HI David
Looks like the CA certificate that was used to issue the SSL certificate of your API server is not a well known CA. You could create an SSL context by importing the Public key certificates of all the CA's in the certificate chain till the root CA. Devtest allows you to choose a keystore for connecting to server using SSL.
Please try this out and if you need hand-holding, please raise a support ticket.
-Sankar
------------------------------
Sankar Natarajan
Service Virtualization Product Engineering Team
Broadcom
------------------------------
Original Message:
Sent: 09-19-2019 11:04 AM
From: David wong
Subject: handling exception: javax.net.ssl.SSLHandshakeException: Received fatal alert: certificate_unknown
Hi there,
I am trying to record the communication between an UI app and API. I am using CA SV, but seeing the below error in SSL debugger.
Any suggestions out there?
[ 1] Allow unsafe renegotiation: false
[ 1] Allow legacy hello messages: true
[ 1] Is initial handshake: true
[ 1] Is secure renegotiation: false
[ 1] Allow unsafe renegotiation: false
[ 1] Allow legacy hello messages: true
[ 1] Is initial handshake: true
[ 1] Is secure renegotiation: false
[ 2] Ignoring obsoleted cipher suite: SSL_RSA_WITH_DES_CBC_SHA
[ 2] Ignoring obsoleted cipher suite: SSL_DHE_RSA_WITH_DES_CBC_SHA
[ 3] Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for SSLv3
[ 2] Ignoring obsoleted cipher suite: SSL_DHE_DSS_WITH_DES_CBC_SHA
[ 3] Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for SSLv3
[ 2] Ignoring obsoleted cipher suite: SSL_DH_anon_WITH_DES_CBC_SHA
[ 3] Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 for SSLv3
[ 2] Ignoring obsoleted cipher suite: SSL_RSA_EXPORT_WITH_DES40_CBC_SHA
[ 3] Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 for SSLv3
[ 2] Ignoring obsoleted cipher suite: SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA
[ 3] Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 for SSLv3
[ 2] Ignoring obsoleted cipher suite: SSL_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA
[ 3] Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for SSLv3
[ 2] Ignoring obsoleted cipher suite: SSL_DH_anon_EXPORT_WITH_DES40_CBC_SHA
[ 3] Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for SSLv3
[ 2] Ignoring obsoleted cipher suite: TLS_KRB5_WITH_DES_CBC_SHA
[ 3] Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1
[ 2] Ignoring obsoleted cipher suite: TLS_KRB5_WITH_DES_CBC_MD5
[ 3] Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLSv1
[ 2] Ignoring obsoleted cipher suite: TLS_KRB5_EXPORT_WITH_DES_CBC_40_SHA
[ 3] Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 for TLSv1
[ 2] Ignoring obsoleted cipher suite: TLS_KRB5_EXPORT_WITH_DES_CBC_40_MD5
[ 3] Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1
[ 3] Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 for TLSv1
[ 2] %% No cached client session
[ 3] Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1
[ 3] Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1
[ 3] Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1.1
[ 2] *** ClientHello, TLSv1.2
[ 3] Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLSv1.1
[ 3] Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1
[ 2] RandomCookie: GMT: 1552010123 bytes = { 112, 82, 128, 150, 204, 169, 133, 248, 10, 14, 23, 187, 59, 169, 40, 167, 158, 220, 15, 210, 17, 124, 236, 146, 197, 28, 179, 85 }
[ 3] Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1.1
[ 2] Session ID: {}
[ 3] Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 for TLSv1.1
[ 3] Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1
[ 2] Cipher Suites: [TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384, TLS_RSA_WITH_AES_256_CBC_SHA256, TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384, TLS_DHE_RSA_WITH_AES_256_CBC_SHA256, TLS_DHE_DSS_WITH_AES_256_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDH_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_DSS_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256, TLS_RSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_DSS_WITH_AES_128_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, TLS_RSA_WITH_AES_256_GCM_SHA384, TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, TLS_DHE_DSS_WITH_AES_256_GCM_SHA384, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_DSS_WITH_AES_128_GCM_SHA256, TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA, TLS_EMPTY_RENEGOTIATION_INFO_SCSV, TLS_DH_anon_WITH_AES_256_GCM_SHA384, TLS_DH_anon_WITH_AES_128_GCM_SHA256, TLS_DH_anon_WITH_AES_256_CBC_SHA256, TLS_ECDH_anon_WITH_AES_256_CBC_SHA, TLS_DH_anon_WITH_AES_256_CBC_SHA, TLS_DH_anon_WITH_
[ 3] Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1.1
[ 2] AES_128_CBC_SHA256, TLS_ECDH_anon_WITH_AES_128_CBC_SHA, TLS_DH_anon_WITH_AES_128_CBC_SHA, TLS_ECDH_anon_WITH_3DES_EDE_CBC_SHA, SSL_DH_anon_WITH_3DES_EDE_CBC_SHA, TLS_RSA_WITH_NULL_SHA256, TLS_ECDHE_ECDSA_WITH_NULL_SHA, TLS_ECDHE_RSA_WITH_NULL_SHA, SSL_RSA_WITH_NULL_SHA, TLS_ECDH_ECDSA_WITH_NULL_SHA, TLS_ECDH_RSA_WITH_NULL_SHA, TLS_ECDH_anon_WITH_NULL_SHA, SSL_RSA_WITH_NULL_MD5, TLS_KRB5_WITH_3DES_EDE_CBC_SHA, TLS_KRB5_WITH_3DES_EDE_CBC_MD5]
[ 2] Compression Methods: { 0 }
[ 3] Filter thread for 10.70.227.152:55121->10.211.43.124:8443, READ: TLSv1.2 Handshake, length = 166
[ 2] Extension elliptic_curves, curve names: {secp256r1, sect163k1, sect163r2, secp192r1, secp224r1, sect233k1, sect233r1, sect283k1, sect283r1, secp384r1, sect409k1, sect409r1, secp521r1, sect571k1, sect571r1, secp160k1, secp160r1, secp160r2, sect163r1, secp192k1, sect193r1, sect193r2, secp224k1, sect239k1, secp256k1}
[ 2] Extension ec_point_formats, formats: [uncompressed]
[ 2] Extension signature_algorithms, signature_algorithms: SHA512withECDSA, SHA512withRSA, SHA384withECDSA, SHA384withRSA, SHA256withECDSA, SHA256withRSA, SHA256withDSA, SHA1withECDSA, SHA1withRSA, SHA1withDSA
[ 2] ***
[ 2] Filter thread for 10.211.43.124:8443->10.70.227.152:55121, WRITE: TLSv1.2 Handshake, length = 273
[ 3] *** ClientHello, TLSv1.2
[ 3] RandomCookie: GMT: 1552010123 bytes = { 186, 152, 225, 98, 74, 235, 169, 79, 217, 215, 45, 207, 84, 75, 89, 80, 164, 230, 41, 242, 234, 20, 150, 133, 51, 228, 226, 95 }
[ 3] Session ID: {}
[ 3] Cipher Suites: [TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_RSA_WITH_AES_128_GCM_SHA256, TLS_RSA_WITH_AES_128_CBC_SHA256]
[ 3] Compression Methods: { 0 }
[ 3] Extension elliptic_curves, curve names: {secp256r1, secp384r1, secp521r1, sect283k1, sect283r1, sect409k1, sect409r1, sect571k1, sect571r1, secp256k1}
[ 3] Extension ec_point_formats, formats: [uncompressed]
[ 3] Extension signature_algorithms, signature_algorithms: SHA512withECDSA, SHA512withRSA, SHA384withECDSA, SHA384withRSA, SHA256withECDSA, SHA256withRSA, SHA256withDSA, Unknown (hash:0x3, signature:0x3), Unknown (hash:0x3, signature:0x1), Unknown (hash:0x3, signature:0x2), SHA1withECDSA, SHA1withRSA, SHA1withDSA
[ 3] Unsupported extension type_23, data:
[ 3] Extension server_name, server_name: [type=host_name (0), value=entproductcfg.rrqa.visa.com]
[ 3] Extension renegotiation_info, renegotiated_connection: <empty>
[ 3] ***
[ 3] %% Initialized: [Session-1, SSL_NULL_WITH_NULL_NULL]
[ 3] matching alias: lisa
[ 3] matching alias: vse
[ 3] %% Negotiating: [Session-1, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384]
[ 3] *** ServerHello, TLSv1.2
[ 3] RandomCookie: GMT: 1552010123 bytes = { 82, 111, 211, 63, 160, 180, 92, 224, 115, 78, 187, 147, 254, 62, 197, 73, 152, 173, 16, 148, 64, 184, 81, 184, 105, 43, 116, 199 }
[ 3] Session ID: {93, 130, 204, 139, 94, 197, 181, 113, 73, 122, 69, 210, 42, 25, 26, 149, 101, 215, 211, 249, 56, 223, 135, 126, 49, 99, 73, 217, 164, 141, 96, 201}
[ 3] Cipher Suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
[ 3] Compression Method: 0
[ 3] Extension renegotiation_info, renegotiated_connection: <empty>
[ 3] ***
[ 3] Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
[ 3] *** Certificate chain
[ 3] chain [0] = [
[ 3] [
[ 3] Version: V3
[ 3] Subject: CN=Lisa, OU=Lisa, O=Lisa, L=Dallas, ST=Texas, C=US, EMAILADDRESS=support@itko.com
[ 3] Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5
[ 3]
[ 3] Key: Sun RSA public key, 1024 bits
[ 3] modulus: 107577342571485428802393728049184265786056348388364405824138117397977455761833138845329880593678805610027793821217939298848284286683543926634250841496293888229172692948746730869670908754188073542091973621265074265583182385560072567366227383567380577316296862528343858318946945517967854106447414857653511333997
[ 3] public exponent: 65537
[ 3] Validity: [From: Fri Aug 20 11:07:30 CDT 2010,
[ 3] To: Tue Jan 05 10:07:30 CST 2038]
[ 3] Issuer: CN=Lisa, OU=Lisa, O=Lisa, L=Dallas, ST=Texas, C=US, EMAILADDRESS=support@itko.com
[ 3] SerialNumber: [ 4c6ea842]
[ 3]
[ 3] ]
[ 3] Algorithm: [SHA1withRSA]
[ 3] Signature:
[ 3] 0000: 2B 7F 77 08 DE 2F 74 E3 CD 0F 58 D8 57 D9 08 2E +.w../t...X.W...
[ 3] 0010: AC 57 A7 02 81 07 B7 F8 5B 68 AE 22 22 C6 75 EE .W......[h."".u.
[ 3] 0020: C2 41 B6 23 DE ED 17 F8 21 AE 3B ED B6 EA 1A 17 .A.#....!.;.....
[ 3] 0030: A4 5F 95 FD BE AE 74 DA 75 64 19 D6 60 0A 63 61 ._....t.ud..`.ca
[ 3] 0040: B6 2A E1 FB 06 C5 36 E5 00 0C EB 20 EF FA 82 29 .*....6.... ...)
[ 3] 0050: 40 39 EA 61 3A 27 CF 4F 00 18 33 E8 31 4C E4 C5 @9.a:'.O..3.1L..
[ 3] 0060: 44 98 60 15 80 FE 85 FB BF BD 95 AB 35 14 F7 16 D.`.........5...
[ 3] 0070: 9D 58 F5 26 10 B7 76 7D 43 20 A7 4B F4 ED EE CF .X.&..v.C .K....
[ 3]
[ 3] ]
[ 2] Filter thread for 10.211.43.124:8443->10.70.227.152:55121, READ: TLSv1.2 Handshake, length = 4476
[ 3] ***
[ 2] *** ServerHello, TLSv1.2
[ 2] RandomCookie: GMT: 1552010123 bytes = { 85, 85, 34, 141, 47, 82, 183, 194, 85, 179, 189, 32, 8, 220, 31, 151, 224, 209, 107, 22, 42, 46, 216, 234, 57, 98, 77, 60 }
[ 2] Session ID: {93, 130, 204, 139, 225, 200, 122, 140, 168, 75, 145, 165, 172, 216, 79, 75, 58, 181, 246, 147, 7, 213, 15, 146, 248, 137, 58, 217, 173, 118, 40, 60}
[ 2] Cipher Suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
[ 2] Compression Method: 0
[ 2] Extension renegotiation_info, renegotiated_connection: <empty>
[ 2] ***
[ 2] %% Initialized: [Session-2, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384]
[ 2] ** TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
[ 2] *** Certificate chain
[ 2] chain [0] = [
[ 2] [
[ 2] Version: V3
[ 2] Subject: CN=*.rrqa.visa.com, OU=Reporting and Reconciliation, O=CyberSource, C=US, ST=Texas, L=Austin
[ 2] Signature Algorithm: SHA256withRSA, OID = 1.2.840.113549.1.1.11
[ 2]
[ 2] Key: Sun RSA public key, 2048 bits
[ 2] modulus: 24824609861911148367731956207130755725705649719659729865336811568996149981034534338690286354153353344508266653158584753617868237230021317208306017487967983270351091695070542082913351341182382913261119052937153821798498520488061831176507826969837392850889458408525171827693899418858827330254064337619190316780696379129270835464759473755632415088295593078451046251898729831750824798044865242085321827367450912184006349108778826501104919761225886268724208598254888198659979574162527880269074375158398714395407354895578527044163631938215555061898932828474232930430290811833335246190110596841936184286620707901501093185587
[ 2] public exponent: 65537
[ 2] Validity: [From: Thu Mar 14 10:35:21 CDT 2019,
[ 2] To: Sun Mar 13 10:35:21 CDT 2022]
[ 2] Issuer: CN=VICA Non-Prod, OU=Applied Cryptography, O=Visa Inc., C=US, EMAILADDRESS=Denver-isoglobalpki@visa.com
[ 2] SerialNumber: [ 42f0a7a4 1941775f 75dcdd86 bdee78a1 d7a78d95]
[ 2]
[ 2] Certificate Extensions: 8
[ 2] [1]: ObjectId: 1.3.6.1.5.5.7.1.1 Criticality=false
[ 2] AuthorityInfoAccess [
[ 2] [
[ 2] accessMethod: caIssuers
[ 2] accessLocation: URIName: http://aiaqa.visa.com/vicanonprod.cer
[ 2] ,
[ 2] accessMethod: ocsp
[ 2] accessLocation: URIName: http://ocspqa.visa.com/ocsp
[ 2] ]
[ 2] ]
[ 2]
[ 2] [2]: ObjectId: 2.5.29.35 Criticality=false
[ 2] AuthorityKeyIdentifier [
[ 2] KeyIdentifier [
[ 2] 0000: 24 1A A1 7D C6 61 2A 89 31 98 E1 51 24 3C 0C 60 $....a*.1..Q$<.`
[ 2] 0010: 74 5F BF 16 t_..
[ 2] ]
[ 2] ]
[ 2]
[ 2] [3]: ObjectId: 2.5.29.19 Criticality=true
[ 2] BasicConstraints:[
[ 2] CA:false
[ 2] PathLen: undefined
[ 2] ]
[ 2]
[ 2] [4]: ObjectId: 2.5.29.31 Criticality=false
[ 2] CRLDistributionPoints [
[ 2] [DistributionPoint:
[ 2] [URIName: http://aiaqa.visa.com/vicanonprod.crl]
[ 2] ]]
[ 2]
[ 2] [5]: ObjectId: 2.5.29.37 Criticality=false
[ 2] ExtendedKeyUsages [
[ 2] clientAuth
[ 2] serverAuth
[ 2] ]
[ 2]
[ 2] [6]: ObjectId: 2.5.29.15 Critic
[ 3] *** ECDH ServerKeyExchange
[ 2] ality=true
[ 2] KeyUsage [
[ 2] DigitalSignature
[ 2] Key_Encipherment
[ 2] ]
[ 2]
[ 2] [7]: ObjectId: 2.5.29.17 Criticality=false
[ 2] SubjectAlternativeName [
[ 2] DNSName: *.rrqa.visa.com
[ 2] ]
[ 2]
[ 2] [8]: ObjectId: 2.5.29.14 Criticality=false
[ 2] SubjectKeyIdentifier [
[ 2] KeyIdentifier [
[ 2] 0000: C7 08 25 43 FB 9E BD E4 C3 9C 9D 36 51 E2 F9 3B ..%C.......6Q..;
[ 2] 0010: E7 F0 31 F2 ..1.
[ 2] ]
[ 2] ]
[ 2]
[ 2] ]
[ 2] Algorithm: [SHA256withRSA]
[ 2] Signature:
[ 2] 0000: 89 46 4D 47 60 A2 C1 BD 71 C9 96 79 A3 15 B5 72 .FMG`...q..y...r
[ 2] 0010: 66 07 51 3A 0D E7 0A E3 C6 7F ED DD BD 7F A9 69 f.Q:...........i
[ 2] 0020: 31 0D 2D 5B D4 59 CA 85 86 07 9B 3E 88 26 90 BC 1.-[.Y.....>.&..
[ 2] 0030: E6 18 60 46 DF 1A 22 75 83 14 29 5C F6 A7 5C 0C ..`F.."u..)\..\.
[ 2] 0040: 3B CA 85 D9 05 F3 FA 57 4B 55 79 02 8B F4 9A CA ;......WKUy.....
[ 2] 0050: E5 EF F3 52 9D 96 6B C7 29 12 5D 1D 1D D6 2D F4 ...R..k.).]...-.
[ 2] 0060: 98 46 57 1C 1D 76 0B 85 EB 91 CB 91 F2 9A 36 7C .FW..v........6.
[ 2] 0070: EF B9 C8 03 A1 88 AA 36 1A 05 71 99 25 46 61 AA .......6..q.%Fa.
[ 2] 0080: 6A B4 19 7E 55 01 0B AC CC C9 1A D8 00 39 FD 32 j...U........9.2
[ 2] 0090: B7 40 A4 B5 5D 76 F4 C5 3E BA 3A 5D CF 32 F4 A7 .@..]v..>.:].2..
[ 2] 00A0: 7F 72 D6 6B D8 B2 34 55 64 5E 84 A5 D6 04 EC 8A .r.k..4Ud^......
[ 2] 00B0: C2 71 2E A7 43 3B 87 28 09 6B 37 F2 90 BA FB 53 .q..C;.(.k7....S
[ 2] 00C0: BA 71 D3 BE 88 0F 4B 9F 42 54 09 8E EB 0F 99 03 .q....K.BT......
[ 2] 00D0: DE C9 41 B9 A3 7D E4 E8 A5 B1 A3 F9 EB FE 50 83 ..A...........P.
[ 2] 00E0: 96 85 58 04 69 FB F4 93 43 F9 2C E4 FA 9F 89 73 ..X.i...C.,....s
[ 2] 00F0: AD C4 72 17 67 86 C8 64 5F 02 41 3A 26 7D 90 39 ..r.g..d_.A:&..9
[ 2]
[ 2] ]
[ 3] Signature Algorithm SHA512withRSA
[ 3] Server key: Sun EC public key, 256 bits
[ 3] public x coord: 79742100961086354218013570535190379680257818715483244193610164482514695420251
[ 3] public y coord: 68171348249673166977612019889914025113118534673736512982570492110343509312613
[ 3] parameters: secp256r1 [NIST P-256, X9.62 prime256v1] (1.2.840.10045.3.1.7)
[ 3] *** ServerHelloDone
[ 3] Filter thread for 10.70.227.152:55121->10.211.43.124:8443, WRITE: TLSv1.2 Handshake, length = 927
[ 2] chain [1] = [
[ 2] [
[ 2] Version: V3
[ 2] Subject: CN=VICA Non-Prod, OU=Applied Cryptography, O=Visa Inc., C=US, EMAILADDRESS=Denver-isoglobalpki@visa.com
[ 2] Signature Algorithm: SHA256withRSA, OID = 1.2.840.113549.1.1.11
[ 2]
[ 2] Key: Sun RSA public key, 2048 bits
[ 2] modulus: 18776859345782379368477552646752454587680913058106096317672514564432545067260695008080601136989801784063177559112612874853200890078644288345179608274731702487082743918677708599746110422242182265022563953225577130976581640240900531049751130142907050635129384266497017558790840242016553039736187988822171956757352022628563841886828585101742847997706973324285250247496393308459353165556076913953090555852435214554744837971734360234209805761602544872065911238784793336496587970606600419804730072731032166947675454731409696110287831293741812006854129548382889854561267221336513659266467389348458801338535258083258834662207
[ 2] public exponent: 65537
[ 2] Validity: [From: Fri Mar 09 14:34:56 CST 2018,
[ 2] To: Thu Aug 14 16:49:56 CDT 2025]
[ 2] Issuer: CN=TEST Visa Info Delivery Root CA, OU=Visa International Service Association, O=VISA, C=US
[ 2] SerialNumber: [ ff60876a 438f0ab7 d1ac142a 9356c0f5]
[ 2]
[ 2] Certificate Extensions: 5
[ 2] [1]: ObjectId: 2.5.29.35 Criticality=false
[ 2] AuthorityKeyIdentifier [
[ 2] KeyIdentifier [
[ 2] 0000: BD 62 D5 7F 8F 6C E4 62 0E F2 A7 F9 A1 98 EA C2 .b...l.b........
[ 2] 0010: B8 9E E7 05 ....
[ 2] ]
[ 2] ]
[ 2]
[ 2] [2]: ObjectId: 2.5.29.19 Criticality=true
[ 2] BasicConstraints:[
[ 2] CA:true
[ 2] PathLen:0
[ 2] ]
[ 2]
[ 2] [3]: ObjectId: 2.5.29.32 Criticality=false
[ 2] CertificatePolicies [
[ 2] [CertificatePolicyId: [2.23.131.2.1]
[ 2] [PolicyQualifierInfo: [
[ 2] qualifierID: 1.3.6.1.5.5.7.2.1
[ 2] qualifier: 0000: 16 17 68 74 74 70 3A 2F 2F 77 77 77 2E 76 69 73 ..http://www.vis
[ 2] 0010: 61 2E 63 6F 6D 2F 70 6B 69 a.com/pki
[ 2]
[ 2] ]] ]
[ 2] ]
[ 2]
[ 2] [4]: ObjectId: 2.5.29.15 Criticality=true
[ 2] KeyUsage [
[ 2] Key_CertSign
[ 2] Crl_Sign
[ 2] ]
[ 2]
[ 2] [5]: ObjectId: 2.5.29.14 Criticality=false
[ 2] SubjectKeyIdentifier [
[ 2] KeyIdentifier [
[ 2] 0000: 24 1A A1 7D C6 61 2A 89 31 98 E1 51 24 3C 0C 60
[ 2] $....a*.1..Q$<.`
[ 2] 0010: 74 5F BF 16 t_..
[ 2] ]
[ 2] ]
[ 2]
[ 2] Unparseable certificate extensions: 1
[ 2] [1]: ObjectId: 2.5.29.31 Criticality=false
[ 2] Unparseable CRLDistributionPoints extension due to
[ 2] java.io.IOException: invalid URI name:ldap://aiaqa.visa.com:389/cn=TEST Visa Info Delivery Root CA,c=US,ou=Visa International Service Association,o=VISA?certificateRevocationList
[ 2]
[ 2] 0000: 30 81 FD 30 81 95 A0 81 92 A0 81 8F 86 81 8C 6C 0..0...........l
[ 2] 0010: 64 61 70 3A 2F 2F 61 69 61 71 61 2E 76 69 73 61 dap://aiaqa.visa
[ 2] 0020: 2E 63 6F 6D 3A 33 38 39 2F 63 6E 3D 54 45 53 54 .com:389/cn=TEST
[ 2] 0030: 20 56 69 73 61 20 49 6E 66 6F 20 44 65 6C 69 76 Visa Info Deliv
[ 2] 0040: 65 72 79 20 52 6F 6F 74 20 43 41 2C 63 3D 55 53 ery Root CA,c=US
[ 2] 0050: 2C 6F 75 3D 56 69 73 61 20 49 6E 74 65 72 6E 61 ,ou=Visa Interna
[ 2] 0060: 74 69 6F 6E 61 6C 20 53 65 72 76 69 63 65 20 41 tional Service A
[ 2] 0070: 73 73 6F 63 69 61 74 69 6F 6E 2C 6F 3D 56 49 53 ssociation,o=VIS
[ 2] 0080: 41 3F 63 65 72 74 69 66 69 63 61 74 65 52 65 76 A?certificateRev
[ 2] 0090: 6F 63 61 74 69 6F 6E 4C 69 73 74 30 2F A0 2D A0 ocationList0/.-.
[ 2] 00A0: 2B 86 29 68 74 74 70 3A 2F 2F 61 69 61 71 61 2E +.)http://aiaqa.
[ 2] 00B0: 76 69 73 61 2E 63 6F 6D 2F 54 65 73 74 49 6E 66 visa.com/TestInf
[ 2] 00C0: 6F 44 65 6C 52 6F 6F 74 2E 63 72 6C 30 32 A0 30 oDelRoot.crl02.0
[ 2] 00D0: A0 2E 86 2C 68 74 74 70 3A 2F 2F 45 6E 72 6F 6C ...,http://Enrol
[ 2] 00E0: 6C 2E 76 69 73 61 63 61 2E 63 6F 6D 2F 54 65 73 l.visaca.com/Tes
[ 2] 00F0: 74 49 6E 66 6F 44 65 6C 52 6F 6F 74 2E 63 72 6C tInfoDelRoot.crl
[ 2]
[ 2] ]
[ 2] Algorithm: [SHA256withRSA]
[ 2] Signature:
[ 2] 0000: 66 DE ED 00 B6 0C 17 86 B6 A6 C2 95 25 10 6D AA f...........%.m.
[ 2] 0010: 94 20 4F FF 51 BC FE 36 DE 39 CB 9D 58 63 DF D8 . O.Q..6.9..Xc..
[ 2] 0020: 44 D8 17 C6 E1 C0 72 FA 70 D7 1E CA F3 51 28 3C D.....r.p....Q(<
[ 2] 0030: D0 D9 94 D1 3E 18 94 DE FB 6E A3 CB 39 1C A6 38 ....>....n..9..8
[ 2] 0040: F3 A4 49 22 ED D3 AD 68 DA DD FE 31 0F F6 58 BF ..I"...h...1..X.
[ 2] 0050: EF 7E 92 11 55 47 12 C
[ 2] 7 FE CF 52 6F 49 33 79 83 ....UG....RoI3y.
[ 2] 0060: 9F 28 64 19 53 8E D8 38 C1 A6 EF 33 44 34 2C 9A .(d.S..8...3D4,.
[ 2] 0070: 95 46 53 C2 27 BC 18 2D 71 28 F4 9B 87 67 59 2E .FS.'..-q(...gY.
[ 2] 0080: 51 01 89 F0 F7 DD D1 DC 46 FC BB 12 C7 00 9F D1 Q.......F.......
[ 2] 0090: 30 EA FB 0C 96 77 1F 57 D3 A9 EC F3 78 A3 87 71 0....w.W....x..q
[ 2] 00A0: 8B 30 52 C7 87 3D D1 C5 AD 4B F6 5F 10 0C F7 2A .0R..=...K._...*
[ 2] 00B0: 49 AF EC A0 A2 68 ED 1C 44 0A 73 75 A0 41 A4 05 I....h..D.su.A..
[ 2] 00C0: 31 3D D2 75 66 FF 27 01 F5 D5 63 5E 80 09 E3 AD 1=.uf.'...c^....
[ 2] 00D0: AE 6C 2C 9E 67 86 F1 E2 9B 8D 96 C2 9C CC 3E 6A .l,.g.........>j
[ 2] 00E0: 52 04 F4 5E BB 4B 9A A7 27 59 A7 B4 F9 3D 1A 74 R..^.K..'Y...=.t
[ 2] 00F0: 34 98 AF A3 1D 46 8C 8A B8 A2 10 42 F2 67 75 4A 4....F.....B.guJ
[ 2]
[ 2] ]
[ 2] chain [2] = [
[ 2] [
[ 2] Version: V3
[ 2] Subject: CN=TEST Visa Info Delivery Root CA, OU=Visa International Service Association, O=VISA, C=US
[ 2] Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5
[ 2]
[ 2] Key: Sun RSA public key, 2048 bits
[ 2] modulus: 27865893927046724631333988956965740630975253531811862040526206605785650393695566222709982714317494758476817568522723327414247842719704383778363924462645375722649891258313243847872155949265080484551731951603430685642535739650845385299577593238894263096598904331344123823432928793349781527427283934669629767127437415129727809927428941788505682659950239996811222717105052301785921778379049154889761649125124207274529074137554585063422564652205133302821276331068380484265659454895100600051849939230185986276502068666306907607902021702399695097853211983361884981181480454841705325724714197452527605081248299270630918823541
[ 2] public exponent: 65537
[ 2] Validity: [From: Tue Aug 16 17:48:53 CDT 2005,
[ 2] To: Fri Aug 15 17:48:53 CDT 2025]
[ 2] Issuer: CN=TEST Visa Info Delivery Root CA, OU=Visa International Service Association, O=VISA, C=US
[ 2] SerialNumber: [ 535062c8 81bbb8d6 a4d0445a d47377f5]
[ 2]
[ 2] Certificate Extensions: 5
[ 2] [1]: ObjectId: 2.5.29.35 Criticality=false
[ 2] AuthorityKeyIdentifier [
[ 2] KeyIdentifier [
[ 2] 0000: BD 62 D5 7F 8F 6C E4 62 0E F2 A7 F9 A1 98 EA C2 .b...l.b........
[ 2] 0010: B8 9E E7 05 ....
[ 2] ]
[ 2] ]
[ 2]
[ 2] [2]: ObjectId: 2.5.29.19 Criticality=true
[ 2] BasicConstraints:[
[ 2] CA:true
[ 2] PathLen:2147483647
[ 2] ]
[ 2]
[ 2] [3]: ObjectId: 2.5.29.32 Criticality=false
[ 2] CertificatePolicies [
[ 2] [CertificatePolicyId: [2.23.131.2.1]
[ 2] [] ]
[ 2] ]
[ 2]
[ 2] [4]: ObjectId: 2.5.29.15 Criticality=true
[ 2] KeyUsage [
[ 2] Key_CertSign
[ 2] Crl_Sign
[ 2] ]
[ 2]
[ 2] [5]: ObjectId: 2.5.29.14 Criticality=false
[ 2] SubjectKeyIdentifier [
[ 2] KeyIdentifier [
[ 2] 0000: BD 62 D5 7F 8F 6C E4 62 0E F2 A7 F9 A1 98 EA C2 .b...l.b........
[ 2] 0010: B8 9E E7 05 ....
[ 2] ]
[ 2] ]
[ 2]
[ 2] ]
[ 2] Algorithm: [SHA1withRSA]
[ 2] Signature:
[ 2] 0000: 1A D1 C0 89 10 51 A2 0D 21 7D 0F 85 13 04 F5 E4 .....Q..!.......
[ 2] 0010: 06 BB C6
[ 2] 19 9C BD E0 CC 2C 37 46 0A B2 F2 C9 4C ........,7F....L
[ 2] 0020: 1C 42 5D 7F CF 41 74 BD 25 7D BD 9E C6 38 6B 93 .B]..At.%....8k.
[ 2] 0030: C0 02 18 1D 35 5E FA B5 48 AA 51 29 1B 54 45 0B ....5^..H.Q).TE.
[ 2] 0040: 41 F3 73 F0 7B 65 05 25 51 C6 44 28 82 5C 6E DB A.s..e.%Q.D(.\n.
[ 2] 0050: 33 86 75 77 97 A6 CC 73 AF 6C 68 64 FD CD 54 B9 3.uw...s.lhd..T.
[ 2] 0060: 5E 06 7B 5C 6F 76 1F 03 71 37 71 A1 C1 E8 8D 95 ^..\ov..q7q.....
[ 2] 0070: D4 C2 12 D6 C7 0E C3 8C 70 9B 3F 55 38 CD 48 F4 ........p.?U8.H.
[ 2] 0080: 59 CB 11 B3 6E 34 9B 20 5E 6A 5D 3B 56 28 4A CD Y...n4. ^j];V(J.
[ 2] 0090: 26 81 FF 97 A6 CC 4C D3 4B 10 5E E6 0E E1 B1 6A &.....L.K.^....j
[ 2] 00A0: BF F1 88 0C 77 7A CF 49 B3 2A 25 D8 CA D7 05 E9 ....wz.I.*%.....
[ 2] 00B0: B5 D1 C2 84 2B D8 B5 01 B3 92 F0 BE 91 2B 72 08 ....+........+r.
[ 2] 00C0: 83 0F 30 8C CB 25 C3 23 FD 8C 25 D3 D9 32 49 28 ..0..%.#..%..2I(
[ 2] 00D0: FD 56 93 95 73 02 5F D7 4C 63 97 77 7F 16 40 94 .V..s._.Lc.w..@.
[ 2] 00E0: 74 CB 03 B3 9C 25 B7 99 8E A5 76 49 67 8A 49 A5 t....%....vIg.I.
[ 2] 00F0: 57 8E 09 AF 34 93 72 B5 FC 7F A5 9D CC E6 A7 32 W...4.r........2
[ 2]
[ 2] ]
[ 2] ***
[ 2] Found trusted certificate:
[ 3] Filter thread for 10.70.227.152:55121->10.211.43.124:8443, READ: TLSv1.2 Alert, length = 2
[ 2] [
[ 3] Filter thread for 10.70.227.152:55121->10.211.43.124:8443, RECV TLSv1.2 ALERT: fatal, certificate_unknown
[ 2] [
[ 2] Version: V3
[ 2] Subject: CN=*.rrqa.visa.com, OU=Reporting and Reconciliation, O=CyberSource, C=US, ST=Texas, L=Austin
[ 2] Signature Algorithm: SHA256withRSA, OID = 1.2.840.113549.1.1.11
[ 2]
[ 2] Key: Sun RSA public key, 2048 bits
[ 2] modulus: 24824609861911148367731956207130755725705649719659729865336811568996149981034534338690286354153353344508266653158584753617868237230021317208306017487967983270351091695070542082913351341182382913261119052937153821798498520488061831176507826969837392850889458408525171827693899418858827330254064337619190316780696379129270835464759473755632415088295593078451046251898729831750824798044865242085321827367450912184006349108778826501104919761225886268724208598254888198659979574162527880269074375158398714395407354895578527044163631938215555061898932828474232930430290811833335246190110596841936184286620707901501093185587
[ 2] public exponent: 65537
[ 2] Validity: [From: Thu Mar 14 10:35:21 CDT 2019,
[ 2] To: Sun Mar 13 10:35:21 CDT 2022]
[ 2] Issuer: CN=VICA Non-Prod, OU=Applied Cryptography, O=Visa Inc., C=US, EMAILADDRESS=Denver-isoglobalpki@visa.com
[ 2] SerialNumber: [ 42f0a7a4 1941775f 75dcdd86 bdee78a1 d7a78d95]
[ 2]
[ 2] Certificate Extensions: 8
[ 2] [1]: ObjectId: 1.3.6.1.5.5.7.1.1 Criticality=false
[ 2] AuthorityInfoAccess [
[ 2] [
[ 2] accessMethod: caIssuers
[ 2] accessLocation: URIName: http://aiaqa.visa.com/vicanonprod.cer
[ 2] ,
[ 2] accessMethod: ocsp
[ 2] accessLocation: URIName: http://ocspqa.visa.com/ocsp
[ 2] ]
[ 2] ]
[ 2]
[ 2] [2]: ObjectId: 2.5.29.35 Criticality=false
[ 2] AuthorityKeyIdentifier [
[ 2] KeyIdentifier [
[ 2] 0000: 24 1A A1 7D C6 61 2A 89 31 98 E1 51 24 3C 0C 60 $....a*.1..Q$<.`
[ 2] 0010: 74 5F BF 16 t_..
[ 2] ]
[ 2] ]
[ 2]
[ 2] [3]: ObjectId: 2.5.29.19 Criticality=true
[ 2] BasicConstraints:[
[ 2] CA:false
[ 2] PathLen: undefined
[ 2] ]
[ 2]
[ 2] [4]: ObjectId: 2.5.29.31 Criticality=false
[ 2] CRLDistributionPoints [
[ 2] [DistributionPoint:
[ 2] [URIName: http://aiaqa.visa.com/vicanonprod.crl]
[ 2] ]]
[ 2]
[ 2] [5]: ObjectId: 2.5.29.37 Criticality=false
[ 2] ExtendedKeyUsages [
[ 2] clientAuth
[ 2] serverAuth
[ 2] ]
[ 2]
[ 2] [6]: ObjectId: 2.5.29.15 Criticality=true
[ 2] K
[ 3] %% Invalidated: [Session-1, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384]
[ 3] Filter thread for 10.70.227.152:55121->10.211.43.124:8443, called closeSocket()
[ 2] eyUsage [
[ 2] DigitalSignature
[ 2] Key_Encipherment
[ 2] ]
[ 2]
[ 2] [7]: ObjectId: 2.5.29.17 Criticality=false
[ 2] SubjectAlternativeName [
[ 2] DNSName: *.rrqa.visa.com
[ 2] ]
[ 2]
[ 2] [8]: ObjectId: 2.5.29.14 Criticality=false
[ 2] SubjectKeyIdentifier [
[ 2] KeyIdentifier [
[ 2] 0000: C7 08 25 43 FB 9E BD E4 C3 9C 9D 36 51 E2 F9 3B ..%C.......6Q..;
[ 2] 0010: E7 F0 31 F2 ..1.
[ 2] ]
[ 2] ]
[ 2]
[ 2] ]
[ 2] Algorithm: [SHA256withRSA]
[ 2] Signature:
[ 2] 0000: 89 46 4D 47 60 A2 C1 BD 71 C9 96 79 A3 15 B5 72 .FMG`...q..y...r
[ 2] 0010: 66 07 51 3A 0D E7 0A E3 C6 7F ED DD BD 7F A9 69 f.Q:...........i
[ 2] 0020: 31 0D 2D 5B D4 59 CA 85 86 07 9B 3E 88 26 90 BC 1.-[.Y.....>.&..
[ 2] 0030: E6 18 60 46 DF 1A 22 75 83 14 29 5C F6 A7 5C 0C ..`F.."u..)\..\.
[ 2] 0040: 3B CA 85 D9 05 F3 FA 57 4B 55 79 02 8B F4 9A CA ;......WKUy.....
[ 2] 0050: E5 EF F3 52 9D 96 6B C7 29 12 5D 1D 1D D6 2D F4 ...R..k.).]...-.
[ 2] 0060: 98 46 57 1C 1D 76 0B 85 EB 91 CB 91 F2 9A 36 7C .FW..v........6.
[ 2] 0070: EF B9 C8 03 A1 88 AA 36 1A 05 71 99 25 46 61 AA .......6..q.%Fa.
[ 2] 0080: 6A B4 19 7E 55 01 0B AC CC C9 1A D8 00 39 FD 32 j...U........9.2
[ 2] 0090: B7 40 A4 B5 5D 76 F4 C5 3E BA 3A 5D CF 32 F4 A7 .@..]v..>.:].2..
[ 2] 00A0: 7F 72 D6 6B D8 B2 34 55 64 5E 84 A5 D6 04 EC 8A .r.k..4Ud^......
[ 2] 00B0: C2 71 2E A7 43 3B 87 28 09 6B 37 F2 90 BA FB 53 .q..C;.(.k7....S
[ 2] 00C0: BA 71 D3 BE 88 0F 4B 9F 42 54 09 8E EB 0F 99 03 .q....K.BT......
[ 2] 00D0: DE C9 41 B9 A3 7D E4 E8 A5 B1 A3 F9 EB FE 50 83 ..A...........P.
[ 2] 00E0: 96 85 58 04 69 FB F4 93 43 F9 2C E4 FA 9F 89 73 ..X.i...C.,....s
[ 2] 00F0: AD C4 72 17 67 86 C8 64 5F 02 41 3A 26 7D 90 39 ..r.g..d_.A:&..9
[ 2]
[ 2] ]
[ 3] Filter thread for 10.70.227.152:55121->10.211.43.124:8443, handling exception: javax.net.ssl.SSLHandshakeException: Received fatal alert: certificate_unknown
[ 2] *** ECDH ServerKeyExchange
[ 2] Signature Algorithm SHA512withRSA
[ 2] Server key: Sun EC public key, 256 bits
[ 2] public x coord: 58170274799469039195739029049538389820083038437070449895471962371134172521591
[ 2] public y coord: 39296266965299061000661117522519396094677834575885608548039638607700619374564
[ 2] parameters: secp256r1 [NIST P-256, X9.62 prime256v1] (1.2.840.10045.3.1.7)
[ 3] Filter thread for 10.70.227.152:55121->10.211.43.124:8443, called close()
[ 3] Filter thread for 10.70.227.152:55121->10.211.43.124:8443, called closeInternal(true)
[ 3] [SSL Handshake Summary] Thread [Filter thread for 10.70.227.152:55121->10.211.43.124:8443]
[ 3] [SSL Handshake Summary] Acting as a Server
[ 3] [SSL Handshake Summary] *†‡ indicates linked optional steps
[ 3] [SSL Handshake Summary]
[ 3] [SSL Handshake Summary] 1 RUN Client Hello -->
[ 3] [SSL Handshake Summary] 2 RUN <-- Server Hello
[ 3] [SSL Handshake Summary] 3* RUN <-- Server Certificate (Public Key)
[ 3] [SSL Handshake Summary] 4† SKIPPED <-- Request Client Certificate
[ 3] [SSL Handshake Summary] 5* ASSUMED Verify and Trust Server Certificate v
[ 3] [SSL Handshake Summary] 6‡ RUN <-- Server Key Exchange
[ 3] [SSL Handshake Summary] 7 RUN <-- Server Hello Done
[ 3] [SSL Handshake Summary] 8† UNKNOWN Client Certificate (Public Key) -->
[ 3] [SSL Handshake Summary] 9† UNKNOWN v Verify and Trust Client Certificate
[ 3] [SSL Handshake Summary] 10 UNKNOWN Client Key Exchange -->
[ 3] [SSL Handshake Summary] 11† UNKNOWN Certificate Verify Confirmation -->
[ 3] [SSL Handshake Summary] 12 UNKNOWN Client Change Cipher Spec -->
[ 3] [SSL Handshake Summary] 13 UNKNOWN Client Finished -->
[ 3] [SSL Handshake Summary] 14 UNKNOWN <-- Server Change Cipher Spec
[ 3] [SSL Handshake Summary] 15 UNKNOWN <-- Server Finished
[ 3] [SSL Handshake Summary]
[ 3] [SSL Handshake Summary] RECV TLSv1.2 ALERT: fatal, certificate_unknown
[ 3] [SSL Handshake Summary] javax.net.ssl.SSLHandshakeException: Received fatal alert: certificate_unknown
[ 3] [SSL Handshake Summary] See Alert or Exception for details
[ 2] *** CertificateRequest
[ 2] Cert Types: RSA, DSS, ECDSA
[ 2] Supported Signature Algorithms: SHA512withECDSA, SHA512withRSA, SHA384withECDSA, SHA384withRSA, SHA256withECDSA, SHA256withRSA, SHA256withDSA, Unknown (hash:0x3, signature:0x3), Unknown (hash:0x3, signature:0x1), Unknown (hash:0x3, signature:0x2), SHA1withECDSA, SHA1withRSA, SHA1withDSA
[ 2] Cert Authorities:
[ 2] <CN=*.rrqa.visa.com, OU=Reporting and Reconciliation, O=CyberSource, C=US, ST=Texas, L=Austin>
[ 2] <CN=TEST Visa Info Delivery Root CA, OU=Visa International Service Association, O=VISA, C=US>
[ 2] <CN=Visa Information Delivery QA Internal Issuing CA, OU=Visa International Service Associatoin, O=VISA, C=US>
[ 2] *** ServerHelloDone
[ 2] matching alias: wildrrqa
[ 2] *** Certificate chain
[ 2] chain [0] = [
[ 2] [
[ 2] Version: V3
[ 2] Subject: CN=*.rrqa.visa.com, OU=Reporting and Reconciliation, O=CyberSource, C=US, ST=Texas, L=Austin
[ 2] Signature Algorithm: SHA256withRSA, OID = 1.2.840.113549.1.1.11
[ 2]
[ 2] Key: Sun RSA public key, 2048 bits
[ 2] modulus: 24824609861911148367731956207130755725705649719659729865336811568996149981034534338690286354153353344508266653158584753617868237230021317208306017487967983270351091695070542082913351341182382913261119052937153821798498520488061831176507826969837392850889458408525171827693899418858827330254064337619190316780696379129270835464759473755632415088295593078451046251898729831750824798044865242085321827367450912184006349108778826501104919761225886268724208598254888198659979574162527880269074375158398714395407354895578527044163631938215555061898932828474232930430290811833335246190110596841936184286620707901501093185587
[ 2] public exponent: 65537
[ 2] Validity: [From: Thu Mar 14 10:35:21 CDT 2019,
[ 2] To: Sun Mar 13 10:35:21 CDT 2022]
[ 2] Issuer: CN=VICA Non-Prod, OU=Applied Cryptography, O=Visa Inc., C=US, EMAILADDRESS=Denver-isoglobalpki@visa.com
[ 2] SerialNumber: [ 42f0a7a4 1941775f 75dcdd86 bdee78a1 d7a78d95]
[ 2]
[ 2] Certificate Extensions: 8
[ 2] [1]: ObjectId: 1.3.6.1.5.5.7.1.1 Criticality=false
[ 2] AuthorityInfoAccess [
[ 2] [
[ 2] accessMethod: caIssuers
[ 2] accessLocation: URIName: http://aiaqa.visa.com/vicanonprod.cer
[ 2] ,
[ 2] accessMethod: ocsp
[ 2] accessLocation: URIName: http://ocspqa.visa.com/ocsp
[ 2] ]
[ 2] ]
[ 2]
[ 2] [2]: ObjectId: 2.5.29.35 Criticality=false
[ 2] AuthorityKeyIdentifier [
[ 2] KeyIdentifier [
[ 2] 0000: 24 1A A1 7D C6 61 2A 89 31 98 E1 51 24 3C 0C 60 $....a*.1..Q$<.`
[ 2] 0010: 74 5F BF 16 t_..
[ 2] ]
[ 2] ]
[ 2]
[ 2] [3]: ObjectId: 2.5.29.19 Criticality=true
[ 2] BasicConstraints:[
[ 2] CA:false
[ 2] PathLen: undefined
[ 2] ]
[ 2]
[ 2] [4]: ObjectId: 2.5.29.31 Criticality=false
[ 2] CRLDistributionPoints [
[ 2] [DistributionPoint:
[ 2] [URIName: http://aiaqa.visa.com/vicanonprod.crl]
[ 2] ]]
[ 2]
[ 2] [5]: ObjectId: 2.5.29.37 Criticality=false
[ 2] ExtendedKeyUsages [
[ 2] clientAuth
[ 2] serverAuth
[ 2] ]
[ 2]
[ 2] [6]: ObjectId: 2.5.29.15 Critic
[ 2] ality=true
[ 2] KeyUsage [
[ 2] DigitalSignature
[ 2] Key_Encipherment
[ 2] ]
[ 2]
[ 2] [7]: ObjectId: 2.5.29.17 Criticality=false
[ 2] SubjectAlternativeName [
[ 2] DNSName: *.rrqa.visa.com
[ 2] ]
[ 2]
[ 2] [8]: ObjectId: 2.5.29.14 Criticality=false
[ 2] SubjectKeyIdentifier [
[ 2] KeyIdentifier [
[ 2] 0000: C7 08 25 43 FB 9E BD E4 C3 9C 9D 36 51 E2 F9 3B ..%C.......6Q..;
[ 2] 0010: E7 F0 31 F2 ..1.
[ 2] ]
[ 2] ]
[ 2]
[ 2] ]
[ 2] Algorithm: [SHA256withRSA]
[ 2] Signature:
[ 2] 0000: 89 46 4D 47 60 A2 C1 BD 71 C9 96 79 A3 15 B5 72 .FMG`...q..y...r
[ 2] 0010: 66 07 51 3A 0D E7 0A E3 C6 7F ED DD BD 7F A9 69 f.Q:...........i
[ 2] 0020: 31 0D 2D 5B D4 59 CA 85 86 07 9B 3E 88 26 90 BC 1.-[.Y.....>.&..
[ 2] 0030: E6 18 60 46 DF 1A 22 75 83 14 29 5C F6 A7 5C 0C ..`F.."u..)\..\.
[ 2] 0040: 3B CA 85 D9 05 F3 FA 57 4B 55 79 02 8B F4 9A CA ;......WKUy.....
[ 2] 0050: E5 EF F3 52 9D 96 6B C7 29 12 5D 1D 1D D6 2D F4 ...R..k.).]...-.
[ 2] 0060: 98 46 57 1C 1D 76 0B 85 EB 91 CB 91 F2 9A 36 7C .FW..v........6.
[ 2] 0070: EF B9 C8 03 A1 88 AA 36 1A 05 71 99 25 46 61 AA .......6..q.%Fa.
[ 2] 0080: 6A B4 19 7E 55 01 0B AC CC C9 1A D8 00 39 FD 32 j...U........9.2
[ 2] 0090: B7 40 A4 B5 5D 76 F4 C5 3E BA 3A 5D CF 32 F4 A7 .@..]v..>.:].2..
[ 2] 00A0: 7F 72 D6 6B D8 B2 34 55 64 5E 84 A5 D6 04 EC 8A .r.k..4Ud^......
[ 2] 00B0: C2 71 2E A7 43 3B 87 28 09 6B 37 F2 90 BA FB 53 .q..C;.(.k7....S
[ 2] 00C0: BA 71 D3 BE 88 0F 4B 9F 42 54 09 8E EB 0F 99 03 .q....K.BT......
[ 2] 00D0: DE C9 41 B9 A3 7D E4 E8 A5 B1 A3 F9 EB FE 50 83 ..A...........P.
[ 2] 00E0: 96 85 58 04 69 FB F4 93 43 F9 2C E4 FA 9F 89 73 ..X.i...C.,....s
[ 2] 00F0: AD C4 72 17 67 86 C8 64 5F 02 41 3A 26 7D 90 39 ..r.g..d_.A:&..9
[ 2]
[ 2] ]
[ 2] chain [1] = [
[ 2] [
[ 2] Version: V3
[ 2] Subject: CN=VICA Non-Prod, OU=Applied Cryptography, O=Visa Inc., C=US, EMAILADDRESS=Denver-isoglobalpki@visa.com
[ 2] Signature Algorithm: SHA256withRSA, OID = 1.2.840.113549.1.1.11
[ 2]
[ 2] Key: Sun RSA public key, 2048 bits
[ 2] modulus: 18776859345782379368477552646752454587680913058106096317672514564432545067260695008080601136989801784063177559112612874853200890078644288345179608274731702487082743918677708599746110422242182265022563953225577130976581640240900531049751130142907050635129384266497017558790840242016553039736187988822171956757352022628563841886828585101742847997706973324285250247496393308459353165556076913953090555852435214554744837971734360234209805761602544872065911238784793336496587970606600419804730072731032166947675454731409696110287831293741812006854129548382889854561267221336513659266467389348458801338535258083258834662207
[ 2] public exponent: 65537
[ 2] Validity: [From: Fri Mar 09 14:34:56 CST 2018,
[ 2] To: Thu Aug 14 16:49:56 CDT 2025]
[ 2] Issuer: CN=TEST Visa Info Delivery Root CA, OU=Visa International Service Association, O=VISA, C=US
[ 2] SerialNumber: [ ff60876a 438f0ab7 d1ac142a 9356c0f5]
[ 2]
[ 2] Certificate Extensions: 5
[ 2] [1]: ObjectId: 2.5.29.35 Criticality=false
[ 2] AuthorityKeyIdentifier [
[ 2] KeyIdentifier [
[ 2] 0000: BD 62 D5 7F 8F 6C E4 62 0E F2 A7 F9 A1 98 EA C2 .b...l.b........
[ 2] 0010: B8 9E E7 05 ....
[ 2] ]
[ 2] ]
[ 2]
[ 2] [2]: ObjectId: 2.5.29.19 Criticality=true
[ 2] BasicConstraints:[
[ 2] CA:true
[ 2] PathLen:0
[ 2] ]
[ 2]
[ 2] [3]: ObjectId: 2.5.29.32 Criticality=false
[ 2] CertificatePolicies [
[ 2] [CertificatePolicyId: [2.23.131.2.1]
[ 2] [PolicyQualifierInfo: [
[ 2] qualifierID: 1.3.6.1.5.5.7.2.1
[ 2] qualifier: 0000: 16 17 68 74 74 70 3A 2F 2F 77 77 77 2E 76 69 73 ..http://www.vis
[ 2] 0010: 61 2E 63 6F 6D 2F 70 6B 69 a.com/pki
[ 2]
[ 2] ]] ]
[ 2] ]
[ 2]
[ 2] [4]: ObjectId: 2.5.29.15 Criticality=true
[ 2] KeyUsage [
[ 2] Key_CertSign
[ 2] Crl_Sign
[ 2] ]
[ 2]
[ 2] [5]: ObjectId: 2.5.29.14 Criticality=false
[ 2] SubjectKeyIdentifier [
[ 2] KeyIdentifier [
[ 2] 0000: 24 1A A1 7D C6 61 2A 89 31 98 E1 51 24 3C 0C 60
[ 2] $....a*.1..Q$<.`
[ 2] 0010: 74 5F BF 16 t_..
[ 2] ]
[ 2] ]
[ 2]
[ 2] Unparseable certificate extensions: 1
[ 2] [1]: ObjectId: 2.5.29.31 Criticality=false
[ 2] Unparseable CRLDistributionPoints extension due to
[ 2] java.io.IOException: invalid URI name:ldap://aiaqa.visa.com:389/cn=TEST Visa Info Delivery Root CA,c=US,ou=Visa International Service Association,o=VISA?certificateRevocationList
[ 2]
[ 2] 0000: 30 81 FD 30 81 95 A0 81 92 A0 81 8F 86 81 8C 6C 0..0...........l
[ 2] 0010: 64 61 70 3A 2F 2F 61 69 61 71 61 2E 76 69 73 61 dap://aiaqa.visa
[ 2] 0020: 2E 63 6F 6D 3A 33 38 39 2F 63 6E 3D 54 45 53 54 .com:389/cn=TEST
[ 2] 0030: 20 56 69 73 61 20 49 6E 66 6F 20 44 65 6C 69 76 Visa Info Deliv
[ 2] 0040: 65 72 79 20 52 6F 6F 74 20 43 41 2C 63 3D 55 53 ery Root CA,c=US
[ 2] 0050: 2C 6F 75 3D 56 69 73 61 20 49 6E 74 65 72 6E 61 ,ou=Visa Interna
[ 2] 0060: 74 69 6F 6E 61 6C 20 53 65 72 76 69 63 65 20 41 tional Service A
[ 2] 0070: 73 73 6F 63 69 61 74 69 6F 6E 2C 6F 3D 56 49 53 ssociation,o=VIS
[ 2] 0080: 41 3F 63 65 72 74 69 66 69 63 61 74 65 52 65 76 A?certificateRev
[ 2] 0090: 6F 63 61 74 69 6F 6E 4C 69 73 74 30 2F A0 2D A0 ocationList0/.-.
[ 2] 00A0: 2B 86 29 68 74 74 70 3A 2F 2F 61 69 61 71 61 2E +.)http://aiaqa.
[ 2] 00B0: 76 69 73 61 2E 63 6F 6D 2F 54 65 73 74 49 6E 66 visa.com/TestInf
[ 2] 00C0: 6F 44 65 6C 52 6F 6F 74 2E 63 72 6C 30 32 A0 30 oDelRoot.crl02.0
[ 2] 00D0: A0 2E 86 2C 68 74 74 70 3A 2F 2F 45 6E 72 6F 6C ...,http://Enrol
[ 2] 00E0: 6C 2E 76 69 73 61 63 61 2E 63 6F 6D 2F 54 65 73 l.visaca.com/Tes
[ 2] 00F0: 74 49 6E 66 6F 44 65 6C 52 6F 6F 74 2E 63 72 6C tInfoDelRoot.crl
[ 2]
[ 2] ]
[ 2] Algorithm: [SHA256withRSA]
[ 2] Signature:
[ 2] 0000: 66 DE ED 00 B6 0C 17 86 B6 A6 C2 95 25 10 6D AA f...........%.m.
[ 2] 0010: 94 20 4F FF 51 BC FE 36 DE 39 CB 9D 58 63 DF D8 . O.Q..6.9..Xc..
[ 2] 0020: 44 D8 17 C6 E1 C0 72 FA 70 D7 1E CA F3 51 28 3C D.....r.p....Q(<
[ 2] 0030: D0 D9 94 D1 3E 18 94 DE FB 6E A3 CB 39 1C A6 38 ....>....n..9..8
[ 2] 0040: F3 A4 49 22 ED D3 AD 68 DA DD FE 31 0F F6 58 BF ..I"...h...1..X.
[ 2] 0050: EF 7E 92 11 55 47 12 C
[ 2] 7 FE CF 52 6F 49 33 79 83 ....UG....RoI3y.
[ 2] 0060: 9F 28 64 19 53 8E D8 38 C1 A6 EF 33 44 34 2C 9A .(d.S..8...3D4,.
[ 2] 0070: 95 46 53 C2 27 BC 18 2D 71 28 F4 9B 87 67 59 2E .FS.'..-q(...gY.
[ 2] 0080: 51 01 89 F0 F7 DD D1 DC 46 FC BB 12 C7 00 9F D1 Q.......F.......
[ 2] 0090: 30 EA FB 0C 96 77 1F 57 D3 A9 EC F3 78 A3 87 71 0....w.W....x..q
[ 2] 00A0: 8B 30 52 C7 87 3D D1 C5 AD 4B F6 5F 10 0C F7 2A .0R..=...K._...*
[ 2] 00B0: 49 AF EC A0 A2 68 ED 1C 44 0A 73 75 A0 41 A4 05 I....h..D.su.A..
[ 2] 00C0: 31 3D D2 75 66 FF 27 01 F5 D5 63 5E 80 09 E3 AD 1=.uf.'...c^....
[ 2] 00D0: AE 6C 2C 9E 67 86 F1 E2 9B 8D 96 C2 9C CC 3E 6A .l,.g.........>j
[ 2] 00E0: 52 04 F4 5E BB 4B 9A A7 27 59 A7 B4 F9 3D 1A 74 R..^.K..'Y...=.t
[ 2] 00F0: 34 98 AF A3 1D 46 8C 8A B8 A2 10 42 F2 67 75 4A 4....F.....B.guJ
[ 2]
[ 2] ]
[ 2] chain [2] = [
[ 2] [
[ 2] Version: V3
[ 2] Subject: CN=TEST Visa Info Delivery Root CA, OU=Visa International Service Association, O=VISA, C=US
[ 2] Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5
[ 2]
[ 2] Key: Sun RSA public key, 2048 bits
[ 2] modulus: 27865893927046724631333988956965740630975253531811862040526206605785650393695566222709982714317494758476817568522723327414247842719704383778363924462645375722649891258313243847872155949265080484551731951603430685642535739650845385299577593238894263096598904331344123823432928793349781527427283934669629767127437415129727809927428941788505682659950239996811222717105052301785921778379049154889761649125124207274529074137554585063422564652205133302821276331068380484265659454895100600051849939230185986276502068666306907607902021702399695097853211983361884981181480454841705325724714197452527605081248299270630918823541
[ 2] public exponent: 65537
[ 2] Validity: [From: Tue Aug 16 17:48:53 CDT 2005,
[ 2] To: Fri Aug 15 17:48:53 CDT 2025]
[ 2] Issuer: CN=TEST Visa Info Delivery Root CA, OU=Visa International Service Association, O=VISA, C=US
[ 2] SerialNumber: [ 535062c8 81bbb8d6 a4d0445a d47377f5]
[ 2]
[ 2] Certificate Extensions: 5
[ 2] [1]: ObjectId: 2.5.29.35 Criticality=false
[ 2] AuthorityKeyIdentifier [
[ 2] KeyIdentifier [
[ 2] 0000: BD 62 D5 7F 8F 6C E4 62 0E F2 A7 F9 A1 98 EA C2 .b...l.b........
[ 2] 0010: B8 9E E7 05 ....
[ 2] ]
[ 2] ]
[ 2]
[ 2] [2]: ObjectId: 2.5.29.19 Criticality=true
[ 2] BasicConstraints:[
[ 2] CA:true
[ 2] PathLen:2147483647
[ 2] ]
[ 2]
[ 2] [3]: ObjectId: 2.5.29.32 Criticality=false
[ 2] CertificatePolicies [
[ 2] [CertificatePolicyId: [2.23.131.2.1]
[ 2] [] ]
[ 2] ]
[ 2]
[ 2] [4]: ObjectId: 2.5.29.15 Criticality=true
[ 2] KeyUsage [
[ 2] Key_CertSign
[ 2] Crl_Sign
[ 2] ]
[ 2]
[ 2] [5]: ObjectId: 2.5.29.14 Criticality=false
[ 2] SubjectKeyIdentifier [
[ 2] KeyIdentifier [
[ 2] 0000: BD 62 D5 7F 8F 6C E4 62 0E F2 A7 F9 A1 98 EA C2 .b...l.b........
[ 2] 0010: B8 9E E7 05 ....
[ 2] ]
[ 2] ]
[ 2]
[ 2] ]
[ 2] Algorithm: [SHA1withRSA]
[ 2] Signature:
[ 2] 0000: 1A D1 C0 89 10 51 A2 0D 21 7D 0F 85 13 04 F5 E4 .....Q..!.......
[ 2] 0010: 06 BB C6
[ 2] 19 9C BD E0 CC 2C 37 46 0A B2 F2 C9 4C ........,7F....L
[ 2] 0020: 1C 42 5D 7F CF 41 74 BD 25 7D BD 9E C6 38 6B 93 .B]..At.%....8k.
[ 2] 0030: C0 02 18 1D 35 5E FA B5 48 AA 51 29 1B 54 45 0B ....5^..H.Q).TE.
[ 2] 0040: 41 F3 73 F0 7B 65 05 25 51 C6 44 28 82 5C 6E DB A.s..e.%Q.D(.\n.
[ 2] 0050: 33 86 75 77 97 A6 CC 73 AF 6C 68 64 FD CD 54 B9 3.uw...s.lhd..T.
[ 2] 0060: 5E 06 7B 5C 6F 76 1F 03 71 37 71 A1 C1 E8 8D 95 ^..\ov..q7q.....
[ 2] 0070: D4 C2 12 D6 C7 0E C3 8C 70 9B 3F 55 38 CD 48 F4 ........p.?U8.H.
[ 2] 0080: 59 CB 11 B3 6E 34 9B 20 5E 6A 5D 3B 56 28 4A CD Y...n4. ^j];V(J.
[ 2] 0090: 26 81 FF 97 A6 CC 4C D3 4B 10 5E E6 0E E1 B1 6A &.....L.K.^....j
[ 2] 00A0: BF F1 88 0C 77 7A CF 49 B3 2A 25 D8 CA D7 05 E9 ....wz.I.*%.....
[ 2] 00B0: B5 D1 C2 84 2B D8 B5 01 B3 92 F0 BE 91 2B 72 08 ....+........+r.
[ 2] 00C0: 83 0F 30 8C CB 25 C3 23 FD 8C 25 D3 D9 32 49 28 ..0..%.#..%..2I(
[ 2] 00D0: FD 56 93 95 73 02 5F D7 4C 63 97 77 7F 16 40 94 .V..s._.Lc.w..@.
[ 2] 00E0: 74 CB 03 B3 9C 25 B7 99 8E A5 76 49 67 8A 49 A5 t....%....vIg.I.
[ 2] 00F0: 57 8E 09 AF 34 93 72 B5 FC 7F A5 9D CC E6 A7 32 W...4.r........2
[ 2]
[ 2] ]
[ 2] ***
[ 2] *** ECDHClientKeyExchange
[ 2] ECDH Public value: { 4, 216, 158, 96, 189, 66, 151, 241, 122, 186, 135, 7, 98, 46, 199, 66, 212, 175, 20, 85, 33, 122, 27, 133, 106, 191, 158, 54, 13, 33, 73, 176, 18, 87, 69, 238, 28, 242, 4, 46, 67, 80, 77, 130, 44, 162, 5, 205, 178, 197, 8, 108, 230, 16, 11, 181, 115, 224, 112, 90, 53, 192, 131, 253, 200 }
[ 2] Filter thread for 10.211.43.124:8443->10.70.227.152:55121, WRITE: TLSv1.2 Handshake, length = 3688
[ 2] SESSION KEYGEN:
[ 2] PreMaster Secret:
[ 2] 0000: ED 89 FC C7 5F EE EB E1 01 33 A9 1C A6 E1 8F 55 ...._....3.....U
[ 2] 0010: A5 80 12 CB 48 D0 AF CA BD F4 99 B2 84 5C FC 74 ....H........\.t
[ 2] CONNECTION KEYGEN:
[ 2] Client Nonce:
[ 2] 0000: 5D 82 CC 8B 70 52 80 96 CC A9 85 F8 0A 0E 17 BB ]...pR..........
[ 2] 0010: 3B A9 28 A7 9E DC 0F D2 11 7C EC 92 C5 1C B3 55 ;.(............U
[ 2] Server Nonce:
[ 2] 0000: 5D 82 CC 8B 55 55 22 8D 2F 52 B7 C2 55 B3 BD 20 ]...UU"./R..U..
[ 2] 0010: 08 DC 1F 97 E0 D1 6B 16 2A 2E D8 EA 39 62 4D 3C ......k.*...9bM<
[ 2] Master Secret:
[ 2] 0000: BC 2E 0B 60 79 CA C5 7D F1 16 7A FB 73 41 E5 C0 ...`y.....z.sA..
[ 2] 0010: 04 96 44 82 FA 0E EC 68 24 EE 01 25 5C 90 EF 6D ..D....h$..%\..m
[ 2] 0020: 0C BA 0B 6C 68 F6 A5 57 07 F2 96 69 FB C8 74 B3 ...lh..W...i..t.
[ 2] Client MAC write Secret:
[ 2] 0000: 81 CD 81 08 55 04 93 FC 86 30 2C A0 FF 38 1B F2 ....U....0,..8..
[ 2] 0010: 14 49 19 E6 68 EB 55 FE AE 2E 3C 2F DB 00 AC 7E .I..h.U...</....
[ 2] 0020: AD E6 50 E4 B1 90 66 61 9C DA 42 EE CE DD 47 E6 ..P...fa..B...G.
[ 2] Server MAC write Secret:
[ 2] 0000: 3C 06 75 D5 2E 1B 0D 90 3F FE 38 6A 52 57 C6 4A <.u.....?.8jRW.J
[ 2] 0010: D1 C0 44 56 D8 E0 E2 AA 9E 80 4B CC E1 5F 44 9F ..DV......K.._D.
[ 2] 0020: 02 29 16 72 57 95 27 C6 95 66 F4 BA 24 2E 2C FE .).rW.'..f..$.,.
[ 2] Client write key:
[ 2] 0000: B3 4A C6 D7 A1 03 00 0B D2 94 F1 89 5B BA 19 62 .J..........[..b
[ 2] 0010: 24 80 38 EB E9 6E 3D 6D E4 C6 5B 8E 9A 27 F8 39 $.8..n=m..[..'.9
[ 2] Server write key:
[ 2] 0000: 53 2F 24 15 D4 CF 77 31 C3 38 25 92 08 66 BB F4 S/$...w1.8%..f..
[ 2] 0010: 6F 19 89 82 29 75 AC AE F5 0A 02 1D 23 69 68 1E o...)u......#ih.
[ 2] ... no IV derived for this protocol
[ 2]
[ 2] *** CertificateVerify
[ 2] Signature Algorithm SHA512withRSA
[ 2] Filter thread for 10.211.43.124:8443->10.70.227.152:55121, WRITE: TLSv1.2 Handshake, length = 264
[ 2] Filter thread for 10.211.43.124:8443->10.70.227.152:55121, WRITE: TLSv1.2 Change Cipher Spec, length = 1
[ 2] *** Finished
[ 2] verify_data: { 7, 196, 224, 134, 181, 122, 57, 124, 22, 184, 53, 51 }
[ 2] ***
[ 2] Filter thread for 10.211.43.124:8443->10.70.227.152:55121, WRITE: TLSv1.2 Handshake, length = 96
[ 3] Filter thread for 10.70.227.152:55121->10.211.43.124:8443, SEND TLSv1.2 ALERT: warning, description = close_notify
[ 3] Filter thread for 10.70.227.152:55121->10.211.43.124:8443, WRITE: TLSv1.2 Alert, length = 80
[ 3] Filter thread for 10.70.227.152:55121->10.211.43.124:8443, called closeSocket(true)
[ 2] Filter thread for 10.211.43.124:8443->10.70.227.152:55121, handling exception: java.net.SocketException: Socket closed
[ 2] %% Invalidated: [Session-2, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384]
[ 2] Filter thread for 10.211.43.124:8443->10.70.227.152:55121, called closeSocket()
[ 3] Filter thread for 10.70.227.152:55121->10.211.43.124:8443, called close()
[ 3] Filter thread for 10.70.227.152:55121->10.211.43.124:8443, called closeInternal(true)
[ 2] Filter thread for 10.211.43.124:8443->10.70.227.152:55121, called close()
[ 2] Filter thread for 10.211.43.124:8443->10.70.227.152:55121, called closeInternal(true)
[ 2] [SSL Handshake Summary] Thread [Filter thread for 10.211.43.124:8443->10.70.227.152:55121]
[ 2] [SSL Handshake Summary] Acting as a Client
[ 2] [SSL Handshake Summary] *†‡ indicates linked optional steps
[ 2] [SSL Handshake Summary]
[ 2] [SSL Handshake Summary] 1 RUN Client Hello -->
[ 2] [SSL Handshake Summary] 2 RUN <-- Server Hello
[ 2] [SSL Handshake Summary] 3* RUN <-- Server Certificate (Public Key)
[ 2] [SSL Handshake Summary] 4† RUN <-- Request Client Certificate
[ 2] [SSL Handshake Summary] 5* ASSUMED Verify and Trust Server Certificate v
[ 2] [SSL Handshake Summary] 6‡ RUN <-- Server Key Exchange
[ 2] [SSL Handshake Summary] 7 RUN <-- Server Hello Done
[ 2] [SSL Handshake Summary] 8† RUN Client Certificate (Public Key) -->
[ 2] [SSL Handshake Summary] 9† UNKNOWN v Verify and Trust Client Certificate
[ 2] [SSL Handshake Summary] 10 RUN Client Key Exchange -->
[ 2] [SSL Handshake Summary] 11† RUN Certificate Verify Confirmation -->
[ 2] [SSL Handshake Summary] 12 RUN Client Change Cipher Spec -->
[ 2] [SSL Handshake Summary] 13 RUN Client Finished -->
[ 2] [SSL Handshake Summary] 14 UNKNOWN <-- Server Change Cipher Spec
[ 2] [SSL Handshake Summary] 15 UNKNOWN <-- Server Finished
[ 2] [SSL Handshake Summary]
[ 2] [SSL Handshake Summary] java.net.SocketException: Socket closed
[ 2] [SSL Handshake Summary] See Alert or Exception for details
[ 2] Filter thread for 10.211.43.124:8443->10.70.227.152:55121, called close()
[ 2] Filter thread for 10.211.43.124:8443->10.70.227.152:55121, called closeInternal(true)
[ 1] Allow unsafe renegotiation: false
[ 1] Allow legacy hello messages: true
[ 1] Is initial handshake: true
[ 1] Is secure renegotiation: false
[ 1] Allow unsafe renegotiation: false
[ 1] Allow legacy hello messages: true
[ 1] Is initial handshake: true
[ 1] Is secure renegotiation: false
[ 4] Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for SSLv3
[ 4] Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for SSLv3
[ 4] Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 for SSLv3
[ 4] Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 for SSLv3
[ 4] Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 for SSLv3
[ 5] Ignoring obsoleted cipher suite: SSL_RSA_WITH_DES_CBC_SHA
[ 4] Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for SSLv3
[ 5] Ignoring obsoleted cipher suite: SSL_DHE_RSA_WITH_DES_CBC_SHA
[ 4] Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for SSLv3
[ 5] Ignoring obsoleted cipher suite: SSL_DHE_DSS_WITH_DES_CBC_SHA
[ 4] Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1
[ 5] Ignoring obsoleted cipher suite: SSL_DH_anon_WITH_DES_CBC_SHA
[ 4] Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLSv1
[ 5] Ignoring obsoleted cipher suite: SSL_RSA_EXPORT_WITH_DES40_CBC_SHA
[ 4] Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 for TLSv1
[ 5] Ignoring obsoleted cipher suite: SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA
[ 4] Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1
[ 5] Ignoring obsoleted cipher suite: SSL_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA
[ 4] Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 for TLSv1
[ 5] Ignoring obsoleted cipher suite: SSL_DH_anon_EXPORT_WITH_DES40_CBC_SHA
[ 4] Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1
[ 5] Ignoring obsoleted cipher suite: TLS_KRB5_WITH_DES_CBC_SHA
[ 4] Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1
[ 5] Ignoring obsoleted cipher suite: TLS_KRB5_WITH_DES_CBC_MD5
[ 4] Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1.1
[ 5] Ignoring obsoleted cipher suite: TLS_KRB5_EXPORT_WITH_DES_CBC_40_SHA
[ 4] Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLSv1.1
[ 5] Ignoring obsoleted cipher suite: TLS_KRB5_EXPORT_WITH_DES_CBC_40_MD5
[ 4] Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1
[ 5] %% No cached client session
[ 4] Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1.1
[ 5] *** ClientHello, TLSv1.2
[ 4] Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 for TLSv1.1
[ 5] RandomCookie: GMT: 1552010135 bytes = { 15, 225, 185, 109, 237, 8, 241, 97, 142, 237, 161, 220, 67, 71, 115, 52, 3, 18, 251, 139, 244, 195, 172, 90, 80, 124, 166, 26 }
[ 4] Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1
[ 5] Session ID: {}
[ 4] Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1.1
[ 5] Cipher Suites: [TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384, TLS_RSA_WITH_AES_256_CBC_SHA256, TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384, TLS_DHE_RSA_WITH_AES_256_CBC_SHA256, TLS_DHE_DSS_WITH_AES_256_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDH_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_DSS_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256, TLS_RSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_DSS_WITH_AES_128_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, TLS_RSA_WITH_AES_256_GCM_SHA384, TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, TLS_DHE_DSS_WITH_AES_256_GCM_SHA384, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_DSS_WITH_AES_128_GCM_SHA256, TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA, TLS_EMPTY_RENEGOTIATION_INFO_SCSV, TLS_DH_anon_WITH_AES_256_GCM_SHA384, TLS_DH_anon_WITH_AES_128_GCM_SHA256, TLS_DH_anon_WITH_AES_256_CBC_SHA256, TLS_ECDH_anon_WITH_AES_256_CBC_SHA, TLS_DH_anon_WITH_AES_256_CBC_SHA, TLS_DH_anon_WITH_
[ 5] AES_128_CBC_SHA256, TLS_ECDH_anon_WITH_AES_128_CBC_SHA, TLS_DH_anon_WITH_AES_128_CBC_SHA, TLS_ECDH_anon_WITH_3DES_EDE_CBC_SHA, SSL_DH_anon_WITH_3DES_EDE_CBC_SHA, TLS_RSA_WITH_NULL_SHA256, TLS_ECDHE_ECDSA_WITH_NULL_SHA, TLS_ECDHE_RSA_WITH_NULL_SHA, SSL_RSA_WITH_NULL_SHA, TLS_ECDH_ECDSA_WITH_NULL_SHA, TLS_ECDH_RSA_WITH_NULL_SHA, TLS_ECDH_anon_WITH_NULL_SHA, SSL_RSA_WITH_NULL_MD5, TLS_KRB5_WITH_3DES_EDE_CBC_SHA, TLS_KRB5_WITH_3DES_EDE_CBC_MD5]
[ 5] Compression Methods: { 0 }
[ 4] Filter thread for 10.70.227.152:55331->10.211.43.124:8443, READ: TLSv1.2 Handshake, length = 156
[ 5] Extension elliptic_curves, curve names: {secp256r1, sect163k1, sect163r2, secp192r1, secp224r1, sect233k1, sect233r1, sect283k1, sect283r1, secp384r1, sect409k1, sect409r1, secp521r1, sect571k1, sect571r1, secp160k1, secp160r1, secp160r2, sect163r1, secp192k1, sect193r1, sect193r2, secp224k1, sect239k1, secp256k1}
[ 4] *** ClientHello, TLSv1.2
[ 5] Extension ec_point_formats, formats: [uncompressed]
[ 4] RandomCookie: GMT: 1552010135 bytes = { 102, 32, 165, 202, 231, 174, 99, 194, 83, 250, 161, 247, 61, 248, 96, 67, 151, 99, 143, 253, 11, 249, 174, 130, 11, 232, 166, 60 }
[ 5] Extension signature_algorithms, signature_algorithms: SHA512withECDSA, SHA512withRSA, SHA384withECDSA, SHA384withRSA, SHA256withECDSA, SHA256withRSA, SHA256withDSA, SHA1withECDSA, SHA1withRSA, SHA1withDSA
[ 4] Session ID: {}
[ 5] ***
[ 4] Cipher Suites: [TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_RSA_WITH_AES_128_GCM_SHA256, TLS_RSA_WITH_AES_128_CBC_SHA256]
[ 5] Filter thread for 10.211.43.124:8443->10.70.227.152:55331, WRITE: TLSv1.2 Handshake, length = 273
[ 4] Compression Methods: { 0 }
[ 4] Extension elliptic_curves, curve names: {secp256r1, secp384r1, secp521r1, sect283k1, sect283r1, sect409k1, sect409r1, sect571k1, sect571r1, secp256k1}
[ 4] Extension ec_point_formats, formats: [uncompressed]
[ 4] Extension signature_algorithms, signature_algorithms: SHA512withECDSA, SHA512withRSA, SHA384withECDSA, SHA384withRSA, SHA256withECDSA, SHA256withRSA, SHA256withDSA, Unknown (hash:0x3, signature:0x3), Unknown (hash:0x3, signature:0x1), Unknown (hash:0x3, signature:0x2), SHA1withECDSA, SHA1withRSA, SHA1withDSA
[ 4] Unsupported extension type_23, data:
[ 4] Extension server_name, server_name: [type=host_name (0), value=cis.rrqa.visa.com]
[ 4] Extension renegotiation_info, renegotiated_connection: <empty>
[ 4] ***
[ 4] %% Initialized: [Session-3, SSL_NULL_WITH_NULL_NULL]
[ 4] %% Negotiating: [Session-3, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384]
[ 4] *** ServerHello, TLSv1.2
[ 4] RandomCookie: GMT: 1552010135 bytes = { 105, 246, 41, 202, 122, 196, 198, 203, 74, 196, 55, 222, 33, 254, 1, 152, 33, 26, 221, 176, 38, 124, 14, 46, 65, 251, 254, 31 }
[ 4] Session ID: {93, 130, 204, 151, 247, 62, 16, 153, 201, 248, 182, 160, 53, 122, 133, 73, 145, 150, 8, 89, 250, 74, 219, 106, 118, 23, 2, 189, 221, 17, 237, 90}
[ 4] Cipher Suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
[ 4] Compression Method: 0
[ 4] Extension renegotiation_info, renegotiated_connection: <empty>
[ 4] ***
[ 4] Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
[ 4] *** Certificate chain
[ 4] chain [0] = [
[ 4] [
[ 4] Version: V3
[ 4] Subject: CN=Lisa, OU=Lisa, O=Lisa, L=Dallas, ST=Texas, C=US, EMAILADDRESS=support@itko.com
[ 4] Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5
[ 4]
[ 4] Key: Sun RSA public key, 1024 bits
[ 4] modulus: 107577342571485428802393728049184265786056348388364405824138117397977455761833138845329880593678805610027793821217939298848284286683543926634250841496293888229172692948746730869670908754188073542091973621265074265583182385560072567366227383567380577316296862528343858318946945517967854106447414857653511333997
[ 4] public exponent: 65537
[ 4] Validity: [From: Fri Aug 20 11:07:30 CDT 2010,
[ 4] To: Tue Jan 05 10:07:30 CST 2038]
[ 4] Issuer: CN=Lisa, OU=Lisa, O=Lisa, L=Dallas, ST=Texas, C=US, EMAILADDRESS=support@itko.com
[ 4] SerialNumber: [ 4c6ea842]
[ 4]
[ 4] ]
[ 4] Algorithm: [SHA1withRSA]
[ 4] Signature:
[ 4] 0000: 2B 7F 77 08 DE 2F 74 E3 CD 0F 58 D8 57 D9 08 2E +.w../t...X.W...
[ 4] 0010: AC 57 A7 02 81 07 B7 F8 5B 68 AE 22 22 C6 75 EE .W......[h."".u.
[ 4] 0020: C2 41 B6 23 DE ED 17 F8 21 AE 3B ED B6 EA 1A 17 .A.#....!.;.....
[ 4] 0030: A4 5F 95 FD BE AE 74 DA 75 64 19 D6 60 0A 63 61 ._....t.ud..`.ca
[ 4] 0040: B6 2A E1 FB 06 C5 36 E5 00 0C EB 20 EF FA 82 29 .*....6.... ...)
[ 4] 0050: 40 39 EA 61 3A 27 CF 4F 00 18 33 E8 31 4C E4 C5 @9.a:'.O..3.1L..
[ 4] 0060: 44 98 60 15 80 FE 85 FB BF BD 95 AB 35 14 F7 16 D.`.........5...
[ 4] 0070: 9D 58 F5 26 10 B7 76 7D 43 20 A7 4B F4 ED EE CF .X.&..v.C .K....
[ 4]
[ 4] ]
[ 4] ***
[ 4] *** ECDH ServerKeyExchange
[ 4] Signature Algorithm SHA512withRSA
[ 4] Server key: Sun EC public key, 256 bits
[ 4] public x coord: 71163752476099909667672931537941272679128667391712551545824729162898143901985
[ 4] public y coord: 50525644730265383382653664517132393276632934712249178606988985814651070581647
[ 4] parameters: secp256r1 [NIST P-256, X9.62 prime256v1] (1.2.840.10045.3.1.7)
[ 4] *** ServerHelloDone
[ 4] Filter thread for 10.70.227.152:55331->10.211.43.124:8443, WRITE: TLSv1.2 Handshake, length = 927
[ 4] Filter thread for 10.70.227.152:55331->10.211.43.124:8443, READ: TLSv1.2 Alert, length = 2
[ 4] Filter thread for 10.70.227.152:55331->10.211.43.124:8443, RECV TLSv1.2 ALERT: fatal, certificate_unknown
[ 4] %% Invalidated: [Session-3, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384]
[ 4] Filter thread for 10.70.227.152:55331->10.211.43.124:8443, called closeSocket()
[ 4] Filter thread for 10.70.227.152:55331->10.211.43.124:8443, handling exception: javax.net.ssl.SSLHandshakeException: Received fatal alert: certificate_unknown
[ 4] Filter thread for 10.70.227.152:55331->10.211.43.124:8443, called close()
[ 4] Filter thread for 10.70.227.152:55331->10.211.43.124:8443, called closeInternal(true)
[ 4] [SSL Handshake Summary] Thread [Filter thread for 10.70.227.152:55331->10.211.43.124:8443]
[ 4] [SSL Handshake Summary] Acting as a Server
[ 4] [SSL Handshake Summary] *†‡ indicates linked optional steps
[ 4] [SSL Handshake Summary]
[ 4] [SSL Handshake Summary] 1 RUN Client Hello -->
[ 4] [SSL Handshake Summary] 2 RUN <-- Server Hello
[ 4] [SSL Handshake Summary] 3* RUN <-- Server Certificate (Public Key)
[ 4] [SSL Handshake Summary] 4† SKIPPED <-- Request Client Certificate
[ 4] [SSL Handshake Summary] 5* ASSUMED Verify and Trust Server Certificate v
[ 4] [SSL Handshake Summary] 6‡ RUN <-- Server Key Exchange
[ 4] [SSL Handshake Summary] 7 RUN <-- Server Hello Done
[ 4] [SSL Handshake Summary] 8† UNKNOWN Client Certificate (Public Key) -->
[ 4] [SSL Handshake Summary] 9† UNKNOWN v Verify and Trust Client Certificate
[ 4] [SSL Handshake Summary] 10 UNKNOWN Client Key Exchange -->
[ 4] [SSL Handshake Summary] 11† UNKNOWN Certificate Verify Confirmation -->
[ 4] [SSL Handshake Summary] 12 UNKNOWN Client Change Cipher Spec -->
[ 4] [SSL Handshake Summary] 13 UNKNOWN Client Finished -->
[ 4] [SSL Handshake Summary] 14 UNKNOWN <-- Server Change Cipher Spec
[ 4] [SSL Handshake Summary] 15 UNKNOWN <-- Server Finished
[ 4] [SSL Handshake Summary]
[ 4] [SSL Handshake Summary] RECV TLSv1.2 ALERT: fatal, certificate_unknown
[ 4] [SSL Handshake Summary] javax.net.ssl.SSLHandshakeException: Received fatal alert: certificate_unknown
[ 4] [SSL Handshake Summary] See Alert or Exception for details
[ 4] Filter thread for 10.70.227.152:55331->10.211.43.124:8443, SEND TLSv1.2 ALERT: warning, description = close_notify
[ 4] Filter thread for 10.70.227.152:55331->10.211.43.124:8443, WRITE: TLSv1.2 Alert, length = 2
[ 4] Filter thread for 10.70.227.152:55331->10.211.43.124:8443, called closeSocket(true)
[ 4] Filter thread for 10.70.227.152:55331->10.211.43.124:8443, called close()
[ 5] Filter thread for 10.211.43.124:8443->10.70.227.152:55331, handling exception: java.net.SocketException: Socket closed
[ 4] Filter thread for 10.70.227.152:55331->10.211.43.124:8443, called closeInternal(true)
[ 5] Filter thread for 10.211.43.124:8443->10.70.227.152:55331, called closeSocket()
[ 5] Filter thread for 10.211.43.124:8443->10.70.227.152:55331, called close()
[ 5] Filter thread for 10.211.43.124:8443->10.70.227.152:55331, called closeInternal(true)
[ 5] [SSL Handshake Summary] Thread [Filter thread for 10.211.43.124:8443->10.70.227.152:55331]
[ 5] [SSL Handshake Summary] Can not be sure if Client or Server
[ 5] [SSL Handshake Summary] *†‡ indicates linked optional steps
[ 5] [SSL Handshake Summary]
[ 5] [SSL Handshake Summary] 1 RUN Client Hello -->
[ 5] [SSL Handshake Summary] 2 UNKNOWN <-- Server Hello
[ 5] [SSL Handshake Summary] 3* UNKNOWN <-- Server Certificate (Public Key)
[ 5] [SSL Handshake Summary] 4† UNKNOWN <-- Request Client Certificate
[ 5] [SSL Handshake Summary] 5* UNKNOWN Verify and Trust Server Certificate v
[ 5] [SSL Handshake Summary] 6‡ UNKNOWN <-- Server Key Exchange
[ 5] [SSL Handshake Summary] 7 UNKNOWN <-- Server Hello Done
[ 5] [SSL Handshake Summary] 8† UNKNOWN Client Certificate (Public Key) -->
[ 5] [SSL Handshake Summary] 9† UNKNOWN v Verify and Trust Client Certificate
[ 5] [SSL Handshake Summary] 10 UNKNOWN Client Key Exchange -->
[ 5] [SSL Handshake Summary] 11† UNKNOWN Certificate Verify Confirmation -->
[ 5] [SSL Handshake Summary] 12 UNKNOWN Client Change Cipher Spec -->
[ 5] [SSL Handshake Summary] 13 UNKNOWN Client Finished -->
[ 5] [SSL Handshake Summary] 14 UNKNOWN <-- Server Change Cipher Spec
[ 5] [SSL Handshake Summary] 15 UNKNOWN <-- Server Finished
[ 5] [SSL Handshake Summary]
[ 5] [SSL Handshake Summary] java.net.SocketException: Socket closed
[ 5] [SSL Handshake Summary] See Alert or Exception for details
[ 5] Filter thread for 10.211.43.124:8443->10.70.227.152:55331, called close()
[ 5] Filter thread for 10.211.43.124:8443->10.70.227.152:55331, called closeInternal(true)
[ 6] Finalizer, called close()
[ 6] Finalizer, called closeInternal(true)
[ 6] Finalizer, called close()
[ 6] Finalizer, called closeInternal(true)
[ 6] Finalizer, called close()
[ 6] Finalizer, called closeInternal(true)
[ 6] Finalizer, called close()
[ 6] Finalizer, called closeInternal(true)