Hi,

          We're observing a random issue with some of our customers, after 
doing an upgrade of the Jetty from 9.4.11 to 9.4.44. We're starting Jetty 
programmatically in a Zulu JRE 8 runtime.

         We're initializing the SSLContextFactory as follows


        
SslContextFactory<http://zensrc.labs.blr.novell.com/source/s?defs=SslContextFactory&project=Dev-20u4_zeus>
 
contextFactory<http://zensrc.labs.blr.novell.com/source/s?refs=contextFactory&project=Dev-20u4_zeus>
 = new 
SslContextFactory<http://zensrc.labs.blr.novell.com/source/s?defs=SslContextFactory&project=Dev-20u4_zeus>.Server<http://zensrc.labs.blr.novell.com/source/s?defs=Server&project=Dev-20u4_zeus>();

        
contextFactory<http://zensrc.labs.blr.novell.com/source/s?defs=contextFactory&project=Dev-20u4_zeus>.setKeyStorePath<http://zensrc.labs.blr.novell.com/source/s?defs=setKeyStorePath&project=Dev-20u4_zeus>(config<http://zensrc.labs.blr.novell.com/source/s?defs=config&project=Dev-20u4_zeus>.getKeyStorePath<http://zensrc.labs.blr.novell.com/source/s?defs=getKeyStorePath&project=Dev-20u4_zeus>());

        
contextFactory<http://zensrc.labs.blr.novell.com/source/s?defs=contextFactory&project=Dev-20u4_zeus>.setKeyStorePassword<http://zensrc.labs.blr.novell.com/source/s?defs=setKeyStorePassword&project=Dev-20u4_zeus>(config<http://zensrc.labs.blr.novell.com/source/s?defs=config&project=Dev-20u4_zeus>.getDecryptedPassword<http://zensrc.labs.blr.novell.com/source/s?defs=getDecryptedPassword&project=Dev-20u4_zeus>());

        
contextFactory<http://zensrc.labs.blr.novell.com/source/s?defs=contextFactory&project=Dev-20u4_zeus>.setTrustStorePath<http://zensrc.labs.blr.novell.com/source/s?defs=setTrustStorePath&project=Dev-20u4_zeus>(config<http://zensrc.labs.blr.novell.com/source/s?defs=config&project=Dev-20u4_zeus>.getKeyStorePath<http://zensrc.labs.blr.novell.com/source/s?defs=getKeyStorePath&project=Dev-20u4_zeus>());

        
contextFactory<http://zensrc.labs.blr.novell.com/source/s?defs=contextFactory&project=Dev-20u4_zeus>.setTrustStorePassword<http://zensrc.labs.blr.novell.com/source/s?defs=setTrustStorePassword&project=Dev-20u4_zeus>(config<http://zensrc.labs.blr.novell.com/source/s?defs=config&project=Dev-20u4_zeus>.getDecryptedPassword<http://zensrc.labs.blr.novell.com/source/s?defs=getDecryptedPassword&project=Dev-20u4_zeus>());

        
contextFactory<http://zensrc.labs.blr.novell.com/source/s?defs=contextFactory&project=Dev-20u4_zeus>.setExcludeCipherSuites<http://zensrc.labs.blr.novell.com/source/s?defs=setExcludeCipherSuites&project=Dev-20u4_zeus>(excCipherSuites<http://zensrc.labs.blr.novell.com/source/xref/Dev-20u4_zeus/zeus/zeus-jetty/src/main/java/com/novell/zenworks/zeus/jetty/JettyServer.java?r=4b4e51bb#excCipherSuites>);

        
contextFactory<http://zensrc.labs.blr.novell.com/source/s?defs=contextFactory&project=Dev-20u4_zeus>.addExcludeProtocols<http://zensrc.labs.blr.novell.com/source/s?defs=addExcludeProtocols&project=Dev-20u4_zeus>(excludedProtocols<http://zensrc.labs.blr.novell.com/source/s?defs=excludedProtocols&project=Dev-20u4_zeus>.toArray<http://zensrc.labs.blr.novell.com/source/s?defs=toArray&project=Dev-20u4_zeus>(new
 
String<http://zensrc.labs.blr.novell.com/source/s?defs=String&project=Dev-20u4_zeus>[0]));


           What we're observing is that the SSL handshake is failing when the 
server is accessed over FQDN. However the handshake goes through when accessed 
over IP Address.

           Enabled, Java SSL Logging and herewith attaching the trace of the 
same.

           What we see in the logs is

           javax.net.ssl|SEVERE|08 1C|qtp1363141203-2076|2023-02-07 
12:35:40.763 EST|TransportContext.java:340|Fatal (HANDSHAKE_FAILURE): no cipher 
suites in common (
"throwable" : {
  javax.net.ssl.SSLHandshakeException: no cipher suites in common
                at sun.security.ssl.Alert.createSSLException(Alert.java:131)
                at sun.security.ssl.Alert.createSSLException(Alert.java:117)
                at 
sun.security.ssl.TransportContext.fatal(TransportContext.java:335)
                at 
sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
                at 
sun.security.ssl.TransportContext.fatal(TransportContext.java:282)
                at 
sun.security.ssl.ServerHello$T12ServerHelloProducer.chooseCipherSuite(ServerHello.java:461)
                at 
sun.security.ssl.ServerHello$T12ServerHelloProducer.produce(ServerHello.java:296)
                at sun.security.ssl.SSLHandshake.produce(SSLHandshake.java:421)
                at 
sun.security.ssl.ClientHello$T12ClientHelloConsumer.consume(ClientHello.java:1020)
                at 
sun.security.ssl.ClientHello$ClientHelloConsumer.onClientHello(ClientHello.java:727)
                at 
sun.security.ssl.ClientHello$ClientHelloConsumer.consume(ClientHello.java:693)
                at sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:377)
                at 
sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:444)
                at 
sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:981)
                at 
sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:968)
                at java.security.AccessController.doPrivileged(Native Method)
                at 
sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:915)
                at 
org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:654)
                at 
org.eclipse.jetty.server.HttpConnection.fillRequestBuffer(HttpConnection.java:350)
                at 
org.eclipse.jetty.server.HttpConnection.onFillable(HttpConnection.java:260)
                at 
org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:311)
                at 
org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:105)
                at 
org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:555)
                at 
org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:410)
                at 
org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:164)
                at 
org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:105)
                at 
org.eclipse.jetty.io.ChannelEndPoint$1.run(ChannelEndPoint.java:104)
                at 
org.eclipse.jetty.util.thread.strategy.EatWhatYouKill.runTask(EatWhatYouKill.java:338)
                at 
org.eclipse.jetty.util.thread.strategy.EatWhatYouKill.doProduce(EatWhatYouKill.java:315)
                at 
org.eclipse.jetty.util.thread.strategy.EatWhatYouKill.tryProduce(EatWhatYouKill.java:173)
                at 
org.eclipse.jetty.util.thread.strategy.EatWhatYouKill.run(EatWhatYouKill.java:131)
                at 
org.eclipse.jetty.util.thread.ReservedThreadExecutor$ReservedThread.run(ReservedThreadExecutor.java:409)
                at 
org.eclipse.jetty.util.thread.QueuedThreadPool.runJob(QueuedThreadPool.java:883)
                at 
org.eclipse.jetty.util.thread.QueuedThreadPool$Runner.run(QueuedThreadPool.java:1034)
                at java.lang.Thread.run(Thread.java:750)}

      The problem seems similar to the issue seen in the case of 
https://github.com/eclipse/jetty.project/issues/7691 - However this was seen on 
Java 11.

       Also seems similar to the issue seen in 
https://github.com/eclipse/jetty.project/issues/6099, but in this it is marked 
as Fixed in 9.4.41 and we're on 9.4.44. We tried to follow the workaround of 
setting sni required as true. But in our internal testing, after setting that, 
handshake was failing both over IP and FQDN.

       We're working to see if we can dump on server start and collect more 
logs, but meanwhile if we can get any help here, it would be much appreciated.

        What we're clear is that the Server Hello is not able to prove 
possession and therefore the handshake is failing. How it is related to Jetty 
version is what we're trying to figure out.


Thanks,
Srijith.
javax.net.ssl|FINE|07 F3|qtp1363141203-2035|2023-02-07 12:35:40.760 
EST|ClientHello.java:689|Consuming ClientHello handshake message (
"ClientHello": {
  "client version"      : "TLSv1.2",
  "random"              : "4A 7B 44 66 DA F6 D4 00 60 62 09 96 D5 B8 BA F5 EE 
51 B4 3B B1 E1 5A 58 8E B9 7A E6 3A D9 14 58",
  "session id"          : "18 CB 45 94 D3 BC 60 E5 08 A5 3E CF FA 68 F9 CA 96 
91 20 38 0B 62 0B EF 1E EE 49 AA E3 2E ED C5",
  "cipher suites"       : "[UNKNOWN-CIPHER-SUITE(0x2A2A)(0x2A2A), 
TLS_AES_128_GCM_SHA256(0x1301), TLS_AES_256_GCM_SHA384(0x1302), 
TLS_CHACHA20_POLY1305_SHA256(0x1303), 
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), 
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), 
TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), 
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), 
UNKNOWN-CIPHER-SUITE(0xCCA9)(0xCCA9), UNKNOWN-CIPHER-SUITE(0xCCA8)(0xCCA8), 
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA(0xC013), 
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA(0xC014), 
TLS_RSA_WITH_AES_128_GCM_SHA256(0x009C), 
TLS_RSA_WITH_AES_256_GCM_SHA384(0x009D), TLS_RSA_WITH_AES_128_CBC_SHA(0x002F), 
TLS_RSA_WITH_AES_256_CBC_SHA(0x0035)]",
  "compression methods" : "00",
  "extensions"          : [
    "unknown extension (60,138)": {
      
    },
    "application_layer_protocol_negotiation (16)": {
      [h2, http/1.1]
    },
    "key_share (51)": {
      "client_shares": [  
        {
          "named group": UNDEFINED-NAMED-GROUP(47802)
          "key_exchange": {
            0000: 00 
          }
        },
        {
          "named group": x25519
          "key_exchange": {
            0000: 13 A1 84 46 AB BA 4E 5A   2E 47 BE B3 D9 6D E6 B4  
...F..NZ.G...m..
            0010: 70 57 2F 2C FC 48 E3 E4   C6 1C 52 A6 5A 8E B2 58  
pW/,.H....R.Z..X
          }
        },
      ]
    },
    "server_name (0)": {
      type=host_name (0), value=cotlv201.corp.toronto.ca
    },
    "status_request (5)": {
      "certificate status type": ocsp
      "OCSP status request": {
        "responder_id": <empty>
        "request extensions": {
          <empty>
        }
      }
    },
    "extended_master_secret (23)": {
      <empty>
    },
    "unknown extension (17,513)": {
      0000: 00 03 02 68 32                                     ...h2
    },
    "ec_point_formats (11)": {
      "formats": [uncompressed]
    },
    "signed_certificate_timestamp (18)": {
      
    },
    "supported_versions (43)": {
      "versions": [TLS-42.42, TLSv1.3, TLSv1.2]
    },
    "supported_groups (10)": {
      "versions": [UNDEFINED-NAMED-GROUP(47802), x25519, secp256r1, secp384r1]
    },
    "signature_algorithms (13)": {
      "signature schemes": [ecdsa_secp256r1_sha256, rsa_pss_rsae_sha256, 
rsa_pkcs1_sha256, ecdsa_secp384r1_sha384, rsa_pss_rsae_sha384, 
rsa_pkcs1_sha384, rsa_pss_rsae_sha512, rsa_pkcs1_sha512, rsa_pkcs1_sha1]
    },
    "psk_key_exchange_modes (45)": {
      "ke_modes": [psk_dhe_ke]
    },
    "unknown extension (27)": {
      0000: 02 00 02                                           ...
    },
    "session_ticket (35)": {
      
    },
    "renegotiation_info (65,281)": {
      "renegotiated connection": [<no renegotiated connection>]
    },
    "unknown extension (64,250)": {
      0000: 00                                                 .
    },
    "client_certificate_type (21)": {
      0000: 00 00 00 00 00 00 00 00   00 00 00 00 00 00 00 00  ................
      0010: 00 00 00 00 00 00 00 00   00 00 00 00 00 00 00 00  ................
      0020: 00 00 00 00 00 00 00 00   00 00 00 00 00 00 00 00  ................
      0030: 00 00 00 00 00 00 00 00   00 00 00 00 00 00 00 00  ................
      0040: 00 00 00 00 00 00 00 00   00 00 00 00 00 00 00 00  ................
      0050: 00 00 00 00 00 00 00 00   00 00 00 00 00 00 00 00  ................
      0060: 00 00 00 00 00 00 00 00   00 00 00 00 00 00 00 00  ................
      0070: 00 00 00 00 00 00 00 00   00 00 00 00 00 00 00 00  ................
      0080: 00 00 00 00 00 00 00 00   00 00 00 00 00 00 00 00  ................
      0090: 00 00 00 00 00 00 00 00   00 00 00 00 00 00 00 00  ................
      00A0: 00 00 00 00 00 00 00 00   00 00 00 00 00 00 00 00  ................
      00B0: 00 00 00 00 00 00 00 00   00 00 00 00 00           .............
    }
  ]
}
)
javax.net.ssl|FINE|07 F3|qtp1363141203-2035|2023-02-07 12:35:40.761 
EST|SSLExtensions.java:192|Consumed extension: supported_versions
javax.net.ssl|FINE|07 F3|qtp1363141203-2035|2023-02-07 12:35:40.761 
EST|ClientHello.java:719|Negotiated protocol version: TLSv1.2
javax.net.ssl|ALL|07 F3|qtp1363141203-2035|2023-02-07 12:35:40.761 
EST|ClientHello.java:849|Can't resume, the existing session is not rejoinable
javax.net.ssl|FINE|07 F3|qtp1363141203-2035|2023-02-07 12:35:40.761 
EST|ServerNameExtension.java:310|server name indication (type=host_name (0), 
value=cotlv201.corp.toronto.ca) is accepted
javax.net.ssl|FINE|07 F3|qtp1363141203-2035|2023-02-07 12:35:40.761 
EST|SSLExtensions.java:192|Consumed extension: server_name
javax.net.ssl|FINE|07 F3|qtp1363141203-2035|2023-02-07 12:35:40.761 
EST|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
javax.net.ssl|ALL|08 1C|qtp1363141203-2076|2023-02-07 12:35:40.761 
EST|SignatureScheme.java:403|Ignore disabled signature scheme: rsa_md5
javax.net.ssl|FINE|07 F3|qtp1363141203-2035|2023-02-07 12:35:40.761 
EST|SSLExtensions.java:192|Consumed extension: status_request
javax.net.ssl|ALL|08 1C|qtp1363141203-2076|2023-02-07 12:35:40.761 
EST|SSLSessionImpl.java:215|Session initialized:  
Session(1675791340761|SSL_NULL_WITH_NULL_NULL)
javax.net.ssl|FINE|07 F3|qtp1363141203-2035|2023-02-07 12:35:40.761 
EST|SSLExtensions.java:192|Consumed extension: supported_groups
javax.net.ssl|WARNING|08 1C|qtp1363141203-2076|2023-02-07 12:35:40.761 
EST|SSLExtensions.java:215|Ignore impact of unsupported extension: server_name
javax.net.ssl|FINE|07 F3|qtp1363141203-2035|2023-02-07 12:35:40.761 
EST|SSLExtensions.java:192|Consumed extension: ec_point_formats
javax.net.ssl|FINE|08 1C|qtp1363141203-2076|2023-02-07 12:35:40.761 
EST|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
javax.net.ssl|FINE|07 F3|qtp1363141203-2035|2023-02-07 12:35:40.761 
EST|SSLExtensions.java:192|Consumed extension: signature_algorithms
javax.net.ssl|WARNING|08 1C|qtp1363141203-2076|2023-02-07 12:35:40.761 
EST|SSLExtensions.java:215|Ignore impact of unsupported extension: 
status_request
javax.net.ssl|FINE|07 F3|qtp1363141203-2035|2023-02-07 12:35:40.761 
EST|SSLExtensions.java:173|Ignore unavailable extension: 
signature_algorithms_cert
javax.net.ssl|WARNING|08 1C|qtp1363141203-2076|2023-02-07 12:35:40.761 
EST|SSLExtensions.java:215|Ignore impact of unsupported extension: 
supported_groups
javax.net.ssl|FINE|07 F3|qtp1363141203-2035|2023-02-07 12:35:40.761 
EST|AlpnExtension.java:296|Ignore server unenabled extension: 
application_layer_protocol_negotiation
javax.net.ssl|WARNING|08 1C|qtp1363141203-2076|2023-02-07 12:35:40.761 
EST|SSLExtensions.java:215|Ignore impact of unsupported extension: 
ec_point_formats
javax.net.ssl|FINE|07 F3|qtp1363141203-2035|2023-02-07 12:35:40.761 
EST|SSLExtensions.java:192|Consumed extension: 
application_layer_protocol_negotiation
javax.net.ssl|FINE|07 F3|qtp1363141203-2035|2023-02-07 12:35:40.761 
EST|SSLExtensions.java:173|Ignore unavailable extension: status_request_v2
javax.net.ssl|FINE|07 F3|qtp1363141203-2035|2023-02-07 12:35:40.761 
EST|SSLExtensions.java:192|Consumed extension: extended_master_secret
javax.net.ssl|FINE|08 1C|qtp1363141203-2076|2023-02-07 12:35:40.761 
EST|SSLExtensions.java:224|Populated with extension: signature_algorithms
javax.net.ssl|FINE|07 F3|qtp1363141203-2035|2023-02-07 12:35:40.762 
EST|SSLExtensions.java:192|Consumed extension: supported_versions
javax.net.ssl|FINE|08 1C|qtp1363141203-2076|2023-02-07 12:35:40.762 
EST|SSLExtensions.java:207|Ignore unavailable extension: 
signature_algorithms_cert
javax.net.ssl|FINE|07 F3|qtp1363141203-2035|2023-02-07 12:35:40.762 
EST|SSLExtensions.java:192|Consumed extension: renegotiation_info
javax.net.ssl|WARNING|08 1C|qtp1363141203-2076|2023-02-07 12:35:40.762 
EST|SSLExtensions.java:215|Ignore impact of unsupported extension: 
application_layer_protocol_negotiation
javax.net.ssl|ALL|07 F3|qtp1363141203-2035|2023-02-07 12:35:40.762 
EST|SignatureScheme.java:384|Ignore unsupported signature scheme: ed25519
javax.net.ssl|FINE|08 1C|qtp1363141203-2076|2023-02-07 12:35:40.762 
EST|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
javax.net.ssl|ALL|07 F3|qtp1363141203-2035|2023-02-07 12:35:40.762 
EST|SignatureScheme.java:384|Ignore unsupported signature scheme: ed448
javax.net.ssl|WARNING|08 1C|qtp1363141203-2076|2023-02-07 12:35:40.762 
EST|SSLExtensions.java:215|Ignore impact of unsupported extension: 
extended_master_secret
javax.net.ssl|WARNING|08 1C|qtp1363141203-2076|2023-02-07 12:35:40.762 
EST|SSLExtensions.java:215|Ignore impact of unsupported extension: 
supported_versions
javax.net.ssl|WARNING|08 1C|qtp1363141203-2076|2023-02-07 12:35:40.762 
EST|SSLExtensions.java:215|Ignore impact of unsupported extension: 
renegotiation_info
javax.net.ssl|ALL|08 1C|qtp1363141203-2076|2023-02-07 12:35:40.762 
EST|X509Authentication.java:270|No X.509 cert selected for EC
javax.net.ssl|ALL|08 1C|qtp1363141203-2076|2023-02-07 12:35:40.762 
EST|X509Authentication.java:270|No X.509 cert selected for EC
javax.net.ssl|ALL|07 F3|qtp1363141203-2035|2023-02-07 12:35:40.762 
EST|SignatureScheme.java:403|Ignore disabled signature scheme: rsa_md5
javax.net.ssl|ALL|07 F3|qtp1363141203-2035|2023-02-07 12:35:40.762 
EST|SSLSessionImpl.java:215|Session initialized:  
Session(1675791340762|SSL_NULL_WITH_NULL_NULL)
javax.net.ssl|FINE|08 1C|qtp1363141203-2076|2023-02-07 12:35:40.762 
EST|SunX509KeyManagerImpl.java:392|matching alias: tomcat
javax.net.ssl|WARNING|07 F3|qtp1363141203-2035|2023-02-07 12:35:40.762 
EST|SSLExtensions.java:215|Ignore impact of unsupported extension: server_name
javax.net.ssl|FINE|07 F3|qtp1363141203-2035|2023-02-07 12:35:40.762 
EST|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
javax.net.ssl|ALL|08 1C|qtp1363141203-2076|2023-02-07 12:35:40.762 
EST|X509Authentication.java:270|No X.509 cert selected for RSA
javax.net.ssl|WARNING|07 F3|qtp1363141203-2035|2023-02-07 12:35:40.762 
EST|SSLExtensions.java:215|Ignore impact of unsupported extension: 
status_request
javax.net.ssl|ALL|08 1C|qtp1363141203-2076|2023-02-07 12:35:40.762 
EST|X509Authentication.java:270|No X.509 cert selected for RSASSA-PSS
javax.net.ssl|WARNING|07 F3|qtp1363141203-2035|2023-02-07 12:35:40.762 
EST|SSLExtensions.java:215|Ignore impact of unsupported extension: 
supported_groups
javax.net.ssl|WARNING|07 F3|qtp1363141203-2035|2023-02-07 12:35:40.763 
EST|SSLExtensions.java:215|Ignore impact of unsupported extension: 
ec_point_formats
javax.net.ssl|FINE|08 1C|qtp1363141203-2076|2023-02-07 12:35:40.762 
EST|SunX509KeyManagerImpl.java:392|matching alias: tomcat
javax.net.ssl|ALL|08 1C|qtp1363141203-2076|2023-02-07 12:35:40.763 
EST|X509Authentication.java:270|No X.509 cert selected for RSA
javax.net.ssl|ALL|08 1C|qtp1363141203-2076|2023-02-07 12:35:40.763 
EST|X509Authentication.java:270|No X.509 cert selected for RSASSA-PSS
javax.net.ssl|FINE|07 F3|qtp1363141203-2035|2023-02-07 12:35:40.763 
EST|SSLExtensions.java:224|Populated with extension: signature_algorithms
javax.net.ssl|FINE|07 F3|qtp1363141203-2035|2023-02-07 12:35:40.763 
EST|SSLExtensions.java:207|Ignore unavailable extension: 
signature_algorithms_cert
javax.net.ssl|WARNING|07 F3|qtp1363141203-2035|2023-02-07 12:35:40.763 
EST|SSLExtensions.java:215|Ignore impact of unsupported extension: 
application_layer_protocol_negotiation
javax.net.ssl|FINE|07 F3|qtp1363141203-2035|2023-02-07 12:35:40.763 
EST|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
javax.net.ssl|WARNING|07 F3|qtp1363141203-2035|2023-02-07 12:35:40.763 
EST|SSLExtensions.java:215|Ignore impact of unsupported extension: 
extended_master_secret
javax.net.ssl|WARNING|07 F3|qtp1363141203-2035|2023-02-07 12:35:40.763 
EST|SSLExtensions.java:215|Ignore impact of unsupported extension: 
supported_versions
javax.net.ssl|SEVERE|08 1C|qtp1363141203-2076|2023-02-07 12:35:40.763 
EST|TransportContext.java:340|Fatal (HANDSHAKE_FAILURE): no cipher suites in 
common (
"throwable" : {
  javax.net.ssl.SSLHandshakeException: no cipher suites in common
        at sun.security.ssl.Alert.createSSLException(Alert.java:131)
        at sun.security.ssl.Alert.createSSLException(Alert.java:117)
        at sun.security.ssl.TransportContext.fatal(TransportContext.java:335)
        at sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
        at sun.security.ssl.TransportContext.fatal(TransportContext.java:282)
        at 
sun.security.ssl.ServerHello$T12ServerHelloProducer.chooseCipherSuite(ServerHello.java:461)
        at 
sun.security.ssl.ServerHello$T12ServerHelloProducer.produce(ServerHello.java:296)
        at sun.security.ssl.SSLHandshake.produce(SSLHandshake.java:421)
        at 
sun.security.ssl.ClientHello$T12ClientHelloConsumer.consume(ClientHello.java:1020)
        at 
sun.security.ssl.ClientHello$ClientHelloConsumer.onClientHello(ClientHello.java:727)
        at 
sun.security.ssl.ClientHello$ClientHelloConsumer.consume(ClientHello.java:693)
        at sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:377)
        at sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:444)
        at 
sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:981)
        at 
sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:968)
        at java.security.AccessController.doPrivileged(Native Method)
        at 
sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:915)
        at 
org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:654)
        at 
org.eclipse.jetty.server.HttpConnection.fillRequestBuffer(HttpConnection.java:350)
        at 
org.eclipse.jetty.server.HttpConnection.onFillable(HttpConnection.java:260)
        at 
org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:311)
        at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:105)
        at 
org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:555)
        at 
org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:410)
        at 
org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:164)
        at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:105)
        at org.eclipse.jetty.io.ChannelEndPoint$1.run(ChannelEndPoint.java:104)
        at 
org.eclipse.jetty.util.thread.strategy.EatWhatYouKill.runTask(EatWhatYouKill.java:338)
        at 
org.eclipse.jetty.util.thread.strategy.EatWhatYouKill.doProduce(EatWhatYouKill.java:315)
        at 
org.eclipse.jetty.util.thread.strategy.EatWhatYouKill.tryProduce(EatWhatYouKill.java:173)
        at 
org.eclipse.jetty.util.thread.strategy.EatWhatYouKill.run(EatWhatYouKill.java:131)
        at 
org.eclipse.jetty.util.thread.ReservedThreadExecutor$ReservedThread.run(ReservedThreadExecutor.java:409)
        at 
org.eclipse.jetty.util.thread.QueuedThreadPool.runJob(QueuedThreadPool.java:883)
        at 
org.eclipse.jetty.util.thread.QueuedThreadPool$Runner.run(QueuedThreadPool.java:1034)
        at java.lang.Thread.run(Thread.java:750)}

)
_______________________________________________
jetty-users mailing list
jetty-users@eclipse.org
To unsubscribe from this list, visit 
https://www.eclipse.org/mailman/listinfo/jetty-users

Reply via email to