Created
October 31, 2018 08:20
-
-
Save sebastianvoss/da66dd89fd93365ac97035dd080ddcc5 to your computer and use it in GitHub Desktop.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
[info] 09:18:34.124 [blaze-nio1-acceptor] INFO o.h.blaze.channel.ServerChannelGroup - Connection to /127.0.0.1:52427 accepted at Wed Oct 31 09:18:34 CET 2018. | |
[error] certpath: Constraints: MD2 | |
[error] certpath: Constraints: MD5 | |
[error] certpath: Constraints: RSA keySize < 1024 | |
[error] certpath: Constraints set to keySize: keySize < 1024 | |
[error] certpath: Constraints: DSA keySize < 1024 | |
[error] certpath: Constraints set to keySize: keySize < 1024 | |
[error] certpath: Constraints: MD2 | |
[error] certpath: Constraints: MD5 | |
[error] certpath: Constraints: RSA keySize < 1024 | |
[error] certpath: Constraints set to keySize: keySize < 1024 | |
[error] certpath: Constraints: DSA keySize < 1024 | |
[error] certpath: Constraints set to keySize: keySize < 1024 | |
[error] certpath: Constraints.permits(): SHA1withRSA Variant: generic | |
[error] certpath: KeySizeConstraints.permits(): RSA | |
[error] certpath: Constraints.permits(): SHA1 Variant: generic | |
[error] certpath: Constraints.permits(): SHA1withRSA Variant: generic | |
[error] certpath: KeySizeConstraints.permits(): RSA | |
[error] certpath: Constraints.permits(): SHA1 Variant: generic | |
[error] certpath: Constraints.permits(): SHA256withRSA Variant: generic | |
[error] certpath: KeySizeConstraints.permits(): RSA | |
[error] certpath: Constraints.permits(): SHA-256 Variant: generic | |
[error] certpath: Constraints.permits(): SHA256withRSA Variant: generic | |
[error] certpath: KeySizeConstraints.permits(): RSA | |
[error] certpath: Constraints.permits(): SHA-256 Variant: generic | |
[error] certpath: Constraints.permits(): SHA1withRSA Variant: generic | |
[error] certpath: KeySizeConstraints.permits(): RSA | |
[error] certpath: Constraints.permits(): SHA1 Variant: generic | |
[error] certpath: Constraints: MD2 | |
[error] certpath: Constraints: MD5 | |
[error] certpath: Constraints: SHA1 jdkCA & usage TLSServer | |
[error] certpath: Constraints set to jdkCA. | |
[error] certpath: Constraints usage length is 1 | |
[error] certpath: Constraints: RSA keySize < 1024 | |
[error] certpath: Constraints set to keySize: keySize < 1024 | |
[error] certpath: Constraints: DSA keySize < 1024 | |
[error] certpath: Constraints set to keySize: keySize < 1024 | |
[error] certpath: Constraints: EC keySize < 224 | |
[error] certpath: Constraints set to keySize: keySize < 224 | |
[error] certpath: AlgorithmChecker.contains: SHA1withDSA | |
[error] certpath: Constraints: SSLv3 | |
[error] certpath: Constraints: RC4 | |
[error] certpath: Constraints: DES | |
[error] certpath: Constraints: MD5withRSA | |
[error] certpath: Constraints: DH keySize < 1024 | |
[error] certpath: Constraints set to keySize: keySize < 1024 | |
[error] certpath: Constraints: EC keySize < 224 | |
[error] certpath: Constraints set to keySize: keySize < 224 | |
[error] certpath: Constraints: 3DES_EDE_CBC | |
[error] certpath: Constraints: MD2 | |
[error] certpath: Constraints: MD5 | |
[error] certpath: Constraints: SHA1 jdkCA & usage TLSServer | |
[error] certpath: Constraints set to jdkCA. | |
[error] certpath: Constraints usage length is 1 | |
[error] certpath: Constraints: RSA keySize < 1024 | |
[error] certpath: Constraints set to keySize: keySize < 1024 | |
[error] certpath: Constraints: DSA keySize < 1024 | |
[error] certpath: Constraints set to keySize: keySize < 1024 | |
[error] certpath: Constraints: EC keySize < 224 | |
[error] certpath: Constraints set to keySize: keySize < 224 | |
[error] certpath: Constraints.permits(): SHA1withRSA Variant: generic | |
[error] certpath: KeySizeConstraints.permits(): RSA | |
[error] certpath: Constraints.permits(): SHA1 Variant: generic | |
[error] certpath: AlgorithmChecker.contains: SHA1withDSA | |
[info] 09:18:34.500 [blaze-nio-fixed-selector-pool-1] ERROR org.http4s.server.blaze.BlazeBuilder - peer not authenticated | |
[info] javax.net.ssl.SSLPeerUnverifiedException: peer not authenticated | |
[info] at sun.security.ssl.SSLSessionImpl.getPeerCertificates(SSLSessionImpl.java:450) | |
[info] at org.http4s.server.blaze.BlazeBuilder.liftedTree1$1(BlazeBuilder.scala:206) | |
[info] at org.http4s.server.blaze.BlazeBuilder.$anonfun$start$3(BlazeBuilder.scala:205) | |
[info] at org.http4s.blaze.channel.nio1.SelectorLoop$$anon$1.run(SelectorLoop.scala:73) | |
[info] at org.http4s.blaze.channel.nio1.SelectorLoop.go$1(SelectorLoop.scala:91) | |
[info] at org.http4s.blaze.channel.nio1.SelectorLoop.runTasks(SelectorLoop.scala:105) | |
[info] at org.http4s.blaze.channel.nio1.SelectorLoop.run(SelectorLoop.scala:116) | |
[error] certpath: TrustAnchor is null, trustedMatch is false. | |
[error] certpath: PKIXCertPathValidator.engineValidate()... | |
[error] certpath: X509CertSelector.match(SN: 1 | |
[error] Issuer: CN=Simple Root CA, OU=Simple Root CA, O=Simple Inc, DC=iq-chp, DC=com | |
[error] Subject: CN=Simple Root CA, OU=Simple Root CA, O=Simple Inc, DC=iq-chp, DC=com) | |
[error] certpath: X509CertSelector.match returning: true | |
[error] certpath: YES - try this trustedCert | |
[error] certpath: anchor.getTrustedCert().getSubjectX500Principal() = CN=Simple Root CA, OU=Simple Root CA, O=Simple Inc, DC=iq-chp, DC=com | |
[error] certpath: AlgorithmChecker.contains: SHA1withRSA | |
[error] certpath: -------------------------------------------------------------- | |
[error] certpath: Executing PKIX certification path validation algorithm. | |
[error] certpath: Checking cert1 - Subject: CN=Simple Signing CA, OU=Simple Signing CA, O=Simple Inc, DC=iq-chp, DC=com | |
[error] certpath: Set of critical extensions: {2.5.29.15, 2.5.29.19} | |
[error] certpath: -Using checker1 ... [sun.security.provider.certpath.UntrustedChecker] | |
[error] certpath: -checker1 validation succeeded | |
[error] certpath: -Using checker2 ... [sun.security.provider.certpath.AlgorithmChecker] | |
[error] certpath: Constraints.permits(): SHA1withRSA Variant: tls client | |
[error] certpath: jdkCAConstraints.permits(): SHA1 | |
[error] certpath: KeySizeConstraints.permits(): RSA | |
[error] certpath: -checker2 validation succeeded | |
[error] certpath: -Using checker3 ... [sun.security.provider.certpath.KeyChecker] | |
[error] certpath: KeyChecker.verifyCAKeyUsage() ---checking CA key usage... | |
[error] certpath: KeyChecker.verifyCAKeyUsage() CA key usage verified. | |
[error] certpath: -checker3 validation succeeded | |
[error] certpath: -Using checker4 ... [sun.security.provider.certpath.ConstraintsChecker] | |
[error] certpath: ---checking basic constraints... | |
[error] certpath: i = 1, maxPathLength = 2 | |
[error] certpath: after processing, maxPathLength = 0 | |
[error] certpath: basic constraints verified. | |
[error] certpath: ---checking name constraints... | |
[error] certpath: prevNC = null, newNC = null | |
[error] certpath: mergedNC = null | |
[error] certpath: name constraints verified. | |
[error] certpath: -checker4 validation succeeded | |
[error] certpath: -Using checker5 ... [sun.security.provider.certpath.PolicyChecker] | |
[error] certpath: PolicyChecker.checkPolicy() ---checking certificate policies... | |
[error] certpath: PolicyChecker.checkPolicy() certIndex = 1 | |
[error] certpath: PolicyChecker.checkPolicy() BEFORE PROCESSING: explicitPolicy = 3 | |
[error] certpath: PolicyChecker.checkPolicy() BEFORE PROCESSING: policyMapping = 3 | |
[error] certpath: PolicyChecker.checkPolicy() BEFORE PROCESSING: inhibitAnyPolicy = 3 | |
[error] certpath: PolicyChecker.checkPolicy() BEFORE PROCESSING: policyTree = anyPolicy ROOT | |
[error] certpath: PolicyChecker.processPolicies() no policies present in cert | |
[error] certpath: PolicyChecker.checkPolicy() AFTER PROCESSING: explicitPolicy = 2 | |
[error] certpath: PolicyChecker.checkPolicy() AFTER PROCESSING: policyMapping = 2 | |
[error] certpath: PolicyChecker.checkPolicy() AFTER PROCESSING: inhibitAnyPolicy = 2 | |
[error] certpath: PolicyChecker.checkPolicy() AFTER PROCESSING: policyTree = null | |
[error] certpath: PolicyChecker.checkPolicy() certificate policies verified | |
[error] certpath: -checker5 validation succeeded | |
[error] certpath: -Using checker6 ... [sun.security.provider.certpath.BasicChecker] | |
[error] certpath: ---checking validity:Wed Oct 31 09:18:34 CET 2018... | |
[error] certpath: validity verified. | |
[error] certpath: ---checking subject/issuer name chaining... | |
[error] certpath: subject/issuer name chaining verified. | |
[error] certpath: ---checking signature... | |
[error] certpath: signature verified. | |
