Hi all,
I get a fatal handshake_failure from server when I try to connect it from my client. I have attached the verbose debug output from client to server.
In summary, client_hello and server_hello done messages for sslv3 are received properly. After that when client sends the change_cipher_spec with client_key_exchange, the server responds with fatal handshake_failure. 
  Is it because of key exchange failure? If so, how can I debug to see what exactly could be the problem?
 
sslClient1.log is log of my sslclient when run against openssl server.
 This is working fine.
sslClient2.log is log of my sslcient when run against a production sslserver. It fails in this case while exchanging keys. I have attached the serverlog too for the client2.
 
Any immediate help would be greatly appreciated.
 
thanks,
-Sriram


Do you Yahoo!?
Protect your identity with Yahoo! Mail AddressGuard
NamingBindInterceptor.bind_succeeded: Entering and Leaving
requesting short key
00000026,11/21/03 5:12 AM,172.019.072.119,00013440,VBJ-Application,main,DEBUG,Entering 
into SSL handshake PeerAuthenticationPolicy = REQUEST
00000027,11/21/03 5:12 
AM,172.019.072.119,00013440,VBJ-Application,main,DEBUG,SSLConnection writing 172 bytes 
at offset 0 to 
sslSocket[addr=codc3-xdm1.cisco.com/192.122.173.179,port=4433,localport=41474] ... 
%% No cached client session
*** ClientHello, v3.0
RandomCookie:  GMT: 1052643109 bytes = { 160, 220, 227, 184, 158, 107, 118, 25, 168, 
108, 153, 99, 96, 73, 205, 222, 113, 228, 60, 134, 31, 218, 2, 171, 65, 91, 36, 96 }
Session ID:  {}
Cipher Suites:  { 0, 100, 0, 98, 0, 3, 0, 8, 0, 1, 0, 2, 0, 23, 0, 25 }
Compression Methods:  { 0 }
***
[write] MD5 and SHA1 hashes:  len = 59
0000: 01 00 00 37 03 00 3F BE   0F 25 A0 DC E3 B8 9E 6B  ...7..?..%.....k
0010: 76 19 A8 6C 99 63 60 49   CD DE 71 E4 3C 86 1F DA  v..l.c`I..q.<...
0020: 02 AB 41 5B 24 60 00 00   10 00 64 00 62 00 03 00  ..A[$`....d.b...
0030: 08 00 01 00 02 00 17 00   19 01 00                 ...........
main, WRITE:  sslv3 Handshake, length = 59
[write] MD5 and SHA1 hashes:  len = 65
0000: 01 03 00 00 18 00 00 00   20 00 00 64 00 00 62 00  ........ ..d..b.
0010: 00 03 00 00 08 00 00 01   00 00 02 00 00 17 00 00  ................
0020: 19 3F BE 0F 25 A0 DC E3   B8 9E 6B 76 19 A8 6C 99  .?..%.....kv..l.
0030: 63 60 49 CD DE 71 E4 3C   86 1F DA 02 AB 41 5B 24  c`I..q.<.....A[$
0040: 60                                                 `
main, WRITE:  sslv2, contentType = 22, translated length = 16322
main, READ:  sslv3 Handshake, length = 74
*** ServerHello, v3.0
RandomCookie:  GMT: 1052642413 bytes = { 8, 165, 204, 184, 206, 65, 10, 11, 2, 146, 
78, 155, 3, 204, 73, 43, 51, 83, 144, 242, 211, 142, 254, 170, 23, 112, 25, 87 }
Session ID:  {190, 53, 41, 74, 224, 210, 81, 22, 153, 246, 44, 136, 148, 73, 126, 194, 
162, 167, 39, 158, 246, 120, 59, 12, 113, 176, 254, 35, 176, 2, 249, 135}
Cipher Suite:  { 0, 100 }
Compression Method: 0
***
%% Created:  [Session-1, SSL_RSA_EXPORT1024_WITH_RC4_56_SHA]
** SSL_RSA_EXPORT1024_WITH_RC4_56_SHA
[read] MD5 and SHA1 hashes:  len = 74
0000: 02 00 00 46 03 00 3F BE   0C 6D 08 A5 CC B8 CE 41  ...F..?..m.....A
0010: 0A 0B 02 92 4E 9B 03 CC   49 2B 33 53 90 F2 D3 8E  ....N...I+3S....
0020: FE AA 17 70 19 57 20 BE   35 29 4A E0 D2 51 16 99  ...p.W .5)J..Q..
0030: F6 2C 88 94 49 7E C2 A2   A7 27 9E F6 78 3B 0C 71  .,..I....'..x;.q
0040: B0 FE 23 B0 02 F9 87 00   64 00                    ..#.....d.
main, READ:  sslv3 Handshake, length = 630
*** Certificate chain
chain [0] = [
  X.509v3 certificate,
  Subject is [EMAIL PROTECTED], CN=Sriram, OU=HCL, O=HCL-T, L=ODC3, S=TN, C=GB
  Key:  algorithm = [RSA], exponent = 0x    010001, modulus = 
    ab149213 00170bc1 2bdf2b12 56af3f8e f48c49f7 d3470eed 3de46bed 8805009c
    fdf0887b d5f1fea6 d7847acb b085d367 74daa953 dc84678f 5349b2de 76910561
    a5bcb77b 2822229d 0d4cc206 400ed73f 449bca9a fe9ef3e0 eb89e054 07007d04
    d8094489 32afa96c e91663a9 42465361 800072be 595eb197 3dc8037c 69dec0f9
  Validity <Wed Nov 12 01:59:23 PST 2003> until <Fri Dec 12 01:59:23 PST 2003>
  Issuer is [EMAIL PROTECTED], CN=Sriram, OU=HCL, O=HCL-T, L=ODC3, S=TN, C=GB
  Issuer signature used [MD5withRSA]
  Serial number =     
]
***
00000028,11/21/03 5:12 
AM,172.019.072.119,00013440,VBJ-Application,main,DEBUG,certificate not trusted
[read] MD5 and SHA1 hashes:  len = 630
0000: 0B 00 02 72 00 02 6F 00   02 6C 30 82 02 68 30 82  ...r..o..l0..h0.
0010: 01 D1 A0 03 02 01 02 02   01 00 30 0D 06 09 2A 86  ..........0...*.
0020: 48 86 F7 0D 01 01 04 05   00 30 7A 31 0B 30 09 06  H........0z1.0..
0030: 03 55 04 06 13 02 47 42   31 0B 30 09 06 03 55 04  .U....GB1.0...U.
0040: 08 13 02 54 4E 31 0D 30   0B 06 03 55 04 07 13 04  ...TN1.0...U....
0050: 4F 44 43 33 31 0E 30 0C   06 03 55 04 0A 13 05 48  ODC31.0...U....H
0060: 43 4C 2D 54 31 0C 30 0A   06 03 55 04 0B 13 03 48  CL-T1.0...U....H
0070: 43 4C 31 0F 30 0D 06 03   55 04 03 13 06 53 72 69  CL1.0...U....Sri
0080: 72 61 6D 31 20 30 1E 06   09 2A 86 48 86 F7 0D 01  ram1 0...*.H....
0090: 09 01 16 11 72 73 72 69   72 61 6D 40 63 69 73 63  [EMAIL PROTECTED]
00A0: 6F 2E 63 6F 6D 30 1E 17   0D 30 33 31 31 31 32 30  o.com0...0311120
00B0: 39 35 39 32 33 5A 17 0D   30 33 31 32 31 32 30 39  95923Z..03121209
00C0: 35 39 32 33 5A 30 7A 31   0B 30 09 06 03 55 04 06  5923Z0z1.0...U..
00D0: 13 02 47 42 31 0B 30 09   06 03 55 04 08 13 02 54  ..GB1.0...U....T
00E0: 4E 31 0D 30 0B 06 03 55   04 07 13 04 4F 44 43 33  N1.0...U....ODC3
00F0: 31 0E 30 0C 06 03 55 04   0A 13 05 48 43 4C 2D 54  1.0...U....HCL-T
0100: 31 0C 30 0A 06 03 55 04   0B 13 03 48 43 4C 31 0F  1.0...U....HCL1.
0110: 30 0D 06 03 55 04 03 13   06 53 72 69 72 61 6D 31  0...U....Sriram1
0120: 20 30 1E 06 09 2A 86 48   86 F7 0D 01 09 01 16 11   0...*.H........
0130: 72 73 72 69 72 61 6D 40   63 69 73 63 6F 2E 63 6F  [EMAIL PROTECTED]
0140: 6D 30 81 9F 30 0D 06 09   2A 86 48 86 F7 0D 01 01  m0..0...*.H.....
0150: 01 05 00 03 81 8D 00 30   81 89 02 81 81 00 AB 14  .......0........
0160: 92 13 00 17 0B C1 2B DF   2B 12 56 AF 3F 8E F4 8C  ......+.+.V.?...
0170: 49 F7 D3 47 0E ED 3D E4   6B ED 88 05 00 9C FD F0  I..G..=.k.......
0180: 88 7B D5 F1 FE A6 D7 84   7A CB B0 85 D3 67 74 DA  ........z....gt.
0190: A9 53 DC 84 67 8F 53 49   B2 DE 76 91 05 61 A5 BC  .S..g.SI..v..a..
01A0: B7 7B 28 22 22 9D 0D 4C   C2 06 40 0E D7 3F 44 9B  ..(""[EMAIL PROTECTED]
01B0: CA 9A FE 9E F3 E0 EB 89   E0 54 07 00 7D 04 D8 09  .........T......
01C0: 44 89 32 AF A9 6C E9 16   63 A9 42 46 53 61 80 00  D.2..l..c.BFSa..
01D0: 72 BE 59 5E B1 97 3D C8   03 7C 69 DE C0 F9 02 03  r.Y^..=...i.....
01E0: 01 00 01 30 0D 06 09 2A   86 48 86 F7 0D 01 01 04  ...0...*.H......
01F0: 05 00 03 81 81 00 9E 4A   63 A1 6A C6 2C 94 16 84  .......Jc.j.,...
0200: 96 94 02 FE 54 4F DD 51   28 1E 50 9F C1 14 21 3D  ....TO.Q(.P...!=
0210: 9D 35 1E 33 E4 68 FB F5   3D 3C 3E F9 8A 1A 21 63  .5.3.h..=<>...!c
0220: B7 1A 64 F3 FC D1 75 60   88 86 85 72 C8 BF 74 D1  ..d...u`...r..t.
0230: F0 93 5F 7B 32 84 86 B6   84 85 A1 B7 C1 76 FC 79  .._.2........v.y
0240: F6 AE 3A 61 3A 54 35 62   14 0C C3 BA 4B 26 8A 97  ..:a:T5b....K&..
0250: F7 BC A6 0D 87 18 C2 12   AF 6F AB 6B 64 6B 4D 7B  .........o.kdkM.
0260: FE 31 79 3E 94 4E F7 12   59 C9 32 8E 9F 0D 23 FA  .1y>.N..Y.2...#.
0270: F5 78 1F 37 6D F2                                  .x.7m.
main, READ:  sslv3 Handshake, length = 4
*** ServerHelloDone
[read] MD5 and SHA1 hashes:  len = 4
0000: 0E 00 00 00                                        ....
*** ClientKeyExchange, RSA PreMasterSecret, v3.0
Random Secret:  { 3, 0, 62, 188, 226, 249, 245, 14, 184, 189, 66, 213, 171, 96, 83, 
240, 124, 39, 4, 183, 229, 1, 234, 238, 77, 94, 250, 96, 218, 183, 129, 113, 25, 19, 
2, 109, 68, 167, 218, 125, 112, 36, 237, 144, 239, 26, 127, 19 }
[write] MD5 and SHA1 hashes:  len = 132
0000: 10 00 00 80 9A C7 CD 81   47 D7 C2 26 5F FE 18 86  ........G..&_...
0010: 93 98 3F F8 A9 1F F4 94   03 41 88 BD 33 ED 9F 05  ..?......A..3...
0020: 6F 6E 4E 90 41 7D 85 3A   4C 5E 2A A8 BE 14 33 6A  onN.A..:L^*...3j
0030: 21 29 5F B2 A8 F3 09 B6   D2 C0 E4 3E 04 AB 16 4D  !)_........>...M
0040: EA 90 C7 87 C5 BC 0A 14   86 62 BA 3F 12 D5 AE 51  .........b.?...Q
0050: 4A 71 79 D9 80 5E B3 44   7E 18 9B 15 DB E7 25 2B  Jqy..^.D......%+
0060: F9 9D 50 FD 5E 03 15 31   12 B0 CA 6E 6A A5 F7 91  ..P.^..1...nj...
0070: B5 52 28 F3 6A C2 C9 0C   10 00 A4 76 91 28 92 69  .R(.j......v.(.i
0080: D0 A2 AB 10                                        ....
main, WRITE:  sslv3 Handshake, length = 132
SESSION KEYGEN:
PreMaster Secret:
0000: 03 00 3E BC E2 F9 F5 0E   B8 BD 42 D5 AB 60 53 F0  ..>.......B..`S.
0010: 7C 27 04 B7 E5 01 EA EE   4D 5E FA 60 DA B7 81 71  .'......M^.`...q
0020: 19 13 02 6D 44 A7 DA 7D   70 24 ED 90 EF 1A 7F 13  ...mD...p$......
0030:                                                    
CONNECTION KEYGEN:
Client Nonce:
0000: 3F BE 0F 25 A0 DC E3 B8   9E 6B 76 19 A8 6C 99 63  ?..%.....kv..l.c
0010: 60 49 CD DE 71 E4 3C 86   1F DA 02 AB 41 5B 24 60  `I..q.<.....A[$`
0020:                                                    
Server Nonce:
0000: 3F BE 0C 6D 08 A5 CC B8   CE 41 0A 0B 02 92 4E 9B  ?..m.....A....N.
0010: 03 CC 49 2B 33 53 90 F2   D3 8E FE AA 17 70 19 57  ..I+3S.......p.W
0020:                                                    
Master Secret:
0000: 87 A8 A8 BF CA 8F 81 C8   67 1E BB 9E A7 2D E8 B3  ........g....-..
0010: 19 01 53 43 8D 93 E7 71   E4 B7 45 3D F4 FE C5 B3  ..SC...q..E=....
0020: 6C E8 78 88 1B 9E 42 EA   78 C3 4C F7 5E D8 7C 58  l.x...B.x.L.^..X
0030:                                                    
Client MAC write Secret:
0000: C5 3D 3E 9B 8F 4B D6 E5   7C 38 20 22 68 50 C1 F0  .=>..K...8 "hP..
0010: A0 C4 2C D1                                        ..,.
Server MAC write Secret:
0000: 4E CE 05 48 0C 4F CF DC   4D 2A F1 83 79 D6 47 E0  N..H.O..M*..y.G.
0010: 5E 12 45 A9                                        ^.E.
Client write key:
0000: 29 AF A3 7C 4B 4B 4C 21   DA 70 7D EF 7E A5 F4 21  )...KKL!.p.....!
0010:                                                    
Server write key:
0000: 8C 68 73 57 15 5A BB 64   89 6C ED 44 9D CB 78 FA  .hsW.Z.d.l.D..x.
0010:                                                    
... no IV for cipher
main, WRITE:  sslv3 Change Cipher Spec, length = 1
*** Finished
MD5 Hash:  { 186, 115, 39, 186, 243, 3, 20, 114, 177, 204, 46, 44, 212, 28, 156, 193 }
SHA1 Hash:  { 152, 204, 16, 72, 238, 220, 100, 123, 243, 87, 216, 107, 154, 232, 80, 
43, 9, 154, 43, 37 }
***
[write] MD5 and SHA1 hashes:  len = 40
0000: 14 00 00 24 BA 73 27 BA   F3 03 14 72 B1 CC 2E 2C  ...$.s'....r...,
0010: D4 1C 9C C1 98 CC 10 48   EE DC 64 7B F3 57 D8 6B  .......H..d..W.k
0020: 9A E8 50 2B 09 9A 2B 25                            ..P+..+%
Plaintext before ENCRYPTION:  len = 60
0000: 14 00 00 24 BA 73 27 BA   F3 03 14 72 B1 CC 2E 2C  ...$.s'....r...,
0010: D4 1C 9C C1 98 CC 10 48   EE DC 64 7B F3 57 D8 6B  .......H..d..W.k
0020: 9A E8 50 2B 09 9A 2B 25   43 3F 89 7C 47 15 DD 59  ..P+..+%C?..G..Y
0030: 15 64 89 94 A8 49 D8 7F   27 2C CD 10              .d...I..',..
main, WRITE:  sslv3 Handshake, length = 60
main, READ:  sslv3 Change Cipher Spec, length = 1
main, READ:  sslv3 Handshake, length = 60
Plaintext after DECRYPTION:  len = 60
0000: 14 00 00 24 00 9D 04 34   3D E3 5B 83 70 C1 B4 6E  ...$...4=.[.p..n
0010: C5 01 B9 8D B1 D6 3B 0E   4F 47 00 04 BE 50 14 B7  ......;.OG...P..
0020: 7F 45 78 1C 2D C0 0C B7   F0 CE F7 C4 05 AD 99 C7  .Ex.-...........
0030: 3E 19 E6 E7 D3 26 9A 4B   34 17 71 D6              >....&.K4.q.
*** Finished
MD5 Hash:  { 0, 157, 4, 52, 61, 227, 91, 131, 112, 193, 180, 110, 197, 1, 185, 141 }
SHA1 Hash:  { 177, 214, 59, 14, 79, 71, 0, 4, 190, 80, 20, 183, 127, 69, 120, 28, 45, 
192, 12, 183 }
***
%% Cached client session: [Session-1, SSL_RSA_EXPORT1024_WITH_RC4_56_SHA]
[read] MD5 and SHA1 hashes:  len = 40
0000: 14 00 00 24 00 9D 04 34   3D E3 5B 83 70 C1 B4 6E  ...$...4=.[.p..n
0010: C5 01 B9 8D B1 D6 3B 0E   4F 47 00 04 BE 50 14 B7  ......;.OG...P..
0020: 7F 45 78 1C 2D C0 0C B7                            .Ex.-...
Plaintext before ENCRYPTION:  len = 192
0000: 47 49 4F 50 01 02 00 00   00 00 00 A0 00 00 00 02  GIOP............
0010: 03 00 00 00 00 00 00 00   00 00 00 33 14 01 0F 00  ...........3....
0020: 4E 55 50 00 00 00 15 00   00 00 00 00 00 00 01 00  NUP.............
0030: 4E 61 6D 65 53 65 72 76   69 63 65 00 00 00 00 00  NameService.....
0040: 00 00 00 01 4E 61 6D 65   53 65 72 76 69 63 65 00  ....NameService.
0050: 00 00 00 06 5F 69 73 5F   61 00 00 00 00 00 00 02  ...._is_a.......
0060: 56 49 53 03 00 00 00 00   00 00 00 01 00 00 00 0C  VIS.............
0070: 00 00 00 00 00 01 00 01   00 01 01 09 00 00 00 00  ................
0080: 00 00 00 28 49 44 4C 3A   6F 6D 67 2E 6F 72 67 2F  ...(IDL:omg.org/
0090: 43 6F 73 4E 61 6D 69 6E   67 2F 4E 61 6D 69 6E 67  CosNaming/Naming
00A0: 43 6F 6E 74 65 78 74 3A   31 2E 30 00 3E 03 3B 2E  Context:1.0.>.;.
00B0: 45 08 22 0C 00 D8 81 28   DF 75 29 95 DF C6 F5 72  E."....(.u)....r
00C0:                                                    
main, WRITE:  sslv3 Application Data, length = 192
00000029,11/21/03 5:12 
AM,172.019.072.119,00013440,VBJ-Application,main,DEBUG,SSLConnection.write complete
00000030,11/21/03 5:12 
AM,172.019.072.119,00013440,VBJ-Application,main,DEBUG,SSLConnection reading 12 bytes 
at offset 0 from 
sslSocket[addr=codc3-xdm1.cisco.com/192.122.173.179,port=4433,localport=41474] ... 
00000029,11/21/03 5:11 AM,172.019.072.119,00013403,VBJ-Application,main,INFO,trying to 
reconnect..
00000030,11/21/03 5:11 AM,172.019.072.119,00013403,VBJ-Application,main,NOTICE,Created 
a new outgoing connection: SSLConnection 
(null)[sslSocket[addr=craft-gsr-4/172.19.75.39,port=10002,localport=41471]]
Adding to active connections: SSLConnection 
(null)[sslSocket[addr=craft-gsr-4/172.19.75.39,port=10002,localport=41471]]
00000031,11/21/03 5:11 
AM,172.019.072.119,00013403,VBJ-Application,main,INFO,reconnected
requesting short key
00000032,11/21/03 5:11 AM,172.019.072.119,00013403,VBJ-Application,main,DEBUG,Entering 
into SSL handshake PeerAuthenticationPolicy = REQUEST
00000033,11/21/03 5:11 
AM,172.019.072.119,00013403,VBJ-Application,main,DEBUG,SSLConnection writing 172 bytes 
at offset 0 to sslSocket[addr=craft-gsr-4/172.19.75.39,port=10002,localport=41471] ... 
%% No cached client session
*** ClientHello, v3.0
RandomCookie:  GMT: 1052643094 bytes = { 107, 162, 240, 210, 12, 70, 67, 195, 170, 
205, 65, 93, 251, 69, 57, 106, 106, 161, 227, 167, 180, 194, 232, 53, 5, 119, 0, 11 }
Session ID:  {}
Cipher Suites:  { 0, 100, 0, 98, 0, 3, 0, 8, 0, 1, 0, 2, 0, 23, 0, 25 }
Compression Methods:  { 0 }
***
[write] MD5 and SHA1 hashes:  len = 59
0000: 01 00 00 37 03 00 3F BE   0F 16 6B A2 F0 D2 0C 46  ...7..?...k....F
0010: 43 C3 AA CD 41 5D FB 45   39 6A 6A A1 E3 A7 B4 C2  C...A].E9jj.....
0020: E8 35 05 77 00 0B 00 00   10 00 64 00 62 00 03 00  .5.w......d.b...
0030: 08 00 01 00 02 00 17 00   19 01 00                 ...........
main, WRITE:  sslv3 Handshake, length = 59
[write] MD5 and SHA1 hashes:  len = 65
0000: 01 03 00 00 18 00 00 00   20 00 00 64 00 00 62 00  ........ ..d..b.
0010: 00 03 00 00 08 00 00 01   00 00 02 00 00 17 00 00  ................
0020: 19 3F BE 0F 16 6B A2 F0   D2 0C 46 43 C3 AA CD 41  .?...k....FC...A
0030: 5D FB 45 39 6A 6A A1 E3   A7 B4 C2 E8 35 05 77 00  ].E9jj......5.w.
0040: 0B                                                 .
main, WRITE:  sslv2, contentType = 22, translated length = 16322
main, READ:  sslv3 Handshake, length = 74
*** ServerHello, v3.0
RandomCookie:  GMT: 0 bytes = { 63, 188, 194, 13, 169, 218, 204, 9, 234, 132, 242, 
214, 253, 141, 181, 39, 41, 239, 150, 51, 24, 129, 143, 210, 171, 214, 169, 15 }
Session ID:  {219, 110, 134, 22, 124, 174, 9, 88, 245, 255, 159, 219, 148, 88, 77, 96, 
204, 211, 121, 182, 151, 75, 205, 186, 46, 2, 205, 60, 218, 93, 187, 39}
Cipher Suite:  { 0, 98 }
Compression Method: 0
***
%% Created:  [Session-1, SSL_RSA_EXPORT1024_WITH_DES_CBC_SHA]
** SSL_RSA_EXPORT1024_WITH_DES_CBC_SHA
[read] MD5 and SHA1 hashes:  len = 74
0000: 02 00 00 46 03 00 00 00   00 00 3F BC C2 0D A9 DA  ...F......?.....
0010: CC 09 EA 84 F2 D6 FD 8D   B5 27 29 EF 96 33 18 81  .........')..3..
0020: 8F D2 AB D6 A9 0F 20 DB   6E 86 16 7C AE 09 58 F5  ...... .n.....X.
0030: FF 9F DB 94 58 4D 60 CC   D3 79 B6 97 4B CD BA 2E  ....XM`..y..K...
0040: 02 CD 3C DA 5D BB 27 00   62 00                    ..<.].'.b.
main, READ:  sslv3 Handshake, length = 885
*** Certificate chain
chain [0] = [
  X.509v3 certificate,
  Subject is CN=craft-gsr-4.cisco.com, O=Cisco Systems
  Key:  algorithm = [RSA], exponent = 0x    010001, modulus = 
    b1c4644b 52fdbbb2 8ba4572f e89ae1dc 4b323f35 6cd5525c 40315ee9 a8ff8103
    3dad7799 56442b7a 0dea36c1 1c85f2f5 b8cffe53 e0146b43 2d1feabb 1d4cbb59
    b959bd75 54868cfc f1582dc4 878d8232 7408631a eb4c35f6 6052f4b4 2e912ed0
    73d31a79 33834cc6 941debd9 f85ea87d 9f12a8a8 7773e06d df7f11bc abe7a8a3
  Validity <Fri Nov 21 03:09:02 PST 2003> until <Fri Nov 28 03:09:02 PST 2003>
  Issuer is CN=Root coax-u10 Certificate Manager, OU=HFR, O=Cisco Systems, L=San Jose, 
S=CA, C=US
  Issuer signature used [MD5withRSA]
  Serial number =     016a
]
***
[read] MD5 and SHA1 hashes:  len = 885
0000: 0B 00 03 71 00 03 6E 00   03 6B 30 82 03 67 30 82  ...q..n..k0..g0.
0010: 02 4F A0 03 02 01 02 02   02 01 6A 30 0D 06 09 2A  .O........j0...*
0020: 86 48 86 F7 0D 01 01 04   05 00 30 7F 31 0B 30 09  .H........0.1.0.
0030: 06 03 55 04 06 13 02 55   53 31 0B 30 09 06 03 55  ..U....US1.0...U
0040: 04 08 13 02 43 41 31 11   30 0F 06 03 55 04 07 13  ....CA1.0...U...
0050: 08 53 61 6E 20 4A 6F 73   65 31 16 30 14 06 03 55  .San Jose1.0...U
0060: 04 0A 13 0D 43 69 73 63   6F 20 53 79 73 74 65 6D  ....Cisco System
0070: 73 31 0C 30 0A 06 03 55   04 0B 13 03 48 46 52 31  s1.0...U....HFR1
0080: 2A 30 28 06 03 55 04 03   13 21 52 6F 6F 74 20 63  *0(..U...!Root c
0090: 6F 61 78 2D 75 31 30 20   43 65 72 74 69 66 69 63  oax-u10 Certific
00A0: 61 74 65 20 4D 61 6E 61   67 65 72 30 1E 17 0D 30  ate Manager0...0
00B0: 33 31 31 32 31 31 31 30   39 30 32 5A 17 0D 30 33  31121110902Z..03
00C0: 31 31 32 38 31 31 30 39   30 32 5A 30 38 31 16 30  1128110902Z081.0
00D0: 14 06 03 55 04 0A 13 0D   43 69 73 63 6F 20 53 79  ...U....Cisco Sy
00E0: 73 74 65 6D 73 31 1E 30   1C 06 03 55 04 03 13 15  stems1.0...U....
00F0: 63 72 61 66 74 2D 67 73   72 2D 34 2E 63 69 73 63  craft-gsr-4.cisc
0100: 6F 2E 63 6F 6D 30 81 9F   30 0D 06 09 2A 86 48 86  o.com0..0...*.H.
0110: F7 0D 01 01 01 05 00 03   81 8D 00 30 81 89 02 81  ...........0....
0120: 81 00 B1 C4 64 4B 52 FD   BB B2 8B A4 57 2F E8 9A  ....dKR.....W/..
0130: E1 DC 4B 32 3F 35 6C D5   52 5C 40 31 5E E9 A8 FF  [EMAIL PROTECTED]
0140: 81 03 3D AD 77 99 56 44   2B 7A 0D EA 36 C1 1C 85  ..=.w.VD+z..6...
0150: F2 F5 B8 CF FE 53 E0 14   6B 43 2D 1F EA BB 1D 4C  .....S..kC-....L
0160: BB 59 B9 59 BD 75 54 86   8C FC F1 58 2D C4 87 8D  .Y.Y.uT....X-...
0170: 82 32 74 08 63 1A EB 4C   35 F6 60 52 F4 B4 2E 91  .2t.c..L5.`R....
0180: 2E D0 73 D3 1A 79 33 83   4C C6 94 1D EB D9 F8 5E  ..s..y3.L......^
0190: A8 7D 9F 12 A8 A8 77 73   E0 6D DF 7F 11 BC AB E7  ......ws.m......
01A0: A8 A3 02 03 01 00 01 A3   81 B7 30 81 B4 30 0E 06  ..........0..0..
01B0: 03 55 1D 0F 01 01 FF 04   04 03 02 05 A0 30 20 06  .U...........0 .
01C0: 03 55 1D 11 04 19 30 17   82 15 63 72 61 66 74 2D  .U....0...craft-
01D0: 67 73 72 2D 34 2E 63 69   73 63 6F 2E 63 6F 6D 30  gsr-4.cisco.com0
01E0: 1F 06 03 55 1D 23 04 18   30 16 80 14 88 F6 FF F3  ...U.#..0.......
01F0: F1 2A 7D A1 25 B7 5E 8B   66 5B DB 7E 5E 3B D5 FE  .*..%.^.f[..^;..
0200: 30 5F 06 03 55 1D 1F 04   58 30 56 30 54 A0 52 A0  0_..U...X0V0T.R.
0210: 50 86 4E 6C 64 61 70 3A   2F 2F 63 6F 61 78 2D 75  P.Nldap://coax-u
0220: 31 30 2E 63 69 73 63 6F   2E 63 6F 6D 2F 43 4E 3D  10.cisco.com/CN=
0230: 52 6F 6F 74 20 63 6F 61   78 2D 75 31 30 20 43 65  Root coax-u10 Ce
0240: 72 74 69 66 69 63 61 74   65 20 4D 61 6E 61 67 65  rtificate Manage
0250: 72 2C 4F 3D 43 69 73 63   6F 20 53 79 73 74 65 6D  r,O=Cisco System
0260: 73 30 0D 06 09 2A 86 48   86 F7 0D 01 01 04 05 00  s0...*.H........
0270: 03 82 01 01 00 83 8C 69   6E 14 A4 A6 F6 47 28 45  .......in....G(E
0280: 79 4A 33 83 94 D4 43 CB   41 B6 99 F0 9A C6 5C 32  yJ3...C.A.....\2
0290: 92 98 08 9E DB 6E 78 13   71 A6 A1 DD C1 61 2D A2  .....nx.q....a-.
02A0: 35 D0 48 06 13 BE EE F4   A7 4E F5 8C F8 84 89 E5  5.H......N......
02B0: BB 95 B7 5B 20 1D 8C E5   93 35 CD 04 0B 49 21 4A  ...[ ....5...I!J
02C0: C8 05 A1 CC 33 89 8E 2E   B5 BE 48 4F 4A EE 67 A5  ....3.....HOJ.g.
02D0: 58 D6 6E 67 8F B6 7A 0C   51 4E E7 C3 FA F9 52 BD  X.ng..z.QN....R.
02E0: 7A CE 27 61 02 30 25 C3   B2 38 B8 95 BD C7 1F 88  z.'a.0%..8......
02F0: AC A3 BE 4B 7C FF 96 33   34 65 50 63 C0 3E 70 3D  ...K...34ePc.>p=
0300: F6 D4 3D 4E 1A F4 2A 85   DF 56 0C 81 6C 1F 11 44  ..=N..*..V..l..D
0310: 03 1F C9 76 58 11 54 88   F5 0B C7 54 52 4B 01 DF  ...vX.T....TRK..
0320: 7D DC B0 A6 57 DD 7D E1   07 0F 91 E5 BB C5 A1 1E  ....W...........
0330: 91 9B 58 83 7E A5 F9 0C   53 7A E4 92 EE 55 74 4E  ..X.....Sz...UtN
0340: 26 5C CE 82 C6 5E 03 54   C9 FE 04 2C 2B 3F 7B 7F  &\...^.T...,+?..
0350: 96 41 1E EE BC F8 36 DC   79 DA 8F 3E 86 7B 0E CD  .A....6.y..>....
0360: 0C 45 12 EB D5 C7 A5 31   4C 26 86 A3 9F E8 F5 EC  .E.....1L&......
0370: 30 AD F0 23 B1                                     0..#.
main, READ:  sslv3 Handshake, length = 4
*** ServerHelloDone
[read] MD5 and SHA1 hashes:  len = 4
0000: 0E 00 00 00                                        ....
*** ClientKeyExchange, RSA PreMasterSecret, v3.0
Random Secret:  { 3, 0, 104, 127, 132, 10, 242, 102, 235, 56, 45, 161, 233, 154, 134, 
241, 9, 222, 11, 188, 181, 13, 36, 54, 144, 192, 87, 185, 151, 199, 34, 69, 162, 129, 
31, 101, 248, 217, 253, 96, 63, 50, 55, 30, 196, 33, 237, 240 }
[write] MD5 and SHA1 hashes:  len = 132
0000: 10 00 00 80 9D AE 38 58   25 CF 4A 35 87 41 8D 16  ......8X%.J5.A..
0010: FA 91 B1 3E 39 9F D9 B0   DA 44 74 AC 52 CF 54 BC  ...>9....Dt.R.T.
0020: A1 58 93 EC 01 82 A8 2C   69 EA 40 E2 E3 06 F8 CB  .X.....,[EMAIL PROTECTED]
0030: 3B F2 2B AC B1 38 26 48   CB BC 74 DD D2 02 36 13  ;.+..8&H..t...6.
0040: 00 5C 6B 03 14 8C AB D7   0C 96 57 8C EC 15 BC D8  .\k.......W.....
0050: 60 87 37 72 2E A3 81 A2   1E 14 D7 93 86 C8 C7 DC  `.7r............
0060: 63 56 F7 E9 2B A8 B4 C0   AC D9 10 E1 09 A7 19 7D  cV..+...........
0070: ED C4 9A 10 88 CC 22 6F   08 37 AA A2 14 85 DA D8  ......"o.7......
0080: 88 B6 9C 24                                        ...$
main, WRITE:  sslv3 Handshake, length = 132
SESSION KEYGEN:
PreMaster Secret:
0000: 03 00 68 7F 84 0A F2 66   EB 38 2D A1 E9 9A 86 F1  ..h....f.8-.....
0010: 09 DE 0B BC B5 0D 24 36   90 C0 57 B9 97 C7 22 45  ......$6..W..."E
0020: A2 81 1F 65 F8 D9 FD 60   3F 32 37 1E C4 21 ED F0  ...e...`?27..!..
0030:                                                    
CONNECTION KEYGEN:
Client Nonce:
0000: 3F BE 0F 16 6B A2 F0 D2   0C 46 43 C3 AA CD 41 5D  ?...k....FC...A]
0010: FB 45 39 6A 6A A1 E3 A7   B4 C2 E8 35 05 77 00 0B  .E9jj......5.w..
0020:                                                    
Server Nonce:
0000: 00 00 00 00 3F BC C2 0D   A9 DA CC 09 EA 84 F2 D6  ....?...........
0010: FD 8D B5 27 29 EF 96 33   18 81 8F D2 AB D6 A9 0F  ...')..3........
0020:                                                    
Master Secret:
0000: 02 05 30 9F 96 FF 50 7C   01 AE A7 99 4D 00 6A 45  ..0...P.....M.jE
0010: 03 97 7C 15 B1 E0 9B 2C   E8 35 79 69 1B 8C 5F 6C  .......,.5yi.._l
0020: 66 12 F7 38 C2 63 CE 1E   EA 06 30 04 B1 32 7D 71  f..8.c....0..2.q
0030:                                                    
Client MAC write Secret:
0000: C7 0B 55 37 99 29 22 1B   62 C7 16 5C 64 8D B1 0B  ..U7.)".b..\d...
0010: 57 4B 10 78                                        WK.x
Server MAC write Secret:
0000: 24 4D 14 A1 9A AB 7B 0E   DA 4A 89 D0 B6 F2 96 84  $M.......J......
0010: E6 0A D7 C4                                        ....
Client write key:
0000: BD 05 D4 EC C7 76 AE D8                            .....v..
Server write key:
0000: 92 9F 59 A5 AD 10 EE 17                            ..Y.....
Client write IV:
0000: 27 83 93 2A 9F FB 1E 7F                            '..*....
Server write IV:
0000: F3 97 3C 24 BC 9E AA AF                            ..<$....
main, WRITE:  sslv3 Change Cipher Spec, length = 1
*** Finished
MD5 Hash:  { 77, 236, 146, 233, 234, 214, 56, 58, 187, 92, 169, 9, 82, 214, 54, 154 }
SHA1 Hash:  { 35, 29, 79, 221, 84, 13, 59, 181, 112, 223, 217, 200, 182, 66, 9, 165, 
49, 223, 207, 120 }
***
[write] MD5 and SHA1 hashes:  len = 40
0000: 14 00 00 24 4D EC 92 E9   EA D6 38 3A BB 5C A9 09  ...$M.....8:.\..
0010: 52 D6 36 9A 23 1D 4F DD   54 0D 3B B5 70 DF D9 C8  R.6.#.O.T.;.p...
0020: B6 42 09 A5 31 DF CF 78                            .B..1..x
Padded plaintext before ENCRYPTION:  len = 64
0000: 14 00 00 24 4D EC 92 E9   EA D6 38 3A BB 5C A9 09  ...$M.....8:.\..
0010: 52 D6 36 9A 23 1D 4F DD   54 0D 3B B5 70 DF D9 C8  R.6.#.O.T.;.p...
0020: B6 42 09 A5 31 DF CF 78   7C AE D7 6F 84 64 AE 85  .B..1..x...o.d..
0030: BA 13 3D E3 8A 82 13 74   E5 2C E5 B9 03 03 03 03  ..=....t.,......
0040:                                                    
main, WRITE:  sslv3 Handshake, length = 64
main, READ:  sslv3 Alert, length = 2
main, RECV SSLv3 ALERT:  fatal, handshake_failure
EOFexception: couldn't read, peer disconnected
com.inprise.security.ssl.HandshakeFailureException: Received fatal alert: 
handshake_failure
        at com.inprise.security.ssl.SSLSocketImpl.recvAlert(SSLSocketImpl.java:1122)
        at com.inprise.security.ssl.SSLSocketImpl.clearPipeline(SSLSocketImpl.java:847)
        at com.inprise.security.ssl.SSLSocketImpl.write(SSLSocketImpl.java:592)
        at com.inprise.security.ssl.AppOutputStream.write(AppOutputStream.java:71)
        at com.inprise.security.ssl.SSLConnection.write(SSLConnection.java:314)
        at com.inprise.vbroker.GIOP.OutputStream.write(OutputStream.java:168)
        at 
com.inprise.vbroker.GIOP.OutputStream.writeUnfragmented(OutputStream.java:143)
        at com.inprise.vbroker.GIOP.OutputStream.writeFragmented(OutputStream.java:78)
        at com.inprise.vbroker.GIOP.Message.write(Message.java:107)
        at 
com.inprise.vbroker.GIOP.GiopConnection.send_message(GiopConnection.java:262)
        at 
com.inprise.vbroker.GIOP.GiopConnection.send_message(GiopConnection.java:229)
        at 
com.inprise.vbroker.GIOP.ProtocolConnector.invoke(ProtocolConnector.java:605)
        at com.inprise.vbroker.GIOP.ProtocolConnector.is_a(ProtocolConnector.java:667)
        at 
com.inprise.vbroker.interceptor.ChainClientInterceptor.is_a(ChainClientInterceptor.java:330)
        at com.inprise.vbroker.orb.DelegateImpl.is_a(DelegateImpl.java:989)
        at org.omg.CORBA.portable.ObjectImpl._is_a(ObjectImpl.java:109)
        at org.omg.CosNaming.NamingContextHelper.narrow(NamingContextHelper.java:47)
        at myTest1.main(myTest1.java:31)
org.omg.CORBA.NO_PERMISSION:   minor code: 9027  completed: No
        at com.inprise.vbroker.orb.DelegateImpl.handleException(DelegateImpl.java:692)
        at com.inprise.vbroker.orb.DelegateImpl.is_a(DelegateImpl.java:1000)
        at org.omg.CORBA.portable.ObjectImpl._is_a(ObjectImpl.java:109)
        at org.omg.CosNaming.NamingContextHelper.narrow(NamingContextHelper.java:47)
        at myTest1.main(myTest1.java:31)

Attachment: serverlogforclient2.log
Description: serverlogforclient2.log



Reply via email to