javax.net.ssl.SSLHandshakeException: null cert chain
843811Jan 24 2004 — edited Jun 2 2004I have tried practically everything and i still can't get a ssl client and server to properly connect. When running both with debug turned on, i get the following errors:
On Server:
mac:~/Desktop/SO_ssl/Servidor espectro$ java -Djavax.net.debug=ssl:handshake Servidor &
[2] 1876
mac:~/Desktop/SO_ssl/Servidor espectro$ ***
found key for : espectro
chain [0] = [
[
Version: V1
Subject: CN=mac, OU=licom, O=luz, L=maracaibo, ST=zulia, C=ve
Signature Algorithm: MD5withRSA, OID = 1.2.840.113549.1.1.4
Key: com.sun.net.ssl.internal.ssl.JSA_RSAPublicKey@fffffd0c
Validity: [From: Sat Jan 24 17:35:35 VET 2004,
To: Fri Apr 23 17:35:35 VET 2004]
Issuer: CN=mac, OU=licom, O=luz, L=maracaibo, ST=zulia, C=ve
SerialNumber: [ 4012e527]
]
Algorithm: [MD5withRSA]
Signature:
0000: BC 98 8D C5 D7 95 43 8B AD FC CE 4F 68 0B 47 7F ......C....Oh.G.
0010: 0B 53 03 90 FC 42 B5 BC 11 F2 6F 55 49 FD 8C EA .S...B....oUI...
0020: 5C 8D A3 56 09 B3 C1 A1 D7 86 01 BD 8E 06 C0 C8 \..V............
0030: FD E3 DE 2B C1 75 BE 63 2D 4A AD B4 83 9D C5 DD ...+.u.c-J......
0040: E9 D5 EB EF A0 B0 C9 18 DF A7 2E 6D CF 97 67 8C ...........m..g.
0050: BA 4F 81 66 8E B4 EF 50 0A 13 C5 57 A8 A2 28 28 .O.f...P...W..((
0060: F7 94 26 5E 3A 00 A8 C0 C1 7E BE B9 68 2D 44 C4 ..&^:.......h-D.
0070: 62 E9 CC 67 EC 71 C9 08 6B 11 95 81 CC 83 4D 59 b..g.q..k.....MY
]
***
trustStore is: /System/Library/Frameworks/JavaVM.framework/Versions/1.4.1/Home/lib/security/jssecacerts
trustStore type is : jks
init truststore
adding as trusted cert: [
[
Version: V1
Subject: CN=mac, OU=licom, O=luz, L=maracaibo, ST=zulia, C=ve
Signature Algorithm: MD5withRSA, OID = 1.2.840.113549.1.1.4
Key: com.sun.net.ssl.internal.ssl.JSA_RSAPublicKey@fffffd0c
Validity: [From: Sat Jan 24 17:35:35 VET 2004,
To: Fri Apr 23 17:35:35 VET 2004]
Issuer: CN=mac, OU=licom, O=luz, L=maracaibo, ST=zulia, C=ve
SerialNumber: [ 4012e527]
]
Algorithm: [MD5withRSA]
Signature:
0000: BC 98 8D C5 D7 95 43 8B AD FC CE 4F 68 0B 47 7F ......C....Oh.G.
0010: 0B 53 03 90 FC 42 B5 BC 11 F2 6F 55 49 FD 8C EA .S...B....oUI...
0020: 5C 8D A3 56 09 B3 C1 A1 D7 86 01 BD 8E 06 C0 C8 \..V............
0030: FD E3 DE 2B C1 75 BE 63 2D 4A AD B4 83 9D C5 DD ...+.u.c-J......
0040: E9 D5 EB EF A0 B0 C9 18 DF A7 2E 6D CF 97 67 8C ...........m..g.
0050: BA 4F 81 66 8E B4 EF 50 0A 13 C5 57 A8 A2 28 28 .O.f...P...W..((
0060: F7 94 26 5E 3A 00 A8 C0 C1 7E BE B9 68 2D 44 C4 ..&^:.......h-D.
0070: 62 E9 CC 67 EC 71 C9 08 6B 11 95 81 CC 83 4D 59 b..g.q..k.....MY
]
trigger seeding of SecureRandom
done seeding SecureRandom
matching alias: espectro
main, READ: SSL v2, contentType = Handshake, translated length = 59
*** ClientHello, TLSv1
RandomCookie: GMT: 1074915046 bytes = { 121, 88, 98, 182, 185, 11, 92, 54, 180, 170, 54, 77, 159, 136, 69, 67, 161, 208, 77, 81, 155, 154, 74, 40, 90, 124, 139, 153 }
Session ID: {}
Cipher Suites: [SSL_RSA_WITH_RC4_128_MD5, SSL_RSA_WITH_RC4_128_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_DES_CBC_SHA, SSL_DHE_DSS_WITH_DES_CBC_SHA, SSL_RSA_EXPORT_WITH_RC4_40_MD5, SSL_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA]
Compression Methods: { 0 }
***
%% Created: [Session-1, SSL_RSA_WITH_RC4_128_MD5]
*** ServerHello, TLSv1
RandomCookie: GMT: 1074915046 bytes = { 29, 173, 20, 101, 141, 67, 83, 33, 68, 55, 151, 159, 66, 16, 198, 175, 224, 68, 26, 163, 193, 250, 77, 54, 248, 223, 140, 183 }
Session ID: {64, 18, 231, 230, 221, 214, 126, 219, 101, 121, 242, 59, 237, 14, 239, 31, 15, 72, 42, 172, 187, 118, 138, 222, 109, 13, 214, 116, 42, 222, 229, 67}
Cipher Suite: SSL_RSA_WITH_RC4_128_MD5
Compression Method: 0
***
Cipher suite: SSL_RSA_WITH_RC4_128_MD5
*** Certificate chain
chain [0] = [
[
Version: V1
Subject: CN=mac, OU=licom, O=luz, L=maracaibo, ST=zulia, C=ve
Signature Algorithm: MD5withRSA, OID = 1.2.840.113549.1.1.4
Key: com.sun.net.ssl.internal.ssl.JSA_RSAPublicKey@fffffd0c
Validity: [From: Sat Jan 24 17:35:35 VET 2004,
To: Fri Apr 23 17:35:35 VET 2004]
Issuer: CN=mac, OU=licom, O=luz, L=maracaibo, ST=zulia, C=ve
SerialNumber: [ 4012e527]
]
Algorithm: [MD5withRSA]
Signature:
0000: BC 98 8D C5 D7 95 43 8B AD FC CE 4F 68 0B 47 7F ......C....Oh.G.
0010: 0B 53 03 90 FC 42 B5 BC 11 F2 6F 55 49 FD 8C EA .S...B....oUI...
0020: 5C 8D A3 56 09 B3 C1 A1 D7 86 01 BD 8E 06 C0 C8 \..V............
0030: FD E3 DE 2B C1 75 BE 63 2D 4A AD B4 83 9D C5 DD ...+.u.c-J......
0040: E9 D5 EB EF A0 B0 C9 18 DF A7 2E 6D CF 97 67 8C ...........m..g.
0050: BA 4F 81 66 8E B4 EF 50 0A 13 C5 57 A8 A2 28 28 .O.f...P...W..((
0060: F7 94 26 5E 3A 00 A8 C0 C1 7E BE B9 68 2D 44 C4 ..&^:.......h-D.
0070: 62 E9 CC 67 EC 71 C9 08 6B 11 95 81 CC 83 4D 59 b..g.q..k.....MY
]
***
*** CertificateRequest
Cert Types: RSA, DSS,
Cert Authorities:
<CN=mac, OU=licom, O=luz, L=maracaibo, ST=zulia, C=ve>
*** ServerHelloDone
main, WRITE: TLSv1 Handshake, length = 754
main, READ: TLSv1 Handshake, length = 141
*** Certificate chain
***
main, SEND TLSv1 ALERT: fatal, description = bad_certificate
main, WRITE: TLSv1 Alert, length = 2
main, called closeSocket()
main, handling exception: javax.net.ssl.SSLHandshakeException: null cert chain
javax.net.ssl.SSLHandshakeException: null cert chain
at com.sun.net.ssl.internal.ssl.BaseSSLSocketImpl.a(DashoA6275)
at com.sun.net.ssl.internal.ssl.SSLSocketImpl.a(DashoA6275)
at com.sun.net.ssl.internal.ssl.SSLSocketImpl.a(DashoA6275)
at com.sun.net.ssl.internal.ssl.SunJSSE_aw.a(DashoA6275)
at com.sun.net.ssl.internal.ssl.SunJSSE_aw.a(DashoA6275)
at com.sun.net.ssl.internal.ssl.SunJSSE_ax.a(DashoA6275)
at com.sun.net.ssl.internal.ssl.SSLSocketImpl.a(DashoA6275)
at com.sun.net.ssl.internal.ssl.SSLSocketImpl.j(DashoA6275)
at com.sun.net.ssl.internal.ssl.SSLSocketImpl.a(DashoA6275)
at com.sun.net.ssl.internal.ssl.AppInputStream.read(DashoA6275)
at sun.nio.cs.StreamDecoder$CharsetSD.readBytes(StreamDecoder.java:406)
at sun.nio.cs.StreamDecoder$CharsetSD.implRead(StreamDecoder.java:446)
at sun.nio.cs.StreamDecoder.read(StreamDecoder.java:180)
at java.io.InputStreamReader.read(InputStreamReader.java:167)
at java.io.BufferedReader.fill(BufferedReader.java:136)
at java.io.BufferedReader.readLine(BufferedReader.java:299)
at java.io.BufferedReader.readLine(BufferedReader.java:362)
at Servidor.main(Servidor.java:323)
main, called close()
main, called closeInternal(true)
mac:~/Desktop/SO_ssl/Servidor espectro$
-----------------------------------------------------------------------------------------------------------------------------
On Client:
mac:~/Desktop/SO_ssl/Cliente espectro$ java -Djavax.net.debug=ssl:handshake Cliente &
[1] 1878
mac:~/Desktop/SO_ssl/Cliente espectro$ 2004-01-24 17:47:13.611 java[1878] Java couldn't paint in Java_apple_awt_CRenderer_doRect, no focused view.
keyStore is :
keyStore type is : jks
init keystore
init keymanager of type SunX509
trustStore is: /System/Library/Frameworks/JavaVM.framework/Versions/1.4.1/Home/lib/security/jssecacerts
trustStore type is : jks
init truststore
adding as trusted cert: [
[
Version: V1
Subject: CN=mac, OU=licom, O=luz, L=maracaibo, ST=zulia, C=ve
Signature Algorithm: MD5withRSA, OID = 1.2.840.113549.1.1.4
Key: com.sun.net.ssl.internal.ssl.JSA_RSAPublicKey@fffffd0c
Validity: [From: Sat Jan 24 17:35:35 VET 2004,
To: Fri Apr 23 17:35:35 VET 2004]
Issuer: CN=mac, OU=licom, O=luz, L=maracaibo, ST=zulia, C=ve
SerialNumber: [ 4012e527]
]
Algorithm: [MD5withRSA]
Signature:
0000: BC 98 8D C5 D7 95 43 8B AD FC CE 4F 68 0B 47 7F ......C....Oh.G.
0010: 0B 53 03 90 FC 42 B5 BC 11 F2 6F 55 49 FD 8C EA .S...B....oUI...
0020: 5C 8D A3 56 09 B3 C1 A1 D7 86 01 BD 8E 06 C0 C8 \..V............
0030: FD E3 DE 2B C1 75 BE 63 2D 4A AD B4 83 9D C5 DD ...+.u.c-J......
0040: E9 D5 EB EF A0 B0 C9 18 DF A7 2E 6D CF 97 67 8C ...........m..g.
0050: BA 4F 81 66 8E B4 EF 50 0A 13 C5 57 A8 A2 28 28 .O.f...P...W..((
0060: F7 94 26 5E 3A 00 A8 C0 C1 7E BE B9 68 2D 44 C4 ..&^:.......h-D.
0070: 62 E9 CC 67 EC 71 C9 08 6B 11 95 81 CC 83 4D 59 b..g.q..k.....MY
]
init context
trigger seeding of SecureRandom
done seeding SecureRandom
%% No cached client session
*** ClientHello, TLSv1
RandomCookie: GMT: 1074915046 bytes = { 121, 88, 98, 182, 185, 11, 92, 54, 180, 170, 54, 77, 159, 136, 69, 67, 161, 208, 77, 81, 155, 154, 74, 40, 90, 124, 139, 153 }
Session ID: {}
Cipher Suites: [SSL_RSA_WITH_RC4_128_MD5, SSL_RSA_WITH_RC4_128_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_DES_CBC_SHA, SSL_DHE_DSS_WITH_DES_CBC_SHA, SSL_RSA_EXPORT_WITH_RC4_40_MD5, SSL_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA]
Compression Methods: { 0 }
***
AWT-EventQueue-0, WRITE: TLSv1 Handshake, length = 59
AWT-EventQueue-0, WRITE: SSLv2 client hello message, length = 77
AWT-EventQueue-0, READ: TLSv1 Handshake, length = 754
*** ServerHello, TLSv1
RandomCookie: GMT: 1074915046 bytes = { 29, 173, 20, 101, 141, 67, 83, 33, 68, 55, 151, 159, 66, 16, 198, 175, 224, 68, 26, 163, 193, 250, 77, 54, 248, 223, 140, 183 }
Session ID: {64, 18, 231, 230, 221, 214, 126, 219, 101, 121, 242, 59, 237, 14, 239, 31, 15, 72, 42, 172, 187, 118, 138, 222, 109, 13, 214, 116, 42, 222, 229, 67}
Cipher Suite: SSL_RSA_WITH_RC4_128_MD5
Compression Method: 0
***
%% Created: [Session-1, SSL_RSA_WITH_RC4_128_MD5]
** SSL_RSA_WITH_RC4_128_MD5
*** Certificate chain
chain [0] = [
[
Version: V1
Subject: CN=mac, OU=licom, O=luz, L=maracaibo, ST=zulia, C=ve
Signature Algorithm: MD5withRSA, OID = 1.2.840.113549.1.1.4
Key: com.sun.net.ssl.internal.ssl.JSA_RSAPublicKey@fffffd0c
Validity: [From: Sat Jan 24 17:35:35 VET 2004,
To: Fri Apr 23 17:35:35 VET 2004]
Issuer: CN=mac, OU=licom, O=luz, L=maracaibo, ST=zulia, C=ve
SerialNumber: [ 4012e527]
]
Algorithm: [MD5withRSA]
Signature:
0000: BC 98 8D C5 D7 95 43 8B AD FC CE 4F 68 0B 47 7F ......C....Oh.G.
0010: 0B 53 03 90 FC 42 B5 BC 11 F2 6F 55 49 FD 8C EA .S...B....oUI...
0020: 5C 8D A3 56 09 B3 C1 A1 D7 86 01 BD 8E 06 C0 C8 \..V............
0030: FD E3 DE 2B C1 75 BE 63 2D 4A AD B4 83 9D C5 DD ...+.u.c-J......
0040: E9 D5 EB EF A0 B0 C9 18 DF A7 2E 6D CF 97 67 8C ...........m..g.
0050: BA 4F 81 66 8E B4 EF 50 0A 13 C5 57 A8 A2 28 28 .O.f...P...W..((
0060: F7 94 26 5E 3A 00 A8 C0 C1 7E BE B9 68 2D 44 C4 ..&^:.......h-D.
0070: 62 E9 CC 67 EC 71 C9 08 6B 11 95 81 CC 83 4D 59 b..g.q..k.....MY
]
***
stop on trusted cert: [
[
Version: V1
Subject: CN=mac, OU=licom, O=luz, L=maracaibo, ST=zulia, C=ve
Signature Algorithm: MD5withRSA, OID = 1.2.840.113549.1.1.4
Key: com.sun.net.ssl.internal.ssl.JSA_RSAPublicKey@fffffd0c
Validity: [From: Sat Jan 24 17:35:35 VET 2004,
To: Fri Apr 23 17:35:35 VET 2004]
Issuer: CN=mac, OU=licom, O=luz, L=maracaibo, ST=zulia, C=ve
SerialNumber: [ 4012e527]
]
Algorithm: [MD5withRSA]
Signature:
0000: BC 98 8D C5 D7 95 43 8B AD FC CE 4F 68 0B 47 7F ......C....Oh.G.
0010: 0B 53 03 90 FC 42 B5 BC 11 F2 6F 55 49 FD 8C EA .S...B....oUI...
0020: 5C 8D A3 56 09 B3 C1 A1 D7 86 01 BD 8E 06 C0 C8 \..V............
0030: FD E3 DE 2B C1 75 BE 63 2D 4A AD B4 83 9D C5 DD ...+.u.c-J......
0040: E9 D5 EB EF A0 B0 C9 18 DF A7 2E 6D CF 97 67 8C ...........m..g.
0050: BA 4F 81 66 8E B4 EF 50 0A 13 C5 57 A8 A2 28 28 .O.f...P...W..((
0060: F7 94 26 5E 3A 00 A8 C0 C1 7E BE B9 68 2D 44 C4 ..&^:.......h-D.
0070: 62 E9 CC 67 EC 71 C9 08 6B 11 95 81 CC 83 4D 59 b..g.q..k.....MY
]
*** CertificateRequest
Cert Types: RSA, DSS,
Cert Authorities:
<CN=mac, OU=licom, O=luz, L=maracaibo, ST=zulia, C=ve>
*** ServerHelloDone
*** Certificate chain
***
JsseJCE: Using JSSE internal implementation for cipher RSA/ECB/PKCS1Padding
*** ClientKeyExchange, RSA PreMasterSecret, TLSv1
Random Secret: { 3, 1, 93, 188, 149, 26, 35, 47, 159, 27, 42, 49, 202, 97, 106, 5, 253, 149, 144, 53, 20, 165, 145, 242, 14, 101, 29, 93, 153, 156, 234, 6, 185, 238, 197, 76, 22, 162, 231, 206, 83, 195, 130, 213, 117, 251, 212, 112 }
AWT-EventQueue-0, WRITE: TLSv1 Handshake, length = 141
SESSION KEYGEN:
PreMaster Secret:
0000: 03 01 5D BC 95 1A 23 2F 9F 1B 2A 31 CA 61 6A 05 ..]...#/..*1.aj.
0010: FD 95 90 35 14 A5 91 F2 0E 65 1D 5D 99 9C EA 06 ...5.....e.]....
0020: B9 EE C5 4C 16 A2 E7 CE 53 C3 82 D5 75 FB D4 70 ...L....S...u..p
CONNECTION KEYGEN:
Client Nonce:
0000: 40 12 E7 E6 79 58 62 B6 B9 0B 5C 36 B4 AA 36 4D @...yXb...\6..6M
0010: 9F 88 45 43 A1 D0 4D 51 9B 9A 4A 28 5A 7C 8B 99 ..EC..MQ..J(Z...
Server Nonce:
0000: 40 12 E7 E6 1D AD 14 65 8D 43 53 21 44 37 97 9F @......e.CS!D7..
0010: 42 10 C6 AF E0 44 1A A3 C1 FA 4D 36 F8 DF 8C B7 B....D....M6....
Master Secret:
0000: F5 68 D8 48 4B 62 AF 62 15 CF 49 F1 B7 2E E8 52 .h.HKb.b..I....R
0010: 5D 02 EF 7B CC F0 CB 3D 32 06 68 66 3D 38 66 5A ]......=2.hf=8fZ
0020: 2A 21 FD C2 A7 0A AA 7D 3E BB 1F 73 22 88 7E BD *!......>..s"...
Client MAC write Secret:
0000: F9 E4 98 C1 C4 AC 7C 5D 6C AA F5 7B FF 94 93 6C .......]l......l
Server MAC write Secret:
0000: AD 7D C8 11 D5 6E A1 14 19 65 C0 9E 06 AF F8 C5 .....n...e......
Client write key:
0000: 5F F8 10 0A 36 14 31 15 AE 42 F0 E3 7E 01 1F DA _...6.1..B......
Server write key:
0000: 1D 56 E3 2C EC 80 2A C1 55 06 16 58 BF 3B 38 21 .V.,..*.U..X.;8!
... no IV for cipher
AWT-EventQueue-0, WRITE: TLSv1 Change Cipher Spec, length = 1
JsseJCE: Using JSSE internal implementation for cipher RC4
*** Finished
verify_data: { 168, 31, 180, 227, 128, 151, 249, 11, 167, 147, 225, 70 }
***
AWT-EventQueue-0, WRITE: TLSv1 Handshake, length = 32
waiting for close_notify or alert: state 1
AWT-EventQueue-0, READ: TLSv1 Alert, length = 2
AWT-EventQueue-0, RECV TLSv1 ALERT: fatal, bad_certificate
AWT-EventQueue-0, called closeSocket()
Exception while waiting for close javax.net.ssl.SSLHandshakeException: Received fatal alert: bad_certificate
AWT-EventQueue-0, handling exception: javax.net.ssl.SSLHandshakeException: Received fatal alert: bad_certificate
javax.net.ssl.SSLException: Connection has been shutdown: javax.net.ssl.SSLHandshakeException: Received fatal alert: bad_certificate
at com.sun.net.ssl.internal.ssl.SSLSocketImpl.d(DashoA6275)
at com.sun.net.ssl.internal.ssl.AppInputStream.read(DashoA6275)
at sun.nio.cs.StreamDecoder$CharsetSD.readBytes(StreamDecoder.java:406)
at sun.nio.cs.StreamDecoder$CharsetSD.implRead(StreamDecoder.java:446)
at sun.nio.cs.StreamDecoder.read(StreamDecoder.java:180)
at java.io.InputStreamReader.read(InputStreamReader.java:167)
at java.io.BufferedReader.fill(BufferedReader.java:136)
at java.io.BufferedReader.readLine(BufferedReader.java:299)
at java.io.BufferedReader.readLine(BufferedReader.java:362)
at Inicial$2.actionPerformed(Inicial.java:86)
at Inicial$3.actionPerformed(Inicial.java:124)
at javax.swing.AbstractButton.fireActionPerformed(AbstractButton.java:1797)
at javax.swing.AbstractButton$ForwardActionEvents.actionPerformed(AbstractButton.java:1850)
at javax.swing.DefaultButtonModel.fireActionPerformed(DefaultButtonModel.java:419)
at javax.swing.DefaultButtonModel.setPressed(DefaultButtonModel.java:257)
at javax.swing.plaf.basic.BasicButtonListener.mouseReleased(BasicButtonListener.java:247)
at java.awt.Component.processMouseEvent(Component.java:5093)
at java.awt.Component.processEvent(Component.java:4890)
at java.awt.Container.processEvent(Container.java:1566)
at java.awt.Component.dispatchEventImpl(Component.java:3598)
at java.awt.Container.dispatchEventImpl(Container.java:1623)
at java.awt.Component.dispatchEvent(Component.java:3439)
at java.awt.LightweightDispatcher.retargetMouseEvent(Container.java:3450)
at java.awt.LightweightDispatcher.processMouseEvent(Container.java:3165)
at java.awt.LightweightDispatcher.dispatchEvent(Container.java:3095)
at java.awt.Container.dispatchEventImpl(Container.java:1609)
at java.awt.Window.dispatchEventImpl(Window.java:1585)
at java.awt.Component.dispatchEvent(Component.java:3439)
at java.awt.EventQueue.dispatchEvent(EventQueue.java:450)
at java.awt.EventDispatchThread.pumpOneEventForHierarchy(EventDispatchThread.java:230)
at java.awt.EventDispatchThread.pumpEventsForHierarchy(EventDispatchThread.java:183)
at java.awt.EventDispatchThread.pumpEvents(EventDispatchThread.java:177)
at java.awt.EventDispatchThread.pumpEvents(EventDispatchThread.java:169)
at java.awt.EventDispatchThread.run(EventDispatchThread.java:99)
Caused by: javax.net.ssl.SSLHandshakeException: Received fatal alert: bad_certificate
at com.sun.net.ssl.internal.ssl.BaseSSLSocketImpl.a(DashoA6275)
at com.sun.net.ssl.internal.ssl.BaseSSLSocketImpl.b(DashoA6275)
at com.sun.net.ssl.internal.ssl.SSLSocketImpl.b(DashoA6275)
at com.sun.net.ssl.internal.ssl.SSLSocketImpl.a(DashoA6275)
at com.sun.net.ssl.internal.ssl.SSLSocketImpl.a(DashoA6275)
at com.sun.net.ssl.internal.ssl.HandshakeOutStream.flush(DashoA6275)
at com.sun.net.ssl.internal.ssl.SunJSSE_ax.a(DashoA6275)
at com.sun.net.ssl.internal.ssl.SunJSSE_az.j(DashoA6275)
at com.sun.net.ssl.internal.ssl.SunJSSE_az.a(DashoA6275)
at com.sun.net.ssl.internal.ssl.SunJSSE_az.a(DashoA6275)
at com.sun.net.ssl.internal.ssl.SunJSSE_ax.a(DashoA6275)
at com.sun.net.ssl.internal.ssl.SSLSocketImpl.a(DashoA6275)
at com.sun.net.ssl.internal.ssl.SSLSocketImpl.j(DashoA6275)
at com.sun.net.ssl.internal.ssl.SSLSocketImpl.a(DashoA6275)
at com.sun.net.ssl.internal.ssl.AppOutputStream.write(DashoA6275)
at sun.nio.cs.StreamEncoder$CharsetSE.writeBytes(StreamEncoder.java:334)
at sun.nio.cs.StreamEncoder$CharsetSE.implFlushBuffer(StreamEncoder.java:402)
at sun.nio.cs.StreamEncoder$CharsetSE.implFlush(StreamEncoder.java:406)
at sun.nio.cs.StreamEncoder.flush(StreamEncoder.java:150)
at java.io.OutputStreamWriter.flush(OutputStreamWriter.java:213)
at java.io.BufferedWriter.flush(BufferedWriter.java:230)
at java.io.PrintWriter.newLine(PrintWriter.java:256)
at java.io.PrintWriter.println(PrintWriter.java:405)
at java.io.PrintWriter.println(PrintWriter.java:530)
at Inicial$2.actionPerformed(Inicial.java:79)
... 24 more
---------------------------------------------------------------------------------------------------------------------
The server and the client are being run on the same machine on macosx panther
The keys were generated this way:
keytool -genkey -keystore certificado -alias espectro -keyalg rsa
i set the key's first and last name to my hostname
keytool -export -keystore certificado -file server.cer -alias espectro
keytool -import -keystore jssecacerts -file server.cer -alias espectro
then the jssecacerts file was copied to its proper place like the debug info displays above
So, basically the server is complaining about a null cert chain, and the client complains of a bad certificate.
I get this errors when serverSocket.setNeedClientAuth(true);
If i set it to false, then the client receives weird chars instead of properly decrypting the data:
java.lang.NumberFormatException: For input string: "[B@1563ff"
at java.lang.NumberFormatException.forInputString(NumberFormatException.java:48)
Instead of receiving "[B@1563ff" it should have received a new port number the server sends the client:
int nuevoPuerto=Integer.parseInt(in.readLine());
"in" being:
BufferedReader in=new BufferedReader(new InputStreamReader(
senalizacion.getInputStream()));
And senalizacion being:
senalizacion = (SSLSocket) factory.createSocket(Ip.getText(), Integer.parseInt(
Numero.getText()));
So either if i fix the certificate's problem i will get stuck with this one.
I really appreciate any help, i have been stuck on this for 3 days now!