Skip to content

Instantly share code, notes, and snippets.

@sbespalov
Created October 25, 2017 07:11
Show Gist options
  • Save sbespalov/5edca7b4e89f907b2aef8b918f87d676 to your computer and use it in GitHub Desktop.
Save sbespalov/5edca7b4e89f907b2aef8b918f87d676 to your computer and use it in GitHub Desktop.
keyStore is : /home/sbespalov/projects/cash-flow-integration/ssl/keystore/cfkeystore.jks
keyStore type is : jks
keyStore provider is :
init keystore
init keymanager of type SunX509
***
found key for : cfkeystore
chain [0] = [
[
Version: V3
Subject: CN=00CA0001CCFcf99usr, OU=00CA, O=Savings Bank of the Russian Federation, C=RU
Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5
Key: Sun RSA public key, 2048 bits
modulus: 20961255220449257606161426700835443700888945366876302720835262813041350907276542396213878484565826032770228924541823194745375249157491165893314703327818419527232796914708047622970282105989415238961058407533188007143104722126097067053888733580232740166390253727477358230143448458873589437443165964869003047321537558495188361678622157669590690693042421567054261081525870637380547552137328038659181341067302407605719862280358364965026314846296443571270521116219578516227039856308177095788051933516002746174233514958339935697342731541011311547807790445246415378338197770160102603992558863624150711466037342273455972492887
public exponent: 65537
Validity: [From: Wed Oct 25 12:21:39 NOVT 2017,
To: Thu Oct 25 12:21:39 NOVT 2018]
Issuer: CN=00CA0001CCFcf99usr, OU=00CA, O=Savings Bank of the Russian Federation, C=RU
SerialNumber: [ 59f02d73]
Certificate Extensions: 2
[1]: ObjectId: 2.5.29.35 Criticality=false
AuthorityKeyIdentifier [
KeyIdentifier [
0000: 0D 84 40 20 38 EB E0 30 ..@ 8..0
]
]
[2]: ObjectId: 2.5.29.14 Criticality=false
SubjectKeyIdentifier [
KeyIdentifier [
0000: 0D 84 40 20 38 EB E0 30 ..@ 8..0
]
]
]
Algorithm: [SHA1withRSA]
Signature:
0000: 06 87 3E A5 01 FA 1E 84 49 C3 5D 25 EC B2 A3 72 ..>.....I.]%...r
0010: C7 4D AF E5 2B 67 AD E6 60 E9 2C 94 26 9F 64 A3 .M..+g..`.,.&.d.
0020: 63 5A 63 9C 5A 6D 4A 02 5A 1C F4 8C EB 22 28 6C cZc.ZmJ.Z...."(l
0030: FD 09 D7 FE 4A 56 B3 65 65 69 0B 5D 5B 07 91 D6 ....JV.eei.][...
0040: 0A EA BC 20 4F F0 29 40 D0 05 63 D9 DF 28 22 63 ... O.)@..c..("c
0050: D0 B2 E9 43 FD EA 2A C2 9C 71 C4 D7 1A D9 92 3D ...C..*..q.....=
0060: F1 B5 FC E9 13 0D 7B 1F 63 EE 36 7E 1A 57 80 B4 ........c.6..W..
0070: 10 15 74 EB 64 9A 13 CD 6E AE 2E A0 E9 E2 DB 0F ..t.d...n.......
0080: 4F F3 67 11 4F 38 AA 7A F4 6E BB FD 96 F2 A7 F0 O.g.O8.z.n......
0090: 79 D6 53 43 23 86 66 FE 6D AF F8 49 F9 DF 38 59 y.SC#.f.m..I..8Y
00A0: 08 47 A1 4D F6 88 7D C7 F2 3B 8F 6F 46 36 D7 8C .G.M.....;.oF6..
00B0: DF 54 D7 B2 0A 34 96 D7 AB 3F 63 6D 9D 29 0B F9 .T...4...?cm.)..
00C0: 7A F4 B4 20 4B 89 13 1F A3 00 9D 69 F4 DD 16 CD z.. K......i....
00D0: 25 D6 97 96 20 F8 40 08 22 2A 25 FB 2E A4 82 77 %... .@."*%....w
00E0: DD AC 79 A4 CB 38 C8 D6 F5 D5 08 F2 3B B8 37 11 ..y..8......;.7.
00F0: 62 97 36 7D 95 60 6C 96 A0 FE 37 FF A9 30 32 B7 b.6..`l...7..02.
