Hi,

    Please find the log details.



log4j:WARN No appenders could be found for logger
(org.apache.axis2.deployment.FileSystemConfigurator).

log4j:WARN Please initialize the log4j system properly.

keyStore is :

keyStore type is : jks

init keystore

init keymanager of type SunX509

trustStore is: C:\Program
Files\j2sdk_nb\j2sdk1.4.2\jre\lib\security\cacerts

trustStore type is : jks

init truststore

adding as trusted cert:

Subject: emailaddress=premium-ser...@thawte.com, CN=Thawte Premium
Server CA, OU=Certification Services Division, O=Thawte Consulting cc,
L=Cape Town, ST=Western Cape, C=ZA

Issuer: emailaddress=premium-ser...@thawte.com, CN=Thawte Premium Server
CA, OU=Certification Services Division, O=Thawte Consulting cc, L=Cape
Town, ST=Western Cape, C=ZA

Algorithm: RSA; Serial number: 0x1

Valid from Thu Aug 01 05:30:00 IST 1996 until Fri Jan 01 05:29:59 IST
2021

adding as trusted cert:

Subject: OU=Secure Server Certification Authority, O="RSA Data Security,
Inc.", C=US

Issuer: OU=Secure Server Certification Authority, O="RSA Data Security,
Inc.", C=US

Algorithm: RSA; Serial number: 0x2ad667e4e45fe5e576f3c98195eddc0

Valid from Wed Nov 09 05:30:00 IST 1994 until Fri Jan 08 05:29:59 IST
2010

adding as trusted cert:

Subject: CN=Baltimore CyberTrust Code Signing Root, OU=CyberTrust,
O=Baltimore, C=IE

Issuer: CN=Baltimore CyberTrust Code Signing Root, OU=CyberTrust,
O=Baltimore, C=IE

Algorithm: RSA; Serial number: 0x20000bf

Valid from Wed May 17 19:31:00 IST 2000 until Sun May 18 05:29:00 IST
2025

adding as trusted cert:

Subject: CN=Entrust.net Secure Server Certification Authority, OU=(c)
1999 Entrust.net Limited, OU=www.entrust.net/CPS incorp. by ref. (limits
liab.), O=Entrust.net, C=US

Issuer: CN=Entrust.net Secure Server Certification Authority, OU=(c)
1999 Entrust.net Limited, OU=www.entrust.net/CPS incorp. by ref. (limits
liab.), O=Entrust.net, C=US

Algorithm: RSA; Serial number: 0x374ad243

Valid from Tue May 25 21:39:40 IST 1999 until Sat May 25 22:09:40 IST
2019

adding as trusted cert:

Subject: CN=Baltimore CyberTrust Root, OU=CyberTrust, O=Baltimore, C=IE

Issuer: CN=Baltimore CyberTrust Root, OU=CyberTrust, O=Baltimore, C=IE

Algorithm: RSA; Serial number: 0x20000b9

Valid from Sat May 13 00:16:00 IST 2000 until Tue May 13 05:29:00 IST
2025

adding as trusted cert:

Subject: CN=Entrust.net Client Certification Authority, OU=(c) 2000
Entrust.net Limited, OU=www.entrust.net/GCCA_CPS incorp. by ref. (limits
liab.), O=Entrust.net

Issuer: CN=Entrust.net Client Certification Authority, OU=(c) 2000
Entrust.net Limited, OU=www.entrust.net/GCCA_CPS incorp. by ref. (limits
liab.), O=Entrust.net

Algorithm: RSA; Serial number: 0x389ef6e4

Valid from Mon Feb 07 21:46:40 IST 2000 until Fri Feb 07 22:16:40 IST
2020

adding as trusted cert:

Subject: CN=Entrust.net Client Certification Authority, OU=(c) 1999
Entrust.net Limited, OU=www.entrust.net/Client_CA_Info/CPS incorp. by
ref. limits liab., O=Entrust.net, C=US

Issuer: CN=Entrust.net Client Certification Authority, OU=(c) 1999
Entrust.net Limited, OU=www.entrust.net/Client_CA_Info/CPS incorp. by
ref. limits liab., O=Entrust.net, C=US

Algorithm: RSA; Serial number: 0x380391ee

Valid from Wed Oct 13 00:54:30 IST 1999 until Sun Oct 13 01:24:30 IST
2019

adding as trusted cert:

Subject: CN=GTE CyberTrust Global Root, OU="GTE CyberTrust Solutions,
Inc.", O=GTE Corporation, C=US

Issuer: CN=GTE CyberTrust Global Root, OU="GTE CyberTrust Solutions,
Inc.", O=GTE Corporation, C=US

Algorithm: RSA; Serial number: 0x1a5

Valid from Thu Aug 13 05:59:00 IST 1998 until Tue Aug 14 05:29:00 IST
2018

adding as trusted cert:

Subject: emailaddress=server-ce...@thawte.com, CN=Thawte Server CA,
OU=Certification Services Division, O=Thawte Consulting cc, L=Cape Town,
ST=Western Cape, C=ZA

Issuer: emailaddress=server-ce...@thawte.com, CN=Thawte Server CA,
OU=Certification Services Division, O=Thawte Consulting cc, L=Cape Town,
ST=Western Cape, C=ZA

Algorithm: RSA; Serial number: 0x1

Valid from Thu Aug 01 05:30:00 IST 1996 until Fri Jan 01 05:29:59 IST
2021

adding as trusted cert:

Subject: CN=Entrust.net Certification Authority (2048), OU=(c) 1999
Entrust.net Limited, OU=www.entrust.net/CPS_2048 incorp. by ref. (limits
liab.), O=Entrust.net

Issuer: CN=Entrust.net Certification Authority (2048), OU=(c) 1999
Entrust.net Limited, OU=www.entrust.net/CPS_2048 incorp. by ref. (limits
liab.), O=Entrust.net

Algorithm: RSA; Serial number: 0x3863b966

Valid from Fri Dec 24 23:20:51 IST 1999 until Tue Dec 24 23:50:51 IST
2019

adding as trusted cert:

Subject: emailaddress=personal-ba...@thawte.com, CN=Thawte Personal
Basic CA, OU=Certification Services Division, O=Thawte Consulting,
L=Cape Town, ST=Western Cape, C=ZA

Issuer: emailaddress=personal-ba...@thawte.com, CN=Thawte Personal Basic
CA, OU=Certification Services Division, O=Thawte Consulting, L=Cape
Town, ST=Western Cape, C=ZA

Algorithm: RSA; Serial number: 0x0

Valid from Mon Jan 01 05:30:00 IST 1996 until Fri Jan 01 05:29:59 IST
2021

adding as trusted cert:

Subject: OU=Class 1 Public Primary Certification Authority, O="VeriSign,
Inc.", C=US

Issuer: OU=Class 1 Public Primary Certification Authority, O="VeriSign,
Inc.", C=US

Algorithm: RSA; Serial number: 0x325033cf50d156f35c81ad655c4fc825

Valid from Mon Jan 29 05:30:00 IST 1996 until Wed Jan 08 05:29:59 IST
2020

adding as trusted cert:

Subject: emailaddress=personal-freem...@thawte.com, CN=Thawte Personal
Freemail CA, OU=Certification Services Division, O=Thawte Consulting,
L=Cape Town, ST=Western Cape, C=ZA

Issuer: emailaddress=personal-freem...@thawte.com, CN=Thawte Personal
Freemail CA, OU=Certification Services Division, O=Thawte Consulting,
L=Cape Town, ST=Western Cape, C=ZA

Algorithm: RSA; Serial number: 0x0

Valid from Mon Jan 01 05:30:00 IST 1996 until Fri Jan 01 05:29:59 IST
2021

adding as trusted cert:

Subject: emailaddress=personal-prem...@thawte.com, CN=Thawte Personal
Premium CA, OU=Certification Services Division, O=Thawte Consulting,
L=Cape Town, ST=Western Cape, C=ZA

Issuer: emailaddress=personal-prem...@thawte.com, CN=Thawte Personal
Premium CA, OU=Certification Services Division, O=Thawte Consulting,
L=Cape Town, ST=Western Cape, C=ZA

Algorithm: RSA; Serial number: 0x0

Valid from Mon Jan 01 05:30:00 IST 1996 until Fri Jan 01 05:29:59 IST
2021

adding as trusted cert:

Subject: CN=GTE CyberTrust Root 5, OU="GTE CyberTrust Solutions, Inc.",
O=GTE Corporation, C=US

Issuer: CN=GTE CyberTrust Root 5, OU="GTE CyberTrust Solutions, Inc.",
O=GTE Corporation, C=US

Algorithm: RSA; Serial number: 0x1b6

Valid from Fri Aug 14 20:20:00 IST 1998 until Thu Aug 15 05:29:00 IST
2013

adding as trusted cert:

Subject: CN=Entrust.net Secure Server Certification Authority, OU=(c)
2000 Entrust.net Limited, OU=www.entrust.net/SSL_CPS incorp. by ref.
(limits liab.), O=Entrust.net

Issuer: CN=Entrust.net Secure Server Certification Authority, OU=(c)
2000 Entrust.net Limited, OU=www.entrust.net/SSL_CPS incorp. by ref.
(limits liab.), O=Entrust.net

Algorithm: RSA; Serial number: 0x389b113c

Valid from Fri Feb 04 22:50:00 IST 2000 until Tue Feb 04 23:20:00 IST
2020

init context

trigger seeding of SecureRandom

done seeding SecureRandom

setSoTimeout(30000) called

setSoTimeout(30000) called

%% No cached client session

*** ClientHello, TLSv1

RandomCookie: GMT: 1247027494 bytes = { 136, 79, 14, 66, 180, 150, 227,
235, 101, 74, 178, 137, 71, 219, 217, 81, 196, 64, 211, 28, 232, 227,
153, 177, 191, 238, 91, 22 }

Session ID: {}

Cipher Suites: [SSL_RSA_WITH_RC4_128_MD5, SSL_RSA_WITH_RC4_128_SHA,
TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA,
TLS_DHE_DSS_WITH_AES_128_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA,
SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA,
SSL_RSA_WITH_DES_CBC_SHA, SSL_DHE_RSA_WITH_DES_CBC_SHA,
SSL_DHE_DSS_WITH_DES_CBC_SHA, SSL_RSA_EXPORT_WITH_RC4_40_MD5,
SSL_RSA_EXPORT_WITH_DES40_CBC_SHA,
SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA,
SSL_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA]

Compression Methods: { 0 }

***

main, WRITE: TLSv1 Handshake, length = 73

main, WRITE: SSLv2 client hello message, length = 98

main, received EOFException: error

main, handling exception: javax.net.ssl.SSLHandshakeException: Remote
host closed connection during handshake

main, SEND TLSv1 ALERT: fatal, description = handshake_failure

main, WRITE: TLSv1 Alert, length = 2

main, called closeSocket()

main, called close()

main, called closeInternal(true)

main, called close()

main, called closeInternal(true)

main, called close()

main, called closeInternal(true)

setSoTimeout(30000) called

setSoTimeout(30000) called

%% No cached client session

*** ClientHello, TLSv1

RandomCookie: GMT: 1247027515 bytes = { 214, 208, 32, 152, 215, 64, 2,
137, 76, 53, 16, 58, 202, 136, 78, 151, 99, 234, 225, 98, 227, 35, 254,
87, 2, 186, 67, 112 }

Session ID: {}

Cipher Suites: [SSL_RSA_WITH_RC4_128_MD5, SSL_RSA_WITH_RC4_128_SHA,
TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA,
TLS_DHE_DSS_WITH_AES_128_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA,
SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA,
SSL_RSA_WITH_DES_CBC_SHA, SSL_DHE_RSA_WITH_DES_CBC_SHA,
SSL_DHE_DSS_WITH_DES_CBC_SHA, SSL_RSA_EXPORT_WITH_RC4_40_MD5,
SSL_RSA_EXPORT_WITH_DES40_CBC_SHA,
SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA,
SSL_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA]

Compression Methods: { 0 }

***

main, WRITE: TLSv1 Handshake, length = 73

main, WRITE: SSLv2 client hello message, length = 98

main, received EOFException: error

main, handling exception: javax.net.ssl.SSLHandshakeException: Remote
host closed connection during handshake

main, SEND TLSv1 ALERT: fatal, description = handshake_failure

main, WRITE: TLSv1 Alert, length = 2

main, called closeSocket()

main, called close()

main, called closeInternal(true)

main, called close()

main, called closeInternal(true)

main, called close()

main, called closeInternal(true)

setSoTimeout(30000) called

setSoTimeout(30000) called

%% No cached client session

*** ClientHello, TLSv1

RandomCookie: GMT: 1247027535 bytes = { 77, 100, 237, 121, 220, 113, 7,
37, 221, 68, 196, 122, 73, 190, 235, 16, 213, 63, 161, 0, 164, 9, 109,
103, 171, 119, 218, 14 }

Session ID: {}

Cipher Suites: [SSL_RSA_WITH_RC4_128_MD5, SSL_RSA_WITH_RC4_128_SHA,
TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA,
TLS_DHE_DSS_WITH_AES_128_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA,
SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA,
SSL_RSA_WITH_DES_CBC_SHA, SSL_DHE_RSA_WITH_DES_CBC_SHA,
SSL_DHE_DSS_WITH_DES_CBC_SHA, SSL_RSA_EXPORT_WITH_RC4_40_MD5,
SSL_RSA_EXPORT_WITH_DES40_CBC_SHA,
SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA,
SSL_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA]

Compression Methods: { 0 }

***

main, WRITE: TLSv1 Handshake, length = 73

main, WRITE: SSLv2 client hello message, length = 98

main, received EOFException: error

main, handling exception: javax.net.ssl.SSLHandshakeException: Remote
host closed connection during handshake

main, SEND TLSv1 ALERT: fatal, description = handshake_failure

main, WRITE: TLSv1 Alert, length = 2

main, called closeSocket()

main, called close()

main, called closeInternal(true)

main, called close()

main, called closeInternal(true)

main, called close()

main, called closeInternal(true)

setSoTimeout(30000) called

setSoTimeout(30000) called

%% No cached client session

*** ClientHello, TLSv1

RandomCookie: GMT: 1247027556 bytes = { 72, 155, 36, 206, 72, 219, 174,
115, 179, 235, 116, 75, 204, 62, 120, 9, 100, 9, 180, 203, 183, 104, 65,
89, 228, 85, 54, 66 }

Session ID: {}

Cipher Suites: [SSL_RSA_WITH_RC4_128_MD5, SSL_RSA_WITH_RC4_128_SHA,
TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA,
TLS_DHE_DSS_WITH_AES_128_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA,
SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA,
SSL_RSA_WITH_DES_CBC_SHA, SSL_DHE_RSA_WITH_DES_CBC_SHA,
SSL_DHE_DSS_WITH_DES_CBC_SHA, SSL_RSA_EXPORT_WITH_RC4_40_MD5,
SSL_RSA_EXPORT_WITH_DES40_CBC_SHA,
SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA,
SSL_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA]

Compression Methods: { 0 }

***

main, WRITE: TLSv1 Handshake, length = 73

main, WRITE: SSLv2 client hello message, length = 98

main, received EOFException: error

main, handling exception: javax.net.ssl.SSLHandshakeException: Remote
host closed connection during handshake

main, SEND TLSv1 ALERT: fatal, description = handshake_failure

main, WRITE: TLSv1 Alert, length = 2

main, called closeSocket()

main, called close()

main, called closeInternal(true)

main, called close()

main, called closeInternal(true)

main, called close()

main, called closeInternal(true)

org.apache.axis2.AxisFault: Remote host closed connection during
handshake

at org.apache.axis2.AxisFault.makeFault(AxisFault.java:430)

at
org.apache.axis2.transport.http.SOAPMessageFormatter.writeTo(SOAPMessage
Formatter.java:83)

at
org.apache.axis2.transport.http.AxisRequestEntity.writeRequest(AxisReque
stEntity.java:84)

at
org.apache.commons.httpclient.methods.EntityEnclosingMethod.writeRequest
Body(EntityEnclosingMethod.java:499)

at
org.apache.commons.httpclient.HttpMethodBase.writeRequest(HttpMethodBase
.java:2114)

at
org.apache.commons.httpclient.HttpMethodBase.execute(HttpMethodBase.java
:1096)

at
org.apache.commons.httpclient.HttpMethodDirector.executeWithRetry(HttpMe
thodDirector.java:398)

at
org.apache.commons.httpclient.HttpMethodDirector.executeMethod(HttpMetho
dDirector.java:171)

at
org.apache.commons.httpclient.HttpClient.executeMethod(HttpClient.java:3
97)

at
org.apache.commons.httpclient.HttpClient.executeMethod(HttpClient.java:3
46)

at
org.apache.axis2.transport.http.AbstractHTTPSender.executeMethod(Abstrac
tHTTPSender.java:542)

at
org.apache.axis2.transport.http.HTTPSender.sendViaPost(HTTPSender.java:1
89)

at org.apache.axis2.transport.http.HTTPSender.send(HTTPSender.java:75)

at
org.apache.axis2.transport.http.CommonsHTTPTransportSender.writeMessageW
ithCommons(CommonsHTTPTransportSender.java:371)

at
org.apache.axis2.transport.http.CommonsHTTPTransportSender.invoke(Common
sHTTPTransportSender.java:209)

at org.apache.axis2.engine.AxisEngine.send(AxisEngine.java:448)

at
org.apache.axis2.description.OutInAxisOperationClient.send(OutInAxisOper
ation.java:401)

at
org.apache.axis2.description.OutInAxisOperationClient.executeImpl(OutInA
xisOperation.java:228)

at
org.apache.axis2.client.OperationClient.execute(OperationClient.java:163
)

at
tutorial.rampart.client.SecureServiceStub.add(SecureServiceStub.java:193
)

at
tutorial.rampart.client.SecureServiceCGClient.main(SecureServiceCGClient
.java:37)

Caused by: com.ctc.wstx.exc.WstxIOException: Remote host closed
connection during handshake

at com.ctc.wstx.sw.BaseStreamWriter.flush(BaseStreamWriter.java:313)

at
org.apache.axiom.om.impl.MTOMXMLStreamWriter.flush(MTOMXMLStreamWriter.j
ava:146)

at
org.apache.axiom.om.impl.dom.NodeImpl.serializeAndConsume(NodeImpl.java:
817)

at
org.apache.axis2.transport.http.SOAPMessageFormatter.writeTo(SOAPMessage
Formatter.java:79)

... 19 more

Caused by: javax.net.ssl.SSLHandshakeException: Remote host closed
connection during handshake

at com.sun.net.ssl.internal.ssl.SSLSocketImpl.a(DashoA6275)

at com.sun.net.ssl.internal.ssl.SSLSocketImpl.j(DashoA6275)

at com.sun.net.ssl.internal.ssl.SSLSocketImpl.a(DashoA6275)

at com.sun.net.ssl.internal.ssl.AppOutputStream.write(DashoA6275)

at
java.io.BufferedOutputStream.flushBuffer(BufferedOutputStream.java:66)

at java.io.BufferedOutputStream.flush(BufferedOutputStream.java:124)

at java.io.FilterOutputStream.flush(FilterOutputStream.java:123)

at
org.apache.commons.httpclient.ChunkedOutputStream.flush(ChunkedOutputStr
eam.java:191)

at com.ctc.wstx.io.UTF8Writer.flush(UTF8Writer.java:99)

at com.ctc.wstx.sw.BufferingXmlWriter.flush(BufferingXmlWriter.java:214)

at com.ctc.wstx.sw.BaseStreamWriter.flush(BaseStreamWriter.java:311)

... 22 more

Caused by: java.io.EOFException: SSL peer shut down incorrectly

at com.sun.net.ssl.internal.ssl.InputRecord.read(DashoA6275)

... 33 more

Exception in thread "main"


________________________________

From: Nandana Mihindukulasooriya [mailto:nandana....@gmail.com]
Sent: Tuesday, July 07, 2009 10:16 PM
To: axis-user@ws.apache.org
Subject: Re: Axis2 1.4 with Rampart 1.4


Hi Shilpa,
        It is an issue in SSL handshake. Can you set the system property
javax.net.debug="ssl,handshake,record" and attach the debug log.

regards,
Nandana


On Mon, Jul 6, 2009 at 5:55 PM, <shilpa.raghaven...@wipro.com> wrote:


        Hi ,

                I need to implement WS security so planning to use
Rampart 1.4 with Axis2.

                i tried with example that i got through Google but
getting the error, the stack trace as follows




        log4j:WARN No appenders could be found for logger
(org.apache.axis2.deployment.FileSystemConfigurator).

        log4j:WARN Please initialize the log4j system properly.

        Exception in thread "main" org.apache.axis2.AxisFault: Remote
host closed connection during handshake

        at org.apache.axis2.AxisFault.makeFault(AxisFault.java:430)

        at
org.apache.axis2.transport.http.SOAPMessageFormatter.writeTo(SOAPMessage
Formatter.java:83)

        at
org.apache.axis2.transport.http.AxisRequestEntity.writeRequest(AxisReque
stEntity.java:84)

        at
org.apache.commons.httpclient.methods.EntityEnclosingMethod.writeRequest
Body(EntityEnclosingMethod.java:499)

        at
org.apache.commons.httpclient.HttpMethodBase.writeRequest(HttpMethodBase
.java:2114)

        at
org.apache.commons.httpclient.HttpMethodBase.execute(HttpMethodBase.java
:1096)

        at
org.apache.commons.httpclient.HttpMethodDirector.executeWithRetry(HttpMe
thodDirector.java:398)

        at
org.apache.commons.httpclient.HttpMethodDirector.executeMethod(HttpMetho
dDirector.java:171)

        at
org.apache.commons.httpclient.HttpClient.executeMethod(HttpClient.java:3
97)

        at


org.apache.commons.httpclient.HttpClient.executeMethod(HttpClient.java:3
46)

        at
org.apache.axis2.transport.http.AbstractHTTPSender.executeMethod(Abstrac
tHTTPSender.java:542)

        at
org.apache.axis2.transport.http.HTTPSender.sendViaPost(HTTPSender.java:1
89)

        at
org.apache.axis2.transport.http.HTTPSender.send(HTTPSender.java:75)

        at
org.apache.axis2.transport.http.CommonsHTTPTransportSender.writeMessageW
ithCommons(CommonsHTTPTransportSender.java:371)

        at
org.apache.axis2.transport.http.CommonsHTTPTransportSender.invoke(Common
sHTTPTransportSender.java:209)

        at org.apache.axis2.engine.AxisEngine.send(AxisEngine.java:448)

        at
org.apache.axis2.description.OutInAxisOperationClient.send(OutInAxisOper
ation.java:401)

        at
org.apache.axis2.description.OutInAxisOperationClient.executeImpl(OutInA
xisOperation.java:228)

        at
org.apache.axis2.client.OperationClient.execute(OperationClient.java:163
)

        at
tutorial.rampart.client.SecureServiceStub.add(SecureServiceStub.java:193
)

        at
tutorial.rampart.client.SecureServiceCGClient.main(SecureServiceCGClient
.java:36)

        Caused by: com.ctc.wstx.exc.WstxIOException: Remote host closed
connection during handshake

        at
com.ctc.wstx.sw.BaseStreamWriter.flush(BaseStreamWriter.java:313)

        at
org.apache.axiom.om.impl.MTOMXMLStreamWriter.flush(MTOMXMLStreamWriter.j
ava:146)

        at
org.apache.axiom.om.impl.dom.NodeImpl.serializeAndConsume(NodeImpl.java:
817)

        at
org.apache.axis2.transport.http.SOAPMessageFormatter.writeTo(SOAPMessage
Formatter.java:79)

        ... 19 more

        Caused by: javax.net.ssl.SSLHandshakeException: Remote host
closed connection during handshake

        at
com.sun.net.ssl.internal.ssl.SSLSocketImpl.readRecord(SSLSocketImpl.java
:742)

        at
com.sun.net.ssl.internal.ssl.SSLSocketImpl.performInitialHandshake(SSLSo
cketImpl.java:1030)

        at
com.sun.net.ssl.internal.ssl.SSLSocketImpl.writeRecord(SSLSocketImpl.jav
a:622)

        at
com.sun.net.ssl.internal.ssl.AppOutputStream.write(AppOutputStream.java:
59)

        at
java.io.BufferedOutputStream.flushBuffer(BufferedOutputStream.java:65)

        at
java.io.BufferedOutputStream.flush(BufferedOutputStream.java:123)

        at java.io.FilterOutputStream.flush(FilterOutputStream.java:123)

        at
org.apache.commons.httpclient.ChunkedOutputStream.flush(ChunkedOutputStr
eam.java:191)

        at com.ctc.wstx.io.UTF8Writer.flush(UTF8Writer.java:99)

        at
com.ctc.wstx.sw.BufferingXmlWriter.flush(BufferingXmlWriter.java:214)

        at
com.ctc.wstx.sw.BaseStreamWriter.flush(BaseStreamWriter.java:311)

        ... 22 more

        Caused by: java.io.EOFException: SSL peer shut down incorrectly

        at
com.sun.net.ssl.internal.ssl.InputRecord.read(InputRecord.java:333)

        at
com.sun.net.ssl.internal.ssl.SSLSocketImpl.readRecord(SSLSocketImpl.java
:723)

        ... 32 more

        some one share me the tutorial that tells us implementing
Rampart 1.4  with Axis2 1.4

        Thanks & Regards,

        Shilpa





        Please do not print this email unless it is absolutely
necessary.

        The information contained in this electronic message and any
attachments to this message are intended for the exclusive use of the
addressee(s) and may contain proprietary, confidential or privileged
information. If you are not the intended recipient, you should not
disseminate, distribute or copy this e-mail. Please notify the sender
immediately and destroy all copies of this message and any attachments.

        WARNING: Computer viruses can be transmitted via email. The
recipient should check this email and any attachments for the presence
of viruses. The company accepts no liability for any damage caused by
any virus transmitted by this email.

        www.wipro.com




--
Nandana Mihindukulasooriya
WSO2 inc.

http://nandana83.blogspot.com/
http://www.wso2.org


Please do not print this email unless it is absolutely necessary. 

The information contained in this electronic message and any attachments to 
this message are intended for the exclusive use of the addressee(s) and may 
contain proprietary, confidential or privileged information. If you are not the 
intended recipient, you should not disseminate, distribute or copy this e-mail. 
Please notify the sender immediately and destroy all copies of this message and 
any attachments. 

WARNING: Computer viruses can be transmitted via email. The recipient should 
check this email and any attachments for the presence of viruses. The company 
accepts no liability for any damage caused by any virus transmitted by this 
email. 

www.wipro.com

Reply via email to