cxf-issues mailing list archives

Site index · List index
Message view « Date » · « Thread »
Top « Date » · « Thread »
From "Lawrence Cheng (JIRA)" <j...@apache.org>
Subject [jira] [Commented] (CXF-6475) problems using CXF as a JAX-RS 2.0 client
Date Thu, 25 Jun 2015 20:03:04 GMT

    [ https://issues.apache.org/jira/browse/CXF-6475?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=14601831#comment-14601831
] 

Lawrence Cheng commented on CXF-6475:
-------------------------------------

I've attached the tcpdump files.  Here is the console output that includes the tcpdump CLI
arguments used:

__CXF (dump to console)__

$ tcpdump dst host "www.quandl.com"
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on enp0s3, link-type EN10MB (Ethernet), capture size 65535 bytes
12:47:45.167784 IP spinous.60790 > ec2-52-1-199-239.compute-1.amazonaws.com.https: Flags
[S], seq 3905591961, win 14600, options [mss 1460,sackOK,TS val 4229289256 ecr 0,nop,wscale
7], length 0
12:47:45.279734 IP spinous.60790 > ec2-52-1-199-239.compute-1.amazonaws.com.https: Flags
[.], ack 3295185106, win 115, options [nop,nop,TS val 4229289368 ecr 44719519], length 0
12:47:45.286654 IP spinous.60790 > ec2-52-1-199-239.compute-1.amazonaws.com.https: Flags
[P.], seq 0:127, ack 1, win 115, options [nop,nop,TS val 4229289375 ecr 44719519], length
127
12:47:45.402984 IP spinous.60790 > ec2-52-1-199-239.compute-1.amazonaws.com.https: Flags
[.], ack 1449, win 137, options [nop,nop,TS val 4229289492 ecr 44719549], length 0
12:47:45.405239 IP spinous.60790 > ec2-52-1-199-239.compute-1.amazonaws.com.https: Flags
[.], ack 2668, win 160, options [nop,nop,TS val 4229289494 ecr 44719549], length 0
12:47:45.540178 IP spinous.60790 > ec2-52-1-199-239.compute-1.amazonaws.com.https: Flags
[P.], seq 127:394, ack 2668, win 160, options [nop,nop,TS val 4229289629 ecr 44719549], length
267
12:47:45.547240 IP spinous.60790 > ec2-52-1-199-239.compute-1.amazonaws.com.https: Flags
[P.], seq 394:400, ack 2668, win 160, options [nop,nop,TS val 4229289636 ecr 44719549], length
6
12:47:45.549551 IP spinous.60790 > ec2-52-1-199-239.compute-1.amazonaws.com.https: Flags
[P.], seq 400:453, ack 2668, win 160, options [nop,nop,TS val 4229289638 ecr 44719549], length
53
12:47:45.662520 IP spinous.60790 > ec2-52-1-199-239.compute-1.amazonaws.com.https: Flags
[.], ack 2727, win 160, options [nop,nop,TS val 4229289751 ecr 44719615], length 0
12:47:45.666696 IP spinous.60790 > ec2-52-1-199-239.compute-1.amazonaws.com.https: Flags
[P.], seq 453:746, ack 2727, win 160, options [nop,nop,TS val 4229289755 ecr 44719615], length
293
12:47:45.824929 IP spinous.60790 > ec2-52-1-199-239.compute-1.amazonaws.com.https: Flags
[.], ack 3244, win 182, options [nop,nop,TS val 4229289914 ecr 44719645], length 0
12:47:45.933192 IP spinous.60790 > ec2-52-1-199-239.compute-1.amazonaws.com.https: Flags
[F.], seq 746, ack 3244, win 182, options [nop,nop,TS val 4229290022 ecr 44719645], length
0
12:47:46.047398 IP spinous.60790 > ec2-52-1-199-239.compute-1.amazonaws.com.https: Flags
[R], seq 3905592709, win 0, length 0
12:47:46.047426 IP spinous.60790 > ec2-52-1-199-239.compute-1.amazonaws.com.https: Flags
[R], seq 3905592709, win 0, length 0
^C
14 packets captured
20 packets received by filter
0 packets dropped by kernel

----

__CXF (dump to file)__

$ tcpdump -w cxf_jaxrs_client.tcpdump dst host "www.quandl.com"
tcpdump: listening on enp0s3, link-type EN10MB (Ethernet), capture size 65535 bytes
^C14 packets captured
17 packets received by filter
0 packets dropped by kernel

