Created
March 29, 2023 21:37
-
-
Save ywkaras/a7b511a290d62627be18ba301653944c to your computer and use it in GitHub Desktop.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
[Mar 29 21:15:22.663] traffic_server NOTE: records parsing completed. | |
[Mar 29 21:15:22.663] traffic_server NOTE: /home/wkaras/REPOS/TS/tests/_sandbox/cert_loader_disk/ts/config/records.yaml finished loading | |
[Mar 29 21:15:22.670] traffic_server NOTE: Traffic Server is running unprivileged, not switching to user 'nobody' | |
2023-03-29T21:15:22.723Z E 349827 ZTSCLT:ZTSClient:init: cannot open certifcate file: `�� : errno: 2 | |
2023-03-29T21:15:22.723Z E 349827 ZTSCLT:ZTSClient:init: cannot open certifcate file: `�� : errno: 2 | |
[Mar 29 21:15:23.005] traffic_server DEBUG: <SSLConfig.cc:509 (reconfigure)> (ssl_load) Reload SSLConfig | |
[Mar 29 21:15:23.005] traffic_server DEBUG: <SSLSessionCache.cc:44 (SSLSessionCache)> (ssl.session_cache) Created new ssl session cache 0x18532d0 with 256 buckets each with size max size 400 | |
[Mar 29 21:15:23.005] traffic_server DEBUG: <TLSKeyLogger.cc:51 (enable_keylogging_internal)> (ssl_keylog) Enabling TLS key logging to: /home/wkaras/REPOS/TS/tests/_sandbox/cert_loader_disk/ts/log/tls_session_keys.txt. | |
[Mar 29 21:15:23.006] traffic_server DEBUG: <SSLConfig.cc:817 (getCTX)> (ssl_client_ctx) Look for client cert ":/home/wkaras/REPOS/TS/tests/_sandbox/cert_loader_disk/ts/etc/trafficserver" "" | |
[Mar 29 21:15:23.006] traffic_server DEBUG: <SSLConfig.cc:834 (getCTX)> (ssl_client_ctx) Load new cert for :/home/wkaras/REPOS/TS/tests/_sandbox/cert_loader_disk/ts/etc/trafficserver | |
[Mar 29 21:15:23.006] traffic_server DEBUG: <SSLSNIConfig.cc:265 (reconfigure)> (ssl) Reload SNI file | |
[Mar 29 21:15:23.006] traffic_server DEBUG: <SSLUtils.cc:2006 (load)> (ssl_load) currently parsing dest_ip at line 1 from config file: /home/wkaras/REPOS/TS/tests/_sandbox/cert_loader_disk/ts/config/ssl_multicert.config | |
[Mar 29 21:15:23.006] traffic_server DEBUG: <SSLUtils.cc:1899 (ssl_extract_certificate)> (ssl_load) Extracting certificate label: dest_ip, value: * | |
[Mar 29 21:15:23.006] traffic_server DEBUG: <SSLUtils.cc:1899 (ssl_extract_certificate)> (ssl_load) Extracting certificate label: ssl_cert_name, value: 2050.crt | |
[Mar 29 21:15:23.006] traffic_server DEBUG: <SSLUtils.cc:1899 (ssl_extract_certificate)> (ssl_load) Extracting certificate label: ssl_key_name, value: private.key | |
[Mar 29 21:15:23.006] traffic_server DEBUG: <SSLSecret.cc:112 (getOrLoadSecret)> (ssl_secret) lookup up secrets for /home/wkaras/REPOS/TS/tests/_sandbox/cert_loader_disk/ts/ssl/2050.crt and /home/wkaras/REPOS/TS/tests/_sandbox/cert_loader_disk/ts/ssl/private.key | |
[Mar 29 21:15:23.006] traffic_server DEBUG: <InkAPI.cc:9443 (TSSslSecretSet)> (ssl.cert_update) Setting secrets in SSLConfig for: /home/wkaras/REPOS/TS/tests/_sandbox/cert_loader_disk/ts/ssl/2050.crt | |
[Mar 29 21:15:23.006] traffic_server DEBUG: <SSLSecret.cc:88 (setSecret)> (ssl_secret) Set secret for /home/wkaras/REPOS/TS/tests/_sandbox/cert_loader_disk/ts/ssl/2050.crt to -----BEGIN CERTIFICATE----- | |
MIICZjCCAc+gAwIBAgIULZ | |
[Mar 29 21:15:23.006] traffic_server DEBUG: <SSLConfig.cc:758 (updateCTX)> (ssl_config_updateCTX) Update cert /home/wkaras/REPOS/TS/tests/_sandbox/cert_loader_disk/ts/ssl/2050.crt, 0x1973a60 | |
[Mar 29 21:15:23.006] traffic_server DEBUG: <SSLConfig.cc:777 (updateCTX)> (ssl_load) Update cert /home/wkaras/REPOS/TS/tests/_sandbox/cert_loader_disk/ts/ssl/2050.crt | |
[Mar 29 21:15:23.006] traffic_server DEBUG: <InkAPI.cc:9443 (TSSslSecretSet)> (ssl.cert_update) Setting secrets in SSLConfig for: /home/wkaras/REPOS/TS/tests/_sandbox/cert_loader_disk/ts/ssl/private.key | |
[Mar 29 21:15:23.006] traffic_server DEBUG: <SSLSecret.cc:88 (setSecret)> (ssl_secret) Set secret for /home/wkaras/REPOS/TS/tests/_sandbox/cert_loader_disk/ts/ssl/private.key to -----BEGIN RSA PRIVATE KEY----- | |
MIICWwIBAAKBgQC/nr | |
[Mar 29 21:15:23.006] traffic_server DEBUG: <SSLConfig.cc:758 (updateCTX)> (ssl_config_updateCTX) Update cert /home/wkaras/REPOS/TS/tests/_sandbox/cert_loader_disk/ts/ssl/private.key, 0x1973a60 | |
[Mar 29 21:15:23.006] traffic_server DEBUG: <SSLConfig.cc:777 (updateCTX)> (ssl_load) Update cert /home/wkaras/REPOS/TS/tests/_sandbox/cert_loader_disk/ts/ssl/private.key | |
[Mar 29 21:15:23.006] traffic_server DEBUG: <SSLSecret.cc:105 (getSecret)> (ssl_secret) Get secret for /home/wkaras/REPOS/TS/tests/_sandbox/cert_loader_disk/ts/ssl/2050.crt: -----BEGIN CERTIFICATE----- | |
MIICZjCCAc+gAwIBAgIULZ | |
[Mar 29 21:15:23.006] traffic_server DEBUG: <SSLSecret.cc:105 (getSecret)> (ssl_secret) Get secret for /home/wkaras/REPOS/TS/tests/_sandbox/cert_loader_disk/ts/ssl/private.key: -----BEGIN RSA PRIVATE KEY----- | |
MIICWwIBAAKBgQC/nr | |
[Mar 29 21:15:23.006] traffic_server DEBUG: <SSLUtils.cc:2282 (load_certs_and_cross_reference_names)> (ssl_load) subj 'abc.org' in certificate /home/wkaras/REPOS/TS/tests/_sandbox/cert_loader_disk/ts/ssl/2050.crt 0x1a33850 | |
[Mar 29 21:15:23.006] traffic_server DEBUG: <SSLUtils.cc:1051 (check_server_cert_now)> (ssl_load) server certificate /home/wkaras/REPOS/TS/tests/_sandbox/cert_loader_disk/ts/ssl/2050.crt passed accessibility and date checks | |
[Mar 29 21:15:23.006] traffic_server DEBUG: <SSLUtils.cc:1265 (init_server_ssl_ctx)> (ssl_load) Creating new context 0x1a32100 cert_count=1 initial: /home/wkaras/REPOS/TS/tests/_sandbox/cert_loader_disk/ts/ssl/2050.crt | |
[Mar 29 21:15:23.007] traffic_server DEBUG: <SSLUtils.cc:1385 (_setup_session_cache)> (ssl.session_cache) ssl context=0x1a32100: using session cache options, enabled=2, size=102400, num_buckets=256, skip_on_contention=0, timeout=0, auto_clear=1 | |
[Mar 29 21:15:23.007] traffic_server DEBUG: <SSLUtils.cc:1407 (_setup_session_cache)> (ssl.session_cache) enabling SSL session cache with ATS implementation | |
[Mar 29 21:15:23.007] traffic_server DEBUG: <SSLUtils.cc:1275 (init_server_ssl_ctx)> (ssl_load) enabling SSL_MODE_RELEASE_BUFFERS | |
[Mar 29 21:15:23.007] traffic_server DEBUG: <SSLUtils.cc:2365 (load_certs)> (ssl_load) SSL OCSP Stapling is disabled | |
[Mar 29 21:15:23.007] traffic_server DEBUG: <SSLSecret.cc:112 (getOrLoadSecret)> (ssl_secret) lookup up secrets for /home/wkaras/REPOS/TS/tests/_sandbox/cert_loader_disk/ts/ssl/2050.crt and /home/wkaras/REPOS/TS/tests/_sandbox/cert_loader_disk/ts/ssl/private.key | |
[Mar 29 21:15:23.007] traffic_server DEBUG: <SSLUtils.cc:2399 (load_certs)> (ssl_load) for ctx=0x1a32100, using certificate /home/wkaras/REPOS/TS/tests/_sandbox/cert_loader_disk/ts/ssl/2050.crt | |
[Mar 29 21:15:23.007] traffic_server DEBUG: <SSLUtils.cc:1494 (_setup_session_ticket)> (ssl_load) ssl session ticket number set to 2 | |
[Mar 29 21:15:23.007] traffic_server DEBUG: <SSLUtils.cc:2497 (set_session_id_context)> (ssl_load) Using '2050.crt' in hash for session id context | |
