unexpected_message error while SSLHandshake
Posted: Jan 13, 2003 7:31 AM
Advertisement
I am using Tomcat as SSL Server and have written a custom client. While hadnshake it gives unexpected_message exception and quits. the debug information is pasted here. Any help will be appreciated. There is no problem with certificates. --------------------------------------------------------- URL created Loading keyStore ..... KeyStore Loaded. Initialiazing KeyFactory.... *** found key for : client chain [0] = [ [ Version: V1 Subject: CN=client, OU=HPT, O=HSS_1, L=xyz, ST=haryana, C=IN Signature Algorithm: SHA1withDSA, OID = 1.2.840.10040.4.3 Key: Sun DSA Public Key Parameters:DSA p: fd7f5381 1d751229 52df4a9c 2eece4e7 f611b752 3cef4400 c31e3f80 b6 512669 455d4022 51fb593d 8d58fabf c5f5ba30 f6cb9b55 6cd7813b 801d346f f26660b7 6b9950a5 a49f9fe8 047b1022 c24fbba9 d7feb7c6 1bf83b57 e7c6a8a6 150f04fb 83f6d3c5 1ec30235 54135a16 9132f675 f3ae2b61 d72aeff2 2203199d d14801c7 q: 9760508f 15230bcc b292b982 a2eb840b f0581cf5 g: f7e1a085 d69b3dde cbbcab5c 36b857b9 7994afbb fa3aea82 f9574c0b 3d 078267 5159578e bad4594f e6710710 8180b449 167123e8 4c281613 b7cf0932 8cc8a6e1 3c167a8b 547c8d28 e0a3ae1e 2bb3a675 916ea37f 0bfa2135 62f1fb62 7a01243b cca4f1be a8519089 a883dfe1 5ae59f06 928b665e 807b5525 64014c3b fecf492a y: c0e9d602 30ae5aee 788da79e 0a4703a3 1ff1b024 1cd99629 a8073fbd bc7cae83 badff62e 56b4ff39 39d95373 eb3a6a99 a7951139 dbea6779 1e894a9c 1035ae3b 3c6d4a4a f5e25a76 b8abbc58 2d335981 6947b520 a1de762b 5657ef6e c1c4089e 867cc151 f8f8f51a f5262925 90296d51 c2d8d5cc 7ee1dd6a 954bf61b 7de3c1db Validity: [From: Mon Jan 13 19:24:45 IST 2003, To: Sun Apr 13 19:24:45 IST 2003] Issuer: CN=client, OU=abc, O=HSS_1, L=xyz, ST=haryana, C=IN SerialNumber: [ 3e22c525] ] Algorithm: [SHA1withDSA] Signature: 0000: 30 2C 02 14 04 20 5C 75 7E 7E 32 98 1C C4 9E 58 0,... \u..2....X 0010: B2 97 51 9E 4F DB 44 93 02 14 18 33 F1 0E 5C 87 ..Q.O.D....3..\. 0020: EC 00 35 21 8B 6C EE 95 DF E4 CE BF AD 5F ..5!.l......._ ] *** Initia.. context adding private entry as trusted cert: [ [ Version: V1 Subject: CN=Tomcat, OU=xyz, O=abc, L=Delhi, ST=Delhi, C=IN Signature Algorithm: SHA1withDSA, OID = 1.2.840.10040.4.3 Key: Sun DSA Public Key Parameters:DSA p: fd7f5381 1d751229 52df4a9c 2eece4e7 f611b752 3cef4400 c31e3f80 b6 512669 455d4022 51fb593d 8d58fabf c5f5ba30 f6cb9b55 6cd7813b 801d346f f26660b7 6b9950a5 a49f9fe8 047b1022 c24fbba9 d7feb7c6 1bf83b57 e7c6a8a6 150f04fb 83f6d3c5 1ec30235 54135a16 9132f675 f3ae2b61 d72aeff2 2203199d d14801c7 q: 9760508f 15230bcc b292b982 a2eb840b f0581cf5 g: f7e1a085 d69b3dde cbbcab5c 36b857b9 7994afbb fa3aea82 f9574c0b 3d 078267 5159578e bad4594f e6710710 8180b449 167123e8 4c281613 b7cf0932 8cc8a6e1 3c167a8b 547c8d28 e0a3ae1e 2bb3a675 916ea37f 0bfa2135 62f1fb62 7a01243b cca4f1be a8519089 a883dfe1 5ae59f06 928b665e 807b5525 64014c3b fecf492a y: 2c65dd4e d114a76c b8bfad02 937b3f1f 587aac8d 02b1c2f6 d946830f 73128390 7060d4ec 94520546 dae89a0f 90be0bbd d4660ef5 132473f7 a925f825 a520e699 88e227c1 0019083e a7e1c5a8 e08ac949 d955996e 32c03ab4 ef66d641 3f452f0a e5f8b57b 1c51006b d1c47760 7afb87ad a39e5c41 890d04f8 201edcf9 6236fa25 Validity: [From: Mon Jan 13 19:25:26 IST 2003, To: Sun Apr 13 19:25:26 IST 2003] Issuer: CN=Tomcat, OU=abc, O=xyz, L=Delhi, ST=Delhi, C=IN SerialNumber: [ 3e22c54e] ] Algorithm: [SHA1withDSA] Signature: 0000: 30 2D 02 14 0D 8F FA 63 9F 94 00 C5 C0 4D 78 78 0-.....c.....Mxx 0010: 59 AF 09 31 AC 64 8F 2D 02 15 00 82 0C B5 14 61 Y..1.d.-.......a 0020: 88 A7 1B E0 70 EB 86 24 FE 58 6A 86 58 7D 57 ....p..$.Xj.X.W ] adding as trusted cert: [ [ Version: V1 Subject: CN=client, OU=abc, O=HSS_1, L=xyz, ST=haryana, C=IN Signature Algorithm: SHA1withDSA, OID = 1.2.840.10040.4.3 Key: Sun DSA Public Key Parameters:DSA p: fd7f5381 1d751229 52df4a9c 2eece4e7 f611b752 3cef4400 c31e3f80 b6 512669 455d4022 51fb593d 8d58fabf c5f5ba30 f6cb9b55 6cd7813b 801d346f f26660b7 6b9950a5 a49f9fe8 047b1022 c24fbba9 d7feb7c6 1bf83b57 e7c6a8a6 150f04fb 83f6d3c5 1ec30235 54135a16 9132f675 f3ae2b61 d72aeff2 2203199d d14801c7 q: 9760508f 15230bcc b292b982 a2eb840b f0581cf5 g: f7e1a085 d69b3dde cbbcab5c 36b857b9 7994afbb fa3aea82 f9574c0b 3d 078267 5159578e bad4594f e6710710 8180b449 167123e8 4c281613 b7cf0932 8cc8a6e1 3c167a8b 547c8d28 e0a3ae1e 2bb3a675 916ea37f 0bfa2135 62f1fb62 7a01243b cca4f1be a8519089 a883dfe1 5ae59f06 928b665e 807b5525 64014c3b fecf492a y: c0e9d602 30ae5aee 788da79e 0a4703a3 1ff1b024 1cd99629 a8073fbd bc7cae83 badff62e 56b4ff39 39d95373 eb3a6a99 a7951139 dbea6779 1e894a9c 1035ae3b 3c6d4a4a f5e25a76 b8abbc58 2d335981 6947b520 a1de762b 5657ef6e c1c4089e 867cc151 f8f8f51a f5262925 90296d51 c2d8d5cc 7ee1dd6a 954bf61b 7de3c1db Validity: [From: Mon Jan 13 19:24:45 IST 2003, To: Sun Apr 13 19:24:45 IST 2003] Issuer: CN=client, OU=abc, O=HSS_1, L=xyz, ST=haryana, C=IN SerialNumber: [ 3e22c525] ] Algorithm: [SHA1withDSA] Signature: 0000: 30 2C 02 14 04 20 5C 75 7E 7E 32 98 1C C4 9E 58 0,... \u..2....X 0010: B2 97 51 9E 4F DB 44 93 02 14 18 33 F1 0E 5C 87 ..Q.O.D....3..\. 0020: EC 00 35 21 8B 6C EE 95 DF E4 CE BF AD 5F ..5!.l......._ ] trigger seeding of SecureRandom done seeding SecureRandom SSLContext Intialiazed.. Inside init Connection opened. before opening input stream 4 Starting Handshake..... %% No cached client session *** ClientHello, TLSv1 RandomCookie: GMT: 1042401731 bytes = { 213, 144, 107, 233, 92, 227, 47, 131, 9 9, 145, 25, 111, 115, 105, 182, 212, 195, 118, 197, 82, 159, 92, 151, 254, 91, 1 37, 113, 164 } Session ID: {} Cipher Suites: [SSL_RSA_WITH_RC4_128_MD5, SSL_RSA_WITH_RC4_128_SHA, SSL_RSA_WITH _3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_DES_CBC_SHA, SSL_DHE_DSS_WITH_DES_CBC_SHA, SSL_RSA_EXPORT_WITH_RC4_40_MD5, SSL_DHE_DSS_EXPORT _WITH_DES40_CBC_SHA] Compression Methods: { 0 } *** main, WRITE: TLSv1 Handshake, length = 59 main, WRITE: SSLv2 client hello message, length = 77 main, READ: TLSv1 Handshake, length = 3230 *** ServerHello, TLSv1 RandomCookie: GMT: 1042401731 bytes = { 59, 55, 224, 63, 240, 196, 31, 18, 81, 217, 200, 174, 60, 8, 185, 238, 9, 107, 83, 210, 67, 29, 126, 101, 245, 230, 138 , 148 } Session ID: {62, 34, 202, 195, 32, 251, 147, 162, 212, 35, 63, 150, 17, 177, 83 , 160, 219, 246, 238, 11, 199, 245, 34, 192, 38, 152, 64, 148, 192, 178, 34, 79} Cipher Suite: SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA Compression Method: 0 *** %% Created: [Session-1, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA] ** SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA *** Certificate chain chain [0] = [ [ Version: V1 Subject: CN=Tomcat, OU=abc, O=xyz, L=Delhi, ST=Delhi, C=IN Signature Algorithm: SHA1withDSA, OID = 1.2.840.10040.4.3 Key: Sun DSA Public Key Parameters:DSA p: fd7f5381 1d751229 52df4a9c 2eece4e7 f611b752 3cef4400 c31e3f80 b6 512669 455d4022 51fb593d 8d58fabf c5f5ba30 f6cb9b55 6cd7813b 801d346f f26660b7 6b9950a5 a49f9fe8 047b1022 c24fbba9 d7feb7c6 1bf83b57 e7c6a8a6 150f04fb 83f6d3c5 1ec30235 54135a16 9132f675 f3ae2b61 d72aeff2 2203199d d14801c7 q: 9760508f 15230bcc b292b982 a2eb840b f0581cf5 g: f7e1a085 d69b3dde cbbcab5c 36b857b9 7994afbb fa3aea82 f9574c0b 3d 078267 5159578e bad4594f e6710710 8180b449 167123e8 4c281613 b7cf0932 8cc8a6e1 3c167a8b 547c8d28 e0a3ae1e 2bb3a675 916ea37f 0bfa2135 62f1fb62 7a01243b cca4f1be a8519089 a883dfe1 5ae59f06 928b665e 807b5525 64014c3b fecf492a y: 2c65dd4e d114a76c b8bfad02 937b3f1f 587aac8d 02b1c2f6 d946830f 73128390 7060d4ec 94520546 dae89a0f 90be0bbd d4660ef5 132473f7 a925f825 a520e699 88e227c1 0019083e a7e1c5a8 e08ac949 d955996e 32c03ab4 ef66d641 3f452f0a e5f8b57b 1c51006b d1c47760 7afb87ad a39e5c41 890d04f8 201edcf9 6236fa25 Validity: [From: Mon Jan 13 19:25:26 IST 2003, To: Sun Apr 13 19:25:26 IST 2003] Issuer: CN=Tomcat, OU=abc, O=xyz, L=Delhi, ST=Delhi, C=IN SerialNumber: [ 3e22c54e] ] Algorithm: [SHA1withDSA] Signature: 0000: 30 2D 02 14 0D 8F FA 63 9F 94 00 C5 C0 4D 78 78 0-.....c.....Mxx 0010: 59 AF 09 31 AC 64 8F 2D 02 15 00 82 0C B5 14 61 Y..1.d.