As the attachment didn't show up, here is the selected ssl debug log: trustStore is: /usr/local/java/jre/lib/security/cacerts trustStore type is : jks trustStore provider is : init truststore adding as trusted cert: ......
trigger seeding of SecureRandom done seeding SecureRandom executing request to https://host.washington.edu:443 main, setSoTimeout(0) called Allow unsafe renegotiation: false Allow legacy hello messages: true Is initial handshake: true Is secure renegotiation: false %% No cached client session *** ClientHello, TLSv1 RandomCookie: ... Session ID: {} Cipher Suite: [.....] Compression Method: {0} *** main, WRITE: TLSv1 Handshake, length = 75 main, WRITE: SSLv2 client hello message, length = 101 main, READ: TLSv1 Handshake, length = 81 *** ServerHello, TLSv1 RandomCookie: ... Session ID: ... Cipher Suite: SSL_RSA_WITH_RC4_128_MD5 Compression Method: 0 Extension renegotiation_info, renegotiated_connection: <empty> *** %% Created: [Session-1, SSL_RSA_WITH_RC4_128_MD5] ** SSL_RSA_WITH_RC4_128_MD5 main, READ: TLSv1 Handshake, length = 4686 *** Certificate chain ...... main, READ: TLSv1 Handshake, length = 4 *** ServerHelloDone *** ClientKeyExchange, RSA PreMasterSecret, TLSv1 main, WRITE: TLSv1 Handshake, length = 262 SESSION KEYGEN: PreMaster Secret: 0000: 03 01 06 1C 96 4B 14 96 DE 0C B2 12 4F 2F E4 D3 .....K......O/.. 0010: 8E 1B B0 BF C6 3D 46 96 ED 03 2A 3D 1C 47 06 65 .....=F...*=.G.e 0020: 5A 10 74 FE 69 A4 C0 F7 FD 38 11 66 3B FF 59 4E Z.t.i....8.f;.YN CONNECTION KEYGEN: Client Nonce: 0000: 4E 14 9B 1B 47 07 9F 93 3F 11 DF F6 2B AB 30 D4 N...G...?...+.0. 0010: 25 D8 E4 56 D6 82 52 CE 58 96 83 08 F1 C5 B2 16 %..V..R.X....... Server Nonce: 0000: 4E 14 9B 1B A7 7B 10 66 03 E9 BD D5 AD F9 7D 02 N......f........ 0010: BF 7E 9E BE 6C 78 B0 28 99 F1 25 BA FB ED DF 3D ....lx.(..%....= Master Secret: 0000: 46 C2 6D 38 3F CB 49 E1 60 4D F8 66 69 BB E6 2A F.m8?.I.`M.fi..* 0010: 97 0E 73 AA 8D 43 D5 73 81 93 B6 3A 5D B4 0C 1C ..s..C.s...:]... 0020: 50 A0 6B 7C 13 DF 66 48 A1 CC C2 6B 6C F8 5D 47 P.k...fH...kl.]G Client MAC write Secret: 0000: 95 AD EA C3 17 6C BA 87 E2 5B 1F 4B EF 73 30 55 .....l...[.K.s0U Server MAC write Secret: 0000: FC 28 3F A7 86 03 EC 89 27 C3 B8 B3 58 7E B0 9B .(?.....'...X... Client write key: 0000: 6D CD 89 0F E5 7C 82 F4 9F E4 98 03 05 75 5F 0D m............u_. Server write key: 0000: 94 91 00 DB C8 C3 37 11 3F 15 6A 1E DC 9B DA 1C ......7.?.j..... ... no IV used for this cipher main, WRITE: TLSv1 Change Cipher Spec, length = 1 *** Finished verify_data: { 133, 39, 57, 194, 44, 158, 23, 95, 52, 185, 122, 87 } *** main, WRITE: TLSv1 Handshake, length = 32 main, READ: TLSv1 Change Cipher Spec, length = 1 main, READ: TLSv1 Handshake, length = 32 *** Finished verify_data: { 51, 119, 115, 104, 234, 28, 122, 207, 249, 210, 75, 140 } *** %% Cached client session: [Session-1, SSL_RSA_WITH_RC4_128_MD5] main, setSoTimeout(0) called main, WRITE: TLSv1 Application Data, length = 199 main, READ: TLSv1 Handshake, length = 20 Allow unsafe renegotiation: false Allow legacy hello messages: true Is initial handshake: false Is secure renegotiation: true *** HelloRequest (empty) %% Client cached [Session-1, SSL_RSA_WITH_RC4_128_MD5] %% Try resuming [Session-1, SSL_RSA_WITH_RC4_128_MD5] from port 39403 *** ClientHello, TLSv1 RandomCookie: ... Cipher Suites: ... Compression Methods: { 0 } Extension renegotiation_info, renegotiated_connection: 85:27:39:c2:2c:9e:17:5f:34:b9:7a:57 *** main, WRITE: TLSv1 Handshake, length = 140 main, READ: TLSv1 Handshake, length = 121 *** ServerHello, TLSv1 RandomCookie: GMT: ... Session ID: ... Cipher Suite: SSL_RSA_WITH_RC4_128_MD5 Compression Method: 0 Extension renegotiation_info, renegotiated_connection: 85:27:39:c2:2c:9e:17:5f:3 4:b9:7a:57:33:77:73:68:ea:1c:7a:cf:f9:d2:4b:8c *** %% Created: [Session-2, SSL_RSA_WITH_RC4_128_MD5] ** SSL_RSA_WITH_RC4_128_MD5 main, READ: TLSv1 Handshake, length = 4702 *** Certificate chain ...... main, READ: TLSv1 Handshake, length = 16400 main, READ: TLSv1 Handshake, length = 596 *** CertificateRequest Cert Types: RSA, DSS Cert Authorities: ...... <SERIALNUMBER=07969287, CN=Go Daddy Secure Certification Authority, OU=http://certificates.godaddy.com/repository, O="GoDaddy.com, Inc.", L=Scottsdale, ST=Arizona, C=US> *** ServerHelloDone *** Certificate chain *** *** ClientKeyExchange, RSA PreMasterSecret, TLSv1 main, WRITE: TLSv1 Handshake, length = 285 SESSION KEYGEN: PreMaster Secret: 0000: 03 01 FD E8 4E 7F BC D1 83 3F 14 E2 16 87 07 6C ....N....?.....l 0010: 13 23 62 F8 2C 08 5D 78 A2 5B 73 54 79 C3 65 7C .#b.,.]x.[sTy.e. 0020: 3D 2F 4A F8 32 F6 13 78 E6 BF 4B F6 E4 16 5C 60 =/J.2..x..K...\` CONNECTION KEYGEN: Client Nonce: 0000: 4E 14 9B 1B 73 31 A0 80 69 74 59 96 51 E4 FC 2C N...s1..itY.Q.., 0010: 30 F8 53 DF 74 C5 9F 92 C3 9F D8 F7 C9 A4 D3 DD 0.S.t........... Server Nonce: 0000: 4E 14 9B 1B 42 BB 30 C5 70 40 FA 12 98 EF D6 B5 N...B.0.p@...... 0010: A3 B2 F4 44 38 B3 0C FB D5 81 33 F5 90 13 FF 74 ...D8.....3....t Master Secret: 0000: 92 60 8D F1 4A AD 19 66 E2 F9 40 74 6D 4B 05 83 .`..J..f..@tmK.. 0010: 5C CB A8 F2 92 93 45 6B A7 BA 47 63 DD B8 62 B9 \.....Ek..Gc..b. 0020: 03 8E 15 5D CF 1D 44 27 BC 2C 3D D2 9B 15 BB 9A ...]..D'.,=..... Client MAC write Secret: 0000: 36 D7 66 31 1A 9A 94 90 DC 78 FF 79 24 4F 8A 41 6.f1.....x.y$O.A Server MAC write Secret: 0000: CA B8 55 79 7E 30 63 46 CE D7 39 EA DC 28 F3 5E ..Uy.0cF..9..(.^ Client write key: 0000: BC C6 BA 87 C1 AE AB 11 68 F4 DD 44 A1 56 75 D2 ........h..D.Vu. Server write key: 0000: 18 E3 75 86 F4 90 E4 21 98 76 78 73 4C 9E 61 41 ..u....!.vxsL.aA ... no IV used for this cipher main, WRITE: TLSv1 Change Cipher Spec, length = 17 *** Finished verify_data: { 123, 61, 187, 40, 255, 114, 133, 66, 203, 163, 143, 205 } *** main, WRITE: TLSv1 Handshake, length = 32 main, READ: TLSv1 Alert, length = 18 main, RECV TLSv1 ALERT: fatal, handshake_failure %% Invalidated: [Session-1, SSL_RSA_WITH_RC4_128_MD5] main, called closeSocket() main, handling exception: javax.net.ssl.SSLHandshakeException: Received fatal alert: handshake_failure
