On Sun, Jul 25, 2010 at 9:06 PM, Michele Mase' <michele.m...@gmail.com>wrote:

> Hi folks!
> I've a strange problem, please help me to find a solution (not telling me
> to make a script in order restart tomcat in case of the exception)
> Under linux environment,
> RedHat EL5.5
> Jdk 1.5.0_22
> Tomcat6.0.26
> axis1.4
> our webapps takes strange intermittent "javax.net.ssl.SSLException: Invalid
> padding" errors.
> The same webapp under a windows system never catches the exception
> The webapps uses tomcat like a client with the axis library (1.4 version
> only, it is non axis <1.4 capable) in order to connect to an external
> webservice with https.
> You catch the exception after 1 hour of work, 5, 7 hours and more than 24
> hours of work.
> Once the exception is catched, the only solution to make the webapp can
> work again, is to restart the tomcat.
> Under the windows machine we never caught the exception.
>
> Attachments:
> wsloader.txt is the code for the invocation of webservices.
> I also attach the wireshark compatible files of both situations:
> interop91ko.enc when it doesn't work; you can take a look at the pattern
> 294.  http://www.ietf.org/rfc/rfc2246.txt?number=2246
>
> bad_record_mac
>        This alert is returned if a record is received with an incorrect
>        MAC. This message is always fatal.
>
> interop91ok.enc when it work
>
> The attachment logs-ko.txt is the application log when it doesn't work
> The attachment logs-ok.txt is the application log when it works.
>
> pls, Help me! My boss wants to use the webapp under windows (migrating it
> from linux) since in windoz test environment we have never seen the
> exception
>
> Regards Michele Masè
>
>
public String inviaMessaggio(String username, String password) throws 
ErroreServizio {

Message out_msg = null;

Message in_msg = null;

String s_msg = null;

try{

//se ci sono allegati, li converto

if(getAthIN() != null)

trascodeAttachments();

//Se il soapmessage è in formato B64, lo decodifico

String soapMsg = getSerializedMessage();

if (com.insiel.lz.xml.Base64.isBase64(soapMsg)){

byte[] btin = b64.decode(getSerializedMessage());

s_msg = new String(btin);

}

else

s_msg = soapMsg;

 

 

Service server = new Service();

Call call = (Call) server.createCall();

String wsAddress = getWsAddress();

if ((wsAddress!=null) && (wsAddress.length()>0))

call.setTargetEndpointAddress(new URL(wsAddress));

 

else

throw new Exception("Impossibile caricare l'URL del web-service!");

//Se il servizio usa la Basic-Authentication, questa deve essere aggiunta alle 
proprietà della chiamata

if ((username!=null) && (username.length()>0))

call.setUsername(username);

if ((password!=null) && (password.length()>0))

call.setPassword(password);

//preparazione msg. SOAP

out_msg = new Message(s_msg);

// se ci sono allegati, li aggiungo al messaggio

if(getAttachments() != null){

int numAllegati = getAttachments().size();

for(int i=0; i<numAllegati; i++){

AttachmentPart atpt = (AttachmentPart)getAttachments().elementAt(i);

out_msg.addAttachmentPart(atpt);

}

}

 

 

call.setRequestMessage(out_msg);

try {

call.invoke();

//la risposta del ws

in_msg = call.getMessageContext().getResponseMessage();

}

//in caso di errore nell'invocazione, restituiamo il SOAP-MESSAGE d'errore come 
allegato applicativo

catch (Exception e){

String dettaglioErrore = e.getMessage();

in_msg = call.getResponseMessage();

log.error("Errore durante l'invocazione del web-service " +wsAddress + " \r\n" 
+ dettaglioErrore);

//in caso di errore HTTPS, si deve mandare la mail con l'errore

if (dettaglioErrore.contains("SSL"))

if (!dettaglioErrore.contains("unable to find valid certification path"))

this.inviaMailErrore(wsAddress, dettaglioErrore);

} //end catch

//PREPARA MSG RISPOSTA

Writer stringWriter = new StringWriter();

SerializationContext context = new SerializationContext(stringWriter, 
call.getMessageContext());

SOAPEnvelope se = in_msg.getSOAPEnvelope();

se.output(context);

s_msg = stringWriter.toString();

setSerializedMessage(b64.encode(s_msg.getBytes()));

setAthOut(new java.util.Hashtable());

Iterator itr = in_msg.getAttachments();

while(itr.hasNext()){

AttachmentPart part = (AttachmentPart)itr.next();

String fln = part.getMimeHeader("Content-Disposition")[0];

int pnt = fln.indexOf("=");

String filename = fln.substring(pnt+1);

java.io.ByteArrayOutputStream baos = new java.io.ByteArrayOutputStream();

part.getDataHandler().writeTo(baos);

//String contentType = part.getContentType();

baos.flush();

baos.close();

byte[] bt_all = baos.toByteArray();

getAthOut().put(filename, bt_all);

}

}

catch(MalformedURLException e){

log.error("Errore (MalformedURLException) nel PAAdapter : " + e.toString());

throw new ErroreServizio (e.getMessage());

} catch (IOException e) {

log.error("Errore (IOException) nel PAAdapter : " + e.toString());

throw new ErroreServizio (e.getMessage());

} catch (SOAPException e) {

log.error("Errore (SOAPException) nel PAAdapter : " + e.toString());

throw new ErroreServizio (e.getMessage());

} catch (ServiceException e) {

log.error("Errore (ServiceException) nel PAAdapter : " + e.toString());

throw new ErroreServizio (e.getMessage());

} catch (Exception e) {

log.error("Errore (Exception generica) nel PAAdapter : " + e.toString());

throw new ErroreServizio (e.getMessage());

}

return getSerializedMessage();

}
INFO - 2010-06-11 09:29:23,366 - Classe: 
xmlbean.porte.trattamentoMessaggio.TracciamentoXMLDB - Metodo: esegui - 
Descrizione: Tempo impiegato per espletare il servizio: 
xmlbean.porte.trattamentoMessaggio.TracciamentoXMLDB 27 millisecondi
WARN - 2010-06-11 09:29:23,369 - Classe: com.insiel.lz.eccezione.ErroreArchivio 
- Metodo: <init> - Descrizione: com.insiel.lz.eccezione.ErroreArchivio Name 
USE_DB is not bound in this Context
%% No cached client session
*** ClientHello, TLSv1
RandomCookie:  GMT: 1276175571 bytes = { 178, 104, 165, 213, 42, 242, 127, 104, 
185, 96, 10, 10, 144, 135, 31, 215, 19, 15, 193, 29, 90, 155, 117, 55, 129, 
146, 158, 37 }
Session ID:  {}
Cipher Suites: [SSL_RSA_WITH_RC4_128_MD5, SSL_RSA_WITH_RC4_128_SHA, 
TLS_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_CBC_SHA, 
TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, 
TLS_DHE_DSS_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_256_CBC_SHA, 
SSL_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, 
SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_DES_CBC_SHA, 
SSL_DHE_RSA_WITH_DES_CBC_SHA, SSL_DHE_DSS_WITH_DES_CBC_SHA, 
SSL_RSA_EXPORT_WITH_RC4_40_MD5, SSL_RSA_EXPORT_WITH_DES40_CBC_SHA, 
SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA, SSL_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA]
Compression Methods:  { 0 }
***
http-8080-Processor22, WRITE: TLSv1 Handshake, length = 79
http-8080-Processor22, WRITE: SSLv2 client hello message, length = 107
http-8080-Processor22, READ: TLSv1 Handshake, length = 2027
*** ServerHello, TLSv1
RandomCookie:  GMT: 76 bytes = { 47, 165, 19, 221, 87, 70, 210, 132, 119, 202, 
97, 193, 19, 205, 134, 244, 181, 99, 28, 99, 172, 255, 204, 192, 49, 82, 4, 7 }
Session ID:  {0, 0, 1, 3, 106, 113, 89, 150, 68, 243, 18, 1, 225, 101, 242, 
210, 143, 9, 97, 96, 88, 88, 88, 88, 76, 17, 229, 191, 0, 3, 43, 128}
Cipher Suite: TLS_RSA_WITH_AES_256_CBC_SHA
Compression Method: 0
***
%% Created:  [Session-4, TLS_RSA_WITH_AES_256_CBC_SHA]
** TLS_RSA_WITH_AES_256_CBC_SHA
*** Certificate chain
chain [0] = [
[
  Version: V3
  Subject: CN=mirservicetest.sanita.finanze.it, OU=Servizi Telematici, 
O=Agenzia delle Entrate, C=IT
  Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5
 
  Key:  Sun RSA public key, 1023 bits
  modulus: 
58207992710420207750306341772876389603043646650567371795967235712322346423503549326915715421891623384258577382194993219087301918801026781257870936291031003721277585602850707821853939387367161528386939215539622436694699622360337510018939676618884560670453071146414673877747429996056435558639567741356668366823
  public exponent: 65537
  Validity: [From: Tue May 12 11:22:09 CEST 2009,
               To: Fri Apr 13 01:59:00 CEST 2012]
  Issuer: CN=CA Agenzia delle Entrate, OU=Servizi Telematici, O=Agenzia delle 
Entrate, C=IT
  SerialNumber: [    0d0570]
 
Certificate Extensions: 4
[1]: ObjectId: 2.5.29.14 Criticality=false
SubjectKeyIdentifier [
KeyIdentifier [
0000: 7C 06 EB D0 34 48 DA D6   E5 50 BF 14 5B 62 F3 E5  ....4H...P..[b..
0010: AE 07 28 6F                                        ..(o
]
]
 
[2]: ObjectId: 2.5.29.35 Criticality=false
AuthorityKeyIdentifier [
KeyIdentifier [
0000: AD D7 15 73 5A 86 08 6B   8E 5A 7C 76 C3 DE 19 A5  ...sZ..k.Z.v....
0010: 6B 1B B3 8D                                        k...
]
 
]
 
[3]: ObjectId: 2.5.29.37 Criticality=false
ExtendedKeyUsages [
[1.3.6.1.5.5.7.3.1]]
 
[4]: ObjectId: 2.5.29.15 Criticality=true
KeyUsage [
  DigitalSignature
  Key_Encipherment
  Key_Agreement
]
 
]
  Algorithm: [SHA1withRSA]
  Signature:
0000: 34 58 C8 17 FA 61 0A E7   05 9B 66 2B 26 84 01 B0  4X...a....f+&...
0010: 35 E2 85 A8 AD AA 1B CA   90 0D E8 11 E1 DE 0A 22  5.............."
0020: 18 DB 50 7E 48 A7 20 FC   0D 1B F8 E3 3B 3D B0 90  ..P.H. .....;=..
0030: C0 28 D5 50 25 4A 61 F2   0E 26 40 C7 D5 92 8A E7  .(.P%Ja..&@.....
0040: EB BD 4D FD B0 EF 52 49   56 E1 94 45 B9 96 DB CE  ..M...RIV..E....
0050: 64 E0 C9 15 31 79 DD 3C   B3 29 F2 BE 6B 59 F3 02  d...1y.<.)..kY..
0060: C4 72 DE 61 31 CC 0C 89   05 AA 23 5F 93 44 0A CE  .r.a1.....#_.D..
0070: 9A 67 2A 0C C3 26 1C 15   4D 42 28 FE D7 3D 90 AB  .g*..&..MB(..=..
0080: 5C 21 32 95 8A E0 A8 47   94 C8 9B 28 ED E5 BB 00  \!2....G...(....
0090: D4 6C 56 1C 0F 27 92 AD   BC CF 01 B6 B9 80 84 FA  .lV..'..........
00A0: EC FB 0D AE 67 23 6D E4   8C 5D C7 40 F4 6B E8 79  ....g#m....@.k.y
00B0: 22 EA 80 12 93 41 B4 8F   A4 85 F6 5D 7B E8 DE 00  "....A.....]....
00C0: 19 54 D2 0B BA 93 8E 95   69 A3 BF 69 B2 2E 8A AF  .T......i..i....
00D0: AC A6 4A C8 4C 12 09 2E   61 2B 55 00 AF 41 9D 02  ..J.L...a+U..A..
00E0: E7 48 9B 39 3B F7 E5 75   AA 67 12 4B 0F 34 35 E5  .H.9;..u.g.K.45.
00F0: 80 9C 3D 52 05 02 7F 72   98 96 8C 13 E9 84 F8 DB  ..=R...r........
 
]
chain [1] = [
[
  Version: V3
  Subject: CN=CA Agenzia delle Entrate, OU=Servizi Telematici, O=Agenzia delle 
Entrate, C=IT
  Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5
 
  Key:  RSA Public Key
            modulus: 
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
    public exponent: 10001
 
  Validity: [From: Fri Apr 12 12:55:00 CEST 2002,
               To: Fri Apr 13 01:59:00 CEST 2012]
  Issuer: CN=CA Agenzia delle Entrate, OU=Servizi Telematici, O=Agenzia delle 
Entrate, C=IT
  SerialNumber: [    0a]
 
Certificate Extensions: 4
[1]: ObjectId: 2.5.29.14 Criticality=false
SubjectKeyIdentifier [
KeyIdentifier [
0000: AD D7 15 73 5A 86 08 6B   8E 5A 7C 76 C3 DE 19 A5  ...sZ..k.Z.v....
0010: 6B 1B B3 8D                                        k...
]
]
 
[2]: ObjectId: 2.5.29.31 Criticality=false
CRLDistributionPoints [
  [DistributionPoint:
     [URIName: 
ldap://cads.entrate.finanze.it/cn=CA%20Agenzia%20delle%20Entrate,ou=Servizi%20Telematici,o=Agenzia%20delle%20Entrate,c=it?authorityrevocationlist]
]]
 
[3]: ObjectId: 2.5.29.15 Criticality=true
KeyUsage [
  Key_CertSign
  Crl_Sign
]
 
[4]: ObjectId: 2.5.29.19 Criticality=true
BasicConstraints:[
CA:true
PathLen:3
]
 
]
  Algorithm: [SHA1withRSA]
  Signature:
0000: 8E C2 43 60 F5 5C AF CA   88 53 8D 15 0A F8 11 87  ..C`.\...S......
0010: 6F DF 40 5F 67 EA 37 37   AB 36 24 F1 82 66 0D F0  o...@_g.77.6$..f..
0020: 21 B3 B4 D5 F3 B1 BD AA   0B EA 69 29 63 F5 C4 40  !.........i)c..@
0030: A6 D8 ED 91 24 F6 B6 EA   55 E1 0A F3 CA 00 F0 D7  ....$...U.......
0040: 66 32 A7 B0 7F F2 AA 6A   3E 4C F2 9F CC 00 B8 2E  f2.....j>L......
0050: 77 8E 55 D5 A9 AC E3 7A   39 13 17 93 43 21 99 EE  w.U....z9...C!..
0060: 26 E4 96 03 8A FE AB 52   2B AA F7 41 A8 5C FB D1  &......R+..A.\..
0070: 1E E4 B5 5E E0 C4 74 01   A4 FC 56 6E 87 83 0E 78  ...^..t...Vn...x
0080: 3A AB 1E 13 1B C9 E8 67   2E A1 29 E6 79 3B E3 57  :......g..).y;.W
0090: 42 D2 9B 11 EC 5B 54 BF   A3 2B 1D 6A 21 9E 9A A1  B....[T..+.j!...
00A0: FC 2E 84 1B BB 5C 04 B1   B5 32 8D 48 E1 B9 2B 97  .....\...2.H..+.
00B0: 10 81 41 FB 62 DC 1A 54   CE 62 8F 61 07 4B 4B 7A  ..A.b..T.b.a.KKz
00C0: CA FB 04 46 D2 3F F9 7B   55 61 3E 38 30 63 74 77  ...F.?..Ua>80ctw
00D0: 60 54 54 D7 96 88 D6 77   85 F2 59 DA 1F 5E E7 9D  `TT....w..Y..^..
00E0: 5D 76 73 DD 8E 5E 98 9B   52 27 CD 66 CA 53 54 22  ]vs..^..R'.f.ST"
00F0: F2 46 E4 D6 7B 99 B1 28   80 BC 9A AB FB 00 3D 53  .F.....(......=S
 
]
***
Found trusted certificate:
[
[
  Version: V3
  Subject: CN=mirservicetest.sanita.finanze.it, OU=Servizi Telematici, 
O=Agenzia delle Entrate, C=IT
  Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5
 
  Key:  Sun RSA public key, 1023 bits
  modulus: 
58207992710420207750306341772876389603043646650567371795967235712322346423503549326915715421891623384258577382194993219087301918801026781257870936291031003721277585602850707821853939387367161528386939215539622436694699622360337510018939676618884560670453071146414673877747429996056435558639567741356668366823
  public exponent: 65537
  Validity: [From: Tue May 12 11:22:09 CEST 2009,
               To: Fri Apr 13 01:59:00 CEST 2012]
  Issuer: CN=CA Agenzia delle Entrate, OU=Servizi Telematici, O=Agenzia delle 
Entrate, C=IT
  SerialNumber: [    0d0570]
 
Certificate Extensions: 4
[1]: ObjectId: 2.5.29.14 Criticality=false
SubjectKeyIdentifier [
KeyIdentifier [
0000: 7C 06 EB D0 34 48 DA D6   E5 50 BF 14 5B 62 F3 E5  ....4H...P..[b..
0010: AE 07 28 6F                                        ..(o
]
]
 
[2]: ObjectId: 2.5.29.35 Criticality=false
AuthorityKeyIdentifier [
KeyIdentifier [
0000: AD D7 15 73 5A 86 08 6B   8E 5A 7C 76 C3 DE 19 A5  ...sZ..k.Z.v....
0010: 6B 1B B3 8D                                        k...
]
 
]
 
[3]: ObjectId: 2.5.29.37 Criticality=false
ExtendedKeyUsages [
[1.3.6.1.5.5.7.3.1]]
 
[4]: ObjectId: 2.5.29.15 Criticality=true
KeyUsage [
  DigitalSignature
  Key_Encipherment
  Key_Agreement
]
 
]
  Algorithm: [SHA1withRSA]
  Signature:
0000: 34 58 C8 17 FA 61 0A E7   05 9B 66 2B 26 84 01 B0  4X...a....f+&...
0010: 35 E2 85 A8 AD AA 1B CA   90 0D E8 11 E1 DE 0A 22  5.............."
0020: 18 DB 50 7E 48 A7 20 FC   0D 1B F8 E3 3B 3D B0 90  ..P.H. .....;=..
0030: C0 28 D5 50 25 4A 61 F2   0E 26 40 C7 D5 92 8A E7  .(.P%Ja..&@.....
0040: EB BD 4D FD B0 EF 52 49   56 E1 94 45 B9 96 DB CE  ..M...RIV..E....
0050: 64 E0 C9 15 31 79 DD 3C   B3 29 F2 BE 6B 59 F3 02  d...1y.<.)..kY..
0060: C4 72 DE 61 31 CC 0C 89   05 AA 23 5F 93 44 0A CE  .r.a1.....#_.D..
0070: 9A 67 2A 0C C3 26 1C 15   4D 42 28 FE D7 3D 90 AB  .g*..&..MB(..=..
0080: 5C 21 32 95 8A E0 A8 47   94 C8 9B 28 ED E5 BB 00  \!2....G...(....
0090: D4 6C 56 1C 0F 27 92 AD   BC CF 01 B6 B9 80 84 FA  .lV..'..........
00A0: EC FB 0D AE 67 23 6D E4   8C 5D C7 40 F4 6B E8 79  ....g#m....@.k.y
00B0: 22 EA 80 12 93 41 B4 8F   A4 85 F6 5D 7B E8 DE 00  "....A.....]....
00C0: 19 54 D2 0B BA 93 8E 95   69 A3 BF 69 B2 2E 8A AF  .T......i..i....
00D0: AC A6 4A C8 4C 12 09 2E   61 2B 55 00 AF 41 9D 02  ..J.L...a+U..A..
00E0: E7 48 9B 39 3B F7 E5 75   AA 67 12 4B 0F 34 35 E5  .H.9;..u.g.K.45.
00F0: 80 9C 3D 52 05 02 7F 72   98 96 8C 13 E9 84 F8 DB  ..=R...r........
 
]
*** ServerHelloDone
*** ClientKeyExchange, RSA PreMasterSecret, TLSv1
Random Secret:  { 3, 1, 170, 32, 63, 40, 86, 44, 44, 2, 170, 94, 214, 220, 221, 
5, 4, 66, 180, 129, 56, 92, 68, 208, 97, 144, 223, 187, 25, 152, 223, 157, 143, 
209, 250, 102, 73, 110, 106, 117, 177, 13, 51, 6, 86, 20, 133, 152 }
http-8080-Processor22, WRITE: TLSv1 Handshake, length = 134
SESSION KEYGEN:
PreMaster Secret:
0000: 03 01 AA 20 3F 28 56 2C   2C 02 AA 5E D6 DC DD 05  ... ?(V,,..^....
0010: 04 42 B4 81 38 5C 44 D0   61 90 DF BB 19 98 DF 9D  .B..8\D.a.......
0020: 8F D1 FA 66 49 6E 6A 75   B1 0D 33 06 56 14 85 98  ...fInju..3.V...
CONNECTION KEYGEN:
Client Nonce:
0000: 4C 11 E5 D3 B2 68 A5 D5   2A F2 7F 68 B9 60 0A 0A  L....h..*..h.`..
0010: 90 87 1F D7 13 0F C1 1D   5A 9B 75 37 81 92 9E 25  ........Z.u7...%
Server Nonce:
0000: 00 00 00 4C 2F A5 13 DD   57 46 D2 84 77 CA 61 C1  ...L/...WF..w.a.
0010: 13 CD 86 F4 B5 63 1C 63   AC FF CC C0 31 52 04 07  .....c.c....1R..
Master Secret:
0000: 1E 3A F2 07 A6 1D 2A A7   69 A0 E1 73 AE D2 62 C7  .:....*.i..s..b.
0010: 7E 39 BF 8C 77 1B FC FA   59 4E B3 3D FC DC 79 20  .9..w...YN.=..y
0020: 54 CF 57 40 43 D9 9E 26   C5 E2 A2 33 39 E9 DB FA  t...@c..&...39...
Client MAC write Secret:
0000: 79 BF 7C 37 C5 D1 F1 4E   01 C7 50 AE 7E 74 06 2B  y..7...N..P..t.+
0010: D3 C1 62 2B                                        ..b+
Server MAC write Secret:
0000: 4A 9C D2 58 64 E8 95 6A   6A B3 83 40 FC 7E 84 50  j..xd..j...@...p
0010: D0 BD F9 03                                        ....
Client write key:
0000: B7 30 D4 8D 4B B5 D0 B6   CD BF BE 81 98 2B D8 A2  .0..K........+..
0010: B7 19 7A F1 F1 C3 94 4C   D7 2F 85 5E C7 F7 7A 82  ..z....L./.^..z.
Server write key:
0000: 03 4A D5 97 7D 05 B3 89   06 81 88 2A B2 5F E2 C0  .J.........*._..
0010: 85 01 AD C6 D2 E8 C4 31   96 B6 14 5B 44 24 EF 6D  .......1...[D$.m
Client write IV:
0000: E5 DD CB 6C 34 A3 84 FC   E2 2E B5 3F BB 86 82 FB  ...l4......?....
Server write IV:
0000: 2A 51 EA D6 95 A5 CF 1B   C1 41 2E A9 05 8B 98 77  *Q.......A.....w
http-8080-Processor22, WRITE: TLSv1 Change Cipher Spec, length = 1
*** Finished
verify_data:  { 141, 52, 206, 162, 230, 168, 249, 71, 253, 89, 153, 146 }
***
http-8080-Processor22, WRITE: TLSv1 Handshake, length = 48
http-8080-Processor22, READ: TLSv1 Change Cipher Spec, length = 1
http-8080-Processor22, READ: TLSv1 Alert, length = 32
http-8080-Processor22, SEND TLSv1 ALERT:  fatal, description = bad_record_mac
http-8080-Processor22, WRITE: TLSv1 Alert, length = 32
http-8080-Processor22, called closeSocket()
http-8080-Processor22, handling exception: javax.net.ssl.SSLException: Invalid 
padding
ERROR - 2010-06-11 09:29:23,533 - Classe: it.insiel.pdd.wsadapters.PAAdapter - 
Metodo: inviaMessaggio - Descrizione: Errore durante l'invocazione del 
web-service 
https://mirservicetest.sanita.finanze.it/TrasmissioneCertificatiWeb/services/InterrogazioneLavoratore
 
; nested exception is:
 javax.net.ssl.SSLException: Invalid padding

INFO: [http-8080-Processor23] '/db/meta/Metas/archiviazione' Set object 
_META_DATA_
INFO - 2010-06-09 11:07:50,781 - Classe: 
xmlbean.porte.trattamentoMessaggio.TracciamentoXMLDB - Metodo: esegui - 
Descrizione: Tempo impiegato per espletare il servizio: 
xmlbean.porte.trattamentoMessaggio.TracciamentoXMLDB 41 millisecondi
WARN - 2010-06-09 11:07:50,801 - Classe: com.insiel.lz.eccezione.ErroreArchivio 
- Metodo: <init> - Descrizione: com.insiel.lz.eccezione.ErroreArchivio Name 
USE_DB is not bound in this Context
%% Client cached [Session-1, TLS_RSA_WITH_AES_256_CBC_SHA]
%% Try resuming [Session-1, TLS_RSA_WITH_AES_256_CBC_SHA] from port 37818
*** ClientHello, TLSv1
RandomCookie:  GMT: 1276074214 bytes = { 168, 203, 235, 6, 204, 234, 119, 65, 
206, 163, 173, 46, 150, 2, 116, 26, 83, 53, 111, 183, 155, 248, 212, 192, 153, 
160, 156, 214 }
Session ID:  {0, 0, 1, 5, 254, 82, 9, 192, 1, 37, 33, 164, 183, 223, 127, 19, 
196, 83, 12, 11, 88, 88, 88, 88, 76, 15, 84, 125, 0, 2, 211, 75}
Cipher Suites: [SSL_RSA_WITH_RC4_128_MD5, SSL_RSA_WITH_RC4_128_SHA, 
TLS_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_CBC_SHA, 
TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, 
TLS_DHE_DSS_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_256_CBC_SHA, 
SSL_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, 
SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_DES_CBC_SHA, 
SSL_DHE_RSA_WITH_DES_CBC_SHA, SSL_DHE_DSS_WITH_DES_CBC_SHA, 
SSL_RSA_EXPORT_WITH_RC4_40_MD5, SSL_RSA_EXPORT_WITH_DES40_CBC_SHA, 
SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA, SSL_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA]
Compression Methods:  { 0 }
***
http-8080-Processor22, WRITE: TLSv1 Handshake, length = 111
http-8080-Processor22, READ: TLSv1 Handshake, length = 2027
*** ServerHello, TLSv1
RandomCookie:  GMT: 76 bytes = { 93, 83, 105, 249, 126, 83, 191, 226, 22, 138, 
204, 119, 6, 24, 1, 193, 33, 167, 12, 174, 136, 241, 106, 184, 184, 68, 84, 240 
}
Session ID:  {0, 0, 1, 3, 123, 90, 140, 186, 246, 190, 175, 247, 241, 27, 13, 
68, 196, 163, 159, 186, 88, 88, 88, 88, 76, 15, 85, 90, 0, 2, 211, 78}
Cipher Suite: TLS_RSA_WITH_AES_256_CBC_SHA
Compression Method: 0
***
%% Created:  [Session-2, TLS_RSA_WITH_AES_256_CBC_SHA]
** TLS_RSA_WITH_AES_256_CBC_SHA
*** Certificate chain
chain [0] = [
[
  Version: V3
  Subject: CN=mirservicetest.sanita.finanze.it, OU=Servizi Telematici, 
O=Agenzia delle Entrate, C=IT
  Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5
 
  Key:  Sun RSA public key, 1023 bits
  modulus: 
58207992710420207750306341772876389603043646650567371795967235712322346423503549326915715421891623384258577382194993219087301918801026781257870936291031003721277585602850707821853939387367161528386939215539622436694699622360337510018939676618884560670453071146414673877747429996056435558639567741356668366823
  public exponent: 65537
  Validity: [From: Tue May 12 11:22:09 CEST 2009,
               To: Fri Apr 13 01:59:00 CEST 2012]
  Issuer: CN=CA Agenzia delle Entrate, OU=Servizi Telematici, O=Agenzia delle 
Entrate, C=IT
  SerialNumber: [    0d0570]
 
Certificate Extensions: 4
[1]: ObjectId: 2.5.29.14 Criticality=false
SubjectKeyIdentifier [
KeyIdentifier [
0000: 7C 06 EB D0 34 48 DA D6   E5 50 BF 14 5B 62 F3 E5  ....4H...P..[b..
0010: AE 07 28 6F                                        ..(o
]
]
 
[2]: ObjectId: 2.5.29.35 Criticality=false
AuthorityKeyIdentifier [
KeyIdentifier [
0000: AD D7 15 73 5A 86 08 6B   8E 5A 7C 76 C3 DE 19 A5  ...sZ..k.Z.v....
0010: 6B 1B B3 8D                                        k...
]
 
]
 
[3]: ObjectId: 2.5.29.37 Criticality=false
ExtendedKeyUsages [
[1.3.6.1.5.5.7.3.1]]
 
[4]: ObjectId: 2.5.29.15 Criticality=true
KeyUsage [
  DigitalSignature
  Key_Encipherment
  Key_Agreement
]
 
]
  Algorithm: [SHA1withRSA]
  Signature:
0000: 34 58 C8 17 FA 61 0A E7   05 9B 66 2B 26 84 01 B0  4X...a....f+&...
0010: 35 E2 85 A8 AD AA 1B CA   90 0D E8 11 E1 DE 0A 22  5.............."
0020: 18 DB 50 7E 48 A7 20 FC   0D 1B F8 E3 3B 3D B0 90  ..P.H. .....;=..
0030: C0 28 D5 50 25 4A 61 F2   0E 26 40 C7 D5 92 8A E7  .(.P%Ja..&@.....
0040: EB BD 4D FD B0 EF 52 49   56 E1 94 45 B9 96 DB CE  ..M...RIV..E....
0050: 64 E0 C9 15 31 79 DD 3C   B3 29 F2 BE 6B 59 F3 02  d...1y.<.)..kY..
0060: C4 72 DE 61 31 CC 0C 89   05 AA 23 5F 93 44 0A CE  .r.a1.....#_.D..
0070: 9A 67 2A 0C C3 26 1C 15   4D 42 28 FE D7 3D 90 AB  .g*..&..MB(..=..
0080: 5C 21 32 95 8A E0 A8 47   94 C8 9B 28 ED E5 BB 00  \!2....G...(....
0090: D4 6C 56 1C 0F 27 92 AD   BC CF 01 B6 B9 80 84 FA  .lV..'..........
00A0: EC FB 0D AE 67 23 6D E4   8C 5D C7 40 F4 6B E8 79  ....g#m....@.k.y
00B0: 22 EA 80 12 93 41 B4 8F   A4 85 F6 5D 7B E8 DE 00  "....A.....]....
00C0: 19 54 D2 0B BA 93 8E 95   69 A3 BF 69 B2 2E 8A AF  .T......i..i....
00D0: AC A6 4A C8 4C 12 09 2E   61 2B 55 00 AF 41 9D 02  ..J.L...a+U..A..
00E0: E7 48 9B 39 3B F7 E5 75   AA 67 12 4B 0F 34 35 E5  .H.9;..u.g.K.45.
00F0: 80 9C 3D 52 05 02 7F 72   98 96 8C 13 E9 84 F8 DB  ..=R...r........
 
]
chain [1] = [
[
  Version: V3
  Subject: CN=CA Agenzia delle Entrate, OU=Servizi Telematici, O=Agenzia delle 
Entrate, C=IT
  Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5
 
  Key:  Sun RSA public key, 2048 bits
  modulus: 
21241180317658157476866023163641979929287363731960234213504967795002581195227629875138076668625983195643435125373848489944742613626967136322255991625051376415564886907523802930378222173688776500340465177545344756956192564173803098196055852474708548547066144268051150796967966466406157880992325994373226945323192952041127655395296822615276899994781530232224832962565838481334196205651705856512396628218792467096345270196425688936310429391608421614758184530841624420136087884667767581829982864006636593656366634304615094546985383979577327720559806452888250116605792967352609994157918700240122717464742140528678911444919
  public exponent: 65537
  Validity: [From: Fri Apr 12 12:55:00 CEST 2002,
               To: Fri Apr 13 01:59:00 CEST 2012]
  Issuer: CN=CA Agenzia delle Entrate, OU=Servizi Telematici, O=Agenzia delle 
Entrate, C=IT
  SerialNumber: [    0a]
 
Certificate Extensions: 4
[1]: ObjectId: 2.5.29.14 Criticality=false
SubjectKeyIdentifier [
KeyIdentifier [
0000: AD D7 15 73 5A 86 08 6B   8E 5A 7C 76 C3 DE 19 A5  ...sZ..k.Z.v....
0010: 6B 1B B3 8D                                        k...
]
]
 
[2]: ObjectId: 2.5.29.31 Criticality=false
CRLDistributionPoints [
  [DistributionPoint:
     [URIName: 
ldap://cads.entrate.finanze.it/cn=CA%20Agenzia%20delle%20Entrate,ou=Servizi%20Telematici,o=Agenzia%20delle%20Entrate,c=it?authorityrevocationlist]
]]
 
[3]: ObjectId: 2.5.29.15 Criticality=true
KeyUsage [
  Key_CertSign
  Crl_Sign
]
 
[4]: ObjectId: 2.5.29.19 Criticality=true
BasicConstraints:[
CA:true
PathLen:3
]
 
]
  Algorithm: [SHA1withRSA]
  Signature:
0000: 8E C2 43 60 F5 5C AF CA   88 53 8D 15 0A F8 11 87  ..C`.\...S......
0010: 6F DF 40 5F 67 EA 37 37   AB 36 24 F1 82 66 0D F0  o...@_g.77.6$..f..
0020: 21 B3 B4 D5 F3 B1 BD AA   0B EA 69 29 63 F5 C4 40  !.........i)c..@
0030: A6 D8 ED 91 24 F6 B6 EA   55 E1 0A F3 CA 00 F0 D7  ....$...U.......
0040: 66 32 A7 B0 7F F2 AA 6A   3E 4C F2 9F CC 00 B8 2E  f2.....j>L......
0050: 77 8E 55 D5 A9 AC E3 7A   39 13 17 93 43 21 99 EE  w.U....z9...C!..
0060: 26 E4 96 03 8A FE AB 52   2B AA F7 41 A8 5C FB D1  &......R+..A.\..
0070: 1E E4 B5 5E E0 C4 74 01   A4 FC 56 6E 87 83 0E 78  ...^..t...Vn...x
0080: 3A AB 1E 13 1B C9 E8 67   2E A1 29 E6 79 3B E3 57  :......g..).y;.W
0090: 42 D2 9B 11 EC 5B 54 BF   A3 2B 1D 6A 21 9E 9A A1  B....[T..+.j!...
00A0: FC 2E 84 1B BB 5C 04 B1   B5 32 8D 48 E1 B9 2B 97  .....\...2.H..+.
00B0: 10 81 41 FB 62 DC 1A 54   CE 62 8F 61 07 4B 4B 7A  ..A.b..T.b.a.KKz
00C0: CA FB 04 46 D2 3F F9 7B   55 61 3E 38 30 63 74 77  ...F.?..Ua>80ctw
00D0: 60 54 54 D7 96 88 D6 77   85 F2 59 DA 1F 5E E7 9D  `TT....w..Y..^..
00E0: 5D 76 73 DD 8E 5E 98 9B   52 27 CD 66 CA 53 54 22  ]vs..^..R'.f.ST"
00F0: F2 46 E4 D6 7B 99 B1 28   80 BC 9A AB FB 00 3D 53  .F.....(......=S
 
]
***
Found trusted certificate:
[
[
  Version: V3
  Subject: CN=mirservicetest.sanita.finanze.it, OU=Servizi Telematici, 
O=Agenzia delle Entrate, C=IT
  Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5
 
  Key:  Sun RSA public key, 1023 bits
  modulus: 
58207992710420207750306341772876389603043646650567371795967235712322346423503549326915715421891623384258577382194993219087301918801026781257870936291031003721277585602850707821853939387367161528386939215539622436694699622360337510018939676618884560670453071146414673877747429996056435558639567741356668366823
  public exponent: 65537
  Validity: [From: Tue May 12 11:22:09 CEST 2009,
               To: Fri Apr 13 01:59:00 CEST 2012]
  Issuer: CN=CA Agenzia delle Entrate, OU=Servizi Telematici, O=Agenzia delle 
Entrate, C=IT
  SerialNumber: [    0d0570]
 
Certificate Extensions: 4
[1]: ObjectId: 2.5.29.14 Criticality=false
SubjectKeyIdentifier [
KeyIdentifier [
0000: 7C 06 EB D0 34 48 DA D6   E5 50 BF 14 5B 62 F3 E5  ....4H...P..[b..
0010: AE 07 28 6F                                        ..(o
]
]
 
[2]: ObjectId: 2.5.29.35 Criticality=false
AuthorityKeyIdentifier [
KeyIdentifier [
0000: AD D7 15 73 5A 86 08 6B   8E 5A 7C 76 C3 DE 19 A5  ...sZ..k.Z.v....
0010: 6B 1B B3 8D                                        k...
]
 
]
 
[3]: ObjectId: 2.5.29.37 Criticality=false
ExtendedKeyUsages [
[1.3.6.1.5.5.7.3.1]]
 
[4]: ObjectId: 2.5.29.15 Criticality=true
KeyUsage [
  DigitalSignature
  Key_Encipherment
  Key_Agreement
]
 
]
  Algorithm: [SHA1withRSA]
  Signature:
0000: 34 58 C8 17 FA 61 0A E7   05 9B 66 2B 26 84 01 B0  4X...a....f+&...
0010: 35 E2 85 A8 AD AA 1B CA   90 0D E8 11 E1 DE 0A 22  5.............."
0020: 18 DB 50 7E 48 A7 20 FC   0D 1B F8 E3 3B 3D B0 90  ..P.H. .....;=..
0030: C0 28 D5 50 25 4A 61 F2   0E 26 40 C7 D5 92 8A E7  .(.P%Ja..&@.....
0040: EB BD 4D FD B0 EF 52 49   56 E1 94 45 B9 96 DB CE  ..M...RIV..E....
0050: 64 E0 C9 15 31 79 DD 3C   B3 29 F2 BE 6B 59 F3 02  d...1y.<.)..kY..
0060: C4 72 DE 61 31 CC 0C 89   05 AA 23 5F 93 44 0A CE  .r.a1.....#_.D..
0070: 9A 67 2A 0C C3 26 1C 15   4D 42 28 FE D7 3D 90 AB  .g*..&..MB(..=..
0080: 5C 21 32 95 8A E0 A8 47   94 C8 9B 28 ED E5 BB 00  \!2....G...(....
0090: D4 6C 56 1C 0F 27 92 AD   BC CF 01 B6 B9 80 84 FA  .lV..'..........
00A0: EC FB 0D AE 67 23 6D E4   8C 5D C7 40 F4 6B E8 79  ....g#m....@.k.y
00B0: 22 EA 80 12 93 41 B4 8F   A4 85 F6 5D 7B E8 DE 00  "....A.....]....
00C0: 19 54 D2 0B BA 93 8E 95   69 A3 BF 69 B2 2E 8A AF  .T......i..i....
00D0: AC A6 4A C8 4C 12 09 2E   61 2B 55 00 AF 41 9D 02  ..J.L...a+U..A..
00E0: E7 48 9B 39 3B F7 E5 75   AA 67 12 4B 0F 34 35 E5  .H.9;..u.g.K.45.
00F0: 80 9C 3D 52 05 02 7F 72   98 96 8C 13 E9 84 F8 DB  ..=R...r........
 
]
*** ServerHelloDone
*** ClientKeyExchange, RSA PreMasterSecret, TLSv1
Random Secret:  { 3, 1, 28, 18, 189, 33, 12, 73, 42, 26, 76, 219, 168, 14, 33, 
170, 139, 169, 9, 156, 182, 147, 43, 162, 205, 220, 42, 249, 245, 45, 66, 195, 
163, 183, 234, 88, 166, 165, 5, 202, 84, 60, 141, 11, 187, 164, 23, 146 }
http-8080-Processor22, WRITE: TLSv1 Handshake, length = 134
SESSION KEYGEN:
PreMaster Secret:
0000: 03 01 1C 12 BD 21 0C 49   2A 1A 4C DB A8 0E 21 AA  .....!.I*.L...!.
0010: 8B A9 09 9C B6 93 2B A2   CD DC 2A F9 F5 2D 42 C3  ......+...*..-B.
0020: A3 B7 EA 58 A6 A5 05 CA   54 3C 8D 0B BB A4 17 92  ...X....T<......
CONNECTION KEYGEN:
Client Nonce:
0000: 4C 0F 59 E6 A8 CB EB 06   CC EA 77 41 CE A3 AD 2E  L.Y.......wA....
0010: 96 02 74 1A 53 35 6F B7   9B F8 D4 C0 99 A0 9C D6  ..t.S5o.........
Server Nonce:
0000: 00 00 00 4C 5D 53 69 F9   7E 53 BF E2 16 8A CC 77  ...L]Si..S.....w
0010: 06 18 01 C1 21 A7 0C AE   88 F1 6A B8 B8 44 54 F0  ....!.....j..DT.
Master Secret:
0000: 1E 52 F4 7F 27 B6 6D DA   69 20 D4 E2 9A A0 D7 D5  .R..'.m.i ......
0010: 24 13 95 81 97 84 5C B5   D5 CD EE 54 A2 2D A2 9C  $.....\....T.-..
0020: 51 18 C1 07 4F 26 8C 25   2A 72 85 0C 1E F9 78 09  Q...O&.%*r....x.
Client MAC write Secret:
0000: 36 71 6C F5 C0 FE 08 F1   87 DC 74 28 44 66 F8 1A  6ql.......t(Df..
0010: 60 8F 92 10                                        `...
Server MAC write Secret:
0000: E0 71 19 BC 19 1B F6 D3   D0 07 26 AA 60 A3 3E BD  .q........&.`.>.
0010: 92 9E CE EE                                        ....
Client write key:
0000: 54 FD 1D 44 B0 CD D1 3F   17 78 19 A0 96 35 95 A9  T..D...?.x...5..
0010: 49 46 36 8C 16 FD EA DF   C7 22 3F 9E 7B 5F A0 4E  IF6......"?.._.N
Server write key:
0000: FD 82 38 EC 7F D5 51 61   B9 7B 29 44 EB 32 90 74  ..8...Qa..)D.2.t
0010: F2 E1 93 59 63 EE F6 0A   6D D6 59 56 2D 70 2C 61  ...Yc...m.YV-p,a
Client write IV:
0000: BE 92 DF 59 69 5B A8 1A   81 7B 19 E1 12 E3 19 7C  ...Yi[..........
Server write IV:
0000: DB 39 9B 14 96 8B 51 BA   B8 AD 98 CB 17 1F 99 8A  .9....Q.........
http-8080-Processor22, WRITE: TLSv1 Change Cipher Spec, length = 1
*** Finished
verify_data:  { 54, 243, 109, 58, 233, 10, 24, 69, 42, 50, 227, 129 }
***
http-8080-Processor22, WRITE: TLSv1 Handshake, length = 48
http-8080-Processor22, READ: TLSv1 Change Cipher Spec, length = 1
http-8080-Processor22, READ: TLSv1 Handshake, length = 48
*** Finished
verify_data:  { 140, 166, 217, 87, 167, 121, 11, 35, 133, 188, 111, 208 }
***
%% Cached client session: [Session-2, TLS_RSA_WITH_AES_256_CBC_SHA]
http-8080-Processor22, setSoTimeout(600000) called
http-8080-Processor22, WRITE: TLSv1 Application Data, length = 1008
9-giu-2010 11.07.51 org.apache.xindice.core.DatabaseChangeObserver$FlushTask run
INFO: Successfully flushed 2 collections out of 2
http-8080-Processor22, READ: TLSv1 Application Data, length = 992
http-8080-Processor22, READ: TLSv1 Application Data, length = 592
http-8080-Processor22, received EOFException: ignored
http-8080-Processor22, called closeInternal(false)
http-8080-Processor22, SEND TLSv1 ALERT:  warning, description = close_notify
http-8080-Processor22, WRITE: TLSv1 Alert, length = 32
http-8080-Processor22, called close()
http-8080-Processor22, called closeInternal(true)
http-8080-Processor22, called close()
http-8080-Processor22, called closeInternal(true)
INFO - 2010-06-09 11:08:37,427 - Classe: 
it.insiel.pdd.wsadapters.PAAdapterWrapper - Metodo: applicaSincrono - 
Descrizione: Tempo impiegato per espletare il servizio: 
it.insiel.pdd.wsadapters.PAAdapterWrapper 46644 millisecondi
INFO - 2010-06-09 11:08:37,438 - Classe: 
xmlbean.porte.trattamentoMessaggio.TracciamentoXMLDB - Metodo: esegui - 
Descrizione: Inizio Servizio 
xmlbean.porte.trattamentoMessaggio.TracciamentoXMLDB
---------------------------------------------------------------------
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org

Reply via email to