Hi all,
I get a fatal handshake_failure from server when I try to connect it from my client. I have attached the verbose debug output from client to server.
I get a fatal handshake_failure from server when I try to connect it from my client. I have attached the verbose debug output from client to server.
In summary, client_hello and server_hello done messages for sslv3 are received properly. After that when client sends the change_cipher_spec with client_key_exchange, the server responds with fatal handshake_failure.
Is it because of key exchange failure? If so, how can I debug to see what exactly could be the problem?
sslClient1.log is log of my sslclient when run against openssl server.
This is working fine.
sslClient2.log is log of my sslcient when run against a production sslserver. It fails in this case while exchanging keys. I have attached the serverlog too for the client2.
Any immediate help would be greatly appreciated.
thanks,
-Sriram
Do you Yahoo!?
Protect your identity with Yahoo! Mail AddressGuard
NamingBindInterceptor.bind_succeeded: Entering and Leaving requesting short key 00000026,11/21/03 5:12 AM,172.019.072.119,00013440,VBJ-Application,main,DEBUG,Entering into SSL handshake PeerAuthenticationPolicy = REQUEST 00000027,11/21/03 5:12 AM,172.019.072.119,00013440,VBJ-Application,main,DEBUG,SSLConnection writing 172 bytes at offset 0 to sslSocket[addr=codc3-xdm1.cisco.com/192.122.173.179,port=4433,localport=41474] ... %% No cached client session *** ClientHello, v3.0 RandomCookie: GMT: 1052643109 bytes = { 160, 220, 227, 184, 158, 107, 118, 25, 168, 108, 153, 99, 96, 73, 205, 222, 113, 228, 60, 134, 31, 218, 2, 171, 65, 91, 36, 96 } Session ID: {} Cipher Suites: { 0, 100, 0, 98, 0, 3, 0, 8, 0, 1, 0, 2, 0, 23, 0, 25 } Compression Methods: { 0 } *** [write] MD5 and SHA1 hashes: len = 59 0000: 01 00 00 37 03 00 3F BE 0F 25 A0 DC E3 B8 9E 6B ...7..?..%.....k 0010: 76 19 A8 6C 99 63 60 49 CD DE 71 E4 3C 86 1F DA v..l.c`I..q.<... 0020: 02 AB 41 5B 24 60 00 00 10 00 64 00 62 00 03 00 ..A[$`....d.b... 0030: 08 00 01 00 02 00 17 00 19 01 00 ........... main, WRITE: sslv3 Handshake, length = 59 [write] MD5 and SHA1 hashes: len = 65 0000: 01 03 00 00 18 00 00 00 20 00 00 64 00 00 62 00 ........ ..d..b. 0010: 00 03 00 00 08 00 00 01 00 00 02 00 00 17 00 00 ................ 0020: 19 3F BE 0F 25 A0 DC E3 B8 9E 6B 76 19 A8 6C 99 .?..%.....kv..l. 0030: 63 60 49 CD DE 71 E4 3C 86 1F DA 02 AB 41 5B 24 c`I..q.<.....A[$ 0040: 60 ` main, WRITE: sslv2, contentType = 22, translated length = 16322 main, READ: sslv3 Handshake, length = 74 *** ServerHello, v3.0 RandomCookie: GMT: 1052642413 bytes = { 8, 165, 204, 184, 206, 65, 10, 11, 2, 146, 78, 155, 3, 204, 73, 43, 51, 83, 144, 242, 211, 142, 254, 170, 23, 112, 25, 87 } Session ID: {190, 53, 41, 74, 224, 210, 81, 22, 153, 246, 44, 136, 148, 73, 126, 194, 162, 167, 39, 158, 246, 120, 59, 12, 113, 176, 254, 35, 176, 2, 249, 135} Cipher Suite: { 0, 100 } Compression Method: 0 *** %% Created: [Session-1, SSL_RSA_EXPORT1024_WITH_RC4_56_SHA] ** SSL_RSA_EXPORT1024_WITH_RC4_56_SHA [read] MD5 and SHA1 hashes: len = 74 0000: 02 00 00 46 03 00 3F BE 0C 6D 08 A5 CC B8 CE 41 ...F..?..m.....A 0010: 0A 0B 02 92 4E 9B 03 CC 49 2B 33 53 90 F2 D3 8E ....N...I+3S.... 0020: FE AA 17 70 19 57 20 BE 35 29 4A E0 D2 51 16 99 ...p.W .5)J..Q.. 0030: F6 2C 88 94 49 7E C2 A2 A7 27 9E F6 78 3B 0C 71 .,..I....'..x;.q 0040: B0 FE 23 B0 02 F9 87 00 64 00 ..#.....d. main, READ: sslv3 Handshake, length = 630 *** Certificate chain chain [0] = [ X.509v3 certificate, Subject is [EMAIL PROTECTED], CN=Sriram, OU=HCL, O=HCL-T, L=ODC3, S=TN, C=GB Key: algorithm = [RSA], exponent = 0x 010001, modulus = ab149213 00170bc1 2bdf2b12 56af3f8e f48c49f7 d3470eed 3de46bed 8805009c fdf0887b d5f1fea6 d7847acb b085d367 74daa953 dc84678f 5349b2de 76910561 a5bcb77b 2822229d 0d4cc206 400ed73f 449bca9a fe9ef3e0 eb89e054 07007d04 d8094489 32afa96c e91663a9 42465361 800072be 595eb197 3dc8037c 69dec0f9 Validity <Wed Nov 12 01:59:23 PST 2003> until <Fri Dec 12 01:59:23 PST 2003> Issuer is [EMAIL PROTECTED], CN=Sriram, OU=HCL, O=HCL-T, L=ODC3, S=TN, C=GB Issuer signature used [MD5withRSA] Serial number = ] *** 00000028,11/21/03 5:12 AM,172.019.072.119,00013440,VBJ-Application,main,DEBUG,certificate not trusted [read] MD5 and SHA1 hashes: len = 630 0000: 0B 00 02 72 00 02 6F 00 02 6C 30 82 02 68 30 82 ...r..o..l0..h0. 0010: 01 D1 A0 03 02 01 02 02 01 00 30 0D 06 09 2A 86 ..........0...*. 0020: 48 86 F7 0D 01 01 04 05 00 30 7A 31 0B 30 09 06 H........0z1.0.. 0030: 03 55 04 06 13 02 47 42 31 0B 30 09 06 03 55 04 .U....GB1.0...U. 0040: 08 13 02 54 4E 31 0D 30 0B 06 03 55 04 07 13 04 ...TN1.0...U.... 0050: 4F 44 43 33 31 0E 30 0C 06 03 55 04 0A 13 05 48 ODC31.0...U....H 0060: 43 4C 2D 54 31 0C 30 0A 06 03 55 04 0B 13 03 48 CL-T1.0...U....H 0070: 43 4C 31 0F 30 0D 06 03 55 04 03 13 06 53 72 69 CL1.0...U....Sri 0080: 72 61 6D 31 20 30 1E 06 09 2A 86 48 86 F7 0D 01 ram1 0...*.H.... 0090: 09 01 16 11 72 73 72 69 72 61 6D 40 63 69 73 63 [EMAIL PROTECTED] 00A0: 6F 2E 63 6F 6D 30 1E 17 0D 30 33 31 31 31 32 30 o.com0...0311120 00B0: 39 35 39 32 33 5A 17 0D 30 33 31 32 31 32 30 39 95923Z..03121209 00C0: 35 39 32 33 5A 30 7A 31 0B 30 09 06 03 55 04 06 5923Z0z1.0...U.. 00D0: 13 02 47 42 31 0B 30 09 06 03 55 04 08 13 02 54 ..GB1.0...U....T 00E0: 4E 31 0D 30 0B 06 03 55 04 07 13 04 4F 44 43 33 N1.0...U....ODC3 00F0: 31 0E 30 0C 06 03 55 04 0A 13 05 48 43 4C 2D 54 1.0...U....HCL-T 0100: 31 0C 30 0A 06 03 55 04 0B 13 03 48 43 4C 31 0F 1.0...U....HCL1. 0110: 30 0D 06 03 55 04 03 13 06 53 72 69 72 61 6D 31 0...U....Sriram1 0120: 20 30 1E 06 09 2A 86 48 86 F7 0D 01 09 01 16 11 0...*.H........ 0130: 72 73 72 69 72 61 6D 40 63 69 73 63 6F 2E 63 6F [EMAIL PROTECTED] 0140: 6D 30 81 9F 30 0D 06 09 2A 86 48 86 F7 0D 01 01 m0..0...*.H..... 0150: 01 05 00 03 81 8D 00 30 81 89 02 81 81 00 AB 14 .......0........ 0160: 92 13 00 17 0B C1 2B DF 2B 12 56 AF 3F 8E F4 8C ......+.+.V.?... 0170: 49 F7 D3 47 0E ED 3D E4 6B ED 88 05 00 9C FD F0 I..G..=.k....... 0180: 88 7B D5 F1 FE A6 D7 84 7A CB B0 85 D3 67 74 DA ........z....gt. 0190: A9 53 DC 84 67 8F 53 49 B2 DE 76 91 05 61 A5 BC .S..g.SI..v..a.. 01A0: B7 7B 28 22 22 9D 0D 4C C2 06 40 0E D7 3F 44 9B ..(""[EMAIL PROTECTED] 01B0: CA 9A FE 9E F3 E0 EB 89 E0 54 07 00 7D 04 D8 09 .........T...... 01C0: 44 89 32 AF A9 6C E9 16 63 A9 42 46 53 61 80 00 D.2..l..c.BFSa.. 01D0: 72 BE 59 5E B1 97 3D C8 03 7C 69 DE C0 F9 02 03 r.Y^..=...i..... 01E0: 01 00 01 30 0D 06 09 2A 86 48 86 F7 0D 01 01 04 ...0...*.H...... 01F0: 05 00 03 81 81 00 9E 4A 63 A1 6A C6 2C 94 16 84 .......Jc.j.,... 0200: 96 94 02 FE 54 4F DD 51 28 1E 50 9F C1 14 21 3D ....TO.Q(.P...!= 0210: 9D 35 1E 33 E4 68 FB F5 3D 3C 3E F9 8A 1A 21 63 .5.3.h..=<>...!c 0220: B7 1A 64 F3 FC D1 75 60 88 86 85 72 C8 BF 74 D1 ..d...u`...r..t. 0230: F0 93 5F 7B 32 84 86 B6 84 85 A1 B7 C1 76 FC 79 .._.2........v.y 0240: F6 AE 3A 61 3A 54 35 62 14 0C C3 BA 4B 26 8A 97 ..:a:T5b....K&.. 0250: F7 BC A6 0D 87 18 C2 12 AF 6F AB 6B 64 6B 4D 7B .........o.kdkM. 0260: FE 31 79 3E 94 4E F7 12 59 C9 32 8E 9F 0D 23 FA .1y>.N..Y.2...#. 0270: F5 78 1F 37 6D F2 .x.7m. main, READ: sslv3 Handshake, length = 4 *** ServerHelloDone [read] MD5 and SHA1 hashes: len = 4 0000: 0E 00 00 00 .... *** ClientKeyExchange, RSA PreMasterSecret, v3.0 Random Secret: { 3, 0, 62, 188, 226, 249, 245, 14, 184, 189, 66, 213, 171, 96, 83, 240, 124, 39, 4, 183, 229, 1, 234, 238, 77, 94, 250, 96, 218, 183, 129, 113, 25, 19, 2, 109, 68, 167, 218, 125, 112, 36, 237, 144, 239, 26, 127, 19 } [write] MD5 and SHA1 hashes: len = 132 0000: 10 00 00 80 9A C7 CD 81 47 D7 C2 26 5F FE 18 86 ........G..&_... 0010: 93 98 3F F8 A9 1F F4 94 03 41 88 BD 33 ED 9F 05 ..?......A..3... 0020: 6F 6E 4E 90 41 7D 85 3A 4C 5E 2A A8 BE 14 33 6A onN.A..:L^*...3j 0030: 21 29 5F B2 A8 F3 09 B6 D2 C0 E4 3E 04 AB 16 4D !)_........>...M 0040: EA 90 C7 87 C5 BC 0A 14 86 62 BA 3F 12 D5 AE 51 .........b.?...Q 0050: 4A 71 79 D9 80 5E B3 44 7E 18 9B 15 DB E7 25 2B Jqy..^.D......%+ 0060: F9 9D 50 FD 5E 03 15 31 12 B0 CA 6E 6A A5 F7 91 ..P.^..1...nj... 0070: B5 52 28 F3 6A C2 C9 0C 10 00 A4 76 91 28 92 69 .R(.j......v.(.i 0080: D0 A2 AB 10 .... main, WRITE: sslv3 Handshake, length = 132 SESSION KEYGEN: PreMaster Secret: 0000: 03 00 3E BC E2 F9 F5 0E B8 BD 42 D5 AB 60 53 F0 ..>.......B..`S. 0010: 7C 27 04 B7 E5 01 EA EE 4D 5E FA 60 DA B7 81 71 .'......M^.`...q 0020: 19 13 02 6D 44 A7 DA 7D 70 24 ED 90 EF 1A 7F 13 ...mD...p$...... 0030: CONNECTION KEYGEN: Client Nonce: 0000: 3F BE 0F 25 A0 DC E3 B8 9E 6B 76 19 A8 6C 99 63 ?..%.....kv..l.c 0010: 60 49 CD DE 71 E4 3C 86 1F DA 02 AB 41 5B 24 60 `I..q.<.....A[$` 0020: Server Nonce: 0000: 3F BE 0C 6D 08 A5 CC B8 CE 41 0A 0B 02 92 4E 9B ?..m.....A....N. 0010: 03 CC 49 2B 33 53 90 F2 D3 8E FE AA 17 70 19 57 ..I+3S.......p.W 0020: Master Secret: 0000: 87 A8 A8 BF CA 8F 81 C8 67 1E BB 9E A7 2D E8 B3 ........g....-.. 0010: 19 01 53 43 8D 93 E7 71 E4 B7 45 3D F4 FE C5 B3 ..SC...q..E=.... 0020: 6C E8 78 88 1B 9E 42 EA 78 C3 4C F7 5E D8 7C 58 l.x...B.x.L.^..X 0030: Client MAC write Secret: 0000: C5 3D 3E 9B 8F 4B D6 E5 7C 38 20 22 68 50 C1 F0 .=>..K...8 "hP.. 0010: A0 C4 2C D1 ..,. Server MAC write Secret: 0000: 4E CE 05 48 0C 4F CF DC 4D 2A F1 83 79 D6 47 E0 N..H.O..M*..y.G. 0010: 5E 12 45 A9 ^.E. Client write key: 0000: 29 AF A3 7C 4B 4B 4C 21 DA 70 7D EF 7E A5 F4 21 )...KKL!.p.....! 0010: Server write key: 0000: 8C 68 73 57 15 5A BB 64 89 6C ED 44 9D CB 78 FA .hsW.Z.d.l.D..x. 0010: ... no IV for cipher main, WRITE: sslv3 Change Cipher Spec, length = 1 *** Finished MD5 Hash: { 186, 115, 39, 186, 243, 3, 20, 114, 177, 204, 46, 44, 212, 28, 156, 193 } SHA1 Hash: { 152, 204, 16, 72, 238, 220, 100, 123, 243, 87, 216, 107, 154, 232, 80, 43, 9, 154, 43, 37 } *** [write] MD5 and SHA1 hashes: len = 40 0000: 14 00 00 24 BA 73 27 BA F3 03 14 72 B1 CC 2E 2C ...$.s'....r..., 0010: D4 1C 9C C1 98 CC 10 48 EE DC 64 7B F3 57 D8 6B .......H..d..W.k 0020: 9A E8 50 2B 09 9A 2B 25 ..P+..+% Plaintext before ENCRYPTION: len = 60 0000: 14 00 00 24 BA 73 27 BA F3 03 14 72 B1 CC 2E 2C ...$.s'....r..., 0010: D4 1C 9C C1 98 CC 10 48 EE DC 64 7B F3 57 D8 6B .......H..d..W.k 0020: 9A E8 50 2B 09 9A 2B 25 43 3F 89 7C 47 15 DD 59 ..P+..+%C?..G..Y 0030: 15 64 89 94 A8 49 D8 7F 27 2C CD 10 .d...I..',.. main, WRITE: sslv3 Handshake, length = 60 main, READ: sslv3 Change Cipher Spec, length = 1 main, READ: sslv3 Handshake, length = 60 Plaintext after DECRYPTION: len = 60 0000: 14 00 00 24 00 9D 04 34 3D E3 5B 83 70 C1 B4 6E ...$...4=.[.p..n 0010: C5 01 B9 8D B1 D6 3B 0E 4F 47 00 04 BE 50 14 B7 ......;.OG...P.. 0020: 7F 45 78 1C 2D C0 0C B7 F0 CE F7 C4 05 AD 99 C7 .Ex.-........... 0030: 3E 19 E6 E7 D3 26 9A 4B 34 17 71 D6 >....&.K4.q. *** Finished MD5 Hash: { 0, 157, 4, 52, 61, 227, 91, 131, 112, 193, 180, 110, 197, 1, 185, 141 } SHA1 Hash: { 177, 214, 59, 14, 79, 71, 0, 4, 190, 80, 20, 183, 127, 69, 120, 28, 45, 192, 12, 183 } *** %% Cached client session: [Session-1, SSL_RSA_EXPORT1024_WITH_RC4_56_SHA] [read] MD5 and SHA1 hashes: len = 40 0000: 14 00 00 24 00 9D 04 34 3D E3 5B 83 70 C1 B4 6E ...$...4=.[.p..n 0010: C5 01 B9 8D B1 D6 3B 0E 4F 47 00 04 BE 50 14 B7 ......;.OG...P.. 0020: 7F 45 78 1C 2D C0 0C B7 .Ex.-... Plaintext before ENCRYPTION: len = 192 0000: 47 49 4F 50 01 02 00 00 00 00 00 A0 00 00 00 02 GIOP............ 0010: 03 00 00 00 00 00 00 00 00 00 00 33 14 01 0F 00 ...........3.... 0020: 4E 55 50 00 00 00 15 00 00 00 00 00 00 00 01 00 NUP............. 0030: 4E 61 6D 65 53 65 72 76 69 63 65 00 00 00 00 00 NameService..... 0040: 00 00 00 01 4E 61 6D 65 53 65 72 76 69 63 65 00 ....NameService. 0050: 00 00 00 06 5F 69 73 5F 61 00 00 00 00 00 00 02 ...._is_a....... 0060: 56 49 53 03 00 00 00 00 00 00 00 01 00 00 00 0C VIS............. 0070: 00 00 00 00 00 01 00 01 00 01 01 09 00 00 00 00 ................ 0080: 00 00 00 28 49 44 4C 3A 6F 6D 67 2E 6F 72 67 2F ...(IDL:omg.org/ 0090: 43 6F 73 4E 61 6D 69 6E 67 2F 4E 61 6D 69 6E 67 CosNaming/Naming 00A0: 43 6F 6E 74 65 78 74 3A 31 2E 30 00 3E 03 3B 2E Context:1.0.>.;. 00B0: 45 08 22 0C 00 D8 81 28 DF 75 29 95 DF C6 F5 72 E."....(.u)....r 00C0: main, WRITE: sslv3 Application Data, length = 192 00000029,11/21/03 5:12 AM,172.019.072.119,00013440,VBJ-Application,main,DEBUG,SSLConnection.write complete 00000030,11/21/03 5:12 AM,172.019.072.119,00013440,VBJ-Application,main,DEBUG,SSLConnection reading 12 bytes at offset 0 from sslSocket[addr=codc3-xdm1.cisco.com/192.122.173.179,port=4433,localport=41474] ...
00000029,11/21/03 5:11 AM,172.019.072.119,00013403,VBJ-Application,main,INFO,trying to reconnect.. 00000030,11/21/03 5:11 AM,172.019.072.119,00013403,VBJ-Application,main,NOTICE,Created a new outgoing connection: SSLConnection (null)[sslSocket[addr=craft-gsr-4/172.19.75.39,port=10002,localport=41471]] Adding to active connections: SSLConnection (null)[sslSocket[addr=craft-gsr-4/172.19.75.39,port=10002,localport=41471]] 00000031,11/21/03 5:11 AM,172.019.072.119,00013403,VBJ-Application,main,INFO,reconnected requesting short key 00000032,11/21/03 5:11 AM,172.019.072.119,00013403,VBJ-Application,main,DEBUG,Entering into SSL handshake PeerAuthenticationPolicy = REQUEST 00000033,11/21/03 5:11 AM,172.019.072.119,00013403,VBJ-Application,main,DEBUG,SSLConnection writing 172 bytes at offset 0 to sslSocket[addr=craft-gsr-4/172.19.75.39,port=10002,localport=41471] ... %% No cached client session *** ClientHello, v3.0 RandomCookie: GMT: 1052643094 bytes = { 107, 162, 240, 210, 12, 70, 67, 195, 170, 205, 65, 93, 251, 69, 57, 106, 106, 161, 227, 167, 180, 194, 232, 53, 5, 119, 0, 11 } Session ID: {} Cipher Suites: { 0, 100, 0, 98, 0, 3, 0, 8, 0, 1, 0, 2, 0, 23, 0, 25 } Compression Methods: { 0 } *** [write] MD5 and SHA1 hashes: len = 59 0000: 01 00 00 37 03 00 3F BE 0F 16 6B A2 F0 D2 0C 46 ...7..?...k....F 0010: 43 C3 AA CD 41 5D FB 45 39 6A 6A A1 E3 A7 B4 C2 C...A].E9jj..... 0020: E8 35 05 77 00 0B 00 00 10 00 64 00 62 00 03 00 .5.w......d.b... 0030: 08 00 01 00 02 00 17 00 19 01 00 ........... main, WRITE: sslv3 Handshake, length = 59 [write] MD5 and SHA1 hashes: len = 65 0000: 01 03 00 00 18 00 00 00 20 00 00 64 00 00 62 00 ........ ..d..b. 0010: 00 03 00 00 08 00 00 01 00 00 02 00 00 17 00 00 ................ 0020: 19 3F BE 0F 16 6B A2 F0 D2 0C 46 43 C3 AA CD 41 .?...k....FC...A 0030: 5D FB 45 39 6A 6A A1 E3 A7 B4 C2 E8 35 05 77 00 ].E9jj......5.w. 0040: 0B . main, WRITE: sslv2, contentType = 22, translated length = 16322 main, READ: sslv3 Handshake, length = 74 *** ServerHello, v3.0 RandomCookie: GMT: 0 bytes = { 63, 188, 194, 13, 169, 218, 204, 9, 234, 132, 242, 214, 253, 141, 181, 39, 41, 239, 150, 51, 24, 129, 143, 210, 171, 214, 169, 15 } Session ID: {219, 110, 134, 22, 124, 174, 9, 88, 245, 255, 159, 219, 148, 88, 77, 96, 204, 211, 121, 182, 151, 75, 205, 186, 46, 2, 205, 60, 218, 93, 187, 39} Cipher Suite: { 0, 98 } Compression Method: 0 *** %% Created: [Session-1, SSL_RSA_EXPORT1024_WITH_DES_CBC_SHA] ** SSL_RSA_EXPORT1024_WITH_DES_CBC_SHA [read] MD5 and SHA1 hashes: len = 74 0000: 02 00 00 46 03 00 00 00 00 00 3F BC C2 0D A9 DA ...F......?..... 0010: CC 09 EA 84 F2 D6 FD 8D B5 27 29 EF 96 33 18 81 .........')..3.. 0020: 8F D2 AB D6 A9 0F 20 DB 6E 86 16 7C AE 09 58 F5 ...... .n.....X. 0030: FF 9F DB 94 58 4D 60 CC D3 79 B6 97 4B CD BA 2E ....XM`..y..K... 0040: 02 CD 3C DA 5D BB 27 00 62 00 ..<.].'.b. main, READ: sslv3 Handshake, length = 885 *** Certificate chain chain [0] = [ X.509v3 certificate, Subject is CN=craft-gsr-4.cisco.com, O=Cisco Systems Key: algorithm = [RSA], exponent = 0x 010001, modulus = b1c4644b 52fdbbb2 8ba4572f e89ae1dc 4b323f35 6cd5525c 40315ee9 a8ff8103 3dad7799 56442b7a 0dea36c1 1c85f2f5 b8cffe53 e0146b43 2d1feabb 1d4cbb59 b959bd75 54868cfc f1582dc4 878d8232 7408631a eb4c35f6 6052f4b4 2e912ed0 73d31a79 33834cc6 941debd9 f85ea87d 9f12a8a8 7773e06d df7f11bc abe7a8a3 Validity <Fri Nov 21 03:09:02 PST 2003> until <Fri Nov 28 03:09:02 PST 2003> Issuer is CN=Root coax-u10 Certificate Manager, OU=HFR, O=Cisco Systems, L=San Jose, S=CA, C=US Issuer signature used [MD5withRSA] Serial number = 016a ] *** [read] MD5 and SHA1 hashes: len = 885 0000: 0B 00 03 71 00 03 6E 00 03 6B 30 82 03 67 30 82 ...q..n..k0..g0. 0010: 02 4F A0 03 02 01 02 02 02 01 6A 30 0D 06 09 2A .O........j0...* 0020: 86 48 86 F7 0D 01 01 04 05 00 30 7F 31 0B 30 09 .H........0.1.0. 0030: 06 03 55 04 06 13 02 55 53 31 0B 30 09 06 03 55 ..U....US1.0...U 0040: 04 08 13 02 43 41 31 11 30 0F 06 03 55 04 07 13 ....CA1.0...U... 0050: 08 53 61 6E 20 4A 6F 73 65 31 16 30 14 06 03 55 .San Jose1.0...U 0060: 04 0A 13 0D 43 69 73 63 6F 20 53 79 73 74 65 6D ....Cisco System 0070: 73 31 0C 30 0A 06 03 55 04 0B 13 03 48 46 52 31 s1.0...U....HFR1 0080: 2A 30 28 06 03 55 04 03 13 21 52 6F 6F 74 20 63 *0(..U...!Root c 0090: 6F 61 78 2D 75 31 30 20 43 65 72 74 69 66 69 63 oax-u10 Certific 00A0: 61 74 65 20 4D 61 6E 61 67 65 72 30 1E 17 0D 30 ate Manager0...0 00B0: 33 31 31 32 31 31 31 30 39 30 32 5A 17 0D 30 33 31121110902Z..03 00C0: 31 31 32 38 31 31 30 39 30 32 5A 30 38 31 16 30 1128110902Z081.0 00D0: 14 06 03 55 04 0A 13 0D 43 69 73 63 6F 20 53 79 ...U....Cisco Sy 00E0: 73 74 65 6D 73 31 1E 30 1C 06 03 55 04 03 13 15 stems1.0...U.... 00F0: 63 72 61 66 74 2D 67 73 72 2D 34 2E 63 69 73 63 craft-gsr-4.cisc 0100: 6F 2E 63 6F 6D 30 81 9F 30 0D 06 09 2A 86 48 86 o.com0..0...*.H. 0110: F7 0D 01 01 01 05 00 03 81 8D 00 30 81 89 02 81 ...........0.... 0120: 81 00 B1 C4 64 4B 52 FD BB B2 8B A4 57 2F E8 9A ....dKR.....W/.. 0130: E1 DC 4B 32 3F 35 6C D5 52 5C 40 31 5E E9 A8 FF [EMAIL PROTECTED] 0140: 81 03 3D AD 77 99 56 44 2B 7A 0D EA 36 C1 1C 85 ..=.w.VD+z..6... 0150: F2 F5 B8 CF FE 53 E0 14 6B 43 2D 1F EA BB 1D 4C .....S..kC-....L 0160: BB 59 B9 59 BD 75 54 86 8C FC F1 58 2D C4 87 8D .Y.Y.uT....X-... 0170: 82 32 74 08 63 1A EB 4C 35 F6 60 52 F4 B4 2E 91 .2t.c..L5.`R.... 0180: 2E D0 73 D3 1A 79 33 83 4C C6 94 1D EB D9 F8 5E ..s..y3.L......^ 0190: A8 7D 9F 12 A8 A8 77 73 E0 6D DF 7F 11 BC AB E7 ......ws.m...... 01A0: A8 A3 02 03 01 00 01 A3 81 B7 30 81 B4 30 0E 06 ..........0..0.. 01B0: 03 55 1D 0F 01 01 FF 04 04 03 02 05 A0 30 20 06 .U...........0 . 01C0: 03 55 1D 11 04 19 30 17 82 15 63 72 61 66 74 2D .U....0...craft- 01D0: 67 73 72 2D 34 2E 63 69 73 63 6F 2E 63 6F 6D 30 gsr-4.cisco.com0 01E0: 1F 06 03 55 1D 23 04 18 30 16 80 14 88 F6 FF F3 ...U.#..0....... 01F0: F1 2A 7D A1 25 B7 5E 8B 66 5B DB 7E 5E 3B D5 FE .*..%.^.f[..^;.. 0200: 30 5F 06 03 55 1D 1F 04 58 30 56 30 54 A0 52 A0 0_..U...X0V0T.R. 0210: 50 86 4E 6C 64 61 70 3A 2F 2F 63 6F 61 78 2D 75 P.Nldap://coax-u 0220: 31 30 2E 63 69 73 63 6F 2E 63 6F 6D 2F 43 4E 3D 10.cisco.com/CN= 0230: 52 6F 6F 74 20 63 6F 61 78 2D 75 31 30 20 43 65 Root coax-u10 Ce 0240: 72 74 69 66 69 63 61 74 65 20 4D 61 6E 61 67 65 rtificate Manage 0250: 72 2C 4F 3D 43 69 73 63 6F 20 53 79 73 74 65 6D r,O=Cisco System 0260: 73 30 0D 06 09 2A 86 48 86 F7 0D 01 01 04 05 00 s0...*.H........ 0270: 03 82 01 01 00 83 8C 69 6E 14 A4 A6 F6 47 28 45 .......in....G(E 0280: 79 4A 33 83 94 D4 43 CB 41 B6 99 F0 9A C6 5C 32 yJ3...C.A.....\2 0290: 92 98 08 9E DB 6E 78 13 71 A6 A1 DD C1 61 2D A2 .....nx.q....a-. 02A0: 35 D0 48 06 13 BE EE F4 A7 4E F5 8C F8 84 89 E5 5.H......N...... 02B0: BB 95 B7 5B 20 1D 8C E5 93 35 CD 04 0B 49 21 4A ...[ ....5...I!J 02C0: C8 05 A1 CC 33 89 8E 2E B5 BE 48 4F 4A EE 67 A5 ....3.....HOJ.g. 02D0: 58 D6 6E 67 8F B6 7A 0C 51 4E E7 C3 FA F9 52 BD X.ng..z.QN....R. 02E0: 7A CE 27 61 02 30 25 C3 B2 38 B8 95 BD C7 1F 88 z.'a.0%..8...... 02F0: AC A3 BE 4B 7C FF 96 33 34 65 50 63 C0 3E 70 3D ...K...34ePc.>p= 0300: F6 D4 3D 4E 1A F4 2A 85 DF 56 0C 81 6C 1F 11 44 ..=N..*..V..l..D 0310: 03 1F C9 76 58 11 54 88 F5 0B C7 54 52 4B 01 DF ...vX.T....TRK.. 0320: 7D DC B0 A6 57 DD 7D E1 07 0F 91 E5 BB C5 A1 1E ....W........... 0330: 91 9B 58 83 7E A5 F9 0C 53 7A E4 92 EE 55 74 4E ..X.....Sz...UtN 0340: 26 5C CE 82 C6 5E 03 54 C9 FE 04 2C 2B 3F 7B 7F &\...^.T...,+?.. 0350: 96 41 1E EE BC F8 36 DC 79 DA 8F 3E 86 7B 0E CD .A....6.y..>.... 0360: 0C 45 12 EB D5 C7 A5 31 4C 26 86 A3 9F E8 F5 EC .E.....1L&...... 0370: 30 AD F0 23 B1 0..#. main, READ: sslv3 Handshake, length = 4 *** ServerHelloDone [read] MD5 and SHA1 hashes: len = 4 0000: 0E 00 00 00 .... *** ClientKeyExchange, RSA PreMasterSecret, v3.0 Random Secret: { 3, 0, 104, 127, 132, 10, 242, 102, 235, 56, 45, 161, 233, 154, 134, 241, 9, 222, 11, 188, 181, 13, 36, 54, 144, 192, 87, 185, 151, 199, 34, 69, 162, 129, 31, 101, 248, 217, 253, 96, 63, 50, 55, 30, 196, 33, 237, 240 } [write] MD5 and SHA1 hashes: len = 132 0000: 10 00 00 80 9D AE 38 58 25 CF 4A 35 87 41 8D 16 ......8X%.J5.A.. 0010: FA 91 B1 3E 39 9F D9 B0 DA 44 74 AC 52 CF 54 BC ...>9....Dt.R.T. 0020: A1 58 93 EC 01 82 A8 2C 69 EA 40 E2 E3 06 F8 CB .X.....,[EMAIL PROTECTED] 0030: 3B F2 2B AC B1 38 26 48 CB BC 74 DD D2 02 36 13 ;.+..8&H..t...6. 0040: 00 5C 6B 03 14 8C AB D7 0C 96 57 8C EC 15 BC D8 .\k.......W..... 0050: 60 87 37 72 2E A3 81 A2 1E 14 D7 93 86 C8 C7 DC `.7r............ 0060: 63 56 F7 E9 2B A8 B4 C0 AC D9 10 E1 09 A7 19 7D cV..+........... 0070: ED C4 9A 10 88 CC 22 6F 08 37 AA A2 14 85 DA D8 ......"o.7...... 0080: 88 B6 9C 24 ...$ main, WRITE: sslv3 Handshake, length = 132 SESSION KEYGEN: PreMaster Secret: 0000: 03 00 68 7F 84 0A F2 66 EB 38 2D A1 E9 9A 86 F1 ..h....f.8-..... 0010: 09 DE 0B BC B5 0D 24 36 90 C0 57 B9 97 C7 22 45 ......$6..W..."E 0020: A2 81 1F 65 F8 D9 FD 60 3F 32 37 1E C4 21 ED F0 ...e...`?27..!.. 0030: CONNECTION KEYGEN: Client Nonce: 0000: 3F BE 0F 16 6B A2 F0 D2 0C 46 43 C3 AA CD 41 5D ?...k....FC...A] 0010: FB 45 39 6A 6A A1 E3 A7 B4 C2 E8 35 05 77 00 0B .E9jj......5.w.. 0020: Server Nonce: 0000: 00 00 00 00 3F BC C2 0D A9 DA CC 09 EA 84 F2 D6 ....?........... 0010: FD 8D B5 27 29 EF 96 33 18 81 8F D2 AB D6 A9 0F ...')..3........ 0020: Master Secret: 0000: 02 05 30 9F 96 FF 50 7C 01 AE A7 99 4D 00 6A 45 ..0...P.....M.jE 0010: 03 97 7C 15 B1 E0 9B 2C E8 35 79 69 1B 8C 5F 6C .......,.5yi.._l 0020: 66 12 F7 38 C2 63 CE 1E EA 06 30 04 B1 32 7D 71 f..8.c....0..2.q 0030: Client MAC write Secret: 0000: C7 0B 55 37 99 29 22 1B 62 C7 16 5C 64 8D B1 0B ..U7.)".b..\d... 0010: 57 4B 10 78 WK.x Server MAC write Secret: 0000: 24 4D 14 A1 9A AB 7B 0E DA 4A 89 D0 B6 F2 96 84 $M.......J...... 0010: E6 0A D7 C4 .... Client write key: 0000: BD 05 D4 EC C7 76 AE D8 .....v.. Server write key: 0000: 92 9F 59 A5 AD 10 EE 17 ..Y..... Client write IV: 0000: 27 83 93 2A 9F FB 1E 7F '..*.... Server write IV: 0000: F3 97 3C 24 BC 9E AA AF ..<$.... main, WRITE: sslv3 Change Cipher Spec, length = 1 *** Finished MD5 Hash: { 77, 236, 146, 233, 234, 214, 56, 58, 187, 92, 169, 9, 82, 214, 54, 154 } SHA1 Hash: { 35, 29, 79, 221, 84, 13, 59, 181, 112, 223, 217, 200, 182, 66, 9, 165, 49, 223, 207, 120 } *** [write] MD5 and SHA1 hashes: len = 40 0000: 14 00 00 24 4D EC 92 E9 EA D6 38 3A BB 5C A9 09 ...$M.....8:.\.. 0010: 52 D6 36 9A 23 1D 4F DD 54 0D 3B B5 70 DF D9 C8 R.6.#.O.T.;.p... 0020: B6 42 09 A5 31 DF CF 78 .B..1..x Padded plaintext before ENCRYPTION: len = 64 0000: 14 00 00 24 4D EC 92 E9 EA D6 38 3A BB 5C A9 09 ...$M.....8:.\.. 0010: 52 D6 36 9A 23 1D 4F DD 54 0D 3B B5 70 DF D9 C8 R.6.#.O.T.;.p... 0020: B6 42 09 A5 31 DF CF 78 7C AE D7 6F 84 64 AE 85 .B..1..x...o.d.. 0030: BA 13 3D E3 8A 82 13 74 E5 2C E5 B9 03 03 03 03 ..=....t.,...... 0040: main, WRITE: sslv3 Handshake, length = 64 main, READ: sslv3 Alert, length = 2 main, RECV SSLv3 ALERT: fatal, handshake_failure EOFexception: couldn't read, peer disconnected com.inprise.security.ssl.HandshakeFailureException: Received fatal alert: handshake_failure at com.inprise.security.ssl.SSLSocketImpl.recvAlert(SSLSocketImpl.java:1122) at com.inprise.security.ssl.SSLSocketImpl.clearPipeline(SSLSocketImpl.java:847) at com.inprise.security.ssl.SSLSocketImpl.write(SSLSocketImpl.java:592) at com.inprise.security.ssl.AppOutputStream.write(AppOutputStream.java:71) at com.inprise.security.ssl.SSLConnection.write(SSLConnection.java:314) at com.inprise.vbroker.GIOP.OutputStream.write(OutputStream.java:168) at com.inprise.vbroker.GIOP.OutputStream.writeUnfragmented(OutputStream.java:143) at com.inprise.vbroker.GIOP.OutputStream.writeFragmented(OutputStream.java:78) at com.inprise.vbroker.GIOP.Message.write(Message.java:107) at com.inprise.vbroker.GIOP.GiopConnection.send_message(GiopConnection.java:262) at com.inprise.vbroker.GIOP.GiopConnection.send_message(GiopConnection.java:229) at com.inprise.vbroker.GIOP.ProtocolConnector.invoke(ProtocolConnector.java:605) at com.inprise.vbroker.GIOP.ProtocolConnector.is_a(ProtocolConnector.java:667) at com.inprise.vbroker.interceptor.ChainClientInterceptor.is_a(ChainClientInterceptor.java:330) at com.inprise.vbroker.orb.DelegateImpl.is_a(DelegateImpl.java:989) at org.omg.CORBA.portable.ObjectImpl._is_a(ObjectImpl.java:109) at org.omg.CosNaming.NamingContextHelper.narrow(NamingContextHelper.java:47) at myTest1.main(myTest1.java:31) org.omg.CORBA.NO_PERMISSION: minor code: 9027 completed: No at com.inprise.vbroker.orb.DelegateImpl.handleException(DelegateImpl.java:692) at com.inprise.vbroker.orb.DelegateImpl.is_a(DelegateImpl.java:1000) at org.omg.CORBA.portable.ObjectImpl._is_a(ObjectImpl.java:109) at org.omg.CosNaming.NamingContextHelper.narrow(NamingContextHelper.java:47) at myTest1.main(myTest1.java:31)
serverlogforclient2.log
Description: serverlogforclient2.log