[Mar 29 21:15:23.007] traffic_server DEBUG: <SSLCertLookup.cc:198 (ticket_block_create)> (ssl) Create 1 ticket key blocks | |
[Mar 29 21:15:23.007] traffic_server DEBUG: <SSLUtils.cc:1844 (_store_single_ssl_ctx)> (ssl_load) Addr is '*'; setting 0x1a32100 to default | |
[Mar 29 21:15:23.007] traffic_server DEBUG: <SSLCertLookup.cc:492 (insert)> (ssl) indexed '*' with SSL_CTX 0x1a32100 [0] | |
[Mar 29 21:15:23.007] traffic_server DEBUG: <SSLCertLookup.cc:492 (insert)> (ssl) indexed 'abc.org' with SSL_CTX 0x1a32100 [1] | |
[Mar 29 21:15:23.007] traffic_server DEBUG: <SSLCertLookup.cc:198 (ticket_block_create)> (ssl) Create 1 ticket key blocks | |
[Mar 29 21:15:23.007] traffic_server DEBUG: <SSLConfig.cc:666 (LoadTicket)> (ssl_load) ticket key reloaded from (null) | |
[Mar 29 21:15:23.007] traffic_server DEBUG: <SSLStats.cc:260 (SSLInitializeStatistics)> (ssl) registering SSL cipher metric 'proxy.process.ssl.cipher.user_agent.TLS_AES_256_GCM_SHA384' | |
[Mar 29 21:15:23.007] traffic_server DEBUG: <SSLStats.cc:260 (SSLInitializeStatistics)> (ssl) registering SSL cipher metric 'proxy.process.ssl.cipher.user_agent.TLS_CHACHA20_POLY1305_SHA256' | |
[Mar 29 21:15:23.007] traffic_server DEBUG: <SSLStats.cc:260 (SSLInitializeStatistics)> (ssl) registering SSL cipher metric 'proxy.process.ssl.cipher.user_agent.TLS_AES_128_GCM_SHA256' | |
[Mar 29 21:15:23.007] traffic_server DEBUG: <SSLStats.cc:260 (SSLInitializeStatistics)> (ssl) registering SSL cipher metric 'proxy.process.ssl.cipher.user_agent.ECDHE-ECDSA-AES256-GCM-SHA384' | |
[Mar 29 21:15:23.007] traffic_server DEBUG: <SSLStats.cc:260 (SSLInitializeStatistics)> (ssl) registering SSL cipher metric 'proxy.process.ssl.cipher.user_agent.ECDHE-RSA-AES256-GCM-SHA384' | |
[Mar 29 21:15:23.007] traffic_server DEBUG: <SSLStats.cc:260 (SSLInitializeStatistics)> (ssl) registering SSL cipher metric 'proxy.process.ssl.cipher.user_agent.DHE-RSA-AES256-GCM-SHA384' | |
[Mar 29 21:15:23.007] traffic_server DEBUG: <SSLStats.cc:260 (SSLInitializeStatistics)> (ssl) registering SSL cipher metric 'proxy.process.ssl.cipher.user_agent.ECDHE-ECDSA-CHACHA20-POLY1305' | |
[Mar 29 21:15:23.007] traffic_server DEBUG: <SSLStats.cc:260 (SSLInitializeStatistics)> (ssl) registering SSL cipher metric 'proxy.process.ssl.cipher.user_agent.ECDHE-RSA-CHACHA20-POLY1305' | |
[Mar 29 21:15:23.007] traffic_server DEBUG: <SSLStats.cc:260 (SSLInitializeStatistics)> (ssl) registering SSL cipher metric 'proxy.process.ssl.cipher.user_agent.DHE-RSA-CHACHA20-POLY1305' | |
[Mar 29 21:15:23.007] traffic_server DEBUG: <SSLStats.cc:260 (SSLInitializeStatistics)> (ssl) registering SSL cipher metric 'proxy.process.ssl.cipher.user_agent.ECDHE-ECDSA-AES128-GCM-SHA256' | |
[Mar 29 21:15:23.007] traffic_server DEBUG: <SSLStats.cc:260 (SSLInitializeStatistics)> (ssl) registering SSL cipher metric 'proxy.process.ssl.cipher.user_agent.ECDHE-RSA-AES128-GCM-SHA256' | |
[Mar 29 21:15:23.007] traffic_server DEBUG: <SSLStats.cc:260 (SSLInitializeStatistics)> (ssl) registering SSL cipher metric 'proxy.process.ssl.cipher.user_agent.DHE-RSA-AES128-GCM-SHA256' | |
[Mar 29 21:15:23.007] traffic_server DEBUG: <SSLStats.cc:260 (SSLInitializeStatistics)> (ssl) registering SSL cipher metric 'proxy.process.ssl.cipher.user_agent.ECDHE-ECDSA-AES256-SHA384' | |
[Mar 29 21:15:23.007] traffic_server DEBUG: <SSLStats.cc:260 (SSLInitializeStatistics)> (ssl) registering SSL cipher metric 'proxy.process.ssl.cipher.user_agent.ECDHE-RSA-AES256-SHA384' | |
[Mar 29 21:15:23.007] traffic_server DEBUG: <SSLStats.cc:260 (SSLInitializeStatistics)> (ssl) registering SSL cipher metric 'proxy.process.ssl.cipher.user_agent.DHE-RSA-AES256-SHA256' | |
[Mar 29 21:15:23.007] traffic_server DEBUG: <SSLStats.cc:260 (SSLInitializeStatistics)> (ssl) registering SSL cipher metric 'proxy.process.ssl.cipher.user_agent.ECDHE-ECDSA-AES128-SHA256' | |
[Mar 29 21:15:23.007] traffic_server DEBUG: <SSLStats.cc:260 (SSLInitializeStatistics)> (ssl) registering SSL cipher metric 'proxy.process.ssl.cipher.user_agent.ECDHE-RSA-AES128-SHA256' | |
[Mar 29 21:15:23.008] traffic_server DEBUG: <SSLStats.cc:260 (SSLInitializeStatistics)> (ssl) registering SSL cipher metric 'proxy.process.ssl.cipher.user_agent.DHE-RSA-AES128-SHA256' | |
[Mar 29 21:15:23.008] traffic_server DEBUG: <SSLStats.cc:260 (SSLInitializeStatistics)> (ssl) registering SSL cipher metric 'proxy.process.ssl.cipher.user_agent.ECDHE-ECDSA-AES256-SHA' | |
[Mar 29 21:15:23.008] traffic_server DEBUG: <SSLStats.cc:260 (SSLInitializeStatistics)> (ssl) registering SSL cipher metric 'proxy.process.ssl.cipher.user_agent.ECDHE-RSA-AES256-SHA' | |
[Mar 29 21:15:23.008] traffic_server DEBUG: <SSLStats.cc:260 (SSLInitializeStatistics)> (ssl) registering SSL cipher metric 'proxy.process.ssl.cipher.user_agent.DHE-RSA-AES256-SHA' | |
[Mar 29 21:15:23.008] traffic_server DEBUG: <SSLStats.cc:260 (SSLInitializeStatistics)> (ssl) registering SSL cipher metric 'proxy.process.ssl.cipher.user_agent.ECDHE-ECDSA-AES128-SHA' | |
[Mar 29 21:15:23.008] traffic_server DEBUG: <SSLStats.cc:260 (SSLInitializeStatistics)> (ssl) registering SSL cipher metric 'proxy.process.ssl.cipher.user_agent.ECDHE-RSA-AES128-SHA' | |
[Mar 29 21:15:23.008] traffic_server DEBUG: <SSLStats.cc:260 (SSLInitializeStatistics)> (ssl) registering SSL cipher metric 'proxy.process.ssl.cipher.user_agent.DHE-RSA-AES128-SHA' | |
[Mar 29 21:15:23.008] traffic_server DEBUG: <SSLStats.cc:260 (SSLInitializeStatistics)> (ssl) registering SSL cipher metric 'proxy.process.ssl.cipher.user_agent.RSA-PSK-AES256-GCM-SHA384' | |
[Mar 29 21:15:23.008] traffic_server DEBUG: <SSLStats.cc:260 (SSLInitializeStatistics)> (ssl) registering SSL cipher metric 'proxy.process.ssl.cipher.user_agent.DHE-PSK-AES256-GCM-SHA384' | |
[Mar 29 21:15:23.008] traffic_server DEBUG: <SSLStats.cc:260 (SSLInitializeStatistics)> (ssl) registering SSL cipher metric 'proxy.process.ssl.cipher.user_agent.RSA-PSK-CHACHA20-POLY1305' | |
[Mar 29 21:15:23.008] traffic_server DEBUG: <SSLStats.cc:260 (SSLInitializeStatistics)> (ssl) registering SSL cipher metric 'proxy.process.ssl.cipher.user_agent.DHE-PSK-CHACHA20-POLY1305' | |
[Mar 29 21:15:23.008] traffic_server DEBUG: <SSLStats.cc:260 (SSLInitializeStatistics)> (ssl) registering SSL cipher metric 'proxy.process.ssl.cipher.user_agent.ECDHE-PSK-CHACHA20-POLY1305' | |
[Mar 29 21:15:23.008] traffic_server DEBUG: <SSLStats.cc:260 (SSLInitializeStatistics)> (ssl) registering SSL cipher metric 'proxy.process.ssl.cipher.user_agent.AES256-GCM-SHA384' | |
[Mar 29 21:15:23.008] traffic_server DEBUG: <SSLStats.cc:260 (SSLInitializeStatistics)> (ssl) registering SSL cipher metric 'proxy.process.ssl.cipher.user_agent.PSK-AES256-GCM-SHA384' | |
[Mar 29 21:15:23.008] traffic_server DEBUG: <SSLStats.cc:260 (SSLInitializeStatistics)> (ssl) registering SSL cipher metric 'proxy.process.ssl.cipher.user_agent.PSK-CHACHA20-POLY1305' | |
