Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5571/
All tests passed Build Log: [...truncated 1322 lines...] # ERROR: IOException occurred when talking to server at: https://localhost:45557/solr/test/select # -- # # Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2 # Last output: # INFO - 2023-09-29 08:12:55.448; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword # INFO - 2023-09-29 08:12:55.454; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword # WARN - 2023-09-29 08:12:56.358; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes # WARN - 2023-09-29 08:12:56.399; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes ok 60 start solr with ssl and auth in 22255ms ok 61 start solr with client truststore and security manager in 25200ms not ok 62 start solr with mTLS needed in 56317ms # (in test file test/test_ssl.bats, line 325) # `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed # /tmp/bats-run-C74cQN/test/62/ssl # Certificate was added to keystore # Certificate reply was installed in keystore # Certificate was added to keystore # Certificate was added to keystore # Certificate reply was installed in keystore # Certificate was added to keystore # Certificate was added to keystore # Certificate was added to keystore # Certificate was added to keystore # Certificate reply was installed in keystore # Certificate was added to keystore # Certificate was added to keystore # NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 45557. # # Started Solr server on port 45557 (pid=200479). Happy searching! # # NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 45558. # # Started Solr server on port 45558 (pid=200906). Happy searching! # # INFO - 2023-09-29 08:14:18.673; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword # INFO - 2023-09-29 08:14:18.679; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword # INFO - 2023-09-29 08:14:19.044; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5d8bafa9(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@5d9b7a8a[provider=null,keyStore=file:///tmp/bats-run-C74cQN/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-C74cQN/test/62/ssl/client/solr-client.truststore.p12] # INFO - 2023-09-29 08:14:19.046; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@1b73be9f(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5d9b7a8a[provider=null,keyStore=file:///tmp/bats-run-C74cQN/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-C74cQN/test/62/ssl/client/solr-client.truststore.p12] # INFO - 2023-09-29 08:14:19.047; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@628c4ac0(ca,h=[localhost],a=[],w=[]) for Client@5d9b7a8a[provider=null,keyStore=file:///tmp/bats-run-C74cQN/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-C74cQN/test/62/ssl/client/solr-client.truststore.p12] # javax.net.ssl|DEBUG|01|main|2023-09-29 08:14:19.081 UTC|SunX509KeyManagerImpl.java:164|found key for : client ( # "certificate" : { # "version" : "v3", # "serial number" : "13 45 25 39", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-09-29 08:13:54.000 UTC", # "not after" : "2023-12-28 08:13:54.000 UTC", # "subject" : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.35 Criticality=false # AuthorityKeyIdentifier [ # KeyIdentifier [ # 0000: 66 BC 2D 8E 50 0D DC 51 02 B4 41 B6 7B CD A6 CC f.-.P..Q..A..... # 0010: CA 05 1C 9B .... # ] # ] # }, # { # ObjectId: 2.5.29.37 Criticality=true # ExtendedKeyUsages [ # clientAuth # ] # }, # { # ObjectId: 2.5.29.15 Criticality=true # KeyUsage [ # DigitalSignature # Non_repudiation # Key_Encipherment # ] # }, # { # ObjectId: 2.5.29.17 Criticality=false # SubjectAlternativeName [ # DNSName: test.solr.apache.org # IPAddress: 127.0.0.2 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: 8D 74 D4 D0 B4 B1 00 DE B8 80 30 32 02 7A ED 4C .t........02.z.L # 0010: 7E 3D 00 0D .=.. # ] # ] # } # ]}, # "certificate" : { # "version" : "v3", # "serial number" : "02 5C BF 96", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-09-29 08:13:48.000 UTC", # "not after" : "2023-12-28 08:13:48.000 UTC", # "subject" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.35 Criticality=false # AuthorityKeyIdentifier [ # KeyIdentifier [ # 0000: 0B 92 BF 67 25 AA DC 11 DB B9 F7 2F B5 6A 8C 8B ...g%....../.j.. # 0010: 0A 14 81 CA .... # ] # ] # }, # { # ObjectId: 2.5.29.19 Criticality=false # BasicConstraints:[ # CA:true # PathLen:0 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: 66 BC 2D 8E 50 0D DC 51 02 B4 41 B6 7B CD A6 CC f.-.P..Q..A..... # 0010: CA 05 1C 9B .... # ] # ] # } # ]} # ) # javax.net.ssl|DEBUG|01|main|2023-09-29 08:14:19.086 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates ( # "certificate" : { # "version" : "v3", # "serial number" : "06 54 E6 0F", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-09-29 08:13:46.000 UTC", # "not after" : "2023-12-28 08:13:46.000 UTC", # "subject" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.19 Criticality=true # BasicConstraints:[ # CA:true # PathLen:2147483647 # ] # }, # { # ObjectId: 2.5.29.17 Criticality=false # SubjectAlternativeName [ # DNSName: localhost # IPAddress: 127.0.0.1 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: 0B 92 BF 67 25 AA DC 11 DB B9 F7 2F B5 6A 8C 8B ...g%....../.j.. # 0010: 0A 14 81 CA .... # ] # ] # } # ]}, # "certificate" : { # "version" : "v3", # "serial number" : "02 5C BF 96", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-09-29 08:13:48.000 UTC", # "not after" : "2023-12-28 08:13:48.000 UTC", # "subject" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.35 Criticality=false # AuthorityKeyIdentifier [ # KeyIdentifier [ # 0000: 0B 92 BF 67 25 AA DC 11 DB B9 F7 2F B5 6A 8C 8B ...g%....../.j.. # 0010: 0A 14 81 CA .... # ] # ] # }, # { # ObjectId: 2.5.29.19 Criticality=false # BasicConstraints:[ # CA:true # PathLen:0 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: 66 BC 2D 8E 50 0D DC 51 02 B4 41 B6 7B CD A6 CC f.-.P..Q..A..... # 0010: CA 05 1C 9B .... # ] # ] # } # ]} # ) # javax.net.ssl|DEBUG|01|main|2023-09-29 08:14:19.103 UTC|SSLCipher.java:464|jdk.tls.keyLimits: entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472 # javax.net.ssl|DEBUG|03|Finalizer|2023-09-29 08:14:19.202 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket # javax.net.ssl|DEBUG|03|Finalizer|2023-09-29 08:14:19.202 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive) # javax.net.ssl|DEBUG|03|Finalizer|2023-09-29 08:14:19.203 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket # javax.net.ssl|DEBUG|03|Finalizer|2023-09-29 08:14:19.204 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive) # javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-29 08:14:19.354 UTC|ServerNameExtension.java:261|Unable to indicate server name # javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 08:14:19.355 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name # javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-29 08:14:19.357 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers # javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-29 08:14:19.357 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers # javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 08:14:19.363 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie # javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 08:14:19.376 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info # javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 08:14:19.376 UTC|PreSharedKeyExtension.java:633|No session to resume. # javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 08:14:19.376 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key # javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 08:14:19.379 UTC|ClientHello.java:642|Produced ClientHello handshake message ( # "ClientHello": { # "client version" : "TLSv1.2", # "random" : "21 25 D7 DA 38 87 3F 57 B0 3F 9B 8C 74 93 D9 0D BD 35 85 28 16 FD 43 9B E7 9C CD DA 14 2D A5 77", # "session id" : "CF 8D 23 B3 D1 30 25 E5 1E 9C C1 5A 90 1F E7 92 53 6C C1 6F 1A 72 D6 C4 B7 5E 8B B9 80 D3 19 F4", # "cipher suites" : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]", # "compression methods" : "00", # "extensions" : [ # "status_request (5)": { # "certificate status type": ocsp # "OCSP status request": { # "responder_id": <empty> # "request extensions": { # <empty> # } # } # }, # "supported_groups (10)": { # "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192] # }, # "ec_point_formats (11)": { # "formats": [uncompressed] # }, # "signature_algorithms (13)": { # "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1] # }, # "signature_algorithms_cert (50)": { # "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1] # }, # "application_layer_protocol_negotiation (16)": { # [h2] # }, # "status_request_v2 (17)": { # "cert status request": { # "certificate status type": ocsp_multi # "OCSP status request": { # "responder_id": <empty> # "request extensions": { # <empty> # } # } # } # }, # "extended_master_secret (23)": { # <empty> # }, # "supported_versions (43)": { # "versions": [TLSv1.3, TLSv1.2] # }, # "psk_key_exchange_modes (45)": { # "ke_modes": [psk_dhe_ke] # }, # "key_share (51)": { # "client_shares": [ # { # "named group": x25519 # "key_exchange": { # 0000: AA 81 67 7B 3C 80 26 1D 7A C4 30 C9 AB 3D 25 F9 ..g.<.&.z.0..=%. # 0010: 7D 95 24 D3 E5 B8 D7 52 DE C0 B6 FA 99 73 55 45 ..$....R.....sUE # } # }, # ] # } # ] # } # ) # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:19.492 UTC|ServerHello.java:867|Consuming ServerHello handshake message ( # "ServerHello": { # "server version" : "TLSv1.2", # "random" : "9A F0 78 D2 27 46 96 82 0E 32 BA 21 ED C2 54 52 E9 7A 8E 40 99 44 52 B9 2B 93 37 41 5E B8 3F 67", # "session id" : "CF 8D 23 B3 D1 30 25 E5 1E 9C C1 5A 90 1F E7 92 53 6C C1 6F 1A 72 D6 C4 B7 5E 8B B9 80 D3 19 F4", # "cipher suite" : "TLS_AES_256_GCM_SHA384(0x1302)", # "compression methods" : "00", # "extensions" : [ # "supported_versions (43)": { # "selected version": [TLSv1.3] # }, # "key_share (51)": { # "server_share": { # "named group": x25519 # "key_exchange": { # 0000: 65 D6 7F 0E 54 0A CA 5C F8 44 77 FA 50 CA A6 A0 e...T..\.Dw.P... # 0010: 7D AF BE 96 5A 37 5E D0 C0 CD 3B 67 E1 57 0E 71 ....Z7^...;g.W.q # } # }, # } # ] # } # ) # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:19.492 UTC|SSLExtensions.java:192|Consumed extension: supported_versions # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:19.492 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3 # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:19.493 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:19.493 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:19.494 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:19.494 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:19.494 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:19.494 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2 # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:19.494 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:19.494 UTC|SSLExtensions.java:192|Consumed extension: supported_versions # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:19.496 UTC|SSLExtensions.java:192|Consumed extension: key_share # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:19.496 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:19.496 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence. # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:19.497 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:19.497 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:19.497 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:19.497 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:19.497 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:19.498 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2 # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:19.498 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret # javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 08:14:19.498 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions # javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 08:14:19.498 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:19.498 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:19.498 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:19.506 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE # countdown value = 137438953472 # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:19.507 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE # countdown value = 137438953472 # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:19.508 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:19.512 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message ( # "EncryptedExtensions": [ # "supported_groups (10)": { # "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192] # }, # "application_layer_protocol_negotiation (16)": { # [h2] # } # ] # ) # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:19.512 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:19.512 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:19.512 UTC|SSLExtensions.java:192|Consumed extension: supported_groups # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:19.512 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:19.513 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:19.513 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length # javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 08:14:19.513 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups # javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 08:14:19.513 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:19.514 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message ( # "CertificateRequest": { # "certificate_request_context": "", # "extensions": [ # "signature_algorithms (13)": { # "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1] # }, # "signature_algorithms_cert (50)": { # "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1] # }, # "certificate_authorities (47)": { # "certificate authorities": [ # CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country # CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country] # } # ] # } # ) # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:19.515 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:19.515 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:19.516 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:19.516 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:19.517 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert # javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 08:14:19.517 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:19.520 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message ( # "Certificate": { # "certificate_request_context": "", # "certificate_list": [ # { # "certificate" : { # "version" : "v3", # "serial number" : "57 F1 16 43", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-09-29 08:13:51.000 UTC", # "not after" : "2023-12-28 08:13:51.000 UTC", # "subject" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.35 Criticality=false # AuthorityKeyIdentifier [ # KeyIdentifier [ # 0000: 66 BC 2D 8E 50 0D DC 51 02 B4 41 B6 7B CD A6 CC f.-.P..Q..A..... # 0010: CA 05 1C 9B .... # ] # ] # }, # { # ObjectId: 2.5.29.37 Criticality=true # ExtendedKeyUsages [ # serverAuth # ] # }, # { # ObjectId: 2.5.29.15 Criticality=true # KeyUsage [ # DigitalSignature # Non_repudiation # Key_Encipherment # ] # }, # { # ObjectId: 2.5.29.17 Criticality=false # SubjectAlternativeName [ # DNSName: localhost # IPAddress: 127.0.0.1 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: AE 11 98 B2 45 A3 AC 43 8C 02 14 72 DF D0 FA 99 ....E..C...r.... # 0010: 73 E4 AE FC s... # ] # ] # } # ]} # "extensions": { # <no extension> # } # }, # ] # } # ) # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:19.520 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:19.604 UTC|X509TrustManagerImpl.java:292|Found trusted certificate ( # "certificate" : { # "version" : "v3", # "serial number" : "02 5C BF 96", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-09-29 08:13:48.000 UTC", # "not after" : "2023-12-28 08:13:48.000 UTC", # "subject" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.35 Criticality=false # AuthorityKeyIdentifier [ # KeyIdentifier [ # 0000: 0B 92 BF 67 25 AA DC 11 DB B9 F7 2F B5 6A 8C 8B ...g%....../.j.. # 0010: 0A 14 81 CA .... # ] # ] # }, # { # ObjectId: 2.5.29.19 Criticality=false # BasicConstraints:[ # CA:true # PathLen:0 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: 66 BC 2D 8E 50 0D DC 51 02 B4 41 B6 7B CD A6 CC f.-.P..Q..A..... # 0010: CA 05 1C 9B .... # ] # ] # } # ]} # ) # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:19.608 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message ( # "CertificateVerify": { # "signature algorithm": rsa_pss_rsae_sha256 # "signature": { # 0000: 32 8D 25 ED FA 10 2D 2D C9 C1 B6 9F 00 80 A2 22 2.%...--......." # 0010: 64 07 34 FD 18 D0 7F 4B FC 6C E1 36 5B C5 1B 6B d.4....K.l.6[..k # 0020: 45 7E 10 96 02 7D FA 47 5F E8 DA 8A 27 2F E0 16 E......G_...'/.. # 0030: B3 CA 37 D7 55 37 77 6F 8C DF EB CC 46 D0 5C B8 ..7.U7wo....F.\. # 0040: 46 AC 84 77 50 2E 7C 59 25 83 0C 8A A4 FF 89 FC F..wP..Y%....... # 0050: 91 96 9F AD 2E 64 15 01 4B 0D 0F B2 8F 2F 8E 3D .....d..K..../.= # 0060: 8D 8E 15 4F B0 C1 18 B8 76 0C 5F A9 C2 7E 40 64 ...O....v._...@d # 0070: 6E 28 90 14 15 82 17 84 B5 C7 EC FE 99 C5 F6 51 n(.............Q # 0080: 48 B5 DB 40 46 8E 1B A0 72 A4 7D 6B 2D 3F 75 5E [email protected]?u^ # 0090: FA 0B A3 5F 99 31 7D 6E 5E 5A F7 5C 0B 4F 84 6A ..._.1.n^Z.\.O.j # 00A0: 26 07 85 30 29 53 2A D7 5F 53 EC C6 1D 6C 55 EB &..0)S*._S...lU. # 00B0: CB 82 57 A1 2D 80 9F 02 C1 61 CB 46 BA 43 41 F7 ..W.-....a.F.CA. # 00C0: 8E 44 04 15 D8 AE 13 18 9A 7B 9D AE 98 70 00 F7 .D...........p.. # 00D0: 51 D4 2D B6 E6 EA AF CE B8 0B FD 2D 4C 1D 70 8A Q.-........-L.p. # 00E0: BD 84 CC 01 CA 4B 91 2F 68 91 E0 7A 39 F3 50 31 .....K./h..z9.P1 # 00F0: 75 E1 90 BE 9D C7 9B 6B 15 14 54 62 E7 83 53 87 u......k..Tb..S. # } # } # ) # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:19.610 UTC|Finished.java:898|Consuming server Finished handshake message ( # "Finished": { # "verify data": { # 0000: BC A4 E1 7F FF 48 10 6A 33 78 2B 16 37 B0 B7 44 .....H.j3x+.7..D # 0010: 66 2C C0 9A D6 39 79 22 04 E4 0F 8D 76 DA 3D E2 f,...9y"....v.=. # 0020: 41 DD FC 5D A1 B3 83 0C 7F F4 68 7A A8 97 9A 20 A..]......hz... # }'} # ) # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:19.612 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE # countdown value = 137438953472 # javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-29 08:14:19.613 UTC|X509Authentication.java:246|No X.509 cert selected for EC # javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 08:14:19.614 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256 # javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-29 08:14:19.614 UTC|X509Authentication.java:246|No X.509 cert selected for EC # javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 08:14:19.614 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384 # javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-29 08:14:19.614 UTC|X509Authentication.java:246|No X.509 cert selected for EC # javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 08:14:19.615 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512 # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:19.615 UTC|SunX509KeyManagerImpl.java:401|matching alias: client # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:19.617 UTC|CertificateMessage.java:1140|Produced client Certificate message ( # "Certificate": { # "certificate_request_context": "", # "certificate_list": [ # { # "certificate" : { # "version" : "v3", # "serial number" : "13 45 25 39", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-09-29 08:13:54.000 UTC", # "not after" : "2023-12-28 08:13:54.000 UTC", # "subject" : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.35 Criticality=false # AuthorityKeyIdentifier [ # KeyIdentifier [ # 0000: 66 BC 2D 8E 50 0D DC 51 02 B4 41 B6 7B CD A6 CC f.-.P..Q..A..... # 0010: CA 05 1C 9B .... # ] # ] # }, # { # ObjectId: 2.5.29.37 Criticality=true # ExtendedKeyUsages [ # clientAuth # ] # }, # { # ObjectId: 2.5.29.15 Criticality=true # KeyUsage [ # DigitalSignature # Non_repudiation # Key_Encipherment # ] # }, # { # ObjectId: 2.5.29.17 Criticality=false # SubjectAlternativeName [ # DNSName: test.solr.apache.org # IPAddress: 127.0.0.2 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: 8D 74 D4 D0 B4 B1 00 DE B8 80 30 32 02 7A ED 4C .t........02.z.L # 0010: 7E 3D 00 0D .=.. # ] # ] # } # ]} # "extensions": { # <no extension> # } # }, # { # "certificate" : { # "version" : "v3", # "serial number" : "02 5C BF 96", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-09-29 08:13:48.000 UTC", # "not after" : "2023-12-28 08:13:48.000 UTC", # "subject" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.35 Criticality=false # AuthorityKeyIdentifier [ # KeyIdentifier [ # 0000: 0B 92 BF 67 25 AA DC 11 DB B9 F7 2F B5 6A 8C 8B ...g%....../.j.. # 0010: 0A 14 81 CA .... # ] # ] # }, # { # ObjectId: 2.5.29.19 Criticality=false # BasicConstraints:[ # CA:true # PathLen:0 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: 66 BC 2D 8E 50 0D DC 51 02 B4 41 B6 7B CD A6 CC f.-.P..Q..A..... # 0010: CA 05 1C 9B .... # ] # ] # } # ]} # "extensions": { # <no extension> # } # }, # ] # } # ) # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:19.642 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message ( # "CertificateVerify": { # "signature algorithm": rsa_pss_rsae_sha256 # "signature": { # 0000: 68 4A E5 AE F6 71 12 D3 18 86 86 9E 3A 4A 27 49 hJ...q......:J'I # 0010: 72 F9 B2 C6 ED 69 0B 86 C9 DB E7 4E 50 00 D5 0C r....i.....NP... # 0020: 1E AF 23 22 6B AE C1 DF 99 DE B7 3F 30 4F 60 15 ..#"k......?0O`. # 0030: 4C 1E 33 08 8B 25 80 51 E0 63 DB FA DF 60 C5 96 L.3..%.Q.c...`.. # 0040: 4D E2 51 D7 DD C7 84 0E 9C 3D 15 75 A1 84 AD F7 M.Q......=.u.... # 0050: 09 8F 65 B9 12 A2 DB CC C8 A0 21 1A 1C 2C C4 44 ..e.......!..,.D # 0060: 7A DC E3 7E 88 DC CA 0C 4F 61 B7 DF FA EA 96 78 z.......Oa.....x # 0070: 76 8B 4F 61 7E AE 96 9C 6C 02 77 88 AA 67 F3 01 v.Oa....l.w..g.. # 0080: C0 F0 91 A7 B5 4D 9D 52 92 3B 6C EA D3 99 2D 9A .....M.R.;l...-. # 0090: 2F 8A D4 01 A7 BD 74 7C F5 EB 7A 8B 97 DC 45 49 /.....t...z...EI # 00A0: B8 EC 0E 29 D1 41 2E 2A 75 AB 9A F2 D9 7C 38 1B ...).A.*u.....8. # 00B0: 9F 9D 83 29 63 7D B7 16 37 74 65 C8 82 F3 4B 0B ...)c...7te...K. # 00C0: DB A5 C5 1A 4E 4B CF 1A 41 94 06 BF 21 61 CF 9D ....NK..A...!a.. # 00D0: BF A1 9D C2 2C 9A DD 11 56 E8 E7 29 7D 6B 3E BD ....,...V..).k>. # 00E0: 28 92 84 00 10 99 72 6D 27 B7 3E 29 6C 23 5F 5E (.....rm'.>)l#_^ # 00F0: 53 D8 D6 D0 2B E2 49 70 72 B1 61 9B 88 09 F1 24 S...+.Ipr.a....$ # } # } # ) # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:19.643 UTC|Finished.java:673|Produced client Finished handshake message ( # "Finished": { # "verify data": { # 0000: 75 23 0A 99 F2 91 AE 62 8D A6 F3 D3 72 68 45 60 u#.....b....rhE` # 0010: 88 EE CD 0D 33 36 47 E6 F8 64 FA FD 0F 04 CC 39 ....36G..d.....9 # 0020: 65 2B 54 2D D5 C4 AC 35 AB 53 30 D3 92 7C 6E 11 e+T-...5.S0...n. # }'} # ) # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:19.644 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE # countdown value = 137438953472 # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:19.694 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message ( # "NewSessionTicket": { # "ticket_lifetime" : "86,400", # "ticket_age_add" : "<omitted>", # "ticket_nonce" : "01", # "ticket" : "99 58 AC BC 80 6B 97 3B 8B CE 73 E4 3E 4F 8B F9 C3 2B 11 1E A9 E4 74 DF FE 5C 09 9D EE 31 F3 2B", # "extensions" : [ # <no extension> # ] # } # ) # javax.net.ssl|ALL|01|main|2023-09-29 08:14:19.960 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine # javax.net.ssl|WARNING|01|main|2023-09-29 08:14:19.961 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data # INFO - 2023-09-29 08:14:20.913; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword # INFO - 2023-09-29 08:14:20.919; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword # INFO - 2023-09-29 08:14:21.288; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@32193bea(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@66fdec9[provider=null,keyStore=file:///tmp/bats-run-C74cQN/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-C74cQN/test/62/ssl/client/solr-client.truststore.p12] # INFO - 2023-09-29 08:14:21.291; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@52851b44(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@66fdec9[provider=null,keyStore=file:///tmp/bats-run-C74cQN/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-C74cQN/test/62/ssl/client/solr-client.truststore.p12] # INFO - 2023-09-29 08:14:21.292; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@584f54e6(ca,h=[localhost],a=[],w=[]) for Client@66fdec9[provider=null,keyStore=file:///tmp/bats-run-C74cQN/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-C74cQN/test/62/ssl/client/solr-client.truststore.p12] # javax.net.ssl|DEBUG|01|main|2023-09-29 08:14:21.323 UTC|SunX509KeyManagerImpl.java:164|found key for : client ( # "certificate" : { # "version" : "v3", # "serial number" : "13 45 25 39", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-09-29 08:13:54.000 UTC", # "not after" : "2023-12-28 08:13:54.000 UTC", # "subject" : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.35 Criticality=false # AuthorityKeyIdentifier [ # KeyIdentifier [ # 0000: 66 BC 2D 8E 50 0D DC 51 02 B4 41 B6 7B CD A6 CC f.-.P..Q..A..... # 0010: CA 05 1C 9B .... # ] # ] # }, # { # ObjectId: 2.5.29.37 Criticality=true # ExtendedKeyUsages [ # clientAuth # ] # }, # { # ObjectId: 2.5.29.15 Criticality=true # KeyUsage [ # DigitalSignature # Non_repudiation # Key_Encipherment # ] # }, # { # ObjectId: 2.5.29.17 Criticality=false # SubjectAlternativeName [ # DNSName: test.solr.apache.org # IPAddress: 127.0.0.2 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: 8D 74 D4 D0 B4 B1 00 DE B8 80 30 32 02 7A ED 4C .t........02.z.L # 0010: 7E 3D 00 0D .=.. # ] # ] # } # ]}, # "certificate" : { # "version" : "v3", # "serial number" : "02 5C BF 96", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-09-29 08:13:48.000 UTC", # "not after" : "2023-12-28 08:13:48.000 UTC", # "subject" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.35 Criticality=false # AuthorityKeyIdentifier [ # KeyIdentifier [ # 0000: 0B 92 BF 67 25 AA DC 11 DB B9 F7 2F B5 6A 8C 8B ...g%....../.j.. # 0010: 0A 14 81 CA .... # ] # ] # }, # { # ObjectId: 2.5.29.19 Criticality=false # BasicConstraints:[ # CA:true # PathLen:0 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: 66 BC 2D 8E 50 0D DC 51 02 B4 41 B6 7B CD A6 CC f.-.P..Q..A..... # 0010: CA 05 1C 9B .... # ] # ] # } # ]} # ) # javax.net.ssl|DEBUG|01|main|2023-09-29 08:14:21.327 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates ( # "certificate" : { # "version" : "v3", # "serial number" : "06 54 E6 0F", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-09-29 08:13:46.000 UTC", # "not after" : "2023-12-28 08:13:46.000 UTC", # "subject" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.19 Criticality=true # BasicConstraints:[ # CA:true # PathLen:2147483647 # ] # }, # { # ObjectId: 2.5.29.17 Criticality=false # SubjectAlternativeName [ # DNSName: localhost # IPAddress: 127.0.0.1 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: 0B 92 BF 67 25 AA DC 11 DB B9 F7 2F B5 6A 8C 8B ...g%....../.j.. # 0010: 0A 14 81 CA .... # ] # ] # } # ]}, # "certificate" : { # "version" : "v3", # "serial number" : "02 5C BF 96", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-09-29 08:13:48.000 UTC", # "not after" : "2023-12-28 08:13:48.000 UTC", # "subject" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.35 Criticality=false # AuthorityKeyIdentifier [ # KeyIdentifier [ # 0000: 0B 92 BF 67 25 AA DC 11 DB B9 F7 2F B5 6A 8C 8B ...g%....../.j.. # 0010: 0A 14 81 CA .... # ] # ] # }, # { # ObjectId: 2.5.29.19 Criticality=false # BasicConstraints:[ # CA:true # PathLen:0 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: 66 BC 2D 8E 50 0D DC 51 02 B4 41 B6 7B CD A6 CC f.-.P..Q..A..... # 0010: CA 05 1C 9B .... # ] # ] # } # ]} # ) # javax.net.ssl|DEBUG|01|main|2023-09-29 08:14:21.341 UTC|SSLCipher.java:464|jdk.tls.keyLimits: entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472 # javax.net.ssl|DEBUG|03|Finalizer|2023-09-29 08:14:21.695 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket # javax.net.ssl|DEBUG|03|Finalizer|2023-09-29 08:14:21.697 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive) # javax.net.ssl|DEBUG|03|Finalizer|2023-09-29 08:14:21.697 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket # javax.net.ssl|DEBUG|03|Finalizer|2023-09-29 08:14:21.698 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive) # javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-29 08:14:21.847 UTC|ServerNameExtension.java:261|Unable to indicate server name # javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 08:14:21.848 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name # javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-29 08:14:21.849 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers # javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-29 08:14:21.849 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers # javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 08:14:21.855 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie # javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 08:14:21.866 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info # javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 08:14:21.867 UTC|PreSharedKeyExtension.java:633|No session to resume. # javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 08:14:21.867 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key # javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 08:14:21.869 UTC|ClientHello.java:642|Produced ClientHello handshake message ( # "ClientHello": { # "client version" : "TLSv1.2", # "random" : "76 E3 20 6F C1 E6 63 2A C4 56 76 D4 FA 8D 4C 54 78 8B 3B 9F A9 EE 55 A9 59 38 A5 A7 52 20 1D 4D", # "session id" : "56 95 95 CF F3 5D B1 BB E8 A0 6C 95 76 A8 BD C2 E6 9A 5B DA DB 5E CC EA D3 F0 37 C6 7A 1E 74 F6", # "cipher suites" : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]", # "compression methods" : "00", # "extensions" : [ # "status_request (5)": { # "certificate status type": ocsp # "OCSP status request": { # "responder_id": <empty> # "request extensions": { # <empty> # } # } # }, # "supported_groups (10)": { # "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192] # }, # "ec_point_formats (11)": { # "formats": [uncompressed] # }, # "signature_algorithms (13)": { # "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1] # }, # "signature_algorithms_cert (50)": { # "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1] # }, # "application_layer_protocol_negotiation (16)": { # [h2] # }, # "status_request_v2 (17)": { # "cert status request": { # "certificate status type": ocsp_multi # "OCSP status request": { # "responder_id": <empty> # "request extensions": { # <empty> # } # } # } # }, # "extended_master_secret (23)": { # <empty> # }, # "supported_versions (43)": { # "versions": [TLSv1.3, TLSv1.2] # }, # "psk_key_exchange_modes (45)": { # "ke_modes": [psk_dhe_ke] # }, # "key_share (51)": { # "client_shares": [ # { # "named group": x25519 # "key_exchange": { # 0000: D7 7B 39 EA 39 C8 93 80 76 51 5F 73 3D E8 0E C3 ..9.9...vQ_s=... # 0010: C1 9B 02 C4 87 80 B7 12 00 34 B4 85 BA 76 4E 10 .........4...vN. # } # }, # ] # } # ] # } # ) # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:21.975 UTC|ServerHello.java:867|Consuming ServerHello handshake message ( # "ServerHello": { # "server version" : "TLSv1.2", # "random" : "4F F4 36 9A B9 CB C6 E4 66 01 94 D4 9A A0 D5 95 0E A3 5B 82 A1 49 92 EE 71 44 22 70 C9 A1 94 95", # "session id" : "56 95 95 CF F3 5D B1 BB E8 A0 6C 95 76 A8 BD C2 E6 9A 5B DA DB 5E CC EA D3 F0 37 C6 7A 1E 74 F6", # "cipher suite" : "TLS_AES_256_GCM_SHA384(0x1302)", # "compression methods" : "00", # "extensions" : [ # "supported_versions (43)": { # "selected version": [TLSv1.3] # }, # "key_share (51)": { # "server_share": { # "named group": x25519 # "key_exchange": { # 0000: 66 58 CC D1 A7 6B 82 BE 6D 81 93 CF FE 37 34 9D fX...k..m....74. # 0010: 51 0D 12 EA DE B2 07 07 E9 A0 D7 6A 9A BE 07 7A Q..........j...z # } # }, # } # ] # } # ) # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:21.975 UTC|SSLExtensions.java:192|Consumed extension: supported_versions # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:21.976 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3 # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:21.977 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:21.977 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:21.977 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:21.977 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:21.977 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:21.977 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2 # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:21.978 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:21.978 UTC|SSLExtensions.java:192|Consumed extension: supported_versions # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:21.980 UTC|SSLExtensions.java:192|Consumed extension: key_share # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:21.980 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:21.980 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence. # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:21.981 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:21.981 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:21.981 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:21.981 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:21.981 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:21.981 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2 # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:21.981 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret # javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 08:14:21.981 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions # javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 08:14:21.982 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:21.982 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:21.982 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:21.989 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE # countdown value = 137438953472 # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:21.991 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE # countdown value = 137438953472 # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:21.992 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:21.995 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message ( # "EncryptedExtensions": [ # "supported_groups (10)": { # "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192] # }, # "application_layer_protocol_negotiation (16)": { # [h2] # } # ] # ) # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:21.996 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:21.996 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:21.996 UTC|SSLExtensions.java:192|Consumed extension: supported_groups # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:21.996 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:21.996 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:21.997 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length # javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 08:14:21.997 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups # javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 08:14:21.997 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:21.998 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message ( # "CertificateRequest": { # "certificate_request_context": "", # "extensions": [ # "signature_algorithms (13)": { # "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1] # }, # "signature_algorithms_cert (50)": { # "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1] # }, # "certificate_authorities (47)": { # "certificate authorities": [ # CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country # CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country] # } # ] # } # ) # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:21.999 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:21.999 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:21.999 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:22.000 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:22.001 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert # javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 08:14:22.001 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:22.003 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message ( # "Certificate": { # "certificate_request_context": "", # "certificate_list": [ # { # "certificate" : { # "version" : "v3", # "serial number" : "57 F1 16 43", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-09-29 08:13:51.000 UTC", # "not after" : "2023-12-28 08:13:51.000 UTC", # "subject" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.35 Criticality=false # AuthorityKeyIdentifier [ # KeyIdentifier [ # 0000: 66 BC 2D 8E 50 0D DC 51 02 B4 41 B6 7B CD A6 CC f.-.P..Q..A..... # 0010: CA 05 1C 9B .... # ] # ] # }, # { # ObjectId: 2.5.29.37 Criticality=true # ExtendedKeyUsages [ # serverAuth # ] # }, # { # ObjectId: 2.5.29.15 Criticality=true # KeyUsage [ # DigitalSignature # Non_repudiation # Key_Encipherment # ] # }, # { # ObjectId: 2.5.29.17 Criticality=false # SubjectAlternativeName [ # DNSName: localhost # IPAddress: 127.0.0.1 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: AE 11 98 B2 45 A3 AC 43 8C 02 14 72 DF D0 FA 99 ....E..C...r.... # 0010: 73 E4 AE FC s... # ] # ] # } # ]} # "extensions": { # <no extension> # } # }, # ] # } # ) # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:22.004 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:22.112 UTC|X509TrustManagerImpl.java:292|Found trusted certificate ( # "certificate" : { # "version" : "v3", # "serial number" : "02 5C BF 96", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-09-29 08:13:48.000 UTC", # "not after" : "2023-12-28 08:13:48.000 UTC", # "subject" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.35 Criticality=false # AuthorityKeyIdentifier [ # KeyIdentifier [ # 0000: 0B 92 BF 67 25 AA DC 11 DB B9 F7 2F B5 6A 8C 8B ...g%....../.j.. # 0010: 0A 14 81 CA .... # ] # ] # }, # { # ObjectId: 2.5.29.19 Criticality=false # BasicConstraints:[ # CA:true # PathLen:0 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: 66 BC 2D 8E 50 0D DC 51 02 B4 41 B6 7B CD A6 CC f.-.P..Q..A..... # 0010: CA 05 1C 9B .... # ] # ] # } # ]} # ) # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:22.116 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message ( # "CertificateVerify": { # "signature algorithm": rsa_pss_rsae_sha256 # "signature": { # 0000: 5F 25 E3 C7 9E B2 50 B8 96 C0 D3 DF EC 5B D6 3B _%....P......[.; # 0010: 0F 93 32 EC 8D 93 FD 13 D3 44 BE F8 F0 82 AA 81 ..2......D...... # 0020: BE 8A 63 A4 2B D2 2E DE 4B 51 EA E9 1E 42 D4 FC ..c.+...KQ...B.. # 0030: 2C 8D E9 91 12 43 B4 00 73 EF CE 2A F6 D9 C1 3C ,....C..s..*...< # 0040: 33 BD D4 63 22 A7 2C 72 A7 13 B0 ED 73 A7 E1 64 3..c".,r....s..d # 0050: 30 03 C1 67 B4 88 2B 17 38 E7 D5 BB BA E3 BA E1 0..g..+.8....... # 0060: 4E 41 AF 6C 0F 83 7E B9 33 19 2C 0E 97 F6 33 3D NA.l....3.,...3= # 0070: 9B D1 27 C8 63 5B E5 36 3B 6C 8F C7 76 F5 9D 29 ..'.c[.6;l..v..) # 0080: 84 57 E5 49 40 C2 5E 07 D9 76 A1 52 76 5B 0E 7C .W.I@.^..v.Rv[.. # 0090: C4 BD 29 B7 1E 76 FE B6 AB C7 29 DE BE 75 14 4E ..)..v....)..u.N # 00A0: EF 7D 92 4D 80 0E F2 AB 31 12 9F 1D D7 0B C3 BC ...M....1....... # 00B0: 9D 14 5B C7 4F 57 A9 6C C0 E0 5E FE 0B D5 AD 2F ..[.OW.l..^..../ # 00C0: A1 A5 4F 8D 78 0E 39 D2 6F 7E F5 CB 7D 07 48 4A ..O.x.9.o.....HJ # 00D0: 42 16 EC 61 89 7A 19 C0 6E 9B 8F 77 2D 0A 47 16 B..a.z..n..w-.G. # 00E0: DB 50 55 91 34 2C AB BB 29 F9 EF 6B 58 D0 F4 87 .PU.4,..)..kX... # 00F0: 41 E0 12 AC 26 DD BD C6 C7 68 A7 4A DE 4B 73 5D A...&....h.J.Ks] # } # } # ) # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:22.117 UTC|Finished.java:898|Consuming server Finished handshake message ( # "Finished": { # "verify data": { # 0000: CB 5C 5B 58 F6 2B 05 9D 9C 16 20 A1 1D 44 69 E2 .\[X.+.... ..Di. # 0010: 51 5F E2 C6 F7 E9 EB C3 36 2B 35 77 7C 56 1A 4A Q_......6+5w.V.J # 0020: CE 8E 4E 3B 94 D7 42 DA 28 1F CA E7 EF 97 75 89 ..N;..B.(.....u. # }'} # ) # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:22.120 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE # countdown value = 137438953472 # javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-29 08:14:22.121 UTC|X509Authentication.java:246|No X.509 cert selected for EC # javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 08:14:22.121 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256 # javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-29 08:14:22.121 UTC|X509Authentication.java:246|No X.509 cert selected for EC # javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 08:14:22.121 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384 # javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-29 08:14:22.122 UTC|X509Authentication.java:246|No X.509 cert selected for EC # javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 08:14:22.122 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512 # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:22.122 UTC|SunX509KeyManagerImpl.java:401|matching alias: client # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:22.125 UTC|CertificateMessage.java:1140|Produced client Certificate message ( # "Certificate": { # "certificate_request_context": "", # "certificate_list": [ # { # "certificate" : { # "version" : "v3", # "serial number" : "13 45 25 39", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-09-29 08:13:54.000 UTC", # "not after" : "2023-12-28 08:13:54.000 UTC", # "subject" : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.35 Criticality=false # AuthorityKeyIdentifier [ # KeyIdentifier [ # 0000: 66 BC 2D 8E 50 0D DC 51 02 B4 41 B6 7B CD A6 CC f.-.P..Q..A..... # 0010: CA 05 1C 9B .... # ] # ] # }, # { # ObjectId: 2.5.29.37 Criticality=true # ExtendedKeyUsages [ # clientAuth # ] # }, # { # ObjectId: 2.5.29.15 Criticality=true # KeyUsage [ # DigitalSignature # Non_repudiation # Key_Encipherment # ] # }, # { # ObjectId: 2.5.29.17 Criticality=false # SubjectAlternativeName [ # DNSName: test.solr.apache.org # IPAddress: 127.0.0.2 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: 8D 74 D4 D0 B4 B1 00 DE B8 80 30 32 02 7A ED 4C .t........02.z.L # 0010: 7E 3D 00 0D .=.. # ] # ] # } # ]} # "extensions": { # <no extension> # } # }, # { # "certificate" : { # "version" : "v3", # "serial number" : "02 5C BF 96", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-09-29 08:13:48.000 UTC", # "not after" : "2023-12-28 08:13:48.000 UTC", # "subject" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.35 Criticality=false # AuthorityKeyIdentifier [ # KeyIdentifier [ # 0000: 0B 92 BF 67 25 AA DC 11 DB B9 F7 2F B5 6A 8C 8B ...g%....../.j.. # 0010: 0A 14 81 CA .... # ] # ] # }, # { # ObjectId: 2.5.29.19 Criticality=false # BasicConstraints:[ # CA:true # PathLen:0 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: 66 BC 2D 8E 50 0D DC 51 02 B4 41 B6 7B CD A6 CC f.-.P..Q..A..... # 0010: CA 05 1C 9B .... # ] # ] # } # ]} # "extensions": { # <no extension> # } # }, # ] # } # ) # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:22.151 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message ( # "CertificateVerify": { # "signature algorithm": rsa_pss_rsae_sha256 # "signature": { # 0000: 32 B9 BC 9C CC 09 28 4D 3B A8 65 03 4D 2D 03 80 2.....(M;.e.M-.. # 0010: A0 B8 B4 C5 A3 DE EE 4C 04 EE 84 3C F3 91 78 1F .......L...<..x. # 0020: 04 33 9B D3 14 DC 9C 16 F6 D8 FA 2B 45 8E 6F 75 .3.........+E.ou # 0030: B9 05 A8 92 03 B5 A9 B4 E4 ED 52 72 44 51 58 93 ..........RrDQX. # 0040: 2F 8F D0 6A 3F 44 38 64 F7 A4 07 5E 63 04 7D 40 /..j?D8d...^c..@ # 0050: B6 D2 5F 33 34 D9 06 22 4B 42 0F 36 DE 1B 34 BC .._34.."KB.6..4. # 0060: 88 98 25 49 4D 7D D6 B8 96 1B AF DD 59 D7 90 0F ..%IM.......Y... # 0070: FA 25 F3 BA AF 27 97 38 11 90 79 15 1B 72 D5 F1 .%...'.8..y..r.. # 0080: C7 F4 9F C5 8B D0 FC 03 E4 6B 50 03 D4 33 A6 3E .........kP..3.> # 0090: 17 8B C0 CA BE 6C 6A 62 05 EA 2F 23 A3 4B 7A E8 .....ljb../#.Kz. # 00A0: BC FB B2 FD A6 69 C8 8A 63 F5 7F 9F 54 BA 55 BC .....i..c...T.U. # 00B0: 55 44 A5 0D B7 FC A7 47 98 FD 82 56 3E E7 B6 0C UD.....G...V>... # 00C0: C8 1A 18 41 AB 38 15 BB F6 E6 EC 95 63 6B 72 8C ...A.8......ckr. # 00D0: A3 9A 8B 43 7C 0A CB 00 C5 58 2F E7 45 91 21 5A ...C.....X/.E.!Z # 00E0: A4 86 E9 7E 7D 03 A9 15 62 90 13 73 2A 90 C4 62 ........b..s*..b # 00F0: 50 99 A4 5E 06 7F F2 8B E2 8D F2 A8 44 56 7B B8 P..^........DV.. # } # } # ) # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:22.153 UTC|Finished.java:673|Produced client Finished handshake message ( # "Finished": { # "verify data": { # 0000: 9D D8 06 CB FB 0F DF BD FE 42 A9 B0 96 A6 CC 11 .........B...... # 0010: 84 46 13 37 83 A0 97 FB 8A 4E CC A0 69 AC 3C 43 .F.7.....N..i.<C # 0020: 8D CB C4 67 68 37 75 21 FD CD A0 86 8B BA 44 26 ...gh7u!......D& # }'} # ) # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:22.153 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE # countdown value = 137438953472 # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:22.202 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message ( # "NewSessionTicket": { # "ticket_lifetime" : "86,400", # "ticket_age_add" : "<omitted>", # "ticket_nonce" : "01", # "ticket" : "41 0B 03 A6 29 37 BA F9 C2 3D D3 CE 28 35 D0 1D 91 C3 99 2D AF 16 EA EA 42 78 69 8B 4C 50 AB 7D", # "extensions" : [ # <no extension> # ] # } # ) # javax.net.ssl|ALL|01|main|2023-09-29 08:14:22.517 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine # javax.net.ssl|WARNING|01|main|2023-09-29 08:14:22.518 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data # # -- output does not contain substring -- # substring (1 lines): # Server refused connection # output (491 lines): # INFO - 2023-09-29 08:14:33.447; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword # javax.net.ssl|DEBUG|01|main|2023-09-29 08:14:33.767 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates ( # "certificate" : { # "version" : "v3", # "serial number" : "06 54 E6 0F", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-09-29 08:13:46.000 UTC", # "not after" : "2023-12-28 08:13:46.000 UTC", # "subject" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.19 Criticality=true # BasicConstraints:[ # CA:true # PathLen:2147483647 # ] # }, # { # ObjectId: 2.5.29.17 Criticality=false # SubjectAlternativeName [ # DNSName: localhost # IPAddress: 127.0.0.1 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: 0B 92 BF 67 25 AA DC 11 DB B9 F7 2F B5 6A 8C 8B ...g%....../.j.. # 0010: 0A 14 81 CA .... # ] # ] # } # ]}, # "certificate" : { # "version" : "v3", # "serial number" : "02 5C BF 96", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-09-29 08:13:48.000 UTC", # "not after" : "2023-12-28 08:13:48.000 UTC", # "subject" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.35 Criticality=false # AuthorityKeyIdentifier [ # KeyIdentifier [ # 0000: 0B 92 BF 67 25 AA DC 11 DB B9 F7 2F B5 6A 8C 8B ...g%....../.j.. # 0010: 0A 14 81 CA .... # ] # ] # }, # { # ObjectId: 2.5.29.19 Criticality=false # BasicConstraints:[ # CA:true # PathLen:0 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: 66 BC 2D 8E 50 0D DC 51 02 B4 41 B6 7B CD A6 CC f.-.P..Q..A..... # 0010: CA 05 1C 9B .... # ] # ] # } # ]} # ) # javax.net.ssl|DEBUG|01|main|2023-09-29 08:14:33.781 UTC|SSLCipher.java:464|jdk.tls.keyLimits: entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472 # javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-29 08:14:34.008 UTC|ServerNameExtension.java:261|Unable to indicate server name # javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 08:14:34.008 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name # javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-29 08:14:34.010 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers # javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-29 08:14:34.010 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers # javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 08:14:34.015 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie # javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 08:14:34.026 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info # javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 08:14:34.026 UTC|PreSharedKeyExtension.java:633|No session to resume. # javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 08:14:34.027 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key # javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 08:14:34.029 UTC|ClientHello.java:642|Produced ClientHello handshake message ( # "ClientHello": { # "client version" : "TLSv1.2", # "random" : "AA E5 A1 0F 9C B1 AA F6 29 CF 52 E6 BE C0 65 78 08 C5 F2 B4 50 32 62 2D 6B DE 64 4C 54 63 B1 FC", # "session id" : "A6 3B 26 DD 6C B3 26 B8 69 A7 77 BA 6E 2A 5B AF 41 61 EC 23 B6 6F 0C FC F6 98 38 73 4F 7E C9 D7", # "cipher suites" : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]", # "compression methods" : "00", # "extensions" : [ # "status_request (5)": { # "certificate status type": ocsp # "OCSP status request": { # "responder_id": <empty> # "request extensions": { # <empty> # } # } # }, # "supported_groups (10)": { # "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192] # }, # "ec_point_formats (11)": { # "formats": [uncompressed] # }, # "signature_algorithms (13)": { # "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1] # }, # "signature_algorithms_cert (50)": { # "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1] # }, # "application_layer_protocol_negotiation (16)": { # [h2] # }, # "status_request_v2 (17)": { # "cert status request": { # "certificate status type": ocsp_multi # "OCSP status request": { # "responder_id": <empty> # "request extensions": { # <empty> # } # } # } # }, # "extended_master_secret (23)": { # <empty> # }, # "supported_versions (43)": { # "versions": [TLSv1.3, TLSv1.2] # }, # "psk_key_exchange_modes (45)": { # "ke_modes": [psk_dhe_ke] # }, # "key_share (51)": { # "client_shares": [ # { # "named group": x25519 # "key_exchange": { # 0000: CC 8C E0 4A 1B 78 DD C8 81 FF F2 BF 18 22 47 F4 ...J.x......."G. # 0010: 0D C7 E8 BE 41 A1 D1 4D E9 FA 22 49 8C B7 2D 36 ....A..M.."I..-6 # } # }, # ] # } # ] # } # ) # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:34.048 UTC|ServerHello.java:867|Consuming ServerHello handshake message ( # "ServerHello": { # "server version" : "TLSv1.2", # "random" : "2B F0 0D FC 87 C9 30 1F A3 0F 7F 78 12 D3 81 6D B9 58 AC 54 13 EF B0 11 AB D8 9A 29 06 08 37 02", # "session id" : "A6 3B 26 DD 6C B3 26 B8 69 A7 77 BA 6E 2A 5B AF 41 61 EC 23 B6 6F 0C FC F6 98 38 73 4F 7E C9 D7", # "cipher suite" : "TLS_AES_256_GCM_SHA384(0x1302)", # "compression methods" : "00", # "extensions" : [ # "supported_versions (43)": { # "selected version": [TLSv1.3] # }, # "key_share (51)": { # "server_share": { # "named group": x25519 # "key_exchange": { # 0000: E9 81 1A 77 E6 D9 F9 ED 43 89 47 94 63 8C 6C 4B ...w....C.G.c.lK # 0010: BA CA 43 4B 55 D4 FF F3 D2 E0 CA 2B 34 D5 FD 58 ..CKU......+4..X # } # }, # } # ] # } # ) # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:34.049 UTC|SSLExtensions.java:192|Consumed extension: supported_versions # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:34.049 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3 # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:34.050 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:34.050 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:34.050 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:34.050 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:34.051 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:34.051 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2 # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:34.051 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:34.051 UTC|SSLExtensions.java:192|Consumed extension: supported_versions # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:34.053 UTC|SSLExtensions.java:192|Consumed extension: key_share # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:34.054 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:34.054 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence. # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:34.054 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:34.054 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:34.054 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:34.054 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:34.055 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:34.055 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2 # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:34.055 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret # javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 08:14:34.055 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions # javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 08:14:34.055 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:34.055 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:34.055 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:34.062 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE # countdown value = 137438953472 # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:34.064 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE # countdown value = 137438953472 # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:34.065 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:34.069 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message ( # "EncryptedExtensions": [ # "supported_groups (10)": { # "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192] # }, # "application_layer_protocol_negotiation (16)": { # [h2] # } # ] # ) # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:34.069 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:34.069 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:34.069 UTC|SSLExtensions.java:192|Consumed extension: supported_groups # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:34.069 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:34.070 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:34.070 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length # javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 08:14:34.070 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups # javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 08:14:34.070 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:34.071 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message ( # "CertificateRequest": { # "certificate_request_context": "", # "extensions": [ # "signature_algorithms (13)": { # "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1] # }, # "signature_algorithms_cert (50)": { # "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1] # }, # "certific [...truncated too long message...] ndPoint.onFillable(SslConnection.java:558) # at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379) # at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146) # at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100) # at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53) # at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294) # at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128) # at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628) # at java.base/java.lang.Thread.run(Thread.java:829) # Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target # at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141) # at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126) # at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297) # at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434) # ... 28 more} # # ) # javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 08:15:53.398 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data # javax.net.ssl|DEBUG|03|Finalizer|2023-09-29 08:15:53.445 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket # javax.net.ssl|DEBUG|03|Finalizer|2023-09-29 08:15:53.445 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive) # javax.net.ssl|DEBUG|03|Finalizer|2023-09-29 08:15:53.446 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket # javax.net.ssl|DEBUG|03|Finalizer|2023-09-29 08:15:53.446 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive) # Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:45558/solr/admin/info/system # at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:550) # at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192) # at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582) # at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481) # at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438) # at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158) # at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153) # Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target # at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131) # at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353) # at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296) # at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291) # at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357) # at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232) # at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175) # at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392) # at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443) # at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074) # at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061) # at java.base/java.security.AccessController.doPrivileged(Native Method) # at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008) # at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657) # at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102) # at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84) # at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314) # at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100) # at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558) # at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379) # at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146) # at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100) # at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53) # at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294) # at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128) # at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628) # at java.base/java.lang.Thread.run(Thread.java:829) # Suppressed: java.io.IOException: Broken pipe # at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138) # at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422) # at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275) # at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254) # at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386) # at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292) # at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243) # at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224) # at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821) # at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793) # at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161) # at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451) # at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117) # at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87) # ... 11 more # Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target # at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439) # at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306) # at java.base/sun.security.validator.Validator.validate(Validator.java:264) # at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313) # at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276) # at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141) # at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335) # ... 22 more # Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target # at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141) # at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126) # at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297) # at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434) # ... 28 more ok 64 SOLR-11740 check 'solr stop' connection in 28441ms ok 65 stop command for single port in 31224ms ok 66 status detects locally running solr in 14627ms ok 67 status does not expose cli parameters to end user in 208ms ok 68 listing out files in 2163ms ok 69 copying files around in 6624ms ok 70 upconfig in 2633ms ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1229ms ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1229ms ok 73 Cleanup in 1217ms > Task :solr:packaging:integrationTests FAILED FAILURE: Build failed with an exception. * Where: Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301 * What went wrong: Execution failed for task ':solr:packaging:integrationTests'. > Process 'command > '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished > with non-zero exit value 1 * Try: > Run with --stacktrace option to get the stack trace. > Run with --info or --debug option to get more log output. > Run with --scan to get full insights. * Get more help at https://help.gradle.org BUILD FAILED in 20m 55s 673 actionable tasks: 656 executed, 17 up-to-date [0m[?12l[?25h ------------------------------------------------------------------------ Build Failed: returned 1 Total time: 21m17.5s ------------------------------------------------------------------------ + status=1 + ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*' Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2) rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1675) [Receiver=3.1.2] rsync: [Receiver] write error: Broken pipe (32) + exit 1 Build step 'Execute shell' marked build as failure Archiving artifacts Recording test results [Checks API] No suitable checks publisher found. Email was triggered for: Failure - Any Sending email for trigger: Failure - Any
--------------------------------------------------------------------- To unsubscribe, e-mail: [email protected] For additional commands, e-mail: [email protected]
