Build: https://ci-builds.apache.org/job/Solr/job/Solr-check-9.4/907/
All tests passed Build Log: [...truncated 1227 lines...] # ERROR: IOException occurred when talking to server at: https://localhost:40073/solr/test/select # -- # # Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build/test-output/failure-snapshots/59-2 # Last output: # INFO - 2023-10-29 12:15:28.114; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword # INFO - 2023-10-29 12:15:28.119; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword # WARN - 2023-10-29 12:15:29.077; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes # WARN - 2023-10-29 12:15:29.114; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes ok 60 start solr with ssl and auth in 16932ms ok 61 start solr with client truststore and security manager in 19492ms not ok 62 start solr with mTLS needed in 53402ms # (in test file test/test_ssl.bats, line 325) # `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed # /tmp/bats-run-IqlTGh/test/62/ssl # Certificate was added to keystore # Certificate reply was installed in keystore # Certificate was added to keystore # Certificate was added to keystore # Certificate reply was installed in keystore # Certificate was added to keystore # Certificate was added to keystore # Certificate was added to keystore # Certificate was added to keystore # Certificate reply was installed in keystore # Certificate was added to keystore # Certificate was added to keystore # Waiting up to 180 seconds to see Solr running on port 40073 [|] [/] [-] [\] [|] # Started Solr server on port 40073 (pid=4181296). Happy searching! # # Waiting up to 180 seconds to see Solr running on port 40074 [|] [/] [-] [\] [|] [/] [-] [\] [|] # Started Solr server on port 40074 (pid=4181423). Happy searching! # # INFO - 2023-10-29 12:16:31.519; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword # INFO - 2023-10-29 12:16:31.525; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword # INFO - 2023-10-29 12:16:32.169; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@44c79f32(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@fd0e5b6[provider=null,keyStore=file:///tmp/bats-run-IqlTGh/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-IqlTGh/test/62/ssl/client/solr-client.truststore.p12] # INFO - 2023-10-29 12:16:32.171; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@475835b1(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@fd0e5b6[provider=null,keyStore=file:///tmp/bats-run-IqlTGh/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-IqlTGh/test/62/ssl/client/solr-client.truststore.p12] # INFO - 2023-10-29 12:16:32.171; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@6326d182(ca,h=[localhost],a=[],w=[]) for Client@fd0e5b6[provider=null,keyStore=file:///tmp/bats-run-IqlTGh/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-IqlTGh/test/62/ssl/client/solr-client.truststore.p12] # javax.net.ssl|DEBUG|01|main|2023-10-29 12:16:32.236 UTC|SunX509KeyManagerImpl.java:164|found key for : client ( # "certificate" : { # "version" : "v3", # "serial number" : "1C EC E8 DD", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-10-29 12:16:17.000 UTC", # "not after" : "2024-01-27 12:16:17.000 UTC", # "subject" : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.35 Criticality=false # AuthorityKeyIdentifier [ # KeyIdentifier [ # 0000: ED 07 F7 91 EA E0 8E 66 28 27 AB 02 91 CC 87 1E .......f('...... # 0010: 8A 91 A7 AA .... # ] # ] # }, # { # ObjectId: 2.5.29.37 Criticality=true # ExtendedKeyUsages [ # clientAuth # ] # }, # { # ObjectId: 2.5.29.15 Criticality=true # KeyUsage [ # DigitalSignature # Non_repudiation # Key_Encipherment # ] # }, # { # ObjectId: 2.5.29.17 Criticality=false # SubjectAlternativeName [ # DNSName: test.solr.apache.org # IPAddress: 127.0.0.2 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: F1 8F 1A 61 83 D9 80 A6 4B 3A 46 8A E4 A1 35 46 ...a....K:F...5F # 0010: 78 77 D1 17 xw.. # ] # ] # } # ]}, # "certificate" : { # "version" : "v3", # "serial number" : "0E E5 06 9D", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-10-29 12:16:11.000 UTC", # "not after" : "2024-01-27 12:16:11.000 UTC", # "subject" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.35 Criticality=false # AuthorityKeyIdentifier [ # KeyIdentifier [ # 0000: F5 55 94 1B DF 36 15 F3 CD F7 7B 7B D2 EB 2E 98 .U...6.......... # 0010: 68 EC 8F F5 h... # ] # ] # }, # { # ObjectId: 2.5.29.19 Criticality=false # BasicConstraints:[ # CA:true # PathLen:0 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: ED 07 F7 91 EA E0 8E 66 28 27 AB 02 91 CC 87 1E .......f('...... # 0010: 8A 91 A7 AA .... # ] # ] # } # ]} # ) # javax.net.ssl|DEBUG|01|main|2023-10-29 12:16:32.244 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates ( # "certificate" : { # "version" : "v3", # "serial number" : "0E E5 06 9D", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-10-29 12:16:11.000 UTC", # "not after" : "2024-01-27 12:16:11.000 UTC", # "subject" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.35 Criticality=false # AuthorityKeyIdentifier [ # KeyIdentifier [ # 0000: F5 55 94 1B DF 36 15 F3 CD F7 7B 7B D2 EB 2E 98 .U...6.......... # 0010: 68 EC 8F F5 h... # ] # ] # }, # { # ObjectId: 2.5.29.19 Criticality=false # BasicConstraints:[ # CA:true # PathLen:0 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: ED 07 F7 91 EA E0 8E 66 28 27 AB 02 91 CC 87 1E .......f('...... # 0010: 8A 91 A7 AA .... # ] # ] # } # ]}, # "certificate" : { # "version" : "v3", # "serial number" : "68 1B FE 9C", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-10-29 12:16:09.000 UTC", # "not after" : "2024-01-27 12:16:09.000 UTC", # "subject" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.19 Criticality=true # BasicConstraints:[ # CA:true # PathLen:2147483647 # ] # }, # { # ObjectId: 2.5.29.17 Criticality=false # SubjectAlternativeName [ # DNSName: localhost # IPAddress: 127.0.0.1 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: F5 55 94 1B DF 36 15 F3 CD F7 7B 7B D2 EB 2E 98 .U...6.......... # 0010: 68 EC 8F F5 h... # ] # ] # } # ]} # ) # javax.net.ssl|DEBUG|01|main|2023-10-29 12:16:32.265 UTC|SSLCipher.java:464|jdk.tls.keyLimits: entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472 # javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-29 12:16:32.850 UTC|ServerNameExtension.java:261|Unable to indicate server name # javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-29 12:16:32.851 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name # javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-29 12:16:32.853 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers # javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-29 12:16:32.854 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers # javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-29 12:16:32.864 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie # javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-29 12:16:32.900 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info # javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-29 12:16:32.901 UTC|PreSharedKeyExtension.java:633|No session to resume. # javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-29 12:16:32.901 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key # javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-29 12:16:32.903 UTC|ClientHello.java:642|Produced ClientHello handshake message ( # "ClientHello": { # "client version" : "TLSv1.2", # "random" : "2E 93 EA C5 C1 D1 D7 47 D2 11 96 AA F6 BD A1 C1 CC 09 8B A7 E3 B8 1F 96 80 FE F2 6E DD 0E 21 48", # "session id" : "8D 02 FA 75 E7 B2 3A A0 92 D3 5E 66 0B 2B 75 92 32 B4 AC B2 55 11 A8 72 19 8E 10 B2 82 CF E4 3C", # "cipher suites" : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]", # "compression methods" : "00", # "extensions" : [ # "status_request (5)": { # "certificate status type": ocsp # "OCSP status request": { # "responder_id": <empty> # "request extensions": { # <empty> # } # } # }, # "supported_groups (10)": { # "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192] # }, # "ec_point_formats (11)": { # "formats": [uncompressed] # }, # "signature_algorithms (13)": { # "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1] # }, # "signature_algorithms_cert (50)": { # "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1] # }, # "application_layer_protocol_negotiation (16)": { # [h2] # }, # "status_request_v2 (17)": { # "cert status request": { # "certificate status type": ocsp_multi # "OCSP status request": { # "responder_id": <empty> # "request extensions": { # <empty> # } # } # } # }, # "extended_master_secret (23)": { # <empty> # }, # "supported_versions (43)": { # "versions": [TLSv1.3, TLSv1.2] # }, # "psk_key_exchange_modes (45)": { # "ke_modes": [psk_dhe_ke] # }, # "key_share (51)": { # "client_shares": [ # { # "named group": x25519 # "key_exchange": { # 0000: B2 09 77 C4 EB DD A1 A2 17 4C 47 B6 FA A9 66 F0 ..w......LG...f. # 0010: 38 77 3F 35 5A 21 36 C6 E4 06 E5 A5 BA 03 73 73 8w?5Z!6.......ss # } # }, # ] # } # ] # } # ) # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:33.549 UTC|ServerHello.java:867|Consuming ServerHello handshake message ( # "ServerHello": { # "server version" : "TLSv1.2", # "random" : "FA 0F 0D 70 C0 AD 1D CD 76 8E 62 61 B9 B0 BC 9A E5 5A 76 30 FE 28 1E E0 36 31 8D 0D E7 E6 32 5A", # "session id" : "8D 02 FA 75 E7 B2 3A A0 92 D3 5E 66 0B 2B 75 92 32 B4 AC B2 55 11 A8 72 19 8E 10 B2 82 CF E4 3C", # "cipher suite" : "TLS_AES_256_GCM_SHA384(0x1302)", # "compression methods" : "00", # "extensions" : [ # "supported_versions (43)": { # "selected version": [TLSv1.3] # }, # "key_share (51)": { # "server_share": { # "named group": x25519 # "key_exchange": { # 0000: 43 43 1E 13 20 46 00 E0 70 9F E3 31 A4 98 C7 7B CC.. F..p..1.... # 0010: C6 3E 33 F0 7D 2F 46 4D A4 DF C9 84 58 C1 2C 61 .>3../FM....X.,a # } # }, # } # ] # } # ) # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:33.549 UTC|SSLExtensions.java:192|Consumed extension: supported_versions # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:33.549 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3 # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:33.551 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:33.551 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:33.555 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:33.556 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:33.556 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:33.556 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2 # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:33.557 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:33.557 UTC|SSLExtensions.java:192|Consumed extension: supported_versions # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:33.562 UTC|SSLExtensions.java:192|Consumed extension: key_share # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:33.567 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:33.567 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence. # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:33.567 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:33.568 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:33.568 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:33.568 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:33.568 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:33.568 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2 # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:33.568 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret # javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-29 12:16:33.568 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions # javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-29 12:16:33.569 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:33.569 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:33.569 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:33.582 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE # countdown value = 137438953472 # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:33.588 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE # countdown value = 137438953472 # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:33.589 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:33.592 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message ( # "EncryptedExtensions": [ # "supported_groups (10)": { # "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192] # }, # "application_layer_protocol_negotiation (16)": { # [h2] # } # ] # ) # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:33.592 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:33.592 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:33.592 UTC|SSLExtensions.java:192|Consumed extension: supported_groups # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:33.593 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:33.593 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:33.593 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length # javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-29 12:16:33.593 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups # javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-29 12:16:33.593 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:33.594 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message ( # "CertificateRequest": { # "certificate_request_context": "", # "extensions": [ # "signature_algorithms (13)": { # "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1] # }, # "signature_algorithms_cert (50)": { # "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1] # }, # "certificate_authorities (47)": { # "certificate authorities": [ # CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country # CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country] # } # ] # } # ) # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:33.594 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:33.594 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:33.594 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:33.595 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:33.595 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert # javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-29 12:16:33.595 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:33.610 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message ( # "Certificate": { # "certificate_request_context": "", # "certificate_list": [ # { # "certificate" : { # "version" : "v3", # "serial number" : "4D 73 06 4C", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-10-29 12:16:13.000 UTC", # "not after" : "2024-01-27 12:16:13.000 UTC", # "subject" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.35 Criticality=false # AuthorityKeyIdentifier [ # KeyIdentifier [ # 0000: ED 07 F7 91 EA E0 8E 66 28 27 AB 02 91 CC 87 1E .......f('...... # 0010: 8A 91 A7 AA .... # ] # ] # }, # { # ObjectId: 2.5.29.37 Criticality=true # ExtendedKeyUsages [ # serverAuth # ] # }, # { # ObjectId: 2.5.29.15 Criticality=true # KeyUsage [ # DigitalSignature # Non_repudiation # Key_Encipherment # ] # }, # { # ObjectId: 2.5.29.17 Criticality=false # SubjectAlternativeName [ # DNSName: localhost # IPAddress: 127.0.0.1 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: E5 58 B4 33 BA 9A 98 64 D2 9C FA A4 BB 51 14 BB .X.3...d.....Q.. # 0010: 50 DA FF 15 P... # ] # ] # } # ]} # "extensions": { # <no extension> # } # }, # ] # } # ) # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:33.610 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:33.725 UTC|X509TrustManagerImpl.java:292|Found trusted certificate ( # "certificate" : { # "version" : "v3", # "serial number" : "0E E5 06 9D", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-10-29 12:16:11.000 UTC", # "not after" : "2024-01-27 12:16:11.000 UTC", # "subject" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.35 Criticality=false # AuthorityKeyIdentifier [ # KeyIdentifier [ # 0000: F5 55 94 1B DF 36 15 F3 CD F7 7B 7B D2 EB 2E 98 .U...6.......... # 0010: 68 EC 8F F5 h... # ] # ] # }, # { # ObjectId: 2.5.29.19 Criticality=false # BasicConstraints:[ # CA:true # PathLen:0 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: ED 07 F7 91 EA E0 8E 66 28 27 AB 02 91 CC 87 1E .......f('...... # 0010: 8A 91 A7 AA .... # ] # ] # } # ]} # ) # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:33.733 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message ( # "CertificateVerify": { # "signature algorithm": rsa_pss_rsae_sha256 # "signature": { # 0000: 68 F8 AC B9 CE 6F 39 D3 32 06 8E EB B8 53 C7 DC h....o9.2....S.. # 0010: 60 56 DA 6E A2 B4 A3 4E 54 B5 FC 77 FF 0D 74 21 `V.n...NT..w..t! # 0020: 5B 41 41 2C C2 0C F4 74 6E D1 2E 04 04 34 70 2D [AA,...tn....4p- # 0030: 9E 4D 49 D2 0E A5 85 36 F2 70 DD D0 5A FE 6D AD .MI....6.p..Z.m. # 0040: E6 16 0B B9 9F 4A 34 EB F6 E5 CF 1E E0 E5 6E C8 .....J4.......n. # 0050: 3B FB 04 5E 27 B9 54 5F A5 27 F8 70 44 F1 B4 F7 ;..^'.T_.'.pD... # 0060: 29 BD 5F 7C 60 69 FC 16 73 57 CD EB F3 D3 4E 40 )._.`i..sW....N@ # 0070: 3B D7 B0 6D 72 49 6D 51 17 5E E2 CA 41 44 DD B5 ;..mrImQ.^..AD.. # 0080: 8B 23 A5 DB 1A E6 8F F0 32 E1 ED F7 C6 74 7F 2B .#......2....t.+ # 0090: F9 33 43 76 8D 87 E3 9E D3 C4 3A 30 60 82 65 43 .3Cv......:0`.eC # 00A0: C3 6D DA 2A 30 43 36 01 6F F9 40 20 A3 50 78 58 .m.*0C6.o.@ .PxX # 00B0: 2B D6 0F B7 CA 47 24 16 FC DF 43 CE B9 52 96 BE +....G$...C..R.. # 00C0: 88 58 AA 40 17 F0 04 13 2A AF 99 24 27 EB 6D 84 .X.@....*..$'.m. # 00D0: AF 4D 9C 69 DE 9D 63 47 EB F8 12 AB 59 A0 76 13 .M.i..cG....Y.v. # 00E0: BE 3F 21 24 83 7F 32 4A E6 0C 6B 1B 60 B0 5D 26 .?!$..2J..k.`.]& # 00F0: A6 CF DB 0A 19 16 EA E7 A2 71 8E EE EA FB CC 67 .........q.....g # } # } # ) # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:33.735 UTC|Finished.java:898|Consuming server Finished handshake message ( # "Finished": { # "verify data": { # 0000: F4 83 29 7C 35 9E BF CD 4E 8E 65 1B 8D 7A 5E 22 ..).5...N.e..z^" # 0010: 33 04 26 0E 68 1C 5F 06 0E 89 1D DF 20 32 0A 1C 3.&.h._..... 2.. # 0020: 80 80 55 08 3E 09 0D 24 D3 66 69 B1 34 09 22 70 ..U.>..$.fi.4."p # }'} # ) # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:33.736 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE # countdown value = 137438953472 # javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-29 12:16:33.737 UTC|X509Authentication.java:246|No X.509 cert selected for EC # javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-29 12:16:33.737 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256 # javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-29 12:16:33.737 UTC|X509Authentication.java:246|No X.509 cert selected for EC # javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-29 12:16:33.737 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384 # javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-29 12:16:33.737 UTC|X509Authentication.java:246|No X.509 cert selected for EC # javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-29 12:16:33.737 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512 # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:33.738 UTC|SunX509KeyManagerImpl.java:401|matching alias: client # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:33.753 UTC|CertificateMessage.java:1140|Produced client Certificate message ( # "Certificate": { # "certificate_request_context": "", # "certificate_list": [ # { # "certificate" : { # "version" : "v3", # "serial number" : "1C EC E8 DD", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-10-29 12:16:17.000 UTC", # "not after" : "2024-01-27 12:16:17.000 UTC", # "subject" : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.35 Criticality=false # AuthorityKeyIdentifier [ # KeyIdentifier [ # 0000: ED 07 F7 91 EA E0 8E 66 28 27 AB 02 91 CC 87 1E .......f('...... # 0010: 8A 91 A7 AA .... # ] # ] # }, # { # ObjectId: 2.5.29.37 Criticality=true # ExtendedKeyUsages [ # clientAuth # ] # }, # { # ObjectId: 2.5.29.15 Criticality=true # KeyUsage [ # DigitalSignature # Non_repudiation # Key_Encipherment # ] # }, # { # ObjectId: 2.5.29.17 Criticality=false # SubjectAlternativeName [ # DNSName: test.solr.apache.org # IPAddress: 127.0.0.2 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: F1 8F 1A 61 83 D9 80 A6 4B 3A 46 8A E4 A1 35 46 ...a....K:F...5F # 0010: 78 77 D1 17 xw.. # ] # ] # } # ]} # "extensions": { # <no extension> # } # }, # { # "certificate" : { # "version" : "v3", # "serial number" : "0E E5 06 9D", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-10-29 12:16:11.000 UTC", # "not after" : "2024-01-27 12:16:11.000 UTC", # "subject" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.35 Criticality=false # AuthorityKeyIdentifier [ # KeyIdentifier [ # 0000: F5 55 94 1B DF 36 15 F3 CD F7 7B 7B D2 EB 2E 98 .U...6.......... # 0010: 68 EC 8F F5 h... # ] # ] # }, # { # ObjectId: 2.5.29.19 Criticality=false # BasicConstraints:[ # CA:true # PathLen:0 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: ED 07 F7 91 EA E0 8E 66 28 27 AB 02 91 CC 87 1E .......f('...... # 0010: 8A 91 A7 AA .... # ] # ] # } # ]} # "extensions": { # <no extension> # } # }, # ] # } # ) # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:33.810 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message ( # "CertificateVerify": { # "signature algorithm": rsa_pss_rsae_sha256 # "signature": { # 0000: 8F CE B4 15 1A 3B E1 AD B1 94 FA 91 59 9C 3A 4E .....;......Y.:N # 0010: E6 18 8B A8 3D E6 E0 7A 23 AB E8 A5 31 48 60 86 ....=..z#...1H`. # 0020: ED C0 E3 2F 94 1B 71 4B 07 7A D5 3F 7D C8 C3 A8 .../..qK.z.?.... # 0030: FE 66 6E F3 49 43 11 E3 A9 56 AC E1 CA 69 A4 30 .fn.IC...V...i.0 # 0040: BD FD 97 16 93 E4 8F E3 46 47 50 D1 3C 38 9C 94 ........FGP.<8.. # 0050: 96 6F 60 41 D6 37 E9 CE 17 7B 21 52 0B 85 A3 A0 .o`A.7....!R.... # 0060: 62 81 85 A0 2D B3 42 2B 53 DB 4D B8 65 8D 5B E0 b...-.B+S.M.e.[. # 0070: 35 6F 8F 23 EF A2 C9 F6 8E A8 74 81 33 6E 7B 7F 5o.#......t.3n.. # 0080: 20 F4 4D 4F 44 6C 1A BD A5 BF DD BF 53 5F 37 6D .MODl......S_7m # 0090: 2F DA 41 D9 FC 93 F6 2C FF AD 42 C6 8F 7D 8B F4 /.A....,..B..... # 00A0: 78 AE 6B 76 C7 CD 7E D7 BB FB F1 5E 51 EF 01 DB x.kv.......^Q... # 00B0: 2E C3 EC 1E A7 48 28 57 C1 31 A8 1F F4 BE D7 8D .....H(W.1...... # 00C0: 89 0B 9B 2C 3D 0B E3 AA BD A7 22 0D 84 83 F6 89 ...,=....."..... # 00D0: B0 CF 5B 89 41 A6 F5 75 BF F3 72 60 2A 6E C2 49 ..[.A..u..r`*n.I # 00E0: A8 C0 C6 D5 2D 3C 27 F9 32 5E 4F 70 CF 0A 8B 0B ....-<'.2^Op.... # 00F0: 69 3A D1 59 79 DC F4 79 64 01 FA 93 1D 24 E5 B0 i:.Yy..yd....$.. # } # } # ) # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:33.821 UTC|Finished.java:673|Produced client Finished handshake message ( # "Finished": { # "verify data": { # 0000: A1 FC BB BF B8 9A 8F B1 EA 44 D8 EF FA B1 46 24 .........D....F$ # 0010: F3 36 C4 C4 5C 9D D7 C8 72 6E 2E 22 D3 4B 1D C7 .6..\...rn.".K.. # 0020: A5 00 DB F5 CF 78 F8 74 42 C4 10 0A D5 AC 66 8B .....x.tB.....f. # }'} # ) # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:33.821 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE # countdown value = 137438953472 # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:34.252 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message ( # "NewSessionTicket": { # "ticket_lifetime" : "86,400", # "ticket_age_add" : "<omitted>", # "ticket_nonce" : "01", # "ticket" : "D7 EB 67 9F 0F D7 20 BA 40 25 2E 02 15 8C 0F 57 2A E9 B2 08 FD 7B 49 39 04 A9 1A 82 59 19 2E 6C", # "extensions" : [ # <no extension> # ] # } # ) # javax.net.ssl|DEBUG|03|Finalizer|2023-10-29 12:16:34.283 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket # javax.net.ssl|DEBUG|03|Finalizer|2023-10-29 12:16:34.284 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive) # javax.net.ssl|DEBUG|03|Finalizer|2023-10-29 12:16:34.284 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket # javax.net.ssl|DEBUG|03|Finalizer|2023-10-29 12:16:34.284 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive) # javax.net.ssl|ALL|01|main|2023-10-29 12:16:34.552 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine # javax.net.ssl|WARNING|01|main|2023-10-29 12:16:34.553 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data # INFO - 2023-10-29 12:16:35.472; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword # INFO - 2023-10-29 12:16:35.476; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword # INFO - 2023-10-29 12:16:35.827; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@475835b1(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@5dbe30be[provider=null,keyStore=file:///tmp/bats-run-IqlTGh/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-IqlTGh/test/62/ssl/client/solr-client.truststore.p12] # INFO - 2023-10-29 12:16:35.829; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@119f1f2a(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5dbe30be[provider=null,keyStore=file:///tmp/bats-run-IqlTGh/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-IqlTGh/test/62/ssl/client/solr-client.truststore.p12] # INFO - 2023-10-29 12:16:35.829; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@1a1da881(ca,h=[localhost],a=[],w=[]) for Client@5dbe30be[provider=null,keyStore=file:///tmp/bats-run-IqlTGh/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-IqlTGh/test/62/ssl/client/solr-client.truststore.p12] # javax.net.ssl|DEBUG|01|main|2023-10-29 12:16:35.860 UTC|SunX509KeyManagerImpl.java:164|found key for : client ( # "certificate" : { # "version" : "v3", # "serial number" : "1C EC E8 DD", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-10-29 12:16:17.000 UTC", # "not after" : "2024-01-27 12:16:17.000 UTC", # "subject" : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.35 Criticality=false # AuthorityKeyIdentifier [ # KeyIdentifier [ # 0000: ED 07 F7 91 EA E0 8E 66 28 27 AB 02 91 CC 87 1E .......f('...... # 0010: 8A 91 A7 AA .... # ] # ] # }, # { # ObjectId: 2.5.29.37 Criticality=true # ExtendedKeyUsages [ # clientAuth # ] # }, # { # ObjectId: 2.5.29.15 Criticality=true # KeyUsage [ # DigitalSignature # Non_repudiation # Key_Encipherment # ] # }, # { # ObjectId: 2.5.29.17 Criticality=false # SubjectAlternativeName [ # DNSName: test.solr.apache.org # IPAddress: 127.0.0.2 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: F1 8F 1A 61 83 D9 80 A6 4B 3A 46 8A E4 A1 35 46 ...a....K:F...5F # 0010: 78 77 D1 17 xw.. # ] # ] # } # ]}, # "certificate" : { # "version" : "v3", # "serial number" : "0E E5 06 9D", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-10-29 12:16:11.000 UTC", # "not after" : "2024-01-27 12:16:11.000 UTC", # "subject" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.35 Criticality=false # AuthorityKeyIdentifier [ # KeyIdentifier [ # 0000: F5 55 94 1B DF 36 15 F3 CD F7 7B 7B D2 EB 2E 98 .U...6.......... # 0010: 68 EC 8F F5 h... # ] # ] # }, # { # ObjectId: 2.5.29.19 Criticality=false # BasicConstraints:[ # CA:true # PathLen:0 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: ED 07 F7 91 EA E0 8E 66 28 27 AB 02 91 CC 87 1E .......f('...... # 0010: 8A 91 A7 AA .... # ] # ] # } # ]} # ) # javax.net.ssl|DEBUG|01|main|2023-10-29 12:16:35.863 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates ( # "certificate" : { # "version" : "v3", # "serial number" : "0E E5 06 9D", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-10-29 12:16:11.000 UTC", # "not after" : "2024-01-27 12:16:11.000 UTC", # "subject" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.35 Criticality=false # AuthorityKeyIdentifier [ # KeyIdentifier [ # 0000: F5 55 94 1B DF 36 15 F3 CD F7 7B 7B D2 EB 2E 98 .U...6.......... # 0010: 68 EC 8F F5 h... # ] # ] # }, # { # ObjectId: 2.5.29.19 Criticality=false # BasicConstraints:[ # CA:true # PathLen:0 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: ED 07 F7 91 EA E0 8E 66 28 27 AB 02 91 CC 87 1E .......f('...... # 0010: 8A 91 A7 AA .... # ] # ] # } # ]}, # "certificate" : { # "version" : "v3", # "serial number" : "68 1B FE 9C", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-10-29 12:16:09.000 UTC", # "not after" : "2024-01-27 12:16:09.000 UTC", # "subject" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.19 Criticality=true # BasicConstraints:[ # CA:true # PathLen:2147483647 # ] # }, # { # ObjectId: 2.5.29.17 Criticality=false # SubjectAlternativeName [ # DNSName: localhost # IPAddress: 127.0.0.1 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: F5 55 94 1B DF 36 15 F3 CD F7 7B 7B D2 EB 2E 98 .U...6.......... # 0010: 68 EC 8F F5 h... # ] # ] # } # ]} # ) # javax.net.ssl|DEBUG|01|main|2023-10-29 12:16:35.874 UTC|SSLCipher.java:464|jdk.tls.keyLimits: entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472 # javax.net.ssl|DEBUG|03|Finalizer|2023-10-29 12:16:36.150 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket # javax.net.ssl|DEBUG|03|Finalizer|2023-10-29 12:16:36.151 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive) # javax.net.ssl|DEBUG|03|Finalizer|2023-10-29 12:16:36.151 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket # javax.net.ssl|DEBUG|03|Finalizer|2023-10-29 12:16:36.151 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive) # javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-29 12:16:36.186 UTC|ServerNameExtension.java:261|Unable to indicate server name # javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-29 12:16:36.186 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name # javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-29 12:16:36.187 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers # javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-29 12:16:36.188 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers # javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-29 12:16:36.191 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie # javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-29 12:16:36.201 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info # javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-29 12:16:36.201 UTC|PreSharedKeyExtension.java:633|No session to resume. # javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-29 12:16:36.201 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key # javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-29 12:16:36.203 UTC|ClientHello.java:642|Produced ClientHello handshake message ( # "ClientHello": { # "client version" : "TLSv1.2", # "random" : "F3 58 DA 79 77 0B C8 F3 D3 4D F3 76 DE 27 B8 25 3D 2B 8A 0E 03 BE AC 58 C0 C7 32 81 AF 7B C0 27", # "session id" : "EB F2 03 70 CA C9 1F E7 21 3D 91 90 AD C4 0A 5E 38 76 D1 0E B4 7A 2B D9 77 3C 76 94 E5 7D 86 5D", # "cipher suites" : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]", # "compression methods" : "00", # "extensions" : [ # "status_request (5)": { # "certificate status type": ocsp # "OCSP status request": { # "responder_id": <empty> # "request extensions": { # <empty> # } # } # }, # "supported_groups (10)": { # "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192] # }, # "ec_point_formats (11)": { # "formats": [uncompressed] # }, # "signature_algorithms (13)": { # "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1] # }, # "signature_algorithms_cert (50)": { # "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1] # }, # "application_layer_protocol_negotiation (16)": { # [h2] # }, # "status_request_v2 (17)": { # "cert status request": { # "certificate status type": ocsp_multi # "OCSP status request": { # "responder_id": <empty> # "request extensions": { # <empty> # } # } # } # }, # "extended_master_secret (23)": { # <empty> # }, # "supported_versions (43)": { # "versions": [TLSv1.3, TLSv1.2] # }, # "psk_key_exchange_modes (45)": { # "ke_modes": [psk_dhe_ke] # }, # "key_share (51)": { # "client_shares": [ # { # "named group": x25519 # "key_exchange": { # 0000: 26 78 66 28 A0 4F 9C 42 3F 1E 8F 60 C8 C9 80 3E &xf(.O.B?..`...> # 0010: 33 11 25 10 8B 13 11 B5 B5 DA 02 12 40 AC BA 76 3.%[email protected] # } # }, # ] # } # ] # } # ) # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:36.288 UTC|ServerHello.java:867|Consuming ServerHello handshake message ( # "ServerHello": { # "server version" : "TLSv1.2", # "random" : "D1 7D 56 C9 15 16 75 12 36 B8 A2 FE D7 1B E0 10 6C 0C 35 29 2A 10 9A B2 35 3E AC C6 11 30 70 64", # "session id" : "EB F2 03 70 CA C9 1F E7 21 3D 91 90 AD C4 0A 5E 38 76 D1 0E B4 7A 2B D9 77 3C 76 94 E5 7D 86 5D", # "cipher suite" : "TLS_AES_256_GCM_SHA384(0x1302)", # "compression methods" : "00", # "extensions" : [ # "supported_versions (43)": { # "selected version": [TLSv1.3] # }, # "key_share (51)": { # "server_share": { # "named group": x25519 # "key_exchange": { # 0000: C2 17 8B 6E 2B 41 04 BE 87 9C 57 DC 20 CF 55 A5 ...n+A....W. .U. # 0010: DA 1E F0 46 36 E8 4E 74 4A C3 56 CA 9D AF C6 45 ...F6.NtJ.V....E # } # }, # } # ] # } # ) # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:36.288 UTC|SSLExtensions.java:192|Consumed extension: supported_versions # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:36.289 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3 # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:36.291 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:36.291 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:36.291 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:36.291 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:36.291 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:36.291 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2 # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:36.292 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:36.295 UTC|SSLExtensions.java:192|Consumed extension: supported_versions # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:36.302 UTC|SSLExtensions.java:192|Consumed extension: key_share # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:36.303 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:36.303 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence. # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:36.304 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:36.304 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:36.304 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:36.304 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:36.304 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:36.304 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2 # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:36.304 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret # javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-29 12:16:36.304 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions # javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-29 12:16:36.304 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:36.304 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:36.305 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:36.316 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE # countdown value = 137438953472 # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:36.317 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE # countdown value = 137438953472 # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:36.318 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:36.328 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message ( # "EncryptedExtensions": [ # "supported_groups (10)": { # "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192] # }, # "application_layer_protocol_negotiation (16)": { # [h2] # } # ] # ) # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:36.328 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:36.328 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:36.328 UTC|SSLExtensions.java:192|Consumed extension: supported_groups # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:36.328 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:36.328 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:36.328 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length # javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-29 12:16:36.328 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups # javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-29 12:16:36.328 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:36.331 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message ( # "CertificateRequest": { # "certificate_request_context": "", # "extensions": [ # "signature_algorithms (13)": { # "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1] # }, # "signature_algorithms_cert (50)": { # "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1] # }, # "certificate_authorities (47)": { # "certificate authorities": [ # CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country # CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country] # } # ] # } # ) # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:36.331 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:36.436 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:36.436 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:36.437 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:36.437 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert # javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-29 12:16:36.437 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:36.441 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message ( # "Certificate": { # "certificate_request_context": "", # "certificate_list": [ # { # "certificate" : { # "version" : "v3", # "serial number" : "4D 73 06 4C", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-10-29 12:16:13.000 UTC", # "not after" : "2024-01-27 12:16:13.000 UTC", # "subject" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.35 Criticality=false # AuthorityKeyIdentifier [ # KeyIdentifier [ # 0000: ED 07 F7 91 EA E0 8E 66 28 27 AB 02 91 CC 87 1E .......f('...... # 0010: 8A 91 A7 AA .... # ] # ] # }, # { # ObjectId: 2.5.29.37 Criticality=true # ExtendedKeyUsages [ # serverAuth # ] # }, # { # ObjectId: 2.5.29.15 Criticality=true # KeyUsage [ # DigitalSignature # Non_repudiation # Key_Encipherment # ] # }, # { # ObjectId: 2.5.29.17 Criticality=false # SubjectAlternativeName [ # DNSName: localhost # IPAddress: 127.0.0.1 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: E5 58 B4 33 BA 9A 98 64 D2 9C FA A4 BB 51 14 BB .X.3...d.....Q.. # 0010: 50 DA FF 15 P... # ] # ] # } # ]} # "extensions": { # <no extension> # } # }, # ] # } # ) # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:36.441 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:36.502 UTC|X509TrustManagerImpl.java:292|Found trusted certificate ( # "certificate" : { # "version" : "v3", # "serial number" : "0E E5 06 9D", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-10-29 12:16:11.000 UTC", # "not after" : "2024-01-27 12:16:11.000 UTC", # "subject" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.35 Criticality=false # AuthorityKeyIdentifier [ # KeyIdentifier [ # 0000: F5 55 94 1B DF 36 15 F3 CD F7 7B 7B D2 EB 2E 98 .U...6.......... # 0010: 68 EC 8F F5 h... # ] # ] # }, # { # ObjectId: 2.5.29.19 Criticality=false # BasicConstraints:[ # CA:true # PathLen:0 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: ED 07 F7 91 EA E0 8E 66 28 27 AB 02 91 CC 87 1E .......f('...... # 0010: 8A 91 A7 AA .... # ] # ] # } # ]} # ) # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:36.507 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message ( # "CertificateVerify": { # "signature algorithm": rsa_pss_rsae_sha256 # "signature": { # 0000: 7D C6 20 1E 7A 6E A4 8A 18 5A 56 D6 65 1A 4D F6 .. .zn...ZV.e.M. # 0010: D8 04 44 CF FA F8 BA 8D 50 1B 39 BD FC C4 77 B9 ..D.....P.9...w. # 0020: 28 26 04 36 44 C2 86 28 96 B2 E4 27 34 43 CC A8 (&.6D..(...'4C.. # 0030: E4 CF 90 E7 2F 23 C5 8A A4 77 9F FF BA 36 85 FD ..../#...w...6.. # 0040: E4 76 27 47 6F D0 DC 0B FE D4 BA E8 53 89 DD E0 .v'Go.......S... # 0050: 2F 68 18 25 DA CF 14 ED 76 6E FE 33 F2 68 A6 2A /h.%....vn.3.h.* # 0060: 39 97 E6 DF C2 35 82 D8 A7 7D 05 44 9C 0C C0 D2 9....5.....D.... # 0070: 7B 70 32 A3 22 39 D0 B8 FA 2B 6D 7E 81 87 2E 27 .p2."9...+m....' # 0080: 14 0E BD D4 28 84 17 D7 99 3E A8 D2 42 89 8A 7A ....(....>..B..z # 0090: 3A 43 9F 1D 83 DB 0B 63 D2 E8 87 F2 7E 9E 6F CF :C.....c......o. # 00A0: 70 3A F1 79 69 39 6C 02 89 45 03 14 3D 54 93 C6 p:.yi9l..E..=T.. # 00B0: EB D8 4C 1F E8 83 24 89 2A B1 47 26 A2 66 C7 FA ..L...$.*.G&.f.. # 00C0: 9C 78 93 4A 2B 4F 11 4E D8 92 8A 46 A8 FA D4 F2 .x.J+O.N...F.... # 00D0: 0D AC 12 D0 43 BE 09 4D 91 A6 27 10 06 D0 3C 97 ....C..M..'...<. # 00E0: A3 5A 1F 24 5A 4F D9 66 0B CD 7A A7 AE F6 47 33 .Z.$ZO.f..z...G3 # 00F0: 8F 0E FE 44 40 8A D0 5A 17 B5 5C 1F 26 CE AC F8 [email protected]..\.&... # } # } # ) # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:36.509 UTC|Finished.java:898|Consuming server Finished handshake message ( # "Finished": { # "verify data": { # 0000: C8 D1 51 8F 17 12 1A E6 5C 73 3E D0 35 1A 52 DD ..Q.....\s>.5.R. # 0010: 5D F7 48 5A A5 1A 20 24 20 B7 BA 2C FE BC 8E 9A ].HZ.. $ ..,.... # 0020: DB B1 6E 9A 7B 4F 02 57 99 76 D0 99 92 62 7F D5 ..n..O.W.v...b.. # }'} # ) # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:36.511 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE # countdown value = 137438953472 # javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-29 12:16:36.512 UTC|X509Authentication.java:246|No X.509 cert selected for EC # javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-29 12:16:36.512 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256 # javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-29 12:16:36.512 UTC|X509Authentication.java:246|No X.509 cert selected for EC # javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-29 12:16:36.512 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384 # javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-29 12:16:36.512 UTC|X509Authentication.java:246|No X.509 cert selected for EC # javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-29 12:16:36.512 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512 # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:36.513 UTC|SunX509KeyManagerImpl.java:401|matching alias: client # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:36.516 UTC|CertificateMessage.java:1140|Produced client Certificate message ( # "Certificate": { # "certificate_request_context": "", # "certificate_list": [ # { # "certificate" : { # "version" : "v3", # "serial number" : "1C EC E8 DD", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-10-29 12:16:17.000 UTC", # "not after" : "2024-01-27 12:16:17.000 UTC", # "subject" : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.35 Criticality=false # AuthorityKeyIdentifier [ # KeyIdentifier [ # 0000: ED 07 F7 91 EA E0 8E 66 28 27 AB 02 91 CC 87 1E .......f('...... # 0010: 8A 91 A7 AA .... # ] # ] # }, # { # ObjectId: 2.5.29.37 Criticality=true # ExtendedKeyUsages [ # clientAuth # ] # }, # { # ObjectId: 2.5.29.15 Criticality=true # KeyUsage [ # DigitalSignature # Non_repudiation # Key_Encipherment # ] # }, # { # ObjectId: 2.5.29.17 Criticality=false # SubjectAlternativeName [ # DNSName: test.solr.apache.org # IPAddress: 127.0.0.2 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: F1 8F 1A 61 83 D9 80 A6 4B 3A 46 8A E4 A1 35 46 ...a....K:F...5F # 0010: 78 77 D1 17 xw.. # ] # ] # } # ]} # "extensions": { # <no extension> # } # }, # { # "certificate" : { # "version" : "v3", # "serial number" : "0E E5 06 9D", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-10-29 12:16:11.000 UTC", # "not after" : "2024-01-27 12:16:11.000 UTC", # "subject" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.35 Criticality=false # AuthorityKeyIdentifier [ # KeyIdentifier [ # 0000: F5 55 94 1B DF 36 15 F3 CD F7 7B 7B D2 EB 2E 98 .U...6.......... # 0010: 68 EC 8F F5 h... # ] # ] # }, # { # ObjectId: 2.5.29.19 Criticality=false # BasicConstraints:[ # CA:true # PathLen:0 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: ED 07 F7 91 EA E0 8E 66 28 27 AB 02 91 CC 87 1E .......f('...... # 0010: 8A 91 A7 AA .... # ] # ] # } # ]} # "extensions": { # <no extension> # } # }, # ] # } # ) # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:36.546 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message ( # "CertificateVerify": { # "signature algorithm": rsa_pss_rsae_sha256 # "signature": { # 0000: 28 EC D2 B6 EC 36 35 74 27 EC BC 80 50 71 06 BC (....65t'...Pq.. # 0010: E9 95 24 7D E6 2C 80 86 16 6B AD D1 21 36 0C 7C ..$..,...k..!6.. # 0020: F0 9B 65 B0 CB AF B2 F0 25 91 4A 55 A0 FC 16 26 ..e.....%.JU...& # 0030: 4D B8 1C 58 B3 02 3C 3B 17 49 F9 12 0C 5E 62 3A M..X..<;.I...^b: # 0040: 94 F2 DE 9A 06 B4 9C D7 3E E2 7A 7E 6D E4 64 B0 ........>.z.m.d. # 0050: 65 23 85 78 4E EA 6E 39 9F 29 DB 7C 71 FC F1 BF e#.xN.n9.)..q... # 0060: 4A 65 A8 88 9F 27 C0 A7 8B 25 85 35 BD 1D E1 88 Je...'...%.5.... # 0070: D9 1A EE EE 6E D1 FF 68 22 4D 99 4B C7 D7 4B 00 ....n..h"M.K..K. # 0080: E8 97 36 07 D8 73 AC 45 AF 0F B9 E3 C9 02 F7 05 ..6..s.E........ # 0090: 08 00 41 D8 5D 41 2A 30 68 96 84 31 75 9C 80 AC ..A.]A*0h..1u... # 00A0: 51 33 1A F0 0C 1D E6 82 8D 71 78 34 75 0C D0 D2 Q3.......qx4u... # 00B0: BE 94 5B C0 0E 55 EB 9D C8 5C 02 F5 91 7F FC 7E ..[..U...\...... # 00C0: 73 F1 68 AA 09 23 5F 3F 4E 92 BD 76 9F 2B 28 CD s.h..#_?N..v.+(. # 00D0: 3E CC 31 C4 74 2F 01 3C DA B1 43 B8 E4 52 32 9E >.1.t/.<..C..R2. # 00E0: 55 8E 8F 64 0B CA 1D 96 E1 02 8C 94 80 43 ED D1 U..d.........C.. # 00F0: 15 3C 20 35 0E 72 74 B2 F1 AD 46 07 9F 80 26 6C .< 5.rt...F...&l # } # } # ) # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:36.547 UTC|Finished.java:673|Produced client Finished handshake message ( # "Finished": { # "verify data": { # 0000: DE A6 38 5E BD 0E B1 94 DB 0E F2 9F EB 14 F2 6D ..8^...........m # 0010: DE 1F 8C 39 B8 7B 8E 26 11 2D 65 05 FC B9 5D 6C ...9...&.-e...]l # 0020: 75 6A CD DF BD DD BA 86 2F F8 CF D8 E0 19 BC D3 uj....../....... # }'} # ) # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:36.547 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE # countdown value = 137438953472 # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:36.669 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message ( # "NewSessionTicket": { # "ticket_lifetime" : "86,400", # "ticket_age_add" : "<omitted>", # "ticket_nonce" : "01", # "ticket" : "61 2E C9 2E C1 BD 37 1A E4 68 C8 82 23 EA 62 D4 14 D6 11 8B 54 43 88 AF CD 12 FB 01 13 12 92 A6", # "extensions" : [ # <no extension> # ] # } # ) # javax.net.ssl|ALL|01|main|2023-10-29 12:16:36.941 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine # javax.net.ssl|WARNING|01|main|2023-10-29 12:16:36.942 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data # javax.net.ssl|ALL|0E|h2sc-1-thread-2|2023-10-29 12:16:37.076 UTC|SSLEngineImpl.java:724|Closing inbound of SSLEngine # javax.net.ssl|ERROR|0E|h2sc-1-thread-2|2023-10-29 12:16:37.076 UTC|TransportContext.java:345|Fatal (INTERNAL_ERROR): closing inbound before receiving peer's close_notify ( # "throwable" : { # javax.net.ssl.SSLException: closing inbound before receiving peer's close_notify # at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:133) # at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:117) # at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:340) # at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296) # at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:287) # at java.base/sun.security.ssl.SSLEngineImpl.closeInbound(SSLEngineImpl.java:733) # at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.closeInbound(SslConnection.java:985) # at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:769) # at org.eclipse.jetty.http2.HTTP2Connection.fill(HTTP2Connection.java:164) # at org.eclipse.jetty.http2.HTTP2Connection$HTTP2Producer.produce(HTTP2Connection.java:368) # at org.eclipse.jetty.util.thread.strategy.AdaptiveExecutionStrategy.produceTask(AdaptiveExecutionStrategy.java:455) # at org.eclipse.jetty.util.thread.strategy.AdaptiveExecutionStrategy.tryProduce(AdaptiveExecutionStrategy.java:248) # at org.eclipse.jetty.util.thread.strategy.AdaptiveExecutionStrategy.produce(AdaptiveExecutionStrategy.java:193) # at org.eclipse.jetty.http2.HTTP2Connection.produce(HTTP2Connection.java:208) # at org.eclipse.jetty.http2.HTTP2Connection.onFillable(HTTP2Connection.java:155) # at org.eclipse.jetty.http2.HTTP2Connection$FillableCallback.succeeded(HTTP2Connection.java:450) # at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100) # at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558) # at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379) # at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146) # at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100) # at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53) # at org.eclipse.jetty.util.thread.Invocable.invokeNonBlocking(Invocable.java:151) # at org.eclipse.jetty.util.thread.strategy.AdaptiveExecutionStrategy.invokeAsNonBlocking(AdaptiveExecutionStrategy.java:438) # at org.eclipse.jetty.util.thread.strategy.AdaptiveExecutionStrategy.consumeTask(AdaptiveExecutionStrategy.java:380) # at org.eclipse.jetty.util.thread.strategy.AdaptiveExecutionStrategy.tryProduce(AdaptiveExecutionStrategy.java:277) # at org.eclipse.jetty.util.thread.strategy.AdaptiveExecutionStrategy.produce(AdaptiveExecutionStrategy.java:193) # at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294) # at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128) # at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628) # at java.base/java.lang.Thread.run(Thread.java:829)} # # ) # # -- output does not contain substring -- # substring (1 lines): # Server refused connection # output (463 lines): # INFO - 2023-10-29 12:16:50.346; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword # javax.net.ssl|DEBUG|01|main|2023-10-29 12:16:50.648 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates ( # "certificate" : { # "version" : "v3", # "serial number" : "0E E5 06 9D", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-10-29 12:16:11.000 UTC", # "not after" : "2024-01-27 12:16:11.000 UTC", # "subject" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.35 Criticality=false # AuthorityKeyIdentifier [ # KeyIdentifier [ # 0000: F5 55 94 1B DF 36 15 F3 CD F7 7B 7B D2 EB 2E 98 .U...6.......... # 0010: 68 EC 8F F5 h... # ] # ] # }, # { # ObjectId: 2.5.29.19 Criticality=false # BasicConstraints:[ # CA:true # PathLen:0 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: ED 07 F7 91 EA E0 8E 66 28 27 AB 02 91 CC 87 1E .......f('...... # 0010: 8A 91 A7 AA .... # ] # ] # } # ]}, # "certificate" : { # "version" : "v3", # "serial number" : "68 1B FE 9C", # "signature algorithm": "SHA256withRSA", # "issuer" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "not before" : "2023-10-29 12:16:09.000 UTC", # "not after" : "2024-01-27 12:16:09.000 UTC", # "subject" : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country", # "subject public key" : "RSA", # "extensions" : [ # { # ObjectId: 2.5.29.19 Criticality=true # BasicConstraints:[ # CA:true # PathLen:2147483647 # ] # }, # { # ObjectId: 2.5.29.17 Criticality=false # SubjectAlternativeName [ # DNSName: localhost # IPAddress: 127.0.0.1 # ] # }, # { # ObjectId: 2.5.29.14 Criticality=false # SubjectKeyIdentifier [ # KeyIdentifier [ # 0000: F5 55 94 1B DF 36 15 F3 CD F7 7B 7B D2 EB 2E 98 .U...6.......... # 0010: 68 EC 8F F5 h... # ] # ] # } # ]} # ) # javax.net.ssl|DEBUG|01|main|2023-10-29 12:16:50.661 UTC|SSLCipher.java:464|jdk.tls.keyLimits: entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472 # javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-29 12:16:50.815 UTC|ServerNameExtension.java:261|Unable to indicate server name # javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-29 12:16:50.815 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name # javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-29 12:16:50.817 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers # javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-29 12:16:50.817 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers # javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-29 12:16:50.821 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie # javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-29 12:16:50.831 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info # javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-29 12:16:50.832 UTC|PreSharedKeyExtension.java:633|No session to resume. # javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-29 12:16:50.832 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key # javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-29 12:16:50.833 UTC|ClientHello.java:642|Produced ClientHello handshake message ( # "ClientHello": { # "client version" : "TLSv1.2", # "random" : "D6 61 A5 52 26 2A 94 0F 92 DE 98 3B 6D F2 ED C4 1E ED 52 9F 60 78 AB FC 3D 87 24 32 5D 1F E3 B4", # "session id" : "F4 61 68 02 13 16 2D E3 EE 28 E2 93 CA 5B 1F 0F 33 F5 BC 99 E2 41 0C 4E 3B E6 2C B7 1F 8A 27 B0", # "cipher suites" : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]", # "compression methods" : "00", # "extensions" : [ # "status_request (5)": { # "certificate status type": ocsp # "OCSP status request": { # "responder_id": <empty> # "request extensions": { # <empty> # } # } # }, # "supported_groups (10)": { # "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192] # }, # "ec_point_formats (11)": { # "formats": [uncompressed] # }, # "signature_algorithms (13)": { # "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1] # }, # "signature_algorithms_cert (50)": { # "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1] # }, # "application_layer_protocol_negotiation (16)": { # [h2] # }, # "status_request_v2 (17)": { # "cert status request": { # "certificate status type": ocsp_multi # "OCSP status request": { # "responder_id": <empty> # "request extensions": { # <empty> # } # } # } # }, # "extended_master_secret (23)": { # <empty> # }, # "supported_versions (43)": { # "versions": [TLSv1.3, TLSv1.2] # }, # "psk_key_exchange_modes (45)": { # "ke_modes": [psk_dhe_ke] # }, # "key_share (51)": { # "client_shares": [ # { # "named group": x25519 # "key_exchange": { # 0000: 4D CC CC 50 5D 9A 9F 9D B3 79 80 6E 45 2F D5 7E M..P]....y.nE/.. # 0010: 8C 18 A4 0F DA 9D 7C 60 20 69 B3 BD E7 52 9C 4E .......` i...R.N # } # }, # ] # } # ] # } # ) # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:50.857 UTC|ServerHello.java:867|Consuming ServerHello handshake message ( # "ServerHello": { # "server version" : "TLSv1.2", # "random" : "FD 04 A0 1E 21 CE F9 5A A1 28 0C 1E 35 12 48 51 21 A3 53 40 EA 5D 99 DA 56 79 5D 4C 14 C8 2A 88", # "session id" : "F4 61 68 02 13 16 2D E3 EE 28 E2 93 CA 5B 1F 0F 33 F5 BC 99 E2 41 0C 4E 3B E6 2C B7 1F 8A 27 B0", # "cipher suite" : "TLS_AES_256_GCM_SHA384(0x1302)", # "compression methods" : "00", # "extensions" : [ # "supported_versions (43)": { # "selected version": [TLSv1.3] # }, # "key_share (51)": { # "server_share": { # "named group": x25519 # "key_exchange": { # 0000: 1E 04 78 2C 7A AF E1 8B 16 81 BC 4B EC 6E 7C 86 ..x,z......K.n.. # 0010: AD 5B B1 EA C9 10 70 1E E6 AC B5 3D EE 26 C3 4E .[....p....=.&.N # } # }, # } # ] # } # ) # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:50.857 UTC|SSLExtensions.java:192|Consumed extension: supported_versions # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:50.857 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3 # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:50.858 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:50.858 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:50.858 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:50.858 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:50.858 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:50.858 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2 # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:50.858 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:50.858 UTC|SSLExtensions.java:192|Consumed extension: supported_versions # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:50.860 UTC|SSLExtensions.java:192|Consumed extension: key_share # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:50.860 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:50.860 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence. # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:50.860 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:50.861 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:50.861 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:50.861 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:50.861 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:50.861 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2 # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:50.861 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret # javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-29 12:16:50.861 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions # javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-29 12:16:50.861 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:50.861 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:50.861 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:50.874 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE # countdown value = 137438953472 # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:50.875 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE # countdown value = 137438953472 # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:50.876 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:50.880 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message ( # "EncryptedExtensions": [ # "supported_groups (10)": { # "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192] # }, # "application_layer_protocol_negotiation (16)": { # [h2] # } # ] # ) # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-29 12:16:50.880 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name # javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-2 [...truncated too long message...] ity.AccessController.doPrivileged(Native Method) # at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008) # at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657) # at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102) # at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84) # at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314) # at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100) # at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558) # at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379) # at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146) # at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100) # at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53) # at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294) # at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128) # at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628) # at java.base/java.lang.Thread.run(Thread.java:829) # Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target # at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141) # at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126) # at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297) # at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434) # ... 28 more} # # ) # javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-29 12:18:03.217 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data # Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:40074/solr/admin/info/system # at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:550) # at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192) # at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582) # at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481) # at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438) # at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158) # at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153) # Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target # at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131) # at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353) # at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296) # at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291) # at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357) # at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232) # at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175) # at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392) # at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443) # at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074) # at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061) # at java.base/java.security.AccessController.doPrivileged(Native Method) # at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008) # at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657) # at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102) # at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84) # at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314) # at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100) # at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558) # at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379) # at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146) # at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100) # at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53) # at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294) # at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128) # at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628) # at java.base/java.lang.Thread.run(Thread.java:829) # Suppressed: java.io.IOException: Broken pipe # at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138) # at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422) # at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275) # at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254) # at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386) # at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292) # at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243) # at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224) # at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821) # at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793) # at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161) # at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451) # at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117) # at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87) # ... 11 more # Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target # at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439) # at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306) # at java.base/sun.security.validator.Validator.validate(Validator.java:264) # at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313) # at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276) # at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141) # at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335) # ... 22 more # Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target # at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141) # at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126) # at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297) # at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434) # ... 28 more ok 64 SOLR-11740 check 'solr stop' connection in 14487ms ok 65 stop command for single port in 18506ms ok 66 status detects locally running solr in 7738ms ok 67 status does not expose cli parameters to end user in 257ms ok 68 listing out files in 2815ms ok 69 copying files around in 6522ms ok 70 upconfig in 2617ms ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1229ms ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1245ms ok 73 Cleanup in 1265ms > Task :solr:packaging:integrationTests FAILED FAILURE: Build failed with an exception. * Where: Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/solr/packaging/build.gradle' line: 301 * What went wrong: Execution failed for task ':solr:packaging:integrationTests'. > Process 'command > '/home/jenkins/jenkins-slave/workspace/Solr/Solr-check-9.4/.gradle/node/packaging/node_modules/bats/bin/bats'' > finished with non-zero exit value 1 * Try: > Run with --stacktrace option to get the stack trace. > Run with --info or --debug option to get more log output. * Get more help at https://help.gradle.org Deprecated Gradle features were used in this build, making it incompatible with Gradle 8.0. You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins. See https://docs.gradle.org/7.6/userguide/command_line_interface.html#sec:command_line_warnings BUILD FAILED in 1h 1m 24s 672 actionable tasks: 672 executed Publishing build scan... https://ge.apache.org/s/uwkvs5cfmireu Build step 'Invoke Gradle script' changed build result to FAILURE Build step 'Invoke Gradle script' marked build as failure Archiving artifacts Recording test results [Checks API] No suitable checks publisher found. Email was triggered for: Failure - Any Sending email for trigger: Failure - Any
--------------------------------------------------------------------- To unsubscribe, e-mail: [email protected] For additional commands, e-mail: [email protected]