[Mar 29 21:15:23.008] traffic_server DEBUG: <SSLStats.cc:260 (SSLInitializeStatistics)> (ssl) registering SSL cipher metric 'proxy.process.ssl.cipher.user_agent.RSA-PSK-AES128-GCM-SHA256' | |
[Mar 29 21:15:23.008] traffic_server DEBUG: <SSLStats.cc:260 (SSLInitializeStatistics)> (ssl) registering SSL cipher metric 'proxy.process.ssl.cipher.user_agent.DHE-PSK-AES128-GCM-SHA256' | |
[Mar 29 21:15:23.008] traffic_server DEBUG: <SSLStats.cc:260 (SSLInitializeStatistics)> (ssl) registering SSL cipher metric 'proxy.process.ssl.cipher.user_agent.AES128-GCM-SHA256' | |
[Mar 29 21:15:23.008] traffic_server DEBUG: <SSLStats.cc:260 (SSLInitializeStatistics)> (ssl) registering SSL cipher metric 'proxy.process.ssl.cipher.user_agent.PSK-AES128-GCM-SHA256' | |
[Mar 29 21:15:23.008] traffic_server DEBUG: <SSLStats.cc:260 (SSLInitializeStatistics)> (ssl) registering SSL cipher metric 'proxy.process.ssl.cipher.user_agent.AES256-SHA256' | |
[Mar 29 21:15:23.008] traffic_server DEBUG: <SSLStats.cc:260 (SSLInitializeStatistics)> (ssl) registering SSL cipher metric 'proxy.process.ssl.cipher.user_agent.AES128-SHA256' | |
[Mar 29 21:15:23.008] traffic_server DEBUG: <SSLStats.cc:260 (SSLInitializeStatistics)> (ssl) registering SSL cipher metric 'proxy.process.ssl.cipher.user_agent.ECDHE-PSK-AES256-CBC-SHA384' | |
[Mar 29 21:15:23.008] traffic_server DEBUG: <SSLStats.cc:260 (SSLInitializeStatistics)> (ssl) registering SSL cipher metric 'proxy.process.ssl.cipher.user_agent.ECDHE-PSK-AES256-CBC-SHA' | |
[Mar 29 21:15:23.008] traffic_server DEBUG: <SSLStats.cc:260 (SSLInitializeStatistics)> (ssl) registering SSL cipher metric 'proxy.process.ssl.cipher.user_agent.SRP-RSA-AES-256-CBC-SHA' | |
[Mar 29 21:15:23.008] traffic_server DEBUG: <SSLStats.cc:260 (SSLInitializeStatistics)> (ssl) registering SSL cipher metric 'proxy.process.ssl.cipher.user_agent.SRP-AES-256-CBC-SHA' | |
[Mar 29 21:15:23.008] traffic_server DEBUG: <SSLStats.cc:260 (SSLInitializeStatistics)> (ssl) registering SSL cipher metric 'proxy.process.ssl.cipher.user_agent.RSA-PSK-AES256-CBC-SHA384' | |
[Mar 29 21:15:23.008] traffic_server DEBUG: <SSLStats.cc:260 (SSLInitializeStatistics)> (ssl) registering SSL cipher metric 'proxy.process.ssl.cipher.user_agent.DHE-PSK-AES256-CBC-SHA384' | |
[Mar 29 21:15:23.008] traffic_server DEBUG: <SSLStats.cc:260 (SSLInitializeStatistics)> (ssl) registering SSL cipher metric 'proxy.process.ssl.cipher.user_agent.RSA-PSK-AES256-CBC-SHA' | |
[Mar 29 21:15:23.008] traffic_server DEBUG: <SSLStats.cc:260 (SSLInitializeStatistics)> (ssl) registering SSL cipher metric 'proxy.process.ssl.cipher.user_agent.DHE-PSK-AES256-CBC-SHA' | |
[Mar 29 21:15:23.008] traffic_server DEBUG: <SSLStats.cc:260 (SSLInitializeStatistics)> (ssl) registering SSL cipher metric 'proxy.process.ssl.cipher.user_agent.AES256-SHA' | |
[Mar 29 21:15:23.008] traffic_server DEBUG: <SSLStats.cc:260 (SSLInitializeStatistics)> (ssl) registering SSL cipher metric 'proxy.process.ssl.cipher.user_agent.PSK-AES256-CBC-SHA384' | |
[Mar 29 21:15:23.008] traffic_server DEBUG: <SSLStats.cc:260 (SSLInitializeStatistics)> (ssl) registering SSL cipher metric 'proxy.process.ssl.cipher.user_agent.PSK-AES256-CBC-SHA' | |
[Mar 29 21:15:23.008] traffic_server DEBUG: <SSLStats.cc:260 (SSLInitializeStatistics)> (ssl) registering SSL cipher metric 'proxy.process.ssl.cipher.user_agent.ECDHE-PSK-AES128-CBC-SHA256' | |
[Mar 29 21:15:23.008] traffic_server DEBUG: <SSLStats.cc:260 (SSLInitializeStatistics)> (ssl) registering SSL cipher metric 'proxy.process.ssl.cipher.user_agent.ECDHE-PSK-AES128-CBC-SHA' | |
[Mar 29 21:15:23.008] traffic_server DEBUG: <SSLStats.cc:260 (SSLInitializeStatistics)> (ssl) registering SSL cipher metric 'proxy.process.ssl.cipher.user_agent.SRP-RSA-AES-128-CBC-SHA' | |
[Mar 29 21:15:23.008] traffic_server DEBUG: <SSLStats.cc:260 (SSLInitializeStatistics)> (ssl) registering SSL cipher metric 'proxy.process.ssl.cipher.user_agent.SRP-AES-128-CBC-SHA' | |
[Mar 29 21:15:23.008] traffic_server DEBUG: <SSLStats.cc:260 (SSLInitializeStatistics)> (ssl) registering SSL cipher metric 'proxy.process.ssl.cipher.user_agent.RSA-PSK-AES128-CBC-SHA256' | |
[Mar 29 21:15:23.008] traffic_server DEBUG: <SSLStats.cc:260 (SSLInitializeStatistics)> (ssl) registering SSL cipher metric 'proxy.process.ssl.cipher.user_agent.DHE-PSK-AES128-CBC-SHA256' | |
[Mar 29 21:15:23.008] traffic_server DEBUG: <SSLStats.cc:260 (SSLInitializeStatistics)> (ssl) registering SSL cipher metric 'proxy.process.ssl.cipher.user_agent.RSA-PSK-AES128-CBC-SHA' | |
[Mar 29 21:15:23.008] traffic_server DEBUG: <SSLStats.cc:260 (SSLInitializeStatistics)> (ssl) registering SSL cipher metric 'proxy.process.ssl.cipher.user_agent.DHE-PSK-AES128-CBC-SHA' | |
[Mar 29 21:15:23.008] traffic_server DEBUG: <SSLStats.cc:260 (SSLInitializeStatistics)> (ssl) registering SSL cipher metric 'proxy.process.ssl.cipher.user_agent.AES128-SHA' | |
[Mar 29 21:15:23.008] traffic_server DEBUG: <SSLStats.cc:260 (SSLInitializeStatistics)> (ssl) registering SSL cipher metric 'proxy.process.ssl.cipher.user_agent.PSK-AES128-CBC-SHA256' | |
[Mar 29 21:15:23.008] traffic_server DEBUG: <SSLStats.cc:260 (SSLInitializeStatistics)> (ssl) registering SSL cipher metric 'proxy.process.ssl.cipher.user_agent.PSK-AES128-CBC-SHA' | |
[Mar 29 21:15:23.042] [ET_NET 8] DEBUG: <SSLNextProtocolAccept.cc:129 (mainEvent)> (ssl) [SSLNextProtocolAccept:mainEvent] event 202 netvc 0x7fdaaf115a80 | |
[Mar 29 21:15:23.042] [ET_NET 8] DEBUG: <SSLNextProtocolSet.cc:68 (create_npn_advertisement)> (ssl) advertising protocol h2, 0x1a6e500 | |
[Mar 29 21:15:23.042] [ET_NET 8] DEBUG: <SSLNextProtocolSet.cc:68 (create_npn_advertisement)> (ssl) advertising protocol http/1.1, 0x1a66eb0 | |
[Mar 29 21:15:23.042] [ET_NET 8] DEBUG: <SSLNextProtocolSet.cc:68 (create_npn_advertisement)> (ssl) advertising protocol http/1.0, 0x1a66eb0 | |
[Mar 29 21:15:23.042] [ET_NET 8] DEBUG: <SSLNetVConnection.cc:1060 (sslStartHandShake)> (ssl) IP context is (nil) for [127.0.0.1:45030] -> [127.0.0.1:61002], default context 0x1a32100 | |
[Mar 29 21:15:23.047] [ET_NET 8] DEBUG: <SSLNetVConnection.cc:1228 (sslServerHandShakeEvent)> (ssl) Initialize preaccept curHook from NULL | |
[Mar 29 21:15:23.047] [ET_NET 8] DEBUG: <SSLNetVConnection.cc:1263 (sslServerHandShakeEvent)> (ssl) Go on with the handshake state=2 | |
[Mar 29 21:15:23.047] [ET_NET 8] DEBUG: <SSLNetVConnection.cc:1276 (sslServerHandShakeEvent)> (ssl) 0x7fdaaf115a80 first read | |
[Mar 29 21:15:23.047] [ET_NET 8] DEBUG: <SSLNetVConnection.cc:409 (read_raw_data)> (ssl) read_raw_data r=517 rattempted=32768 total_read=32768 fd=74 | |
[Mar 29 21:15:23.047] [ET_NET 8] DEBUG: <SSLNetVConnection.cc:492 (read_raw_data)> (ssl) 0x7fdaaf115a80 read r=517 total=32768 bio=517 | |
[Mar 29 21:15:23.047] [ET_NET 8] DEBUG: <SSLUtils.cc:1072 (ssl_callback_info)> (ssl_load) ssl_callback_info ssl: 0x7fda7c028b50, where: 16, ret: 1, State: before SSL initialization | |
