Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5588/
All tests passed Build Log: [...truncated 1321 lines...] # ERROR: IOException occurred when talking to server at: https://localhost:39199/solr/test/select # -- # # Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2 # Last output: # INFO - 2023-10-02 01:00:19.758; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword # INFO - 2023-10-02 01:00:19.764; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword # WARN - 2023-10-02 01:00:20.672; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes # WARN - 2023-10-02 01:00:20.713; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes ok 60 start solr with ssl and auth in 22795ms ok 61 start solr with client truststore and security manager in 25138ms not ok 62 start solr with mTLS needed in 57912ms # (in test file test/test_ssl.bats, line 325) # `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed # /tmp/bats-run-fzQ0qD/test/62/ssl # Certificate was added to keystore # Certificate reply was installed in keystore # Certificate was added to keystore # Certificate was added to keystore # Certificate reply was installed in keystore # Certificate was added to keystore # Certificate was added to keystore # Certificate was added to keystore # Certificate was added to keystore # Certificate reply was installed in keystore # Certificate was added to keystore # Certificate was added to keystore # /tmp/src/solr/solr/packaging/build/solr-9.4.0-SNAPSHOT/bin/solr: line 2406: bc: command not found # NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 39199. # # Started Solr server on port 39199 (pid=201746). Happy searching! # # /tmp/src/solr/solr/packaging/build/solr-9.4.0-SNAPSHOT/bin/solr: line 2406: bc: command not found # NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 39200. # # Started Solr server on port 39200 (pid=202174). Happy searching! # # INFO - 2023-10-02 01:01:43.910; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword # INFO - 2023-10-02 01:01:43.916; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword # INFO - 2023-10-02 01:01:44.609; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@ff684e1(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-fzQ0qD/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-fzQ0qD/test/62/ssl/client/solr-client.truststore.p12] # INFO - 2023-10-02 01:01:44.613; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@363042d7(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-fzQ0qD/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-fzQ0qD/test/62/ssl/client/solr-client.truststore.p12] # INFO - 2023-10-02 01:01:44.613; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@366ac49b(ca,h=[localhost],a=[],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-fzQ0qD/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-fzQ0qD/test/62/ssl/client/solr-client.truststore.p12] # javax.net.ssl|DEBUG|01|main|2023-10-02 01:01:44.647 UTC|SunX509KeyManagerImpl.java:164|found key for : client ( # "certificate" : { # "version" : "v3", # "serial number" : "1C F2 D7 75", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-10-02 01:01:20.000 UTC", # "not after" : "2023-12-31 01:01:20.000 UTC", # "subject" : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.35 Criticality=false # AuthorityKeyIdentifier [ # KeyIdentifier [ # 0000: FE F5 FB 2F D7 34 8C 4C EE CB 7A DC 92 D9 9F F1 .../.4.L..z..... # 0010: 7B 15 3F 74 ..?t # ] # ] # }, # { # ObjectId: 2.5.29.37 Criticality=true # ExtendedKeyUsages [ # clientAuth # ] # }, # { # ObjectId: 2.5.29.15 Criticality=true # KeyUsage [ # DigitalSignature # Non_repudiation # Key_Encipherment # ] # }, # { # ObjectId: 2.5.29.17 Criticality=false # SubjectAlternativeName [ # DNSName: test.solr.apache.org # IPAddress: 127.0.0.2 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: 66 8C D7 4A 36 3E AF A2 A7 21 AF 8C 19 BD A1 78 f..J6>...!.....x # 0010: 73 58 2F D3 sX/. # ] # ] # } # ]}, # "certificate" : { # "version" : "v3", # "serial number" : "77 48 B8 7B", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-10-02 01:01:13.000 UTC", # "not after" : "2023-12-31 01:01:13.000 UTC", # "subject" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.35 Criticality=false # AuthorityKeyIdentifier [ # KeyIdentifier [ # 0000: 2A 8B F4 CB 18 1A E3 36 6A 76 2E 7D B9 76 EA BB *......6jv...v.. # 0010: 07 8B DB F4 .... # ] # ] # }, # { # ObjectId: 2.5.29.19 Criticality=false # BasicConstraints:[ # CA:true # PathLen:0 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: FE F5 FB 2F D7 34 8C 4C EE CB 7A DC 92 D9 9F F1 .../.4.L..z..... # 0010: 7B 15 3F 74 ..?t # ] # ] # } # ]} # ) # javax.net.ssl|DEBUG|01|main|2023-10-02 01:01:44.651 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates ( # "certificate" : { # "version" : "v3", # "serial number" : "69 5C 40 F2", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-10-02 01:01:11.000 UTC", # "not after" : "2023-12-31 01:01:11.000 UTC", # "subject" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.19 Criticality=true # BasicConstraints:[ # CA:true # PathLen:2147483647 # ] # }, # { # ObjectId: 2.5.29.17 Criticality=false # SubjectAlternativeName [ # DNSName: localhost # IPAddress: 127.0.0.1 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: 2A 8B F4 CB 18 1A E3 36 6A 76 2E 7D B9 76 EA BB *......6jv...v.. # 0010: 07 8B DB F4 .... # ] # ] # } # ]}, # "certificate" : { # "version" : "v3", # "serial number" : "77 48 B8 7B", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-10-02 01:01:13.000 UTC", # "not after" : "2023-12-31 01:01:13.000 UTC", # "subject" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.35 Criticality=false # AuthorityKeyIdentifier [ # KeyIdentifier [ # 0000: 2A 8B F4 CB 18 1A E3 36 6A 76 2E 7D B9 76 EA BB *......6jv...v.. # 0010: 07 8B DB F4 .... # ] # ] # }, # { # ObjectId: 2.5.29.19 Criticality=false # BasicConstraints:[ # CA:true # PathLen:0 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: FE F5 FB 2F D7 34 8C 4C EE CB 7A DC 92 D9 9F F1 .../.4.L..z..... # 0010: 7B 15 3F 74 ..?t # ] # ] # } # ]} # ) # javax.net.ssl|DEBUG|01|main|2023-10-02 01:01:44.666 UTC|SSLCipher.java:464|jdk.tls.keyLimits: entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472 # javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-02 01:01:44.893 UTC|ServerNameExtension.java:261|Unable to indicate server name # javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 01:01:44.894 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name # javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-02 01:01:44.896 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers # javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-02 01:01:44.896 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers # javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 01:01:44.903 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie # javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 01:01:44.915 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info # javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 01:01:44.915 UTC|PreSharedKeyExtension.java:633|No session to resume. # javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 01:01:44.915 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key # javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 01:01:44.918 UTC|ClientHello.java:642|Produced ClientHello handshake message ( # "ClientHello": { # "client version" : "TLSv1.2", # "random" : "5F 78 0E 12 77 96 4C EA 36 A0 1B 73 8A 99 78 7F F6 CF 3F 13 1E 09 8D E8 78 E3 6A A4 7F EF DE 95", # "session id" : "E5 43 7C 23 1F 7B 41 33 C9 3F BE 91 98 24 E6 97 C0 71 92 B8 E6 6D 0D 9F 03 2F 86 74 12 5C 93 B1", # "cipher suites" : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]", # "compression methods" : "00", # "extensions" : [ # "status_request (5)": { # "certificate status type": ocsp # "OCSP status request": { # "responder_id": <empty> # "request extensions": { # <empty> # } # } # }, # "supported_groups (10)": { # "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192] # }, # "ec_point_formats (11)": { # "formats": [uncompressed] # }, # "signature_algorithms (13)": { # "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1] # }, # "signature_algorithms_cert (50)": { # "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1] # }, # "application_layer_protocol_negotiation (16)": { # [h2] # }, # "status_request_v2 (17)": { # "cert status request": { # "certificate status type": ocsp_multi # "OCSP status request": { # "responder_id": <empty> # "request extensions": { # <empty> # } # } # } # }, # "extended_master_secret (23)": { # <empty> # }, # "supported_versions (43)": { # "versions": [TLSv1.3, TLSv1.2] # }, # "psk_key_exchange_modes (45)": { # "ke_modes": [psk_dhe_ke] # }, # "key_share (51)": { # "client_shares": [ # { # "named group": x25519 # "key_exchange": { # 0000: E3 BC C1 E2 8B 74 8D B3 B8 BB 60 5C 77 85 A8 6A .....t....`\w..j # 0010: 87 2F 2D 96 65 C1 D4 1F 38 CB 44 B0 74 31 B3 0C ./-.e...8.D.t1.. # } # }, # ] # } # ] # } # ) # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:45.036 UTC|ServerHello.java:867|Consuming ServerHello handshake message ( # "ServerHello": { # "server version" : "TLSv1.2", # "random" : "13 22 8E F7 91 11 E3 DC A2 C7 A4 8D 75 C2 DC CA 00 5D 80 20 E2 8B 86 78 51 1D AA 1F B7 06 88 37", # "session id" : "E5 43 7C 23 1F 7B 41 33 C9 3F BE 91 98 24 E6 97 C0 71 92 B8 E6 6D 0D 9F 03 2F 86 74 12 5C 93 B1", # "cipher suite" : "TLS_AES_256_GCM_SHA384(0x1302)", # "compression methods" : "00", # "extensions" : [ # "supported_versions (43)": { # "selected version": [TLSv1.3] # }, # "key_share (51)": { # "server_share": { # "named group": x25519 # "key_exchange": { # 0000: D3 E9 09 E6 2B 25 03 B1 16 13 F0 B6 D9 B4 10 F9 ....+%.......... # 0010: E4 E5 95 AD EC 64 9F F9 35 0C E8 80 14 D2 C0 7E .....d..5....... # } # }, # } # ] # } # ) # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:45.037 UTC|SSLExtensions.java:192|Consumed extension: supported_versions # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:45.037 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3 # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:45.038 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:45.038 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:45.038 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:45.038 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:45.039 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:45.039 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2 # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:45.039 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:45.039 UTC|SSLExtensions.java:192|Consumed extension: supported_versions # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:45.041 UTC|SSLExtensions.java:192|Consumed extension: key_share # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:45.041 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:45.042 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence. # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:45.042 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:45.042 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:45.042 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:45.042 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:45.043 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:45.043 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2 # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:45.043 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret # javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 01:01:45.043 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions # javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 01:01:45.043 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:45.043 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:45.044 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:45.051 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE # countdown value = 137438953472 # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:45.053 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE # countdown value = 137438953472 # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:45.055 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:45.058 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message ( # "EncryptedExtensions": [ # "supported_groups (10)": { # "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192] # }, # "application_layer_protocol_negotiation (16)": { # [h2] # } # ] # ) # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:45.059 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:45.059 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:45.059 UTC|SSLExtensions.java:192|Consumed extension: supported_groups # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:45.059 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:45.059 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:45.060 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length # javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 01:01:45.060 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups # javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 01:01:45.060 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:45.062 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message ( # "CertificateRequest": { # "certificate_request_context": "", # "extensions": [ # "signature_algorithms (13)": { # "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1] # }, # "signature_algorithms_cert (50)": { # "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1] # }, # "certificate_authorities (47)": { # "certificate authorities": [ # CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country # CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country] # } # ] # } # ) # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:45.062 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:45.062 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:45.063 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:45.064 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:45.065 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert # javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 01:01:45.065 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:45.069 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message ( # "Certificate": { # "certificate_request_context": "", # "certificate_list": [ # { # "certificate" : { # "version" : "v3", # "serial number" : "52 3D A5 91", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-10-02 01:01:16.000 UTC", # "not after" : "2023-12-31 01:01:16.000 UTC", # "subject" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.35 Criticality=false # AuthorityKeyIdentifier [ # KeyIdentifier [ # 0000: FE F5 FB 2F D7 34 8C 4C EE CB 7A DC 92 D9 9F F1 .../.4.L..z..... # 0010: 7B 15 3F 74 ..?t # ] # ] # }, # { # ObjectId: 2.5.29.37 Criticality=true # ExtendedKeyUsages [ # serverAuth # ] # }, # { # ObjectId: 2.5.29.15 Criticality=true # KeyUsage [ # DigitalSignature # Non_repudiation # Key_Encipherment # ] # }, # { # ObjectId: 2.5.29.17 Criticality=false # SubjectAlternativeName [ # DNSName: localhost # IPAddress: 127.0.0.1 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: A9 87 E1 BC C9 0D 73 BA C8 97 42 83 00 2E CE 84 ......s...B..... # 0010: 44 94 72 D4 D.r. # ] # ] # } # ]} # "extensions": { # <no extension> # } # }, # ] # } # ) # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:45.070 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request # javax.net.ssl|DEBUG|03|Finalizer|2023-10-02 01:01:45.119 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket # javax.net.ssl|DEBUG|03|Finalizer|2023-10-02 01:01:45.120 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive) # javax.net.ssl|DEBUG|03|Finalizer|2023-10-02 01:01:45.120 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket # javax.net.ssl|DEBUG|03|Finalizer|2023-10-02 01:01:45.120 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive) # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:45.157 UTC|X509TrustManagerImpl.java:292|Found trusted certificate ( # "certificate" : { # "version" : "v3", # "serial number" : "77 48 B8 7B", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-10-02 01:01:13.000 UTC", # "not after" : "2023-12-31 01:01:13.000 UTC", # "subject" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.35 Criticality=false # AuthorityKeyIdentifier [ # KeyIdentifier [ # 0000: 2A 8B F4 CB 18 1A E3 36 6A 76 2E 7D B9 76 EA BB *......6jv...v.. # 0010: 07 8B DB F4 .... # ] # ] # }, # { # ObjectId: 2.5.29.19 Criticality=false # BasicConstraints:[ # CA:true # PathLen:0 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: FE F5 FB 2F D7 34 8C 4C EE CB 7A DC 92 D9 9F F1 .../.4.L..z..... # 0010: 7B 15 3F 74 ..?t # ] # ] # } # ]} # ) # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:45.161 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message ( # "CertificateVerify": { # "signature algorithm": rsa_pss_rsae_sha256 # "signature": { # 0000: 4D B6 ED 62 69 95 88 5D 3B 0D 44 7F C4 82 6E 9E M..bi..];.D...n. # 0010: 63 EA 63 A0 18 56 49 CF E5 12 82 E2 CF FA 3B D3 c.c..VI.......;. # 0020: E0 24 4A 27 24 31 4C CD 14 B8 68 43 5C 7D 3B EB .$J'$1L...hC\.;. # 0030: E7 41 E8 9F 4F 2D 99 11 15 57 BC 85 E5 5B F3 62 .A..O-...W...[.b # 0040: 55 5C 94 3D 90 71 D9 9E F8 84 98 31 5D 39 79 96 U\.=.q.....1]9y. # 0050: 31 AD 30 4E AB 1D 51 21 68 DA EE 88 94 2F 25 EE 1.0N..Q!h..../%. # 0060: 3E D4 98 F6 59 89 41 09 4A 32 28 6E 27 C3 B1 93 >...Y.A.J2(n'... # 0070: 10 1C 71 27 41 3D 58 22 61 5F F2 10 DD B5 11 6B ..q'A=X"a_.....k # 0080: 7D 67 7F FA B8 F5 7B AA 91 03 01 73 78 B1 AE 6E .g.........sx..n # 0090: ED FB 61 2A 12 E2 3D C8 00 C5 42 7B 70 AC 0C D0 ..a*..=...B.p... # 00A0: A1 2D 21 DD E3 DC 3E 12 50 9D 1E 1F 82 BD 25 49 .-!...>.P.....%I # 00B0: B6 C9 19 58 21 66 47 68 DC 2D FA C9 58 03 A3 53 ...X!fGh.-..X..S # 00C0: 10 AB 4A 25 B3 EE 76 28 0B E4 E7 5B 6E B7 E4 C6 ..J%..v(...[n... # 00D0: B1 4C 5E D2 23 2E 0E 5C 4C 42 69 A3 5E 3B 77 9C .L^.#..\LBi.^;w. # 00E0: 99 A5 B5 B9 DE 05 31 6B CA DF E1 72 AD 6A 5C 79 ......1k...r.j\y # 00F0: 77 64 1D 24 84 82 AF C2 DE 51 A5 5E 63 11 60 16 wd.$.....Q.^c.`. # } # } # ) # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:45.163 UTC|Finished.java:898|Consuming server Finished handshake message ( # "Finished": { # "verify data": { # 0000: 19 EA 22 AF 7A 2B 32 0E 69 66 DE 5C D4 B4 A6 7F ..".z+2.if.\.... # 0010: 8C 9A 3C B7 A5 F8 BD 6E 31 A1 96 86 02 17 5D A4 ..<....n1.....]. # 0020: CC A0 EC 53 BC 36 D7 7B 4E DC BD B5 B5 99 06 2E ...S.6..N....... # }'} # ) # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:45.165 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE # countdown value = 137438953472 # javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-02 01:01:45.166 UTC|X509Authentication.java:246|No X.509 cert selected for EC # javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 01:01:45.166 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256 # javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-02 01:01:45.167 UTC|X509Authentication.java:246|No X.509 cert selected for EC # javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 01:01:45.167 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384 # javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-02 01:01:45.167 UTC|X509Authentication.java:246|No X.509 cert selected for EC # javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 01:01:45.167 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512 # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:45.168 UTC|SunX509KeyManagerImpl.java:401|matching alias: client # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:45.170 UTC|CertificateMessage.java:1140|Produced client Certificate message ( # "Certificate": { # "certificate_request_context": "", # "certificate_list": [ # { # "certificate" : { # "version" : "v3", # "serial number" : "1C F2 D7 75", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-10-02 01:01:20.000 UTC", # "not after" : "2023-12-31 01:01:20.000 UTC", # "subject" : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.35 Criticality=false # AuthorityKeyIdentifier [ # KeyIdentifier [ # 0000: FE F5 FB 2F D7 34 8C 4C EE CB 7A DC 92 D9 9F F1 .../.4.L..z..... # 0010: 7B 15 3F 74 ..?t # ] # ] # }, # { # ObjectId: 2.5.29.37 Criticality=true # ExtendedKeyUsages [ # clientAuth # ] # }, # { # ObjectId: 2.5.29.15 Criticality=true # KeyUsage [ # DigitalSignature # Non_repudiation # Key_Encipherment # ] # }, # { # ObjectId: 2.5.29.17 Criticality=false # SubjectAlternativeName [ # DNSName: test.solr.apache.org # IPAddress: 127.0.0.2 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: 66 8C D7 4A 36 3E AF A2 A7 21 AF 8C 19 BD A1 78 f..J6>...!.....x # 0010: 73 58 2F D3 sX/. # ] # ] # } # ]} # "extensions": { # <no extension> # } # }, # { # "certificate" : { # "version" : "v3", # "serial number" : "77 48 B8 7B", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-10-02 01:01:13.000 UTC", # "not after" : "2023-12-31 01:01:13.000 UTC", # "subject" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.35 Criticality=false # AuthorityKeyIdentifier [ # KeyIdentifier [ # 0000: 2A 8B F4 CB 18 1A E3 36 6A 76 2E 7D B9 76 EA BB *......6jv...v.. # 0010: 07 8B DB F4 .... # ] # ] # }, # { # ObjectId: 2.5.29.19 Criticality=false # BasicConstraints:[ # CA:true # PathLen:0 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: FE F5 FB 2F D7 34 8C 4C EE CB 7A DC 92 D9 9F F1 .../.4.L..z..... # 0010: 7B 15 3F 74 ..?t # ] # ] # } # ]} # "extensions": { # <no extension> # } # }, # ] # } # ) # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:45.197 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message ( # "CertificateVerify": { # "signature algorithm": rsa_pss_rsae_sha256 # "signature": { # 0000: 2B 49 0E 37 EC 0F 36 3D 33 27 64 8D 01 05 DA D9 +I.7..6=3'd..... # 0010: 61 BB C6 C1 0A C2 DD 8C 5E 5F AD 0F 36 34 B9 C7 a.......^_..64.. # 0020: 10 DE C8 BC ED 9F 1B 20 94 FE AA 65 E4 E2 6E FD ....... ...e..n. # 0030: E4 07 E6 C1 03 FC 3E BC 96 6C F6 30 12 7D 29 78 ......>..l.0..)x # 0040: D2 D2 A5 7C 36 C5 73 C5 42 4B F8 1F D2 F5 65 79 ....6.s.BK....ey # 0050: 1B BF BD E6 D5 88 49 09 29 BB 95 BF C3 C5 87 AB ......I.)....... # 0060: EC 13 E2 4D 4B 21 9D 06 9E B8 5D 98 4E FA 64 15 ...MK!....].N.d. # 0070: D1 E4 DF B9 22 04 0B AA 08 DF 6F 30 71 C7 BA 26 ....".....o0q..& # 0080: 5A C8 BA 3C 6E D3 D1 A0 CF F6 AE E7 9A 25 EB 6F Z..<n........%.o # 0090: 20 0F 03 F8 22 42 72 EE 01 E8 CB 2A 08 F5 7F 41 ..."Br....*...A # 00A0: E8 57 21 C3 17 B7 49 75 85 A3 FD 37 47 2E 5A 71 .W!...Iu...7G.Zq # 00B0: 04 62 93 B4 0E 62 9C 1E EB 14 5C 88 3B 6D 4E 33 .b...b....\.;mN3 # 00C0: AA D9 0A C2 62 92 75 D4 3F 7E C2 46 23 03 B9 73 ....b.u.?..F#..s # 00D0: A7 6B 50 22 BD 5B A5 A8 A6 CE 6E 4F 35 09 0E 06 .kP".[....nO5... # 00E0: 75 26 6A 35 78 0C DD 71 A9 C8 C5 B2 F9 7B 29 4F u&j5x..q......)O # 00F0: E5 F8 13 2E F5 32 D0 20 29 FF 0C 39 9A A3 8D 40 .....2. )..9...@ # } # } # ) # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:45.198 UTC|Finished.java:673|Produced client Finished handshake message ( # "Finished": { # "verify data": { # 0000: B5 70 DB 0C E3 76 35 48 6B B5 91 D0 34 5E 9E F5 .p...v5Hk...4^.. # 0010: 2C 1D 69 58 C1 26 02 ED C7 3C DD D9 8A 26 0C 8C ,.iX.&...<...&.. # 0020: F9 09 DD DE 5B 22 E4 F9 0C 68 95 DA 35 DA 34 C8 ....["...h..5.4. # }'} # ) # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:45.198 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE # countdown value = 137438953472 # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:45.248 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message ( # "NewSessionTicket": { # "ticket_lifetime" : "86,400", # "ticket_age_add" : "<omitted>", # "ticket_nonce" : "01", # "ticket" : "67 35 AD 8C D9 A3 F4 D1 B1 28 5E 37 B3 F0 75 0D 1C E5 3B DD 1D 44 2D 24 7C 17 26 8C E5 97 8F 21", # "extensions" : [ # <no extension> # ] # } # ) # javax.net.ssl|ALL|01|main|2023-10-02 01:01:45.533 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine # javax.net.ssl|WARNING|01|main|2023-10-02 01:01:45.534 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data # INFO - 2023-10-02 01:01:46.487; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword # INFO - 2023-10-02 01:01:46.493; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword # INFO - 2023-10-02 01:01:46.863; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5d8bafa9(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@5d9b7a8a[provider=null,keyStore=file:///tmp/bats-run-fzQ0qD/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-fzQ0qD/test/62/ssl/client/solr-client.truststore.p12] # INFO - 2023-10-02 01:01:46.866; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@1b73be9f(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5d9b7a8a[provider=null,keyStore=file:///tmp/bats-run-fzQ0qD/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-fzQ0qD/test/62/ssl/client/solr-client.truststore.p12] # INFO - 2023-10-02 01:01:46.867; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@628c4ac0(ca,h=[localhost],a=[],w=[]) for Client@5d9b7a8a[provider=null,keyStore=file:///tmp/bats-run-fzQ0qD/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-fzQ0qD/test/62/ssl/client/solr-client.truststore.p12] # javax.net.ssl|DEBUG|01|main|2023-10-02 01:01:46.898 UTC|SunX509KeyManagerImpl.java:164|found key for : client ( # "certificate" : { # "version" : "v3", # "serial number" : "1C F2 D7 75", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-10-02 01:01:20.000 UTC", # "not after" : "2023-12-31 01:01:20.000 UTC", # "subject" : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.35 Criticality=false # AuthorityKeyIdentifier [ # KeyIdentifier [ # 0000: FE F5 FB 2F D7 34 8C 4C EE CB 7A DC 92 D9 9F F1 .../.4.L..z..... # 0010: 7B 15 3F 74 ..?t # ] # ] # }, # { # ObjectId: 2.5.29.37 Criticality=true # ExtendedKeyUsages [ # clientAuth # ] # }, # { # ObjectId: 2.5.29.15 Criticality=true # KeyUsage [ # DigitalSignature # Non_repudiation # Key_Encipherment # ] # }, # { # ObjectId: 2.5.29.17 Criticality=false # SubjectAlternativeName [ # DNSName: test.solr.apache.org # IPAddress: 127.0.0.2 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: 66 8C D7 4A 36 3E AF A2 A7 21 AF 8C 19 BD A1 78 f..J6>...!.....x # 0010: 73 58 2F D3 sX/. # ] # ] # } # ]}, # "certificate" : { # "version" : "v3", # "serial number" : "77 48 B8 7B", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-10-02 01:01:13.000 UTC", # "not after" : "2023-12-31 01:01:13.000 UTC", # "subject" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.35 Criticality=false # AuthorityKeyIdentifier [ # KeyIdentifier [ # 0000: 2A 8B F4 CB 18 1A E3 36 6A 76 2E 7D B9 76 EA BB *......6jv...v.. # 0010: 07 8B DB F4 .... # ] # ] # }, # { # ObjectId: 2.5.29.19 Criticality=false # BasicConstraints:[ # CA:true # PathLen:0 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: FE F5 FB 2F D7 34 8C 4C EE CB 7A DC 92 D9 9F F1 .../.4.L..z..... # 0010: 7B 15 3F 74 ..?t # ] # ] # } # ]} # ) # javax.net.ssl|DEBUG|01|main|2023-10-02 01:01:46.902 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates ( # "certificate" : { # "version" : "v3", # "serial number" : "69 5C 40 F2", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-10-02 01:01:11.000 UTC", # "not after" : "2023-12-31 01:01:11.000 UTC", # "subject" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.19 Criticality=true # BasicConstraints:[ # CA:true # PathLen:2147483647 # ] # }, # { # ObjectId: 2.5.29.17 Criticality=false # SubjectAlternativeName [ # DNSName: localhost # IPAddress: 127.0.0.1 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: 2A 8B F4 CB 18 1A E3 36 6A 76 2E 7D B9 76 EA BB *......6jv...v.. # 0010: 07 8B DB F4 .... # ] # ] # } # ]}, # "certificate" : { # "version" : "v3", # "serial number" : "77 48 B8 7B", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-10-02 01:01:13.000 UTC", # "not after" : "2023-12-31 01:01:13.000 UTC", # "subject" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.35 Criticality=false # AuthorityKeyIdentifier [ # KeyIdentifier [ # 0000: 2A 8B F4 CB 18 1A E3 36 6A 76 2E 7D B9 76 EA BB *......6jv...v.. # 0010: 07 8B DB F4 .... # ] # ] # }, # { # ObjectId: 2.5.29.19 Criticality=false # BasicConstraints:[ # CA:true # PathLen:0 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: FE F5 FB 2F D7 34 8C 4C EE CB 7A DC 92 D9 9F F1 .../.4.L..z..... # 0010: 7B 15 3F 74 ..?t # ] # ] # } # ]} # ) # javax.net.ssl|DEBUG|01|main|2023-10-02 01:01:46.917 UTC|SSLCipher.java:464|jdk.tls.keyLimits: entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472 # javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-02 01:01:47.435 UTC|ServerNameExtension.java:261|Unable to indicate server name # javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 01:01:47.436 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name # javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-02 01:01:47.438 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers # javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-02 01:01:47.438 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers # javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 01:01:47.444 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie # javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 01:01:47.456 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info # javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 01:01:47.456 UTC|PreSharedKeyExtension.java:633|No session to resume. # javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 01:01:47.456 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key # javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 01:01:47.459 UTC|ClientHello.java:642|Produced ClientHello handshake message ( # "ClientHello": { # "client version" : "TLSv1.2", # "random" : "8A 3B BE DB 99 26 EF BC C6 E0 1A 8A 41 C6 FD 8F 46 3F 32 74 47 23 8E E8 AA 54 FB 9B 99 92 63 6F", # "session id" : "B1 8F BE BB 4E 5A 50 2D 6E 76 6C 7E 20 73 C8 3F 37 1E 1F 4E A7 9C 67 34 B4 78 11 7F 91 22 08 4C", # "cipher suites" : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]", # "compression methods" : "00", # "extensions" : [ # "status_request (5)": { # "certificate status type": ocsp # "OCSP status request": { # "responder_id": <empty> # "request extensions": { # <empty> # } # } # }, # "supported_groups (10)": { # "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192] # }, # "ec_point_formats (11)": { # "formats": [uncompressed] # }, # "signature_algorithms (13)": { # "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1] # }, # "signature_algorithms_cert (50)": { # "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1] # }, # "application_layer_protocol_negotiation (16)": { # [h2] # }, # "status_request_v2 (17)": { # "cert status request": { # "certificate status type": ocsp_multi # "OCSP status request": { # "responder_id": <empty> # "request extensions": { # <empty> # } # } # } # }, # "extended_master_secret (23)": { # <empty> # }, # "supported_versions (43)": { # "versions": [TLSv1.3, TLSv1.2] # }, # "psk_key_exchange_modes (45)": { # "ke_modes": [psk_dhe_ke] # }, # "key_share (51)": { # "client_shares": [ # { # "named group": x25519 # "key_exchange": { # 0000: A7 99 75 62 78 6C 9E 93 CE 13 E5 8C 7A 41 7F BB ..ubxl......zA.. # 0010: 84 6A AC C2 9B 47 8C 4F DE D2 E2 12 7F EE E3 7D .j...G.O........ # } # }, # ] # } # ] # } # ) # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:47.576 UTC|ServerHello.java:867|Consuming ServerHello handshake message ( # "ServerHello": { # "server version" : "TLSv1.2", # "random" : "F5 C8 0A 03 FE 93 52 08 5C 0D 16 9C 94 D8 F8 47 D9 DC 21 5E 04 AE A4 14 AA ED DE 5A 6F 8D 94 56", # "session id" : "B1 8F BE BB 4E 5A 50 2D 6E 76 6C 7E 20 73 C8 3F 37 1E 1F 4E A7 9C 67 34 B4 78 11 7F 91 22 08 4C", # "cipher suite" : "TLS_AES_256_GCM_SHA384(0x1302)", # "compression methods" : "00", # "extensions" : [ # "supported_versions (43)": { # "selected version": [TLSv1.3] # }, # "key_share (51)": { # "server_share": { # "named group": x25519 # "key_exchange": { # 0000: BE 2E 36 63 29 92 3F 96 2C E7 73 C1 10 88 EB 62 ..6c).?.,.s....b # 0010: 2C 39 5D 0C F6 D2 9C 11 6A CD 2D 5D C9 0F C1 30 ,9].....j.-]...0 # } # }, # } # ] # } # ) # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:47.577 UTC|SSLExtensions.java:192|Consumed extension: supported_versions # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:47.577 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3 # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:47.578 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:47.578 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:47.578 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:47.579 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:47.579 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:47.579 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2 # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:47.579 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:47.579 UTC|SSLExtensions.java:192|Consumed extension: supported_versions # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:47.581 UTC|SSLExtensions.java:192|Consumed extension: key_share # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:47.581 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:47.581 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence. # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:47.582 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:47.582 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:47.582 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:47.582 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:47.582 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:47.582 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2 # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:47.582 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret # javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 01:01:47.583 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions # javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 01:01:47.583 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:47.583 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:47.583 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:47.590 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE # countdown value = 137438953472 # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:47.592 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE # countdown value = 137438953472 # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:47.593 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:47.596 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message ( # "EncryptedExtensions": [ # "supported_groups (10)": { # "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192] # }, # "application_layer_protocol_negotiation (16)": { # [h2] # } # ] # ) # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:47.597 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:47.597 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:47.597 UTC|SSLExtensions.java:192|Consumed extension: supported_groups # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:47.597 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:47.597 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:47.597 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length # javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 01:01:47.598 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups # javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 01:01:47.598 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:47.599 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message ( # "CertificateRequest": { # "certificate_request_context": "", # "extensions": [ # "signature_algorithms (13)": { # "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1] # }, # "signature_algorithms_cert (50)": { # "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1] # }, # "certificate_authorities (47)": { # "certificate authorities": [ # CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country # CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country] # } # ] # } # ) # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:47.599 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:47.600 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:47.600 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:47.601 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:47.601 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert # javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 01:01:47.602 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:47.604 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message ( # "Certificate": { # "certificate_request_context": "", # "certificate_list": [ # { # "certificate" : { # "version" : "v3", # "serial number" : "52 3D A5 91", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-10-02 01:01:16.000 UTC", # "not after" : "2023-12-31 01:01:16.000 UTC", # "subject" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.35 Criticality=false # AuthorityKeyIdentifier [ # KeyIdentifier [ # 0000: FE F5 FB 2F D7 34 8C 4C EE CB 7A DC 92 D9 9F F1 .../.4.L..z..... # 0010: 7B 15 3F 74 ..?t # ] # ] # }, # { # ObjectId: 2.5.29.37 Criticality=true # ExtendedKeyUsages [ # serverAuth # ] # }, # { # ObjectId: 2.5.29.15 Criticality=true # KeyUsage [ # DigitalSignature # Non_repudiation # Key_Encipherment # ] # }, # { # ObjectId: 2.5.29.17 Criticality=false # SubjectAlternativeName [ # DNSName: localhost # IPAddress: 127.0.0.1 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: A9 87 E1 BC C9 0D 73 BA C8 97 42 83 00 2E CE 84 ......s...B..... # 0010: 44 94 72 D4 D.r. # ] # ] # } # ]} # "extensions": { # <no extension> # } # }, # ] # } # ) # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:47.605 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request # javax.net.ssl|DEBUG|03|Finalizer|2023-10-02 01:01:47.678 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket # javax.net.ssl|DEBUG|03|Finalizer|2023-10-02 01:01:47.681 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive) # javax.net.ssl|DEBUG|03|Finalizer|2023-10-02 01:01:47.682 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket # javax.net.ssl|DEBUG|03|Finalizer|2023-10-02 01:01:47.682 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive) # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:47.717 UTC|X509TrustManagerImpl.java:292|Found trusted certificate ( # "certificate" : { # "version" : "v3", # "serial number" : "77 48 B8 7B", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-10-02 01:01:13.000 UTC", # "not after" : "2023-12-31 01:01:13.000 UTC", # "subject" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.35 Criticality=false # AuthorityKeyIdentifier [ # KeyIdentifier [ # 0000: 2A 8B F4 CB 18 1A E3 36 6A 76 2E 7D B9 76 EA BB *......6jv...v.. # 0010: 07 8B DB F4 .... # ] # ] # }, # { # ObjectId: 2.5.29.19 Criticality=false # BasicConstraints:[ # CA:true # PathLen:0 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: FE F5 FB 2F D7 34 8C 4C EE CB 7A DC 92 D9 9F F1 .../.4.L..z..... # 0010: 7B 15 3F 74 ..?t # ] # ] # } # ]} # ) # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:47.721 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message ( # "CertificateVerify": { # "signature algorithm": rsa_pss_rsae_sha256 # "signature": { # 0000: 17 1A C0 A2 2C 41 84 DC 8E 2E A6 EE D0 F5 3D 8E ....,A........=. # 0010: 1A 30 EA 78 09 C6 B7 9D 32 97 56 1F 06 9E BF 84 .0.x....2.V..... # 0020: B6 BF 27 94 B3 46 A6 9A AE 78 72 D6 7D E5 CF CC ..'..F...xr..... # 0030: DC 6C 68 B9 1C 44 1A D0 CC 60 37 BB 8B 54 D7 6C .lh..D...`7..T.l # 0040: 67 24 83 DA C9 EC D4 91 27 75 BC A2 05 69 64 B2 g$......'u...id. # 0050: 34 4A 6F E1 FD 67 45 1B 19 3C 06 79 F3 5C FC D0 4Jo..gE..<.y.\.. # 0060: 06 4E 96 6D F7 04 1B C0 5C 6B 99 B4 7F FA 65 A5 .N.m....\k....e. # 0070: BC 0F 7C D0 8F CD 9E 63 6D FE 7D 00 C7 A2 9C D6 .......cm....... # 0080: 46 D1 80 55 C4 A8 4E DD 98 9D 9E FE E8 C5 5F FF F..U..N......._. # 0090: 98 98 B9 B2 DD E9 A3 E5 07 A0 8D 6F 9F FC 35 50 ...........o..5P # 00A0: 43 8F 06 80 ED 2C A4 12 29 69 42 CD A3 3F C0 C0 C....,..)iB..?.. # 00B0: 24 2B 73 6E 13 61 F2 86 05 99 BE 9C 69 7D E0 3A $+sn.a......i..: # 00C0: D8 9F 50 F3 58 53 DD 54 3D AD C0 C2 D9 0E 5D 11 ..P.XS.T=.....]. # 00D0: 2B 92 34 2F F1 6B BB B6 52 BD 5F B9 E1 FC DA D4 +.4/.k..R._..... # 00E0: 9C 09 18 0F 9D E2 6D 3B 1D 8B 14 2E 86 B1 D7 43 ......m;.......C # 00F0: 41 51 0D 34 8D 21 F3 D7 53 57 86 30 66 A2 99 0B AQ.4.!..SW.0f... # } # } # ) # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:47.723 UTC|Finished.java:898|Consuming server Finished handshake message ( # "Finished": { # "verify data": { # 0000: 4D 29 1B 1C 7D 9D 1B FB C1 7B 9D 6E 04 A1 A3 30 M).........n...0 # 0010: BC 3C A2 F5 70 F1 C8 48 A7 E8 61 0A DA C0 D4 D7 .<..p..H..a..... # 0020: 3F 06 58 7A 59 3D AB D3 90 97 66 60 0B 41 6A F9 ?.XzY=....f`.Aj. # }'} # ) # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:47.726 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE # countdown value = 137438953472 # javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-02 01:01:47.727 UTC|X509Authentication.java:246|No X.509 cert selected for EC # javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 01:01:47.727 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256 # javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-02 01:01:47.728 UTC|X509Authentication.java:246|No X.509 cert selected for EC # javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 01:01:47.728 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384 # javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-02 01:01:47.728 UTC|X509Authentication.java:246|No X.509 cert selected for EC # javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 01:01:47.728 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512 # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:47.729 UTC|SunX509KeyManagerImpl.java:401|matching alias: client # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:47.731 UTC|CertificateMessage.java:1140|Produced client Certificate message ( # "Certificate": { # "certificate_request_context": "", # "certificate_list": [ # { # "certificate" : { # "version" : "v3", # "serial number" : "1C F2 D7 75", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-10-02 01:01:20.000 UTC", # "not after" : "2023-12-31 01:01:20.000 UTC", # "subject" : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.35 Criticality=false # AuthorityKeyIdentifier [ # KeyIdentifier [ # 0000: FE F5 FB 2F D7 34 8C 4C EE CB 7A DC 92 D9 9F F1 .../.4.L..z..... # 0010: 7B 15 3F 74 ..?t # ] # ] # }, # { # ObjectId: 2.5.29.37 Criticality=true # ExtendedKeyUsages [ # clientAuth # ] # }, # { # ObjectId: 2.5.29.15 Criticality=true # KeyUsage [ # DigitalSignature # Non_repudiation # Key_Encipherment # ] # }, # { # ObjectId: 2.5.29.17 Criticality=false # SubjectAlternativeName [ # DNSName: test.solr.apache.org # IPAddress: 127.0.0.2 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: 66 8C D7 4A 36 3E AF A2 A7 21 AF 8C 19 BD A1 78 f..J6>...!.....x # 0010: 73 58 2F D3 sX/. # ] # ] # } # ]} # "extensions": { # <no extension> # } # }, # { # "certificate" : { # "version" : "v3", # "serial number" : "77 48 B8 7B", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-10-02 01:01:13.000 UTC", # "not after" : "2023-12-31 01:01:13.000 UTC", # "subject" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.35 Criticality=false # AuthorityKeyIdentifier [ # KeyIdentifier [ # 0000: 2A 8B F4 CB 18 1A E3 36 6A 76 2E 7D B9 76 EA BB *......6jv...v.. # 0010: 07 8B DB F4 .... # ] # ] # }, # { # ObjectId: 2.5.29.19 Criticality=false # BasicConstraints:[ # CA:true # PathLen:0 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: FE F5 FB 2F D7 34 8C 4C EE CB 7A DC 92 D9 9F F1 .../.4.L..z..... # 0010: 7B 15 3F 74 ..?t # ] # ] # } # ]} # "extensions": { # <no extension> # } # }, # ] # } # ) # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:47.758 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message ( # "CertificateVerify": { # "signature algorithm": rsa_pss_rsae_sha256 # "signature": { # 0000: 87 03 64 4E 8C 01 2F CB DD 0F 15 1E 38 68 BE C4 ..dN../.....8h.. # 0010: F6 80 DF 14 B7 CE A7 47 81 48 F9 09 A3 A6 19 69 .......G.H.....i # 0020: B4 DD 76 3B 8E AB 52 29 DD B7 1A 44 70 53 AC 0A ..v;..R)...DpS.. # 0030: 73 55 3A C9 84 EC 48 36 B8 CA 23 71 28 BC ED E8 sU:...H6..#q(... # 0040: 2B 7C 3A AB 12 4E 46 6B 55 C4 7F 77 50 4C DF 1C +.:..NFkU..wPL.. # 0050: 5C 75 A5 8C 50 EB 58 B8 B7 C9 36 C3 0A E0 D8 17 \u..P.X...6..... # 0060: 98 28 EA 9C 01 D2 01 19 72 AB E1 43 2F B9 39 EF .(......r..C/.9. # 0070: BE 3E 59 F4 F3 8A F4 EF 62 5C 45 90 98 C6 4D 46 .>Y.....b\E...MF # 0080: 43 C3 5A B7 A4 43 CD 97 60 F1 49 40 67 82 CC 5C C.Z..C..`.I@g..\ # 0090: 74 D1 23 60 08 98 E0 D7 5A 42 20 3B 7C 36 84 ED t.#`....ZB ;.6.. # 00A0: D1 48 84 08 5D F0 65 7F 9E CD 78 B8 8C 37 0A 38 .H..].e...x..7.8 # 00B0: BC F8 05 E3 0E A9 F5 51 49 4C D0 09 3D B6 F1 4C .......QIL..=..L # 00C0: D9 AD D3 59 66 CD 83 21 65 7F C9 C2 EB 81 09 63 ...Yf..!e......c # 00D0: C1 1F 83 43 39 86 74 8A 5E 46 1C 52 B3 1E 49 AD ...C9.t.^F.R..I. # 00E0: EF 23 6A 74 CC 21 50 36 0F D2 DF 33 B0 E9 7B 4A .#jt.!P6...3...J # 00F0: 95 00 7D 39 E9 04 CF BA A1 49 A6 3F 54 88 1A EF ...9.....I.?T... # } # } # ) # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:47.759 UTC|Finished.java:673|Produced client Finished handshake message ( # "Finished": { # "verify data": { # 0000: 82 96 14 42 F1 7C A2 4E 0A 48 F3 08 1F 9C 2C F7 ...B...N.H....,. # 0010: 3E CB 6B F6 F8 46 18 FC 81 EF F6 F2 52 49 BF 31 >.k..F......RI.1 # 0020: 22 47 1E C2 0C E2 72 0A 48 13 A8 44 E3 EC A9 22 "G....r.H..D..." # }'} # ) # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:47.760 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE # countdown value = 137438953472 # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:47.810 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message ( # "NewSessionTicket": { # "ticket_lifetime" : "86,400", # "ticket_age_add" : "<omitted>", # "ticket_nonce" : "01", # "ticket" : "78 40 A3 B3 2C B0 DF 3E 26 D7 5B 04 BC 93 6B 7A 2C 49 22 58 E0 85 F0 72 89 70 F5 35 B3 4C 3F EE", # "extensions" : [ # <no extension> # ] # } # ) # javax.net.ssl|ALL|01|main|2023-10-02 01:01:48.073 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine # javax.net.ssl|WARNING|01|main|2023-10-02 01:01:48.074 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data # # -- output does not contain substring -- # substring (1 lines): # Server refused connection # output (491 lines): # INFO - 2023-10-02 01:01:59.529; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword # javax.net.ssl|DEBUG|01|main|2023-10-02 01:01:59.860 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates ( # "certificate" : { # "version" : "v3", # "serial number" : "69 5C 40 F2", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-10-02 01:01:11.000 UTC", # "not after" : "2023-12-31 01:01:11.000 UTC", # "subject" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.19 Criticality=true # BasicConstraints:[ # CA:true # PathLen:2147483647 # ] # }, # { # ObjectId: 2.5.29.17 Criticality=false # SubjectAlternativeName [ # DNSName: localhost # IPAddress: 127.0.0.1 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: 2A 8B F4 CB 18 1A E3 36 6A 76 2E 7D B9 76 EA BB *......6jv...v.. # 0010: 07 8B DB F4 .... # ] # ] # } # ]}, # "certificate" : { # "version" : "v3", # "serial number" : "77 48 B8 7B", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-10-02 01:01:13.000 UTC", # "not after" : "2023-12-31 01:01:13.000 UTC", # "subject" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.35 Criticality=false # AuthorityKeyIdentifier [ # KeyIdentifier [ # 0000: 2A 8B F4 CB 18 1A E3 36 6A 76 2E 7D B9 76 EA BB *......6jv...v.. # 0010: 07 8B DB F4 .... # ] # ] # }, # { # ObjectId: 2.5.29.19 Criticality=false # BasicConstraints:[ # CA:true # PathLen:0 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: FE F5 FB 2F D7 34 8C 4C EE CB 7A DC 92 D9 9F F1 .../.4.L..z..... # 0010: 7B 15 3F 74 ..?t # ] # ] # } # ]} # ) # javax.net.ssl|DEBUG|01|main|2023-10-02 01:01:59.875 UTC|SSLCipher.java:464|jdk.tls.keyLimits: entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472 # javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-02 01:02:00.105 UTC|ServerNameExtension.java:261|Unable to indicate server name # javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 01:02:00.106 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name # javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-02 01:02:00.107 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers # javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-02 01:02:00.108 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers # javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 01:02:00.113 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie # javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 01:02:00.125 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info # javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 01:02:00.125 UTC|PreSharedKeyExtension.java:633|No session to resume. # javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 01:02:00.125 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key # javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 01:02:00.127 UTC|ClientHello.java:642|Produced ClientHello handshake message ( # "ClientHello": { # "client version" : "TLSv1.2", # "random" : "14 F0 C9 1D 5E AE 72 3B BD CA E7 9C BD 72 8F E0 0B 50 E8 D1 A9 1D 7E BB 89 DB 19 C9 D7 A4 15 17", # "session id" : "DA 8C 25 59 31 81 82 1E 92 36 2B 9B CA 92 0A 1F 1C 92 1E 0B 3E 6C E6 83 96 FF 6A A9 EF 0E 8A 07", # "cipher suites" : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]", # "compression methods" : "00", # "extensions" : [ # "status_request (5)": { # "certificate status type": ocsp # "OCSP status request": { # "responder_id": <empty> # "request extensions": { # <empty> # } # } # }, # "supported_groups (10)": { # "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192] # }, # "ec_point_formats (11)": { # "formats": [uncompressed] # }, # "signature_algorithms (13)": { # "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1] # }, # "signature_algorithms_cert (50)": { # "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1] # }, # "application_layer_protocol_negotiation (16)": { # [h2] # }, # "status_request_v2 (17)": { # "cert status request": { # "certificate status type": ocsp_multi # "OCSP status request": { # "responder_id": <empty> # "request extensions": { # <empty> # } # } # } # }, # "extended_master_secret (23)": { # <empty> # }, # "supported_versions (43)": { # "versions": [TLSv1.3, TLSv1.2] # }, # "psk_key_exchange_modes (45)": { # "ke_modes": [psk_dhe_ke] # }, # "key_share (51)": { # "client_shares": [ # { # "named group": x25519 # "key_exchange": { # 0000: 2A A6 94 79 05 ED 8F E3 BE EE 65 62 19 05 3D E9 *..y......eb..=. # 0010: 76 53 41 52 BC D9 FE 40 FF EE 3B 52 0C 0A A4 6B vSAR...@..;R...k # } # }, # ] # } # ] # } # ) # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:02:00.147 UTC|ServerHello.java:867|Consuming ServerHello handshake message ( # "ServerHello": { # "server version" : "TLSv1.2", # "random" : "40 9A 7D 20 CC 7F D9 38 B8 8F FA DB 9E 4E E9 04 7A 8B 4D D8 08 79 3E 4F FE B2 75 90 AC 4E 46 39", # "session id" : "DA 8C 25 59 31 81 82 1E 92 36 2B 9B CA 92 0A 1F 1C 92 1E 0B 3E 6C E6 83 96 FF 6A A9 EF 0E 8A 07", # "cipher suite" : "TLS_AES_256_GCM_SHA384(0x1302)", # "compression methods" : "00", # "extensions" : [ # "supported_versions (43)": { # "selected version": [TLSv1.3] # }, # "key_share (51)": { # "server_share": { # "named group": x25519 # "key_exchange": { # 0000: 85 89 56 16 C3 5D AF A0 A0 C3 F7 8C 0B 6A 71 8B ..V..].......jq. # 0010: 97 1C C1 68 01 F3 3A 9E 03 E0 67 7F 8E F3 74 21 ...h..:...g...t! # } # }, # } # ] # } # ) # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:02:00.148 UTC|SSLExtensions.java:192|Consumed extension: supported_versions # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:02:00.148 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3 # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:02:00.149 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:02:00.149 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:02:00.149 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:02:00.149 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:02:00.149 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:02:00.150 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2 # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:02:00.150 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:02:00.150 UTC|SSLExtensions.java:192|Consumed extension: supported_versions # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:02:00.152 UTC|SSLExtensions.java:192|Consumed extension: key_share # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:02:00.152 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:02:00.152 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence. # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:02:00.152 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:02:00.153 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:02:00.153 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:02:00.153 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:02:00.153 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:02:00.153 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2 # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:02:00.153 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret # javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 01:02:00.153 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions # javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 01:02:00.153 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:02:00.153 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:02:00.154 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:02:00.160 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE # countdown value = 137438953472 # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:02:00.162 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE # countdown value = 137438953472 # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:02:00.163 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:02:00.166 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message ( # "EncryptedExtensions": [ # "supported_groups (10)": { # "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192] # }, # "application_layer_protocol_negotiation (16)": { # [h2] # } # ] # ) # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:02:00.166 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:02:00.167 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:02:00.167 UTC|SSLExtensions.java:192|Consumed extension: supported_groups # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:02:00.167 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:02:00.167 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:02:00.167 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length # javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 01:02:00.167 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups # javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 01:02:00.167 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:02:00.169 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message ( # "CertificateRequest": { # "certificate_request_context": "", # "extensions": [ # "signature_algorithms (13)": { # "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1] # }, # "signature_algorithms_cert (50)": { # "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_r [...truncated too long message...] ndPoint.onFillable(SslConnection.java:558) # at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379) # at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146) # at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100) # at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53) # at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294) # at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128) # at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628) # at java.base/java.lang.Thread.run(Thread.java:829) # Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target # at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141) # at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126) # at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297) # at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434) # ... 28 more} # # ) # javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 01:03:18.896 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data # javax.net.ssl|DEBUG|03|Finalizer|2023-10-02 01:03:18.949 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket # javax.net.ssl|DEBUG|03|Finalizer|2023-10-02 01:03:18.950 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive) # javax.net.ssl|DEBUG|03|Finalizer|2023-10-02 01:03:18.950 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket # javax.net.ssl|DEBUG|03|Finalizer|2023-10-02 01:03:18.950 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive) # Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:39200/solr/admin/info/system # at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:550) # at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192) # at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582) # at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481) # at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438) # at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158) # at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153) # Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target # at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131) # at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353) # at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296) # at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291) # at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357) # at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232) # at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175) # at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392) # at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443) # at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074) # at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061) # at java.base/java.security.AccessController.doPrivileged(Native Method) # at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008) # at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657) # at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102) # at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84) # at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314) # at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100) # at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558) # at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379) # at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146) # at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100) # at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53) # at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294) # at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128) # at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628) # at java.base/java.lang.Thread.run(Thread.java:829) # Suppressed: java.io.IOException: Broken pipe # at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138) # at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422) # at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275) # at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254) # at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386) # at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292) # at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243) # at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224) # at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821) # at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793) # at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161) # at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451) # at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117) # at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87) # ... 11 more # Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target # at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439) # at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306) # at java.base/sun.security.validator.Validator.validate(Validator.java:264) # at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313) # at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276) # at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141) # at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335) # ... 22 more # Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target # at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141) # at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126) # at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297) # at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434) # ... 28 more ok 64 SOLR-11740 check 'solr stop' connection in 28489ms ok 65 stop command for single port in 31289ms ok 66 status detects locally running solr in 14359ms ok 67 status does not expose cli parameters to end user in 211ms ok 68 listing out files in 2199ms ok 69 copying files around in 6626ms ok 70 upconfig in 2613ms ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1215ms ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1208ms ok 73 Cleanup in 1218ms > Task :solr:packaging:integrationTests FAILED FAILURE: Build failed with an exception. * Where: Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301 * What went wrong: Execution failed for task ':solr:packaging:integrationTests'. > Process 'command > '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished > with non-zero exit value 1 * Try: > Run with --stacktrace option to get the stack trace. > Run with --info or --debug option to get more log output. > Run with --scan to get full insights. * Get more help at https://help.gradle.org BUILD FAILED in 20m 53s 673 actionable tasks: 656 executed, 17 up-to-date [0m[?12l[?25h ------------------------------------------------------------------------ Build Failed: returned 1 Total time: 21m19.5s ------------------------------------------------------------------------ + status=1 + ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*' Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2) rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1682) [Receiver=3.1.3] rsync: [Receiver] write error: Broken pipe (32) + exit 1 Build step 'Execute shell' marked build as failure Archiving artifacts Recording test results [Checks API] No suitable checks publisher found. Email was triggered for: Failure - Any Sending email for trigger: Failure - Any
--------------------------------------------------------------------- To unsubscribe, e-mail: [email protected] For additional commands, e-mail: [email protected]
