The Artima Developer Community
Sponsored Link

Java Answers Forum
unexpected_message error while SSLHandshake

1 reply on 1 page. Most recent reply: Dec 10, 2011 5:30 PM by Aaron Mathias

Welcome Guest
  Sign In

Go back to the topic listing  Back to Topic List Click to reply to this topic  Reply to this Topic Click to search messages in this forum  Search Forum Click for a threaded view of the topic  Threaded View   
Previous Topic   Next Topic
Flat View: This topic has 1 reply on 1 page
Ashish Paliwal

Posts: 1
Nickname: apaliwal
Registered: Jan, 2003

unexpected_message error while SSLHandshake Posted: Jan 13, 2003 7:31 AM
Reply to this message Reply
Advertisement
I am using Tomcat as SSL Server and have written a custom client. While hadnshake it gives unexpected_message exception and quits. the debug information is pasted here. Any help will be appreciated. There is no problem with certificates.

---------------------------------------------------------
URL created
Loading keyStore .....
KeyStore Loaded. Initialiazing KeyFactory....
***
found key for : client
chain [0] = [
[
Version: V1
Subject: CN=client, OU=HPT, O=HSS_1, L=xyz, ST=haryana, C=IN
Signature Algorithm: SHA1withDSA, OID = 1.2.840.10040.4.3

Key: Sun DSA Public Key
Parameters:DSA
p: fd7f5381 1d751229 52df4a9c 2eece4e7 f611b752 3cef4400 c31e3f80 b6
512669
455d4022 51fb593d 8d58fabf c5f5ba30 f6cb9b55 6cd7813b 801d346f f26660b7
6b9950a5 a49f9fe8 047b1022 c24fbba9 d7feb7c6 1bf83b57 e7c6a8a6 150f04fb
83f6d3c5 1ec30235 54135a16 9132f675 f3ae2b61 d72aeff2 2203199d d14801c7
q: 9760508f 15230bcc b292b982 a2eb840b f0581cf5
g: f7e1a085 d69b3dde cbbcab5c 36b857b9 7994afbb fa3aea82 f9574c0b 3d
078267
5159578e bad4594f e6710710 8180b449 167123e8 4c281613 b7cf0932 8cc8a6e1
3c167a8b 547c8d28 e0a3ae1e 2bb3a675 916ea37f 0bfa2135 62f1fb62 7a01243b
cca4f1be a8519089 a883dfe1 5ae59f06 928b665e 807b5525 64014c3b fecf492a

y:
c0e9d602 30ae5aee 788da79e 0a4703a3 1ff1b024 1cd99629 a8073fbd bc7cae83
badff62e 56b4ff39 39d95373 eb3a6a99 a7951139 dbea6779 1e894a9c 1035ae3b
3c6d4a4a f5e25a76 b8abbc58 2d335981 6947b520 a1de762b 5657ef6e c1c4089e
867cc151 f8f8f51a f5262925 90296d51 c2d8d5cc 7ee1dd6a 954bf61b 7de3c1db

Validity: [From: Mon Jan 13 19:24:45 IST 2003,
To: Sun Apr 13 19:24:45 IST 2003]
Issuer: CN=client, OU=abc, O=HSS_1, L=xyz, ST=haryana, C=IN
SerialNumber: [ 3e22c525]

]
Algorithm: [SHA1withDSA]
Signature:
0000: 30 2C 02 14 04 20 5C 75 7E 7E 32 98 1C C4 9E 58 0,... \u..2....X
0010: B2 97 51 9E 4F DB 44 93 02 14 18 33 F1 0E 5C 87 ..Q.O.D....3..\.
0020: EC 00 35 21 8B 6C EE 95 DF E4 CE BF AD 5F ..5!.l......._

]
***
Initia.. context
adding private entry as trusted cert: [
[
Version: V1
Subject: CN=Tomcat, OU=xyz, O=abc, L=Delhi, ST=Delhi, C=IN
Signature Algorithm: SHA1withDSA, OID = 1.2.840.10040.4.3

Key: Sun DSA Public Key
Parameters:DSA
p: fd7f5381 1d751229 52df4a9c 2eece4e7 f611b752 3cef4400 c31e3f80 b6
512669
455d4022 51fb593d 8d58fabf c5f5ba30 f6cb9b55 6cd7813b 801d346f f26660b7
6b9950a5 a49f9fe8 047b1022 c24fbba9 d7feb7c6 1bf83b57 e7c6a8a6 150f04fb
83f6d3c5 1ec30235 54135a16 9132f675 f3ae2b61 d72aeff2 2203199d d14801c7
q: 9760508f 15230bcc b292b982 a2eb840b f0581cf5
g: f7e1a085 d69b3dde cbbcab5c 36b857b9 7994afbb fa3aea82 f9574c0b 3d
078267
5159578e bad4594f e6710710 8180b449 167123e8 4c281613 b7cf0932 8cc8a6e1
3c167a8b 547c8d28 e0a3ae1e 2bb3a675 916ea37f 0bfa2135 62f1fb62 7a01243b
cca4f1be a8519089 a883dfe1 5ae59f06 928b665e 807b5525 64014c3b fecf492a

y:
2c65dd4e d114a76c b8bfad02 937b3f1f 587aac8d 02b1c2f6 d946830f 73128390
7060d4ec 94520546 dae89a0f 90be0bbd d4660ef5 132473f7 a925f825 a520e699
88e227c1 0019083e a7e1c5a8 e08ac949 d955996e 32c03ab4 ef66d641 3f452f0a
e5f8b57b 1c51006b d1c47760 7afb87ad a39e5c41 890d04f8 201edcf9 6236fa25

Validity: [From: Mon Jan 13 19:25:26 IST 2003,
To: Sun Apr 13 19:25:26 IST 2003]
Issuer: CN=Tomcat, OU=abc, O=xyz, L=Delhi, ST=Delhi, C=IN
SerialNumber: [ 3e22c54e]

