Skip to Main Content

Java Security

Announcement

For appeals, questions and feedback about Oracle Forums, please email oracle-forums-moderators_us@oracle.com. Technical questions should be asked in the appropriate category. Thank you!

Interested in getting your voice heard by members of the Developer Marketing team at Oracle? Check out this post for AppDev or this post for AI focus group information.

javax.net.ssl.SSLHandshakeException: null cert chain

843811Jan 24 2004 — edited Jun 2 2004
I have tried practically everything and i still can't get a ssl client and server to properly connect. When running both with debug turned on, i get the following errors:

On Server:

mac:~/Desktop/SO_ssl/Servidor espectro$ java -Djavax.net.debug=ssl:handshake Servidor &
[2] 1876
mac:~/Desktop/SO_ssl/Servidor espectro$ ***
found key for : espectro
chain [0] = [
[
Version: V1
Subject: CN=mac, OU=licom, O=luz, L=maracaibo, ST=zulia, C=ve
Signature Algorithm: MD5withRSA, OID = 1.2.840.113549.1.1.4

Key: com.sun.net.ssl.internal.ssl.JSA_RSAPublicKey@fffffd0c
Validity: [From: Sat Jan 24 17:35:35 VET 2004,
To: Fri Apr 23 17:35:35 VET 2004]
Issuer: CN=mac, OU=licom, O=luz, L=maracaibo, ST=zulia, C=ve
SerialNumber: [ 4012e527]

]
Algorithm: [MD5withRSA]
Signature:
0000: BC 98 8D C5 D7 95 43 8B AD FC CE 4F 68 0B 47 7F ......C....Oh.G.
0010: 0B 53 03 90 FC 42 B5 BC 11 F2 6F 55 49 FD 8C EA .S...B....oUI...
0020: 5C 8D A3 56 09 B3 C1 A1 D7 86 01 BD 8E 06 C0 C8 \..V............
0030: FD E3 DE 2B C1 75 BE 63 2D 4A AD B4 83 9D C5 DD ...+.u.c-J......
0040: E9 D5 EB EF A0 B0 C9 18 DF A7 2E 6D CF 97 67 8C ...........m..g.
0050: BA 4F 81 66 8E B4 EF 50 0A 13 C5 57 A8 A2 28 28 .O.f...P...W..((
0060: F7 94 26 5E 3A 00 A8 C0 C1 7E BE B9 68 2D 44 C4 ..&^:.......h-D.
0070: 62 E9 CC 67 EC 71 C9 08 6B 11 95 81 CC 83 4D 59 b..g.q..k.....MY

]
***
trustStore is: /System/Library/Frameworks/JavaVM.framework/Versions/1.4.1/Home/lib/security/jssecacerts
trustStore type is : jks
init truststore
adding as trusted cert: [
[
Version: V1
Subject: CN=mac, OU=licom, O=luz, L=maracaibo, ST=zulia, C=ve
Signature Algorithm: MD5withRSA, OID = 1.2.840.113549.1.1.4

Key: com.sun.net.ssl.internal.ssl.JSA_RSAPublicKey@fffffd0c
Validity: [From: Sat Jan 24 17:35:35 VET 2004,
To: Fri Apr 23 17:35:35 VET 2004]
Issuer: CN=mac, OU=licom, O=luz, L=maracaibo, ST=zulia, C=ve
SerialNumber: [ 4012e527]

]
Algorithm: [MD5withRSA]
Signature:
0000: BC 98 8D C5 D7 95 43 8B AD FC CE 4F 68 0B 47 7F ......C....Oh.G.
0010: 0B 53 03 90 FC 42 B5 BC 11 F2 6F 55 49 FD 8C EA .S...B....oUI...
0020: 5C 8D A3 56 09 B3 C1 A1 D7 86 01 BD 8E 06 C0 C8 \..V............
0030: FD E3 DE 2B C1 75 BE 63 2D 4A AD B4 83 9D C5 DD ...+.u.c-J......
0040: E9 D5 EB EF A0 B0 C9 18 DF A7 2E 6D CF 97 67 8C ...........m..g.
0050: BA 4F 81 66 8E B4 EF 50 0A 13 C5 57 A8 A2 28 28 .O.f...P...W..((
0060: F7 94 26 5E 3A 00 A8 C0 C1 7E BE B9 68 2D 44 C4 ..&^:.......h-D.
0070: 62 E9 CC 67 EC 71 C9 08 6B 11 95 81 CC 83 4D 59 b..g.q..k.....MY

]
trigger seeding of SecureRandom
done seeding SecureRandom
matching alias: espectro
main, READ: SSL v2, contentType = Handshake, translated length = 59
*** ClientHello, TLSv1
RandomCookie: GMT: 1074915046 bytes = { 121, 88, 98, 182, 185, 11, 92, 54, 180, 170, 54, 77, 159, 136, 69, 67, 161, 208, 77, 81, 155, 154, 74, 40, 90, 124, 139, 153 }
Session ID: {}
Cipher Suites: [SSL_RSA_WITH_RC4_128_MD5, SSL_RSA_WITH_RC4_128_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_DES_CBC_SHA, SSL_DHE_DSS_WITH_DES_CBC_SHA, SSL_RSA_EXPORT_WITH_RC4_40_MD5, SSL_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA]
Compression Methods: { 0 }
***
%% Created: [Session-1, SSL_RSA_WITH_RC4_128_MD5]
*** ServerHello, TLSv1
RandomCookie: GMT: 1074915046 bytes = { 29, 173, 20, 101, 141, 67, 83, 33, 68, 55, 151, 159, 66, 16, 198, 175, 224, 68, 26, 163, 193, 250, 77, 54, 248, 223, 140, 183 }
Session ID: {64, 18, 231, 230, 221, 214, 126, 219, 101, 121, 242, 59, 237, 14, 239, 31, 15, 72, 42, 172, 187, 118, 138, 222, 109, 13, 214, 116, 42, 222, 229, 67}
Cipher Suite: SSL_RSA_WITH_RC4_128_MD5
Compression Method: 0
***
Cipher suite: SSL_RSA_WITH_RC4_128_MD5
*** Certificate chain
chain [0] = [
[
Version: V1
Subject: CN=mac, OU=licom, O=luz, L=maracaibo, ST=zulia, C=ve
Signature Algorithm: MD5withRSA, OID = 1.2.840.113549.1.1.4

Key: com.sun.net.ssl.internal.ssl.JSA_RSAPublicKey@fffffd0c
Validity: [From: Sat Jan 24 17:35:35 VET 2004,
To: Fri Apr 23 17:35:35 VET 2004]
Issuer: CN=mac, OU=licom, O=luz, L=maracaibo, ST=zulia, C=ve
SerialNumber: [ 4012e527]

]
Algorithm: [MD5withRSA]
Signature:
0000: BC 98 8D C5 D7 95 43 8B AD FC CE 4F 68 0B 47 7F ......C....Oh.G.
0010: 0B 53 03 90 FC 42 B5 BC 11 F2 6F 55 49 FD 8C EA .S...B....oUI...
0020: 5C 8D A3 56 09 B3 C1 A1 D7 86 01 BD 8E 06 C0 C8 \..V............
0030: FD E3 DE 2B C1 75 BE 63 2D 4A AD B4 83 9D C5 DD ...+.u.c-J......
0040: E9 D5 EB EF A0 B0 C9 18 DF A7 2E 6D CF 97 67 8C ...........m..g.
0050: BA 4F 81 66 8E B4 EF 50 0A 13 C5 57 A8 A2 28 28 .O.f...P...W..((
0060: F7 94 26 5E 3A 00 A8 C0 C1 7E BE B9 68 2D 44 C4 ..&^:.......h-D.
0070: 62 E9 CC 67 EC 71 C9 08 6B 11 95 81 CC 83 4D 59 b..g.q..k.....MY

]
***
*** CertificateRequest
Cert Types: RSA, DSS,
Cert Authorities:
<CN=mac, OU=licom, O=luz, L=maracaibo, ST=zulia, C=ve>
*** ServerHelloDone
main, WRITE: TLSv1 Handshake, length = 754
main, READ: TLSv1 Handshake, length = 141
*** Certificate chain
***
main, SEND TLSv1 ALERT: fatal, description = bad_certificate
main, WRITE: TLSv1 Alert, length = 2
main, called closeSocket()
main, handling exception: javax.net.ssl.SSLHandshakeException: null cert chain
javax.net.ssl.SSLHandshakeException: null cert chain
at com.sun.net.ssl.internal.ssl.BaseSSLSocketImpl.a(DashoA6275)
at com.sun.net.ssl.internal.ssl.SSLSocketImpl.a(DashoA6275)
at com.sun.net.ssl.internal.ssl.SSLSocketImpl.a(DashoA6275)
at com.sun.net.ssl.internal.ssl.SunJSSE_aw.a(DashoA6275)
at com.sun.net.ssl.internal.ssl.SunJSSE_aw.a(DashoA6275)
at com.sun.net.ssl.internal.ssl.SunJSSE_ax.a(DashoA6275)
at com.sun.net.ssl.internal.ssl.SSLSocketImpl.a(DashoA6275)
at com.sun.net.ssl.internal.ssl.SSLSocketImpl.j(DashoA6275)
at com.sun.net.ssl.internal.ssl.SSLSocketImpl.a(DashoA6275)
at com.sun.net.ssl.internal.ssl.AppInputStream.read(DashoA6275)
at sun.nio.cs.StreamDecoder$CharsetSD.readBytes(StreamDecoder.java:406)
at sun.nio.cs.StreamDecoder$CharsetSD.implRead(StreamDecoder.java:446)
at sun.nio.cs.StreamDecoder.read(StreamDecoder.java:180)
at java.io.InputStreamReader.read(InputStreamReader.java:167)
at java.io.BufferedReader.fill(BufferedReader.java:136)
at java.io.BufferedReader.readLine(BufferedReader.java:299)
at java.io.BufferedReader.readLine(BufferedReader.java:362)
at Servidor.main(Servidor.java:323)
main, called close()
main, called closeInternal(true)

mac:~/Desktop/SO_ssl/Servidor espectro$


-----------------------------------------------------------------------------------------------------------------------------
On Client:

mac:~/Desktop/SO_ssl/Cliente espectro$ java -Djavax.net.debug=ssl:handshake Cliente &
[1] 1878
mac:~/Desktop/SO_ssl/Cliente espectro$ 2004-01-24 17:47:13.611 java[1878] Java couldn't paint in Java_apple_awt_CRenderer_doRect, no focused view.
keyStore is :
keyStore type is : jks
init keystore
init keymanager of type SunX509
trustStore is: /System/Library/Frameworks/JavaVM.framework/Versions/1.4.1/Home/lib/security/jssecacerts
trustStore type is : jks
init truststore
adding as trusted cert: [
[
Version: V1
Subject: CN=mac, OU=licom, O=luz, L=maracaibo, ST=zulia, C=ve
Signature Algorithm: MD5withRSA, OID = 1.2.840.113549.1.1.4

Key: com.sun.net.ssl.internal.ssl.JSA_RSAPublicKey@fffffd0c
Validity: [From: Sat Jan 24 17:35:35 VET 2004,
To: Fri Apr 23 17:35:35 VET 2004]
Issuer: CN=mac, OU=licom, O=luz, L=maracaibo, ST=zulia, C=ve
SerialNumber: [ 4012e527]

]
Algorithm: [MD5withRSA]
Signature:
0000: BC 98 8D C5 D7 95 43 8B AD FC CE 4F 68 0B 47 7F ......C....Oh.G.
0010: 0B 53 03 90 FC 42 B5 BC 11 F2 6F 55 49 FD 8C EA .S...B....oUI...
0020: 5C 8D A3 56 09 B3 C1 A1 D7 86 01 BD 8E 06 C0 C8 \..V............
0030: FD E3 DE 2B C1 75 BE 63 2D 4A AD B4 83 9D C5 DD ...+.u.c-J......
0040: E9 D5 EB EF A0 B0 C9 18 DF A7 2E 6D CF 97 67 8C ...........m..g.
0050: BA 4F 81 66 8E B4 EF 50 0A 13 C5 57 A8 A2 28 28 .O.f...P...W..((
0060: F7 94 26 5E 3A 00 A8 C0 C1 7E BE B9 68 2D 44 C4 ..&^:.......h-D.
0070: 62 E9 CC 67 EC 71 C9 08 6B 11 95 81 CC 83 4D 59 b..g.q..k.....MY

]
init context
trigger seeding of SecureRandom
done seeding SecureRandom
%% No cached client session
*** ClientHello, TLSv1
RandomCookie: GMT: 1074915046 bytes = { 121, 88, 98, 182, 185, 11, 92, 54, 180, 170, 54, 77, 159, 136, 69, 67, 161, 208, 77, 81, 155, 154, 74, 40, 90, 124, 139, 153 }
Session ID: {}
Cipher Suites: [SSL_RSA_WITH_RC4_128_MD5, SSL_RSA_WITH_RC4_128_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_DES_CBC_SHA, SSL_DHE_DSS_WITH_DES_CBC_SHA, SSL_RSA_EXPORT_WITH_RC4_40_MD5, SSL_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA]
Compression Methods: { 0 }
***
AWT-EventQueue-0, WRITE: TLSv1 Handshake, length = 59
AWT-EventQueue-0, WRITE: SSLv2 client hello message, length = 77
AWT-EventQueue-0, READ: TLSv1 Handshake, length = 754
*** ServerHello, TLSv1
RandomCookie: GMT: 1074915046 bytes = { 29, 173, 20, 101, 141, 67, 83, 33, 68, 55, 151, 159, 66, 16, 198, 175, 224, 68, 26, 163, 193, 250, 77, 54, 248, 223, 140, 183 }
Session ID: {64, 18, 231, 230, 221, 214, 126, 219, 101, 121, 242, 59, 237, 14, 239, 31, 15, 72, 42, 172, 187, 118, 138, 222, 109, 13, 214, 116, 42, 222, 229, 67}
Cipher Suite: SSL_RSA_WITH_RC4_128_MD5
Compression Method: 0
***
%% Created: [Session-1, SSL_RSA_WITH_RC4_128_MD5]
** SSL_RSA_WITH_RC4_128_MD5
*** Certificate chain
chain [0] = [
[
Version: V1
Subject: CN=mac, OU=licom, O=luz, L=maracaibo, ST=zulia, C=ve
Signature Algorithm: MD5withRSA, OID = 1.2.840.113549.1.1.4

Key: com.sun.net.ssl.internal.ssl.JSA_RSAPublicKey@fffffd0c
Validity: [From: Sat Jan 24 17:35:35 VET 2004,
To: Fri Apr 23 17:35:35 VET 2004]
Issuer: CN=mac, OU=licom, O=luz, L=maracaibo, ST=zulia, C=ve
SerialNumber: [ 4012e527]

]
Algorithm: [MD5withRSA]
Signature:
0000: BC 98 8D C5 D7 95 43 8B AD FC CE 4F 68 0B 47 7F ......C....Oh.G.
0010: 0B 53 03 90 FC 42 B5 BC 11 F2 6F 55 49 FD 8C EA .S...B....oUI...
0020: 5C 8D A3 56 09 B3 C1 A1 D7 86 01 BD 8E 06 C0 C8 \..V............
0030: FD E3 DE 2B C1 75 BE 63 2D 4A AD B4 83 9D C5 DD ...+.u.c-J......
0040: E9 D5 EB EF A0 B0 C9 18 DF A7 2E 6D CF 97 67 8C ...........m..g.
0050: BA 4F 81 66 8E B4 EF 50 0A 13 C5 57 A8 A2 28 28 .O.f...P...W..((
0060: F7 94 26 5E 3A 00 A8 C0 C1 7E BE B9 68 2D 44 C4 ..&^:.......h-D.
0070: 62 E9 CC 67 EC 71 C9 08 6B 11 95 81 CC 83 4D 59 b..g.q..k.....MY

]
***
stop on trusted cert: [
[
Version: V1
Subject: CN=mac, OU=licom, O=luz, L=maracaibo, ST=zulia, C=ve
Signature Algorithm: MD5withRSA, OID = 1.2.840.113549.1.1.4

Key: com.sun.net.ssl.internal.ssl.JSA_RSAPublicKey@fffffd0c
Validity: [From: Sat Jan 24 17:35:35 VET 2004,
To: Fri Apr 23 17:35:35 VET 2004]
Issuer: CN=mac, OU=licom, O=luz, L=maracaibo, ST=zulia, C=ve
SerialNumber: [ 4012e527]

]
Algorithm: [MD5withRSA]
Signature:
0000: BC 98 8D C5 D7 95 43 8B AD FC CE 4F 68 0B 47 7F ......C....Oh.G.
0010: 0B 53 03 90 FC 42 B5 BC 11 F2 6F 55 49 FD 8C EA .S...B....oUI...
0020: 5C 8D A3 56 09 B3 C1 A1 D7 86 01 BD 8E 06 C0 C8 \..V............
0030: FD E3 DE 2B C1 75 BE 63 2D 4A AD B4 83 9D C5 DD ...+.u.c-J......
0040: E9 D5 EB EF A0 B0 C9 18 DF A7 2E 6D CF 97 67 8C ...........m..g.
0050: BA 4F 81 66 8E B4 EF 50 0A 13 C5 57 A8 A2 28 28 .O.f...P...W..((
0060: F7 94 26 5E 3A 00 A8 C0 C1 7E BE B9 68 2D 44 C4 ..&^:.......h-D.
0070: 62 E9 CC 67 EC 71 C9 08 6B 11 95 81 CC 83 4D 59 b..g.q..k.....MY

]
*** CertificateRequest
Cert Types: RSA, DSS,
Cert Authorities:
<CN=mac, OU=licom, O=luz, L=maracaibo, ST=zulia, C=ve>
*** ServerHelloDone
*** Certificate chain
***
JsseJCE: Using JSSE internal implementation for cipher RSA/ECB/PKCS1Padding
*** ClientKeyExchange, RSA PreMasterSecret, TLSv1
Random Secret: { 3, 1, 93, 188, 149, 26, 35, 47, 159, 27, 42, 49, 202, 97, 106, 5, 253, 149, 144, 53, 20, 165, 145, 242, 14, 101, 29, 93, 153, 156, 234, 6, 185, 238, 197, 76, 22, 162, 231, 206, 83, 195, 130, 213, 117, 251, 212, 112 }
AWT-EventQueue-0, WRITE: TLSv1 Handshake, length = 141
SESSION KEYGEN:
PreMaster Secret:
0000: 03 01 5D BC 95 1A 23 2F 9F 1B 2A 31 CA 61 6A 05 ..]...#/..*1.aj.
0010: FD 95 90 35 14 A5 91 F2 0E 65 1D 5D 99 9C EA 06 ...5.....e.]....
0020: B9 EE C5 4C 16 A2 E7 CE 53 C3 82 D5 75 FB D4 70 ...L....S...u..p
CONNECTION KEYGEN:
Client Nonce:
0000: 40 12 E7 E6 79 58 62 B6 B9 0B 5C 36 B4 AA 36 4D @...yXb...\6..6M
0010: 9F 88 45 43 A1 D0 4D 51 9B 9A 4A 28 5A 7C 8B 99 ..EC..MQ..J(Z...
Server Nonce:
0000: 40 12 E7 E6 1D AD 14 65 8D 43 53 21 44 37 97 9F @......e.CS!D7..
0010: 42 10 C6 AF E0 44 1A A3 C1 FA 4D 36 F8 DF 8C B7 B....D....M6....
Master Secret:
0000: F5 68 D8 48 4B 62 AF 62 15 CF 49 F1 B7 2E E8 52 .h.HKb.b..I....R
0010: 5D 02 EF 7B CC F0 CB 3D 32 06 68 66 3D 38 66 5A ]......=2.hf=8fZ
0020: 2A 21 FD C2 A7 0A AA 7D 3E BB 1F 73 22 88 7E BD *!......>..s"...
Client MAC write Secret:
0000: F9 E4 98 C1 C4 AC 7C 5D 6C AA F5 7B FF 94 93 6C .......]l......l
Server MAC write Secret:
0000: AD 7D C8 11 D5 6E A1 14 19 65 C0 9E 06 AF F8 C5 .....n...e......
Client write key:
0000: 5F F8 10 0A 36 14 31 15 AE 42 F0 E3 7E 01 1F DA _...6.1..B......
Server write key:
0000: 1D 56 E3 2C EC 80 2A C1 55 06 16 58 BF 3B 38 21 .V.,..*.U..X.;8!
... no IV for cipher
AWT-EventQueue-0, WRITE: TLSv1 Change Cipher Spec, length = 1
JsseJCE: Using JSSE internal implementation for cipher RC4
*** Finished
verify_data: { 168, 31, 180, 227, 128, 151, 249, 11, 167, 147, 225, 70 }
***
AWT-EventQueue-0, WRITE: TLSv1 Handshake, length = 32
waiting for close_notify or alert: state 1
AWT-EventQueue-0, READ: TLSv1 Alert, length = 2
AWT-EventQueue-0, RECV TLSv1 ALERT: fatal, bad_certificate
AWT-EventQueue-0, called closeSocket()
Exception while waiting for close javax.net.ssl.SSLHandshakeException: Received fatal alert: bad_certificate
AWT-EventQueue-0, handling exception: javax.net.ssl.SSLHandshakeException: Received fatal alert: bad_certificate
javax.net.ssl.SSLException: Connection has been shutdown: javax.net.ssl.SSLHandshakeException: Received fatal alert: bad_certificate
at com.sun.net.ssl.internal.ssl.SSLSocketImpl.d(DashoA6275)
at com.sun.net.ssl.internal.ssl.AppInputStream.read(DashoA6275)
at sun.nio.cs.StreamDecoder$CharsetSD.readBytes(StreamDecoder.java:406)
at sun.nio.cs.StreamDecoder$CharsetSD.implRead(StreamDecoder.java:446)
at sun.nio.cs.StreamDecoder.read(StreamDecoder.java:180)
at java.io.InputStreamReader.read(InputStreamReader.java:167)
at java.io.BufferedReader.fill(BufferedReader.java:136)
at java.io.BufferedReader.readLine(BufferedReader.java:299)
at java.io.BufferedReader.readLine(BufferedReader.java:362)
at Inicial$2.actionPerformed(Inicial.java:86)
at Inicial$3.actionPerformed(Inicial.java:124)
at javax.swing.AbstractButton.fireActionPerformed(AbstractButton.java:1797)
at javax.swing.AbstractButton$ForwardActionEvents.actionPerformed(AbstractButton.java:1850)
at javax.swing.DefaultButtonModel.fireActionPerformed(DefaultButtonModel.java:419)
at javax.swing.DefaultButtonModel.setPressed(DefaultButtonModel.java:257)
at javax.swing.plaf.basic.BasicButtonListener.mouseReleased(BasicButtonListener.java:247)
at java.awt.Component.processMouseEvent(Component.java:5093)
at java.awt.Component.processEvent(Component.java:4890)
at java.awt.Container.processEvent(Container.java:1566)
at java.awt.Component.dispatchEventImpl(Component.java:3598)
at java.awt.Container.dispatchEventImpl(Container.java:1623)
at java.awt.Component.dispatchEvent(Component.java:3439)
at java.awt.LightweightDispatcher.retargetMouseEvent(Container.java:3450)
at java.awt.LightweightDispatcher.processMouseEvent(Container.java:3165)
at java.awt.LightweightDispatcher.dispatchEvent(Container.java:3095)
at java.awt.Container.dispatchEventImpl(Container.java:1609)
at java.awt.Window.dispatchEventImpl(Window.java:1585)
at java.awt.Component.dispatchEvent(Component.java:3439)
at java.awt.EventQueue.dispatchEvent(EventQueue.java:450)
at java.awt.EventDispatchThread.pumpOneEventForHierarchy(EventDispatchThread.java:230)
at java.awt.EventDispatchThread.pumpEventsForHierarchy(EventDispatchThread.java:183)
at java.awt.EventDispatchThread.pumpEvents(EventDispatchThread.java:177)
at java.awt.EventDispatchThread.pumpEvents(EventDispatchThread.java:169)
at java.awt.EventDispatchThread.run(EventDispatchThread.java:99)
Caused by: javax.net.ssl.SSLHandshakeException: Received fatal alert: bad_certificate
at com.sun.net.ssl.internal.ssl.BaseSSLSocketImpl.a(DashoA6275)
at com.sun.net.ssl.internal.ssl.BaseSSLSocketImpl.b(DashoA6275)
at com.sun.net.ssl.internal.ssl.SSLSocketImpl.b(DashoA6275)
at com.sun.net.ssl.internal.ssl.SSLSocketImpl.a(DashoA6275)
at com.sun.net.ssl.internal.ssl.SSLSocketImpl.a(DashoA6275)
at com.sun.net.ssl.internal.ssl.HandshakeOutStream.flush(DashoA6275)
at com.sun.net.ssl.internal.ssl.SunJSSE_ax.a(DashoA6275)
at com.sun.net.ssl.internal.ssl.SunJSSE_az.j(DashoA6275)
at com.sun.net.ssl.internal.ssl.SunJSSE_az.a(DashoA6275)
at com.sun.net.ssl.internal.ssl.SunJSSE_az.a(DashoA6275)
at com.sun.net.ssl.internal.ssl.SunJSSE_ax.a(DashoA6275)
at com.sun.net.ssl.internal.ssl.SSLSocketImpl.a(DashoA6275)
at com.sun.net.ssl.internal.ssl.SSLSocketImpl.j(DashoA6275)
at com.sun.net.ssl.internal.ssl.SSLSocketImpl.a(DashoA6275)
at com.sun.net.ssl.internal.ssl.AppOutputStream.write(DashoA6275)
at sun.nio.cs.StreamEncoder$CharsetSE.writeBytes(StreamEncoder.java:334)
at sun.nio.cs.StreamEncoder$CharsetSE.implFlushBuffer(StreamEncoder.java:402)
at sun.nio.cs.StreamEncoder$CharsetSE.implFlush(StreamEncoder.java:406)
at sun.nio.cs.StreamEncoder.flush(StreamEncoder.java:150)
at java.io.OutputStreamWriter.flush(OutputStreamWriter.java:213)
at java.io.BufferedWriter.flush(BufferedWriter.java:230)
at java.io.PrintWriter.newLine(PrintWriter.java:256)
at java.io.PrintWriter.println(PrintWriter.java:405)
at java.io.PrintWriter.println(PrintWriter.java:530)
at Inicial$2.actionPerformed(Inicial.java:79)
... 24 more

---------------------------------------------------------------------------------------------------------------------

The server and the client are being run on the same machine on macosx panther
The keys were generated this way:

keytool -genkey -keystore certificado -alias espectro -keyalg rsa

i set the key's first and last name to my hostname

keytool -export -keystore certificado -file server.cer -alias espectro

keytool -import -keystore jssecacerts -file server.cer -alias espectro

then the jssecacerts file was copied to its proper place like the debug info displays above

So, basically the server is complaining about a null cert chain, and the client complains of a bad certificate.

I get this errors when serverSocket.setNeedClientAuth(true);
If i set it to false, then the client receives weird chars instead of properly decrypting the data:

java.lang.NumberFormatException: For input string: "[B@1563ff"
at java.lang.NumberFormatException.forInputString(NumberFormatException.java:48)

Instead of receiving "[B@1563ff" it should have received a new port number the server sends the client:

int nuevoPuerto=Integer.parseInt(in.readLine());

"in" being:

BufferedReader in=new BufferedReader(new InputStreamReader(
senalizacion.getInputStream()));

And senalizacion being:

senalizacion = (SSLSocket) factory.createSocket(Ip.getText(), Integer.parseInt(
Numero.getText()));

So either if i fix the certificate's problem i will get stuck with this one.

I really appreciate any help, i have been stuck on this for 3 days now!
Comments
Locked Post
New comments cannot be posted to this locked post.
Post Details
Locked on Jun 30 2004
Added on Jan 24 2004
9 comments
14,875 views