78  .....r../....o.x
0010: 92 2E 22 99 6E 61 9A D4   69 4D 75 C6 06 6A FD 58  ..".na..iMu..j.X
Client write IV:
0000: 3C 1E C2 B2                                        <...
Server write IV:
0000: F4 D2 C1 96                                        ....
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1.1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1.1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1.1
https-jsse-nio-8443-exec-2, READ: TLSv1 Handshake, length = 512
*** ClientHello, TLSv1.2
RandomCookie:  GMT: -1434817756 bytes = { 222, *** Diffie-Hellman ServerKeyExchange
DH Modulus:  { 255, 255, 255, 255, 255, 255, 255, 255, 201, 15, 218, 162, 33, 104, 194, 52, 196, 198, 98, 139, 128, 220, 28, 209, 41, 2, 78, 8, 138, 103, 204, 116, 2, 11, 190, 166, 59, 19, 155, 34, 81, 74, 8, 121, 142, 52, 4, 221, 239, 149, 25, 179, 205, 58, 67, 27, 48, 43, 10, 109, 242, 95, 20, 55, 79, 225, 53, 109, 109, 81, 194, 69, 228, 133, 181, 118, 98, 94, 126, 198, 244, 76, 66, 233, 166, 55, 237, 107, 11, 255, 92, 182, 244, 6, 183, 237, 238, 56, 107, 251, 90, 137, 159, 165, 174, 159, 36, 17, 124, 75, 31, 230, 73, 40, 102, 81, 236, 230, 83, 129, 255, 255, 255, 255, 255, 255, 255, 255 }
DH Base:  { 2 }
Server DH Public Key:  { 97, 36, 84, 123, 121, 238, 179, 205, 222, 130, 96, 190, 130, 27, 116, 121, 147, 79, 243, 169, 216, 196, 173, 13, 74, 135, 219, 181, 146, 243, 137, 155, 134, 25, 91, 153, 178, 10, 100, 118, 166, 4, 83, 50, 247, 244, 214, 146, 32, 71, 133, 103, 90, 196, 6, 227, 195, 129, 112, 25, 54, 206, 150, 170, 102, 122, 190, 193, 37, 29, 119, 129, 205, 172, 206, 123, 217, 224, 131, 12, 86, 122, 135, 224, 247, 118, 30, 44, 22, 185, 188, 205, 219, 198, 162, 255, 20, 111, 251, 255, 222, 18, 68, 34, 186, 187, 135, 171, 224, 171, 163, 3, 74, 74, 239, 144, 71, 130, 144, 3, 1, 200, 24, 87, 83, 59, 247, 255 }
Signature Algorithm SHA256withRSA
Signed with a DSA or RSA public key
*** ServerHelloDone
https-jsse-nio-8443-exec-7, WRITE: TLSv1.2 Handshake, length = 1697
Unsupported extension status_request, data: 01:00:00:00:00
Extension elliptic_curves, curve names: {secp256r1, secp384r1, secp521r1, unknown curve 29, unknown curve 256, unknown curve 257, unknown curve 258, unknown curve 259, unknown curve 260}
Extension ec_point_formats, formats: [uncompressed]
Extension signature_algorithms, signature_algorithms: SHA256withRSA, Unknown (hash:0x8, signature:0x9), Unknown (hash:0x8, signature:0x4), SHA256withECDSA, Unknown (hash:0x8, signature:0x7), SHA384withRSA, Unknown (hash:0x8, signature:0xa), Unknown (hash:0x8, signature:0x5), SHA384withECDSA, SHA512withRSA, Unknown (hash:0x8, signature:0xb), Unknown (hash:0x8, signature:0x6), SHA512withECDSA, SHA1withRSA, SHA1withECDSA
Unsupported extension type_35, data:
Unsupported extension type_51, data: 00:69:00:17:00:41:04:f3:f1:fa:8c:d8:db:54:f0:ce:0b:94:f5:03:f9:a5:94:81:41:f7:ad:bf:dd:bb:3c:6c:97:57:85:6f:5e:42:ee:5d:a5:9b:a5:39:cb:2a:e8:45:7f:96:cc:f2:fa:76:b2:9d:3d:36:62:2a:76:94:6d:9f:df:9a:b5:f8:b3:49:f5:00:1d:00:20:56:41:a3:f4:a0:0f:2e:2d:63:79:ff:8b:a7:87:76:a0:2f:68:fb:f6:8f:54:a8:67:c5:50:77:d3:47:7a:f7:30
Unsupported extension type_43, data: 08:03:04:03:03:03:02:03:01
Extension renegotiation_info, renegotiated_connection: <empty>
Extension server_name, server_name: [type=host_name (0), value=localhost]
Unsupported extension type_45, data: 02:01:00
Unsupported extension type_28, data: 40:00
Unsupported extension type_21, data: 00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00
***
%% Initialized:  [Session-50, SSL_NULL_WITH_NULL_NULL]
Standard ciphersuite chosen: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
%% Negotiating:  [Session-50, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384]
*** ServerHello, TLSv1.2
RandomCookie:  GMT: 1551699709 bytes = { 18, 88, 171, 251, 100, 242, 33, 84, 66, 22, 218, 54, 217, 56, 148, 138, 93, 215, 79, 37, 196, 75, 38, 4, 202, 218, 105, 49 }
Session ID:  {92, 125, 15, 253, 224, 128, 197, 188, 177, 250, 115, 207, 150, 244, 22, 145, 238, 62, 23, 97, 97, 77, 240, 160, 72, 36, 39, 200, 168, 156, 77, 18}
Cipher Suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
Compression Method: 0
Extension renegotiation_info, renegotiated_connection: <empty>
***
Cipher suite:  TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
*** Certificate chain
https-jsse-nio-8443-exec-8, READ: TLSv1.2 Handshake, length = 134
*** ClientKeyExchange, DH
DH Public key:  { 101, 50, 236, 168, 1, 251, 117, 64, 161, 70, 96, 91, 71, 214, 229, 182, 176, 128, 225, 114, 39, 35, 174, 231, 6, 141, 41, 147, 48, 95, 88, 24, 30, 22, 29, 212, 117, 54, 85, 108, 148, 37, 92, 185, 98, 174, 57, 49, 7, 170, 191, 67, 175, 224, 88, 228, 202, 217, 193, 68, 56, 126, 140, 192, 245, 199, 30, 226, 97, 182, 94, 163, 47, 15, 83, 229, 250, 73, 228, 55, 241, 245, 228, 175, 227, 187, 69, 33, 97, 97, 174, 246, 203, 156, 78, 17, 103, 20, 31, 242, 211, 25, 171, 175, 139, 192, 111, 116, 85, 152, 20, 39, 52, 128, 127, 1, 158, 242, 106, 66, 136, 143, 36, 191, 252, 195, 181, 157 }
225https-jsse-nio-8443-exec-6, READ: TLSv1.2 Change Cipher Spec, length = 1
https-jsse-nio-8443-exec-6, READ: TLSv1.2 Handshake, length = 40
*** Finished
verify_data:  { 235, 241, 227, 179, 69, 167, 199, 182, 178, 79, 103, 182 }
***
https-jsse-nio-8443-exec-6, WRITE: TLSv1.2 Change Cipher Spec, length = 1
*** Finished
verify_data:  { 225, 253, 44, 1, 77, 181, 54, 34, 189, 187, 185, 84 }
***
https-jsse-nio-8443-exec-10, READ: TLSv1.2 Alert, length = 26
https-jsse-nio-8443-exec-10, RECV TLSv1.2 ALERT:  warning, close_notify
https-jsse-nio-8443-exec-10, closeInboundInternal()
https-jsse-nio-8443-exec-10, closeOutboundInternal()
https-jsse-nio-8443-exec-10, SEND TLSv1.2 ALERT:  warning, description = close_notify
https-jsse-nio-8443-exec-6, WRITE: TLSv1.2 Handshake, length = 40
https-jsse-nio-8443-exec-10, WRITE: TLSv1.2 Alert, length = 26
%% Cached server session: [Session-48, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384]
https-jsse-nio-8443-exec-1, WRITE: TLSv1.2 Alert, length = 26
https-jsse-nio-8443-exec-10, called closeOutbound()
https-jsse-nio-8443-exec-10, closeOutboundInternal()
https-jsse-nio-8443-exec-1, called closeOutbound()
https-jsse-nio-8443-exec-1, closeOutboundInternal()
, 154, 97, 115, 125, 69, 47, 39, 74, 130, 132, 235, 15, 214, 244, 142, 19, 173, 251, 111, 102, 196, 55, 244, 249, 145, 202 }
Session ID:  SESSION KEYGEN:
PreMaster Secret:
0000: FA 37 87 D1 5D A2 B9 07   41 E5 22 7C 53 5E 18 BF  .7..]...A.".S^..
0010: 14 1E 66 12 1B AA 55 03   E8 89 D7 D0 D9 06 CA B9  ..f...U.........
0020: A1 FA 13 BD CE 14 B5 CB   7C D2 B5 DF D0 1E EE FE  ................
0030: 47 30 73 D6 A0 B2 14 C3   B3 0B 96 2E 19 B5 98 21  G0s............!
0040: CB 0A C0 5E 6C 95 5C 25   A1 C1 FB 78 8C D8 24 75  ...^l.\%...x..$u
0050: 27 1C CB C3 A4 9F 41 F4   58 DC 0B B0 4D E6 42 21  '.....A.X...M.B!
0060: 2D 8D A2 41 51 2E C6 A1   E2 6B C6 5B D2 C1 1D 5D  -..AQ....k.[...]
0070: 35 74 48 04 88 EA 3C 38   8C C4 F4 E4 B3 DE 4A F5  5tH...<8......J.
CONNECTION KEYGEN:
Client Nonce:
0000: 33 87 AB 99 04 D6 95 FE   B0 44 9B 4C 82 CE D7 5D  3........D.L...]
0010: A5 A1 B9 53 71 D8 1D 23   D8 58 DC 1A 70 48 C9 C2  ...Sq..#.X..pH..
Server Nonce:
0000: 5C 7D 0F FC 00 4B 9D 5D   4F A7 77 FF 13 BA 20 7A  \....K.]O.w... z
0010: A3 E8 A7 80 EB 5C 16 DF   65 96 F8 87 9A 51 7C 49  .....\..e....Q.I
Master Secret:
0000: E2 1A DA 76 1E 1C 29 F3   C6 6C 35 30 B5 71 69 1E  ...v..)..l50.qi.
0010: 99 8B 65 4E 9B 85 2D C5   6D 6D DF F6 CB CE 0A C5  ..eN..-.mm......
0020: 32 71 8B 60 49 E0 18 FF   94 35 8C 8D BB 69 72 B0  2q.`I....5...ir.
... no MAC keys used for this cipher
Client write key:
0000: F3 FD F7 7D A8 54 69 E5   E9 9C 0E 77 AF 17 CF 3B  .....Ti....w...;
0010: 9C 41 A0 2B 3A FE FC 80   FF E7 2E F0 4E D1 6E B5  .A.+:.......N.n.
Server write key:
0000: 1E C2 68 75 82 20 08 36   DF 95 7B B2 3A B3 88 CF  ..hu. .6....:...
0010: C5 73 48 0C 50 61 B3 A5   A1 B4 73 57 DD 67 ED 20  .sH.Pa....sW.g.
Client write IV:
0000: 09 57 C6 0E                                        .W..
Server write IV:
0000: 87 49 96 4F                                        .I.O
chain [0] = [
[
  Version: V3
  Subject: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US
  Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5

  Key:  Sun RSA public key, 2048 bits
  modulus: 21944740401167172627731583459321030363948627215746053925732477915060915436180167456469785746662093119306577380200747716284652995937004530444336851845029170241627465854006145050037178991946925696078563485570896673835545540824265905937881682387179314987285174428010940266412458943894800978345731524307952507729956745301047871771953945124256516782917326981125087548987889540650149121302888872237484100834740328828765018090383963294418357028839734723410564800765871733483849269364796949055153420777966213779145518299141217288017794394762274753999989298548507425930217302947589819396239489846633419099079578249651345685751
  public exponent: 65537
  Validity: [From: Fri May 30 08:43:19 GMT 2014,
               To: Mon May 27 08:43:19 GMT 2024]
  Issuer: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US
  SerialNumber: [    a6ef7a9a 5368eb27]

Certificate Extensions: 3
[1]: ObjectId: 2.5.29.35 Criticality=false
AuthorityKeyIdentifier [
KeyIdentifier [
0000: 78 0D 96 9D FE D3 0B BE   8C C7 E3 EC 67 04 AB 4B  x...........g..K
0010: EA E0 00 29                                        ...)
]
]

[2]: ObjectId: 2.5.29.19 Criticality=false
BasicConstraints:[
  CA:true
  PathLen:2147483647
]

[3]: ObjectId: 2.5.29.14 Criticality=false
SubjectKeyIdentifier [
KeyIdentifier [
0000: 78 0D 96 9D FE D3 0B BE   8C C7 E3 EC 67 04 AB 4B  x...........g..K
0010: EA E0 00 29                                        ...)
]
]

]
  Algorithm: [SHA1withRSA]
  Signature:
0000: 19 16 5A 21 99 21 24 98   3C 0A E8 D8 00 AB 44 24  ..Z!.!$.<.....D$
0010: F2 0C B7 83 D5 9F 96 17   87 E2 1F 1D A3 47 68 C7  .............Gh.
0020: 68 4A CB 56 0E 77 2B E8   1A 9F E7 09 A1 19 77 D0  hJ.V.w+.......w.
0030: 5E CC C1 B3 9A C4 35 3D   CB E0 A5 A6 43 5D A3 26  ^.....5=....C].&
0040: A4 91 8A C1 FA 7B 10 EA   DC C3 C7 1C 47 DC 97 32  ............G..2
0050: C0 37 80 1C F1 42 10 E3   74 17 FA 3E 60 4A B7 59  .7...B..t..>`J.Y
0060: 92 C1 E0 6F BB F1 BB 9F   82 89 B5 83 D5 AE 1E 90  ...o............
0070: 0A 89 8D FB 4C C0 C5 9E   DC C5 8C C6 2F EE D9 B4  ....L......./...
0080: 95 47 27 2E BE 82 31 6F   76 C0 DB 4C C8 0D 3B 7B  .G'...1ov..L..;.
0090: D1 6A BF BD 3B 93 30 04   A2 9E 81 F7 96 28 77 F2  .j..;.0......(w.
00A0: 32 05 68 44 1F B3 30 CE   40 9F 20 F3 B4 2B AA E6  2.hD..0.@. ..+..
00B0: 40 9B FB 7F 34 6E 3A 99   FD F8 28 F1 8C 9B 56 34  @...4n:...(...V4
00C0: 64 AD 4D 56 39 CB 96 18   50 9B 99 43 80 0A 39 A5  d.MV9...P..C..9.
00D0: 13 7A 6E C5 25 E0 95 4A   92 E5 A8 8B EE 03 49 B4  .zn.%..J......I.
00E0: D9 7C 00 E3 F0 3B A7 BA   40 30 CC 89 55 C6 97 93  .....;..@0..U...
00F0: B5 15 F6 62 D3 B1 74 9C   0B 80 2B 8A D4 03 84 A0  ...b..t...+.....

]
***
https-jsse-nio-8443-exec-8, READ: TLSv1.2 Change Cipher Spec, length = 1
https-jsse-nio-8443-exec-8, READ: TLSv1.2 Handshake, length = 40
*** Finished
verify_data:  { 10, 53, 247, 166, 142, 77, 31, 81, 166, 159, 56, 211 }
***
https-jsse-nio-8443-exec-8, WRITE: TLSv1.2 Change Cipher Spec, length = 1
*** Finished
verify_data:  { 198, 142, 179, 40, 86, 48, 71, 116, 207, 72, 152, 246 }
***
https-jsse-nio-8443-exec-5, WRITE: TLSv1.2 Application Data, length = 85
{92, 125, 15, 252, 183, 75, 178, 236, 226, 204, 161, 47, 115, 81, 131, 38, 245, 192, 251, 58, 104, 31, 211, 99, 47, 3, 254, 150, 238, 150, 255, 17}
Cipher Suites: [Unknown 0x13:0x2, Unknown 0x13:0x3, Unknown 0x13:0x1, Unknown 0x13:0x4, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa9, Unknown 0xc0:0xad, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0xac, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa8, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xc0:0x9d, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9c, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xaa, Unknown 0xc0:0x9f, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9e, TLS_DHE_RSA_WITH_AES_128_CBC_SHA]
Compression Methods:  { 0 }
Unsupported extension status_request, data: 01:00:00:00:00
Extension elliptic_curves, curve names: {secp256r1, secp384r1, secp521r1, unknown curve 29, unknown curve 256, unknown curve 257, unknown curve 258, unknown curve 259, unknown curve 260}
Extension ec_point_formats, formats: [uncompressed]
Extension signature_algorithms, signature_algorithms: SHA256withRSA, Unknown (hash:0x8, signature:0x9), Unknown (hash:0x8, signature:0x4), SHA256withECDSA, Unknown (hash:0x8, signature:0x7), SHA384withRSA, Unknown (hash:0x8, signature:0xa), Unknown (hash:0x8, signature:0x5), SHA384withECDSA, SHA512withRSA, Unknown (hash:0x8, signature:0xb), Unknown (hash:0x8, signature:0x6), SHA512withECDSA, SHA1withRSA, SHA1withECDSA
Unsupported extension type_35, data:
Unsupported extension type_51, data: 00:69:00:17:00:41:04:5a:81:b4:bf:01:3e:d3:6e:82:f3:32:3d:23:cb:21:0c:7a:9d:f5:9c:a3:ef:eb:03:34:d0:b9:8b:92:74:61:b1:6f:02:e1:2f:33:d7:79:8a:ff:84:c0:b1:d8:1f:ae:6c:a1:5d:13:13:61:a5:a0:a5:af:1e:25:ac:94:6a:64:56:00:1d:00:20:66:f0:b7:e5:f3:ad:54:9e:b0:be:7f:da:72:ca:e8:6f:ae:fe:21:e4:07:2a:48:f5:ec:f3:b6:9b:b4:44:26:08
Unsupported extension type_43, data: 08:03:04:03:03:03:02:03:01
Extension renegotiation_info, renegotiated_connection: <empty>
Extension server_name, server_name: [type=host_name (0), value=localhost]
Unsupported extension type_45, data: 02:01:00
Unsupported extension type_28, data: 40:00
Unsupported extension type_21, data: 00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00
***
*** Diffie-Hellman ServerKeyExchange
DH Modulus:  { 255, 255, 255, 255, 255, 255, 255, 255, 201, 15, 218, 162, 33, 104, 194, 52, 196, 198, 98, 139, 128, 220, 28, 209, 41, 2, 78, 8, 138, 103, 204, 116, 2, 11, 190, 166, 59, 19, 155, 34, 81, 74, 8, 121, 142https-jsse-nio-8443-exec-8, WRITE: TLSv1.2 Handshake, length = 40
, 52, 4, 221https-jsse-nio-8443-exec-9, READ: TLSv1.2 Alert, length = 26
, 239, 149, 25, 179, 205, 58, 67, 27, 48, 43, 10, 109, 242, 95, 20, 55, 79, 225, 53, 109, 109, 81, 194, 69, 228, 133, https-jsse-nio-8443-exec-9, RECV TLSv1.2 ALERT:  warning, close_notify
181, https-jsse-nio-8443-exec-9, closeInboundInternal()
118, https-jsse-nio-8443-exec-9, closeOutboundInternal()
98, 94, 126, 198, 244, 76, 66, 233, 166, 55, 237, 107https-jsse-nio-8443-exec-9, SEND TLSv1.2 ALERT:  warning, description = close_notify
, 11, 255, 92, 182, 244, 6, 183, 237, 238, 56, https-jsse-nio-8443-exec-9, WRITE: TLSv1.2 Alert, length = 26
107, 251, 90, 137, 159, 165, 174, 159, 36, 17, 124, 75, 31, 230, 73, 40, 102, 81, 236, 230, 83, 129, 255, 255, 255, 255, 255, 255, 255, 255 }
%% Initialized:  [Session-51, SSL_NULL_WITH_NULL_NULL]
DH Base:  { 2 }
Server DH Public Key:  { 212, 187, 90, 201, 59, 246, 179, 172, 157, 160, 233%% Cached server session: [Session-49, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384]
https-jsse-nio-8443-exec-9, called closeOutbound()
https-jsse-nio-8443-exec-9, closeOutboundInternal()
, 36, 72, 30, 143, 242, 54, 202, 167, 169, 206, 61, 162, 163, 112, 4, 130, 245, 251, 249, 185, 50, 168, 158, 117, 23, 147, 150, 31, 190, 71, 154, 54, 190, 124, 20, 67, 220, 51, 29, 197, 194, 80, 93, 228, 24, 155, 138, 102, 254, 169, 238, 0, 134, 31, 177, 151, 202, 134, 210, 89, 106, 65, 123, 174, 6, 251, 141, 12, 243, 94, 203, 61, 113, 240, 185, 242, 73, 46, 220, 50, 159, 75, 14, 191, 142, 155, 245, 117, 58, 150, 151, 226, 114, 211, 14, 252, 111, 92, 167, 97, 217, 110, 204, 27, 184, 9, 118, 112, 106, 192, 125, 78, 253, 38, 186, 163, 86 }
Signature Algorithm SHA256withRSA
Signed with a DSA or RSA public key
*** ServerHelloDone
https-jsse-nio-8443-exec-3, WRITE: TLSv1.2 Handshake, length = 1697
Standard ciphersuite chosen: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
%% Negotiating:  [Session-51, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384]
*** ServerHello, TLSv1.2
RandomCookie:  GMT: 1551699709 bytes = { 161, 118, 159, 159, 72, 213, 176, 227, 174, 253, 219, 28, 30, 221, 139, 23, 73, 124, 148, 24, 52, 181, 71, 92, 132, 200, 34, 17 }
Session ID:  {92, 125, 15, 253, 71, 52, 55, 19, 191, 150, 68, 149, 56, 88, 7, 49, 158, 192, 182, 26, 156, 32, 177, 105, 111, 27, 122, 57, 7, 87, 54, 247}
Cipher Suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
Compression Method: 0
Extension renegotiation_info, renegotiated_connection: <empty>
***
Cipher suite:  TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
*** Certificate chain
chain [0] = [
[
  Version: V3
  Subject: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US
  Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5

  Key:  Sun RSA public key, 2048 bits
  modulus: 21944740401167172627731583459321030363948627215746053925732477915060915436180167456469785746662093119306577380200747716284652995937004530444336851845029170241627465854006145050037178991946925696078563485570896673835545540824265905937881682387179314987285174428010940266412458943894800978345731524307952507729956745301047871771953945124256516782917326981125087548987889540650149121302888872237484100834740328828765018090383963294418357028839734723410564800765871733483849269364796949055153420777966213779145518299141217288017794394762274753999989298548507425930217302947589819396239489846633419099079578249651345685751
  public exponent: 65537
  Validity: [From: Fri May 30 08:43:19 GMT 2014,
               To: Mon May 27 08:43:19 GMT 2024]
  Issuer: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US
  SerialNumber: [    a6ef7a9a 5368eb27]

Certificate Extensions: 3
[1]: ObjectId: 2.5.29.35 Criticality=false
AuthorityKeyIdentifier [
KeyIdentifier [
0000: 78 0D 96 9D FE D3 0B BE   8C C7 E3 EC 67 04 AB 4B  x...........g..K
0010: EA E0 00 29                                        ...)
]
]

[2]: ObjectId: 2.5.29.19 Criticality=false
BasicConstraints:[
  CA:true
  PathLen:2147483647
]

[3]: ObjectId: 2.5.29.14 Criticality=false
SubjectKeyIdentifier [
KeyIdentifier [
0000: 78 0D 96 9D FE D3 0B BE   8C C7 E3 EC 67 04 AB 4B  x...........g..K
0010: EA E0 00 29                                        ...)
]
]

]
  Algorithm: [SHA1withRSA]
  Signature:
0000: 19 16 5A 21 99 21 24 98   3C 0A E8 D8 00 AB 44 24  ..Z!.!$.<.....D$
0010: F2 0C B7 83 D5 9F 96 17   87 E2 1F 1D A3 47 68 C7  .............Gh.
0020: 68 4A CB 56 0E 77 2B E8   1A 9F E7 09 A1 19 77 D0  hJ.V.w+.......w.
0030: 5E CC C1 B3 9A C4 35 3D   CB E0 A5 A6 43 5D A3 26  ^.....5=....C].&
0040: A4 91 8A C1 FA 7B 10 EA   DC C3 C7 1C 47 DC 97 32  ............G..2
0050: C0 37 80 1C F1 42 10 E3   74 17 FA 3E 60 4A B7 59  .7...B..t..>`J.Y
0060: 92 C1 E0 6F BB F1 BB 9F   82 89 B5 83 D5 AE 1E 90  ...o............
0070: 0A 89 8D FB 4C C0 C5 9E   DC C5 8C C6 2F EE D9 B4  ....L......./...
0080: 95 47 27 2E BE 82 31 6F   76 C0 DB 4C C8 0D 3B 7B  .G'...1ov..L..;.
0090: D1 6A BF BD 3B 93 30 04   A2 9E 81 F7 96 28 77 F2  .j..;.0......(w.
00A0: 32 05 68 44 1F B3 30 CE   40 9F 20 F3 B4 2B AA E6  2.hD..0.@. ..+..
00B0: 40 9B FB 7F 34 6E 3A 99   FD F8 28 F1 8C 9B 56 34  @...4n:...(...V4
00C0: 64 AD 4D 56 39 CB 96 18   50 9B 99 43 80 0A 39 A5  d.MV9...P..C..9.
00D0: 13 7A 6E C5 25 E0 95 4A   92 E5 A8 8B EE 03 49 B4  .zn.%..J......I.
00E0: D9 7C 00 E3 F0 3B A7 BA   40 30 CC 89 55 C6 97 93  .....;..@0..U...
00F0: B5 15 F6 62 D3 B1 74 9C   0B 80 2B 8A D4 03 84 A0  ...b..t...+.....

]
***
https-jsse-nio-8443-exec-7, WRITE: TLSv1.2 Application Data, length = 85
Using SSLEngineImpl.
https-jsse-nio-8443-exec-1, READ: TLSv1.2 Handshake, length = 134
*** ClientKeyExchange, DH
DH Public key:  { 101, 170, 38, 209, 198, 232, 93, 161, 22, 237, 112, 129, 195, 85, 33, 231, 30, 31, 245, 172, 251, 102, 211, 41, 26, 17, 100, 41, 167, 188, 77, 236, 161, 216, 242, 44, 88, 237, 169, 232, 72, 38, 33, 229, 60, 128, 239, 232, 137, 41, 208, 15, 89, 141, 97, 227, 112, 162, 180, 242, 5, 30, 84, 82, 67, 118, 34, 213, 233, 27, 254, 161, 20, 4, 209, 152, 158, 203, 96, 238, 104, 180, 45, 100, 57, 48, 199, 212, 168, 199, 82, 130, 199, 78, 212, 3, 71, 138, 136, 176, 62, 175, 116, 95, 83, 81, 136, 38, 183, 76, 139, 39, 127, 42, 72, 60, 34, 231, 182, 209, 129, 134, 219, 54, 244, 6, 101, 64 }
SESSION KEYGEN:
PreMaster Secret:
0000: EB 78 D0 54 B5 1D 95 4C   BC 07 1E B2 A1 B6 F5 1B  .x.T...L........
0010: 78 59 F7 E4 BF 15 04 7C   FE 8F 45 16 76 1C F2 60  xY........E.v..`
0020: C6 EF C2 79 26 5E 8F DF   F1 DC 6B 9C 91 6B AC AF  ...y&^....k..k..
0030: 57 26 DC 4E 14 85 98 1E   E7 E0 2A 2E 07 41 B0 B4  W&.N......*..A..
0040*** Diffie-Hellman ServerKeyExchange
DH Modulus:  { 255, 255, 255, 255, 255, 255, 255, 255, 201, 15, 218, 162, 33, 104, 194, 52, 196, 198, 98, 139, 128: 81 51 70 A5 02 94 58 35   2C 08 89 BB 49 97 DB C2  .Qp...X5,...I...
0050: 93 5C EE FA 8A 12 60 C4   E8 95 93 1B 16 D4 CF F4  .\....`.........
0060: F9 40 44 61 61 D4 3A 5E   7C 6A CE A8 37 9D 49 FD  .@Daa.:^.j..7.I.
0070: DC C2 52 E5 F1 5D 84 2E   E1 8B C3 0A B6 9C E9 A0  ..R..]..........
https-jsse-nio-8443-exec-5, READ: TLSv1.2 Alert, length = 26
Allow unsafe renegotiation: false
Allow legacy hello messages: true
Is initial handshake: true
Is secure renegotiation: false
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1
, 220, 28, 209, 41, 2, 78, 8, 138, 103, 204, 116, 2, 11, 190, 166, 59, 19, 155, 34, 81, 74, 8, 121, 142, 52, 4, 221, 239, 149, 25, 179, 205, 58, 67, 27, 48, 43, 10, 109, 242, 95, 20, 55, 79, 225, 53, 109, 109, 81, 194, 69, 228, 133, 181, 118, 98, 94, 126, 198, 244, 76, 66, 233, 166, 55, 237, 107, 11, 255, 92, 182, 244, 6, 183, 237, 238, 56, 107, 251, 90, 137, 159, 165, 174, 159, 36, 17, 124, 75, 31, 230, 73, 40, 102, 81, 236, 230, 83, 129, 255, 255, 255, 255, 255, 255, 255, 255 }
DH Base:  { 2 }
Server DH Public Key:  { 45, 220, 192, 14, 237, 101, 8, 1, 55, 159, 0, 25, 241, 65, 206, 132, 55, 147, 40, 255, 232, 233, 211, 60, 199, 1, 154, 34, 208, 174, 50, 65, 176, 183, 235, 184, 54, 237, 153, 206, 111, 194, 218, 250, 223, 173, 174, 239, 156, 2, 220, 132, 173, 38, 145, 133, 23, 42, 144, 248, 166, 6, 162, 56, 5, 228, 159, 66, 167, 216, 247, 93, 114, 85, 250, 107, 248, 100, 249, 21, 182, 45, 8, 91, 162, 15, 69, 197, 213, 104, 227, 13, 203, 248, 83, 229, 202, 103, 196, 123, 16, 114, 144, 126, 73, 106, 63, 187, 210, 28, 200, 167, 124, 127, 70, 21, 214, 186, 194, 162, 215, 145, 124, 194, 73, 26, 230, 215 }
https-jsse-nio-8443-exec-5, RECV TLSv1.2 ALERT:  warning, close_notify
https-jsse-nio-8443-exec-5, closeInboundInternal()
https-jsse-nio-8443-exec-5, closeOutboundInternal()
Signature Algorithm SHA256withRSA
Signed with a DSA or RSA public key
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1.1
*** ServerHelloDone
CONNECTION KEYGEN:
Client Nonce:
0000: 16 29 FA 0D 46 C9 C2 BA   20 6D 7F D4 25 0C 2A A3  .)..F... m..%.*.
0010: 95 7F 80 58 FA 43 50 AE   05 09 79 6D F7 A3 8A 40  ...X.CP...ym...@
Server Nonce:
0000: 5C 7D 0F FD 12 58 AB FB   64 F2 21 54 42 16 DA 36  \....X..d.!TB..6
0010: D9 38 94 8A 5D D7 4F 25   C4 4B 26 04 CA DA 69 31  .8..].O%.K&...i1
Master Secret:
0000: 3F 25 7B C1 90 3A 4B E3   D2 F1 7C 91 14 EC 18 EA  ?%...:K.........
0010: 62 18 68 D2 8F C4 18 CB   E9 95 46 6F 7A 9F 10 53  b.h.......Foz..S
0020: 8B 62 8D 27 B0 66 7B A7   DE B3 54 63 D4 C4 97 EE  .b.'.f....Tc....
... no MAC keys used for this cipher
Client write key:
0000: 8F B8 62 76 97 B9 75 59   5C 9A 7F 7A A3 F9 94 D4  ..bv..uY\..z....
0010: E9 86 BA 6F 11 97 B7 9A   AE 0A 24 EE DB 9D BB 20  ...o......$....
Server write key:
0000: E9 9B D0 72 14 21 08 6E   59 0E A6 51 A9 F4 D7 D1  ...r.!.nY..Q....
0010: 24 09 DD 6E 53 45 58 80   6A 17 E5 36 3C 7D 80 08  $..nSEX.j..6<...
Client write IV:
0000: B7 A3 13 09                                        ....
Server write IV:
0000: 2A 4A 17 B8                                        *J..
https-jsse-nio-8443-exec-2, WRITE: TLSv1.2 Handshake, length = 1697
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1.1
https-jsse-nio-8443-exec-5, SEND TLSv1.2 ALERT:  warning, description = close_notify
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1.1
https-jsse-nio-8443-exec-5, WRITE: TLSv1.2 Alert, length = 26
https-jsse-nio-8443-exec-5, called closeOutbound()
https-jsse-nio-8443-exec-5, closeOutboundInternal()
https-jsse-nio-8443-exec-1, READ: TLSv1.2 Change Cipher Spec, length = 1
https-jsse-nio-8443-exec-1, READ: TLSv1.2 Handshake, length = 40
*** Finished
verify_data:  { 86, 19, 72, 70, 83, 132, 23, 39, 7, 5, 2, 151 }
***
https-jsse-nio-8443-exec-1, WRITE: TLSv1.2 Change Cipher Spec, length = 1
*** Finished
verify_data:  { 25, 14, 247, 250, 10, 179, 159, 214, 170, 52, 96, 106 }
***
https-jsse-nio-8443-exec-4, READ: TLSv1 Handshake, length = 512
https-jsse-nio-8443-exec-9, READ: TLSv1.2 Handshake, length = 134
*** ClientKeyExchange, DH
DH Public key:  { https-jsse-nio-8443-exec-1, WRITE: TLSv1.2 Handshake, length = 40
123, 251, 82, 142, 67, 118, 250, 165, 186, 199, 46, 242, 163, 20, 165, 218, 144, 71, 185, 24, 82, 223, 70, 150, 163, 84, 203, 75, 13, 254, 7, 147, 122, 211, 182, 62, 179, 120, 212, 105, 15, 38, 225, 81, 35, 15, 202, 196, 246, 195, 53, 75, 85, 215, 41, 95, 124, 156, 137, 224, 139, 207, 47, 19, 100, 155, 5, 41, 86, 146, 29, 15, 29, 243, 160, 24, 150, 83, 172, 56, 182, 1, 13, 146, 94, 250, 143, 229, 77, 126, 223, 150, 228, 94, 229, 172, 90, 174, 152, 17, 253, 232, 40, 247, 8, 125, 203, 82, 157, 223, 196, 106, 163, 162, 98, 88, 81, 217, 63, 147, 107, 231, 191, 113, 249, 20, 87, 155 }
%% Cached server session: [Session-50, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384]
*** ClientHello, TLSv1.2
RandomCookie:  GMT: 177259230 bytes = { 115, 130, 237, 105, 43, 69, 29, 251, 221, 224, 124, 0, 154, 40, 218, 98, 124, 37, 167, 155, 24, 45, 205, 228, 146, 160, 193, 158 }
Session ID:  {92, 125, 15, 252, 253, 51, 152, 0, 104, 161, 63, 9, 70, 98, 196, 252, 42, 141, 176, 24, 10, 171, 244, 105, 60, 139, 248, 0, 175, 70, 119, 188}
Cipher Suites: [Unknown 0x13:0x2, Unknown 0x13:0x3, Unknown 0x13:0x1, Unknown 0x13:0x4, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa9, Unknown 0xc0:0xad, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0xac, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa8, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xc0:0x9d, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9c, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xaa, Unknown 0xc0:0x9f, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9e, TLS_DHE_RSA_WITH_AES_128_CBC_SHA]
Compression Methods:  { 0 }
Unsupported extension status_request, data: 01:00:00:00:00
Extension elliptic_curves, curve names: {secp256r1, secp384r1, secp521r1, unknown curve 29, unknown curve 256, unknown curve 257, unknown curve 258, unknown curve 259, unknown curve 260}
Extension ec_point_formats, formats: [uncompressed]
Extension signature_algorithms, signature_algorithms: SHA256withRSA, Unknown (hash:0x8, signature:0x9), Unknown (hash:0x8, signature:0x4), SHA256withECDSA, Unknown (hash:0x8, signature:0x7), SHA384withRSA, Unknown (hash:0x8, signature:0xa), Unknown (hash:0x8, signature:0x5), SHA384withECDSA, SHA512withRSA, Unknown (hash:0x8, signature:0xb), Unknown (hash:0x8, signature:0x6), SHA512withECDSA, SHA1withRSA, SHA1withECDSA
Unsupported extension type_35, data:
Unsupported extension type_51, data: 00:69:00:17:00:41:04:15:90:3b:71:95:67:36:2f:52:2c:49:8c:4b:d0:5a:04:42:55:86:a8:cf:f7:ca:fc:6b:fe:1d:a4:80:24:82:58:17:54:c6:70:24:48:1a:74:95:c0:b4:4b:14:41:e4:6a:b0:4e:9a:4f:e1:f6:4d:fe:52:ca:d1:bd:61:50:1c:30:00:1d:00:20:f6:27:3f:36:df:58:1e:dd:80:d9:7d:00:cf:4b:95:d9:b9:8c:9c:5d:a6:90:49:94:43:67:83:28:b1:67:af:21
Unsupported extension type_43, data: 08:03:04:03:03:03:02:03:01
Extension renegotiation_info, renegotiated_connection: <empty>
Extension server_name, server_name: [type=host_name (0), value=localhost]
Unsupported extension type_45, data: 02:01:00
Unsupported extension type_28, data: 40:00
Unsupported extension type_21, data: 00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00
***
%% Initialized:  [Session-52, SSL_NULL_WITH_NULL_NULL]
SESSION KEYGEN:
PreMaster Secret:
0000: EB B0 BB 97 27 E6 30 DB   F1 08 E1 77 E7 06 04 61  ....'.0....w...a
0010: EE C4 07 C7 21 5F E2 F3   F2 36 CE 32 DE 39 71 1A  ....!_...6.2.9q.
0020: 03 4C 13 A8 E4 3D E9 19   34 A9 D5 50 24 0E 17 54  .L...=..4..P$..T
0030: 3A 8B 45 64 E4 F4 21 1E   62 8E 12 6C 9D E3 9E EF  :.Ed..!.b..l....
0040: 79 40 BF 83 E9 6D E9 34   CC 53 8E C6 41 DF 06 A0  y@...m.4.S..A...
0050: B2 D0 24 0E CE 4F 32 3C   C5 E9 7B 20 A0 35 E7 C4  ..$..O2<... .5..
0060: 10 58 FC 55 51 95Standard ciphersuite chosen: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
 44 C7   EC EE 5D C2 08 DB CD 41  .X.UQ.D...]....A
0070: A0 B1 FF 8A 28 72 7F 90   C8 98 4B C8 41 EF 14 AC  ....(r....K.A...
%% Negotiating:  [Session-52, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384]
*** ServerHello, TLSv1.2
RandomCookie:  GMT: 1551699709 bytes = { 194, 201, 87, 89, 244, 45, 171, 211, 104, 20, 128, 113, 133, 249, 160, 224, 144, 3, 20, 174, 15, 155, 81, 154, 149, 224, 84, 17 }
Session ID:  CONNECTION KEYGEN:
Client Nonce:
0000: AA 7A 6B 24 DE E1 9A 61   73 7D 45 2F 27 4A 82 84  .zk$...as.E/'J..
0010: EB 0F D6 F4 8E 13 AD FB   6F 66 C4 37 F4 F9 91 CA  ........of.7....
Server Nonce:
0000: 5C 7D 0F FD A1 76 9F 9F   48 D5 B0 E3 AE FD DB 1C  \....v..H.......
0010: 1E DD 8B 17 49 7C 94 18   34 B5 47 5C 84 C8 22 11  ....I...4.G\..".
Master Secret:
0000: B5 5C 35 49 03 4A ED A6   0E 8E 57 23 E6 FE 6C 4A  .\5I.J....W#..lJ
0010: 1A 5C D5 2E 42 BB FA 99   F8 01 1E CA 61 2F 92 D8  .\..B.......a/..
0020: 37 B9 EE 82 5E 2A 6C DD   E5 2F 22 87 89 6F DF 2E  7...^*l../"..o..
... no MAC keys used for this cipher
Client write key:
0000: 1B CB 6B 1F A2 44 8F D7   7D 23 04 0F D1 FA 03 57  ..k..D...#.....W
0010: 57 83 4D 61 F7 FA AE 44   BE A2 F8 1F F1 8E 36 16  W.Ma...D......6.
Server write key:
0000: 9F A2 EA E9 6E EC 6C 8F   9D B9 7F 79 3E 92 F9 B5  ....n.l....y>...
0010: C5 E5 1B A3 16 9D 90 5A   51 DC 1A 81 DB CF 72 DF  .......ZQ.....r.
Client write IV:
0000: E3 9D E4 97                                        ....
Server write IV:
0000: A7 E1 7C 35                                        ...5
https-jsse-nio-8443-exec-3, WRITE: TLSv1.2 Application Data, length = 85
{92, 125, 15, 253, 197, 233, 46, 155, 150, 88, 74, 241, 255, 108, 90, 40, 17, 146, 237, 153, 172, 11, 47, 81, 254, 193, 205, 249, 150, 192, 196, 9}
Cipher Suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
Compression Method: 0
Extension renegotiation_info, renegotiated_connection: <empty>
***
Cipher suite:  TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
*** Certificate chain
https-jsse-nio-8443-exec-9, READ: TLSv1.2 Change Cipher Spec, length = 1
https-jsse-nio-8443-exec-6, READ: TLSv1.2 Alert, length = 26
https-jsse-nio-8443-exec-6, RECV TLSv1.2 ALERT:  warning, close_notify
https-jsse-nio-8443-exec-6, closeInboundInternal()
https-jsse-nio-8443-exec-6, closeOutboundInternal()
https-jsse-nio-8443-exec-6, SEND TLSv1.2 ALERT:  warning, description = close_notify
https-jsse-nio-8443-exec-6, WRITE: TLSv1.2 Alert, length = 26
chain [0] = [
[
  Version: V3
  Subject: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US
  Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5

  Key:  Sun RSA public key, 2048 bits
  modulus: 21944740401167172627731583459321030363948627215746053925732477915060915436180167456469785746662093119306577380200747716284652995937004530444336851845029170241627465854006145050037178991946925696078563485570896673835545540824265905937881682387179314987285174428010940266412458943894800978345731524307952507729956745301047871771953945124256516782917326981125087548987889540650149121302888872237484100834740328828765018090383963294418357028839734723410564800765871733483849269364796949055153420777966213779145518299141217288017794394762274753999989298548507425930217302947589819396239489846633419099079578249651345685751
  public exponent: 65537
  Validity: [From: Fri May 30 08:43:19 GMT 2014,
               To: Mon May 27 08:43:19 GMT 2024]
  Issuer: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US
  SerialNumber: [    a6ef7a9a 5368eb27]

Certificate Extensions: 3
[1]: ObjectId: 2.5.29.35 Criticality=false
AuthorityKeyIdentifier [
KeyIdentifier [
0000: 78 0D 96 9D FE D3 0B BE   8C C7 E3 EC 67 04 AB 4B  x...........g..K
0010: EA E0 00 29                                        ...)
]
]

[2]: ObjectId: 2.5.29.19 Criticality=false
BasicConstraints:[
  CA:true
  PathLen:2147483647
]

[3]: ObjectId: 2.5.29.14 Criticality=false
SubjectKeyIdentifier [
KeyIdentifier [
0000: 78 0D 96 9D FE D3 0B BE   8C C7 E3 EC 67 04 AB 4B  x...........g..K
0010: EA E0 00 29                                        ...)
]
]

]
  Algorithm: [SHA1withRSA]
  Signature:
0000: 19 16 5A 21 99 21 24 98   3C 0A E8 D8 00 AB 44 24  ..Z!.!$.<.....D$
0010: F2 0C B7 83 D5 9F 96 17   87 E2 1F 1D A3 47 68 C7  .............Gh.
0020: 68 4A CB 56 0E 77 2B E8   1A 9F E7 09 A1 19 77 D0  hJ.V.w+.......w.
0030: 5E CC C1 B3 9A C4 35 3D   CB E0 A5 A6 43 5D A3 26  ^.....5=....C].&
0040: A4 91 8A C1 FA 7B 10 EA   DC C3 C7 1C 47 DC 97 32  ............G..2
0050: C0 37 80 1C F1 42 10 E3   74 17 FA 3E 60 4A B7 59  .7...B..t..>`J.Y
0060: 92 C1 E0 6F BB F1 BB 9F   82 89 B5 83 D5 AE 1E 90  ...o............
0070: 0A 89 8D FB 4C C0 C5 9E   DC C5 8C C6 2F EE D9 B4  ....L......./...
0080: 95 47 27 2E BE 82 31 6F   76 C0 DB 4C C8 0D 3B 7B  .G'...1ov..L..;.
0090: D1 6A BF BD 3B 93 30 04   A2 9E 81 F7 96 28 77 F2  .j..;.0......(w.
00A0: 32 05 68 44 1F B3 30 CE   40 9F 20 F3 B4 2B AA E6  2.hD..0.@. ..+..
00B0: 40 9B FB 7F 34 6E 3A 99   FD F8 28 F1 8C 9B 56 34  @...4n:...(...V4
00C0: 64 AD 4D 56 39 CB 96 18   50 9B 99 43 80 0A 39 A5  d.MV9...P..C..9.
00D0: 13 7A 6E C5 25 E0 95 4A   92 E5 A8 8B EE 03 49 B4  .zn.%..J......I.
00E0: D9 7C 00 E3 F0 3B A7 BA   40 30 CC 89 55 C6 97 93  .....;..@0..U...
00F0: B5 15 F6 62 D3 B1 74 9C   0B 80 2B 8A D4 03 84 A0  ...b..t...+.....

]
***
https-jsse-nio-8443-exec-9, READ: TLSv1.2 Handshake, length = 40
https-jsse-nio-8443-exec-6, called closeOutbound()
https-jsse-nio-8443-exec-6, closeOutboundInternal()
*** Finished
verify_data:  { 71, 100, 153, 26, 126, 74, 34, 86, 18, 249, 145, 73 }
***
https-jsse-nio-8443-exec-9, WRITE: TLSv1.2 Change Cipher Spec, length = 1
*** Finished
verify_data:  { 85, 10, 24, 152, 98, 90, 24, 11, 158, 154, 250, 70 }
***
https-jsse-nio-8443-exec-9, WRITE: TLSv1.2 Handshake, length = 40
%% Cached server session: [Session-51, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384]
https-jsse-nio-8443-exec-2, WRITE: TLSv1.2 Application Data, length = 84
https-jsse-nio-8443-exec-2, READ: TLSv1.2 Alert, length = 26
https-jsse-nio-8443-exec-2, RECV TLSv1.2 ALERT:  warning, close_notify
https-jsse-nio-8443-exec-2, closeInboundInternal()
https-jsse-nio-8443-exec-2, closeOutboundInternal()
https-jsse-nio-8443-exec-2, SEND TLSv1.2 ALERT:  warning, description = close_notify
https-jsse-nio-8443-exec-2, WRITE: TLSv1.2 Alert, length = 26
https-jsse-nio-8443-exec-2, called closeOutbound()
https-jsse-nio-8443-exec-2, closeOutboundInternal()
*** Diffie-Hellman ServerKeyExchange
DH Modulus:  { 255, 255, 255, 255, 255, 255, 255, 255, 201, 15, 218, 162, 33, 104, 194, 52, 196, 198, 98, 139, 128, 220, 28, 209, 41, 2, 78, 8, 138, 103, 204, 116, 2, 11, 190, 166, 59, 19, 155, 34, 81, 74, 8, 121, 142, 52, 4, 221, 239, 149, 25, 179, 205, 58, 67, 27, 48, 43, 10, 109, 242, 95, 20, 55, 79, 225, 53, 109, 109, 81, 194, 69, 228, 133, 181, 118, 98, 94, 126, 198, 244, 76, 66, 233, 166, 55, 237, 107, 11, 255, 92, 182, 244, 6, 183, 237, 238, 56, 107, 251, 90, 137, 159, 165, 174, 159, 36, 17, 124, 75, 31, 230, 73, 40, 102, 81, 236, 230, 83, 129, 255, 255, 255, 255, 255, 255, 255, 255 }
DH Base:  { 2 }
Server DH Public Key:  { 27, 139, 247, 62, 42, 113, 171, 227, 63, 200, 68, 252, 153, 195, 90, 124, 244, 205, 219, 117, 152, 30, 7, 170, 35, 173, 90, 52, 201, 222, 53, 122, 249, 232, 221, 88, 53, 110, 12, 109, 133, 179, 195, 221, 95, 126, 143, 54, 27, 208, 154, 242, 32, 120, 105, 12, 73, 41, 216, 95, 31, 91, 68, 83, 11, 56, 67, 199, 67, 159, 238, 77, 125, 206, 129, 169, 1, 213, 43, 179, 31, 91, 152, 58, 68, 234, 78, 246, 33, 209, 250, 187, 234, 249, 80, 197, 226, 233, 14, 45, 254, 27, 233, 150, 131, 27, 214, 204, 107, 80, 250, 44, 61, 124, 26, 7, 128, 229, 109, 243, 198, 204, 45, 172, 138, 122, 47, 62 }
Signature Algorithm SHA256withRSA
Signed with a DSA or RSA public key
*** ServerHelloDone
https-jsse-nio-8443-exec-4, WRITE: TLSv1.2 Handshake, length = 1697
https-jsse-nio-8443-exec-5, READ: TLSv1.2 Handshake, length = 134
*** ClientKeyExchange, DH
DH Public key:  { 162, 145, 217, 26, 54, 67, 227, 54, 194, 56, 47, 158, 106, 25, 211, 152, 16, 34, 177, 59, 198, 164, 138, 219, 158, 71, 124, 178, 91, 140, 130, 16, 61, 184, 63, 65, 125, 85, 141, 227, 244, 246, 75, 196, 37, 203, 173, 138, 5, 179, 20, 160, 70, 0, 254, 117, 247, 117, 56, 175, 105, 100, 17, 90, 80, 215, 60, 41, 211, 216, 31, 141, 244, 5, 39, 66, 218, 97, 168, 50, 19, 249, 238, 134, 246, 28, 211, 214, 135, 147, 116, 68, 8, 163, 140, 160, 125, 184, 4, 114, 93, 112, 185, 250, 9, 139, 194, 214, 40, 220, 194, 151, 28, 33, 62, 20, 130, 120, 85, 128, 224, 223, 177, 72, 123, 89, 0, 250 }
SESSION KEYGEN:
PreMaster Secret:
0000: EC DA 39 02 20 7E 62 DA   FB 4E F9 34 D9 FA F9 8A  ..9. .b..N.4....
0010: 5C 36 92 87 9E 92 1A AB   E8 BE 2C 08 E1 F6 E7 3C  \6........,....<
0020: EB 38 81 DB F4 50 65 EF   27 B3 7F EA 00 7A AD 2B  .8...Pe.'....z.+
0030: F2 7B 02 8B 47 DA A1 78   DE 10 E6 3A DC BA 3B FE  ....G..x...:..;.
0040: FE C7 36 68 83 2F 13 25   B7 CF 5A C0 D4 AE BA 8E  ..6h./.%..Z.....
0050: B7 78 8D E3 C3 1F 2D 4A   4A C6 4B DB 3A 76 2B 03  .x....-JJ.K.:v+.
0060: 3E 71 B8 A9 79 05 3C F2   B3 FE 11 33 49 D1 C6 78  >q..y.<....3I..x
0070: EC 8D 03 0E 15 52 63 52   A1 B0 D5 54 19 DA F9 FE  .....RcR...T....
CONNECTION KEYGEN:
Client Nonce:
0000: 0B 91 C3 DE 73 82 ED 69   2B 45 1D FB DD E0 7C 00  ....s..i+E......
0010: 9A 28 DA 62 7C 25 A7 9B   18 2D CD E4 92 A0 C1 9E  .(.b.%...-......
Server Nonce:
0000: 5C 7D 0F FD C2 C9 57 59   F4 2D AB D3 68 14 80 71  \.....WY.-..h..q
0010: 85 F9 A0 E0 90 03 14 AE   0F 9B 51 9A 95 E0 54 11  ..........Q...T.
Master Secret:
0000: FE 3D 40 1E 4A 05 E9 E3   9D 8F 9F 4B 37 D4 A1 8D  .=@.J......K7...
0010: 15 82 B2 22 9F 62 82 0F   AC 82 CD FD 9D AB E2 9D  ...".b..........
0020: AC D0 96 3E FD 92 81 82   93 82 01 DF 20 23 A3 8D  ...>........ #..
... no MAC keys used for this cipher
Client write key:
0000: 9B 3B 2C D3 7F FC 42 1F   5C A2 DD 95 A7 07 07 23  .;,...B.\......#
0010: 8F 62 05 30 E7 70 73 AB   18 6A BD CA C8 AC 23 25  .b.0.ps..j....#%
Server write key:
0000: 1D BF 2E EF BB AB 0B 0A   12 D4 92 72 18 83 9C 4E  ...........r...N
0010: EE EC 95 6B 86 84 5C A8   4E 1A 62 EC CE 7D 78 50  ...k..\.N.b...xP
Client write IV:
0000: 1C 52 04 63                                        .R.c
Server write IV:
0000: BA 0C 15 1E                                        ....
https-jsse-nio-8443-exec-5, READ: TLSv1.2 Change Cipher Spec, length = 1
https-jsse-nio-8443-exec-5, READ: TLSv1.2 Handshake, length = 40
*** Finished
verify_data:  { 132, 58, 234, 14, 179, 111, 155, 202, 82, 126, 123, 221 }
***
https-jsse-nio-8443-exec-5, WRITE: TLSv1.2 Change Cipher Spec, length = 1
*** Finished
verify_data:  { 122, 42, 228, 134, 98, 182, 124, 187, 51, 217, 8, 253 }
***
https-jsse-nio-8443-exec-5, WRITE: TLSv1.2 Handshake, length = 40
%% Cached server session: [Session-52, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384]
https-jsse-nio-8443-exec-8, WRITE: TLSv1.2 Application Data, length = 780
https-jsse-nio-8443-exec-3, WRITE: TLSv1.2 Application Data, length = 16384
https-jsse-nio-8443-exec-3, WRITE: TLSv1.2 Application Data, length = 532
https-jsse-nio-8443-exec-3, WRITE: TLSv1.2 Application Data, length = 16384
https-jsse-nio-8443-exec-3, WRITE: TLSv1.2 Application Data, length = 532
https-jsse-nio-8443-exec-3, WRITE: TLSv1.2 Application Data, length = 4105
https-jsse-nio-8443-exec-6, WRITE: TLSv1.2 Application Data, length = 85
https-jsse-nio-8443-exec-9, READ: TLSv1.2 Alert, length = 26
https-jsse-nio-8443-exec-9, RECV TLSv1.2 ALERT:  warning, close_notify
https-jsse-nio-8443-exec-9, closeInboundInternal()
https-jsse-nio-8443-exec-9, closeOutboundInternal()
https-jsse-nio-8443-exec-9, SEND TLSv1.2 ALERT:  warning, description = close_notify
https-jsse-nio-8443-exec-9, WRITE: TLSv1.2 Alert, length = 26
https-jsse-nio-8443-exec-9, called closeOutbound()
https-jsse-nio-8443-exec-9, closeOutboundInternal()
Using SSLEngineImpl.
Allow unsafe renegotiation: false
Allow legacy hello messages: true
Is initial handshake: true
Is secure renegotiation: false
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for TLSv1.1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for TLSv1.1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1.1
https-jsse-nio-8443-exec-10, READ: TLSv1 Handshake, length = 512
*** ClientHello, TLSv1.2
RandomCookie:  GMT: -257878899 bytes = { 55, 221, 96, 200, 190, 101, 249, 225, 37, 168, 210, 193, 158, 137, 160, 162, 234, 84, 237, 71, 57, 196, 125, 73, 96, 43, 66, 163 }
Session ID:  {92, 125, 15, 253, 197, 233, 46, 155, 150, 88, 74, 241, 255, 108, 90, 40, 17, 146, 237, 153, 172, 11, 47, 81, 254, 193, 205, 249, 150, 192, 196, 9}
Cipher Suites: [Unknown 0x13:0x2, Unknown 0x13:0x3, Unknown 0x13:0x1, Unknown 0x13:0x4, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa9, Unknown 0xc0:0xad, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0xac, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa8, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xc0:0x9d, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9c, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xaa, Unknown 0xc0:0x9f, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9e, TLS_DHE_RSA_WITH_AES_128_CBC_SHA]
Compression Methods:  { 0 }
Unsupported extension status_request, data: 01:00:00:00:00
Extension elliptic_curves, curve names: {secp256r1, secp384r1, secp521r1, unknown curve 29, unknown curve 256, unknown curve 257, unknown curve 258, unknown curve 259, unknown curve 260}
Extension ec_point_formats, formats: [uncompressed]
Extension signature_algorithms, signature_algorithms: SHA256withRSA, Unknown (hash:0x8, signature:0x9), Unknown (hash:0x8, signature:0x4), SHA256withECDSA, Unknown (hash:0x8, signature:0x7), SHA384withRSA, Unknown (hash:0x8, signature:0xa), Unknown (hash:0x8, signature:0x5), SHA384withECDSA, SHA512withRSA, Unknown (hash:0x8, signature:0xb), Unknown (hash:0x8, signature:0x6), SHA512withECDSA, SHA1withRSA, SHA1withECDSA
Unsupported extension type_35, data:
Unsupported extension type_51, data: 00:69:00:17:00:41:04:5d:b1:1c:f4:7e:b4:9c:7a:36:ac:31:ae:96:6c:e7:78:54:a7:d4:b5:f6:ca:4a:33:a1:f5:5b:84:12:d8:f7:a7:8b:c9:ed:2e:0e:e9:62:7c:34:fb:2d:72:38:45:5f:b4:2c:15:d4:c3:47:18:b0:e6:df:70:6a:27:77:08:b3:04:00:1d:00:20:b1:21:82:98:8c:7d:6a:c4:da:00:21:6e:ce:05:f7:04:a5:58:2d:99:8f:07:63:4d:7f:09:b2:67:cf:24:01:32
Unsupported extension type_43, data: 08:03:04:03:03:03:02:03:01
Extension renegotiation_info, renegotiated_connection: <empty>
Extension server_name, server_name: [type=host_name (0), value=localhost]
Unsupported extension type_45, data: 02:01:00
Unsupported extension type_28, data: 40:00
Unsupported extension type_21, data: 00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00
***
%% Initialized:  [Session-53, SSL_NULL_WITH_NULL_NULL]
Standard ciphersuite chosen: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
%% Negotiating:  [Session-53, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384]
*** ServerHello, TLSv1.2
RandomCookie:  GMT: 1551699709 bytes = { 1, 209, 91, 1, 60, 87, 226, 178, 175, 12, 87, 102, 165, 10, 68, 36, 22, 235, 239, 245, 222, 35, 126, 18, 75, 104, 254, 126 }
Session ID:  {92, 125, 15, 253, 32, 7, 144, 45, 38, 37, 190, 26, 37, 162, 86, 16, 59, 190, 174, 205, 107, 60, 143, 195, 155, 210, 108, 6, 87, 98, 150, 90}
Cipher Suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
Compression Method: 0
Extension renegotiation_info, renegotiated_connection: <empty>
***
Cipher suite:  TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
*** Certificate chain
chain [0] = [
[
  Version: V3
  Subject: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US
  Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5

  Key:  Sun RSA public key, 2048 bits
  modulus: 21944740401167172627731583459321030363948627215746053925732477915060915436180167456469785746662093119306577380200747716284652995937004530444336851845029170241627465854006145050037178991946925696078563485570896673835545540824265905937881682387179314987285174428010940266412458943894800978345731524307952507729956745301047871771953945124256516782917326981125087548987889540650149121302888872237484100834740328828765018090383963294418357028839734723410564800765871733483849269364796949055153420777966213779145518299141217288017794394762274753999989298548507425930217302947589819396239489846633419099079578249651345685751
  public exponent: 65537
  Validity: [From: Fri May 30 08:43:19 GMT 2014,
               To: Mon May 27 08:43:19 GMT 2024]
  Issuer: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org, OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US
  SerialNumber: [    a6ef7a9a 5368eb27]

Certificate Extensions: 3
[1]: ObjectId: 2.5.29.35 Criticality=false
AuthorityKeyIdentifier [
KeyIdentifier [
0000: 78 0D 96 9D FE D3 0B BE   8C C7 E3 EC 67 04 AB 4B  x...........g..K
0010: EA E0 00 29                                        ...)
]
]

[2]: ObjectId: 2.5.29.19 Criticality=false
BasicConstraints:[
  CA:true
  PathLen:2147483647
]

[3]: ObjectId: 2.5.29.14 Criticality=false
SubjectKeyIdentifier [
KeyIdentifier [
0000: 78 0D 96 9D FE D3 0B BE   8C C7 E3 EC 67 04 AB 4B  x...........g..K
0010: EA E0 00 29                                        ...)
]
]

]
  Algorithm: [SHA1withRSA]
  Signature:
0000: 19 16 5A 21 99 21 24 98   3C 0A E8 D8 00 AB 44 24  ..Z!.!$.<.....D$
0010: F2 0C B7 83 D5 9F 96 17   87 E2 1F 1D A3 47 68 C7  .............Gh.
0020: 68 4A CB 56 0E 77 2B E8   1A 9F E7 09 A1 19 77 D0  hJ.V.w+.......w.
0030: 5E CC C1 B3 9A C4 35 3D   CB E0 A5 A6 43 5D A3 26  ^.....5=....C].&
0040: A4 91 8A C1 FA 7B 10 EA   DC C3 C7 1C 47 DC 97 32  ............G..2
0050: C0 37 80 1C F1 42 10 E3   74 17 FA 3E 60 4A B7 59  .7...B..t..>`J.Y
0060: 92 C1 E0 6F BB F1 BB 9F   82 89 B5 83 D5 AE 1E 90  ...o............
0070: 0A 89 8D FB 4C C0 C5 9E   DC C5 8C C6 2F EE D9 B4  ....L......./...
0080: 95 47 27 2E BE 82 31 6F   76 C0 DB 4C C8 0D 3B 7B  .G'...1ov..L..;.
0090: D1 6A BF BD 3B 93 30 04   A2 9E 81 F7 96 28 77 F2  .j..;.0......(w.
00A0: 32 05 68 44 1F B3 30 CE   40 9F 20 F3 B4 2B AA E6  2.hD..0.@. ..+..
00B0: 40 9B FB 7F 34 6E 3A 99   FD F8 28 F1 8C 9B 56 34  @...4n:...(...V4
00C0: 64 AD 4D 56 39 CB 96 18   50 9B 99 43 80 0A 39 A5  d.MV9...P..C..9.
00D0: 13 7A 6E C5 25 E0 95 4A   92 E5 A8 8B EE 03 49 B4  .zn.%..J......I.
00E0: D9 7C 00 E3 F0 3B A7 BA   40 30 CC 89 55 C6 97 93  .....;..@0..U...
00F0: B5 15 F6 62 D3 B1 74 9C   0B 80 2B 8A D4 03 84 A0  ...b..t...+.....

]
***
*** Diffie-Hellman ServerKeyExchange
DH Modulus:  { 255, 255, 255, 255, 255, 255, 255, 255, 201, 15, 218, 162, 33, 104, 194, 52, 196, 198, 98, 139, 128, 220, 28, 209, 41, 2, 78, 8, 138, 103, 204, 116, 2, 11, 190, 166, 59, 19, 155, 34, 81, 74, 8, 121, 142, 52, 4, 221, 239, 149, 25, 179, 205, 58, 67, 27, 48, 43, 10, 109, 242, 95, 20, 55, 79, 225, 53, 109, 109, 81, 194, 69, 228, 133, 181, 118, 98, 94, 126, 198, 244, 76, 66, 233, 166, 55, 237, 107, 11, 255, 92, 182, 244, 6, 183, 237, 238, 56, 107, 251, 90, 137, 159, 165, 174, 159, 36, 17, 124, 75, 31, 230, 73, 40, 102, 81, 236, 230, 83, 129, 255, 255, 255, 255, 255, 255, 255, 255 }
DH Base:  { 2 }
Server DH Public Key:  { 171, 216, 108, 168, 73, 165, 103, 110, 49, 234, 142, 159, 76, 2, 240, 214, 50, 112, 115, 26, 79, 6, 30, 238, 194, 169, 225, 206, 236, 55, 142, 40, 74, 229, 44, 26, 202, 38, 207, 165, 80, 101, 17, 135, 248, 79, 137, 193, 150, 164, 236, 138, 195, 39, 55, 70, 14, 8, 87, 235, 127, 228, 15, 247, 231, 173, 18, 206, 161, 171, 134, 52, 120, 152, 76, 103, 33, 111, 129, 136, 115, 95, 163, 58, 155, 195, 85, 3, 189, 156, 234, 213, 173, 218, 208, 59, 47, 52, 186, 139, 71, 156, 70, 196, 254, 129, 3, 244, 162, 165, 45, 82, 197, 41, 108, 105, 75, 20, 226, 45, 243, 156, 43, 164, 67, 82, 153, 142 }
Signature Algorithm SHA256withRSA
Signed with a DSA or RSA public key
*** ServerHelloDone
https-jsse-nio-8443-exec-10, WRITE: TLSv1.2 Handshake, length = 1697
https-jsse-nio-8443-exec-7, READ: TLSv1.2 Handshake, length = 134
*** ClientKeyExchange, DH
DH Public key:  { 141, 109, 126, 164, 107, 49, 49, 3, 193, 248, 25, 16, 20, 83, 109, 114, 141, 190, 75, 35, 80, 131, 22, 12, 220, 218, 242, 127, 176, 87, 9, 49, 52, 149, 56, 84, 146, 234, 174, 126, 136, 80, 128, 250, 7, 153, 137, 191, 40, 174, 90, 189, 168, 15, 38, 25, 48, 155, 143, 67, 43, 135, 162, 53, 65, 242, 84, 224, 178, 164, 145, 72, 244, 83, 5, 20, 252, 90, 129, 248, 18, 2, 219, 229, 49, 154, 59, 124, 19, 170, 98, 140, 170, 200, 220, 134, 181, 121, 191, 91, 222, 17, 195, 184, 32, 109, 125, 12, 60, 80, 116, 232, 110, 100, 28, 158, 150, 49, 174, 60, 108, 218, 187, 71, 84, 47, 119, 226 }
SESSION KEYGEN:
PreMaster Secret:
0000: 01 22 48 E6 04 9D 47 36   D7 35 64 29 8F 7E 69 E4  ."H...G6.5d)..i.
0010: C2 A6 06 67 82 69 02 67   95 9B C6 B1 8A 67 2D AE  ...g.i.g.....g-.
0020: 08 99 E5 56 62 5E 18 48   35 4F 66 A0 89 65 A4 4E  ...Vb^.H5Of..e.N
0030: 2F A4 BE 0A 94 C6 4B 80   1D ED FE 1C 49 38 61 1C  /.....K.....I8a.
0040: 57 3F AB 53 B8 B4 2F 34   8D 68 3F 1F D7 3C 45 D3  W?.S../4.h?..<E.
0050: 25 10 45 54 96 68 EA B3   33 80 A6 0D 49 21 11 5D  %.ET.h..3...I!.]
0060: 3A 3D A3 3C 6A B4 99 CD   A8 11 EF BB 7D 3D 4A 5E  :=.<j........=J^
0070: 7D 45 8A 17 ED 6E C8 D7   9D C3 83 90 32 B5 13 20  .E...n......2..
CONNECTION KEYGEN:
Client Nonce:
0000: F1 A1 15 8D 37 DD 60 C8   BE 65 F9 E1 25 A8 D2 C1  ....7.`..e..%...
0010: 9E 89 A0 A2 EA 54 ED 47   39 C4 7D 49 60 2B 42 A3  .....T.G9..I`+B.
Server Nonce:
0000: 5C 7D 0F FD 01 D1 5B 01   3C 57 E2 B2 AF 0C 57 66  \.....[.<W....Wf
0010: A5 0A 44 24 16 EB EF F5   DE 23 7E 12 4B 68 FE 7E  ..D$.....#..Kh..
Master Secret:
0000: A3 63 5F C1 CC A3 80 5E   F2 7E 2B 97 AA E4 BD 2D  .c_....^..+....-
0010: E4 AF C1 B2 34 48 A4 3E   97 EF 7E 8E 42 9F A8 BF  ....4H.>....B...
0020: E6 E3 67 D7 C2 8F C5 1C   20 4F 43 C7 D4 4C DD 15  ..g..... OC..L..
... no MAC keys used for this cipher
Client write key:
0000: E4 BD FF 63 2C 71 12 FB   C9 B2 88 26 7A BC 44 3E  ...c,q.....&z.D>
0010: CF E0 19 21 0E A4 4E 17   7B 25 C8 A4 61 B8 CC 48  ...!..N..%..a..H
Server write key:
0000: ED FA 79 A2 38 53 24 6F   2A B9 C3 D9 63 AF 4A 78  ..y.8S$o*...c.Jx
0010: 84 A1 CB 6C AF 57 FC FC   0C 97 32 26 29 A3 64 65  ...l.W....2&).de
Client write IV:
0000: 13 8E 40 E0                                        ..@.
Server write IV:
0000: 06 04 FD D3                                        ....
https-jsse-nio-8443-exec-7, READ: TLSv1.2 Change Cipher Spec, length = 1
https-jsse-nio-8443-exec-7, READ: TLSv1.2 Handshake, length = 40
*** Finished
verify_data:  { 32, 190, 199, 252, 228, 3, 149, 205, 33, 207, 45, 167 }
***
https-jsse-nio-8443-exec-7, WRITE: TLSv1.2 Change Cipher Spec, length = 1
*** Finished
verify_data:  { 150, 210, 111, 207, 66, 55, 101, 146, 172, 74, 162, 146 }
***
https-jsse-nio-8443-exec-7, WRITE: TLSv1.2 Handshake, length = 40
%% Cached server session: [Session-53, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384]
https-jsse-nio-8443-exec-5, WRITE: TLSv1.2 Application Data, length = 168

--
Mathieu Lirzin
GPG: F2A3 8D7E EB2B 6640 5761  070D 0ADE E100 9460 4D37
grv
Reply | Threaded
Open this post in threaded view
|

Re: Updating SSL certificate version

grv
Hi Mathieu

I tried reproducing the issue you're facing with GNU Icecat by providing
the exact cipher suites (that Icecat seems to present in the logs) to my
local OFBiz installation. However, the handshake seems to be working for me.

There seems to be no issue with respect to the protocol version used. It is
all coming down to the fact that Icecat and OFBiz jvm can't settle down on
the cipher suite to choose. As for Epiphany, I could see common cipher
suites sent by both Icecat and Epiphany and yet OFBiz denying handshake.

I'll see if there is more I can extract out of the logs but at the moment I
can't think of a proper solution here apart from installing JCE Unlimited
Strength in the JVM and see if you can get the handshake working.

Thanks and Regards,
Girish


On Wed, Mar 6, 2019 at 1:17 AM Mathieu Lirzin <[hidden email]>
wrote:

> with the inlined logs:
>
> Mathieu Lirzin <[hidden email]> writes:
>
> > Hello Girish and Jacques,
> >
> > Jacques Le Roux <[hidden email]> writes:
> >
> >> Did Girish's answer help? (thanks Girish)
> >
> > Yes it helps alot.
> >
> >> Le 04/03/2019 à 08:09, Girish Vasmatkar a écrit :
> >>>
> >>> Perhaps it will help if you could enable SSL debugging (either in your
> >>> browser or in OFBiz (-Djavax.net.debug=ssl)) and provide details how
> the
> >>> SSL handshake happened. Specifically, it would be interesting to see
> what
> >>> all protocols your browser presented to OFBiz.
> >
> > Here is the log of OFBiz with (-Djavax.net.debug=ssl) with a failing
> > handshake with GNU Icecat:
>
> Using SSLEngineImpl.
> Allow unsafe renegotiation: false
> Allow legacy hello messages: true
> Is initial handshake: true
> Is secure renegotiation: false
> Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for
> TLSv1
> Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for
> TLSv1
> Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for
> TLSv1
> Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for
> TLSv1
> Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for
> TLSv1.1
> Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for
> TLSv1.1
> Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for
> TLSv1.1
> Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for
> TLSv1.1
> https-jsse-nio-8443-exec-8, READ: TLSv1 Handshake, length = 512
> *** ClientHello, TLSv1.2
> RandomCookie:  GMT: 1736093966 bytes = { 189, 227, 177, 17, 199, 186, 164,
> 220, 197, 114, 96, 6, 87, 64, 58, 23, 142, 75, 57, 206, 107, 227, 181, 65,
> 168, 6, 76, 155 }
> Session ID:  {193, 60, 237, 251, 184, 155, 76, 93, 36, 222, 130, 94, 35,
> 149, 245, 251, 82, 146, 204, 227, 113, 188, 245, 195, 46, 17, 198, 7, 175,
> 181, 1, 156}
> Cipher Suites: [Unknown 0x13:0x1, Unknown 0x13:0x3, Unknown 0x13:0x2,
> TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,
> TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xcc:0xa9, Unknown
> 0xcc:0xa8, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,
> TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,
> TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_128_CBC_SHA,
> TLS_RSA_WITH_AES_256_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA]
> Compression Methods:  { 0 }
> Extension server_name, server_name: [type=host_name (0), value=localhost]
> Extension extended_master_secret
> Extension renegotiation_info, renegotiated_connection: <empty>
> Extension elliptic_curves, curve names: {unknown curve 29, secp256r1,
> secp384r1, secp521r1, unknown curve 256, unknown curve 257}
> Extension ec_point_formats, formats: [uncompressed]
> Unsupported extension type_35, data:
> Unsupported extension type_16, data:
> 00:0c:02:68:32:08:68:74:74:70:2f:31:2e:31
> Unsupported extension status_request, data: 01:00:00:00:00
> Unsupported extension type_51, data:
> 00:69:00:1d:00:20:15:8a:11:44:3e:65:b5:86:d5:91:8e:46:d4:4c:f1:05:44:48:a7:43:9e:04:69:69:fe:58:f5:80:ce:bc:d2:58:00:17:00:41:04:b7:0f:c1:73:e5:bf:9d:fd:4c:29:24:07:27:9e:77:1e:fb:30:d2:b8:17:b5:87:1e:f6:61:d1:b3:9c:f8:59:2a:cd:63:07:7f:9b:2f:3d:f9:80:a5:e2:f3:09:3d:e5:91:f4:35:2a:d0:ec:aa:89:ed:6d:63:7c:93:74:a6:0e:e9
> Unsupported extension type_43, data: 08:7f:17:03:03:03:02:03:01
> Extension signature_algorithms, signature_algorithms: SHA256withECDSA,
> SHA384withECDSA, SHA512withECDSA, Unknown (hash:0x8, signature:0x4),
> Unknown (hash:0x8, signature:0x5), Unknown (hash:0x8, signature:0x6),
> SHA256withRSA, SHA384withRSA, SHA512withRSA, SHA1withECDSA, SHA1withRSA
> Unsupported extension type_45, data: 01:01
> Unsupported extension type_21, data:
> 00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00
> ***
> %% Initialized:  [Session-54, SSL_NULL_WITH_NULL_NULL]
> https-jsse-nio-8443-exec-8, fatal error: 40: no cipher suites in common
> javax.net.ssl.SSLHandshakeException: no cipher suites in common
> %% Invalidated:  [Session-54, SSL_NULL_WITH_NULL_NULL]
> https-jsse-nio-8443-exec-8, SEND TLSv1.2 ALERT:  fatal, description =
> handshake_failure
> https-jsse-nio-8443-exec-8, WRITE: TLSv1.2 Alert, length = 2
> https-jsse-nio-8443-exec-8, fatal: engine already closed.  Rethrowing
> javax.net.ssl.SSLHandshakeException: no cipher suites in common
> https-jsse-nio-8443-exec-8, called closeOutbound()
> https-jsse-nio-8443-exec-8, closeOutboundInternal()
> Using SSLEngineImpl.
> Allow unsafe renegotiation: false
> Allow legacy hello messages: true
> Is initial handshake: true
> Is secure renegotiation: false
> Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for
> TLSv1
> Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for
> TLSv1
> Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for
> TLSv1
> Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for
> TLSv1
> Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for
> TLSv1.1
> Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for
> TLSv1.1
> Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for
> TLSv1.1
> Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for
> TLSv1.1
> https-jsse-nio-8443-exec-3, READ: TLSv1 Handshake, length = 177
> *** ClientHello, TLSv1.2
> RandomCookie:  GMT: 146371561 bytes = { 199, 41, 221, 220, 249, 76, 16,
> 148, 121, 235, 169, 29, 195, 217, 73, 96, 168, 20, 66, 190, 101, 117, 147,
> 205, 153, 77, 208, 190 }
> Session ID:  {}
> Cipher Suites: [TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,
> TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xcc:0xa9, Unknown
> 0xcc:0xa8, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,
> TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,
> TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA,
> TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA,
> TLS_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_CBC_SHA,
> SSL_RSA_WITH_3DES_EDE_CBC_SHA]
> Compression Methods:  { 0 }
> Extension server_name, server_name: [type=host_name (0), value=localhost]
> Extension extended_master_secret
> Extension renegotiation_info, renegotiated_connection: <empty>
> Extension elliptic_curves, curve names: {unknown curve 29, secp256r1,
> secp384r1, secp521r1}
> Extension ec_point_formats, formats: [uncompressed]
> Unsupported extension type_35, data:
> Unsupported extension type_16, data:
> 00:0c:02:68:32:08:68:74:74:70:2f:31:2e:31
> Unsupported extension status_request, data: 01:00:00:00:00
> Extension signature_algorithms, signature_algorithms: SHA256withECDSA,
> SHA384withECDSA, SHA512withECDSA, Unknown (hash:0x8, signature:0x4),
> Unknown (hash:0x8, signature:0x5), Unknown (hash:0x8, signature:0x6),
> SHA256withRSA, SHA384withRSA, SHA512withRSA, SHA1withECDSA, SHA1withRSA
> ***
> %% Initialized:  [Session-55, SSL_NULL_WITH_NULL_NULL]
> https-jsse-nio-8443-exec-3, fatal error: 40: no cipher suites in common
> javax.net.ssl.SSLHandshakeException: no cipher suites in common
> %% Invalidated:  [Session-55, SSL_NULL_WITH_NULL_NULL]
> https-jsse-nio-8443-exec-3, SEND TLSv1.2 ALERT:  fatal, description =
> handshake_failure
> https-jsse-nio-8443-exec-3, WRITE: TLSv1.2 Alert, length = 2
> https-jsse-nio-8443-exec-3, fatal: engine already closed.  Rethrowing
> javax.net.ssl.SSLHandshakeException: no cipher suites in common
> https-jsse-nio-8443-exec-3, called closeOutbound()
> https-jsse-nio-8443-exec-3, closeOutboundInternal()
>
> > Here is the log with another browser (Epiphany) with a successful
> handshake:
>
> Using SSLEngineImpl.
> Allow unsafe renegotiation: false
> Allow legacy hello messages: true
> Is initial handshake: true
> Is secure renegotiation: false
> Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for
> TLSv1
> Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for
> TLSv1
> Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for
> TLSv1
> Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for
> TLSv1
> Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for
> TLSv1.1
> Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for
> TLSv1.1
> Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for
> TLSv1.1
> Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for
> TLSv1.1
> https-jsse-nio-8443-exec-2, READ: TLSv1.2 Alert, length = 26
> https-jsse-nio-8443-exec-2, RECV TLSv1.2 ALERT:  warning, close_notify
> https-jsse-nio-8443-exec-2, closeInboundInternal()
> https-jsse-nio-8443-exec-2, closeOutboundInternal()
> https-jsse-nio-8443-exec-2, SEND TLSv1.2 ALERT:  warning, description =
> close_notify
> https-jsse-nio-8443-exec-1, READ: TLSv1 Handshake, length = 512
> https-jsse-nio-8443-exec-2, WRITE: TLSv1.2 Alert, length = 26
> https-jsse-nio-8443-exec-2, called closeOutbound()
> *** ClientHello, TLSv1.2
> RandomCookie:  https-jsse-nio-8443-exec-2, closeOutboundInternal()
> GMT: 814150594 bytes = { 189, 14, 209, 176, 97, 15, 214, 107, 117, 63,
> 187, 162, 12, 184, 245, 189, 245, 227, 127, 128, 244, 154, 249, 115, 101,
> 100, 61, 40 }
> Session ID:  {92, 125, 15, 237, 254, 33, 2, 52, 144, 148, 0, 165, 156,
> 232, 106, 139, 222, 199, 99, 71, 41, 230, 1, 75, 246, 145, 175, 22, 191,
> 231, 28, 218}
> Cipher Suites: [Unknown 0x13:0x2, Unknown 0x13:0x3, Unknown 0x13:0x1,
> Unknown 0x13:0x4, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, Unknown
> 0xcc:0xa9, Unknown 0xc0:0xad, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA,
> TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0xac,
> TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA,
> TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa8,
> TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,
> TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_GCM_SHA384,
> Unknown 0xc0:0x9d, TLS_RSA_WITH_AES_256_CBC_SHA,
> TLS_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9c,
> TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, Unknown
> 0xcc:0xaa, Unknown 0xc0:0x9f, TLS_DHE_RSA_WITH_AES_256_CBC_SHA,
> TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9e,
> TLS_DHE_RSA_WITH_AES_128_CBC_SHA]
> Compression Methods:  { 0 }
> Unsupported extension status_request, data: 01:00:00:00:00
> Extension elliptic_curves, curve names: {secp256r1, secp384r1, secp521r1,
> unknown curve 29, unknown curve 256, unknown curve 257, unknown curve 258,
> unknown curve 259, unknown curve 260}
> Extension ec_point_formats, formats: [uncompressed]
> Extension signature_algorithms, signature_algorithms: SHA256withRSA,
> Unknown (hash:0x8, signature:0x9), Unknown (hash:0x8, signature:0x4),
> SHA256withECDSA, Unknown (hash:0x8, signature:0x7), SHA384withRSA, Unknown
> (hash:0x8, signature:0xa), Unknown (hash:0x8, signature:0x5),
> SHA384withECDSA, SHA512withRSA, Unknown (hash:0x8, signature:0xb), Unknown
> (hash:0x8, signature:0x6), SHA512withECDSA, SHA1withRSA, SHA1withECDSA
> Unsupported extension type_35, data:
> Unsupported extension type_51, data:
> 00:69:00:17:00:41:04:64:09:13:0a:51:7f:68:f5:63:01:39:08:81:34:af:cd:75:75:98:c8:81:91:0d:6a:2a:22:43:3e:a9:2d:23:48:16:7a:d0:a8:b5:bd:ce:8d:54:25:fd:33:c3:99:bd:42:9f:05:d1:7e:dd:e8:5e:37:fa:7f:dd:e1:6a:ef:a0:b9:00:1d:00:20:e8:f0:72:c3:30:bc:24:4e:cd:5f:14:38:a2:86:9e:84:cd:51:df:a4:6d:72:33:e8:e9:a0:55:8e:4c:60:21:50
> Unsupported extension type_43, data: 08:03:04:03:03:03:02:03:01
> Extension renegotiation_info, renegotiated_connection: <empty>
> Extension server_name, server_name: [type=host_name (0), value=localhost]
> Unsupported extension type_45, data: 02:01:00
> Unsupported extension type_28, data: 40:00
> Unsupported extension type_21, data:
> 00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00
> ***
> %% Initialized:  [Session-10, SSL_NULL_WITH_NULL_NULL]
> Standard ciphersuite chosen: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
> %% Negotiating:  [Session-10, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384]
> *** ServerHello, TLSv1.2
> RandomCookie:  GMT: 1551699703 bytes = { 1, 74, 230, 110, 14, 123, 143,
> 104, 216, 59, 77, 109, 156, 237, 68, 152, 241, 106, 128, 168, 185, 218, 12,
> 202, 6, 4, 174, 147 }
> Session ID:  {92, 125, 15, 247, 246, 249, 211, 141, 164, 158, 249, 105,
> 184, 211, 34, 29, 135, 131, 232, 36, 64, 192, 38, 174, 54, 83, 112, 53,
> 142, 111, 182, 94}
> Cipher Suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
> Compression Method: 0
> Extension renegotiation_info, renegotiated_connection: <empty>
> ***
> Cipher suite:  TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
> https-jsse-nio-8443-exec-9, WRITE: TLSv1.2 Application Data, length = 339
> *** Certificate chain
> chain [0] = [
> [
>   Version: V3
>   Subject: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org,
> OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US
>   Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5
>
>   Key:  Sun RSA public key, 2048 bits
>   modulus:
> 21944740401167172627731583459321030363948627215746053925732477915060915436180167456469785746662093119306577380200747716284652995937004530444336851845029170241627465854006145050037178991946925696078563485570896673835545540824265905937881682387179314987285174428010940266412458943894800978345731524307952507729956745301047871771953945124256516782917326981125087548987889540650149121302888872237484100834740328828765018090383963294418357028839734723410564800765871733483849269364796949055153420777966213779145518299141217288017794394762274753999989298548507425930217302947589819396239489846633419099079578249651345685751
>   public exponent: 65537
>   Validity: [From: Fri May 30 08:43:19 GMT 2014,
>                To: Mon May 27 08:43:19 GMT 2024]
>   Issuer: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org,
> OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US
>   SerialNumber: [    a6ef7a9a 5368eb27]
>
> Certificate Extensions: 3
> [1]: ObjectId: 2.5.29.35 Criticality=false
> AuthorityKeyIdentifier [
> KeyIdentifier [
> 0000: 78 0D 96 9D FE D3 0B BE   8C C7 E3 EC 67 04 AB 4B  x...........g..K
> 0010: EA E0 00 29                                        ...)
> ]
> ]
>
> [2]: ObjectId: 2.5.29.19 Criticality=false
> BasicConstraints:[
>   CA:true
>   PathLen:2147483647
> ]
>
> [3]: ObjectId: 2.5.29.14 Criticality=false
> SubjectKeyIdentifier [
> KeyIdentifier [
> 0000: 78 0D 96 9D FE D3 0B BE   8C C7 E3 EC 67 04 AB 4B  x...........g..K
> 0010: EA E0 00 29                                        ...)
> ]
> ]
>
> ]
>   Algorithm: [SHA1withRSA]
>   Signature:
> 0000: 19 16 5A 21 99 21 24 98   3C 0A E8 D8 00 AB 44 24  ..Z!.!$.<.....D$
> 0010: F2 0C B7 83 D5 9F 96 17   87 E2 1F 1D A3 47 68 C7  .............Gh.
> 0020: 68 4A CB 56 0E 77 2B E8   1A 9F E7 09 A1 19 77 D0  hJ.V.w+.......w.
> 0030: 5E CC C1 B3 9A C4 35 3D   CB E0 A5 A6 43 5D A3 26  ^.....5=....C].&
> 0040: A4 91 8A C1 FA 7B 10 EA   DC C3 C7 1C 47 DC 97 32  ............G..2
> 0050: C0 37 80 1C F1 42 10 E3   74 17 FA 3E 60 4A B7 59  .7...B..t..>`J.Y
> 0060: 92 C1 E0 6F BB F1 BB 9F   82 89 B5 83 D5 AE 1E 90  ...o............
> 0070: 0A 89 8D FB 4C C0 C5 9E   DC C5 8C C6 2F EE D9 B4  ....L......./...
> 0080: 95 47 27 2E BE 82 31 6F   76 C0 DB 4C C8 0D 3B 7B  .G'...1ov..L..;.
> 0090: D1 6A BF BD 3B 93 30 04   A2 9E 81 F7 96 28 77 F2  .j..;.0......(w.
> 00A0: 32 05 68 44 1F B3 30 CE   40 9F 20 F3 B4 2B AA E6  2.hD..0.@. ..+..
> 00B0: 40 9B FB 7F 34 6E 3A 99   FD F8 28 F1 8C 9B 56 34  @...4n:...(...V4
> 00C0: 64 AD 4D 56 39 CB 96 18   50 9B 99 43 80 0A 39 A5  d.MV9...P..C..9.
> 00D0: 13 7A 6E C5 25 E0 95 4A   92 E5 A8 8B EE 03 49 B4  .zn.%..J......I.
> 00E0: D9 7C 00 E3 F0 3B A7 BA   40 30 CC 89 55 C6 97 93  .....;..@0..U...
> 00F0: B5 15 F6 62 D3 B1 74 9C   0B 80 2B 8A D4 03 84 A0  ...b..t...+.....
>
> ]
> ***
> *** Diffie-Hellman ServerKeyExchange
> DH Modulus:  { 255, 255, 255, 255, 255, 255, 255, 255, 201, 15, 218, 162,
> 33, 104, 194, 52, 196, 198, 98, 139, 128, 220, 28, 209, 41, 2, 78, 8, 138,
> 103, 204, 116, 2, 11, 190, 166, 59, 19, 155, 34, 81, 74, 8, 121, 142, 52,
> 4, 221, 239, 149, 25, 179, 205, 58, 67, 27, 48, 43, 10, 109, 242, 95, 20,
> 55, 79, 225, 53, 109, 109, 81, 194, 69, 228, 133, 181, 118, 98, 94, 126,
> 198, 244, 76, 66, 233, 166, 55, 237, 107, 11, 255, 92, 182, 244, 6, 183,
> 237, 238, 56, 107, 251, 90, 137, 159, 165, 174, 159, 36, 17, 124, 75, 31,
> 230, 73, 40, 102, 81, 236, 230, 83, 129, 255, 255, 255, 255, 255, 255, 255,
> 255 }
> DH Base:  { 2 }
> Server DH Public Key:  { 207, 201, 241, 189, 224, 175, 68, 248, 216, 197,
> 47, 214, 124, 101, 217, 9, 127, 95, 125, 123, 118, 132, 240, 161, 211, 172,
> 155, 151, 38, 81, 217, 225, 137, 34, 92, 50, 243, 88, 199, 76, 154, 29,
> 118, 218, 187, 175, 51, 153, 133, 115, 97, 176, 38, 139, 13, 107, 114, 66,
> 44, 201, 109, 168, 61, 214, 28, 170, 130, 136, 66, 189, 7, 217, 29, 83, 49,
> 211, 167, 220, 13, 57, 229, 176, 106, 101, 147, https-jsse-nio-8443-exec-9,
> WRITE: TLSv1.2 Application Data, length = 548
> 155, 102, 135, 27, 15, 236, 14, 126, 81, 118, 54, 20, 33, 204, 63, 45, 14,
> 239, 232, 96, 218, 144, 135, 68, 98, 120, 209, 97, 189, 243, 74, 38, 12,
> 149, 112, 124, 118, 40, 193, 94, 129, 194, 136 }
> Signature Algorithm SHA256withRSA
> Signed with a DSA or RSA public key
> *** ServerHelloDone
> https-jsse-nio-8443-exec-1, WRITE: TLSv1.2 Handshake, length = 1697
> Using SSLEngineImpl.
> Allow unsafe renegotiation: false
> Allow legacy hello messages: true
> Is initial handshake: true
> Is secure renegotiation: false
> Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for
> TLSv1
> Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for
> TLSv1
> Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for
> TLSv1
> Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for
> TLSv1
> Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for
> TLSv1.1
> Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for
> TLSv1.1
> Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for
> TLSv1.1
> Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for
> TLSv1.1
> https-jsse-nio-8443-exec-1, READ: TLSv1 Handshake, length = 512
> *** ClientHello, TLSv1.2
> RandomCookie:  GMT: 891426139 bytes = { 70, 64, 99, 252, 252, 243, 247,
> 61, 84, 99, 225, 22, 197, 217, 232, 204, 83, 219, 77, 96, 217, 224, 36, 16,
> 75, 250, 115, 210 }
> Session ID:  {92, 125, 15, 237, 254, 33, 2, 52, 144, 148, 0, 165, 156,
> 232, 106, 139, 222, 199, 99, 71, 41, 230, 1, 75, 246, 145, 175, 22, 191,
> 231, 28, 218}
> Cipher Suites: [Unknown 0x13:0x2, Unknown 0x13:0x3, Unknown 0x13:0x1,
> Unknown 0x13:0x4, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, Unknown
> 0xcc:0xa9, Unknown 0xc0:0xad, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA,
> TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0xac,
> TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA,
> TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa8,
> TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,
> TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_GCM_SHA384,
> Unknown 0xc0:0x9d, TLS_RSA_WITH_AES_256_CBC_SHA,
> TLS_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9c,
> TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, Unknown
> 0xcc:0xaa, Unknown 0xc0:0x9f, TLS_DHE_RSA_WITH_AES_256_CBC_SHA,
> TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9e,
> TLS_DHE_RSA_WITH_AES_128_CBC_SHA]
> Compression Methods:  { 0 }
> Unsupported extension status_request, data: 01:00:00:00:00
> Extension elliptic_curves, curve names: {secp256r1, secp384r1, secp521r1,
> unknown curve 29, unknown curve 256, unknown curve 257, unknown curve 258,
> unknown curve 259, unknown curve 260}
> Extension ec_point_formats, formats: [uncompressed]
> Extension signature_algorithms, signature_algorithms: SHA256withRSA,
> Unknown (hash:0x8, signature:0x9), Unknown (hash:0x8, signature:0x4),
> SHA256withECDSA, Unknown (hash:0x8, signature:0x7), SHA384withRSA, Unknown
> (hash:0x8, signature:0xa), Unknown (hash:0x8, signature:0x5),
> SHA384withECDSA, SHA512withRSA, Unknown (hash:0x8, signature:0xb), Unknown
> (hash:0x8, signature:0x6), SHA512withECDSA, SHA1withRSA, SHA1withECDSA
> Unsupported extension type_35, data:
> Unsupported extension type_51, data:
> 00:69:00:17:00:41:04:4c:4b:f9:0d:41:a2:d1:e0:cc:78:46:72:f7:54:96:02:a0:a2:d6:14:0b:7a:6e:f1:45:0a:8f:bd:40:4f:eb:26:cb:d1:4d:1c:12:24:25:45:db:9c:f3:85:55:8d:0a:3f:4e:d8:d0:1f:95:1c:46:97:c5:b1:74:e7:c7:38:ed:b4:00:1d:00:20:e1:f7:e1:e0:c6:56:96:45:a4:22:c3:5b:78:3c:d2:1c:ad:eb:c3:85:0d:9e:01:6e:4a:f7:60:5d:14:14:4f:2a
> Unsupported extension type_43, data: 08:03:04:03:03:03:02:03:01
> Extension renegotiation_info, renegotiated_connection: <empty>
> Extension server_name, server_name: [type=host_name (0), value=localhost]
> Unsupported extension type_45, data: 02:01:00
> Unsupported extension type_28, data: 40:00
> Unsupported extension type_21, data:
> 00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00
> ***
> %% Initialized:  [Session-11, SSL_NULL_WITH_NULL_NULL]
> Standard ciphersuite chosen: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
> %% Negotiating:  [Session-11, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384]
> *** ServerHello, TLSv1.2
> RandomCookie:  GMT: 1551699703 bytes = { 84, 57, 154, 20, 67, 161, 125,
> 104, 24, 253, 249, 172, 67, 138, 44, 163, 152, 238, 181, 239, 217, 23, 49,
> 149, 121, 11, 142, 123 }
> Session ID:  {92, 125, 15, 247, 213, 157, 46, 13, 7, 249, 27, 59, 188, 52,
> 107, 216, 12, 30, 168, 6, 161, 1, 93, 140, 189, 97, 129, 164, 189, 189,
> 122, 170}
> Cipher Suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
> Compression Method: 0
> Extension renegotiation_info, renegotiated_connection: <empty>
> ***
> Cipher suite:  TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
> *** Certificate chain
> chain [0] = [
> [
>   Version: V3
>   Subject: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org,
> OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US
>   Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5
>
>   Key:  Sun RSA public key, 2048 bits
>   modulus:
> 21944740401167172627731583459321030363948627215746053925732477915060915436180167456469785746662093119306577380200747716284652995937004530444336851845029170241627465854006145050037178991946925696078563485570896673835545540824265905937881682387179314987285174428010940266412458943894800978345731524307952507729956745301047871771953945124256516782917326981125087548987889540650149121302888872237484100834740328828765018090383963294418357028839734723410564800765871733483849269364796949055153420777966213779145518299141217288017794394762274753999989298548507425930217302947589819396239489846633419099079578249651345685751
>   public exponent: 65537
>   Validity: [From: Fri May 30 08:43:19 GMT 2014,
>                To: Mon May 27 08:43:19 GMT 2024]
>   Issuer: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org,
> OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US
>   SerialNumber: [    a6ef7a9a 5368eb27]
>
> Certificate Extensions: 3
> [1]: ObjectId: 2.5.29.35 Criticality=false
> AuthorityKeyIdentifier [
> KeyIdentifier [
> 0000: 78 0D 96 9D FE D3 0B BE   8C C7 E3 EC 67 04 AB 4B  x...........g..K
> 0010: EA E0 00 29                                        ...)
> ]
> ]
>
> [2]: ObjectId: 2.5.29.19 Criticality=false
> BasicConstraints:[
>   CA:true
>   PathLen:2147483647
> ]
>
> [3]: ObjectId: 2.5.29.14 Criticality=false
> SubjectKeyIdentifier [
> KeyIdentifier [
> 0000: 78 0D 96 9D FE D3 0B BE   8C C7 E3 EC 67 04 AB 4B  x...........g..K
> 0010: EA E0 00 29                                        ...)
> ]
> ]
>
> ]
>   Algorithm: [SHA1withRSA]
>   Signature:
> 0000: 19 16 5A 21 99 21 24 98   3C 0A E8 D8 00 AB 44 24  ..Z!.!$.<.....D$
> 0010: F2 0C B7 83 D5 9F 96 17   87 E2 1F 1D A3 47 68 C7  .............Gh.
> 0020: 68 4A CB 56 0E 77 2B E8   1A 9F E7 09 A1 19 77 D0  hJ.V.w+.......w.
> 0030: 5E CC C1 B3 9A C4 35 3D   CB E0 A5 A6 43 5D A3 26  ^.....5=....C].&
> 0040: A4 91 8A C1 FA 7B 10 EA   DC C3 C7 1C 47 DC 97 32  ............G..2
> 0050: C0 37 80 1C F1 42 10 E3   74 17 FA 3E 60 4A B7 59  .7...B..t..>`J.Y
> 0060: 92 C1 E0 6F BB F1 BB 9F   82 89 B5 83 D5 AE 1E 90  ...o............
> 0070: 0A 89 8D FB 4C C0 C5 9E   DC C5 8C C6 2F EE D9 B4  ....L......./...
> 0080: 95 47 27 2E BE 82 31 6F   76 C0 DB 4C C8 0D 3B 7B  .G'...1ov..L..;.
> 0090: D1 6A BF BD 3B 93 30 04   A2 9E 81 F7 96 28 77 F2  .j..;.0......(w.
> 00A0: 32 05 68 44 1F B3 30 CE   40 9F 20 F3 B4 2B AA E6  2.hD..0.@. ..+..
> 00B0: 40 9B FB 7F 34 6E 3A 99   FD F8 28 F1 8C 9B 56 34  @...4n:...(...V4
> 00C0: 64 AD 4D 56 39 CB 96 18   50 9B 99 43 80 0A 39 A5  d.MV9...P..C..9.
> 00D0: 13 7A 6E C5 25 E0 95 4A   92 E5 A8 8B EE 03 49 B4  .zn.%..J......I.
> 00E0: D9 7C 00 E3 F0 3B A7 BA   40 30 CC 89 55 C6 97 93  .....;..@0..U...
> 00F0: B5 15 F6 62 D3 B1 74 9C   0B 80 2B 8A D4 03 84 A0  ...b..t...+.....
>
> ]
> Using SSLEngineImpl.
> Allow unsafe renegotiation: false
> Allow legacy hello messages: true
> Is initial handshake: true
> Is secure renegotiation: false
> Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for
> TLSv1
> Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for
> TLSv1
> Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for
> TLSv1
> Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for
> TLSv1
> Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for
> TLSv1.1
> Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for
> TLSv1.1
> Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for
> TLSv1.1
> Using SSLEngineImpl.
> https-jsse-nio-8443-exec-9, WRITE: TLSv1.2 Application Data, length = 286
> Allow unsafe renegotiation: false
> Allow legacy hello messages: true
> Is initial handshake: true
> Is secure renegotiation: false
> Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for
> TLSv1.1
> Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for
> TLSv1
> Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for
> TLSv1
> Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for
> TLSv1
> Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for
> TLSv1
> Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for
> TLSv1.1
> Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for
> TLSv1.1
> Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for
> TLSv1.1
> Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for
> TLSv1.1
> https-jsse-nio-8443-exec-5, READ: TLSv1 Handshake, length = 512
> https-jsse-nio-8443-exec-3, READ: TLSv1 Handshake, length = 512
> https-jsse-nio-8443-exec-4, READ: TLSv1.2 Handshake, length = 134
> ***
> *** ClientHello, TLSv1.2
> Using SSLEngineImpl.
> Allow unsafe renegotiation: false
> Allow legacy hello messages: true
> Is initial handshake: true
> Is secure renegotiation: false
> Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for
> TLSv1
> Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for
> TLSv1
> Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for
> TLSv1
> Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for
> TLSv1
> Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for
> TLSv1.1
> Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for
> TLSv1.1
> Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for
> TLSv1.1
> Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for
> TLSv1.1
> RandomCookie:  GMT: 937077586 bytes = { 174, 84, 63, 142, 131, 103, 98,
> 166, 55, 40, 255, 208, 186, 157, 182, 91, 213, 254, 173, 94, 119, 55, 74,
> 51, 128, 16, 27, 127 }
> Session ID:  {92, 125, 15, 237, 254, 33, 2, 52, 144, 148, 0, 165, 156,
> 232, 106, 139, 222, 199, 99, 71, 41, 230, 1, 75, 246, 145, 175, 22, 191,
> 231, 28, 218}
> Cipher Suites: [Unknown 0x13:0x2, Unknown 0x13:0x3, Unknown 0x13:0x1,
> Unknown 0x13:0x4, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, Unknown
> 0xcc:0xa9, Unknown 0xc0:0xad, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA,
> TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0xac,
> TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA,
> TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa8,
> TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,
> TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_GCM_SHA384,
> Unknown 0xc0:0x9d, TLS_RSA_WITH_AES_256_CBC_SHA,
> TLS_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9c,
> TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, Unknown
> 0xcc:0xaa, Unknown 0xc0:0x9f, TLS_DHE_RSA_WITH_AES_256_CBC_SHA,
> TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9e,
> TLS_DHE_RSA_WITH_AES_128_CBC_SHA]
> Compression Methods:  { 0 }
> Unsupported extension status_request, data: 01:00:00:00:00
> Extension elliptic_curves, curve names: {secp256r1, secp384r1, secp521r1,
> unknown curve 29, unknown curve 256, unknown curve 257, unknown curve 258,
> unknown curve 259, unknown curve 260}
> Extension ec_point_formats, formats: [uncompressed]
> Extension signature_algorithms, signature_algorithms: SHA256withRSA,
> Unknown (hash:0x8, signature:0x9), Unknown (hash:0x8, signature:0x4),
> SHA256withECDSA, Unknown (hash:0x8, signature:0x7), SHA384withRSA, Unknown
> (hash:0x8, signature:0xa), Unknown (hash:0x8, signature:0x5),
> SHA384withECDSA, SHA512withRSA, Unknown (hash:0x8, signature:0xb), Unknown
> (hash:0x8, signature:0x6), SHA512withECDSA, SHA1withRSA, SHA1withECDSA
> Unsupported extension type_35, data:
> Unsupported extension type_51, data:
> 00:69:00:17:00:41:04:63:49:bf:ec:49:38:e9:99:e5:34:bf:79:d7:44:85:9b:ae:30:19:12:ea:6a:b9:66:e4:ce:a5:bc:ac:5d:fb:69:6c:ff:6e:5f:19:83:88:c1:28:66:40:3c:1a:3c:60:b7:26:38:7a:8d:34:f4:8c:db:b2:5b:36:b1:9f:5b:0b:7f:00:1d:00:20:9e:f1:d0:52:64:c2:20:af:55:dc:18:64:f8:cb:ae:a9:f3:e7:f9:cd:2c:03:6f:96:cf:86:86:88:c4:f5:ca:2e
> Unsupported extension type_43, data: 08:03:04:03:03:03:02:03:01
> Extension renegotiation_info, renegotiated_connection: <empty>
> Extension server_name, server_name: [type=host_name (0), value=localhost]
> Unsupported extension type_45, data: 02:01:00
> Unsupported extension type_28, data: 40:00
> Unsupported extension type_21, data:
> 00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00
> ***
> %% Initialized:  [Session-12, SSL_NULL_WITH_NULL_NULL]
> *** ClientHello, TLSv1.2
> RandomCookie:  GMT: -1820512062 bytes = { 64, 6, 99, 211, 116, 173, 108,
> 226, 253, 149, 49, 235, 200, 156, 119, 226, 92, 124, 69, 218, 214, 105, 68,
> 37, 151, 243, 120, 41 }
> Session ID:  {92, 125, 15, 237, 254, 33, 2, 52, 144, 148, 0, 165, 156,
> 232, 106, 139, 222, 199, 99, 71, 41, 230, 1, 75, 246, 145, 175, 22, 191,
> 231, 28, 218}
> Cipher Suites: [Unknown 0x13:0x2, Unknown 0x13:0x3, Unknown 0x13:0x1,
> Unknown 0x13:0x4, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, Unknown
> 0xcc:0xa9, Unknown 0xc0:0xad, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA,
> TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0xac,
> TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA,
> TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa8,
> TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,
> TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_GCM_SHA384,
> Unknown 0xc0:0x9d, TLS_RSA_WITH_AES_256_CBC_SHA,
> TLS_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9c,
> TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, Unknown
> 0xcc:0xaa, Unknown 0xc0:0x9f, TLS_DHE_RSA_WITH_AES_256_CBC_SHA,
> TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9e,
> TLS_DHE_RSA_WITH_AES_128_CBC_SHA]
> Compression Methods:  { 0 }
> Unsupported extension status_request, data: 01:00:00:00:00
> Extension elliptic_curves, curve names: {secp256r1, secp384r1, secp521r1,
> unknown curve 29, unknown curve 256, unknown curve 257, unknown curve 258,
> unknown curve 259, unknown curve 260}
> *** ClientKeyExchange, DH
> Extension ec_point_formats, formats: [uncompressed]
> https-jsse-nio-8443-exec-9, WRITE: TLSv1.2 Application Data, length = 53
> Standard ciphersuite chosen: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
> *** Diffie-Hellman ServerKeyExchange
> DH Modulus:  { 255, 255, 255, 255, 255, 255, 255, 255,
> https-jsse-nio-8443-exec-6, READ: TLSv1 Handshake, length = 512
> 201%% Negotiating:  [Session-12, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384]
> *** ServerHello, TLSv1.2
> RandomCookie:  GMT: 1551699703 bytes = { 189, 88, 236, 195, 16, 20, ***
> ClientHello, TLSv1.2
> RandomCookie:  GMT: -2052347668 bytes = { Extension signature_algorithms,
> signature_algorithms: SHA256withRSA, Unknown (hash:0x8, signature:0x9),
> Unknown (hash:0x8, signature:0x4), SHA256withECDSA, Unknown (hash:0x8,
> signature:0x7), SHA384withRSA, Unknown (hash:0x8, signature:0xa), Unknown
> (hash:0x8, signature:0x5), SHA384withECDSA, SHA512withRSA, Unknown
> (hash:0x8, signature:0xb), Unknown (hash:0x8, signature:0x6),
> SHA512withECDSA, SHA1withRSA, SHA1withECDSA
> DH Public key:  { 44, 33, 108, 222, 37, 147, 165, 17, 83, 11, 125, 252,
> 177, 121, 176, 220, 53, 161, 114, 76, 39, 221, 24, 63, 102, 217, 38, 175,
> 12, 184, 22, 169, 114, 30, 2, 36, 65, 125, 130, 154, 243, 72, 184, 27, 206,
> 250, 2, 219, 212, 150, 48, 222, 58, 17, 96, 109, 17, 180, 111, 224, 168,
> 191, 38, 96, 214, 110, 81, 34, 212, 94, 3, 119, 24, 43, 189, 128, 60, 93,
> 34, 7, 243, 167, 69, 203, 197, 247, 124, 116, 14, 107, 52, 145, 150, 18,
> 90, 253, 218, 3, 179, 185, 157, 238, 191, 152, 68, 242, 208, 83, 120, 171,
> 228, 145, 249, 212, 132, 160, 48, 67, 206, 49, 40, 43, 165, 58, 143, 82,
> 19, 137 }
> Unsupported extension type_35, data:
> Unsupported extension type_51, data:
> 00:69:00:17:00:41:04:fb:ce:2a:0c:db:49:2b:b8:4c:df:04:e9:fe:c8:83:44:a1:47:5f:59:37:fe:55:ea:46:17:82:64:6a:7f:67:62:19:fd:2f:51:e5:71:ef:51:70:a7:2a:19:88:de:b4:15:41:b6:86:57:a9:a7:16:75:73:ab:fb:f1:e8:6f:e1:17:00:1d:00:20:ec:07:9e:5c:8f:5d:b4:66:c2:f2:55:52:65:25:41:0d:24:27:dc:0d:ad:88:59:19:48:a3:dc:e0:5a:8f:cc:7c
> Unsupported extension type_43, data: 08:03:04:03:03:03:02:03:01
> Extension renegotiation_info, renegotiated_connection: <empty>
> Extension server_name, server_name: [type=host_name (0), value=localhost]
> Unsupported extension type_45, data: 02:01:00
> Unsupported extension type_28, data: 40:00
> Unsupported extension type_21, data:
> 00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00
> ***
> %% Initialized:  [Session-13, SSL_NULL_WITH_NULL_NULL]
> SESSION KEYGEN:
> PreMaster Secret:
> 0000: 14 2B 4A 96 4B DB 65 AE   A4 12 66 E4 51 AE B4 4B  .+J.K.e...f.Q..K
> 0010: CC 85 AD 73 25 8E 51 18   27 97 B8 9E 86 63 D2 C6  ...s%.Q.'....c..
> 0020: C6 BE 67 E5 8B 8C 0E 78   6F 69 E0 E2 6C C1 48 06  ..g....xoi..l.H.
> 0030: 71 DA B2 D6 8A 26 D4 5A   05 9D 7E 83 1D 18 93 C3  q....&.Z........
> 0040: D3 04 28 1E 43 02 31 03   1B 72 45 4A 80 BE F5 19  ..(.C.1..rEJ....
> 0050: D4 EC 73 06 B4 EE FA CC   F1 8C 8F 9F 86 5F 81 B6  ..s.........._..
> 0060: 25 F4 26 24 F1 BD EB 12   B7 40 30 70 BC 05 FC BC  %.&$.....@0p....
> 0070: 70 33 59 E9 71 1C C4 23   5D DA DF 4C 8D 06 F1 E7  p3Y.q..#]..L....
> Standard ciphersuite chosen: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
> %% Negotiating:  [Session-13, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384]
> *** ServerHello, TLSv1.2
> RandomCookie:  GMT: 1551699703 bytes = { 252, 170, 211, 79, 11, 228, 84,
> 65, 15, 83, 81, 221, 200, 117, 89, 186, 233, 119, 90, 185CONNECTION KEYGEN:
> Client Nonce:
> 0000: 31 87 F4 C2 BD 0E D1 B0   61 0F D6 6B 75 3F BB A2  1.......a..ku?..
> 0010: 0C B8 F5 BD F5 E3 7F 80   F4 9A F9 73 65 64 3D 28  ...........sed=(
> Server Nonce:
> 0000: 5C 7D 0F F7 01 4A E6 6E   0E 7B 8F 68 D8 3B 4D 6D  \....J.n...h.;Mm
> 0010: 9C ED 44 98 F1 6A 80 A8   B9 DA 0C CA 06 04 AE 93  ..D..j..........
> Master Secret:
> 0000: 4B 25 56 4E 5D FD 49 87   57 95 61 F8 41 E4 31 7C  K%VN].I.W.a.A.1.
> 0010: EA 86 7F 50 6A FC 09 08   52 3E FC 2E 07 97 05 4E  ...Pj...R>.....N
> 0020: 9C FD AC AB 2F 42 F1 ED   15 4C 13 A3 2B 30 20 58  ..../B...L..+0 X
> ... no MAC keys used for this cipher
> Client write key:
> 0000: 97 B5 1F 11 07 50 73 FE   8C 9E ED 35 58 70 A4 BB  .....Ps....5Xp..
> 0010: 5A EB 7B A0 F8 BC 09 83   67 95 E6 4F 24 8C 74 30  Z.......g..O$.t0
> Server write key:
> 0000: 4C 6A 51 F2 BD FB 38 96   7B 95 F6 1C 5F 5D 09 93  LjQ...8....._]..
> 0010: F5 61 31 9C 3A 0C 9D 50   20 FB 93 92 E6 89 E6 37  .a1.:..P ......7
> Client write IV:
> 0000: 15 B3 BB A8                                        ....
> Server write IV:
> 0000: A0 38 66 10                                        .8f.
> 114, 112, 85, 166, 214, 221, 236, 123, 184, 112, 134, , 15, 218, 162, 33,
> 104, 194, 52, 196, 198, 98, 139, 128, 220, 28, 209, 41, 2, 78, 8, 138, 103,
> 204, 116, 2, 11, 190, 166, 59, 19, 155, 34, 81, 74, 8, 121, 142, 52, 4,
> 221, 239, 149, 25, 179, 205, 58, 67, 27, 48, 43, 10, 109, 242, 95, 20, 55,
> 79, 225, 53, 109, 109, 81, 194, 69, 228, 133, 181, 118, 98, 94, 126, 198,
> 244, 76, 66, 233, 166, 55, 237, 107, 11, 255, 92, 182, 244, 6, 183, 237,
> 238, 56, 107, 251, 90, 137, 159, 165, 174, 159, 36, 17, 124, 75, 31, 230,
> 73, 40, 102, 81, 236, 230, 83, 129, 255, 255, 255, 255, 255, 255, 255, 255 }
> 155, DH Base:  { 2 }
> Server DH Public Key:  { 134, 63, 21, 208, 230, 233, 175, 114, 39, 141,
> 112, 190, 98, 170, 50, 62, 188, 50, 255, 139, 99, 214, 188, 84, 72, 83,
> 180, 84, 119, 199, 203, 23, 228, 34, 201, 57, 130, 183, 252, 53, 152, 17,
> 186, 166https-jsse-nio-8443-exec-4, READ: TLSv1.2 Change Cipher Spec,
> length = 1
> https-jsse-nio-8443-exec-9, WRITE: TLSv1.2 Application Data, length = 20
> 2019-03-04 11:45:59,567 |jsse-nio-8443-exec-9 |ServerHitBin
>   |I| Visit delegatorName=default, ServerHitBin delegatorName=default
> https-jsse-nio-8443-exec-4, READ: TLSv1.2 Handshake, length = 40
> 2019-03-04 11:45:59,586 |jsse-nio-8443-exec-9 |ControlServlet
>   |T| [[[login(Domain:https://localhost)] Request Done- total:0.433,since
> last([login(Domain:htt...):0.433]]
> *** Finished
> verify_data:  { 155, 222, 165, 24, 115, 12, 246, 156, 60, 164, 142, 178 }
> ***
> https-jsse-nio-8443-exec-4, WRITE: TLSv1.2 Change Cipher Spec, length = 1
> *** Finished
> verify_data:  { 6, 6, 16, 184, 161, 157, 241, 204, 225, 185, 204, 190 }
> ***
> , 106, 35, 185, 98, 28, 250, 88, 249 }
> Session ID:  , 2, 255, 71, 96 }
> Session ID:  64, 104, 42, 166, 221, 165, 130, 152, 79, 44, 74, 66, 234,
> 105, 217, 162, 156, 55, 120, 122, 122, 100, 89, 111, 1, 89, 172, 237, 227,
> 121, 153, 61, 228, 161, 19, 115, 184, 42, 124, 190, 204, 189, 222, 120,
> 130, 193, 146, 0, 91, 96, 21, 216, 12, 212, 121, 122, 185, 188, 213, 232,
> 141, 115, 36, 88, 98, 138, 166, 244, 88, 246, 108, 235, 28, 181, 191, 203,
> 95, 70, 83, 147, 235, 212, 94, 154, 107, 232, 137, 63, 123, 156, 188, 229,
> 8, 225, 216, 246, 95, 134, 1, 192, 30 }
> Session ID:  49{92, 125, 15, 247, 188, 79, 171, 39, 143, 40, 158, 162,
> 235, 8, 205, 92, 188, 20, 0, 130, 247, 147, 227, 140, 94, 73, 165, 209,
> 150, 178, 61, 238}
> Cipher Suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
> Compression Method: 0
> https-jsse-nio-8443-exec-9, WRITE: TLSv1.2 Application Data, length = 84
> {92, 125, 15, 237, 254, 33, 2, 52, 144, 148, 0, 165, 156, 232, 106, 139,
> 222, 199, 99, 71, 41, 230, 1, 75, 246, 145, 175, 22, 191, 231, 28, 218}
> Cipher Suites: [Unknown 0x13:0x2, Unknown 0x13:0x3, Unknown 0x13:0x1,
> Unknown 0x13:0x4, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, Unknown
> 0xcc:0xa9, Unknown 0xc0:0xad, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA,
> TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0xac,
> TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA,
> TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa8,
> TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,
> TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_GCM_SHA384,
> Unknown 0xc0:0x9d, TLS_RSA_WITH_AES_256_CBC_SHA,
> TLS_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9c,
> TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, Unknown
> 0xcc:0xaa, Unknown 0xc0:0x9f, TLS_DHE_RSA_WITH_AES_256_CBC_SHA,
> TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9e,
> TLS_DHE_RSA_WITH_AES_128_CBC_SHA]
> Compression Methods:  { 0 }
> Unsupported extension status_request, data: 01:00:00:00:00
> Extension elliptic_curves, curve names: {secp256r1, secp384r1, secp521r1,
> unknown curve 29, unknown curve 256, unknown curve 257, unknown curve 258,
> unknown curve 259, unknown curve 260}
> Extension ec_point_formats, formats: [uncompressed]
> Extension signature_algorithms, signature_algorithms: SHA256withRSA,
> Unknown (hash:0x8, signature:0x9), Unknown (hash:0x8, signature:0x4),
> SHA256withECDSA, Unknown (hash:0x8, signature:0x7), SHA384withRSA, Unknown
> (hash:0x8, signature:0xa), Unknown (hash:0x8, signature:0x5),
> SHA384withECDSA, SHA512withRSA, Unknown (hash:0x8, signature:0xb), Unknown
> (hash:0x8, signature:0x6), SHA512withECDSA, SHA1withRSA, SHA1withECDSA
> Unsupported extension type_35, data:
> Unsupported extension type_51, data:
> 00:69:00:17:00:41:04:09:2c:38:aa:5b:66:0a:29:e1:28:22:44:e6:26:34:0f:77:d8:d5:c5:c2:06:5f:9f:ab:05:cb:26:60:db:ac:37:26:61:cc:69:6c:58:20:88:2f:9d:18:72:cf:2e:01:e5:9b:db:9b:26:c8:95:50:a8:66:9c:e6:30:b2:f5:3d:b0:00:1d:00:20:40:c5:6e:d8:93:c4:ca:68:a7:b1:db:d4:c4:a3:5a:61:73:74:57:c9:d5:cf:2f:c1:21:7a:3a:ff:c3:a0:f5:28
> Unsupported extension type_43, data: 08:03:04:03:03:03:02:03:01
> Extension renegotiation_info, renegotiated_connection: <empty>
> Extension server_name, server_name: [type=host_name (0), value=localhost]
> Unsupported extension type_45, data: 02:01:00
> Unsupported extension type_28, data: 40:00
> Unsupported extension type_21, data:
> 00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00
> ***
> %% Initialized:  [Session-14, SSL_NULL_WITH_NULL_NULL]
> https-jsse-nio-8443-exec-9, READ: TLSv1.2 Alert, length = 26
> {92, 125, 15, 247, 50, 58, 5, 184, 11, 182, 57, 252, 105, 8, 156, 212,
> 100, 243, 238, 186, 235, 226, 190, 120, 154, 82, 26, 51, 98, 107, 132, 131}
> Cipher Suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
> Compression Method: 0
> https-jsse-nio-8443-exec-4, WRITE: TLSv1.2 Handshake, length = 40
> Using SSLEngineImpl.
> %% Cached server session: [Session-10, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384]
> Allow unsafe renegotiation: false
> Allow legacy hello messages: true
> Is initial handshake: true
> Is secure renegotiation: false
> Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for
> TLSv1
> Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for
> TLSv1
> Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for
> TLSv1
> Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for
> TLSv1
> Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for
> TLSv1.1
> Standard ciphersuite chosen: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
> %% Negotiating:  [Session-14, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384]
> *** ServerHello, TLSv1.2
> RandomCookie:  GMT: 1551699703 bytes = { 249, 106, 24, 48, 151, 27, 53,
> 192, 6, 37, 123, 97, 160, 198, 58, 140, 51, 36, 55, 26, 66, 142, 253, 24,
> 76, 152, 166, 217 }
> Session ID:  {92, 125, 15, 247, 242, 122, 131, 156, 80, 117, 217, 241,
> 196, 233, 43, 6, 10, 175, 226, 239, 82, 201, 190, 246, 213, 22, 177, 21,
> 148, 39, 43, 131}
> Cipher Suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
> Compression Method: 0
> Extension renegotiation_info, renegotiated_connection: <empty>
> ***
> Cipher suite:  TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
> *** Certificate chain
> chain [0] = [
> [
>   Version: V3
>   Subject: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org,
> OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US
>   Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5
>
>   Key:  Sun RSA public key, 2048 bits
>   modulus:
> 21944740401167172627731583459321030363948627215746053925732477915060915436180167456469785746662093119306577380200747716284652995937004530444336851845029170241627465854006145050037178991946925696078563485570896673835545540824265905937881682387179314987285174428010940266412458943894800978345731524307952507729956745301047871771953945124256516782917326981125087548987889540650149121302888872237484100834740328828765018090383963294418357028839734723410564800765871733483849269364796949055153420777966213779145518299141217288017794394762274753999989298548507425930217302947589819396239489846633419099079578249651345685751
>   public exponent: 65537
>   Validity: [From: Fri May 30 08:43:19 GMT 2014,
>                To: Mon May 27 08:43:19 GMT 2024]
>   Issuer: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org,
> OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US
>   SerialNumber: [    a6ef7a9a 5368eb27]
>
> Certificate Extensions: 3
> [1]: ObjectId: 2.5.29.35 Criticality=false
> AuthorityKeyIdentifier [
> KeyIdentifier [
> 0000: 78 0D 96 9D FE D3 0B BE   8C C7 E3 EC 67 04 AB 4B  x...........g..K
> 0010: EA E0 00 29                                        ...)
> ]
> ]
>
> [2]: ObjectId: 2.5.29.19 Criticality=false
> BasicConstraints:[
>   CA:true
>   PathLen:2147483647
> ]
>
> [3]: ObjectId: 2.5.29.14 Criticality=false
> SubjectKeyIdentifier [
> KeyIdentifier [
> 0000: 78 0D 96 9D FE D3 0B BE   8C C7 E3 EC 67 04 AB 4B  x...........g..K
> 0010: EA E0 00 29                                        ...)
> ]
> ]
>
> ]
>   Algorithm: [SHA1withRSA]
>   Signature:
> 0000: 19 16 5A 21 99 21 24 98   3C 0A E8 D8 00 AB 44 24  ..Z!.!$.<.....D$
> 0010: F2 0C B7 83 D5 9F 96 17   87 E2 1F 1D A3 47 68 C7  .............Gh.
> 0020: 68 4A CB 56 0E 77 2B E8   1A 9F E7 09 A1 19 77 D0  hJ.V.w+.......w.
> 0030: 5E CC C1 B3 9A C4 35 3D   CB E0 A5 A6 43 5D A3 26  ^.....5=....C].&
> 0040: A4 91 8A C1 FA 7B 10 EA   DC C3 C7 1C 47 DC 97 32  ............G..2
> 0050: C0 37 80 1C F1 42 10 E3   74 17 FA 3E 60 4A B7 59  .7...B..t..>`J.Y
> 0060: 92 C1 E0 6F BB F1 BB 9F   82 89 B5 83 D5 AE 1E 90  ...o............
> 0070: 0A 89 8D FB 4C C0 C5 9E   DC C5 8C C6 2F EE D9 B4  ....L......./...
> 0080: 95 47 27 2E BE 82 31 6F   76 C0 DB 4C C8 0D 3B 7B  .G'...1ov..L..;.
> 0090: D1 6A BF BD 3B 93 30 04   A2 9E 81 F7 96 28 77 F2  .j..;.0......(w.
> 00A0: 32 05 68 44 1F B3 30 CE   40 9F 20 F3 B4 2B AA E6  2.hD..0.@. ..+..
> 00B0: 40 9B FB 7F 34 6E 3A 99   FD F8 28 F1 8C 9B 56 34  @...4n:...(...V4
> 00C0: 64 AD 4D 56 39 CB 96 18   50 9B 99 43 80 0A 39 A5  d.MV9...P..C..9.
> 00D0: 13 7A 6E C5 25 E0 95 4A   92 E5 A8 8B EE 03 49 B4  .zn.%..J......I.
> 00E0: D9 7C 00 E3 F0 3B A7 BA   40 30 CC 89 55 C6 97 93  .....;..@0..U...
> 00F0: B5 15 F6 62 D3 B1 74 9C   0B 80 2B 8A D4 03 84 A0  ...b..t...+.....
>
> ]
> ***
> Extension renegotiation_info, renegotiated_connection: <empty>
> ***
> Cipher suite:  TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
> https-jsse-nio-8443-exec-9, RECV TLSv1.2 ALERT:  warning, close_notify
> https-jsse-nio-8443-exec-9, closeInboundInternal()
> Extension renegotiation_info, renegotiated_connection: <empty>
> ***
> , Cipher suite:  TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
> https-jsse-nio-8443-exec-9, closeOutboundInternal()
> *** Certificate chain
> https-jsse-nio-8443-exec-8, WRITE: TLSv1.2 Application Data, length = 84
> chain [0] = [
> [
>   Version: V3
>   Subject: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org,
> OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US
>   Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5
>
>   Key:  Sun RSA public key, 2048 bits
>   modulus:
> 21944740401167172627731583459321030363948627215746053925732477915060915436180167456469785746662093119306577380200747716284652995937004530444336851845029170241627465854006145050037178991946925696078563485570896673835545540824265905937881682387179314987285174428010940266412458943894800978345731524307952507729956745301047871771953945124256516782917326981125087548987889540650149121302888872237484100834740328828765018090383963294418357028839734723410564800765871733483849269364796949055153420777966213779145518299141217288017794394762274753999989298548507425930217302947589819396239489846633419099079578249651345685751
>   public exponent: 65537
>   Validity: [From: Fri May 30 08:43:19 GMT 2014,
>                To: Mon May 27 08:43:19 GMT 2024]
>   Issuer: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org,
> OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US
>   SerialNumber: [    a6ef7a9a 5368eb27]
>
> Certificate Extensions: 3
> [1]: ObjectId: 2.5.29.35 Criticality=false
> AuthorityKeyIdentifier [
> KeyIdentifier [
> 0000: 78 0D 96 9D FE D3 0B BE   8C C7 E3 EC 67 04 AB 4B  x...........g..K
> 0010: EA E0 00 29                                        ...)
> ]
> ]
>
> [2]: ObjectId: 2.5.29.19 Criticality=false
> BasicConstraints:[
>   CA:true
>   PathLen:2147483647
> ]
>
> [3]: ObjectId: 2.5.29.14 Criticality=false
> SubjectKeyIdentifier [
> KeyIdentifier [
> 0000: 78 0D 96 9D FE D3 0B BE   8C C7 E3 EC 67 04 AB 4B  x...........g..K
> 0010: EA E0 00 29                                        ...)
> ]
> ]
>
> ]
>   Algorithm: [SHA1withRSA]
>   Signature:
> 0000: 19 16 5A 21 99 21 24 98   3C 0A E8 D8 00 AB 44 24  ..Z!.!$.<.....D$
> 0010: F2 0C B7 83 D5 9F 96 17   87 E2 1F 1D A3 47 68 C7  .............Gh.
> 0020: 68 4A CB 56 0E 77 2B E8   1A 9F E7 09 A1 19 77 D0  hJ.V.w+.......w.
> 0030: 5E CC C1 B3 9A C4 35 3D   CB E0 A5 A6 43 5D A3 26  ^.....5=....C].&
> 0040: A4 91 8A C1 FA 7B 10 EA   DC C3 C7 1C 47 DC 97 32  ............G..2
> 0050: C0 37 80 1C F1 42 10 E3   74 17 FA 3E 60 4A B7 59  .7...B..t..>`J.Y
> 0060: 92 C1 E0 6F BB F1 BB 9F   82 89 B5 83 D5 AE 1E 90  ...o............
> 0070: 0A 89 8D FB 4C C0 C5 9E   DC C5 8C C6 2F EE D9 B4  ....L......./...
> 0080: 95 47 27 2E BE 82 31 6F   76 C0 DB 4C C8 0D 3B 7B  .G'...1ov..L..;.
> 0090: D1 6A BF BD 3B 93 30 04   A2 9E 81 F7 96 28 77 F2  .j..;.0......(w.
> 00A0: 32 05 68 44 1F B3 30 CE   40 9F 20 F3 B4 2B AA E6  2.hD..0.@. ..+..
> 00B0: 40 9B FB 7F 34 6E 3A 99   FD F8 28 F1 8C 9B 56 34  @...4n:...(...V4
> 00C0: 64 AD 4D 56 39 CB 96 18   50 9B 99 43 80 0A 39 A5  d.MV9...P..C..9.
> 00D0: 13 7A 6E C5 25 E0 95 4A   92 E5 A8 8B EE 03 49 B4  .zn.%..J......I.
> 00E0: D9 7C 00 E3 F0 3B A7 BA   40 30 CC 89 55 C6 97 93  .....;..@0..U...
> 00F0: B5 15 F6 62 D3 B1 74 9C   0B 80 2B 8A D4 03 84 A0  ...b..t...+.....
>
> ]
> ***
> Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for
> TLSv1.1
> https-jsse-nio-8443-exec-8, READ: TLSv1.2 Alert, length = 26
> *** Diffie-Hellman ServerKeyExchange
> DH Modulus:  { 255, 255, 255, 255, 255, 255, 255, 255, 201, 15, 218, 162,
> 33, 104, 194, 52, 196, 198, 98, 139, 128, 220, 28, 209, 41, 2, 78, 8, 138,
> 103, 204, 116, 2, 11, 190, 166, 59, 19, 155, 34, 81, 74, 8, 121, 142, 52,
> 4, 221, 239, 149, 25, 179, 205, 58, 67, 27, 48, 43, 10, 109, 242, 95, 20,
> 55, 79, 225, 53, 109, 109, 81, 194, 69, 228, 133, 181, 118, 98, 94, 126,
> 198, 244, 76, 66, 233, 166, 55, 237, 107, 11, 255, 92, 182, 244, 6, 183,
> 237, 238, 56, 107, 251, 90, 137, 159, 165, 174, 159, 36, 17, 124, 75, 31,
> 230, 73, 40, 102, 81, 236, 230, 83, 129, 255, 255, Using SSLEngineImpl.
> Allow unsafe renegotiation: false
> Allow legacy hello messages: true
> Is initial handshake: true
> Is secure renegotiation: false
> Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for
> TLSv1
> Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for
> TLSv1
> Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for
> TLSv1
> Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for
> TLSv1
> Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for
> TLSv1.1
> Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for
> TLSv1.1
> Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for
> TLSv1.1
> Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for
> TLSv1.1
> https-jsse-nio-8443-exec-4, READ: TLSv1 Handshake, length = 512
> *** ClientHello, TLSv1.2
> RandomCookie:  GMT: 643821250 bytes = { 137, 48, 182, 80, 80, 34, 131,
> 177, 184, 128, 9, 127, 211, 99, 150, 129, 92, 69, 3, 172, 96, 191, 219,
> 200, 115, 25, 212, 35 }
> Session ID:  {92, 125, 15, 247, 246, 249, 211, 141, 164, 158, 249, 105,
> 184, 211, 34, 29, 135, 131, 232, 36, 64, 192, 38, 174, 54, 83, 112, 53,
> 142, 111, 182, 94}
> Cipher Suites: [Unknown 0x13:0x2, Unknown 0x13:0x3, Unknown 0x13:0x1,
> Unknown 0x13:0x4, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, Unknown
> 0xcc:0xa9, Unknown 0xc0:0xad, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA,
> TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0xac,
> TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA,
> TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa8,
> TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,
> TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_GCM_SHA384,
> Unknown 0xc0:0x9d, TLS_RSA_WITH_AES_256_CBC_SHA,
> TLS_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9c,
> TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, Unknown
> 0xcc:0xaa, Unknown 0xc0:0x9f, TLS_DHE_RSA_WITH_AES_256_CBC_SHA,
> TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9e,
> TLS_DHE_RSA_WITH_AES_128_CBC_SHA]
> Compression Methods:  { 0 }
> Unsupported extension status_request, data: 01:00:00:00:00
> Extension elliptic_curves, curve names: {secp256r1, secp384r1, secp521r1,
> unknown curve 29, unknown curve 256, unknown curve 257, unknown curve 258,
> unknown curve 259, unknown curve 260}
> Extension ec_point_formats, formats: [uncompressed]
> Extension signature_algorithms, signature_algorithms: SHA256withRSA,
> Unknown (hash:0x8, signature:0x9), Unknown (hash:0x8, signature:0x4),
> SHA256withECDSA, Unknown (hash:0x8, signature:0x7), SHA384withRSA, Unknown
> (hash:0x8, signature:0xa), Unknown (hash:0x8, signature:0x5),
> SHA384withECDSA, SHA512withRSA, Unknown (hash:0x8, signature:0xb), Unknown
> (hash:0x8, signature:0x6), SHA512withECDSA, SHA1withRSA, SHA1withECDSA
> Unsupported extension type_35, data:
> Unsupported extension type_51, data:
> 00:69:00:17:00:41:04:78:2b:24:a2:10:62:da:65:7e:7f:87:75:d2:71:65:9b:df:5a:cc:85:8a:dd:8f:da:79:7d:22:ec:77:68:7e:b8:ac:e1:a7:b8:49:c7:09:e1:c9:45:bf:0b:31:62:e8:f6:4d:a9:9a:26:ab:fd:ec:b9:cf:f9:9a:98:fc:6a:05:f3:00:1d:00:20:2f:22:42:1e:67:89:6e:49:6a:48:64:f2:8e:92:11:05:92:e5:7d:8d:85:c7:b0:1f:96:3d:14:aa:8e:b8:74:08
> Unsupported extension type_43, data: 08:03:04:03:03:03:02:03:01
> Extension renegotiation_info, renegotiated_connection: <empty>
> Extension server_name, server_name: [type=host_name (0), value=localhost]
> Unsupported extension type_45, data: 02:01:00
> Unsupported extension type_28, data: 40:00
> Unsupported extension type_21, data:
> 00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00
> ***
> *** Diffie-Hellman ServerKeyExchange
> https-jsse-nio-8443-exec-9, SEND TLSv1.2 ALERT:  warning, description =
> close_notify
> *** Certificate chain
> https-jsse-nio-8443-exec-9, WRITE: TLSv1.2 Alert, length = 26
> https-jsse-nio-8443-exec-9, called closeOutbound()
> https-jsse-nio-8443-exec-9, closeOutboundInternal()
> chain [0] = [
> [
>   Version: V3
>   Subject: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org,
> OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US
>   Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5
>
>   Key:  Sun RSA public key, 2048 bits
>   modulus:
> 21944740401167172627731583459321030363948627215746053925732477915060915436180167456469785746662093119306577380200747716284652995937004530444336851845029170241627465854006145050037178991946925696078563485570896673835545540824265905937881682387179314987285174428010940266412458943894800978345731524307952507729956745301047871771953945124256516782917326981125087548987889540650149121302888872237484100834740328828765018090383963294418357028839734723410564800765871733483849269364796949055153420777966213779145518299141217288017794394762274753999989298548507425930217302947589819396239489846633419099079578249651345685751
>   public exponent: 65537
>   Validity: [From: Fri May 30 08:43:19 GMT 2014,
>                To: Mon May 27 08:43:19 GMT 2024]
>   Issuer: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org,
> OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US
>   SerialNumber: [    a6ef7a9a 5368eb27]
>
> Certificate Extensions: 3
> [1]: ObjectId: 2.5.29.35 Criticality=false
> AuthorityKeyIdentifier [
> KeyIdentifier [
> 0000: 78 0D 96 9D FE D3 0B BE   8C C7 E3 EC 67 04 AB 4B  x...........g..K
> 0010: EA E0 00 29                                        ...)
> ]
> ]
>
> [2]: ObjectId: 2.5.29.19 Criticality=false
> BasicConstraints:[
>   CA:true
>   PathLen:2147483647
> ]
>
> [3]: ObjectId: 2.5.29.14 Criticality=false
> SubjectKeyIdentifier [
> KeyIdentifier [
> 0000: 78 0D 96 9D FE D3 0B BE   8C C7 E3 EC 67 04 AB 4B  x...........g..K
> 0010: EA E0 00 29                                        ...)
> ]
> ]
>
> ]
>   Algorithm: [SHA1withRSA]
>   Signature:
> 0000: 19 16 5A 21 99 21 24 98   3C 0A E8 D8 00 AB 44 24  ..Z!.!$.<.....D$
> 0010: F2 0C B7 83 D5 9F 96 17   87 E2 1F 1D A3 47 68 C7  .............Gh.
> 0020: 68 4A CB 56 0E 77 2B E8   1A 9F E7 09 A1 19 77 D0  hJ.V.w+.......w.
> 0030: 5E CC C1 B3 9A C4 35 3D   CB E0 A5 A6 43 5D A3 26  ^.....5=....C].&
> 0040: A4 91 8A C1 FA 7B 10 EA   DC C3 C7 1C 47 DC 97 32  ............G..2
> 0050: C0 37 80 1C F1 42 10 E3   74 17 FA 3E 60 4A B7 59  .7...B..t..>`J.Y
> 0060: 92 C1 E0 6F BB F1 BB 9F   82 89 B5 83 D5 AE 1E 90  ...o............
> 0070: 0A 89 8D FB 4C C0 C5 9E   DC C5 8C C6 2F EE D9 B4  ....L......./...
> 0080: 95 47 27 2E BE 82 31 6F   76 C0 DB 4C C8 0D 3B 7B  .G'...1ov..L..;.
> 0090: D1 6A BF BD 3B 93 30 04   A2 9E 81 F7 96 28 77 F2  .j..;.0......(w.
> 00A0: 32 05 68 44 1F B3 30 CE   40 9F 20 F3 B4 2B AA E6  2.hD..0.@. ..+..
> 00B0: 40 9B FB 7F 34 6E 3A 99   FD F8 28 F1 8C 9B 56 34  @...4n:...(...V4
> 00C0: 64 AD 4D 56 39 CB 96 18   50 9B 99 43 80 0A 39 A5  d.MV9...P..C..9.
> 00D0: 13 7A 6E C5 25 E0 95 4A   92 E5 A8 8B EE 03 49 B4  .zn.%..J......I.
> 00E0: D9 7C 00 E3 F0 3B A7 BA   40 30 CC 89 55 C6 97 93  .....;..@0..U...
> 00F0: B5 15 F6 62 D3 B1 74 9C   0B 80 2B 8A D4 03 84 A0  ...b..t...+.....
>
> ]
> ***
> 75, %% Initialized:  [Session-15, SSL_NULL_WITH_NULL_NULL]
> DH Modulus:  { 255, 255, 255, 255, 255, 255 }
> https-jsse-nio-8443-exec-8, RECV TLSv1.2 ALERT:  warning, close_notify
> https-jsse-nio-8443-exec-8, closeInboundInternal()
> https-jsse-nio-8443-exec-8, closeOutboundInternal()
> https-jsse-nio-8443-exec-8, SEND TLSv1.2 ALERT:  warning, description =
> close_notify
> https-jsse-nio-8443-exec-8, WRITE: TLSv1.2 Alert, length = 26
> https-jsse-nio-8443-exec-8, called closeOutbound()
> https-jsse-nio-8443-exec-8, closeOutboundInternal()
> Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for
> TLSv1.1
> 255DH Base:  { 2 }
> Server DH Public Key:  { 177, 46, 218, 230, 151, 33, 161, 94, 214, 180,
> 215, 165, 151, 60, 134, 118, 72, 235, 168, 110, 64, 81, 143, 166, 12, 246,
> 101, 54, 179, 48, 30, 25, 217, 6, 0, 82, 255, 156, 50, 42, 163, 245, 129,
> 17, 24, 191, 111, 135, 130, 39, 111, 76, 27, 43, 199, 194, 122, 223, 144,
> 110, 178, 79, 101, 109, 51, 158, 60, 219, 86, 104, 87, 22, 16, 145, 98,
> 213, 41, 162, 41, 194, 85, 251, 46, 21, 164, 92, 82, 43, 64, 134, 22, 167,
> 216, 227, 36, 230, 90, 31, 150, 223, 17, 125, 194, 16, 229, 56, 37, 71,
> 180, 75, 67, 107, 4, 154, 250, 220, 233, 74, 138, 181, 207, 206, 65, 73,
> 71, 142, 1, 225 }
> Signature Algorithm SHA256withRSA
> Signed with a DSA or RSA public key
> *** ServerHelloDone
> https-jsse-nio-8443-exec-6, WRITE: TLSv1.2 Handshake, length = 1697
> Standard ciphersuite chosen: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
> %% Negotiating:  [Session-15, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384]
> *** ServerHello, TLSv1.2
> RandomCookie:  GMT: 1551699703 bytes = { 198, 11, 117, 179, 159, 93, 48,
> 227, 13, 155, 36, 80, 90, 158, 84, 220, 89, 20, 35, 144, 216, 180, 203, 23,
> 217, 172, 24, 58 }
> Session ID:  {92, 125, 15, 247, 11, 132, 70, 127, 210, 91, 74, 138, 226,
> 252, 111, 170, 226, 8, 142, 158, 184, 98, 97, 19, 34, 33, 55, 248, 219, 15,
> 65, 161}
> Cipher Suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
> Compression Method: 0
> Extension renegotiation_info, renegotiated_connection: <empty>
> ***
> Cipher suite:  TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
> *** Certificate chain
> 196, 187, 73, 78, 45, 31, 224, 64, 65, 236, 30, 143, 125, 66, 234 }
> Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for
> TLSv1.1
> https-jsse-nio-8443-exec-6, READ: TLSv1.2 Handshake, length = 134
> *** ClientKeyExchange, DH
> DH Public key:  { 157, 154, 50, 120, 59, 112, 151, 246, 118, 246, 99, 60,
> 208, 120, 179, 160, 184, 247, 26, 167, 185, 205, 106, 238, 241, 71, 3, 69,
> 147, 4, 120, 153, 192, 24, 173, 137, 235, 161, 187, 124, 156, 85, 177, 114,
> 253, 240, 126, 107, 95, 2, 136, 50, 197, 247, 97, 81, 79, 54, 32, 43, 112,
> 132, 176, 192, 158, 187, 122, 171, 118, 218, 96, 214, 148, 234, 43, 164,
> 105, 71, 136, 215, 29, 80, 246, 123, 214, 203, 34, 98, 141, 91, 100, 11,
> 130, 114, 53, 116, 176, 188, 130, 120, 144, 12, 227, 168, 217, 19, 252,
> 132, 217, 104, 81, 169, 205, 73, 108, 87, 232, 158, 7, 239, 184, 156, 165,
> 71, 209, 54, 191, 82 }
> chain [0] = [
> [
>   Version: V3
>   Subject: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org,
> OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US
>   Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5
>
>   Key:  Sun RSA public key, 2048 bits
>   modulus:
> 21944740401167172627731583459321030363948627215746053925732477915060915436180167456469785746662093119306577380200747716284652995937004530444336851845029170241627465854006145050037178991946925696078563485570896673835545540824265905937881682387179314987285174428010940266412458943894800978345731524307952507729956745301047871771953945124256516782917326981125087548987889540650149121302888872237484100834740328828765018090383963294418357028839734723410564800765871733483849269364796949055153420777966213779145518299141217288017794394762274753999989298548507425930217302947589819396239489846633419099079578249651345685751
>   public exponent: 65537
>   Validity: [From: Fri May 30 08:43:19 GMT 2014,
>                To: Mon May 27 08:43:19 GMT 2024]
>   Issuer: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org,
> OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US
>   SerialNumber: [    a6ef7a9a 5368eb27]
>
> Certificate Extensions: 3
> [1]: ObjectId: 2.5.29.35 Criticality=false
> AuthorityKeyIdentifier [
> KeyIdentifier [
> 0000: 78 0D 96 9D FE D3 0B BE   8C C7 E3 EC 67 04 AB 4B  x...........g..K
> 0010: EA E0 00 29                                        ...)
> ]
> ]
>
> [2]: ObjectId: 2.5.29.19 Criticality=false
> BasicConstraints:[
>   CA:true
>   PathLen:2147483647
> ]
>
> [3]: ObjectId: 2.5.29.14 Criticality=false
> SubjectKeyIdentifier [
> KeyIdentifier [
> 0000: 78 0D 96 9D FE D3 0B BE   8C C7 E3 EC 67 04 AB 4B  x...........g..K
> 0010: EA E0 00 29                                        ...)
> ]
> ]
>
> ]
>   Algorithm: [SHA1withRSA]
>   Signature:
> 0000: 19 16 5A 21 99 21 24 98   3C 0A E8 D8 00 AB 44 24  ..Z!.!$.<.....D$
> 0010: F2 0C B7 83 D5 9F 96 17   87 E2 1F 1D A3 47 68 C7  .............Gh.
> 0020: 68 4A CB 56 0E 77 2B E8   1A 9F E7 09 A1 19 77 D0  hJ.V.w+.......w.
> 0030: 5E CC C1 B3 9A C4 35 3D   CB E0 A5 A6 43 5D A3 26  ^.....5=....C].&
> 0040: A4 91 8A C1 FA 7B 10 EA   DC C3 C7 1C 47 DC 97 32  ............G..2
> 0050: C0 37 80 1C F1 42 10 E3   74 17 FA 3E 60 4A B7 59  .7...B..t..>`J.Y
> 0060: 92 C1 E0 6F BB F1 BB 9F   82 89 B5 83 D5 AE 1E 90  ...o............
> 0070: 0A 89 8D FB 4C C0 C5 9E   DC C5 8C C6 2F EE D9 B4  ....L......./...
> 0080: 95 47 27 2E BE 82 31 6F   76 C0 DB 4C C8 0D 3B 7B  .G'...1ov..L..;.
> 0090: D1 6A BF BD 3B 93 30 04   A2 9E 81 F7 96 28 77 F2  .j..;.0......(w.
> 00A0: 32 05 68 44 1F B3 30 CE   40 9F 20 F3 B4 2B AA E6  2.hD..0.@. ..+..
> 00B0: 40 9B FB 7F 34 6E 3A 99   FD F8 28 F1 8C 9B 56 34  @...4n:...(...V4
> 00C0: 64 AD 4D 56 39 CB 96 18   50 9B 99 43 80 0A 39 A5  d.MV9...P..C..9.
> 00D0: 13 7A 6E C5 25 E0 95 4A   92 E5 A8 8B EE 03 49 B4  .zn.%..J......I.
> 00E0: D9 7C 00 E3 F0 3B A7 BA   40 30 CC 89 55 C6 97 93  .....;..@0..U...
> 00F0: B5 15 F6 62 D3 B1 74 9C   0B 80 2B 8A D4 03 84 A0  ...b..t...+.....
>
> ]
> ***
> SESSION KEYGEN:
> PreMaster Secret:
> 0000: 4C 4C 7D 36 B9 C2 EA 5B   14 A6 33 34 1D 0B E1 4C  LL.6...[..34...L
> 0010: FF 80 50 41 86 7E 0E 53   C8 DD F0 E5 78 2A FC A7  ..PA...S....x*..
> 0020: A5 57 35 26 9C C6 DC 32   0A 9F F0 67 B2 E2 97 B6  .W5&...2...g....
> 0030: 91 1D BD C5 F7 D1 BD 87   59 AD 5A C6 6F C1 86 93  ........Y.Z.o...
> 0040: 56 CD E9 09 C2 F1 4B 7D   00 78 FA C0 BF D8 53 44  V.....K..x....SD
> 0050: E8 BF 14 5A AA 28 59 B6   8B 2A DC 92 ED 16 47 B4  ...Z.(Y..*....G.
> 0060: BD 3C 66 98 F8 86 61 AB   3B 2C 02 DE FE 0D CB 53  .<f...a.;,.....S
> 0070: 6D A1 F4 88 82 73 C8 F7   98 CC 42 4A 87 6F 9B DB  m....s....BJ.o..
> CONNECTION KEYGEN:
> Client Nonce:
> 0000: 86 AC A9 EC 72 70 55 A6   D6 DD EC 7B B8 70 86 17  ....rpU......p..
> 0010: E4 22 C9 39 82 B7 FC 35   98 11 BA A6 02 FF 47 60  .".9...5......G`
> Server Nonce:
> 0000: 5C 7D 0F F7 F9 6A 18 30   97 1B 35 C0 06 25 7B 61  \....j.0..5..%.a
> 0010: A0 C6 3A 8C 33 24 37 1A   42 8E FD 18 4C 98 A6 D9  ..:.3$7.B...L...
> Master Secret:
> 0000: D2 6F 9C 6A E2 98 C7 AC   E1 36 49 74 D3 74 72 20  .o.j.....6It.tr
> 0010: 25 16 88 E3 C0 12 14 B0   66 17 52 9A 94 3B 1E AE  %.......f.R..;..
> 0020: DD 7E 78 F7 1C 21 74 67   65 7C 55 09 12 54 65 36  ..x..!tge.U..Te6
> ... no MAC keys used for this cipher
> Client write key:
> 0000: F8 CA 67 96 B0 33 B9 F6   3E EE D8 29 8A 18 70 25  ..g..3..>..)..p%
> 0010: B0 C2 22 05 1E A2 CC C6   9F 92 62 C9 DB D8 AB 46  ..".......b....F
> Server write key:
> 0000: 6F FA 2F 76 B0 CE 3D 38   8B 8C 53 48 3E 16 63 49  o./v..=8..SH>.cI
> 0010: 29 ED B7 D0 85 DD C8 3B   11 19 71 29 BC 2F C0 43  )......;..q)./.C
> Client write IV:
> 0000: 90 75 CF 92                                        .u..
> Server write IV:
> 0000: C3 17 23 D2                                        ..#.
> https-jsse-nio-8443-exec-6, READ: TLSv1.2 Change Cipher Spec, length = 1
> https-jsse-nio-8443-exec-6, READ: TLSv1.2 Handshake, length = 40
> *** Finished
> verify_data:  { 125, 229, 83, 206, 118, 221, 127, 176, 77, 43, 74, 250 }
> ***
> https-jsse-nio-8443-exec-6, WRITE: TLSv1.2 Change Cipher Spec, length = 1
> *** Finished
> verify_data:  { 220, 32, 94, 37, 86, 154, 92, 9, 15, 195, 183, 59 }
> ***
> Signature Algorithm SHA256withRSA
> Signed with a DSA or RSA public key
> *** ServerHelloDone
> *** Diffie-Hellman ServerKeyExchange
> DH Modulus:  { 255, 255, 255, 255, 255, 255, 255, 255, 201, 15, 218, 162,
> 33, 104, 194, 52, 196, 198, 98, 139, 128, 220, 28, 209, 41, 2, 78, 8, 138,
> 103, 204, 116, 2, 11, 190, 166, 59, 19, 155, 34, 81, 74, 8, 121, 142, 52,
> 4, 221, 239, 149, 25, 179, 205, 58, 67, 27, 48, 43, 10, 109, 242, 95, 20,
> 55, 79, 225, 53, 109, 109, 81, 194, , 255, 255, 255, 255, 255, 255, 255,
> 201, *** Diffie-Hellman ServerKeyExchange
> 15DH Modulus:  { 255, 255, 255, 255, 255, 255, 255, 255, 201, 15, 218,
> 162, 33, 104, 194, 52, 196, 198, 98, 139, 128, 220, 28, 209, 41, 2, 78, 8,
> 138, 103, 204, 116, 2, 11, 190, 166, 59, 19, 155, 34, 81, 74, 8, 121, 142,
> 52, 4, 221, 239, 149, 25, 179, 205, 58, 67, 27, 48, 43, 10, 109, 242, 95,
> 20, 55, 79, 225, 53, 109, 109, 81, 194, 69, 228, 133, 181, 118, 98, 94,
> 126, 198, 244, 76, 66, 233, 166, 55, 237, 107, 11, 255, 92, 182, 244, 6,
> 183, 237, 238, 56, 107, 251, 90, 137, 159, 165, 174, 159, 36, 17, 124, 75,
> 31, 230, 73, 40, 102, 81, 236, 230, 83, 129, 255, 255, 255, 255, 255, 255,
> 255, 255 }
> https-jsse-nio-8443-exec-6, WRITE: TLSv1.2 Handshake, length = 40
> 69, 228, 133, 181, 118, 98, 94, 126, 198, 244, 76, 66, 233, 166, 55, 237,
> 107, 11, 255, 92, 182, 244, 6, 183, 237, 238, 56, 107, 251, 90, 137, 159,
> 165, 174, 159, 36, 17, 124, 75, 31, 230, 73, 40, 102, 81, 236, 230, 83,
> 129, 255, 255, 255, 255, 255, 255, 255, 255 }
> https-jsse-nio-8443-exec-1, WRITE: TLSv1.2 Handshake, length = 1697
> https-jsse-nio-8443-exec-7, READ: TLSv1 Handshake, length = 512
> DH Base:  { 2 }
> Server DH Public Key:  { 193, 96, 176, 222, 230, 37, 252, 19, 5, 43, 101,
> 80, 70, 102, 130, 118, 131, 152, 32, 57, 29, 115, 181, 106, 56, 103, 229,
> 196, 134, 219, 63, 212, 96, 179, 36, 86, 213, 90, 81, 245, 4, 58, 100, 54,
> 84, 210, 191, 183, 116, 242, 80, 67, 50, 253, 211, 91, 173, 143, 212, 82,
> 195, 58, 108, 142, 94, 192, 231, 124, 87, 50, 145, 248, 23, 86, 64, 46,
> 122, 103, 165, 81, 62, 140, 56, 244, 41, 224, 250, 39, 64, 223, 7, 39, 34,
> 56, 204, 44, 1, 248, 68, 126, 121, 77, 81, 20, 78, 26, 74, 211, 31, 115,
> 33, 196, 185, 198, 143, 159, 34, 7, 162, 30, 165, 75, 115, 173, 30, 23,
> 147, 152 }
> Signature Algorithm SHA256withRSA
> Signed with a DSA or RSA public key
> *** ServerHelloDone
> https-jsse-nio-8443-exec-4, WRITE: TLSv1.2 Handshake, length = 1697
> %% Cached server session: [Session-14, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384]
> DH Base:  { 2 }
> Server DH Public Key:  { 70, 38, 125, 98, 236, 23, 27, 22, 194, 211, 229,
> 253, 113, 86, 193, 213, 189, 160, 201, 194, 165, 143, 35, 222, 55, 108,
> 224, 113, 136, 247, 119, 255, 38, 167, 5, 67, 240, 61, 189, 136, 208, 229,
> 118, 220, 251, 141, 36, 156, 74, 98, 117, 235, 180, 84, 153, 139, 114, 161,
> 108, 133, 123, 63, 193, 121, 68, 167, 18, 183, 79, 252, 161, 177, 41, 85,
> 193, 92, 167, 191, 42, 54, 87, 60, 213, 143, 93, 116, 122, 227, 157, 37,
> 40, 44, 135, 232, 156, 208, 179, 219, 176, 42, 238, 51, 230, 16, 155, 11,
> 223, 98, 92, 102, 24, 13, 252, 30, 137, 81, 233, 185, 167, 116, 70, 131,
> 130, 117, 144, 239, 35, 50 }
> Signature Algorithm SHA256withRSA
> Signed with a DSA or RSA public key
> *** ServerHelloDone
> , 218, 162, 33, 104, 194, 52, 196, 198, 98, 139, 128, 220, 28, 209, 41, 2,
> 78, 8, 138, 103, 204, 116, 2, 11, 190, 166, 59, 19, 155, 34, 81, 74, 8,
> 121, 142, 52, 4, 221, 239, 149, 25, 179, 205, 58, 67, 27, 48, 43, 10, 109,
> 242, 95, 20, 55, 79, 225, 53, 109, 109, 81, 194, 69, 228, 133, 181, 118,
> 98, 94, 126, 198, 244, 76, 66, 233, 166, 55, 237, 107, 11, 255, 92, 182,
> 244, 6, 183, 237, 238, 56, 107, 251, 90, 137, 159, 165, 174, 159, 36, 17,
> 124, 75, 31, 230, 73, 40, 102, 81, 236, 230, 83, 129, 255, 255, 255, 255,
> 255, 255, 255, 255 }
> DH Base:  { 2 }
> Server DH Public Key:  { 217, 93, 254, 238, 74, 68, 192, 30, 45, 154, 168,
> 126, 223, 188, 188, 211, 23, 82, 229, 4, 203, 84, 246, 79, 209, 112, 187,
> 23, 136, 40, 120, 87, 228, 233, 170, 48, 169, 12, 71, 25, 8, 194, 208, 158,
> 244, 169, 96, 249, 26, 146, 81, 65, 55, 117, 56, 39, 217, 149, 79, 35, 120,
> 140, 70, 159, 60, 191, 88, 188, 142, 205, 168, 124, 168, 227, 63, 194, 245,
> 114, 199, 28, 96, 77, 92, 216, 122, 186, 226, 142, 45, 235, 188, 201, 127,
> 22, 123, 9, 77, 251, 179, 139, 197, 105, 182, 47, 237, 45, 167, 34, 245,
> 143, 156, 101, 223, 218, 239, 63, 147, 168, 245, 151, 61, 224, 1, 76, 140,
> 51, 14, 10 }
> Signature Algorithm SHA256withRSA
> Signed with a DSA or RSA public key
> *** ServerHelloDone
> https-jsse-nio-8443-exec-3, WRITE: TLSv1.2 Handshake, length = 1697
> https-jsse-nio-8443-exec-5, WRITE: TLSv1.2 Handshake, length = 1697
> https-jsse-nio-8443-exec-10, READ: TLSv1.2 Handshake, length = 134
> *** ClientHello, TLSv1.2
> RandomCookie:  GMT: -706604215 bytes = { 196, 111, 179, 208, 244, 129,
> 162, 107, 156, 95, 201, 27, 64, 190, 101, 179, 175, 152, 138, 37, 220, 22,
> 85, 26, 42, 30, 238, 85 }
> Session ID:  {92, 125, 15, 237, 254, 33, 2, 52, 144, 148, 0, 165, 156,
> 232, 106, 139, 222, 199, 99, 71, 41, 230, 1, 75, 246, 145, 175, 22, 191,
> 231, 28, 218}
> Cipher Suites: [Unknown 0x13:0x2, Unknown 0x13:0x3, Unknown 0x13:0x1,
> Unknown 0x13:0x4, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, Unknown
> 0xcc:0xa9, Unknown 0xc0:0xad, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA,
> TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0xac,
> TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA,
> TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa8,
> TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,
> TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_GCM_SHA384,
> Unknown 0xc0:0x9d, TLS_RSA_WITH_AES_256_CBC_SHA,
> TLS_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9c,
> TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, Unknown
> 0xcc:0xaa, Unknown 0xc0:0x9f, TLS_DHE_RSA_WITH_AES_256_CBC_SHA,
> TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9e,
> TLS_DHE_RSA_WITH_AES_128_CBC_SHA]
> Compression Methods:  { 0 }
> Unsupported extension status_request, data: 01:00:00:00:00
> Extension elliptic_curves, curve names: {secp256r1, secp384r1, secp521r1,
> unknown curve 29, unknown curve 256, unknown curve 257, unknown curve 258,
> unknown curve 259, unknown curve 260}
> Extension ec_point_formats, formats: [uncompressed]
> Extension signature_algorithms, signature_algorithms: SHA256withRSA,
> Unknown (hash:0x8, signature:0x9), Unknown (hash:0x8, signature:0x4),
> SHA256withECDSA, Unknown (hash:0x8, signature:0x7), SHA384withRSA, Unknown
> (hash:0x8, signature:0xa), Unknown (hash:0x8, signature:0x5),
> SHA384withECDSA, SHA512withRSA, Unknown (hash:0x8, signature:0xb), Unknown
> (hash:0x8, signature:0x6), SHA512withECDSA, SHA1withRSA, SHA1withECDSA
> Unsupported extension type_35, data:
> Unsupported extension type_51, data:
> 00:69:00:17:00:41:04:ae:26:0e:77:5f:28:ef:c6:07:56:58:e5:86:ad:d2:a9:7f:36:c0:10:9f:b4:2e:3f:6e:38:42:1b:99:da:08:de:71:5e:f8:f6:73:40:34:82:e5:bf:d6:e0:88:5c:5e:76:8d:ac:e8:10:44:c4:a6:31:61:e2:c0:4e:11:a1:c5:d0:00:1d:00:20:ad:5a:7b:16:64:36:ac:fe:0c:1b:a3:66:f3:1c:c5:d6:5c:6d:6d:bf:9e:fd:dd:ba:f2:4a:92:ba:75:36:65:74
> Unsupported extension type_43, data: 08:03:04:03:03:03:02:03:01
> Extension renegotiation_info, renegotiated_connection: <empty>
> Extension server_name, server_name: [type=host_name (0), value=localhost]
> Unsupported extension type_45, data: 02:01:00
> Unsupported extension type_28, data: 40:00
> Unsupported extension type_21, data:
> 00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00
> ***
> %% Initialized:  [Session-16, SSL_NULL_WITH_NULL_NULL]
> https-jsse-nio-8443-exec-8, WRITE: TLSv1.2 Application Data, length = 85
> https-jsse-nio-8443-exec-9, READ: TLSv1.2 Handshake, length = 134
> *** ClientKeyExchange, DH
> DH Public key:  { 208, 16, 173, 145, 228, 230, 22, 149, 101, 4, 218, 106,
> 213, 64, 141, 224, 237, 45, Using SSLEngineImpl.
> *** ClientKeyExchange, DH
> DH Public key:  { 99, 58, 152, 205, 251, 195, 178, 244, 230, 142, 181,
> 100, Allow unsafe renegotiation: false
> Allow legacy hello messages: true
> Is initial handshake: true
> Is secure renegotiation: false
> 230, 59, 209, 239, 243, 185, 102, 26, 219, 196, 138, 199, 133, 254, 120,
> 180, 224, 146, 217, 28, 95, 47, 121, 59, 237, 106, 196, 19, 32, 21, 113, 7,
> 28, 103, 73, 44, 17, 94, 26, 178, 114, 38, 165, 180, 9, 253, 81, 99, 47,
> 217, 91, 119, 129, 125, 254, 52, 168, 237, 176, 114, 0, 68, 154, 65, 203,
> 28, 126, 159, 65, 219, 89, 221, 151, 28, 139, 170, 226, 143, 68, 144, 227,
> 36, 128, 163, 135, 170, 75, 162, 118, 92, 64, 19, 110, 18, 0, 143, 66, 67,
> 214, 64, 42, 63, 128, 101, 101, 77, 217, 92, 2, 213 }
> Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for
> TLSv1
> Standard ciphersuite chosen: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
> 212%% Negotiating:  [Session-16, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384]
> Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for
> TLSv1
> Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for
> TLSv1
> Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for
> TLSv1
> https-jsse-nio-8443-exec-4, READ: TLSv1.2 Handshake, length = 134
> *** ServerHello, TLSv1.2
> Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 for
> TLSv1.1
> Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 for
> TLSv1.1
> SESSION KEYGEN:
> PreMaster Secret:
> https-jsse-nio-8443-exec-6, READ: TLSv1.2 Alert, length = 26
> https-jsse-nio-8443-exec-1, READ: TLSv1.2 Handshake, length = 134
> *** ClientKeyExchange, DH
> DH Public key:  { 232, 46, 72, 12, 170, 19, 61, 133, 121, ***
> ClientKeyExchange, DH
> DH Public key:  { 46, 120, 54, 246, 196, 238, 228, 47, 229, 9, 234, 188,
> 11, 239, 188, 145, 201, 234, 51, 171, 155, 114, 4, 32, 33, 69, 173, 180,
> 48, 249, 215, 103, 201, 25, 255, 111, 63, 186, 171, 93, 189, 90, 205, 116,
> 250, 209, 241, 73, 248, 242, 181, 212, 226, 145, 106, 177, 237, 6, 75, 84,
> 106, 80, 102, 129, 255, 218, 214, 213, 197, 24, 39, 230, 144, 155, 67, 117,
> 220, 21, 92, 132, 111, 212, 218, 30, 61, 255, 73, 221, 128, 47, 22, 85,
> 198, 87, 66, 26, 120, 78, 219, 126, 170, 178, 8, 31, 234, 38, 129, 100,
> 174, 169, 5, 243, 106, 83, 242, 189, 210, 10, 192, 16, 130, 214, 131, 104,
> 204, 204, 6, 65 }
> SESSION KEYGEN:
> PreMaster Secret:
> 0000: 59 6D C0 DA 06 E0 FD 3D   C8 44 C9 73 91 B6 39 3C  Ym.....=.D.s..9<
> 0010: 41 72 7B 70 F4 3B D7 FE   9C 8F F7 F5 64 56 A4 BD  Ar.p.;......dV..
> 0020: BB 3E 1F B5 D3 91 5F E6   E1 04 CB 6A 40 46 B4 91  .>...._....j@F..
> 0030: 95 D7 0C D9 6B DC EC DD   BA FD D8 A2 06 E5 2E 12  ....k...........
> 0040: 7C 47 5A 01 75 BC E5 2E   AC 2F 78 CA CE 0A E5 40  .GZ.u..../x....@
> 0050: 8A 17 97 19 52 B2 46 A2   1A D3 0D 02 D2 35 59 C1  ....R.F......5Y.
> 0060: E6 38 C0 EF DC 67 5C EE   50 B3 34 23 AD 96 4F C3  .8...g\.P.4#..O.
> 0070: CC 69 A1 04 FE 96 FF 22   E7 86 BB A3 A5 D2 74 32  .i....."......t2
> CONNECTION KEYGEN:
> Client Nonce:
> 0000: 93 7D 31 C2 40 06 63 D3   74 AD 6C E2 FD 95 31 EB  ..1.@.c.t.l...1.
> 0010: C8 9C 77 E2 5C 7C 45 DA   D6 69 44 25 97 F3 78 29  ..w.\.E..iD%..x)
> Server Nonce:
> 0000: 5C 7D 0F F7 FC AA D3 4F   0B E4 54 41 0F 53 51 DD  \......O..TA.SQ.
> 0010: C8 75 59 BA E9 77 5A B9   6A 23 B9 62 1C FA 58 F9  .uY..wZ.j#.b..X.
> Master Secret:
> 0000: ED D0 E5 18 AE 36 25 39   46 BA 4B C3 EA 22 8E B5  .....6%9F.K.."..
> 0010: 40 19 5C 46 93 C1 F4 90   3E 66 2F 86 D9 4A F4 CD  @.\F....>f/..J..
> 0020: A6 0A 77 DA 9A 30 37 FA   68 00 0F CA E7 AE 6F C0  ..w..07.h.....o.
> ... no MAC keys used for this cipher
> Client write key:
> 0000: 91 A4 F4 23 6D 8C 87 45   A4 09 04 67 0D 20 AA E2  ...#m..E...g. ..
> 0010: 7C EE 48 CB 6E 0C F1 E3   6C B0 0F 72 4B C1 B8 04  ..H.n...l..rK...
> Server write key:
> 0000: 0A 3D A5 C5 7D F8 54 B2   DC 99 8B 7D A5 95 05 74  .=....T........t
> 0010: DF C6 50 34 F3 2F 0B A7   CC 2A EA 00 C8 79 0C 5F  ..P4./...*...y._
> Client write IV:
> 0000: 62 96 EB 08                                        b...
> Server write IV:
> 0000: 58 D8 ED CD                                        X...
> 0000: Ignoring unsupported cipher suite:
> TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1
> RandomCookie:  GMT: 1551699704 bytes = { 240, https-jsse-nio-8443-exec-1,
> READ: TLSv1.2 Change Cipher Spec, length = 1
> , 66, 5, 10, 121, 136, 226, 41, 170, 37, 114, 13, 145, 74, 43, 3, 99, 230,
> 46, 204, 127, 48, 116, 134, 47, 96, 75, 77 }
> Session ID:  {92, 125, 15, 248, 20, 0, 210, 78, 109, 221, 37, 254, 86,
> 107, 83, 134, 247, 144, 23, 57, 215, 100, 31, 197, 211, 245, 87, 100, 146,
> 61, 193, 176}
> Cipher Suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
> Compression Method: 0
> Extension renegotiation_info, renegotiated_connection: <empty>
> ***
> Cipher suite:  TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
> *** Certificate chain
> chain [0] = [
> [
>   Version: V3
>   Subject: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org,
> OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US
>   Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5
>
>   Key:  Sun RSA public key, 2048 bits
>   modulus:
> 21944740401167172627731583459321030363948627215746053925732477915060915436180167456469785746662093119306577380200747716284652995937004530444336851845029170241627465854006145050037178991946925696078563485570896673835545540824265905937881682387179314987285174428010940266412458943894800978345731524307952507729956745301047871771953945124256516782917326981125087548987889540650149121302888872237484100834740328828765018090383963294418357028839734723410564800765871733483849269364796949055153420777966213779145518299141217288017794394762274753999989298548507425930217302947589819396239489846633419099079578249651345685751
>   public exponent: 65537
>   Validity: [From: Fri May 30 08:43:19 GMT 2014,
>                To: Mon May 27 08:43:19 GMT 2024]
>   Issuer: EMAILADDRESS=[hidden email], CN=ofbiz-vm.apache.org,
> OU=Apache OFBiz, O=Apache Software Fundation, L=Wilmington, ST=DE, C=US
>   SerialNumber: [    a6ef7a9a 5368eb27]
>
> Certificate Extensions: 3
> [1]: ObjectId: 2.5.29.35 Criticality=false
> AuthorityKeyIdentifier [
> KeyIdentifier [
> 0000: 78 0D 96 9D FE D3 0B BE   8C C7 E3 EC 67 04 AB 4B  x...........g..K
> 0010: EA E0 00 29                                        ...)
> ]
> ]
>
> [2]: ObjectId: 2.5.29.19 Criticality=false
> BasicConstraints:[
>   CA:true
>   PathLen:2147483647
> ]
>
> [3]: ObjectId: 2.5.29.14 Criticality=false
> SubjectKeyIdentifier [
> KeyIdentifier [
> 0000: 78 0D 96 9D FE D3 0B BE   8C C7 E3 EC 67 04 AB 4B  x...........g..K
> 0010: EA E0 00 29                                        ...)
> ]
> ]
>
> ]
>   Algorithm: [SHA1withRSA]
>   Signature:
> 0000: 19 16 5A 21 99 21 24 98   3C 0A E8 D8 00 AB 44 24  ..Z!.!$.<.....D$
> 0010: F2 0C B7 83 D5 9F 96 17   87 E2 1F 1D A3 47 68 C7  .............Gh.
> 0020: 68 4A CB 56 0E 77 2B E8   1A 9F E7 09 A1 19 77 D0  hJ.V.w+.......w.
> 0030: 5E CC C1 B3 9A C4 35 3D   CB E0 A5 A6 43 5D A3 26  ^.....5=....C].&
> 0040: A4 91 8A C1 FA 7B 10 EA   DC C3 C7 1C 47 DC 97 32  ............G..2
> 0050: C0 37 80 1C F1 42 10 E3   74 17 FA 3E 60 4A B7 59  .7...B..t..>`J.Y
> 0060: 92 C1 E0 6F BB F1 BB 9F   82 89 B5 83 D5 AE 1E 90  ...o............
> 0070: 0A 89 8D FB 4C C0 C5 9E   DC C5 8C C6 2F EE D9 B4  ....L......./...
> 0080: 95 47 27 2E BE 82 31 6F   76 C0 DB 4C C8 0D 3B 7B  .G'...1ov..L..;.
> 0090: D1 6A BF BD 3B 93 30 04   A2 9E 81 F7 96 28 77 F2  .j..;.0......(w.
> 00A0: 32 05 68 44 1F B3 30 CE   40 9F 20 F3 B4 2B AA E6  2.hD..0.@. ..+..
> 00B0: 40 9B FB 7F 34 6E 3A 99   FD F8 28 F1 8C 9B 56 34  @...4n:...(...V4
> 00C0: 64 AD 4D 56 39 CB 96 18   50 9B 99 43 80 0A 39 A5  d.MV9...P..C..9.
> 00D0: 13 7A 6E C5 25 E0 95 4A   92 E5 A8 8B EE 03 49 B4  .zn.%..J......I.
> 00E0: D9 7C 00 E3 F0 3B A7 BA   40 30 CC 89 55 C6 97 93  .....;..@0..U...
> 00F0: B5 15 F6 62 D3 B1 74 9C   0B 80 2B 8A D4 03 84 A0  ...b..t...+.....
>
> ]
> ***
> Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for
> TLSv1.1
> 5A C281, https-jsse-nio-8443-exec-6, RECV TLSv1.2 ALERT:  warning,
> close_notify
> 210, 61, 65, 243, 90, 104, 18, 96, 28, 113, 196, 45, 144, 243, 58, 106,
> 169, 94, 72, 94, 240, 76, 113, 253, 130, 8, 5, 184, 63, 94, 56, 3, 237, 54,
> 186, 215, 56, 73, 143, 221, 7, 192, 57, 62, 102, 229, 124, 182, 82, 22,
> 166, 26, 178, 49, 228, 247, 66, 122, 56, 56, 145, 115, 4, 254, 173, 207,
> 236, 153, 164, 248, 22, 136, 81, 255, 249, 14, 239, 167, 16, 76, 191, 30,
> 97, 119, 156, 249, 123, 175, 67, 219, 182, 80, 213, 154, 58, 80, 26, 125,
> 234, 22, 46, 190, 158, 136, 128, 230, 85, 235, 253, 252, 7, 121, 53, 173,
> 192, 154, 10, 250 }
>  65 CB D3 3B F6 53   4C 70 97 C9 BF 3F C6 61  Z.e..;.SLp...?.a
> *** Diffie-Hellman ServerKeyExchange
> https-jsse-nio-8443-exec-2, READ: TLSv1 Handshake, length = 512
> https-jsse-nio-8443-exec-1, READ: TLSv1.2 Handshake, length = 40
> 228, 19, 111, 132, 5, 153, 164, 197, 51, 211, 40, 81, 12*** Finished
> verify_data:  { *** ClientHello, TLSv1.2
> RandomCookie:  DH Modulus:  { 255, 255, 255, 255, 255, 255, 255, 255, 201,
> 15, 218, 162, 33, 104, 194, 52, 196, 198, 98, 139, 128, 220, 28, 209, 41,
> 2, 78, 8, 138, 103, 204, 116, 2, 11, 190, 166, 59, 19, 155, 34, 81, 74, 8,
> 121, 142, 52, 4, 221, 239, 149, 25, 179, 205, 58, 67, 27, 48, 43, 10, 109,
> 242, 95, 20, 55, 79, 225, 53, 109, 109, 81, 194, 69, 228, 133, 181, 118,
> 98, 94, 126, 198, 244, 76, 66, 233, 166, 55, 237, 107, 11, 255, 92, 182,
> 244, 6, 183, 237, 238, 56, 107, 251, 90, 137, 159, 165, 174, 159, 36, 17,
> 124, 75, 31, 230, 73, 40, 102, 81, 236, 230, 83, 129, 255, 255, 255, 255,
> 255, 255, 255, 255 }
> 0DH Base:  { 2 }
> Server DH Public Key:  { 225, 196, 9, 203, 159, 36, 70, 130, 168, 179, 12,
> 214, 43, 37, 14, 184, 16, 20, 34, 219, 146, 253, 158, 33, 160, 120, 135,
> 180, 43, 238, 142, 126, 36, 52, 94, 43, 92, 95, 237, 49, 47, 215, 84, 215,
> 14, 2, 27, 175, 213, 51, 70, 8, 201, 149, 240, 185, 233, 245, 136, 127, 10,
> 169, 220, 37, 118, 74, 127, 187, 232, 33, 189, 146, 233, 207, 195, 33, 253,
> 253, 142, 255, 173, 36, 104, 218, 71, 145, 83, 227, 131, 161, 114, 147,
> 204, 167, 94, 16, 138, 48, 160, 196, 62, 163, 91, 149, 192, 13, 119, 174,
> 17, 195, 246, 173, 41, 105, 89, 10, 173, 117, 66, 142, 117, 109, 170, 166,
> 222, 236, 75, 24 }
> https-jsse-nio-8443-exec-6, closeInboundInternal()
> Signature Algorithm SHA256withRSA
> Signed with a DSA or RSA public key
> 0GMT: 915489528 bytes = { 180, 177, 67, 45, 220, 94, 41, 31, 176, 92, 88,
> 131, 209, 94, 66, 79, 36, 219, 209, 125, 40, 70, 151, 96, 157, 186, 199,
> 228, 116, 209, 49, 40 }
> ***
> , 62, 227, 215, 145, 41, 40, 31, 84, 13, 129, 91, 164, 94, 141, 87, 230,
> 255, 230, 207, 161, 249, 85, 134, 235, 51, 51, 15, 120, 225, 102, 48, 88,
> 37, 12, 39, 198https-jsse-nio-8443-exec-1, WRITE: TLSv1.2 Change Cipher
> Spec, length = 1
> 24, 173, 223, 211, 185, 225, 136, 207 }
> Session ID:  *** ServerHelloDone
> https-jsse-nio-8443-exec-7, WRITE: TLSv1.2 Handshake, length = 1697
> SESSION KEYGEN:
> PreMaster Secret:
> 0000: EC 84 E2 AF 4B 91 CF 27   ED FC C7 B8 66 24 4A 45  ....K..'....f$JE
> 0010: 58 83 59 28 AE DE 2A FC   3F 52 C8 48 B4 86 8C EF  X.Y(..*.?R.H....
> 0020: 96 1C 7B 8A C8 57 D9 73   9E EE 4D 9A FD 59 C1 46  .....W.s..M..Y.F
> 0030: 34 67 31 EA CC DA F8 16   4D 7C 23 F6 F2 78 D7 9B  4g1.....M.#..x..
> 0040: 6D 1B 29 26 CA 2C DC E5   C8 AA E9 3C 9A D3 1C 75  m.)&.,.....<...u
> 0050: 80 A6 38 9B 54 5D A5 30   00 3F 62 36 6A 1C 25 69  ..8.T].0.?b6j.%i
> 0060: CE E1 F5 5D 26 62 D5 9F   CB 23 66 C6 DC DB FA D0  ...]&b...#f.....
> 0070: 9F 04 50 0E F6 6B BE BC   69 54 D4 1A 9A C9 DD B2  ..P..k..iT......
> CONNECTION KEYGEN:
> Client Nonce:
> 0000: 38 DB AB 52 AE 54 3F 8E   83 67 62 A6 37 28 FF D0  8..R.T?..gb.7(..
> 0010: BA 9D B6 5B D5 FE AD 5E   77 37 4A 33 80 10 1B 7F  ...[...^w7J3....
> Server Nonce:
> 0000: 5C 7D 0F F7 BD 58 EC C3   10 14 9B EB D4 5E 9A 6B  \....X.......^.k
> 0010: E8 89 3F 7B 9C BC E5 08   E1 D8 F6 5F 86 01 C0 1E  ..?........_....
> Master Secret:
> 0000: 35 9F E4 FF 5D CB EE 25   07 42 86 BD 40 41 54 47  5...]..%.B..@ATG
> 0010: 22 C5 90 43 E2 3F 8D 62   5C EF C8 9B 99 6B 3C A5  "..C.?.b\....k<.
> 0020: 01 56 09 F5 59 81 B6 69   DD 6F 70 56 27 D1 BB A9  .V..Y..i.opV'...
> ... no MAC keys used for this cipher
> Client write key:
> 0000: F6 28 16 6D F2 29 14 FD   CB 09 E9 7D 62 1A 90 18  .(.m.)......b...
> 0010: E5 9E E5 0F 77 CB 78 E5   22 79 25 5D 3E D1 11 74  ....w.x."y%]>..t
> Server write key:
> 0000: 07 51 6B A8 67 B8 A1 01   9B 54 97 E4 79 CC E8 AD  .Qk.g....T..y...
> 0010: 0C DE 7C EC BB 2B 9B 4C   22 8F D3 B1 F8 19 BA 88  .....+.L".......
> Client write IV:
> 0000: 10 9A BF 5B                                        ...[
> Server write IV:
> 0000: DF 04 1F 6C                                        ...l
> https-jsse-nio-8443-exec-6, closeOutboundInternal()
> https-jsse-nio-8443-exec-3, READ: TLSv1.2 Handshake, length = 134
> 1https-jsse-nio-8443-exec-4, READ: TLSv1.2 Change Cipher Spec, length = 1
> {92, 125, 15, 247, 242, 122, 131, 156, 80, 117, 217, 241, 196, 233, 43, 6,
> 10, 175, 226, 239, 82, 201, 190, 246, 213, 22, 177, 21, 148, 39, 43, 131}
> *** Finished
> Cipher Suites: [Unknown 0x13:0x2, Unknown 0x13:0x3, Unknown 0x13:0x1,
> Unknown 0x13:0x4, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, Unknown
> 0xcc:0xa9, Unknown 0xc0:0xad, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA,
> TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0xac,
> TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA,
> TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, Unknown 0xcc:0xa8,
> TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,
> TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_GCM_SHA384,
> Unknown 0xc0:0x9d, TLS_RSA_WITH_AES_256_CBC_SHA,
> TLS_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9c,
> TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, Unknown
> 0xcc:0xaa, Unknown 0xc0:0x9f, TLS_DHE_RSA_WITH_AES_256_CBC_SHA,
> TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xc0:0x9e,
> TLS_DHE_RSA_WITH_AES_128_CBC_SHA]
> Compression Methods:  { 0https-jsse-nio-8443-exec-4, READ: TLSv1.2
> Handshake, length = 40
> , 231, 92, 16, 188, 236, 216, 59, 248, 130, 122, 175, 64, 140, 220, 165,
> 235, 54, 101, 249, 188, 70, 141, 22, 138, 208, 12, 114, 179, 69, 43, 173,
> 235, 228, 226, 133, 56, 228, 5, 248, 151, 65, 240, 46, 149, 66, 30, 101,
> 199, 252, 57, 235, 185, 122, 71, 60, 156, 67, 80, 118, 190, 192, 214, 11,
> 134, 120, 199 }
>  }
> Unsupported extension status_request, data: 01:00:00:00:00
> Extension elliptic_curves, curve names: {secp256r1, secp384r1, secp521r1,
> unknown curve 29, unknown curve 256, unknown curve 257, unknown curve 258,
> unknown curve 259, unknown curve 260}
> Extension ec_point_formats, formats: [uncompressed]
> Extension signature_algorithms, signature_algorithms: SHA256withRSA,
> Unknown (hash:0x8, signature:0x9), Unknown (hash:0x8, signature:0x4),
> SHA256withECDSA, Unknown (hash:0x8, signature:0x7), SHA384withRSA, Unknown
> (hash:0x8, signature:0xa), Unknown (hash:0x8, signature:0x5),
> SHA384withECDSA, SHA512withRSA, Unknown (hash:0x8, signature:0xb), Unknown
> (hash:0x8, signature:0x6), SHA512withECDSA, SHA1withRSA, SHA1withECDSA
> Unsupported extension type_35, data:
> Unsupported extension type_51, data:
> 00:69:00:17:00:41:04:e5:71:64:63:ab:d5:21:e5:e0:8f:5f:01:36:23:4c:11:7c:4e:ec:a0:36:e8:20:6a:19:d7:a6:96:f7:ae:8f:f0:75:6f:84:31:6c:d9:f5:7e:aa:9e:9d:2f:0d:0e:95:2f:00:64:06:ad:89:a8:91:09:cd:05:7d:22:27:04:f8:79:00:1d:00:20:7f:c9:a3:77:64:c6:cc:dc:c5:6c:ba:d9:df:4c:f2:a5:9b:41:52:eb:54:e7:81:e9:7a:f0:87:62:06:2a:9d:73
> Unsupported extension type_43, data: 08:03:04:03:03:03:02:03:01
> Extension renegotiation_info, renegotiated_connection: <empty>
> Extension server_name, server_name: [type=host_name (0), value=localhost]
> Unsupported extension type_45, data: 02:01:00
> Unsupported extension type_28, data: 40:00
> Unsupported extension type_21, data:
> 00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00
> ***
> %% Initialized:  [Session-17, SSL_NULL_WITH_NULL_NULL]
> SESSION KEYGEN:
> PreMaster Secret:
> 0000: 53 15 0E 57 81 D4 3F 72   C8 F3 EB 48 2A CE 87 89  S..W..?r...H*...
> 0010: F9 F3 27 EC 8A 3F 65 5D   13 EB 50 C4 3F 01 38 B5  ..'..?e]..P.?.8.
> 0020: FA A6 96 DC 2C FF B5 27   01 89 DF 30 D7 98 B0 FC  ....,..'...0....
> 0030: 11 6D AF FF 57 B7 70 FA   F2 21 C0 5B 6A 55 A1 05  .m..W.p..!.[jU..
> 0040: 61 52 CB EE EF 5C 32 F2   58 38 BD F3 8C 89 FB EA  aR...\2.X8......
> 0050: 15 1E C5 BE A0 verify_data:  { 36, 140, 166, 251, 242, 132, 240, 1,
> 173, 233, 78, 233 }
> ***
> *** ClientKeyExchange, DH
> DH Public key:  { 183, 105, 72, 155, 174, 61, 85, 44, 148, 245, 41, 252,
> 1, 127, 50, 68, 236, 105, 47, 121, 185, 243, 220, 146, 158, 27, 2, 49, 162,
> 47, 102, 240, 49, 27, 26, 167, 147, 109, 146, 18, 83, 11, 141, 182, 182,
> 20, 168, 127, 48, 27, 96, 155, 76, 165, 183, 113, 231, 32, 47, 8, 129, 74,
> 221, 88, 102, 249, 151, 140, 201, 51, 130, 38, 8, 43, 47, 212, 51, 104,
> 107, 91, 9, 61, 100, 10, 84, 201, 180, 215, 231, 53, 114, 245, 86, 111,
> 190, 165, 240, 125, 20, 199, 70, 65, 228, 59, 113, 164, 148, 69, 54, 217,
> 103, 140, 119, 16, 79, 217, 2, 38, 134, 91, 160, 73, 57, 40, 84, 224, 138,
> 84 }
> 0: B2 F5 EF E4 EA EF B4 BB   B6 48 19 3F F6 0B BA 13  .........H.?....
> 0020: 68 F9 69 0D C5 EA A2 C1   B4 43 73 D3 98 96 E8 8F  h.i......Cs.....
> 0030: C1 2B 64 5D 8B 46 74 28   A9 01 60 8F 96 6F 13 0E  .+d].Ft(..`..o..
> 0040: 32 C3 3D A1 D1 4D 15 6E   DE 54 BA C4 1B 4B 16 8A  2.=..M.n.T...K..
> 0050: 25 79 21 F1 71 ED 5B D2   ED 8C 04 5B F0 5F EE F8  %y!.q.[....[._..
> 0060: F5 4D ED 8E BC 96 6E 23   A2 A0 8A 72 DE 59 28 50  .M....n#...r.Y(P
> 0070: AB AE E4 CF 4E 1D F2 B4   58 AE 49 0A 86 6A 79 48  ....N...X.I..jyH
> CONNECTION KEYGEN:
> Client Nonce:
> 0000: 35 22 15 5B 46 40 63 FC   FC F3 F7 3D 54 63 E1 16  5".[F@c....=Tc..
> 0010: C5 D9 E8 CC 53 DB 4D 60   D9 E0 24 10 4B FA 73 D2  ....S.M`..$.K.s.
> Server Nonce:
> 0000: 5C 7D 0F F7 54 39 9A 14   43 A1 7D 68 18 FD F9 AC  \...T9..C..h....
> 0010: 43 8A 2C A3 98 EE B5 EF   D9 17 31 95 79 0B 8E 7B  C.,.......1.y...
> Master Secret:
> 0000: 9E AD 80 A5 33 76 EF 56   2B 51 34 CC BE 6C 36 D8  ....3v.V+Q4..l6.
> 0010: 7F C7 F9 A8 E8 4C FA 92   EA E7 CC 30 41 25 FC 41  .....L.....0A%.A
> 0020: 47 19 CC 12 BD 35 15 A7   F5 77 42 F1 E7 18 96 67  G....5...wB....g
> ... no MAC keys used for this cipher
> Client write key:
> 0000: A5 AA 55 23 86 74 FF 71   D8 67 F7 BB AF 01 92 D5  ..U#.t.q.g......
> 0010: 76 FD 91 B8 65 B4 B6 AD   DA 02 02 71 BC 16 4B 8C  v...e......q..K.
> Server write key:
> 0000: 5F 12 55 DA CF 72 DD 2D   C7 64 25 48 44 C6 46 2E  _.U..r.-.d%HD.F.
> 0010: D6 AE F7 B1 2D 44 1F 8A   F9 64 6E 7F 66 FA 99 87  ....-D...dn.f...
> Client write IV:
> 0000: 2A 27 FD E9                                        *'..
> Server write IV:
> 0000: 61 C5 8A 36
Reply | Threaded
Open this post in threaded view
|

Re: Updating SSL certificate version

mthl
Hello Girish,

Girish Vasmatkar <[hidden email]> writes:

> I tried reproducing the issue you're facing with GNU Icecat by providing
> the exact cipher suites (that Icecat seems to present in the logs) to my
> local OFBiz installation. However, the handshake seems to be working for me.
>
> There seems to be no issue with respect to the protocol version used. It is
> all coming down to the fact that Icecat and OFBiz jvm can't settle down on
> the cipher suite to choose. As for Epiphany, I could see common cipher
> suites sent by both Icecat and Epiphany and yet OFBiz denying handshake.
>
> I'll see if there is more I can extract out of the logs but at the moment I
> can't think of a proper solution here apart from installing JCE Unlimited
> Strength in the JVM and see if you can get the handshake working.

It seems like the issue is coming from the java implementation I am
using which is icedtea 3.7 [1].  I tried with OpenJDK 10 which is
available on my distro and the SSL handshake issue dissapeared.

With OFBiz going to upgrade to Java 11, I think this issue doesn't worth
the effort of investigating further.

Thank you very much for investigating.

[1] https://icedtea.classpath.org/wiki/Main_Page

--
Mathieu Lirzin
GPG: F2A3 8D7E EB2B 6640 5761  070D 0ADE E100 9460 4D37