Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/7984/
All tests passed Build Log: [...truncated 1167 lines...] # ERROR: IOException occurred when talking to server at: https://localhost:8983/solr/test/select # -- # # Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/69-2 # Last output: # INFO - 2023-09-16 11:23:41.820; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword # INFO - 2023-09-16 11:23:41.824; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword # WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [https://localhost:8983/solr] to [https://localhost:8983]. # Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:8983/solr/admin/info/system # at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:551) # at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192) # at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:552) # at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:469) # at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:426) # at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:146) # at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:151) # Caused by: javax.net.ssl.SSLHandshakeException: No subject alternative DNS name matching localhost found. # at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131) # at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353) # at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296) # at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291) # at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357) # at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232) # at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175) # at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392) # at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443) # at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074) # at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061) # at java.base/java.security.AccessController.doPrivileged(Native Method) # at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008) # at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657) # at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102) # at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84) # at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314) # at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100) # at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558) # at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379) # at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146) # at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100) # at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53) # at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:289) # at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128) # at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628) # at java.base/java.lang.Thread.run(Thread.java:829) # Suppressed: java.io.IOException: Broken pipe # at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138) # at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422) # at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275) # at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254) # at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386) # at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292) # at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243) # at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224) # at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821) # at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793) # at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161) # at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451) # at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117) # at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87) # ... 11 more # Caused by: java.security.cert.CertificateException: No subject alternative DNS name matching localhost found. # at java.base/sun.security.util.HostnameChecker.matchDNS(HostnameChecker.java:212) # at java.base/sun.security.util.HostnameChecker.match(HostnameChecker.java:103) # at java.base/sun.security.ssl.X509TrustManagerImpl.checkIdentity(X509TrustManagerImpl.java:455) # at java.base/sun.security.ssl.X509TrustManagerImpl.checkIdentity(X509TrustManagerImpl.java:429) # at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:283) # at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141) # at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335) # ... 22 more ok 70 start solr with ssl and auth in 17227ms ok 71 start solr with client truststore and security manager in 19551ms not ok 72 start solr with mTLS needed in 53115ms # (in test file test/test_ssl.bats, line 301) # `solr start -c -z localhost:9983 -p 8984' failed # /tmp/bats-run-G0vDbH/test/72/ssl # Certificate was added to keystore # Certificate reply was installed in keystore # Certificate was added to keystore # Certificate was added to keystore # Certificate reply was installed in keystore # Certificate was added to keystore # Certificate was added to keystore # Certificate was added to keystore # Certificate was added to keystore # Certificate reply was installed in keystore # Certificate was added to keystore # Certificate was added to keystore # Warning: Available entropy is low. As a result, use of the UUIDField, SSL, or any other features that require # RNG might not work properly. To check for the amount of available entropy, use 'cat /proc/sys/kernel/random/entropy_avail'. # # Waiting up to 180 seconds to see Solr running on port 8983 [|] [/] [-] [\] [|] # Started Solr server on port 8983 (pid=3613682). Happy searching! # # Warning: Available entropy is low. As a result, use of the UUIDField, SSL, or any other features that require # RNG might not work properly. To check for the amount of available entropy, use 'cat /proc/sys/kernel/random/entropy_avail'. # # Waiting up to 180 seconds to see Solr running on port 8984 [|] [/] [-] [\] [|] [/] [-] # Started Solr server on port 8984 (pid=3613847). Happy searching! # # INFO - 2023-09-16 11:24:44.485; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword # INFO - 2023-09-16 11:24:44.489; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword # INFO - 2023-09-16 11:24:45.225; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@6e16b8b5(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@c7a975a[provider=null,keyStore=file:///tmp/bats-run-G0vDbH/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-G0vDbH/test/72/ssl/client/solr-client.truststore.p12] # INFO - 2023-09-16 11:24:45.227; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@3c0fae6c(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@c7a975a[provider=null,keyStore=file:///tmp/bats-run-G0vDbH/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-G0vDbH/test/72/ssl/client/solr-client.truststore.p12] # INFO - 2023-09-16 11:24:45.227; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@4c168660(ca,h=[localhost],a=[],w=[]) for Client@c7a975a[provider=null,keyStore=file:///tmp/bats-run-G0vDbH/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-G0vDbH/test/72/ssl/client/solr-client.truststore.p12] # javax.net.ssl|DEBUG|01|main|2023-09-16 11:24:45.258 UTC|SunX509KeyManagerImpl.java:164|found key for : client ( # "certificate" : { # "version" : "v3", # "serial number" : "1A 34 5F DC", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-09-16 11:24:30.000 UTC", # "not after" : "2023-12-15 11:24:30.000 UTC", # "subject" : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.35 Criticality=false # AuthorityKeyIdentifier [ # KeyIdentifier [ # 0000: D1 1E 55 9B D9 F1 B3 DD 93 D1 C1 49 98 01 0B 6F ..U........I...o # 0010: 9C B5 95 4C ...L # ] # ] # }, # { # ObjectId: 2.5.29.37 Criticality=true # ExtendedKeyUsages [ # clientAuth # ] # }, # { # ObjectId: 2.5.29.15 Criticality=true # KeyUsage [ # DigitalSignature # Non_repudiation # Key_Encipherment # ] # }, # { # ObjectId: 2.5.29.17 Criticality=false # SubjectAlternativeName [ # DNSName: test.solr.apache.org # IPAddress: 127.0.0.2 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: 48 5E 04 C8 8E D5 4D 93 7E 3A 06 01 0C 05 7A 4D H^....M..:....zM # 0010: 03 BD E1 EC .... # ] # ] # } # ]}, # "certificate" : { # "version" : "v3", # "serial number" : "5B E2 68 5F", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-09-16 11:24:24.000 UTC", # "not after" : "2023-12-15 11:24:24.000 UTC", # "subject" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.35 Criticality=false # AuthorityKeyIdentifier [ # KeyIdentifier [ # 0000: 3A 81 7B 46 6E 2A D1 CD 45 77 59 62 F9 C1 A1 CF :..Fn*..EwYb.... # 0010: 07 15 4C 65 ..Le # ] # ] # }, # { # ObjectId: 2.5.29.19 Criticality=false # BasicConstraints:[ # CA:true # PathLen:0 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: D1 1E 55 9B D9 F1 B3 DD 93 D1 C1 49 98 01 0B 6F ..U........I...o # 0010: 9C B5 95 4C ...L # ] # ] # } # ]} # ) # javax.net.ssl|DEBUG|01|main|2023-09-16 11:24:45.262 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates ( # "certificate" : { # "version" : "v3", # "serial number" : "5B E2 68 5F", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-09-16 11:24:24.000 UTC", # "not after" : "2023-12-15 11:24:24.000 UTC", # "subject" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.35 Criticality=false # AuthorityKeyIdentifier [ # KeyIdentifier [ # 0000: 3A 81 7B 46 6E 2A D1 CD 45 77 59 62 F9 C1 A1 CF :..Fn*..EwYb.... # 0010: 07 15 4C 65 ..Le # ] # ] # }, # { # ObjectId: 2.5.29.19 Criticality=false # BasicConstraints:[ # CA:true # PathLen:0 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: D1 1E 55 9B D9 F1 B3 DD 93 D1 C1 49 98 01 0B 6F ..U........I...o # 0010: 9C B5 95 4C ...L # ] # ] # } # ]}, # "certificate" : { # "version" : "v3", # "serial number" : "72 4C 13 E2", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-09-16 11:24:22.000 UTC", # "not after" : "2023-12-15 11:24:22.000 UTC", # "subject" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.19 Criticality=true # BasicConstraints:[ # CA:true # PathLen:2147483647 # ] # }, # { # ObjectId: 2.5.29.17 Criticality=false # SubjectAlternativeName [ # DNSName: localhost # IPAddress: 127.0.0.1 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: 3A 81 7B 46 6E 2A D1 CD 45 77 59 62 F9 C1 A1 CF :..Fn*..EwYb.... # 0010: 07 15 4C 65 ..Le # ] # ] # } # ]} # ) # javax.net.ssl|DEBUG|01|main|2023-09-16 11:24:45.272 UTC|SSLCipher.java:464|jdk.tls.keyLimits: entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472 # javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-09-16 11:24:46.103 UTC|ServerNameExtension.java:261|Unable to indicate server name # javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-09-16 11:24:46.103 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name # javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-09-16 11:24:46.107 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers # javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-09-16 11:24:46.107 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers # javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-09-16 11:24:46.114 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie # javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-09-16 11:24:46.127 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info # javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-09-16 11:24:46.127 UTC|PreSharedKeyExtension.java:633|No session to resume. # javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-09-16 11:24:46.127 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key # javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-09-16 11:24:46.131 UTC|ClientHello.java:642|Produced ClientHello handshake message ( # "ClientHello": { # "client version" : "TLSv1.2", # "random" : "64 06 EF 6A 53 B7 34 D7 7C AB 83 8D CC 65 80 3B 20 32 EF 3C CC 98 4E AB 89 8F 2B 69 23 B7 C2 0E", # "session id" : "4D 5A 9D 0B 05 09 86 E9 F8 88 B7 AE 2B 5E 9B 9D BC 37 D9 2F A8 A4 20 88 F2 CE 3B 8D F5 D8 42 B1", # "cipher suites" : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]", # "compression methods" : "00", # "extensions" : [ # "status_request (5)": { # "certificate status type": ocsp # "OCSP status request": { # "responder_id": <empty> # "request extensions": { # <empty> # } # } # }, # "supported_groups (10)": { # "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192] # }, # "ec_point_formats (11)": { # "formats": [uncompressed] # }, # "signature_algorithms (13)": { # "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1] # }, # "signature_algorithms_cert (50)": { # "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1] # }, # "application_layer_protocol_negotiation (16)": { # [h2] # }, # "status_request_v2 (17)": { # "cert status request": { # "certificate status type": ocsp_multi # "OCSP status request": { # "responder_id": <empty> # "request extensions": { # <empty> # } # } # } # }, # "extended_master_secret (23)": { # <empty> # }, # "supported_versions (43)": { # "versions": [TLSv1.3, TLSv1.2] # }, # "psk_key_exchange_modes (45)": { # "ke_modes": [psk_dhe_ke] # }, # "key_share (51)": { # "client_shares": [ # { # "named group": x25519 # "key_exchange": { # 0000: C1 39 B2 40 94 0C 40 3F EC 46 2C 4B 8F 29 88 38 .9.@..@?.F,K.).8 # 0010: 82 88 6A 55 18 08 E0 5F 19 70 39 1C 25 59 56 3E ..jU..._.p9.%YV> # } # }, # ] # } # ] # } # ) # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 11:24:46.234 UTC|ServerHello.java:867|Consuming ServerHello handshake message ( # "ServerHello": { # "server version" : "TLSv1.2", # "random" : "65 F0 C7 FE E3 3F DC 70 90 A9 09 8E 86 AB 9A 34 53 26 60 96 7B C5 33 B4 CB 09 38 20 3F D3 FB B8", # "session id" : "4D 5A 9D 0B 05 09 86 E9 F8 88 B7 AE 2B 5E 9B 9D BC 37 D9 2F A8 A4 20 88 F2 CE 3B 8D F5 D8 42 B1", # "cipher suite" : "TLS_AES_256_GCM_SHA384(0x1302)", # "compression methods" : "00", # "extensions" : [ # "supported_versions (43)": { # "selected version": [TLSv1.3] # }, # "key_share (51)": { # "server_share": { # "named group": x25519 # "key_exchange": { # 0000: FA E8 54 1C A5 94 66 4E E6 F8 B0 3C 93 E2 38 59 ..T...fN...<..8Y # 0010: 9E D3 6D FE 05 4E 4C 09 4F DF 46 32 D5 6C B6 11 ..m..NL.O.F2.l.. # } # }, # } # ] # } # ) # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 11:24:46.235 UTC|SSLExtensions.java:192|Consumed extension: supported_versions # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 11:24:46.235 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3 # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 11:24:46.239 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 11:24:46.239 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 11:24:46.239 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 11:24:46.239 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 11:24:46.239 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 11:24:46.239 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2 # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 11:24:46.239 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 11:24:46.239 UTC|SSLExtensions.java:192|Consumed extension: supported_versions # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 11:24:46.255 UTC|SSLExtensions.java:192|Consumed extension: key_share # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 11:24:46.255 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 11:24:46.255 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence. # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 11:24:46.255 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 11:24:46.255 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 11:24:46.255 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 11:24:46.255 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 11:24:46.256 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 11:24:46.256 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2 # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 11:24:46.256 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret # javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-09-16 11:24:46.256 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions # javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-09-16 11:24:46.256 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 11:24:46.256 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 11:24:46.256 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 11:24:46.276 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE # countdown value = 137438953472 # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 11:24:46.288 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE # countdown value = 137438953472 # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 11:24:46.289 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 11:24:46.293 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message ( # "EncryptedExtensions": [ # "supported_groups (10)": { # "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192] # }, # "application_layer_protocol_negotiation (16)": { # [h2] # } # ] # ) # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 11:24:46.294 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 11:24:46.294 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 11:24:46.294 UTC|SSLExtensions.java:192|Consumed extension: supported_groups # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 11:24:46.295 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 11:24:46.295 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 11:24:46.295 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length # javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-09-16 11:24:46.296 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups # javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-09-16 11:24:46.296 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 11:24:46.298 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message ( # "CertificateRequest": { # "certificate_request_context": "", # "extensions": [ # "signature_algorithms (13)": { # "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1] # }, # "signature_algorithms_cert (50)": { # "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1] # }, # "certificate_authorities (47)": { # "certificate authorities": [ # CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country # CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country] # } # ] # } # ) # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 11:24:46.302 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 11:24:46.302 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 11:24:46.304 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 11:24:46.306 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 11:24:46.309 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert # javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-09-16 11:24:46.309 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 11:24:46.317 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message ( # "Certificate": { # "certificate_request_context": "", # "certificate_list": [ # { # "certificate" : { # "version" : "v3", # "serial number" : "0E F8 B7 2B", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-09-16 11:24:26.000 UTC", # "not after" : "2023-12-15 11:24:26.000 UTC", # "subject" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.35 Criticality=false # AuthorityKeyIdentifier [ # KeyIdentifier [ # 0000: D1 1E 55 9B D9 F1 B3 DD 93 D1 C1 49 98 01 0B 6F ..U........I...o # 0010: 9C B5 95 4C ...L # ] # ] # }, # { # ObjectId: 2.5.29.37 Criticality=true # ExtendedKeyUsages [ # serverAuth # ] # }, # { # ObjectId: 2.5.29.15 Criticality=true # KeyUsage [ # DigitalSignature # Non_repudiation # Key_Encipherment # ] # }, # { # ObjectId: 2.5.29.17 Criticality=false # SubjectAlternativeName [ # DNSName: localhost # IPAddress: 127.0.0.1 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: C7 C1 FE D0 81 9A 14 5F 48 86 BC 2B CD EB 1A 41 ......._H..+...A # 0010: 11 17 27 9C ..'. # ] # ] # } # ]} # "extensions": { # <no extension> # } # }, # ] # } # ) # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 11:24:46.318 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 11:24:46.447 UTC|X509TrustManagerImpl.java:292|Found trusted certificate ( # "certificate" : { # "version" : "v3", # "serial number" : "5B E2 68 5F", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-09-16 11:24:24.000 UTC", # "not after" : "2023-12-15 11:24:24.000 UTC", # "subject" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.35 Criticality=false # AuthorityKeyIdentifier [ # KeyIdentifier [ # 0000: 3A 81 7B 46 6E 2A D1 CD 45 77 59 62 F9 C1 A1 CF :..Fn*..EwYb.... # 0010: 07 15 4C 65 ..Le # ] # ] # }, # { # ObjectId: 2.5.29.19 Criticality=false # BasicConstraints:[ # CA:true # PathLen:0 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: D1 1E 55 9B D9 F1 B3 DD 93 D1 C1 49 98 01 0B 6F ..U........I...o # 0010: 9C B5 95 4C ...L # ] # ] # } # ]} # ) # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 11:24:46.457 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message ( # "CertificateVerify": { # "signature algorithm": rsa_pss_rsae_sha256 # "signature": { # 0000: 6F F7 93 84 B7 F0 68 FA D0 91 A8 02 A3 F5 60 2C o.....h.......`, # 0010: 0F 9F 46 8C 29 8D 6B 45 1A 45 0F AD 69 05 B1 3C ..F.).kE.E..i..< # 0020: 04 32 8D CF 63 6D 64 0C 8B FD 7C CA CB 50 46 F3 .2..cmd......PF. # 0030: A1 E1 1F 6D 26 4B 1D 9F 10 7A 61 73 10 9D 4D B1 ...m&K...zas..M. # 0040: 4A 6B 4D 77 00 BB D6 1B CE 44 C3 EF 35 07 18 6D JkMw.....D..5..m # 0050: F6 D1 B3 D8 85 9A 3E B2 BA 5B 5A E6 02 00 B7 A6 ......>..[Z..... # 0060: CE 38 EB 8E D0 A7 CD B4 56 AC 3C DE 56 EE 19 10 .8......V.<.V... # 0070: 10 B1 FA 6F B1 4F 10 73 B6 17 80 2D 53 6A 52 3E ...o.O.s...-SjR> # 0080: BF BF 59 51 6C FF 21 E0 8F 76 C4 9C 18 A8 47 A9 ..YQl.!..v....G. # 0090: 7A 0A 21 5C 4A C0 22 1B 32 9A D1 9C C5 86 F3 12 z.!\J.".2....... # 00A0: 6F 43 23 31 B0 ED B5 CF FA E1 23 63 B0 FF 10 C7 oC#1......#c.... # 00B0: DE BC EA 1B 64 8C FE 4B 36 58 D6 0C 86 6C D8 16 ....d..K6X...l.. # 00C0: 3D 3C E2 FA 0B 0C 79 DB E3 A2 3C E6 4E 0D 45 8D =<....y...<.N.E. # 00D0: 87 F1 5D C2 87 07 A3 1E 83 A2 EB 55 75 93 CF 82 ..]........Uu... # 00E0: 71 E6 7F D2 6C 21 66 EF 77 31 51 F3 88 6F 0D E2 q...l!f.w1Q..o.. # 00F0: B2 10 0E 8E AD 8C 66 2C 0C 37 9B 63 D7 8F 72 49 ......f,.7.c..rI # } # } # ) # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 11:24:46.458 UTC|Finished.java:898|Consuming server Finished handshake message ( # "Finished": { # "verify data": { # 0000: 0E D1 93 75 A3 1B EA 3E E7 BE AD 9C 57 C2 9D 92 ...u...>....W... # 0010: AF AE A6 F1 12 68 72 D9 20 0B C8 D6 CB 52 67 B3 .....hr. ....Rg. # 0020: 62 2C EB A1 30 D6 E7 2F 36 5B 9A 8F 9D F6 FC A0 b,..0../6[...... # }'} # ) # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 11:24:46.462 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE # countdown value = 137438953472 # javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-09-16 11:24:46.463 UTC|X509Authentication.java:246|No X.509 cert selected for EC # javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-09-16 11:24:46.463 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256 # javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-09-16 11:24:46.463 UTC|X509Authentication.java:246|No X.509 cert selected for EC # javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-09-16 11:24:46.463 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384 # javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-09-16 11:24:46.463 UTC|X509Authentication.java:246|No X.509 cert selected for EC # javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-09-16 11:24:46.463 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512 # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 11:24:46.463 UTC|SunX509KeyManagerImpl.java:401|matching alias: client # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 11:24:46.470 UTC|CertificateMessage.java:1140|Produced client Certificate message ( # "Certificate": { # "certificate_request_context": "", # "certificate_list": [ # { # "certificate" : { # "version" : "v3", # "serial number" : "1A 34 5F DC", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-09-16 11:24:30.000 UTC", # "not after" : "2023-12-15 11:24:30.000 UTC", # "subject" : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.35 Criticality=false # AuthorityKeyIdentifier [ # KeyIdentifier [ # 0000: D1 1E 55 9B D9 F1 B3 DD 93 D1 C1 49 98 01 0B 6F ..U........I...o # 0010: 9C B5 95 4C ...L # ] # ] # }, # { # ObjectId: 2.5.29.37 Criticality=true # ExtendedKeyUsages [ # clientAuth # ] # }, # { # ObjectId: 2.5.29.15 Criticality=true # KeyUsage [ # DigitalSignature # Non_repudiation # Key_Encipherment # ] # }, # { # ObjectId: 2.5.29.17 Criticality=false # SubjectAlternativeName [ # DNSName: test.solr.apache.org # IPAddress: 127.0.0.2 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: 48 5E 04 C8 8E D5 4D 93 7E 3A 06 01 0C 05 7A 4D H^....M..:....zM # 0010: 03 BD E1 EC .... # ] # ] # } # ]} # "extensions": { # <no extension> # } # }, # { # "certificate" : { # "version" : "v3", # "serial number" : "5B E2 68 5F", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-09-16 11:24:24.000 UTC", # "not after" : "2023-12-15 11:24:24.000 UTC", # "subject" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.35 Criticality=false # AuthorityKeyIdentifier [ # KeyIdentifier [ # 0000: 3A 81 7B 46 6E 2A D1 CD 45 77 59 62 F9 C1 A1 CF :..Fn*..EwYb.... # 0010: 07 15 4C 65 ..Le # ] # ] # }, # { # ObjectId: 2.5.29.19 Criticality=false # BasicConstraints:[ # CA:true # PathLen:0 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: D1 1E 55 9B D9 F1 B3 DD 93 D1 C1 49 98 01 0B 6F ..U........I...o # 0010: 9C B5 95 4C ...L # ] # ] # } # ]} # "extensions": { # <no extension> # } # }, # ] # } # ) # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 11:24:46.507 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message ( # "CertificateVerify": { # "signature algorithm": rsa_pss_rsae_sha256 # "signature": { # 0000: 50 AA DF 7A 26 9C E7 6F 57 F7 96 85 8E 70 F0 64 P..z&..oW....p.d # 0010: 6C F0 DC BB F9 A8 05 0F AA 16 DF 64 B7 B8 9E B0 l..........d.... # 0020: 2A 44 71 1F C4 71 21 EF C9 53 3B 5D DC 8C 7E A0 *Dq..q!..S;].... # 0030: AA D2 9C 88 AC 91 A5 93 98 C2 3E 2C 5A DF 94 A9 ..........>,Z... # 0040: 27 F6 54 26 9B 84 62 BA 54 65 31 98 E7 B9 D8 FB '.T&..b.Te1..... # 0050: 59 55 12 C0 2C DA 55 E6 B6 A2 9F 46 FA 6D C9 47 YU..,.U....F.m.G # 0060: 4B 59 D1 86 2E 63 22 F7 7A 99 41 01 08 2B BA 3F KY...c".z.A..+.? # 0070: 32 54 C1 0F 11 BB 4E 10 44 43 27 46 08 AE 5F 19 2T....N.DC'F.._. # 0080: E3 0A 14 1A 68 0C 2E 53 E7 33 4B F0 56 34 5C F4 ....h..S.3K.V4\. # 0090: 3C 3E D3 90 00 3D 6A CC 20 AC EB EA EE B0 81 85 <>...=j. ....... # 00A0: C8 B2 DE 66 45 8D 6B EB 2D E0 3D BE 39 92 67 9A ...fE.k.-.=.9.g. # 00B0: FA D4 A1 64 01 8C 40 07 E8 00 DB 90 57 29 9D 46 [email protected]).F # 00C0: DD 55 57 CE 19 03 E3 69 AD 96 88 5F 7F 84 4D FA .UW....i..._..M. # 00D0: CB 00 07 4A 7A 5F 42 28 9D 7B 8A 63 21 E7 FC 6E ...Jz_B(...c!..n # 00E0: 5C B6 5F E1 99 A0 77 09 54 7F 7F E8 77 7E 5C C3 \._...w.T...w.\. # 00F0: 5B 65 B3 3E D7 43 2B 4F 37 7C 1A 8B 5C E5 0A 53 [e.>.C+O7...\..S # } # } # ) # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 11:24:46.508 UTC|Finished.java:673|Produced client Finished handshake message ( # "Finished": { # "verify data": { # 0000: 8D 3A DB 25 DB EB 07 16 8F 55 1C 6F E3 1F 92 FD .:.%.....U.o.... # 0010: 36 35 B5 1F AD 06 76 3D 47 F3 7F EC F9 A9 B1 5B 65....v=G......[ # 0020: 47 32 89 5E FF 39 70 D5 93 FC 25 9D DB C3 7E A8 G2.^.9p...%..... # }'} # ) # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 11:24:46.509 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE # countdown value = 137438953472 # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 11:24:46.930 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message ( # "NewSessionTicket": { # "ticket_lifetime" : "86,400", # "ticket_age_add" : "<omitted>", # "ticket_nonce" : "01", # "ticket" : "41 74 D8 07 D3 81 F5 B7 C0 09 0F 60 E5 44 5B E4 61 81 47 CC 1E 46 EC DB DE 20 05 30 88 51 84 EF", # "extensions" : [ # <no extension> # ] # } # ) # javax.net.ssl|ALL|01|main|2023-09-16 11:24:47.539 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine # javax.net.ssl|WARNING|01|main|2023-09-16 11:24:47.540 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data # INFO - 2023-09-16 11:24:48.919; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword # INFO - 2023-09-16 11:24:48.925; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword # INFO - 2023-09-16 11:24:49.222; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@423e4cbb(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@743cb8e0[provider=null,keyStore=file:///tmp/bats-run-G0vDbH/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-G0vDbH/test/72/ssl/client/solr-client.truststore.p12] # INFO - 2023-09-16 11:24:49.224; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@649725e3(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@743cb8e0[provider=null,keyStore=file:///tmp/bats-run-G0vDbH/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-G0vDbH/test/72/ssl/client/solr-client.truststore.p12] # INFO - 2023-09-16 11:24:49.224; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@3c0fae6c(ca,h=[localhost],a=[],w=[]) for Client@743cb8e0[provider=null,keyStore=file:///tmp/bats-run-G0vDbH/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-G0vDbH/test/72/ssl/client/solr-client.truststore.p12] # javax.net.ssl|DEBUG|01|main|2023-09-16 11:24:49.251 UTC|SunX509KeyManagerImpl.java:164|found key for : client ( # "certificate" : { # "version" : "v3", # "serial number" : "1A 34 5F DC", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-09-16 11:24:30.000 UTC", # "not after" : "2023-12-15 11:24:30.000 UTC", # "subject" : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.35 Criticality=false # AuthorityKeyIdentifier [ # KeyIdentifier [ # 0000: D1 1E 55 9B D9 F1 B3 DD 93 D1 C1 49 98 01 0B 6F ..U........I...o # 0010: 9C B5 95 4C ...L # ] # ] # }, # { # ObjectId: 2.5.29.37 Criticality=true # ExtendedKeyUsages [ # clientAuth # ] # }, # { # ObjectId: 2.5.29.15 Criticality=true # KeyUsage [ # DigitalSignature # Non_repudiation # Key_Encipherment # ] # }, # { # ObjectId: 2.5.29.17 Criticality=false # SubjectAlternativeName [ # DNSName: test.solr.apache.org # IPAddress: 127.0.0.2 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: 48 5E 04 C8 8E D5 4D 93 7E 3A 06 01 0C 05 7A 4D H^....M..:....zM # 0010: 03 BD E1 EC .... # ] # ] # } # ]}, # "certificate" : { # "version" : "v3", # "serial number" : "5B E2 68 5F", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-09-16 11:24:24.000 UTC", # "not after" : "2023-12-15 11:24:24.000 UTC", # "subject" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.35 Criticality=false # AuthorityKeyIdentifier [ # KeyIdentifier [ # 0000: 3A 81 7B 46 6E 2A D1 CD 45 77 59 62 F9 C1 A1 CF :..Fn*..EwYb.... # 0010: 07 15 4C 65 ..Le # ] # ] # }, # { # ObjectId: 2.5.29.19 Criticality=false # BasicConstraints:[ # CA:true # PathLen:0 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: D1 1E 55 9B D9 F1 B3 DD 93 D1 C1 49 98 01 0B 6F ..U........I...o # 0010: 9C B5 95 4C ...L # ] # ] # } # ]} # ) # javax.net.ssl|DEBUG|01|main|2023-09-16 11:24:49.254 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates ( # "certificate" : { # "version" : "v3", # "serial number" : "5B E2 68 5F", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-09-16 11:24:24.000 UTC", # "not after" : "2023-12-15 11:24:24.000 UTC", # "subject" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.35 Criticality=false # AuthorityKeyIdentifier [ # KeyIdentifier [ # 0000: 3A 81 7B 46 6E 2A D1 CD 45 77 59 62 F9 C1 A1 CF :..Fn*..EwYb.... # 0010: 07 15 4C 65 ..Le # ] # ] # }, # { # ObjectId: 2.5.29.19 Criticality=false # BasicConstraints:[ # CA:true # PathLen:0 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: D1 1E 55 9B D9 F1 B3 DD 93 D1 C1 49 98 01 0B 6F ..U........I...o # 0010: 9C B5 95 4C ...L # ] # ] # } # ]}, # "certificate" : { # "version" : "v3", # "serial number" : "72 4C 13 E2", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-09-16 11:24:22.000 UTC", # "not after" : "2023-12-15 11:24:22.000 UTC", # "subject" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.19 Criticality=true # BasicConstraints:[ # CA:true # PathLen:2147483647 # ] # }, # { # ObjectId: 2.5.29.17 Criticality=false # SubjectAlternativeName [ # DNSName: localhost # IPAddress: 127.0.0.1 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: 3A 81 7B 46 6E 2A D1 CD 45 77 59 62 F9 C1 A1 CF :..Fn*..EwYb.... # 0010: 07 15 4C 65 ..Le # ] # ] # } # ]} # ) # javax.net.ssl|DEBUG|01|main|2023-09-16 11:24:49.264 UTC|SSLCipher.java:464|jdk.tls.keyLimits: entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472 # javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-09-16 11:24:49.403 UTC|ServerNameExtension.java:261|Unable to indicate server name # javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-09-16 11:24:49.404 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name # javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-09-16 11:24:49.405 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers # javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-09-16 11:24:49.405 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers # javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-09-16 11:24:49.409 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie # javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-09-16 11:24:49.418 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info # javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-09-16 11:24:49.418 UTC|PreSharedKeyExtension.java:633|No session to resume. # javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-09-16 11:24:49.418 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key # javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-09-16 11:24:49.420 UTC|ClientHello.java:642|Produced ClientHello handshake message ( # "ClientHello": { # "client version" : "TLSv1.2", # "random" : "12 8F 50 B5 92 A6 AD 29 C0 39 6C 1F B6 F5 81 E6 F9 45 2B 5E C1 0C 12 55 3B 11 CE D9 3B D8 F5 51", # "session id" : "8A FC 6A DB 5D 7E 47 42 1E 9E 93 B9 84 3E 7D E5 10 0C 68 2E FC 08 5C FD F7 41 9D 63 B8 0E 11 77", # "cipher suites" : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]", # "compression methods" : "00", # "extensions" : [ # "status_request (5)": { # "certificate status type": ocsp # "OCSP status request": { # "responder_id": <empty> # "request extensions": { # <empty> # } # } # }, # "supported_groups (10)": { # "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192] # }, # "ec_point_formats (11)": { # "formats": [uncompressed] # }, # "signature_algorithms (13)": { # "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1] # }, # "signature_algorithms_cert (50)": { # "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1] # }, # "application_layer_protocol_negotiation (16)": { # [h2] # }, # "status_request_v2 (17)": { # "cert status request": { # "certificate status type": ocsp_multi # "OCSP status request": { # "responder_id": <empty> # "request extensions": { # <empty> # } # } # } # }, # "extended_master_secret (23)": { # <empty> # }, # "supported_versions (43)": { # "versions": [TLSv1.3, TLSv1.2] # }, # "psk_key_exchange_modes (45)": { # "ke_modes": [psk_dhe_ke] # }, # "key_share (51)": { # "client_shares": [ # { # "named group": x25519 # "key_exchange": { # 0000: AC DB 17 F9 D4 BF C0 2E 3C CF 8E 3D DF E5 1F 40 ........<..=...@ # 0010: 8D 84 15 3B 62 8A 96 25 3D 2D 73 B8 2A D8 BB 63 ...;b..%=-s.*..c # } # }, # ] # } # ] # } # ) # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 11:24:49.502 UTC|ServerHello.java:867|Consuming ServerHello handshake message ( # "ServerHello": { # "server version" : "TLSv1.2", # "random" : "A4 79 EA 52 92 41 B4 B7 D8 47 84 D4 07 3F 58 7C B6 D5 A2 FC B2 DE 6E A3 25 AD 15 4E B8 CD 83 F3", # "session id" : "8A FC 6A DB 5D 7E 47 42 1E 9E 93 B9 84 3E 7D E5 10 0C 68 2E FC 08 5C FD F7 41 9D 63 B8 0E 11 77", # "cipher suite" : "TLS_AES_256_GCM_SHA384(0x1302)", # "compression methods" : "00", # "extensions" : [ # "supported_versions (43)": { # "selected version": [TLSv1.3] # }, # "key_share (51)": { # "server_share": { # "named group": x25519 # "key_exchange": { # 0000: 46 D2 19 4A 34 24 32 28 FF 25 27 F4 44 9C B4 44 F..J4$2(.%'.D..D # 0010: C9 99 77 FB D1 00 8D D8 1A E4 E8 68 70 18 07 05 ..w........hp... # } # }, # } # ] # } # ) # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 11:24:49.502 UTC|SSLExtensions.java:192|Consumed extension: supported_versions # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 11:24:49.502 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3 # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 11:24:49.503 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 11:24:49.503 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 11:24:49.503 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 11:24:49.503 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 11:24:49.503 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 11:24:49.503 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2 # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 11:24:49.503 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 11:24:49.503 UTC|SSLExtensions.java:192|Consumed extension: supported_versions # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 11:24:49.505 UTC|SSLExtensions.java:192|Consumed extension: key_share # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 11:24:49.505 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 11:24:49.505 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence. # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 11:24:49.505 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 11:24:49.505 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 11:24:49.505 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 11:24:49.505 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 11:24:49.505 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 11:24:49.505 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2 # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 11:24:49.505 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret # javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-09-16 11:24:49.506 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions # javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-09-16 11:24:49.506 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 11:24:49.506 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 11:24:49.506 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 11:24:49.511 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE # countdown value = 137438953472 # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 11:24:49.512 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE # countdown value = 137438953472 # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 11:24:49.513 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 11:24:49.516 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message ( # "EncryptedExtensions": [ # "supported_groups (10)": { # "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192] # }, # "application_layer_protocol_negotiation (16)": { # [h2] # } # ] # ) # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 11:24:49.516 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 11:24:49.516 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 11:24:49.516 UTC|SSLExtensions.java:192|Consumed extension: supported_groups # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 11:24:49.516 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 11:24:49.516 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 11:24:49.516 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length # javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-09-16 11:24:49.516 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups # javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-09-16 11:24:49.516 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 11:24:49.518 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message ( # "CertificateRequest": { # "certificate_request_context": "", # "extensions": [ # "signature_algorithms (13)": { # "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1] # }, # "signature_algorithms_cert (50)": { # "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1] # }, # "certificate_authorities (47)": { # "certificate authorities": [ # CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country # CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country] # } # ] # } # ) # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 11:24:49.518 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 11:24:49.518 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 11:24:49.518 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 11:24:49.520 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 11:24:49.522 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert # javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-09-16 11:24:49.522 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 11:24:49.525 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message ( # "Certificate": { # "certificate_request_context": "", # "certificate_list": [ # { # "certificate" : { # "version" : "v3", # "serial number" : "0E F8 B7 2B", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-09-16 11:24:26.000 UTC", # "not after" : "2023-12-15 11:24:26.000 UTC", # "subject" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.35 Criticality=false # AuthorityKeyIdentifier [ # KeyIdentifier [ # 0000: D1 1E 55 9B D9 F1 B3 DD 93 D1 C1 49 98 01 0B 6F ..U........I...o # 0010: 9C B5 95 4C ...L # ] # ] # }, # { # ObjectId: 2.5.29.37 Criticality=true # ExtendedKeyUsages [ # serverAuth # ] # }, # { # ObjectId: 2.5.29.15 Criticality=true # KeyUsage [ # DigitalSignature # Non_repudiation # Key_Encipherment # ] # }, # { # ObjectId: 2.5.29.17 Criticality=false # SubjectAlternativeName [ # DNSName: localhost # IPAddress: 127.0.0.1 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: C7 C1 FE D0 81 9A 14 5F 48 86 BC 2B CD EB 1A 41 ......._H..+...A # 0010: 11 17 27 9C ..'. # ] # ] # } # ]} # "extensions": { # <no extension> # } # }, # ] # } # ) # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 11:24:49.526 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request # javax.net.ssl|DEBUG|03|Finalizer|2023-09-16 11:24:49.577 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket # javax.net.ssl|DEBUG|03|Finalizer|2023-09-16 11:24:49.578 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive) # javax.net.ssl|DEBUG|03|Finalizer|2023-09-16 11:24:49.578 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket # javax.net.ssl|DEBUG|03|Finalizer|2023-09-16 11:24:49.578 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive) # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 11:24:49.603 UTC|X509TrustManagerImpl.java:292|Found trusted certificate ( # "certificate" : { # "version" : "v3", # "serial number" : "5B E2 68 5F", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-09-16 11:24:24.000 UTC", # "not after" : "2023-12-15 11:24:24.000 UTC", # "subject" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.35 Criticality=false # AuthorityKeyIdentifier [ # KeyIdentifier [ # 0000: 3A 81 7B 46 6E 2A D1 CD 45 77 59 62 F9 C1 A1 CF :..Fn*..EwYb.... # 0010: 07 15 4C 65 ..Le # ] # ] # }, # { # ObjectId: 2.5.29.19 Criticality=false # BasicConstraints:[ # CA:true # PathLen:0 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: D1 1E 55 9B D9 F1 B3 DD 93 D1 C1 49 98 01 0B 6F ..U........I...o # 0010: 9C B5 95 4C ...L # ] # ] # } # ]} # ) # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 11:24:49.606 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message ( # "CertificateVerify": { # "signature algorithm": rsa_pss_rsae_sha256 # "signature": { # 0000: 41 4D D4 52 C3 B6 F0 AE 2A 77 D0 40 FC F7 1F 6F AM.R....*[email protected] # 0010: 02 D3 20 A6 50 2D A4 1E 8C 33 BC 09 5F 19 8F 24 .. .P-...3.._..$ # 0020: FA F1 A4 C5 35 C8 4D DB EB 57 05 F4 3E 1A D2 F0 ....5.M..W..>... # 0030: 21 04 3D 46 2D B4 54 50 24 C7 10 4B 0A 10 28 3B !.=F-.TP$..K..(; # 0040: 12 F6 38 4B 7A DD 17 0A 38 1A EF 6F A9 DE 56 E4 ..8Kz...8..o..V. # 0050: AA 14 49 07 A4 38 07 3E 1C B1 E9 B4 3A 95 F8 5B ..I..8.>....:..[ # 0060: 7E 5C 90 2A EE 65 0F 5F 65 B6 CE B0 4C 89 BA 6D .\.*.e._e...L..m # 0070: 63 B1 7B 42 AC 99 76 04 E2 11 ED ED EB 9F 1E 11 c..B..v......... # 0080: 27 26 3E 6C 50 31 C8 30 6D 92 E7 0D CF 8F 6A 73 '&>lP1.0m.....js # 0090: 93 BA 8C A6 C9 7E 00 A4 59 81 C7 65 75 0E C7 8D ........Y..eu... # 00A0: D1 BA 79 43 46 2D A5 A3 C3 66 3B 66 7C F1 12 26 ..yCF-...f;f...& # 00B0: 7C 7D 1B 23 63 DE 59 AB 32 0E 50 EE 93 4C D3 25 ...#c.Y.2.P..L.% # 00C0: 2D 31 3D B7 2E FA 34 69 06 8A 38 14 70 38 5D 8F -1=...4i..8.p8]. # 00D0: 25 A1 C1 32 C7 7D 49 E5 91 3A 32 FD 2C 41 4A E2 %..2..I..:2.,AJ. # 00E0: 82 AB CC 02 31 E8 3E D3 F2 69 17 1D BC 0D F5 5C ....1.>..i.....\ # 00F0: 95 FD 61 DD 24 BA 2E 26 1F 11 61 55 9A BB FB 4B ..a.$..&..aU...K # } # } # ) # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 11:24:49.607 UTC|Finished.java:898|Consuming server Finished handshake message ( # "Finished": { # "verify data": { # 0000: 69 4F 82 6B B9 38 56 A8 0A 5F 3A 6A 65 CF E1 F3 iO.k.8V.._:je... # 0010: 6C 46 E5 CD 9C 44 1D CE 23 F2 3A 24 AD 42 96 B6 lF...D..#.:$.B.. # 0020: F6 BB B7 15 23 E6 36 67 B7 B8 BC 74 EF BC AF 50 ....#.6g...t...P # }'} # ) # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 11:24:49.609 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE # countdown value = 137438953472 # javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-09-16 11:24:49.609 UTC|X509Authentication.java:246|No X.509 cert selected for EC # javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-09-16 11:24:49.609 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256 # javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-09-16 11:24:49.609 UTC|X509Authentication.java:246|No X.509 cert selected for EC # javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-09-16 11:24:49.610 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384 # javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-09-16 11:24:49.610 UTC|X509Authentication.java:246|No X.509 cert selected for EC # javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-09-16 11:24:49.610 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512 # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 11:24:49.610 UTC|SunX509KeyManagerImpl.java:401|matching alias: client # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 11:24:49.887 UTC|CertificateMessage.java:1140|Produced client Certificate message ( # "Certificate": { # "certificate_request_context": "", # "certificate_list": [ # { # "certificate" : { # "version" : "v3", # "serial number" : "1A 34 5F DC", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-09-16 11:24:30.000 UTC", # "not after" : "2023-12-15 11:24:30.000 UTC", # "subject" : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.35 Criticality=false # AuthorityKeyIdentifier [ # KeyIdentifier [ # 0000: D1 1E 55 9B D9 F1 B3 DD 93 D1 C1 49 98 01 0B 6F ..U........I...o # 0010: 9C B5 95 4C ...L # ] # ] # }, # { # ObjectId: 2.5.29.37 Criticality=true # ExtendedKeyUsages [ # clientAuth # ] # }, # { # ObjectId: 2.5.29.15 Criticality=true # KeyUsage [ # DigitalSignature # Non_repudiation # Key_Encipherment # ] # }, # { # ObjectId: 2.5.29.17 Criticality=false # SubjectAlternativeName [ # DNSName: test.solr.apache.org # IPAddress: 127.0.0.2 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: 48 5E 04 C8 8E D5 4D 93 7E 3A 06 01 0C 05 7A 4D H^....M..:....zM # 0010: 03 BD E1 EC .... # ] # ] # } # ]} # "extensions": { # <no extension> # } # }, # { # "certificate" : { # "version" : "v3", # "serial number" : "5B E2 68 5F", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-09-16 11:24:24.000 UTC", # "not after" : "2023-12-15 11:24:24.000 UTC", # "subject" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.35 Criticality=false # AuthorityKeyIdentifier [ # KeyIdentifier [ # 0000: 3A 81 7B 46 6E 2A D1 CD 45 77 59 62 F9 C1 A1 CF :..Fn*..EwYb.... # 0010: 07 15 4C 65 ..Le # ] # ] # }, # { # ObjectId: 2.5.29.19 Criticality=false # BasicConstraints:[ # CA:true # PathLen:0 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: D1 1E 55 9B D9 F1 B3 DD 93 D1 C1 49 98 01 0B 6F ..U........I...o # 0010: 9C B5 95 4C ...L # ] # ] # } # ]} # "extensions": { # <no extension> # } # }, # ] # } # ) # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 11:24:49.906 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message ( # "CertificateVerify": { # "signature algorithm": rsa_pss_rsae_sha256 # "signature": { # 0000: 4C 3B 79 E2 7D 53 5A 08 5C D4 76 B6 39 F2 64 58 L;y..SZ.\.v.9.dX # 0010: 96 39 55 14 EA D4 6B 47 44 69 9A 7A E3 6F 25 0B .9U...kGDi.z.o%. # 0020: C4 58 9F 55 E2 3D BA 66 E2 99 4A D1 C4 FE C0 24 .X.U.=.f..J....$ # 0030: 36 F1 FA 67 9F AA 27 08 CA A6 23 D5 FA 4F 41 4F 6..g..'...#..OAO # 0040: 81 11 15 1E 7C 31 5C 8F DF 43 78 03 D1 9B 73 D8 .....1\..Cx...s. # 0050: F6 9B 17 21 6D DD 50 B0 25 8D 10 AD 89 0F B2 E7 ...!m.P.%....... # 0060: 4B 1A 6E AA 8C 6B 0B AD B8 BF 00 90 B1 D5 80 E3 K.n..k.......... # 0070: CD B5 A1 82 61 79 31 78 09 A9 26 1A FE 72 C2 EC ....ay1x..&..r.. # 0080: FC 94 19 72 32 42 E7 4B 0B D6 D4 2D 5E 7F 15 2A ...r2B.K...-^..* # 0090: 47 6D A2 A3 B5 DB 1C DC B9 8D 6F 41 E6 9F 89 99 Gm........oA.... # 00A0: 01 CD E0 4C CD C2 F5 85 75 09 9A 25 11 DD 87 09 ...L....u..%.... # 00B0: 8B 70 53 68 5E 3A A9 06 7E 56 37 7D 1E 28 9E D5 .pSh^:...V7..(.. # 00C0: EE 65 24 0B 65 BD B6 2C FD EF 1E 0E 45 FB E7 B1 .e$.e..,....E... # 00D0: 64 E4 48 CE 90 74 0F DB 06 36 2B AF D4 C5 41 D7 d.H..t...6+...A. # 00E0: A5 4A C2 69 D7 46 6D 6B AF 3C 73 85 EF 8C 33 98 .J.i.Fmk.<s...3. # 00F0: 1D 66 D5 F8 58 A4 45 59 04 12 57 28 FD BA 19 1D .f..X.EY..W(.... # } # } # ) # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 11:24:49.907 UTC|Finished.java:673|Produced client Finished handshake message ( # "Finished": { # "verify data": { # 0000: 58 1B 89 34 02 B5 81 51 E5 C2 B7 FC 22 56 05 CD X..4...Q...."V.. # 0010: 0A FF 01 D1 BD 38 5A 4D 31 F6 09 BB BD 22 73 0E .....8ZM1...."s. # 0020: 98 0D D8 4E B8 44 8A C3 13 DF 42 C3 7F 8D 3E B0 ...N.D....B...>. # }'} # ) # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 11:24:49.907 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE # countdown value = 137438953472 # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 11:24:49.956 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message ( # "NewSessionTicket": { # "ticket_lifetime" : "86,400", # "ticket_age_add" : "<omitted>", # "ticket_nonce" : "01", # "ticket" : "AB C0 AF EC 96 B2 1E D3 68 0B EE 99 31 03 46 00 AE 17 30 35 BC 12 82 D4 50 5D 64 7C 85 D6 E8 E2", # "extensions" : [ # <no extension> # ] # } # ) # javax.net.ssl|DEBUG|0E|h2sc-1-thread-2|2023-09-16 11:24:50.235 UTC|Alert.java:238|Received alert message ( # "Alert": { # "level" : "warning", # "description": "close_notify" # } # ) # javax.net.ssl|ALL|01|main|2023-09-16 11:24:50.236 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine # javax.net.ssl|WARNING|01|main|2023-09-16 11:24:50.236 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data # # -- output does not contain substring -- # substring (1 lines): # Server refused connection # output (487 lines): # INFO - 2023-09-16 11:25:03.969; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword # javax.net.ssl|DEBUG|01|main|2023-09-16 11:25:04.250 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates ( # "certificate" : { # "version" : "v3", # "serial number" : "5B E2 68 5F", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-09-16 11:24:24.000 UTC", # "not after" : "2023-12-15 11:24:24.000 UTC", # "subject" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.35 Criticality=false # AuthorityKeyIdentifier [ # KeyIdentifier [ # 0000: 3A 81 7B 46 6E 2A D1 CD 45 77 59 62 F9 C1 A1 CF :..Fn*..EwYb.... # 0010: 07 15 4C 65 ..Le # ] # ] # }, # { # ObjectId: 2.5.29.19 Criticality=false # BasicConstraints:[ # CA:true # PathLen:0 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: D1 1E 55 9B D9 F1 B3 DD 93 D1 C1 49 98 01 0B 6F ..U........I...o # 0010: 9C B5 95 4C ...L # ] # ] # } # ]}, # "certificate" : { # "version" : "v3", # "serial number" : "72 4C 13 E2", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-09-16 11:24:22.000 UTC", # "not after" : "2023-12-15 11:24:22.000 UTC", # "subject" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.19 Criticality=true # BasicConstraints:[ # CA:true # PathLen:2147483647 # ] # }, # { # ObjectId: 2.5.29.17 Criticality=false # SubjectAlternativeName [ # DNSName: localhost # IPAddress: 127.0.0.1 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: 3A 81 7B 46 6E 2A D1 CD 45 77 59 62 F9 C1 A1 CF :..Fn*..EwYb.... # 0010: 07 15 4C 65 ..Le # ] # ] # } # ]} # ) # javax.net.ssl|DEBUG|01|main|2023-09-16 11:25:04.261 UTC|SSLCipher.java:464|jdk.tls.keyLimits: entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472 # javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-09-16 11:25:04.794 UTC|ServerNameExtension.java:261|Unable to indicate server name # javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-09-16 11:25:04.794 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name # javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-09-16 11:25:04.795 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers # javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-09-16 11:25:04.796 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers # javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-09-16 11:25:04.799 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie # javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-09-16 11:25:04.808 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info # javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-09-16 11:25:04.809 UTC|PreSharedKeyExtension.java:633|No session to resume. # javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-09-16 11:25:04.809 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key # javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-09-16 11:25:04.810 UTC|ClientHello.java:642|Produced ClientHello handshake message ( # "ClientHello": { # "client version" : "TLSv1.2", # "random" : "6E A0 B5 C8 C6 50 35 68 78 77 79 B8 F9 91 40 08 D6 1F 65 42 E5 2B B0 59 23 40 C4 7F 86 CE E9 3F", # "session id" : "09 B5 FB 67 9F E9 0C 3D 5D 4D B3 3C 36 49 62 A7 A3 5E 7E 39 BB 59 1D B4 05 54 A4 83 12 36 0F BC", # "cipher suites" : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]", # "compression methods" : "00", # "extensions" : [ # "status_request (5)": { # "certificate status type": ocsp # "OCSP status request": { # "responder_id": <empty> # "request extensions": { # <empty> # } # } # }, # "supported_groups (10)": { # "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192] # }, # "ec_point_formats (11)": { # "formats": [uncompressed] # }, # "signature_algorithms (13)": { # "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1] # }, # "signature_algorithms_cert (50)": { # "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1] # }, # "application_layer_protocol_negotiation (16)": { # [h2] # }, # "status_request_v2 (17)": { # "cert status request": { # "certificate status type": ocsp_multi # "OCSP status request": { # "responder_id": <empty> # "request extensions": { # <empty> # } # } # } # }, # "extended_master_secret (23)": { # <empty> # }, # "supported_versions (43)": { # "versions": [TLSv1.3, TLSv1.2] # }, # "psk_key_exchange_modes (45)": { # "ke_modes": [psk_dhe_ke] # }, # "key_share (51)": { # "client_shares": [ # { # "named group": x25519 # "key_exchange": { # 0000: 40 E6 E4 CB A5 42 AD 7C 8E B4 1F C7 43 33 D2 B4 @....B......C3.. # 0010: C9 02 DA BE 37 BD 9F B5 39 0B C2 AE 07 7B 17 58 ....7...9......X # } # }, # ] # } # ] # } # ) # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 11:25:04.831 UTC|ServerHello.java:867|Consuming ServerHello handshake message ( # "ServerHello": { # "server version" : "TLSv1.2", # "random" : "16 14 27 AB A9 68 4C 4A CF 1F 02 17 FB 35 71 5B 70 12 A0 8C 25 EB 7F C8 25 8F 1D AE 2F BC 6C 08", # "session id" : "09 B5 FB 67 9F E9 0C 3D 5D 4D B3 3C 36 49 62 A7 A3 5E 7E 39 BB 59 1D B4 05 54 A4 83 12 36 0F BC", # "cipher suite" : "TLS_AES_256_GCM_SHA384(0x1302)", # "compression methods" : "00", # "extensions" : [ # "supported_versions (43)": { # "selected version": [TLSv1.3] # }, # "key_share (51)": { # "server_share": { # "named group": x25519 # "key_exchange": { # 0000: 79 96 44 C7 B9 75 75 40 62 17 7D B6 D5 56 EA 13 [email protected].. # 0010: 05 AF 16 E9 DC 67 AC EC E5 69 66 57 55 D9 01 41 .....g...ifWU..A # } # }, # } # ] # } # ) # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 11:25:04.831 UTC|SSLExtensions.java:192|Consumed extension: supported_versions # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 11:25:04.831 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3 # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 11:25:04.832 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 11:25:04.832 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 11:25:04.832 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 11:25:04.833 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 11:25:04.833 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 11:25:04.833 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2 # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 11:25:04.833 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 11:25:04.834 UTC|SSLExtensions.java:192|Consumed extension: supported_versions # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 11:25:04.838 UTC|SSLExtensions.java:192|Consumed extension: key_share # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 11:25:04.838 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 11:25:04.838 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence. # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 11:25:04.839 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 11:25:04.839 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 11:25:04.839 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 11:25:04.839 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 11:25:04.839 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation # javax.net.ssl|DEBUG|12|h2sc-1-thread-5| [...truncated too long message...] va.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128) # at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628) # at java.base/java.lang.Thread.run(Thread.java:829) # Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target # at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141) # at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126) # at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297) # at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434) # ... 28 more} # # ) # javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-09-16 11:26:14.298 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data # javax.net.ssl|DEBUG|03|Finalizer|2023-09-16 11:26:14.346 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket # javax.net.ssl|DEBUG|03|Finalizer|2023-09-16 11:26:14.346 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive) # javax.net.ssl|DEBUG|03|Finalizer|2023-09-16 11:26:14.347 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket # javax.net.ssl|DEBUG|03|Finalizer|2023-09-16 11:26:14.347 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive) # Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:8984/solr/admin/info/system # at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:551) # at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192) # at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:552) # at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:469) # at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:426) # at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:146) # at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:151) # Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target # at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131) # at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353) # at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296) # at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291) # at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357) # at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232) # at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175) # at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392) # at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443) # at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074) # at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061) # at java.base/java.security.AccessController.doPrivileged(Native Method) # at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008) # at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657) # at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102) # at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84) # at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314) # at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100) # at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558) # at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379) # at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146) # at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100) # at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53) # at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:289) # at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128) # at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628) # at java.base/java.lang.Thread.run(Thread.java:829) # Suppressed: java.io.IOException: Broken pipe # at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138) # at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422) # at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275) # at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254) # at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386) # at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292) # at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243) # at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224) # at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821) # at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793) # at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161) # at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451) # at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117) # at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87) # ... 11 more # Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target # at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439) # at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306) # at java.base/sun.security.validator.Validator.validate(Validator.java:264) # at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313) # at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276) # at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141) # at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335) # ... 22 more # Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target # at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141) # at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126) # at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297) # at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434) # ... 28 more ok 74 SOLR-11740 check 'solr stop' connection in 14073ms ok 75 stop command for single port in 16631ms ok 76 status detects locally running solr in 8430ms ok 77 status shell script ignores passed in -solrUrl cli parameter from user in 7077ms ok 78 status help flag outputs message highlighting not to use solrUrl. in 919ms ok 79 listing out files in 3008ms ok 80 copying files around in 5974ms ok 81 upconfig in 2855ms ok 82 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1204ms ok 83 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1217ms > Task :solr:packaging:integrationTests FAILED FAILURE: Build failed with an exception. * Where: Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build.gradle' line: 286 * What went wrong: Execution failed for task ':solr:packaging:integrationTests'. > Process 'command > '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats/bin/bats'' > finished with non-zero exit value 1 * Try: > Run with --stacktrace option to get the stack trace. > Run with --info or --debug option to get more log output. * Get more help at https://help.gradle.org Deprecated Gradle features were used in this build, making it incompatible with Gradle 8.0. You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins. See https://docs.gradle.org/7.6/userguide/command_line_interface.html#sec:command_line_warnings BUILD FAILED in 1h 1m 6s 624 actionable tasks: 624 executed Publishing build scan... Publishing build scan failed due to network error 'java.net.SocketTimeoutException: Read timed out' (2 retries remaining)... Publishing build scan failed due to network error 'java.net.SocketTimeoutException: Read timed out' (1 retry remaining)... A network error occurred. If you require assistance with this problem, please report it to your Gradle Enterprise administrator and include the following information via copy/paste. ---------- Gradle version: 7.6 Plugin version: 3.13.1 Request URL: https://ge.apache.org/scans/publish/gradle/3.13.1/upload Request ID: b2eaeb4a-5599-494b-a74b-5f5eb7c1ba4f Exception: java.net.SocketTimeoutException: Read timed out ---------- Build step 'Invoke Gradle script' changed build result to FAILURE Build step 'Invoke Gradle script' marked build as failure Archiving artifacts Recording test results [Checks API] No suitable checks publisher found. Email was triggered for: Failure - Any Sending email for trigger: Failure - Any
--------------------------------------------------------------------- To unsubscribe, e-mail: [email protected] For additional commands, e-mail: [email protected]
