hc-httpclient-users mailing list archives

Site index · List index
Message view « Date » · « Thread »
Top « Date » · « Thread »
From "Villemos, Gert" <gert.ville...@logica.com>
Subject Problem connecting to a site with an invalid (expired) security certificate
Date Wed, 11 Mar 2009 09:00:09 GMT
I'm using the HTTPclient to connect to a site with two levels of
security;

 

1. First a basic authentication.

2. Then a form login (see HTML below) ... leading to a https site.

 

I think I'm performing the authentication and submission of the login
form correctly (see source code below), but get an exception
'javax.net.ssl.SSLHandshakeException:
sun.security.validator.ValidatorException: PKIX path building failed:
sun.security.provider.certpath.SunCertPathBuilderException: unable to
find valid certification path to requested target' (see details below)
when reading the Login URL https site.

 

I have read and followed the (excellent) tutorial on how to trouble
shoot and have enabled the wire logging to see the details. Didnt get
that much smarter though...

 

I have also turned on the '-Djavax.net.debug=ssl,handshake' to see the
certification details (see details below).

 

I have tried to login to the site manually using IE. The authentication
and login form works, but I get a certification error. Looking at the
details in the browser I can see that the reason is that the certificate
has expired in February this year. The details of the certificate are;
Version=V1, SerialNumber=02, SegnatureAlgorithm=md5RSA,
ValidFrom=Wednesday, 20. February 2008 2008 11:55:58, ValidTo=Thursday
19. February 2009 11:55:58, PublicKey=RSA (1024 Bits),
ThumbprintAlgorithm=sha1. This seems to match the exception.

 

I have tried to set the Java.security.provider as described in
http://hc.apache.org/httpclient-3.x/authentication.html#Known_limitation
s_and_problems (see source code example below) but this didnt solve any
problem.

 

My questions;

1. Am I doing anything wrong or is this purely due to the certification
error?

2. If its the certification error; Can I in any way programatically
handle the certification error, i.e. basically ignore it?

3. If not; Can I configure my way out of the problem?

 

I'm no security expert, so g easy on me on the answers... cheers.

 

 

 

 

 

--- HTML Form -----------------------------------

 

    <form method="post"
action="https://www.elog.esa.int/loginsession.php?loggingIn=true">
        <table width="100%" border="0" cellspacing="0" cellpadding="10">
          <tr>
            <td width="20%" align="left" valign="top"><b><font
face="Arial, Helvetica, sans-serif" size="2">Username:</font></b></td>
            <td width="80%" align="left" valign="top"> <font
face="Arial, Helvetica, sans-serif" size="2">
              <input type="text" name="userid" size="8" maxlength="8">
              </font></td>
          </tr>
          <tr>
            <td width="20%" align="left" valign="top"><b><font
face="Arial, Helvetica, sans-serif" size="2">Password:</font></b></td>
            <td width="80%" align="left" valign="top"> <font
face="Arial, Helvetica, sans-serif" size="2">
              <input type="password" name="userpassword" size="30"
maxlength="100">
              </font></td>
          </tr>
          <tr>
            <td width="20%" align="left" valign="top"><b><font
face="Arial, Helvetica, sans-serif" size="2">Database:</font></b></td>
            <td width="80%" align="left" valign="top"> <font
face="Arial, Helvetica, sans-serif" size="2">
              <select name="requesteddb">
                           <option value="0-6">Database1</option>
                           <option value="0-9">Database2</option>
                           </select>
              </font></td>
          </tr>
        </table>
         <p>
    <input type="submit" name="Submit" value="Login">
    <input type="reset" name="Reset" value="Reset">
  </p>
  </form>

 

 

 

 

--- Source Code ----------------------------------

 

public void openConnection2() {

HttpClient client = new HttpClient();

client.getParams().setCookiePolicy(CookiePolicy.BROWSER_COMPATIBILITY);

String secProviderName = "com.sun.crypto.provider.SunJCE";

java.security.Provider secProvider;

try {

secProvider =
(java.security.Provider)Class.forName(secProviderName).newInstance();

Security.addProvider(secProvider);

} catch (InstantiationException e1) {

// TODO Auto-generated catch block

e1.printStackTrace();

} catch (IllegalAccessException e1) {

// TODO Auto-generated catch block

e1.printStackTrace();

} catch (ClassNotFoundException e1) {

// TODO Auto-generated catch block

e1.printStackTrace();

}

client.getState().setCredentials( 

new AuthScope(elogUrl, 80, AuthScope.ANY_REALM),

new UsernamePasswordCredentials(userName, userPassword)

);

GetMethod get = new GetMethod(elogProtocol + "://" + elogUrl);

get.setDoAuthentication( true ); 

 

try {

int status = client.executeMethod( get );

CookieSpec cookiespec = CookiePolicy.getDefaultSpec();

Cookie[] initcookies = cookiespec.match(elogUrl, elogPort, "/", false,
client.getState().getCookies());

System.out.println("Initial set of cookies:"); 

if (initcookies.length == 0) {

System.out.println("None"); 

} else {

for (int i = 0; i < initcookies.length; i++) {

System.out.println("- " + initcookies[i].toString()); 

}

}

System.out.println("Login form post: " +
get.getStatusLine().toString());

get.releaseConnection();

Logger.info("Submitting Login form...");

PostMethod authpost = new
PostMethod("https://www.elog.esa.int/loginsession.php?loggingIn=true");

NameValuePair action = new NameValuePair("action", "Login"); 

NameValuePair url = new NameValuePair("url",
"https://elog.esa.int/loginsession.php?loggingIn=true");

NameValuePair userid = new NameValuePair("userid", elogFormUser);

NameValuePair password = new NameValuePair("userpassword",
elogFormPassword);

NameValuePair database = new NameValuePair("requesteddb",
elogFormDatabase);

authpost.setRequestBody(new NameValuePair[] {action, url, userid,
password, database});

authpost.setDoAuthentication( true );

client.executeMethod(authpost);

System.out.println("Login form post: " +
authpost.getStatusLine().toString()); 

System.out.println(status + "\n" + authpost.getResponseBodyAsString());

authpost.releaseConnection();

} catch (HttpException e) {

// TODO Auto-generated catch block

e.printStackTrace();

} catch (IOException e) {

// TODO Auto-generated catch block

e.printStackTrace();

} finally {

// release any connection resources used by the method

get.releaseConnection();

}

}

 

 

--- Stack Trace
------------------------------------------------------------------------
--------------------------------

 

[Mrz 11 01:20:06] DEBUG (HttpClient.java:72) - Java version: 1.5.0_15

Failed to register with notifier. Log message has not been forwarded.
This warning will be displayed only ones, so please take notice!

[Mrz 11 01:20:09] DEBUG (HttpClient.java:73) - Java vendor: Sun
Microsystems Inc.

[Mrz 11 01:20:10] DEBUG (HttpClient.java:74) - Java class path:
C:\Documents and
Settings\KrygervillemosG.GROUPINFRA\EEIS\ElogWebCrawler\target\test-clas
ses;C:\Documents and
Settings\KrygervillemosG.GROUPINFRA\EEIS\ElogWebCrawler\target\classes;C
:\Documents and
Settings\KrygervillemosG.GROUPINFRA\Desktop\Technologies\Eclipse5\eclips
e\plugins\org.junit_3.8.2.v20080602-1318\junit.jar;C:\Documents and
Settings\KrygervillemosG.GROUPINFRA\EEIS\commons\target\classes;C:\Docum
ents and
Settings\KrygervillemosG.GROUPINFRA\.m2\repository\log4j\log4j\1.2.14\lo
g4j-1.2.14.jar;C:\Documents and
Settings\KrygervillemosG.GROUPINFRA\.m2\repository\commons-httpclient\co
mmons-httpclient\3.1\commons-httpclient-3.1.jar;C:\Documents and
Settings\KrygervillemosG.GROUPINFRA\.m2\repository\commons-logging\commo
ns-logging\1.0.4\commons-logging-1.0.4.jar;C:\Documents and
Settings\KrygervillemosG.GROUPINFRA\.m2\repository\commons-codec\commons
-codec\1.2\commons-codec-1.2.jar;/C:/Documents and
Settings/KrygervillemosG.GROUPINFRA/Desktop/Technologies/Eclipse5/eclips
e/configuration/org.eclipse.osgi/bundles/166/1/.cp/;/C:/Documents and
Settings/KrygervillemosG.GROUPINFRA/Desktop/Technologies/Eclipse5/eclips
e/configuration/org.eclipse.osgi/bundles/167/1/.cp/

[Mrz 11 01:20:11] DEBUG (HttpClient.java:75) - Operating system name:
Windows XP

[Mrz 11 01:20:12] DEBUG (HttpClient.java:76) - Operating system
architecture: x86

[Mrz 11 01:20:13] DEBUG (HttpClient.java:77) - Operating system version:
5.1

[Mrz 11 01:20:14] DEBUG (HttpClient.java:82) - SUN 1.5: SUN (DSA
key/parameter generation; DSA signing; SHA-1, MD5 digests; SecureRandom;
X.509 certificates; JKS keystore; PKIX CertPathValidator; PKIX
CertPathBuilder; LDAP, Collection CertStores)

[Mrz 11 01:20:15] DEBUG (HttpClient.java:82) - SunRsaSign 1.5: Sun RSA
signature provider

[Mrz 11 01:20:16] DEBUG (HttpClient.java:82) - SunJSSE 1.5: Sun JSSE
provider(PKCS12, SunX509 key/trust factories, SSLv3, TLSv1)

[Mrz 11 01:20:17] DEBUG (HttpClient.java:82) - SunJCE 1.5: SunJCE
Provider (implements RSA, DES, Triple DES, AES, Blowfish, ARCFOUR, RC2,
PBE, Diffie-Hellman, HMAC)

[Mrz 11 01:20:18] DEBUG (HttpClient.java:82) - SunJGSS 1.0: Sun
(Kerberos v5)

[Mrz 11 01:20:19] DEBUG (HttpClient.java:82) - SunSASL 1.5: Sun SASL
provider(implements client mechanisms for: DIGEST-MD5, GSSAPI, EXTERNAL,
PLAIN, CRAM-MD5; server mechanisms for: DIGEST-MD5, GSSAPI, CRAM-MD5)

[Mrz 11 01:20:20] DEBUG (DefaultHttpParams.java:151) - Set parameter
http.useragent = Jakarta Commons-HttpClient/3.1

[Mrz 11 01:20:21] DEBUG (DefaultHttpParams.java:151) - Set parameter
http.protocol.version = HTTP/1.1

[Mrz 11 01:20:22] DEBUG (DefaultHttpParams.java:151) - Set parameter
http.connection-manager.class = class
org.apache.commons.httpclient.SimpleHttpConnectionManager

[Mrz 11 01:20:23] DEBUG (DefaultHttpParams.java:151) - Set parameter
http.protocol.cookie-policy = default

[Mrz 11 01:20:24] DEBUG (DefaultHttpParams.java:151) - Set parameter
http.protocol.element-charset = US-ASCII

[Mrz 11 01:20:25] DEBUG (DefaultHttpParams.java:151) - Set parameter
http.protocol.content-charset = ISO-8859-1

[Mrz 11 01:20:26] DEBUG (DefaultHttpParams.java:151) - Set parameter
http.method.retry-handler =
org.apache.commons.httpclient.DefaultHttpMethodRetryHandler@1e1a408

[Mrz 11 01:20:27] DEBUG (DefaultHttpParams.java:151) - Set parameter
http.dateparser.patterns = [EEE, dd MMM yyyy HH:mm:ss zzz, EEEE,
dd-MMM-yy HH:mm:ss zzz, EEE MMM d HH:mm:ss yyyy, EEE, dd-MMM-yyyy
HH:mm:ss z, EEE, dd-MMM-yyyy HH-mm-ss z, EEE, dd MMM yy HH:mm:ss z, EEE
dd-MMM-yyyy HH:mm:ss z, EEE dd MMM yyyy HH:mm:ss z, EEE dd-MMM-yyyy
HH-mm-ss z, EEE dd-MMM-yy HH:mm:ss z, EEE dd MMM yy HH:mm:ss z,
EEE,dd-MMM-yy HH:mm:ss z, EEE,dd-MMM-yyyy HH:mm:ss z, EEE, dd-MM-yyyy
HH:mm:ss z]

[Mrz 11 01:20:28] DEBUG (DefaultHttpParams.java:151) - Set parameter
http.protocol.cookie-policy = compatibility

[Mrz 11 01:20:29] DEBUG (HttpState.java:359) - enter
HttpState.setCredentials(AuthScope, Credentials)

[Mrz 11 01:20:30] DEBUG (GetMethod.java:90) - enter GetMethod(String)

[Mrz 11 01:20:31] DEBUG (HttpClient.java:321) - enter
HttpClient.executeMethod(HttpMethod)

[Mrz 11 01:20:32] DEBUG (HttpClient.java:374) - enter
HttpClient.executeMethod(HostConfiguration,HttpMethod,HttpState)

[Mrz 11 01:20:33] DEBUG (HttpMethodDirector.java:379) - Attempt number 1
to process request

[Mrz 11 01:20:34] DEBUG (HttpConnection.java:685) - enter
HttpConnection.open()

[Mrz 11 01:20:35] DEBUG (HttpConnection.java:692) - Open connection to
www.elog.esa.int:80

[Mrz 11 01:20:37] DEBUG (HttpMethodBase.java:1079) - enter
HttpMethodBase.execute(HttpState, HttpConnection)

[Mrz 11 01:20:37] DEBUG (HttpMethodBase.java:2057) - enter
HttpMethodBase.writeRequest(HttpState, HttpConnection)

[Mrz 11 01:20:38] DEBUG (HttpMethodBase.java:2212) - enter
HttpMethodBase.writeRequestLine(HttpState, HttpConnection)

[Mrz 11 01:20:39] DEBUG (HttpMethodBase.java:1496) - enter
HttpMethodBase.generateRequestLine(HttpConnection, String, String,
String, String)

[Mrz 11 01:20:40] DEBUG (Wire.java:70) - >> "GET / HTTP/1.1[\r][\n]"

[Mrz 11 01:20:41] DEBUG (HttpConnection.java:1032) - enter
HttpConnection.print(String)

[Mrz 11 01:20:42] DEBUG (HttpConnection.java:942) - enter
HttpConnection.write(byte[])

[Mrz 11 01:20:43] DEBUG (HttpConnection.java:963) - enter
HttpConnection.write(byte[], int, int)

[Mrz 11 01:20:45] DEBUG (HttpMethodBase.java:2175) - enter
HttpMethodBase.writeRequestHeaders(HttpState,HttpConnection)

[Mrz 11 01:20:46] DEBUG (HttpMethodBase.java:1417) - enter
HttpMethodBase.addRequestHeaders(HttpState, HttpConnection)

[Mrz 11 01:20:47] DEBUG (HttpMethodBase.java:1442) - enter
HttpMethodBase.addUserAgentRequestHeaders(HttpState, HttpConnection)

[Mrz 11 01:20:48] DEBUG (HttpMethodBase.java:1328) - enter
HttpMethodBase.addHostRequestHeader(HttpState, HttpConnection)

[Mrz 11 01:20:49] DEBUG (HttpMethodBase.java:1352) - Adding Host request
header

[Mrz 11 01:20:50] DEBUG (HttpMethodBase.java:1266) - enter
HttpMethodBase.addCookieRequestHeader(HttpState, HttpConnection)

[Mrz 11 01:20:51] DEBUG (HttpState.java:173) - enter
HttpState.getCookies()

[Mrz 11 01:20:52] DEBUG (CookieSpecBase.java:549) - enter
CookieSpecBase.match(String, int, String, boolean, Cookie[])

[Mrz 11 01:20:53] DEBUG (HttpMethodBase.java:1379) - enter
HttpMethodBase.addProxyConnectionHeader(HttpState, HttpConnection)

[Mrz 11 01:20:54] DEBUG (Wire.java:70) - >> "User-Agent: Jakarta
Commons-HttpClient/3.1[\r][\n]"

[Mrz 11 01:20:55] DEBUG (HttpConnection.java:1032) - enter
HttpConnection.print(String)

[Mrz 11 01:20:56] DEBUG (HttpConnection.java:942) - enter
HttpConnection.write(byte[])

[Mrz 11 01:20:57] DEBUG (HttpConnection.java:963) - enter
HttpConnection.write(byte[], int, int)

[Mrz 11 01:20:58] DEBUG (Wire.java:70) - >> "Host:
www.elog.esa.int[\r][\n]"

[Mrz 11 01:20:59] DEBUG (HttpConnection.java:1032) - enter
HttpConnection.print(String)

[Mrz 11 01:21:01] DEBUG (HttpConnection.java:942) - enter
HttpConnection.write(byte[])

[Mrz 11 01:21:02] DEBUG (HttpConnection.java:963) - enter
HttpConnection.write(byte[], int, int)

[Mrz 11 01:21:03] DEBUG (HttpConnection.java:1001) - enter
HttpConnection.writeLine()

[Mrz 11 01:21:04] DEBUG (HttpConnection.java:942) - enter
HttpConnection.write(byte[])

[Mrz 11 01:21:05] DEBUG (HttpConnection.java:963) - enter
HttpConnection.write(byte[], int, int)

[Mrz 11 01:21:06] DEBUG (Wire.java:70) - >> "[\r][\n]"

[Mrz 11 01:21:07] DEBUG (HttpConnection.java:826) - enter
HttpConnection.flushRequestOutputStream()

[Mrz 11 01:21:08] DEBUG (HttpMethodBase.java:1730) - enter
HttpMethodBase.readResponse(HttpState, HttpConnection)

[Mrz 11 01:21:09] DEBUG (HttpMethodBase.java:1964) - enter
HttpMethodBase.readStatusLine(HttpState, HttpConnection)

[Mrz 11 01:21:10] DEBUG (HttpConnection.java:1113) - enter
HttpConnection.readLine()

[Mrz 11 01:21:11] DEBUG (HttpParser.java:105) - enter
HttpParser.readLine(InputStream, String)

[Mrz 11 01:21:12] DEBUG (HttpParser.java:74) - enter
HttpParser.readRawLine()

[Mrz 11 01:21:13] DEBUG (Wire.java:70) - << "HTTP/1.1 401 Authorization
Required[\r][\n]"

[Mrz 11 01:21:14] DEBUG (Wire.java:70) - << "HTTP/1.1 401 Authorization
Required[\r][\n]"

[Mrz 11 01:21:15] DEBUG (HttpMethodBase.java:1930) - enter
HttpMethodBase.readResponseHeaders(HttpState,HttpConnection)

[Mrz 11 01:21:16] DEBUG (HttpConnection.java:857) - enter
HttpConnection.getResponseInputStream()

[Mrz 11 01:21:17] DEBUG (HttpParser.java:170) - enter
HeaderParser.parseHeaders(InputStream, String)

[Mrz 11 01:21:18] DEBUG (HttpParser.java:105) - enter
HttpParser.readLine(InputStream, String)

[Mrz 11 01:21:19] DEBUG (HttpParser.java:74) - enter
HttpParser.readRawLine()

[Mrz 11 01:21:20] DEBUG (Wire.java:70) - << "Date: Wed, 11 Mar 2009
00:21:07 GMT[\r][\n]"

[Mrz 11 01:21:21] DEBUG (HttpParser.java:105) - enter
HttpParser.readLine(InputStream, String)

[Mrz 11 01:21:22] DEBUG (HttpParser.java:74) - enter
HttpParser.readRawLine()

[Mrz 11 01:21:23] DEBUG (Wire.java:70) - << "Server: Apache/1.3.19
(Unix) mod_ssl/2.8.3 OpenSSL/0.9.6a PHP/4.2.1[\r][\n]"

[Mrz 11 01:21:24] DEBUG (HttpParser.java:105) - enter
HttpParser.readLine(InputStream, String)

[Mrz 11 01:21:25] DEBUG (HttpParser.java:74) - enter
HttpParser.readRawLine()

[Mrz 11 01:21:26] DEBUG (Wire.java:70) - << "WWW-Authenticate: Basic
realm="Authorization Required"[\r][\n]"

[Mrz 11 01:21:27] DEBUG (HttpParser.java:105) - enter
HttpParser.readLine(InputStream, String)

[Mrz 11 01:21:28] DEBUG (HttpParser.java:74) - enter
HttpParser.readRawLine()

[Mrz 11 01:21:29] DEBUG (Wire.java:70) - << "Transfer-Encoding:
chunked[\r][\n]"

[Mrz 11 01:21:30] DEBUG (HttpParser.java:105) - enter
HttpParser.readLine(InputStream, String)

[Mrz 11 01:21:31] DEBUG (HttpParser.java:74) - enter
HttpParser.readRawLine()

[Mrz 11 01:21:32] DEBUG (Wire.java:70) - << "Content-Type: text/html;
charset=iso-8859-1[\r][\n]"

[Mrz 11 01:21:33] DEBUG (HttpParser.java:105) - enter
HttpParser.readLine(InputStream, String)

[Mrz 11 01:21:35] DEBUG (HttpParser.java:74) - enter
HttpParser.readRawLine()

[Mrz 11 01:21:36] DEBUG (Wire.java:70) - << "[\r][\n]"

[Mrz 11 01:21:37] DEBUG (HttpMethodBase.java:1579) - enter
HttpMethodBase.processResponseHeaders(HttpState, HttpConnection)

[Mrz 11 01:21:38] DEBUG (HttpMethodBase.java:1615) - enter
HttpMethodBase.processCookieHeaders(Header[], HttpState, HttpConnection)

[Mrz 11 01:21:39] DEBUG (HttpMethodBase.java:1781) - enter
HttpMethodBase.readResponseBody(HttpState, HttpConnection)

[Mrz 11 01:21:40] DEBUG (HttpMethodBase.java:1816) - enter
HttpMethodBase.readResponseBody(HttpConnection)

[Mrz 11 01:21:41] DEBUG (HttpConnection.java:857) - enter
HttpConnection.getResponseInputStream()

[Mrz 11 01:21:42] DEBUG (HttpMethodBase.java:2281) - enter
HttpMethodBase.canResponseHaveBody(int)

[Mrz 11 01:21:43] DEBUG (HeaderElement.java:238) - enter
HeaderElement.parseElements(String)

[Mrz 11 01:21:44] DEBUG (HeaderElement.java:194) - enter
HeaderElement.parseElements(char[])

[Mrz 11 01:21:45] DEBUG (HttpConnection.java:894) - enter
HttpConnection.isResponseAvailable(int)

[Mrz 11 01:21:46] DEBUG (HttpMethodDirector.java:843) - Authorization
required

[Mrz 11 01:21:47] DEBUG (HttpMethodDirector.java:662) - enter
HttpMethodBase.processAuthenticationResponse(HttpState, HttpConnection)

[Mrz 11 01:21:48] DEBUG (AuthChallengeProcessor.java:90) - Supported
authentication schemes in the order of preference: [ntlm, digest, basic]

[Mrz 11 01:21:49] DEBUG (AuthChallengeProcessor.java:111) - Challenge
for ntlm authentication scheme not available

[Mrz 11 01:21:50] DEBUG (AuthChallengeProcessor.java:111) - Challenge
for digest authentication scheme not available

[Mrz 11 01:21:51] INFO (AuthChallengeProcessor.java:101) - basic
authentication scheme selected

[Mrz 11 01:21:52] DEBUG (AuthChallengeProcessor.java:155) - Using
authentication scheme: basic

[Mrz 11 01:21:53] DEBUG (AuthChallengeProcessor.java:163) -
Authorization challenge processed

[Mrz 11 01:21:54] DEBUG (HttpMethodDirector.java:714) - Authentication
scope: BASIC 'Authorization Required'@www.elog.esa.int:80

[Mrz 11 01:21:55] DEBUG (HttpState.java:436) - enter
HttpState.getCredentials(AuthScope)

[Mrz 11 01:21:56] DEBUG (HttpMethodDirector.java:194) - Retry
authentication

[Mrz 11 01:21:57] DEBUG (Wire.java:84) - << "1"

[Mrz 11 01:21:58] DEBUG (Wire.java:84) - << "d"

[Mrz 11 01:21:59] DEBUG (Wire.java:84) - << "6"

[Mrz 11 01:22:00] DEBUG (Wire.java:84) - << "[\r]"

[Mrz 11 01:22:01] DEBUG (Wire.java:70) - << "[\n]"

[Mrz 11 01:22:02] DEBUG (Wire.java:70) - << "<!DOCTYPE HTML PUBLIC
"-//IETF//DTD HTML 2.0//EN">[\n]"

[Mrz 11 01:22:03] DEBUG (Wire.java:70) - << "<HTML><HEAD>[\n]"

[Mrz 11 01:22:04] DEBUG (Wire.java:70) - << "<TITLE>401 Authorization
Required</TITLE>[\n]"

[Mrz 11 01:22:06] DEBUG (Wire.java:70) - << "</HEAD><BODY>[\n]"

[Mrz 11 01:22:07] DEBUG (Wire.java:70) - << "<H1>Authorization
Required</H1>[\n]"

[Mrz 11 01:22:08] DEBUG (Wire.java:70) - << "This server could not
verify that you[\n]"

[Mrz 11 01:22:09] DEBUG (Wire.java:70) - << "are authorized to access
the document[\n]"

[Mrz 11 01:22:10] DEBUG (Wire.java:70) - << "requested. Either you
supplied the wrong[\n]"

[Mrz 11 01:22:11] DEBUG (Wire.java:70) - << "credentials (e.g., bad
password), or your[\n]"

[Mrz 11 01:22:12] DEBUG (Wire.java:70) - << "browser doesn't understand
how to supply[\n]"

[Mrz 11 01:22:13] DEBUG (Wire.java:70) - << "the credentials
required.<P>[\n]"

[Mrz 11 01:22:14] DEBUG (Wire.java:70) - << "<HR>[\n]"

[Mrz 11 01:22:15] DEBUG (Wire.java:70) - << "<ADDRESS>Apache/1.3.19
Server at www.elog.esa.int Port 80</ADDRESS>[\n]"

[Mrz 11 01:22:16] DEBUG (Wire.java:70) - << "</BODY></HTML>[\n]"

[Mrz 11 01:22:17] DEBUG (Wire.java:84) - << "[\r]"

[Mrz 11 01:22:18] DEBUG (Wire.java:70) - << "[\n]"

[Mrz 11 01:22:19] DEBUG (Wire.java:84) - << "0"

[Mrz 11 01:22:20] DEBUG (Wire.java:84) - << "[\r]"

[Mrz 11 01:22:21] DEBUG (Wire.java:70) - << "[\n]"

[Mrz 11 01:22:22] DEBUG (HttpParser.java:170) - enter
HeaderParser.parseHeaders(InputStream, String)

[Mrz 11 01:22:23] DEBUG (HttpParser.java:105) - enter
HttpParser.readLine(InputStream, String)

[Mrz 11 01:22:24] DEBUG (HttpParser.java:74) - enter
HttpParser.readRawLine()

[Mrz 11 01:22:25] DEBUG (Wire.java:84) - << "[\r]"

[Mrz 11 01:22:26] DEBUG (Wire.java:70) - << "[\n]"

[Mrz 11 01:22:27] DEBUG (Wire.java:70) - << "[\r][\n]"

[Mrz 11 01:22:28] DEBUG (HttpMethodBase.java:1024) - Resorting to
protocol version default close connection policy

[Mrz 11 01:22:29] DEBUG (HttpMethodBase.java:1028) - Should NOT close
connection, using HTTP/1.1

[Mrz 11 01:22:30] DEBUG (HttpConnection.java:874) - enter
HttpConnection.isResponseAvailable()

[Mrz 11 01:22:31] DEBUG (HttpConnection.java:1174) - enter
HttpConnection.releaseConnection()

[Mrz 11 01:22:32] DEBUG (HttpConnection.java:1176) - Connection is
locked. Call to releaseConnection() ignored.

[Mrz 11 01:22:33] DEBUG (HttpMethodDirector.java:278) - Authenticating
with BASIC 'Authorization Required'@www.elog.esa.int:80

[Mrz 11 01:22:34] DEBUG (HttpState.java:436) - enter
HttpState.getCredentials(AuthScope)

[Mrz 11 01:22:36] DEBUG (BasicScheme.java:187) - enter
BasicScheme.authenticate(Credentials, HttpMethod)

[Mrz 11 01:22:37] DEBUG (HttpMethodParams.java:384) - Credential charset
not configured, using HTTP element charset

[Mrz 11 01:22:38] DEBUG (BasicScheme.java:232) - enter
BasicScheme.authenticate(UsernamePasswordCredentials, String)

[Mrz 11 01:22:39] DEBUG (HttpMethodBase.java:386) -
HttpMethodBase.addRequestHeader(Header)

[Mrz 11 01:22:40] DEBUG (HttpMethodDirector.java:379) - Attempt number 1
to process request

[Mrz 11 01:22:41] DEBUG (HttpConnection.java:432) - Connection is stale,
closing...

[Mrz 11 01:22:42] DEBUG (HttpConnection.java:1148) - enter
HttpConnection.close()

[Mrz 11 01:22:43] DEBUG (HttpConnection.java:1215) - enter
HttpConnection.closeSockedAndStreams()

[Mrz 11 01:22:44] DEBUG (HttpConnection.java:685) - enter
HttpConnection.open()

[Mrz 11 01:22:45] DEBUG (HttpConnection.java:692) - Open connection to
www.elog.esa.int:80

[Mrz 11 01:22:46] DEBUG (HttpMethodBase.java:1079) - enter
HttpMethodBase.execute(HttpState, HttpConnection)

[Mrz 11 01:22:47] DEBUG (HttpMethodBase.java:2057) - enter
HttpMethodBase.writeRequest(HttpState, HttpConnection)

[Mrz 11 01:22:48] DEBUG (HttpMethodBase.java:2212) - enter
HttpMethodBase.writeRequestLine(HttpState, HttpConnection)

[Mrz 11 01:22:49] DEBUG (HttpMethodBase.java:1496) - enter
HttpMethodBase.generateRequestLine(HttpConnection, String, String,
String, String)

[Mrz 11 01:22:50] DEBUG (Wire.java:70) - >> "GET / HTTP/1.1[\r][\n]"

[Mrz 11 01:22:51] DEBUG (HttpConnection.java:1032) - enter
HttpConnection.print(String)

[Mrz 11 01:22:52] DEBUG (HttpConnection.java:942) - enter
HttpConnection.write(byte[])

[Mrz 11 01:22:53] DEBUG (HttpConnection.java:963) - enter
HttpConnection.write(byte[], int, int)

[Mrz 11 01:22:54] DEBUG (HttpMethodBase.java:2175) - enter
HttpMethodBase.writeRequestHeaders(HttpState,HttpConnection)

[Mrz 11 01:22:55] DEBUG (HttpMethodBase.java:1417) - enter
HttpMethodBase.addRequestHeaders(HttpState, HttpConnection)

[Mrz 11 01:22:56] DEBUG (HttpMethodBase.java:1442) - enter
HttpMethodBase.addUserAgentRequestHeaders(HttpState, HttpConnection)

[Mrz 11 01:22:57] DEBUG (HttpMethodBase.java:1328) - enter
HttpMethodBase.addHostRequestHeader(HttpState, HttpConnection)

[Mrz 11 01:22:59] DEBUG (HttpMethodBase.java:1352) - Adding Host request
header

[Mrz 11 01:23:00] DEBUG (HttpMethodBase.java:1266) - enter
HttpMethodBase.addCookieRequestHeader(HttpState, HttpConnection)

[Mrz 11 01:23:01] DEBUG (HttpState.java:173) - enter
HttpState.getCookies()

[Mrz 11 01:23:02] DEBUG (CookieSpecBase.java:549) - enter
CookieSpecBase.match(String, int, String, boolean, Cookie[])

[Mrz 11 01:23:03] DEBUG (HttpMethodBase.java:1379) - enter
HttpMethodBase.addProxyConnectionHeader(HttpState, HttpConnection)

[Mrz 11 01:23:03] DEBUG (Wire.java:70) - >> "User-Agent: Jakarta
Commons-HttpClient/3.1[\r][\n]"

[Mrz 11 01:23:04] DEBUG (HttpConnection.java:1032) - enter
HttpConnection.print(String)

[Mrz 11 01:23:05] DEBUG (HttpConnection.java:942) - enter
HttpConnection.write(byte[])

[Mrz 11 01:23:06] DEBUG (HttpConnection.java:963) - enter
HttpConnection.write(byte[], int, int)

[Mrz 11 01:23:07] DEBUG (Wire.java:70) - >> "Authorization: Basic
ZWxvZ3VzZXI6JHUkdGVuZzUx[\r][\n]"

[Mrz 11 01:23:08] DEBUG (HttpConnection.java:1032) - enter
HttpConnection.print(String)

[Mrz 11 01:23:09] DEBUG (HttpConnection.java:942) - enter
HttpConnection.write(byte[])

[Mrz 11 01:23:10] DEBUG (HttpConnection.java:963) - enter
HttpConnection.write(byte[], int, int)

[Mrz 11 01:23:11] DEBUG (Wire.java:70) - >> "Host:
www.elog.esa.int[\r][\n]"

[Mrz 11 01:23:12] DEBUG (HttpConnection.java:1032) - enter
HttpConnection.print(String)

[Mrz 11 01:23:13] DEBUG (HttpConnection.java:942) - enter
HttpConnection.write(byte[])

[Mrz 11 01:23:14] DEBUG (HttpConnection.java:963) - enter
HttpConnection.write(byte[], int, int)

[Mrz 11 01:23:15] DEBUG (HttpConnection.java:1001) - enter
HttpConnection.writeLine()

[Mrz 11 01:23:17] DEBUG (HttpConnection.java:942) - enter
HttpConnection.write(byte[])

[Mrz 11 01:23:18] DEBUG (HttpConnection.java:963) - enter
HttpConnection.write(byte[], int, int)

[Mrz 11 01:23:19] DEBUG (Wire.java:70) - >> "[\r][\n]"

[Mrz 11 01:23:20] DEBUG (HttpConnection.java:826) - enter
HttpConnection.flushRequestOutputStream()

[Mrz 11 01:23:21] DEBUG (HttpMethodBase.java:1730) - enter
HttpMethodBase.readResponse(HttpState, HttpConnection)

[Mrz 11 01:23:22] DEBUG (HttpMethodBase.java:1964) - enter
HttpMethodBase.readStatusLine(HttpState, HttpConnection)

[Mrz 11 01:23:23] DEBUG (HttpConnection.java:1113) - enter
HttpConnection.readLine()

[Mrz 11 01:23:24] DEBUG (HttpParser.java:105) - enter
HttpParser.readLine(InputStream, String)

[Mrz 11 01:23:25] DEBUG (HttpParser.java:74) - enter
HttpParser.readRawLine()

[Mrz 11 01:23:26] DEBUG (Wire.java:70) - << "HTTP/1.1 200 OK[\r][\n]"

[Mrz 11 01:23:27] DEBUG (Wire.java:70) - << "HTTP/1.1 200 OK[\r][\n]"

[Mrz 11 01:23:28] DEBUG (HttpMethodBase.java:1930) - enter
HttpMethodBase.readResponseHeaders(HttpState,HttpConnection)

[Mrz 11 01:23:29] DEBUG (HttpConnection.java:857) - enter
HttpConnection.getResponseInputStream()

[Mrz 11 01:23:30] DEBUG (HttpParser.java:170) - enter
HeaderParser.parseHeaders(InputStream, String)

[Mrz 11 01:23:31] DEBUG (HttpParser.java:105) - enter
HttpParser.readLine(InputStream, String)

[Mrz 11 01:23:32] DEBUG (HttpParser.java:74) - enter
HttpParser.readRawLine()

[Mrz 11 01:23:33] DEBUG (Wire.java:70) - << "Date: Wed, 11 Mar 2009
00:23:20 GMT[\r][\n]"

[Mrz 11 01:23:34] DEBUG (HttpParser.java:105) - enter
HttpParser.readLine(InputStream, String)

[Mrz 11 01:23:35] DEBUG (HttpParser.java:74) - enter
HttpParser.readRawLine()

[Mrz 11 01:23:36] DEBUG (Wire.java:70) - << "Server: Apache/1.3.19
(Unix) mod_ssl/2.8.3 OpenSSL/0.9.6a PHP/4.2.1[\r][\n]"

[Mrz 11 01:23:37] DEBUG (HttpParser.java:105) - enter
HttpParser.readLine(InputStream, String)

[Mrz 11 01:23:39] DEBUG (HttpParser.java:74) - enter
HttpParser.readRawLine()

[Mrz 11 01:23:40] DEBUG (Wire.java:70) - << "X-Powered-By:
PHP/4.2.1[\r][\n]"

[Mrz 11 01:23:41] DEBUG (HttpParser.java:105) - enter
HttpParser.readLine(InputStream, String)

[Mrz 11 01:23:42] DEBUG (HttpParser.java:74) - enter
HttpParser.readRawLine()

[Mrz 11 01:23:43] DEBUG (Wire.java:70) - << "Transfer-Encoding:
chunked[\r][\n]"

[Mrz 11 01:23:44] DEBUG (HttpParser.java:105) - enter
HttpParser.readLine(InputStream, String)

[Mrz 11 01:23:45] DEBUG (HttpParser.java:74) - enter
HttpParser.readRawLine()

[Mrz 11 01:23:46] DEBUG (Wire.java:70) - << "Content-Type:
text/html[\r][\n]"

[Mrz 11 01:23:47] DEBUG (HttpParser.java:105) - enter
HttpParser.readLine(InputStream, String)

[Mrz 11 01:23:48] DEBUG (HttpParser.java:74) - enter
HttpParser.readRawLine()

[Mrz 11 01:23:49] DEBUG (Wire.java:70) - << "[\r][\n]"

[Mrz 11 01:23:50] DEBUG (HttpMethodBase.java:1579) - enter
HttpMethodBase.processResponseHeaders(HttpState, HttpConnection)

[Mrz 11 01:23:51] DEBUG (HttpMethodBase.java:1615) - enter
HttpMethodBase.processCookieHeaders(Header[], HttpState, HttpConnection)

[Mrz 11 01:23:52] DEBUG (HttpMethodBase.java:1781) - enter
HttpMethodBase.readResponseBody(HttpState, HttpConnection)

[Mrz 11 01:23:53] DEBUG (HttpMethodBase.java:1816) - enter
HttpMethodBase.readResponseBody(HttpConnection)

[Mrz 11 01:23:54] DEBUG (HttpConnection.java:857) - enter
HttpConnection.getResponseInputStream()

[Mrz 11 01:23:55] DEBUG (HttpMethodBase.java:2281) - enter
HttpMethodBase.canResponseHaveBody(int)

[Mrz 11 01:23:56] DEBUG (HeaderElement.java:238) - enter
HeaderElement.parseElements(String)

[Mrz 11 01:23:57] DEBUG (HeaderElement.java:194) - enter
HeaderElement.parseElements(char[])

[Mrz 11 01:23:58] DEBUG (HttpConnection.java:894) - enter
HttpConnection.isResponseAvailable(int)

[Mrz 11 01:23:59] DEBUG (HttpState.java:173) - enter
HttpState.getCookies()

[Mrz 11 01:24:00] DEBUG (CookieSpecBase.java:549) - enter
CookieSpecBase.match(String, int, String, boolean, Cookie[])

Initial set of cookies:

None

Login form post: HTTP/1.1 200 OK

[Mrz 11 01:24:01] DEBUG (Wire.java:84) - << "f"

[Mrz 11 01:24:02] DEBUG (Wire.java:84) - << "3"

[Mrz 11 01:24:03] DEBUG (Wire.java:84) - << "0"

[Mrz 11 01:24:05] DEBUG (Wire.java:84) - << "[\r]"

[Mrz 11 01:24:06] DEBUG (Wire.java:70) - << "[\n]"

[Mrz 11 01:24:07] DEBUG (Wire.java:70) - << "<html>[\n]"

[Mrz 11 01:24:08] DEBUG (Wire.java:70) - << "<head>[\n]"

[Mrz 11 01:24:09] DEBUG (Wire.java:70) - << "<title>eLog Operational
e-logging and knowledge based Engine</title>[\n]"

[Mrz 11 01:24:10] DEBUG (Wire.java:70) - << "<meta
http-equiv="Content-Type" content="text/html;
charset=windows-1250">[\n]"

[Mrz 11 01:24:11] DEBUG (Wire.java:70) - << "<style
type="text/css">[\n]"

[Mrz 11 01:24:12] DEBUG (Wire.java:70) - << "<!--[\n]"

[Mrz 11 01:24:13] DEBUG (Wire.java:70) - << "a:hover { text-decoration:
none; color: #006699}[\n]"

[Mrz 11 01:24:14] DEBUG (Wire.java:70) - << "a:visited {
text-decoration: none}[\n]"

[Mrz 11 01:24:15] DEBUG (Wire.java:70) - << "a:link { text-decoration:
none}[\n]"

[Mrz 11 01:24:16] DEBUG (Wire.java:70) - << "a:active { text-decoration:
none}[\n]"

[Mrz 11 01:24:17] DEBUG (Wire.java:70) - << "-->[\n]"

[Mrz 11 01:24:18] DEBUG (Wire.java:70) - << "</style>[\n]"

[Mrz 11 01:24:19] DEBUG (Wire.java:70) - << "</head>[\n]"

[Mrz 11 01:24:20] DEBUG (Wire.java:70) - << "<body bgcolor="#FFFFFF"
text="#000000" link="#0000AA" vlink="#000055" alink="#66CCFF">[\n]"

[Mrz 11 01:24:21] DEBUG (Wire.java:70) - << "<table width="750"
border="0" cellspacing="0" cellpadding="2">[\n]"

[Mrz 11 01:24:23] DEBUG (Wire.java:70) - << " <tr><td><img
src="http://www.esa.int/MiniSites/European_Space_Operations_Centre.jpg"
alt="ESOC" width=750 height=100></td></tr>[\n]"

[Mrz 11 01:24:24] DEBUG (Wire.java:70) - << " <tr>[\n]"

[Mrz 11 01:24:25] DEBUG (Wire.java:70) - << " <td
bgcolor="#8DCFF4"><font face="Arial, Helvetica, sans-serif"
size="3"><b>Operational e-log and knowledge base Engine </b></font><font
size="2" face="Arial, Helvetica, sans-serif">developed[\n]"

[Mrz 11 01:24:26] DEBUG (Wire.java:70) - << " by
<b>OPS-GDS</b></font><font size="2" face="Arial, Helvetica, sans-serif">
<b>&copy;</b>[\n]"

[Mrz 11 01:24:27] DEBUG (Wire.java:70) - << " 2001-2005</font></td>[\n]"

[Mrz 11 01:24:28] DEBUG (Wire.java:70) - << " </tr>[\n]"

[Mrz 11 01:24:29] DEBUG (Wire.java:70) - << " <tr>[\n]"

[Mrz 11 01:24:30] DEBUG (Wire.java:70) - << " <td>&nbsp;</td>[\n]"

[Mrz 11 01:24:31] DEBUG (Wire.java:70) - << " </tr>[\n]"

[Mrz 11 01:24:32] DEBUG (Wire.java:70) - << " <tr>[\n]"

[Mrz 11 01:24:33] DEBUG (Wire.java:84) - << " <"

[Mrz 11 01:24:34] DEBUG (Wire.java:70) - << "td>[\n]"

[Mrz 11 01:24:35] DEBUG (Wire.java:70) - << " <B></B> </td></tr>[\n]"

[Mrz 11 01:24:36] DEBUG (Wire.java:70) - << "[0x9]<tr><td>[\n]"

[Mrz 11 01:24:37] DEBUG (Wire.java:70) - << " <form method="post"
action="https://www.elog.esa.int/loginsession.php?loggingIn=true">[\n]"

[Mrz 11 01:24:38] DEBUG (Wire.java:70) - << " <table width="100%"
border="0" cellspacing="0" cellpadding="10">[\n]"

[Mrz 11 01:24:39] DEBUG (Wire.java:70) - << " <tr>[\n]"

[Mrz 11 01:24:40] DEBUG (Wire.java:70) - << " <td width="20%"
align="left" valign="top"><b><font face="Arial, Helvetica, sans-serif"
size="2">Username:</font></b></td>[\n]"

[Mrz 11 01:24:41] DEBUG (Wire.java:70) - << " <td width="80%"
align="left" valign="top"> <font face="Arial, Helvetica, sans-serif"
size="2">[\n]"

[Mrz 11 01:24:42] DEBUG (Wire.java:70) - << " <input type="text"
name="userid" size="8" maxlength="8">[\n]"

[Mrz 11 01:24:43] DEBUG (Wire.java:70) - << " </font></td>[\n]"

[Mrz 11 01:24:44] DEBUG (Wire.java:70) - << " </tr>[\n]"

[Mrz 11 01:24:45] DEBUG (Wire.java:70) - << " <tr>[\n]"

[Mrz 11 01:24:46] DEBUG (Wire.java:70) - << " <td width="20%"
align="left" valign="top"><b><font face="Arial, Helvetica, sans-serif"
size="2">Password:</font></b></td>[\n]"

[Mrz 11 01:24:47] DEBUG (Wire.java:70) - << " <td width="80%"
align="left" valign="top"> <font face="Arial, Helvetica, sans-serif"
size="2">[\n]"

[Mrz 11 01:24:48] DEBUG (Wire.java:70) - << " <input type="password"
name="userpassword" size="30" maxlength="100">[\n]"

[Mrz 11 01:24:49] DEBUG (Wire.java:70) - << " </font></td>[\n]"

[Mrz 11 01:24:50] DEBUG (Wire.java:70) - << " </tr>[\n]"

[Mrz 11 01:24:51] DEBUG (Wire.java:70) - << " <tr>[\n]"

[Mrz 11 01:24:52] DEBUG (Wire.java:84) - << " <td width="20%"
align="left" valign="top"

[Mrz 11 01:24:53] DEBUG (Wire.java:70) - << ""><b><font face="Arial,
Helvetica, sans-serif" size="2">Database:</font></b></td>[\n]"

[Mrz 11 01:24:54] DEBUG (Wire.java:70) - << " <td width="80%"
align="left" valign="top"> <font face="Arial, Helvetica, sans-serif"
size="2">[\n]"

[Mrz 11 01:24:55] DEBUG (Wire.java:70) - << " <select
name="requesteddb">[\n]"

[Mrz 11 01:24:56] DEBUG (Wire.java:70) - << " [0x9]
[0x9][0x9][0x9]<option value="0-6">Database1</option>[\n]"

[Mrz 11 01:24:57] DEBUG (Wire.java:70) - << " [0x9][0x9]
[0x9][0x9][0x9]<option value="0-9">Database2</option>[\n]"

 [Mrz 11 01:25:23] DEBUG (Wire.java:84) - << "[\r]"

[Mrz 11 01:25:24] DEBUG (Wire.java:70) - << "[\n]"

[Mrz 11 01:25:25] DEBUG (Wire.java:84) - << "e"

[Mrz 11 01:25:26] DEBUG (Wire.java:84) - << "c"

[Mrz 11 01:25:27] DEBUG (Wire.java:84) - << "b"

[Mrz 11 01:25:28] DEBUG (Wire.java:84) - << "[\r]"

[Mrz 11 01:25:29] DEBUG (Wire.java:70) - << "[\n]"

[Mrz 11 01:25:30] DEBUG (Wire.java:70) - << "Dev</option>[\n]"

[Mrz 11 01:25:31] DEBUG (Wire.java:70) - << " [0x9][0x9]
[0x9][0x9][0x9]<option value="14-3">Database1</option>[\n]"

[Mrz 11 01:25:32] DEBUG (Wire.java:70) - << " [0x9][0x9]
[0x9][0x9][0x9]<option value="18-1">Database2</option>[\n]"

 [Mrz 11 01:26:31] DEBUG (Wire.java:70) - << " [0x9][0x9] [0x9]
</select>[\n]"

[Mrz 11 01:26:32] DEBUG (Wire.java:70) - << " </font></td>[\n]"

[Mrz 11 01:26:33] DEBUG (Wire.java:70) - << " </tr>[\n]"

[Mrz 11 01:26:34] DEBUG (Wire.java:70) - << " </table>[\n]"

[Mrz 11 01:26:35] DEBUG (Wire.java:70) - << " <p>[\n]"

[Mrz 11 01:26:36] DEBUG (Wire.java:70) - << " <input type="submit"
name="Submit" value="Login">[\n]"

[Mrz 11 01:26:37] DEBUG (Wire.java:70) - << " <input type="reset"
name="Reset" value="Reset">[\n]"

[Mrz 11 01:26:38] DEBUG (Wire.java:70) - << " </p>[\n]"

[Mrz 11 01:26:39] DEBUG (Wire.java:70) - << " </form>[\n]"

[Mrz 11 01:26:40] DEBUG (Wire.java:70) - << " </td>[\n]"

[Mrz 11 01:26:41] DEBUG (Wire.java:70) - << " </tr>[\n]"

[Mrz 11 01:26:42] DEBUG (Wire.java:70) - << "</table>[\n]"

[Mrz 11 01:26:43] DEBUG (Wire.java:70) - << "</body>[\n]"

[Mrz 11 01:26:44] DEBUG (Wire.java:70) - << "</html>[\n]"

[Mrz 11 01:26:45] DEBUG (Wire.java:84) - << "[\r]"

[Mrz 11 01:26:46] DEBUG (Wire.java:70) - << "[\n]"

[Mrz 11 01:26:47] DEBUG (Wire.java:84) - << "0"

[Mrz 11 01:26:48] DEBUG (Wire.java:84) - << "[\r]"

[Mrz 11 01:26:49] DEBUG (Wire.java:70) - << "[\n]"

[Mrz 11 01:26:50] DEBUG (HttpParser.java:170) - enter
HeaderParser.parseHeaders(InputStream, String)

[Mrz 11 01:26:51] DEBUG (HttpParser.java:105) - enter
HttpParser.readLine(InputStream, String)

[Mrz 11 01:26:52] DEBUG (HttpParser.java:74) - enter
HttpParser.readRawLine()

[Mrz 11 01:26:53] DEBUG (Wire.java:84) - << "[\r]"

[Mrz 11 01:26:54] DEBUG (Wire.java:70) - << "[\n]"

[Mrz 11 01:26:55] DEBUG (Wire.java:70) - << "[\r][\n]"

[Mrz 11 01:26:56] DEBUG (HttpMethodBase.java:1024) - Resorting to
protocol version default close connection policy

[Mrz 11 01:26:57] DEBUG (HttpMethodBase.java:1028) - Should NOT close
connection, using HTTP/1.1

[Mrz 11 01:26:58] DEBUG (HttpConnection.java:874) - enter
HttpConnection.isResponseAvailable()

[Mrz 11 01:26:59] DEBUG (HttpConnection.java:1174) - enter
HttpConnection.releaseConnection()

[Mrz 11 01:27:00] DEBUG (HttpConnection.java:1178) - Releasing
connection back to connection manager.

[Mrz 11 01:27:02] INFO (Logger.java:37) - Submitting Login form...

[Mrz 11 01:27:03] DEBUG (PostMethod.java:403) - enter
PostMethod.setRequestBody(NameValuePair[])

[Mrz 11 01:27:04] DEBUG (PostMethod.java:152) - enter
PostMethod.clearRequestBody()

[Mrz 11 01:27:05] DEBUG (EntityEnclosingMethod.java:150) - enter
EntityEnclosingMethod.clearRequestBody()

[Mrz 11 01:27:06] DEBUG (PostMethod.java:304) - enter
PostMethod.addParameters(NameValuePair[])

[Mrz 11 01:27:07] DEBUG (EntityEnclosingMethod.java:150) - enter
EntityEnclosingMethod.clearRequestBody()

[Mrz 11 01:27:08] DEBUG (HttpClient.java:321) - enter
HttpClient.executeMethod(HttpMethod)

[Mrz 11 01:27:09] DEBUG (HttpClient.java:374) - enter
HttpClient.executeMethod(HostConfiguration,HttpMethod,HttpState)

[Mrz 11 01:27:10] DEBUG (HttpConnection.java:1148) - enter
HttpConnection.close()

[Mrz 11 01:27:11] DEBUG (HttpConnection.java:1215) - enter
HttpConnection.closeSockedAndStreams()

[Mrz 11 01:27:12] DEBUG (HttpMethodDirector.java:379) - Attempt number 1
to process request

[Mrz 11 01:27:13] DEBUG (HttpConnection.java:685) - enter
HttpConnection.open()

[Mrz 11 01:27:14] DEBUG (HttpConnection.java:692) - Open connection to
www.elog.esa.int:443

setting up default SSLSocketFactory

use default SunJSSE impl class:
com.sun.net.ssl.internal.ssl.SSLSocketFactoryImpl

class com.sun.net.ssl.internal.ssl.SSLSocketFactoryImpl is loaded

keyStore is : 

keyStore type is : jks

keyStore provider is : 

init keystore

init keymanager of type SunX509

trustStore is: C:\Program
Files\Java\jdk1.5.0_15\jre\lib\security\cacerts

trustStore type is : jks

trustStore provider is : 

init truststore

adding as trusted cert:

Subject: CN=DigiCert High Assurance EV Root CA, OU=www.digicert.com,
O=DigiCert Inc, C=US

Issuer: CN=DigiCert High Assurance EV Root CA, OU=www.digicert.com,
O=DigiCert Inc, C=US

Algorithm: RSA; Serial number: 0x2ac5c266a0b409b8f0b79f2ae462577

Valid from Fri Nov 10 01:00:00 CET 2006 until Mon Nov 10 01:00:00 CET
2031

adding as trusted cert:

Subject: EMAILADDRESS=info@valicert.com, CN=http://www.valicert.com/,
OU=ValiCert Class 2 Policy Validation Authority, O="ValiCert, Inc.",
L=ValiCert Validation Network

Issuer: EMAILADDRESS=info@valicert.com, CN=http://www.valicert.com/,
OU=ValiCert Class 2 Policy Validation Authority, O="ValiCert, Inc.",
L=ValiCert Validation Network

Algorithm: RSA; Serial number: 0x1

Valid from Sat Jun 26 02:19:54 CEST 1999 until Wed Jun 26 02:19:54 CEST
2019

adding as trusted cert:

Subject: CN=Baltimore CyberTrust Code Signing Root, OU=CyberTrust,
O=Baltimore, C=IE

Issuer: CN=Baltimore CyberTrust Code Signing Root, OU=CyberTrust,
O=Baltimore, C=IE

Algorithm: RSA; Serial number: 0x20000bf

Valid from Wed May 17 16:01:00 CEST 2000 until Sun May 18 01:59:00 CEST
2025

adding as trusted cert:

Subject: CN=TC TrustCenter Class 2 CA II, OU=TC TrustCenter Class 2 CA,
O=TC TrustCenter GmbH, C=DE

Issuer: CN=TC TrustCenter Class 2 CA II, OU=TC TrustCenter Class 2 CA,
O=TC TrustCenter GmbH, C=DE

Algorithm: RSA; Serial number: 0x2e6a000100021fd752212c115c3b

Valid from Thu Jan 12 15:38:43 CET 2006 until Wed Dec 31 23:59:59 CET
2025

adding as trusted cert:

Subject: CN=UTN - DATACorp SGC, OU=http://www.usertrust.com, O=The
USERTRUST Network, L=Salt Lake City, ST=UT, C=US

Issuer: CN=UTN - DATACorp SGC, OU=http://www.usertrust.com, O=The
USERTRUST Network, L=Salt Lake City, ST=UT, C=US

Algorithm: RSA; Serial number: 0x44be0c8b500021b411d32a6806a9ad69

Valid from Thu Jun 24 20:57:21 CEST 1999 until Mon Jun 24 21:06:30 CEST
2019

adding as trusted cert:

Subject: CN=GlobalSign Root CA, OU=Root CA, O=GlobalSign nv-sa, C=BE

Issuer: CN=GlobalSign Root CA, OU=Root CA, O=GlobalSign nv-sa, C=BE

Algorithm: RSA; Serial number: 0x20000000000d678b79405

Valid from Tue Sep 01 14:00:00 CEST 1998 until Tue Jan 28 13:00:00 CET
2014

adding as trusted cert:

Subject: CN=UTN-USERFirst-Hardware, OU=http://www.usertrust.com, O=The
USERTRUST Network, L=Salt Lake City, ST=UT, C=US

Issuer: CN=UTN-USERFirst-Hardware, OU=http://www.usertrust.com, O=The
USERTRUST Network, L=Salt Lake City, ST=UT, C=US

Algorithm: RSA; Serial number: 0x44be0c8b500024b411d3362afe650afd

Valid from Fri Jul 09 20:10:42 CEST 1999 until Tue Jul 09 20:19:22 CEST
2019

adding as trusted cert:

Subject: OU=Starfield Class 2 Certification Authority, O="Starfield
Technologies, Inc.", C=US

Issuer: OU=Starfield Class 2 Certification Authority, O="Starfield
Technologies, Inc.", C=US

Algorithm: RSA; Serial number: 0x0

Valid from Tue Jun 29 19:39:16 CEST 2004 until Thu Jun 29 19:39:16 CEST
2034

adding as trusted cert:

Subject: OU=Equifax Secure Certificate Authority, O=Equifax, C=US

Issuer: OU=Equifax Secure Certificate Authority, O=Equifax, C=US

Algorithm: RSA; Serial number: 0x35def4cf

Valid from Sat Aug 22 18:41:51 CEST 1998 until Wed Aug 22 18:41:51 CEST
2018

adding as trusted cert:

Subject: EMAILADDRESS=personal-premium@thawte.com, CN=Thawte Personal
Premium CA, OU=Certification Services Division, O=Thawte Consulting,
L=Cape Town, ST=Western Cape, C=ZA

Issuer: EMAILADDRESS=personal-premium@thawte.com, CN=Thawte Personal
Premium CA, OU=Certification Services Division, O=Thawte Consulting,
L=Cape Town, ST=Western Cape, C=ZA

Algorithm: RSA; Serial number: 0x0

Valid from Mon Jan 01 01:00:00 CET 1996 until Fri Jan 01 00:59:59 CET
2021

adding as trusted cert:

Subject: CN=Entrust.net Secure Server Certification Authority, OU=(c)
2000 Entrust.net Limited, OU=www.entrust.net/SSL_CPS incorp. by ref.
(limits liab.), O=Entrust.net

Issuer: CN=Entrust.net Secure Server Certification Authority, OU=(c)
2000 Entrust.net Limited, OU=www.entrust.net/SSL_CPS incorp. by ref.
(limits liab.), O=Entrust.net

Algorithm: RSA; Serial number: 0x389b113c

Valid from Fri Feb 04 18:20:00 CET 2000 until Tue Feb 04 18:50:00 CET
2020

adding as trusted cert:

Subject: OU=VeriSign Trust Network, OU="(c) 1998 VeriSign, Inc. - For
authorized use only", OU=Class 3 Public Primary Certification Authority
- G2, O="VeriSign, Inc.", C=US

Issuer: OU=VeriSign Trust Network, OU="(c) 1998 VeriSign, Inc. - For
authorized use only", OU=Class 3 Public Primary Certification Authority
- G2, O="VeriSign, Inc.", C=US

Algorithm: RSA; Serial number: 0x7dd9fe07cfa81eb7107967fba78934c6

Valid from Mon May 18 02:00:00 CEST 1998 until Wed Aug 02 01:59:59 CEST
2028

adding as trusted cert:

Subject: CN=AAA Certificate Services, O=Comodo CA Limited, L=Salford,
ST=Greater Manchester, C=GB

Issuer: CN=AAA Certificate Services, O=Comodo CA Limited, L=Salford,
ST=Greater Manchester, C=GB

Algorithm: RSA; Serial number: 0x1

Valid from Thu Jan 01 01:00:00 CET 2004 until Mon Jan 01 00:59:59 CET
2029

adding as trusted cert:

Subject: EMAILADDRESS=premium-server@thawte.com, CN=Thawte Premium
Server CA, OU=Certification Services Division, O=Thawte Consulting cc,
L=Cape Town, ST=Western Cape, C=ZA

Issuer: EMAILADDRESS=premium-server@thawte.com, CN=Thawte Premium Server
CA, OU=Certification Services Division, O=Thawte Consulting cc, L=Cape
Town, ST=Western Cape, C=ZA

Algorithm: RSA; Serial number: 0x1

Valid from Thu Aug 01 02:00:00 CEST 1996 until Fri Jan 01 00:59:59 CET
2021

adding as trusted cert:

Subject: OU=Secure Server Certification Authority, O="RSA Data Security,
Inc.", C=US

Issuer: OU=Secure Server Certification Authority, O="RSA Data Security,
Inc.", C=US

Algorithm: RSA; Serial number: 0x2ad667e4e45fe5e576f3c98195eddc0

Valid from Wed Nov 09 01:00:00 CET 1994 until Fri Jan 08 00:59:59 CET
2010

adding as trusted cert:

Subject: CN=Entrust.net Client Certification Authority, OU=(c) 2000
Entrust.net Limited, OU=www.entrust.net/GCCA_CPS incorp. by ref. (limits
liab.), O=Entrust.net

Issuer: CN=Entrust.net Client Certification Authority, OU=(c) 2000
Entrust.net Limited, OU=www.entrust.net/GCCA_CPS incorp. by ref. (limits
liab.), O=Entrust.net

Algorithm: RSA; Serial number: 0x389ef6e4

Valid from Mon Feb 07 17:16:40 CET 2000 until Fri Feb 07 17:46:40 CET
2020

adding as trusted cert:

Subject: CN=GTE CyberTrust Global Root, OU="GTE CyberTrust Solutions,
Inc.", O=GTE Corporation, C=US

Issuer: CN=GTE CyberTrust Global Root, OU="GTE CyberTrust Solutions,
Inc.", O=GTE Corporation, C=US

Algorithm: RSA; Serial number: 0x1a5

Valid from Thu Aug 13 02:29:00 CEST 1998 until Tue Aug 14 01:59:00 CEST
2018

adding as trusted cert:

Subject: CN=Sonera Class1 CA, O=Sonera, C=FI

Issuer: CN=Sonera Class1 CA, O=Sonera, C=FI

Algorithm: RSA; Serial number: 0x24

Valid from Fri Apr 06 12:49:13 CEST 2001 until Tue Apr 06 12:49:13 CEST
2021

adding as trusted cert:

Subject: EMAILADDRESS=server-certs@thawte.com, CN=Thawte Server CA,
OU=Certification Services Division, O=Thawte Consulting cc, L=Cape Town,
ST=Western Cape, C=ZA

Issuer: EMAILADDRESS=server-certs@thawte.com, CN=Thawte Server CA,
OU=Certification Services Division, O=Thawte Consulting cc, L=Cape Town,
ST=Western Cape, C=ZA

Algorithm: RSA; Serial number: 0x1

Valid from Thu Aug 01 02:00:00 CEST 1996 until Fri Jan 01 00:59:59 CET
2021

adding as trusted cert:

Subject: CN=AddTrust External CA Root, OU=AddTrust External TTP Network,
O=AddTrust AB, C=SE

Issuer: CN=AddTrust External CA Root, OU=AddTrust External TTP Network,
O=AddTrust AB, C=SE

Algorithm: RSA; Serial number: 0x1

Valid from Tue May 30 12:48:38 CEST 2000 until Sat May 30 12:48:38 CEST
2020

adding as trusted cert:

Subject: CN=GeoTrust Global CA, O=GeoTrust Inc., C=US

Issuer: CN=GeoTrust Global CA, O=GeoTrust Inc., C=US

Algorithm: RSA; Serial number: 0x23456

Valid from Tue May 21 06:00:00 CEST 2002 until Sat May 21 06:00:00 CEST
2022

adding as trusted cert:

Subject: OU=Go Daddy Class 2 Certification Authority, O="The Go Daddy
Group, Inc.", C=US

Issuer: OU=Go Daddy Class 2 Certification Authority, O="The Go Daddy
Group, Inc.", C=US

Algorithm: RSA; Serial number: 0x0

Valid from Tue Jun 29 19:06:20 CEST 2004 until Thu Jun 29 19:06:20 CEST
2034

adding as trusted cert:

Subject: CN=VeriSign Class 1 Public Primary Certification Authority -
G3, OU="(c) 1999 VeriSign, Inc. - For authorized use only", OU=VeriSign
Trust Network, O="VeriSign, Inc.", C=US

Issuer: CN=VeriSign Class 1 Public Primary Certification Authority - G3,
OU="(c) 1999 VeriSign, Inc. - For authorized use only", OU=VeriSign
Trust Network, O="VeriSign, Inc.", C=US

Algorithm: RSA; Serial number: 0x8b5b75568454850b00cfaf3848ceb1a4

Valid from Fri Oct 01 02:00:00 CEST 1999 until Thu Jul 17 01:59:59 CEST
2036

adding as trusted cert:

Subject: CN=TC TrustCenter Class 4 CA II, OU=TC TrustCenter Class 4 CA,
O=TC TrustCenter GmbH, C=DE

Issuer: CN=TC TrustCenter Class 4 CA II, OU=TC TrustCenter Class 4 CA,
O=TC TrustCenter GmbH, C=DE

Algorithm: RSA; Serial number: 0x5c00001000241d0060a4dce7510

Valid from Thu Mar 23 15:10:23 CET 2006 until Wed Dec 31 23:59:59 CET
2025

adding as trusted cert:

Subject: CN=AddTrust Class 1 CA Root, OU=AddTrust TTP Network,
O=AddTrust AB, C=SE

Issuer: CN=AddTrust Class 1 CA Root, OU=AddTrust TTP Network, O=AddTrust
AB, C=SE

Algorithm: RSA; Serial number: 0x1

Valid from Tue May 30 12:38:31 CEST 2000 until Sat May 30 12:38:31 CEST
2020

adding as trusted cert:

Subject: OU=VeriSign Trust Network, OU="(c) 1998 VeriSign, Inc. - For
authorized use only", OU=Class 2 Public Primary Certification Authority
- G2, O="VeriSign, Inc.", C=US

Issuer: OU=VeriSign Trust Network, OU="(c) 1998 VeriSign, Inc. - For
authorized use only", OU=Class 2 Public Primary Certification Authority
- G2, O="VeriSign, Inc.", C=US

Algorithm: RSA; Serial number: 0xb92f60cc889fa17a4609b85b706c8aaf

Valid from Mon May 18 02:00:00 CEST 1998 until Wed Aug 02 01:59:59 CEST
2028

adding as trusted cert:

Subject: CN=Entrust.net Secure Server Certification Authority, OU=(c)
1999 Entrust.net Limited, OU=www.entrust.net/CPS incorp. by ref. (limits
liab.), O=Entrust.net, C=US

Issuer: CN=Entrust.net Secure Server Certification Authority, OU=(c)
1999 Entrust.net Limited, OU=www.entrust.net/CPS incorp. by ref. (limits
liab.), O=Entrust.net, C=US

Algorithm: RSA; Serial number: 0x374ad243

Valid from Tue May 25 18:09:40 CEST 1999 until Sat May 25 18:39:40 CEST
2019

adding as trusted cert:

Subject: CN=Baltimore CyberTrust Root, OU=CyberTrust, O=Baltimore, C=IE

Issuer: CN=Baltimore CyberTrust Root, OU=CyberTrust, O=Baltimore, C=IE

Algorithm: RSA; Serial number: 0x20000b9

Valid from Fri May 12 20:46:00 CEST 2000 until Tue May 13 01:59:00 CEST
2025

adding as trusted cert:

Subject: CN=VeriSign Class 3 Public Primary Certification Authority -
G3, OU="(c) 1999 VeriSign, Inc. - For authorized use only", OU=VeriSign
Trust Network, O="VeriSign, Inc.", C=US

Issuer: CN=VeriSign Class 3 Public Primary Certification Authority - G3,
OU="(c) 1999 VeriSign, Inc. - For authorized use only", OU=VeriSign
Trust Network, O="VeriSign, Inc.", C=US

Algorithm: RSA; Serial number: 0x9b7e0649a33e62b9d5ee90487129ef57

Valid from Fri Oct 01 02:00:00 CEST 1999 until Thu Jul 17 01:59:59 CEST
2036

adding as trusted cert:

Subject: EMAILADDRESS=personal-basic@thawte.com, CN=Thawte Personal
Basic CA, OU=Certification Services Division, O=Thawte Consulting,
L=Cape Town, ST=Western Cape, C=ZA

Issuer: EMAILADDRESS=personal-basic@thawte.com, CN=Thawte Personal Basic
CA, OU=Certification Services Division, O=Thawte Consulting, L=Cape
Town, ST=Western Cape, C=ZA

Algorithm: RSA; Serial number: 0x0

Valid from Mon Jan 01 01:00:00 CET 1996 until Fri Jan 01 00:59:59 CET
2021

adding as trusted cert:

Subject: OU=Class 3 Public Primary Certification Authority, O="VeriSign,
Inc.", C=US

Issuer: OU=Class 3 Public Primary Certification Authority, O="VeriSign,
Inc.", C=US

Algorithm: RSA; Serial number: 0x70bae41d10d92934b638ca7b03ccbabf

Valid from Mon Jan 29 01:00:00 CET 1996 until Wed Aug 02 01:59:59 CEST
2028

adding as trusted cert:

Subject: OU=Equifax Secure eBusiness CA-2, O=Equifax Secure, C=US

Issuer: OU=Equifax Secure eBusiness CA-2, O=Equifax Secure, C=US

Algorithm: RSA; Serial number: 0x3770cfb5

Valid from Wed Jun 23 14:14:45 CEST 1999 until Sun Jun 23 14:14:45 CEST
2019

adding as trusted cert:

Subject: CN=Equifax Secure eBusiness CA-1, O=Equifax Secure Inc., C=US

Issuer: CN=Equifax Secure eBusiness CA-1, O=Equifax Secure Inc., C=US

Algorithm: RSA; Serial number: 0x4

Valid from Mon Jun 21 06:00:00 CEST 1999 until Sun Jun 21 06:00:00 CEST
2020

adding as trusted cert:

Subject: EMAILADDRESS=personal-freemail@thawte.com, CN=Thawte Personal
Freemail CA, OU=Certification Services Division, O=Thawte Consulting,
L=Cape Town, ST=Western Cape, C=ZA

Issuer: EMAILADDRESS=personal-freemail@thawte.com, CN=Thawte Personal
Freemail CA, OU=Certification Services Division, O=Thawte Consulting,
L=Cape Town, ST=Western Cape, C=ZA

Algorithm: RSA; Serial number: 0x0

Valid from Mon Jan 01 01:00:00 CET 1996 until Fri Jan 01 00:59:59 CET
2021

adding as trusted cert:

Subject: OU=Class 1 Public Primary Certification Authority, O="VeriSign,
Inc.", C=US

Issuer: OU=Class 1 Public Primary Certification Authority, O="VeriSign,
Inc.", C=US

Algorithm: RSA; Serial number: 0xcdba7f56f0dfe4bc54fe22acb372aa55

Valid from Mon Jan 29 01:00:00 CET 1996 until Wed Aug 02 01:59:59 CEST
2028

adding as trusted cert:

Subject: CN=GTE CyberTrust Root 5, OU="GTE CyberTrust Solutions, Inc.",
O=GTE Corporation, C=US

Issuer: CN=GTE CyberTrust Root 5, OU="GTE CyberTrust Solutions, Inc.",
O=GTE Corporation, C=US

Algorithm: RSA; Serial number: 0x1b6

Valid from Fri Aug 14 16:50:00 CEST 1998 until Thu Aug 15 01:59:00 CEST
2013

adding as trusted cert:

Subject: CN=DigiCert Assured ID Root CA, OU=www.digicert.com, O=DigiCert
Inc, C=US

Issuer: CN=DigiCert Assured ID Root CA, OU=www.digicert.com, O=DigiCert
Inc, C=US

Algorithm: RSA; Serial number: 0xce7e0e517d846fe8fe560fc1bf03039

Valid from Fri Nov 10 01:00:00 CET 2006 until Mon Nov 10 01:00:00 CET
2031

adding as trusted cert:

Subject: CN=UTN-USERFirst-Object, OU=http://www.usertrust.com, O=The
USERTRUST Network, L=Salt Lake City, ST=UT, C=US

Issuer: CN=UTN-USERFirst-Object, OU=http://www.usertrust.com, O=The
USERTRUST Network, L=Salt Lake City, ST=UT, C=US

Algorithm: RSA; Serial number: 0x44be0c8b500024b411d3362de0b35f1b

Valid from Fri Jul 09 20:31:20 CEST 1999 until Tue Jul 09 20:40:36 CEST
2019

adding as trusted cert:

Subject: CN=GlobalSign, O=GlobalSign, OU=GlobalSign Root CA - R2

Issuer: CN=GlobalSign, O=GlobalSign, OU=GlobalSign Root CA - R2

Algorithm: RSA; Serial number: 0x400000000010f8626e60d

Valid from Fri Dec 15 09:00:00 CET 2006 until Wed Dec 15 09:00:00 CET
2021

adding as trusted cert:

Subject: CN=Entrust.net Client Certification Authority, OU=(c) 1999
Entrust.net Limited, OU=www.entrust.net/Client_CA_Info/CPS incorp. by
ref. limits liab., O=Entrust.net, C=US

Issuer: CN=Entrust.net Client Certification Authority, OU=(c) 1999
Entrust.net Limited, OU=www.entrust.net/Client_CA_Info/CPS incorp. by
ref. limits liab., O=Entrust.net, C=US

Algorithm: RSA; Serial number: 0x380391ee

Valid from Tue Oct 12 21:24:30 CEST 1999 until Sat Oct 12 21:54:30 CEST
2019

adding as trusted cert:

Subject: CN=VeriSign Class 2 Public Primary Certification Authority -
G3, OU="(c) 1999 VeriSign, Inc. - For authorized use only", OU=VeriSign
Trust Network, O="VeriSign, Inc.", C=US

Issuer: CN=VeriSign Class 2 Public Primary Certification Authority - G3,
OU="(c) 1999 VeriSign, Inc. - For authorized use only", OU=VeriSign
Trust Network, O="VeriSign, Inc.", C=US

Algorithm: RSA; Serial number: 0x6170cb498c5f984529e7b0a6d9505b7a

Valid from Fri Oct 01 02:00:00 CEST 1999 until Thu Jul 17 01:59:59 CEST
2036

adding as trusted cert:

Subject: OU=Class 2 Public Primary Certification Authority, O="VeriSign,
Inc.", C=US

Issuer: OU=Class 2 Public Primary Certification Authority, O="VeriSign,
Inc.", C=US

Algorithm: RSA; Serial number: 0x2d1bfc4a178da391ebe7fff58b45be0b

Valid from Mon Jan 29 01:00:00 CET 1996 until Wed Aug 02 01:59:59 CEST
2028

adding as trusted cert:

Subject: CN=Sonera Class2 CA, O=Sonera, C=FI

Issuer: CN=Sonera Class2 CA, O=Sonera, C=FI

Algorithm: RSA; Serial number: 0x1d

Valid from Fri Apr 06 09:29:40 CEST 2001 until Tue Apr 06 09:29:40 CEST
2021

adding as trusted cert:

Subject: CN=Entrust.net Certification Authority (2048), OU=(c) 1999
Entrust.net Limited, OU=www.entrust.net/CPS_2048 incorp. by ref. (limits
liab.), O=Entrust.net

Issuer: CN=Entrust.net Certification Authority (2048), OU=(c) 1999
Entrust.net Limited, OU=www.entrust.net/CPS_2048 incorp. by ref. (limits
liab.), O=Entrust.net

Algorithm: RSA; Serial number: 0x3863b966

Valid from Fri Dec 24 18:50:51 CET 1999 until Tue Dec 24 19:20:51 CET
2019

adding as trusted cert:

Subject: CN=America Online Root Certification Authority 1, O=America
Online Inc., C=US

Issuer: CN=America Online Root Certification Authority 1, O=America
Online Inc., C=US

Algorithm: RSA; Serial number: 0x1

Valid from Tue May 28 08:00:00 CEST 2002 until Thu Nov 19 21:43:00 CET
2037

adding as trusted cert:

Subject: CN=Equifax Secure Global eBusiness CA-1, O=Equifax Secure Inc.,
C=US

Issuer: CN=Equifax Secure Global eBusiness CA-1, O=Equifax Secure Inc.,
C=US

Algorithm: RSA; Serial number: 0x1

Valid from Mon Jun 21 06:00:00 CEST 1999 until Sun Jun 21 06:00:00 CEST
2020

adding as trusted cert:

Subject: CN=AddTrust Qualified CA Root, OU=AddTrust TTP Network,
O=AddTrust AB, C=SE

Issuer: CN=AddTrust Qualified CA Root, OU=AddTrust TTP Network,
O=AddTrust AB, C=SE

Algorithm: RSA; Serial number: 0x1

Valid from Tue May 30 12:44:50 CEST 2000 until Sat May 30 12:44:50 CEST
2020

adding as trusted cert:

Subject: CN=TC TrustCenter Universal CA I, OU=TC TrustCenter Universal
CA, O=TC TrustCenter GmbH, C=DE

Issuer: CN=TC TrustCenter Universal CA I, OU=TC TrustCenter Universal
CA, O=TC TrustCenter GmbH, C=DE

Algorithm: RSA; Serial number: 0x1da200010002ecb76080788db606

Valid from Wed Mar 22 16:54:28 CET 2006 until Wed Dec 31 23:59:59 CET
2025

adding as trusted cert:

Subject: CN=DigiCert Global Root CA, OU=www.digicert.com, O=DigiCert
Inc, C=US

Issuer: CN=DigiCert Global Root CA, OU=www.digicert.com, O=DigiCert Inc,
C=US

Algorithm: RSA; Serial number: 0x83be056904246b1a1756ac95991c74a

Valid from Fri Nov 10 01:00:00 CET 2006 until Mon Nov 10 01:00:00 CET
2031

adding as trusted cert:

Subject: OU=VeriSign Trust Network, OU="(c) 1998 VeriSign, Inc. - For
authorized use only", OU=Class 1 Public Primary Certification Authority
- G2, O="VeriSign, Inc.", C=US

Issuer: OU=VeriSign Trust Network, OU="(c) 1998 VeriSign, Inc. - For
authorized use only", OU=Class 1 Public Primary Certification Authority
- G2, O="VeriSign, Inc.", C=US

Algorithm: RSA; Serial number: 0x4cc7eaaa983e71d39310f83d3a899192

Valid from Mon May 18 02:00:00 CEST 1998 until Wed Aug 02 01:59:59 CEST
2028

adding as trusted cert:

Subject: CN=UTN-USERFirst-Client Authentication and Email,
OU=http://www.usertrust.com, O=The USERTRUST Network, L=Salt Lake City,
ST=UT, C=US

Issuer: CN=UTN-USERFirst-Client Authentication and Email,
OU=http://www.usertrust.com, O=The USERTRUST Network, L=Salt Lake City,
ST=UT, C=US

Algorithm: RSA; Serial number: 0x44be0c8b500024b411d336252567c989

Valid from Fri Jul 09 19:28:50 CEST 1999 until Tue Jul 09 19:36:58 CEST
2019

init context

trigger seeding of SecureRandom

done seeding SecureRandom

instantiated an instance of class
com.sun.net.ssl.internal.ssl.SSLSocketFactoryImpl

main, setSoTimeout(0) called

main, setSoTimeout(0) called

[Mrz 11 01:27:17] DEBUG (HttpMethodBase.java:1079) - enter
HttpMethodBase.execute(HttpState, HttpConnection)

[Mrz 11 01:27:18] DEBUG (HttpMethodBase.java:2057) - enter
HttpMethodBase.writeRequest(HttpState, HttpConnection)

[Mrz 11 01:27:19] DEBUG (HttpMethodBase.java:2212) - enter
HttpMethodBase.writeRequestLine(HttpState, HttpConnection)

[Mrz 11 01:27:20] DEBUG (HttpMethodBase.java:1496) - enter
HttpMethodBase.generateRequestLine(HttpConnection, String, String,
String, String)

[Mrz 11 01:27:21] DEBUG (Wire.java:70) - >> "POST
/loginsession.php?loggingIn=true HTTP/1.1[\r][\n]"

[Mrz 11 01:27:22] DEBUG (HttpConnection.java:1032) - enter
HttpConnection.print(String)

[Mrz 11 01:27:24] DEBUG (HttpConnection.java:942) - enter
HttpConnection.write(byte[])

[Mrz 11 01:27:25] DEBUG (HttpConnection.java:963) - enter
HttpConnection.write(byte[], int, int)

[Mrz 11 01:27:26] DEBUG (HttpMethodBase.java:2175) - enter
HttpMethodBase.writeRequestHeaders(HttpState,HttpConnection)

[Mrz 11 01:27:27] DEBUG (EntityEnclosingMethod.java:370) - enter
EntityEnclosingMethod.addRequestHeaders(HttpState, HttpConnection)

[Mrz 11 01:27:28] DEBUG (ExpectContinueMethod.java:183) - enter
ExpectContinueMethod.addRequestHeaders(HttpState, HttpConnection)

[Mrz 11 01:27:29] DEBUG (HttpMethodBase.java:1417) - enter
HttpMethodBase.addRequestHeaders(HttpState, HttpConnection)

[Mrz 11 01:27:30] DEBUG (HttpMethodBase.java:1442) - enter
HttpMethodBase.addUserAgentRequestHeaders(HttpState, HttpConnection)

[Mrz 11 01:27:31] DEBUG (HttpMethodBase.java:1328) - enter
HttpMethodBase.addHostRequestHeader(HttpState, HttpConnection)

[Mrz 11 01:27:32] DEBUG (HttpMethodBase.java:1352) - Adding Host request
header

[Mrz 11 01:27:33] DEBUG (HttpMethodBase.java:1266) - enter
HttpMethodBase.addCookieRequestHeader(HttpState, HttpConnection)

[Mrz 11 01:27:34] DEBUG (HttpState.java:173) - enter
HttpState.getCookies()

[Mrz 11 01:27:35] DEBUG (CookieSpecBase.java:549) - enter
CookieSpecBase.match(String, int, String, boolean, Cookie[])

[Mrz 11 01:27:36] DEBUG (HttpMethodBase.java:1379) - enter
HttpMethodBase.addProxyConnectionHeader(HttpState, HttpConnection)

[Mrz 11 01:27:37] DEBUG (EntityEnclosingMethod.java:401) - enter
EntityEnclosingMethod.addContentLengthRequestHeader(HttpState,
HttpConnection)

[Mrz 11 01:27:38] DEBUG (EntityEnclosingMethod.java:325) - enter
EntityEnclosingMethod.getRequestContentLength()

[Mrz 11 01:27:39] DEBUG (PostMethod.java:135) - enter
PostMethod.hasRequestContent()

[Mrz 11 01:27:40] DEBUG (PostMethod.java:240) - enter
PostMethod.getParameters()

[Mrz 11 01:27:41] DEBUG (HttpMethodBase.java:2324) - enter
getContentCharSet( Header contentheader )

[Mrz 11 01:27:42] DEBUG (HttpMethodBase.java:2342) - Default charset
used: ISO-8859-1

[Mrz 11 01:27:43] DEBUG (HttpMethodBase.java:386) -
HttpMethodBase.addRequestHeader(Header)

[Mrz 11 01:27:44] DEBUG (PostMethod.java:240) - enter
PostMethod.getParameters()

[Mrz 11 01:27:45] DEBUG (HttpMethodBase.java:2324) - enter
getContentCharSet( Header contentheader )

[Mrz 11 01:27:46] DEBUG (HeaderElement.java:238) - enter
HeaderElement.parseElements(String)

[Mrz 11 01:27:47] DEBUG (HeaderElement.java:194) - enter
HeaderElement.parseElements(char[])

[Mrz 11 01:27:48] DEBUG (HeaderElement.java:279) - enter
HeaderElement.getParameterByName(String)

[Mrz 11 01:27:49] DEBUG (HttpMethodBase.java:2342) - Default charset
used: ISO-8859-1

[Mrz 11 01:27:50] DEBUG (Wire.java:70) - >> "User-Agent: Jakarta
Commons-HttpClient/3.1[\r][\n]"

[Mrz 11 01:27:51] DEBUG (HttpConnection.java:1032) - enter
HttpConnection.print(String)

[Mrz 11 01:27:52] DEBUG (HttpConnection.java:942) - enter
HttpConnection.write(byte[])

[Mrz 11 01:27:53] DEBUG (HttpConnection.java:963) - enter
HttpConnection.write(byte[], int, int)

[Mrz 11 01:27:54] DEBUG (Wire.java:70) - >> "Host:
www.elog.esa.int[\r][\n]"

[Mrz 11 01:27:55] DEBUG (HttpConnection.java:1032) - enter
HttpConnection.print(String)

[Mrz 11 01:27:56] DEBUG (HttpConnection.java:942) - enter
HttpConnection.write(byte[])

[Mrz 11 01:27:57] DEBUG (HttpConnection.java:963) - enter
HttpConnection.write(byte[], int, int)

[Mrz 11 01:27:58] DEBUG (Wire.java:70) - >> "Content-Length:
132[\r][\n]"

[Mrz 11 01:27:59] DEBUG (HttpConnection.java:1032) - enter
HttpConnection.print(String)

[Mrz 11 01:28:00] DEBUG (HttpConnection.java:942) - enter
HttpConnection.write(byte[])

[Mrz 11 01:28:01] DEBUG (HttpConnection.java:963) - enter
HttpConnection.write(byte[], int, int)

[Mrz 11 01:28:02] DEBUG (Wire.java:70) - >> "Content-Type:
application/x-www-form-urlencoded[\r][\n]"

[Mrz 11 01:28:03] DEBUG (HttpConnection.java:1032) - enter
HttpConnection.print(String)

[Mrz 11 01:28:04] DEBUG (HttpConnection.java:942) - enter
HttpConnection.write(byte[])

[Mrz 11 01:28:05] DEBUG (HttpConnection.java:963) - enter
HttpConnection.write(byte[], int, int)

[Mrz 11 01:28:06] DEBUG (HttpConnection.java:1001) - enter
HttpConnection.writeLine()

[Mrz 11 01:28:07] DEBUG (HttpConnection.java:942) - enter
HttpConnection.write(byte[])

[Mrz 11 01:28:08] DEBUG (HttpConnection.java:963) - enter
HttpConnection.write(byte[], int, int)

[Mrz 11 01:28:09] DEBUG (Wire.java:70) - >> "[\r][\n]"

[Mrz 11 01:28:11] DEBUG (EntityEnclosingMethod.java:469) - enter
EntityEnclosingMethod.writeRequestBody(HttpState, HttpConnection)

[Mrz 11 01:28:12] DEBUG (PostMethod.java:135) - enter
PostMethod.hasRequestContent()

[Mrz 11 01:28:13] DEBUG (EntityEnclosingMethod.java:325) - enter
EntityEnclosingMethod.getRequestContentLength()

[Mrz 11 01:28:14] DEBUG (PostMethod.java:135) - enter
PostMethod.hasRequestContent()

[Mrz 11 01:28:15] DEBUG (HttpConnection.java:840) - enter
HttpConnection.getRequestOutputStream()

[Mrz 11 01:28:16] DEBUG (Wire.java:84) - >>
"action=Login&url=https%3A%2F%2Felog.esa.int%2Floginsession.php%3Floggin
gIn%3Dtrue&userid=XXX&userpassword=XXX&requesteddb=0-1"

%% No cached client session

*** ClientHello, TLSv1

RandomCookie: GMT: 1219953825 bytes = { 197, 238, 62, 47, 43, 90, 41,
142, 92, 21, 203, 44, 246, 176, 147, 170, 93, 68, 166, 213, 133, 179,
197, 123, 91, 215, 104, 42 }

Session ID: {}

Cipher Suites: [SSL_RSA_WITH_RC4_128_MD5, SSL_RSA_WITH_RC4_128_SHA,
TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA,
TLS_DHE_DSS_WITH_AES_128_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA,
SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA,
SSL_RSA_WITH_DES_CBC_SHA, SSL_DHE_RSA_WITH_DES_CBC_SHA,
SSL_DHE_DSS_WITH_DES_CBC_SHA, SSL_RSA_EXPORT_WITH_RC4_40_MD5,
SSL_RSA_EXPORT_WITH_DES40_CBC_SHA,
SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA,
SSL_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA]

Compression Methods: { 0 }

***

main, WRITE: TLSv1 Handshake, length = 73

main, WRITE: SSLv2 client hello message, length = 98

main, READ: TLSv1 Handshake, length = 74

*** ServerHello, TLSv1

RandomCookie: GMT: 1219953824 bytes = { 13, 222, 112, 116, 22, 213, 193,
121, 250, 93, 184, 113, 255, 63, 154, 123, 115, 185, 34, 229, 176, 61,
225, 169, 236, 44, 240, 87 }

Session ID: {106, 87, 48, 158, 132, 133, 129, 192, 136, 89, 21, 106, 78,
18, 167, 104, 56, 50, 34, 167, 97, 228, 37, 8, 241, 97, 15, 62, 100,
220, 231, 6}

Cipher Suite: SSL_RSA_WITH_RC4_128_MD5

Compression Method: 0

***

%% Created: [Session-1, SSL_RSA_WITH_RC4_128_MD5]

** SSL_RSA_WITH_RC4_128_MD5

main, READ: TLSv1 Handshake, length = 558

*** Certificate chain

chain [0] = [

[

Version: V1

Subject: CN=www.elog.esa.int, O=ESA, L=Darmstadt, ST=Some-State, C=DE

Signature Algorithm: MD5withRSA, OID = 1.2.840.113549.1.1.4

Key: Sun RSA public key, 1024 bits

modulus:
142242551400285899952587951175998787444772961195627321446593588266628620
455304358372383015596684825506365566225165398999073212971638704001620981
986557458587815296686364969003570623618977043788003276925828947672824471
082577569444102633445144935030614557665540113575904364683783832253943576
653441766159674598643

public exponent: 65537

Validity: [From: Wed Feb 20 11:55:58 CET 2008,

To: Thu Feb 19 11:55:58 CET 2009]

Issuer: CN=ESA, O=ESA, L=Darmstadt, ST=Some-State, C=DE

SerialNumber: [ 02]

]

Algorithm: [MD5withRSA]

Signature:

0000: 0D 8A C0 92 FD 77 AC 2D 35 45 8D 06 45 C2 EE 19 .....w.-5E..E...

0010: A7 88 C2 C6 47 16 E2 70 F9 89 F3 F5 78 E9 AD B3 ....G..p....x...

0020: 02 E7 B3 C6 88 33 A9 57 8C AD 15 2C 1B 6D AB 39 .....3.W...,.m.9

0030: DF 6E FB 6C 11 6B 0F 6F 73 FA 4E F1 F5 41 FD 70 .n.l.k.os.N..A.p

0040: DF D6 41 C1 64 0B 9A D9 4E 20 7A 02 13 3A 05 92 ..A.d...N z..:..

0050: 71 0F 66 B6 0C 34 F2 2A B3 E9 1B 4E 93 85 56 F7 q.f..4.*...N..V.

0060: 07 AE 25 20 CF 01 2E D1 2E D4 C3 48 3D E6 A4 4D ..% .......H=..M

0070: 5C 92 72 AB D4 48 E7 B2 2B 46 ED BE C0 43 B0 4A \.r..H..+F...C.J

]

***

main, SEND TLSv1 ALERT: fatal, description = certificate_unknown

main, WRITE: TLSv1 Alert, length = 2

main, called closeSocket()

main, handling exception: javax.net.ssl.SSLHandshakeException:
sun.security.validator.ValidatorException: PKIX path building failed:
sun.security.provider.certpath.SunCertPathBuilderException: unable to
find valid certification path to requested target

[Mrz 11 01:28:17] DEBUG (HttpMethodDirector.java:404) - Closing the
connection.

[Mrz 11 01:28:18] DEBUG (HttpConnection.java:1148) - enter
HttpConnection.close()

[Mrz 11 01:28:19] DEBUG (HttpConnection.java:1215) - enter
HttpConnection.closeSockedAndStreams()

main, called close()

main, called closeInternal(true)

main, called close()

main, called closeInternal(true)

main, called close()

main, called closeInternal(true)

[Mrz 11 01:28:20] DEBUG (HttpMethodDirector.java:434) - Method retry
handler returned false. Automatic recovery will not be attempted

[Mrz 11 01:28:21] DEBUG (HttpConnection.java:1174) - enter
HttpConnection.releaseConnection()

[Mrz 11 01:28:22] DEBUG (HttpConnection.java:1178) - Releasing
connection back to connection manager.

javax.net.ssl.SSLHandshakeException:
sun.security.validator.ValidatorException: PKIX path building failed:
sun.security.provider.certpath.SunCertPathBuilderException: unable to
find valid certification path to requested target

at com.sun.net.ssl.internal.ssl.Alerts.getSSLException(Alerts.java:150)

at
com.sun.net.ssl.internal.ssl.SSLSocketImpl.fatal(SSLSocketImpl.java:1584
)

at com.sun.net.ssl.internal.ssl.Handshaker.fatalSE(Handshaker.java:174)

at com.sun.net.ssl.internal.ssl.Handshaker.fatalSE(Handshaker.java:168)

at
com.sun.net.ssl.internal.ssl.ClientHandshaker.serverCertificate(ClientHa
ndshaker.java:848)

at
com.sun.net.ssl.internal.ssl.ClientHandshaker.processMessage(ClientHands
haker.java:106)

at
com.sun.net.ssl.internal.ssl.Handshaker.processLoop(Handshaker.java:495)

at
com.sun.net.ssl.internal.ssl.Handshaker.process_record(Handshaker.java:4
33)

at
com.sun.net.ssl.internal.ssl.SSLSocketImpl.readRecord(SSLSocketImpl.java
:877)

at
com.sun.net.ssl.internal.ssl.SSLSocketImpl.performInitialHandshake(SSLSo
cketImpl.java:1089)

at
com.sun.net.ssl.internal.ssl.SSLSocketImpl.writeRecord(SSLSocketImpl.jav
a:618)

at
com.sun.net.ssl.internal.ssl.AppOutputStream.write(AppOutputStream.java:
59)

at
java.io.BufferedOutputStream.flushBuffer(BufferedOutputStream.java:65)

at java.io.BufferedOutputStream.flush(BufferedOutputStream.java:123)

at java.io.FilterOutputStream.flush(FilterOutputStream.java:123)

at
org.apache.commons.httpclient.methods.EntityEnclosingMethod.writeRequest
Body(EntityEnclosingMethod.java:506)

at
org.apache.commons.httpclient.HttpMethodBase.writeRequest(HttpMethodBase
.java:2114)

at
org.apache.commons.httpclient.HttpMethodBase.execute(HttpMethodBase.java
:1096)

at
org.apache.commons.httpclient.HttpMethodDirector.executeWithRetry(HttpMe
thodDirector.java:398)

at
org.apache.commons.httpclient.HttpMethodDirector.executeMethod(HttpMetho
dDirector.java:171)

at
org.apache.commons.httpclient.HttpClient.executeMethod(HttpClient.java:3
97)

at
org.apache.commons.httpclient.HttpClient.executeMethod(HttpClient.java:3
23)

at org.esa.eeis.CrawlerContext.openConnection2(CrawlerContext.java:115)

at
org.esa.eeis.CrawlerContextTest.testOpenConnection2(CrawlerContextTest.j
ava:14)

at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)

at
sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.jav
a:39)

at
sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessor
Impl.java:25)

at java.lang.reflect.Method.invoke(Method.java:585)

at junit.framework.TestCase.runTest(TestCase.java:164)

at junit.framework.TestCase.runBare(TestCase.java:130)

at junit.framework.TestResult$1.protect(TestResult.java:106)

at junit.framework.TestResult.runProtected(TestResult.java:124)

at junit.framework.TestResult.run(TestResult.java:109)

at junit.framework.TestCase.run(TestCase.java:120)

at junit.framework.TestSuite.runTest(TestSuite.java:230)

at junit.framework.TestSuite.run(TestSuite.java:225)

at
org.eclipse.jdt.internal.junit.runner.junit3.JUnit3TestReference.run(JUn
it3TestReference.java:130)

at
org.eclipse.jdt.internal.junit.runner.TestExecution.run(TestExecution.ja
va:38)

at
org.eclipse.jdt.internal.junit.runner.RemoteTestRunner.runTests(RemoteTe
stRunner.java:460)

at
org.eclipse.jdt.internal.junit.runner.RemoteTestRunner.runTests(RemoteTe
stRunner.java:673)

at
org.eclipse.jdt.internal.junit.runner.RemoteTestRunner.run(RemoteTestRun
ner.java:386)

at
org.eclipse.jdt.internal.junit.runner.RemoteTestRunner.main(RemoteTestRu
nner.java:196)

Caused by: sun.security.validator.ValidatorException: PKIX path building
failed: sun.security.provider.certpath.SunCertPathBuilderException:
unable to find valid certification path to requested target

at sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:221)

at
sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:1
45)

at sun.security.validator.Validator.validate(Validator.java:203)

at
com.sun.net.ssl.internal.ssl.X509TrustManagerImpl.checkServerTrusted(X50
9TrustManagerImpl.java:172)

at
com.sun.net.ssl.internal.ssl.JsseX509TrustManager.checkServerTrusted(SSL
ContextImpl.java:320)

at
com.sun.net.ssl.internal.ssl.ClientHandshaker.serverCertificate(ClientHa
ndshaker.java:841)

... 37 more

Caused by: sun.security.provider.certpath.SunCertPathBuilderException:
unable to find valid certification path to requested target

at
sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPat
hBuilder.java:236)

at java.security.cert.CertPathBuilder.build(CertPathBuilder.java:194)

at sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:216)

... 42 more

 



Please help Logica to respect the environment by not printing this email  /  Merci d'aider Logica à préserver l'environnement en évitant d'imprimer ce mail /  Bitte drucken Sie diese Nachricht nicht aus und helfen Sie so Logica dabei die Umwelt zu schuetzen  /  Por favor ajude a Logica a respeitar o ambiente não imprimindo este correio electrónico.



This e-mail and any attachment is for authorised use by the intended recipient(s) only. It may contain proprietary material, confidential information and/or be subject to legal privilege. It should not be copied, disclosed to, retained or used by, any other party. If you are not an intended recipient then please promptly delete this e-mail and any attachment and all copies and inform the sender. Thank you.


Mime
  • Unnamed multipart/alternative (inline, None, 0 bytes)
View raw message