Created
October 25, 2017 07:11
-
-
Save sbespalov/2f634c8b51821154f0cfe7c1cf16a505 to your computer and use it in GitHub Desktop.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
keyStore is : /home/sbespalov/projects/cash-flow-integration/ssl/keystore/cfkeystore.jks | |
keyStore type is : jks | |
keyStore provider is : | |
init keystore | |
init keymanager of type SunX509 | |
*** | |
found key for : cfkeystore | |
chain [0] = [ | |
[ | |
Version: V3 | |
Subject: CN=00CA0001CCFcf99usr, OU=00CA, O=Savings Bank of the Russian Federation, C=RU | |
Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5 | |
Key: Sun RSA public key, 2048 bits | |
modulus: 20961255220449257606161426700835443700888945366876302720835262813041350907276542396213878484565826032770228924541823194745375249157491165893314703327818419527232796914708047622970282105989415238961058407533188007143104722126097067053888733580232740166390253727477358230143448458873589437443165964869003047321537558495188361678622157669590690693042421567054261081525870637380547552137328038659181341067302407605719862280358364965026314846296443571270521116219578516227039856308177095788051933516002746174233514958339935697342731541011311547807790445246415378338197770160102603992558863624150711466037342273455972492887 | |
public exponent: 65537 | |
Validity: [From: Wed Oct 25 12:21:39 NOVT 2017, | |
To: Thu Oct 25 12:21:39 NOVT 2018] | |
Issuer: CN=00CA0001CCFcf99usr, OU=00CA, O=Savings Bank of the Russian Federation, C=RU | |
SerialNumber: [ 59f02d73] | |
Certificate Extensions: 2 | |
[1]: ObjectId: 2.5.29.35 Criticality=false | |
AuthorityKeyIdentifier [ | |
KeyIdentifier [ | |
0000: 0D 84 40 20 38 EB E0 30 ..@ 8..0 | |
] | |
] | |
[2]: ObjectId: 2.5.29.14 Criticality=false | |
SubjectKeyIdentifier [ | |
KeyIdentifier [ | |
0000: 0D 84 40 20 38 EB E0 30 ..@ 8..0 | |
] | |
] | |
] | |
Algorithm: [SHA1withRSA] | |
Signature: | |
0000: 06 87 3E A5 01 FA 1E 84 49 C3 5D 25 EC B2 A3 72 ..>.....I.]%...r | |
0010: C7 4D AF E5 2B 67 AD E6 60 E9 2C 94 26 9F 64 A3 .M..+g..`.,.&.d. | |
0020: 63 5A 63 9C 5A 6D 4A 02 5A 1C F4 8C EB 22 28 6C cZc.ZmJ.Z...."(l | |
0030: FD 09 D7 FE 4A 56 B3 65 65 69 0B 5D 5B 07 91 D6 ....JV.eei.][... | |
0040: 0A EA BC 20 4F F0 29 40 D0 05 63 D9 DF 28 22 63 ... O.)@..c..("c | |
0050: D0 B2 E9 43 FD EA 2A C2 9C 71 C4 D7 1A D9 92 3D ...C..*..q.....= | |
0060: F1 B5 FC E9 13 0D 7B 1F 63 EE 36 7E 1A 57 80 B4 ........c.6..W.. | |
0070: 10 15 74 EB 64 9A 13 CD 6E AE 2E A0 E9 E2 DB 0F ..t.d...n....... | |
0080: 4F F3 67 11 4F 38 AA 7A F4 6E BB FD 96 F2 A7 F0 O.g.O8.z.n...... | |
0090: 79 D6 53 43 23 86 66 FE 6D AF F8 49 F9 DF 38 59 y.SC#.f.m..I..8Y | |
00A0: 08 47 A1 4D F6 88 7D C7 F2 3B 8F 6F 46 36 D7 8C .G.M.....;.oF6.. | |
00B0: DF 54 D7 B2 0A 34 96 D7 AB 3F 63 6D 9D 29 0B F9 .T...4...?cm.).. | |
00C0: 7A F4 B4 20 4B 89 13 1F A3 00 9D 69 F4 DD 16 CD z.. K......i.... | |
00D0: 25 D6 97 96 20 F8 40 08 22 2A 25 FB 2E A4 82 77 %... .@."*%....w | |
00E0: DD AC 79 A4 CB 38 C8 D6 F5 D5 08 F2 3B B8 37 11 ..y..8......;.7. | |
00F0: 62 97 36 7D 95 60 6C 96 A0 FE 37 FF A9 30 32 B7 b.6..`l...7..02. | |
] | |
*** | |
trustStore is: /home/sbespalov/projects/cash-flow-integration/ssl/keystore/cfkeystore.jks | |
trustStore type is : jks | |
trustStore provider is : | |
init truststore | |
adding as trusted cert: | |
Subject: CN=00CA0001CCFcf99usr, OU=00CA, O=Savings Bank of the Russian Federation, C=RU | |
Issuer: CN=00CA0001CCFcf99usr, OU=00CA, O=Savings Bank of the Russian Federation, C=RU | |
Algorithm: RSA; Serial number: 0x59f02d73 | |
Valid from Wed Oct 25 12:21:39 NOVT 2017 until Thu Oct 25 12:21:39 NOVT 2018 | |
adding as trusted cert: | |
Subject: CN=00CA0001CCFcf99usr, O=Savings Bank of the Russian Federation, C=RU | |