----
__Jersey (dump to console)__

$ tcpdump dst host "www.quandl.com"
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on enp0s3, link-type EN10MB (Ethernet), capture size 65535 bytes
12:52:07.507532 IP spinous.32791 > ec2-52-1-199-239.compute-1.amazonaws.com.https: Flags
[S], seq 3552947760, win 14600, options [mss 1460,sackOK,TS val 4229551596 ecr 0,nop,wscale
7], length 0
12:52:07.623126 IP spinous.32791 > ec2-52-1-199-239.compute-1.amazonaws.com.https: Flags
[.], ack 987806290, win 115, options [nop,nop,TS val 4229551712 ecr 44785104], length 0
12:52:07.652185 IP spinous.32791 > ec2-52-1-199-239.compute-1.amazonaws.com.https: Flags
[P.], seq 0:93, ack 1, win 115, options [nop,nop,TS val 4229551741 ecr 44785104], length 93
12:52:07.773365 IP spinous.32791 > ec2-52-1-199-239.compute-1.amazonaws.com.https: Flags
[.], ack 1449, win 137, options [nop,nop,TS val 4229551862 ecr 44785141], length 0
12:52:07.775222 IP spinous.32791 > ec2-52-1-199-239.compute-1.amazonaws.com.https: Flags
[.], ack 2668, win 160, options [nop,nop,TS val 4229551864 ecr 44785141], length 0
12:52:07.978613 IP spinous.32791 > ec2-52-1-199-239.compute-1.amazonaws.com.https: Flags
[P.], seq 93:360, ack 2668, win 160, options [nop,nop,TS val 4229552067 ecr 44785141], length
267
12:52:07.985591 IP spinous.32791 > ec2-52-1-199-239.compute-1.amazonaws.com.https: Flags
[P.], seq 360:366, ack 2668, win 160, options [nop,nop,TS val 4229552074 ecr 44785141], length
6
12:52:07.988105 IP spinous.32791 > ec2-52-1-199-239.compute-1.amazonaws.com.https: Flags
[P.], seq 366:419, ack 2668, win 160, options [nop,nop,TS val 4229552077 ecr 44785141], length
53
12:52:08.106230 IP spinous.32791 > ec2-52-1-199-239.compute-1.amazonaws.com.https: Flags
[.], ack 2727, win 160, options [nop,nop,TS val 4229552195 ecr 44785225], length 0
12:52:08.128838 IP spinous.32791 > ec2-52-1-199-239.compute-1.amazonaws.com.https: Flags
[P.], seq 419:712, ack 2727, win 160, options [nop,nop,TS val 4229552217 ecr 44785225], length
293
12:52:08.255719 IP spinous.32791 > ec2-52-1-199-239.compute-1.amazonaws.com.https: Flags
[P.], seq 712:749, ack 3244, win 182, options [nop,nop,TS val 4229552344 ecr 44785261], length
37
12:52:08.256249 IP spinous.32791 > ec2-52-1-199-239.compute-1.amazonaws.com.https: Flags
[F.], seq 749, ack 3244, win 182, options [nop,nop,TS val 4229552345 ecr 44785261], length
0
12:52:08.260665 IP spinous.57179 > ec2-54-174-102-87.compute-1.amazonaws.com.https: Flags
[S], seq 3410121964, win 14600, options [mss 1460,sackOK,TS val 4229552349 ecr 0,nop,wscale
7], length 0
12:52:08.373618 IP spinous.32791 > ec2-52-1-199-239.compute-1.amazonaws.com.https: Flags
[R], seq 3552948510, win 0, length 0
12:52:08.373736 IP spinous.32791 > ec2-52-1-199-239.compute-1.amazonaws.com.https: Flags
[R], seq 3552948510, win 0, length 0
12:52:08.376117 IP spinous.32791 > ec2-52-1-199-239.compute-1.amazonaws.com.https: Flags
[R], seq 3552948511, win 0, length 0
12:52:08.376361 IP spinous.57179 > ec2-54-174-102-87.compute-1.amazonaws.com.https: Flags
[.], ack 3742463474, win 115, options [nop,nop,TS val 4229552464 ecr 44779334], length 0
12:52:08.381848 IP spinous.57179 > ec2-54-174-102-87.compute-1.amazonaws.com.https: Flags
[P.], seq 0:97, ack 1, win 115, options [nop,nop,TS val 4229552470 ecr 44779334], length 97
12:52:08.504990 IP spinous.57179 > ec2-54-174-102-87.compute-1.amazonaws.com.https: Flags
[.], ack 1449, win 137, options [nop,nop,TS val 4229552594 ecr 44779365], length 0
12:52:08.506185 IP spinous.57179 > ec2-54-174-102-87.compute-1.amazonaws.com.https: Flags
[.], ack 2668, win 160, options [nop,nop,TS val 4229552595 ecr 44779365], length 0
12:52:08.525496 IP spinous.57179 > ec2-54-174-102-87.compute-1.amazonaws.com.https: Flags
[P.], seq 97:364, ack 2668, win 160, options [nop,nop,TS val 4229552614 ecr 44779365], length
267
12:52:08.528807 IP spinous.57179 > ec2-54-174-102-87.compute-1.amazonaws.com.https: Flags
[P.], seq 364:370, ack 2668, win 160, options [nop,nop,TS val 4229552617 ecr 44779365], length
6
12:52:08.529595 IP spinous.57179 > ec2-54-174-102-87.compute-1.amazonaws.com.https: Flags
[P.], seq 370:423, ack 2668, win 160, options [nop,nop,TS val 4229552618 ecr 44779365], length
53
12:52:08.657476 IP spinous.57179 > ec2-54-174-102-87.compute-1.amazonaws.com.https: Flags
[P.], seq 423:716, ack 2727, win 160, options [nop,nop,TS val 4229552746 ecr 44779402], length
293
12:52:08.858940 IP spinous.57179 > ec2-54-174-102-87.compute-1.amazonaws.com.https: Flags
[.], ack 3724, win 182, options [nop,nop,TS val 4229552948 ecr 44779444], length 0
12:52:08.974342 IP spinous.57179 > ec2-54-174-102-87.compute-1.amazonaws.com.https: Flags
[P.], seq 716:753, ack 3724, win 182, options [nop,nop,TS val 4229553063 ecr 44779444], length
37
12:52:08.974374 IP spinous.57179 > ec2-54-174-102-87.compute-1.amazonaws.com.https: Flags
[F.], seq 753, ack 3724, win 182, options [nop,nop,TS val 4229553063 ecr 44779444], length
0
12:52:09.089360 IP spinous.57179 > ec2-54-174-102-87.compute-1.amazonaws.com.https: Flags
[R], seq 3410122718, win 0, length 0
12:52:09.089447 IP spinous.57179 > ec2-54-174-102-87.compute-1.amazonaws.com.https: Flags
[R], seq 3410122718, win 0, length 0
12:52:09.091459 IP spinous.57179 > ec2-54-174-102-87.compute-1.amazonaws.com.https: Flags
[R], seq 3410122719, win 0, length 0
^C
30 packets captured
32 packets received by filter
0 packets dropped by kernel