]
Algorithm: [SHA1withDSA]
Signature:
0000: 30 2D 02 14 0D 8F FA 63 9F 94 00 C5 C0 4D 78 78 0-.....c.....Mxx
0010: 59 AF 09 31 AC 64 8F 2D 02 15 00 82 0C B5 14 61 Y..1.d.-.......a
0020: 88 A7 1B E0 70 EB 86 24 FE 58 6A 86 58 7D 57 ....p..$.Xj.X.W

]
adding as trusted cert: [
[
Version: V1
Subject: CN=client, OU=abc, O=HSS_1, L=xyz, ST=haryana, C=IN
Signature Algorithm: SHA1withDSA, OID = 1.2.840.10040.4.3

Key: Sun DSA Public Key
Parameters:DSA
p: fd7f5381 1d751229 52df4a9c 2eece4e7 f611b752 3cef4400 c31e3f80 b6
512669
455d4022 51fb593d 8d58fabf c5f5ba30 f6cb9b55 6cd7813b 801d346f f26660b7
6b9950a5 a49f9fe8 047b1022 c24fbba9 d7feb7c6 1bf83b57 e7c6a8a6 150f04fb
83f6d3c5 1ec30235 54135a16 9132f675 f3ae2b61 d72aeff2 2203199d d14801c7
q: 9760508f 15230bcc b292b982 a2eb840b f0581cf5
g: f7e1a085 d69b3dde cbbcab5c 36b857b9 7994afbb fa3aea82 f9574c0b 3d
078267
5159578e bad4594f e6710710 8180b449 167123e8 4c281613 b7cf0932 8cc8a6e1
3c167a8b 547c8d28 e0a3ae1e 2bb3a675 916ea37f 0bfa2135 62f1fb62 7a01243b
cca4f1be a8519089 a883dfe1 5ae59f06 928b665e 807b5525 64014c3b fecf492a

y:
c0e9d602 30ae5aee 788da79e 0a4703a3 1ff1b024 1cd99629 a8073fbd bc7cae83
badff62e 56b4ff39 39d95373 eb3a6a99 a7951139 dbea6779 1e894a9c 1035ae3b
3c6d4a4a f5e25a76 b8abbc58 2d335981 6947b520 a1de762b 5657ef6e c1c4089e
867cc151 f8f8f51a f5262925 90296d51 c2d8d5cc 7ee1dd6a 954bf61b 7de3c1db

Validity: [From: Mon Jan 13 19:24:45 IST 2003,
To: Sun Apr 13 19:24:45 IST 2003]
Issuer: CN=client, OU=abc, O=HSS_1, L=xyz, ST=haryana, C=IN
SerialNumber: [ 3e22c525]

]
Algorithm: [SHA1withDSA]
Signature:
0000: 30 2C 02 14 04 20 5C 75 7E 7E 32 98 1C C4 9E 58 0,... \u..2....X
0010: B2 97 51 9E 4F DB 44 93 02 14 18 33 F1 0E 5C 87 ..Q.O.D....3..\.
0020: EC 00 35 21 8B 6C EE 95 DF E4 CE BF AD 5F ..5!.l......._

]
trigger seeding of SecureRandom
done seeding SecureRandom
SSLContext Intialiazed..
Inside init
Connection opened.
before opening input stream
4
Starting Handshake.....
%% No cached client session
*** ClientHello, TLSv1
RandomCookie: GMT: 1042401731 bytes = { 213, 144, 107, 233, 92, 227, 47, 131, 9
9, 145, 25, 111, 115, 105, 182, 212, 195, 118, 197, 82, 159, 92, 151, 254, 91, 1
37, 113, 164 }
Session ID: {}
Cipher Suites: [SSL_RSA_WITH_RC4_128_MD5, SSL_RSA_WITH_RC4_128_SHA, SSL_RSA_WITH
_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_DES_CBC_SHA,
SSL_DHE_DSS_WITH_DES_CBC_SHA, SSL_RSA_EXPORT_WITH_RC4_40_MD5, SSL_DHE_DSS_EXPORT
_WITH_DES40_CBC_SHA]
Compression Methods: { 0 }
***
main, WRITE: TLSv1 Handshake, length = 59
main, WRITE: SSLv2 client hello message, length = 77
main, READ: TLSv1 Handshake, length = 3230
*** ServerHello, TLSv1
RandomCookie: GMT: 1042401731 bytes = { 59, 55, 224, 63, 240, 196, 31, 18, 81,
217, 200, 174, 60, 8, 185, 238, 9, 107, 83, 210, 67, 29, 126, 101, 245, 230, 138
, 148 }
Session ID: {62, 34, 202, 195, 32, 251, 147, 162, 212, 35, 63, 150, 17, 177, 83
, 160, 219, 246, 238, 11, 199, 245, 34, 192, 38, 152, 64, 148, 192, 178, 34, 79}

Cipher Suite: SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA
Compression Method: 0
***
%% Created: [Session-1, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA]
** SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA
*** Certificate chain
chain [0] = [
[
Version: V1
Subject: CN=Tomcat, OU=abc, O=xyz, L=Delhi, ST=Delhi, C=IN
Signature Algorithm: SHA1withDSA, OID = 1.2.840.10040.4.3

Key: Sun DSA Public Key
Parameters:DSA
p: fd7f5381 1d751229 52df4a9c 2eece4e7 f611b752 3cef4400 c31e3f80 b6
512669
455d4022 51fb593d 8d58fabf c5f5ba30 f6cb9b55 6cd7813b 801d346f f26660b7
6b9950a5 a49f9fe8 047b1022 c24fbba9 d7feb7c6 1bf83b57 e7c6a8a6 150f04fb
83f6d3c5 1ec30235 54135a16 9132f675 f3ae2b61 d72aeff2 2203199d d14801c7
q: 9760508f 15230bcc b292b982 a2eb840b f0581cf5
g: f7e1a085 d69b3dde cbbcab5c 36b857b9 7994afbb fa3aea82 f9574c0b 3d
078267
5159578e bad4594f e6710710 8180b449 167123e8 4c281613 b7cf0932 8cc8a6e1
3c167a8b 547c8d28 e0a3ae1e 2bb3a675 916ea37f 0bfa2135 62f1fb62 7a01243b
cca4f1be a8519089 a883dfe1 5ae59f06 928b665e 807b5525 64014c3b fecf492a

y:
2c65dd4e d114a76c b8bfad02 937b3f1f 587aac8d 02b1c2f6 d946830f 73128390
7060d4ec 94520546 dae89a0f 90be0bbd d4660ef5 132473f7 a925f825 a520e699
88e227c1 0019083e a7e1c5a8 e08ac949 d955996e 32c03ab4 ef66d641 3f452f0a
e5f8b57b 1c51006b d1c47760 7afb87ad a39e5c41 890d04f8 201edcf9 6236fa25

Validity: [From: Mon Jan 13 19:25:26 IST 2003,
To: Sun Apr 13 19:25:26 IST 2003]
Issuer: CN=Tomcat, OU=abc, O=xyz, L=Delhi, ST=Delhi, C=IN
SerialNumber: [ 3e22c54e]

]
Algorithm: [SHA1withDSA]
Signature:
0000: 30 2D 02 14 0D 8F FA 63 9F 94 00 C5 C0 4D 78 78 0-.....c.....Mxx
0010: 59 AF 09 31 AC 64 8F 2D 02 15 00 82 0C B5 14 61 Y..1.d.-.......a
0020: 88 A7 1B E0 70 EB 86 24 FE 58 6A 86 58 7D 57 ....p..$.Xj.X.W

]
***
stop on trusted cert: [
[
Version: V1
Subject: CN=Tomcat, OU=abc, O=xyz, L=Delhi, ST=Delhi, C=IN
Signature Algorithm: SHA1withDSA, OID = 1.2.840.10040.4.3

Key: Sun DSA Public Key
Parameters:DSA
p: fd7f5381 1d751229 52df4a9c 2eece4e7 f611b752 3cef4400 c31e3f80 b6
512669
455d4022 51fb593d 8d58fabf c5f5ba30 f6cb9b55 6cd7813b 801d346f f26660b7
6b9950a5 a49f9fe8 047b1022 c24fbba9 d7feb7c6 1bf83b57 e7c6a8a6 150f04fb
83f6d3c5 1ec30235 54135a16 9132f675 f3ae2b61 d72aeff2 2203199d d14801c7
q: 9760508f 15230bcc b292b982 a2eb840b f0581cf5
g: f7e1a085 d69b3dde cbbcab5c 36b857b9 7994afbb fa3aea82 f9574c0b 3d
078267
5159578e bad4594f e6710710 8180b449 167123e8 4c281613 b7cf0932 8cc8a6e1
3c167a8b 547c8d28 e0a3ae1e 2bb3a675 916ea37f 0bfa2135 62f1fb62 7a01243b
cca4f1be a8519089 a883dfe1 5ae59f06 928b665e 807b5525 64014c3b fecf492a

y:
2c65dd4e d114a76c b8bfad02 937b3f1f 587aac8d 02b1c2f6 d946830f 73128390
7060d4ec 94520546 dae89a0f 90be0bbd d4660ef5 132473f7 a925f825 a520e699
88e227c1 0019083e a7e1c5a8 e08ac949 d955996e 32c03ab4 ef66d641 3f452f0a
e5f8b57b 1c51006b d1c47760 7afb87ad a39e5c41 890d04f8 201edcf9 6236fa25

Validity: [From: Mon Jan 13 19:25:26 IST 2003,
To: Sun Apr 13 19:25:26 IST 2003]
Issuer: CN=Tomcat, OU=abc, O=xyz, L=Delhi, ST=Delhi, C=IN
SerialNumber: [ 3e22c54e]

]
Algorithm: [SHA1withDSA]
Signature:
0000: 30 2D 02 14 0D 8F FA 63 9F 94 00 C5 C0 4D 78 78 0-.....c.....Mxx
0010: 59 AF 09 31 AC 64 8F 2D 02 15 00 82 0C B5 14 61 Y..1.d.-.......a
0020: 88 A7 1B E0 70 EB 86 24 FE 58 6A 86 58 7D 57 ....p..$.Xj.X.W

]
*** Diffie-Hellman ServerKeyExchange
DH Modulus: { 0, 244, 136, 253, 88, 78, 73, 219, 205, 32, 180, 157, 228, 145, 7
, 54, 107, 51, 108, 56, 13, 69, 29, 15, 124, 136, 179, 28, 124, 91, 45, 142, 246
, 243, 201, 35, 192, 67, 240, 165, 91, 24, 141, 142, 187, 85, 140, 184, 93, 56,
211, 52, 253, 124, 23, 87, 67, 163, 29, 24, 108, 222, 51, 33, 44, 181, 42, 255,
60, 225, 177, 41, 64, 24, 17, 141, 124, 132, 167, 10, 114, 214, 134, 196, 3, 25,
200, 7, 41, 122, 202, 149, 12, 217, 150, 159, 171, 208, 10, 80, 155, 2, 70, 211
, 8, 61, 102, 164, 93, 65, 159, 156, 124, 189, 137, 75, 34, 25, 38, 186, 171, 16
2, 94, 195, 85, 233, 47, 120, 199 }
DH Base: { 2 }
Server DH Public Key: { 65, 223, 4, 217, 137, 234, 253, 136, 126, 37, 187, 195,
163, 82, 71, 52, 67, 129, 35, 171, 132, 218, 8, 18, 58, 163, 60, 41, 105, 219,
103, 192, 117, 137, 150, 151, 224, 185, 106, 123, 244, 207, 55, 171, 164, 139, 1
05, 66, 39, 43, 166, 211, 180, 150, 24, 226, 92, 34, 203, 209, 227, 238, 68, 1,
57, 140, 85, 218, 6, 70, 74, 70, 215, 56, 107, 91, 102, 24, 145, 122, 121, 134,
173, 145, 43, 88, 123, 201, 12, 126, 150, 49, 17, 32, 85, 21, 24, 8, 216, 16, 14
4, 93, 34, 215, 41, 17, 192, 132, 15, 32, 123, 144, 1, 105, 139, 164, 84, 16, 9,
99, 235, 193, 244, 181, 6, 165, 101, 219 }
Anonymous
*** CertificateRequest
Cert Types: RSA, DSS,
Cert Authorities:
<OU=Class 3 Public Primary Certification Authority, O="VeriSign, Inc.", C=US>
<EMAILADDRESS=premium-server@thawte.com, CN=Thawte Premium Server CA, OU=Certifi
cation Services Division, O=Thawte Consulting cc, L=Cape Town, ST=Western Cape,
C=ZA>
<EMAILADDRESS=personal-basic@thawte.com, CN=Thawte Personal Basic CA, OU=Certifi
cation Services Division, O=Thawte Consulting, L=Cape Town, ST=Western Cape, C=Z
A>
<OU=Secure Server Certification Authority, O="RSA Data Security, Inc.", C=US>
<OU=Class 4 Public Primary Certification Authority, O="VeriSign, Inc.", C=US>
<CN=Baltimore CyberTrust Code Signing Root, OU=CyberTrust, O=Baltimore, C=IE>
<OU=Class 1 Public Primary Certification Authority, O="VeriSign, Inc.", C=US>
<CN=Baltimore CyberTrust Root, OU=CyberTrust, O=Baltimore, C=IE>
<EMAILADDRESS=personal-premium@thawte.com, CN=Thawte Personal Premium CA, OU=Cer
tification Services Division, O=Thawte Consulting, L=Cape Town, ST=Western Cape,
C=ZA>
<EMAILADDRESS=personal-freemail@thawte.com, CN=Thawte Personal Freemail CA, OU=C
ertification Services Division, O=Thawte Consulting, L=Cape Town, ST=Western Cap
e, C=ZA>
<CN=GTE CyberTrust Root 5, OU="GTE CyberTrust Solutions, Inc.", O=GTE Corporatio
n, C=US>
<CN=GTE CyberTrust Global Root, OU="GTE CyberTrust Solutions, Inc.", O=GTE Corpo
ration, C=US>
<CN=GTE CyberTrust Root, O=GTE Corporation, C=US>
<OU=Class 2 Public Primary Certification Authority, O="VeriSign, Inc.", C=US>
<EMAILADDRESS=server-certs@thawte.com, CN=Thawte Server CA, OU=Certification Ser
vices Division, O=Thawte Consulting cc, L=Cape Town, ST=Western Cape, C=ZA>
*** ServerHelloDone
*** Certificate chain
***
*** ClientDiffieHellmanPublic
DH Public key: { 88, 45, 24, 74, 99, 26, 187, 175, 202, 123, 175, 17, 190, 135,
71, 4, 115, 26, 126, 85, 139, 139, 235, 99, 43, 51, 174, 154, 132, 244, 204, 75
, 72, 152, 114, 146, 151, 175, 237, 97, 255, 38, 168, 181, 12, 177, 143, 77, 188
, 198, 250, 145, 187, 85, 0, 71, 52, 85, 143, 17, 114, 6, 228, 20, 127, 90, 8, 1
70, 225, 173, 164, 175, 142, 122, 234, 100, 74, 138, 198, 160, 9, 38, 137, 246,
204, 161, 127, 5, 184, 213, 119, 189, 35, 110, 219, 41, 210, 208, 239, 207, 15,
196, 247, 143, 217, 49, 225, 181, 198, 222, 157, 207, 44, 197, 205, 184, 176, 32
, 183, 60, 68, 44, 76, 74, 46, 50, 222, 185 }
main, WRITE: TLSv1 Handshake, length = 141
SESSION KEYGEN:
PreMaster Secret:
0000: CE 87 31 E6 01 04 CA 5F 3C 60 F1 41 1E 00 7E A5 ..1...._<`.A....
0010: 01 37 84 6B 1C AC D1 AD 02 49 58 3F 36 4F 98 08 .7.k.....IX?6O..
0020: 69 D6 74 EF DC AF 1D 64 FB BB D8 83 D6 38 C8 CD i.t....d.....8..
0030: 57 25 C9 36 D0 23 88 4D 90 9E AD C3 A2 A5 DC FE W%.6.#.M........
0040: 72 D4 77 EA 8A 3D A0 3D BD A2 79 10 2D 13 8C 20 r.w..=.=..y.-..
0050: E0 01 5A 18 F5 7E 6E 72 44 09 95 8A 31 22 DB 20 ..Z...nrD...1".
0060: B5 6A ED 37 00 C0 A1 63 3D E4 9C 02 CE 40 7C 76 .j.7...c=....@.v
0070: 1D 02 24 5F 55 E1 DF C2 22 FE DF 3E EF C8 37 22 ..$_U..."..>..7"
CONNECTION KEYGEN:
Client Nonce:
0000: 3E 22 CA C3 D5 90 6B E9 5C E3 2F 83 63 91 19 6F >"....k.\./.c..o
0010: 73 69 B6 D4 C3 76 C5 52 9F 5C 97 FE 5B 89 71 A4 si...v.R.\..[.q.
Server Nonce:
0000: 3E 22 CA C3 3B 37 E0 3F F0 C4 1F 12 51 D9 C8 AE >"..;7.?....Q...
0010: 3C 08 B9 EE 09 6B 53 D2 43 1D 7E 65 F5 E6 8A 94 <....kS.C..e....
Master Secret:
0000: 01 45 4D 87 E7 52 A6 C5 0C 44 A2 27 88 C7 2F 35 .EM..R...D.'../5
0010: 27 BD 12 C0 7F 4B 54 66 0E 38 FD 0D C0 B4 50 BB '....KTf.8....P.
0020: 9A 4C FD A2 C6 3D 77 D2 39 E5 65 DB 7D 59 4A 76 .L...=w.9.e..YJv
Client MAC write Secret:
0000: 64 B9 79 57 14 BC CB 03 63 36 A5 73 09 F5 70 A5 d.yW....c6.s..p.
0010: B8 A2 D4 E6 ....
Server MAC write Secret:
0000: 74 D7 C4 0D 9A B6 EE 8A ED 88 58 F5 F4 26 B6 19 t.........X..&..
0010: 3B D6 E1 16 ;...
Client write key:
0000: EB 12 23 A1 E7 83 16 D6 F8 84 BB 75 93 AB DF 63 ..#........u...c
0010: 76 A1 B8 04 3A CD B6 8A v...:...
Server write key:
0000: B7 24 71 3A E0 90 B4 7B FC 09 8F 72 C0 B8 BD 93 .$q:.......r....
0010: D1 58 91 8C 63 5E 14 DC .X..c^..
Client write IV:
0000: 99 6A 30 6D 00 97 6D F1 .j0m..m.
Server write IV:
0000: 02 36 67 69 84 C4 77 B0 .6gi..w.
main, WRITE: TLSv1 Change Cipher Spec, length = 1
JsseJCE: Using JSSE internal implementation for cipher DESede/CBC/NoPadding
*** Finished
verify_data: { 71, 131, 70, 155, 21, 224, 154, 161, 75, 1, 64, 98 }
***
main, WRITE: TLSv1 Handshake, length = 40
waiting for close_notify or alert: state 1
Exception while waiting for close java.net.SocketException: Connection reset
main, handling exception: java.net.SocketException: Connection reset
main, SEND TLSv1 ALERT: fatal, description = unexpected_message
main, WRITE: TLSv1 Alert, length = 24
Exception sending alert: java.net.SocketException: Software caused connection ab
ort: socket write error
main, called closeSocket()
Exception caugth
java.net.SocketException: Connection reset
at java.net.SocketInputStream.read(SocketInputStream.java:168)
at com.sun.net.ssl.internal.ssl.InputRecord.a(DashoA6275)
at com.sun.net.ssl.internal.ssl.InputRecord.read(DashoA6275)
at com.sun.net.ssl.internal.ssl.SSLSocketImpl.a(DashoA6275)
at com.sun.net.ssl.internal.ssl.SSLSocketImpl.a(DashoA6275)
at com.sun.net.ssl.internal.ssl.HandshakeOutStream.flush(DashoA6275)
at com.sun.net.ssl.internal.ssl.SunJSSE_ax.a(DashoA6275)
at com.sun.net.ssl.internal.ssl.SunJSSE_az.j(DashoA6275)
at com.sun.net.ssl.internal.ssl.SunJSSE_az.a(DashoA6275)
at com.sun.net.ssl.internal.ssl.SunJSSE_az.a(DashoA6275)
at com.sun.net.ssl.internal.ssl.SunJSSE_ax.a(DashoA6275)
at com.sun.net.ssl.internal.ssl.SSLSocketImpl.a(DashoA6275)
at com.sun.net.ssl.internal.ssl.SSLSocketImpl.j(DashoA6275)
at com.sun.net.ssl.internal.ssl.SSLSocketImpl.startHandshake(DashoA6275)

at ClientSSLSocketFactoryImpl.createSocket(ClientSSLSocketFactoryImpl.ja
va:79)
at sun.net.www.protocol.https.HttpsClient.doConnect(DashoA6275)
at sun.net.www.http.HttpClient.openServer(HttpClient.java:386)
at sun.net.www.http.HttpClient.openServer(HttpClient.java:602)
at sun.net.www.protocol.https.HttpsClient.<init>(DashoA6275)
at sun.net.www.protocol.https.HttpsClient.a(DashoA6275)
at sun.net.www.protocol.https.HttpsClient.a(DashoA6275)
at sun.net.www.protocol.https.HttpsClient.a(DashoA6275)
at sun.net.www.protocol.https.AbstractDelegateHttpsURLConnection.plainCo
nnect(Das hoA6275)
at sun.net.www.protocol.https.AbstractDelegateHttpsURLConnection.connect
(DashoA62 75)
at sun.net.www.protocol.http.HttpURLConnection.getOutputStream(HttpURLCo
nnection. java:528)
at sun.net.www.protocol.https.HttpsURLConnectionImpl.getOutputStream(Das
hoA6275)
at SSLClient.init(SSLClient.java:65)
at SSLClient.main(SSLClient.java:116)
4
Starting Handshake.....
%% No cached client session
*** ClientHello, TLSv1
RandomCookie: GMT: 1042401733 bytes = { 180, 212, 191, 8, 244, 204, 86, 90, 164
, 7, 154, 179, 141, 246, 95, 163, 147, 44, 7, 144, 240, 191, 219, 147, 248, 99,
195, 56 }
Session ID: {}
Cipher Suites: [SSL_RSA_WITH_RC4_128_MD5, SSL_RSA_WITH_RC4_128_SHA, SSL_RSA_WITH
_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_DES_CBC_SHA,
SSL_DHE_DSS_WITH_DES_CBC_SHA, SSL_RSA_EXPORT_WITH_RC4_40_MD5, SSL_DHE_DSS_EXPORT
_WITH_DES40_CBC_SHA]
Compression Methods: { 0 }
***
main, WRITE: TLSv1 Handshake, length = 59
main, WRITE: SSLv2 client hello message, length = 77
main, READ: TLSv1 Handshake, length = 3231
*** ServerHello, TLSv1
RandomCookie: GMT: 1042401733 bytes = { 212, 93, 236, 135, 60, 16, 14, 199, 213
, 81, 196, 172, 195, 50, 21, 117, 111, 227, 17, 32, 60, 107, 34, 222, 213, 191,
163, 229 }
Session ID: {62, 34, 202, 197, 80, 75, 2, 131, 55, 224, 42, 16, 54, 160, 141, 2
18, 180, 32, 91, 81, 63, 50, 64, 49, 19, 77, 126, 75, 251, 199, 49, 175}
Cipher Suite: SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA
Compression Method: 0
***
%% Created: [Session-2, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA]
** SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA
*** Certificate chain
chain [0] = [
[
Version: V1
Subject: CN=Tomcat, OU=abc, O=xyz, L=Delhi, ST=Delhi, C=IN
Signature Algorithm: SHA1withDSA, OID = 1.2.840.10040.4.3

Key: Sun DSA Public Key
Parameters:DSA
p: fd7f5381 1d751229 52df4a9c 2eece4e7 f611b752 3cef4400 c31e3f80 b6
512669
455d4022 51fb593d 8d58fabf c5f5ba30 f6cb9b55 6cd7813b 801d346f f26660b7
6b9950a5 a49f9fe8 047b1022 c24fbba9 d7feb7c6 1bf83b57 e7c6a8a6 150f04fb
83f6d3c5 1ec30235 54135a16 9132f675 f3ae2b61 d72aeff2 2203199d d14801c7
q: 9760508f 15230bcc b292b982 a2eb840b f0581cf5
g: f7e1a085 d69b3dde cbbcab5c 36b857b9 7994afbb fa3aea82 f9574c0b 3d
078267
5159578e bad4594f e6710710 8180b449 167123e8 4c281613 b7cf0932 8cc8a6e1
3c167a8b 547c8d28 e0a3ae1e 2bb3a675 916ea37f 0bfa2135 62f1fb62 7a01243b
cca4f1be a8519089 a883dfe1 5ae59f06 928b665e 807b5525 64014c3b fecf492a

y:
2c65dd4e d114a76c b8bfad02 937b3f1f 587aac8d 02b1c2f6 d946830f 73128390
7060d4ec 94520546 dae89a0f 90be0bbd d4660ef5 132473f7 a925f825 a520e699
88e227c1 0019083e a7e1c5a8 e08ac949 d955996e 32c03ab4 ef66d641 3f452f0a
e5f8b57b 1c51006b d1c47760 7afb87ad a39e5c41 890d04f8 201edcf9 6236fa25

Validity: [From: Mon Jan 13 19:25:26 IST 2003,
To: Sun Apr 13 19:25:26 IST 2003]
Issuer: CN=Tomcat, OU=abc, O=xyz, L=Delhi, ST=Delhi, C=IN
SerialNumber: [ 3e22c54e]

]
Algorithm: [SHA1withDSA]
Signature:
0000: 30 2D 02 14 0D 8F FA 63 9F 94 00 C5 C0 4D 78 78 0-.....c.....Mxx
0010: 59 AF 09 31 AC 64 8F 2D 02 15 00 82 0C B5 14 61 Y..1.d.-.......a
0020: 88 A7 1B E0 70 EB 86 24 FE 58 6A 86 58 7D 57 ....p..$.Xj.X.W

]
***
stop on trusted cert: [
[
Version: V1
Subject: CN=Tomcat, OU=abc, O=xyz, L=Delhi, ST=Delhi, C=IN
Signature Algorithm: SHA1withDSA, OID = 1.2.840.10040.4.3

Key: Sun DSA Public Key
Parameters:DSA
p: fd7f5381 1d751229 52df4a9c 2eece4e7 f611b752 3cef4400 c31e3f80 b6
512669
455d4022 51fb593d 8d58fabf c5f5ba30 f6cb9b55 6cd7813b 801d346f f26660b7
6b9950a5 a49f9fe8 047b1022 c24fbba9 d7feb7c6 1bf83b57 e7c6a8a6 150f04fb
83f6d3c5 1ec30235 54135a16 9132f675 f3ae2b61 d72aeff2 2203199d d14801c7
q: 9760508f 15230bcc b292b982 a2eb840b f0581cf5
g: f7e1a085 d69b3dde cbbcab5c 36b857b9 7994afbb fa3aea82 f9574c0b 3d
078267
5159578e bad4594f e6710710 8180b449 167123e8 4c281613 b7cf0932 8cc8a6e1
3c167a8b 547c8d28 e0a3ae1e 2bb3a675 916ea37f 0bfa2135 62f1fb62 7a01243b
cca4f1be a8519089 a883dfe1 5ae59f06 928b665e 807b5525 64014c3b fecf492a

y:
2c65dd4e d114a76c b8bfad02 937b3f1f 587aac8d 02b1c2f6 d946830f 73128390
7060d4ec 94520546 dae89a0f 90be0bbd d4660ef5 132473f7 a925f825 a520e699
88e227c1 0019083e a7e1c5a8 e08ac949 d955996e 32c03ab4 ef66d641 3f452f0a
e5f8b57b 1c51006b d1c47760 7afb87ad a39e5c41 890d04f8 201edcf9 6236fa25

Validity: [From: Mon Jan 13 19:25:26 IST 2003,
To: Sun Apr 13 19:25:26 IST 2003]
Issuer: CN=Tomcat, OU=abc, O=xyz, L=Delhi, ST=Delhi, C=IN
SerialNumber: [ 3e22c54e]

]
Algorithm: [SHA1withDSA]
Signature:
0000: 30 2D 02 14 0D 8F FA 63 9F 94 00 C5 C0 4D 78 78 0-.....c.....Mxx
0010: 59 AF 09 31 AC 64 8F 2D 02 15 00 82 0C B5 14 61 Y..1.d.-.......a
0020: 88 A7 1B E0 70 EB 86 24 FE 58 6A 86 58 7D 57 ....p..$.Xj.X.W