-.......a 0020: 88 A7 1B E0 70 EB 86 24 FE 58 6A 86 58 7D 57 ....p..$.Xj.X.W ] *** stop on trusted cert: [ [ Version: V1 Subject: CN=Tomcat, OU=abc, O=xyz, L=Delhi, ST=Delhi, C=IN Signature Algorithm: SHA1withDSA, OID = 1.2.840.10040.4.3 Key: Sun DSA Public Key Parameters:DSA p: fd7f5381 1d751229 52df4a9c 2eece4e7 f611b752 3cef4400 c31e3f80 b6 512669 455d4022 51fb593d 8d58fabf c5f5ba30 f6cb9b55 6cd7813b 801d346f f26660b7 6b9950a5 a49f9fe8 047b1022 c24fbba9 d7feb7c6 1bf83b57 e7c6a8a6 150f04fb 83f6d3c5 1ec30235 54135a16 9132f675 f3ae2b61 d72aeff2 2203199d d14801c7 q: 9760508f 15230bcc b292b982 a2eb840b f0581cf5 g: f7e1a085 d69b3dde cbbcab5c 36b857b9 7994afbb fa3aea82 f9574c0b 3d 078267 5159578e bad4594f e6710710 8180b449 167123e8 4c281613 b7cf0932 8cc8a6e1 3c167a8b 547c8d28 e0a3ae1e 2bb3a675 916ea37f 0bfa2135 62f1fb62 7a01243b cca4f1be a8519089 a883dfe1 5ae59f06 928b665e 807b5525 64014c3b fecf492a y: 2c65dd4e d114a76c b8bfad02 937b3f1f 587aac8d 02b1c2f6 d946830f 73128390 7060d4ec 94520546 dae89a0f 90be0bbd d4660ef5 132473f7 a925f825 a520e699 88e227c1 0019083e a7e1c5a8 e08ac949 d955996e 32c03ab4 ef66d641 3f452f0a e5f8b57b 1c51006b d1c47760 7afb87ad a39e5c41 890d04f8 201edcf9 6236fa25 Validity: [From: Mon Jan 13 19:25:26 IST 2003, To: Sun Apr 13 19:25:26 IST 2003] Issuer: CN=Tomcat, OU=abc, O=xyz, L=Delhi, ST=Delhi, C=IN SerialNumber: [ 3e22c54e] ] Algorithm: [SHA1withDSA] Signature: 0000: 30 2D 02 14 0D 8F FA 63 9F 94 00 C5 C0 4D 78 78 0-.....c.....Mxx 0010: 59 AF 09 31 AC 64 8F 2D 02 15 00 82 0C B5 14 61 Y..1.d.-.......a 0020: 88 A7 1B E0 70 EB 86 24 FE 58 6A 86 58 7D 57 ....p..$.Xj.X.W ] *** Diffie-Hellman ServerKeyExchange DH Modulus: { 0, 244, 136, 253, 88, 78, 73, 219, 205, 32, 180, 157, 228, 145, 7 , 54, 107, 51, 108, 56, 13, 69, 29, 15, 124, 136, 179, 28, 124, 91, 45, 142, 246 , 243, 201, 35, 192, 67, 240, 165, 91, 24, 141, 142, 187, 85, 140, 184, 93, 56, 211, 52, 253, 124, 23, 87, 67, 163, 29, 24, 108, 222, 51, 33, 44, 181, 42, 255, 60, 225, 177, 41, 64, 24, 17, 141, 124, 132, 167, 10, 114, 214, 134, 196, 3, 25, 200, 7, 41, 122, 202, 149, 12, 217, 150, 159, 171, 208, 10, 80, 155, 2, 70, 211 , 8, 61, 102, 164, 93, 65, 159, 156, 124, 189, 137, 75, 34, 25, 38, 186, 171, 16 2, 94, 195, 85, 233, 47, 120, 199 } DH Base: { 2 } Server DH Public Key: { 65, 223, 4, 217, 137, 234, 253, 136, 126, 37, 187, 195, 163, 82, 71, 52, 67, 129, 35, 171, 132, 218, 8, 18, 58, 163, 60, 41, 105, 219, 103, 192, 117, 137, 150, 151, 224, 185, 106, 123, 244, 207, 55, 171, 164, 139, 1 05, 66, 39, 43, 166, 211, 180, 150, 24, 226, 92, 34, 203, 209, 227, 238, 68, 1, 57, 140, 85, 218, 6, 70, 74, 70, 215, 56, 107, 91, 102, 24, 145, 122, 121, 134, 173, 145, 43, 88, 123, 201, 12, 126, 150, 49, 17, 32, 85, 21, 24, 8, 216, 16, 14 4, 93, 34, 215, 41, 17, 192, 132, 15, 32, 123, 144, 1, 105, 139, 164, 84, 16, 9, 99, 235, 193, 244, 181, 6, 165, 101, 219 } Anonymous *** CertificateRequest Cert Types: RSA, DSS, Cert Authorities: <OU=Class 3 Public Primary Certification Authority, O="VeriSign, Inc.", C=US> <EMAILADDRESS=premium-server@thawte.com, CN=Thawte Premium Server CA, OU=Certifi cation Services Division, O=Thawte Consulting cc, L=Cape Town, ST=Western Cape, C=ZA> <EMAILADDRESS=personal-basic@thawte.com, CN=Thawte Personal Basic CA, OU=Certifi cation Services Division, O=Thawte Consulting, L=Cape Town, ST=Western Cape, C=Z A> <OU=Secure Server Certification Authority, O="RSA Data Security, Inc.", C=US> <OU=Class 4 Public Primary Certification Authority, O="VeriSign, Inc.", C=US> <CN=Baltimore CyberTrust Code Signing Root, OU=CyberTrust, O=Baltimore, C=IE> <OU=Class 1 Public Primary Certification Authority, O="VeriSign, Inc.", C=US> <CN=Baltimore CyberTrust Root, OU=CyberTrust, O=Baltimore, C=IE> <EMAILADDRESS=personal-premium@thawte.com, CN=Thawte Personal Premium CA, OU=Cer tification Services Division, O=Thawte Consulting, L=Cape Town, ST=Western Cape, C=ZA> <EMAILADDRESS=personal-freemail@thawte.com, CN=Thawte Personal Freemail CA, OU=C ertification Services Division, O=Thawte Consulting, L=Cape Town, ST=Western Cap e, C=ZA> <CN=GTE CyberTrust Root 5, OU="GTE CyberTrust Solutions, Inc.", O=GTE Corporatio n, C=US> <CN=GTE CyberTrust Global Root, OU="GTE CyberTrust Solutions, Inc.", O=GTE Corpo ration, C=US> <CN=GTE CyberTrust Root, O=GTE Corporation, C=US> <OU=Class 2 Public Primary Certification Authority, O="VeriSign, Inc.", C=US> <EMAILADDRESS=server-certs@thawte.com, CN=Thawte Server CA, OU=Certification Ser vices Division, O=Thawte Consulting cc, L=Cape Town, ST=Western Cape, C=ZA> *** ServerHelloDone *** Certificate chain *** *** ClientDiffieHellmanPublic DH Public key: { 88, 45, 24, 74, 99, 26, 187, 175, 202, 123, 175, 17, 190, 135, 71, 4, 115, 26, 126, 85, 139, 139, 235, 99, 43, 51, 174, 154, 132, 244, 204, 75 , 72, 152, 114, 146, 151, 175, 237, 97, 255, 38, 168, 181, 12, 177, 143, 77, 188 , 198, 250, 145, 187, 85, 0, 71, 52, 85, 143, 17, 114, 6, 228, 20, 127, 90, 8, 1 70, 225, 173, 164, 175, 142, 122, 234, 100, 74, 138, 198, 160, 9, 38, 137, 246, 204, 161, 127, 5, 184, 213, 119, 189, 35, 110, 219, 41, 210, 208, 239, 207, 15, 196, 247, 143, 217, 49, 225, 181, 198, 222, 157, 207, 44, 197, 205, 184, 176, 32 , 183, 60, 68, 44, 76, 74, 46, 50, 222, 185 } main, WRITE: TLSv1 Handshake, length = 141 SESSION KEYGEN: PreMaster Secret: 0000: CE 87 31 E6 01 04 CA 5F 3C 60 F1 41 1E 00 7E A5 ..1...._<`.A.... 0010: 01 37 84 6B 1C AC D1 AD 02 49 58 3F 36 4F 98 08 .7.k.....IX?6O.. 0020: 69 D6 74 EF DC AF 1D 64 FB BB D8 83 D6 38 C8 CD i.t....d.....8.. 0030: 57 25 C9 36 D0 23 88 4D 90 9E AD C3 A2 A5 DC FE W%.6.#.M........ 0040: 72 D4 77 EA 8A 3D A0 3D BD A2 79 10 2D 13 8C 20 r.w..=.=..y.-.. 0050: E0 01 5A 18 F5 7E 6E 72 44 09 95 8A 31 22 DB 20 ..Z...nrD...1". 0060: B5 6A ED 37 00 C0 A1 63 3D E4 9C 02 CE 40 7C 76 .j.7...c=....@.v 0070: 1D 02 24 5F 55 E1 DF C2 22 FE DF 3E EF C8 37 22 ..$_U..."..>..7" CONNECTION KEYGEN: Client Nonce: 0000: 3E 22 CA C3 D5 90 6B E9 5C E3 2F 83 63 91 19 6F >"....k.\./.c..o 0010: 73 69 B6 D4 C3 76 C5 52 9F 5C 97 FE 5B 89 71 A4 si...v.R.\..[.q. Server Nonce: 0000: 3E 22 CA C3 3B 37 E0 3F F0 C4 1F 12 51 D9 C8 AE >"..;7.?....Q... 0010: 3C 08 B9 EE 09 6B 53 D2 43 1D 7E 65 F5 E6 8A 94 <....kS.C..e.... Master Secret: 0000: 01 45 4D 87 E7 52 A6 C5 0C 44 A2 27 88 C7 2F 35 .EM..R...D.'../5 0010: 27 BD 12 C0 7F 4B 54 66 0E 38 FD 0D C0 B4 50 BB '....KTf.8....P. 0020: 9A 4C FD A2 C6 3D 77 D2 39 E5 65 DB 7D 59 4A 76 .L...=w.9.e..YJv Client MAC write Secret: 0000: 64 B9 79 57 14 BC CB 03 63 36 A5 73 09 F5 70 A5 d.yW....c6.s..p. 0010: B8 A2 D4 E6 .... Server MAC write Secret: 0000: 74 D7 C4 0D 9A B6 EE 8A ED 88 58 F5 F4 26 B6 19 t.........X..&.. 0010: 3B D6 E1 16 ;... Client write key: 0000: EB 12 23 A1 E7 83 16 D6 F8 84 BB 75 93 AB DF 63 ..#........u...c 0010: 76 A1 B8 04 3A CD B6 8A v...:... Server write key: 0000: B7 24 71 3A E0 90 B4 7B FC 09 8F 72 C0 B8 BD 93 .