Issuer: CN=00CA0001CCFcf99usr, O=Savings Bank of the Russian Federation, C=RU | |
Algorithm: RSA; Serial number: 0x59f02d6e | |
Valid from Wed Oct 25 12:21:34 NOVT 2017 until Thu Oct 25 12:21:34 NOVT 2018 | |
trigger seeding of SecureRandom | |
done seeding SecureRandom | |
Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 | |
Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA | |
Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 | |
Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA | |
Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 | |
Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 | |
Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA | |
Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384 | |
Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 | |
Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_GCM_SHA384 | |
Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 | |
Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 | |
Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA | |
Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384 | |
Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 | |
Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 | |
Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA | |
Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 | |
Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA | |
Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA | |
Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 | |
Allow unsafe renegotiation: false | |
Allow legacy hello messages: true | |
Is initial handshake: true | |
Is secure renegotiation: false | |
%% No cached client session | |
*** ClientHello, SSLv3 | |
RandomCookie: GMT: 1492137822 bytes = { 183, 151, 82, 171, 191, 177, 239, 66, 59, 15, 12, 223, 114, 122, 112, 101, 234, 27, 173, 46, 100, 143, 102, 6, 0, 136, 217, 162 } | |
Session ID: {} | |
Cipher Suites: [SSL_RSA_WITH_RC4_128_MD5] | |
Compression Methods: { 0 } | |
Extension renegotiation_info, renegotiated_connection: <empty> | |
*** | |
[write] MD5 and SHA1 hashes: len = 52 | |
0000: 01 00 00 30 03 00 59 F0 37 5E B7 97 52 AB BF B1 ...0..Y.7^..R... | |
0010: EF 42 3B 0F 0C DF 72 7A 70 65 EA 1B AD 2E 64 8F .B;...rzpe....d. | |
0020: 66 06 00 88 D9 A2 00 00 02 00 04 01 00 00 05 FF f............... | |
0030: 01 00 01 00 .... | |
main, WRITE: SSLv3 Handshake, length = 52 | |
[Raw write]: length = 57 | |
0000: 16 03 00 00 34 01 00 00 30 03 00 59 F0 37 5E B7 ....4...0..Y.7^. | |
0010: 97 52 AB BF B1 EF 42 3B 0F 0C DF 72 7A 70 65 EA .R....B;...rzpe. | |
0020: 1B AD 2E 64 8F 66 06 00 88 D9 A2 00 00 02 00 04 ...d.f.......... | |
0030: 01 00 00 05 FF 01 00 01 00 ......... | |
main, received EOFException: error | |
main, handling exception: javax.net.ssl.SSLHandshakeException: Remote host closed connection during handshake | |
main, SEND TLSv1.2 ALERT: fatal, description = handshake_failure | |
main, WRITE: TLSv1.2 Alert, length = 2 | |
[Raw write]: length = 7 | |
0000: 15 03 03 00 02 02 28 ......( | |
main, called closeSocket() | |
Exception in thread "main" com.ibm.msg.client.jms.DetailedJMSException: JMSWMQ0018: Failed to connect to queue manager 'QM1' with connection mode 'Client' and host name 'localhost(1414)'. | |
Check the queue manager is started and if running in client mode, check there is a listener running. Please see the linked exception for more information. | |
at com.ibm.msg.client.wmq.common.internal.Reason.reasonToException(Reason.java:585) | |
at com.ibm.msg.client.wmq.common.internal.Reason.createException(Reason.java:221) | |
at com.ibm.msg.client.wmq.internal.WMQConnection.<init>(WMQConnection.java:426) | |
at com.ibm.msg.client.wmq.factories.WMQConnectionFactory.createV7ProviderConnection(WMQConnectionFactory.java:6902) | |
at com.ibm.msg.client.wmq.factories.WMQConnectionFactory.createProviderConnection(WMQConnectionFactory.java:6277) | |
at com.ibm.msg.client.jms.admin.JmsConnectionFactoryImpl.createConnection(JmsConnectionFactoryImpl.java:285) | |
at com.ibm.mq.jms.MQConnectionFactory.createCommonConnection(MQConnectionFactory.java:6233) | |
at com.ibm.mq.jms.MQQueueConnectionFactory.createQueueConnection(MQQueueConnectionFactory.java:120) | |
at com.ibm.mq.jms.MQQueueConnectionFactory.createConnection(MQQueueConnectionFactory.java:203) | |
at ru.ptit.sbt.cashflow.integration.jms.JmsConfigSSL.main(JmsConfigSSL.java:144) | |
Caused by: com.ibm.mq.MQException: JMSCMQ0001: WebSphere MQ call failed with compcode '2' ('MQCC_FAILED') reason '2397' ('MQRC_JSSE_ERROR'). | |
at com.ibm.msg.client.wmq.common.internal.Reason.createException(Reason.java:209) | |
... 8 more | |
Caused by: com.ibm.mq.jmqi.JmqiException: CC=2;RC=2397;AMQ9204: Connection to host 'localhost(1414)' rejected. [1=com.ibm.mq.jmqi.JmqiException[CC=2;RC=2397;AMQ9771: SSL handshake failed. [1=javax.net.ssl.SSLHandshakeException[Remote host closed connection during handshake],3=localhost/127.0.0.1:1414 (localhost),4=SSLSocket.startHandshake,5=default]],3=localhost(1414),5=RemoteTCPConnection.protocolConnect] | |
at com.ibm.mq.jmqi.remote.api.RemoteFAP.jmqiConnect(RemoteFAP.java:2053) | |
at com.ibm.mq.jmqi.remote.api.RemoteFAP.jmqiConnect(RemoteFAP.java:1226) | |
at com.ibm.mq.ese.jmqi.InterceptedJmqiImpl.jmqiConnect(InterceptedJmqiImpl.java:311) | |
at com.ibm.mq.ese.jmqi.ESEJMQI.jmqiConnect(ESEJMQI.java:337) | |
at com.ibm.msg.client.wmq.internal.WMQConnection.<init>(WMQConnection.java:346) | |
... 7 more | |
Caused by: com.ibm.mq.jmqi.JmqiException: CC=2;RC=2397;AMQ9771: SSL handshake failed. [1=javax.net.ssl.SSLHandshakeException[Remote host closed connection during handshake],3=localhost/127.0.0.1:1414 (localhost),4=SSLSocket.startHandshake,5=default] | |
at com.ibm.mq.jmqi.remote.impl.RemoteTCPConnection.protocolConnect(RemoteTCPConnection.java:1187) | |
at com.ibm.mq.jmqi.remote.impl.RemoteConnection.connect(RemoteConnection.java:724) | |
at com.ibm.mq.jmqi.remote.impl.RemoteConnectionSpecification.getSessionFromNewConnection(RemoteConnectionSpecification.java:400) | |
at com.ibm.mq.jmqi.remote.impl.RemoteConnectionSpecification.getSession(RemoteConnectionSpecification.java:299) | |
at com.ibm.mq.jmqi.remote.impl.RemoteConnectionPool.getSession(RemoteConnectionPool.java:164) | |
at com.ibm.mq.jmqi.remote.api.RemoteFAP.jmqiConnect(RemoteFAP.java:1598) | |
... 11 more | |
Caused by: javax.net.ssl.SSLHandshakeException: Remote host closed connection during handshake | |
at sun.security.ssl.SSLSocketImpl.readRecord(SSLSocketImpl.java:992) | |
at sun.security.ssl.SSLSocketImpl.performInitialHandshake(SSLSocketImpl.java:1375) | |
at sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:1403) | |
at sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:1387) | |
at com.ibm.mq.jmqi.remote.impl.RemoteTCPConnection$6.run(RemoteTCPConnection.java:1156) | |
at com.ibm.mq.jmqi.remote.impl.RemoteTCPConnection$6.run(RemoteTCPConnection.java:1151) | |
at java.security.AccessController.doPrivileged(Native Method) | |
at com.ibm.mq.jmqi.remote.impl.RemoteTCPConnection.protocolConnect(RemoteTCPConnection.java:1149) | |
... 16 more | |
Caused by: java.io.EOFException: SSL peer shut down incorrectly | |
at sun.security.ssl.InputRecord.read(InputRecord.java:505) | |
at sun.security.ssl.SSLSocketImpl.readRecord(SSLSocketImpl.java:973) | |
... 23 more |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment