Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5527/
All tests passed Build Log: [...truncated 1325 lines...] # ERROR: IOException occurred when talking to server at: https://localhost:44517/solr/test/select # -- # # Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2 # Last output: # INFO - 2023-09-24 12:16:41.697; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword # INFO - 2023-09-24 12:16:41.703; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword # WARN - 2023-09-24 12:16:42.622; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes # WARN - 2023-09-24 12:16:42.661; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes ok 60 start solr with ssl and auth in 23072ms ok 61 start solr with client truststore and security manager in 25728ms not ok 62 start solr with mTLS needed in 58848ms # (in test file test/test_ssl.bats, line 325) # `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed # /tmp/bats-run-SShBI7/test/62/ssl # Certificate was added to keystore # Certificate reply was installed in keystore # Certificate was added to keystore # Certificate was added to keystore # Certificate reply was installed in keystore # Certificate was added to keystore # Certificate was added to keystore # Certificate was added to keystore # Certificate was added to keystore # Certificate reply was installed in keystore # Certificate was added to keystore # Certificate was added to keystore # NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 44517. # # Started Solr server on port 44517 (pid=202422). Happy searching! # # NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 44518. # # Started Solr server on port 44518 (pid=202846). Happy searching! # # INFO - 2023-09-24 12:18:06.491; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword # INFO - 2023-09-24 12:18:06.496; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword # INFO - 2023-09-24 12:18:06.846; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@32193bea(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@66fdec9[provider=null,keyStore=file:///tmp/bats-run-SShBI7/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-SShBI7/test/62/ssl/client/solr-client.truststore.p12] # INFO - 2023-09-24 12:18:06.849; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@52851b44(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@66fdec9[provider=null,keyStore=file:///tmp/bats-run-SShBI7/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-SShBI7/test/62/ssl/client/solr-client.truststore.p12] # INFO - 2023-09-24 12:18:06.849; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@584f54e6(ca,h=[localhost],a=[],w=[]) for Client@66fdec9[provider=null,keyStore=file:///tmp/bats-run-SShBI7/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-SShBI7/test/62/ssl/client/solr-client.truststore.p12] # javax.net.ssl|DEBUG|01|main|2023-09-24 12:18:06.881 UTC|SunX509KeyManagerImpl.java:164|found key for : client ( # "certificate" : { # "version" : "v3", # "serial number" : "7D 1A C1 EE", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-09-24 12:17:42.000 UTC", # "not after" : "2023-12-23 12:17:42.000 UTC", # "subject" : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.35 Criticality=false # AuthorityKeyIdentifier [ # KeyIdentifier [ # 0000: CE 0F D1 A9 DE 2D 62 37 EE 1E 81 9B BB 0E C7 23 .....-b7.......# # 0010: 8D DE E5 D8 .... # ] # ] # }, # { # ObjectId: 2.5.29.37 Criticality=true # ExtendedKeyUsages [ # clientAuth # ] # }, # { # ObjectId: 2.5.29.15 Criticality=true # KeyUsage [ # DigitalSignature # Non_repudiation # Key_Encipherment # ] # }, # { # ObjectId: 2.5.29.17 Criticality=false # SubjectAlternativeName [ # DNSName: test.solr.apache.org # IPAddress: 127.0.0.2 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: 2D 2D A4 E4 D9 CC AE 87 BA DC E2 8C D6 74 7F 24 --...........t.$ # 0010: 71 78 45 56 qxEV # ] # ] # } # ]}, # "certificate" : { # "version" : "v3", # "serial number" : "37 17 31 92", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-09-24 12:17:36.000 UTC", # "not after" : "2023-12-23 12:17:36.000 UTC", # "subject" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.35 Criticality=false # AuthorityKeyIdentifier [ # KeyIdentifier [ # 0000: 22 76 BB 51 75 41 AC CF 63 B9 BD 74 BA 44 A8 DF "v.QuA..c..t.D.. # 0010: 80 E9 59 A9 ..Y. # ] # ] # }, # { # ObjectId: 2.5.29.19 Criticality=false # BasicConstraints:[ # CA:true # PathLen:0 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: CE 0F D1 A9 DE 2D 62 37 EE 1E 81 9B BB 0E C7 23 .....-b7.......# # 0010: 8D DE E5 D8 .... # ] # ] # } # ]} # ) # javax.net.ssl|DEBUG|01|main|2023-09-24 12:18:06.886 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates ( # "certificate" : { # "version" : "v3", # "serial number" : "37 17 31 92", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-09-24 12:17:36.000 UTC", # "not after" : "2023-12-23 12:17:36.000 UTC", # "subject" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.35 Criticality=false # AuthorityKeyIdentifier [ # KeyIdentifier [ # 0000: 22 76 BB 51 75 41 AC CF 63 B9 BD 74 BA 44 A8 DF "v.QuA..c..t.D.. # 0010: 80 E9 59 A9 ..Y. # ] # ] # }, # { # ObjectId: 2.5.29.19 Criticality=false # BasicConstraints:[ # CA:true # PathLen:0 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: CE 0F D1 A9 DE 2D 62 37 EE 1E 81 9B BB 0E C7 23 .....-b7.......# # 0010: 8D DE E5 D8 .... # ] # ] # } # ]}, # "certificate" : { # "version" : "v3", # "serial number" : "37 A6 61 A5", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-09-24 12:17:34.000 UTC", # "not after" : "2023-12-23 12:17:34.000 UTC", # "subject" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.19 Criticality=true # BasicConstraints:[ # CA:true # PathLen:2147483647 # ] # }, # { # ObjectId: 2.5.29.17 Criticality=false # SubjectAlternativeName [ # DNSName: localhost # IPAddress: 127.0.0.1 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: 22 76 BB 51 75 41 AC CF 63 B9 BD 74 BA 44 A8 DF "v.QuA..c..t.D.. # 0010: 80 E9 59 A9 ..Y. # ] # ] # } # ]} # ) # javax.net.ssl|DEBUG|01|main|2023-09-24 12:18:06.900 UTC|SSLCipher.java:464|jdk.tls.keyLimits: entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472 # javax.net.ssl|DEBUG|03|Finalizer|2023-09-24 12:18:06.986 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket # javax.net.ssl|DEBUG|03|Finalizer|2023-09-24 12:18:06.987 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive) # javax.net.ssl|DEBUG|03|Finalizer|2023-09-24 12:18:06.987 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket # javax.net.ssl|DEBUG|03|Finalizer|2023-09-24 12:18:06.987 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive) # javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-24 12:18:07.130 UTC|ServerNameExtension.java:261|Unable to indicate server name # javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-24 12:18:07.131 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name # javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-24 12:18:07.132 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers # javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-24 12:18:07.133 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers # javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-24 12:18:07.138 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie # javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-24 12:18:07.150 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info # javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-24 12:18:07.150 UTC|PreSharedKeyExtension.java:633|No session to resume. # javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-24 12:18:07.150 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key # javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-24 12:18:07.152 UTC|ClientHello.java:642|Produced ClientHello handshake message ( # "ClientHello": { # "client version" : "TLSv1.2", # "random" : "BC 2D 99 81 61 88 C5 58 7C E6 BD 5F 78 74 AF 2B A0 F3 B1 DE 80 5B C9 33 81 8F C1 80 0E B8 DA 22", # "session id" : "B3 26 CA 09 65 55 DE 05 64 D7 73 3E CA 67 5D E0 29 19 89 FE 75 6C DC 93 F0 68 93 7E 7A 93 2A 14", # "cipher suites" : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]", # "compression methods" : "00", # "extensions" : [ # "status_request (5)": { # "certificate status type": ocsp # "OCSP status request": { # "responder_id": <empty> # "request extensions": { # <empty> # } # } # }, # "supported_groups (10)": { # "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192] # }, # "ec_point_formats (11)": { # "formats": [uncompressed] # }, # "signature_algorithms (13)": { # "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1] # }, # "signature_algorithms_cert (50)": { # "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1] # }, # "application_layer_protocol_negotiation (16)": { # [h2] # }, # "status_request_v2 (17)": { # "cert status request": { # "certificate status type": ocsp_multi # "OCSP status request": { # "responder_id": <empty> # "request extensions": { # <empty> # } # } # } # }, # "extended_master_secret (23)": { # <empty> # }, # "supported_versions (43)": { # "versions": [TLSv1.3, TLSv1.2] # }, # "psk_key_exchange_modes (45)": { # "ke_modes": [psk_dhe_ke] # }, # "key_share (51)": { # "client_shares": [ # { # "named group": x25519 # "key_exchange": { # 0000: F1 D4 7D 0D 9A 81 56 C6 CE F3 1D 00 87 63 DB 7F ......V......c.. # 0010: 91 4B C4 38 6A A7 26 BB 58 CC B5 AE 38 D0 2B 62 .K.8j.&.X...8.+b # } # }, # ] # } # ] # } # ) # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:07.268 UTC|ServerHello.java:867|Consuming ServerHello handshake message ( # "ServerHello": { # "server version" : "TLSv1.2", # "random" : "12 36 0C BD 33 37 9F 1C D8 D0 D0 C7 81 62 20 2E 18 29 29 79 41 73 B6 57 54 DF 62 16 12 E5 08 8B", # "session id" : "B3 26 CA 09 65 55 DE 05 64 D7 73 3E CA 67 5D E0 29 19 89 FE 75 6C DC 93 F0 68 93 7E 7A 93 2A 14", # "cipher suite" : "TLS_AES_256_GCM_SHA384(0x1302)", # "compression methods" : "00", # "extensions" : [ # "supported_versions (43)": { # "selected version": [TLSv1.3] # }, # "key_share (51)": { # "server_share": { # "named group": x25519 # "key_exchange": { # 0000: 90 D6 99 FA 08 BC 27 EE 9D 51 5F 9E A9 33 24 2D ......'..Q_..3$- # 0010: 70 AF 0B 7C 41 0B A1 79 64 E6 18 AA 59 82 5C 75 p...A..yd...Y.\u # } # }, # } # ] # } # ) # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:07.269 UTC|SSLExtensions.java:192|Consumed extension: supported_versions # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:07.269 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3 # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:07.270 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:07.270 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:07.270 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:07.270 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:07.270 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:07.270 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2 # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:07.271 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:07.271 UTC|SSLExtensions.java:192|Consumed extension: supported_versions # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:07.272 UTC|SSLExtensions.java:192|Consumed extension: key_share # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:07.273 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:07.273 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence. # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:07.273 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:07.273 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:07.274 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:07.274 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:07.274 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:07.274 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2 # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:07.274 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret # javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-24 12:18:07.274 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions # javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-24 12:18:07.274 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:07.275 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:07.275 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:07.282 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE # countdown value = 137438953472 # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:07.283 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE # countdown value = 137438953472 # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:07.284 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:07.288 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message ( # "EncryptedExtensions": [ # "supported_groups (10)": { # "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192] # }, # "application_layer_protocol_negotiation (16)": { # [h2] # } # ] # ) # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:07.288 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:07.288 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:07.288 UTC|SSLExtensions.java:192|Consumed extension: supported_groups # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:07.289 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:07.289 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:07.289 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length # javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-24 12:18:07.289 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups # javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-24 12:18:07.289 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:07.290 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message ( # "CertificateRequest": { # "certificate_request_context": "", # "extensions": [ # "signature_algorithms (13)": { # "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1] # }, # "signature_algorithms_cert (50)": { # "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1] # }, # "certificate_authorities (47)": { # "certificate authorities": [ # CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country # CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country] # } # ] # } # ) # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:07.291 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:07.291 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:07.292 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:07.292 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:07.293 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert # javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-24 12:18:07.293 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:07.296 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message ( # "Certificate": { # "certificate_request_context": "", # "certificate_list": [ # { # "certificate" : { # "version" : "v3", # "serial number" : "55 36 FF 1C", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-09-24 12:17:38.000 UTC", # "not after" : "2023-12-23 12:17:38.000 UTC", # "subject" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.35 Criticality=false # AuthorityKeyIdentifier [ # KeyIdentifier [ # 0000: CE 0F D1 A9 DE 2D 62 37 EE 1E 81 9B BB 0E C7 23 .....-b7.......# # 0010: 8D DE E5 D8 .... # ] # ] # }, # { # ObjectId: 2.5.29.37 Criticality=true # ExtendedKeyUsages [ # serverAuth # ] # }, # { # ObjectId: 2.5.29.15 Criticality=true # KeyUsage [ # DigitalSignature # Non_repudiation # Key_Encipherment # ] # }, # { # ObjectId: 2.5.29.17 Criticality=false # SubjectAlternativeName [ # DNSName: localhost # IPAddress: 127.0.0.1 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: 32 2D C6 08 B0 A6 AD 71 DD A2 C9 F5 D9 A6 CB 5C 2-.....q.......\ # 0010: F5 AA 92 5D ...] # ] # ] # } # ]} # "extensions": { # <no extension> # } # }, # ] # } # ) # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:07.296 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:07.372 UTC|X509TrustManagerImpl.java:292|Found trusted certificate ( # "certificate" : { # "version" : "v3", # "serial number" : "37 17 31 92", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-09-24 12:17:36.000 UTC", # "not after" : "2023-12-23 12:17:36.000 UTC", # "subject" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.35 Criticality=false # AuthorityKeyIdentifier [ # KeyIdentifier [ # 0000: 22 76 BB 51 75 41 AC CF 63 B9 BD 74 BA 44 A8 DF "v.QuA..c..t.D.. # 0010: 80 E9 59 A9 ..Y. # ] # ] # }, # { # ObjectId: 2.5.29.19 Criticality=false # BasicConstraints:[ # CA:true # PathLen:0 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: CE 0F D1 A9 DE 2D 62 37 EE 1E 81 9B BB 0E C7 23 .....-b7.......# # 0010: 8D DE E5 D8 .... # ] # ] # } # ]} # ) # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:07.375 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message ( # "CertificateVerify": { # "signature algorithm": rsa_pss_rsae_sha256 # "signature": { # 0000: 45 34 7A D7 25 B4 E8 B5 6D 79 D0 95 7C 2B A4 AF E4z.%...my...+.. # 0010: 3A BC 74 66 5C 15 86 D9 C7 20 6E 79 07 A0 4F EC :.tf\.... ny..O. # 0020: 22 CE BD 35 16 72 D4 F3 83 C0 AE AB 5A 65 A0 87 "..5.r......Ze.. # 0030: 9B A7 69 9A 7B 0A E1 2C C7 14 57 D8 24 E5 AF 50 ..i....,..W.$..P # 0040: 85 A6 0E 23 AD BC 82 C4 03 9D A5 20 5B DC 69 C0 ...#....... [.i. # 0050: 48 9F 83 64 60 E9 5B 22 52 89 55 EA 98 87 C3 8F H..d`.["R.U..... # 0060: 93 5C 68 0F CD 0F A8 E6 FF 9D E3 BE E0 0C F9 64 .\h............d # 0070: C5 30 BF F8 44 8F 13 AD 59 9D 2F F0 39 2E 7F 5D .0..D...Y./.9..] # 0080: 2C B7 D1 15 A1 9D 0C 48 A2 63 2E 4B BC DA F8 D6 ,......H.c.K.... # 0090: E5 0F 42 BA A1 06 E2 B7 24 BB 47 2C 66 5E DA 0A ..B.....$.G,f^.. # 00A0: 03 88 5E A5 AB 6B F7 4C 25 A4 27 B8 29 C1 D8 28 ..^..k.L%.'.)..( # 00B0: 71 50 7F FE C4 7A 0A 45 E9 1A A8 C9 CD AA 18 2F qP...z.E......./ # 00C0: 20 BF BF 39 84 D7 1B AB 43 CB 98 E0 B9 57 40 63 ..9....C....W@c # 00D0: C5 89 A2 75 84 38 54 CF 59 7A 9E 96 CA 97 39 35 ...u.8T.Yz....95 # 00E0: 05 6C E4 07 05 16 BF 47 77 A5 7D D6 DE A3 C6 57 .l.....Gw......W # 00F0: 54 C5 C4 92 1B 1E 04 0B C4 B5 77 16 F4 20 65 28 T.........w.. e( # } # } # ) # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:07.377 UTC|Finished.java:898|Consuming server Finished handshake message ( # "Finished": { # "verify data": { # 0000: 5D 24 6D EA D0 61 62 88 91 79 42 96 0A 5E F8 84 ]$m..ab..yB..^.. # 0010: DA 95 B0 EA DC D6 DE F3 21 0B 30 48 FF 29 EB B3 ........!.0H.).. # 0020: B2 61 75 BA 43 49 55 53 8F 60 A4 4F B6 F9 0E 92 .au.CIUS.`.O.... # }'} # ) # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:07.379 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE # countdown value = 137438953472 # javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-24 12:18:07.380 UTC|X509Authentication.java:246|No X.509 cert selected for EC # javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-24 12:18:07.380 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256 # javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-24 12:18:07.381 UTC|X509Authentication.java:246|No X.509 cert selected for EC # javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-24 12:18:07.381 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384 # javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-24 12:18:07.381 UTC|X509Authentication.java:246|No X.509 cert selected for EC # javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-24 12:18:07.381 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512 # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:07.381 UTC|SunX509KeyManagerImpl.java:401|matching alias: client # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:07.384 UTC|CertificateMessage.java:1140|Produced client Certificate message ( # "Certificate": { # "certificate_request_context": "", # "certificate_list": [ # { # "certificate" : { # "version" : "v3", # "serial number" : "7D 1A C1 EE", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-09-24 12:17:42.000 UTC", # "not after" : "2023-12-23 12:17:42.000 UTC", # "subject" : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.35 Criticality=false # AuthorityKeyIdentifier [ # KeyIdentifier [ # 0000: CE 0F D1 A9 DE 2D 62 37 EE 1E 81 9B BB 0E C7 23 .....-b7.......# # 0010: 8D DE E5 D8 .... # ] # ] # }, # { # ObjectId: 2.5.29.37 Criticality=true # ExtendedKeyUsages [ # clientAuth # ] # }, # { # ObjectId: 2.5.29.15 Criticality=true # KeyUsage [ # DigitalSignature # Non_repudiation # Key_Encipherment # ] # }, # { # ObjectId: 2.5.29.17 Criticality=false # SubjectAlternativeName [ # DNSName: test.solr.apache.org # IPAddress: 127.0.0.2 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: 2D 2D A4 E4 D9 CC AE 87 BA DC E2 8C D6 74 7F 24 --...........t.$ # 0010: 71 78 45 56 qxEV # ] # ] # } # ]} # "extensions": { # <no extension> # } # }, # { # "certificate" : { # "version" : "v3", # "serial number" : "37 17 31 92", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-09-24 12:17:36.000 UTC", # "not after" : "2023-12-23 12:17:36.000 UTC", # "subject" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.35 Criticality=false # AuthorityKeyIdentifier [ # KeyIdentifier [ # 0000: 22 76 BB 51 75 41 AC CF 63 B9 BD 74 BA 44 A8 DF "v.QuA..c..t.D.. # 0010: 80 E9 59 A9 ..Y. # ] # ] # }, # { # ObjectId: 2.5.29.19 Criticality=false # BasicConstraints:[ # CA:true # PathLen:0 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: CE 0F D1 A9 DE 2D 62 37 EE 1E 81 9B BB 0E C7 23 .....-b7.......# # 0010: 8D DE E5 D8 .... # ] # ] # } # ]} # "extensions": { # <no extension> # } # }, # ] # } # ) # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:07.410 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message ( # "CertificateVerify": { # "signature algorithm": rsa_pss_rsae_sha256 # "signature": { # 0000: A2 A5 AC 5E 96 90 2B 85 73 F5 A2 02 88 67 0C 42 ...^..+.s....g.B # 0010: E8 17 F4 06 B7 99 CC 17 AA FC D7 36 A3 DF 12 5B ...........6...[ # 0020: 01 19 7E 9F 70 E2 5A 32 97 D2 C8 9A A6 22 9E 45 ....p.Z2.....".E # 0030: 7A 82 0D E7 58 CE CA 40 C1 EA DF 3B 0D A6 10 56 z...X..@...;...V # 0040: 9B 5E BF 10 A2 12 FB 59 DC C1 59 6F DB 06 2F 70 .^.....Y..Yo../p # 0050: 1B 93 66 55 63 F2 8D 86 29 BF 67 35 F5 45 73 67 ..fUc...).g5.Esg # 0060: 43 21 0C 51 7B 6B 4C 7E 77 5D 83 73 93 EE 22 9B C!.Q.kL.w].s..". # 0070: 24 39 61 7F DA 71 DF 1B 0F 24 E9 A5 60 AC 03 56 $9a..q...$..`..V # 0080: 9A 17 7E DA D6 C0 8D 01 33 29 5C 66 DE 4E 53 5A ........3)\f.NSZ # 0090: 6B C5 99 EB 5F 1B 09 33 96 27 58 AF 34 E0 3E 79 k..._..3.'X.4.>y # 00A0: 0D 46 5E DB AE 05 9E 69 0A 83 95 9C A6 96 89 E8 .F^....i........ # 00B0: C5 D6 4B F2 AE E0 B7 57 AC 3A 4B 9F 43 03 68 0F ..K....W.:K.C.h. # 00C0: 1A 83 FB 2D 95 E1 FD 14 99 39 3C C7 05 F3 B1 CB ...-.....9<..... # 00D0: FC 6B 3C E7 A4 C4 24 C2 5D E9 53 C7 8B E2 A5 46 .k<...$.].S....F # 00E0: 2B 06 B1 03 E0 21 F9 53 FA 3F A8 B7 24 A5 62 32 +....!.S.?..$.b2 # 00F0: 43 FE F4 CA BB FC 96 C3 1C 93 8A 78 96 F4 EB 48 C..........x...H # } # } # ) # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:07.411 UTC|Finished.java:673|Produced client Finished handshake message ( # "Finished": { # "verify data": { # 0000: 1A 4B F8 E6 08 EA 31 F1 74 BC DA 0F 45 96 06 49 .K....1.t...E..I # 0010: 24 5D E5 87 C1 F0 F4 22 DB A2 BA 8C D0 D5 EF 9A $]....."........ # 0020: 0C D1 AA A7 B7 FF C2 15 56 C6 66 D8 85 CE 9A D6 ........V.f..... # }'} # ) # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:07.412 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE # countdown value = 137438953472 # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:07.460 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message ( # "NewSessionTicket": { # "ticket_lifetime" : "86,400", # "ticket_age_add" : "<omitted>", # "ticket_nonce" : "01", # "ticket" : "2E EA CA 57 96 E5 24 C5 F4 21 25 81 BD AA 3F CF CC C6 8B 2F 83 D7 EA 9A 48 E0 44 9F DE 52 9B 2F", # "extensions" : [ # <no extension> # ] # } # ) # javax.net.ssl|ALL|01|main|2023-09-24 12:18:07.722 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine # javax.net.ssl|WARNING|01|main|2023-09-24 12:18:07.723 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data # INFO - 2023-09-24 12:18:08.676; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword # INFO - 2023-09-24 12:18:08.681; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword # INFO - 2023-09-24 12:18:09.051; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@32193bea(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@66fdec9[provider=null,keyStore=file:///tmp/bats-run-SShBI7/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-SShBI7/test/62/ssl/client/solr-client.truststore.p12] # INFO - 2023-09-24 12:18:09.054; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@52851b44(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@66fdec9[provider=null,keyStore=file:///tmp/bats-run-SShBI7/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-SShBI7/test/62/ssl/client/solr-client.truststore.p12] # INFO - 2023-09-24 12:18:09.054; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@584f54e6(ca,h=[localhost],a=[],w=[]) for Client@66fdec9[provider=null,keyStore=file:///tmp/bats-run-SShBI7/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-SShBI7/test/62/ssl/client/solr-client.truststore.p12] # javax.net.ssl|DEBUG|01|main|2023-09-24 12:18:09.086 UTC|SunX509KeyManagerImpl.java:164|found key for : client ( # "certificate" : { # "version" : "v3", # "serial number" : "7D 1A C1 EE", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-09-24 12:17:42.000 UTC", # "not after" : "2023-12-23 12:17:42.000 UTC", # "subject" : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.35 Criticality=false # AuthorityKeyIdentifier [ # KeyIdentifier [ # 0000: CE 0F D1 A9 DE 2D 62 37 EE 1E 81 9B BB 0E C7 23 .....-b7.......# # 0010: 8D DE E5 D8 .... # ] # ] # }, # { # ObjectId: 2.5.29.37 Criticality=true # ExtendedKeyUsages [ # clientAuth # ] # }, # { # ObjectId: 2.5.29.15 Criticality=true # KeyUsage [ # DigitalSignature # Non_repudiation # Key_Encipherment # ] # }, # { # ObjectId: 2.5.29.17 Criticality=false # SubjectAlternativeName [ # DNSName: test.solr.apache.org # IPAddress: 127.0.0.2 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: 2D 2D A4 E4 D9 CC AE 87 BA DC E2 8C D6 74 7F 24 --...........t.$ # 0010: 71 78 45 56 qxEV # ] # ] # } # ]}, # "certificate" : { # "version" : "v3", # "serial number" : "37 17 31 92", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-09-24 12:17:36.000 UTC", # "not after" : "2023-12-23 12:17:36.000 UTC", # "subject" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.35 Criticality=false # AuthorityKeyIdentifier [ # KeyIdentifier [ # 0000: 22 76 BB 51 75 41 AC CF 63 B9 BD 74 BA 44 A8 DF "v.QuA..c..t.D.. # 0010: 80 E9 59 A9 ..Y. # ] # ] # }, # { # ObjectId: 2.5.29.19 Criticality=false # BasicConstraints:[ # CA:true # PathLen:0 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: CE 0F D1 A9 DE 2D 62 37 EE 1E 81 9B BB 0E C7 23 .....-b7.......# # 0010: 8D DE E5 D8 .... # ] # ] # } # ]} # ) # javax.net.ssl|DEBUG|01|main|2023-09-24 12:18:09.091 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates ( # "certificate" : { # "version" : "v3", # "serial number" : "37 17 31 92", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-09-24 12:17:36.000 UTC", # "not after" : "2023-12-23 12:17:36.000 UTC", # "subject" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.35 Criticality=false # AuthorityKeyIdentifier [ # KeyIdentifier [ # 0000: 22 76 BB 51 75 41 AC CF 63 B9 BD 74 BA 44 A8 DF "v.QuA..c..t.D.. # 0010: 80 E9 59 A9 ..Y. # ] # ] # }, # { # ObjectId: 2.5.29.19 Criticality=false # BasicConstraints:[ # CA:true # PathLen:0 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: CE 0F D1 A9 DE 2D 62 37 EE 1E 81 9B BB 0E C7 23 .....-b7.......# # 0010: 8D DE E5 D8 .... # ] # ] # } # ]}, # "certificate" : { # "version" : "v3", # "serial number" : "37 A6 61 A5", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-09-24 12:17:34.000 UTC", # "not after" : "2023-12-23 12:17:34.000 UTC", # "subject" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.19 Criticality=true # BasicConstraints:[ # CA:true # PathLen:2147483647 # ] # }, # { # ObjectId: 2.5.29.17 Criticality=false # SubjectAlternativeName [ # DNSName: localhost # IPAddress: 127.0.0.1 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: 22 76 BB 51 75 41 AC CF 63 B9 BD 74 BA 44 A8 DF "v.QuA..c..t.D.. # 0010: 80 E9 59 A9 ..Y. # ] # ] # } # ]} # ) # javax.net.ssl|DEBUG|01|main|2023-09-24 12:18:09.105 UTC|SSLCipher.java:464|jdk.tls.keyLimits: entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472 # javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-24 12:18:09.340 UTC|ServerNameExtension.java:261|Unable to indicate server name # javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-24 12:18:09.340 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name # javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-24 12:18:09.342 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers # javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-24 12:18:09.342 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers # javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-24 12:18:09.347 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie # javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-24 12:18:09.359 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info # javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-24 12:18:09.359 UTC|PreSharedKeyExtension.java:633|No session to resume. # javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-24 12:18:09.359 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key # javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-24 12:18:09.361 UTC|ClientHello.java:642|Produced ClientHello handshake message ( # "ClientHello": { # "client version" : "TLSv1.2", # "random" : "C5 93 5B 97 CD F1 32 FB B4 58 2D B7 CF 84 C1 A1 BD 9F 35 20 6C D9 76 32 AD D9 A2 95 3E FD F5 BC", # "session id" : "DC 8B E5 D9 FE A5 4C 2F 19 A0 C6 25 50 59 65 C2 12 3A 8A A0 54 ED 49 03 1B F0 26 3A AE F3 34 C1", # "cipher suites" : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]", # "compression methods" : "00", # "extensions" : [ # "status_request (5)": { # "certificate status type": ocsp # "OCSP status request": { # "responder_id": <empty> # "request extensions": { # <empty> # } # } # }, # "supported_groups (10)": { # "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192] # }, # "ec_point_formats (11)": { # "formats": [uncompressed] # }, # "signature_algorithms (13)": { # "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1] # }, # "signature_algorithms_cert (50)": { # "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1] # }, # "application_layer_protocol_negotiation (16)": { # [h2] # }, # "status_request_v2 (17)": { # "cert status request": { # "certificate status type": ocsp_multi # "OCSP status request": { # "responder_id": <empty> # "request extensions": { # <empty> # } # } # } # }, # "extended_master_secret (23)": { # <empty> # }, # "supported_versions (43)": { # "versions": [TLSv1.3, TLSv1.2] # }, # "psk_key_exchange_modes (45)": { # "ke_modes": [psk_dhe_ke] # }, # "key_share (51)": { # "client_shares": [ # { # "named group": x25519 # "key_exchange": { # 0000: 16 61 1F 96 80 30 4A 4E 29 31 44 60 B2 56 E3 64 .a...0JN)1D`.V.d # 0010: 70 DA 59 78 2E 0F D8 55 01 75 5D EF F3 FF 07 1A p.Yx...U.u]..... # } # }, # ] # } # ] # } # ) # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:09.467 UTC|ServerHello.java:867|Consuming ServerHello handshake message ( # "ServerHello": { # "server version" : "TLSv1.2", # "random" : "9A 57 32 EA A2 E8 B5 92 60 E7 4B 5F 6C 99 B3 99 4E 6E F2 00 A2 D0 E5 44 94 EB 78 E1 7E 34 13 6C", # "session id" : "DC 8B E5 D9 FE A5 4C 2F 19 A0 C6 25 50 59 65 C2 12 3A 8A A0 54 ED 49 03 1B F0 26 3A AE F3 34 C1", # "cipher suite" : "TLS_AES_256_GCM_SHA384(0x1302)", # "compression methods" : "00", # "extensions" : [ # "supported_versions (43)": { # "selected version": [TLSv1.3] # }, # "key_share (51)": { # "server_share": { # "named group": x25519 # "key_exchange": { # 0000: 75 B9 BA 31 E0 01 24 69 F2 88 58 B4 00 9C 17 7E u..1..$i..X..... # 0010: A3 30 40 75 3A 71 52 72 68 82 DE 0A 8B 18 FB 08 .0@u:qRrh....... # } # }, # } # ] # } # ) # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:09.468 UTC|SSLExtensions.java:192|Consumed extension: supported_versions # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:09.468 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3 # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:09.469 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:09.469 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:09.470 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:09.470 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:09.470 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:09.470 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2 # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:09.470 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:09.471 UTC|SSLExtensions.java:192|Consumed extension: supported_versions # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:09.472 UTC|SSLExtensions.java:192|Consumed extension: key_share # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:09.473 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:09.473 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence. # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:09.473 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:09.473 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:09.473 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:09.474 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:09.474 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:09.474 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2 # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:09.474 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret # javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-24 12:18:09.474 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions # javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-24 12:18:09.474 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:09.474 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:09.474 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:09.482 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE # countdown value = 137438953472 # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:09.483 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE # countdown value = 137438953472 # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:09.484 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:09.488 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message ( # "EncryptedExtensions": [ # "supported_groups (10)": { # "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192] # }, # "application_layer_protocol_negotiation (16)": { # [h2] # } # ] # ) # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:09.488 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:09.488 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:09.489 UTC|SSLExtensions.java:192|Consumed extension: supported_groups # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:09.489 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:09.489 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:09.489 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length # javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-24 12:18:09.489 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups # javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-24 12:18:09.489 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:09.491 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message ( # "CertificateRequest": { # "certificate_request_context": "", # "extensions": [ # "signature_algorithms (13)": { # "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1] # }, # "signature_algorithms_cert (50)": { # "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1] # }, # "certificate_authorities (47)": { # "certificate authorities": [ # CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country # CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country] # } # ] # } # ) # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:09.491 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:09.491 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:09.492 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:09.492 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:09.493 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert # javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-24 12:18:09.493 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:09.496 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message ( # "Certificate": { # "certificate_request_context": "", # "certificate_list": [ # { # "certificate" : { # "version" : "v3", # "serial number" : "55 36 FF 1C", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-09-24 12:17:38.000 UTC", # "not after" : "2023-12-23 12:17:38.000 UTC", # "subject" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.35 Criticality=false # AuthorityKeyIdentifier [ # KeyIdentifier [ # 0000: CE 0F D1 A9 DE 2D 62 37 EE 1E 81 9B BB 0E C7 23 .....-b7.......# # 0010: 8D DE E5 D8 .... # ] # ] # }, # { # ObjectId: 2.5.29.37 Criticality=true # ExtendedKeyUsages [ # serverAuth # ] # }, # { # ObjectId: 2.5.29.15 Criticality=true # KeyUsage [ # DigitalSignature # Non_repudiation # Key_Encipherment # ] # }, # { # ObjectId: 2.5.29.17 Criticality=false # SubjectAlternativeName [ # DNSName: localhost # IPAddress: 127.0.0.1 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: 32 2D C6 08 B0 A6 AD 71 DD A2 C9 F5 D9 A6 CB 5C 2-.....q.......\ # 0010: F5 AA 92 5D ...] # ] # ] # } # ]} # "extensions": { # <no extension> # } # }, # ] # } # ) # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:09.496 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request # javax.net.ssl|DEBUG|03|Finalizer|2023-09-24 12:18:09.549 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket # javax.net.ssl|DEBUG|03|Finalizer|2023-09-24 12:18:09.550 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive) # javax.net.ssl|DEBUG|03|Finalizer|2023-09-24 12:18:09.550 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket # javax.net.ssl|DEBUG|03|Finalizer|2023-09-24 12:18:09.550 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive) # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:09.578 UTC|X509TrustManagerImpl.java:292|Found trusted certificate ( # "certificate" : { # "version" : "v3", # "serial number" : "37 17 31 92", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-09-24 12:17:36.000 UTC", # "not after" : "2023-12-23 12:17:36.000 UTC", # "subject" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.35 Criticality=false # AuthorityKeyIdentifier [ # KeyIdentifier [ # 0000: 22 76 BB 51 75 41 AC CF 63 B9 BD 74 BA 44 A8 DF "v.QuA..c..t.D.. # 0010: 80 E9 59 A9 ..Y. # ] # ] # }, # { # ObjectId: 2.5.29.19 Criticality=false # BasicConstraints:[ # CA:true # PathLen:0 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: CE 0F D1 A9 DE 2D 62 37 EE 1E 81 9B BB 0E C7 23 .....-b7.......# # 0010: 8D DE E5 D8 .... # ] # ] # } # ]} # ) # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:09.582 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message ( # "CertificateVerify": { # "signature algorithm": rsa_pss_rsae_sha256 # "signature": { # 0000: 00 89 A3 91 49 D0 12 30 60 DC 13 D6 92 91 B0 0B ....I..0`....... # 0010: C5 22 42 41 28 99 10 DA E5 32 67 ED 68 CE 95 71 ."BA(....2g.h..q # 0020: 23 33 41 90 CD 7C E2 72 16 A1 5E E9 D7 8B 2E B5 #3A....r..^..... # 0030: 1A 72 79 08 E3 4F 2F 7B 59 AD B2 C6 B3 01 9D 4F .ry..O/.Y......O # 0040: BC EC 16 C4 3B E3 A5 0F B3 5E 91 00 21 B4 DD 2B ....;....^..!..+ # 0050: AD 31 DC F8 7F 2C A0 CC 0D 4A 4D 09 DF 2E 7E DD .1...,...JM..... # 0060: FD D0 A3 04 16 E9 27 37 1A F2 B7 7A FE CB 50 EE ......'7...z..P. # 0070: 6E 08 BF 91 1D D8 F7 E0 86 EC FF 24 F8 9A A9 76 n..........$...v # 0080: 52 A0 41 07 E8 8E 73 88 7C CF EE 0C 3E 2E 7B 7D R.A...s.....>... # 0090: 01 90 61 0F AE A6 33 1F AC 84 63 30 D6 94 72 BB ..a...3...c0..r. # 00A0: 07 23 0D BE A2 F7 70 35 4F 62 CD 63 97 A6 87 01 .#....p5Ob.c.... # 00B0: 26 7B 76 AA B4 B7 05 23 6E A1 7E E3 78 0A 54 75 &.v....#n...x.Tu # 00C0: 85 B2 90 B9 A4 DD DF A9 CC 85 01 3C 05 A4 3D 5E ...........<..=^ # 00D0: 83 81 AB F9 2E 74 B6 B5 F6 A1 08 0B 28 0B BA 67 .....t......(..g # 00E0: D6 D9 93 B3 E4 D7 0C 1B 95 7F 91 86 75 49 5B F0 ............uI[. # 00F0: 40 28 61 4B 4B 91 73 5D 4B E3 53 5E 9F F2 22 B8 @(aKK.s]K.S^..". # } # } # ) # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:09.584 UTC|Finished.java:898|Consuming server Finished handshake message ( # "Finished": { # "verify data": { # 0000: 97 27 03 AF E5 13 E0 57 AF 3B 00 1B AC 05 7B B8 .'.....W.;...... # 0010: 82 F6 F4 DD 3C 57 90 7D BC BA 25 B6 CB E3 9B 43 ....<W....%....C # 0020: EC 9A 4E A8 DC CE F5 3C 71 49 B4 DF 6A D5 22 5D ..N....<qI..j."] # }'} # ) # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:09.586 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE # countdown value = 137438953472 # javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-24 12:18:09.587 UTC|X509Authentication.java:246|No X.509 cert selected for EC # javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-24 12:18:09.587 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256 # javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-24 12:18:09.588 UTC|X509Authentication.java:246|No X.509 cert selected for EC # javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-24 12:18:09.588 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384 # javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-24 12:18:09.588 UTC|X509Authentication.java:246|No X.509 cert selected for EC # javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-24 12:18:09.588 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512 # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:09.589 UTC|SunX509KeyManagerImpl.java:401|matching alias: client # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:09.591 UTC|CertificateMessage.java:1140|Produced client Certificate message ( # "Certificate": { # "certificate_request_context": "", # "certificate_list": [ # { # "certificate" : { # "version" : "v3", # "serial number" : "7D 1A C1 EE", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-09-24 12:17:42.000 UTC", # "not after" : "2023-12-23 12:17:42.000 UTC", # "subject" : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.35 Criticality=false # AuthorityKeyIdentifier [ # KeyIdentifier [ # 0000: CE 0F D1 A9 DE 2D 62 37 EE 1E 81 9B BB 0E C7 23 .....-b7.......# # 0010: 8D DE E5 D8 .... # ] # ] # }, # { # ObjectId: 2.5.29.37 Criticality=true # ExtendedKeyUsages [ # clientAuth # ] # }, # { # ObjectId: 2.5.29.15 Criticality=true # KeyUsage [ # DigitalSignature # Non_repudiation # Key_Encipherment # ] # }, # { # ObjectId: 2.5.29.17 Criticality=false # SubjectAlternativeName [ # DNSName: test.solr.apache.org # IPAddress: 127.0.0.2 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: 2D 2D A4 E4 D9 CC AE 87 BA DC E2 8C D6 74 7F 24 --...........t.$ # 0010: 71 78 45 56 qxEV # ] # ] # } # ]} # "extensions": { # <no extension> # } # }, # { # "certificate" : { # "version" : "v3", # "serial number" : "37 17 31 92", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-09-24 12:17:36.000 UTC", # "not after" : "2023-12-23 12:17:36.000 UTC", # "subject" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.35 Criticality=false # AuthorityKeyIdentifier [ # KeyIdentifier [ # 0000: 22 76 BB 51 75 41 AC CF 63 B9 BD 74 BA 44 A8 DF "v.QuA..c..t.D.. # 0010: 80 E9 59 A9 ..Y. # ] # ] # }, # { # ObjectId: 2.5.29.19 Criticality=false # BasicConstraints:[ # CA:true # PathLen:0 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: CE 0F D1 A9 DE 2D 62 37 EE 1E 81 9B BB 0E C7 23 .....-b7.......# # 0010: 8D DE E5 D8 .... # ] # ] # } # ]} # "extensions": { # <no extension> # } # }, # ] # } # ) # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:09.617 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message ( # "CertificateVerify": { # "signature algorithm": rsa_pss_rsae_sha256 # "signature": { # 0000: 9F 3A 66 D2 43 8F C4 6D F4 E7 34 C3 4B 59 41 5E .:f.C..m..4.KYA^ # 0010: D8 D1 43 B9 1A 42 DD EF 42 60 D3 FE C7 CD EE B3 ..C..B..B`...... # 0020: D4 27 06 AA 0B 16 55 05 8A 90 23 3C 23 BD 7D F9 .'....U...#<#... # 0030: C2 B6 28 07 FE D0 1E 95 46 82 2D 90 69 F6 37 4B ..(.....F.-.i.7K # 0040: D6 5C FC A2 FA 7E 1A B1 27 09 A9 B7 72 C5 9A B0 .\......'...r... # 0050: A2 8C 2D BA E3 AA 27 1E 35 6F F7 2E 63 E7 05 A4 ..-...'.5o..c... # 0060: A3 B4 45 67 DF 34 D9 67 DB BB 8E C1 25 62 DE 7E ..Eg.4.g....%b.. # 0070: 28 1F E7 0C A6 C1 3E 9A 6A 42 CC 97 D7 F8 D3 99 (.....>.jB...... # 0080: DF 03 8C 85 68 A5 CE 37 AB 03 50 C8 AA F7 CE 22 ....h..7..P...." # 0090: 07 F9 8F 6C 27 03 75 E3 42 2F 4B A6 19 47 74 A0 ...l'.u.B/K..Gt. # 00A0: 2E 7F D1 19 ED 94 D9 7A 67 27 21 78 E6 22 18 5C .......zg'!x.".\ # 00B0: 33 E1 D1 DC 8D DD 81 69 31 58 5D F9 88 51 74 1A 3......i1X]..Qt. # 00C0: 53 5C 9B 3D 8E C4 9B E2 F4 A3 13 49 19 23 CE B3 S\.=.......I.#.. # 00D0: 39 C8 9C 19 8F 38 B3 DE 20 CB 36 62 7E EE D9 F0 9....8.. .6b.... # 00E0: 86 AD 86 F2 8E 51 78 B5 51 4C 92 86 E4 E3 3E 29 .....Qx.QL....>) # 00F0: 8C 5F D6 98 9F CA 57 D8 BD 8A A4 E4 DD 9F CB 2B ._....W........+ # } # } # ) # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:09.619 UTC|Finished.java:673|Produced client Finished handshake message ( # "Finished": { # "verify data": { # 0000: D1 3B AA EF 18 9E C2 2B 97 7C FA 4B 53 D5 61 7C .;.....+...KS.a. # 0010: F4 0F A4 E7 54 90 0E CF 10 4D FE 3E D2 BB 25 52 ....T....M.>..%R # 0020: 9F 7C 95 B2 C1 1F D6 9E EA 07 EC 04 41 8C 97 16 ............A... # }'} # ) # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:09.620 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE # countdown value = 137438953472 # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:09.669 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message ( # "NewSessionTicket": { # "ticket_lifetime" : "86,400", # "ticket_age_add" : "<omitted>", # "ticket_nonce" : "01", # "ticket" : "42 C9 4D 4E 87 CF 71 2E 49 8E D2 68 09 5C A2 E3 5C 77 31 33 B1 12 3D 3F 47 AA 49 E5 D5 79 4F 5B", # "extensions" : [ # <no extension> # ] # } # ) # javax.net.ssl|ALL|01|main|2023-09-24 12:18:09.985 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine # javax.net.ssl|WARNING|01|main|2023-09-24 12:18:09.986 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data # # -- output does not contain substring -- # substring (1 lines): # Server refused connection # output (491 lines): # INFO - 2023-09-24 12:18:21.163; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword # javax.net.ssl|DEBUG|01|main|2023-09-24 12:18:21.499 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates ( # "certificate" : { # "version" : "v3", # "serial number" : "37 17 31 92", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-09-24 12:17:36.000 UTC", # "not after" : "2023-12-23 12:17:36.000 UTC", # "subject" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.35 Criticality=false # AuthorityKeyIdentifier [ # KeyIdentifier [ # 0000: 22 76 BB 51 75 41 AC CF 63 B9 BD 74 BA 44 A8 DF "v.QuA..c..t.D.. # 0010: 80 E9 59 A9 ..Y. # ] # ] # }, # { # ObjectId: 2.5.29.19 Criticality=false # BasicConstraints:[ # CA:true # PathLen:0 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: CE 0F D1 A9 DE 2D 62 37 EE 1E 81 9B BB 0E C7 23 .....-b7.......# # 0010: 8D DE E5 D8 .... # ] # ] # } # ]}, # "certificate" : { # "version" : "v3", # "serial number" : "37 A6 61 A5", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-09-24 12:17:34.000 UTC", # "not after" : "2023-12-23 12:17:34.000 UTC", # "subject" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.19 Criticality=true # BasicConstraints:[ # CA:true # PathLen:2147483647 # ] # }, # { # ObjectId: 2.5.29.17 Criticality=false # SubjectAlternativeName [ # DNSName: localhost # IPAddress: 127.0.0.1 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: 22 76 BB 51 75 41 AC CF 63 B9 BD 74 BA 44 A8 DF "v.QuA..c..t.D.. # 0010: 80 E9 59 A9 ..Y. # ] # ] # } # ]} # ) # javax.net.ssl|DEBUG|01|main|2023-09-24 12:18:21.515 UTC|SSLCipher.java:464|jdk.tls.keyLimits: entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472 # javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-24 12:18:21.749 UTC|ServerNameExtension.java:261|Unable to indicate server name # javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-24 12:18:21.749 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name # javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-24 12:18:21.751 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers # javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-24 12:18:21.751 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers # javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-24 12:18:21.756 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie # javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-24 12:18:21.768 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info # javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-24 12:18:21.768 UTC|PreSharedKeyExtension.java:633|No session to resume. # javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-24 12:18:21.768 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key # javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-24 12:18:21.770 UTC|ClientHello.java:642|Produced ClientHello handshake message ( # "ClientHello": { # "client version" : "TLSv1.2", # "random" : "77 03 CF E9 E3 42 0D F2 11 AE F2 93 BA 95 AB 68 52 76 75 BB 80 52 95 22 4F 05 FD 80 8C 73 0F E3", # "session id" : "ED B2 46 6F 72 C8 1C A3 9A 87 FD DC 46 43 02 FC 5F E7 08 CF E5 7E AF B0 B9 CC 61 F6 1C AD 5D 6A", # "cipher suites" : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]", # "compression methods" : "00", # "extensions" : [ # "status_request (5)": { # "certificate status type": ocsp # "OCSP status request": { # "responder_id": <empty> # "request extensions": { # <empty> # } # } # }, # "supported_groups (10)": { # "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192] # }, # "ec_point_formats (11)": { # "formats": [uncompressed] # }, # "signature_algorithms (13)": { # "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1] # }, # "signature_algorithms_cert (50)": { # "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1] # }, # "application_layer_protocol_negotiation (16)": { # [h2] # }, # "status_request_v2 (17)": { # "cert status request": { # "certificate status type": ocsp_multi # "OCSP status request": { # "responder_id": <empty> # "request extensions": { # <empty> # } # } # } # }, # "extended_master_secret (23)": { # <empty> # }, # "supported_versions (43)": { # "versions": [TLSv1.3, TLSv1.2] # }, # "psk_key_exchange_modes (45)": { # "ke_modes": [psk_dhe_ke] # }, # "key_share (51)": { # "client_shares": [ # { # "named group": x25519 # "key_exchange": { # 0000: E1 AB 19 D3 E7 CC 1B 03 B5 AB C1 81 3E 99 A7 FB ............>... # 0010: B8 23 8C CB 31 AD 60 DB ED 82 54 4E 49 BD 16 5C .#..1.`...TNI..\ # } # }, # ] # } # ] # } # ) # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:21.789 UTC|ServerHello.java:867|Consuming ServerHello handshake message ( # "ServerHello": { # "server version" : "TLSv1.2", # "random" : "17 92 03 82 A7 98 05 C3 AC 7D D1 AD 25 FF 66 84 BB CC 50 F8 90 7C 88 75 26 FC 9B 78 ED 83 01 AB", # "session id" : "ED B2 46 6F 72 C8 1C A3 9A 87 FD DC 46 43 02 FC 5F E7 08 CF E5 7E AF B0 B9 CC 61 F6 1C AD 5D 6A", # "cipher suite" : "TLS_AES_256_GCM_SHA384(0x1302)", # "compression methods" : "00", # "extensions" : [ # "supported_versions (43)": { # "selected version": [TLSv1.3] # }, # "key_share (51)": { # "server_share": { # "named group": x25519 # "key_exchange": { # 0000: 75 22 59 AB 00 1B 9C 63 6D 68 5B 14 26 A9 DC 26 u"Y....cmh[.&..& # 0010: 02 A9 75 4C A8 A5 A7 70 25 C5 98 E8 54 99 84 7B ..uL...p%...T... # } # }, # } # ] # } # ) # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:21.789 UTC|SSLExtensions.java:192|Consumed extension: supported_versions # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:21.789 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3 # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:21.790 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:21.790 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:21.790 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:21.790 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:21.791 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:21.791 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2 # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:21.791 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:21.791 UTC|SSLExtensions.java:192|Consumed extension: supported_versions # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:21.793 UTC|SSLExtensions.java:192|Consumed extension: key_share # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:21.793 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:21.793 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence. # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:21.793 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:21.794 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:21.794 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:21.794 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:21.794 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:21.794 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2 # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:21.794 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret # javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-24 12:18:21.794 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions # javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-24 12:18:21.794 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:21.794 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:21.795 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:21.802 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE # countdown value = 137438953472 # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:21.803 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE # countdown value = 137438953472 # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:21.805 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:21.808 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message ( # "EncryptedExtensions": [ # "supported_groups (10)": { # "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192] # }, # "application_layer_protocol_negotiation (16)": { # [h2] # } # ] # ) # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:21.808 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:21.808 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:21.809 UTC|SSLExtensions.java:192|Consumed extension: supported_groups # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:21.809 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:21.809 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:21.809 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length # javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-24 12:18:21.809 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups # javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-24 12:18:21.809 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:21.811 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message ( # "CertificateRequest": { # "certificate_request_context": "", # "extensions": [ # "signature_algorithms (13)": { # "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1] # }, # "signature_algorithms_cert (50)": { # "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1] # }, # "certificat [...truncated too long message...] nFillable(SslConnection.java:379) # at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146) # at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100) # at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53) # at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:289) # at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128) # at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628) # at java.base/java.lang.Thread.run(Thread.java:829) # Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target # at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141) # at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126) # at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297) # at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434) # ... 28 more} # # ) # javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-24 12:19:42.897 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data # javax.net.ssl|DEBUG|03|Finalizer|2023-09-24 12:19:42.941 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket # javax.net.ssl|DEBUG|03|Finalizer|2023-09-24 12:19:42.942 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive) # javax.net.ssl|DEBUG|03|Finalizer|2023-09-24 12:19:42.943 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket # javax.net.ssl|DEBUG|03|Finalizer|2023-09-24 12:19:42.943 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive) # Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:44518/solr/admin/info/system # at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:550) # at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192) # at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582) # at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481) # at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438) # at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158) # at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153) # Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target # at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131) # at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353) # at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296) # at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291) # at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357) # at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232) # at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175) # at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392) # at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443) # at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074) # at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061) # at java.base/java.security.AccessController.doPrivileged(Native Method) # at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008) # at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657) # at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102) # at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84) # at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314) # at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100) # at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558) # at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379) # at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146) # at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100) # at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53) # at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:289) # at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128) # at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628) # at java.base/java.lang.Thread.run(Thread.java:829) # Suppressed: java.io.IOException: Broken pipe # at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138) # at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422) # at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275) # at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254) # at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386) # at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292) # at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243) # at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224) # at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821) # at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793) # at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161) # at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451) # at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117) # at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87) # ... 11 more # Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target # at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439) # at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306) # at java.base/sun.security.validator.Validator.validate(Validator.java:264) # at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313) # at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276) # at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141) # at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335) # ... 22 more # Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target # at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141) # at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126) # at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297) # at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434) # ... 28 more ok 64 SOLR-11740 check 'solr stop' connection in 28728ms ok 65 stop command for single port in 31087ms ok 66 status detects locally running solr in 14377ms ok 67 status does not expose cli parameters to end user in 211ms ok 68 listing out files in 2200ms ok 69 copying files around in 6618ms ok 70 upconfig in 2631ms ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1216ms ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1215ms ok 73 Cleanup in 1220ms > Task :solr:packaging:integrationTests FAILED FAILURE: Build failed with an exception. * Where: Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301 * What went wrong: Execution failed for task ':solr:packaging:integrationTests'. > Process 'command > '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished > with non-zero exit value 1 * Try: > Run with --stacktrace option to get the stack trace. > Run with --info or --debug option to get more log output. > Run with --scan to get full insights. * Get more help at https://help.gradle.org BUILD FAILED in 21m 25s 673 actionable tasks: 656 executed, 17 up-to-date [0m[?12l[?25h ------------------------------------------------------------------------ Build Failed: returned 1 Total time: 21m50.5s ------------------------------------------------------------------------ Error: Error parsing md5sums for crave update + status=1 + ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*' Error: Error parsing md5sums for crave update Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2) rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1675) [Receiver=3.1.2] rsync: [Receiver] write error: Broken pipe (32) + exit 1 Build step 'Execute shell' marked build as failure Archiving artifacts Recording test results [Checks API] No suitable checks publisher found. Email was triggered for: Failure - Any Sending email for trigger: Failure - Any
--------------------------------------------------------------------- To unsubscribe, e-mail: [email protected] For additional commands, e-mail: [email protected]
