Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5659/
All tests passed Build Log: [...truncated 1322 lines...] # ERROR: IOException occurred when talking to server at: https://localhost:34055/solr/test/select # -- # # Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2 # Last output: # INFO - 2023-10-13 13:39:10.740; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword # INFO - 2023-10-13 13:39:10.746; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword # WARN - 2023-10-13 13:39:11.646; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes # WARN - 2023-10-13 13:39:11.692; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes ok 60 start solr with ssl and auth in 22339ms ok 61 start solr with client truststore and security manager in 25371ms not ok 62 start solr with mTLS needed in 60717ms # (in test file test/test_ssl.bats, line 325) # `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed # /tmp/bats-run-UIpnTO/test/62/ssl # Certificate was added to keystore # Certificate reply was installed in keystore # Certificate was added to keystore # Certificate was added to keystore # Certificate reply was installed in keystore # Certificate was added to keystore # Certificate was added to keystore # Certificate was added to keystore # Certificate was added to keystore # Certificate reply was installed in keystore # Certificate was added to keystore # Certificate was added to keystore # /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2408: bc: command not found # NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 34055. # # Started Solr server on port 34055 (pid=196104). Happy searching! # # /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2408: bc: command not found # NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 34056. # # Started Solr server on port 34056 (pid=196532). Happy searching! # # INFO - 2023-10-13 13:40:34.339; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword # INFO - 2023-10-13 13:40:34.345; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword # INFO - 2023-10-13 13:40:34.727; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5fe1ce85(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@2dca0d64[provider=null,keyStore=file:///tmp/bats-run-UIpnTO/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-UIpnTO/test/62/ssl/client/solr-client.truststore.p12] # INFO - 2023-10-13 13:40:34.731; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5ef6ae06(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@2dca0d64[provider=null,keyStore=file:///tmp/bats-run-UIpnTO/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-UIpnTO/test/62/ssl/client/solr-client.truststore.p12] # INFO - 2023-10-13 13:40:34.731; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@55dfebeb(ca,h=[localhost],a=[],w=[]) for Client@2dca0d64[provider=null,keyStore=file:///tmp/bats-run-UIpnTO/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-UIpnTO/test/62/ssl/client/solr-client.truststore.p12] # javax.net.ssl|DEBUG|01|main|2023-10-13 13:40:34.765 UTC|SunX509KeyManagerImpl.java:164|found key for : client ( # "certificate" : { # "version" : "v3", # "serial number" : "7C 9D 5D 3F", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-10-13 13:40:10.000 UTC", # "not after" : "2024-01-11 13:40:10.000 UTC", # "subject" : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.35 Criticality=false # AuthorityKeyIdentifier [ # KeyIdentifier [ # 0000: 23 2A 8A 23 88 D5 01 B0 B8 7E 07 10 94 28 3A 6A #*.#.........(:j # 0010: 47 74 35 E4 Gt5. # ] # ] # }, # { # ObjectId: 2.5.29.37 Criticality=true # ExtendedKeyUsages [ # clientAuth # ] # }, # { # ObjectId: 2.5.29.15 Criticality=true # KeyUsage [ # DigitalSignature # Non_repudiation # Key_Encipherment # ] # }, # { # ObjectId: 2.5.29.17 Criticality=false # SubjectAlternativeName [ # DNSName: test.solr.apache.org # IPAddress: 127.0.0.2 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: 09 7E 09 C1 2C B6 C9 46 17 D2 79 CD 52 9E 5D D1 ....,..F..y.R.]. # 0010: F2 1D 17 0C .... # ] # ] # } # ]}, # "certificate" : { # "version" : "v3", # "serial number" : "63 29 EF 89", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-10-13 13:40:04.000 UTC", # "not after" : "2024-01-11 13:40:04.000 UTC", # "subject" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.35 Criticality=false # AuthorityKeyIdentifier [ # KeyIdentifier [ # 0000: 08 E4 85 B2 8C 45 BD EE 08 7F FF B9 9D A9 33 24 .....E........3$ # 0010: AD BE 87 5A ...Z # ] # ] # }, # { # ObjectId: 2.5.29.19 Criticality=false # BasicConstraints:[ # CA:true # PathLen:0 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: 23 2A 8A 23 88 D5 01 B0 B8 7E 07 10 94 28 3A 6A #*.#.........(:j # 0010: 47 74 35 E4 Gt5. # ] # ] # } # ]} # ) # javax.net.ssl|DEBUG|01|main|2023-10-13 13:40:34.769 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates ( # "certificate" : { # "version" : "v3", # "serial number" : "2D FD 23 30", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-10-13 13:40:02.000 UTC", # "not after" : "2024-01-11 13:40:02.000 UTC", # "subject" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.19 Criticality=true # BasicConstraints:[ # CA:true # PathLen:2147483647 # ] # }, # { # ObjectId: 2.5.29.17 Criticality=false # SubjectAlternativeName [ # DNSName: localhost # IPAddress: 127.0.0.1 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: 08 E4 85 B2 8C 45 BD EE 08 7F FF B9 9D A9 33 24 .....E........3$ # 0010: AD BE 87 5A ...Z # ] # ] # } # ]}, # "certificate" : { # "version" : "v3", # "serial number" : "63 29 EF 89", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-10-13 13:40:04.000 UTC", # "not after" : "2024-01-11 13:40:04.000 UTC", # "subject" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.35 Criticality=false # AuthorityKeyIdentifier [ # KeyIdentifier [ # 0000: 08 E4 85 B2 8C 45 BD EE 08 7F FF B9 9D A9 33 24 .....E........3$ # 0010: AD BE 87 5A ...Z # ] # ] # }, # { # ObjectId: 2.5.29.19 Criticality=false # BasicConstraints:[ # CA:true # PathLen:0 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: 23 2A 8A 23 88 D5 01 B0 B8 7E 07 10 94 28 3A 6A #*.#.........(:j # 0010: 47 74 35 E4 Gt5. # ] # ] # } # ]} # ) # javax.net.ssl|DEBUG|01|main|2023-10-13 13:40:34.785 UTC|SSLCipher.java:464|jdk.tls.keyLimits: entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472 # javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 13:40:35.162 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket # javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 13:40:35.162 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive) # javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 13:40:35.163 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket # javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 13:40:35.163 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive) # javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-13 13:40:35.300 UTC|ServerNameExtension.java:261|Unable to indicate server name # javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 13:40:35.300 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name # javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-13 13:40:35.302 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers # javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-13 13:40:35.303 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers # javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 13:40:35.309 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie # javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 13:40:35.320 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info # javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 13:40:35.321 UTC|PreSharedKeyExtension.java:633|No session to resume. # javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 13:40:35.321 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key # javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 13:40:35.323 UTC|ClientHello.java:642|Produced ClientHello handshake message ( # "ClientHello": { # "client version" : "TLSv1.2", # "random" : "EB 1A 70 6D 64 72 3C 5B 76 81 2C 56 0F 20 6C 19 86 FE 26 2E C4 77 D3 1F 27 ED 1B B0 70 FF 4D 88", # "session id" : "B0 EC BB 40 A3 E1 9F 49 C4 D2 5D 18 E0 56 C2 B9 DE 3D 17 BE A4 E1 9D 89 B1 C7 1A C5 99 7F 35 D3", # "cipher suites" : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]", # "compression methods" : "00", # "extensions" : [ # "status_request (5)": { # "certificate status type": ocsp # "OCSP status request": { # "responder_id": <empty> # "request extensions": { # <empty> # } # } # }, # "supported_groups (10)": { # "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192] # }, # "ec_point_formats (11)": { # "formats": [uncompressed] # }, # "signature_algorithms (13)": { # "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1] # }, # "signature_algorithms_cert (50)": { # "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1] # }, # "application_layer_protocol_negotiation (16)": { # [h2] # }, # "status_request_v2 (17)": { # "cert status request": { # "certificate status type": ocsp_multi # "OCSP status request": { # "responder_id": <empty> # "request extensions": { # <empty> # } # } # } # }, # "extended_master_secret (23)": { # <empty> # }, # "supported_versions (43)": { # "versions": [TLSv1.3, TLSv1.2] # }, # "psk_key_exchange_modes (45)": { # "ke_modes": [psk_dhe_ke] # }, # "key_share (51)": { # "client_shares": [ # { # "named group": x25519 # "key_exchange": { # 0000: 62 A3 57 E0 5E D2 DF 69 38 D1 12 02 75 A0 83 1F b.W.^..i8...u... # 0010: 1B 3D 0C 36 CF FA 4A AE F3 21 1F 91 85 C8 9B 61 .=.6..J..!.....a # } # }, # ] # } # ] # } # ) # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:35.420 UTC|ServerHello.java:867|Consuming ServerHello handshake message ( # "ServerHello": { # "server version" : "TLSv1.2", # "random" : "E6 40 FE 3A 58 75 E5 8A 3F 39 9F 60 96 B4 34 45 62 D2 37 63 59 63 09 C4 C0 5D EE C9 33 5E B2 ED", # "session id" : "B0 EC BB 40 A3 E1 9F 49 C4 D2 5D 18 E0 56 C2 B9 DE 3D 17 BE A4 E1 9D 89 B1 C7 1A C5 99 7F 35 D3", # "cipher suite" : "TLS_AES_256_GCM_SHA384(0x1302)", # "compression methods" : "00", # "extensions" : [ # "supported_versions (43)": { # "selected version": [TLSv1.3] # }, # "key_share (51)": { # "server_share": { # "named group": x25519 # "key_exchange": { # 0000: 89 BE C7 02 E5 CF B7 51 6D 50 C4 E6 6F 66 05 EA .......QmP..of.. # 0010: BB 91 9A 67 51 8D 88 D9 75 84 FC 12 51 84 67 2E ...gQ...u...Q.g. # } # }, # } # ] # } # ) # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:35.420 UTC|SSLExtensions.java:192|Consumed extension: supported_versions # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:35.420 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3 # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:35.421 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:35.422 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:35.422 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:35.422 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:35.422 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:35.422 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2 # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:35.422 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:35.423 UTC|SSLExtensions.java:192|Consumed extension: supported_versions # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:35.425 UTC|SSLExtensions.java:192|Consumed extension: key_share # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:35.425 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:35.426 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence. # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:35.426 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:35.426 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:35.426 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:35.426 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:35.426 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:35.427 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2 # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:35.427 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret # javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 13:40:35.427 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions # javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 13:40:35.427 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:35.427 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:35.427 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:35.436 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE # countdown value = 137438953472 # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:35.437 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE # countdown value = 137438953472 # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:35.438 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:35.442 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message ( # "EncryptedExtensions": [ # "supported_groups (10)": { # "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192] # }, # "application_layer_protocol_negotiation (16)": { # [h2] # } # ] # ) # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:35.442 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:35.442 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:35.443 UTC|SSLExtensions.java:192|Consumed extension: supported_groups # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:35.443 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:35.443 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:35.443 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length # javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 13:40:35.443 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups # javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 13:40:35.443 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:35.445 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message ( # "CertificateRequest": { # "certificate_request_context": "", # "extensions": [ # "signature_algorithms (13)": { # "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1] # }, # "signature_algorithms_cert (50)": { # "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1] # }, # "certificate_authorities (47)": { # "certificate authorities": [ # CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country # CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country] # } # ] # } # ) # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:35.446 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:35.446 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:35.446 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:35.447 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:35.449 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert # javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 13:40:35.449 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:35.453 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message ( # "Certificate": { # "certificate_request_context": "", # "certificate_list": [ # { # "certificate" : { # "version" : "v3", # "serial number" : "6C 05 DB D8", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-10-13 13:40:06.000 UTC", # "not after" : "2024-01-11 13:40:06.000 UTC", # "subject" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.35 Criticality=false # AuthorityKeyIdentifier [ # KeyIdentifier [ # 0000: 23 2A 8A 23 88 D5 01 B0 B8 7E 07 10 94 28 3A 6A #*.#.........(:j # 0010: 47 74 35 E4 Gt5. # ] # ] # }, # { # ObjectId: 2.5.29.37 Criticality=true # ExtendedKeyUsages [ # serverAuth # ] # }, # { # ObjectId: 2.5.29.15 Criticality=true # KeyUsage [ # DigitalSignature # Non_repudiation # Key_Encipherment # ] # }, # { # ObjectId: 2.5.29.17 Criticality=false # SubjectAlternativeName [ # DNSName: localhost # IPAddress: 127.0.0.1 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: C7 E5 07 73 76 B3 00 E7 9C 0E 76 91 7B 20 EE E5 ...sv.....v.. .. # 0010: AF 96 CC BE .... # ] # ] # } # ]} # "extensions": { # <no extension> # } # }, # ] # } # ) # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:35.453 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:35.536 UTC|X509TrustManagerImpl.java:292|Found trusted certificate ( # "certificate" : { # "version" : "v3", # "serial number" : "63 29 EF 89", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-10-13 13:40:04.000 UTC", # "not after" : "2024-01-11 13:40:04.000 UTC", # "subject" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.35 Criticality=false # AuthorityKeyIdentifier [ # KeyIdentifier [ # 0000: 08 E4 85 B2 8C 45 BD EE 08 7F FF B9 9D A9 33 24 .....E........3$ # 0010: AD BE 87 5A ...Z # ] # ] # }, # { # ObjectId: 2.5.29.19 Criticality=false # BasicConstraints:[ # CA:true # PathLen:0 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: 23 2A 8A 23 88 D5 01 B0 B8 7E 07 10 94 28 3A 6A #*.#.........(:j # 0010: 47 74 35 E4 Gt5. # ] # ] # } # ]} # ) # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:35.540 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message ( # "CertificateVerify": { # "signature algorithm": rsa_pss_rsae_sha256 # "signature": { # 0000: 64 6D 97 BD 09 11 DC 1F 59 D1 CE B4 EB 3A D9 EF dm......Y....:.. # 0010: C0 B3 92 D7 38 91 31 6D A8 DD 3F 6A 33 6A 49 C2 ....8.1m..?j3jI. # 0020: 5D F2 74 EC E9 B4 D1 7E 56 A2 98 56 09 25 88 FA ].t.....V..V.%.. # 0030: 40 6F 57 82 B5 64 15 2B 25 D4 E7 87 63 4D 3D 29 @oW..d.+%...cM=) # 0040: 46 A7 54 E5 44 B4 92 E7 A4 6E 05 9F 16 E7 4D 89 F.T.D....n....M. # 0050: 27 96 D4 17 AC 8E B4 D8 BE 21 3F C3 31 16 00 0C '........!?.1... # 0060: 13 07 1E 23 40 86 13 5B E4 63 C8 64 80 CC 45 81 ...#@..[.c.d..E. # 0070: EB 79 8D ED 39 CE F1 4C 91 76 0C 22 69 09 63 02 .y..9..L.v."i.c. # 0080: BC 8A CA 01 BA BB 72 D1 DB 0F 20 97 AE D4 D2 80 ......r... ..... # 0090: 76 AF D2 10 5F 61 21 4B C8 FC 22 C5 6A 60 74 18 v..._a!K..".j`t. # 00A0: 11 16 94 9B A4 E4 B0 4A B7 FB 01 DC BB 4F 17 F3 .......J.....O.. # 00B0: 7C B2 A9 14 BA 82 BD 03 88 65 39 D0 50 91 A9 4C .........e9.P..L # 00C0: AE 5C FE 07 BD AF EE 34 9D FB 0F 4A C2 6E 24 D0 .\.....4...J.n$. # 00D0: 79 E7 CD 25 83 72 8F 49 37 96 41 43 ED 56 0A 32 y..%.r.I7.AC.V.2 # 00E0: 79 AA D0 13 20 99 D0 DC 7A D5 AD DD 56 1D 8E 5E y... ...z...V..^ # 00F0: 66 1F 87 1D 2D F4 F5 21 6D AD D1 F5 F2 55 3F 10 f...-..!m....U?. # } # } # ) # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:35.543 UTC|Finished.java:898|Consuming server Finished handshake message ( # "Finished": { # "verify data": { # 0000: 59 EB A9 C2 66 B5 F3 80 BA 8F A5 03 37 9D EB 1C Y...f.......7... # 0010: 8C 08 40 FB 8B 7A E1 57 FC AC 4A 4C CA A8 FF 29 [email protected]...) # 0020: 91 AD 37 70 C9 AE DD 85 86 12 45 9B 78 91 BA 0E ..7p......E.x... # }'} # ) # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:35.545 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE # countdown value = 137438953472 # javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-13 13:40:35.546 UTC|X509Authentication.java:246|No X.509 cert selected for EC # javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 13:40:35.546 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256 # javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-13 13:40:35.547 UTC|X509Authentication.java:246|No X.509 cert selected for EC # javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 13:40:35.547 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384 # javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-13 13:40:35.547 UTC|X509Authentication.java:246|No X.509 cert selected for EC # javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 13:40:35.548 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512 # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:35.548 UTC|SunX509KeyManagerImpl.java:401|matching alias: client # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:35.552 UTC|CertificateMessage.java:1140|Produced client Certificate message ( # "Certificate": { # "certificate_request_context": "", # "certificate_list": [ # { # "certificate" : { # "version" : "v3", # "serial number" : "7C 9D 5D 3F", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-10-13 13:40:10.000 UTC", # "not after" : "2024-01-11 13:40:10.000 UTC", # "subject" : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.35 Criticality=false # AuthorityKeyIdentifier [ # KeyIdentifier [ # 0000: 23 2A 8A 23 88 D5 01 B0 B8 7E 07 10 94 28 3A 6A #*.#.........(:j # 0010: 47 74 35 E4 Gt5. # ] # ] # }, # { # ObjectId: 2.5.29.37 Criticality=true # ExtendedKeyUsages [ # clientAuth # ] # }, # { # ObjectId: 2.5.29.15 Criticality=true # KeyUsage [ # DigitalSignature # Non_repudiation # Key_Encipherment # ] # }, # { # ObjectId: 2.5.29.17 Criticality=false # SubjectAlternativeName [ # DNSName: test.solr.apache.org # IPAddress: 127.0.0.2 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: 09 7E 09 C1 2C B6 C9 46 17 D2 79 CD 52 9E 5D D1 ....,..F..y.R.]. # 0010: F2 1D 17 0C .... # ] # ] # } # ]} # "extensions": { # <no extension> # } # }, # { # "certificate" : { # "version" : "v3", # "serial number" : "63 29 EF 89", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-10-13 13:40:04.000 UTC", # "not after" : "2024-01-11 13:40:04.000 UTC", # "subject" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.35 Criticality=false # AuthorityKeyIdentifier [ # KeyIdentifier [ # 0000: 08 E4 85 B2 8C 45 BD EE 08 7F FF B9 9D A9 33 24 .....E........3$ # 0010: AD BE 87 5A ...Z # ] # ] # }, # { # ObjectId: 2.5.29.19 Criticality=false # BasicConstraints:[ # CA:true # PathLen:0 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: 23 2A 8A 23 88 D5 01 B0 B8 7E 07 10 94 28 3A 6A #*.#.........(:j # 0010: 47 74 35 E4 Gt5. # ] # ] # } # ]} # "extensions": { # <no extension> # } # }, # ] # } # ) # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:35.577 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message ( # "CertificateVerify": { # "signature algorithm": rsa_pss_rsae_sha256 # "signature": { # 0000: C5 83 AF 51 6F 31 76 39 DA 00 3E 46 23 BB 4A 4E ...Qo1v9..>F#.JN # 0010: BA 77 A5 F3 3B 78 78 CD 34 9B 0D 8B DE 5D 9C 17 .w..;xx.4....].. # 0020: 7D 94 1E D1 2E 3A 08 F2 6B 8D E0 CE EA B4 FD 36 .....:..k......6 # 0030: 62 BC 4C 22 AD B3 A3 A7 51 8F 11 9E 75 C6 17 D8 b.L"....Q...u... # 0040: 68 EF 3D FE 39 CD 4F A0 BF 31 5E 3A 02 6C 67 D5 h.=.9.O..1^:.lg. # 0050: 15 6D 15 8A D2 95 37 BF 18 F4 51 7E 0F D7 B5 0C .m....7...Q..... # 0060: 35 EF 59 6D 5C D8 55 8E 34 51 2B 5A A3 B5 A7 A0 5.Ym\.U.4Q+Z.... # 0070: BE 93 39 DE 1D 5F 25 D2 16 21 3B 16 97 65 1A 77 ..9.._%..!;..e.w # 0080: 27 CC D2 AC C0 32 D1 1C BC 0C 2B 73 1E B7 B6 DB '....2....+s.... # 0090: DC B8 43 38 2F 78 BE 2E E4 FC 1F C6 34 D6 34 35 ..C8/x......4.45 # 00A0: C1 ED F7 15 58 F6 E5 02 79 8A 3B 68 A9 73 90 20 ....X...y.;h.s. # 00B0: 90 4E D6 89 8D D6 B6 28 F1 A1 C7 34 5E 67 F4 54 .N.....(...4^g.T # 00C0: 59 FE E0 BE 12 01 8D D6 0B AB 15 8C A1 F0 19 89 Y............... # 00D0: 1A 9B 74 09 D5 9A 55 38 60 C4 5E 04 4C 65 77 DA ..t...U8`.^.Lew. # 00E0: 77 2C D0 5C D6 7D CF FD F2 23 26 D4 ED D1 5E CA w,.\.....#&...^. # 00F0: 41 51 F7 3B AF 66 67 A1 63 E2 FA 51 03 A8 67 BA AQ.;.fg.c..Q..g. # } # } # ) # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:35.579 UTC|Finished.java:673|Produced client Finished handshake message ( # "Finished": { # "verify data": { # 0000: 7F FE AC CA 53 63 6D 77 ED 6D AA B0 2A 61 E5 98 ....Scmw.m..*a.. # 0010: 50 17 69 11 5D 4D 4F 66 BB 69 CF C3 61 CE 8B 51 P.i.]MOf.i..a..Q # 0020: DF CE E8 CF B0 A7 F8 16 E0 4F 7F 25 76 3B 78 D1 .........O.%v;x. # }'} # ) # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:35.580 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE # countdown value = 137438953472 # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:35.642 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message ( # "NewSessionTicket": { # "ticket_lifetime" : "86,400", # "ticket_age_add" : "<omitted>", # "ticket_nonce" : "01", # "ticket" : "42 B8 4D BB 73 47 36 49 98 CC 0D 54 E3 52 0A FA BC B4 F3 21 61 31 D5 27 02 E8 E5 F9 D3 A5 D9 7C", # "extensions" : [ # <no extension> # ] # } # ) # javax.net.ssl|ALL|01|main|2023-10-13 13:40:35.937 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine # javax.net.ssl|WARNING|01|main|2023-10-13 13:40:35.938 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data # INFO - 2023-10-13 13:40:36.899; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword # INFO - 2023-10-13 13:40:36.905; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword # INFO - 2023-10-13 13:40:37.281; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@6e35bc3d(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@363042d7[provider=null,keyStore=file:///tmp/bats-run-UIpnTO/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-UIpnTO/test/62/ssl/client/solr-client.truststore.p12] # INFO - 2023-10-13 13:40:37.284; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@62e20a76(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@363042d7[provider=null,keyStore=file:///tmp/bats-run-UIpnTO/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-UIpnTO/test/62/ssl/client/solr-client.truststore.p12] # INFO - 2023-10-13 13:40:37.285; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@2cc44ad(ca,h=[localhost],a=[],w=[]) for Client@363042d7[provider=null,keyStore=file:///tmp/bats-run-UIpnTO/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-UIpnTO/test/62/ssl/client/solr-client.truststore.p12] # javax.net.ssl|DEBUG|01|main|2023-10-13 13:40:37.316 UTC|SunX509KeyManagerImpl.java:164|found key for : client ( # "certificate" : { # "version" : "v3", # "serial number" : "7C 9D 5D 3F", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-10-13 13:40:10.000 UTC", # "not after" : "2024-01-11 13:40:10.000 UTC", # "subject" : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.35 Criticality=false # AuthorityKeyIdentifier [ # KeyIdentifier [ # 0000: 23 2A 8A 23 88 D5 01 B0 B8 7E 07 10 94 28 3A 6A #*.#.........(:j # 0010: 47 74 35 E4 Gt5. # ] # ] # }, # { # ObjectId: 2.5.29.37 Criticality=true # ExtendedKeyUsages [ # clientAuth # ] # }, # { # ObjectId: 2.5.29.15 Criticality=true # KeyUsage [ # DigitalSignature # Non_repudiation # Key_Encipherment # ] # }, # { # ObjectId: 2.5.29.17 Criticality=false # SubjectAlternativeName [ # DNSName: test.solr.apache.org # IPAddress: 127.0.0.2 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: 09 7E 09 C1 2C B6 C9 46 17 D2 79 CD 52 9E 5D D1 ....,..F..y.R.]. # 0010: F2 1D 17 0C .... # ] # ] # } # ]}, # "certificate" : { # "version" : "v3", # "serial number" : "63 29 EF 89", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-10-13 13:40:04.000 UTC", # "not after" : "2024-01-11 13:40:04.000 UTC", # "subject" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.35 Criticality=false # AuthorityKeyIdentifier [ # KeyIdentifier [ # 0000: 08 E4 85 B2 8C 45 BD EE 08 7F FF B9 9D A9 33 24 .....E........3$ # 0010: AD BE 87 5A ...Z # ] # ] # }, # { # ObjectId: 2.5.29.19 Criticality=false # BasicConstraints:[ # CA:true # PathLen:0 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: 23 2A 8A 23 88 D5 01 B0 B8 7E 07 10 94 28 3A 6A #*.#.........(:j # 0010: 47 74 35 E4 Gt5. # ] # ] # } # ]} # ) # javax.net.ssl|DEBUG|01|main|2023-10-13 13:40:37.321 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates ( # "certificate" : { # "version" : "v3", # "serial number" : "2D FD 23 30", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-10-13 13:40:02.000 UTC", # "not after" : "2024-01-11 13:40:02.000 UTC", # "subject" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.19 Criticality=true # BasicConstraints:[ # CA:true # PathLen:2147483647 # ] # }, # { # ObjectId: 2.5.29.17 Criticality=false # SubjectAlternativeName [ # DNSName: localhost # IPAddress: 127.0.0.1 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: 08 E4 85 B2 8C 45 BD EE 08 7F FF B9 9D A9 33 24 .....E........3$ # 0010: AD BE 87 5A ...Z # ] # ] # } # ]}, # "certificate" : { # "version" : "v3", # "serial number" : "63 29 EF 89", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-10-13 13:40:04.000 UTC", # "not after" : "2024-01-11 13:40:04.000 UTC", # "subject" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.35 Criticality=false # AuthorityKeyIdentifier [ # KeyIdentifier [ # 0000: 08 E4 85 B2 8C 45 BD EE 08 7F FF B9 9D A9 33 24 .....E........3$ # 0010: AD BE 87 5A ...Z # ] # ] # }, # { # ObjectId: 2.5.29.19 Criticality=false # BasicConstraints:[ # CA:true # PathLen:0 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: 23 2A 8A 23 88 D5 01 B0 B8 7E 07 10 94 28 3A 6A #*.#.........(:j # 0010: 47 74 35 E4 Gt5. # ] # ] # } # ]} # ) # javax.net.ssl|DEBUG|01|main|2023-10-13 13:40:37.335 UTC|SSLCipher.java:464|jdk.tls.keyLimits: entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472 # javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 13:40:37.674 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket # javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 13:40:37.676 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive) # javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 13:40:37.677 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket # javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 13:40:37.677 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive) # javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-13 13:40:37.835 UTC|ServerNameExtension.java:261|Unable to indicate server name # javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 13:40:37.835 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name # javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-13 13:40:37.837 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers # javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-13 13:40:37.838 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers # javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 13:40:37.844 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie # javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 13:40:37.856 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info # javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 13:40:37.856 UTC|PreSharedKeyExtension.java:633|No session to resume. # javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 13:40:37.856 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key # javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 13:40:37.860 UTC|ClientHello.java:642|Produced ClientHello handshake message ( # "ClientHello": { # "client version" : "TLSv1.2", # "random" : "67 2D 3D E3 92 95 1A 58 C6 ED 7D 28 04 58 C4 BE 21 32 25 98 A8 7E 7E 1F 40 CD B7 EA 0F 0A 71 19", # "session id" : "D1 90 BA 2F A8 C1 80 80 7D A2 F9 30 71 32 95 92 BA 22 5E BB 60 2F 3C B7 EC 74 74 BF F3 DF F8 C4", # "cipher suites" : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]", # "compression methods" : "00", # "extensions" : [ # "status_request (5)": { # "certificate status type": ocsp # "OCSP status request": { # "responder_id": <empty> # "request extensions": { # <empty> # } # } # }, # "supported_groups (10)": { # "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192] # }, # "ec_point_formats (11)": { # "formats": [uncompressed] # }, # "signature_algorithms (13)": { # "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1] # }, # "signature_algorithms_cert (50)": { # "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1] # }, # "application_layer_protocol_negotiation (16)": { # [h2] # }, # "status_request_v2 (17)": { # "cert status request": { # "certificate status type": ocsp_multi # "OCSP status request": { # "responder_id": <empty> # "request extensions": { # <empty> # } # } # } # }, # "extended_master_secret (23)": { # <empty> # }, # "supported_versions (43)": { # "versions": [TLSv1.3, TLSv1.2] # }, # "psk_key_exchange_modes (45)": { # "ke_modes": [psk_dhe_ke] # }, # "key_share (51)": { # "client_shares": [ # { # "named group": x25519 # "key_exchange": { # 0000: B4 54 6B 7A 41 7F 8E 61 91 FF 39 F5 C6 3E C6 14 .TkzA..a..9..>.. # 0010: 95 38 6F CF 97 45 0B 80 5F 01 4C 7D CE F3 5A 04 .8o..E.._.L...Z. # } # }, # ] # } # ] # } # ) # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:37.955 UTC|ServerHello.java:867|Consuming ServerHello handshake message ( # "ServerHello": { # "server version" : "TLSv1.2", # "random" : "5C C8 41 B3 29 ED 6B 0B 0A 8A 67 DF F5 9D 73 19 40 1A 75 34 83 87 02 9F C2 0C 97 7B 45 C2 AF 96", # "session id" : "D1 90 BA 2F A8 C1 80 80 7D A2 F9 30 71 32 95 92 BA 22 5E BB 60 2F 3C B7 EC 74 74 BF F3 DF F8 C4", # "cipher suite" : "TLS_AES_256_GCM_SHA384(0x1302)", # "compression methods" : "00", # "extensions" : [ # "supported_versions (43)": { # "selected version": [TLSv1.3] # }, # "key_share (51)": { # "server_share": { # "named group": x25519 # "key_exchange": { # 0000: C2 EB 42 77 03 1C 14 F0 98 0C F0 79 16 48 57 7C ..Bw.......y.HW. # 0010: 17 10 9E AE 48 44 C9 01 F7 51 D0 DF CC 4A B6 6C ....HD...Q...J.l # } # }, # } # ] # } # ) # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:37.956 UTC|SSLExtensions.java:192|Consumed extension: supported_versions # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:37.956 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3 # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:37.957 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:37.957 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:37.957 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:37.958 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:37.958 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:37.958 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2 # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:37.958 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:37.958 UTC|SSLExtensions.java:192|Consumed extension: supported_versions # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:37.961 UTC|SSLExtensions.java:192|Consumed extension: key_share # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:37.961 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:37.962 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence. # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:37.962 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:37.962 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:37.962 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:37.962 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:37.962 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:37.963 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2 # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:37.963 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret # javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 13:40:37.963 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions # javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 13:40:37.963 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:37.963 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:37.963 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:37.970 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE # countdown value = 137438953472 # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:37.972 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE # countdown value = 137438953472 # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:37.973 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:37.976 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message ( # "EncryptedExtensions": [ # "supported_groups (10)": { # "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192] # }, # "application_layer_protocol_negotiation (16)": { # [h2] # } # ] # ) # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:37.977 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:37.977 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:37.977 UTC|SSLExtensions.java:192|Consumed extension: supported_groups # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:37.978 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:37.978 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:37.978 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length # javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 13:40:37.978 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups # javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 13:40:37.978 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:37.980 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message ( # "CertificateRequest": { # "certificate_request_context": "", # "extensions": [ # "signature_algorithms (13)": { # "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1] # }, # "signature_algorithms_cert (50)": { # "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1] # }, # "certificate_authorities (47)": { # "certificate authorities": [ # CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country # CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country] # } # ] # } # ) # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:37.980 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:37.980 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:37.980 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:37.982 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:37.983 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert # javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 13:40:37.983 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:37.987 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message ( # "Certificate": { # "certificate_request_context": "", # "certificate_list": [ # { # "certificate" : { # "version" : "v3", # "serial number" : "6C 05 DB D8", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-10-13 13:40:06.000 UTC", # "not after" : "2024-01-11 13:40:06.000 UTC", # "subject" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.35 Criticality=false # AuthorityKeyIdentifier [ # KeyIdentifier [ # 0000: 23 2A 8A 23 88 D5 01 B0 B8 7E 07 10 94 28 3A 6A #*.#.........(:j # 0010: 47 74 35 E4 Gt5. # ] # ] # }, # { # ObjectId: 2.5.29.37 Criticality=true # ExtendedKeyUsages [ # serverAuth # ] # }, # { # ObjectId: 2.5.29.15 Criticality=true # KeyUsage [ # DigitalSignature # Non_repudiation # Key_Encipherment # ] # }, # { # ObjectId: 2.5.29.17 Criticality=false # SubjectAlternativeName [ # DNSName: localhost # IPAddress: 127.0.0.1 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: C7 E5 07 73 76 B3 00 E7 9C 0E 76 91 7B 20 EE E5 ...sv.....v.. .. # 0010: AF 96 CC BE .... # ] # ] # } # ]} # "extensions": { # <no extension> # } # }, # ] # } # ) # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:37.987 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:38.084 UTC|X509TrustManagerImpl.java:292|Found trusted certificate ( # "certificate" : { # "version" : "v3", # "serial number" : "63 29 EF 89", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-10-13 13:40:04.000 UTC", # "not after" : "2024-01-11 13:40:04.000 UTC", # "subject" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.35 Criticality=false # AuthorityKeyIdentifier [ # KeyIdentifier [ # 0000: 08 E4 85 B2 8C 45 BD EE 08 7F FF B9 9D A9 33 24 .....E........3$ # 0010: AD BE 87 5A ...Z # ] # ] # }, # { # ObjectId: 2.5.29.19 Criticality=false # BasicConstraints:[ # CA:true # PathLen:0 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: 23 2A 8A 23 88 D5 01 B0 B8 7E 07 10 94 28 3A 6A #*.#.........(:j # 0010: 47 74 35 E4 Gt5. # ] # ] # } # ]} # ) # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:38.087 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message ( # "CertificateVerify": { # "signature algorithm": rsa_pss_rsae_sha256 # "signature": { # 0000: 2D 09 1D 75 51 F3 F2 D5 98 14 DA DD B0 2C 79 09 -..uQ........,y. # 0010: AB DD 0E EE 78 5C 09 1A FA 1B BD C7 B7 94 08 5E ....x\.........^ # 0020: 8C C0 79 68 D1 CE 07 C0 70 EC 4F 9E 2F F2 4F 7F ..yh....p.O./.O. # 0030: C2 7A 38 E2 5E 8B 04 B1 D3 1C 49 DE 54 C1 D9 B5 .z8.^.....I.T... # 0040: E1 FF 5E 58 CD 76 9B 92 33 82 1C 5E A4 06 D6 E2 ..^X.v..3..^.... # 0050: 1A CA B6 F6 74 4E 0A DD C1 00 C9 41 54 5B 59 D8 ....tN.....AT[Y. # 0060: A0 58 51 0D 9B 71 E9 C5 7F 28 6A D3 6C 53 2F 35 .XQ..q...(j.lS/5 # 0070: 8D 90 01 8F B7 5B B3 25 D8 EC 03 BD E2 DC 49 A2 .....[.%......I. # 0080: E3 68 0B 8B E9 88 FC 5B CA 46 D7 75 CE B2 1D 69 .h.....[.F.u...i # 0090: 03 7E 17 25 C0 4E 5F 2A DA 0E 4A E4 46 EF 71 D0 ...%.N_*..J.F.q. # 00A0: AE 94 6B AB 07 45 C6 3D 68 61 0E C2 8C 6B 78 05 ..k..E.=ha...kx. # 00B0: 6D 2C EF CF 13 1B F5 EC E5 16 49 FD B3 46 AC 2D m,........I..F.- # 00C0: D1 77 4A EF E9 86 05 01 B2 75 11 6F 0D 7B 35 EA .wJ......u.o..5. # 00D0: 58 7D F7 3F 69 9A 22 79 79 AA B7 D7 4C 3B 3E 45 X..?i."yy...L;>E # 00E0: 87 B1 6D F5 2A 40 84 86 95 6B 14 33 79 35 D6 24 ..m.*@...k.3y5.$ # 00F0: 68 37 B9 09 9B 0A 05 41 CD F1 8F E1 A1 81 6A B0 h7.....A......j. # } # } # ) # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:38.089 UTC|Finished.java:898|Consuming server Finished handshake message ( # "Finished": { # "verify data": { # 0000: 28 72 69 EA FE 2A BF E4 3D 3F CD 21 1F 32 87 C6 (ri..*..=?.!.2.. # 0010: A3 32 03 CC 1D 04 06 57 CF A1 07 C3 FE C5 5E 08 .2.....W......^. # 0020: 1F 52 19 6E D2 56 48 C6 C3 19 12 C5 4E 53 FB 9F .R.n.VH.....NS.. # }'} # ) # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:38.091 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE # countdown value = 137438953472 # javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-13 13:40:38.092 UTC|X509Authentication.java:246|No X.509 cert selected for EC # javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 13:40:38.092 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256 # javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-13 13:40:38.093 UTC|X509Authentication.java:246|No X.509 cert selected for EC # javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 13:40:38.093 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384 # javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-13 13:40:38.093 UTC|X509Authentication.java:246|No X.509 cert selected for EC # javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 13:40:38.093 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512 # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:38.094 UTC|SunX509KeyManagerImpl.java:401|matching alias: client # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:38.096 UTC|CertificateMessage.java:1140|Produced client Certificate message ( # "Certificate": { # "certificate_request_context": "", # "certificate_list": [ # { # "certificate" : { # "version" : "v3", # "serial number" : "7C 9D 5D 3F", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-10-13 13:40:10.000 UTC", # "not after" : "2024-01-11 13:40:10.000 UTC", # "subject" : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.35 Criticality=false # AuthorityKeyIdentifier [ # KeyIdentifier [ # 0000: 23 2A 8A 23 88 D5 01 B0 B8 7E 07 10 94 28 3A 6A #*.#.........(:j # 0010: 47 74 35 E4 Gt5. # ] # ] # }, # { # ObjectId: 2.5.29.37 Criticality=true # ExtendedKeyUsages [ # clientAuth # ] # }, # { # ObjectId: 2.5.29.15 Criticality=true # KeyUsage [ # DigitalSignature # Non_repudiation # Key_Encipherment # ] # }, # { # ObjectId: 2.5.29.17 Criticality=false # SubjectAlternativeName [ # DNSName: test.solr.apache.org # IPAddress: 127.0.0.2 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: 09 7E 09 C1 2C B6 C9 46 17 D2 79 CD 52 9E 5D D1 ....,..F..y.R.]. # 0010: F2 1D 17 0C .... # ] # ] # } # ]} # "extensions": { # <no extension> # } # }, # { # "certificate" : { # "version" : "v3", # "serial number" : "63 29 EF 89", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-10-13 13:40:04.000 UTC", # "not after" : "2024-01-11 13:40:04.000 UTC", # "subject" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.35 Criticality=false # AuthorityKeyIdentifier [ # KeyIdentifier [ # 0000: 08 E4 85 B2 8C 45 BD EE 08 7F FF B9 9D A9 33 24 .....E........3$ # 0010: AD BE 87 5A ...Z # ] # ] # }, # { # ObjectId: 2.5.29.19 Criticality=false # BasicConstraints:[ # CA:true # PathLen:0 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: 23 2A 8A 23 88 D5 01 B0 B8 7E 07 10 94 28 3A 6A #*.#.........(:j # 0010: 47 74 35 E4 Gt5. # ] # ] # } # ]} # "extensions": { # <no extension> # } # }, # ] # } # ) # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:38.122 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message ( # "CertificateVerify": { # "signature algorithm": rsa_pss_rsae_sha256 # "signature": { # 0000: 43 31 B8 2D 44 AD DA 23 E0 EE E2 E4 CA 51 C0 69 C1.-D..#.....Q.i # 0010: 0A E7 AE DA 6F D3 07 AF B7 E6 28 41 1F A5 59 E1 ....o.....(A..Y. # 0020: 64 73 ED E5 A8 E1 AF 28 CD E2 A3 0F 87 4D 31 F7 ds.....(.....M1. # 0030: 62 84 05 C3 2D 2A AF 25 C5 21 06 53 EC 98 07 3E b...-*.%.!.S...> # 0040: 55 66 C8 BA 30 A1 76 B7 BD AB B3 80 53 3A 6E ED Uf..0.v.....S:n. # 0050: 8E 8F 70 A8 C8 21 16 D4 09 69 89 D5 AC 94 8B 9E ..p..!...i...... # 0060: 85 FB 7F CE 49 7C 32 25 B0 1E BD 11 B9 35 07 CC ....I.2%.....5.. # 0070: 96 52 1E D1 A4 09 77 0C BB 05 36 C2 1E 6C 46 A7 .R....w...6..lF. # 0080: 8F 94 29 57 2F F2 C1 3C FA 47 0F DD 51 E9 84 20 ..)W/..<.G..Q.. # 0090: A7 49 A2 73 65 9E ED F4 06 92 A1 E8 09 3E 9B 86 .I.se........>.. # 00A0: 3A F8 80 FA 4E ED 66 33 5F 08 F2 9C E9 F4 B2 43 :...N.f3_......C # 00B0: 54 2F D6 82 13 99 B7 40 92 BA 8E 6E 4D 5C 67 AD T/[email protected]\g. # 00C0: 83 3F 2A 84 4E EB A2 10 02 18 D3 85 8C 97 83 37 .?*.N..........7 # 00D0: FA 59 46 F8 17 91 4E D6 F4 47 BB B2 74 8B A2 78 .YF...N..G..t..x # 00E0: 99 26 42 5D 1A E8 9D 44 79 B7 C8 E1 8E 5E 91 C1 .&B]...Dy....^.. # 00F0: 32 09 2D 70 05 A7 34 7A 97 85 EA 48 0C 81 6C 4A 2.-p..4z...H..lJ # } # } # ) # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:38.123 UTC|Finished.java:673|Produced client Finished handshake message ( # "Finished": { # "verify data": { # 0000: 62 6C FA 1B 6B B7 64 80 43 8A 02 96 A0 04 70 B0 bl..k.d.C.....p. # 0010: 98 A8 CC 49 3E AB 17 9E A5 2D 3E 49 D9 4E 46 7D ...I>....->I.NF. # 0020: E3 C9 C3 1C 9A 17 CE 0D 7D EB B7 B1 3F 23 3A 92 ............?#:. # }'} # ) # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:38.124 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE # countdown value = 137438953472 # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:38.189 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message ( # "NewSessionTicket": { # "ticket_lifetime" : "86,400", # "ticket_age_add" : "<omitted>", # "ticket_nonce" : "01", # "ticket" : "48 8A 18 F4 61 1D 5D D4 73 79 41 56 02 06 00 21 AE 35 41 0C 1E 60 FE EA 04 90 2F C4 37 19 DA 21", # "extensions" : [ # <no extension> # ] # } # ) # javax.net.ssl|ALL|01|main|2023-10-13 13:40:38.514 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine # javax.net.ssl|WARNING|01|main|2023-10-13 13:40:38.515 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data # # -- output does not contain substring -- # substring (1 lines): # Server refused connection # output (491 lines): # INFO - 2023-10-13 13:40:49.442; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword # javax.net.ssl|DEBUG|01|main|2023-10-13 13:40:49.766 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates ( # "certificate" : { # "version" : "v3", # "serial number" : "2D FD 23 30", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-10-13 13:40:02.000 UTC", # "not after" : "2024-01-11 13:40:02.000 UTC", # "subject" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.19 Criticality=true # BasicConstraints:[ # CA:true # PathLen:2147483647 # ] # }, # { # ObjectId: 2.5.29.17 Criticality=false # SubjectAlternativeName [ # DNSName: localhost # IPAddress: 127.0.0.1 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: 08 E4 85 B2 8C 45 BD EE 08 7F FF B9 9D A9 33 24 .....E........3$ # 0010: AD BE 87 5A ...Z # ] # ] # } # ]}, # "certificate" : { # "version" : "v3", # "serial number" : "63 29 EF 89", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-10-13 13:40:04.000 UTC", # "not after" : "2024-01-11 13:40:04.000 UTC", # "subject" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.35 Criticality=false # AuthorityKeyIdentifier [ # KeyIdentifier [ # 0000: 08 E4 85 B2 8C 45 BD EE 08 7F FF B9 9D A9 33 24 .....E........3$ # 0010: AD BE 87 5A ...Z # ] # ] # }, # { # ObjectId: 2.5.29.19 Criticality=false # BasicConstraints:[ # CA:true # PathLen:0 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: 23 2A 8A 23 88 D5 01 B0 B8 7E 07 10 94 28 3A 6A #*.#.........(:j # 0010: 47 74 35 E4 Gt5. # ] # ] # } # ]} # ) # javax.net.ssl|DEBUG|01|main|2023-10-13 13:40:49.782 UTC|SSLCipher.java:464|jdk.tls.keyLimits: entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472 # javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 13:40:49.934 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket # javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 13:40:49.935 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive) # javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 13:40:49.935 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket # javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 13:40:49.935 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive) # javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-13 13:40:50.014 UTC|ServerNameExtension.java:261|Unable to indicate server name # javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 13:40:50.014 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name # javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-13 13:40:50.016 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers # javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-13 13:40:50.016 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers # javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 13:40:50.021 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie # javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 13:40:50.032 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info # javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 13:40:50.032 UTC|PreSharedKeyExtension.java:633|No session to resume. # javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 13:40:50.032 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key # javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 13:40:50.035 UTC|ClientHello.java:642|Produced ClientHello handshake message ( # "ClientHello": { # "client version" : "TLSv1.2", # "random" : "6B F1 FB 7E E5 EE 21 18 E2 AF 44 7B F0 E3 23 CA 92 4F A9 F4 F1 4E 06 20 A5 BA 89 65 1C 39 92 FE", # "session id" : "DC DA 51 0B 7F 9C 5B 13 E9 B6 29 21 B9 BD A8 4C FF 36 66 F8 C1 6D B8 39 B1 5C 3C 71 EC 07 1C 24", # "cipher suites" : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]", # "compression methods" : "00", # "extensions" : [ # "status_request (5)": { # "certificate status type": ocsp # "OCSP status request": { # "responder_id": <empty> # "request extensions": { # <empty> # } # } # }, # "supported_groups (10)": { # "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192] # }, # "ec_point_formats (11)": { # "formats": [uncompressed] # }, # "signature_algorithms (13)": { # "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1] # }, # "signature_algorithms_cert (50)": { # "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1] # }, # "application_layer_protocol_negotiation (16)": { # [h2] # }, # "status_request_v2 (17)": { # "cert status request": { # "certificate status type": ocsp_multi # "OCSP status request": { # "responder_id": <empty> # "request extensions": { # <empty> # } # } # } # }, # "extended_master_secret (23)": { # <empty> # }, # "supported_versions (43)": { # "versions": [TLSv1.3, TLSv1.2] # }, # "psk_key_exchange_modes (45)": { # "ke_modes": [psk_dhe_ke] # }, # "key_share (51)": { # "client_shares": [ # { # "named group": x25519 # "key_exchange": { # 0000: CE D1 A8 38 E2 85 69 35 DC 16 B3 D2 44 63 1A 15 ...8..i5....Dc.. # 0010: D9 65 95 F2 43 ED DB 16 13 83 38 C6 BA CB 0E 48 .e..C.....8....H # } # }, # ] # } # ] # } # ) # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:50.053 UTC|ServerHello.java:867|Consuming ServerHello handshake message ( # "ServerHello": { # "server version" : "TLSv1.2", # "random" : "0C A8 E6 7D 06 A8 AA 8F 09 44 5C 7D 53 8E 2A 31 A9 ED 55 25 21 FC 51 C6 5B 24 16 7A FD 12 DB 12", # "session id" : "DC DA 51 0B 7F 9C 5B 13 E9 B6 29 21 B9 BD A8 4C FF 36 66 F8 C1 6D B8 39 B1 5C 3C 71 EC 07 1C 24", # "cipher suite" : "TLS_AES_256_GCM_SHA384(0x1302)", # "compression methods" : "00", # "extensions" : [ # "supported_versions (43)": { # "selected version": [TLSv1.3] # }, # "key_share (51)": { # "server_share": { # "named group": x25519 # "key_exchange": { # 0000: E4 CC C8 B5 84 48 A6 5B 60 2A BE C6 6D CB 3A 46 .....H.[`*..m.:F # 0010: 05 B9 93 CC F5 88 1D 43 3F 52 91 23 0C E1 BE 2B .......C?R.#...+ # } # }, # } # ] # } # ) # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:50.053 UTC|SSLExtensions.java:192|Consumed extension: supported_versions # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:50.053 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3 # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:50.054 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:50.054 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:50.055 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:50.055 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:50.055 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:50.055 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2 # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:50.055 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:50.056 UTC|SSLExtensions.java:192|Consumed extension: supported_versions # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:50.058 UTC|SSLExtensions.java:192|Consumed extension: key_share # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:50.058 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:50.058 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence. # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:50.058 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:50.058 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:50.058 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:50.059 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:50.059 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:50.059 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2 # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:50.059 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret # javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 13:40:50.059 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions # javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 13:40:50.059 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:50.059 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:50.059 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:50.066 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE # countdown value = 137438953472 # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:50.068 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE # countdown value = 137438953472 # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:50.069 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:50.072 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message ( # "EncryptedExtensions": [ # "supported_groups (10)": { # "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192] # }, # "application_layer_protocol_negotiation (16)": { # [h2] # } # ] # ) # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:50.072 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:50.072 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:50.073 UTC|SSLExtensions.java:192|Consumed extension: supported_groups # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:50.073 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:50.073 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:50.073 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length # javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 13:40:50.073 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups # javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 13:40:50.073 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation # javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:50.074 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message ( # "CertificateRequest": { # "certificate_request_context": "", # "extensions": [ # "signature_algorithms (13)": { # "signature sc [...truncated too long message...] ection$DecryptedEndPoint.onFillable(SslConnection.java:558) # at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379) # at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146) # at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100) # at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53) # at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294) # at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128) # at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628) # at java.base/java.lang.Thread.run(Thread.java:829) # Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target # at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141) # at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126) # at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297) # at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434) # ... 28 more} # # ) # javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 13:42:12.575 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data # javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 13:42:12.624 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket # javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 13:42:12.625 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive) # javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 13:42:12.625 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket # javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 13:42:12.625 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive) # Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:34056/solr/admin/info/system # at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:551) # at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193) # at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582) # at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481) # at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438) # at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158) # at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153) # Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target # at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131) # at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353) # at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296) # at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291) # at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357) # at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232) # at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175) # at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392) # at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443) # at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074) # at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061) # at java.base/java.security.AccessController.doPrivileged(Native Method) # at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008) # at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657) # at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102) # at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84) # at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314) # at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100) # at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558) # at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379) # at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146) # at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100) # at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53) # at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294) # at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128) # at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628) # at java.base/java.lang.Thread.run(Thread.java:829) # Suppressed: java.io.IOException: Broken pipe # at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138) # at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422) # at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275) # at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254) # at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386) # at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292) # at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243) # at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224) # at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821) # at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793) # at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161) # at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451) # at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117) # at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87) # ... 11 more # Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target # at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439) # at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306) # at java.base/sun.security.validator.Validator.validate(Validator.java:264) # at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313) # at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276) # at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141) # at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335) # ... 22 more # Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target # at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141) # at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126) # at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297) # at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434) # ... 28 more ok 64 SOLR-11740 check 'solr stop' connection in 28584ms ok 65 stop command for single port in 30661ms ok 66 status detects locally running solr in 14337ms ok 67 status does not expose cli parameters to end user in 209ms ok 68 listing out files in 2176ms ok 69 copying files around in 6510ms ok 70 upconfig in 2596ms ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1222ms ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1214ms ok 73 Cleanup in 1218ms > Task :solr:packaging:integrationTests FAILED FAILURE: Build failed with an exception. * Where: Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301 * What went wrong: Execution failed for task ':solr:packaging:integrationTests'. > Process 'command > '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished > with non-zero exit value 1 * Try: > Run with --stacktrace option to get the stack trace. > Run with --info or --debug option to get more log output. > Run with --scan to get full insights. > Get more help at https://help.gradle.org. BUILD FAILED in 24m 4s 673 actionable tasks: 673 executed [0m[?12l[?25h ------------------------------------------------------------------------ Build Failed: returned 1 Total time: 24m33.5s ------------------------------------------------------------------------ + status=1 + ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*' Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2) rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1682) [Receiver=3.1.3] rsync: [Receiver] write error: Broken pipe (32) + exit 1 Build step 'Execute shell' marked build as failure Archiving artifacts Recording test results [Checks API] No suitable checks publisher found. Email was triggered for: Failure - Any Sending email for trigger: Failure - Any
--------------------------------------------------------------------- To unsubscribe, e-mail: [email protected] For additional commands, e-mail: [email protected]