[error] certpath: BasicChecker.updateState issuer: CN=Simple Root CA, OU=Simple Root CA, O=Simple Inc, DC=iq-chp, DC=com; subject: CN=Simple Signing CA, OU=Simple Signing CA, O=Simple Inc, DC=iq-chp, DC=com; serial#: 2 | |
[error] certpath: -checker6 validation succeeded | |
[error] certpath: -Using checker7 ... [sun.security.provider.certpath.AlgorithmChecker] | |
[error] certpath: Constraints.permits(): SHA1withRSA Variant: tls client | |
[error] certpath: jdkCAConstraints.permits(): SHA1 | |
[error] certpath: -checker7 validation succeeded | |
[error] certpath: | |
[error] cert1 validation succeeded. | |
[error] certpath: Checking cert2 - Subject: CN=grenzach, O=Simple Inc, DC=iq-chp, DC=com | |
[error] certpath: Set of critical extensions: {2.5.29.15} | |
[error] certpath: -Using checker1 ... [sun.security.provider.certpath.UntrustedChecker] | |
[error] certpath: -checker1 validation succeeded | |
[error] certpath: -Using checker2 ... [sun.security.provider.certpath.AlgorithmChecker] | |
[error] certpath: Constraints.permits(): SHA1withRSA Variant: tls client | |
[error] certpath: jdkCAConstraints.permits(): SHA1 | |
[error] certpath: KeySizeConstraints.permits(): RSA | |
[error] certpath: -checker2 validation succeeded | |
[error] certpath: -Using checker3 ... [sun.security.provider.certpath.KeyChecker] | |
[error] certpath: -checker3 validation succeeded | |
[error] certpath: -Using checker4 ... [sun.security.provider.certpath.ConstraintsChecker] | |
[error] certpath: ---checking basic constraints... | |
[error] certpath: i = 2, maxPathLength = 0 | |
[error] certpath: after processing, maxPathLength = 0 | |
[error] certpath: basic constraints verified. | |
[error] certpath: ---checking name constraints... | |
[error] certpath: prevNC = null, newNC = null | |
[error] certpath: mergedNC = null | |
[error] certpath: name constraints verified. | |
[error] certpath: -checker4 validation succeeded | |
[error] certpath: -Using checker5 ... [sun.security.provider.certpath.PolicyChecker] | |
[error] certpath: PolicyChecker.checkPolicy() ---checking certificate policies... | |
[error] certpath: PolicyChecker.checkPolicy() certIndex = 2 | |
[error] certpath: PolicyChecker.checkPolicy() BEFORE PROCESSING: explicitPolicy = 2 | |
[error] certpath: PolicyChecker.checkPolicy() BEFORE PROCESSING: policyMapping = 2 | |
[error] certpath: PolicyChecker.checkPolicy() BEFORE PROCESSING: inhibitAnyPolicy = 2 | |
[error] certpath: PolicyChecker.checkPolicy() BEFORE PROCESSING: policyTree = null | |
[error] certpath: PolicyChecker.processPolicies() no policies present in cert | |
[error] certpath: PolicyChecker.checkPolicy() AFTER PROCESSING: explicitPolicy = 2 | |
[error] certpath: PolicyChecker.checkPolicy() AFTER PROCESSING: policyMapping = 2 | |
[error] certpath: PolicyChecker.checkPolicy() AFTER PROCESSING: inhibitAnyPolicy = 2 | |
[error] certpath: PolicyChecker.checkPolicy() AFTER PROCESSING: policyTree = null | |
[error] certpath: PolicyChecker.checkPolicy() certificate policies verified | |
[error] certpath: -checker5 validation succeeded | |
[error] certpath: -Using checker6 ... [sun.security.provider.certpath.BasicChecker] | |
[error] certpath: ---checking validity:Wed Oct 31 09:18:34 CET 2018... | |
[error] certpath: validity verified. | |
[error] certpath: ---checking subject/issuer name chaining... | |
[error] certpath: subject/issuer name chaining verified. | |
[error] certpath: ---checking signature... | |
[error] certpath: signature verified. | |
[error] certpath: BasicChecker.updateState issuer: CN=Simple Signing CA, OU=Simple Signing CA, O=Simple Inc, DC=iq-chp, DC=com; subject: CN=grenzach, O=Simple Inc, DC=iq-chp, DC=com; serial#: 2 | |
[error] certpath: -checker6 validation succeeded | |
[error] certpath: -Using checker7 ... [sun.security.provider.certpath.AlgorithmChecker] | |
[error] certpath: Constraints.permits(): SHA1withRSA Variant: tls client | |
[error] certpath: jdkCAConstraints.permits(): SHA1 | |
[error] certpath: -checker7 validation succeeded | |
[error] certpath: | |
[error] cert2 validation succeeded. | |
[error] certpath: Cert path validation succeeded. (PKIX validation algorithm) | |
[error] certpath: -------------------------------------------------------------- | |
[error] certpath: KeySizeConstraints.permits(): EC | |
[error] certpath: KeySizeConstraints.permits(): EC |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment