Hello, I've been trying to get SSL client auth to work using a simple URL client. The command line looks like the following:
java -Djava.protocol.handler.pkgs=com.sun.net.ssl.internal.www.protocol -Djavax.net.ssl.trustStore=matt.jks -Djavax.net.debug=all URLClient https://akula.geek.ca/ >out 2>&1 The output can be seen at the bottom of this message. I've searched around quite a lot for answers but I couldn't find any. I have two keystores, one with the certificate being used by Tomcat as per the SSL-Howto + a trusted cert entry from the client which is in the keystore matt,jks, which has tomcat's certificate imported as a trusted cert. Just as a test, I removed the -Dcom.sun.net.ssl.trustStore variable, and predictably, the failure was related to not trusting the server cert, which leads me to believe my setup is reasonable. Tomcat client auth does work when I use Mozilla and a Thawte freemail certificate. Can anyone help? It sure would be appreciated. --Matt -- ssl debug -- keyStore is : keyStore type is : jks init keystore init keymanager of type SunX509 trustStore is: matt.jks trustStore type is : jks init truststore adding as trusted cert: [ [ Version: V1 Subject: CN=akula.geek.ca, OU=Web Ops, O=The Geek Cartel, L=Vancouver, ST=British Columbia, C=CA Signature Algorithm: MD5withRSA, OID = 1.2.840.113549.1.1.4 Key: com.sun.rsajca.JSA_RSAPublicKey@20aea8 Validity: [From: Wed Jul 17 19:54:05 PDT 2002, To: Thu Jul 17 19:54:05 PDT 2003] Issuer: CN=akula.geek.ca, OU=Web Ops, O=The Geek Cartel, L=Vancouver, ST=British Columbia, C=CA SerialNumber: [ 3d362dcd ] ] Algorithm: [MD5withRSA] Signature: 0000: 6A 86 D4 89 04 9B 4C CF BC 15 82 86 F0 63 21 BC j.....L......c!. 0010: 09 B3 6A 69 84 0B 6C 69 E7 DC F1 EC BE 4A E9 BB ..ji..li.....J.. 0020: E3 94 BD FF 10 B5 87 45 9C 12 34 8F 61 E5 4E E1 .......E..4.a.N. 0030: 6F E8 44 AD B7 81 60 C7 7E 99 88 54 0E 97 C2 51 o.D...`....T...Q 0040: 37 70 83 0C 2D 20 98 41 1B 98 E3 9D 22 82 FF C8 7p..- .A...."... 0050: 26 01 73 46 75 5D 3F 8F 60 00 21 41 2E 64 02 97 &.sFu]?.`.!A.d.. 0060: 5F D1 44 CF 47 7D 22 AA 99 91 FA BA 02 D2 AD 95 _.D.G."......... 0070: BF 80 A4 A9 06 DB B3 7A CA 0F C0 7D 32 50 54 D0 .......z....2PT. ] adding private entry as trusted cert: [ [ Version: V1 Subject: CN=Matt, OU=MattCo, O=MattCo Intl, L=Vancouber, ST=BC, C=CA Signature Algorithm: SHA1withDSA, OID = 1.2.840.10040.4.3 Key: Sun DSA Public Key Parameters:DSA p: fd7f5381 1d751229 52df4a9c 2eece4e7 f611b752 3cef4400 c31e3f80 b6512669 455d4022 51fb593d 8d58fabf c5f5ba30 f6cb9b55 6cd7813b 801d346f f26660b7 6b9950a5 a49f9fe8 047b1022 c24fbba9 d7feb7c6 1bf83b57 e7c6a8a6 150f04fb 83f6d3c5 1ec30235 54135a16 9132f675 f3ae2b61 d72aeff2 2203199d d14801c7 q: 9760508f 15230bcc b292b982 a2eb840b f0581cf5 g: f7e1a085 d69b3dde cbbcab5c 36b857b9 7994afbb fa3aea82 f9574c0b 3d078267 5159578e bad4594f e6710710 8180b449 167123e8 4c281613 b7cf0932 8cc8a6e1 3c167a8b 547c8d28 e0a3ae1e 2bb3a675 916ea37f 0bfa2135 62f1fb62 7a01243b cca4f1be a8519089 a883dfe1 5ae59f06 928b665e 807b5525 64014c3b fecf492a y: 8f48952d e95738ee 0a2f626f d4afb579 b5d49f19 c2f7015d 8a8d591b cc526cda 54420f18 95fc8024 ab665942 939f2001 0506f209 46c2e3f3 a59c35fa d6ee2610 ef3f2def edc80a69 89d407fd c8c7e1a1 89644276 12ea915d 57182ce5 5f7e08b0 90eb4f3d 22f57351 f1b9ae88 7ce43014 9109b378 71058eac 0107f75d b56798f3 Validity: [From: Wed Jul 17 20:30:01 PDT 2002, To: Tue Oct 15 20:30:01 PDT 2002] Issuer: CN=Matt, OU=MattCo, O=MattCo Intl, L=Vancouber, ST=BC, C=CA SerialNumber: [ 3d363639 ] ] Algorithm: [SHA1withDSA] Signature: 0000: 30 2C 02 14 53 FA 7A 1F 37 D8 F8 04 CB 0A 44 18 0,..S.z.7.....D. 0010: 3F 1E C8 44 C2 9A 41 53 02 14 41 A9 A7 43 EB 02 ?..D..AS..A..C.. 0020: 6A CA EF CB 43 73 63 FA 14 94 12 E5 37 56 j...Csc.....7V ] init context trigger seeding of SecureRandom done seeding SecureRandom %% No cached client session *** ClientHello, v3.1 RandomCookie: GMT: 1026965420 bytes = { 108, 14, 130, 201, 213, 23, 156, 175, 170, 32, 66, 108, 200, 212, 161, 31, 154, 113, 99, 220, 220, 105, 95, 183, 130, 93, 79, 102 } Session ID: {} Cipher Suites: { 0, 5, 0, 4, 0, 9, 0, 10, 0, 18, 0, 19, 0, 3, 0, 17 } Compression Methods: { 0 } *** [write] MD5 and SHA1 hashes: len = 59 0000: 01 00 00 37 03 01 3D 36 40 AC 6C 0E 82 C9 D5 17 ...7..=6@.l..... 0010: 9C AF AA 20 42 6C C8 D4 A1 1F 9A 71 63 DC DC 69 ... Bl.....qc..i 0020: 5F B7 82 5D 4F 66 00 00 10 00 05 00 04 00 09 00 _..]Of.......... 0030: 0A 00 12 00 13 00 03 00 11 01 00 ........... main, WRITE: SSL v3.1 Handshake, length = 59 [write] MD5 and SHA1 hashes: len = 77 0000: 01 03 01 00 24 00 00 00 20 00 00 05 00 00 04 01 ....$... ....... 0010: 00 80 00 00 09 06 00 40 00 00 0A 07 00 C0 00 00 .......@........ 0020: 12 00 00 13 00 00 03 02 00 80 00 00 11 3D 36 40 .............=6@ 0030: AC 6C 0E 82 C9 D5 17 9C AF AA 20 42 6C C8 D4 A1 .l........ Bl... 0040: 1F 9A 71 63 DC DC 69 5F B7 82 5D 4F 66 ..qc..i_..]Of main, WRITE: SSL v2, contentType = 22, translated length = 16310 main, READ: SSL v3.1 Handshake, length = 1001 *** ServerHello, v3.1 RandomCookie: GMT: 1026965420 bytes = { 242, 192, 192, 194, 10, 102, 94, 61, 176, 11, 218, 205, 193, 249, 93, 36, 69, 180, 165, 80, 74, 47, 0, 47, 109, 204, 155, 222 } Session ID: {61, 54, 64, 172, 12, 17, 155, 249, 210, 243, 237, 198, 99, 113, 86, 232, 70, 32, 159, 252, 83, 83, 72, 196, 158, 12, 73, 145, 61, 170, 203, 51} Cipher Suite: { 0, 5 } Compression Method: 0 *** %% Created: [Session-1, SSL_RSA_WITH_RC4_128_SHA] ** SSL_RSA_WITH_RC4_128_SHA [read] MD5 and SHA1 hashes: len = 74 0000: 02 00 00 46 03 01 3D 36 40 AC F2 C0 C0 C2 0A 66 ...F..=6@......f 0010: 5E 3D B0 0B DA CD C1 F9 5D 24 45 B4 A5 50 4A 2F ^=......]$E..PJ/ 0020: 00 2F 6D CC 9B DE 20 3D 36 40 AC 0C 11 9B F9 D2 ./m... =6@...... 0030: F3 ED C6 63 71 56 E8 46 20 9F FC 53 53 48 C4 9E ...cqV.F ..SSH.. 0040: 0C 49 91 3D AA CB 33 00 05 00 .I.=..3... *** Certificate chain chain [0] = [ [ Version: V1 Subject: CN=akula.geek.ca, OU=Web Ops, O=The Geek Cartel, L=Vancouver, ST=British Columbia, C=CA Signature Algorithm: MD5withRSA, OID = 1.2.840.113549.1.1.4 Key: com.sun.rsajca.JSA_RSAPublicKey@435cac Validity: [From: Wed Jul 17 19:54:05 PDT 2002, To: Thu Jul 17 19:54:05 PDT 2003] Issuer: CN=akula.geek.ca, OU=Web Ops, O=The Geek Cartel, L=Vancouver, ST=British Columbia, C=CA SerialNumber: [ 3d362dcd ] ] Algorithm: [MD5withRSA] Signature: 0000: 6A 86 D4 89 04 9B 4C CF BC 15 82 86 F0 63 21 BC j.....L......c!. 0010: 09 B3 6A 69 84 0B 6C 69 E7 DC F1 EC BE 4A E9 BB ..ji..li.....J.. 0020: E3 94 BD FF 10 B5 87 45 9C 12 34 8F 61 E5 4E E1 .......E..4.a.N. 0030: 6F E8 44 AD B7 81 60 C7 7E 99 88 54 0E 97 C2 51 o.D...`....T...Q 0040: 37 70 83 0C 2D 20 98 41 1B 98 E3 9D 22 82 FF C8 7p..- .A...."... 0050: 26 01 73 46 75 5D 3F 8F 60 00 21 41 2E 64 02 97 &.sFu]?.`.!A.d.. 0060: 5F D1 44 CF 47 7D 22 AA 99 91 FA BA 02 D2 AD 95 _.D.G."......... 0070: BF 80 A4 A9 06 DB B3 7A CA 0F C0 7D 32 50 54 D0 .......z....2PT. ] *** stop on trusted cert: [ [ Version: V1 Subject: CN=akula.geek.ca, OU=Web Ops, O=The Geek Cartel, L=Vancouver, ST=British Columbia, C=CA Signature Algorithm: MD5withRSA, OID = 1.2.840.113549.1.1.4 Key: com.sun.rsajca.JSA_RSAPublicKey@435cac Validity: [From: Wed Jul 17 19:54:05 PDT 2002, To: Thu Jul 17 19:54:05 PDT 2003] Issuer: CN=akula.geek.ca, OU=Web Ops, O=The Geek Cartel, L=Vancouver, ST=British Columbia, C=CA SerialNumber: [ 3d362dcd ] ] Algorithm: [MD5withRSA] Signature: 0000: 6A 86 D4 89 04 9B 4C CF BC 15 82 86 F0 63 21 BC j.....L......c!. 0010: 09 B3 6A 69 84 0B 6C 69 E7 DC F1 EC BE 4A E9 BB ..ji..li.....J.. 0020: E3 94 BD FF 10 B5 87 45 9C 12 34 8F 61 E5 4E E1 .......E..4.a.N. 0030: 6F E8 44 AD B7 81 60 C7 7E 99 88 54 0E 97 C2 51 o.D...`....T...Q 0040: 37 70 83 0C 2D 20 98 41 1B 98 E3 9D 22 82 FF C8 7p..- .A...."... 0050: 26 01 73 46 75 5D 3F 8F 60 00 21 41 2E 64 02 97 &.sFu]?.`.!A.d.. 0060: 5F D1 44 CF 47 7D 22 AA 99 91 FA BA 02 D2 AD 95 _.D.G."......... 0070: BF 80 A4 A9 06 DB B3 7A CA 0F C0 7D 32 50 54 D0 .......z....2PT. ] [read] MD5 and SHA1 hashes: len = 642 0000: 0B 00 02 7E 00 02 7B 00 02 78 30 82 02 74 30 82 .........x0..t0. 0010: 01 DD 02 04 3D 36 2D CD 30 0D 06 09 2A 86 48 86 ....=6-.0...*.H. 0020: F7 0D 01 01 04 05 00 30 81 80 31 0B 30 09 06 03 .......0..1.0... 0030: 55 04 06 13 02 43 41 31 19 30 17 06 03 55 04 08 U....CA1.0...U.. 0040: 13 10 42 72 69 74 69 73 68 20 43 6F 6C 75 6D 62 ..British Columb 0050: 69 61 31 12 30 10 06 03 55 04 07 13 09 56 61 6E ia1.0...U....Van 0060: 63 6F 75 76 65 72 31 18 30 16 06 03 55 04 0A 13 couver1.0...U... 0070: 0F 54 68 65 20 47 65 65 6B 20 43 61 72 74 65 6C .The Geek Cartel 0080: 31 10 30 0E 06 03 55 04 0B 13 07 57 65 62 20 4F 1.0...U....Web O 0090: 70 73 31 16 30 14 06 03 55 04 03 13 0D 61 6B 75 ps1.0...U....aku 00A0: 6C 61 2E 67 65 65 6B 2E 63 61 30 1E 17 0D 30 32 la.geek.ca0...02 00B0: 30 37 31 38 30 32 35 34 30 35 5A 17 0D 30 33 30 0718025405Z..030 00C0: 37 31 38 30 32 35 34 30 35 5A 30 81 80 31 0B 30 718025405Z0..1.0 00D0: 09 06 03 55 04 06 13 02 43 41 31 19 30 17 06 03 ...U....CA1.0... 00E0: 55 04 08 13 10 42 72 69 74 69 73 68 20 43 6F 6C U....British Col 00F0: 75 6D 62 69 61 31 12 30 10 06 03 55 04 07 13 09 umbia1.0...U.... 0100: 56 61 6E 63 6F 75 76 65 72 31 18 30 16 06 03 55 Vancouver1.0...U 0110: 04 0A 13 0F 54 68 65 20 47 65 65 6B 20 43 61 72 ....The Geek Car 0120: 74 65 6C 31 10 30 0E 06 03 55 04 0B 13 07 57 65 tel1.0...U....We 0130: 62 20 4F 70 73 31 16 30 14 06 03 55 04 03 13 0D b Ops1.0...U.... 0140: 61 6B 75 6C 61 2E 67 65 65 6B 2E 63 61 30 81 9F akula.geek.ca0.. 0150: 30 0D 06 09 2A 86 48 86 F7 0D 01 01 01 05 00 03 0...*.H......... 0160: 81 8D 00 30 81 89 02 81 81 00 E1 F1 D8 E3 F6 1A ...0............ 0170: 2E ED BF 45 D0 CD 7F B8 25 46 49 E5 4A D8 AE 80 ...E....%FI.J... 0180: 7A 7A 7C F2 23 6B 7B C5 7F 3E 16 2D 39 D9 A0 A0 zz..#k...>.-9... 0190: 5C F2 77 EC 2A DE 56 18 AE 7E C8 0D A9 9F 4F FC \.w.*.V.......O. 01A0: 5D 78 85 5E 2D D3 AF 63 D3 FA 86 76 82 E7 42 60 ]x.^-..c...v..B` 01B0: 42 A1 08 7C B7 50 A8 D5 1A B0 9B 27 7A 57 8A D4 B....P.....'zW.. 01C0: 07 2E C7 8A 06 D7 53 44 2E 6B A8 02 33 39 9F 98 ......SD.k..39.. 01D0: 0B C3 9D E8 30 E9 CE 10 EF BF 6C D9 9B F5 03 90 ....0.....l..... 01E0: A6 32 50 E7 A0 30 AD 53 4F B7 02 03 01 00 01 30 .2P..0.SO......0 01F0: 0D 06 09 2A 86 48 86 F7 0D 01 01 04 05 00 03 81 ...*.H.......... 0200: 81 00 6A 86 D4 89 04 9B 4C CF BC 15 82 86 F0 63 ..j.....L......c 0210: 21 BC 09 B3 6A 69 84 0B 6C 69 E7 DC F1 EC BE 4A !...ji..li.....J 0220: E9 BB E3 94 BD FF 10 B5 87 45 9C 12 34 8F 61 E5 .........E..4.a. 0230: 4E E1 6F E8 44 AD B7 81 60 C7 7E 99 88 54 0E 97 N.o.D...`....T.. 0240: C2 51 37 70 83 0C 2D 20 98 41 1B 98 E3 9D 22 82 .Q7p..- .A....". 0250: FF C8 26 01 73 46 75 5D 3F 8F 60 00 21 41 2E 64 ..&.sFu]?.`.!A.d 0260: 02 97 5F D1 44 CF 47 7D 22 AA 99 91 FA BA 02 D2 .._.D.G."....... 0270: AD 95 BF 80 A4 A9 06 DB B3 7A CA 0F C0 7D 32 50 .........z....2P 0280: 54 D0 T. *** CertificateRequest Cert Types: DSS, RSA, Cert Authorities: <CN=Matthew MacKenzie, OU=Executive, O=The Geek Cartel, L=Vancouver, ST=British Columbia, C=CA> <CN=akula.geek.ca, OU=Web Ops, O=The Geek Cartel, L=Vancouver, ST=British Columbia, C=CA> [read] MD5 and SHA1 hashes: len = 281 0000: 0D 00 01 15 02 02 01 01 10 00 89 30 81 86 31 0B ...........0..1. 0010: 30 09 06 03 55 04 06 13 02 43 41 31 19 30 17 06 0...U....CA1.0.. 0020: 03 55 04 08 13 10 42 72 69 74 69 73 68 20 43 6F .U....British Co 0030: 6C 75 6D 62 69 61 31 12 30 10 06 03 55 04 07 13 lumbia1.0...U... 0040: 09 56 61 6E 63 6F 75 76 65 72 31 18 30 16 06 03 .Vancouver1.0... 0050: 55 04 0A 13 0F 54 68 65 20 47 65 65 6B 20 43 61 U....The Geek Ca 0060: 72 74 65 6C 31 12 30 10 06 03 55 04 0B 13 09 45 rtel1.0...U....E 0070: 78 65 63 75 74 69 76 65 31 1A 30 18 06 03 55 04 xecutive1.0...U. 0080: 03 13 11 4D 61 74 74 68 65 77 20 4D 61 63 4B 65 ...Matthew MacKe 0090: 6E 7A 69 65 00 83 30 81 80 31 0B 30 09 06 03 55 nzie..0..1.0...U 00A0: 04 06 13 02 43 41 31 19 30 17 06 03 55 04 08 13 ....CA1.0...U... 00B0: 10 42 72 69 74 69 73 68 20 43 6F 6C 75 6D 62 69 .British Columbi 00C0: 61 31 12 30 10 06 03 55 04 07 13 09 56 61 6E 63 a1.0...U....Vanc 00D0: 6F 75 76 65 72 31 18 30 16 06 03 55 04 0A 13 0F ouver1.0...U.... 00E0: 54 68 65 20 47 65 65 6B 20 43 61 72 74 65 6C 31 The Geek Cartel1 00F0: 10 30 0E 06 03 55 04 0B 13 07 57 65 62 20 4F 70 .0...U....Web Op 0100: 73 31 16 30 14 06 03 55 04 03 13 0D 61 6B 75 6C s1.0...U....akul 0110: 61 2E 67 65 65 6B 2E 63 61 a.geek.ca *** ServerHelloDone [read] MD5 and SHA1 hashes: len = 4 0000: 0E 00 00 00 .... *** Certificate chain *** *** ClientKeyExchange, RSA PreMasterSecret, v3.1 Random Secret: { 3, 1, 65, 225, 212, 193, 122, 21, 42, 96, 2, 111, 229, 20, 6, 106, 75, 154, 178, 219, 142, 217, 175, 222, 202, 228, 182, 153, 220, 5, 42, 172, 47, 199, 61, 50, 209, 102, 233, 71, 133, 49, 55, 182, 167, 75, 141, 135 } [write] MD5 and SHA1 hashes: len = 141 0000: 0B 00 00 03 00 00 00 10 00 00 82 00 80 87 7D B3 ................ 0010: 94 EA 16 B8 03 23 62 10 A4 BA F3 8E 61 39 EF E3 .....#b.....a9.. 0020: B7 9D 40 D7 52 73 83 85 C9 70 0A E5 B7 5B 09 7F ..@.Rs...p...[.. 0030: 97 80 94 D9 76 FB 53 88 88 96 6E C5 81 77 A2 B2 ....v.S...n..w.. 0040: 29 2B 85 E9 75 E5 3D 1C 27 4D EC F6 8B AB D4 24 )+..u.=.'M.....$ 0050: AE CC 16 59 F9 66 C5 94 F6 65 BF 71 20 0F A5 D3 ...Y.f...e.q ... 0060: 06 75 DC 00 8B C9 F0 EE 82 96 95 9D 05 99 EC 28 .u.............( 0070: 8F C7 C4 8A 96 66 54 4F E4 AD B7 81 65 FF CF 56 .....fTO....e..V 0080: F3 D8 B2 1C A3 E7 8D E8 83 87 00 97 7D ............. main, WRITE: SSL v3.1 Handshake, length = 141 SESSION KEYGEN: PreMaster Secret: 0000: 03 01 41 E1 D4 C1 7A 15 2A 60 02 6F E5 14 06 6A ..A...z.*`.o...j 0010: 4B 9A B2 DB 8E D9 AF DE CA E4 B6 99 DC 05 2A AC K.............*. 0020: 2F C7 3D 32 D1 66 E9 47 85 31 37 B6 A7 4B 8D 87 /.=2.f.G.17..K.. CONNECTION KEYGEN: Client Nonce: 0000: 3D 36 40 AC 6C 0E 82 C9 D5 17 9C AF AA 20 42 6C =6@.l........ Bl 0010: C8 D4 A1 1F 9A 71 63 DC DC 69 5F B7 82 5D 4F 66 .....qc..i_..]Of Server Nonce: 0000: 3D 36 40 AC F2 C0 C0 C2 0A 66 5E 3D B0 0B DA CD =6@......f^=.... 0010: C1 F9 5D 24 45 B4 A5 50 4A 2F 00 2F 6D CC 9B DE ..]$E..PJ/./m... Master Secret: 0000: 3D FF D2 D5 D2 77 63 BD 54 D3 68 89 CF 25 E9 4A =....wc.T.h..%.J 0010: CE 1A 3C B5 EC BB 4A 3F 5F 26 52 C5 87 A2 DB B4 ..<...J?_&R..... 0020: E3 C4 8C D4 41 00 2F 56 D2 C9 ED 4B 34 38 69 A3 ....A./V...K48i. Client MAC write Secret: 0000: D4 4B 6E 7D DB 32 4F CE 9F BE F7 EF E0 75 7C 67 .Kn..2O......u.g 0010: 7A A0 D0 E7 z... Server MAC write Secret: 0000: 94 ED AD D6 92 3F 1B 41 A2 5D 84 F3 9E 9D 58 3A .....?.A.]....X: 0010: 38 CF 7D 2B 8..+ Client write key: 0000: E9 21 63 B8 E4 12 9E 54 17 74 70 C4 30 D7 F0 DA .!c....T.tp.0... Server write key: 0000: D2 B9 10 3B 0C 65 8C 7D 5B 12 A0 36 1C 16 44 5E ...;.e..[..6..D^ ... no IV for cipher main, WRITE: SSL v3.1 Change Cipher Spec, length = 1 *** Finished, v3.1 verify_data: { 238, 126, 118, 23, 50, 54, 247, 243, 33, 60, 47, 109 } *** [write] MD5 and SHA1 hashes: len = 16 0000: 14 00 00 0C EE 7E 76 17 32 36 F7 F3 21 3C 2F 6D ......v.26..!</m Plaintext before ENCRYPTION: len = 36 0000: 14 00 00 0C EE 7E 76 17 32 36 F7 F3 21 3C 2F 6D ......v.26..!</m 0010: 31 86 9B 10 07 BD C6 C7 D3 0C 08 3A CA B2 E6 9F 1..........:.... 0020: B2 A1 DD 26 ...& main, WRITE: SSL v3.1 Handshake, length = 36 Exception in thread "main" java.io.IOException: Broken pipe at java.net.SocketOutputStream.socketWrite(Native Method) at java.net.SocketOutputStream.write(SocketOutputStream.java:83) at com.sun.net.ssl.internal.ssl.OutputRecord.a([DashoPro-V1.2-120198]) at com.sun.net.ssl.internal.ssl.SSLSocketImpl.a([DashoPro-V1.2-120198]) at com.sun.net.ssl.internal.ssl.HandshakeOutStream.flush([DashoPro- V1.2-120198]) at com.sun.net.ssl.internal.ssl.Handshaker.sendChangeCipherSpec ([DashoPro-V1.2-120198]) at com.sun.net.ssl.internal.ssl.ClientHandshaker.e([DashoPro- V1.2-120198]) at com.sun.net.ssl.internal.ssl.ClientHandshaker.a([DashoPro- V1.2-120198]) at com.sun.net.ssl.internal.ssl.ClientHandshaker.processMessage ([DashoPro-V1.2-120198]) at com.sun.net.ssl.internal.ssl.Handshaker.process_record([DashoPro- V1.2-120198]) at com.sun.net.ssl.internal.ssl.SSLSocketImpl.a([DashoPro-V1.2-120198]) at com.sun.net.ssl.internal.ssl.SSLSocketImpl.a([DashoPro-V1.2-120198]) at com.sun.net.ssl.internal.ssl.AppOutputStream.write([DashoPro- V1.2-120198]) at java.io.OutputStream.write(OutputStream.java:61) at com.sun.net.ssl.internal.ssl.SSLSocketImpl.startHandshake([DashoPro- V1.2-120198]) at com.sun.net.ssl.internal.www.protocol.https.HttpsClient.doConnect ([DashoPro-V1.2-120198]) at com.sun.net.ssl.internal.www.protocol.https.NetworkClient.openServer ([DashoPro-V1.2-120198]) at com.sun.net.ssl.internal.www.protocol.https.HttpClient.l([DashoPro- V1.2-120198]) at com.sun.net.ssl.internal.www.protocol.https.HttpClient.<init> ([DashoPro-V1.2-120198]) at com.sun.net.ssl.internal.www.protocol.https.HttpsClient.<init> ([DashoPro-V1.2-120198]) at com.sun.net.ssl.internal.www.protocol.https.HttpsClient.a([DashoPro- V1.2-120198]) at com.sun.net.ssl.internal.www.protocol.https.HttpsClient.a([DashoPro- V1.2-120198]) at com.sun.net.ssl.internal.www.protocol.https.HttpsURLConnection.connect ([DashoPro-V1.2-120198]) at com.sun.net.ssl.internal.www.protocol.https.HttpsURLConnection.getInputStream( [DashoPro-V1.2-120198]) at URLClient.main(URLClient.java:11) -- To unsubscribe, e-mail: <mailto:[EMAIL PROTECTED]> For additional commands, e-mail: <mailto:[EMAIL PROTECTED]>