There is a bug in Java SSL Hello extension handling code which is exposed by newer openssl versions.
Newer versions of openssl (0.9.8j and greater) have enabled extensions in SSL handshakes by default. The client hello extension which is now enabled exposes a bug in Java hello extension handling. . The SSL exception we have received and the one shown here has the same back traces. Please see the below links. http://www.mail-archive.com/openssl-users@openssl.org/msg58269.html following link mentions a flag in openssl that can be used to work around this problem http://bugs.sun.com/bugdatabase/view_bug.do;jsessionid=e318b005a6a9260f018bac29c7ac?bug_id=6728126 i have to build openssl with "no-tlsext" as a work around , but i am not sure what is the impact if i disable this flag. can some one help me here. Yahoo! India has a new look. Take a sneak peek http://in.yahoo.com/trynew