[Mar 29 21:15:23.047] [ET_NET 8] DEBUG: <SSLUtils.cc:1072 (ssl_callback_info)> (ssl_load) ssl_callback_info ssl: 0x7fda7c028b50, where: 8193, ret: 1, State: before SSL initialization | |
[Mar 29 21:15:23.048] [ET_NET 8] DEBUG: <SSLUtils.cc:1072 (ssl_callback_info)> (ssl_load) ssl_callback_info ssl: 0x7fda7c028b50, where: 8193, ret: 1, State: before SSL initialization | |
[Mar 29 21:15:23.048] [ET_NET 8] DEBUG: <TLSSNISupport.cc:68 (perform_sni_action)> (ssl_sni) not available in the map | |
[Mar 29 21:15:23.048] [ET_NET 8] DEBUG: <SSLNetVConnection.cc:1751 (callHooks)> (ssl) sslHandshakeHookState=2 eventID=60207 | |
[Mar 29 21:15:23.048] [ET_NET 8] DEBUG: <SSLNetVConnection.cc:1869 (callHooks)> (ssl) iterated to curHook=(nil) | |
[Mar 29 21:15:23.048] [ET_NET 8] DEBUG: <SSLNetVConnection.cc:1751 (callHooks)> (ssl) sslHandshakeHookState=4 eventID=60204 | |
[Mar 29 21:15:23.048] [ET_NET 8] DEBUG: <SSLNetVConnection.cc:1869 (callHooks)> (ssl) iterated to curHook=(nil) | |
[Mar 29 21:15:23.048] [ET_NET 8] DEBUG: <ALPNSupport.cc:106 (select_next_protocol)> (ssl) selected ALPN protocol h2 | |
[Mar 29 21:15:23.048] [ET_NET 8] DEBUG: <TLSCertSwitchSupport.cc:67 (selectCertificate)> (ssl) set_context_cert ssl=0x7fda7c028b50 server=(null) | |
[Mar 29 21:15:23.048] [ET_NET 8] DEBUG: <TLSCertSwitchSupport.cc:96 (selectCertificate)> (ssl_load) ssl_cert_callback using SSL context 0x1a32100 for requested name '(null)' | |
[Mar 29 21:15:23.048] [ET_NET 8] DEBUG: <SSLNetVConnection.cc:1751 (callHooks)> (ssl) sslHandshakeHookState=5 eventID=60203 | |
[Mar 29 21:15:23.048] [ET_NET 8] DEBUG: <SSLNetVConnection.cc:1869 (callHooks)> (ssl) iterated to curHook=(nil) | |
[Mar 29 21:15:23.048] [ET_NET 8] DEBUG: <SSLUtils.cc:1072 (ssl_callback_info)> (ssl_load) ssl_callback_info ssl: 0x7fda7c028b50, where: 8193, ret: 1, State: SSLv3/TLS read client hello | |
[Mar 29 21:15:23.048] [ET_NET 8] DEBUG: <SSLUtils.cc:1072 (ssl_callback_info)> (ssl_load) ssl_callback_info ssl: 0x7fda7c028b50, where: 8193, ret: 1, State: SSLv3/TLS write server hello | |
[Mar 29 21:15:23.048] [ET_NET 8] DEBUG: <SSLUtils.cc:1072 (ssl_callback_info)> (ssl_load) ssl_callback_info ssl: 0x7fda7c028b50, where: 8193, ret: 1, State: SSLv3/TLS write change cipher spec | |
[Mar 29 21:15:23.048] [ET_NET 8] DEBUG: <SSLUtils.cc:1072 (ssl_callback_info)> (ssl_load) ssl_callback_info ssl: 0x7fda7c028b50, where: 8193, ret: 1, State: TLSv1.3 write encrypted extensions | |
[Mar 29 21:15:23.048] [ET_NET 8] DEBUG: <SSLUtils.cc:1072 (ssl_callback_info)> (ssl_load) ssl_callback_info ssl: 0x7fda7c028b50, where: 8193, ret: 1, State: SSLv3/TLS write certificate | |
[Mar 29 21:15:23.048] [ET_NET 8] DEBUG: <SSLUtils.cc:1072 (ssl_callback_info)> (ssl_load) ssl_callback_info ssl: 0x7fda7c028b50, where: 8193, ret: 1, State: TLSv1.3 write server certificate verify | |
[Mar 29 21:15:23.048] [ET_NET 8] DEBUG: <SSLUtils.cc:1072 (ssl_callback_info)> (ssl_load) ssl_callback_info ssl: 0x7fda7c028b50, where: 8193, ret: 1, State: SSLv3/TLS write finished | |
[Mar 29 21:15:23.048] [ET_NET 8] DEBUG: <SSLUtils.cc:1072 (ssl_callback_info)> (ssl_load) ssl_callback_info ssl: 0x7fda7c028b50, where: 8193, ret: 1, State: TLSv1.3 early data | |
[Mar 29 21:15:23.049] [ET_NET 8] DEBUG: <SSLUtils.cc:1072 (ssl_callback_info)> (ssl_load) ssl_callback_info ssl: 0x7fda7c028b50, where: 8194, ret: -1, State: TLSv1.3 early data | |
[Mar 29 21:15:23.049] [ET_NET 8] DEBUG: <SSLNetVConnection.cc:1333 (sslServerHandShakeEvent)> (ssl-diag) SSL handshake error: SSL_ERROR_WANT_READ (2), errno=0 | |
[Mar 29 21:15:23.049] [ET_NET 8] DEBUG: <SSLNetVConnection.cc:638 (net_read_io)> (ssl) ssl handshake for vc 0x7fdaaf115a80, took 0.000 seconds, configured handshake_timer: 30 | |
[Mar 29 21:15:23.049] [ET_NET 8] DEBUG: <SSLNetVConnection.cc:1263 (sslServerHandShakeEvent)> (ssl) Go on with the handshake state=7 | |
[Mar 29 21:15:23.049] [ET_NET 8] DEBUG: <SSLUtils.cc:1072 (ssl_callback_info)> (ssl_load) ssl_callback_info ssl: 0x7fda7c028b50, where: 8193, ret: 1, State: TLSv1.3 early data | |
[Mar 29 21:15:23.049] [ET_NET 8] DEBUG: <SSLUtils.cc:1072 (ssl_callback_info)> (ssl_load) ssl_callback_info ssl: 0x7fda7c028b50, where: 8193, ret: 1, State: SSLv3/TLS read finished | |
[Mar 29 21:15:23.049] [ET_NET 8] DEBUG: <SSLUtils.cc:1072 (ssl_callback_info)> (ssl_load) ssl_callback_info ssl: 0x7fda7c028b50, where: 32, ret: 1, State: SSLv3/TLS write session ticket | |
[Mar 29 21:15:23.049] [ET_NET 8] DEBUG: <TLSSessionResumptionSupport.cc:249 (_setSessionInformation)> (ssl_session_ticket) create ticket for a new session. | |
[Mar 29 21:15:23.049] [ET_NET 8] DEBUG: <SSLUtils.cc:1072 (ssl_callback_info)> (ssl_load) ssl_callback_info ssl: 0x7fda7c028b50, where: 8193, ret: 1, State: SSLv3/TLS write session ticket | |
[Mar 29 21:15:23.049] [ET_NET 8] DEBUG: <TLSSessionResumptionSupport.cc:249 (_setSessionInformation)> (ssl_session_ticket) create ticket for a new session. | |
[Mar 29 21:15:23.049] [ET_NET 8] DEBUG: <SSLUtils.cc:1072 (ssl_callback_info)> (ssl_load) ssl_callback_info ssl: 0x7fda7c028b50, where: 8193, ret: 1, State: SSLv3/TLS write session ticket | |
[Mar 29 21:15:23.049] [ET_NET 8] DEBUG: <SSLUtils.cc:1072 (ssl_callback_info)> (ssl_load) ssl_callback_info ssl: 0x7fda7c028b50, where: 8194, ret: 1, State: SSL negotiation finished successfully | |
[Mar 29 21:15:23.049] [ET_NET 8] DEBUG: <SSLNetVConnection.cc:1354 (sslServerHandShakeEvent)> (ssl) SSL server handshake completed successfully | |
[Mar 29 21:15:23.050] [ET_NET 8] DEBUG: <TLSBasicSupport.cc:132 (_record_tls_handshake_end_time)> (ssl) ssl handshake time:7010446 | |
[Mar 29 21:15:23.050] [ET_NET 8] DEBUG: <SSLNetVConnection.cc:1398 (sslServerHandShakeEvent)> (ssl) Origin selected next protocol 'h2' | |
[Mar 29 21:15:23.050] [ET_NET 8] DEBUG: <SSLNetVConnection.cc:662 (net_read_io)> (ssl) ssl handshake EVENT_DONE ntodo=0 | |
[Mar 29 21:15:23.052] [ET_NET 8] DEBUG: <Http2ClientSession.cc:108 (new_connection)> (ssl_early_data) read_from_early_data = 0 | |
[Mar 29 21:15:23.092] [ET_NET 8] DEBUG: <SSLNetVConnection.cc:293 (_ssl_read_from_net)> (ssl) amount_to_read=4096 | |
[Mar 29 21:15:23.092] [ET_NET 8] DEBUG: <SSLNetVConnection.cc:298 (_ssl_read_from_net)> (ssl) nread=24 | |
[Mar 29 21:15:23.092] [ET_NET 8] DEBUG: <SSLNetVConnection.cc:293 (_ssl_read_from_net)> (ssl) amount_to_read=4072 | |
[Mar 29 21:15:23.092] [ET_NET 8] DEBUG: <SSLNetVConnection.cc:298 (_ssl_read_from_net)> (ssl) nread=27 | |
[Mar 29 21:15:23.092] [ET_NET 8] DEBUG: <SSLNetVConnection.cc:293 (_ssl_read_from_net)> (ssl) amount_to_read=4045 | |
[Mar 29 21:15:23.092] [ET_NET 8] DEBUG: <SSLNetVConnection.cc:298 (_ssl_read_from_net)> (ssl) nread=13 | |
[Mar 29 21:15:23.092] [ET_NET 8] DEBUG: <SSLNetVConnection.cc:293 (_ssl_read_from_net)> (ssl) amount_to_read=4032 | |
[Mar 29 21:15:23.092] [ET_NET 8] DEBUG: <SSLNetVConnection.cc:298 (_ssl_read_from_net)> (ssl) nread=38 | |
