Created
December 21, 2019 11:54
-
-
Save fcracker79/81bc7a9fdc1dda4617b404c8aedf1c45 to your computer and use it in GitHub Desktop.
Successful SSL handshake to get SMAPI token
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
/usr/lib/jvm/jdk-11.0.2/bin/java -Djavax.net.debug=ssl,handshake -javaagent:/home/mypc/.local/share/JetBrains/Toolbox/apps/IDEA-C/ch-0/193.5233.102/lib/idea_rt.jar=43707:/home/mypc/.local/share/JetBrains/Toolbox/apps/IDEA-C/ch-0/193.5233.102/bin -Dfile.encoding=UTF-8 -classpath /home/mypc/dev/java/quarkus/alexa_swear/target/classes:/home/mypc/.m2/repository/io/xlate/property-inject/1.0.5/property-inject-1.0.5.jar:/home/mypc/.m2/repository/org/apache/logging/log4j/log4j-core/2.8.2/log4j-core-2.8.2.jar:/home/mypc/.m2/repository/org/apache/logging/log4j/log4j-api/2.8.2/log4j-api-2.8.2.jar:/home/mypc/.m2/repository/com/amazon/alexa/ask-sdk/2.27.1/ask-sdk-2.27.1.jar:/home/mypc/.m2/repository/com/amazon/alexa/ask-sdk-core/2.27.1/ask-sdk-core-2.27.1.jar:/home/mypc/.m2/repository/com/amazon/alexa/ask-sdk-runtime/2.27.1/ask-sdk-runtime-2.27.1.jar:/home/mypc/.m2/repository/com/fasterxml/jackson/core/jackson-core/2.9.10/jackson-core-2.9.10.jar:/home/mypc/.m2/repository/com/amazon/alexa/ask-sdk-model/1.25.1/ask-sdk-model-1.25.1.jar:/home/mypc/.m2/repository/com/amazon/alexa/ask-sdk-lambda-support/2.27.1/ask-sdk-lambda-support-2.27.1.jar:/home/mypc/.m2/repository/commons-io/commons-io/2.6/commons-io-2.6.jar:/home/mypc/.m2/repository/com/amazon/alexa/ask-sdk-servlet-support/2.27.1/ask-sdk-servlet-support-2.27.1.jar:/home/mypc/.m2/repository/commons-codec/commons-codec/1.13/commons-codec-1.13.jar:/home/mypc/.m2/repository/com/amazon/alexa/ask-sdk-dynamodb-persistence-adapter/2.27.1/ask-sdk-dynamodb-persistence-adapter-2.27.1.jar:/home/mypc/.m2/repository/com/amazonaws/aws-java-sdk-dynamodb/1.11.420/aws-java-sdk-dynamodb-1.11.420.jar:/home/mypc/.m2/repository/com/amazonaws/aws-java-sdk-s3/1.11.420/aws-java-sdk-s3-1.11.420.jar:/home/mypc/.m2/repository/com/amazonaws/aws-java-sdk-kms/1.11.420/aws-java-sdk-kms-1.11.420.jar:/home/mypc/.m2/repository/com/amazonaws/jmespath-java/1.11.420/jmespath-java-1.11.420.jar:/home/mypc/.m2/repository/com/amazon/alexa/ask-sdk-apache-client/2.27.1/ask-sdk-apache-client-2.27.1.jar:/home/mypc/.m2/repository/com/amazon/alexa/ask-sdk-model-runtime/1.0.0/ask-sdk-model-runtime-1.0.0.jar:/home/mypc/.m2/repository/com/fasterxml/jackson/core/jackson-annotations/2.9.10/jackson-annotations-2.9.10.jar:/home/mypc/.m2/repository/org/apache/httpcomponents/httpclient/4.5.9/httpclient-4.5.9.jar:/home/mypc/.m2/repository/org/apache/httpcomponents/httpcore/4.4.11/httpcore-4.4.11.jar:/home/mypc/.m2/repository/commons-logging/commons-logging/1.2/commons-logging-1.2.jar:/home/mypc/.m2/repository/com/amazon/alexa/ask-sdk-freemarker/2.27.1/ask-sdk-freemarker-2.27.1.jar:/home/mypc/.m2/repository/org/freemarker/freemarker/2.3.28/freemarker-2.3.28.jar:/home/mypc/.m2/repository/org/apache/logging/log4j/log4j-slf4j-impl/2.8.2/log4j-slf4j-impl-2.8.2.jar:/home/mypc/.m2/repository/com/amazonaws/aws-xray-recorder-sdk-aws-sdk/1.1.2/aws-xray-recorder-sdk-aws-sdk-1.1.2.jar:/home/mypc/.m2/repository/com/amazonaws/aws-xray-recorder-sdk-core/1.1.2/aws-xray-recorder-sdk-core-1.1.2.jar:/home/mypc/.m2/repository/com/amazonaws/aws-java-sdk-core/1.11.698/aws-java-sdk-core-1.11.698.jar:/home/mypc/.m2/repository/software/amazon/ion/ion-java/1.0.2/ion-java-1.0.2.jar:/home/mypc/.m2/repository/com/fasterxml/jackson/dataformat/jackson-dataformat-cbor/2.9.10/jackson-dataformat-cbor-2.9.10.jar:/home/mypc/.m2/repository/com/amazonaws/aws-xray-recorder-sdk-aws-sdk-instrumentor/1.1.2/aws-xray-recorder-sdk-aws-sdk-instrumentor-1.1.2.jar:/home/mypc/.m2/repository/io/quarkus/quarkus-amazon-lambda/1.0.0.CR1/quarkus-amazon-lambda-1.0.0.CR1.jar:/home/mypc/.m2/repository/com/amazonaws/aws-lambda-java-core/1.1.0/aws-lambda-java-core-1.1.0.jar:/home/mypc/.m2/repository/com/amazonaws/aws-lambda-java-events/2.2.5/aws-lambda-java-events-2.2.5.jar:/home/mypc/.m2/repository/joda-time/joda-time/2.6/joda-time-2.6.jar:/home/mypc/.m2/repository/io/quarkus/quarkus-core/1.0.0.CR1/quarkus-core-1.0.0.CR1.jar:/home/mypc/.m2/repository/jakarta/annotation/jakarta.annotation-api/1.3.5/jakarta.annotation-api-1.3.5.jar:/home/mypc/.m2/repository/jakarta/enterprise/jakarta.enterprise.cdi-api/2.0.2/jakarta.enterprise.cdi-api-2.0.2.jar:/home/mypc/.m2/repository/jakarta/el/jakarta.el-api/3.0.3/jakarta.el-api-3.0.3.jar:/home/mypc/.m2/repository/jakarta/interceptor/jakarta.interceptor-api/1.2.5/jakarta.interceptor-api-1.2.5.jar:/home/mypc/.m2/repository/jakarta/ejb/jakarta.ejb-api/3.2.6/jakarta.ejb-api-3.2.6.jar:/home/mypc/.m2/repository/jakarta/transaction/jakarta.transaction-api/1.3.3/jakarta.transaction-api-1.3.3.jar:/home/mypc/.m2/repository/jakarta/inject/jakarta.inject-api/1.0/jakarta.inject-api-1.0.jar:/home/mypc/.m2/repository/io/smallrye/smallrye-config/1.3.9/smallrye-config-1.3.9.jar:/home/mypc/.m2/repository/org/eclipse/microprofile/config/microprofile-config-api/1.3/microprofile-config-api-1.3.jar:/home/mypc/.m2/repository/org/jboss/logging/jboss-logging/3.3.2.Final/jboss-logging-3.3.2.Final.jar:/home/mypc/.m2/repository/org/jboss/logmanager/jboss-logmanager-embedded/1.0.3/jboss-logmanager-embedded-1.0.3.jar:/home/mypc/.m2/repository/org/jboss/logging/jboss-logging-annotations/2.1.0.Final/jboss-logging-annotations-2.1.0.Final.jar:/home/mypc/.m2/repository/org/jboss/threads/jboss-threads/3.0.0.Final/jboss-threads-3.0.0.Final.jar:/home/mypc/.m2/repository/org/slf4j/slf4j-api/1.7.25/slf4j-api-1.7.25.jar:/home/mypc/.m2/repository/org/jboss/slf4j/slf4j-jboss-logging/1.2.0.Final/slf4j-jboss-logging-1.2.0.Final.jar:/home/mypc/.m2/repository/org/graalvm/sdk/graal-sdk/19.2.1/graal-sdk-19.2.1.jar:/home/mypc/.m2/repository/org/wildfly/common/wildfly-common/1.5.0.Final-format-001/wildfly-common-1.5.0.Final-format-001.jar:/home/mypc/.m2/repository/io/quarkus/quarkus-arc/1.0.0.CR1/quarkus-arc-1.0.0.CR1.jar:/home/mypc/.m2/repository/io/quarkus/arc/arc/1.0.0.CR1/arc-1.0.0.CR1.jar:/home/mypc/.m2/repository/org/eclipse/microprofile/context-propagation/microprofile-context-propagation-api/1.0.1/microprofile-context-propagation-api-1.0.1.jar:/home/mypc/.m2/repository/io/quarkus/quarkus-jackson/1.0.0.CR1/quarkus-jackson-1.0.0.CR1.jar:/home/mypc/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.10.1/jackson-databind-2.9.10.1.jar:/home/mypc/.m2/repository/com/fasterxml/jackson/datatype/jackson-datatype-jsr310/2.9.10/jackson-datatype-jsr310-2.9.10.jar:/home/mypc/.m2/repository/com/fasterxml/jackson/datatype/jackson-datatype-jdk8/2.9.10/jackson-datatype-jdk8-2.9.10.jar:/home/mypc/.m2/repository/com/fasterxml/jackson/module/jackson-module-parameter-names/2.9.10/jackson-module-parameter-names-2.9.10.jar:/home/mypc/.m2/repository/net/ricecode/string-similarity/1.0.0/string-similarity-1.0.0.jar io.mirko.Main | |
Test Vanilla Java...javax.net.ssl|DEBUG|01|main|2019-12-21 12:42:58.254 CET|SSLCipher.java:437|jdk.tls.keyLimits: entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472 | |
javax.net.ssl|DEBUG|01|main|2019-12-21 12:42:58.747 CET|Utilities.java:73|the previous server name in SNI (type=host_name (0), value=api.amazon.com) was replaced with (type=host_name (0), value=api.amazon.com) | |
javax.net.ssl|WARNING|01|main|2019-12-21 12:42:58.803 CET|SignatureScheme.java:282|Signature algorithm, ed25519, is not supported by the underlying providers | |
javax.net.ssl|WARNING|01|main|2019-12-21 12:42:58.804 CET|SignatureScheme.java:282|Signature algorithm, ed448, is not supported by the underlying providers | |
javax.net.ssl|WARNING|01|main|2019-12-21 12:42:58.804 CET|SignatureScheme.java:282|Signature algorithm, SHA256withECDSA, is not supported by the underlying providers | |
javax.net.ssl|WARNING|01|main|2019-12-21 12:42:58.805 CET|SignatureScheme.java:282|Signature algorithm, SHA384withECDSA, is not supported by the underlying providers | |
javax.net.ssl|WARNING|01|main|2019-12-21 12:42:58.806 CET|SignatureScheme.java:282|Signature algorithm, SHA512withECDSA, is not supported by the underlying providers | |
javax.net.ssl|WARNING|01|main|2019-12-21 12:42:58.810 CET|SignatureScheme.java:282|Signature algorithm, SHA224withECDSA, is not supported by the underlying providers | |
javax.net.ssl|WARNING|01|main|2019-12-21 12:42:58.812 CET|SignatureScheme.java:282|Signature algorithm, SHA1withECDSA, is not supported by the underlying providers | |
javax.net.ssl|INFO|01|main|2019-12-21 12:42:58.816 CET|AlpnExtension.java:161|No available application protocols | |
javax.net.ssl|DEBUG|01|main|2019-12-21 12:42:58.817 CET|SSLExtensions.java:256|Ignore, context unavailable extension: application_layer_protocol_negotiation | |
javax.net.ssl|DEBUG|01|main|2019-12-21 12:42:58.818 CET|SSLExtensions.java:256|Ignore, context unavailable extension: cookie | |
javax.net.ssl|DEBUG|01|main|2019-12-21 12:42:58.936 CET|PreSharedKeyExtension.java:624|No session to resume. | |
javax.net.ssl|DEBUG|01|main|2019-12-21 12:42:58.937 CET|SSLExtensions.java:256|Ignore, context unavailable extension: pre_shared_key | |
javax.net.ssl|DEBUG|01|main|2019-12-21 12:42:58.938 CET|ClientHello.java:651|Produced ClientHello handshake message ( | |
"ClientHello": { | |
"client version" : "TLSv1.2", | |
"random" : "A6 69 5C 40 B0 9A 63 CA F9 CE 15 A6 A2 77 6D B2 14 38 A7 83 23 03 00 2B 95 05 E9 90 43 5F FC 1D", | |
"session id" : "76 C4 19 A6 4C B9 CC AD 93 A5 72 6D D4 B8 48 41 11 38 D9 A4 88 AC 6E 2D A7 C0 F7 C0 DC 94 17 A3", | |
"cipher suites" : "[TLS_AES_128_GCM_SHA256(0x1301), TLS_AES_256_GCM_SHA384(0x1302), TLS_RSA_WITH_AES_256_GCM_SHA384(0x009D), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_RSA_WITH_AES_128_GCM_SHA256(0x009C), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_RSA_WITH_AES_256_CBC_SHA256(0x003D), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_RSA_WITH_AES_256_CBC_SHA(0x0035), TLS_DHE_RSA_WITH_AES_256_CBC_SHA(0x0039), TLS_DHE_DSS_WITH_AES_256_CBC_SHA(0x0038), TLS_RSA_WITH_AES_128_CBC_SHA256(0x003C), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_RSA_WITH_AES_128_CBC_SHA(0x002F), TLS_DHE_RSA_WITH_AES_128_CBC_SHA(0x0033), TLS_DHE_DSS_WITH_AES_128_CBC_SHA(0x0032)]", | |
"compression methods" : "00", | |
"extensions" : [ | |
] | |
} | |
) | |
javax.net.ssl|DEBUG|01|main|2019-12-21 12:42:59.111 CET|ServerHello.java:866|Consuming ServerHello handshake message ( | |
"ServerHello": { | |
"server version" : "TLSv1.2", | |
"random" : "B3 34 53 22 09 EC F1 0E 90 DB 44 C4 53 84 97 43 D1 FF 0E C5 47 41 21 98 0C 0B 15 16 36 86 91 11", | |
"session id" : "3D 57 04 B9 73 F9 E6 7E 64 F8 F6 BC 83 58 7B 4C DF B3 36 A7 6B 6E 2E 66 DD DB 07 99 F2 E9 CD 7D", | |
"cipher suite" : "TLS_RSA_WITH_AES_128_GCM_SHA256(0x009C)", | |
"compression methods" : "00", | |
"extensions" : [ | |
"renegotiation_info (65,281)": { | |
"renegotiated connection": [<no renegotiated connection>] | |
}, | |
"status_request (5)": { | |
<empty> | |
} | |
] | |
} | |
) | |
javax.net.ssl|DEBUG|01|main|2019-12-21 12:42:59.117 CET|SSLExtensions.java:169|Ignore unavailable extension: supported_versions | |
javax.net.ssl|DEBUG|01|main|2019-12-21 12:42:59.118 CET|ServerHello.java:962|Negotiated protocol version: TLSv1.2 | |
javax.net.ssl|DEBUG|01|main|2019-12-21 12:42:59.121 CET|SSLExtensions.java:188|Consumed extension: renegotiation_info | |
javax.net.ssl|DEBUG|01|main|2019-12-21 12:42:59.124 CET|SSLExtensions.java:169|Ignore unavailable extension: server_name | |
javax.net.ssl|DEBUG|01|main|2019-12-21 12:42:59.125 CET|SSLExtensions.java:169|Ignore unavailable extension: max_fragment_length | |
javax.net.ssl|DEBUG|01|main|2019-12-21 12:42:59.126 CET|SSLExtensions.java:188|Consumed extension: status_request | |
javax.net.ssl|DEBUG|01|main|2019-12-21 12:42:59.126 CET|SSLExtensions.java:169|Ignore unavailable extension: ec_point_formats | |
javax.net.ssl|DEBUG|01|main|2019-12-21 12:42:59.127 CET|SSLExtensions.java:169|Ignore unavailable extension: status_request_v2 | |
javax.net.ssl|DEBUG|01|main|2019-12-21 12:42:59.127 CET|SSLExtensions.java:159|Ignore unsupported extension: supported_versions | |
javax.net.ssl|DEBUG|01|main|2019-12-21 12:42:59.130 CET|SSLExtensions.java:159|Ignore unsupported extension: key_share | |
javax.net.ssl|DEBUG|01|main|2019-12-21 12:42:59.131 CET|SSLExtensions.java:188|Consumed extension: renegotiation_info | |
javax.net.ssl|DEBUG|01|main|2019-12-21 12:42:59.132 CET|SSLExtensions.java:159|Ignore unsupported extension: pre_shared_key | |
javax.net.ssl|DEBUG|01|main|2019-12-21 12:42:59.132 CET|SSLExtensions.java:203|Ignore unavailable extension: server_name | |
javax.net.ssl|DEBUG|01|main|2019-12-21 12:42:59.132 CET|SSLExtensions.java:203|Ignore unavailable extension: max_fragment_length | |
javax.net.ssl|WARNING|01|main|2019-12-21 12:42:59.133 CET|SSLExtensions.java:211|Ignore impact of unsupported extension: status_request | |
javax.net.ssl|DEBUG|01|main|2019-12-21 12:42:59.133 CET|SSLExtensions.java:203|Ignore unavailable extension: ec_point_formats | |
javax.net.ssl|DEBUG|01|main|2019-12-21 12:42:59.133 CET|SSLExtensions.java:203|Ignore unavailable extension: application_layer_protocol_negotiation | |
javax.net.ssl|DEBUG|01|main|2019-12-21 12:42:59.134 CET|SSLExtensions.java:203|Ignore unavailable extension: status_request_v2 | |
javax.net.ssl|DEBUG|01|main|2019-12-21 12:42:59.134 CET|SSLExtensions.java:203|Ignore unavailable extension: extended_master_secret | |
javax.net.ssl|DEBUG|01|main|2019-12-21 12:42:59.134 CET|SSLExtensions.java:203|Ignore unavailable extension: supported_versions | |
javax.net.ssl|DEBUG|01|main|2019-12-21 12:42:59.135 CET|SSLExtensions.java:203|Ignore unavailable extension: key_share | |
javax.net.ssl|WARNING|01|main|2019-12-21 12:42:59.135 CET|SSLExtensions.java:211|Ignore impact of unsupported extension: renegotiation_info | |
javax.net.ssl|DEBUG|01|main|2019-12-21 12:42:59.137 CET|SSLExtensions.java:203|Ignore unavailable extension: pre_shared_key | |
javax.net.ssl|DEBUG|01|main|2019-12-21 12:42:59.174 CET|CertificateMessage.java:358|Consuming server Certificate handshake message ( | |
"Certificates": [ | |
"certificate" : { | |
"version" : "v3", | |
"serial number" : "06 31 2E 13 CA A2 35 2F B0 5A F0 CF 95 81 38 C7", | |
"signature algorithm": "SHA256withRSA", | |
"issuer" : "CN=DigiCert Global CA G2, O=DigiCert Inc, C=US", | |
"not before" : "2019-03-18 01:00:00.000 CET", | |
"not after" : "2020-02-21 13:00:00.000 CET", | |
"subject" : "CN=api.amazon.com, O="Amazon.com, Inc.", L=Seattle, ST=Washington, C=US", | |
"subject public key" : "RSA", | |
"extensions" : [ | |
{ | |
ObjectId: 1.3.6.1.4.1.11129.2.4.2 Criticality=false | |
}, | |
{ | |
ObjectId: 1.3.6.1.5.5.7.1.1 Criticality=false | |
AuthorityInfoAccess [ | |
[ | |
accessMethod: ocsp | |
accessLocation: URIName: http://ocsp.digicert.com | |
, | |
accessMethod: caIssuers | |
accessLocation: URIName: http://cacerts.digicert.com/DigiCertGlobalCAG2.crt | |
] | |
] | |
}, | |
{ | |
ObjectId: 2.5.29.35 Criticality=false | |
AuthorityKeyIdentifier [ | |
KeyIdentifier [ | |
0000: 24 6E 2B 2D D0 6A 92 51 51 25 69 01 AA 9A 47 A6 $n+-.j.QQ%i...G. | |
0010: 89 E7 40 20 ..@ | |
] | |
] | |
}, | |
{ | |
ObjectId: 2.5.29.19 Criticality=false | |
BasicConstraints:[ | |
CA:false | |
PathLen: undefined | |
] | |
}, | |
{ | |
ObjectId: 2.5.29.31 Criticality=false | |
CRLDistributionPoints [ | |
[DistributionPoint: | |
[URIName: http://crl3.digicert.com/DigiCertGlobalCAG2.crl] | |
, DistributionPoint: | |
[URIName: http://crl4.digicert.com/DigiCertGlobalCAG2.crl] | |
]] | |
}, | |
{ | |
ObjectId: 2.5.29.32 Criticality=false | |
CertificatePolicies [ | |
[CertificatePolicyId: [2.16.840.1.114412.1.1] | |
[PolicyQualifierInfo: [ | |
qualifierID: 1.3.6.1.5.5.7.2.1 | |
qualifier: 0000: 16 1C 68 74 74 70 73 3A 2F 2F 77 77 77 2E 64 69 ..https://www.di | |
0010: 67 69 63 65 72 74 2E 63 6F 6D 2F 43 50 53 gicert.com/CPS | |
]] ] | |
[CertificatePolicyId: [2.23.140.1.2.2] | |
[] ] | |
] | |
}, | |
{ | |
ObjectId: 2.5.29.37 Criticality=false | |
ExtendedKeyUsages [ | |
serverAuth | |
clientAuth | |
] | |
}, | |
{ | |
ObjectId: 2.5.29.15 Criticality=true | |
KeyUsage [ | |
DigitalSignature | |
Key_Encipherment | |
] | |
}, | |
{ | |
ObjectId: 2.5.29.17 Criticality=false | |
SubjectAlternativeName [ | |
DNSName: api.amazon.com | |
DNSName: wsync.us-east-1.amazon.com | |
DNSName: account.apis.amazon.com | |
] | |
}, | |
{ | |
ObjectId: 2.5.29.14 Criticality=false | |
SubjectKeyIdentifier [ | |
KeyIdentifier [ | |
0000: 0E BB 23 C2 72 9F 0C 14 48 79 C8 68 73 0C 5B 9A ..#.r...Hy.hs.[. | |
0010: FC AB DE AF .... | |
] | |
] | |
} | |
]}, | |
"certificate" : { | |
"version" : "v3", | |
"serial number" : "0C 8E E0 C9 0D 6A 89 15 88 04 06 1E E2 41 F9 AF", | |
"signature algorithm": "SHA256withRSA", | |
"issuer" : "CN=DigiCert Global Root G2, OU=www.digicert.com, O=DigiCert Inc, C=US", | |
"not before" : "2013-08-01 14:00:00.000 CEST", | |
"not after" : "2028-08-01 14:00:00.000 CEST", | |
"subject" : "CN=DigiCert Global CA G2, O=DigiCert Inc, C=US", | |
"subject public key" : "RSA", | |
"extensions" : [ | |
{ | |
ObjectId: 1.3.6.1.5.5.7.1.1 Criticality=false | |
AuthorityInfoAccess [ | |
[ | |
accessMethod: ocsp | |
accessLocation: URIName: http://ocsp.digicert.com | |
] | |
] | |
}, | |
{ | |
ObjectId: 2.5.29.35 Criticality=false | |
AuthorityKeyIdentifier [ | |
KeyIdentifier [ | |
0000: 4E 22 54 20 18 95 E6 E3 6E E6 0F FA FA B9 12 ED N"T ....n....... | |
0010: 06 17 8F 39 ...9 | |
] | |
] | |
}, | |
{ | |
ObjectId: 2.5.29.19 Criticality=true | |
BasicConstraints:[ | |
CA:true | |
PathLen:0 | |
] | |
}, | |
{ | |
ObjectId: 2.5.29.31 Criticality=false | |
CRLDistributionPoints [ | |
[DistributionPoint: | |
[URIName: http://crl4.digicert.com/DigiCertGlobalRootG2.crl] | |
, DistributionPoint: | |
[URIName: http://crl3.digicert.com/DigiCertGlobalRootG2.crl] | |
]] | |
}, | |
{ | |
ObjectId: 2.5.29.32 Criticality=false | |
CertificatePolicies [ | |
[CertificatePolicyId: [2.5.29.32.0] | |
[PolicyQualifierInfo: [ | |
qualifierID: 1.3.6.1.5.5.7.2.1 | |
qualifier: 0000: 16 1C 68 74 74 70 73 3A 2F 2F 77 77 77 2E 64 69 ..https://www.di | |
0010: 67 69 63 65 72 74 2E 63 6F 6D 2F 43 50 53 gicert.com/CPS | |
]] ] | |
] | |
}, | |
{ | |
ObjectId: 2.5.29.15 Criticality=true | |
KeyUsage [ | |
DigitalSignature | |
Key_CertSign | |
Crl_Sign | |
] | |
}, | |
{ | |
ObjectId: 2.5.29.14 Criticality=false | |
SubjectKeyIdentifier [ | |
KeyIdentifier [ | |
0000: 24 6E 2B 2D D0 6A 92 51 51 25 69 01 AA 9A 47 A6 $n+-.j.QQ%i...G. | |
0010: 89 E7 40 20 ..@ | |
] | |
] | |
} | |
]}, | |
"certificate" : { | |
"version" : "v3", | |
"serial number" : "63 18 0D 38 FB 80 97 78 A9 D0 35 A3 16 18 F8 40", | |
"signature algorithm": "SHA256withRSA", | |
"issuer" : "CN=VeriSign Class 3 Public Primary Certification Authority - G5, OU="(c) 2006 VeriSign, Inc. - For authorized use only", OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US", | |
"not before" : "2017-11-06 01:00:00.000 CET", | |
"not after" : "2022-11-06 24:59:59.000 CET", | |
"subject" : "CN=DigiCert Global Root G2, OU=www.digicert.com, O=DigiCert Inc, C=US", | |
"subject public key" : "RSA", | |
"extensions" : [ | |
{ | |
ObjectId: 1.3.6.1.5.5.7.1.1 Criticality=false | |
AuthorityInfoAccess [ | |
[ | |
accessMethod: ocsp | |
accessLocation: URIName: http://s.symcd.com | |
] | |
] | |
}, | |
{ | |
ObjectId: 2.5.29.35 Criticality=false | |
AuthorityKeyIdentifier [ | |
KeyIdentifier [ | |
0000: 7F D3 65 A7 C2 DD EC BB F0 30 09 F3 43 39 FA 02 ..e......0..C9.. | |
0010: AF 33 31 33 .313 | |
] | |
] | |
}, | |
{ | |
ObjectId: 2.5.29.19 Criticality=true | |
BasicConstraints:[ | |
CA:true | |
PathLen:2147483647 | |
] | |
}, | |
{ | |
ObjectId: 2.5.29.31 Criticality=false | |
CRLDistributionPoints [ | |
[DistributionPoint: | |
[URIName: http://s.symcb.com/pca3-g5.crl] | |
]] | |
}, | |
{ | |
ObjectId: 2.5.29.32 Criticality=false | |
CertificatePolicies [ | |
[CertificatePolicyId: [2.5.29.32.0] | |
[PolicyQualifierInfo: [ | |
qualifierID: 1.3.6.1.5.5.7.2.1 | |
qualifier: 0000: 16 17 68 74 74 70 73 3A 2F 2F 64 2E 73 79 6D 63 ..https://d.symc | |
0010: 62 2E 63 6F 6D 2F 63 70 73 b.com/cps | |
], PolicyQualifierInfo: [ | |
qualifierID: 1.3.6.1.5.5.7.2.2 | |
qualifier: 0000: 30 19 0C 17 68 74 74 70 73 3A 2F 2F 64 2E 73 79 0...https://d.sy | |
0010: 6D 63 62 2E 63 6F 6D 2F 72 70 61 mcb.com/rpa | |
]] ] | |
] | |
}, | |
{ | |
ObjectId: 2.5.29.15 Criticality=true | |
KeyUsage [ | |
DigitalSignature | |
Key_CertSign | |
Crl_Sign | |
] | |
}, | |
{ | |
ObjectId: 2.5.29.14 Criticality=false | |
SubjectKeyIdentifier [ | |
KeyIdentifier [ | |
0000: 4E 22 54 20 18 95 E6 E3 6E E6 0F FA FA B9 12 ED N"T ....n....... | |
0010: 06 17 8F 39 ...9 | |
] | |
] | |
} | |
]} | |
] | |
) | |
javax.net.ssl|DEBUG|01|main|2019-12-21 12:42:59.205 CET|CertificateStatus.java:281|Consuming server CertificateStatus handshake message ( | |
"CertificateStatus": { | |
"type" : "ocsp", | |
"responses " : [ | |
OCSP Response: | |
Response Status: SUCCESSFUL | |
Responder ID: byKey: 246E2B2DD06A925151256901AA9A47A689E74020 | |
Produced at: Fri Dec 20 16:03:11 CET 2019 | |
1 response: | |
SingleResponse: | |
CertId | |
Algorithm: SHA-1 | |
issuerNameHash | |
0000: A8 7E 30 31 06 E4 E8 85 65 CF E9 52 59 8F A6 DA ..01....e..RY... | |
0010: 7C 00 53 2F | |
issuerKeyHash: | |
0000: 24 6E 2B 2D D0 6A 92 51 51 25 69 01 AA 9A 47 A6 $n+-.j.QQ%i...G. | |
0010: 89 E7 40 20 | |
SerialNumber: [ 06312e13 caa2352f b05af0cf 958138c7] | |
CertStatus: GOOD | |
thisUpdate is Fri Dec 20 16:03:11 CET 2019 | |
nextUpdate is Fri Dec 27 15:18:11 CET 2019 | |
] | |
} | |
) | |
javax.net.ssl|DEBUG|01|main|2019-12-21 12:42:59.320 CET|ServerHelloDone.java:142|Consuming ServerHelloDone handshake message ( | |
<empty> | |
) | |
javax.net.ssl|DEBUG|01|main|2019-12-21 12:42:59.347 CET|RSAClientKeyExchange.java:195|Produced RSA ClientKeyExchange handshake message ( | |
"RSA ClientKeyExchange": { | |
"client_version": TLSv1.2 | |
"encncrypted": { | |
0000: 80 16 D3 82 16 22 CF 6E 99 23 30 E8 7F D5 7E 71 .....".n.#0....q | |
0010: 8D 39 2E 0A BB 57 00 34 C6 00 0D 23 76 7B F7 64 .9...W.4...#v..d | |
0020: E6 26 67 D1 DC A6 8C 1C 4B 36 85 67 54 03 33 A4 .&g.....K6.gT.3. | |
0030: 23 BF 09 84 F9 77 64 F9 32 5E 02 20 71 71 01 7A #....wd.2^. qq.z | |
0040: 35 60 97 4F C6 C1 CE D7 DC 11 A6 4B CC 78 96 C7 5`.O.......K.x.. | |
0050: B6 0B C4 3D 6C 30 A9 67 87 C2 F2 83 CE 4D E0 0D ...=l0.g.....M.. | |
0060: 0B F3 3D 7C DB F0 2F C6 1B BB DF 7A 71 D4 41 90 ..=.../....zq.A. | |
0070: 0F 6D B1 84 1E 1E 16 F2 33 07 65 85 A6 A0 D0 AA .m......3.e..... | |
0080: 94 4B BA 05 30 FD 9A 7E 46 8F 27 30 DB 27 82 01 .K..0...F.'0.'.. | |
0090: 76 64 A5 E5 85 D0 2B B5 C7 BC AF 03 58 7B A7 35 vd....+.....X..5 | |
00A0: 38 DF CB 14 85 B4 EB 69 15 26 53 2F 71 41 9A 23 8......i.&S/qA.# | |
00B0: 6B 89 CA CF 21 53 31 0C 03 3A 19 12 22 CC 90 80 k...!S1..:.."... | |
00C0: 8C 76 5C AE 14 3D 8C AF A2 9E 26 4A BB 1B A3 54 .v\..=....&J...T | |
00D0: 9D 44 73 CF 9A 5C CA 54 54 4C C8 C3 56 7C 18 C3 .Ds..\.TTL..V... | |
00E0: F8 A1 09 C6 26 EE 4D 12 B1 9D 5B 39 71 52 0D 1D ....&.M...[9qR.. | |
00F0: 59 8C 8A D9 78 AA FC 7D BE 4E FC 2C 34 B9 64 A4 Y...x....N.,4.d. | |
} | |
} | |
) | |
javax.net.ssl|DEBUG|01|main|2019-12-21 12:42:59.357 CET|ChangeCipherSpec.java:109|Produced ChangeCipherSpec message | |
javax.net.ssl|DEBUG|01|main|2019-12-21 12:42:59.359 CET|Finished.java:395|Produced client Finished handshake message ( | |
"Finished": { | |
"verify data": { | |
0000: 6C 0A 4D 6D AC 3B 63 DA 43 F7 7D 34 | |
}'} | |
) | |
javax.net.ssl|DEBUG|01|main|2019-12-21 12:42:59.532 CET|ChangeCipherSpec.java:143|Consuming ChangeCipherSpec message | |
javax.net.ssl|DEBUG|01|main|2019-12-21 12:42:59.537 CET|Finished.java:532|Consuming server Finished handshake message ( | |
"Finished": { | |
"verify data": { | |
0000: 2A 6C 36 EE F2 80 AE 24 EC 2A FF C3 | |
}'} | |
) | |
javax.net.ssl|DEBUG|01|main|2019-12-21 12:42:59.792 CET|SSLSocketImpl.java:473|duplex close of SSLSocket | |
javax.net.ssl|DEBUG|01|main|2019-12-21 12:42:59.795 CET|SSLSocketImpl.java:1361|close the underlying socket | |
javax.net.ssl|DEBUG|01|main|2019-12-21 12:42:59.807 CET|SSLSocketImpl.java:1380|close the SSL connection (initiative) | |
javax.net.ssl|DEBUG|01|main|2019-12-21 12:42:59.807 CET|SSLSocketImpl.java:636|close inbound of SSLSocket | |
SUCCESS! | |
Returned {"access_token":"<access_token>","token_type":"bearer","expires_in":3600} | |
Process finished with exit code 0 |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment