Build: https://ci-builds.apache.org/job/Solr/job/Solr-check-9.4/900/
All tests passed Build Log: [...truncated 1230 lines...] # ERROR: IOException occurred when talking to server at: https://localhost:39701/solr/test/select # -- # # Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/59-2 # Last output: # INFO - 2023-10-27 23:51:54.611; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword # INFO - 2023-10-27 23:51:54.614; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword # WARN - 2023-10-27 23:51:55.355; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes # WARN - 2023-10-27 23:51:55.390; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes ok 60 start solr with ssl and auth in 16696ms ok 61 start solr with client truststore and security manager in 19764ms not ok 62 start solr with mTLS needed in 53053ms # (in test file test/test_ssl.bats, line 325) # `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed # /tmp/bats-run-TahWO2/test/62/ssl # Certificate was added to keystore # Certificate reply was installed in keystore # Certificate was added to keystore # Certificate was added to keystore # Certificate reply was installed in keystore # Certificate was added to keystore # Certificate was added to keystore # Certificate was added to keystore # Certificate was added to keystore # Certificate reply was installed in keystore # Certificate was added to keystore # Certificate was added to keystore # Waiting up to 180 seconds to see Solr running on port 39701 [|] [/] [-] [\] [|] # Started Solr server on port 39701 (pid=1156580). Happy searching! # # Waiting up to 180 seconds to see Solr running on port 39702 [|] [/] [-] [\] [|] [/] [-] [\] [|] # Started Solr server on port 39702 (pid=1156689). Happy searching! # # INFO - 2023-10-27 23:52:56.314; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword # INFO - 2023-10-27 23:52:56.538; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword # INFO - 2023-10-27 23:52:57.257; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@36b0fcd5(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@72bd06ca[provider=null,keyStore=file:///tmp/bats-run-TahWO2/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-TahWO2/test/62/ssl/client/solr-client.truststore.p12] # INFO - 2023-10-27 23:52:57.259; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@55795845(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@72bd06ca[provider=null,keyStore=file:///tmp/bats-run-TahWO2/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-TahWO2/test/62/ssl/client/solr-client.truststore.p12] # INFO - 2023-10-27 23:52:57.262; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@3d08f3f5(ca,h=[localhost],a=[],w=[]) for Client@72bd06ca[provider=null,keyStore=file:///tmp/bats-run-TahWO2/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-TahWO2/test/62/ssl/client/solr-client.truststore.p12] # javax.net.ssl|DEBUG|01|main|2023-10-27 23:52:57.557 UTC|SunX509KeyManagerImpl.java:164|found key for : client ( # "certificate" : { # "version" : "v3", # "serial number" : "12 64 29 01", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-10-27 23:52:43.000 UTC", # "not after" : "2024-01-25 23:52:43.000 UTC", # "subject" : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.35 Criticality=false # AuthorityKeyIdentifier [ # KeyIdentifier [ # 0000: BD C7 B7 D9 CE 28 43 D3 4D C1 F4 BC 90 45 6B 31 .....(C.M....Ek1 # 0010: D8 F4 A8 76 ...v # ] # ] # }, # { # ObjectId: 2.5.29.37 Criticality=true # ExtendedKeyUsages [ # clientAuth # ] # }, # { # ObjectId: 2.5.29.15 Criticality=true # KeyUsage [ # DigitalSignature # Non_repudiation # Key_Encipherment # ] # }, # { # ObjectId: 2.5.29.17 Criticality=false # SubjectAlternativeName [ # DNSName: test.solr.apache.org # IPAddress: 127.0.0.2 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: 69 BD 61 E9 87 E8 BD C6 10 08 08 92 9F 5E 51 FB i.a..........^Q. # 0010: 98 52 F6 E6 .R.. # ] # ] # } # ]}, # "certificate" : { # "version" : "v3", # "serial number" : "62 4E 43 0A", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-10-27 23:52:36.000 UTC", # "not after" : "2024-01-25 23:52:36.000 UTC", # "subject" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.35 Criticality=false # AuthorityKeyIdentifier [ # KeyIdentifier [ # 0000: 28 03 AD 47 72 32 CC A4 BA E2 AA 83 7C 26 AA 50 (..Gr2.......&.P # 0010: FC 67 3D CA .g=. # ] # ] # }, # { # ObjectId: 2.5.29.19 Criticality=false # BasicConstraints:[ # CA:true # PathLen:0 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: BD C7 B7 D9 CE 28 43 D3 4D C1 F4 BC 90 45 6B 31 .....(C.M....Ek1 # 0010: D8 F4 A8 76 ...v # ] # ] # } # ]} # ) # javax.net.ssl|DEBUG|01|main|2023-10-27 23:52:57.563 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates ( # "certificate" : { # "version" : "v3", # "serial number" : "0F 8A AF 43", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-10-27 23:52:34.000 UTC", # "not after" : "2024-01-25 23:52:34.000 UTC", # "subject" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.19 Criticality=true # BasicConstraints:[ # CA:true # PathLen:2147483647 # ] # }, # { # ObjectId: 2.5.29.17 Criticality=false # SubjectAlternativeName [ # DNSName: localhost # IPAddress: 127.0.0.1 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: 28 03 AD 47 72 32 CC A4 BA E2 AA 83 7C 26 AA 50 (..Gr2.......&.P # 0010: FC 67 3D CA .g=. # ] # ] # } # ]}, # "certificate" : { # "version" : "v3", # "serial number" : "62 4E 43 0A", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-10-27 23:52:36.000 UTC", # "not after" : "2024-01-25 23:52:36.000 UTC", # "subject" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.35 Criticality=false # AuthorityKeyIdentifier [ # KeyIdentifier [ # 0000: 28 03 AD 47 72 32 CC A4 BA E2 AA 83 7C 26 AA 50 (..Gr2.......&.P # 0010: FC 67 3D CA .g=. # ] # ] # }, # { # ObjectId: 2.5.29.19 Criticality=false # BasicConstraints:[ # CA:true # PathLen:0 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: BD C7 B7 D9 CE 28 43 D3 4D C1 F4 BC 90 45 6B 31 .....(C.M....Ek1 # 0010: D8 F4 A8 76 ...v # ] # ] # } # ]} # ) # javax.net.ssl|DEBUG|01|main|2023-10-27 23:52:57.578 UTC|SSLCipher.java:464|jdk.tls.keyLimits: entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472 # javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 23:52:58.091 UTC|ServerNameExtension.java:261|Unable to indicate server name # javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 23:52:58.091 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name # javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 23:52:58.094 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers # javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 23:52:58.094 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers # javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 23:52:58.110 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie # javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 23:52:58.129 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info # javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 23:52:58.129 UTC|PreSharedKeyExtension.java:633|No session to resume. # javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 23:52:58.130 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key # javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 23:52:58.132 UTC|ClientHello.java:642|Produced ClientHello handshake message ( # "ClientHello": { # "client version" : "TLSv1.2", # "random" : "DE 5B FB 9A AE 67 3C 26 84 AB 92 E4 E5 BA 61 B5 24 A8 85 4F A9 99 30 1E 74 BA 0D F8 13 AC 0D 68", # "session id" : "32 B1 D8 BC 7E C1 36 42 3F 5C 6B D7 BB 50 72 9E 69 84 C6 49 D0 F7 8D F8 F9 4B CC F8 1D 9B 5B 44", # "cipher suites" : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]", # "compression methods" : "00", # "extensions" : [ # "status_request (5)": { # "certificate status type": ocsp # "OCSP status request": { # "responder_id": <empty> # "request extensions": { # <empty> # } # } # }, # "supported_groups (10)": { # "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192] # }, # "ec_point_formats (11)": { # "formats": [uncompressed] # }, # "signature_algorithms (13)": { # "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1] # }, # "signature_algorithms_cert (50)": { # "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1] # }, # "application_layer_protocol_negotiation (16)": { # [h2] # }, # "status_request_v2 (17)": { # "cert status request": { # "certificate status type": ocsp_multi # "OCSP status request": { # "responder_id": <empty> # "request extensions": { # <empty> # } # } # } # }, # "extended_master_secret (23)": { # <empty> # }, # "supported_versions (43)": { # "versions": [TLSv1.3, TLSv1.2] # }, # "psk_key_exchange_modes (45)": { # "ke_modes": [psk_dhe_ke] # }, # "key_share (51)": { # "client_shares": [ # { # "named group": x25519 # "key_exchange": { # 0000: AA 73 50 8F 93 DA E9 BB B7 E4 FA 78 EC 0A 09 3A .sP........x...: # 0010: C9 1B 41 AF 32 5F EC 64 93 D2 2E 64 EE B8 60 24 ..A.2_.d...d..`$ # } # }, # ] # } # ] # } # ) # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 23:52:58.251 UTC|ServerHello.java:867|Consuming ServerHello handshake message ( # "ServerHello": { # "server version" : "TLSv1.2", # "random" : "AD B6 44 FA C1 39 67 53 20 6D 2F F0 60 1B 00 E4 21 D5 B7 51 5E 03 9B 52 80 BF 43 13 2B 0A 45 68", # "session id" : "32 B1 D8 BC 7E C1 36 42 3F 5C 6B D7 BB 50 72 9E 69 84 C6 49 D0 F7 8D F8 F9 4B CC F8 1D 9B 5B 44", # "cipher suite" : "TLS_AES_256_GCM_SHA384(0x1302)", # "compression methods" : "00", # "extensions" : [ # "supported_versions (43)": { # "selected version": [TLSv1.3] # }, # "key_share (51)": { # "server_share": { # "named group": x25519 # "key_exchange": { # 0000: 13 AA AE DC 5C 3E 5C E6 A8 7E 55 E5 3E 05 C2 30 ....\>\...U.>..0 # 0010: 93 5E 6B 2B 0A DC 29 BD 96 D8 4B 04 CA C0 17 2A .^k+..)...K....* # } # }, # } # ] # } # ) # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 23:52:58.251 UTC|SSLExtensions.java:192|Consumed extension: supported_versions # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 23:52:58.251 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3 # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 23:52:58.255 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 23:52:58.255 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 23:52:58.255 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 23:52:58.256 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 23:52:58.256 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 23:52:58.256 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2 # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 23:52:58.256 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 23:52:58.256 UTC|SSLExtensions.java:192|Consumed extension: supported_versions # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 23:52:58.258 UTC|SSLExtensions.java:192|Consumed extension: key_share # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 23:52:58.258 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 23:52:58.258 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence. # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 23:52:58.258 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 23:52:58.258 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 23:52:58.258 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 23:52:58.258 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 23:52:58.259 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 23:52:58.259 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2 # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 23:52:58.259 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret # javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 23:52:58.259 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions # javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 23:52:58.259 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 23:52:58.259 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 23:52:58.259 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 23:52:58.278 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE # countdown value = 137438953472 # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 23:52:58.283 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE # countdown value = 137438953472 # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 23:52:58.288 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 23:52:58.291 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message ( # "EncryptedExtensions": [ # "supported_groups (10)": { # "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192] # }, # "application_layer_protocol_negotiation (16)": { # [h2] # } # ] # ) # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 23:52:58.291 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 23:52:58.291 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 23:52:58.291 UTC|SSLExtensions.java:192|Consumed extension: supported_groups # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 23:52:58.291 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 23:52:58.291 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 23:52:58.291 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length # javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 23:52:58.291 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups # javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 23:52:58.291 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 23:52:58.301 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message ( # "CertificateRequest": { # "certificate_request_context": "", # "extensions": [ # "signature_algorithms (13)": { # "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1] # }, # "signature_algorithms_cert (50)": { # "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1] # }, # "certificate_authorities (47)": { # "certificate authorities": [ # CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country # CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country] # } # ] # } # ) # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 23:52:58.301 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 23:52:58.301 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 23:52:58.301 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 23:52:58.302 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 23:52:58.302 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert # javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 23:52:58.302 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 23:52:58.308 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message ( # "Certificate": { # "certificate_request_context": "", # "certificate_list": [ # { # "certificate" : { # "version" : "v3", # "serial number" : "03 8A B2 77", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-10-27 23:52:39.000 UTC", # "not after" : "2024-01-25 23:52:39.000 UTC", # "subject" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.35 Criticality=false # AuthorityKeyIdentifier [ # KeyIdentifier [ # 0000: BD C7 B7 D9 CE 28 43 D3 4D C1 F4 BC 90 45 6B 31 .....(C.M....Ek1 # 0010: D8 F4 A8 76 ...v # ] # ] # }, # { # ObjectId: 2.5.29.37 Criticality=true # ExtendedKeyUsages [ # serverAuth # ] # }, # { # ObjectId: 2.5.29.15 Criticality=true # KeyUsage [ # DigitalSignature # Non_repudiation # Key_Encipherment # ] # }, # { # ObjectId: 2.5.29.17 Criticality=false # SubjectAlternativeName [ # DNSName: localhost # IPAddress: 127.0.0.1 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: 24 53 42 F5 33 E7 C2 0A 2F E1 69 0A 63 AF 46 4D $SB.3.../.i.c.FM # 0010: BD 76 ED 6B .v.k # ] # ] # } # ]} # "extensions": { # <no extension> # } # }, # ] # } # ) # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 23:52:58.308 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request # javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 23:52:58.755 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket # javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 23:52:58.755 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive) # javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 23:52:58.755 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket # javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 23:52:58.755 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive) # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 23:52:58.797 UTC|X509TrustManagerImpl.java:292|Found trusted certificate ( # "certificate" : { # "version" : "v3", # "serial number" : "62 4E 43 0A", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-10-27 23:52:36.000 UTC", # "not after" : "2024-01-25 23:52:36.000 UTC", # "subject" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.35 Criticality=false # AuthorityKeyIdentifier [ # KeyIdentifier [ # 0000: 28 03 AD 47 72 32 CC A4 BA E2 AA 83 7C 26 AA 50 (..Gr2.......&.P # 0010: FC 67 3D CA .g=. # ] # ] # }, # { # ObjectId: 2.5.29.19 Criticality=false # BasicConstraints:[ # CA:true # PathLen:0 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: BD C7 B7 D9 CE 28 43 D3 4D C1 F4 BC 90 45 6B 31 .....(C.M....Ek1 # 0010: D8 F4 A8 76 ...v # ] # ] # } # ]} # ) # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 23:52:58.814 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message ( # "CertificateVerify": { # "signature algorithm": rsa_pss_rsae_sha256 # "signature": { # 0000: 9F 03 7B 40 30 2F 01 5D 6E 60 F3 51 3B 6F A5 95 ...@0/.]n`.Q;o.. # 0010: C8 4C 09 CC 51 D5 8E 54 CA C7 82 56 5B 8B 2C 7C .L..Q..T...V[.,. # 0020: B3 CA 38 24 AB 9F AC BB 76 F7 85 60 40 24 E8 B2 ..8$....v..`@$.. # 0030: CA DE 6E 91 39 BB B3 EE EF 1C C7 B3 8F 28 8E D1 ..n.9........(.. # 0040: D9 61 29 B9 66 BA 06 E8 0B C3 30 CC 7D 5B C7 41 .a).f.....0..[.A # 0050: C8 FA 05 3D DB F4 07 38 8E 1A 3E DA 1C A2 08 C2 ...=...8..>..... # 0060: 84 1A A5 DE 45 EB 30 BB B8 B4 06 0D 25 2D A5 1B ....E.0.....%-.. # 0070: 0D 8B 1F C3 08 B1 D9 5E F0 1B F9 AF 42 D1 DC EF .......^....B... # 0080: E4 AF 7D E1 33 EB 5E 2E 7B 23 2B 41 5E 04 D2 9F ....3.^..#+A^... # 0090: D0 E7 A0 63 2B 7F 49 5E DF BC 30 B6 42 79 E8 6A ...c+.I^..0.By.j # 00A0: B0 15 9A 2C 99 0C 4F 42 26 85 09 E0 76 AB D0 F8 ...,..OB&...v... # 00B0: 58 38 12 84 80 8C 9C ED 88 A5 D5 BB 30 E0 0C 1F X8..........0... # 00C0: 65 A8 36 1C B9 7D 4A 17 1B 9D 53 C2 9B 97 48 B2 e.6...J...S...H. # 00D0: E2 6B DE 6D B4 B5 47 BA 61 57 BA AB C2 60 45 B6 .k.m..G.aW...`E. # 00E0: CD 05 6D ED BE D6 F4 A1 9A CF 14 0C 50 7F BF 5F ..m.........P.._ # 00F0: D2 61 AD A3 AD 00 F1 5C F9 8B 26 3C 6A B4 F3 81 .a.....\..&<j... # } # } # ) # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 23:52:58.818 UTC|Finished.java:898|Consuming server Finished handshake message ( # "Finished": { # "verify data": { # 0000: 3C 81 93 9A BC 21 8A 5A 5B 11 41 F5 E4 7C D3 3D <....!.Z[.A....= # 0010: 63 51 8D C5 BE EA 9F D9 B5 20 7B 9C 55 88 28 23 cQ....... ..U.(# # 0020: 1B 9D 3D 03 AA 81 F5 50 DB 3C 02 9C A7 CE CF D1 ..=....P.<...... # }'} # ) # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 23:52:58.826 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE # countdown value = 137438953472 # javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-27 23:52:58.830 UTC|X509Authentication.java:246|No X.509 cert selected for EC # javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 23:52:58.830 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256 # javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-27 23:52:58.831 UTC|X509Authentication.java:246|No X.509 cert selected for EC # javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 23:52:58.831 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384 # javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-27 23:52:58.832 UTC|X509Authentication.java:246|No X.509 cert selected for EC # javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 23:52:58.837 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512 # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 23:52:58.842 UTC|SunX509KeyManagerImpl.java:401|matching alias: client # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 23:52:58.844 UTC|CertificateMessage.java:1140|Produced client Certificate message ( # "Certificate": { # "certificate_request_context": "", # "certificate_list": [ # { # "certificate" : { # "version" : "v3", # "serial number" : "12 64 29 01", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-10-27 23:52:43.000 UTC", # "not after" : "2024-01-25 23:52:43.000 UTC", # "subject" : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.35 Criticality=false # AuthorityKeyIdentifier [ # KeyIdentifier [ # 0000: BD C7 B7 D9 CE 28 43 D3 4D C1 F4 BC 90 45 6B 31 .....(C.M....Ek1 # 0010: D8 F4 A8 76 ...v # ] # ] # }, # { # ObjectId: 2.5.29.37 Criticality=true # ExtendedKeyUsages [ # clientAuth # ] # }, # { # ObjectId: 2.5.29.15 Criticality=true # KeyUsage [ # DigitalSignature # Non_repudiation # Key_Encipherment # ] # }, # { # ObjectId: 2.5.29.17 Criticality=false # SubjectAlternativeName [ # DNSName: test.solr.apache.org # IPAddress: 127.0.0.2 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: 69 BD 61 E9 87 E8 BD C6 10 08 08 92 9F 5E 51 FB i.a..........^Q. # 0010: 98 52 F6 E6 .R.. # ] # ] # } # ]} # "extensions": { # <no extension> # } # }, # { # "certificate" : { # "version" : "v3", # "serial number" : "62 4E 43 0A", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-10-27 23:52:36.000 UTC", # "not after" : "2024-01-25 23:52:36.000 UTC", # "subject" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.35 Criticality=false # AuthorityKeyIdentifier [ # KeyIdentifier [ # 0000: 28 03 AD 47 72 32 CC A4 BA E2 AA 83 7C 26 AA 50 (..Gr2.......&.P # 0010: FC 67 3D CA .g=. # ] # ] # }, # { # ObjectId: 2.5.29.19 Criticality=false # BasicConstraints:[ # CA:true # PathLen:0 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: BD C7 B7 D9 CE 28 43 D3 4D C1 F4 BC 90 45 6B 31 .....(C.M....Ek1 # 0010: D8 F4 A8 76 ...v # ] # ] # } # ]} # "extensions": { # <no extension> # } # }, # ] # } # ) # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 23:52:58.878 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message ( # "CertificateVerify": { # "signature algorithm": rsa_pss_rsae_sha256 # "signature": { # 0000: 3E 52 3B 2D 4D 9F F3 E0 24 A0 99 1A 49 24 8D BA >R;-M...$...I$.. # 0010: A8 E9 1A 8B B9 AC AB 6D A8 05 FA 2C 6A 9A 61 1D .......m...,j.a. # 0020: 80 E1 84 01 86 48 E4 1C B3 2F 52 CE 54 54 1D D7 .....H.../R.TT.. # 0030: 13 9C 04 B2 FD E0 2A C5 68 6A C8 F4 B2 B2 8E A8 ......*.hj...... # 0040: A0 E3 1E 64 21 A6 69 60 C1 C4 6E 32 A6 22 3F 22 ...d!.i`..n2."?" # 0050: 79 E5 BC DA 4F E6 9D 21 BF B7 96 EE B9 9B 83 D4 y...O..!........ # 0060: 95 57 4F 94 45 81 58 DC 1D 2C D5 53 4D E1 E5 D3 .WO.E.X..,.SM... # 0070: B9 50 6A 3E AA F0 01 67 50 E1 9E 8F 96 A1 22 5F .Pj>...gP....."_ # 0080: 97 DB 16 A5 E8 98 34 4B AE FF 35 39 A9 A5 E3 45 ......4K..59...E # 0090: 91 64 84 D9 01 FC 7E 11 45 C3 AA 13 99 BE 8A 15 .d......E....... # 00A0: 23 86 AB D7 FE 78 58 48 BA 4A 54 EB 27 F5 1D F4 #....xXH.JT.'... # 00B0: D0 2B 7B D4 69 99 E5 A0 6D CD E8 B8 65 36 E0 BD .+..i...m...e6.. # 00C0: A8 37 A5 6C 6B 30 49 F6 2F FE 2A 5E 32 58 25 29 .7.lk0I./.*^2X%) # 00D0: 4B CE 01 D3 17 E1 54 B8 F3 B4 FC 8E A4 52 66 8D K.....T......Rf. # 00E0: 18 76 9C 1A 3A B0 35 64 41 70 CC 48 3A ED A2 14 .v..:.5dAp.H:... # 00F0: A0 8B DD 01 23 A8 5B 80 6B 38 CE DB A7 8C C2 49 ....#.[.k8.....I # } # } # ) # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 23:52:58.879 UTC|Finished.java:673|Produced client Finished handshake message ( # "Finished": { # "verify data": { # 0000: CC 0F 3E 9D 0A 2B 70 FA 3B C1 82 8E 59 1D CC 13 ..>..+p.;...Y... # 0010: 8D C1 0D 4F 86 2E FE 06 23 A5 E4 D7 59 D3 9D 33 ...O....#...Y..3 # 0020: A9 E4 A5 D1 58 67 82 DA D4 F5 67 65 78 08 69 EE ....Xg....gex.i. # }'} # ) # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 23:52:58.882 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE # countdown value = 137438953472 # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 23:52:58.990 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message ( # "NewSessionTicket": { # "ticket_lifetime" : "86,400", # "ticket_age_add" : "<omitted>", # "ticket_nonce" : "01", # "ticket" : "AB 5D 11 0F 84 9F 46 3F 54 F9 2E A7 55 34 FC BD 20 98 10 D7 59 98 44 B3 53 81 12 9D 10 A1 E8 24", # "extensions" : [ # <no extension> # ] # } # ) # javax.net.ssl|ALL|01|main|2023-10-27 23:52:59.640 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine # javax.net.ssl|WARNING|01|main|2023-10-27 23:52:59.641 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data # INFO - 2023-10-27 23:53:01.265; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword # INFO - 2023-10-27 23:53:01.269; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword # INFO - 2023-10-27 23:53:01.802; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@743cb8e0(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@4fad94a7[provider=null,keyStore=file:///tmp/bats-run-TahWO2/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-TahWO2/test/62/ssl/client/solr-client.truststore.p12] # INFO - 2023-10-27 23:53:01.804; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@716a7124(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@4fad94a7[provider=null,keyStore=file:///tmp/bats-run-TahWO2/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-TahWO2/test/62/ssl/client/solr-client.truststore.p12] # INFO - 2023-10-27 23:53:01.805; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@77192705(ca,h=[localhost],a=[],w=[]) for Client@4fad94a7[provider=null,keyStore=file:///tmp/bats-run-TahWO2/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-TahWO2/test/62/ssl/client/solr-client.truststore.p12] # javax.net.ssl|DEBUG|01|main|2023-10-27 23:53:01.836 UTC|SunX509KeyManagerImpl.java:164|found key for : client ( # "certificate" : { # "version" : "v3", # "serial number" : "12 64 29 01", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-10-27 23:52:43.000 UTC", # "not after" : "2024-01-25 23:52:43.000 UTC", # "subject" : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.35 Criticality=false # AuthorityKeyIdentifier [ # KeyIdentifier [ # 0000: BD C7 B7 D9 CE 28 43 D3 4D C1 F4 BC 90 45 6B 31 .....(C.M....Ek1 # 0010: D8 F4 A8 76 ...v # ] # ] # }, # { # ObjectId: 2.5.29.37 Criticality=true # ExtendedKeyUsages [ # clientAuth # ] # }, # { # ObjectId: 2.5.29.15 Criticality=true # KeyUsage [ # DigitalSignature # Non_repudiation # Key_Encipherment # ] # }, # { # ObjectId: 2.5.29.17 Criticality=false # SubjectAlternativeName [ # DNSName: test.solr.apache.org # IPAddress: 127.0.0.2 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: 69 BD 61 E9 87 E8 BD C6 10 08 08 92 9F 5E 51 FB i.a..........^Q. # 0010: 98 52 F6 E6 .R.. # ] # ] # } # ]}, # "certificate" : { # "version" : "v3", # "serial number" : "62 4E 43 0A", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-10-27 23:52:36.000 UTC", # "not after" : "2024-01-25 23:52:36.000 UTC", # "subject" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.35 Criticality=false # AuthorityKeyIdentifier [ # KeyIdentifier [ # 0000: 28 03 AD 47 72 32 CC A4 BA E2 AA 83 7C 26 AA 50 (..Gr2.......&.P # 0010: FC 67 3D CA .g=. # ] # ] # }, # { # ObjectId: 2.5.29.19 Criticality=false # BasicConstraints:[ # CA:true # PathLen:0 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: BD C7 B7 D9 CE 28 43 D3 4D C1 F4 BC 90 45 6B 31 .....(C.M....Ek1 # 0010: D8 F4 A8 76 ...v # ] # ] # } # ]} # ) # javax.net.ssl|DEBUG|01|main|2023-10-27 23:53:01.839 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates ( # "certificate" : { # "version" : "v3", # "serial number" : "0F 8A AF 43", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-10-27 23:52:34.000 UTC", # "not after" : "2024-01-25 23:52:34.000 UTC", # "subject" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.19 Criticality=true # BasicConstraints:[ # CA:true # PathLen:2147483647 # ] # }, # { # ObjectId: 2.5.29.17 Criticality=false # SubjectAlternativeName [ # DNSName: localhost # IPAddress: 127.0.0.1 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: 28 03 AD 47 72 32 CC A4 BA E2 AA 83 7C 26 AA 50 (..Gr2.......&.P # 0010: FC 67 3D CA .g=. # ] # ] # } # ]}, # "certificate" : { # "version" : "v3", # "serial number" : "62 4E 43 0A", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-10-27 23:52:36.000 UTC", # "not after" : "2024-01-25 23:52:36.000 UTC", # "subject" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.35 Criticality=false # AuthorityKeyIdentifier [ # KeyIdentifier [ # 0000: 28 03 AD 47 72 32 CC A4 BA E2 AA 83 7C 26 AA 50 (..Gr2.......&.P # 0010: FC 67 3D CA .g=. # ] # ] # }, # { # ObjectId: 2.5.29.19 Criticality=false # BasicConstraints:[ # CA:true # PathLen:0 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: BD C7 B7 D9 CE 28 43 D3 4D C1 F4 BC 90 45 6B 31 .....(C.M....Ek1 # 0010: D8 F4 A8 76 ...v # ] # ] # } # ]} # ) # javax.net.ssl|DEBUG|01|main|2023-10-27 23:53:01.851 UTC|SSLCipher.java:464|jdk.tls.keyLimits: entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472 # javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 23:53:02.022 UTC|ServerNameExtension.java:261|Unable to indicate server name # javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 23:53:02.022 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name # javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 23:53:02.026 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers # javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 23:53:02.027 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers # javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 23:53:02.034 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie # javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 23:53:02.048 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info # javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 23:53:02.049 UTC|PreSharedKeyExtension.java:633|No session to resume. # javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 23:53:02.049 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key # javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 23:53:02.052 UTC|ClientHello.java:642|Produced ClientHello handshake message ( # "ClientHello": { # "client version" : "TLSv1.2", # "random" : "D7 27 01 1C 48 DC 18 CB CC 9F 3E 29 2E 9A B1 6D BB 15 A9 11 90 71 E6 EB F0 8C 66 42 53 79 A5 9B", # "session id" : "13 2D E9 46 FA 97 BD 90 78 2C 03 7E 07 FC 44 26 D6 B3 D0 24 9D BD 6F 94 80 79 9B 92 5B 96 CE 21", # "cipher suites" : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]", # "compression methods" : "00", # "extensions" : [ # "status_request (5)": { # "certificate status type": ocsp # "OCSP status request": { # "responder_id": <empty> # "request extensions": { # <empty> # } # } # }, # "supported_groups (10)": { # "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192] # }, # "ec_point_formats (11)": { # "formats": [uncompressed] # }, # "signature_algorithms (13)": { # "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1] # }, # "signature_algorithms_cert (50)": { # "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1] # }, # "application_layer_protocol_negotiation (16)": { # [h2] # }, # "status_request_v2 (17)": { # "cert status request": { # "certificate status type": ocsp_multi # "OCSP status request": { # "responder_id": <empty> # "request extensions": { # <empty> # } # } # } # }, # "extended_master_secret (23)": { # <empty> # }, # "supported_versions (43)": { # "versions": [TLSv1.3, TLSv1.2] # }, # "psk_key_exchange_modes (45)": { # "ke_modes": [psk_dhe_ke] # }, # "key_share (51)": { # "client_shares": [ # { # "named group": x25519 # "key_exchange": { # 0000: 53 AE 7E E2 E1 9D 4D D4 1D FD D9 3E 2C 6A 8D 09 S.....M....>,j.. # 0010: EB 94 63 C8 8D 70 34 33 0E 30 2E 42 2A E3 49 27 ..c..p43.0.B*.I' # } # }, # ] # } # ] # } # ) # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 23:53:02.147 UTC|ServerHello.java:867|Consuming ServerHello handshake message ( # "ServerHello": { # "server version" : "TLSv1.2", # "random" : "B9 89 5A D8 81 EA DA 6B 88 01 12 83 35 9D AD BF 2E D2 BA AB C3 4B 56 B9 44 9F 7B 13 35 4B 43 76", # "session id" : "13 2D E9 46 FA 97 BD 90 78 2C 03 7E 07 FC 44 26 D6 B3 D0 24 9D BD 6F 94 80 79 9B 92 5B 96 CE 21", # "cipher suite" : "TLS_AES_256_GCM_SHA384(0x1302)", # "compression methods" : "00", # "extensions" : [ # "supported_versions (43)": { # "selected version": [TLSv1.3] # }, # "key_share (51)": { # "server_share": { # "named group": x25519 # "key_exchange": { # 0000: DF BA D7 23 5D EE B7 C4 D7 85 D9 5D EA 4A AA A3 ...#]......].J.. # 0010: B9 6C 5E 83 3F 61 FD 76 A2 A3 E0 CC A0 B4 F8 0B .l^.?a.v........ # } # }, # } # ] # } # ) # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 23:53:02.147 UTC|SSLExtensions.java:192|Consumed extension: supported_versions # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 23:53:02.147 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3 # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 23:53:02.151 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 23:53:02.151 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 23:53:02.152 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 23:53:02.152 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 23:53:02.152 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 23:53:02.152 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2 # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 23:53:02.152 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 23:53:02.152 UTC|SSLExtensions.java:192|Consumed extension: supported_versions # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 23:53:02.154 UTC|SSLExtensions.java:192|Consumed extension: key_share # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 23:53:02.154 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 23:53:02.154 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence. # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 23:53:02.154 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 23:53:02.154 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 23:53:02.154 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 23:53:02.154 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 23:53:02.154 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 23:53:02.154 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2 # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 23:53:02.155 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret # javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 23:53:02.155 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions # javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 23:53:02.155 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 23:53:02.155 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 23:53:02.155 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 23:53:02.228 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE # countdown value = 137438953472 # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 23:53:02.230 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE # countdown value = 137438953472 # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 23:53:02.231 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 23:53:02.238 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message ( # "EncryptedExtensions": [ # "supported_groups (10)": { # "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192] # }, # "application_layer_protocol_negotiation (16)": { # [h2] # } # ] # ) # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 23:53:02.238 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 23:53:02.238 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 23:53:02.238 UTC|SSLExtensions.java:192|Consumed extension: supported_groups # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 23:53:02.239 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 23:53:02.239 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 23:53:02.239 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length # javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 23:53:02.239 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups # javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 23:53:02.239 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 23:53:02.248 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message ( # "CertificateRequest": { # "certificate_request_context": "", # "extensions": [ # "signature_algorithms (13)": { # "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1] # }, # "signature_algorithms_cert (50)": { # "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1] # }, # "certificate_authorities (47)": { # "certificate authorities": [ # CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country # CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country] # } # ] # } # ) # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 23:53:02.249 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 23:53:02.249 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 23:53:02.249 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 23:53:02.249 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 23:53:02.250 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert # javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 23:53:02.250 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 23:53:02.253 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message ( # "Certificate": { # "certificate_request_context": "", # "certificate_list": [ # { # "certificate" : { # "version" : "v3", # "serial number" : "03 8A B2 77", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-10-27 23:52:39.000 UTC", # "not after" : "2024-01-25 23:52:39.000 UTC", # "subject" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.35 Criticality=false # AuthorityKeyIdentifier [ # KeyIdentifier [ # 0000: BD C7 B7 D9 CE 28 43 D3 4D C1 F4 BC 90 45 6B 31 .....(C.M....Ek1 # 0010: D8 F4 A8 76 ...v # ] # ] # }, # { # ObjectId: 2.5.29.37 Criticality=true # ExtendedKeyUsages [ # serverAuth # ] # }, # { # ObjectId: 2.5.29.15 Criticality=true # KeyUsage [ # DigitalSignature # Non_repudiation # Key_Encipherment # ] # }, # { # ObjectId: 2.5.29.17 Criticality=false # SubjectAlternativeName [ # DNSName: localhost # IPAddress: 127.0.0.1 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: 24 53 42 F5 33 E7 C2 0A 2F E1 69 0A 63 AF 46 4D $SB.3.../.i.c.FM # 0010: BD 76 ED 6B .v.k # ] # ] # } # ]} # "extensions": { # <no extension> # } # }, # ] # } # ) # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 23:53:02.253 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 23:53:02.310 UTC|X509TrustManagerImpl.java:292|Found trusted certificate ( # "certificate" : { # "version" : "v3", # "serial number" : "62 4E 43 0A", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-10-27 23:52:36.000 UTC", # "not after" : "2024-01-25 23:52:36.000 UTC", # "subject" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.35 Criticality=false # AuthorityKeyIdentifier [ # KeyIdentifier [ # 0000: 28 03 AD 47 72 32 CC A4 BA E2 AA 83 7C 26 AA 50 (..Gr2.......&.P # 0010: FC 67 3D CA .g=. # ] # ] # }, # { # ObjectId: 2.5.29.19 Criticality=false # BasicConstraints:[ # CA:true # PathLen:0 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: BD C7 B7 D9 CE 28 43 D3 4D C1 F4 BC 90 45 6B 31 .....(C.M....Ek1 # 0010: D8 F4 A8 76 ...v # ] # ] # } # ]} # ) # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 23:53:02.313 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message ( # "CertificateVerify": { # "signature algorithm": rsa_pss_rsae_sha256 # "signature": { # 0000: 0B 9B B9 AC 32 BE 77 5F 1E F6 E8 E1 AA C8 20 43 ....2.w_...... C # 0010: 2C 7C 84 5C A4 C9 BB BD 94 D3 73 9D 5D 20 B4 E9 ,..\......s.] .. # 0020: 99 6B B8 CE 98 4A 20 3B 87 59 EA 85 CA 46 4E 24 .k...J ;.Y...FN$ # 0030: 99 80 21 77 30 46 D4 81 0D 0E 16 83 39 70 6E 62 ..!w0F......9pnb # 0040: 2C 42 58 48 5A 8C 0D 4E 39 0E 4C 99 56 A2 92 32 ,BXHZ..N9.L.V..2 # 0050: 05 0F 7E 50 9F 5F A3 7C C8 1C 87 E0 EF C0 2E 36 ...P._.........6 # 0060: 8D 02 59 60 85 C7 65 7A 46 77 3B 9D AC 68 D4 BA ..Y`..ezFw;..h.. # 0070: F2 FB 45 5D 1F 98 C3 00 95 16 39 88 56 4F C1 AA ..E]......9.VO.. # 0080: 2A 4E C7 38 10 13 11 F0 09 03 C7 43 2E 27 47 CA *N.8.......C.'G. # 0090: 09 C1 F5 57 5A BB 57 F8 89 D5 B8 02 F3 98 7D AC ...WZ.W......... # 00A0: 73 F6 2B 61 C9 22 3B 63 77 59 F3 79 4D 86 A6 AF s.+a.";cwY.yM... # 00B0: F7 51 F5 81 F9 6A CC BD D0 68 96 56 73 EA A9 46 .Q...j...h.Vs..F # 00C0: A2 3C 6E 1A 0B 87 07 8E CF 00 2D 5F 40 D0 37 7F .<[email protected]. # 00D0: 95 35 44 5F 04 20 80 DF DE DD 71 99 6C BB 0A AE .5D_. ....q.l... # 00E0: 91 72 21 F0 3B D9 AA 70 CF EF A2 2A 32 9D 23 66 .r!.;..p...*2.#f # 00F0: 82 7E 2E CE 73 BB EE 4A 4D 2F C4 53 7F 23 BE C5 ....s..JM/.S.#.. # } # } # ) # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 23:53:02.315 UTC|Finished.java:898|Consuming server Finished handshake message ( # "Finished": { # "verify data": { # 0000: 12 AD 61 C9 4E F0 D2 C8 3E 6B 56 8F 8F 21 E1 6E ..a.N...>kV..!.n # 0010: 1C 56 60 2D 67 68 FC 2E 34 BC D1 82 9E 18 53 1D .V`-gh..4.....S. # 0020: 53 1F 2D A8 99 C6 44 5F C2 9A AC BA 28 E5 4F 56 S.-...D_....(.OV # }'} # ) # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 23:53:02.317 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE # countdown value = 137438953472 # javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-27 23:53:02.317 UTC|X509Authentication.java:246|No X.509 cert selected for EC # javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 23:53:02.318 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256 # javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-27 23:53:02.318 UTC|X509Authentication.java:246|No X.509 cert selected for EC # javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 23:53:02.318 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384 # javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-27 23:53:02.318 UTC|X509Authentication.java:246|No X.509 cert selected for EC # javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 23:53:02.318 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512 # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 23:53:02.318 UTC|SunX509KeyManagerImpl.java:401|matching alias: client # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 23:53:02.320 UTC|CertificateMessage.java:1140|Produced client Certificate message ( # "Certificate": { # "certificate_request_context": "", # "certificate_list": [ # { # "certificate" : { # "version" : "v3", # "serial number" : "12 64 29 01", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-10-27 23:52:43.000 UTC", # "not after" : "2024-01-25 23:52:43.000 UTC", # "subject" : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.35 Criticality=false # AuthorityKeyIdentifier [ # KeyIdentifier [ # 0000: BD C7 B7 D9 CE 28 43 D3 4D C1 F4 BC 90 45 6B 31 .....(C.M....Ek1 # 0010: D8 F4 A8 76 ...v # ] # ] # }, # { # ObjectId: 2.5.29.37 Criticality=true # ExtendedKeyUsages [ # clientAuth # ] # }, # { # ObjectId: 2.5.29.15 Criticality=true # KeyUsage [ # DigitalSignature # Non_repudiation # Key_Encipherment # ] # }, # { # ObjectId: 2.5.29.17 Criticality=false # SubjectAlternativeName [ # DNSName: test.solr.apache.org # IPAddress: 127.0.0.2 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: 69 BD 61 E9 87 E8 BD C6 10 08 08 92 9F 5E 51 FB i.a..........^Q. # 0010: 98 52 F6 E6 .R.. # ] # ] # } # ]} # "extensions": { # <no extension> # } # }, # { # "certificate" : { # "version" : "v3", # "serial number" : "62 4E 43 0A", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-10-27 23:52:36.000 UTC", # "not after" : "2024-01-25 23:52:36.000 UTC", # "subject" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.35 Criticality=false # AuthorityKeyIdentifier [ # KeyIdentifier [ # 0000: 28 03 AD 47 72 32 CC A4 BA E2 AA 83 7C 26 AA 50 (..Gr2.......&.P # 0010: FC 67 3D CA .g=. # ] # ] # }, # { # ObjectId: 2.5.29.19 Criticality=false # BasicConstraints:[ # CA:true # PathLen:0 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: BD C7 B7 D9 CE 28 43 D3 4D C1 F4 BC 90 45 6B 31 .....(C.M....Ek1 # 0010: D8 F4 A8 76 ...v # ] # ] # } # ]} # "extensions": { # <no extension> # } # }, # ] # } # ) # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 23:53:02.567 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message ( # "CertificateVerify": { # "signature algorithm": rsa_pss_rsae_sha256 # "signature": { # 0000: 97 78 DD 5C BB 73 B1 AF 5C E3 78 41 56 ED B0 B4 .x.\.s..\.xAV... # 0010: 5C 0C 64 23 59 33 09 59 F1 F8 B2 68 30 63 1B 28 \.d#Y3.Y...h0c.( # 0020: 25 5B 56 5A E8 96 64 0B EB 1B 9C D8 25 51 90 08 %[VZ..d.....%Q.. # 0030: 43 62 76 54 85 1E A3 BE 56 A9 8E 01 DC 77 44 CE CbvT....V....wD. # 0040: CE 40 AA A6 D6 E6 96 DD 79 7B DE FF C9 17 24 83 [email protected].....$. # 0050: D2 88 96 0F CE 66 70 65 40 FA B5 29 37 2E 32 A2 .....fpe@..)7.2. # 0060: DF 76 97 D6 CA F1 A8 6D CF ED 6D 51 E7 D1 AA 85 .v.....m..mQ.... # 0070: 53 8E A6 77 E0 13 0E F1 9D EF D8 1E 52 D1 A1 B1 S..w........R... # 0080: 95 A7 0A 38 48 84 2F 12 A1 73 78 F7 41 4C 4B 9B ...8H./..sx.ALK. # 0090: 9F 93 79 DD 66 EC 48 05 D9 96 84 76 8A 28 A7 BD ..y.f.H....v.(.. # 00A0: 97 F3 F4 D5 E5 98 75 EA 67 46 8D F3 33 A9 0D 3D ......u.gF..3..= # 00B0: 35 BC 5D E4 B3 1D 4C 4F 1F A7 7A AA C9 E6 A3 5D 5.]...LO..z....] # 00C0: 3F 9F C7 6F 0B 13 E6 B2 C5 31 DC 71 9D 19 22 05 ?..o.....1.q..". # 00D0: D6 13 9B C5 AD 2E 3A E0 D8 2E D1 BF 62 3E 1B 33 ......:.....b>.3 # 00E0: DD AE 51 FB 23 7D C0 94 8F 99 FC ED 68 62 3A E6 ..Q.#.......hb:. # 00F0: 47 B8 F5 D4 E2 B0 D9 BB C7 2E 54 B9 4E 87 4B 89 G.........T.N.K. # } # } # ) # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 23:53:02.570 UTC|Finished.java:673|Produced client Finished handshake message ( # "Finished": { # "verify data": { # 0000: A8 D5 6E FF 84 5F 06 F3 A5 83 47 E7 AF 39 8B 61 ..n.._....G..9.a # 0010: A4 70 34 6D 64 FF 76 83 3B B1 C1 C6 DE B4 AC AA .p4md.v.;....... # 0020: E7 86 12 2E 3F F2 73 6D 72 D2 A5 9B 7A C2 84 1A ....?.smr...z... # }'} # ) # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 23:53:02.570 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE # countdown value = 137438953472 # javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 23:53:02.603 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket # javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 23:53:02.604 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive) # javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 23:53:02.604 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket # javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 23:53:02.604 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive) # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 23:53:02.637 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message ( # "NewSessionTicket": { # "ticket_lifetime" : "86,400", # "ticket_age_add" : "<omitted>", # "ticket_nonce" : "01", # "ticket" : "E1 F4 7E 6F 04 3A D7 1A 91 45 C9 C9 C7 EC 89 A3 E7 8A A5 A7 99 05 17 F5 FD 58 C9 E9 3C 77 E0 5A", # "extensions" : [ # <no extension> # ] # } # ) # javax.net.ssl|ALL|01|main|2023-10-27 23:53:02.887 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine # javax.net.ssl|WARNING|01|main|2023-10-27 23:53:02.888 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data # javax.net.ssl|ALL|0E|h2sc-1-thread-2|2023-10-27 23:53:02.890 UTC|SSLEngineImpl.java:724|Closing inbound of SSLEngine # javax.net.ssl|ERROR|0E|h2sc-1-thread-2|2023-10-27 23:53:02.891 UTC|TransportContext.java:345|Fatal (INTERNAL_ERROR): closing inbound before receiving peer's close_notify ( # "throwable" : { # javax.net.ssl.SSLException: closing inbound before receiving peer's close_notify # at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:133) # at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:117) # at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:340) # at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296) # at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:287) # at java.base/sun.security.ssl.SSLEngineImpl.closeInbound(SSLEngineImpl.java:733) # at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.closeInbound(SslConnection.java:985) # at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:769) # at org.eclipse.jetty.http2.HTTP2Connection.fill(HTTP2Connection.java:164) # at org.eclipse.jetty.http2.HTTP2Connection$HTTP2Producer.produce(HTTP2Connection.java:368) # at org.eclipse.jetty.util.thread.strategy.AdaptiveExecutionStrategy.produceTask(AdaptiveExecutionStrategy.java:455) # at org.eclipse.jetty.util.thread.strategy.AdaptiveExecutionStrategy.tryProduce(AdaptiveExecutionStrategy.java:248) # at org.eclipse.jetty.util.thread.strategy.AdaptiveExecutionStrategy.produce(AdaptiveExecutionStrategy.java:193) # at org.eclipse.jetty.http2.HTTP2Connection.produce(HTTP2Connection.java:208) # at org.eclipse.jetty.http2.HTTP2Connection.onFillable(HTTP2Connection.java:155) # at org.eclipse.jetty.http2.HTTP2Connection$FillableCallback.succeeded(HTTP2Connection.java:450) # at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100) # at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558) # at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379) # at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146) # at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100) # at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53) # at org.eclipse.jetty.util.thread.Invocable.invokeNonBlocking(Invocable.java:151) # at org.eclipse.jetty.util.thread.strategy.AdaptiveExecutionStrategy.invokeAsNonBlocking(AdaptiveExecutionStrategy.java:438) # at org.eclipse.jetty.util.thread.strategy.AdaptiveExecutionStrategy.consumeTask(AdaptiveExecutionStrategy.java:380) # at org.eclipse.jetty.util.thread.strategy.AdaptiveExecutionStrategy.tryProduce(AdaptiveExecutionStrategy.java:277) # at org.eclipse.jetty.util.thread.strategy.AdaptiveExecutionStrategy.produce(AdaptiveExecutionStrategy.java:193) # at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294) # at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128) # at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628) # at java.base/java.lang.Thread.run(Thread.java:829)} # # ) # # -- output does not contain substring -- # substring (1 lines): # Server refused connection # output (487 lines): # INFO - 2023-10-27 23:53:16.279; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword # javax.net.ssl|DEBUG|01|main|2023-10-27 23:53:16.560 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates ( # "certificate" : { # "version" : "v3", # "serial number" : "0F 8A AF 43", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-10-27 23:52:34.000 UTC", # "not after" : "2024-01-25 23:52:34.000 UTC", # "subject" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.19 Criticality=true # BasicConstraints:[ # CA:true # PathLen:2147483647 # ] # }, # { # ObjectId: 2.5.29.17 Criticality=false # SubjectAlternativeName [ # DNSName: localhost # IPAddress: 127.0.0.1 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: 28 03 AD 47 72 32 CC A4 BA E2 AA 83 7C 26 AA 50 (..Gr2.......&.P # 0010: FC 67 3D CA .g=. # ] # ] # } # ]}, # "certificate" : { # "version" : "v3", # "serial number" : "62 4E 43 0A", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-10-27 23:52:36.000 UTC", # "not after" : "2024-01-25 23:52:36.000 UTC", # "subject" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.35 Criticality=false # AuthorityKeyIdentifier [ # KeyIdentifier [ # 0000: 28 03 AD 47 72 32 CC A4 BA E2 AA 83 7C 26 AA 50 (..Gr2.......&.P # 0010: FC 67 3D CA .g=. # ] # ] # }, # { # ObjectId: 2.5.29.19 Criticality=false # BasicConstraints:[ # CA:true # PathLen:0 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: BD C7 B7 D9 CE 28 43 D3 4D C1 F4 BC 90 45 6B 31 .....(C.M....Ek1 # 0010: D8 F4 A8 76 ...v # ] # ] # } # ]} # ) # javax.net.ssl|DEBUG|01|main|2023-10-27 23:53:16.572 UTC|SSLCipher.java:464|jdk.tls.keyLimits: entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472 # javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 23:53:16.924 UTC|ServerNameExtension.java:261|Unable to indicate server name # javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 23:53:16.924 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name # javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 23:53:16.926 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers # javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 23:53:16.926 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers # javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 23:53:16.930 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie # javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 23:53:16.940 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info # javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 23:53:16.940 UTC|PreSharedKeyExtension.java:633|No session to resume. # javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 23:53:16.940 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key # javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 23:53:16.942 UTC|ClientHello.java:642|Produced ClientHello handshake message ( # "ClientHello": { # "client version" : "TLSv1.2", # "random" : "F6 2F AC 77 F5 8B 97 23 32 27 34 15 96 45 79 A3 54 28 8C 06 40 2C 9D C3 4C A5 2A 19 4C 5C C5 91", # "session id" : "0E D3 80 AD ED 52 DB B2 D9 27 3A A3 19 96 77 22 AC 3E E2 D3 46 31 13 50 AF 77 7F 46 CF 0D 61 78", # "cipher suites" : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]", # "compression methods" : "00", # "extensions" : [ # "status_request (5)": { # "certificate status type": ocsp # "OCSP status request": { # "responder_id": <empty> # "request extensions": { # <empty> # } # } # }, # "supported_groups (10)": { # "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192] # }, # "ec_point_formats (11)": { # "formats": [uncompressed] # }, # "signature_algorithms (13)": { # "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1] # }, # "signature_algorithms_cert (50)": { # "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1] # }, # "application_layer_protocol_negotiation (16)": { # [h2] # }, # "status_request_v2 (17)": { # "cert status request": { # "certificate status type": ocsp_multi # "OCSP status request": { # "responder_id": <empty> # "request extensions": { # <empty> # } # } # } # }, # "extended_master_secret (23)": { # <empty> # }, # "supported_versions (43)": { # "versions": [TLSv1.3, TLSv1.2] # }, # "psk_key_exchange_modes (45)": { # "ke_modes": [psk_dhe_ke] # }, # "key_share (51)": { # "client_shares": [ # { # "named group": x25519 # "key_exchange": { # 0000: 0E 12 80 DB 4C A5 DF F4 8F 6A D8 9F 57 F8 C5 EF ....L....j..W... # 0010: 75 D5 16 B3 50 F4 3B 24 F4 D3 06 7C 66 DD 7D 53 u...P.;$....f..S # } # }, # ] # } # ] # } # ) # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 23:53:16.958 UTC|ServerHello.java:867|Consuming ServerHello handshake message ( # "ServerHello": { # "server version" : "TLSv1.2", # "random" : "55 36 E9 F5 9B 9B 75 87 36 77 F1 C2 DB 96 AE 7A 43 34 5B 13 45 FD 52 59 99 70 CF 39 0A FE F0 21", # "session id" : "0E D3 80 AD ED 52 DB B2 D9 27 3A A3 19 96 77 22 AC 3E E2 D3 46 31 13 50 AF 77 7F 46 CF 0D 61 78", # "cipher suite" : "TLS_AES_256_GCM_SHA384(0x1302)", # "compression methods" : "00", # "extensions" : [ # "supported_versions (43)": { # "selected version": [TLSv1.3] # }, # "key_share (51)": { # "server_share": { # "named group": x25519 # "key_exchange": { # 0000: 3F 30 AB 24 D4 BE C5 A3 C9 AF 78 89 65 D3 58 AE ?0.$......x.e.X. # 0010: 90 BD C5 05 5B B8 91 4A 4F DD 94 0D DD A3 41 39 ....[..JO.....A9 # } # }, # } # ] # } # ) # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 23:53:16.958 UTC|SSLExtensions.java:192|Consumed extension: supported_versions # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 23:53:16.958 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3 # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 23:53:16.960 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 23:53:16.960 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 23:53:16.961 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 23:53:16.961 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 23:53:16.961 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 23:53:16.961 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2 # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 23:53:16.961 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 23:53:16.962 UTC|SSLExtensions.java:192|Consumed extension: supported_versions # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 23:53:16.963 UTC|SSLExtensions.java:192|Consumed extension: key_share # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 23:53:16.964 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 23:53:16.964 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence. # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 23:53:16.964 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 23:53:16.964 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 23:53:16.964 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 23:53:16.964 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 23:53:16.964 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 23:53:16.964 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2 # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 23:53:16.964 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret # javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 23:53:16.964 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions # javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 23:53:16.964 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 23:53:16.964 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 23:53:16.965 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 23:53:16.971 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE # countdown value = 137438953472 # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 23:53:16.972 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE # countdown value = 137438953472 # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 23:53:16.974 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 23:53:16.978 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message ( # "EncryptedExtensions": [ # "supported_groups (10)": { # "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192] # }, # "application_layer_protocol_negotiation (16)": { # [h2] # } # ] # ) # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 23:53:16.978 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-1 [...truncated too long message...] io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314) # at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100) # at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558) # at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379) # at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146) # at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100) # at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53) # at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294) # at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128) # at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628) # at java.base/java.lang.Thread.run(Thread.java:829) # Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target # at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141) # at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126) # at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297) # at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434) # ... 28 more} # # ) # javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 23:54:40.920 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data # javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 23:54:40.954 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket # javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 23:54:40.954 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive) # javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 23:54:40.954 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket # javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 23:54:40.954 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive) # Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:39702/solr/admin/info/system # at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:550) # at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192) # at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582) # at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481) # at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438) # at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158) # at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153) # Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target # at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131) # at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353) # at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296) # at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291) # at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357) # at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232) # at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175) # at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392) # at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443) # at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074) # at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061) # at java.base/java.security.AccessController.doPrivileged(Native Method) # at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008) # at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657) # at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102) # at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84) # at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314) # at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100) # at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558) # at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379) # at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146) # at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100) # at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53) # at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294) # at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128) # at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628) # at java.base/java.lang.Thread.run(Thread.java:829) # Suppressed: java.io.IOException: Broken pipe # at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138) # at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422) # at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275) # at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254) # at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386) # at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292) # at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243) # at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224) # at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821) # at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793) # at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161) # at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451) # at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117) # at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87) # ... 11 more # Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target # at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439) # at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306) # at java.base/sun.security.validator.Validator.validate(Validator.java:264) # at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313) # at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276) # at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141) # at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335) # ... 22 more # Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target # at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141) # at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126) # at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297) # at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434) # ... 28 more ok 64 SOLR-11740 check 'solr stop' connection in 16015ms ok 65 stop command for single port in 16949ms ok 66 status detects locally running solr in 7336ms ok 67 status does not expose cli parameters to end user in 228ms ok 68 listing out files in 2516ms ok 69 copying files around in 6205ms ok 70 upconfig in 2512ms ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1222ms ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1224ms ok 73 Cleanup in 1239ms > Task :solr:packaging:integrationTests FAILED FAILURE: Build failed with an exception. * Where: Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build.gradle' line: 301 * What went wrong: Execution failed for task ':solr:packaging:integrationTests'. > Process 'command > '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats/bin/bats'' > finished with non-zero exit value 1 * Try: > Run with --stacktrace option to get the stack trace. > Run with --info or --debug option to get more log output. * Get more help at https://help.gradle.org Deprecated Gradle features were used in this build, making it incompatible with Gradle 8.0. You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins. See https://docs.gradle.org/7.6/userguide/command_line_interface.html#sec:command_line_warnings BUILD FAILED in 59m 40s 672 actionable tasks: 672 executed Publishing build scan... https://ge.apache.org/s/slxmzissonido Build step 'Invoke Gradle script' changed build result to FAILURE Build step 'Invoke Gradle script' marked build as failure Archiving artifacts Recording test results [Checks API] No suitable checks publisher found. Email was triggered for: Failure - Any Sending email for trigger: Failure - Any
--------------------------------------------------------------------- To unsubscribe, e-mail: [email protected] For additional commands, e-mail: [email protected]
