Forgive the multiple posts. I am a nubie to the list server and it doesn't want to include the .log file. So, I renamed it to .txt and hopefully it works this time.
Dale ----- Original Message ----- From: "Dale McIntosh" <[EMAIL PROTECTED]> To: "Commons HttpClient Project" <[EMAIL PROTECTED]> Sent: Saturday, September 25, 2004 1:38 PM Subject: Re: Problems using AuthSSLProtocolSocketFactory to send Client Certificate in HTTPS session handshake > Sorry the log didn't get attached > > Dale > ----- Original Message ----- > From: "Dale McIntosh" <[EMAIL PROTECTED]> > To: <[EMAIL PROTECTED]> > Sent: Saturday, September 25, 2004 1:26 PM > Subject: Problems using AuthSSLProtocolSocketFactory to send Client > Certificate in HTTPS session handshake > > > > I have been trying for quite a wile to get the > AuthSSLProtocolSocketFactory > > to send a client certificate and it doesn't seem to be working. I am > > wondering if the server (Oracle single sign-on server) is requesting the > > client cert. When the request is made from a browser, the browser does > send > > the client cert. I have attached, my application, it is relatively simple > > and a debug log. The debug options I used were - > > javax.net.debug="ssl,handshake,keymanager". > > > > I have looked at the debug log and I do not see a certificate request. > > However, when IE is used, IE sends a client certificate. > > > > Any help would be appreciated. > > > > Thanks, > > Dale McIntosh > > > > > -------------------------------------------------------------------------- -- > ---- > > > > --------------------------------------------------------------------- > > To unsubscribe, e-mail: > [EMAIL PROTECTED] > > For additional commands, e-mail: > [EMAIL PROTECTED] > > ---------------------------------------------------------------------------- ---- > --------------------------------------------------------------------- > To unsubscribe, e-mail: [EMAIL PROTECTED] > For additional commands, e-mail: [EMAIL PROTECTED]
Host = training.testserver.com, , Port = -1 *** found key for : d2a7f47d3105d37daa523ef80afb1927_7b71fbce-dff3-42c2-9259-d2367eb8daa9 chain [0] = [ [ Version: V3 Subject: [EMAIL PROTECTED], CN=Thawte Freemail Member Signature Algorithm: MD5withRSA, OID = 1.2.840.113549.1.1.4 Key: SunJSSE RSA public key: public exponent: 010001 modulus: cbb8c9f4 64963972 d5fbdcde 61655f17 31b893f9 2dd0b411 26299e80 7cf3ca2c be81e9af d1ae5e30 acd0f248 7d51fa50 74c89474 dbc088d5 b6462e85 f5f1201b 54a2c943 882eeacf 82e50dd4 0426a248 b28a052b 72a6123c 2e340a32 92a23f18 d44a26bf 5be8fd63 e593e260 a5f59246 c3b4d5e2 2dd28c41 2e72f3cf 69d5677d Validity: [From: Fri Sep 10 09:29:47 PDT 2004, To: Sat Sep 10 09:29:47 PDT 2005] Issuer: CN=Thawte Personal Freemail Issuing CA, O=Thawte Consulting (Pty) Ltd., C=ZA SerialNumber: [ 0d04c7] Certificate Extensions: 2 [1]: ObjectId: 2.5.29.17 Criticality=false SubjectAlternativeName [ [RFC822Name: [EMAIL PROTECTED] [2]: ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:false PathLen: undefined ] ] Algorithm: [MD5withRSA] Signature: 0000: 12 AF 0E D6 47 04 C0 E2 ED E0 1F A6 37 00 F5 39 ....G.......7..9 0010: E1 22 54 CE 35 36 62 16 B2 C3 BB 4F E3 B0 53 A0 ."T.56b....O..S. 0020: A6 12 C1 77 E2 79 29 63 2C C4 72 AC 02 4D 99 A6 ...w.y)c,.r..M.. 0030: 31 A2 B2 EA 0B D1 48 7B A7 0F E3 97 01 39 D2 36 1.....H......9.6 0040: 41 9D 5E C2 66 57 8D 32 AB 13 6B 9E 42 A0 C6 D0 A.^.fW.2..k.B... 0050: 67 9F 12 20 02 5B 3C CF CE 76 4D D1 CD 8E 9B 6D g.. .[<..vM....m 0060: 9D C9 D2 B2 F4 F4 93 03 76 CC 7D 08 C1 24 EE DE ........v....$.. 0070: DC 3F EF 8B ED 24 F4 CB 78 1F 55 A3 9E 63 17 FD .?...$..x.U..c.. ] *** adding as trusted cert: Subject: CN=training.testserver.mil, ****Removed**** Issuer: ****Removed**** Algorithm: RSA; Serial number: 0x14b3a Valid from Thu Jul 29 13:24:29 PDT 2004 until Mon Jul 30 13:24:29 PDT 2007 adding as trusted cert: Subject: CN=www.testserver.com, ****Removed**** Issuer: ****Removed**** Algorithm: RSA; Serial number: 0x16781 Valid from Fri Aug 27 17:23:29 PDT 2004 until Tue Aug 28 17:23:29 PDT 2007 trigger seeding of SecureRandom done seeding SecureRandom setSoTimeout(0) called setSoTimeout(0) called %% No cached client session *** ClientHello, TLSv1 RandomCookie: GMT: 1096032192 bytes = { 50, 189, 35, 73, 156, 109, 92, 71, 163, 110, 142, 93, 50, 67, 211, 217, 133, 117, 203, 97, 78, 144, 7, 214, 191, 90, 14, 182 } Session ID: {} Cipher Suites: [SSL_RSA_WITH_RC4_128_MD5, SSL_RSA_WITH_RC4_128_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_DES_CBC_SHA, SSL_DHE_RSA_WITH_DES_CBC_SHA, SSL_DHE_DSS_WITH_DES_CBC_SHA, SSL_RSA_EXPORT_WITH_RC4_40_MD5, SSL_RSA_EXPORT_WITH_DES40_CBC_SHA, SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA, SSL_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA] Compression Methods: { 0 } *** main, WRITE: TLSv1 Handshake, length = 73 main, WRITE: SSLv2 client hello message, length = 98 main, READ: SSLv3 Handshake, length = 58 *** ServerHello, SSLv3 RandomCookie: GMT: 1096031998 bytes = { 250, 12, 41, 15, 44, 68, 83, 138, 127, 197, 36, 15, 48, 9, 155, 75, 82, 160, 9, 50, 168, 36, 181, 170, 138, 232, 105, 110 } Session ID: {188, 114, 29, 102, 45, 132, 225, 115, 133, 127, 142, 213, 97, 20, 219, 31} Cipher Suite: SSL_RSA_WITH_3DES_EDE_CBC_SHA Compression Method: 0 *** %% Created: [Session-1, SSL_RSA_WITH_3DES_EDE_CBC_SHA] ** SSL_RSA_WITH_3DES_EDE_CBC_SHA main, READ: SSLv3 Handshake, length = 2680 *** Certificate chain chain [0] = [ [ Version: V3 Subject: CN=training.testserver.com, ****Removed**** Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5 Key: SunJSSE RSA public key: public exponent: 010001 modulus: a492f678 9edfe880 9b843f59 a0a386e2 781db4fb 0253e22e 07110d45 a76f6575 a3925eda f2067e55 43488207 4d2c4cc9 3eb52bf0 756b1fd6 b86bd56a 9ddc1232 f8ec0b85 56a39a39 7cfe0287 a7fce7ea f6b522c2 87157023 4fd7c518 2ee83036 1344f856 f67caa5f d77ec6f1 83db946d 858ffd0b 65063ee7 c7e9dd9a 15dc3d57 Validity: [From: Thu Jul 29 13:24:29 PDT 2004, To: Mon Jul 30 13:24:29 PDT 2007] Issuer: ****Removed**** SerialNumber: [ 014b3a] Certificate Extensions: 6 [1]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 63 88 3A 0C 0A 70 4A 4D 5E 09 D5 24 76 C3 88 3A c.:..pJM^..$v..: 0010: 9A 30 66 19 .0f. ] ] [2]: ObjectId: 2.5.29.18 Criticality=false IssuerAlternativeName [ [URIName:****Removed****]] [3]: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: 02 C5 1F 43 11 73 60 32 37 3E E6 47 86 29 DE 21 ...C.s`27>.G.).! 0010: B6 72 66 23 .rf# ] ] [4]: ObjectId: 2.5.29.31 Criticality=false CRLDistributionPoints [ [DistributionPoint: [URIName: ****Removed****] ]] [5]: ObjectId: 2.5.29.32 Criticality=false CertificatePolicies [ [CertificatePolicyId: [2.16.840.1.101.2.1.11.5] [] ] ] [6]: ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_Encipherment ] ] Algorithm: [SHA1withRSA] Signature: 0000: 5A 92 42 6D 1A 11 86 9A 5B 71 D2 32 53 BC FA 21 Z.Bm....[q.2S..! 0010: 07 4C 76 A2 FF 97 43 C1 72 16 0E 09 D8 D4 87 8C .Lv...C.r....... 0020: E7 3A BB 09 D2 AF 72 70 2E 9C 13 D3 F4 A8 08 EA .:....rp........ 0030: 23 F4 C9 81 B1 13 07 57 8F D9 51 47 5A D9 15 70 #......W..QGZ..p 0040: A3 7B 21 D4 6F 69 57 00 D4 83 3D B2 40 59 97 4E [EMAIL PROTECTED] 0050: 76 16 93 62 A9 A3 88 02 65 01 08 81 F8 75 0C AD v..b....e....u.. 0060: FC BF 02 FA 69 41 5D 8D 60 70 49 9D 14 11 C3 23 ....iA].`pI....# 0070: EA 6F 17 6A FA BD D3 78 68 3B BC 60 54 82 A2 98 .o.j...xh;.`T... ] chain [1] = [ [ Version: V3 Subject: ****Removed**** Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5 Key: SunJSSE RSA public key: public exponent: 010001 modulus: bc04a424 4fafcab8 3ca8b8af 27ec0940 caf672d4 a02899dd dc97ff67 7667a13a 883efaa5 ceec575f 238f8adc c52a9ba4 c50bf396 a6dbed0f 0181b3f2 caa1ad0b 8da2032f 0ca08c6f e439046b cc770ac6 7a6896e9 9624cd9e 5496404f 875f2145 372df596 3e899a26 07c05546 073386f2 a171ed3f 5609282d 06cc5782 49970ed5 Validity: [From: Wed Jun 04 03:12:06 PDT 2003, To: Tue Jun 02 03:12:06 PDT 2009] Issuer:****Removed**** SerialNumber: [ 24] Certificate Extensions: 8 [1]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 02 C5 1F 43 11 73 60 32 37 3E E6 47 86 29 DE 21 ...C.s`27>.G.).! 0010: B6 72 66 23 .rf# ] ] [2]: ObjectId: 2.5.29.18 Criticality=false IssuerAlternativeName [ [URIName: ****Removed****]] [3]: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: 6C 9C A5 F0 5C 8F 6D 41 8D C4 17 3B 90 57 C2 0F l...\.mA...;.W.. 0010: A3 CD 6D FE ..m. ] ] [4]: ObjectId: 2.5.29.31 Criticality=false CRLDistributionPoints [ [DistributionPoint: [URIName: ****Removed****] ]] [5]: ObjectId: 2.5.29.36 Criticality=false PolicyConstraints: [ Require: 0; Inhibit: unspecified ] [6]: ObjectId: 2.5.29.32 Criticality=false CertificatePolicies [ [CertificatePolicyId: [2.16.840.1.101.2.1.11.5] [] ] [CertificatePolicyId: [2.16.840.1.101.2.1.11.9] [] ] [CertificatePolicyId: [2.16.840.1.101.2.1.11.10] [] ] ] [7]: ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_CertSign Crl_Sign ] [8]: ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:true PathLen:2147483647 ] ] Algorithm: [SHA1withRSA] Signature: 0000: B4 EA 8C 4C 69 79 99 D2 F7 56 9D 84 A0 89 8B AA ...Liy...V...... 0010: F1 D3 A4 5D A7 3A A9 CC 16 7C 78 4F CC E2 8D 71 ...].:....xO...q 0020: FC 8F 4F DB 1C 8D 34 00 86 D8 25 E5 60 CB D6 32 ..O...4...%.`..2 0030: 2F 3D D7 B3 11 19 5A F7 32 C1 34 6A D1 79 0B B3 /=....Z.2.4j.y.. 0040: C1 2D CA 07 44 EA 56 4D 24 0D CF C7 71 67 3E 60 .-..D.VM$...qg>` 0050: 53 C1 A5 D3 0D A1 80 EB DE 5C 7A 6A 7A EC BF 39 S........\zjz..9 0060: 6E FC 66 D8 85 57 9E BF 75 8B A9 25 55 CC D8 F7 n.f..W..u..%U... 0070: 43 29 71 60 54 C0 17 8A F2 9C 4F 76 C7 2A D9 89 C)q`T.....Ov.*.. ] chain [2] = [ [ Version: V3 Subject:****Removed**** Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5 Key: SunJSSE RSA public key: public exponent: 010001 modulus: b530fe64 beeacc6d ed812cf7 7fe919ba 0e696a28 e1a9a9cb 95581ff1 e69a6953 e0883f91 c551b963 97a8e621 8c135e36 3ca857fa f8702c4c 6acbbf30 a74c16e4 325cf812 b051f816 578d2fb4 4dfa2ea8 94e82a61 d4570d47 ce6e2c2f 7e9867cc 0008abb6 961635c2 8591e55b a00ac766 5262f361 759517ae bc2a5629 a5e02b53 Validity: [From: Fri May 19 06:13:00 PDT 2000, To: Thu May 14 06:13:00 PDT 2020] Issuer:****Removed**** SerialNumber: [ 04] Certificate Extensions: 2 [1]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 6C 9C A5 F0 5C 8F 6D 41 8D C4 17 3B 90 57 C2 0F l...\.mA...;.W.. 0010: A3 CD 6D FE ..m. ] ] [2]: ObjectId: 2.5.29.19 Criticality=false BasicConstraints:[ CA:true PathLen:2147483647 ] ] Algorithm: [SHA1withRSA] Signature: 0000: AF 71 44 F9 97 23 CC 68 69 8C 43 07 41 BA 88 20 .qD..#.hi.C.A.. 0010: B3 22 00 41 C8 98 A0 55 1C CD 3F 6E B1 93 5C AD .".A...U..?n..\. 0020: FA 18 9A BB 1C 73 6F FD 24 42 8F 87 9F 51 CF BE .....so.$B...Q.. 0030: 86 9F E9 D7 8A 48 4F 08 D9 69 94 AC 3F E6 0F 2D .....HO..i..?..- 0040: 97 0F 28 93 76 4F 62 DF FF A0 CD 61 F8 A6 86 0C ..(.vOb....a.... 0050: 31 34 20 DC 7F 2F A8 FB 39 BE 95 EE 38 59 02 62 14 ../..9...8Y.b 0060: C1 DE 6C 15 4F E0 DF 9D BB E4 79 73 24 FD 63 64 ..l.O.....ys$.cd 0070: 95 F7 4A A8 99 1F 48 65 95 C7 7B BF 78 32 E7 7A ..J...He....x2.z ] *** Sep 24, 2004 6:27:28 AM org.apache.commons.httpclient.contrib.ssl.AuthSSLX509TrustManager isServerTrusted INFO: Server certificate 1: Sep 24, 2004 6:27:28 AM org.apache.commons.httpclient.contrib.ssl.AuthSSLX509TrustManager isServerTrusted INFO: Subject DN: CN=training.testserver.com, ****Removed**** Sep 24, 2004 6:27:28 AM org.apache.commons.httpclient.contrib.ssl.AuthSSLX509TrustManager isServerTrusted INFO: Signature Algorithm: SHA1withRSA Sep 24, 2004 6:27:28 AM org.apache.commons.httpclient.contrib.ssl.AuthSSLX509TrustManager isServerTrusted INFO: Valid from: Thu Jul 29 13:24:29 PDT 2004 Sep 24, 2004 6:27:28 AM org.apache.commons.httpclient.contrib.ssl.AuthSSLX509TrustManager isServerTrusted INFO: Valid until: Mon Jul 30 13:24:29 PDT 2007 Sep 24, 2004 6:27:28 AM org.apache.commons.httpclient.contrib.ssl.AuthSSLX509TrustManager isServerTrusted INFO: Issuer: ****Removed**** Sep 24, 2004 6:27:28 AM org.apache.commons.httpclient.contrib.ssl.AuthSSLX509TrustManager isServerTrusted INFO: Server certificate 2: Sep 24, 2004 6:27:28 AM org.apache.commons.httpclient.contrib.ssl.AuthSSLX509TrustManager isServerTrusted INFO: Subject DN: ****Removed**** Sep 24, 2004 6:27:28 AM org.apache.commons.httpclient.contrib.ssl.AuthSSLX509TrustManager isServerTrusted INFO: Signature Algorithm: SHA1withRSA Sep 24, 2004 6:27:28 AM org.apache.commons.httpclient.contrib.ssl.AuthSSLX509TrustManager isServerTrusted INFO: Valid from: Wed Jun 04 03:12:06 PDT 2003 Sep 24, 2004 6:27:28 AM org.apache.commons.httpclient.contrib.ssl.AuthSSLX509TrustManager isServerTrusted INFO: Valid until: Tue Jun 02 03:12:06 PDT 2009 Sep 24, 2004 6:27:28 AM org.apache.commons.httpclient.contrib.ssl.AuthSSLX509TrustManager isServerTrusted INFO: Issuer:****Removed**** Sep 24, 2004 6:27:28 AM org.apache.commons.httpclient.contrib.ssl.AuthSSLX509TrustManager isServerTrusted INFO: Server certificate 3: Sep 24, 2004 6:27:28 AM org.apache.commons.httpclient.contrib.ssl.AuthSSLX509TrustManager isServerTrusted INFO: Subject DN:****Removed**** Sep 24, 2004 6:27:28 AM org.apache.commons.httpclient.contrib.ssl.AuthSSLX509TrustManager isServerTrusted INFO: Signature Algorithm: SHA1withRSA Sep 24, 2004 6:27:28 AM org.apache.commons.httpclient.contrib.ssl.AuthSSLX509TrustManager isServerTrusted INFO: Valid from: Fri May 19 06:13:00 PDT 2000 Sep 24, 2004 6:27:28 AM org.apache.commons.httpclient.contrib.ssl.AuthSSLX509TrustManager isServerTrusted INFO: Valid until: Thu May 14 06:13:00 PDT 2020 Sep 24, 2004 6:27:28 AM org.apache.commons.httpclient.contrib.ssl.AuthSSLX509TrustManager isServerTrusted INFO: Issuer:****Removed**** Found trusted certificate: [ [ Version: V3 Subject: CN=training.testserver.com, ****Removed**** Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5 Key: SunJSSE RSA public key: public exponent: 010001 modulus: a492f678 9edfe880 9b843f59 a0a386e2 781db4fb 0253e22e 07110d45 a76f6575 a3925eda f2067e55 43488207 4d2c4cc9 3eb52bf0 756b1fd6 b86bd56a 9ddc1232 f8ec0b85 56a39a39 7cfe0287 a7fce7ea f6b522c2 87157023 4fd7c518 2ee83036 1344f856 f67caa5f d77ec6f1 83db946d 858ffd0b 65063ee7 c7e9dd9a 15dc3d57 Validity: [From: Thu Jul 29 13:24:29 PDT 2004, To: Mon Jul 30 13:24:29 PDT 2007] Issuer: ****Removed**** SerialNumber: [ 014b3a] Certificate Extensions: 6 [1]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 63 88 3A 0C 0A 70 4A 4D 5E 09 D5 24 76 C3 88 3A c.:..pJM^..$v..: 0010: 9A 30 66 19 .0f. ] ] [2]: ObjectId: 2.5.29.18 Criticality=false IssuerAlternativeName [ [URIName:****Removed****]] [3]: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: 02 C5 1F 43 11 73 60 32 37 3E E6 47 86 29 DE 21 ...C.s`27>.G.).! 0010: B6 72 66 23 .rf# ] ] [4]: ObjectId: 2.5.29.31 Criticality=false CRLDistributionPoints [ [DistributionPoint: [URIName: ****Removed****] ]] [5]: ObjectId: 2.5.29.32 Criticality=false CertificatePolicies [ [CertificatePolicyId: [2.16.840.1.101.2.1.11.5] [] ] ] [6]: ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_Encipherment ] ] Algorithm: [SHA1withRSA] Signature: 0000: 5A 92 42 6D 1A 11 86 9A 5B 71 D2 32 53 BC FA 21 Z.Bm....[q.2S..! 0010: 07 4C 76 A2 FF 97 43 C1 72 16 0E 09 D8 D4 87 8C .Lv...C.r....... 0020: E7 3A BB 09 D2 AF 72 70 2E 9C 13 D3 F4 A8 08 EA .:....rp........ 0030: 23 F4 C9 81 B1 13 07 57 8F D9 51 47 5A D9 15 70 #......W..QGZ..p 0040: A3 7B 21 D4 6F 69 57 00 D4 83 3D B2 40 59 97 4E [EMAIL PROTECTED] 0050: 76 16 93 62 A9 A3 88 02 65 01 08 81 F8 75 0C AD v..b....e....u.. 0060: FC BF 02 FA 69 41 5D 8D 60 70 49 9D 14 11 C3 23 ....iA].`pI....# 0070: EA 6F 17 6A FA BD D3 78 68 3B BC 60 54 82 A2 98 .o.j...xh;.`T... ] main, READ: SSLv3 Handshake, length = 4 *** ServerHelloDone JsseJCE: Using JSSE internal implementation for cipher RSA/ECB/PKCS1Padding *** ClientKeyExchange, RSA PreMasterSecret, SSLv3 Random Secret: { 3, 0, 236, 50, 218, 190, 230, 21, 151, 98, 106, 76, 42, 36, 135, 25, 223, 143, 250, 212, 250, 36, 236, 88, 172, 19, 45, 75, 124, 254, 236, 117, 114, 168, 163, 192, 115, 157, 241, 103, 102, 231, 231, 168, 146, 202, 67, 192 } main, WRITE: SSLv3 Handshake, length = 132 SESSION KEYGEN: PreMaster Secret: 0000: 03 00 EC 32 DA BE E6 15 97 62 6A 4C 2A 24 87 19 ...2.....bjL*$.. 0010: DF 8F FA D4 FA 24 EC 58 AC 13 2D 4B 7C FE EC 75 .....$.X..-K...u 0020: 72 A8 A3 C0 73 9D F1 67 66 E7 E7 A8 92 CA 43 C0 r...s..gf.....C. CONNECTION KEYGEN: Client Nonce: 0000: 41 54 20 C0 32 BD 23 49 9C 6D 5C 47 A3 6E 8E 5D AT .2.#I.m\G.n.] 0010: 32 43 D3 D9 85 75 CB 61 4E 90 07 D6 BF 5A 0E B6 2C...u.aN....Z.. Server Nonce: 0000: 41 54 1F FE FA 0C 29 0F 2C 44 53 8A 7F C5 24 0F AT....).,DS...$. 0010: 30 09 9B 4B 52 A0 09 32 A8 24 B5 AA 8A E8 69 6E 0..KR..2.$....in Master Secret: 0000: 07 78 78 1F 09 DE 09 94 FD C1 D7 50 16 EF 3E 71 .xx........P..>q 0010: 55 63 AB 2C 9E 5E BE CE FC 3A F6 6E 0B 78 F8 DA Uc.,.^...:.n.x.. 0020: 81 8A 82 A4 AF 98 4F C4 53 29 39 80 20 A1 B8 BB ......O.S)9. ... Client MAC write Secret: 0000: BF AF 8C 42 38 97 90 75 B0 01 1E E8 E7 39 56 A9 ...B8..u.....9V. 0010: 0D EA 57 B3 ..W. Server MAC write Secret: 0000: 39 DC 51 87 AF 54 1D 41 00 09 08 53 AF 60 CB D5 9.Q..T.A...S.`.. 0010: A8 9A 44 FE ..D. Client write key: 0000: 9A 14 13 7D 15 B1 BF DF 44 0A 5B FA 75 B8 16 20 ........D.[.u.. 0010: 4B AE 84 D3 FC C3 27 1A K.....'. Server write key: 0000: EA 41 68 61 31 FA 03 74 24 AD 44 76 8A 64 29 F9 .Aha1..t$.Dv.d). 0010: C3 24 CE 4D 5E 3C 02 33 .$.M^<.3 Client write IV: 0000: 67 7A D7 13 35 42 11 47 gz..5B.G Server write IV: 0000: 87 31 3D D9 44 97 EF F5 .1=.D... main, WRITE: SSLv3 Change Cipher Spec, length = 1 JsseJCE: Using JSSE internal implementation for cipher DESede/CBC/NoPadding *** Finished verify_data: { 72, 115, 58, 111, 170, 49, 30, 10, 67, 74, 78, 110, 251, 86, 111, 130, 142, 54, 213, 29, 121, 141, 16, 78, 175, 109, 145, 29, 6, 107, 133, 173, 114, 39, 106, 193 } *** main, WRITE: SSLv3 Handshake, length = 64 main, READ: SSLv3 Change Cipher Spec, length = 1 JsseJCE: Using JSSE internal implementation for cipher DESede/CBC/NoPadding main, READ: SSLv3 Handshake, length = 64 *** Finished verify_data: { 174, 197, 250, 111, 79, 125, 29, 137, 142, 43, 125, 190, 111, 200, 245, 140, 222, 198, 137, 26, 220, 155, 194, 161, 206, 52, 96, 90, 143, 124, 249, 4, 244, 56, 72, 185 } *** %% Cached client session: [Session-1, SSL_RSA_WITH_3DES_EDE_CBC_SHA] main, WRITE: SSLv3 Application Data, length = 168 main, READ: SSLv3 Application Data, length = 1120 Response String : <html> <meta http-equiv="pragma" content="no-cache"> <meta http-equiv="expires" content="Sat, 11 Jul 1970 17:55:19 PST"> <body onload="document.SsoServerForm.submit()"> <form method=post action="https://trainingsso.testserver.com/pls/orasso/orasso.wwsso_app_admin.ls_login" name="SsoServerForm"> <input type=hidden name="Site2pstoreToken" value="v1.2~1324~36706AE50820A164D16C6EB33017CFC6FAC4ACFD3E69862C45697599AE1CB856FDFB16BE475A9E4A433681F82B4E1175DE43979864501B93E8386895BF95D181CFB9550200AE0760C3DD8A28A11D696462A5A74ADE57C5CBECAC62F6A69E08EB5B9DF8250AB74E686650F51AC4A9BF6EBDF0D45DB0E1C0E1DD2B197F3E143B680C6EA744CBB7120A2AFD25CC3285CC19442A2E288EF6A15796AD8D3C59A053DD1B7D211ED76CA4E1454A8E63C27738F46CE646926F47258C8952F5A59853A21FF9F2C4C0A7739D1B6C2E3C218F9EA97FD214526358F8A4E091D98B22E67F4897"> </form> </body> </html> setSoTimeout(0) called main, WRITE: SSLv3 Application Data, length = 272 main, WRITE: SSLv3 Application Data, length = 272 main, WRITE: SSLv3 Application Data, length = 4120 main, WRITE: SSLv3 Application Data, length = 4120 main, WRITE: SSLv3 Application Data, length = 4120 main, WRITE: SSLv3 Application Data, length = 4120 main, WRITE: SSLv3 Application Data, length = 576 main, READ: SSLv3 Application Data, length = 864 Sep 24, 2004 6:27:29 AM org.apache.commons.httpclient.HttpMethodBase getResponseBody WARNING: Going to buffer response body of large or unknown size. Using getResponseAsStream instead is recommended. main, called close() main, called closeInternal(true) main, SEND SSLv3 ALERT: warning, description = close_notify main, WRITE: SSLv3 Alert, length = 24 Exception sending event file
--------------------------------------------------------------------- To unsubscribe, e-mail: [EMAIL PROTECTED] For additional commands, e-mail: [EMAIL PROTECTED]