----

__Jersey (dump to file)__

$ tcpdump -w jersey_jaxrs_client.tcpdump dst host "www.quandl.com"
tcpdump: listening on enp0s3, link-type EN10MB (Ethernet), capture size 65535 bytes
^C28 packets captured
31 packets received by filter
0 packets dropped by kernel


> problems using CXF as a JAX-RS 2.0 client
> -----------------------------------------
>
>                 Key: CXF-6475
>                 URL: https://issues.apache.org/jira/browse/CXF-6475
>             Project: CXF
>          Issue Type: Bug
>          Components: JAX-RS
>    Affects Versions: 3.0.2, 3.0.3, 3.1.1
>         Environment: JDK 7 (jdk1.7.0_51)
>            Reporter: Lawrence Cheng
>         Attachments: cxf_jaxrs_client.tcpdump, jersey_jaxrs_client.tcpdump
>
>
> I'm having problems establishing a secure connection using CXF/JVM defaults.  Hopefully
it's just a simple configuration issue.  Below is the generic JAX-RS 2.0 code, along with
the associated Maven dependency, and the log output demonstrating the problem. Even though
I'm specifying a "https" URL, it seems CXF is making the request via HTTP and thus yielding
a 301 HTTP response code.  I'm running on JDK 7 (jdk1.7.0_51).  I've tried CXF 3.0.2, 3.0.3,
and 3.1.1.  All yield a similar result.  Running the same test with the Jersey 2.x JAX-RS
client yields the correct 200 HTTP response code.
> -----
> import javax.ws.rs.client.Client;
> import javax.ws.rs.client.ClientBuilder;
> import javax.ws.rs.client.Invocation;
> import javax.ws.rs.client.WebTarget;
> import javax.ws.rs.core.Response;
> import org.slf4j.Logger;
> import org.slf4j.LoggerFactory;
> public class TestJaxRsClient
> {
>     
>     private final static Logger logger = LoggerFactory.getLogger(TestJaxRsClient.class);
>     
>     public static void main(String[] args)
>     {
>         try
>         {
>             Client client = ClientBuilder.newBuilder().newClient();
>             
>             WebTarget target = client.target("https://quandl.com/api/v1/datasets/WIKI");
>             target = target.path("AAPL.csv")
>                 .queryParam("trim_start", "2013-02-04")
>                 .queryParam("trim_end", "2013-02-06")
>                 .queryParam("collapse", "daily");
>             
>             logger.info( String.format("target = [%s]", target.toString()) );
>             
>             Invocation.Builder builder = target.request();
>             Response response = builder.get();
>             
>             logger.info( String.format("response status code = [%d]", response.getStatus())
);
>         }
>         catch (Exception e)
>         {
>             e.printStackTrace();
>         }
>     }
> }
> ----
>         <dependency>
>             <groupId>org.apache.cxf</groupId>
>             <artifactId>cxf-rt-frontend-jaxws</artifactId>
>             <version>3.0.2</version>
>         </dependency>
> ----
> 02:20:11.211 [main] DEBUG o.apache.cxf.common.logging.LogUtils - Using org.apache.cxf.common.logging.Slf4jLogger
for logging.
> 02:20:11.242 [main] INFO  c.m.p.cxf.jaxrs.TestJaxRsClient - target = [org.apache.cxf.jaxrs.client.spec.ClientImpl$WebTargetImpl@33319df3]
> 02:20:11.461 [main] DEBUG o.a.c.jaxrs.provider.ProviderFactory - Problem with creating
the default provider org.apache.cxf.jaxrs.provider.json.JSONProvider: org.apache.cxf.jaxrs.provider.json.JSONProvider
> 02:20:11.469 [main] DEBUG o.a.c.j.model.AbstractResourceInfo - Injecting a custom context
org.apache.cxf.jaxrs.ext.MessageContext, ContextProvider is required for this type
> 02:20:11.476 [main] DEBUG o.a.c.j.model.AbstractResourceInfo - Injecting a custom context
org.apache.cxf.jaxrs.ext.MessageContext, ContextProvider is required for this type
> 02:20:11.480 [main] DEBUG o.a.c.j.model.AbstractResourceInfo - Injecting a custom context
org.apache.cxf.jaxrs.ext.MessageContext, ContextProvider is required for this type
> 02:20:11.481 [main] DEBUG o.a.c.j.model.AbstractResourceInfo - Injecting a custom context
org.apache.cxf.jaxrs.ext.MessageContext, ContextProvider is required for this type
> 02:20:11.512 [main] DEBUG o.a.cxf.phase.PhaseInterceptorChain - Adding interceptor org.apache.cxf.ws.policy.PolicyOutInterceptor@55fcde1f
to phase setup
> 02:20:11.513 [main] DEBUG o.a.cxf.phase.PhaseInterceptorChain - Adding interceptor org.apache.cxf.interceptor.MessageSenderInterceptor@4c5af153
to phase prepare-send
> 02:20:11.513 [main] DEBUG o.a.cxf.phase.PhaseInterceptorChain - Adding interceptor org.apache.cxf.interceptor.MessageSenderInterceptor@4c5af153
to phase prepare-send
> 02:20:11.514 [main] DEBUG o.a.cxf.phase.PhaseInterceptorChain - Adding interceptor org.apache.cxf.jaxrs.client.spec.ClientRequestFilterInterceptor@5411cd7
to phase pre-logical
> 02:20:11.530 [main] DEBUG o.a.cxf.transport.http.HTTPConduit - Conduit '{https://quandl.com/api/v1/datasets/WIKI/AAPL.csv}WebClient.http-conduit'
has been (re)configured for plain http.
> 02:20:11.531 [main] DEBUG o.a.cxf.transport.http.HTTPConduit - No Trust Decider configured
for Conduit '{https://quandl.com/api/v1/datasets/WIKI/AAPL.csv}WebClient.http-conduit'
> 02:20:11.531 [main] DEBUG o.a.cxf.transport.http.HTTPConduit - No Auth Supplier configured
for Conduit '{https://quandl.com/api/v1/datasets/WIKI/AAPL.csv}WebClient.http-conduit'
> 02:20:11.531 [main] DEBUG o.a.cxf.transport.http.HTTPConduit - Conduit '{https://quandl.com/api/v1/datasets/WIKI/AAPL.csv}WebClient.http-conduit'
has been configured for plain http.
> 02:20:11.531 [main] DEBUG o.a.cxf.transport.http.HTTPConduit - registering incoming observer:
org.apache.cxf.jaxrs.client.ClientMessageObserver@77f7b377
> 02:20:11.532 [main] DEBUG o.a.cxf.phase.PhaseInterceptorChain - Chain org.apache.cxf.phase.PhaseInterceptorChain@7b6626e3
was created. Current flow:
>   setup [PolicyOutInterceptor]
>   pre-logical [ClientRequestFilterInterceptor]
>   prepare-send [MessageSenderInterceptor]
> 02:20:11.532 [main] DEBUG o.a.cxf.phase.PhaseInterceptorChain - Invoking handleMessage
on interceptor org.apache.cxf.ws.policy.PolicyOutInterceptor@55fcde1f
> 02:20:11.532 [main] DEBUG o.a.c.ws.policy.PolicyOutInterceptor - No binding operation
info.
> 02:20:11.532 [main] DEBUG o.a.cxf.phase.PhaseInterceptorChain - Invoking handleMessage
on interceptor org.apache.cxf.jaxrs.client.spec.ClientRequestFilterInterceptor@5411cd7
> 02:20:11.532 [main] DEBUG o.a.cxf.phase.PhaseInterceptorChain - Invoking handleMessage
on interceptor org.apache.cxf.interceptor.MessageSenderInterceptor@4c5af153
> 02:20:11.605 [main] DEBUG o.a.c.t.h.HttpsURLConnectionFactory - The location of the key
store has not been set via a system parameter or through configuration so the default value
of C:\Users\LBC/.keystore will be used.
> 02:20:11.605 [main] DEBUG o.a.c.t.h.HttpsURLConnectionFactory - The key store password
has not been set via a system property or through configuration, reading data from the keystore
will fail.
> 02:20:11.605 [main] DEBUG o.a.c.t.h.HttpsURLConnectionFactory - The key password has
not been set via a system property or through configuration, reading data from the keystore
will fail.
> 02:20:11.605 [main] WARN  o.a.c.t.h.HttpsURLConnectionFactory - Default key managers
cannot be initialized: C:\Users\LBC\.keystore (The system cannot find the file specified)
> 02:20:11.715 [main] DEBUG o.a.c.t.h.HttpsURLConnectionFactory - The cipher suites have
not been configured, falling back to cipher suite filters.
> 02:20:11.715 [main] DEBUG o.a.c.t.h.HttpsURLConnectionFactory - The cipher suite filters
have not been configured, falling back to default filters.
> 02:20:11.716 [main] DEBUG o.a.c.t.h.HttpsURLConnectionFactory - Ciphersuite include filter:
.*
> 02:20:11.716 [main] DEBUG o.a.c.t.h.HttpsURLConnectionFactory - Ciphersuite include filter:
.*_NULL_.*
> 02:20:11.716 [main] DEBUG o.a.c.t.h.HttpsURLConnectionFactory - Ciphersuite include filter:
.*_anon_.*
> 02:20:11.716 [main] DEBUG o.a.c.t.h.HttpsURLConnectionFactory - The TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256
cipher suite is included by the filter.
> 02:20:11.716 [main] DEBUG o.a.c.t.h.HttpsURLConnectionFactory - The TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
cipher suite is included by the filter.
> 02:20:11.716 [main] DEBUG o.a.c.t.h.HttpsURLConnectionFactory - The TLS_RSA_WITH_AES_128_CBC_SHA256
cipher suite is included by the filter.
> 02:20:11.716 [main] DEBUG o.a.c.t.h.HttpsURLConnectionFactory - The TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256
cipher suite is included by the filter.
> 02:20:11.717 [main] DEBUG o.a.c.t.h.HttpsURLConnectionFactory - The TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256
cipher suite is included by the filter.
> 02:20:11.717 [main] DEBUG o.a.c.t.h.HttpsURLConnectionFactory - The TLS_DHE_RSA_WITH_AES_128_CBC_SHA256
cipher suite is included by the filter.
> 02:20:11.717 [main] DEBUG o.a.c.t.h.HttpsURLConnectionFactory - The TLS_DHE_DSS_WITH_AES_128_CBC_SHA256
cipher suite is included by the filter.
> 02:20:11.717 [main] DEBUG o.a.c.t.h.HttpsURLConnectionFactory - The TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
cipher suite is included by the filter.
> 02:20:11.717 [main] DEBUG o.a.c.t.h.HttpsURLConnectionFactory - The TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
cipher suite is included by the filter.
> 02:20:11.717 [main] DEBUG o.a.c.t.h.HttpsURLConnectionFactory - The TLS_RSA_WITH_AES_128_CBC_SHA
cipher suite is included by the filter.
> 02:20:11.717 [main] DEBUG o.a.c.t.h.HttpsURLConnectionFactory - The TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA
cipher suite is included by the filter.
> 02:20:11.717 [main] DEBUG o.a.c.t.h.HttpsURLConnectionFactory - The TLS_ECDH_RSA_WITH_AES_128_CBC_SHA
cipher suite is included by the filter.
> 02:20:11.718 [main] DEBUG o.a.c.t.h.HttpsURLConnectionFactory - The TLS_DHE_RSA_WITH_AES_128_CBC_SHA
cipher suite is included by the filter.
> 02:20:11.718 [main] DEBUG o.a.c.t.h.HttpsURLConnectionFactory - The TLS_DHE_DSS_WITH_AES_128_CBC_SHA
cipher suite is included by the filter.
> 02:20:11.718 [main] DEBUG o.a.c.t.h.HttpsURLConnectionFactory - The TLS_ECDHE_ECDSA_WITH_RC4_128_SHA
cipher suite is included by the filter.
> 02:20:11.718 [main] DEBUG o.a.c.t.h.HttpsURLConnectionFactory - The TLS_ECDHE_RSA_WITH_RC4_128_SHA
cipher suite is included by the filter.
> 02:20:11.718 [main] DEBUG o.a.c.t.h.HttpsURLConnectionFactory - The SSL_RSA_WITH_RC4_128_SHA
cipher suite is included by the filter.
> 02:20:11.718 [main] DEBUG o.a.c.t.h.HttpsURLConnectionFactory - The TLS_ECDH_ECDSA_WITH_RC4_128_SHA
cipher suite is included by the filter.
> 02:20:11.718 [main] DEBUG o.a.c.t.h.HttpsURLConnectionFactory - The TLS_ECDH_RSA_WITH_RC4_128_SHA
cipher suite is included by the filter.
> 02:20:11.718 [main] DEBUG o.a.c.t.h.HttpsURLConnectionFactory - The TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA
cipher suite is included by the filter.
> 02:20:11.719 [main] DEBUG o.a.c.t.h.HttpsURLConnectionFactory - The TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA
cipher suite is included by the filter.
> 02:20:11.719 [main] DEBUG o.a.c.t.h.HttpsURLConnectionFactory - The SSL_RSA_WITH_3DES_EDE_CBC_SHA
cipher suite is included by the filter.
> 02:20:11.719 [main] DEBUG o.a.c.t.h.HttpsURLConnectionFactory - The TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA
cipher suite is included by the filter.
> 02:20:11.719 [main] DEBUG o.a.c.t.h.HttpsURLConnectionFactory - The TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA
cipher suite is included by the filter.
> 02:20:11.719 [main] DEBUG o.a.c.t.h.HttpsURLConnectionFactory - The SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA
cipher suite is included by the filter.
> 02:20:11.719 [main] DEBUG o.a.c.t.h.HttpsURLConnectionFactory - The SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA
cipher suite is included by the filter.
> 02:20:11.719 [main] DEBUG o.a.c.t.h.HttpsURLConnectionFactory - The SSL_RSA_WITH_RC4_128_MD5
cipher suite is included by the filter.
> 02:20:11.719 [main] DEBUG o.a.c.t.h.HttpsURLConnectionFactory - The TLS_EMPTY_RENEGOTIATION_INFO_SCSV
cipher suite is included by the filter.
> 02:20:11.720 [main] DEBUG o.a.c.t.h.HttpsURLConnectionFactory - The TLS_DH_anon_WITH_AES_128_CBC_SHA256
cipher suite is excluded by the filter.
> 02:20:11.720 [main] DEBUG o.a.c.t.h.HttpsURLConnectionFactory - The TLS_ECDH_anon_WITH_AES_128_CBC_SHA
cipher suite is excluded by the filter.
> 02:20:11.720 [main] DEBUG o.a.c.t.h.HttpsURLConnectionFactory - The TLS_DH_anon_WITH_AES_128_CBC_SHA
cipher suite is excluded by the filter.
> 02:20:11.720 [main] DEBUG o.a.c.t.h.HttpsURLConnectionFactory - The TLS_ECDH_anon_WITH_RC4_128_SHA
cipher suite is excluded by the filter.
> 02:20:11.720 [main] DEBUG o.a.c.t.h.HttpsURLConnectionFactory - The SSL_DH_anon_WITH_RC4_128_MD5
cipher suite is excluded by the filter.
> 02:20:11.720 [main] DEBUG o.a.c.t.h.HttpsURLConnectionFactory - The TLS_ECDH_anon_WITH_3DES_EDE_CBC_SHA
cipher suite is excluded by the filter.
> 02:20:11.720 [main] DEBUG o.a.c.t.h.HttpsURLConnectionFactory - The SSL_DH_anon_WITH_3DES_EDE_CBC_SHA
cipher suite is excluded by the filter.
> 02:20:11.721 [main] DEBUG o.a.c.t.h.HttpsURLConnectionFactory - The TLS_RSA_WITH_NULL_SHA256
cipher suite is excluded by the filter.
> 02:20:11.721 [main] DEBUG o.a.c.t.h.HttpsURLConnectionFactory - The TLS_ECDHE_ECDSA_WITH_NULL_SHA
cipher suite is excluded by the filter.
> 02:20:11.721 [main] DEBUG o.a.c.t.h.HttpsURLConnectionFactory - The TLS_ECDHE_RSA_WITH_NULL_SHA
cipher suite is excluded by the filter.
> 02:20:11.721 [main] DEBUG o.a.c.t.h.HttpsURLConnectionFactory - The SSL_RSA_WITH_NULL_SHA
cipher suite is excluded by the filter.
> 02:20:11.721 [main] DEBUG o.a.c.t.h.HttpsURLConnectionFactory - The TLS_ECDH_ECDSA_WITH_NULL_SHA
cipher suite is excluded by the filter.
> 02:20:11.721 [main] DEBUG o.a.c.t.h.HttpsURLConnectionFactory - The TLS_ECDH_RSA_WITH_NULL_SHA
cipher suite is excluded by the filter.
> 02:20:11.721 [main] DEBUG o.a.c.t.h.HttpsURLConnectionFactory - The TLS_ECDH_anon_WITH_NULL_SHA
cipher suite is excluded by the filter.
> 02:20:11.722 [main] DEBUG o.a.c.t.h.HttpsURLConnectionFactory - The SSL_RSA_WITH_NULL_MD5
cipher suite is excluded by the filter.
> 02:20:11.722 [main] DEBUG o.a.c.t.h.HttpsURLConnectionFactory - The SSL_RSA_WITH_DES_CBC_SHA
cipher suite is included by the filter.
> 02:20:11.722 [main] DEBUG o.a.c.t.h.HttpsURLConnectionFactory - The SSL_DHE_RSA_WITH_DES_CBC_SHA
cipher suite is included by the filter.
> 02:20:11.722 [main] DEBUG o.a.c.t.h.HttpsURLConnectionFactory - The SSL_DHE_DSS_WITH_DES_CBC_SHA
cipher suite is included by the filter.
> 02:20:11.722 [main] DEBUG o.a.c.t.h.HttpsURLConnectionFactory - The SSL_DH_anon_WITH_DES_CBC_SHA
cipher suite is excluded by the filter.
> 02:20:11.722 [main] DEBUG o.a.c.t.h.HttpsURLConnectionFactory - The SSL_RSA_EXPORT_WITH_RC4_40_MD5
cipher suite is included by the filter.
> 02:20:11.722 [main] DEBUG o.a.c.t.h.HttpsURLConnectionFactory - The SSL_DH_anon_EXPORT_WITH_RC4_40_MD5
cipher suite is excluded by the filter.
> 02:20:11.722 [main] DEBUG o.a.c.t.h.HttpsURLConnectionFactory - The SSL_RSA_EXPORT_WITH_DES40_CBC_SHA
cipher suite is included by the filter.
> 02:20:11.723 [main] DEBUG o.a.c.t.h.HttpsURLConnectionFactory - The SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA
cipher suite is included by the filter.
> 02:20:11.723 [main] DEBUG o.a.c.t.h.HttpsURLConnectionFactory - The SSL_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA
cipher suite is included by the filter.
> 02:20:11.723 [main] DEBUG o.a.c.t.h.HttpsURLConnectionFactory - The SSL_DH_anon_EXPORT_WITH_DES40_CBC_SHA
cipher suite is excluded by the filter.
> 02:20:11.723 [main] DEBUG o.a.c.t.h.HttpsURLConnectionFactory - The TLS_KRB5_WITH_RC4_128_SHA
cipher suite is included by the filter.
> 02:20:11.723 [main] DEBUG o.a.c.t.h.HttpsURLConnectionFactory - The TLS_KRB5_WITH_RC4_128_MD5
cipher suite is included by the filter.
> 02:20:11.723 [main] DEBUG o.a.c.t.h.HttpsURLConnectionFactory - The TLS_KRB5_WITH_3DES_EDE_CBC_SHA
cipher suite is included by the filter.
> 02:20:11.723 [main] DEBUG o.a.c.t.h.HttpsURLConnectionFactory - The TLS_KRB5_WITH_3DES_EDE_CBC_MD5
cipher suite is included by the filter.
> 02:20:11.724 [main] DEBUG o.a.c.t.h.HttpsURLConnectionFactory - The TLS_KRB5_WITH_DES_CBC_SHA
cipher suite is included by the filter.
> 02:20:11.724 [main] DEBUG o.a.c.t.h.HttpsURLConnectionFactory - The TLS_KRB5_WITH_DES_CBC_MD5
cipher suite is included by the filter.
> 02:20:11.724 [main] DEBUG o.a.c.t.h.HttpsURLConnectionFactory - The TLS_KRB5_EXPORT_WITH_RC4_40_SHA
cipher suite is included by the filter.
> 02:20:11.724 [main] DEBUG o.a.c.t.h.HttpsURLConnectionFactory - The TLS_KRB5_EXPORT_WITH_RC4_40_MD5
cipher suite is included by the filter.
> 02:20:11.724 [main] DEBUG o.a.c.t.h.HttpsURLConnectionFactory - The TLS_KRB5_EXPORT_WITH_DES_CBC_40_SHA
cipher suite is included by the filter.
> 02:20:11.724 [main] DEBUG o.a.c.t.h.HttpsURLConnectionFactory - The TLS_KRB5_EXPORT_WITH_DES_CBC_40_MD5
cipher suite is included by the filter.
> 02:20:11.724 [main] DEBUG o.a.c.t.h.HttpsURLConnectionFactory - The enabled cipher suites
have been filtered down to [TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256,
TLS_RSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256,
TLS_DHE_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_DSS_WITH_AES_128_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA,
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA,
TLS_ECDH_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA,
TLS_ECDHE_ECDSA_WITH_RC4_128_SHA, TLS_ECDHE_RSA_WITH_RC4_128_SHA, SSL_RSA_WITH_RC4_128_SHA,
TLS_ECDH_ECDSA_WITH_RC4_128_SHA, TLS_ECDH_RSA_WITH_RC4_128_SHA, TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA,
TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA,
TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA,
SSL_RSA_WITH_RC4_128_MD5, TLS_EMPTY_RENEGOTIATION_INFO_SCSV, SSL_RSA_WITH_DES_CBC_SHA, SSL_DHE_RSA_WITH_DES_CBC_SHA,
SSL_DHE_DSS_WITH_DES_CBC_SHA, SSL_RSA_EXPORT_WITH_RC4_40_MD5, SSL_RSA_EXPORT_WITH_DES40_CBC_SHA,
SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA, SSL_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA, TLS_KRB5_WITH_RC4_128_SHA,
TLS_KRB5_WITH_RC4_128_MD5, TLS_KRB5_WITH_3DES_EDE_CBC_SHA, TLS_KRB5_WITH_3DES_EDE_CBC_MD5,
TLS_KRB5_WITH_DES_CBC_SHA, TLS_KRB5_WITH_DES_CBC_MD5, TLS_KRB5_EXPORT_WITH_RC4_40_SHA, TLS_KRB5_EXPORT_WITH_RC4_40_MD5,
TLS_KRB5_EXPORT_WITH_DES_CBC_40_SHA, TLS_KRB5_EXPORT_WITH_DES_CBC_40_MD5].
> 02:20:11.724 [main] DEBUG o.a.c.t.h.HttpsURLConnectionFactory - The excluded cipher suites
have been filtered down to [TLS_DH_anon_WITH_AES_128_CBC_SHA256, TLS_ECDH_anon_WITH_AES_128_CBC_SHA,
TLS_DH_anon_WITH_AES_128_CBC_SHA, TLS_ECDH_anon_WITH_RC4_128_SHA, SSL_DH_anon_WITH_RC4_128_MD5,
TLS_ECDH_anon_WITH_3DES_EDE_CBC_SHA, SSL_DH_anon_WITH_3DES_EDE_CBC_SHA, TLS_RSA_WITH_NULL_SHA256,
TLS_ECDHE_ECDSA_WITH_NULL_SHA, TLS_ECDHE_RSA_WITH_NULL_SHA, SSL_RSA_WITH_NULL_SHA, TLS_ECDH_ECDSA_WITH_NULL_SHA,
TLS_ECDH_RSA_WITH_NULL_SHA, TLS_ECDH_anon_WITH_NULL_SHA, SSL_RSA_WITH_NULL_MD5, SSL_DH_anon_WITH_DES_CBC_SHA,
SSL_DH_anon_EXPORT_WITH_RC4_40_MD5, SSL_DH_anon_EXPORT_WITH_DES40_CBC_SHA].  
> 02:20:11.725 [main] DEBUG o.a.c.t.h.HttpsURLConnectionFactory - The cipher suites have
been set to TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256,
TLS_RSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256,
TLS_DHE_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_DSS_WITH_AES_128_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA,
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA,
TLS_ECDH_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA,
TLS_ECDHE_ECDSA_WITH_RC4_128_SHA, TLS_ECDHE_RSA_WITH_RC4_128_SHA, SSL_RSA_WITH_RC4_128_SHA,
TLS_ECDH_ECDSA_WITH_RC4_128_SHA, TLS_ECDH_RSA_WITH_RC4_128_SHA, TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA,
TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA,
TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA,
SSL_RSA_WITH_RC4_128_MD5, TLS_EMPTY_RENEGOTIATION_INFO_SCSV, SSL_RSA_WITH_DES_CBC_SHA, SSL_DHE_RSA_WITH_DES_CBC_SHA,
SSL_DHE_DSS_WITH_DES_CBC_SHA, SSL_RSA_EXPORT_WITH_RC4_40_MD5, SSL_RSA_EXPORT_WITH_DES40_CBC_SHA,
SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA, SSL_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA, TLS_KRB5_WITH_RC4_128_SHA,
TLS_KRB5_WITH_RC4_128_MD5, TLS_KRB5_WITH_3DES_EDE_CBC_SHA, TLS_KRB5_WITH_3DES_EDE_CBC_MD5,
TLS_KRB5_WITH_DES_CBC_SHA, TLS_KRB5_WITH_DES_CBC_MD5, TLS_KRB5_EXPORT_WITH_RC4_40_SHA, TLS_KRB5_EXPORT_WITH_RC4_40_MD5,
TLS_KRB5_EXPORT_WITH_DES_CBC_40_SHA, TLS_KRB5_EXPORT_WITH_DES_CBC_40_MD5.  
> 02:20:11.734 [main] DEBUG o.a.cxf.phase.PhaseInterceptorChain - Adding interceptor org.apache.cxf.interceptor.MessageSenderInterceptor$MessageSenderEndingInterceptor@5c07481f
to phase prepare-send-ending
> 02:20:11.734 [main] DEBUG o.a.cxf.phase.PhaseInterceptorChain - Chain org.apache.cxf.phase.PhaseInterceptorChain@7b6626e3
was modified. Current flow:
>   setup [PolicyOutInterceptor]
>   pre-logical [ClientRequestFilterInterceptor]
>   prepare-send [MessageSenderInterceptor]
>   prepare-send-ending [MessageSenderEndingInterceptor]
> 02:20:11.735 [main] DEBUG o.a.cxf.phase.PhaseInterceptorChain - Invoking handleMessage
on interceptor org.apache.cxf.interceptor.MessageSenderInterceptor$MessageSenderEndingInterceptor@5c07481f
> 02:20:11.736 [main] DEBUG o.apache.cxf.transport.http.Headers - Accept: */*
> 02:20:11.736 [main] DEBUG o.a.cxf.transport.http.HTTPConduit - No Trust Decider for Conduit
'{https://quandl.com/api/v1/datasets/WIKI/AAPL.csv}WebClient.http-conduit'. An afirmative
Trust Decision is assumed.
> 02:20:12.382 [main] DEBUG o.a.cxf.phase.PhaseInterceptorChain - Adding interceptor org.apache.cxf.ws.policy.PolicyInInterceptor@7e79a857
to phase receive
> 02:20:12.382 [main] DEBUG o.a.cxf.phase.PhaseInterceptorChain - Adding interceptor org.apache.cxf.jaxrs.client.WebClient$ClientAsyncResponseInterceptor@651b289f
to phase unmarshal
> 02:20:12.384 [main] DEBUG o.a.cxf.phase.PhaseInterceptorChain - Adding interceptor org.apache.cxf.jaxrs.client.spec.ClientResponseFilterInterceptor@c91d4b5
to phase pre-protocol-frontend
> 02:20:12.385 [main] DEBUG o.a.cxf.phase.PhaseInterceptorChain - Chain org.apache.cxf.phase.PhaseInterceptorChain@3a23bd85
was created. Current flow:
>   receive [PolicyInInterceptor]
>   pre-protocol-frontend [ClientResponseFilterInterceptor]
>   unmarshal [ClientAsyncResponseInterceptor]
> 02:20:12.386 [main] DEBUG o.a.cxf.phase.PhaseInterceptorChain - Invoking handleMessage
on interceptor org.apache.cxf.ws.policy.PolicyInInterceptor@7e79a857
> 02:20:12.404 [main] DEBUG o.a.cxf.phase.PhaseInterceptorChain - Invoking handleMessage
on interceptor org.apache.cxf.jaxrs.client.spec.ClientResponseFilterInterceptor@c91d4b5
> 02:20:12.404 [main] DEBUG o.a.cxf.phase.PhaseInterceptorChain - Invoking handleMessage
on interceptor org.apache.cxf.jaxrs.client.WebClient$ClientAsyncResponseInterceptor@651b289f
> 02:20:12.408 [main] INFO  c.m.p.cxf.jaxrs.TestJaxRsClient - response status code = [301]



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)

Mime
View raw message