]
***
trustStore is: /home/sbespalov/projects/cash-flow-integration/ssl/keystore/cfkeystore.jks
trustStore type is : jks
trustStore provider is :
init truststore
adding as trusted cert:
Subject: CN=00CA0001CCFcf99usr, OU=00CA, O=Savings Bank of the Russian Federation, C=RU
Issuer: CN=00CA0001CCFcf99usr, OU=00CA, O=Savings Bank of the Russian Federation, C=RU
Algorithm: RSA; Serial number: 0x59f02d73
Valid from Wed Oct 25 12:21:39 NOVT 2017 until Thu Oct 25 12:21:39 NOVT 2018
adding as trusted cert:
Subject: CN=00CA0001CCFcf99usr, O=Savings Bank of the Russian Federation, C=RU
Issuer: CN=00CA0001CCFcf99usr, O=Savings Bank of the Russian Federation, C=RU
Algorithm: RSA; Serial number: 0x59f02d6e
Valid from Wed Oct 25 12:21:34 NOVT 2017 until Thu Oct 25 12:21:34 NOVT 2018
trigger seeding of SecureRandom
done seeding SecureRandom
Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384
Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA
Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA
Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256
Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA
Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384
Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384
Ignoring unavailable cipher suite: TLS_RSA_WITH_AES_256_GCM_SHA384
Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384
Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA
Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384
Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384
Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
Ignoring unavailable cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256
Ignoring unavailable cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA
Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
Allow unsafe renegotiation: false
Allow legacy hello messages: true
Is initial handshake: true
Is secure renegotiation: false
%% No cached client session
*** ClientHello, SSLv3
RandomCookie: GMT: 1492137822 bytes = { 183, 151, 82, 171, 191, 177, 239, 66, 59, 15, 12, 223, 114, 122, 112, 101, 234, 27, 173, 46, 100, 143, 102, 6, 0, 136, 217, 162 }
Session ID: {}
Cipher Suites: [SSL_RSA_WITH_RC4_128_MD5]
Compression Methods: { 0 }
Extension renegotiation_info, renegotiated_connection: <empty>
***
[write] MD5 and SHA1 hashes: len = 52
0000: 01 00 00 30 03 00 59 F0 37 5E B7 97 52 AB BF B1 ...0..Y.7^..R...
0010: EF 42 3B 0F 0C DF 72 7A 70 65 EA 1B AD 2E 64 8F .B;...rzpe....d.
0020: 66 06 00 88 D9 A2 00 00 02 00 04 01 00 00 05 FF f...............
0030: 01 00 01 00 ....
main, WRITE: SSLv3 Handshake, length = 52
[Raw write]: length = 57
0000: 16 03 00 00 34 01 00 00 30 03 00 59 F0 37 5E B7 ....4...0..Y.7^.
0010: 97 52 AB BF B1 EF 42 3B 0F 0C DF 72 7A 70 65 EA .R....B;...rzpe.
0020: 1B AD 2E 64 8F 66 06 00 88 D9 A2 00 00 02 00 04 ...d.f..........
0030: 01 00 00 05 FF 01 00 01 00 .........
main, received EOFException: error
main, handling exception: javax.net.ssl.SSLHandshakeException: Remote host closed connection during handshake
main, SEND TLSv1.2 ALERT: fatal, description = handshake_failure
main, WRITE: TLSv1.2 Alert, length = 2
[Raw write]: length = 7
0000: 15 03 03 00 02 02 28 ......(
main, called closeSocket()
Exception in thread "main" com.ibm.msg.client.jms.DetailedJMSException: JMSWMQ0018: Failed to connect to queue manager 'QM1' with connection mode 'Client' and host name 'localhost(1414)'.
Check the queue manager is started and if running in client mode, check there is a listener running. Please see the linked exception for more information.
at com.ibm.msg.client.wmq.common.internal.Reason.reasonToException(Reason.java:585)
at com.ibm.msg.client.wmq.common.internal.Reason.createException(Reason.java:221)
at com.ibm.msg.client.wmq.internal.WMQConnection.<init>(WMQConnection.java:426)
at com.ibm.msg.client.wmq.factories.WMQConnectionFactory.createV7ProviderConnection(WMQConnectionFactory.java:6902)
at com.ibm.msg.client.wmq.factories.WMQConnectionFactory.createProviderConnection(WMQConnectionFactory.java:6277)
at com.ibm.msg.client.jms.admin.JmsConnectionFactoryImpl.createConnection(JmsConnectionFactoryImpl.java:285)
at com.ibm.mq.jms.MQConnectionFactory.createCommonConnection(MQConnectionFactory.java:6233)
at com.ibm.mq.jms.MQQueueConnectionFactory.createQueueConnection(MQQueueConnectionFactory.java:120)
at com.ibm.mq.jms.MQQueueConnectionFactory.createConnection(MQQueueConnectionFactory.java:203)
at ru.ptit.sbt.cashflow.integration.jms.JmsConfigSSL.main(JmsConfigSSL.java:144)
Caused by: com.ibm.mq.MQException: JMSCMQ0001: WebSphere MQ call failed with compcode '2' ('MQCC_FAILED') reason '2397' ('MQRC_JSSE_ERROR').
at com.ibm.msg.client.wmq.common.internal.Reason.createException(Reason.java:209)
... 8 more
Caused by: com.ibm.mq.jmqi.JmqiException: CC=2;RC=2397;AMQ9204: Connection to host 'localhost(1414)' rejected. [1=com.ibm.mq.jmqi.JmqiException[CC=2;RC=2397;AMQ9771: SSL handshake failed. [1=javax.net.ssl.SSLHandshakeException[Remote host closed connection during handshake],3=localhost/127.0.0.1:1414 (localhost),4=SSLSocket.startHandshake,5=default]],3=localhost(1414),5=RemoteTCPConnection.protocolConnect]
at com.ibm.mq.jmqi.remote.api.RemoteFAP.jmqiConnect(RemoteFAP.java:2053)
at com.ibm.mq.jmqi.remote.api.RemoteFAP.jmqiConnect(RemoteFAP.java:1226)
at com.ibm.mq.ese.jmqi.InterceptedJmqiImpl.jmqiConnect(InterceptedJmqiImpl.java:311)
at com.ibm.mq.ese.jmqi.ESEJMQI.jmqiConnect(ESEJMQI.java:337)
at com.ibm.msg.client.wmq.internal.WMQConnection.<init>(WMQConnection.java:346)
... 7 more
Caused by: com.ibm.mq.jmqi.JmqiException: CC=2;RC=2397;AMQ9771: SSL handshake failed. [1=javax.net.ssl.SSLHandshakeException[Remote host closed connection during handshake],3=localhost/127.0.0.1:1414 (localhost),4=SSLSocket.startHandshake,5=default]
at com.ibm.mq.jmqi.remote.impl.RemoteTCPConnection.protocolConnect(RemoteTCPConnection.java:1187)
at com.ibm.mq.jmqi.remote.impl.RemoteConnection.connect(RemoteConnection.java:724)
at com.ibm.mq.jmqi.remote.impl.RemoteConnectionSpecification.getSessionFromNewConnection(RemoteConnectionSpecification.java:400)
at com.ibm.mq.jmqi.remote.impl.RemoteConnectionSpecification.getSession(RemoteConnectionSpecification.java:299)
at com.ibm.mq.jmqi.remote.impl.RemoteConnectionPool.getSession(RemoteConnectionPool.java:164)
at com.ibm.mq.jmqi.remote.api.RemoteFAP.jmqiConnect(RemoteFAP.java:1598)
... 11 more
Caused by: javax.net.ssl.SSLHandshakeException: Remote host closed connection during handshake
at sun.security.ssl.SSLSocketImpl.readRecord(SSLSocketImpl.java:992)
at sun.security.ssl.SSLSocketImpl.performInitialHandshake(SSLSocketImpl.java:1375)
at sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:1403)
at sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:1387)
at com.ibm.mq.jmqi.remote.impl.RemoteTCPConnection$6.run(RemoteTCPConnection.java:1156)
at com.ibm.mq.jmqi.remote.impl.RemoteTCPConnection$6.run(RemoteTCPConnection.java:1151)
at java.security.AccessController.doPrivileged(Native Method)
at com.ibm.mq.jmqi.remote.impl.RemoteTCPConnection.protocolConnect(RemoteTCPConnection.java:1149)
... 16 more
Caused by: java.io.EOFException: SSL peer shut down incorrectly
at sun.security.ssl.InputRecord.read(InputRecord.java:505)
at sun.security.ssl.SSLSocketImpl.readRecord(SSLSocketImpl.java:973)
... 23 more
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment