SSL client authentication
843841Apr 12 2004 — edited Apr 13 2004Hi all,
I posted the following message in the securities forum, but thought in may be Tomcat realted and decided to post it here as well: I am deperate for a solution! - Thanks!
I am attempting to develope a webapp that requires client authentication. I have generated keys using keytool IAW the j2ee tutorial found here at Sun as well as in wrox, "Java Security" book. I am successfull at getting the server authentication set up, but cannot get the client side to work.
System setup:
I'm running Tomcat 5 as a standalone on an IBM Thinkpad with win2K. I have JDK1.4SE installed. My machine name is tboyce (have also attempted to connect from a different machine on the network - same steps, same results!)
What I have done. I generated client and server keys and 4 keystores as follows:
clientKeyStore
serverKeyStore
clientTurstStore
serverTrustStore
I imported the keys for client into the sever truststore and visa versa.
My server.xml file connector code as follows:
<Connector port="8443" maxThreads="150" minSpareThreads="25" maxSpareThreads="75"
enableLookups="true" disableUploadTimeout="true"
acceptCount="100" debug="0" scheme="https" secure="true"
keystoreFile="C:\JBuilder9\jdk1.4\bin\serverKeyStore" keystorePass="changeit"
truststoreFile = "C:\JBuilder9\jdk1.4\bin\serverTrustStore" truststorePass="changeit"
clientAuth="true" SSLProtocol="TLS"
/>
I ran the import on the browser (IE 6.0)
When I run the app I get the following output in the console (debugger running):
Startup of Tomcat5:
Using CATALINA_BASE: C:\jakarta-tomcat-5.0.19
Using CATALINA_HOME: C:\jakarta-tomcat-5.0.19
Using CATALINA_TMPDIR: C:\jakarta-tomcat-5.0.19\temp
Using JAVA_HOME: C:\JBuilder9\JDK1.4
Using Security Manager
Apr 12, 2004 10:05:06 AM org.apache.coyote.http11.Http11Protocol init
INFO: Initializing Coyote HTTP/1.1 on port 9000
***
found key for : mykey
chain [0] = [
[
Version: V1
Subject: CN=localhost, OU=wellfound, O=wellfound, L=Marietta, ST=Georgia, C=US
Signature Algorithm: MD5withRSA, OID = 1.2.840.113549.1.1.4
Key: com.sun.net.ssl.internal.ssl.JSA_RSAPublicKey@fffffc2a
Validity: [From: Fri Apr 09 19:35:37 EDT 2004,
To: Thu Jul 08 19:35:37 EDT 2004]
Issuer: CN=localhost, OU=wellfound, O=wellfound, L=Marietta, ST=Georgia, C=US
SerialNumber: [ 40773349]
]
Algorithm: [MD5withRSA]
Signature:
0000: 8F DD F5 0B 15 C3 04 3F 5F FC 4E 82 BB 59 4E 5F .......?_.N..YN_
0010: 06 09 4E 75 75 A3 FF 8C D0 16 2A 65 7B 57 C0 C9 ..Nuu.....*e.W..
0020: B1 9D F1 78 D0 48 F8 05 0D 26 F3 AA 0B 3A 27 72 ...x.H...&...:'r
0030: D3 93 8A 5B 5D A7 E1 03 EF 49 5A CF 88 16 38 B9 ...[]....IZ...8.
0040: DB 29 4F F7 1C 6C 8D CB EC 9B F1 95 76 C2 D2 64 .)O..l......v..d
0050: E0 F0 FE 58 DF 65 62 D8 5B 5A A2 3E 75 D3 4A E3 ...X.eb.[Z.>u.J.
0060: A7 40 D3 55 A7 E5 6D 73 3A 12 11 0D 78 63 7B 6B .@.U..ms:...xc.k
0070: 01 25 47 57 E3 A3 BA C0 82 4A A5 A3 CD 1D B6 CB .%GW.....J......
]
***
adding as trusted cert: [
[
Version: V1
Subject: CN=OmniConnect, OU=SanteFe, O=SanteFeMovers, L=Marietta, ST=Georgia, C=US
Signature Algorithm: MD5withRSA, OID = 1.2.840.113549.1.1.4
Key: com.sun.net.ssl.internal.ssl.JSA_RSAPublicKey@ffffff72
Validity: [From: Fri Apr 09 19:34:50 EDT 2004,
To: Thu Jul 08 19:34:50 EDT 2004]
Issuer: CN=OmniConnect, OU=SanteFe, O=SanteFeMovers, L=Marietta, ST=Georgia, C=US
SerialNumber: [ 4077331a]
]
Algorithm: [MD5withRSA]
Signature:
0000: 47 CB A3 AA 6D EF 90 BC E5 D8 9D 40 EA 56 62 14 G...m......@.Vb.
0010: 62 2B 85 3D A1 67 B4 29 38 76 9C 55 C7 0B 44 B2 b+.=.g.)8v.U..D.
0020: E0 CC C3 82 4E BB 0F A5 57 53 4E 6B 30 68 83 AF ....N...WSNk0h..
0030: C5 AB BD 2A 6A 49 5E F3 6B 2A CB 08 16 2B 0F 87 ...*jI^.k*...+..
0040: 49 7E D9 7D F3 E3 63 6D 24 22 9E 94 31 9A D3 CC I.....cm$"..1...
0050: D9 69 B2 F8 7E AF 4C F6 D2 9B 3D B2 5E CE 4A 24 .i....L...=.^.J$
0060: 2D 0A EF 2D 9F 95 D8 0F 4D CE E8 C7 CD 4B D0 A0 -..-....M....K..
0070: 4F 55 50 EF 67 6F EC D3 85 EA 17 CC 05 23 F3 BE OUP.go.......#..
]
trigger seeding of SecureRandom
done seeding SecureRandom
Apr 12, 2004 10:05:08 AM org.apache.coyote.http11.Http11Protocol init
INFO: Initializing Coyote HTTP/1.1 on port 8443
Apr 12, 2004 10:05:08 AM org.apache.catalina.startup.Catalina load
INFO: Initialization processed in 4226 ms
Apr 12, 2004 10:05:08 AM org.apache.catalina.core.StandardService start
INFO: Starting service Catalina
Apr 12, 2004 10:05:08 AM org.apache.catalina.core.StandardEngine start
INFO: Starting Servlet Engine: Apache Tomcat/5.0.19
Apr 12, 2004 10:05:08 AM org.apache.catalina.core.StandardHost start
INFO: XML validation disabled
Apr 12, 2004 10:05:08 AM org.apache.catalina.core.StandardHost getDeployer
INFO: Create Host deployer for direct deployment ( non-jmx )
Apr 12, 2004 10:05:08 AM org.apache.catalina.core.StandardHostDeployer install
INFO: Installing web application at context path /balancer from URL file:C:\jakarta-tomcat-5.0.
\webapps\balancer
Apr 12, 2004 10:05:09 AM org.apache.catalina.core.StandardContext start
SEVERE: Error filterStart
Apr 12, 2004 10:05:09 AM org.apache.catalina.core.StandardContext start
SEVERE: Context startup failed due to previous errors
Apr 12, 2004 10:05:09 AM org.apache.catalina.core.StandardHostDeployer install
INFO: Installing web application at context path /jsp-examples from URL file:C:\jakarta-tomcat-
0.19\webapps\jsp-examples
Apr 12, 2004 10:05:11 AM org.apache.catalina.core.StandardHostDeployer install
INFO: Installing web application at context path /Omni from URL file:C:\jakarta-tomcat-5.0.19\w
apps\Omni
Apr 12, 2004 10:05:11 AM org.apache.catalina.core.StandardHostDeployer install
INFO: Installing web application at context path from URL file:C:\jakarta-tomcat-5.0.19\webapp
ROOT
Apr 12, 2004 10:05:12 AM org.apache.catalina.core.StandardHostDeployer install
INFO: Installing web application at context path /servlets-examples from URL file:C:\jakarta-to
at-5.0.19\webapps\servlets-examples
Apr 12, 2004 10:05:12 AM org.apache.catalina.core.StandardHostDeployer install
INFO: Installing web application at context path /tomcat-docs from URL file:C:\jakarta-tomcat-5
.19\webapps\tomcat-docs
Apr 12, 2004 10:05:12 AM org.apache.catalina.core.StandardHostDeployer install
INFO: Installing web application at context path /webdav from URL file:C:\jakarta-tomcat-5.0.19
ebapps\webdav
Apr 12, 2004 10:05:13 AM org.apache.coyote.http11.Http11Protocol start
INFO: Starting Coyote HTTP/1.1 on port 9000
Apr 12, 2004 10:05:13 AM org.apache.coyote.http11.Http11Protocol start
INFO: Starting Coyote HTTP/1.1 on port 8443
Apr 12, 2004 10:05:13 AM org.apache.jk.common.ChannelSocket init
INFO: JK2: ajp13 listening on /0.0.0.0:8009
Apr 12, 2004 10:05:14 AM org.apache.jk.server.JkMain start
INFO: Jk running ID=0 time=20/130 config=C:\jakarta-tomcat-5.0.19\conf\jk2.properties
Apr 12, 2004 10:05:14 AM org.apache.catalina.startup.Catalina start
INFO: Server startup in 5939 ms
matching alias: mykey
Application Started:
setSoTimeout(60000) called
[read] MD5 and SHA1 hashes: len = 3
0000: 01 03 01 ...
[read] MD5 and SHA1 hashes: len = 73
0000: 00 33 00 00 00 10 00 00 04 00 00 05 00 00 0A 01 .3..............
0010: 00 80 07 00 C0 03 00 80 00 00 09 06 00 40 00 00 .............@..
0020: 64 00 00 62 00 00 03 00 00 06 02 00 80 04 00 80 d..b............
0030: 00 00 13 00 00 12 00 00 63 A0 BC 8B 16 FC 3E 93 ........c.....>.
0040: 20 78 39 7B 97 96 F8 2D 08 x9....-.
http8443-Processor25, READ: SSL v2, contentType = Handshake, translated length = 65
*** ClientHello, TLSv1
RandomCookie: GMT: 0 bytes = { 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 160, 188, 139, 22, 252, 62,
47, 32, 120, 57, 123, 151, 150, 248, 45, 8 }
Session ID: {}
Cipher Suites: [SSL_RSA_WITH_RC4_128_MD5, SSL_RSA_WITH_RC4_128_SHA, SSL_RSA_WITH_3DES_EDE_CBC_S
, SSL_RSA_WITH_DES_CBC_SHA, SSL_RSA_EXPORT1024_WITH_RC4_56_SHA, SSL_RSA_EXPORT1024_WITH_DES_CBC
HA, SSL_RSA_EXPORT_WITH_RC4_40_MD5, SSL_RSA_EXPORT_WITH_RC2_CBC_40_MD5, SSL_DHE_DSS_WITH_3DES_E
_CBC_SHA, SSL_DHE_DSS_WITH_DES_CBC_SHA, SSL_DHE_DSS_EXPORT1024_WITH_DES_CBC_SHA]
Compression Methods: { 0 }
***
%% Created: [Session-1, SSL_RSA_WITH_RC4_128_MD5]
*** ServerHello, TLSv1
RandomCookie: GMT: 1081713188 bytes = { 81, 153, 249, 130, 188, 188, 172, 95, 97, 116, 118, 23
179, 252, 131, 49, 216, 143, 228, 2, 134, 69, 71, 237, 21, 163, 91, 79 }
Session ID: {64, 122, 162, 36, 77, 134, 229, 160, 175, 64, 232, 67, 151, 66, 11, 196, 134, 12,
6, 235, 233, 200, 114, 159, 57, 226, 137, 61, 34, 26, 39, 254}
Cipher Suite: SSL_RSA_WITH_RC4_128_MD5
Compression Method: 0
***
Cipher suite: SSL_RSA_WITH_RC4_128_MD5
*** Certificate chain
chain [0] = [
[
Version: V1
Subject: CN=localhost, OU=wellfound, O=wellfound, L=Marietta, ST=Georgia, C=US
Signature Algorithm: MD5withRSA, OID = 1.2.840.113549.1.1.4
Key: com.sun.net.ssl.internal.ssl.JSA_RSAPublicKey@fffffc2a
Validity: [From: Fri Apr 09 19:35:37 EDT 2004,
To: Thu Jul 08 19:35:37 EDT 2004]
Issuer: CN=localhost, OU=wellfound, O=wellfound, L=Marietta, ST=Georgia, C=US
SerialNumber: [ 40773349]
]
Algorithm: [MD5withRSA]
Signature:
0000: 8F DD F5 0B 15 C3 04 3F 5F FC 4E 82 BB 59 4E 5F .......?_.N..YN_
0010: 06 09 4E 75 75 A3 FF 8C D0 16 2A 65 7B 57 C0 C9 ..Nuu.....*e.W..
0020: B1 9D F1 78 D0 48 F8 05 0D 26 F3 AA 0B 3A 27 72 ...x.H...&...:'r
0030: D3 93 8A 5B 5D A7 E1 03 EF 49 5A CF 88 16 38 B9 ...[]....IZ...8.
0040: DB 29 4F F7 1C 6C 8D CB EC 9B F1 95 76 C2 D2 64 .)O..l......v..d
0050: E0 F0 FE 58 DF 65 62 D8 5B 5A A2 3E 75 D3 4A E3 ...X.eb.[Z.>u.J.
0060: A7 40 D3 55 A7 E5 6D 73 3A 12 11 0D 78 63 7B 6B .@.U..ms:...xc.k
0070: 01 25 47 57 E3 A3 BA C0 82 4A A5 A3 CD 1D B6 CB .%GW.....J......
]
***
*** CertificateRequest
Cert Types: RSA, DSS,
Cert Authorities:
<CN=OmniConnect, OU=SanteFe, O=SanteFeMovers, L=Marietta, ST=Georgia, C=US>
*** ServerHelloDone
[write] MD5 and SHA1 hashes: len = 809
0000: 02 00 00 46 03 01 40 7A A2 24 51 99 F9 82 BC BC ...F..@z.$Q.....
0010: AC 5F 61 74 76 EF B3 FC 83 31 D8 8F E4 02 86 45 ._atv....1.....E
0020: 47 ED 15 A3 5B 4F 20 40 7A A2 24 4D 86 E5 A0 AF G...[O @z.$M....
0030: 40 E8 43 97 42 0B C4 86 0C 10 EB E9 C8 72 9F 39 @.C.B........r.9
0040: E2 89 3D 22 1A 27 FE 00 04 00 0B 00 02 58 00 02 ..=".'.......X..
0050: 55 00 02 52 30 82 02 4E 30 82 01 B7 02 04 40 77 U..R0..N0.....@w
0060: 33 49 30 0D 06 09 2A 86 48 86 F7 0D 01 01 04 05 3I0...*.H.......
0070: 00 30 6E 31 0B 30 09 06 03 55 04 06 13 02 55 53 .0n1.0...U....US
0080: 31 10 30 0E 06 03 55 04 08 13 07 47 65 6F 72 67 1.0...U....Georg
0090: 69 61 31 11 30 0F 06 03 55 04 07 13 08 4D 61 72 ia1.0...U....Mar
00A0: 69 65 74 74 61 31 12 30 10 06 03 55 04 0A 13 09 ietta1.0...U....
00B0: 77 65 6C 6C 66 6F 75 6E 64 31 12 30 10 06 03 55 wellfound1.0...U
00C0: 04 0B 13 09 77 65 6C 6C 66 6F 75 6E 64 31 12 30 ....wellfound1.0
00D0: 10 06 03 55 04 03 13 09 6C 6F 63 61 6C 68 6F 73 ...U....localhos
00E0: 74 30 1E 17 0D 30 34 30 34 30 39 32 33 33 35 33 t0...04040923353
00F0: 37 5A 17 0D 30 34 30 37 30 38 32 33 33 35 33 37 7Z..040708233537
0100: 5A 30 6E 31 0B 30 09 06 03 55 04 06 13 02 55 53 Z0n1.0...U....US
0110: 31 10 30 0E 06 03 55 04 08 13 07 47 65 6F 72 67 1.0...U....Georg
0120: 69 61 31 11 30 0F 06 03 55 04 07 13 08 4D 61 72 ia1.0...U....Mar
0130: 69 65 74 74 61 31 12 30 10 06 03 55 04 0A 13 09 ietta1.0...U....
0140: 77 65 6C 6C 66 6F 75 6E 64 31 12 30 10 06 03 55 wellfound1.0...U
0150: 04 0B 13 09 77 65 6C 6C 66 6F 75 6E 64 31 12 30 ....wellfound1.0
0160: 10 06 03 55 04 03 13 09 6C 6F 63 61 6C 68 6F 73 ...U....localhos
0170: 74 30 81 9F 30 0D 06 09 2A 86 48 86 F7 0D 01 01 t0..0...*.H.....
0180: 01 05 00 03 81 8D 00 30 81 89 02 81 81 00 DE 2F .......0......./
0190: C3 D3 E4 F6 0B F3 26 AB B9 44 4A B4 39 0A DD 13 ......&..DJ.9...
01A0: CC 27 1E B9 05 ED 67 AE 5E D0 AB 01 E1 50 CF 80 .'....g.^....P..
01B0: 41 8C 40 C2 A9 63 49 F7 34 42 DF 79 34 78 DF CB A.@..cI.4B.y4x..
01C0: 2F 67 8B A2 FC 44 33 FE 40 DE CC 00 47 40 B4 AF /g...D3.@...G@..
01D0: 4B 7E A8 D5 AC 47 34 D8 02 B1 F1 74 24 90 DD 08 K....G4....t$...
01E0: 8D 6D 12 9B 38 ED 11 C4 BF BC AE FB B8 50 DD D8 .m..8........P..
01F0: A1 69 A7 C6 98 67 59 D1 5F 91 18 14 B4 C7 2D D3 .i...gY._.....-.
0200: A7 9B A0 92 44 DC 70 86 85 26 D5 AD 6F 67 02 03 ....D.p..&..og..
0210: 01 00 01 30 0D 06 09 2A 86 48 86 F7 0D 01 01 04 ...0...*.H......
0220: 05 00 03 81 81 00 8F DD F5 0B 15 C3 04 3F 5F FC .............?_.
0230: 4E 82 BB 59 4E 5F 06 09 4E 75 75 A3 FF 8C D0 16 N..YN_..Nuu.....
0240: 2A 65 7B 57 C0 C9 B1 9D F1 78 D0 48 F8 05 0D 26 *e.W.....x.H...&
0250: F3 AA 0B 3A 27 72 D3 93 8A 5B 5D A7 E1 03 EF 49 ...:'r...[]....I
0260: 5A CF 88 16 38 B9 DB 29 4F F7 1C 6C 8D CB EC 9B Z...8..)O..l....
0270: F1 95 76 C2 D2 64 E0 F0 FE 58 DF 65 62 D8 5B 5A ..v..d...X.eb.[Z
0280: A2 3E 75 D3 4A E3 A7 40 D3 55 A7 E5 6D 73 3A 12 .>u.J..@.U..ms:.
0290: 11 0D 78 63 7B 6B 01 25 47 57 E3 A3 BA C0 82 4A ..xc.k.%GW.....J
02A0: A5 A3 CD 1D B6 CB 0D 00 00 7B 02 01 02 00 76 00 ..............v.
02B0: 74 30 72 31 0B 30 09 06 03 55 04 06 13 02 55 53 t0r1.0...U....US
02C0: 31 10 30 0E 06 03 55 04 08 13 07 47 65 6F 72 67 1.0...U....Georg
02D0: 69 61 31 11 30 0F 06 03 55 04 07 13 08 4D 61 72 ia1.0...U....Mar
02E0: 69 65 74 74 61 31 16 30 14 06 03 55 04 0A 13 0D ietta1.0...U....
02F0: 53 61 6E 74 65 46 65 4D 6F 76 65 72 73 31 10 30 SanteFeMovers1.0
0300: 0E 06 03 55 04 0B 13 07 53 61 6E 74 65 46 65 31 ...U....SanteFe1
0310: 14 30 12 06 03 55 04 03 13 0B 4F 6D 6E 69 43 6F .0...U....OmniCo
0320: 6E 6E 65 63 74 0E 00 00 00 nnect....
http8443-Processor25, WRITE: TLSv1 Handshake, length = 809
http8443-Processor25, received EOFException: error
http8443-Processor25, handling exception: javax.net.ssl.SSLHandshakeException: Remote host clos
connection during handshake
http8443-Processor25setSoTimeout(60000) called
[read] MD5 and SHA1 hashes: len = 3
0000: , SEND TLSv1 ALERT: fatal, description = unexpected_message
http8443-Processor25, WRITE: TLSv1 Alert, length = 2
01 03 01 http8443-Processor25, called closeSocket()
http8443-Processor25, called close()
http8443-Processor25, called closeInternal(true)
...
[read] MD5 and SHA1 hashes: len = 73
0000: 00 33 00 00 00 10 00 00 04 00 00 05 00 00 0A 01 .3..............
0010: 00 80 07 00 C0 03 00 80 00 00 09 06 00 40 00 00 .............@..
0020: 64 00 00 62 00 00 03 00 00 06 02 00 80 04 00 80 d..b............
0030: 00 00 13 00 00 12 00 00 63 C1 0B A0 A9 E9 48 E4 ........c.....H.
0040: 3A 00 9A 85 5D C7 C9 0D 47 :...]...G
http8443-Processor24, READ: SSL v2, contentType = Handshake, translated length = 65
*** ClientHello, TLSv1
RandomCookie: GMT: 0 bytes = { 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 193, 11, 160, 169, 233, 72,
28, 58, 0, 154, 133, 93, 199, 201, 13, 71 }
Session ID: {}
Cipher Suites: [SSL_RSA_WITH_RC4_128_MD5, SSL_RSA_WITH_RC4_128_SHA, SSL_RSA_WITH_3DES_EDE_CBC_S
, SSL_RSA_WITH_DES_CBC_SHA, SSL_RSA_EXPORT1024_WITH_RC4_56_SHA, SSL_RSA_EXPORT1024_WITH_DES_CBC
HA, SSL_RSA_EXPORT_WITH_RC4_40_MD5, SSL_RSA_EXPORT_WITH_RC2_CBC_40_MD5, SSL_DHE_DSS_WITH_3DES_E
_CBC_SHA, SSL_DHE_DSS_WITH_DES_CBC_SHA, SSL_DHE_DSS_EXPORT1024_WITH_DES_CBC_SHA]
Compression Methods: { 0 }
***
%% Created: [Session-2, SSL_RSA_WITH_RC4_128_MD5]
*** ServerHello, TLSv1
RandomCookie: GMT: 1081713188 bytes = { 192, 16, 223, 33, 108, 48, 64, 61, 18, 190, 23, 237, 2
209, 208, 177, 249, 61, 100, 62, 151, 103, 123, 14, 205, 152, 28, 194 }
Session ID: {64, 122, 162, 36, 248, 124, 101, 239, 153, 161, 51, 6, 147, 110, 125, 225, 12, 79
227, 225, 43, 189, 238, 162, 58, 46, 153, 120, 30, 133, 69, 166}
Cipher Suite: SSL_RSA_WITH_RC4_128_MD5
Compression Method: 0
***
Cipher suite: SSL_RSA_WITH_RC4_128_MD5
*** Certificate chain
chain [0] = [
[
Version: V1
Subject: CN=localhost, OU=wellfound, O=wellfound, L=Marietta, ST=Georgia, C=US
Signature Algorithm: MD5withRSA, OID = 1.2.840.113549.1.1.4
Key: com.sun.net.ssl.internal.ssl.JSA_RSAPublicKey@fffffc2a
Validity: [From: Fri Apr 09 19:35:37 EDT 2004,
To: Thu Jul 08 19:35:37 EDT 2004]
Issuer: CN=localhost, OU=wellfound, O=wellfound, L=Marietta, ST=Georgia, C=US
SerialNumber: [ 40773349]
]
Algorithm: [MD5withRSA]
Signature:
0000: 8F DD F5 0B 15 C3 04 3F 5F FC 4E 82 BB 59 4E 5F .......?_.N..YN_
0010: 06 09 4E 75 75 A3 FF 8C D0 16 2A 65 7B 57 C0 C9 ..Nuu.....*e.W..
0020: B1 9D F1 78 D0 48 F8 05 0D 26 F3 AA 0B 3A 27 72 ...x.H...&...:'r
0030: D3 93 8A 5B 5D A7 E1 03 EF 49 5A CF 88 16 38 B9 ...[]....IZ...8.
0040: DB 29 4F F7 1C 6C 8D CB EC 9B F1 95 76 C2 D2 64 .)O..l......v..d
0050: E0 F0 FE 58 DF 65 62 D8 5B 5A A2 3E 75 D3 4A E3 ...X.eb.[Z.>u.J.
0060: A7 40 D3 55 A7 E5 6D 73 3A 12 11 0D 78 63 7B 6B .@.U..ms:...xc.k
0070: 01 25 47 57 E3 A3 BA C0 82 4A A5 A3 CD 1D B6 CB .%GW.....J......
]
***
*** CertificateRequest
Cert Types: RSA, DSS,
Cert Authorities:
<CN=OmniConnect, OU=SanteFe, O=SanteFeMovers, L=Marietta, ST=Georgia, C=US>
*** ServerHelloDone
[write] MD5 and SHA1 hashes: len = 809
0000: 02 00 00 46 03 01 40 7A A2 24 C0 10 DF 21 6C 30 ...F..@z.$...!l0
0010: 40 3D 12 BE 17 ED 1C D1 D0 B1 F9 3D 64 3E 97 67 @=.........=d>.g
0020: 7B 0E CD 98 1C C2 20 40 7A A2 24 F8 7C 65 EF 99 ...... @z.$..e..
0030: A1 33 06 93 6E 7D E1 0C 4F E3 E1 2B BD EE A2 3A .3..n...O..+...:
0040: 2E 99 78 1E 85 45 A6 00 04 00 0B 00 02 58 00 02 ..x..E.......X..
0050: 55 00 02 52 30 82 02 4E 30 82 01 B7 02 04 40 77 U..R0..N0.....@w
0060: 33 49 30 0D 06 09 2A 86 48 86 F7 0D 01 01 04 05 3I0...*.H.......
0070: 00 30 6E 31 0B 30 09 06 03 55 04 06 13 02 55 53 .0n1.0...U....US
0080: 31 10 30 0E 06 03 55 04 08 13 07 47 65 6F 72 67 1.0...U....Georg
0090: 69 61 31 11 30 0F 06 03 55 04 07 13 08 4D 61 72 ia1.0...U....Mar
00A0: 69 65 74 74 61 31 12 30 10 06 03 55 04 0A 13 09 ietta1.0...U....
00B0: 77 65 6C 6C 66 6F 75 6E 64 31 12 30 10 06 03 55 wellfound1.0...U
00C0: 04 0B 13 09 77 65 6C 6C 66 6F 75 6E 64 31 12 30 ....wellfound1.0
00D0: 10 06 03 55 04 03 13 09 6C 6F 63 61 6C 68 6F 73 ...U....localhos
00E0: 74 30 1E 17 0D 30 34 30 34 30 39 32 33 33 35 33 t0...04040923353
00F0: 37 5A 17 0D 30 34 30 37 30 38 32 33 33 35 33 37 7Z..040708233537
0100: 5A 30 6E 31 0B 30 09 06 03 55 04 06 13 02 55 53 Z0n1.0...U....US
0110: 31 10 30 0E 06 03 55 04 08 13 07 47 65 6F 72 67 1.0...U....Georg
0120: 69 61 31 11 30 0F 06 03 55 04 07 13 08 4D 61 72 ia1.0...U....Mar
0130: 69 65 74 74 61 31 12 30 10 06 03 55 04 0A 13 09 ietta1.0...U....
0140: 77 65 6C 6C 66 6F 75 6E 64 31 12 30 10 06 03 55 wellfound1.0...U
0150: 04 0B 13 09 77 65 6C 6C 66 6F 75 6E 64 31 12 30 ....wellfound1.0
0160: 10 06 03 55 04 03 13 09 6C 6F 63 61 6C 68 6F 73 ...U....localhos
0170: 74 30 81 9F 30 0D 06 09 2A 86 48 86 F7 0D 01 01 t0..0...*.H.....
0180: 01 05 00 03 81 8D 00 30 81 89 02 81 81 00 DE 2F .......0......./
0190: C3 D3 E4 F6 0B F3 26 AB B9 44 4A B4 39 0A DD 13 ......&..DJ.9...
01A0: CC 27 1E B9 05 ED 67 AE 5E D0 AB 01 E1 50 CF 80 .'....g.^....P..
01B0: 41 8C 40 C2 A9 63 49 F7 34 42 DF 79 34 78 DF CB A.@..cI.4B.y4x..
01C0: 2F 67 8B A2 FC 44 33 FE 40 DE CC 00 47 40 B4 AF /g...D3.@...G@..
01D0: 4B 7E A8 D5 AC 47 34 D8 02 B1 F1 74 24 90 DD 08 K....G4....t$...
01E0: 8D 6D 12 9B 38 ED 11 C4 BF BC AE FB B8 50 DD D8 .m..8........P..
01F0: A1 69 A7 C6 98 67 59 D1 5F 91 18 14 B4 C7 2D D3 .i...gY._.....-.
0200: A7 9B A0 92 44 DC 70 86 85 26 D5 AD 6F 67 02 03 ....D.p..&..og..
0210: 01 00 01 30 0D 06 09 2A 86 48 86 F7 0D 01 01 04 ...0...*.H......
0220: 05 00 03 81 81 00 8F DD F5 0B 15 C3 04 3F 5F FC .............?_.
0230: 4E 82 BB 59 4E 5F 06 09 4E 75 75 A3 FF 8C D0 16 N..YN_..Nuu.....
0240: 2A 65 7B 57 C0 C9 B1 9D F1 78 D0 48 F8 05 0D 26 *e.W.....x.H...&
0250: F3 AA 0B 3A 27 72 D3 93 8A 5B 5D A7 E1 03 EF 49 ...:'r...[]....I
0260: 5A CF 88 16 38 B9 DB 29 4F F7 1C 6C 8D CB EC 9B Z...8..)O..l....
0270: F1 95 76 C2 D2 64 E0 F0 FE 58 DF 65 62 D8 5B 5A ..v..d...X.eb.[Z
0280: A2 3E 75 D3 4A E3 A7 40 D3 55 A7 E5 6D 73 3A 12 .>u.J..@.U..ms:.
0290: 11 0D 78 63 7B 6B 01 25 47 57 E3 A3 BA C0 82 4A ..xc.k.%GW.....J
02A0: A5 A3 CD 1D B6 CB 0D 00 00 7B 02 01 02 00 76 00 ..............v.
02B0: 74 30 72 31 0B 30 09 06 03 55 04 06 13 02 55 53 t0r1.0...U....US
02C0: 31 10 30 0E 06 03 55 04 08 13 07 47 65 6F 72 67 1.0...U....Georg
02D0: 69 61 31 11 30 0F 06 03 55 04 07 13 08 4D 61 72 ia1.0...U....Mar
02E0: 69 65 74 74 61 31 16 30 14 06 03 55 04 0A 13 0D ietta1.0...U....
02F0: 53 61 6E 74 65 46 65 4D 6F 76 65 72 73 31 10 30 SanteFeMovers1.0
0300: 0E 06 03 55 04 0B 13 07 53 61 6E 74 65 46 65 31 ...U....SanteFe1
0310: 14 30 12 06 03 55 04 03 13 0B 4F 6D 6E 69 43 6F .0...U....OmniCo
0320: 6E 6E 65 63 74 0E 00 00 00 nnect....
http8443-Processor24, WRITE: TLSv1 Handshake, length = 809
http8443-Processor24, READ: TLSv1 Handshake, length = 141
*** Certificate chain
***
http8443-Processor24, SEND TLSv1 ALERT: fatal, description = bad_certificate
http8443-Processor24, WRITE: TLSv1 Alert, length = 2
http8443-Processor24, called closeSocket()
http8443-Processor24, handling exception: javax.net.ssl.SSLHandshakeException: null cert chain
http8443-Processor24, called close()
http8443-Processor24, called closeInternal(true)
I really would appreciate any assistance on this possible.
Tom Boyce