-
-
Save jonludlam/9230608 to your computer and use it in GitHub Desktop.
Java SSL Good and bad connection logs
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Just set running to true | |
in run method | |
_isRunning is true | |
Here... isRunning=true | |
In here | |
Hello, World | |
initSSLContext | |
initSSLContext p1 | |
initSSLContext p2 | |
initSSLContext p3 | |
*** | |
found key for : mykey | |
chain [0] = [ | |
[ | |
Version: V3 | |
Subject: CN=Cloudstack User, OU=humongous, O=humongous, C=Unknown | |
Signature Algorithm: SHA256withRSA, OID = 1.2.840.113549.1.1.11 | |
Key: Sun RSA public key, 2048 bits | |
modulus: 2452218181302233624331307709000409091409570589564297031820971854616627688118597659569962950474745307215528301442413502616452297005953569106216110600747726477590183458680803443350604\ | |
976027807226228297774722250435391947719784397345987564948415831228385168702989920624838743889125959887383982738760443924244196994440488608172028191447547566197604017472195423897215489391620719\ | |
425376421505061490680565587396751452094449219919270774549150677396383436466089601049433601779879216253191187633990053054478764686813440991284749742245218924742831755534018664987153176514654030\ | |
2124135836457542940486368928034521519056850401064553 | |
public exponent: 65537 | |
Validity: [From: Tue Feb 25 11:10:34 GMT 2014, | |
To: Fri Feb 23 11:10:34 GMT 2024] | |
Issuer: CN=Cloudstack User, OU=humongous, O=humongous, C=Unknown | |
SerialNumber: [ 2fd8f956] | |
Certificate Extensions: 1 | |
[1]: ObjectId: 2.5.29.14 Criticality=false | |
SubjectKeyIdentifier [ | |
KeyIdentifier [ | |
0000: 7F 82 16 28 84 19 21 A8 A4 95 8C 3C 10 49 35 75 ...(..!....<.I5u | |
0010: 8F 58 93 7C .X.. | |
] | |
] | |
] | |
Algorithm: [SHA256withRSA] | |
Signature: | |
0000: 10 45 6E 09 D1 57 C6 71 19 F0 84 FF 96 BE 6C F8 .En..W.q......l. | |
0010: 8D C6 0E C9 AE 9C 83 16 63 9C FF AC 1D 3C 8D DF ........c....<.. | |
0020: 76 56 08 11 56 09 9D D4 A3 D9 2C C8 5F 54 42 A8 vV..V.....,._TB. | |
0030: 99 6F 42 81 09 66 3A 64 91 E8 B0 62 B3 D4 5F A4 .oB..f:d...b.._. | |
0040: 52 AE 91 6E F7 0E A1 A1 D9 27 AC AE 50 29 EA 77 R..n.....'..P).w | |
0050: F1 D3 F5 81 68 4B 4E EC 5F 49 75 F6 FA FD 53 7B ....hKN._Iu...S. | |
0060: 6F 69 2B FE 9B A2 1E E5 89 BC 49 0F AD F9 3B 24 oi+.......I...;$ | |
0070: 88 F2 FB 3E 16 1C CD 4C A2 5B 4D DD 61 25 1E DB ...>...L.[M.a%.. | |
0080: CD E0 01 3F B3 FE 56 5E 09 EB 5D C0 3C 60 F5 21 ...?..V^..].<`.! | |
0090: 10 93 10 A2 C0 E6 25 A9 3F A8 FD FA 2F 4B 77 AC ......%.?.../Kw. | |
00A0: 40 7D 24 82 B7 8B D0 DF E3 1E 3C 48 3C CA 3F FB @.$.......<H<.?. | |
00B0: BF F1 88 7F A1 E5 D9 EF 50 F8 D5 AF E8 5F 48 FB ........P...._H. | |
00C0: 4B A8 A6 7D 62 8D 30 5F 22 8F B6 1C D9 50 D3 EA K...b.0_"....P.. | |
00D0: 28 3C 76 87 07 15 63 4B 41 FD 8B B7 3E AE E5 C4 (<v...cKA...>... | |
00E0: A4 85 D6 77 C1 9F F8 15 DA FF 58 51 84 85 E9 07 ...w......XQ.... | |
00F0: E1 8F 68 F0 C0 89 35 8E 57 A6 89 9A A5 10 D4 CC ..h...5.W....... | |
] | |
*** | |
initSSLContext p4 | |
adding as trusted cert: | |
Subject: CN=Cloudstack User, OU=humongous, O=humongous, C=Unknown | |
Issuer: CN=Cloudstack User, OU=humongous, O=humongous, C=Unknown | |
Algorithm: RSA; Serial number: 0x2fd8f956 | |
Valid from Tue Feb 25 11:10:34 GMT 2014 until Fri Feb 23 11:10:34 GMT 2024 | |
initSSLContext p5 | |
trigger seeding of SecureRandom | |
done seeding SecureRandom | |
pt1 | |
Using SSLEngineImpl. | |
pt2 | |
pt3 | |
pt4 | |
start of while loop: hsStatus=NEED_UNWRAP | |
start of while loop: sslEngine.hsStatus=NOT_HANDSHAKING | |
Allow unsafe renegotiation: false | |
Allow legacy hello messages: true | |
Is initial handshake: true | |
Is secure renegotiation: false | |
Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for SSLv2Hello | |
Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for SSLv2Hello | |
Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 for SSLv2Hello | |
Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 for SSLv2Hello | |
Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 for SSLv2Hello | |
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for SSLv2Hello | |
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for SSLv2Hello | |
Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for SSLv3 | |
Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for SSLv3 | |
Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 for SSLv3 | |
Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 for SSLv3 | |
Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 for SSLv3 | |
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for SSLv3 | |
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for SSLv3 | |
Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1 | |
Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLSv1 | |
Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 for TLSv1 | |
Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1 | |
Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 for TLSv1 | |
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1 | |
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1 | |
Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1.1 | |
Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLSv1.1 | |
Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1 | |
Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1.1 | |
Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 for TLSv1.1 | |
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1 | |
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1.1 | |
[Raw read]: length = 5 | |
0000: 16 03 01 00 DC ..... | |
[Raw read]: length = 220 | |
0000: 01 00 00 D8 03 01 53 0D F8 9A 71 51 3F C0 49 9E ......S...qQ?.I. | |
0010: 0E 0F 2B C3 68 59 73 89 B9 EA 30 A7 F1 4F AB 9E ..+.hYs...0..O.. | |
0020: CA BA CD D6 BB 93 00 00 66 C0 14 C0 0A C0 22 C0 ........f.....". | |
0030: 21 00 39 00 38 00 88 00 87 C0 0F C0 05 00 35 00 !.9.8.........5. | |
0040: 84 C0 12 C0 08 C0 1C C0 1B 00 16 00 13 C0 0D C0 ................ | |
0050: 03 00 0A C0 13 C0 09 C0 1F C0 1E 00 33 00 32 00 ............3.2. | |
0060: 9A 00 99 00 45 00 44 C0 0E C0 04 00 2F 00 96 00 ....E.D...../... | |
0070: 41 C0 11 C0 07 C0 0C C0 02 00 05 00 04 00 15 00 A............... | |
0080: 12 00 09 00 14 00 11 00 08 00 06 00 03 00 FF 01 ................ | |
0090: 00 00 49 00 0B 00 04 03 00 01 02 00 0A 00 34 00 ..I...........4. | |
00A0: 32 00 0E 00 0D 00 19 00 0B 00 0C 00 18 00 09 00 2............... | |
00B0: 0A 00 16 00 17 00 08 00 06 00 07 00 14 00 15 00 ................ | |
00C0: 04 00 05 00 12 00 13 00 01 00 02 00 03 00 0F 00 ................ | |
00D0: 10 00 11 00 23 00 00 00 0F 00 01 01 ....#....... | |
test-Selector, READ: TLSv1 Handshake, length = 220 | |
start of while loop: hsStatus=NEED_TASK | |
start of while loop: sslEngine.hsStatus=NEED_TASK | |
*** ClientHello, TLSv1 | |
RandomCookie: GMT: 1393358746 bytes = { 113, 81, 63, 192, 73, 158, 14, 15, 43, 195, 104, 89, 115, 137, 185, 234, 48, 167, 241, 79, 171, 158, 202, 186, 205, 214, 187, 147 } | |
Session ID: {} | |
Cipher Suites: [TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_SRP_SHA_DSS_WITH_AES_256_CBC_SHA, TLS_SRP_SHA_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_C\ | |
BC_SHA, TLS_DHE_DSS_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA, TLS_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA, TLS_ECDH_RSA_WITH_AES_256_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA, \ | |
TLS_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_CAMELLIA_256_CBC_SHA, TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_SRP_SHA_DSS_WITH_3DES_EDE_CBC_SHA, TLS_SRP_SHA_\ | |
RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_3DES_EDE\ | |
_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_SRP_SHA_DSS_WITH_AES_128_CBC_SHA, TLS_SRP_SHA_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA\ | |
, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_SEED_CBC_SHA, TLS_DHE_DSS_WITH_SEED_CBC_SHA, TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA, TLS_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA, TLS_ECDH_RSA_WIT\ | |
H_AES_128_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_SEED_CBC_SHA, TLS_RSA_WITH_CAMELLIA_128_CBC_SHA, TLS_ECDHE_RSA_WITH_RC4_128_SHA, TLS_ECDHE_EC\ | |
DSA_WITH_RC4_128_SHA, TLS_ECDH_RSA_WITH_RC4_128_SHA, TLS_ECDH_ECDSA_WITH_RC4_128_SHA, SSL_RSA_WITH_RC4_128_SHA, SSL_RSA_WITH_RC4_128_MD5, SSL_DHE_RSA_WITH_DES_CBC_SHA, SSL_DHE_DSS_WITH_DES_CBC\ | |
_SHA, SSL_RSA_WITH_DES_CBC_SHA, SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA, SSL_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA, SSL_RSA_EXPORT_WITH_DES40_CBC_SHA, SSL_RSA_EXPORT_WITH_RC2_CBC_40_MD5, SSL_RSA_EXP\ | |
ORT_WITH_RC4_40_MD5, TLS_EMPTY_RENEGOTIATION_INFO_SCSV] | |
Compression Methods: { 0 } | |
Extension ec_point_formats, formats: [uncompressed, ansiX962_compressed_prime, ansiX962_compressed_char2] | |
Extension elliptic_curves, curve names: {sect571r1, sect571k1, secp521r1, sect409k1, sect409r1, secp384r1, sect283k1, sect283r1, secp256k1, secp256r1, sect239k1, sect233k1, sect233r1, secp224k\ | |
1, secp224r1, sect193r1, sect193r2, secp192k1, secp192r1, sect163k1, sect163r1, sect163r2, secp160k1, secp160r1, secp160r2} | |
Unsupported extension type_35, data: | |
Unsupported extension type_15, data: 01 | |
*** | |
[read] MD5 and SHA1 hashes: len = 220 | |
0000: 01 00 00 D8 03 01 53 0D F8 9A 71 51 3F C0 49 9E ......S...qQ?.I. | |
0010: 0E 0F 2B C3 68 59 73 89 B9 EA 30 A7 F1 4F AB 9E ..+.hYs...0..O.. | |
0020: CA BA CD D6 BB 93 00 00 66 C0 14 C0 0A C0 22 C0 ........f.....". | |
0030: 21 00 39 00 38 00 88 00 87 C0 0F C0 05 00 35 00 !.9.8.........5. | |
0040: 84 C0 12 C0 08 C0 1C C0 1B 00 16 00 13 C0 0D C0 ................ | |
0050: 03 00 0A C0 13 C0 09 C0 1F C0 1E 00 33 00 32 00 ............3.2. | |
0060: 9A 00 99 00 45 00 44 C0 0E C0 04 00 2F 00 96 00 ....E.D...../... | |
0070: 41 C0 11 C0 07 C0 0C C0 02 00 05 00 04 00 15 00 A............... | |
0080: 12 00 09 00 14 00 11 00 08 00 06 00 03 00 FF 01 ................ | |
0090: 00 00 49 00 0B 00 04 03 00 01 02 00 0A 00 34 00 ..I...........4. | |
00A0: 32 00 0E 00 0D 00 19 00 0B 00 0C 00 18 00 09 00 2............... | |
00B0: 0A 00 16 00 17 00 08 00 06 00 07 00 14 00 15 00 ................ | |
00C0: 04 00 05 00 12 00 13 00 01 00 02 00 03 00 0F 00 ................ | |
00D0: 10 00 11 00 23 00 00 00 0F 00 01 01 ....#....... | |
%% Initialized: [Session-1, SSL_NULL_WITH_NULL_NULL] | |
matching alias: mykey | |
start of while loop: hsStatus=NEED_UNWRAP | |
start of while loop: sslEngine.hsStatus=NEED_UNWRAP | |
Caught java.io.IOException: Connection closed with -1 on reading size. | |
_isRunning is true |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Just set running to true | |
in run method | |
_isRunning is true | |
Here... isRunning=true | |
In here | |
Hello, World | |
initSSLContext | |
initSSLContext p1 | |
initSSLContext p2 | |
initSSLContext p3 | |
*** | |
found key for : mykey | |
chain [0] = [ | |
[ | |
Version: V3 | |
Subject: CN=Cloudstack User, OU=humongous, O=humongous, C=Unknown | |
Signature Algorithm: SHA256withRSA, OID = 1.2.840.113549.1.1.11 | |
Key: Sun RSA public key, 2048 bits | |
modulus: 2452218181302233624331307709000409091409570589564297031820971854616627688118597659569962950474745307215528301442413502616452297005953569106216110600747726477590183458680803443350604\ | |
976027807226228297774722250435391947719784397345987564948415831228385168702989920624838743889125959887383982738760443924244196994440488608172028191447547566197604017472195423897215489391620719\ | |
425376421505061490680565587396751452094449219919270774549150677396383436466089601049433601779879216253191187633990053054478764686813440991284749742245218924742831755534018664987153176514654030\ | |
2124135836457542940486368928034521519056850401064553 | |
public exponent: 65537 | |
Validity: [From: Tue Feb 25 11:10:34 GMT 2014, | |
To: Fri Feb 23 11:10:34 GMT 2024] | |
Issuer: CN=Cloudstack User, OU=humongous, O=humongous, C=Unknown | |
SerialNumber: [ 2fd8f956] | |
Certificate Extensions: 1 | |
[1]: ObjectId: 2.5.29.14 Criticality=false | |
SubjectKeyIdentifier [ | |
KeyIdentifier [ | |
0000: 7F 82 16 28 84 19 21 A8 A4 95 8C 3C 10 49 35 75 ...(..!....<.I5u | |
0010: 8F 58 93 7C .X.. | |
] | |
] | |
] | |
Algorithm: [SHA256withRSA] | |
Signature: | |
0000: 10 45 6E 09 D1 57 C6 71 19 F0 84 FF 96 BE 6C F8 .En..W.q......l. | |
0010: 8D C6 0E C9 AE 9C 83 16 63 9C FF AC 1D 3C 8D DF ........c....<.. | |
0020: 76 56 08 11 56 09 9D D4 A3 D9 2C C8 5F 54 42 A8 vV..V.....,._TB. | |
0030: 99 6F 42 81 09 66 3A 64 91 E8 B0 62 B3 D4 5F A4 .oB..f:d...b.._. | |
0040: 52 AE 91 6E F7 0E A1 A1 D9 27 AC AE 50 29 EA 77 R..n.....'..P).w | |
0050: F1 D3 F5 81 68 4B 4E EC 5F 49 75 F6 FA FD 53 7B ....hKN._Iu...S. | |
0060: 6F 69 2B FE 9B A2 1E E5 89 BC 49 0F AD F9 3B 24 oi+.......I...;$ | |
0070: 88 F2 FB 3E 16 1C CD 4C A2 5B 4D DD 61 25 1E DB ...>...L.[M.a%.. | |
0080: CD E0 01 3F B3 FE 56 5E 09 EB 5D C0 3C 60 F5 21 ...?..V^..].<`.! | |
0090: 10 93 10 A2 C0 E6 25 A9 3F A8 FD FA 2F 4B 77 AC ......%.?.../Kw. | |
00A0: 40 7D 24 82 B7 8B D0 DF E3 1E 3C 48 3C CA 3F FB @.$.......<H<.?. | |
00B0: BF F1 88 7F A1 E5 D9 EF 50 F8 D5 AF E8 5F 48 FB ........P...._H. | |
00C0: 4B A8 A6 7D 62 8D 30 5F 22 8F B6 1C D9 50 D3 EA K...b.0_"....P.. | |
00D0: 28 3C 76 87 07 15 63 4B 41 FD 8B B7 3E AE E5 C4 (<v...cKA...>... | |
00E0: A4 85 D6 77 C1 9F F8 15 DA FF 58 51 84 85 E9 07 ...w......XQ.... | |
00F0: E1 8F 68 F0 C0 89 35 8E 57 A6 89 9A A5 10 D4 CC ..h...5.W....... | |
] | |
*** | |
initSSLContext p4 | |
adding as trusted cert: | |
Subject: CN=Cloudstack User, OU=humongous, O=humongous, C=Unknown | |
Issuer: CN=Cloudstack User, OU=humongous, O=humongous, C=Unknown | |
Algorithm: RSA; Serial number: 0x2fd8f956 | |
Valid from Tue Feb 25 11:10:34 GMT 2014 until Fri Feb 23 11:10:34 GMT 2024 | |
initSSLContext p5 | |
trigger seeding of SecureRandom | |
done seeding SecureRandom | |
pt1 | |
Using SSLEngineImpl. | |
pt2 | |
pt3 | |
pt4 | |
start of while loop: hsStatus=NEED_UNWRAP | |
start of while loop: sslEngine.hsStatus=NOT_HANDSHAKING | |
Allow unsafe renegotiation: false | |
Allow legacy hello messages: true | |
Is initial handshake: true | |
Is secure renegotiation: false | |
Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for SSLv2Hello | |
Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for SSLv2Hello | |
Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 for SSLv2Hello | |
Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 for SSLv2Hello | |
Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 for SSLv2Hello | |
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for SSLv2Hello | |
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for SSLv2Hello | |
Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for SSLv3 | |
Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for SSLv3 | |
Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 for SSLv3 | |
Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 for SSLv3 | |
Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 for SSLv3 | |
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for SSLv3 | |
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for SSLv3 | |
Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1 | |
Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLSv1 | |
Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 for TLSv1 | |
Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1 | |
Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 for TLSv1 | |
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1 | |
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1 | |
Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1.1 | |
Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLSv1.1 | |
Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1 | |
Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1.1 | |
Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 for TLSv1.1 | |
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1 | |
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1.1 | |
[Raw read]: length = 5 | |
0000: 16 03 01 00 EB ..... | |
[Raw read]: length = 235 | |
0000: 01 00 00 E7 03 03 53 0D F8 8E 2A F1 B0 A4 EF 1A ......S...*..... | |
0010: C7 C6 41 5B 94 54 F8 BD CE B6 45 B4 94 8F 59 9D ..A[.T....E...Y. | |
0020: 24 D7 45 E0 16 41 20 53 0D F8 1B 2F 9E A1 90 7C $.E..A S.../.... | |
0030: A0 1A 42 02 DF B2 DC 43 53 EF 72 F2 E9 35 C6 BA ..B....CS.r..5.. | |
0040: 3F DC 6A D6 DC D3 52 00 24 C0 2B C0 2F 00 9E 00 ?.j...R.$.+./... | |
0050: 9C C0 0A C0 14 00 39 00 35 C0 07 C0 09 C0 11 C0 ......9.5....... | |
0060: 13 00 33 00 32 00 05 00 04 00 2F 00 0A 01 00 00 ..3.2...../..... | |
0070: 7A 00 00 00 0E 00 0C 00 00 09 6C 6F 63 61 6C 68 z.........localh | |
0080: 6F 73 74 FF 01 00 01 00 00 0A 00 08 00 06 00 17 ost............. | |
0090: 00 18 00 19 00 0B 00 02 01 00 00 23 00 00 33 74 ...........#..3t | |
00A0: 00 00 00 10 00 22 00 20 06 73 70 64 79 2F 32 06 .....". .spdy/2. | |
00B0: 73 70 64 79 2F 33 08 73 70 64 79 2F 33 2E 31 08 spdy/3.spdy/3.1. | |
00C0: 68 74 74 70 2F 31 2E 31 75 4F 00 00 00 05 00 05 http/1.1uO...... | |
00D0: 01 00 00 00 00 00 0D 00 12 00 10 04 01 05 01 02 ................ | |
00E0: 01 04 03 05 03 02 03 04 02 02 02 ........... | |
test-Selector, READ: TLSv1 Handshake, length = 235 | |
start of while loop: hsStatus=NEED_TASK | |
start of while loop: sslEngine.hsStatus=NEED_TASK | |
*** ClientHello, TLSv1.2 | |
RandomCookie: GMT: 1393358734 bytes = { 42, 241, 176, 164, 239, 26, 199, 198, 65, 91, 148, 84, 248, 189, 206, 182, 69, 180, 148, 143, 89, 157, 36, 215, 69, 224, 22, 65 } | |
Session ID: {83, 13, 248, 27, 47, 158, 161, 144, 124, 160, 26, 66, 2, 223, 178, 220, 67, 83, 239, 114, 242, 233, 53, 198, 186, 63, 220, 106, 214, 220, 211, 82} | |
Cipher Suites: [TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, TLS_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_ECDSA_WITH_AES_2\ | |
56_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_RC4_128_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDH\ | |
E_RSA_WITH_RC4_128_SHA, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, SSL_RSA_WITH_RC4_128_SHA, SSL_RSA_WITH_RC4_128_MD5, TLS_RSA_WITH\ | |
_AES_128_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA] | |
Compression Methods: { 0 } | |
Extension server_name, server_name: [host_name: localhost] | |
Extension renegotiation_info, renegotiated_connection: <empty> | |
Extension elliptic_curves, curve names: {secp256r1, secp384r1, secp521r1} | |
Extension ec_point_formats, formats: [uncompressed] | |
Unsupported extension type_35, data: | |
Unsupported extension type_13172, data: | |
Unsupported extension type_16, data: 00:20:06:73:70:64:79:2f:32:06:73:70:64:79:2f:33:08:73:70:64:79:2f:33:2e:31:08:68:74:74:70:2f:31:2e:31 | |
Unsupported extension type_30031, data: | |
Unsupported extension status_request, data: 01:00:00:00:00 | |
Extension signature_algorithms, signature_algorithms: SHA256withRSA, SHA384withRSA, SHA1withRSA, SHA256withECDSA, SHA384withECDSA, SHA1withECDSA, Unknown (hash:0x4, signature:0x2), SHA1withDSA | |
*** | |
[read] MD5 and SHA1 hashes: len = 235 | |
0000: 01 00 00 E7 03 03 53 0D F8 8E 2A F1 B0 A4 EF 1A ......S...*..... | |
0010: C7 C6 41 5B 94 54 F8 BD CE B6 45 B4 94 8F 59 9D ..A[.T....E...Y. | |
0020: 24 D7 45 E0 16 41 20 53 0D F8 1B 2F 9E A1 90 7C $.E..A S.../.... | |
0030: A0 1A 42 02 DF B2 DC 43 53 EF 72 F2 E9 35 C6 BA ..B....CS.r..5.. | |
0040: 3F DC 6A D6 DC D3 52 00 24 C0 2B C0 2F 00 9E 00 ?.j...R.$.+./... | |
0050: 9C C0 0A C0 14 00 39 00 35 C0 07 C0 09 C0 11 C0 ......9.5....... | |
0060: 13 00 33 00 32 00 05 00 04 00 2F 00 0A 01 00 00 ..3.2...../..... | |
0070: 7A 00 00 00 0E 00 0C 00 00 09 6C 6F 63 61 6C 68 z.........localh | |
0080: 6F 73 74 FF 01 00 01 00 00 0A 00 08 00 06 00 17 ost............. | |
0090: 00 18 00 19 00 0B 00 02 01 00 00 23 00 00 33 74 ...........#..3t | |
00A0: 00 00 00 10 00 22 00 20 06 73 70 64 79 2F 32 06 .....". .spdy/2. | |
00B0: 73 70 64 79 2F 33 08 73 70 64 79 2F 33 2E 31 08 spdy/3.spdy/3.1. | |
00C0: 68 74 74 70 2F 31 2E 31 75 4F 00 00 00 05 00 05 http/1.1uO...... | |
00D0: 01 00 00 00 00 00 0D 00 12 00 10 04 01 05 01 02 ................ | |
00E0: 01 04 03 05 03 02 03 04 02 02 02 ........... | |
%% Initialized: [Session-1, SSL_NULL_WITH_NULL_NULL] | |
matching alias: mykey | |
%% Negotiating: [Session-1, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA] | |
*** ServerHello, TLSv1.2 | |
RandomCookie: GMT: 1393358734 bytes = { 92, 4, 117, 153, 215, 77, 232, 80, 34, 85, 239, 250, 64, 105, 57, 112, 212, 121, 225, 177, 43, 253, 223, 245, 99, 233, 236, 8 } | |
Session ID: {83, 13, 248, 142, 121, 97, 12, 141, 184, 73, 142, 139, 40, 67, 217, 195, 204, 169, 60, 120, 4, 161, 238, 41, 205, 84, 252, 216, 210, 128, 118, 50} | |
Cipher Suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA | |
Compression Method: 0 | |
Extension renegotiation_info, renegotiated_connection: <empty> | |
*** | |
Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA | |
*** Certificate chain | |
chain [0] = [ | |
[ | |
Version: V3 | |
Subject: CN=Cloudstack User, OU=humongous, O=humongous, C=Unknown | |
Signature Algorithm: SHA256withRSA, OID = 1.2.840.113549.1.1.11 | |
Key: Sun RSA public key, 2048 bits | |
modulus: 2452218181302233624331307709000409091409570589564297031820971854616627688118597659569962950474745307215528301442413502616452297005953569106216110600747726477590183458680803443350604\ | |
976027807226228297774722250435391947719784397345987564948415831228385168702989920624838743889125959887383982738760443924244196994440488608172028191447547566197604017472195423897215489391620719\ | |
425376421505061490680565587396751452094449219919270774549150677396383436466089601049433601779879216253191187633990053054478764686813440991284749742245218924742831755534018664987153176514654030\ | |
2124135836457542940486368928034521519056850401064553 | |
public exponent: 65537 | |
Validity: [From: Tue Feb 25 11:10:34 GMT 2014, | |
To: Fri Feb 23 11:10:34 GMT 2024] | |
Issuer: CN=Cloudstack User, OU=humongous, O=humongous, C=Unknown | |
SerialNumber: [ 2fd8f956] | |
Certificate Extensions: 1 | |
[1]: ObjectId: 2.5.29.14 Criticality=false | |
SubjectKeyIdentifier [ | |
KeyIdentifier [ | |
0000: 7F 82 16 28 84 19 21 A8 A4 95 8C 3C 10 49 35 75 ...(..!....<.I5u | |
0010: 8F 58 93 7C .X.. | |
] | |
] | |
] | |
Algorithm: [SHA256withRSA] | |
Signature: | |
0000: 10 45 6E 09 D1 57 C6 71 19 F0 84 FF 96 BE 6C F8 .En..W.q......l. | |
0010: 8D C6 0E C9 AE 9C 83 16 63 9C FF AC 1D 3C 8D DF ........c....<.. | |
0020: 76 56 08 11 56 09 9D D4 A3 D9 2C C8 5F 54 42 A8 vV..V.....,._TB. | |
.... etc ..... |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment