hc-httpclient-users mailing list archives

Site index · List index
Message view « Date » · « Thread »
Top « Date » · « Thread »
From Fang Lin <Fang...@u.washington.edu>
Subject RE: handshake_failure when upgrading from httpclient 3.6 to 4.1.1.
Date Wed, 06 Jul 2011 18:58:11 GMT
As the attachment didn't show up, here is the selected ssl debug log:

trustStore is: /usr/local/java/jre/lib/security/cacerts
trustStore type is : jks
trustStore provider is : 
init truststore
adding as trusted cert:
......

trigger seeding of SecureRandom
done seeding SecureRandom
executing request to https://host.washington.edu:443
main, setSoTimeout(0) called
Allow unsafe renegotiation: false
Allow legacy hello messages: true
Is initial handshake: true
Is secure renegotiation: false
%% No cached client session
*** ClientHello, TLSv1
RandomCookie: ...
Session ID:   {}
Cipher Suite: [.....]
Compression Method: {0}
***
main, WRITE: TLSv1 Handshake, length = 75
main, WRITE: SSLv2 client hello message, length = 101
main, READ: TLSv1 Handshake, length = 81
*** ServerHello, TLSv1
RandomCookie:  ...
Session ID:  ...
Cipher Suite: SSL_RSA_WITH_RC4_128_MD5
Compression Method: 0
Extension renegotiation_info, renegotiated_connection: <empty>
***
%% Created:  [Session-1, SSL_RSA_WITH_RC4_128_MD5]
** SSL_RSA_WITH_RC4_128_MD5
main, READ: TLSv1 Handshake, length = 4686
*** Certificate chain
......

main, READ: TLSv1 Handshake, length = 4
*** ServerHelloDone
*** ClientKeyExchange, RSA PreMasterSecret, TLSv1
main, WRITE: TLSv1 Handshake, length = 262
SESSION KEYGEN:
PreMaster Secret:
0000: 03 01 06 1C 96 4B 14 96   DE 0C B2 12 4F 2F E4 D3  .....K......O/..
0010: 8E 1B B0 BF C6 3D 46 96   ED 03 2A 3D 1C 47 06 65  .....=F...*=.G.e
0020: 5A 10 74 FE 69 A4 C0 F7   FD 38 11 66 3B FF 59 4E  Z.t.i....8.f;.YN
CONNECTION KEYGEN:
Client Nonce:
0000: 4E 14 9B 1B 47 07 9F 93   3F 11 DF F6 2B AB 30 D4  N...G...?...+.0.
0010: 25 D8 E4 56 D6 82 52 CE   58 96 83 08 F1 C5 B2 16  %..V..R.X.......
Server Nonce:
0000: 4E 14 9B 1B A7 7B 10 66   03 E9 BD D5 AD F9 7D 02  N......f........
0010: BF 7E 9E BE 6C 78 B0 28   99 F1 25 BA FB ED DF 3D  ....lx.(..%....=
Master Secret:
0000: 46 C2 6D 38 3F CB 49 E1   60 4D F8 66 69 BB E6 2A  F.m8?.I.`M.fi..*
0010: 97 0E 73 AA 8D 43 D5 73   81 93 B6 3A 5D B4 0C 1C  ..s..C.s...:]...
0020: 50 A0 6B 7C 13 DF 66 48   A1 CC C2 6B 6C F8 5D 47  P.k...fH...kl.]G
Client MAC write Secret:
0000: 95 AD EA C3 17 6C BA 87   E2 5B 1F 4B EF 73 30 55  .....l...[.K.s0U
Server MAC write Secret:
0000: FC 28 3F A7 86 03 EC 89   27 C3 B8 B3 58 7E B0 9B  .(?.....'...X...
Client write key:
0000: 6D CD 89 0F E5 7C 82 F4   9F E4 98 03 05 75 5F 0D  m............u_.
Server write key:
0000: 94 91 00 DB C8 C3 37 11   3F 15 6A 1E DC 9B DA 1C  ......7.?.j.....
... no IV used for this cipher
main, WRITE: TLSv1 Change Cipher Spec, length = 1
*** Finished
verify_data:  { 133, 39, 57, 194, 44, 158, 23, 95, 52, 185, 122, 87 }
***
main, WRITE: TLSv1 Handshake, length = 32
main, READ: TLSv1 Change Cipher Spec, length = 1
main, READ: TLSv1 Handshake, length = 32
*** Finished
verify_data:  { 51, 119, 115, 104, 234, 28, 122, 207, 249, 210, 75, 140 }
***
%% Cached client session: [Session-1, SSL_RSA_WITH_RC4_128_MD5]
main, setSoTimeout(0) called
main, WRITE: TLSv1 Application Data, length = 199
main, READ: TLSv1 Handshake, length = 20
Allow unsafe renegotiation: false
Allow legacy hello messages: true
Is initial handshake: false
Is secure renegotiation: true
*** HelloRequest (empty)
%% Client cached [Session-1, SSL_RSA_WITH_RC4_128_MD5]
%% Try resuming [Session-1, SSL_RSA_WITH_RC4_128_MD5] from port 39403
*** ClientHello, TLSv1
RandomCookie:  ...
Cipher Suites: ...
Compression Methods:  { 0 }
Extension renegotiation_info, renegotiated_connection: 85:27:39:c2:2c:9e:17:5f:34:b9:7a:57
***
main, WRITE: TLSv1 Handshake, length = 140
main, READ: TLSv1 Handshake, length = 121
*** ServerHello, TLSv1
RandomCookie:  GMT: ...
Session ID:  ...
Cipher Suite: SSL_RSA_WITH_RC4_128_MD5
Compression Method: 0
Extension renegotiation_info, renegotiated_connection: 85:27:39:c2:2c:9e:17:5f:3
4:b9:7a:57:33:77:73:68:ea:1c:7a:cf:f9:d2:4b:8c
***
%% Created:  [Session-2, SSL_RSA_WITH_RC4_128_MD5]
** SSL_RSA_WITH_RC4_128_MD5
main, READ: TLSv1 Handshake, length = 4702
*** Certificate chain
......

main, READ: TLSv1 Handshake, length = 16400
main, READ: TLSv1 Handshake, length = 596
*** CertificateRequest
Cert Types: RSA, DSS
Cert Authorities:
......


<SERIALNUMBER=07969287, CN=Go Daddy Secure Certification Authority, OU=http://certificates.godaddy.com/repository,
O="GoDaddy.com, Inc.", L=Scottsdale, ST=Arizona, C=US>
*** ServerHelloDone
*** Certificate chain
***
*** ClientKeyExchange, RSA PreMasterSecret, TLSv1
main, WRITE: TLSv1 Handshake, length = 285
SESSION KEYGEN:
PreMaster Secret:
0000: 03 01 FD E8 4E 7F BC D1   83 3F 14 E2 16 87 07 6C  ....N....?.....l
0010: 13 23 62 F8 2C 08 5D 78   A2 5B 73 54 79 C3 65 7C  .#b.,.]x.[sTy.e.
0020: 3D 2F 4A F8 32 F6 13 78   E6 BF 4B F6 E4 16 5C 60  =/J.2..x..K...\`
CONNECTION KEYGEN:
Client Nonce:
0000: 4E 14 9B 1B 73 31 A0 80   69 74 59 96 51 E4 FC 2C  N...s1..itY.Q..,
0010: 30 F8 53 DF 74 C5 9F 92   C3 9F D8 F7 C9 A4 D3 DD  0.S.t...........
Server Nonce:
0000: 4E 14 9B 1B 42 BB 30 C5   70 40 FA 12 98 EF D6 B5  N...B.0.p@......
0010: A3 B2 F4 44 38 B3 0C FB   D5 81 33 F5 90 13 FF 74  ...D8.....3....t
Master Secret:
0000: 92 60 8D F1 4A AD 19 66   E2 F9 40 74 6D 4B 05 83  .`..J..f..@tmK..
0010: 5C CB A8 F2 92 93 45 6B   A7 BA 47 63 DD B8 62 B9  \.....Ek..Gc..b.
0020: 03 8E 15 5D CF 1D 44 27   BC 2C 3D D2 9B 15 BB 9A  ...]..D'.,=.....
Client MAC write Secret:
0000: 36 D7 66 31 1A 9A 94 90   DC 78 FF 79 24 4F 8A 41  6.f1.....x.y$O.A
Server MAC write Secret:
0000: CA B8 55 79 7E 30 63 46   CE D7 39 EA DC 28 F3 5E  ..Uy.0cF..9..(.^
Client write key:
0000: BC C6 BA 87 C1 AE AB 11   68 F4 DD 44 A1 56 75 D2  ........h..D.Vu.
Server write key:
0000: 18 E3 75 86 F4 90 E4 21   98 76 78 73 4C 9E 61 41  ..u....!.vxsL.aA
... no IV used for this cipher
main, WRITE: TLSv1 Change Cipher Spec, length = 17
*** Finished
verify_data:  { 123, 61, 187, 40, 255, 114, 133, 66, 203, 163, 143, 205 }
***
main, WRITE: TLSv1 Handshake, length = 32
main, READ: TLSv1 Alert, length = 18
main, RECV TLSv1 ALERT:  fatal, handshake_failure
%% Invalidated:  [Session-1, SSL_RSA_WITH_RC4_128_MD5]
main, called closeSocket()
main, handling exception: javax.net.ssl.SSLHandshakeException: Received fatal alert: handshake_failure


Mime
View raw message