]
*** Diffie-Hellman ServerKeyExchange
DH Modulus: { 0, 244, 136, 253, 88, 78, 73, 219, 205, 32, 180, 157, 228, 145, 7
, 54, 107, 51, 108, 56, 13, 69, 29, 15, 124, 136, 179, 28, 124, 91, 45, 142, 246
, 243, 201, 35, 192, 67, 240, 165, 91, 24, 141, 142, 187, 85, 140, 184, 93, 56,
211, 52, 253, 124, 23, 87, 67, 163, 29, 24, 108, 222, 51, 33, 44, 181, 42, 255,
60, 225, 177, 41, 64, 24, 17, 141, 124, 132, 167, 10, 114, 214, 134, 196, 3, 25,
200, 7, 41, 122, 202, 149, 12, 217, 150, 159, 171, 208, 10, 80, 155, 2, 70, 211
, 8, 61, 102, 164, 93, 65, 159, 156, 124, 189, 137, 75, 34, 25, 38, 186, 171, 16
2, 94, 195, 85, 233, 47, 120, 199 }
DH Base: { 2 }
Server DH Public Key: { 12, 26, 211, 182, 127, 253, 173, 199, 162, 213, 156, 16
0, 106, 246, 173, 30, 27, 226, 221, 137, 155, 250, 246, 124, 165, 240, 225, 247,
206, 30, 244, 9, 61, 240, 197, 216, 140, 99, 171, 246, 54, 244, 91, 44, 13, 59,
33, 72, 221, 2, 59, 168, 111, 237, 147, 184, 143, 116, 32, 95, 74, 105, 220, 11
9, 96, 98, 182, 29, 97, 206, 49, 210, 51, 169, 125, 180, 113, 217, 209, 85, 230,
146, 46, 65, 130, 35, 63, 106, 55, 82, 218, 99, 242, 103, 247, 106, 217, 14, 34
, 153, 227, 173, 42, 228, 188, 189, 134, 75, 13, 184, 96, 99, 135, 186, 8, 31, 1
75, 44, 143, 49, 60, 8, 222, 199, 121, 180, 127, 178 }
Anonymous
*** CertificateRequest
Cert Types: RSA, DSS,
Cert Authorities:
<OU=Class 3 Public Primary Certification Authority, O="VeriSign, Inc.", C=US>
<EMAILADDRESS=premium-server@thawte.com, CN=Thawte Premium Server CA, OU=Certifi
cation Services Division, O=Thawte Consulting cc, L=Cape Town, ST=Western Cape,
C=ZA>
<EMAILADDRESS=personal-basic@thawte.com, CN=Thawte Personal Basic CA, OU=Certifi
cation Services Division, O=Thawte Consulting, L=Cape Town, ST=Western Cape, C=Z
A>
<OU=Secure Server Certification Authority, O="RSA Data Security, Inc.", C=US>
<OU=Class 4 Public Primary Certification Authority, O="VeriSign, Inc.", C=US>
<CN=Baltimore CyberTrust Code Signing Root, OU=CyberTrust, O=Baltimore, C=IE>
<OU=Class 1 Public Primary Certification Authority, O="VeriSign, Inc.", C=US>
<CN=Baltimore CyberTrust Root, OU=CyberTrust, O=Baltimore, C=IE>
<EMAILADDRESS=personal-premium@thawte.com, CN=Thawte Personal Premium CA, OU=Cer
tification Services Division, O=Thawte Consulting, L=Cape Town, ST=Western Cape,
C=ZA>
<EMAILADDRESS=personal-freemail@thawte.com, CN=Thawte Personal Freemail CA, OU=C
ertification Services Division, O=Thawte Consulting, L=Cape Town, ST=Western Cap
e, C=ZA>
<CN=GTE CyberTrust Root 5, OU="GTE CyberTrust Solutions, Inc.", O=GTE Corporatio
n, C=US>
<CN=GTE CyberTrust Global Root, OU="GTE CyberTrust Solutions, Inc.", O=GTE Corpo
ration, C=US>
<CN=GTE CyberTrust Root, O=GTE Corporation, C=US>
<OU=Class 2 Public Primary Certification Authority, O="VeriSign, Inc.", C=US>
<EMAILADDRESS=server-certs@thawte.com, CN=Thawte Server CA, OU=Certification Ser
vices Division, O=Thawte Consulting cc, L=Cape Town, ST=Western Cape, C=ZA>
*** ServerHelloDone
*** Certificate chain
***
*** ClientDiffieHellmanPublic
DH Public key: { 0, 180, 129, 121, 143, 56, 231, 46, 183, 231, 161, 252, 65, 12
6, 192, 16, 185, 72, 24, 120, 81, 9, 72, 227, 199, 26, 108, 255, 136, 80, 70, 11
8, 224, 83, 175, 145, 255, 169, 19, 59, 228, 104, 218, 145, 210, 138, 212, 26, 6
4, 84, 174, 101, 19, 96, 130, 227, 242, 226, 255, 108, 138, 88, 107, 42, 239, 43
, 69, 87, 31, 228, 172, 49, 246, 17, 71, 136, 120, 4, 59, 69, 164, 96, 14, 119,
106, 243, 89, 80, 112, 144, 131, 198, 151, 53, 162, 116, 166, 89, 137, 128, 10,
128, 17, 191, 201, 171, 216, 132, 64, 174, 148, 54, 182, 215, 191, 231, 54, 47,
85, 161, 113, 243, 59, 106, 156, 80, 189, 223, 195 }
main, WRITE: TLSv1 Handshake, length = 142
SESSION KEYGEN:
PreMaster Secret:
0000: 6D B2 1F 6F 9C 39 9B 0E 2F 39 9F 18 11 81 A4 5A m..o.9../9.....Z
0010: D4 A6 F2 70 84 DE 80 63 B9 72 F3 BA 60 CA 8A 08 ...p...c.r..`...
0020: 30 35 1B FF 49 55 69 82 B2 6F AA CD 02 44 2B 6B 05..IUi..o...D+k
0030: 54 C9 F0 81 31 2B 92 82 F8 51 07 66 CF 7C BF E0 T...1+...Q.f....
0040: 40 67 FA B5 5B 5D 94 DA D6 6D FE B0 4D 06 53 E2 @g..[]...m..M.S.
0050: 8A 30 15 18 1A A5 62 9F F5 17 00 07 B1 9E 29 85 .0....b.......).
0060: 33 54 52 B9 5B 78 81 38 B4 68 E2 46 DC C1 AC 03 3TR.[x.8.h.F....
0070: 3A E1 CA 24 50 8D 3A 07 3F 36 88 97 F0 C5 3E A9 :..$P.:.?6....>.
CONNECTION KEYGEN:
Client Nonce:
0000: 3E 22 CA C5 B4 D4 BF 08 F4 CC 56 5A A4 07 9A B3 >"........VZ....
0010: 8D F6 5F A3 93 2C 07 90 F0 BF DB 93 F8 63 C3 38 .._..,.......c.8
Server Nonce:
0000: 3E 22 CA C5 D4 5D EC 87 3C 10 0E C7 D5 51 C4 AC >"...]..<....Q..
0010: C3 32 15 75 6F E3 11 20 3C 6B 22 DE D5 BF A3 E5 .2.uo.. <k".....
Master Secret:
0000: 3B 84 27 FE 4E A8 A7 2A 1F 9E 33 43 1A 04 30 17 ;.'.N..*..3C..0.
0010: 63 73 CA CF 32 10 36 A8 CF 77 A3 07 FC 44 91 32 cs..2.6..w...D.2
0020: CE C1 D2 C3 4F F0 54 A3 01 3C 7C 7D 68 1E 25 35 ....O.T..<..h.%5
Client MAC write Secret:
0000: 40 50 EE 4D 8B 62 5B C3 44 3C 3E 1B 4C 81 C7 63 @P.M.b[.D<>.L..c
0010: 74 44 18 12 tD..
Server MAC write Secret:
0000: D4 BD E1 D5 62 DC 2D 1C BB 29 39 37 5C EE A3 8B ....b.-..)97\...
0010: 05 87 4C 3E ..L>
Client write key:
0000: 45 DF 51 23 EF 36 FF 49 F6 D0 D1 9C 7A 8C C5 FC E.Q#.6.I....z...
0010: 90 A8 A9 31 7D 44 B2 E2 ...1.D..
Server write key:
0000: 10 1E 46 13 1A 0C 65 0B 90 AB 5A 07 CD 03 8E 4B ..F...e...Z....K
0010: CD B5 14 D1 7F F5 F2 66 .......f
Client write IV:
0000: 31 4D 32 BA 88 AC 91 D0 1M2.....
Server write IV:
0000: 61 9D BD E6 7D 06 AF 19 a.......
main, WRITE: TLSv1 Change Cipher Spec, length = 1
JsseJCE: Using JSSE internal implementation for cipher DESede/CBC/NoPadding
*** Finished
verify_data: { 195, 159, 43, 218, 237, 171, 187, 2, 88, 212, 242, 156 }
***
main, WRITE: TLSv1 Handshake, length = 40
waiting for close_notify or alert: state 1
Exception while waiting for close java.net.SocketException: Connection reset
main, handling exception: java.net.SocketException: Connection reset
main, SEND TLSv1 ALERT: fatal, description = unexpected_message
main, WRITE: TLSv1 Alert, length = 24
Exception sending alert: java.net.SocketException: Software caused connection ab
ort: socket write error
main, called closeSocket()
java.net.SocketException: Connection reset
at java.net.SocketInputStream.read(SocketInputStream.java:168)
at com.sun.net.ssl.internal.ssl.InputRecord.a(DashoA6275)
at com.sun.net.ssl.internal.ssl.InputRecord.read(DashoA6275)
at com.sun.net.ssl.internal.ssl.SSLSocketImpl.a(DashoA6275)
at com.sun.net.ssl.internal.ssl.SSLSocketImpl.a(DashoA6275)
at com.sun.net.ssl.internal.ssl.HandshakeOutStream.flush(DashoA6275)
at com.sun.net.ssl.internal.ssl.SunJSSE_ax.a(DashoA6275)
at com.sun.net.ssl.internal.ssl.SunJSSE_az.j(DashoA6275)
at com.sun.net.ssl.internal.ssl.SunJSSE_az.a(DashoA6275)
at com.sun.net.ssl.internal.ssl.SunJSSE_az.a(DashoA6275)
at com.sun.net.ssl.internal.ssl.SunJSSE_ax.a(DashoA6275)
at com.sun.net.ssl.internal.ssl.SSLSocketImpl.a(DashoA6275)
at com.sun.net.ssl.internal.ssl.SSLSocketImpl.j(DashoA6275)
at com.sun.net.ssl.internal.ssl.SSLSocketImpl.startHandshake(DashoA6275)

at ClientSSLSocketFactoryImpl.createSocket(ClientSSLSocketFactoryImpl.ja
va:79)
at sun.net.www.protocol.https.HttpsClient.doConnect(DashoA6275)
at sun.net.www.http.HttpClient.openServer(HttpClient.java:386)
at sun.net.www.http.HttpClient.openServer(HttpClient.java:602)
at sun.net.www.protocol.https.HttpsClient.<init>(DashoA6275)
at sun.net.www.protocol.https.HttpsClient.a(DashoA6275)
at sun.net.www.protocol.https.HttpsClient.a(DashoA6275)
at sun.net.www.protocol.https.HttpsClient.a(DashoA6275)
at sun.net.www.protocol.https.AbstractDelegateHttpsURLConnection.plainCo
nnect(Das hoA6275)
at sun.net.www.protocol.https.AbstractDelegateHttpsURLConnection.connect
(DashoA62 75)
at sun.net.www.protocol.http.HttpURLConnection.getInputStream(HttpURLCon
nection.j ava:574)
at sun.net.www.protocol.https.HttpsURLConnectionImpl.getInputStream(Dash
oA6275)
at SSLClient.init(SSLClient.java:82)
at SSLClient.main(SSLClient.java:116)


Aaron Mathias

Posts: 1
Nickname: amathias
Registered: Dec, 2011

Re: unexpected_message error while SSLHandshake Posted: Dec 10, 2011 5:30 PM
Reply to this message Reply
This is a really old post, but maybe someone will respond.

I am getting the following error while communicating via an ssl connection:

main, handling exception: java.net.SocketException: Connection reset
main, SEND TLSv1 ALERT: fatal, description = unexpected_message

What did you do to resolve this issue ?

Flat View: This topic has 1 reply on 1 page
Topic: creating web service using jdeveloper Previous Topic   Next Topic Topic: How to make multithreaded chat application

Sponsored Links



Google
  Web Artima.com   

Copyright © 1996-2019 Artima, Inc. All Rights Reserved. - Privacy Policy - Terms of Use