$q:.......r.... 0010: D1 58 91 8C 63 5E 14 DC .X..c^.. Client write IV: 0000: 99 6A 30 6D 00 97 6D F1 .j0m..m. Server write IV: 0000: 02 36 67 69 84 C4 77 B0 .6gi..w. main, WRITE: TLSv1 Change Cipher Spec, length = 1 JsseJCE: Using JSSE internal implementation for cipher DESede/CBC/NoPadding *** Finished verify_data: { 71, 131, 70, 155, 21, 224, 154, 161, 75, 1, 64, 98 } *** main, WRITE: TLSv1 Handshake, length = 40 waiting for close_notify or alert: state 1 Exception while waiting for close java.net.SocketException: Connection reset main, handling exception: java.net.SocketException: Connection reset main, SEND TLSv1 ALERT: fatal, description = unexpected_message main, WRITE: TLSv1 Alert, length = 24 Exception sending alert: java.net.SocketException: Software caused connection ab ort: socket write error main, called closeSocket() Exception caugth java.net.SocketException: Connection reset at java.net.SocketInputStream.read(SocketInputStream.java:168) at com.sun.net.ssl.internal.ssl.InputRecord.a(DashoA6275) at com.sun.net.ssl.internal.ssl.InputRecord.read(DashoA6275) at com.sun.net.ssl.internal.ssl.SSLSocketImpl.a(DashoA6275) at com.sun.net.ssl.internal.ssl.SSLSocketImpl.a(DashoA6275) at com.sun.net.ssl.internal.ssl.HandshakeOutStream.flush(DashoA6275) at com.sun.net.ssl.internal.ssl.SunJSSE_ax.a(DashoA6275) at com.sun.net.ssl.internal.ssl.SunJSSE_az.j(DashoA6275) at com.sun.net.ssl.internal.ssl.SunJSSE_az.a(DashoA6275) at com.sun.net.ssl.internal.ssl.SunJSSE_az.a(DashoA6275) at com.sun.net.ssl.internal.ssl.SunJSSE_ax.a(DashoA6275) at com.sun.net.ssl.internal.ssl.SSLSocketImpl.a(DashoA6275) at com.sun.net.ssl.internal.ssl.SSLSocketImpl.j(DashoA6275) at com.sun.net.ssl.internal.ssl.SSLSocketImpl.startHandshake(DashoA6275) at ClientSSLSocketFactoryImpl.createSocket(ClientSSLSocketFactoryImpl.ja va:79) at sun.net.www.protocol.https.HttpsClient.doConnect(DashoA6275) at sun.net.www.http.HttpClient.openServer(HttpClient.java:386) at sun.net.www.http.HttpClient.openServer(HttpClient.java:602) at sun.net.www.protocol.https.HttpsClient.<init>(DashoA6275) at sun.net.www.protocol.https.HttpsClient.a(DashoA6275) at sun.net.www.protocol.https.HttpsClient.a(DashoA6275) at sun.net.www.protocol.https.HttpsClient.a(DashoA6275) at sun.net.www.protocol.https.AbstractDelegateHttpsURLConnection.plainCo nnect(Das hoA6275) at sun.net.www.protocol.https.AbstractDelegateHttpsURLConnection.connect (DashoA62 75) at sun.net.www.protocol.http.HttpURLConnection.getOutputStream(HttpURLCo nnection. java:528) at sun.net.www.protocol.https.HttpsURLConnectionImpl.getOutputStream(Das hoA6275) at SSLClient.init(SSLClient.java:65) at SSLClient.main(SSLClient.java:116) 4 Starting Handshake..... %% No cached client session *** ClientHello, TLSv1 RandomCookie: GMT: 1042401733 bytes = { 180, 212, 191, 8, 244, 204, 86, 90, 164 , 7, 154, 179, 141, 246, 95, 163, 147, 44, 7, 144, 240, 191, 219, 147, 248, 99, 195, 56 } Session ID: {} Cipher Suites: [SSL_RSA_WITH_RC4_128_MD5, SSL_RSA_WITH_RC4_128_SHA, SSL_RSA_WITH _3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_DES_CBC_SHA, SSL_DHE_DSS_WITH_DES_CBC_SHA, SSL_RSA_EXPORT_WITH_RC4_40_MD5, SSL_DHE_DSS_EXPORT _WITH_DES40_CBC_SHA] Compression Methods: { 0 } *** main, WRITE: TLSv1 Handshake, length = 59 main, WRITE: SSLv2 client hello message, length = 77 main, READ: TLSv1 Handshake, length = 3231 *** ServerHello, TLSv1 RandomCookie: GMT: 1042401733 bytes = { 212, 93, 236, 135, 60, 16, 14, 199, 213 , 81, 196, 172, 195, 50, 21, 117, 111, 227, 17, 32, 60, 107, 34, 222, 213, 191, 163, 229 } Session ID: {62, 34, 202, 197, 80, 75, 2, 131, 55, 224, 42, 16, 54, 160, 141, 2 18, 180, 32, 91, 81, 63, 50, 64, 49, 19, 77, 126, 75, 251, 199, 49, 175} Cipher Suite: SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA Compression Method: 0 *** %% Created: [Session-2, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA] ** SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA *** Certificate chain chain [0] = [ [ Version: V1 Subject: CN=Tomcat, OU=abc, O=xyz, L=Delhi, ST=Delhi, C=IN Signature Algorithm: SHA1withDSA, OID = 1.2.840.10040.4.3 Key: Sun DSA Public Key Parameters:DSA p: fd7f5381 1d751229 52df4a9c 2eece4e7 f611b752 3cef4400 c31e3f80 b6 512669 455d4022 51fb593d 8d58fabf c5f5ba30 f6cb9b55 6cd7813b 801d346f f26660b7 6b9950a5 a49f9fe8 047b1022 c24fbba9 d7feb7c6 1bf83b57 e7c6a8a6 150f04fb 83f6d3c5 1ec30235 54135a16 9132f675 f3ae2b61 d72aeff2 2203199d d14801c7 q: 9760508f 15230bcc b292b982 a2eb840b f0581cf5 g: f7e1a085 d69b3dde cbbcab5c 36b857b9 7994afbb fa3aea82 f9574c0b 3d 078267 5159578e bad4594f e6710710 8180b449 167123e8 4c281613 b7cf0932 8cc8a6e1 3c167a8b 547c8d28 e0a3ae1e 2bb3a675 916ea37f 0bfa2135 62f1fb62 7a01243b cca4f1be a8519089 a883dfe1 5ae59f06 928b665e 807b5525 64014c3b fecf492a y: 2c65dd4e d114a76c b8bfad02 937b3f1f 587aac8d 02b1c2f6 d946830f 73128390 7060d4ec 94520546 dae89a0f 90be0bbd d4660ef5 132473f7 a925f825 a520e699 88e227c1 0019083e a7e1c5a8 e08ac949 d955996e 32c03ab4 ef66d641 3f452f0a e5f8b57b 1c51006b d1c47760 7afb87ad a39e5c41 890d04f8 201edcf9 6236fa25 Validity: [From: Mon Jan 13 19:25:26 IST 2003, To: Sun Apr 13 19:25:26 IST 2003] Issuer: CN=Tomcat, OU=abc, O=xyz, L=Delhi, ST=Delhi, C=IN SerialNumber: [ 3e22c54e] ] Algorithm: [SHA1withDSA] Signature: 0000: 30 2D 02 14 0D 8F FA 63 9F 94 00 C5 C0 4D 78 78 0-.....c.....Mxx 0010: 59 AF 09 31 AC 64 8F 2D 02 15 00 82 0C B5 14 61 Y..1.d.-.......a 0020: 88 A7 1B E0 70 EB 86 24 FE 58 6A 86 58 7D 57 ....p..$.Xj.X.W ] *** stop on trusted cert: [ [ Version: V1 Subject: CN=Tomcat, OU=abc, O=xyz, L=Delhi, ST=Delhi, C=IN Signature Algorithm: SHA1withDSA, OID = 1.2.840.10040.4.3 Key: Sun DSA Public Key Parameters:DSA p: fd7f5381 1d751229 52df4a9c 2eece4e7 f611b752 3cef4400 c31e3f80 b6 512669 455d4022 51fb593d 8d58fabf c5f5ba30 f6cb9b55 6cd7813b 801d346f f26660b7 6b9950a5 a49f9fe8 047b1022 c24fbba9 d7feb7c6 1bf83b57 e7c6a8a6 150f04fb 83f6d3c5 1ec30235 54135a16 9132f675 f3ae2b61 d72aeff2 2203199d d14801c7 q: 9760508f 15230bcc b292b982 a2eb840b f0581cf5 g: f7e1a085 d69b3dde cbbcab5c 36b857b9 7994afbb fa3aea82 f9574c0b 3d 078267 5159578e bad4594f e6710710 8180b449 167123e8 4c281613 b7cf0932 8cc8a6e1 3c167a8b 547c8d28 e0a3ae1e 2bb3a675 916ea37f 0bfa2135 62f1fb62 7a01243b cca4f1be a8519089 a883dfe1 5ae59f06 928b665e 807b5525 64014c3b fecf492a y: 2c65dd4e d114a76c b8bfad02 937b3f1f 587aac8d 02b1c2f6 d946830f 73128390 7060d4ec 94520546 dae89a0f 90be0bbd d4660ef5 132473f7 a925f825 a520e699 88e227c1 0019083e a7e1c5a8 e08ac949 d955996e 32c03ab4 ef66d641 3f452f0a e5f8b57b 1c51006b d1c47760 7afb87ad a39e5c41 890d04f8 201edcf9 6236fa25 Validity: [From: Mon Jan 13 19:25:26 IST 2003, To: Sun Apr 13 19:25:26 IST 2003] Issuer: CN=Tomcat, OU=abc, O=xyz, L=Delhi, ST=Delhi, C=IN SerialNumber: [ 3e22c54e] ] Algorithm: [SHA1withDSA] Signature: 0000: 30 2D 02 14 0D 8F FA 63 9F 94 00 C5 C0 4D 78 78 0-.....c.....Mxx 0010: 59 AF 09 31 AC 64 8F 2D 02 15 00 82 0C B5 14 61 Y..1.d.-.......a 0020: 88 A7 1B E0 70 EB 86 24 FE 58 6A 86 58 7D 57 ....p..$.Xj.X.W ] *** Diffie-Hellman ServerKeyExchange DH Modulus: { 0, 244, 136, 253, 88, 78, 73, 219, 205, 32, 180, 157, 228, 145, 7 , 54, 107, 51, 108, 56, 13, 69, 29, 15, 124, 136, 179, 28, 124, 91, 45, 142, 246 , 243, 201, 35, 192, 67, 240, 165, 91, 24, 141, 142, 187, 85, 140, 184, 93, 56, 211, 52, 253, 124, 23, 87, 67, 163, 29, 24, 108, 222, 51, 33, 44, 181, 42, 255, 60, 225, 177, 41, 64, 24, 17, 141, 124, 132, 167, 10, 114, 214, 134, 196, 3, 25, 200, 7, 41, 122, 202, 149, 12, 217, 150, 159, 171, 208, 10, 80, 155, 2, 70, 211 , 8, 61, 102, 164, 93, 65, 159, 156, 124, 189, 137, 75, 34, 25, 38, 186, 171, 16 2, 94, 195, 85, 233, 47, 120, 199 } DH Base: { 2 } Server DH Public Key: { 12, 26, 211, 182, 127, 253, 173, 199, 162, 213, 156, 16 0, 106, 246, 173, 30, 27, 226, 221, 137, 155, 250, 246, 124, 165, 240, 225, 247, 206, 30, 244, 9, 61, 240, 197, 216, 140, 99, 171, 246, 54, 244, 91, 44, 13, 59, 33, 72, 221, 2, 59, 168, 111, 237, 147, 184, 143, 116, 32, 95, 74, 105, 220, 11 9, 96, 98, 182, 29, 97, 206, 49, 210, 51, 169, 125, 180, 113, 217, 209, 85, 230, 146, 46, 65, 130, 35, 63, 106, 55, 82, 218, 99, 242, 103, 247, 106, 217, 14, 34 , 153, 227, 173, 42, 228, 188, 189, 134, 75, 13, 184, 96, 99, 135, 186, 8, 31, 1 75, 44, 143, 49, 60, 8, 222, 199, 121, 180, 127, 178 } Anonymous *** CertificateRequest Cert Types: RSA, DSS, Cert Authorities: <OU=Class 3 Public Primary Certification Authority, O="VeriSign, Inc.", C=US> <EMAILADDRESS=premium-server@thawte.com, CN=Thawte Premium Server CA, OU=Certifi cation Services Division, O=Thawte Consulting cc, L=Cape Town, ST=Western Cape, C=ZA> <EMAILADDRESS=personal-basic@thawte.com, CN=Thawte Personal Basic CA, OU=Certifi cation Services Division, O=Thawte Consulting, L=Cape Town, ST=Western Cape, C=Z A> <OU=Secure Server Certification Authority, O="RSA Data Security, Inc.", C=US> <OU=Class 4 Public Primary Certification Authority, O="VeriSign, Inc.", C=US> <CN=Baltimore CyberTrust Code Signing Root, OU=CyberTrust, O=Baltimore, C=IE> <OU=Class 1 Public Primary Certification Authority, O="VeriSign, Inc.", C=US> <CN=Baltimore CyberTrust Root, OU=CyberTrust, O=Baltimore, C=IE> <EMAILADDRESS=personal-premium@thawte.com, CN=Thawte Personal Premium CA, OU=Cer tification Services Division, O=Thawte Consulting, L=Cape Town, ST=Western Cape, C=ZA> <EMAILADDRESS=personal-freemail@thawte.com, CN=Thawte Personal Freemail CA, OU=C ertification Services Division, O=Thawte Consulting, L=Cape Town, ST=Western Cap e, C=ZA> <CN=GTE CyberTrust Root 5, OU="GTE CyberTrust Solutions, Inc.", O=GTE Corporatio n, C=US> <CN=GTE CyberTrust Global Root, OU="GTE CyberTrust Solutions, Inc.", O=GTE Corpo ration, C=US> <CN=GTE CyberTrust Root, O=GTE Corporation, C=US> <OU=Class 2 Public Primary Certification Authority, O="VeriSign, Inc.", C=US> <EMAILADDRESS=server-certs@thawte.com, CN=Thawte Server CA, OU=Certification Ser vices Division, O=Thawte Consulting cc, L=Cape Town, ST=Western Cape, C=ZA> *** ServerHelloDone *** Certificate chain *** *** ClientDiffieHellmanPublic DH Public key: { 0, 180, 129, 121, 143, 56, 231, 46, 183, 231, 161, 252, 65, 12 6, 192, 16, 185, 72, 24, 120, 81, 9, 72, 227, 199, 26, 108, 255, 136, 80, 70, 11 8, 224, 83, 175, 145, 255, 169, 19, 59, 228, 104, 218, 145, 210, 138, 212, 26, 6 4, 84, 174, 101, 19, 96, 130, 227, 242, 226, 255, 108, 138, 88, 107, 42, 239, 43 , 69, 87, 31, 228, 172, 49, 246, 17, 71, 136, 120, 4, 59, 69, 164, 96, 14, 119, 106, 243, 89, 80, 112, 144, 131, 198, 151, 53, 162, 116, 166, 89, 137, 128, 10, 128, 17, 191, 201, 171, 216, 132, 64, 174, 148, 54, 182, 215, 191, 231, 54, 47, 85, 161, 113, 243, 59, 106, 156, 80, 189, 223, 195 } main, WRITE: TLSv1 Handshake, length = 142 SESSION KEYGEN: PreMaster Secret: 0000: 6D B2 1F 6F 9C 39 9B 0E 2F 39 9F 18 11 81 A4 5A m..o.9../9.....Z 0010: D4 A6 F2 70 84 DE 80 63 B9 72 F3 BA 60 CA 8A 08 ...p...c.r..`... 0020: 30 35 1B FF 49 55 69 82 B2 6F AA CD 02 44 2B 6B 05..IUi..o...D+k 0030: 54 C9 F0 81 31 2B 92 82 F8 51 07 66 CF 7C BF E0 T...1+...Q.f.... 0040: 40 67 FA B5 5B 5D 94 DA D6 6D FE B0 4D 06 53 E2 @g..[]...m..M.S. 0050: 8A 30 15 18 1A A5 62 9F F5 17 00 07 B1 9E 29 85 .0....b.......). 0060: 33 54 52 B9 5B 78 81 38 B4 68 E2 46 DC C1 AC 03 3TR.[x.8.h.F.... 0070: 3A E1 CA 24 50 8D 3A 07 3F 36 88 97 F0 C5 3E A9 :..$P.:.?6....>. CONNECTION KEYGEN: Client Nonce: 0000: 3E 22 CA C5 B4 D4 BF 08 F4 CC 56 5A A4 07 9A B3 >"........VZ.... 0010: 8D F6 5F A3 93 2C 07 90 F0 BF DB 93 F8 63 C3 38 .._..,.......c.8 Server Nonce: 0000: 3E 22 CA C5 D4 5D EC 87 3C 10 0E C7 D5 51 C4 AC >"...]..<....Q.. 0010: C3 32 15 75 6F E3 11 20 3C 6B 22 DE D5 BF A3 E5 .2.uo.. <k"..... Master Secret: 0000: 3B 84 27 FE 4E A8 A7 2A 1F 9E 33 43 1A 04 30 17 ;.'.N..*..3C..0. 0010: 63 73 CA CF 32 10 36 A8 CF 77 A3 07 FC 44 91 32 cs..2.6..w...D.2 0020: CE C1 D2 C3 4F F0 54 A3 01 3C 7C 7D 68 1E 25 35 ....O.T..<..h.%5 Client MAC write Secret: 0000: 40 50 EE 4D 8B 62 5B C3 44 3C 3E 1B 4C 81 C7 63 @P.M.b[.D<>.L..c 0010: 74 44 18 12 tD.. Server MAC write Secret: 0000: D4 BD E1 D5 62 DC 2D 1C BB 29 39 37 5C EE A3 8B ....b.-..)97\... 0010: 05 87 4C 3E ..L> Client write key: 0000: 45 DF 51 23 EF 36 FF 49 F6 D0 D1 9C 7A 8C C5 FC E.Q#.6.I....z... 0010: 90 A8 A9 31 7D 44 B2 E2 ...1.D.. Server write key: 0000: 10 1E 46 13 1A 0C 65 0B 90 AB 5A 07 CD 03 8E 4B ..F...e...Z....K 0010: CD B5 14 D1 7F F5 F2 66 .......f Client write IV: 0000: 31 4D 32 BA 88 AC 91 D0 1M2..... Server write IV: 0000: 61 9D BD E6 7D 06 AF 19 a....... main, WRITE: TLSv1 Change Cipher Spec, length = 1 JsseJCE: Using JSSE internal implementation for cipher DESede/CBC/NoPadding *** Finished verify_data: { 195, 159, 43, 218, 237, 171, 187, 2, 88, 212, 242, 156 } *** main, WRITE: TLSv1 Handshake, length = 40 waiting for close_notify or alert: state 1 Exception while waiting for close java.net.SocketException: Connection reset main, handling exception: java.net.SocketException: Connection reset main, SEND TLSv1 ALERT: fatal, description = unexpected_message main, WRITE: TLSv1 Alert, length = 24 Exception sending alert: java.net.SocketException: Software caused connection ab ort: socket write error main, called closeSocket() java.net.SocketException: Connection reset at java.net.SocketInputStream.read(SocketInputStream.java:168) at com.sun.net.ssl.internal.ssl.InputRecord.a(DashoA6275) at com.sun.net.ssl.internal.ssl.InputRecord.read(DashoA6275) at com.sun.net.ssl.internal.ssl.SSLSocketImpl.a(DashoA6275) at com.sun.net.ssl.internal.ssl.SSLSocketImpl.a(DashoA6275) at com.sun.net.ssl.internal.ssl.HandshakeOutStream.flush(DashoA6275) at com.sun.net.ssl.internal.ssl.SunJSSE_ax.a(DashoA6275) at com.sun.net.ssl.internal.ssl.SunJSSE_az.j(DashoA6275) at com.sun.net.ssl.internal.ssl.SunJSSE_az.a(DashoA6275) at com.sun.net.ssl.internal.ssl.SunJSSE_az.a(DashoA6275) at com.sun.net.ssl.internal.ssl.SunJSSE_ax.a(DashoA6275) at com.sun.net.ssl.internal.ssl.SSLSocketImpl.a(DashoA6275) at com.sun.net.ssl.internal.ssl.SSLSocketImpl.j(DashoA6275) at com.sun.net.ssl.internal.ssl.SSLSocketImpl.startHandshake(DashoA6275) at ClientSSLSocketFactoryImpl.createSocket(ClientSSLSocketFactoryImpl.ja va:79) at sun.net.www.protocol.https.HttpsClient.doConnect(DashoA6275) at sun.net.www.http.HttpClient.openServer(HttpClient.java:386) at sun.net.www.http.HttpClient.openServer(HttpClient.java:602) at sun.net.www.protocol.https.HttpsClient.<init>(DashoA6275) at sun.net.www.protocol.https.HttpsClient.a(DashoA6275) at sun.net.www.protocol.https.HttpsClient.a(DashoA6275) at sun.net.www.protocol.https.HttpsClient.a(DashoA6275) at sun.net.www.protocol.https.AbstractDelegateHttpsURLConnection.plainCo nnect(Das hoA6275) at sun.net.www.protocol.https.AbstractDelegateHttpsURLConnection.connect (DashoA62 75) at sun.net.www.protocol.http.HttpURLConnection.getInputStream(HttpURLCon nection.j ava:574) at sun.net.www.protocol.https.HttpsURLConnectionImpl.getInputStream(Dash oA6275) at SSLClient.init(SSLClient.java:82) at SSLClient.main(SSLClient.java:116)