[Mar 29 21:15:23.092] [ET_NET 8] DEBUG: <SSLNetVConnection.cc:293 (_ssl_read_from_net)> (ssl) amount_to_read=3994 | |
[Mar 29 21:15:23.092] [ET_NET 8] DEBUG: <SSLNetVConnection.cc:298 (_ssl_read_from_net)> (ssl) nread=0 | |
[Mar 29 21:15:23.092] [ET_NET 8] DEBUG: <SSLNetVConnection.cc:319 (_ssl_read_from_net)> (ssl.error) SSL_ERROR_WOULD_BLOCK(read) | |
[Mar 29 21:15:23.092] [ET_NET 8] DEBUG: <SSLNetVConnection.cc:360 (_ssl_read_from_net)> (ssl) bytes_read=102 | |
[Mar 29 21:15:23.101] [ET_NET 8] DEBUG: <HttpSM.cc:4169 (check_sni_host)> (ssl_sni) [0] No SNI/hostname check configured for host=foo.com | |
[Mar 29 21:15:23.102] [ET_NET 8] DEBUG: <SSLNetVConnection.cc:293 (_ssl_read_from_net)> (ssl) amount_to_read=3994 | |
[Mar 29 21:15:23.102] [ET_NET 8] DEBUG: <SSLNetVConnection.cc:298 (_ssl_read_from_net)> (ssl) nread=0 | |
[Mar 29 21:15:23.102] [ET_NET 8] DEBUG: <SSLNetVConnection.cc:319 (_ssl_read_from_net)> (ssl.error) SSL_ERROR_WOULD_BLOCK(read) | |
[Mar 29 21:15:23.102] [ET_NET 8] DEBUG: <SSLNetVConnection.cc:376 (_ssl_read_from_net)> (ssl) bytes_read == 0 | |
[Mar 29 21:15:23.102] [ET_NET 8] DEBUG: <SSLNetVConnection.cc:731 (net_read_io)> (ssl) read finished - would block | |
[Mar 29 21:15:23.102] [ET_NET 8] DEBUG: <SSLNetVConnection.cc:785 (load_buffer_and_write)> (ssl) towrite=30 | |
[Mar 29 21:15:23.102] [ET_NET 8] DEBUG: <SSLNetVConnection.cc:841 (load_buffer_and_write)> (ssl) try_to_write=30 written=30 total_written=30 | |
[Mar 29 21:15:23.106] [ET_NET 8] DEBUG: <SSLNetVConnection.cc:293 (_ssl_read_from_net)> (ssl) amount_to_read=3994 | |
[Mar 29 21:15:23.106] [ET_NET 8] DEBUG: <SSLNetVConnection.cc:298 (_ssl_read_from_net)> (ssl) nread=9 | |
[Mar 29 21:15:23.106] [ET_NET 8] DEBUG: <SSLNetVConnection.cc:293 (_ssl_read_from_net)> (ssl) amount_to_read=3985 | |
[Mar 29 21:15:23.106] [ET_NET 8] DEBUG: <SSLNetVConnection.cc:298 (_ssl_read_from_net)> (ssl) nread=0 | |
[Mar 29 21:15:23.106] [ET_NET 8] DEBUG: <SSLNetVConnection.cc:319 (_ssl_read_from_net)> (ssl.error) SSL_ERROR_WOULD_BLOCK(read) | |
[Mar 29 21:15:23.106] [ET_NET 8] DEBUG: <SSLNetVConnection.cc:360 (_ssl_read_from_net)> (ssl) bytes_read=9 | |
[Mar 29 21:15:23.106] [ET_NET 8] DEBUG: <SSLNetVConnection.cc:293 (_ssl_read_from_net)> (ssl) amount_to_read=3985 | |
[Mar 29 21:15:23.106] [ET_NET 8] DEBUG: <SSLNetVConnection.cc:298 (_ssl_read_from_net)> (ssl) nread=0 | |
[Mar 29 21:15:23.106] [ET_NET 8] DEBUG: <SSLNetVConnection.cc:319 (_ssl_read_from_net)> (ssl.error) SSL_ERROR_WOULD_BLOCK(read) | |
[Mar 29 21:15:23.106] [ET_NET 8] DEBUG: <SSLNetVConnection.cc:376 (_ssl_read_from_net)> (ssl) bytes_read == 0 | |
[Mar 29 21:15:23.106] [ET_NET 8] DEBUG: <SSLNetVConnection.cc:731 (net_read_io)> (ssl) read finished - would block | |
[Mar 29 21:15:23.107] [ET_NET 8] DEBUG: <SSLNetVConnection.cc:785 (load_buffer_and_write)> (ssl) towrite=56 | |
[Mar 29 21:15:23.107] [ET_NET 8] DEBUG: <SSLNetVConnection.cc:841 (load_buffer_and_write)> (ssl) try_to_write=56 written=56 total_written=56 | |
[Mar 29 21:15:23.107] [ET_NET 8] DEBUG: <SSLNetVConnection.cc:293 (_ssl_read_from_net)> (ssl) amount_to_read=3985 | |
[Mar 29 21:15:23.107] [ET_NET 8] DEBUG: <SSLUtils.cc:1072 (ssl_callback_info)> (ssl_load) ssl_callback_info ssl: 0x7fda7c028b50, where: 16388, ret: 256, State: SSL negotiation finished successfully | |
[Mar 29 21:15:23.107] [ET_NET 8] DEBUG: <SSLNetVConnection.cc:298 (_ssl_read_from_net)> (ssl) nread=0 | |
[Mar 29 21:15:23.107] [ET_NET 8] DEBUG: <SSLNetVConnection.cc:345 (_ssl_read_from_net)> (ssl.error) SSL_ERROR_ZERO_RETURN | |
[Mar 29 21:15:23.107] [ET_NET 8] DEBUG: <SSLNetVConnection.cc:376 (_ssl_read_from_net)> (ssl) bytes_read == 0 | |
[Mar 29 21:15:23.107] [ET_NET 8] DEBUG: <SSLNetVConnection.cc:1751 (callHooks)> (ssl) sslHandshakeHookState=7 eventID=108 | |
[Mar 29 21:15:23.107] [ET_NET 8] DEBUG: <SSLNetVConnection.cc:1869 (callHooks)> (ssl) iterated to curHook=(nil) | |
[Mar 29 21:15:23.107] [ET_NET 8] DEBUG: <SSLNetVConnection.cc:910 (do_io_close)> (ssl-shutdown) previous shutdown state 0x2 | |
[Mar 29 21:15:23.107] [ET_NET 8] DEBUG: <SSLNetVConnection.cc:940 (do_io_close)> (ssl-shutdown) Enable quiet shutdown | |
[Mar 29 21:15:23.108] [ET_NET 8] DEBUG: <SSLNetVConnection.cc:744 (net_read_io)> (ssl) read finished - 0 useful bytes read, bytes used by SSL layer | |
2023-03-29T21:15:32.712Z E 349848 ZTSCLT:ZTSClient:init: cannot open certifcate file: 0\� : errno: 2 | |
2023-03-29T21:15:32.712Z E 349848 ZTSCLT:ZTSClient:init: cannot open certifcate file: 0\� : errno: 2 | |
[Mar 29 21:15:32.884] [ET_TASK 0] DEBUG: <InkAPI.cc:9443 (TSSslSecretSet)> (ssl.cert_update) Setting secrets in SSLConfig for: /home/wkaras/REPOS/TS/tests/_sandbox/cert_loader_disk/ts/ssl/private.key | |
[Mar 29 21:15:32.884] [ET_TASK 0] DEBUG: <SSLSecret.cc:88 (setSecret)> (ssl_secret) Set secret for /home/wkaras/REPOS/TS/tests/_sandbox/cert_loader_disk/ts/ssl/private.key to -----BEGIN RSA PRIVATE KEY----- | |
MIICWwIBAAKBgQC/nr | |
[Mar 29 21:15:32.884] [ET_TASK 0] DEBUG: <SSLConfig.cc:758 (updateCTX)> (ssl_config_updateCTX) Update cert /home/wkaras/REPOS/TS/tests/_sandbox/cert_loader_disk/ts/ssl/private.key, 0x1973a60 | |
[Mar 29 21:15:32.884] [ET_TASK 0] DEBUG: <SSLConfig.cc:777 (updateCTX)> (ssl_load) Update cert /home/wkaras/REPOS/TS/tests/_sandbox/cert_loader_disk/ts/ssl/private.key | |
[Mar 29 21:15:32.884] [ET_TASK 0] DEBUG: <InkAPI.cc:9443 (TSSslSecretSet)> (ssl.cert_update) Setting secrets in SSLConfig for: /home/wkaras/REPOS/TS/tests/_sandbox/cert_loader_disk/ts/ssl/2050.crt | |
[Mar 29 21:15:32.884] [ET_TASK 0] DEBUG: <SSLSecret.cc:88 (setSecret)> (ssl_secret) Set secret for /home/wkaras/REPOS/TS/tests/_sandbox/cert_loader_disk/ts/ssl/2050.crt to -----BEGIN CERTIFICATE----- | |
MIICZjCCAc+gAwIBAgIUAT | |
[Mar 29 21:15:32.884] [ET_TASK 0] DEBUG: <SSLConfig.cc:758 (updateCTX)> (ssl_config_updateCTX) Update cert /home/wkaras/REPOS/TS/tests/_sandbox/cert_loader_disk/ts/ssl/2050.crt, 0x1973a60 | |
[Mar 29 21:15:32.884] [ET_TASK 0] DEBUG: <SSLConfig.cc:777 (updateCTX)> (ssl_load) Update cert /home/wkaras/REPOS/TS/tests/_sandbox/cert_loader_disk/ts/ssl/2050.crt | |
[Mar 29 21:15:32.884] [ET_TASK 0] DEBUG: <SSLSecret.cc:112 (getOrLoadSecret)> (ssl_secret) lookup up secrets for /home/wkaras/REPOS/TS/tests/_sandbox/cert_loader_disk/ts/ssl/2050.crt and /home/wkaras/REPOS/TS/tests/_sandbox/cert_loader_disk/ts/ssl/private.key | |
[Mar 29 21:15:32.884] [ET_TASK 0] DEBUG: <SSLUtils.cc:2282 (load_certs_and_cross_reference_names)> (ssl_load) subj 'abc.org' in certificate /home/wkaras/REPOS/TS/tests/_sandbox/cert_loader_disk/ts/ssl/2050.crt 0x18a4f50 | |
[Mar 29 21:15:32.884] [ET_TASK 0] DEBUG: <SSLUtils.cc:1051 (check_server_cert_now)> (ssl_load) server certificate /home/wkaras/REPOS/TS/tests/_sandbox/cert_loader_disk/ts/ssl/2050.crt passed accessibility and date checks | |
