Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/7983/
All tests passed Build Log: [...truncated 1166 lines...] # ERROR: IOException occurred when talking to server at: https://localhost:8983/solr/test/select # -- # # Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/69-2 # Last output: # INFO - 2023-09-16 09:08:13.309; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword # INFO - 2023-09-16 09:08:13.313; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword # WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [https://localhost:8983/solr] to [https://localhost:8983]. # Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:8983/solr/admin/info/system # at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:551) # at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192) # at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:552) # at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:469) # at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:426) # at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:146) # at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:151) # Caused by: javax.net.ssl.SSLHandshakeException: No subject alternative DNS name matching localhost found. # at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131) # at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353) # at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296) # at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291) # at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357) # at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232) # at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175) # at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392) # at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443) # at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074) # at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061) # at java.base/java.security.AccessController.doPrivileged(Native Method) # at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008) # at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657) # at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102) # at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84) # at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314) # at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100) # at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558) # at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379) # at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146) # at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100) # at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53) # at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:289) # at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128) # at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628) # at java.base/java.lang.Thread.run(Thread.java:829) # Suppressed: java.io.IOException: Broken pipe # at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138) # at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422) # at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275) # at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254) # at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386) # at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292) # at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243) # at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224) # at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821) # at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793) # at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161) # at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451) # at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117) # at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87) # ... 11 more # Caused by: java.security.cert.CertificateException: No subject alternative DNS name matching localhost found. # at java.base/sun.security.util.HostnameChecker.matchDNS(HostnameChecker.java:212) # at java.base/sun.security.util.HostnameChecker.match(HostnameChecker.java:103) # at java.base/sun.security.ssl.X509TrustManagerImpl.checkIdentity(X509TrustManagerImpl.java:455) # at java.base/sun.security.ssl.X509TrustManagerImpl.checkIdentity(X509TrustManagerImpl.java:429) # at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:283) # at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141) # at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335) # ... 22 more ok 70 start solr with ssl and auth in 16603ms ok 71 start solr with client truststore and security manager in 19675ms not ok 72 start solr with mTLS needed in 55051ms # (in test file test/test_ssl.bats, line 301) # `solr start -c -z localhost:9983 -p 8984' failed # /tmp/bats-run-qUqE2s/test/72/ssl # Certificate was added to keystore # Certificate reply was installed in keystore # Certificate was added to keystore # Certificate was added to keystore # Certificate reply was installed in keystore # Certificate was added to keystore # Certificate was added to keystore # Certificate was added to keystore # Certificate was added to keystore # Certificate reply was installed in keystore # Certificate was added to keystore # Certificate was added to keystore # Warning: Available entropy is low. As a result, use of the UUIDField, SSL, or any other features that require # RNG might not work properly. To check for the amount of available entropy, use 'cat /proc/sys/kernel/random/entropy_avail'. # # Waiting up to 180 seconds to see Solr running on port 8983 [|] [/] [-] [\] # Started Solr server on port 8983 (pid=3320918). Happy searching! # # Warning: Available entropy is low. As a result, use of the UUIDField, SSL, or any other features that require # RNG might not work properly. To check for the amount of available entropy, use 'cat /proc/sys/kernel/random/entropy_avail'. # # Waiting up to 180 seconds to see Solr running on port 8984 [|] [/] [-] [\] [|] [/] [-] [\] # Started Solr server on port 8984 (pid=3321022). Happy searching! # # INFO - 2023-09-16 09:09:15.459; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword # INFO - 2023-09-16 09:09:15.464; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword # INFO - 2023-09-16 09:09:16.031; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@25ddbbbb(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@757d6814[provider=null,keyStore=file:///tmp/bats-run-qUqE2s/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-qUqE2s/test/72/ssl/client/solr-client.truststore.p12] # INFO - 2023-09-16 09:09:16.034; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@52b56a3e(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@757d6814[provider=null,keyStore=file:///tmp/bats-run-qUqE2s/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-qUqE2s/test/72/ssl/client/solr-client.truststore.p12] # INFO - 2023-09-16 09:09:16.034; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@fd0e5b6(ca,h=[localhost],a=[],w=[]) for Client@757d6814[provider=null,keyStore=file:///tmp/bats-run-qUqE2s/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-qUqE2s/test/72/ssl/client/solr-client.truststore.p12] # javax.net.ssl|DEBUG|01|main|2023-09-16 09:09:16.462 UTC|SunX509KeyManagerImpl.java:164|found key for : client ( # "certificate" : { # "version" : "v3", # "serial number" : "45 BE 9C 6A", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-09-16 09:09:01.000 UTC", # "not after" : "2023-12-15 09:09:01.000 UTC", # "subject" : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.35 Criticality=false # AuthorityKeyIdentifier [ # KeyIdentifier [ # 0000: 6E 5D 5B FF 77 E4 F2 B4 23 F7 1F 3F 1C D5 45 E9 n][.w...#..?..E. # 0010: AA B8 4E B3 ..N. # ] # ] # }, # { # ObjectId: 2.5.29.37 Criticality=true # ExtendedKeyUsages [ # clientAuth # ] # }, # { # ObjectId: 2.5.29.15 Criticality=true # KeyUsage [ # DigitalSignature # Non_repudiation # Key_Encipherment # ] # }, # { # ObjectId: 2.5.29.17 Criticality=false # SubjectAlternativeName [ # DNSName: test.solr.apache.org # IPAddress: 127.0.0.2 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: AE 3F 1D 85 F2 01 0B 03 06 0D 0C C3 63 DE D7 C0 .?..........c... # 0010: 7E 8D 58 19 ..X. # ] # ] # } # ]}, # "certificate" : { # "version" : "v3", # "serial number" : "0B 42 AB 14", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-09-16 09:08:55.000 UTC", # "not after" : "2023-12-15 09:08:55.000 UTC", # "subject" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.35 Criticality=false # AuthorityKeyIdentifier [ # KeyIdentifier [ # 0000: E2 65 6E 99 68 D6 1E C7 69 77 43 FB 3C 7D FA AD .en.h...iwC.<... # 0010: CF 0B F0 88 .... # ] # ] # }, # { # ObjectId: 2.5.29.19 Criticality=false # BasicConstraints:[ # CA:true # PathLen:0 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: 6E 5D 5B FF 77 E4 F2 B4 23 F7 1F 3F 1C D5 45 E9 n][.w...#..?..E. # 0010: AA B8 4E B3 ..N. # ] # ] # } # ]} # ) # javax.net.ssl|DEBUG|01|main|2023-09-16 09:09:16.469 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates ( # "certificate" : { # "version" : "v3", # "serial number" : "29 4A 25 3D", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-09-16 09:08:53.000 UTC", # "not after" : "2023-12-15 09:08:53.000 UTC", # "subject" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.19 Criticality=true # BasicConstraints:[ # CA:true # PathLen:2147483647 # ] # }, # { # ObjectId: 2.5.29.17 Criticality=false # SubjectAlternativeName [ # DNSName: localhost # IPAddress: 127.0.0.1 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: E2 65 6E 99 68 D6 1E C7 69 77 43 FB 3C 7D FA AD .en.h...iwC.<... # 0010: CF 0B F0 88 .... # ] # ] # } # ]}, # "certificate" : { # "version" : "v3", # "serial number" : "0B 42 AB 14", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-09-16 09:08:55.000 UTC", # "not after" : "2023-12-15 09:08:55.000 UTC", # "subject" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.35 Criticality=false # AuthorityKeyIdentifier [ # KeyIdentifier [ # 0000: E2 65 6E 99 68 D6 1E C7 69 77 43 FB 3C 7D FA AD .en.h...iwC.<... # 0010: CF 0B F0 88 .... # ] # ] # }, # { # ObjectId: 2.5.29.19 Criticality=false # BasicConstraints:[ # CA:true # PathLen:0 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: 6E 5D 5B FF 77 E4 F2 B4 23 F7 1F 3F 1C D5 45 E9 n][.w...#..?..E. # 0010: AA B8 4E B3 ..N. # ] # ] # } # ]} # ) # javax.net.ssl|DEBUG|01|main|2023-09-16 09:09:16.481 UTC|SSLCipher.java:464|jdk.tls.keyLimits: entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472 # javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-09-16 09:09:16.703 UTC|ServerNameExtension.java:261|Unable to indicate server name # javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-09-16 09:09:16.704 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name # javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-09-16 09:09:16.707 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers # javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-09-16 09:09:16.707 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers # javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-09-16 09:09:16.716 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie # javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-09-16 09:09:16.731 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info # javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-09-16 09:09:16.731 UTC|PreSharedKeyExtension.java:633|No session to resume. # javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-09-16 09:09:16.731 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key # javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-09-16 09:09:16.733 UTC|ClientHello.java:642|Produced ClientHello handshake message ( # "ClientHello": { # "client version" : "TLSv1.2", # "random" : "9E CC 37 5F BA 48 1E FA 24 1A 84 2E 88 CE D4 34 77 80 B6 84 E7 10 1F B1 F7 BA C4 80 21 36 4F CB", # "session id" : "7C 9E 60 71 41 36 C4 63 B5 05 94 47 7D F3 12 19 9D 15 14 DF 9C B7 CF 27 D1 78 99 44 03 27 05 A0", # "cipher suites" : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]", # "compression methods" : "00", # "extensions" : [ # "status_request (5)": { # "certificate status type": ocsp # "OCSP status request": { # "responder_id": <empty> # "request extensions": { # <empty> # } # } # }, # "supported_groups (10)": { # "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192] # }, # "ec_point_formats (11)": { # "formats": [uncompressed] # }, # "signature_algorithms (13)": { # "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1] # }, # "signature_algorithms_cert (50)": { # "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1] # }, # "application_layer_protocol_negotiation (16)": { # [h2] # }, # "status_request_v2 (17)": { # "cert status request": { # "certificate status type": ocsp_multi # "OCSP status request": { # "responder_id": <empty> # "request extensions": { # <empty> # } # } # } # }, # "extended_master_secret (23)": { # <empty> # }, # "supported_versions (43)": { # "versions": [TLSv1.3, TLSv1.2] # }, # "psk_key_exchange_modes (45)": { # "ke_modes": [psk_dhe_ke] # }, # "key_share (51)": { # "client_shares": [ # { # "named group": x25519 # "key_exchange": { # 0000: 37 45 C0 08 3F 7B 3E 42 64 45 48 B7 E7 4A CD 0A 7E..?.>BdEH..J.. # 0010: 9B BD 6D A4 2D 82 CE 30 AA 3F 49 78 D2 C6 5F 26 ..m.-..0.?Ix.._& # } # }, # ] # } # ] # } # ) # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 09:09:16.873 UTC|ServerHello.java:867|Consuming ServerHello handshake message ( # "ServerHello": { # "server version" : "TLSv1.2", # "random" : "7E 63 1C 76 E2 F9 7A E3 9D 72 41 73 3C EA AA 93 D7 D1 6A BC 47 D4 C5 51 04 AB F2 B2 65 3F C4 F4", # "session id" : "7C 9E 60 71 41 36 C4 63 B5 05 94 47 7D F3 12 19 9D 15 14 DF 9C B7 CF 27 D1 78 99 44 03 27 05 A0", # "cipher suite" : "TLS_AES_256_GCM_SHA384(0x1302)", # "compression methods" : "00", # "extensions" : [ # "supported_versions (43)": { # "selected version": [TLSv1.3] # }, # "key_share (51)": { # "server_share": { # "named group": x25519 # "key_exchange": { # 0000: C9 A3 4D 73 86 F5 EB DC B7 79 7E 6F A7 41 61 85 ..Ms.....y.o.Aa. # 0010: FA C8 B8 89 D9 B4 80 E2 96 6D 10 70 D5 5D 01 00 .........m.p.].. # } # }, # } # ] # } # ) # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 09:09:16.874 UTC|SSLExtensions.java:192|Consumed extension: supported_versions # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 09:09:16.874 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3 # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 09:09:16.875 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 09:09:16.875 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 09:09:16.876 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 09:09:16.876 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 09:09:16.876 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 09:09:16.876 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2 # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 09:09:16.877 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 09:09:16.877 UTC|SSLExtensions.java:192|Consumed extension: supported_versions # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 09:09:16.883 UTC|SSLExtensions.java:192|Consumed extension: key_share # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 09:09:16.883 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 09:09:16.883 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence. # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 09:09:16.883 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 09:09:16.883 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 09:09:16.883 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 09:09:16.883 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 09:09:16.883 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 09:09:16.883 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2 # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 09:09:16.884 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret # javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-09-16 09:09:16.884 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions # javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-09-16 09:09:16.884 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 09:09:16.884 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 09:09:16.884 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 09:09:16.907 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE # countdown value = 137438953472 # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 09:09:16.909 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE # countdown value = 137438953472 # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 09:09:16.910 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 09:09:16.918 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message ( # "EncryptedExtensions": [ # "supported_groups (10)": { # "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192] # }, # "application_layer_protocol_negotiation (16)": { # [h2] # } # ] # ) # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 09:09:16.919 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 09:09:16.919 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 09:09:16.919 UTC|SSLExtensions.java:192|Consumed extension: supported_groups # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 09:09:16.919 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 09:09:16.920 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 09:09:16.922 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length # javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-09-16 09:09:16.923 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups # javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-09-16 09:09:16.923 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 09:09:16.925 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message ( # "CertificateRequest": { # "certificate_request_context": "", # "extensions": [ # "signature_algorithms (13)": { # "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1] # }, # "signature_algorithms_cert (50)": { # "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1] # }, # "certificate_authorities (47)": { # "certificate authorities": [ # CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country # CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country] # } # ] # } # ) # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 09:09:16.925 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 09:09:16.925 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 09:09:16.925 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 09:09:16.926 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 09:09:16.926 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert # javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-09-16 09:09:16.926 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 09:09:16.935 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message ( # "Certificate": { # "certificate_request_context": "", # "certificate_list": [ # { # "certificate" : { # "version" : "v3", # "serial number" : "44 72 24 66", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-09-16 09:08:57.000 UTC", # "not after" : "2023-12-15 09:08:57.000 UTC", # "subject" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.35 Criticality=false # AuthorityKeyIdentifier [ # KeyIdentifier [ # 0000: 6E 5D 5B FF 77 E4 F2 B4 23 F7 1F 3F 1C D5 45 E9 n][.w...#..?..E. # 0010: AA B8 4E B3 ..N. # ] # ] # }, # { # ObjectId: 2.5.29.37 Criticality=true # ExtendedKeyUsages [ # serverAuth # ] # }, # { # ObjectId: 2.5.29.15 Criticality=true # KeyUsage [ # DigitalSignature # Non_repudiation # Key_Encipherment # ] # }, # { # ObjectId: 2.5.29.17 Criticality=false # SubjectAlternativeName [ # DNSName: localhost # IPAddress: 127.0.0.1 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: 45 9E FF E3 84 1D 2F D1 3F 4E 17 5B 81 6D 0A ED E...../.?N.[.m.. # 0010: 01 B3 02 CC .... # ] # ] # } # ]} # "extensions": { # <no extension> # } # }, # ] # } # ) # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 09:09:16.935 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 09:09:17.014 UTC|X509TrustManagerImpl.java:292|Found trusted certificate ( # "certificate" : { # "version" : "v3", # "serial number" : "0B 42 AB 14", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-09-16 09:08:55.000 UTC", # "not after" : "2023-12-15 09:08:55.000 UTC", # "subject" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.35 Criticality=false # AuthorityKeyIdentifier [ # KeyIdentifier [ # 0000: E2 65 6E 99 68 D6 1E C7 69 77 43 FB 3C 7D FA AD .en.h...iwC.<... # 0010: CF 0B F0 88 .... # ] # ] # }, # { # ObjectId: 2.5.29.19 Criticality=false # BasicConstraints:[ # CA:true # PathLen:0 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: 6E 5D 5B FF 77 E4 F2 B4 23 F7 1F 3F 1C D5 45 E9 n][.w...#..?..E. # 0010: AA B8 4E B3 ..N. # ] # ] # } # ]} # ) # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 09:09:17.477 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message ( # "CertificateVerify": { # "signature algorithm": rsa_pss_rsae_sha256 # "signature": { # 0000: 1D AD 9F 5D E5 E7 23 B5 8C 2A CB 47 F4 BF 92 68 ...]..#..*.G...h # 0010: 8C C5 03 B8 86 3C AD AC 38 19 66 BB F3 D0 1C 03 .....<..8.f..... # 0020: EF C3 F7 5B 5A 65 57 54 E6 AA 3B F7 AC E4 F9 22 ...[ZeWT..;...." # 0030: 6B AD 8B B6 FB 65 67 77 ED A0 3E 78 8C CD 35 07 k....egw..>x..5. # 0040: 0A E3 33 48 E0 73 01 A7 AF EA DF 90 99 48 6A 88 ..3H.s.......Hj. # 0050: 35 14 13 5C 38 20 43 CE C5 6F 64 2A 6A 06 AC 51 5..\8 C..od*j..Q # 0060: AB 59 62 EE 65 99 D4 4D AC FE 9F 8E F3 E5 FB 8D .Yb.e..M........ # 0070: 9B B8 87 1A 0D 52 8B 68 CD 50 1B DF 83 39 31 9B .....R.h.P...91. # 0080: 3B C0 CE 5C F8 08 0F 1E 0E 6A C4 A0 47 5C B7 F1 ;..\.....j..G\.. # 0090: 84 63 2F D6 9D 60 0B E0 B8 15 7D 5B 37 8B 94 CA .c/..`.....[7... # 00A0: D9 8C 60 6E C2 A9 2E 6D 8C 14 F6 9B 10 91 84 B5 ..`n...m........ # 00B0: 0A 64 1F 2B 29 A9 F9 88 9D 28 F3 1A 8A 29 D6 EA .d.+)....(...).. # 00C0: EC 8E F4 84 D6 83 85 9A B8 1D A6 7A 09 86 A8 86 ...........z.... # 00D0: DF 32 CA 2D 7C 45 8C 58 E2 BD 1E 28 B1 B5 39 56 .2.-.E.X...(..9V # 00E0: 9D 51 FD 34 3E ED 4E 9A 7B BD 4E 65 A9 74 5A B3 .Q.4>.N...Ne.tZ. # 00F0: 6B AC 24 5A 95 41 7A BA 82 9D 8F C6 E5 EB 6E 31 k.$Z.Az.......n1 # } # } # ) # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 09:09:17.493 UTC|Finished.java:898|Consuming server Finished handshake message ( # "Finished": { # "verify data": { # 0000: 42 87 01 25 AB 62 CA 33 A1 13 DF CF 5E 63 E4 91 B..%.b.3....^c.. # 0010: C1 67 7C 78 C7 D4 EC 89 6D 61 03 14 A7 D9 5F 9B .g.x....ma...._. # 0020: 3D 3B B3 65 43 20 B3 3E 62 7B D2 5C 98 62 C2 C8 =;.eC .>b..\.b.. # }'} # ) # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 09:09:17.496 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE # countdown value = 137438953472 # javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-09-16 09:09:17.497 UTC|X509Authentication.java:246|No X.509 cert selected for EC # javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-09-16 09:09:17.497 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256 # javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-09-16 09:09:17.497 UTC|X509Authentication.java:246|No X.509 cert selected for EC # javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-09-16 09:09:17.497 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384 # javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-09-16 09:09:17.497 UTC|X509Authentication.java:246|No X.509 cert selected for EC # javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-09-16 09:09:17.497 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512 # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 09:09:17.498 UTC|SunX509KeyManagerImpl.java:401|matching alias: client # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 09:09:17.506 UTC|CertificateMessage.java:1140|Produced client Certificate message ( # "Certificate": { # "certificate_request_context": "", # "certificate_list": [ # { # "certificate" : { # "version" : "v3", # "serial number" : "45 BE 9C 6A", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-09-16 09:09:01.000 UTC", # "not after" : "2023-12-15 09:09:01.000 UTC", # "subject" : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.35 Criticality=false # AuthorityKeyIdentifier [ # KeyIdentifier [ # 0000: 6E 5D 5B FF 77 E4 F2 B4 23 F7 1F 3F 1C D5 45 E9 n][.w...#..?..E. # 0010: AA B8 4E B3 ..N. # ] # ] # }, # { # ObjectId: 2.5.29.37 Criticality=true # ExtendedKeyUsages [ # clientAuth # ] # }, # { # ObjectId: 2.5.29.15 Criticality=true # KeyUsage [ # DigitalSignature # Non_repudiation # Key_Encipherment # ] # }, # { # ObjectId: 2.5.29.17 Criticality=false # SubjectAlternativeName [ # DNSName: test.solr.apache.org # IPAddress: 127.0.0.2 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: AE 3F 1D 85 F2 01 0B 03 06 0D 0C C3 63 DE D7 C0 .?..........c... # 0010: 7E 8D 58 19 ..X. # ] # ] # } # ]} # "extensions": { # <no extension> # } # }, # { # "certificate" : { # "version" : "v3", # "serial number" : "0B 42 AB 14", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-09-16 09:08:55.000 UTC", # "not after" : "2023-12-15 09:08:55.000 UTC", # "subject" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.35 Criticality=false # AuthorityKeyIdentifier [ # KeyIdentifier [ # 0000: E2 65 6E 99 68 D6 1E C7 69 77 43 FB 3C 7D FA AD .en.h...iwC.<... # 0010: CF 0B F0 88 .... # ] # ] # }, # { # ObjectId: 2.5.29.19 Criticality=false # BasicConstraints:[ # CA:true # PathLen:0 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: 6E 5D 5B FF 77 E4 F2 B4 23 F7 1F 3F 1C D5 45 E9 n][.w...#..?..E. # 0010: AA B8 4E B3 ..N. # ] # ] # } # ]} # "extensions": { # <no extension> # } # }, # ] # } # ) # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 09:09:17.545 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message ( # "CertificateVerify": { # "signature algorithm": rsa_pss_rsae_sha256 # "signature": { # 0000: 66 88 B4 36 FF A5 B0 1E 02 C4 79 84 14 A8 A9 84 f..6......y..... # 0010: EF 5B DB 12 CB B2 80 53 72 C8 5D 2D 68 3A EA 43 .[.....Sr.]-h:.C # 0020: BE 7E 40 42 06 4E 34 17 4F F2 70 06 50 AA E0 B7 [email protected]... # 0030: 27 99 1C C6 32 68 E9 12 70 BA D4 3B 23 7F CD 84 '...2h..p..;#... # 0040: 85 51 38 AF 53 50 D6 88 CB BC 7D 3F C3 2E AD 84 .Q8.SP.....?.... # 0050: 48 5F 9A F2 2F 6D F7 7D EB CF 43 2F 54 91 DD FF H_../m....C/T... # 0060: 08 AF 70 AD 45 EE 72 B3 E0 C9 B6 2A 3C B7 26 83 ..p.E.r....*<.&. # 0070: 83 77 88 1D 0C 5E CE 46 36 C3 9E 63 43 16 80 82 .w...^.F6..cC... # 0080: FC EE F1 1E D2 F8 13 88 21 DA B2 1D D2 A6 65 7D ........!.....e. # 0090: C6 3E 36 AC 23 07 1E 12 24 BA F6 C5 32 CC 93 5F .>6.#...$...2.._ # 00A0: 74 81 08 24 B3 47 22 A8 14 E2 3A 9A 85 B6 CB 0F t..$.G"...:..... # 00B0: 16 11 52 85 4E F8 F0 13 4C 73 F5 80 3F 5A 91 C3 ..R.N...Ls..?Z.. # 00C0: 8F 93 F6 81 85 87 5E 7A DA 44 9C 1D F6 A2 78 D9 ......^z.D....x. # 00D0: 00 3F 10 33 F8 02 F3 00 59 66 66 D7 A9 E9 4A CC .?.3....Yff...J. # 00E0: 1D 2A 13 2D BB 66 38 C4 05 EB 94 EF 2C EF 00 58 .*.-.f8.....,..X # 00F0: 71 FB AE 3F DC A4 DC E3 DE 7A C8 5D 8D 52 36 05 q..?.....z.].R6. # } # } # ) # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 09:09:17.548 UTC|Finished.java:673|Produced client Finished handshake message ( # "Finished": { # "verify data": { # 0000: 3A 84 AA 8D A6 26 9F 85 B2 24 90 52 F8 27 12 E1 :....&...$.R.'.. # 0010: 06 1E F7 B0 D4 F6 CD 67 DE 60 83 75 AA 91 00 EB .......g.`.u.... # 0020: CE 3F C3 08 0F 6D E7 18 B9 1A 4F C6 45 AC DF 8A .?...m....O.E... # }'} # ) # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 09:09:17.556 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE # countdown value = 137438953472 # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 09:09:17.629 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message ( # "NewSessionTicket": { # "ticket_lifetime" : "86,400", # "ticket_age_add" : "<omitted>", # "ticket_nonce" : "01", # "ticket" : "DB 2C 0D E1 B6 82 A6 57 55 C1 A5 ED A3 4A 6F A3 6D 86 67 6B 2F 5C 8D B4 88 65 95 EB D8 65 4C A4", # "extensions" : [ # <no extension> # ] # } # ) # javax.net.ssl|ALL|01|main|2023-09-16 09:09:18.424 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine # javax.net.ssl|WARNING|01|main|2023-09-16 09:09:18.425 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data # INFO - 2023-09-16 09:09:20.113; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword # INFO - 2023-09-16 09:09:20.117; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword # INFO - 2023-09-16 09:09:20.437; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@757d6814(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@5241cf67[provider=null,keyStore=file:///tmp/bats-run-qUqE2s/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-qUqE2s/test/72/ssl/client/solr-client.truststore.p12] # INFO - 2023-09-16 09:09:20.439; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@7e809b79(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5241cf67[provider=null,keyStore=file:///tmp/bats-run-qUqE2s/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-qUqE2s/test/72/ssl/client/solr-client.truststore.p12] # INFO - 2023-09-16 09:09:20.440; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5cc126dc(ca,h=[localhost],a=[],w=[]) for Client@5241cf67[provider=null,keyStore=file:///tmp/bats-run-qUqE2s/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-qUqE2s/test/72/ssl/client/solr-client.truststore.p12] # javax.net.ssl|DEBUG|01|main|2023-09-16 09:09:20.468 UTC|SunX509KeyManagerImpl.java:164|found key for : client ( # "certificate" : { # "version" : "v3", # "serial number" : "45 BE 9C 6A", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-09-16 09:09:01.000 UTC", # "not after" : "2023-12-15 09:09:01.000 UTC", # "subject" : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.35 Criticality=false # AuthorityKeyIdentifier [ # KeyIdentifier [ # 0000: 6E 5D 5B FF 77 E4 F2 B4 23 F7 1F 3F 1C D5 45 E9 n][.w...#..?..E. # 0010: AA B8 4E B3 ..N. # ] # ] # }, # { # ObjectId: 2.5.29.37 Criticality=true # ExtendedKeyUsages [ # clientAuth # ] # }, # { # ObjectId: 2.5.29.15 Criticality=true # KeyUsage [ # DigitalSignature # Non_repudiation # Key_Encipherment # ] # }, # { # ObjectId: 2.5.29.17 Criticality=false # SubjectAlternativeName [ # DNSName: test.solr.apache.org # IPAddress: 127.0.0.2 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: AE 3F 1D 85 F2 01 0B 03 06 0D 0C C3 63 DE D7 C0 .?..........c... # 0010: 7E 8D 58 19 ..X. # ] # ] # } # ]}, # "certificate" : { # "version" : "v3", # "serial number" : "0B 42 AB 14", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-09-16 09:08:55.000 UTC", # "not after" : "2023-12-15 09:08:55.000 UTC", # "subject" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.35 Criticality=false # AuthorityKeyIdentifier [ # KeyIdentifier [ # 0000: E2 65 6E 99 68 D6 1E C7 69 77 43 FB 3C 7D FA AD .en.h...iwC.<... # 0010: CF 0B F0 88 .... # ] # ] # }, # { # ObjectId: 2.5.29.19 Criticality=false # BasicConstraints:[ # CA:true # PathLen:0 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: 6E 5D 5B FF 77 E4 F2 B4 23 F7 1F 3F 1C D5 45 E9 n][.w...#..?..E. # 0010: AA B8 4E B3 ..N. # ] # ] # } # ]} # ) # javax.net.ssl|DEBUG|01|main|2023-09-16 09:09:20.471 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates ( # "certificate" : { # "version" : "v3", # "serial number" : "29 4A 25 3D", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-09-16 09:08:53.000 UTC", # "not after" : "2023-12-15 09:08:53.000 UTC", # "subject" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.19 Criticality=true # BasicConstraints:[ # CA:true # PathLen:2147483647 # ] # }, # { # ObjectId: 2.5.29.17 Criticality=false # SubjectAlternativeName [ # DNSName: localhost # IPAddress: 127.0.0.1 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: E2 65 6E 99 68 D6 1E C7 69 77 43 FB 3C 7D FA AD .en.h...iwC.<... # 0010: CF 0B F0 88 .... # ] # ] # } # ]}, # "certificate" : { # "version" : "v3", # "serial number" : "0B 42 AB 14", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-09-16 09:08:55.000 UTC", # "not after" : "2023-12-15 09:08:55.000 UTC", # "subject" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.35 Criticality=false # AuthorityKeyIdentifier [ # KeyIdentifier [ # 0000: E2 65 6E 99 68 D6 1E C7 69 77 43 FB 3C 7D FA AD .en.h...iwC.<... # 0010: CF 0B F0 88 .... # ] # ] # }, # { # ObjectId: 2.5.29.19 Criticality=false # BasicConstraints:[ # CA:true # PathLen:0 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: 6E 5D 5B FF 77 E4 F2 B4 23 F7 1F 3F 1C D5 45 E9 n][.w...#..?..E. # 0010: AA B8 4E B3 ..N. # ] # ] # } # ]} # ) # javax.net.ssl|DEBUG|01|main|2023-09-16 09:09:20.482 UTC|SSLCipher.java:464|jdk.tls.keyLimits: entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472 # javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-09-16 09:09:20.617 UTC|ServerNameExtension.java:261|Unable to indicate server name # javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-09-16 09:09:20.617 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name # javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-09-16 09:09:20.618 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers # javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-09-16 09:09:20.618 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers # javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-09-16 09:09:20.622 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie # javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-09-16 09:09:20.632 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info # javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-09-16 09:09:20.632 UTC|PreSharedKeyExtension.java:633|No session to resume. # javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-09-16 09:09:20.632 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key # javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-09-16 09:09:20.634 UTC|ClientHello.java:642|Produced ClientHello handshake message ( # "ClientHello": { # "client version" : "TLSv1.2", # "random" : "FD 7F 63 73 D8 F2 B0 39 52 60 C4 46 19 2E B4 C1 8A 60 DE E9 F3 64 E7 00 BD 10 70 4D 7A E7 C4 EF", # "session id" : "D1 F9 38 1B A7 95 F8 C8 E3 25 67 FD 8D 30 B9 43 0B 6F 85 5B 24 01 C1 03 5F E4 44 31 18 72 D0 C2", # "cipher suites" : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]", # "compression methods" : "00", # "extensions" : [ # "status_request (5)": { # "certificate status type": ocsp # "OCSP status request": { # "responder_id": <empty> # "request extensions": { # <empty> # } # } # }, # "supported_groups (10)": { # "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192] # }, # "ec_point_formats (11)": { # "formats": [uncompressed] # }, # "signature_algorithms (13)": { # "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1] # }, # "signature_algorithms_cert (50)": { # "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1] # }, # "application_layer_protocol_negotiation (16)": { # [h2] # }, # "status_request_v2 (17)": { # "cert status request": { # "certificate status type": ocsp_multi # "OCSP status request": { # "responder_id": <empty> # "request extensions": { # <empty> # } # } # } # }, # "extended_master_secret (23)": { # <empty> # }, # "supported_versions (43)": { # "versions": [TLSv1.3, TLSv1.2] # }, # "psk_key_exchange_modes (45)": { # "ke_modes": [psk_dhe_ke] # }, # "key_share (51)": { # "client_shares": [ # { # "named group": x25519 # "key_exchange": { # 0000: E5 EE 60 9B C2 09 AF 01 E3 73 AF 54 97 08 0A 85 ..`......s.T.... # 0010: D1 F4 88 D6 24 85 D2 A1 41 0A 51 6F B4 28 4F 5C ....$...A.Qo.(O\ # } # }, # ] # } # ] # } # ) # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 09:09:20.711 UTC|ServerHello.java:867|Consuming ServerHello handshake message ( # "ServerHello": { # "server version" : "TLSv1.2", # "random" : "7A 30 B7 ED 55 1C 75 3F 26 76 22 D4 08 51 57 E8 07 54 D8 25 4D 5D 03 70 64 40 52 E6 06 95 C6 9F", # "session id" : "D1 F9 38 1B A7 95 F8 C8 E3 25 67 FD 8D 30 B9 43 0B 6F 85 5B 24 01 C1 03 5F E4 44 31 18 72 D0 C2", # "cipher suite" : "TLS_AES_256_GCM_SHA384(0x1302)", # "compression methods" : "00", # "extensions" : [ # "supported_versions (43)": { # "selected version": [TLSv1.3] # }, # "key_share (51)": { # "server_share": { # "named group": x25519 # "key_exchange": { # 0000: 2E 5B 2A 3B 81 5E 11 44 94 69 E7 E2 AF 6A C1 43 .[*;.^.D.i...j.C # 0010: 1B 1F 96 86 96 BB 00 C1 3C B2 B7 C6 57 93 19 3E ........<...W..> # } # }, # } # ] # } # ) # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 09:09:20.711 UTC|SSLExtensions.java:192|Consumed extension: supported_versions # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 09:09:20.712 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3 # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 09:09:20.713 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 09:09:20.713 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 09:09:20.714 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 09:09:20.714 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 09:09:20.714 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 09:09:20.714 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2 # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 09:09:20.715 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 09:09:20.715 UTC|SSLExtensions.java:192|Consumed extension: supported_versions # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 09:09:20.719 UTC|SSLExtensions.java:192|Consumed extension: key_share # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 09:09:20.723 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 09:09:20.724 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence. # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 09:09:20.724 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 09:09:20.724 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 09:09:20.724 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 09:09:20.725 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 09:09:20.725 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 09:09:20.725 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2 # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 09:09:20.725 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret # javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-09-16 09:09:20.725 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions # javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-09-16 09:09:20.725 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 09:09:20.726 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 09:09:20.726 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 09:09:20.734 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE # countdown value = 137438953472 # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 09:09:20.736 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE # countdown value = 137438953472 # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 09:09:20.736 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 09:09:20.739 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message ( # "EncryptedExtensions": [ # "supported_groups (10)": { # "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192] # }, # "application_layer_protocol_negotiation (16)": { # [h2] # } # ] # ) # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 09:09:20.740 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 09:09:20.740 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 09:09:20.740 UTC|SSLExtensions.java:192|Consumed extension: supported_groups # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 09:09:20.740 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 09:09:20.740 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 09:09:20.740 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length # javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-09-16 09:09:20.740 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups # javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-09-16 09:09:20.740 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 09:09:20.744 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message ( # "CertificateRequest": { # "certificate_request_context": "", # "extensions": [ # "signature_algorithms (13)": { # "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1] # }, # "signature_algorithms_cert (50)": { # "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1] # }, # "certificate_authorities (47)": { # "certificate authorities": [ # CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country # CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country] # } # ] # } # ) # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 09:09:20.744 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 09:09:20.744 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 09:09:20.744 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 09:09:20.745 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 09:09:20.746 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert # javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-09-16 09:09:20.746 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 09:09:20.761 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message ( # "Certificate": { # "certificate_request_context": "", # "certificate_list": [ # { # "certificate" : { # "version" : "v3", # "serial number" : "44 72 24 66", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-09-16 09:08:57.000 UTC", # "not after" : "2023-12-15 09:08:57.000 UTC", # "subject" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.35 Criticality=false # AuthorityKeyIdentifier [ # KeyIdentifier [ # 0000: 6E 5D 5B FF 77 E4 F2 B4 23 F7 1F 3F 1C D5 45 E9 n][.w...#..?..E. # 0010: AA B8 4E B3 ..N. # ] # ] # }, # { # ObjectId: 2.5.29.37 Criticality=true # ExtendedKeyUsages [ # serverAuth # ] # }, # { # ObjectId: 2.5.29.15 Criticality=true # KeyUsage [ # DigitalSignature # Non_repudiation # Key_Encipherment # ] # }, # { # ObjectId: 2.5.29.17 Criticality=false # SubjectAlternativeName [ # DNSName: localhost # IPAddress: 127.0.0.1 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: 45 9E FF E3 84 1D 2F D1 3F 4E 17 5B 81 6D 0A ED E...../.?N.[.m.. # 0010: 01 B3 02 CC .... # ] # ] # } # ]} # "extensions": { # <no extension> # } # }, # ] # } # ) # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 09:09:20.761 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 09:09:20.806 UTC|X509TrustManagerImpl.java:292|Found trusted certificate ( # "certificate" : { # "version" : "v3", # "serial number" : "0B 42 AB 14", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-09-16 09:08:55.000 UTC", # "not after" : "2023-12-15 09:08:55.000 UTC", # "subject" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.35 Criticality=false # AuthorityKeyIdentifier [ # KeyIdentifier [ # 0000: E2 65 6E 99 68 D6 1E C7 69 77 43 FB 3C 7D FA AD .en.h...iwC.<... # 0010: CF 0B F0 88 .... # ] # ] # }, # { # ObjectId: 2.5.29.19 Criticality=false # BasicConstraints:[ # CA:true # PathLen:0 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: 6E 5D 5B FF 77 E4 F2 B4 23 F7 1F 3F 1C D5 45 E9 n][.w...#..?..E. # 0010: AA B8 4E B3 ..N. # ] # ] # } # ]} # ) # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 09:09:20.809 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message ( # "CertificateVerify": { # "signature algorithm": rsa_pss_rsae_sha256 # "signature": { # 0000: 7E 34 98 7D A7 9C 55 80 42 5A 30 6B CD 65 97 3D .4....U.BZ0k.e.= # 0010: A1 57 21 8E EE BB 49 18 B3 BA C6 B3 9F 73 E2 F1 .W!...I......s.. # 0020: 2B F6 D0 9E A6 85 60 74 24 E7 E2 CA 1C 2B 87 D6 +.....`t$....+.. # 0030: 99 8E 2E 5E BC 47 EE AB BC F4 5A 99 32 AB 18 85 ...^.G....Z.2... # 0040: 1C 6C 60 C9 C8 B2 B0 DA 9C 54 FF E0 FB 8B 03 89 .l`......T...... # 0050: 1D 79 8B 3D 59 84 16 2F 4C 49 A9 6E 11 31 40 7E .y.=Y../LI.n.1@. # 0060: 1D 30 63 93 69 60 EC FA B9 4E 4F AC 6A 84 79 76 .0c.i`...NO.j.yv # 0070: 6A 02 AB 22 13 9E 51 D4 3F E0 42 CE 17 45 B7 2D j.."..Q.?.B..E.- # 0080: AA DF 3F 5F A1 E3 18 E8 06 5B DC A7 11 FC 28 21 ..?_.....[....(! # 0090: D1 CB 48 8E B8 18 4F DB 47 AB 01 2A A3 11 5D 1C ..H...O.G..*..]. # 00A0: 9E 3A E2 F9 9B 31 5C 2D 2C F5 0D 8C 11 0D A1 0D .:...1\-,....... # 00B0: 73 AE 49 FD 86 D4 FE C5 F6 8C A7 73 49 C2 1B ED s.I........sI... # 00C0: 6A 83 A4 E2 88 E1 30 CE DE 0C 3B C4 67 52 56 B6 j.....0...;.gRV. # 00D0: D4 9E 69 15 AB E8 A3 C4 D4 F8 C1 2E BB 6C FD 33 ..i..........l.3 # 00E0: FA 49 92 99 45 F1 84 E2 CA DF F3 80 D3 39 69 77 .I..E........9iw # 00F0: 59 42 A3 AC EA E8 38 83 4B C7 AF B6 B7 EF DB 02 YB....8.K....... # } # } # ) # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 09:09:20.810 UTC|Finished.java:898|Consuming server Finished handshake message ( # "Finished": { # "verify data": { # 0000: 50 CD B2 B7 7C EA 38 64 B0 3E 3A 5D D7 D3 9B 55 P.....8d.>:]...U # 0010: 91 39 2A C5 04 C4 C8 21 13 A2 B4 8C FF F9 AA DE .9*....!........ # 0020: BC C9 EB F4 B7 63 55 8A 7C 51 96 0C 1E 3D 8D 11 .....cU..Q...=.. # }'} # ) # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 09:09:20.811 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE # countdown value = 137438953472 # javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-09-16 09:09:20.812 UTC|X509Authentication.java:246|No X.509 cert selected for EC # javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-09-16 09:09:20.812 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256 # javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-09-16 09:09:20.812 UTC|X509Authentication.java:246|No X.509 cert selected for EC # javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-09-16 09:09:20.812 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384 # javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-09-16 09:09:20.812 UTC|X509Authentication.java:246|No X.509 cert selected for EC # javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-09-16 09:09:20.812 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512 # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 09:09:20.813 UTC|SunX509KeyManagerImpl.java:401|matching alias: client # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 09:09:20.814 UTC|CertificateMessage.java:1140|Produced client Certificate message ( # "Certificate": { # "certificate_request_context": "", # "certificate_list": [ # { # "certificate" : { # "version" : "v3", # "serial number" : "45 BE 9C 6A", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-09-16 09:09:01.000 UTC", # "not after" : "2023-12-15 09:09:01.000 UTC", # "subject" : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.35 Criticality=false # AuthorityKeyIdentifier [ # KeyIdentifier [ # 0000: 6E 5D 5B FF 77 E4 F2 B4 23 F7 1F 3F 1C D5 45 E9 n][.w...#..?..E. # 0010: AA B8 4E B3 ..N. # ] # ] # }, # { # ObjectId: 2.5.29.37 Criticality=true # ExtendedKeyUsages [ # clientAuth # ] # }, # { # ObjectId: 2.5.29.15 Criticality=true # KeyUsage [ # DigitalSignature # Non_repudiation # Key_Encipherment # ] # }, # { # ObjectId: 2.5.29.17 Criticality=false # SubjectAlternativeName [ # DNSName: test.solr.apache.org # IPAddress: 127.0.0.2 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: AE 3F 1D 85 F2 01 0B 03 06 0D 0C C3 63 DE D7 C0 .?..........c... # 0010: 7E 8D 58 19 ..X. # ] # ] # } # ]} # "extensions": { # <no extension> # } # }, # { # "certificate" : { # "version" : "v3", # "serial number" : "0B 42 AB 14", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-09-16 09:08:55.000 UTC", # "not after" : "2023-12-15 09:08:55.000 UTC", # "subject" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.35 Criticality=false # AuthorityKeyIdentifier [ # KeyIdentifier [ # 0000: E2 65 6E 99 68 D6 1E C7 69 77 43 FB 3C 7D FA AD .en.h...iwC.<... # 0010: CF 0B F0 88 .... # ] # ] # }, # { # ObjectId: 2.5.29.19 Criticality=false # BasicConstraints:[ # CA:true # PathLen:0 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: 6E 5D 5B FF 77 E4 F2 B4 23 F7 1F 3F 1C D5 45 E9 n][.w...#..?..E. # 0010: AA B8 4E B3 ..N. # ] # ] # } # ]} # "extensions": { # <no extension> # } # }, # ] # } # ) # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 09:09:20.834 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message ( # "CertificateVerify": { # "signature algorithm": rsa_pss_rsae_sha256 # "signature": { # 0000: 7F AA 0D 24 F4 B0 9D 3E C9 CF 5B A3 9F 8E F8 81 ...$...>..[..... # 0010: 66 29 4F 05 96 C3 A4 06 F8 65 1B 53 44 E4 7D 3B f)O......e.SD..; # 0020: DD 79 4D 3E D2 9D D5 A1 7D 34 F4 88 56 F4 CA 70 .yM>.....4..V..p # 0030: 80 47 4E 9F 47 B1 B9 9E C5 40 B5 A0 4E 48 70 C1 [email protected]. # 0040: FE D2 95 19 E6 A6 19 A2 22 9C 6B 1F B8 C3 1F 67 ........".k....g # 0050: 0E 4F AE 2C 81 C2 13 94 AB 97 EE 53 FF 70 A4 3F .O.,.......S.p.? # 0060: 4A 51 D0 56 55 A0 02 49 3B 7E 54 00 8D 13 82 FC JQ.VU..I;.T..... # 0070: 94 DA 36 10 35 5A 2A 19 A0 E4 DC 9A 07 39 5F 4D ..6.5Z*......9_M # 0080: 42 1C F0 94 D2 03 0E 75 AA 8E C9 50 7C 7A 2B 35 B......u...P.z+5 # 0090: 13 D2 B7 8A DA 3B 63 01 C2 4D 41 E8 B7 49 28 26 .....;c..MA..I(& # 00A0: DA 38 DD CF 0C 38 31 5C C3 81 94 BF 1D D4 EC D6 .8...81\........ # 00B0: BF 27 53 B0 75 B6 A7 64 51 07 F1 0A 01 73 74 48 .'S.u..dQ....stH # 00C0: DF 8A 16 AD D3 FB 39 06 40 87 D8 43 0D A8 71 8F [email protected]. # 00D0: 23 C0 99 34 BD 66 44 63 80 F8 C5 DA D9 07 C9 45 #..4.fDc.......E # 00E0: 0A A6 79 1A 4F FB 11 F9 72 1D 55 27 3D A0 8C 54 ..y.O...r.U'=..T # 00F0: 7F FE 8B 9A B1 2E 64 D8 83 B4 45 E6 07 34 FA 40 ......d...E..4.@ # } # } # ) # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 09:09:20.834 UTC|Finished.java:673|Produced client Finished handshake message ( # "Finished": { # "verify data": { # 0000: DA F3 8E 01 7E 0E 50 52 4E 37 20 86 93 7B AD 75 ......PRN7 ....u # 0010: 1A A1 92 BB 56 A1 B8 3A 20 16 B8 94 85 51 59 EC ....V..: ....QY. # 0020: AD CA 76 A3 10 54 5F D2 81 7C BA C6 48 3B A3 AE ..v..T_.....H;.. # }'} # ) # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 09:09:20.835 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE # countdown value = 137438953472 # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 09:09:21.264 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message ( # "NewSessionTicket": { # "ticket_lifetime" : "86,400", # "ticket_age_add" : "<omitted>", # "ticket_nonce" : "01", # "ticket" : "FD 57 D6 60 3C F6 F9 37 1A 59 8D 5F 22 ED 58 A5 04 24 22 67 16 A3 13 37 CF FD 47 59 11 DB 1D 35", # "extensions" : [ # <no extension> # ] # } # ) # javax.net.ssl|ALL|01|main|2023-09-16 09:09:21.488 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine # javax.net.ssl|WARNING|01|main|2023-09-16 09:09:21.489 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data # # -- output does not contain substring -- # substring (1 lines): # Server refused connection # output (491 lines): # INFO - 2023-09-16 09:09:34.656; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword # javax.net.ssl|DEBUG|01|main|2023-09-16 09:09:35.138 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates ( # "certificate" : { # "version" : "v3", # "serial number" : "29 4A 25 3D", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-09-16 09:08:53.000 UTC", # "not after" : "2023-12-15 09:08:53.000 UTC", # "subject" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.19 Criticality=true # BasicConstraints:[ # CA:true # PathLen:2147483647 # ] # }, # { # ObjectId: 2.5.29.17 Criticality=false # SubjectAlternativeName [ # DNSName: localhost # IPAddress: 127.0.0.1 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: E2 65 6E 99 68 D6 1E C7 69 77 43 FB 3C 7D FA AD .en.h...iwC.<... # 0010: CF 0B F0 88 .... # ] # ] # } # ]}, # "certificate" : { # "version" : "v3", # "serial number" : "0B 42 AB 14", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-09-16 09:08:55.000 UTC", # "not after" : "2023-12-15 09:08:55.000 UTC", # "subject" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.35 Criticality=false # AuthorityKeyIdentifier [ # KeyIdentifier [ # 0000: E2 65 6E 99 68 D6 1E C7 69 77 43 FB 3C 7D FA AD .en.h...iwC.<... # 0010: CF 0B F0 88 .... # ] # ] # }, # { # ObjectId: 2.5.29.19 Criticality=false # BasicConstraints:[ # CA:true # PathLen:0 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: 6E 5D 5B FF 77 E4 F2 B4 23 F7 1F 3F 1C D5 45 E9 n][.w...#..?..E. # 0010: AA B8 4E B3 ..N. # ] # ] # } # ]} # ) # javax.net.ssl|DEBUG|01|main|2023-09-16 09:09:35.150 UTC|SSLCipher.java:464|jdk.tls.keyLimits: entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472 # javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-09-16 09:09:35.281 UTC|ServerNameExtension.java:261|Unable to indicate server name # javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-09-16 09:09:35.281 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name # javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-09-16 09:09:35.282 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers # javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-09-16 09:09:35.282 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers # javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-09-16 09:09:35.286 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie # javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-09-16 09:09:35.295 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info # javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-09-16 09:09:35.295 UTC|PreSharedKeyExtension.java:633|No session to resume. # javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-09-16 09:09:35.295 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key # javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-09-16 09:09:35.297 UTC|ClientHello.java:642|Produced ClientHello handshake message ( # "ClientHello": { # "client version" : "TLSv1.2", # "random" : "55 7B FD 60 E1 C4 13 1A A2 88 DB BB 36 64 C4 D6 F4 AF 44 D4 EA 45 10 D1 2B 32 90 2C EA 02 91 ED", # "session id" : "83 34 5B F7 12 45 B3 D3 81 73 C4 DA 9C 80 86 E2 60 93 87 AD AE 3C D6 B1 6D B0 B9 43 C5 41 3C 56", # "cipher suites" : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]", # "compression methods" : "00", # "extensions" : [ # "status_request (5)": { # "certificate status type": ocsp # "OCSP status request": { # "responder_id": <empty> # "request extensions": { # <empty> # } # } # }, # "supported_groups (10)": { # "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192] # }, # "ec_point_formats (11)": { # "formats": [uncompressed] # }, # "signature_algorithms (13)": { # "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1] # }, # "signature_algorithms_cert (50)": { # "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1] # }, # "application_layer_protocol_negotiation (16)": { # [h2] # }, # "status_request_v2 (17)": { # "cert status request": { # "certificate status type": ocsp_multi # "OCSP status request": { # "responder_id": <empty> # "request extensions": { # <empty> # } # } # } # }, # "extended_master_secret (23)": { # <empty> # }, # "supported_versions (43)": { # "versions": [TLSv1.3, TLSv1.2] # }, # "psk_key_exchange_modes (45)": { # "ke_modes": [psk_dhe_ke] # }, # "key_share (51)": { # "client_shares": [ # { # "named group": x25519 # "key_exchange": { # 0000: 57 B4 E4 90 3B 23 FA 3E AE 55 1E FE BD 37 C5 5A W...;#.>.U...7.Z # 0010: 2F 04 22 6D 3B 08 D5 4B C8 E4 FE 12 8C A0 E1 10 /."m;..K........ # } # }, # ] # } # ] # } # ) # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 09:09:35.310 UTC|ServerHello.java:867|Consuming ServerHello handshake message ( # "ServerHello": { # "server version" : "TLSv1.2", # "random" : "BB 9A E0 93 B0 FC 61 06 CB 4E 5D 64 B3 A4 A0 DF 21 F0 02 E1 37 54 EE D5 9E 04 83 F0 A6 46 9A C4", # "session id" : "83 34 5B F7 12 45 B3 D3 81 73 C4 DA 9C 80 86 E2 60 93 87 AD AE 3C D6 B1 6D B0 B9 43 C5 41 3C 56", # "cipher suite" : "TLS_AES_256_GCM_SHA384(0x1302)", # "compression methods" : "00", # "extensions" : [ # "supported_versions (43)": { # "selected version": [TLSv1.3] # }, # "key_share (51)": { # "server_share": { # "named group": x25519 # "key_exchange": { # 0000: 78 CD 5F 3A 02 71 8B B9 38 DF 38 22 D2 C2 5A D5 x._:.q..8.8"..Z. # 0010: 9F 10 D3 DB 56 A8 1B 98 4A 09 29 DC C1 12 09 61 ....V...J.)....a # } # }, # } # ] # } # ) # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 09:09:35.311 UTC|SSLExtensions.java:192|Consumed extension: supported_versions # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 09:09:35.311 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3 # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 09:09:35.311 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 09:09:35.311 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 09:09:35.311 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 09:09:35.311 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 09:09:35.311 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 09:09:35.311 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2 # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 09:09:35.312 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 09:09:35.312 UTC|SSLExtensions.java:192|Consumed extension: supported_versions # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 09:09:35.313 UTC|SSLExtensions.java:192|Consumed extension: key_share # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 09:09:35.313 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 09:09:35.313 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence. # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 09:09:35.313 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 09:09:35.313 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 09:09:35.313 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 09:09:35.313 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 09:09:35.313 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 09:09:35.314 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2 # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 09:09:35.314 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret # javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-09-16 09:09:35.314 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions # javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-09-16 09:09:35.314 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-16 09:09:35.314 UTC|SSLExtensions.java:207|Ignore unavailable [...truncated too long message...] Executor.lambda$execute$0(ExecutorUtil.java:289) # at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128) # at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628) # at java.base/java.lang.Thread.run(Thread.java:829) # Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target # at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141) # at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126) # at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297) # at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434) # ... 28 more} # # ) # javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-09-16 09:10:48.117 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data # javax.net.ssl|DEBUG|03|Finalizer|2023-09-16 09:10:48.135 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket # javax.net.ssl|DEBUG|03|Finalizer|2023-09-16 09:10:48.135 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive) # javax.net.ssl|DEBUG|03|Finalizer|2023-09-16 09:10:48.135 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket # javax.net.ssl|DEBUG|03|Finalizer|2023-09-16 09:10:48.135 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive) # Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:8984/solr/admin/info/system # at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:551) # at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192) # at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:552) # at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:469) # at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:426) # at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:146) # at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:151) # Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target # at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131) # at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353) # at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296) # at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291) # at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357) # at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232) # at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175) # at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392) # at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443) # at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074) # at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061) # at java.base/java.security.AccessController.doPrivileged(Native Method) # at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008) # at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657) # at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102) # at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84) # at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314) # at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100) # at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558) # at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379) # at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146) # at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100) # at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53) # at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:289) # at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128) # at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628) # at java.base/java.lang.Thread.run(Thread.java:829) # Suppressed: java.io.IOException: Broken pipe # at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138) # at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422) # at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275) # at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254) # at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386) # at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292) # at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243) # at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224) # at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821) # at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793) # at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161) # at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451) # at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117) # at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87) # ... 11 more # Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target # at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439) # at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306) # at java.base/sun.security.validator.Validator.validate(Validator.java:264) # at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313) # at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276) # at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141) # at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335) # ... 22 more # Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target # at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141) # at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126) # at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297) # at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434) # ... 28 more ok 74 SOLR-11740 check 'solr stop' connection in 13479ms ok 75 stop command for single port in 16722ms ok 76 status detects locally running solr in 8545ms ok 77 status shell script ignores passed in -solrUrl cli parameter from user in 7359ms ok 78 status help flag outputs message highlighting not to use solrUrl. in 921ms ok 79 listing out files in 2162ms ok 80 copying files around in 6684ms ok 81 upconfig in 3254ms ok 82 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1221ms ok 83 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1205ms > Task :solr:packaging:integrationTests FAILED FAILURE: Build failed with an exception. * Where: Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build.gradle' line: 286 * What went wrong: Execution failed for task ':solr:packaging:integrationTests'. > Process 'command > '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats/bin/bats'' > finished with non-zero exit value 1 * Try: > Run with --stacktrace option to get the stack trace. > Run with --info or --debug option to get more log output. * Get more help at https://help.gradle.org Deprecated Gradle features were used in this build, making it incompatible with Gradle 8.0. You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins. See https://docs.gradle.org/7.6/userguide/command_line_interface.html#sec:command_line_warnings BUILD FAILED in 1h 1m 52s 624 actionable tasks: 624 executed Publishing build scan... Publishing failed. The response from https://ge.apache.org/scans/publish/gradle/3.13.1/token was not from Gradle Enterprise. The specified server address may be incorrect, or your network environment may be interfering. Please report this problem to your Gradle Enterprise administrator via https://ge.apache.org/help and include the following via copy/paste: ---------- Gradle version: 7.6 Plugin version: 3.13.1 Request URL: https://ge.apache.org/scans/publish/gradle/3.13.1/token Request ID: c170b9a5-eaa0-410b-8029-603edad5e4ec Response status code: 502 Response content type: text/html ---------- Build step 'Invoke Gradle script' changed build result to FAILURE Build step 'Invoke Gradle script' marked build as failure Archiving artifacts Recording test results [Checks API] No suitable checks publisher found. Email was triggered for: Failure - Any Sending email for trigger: Failure - Any
--------------------------------------------------------------------- To unsubscribe, e-mail: [email protected] For additional commands, e-mail: [email protected]
