[ 6] *** |
[ 6] found key for : lisa |
[ 6] chain [0] = [ |
[ 6] [ |
[ 6] Version: V3 |
[ 6] Subject: CN=Lisa, OU=Lisa, O=Lisa, L=Dallas, ST=Texas, C=US, EMAILADDRESS=support@itko.com |
[ 6] Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5 |
[ 6] |
[ 6] Key: Sun RSA public key, 1024 bits |
[ 6] modulus: 107577342571485428802393728049184265786056348388364405824138117397977455761833138845329880593678805610027793821217939298848284286683543926634250841496293888229172692948746730869670908754188073542091973621265074265583182385560072567366227383567380577316296862528343858318946945517967854106447414857653511333997 |
[ 6] public exponent: 65537 |
[ 6] Validity: [From: Fri Aug 20 11:07:30 CDT 2010, |
[ 6] To: Tue Jan 05 10:07:30 CST 2038] |
[ 6] Issuer: CN=Lisa, OU=Lisa, O=Lisa, L=Dallas, ST=Texas, C=US, EMAILADDRESS=support@itko.com |
[ 6] SerialNumber: [ 4c6ea842] |
[ 6] |
[ 6] ] |
[ 6] Algorithm: [SHA1withRSA] |
[ 6] Signature: |
[ 6] 0000: 2B 7F 77 08 DE 2F 74 E3 CD 0F 58 D8 57 D9 08 2E +.w../t...X.W... |
[ 6] 0010: AC 57 A7 02 81 07 B7 F8 5B 68 AE 22 22 C6 75 EE .W......[h."".u. |
[ 6] 0020: C2 41 B6 23 DE ED 17 F8 21 AE 3B ED B6 EA 1A 17 .A.#....!.;..... |
[ 6] 0030: A4 5F 95 FD BE AE 74 DA 75 64 19 D6 60 0A 63 61 ._....t.ud..`.ca |
[ 6] 0040: B6 2A E1 FB 06 C5 36 E5 00 0C EB 20 EF FA 82 29 .*....6.... ...) |
[ 6] 0050: 40 39 EA 61 3A 27 CF 4F 00 18 33 E8 31 4C E4 C5 @9.a:'.O..3.1L.. |
[ 6] 0060: 44 98 60 15 80 FE 85 FB BF BD 95 AB 35 14 F7 16 D.`.........5... |
[ 6] 0070: 9D 58 F5 26 10 B7 76 7D 43 20 A7 4B F4 ED EE CF .X.&..v.C .K.... |
[ 6] |
[ 6] ] |
[ 6] *** |
[ 6] X509KeyManager passed to SSLContext.init(): need an X509ExtendedKeyManager for SSLEngine use |
[ 6] trigger seeding of SecureRandom |
[ 6] done seeding SecureRandom |
[ 6] Execute REST Node, setSoTimeout(180000) called |
[ 6] Allow unsafe renegotiation: false |
[ 6] Allow legacy hello messages: true |
[ 6] Is initial handshake: true |
[ 6] Is secure renegotiation: false |
[ 6] Ignoring disabled protocol: SSLv3 |
[ 6] %% No cached client session |
[ 6] *** ClientHello, TLSv1.2 |
[ 6] RandomCookie: GMT: 1562619044 bytes = { 167, 167, 109, 104, 205, 7, 98, 254, 144, 100, 34, 184, 50, 254, 117, 22, 38, 73, 102, 44, 84, 54, 156, 246, 50, 210, 96, 165 } |
[ 6] Session ID: {} |
[ 6] Cipher Suites: [TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384, TLS_RSA_WITH_AES_256_CBC_SHA256, TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384, TLS_DHE_RSA_WITH_AES_256_CBC_SHA256, TLS_DHE_DSS_WITH_AES_256_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDH_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_DSS_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256, TLS_RSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_DSS_WITH_AES_128_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, TLS_RSA_WITH_AES_256_GCM_SHA384, TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, TLS_DHE_DSS_WITH_AES_256_GCM_SHA384, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_DSS_WITH_AES_128_GCM_SHA256, TLS_EMPTY_RENEGOTIATION_INFO_SCSV] |
[ 6] Compression Methods: { 0 } |
[ 6] Extension elliptic_curves, curve names: {secp256r1, secp384r1, secp521r1, sect283k1, sect283r1, sect409k1, sect409r1, sect571k1, sect571r1, secp256k1} |
[ 6] Extension ec_point_formats, formats: [uncompressed] |
[ 6] Extension signature_algorithms, signature_algorithms: SHA512withECDSA, SHA512withRSA, SHA384withECDSA, SHA384withRSA, SHA256withECDSA, SHA256withRSA, SHA256withDSA, SHA1withECDSA, SHA1withRSA, SHA1withDSA |
[ 6] Extension extended_master_secret |
[ 6] Extension server_name, server_name: [type=host_name (0), value=sl73epcaapq003.visa.com] |
[ 6] *** |
[ 6] Execute REST Node, WRITE: TLSv1.2 Handshake, length = 225 |
[ 6] Execute REST Node, READ: TLSv1.2 Handshake, length = 4480 |
[ 6] *** ServerHello, TLSv1.2 |
[ 6] RandomCookie: GMT: 1562619044 bytes = { 121, 63, 44, 225, 248, 46, 145, 24, 17, 86, 0, 150, 123, 3, 238, 253, 75, 171, 111, 33, 163, 182, 29, 191, 55, 11, 1, 34 } |
[ 6] Session ID: {93, 36, 173, 164, 243, 161, 83, 131, 5, 44, 100, 178, 23, 16, 146, 190, 196, 121, 48, 28, 63, 195, 61, 93, 229, 102, 201, 39, 69, 211, 165, 96} |
[ 6] Cipher Suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 |
[ 6] Compression Method: 0 |
[ 6] Extension renegotiation_info, renegotiated_connection: |
[ 6] Extension extended_master_secret |
[ 6] *** |
[ 6] %% Initialized: [Session-7, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384] |
[ 6] ** TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 |
[ 6] *** Certificate chain |
[ 6] chain [0] = [ |
[ 6] [ |
[ 6] Version: V3 |
[ 6] Subject: CN=*.rrqa.visa.com, OU=Reporting and Reconciliation, O=CyberSource, C=US, ST=Texas, L=Austin |
[ 6] Signature Algorithm: SHA256withRSA, OID = 1.2.840.113549.1.1.11 |
[ 6] |
[ 6] Key: Sun RSA public key, 2048 bits |
[ 6] modulus: 24824609861911148367731956207130755725705649719659729865336811568996149981034534338690286354153353344508266653158584753617868237230021317208306017487967983270351091695070542082913351341182382913261119052937153821798498520488061831176507826969837392850889458408525171827693899418858827330254064337619190316780696379129270835464759473755632415088295593078451046251898729831750824798044865242085321827367450912184006349108778826501104919761225886268724208598254888198659979574162527880269074375158398714395407354895578527044163631938215555061898932828474232930430290811833335246190110596841936184286620707901501093185587 |
[ 6] public exponent: 65537 |
[ 6] Validity: [From: Thu Mar 14 10:35:21 CDT 2019, |
[ 6] To: Sun Mar 13 10:35:21 CDT 2022] |
[ 6] Issuer: CN=VICA Non-Prod, OU=Applied Cryptography, O=Visa Inc., C=US, EMAILADDRESS=Denver-isoglobalpki@visa.com |
[ 6] SerialNumber: [ 42f0a7a4 1941775f 75dcdd86 bdee78a1 d7a78d95] |
[ 6] |
[ 6] Certificate Extensions: 8 |
[ 6] [1]: ObjectId: 1.3.6.1.5.5.7.1.1 Criticality=false |
[ 6] AuthorityInfoAccess [ |
[ 6] [ |
[ 6] accessMethod: caIssuers |
[ 6] accessLocation: URIName: http://aiaqa.visa.com/vicanonprod.cer |
[ 6] , |
[ 6] accessMethod: ocsp |
[ 6] accessLocation: URIName: http://ocspqa.visa.com/ocsp |
[ 6] ] |
[ 6] ] |
[ 6] |
[ 6] [2]: ObjectId: 2.5.29.35 Criticality=false |
[ 6] AuthorityKeyIdentifier [ |