[Mar 29 21:15:32.884] [ET_TASK 0] DEBUG: <SSLUtils.cc:1265 (init_server_ssl_ctx)> (ssl_load) Creating new context 0x1985650 cert_count=1 initial: /home/wkaras/REPOS/TS/tests/_sandbox/cert_loader_disk/ts/ssl/2050.crt | |
[Mar 29 21:15:32.884] [ET_TASK 0] DEBUG: <SSLUtils.cc:1385 (_setup_session_cache)> (ssl.session_cache) ssl context=0x1985650: using session cache options, enabled=2, size=102400, num_buckets=256, skip_on_contention=0, timeout=0, auto_clear=1 | |
[Mar 29 21:15:32.884] [ET_TASK 0] DEBUG: <SSLUtils.cc:1407 (_setup_session_cache)> (ssl.session_cache) enabling SSL session cache with ATS implementation | |
[Mar 29 21:15:32.884] [ET_TASK 0] DEBUG: <SSLUtils.cc:1275 (init_server_ssl_ctx)> (ssl_load) enabling SSL_MODE_RELEASE_BUFFERS | |
[Mar 29 21:15:32.884] [ET_TASK 0] DEBUG: <SSLUtils.cc:2365 (load_certs)> (ssl_load) SSL OCSP Stapling is disabled | |
[Mar 29 21:15:32.884] [ET_TASK 0] DEBUG: <SSLSecret.cc:112 (getOrLoadSecret)> (ssl_secret) lookup up secrets for /home/wkaras/REPOS/TS/tests/_sandbox/cert_loader_disk/ts/ssl/2050.crt and /home/wkaras/REPOS/TS/tests/_sandbox/cert_loader_disk/ts/ssl/private.key | |
[Mar 29 21:15:32.884] [ET_TASK 0] DEBUG: <SSLUtils.cc:2399 (load_certs)> (ssl_load) for ctx=0x1985650, using certificate /home/wkaras/REPOS/TS/tests/_sandbox/cert_loader_disk/ts/ssl/2050.crt | |
[Mar 29 21:15:32.884] [ET_TASK 0] DEBUG: <SSLUtils.cc:1494 (_setup_session_ticket)> (ssl_load) ssl session ticket number set to 2 | |
[Mar 29 21:15:32.884] [ET_TASK 0] DEBUG: <SSLUtils.cc:2497 (set_session_id_context)> (ssl_load) Using '2050.crt' in hash for session id context | |
[Mar 29 21:15:32.884] [ET_TASK 0] DEBUG: <InkAPI.cc:9443 (TSSslSecretSet)> (ssl.cert_update) Setting secrets in SSLConfig for: /home/wkaras/REPOS/TS/tests/_sandbox/cert_loader_disk/ts/ssl/2050.crt | |
[Mar 29 21:15:32.884] [ET_TASK 0] DEBUG: <SSLSecret.cc:88 (setSecret)> (ssl_secret) Set secret for /home/wkaras/REPOS/TS/tests/_sandbox/cert_loader_disk/ts/ssl/2050.crt to -----BEGIN CERTIFICATE----- | |
MIICZjCCAc+gAwIBAgIUAT | |
[Mar 29 21:15:32.884] [ET_TASK 0] DEBUG: <SSLConfig.cc:758 (updateCTX)> (ssl_config_updateCTX) Update cert /home/wkaras/REPOS/TS/tests/_sandbox/cert_loader_disk/ts/ssl/2050.crt, 0x1973a60 | |
[Mar 29 21:15:32.884] [ET_TASK 0] DEBUG: <SSLConfig.cc:777 (updateCTX)> (ssl_load) Update cert /home/wkaras/REPOS/TS/tests/_sandbox/cert_loader_disk/ts/ssl/2050.crt | |
[Mar 29 21:15:32.884] [ET_TASK 0] DEBUG: <SSLSecret.cc:112 (getOrLoadSecret)> (ssl_secret) lookup up secrets for /home/wkaras/REPOS/TS/tests/_sandbox/cert_loader_disk/ts/ssl/2050.crt and /home/wkaras/REPOS/TS/tests/_sandbox/cert_loader_disk/ts/ssl/private.key | |
[Mar 29 21:15:32.884] [ET_TASK 0] DEBUG: <SSLUtils.cc:2282 (load_certs_and_cross_reference_names)> (ssl_load) subj 'abc.org' in certificate /home/wkaras/REPOS/TS/tests/_sandbox/cert_loader_disk/ts/ssl/2050.crt 0x7fda5c04d270 | |
[Mar 29 21:15:32.885] [ET_TASK 0] DEBUG: <SSLUtils.cc:1051 (check_server_cert_now)> (ssl_load) server certificate /home/wkaras/REPOS/TS/tests/_sandbox/cert_loader_disk/ts/ssl/2050.crt passed accessibility and date checks | |
[Mar 29 21:15:32.885] [ET_TASK 0] DEBUG: <SSLUtils.cc:1265 (init_server_ssl_ctx)> (ssl_load) Creating new context 0x7fda5c15fd50 cert_count=1 initial: /home/wkaras/REPOS/TS/tests/_sandbox/cert_loader_disk/ts/ssl/2050.crt | |
[Mar 29 21:15:32.885] [ET_TASK 0] DEBUG: <SSLUtils.cc:1385 (_setup_session_cache)> (ssl.session_cache) ssl context=0x7fda5c15fd50: using session cache options, enabled=2, size=102400, num_buckets=256, skip_on_contention=0, timeout=0, auto_clear=1 | |
[Mar 29 21:15:32.885] [ET_TASK 0] DEBUG: <SSLUtils.cc:1407 (_setup_session_cache)> (ssl.session_cache) enabling SSL session cache with ATS implementation | |
[Mar 29 21:15:32.885] [ET_TASK 0] DEBUG: <SSLUtils.cc:1275 (init_server_ssl_ctx)> (ssl_load) enabling SSL_MODE_RELEASE_BUFFERS | |
[Mar 29 21:15:32.885] [ET_TASK 0] DEBUG: <SSLUtils.cc:2365 (load_certs)> (ssl_load) SSL OCSP Stapling is disabled | |
[Mar 29 21:15:32.885] [ET_TASK 0] DEBUG: <SSLSecret.cc:112 (getOrLoadSecret)> (ssl_secret) lookup up secrets for /home/wkaras/REPOS/TS/tests/_sandbox/cert_loader_disk/ts/ssl/2050.crt and /home/wkaras/REPOS/TS/tests/_sandbox/cert_loader_disk/ts/ssl/private.key | |
[Mar 29 21:15:32.885] [ET_TASK 0] DEBUG: <SSLUtils.cc:2399 (load_certs)> (ssl_load) for ctx=0x7fda5c15fd50, using certificate /home/wkaras/REPOS/TS/tests/_sandbox/cert_loader_disk/ts/ssl/2050.crt | |
[Mar 29 21:15:32.885] [ET_TASK 0] DEBUG: <SSLUtils.cc:1494 (_setup_session_ticket)> (ssl_load) ssl session ticket number set to 2 | |
[Mar 29 21:15:32.885] [ET_TASK 0] DEBUG: <SSLUtils.cc:2497 (set_session_id_context)> (ssl_load) Using '2050.crt' in hash for session id context | |
[Mar 29 21:15:32.885] [ET_TASK 0] DEBUG: <SSLConfig.cc:758 (updateCTX)> (ssl_config_updateCTX) Update cert /home/wkaras/REPOS/TS/tests/_sandbox/cert_loader_disk/ts/ssl/2050.crt, 0x1973a60 | |
[Mar 29 21:15:32.885] [ET_TASK 0] DEBUG: <SSLConfig.cc:777 (updateCTX)> (ssl_load) Update cert /home/wkaras/REPOS/TS/tests/_sandbox/cert_loader_disk/ts/ssl/2050.crt | |
[Mar 29 21:15:32.885] [ET_TASK 0] DEBUG: <SSLSecret.cc:112 (getOrLoadSecret)> (ssl_secret) lookup up secrets for /home/wkaras/REPOS/TS/tests/_sandbox/cert_loader_disk/ts/ssl/2050.crt and /home/wkaras/REPOS/TS/tests/_sandbox/cert_loader_disk/ts/ssl/private.key | |
[Mar 29 21:15:32.885] [ET_TASK 0] DEBUG: <SSLUtils.cc:2282 (load_certs_and_cross_reference_names)> (ssl_load) subj 'abc.org' in certificate /home/wkaras/REPOS/TS/tests/_sandbox/cert_loader_disk/ts/ssl/2050.crt 0x18a4f50 | |
[Mar 29 21:15:32.885] [ET_TASK 0] DEBUG: <SSLUtils.cc:1051 (check_server_cert_now)> (ssl_load) server certificate /home/wkaras/REPOS/TS/tests/_sandbox/cert_loader_disk/ts/ssl/2050.crt passed accessibility and date checks | |
[Mar 29 21:15:32.885] [ET_TASK 0] DEBUG: <SSLUtils.cc:1265 (init_server_ssl_ctx)> (ssl_load) Creating new context 0x1985650 cert_count=1 initial: /home/wkaras/REPOS/TS/tests/_sandbox/cert_loader_disk/ts/ssl/2050.crt | |
[Mar 29 21:15:32.885] [ET_TASK 0] DEBUG: <SSLUtils.cc:1385 (_setup_session_cache)> (ssl.session_cache) ssl context=0x1985650: using session cache options, enabled=2, size=102400, num_buckets=256, skip_on_contention=0, timeout=0, auto_clear=1 | |
[Mar 29 21:15:32.885] [ET_TASK 0] DEBUG: <SSLUtils.cc:1407 (_setup_session_cache)> (ssl.session_cache) enabling SSL session cache with ATS implementation | |
[Mar 29 21:15:32.885] [ET_TASK 0] DEBUG: <SSLUtils.cc:1275 (init_server_ssl_ctx)> (ssl_load) enabling SSL_MODE_RELEASE_BUFFERS | |
[Mar 29 21:15:32.885] [ET_TASK 0] DEBUG: <SSLUtils.cc:2365 (load_certs)> (ssl_load) SSL OCSP Stapling is disabled | |
[Mar 29 21:15:32.885] [ET_TASK 0] DEBUG: <SSLSecret.cc:112 (getOrLoadSecret)> (ssl_secret) lookup up secrets for /home/wkaras/REPOS/TS/tests/_sandbox/cert_loader_disk/ts/ssl/2050.crt and /home/wkaras/REPOS/TS/tests/_sandbox/cert_loader_disk/ts/ssl/private.key | |
