Service Virtualization

Expand all | Collapse all

java.net.SocketException: Software caused connection abort: socket write error

Jump to Best Answer
  • 1.  java.net.SocketException: Software caused connection abort: socket write error

    Posted 03-08-2018 03:42 AM

     #devtest10.2 #cadevtest10.2

    I

    am getting below error executing REST Step. SSL Debug logs attached. added https.protocols=SSLv3,TLSv1,TLSv1.1,TLSv1.2 in local.properties

     

    ============================================================================ | HTTP ============================================================================ | Step: ACN Alias Resolution Alpha 8 chars ---------------------------------------------------------------------------- | Message: java.net.SocketException: Software caused connection abort: socket write error ---------------------------------------------------------------------------- | Trapped Exception: Software caused connection abort: socket write error | Trapped Message: java.net.SocketException: Software caused connection abort: socket write error ---------------------------------------------------------------------------- STACK TRACE java.net.SocketException: Software caused connection abort: socket write error at java.net.SocketOutputStream.socketWrite0(Native Method) at java.net.SocketOutputStream.socketWrite(SocketOutputStream.java:109) at java.net.SocketOutputStream.write(SocketOutputStream.java:153) at sun.security.ssl.OutputRecord.writeBuffer(OutputRecord.java:431) at sun.security.ssl.OutputRecord.write(OutputRecord.java:417) at sun.security.ssl.SSLSocketImpl.writeRecordInternal(SSLSocketImpl.java:876) at sun.security.ssl.SSLSocketImpl.writeRecord(SSLSocketImpl.java:847) at sun.security.ssl.SSLSocketImpl.writeRecord(SSLSocketImpl.java:717) at sun.security.ssl.Handshaker.sendChangeCipherSpec(Handshaker.java:1077) at sun.security.ssl.ClientHandshaker.sendChangeCipherAndFinish(ClientHandshaker.java:1222) at sun.security.ssl.ClientHandshaker.serverHelloDone(ClientHandshaker.java:1134) at sun.security.ssl.ClientHandshaker.processMessage(ClientHandshaker.java:348) at sun.security.ssl.Handshaker.processLoop(Handshaker.java:979) at sun.security.ssl.Handshaker.process_record(Handshaker.java:914) at sun.security.ssl.SSLSocketImpl.readRecord(SSLSocketImpl.java:1062) at sun.security.ssl.SSLSocketImpl.performInitialHandshake(SSLSocketImpl.java:1375) at sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:1403) at sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:1387) at org.apache.http.conn.ssl.SSLSocketFactory.connectSocket(SSLSocketFactory.java:535) at org.apache.http.conn.ssl.SSLSocketFactory.connectSocket(SSLSocketFactory.java:403) at org.apache.http.impl.conn.DefaultClientConnectionOperator.openConnection(DefaultClientConnectionOperator.java:177) at org.apache.http.impl.conn.ManagedClientConnectionImpl.open(ManagedClientConnectionImpl.java:304) at org.apache.http.impl.client.DefaultRequestDirector.tryConnect(DefaultRequestDirector.java:611) at org.apache.http.impl.client.DefaultRequestDirector.execute(DefaultRequestDirector.java:446) at org.apache.http.impl.client.AbstractHttpClient.doExecute(AbstractHttpClient.java:863) at org.apache.http.impl.client.CloseableHttpClient.execute(CloseableHttpClient.java:72) at com.itko.lisa.test.CommTrans.doSend(CommTrans.java:1074) at com.itko.lisa.test.CommTrans.send(CommTrans.java:843) at com.itko.lisa.test.CommTrans.sendPOST(CommTrans.java:803) at com.itko.lisa.ws.rest.RESTNode.doSend(RESTNode.java:226) at com.itko.lisa.ws.rest.RESTNode.doWebTrans(RESTNode.java:171) at com.itko.lisa.ws.rest.RESTNodeBase.execute(RESTNodeBase.java:380) at com.itko.lisa.test.TestNode.executeNode(TestNode.java:984) at com.itko.lisa.test.TestCase.execute(TestCase.java:1297) at com.itko.lisa.test.TestCase.execute(TestCase.java:1198) at com.itko.lisa.test.TestCase.executeNextNode(TestCase.java:1183) at com.itko.lisa.editor.WalkThruPanel.prepAndExecNode(WalkThruPanel.java:1085) at com.itko.lisa.editor.WalkThruPanel.access$900(WalkThruPanel.java:72) at com.itko.lisa.editor.WalkThruPanel$10.doCallback(WalkThruPanel.java:992) at com.itko.util.swing.panels.ProcessingDialog$2.run(ProcessingDialog.java:194) at java.lang.Thread.run(Thread.java:745) ============================================================================

     

     

     

    SSL Details

    [ 2] ***
    [ 2] found key for : lisa
    [ 2] chain [0] = [
    [ 2] [
    [ 2] Version: V3
    [ 2] Subject: CN=Lisa, OU=Lisa, O=Lisa, L=Dallas, ST=Texas, C=US, EMAILADDRESS=support@itko.com
    [ 2] Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5
    [ 2]
    [ 2] Key: Sun RSA public key, 1024 bits
    [ 2] modulus: 107577342571485428802393728049184265786056348388364405824138117397977455761833138845329880593678805610027793821217939298848284286683543926634250841496293888229172692948746730869670908754188073542091973621265074265583182385560072567366227383567380577316296862528343858318946945517967854106447414857653511333997
    [ 2] public exponent: 65537
    [ 2] Validity: [From: Sat Aug 21 00:07:30 AWST 2010,
    [ 2] To: Wed Jan 06 00:07:30 AWST 2038]
    [ 2] Issuer: CN=Lisa, OU=Lisa, O=Lisa, L=Dallas, ST=Texas, C=US, EMAILADDRESS=support@itko.com
    [ 2] SerialNumber: [ 4c6ea842]
    [ 2]
    [ 2] ]
    [ 2] Algorithm: [SHA1withRSA]
    [ 2] Signature:
    [ 2] 0000: 2B 7F 77 08 DE 2F 74 E3 CD 0F 58 D8 57 D9 08 2E +.w../t...X.W...
    [ 2] 0010: AC 57 A7 02 81 07 B7 F8 5B 68 AE 22 22 C6 75 EE .W......[h."".u.
    [ 2] 0020: C2 41 B6 23 DE ED 17 F8 21 AE 3B ED B6 EA 1A 17 .A.#....!.;.....
    [ 2] 0030: A4 5F 95 FD BE AE 74 DA 75 64 19 D6 60 0A 63 61 ._....t.ud..`.ca
    [ 2] 0040: B6 2A E1 FB 06 C5 36 E5 00 0C EB 20 EF FA 82 29 .*....6.... ...)
    [ 2] 0050: 40 39 EA 61 3A 27 CF 4F 00 18 33 E8 31 4C E4 C5 @9.a:'.O..3.1L..
    [ 2] 0060: 44 98 60 15 80 FE 85 FB BF BD 95 AB 35 14 F7 16 D.`.........5...
    [ 2] 0070: 9D 58 F5 26 10 B7 76 7D 43 20 A7 4B F4 ED EE CF .X.&..v.C .K....
    [ 2]
    [ 2] ]
    [ 2] ***
    [ 2] X509KeyManager passed to SSLContext.init(): need an X509ExtendedKeyManager for SSLEngine use
    [ 2] trigger seeding of SecureRandom
    [ 2] done seeding SecureRandom
    [ 2] ProcDlgThreadCallbk@2ce54912, setSoTimeout(180000) called
    [ 2] Allow unsafe renegotiation: false
    [ 2] Allow legacy hello messages: true
    [ 2] Is initial handshake: true
    [ 2] Is secure renegotiation: false
    [ 2] Ignoring disabled protocol: SSLv3
    [ 2] Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1
    [ 2] Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLSv1
    [ 2] Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 for TLSv1
    [ 2] Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1
    [ 2] Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 for TLSv1
    [ 2] Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1
    [ 2] Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1
    [ 2] Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1.1
    [ 2] Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLSv1.1
    [ 2] Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1
    [ 2] Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1.1
    [ 2] Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 for TLSv1.1
    [ 2] Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1
    [ 2] Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1.1
    [ 2] %% No cached client session
    [ 2] *** ClientHello, TLSv1.2
    [ 2] RandomCookie: GMT: 1503655121 bytes = { 182, 34, 87, 49, 177, 182, 206, 121, 132, 176, 148, 236, 120, 122, 5, 206, 54, 37, 65, 176, 147, 9, 138, 136, 65, 175, 133, 76 }
    [ 2] Session ID: {}
    [ 2] Cipher Suites: [TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384, TLS_RSA_WITH_AES_256_CBC_SHA256, TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384, TLS_DHE_RSA_WITH_AES_256_CBC_SHA256, TLS_DHE_DSS_WITH_AES_256_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDH_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_DSS_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256, TLS_RSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_DSS_WITH_AES_128_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, TLS_RSA_WITH_AES_256_GCM_SHA384, TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, TLS_DHE_DSS_WITH_AES_256_GCM_SHA384, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_DSS_WITH_AES_128_GCM_SHA256, TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA, TLS_EMPTY_RENEGOTIATION_INFO_SCSV, TLS_DH_anon_WITH_AES_256_GCM_SHA384, TLS_DH_anon_WITH_AES_128_GCM_SHA256, TLS_DH_anon_WITH_AES_256_CBC_SHA256, TLS_ECDH_anon_WITH_AES_256_CBC_SHA, TLS_DH_anon_WITH_AES_256_CBC_SHA, TLS_DH_anon_WITH_
    [ 2] AES_128_CBC_SHA256, TLS_ECDH_anon_WITH_AES_128_CBC_SHA, TLS_DH_anon_WITH_AES_128_CBC_SHA, TLS_ECDH_anon_WITH_3DES_EDE_CBC_SHA, SSL_DH_anon_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_DES_CBC_SHA, SSL_DHE_RSA_WITH_DES_CBC_SHA, SSL_DHE_DSS_WITH_DES_CBC_SHA, SSL_DH_anon_WITH_DES_CBC_SHA, SSL_RSA_EXPORT_WITH_DES40_CBC_SHA, SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA, SSL_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA, SSL_DH_anon_EXPORT_WITH_DES40_CBC_SHA, TLS_RSA_WITH_NULL_SHA256, TLS_ECDHE_ECDSA_WITH_NULL_SHA, TLS_ECDHE_RSA_WITH_NULL_SHA, SSL_RSA_WITH_NULL_SHA, TLS_ECDH_ECDSA_WITH_NULL_SHA, TLS_ECDH_RSA_WITH_NULL_SHA, TLS_ECDH_anon_WITH_NULL_SHA, SSL_RSA_WITH_NULL_MD5, TLS_KRB5_WITH_3DES_EDE_CBC_SHA, TLS_KRB5_WITH_3DES_EDE_CBC_MD5, TLS_KRB5_WITH_DES_CBC_SHA, TLS_KRB5_WITH_DES_CBC_MD5, TLS_KRB5_EXPORT_WITH_DES_CBC_40_SHA, TLS_KRB5_EXPORT_WITH_DES_CBC_40_MD5]
    [ 2] Compression Methods: { 0 }
    [ 2] Extension elliptic_curves, curve names: {secp256r1, sect163k1, sect163r2, secp192r1, secp224r1, sect233k1, sect233r1, sect283k1, sect283r1, secp384r1, sect409k1, sect409r1, secp521r1, sect571k1, sect571r1, secp160k1, secp160r1, secp160r2, sect163r1, secp192k1, sect193r1, sect193r2, secp224k1, sect239k1, secp256k1}
    [ 2] Extension ec_point_formats, formats: [uncompressed]
    [ 2] Extension signature_algorithms, signature_algorithms: SHA512withECDSA, SHA512withRSA, SHA384withECDSA, SHA384withRSA, SHA256withECDSA, SHA256withRSA, SHA256withDSA, SHA1withECDSA, SHA1withRSA, SHA1withDSA
    [ 2] ***
    [ 2] ProcDlgThreadCallbk@2ce54912, WRITE: TLSv1.2 Handshake, length = 297
    [ 2] ProcDlgThreadCallbk@2ce54912, READ: TLSv1 Handshake, length = 2348
    [ 2] *** ServerHello, TLSv1
    [ 2] RandomCookie: GMT: 1503655122 bytes = { 30, 87, 93, 224, 238, 2, 53, 58, 134, 29, 113, 64, 215, 152, 71, 11, 120, 166, 32, 144, 235, 93, 239, 135, 180, 127, 210, 47 }
    [ 2] Session ID: {90, 160, 245, 210, 64, 79, 80, 26, 251, 232, 115, 26, 70, 8, 242, 147, 230, 9, 88, 52, 127, 41, 146, 239, 163, 65, 85, 106, 49, 91, 56, 214}
    [ 2] Cipher Suite: TLS_RSA_WITH_AES_256_CBC_SHA
    [ 2] Compression Method: 0
    [ 2] Extension renegotiation_info, renegotiated_connection:
    [ 2] ***
    [ 2] %% Initialized: [Session-5, TLS_RSA_WITH_AES_256_CBC_SHA]
    [ 2] ** TLS_RSA_WITH_AES_256_CBC_SHA
    [ 2] *** Certificate chain
    [ 2] chain [0] = [
    [ 2] [
    [ 2] Version: V3
    [ 2] Subject: EMAILADDRESS=duty.sysprog@bankwest.com.au, CN=bbbb.mps2.bankwest.com, OU=BWA Group Services Pty Ltd, O=Commonwealth Bank of Australia, L=Perth, ST=WA, C=AU
    [ 2] Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5
    [ 2]
    [ 2] Key: Sun RSA public key, 2048 bits
    [ 2] modulus: 26440769111413576055346839927364392822027480382790481478154498185491321589829289662408844753951890388938985607312352111414251608577990009729445664992742403913155746840181967655356518558322629282182583615689380822595800210339328637885490480860545027038715111210571037622416127220560351150048294136574846346365791587173066371523198548147310260273352942815933864283398318401632092577707597452700338537719827614956958594507443530072095300695973883457133934160204107666396622875131539050578776316876089050918544752977206314745801342895873881627784166265682182434552424151460241666993656198380889999487666985386934137244429
    [ 2] public exponent: 65537
    [ 2] Validity: [From: Wed May 20 09:24:59 AWST 2015,
    [ 2] To: Sat May 19 09:24:59 AWST 2018]
    [ 2] Issuer: CN=Bankwest Web Enrolment CA, O=Bank of Western Australia Ltd, C=AU
    [ 2] SerialNumber: [ 6f1973df 00000000 03d5]
    [ 2]
    [ 2] Certificate Extensions: 9
    [ 2] [1]: ObjectId: 1.3.6.1.4.1.311.21.10 Criticality=false
    [ 2] Extension unknown: DER encoded OCTET string =
    [ 2] 0000: 04 1A 30 18 30 0A 06 08 2B 06 01 05 05 07 03 02 ..0.0...+.......
    [ 2] 0010: 30 0A 06 08 2B 06 01 05 05 07 03 01 0...+.......
    [ 2]
    [ 2]
    [ 2] [2]: ObjectId: 1.3.6.1.4.1.311.21.7 Criticality=false
    [ 2] Extension unknown: DER encoded OCTET string =
    [ 2] 0000: 04 30 30 2E 06 26 2B 06 01 04 01 82 37 15 08 83 .00..&+.....7...
    [ 2] 0010: CF D4 7B 81 B8 CB 6E 82 AD 99 1A 85 F2 EB 54 84 ......n.......T.
    [ 2] 0020: 93 E1 4B 18 86 F4 9F 7C 81 AF B9 71 02 01 64 02 ..K........q..d.
    [ 2] 0030: 01 0A ..
    [ 2]
    [ 2]
    [ 2] [3]: ObjectId: 1.3.6.1.5.5.7.1.1 Criticality=false
    [ 2] AuthorityInfoAccess [
    [ 2] [
    [ 2] accessMethod: caIssuers
    [ 2] accessLocation: URIName: ldap:///CN=Bankwest%20Web%20Enrolment%20CA,CN=AIA,CN=Public%20Key%20Services
    [ 2] ,CN=Services,CN=Configuration,DC=rtdomau,DC=local?cACertificate?base?objectClass=certificationAuthority
    [ 2] ,
    [ 2] accessMethod: caIssuers
    [ 2] accessLocation: URIName: http://cdp.rtdomau.local/CertData/CBDCERT004.rtdomau.local_Bankwest%20Web%20Enrolment%20CA.crt
    [ 2] ,
    [ 2] accessMethod: caIssuers
    [ 2] accessLocation: URIName: http://cbdcert004.rtdomau.local/CertEnroll/CBDCERT004.rtdomau.local_Bankwest%20Web%20Enrolment%20CA.crt
    [ 2] ]
    [ 2] ]
    [ 2]
    [ 2] [4]: ObjectId: 2.5.29.35 Criticality=false
    [ 2] AuthorityKeyIdentifier [
    [ 2] KeyIdentifier [
    [ 2] 0000: D1 AA C0 AE 25 4F 6D 98 66 E0 EF 60 43 BF 85 6D ....%Om.f..`C..m
    [ 2] 0010: 81 8E 60 0B ..`.
    [ 2] ]
    [ 2] ]
    [ 2]
    [ 2] [5]: ObjectId: 2.5.29.31 Criticality=false
    [ 2] CRLDistributionPoints [
    [ 2] [DistributionPoint:
    [ 2] [URIName: ldap:///CN=Bankwest%20Web%20Enrolment%20CA,CN=CBDCERT004,CN=CDP,CN=Public%20Key%20Services,CN=Services,CN=Configuration,DC=rtdomau,DC=local?certificateRevocationList?base?objectClass=cRLDistributionPoint, URIName: http://cdp.rtdomau.local/CertData/Bankwest%20Web%20Enrolment%20CA.crl]
    [ 2] ]]
    [ 2]
    [ 2] [6]: ObjectId: 2.5.29.37 Criticality=false
    [ 2] ExtendedKeyUsages [
    [ 2] clientAuth
    [ 2] serverAuth
    [ 2] ]
    [ 2]
    [ 2] [7]: ObjectId: 2.5.29.15 Criticality=false
    [ 2] KeyUsage [
    [ 2] DigitalSignature
    [ 2] Key_Encipherment
    [ 2] Data_Encipherment
    [ 2] ]
    [ 2]
    [ 2] [8]: ObjectId: 2.5.29.17 Criticality=false
    [ 2] SubjectAlternativeName [
    [ 2] DNSName: bbbb.mps2.bankwest.com
    [ 2] DNSName: bbbb.bankwest.com
    [ 2] ]
    [ 2]
    [ 2] [9]: ObjectId: 2.5.29.14 Criticality=false
    [ 2] SubjectKeyIdentifier [
    [ 2] KeyIdentifier [
    [ 2] 0000: 25 85 82 DD 97 13 E6 94 6B 67 A2 F8 0B 2A 40 E9 %.......kg...*@.
    [ 2] 0010: DB 52 22 C8 .R".
    [ 2] ]
    [ 2] ]
    [ 2]
    [ 2] ]
    [ 2] Algorithm: [SHA1withRSA]
    [ 2] Signature:
    [ 2] 0000: 67 14 99 DF F5 34 2B CF 6C 89 44 34 ED 2C 8F 93 g....4+.l.D4.,..
    [ 2] 0010: 4E 51 2E 05 77 18 2A A9 7C 04 0D BA DD 37 D6 45 NQ..w.*......7.E
    [ 2] 0020: 96 95 07 56 84 23 40 C0 91 1C 30 A3 5B DA 20 18 ...V.#@...0.[. .
    [ 2] 0030: 99 B6 D0 F9 EF ED F7 9A A8 A2 27 16 9D 61 9E 2D ..........'..a.-
    [ 2] 0040: 55 43 18 A8 39 C8 BD B2 90 FA 0F 41 9D 79 C0 E6 UC..9......A.y..
    [ 2] 0050: 4F 7F 2E 7F 17
    [ 2] 81 32 9E 18 D8 F2 57 05 16 21 95 O.....2....W..!.
    [ 2] 0060: 44 B8 D0 0A 2D 14 51 A2 18 CD 98 EC 16 19 5C 3F D...-.Q.......\?
    [ 2] 0070: C3 F6 BC A9 9B F9 67 C7 68 34 0E 57 5C 04 78 41 ......g.h4.W\.xA
    [ 2] 0080: 96 0B 4F 01 74 D7 7E F7 B7 11 F0 99 2C 69 72 4C ..O.t.......,irL
    [ 2] 0090: 7E 8D 4E 81 C3 1C 79 3D 1A B6 BB 45 02 73 23 87 ..N...y=...E.s#.
    [ 2] 00A0: 63 AF 65 DF 99 AE F1 8D D6 BF D6 73 88 51 6B 32 c.e........s.Qk2
    [ 2] 00B0: CF B0 B7 D5 87 74 78 F5 C2 66 23 B6 B0 57 EE C2 .....tx..f#..W..
    [ 2] 00C0: EE E2 50 25 08 2C 60 EA 4D DA 6B 5A C7 AA 3D E2 ..P%.,`.M.kZ..=.
    [ 2] 00D0: 65 FD 97 C0 C6 29 05 3B CA C8 5B F6 D9 67 20 4B e....).;..[..g K
    [ 2] 00E0: DC A8 FF 98 9C C2 B1 BA 36 CB E8 96 E0 12 26 EE ........6.....&.
    [ 2] 00F0: E0 69 07 9C 68 0E 38 C3 1F 2D 4D FB 2B 1F 27 A9 .i..h.8..-M.+.'.
    [ 2]
    [ 2] ]
    [ 2] ***
    [ 2] *** CertificateRequest
    [ 2] Cert Types: RSA, DSS, ECDSA
    [ 2] Cert Authorities:
    [ 2] <emailaddress=duty.sysprog@bankwest.com.au, cn="bbbb.mps2.bankwest.com," ou="BWA" group="" services="" pty="" ltd,="" o="Commonwealth" bank="" of="" australia,="" l="Perth," st="WA," c="AU">
    [ 2] <cn=bankwest root="" ca,="" o="Bank" of="" western="" australia="" ltd,="" c="AU">
    [ 2] *** ServerHelloDone
    [ 2] *** Certificate chain
    [ 2] chain [0] = [
    [ 2] [
    [ 2] Version: V3
    [ 2] Subject: CN=Lisa, OU=Lisa, O=Lisa, L=Dallas, ST=Texas, C=US, EMAILADDRESS=support@itko.com
    [ 2] Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5
    [ 2]
    [ 2] Key: Sun RSA public key, 1024 bits
    [ 2] modulus: 107577342571485428802393728049184265786056348388364405824138117397977455761833138845329880593678805610027793821217939298848284286683543926634250841496293888229172692948746730869670908754188073542091973621265074265583182385560072567366227383567380577316296862528343858318946945517967854106447414857653511333997
    [ 2] public exponent: 65537
    [ 2] Validity: [From: Sat Aug 21 00:07:30 AWST 2010,
    [ 2] To: Wed Jan 06 00:07:30 AWST 2038]
    [ 2] Issuer: CN=Lisa, OU=Lisa, O=Lisa, L=Dallas, ST=Texas, C=US, EMAILADDRESS=support@itko.com
    [ 2] SerialNumber: [ 4c6ea842]
    [ 2]
    [ 2] ]
    [ 2] Algorithm: [SHA1withRSA]
    [ 2] Signature:
    [ 2] 0000: 2B 7F 77 08 DE 2F 74 E3 CD 0F 58 D8 57 D9 08 2E +.w../t...X.W...
    [ 2] 0010: AC 57 A7 02 81 07 B7 F8 5B 68 AE 22 22 C6 75 EE .W......[h."".u.
    [ 2] 0020: C2 41 B6 23 DE ED 17 F8 21 AE 3B ED B6 EA 1A 17 .A.#....!.;.....
    [ 2] 0030: A4 5F 95 FD BE AE 74 DA 75 64 19 D6 60 0A 63 61 ._....t.ud..`.ca
    [ 2] 0040: B6 2A E1 FB 06 C5 36 E5 00 0C EB 20 EF FA 82 29 .*....6.... ...)
    [ 2] 0050: 40 39 EA 61 3A 27 CF 4F 00 18 33 E8 31 4C E4 C5 @9.a:'.O..3.1L..
    [ 2] 0060: 44 98 60 15 80 FE 85 FB BF BD 95 AB 35 14 F7 16 D.`.........5...
    [ 2] 0070: 9D 58 F5 26 10 B7 76 7D 43 20 A7 4B F4 ED EE CF .X.&..v.C .K....
    [ 2]
    [ 2] ]
    [ 2] ***
    [ 2] *** ClientKeyExchange, RSA PreMasterSecret, TLSv1
    [ 2] ProcDlgThreadCallbk@2ce54912, WRITE: TLSv1 Handshake, length = 899
    [ 2] SESSION KEYGEN:
    [ 2] PreMaster Secret:
    [ 2] 0000: 03 03 87 AE 88 0A 35 3F 72 01 B2 40 38 C2 4F 6A ......5?r..@8.Oj
    [ 2] 0010: F7 B1 C5 BD B4 E1 DF 12 8B 9A A4 83 72 76 BD A2 ............rv..
    [ 2] 0020: 00 5A 1B D5 89 0C E1 F2 21 A1 C2 E6 32 18 96 BF .Z......!...2...
    [ 2] CONNECTION KEYGEN:
    [ 2] Client Nonce:
    [ 2] 0000: 5A A0 F5 D1 B6 22 57 31 B1 B6 CE 79 84 B0 94 EC Z...."W1...y....
    [ 2] 0010: 78 7A 05 CE 36 25 41 B0 93 09 8A 88 41 AF 85 4C xz..6%A.....A..L
    [ 2] Server Nonce:
    [ 2] 0000: 5A A0 F5 D2 1E 57 5D E0 EE 02 35 3A 86 1D 71 40 Z....W]...5:..q@
    [ 2] 0010: D7 98 47 0B 78 A6 20 90 EB 5D EF 87 B4 7F D2 2F ..G.x. ..]...../
    [ 2] Master Secret:
    [ 2] 0000: 72 00 00 FA CD 04 1A 06 B5 3D BA 58 41 12 37 74 r........=.XA.7t
    [ 2] 0010: 40 33 3E 6E F2 F6 44 1B E8 2D F3 12 1E CE 28 87 @3>n..D..-....(.
    [ 2] 0020: E7 96 16 56 66 B2 B6 83 36 25 A7 F4 2A 4E B5 3D ...Vf...6%..*N.=
    [ 2] Client MAC write Secret:
    [ 2] 0000: 64 74 52 5C B7 ED 5C EB 50 14 C2 24 EE 75 75 B6 dtR\..\.P..$.uu.
    [ 2] 0010: 89 82 6D 67 ..mg
    [ 2] Server MAC write Secret:
    [ 2] 0000: 98 9B F0 E0 8C 4E C0 51 FC 50 A5 71 D9 B9 9F F6 .....N.Q.P.q....
    [ 2] 0010: E1 58 05 E1 .X..
    [ 2] Client write key:
    [ 2] 0000: 54 42 D0 D6 D2 25 F5 26 5A 15 DE DF E6 4E 25 11 TB...%.&Z....N%.
    [ 2] 0010: 40 6E 8D 8F 95 AD E5 97 3D EC 6D 39 D0 73 E0 33 @n......=.m9.s.3
    [ 2] Server write key:
    [ 2] 0000: FA F9 7B 51 B9 F2 73 2E 0D 42 0C B0 0E E5 87 68 ...Q..s..B.....h
    [ 2] 0010: 8B 42 AC 1F 06 69 BB 6A 01 C4 F5 50 F4 6E F7 7A .B...i.j...P.n.z
    [ 2] Client write IV:
    [ 2] 0000: 0B F1 EA 5C 2C 1B FF 69 C9 43 FF 8E D4 7B E0 BC ...\,..i.C......
    [ 2] Server write IV:
    [ 2] 0000: 37 B9 F2 70 06 D5 07 4A 24 6F BE 78 EE F6 1B 32 7..p...J$o.x...2
    [ 2] *** CertificateVerify
    [ 2] ProcDlgThreadCallbk@2ce54912, WRITE: TLSv1 Handshake, length = 134
    [ 2] ProcDlgThreadCallbk@2ce54912, WRITE: TLSv1 Change Cipher Spec, length = 1
    [ 2] *** Finished
    [ 2] verify_data: { 250, 193, 196, 42, 255, 59, 101, 28, 233, 203, 86, 206 }
    [ 2] ***
    [ 2] ProcDlgThreadCallbk@2ce54912, WRITE: TLSv1 Handshake, length = 48
    [ 2] ProcDlgThreadCallbk@2ce54912, waiting for close_notify or alert: state 1
    [ 2] ProcDlgThreadCallbk@2ce54912, Exception while waiting for close java.net.SocketException: Software caused connection abort: recv failed
    [ 2] ProcDlgThreadCallbk@2ce54912, handling exception: java.net.SocketException: Software caused connection abort: recv failed
    [ 2] %% Invalidated: [Session-5, TLS_RSA_WITH_AES_256_CBC_SHA]
    [ 2] ProcDlgThreadCallbk@2ce54912, SEND TLSv1 ALERT: fatal, description = unexpected_message
    [ 2] ProcDlgThreadCallbk@2ce54912, WRITE: TLSv1 Alert, length = 32
    [ 2] ProcDlgThreadCallbk@2ce54912, Exception sending alert: java.net.SocketException: Software caused connection abort: socket write error
    [ 2] ProcDlgThreadCallbk@2ce54912, called closeSocket()
    [ 2] ProcDlgThreadCallbk@2ce54912, setSoTimeout(180000) called
    [ 2] Allow unsafe renegotiation: false
    [ 2] Allow legacy hello messages: true
    [ 2] Is initial handshake: true
    [ 2] Is secure renegotiation: false
    [ 2] Ignoring disabled protocol: SSLv3
    [ 2] Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1
    [ 2] Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLSv1
    [ 2] Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 for TLSv1
    [ 2] Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1
    [ 2] Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 for TLSv1
    [ 2] Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1
    [ 2] Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1
    [ 2] Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1.1
    [ 2] Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLSv1.1
    [ 2] Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1
    [ 2] Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1.1
    [ 2] Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 for TLSv1.1
    [ 2] Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1
    [ 2] Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1.1
    [ 2] %% No cached client session
    [ 2] *** ClientHello, TLSv1.2
    [ 2] RandomCookie: GMT: 1503655122 bytes = { 48, 38, 59, 14, 182, 50, 31, 196, 200, 67, 97, 205, 131, 4, 71, 195, 132, 127, 112, 214, 130, 181, 3, 145, 96, 196, 101, 0 }
    [ 2] Session ID: {}
    [ 2] Cipher Suites: [TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384, TLS_RSA_WITH_AES_256_CBC_SHA256, TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384, TLS_DHE_RSA_WITH_AES_256_CBC_SHA256, TLS_DHE_DSS_WITH_AES_256_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDH_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_DSS_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256, TLS_RSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_DSS_WITH_AES_128_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, TLS_RSA_WITH_AES_256_GCM_SHA384, TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, TLS_DHE_DSS_WITH_AES_256_GCM_SHA384, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_DSS_WITH_AES_128_GCM_SHA256, TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA, TLS_EMPTY_RENEGOTIATION_INFO_SCSV, TLS_DH_anon_WITH_AES_256_GCM_SHA384, TLS_DH_anon_WITH_AES_128_GCM_SHA256, TLS_DH_anon_WITH_AES_256_CBC_SHA256, TLS_ECDH_anon_WITH_AES_256_CBC_SHA, TLS_DH_anon_WITH_AES_256_CBC_SHA, TLS_DH_anon_WITH_
    [ 2] AES_128_CBC_SHA256, TLS_ECDH_anon_WITH_AES_128_CBC_SHA, TLS_DH_anon_WITH_AES_128_CBC_SHA, TLS_ECDH_anon_WITH_3DES_EDE_CBC_SHA, SSL_DH_anon_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_DES_CBC_SHA, SSL_DHE_RSA_WITH_DES_CBC_SHA, SSL_DHE_DSS_WITH_DES_CBC_SHA, SSL_DH_anon_WITH_DES_CBC_SHA, SSL_RSA_EXPORT_WITH_DES40_CBC_SHA, SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA, SSL_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA, SSL_DH_anon_EXPORT_WITH_DES40_CBC_SHA, TLS_RSA_WITH_NULL_SHA256, TLS_ECDHE_ECDSA_WITH_NULL_SHA, TLS_ECDHE_RSA_WITH_NULL_SHA, SSL_RSA_WITH_NULL_SHA, TLS_ECDH_ECDSA_WITH_NULL_SHA, TLS_ECDH_RSA_WITH_NULL_SHA, TLS_ECDH_anon_WITH_NULL_SHA, SSL_RSA_WITH_NULL_MD5, TLS_KRB5_WITH_3DES_EDE_CBC_SHA, TLS_KRB5_WITH_3DES_EDE_CBC_MD5, TLS_KRB5_WITH_DES_CBC_SHA, TLS_KRB5_WITH_DES_CBC_MD5, TLS_KRB5_EXPORT_WITH_DES_CBC_40_SHA, TLS_KRB5_EXPORT_WITH_DES_CBC_40_MD5]
    [ 2] Compression Methods: { 0 }
    [ 2] Extension elliptic_curves, curve names: {secp256r1, sect163k1, sect163r2, secp192r1, secp224r1, sect233k1, sect233r1, sect283k1, sect283r1, secp384r1, sect409k1, sect409r1, secp521r1, sect571k1, sect571r1, secp160k1, secp160r1, secp160r2, sect163r1, secp192k1, sect193r1, sect193r2, secp224k1, sect239k1, secp256k1}
    [ 2] Extension ec_point_formats, formats: [uncompressed]
    [ 2] Extension signature_algorithms, signature_algorithms: SHA512withECDSA, SHA512withRSA, SHA384withECDSA, SHA384withRSA, SHA256withECDSA, SHA256withRSA, SHA256withDSA, SHA1withECDSA, SHA1withRSA, SHA1withDSA
    [ 2] ***
    [ 2] ProcDlgThreadCallbk@2ce54912, WRITE: TLSv1.2 Handshake, length = 297
    [ 2] ProcDlgThreadCallbk@2ce54912, READ: TLSv1 Handshake, length = 2348
    [ 2] *** ServerHello, TLSv1
    [ 2] RandomCookie: GMT: 1503655122 bytes = { 200, 135, 119, 211, 109, 161, 40, 236, 46, 11, 162, 243, 97, 160, 12, 4, 133, 217, 194, 213, 65, 109, 134, 176, 235, 161, 213, 50 }
    [ 2] Session ID: {90, 160, 245, 210, 130, 233, 218, 20, 145, 95, 13, 86, 236, 225, 119, 248, 170, 170, 151, 126, 184, 130, 155, 45, 201, 58, 247, 94, 13, 37, 32, 13}
    [ 2] Cipher Suite: TLS_RSA_WITH_AES_256_CBC_SHA
    [ 2] Compression Method: 0
    [ 2] Extension renegotiation_info, renegotiated_connection:
    [ 2] ***
    [ 2] %% Initialized: [Session-6, TLS_RSA_WITH_AES_256_CBC_SHA]
    [ 2] ** TLS_RSA_WITH_AES_256_CBC_SHA
    [ 2] *** Certificate chain
    [ 2] chain [0] = [
    [ 2] [
    [ 2] Version: V3
    [ 2] Subject: EMAILADDRESS=duty.sysprog@bankwest.com.au, CN=bbbb.mps2.bankwest.com, OU=BWA Group Services Pty Ltd, O=Commonwealth Bank of Australia, L=Perth, ST=WA, C=AU
    [ 2] Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5
    [ 2]
    [ 2] Key: Sun RSA public key, 2048 bits
    [ 2] modulus: 26440769111413576055346839927364392822027480382790481478154498185491321589829289662408844753951890388938985607312352111414251608577990009729445664992742403913155746840181967655356518558322629282182583615689380822595800210339328637885490480860545027038715111210571037622416127220560351150048294136574846346365791587173066371523198548147310260273352942815933864283398318401632092577707597452700338537719827614956958594507443530072095300695973883457133934160204107666396622875131539050578776316876089050918544752977206314745801342895873881627784166265682182434552424151460241666993656198380889999487666985386934137244429
    [ 2] public exponent: 65537
    [ 2] Validity: [From: Wed May 20 09:24:59 AWST 2015,
    [ 2] To: Sat May 19 09:24:59 AWST 2018]
    [ 2] Issuer: CN=Bankwest Web Enrolment CA, O=Bank of Western Australia Ltd, C=AU
    [ 2] SerialNumber: [ 6f1973df 00000000 03d5]
    [ 2]
    [ 2] Certificate Extensions: 9
    [ 2] [1]: ObjectId: 1.3.6.1.4.1.311.21.10 Criticality=false
    [ 2] Extension unknown: DER encoded OCTET string =
    [ 2] 0000: 04 1A 30 18 30 0A 06 08 2B 06 01 05 05 07 03 02 ..0.0...+.......
    [ 2] 0010: 30 0A 06 08 2B 06 01 05 05 07 03 01 0...+.......
    [ 2]
    [ 2]
    [ 2] [2]: ObjectId: 1.3.6.1.4.1.311.21.7 Criticality=false
    [ 2] Extension unknown: DER encoded OCTET string =
    [ 2] 0000: 04 30 30 2E 06 26 2B 06 01 04 01 82 37 15 08 83 .00..&+.....7...
    [ 2] 0010: CF D4 7B 81 B8 CB 6E 82 AD 99 1A 85 F2 EB 54 84 ......n.......T.
    [ 2] 0020: 93 E1 4B 18 86 F4 9F 7C 81 AF B9 71 02 01 64 02 ..K........q..d.
    [ 2] 0030: 01 0A ..
    [ 2]
    [ 2]
    [ 2] [3]: ObjectId: 1.3.6.1.5.5.7.1.1 Criticality=false
    [ 2] AuthorityInfoAccess [
    [ 2] [
    [ 2] accessMethod: caIssuers
    [ 2] accessLocation: URIName: ldap:///CN=Bankwest%20Web%20Enrolment%20CA,CN=AIA,CN=Public%20Key%20Services
    [ 2] ,CN=Services,CN=Configuration,DC=rtdomau,DC=local?cACertificate?base?objectClass=certificationAuthority
    [ 2] ,
    [ 2] accessMethod: caIssuers
    [ 2] accessLocation: URIName: http://cdp.rtdomau.local/CertData/CBDCERT004.rtdomau.local_Bankwest%20Web%20Enrolment%20CA.crt
    [ 2] ,
    [ 2] accessMethod: caIssuers
    [ 2] accessLocation: URIName: http://cbdcert004.rtdomau.local/CertEnroll/CBDCERT004.rtdomau.local_Bankwest%20Web%20Enrolment%20CA.crt
    [ 2] ]
    [ 2] ]
    [ 2]
    [ 2] [4]: ObjectId: 2.5.29.35 Criticality=false
    [ 2] AuthorityKeyIdentifier [
    [ 2] KeyIdentifier [
    [ 2] 0000: D1 AA C0 AE 25 4F 6D 98 66 E0 EF 60 43 BF 85 6D ....%Om.f..`C..m
    [ 2] 0010: 81 8E 60 0B ..`.
    [ 2] ]
    [ 2] ]
    [ 2]
    [ 2] [5]: ObjectId: 2.5.29.31 Criticality=false
    [ 2] CRLDistributionPoints [
    [ 2] [DistributionPoint:
    [ 2] [URIName: ldap:///CN=Bankwest%20Web%20Enrolment%20CA,CN=CBDCERT004,CN=CDP,CN=Public%20Key%20Services,CN=Services,CN=Configuration,DC=rtdomau,DC=local?certificateRevocationList?base?objectClass=cRLDistributionPoint, URIName: http://cdp.rtdomau.local/CertData/Bankwest%20Web%20Enrolment%20CA.crl]
    [ 2] ]]
    [ 2]
    [ 2] [6]: ObjectId: 2.5.29.37 Criticality=false
    [ 2] ExtendedKeyUsages [
    [ 2] clientAuth
    [ 2] serverAuth
    [ 2] ]
    [ 2]
    [ 2] [7]: ObjectId: 2.5.29.15 Criticality=false
    [ 2] KeyUsage [
    [ 2] DigitalSignature
    [ 2] Key_Encipherment
    [ 2] Data_Encipherment
    [ 2] ]
    [ 2]
    [ 2] [8]: ObjectId: 2.5.29.17 Criticality=false
    [ 2] SubjectAlternativeName [
    [ 2] DNSName: bbbb.mps2.bankwest.com
    [ 2] DNSName: bbbb.bankwest.com
    [ 2] ]
    [ 2]
    [ 2] [9]: ObjectId: 2.5.29.14 Criticality=false
    [ 2] SubjectKeyIdentifier [
    [ 2] KeyIdentifier [
    [ 2] 0000: 25 85 82 DD 97 13 E6 94 6B 67 A2 F8 0B 2A 40 E9 %.......kg...*@.
    [ 2] 0010: DB 52 22 C8 .R".
    [ 2] ]
    [ 2] ]
    [ 2]
    [ 2] ]
    [ 2] Algorithm: [SHA1withRSA]
    [ 2] Signature:
    [ 2] 0000: 67 14 99 DF F5 34 2B CF 6C 89 44 34 ED 2C 8F 93 g....4+.l.D4.,..
    [ 2] 0010: 4E 51 2E 05 77 18 2A A9 7C 04 0D BA DD 37 D6 45 NQ..w.*......7.E
    [ 2] 0020: 96 95 07 56 84 23 40 C0 91 1C 30 A3 5B DA 20 18 ...V.#@...0.[. .
    [ 2] 0030: 99 B6 D0 F9 EF ED F7 9A A8 A2 27 16 9D 61 9E 2D ..........'..a.-
    [ 2] 0040: 55 43 18 A8 39 C8 BD B2 90 FA 0F 41 9D 79 C0 E6 UC..9......A.y..
    [ 2] 0050: 4F 7F 2E 7F 17
    [ 2] 81 32 9E 18 D8 F2 57 05 16 21 95 O.....2....W..!.
    [ 2] 0060: 44 B8 D0 0A 2D 14 51 A2 18 CD 98 EC 16 19 5C 3F D...-.Q.......\?
    [ 2] 0070: C3 F6 BC A9 9B F9 67 C7 68 34 0E 57 5C 04 78 41 ......g.h4.W\.xA
    [ 2] 0080: 96 0B 4F 01 74 D7 7E F7 B7 11 F0 99 2C 69 72 4C ..O.t.......,irL
    [ 2] 0090: 7E 8D 4E 81 C3 1C 79 3D 1A B6 BB 45 02 73 23 87 ..N...y=...E.s#.
    [ 2] 00A0: 63 AF 65 DF 99 AE F1 8D D6 BF D6 73 88 51 6B 32 c.e........s.Qk2
    [ 2] 00B0: CF B0 B7 D5 87 74 78 F5 C2 66 23 B6 B0 57 EE C2 .....tx..f#..W..
    [ 2] 00C0: EE E2 50 25 08 2C 60 EA 4D DA 6B 5A C7 AA 3D E2 ..P%.,`.M.kZ..=.
    [ 2] 00D0: 65 FD 97 C0 C6 29 05 3B CA C8 5B F6 D9 67 20 4B e....).;..[..g K
    [ 2] 00E0: DC A8 FF 98 9C C2 B1 BA 36 CB E8 96 E0 12 26 EE ........6.....&.
    [ 2] 00F0: E0 69 07 9C 68 0E 38 C3 1F 2D 4D FB 2B 1F 27 A9 .i..h.8..-M.+.'.
    [ 2]
    [ 2] ]
    [ 2] ***
    [ 2] *** CertificateRequest
    [ 2] Cert Types: RSA, DSS, ECDSA
    [ 2] Cert Authorities:
    [ 2] <emailaddress=duty.sysprog@bankwest.com.au, cn="bbbb.mps2.bankwest.com," ou="BWA" group="" services="" pty="" ltd,="" o="Commonwealth" bank="" of="" australia,="" l="Perth," st="WA," c="AU">
    [ 2] <cn=bankwest root="" ca,="" o="Bank" of="" western="" australia="" ltd,="" c="AU">
    [ 2] *** ServerHelloDone
    [ 2] *** Certificate chain
    [ 2] chain [0] = [
    [ 2] [
    [ 2] Version: V3
    [ 2] Subject: CN=Lisa, OU=Lisa, O=Lisa, L=Dallas, ST=Texas, C=US, EMAILADDRESS=support@itko.com
    [ 2] Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5
    [ 2]
    [ 2] Key: Sun RSA public key, 1024 bits
    [ 2] modulus: 107577342571485428802393728049184265786056348388364405824138117397977455761833138845329880593678805610027793821217939298848284286683543926634250841496293888229172692948746730869670908754188073542091973621265074265583182385560072567366227383567380577316296862528343858318946945517967854106447414857653511333997
    [ 2] public exponent: 65537
    [ 2] Validity: [From: Sat Aug 21 00:07:30 AWST 2010,
    [ 2] To: Wed Jan 06 00:07:30 AWST 2038]
    [ 2] Issuer: CN=Lisa, OU=Lisa, O=Lisa, L=Dallas, ST=Texas, C=US, EMAILADDRESS=support@itko.com
    [ 2] SerialNumber: [ 4c6ea842]
    [ 2]
    [ 2] ]
    [ 2] Algorithm: [SHA1withRSA]
    [ 2] Signature:
    [ 2] 0000: 2B 7F 77 08 DE 2F 74 E3 CD 0F 58 D8 57 D9 08 2E +.w../t...X.W...
    [ 2] 0010: AC 57 A7 02 81 07 B7 F8 5B 68 AE 22 22 C6 75 EE .W......[h."".u.
    [ 2] 0020: C2 41 B6 23 DE ED 17 F8 21 AE 3B ED B6 EA 1A 17 .A.#....!.;.....
    [ 2] 0030: A4 5F 95 FD BE AE 74 DA 75 64 19 D6 60 0A 63 61 ._....t.ud..`.ca
    [ 2] 0040: B6 2A E1 FB 06 C5 36 E5 00 0C EB 20 EF FA 82 29 .*....6.... ...)
    [ 2] 0050: 40 39 EA 61 3A 27 CF 4F 00 18 33 E8 31 4C E4 C5 @9.a:'.O..3.1L..
    [ 2] 0060: 44 98 60 15 80 FE 85 FB BF BD 95 AB 35 14 F7 16 D.`.........5...
    [ 2] 0070: 9D 58 F5 26 10 B7 76 7D 43 20 A7 4B F4 ED EE CF .X.&..v.C .K....
    [ 2]
    [ 2] ]
    [ 2] ***
    [ 2] *** ClientKeyExchange, RSA PreMasterSecret, TLSv1
    [ 2] ProcDlgThreadCallbk@2ce54912, WRITE: TLSv1 Handshake, length = 899
    [ 2] SESSION KEYGEN:
    [ 2] PreMaster Secret:
    [ 2] 0000: 03 03 31 8F 6B 1D C7 71 56 FA 78 27 E1 C6 C4 3D ..1.k..qV.x'...=
    [ 2] 0010: 41 21 37 F2 3A 9D 37 88 C0 BA 4D 73 06 76 6A 36 A!7.:.7...Ms.vj6
    [ 2] 0020: B9 CE 4A 60 2B F2 A3 60 4B 16 F7 4E B8 82 A3 CA ..J`+..`K..N....
    [ 2] CONNECTION KEYGEN:
    [ 2] Client Nonce:
    [ 2] 0000: 5A A0 F5 D2 30 26 3B 0E B6 32 1F C4 C8 43 61 CD Z...0&;..2...Ca.
    [ 2] 0010: 83 04 47 C3 84 7F 70 D6 82 B5 03 91 60 C4 65 00 ..G...p.....`.e.
    [ 2] Server Nonce:
    [ 2] 0000: 5A A0 F5 D2 C8 87 77 D3 6D A1 28 EC 2E 0B A2 F3 Z.....w.m.(.....
    [ 2] 0010: 61 A0 0C 04 85 D9 C2 D5 41 6D 86 B0 EB A1 D5 32 a.......Am.....2
    [ 2] Master Secret:
    [ 2] 0000: 66 EA 96 60 7A B5 C1 15 E3 62 56 CE DC F0 14 FD f..`z....bV.....
    [ 2] 0010: C1 02 C3 CE CE BF 60 FE 5B E0 05 4B FE 41 71 04 ......`.[..K.Aq.
    [ 2] 0020: FE F4 55 C9 4C 57 92 0B 15 9C C9 38 FC 44 B0 31 ..U.LW.....8.D.1
    [ 2] Client MAC write Secret:
    [ 2] 0000: BB C4 3B 56 7E C0 6A CE 75 B4 EC 37 85 22 09 64 ..;V..j.u..7.".d
    [ 2] 0010: 08 C9 D4 66 ...f
    [ 2] Server MAC write Secret:
    [ 2] 0000: 47 B9 E8 02 39 F0 E9 93 E2 C1 A8 B6 FC C5 DC B6 G...9...........
    [ 2] 0010: 78 56 71 65 xVqe
    [ 2] Client write key:
    [ 2] 0000: 0A FC 91 88 3F BE A8 8F 0D C6 1F F9 5B 91 8E 56 ....?.......[..V
    [ 2] 0010: C0 EB BD E3 23 4E 9C D9 C6 30 15 9D DA E1 8F 0F ....#N...0......
    [ 2] Server write key:
    [ 2] 0000: 46 55 18 5B CB 50 F2 54 5F 4F DF A1 07 10 11 F6 FU.[.P.T_O......
    [ 2] 0010: B8 BA BF D4 04 7A 51 BA C0 12 48 95 94 3C 07 38 .....zQ...H..<.8
    [ 2] Client write IV:
    [ 2] 0000: CB 77 25 02 5F 31 45 F3 88 D1 3A AA EC DB 8E 6B .w%._1E...:....k
    [ 2] Server write IV:
    [ 2] 0000: 3A 70 53 44 28 33 27 75 C9 4A 43 69 65 67 3C DC :pSD(3'u.JCieg<.
    [ 2] *** CertificateVerify
    [ 2] ProcDlgThreadCallbk@2ce54912, WRITE: TLSv1 Handshake, length = 134
    [ 2] ProcDlgThreadCallbk@2ce54912, WRITE: TLSv1 Change Cipher Spec, length = 1
    [ 2] ProcDlgThreadCallbk@2ce54912, handling exception: java.net.SocketException: Software caused connection abort: socket write error
    [ 2] %% Invalidated: [Session-6, TLS_RSA_WITH_AES_256_CBC_SHA]
    [ 2] ProcDlgThreadCallbk@2ce54912, SEND TLSv1 ALERT: fatal, description = unexpected_message
    [ 2] ProcDlgThreadCallbk@2ce54912, WRITE: TLSv1 Alert, length = 2
    [ 2] ProcDlgThreadCallbk@2ce54912, Exception sending alert: java.net.SocketException: Software caused connection abort: socket write error
    [ 2] ProcDlgThreadCallbk@2ce54912, called closeSocket()
    [ 2] ProcDlgThreadCallbk@2ce54912, setSoTimeout(180000) called
    [ 2] Allow unsafe renegotiation: false
    [ 2] Allow legacy hello messages: true
    [ 2] Is initial handshake: true
    [ 2] Is secure renegotiation: false
    [ 2] Ignoring disabled protocol: SSLv3
    [ 2] Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1
    [ 2] Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLSv1
    [ 2] Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 for TLSv1
    [ 2] Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1
    [ 2] Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 for TLSv1
    [ 2] Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1
    [ 2] Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1
    [ 2] Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1.1
    [ 2] Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLSv1.1
    [ 2] Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1
    [ 2] Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1.1
    [ 2] Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 for TLSv1.1
    [ 2] Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1
    [ 2] Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1.1
    [ 2] %% No cached client session
    [ 2] *** ClientHello, TLSv1.2
    [ 2] RandomCookie: GMT: 1503655122 bytes = { 158, 86, 3, 52, 170, 249, 49, 103, 112, 19, 119, 199, 79, 65, 75, 221, 148, 61, 146, 134, 108, 52, 58, 69, 147, 165, 1, 219 }
    [ 2] Session ID: {}
    [ 2] Cipher Suites: [TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384, TLS_RSA_WITH_AES_256_CBC_SHA256, TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384, TLS_DHE_RSA_WITH_AES_256_CBC_SHA256, TLS_DHE_DSS_WITH_AES_256_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDH_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_DSS_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256, TLS_RSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_DSS_WITH_AES_128_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, TLS_RSA_WITH_AES_256_GCM_SHA384, TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, TLS_DHE_DSS_WITH_AES_256_GCM_SHA384, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_DSS_WITH_AES_128_GCM_SHA256, TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA, TLS_EMPTY_RENEGOTIATION_INFO_SCSV, TLS_DH_anon_WITH_AES_256_GCM_SHA384, TLS_DH_anon_WITH_AES_128_GCM_SHA256, TLS_DH_anon_WITH_AES_256_CBC_SHA256, TLS_ECDH_anon_WITH_AES_256_CBC_SHA, TLS_DH_anon_WITH_AES_256_CBC_SHA, TLS_DH_anon_WITH_
    [ 2] AES_128_CBC_SHA256, TLS_ECDH_anon_WITH_AES_128_CBC_SHA, TLS_DH_anon_WITH_AES_128_CBC_SHA, TLS_ECDH_anon_WITH_3DES_EDE_CBC_SHA, SSL_DH_anon_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_DES_CBC_SHA, SSL_DHE_RSA_WITH_DES_CBC_SHA, SSL_DHE_DSS_WITH_DES_CBC_SHA, SSL_DH_anon_WITH_DES_CBC_SHA, SSL_RSA_EXPORT_WITH_DES40_CBC_SHA, SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA, SSL_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA, SSL_DH_anon_EXPORT_WITH_DES40_CBC_SHA, TLS_RSA_WITH_NULL_SHA256, TLS_ECDHE_ECDSA_WITH_NULL_SHA, TLS_ECDHE_RSA_WITH_NULL_SHA, SSL_RSA_WITH_NULL_SHA, TLS_ECDH_ECDSA_WITH_NULL_SHA, TLS_ECDH_RSA_WITH_NULL_SHA, TLS_ECDH_anon_WITH_NULL_SHA, SSL_RSA_WITH_NULL_MD5, TLS_KRB5_WITH_3DES_EDE_CBC_SHA, TLS_KRB5_WITH_3DES_EDE_CBC_MD5, TLS_KRB5_WITH_DES_CBC_SHA, TLS_KRB5_WITH_DES_CBC_MD5, TLS_KRB5_EXPORT_WITH_DES_CBC_40_SHA, TLS_KRB5_EXPORT_WITH_DES_CBC_40_MD5]
    [ 2] Compression Methods: { 0 }
    [ 2] Extension elliptic_curves, curve names: {secp256r1, sect163k1, sect163r2, secp192r1, secp224r1, sect233k1, sect233r1, sect283k1, sect283r1, secp384r1, sect409k1, sect409r1, secp521r1, sect571k1, sect571r1, secp160k1, secp160r1, secp160r2, sect163r1, secp192k1, sect193r1, sect193r2, secp224k1, sect239k1, secp256k1}
    [ 2] Extension ec_point_formats, formats: [uncompressed]
    [ 2] Extension signature_algorithms, signature_algorithms: SHA512withECDSA, SHA512withRSA, SHA384withECDSA, SHA384withRSA, SHA256withECDSA, SHA256withRSA, SHA256withDSA, SHA1withECDSA, SHA1withRSA, SHA1withDSA
    [ 2] ***
    [ 2] ProcDlgThreadCallbk@2ce54912, WRITE: TLSv1.2 Handshake, length = 297
    [ 2] ProcDlgThreadCallbk@2ce54912, READ: TLSv1 Handshake, length = 2348
    [ 2] *** ServerHello, TLSv1
    [ 2] RandomCookie: GMT: 1503655122 bytes = { 162, 171, 164, 75, 25, 102, 78, 222, 175, 103, 244, 18, 185, 196, 206, 160, 163, 206, 221, 21, 89, 231, 126, 65, 175, 170, 55, 143 }
    [ 2] Session ID: {90, 160, 245, 210, 61, 137, 142, 179, 63, 209, 23, 88, 220, 128, 28, 169, 164, 242, 62, 176, 199, 210, 84, 77, 12, 51, 111, 186, 36, 180, 133, 172}
    [ 2] Cipher Suite: TLS_RSA_WITH_AES_256_CBC_SHA
    [ 2] Compression Method: 0
    [ 2] Extension renegotiation_info, renegotiated_connection:
    [ 2] ***
    [ 2] %% Initialized: [Session-7, TLS_RSA_WITH_AES_256_CBC_SHA]
    [ 2] ** TLS_RSA_WITH_AES_256_CBC_SHA
    [ 2] *** Certificate chain
    [ 2] chain [0] = [
    [ 2] [
    [ 2] Version: V3
    [ 2] Subject: EMAILADDRESS=duty.sysprog@bankwest.com.au, CN=bbbb.mps2.bankwest.com, OU=BWA Group Services Pty Ltd, O=Commonwealth Bank of Australia, L=Perth, ST=WA, C=AU
    [ 2] Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5
    [ 2]
    [ 2] Key: Sun RSA public key, 2048 bits
    [ 2] modulus: 26440769111413576055346839927364392822027480382790481478154498185491321589829289662408844753951890388938985607312352111414251608577990009729445664992742403913155746840181967655356518558322629282182583615689380822595800210339328637885490480860545027038715111210571037622416127220560351150048294136574846346365791587173066371523198548147310260273352942815933864283398318401632092577707597452700338537719827614956958594507443530072095300695973883457133934160204107666396622875131539050578776316876089050918544752977206314745801342895873881627784166265682182434552424151460241666993656198380889999487666985386934137244429
    [ 2] public exponent: 65537
    [ 2] Validity: [From: Wed May 20 09:24:59 AWST 2015,
    [ 2] To: Sat May 19 09:24:59 AWST 2018]
    [ 2] Issuer: CN=Bankwest Web Enrolment CA, O=Bank of Western Australia Ltd, C=AU
    [ 2] SerialNumber: [ 6f1973df 00000000 03d5]
    [ 2]
    [ 2] Certificate Extensions: 9
    [ 2] [1]: ObjectId: 1.3.6.1.4.1.311.21.10 Criticality=false
    [ 2] Extension unknown: DER encoded OCTET string =
    [ 2] 0000: 04 1A 30 18 30 0A 06 08 2B 06 01 05 05 07 03 02 ..0.0...+.......
    [ 2] 0010: 30 0A 06 08 2B 06 01 05 05 07 03 01 0...+.......
    [ 2]
    [ 2]
    [ 2] [2]: ObjectId: 1.3.6.1.4.1.311.21.7 Criticality=false
    [ 2] Extension unknown: DER encoded OCTET string =
    [ 2] 0000: 04 30 30 2E 06 26 2B 06 01 04 01 82 37 15 08 83 .00..&+.....7...
    [ 2] 0010: CF D4 7B 81 B8 CB 6E 82 AD 99 1A 85 F2 EB 54 84 ......n.......T.
    [ 2] 0020: 93 E1 4B 18 86 F4 9F 7C 81 AF B9 71 02 01 64 02 ..K........q..d.
    [ 2] 0030: 01 0A ..
    [ 2]
    [ 2]
    [ 2] [3]: ObjectId: 1.3.6.1.5.5.7.1.1 Criticality=false
    [ 2] AuthorityInfoAccess [
    [ 2] [
    [ 2] accessMethod: caIssuers
    [ 2] accessLocation: URIName: ldap:///CN=Bankwest%20Web%20Enrolment%20CA,CN=AIA,CN=Public%20Key%20Services
    [ 2] ,CN=Services,CN=Configuration,DC=rtdomau,DC=local?cACertificate?base?objectClass=certificationAuthority
    [ 2] ,
    [ 2] accessMethod: caIssuers
    [ 2] accessLocation: URIName: http://cdp.rtdomau.local/CertData/CBDCERT004.rtdomau.local_Bankwest%20Web%20Enrolment%20CA.crt
    [ 2] ,
    [ 2] accessMethod: caIssuers
    [ 2] accessLocation: URIName: http://cbdcert004.rtdomau.local/CertEnroll/CBDCERT004.rtdomau.local_Bankwest%20Web%20Enrolment%20CA.crt
    [ 2] ]
    [ 2] ]
    [ 2]
    [ 2] [4]: ObjectId: 2.5.29.35 Criticality=false
    [ 2] AuthorityKeyIdentifier [
    [ 2] KeyIdentifier [
    [ 2] 0000: D1 AA C0 AE 25 4F 6D 98 66 E0 EF 60 43 BF 85 6D ....%Om.f..`C..m
    [ 2] 0010: 81 8E 60 0B ..`.
    [ 2] ]
    [ 2] ]
    [ 2]
    [ 2] [5]: ObjectId: 2.5.29.31 Criticality=false
    [ 2] CRLDistributionPoints [
    [ 2] [DistributionPoint:
    [ 2] [URIName: ldap:///CN=Bankwest%20Web%20Enrolment%20CA,CN=CBDCERT004,CN=CDP,CN=Public%20Key%20Services,CN=Services,CN=Configuration,DC=rtdomau,DC=local?certificateRevocationList?base?objectClass=cRLDistributionPoint, URIName: http://cdp.rtdomau.local/CertData/Bankwest%20Web%20Enrolment%20CA.crl]
    [ 2] ]]
    [ 2]
    [ 2] [6]: ObjectId: 2.5.29.37 Criticality=false
    [ 2] ExtendedKeyUsages [
    [ 2] clientAuth
    [ 2] serverAuth
    [ 2] ]
    [ 2]
    [ 2] [7]: ObjectId: 2.5.29.15 Criticality=false
    [ 2] KeyUsage [
    [ 2] DigitalSignature
    [ 2] Key_Encipherment
    [ 2] Data_Encipherment
    [ 2] ]
    [ 2]
    [ 2] [8]: ObjectId: 2.5.29.17 Criticality=false
    [ 2] SubjectAlternativeName [
    [ 2] DNSName: bbbb.mps2.bankwest.com
    [ 2] DNSName: bbbb.bankwest.com
    [ 2] ]
    [ 2]
    [ 2] [9]: ObjectId: 2.5.29.14 Criticality=false
    [ 2] SubjectKeyIdentifier [
    [ 2] KeyIdentifier [
    [ 2] 0000: 25 85 82 DD 97 13 E6 94 6B 67 A2 F8 0B 2A 40 E9 %.......kg...*@.
    [ 2] 0010: DB 52 22 C8 .R".
    [ 2] ]
    [ 2] ]
    [ 2]
    [ 2] ]
    [ 2] Algorithm: [SHA1withRSA]
    [ 2] Signature:
    [ 2] 0000: 67 14 99 DF F5 34 2B CF 6C 89 44 34 ED 2C 8F 93 g....4+.l.D4.,..
    [ 2] 0010: 4E 51 2E 05 77 18 2A A9 7C 04 0D BA DD 37 D6 45 NQ..w.*......7.E
    [ 2] 0020: 96 95 07 56 84 23 40 C0 91 1C 30 A3 5B DA 20 18 ...V.#@...0.[. .
    [ 2] 0030: 99 B6 D0 F9 EF ED F7 9A A8 A2 27 16 9D 61 9E 2D ..........'..a.-
    [ 2] 0040: 55 43 18 A8 39 C8 BD B2 90 FA 0F 41 9D 79 C0 E6 UC..9......A.y..
    [ 2] 0050: 4F 7F 2E 7F 17
    [ 2] 81 32 9E 18 D8 F2 57 05 16 21 95 O.....2....W..!.
    [ 2] 0060: 44 B8 D0 0A 2D 14 51 A2 18 CD 98 EC 16 19 5C 3F D...-.Q.......\?
    [ 2] 0070: C3 F6 BC A9 9B F9 67 C7 68 34 0E 57 5C 04 78 41 ......g.h4.W\.xA
    [ 2] 0080: 96 0B 4F 01 74 D7 7E F7 B7 11 F0 99 2C 69 72 4C ..O.t.......,irL
    [ 2] 0090: 7E 8D 4E 81 C3 1C 79 3D 1A B6 BB 45 02 73 23 87 ..N...y=...E.s#.
    [ 2] 00A0: 63 AF 65 DF 99 AE F1 8D D6 BF D6 73 88 51 6B 32 c.e........s.Qk2
    [ 2] 00B0: CF B0 B7 D5 87 74 78 F5 C2 66 23 B6 B0 57 EE C2 .....tx..f#..W..
    [ 2] 00C0: EE E2 50 25 08 2C 60 EA 4D DA 6B 5A C7 AA 3D E2 ..P%.,`.M.kZ..=.
    [ 2] 00D0: 65 FD 97 C0 C6 29 05 3B CA C8 5B F6 D9 67 20 4B e....).;..[..g K
    [ 2] 00E0: DC A8 FF 98 9C C2 B1 BA 36 CB E8 96 E0 12 26 EE ........6.....&.
    [ 2] 00F0: E0 69 07 9C 68 0E 38 C3 1F 2D 4D FB 2B 1F 27 A9 .i..h.8..-M.+.'.
    [ 2]
    [ 2] ]
    [ 2] ***
    [ 2] *** CertificateRequest
    [ 2] Cert Types: RSA, DSS, ECDSA
    [ 2] Cert Authorities:
    [ 2] <emailaddress=duty.sysprog@bankwest.com.au, cn="bbbb.mps2.bankwest.com," ou="BWA" group="" services="" pty="" ltd,="" o="Commonwealth" bank="" of="" australia,="" l="Perth," st="WA," c="AU">
    [ 2] <cn=bankwest root="" ca,="" o="Bank" of="" western="" australia="" ltd,="" c="AU">
    [ 2] *** ServerHelloDone
    [ 2] *** Certificate chain
    [ 2] chain [0] = [
    [ 2] [
    [ 2] Version: V3
    [ 2] Subject: CN=Lisa, OU=Lisa, O=Lisa, L=Dallas, ST=Texas, C=US, EMAILADDRESS=support@itko.com
    [ 2] Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5
    [ 2]
    [ 2] Key: Sun RSA public key, 1024 bits
    [ 2] modulus: 107577342571485428802393728049184265786056348388364405824138117397977455761833138845329880593678805610027793821217939298848284286683543926634250841496293888229172692948746730869670908754188073542091973621265074265583182385560072567366227383567380577316296862528343858318946945517967854106447414857653511333997
    [ 2] public exponent: 65537
    [ 2] Validity: [From: Sat Aug 21 00:07:30 AWST 2010,
    [ 2] To: Wed Jan 06 00:07:30 AWST 2038]
    [ 2] Issuer: CN=Lisa, OU=Lisa, O=Lisa, L=Dallas, ST=Texas, C=US, EMAILADDRESS=support@itko.com
    [ 2] SerialNumber: [ 4c6ea842]
    [ 2]
    [ 2] ]
    [ 2] Algorithm: [SHA1withRSA]
    [ 2] Signature:
    [ 2] 0000: 2B 7F 77 08 DE 2F 74 E3 CD 0F 58 D8 57 D9 08 2E +.w../t...X.W...
    [ 2] 0010: AC 57 A7 02 81 07 B7 F8 5B 68 AE 22 22 C6 75 EE .W......[h."".u.
    [ 2] 0020: C2 41 B6 23 DE ED 17 F8 21 AE 3B ED B6 EA 1A 17 .A.#....!.;.....
    [ 2] 0030: A4 5F 95 FD BE AE 74 DA 75 64 19 D6 60 0A 63 61 ._....t.ud..`.ca
    [ 2] 0040: B6 2A E1 FB 06 C5 36 E5 00 0C EB 20 EF FA 82 29 .*....6.... ...)
    [ 2] 0050: 40 39 EA 61 3A 27 CF 4F 00 18 33 E8 31 4C E4 C5 @9.a:'.O..3.1L..
    [ 2] 0060: 44 98 60 15 80 FE 85 FB BF BD 95 AB 35 14 F7 16 D.`.........5...
    [ 2] 0070: 9D 58 F5 26 10 B7 76 7D 43 20 A7 4B F4 ED EE CF .X.&..v.C .K....
    [ 2]
    [ 2] ]
    [ 2] ***
    [ 2] *** ClientKeyExchange, RSA PreMasterSecret, TLSv1
    [ 2] ProcDlgThreadCallbk@2ce54912, WRITE: TLSv1 Handshake, length = 899
    [ 2] SESSION KEYGEN:
    [ 2] PreMaster Secret:
    [ 2] 0000: 03 03 7B B9 84 DA FE 8F B6 34 67 54 0B A3 EA 8F .........4gT....
    [ 2] 0010: 7B 9D 16 D9 6D 88 F4 26 5B 9F 88 8F 11 9E F1 A2 ....m..&[.......
    [ 2] 0020: 61 AA 2B A1 36 16 F3 71 D8 4C 4F 8F 9F 27 1D F7 a.+.6..q.LO..'..
    [ 2] CONNECTION KEYGEN:
    [ 2] Client Nonce:
    [ 2] 0000: 5A A0 F5 D2 9E 56 03 34 AA F9 31 67 70 13 77 C7 Z....V.4..1gp.w.
    [ 2] 0010: 4F 41 4B DD 94 3D 92 86 6C 34 3A 45 93 A5 01 DB OAK..=..l4:E....
    [ 2] Server Nonce:
    [ 2] 0000: 5A A0 F5 D2 A2 AB A4 4B 19 66 4E DE AF 67 F4 12 Z......K.fN..g..
    [ 2] 0010: B9 C4 CE A0 A3 CE DD 15 59 E7 7E 41 AF AA 37 8F ........Y..A..7.
    [ 2] Master Secret:
    [ 2] 0000: 24 E3 BF 6A DE 60 3A 94 E2 1C 90 8F 09 71 C5 7D $..j.`:......q..
    [ 2] 0010: 9E 0A EB 3A CA 84 3F AC F9 33 56 D8 DB 00 07 3C ...:..?..3V....<
    [ 2] 0020: C7 DD 64 62 1F F1 09 74 86 3B 74 4B 00 B8 0C B5 ..db...t.;tK....
    [ 2] Client MAC write Secret:
    [ 2] 0000: A1 6F 8D 4D 50 BC 14 1C 18 5C C5 F5 7A 75 CE 26 .o.MP....\..zu.&
    [ 2] 0010: 0B 97 2C 22 ..,"
    [ 2] Server MAC write Secret:
    [ 2] 0000: 49 90 D6 EA 25 B7 17 A1 5E 1E 70 92 19 62 40 94 I...%...^.p..b@.
    [ 2] 0010: 5F 71 0F BA _q..
    [ 2] Client write key:
    [ 2] 0000: 99 07 B9 F5 23 F5 52 0F E3 66 0A 42 4F E6 93 E1 ....#.R..f.BO...
    [ 2] 0010: 32 29 89 EE 81 E9 4B 14 0B 33 BA 98 51 69 25 FA 2)....K..3..Qi%.
    [ 2] Server write key:
    [ 2] 0000: 21 DC 53 A4 F4 6A 18 51 B1 BD 82 D3 9F EE 54 75 !.S..j.Q......Tu
    [ 2] 0010: E2 1D D8 98 EE 2B E0 57 79 A4 6F B7 DF A5 E8 E9 .....+.Wy.o.....
    [ 2] Client write IV:
    [ 2] 0000: 4B 39 1F CF 3D D1 0F C2 ED 40 C9 65 B7 55 A9 A7 K9..=....@.e.U..
    [ 2] Server write IV:
    [ 2] 0000: 48 C5 60 B1 30 2C C8 57 05 31 4E 90 E9 6C 1D 7E H.`.0,.W.1N..l..
    [ 2] *** CertificateVerify
    [ 2] ProcDlgThreadCallbk@2ce54912, WRITE: TLSv1 Handshake, length = 134
    [ 2] ProcDlgThreadCallbk@2ce54912, WRITE: TLSv1 Change Cipher Spec, length = 1
    [ 2] *** Finished
    [ 2] [SSL Handshake Summary] Thread [ProcDlgThreadCallbk@2ce54912]
    [ 2] [SSL Handshake Summary] Acting as a Client
    [ 2] [SSL Handshake Summary] *†‡ indicates linked optional steps
    [ 2] [SSL Handshake Summary]
    [ 2] [SSL Handshake Summary] 1 RUN Client Hello -->
    [ 2] [SSL Handshake Summary] 2 RUN <-- Server Hello
    [ 2] [SSL Handshake Summary] 3* RUN <-- Server Certificate (Public Key)
    [ 2] [SSL Handshake Summary] 4† RUN <-- Request Client Certificate
    [ 2] [SSL Handshake Summary] 5* UNKNOWN Verify and Trust Server Certificate v
    [ 2] [SSL Handshake Summary] 6‡ SKIPPED <-- Server Key Exchange
    [ 2] [SSL Handshake Summary] 7 RUN <-- Server Hello Done
    [ 2] [SSL Handshake Summary] 8† RUN Client Certificate (Public Key) -->
    [ 2] [SSL Handshake Summary] 9† ASSUMED v Verify and Trust Client Certificate
    [ 2] [SSL Handshake Summary] 10 RUN Client Key Exchange -->
    [ 2] [SSL Handshake Summary] 11† RUN Certificate Verify Confirmation -->
    [ 2] [SSL Handshake Summary] 12 RUN Client Change Cipher Spec -->
    [ 2] [SSL Handshake Summary] 13 RUN Client Finished -->
    [ 2] [SSL Handshake Summary] 14 RUN <-- Server Change Cipher Spec
    [ 2] [SSL Handshake Summary] 15 RUN <-- Server Finished
    [ 2] [SSL Handshake Summary]
    [ 2] [SSL Handshake Summary] SEND TLSv1 ALERT: fatal, description = unexpected_message
    [ 2] [SSL Handshake Summary] java.net.SocketException: Software caused connection abort: socket write error
    [ 2] [SSL Handshake Summary] See Alert or Exception for details
    [ 2] verify_data: { 188, 57, 213, 25, 60, 187, 34, 197, 102, 19, 135, 7 }
    [ 2] ***
    [ 2] ProcDlgThreadCallbk@2ce54912, WRITE: TLSv1 Handshake, length = 48
    [ 2] ProcDlgThreadCallbk@2ce54912, waiting for close_notify or alert: state 1
    [ 2] ProcDlgThreadCallbk@2ce54912, Exception while waiting for close java.net.SocketException: Software caused connection abort: recv failed
    [ 2] ProcDlgThreadCallbk@2ce54912, handling exception: java.net.SocketException: Software caused connection abort: recv failed
    [ 2] %% Invalidated: [Session-7, TLS_RSA_WITH_AES_256_CBC_SHA]
    [ 2] ProcDlgThreadCallbk@2ce54912, SEND TLSv1 ALERT: fatal, description = unexpected_message
    [ 2] ProcDlgThreadCallbk@2ce54912, WRITE: TLSv1 Alert, length = 32
    [ 2] ProcDlgThreadCallbk@2ce54912, Exception sending alert: java.net.SocketException: Software caused connection abort: socket write error
    [ 2] ProcDlgThreadCallbk@2ce54912, called closeSocket()
    [ 2] ProcDlgThreadCallbk@2ce54912, setSoTimeout(180000) called
    [ 2] Allow unsafe renegotiation: false
    [ 2] Allow legacy hello messages: true
    [ 2] Is initial handshake: true
    [ 2] Is secure renegotiation: false
    [ 2] Ignoring disabled protocol: SSLv3
    [ 2] Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1
    [ 2] Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLSv1
    [ 2] Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 for TLSv1
    [ 2] Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1
    [ 2] Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 for TLSv1
    [ 2] Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1
    [ 2] Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1
    [ 2] Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1.1
    [ 2] Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLSv1.1
    [ 2] Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1
    [ 2] Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1.1
    [ 2] Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 for TLSv1.1
    [ 2] Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1
    [ 2] Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1.1
    [ 2] %% No cached client session
    [ 2] *** ClientHello, TLSv1.2
    [ 2] RandomCookie: GMT: 1503655122 bytes = { 214, 203, 47, 6, 26, 120, 231, 49, 34, 113, 12, 165, 38, 29, 45, 225, 3, 141, 150, 239, 11, 133, 104, 123, 126, 189, 108, 21 }
    [ 2] Session ID: {}
    [ 2] Cipher Suites: [TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384, TLS_RSA_WITH_AES_256_CBC_SHA256, TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384, TLS_DHE_RSA_WITH_AES_256_CBC_SHA256, TLS_DHE_DSS_WITH_AES_256_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDH_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_DSS_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256, TLS_RSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_DSS_WITH_AES_128_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, TLS_RSA_WITH_AES_256_GCM_SHA384, TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, TLS_DHE_DSS_WITH_AES_256_GCM_SHA384, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_DSS_WITH_AES_128_GCM_SHA256, TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA, TLS_EMPTY_RENEGOTIATION_INFO_SCSV, TLS_DH_anon_WITH_AES_256_GCM_SHA384, TLS_DH_anon_WITH_AES_128_GCM_SHA256, TLS_DH_anon_WITH_AES_256_CBC_SHA256, TLS_ECDH_anon_WITH_AES_256_CBC_SHA, TLS_DH_anon_WITH_AES_256_CBC_SHA, TLS_DH_anon_WITH_
    [ 2] AES_128_CBC_SHA256, TLS_ECDH_anon_WITH_AES_128_CBC_SHA, TLS_DH_anon_WITH_AES_128_CBC_SHA, TLS_ECDH_anon_WITH_3DES_EDE_CBC_SHA, SSL_DH_anon_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_DES_CBC_SHA, SSL_DHE_RSA_WITH_DES_CBC_SHA, SSL_DHE_DSS_WITH_DES_CBC_SHA, SSL_DH_anon_WITH_DES_CBC_SHA, SSL_RSA_EXPORT_WITH_DES40_CBC_SHA, SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA, SSL_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA, SSL_DH_anon_EXPORT_WITH_DES40_CBC_SHA, TLS_RSA_WITH_NULL_SHA256, TLS_ECDHE_ECDSA_WITH_NULL_SHA, TLS_ECDHE_RSA_WITH_NULL_SHA, SSL_RSA_WITH_NULL_SHA, TLS_ECDH_ECDSA_WITH_NULL_SHA, TLS_ECDH_RSA_WITH_NULL_SHA, TLS_ECDH_anon_WITH_NULL_SHA, SSL_RSA_WITH_NULL_MD5, TLS_KRB5_WITH_3DES_EDE_CBC_SHA, TLS_KRB5_WITH_3DES_EDE_CBC_MD5, TLS_KRB5_WITH_DES_CBC_SHA, TLS_KRB5_WITH_DES_CBC_MD5, TLS_KRB5_EXPORT_WITH_DES_CBC_40_SHA, TLS_KRB5_EXPORT_WITH_DES_CBC_40_MD5]
    [ 2] Compression Methods: { 0 }
    [ 2] Extension elliptic_curves, curve names: {secp256r1, sect163k1, sect163r2, secp192r1, secp224r1, sect233k1, sect233r1, sect283k1, sect283r1, secp384r1, sect409k1, sect409r1, secp521r1, sect571k1, sect571r1, secp160k1, secp160r1, secp160r2, sect163r1, secp192k1, sect193r1, sect193r2, secp224k1, sect239k1, secp256k1}
    [ 2] Extension ec_point_formats, formats: [uncompressed]
    [ 2] Extension signature_algorithms, signature_algorithms: SHA512withECDSA, SHA512withRSA, SHA384withECDSA, SHA384withRSA, SHA256withECDSA, SHA256withRSA, SHA256withDSA, SHA1withECDSA, SHA1withRSA, SHA1withDSA
    [ 2] ***
    [ 2] ProcDlgThreadCallbk@2ce54912, WRITE: TLSv1.2 Handshake, length = 297
    [ 2] ProcDlgThreadCallbk@2ce54912, READ: TLSv1 Handshake, length = 2348
    [ 2] *** ServerHello, TLSv1
    [ 2] RandomCookie: GMT: 1503655122 bytes = { 7, 39, 142, 70, 70, 242, 19, 74, 60, 236, 140, 10, 116, 104, 155, 201, 23, 176, 38, 111, 21, 9, 147, 241, 54, 184, 24, 132 }
    [ 2] Session ID: {90, 160, 245, 210, 44, 207, 116, 203, 161, 106, 125, 244, 205, 215, 167, 192, 214, 133, 18, 127, 215, 198, 101, 16, 219, 10, 254, 36, 14, 199, 202, 129}
    [ 2] Cipher Suite: TLS_RSA_WITH_AES_256_CBC_SHA
    [ 2] Compression Method: 0
    [ 2] Extension renegotiation_info, renegotiated_connection:
    [ 2] ***
    [ 2] %% Initialized: [Session-8, TLS_RSA_WITH_AES_256_CBC_SHA]
    [ 2] ** TLS_RSA_WITH_AES_256_CBC_SHA
    [ 2] *** Certificate chain
    [ 2] chain [0] = [
    [ 2] [
    [ 2] Version: V3
    [ 2] Subject: EMAILADDRESS=duty.sysprog@bankwest.com.au, CN=bbbb.mps2.bankwest.com, OU=BWA Group Services Pty Ltd, O=Commonwealth Bank of Australia, L=Perth, ST=WA, C=AU
    [ 2] Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5
    [ 2]
    [ 2] Key: Sun RSA public key, 2048 bits
    [ 2] modulus: 26440769111413576055346839927364392822027480382790481478154498185491321589829289662408844753951890388938985607312352111414251608577990009729445664992742403913155746840181967655356518558322629282182583615689380822595800210339328637885490480860545027038715111210571037622416127220560351150048294136574846346365791587173066371523198548147310260273352942815933864283398318401632092577707597452700338537719827614956958594507443530072095300695973883457133934160204107666396622875131539050578776316876089050918544752977206314745801342895873881627784166265682182434552424151460241666993656198380889999487666985386934137244429
    [ 2] public exponent: 65537
    [ 2] Validity: [From: Wed May 20 09:24:59 AWST 2015,
    [ 2] To: Sat May 19 09:24:59 AWST 2018]
    [ 2] Issuer: CN=Bankwest Web Enrolment CA, O=Bank of Western Australia Ltd, C=AU
    [ 2] SerialNumber: [ 6f1973df 00000000 03d5]
    [ 2]
    [ 2] Certificate Extensions: 9
    [ 2] [1]: ObjectId: 1.3.6.1.4.1.311.21.10 Criticality=false
    [ 2] Extension unknown: DER encoded OCTET string =
    [ 2] 0000: 04 1A 30 18 30 0A 06 08 2B 06 01 05 05 07 03 02 ..0.0...+.......
    [ 2] 0010: 30 0A 06 08 2B 06 01 05 05 07 03 01 0...+.......
    [ 2]
    [ 2]
    [ 2] [2]: ObjectId: 1.3.6.1.4.1.311.21.7 Criticality=false
    [ 2] Extension unknown: DER encoded OCTET string =
    [ 2] 0000: 04 30 30 2E 06 26 2B 06 01 04 01 82 37 15 08 83 .00..&+.....7...
    [ 2] 0010: CF D4 7B 81 B8 CB 6E 82 AD 99 1A 85 F2 EB 54 84 ......n.......T.
    [ 2] 0020: 93 E1 4B 18 86 F4 9F 7C 81 AF B9 71 02 01 64 02 ..K........q..d.
    [ 2] 0030: 01 0A ..
    [ 2]
    [ 2]
    [ 2] [3]: ObjectId: 1.3.6.1.5.5.7.1.1 Criticality=false
    [ 2] AuthorityInfoAccess [
    [ 2] [
    [ 2] accessMethod: caIssuers
    [ 2] accessLocation: URIName: ldap:///CN=Bankwest%20Web%20Enrolment%20CA,CN=AIA,CN=Public%20Key%20Services
    [ 2] ,CN=Services,CN=Configuration,DC=rtdomau,DC=local?cACertificate?base?objectClass=certificationAuthority
    [ 2] ,
    [ 2] accessMethod: caIssuers
    [ 2] accessLocation: URIName: http://cdp.rtdomau.local/CertData/CBDCERT004.rtdomau.local_Bankwest%20Web%20Enrolment%20CA.crt
    [ 2] ,
    [ 2] accessMethod: caIssuers
    [ 2] accessLocation: URIName: http://cbdcert004.rtdomau.local/CertEnroll/CBDCERT004.rtdomau.local_Bankwest%20Web%20Enrolment%20CA.crt
    [ 2] ]
    [ 2] ]
    [ 2]
    [ 2] [4]: ObjectId: 2.5.29.35 Criticality=false
    [ 2] AuthorityKeyIdentifier [
    [ 2] KeyIdentifier [
    [ 2] 0000: D1 AA C0 AE 25 4F 6D 98 66 E0 EF 60 43 BF 85 6D ....%Om.f..`C..m
    [ 2] 0010: 81 8E 60 0B ..`.
    [ 2] ]
    [ 2] ]
    [ 2]
    [ 2] [5]: ObjectId: 2.5.29.31 Criticality=false
    [ 2] CRLDistributionPoints [
    [ 2] [DistributionPoint:
    [ 2] [URIName: ldap:///CN=Bankwest%20Web%20Enrolment%20CA,CN=CBDCERT004,CN=CDP,CN=Public%20Key%20Services,CN=Services,CN=Configuration,DC=rtdomau,DC=local?certificateRevocationList?base?objectClass=cRLDistributionPoint, URIName: http://cdp.rtdomau.local/CertData/Bankwest%20Web%20Enrolment%20CA.crl]
    [ 2] ]]
    [ 2]
    [ 2] [6]: ObjectId: 2.5.29.37 Criticality=false
    [ 2] ExtendedKeyUsages [
    [ 2] clientAuth
    [ 2] serverAuth
    [ 2] ]
    [ 2]
    [ 2] [7]: ObjectId: 2.5.29.15 Criticality=false
    [ 2] KeyUsage [
    [ 2] DigitalSignature
    [ 2] Key_Encipherment
    [ 2] Data_Encipherment
    [ 2] ]
    [ 2]
    [ 2] [8]: ObjectId: 2.5.29.17 Criticality=false
    [ 2] SubjectAlternativeName [
    [ 2] DNSName: bbbb.mps2.bankwest.com
    [ 2] DNSName: bbbb.bankwest.com
    [ 2] ]
    [ 2]
    [ 2] [9]: ObjectId: 2.5.29.14 Criticality=false
    [ 2] SubjectKeyIdentifier [
    [ 2] KeyIdentifier [
    [ 2] 0000: 25 85 82 DD 97 13 E6 94 6B 67 A2 F8 0B 2A 40 E9 %.......kg...*@.
    [ 2] 0010: DB 52 22 C8 .R".
    [ 2] ]
    [ 2] ]
    [ 2]
    [ 2] ]
    [ 2] Algorithm: [SHA1withRSA]
    [ 2] Signature:
    [ 2] 0000: 67 14 99 DF F5 34 2B CF 6C 89 44 34 ED 2C 8F 93 g....4+.l.D4.,..
    [ 2] 0010: 4E 51 2E 05 77 18 2A A9 7C 04 0D BA DD 37 D6 45 NQ..w.*......7.E
    [ 2] 0020: 96 95 07 56 84 23 40 C0 91 1C 30 A3 5B DA 20 18 ...V.#@...0.[. .
    [ 2] 0030: 99 B6 D0 F9 EF ED F7 9A A8 A2 27 16 9D 61 9E 2D ..........'..a.-
    [ 2] 0040: 55 43 18 A8 39 C8 BD B2 90 FA 0F 41 9D 79 C0 E6 UC..9......A.y..
    [ 2] 0050: 4F 7F 2E 7F 17
    [ 2] 81 32 9E 18 D8 F2 57 05 16 21 95 O.....2....W..!.
    [ 2] 0060: 44 B8 D0 0A 2D 14 51 A2 18 CD 98 EC 16 19 5C 3F D...-.Q.......\?
    [ 2] 0070: C3 F6 BC A9 9B F9 67 C7 68 34 0E 57 5C 04 78 41 ......g.h4.W\.xA
    [ 2] 0080: 96 0B 4F 01 74 D7 7E F7 B7 11 F0 99 2C 69 72 4C ..O.t.......,irL
    [ 2] 0090: 7E 8D 4E 81 C3 1C 79 3D 1A B6 BB 45 02 73 23 87 ..N...y=...E.s#.
    [ 2] 00A0: 63 AF 65 DF 99 AE F1 8D D6 BF D6 73 88 51 6B 32 c.e........s.Qk2
    [ 2] 00B0: CF B0 B7 D5 87 74 78 F5 C2 66 23 B6 B0 57 EE C2 .....tx..f#..W..
    [ 2] 00C0: EE E2 50 25 08 2C 60 EA 4D DA 6B 5A C7 AA 3D E2 ..P%.,`.M.kZ..=.
    [ 2] 00D0: 65 FD 97 C0 C6 29 05 3B CA C8 5B F6 D9 67 20 4B e....).;..[..g K
    [ 2] 00E0: DC A8 FF 98 9C C2 B1 BA 36 CB E8 96 E0 12 26 EE ........6.....&.
    [ 2] 00F0: E0 69 07 9C 68 0E 38 C3 1F 2D 4D FB 2B 1F 27 A9 .i..h.8..-M.+.'.
    [ 2]
    [ 2] ]
    [ 2] ***
    [ 2] *** CertificateRequest
    [ 2] Cert Types: RSA, DSS, ECDSA
    [ 2] Cert Authorities:
    [ 2] <emailaddress=duty.sysprog@bankwest.com.au, cn="bbbb.mps2.bankwest.com," ou="BWA" group="" services="" pty="" ltd,="" o="Commonwealth" bank="" of="" australia,="" l="Perth," st="WA," c="AU">
    [ 2] <cn=bankwest root="" ca,="" o="Bank" of="" western="" australia="" ltd,="" c="AU">
    [ 2] *** ServerHelloDone
    [ 2] *** Certificate chain
    [ 2] chain [0] = [
    [ 2] [
    [ 2] Version: V3
    [ 2] Subject: CN=Lisa, OU=Lisa, O=Lisa, L=Dallas, ST=Texas, C=US, EMAILADDRESS=support@itko.com
    [ 2] Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5
    [ 2]
    [ 2] Key: Sun RSA public key, 1024 bits
    [ 2] modulus: 107577342571485428802393728049184265786056348388364405824138117397977455761833138845329880593678805610027793821217939298848284286683543926634250841496293888229172692948746730869670908754188073542091973621265074265583182385560072567366227383567380577316296862528343858318946945517967854106447414857653511333997
    [ 2] public exponent: 65537
    [ 2] Validity: [From: Sat Aug 21 00:07:30 AWST 2010,
    [ 2] To: Wed Jan 06 00:07:30 AWST 2038]
    [ 2] Issuer: CN=Lisa, OU=Lisa, O=Lisa, L=Dallas, ST=Texas, C=US, EMAILADDRESS=support@itko.com
    [ 2] SerialNumber: [ 4c6ea842]
    [ 2]
    [ 2] ]
    [ 2] Algorithm: [SHA1withRSA]
    [ 2] Signature:
    [ 2] 0000: 2B 7F 77 08 DE 2F 74 E3 CD 0F 58 D8 57 D9 08 2E +.w../t...X.W...
    [ 2] 0010: AC 57 A7 02 81 07 B7 F8 5B 68 AE 22 22 C6 75 EE .W......[h."".u.
    [ 2] 0020: C2 41 B6 23 DE ED 17 F8 21 AE 3B ED B6 EA 1A 17 .A.#....!.;.....
    [ 2] 0030: A4 5F 95 FD BE AE 74 DA 75 64 19 D6 60 0A 63 61 ._....t.ud..`.ca
    [ 2] 0040: B6 2A E1 FB 06 C5 36 E5 00 0C EB 20 EF FA 82 29 .*....6.... ...)
    [ 2] 0050: 40 39 EA 61 3A 27 CF 4F 00 18 33 E8 31 4C E4 C5 @9.a:'.O..3.1L..
    [ 2] 0060: 44 98 60 15 80 FE 85 FB BF BD 95 AB 35 14 F7 16 D.`.........5...
    [ 2] 0070: 9D 58 F5 26 10 B7 76 7D 43 20 A7 4B F4 ED EE CF .X.&..v.C .K....
    [ 2]
    [ 2] ]
    [ 2] ***
    [ 2] *** ClientKeyExchange, RSA PreMasterSecret, TLSv1
    [ 2] ProcDlgThreadCallbk@2ce54912, WRITE: TLSv1 Handshake, length = 899
    [ 2] SESSION KEYGEN:
    [ 2] PreMaster Secret:
    [ 2] 0000: 03 03 5B FB 01 8E 6F 3B 13 7C 24 9F 38 B4 CD E5 ..[...o;..$.8...
    [ 2] 0010: 60 E9 8A 85 66 49 36 FC 9B 99 64 6D B8 3C E4 4A `...fI6...dm.<.J
    [ 2] 0020: 6C D4 88 A1 D5 E6 B8 A4 63 F9 2E 76 75 F5 AB 85 l.......c..vu...
    [ 2] CONNECTION KEYGEN:
    [ 2] Client Nonce:
    [ 2] 0000: 5A A0 F5 D2 D6 CB 2F 06 1A 78 E7 31 22 71 0C A5 Z...../..x.1"q..
    [ 2] 0010: 26 1D 2D E1 03 8D 96 EF 0B 85 68 7B 7E BD 6C 15 &.-.......h...l.
    [ 2] Server Nonce:
    [ 2] 0000: 5A A0 F5 D2 07 27 8E 46 46 F2 13 4A 3C EC 8C 0A Z....'.FF..J<...
    [ 2] 0010: 74 68 9B C9 17 B0 26 6F 15 09 93 F1 36 B8 18 84 th....&o....6...
    [ 2] Master Secret:
    [ 2] 0000: 79 7E F2 7D 9A EC DB 1D 09 DB 4A 3A 23 1E C9 EC y.........J:#...
    [ 2] 0010: 61 14 A6 85 83 35 CA 01 F9 B3 B2 3E D2 17 77 F0 a....5.....>..w.
    [ 2] 0020: 19 79 16 30 37 7E 83 06 4C E8 D0 16 C9 B8 63 FB .y.07...L.....c.
    [ 2] Client MAC write Secret:
    [ 2] 0000: BF 80 B3 B5 40 CD 29 54 EA 89 FD 7D 2C 60 2E 54 ....@.)T....,`.T
    [ 2] 0010: BD 7D A7 0D ....
    [ 2] Server MAC write Secret:
    [ 2] 0000: 41 16 64 60 A8 AC E4 B5 A6 F4 D4 13 02 43 B7 A5 A.d`.........C..
    [ 2] 0010: 7E 64 CF 61 .d.a
    [ 2] Client write key:
    [ 2] 0000: 2A 41 3D D7 E7 27 7F 50 93 A8 5D 49 D1 D7 60 C9 *A=..'.P..]I..`.
    [ 2] 0010: 14 D8 9E 54 F9 50 6D 82 74 16 A1 14 A5 D0 A9 BE ...T.Pm.t.......
    [ 2] Server write key:
    [ 2] 0000: D6 65 BD C5 44 65 16 1E AD C3 FC 5E B2 4B B6 B9 .e..De.....^.K..
    [ 2] 0010: 6C FB 91 F4 6D 45 F7 C5 E2 40 45 94 00 C8 66 7A l...mE...@E...fz
    [ 2] Client write IV:
    [ 2] 0000: 7D CB E2 95 C9 46 1A D8 AA B9 1B 83 2C 32 8F 9F .....F......,2..
    [ 2] Server write IV:
    [ 2] 0000: ED A7 7D 83 E9 34 BD CE EA 61 94 0A E5 03 AE 57 .....4...a.....W
    [ 2] *** CertificateVerify
    [ 2] ProcDlgThreadCallbk@2ce54912, WRITE: TLSv1 Handshake, length = 134
    [ 2] ProcDlgThreadCallbk@2ce54912, WRITE: TLSv1 Change Cipher Spec, length = 1
    [ 2] ProcDlgThreadCallbk@2ce54912, handling exception: java.net.SocketException: Software caused connection abort: socket write error
    [ 2] %% Invalidated: [Session-8, TLS_RSA_WITH_AES_256_CBC_SHA]
    [ 2] ProcDlgThreadCallbk@2ce54912, SEND TLSv1 ALERT: fatal, description = unexpected_message
    [ 2] ProcDlgThreadCallbk@2ce54912, WRITE: TLSv1 Alert, length = 2
    [ 2] ProcDlgThreadCallbk@2ce54912, Exception sending alert: java.net.SocketException: Software caused connection abort: socket write error
    [ 2] ProcDlgThreadCallbk@2ce54912, called closeSocket()
    [ 2] ProcDlgThreadCallbk@2ce54912, called close()
    [ 2] ProcDlgThreadCallbk@2ce54912, called closeInternal(true)
    [ 2] [SSL Handshake Summary] Thread [ProcDlgThreadCallbk@2ce54912]
    [ 2] [SSL Handshake Summary] Acting as a Client
    [ 2] [SSL Handshake Summary] *†‡ indicates linked optional steps
    [ 2] [SSL Handshake Summary]
    [ 2] [SSL Handshake Summary] 1 RUN Client Hello -->
    [ 2] [SSL Handshake Summary] 2 RUN <-- Server Hello
    [ 2] [SSL Handshake Summary] 3* RUN <-- Server Certificate (Public Key)
    [ 2] [SSL Handshake Summary] 4† RUN <-- Request Client Certificate
    [ 2] [SSL Handshake Summary] 5* UNKNOWN Verify and Trust Server Certificate v
    [ 2] [SSL Handshake Summary] 6‡ SKIPPED <-- Server Key Exchange
    [ 2] [SSL Handshake Summary] 7 RUN <-- Server Hello Done
    [ 2] [SSL Handshake Summary] 8† RUN Client Certificate (Public Key) -->
    [ 2] [SSL Handshake Summary] 9† UNKNOWN v Verify and Trust Client Certificate
    [ 2] [SSL Handshake Summary] 10 RUN Client Key Exchange -->
    [ 2] [SSL Handshake Summary] 11† RUN Certificate Verify Confirmation -->
    [ 2] [SSL Handshake Summary] 12 RUN Client Change Cipher Spec -->
    [ 2] [SSL Handshake Summary] 13 UNKNOWN Client Finished -->
    [ 2] [SSL Handshake Summary] 14 UNKNOWN <-- Server Change Cipher Spec
    [ 2] [SSL Handshake Summary] 15 UNKNOWN <-- Server Finished
    [ 2] [SSL Handshake Summary]
    [ 2] [SSL Handshake Summary] SEND TLSv1 ALERT: fatal, description = unexpected_message
    [ 2] [SSL Handshake Summary] java.net.SocketException: Software caused connection abort: socket write error
    [ 2] [SSL Handshake Summary] See Alert or Exception for details
    [ 1] Finalizer, called close()
    [ 1] Finalizer, called closeInternal(true)
    [ 1] Finalizer, called close()
    [ 1] Finalizer, called closeInternal(true)
    [ 1] Finalizer, called close()
    [ 1] Finalizer, called closeInternal(true)
    [ 1] Finalizer, called close()
    [ 1] Finalizer, called closeInternal(true)


  • 2.  Re: java.net.SocketException: Software caused connection abort: socket write error

     
    Posted 03-08-2018 11:03 AM

    Hello Jayachandran,

     

    From the information you provided, the endpoint requests a client certificate and it looks like it has to be a certifcate issued by bankwest root:

     

    [ 2] *** CertificateRequest
    [ 2] Cert Types: RSA, DSS, ECDSA
    [ 2] Cert Authorities:

    [ 2] <emailaddress=duty.sysprog@bankwest.com.au, cn="bbbb.mps2.bankwest.com," ou="BWA" group="" services="" pty="" ltd,="" o="Commonwealth" bank="" of="" australia,="" l="Perth," st="WA," c="AU">

    [ 2] <cn=bankwest root="" ca,="" o="Bank" of="" western="" australia="" ltd,="" c="AU">

     

    You probably did not provide any keystore in the local.properties of your Workstation, and DevTest is sending the default keystore delivered with tool:

     

    [ 2] *** Certificate chain
    [ 2] chain [0] = [
    [ 2] [
    [ 2] Version: V3
    [ 2] Subject: CN=Lisa, OU=Lisa, O=Lisa, L=Dallas, ST=Texas, C=US, EMAILADDRESS=support@itko.com

     

    I believe this is why you are not able to proceed with the SSL handshake.

     

    If you have the client keystore, please edit the local.properties of your Workstation and provide the keystore path, password and alias with the properties below:

    ssl.client.cert.path=
    ssl.client.cert.pass=
    ssl.client.key.pass=
    ssl.client.alias=

     

    You will need to restart your Workstation after modifying the local.properties file.

     

    If you do not have the client key, try to contact your server admin.

    If you need to get the keystore file that is being used with DevTest, it is the webreckeys.ks and you will find it under $LISA_HOME/.

     

    Hope it helps.

    Heloisa



  • 3.  Re: java.net.SocketException: Software caused connection abort: socket write error

    Posted 03-09-2018 03:06 AM

    Hi Maria,

     

    Thanks. It is working in LISA 7.5.1. We didn't added any SSL details in local.properties file.

     

    Why it is not working in newer version?

     

    Thanks

    Jay



  • 4.  Re: java.net.SocketException: Software caused connection abort: socket write error

     
    Posted 03-09-2018 10:03 AM

    Hi Jay,

     

    Do you have the same SSL debug log from your 7.5.1 release? If yes, that would be helpful to try to understand the differences.

    Were you able to get the handshake working for 10.2?

     

    Thank you,

    Heloisa



  • 5.  Re: java.net.SocketException: Software caused connection abort: socket write error
    Best Answer

    Posted 03-28-2018 05:25 AM

    Thanks the issue resolved after adding ssl details