[ 6] KeyIdentifier [ |
[ 6] 0000: 24 1A A1 7D C6 61 2A 89 31 98 E1 51 24 3C 0C 60 $....a*.1..Q$<.` |
[ 6] 0010: 74 5F BF 16 t_.. |
[ 6] ] |
[ 6] ] |
[ 6] |
[ 6] [3]: ObjectId: 2.5.29.19 Criticality=true |
[ 6] BasicConstraints:[ |
[ 6] CA:false |
[ 6] PathLen: undefined |
[ 6] ] |
[ 6] |
[ 6] [4]: ObjectId: 2.5.29.31 Criticality=false |
[ 6] CRLDistributionPoints [ |
[ 6] [DistributionPoint: |
[ 6] [URIName: http://aiaqa.visa.com/vicanonprod.crl] |
[ 6] ]] |
[ 6] |
[ 6] [5]: ObjectId: 2.5.29.37 Criticality=false |
[ 6] ExtendedKeyUsages [ |
[ 6] clientAuth |
[ 6] serverAuth |
[ 6] ] |
[ 6] |
[ 6] [6]: ObjectId: 2.5.29.15 Critic |
[ 6] ality=true |
[ 6] KeyUsage [ |
[ 6] DigitalSignature |
[ 6] Key_Encipherment |
[ 6] ] |
[ 6] |
[ 6] [7]: ObjectId: 2.5.29.17 Criticality=false |
[ 6] SubjectAlternativeName [ |
[ 6] DNSName: *.rrqa.visa.com |
[ 6] ] |
[ 6] |
[ 6] [8]: ObjectId: 2.5.29.14 Criticality=false |
[ 6] SubjectKeyIdentifier [ |
[ 6] KeyIdentifier [ |
[ 6] 0000: C7 08 25 43 FB 9E BD E4 C3 9C 9D 36 51 E2 F9 3B ..%C.......6Q..; |
[ 6] 0010: E7 F0 31 F2 ..1. |
[ 6] ] |
[ 6] ] |
[ 6] |
[ 6] ] |
[ 6] Algorithm: [SHA256withRSA] |
[ 6] Signature: |
[ 6] 0000: 89 46 4D 47 60 A2 C1 BD 71 C9 96 79 A3 15 B5 72 .FMG`...q..y...r |
[ 6] 0010: 66 07 51 3A 0D E7 0A E3 C6 7F ED DD BD 7F A9 69 f.Q:...........i |
[ 6] 0020: 31 0D 2D 5B D4 59 CA 85 86 07 9B 3E 88 26 90 BC 1.-[.Y.....>.&.. |
[ 6] 0030: E6 18 60 46 DF 1A 22 75 83 14 29 5C F6 A7 5C 0C ..`F.."u..)\..\. |
[ 6] 0040: 3B CA 85 D9 05 F3 FA 57 4B 55 79 02 8B F4 9A CA ;......WKUy..... |
[ 6] 0050: E5 EF F3 52 9D 96 6B C7 29 12 5D 1D 1D D6 2D F4 ...R..k.).]...-. |
[ 6] 0060: 98 46 57 1C 1D 76 0B 85 EB 91 CB 91 F2 9A 36 7C .FW..v........6. |
[ 6] 0070: EF B9 C8 03 A1 88 AA 36 1A 05 71 99 25 46 61 AA .......6..q.%Fa. |
[ 6] 0080: 6A B4 19 7E 55 01 0B AC CC C9 1A D8 00 39 FD 32 j...U........9.2 |
[ 6] 0090: B7 40 A4 B5 5D 76 F4 C5 3E BA 3A 5D CF 32 F4 A7 .@..]v..>.:].2.. |
[ 6] 00A0: 7F 72 D6 6B D8 B2 34 55 64 5E 84 A5 D6 04 EC 8A .r.k..4Ud^...... |
[ 6] 00B0: C2 71 2E A7 43 3B 87 28 09 6B 37 F2 90 BA FB 53 .q..C;.(.k7....S |
[ 6] 00C0: BA 71 D3 BE 88 0F 4B 9F 42 54 09 8E EB 0F 99 03 .q....K.BT...... |
[ 6] 00D0: DE C9 41 B9 A3 7D E4 E8 A5 B1 A3 F9 EB FE 50 83 ..A...........P. |
[ 6] 00E0: 96 85 58 04 69 FB F4 93 43 F9 2C E4 FA 9F 89 73 ..X.i...C.,....s |
[ 6] 00F0: AD C4 72 17 67 86 C8 64 5F 02 41 3A 26 7D 90 39 ..r.g..d_.A:&..9 |
[ 6] |
[ 6] ] |
[ 6] chain [1] = [ |
[ 6] [ |
[ 6] Version: V3 |
[ 6] Subject: CN=VICA Non-Prod, OU=Applied Cryptography, O=Visa Inc., C=US, EMAILADDRESS=Denver-isoglobalpki@visa.com |
[ 6] Signature Algorithm: SHA256withRSA, OID = 1.2.840.113549.1.1.11 |
[ 6] |
[ 6] Key: Sun RSA public key, 2048 bits |
[ 6] modulus: 18776859345782379368477552646752454587680913058106096317672514564432545067260695008080601136989801784063177559112612874853200890078644288345179608274731702487082743918677708599746110422242182265022563953225577130976581640240900531049751130142907050635129384266497017558790840242016553039736187988822171956757352022628563841886828585101742847997706973324285250247496393308459353165556076913953090555852435214554744837971734360234209805761602544872065911238784793336496587970606600419804730072731032166947675454731409696110287831293741812006854129548382889854561267221336513659266467389348458801338535258083258834662207 |
[ 6] public exponent: 65537 |
[ 6] Validity: [From: Fri Mar 09 14:34:56 CST 2018, |
[ 6] To: Thu Aug 14 16:49:56 CDT 2025] |
[ 6] Issuer: CN=TEST Visa Info Delivery Root CA, OU=Visa International Service Association, O=VISA, C=US |
[ 6] SerialNumber: [ ff60876a 438f0ab7 d1ac142a 9356c0f5] |
[ 6] |
[ 6] Certificate Extensions: 5 |
[ 6] [1]: ObjectId: 2.5.29.35 Criticality=false |
[ 6] AuthorityKeyIdentifier [ |
[ 6] KeyIdentifier [ |
[ 6] 0000: BD 62 D5 7F 8F 6C E4 62 0E F2 A7 F9 A1 98 EA C2 .b...l.b........ |
[ 6] 0010: B8 9E E7 05 .... |
[ 6] ] |
[ 6] ] |
[ 6] |
[ 6] [2]: ObjectId: 2.5.29.19 Criticality=true |
[ 6] BasicConstraints:[ |
[ 6] CA:true |
[ 6] PathLen:0 |
[ 6] ] |
[ 6] |
[ 6] [3]: ObjectId: 2.5.29.32 Criticality=false |
[ 6] CertificatePolicies [ |
[ 6] [CertificatePolicyId: [2.23.131.2.1] |
[ 6] [PolicyQualifierInfo: [ |
[ 6] qualifierID: 1.3.6.1.5.5.7.2.1 |
[ 6] qualifier: 0000: 16 17 68 74 74 70 3A 2F 2F 77 77 77 2E 76 69 73 ..http://www.vis |
[ 6] 0010: 61 2E 63 6F 6D 2F 70 6B 69 a.com/pki |
[ 6] |
[ 6] ]] ] |
[ 6] ] |
[ 6] |
[ 6] [4]: ObjectId: 2.5.29.15 Criticality=true |
[ 6] KeyUsage [ |
[ 6] Key_CertSign |
[ 6] Crl_Sign |
[ 6] ] |
[ 6] |
[ 6] [5]: ObjectId: 2.5.29.14 Criticality=false |
[ 6] SubjectKeyIdentifier [ |
[ 6] KeyIdentifier [ |
[ 6] 0000: 24 1A A1 7D C6 61 2A 89 31 98 E1 51 24 3C 0C 60 |
[ 6] $....a*.1..Q$<.` |
[ 6] 0010: 74 5F BF 16 t_.. |
[ 6] ] |
[ 6] ] |
[ 6] |
[ 6] Unparseable certificate extensions: 1 |
[ 6] [1]: ObjectId: 2.5.29.31 Criticality=false |
[ 6] Unparseable CRLDistributionPoints extension due to |
[ 6] java.io.IOException: invalid URI name:ldap://aiaqa.visa.com:389/cn=TEST Visa Info Delivery Root CA,c=US,ou=Visa International Service Association,o=VISA?certificateRevocationList |
[ 6] |
[ 6] 0000: 30 81 FD 30 81 95 A0 81 92 A0 81 8F 86 81 8C 6C 0..0...........l |
[ 6] 0010: 64 61 70 3A 2F 2F 61 69 61 71 61 2E 76 69 73 61 dap://aiaqa.visa |
[ 6] 0020: 2E 63 6F 6D 3A 33 38 39 2F 63 6E 3D 54 45 53 54 .com:389/cn=TEST |
[ 6] 0030: 20 56 69 73 61 20 49 6E 66 6F 20 44 65 6C 69 76 Visa Info Deliv |
[ 6] 0040: 65 72 79 20 52 6F 6F 74 20 43 41 2C 63 3D 55 53 ery Root CA,c=US |
[ 6] 0050: 2C 6F 75 3D 56 69 73 61 20 49 6E 74 65 72 6E 61 ,ou=Visa Interna |
[ 6] 0060: 74 69 6F 6E 61 6C 20 53 65 72 76 69 63 65 20 41 tional Service A |
[ 6] 0070: 73 73 6F 63 69 61 74 69 6F 6E 2C 6F 3D 56 49 53 ssociation,o=VIS |
[ 6] 0080: 41 3F 63 65 72 74 69 66 69 63 61 74 65 52 65 76 A?certificateRev |
[ 6] 0090: 6F 63 61 74 69 6F 6E 4C 69 73 74 30 2F A0 2D A0 ocationList0/.-. |
[ 6] 00A0: 2B 86 29 68 74 74 70 3A 2F 2F 61 69 61 71 61 2E +.)http://aiaqa. |
[ 6] 00B0: 76 69 73 61 2E 63 6F 6D 2F 54 65 73 74 49 6E 66 visa.com/TestInf |
[ 6] 00C0: 6F 44 65 6C 52 6F 6F 74 2E 63 72 6C 30 32 A0 30 oDelRoot.crl02.0 |
[ 6] 00D0: A0 2E 86 2C 68 74 74 70 3A 2F 2F 45 6E 72 6F 6C ...,http://Enrol |
[ 6] 00E0: 6C 2E 76 69 73 61 63 61 2E 63 6F 6D 2F 54 65 73 l.visaca.com/Tes |
[ 6] 00F0: 74 49 6E 66 6F 44 65 6C 52 6F 6F 74 2E 63 72 6C tInfoDelRoot.crl |
[ 6] |
[ 6] ] |
[ 6] Algorithm: [SHA256withRSA] |
[ 6] Signature: |
[ 6] 0000: 66 DE ED 00 B6 0C 17 86 B6 A6 C2 95 25 10 6D AA f...........%.m. |
[ 6] 0010: 94 20 4F FF 51 BC FE 36 DE 39 CB 9D 58 63 DF D8 . O.Q..6.9..Xc.. |
[ 6] 0020: 44 D8 17 C6 E1 C0 72 FA 70 D7 1E CA F3 51 28 3C D.....r.p....Q(< |
[ 6] 0030: D0 D9 94 D1 3E 18 94 DE FB 6E A3 CB 39 1C A6 38 ....>....n..9..8 |
[ 6] 0040: F3 A4 49 22 ED D3 AD 68 DA DD FE 31 0F F6 58 BF ..I"...h...1..X. |
[ 6] 0050: EF 7E 92 11 55 47 12 C |
[ 6] 7 FE CF 52 6F 49 33 79 83 ....UG....RoI3y. |
[ 6] 0060: 9F 28 64 19 53 8E D8 38 C1 A6 EF 33 44 34 2C 9A .(d.S..8...3D4,. |
[ 6] 0070: 95 46 53 C2 27 BC 18 2D 71 28 F4 9B 87 67 59 2E .FS.'..-q(...gY. |
[ 6] 0080: 51 01 89 F0 F7 DD D1 DC 46 FC BB 12 C7 00 9F D1 Q.......F....... |
[ 6] 0090: 30 EA FB 0C 96 77 1F 57 D3 A9 EC F3 78 A3 87 71 0....w.W....x..q |
[ 6] 00A0: 8B 30 52 C7 87 3D D1 C5 AD 4B F6 5F 10 0C F7 2A .0R..=...K._...* |
[ 6] 00B0: 49 AF EC A0 A2 68 ED 1C 44 0A 73 75 A0 41 A4 05 I....h..D.su.A.. |
[ 6] 00C0: 31 3D D2 75 66 FF 27 01 F5 D5 63 5E 80 09 E3 AD 1=.uf.'...c^.... |
[ 6] 00D0: AE 6C 2C 9E 67 86 F1 E2 9B 8D 96 C2 9C CC 3E 6A .l,.g.........>j |
[ 6] 00E0: 52 04 F4 5E BB 4B 9A A7 27 59 A7 B4 F9 3D 1A 74 R..^.K..'Y...=.t |
[ 6] 00F0: 34 98 AF A3 1D 46 8C 8A B8 A2 10 42 F2 67 75 4A 4....F.....B.guJ |
[ 6] |
[ 6] ] |
[ 6] chain [2] = [ |
[ 6] [ |
[ 6] Version: V3 |
[ 6] Subject: CN=TEST Visa Info Delivery Root CA, OU=Visa International Service Association, O=VISA, C=US |
[ 6] Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5 |
[ 6] |
[ 6] Key: Sun RSA public key, 2048 bits |
[ 6] modulus: 27865893927046724631333988956965740630975253531811862040526206605785650393695566222709982714317494758476817568522723327414247842719704383778363924462645375722649891258313243847872155949265080484551731951603430685642535739650845385299577593238894263096598904331344123823432928793349781527427283934669629767127437415129727809927428941788505682659950239996811222717105052301785921778379049154889761649125124207274529074137554585063422564652205133302821276331068380484265659454895100600051849939230185986276502068666306907607902021702399695097853211983361884981181480454841705325724714197452527605081248299270630918823541 |
[ 6] public exponent: 65537 |
[ 6] Validity: [From: Tue Aug 16 17:48:53 CDT 2005, |
[ 6] To: Fri Aug 15 17:48:53 CDT 2025] |
[ 6] Issuer: CN=TEST Visa Info Delivery Root CA, OU=Visa International Service Association, O=VISA, C=US |
[ 6] SerialNumber: [ 535062c8 81bbb8d6 a4d0445a d47377f5] |
[ 6] |
[ 6] Certificate Extensions: 5 |
[ 6] [1]: ObjectId: 2.5.29.35 Criticality=false |
[ 6] AuthorityKeyIdentifier [ |
[ 6] KeyIdentifier [ |
[ 6] 0000: BD 62 D5 7F 8F 6C E4 62 0E F2 A7 F9 A1 98 EA C2 .b...l.b........ |
[ 6] 0010: B8 9E E7 05 .... |
[ 6] ] |
[ 6] ] |
[ 6] |
[ 6] [2]: ObjectId: 2.5.29.19 Criticality=true |
[ 6] BasicConstraints:[ |
[ 6] CA:true |
[ 6] PathLen:2147483647 |
[ 6] ] |
[ 6] |
[ 6] [3]: ObjectId: 2.5.29.32 Criticality=false |
[ 6] CertificatePolicies [ |
[ 6] [CertificatePolicyId: [2.23.131.2.1] |
[ 6] [] ] |
[ 6] ] |
[ 6] |
[ 6] [4]: ObjectId: 2.5.29.15 Criticality=true |
[ 6] KeyUsage [ |
[ 6] Key_CertSign |
[ 6] Crl_Sign |
[ 6] ] |
[ 6] |
[ 6] [5]: ObjectId: 2.5.29.14 Criticality=false |
[ 6] SubjectKeyIdentifier [ |
[ 6] KeyIdentifier [ |
[ 6] 0000: BD 62 D5 7F 8F 6C E4 62 0E F2 A7 F9 A1 98 EA C2 .b...l.b........ |
[ 6] 0010: B8 9E E7 05 .... |
[ 6] ] |
[ 6] ] |
[ 6] |
[ 6] ] |
[ 6] Algorithm: [SHA1withRSA] |
[ 6] Signature: |
[ 6] 0000: 1A D1 C0 89 10 51 A2 0D 21 7D 0F 85 13 04 F5 E4 .....Q..!....... |
[ 6] 0010: 06 BB C6 |
[ 6] 19 9C BD E0 CC 2C 37 46 0A B2 F2 C9 4C ........,7F....L |
[ 6] 0020: 1C 42 5D 7F CF 41 74 BD 25 7D BD 9E C6 38 6B 93 .B]..At.%....8k. |
[ 6] 0030: C0 02 18 1D 35 5E FA B5 48 AA 51 29 1B 54 45 0B ....5^..H.Q).TE. |
[ 6] 0040: 41 F3 73 F0 7B 65 05 25 51 C6 44 28 82 5C 6E DB A.s..e.%Q.D(.\n. |
[ 6] 0050: 33 86 75 77 97 A6 CC 73 AF 6C 68 64 FD CD 54 B9 3.uw...s.lhd..T. |
[ 6] 0060: 5E 06 7B 5C 6F 76 1F 03 71 37 71 A1 C1 E8 8D 95 ^..\ov..q7q..... |
[ 6] 0070: D4 C2 12 D6 C7 0E C3 8C 70 9B 3F 55 38 CD 48 F4 ........p.?U8.H. |
[ 6] 0080: 59 CB 11 B3 6E 34 9B 20 5E 6A 5D 3B 56 28 4A CD Y...n4. ^j];V(J. |
[ 6] 0090: 26 81 FF 97 A6 CC 4C D3 4B 10 5E E6 0E E1 B1 6A &.....L.K.^....j |
[ 6] 00A0: BF F1 88 0C 77 7A CF 49 B3 2A 25 D8 CA D7 05 E9 ....wz.I.*%..... |
[ 6] 00B0: B5 D1 C2 84 2B D8 B5 01 B3 92 F0 BE 91 2B 72 08 ....+........+r. |
[ 6] 00C0: 83 0F 30 8C CB 25 C3 23 FD 8C 25 D3 D9 32 49 28 ..0..%.#..%..2I( |
[ 6] 00D0: FD 56 93 95 73 02 5F D7 4C 63 97 77 7F 16 40 94 .V..s._.Lc.w..@. |
[ 6] 00E0: 74 CB 03 B3 9C 25 B7 99 8E A5 76 49 67 8A 49 A5 t....%....vIg.I. |
[ 6] 00F0: 57 8E 09 AF 34 93 72 B5 FC 7F A5 9D CC E6 A7 32 W...4.r........2 |
[ 6] |
[ 6] ] |
[ 6] *** |
[ 6] *** ECDH ServerKeyExchange |
[ 6] Signature Algorithm SHA512withRSA |
[ 6] Server key: Sun EC public key, 256 bits |
[ 6] public x coord: 14942306278201460044283948837056442779224742569222686186030630563471377836482 |
[ 6] public y coord: 9082687004736453347245543870376184186567380836242919814196189177743525443 |
[ 6] parameters: secp256r1 [NIST P-256, X9.62 prime256v1] (1.2.840.10045.3.1.7) |
[ 6] *** CertificateRequest |
[ 6] Cert Types: RSA, DSS, ECDSA |
[ 6] Supported Signature Algorithms: SHA512withECDSA, SHA512withRSA, SHA384withECDSA, SHA384withRSA, SHA256withECDSA, SHA256withRSA, SHA256withDSA, Unknown (hash:0x3, signature:0x3), Unknown (hash:0x3, signature:0x1), Unknown (hash:0x3, signature:0x2), SHA1withECDSA, SHA1withRSA, SHA1withDSA |
[ 6] Cert Authorities: |
[ 6] <cn=*.rrqa.visa.com, ou="Reporting" and="" reconciliation,="" o="CyberSource," c="US," st="Texas," l="Austin"></cn=*.rrqa.visa.com,> |
[ 6] <cn=test visa="" info="" delivery="" root="" ca,="" ou="Visa" international="" service="" association,="" o="VISA," c="US"></cn=test> |
[ 6] <cn=visa information="" delivery="" qa="" internal="" issuing="" ca,="" ou="Visa" international="" service="" associatoin,="" o="VISA," c="US"></cn=visa> |
[ 6] *** ServerHelloDone |
[ 6] *** Certificate chain |
[ 6] chain [0] = [ |
[ 6] [ |
[ 6] Version: V3 |
[ 6] Subject: CN=Lisa, OU=Lisa, O=Lisa, L=Dallas, ST=Texas, C=US, EMAILADDRESS=support@itko.com |
[ 6] Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5 |
[ 6] |
[ 6] Key: Sun RSA public key, 1024 bits |
[ 6] modulus: 107577342571485428802393728049184265786056348388364405824138117397977455761833138845329880593678805610027793821217939298848284286683543926634250841496293888229172692948746730869670908754188073542091973621265074265583182385560072567366227383567380577316296862528343858318946945517967854106447414857653511333997 |
[ 6] public exponent: 65537 |
[ 6] Validity: [From: Fri Aug 20 11:07:30 CDT 2010, |
[ 6] To: Tue Jan 05 10:07:30 CST 2038] |
[ 6] Issuer: CN=Lisa, OU=Lisa, O=Lisa, L=Dallas, ST=Texas, C=US, EMAILADDRESS=support@itko.com |
[ 6] SerialNumber: [ 4c6ea842] |
[ 6] |
[ 6] ] |
[ 6] Algorithm: [SHA1withRSA] |
[ 6] Signature: |
[ 6] 0000: 2B 7F 77 08 DE 2F 74 E3 CD 0F 58 D8 57 D9 08 2E +.w../t...X.W... |
[ 6] 0010: AC 57 A7 02 81 07 B7 F8 5B 68 AE 22 22 C6 75 EE .W......[h."".u. |
[ 6] 0020: C2 41 B6 23 DE ED 17 F8 21 AE 3B ED B6 EA 1A 17 .A.#....!.;..... |
[ 6] 0030: A4 5F 95 FD BE AE 74 DA 75 64 19 D6 60 0A 63 61 ._....t.ud..`.ca |
[ 6] 0040: B6 2A E1 FB 06 C5 36 E5 00 0C EB 20 EF FA 82 29 .*....6.... ...) |
[ 6] 0050: 40 39 EA 61 3A 27 CF 4F 00 18 33 E8 31 4C E4 C5 @9.a:'.O..3.1L.. |
[ 6] 0060: 44 98 60 15 80 FE 85 FB BF BD 95 AB 35 14 F7 16 D.`.........5... |
[ 6] 0070: 9D 58 F5 26 10 B7 76 7D 43 20 A7 4B F4 ED EE CF .X.&..v.C .K.... |
[ 6] |
[ 6] ] |
[ 6] *** |
[ 6] *** ECDHClientKeyExchange |
[ 6] ECDH Public value: { 4, 178, 231, 41, 119, 185, 226, 210, 36, 37, 253, 117, 117, 209, 177, 149, 36, 244, 22, 16, 170, 137, 231, 14, 95, 35, 149, 60, 26, 71, 206, 103, 187, 38, 165, 51, 86, 191, 185, 128, 243, 23, 68, 110, 169, 212, 229, 102, 50, 132, 70, 193, 79, 243, 92, 134, 127, 189, 19, 174, 48, 180, 93, 41, 36 } |
[ 6] Execute REST Node, WRITE: TLSv1.2 Handshake, length = 707 |
[ 6] SESSION KEYGEN: |
[ 6] PreMaster Secret: |
[ 6] 0000: 14 D6 FD 5D EA 63 5B 74 C2 FD 90 C0 1D E1 F3 33 ...].c[t.......3 |
[ 6] 0010: AA B3 71 63 6F 38 E7 8E EC 2B B9 D7 1B 7C 98 8E ..qco8...+...... |
[ 6] CONNECTION KEYGEN: |
[ 6] Client Nonce: |
[ 6] 0000: 5D 24 AD A4 A7 A7 6D 68 CD 07 62 FE 90 64 22 B8 ]$....mh..b..d". |
[ 6] 0010: 32 FE 75 16 26 49 66 2C 54 36 9C F6 32 D2 60 A5 2.u.&If,T6..2.`. |
[ 6] Server Nonce: |
[ 6] 0000: 5D 24 AD A4 79 3F 2C E1 F8 2E 91 18 11 56 00 96 ]$..y?,......V.. |
[ 6] 0010: 7B 03 EE FD 4B AB 6F 21 A3 B6 1D BF 37 0B 01 22 ....K.o!....7.." |
[ 6] Master Secret: |
[ 6] 0000: 80 17 1A AB B9 0A F2 2E 43 DA E3 98 05 4E 00 73 ........C....N.s |
[ 6] 0010: C9 FA 2E AD C4 3B 36 A9 64 35 D2 24 9D 3A 19 6D .....;6.d5.$.:.m |
[ 6] 0020: CF D7 9A 69 D4 2E 56 F2 9D 09 52 97 7D 3C 70 8E ...i..V...R..<p.< td=""> </p.<> |
[ 6] Client MAC write Secret: |
[ 6] 0000: E6 D7 77 D6 76 CE 76 A8 1E F6 D7 E7 AC 19 23 BA ..w.v.v.......#. |
[ 6] 0010: E1 8D CA 10 F1 28 4F 5B 7E 8A 9D 08 E4 44 AA 82 .....(O[.....D.. |
[ 6] 0020: CD 2F 2A 2D 66 BB E2 41 38 CA 1D 91 22 C7 9C 05 ./*-f..A8..."... |
[ 6] Server MAC write Secret: |
[ 6] 0000: 3C 2F AE 71 7F EA CA 2C A2 8C E0 83 66 23 98 04 |
[ 6] 0010: 68 A4 D6 C2 FC 1E 90 20 07 24 EB AE 44 55 07 C6 h...... .$..DU.. |
[ 6] 0020: 6D A7 8F 5C 0A 15 1E BA EB FF 90 2D 92 CF 98 A6 m..\.......-.... |
[ 6] Client write key: |
[ 6] 0000: 90 DC F0 34 8A C3 10 6C A0 07 C2 C5 B7 C5 07 13 ...4...l........ |
[ 6] 0010: 7F C6 57 DF F8 D4 0C FF 86 F4 16 DF 4D 77 8F 57 ..W.........Mw.W |
[ 6] Server write key: |
[ 6] 0000: 70 7C BA 9B 50 C2 78 E0 8B 6B 53 EC 28 3F 42 48 p...P.x..kS.(?BH |
[ 6] 0010: FB 32 60 6F CA 89 06 7A DF 03 65 2A 92 59 BF E5 .2`o...z..e*.Y.. |
[ 6] ... no IV derived for this protocol |
[ 6] |
[ 6] *** CertificateVerify |
[ 6] Signature Algorithm SHA512withRSA |
[ 6] Execute REST Node, WRITE: TLSv1.2 Handshake, length = 136 |
[ 6] Execute REST Node, WRITE: TLSv1.2 Change Cipher Spec, length = 1 |
[ 6] *** Finished |
[ 6] verify_data: { 206, 52, 194, 197, 195, 170, 26, 128, 0, 23, 150, 221 } |
[ 6] *** |
[ 6] Execute REST Node, WRITE: TLSv1.2 Handshake, length = 96 |
[ 6] Execute REST Node, received EOFException: error |
[ 6] Execute REST Node, handling exception: javax.net.ssl.SSLHandshakeException: Remote host closed connection during handshake |
[ 6] %% Invalidated: [Session-7, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384] |
[ 6] Execute REST Node, SEND TLSv1.2 ALERT: fatal, description = handshake_failure |
[ 6] Execute REST Node, WRITE: TLSv1.2 Alert, length = 80 |
[ 6] Execute REST Node, called closeSocket() |
[ 6] Execute REST Node, called close() |
[ 6] Execute REST Node, called closeInternal(true) |
[ 6] [SSL Handshake Summary] Thread [Execute REST Node] |
[ 6] [SSL Handshake Summary] Acting as a Client |
[ 6] [SSL Handshake Summary] *†‡ indicates linked optional steps |
[ 6] [SSL Handshake Summary] |
[ 6] [SSL Handshake Summary] 1 RUN Client Hello --> |
[ 6] [SSL Handshake Summary] 2 RUN <-- Server Hello |
[ 6] [SSL Handshake Summary] 3* RUN <-- Server Certificate (Public Key) |
[ 6] [SSL Handshake Summary] 4† RUN <-- Request Client Certificate |
[ 6] [SSL Handshake Summary] 5* ASSUMED Verify and Trust Server Certificate v |
[ 6] [SSL Handshake Summary] 6‡ RUN <-- Server Key Exchange |
[ 6] [SSL Handshake Summary] 7 RUN <-- Server Hello Done |
[ 6] [SSL Handshake Summary] 8† RUN Client Certificate (Public Key) --> |
[ 6] [SSL Handshake Summary] 9† UNKNOWN v Verify and Trust Client Certificate |
[ 6] [SSL Handshake Summary] 10 RUN Client Key Exchange --> |
[ 6] [SSL Handshake Summary] 11† RUN Certificate Verify Confirmation --> |
[ 6] [SSL Handshake Summary] 12 RUN Client Change Cipher Spec --> |
[ 6] [SSL Handshake Summary] 13 RUN Client Finished --> |
[ 6] [SSL Handshake Summary] 14 UNKNOWN <-- Server Change Cipher Spec |
[ 6] [SSL Handshake Summary] 15 UNKNOWN <-- Server Finished |
[ 6] [SSL Handshake Summary] |
[ 6] [SSL Handshake Summary] SEND TLSv1.2 ALERT: fatal, description = handshake_failure |
[ 6] [SSL Handshake Summary] javax.net.ssl.SSLHandshakeException: Remote host closed connection during handshake |
[ 6] [SSL Handshake Summary] See Alert or Exception for details |