[Mar 29 21:15:32.885] [ET_TASK 0] DEBUG: <SSLUtils.cc:2399 (load_certs)> (ssl_load) for ctx=0x1985650, using certificate /home/wkaras/REPOS/TS/tests/_sandbox/cert_loader_disk/ts/ssl/2050.crt | |
[Mar 29 21:15:32.885] [ET_TASK 0] DEBUG: <SSLUtils.cc:1494 (_setup_session_ticket)> (ssl_load) ssl session ticket number set to 2 | |
[Mar 29 21:15:32.885] [ET_TASK 0] DEBUG: <SSLUtils.cc:2497 (set_session_id_context)> (ssl_load) Using '2050.crt' in hash for session id context | |
[Mar 29 21:15:37.168] [ET_NET 9] DEBUG: <SSLNextProtocolAccept.cc:129 (mainEvent)> (ssl) [SSLNextProtocolAccept:mainEvent] event 202 netvc 0x7fdaaf115a80 | |
[Mar 29 21:15:37.168] [ET_NET 9] DEBUG: <SSLNextProtocolSet.cc:68 (create_npn_advertisement)> (ssl) advertising protocol h2, 0x1a6e500 | |
[Mar 29 21:15:37.168] [ET_NET 9] DEBUG: <SSLNextProtocolSet.cc:68 (create_npn_advertisement)> (ssl) advertising protocol http/1.1, 0x1a66eb0 | |
[Mar 29 21:15:37.168] [ET_NET 9] DEBUG: <SSLNextProtocolSet.cc:68 (create_npn_advertisement)> (ssl) advertising protocol http/1.0, 0x1a66eb0 | |
[Mar 29 21:15:37.168] [ET_NET 9] DEBUG: <SSLNetVConnection.cc:1060 (sslStartHandShake)> (ssl) IP context is (nil) for [127.0.0.1:51252] -> [127.0.0.1:61002], default context 0x1a32100 | |
[Mar 29 21:15:37.168] [ET_NET 9] DEBUG: <SSLNetVConnection.cc:1228 (sslServerHandShakeEvent)> (ssl) Initialize preaccept curHook from NULL | |
[Mar 29 21:15:37.168] [ET_NET 9] DEBUG: <SSLNetVConnection.cc:1263 (sslServerHandShakeEvent)> (ssl) Go on with the handshake state=2 | |
[Mar 29 21:15:37.168] [ET_NET 9] DEBUG: <SSLNetVConnection.cc:1276 (sslServerHandShakeEvent)> (ssl) 0x7fdaaf115a80 first read | |
[Mar 29 21:15:37.168] [ET_NET 9] DEBUG: <SSLNetVConnection.cc:409 (read_raw_data)> (ssl) read_raw_data r=517 rattempted=32768 total_read=32768 fd=75 | |
[Mar 29 21:15:37.168] [ET_NET 9] DEBUG: <SSLNetVConnection.cc:492 (read_raw_data)> (ssl) 0x7fdaaf115a80 read r=517 total=32768 bio=517 | |
[Mar 29 21:15:37.168] [ET_NET 9] DEBUG: <SSLUtils.cc:1072 (ssl_callback_info)> (ssl_load) ssl_callback_info ssl: 0x7fda80028b30, where: 16, ret: 1, State: before SSL initialization | |
[Mar 29 21:15:37.168] [ET_NET 9] DEBUG: <SSLUtils.cc:1072 (ssl_callback_info)> (ssl_load) ssl_callback_info ssl: 0x7fda80028b30, where: 8193, ret: 1, State: before SSL initialization | |
[Mar 29 21:15:37.168] [ET_NET 9] DEBUG: <SSLUtils.cc:1072 (ssl_callback_info)> (ssl_load) ssl_callback_info ssl: 0x7fda80028b30, where: 8193, ret: 1, State: before SSL initialization | |
[Mar 29 21:15:37.168] [ET_NET 9] DEBUG: <TLSSNISupport.cc:68 (perform_sni_action)> (ssl_sni) not available in the map | |
[Mar 29 21:15:37.168] [ET_NET 9] DEBUG: <SSLNetVConnection.cc:1751 (callHooks)> (ssl) sslHandshakeHookState=2 eventID=60207 | |
[Mar 29 21:15:37.168] [ET_NET 9] DEBUG: <SSLNetVConnection.cc:1869 (callHooks)> (ssl) iterated to curHook=(nil) | |
[Mar 29 21:15:37.168] [ET_NET 9] DEBUG: <SSLNetVConnection.cc:1751 (callHooks)> (ssl) sslHandshakeHookState=4 eventID=60204 | |
[Mar 29 21:15:37.168] [ET_NET 9] DEBUG: <SSLNetVConnection.cc:1869 (callHooks)> (ssl) iterated to curHook=(nil) | |
[Mar 29 21:15:37.168] [ET_NET 9] DEBUG: <ALPNSupport.cc:106 (select_next_protocol)> (ssl) selected ALPN protocol h2 | |
[Mar 29 21:15:37.168] [ET_NET 9] DEBUG: <TLSCertSwitchSupport.cc:67 (selectCertificate)> (ssl) set_context_cert ssl=0x7fda80028b30 server=(null) | |
[Mar 29 21:15:37.168] [ET_NET 9] DEBUG: <TLSCertSwitchSupport.cc:96 (selectCertificate)> (ssl_load) ssl_cert_callback using SSL context 0x1a32100 for requested name '(null)' | |
[Mar 29 21:15:37.168] [ET_NET 9] DEBUG: <SSLNetVConnection.cc:1751 (callHooks)> (ssl) sslHandshakeHookState=5 eventID=60203 | |
[Mar 29 21:15:37.168] [ET_NET 9] DEBUG: <SSLNetVConnection.cc:1869 (callHooks)> (ssl) iterated to curHook=(nil) | |
[Mar 29 21:15:37.168] [ET_NET 9] DEBUG: <SSLUtils.cc:1072 (ssl_callback_info)> (ssl_load) ssl_callback_info ssl: 0x7fda80028b30, where: 8193, ret: 1, State: SSLv3/TLS read client hello | |
[Mar 29 21:15:37.168] [ET_NET 9] DEBUG: <SSLUtils.cc:1072 (ssl_callback_info)> (ssl_load) ssl_callback_info ssl: 0x7fda80028b30, where: 8193, ret: 1, State: SSLv3/TLS write server hello | |
[Mar 29 21:15:37.169] [ET_NET 9] DEBUG: <SSLUtils.cc:1072 (ssl_callback_info)> (ssl_load) ssl_callback_info ssl: 0x7fda80028b30, where: 8193, ret: 1, State: SSLv3/TLS write change cipher spec | |
[Mar 29 21:15:37.169] [ET_NET 9] DEBUG: <SSLUtils.cc:1072 (ssl_callback_info)> (ssl_load) ssl_callback_info ssl: 0x7fda80028b30, where: 8193, ret: 1, State: TLSv1.3 write encrypted extensions | |
[Mar 29 21:15:37.169] [ET_NET 9] DEBUG: <SSLUtils.cc:1072 (ssl_callback_info)> (ssl_load) ssl_callback_info ssl: 0x7fda80028b30, where: 8193, ret: 1, State: SSLv3/TLS write certificate | |
[Mar 29 21:15:37.169] [ET_NET 9] DEBUG: <SSLUtils.cc:1072 (ssl_callback_info)> (ssl_load) ssl_callback_info ssl: 0x7fda80028b30, where: 8193, ret: 1, State: TLSv1.3 write server certificate verify | |
[Mar 29 21:15:37.169] [ET_NET 9] DEBUG: <SSLUtils.cc:1072 (ssl_callback_info)> (ssl_load) ssl_callback_info ssl: 0x7fda80028b30, where: 8193, ret: 1, State: SSLv3/TLS write finished | |
[Mar 29 21:15:37.169] [ET_NET 9] DEBUG: <SSLUtils.cc:1072 (ssl_callback_info)> (ssl_load) ssl_callback_info ssl: 0x7fda80028b30, where: 8193, ret: 1, State: TLSv1.3 early data | |
[Mar 29 21:15:37.169] [ET_NET 9] DEBUG: <SSLUtils.cc:1072 (ssl_callback_info)> (ssl_load) ssl_callback_info ssl: 0x7fda80028b30, where: 8194, ret: -1, State: TLSv1.3 early data | |
[Mar 29 21:15:37.169] [ET_NET 9] DEBUG: <SSLNetVConnection.cc:1333 (sslServerHandShakeEvent)> (ssl-diag) SSL handshake error: SSL_ERROR_WANT_READ (2), errno=0 | |
[Mar 29 21:15:37.169] [ET_NET 9] DEBUG: <SSLNetVConnection.cc:638 (net_read_io)> (ssl) ssl handshake for vc 0x7fdaaf115a80, took 0.000 seconds, configured handshake_timer: 30 | |
[Mar 29 21:15:37.170] [ET_NET 9] DEBUG: <SSLNetVConnection.cc:1263 (sslServerHandShakeEvent)> (ssl) Go on with the handshake state=7 | |
[Mar 29 21:15:37.170] [ET_NET 9] DEBUG: <SSLUtils.cc:1072 (ssl_callback_info)> (ssl_load) ssl_callback_info ssl: 0x7fda80028b30, where: 8193, ret: 1, State: TLSv1.3 early data | |
[Mar 29 21:15:37.170] [ET_NET 9] DEBUG: <SSLUtils.cc:1072 (ssl_callback_info)> (ssl_load) ssl_callback_info ssl: 0x7fda80028b30, where: 8193, ret: 1, State: SSLv3/TLS read finished | |
[Mar 29 21:15:37.170] [ET_NET 9] DEBUG: <SSLUtils.cc:1072 (ssl_callback_info)> (ssl_load) ssl_callback_info ssl: 0x7fda80028b30, where: 32, ret: 1, State: SSLv3/TLS write session ticket | |
[Mar 29 21:15:37.170] [ET_NET 9] DEBUG: <TLSSessionResumptionSupport.cc:249 (_setSessionInformation)> (ssl_session_ticket) create ticket for a new session. | |
[Mar 29 21:15:37.170] [ET_NET 9] DEBUG: <SSLUtils.cc:1072 (ssl_callback_info)> (ssl_load) ssl_callback_info ssl: 0x7fda80028b30, where: 8193, ret: 1, State: SSLv3/TLS write session ticket | |
