#
# List of providers and their preference orders (see above):
#
security.provider.1=sun.security.provider.Sun
security.provider.2=sun.security.rsa.SunRsaSign
security.provider.3=com.sun.net.ssl.internal.ssl.Provider
security.provider.4=com.sun.crypto.provider.SunJCE
security.provider.5=sun.security.jgss.SunProvider
security.provider.6=com.sun.security.sasl.Provider
security.provider.7=org.jcp.xml.dsig.internal.dom.XMLDSigRI
security.provider.8=sun.security.smartcardio.SunPCSC
security.provider.9=sun.security.ec.SunEC
security.provider.10=sun.security.pkcs11.SunPKCS11 ${java.home}/lib/security/nss.cfg
# provider. 1=sun.security. provider. Sun provider. 2=sun.security. rsa.SunRsaSign provider. 3=com.sun. net.ssl. internal. ssl.Provider provider. 4=com.sun. crypto. provider. SunJCE provider. 5=sun.security. jgss.SunProvide r provider. 6=com.sun. security. sasl.Provider provider. 7=org.jcp. xml.dsig. internal. dom.XMLDSigRI provider. 8=sun.security. smartcardio. SunPCSC provider. 9=sun.security. ec.SunEC provider. 10=sun. security. pkcs11. SunPKCS11 ${java. home}/lib/ security/ nss.cfg
# List of providers and their preference orders (see above):
#
security.
security.
security.
security.
security.
security.
security.
security.
security.
security.
Not working...
Allow unsafe renegotiation: false RSA_WITH_ AES_256_ CBC_SHA, TLS_ECDHE_ ECDSA_WITH_ AES_256_ CBC_SHA, Unknown 0xc0:0x22, Unknown 0xc0:0x21, TLS_DHE_ RSA_WITH_ AES_256_ CBC_SHA, TLS_DHE_ DSS_WITH_ AES_256_ CBC_SHA, Unknown 0x0:0x88, Unknown 0x0:0x87, TLS_ECDH_ RSA_WITH_ AES_256_ CBC_SHA, TLS_ECDH_ ECDSA_WITH_ AES_256_ CBC_SHA, TLS_RSA_ WITH_AES_ 256_CBC_ SHA, Unknown 0x0:0x84, TLS_ECDHE_ RSA_WITH_ 3DES_EDE_ CBC_SHA, TLS_ECDHE_ ECDSA_WITH_ 3DES_EDE_ CBC_SHA, Unknown 0xc0:0x1c, Unknown 0xc0:0x1b, SSL_DHE_ RSA_WITH_ 3DES_EDE_ CBC_SHA, SSL_DHE_ DSS_WITH_ 3DES_EDE_ CBC_SHA, TLS_ECDH_ RSA_WITH_ 3DES_EDE_ CBC_SHA, TLS_ECDH_ ECDSA_WITH_ 3DES_EDE_ CBC_SHA, SSL_RSA_ WITH_3DES_ EDE_CBC_ SHA, TLS_ECDHE_ RSA_WITH_ AES_128_ CBC_SHA, TLS_ECDHE_ ECDSA_WITH_ AES_128_ CBC_SHA, Unknown 0xc0:0x1f, Unknown 0xc0:0x1e, TLS_DHE_ RSA_WITH_ AES_128_ CBC_SHA, TLS_DHE_ DSS_WITH_ AES_128_ CBC_SHA, Unknown 0x0:0x9a, Unknown 0x0:0x99, Unknown 0x0:0x45, Unknown 0x0:0x44, TLS_ECDH_ RSA_WITH_ AES_128_ CBC_SHA, TLS_ECDH_ ECDSA_WITH_ AES_128_ CBC_SHA, TLS_RSA_ WITH_AES_ 128_CBC_ SHA, Unknown 0x0:0x96, Unknown 0x0:0x41, TLS_ECDHE_ RSA_WITH_ RC4_128_ SHA, TLS_ECDHE_ ECDSA_WITH_ RC4_128_ SHA, TLS_ECDH_ RSA_WITH_ RC4_128_ SHA, TLS_ECDH_ ECDSA_WITH_ RC4_128_ SHA, SSL_RSA_ WITH_RC4_ 128_SHA, SSL_RSA_ WITH_RC4_ 128_MD5, SSL_DHE_ RSA_WITH_ DES_CBC_ SHA, SSL_DHE_ DSS_WITH_ DES_CBC_ SHA, SSL_RSA_ WITH_DES_ CBC_SHA, SSL_DHE_ RSA_EXPORT_ WITH_DES40_ CBC_SHA, SSL_DHE_ DSS_EXPORT_ WITH_DES40_ CBC_SHA, SSL_RSA_ EXPORT_ WITH_DES40_ CBC_SHA, SSL_RSA_ EXPORT_ WITH_RC2_ CBC_40_ MD5, SSL_RSA_ EXPORT_ WITH_RC4_ 40_MD5, TLS_EMPTY_ RENEGOTIATION_ INFO_SCSV] compressed_ prime, ansiX962_ compressed_ char2] ProviderExcepti on: sun.security. pkcs11. wrapper. PKCS11Exception : CKR_DOMAIN_ PARAMS_ INVALID ssl.SSLExceptio n: java.security. ProviderExcepti on: sun.security. pkcs11. wrapper. PKCS11Exception : CKR_DOMAIN_ PARAMS_ INVALID
Allow legacy hello messages: true
Is initial handshake: true
Is secure renegotiation: false
matching alias: fmsrns
pool-2-thread-1, called closeSocket()
Allow unsafe renegotiation: false
Allow legacy hello messages: true
Is initial handshake: true
Is secure renegotiation: false
MessageManager, setSoTimeout(20000) called
[Raw read]: length = 5
0000: 16 03 01 00 DD .....
[Raw read]: length = 221
0000: 01 00 00 D9 03 02 4F CD B8 7F 37 09 DE 24 83 80 ......O...7..$..
0010: 94 0D 69 FC 1F 57 91 E8 27 B8 B5 57 4A 2A 1C 9B ..i..W..'..WJ*..
0020: 5D 34 50 CE B4 05 00 00 66 C0 14 C0 0A C0 22 C0 ]4P.....f.....".
0030: 21 00 39 00 38 00 88 00 87 C0 0F C0 05 00 35 00 !.9.8.........5.
0040: 84 C0 12 C0 08 C0 1C C0 1B 00 16 00 13 C0 0D C0 ................
0050: 03 00 0A C0 13 C0 09 C0 1F C0 1E 00 33 00 32 00 ............3.2.
0060: 9A 00 99 00 45 00 44 C0 0E C0 04 00 2F 00 96 00 ....E.D...../...
0070: 41 C0 11 C0 07 C0 0C C0 02 00 05 00 04 00 15 00 A...............
0080: 12 00 09 00 14 00 11 00 08 00 06 00 03 00 FF 02 ................
0090: 01 00 00 49 00 0B 00 04 03 00 01 02 00 0A 00 34 ...I...........4
00A0: 00 32 00 0E 00 0D 00 19 00 0B 00 0C 00 18 00 09 .2..............
00B0: 00 0A 00 16 00 17 00 08 00 06 00 07 00 14 00 15 ................
00C0: 00 04 00 05 00 12 00 13 00 01 00 02 00 03 00 0F ................
00D0: 00 10 00 11 00 23 00 00 00 0F 00 01 01 .....#.......
MessageManager, READ: TLSv1 Handshake, length = 221
*** ClientHello, TLSv1.1
RandomCookie: GMT: 1322039423 bytes = { 55, 9, 222, 36, 131, 128, 148, 13, 105, 252, 31, 87, 145, 232, 39, 184, 181, 87, 74, 42, 28, 155, 93, 52, 80, 206, 180, 5 }
Session ID: {}
Cipher Suites: [TLS_ECDHE_
Compression Methods: { 1, 0 }
Extension ec_point_formats, formats: [uncompressed, ansiX962_
Extension elliptic_curves, curve names: {sect571r1, sect571k1, secp521r1, sect409k1, sect409r1, secp384r1, sect283k1, sect283r1, secp256k1, secp256r1, sect239k1, sect233k1, sect233r1, secp224k1, secp224r1, sect193r1, sect193r2, secp192k1, secp192r1, sect163k1, sect163r1, sect163r2, secp160k1, secp160r1, secp160r2}
Unsupported extension type_35, data:
Unsupported extension type_15, data: 01
***
[read] MD5 and SHA1 hashes: len = 221
0000: 01 00 00 D9 03 02 4F CD B8 7F 37 09 DE 24 83 80 ......O...7..$..
0010: 94 0D 69 FC 1F 57 91 E8 27 B8 B5 57 4A 2A 1C 9B ..i..W..'..WJ*..
0020: 5D 34 50 CE B4 05 00 00 66 C0 14 C0 0A C0 22 C0 ]4P.....f.....".
0030: 21 00 39 00 38 00 88 00 87 C0 0F C0 05 00 35 00 !.9.8.........5.
0040: 84 C0 12 C0 08 C0 1C C0 1B 00 16 00 13 C0 0D C0 ................
0050: 03 00 0A C0 13 C0 09 C0 1F C0 1E 00 33 00 32 00 ............3.2.
0060: 9A 00 99 00 45 00 44 C0 0E C0 04 00 2F 00 96 00 ....E.D...../...
0070: 41 C0 11 C0 07 C0 0C C0 02 00 05 00 04 00 15 00 A...............
0080: 12 00 09 00 14 00 11 00 08 00 06 00 03 00 FF 02 ................
0090: 01 00 00 49 00 0B 00 04 03 00 01 02 00 0A 00 34 ...I...........4
00A0: 00 32 00 0E 00 0D 00 19 00 0B 00 0C 00 18 00 09 .2..............
00B0: 00 0A 00 16 00 17 00 08 00 06 00 07 00 14 00 15 ................
00C0: 00 04 00 05 00 12 00 13 00 01 00 02 00 03 00 0F ................
00D0: 00 10 00 11 00 23 00 00 00 0F 00 01 01 .....#.......
MessageManager, handling exception: java.security.
MessageManager, SEND TLSv1 ALERT: fatal, description = internal_error
MessageManager, WRITE: TLSv1 Alert, length = 2
[Raw write]: length = 7
0000: 15 03 01 00 02 02 50 ......P
MessageManager, called closeSocket()
MessageManager, IOException in getSession(): javax.net.
Finalizer, called close()
Finalizer, called closeInternal(true)
Finalizer, called close()
Finalizer, called closeInternal(true)
Finalizer, called close()
Finalizer, called closeInternal(true)