[Mar 29 21:15:37.170] [ET_NET 9] DEBUG: <TLSSessionResumptionSupport.cc:249 (_setSessionInformation)> (ssl_session_ticket) create ticket for a new session. | |
[Mar 29 21:15:37.170] [ET_NET 9] DEBUG: <SSLUtils.cc:1072 (ssl_callback_info)> (ssl_load) ssl_callback_info ssl: 0x7fda80028b30, where: 8193, ret: 1, State: SSLv3/TLS write session ticket | |
[Mar 29 21:15:37.170] [ET_NET 9] DEBUG: <SSLUtils.cc:1072 (ssl_callback_info)> (ssl_load) ssl_callback_info ssl: 0x7fda80028b30, where: 8194, ret: 1, State: SSL negotiation finished successfully | |
[Mar 29 21:15:37.170] [ET_NET 9] DEBUG: <SSLNetVConnection.cc:1354 (sslServerHandShakeEvent)> (ssl) SSL server handshake completed successfully | |
[Mar 29 21:15:37.170] [ET_NET 9] DEBUG: <TLSBasicSupport.cc:132 (_record_tls_handshake_end_time)> (ssl) ssl handshake time:1282814 | |
[Mar 29 21:15:37.170] [ET_NET 9] DEBUG: <SSLNetVConnection.cc:1398 (sslServerHandShakeEvent)> (ssl) Origin selected next protocol 'h2' | |
[Mar 29 21:15:37.170] [ET_NET 9] DEBUG: <SSLNetVConnection.cc:662 (net_read_io)> (ssl) ssl handshake EVENT_DONE ntodo=0 | |
[Mar 29 21:15:37.170] [ET_NET 9] DEBUG: <Http2ClientSession.cc:108 (new_connection)> (ssl_early_data) read_from_early_data = 0 | |
[Mar 29 21:15:37.170] [ET_NET 9] DEBUG: <SSLNetVConnection.cc:293 (_ssl_read_from_net)> (ssl) amount_to_read=4096 | |
[Mar 29 21:15:37.170] [ET_NET 9] DEBUG: <SSLNetVConnection.cc:298 (_ssl_read_from_net)> (ssl) nread=24 | |
[Mar 29 21:15:37.170] [ET_NET 9] DEBUG: <SSLNetVConnection.cc:293 (_ssl_read_from_net)> (ssl) amount_to_read=4072 | |
[Mar 29 21:15:37.170] [ET_NET 9] DEBUG: <SSLNetVConnection.cc:298 (_ssl_read_from_net)> (ssl) nread=27 | |
[Mar 29 21:15:37.170] [ET_NET 9] DEBUG: <SSLNetVConnection.cc:293 (_ssl_read_from_net)> (ssl) amount_to_read=4045 | |
[Mar 29 21:15:37.170] [ET_NET 9] DEBUG: <SSLNetVConnection.cc:298 (_ssl_read_from_net)> (ssl) nread=13 | |
[Mar 29 21:15:37.170] [ET_NET 9] DEBUG: <SSLNetVConnection.cc:293 (_ssl_read_from_net)> (ssl) amount_to_read=4032 | |
[Mar 29 21:15:37.170] [ET_NET 9] DEBUG: <SSLNetVConnection.cc:298 (_ssl_read_from_net)> (ssl) nread=38 | |
[Mar 29 21:15:37.170] [ET_NET 9] DEBUG: <SSLNetVConnection.cc:293 (_ssl_read_from_net)> (ssl) amount_to_read=3994 | |
[Mar 29 21:15:37.170] [ET_NET 9] DEBUG: <SSLNetVConnection.cc:298 (_ssl_read_from_net)> (ssl) nread=0 | |
[Mar 29 21:15:37.170] [ET_NET 9] DEBUG: <SSLNetVConnection.cc:319 (_ssl_read_from_net)> (ssl.error) SSL_ERROR_WOULD_BLOCK(read) | |
[Mar 29 21:15:37.170] [ET_NET 9] DEBUG: <SSLNetVConnection.cc:360 (_ssl_read_from_net)> (ssl) bytes_read=102 | |
[Mar 29 21:15:37.170] [ET_NET 9] DEBUG: <HttpSM.cc:4169 (check_sni_host)> (ssl_sni) [1] No SNI/hostname check configured for host=foo.com | |
[Mar 29 21:15:37.170] [ET_NET 9] DEBUG: <SSLNetVConnection.cc:293 (_ssl_read_from_net)> (ssl) amount_to_read=3994 | |
[Mar 29 21:15:37.171] [ET_NET 9] DEBUG: <SSLNetVConnection.cc:298 (_ssl_read_from_net)> (ssl) nread=0 | |
[Mar 29 21:15:37.171] [ET_NET 9] DEBUG: <SSLNetVConnection.cc:319 (_ssl_read_from_net)> (ssl.error) SSL_ERROR_WOULD_BLOCK(read) | |
[Mar 29 21:15:37.171] [ET_NET 9] DEBUG: <SSLNetVConnection.cc:376 (_ssl_read_from_net)> (ssl) bytes_read == 0 | |
[Mar 29 21:15:37.171] [ET_NET 9] DEBUG: <SSLNetVConnection.cc:731 (net_read_io)> (ssl) read finished - would block | |
[Mar 29 21:15:37.171] [ET_NET 9] DEBUG: <SSLNetVConnection.cc:785 (load_buffer_and_write)> (ssl) towrite=30 | |
[Mar 29 21:15:37.171] [ET_NET 9] DEBUG: <SSLNetVConnection.cc:841 (load_buffer_and_write)> (ssl) try_to_write=30 written=30 total_written=30 | |
[Mar 29 21:15:37.171] [ET_NET 9] DEBUG: <SSLNetVConnection.cc:293 (_ssl_read_from_net)> (ssl) amount_to_read=3994 | |
[Mar 29 21:15:37.171] [ET_NET 9] DEBUG: <SSLNetVConnection.cc:298 (_ssl_read_from_net)> (ssl) nread=9 | |
[Mar 29 21:15:37.171] [ET_NET 9] DEBUG: <SSLNetVConnection.cc:293 (_ssl_read_from_net)> (ssl) amount_to_read=3985 | |
[Mar 29 21:15:37.171] [ET_NET 9] DEBUG: <SSLNetVConnection.cc:298 (_ssl_read_from_net)> (ssl) nread=0 | |
[Mar 29 21:15:37.171] [ET_NET 9] DEBUG: <SSLNetVConnection.cc:319 (_ssl_read_from_net)> (ssl.error) SSL_ERROR_WOULD_BLOCK(read) | |
[Mar 29 21:15:37.171] [ET_NET 9] DEBUG: <SSLNetVConnection.cc:360 (_ssl_read_from_net)> (ssl) bytes_read=9 | |
[Mar 29 21:15:37.171] [ET_NET 9] DEBUG: <SSLNetVConnection.cc:293 (_ssl_read_from_net)> (ssl) amount_to_read=3985 | |
[Mar 29 21:15:37.171] [ET_NET 9] DEBUG: <SSLNetVConnection.cc:298 (_ssl_read_from_net)> (ssl) nread=0 | |
[Mar 29 21:15:37.171] [ET_NET 9] DEBUG: <SSLNetVConnection.cc:319 (_ssl_read_from_net)> (ssl.error) SSL_ERROR_WOULD_BLOCK(read) | |
[Mar 29 21:15:37.171] [ET_NET 9] DEBUG: <SSLNetVConnection.cc:376 (_ssl_read_from_net)> (ssl) bytes_read == 0 | |
[Mar 29 21:15:37.171] [ET_NET 9] DEBUG: <SSLNetVConnection.cc:731 (net_read_io)> (ssl) read finished - would block | |
[Mar 29 21:15:37.189] [ET_NET 9] DEBUG: <SSLNetVConnection.cc:785 (load_buffer_and_write)> (ssl) towrite=56 | |
[Mar 29 21:15:37.189] [ET_NET 9] DEBUG: <SSLNetVConnection.cc:841 (load_buffer_and_write)> (ssl) try_to_write=56 written=56 total_written=56 | |
[Mar 29 21:15:37.190] [ET_NET 9] DEBUG: <SSLNetVConnection.cc:293 (_ssl_read_from_net)> (ssl) amount_to_read=3985 | |
[Mar 29 21:15:37.190] [ET_NET 9] DEBUG: <SSLUtils.cc:1072 (ssl_callback_info)> (ssl_load) ssl_callback_info ssl: 0x7fda80028b30, where: 16388, ret: 256, State: SSL negotiation finished successfully | |
[Mar 29 21:15:37.190] [ET_NET 9] DEBUG: <SSLNetVConnection.cc:298 (_ssl_read_from_net)> (ssl) nread=0 | |
[Mar 29 21:15:37.190] [ET_NET 9] DEBUG: <SSLNetVConnection.cc:345 (_ssl_read_from_net)> (ssl.error) SSL_ERROR_ZERO_RETURN | |
[Mar 29 21:15:37.190] [ET_NET 9] DEBUG: <SSLNetVConnection.cc:376 (_ssl_read_from_net)> (ssl) bytes_read == 0 | |
[Mar 29 21:15:37.190] [ET_NET 9] DEBUG: <SSLNetVConnection.cc:1751 (callHooks)> (ssl) sslHandshakeHookState=7 eventID=108 | |
[Mar 29 21:15:37.190] [ET_NET 9] DEBUG: <SSLNetVConnection.cc:1869 (callHooks)> (ssl) iterated to curHook=(nil) | |
[Mar 29 21:15:37.190] [ET_NET 9] DEBUG: <SSLNetVConnection.cc:910 (do_io_close)> (ssl-shutdown) previous shutdown state 0x2 | |
[Mar 29 21:15:37.190] [ET_NET 9] DEBUG: <SSLNetVConnection.cc:940 (do_io_close)> (ssl-shutdown) Enable quiet shutdown | |
[Mar 29 21:15:37.191] [ET_NET 9] DEBUG: <SSLNetVConnection.cc:744 (net_read_io)> (ssl) read finished - 0 useful bytes read, bytes used by SSL layer | |
Traffic Server 10.0.0 Mar 27 2023 01:22:24 8b0949dd.home-wkaras.bf2.ows.oath.cloud | |
traffic_server: using root directory '/home/wkaras/REPOS/TS/tests/_sandbox/cert_loader_disk/ts' | |
SSL Read | |
PRI * HTTP/2.0 | |
SM | |
SSL Read | |
d | |
SSL Read | |
� | |
SSL Read | |
���A���\��z�%�P��Z�?S*/* | |
SSL Read | |
SSL Read | |
PRI * HTTP/2.0 | |
SM | |
SSL Read | |
d | |
SSL Read | |
� | |
SSL Read | |
���A���\��z�%�P��Z�?S*/* | |
SSL Read |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment