[2021-04-22 10:59:38,991] c-0000000000 start TLS javax.net.ssl|DEBUG|1D|httpclient-dispatch-1|2021-04-22 10:59:39.020 CEST|SSLConfiguration.java:458|System property jdk.tls.server.SignatureSchemes is set to 'null' [2021-04-22 10:59:39,066] ep-0000000000 upgraded c-0000000000 [2021-04-22 10:59:39,066] ex-0000000001 upgraded to TLS [2021-04-22 10:59:39,066] ex-0000000001 route fully established [2021-04-22 10:59:39,066] ex-0000000001 executing POST /some/request/path HTTP/1.1 [2021-04-22 10:59:39,066] ep-0000000000 start execution ex-0000000001 [2021-04-22 10:59:39,066] ep-0000000000 executing exchange ex-0000000001 over c-0000000000 [2021-04-22 10:59:39,066] c-0000000000 RequestExecutionCommand with NORMAL priority [2021-04-22 10:59:39,067] c-0000000000[ACTIVE][rw:r][ACTIVE][rw][NOT_HANDSHAKING][0][0][0] Enqueued RequestExecutionCommand with priority IMMEDIATE [2021-04-22 10:59:39,068] c-0000000000 Connection is kept alive [2021-04-22 10:59:39,068] c-0000000000[ACTIVE][rw:r][ACTIVE][rw][NOT_HANDSHAKING][0][0][0] Event set [r] javax.net.ssl|DEBUG|1D|httpclient-dispatch-1|2021-04-22 10:59:39.069 CEST|SSLConfiguration.java:458|System property jdk.tls.client.SignatureSchemes is set to 'null' [2021-04-22 10:59:39,073] Enabled protocols: [TLSv1.3, TLSv1.2] [2021-04-22 10:59:39,074] Enabled cipher suites:[TLS_AES_256_GCM_SHA384, TLS_AES_128_GCM_SHA256, TLS_CHACHA20_POLY1305_SHA256, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256, TLS_DHE_DSS_WITH_AES_256_GCM_SHA384, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_DSS_WITH_AES_128_GCM_SHA256, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_RSA_WITH_AES_256_CBC_SHA256, TLS_DHE_DSS_WITH_AES_256_CBC_SHA256, TLS_DHE_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_DSS_WITH_AES_128_CBC_SHA256, TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384, TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_DSS_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDH_RSA_WITH_AES_256_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_GCM_SHA384, TLS_RSA_WITH_AES_128_GCM_SHA256, TLS_RSA_WITH_AES_256_CBC_SHA256, TLS_RSA_WITH_AES_128_CBC_SHA256, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_EMPTY_RENEGOTIATION_INFO_SCSV] javax.net.ssl|DEBUG|1D|httpclient-dispatch-1|2021-04-22 10:59:39.075 CEST|HandshakeContext.java:298|Ignore unsupported cipher suite: TLS_AES_256_GCM_SHA384 for TLS12 javax.net.ssl|DEBUG|1D|httpclient-dispatch-1|2021-04-22 10:59:39.075 CEST|HandshakeContext.java:298|Ignore unsupported cipher suite: TLS_AES_128_GCM_SHA256 for TLS12 javax.net.ssl|DEBUG|1D|httpclient-dispatch-1|2021-04-22 10:59:39.075 CEST|HandshakeContext.java:298|Ignore unsupported cipher suite: TLS_CHACHA20_POLY1305_SHA256 for TLS12 javax.net.ssl|ALL|1D|httpclient-dispatch-1|2021-04-22 10:59:39.113 CEST|SignatureScheme.java:384|Ignore unsupported signature scheme: ecdsa_sha224 javax.net.ssl|ALL|1D|httpclient-dispatch-1|2021-04-22 10:59:39.114 CEST|SignatureScheme.java:384|Ignore unsupported signature scheme: rsa_sha224 javax.net.ssl|ALL|1D|httpclient-dispatch-1|2021-04-22 10:59:39.114 CEST|SignatureScheme.java:384|Ignore unsupported signature scheme: dsa_sha224 javax.net.ssl|ALL|1D|httpclient-dispatch-1|2021-04-22 10:59:39.114 CEST|SignatureScheme.java:403|Ignore disabled signature scheme: rsa_md5 javax.net.ssl|DEBUG|1D|httpclient-dispatch-1|2021-04-22 10:59:39.115 CEST|SessionTicketExtension.java:408|Stateless resumption supported javax.net.ssl|DEBUG|1D|httpclient-dispatch-1|2021-04-22 10:59:39.116 CEST|SSLExtensions.java:260|Ignore, context unavailable extension: cookie javax.net.ssl|DEBUG|1D|httpclient-dispatch-1|2021-04-22 10:59:39.172 CEST|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info javax.net.ssl|DEBUG|1D|httpclient-dispatch-1|2021-04-22 10:59:39.173 CEST|PreSharedKeyExtension.java:660|No session to resume. javax.net.ssl|DEBUG|1D|httpclient-dispatch-1|2021-04-22 10:59:39.173 CEST|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key javax.net.ssl|DEBUG|1D|httpclient-dispatch-1|2021-04-22 10:59:39.177 CEST|ClientHello.java:652|Produced ClientHello handshake message ( "ClientHello": { "client version" : "TLSv1.2", "random" : "31 D8 89 26 E6 1C 3D 0F B0 95 C8 6B B3 5E 00 99 1F 10 AE 54 6B 97 0C B6 4B AC E7 FE 40 9A 09 25", "session id" : "B8 73 A4 DE D2 2A 9F E0 8F 73 1D 0A 8A 0A A4 F6 B2 87 2F DF 33 0A CE B1 89 4A E3 04 53 90 9E FB", "cipher suites" : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA(0xC00A), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA(0xC014), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA(0xC009), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA(0xC013), TLS_DHE_RSA_WITH_AES_256_CBC_SHA(0x0039), TLS_DHE_DSS_WITH_AES_256_CBC_SHA(0x0038), TLS_DHE_RSA_WITH_AES_128_CBC_SHA(0x0033), TLS_DHE_DSS_WITH_AES_128_CBC_SHA(0x0032), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA(0xC005), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA(0xC00F), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA(0xC004), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA(0xC00E), TLS_RSA_WITH_AES_256_GCM_SHA384(0x009D), TLS_RSA_WITH_AES_128_GCM_SHA256(0x009C), TLS_RSA_WITH_AES_256_CBC_SHA256(0x003D), TLS_RSA_WITH_AES_128_CBC_SHA256(0x003C), TLS_RSA_WITH_AES_256_CBC_SHA(0x0035), TLS_RSA_WITH_AES_128_CBC_SHA(0x002F), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]", "compression methods" : "00", "extensions" : [ "server_name (0)": { type=host_name (0), value=some.host.com }, "status_request (5)": { "certificate status type": ocsp "OCSP status request": { "responder_id": "request extensions": { } } }, "supported_groups (10)": { "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192] }, "ec_point_formats (11)": { "formats": [uncompressed] }, "signature_algorithms (13)": { "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, ed25519, ed448, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1] }, "signature_algorithms_cert (50)": { "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, ed25519, ed448, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1] }, "application_layer_protocol_negotiation (16)": { [http/1.1] }, "status_request_v2 (17)": { "cert status request": { "certificate status type": ocsp_multi "OCSP status request": { "responder_id": "request extensions": { } } } }, "extended_master_secret (23)": { }, "session_ticket (35)": { }, "supported_versions (43)": { "versions": [TLSv1.3, TLSv1.2] }, "psk_key_exchange_modes (45)": { "ke_modes": [psk_dhe_ke] }, "key_share (51)": { "client_shares": [ { "named group": x25519 "key_exchange": { 0000: 3D CA 42 F6 F9 E5 4A 9B C6 01 5A 4A 1C BD 4B 2F =.B...J...ZJ..K/ 0010: D8 F0 2D 40 DE 31 BD A6 AA F0 6B B5 02 9A 29 22 ..-@.1....k...)" } }, { "named group": secp256r1 "key_exchange": { 0000: 04 73 0F 00 F9 C4 F0 DE 6E 0B 09 D7 72 A2 2E 27 .s......n...r..' 0010: 42 42 C2 EF B5 34 0A F0 B7 4F 91 17 5B 98 6A F4 BB...4...O..[.j. 0020: 87 F3 87 C3 C7 33 9F A7 3F C7 64 2E 30 11 E4 67 .....3..?.d.0..g 0030: BF AE C4 D6 62 F6 D7 65 DF 92 6E E5 A0 82 EC 59 ....b..e..n....Y 0040: F4 } }, ] } ] } ) javax.net.ssl|DEBUG|1D|httpclient-dispatch-1|2021-04-22 10:59:39.179 CEST|SSLEngineOutputRecord.java:510|WRITE: TLS13 handshake, length = 491 javax.net.ssl|DEBUG|1D|httpclient-dispatch-1|2021-04-22 10:59:39.180 CEST|SSLEngineOutputRecord.java:528|Raw write ( [...] ) javax.net.ssl|DEBUG|1D|httpclient-dispatch-1|2021-04-22 10:59:39.233 CEST|SSLEngineInputRecord.java:177|Raw read ( [...] ) javax.net.ssl|DEBUG|1D|httpclient-dispatch-1|2021-04-22 10:59:39.233 CEST|SSLEngineInputRecord.java:214|READ: TLSv1.2 handshake, length = 93 javax.net.ssl|DEBUG|1D|httpclient-dispatch-1|2021-04-22 10:59:39.236 CEST|ServerHello.java:891|Consuming ServerHello handshake message ( "ServerHello": { "server version" : "TLSv1.2", "random" : "EC 52 27 3A 9C DF 65 67 6B B6 B7 82 B0 2B 78 9F 3D 88 65 6C 1A 16 1E FB 68 3B 30 32 C9 4B F7 EB", "session id" : "95 FC 93 81 E1 39 10 32 B8 21 3E 21 C3 D5 C7 D1 BC 62 89 2E 80 48 1E 4B 20 C2 79 20 F4 17 F0 70", "cipher suite" : "TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030)", "compression methods" : "00", "extensions" : [ "server_name (0)": { }, "renegotiation_info (65,281)": { "renegotiated connection": [] }, "ec_point_formats (11)": { "formats": [uncompressed, ansiX962_compressed_prime, ansiX962_compressed_char2] } ] } ) javax.net.ssl|DEBUG|1D|httpclient-dispatch-1|2021-04-22 10:59:39.237 CEST|SSLExtensions.java:173|Ignore unavailable extension: supported_versions javax.net.ssl|DEBUG|1D|httpclient-dispatch-1|2021-04-22 10:59:39.237 CEST|ServerHello.java:987|Negotiated protocol version: TLSv1.2 javax.net.ssl|DEBUG|1D|httpclient-dispatch-1|2021-04-22 10:59:39.238 CEST|SSLExtensions.java:192|Consumed extension: renegotiation_info javax.net.ssl|DEBUG|1D|httpclient-dispatch-1|2021-04-22 10:59:39.239 CEST|SSLExtensions.java:192|Consumed extension: server_name javax.net.ssl|DEBUG|1D|httpclient-dispatch-1|2021-04-22 10:59:39.239 CEST|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length javax.net.ssl|DEBUG|1D|httpclient-dispatch-1|2021-04-22 10:59:39.239 CEST|SSLExtensions.java:173|Ignore unavailable extension: status_request javax.net.ssl|DEBUG|1D|httpclient-dispatch-1|2021-04-22 10:59:39.239 CEST|SSLExtensions.java:192|Consumed extension: ec_point_formats javax.net.ssl|DEBUG|1D|httpclient-dispatch-1|2021-04-22 10:59:39.239 CEST|SSLExtensions.java:173|Ignore unavailable extension: status_request_v2 javax.net.ssl|DEBUG|1D|httpclient-dispatch-1|2021-04-22 10:59:39.239 CEST|SSLExtensions.java:173|Ignore unavailable extension: session_ticket javax.net.ssl|DEBUG|1D|httpclient-dispatch-1|2021-04-22 10:59:39.239 CEST|SSLExtensions.java:163|Ignore unsupported extension: supported_versions javax.net.ssl|DEBUG|1D|httpclient-dispatch-1|2021-04-22 10:59:39.240 CEST|SSLExtensions.java:163|Ignore unsupported extension: key_share javax.net.ssl|DEBUG|1D|httpclient-dispatch-1|2021-04-22 10:59:39.240 CEST|SSLExtensions.java:192|Consumed extension: renegotiation_info javax.net.ssl|DEBUG|1D|httpclient-dispatch-1|2021-04-22 10:59:39.240 CEST|SSLExtensions.java:163|Ignore unsupported extension: pre_shared_key javax.net.ssl|ALL|1D|httpclient-dispatch-1|2021-04-22 10:59:39.240 CEST|SSLSessionImpl.java:220|Session initialized: Session(1619081979240|TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) javax.net.ssl|WARNING|1D|httpclient-dispatch-1|2021-04-22 10:59:39.240 CEST|SSLExtensions.java:215|Ignore impact of unsupported extension: server_name javax.net.ssl|DEBUG|1D|httpclient-dispatch-1|2021-04-22 10:59:39.240 CEST|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length javax.net.ssl|DEBUG|1D|httpclient-dispatch-1|2021-04-22 10:59:39.240 CEST|SSLExtensions.java:207|Ignore unavailable extension: status_request javax.net.ssl|WARNING|1D|httpclient-dispatch-1|2021-04-22 10:59:39.240 CEST|SSLExtensions.java:215|Ignore impact of unsupported extension: ec_point_formats javax.net.ssl|DEBUG|1D|httpclient-dispatch-1|2021-04-22 10:59:39.240 CEST|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|1D|httpclient-dispatch-1|2021-04-22 10:59:39.241 CEST|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2 javax.net.ssl|DEBUG|1D|httpclient-dispatch-1|2021-04-22 10:59:39.241 CEST|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret javax.net.ssl|DEBUG|1D|httpclient-dispatch-1|2021-04-22 10:59:39.241 CEST|SSLExtensions.java:207|Ignore unavailable extension: session_ticket javax.net.ssl|DEBUG|1D|httpclient-dispatch-1|2021-04-22 10:59:39.241 CEST|SSLExtensions.java:207|Ignore unavailable extension: supported_versions javax.net.ssl|DEBUG|1D|httpclient-dispatch-1|2021-04-22 10:59:39.241 CEST|SSLExtensions.java:207|Ignore unavailable extension: key_share javax.net.ssl|WARNING|1D|httpclient-dispatch-1|2021-04-22 10:59:39.241 CEST|SSLExtensions.java:215|Ignore impact of unsupported extension: renegotiation_info javax.net.ssl|DEBUG|1D|httpclient-dispatch-1|2021-04-22 10:59:39.241 CEST|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key javax.net.ssl|DEBUG|1D|httpclient-dispatch-1|2021-04-22 10:59:39.248 CEST|SSLEngineInputRecord.java:177|Raw read ( [...] ) javax.net.ssl|DEBUG|1D|httpclient-dispatch-1|2021-04-22 10:59:39.248 CEST|SSLEngineInputRecord.java:214|READ: TLSv1.2 handshake, length = 4592 javax.net.ssl|DEBUG|1D|httpclient-dispatch-1|2021-04-22 10:59:39.254 CEST|CertificateMessage.java:366|Consuming server Certificate handshake message ( "Certificates": [ [...] ] ) javax.net.ssl|DEBUG|1D|httpclient-dispatch-1|2021-04-22 10:59:39.305 CEST|X509TrustManagerImpl.java:301|Found trusted certificate ( [...] ) javax.net.ssl|DEBUG|1D|httpclient-dispatch-1|2021-04-22 10:59:39.307 CEST|SSLEngineInputRecord.java:177|Raw read ( [...] ) javax.net.ssl|DEBUG|1D|httpclient-dispatch-1|2021-04-22 10:59:39.307 CEST|SSLEngineInputRecord.java:214|READ: TLSv1.2 handshake, length = 333 javax.net.ssl|DEBUG|1D|httpclient-dispatch-1|2021-04-22 10:59:39.313 CEST|ECDHServerKeyExchange.java:514|Consuming ECDH ServerKeyExchange handshake message ( "ECDH ServerKeyExchange": { [...] } ) javax.net.ssl|DEBUG|1D|httpclient-dispatch-1|2021-04-22 10:59:39.314 CEST|SSLEngineInputRecord.java:177|Raw read ( 0000: 16 03 03 00 04 0E 00 00 00 ......... ) javax.net.ssl|DEBUG|1D|httpclient-dispatch-1|2021-04-22 10:59:39.314 CEST|SSLEngineInputRecord.java:214|READ: TLSv1.2 handshake, length = 4 javax.net.ssl|DEBUG|1D|httpclient-dispatch-1|2021-04-22 10:59:39.314 CEST|ServerHelloDone.java:151|Consuming ServerHelloDone handshake message ( ) javax.net.ssl|DEBUG|1D|httpclient-dispatch-1|2021-04-22 10:59:39.321 CEST|ECDHClientKeyExchange.java:400|Produced ECDHE ClientKeyExchange handshake message ( "ECDH ClientKeyExchange": { [...] } ) javax.net.ssl|DEBUG|1D|httpclient-dispatch-1|2021-04-22 10:59:39.342 CEST|ChangeCipherSpec.java:115|Produced ChangeCipherSpec message javax.net.ssl|DEBUG|1D|httpclient-dispatch-1|2021-04-22 10:59:39.344 CEST|Finished.java:398|Produced client Finished handshake message ( "Finished": { "verify data": { 0000: 7A BA 01 35 C8 41 04 64 96 5A 2E 15 }'} ) javax.net.ssl|DEBUG|1D|httpclient-dispatch-1|2021-04-22 10:59:39.344 CEST|SSLEngineOutputRecord.java:510|WRITE: TLS12 handshake, length = 70 javax.net.ssl|DEBUG|1D|httpclient-dispatch-1|2021-04-22 10:59:39.345 CEST|SSLEngineOutputRecord.java:528|Raw write ( [...] ) javax.net.ssl|DEBUG|1D|httpclient-dispatch-1|2021-04-22 10:59:39.345 CEST|SSLEngineOutputRecord.java:510|WRITE: TLS12 change_cipher_spec, length = 1 javax.net.ssl|DEBUG|1D|httpclient-dispatch-1|2021-04-22 10:59:39.346 CEST|SSLEngineOutputRecord.java:528|Raw write ( 0000: 14 03 03 00 01 01 ...... ) javax.net.ssl|DEBUG|1D|httpclient-dispatch-1|2021-04-22 10:59:39.346 CEST|SSLEngineOutputRecord.java:510|WRITE: TLS12 handshake, length = 16 javax.net.ssl|DEBUG|1D|httpclient-dispatch-1|2021-04-22 10:59:39.349 CEST|SSLCipher.java:1770|Plaintext before ENCRYPTION ( 0000: 14 00 00 0C 7A BA 01 35 C8 41 04 64 96 5A 2E 15 ....z..5.A.d.Z.. ) javax.net.ssl|DEBUG|1D|httpclient-dispatch-1|2021-04-22 10:59:39.349 CEST|SSLEngineOutputRecord.java:528|Raw write ( 0000: 16 03 03 00 28 00 00 00 00 00 00 00 00 89 80 6B ....(..........k 0010: 32 76 E5 24 CB 6A 4F E8 B8 66 10 57 A7 4F C2 4F 2v.$.jO..f.W.O.O 0020: 59 88 30 34 10 8C A5 67 FC 43 04 4A 28 Y.04...g.C.J( ) javax.net.ssl|DEBUG|1D|httpclient-dispatch-1|2021-04-22 10:59:39.395 CEST|SSLEngineInputRecord.java:177|Raw read ( 0000: 14 03 03 00 01 01 16 03 03 00 28 8D 7F 65 97 D9 ..........(..e.. 0010: 05 2E 15 32 87 98 F1 F6 6B E9 69 9B 3D 82 D0 60 ...2....k.i.=..` 0020: 6E A5 14 5E 53 F7 60 26 CC 33 68 42 22 98 4C 2A n..^S.`&.3hB".L* 0030: 1B 4B 1A .K. ) javax.net.ssl|DEBUG|1D|httpclient-dispatch-1|2021-04-22 10:59:39.396 CEST|SSLEngineInputRecord.java:214|READ: TLSv1.2 change_cipher_spec, length = 1 javax.net.ssl|DEBUG|1D|httpclient-dispatch-1|2021-04-22 10:59:39.396 CEST|ChangeCipherSpec.java:149|Consuming ChangeCipherSpec message javax.net.ssl|DEBUG|1D|httpclient-dispatch-1|2021-04-22 10:59:39.397 CEST|SSLEngineInputRecord.java:177|Raw read ( 0000: 16 03 03 00 28 8D 7F 65 97 D9 05 2E 15 32 87 98 ....(..e.....2.. 0010: F1 F6 6B E9 69 9B 3D 82 D0 60 6E A5 14 5E 53 F7 ..k.i.=..`n..^S. 0020: 60 26 CC 33 68 42 22 98 4C 2A 1B 4B 1A `&.3hB".L*.K. ) javax.net.ssl|DEBUG|1D|httpclient-dispatch-1|2021-04-22 10:59:39.397 CEST|SSLEngineInputRecord.java:214|READ: TLSv1.2 handshake, length = 40 javax.net.ssl|DEBUG|1D|httpclient-dispatch-1|2021-04-22 10:59:39.398 CEST|SSLCipher.java:1672|Plaintext after DECRYPTION ( 0000: 14 00 00 0C 4A AA 3A C5 7A 2A EE 0C 10 2A 3F 5F ....J.:.z*...*?_ ) javax.net.ssl|DEBUG|1D|httpclient-dispatch-1|2021-04-22 10:59:39.398 CEST|Finished.java:550|Consuming server Finished handshake message ( "Finished": { "verify data": { 0000: 4A AA 3A C5 7A 2A EE 0C 10 2A 3F 5F }'} ) [2021-04-22 10:59:39,399] Secure session established [2021-04-22 10:59:39,400] negotiated protocol: TLSv1.2 [2021-04-22 10:59:39,400] negotiated cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 [2021-04-22 10:59:39,400] peer principal: CN=*.host.com, [...] [2021-04-22 10:59:39,400] peer alternative names: [*.host.com, host.com] [2021-04-22 10:59:39,400] issuer principal: [...] [2021-04-22 10:59:39,412] c-0000000000[ACTIVE][r:r][ACTIVE][r][NOT_HANDSHAKING][0][0][0] Event cleared [w] [2021-04-22 10:59:39,412] ex-0000000001 send request POST /some/request/path HTTP/1.1, entity len 4 [2021-04-22 10:59:39,412] c-0000000000 >> POST /some/request/path HTTP/1.1 [2021-04-22 10:59:39,412] c-0000000000 >> User-Agent: Apache-HttpAsyncClient/5.1-beta1 (Java/16) [2021-04-22 10:59:39,412] c-0000000000 >> Content-Length: 4 [2021-04-22 10:59:39,412] c-0000000000 >> Content-Type: application/json; charset=UTF-8 [2021-04-22 10:59:39,412] c-0000000000 >> Host: some.host.com [2021-04-22 10:59:39,412] c-0000000000 >> Connection: keep-alive [2021-04-22 10:59:39,416] c-0000000000[ACTIVE][rw:r][ACTIVE][rw][NOT_HANDSHAKING][0][0][0] Event set [w] [2021-04-22 10:59:39,416] ex-0000000001 produce request data [2021-04-22 10:59:39,418] ex-0000000001 produce request data, len 4 bytes [2021-04-22 10:59:39,418] c-0000000000[ACTIVE][rw:r][ACTIVE][rw][NOT_HANDSHAKING][0][0][0] Event set [w] [2021-04-22 10:59:39,418] ex-0000000001 end of request data [2021-04-22 10:59:39,418] c-0000000000[ACTIVE][rw:r][ACTIVE][rw][NOT_HANDSHAKING][0][0][0] Event set [w] javax.net.ssl|DEBUG|1D|httpclient-dispatch-1|2021-04-22 10:59:39.420 CEST|SSLEngineOutputRecord.java:271|WRITE: TLS12 application_data, length = 220 javax.net.ssl|DEBUG|1D|httpclient-dispatch-1|2021-04-22 10:59:39.421 CEST|SSLCipher.java:1770|Plaintext before ENCRYPTION ( [...] ) javax.net.ssl|DEBUG|1D|httpclient-dispatch-1|2021-04-22 10:59:39.421 CEST|SSLEngineOutputRecord.java:287|Raw write ( [...] ) [2021-04-22 10:59:39,422] c-0000000000[ACTIVE][rw:w][ACTIVE][rw][NOT_HANDSHAKING][0][0][249] 220 bytes written [2021-04-22 10:59:39,422] c-0000000000[ACTIVE][rw:w][ACTIVE][rw][NOT_HANDSHAKING][0][0][249] >> POST [...] [...] [2021-04-22 10:59:39,422] c-0000000000[ACTIVE][rw:w][ACTIVE][r][NOT_HANDSHAKING][0][0][249] Event cleared [w] javax.net.ssl|DEBUG|1D|httpclient-dispatch-1|2021-04-22 10:59:39.454 CEST|SSLEngineInputRecord.java:177|Raw read ( 0000: 16 03 03 00 1C 8D 7F 65 97 D9 05 2E 16 62 88 C7 .......e.....b.. 0010: 8D 83 78 7D 59 54 F5 51 5C 62 6D FA BA AA 10 60 ..x.YT.Q\bm....` 0020: 55 U ) javax.net.ssl|DEBUG|1D|httpclient-dispatch-1|2021-04-22 10:59:39.454 CEST|SSLEngineInputRecord.java:214|READ: TLSv1.2 handshake, length = 28 javax.net.ssl|DEBUG|1D|httpclient-dispatch-1|2021-04-22 10:59:39.455 CEST|SSLCipher.java:1672|Plaintext after DECRYPTION ( 0000: 00 00 00 00 .... ) javax.net.ssl|DEBUG|1D|httpclient-dispatch-1|2021-04-22 10:59:39.455 CEST|HandshakeContext.java:298|Ignore unsupported cipher suite: TLS_AES_256_GCM_SHA384 for TLS12 javax.net.ssl|DEBUG|1D|httpclient-dispatch-1|2021-04-22 10:59:39.455 CEST|HandshakeContext.java:298|Ignore unsupported cipher suite: TLS_AES_128_GCM_SHA256 for TLS12 javax.net.ssl|DEBUG|1D|httpclient-dispatch-1|2021-04-22 10:59:39.455 CEST|HandshakeContext.java:298|Ignore unsupported cipher suite: TLS_CHACHA20_POLY1305_SHA256 for TLS12 [2021-04-22 10:59:39,458] c-0000000000[ACTIVE][r:r][ACTIVE][r][NEED_TASK][33][0][0] 0 bytes read javax.net.ssl|DEBUG|1D|httpclient-dispatch-1|2021-04-22 10:59:59.496 CEST|HelloRequest.java:181|Consuming HelloRequest handshake message ( ) javax.net.ssl|ALL|1D|httpclient-dispatch-1|2021-04-22 10:59:59.497 CEST|SignatureScheme.java:384|Ignore unsupported signature scheme: ecdsa_sha224 javax.net.ssl|ALL|1D|httpclient-dispatch-1|2021-04-22 10:59:59.497 CEST|SignatureScheme.java:384|Ignore unsupported signature scheme: rsa_sha224 javax.net.ssl|ALL|1D|httpclient-dispatch-1|2021-04-22 10:59:59.497 CEST|SignatureScheme.java:384|Ignore unsupported signature scheme: dsa_sha224 javax.net.ssl|ALL|1D|httpclient-dispatch-1|2021-04-22 10:59:59.498 CEST|SignatureScheme.java:403|Ignore disabled signature scheme: rsa_md5 javax.net.ssl|DEBUG|1D|httpclient-dispatch-1|2021-04-22 10:59:59.498 CEST|SessionTicketExtension.java:408|Stateless resumption supported javax.net.ssl|DEBUG|1D|httpclient-dispatch-1|2021-04-22 10:59:59.498 CEST|SSLExtensions.java:260|Ignore, context unavailable extension: cookie javax.net.ssl|DEBUG|1D|httpclient-dispatch-1|2021-04-22 10:59:59.501 CEST|PreSharedKeyExtension.java:660|No session to resume. javax.net.ssl|DEBUG|1D|httpclient-dispatch-1|2021-04-22 10:59:59.501 CEST|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key javax.net.ssl|DEBUG|1D|httpclient-dispatch-1|2021-04-22 10:59:59.502 CEST|ClientHello.java:652|Produced ClientHello handshake message ( "ClientHello": { "client version" : "TLSv1.2", "random" : "8C E5 1F 14 CC C4 76 4D 48 58 AF CD 90 58 BF 05 75 41 28 E2 19 65 79 28 F1 8E DA 17 AE 8D 70 E4", "session id" : "91 D4 37 99 55 06 82 66 DC 03 26 69 06 ED 04 C4 15 F4 E6 58 FD 30 E5 0B B5 F7 00 91 61 1A ED CB", "cipher suites" : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA(0xC00A), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA(0xC014), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA(0xC009), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA(0xC013), TLS_DHE_RSA_WITH_AES_256_CBC_SHA(0x0039), TLS_DHE_DSS_WITH_AES_256_CBC_SHA(0x0038), TLS_DHE_RSA_WITH_AES_128_CBC_SHA(0x0033), TLS_DHE_DSS_WITH_AES_128_CBC_SHA(0x0032), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA(0xC005), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA(0xC00F), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA(0xC004), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA(0xC00E), TLS_RSA_WITH_AES_256_GCM_SHA384(0x009D), TLS_RSA_WITH_AES_128_GCM_SHA256(0x009C), TLS_RSA_WITH_AES_256_CBC_SHA256(0x003D), TLS_RSA_WITH_AES_128_CBC_SHA256(0x003C), TLS_RSA_WITH_AES_256_CBC_SHA(0x0035), TLS_RSA_WITH_AES_128_CBC_SHA(0x002F)]", "compression methods" : "00", "extensions" : [ "server_name (0)": { type=host_name (0), value=some.host.com }, "status_request (5)": { "certificate status type": ocsp "OCSP status request": { "responder_id": "request extensions": { } } }, "supported_groups (10)": { "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192] }, "ec_point_formats (11)": { "formats": [uncompressed] }, "signature_algorithms (13)": { "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, ed25519, ed448, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1] }, "signature_algorithms_cert (50)": { "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, ed25519, ed448, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1] }, "application_layer_protocol_negotiation (16)": { [http/1.1] }, "status_request_v2 (17)": { "cert status request": { "certificate status type": ocsp_multi "OCSP status request": { "responder_id": "request extensions": { } } } }, "extended_master_secret (23)": { }, "session_ticket (35)": { }, "supported_versions (43)": { "versions": [TLSv1.3, TLSv1.2] }, "psk_key_exchange_modes (45)": { "ke_modes": [psk_dhe_ke] }, "key_share (51)": { "client_shares": [ { "named group": x25519 "key_exchange": { 0000: C6 49 15 A1 81 16 5A 7C 3D 3F 26 BB E2 76 25 1B .I....Z.=?&..v%. 0010: DC 21 96 5D 60 AC 1A EC EE 1F 6F F6 30 D8 BD 22 .!.]`.....o.0.." } }, { "named group": secp256r1 "key_exchange": { 0000: 04 C5 A7 F9 18 28 02 93 48 25 3C 87 C4 0E AE 66 .....(..H%<....f 0010: 1B 96 38 A3 16 33 E5 0F D3 85 9E D2 E2 2C 61 A6 ..8..3.......,a. 0020: 1D BB 99 90 0B E6 EA 99 97 1C 19 44 56 B2 4C 3F ...........DV.L? 0030: 42 DB 34 3E 12 51 66 A7 40 07 11 A6 3A 18 76 41 B.4>.Qf.@...:.vA 0040: 6E } }, ] }, "renegotiation_info (65,281)": { "renegotiated connection": [7A BA 01 35 C8 41 04 64 96 5A 2E 15] } ] } ) javax.net.ssl|DEBUG|1D|httpclient-dispatch-1|2021-04-22 10:59:59.503 CEST|SSLEngineOutputRecord.java:510|WRITE: TLS12 handshake, length = 506 javax.net.ssl|DEBUG|1D|httpclient-dispatch-1|2021-04-22 10:59:59.503 CEST|SSLCipher.java:1770|Plaintext before ENCRYPTION ( [...] ) javax.net.ssl|DEBUG|1D|httpclient-dispatch-1|2021-04-22 10:59:59.504 CEST|SSLEngineOutputRecord.java:528|Raw write ( [...] ) [2021-04-22 10:59:59,506] ex-0000000001 execution failed: Connection is closed [2021-04-22 10:59:59,506] ex-0000000001 request failed: Connection is closed [2021-04-22 10:59:59,507] ep-0000000000 close IMMEDIATE [2021-04-22 10:59:59,507] c-0000000000 Shutdown connection IMMEDIATE [2021-04-22 10:59:59,507] c-0000000000[CLOSED][][CLOSED][r][NEED_UNWRAP][EOF][][0][0][535] Close IMMEDIATE [2021-04-22 10:59:59,507] ep-0000000000 endpoint closed [2021-04-22 10:59:59,507] ep-0000000000 discarding endpoint [2021-04-22 10:59:59,507] ep-0000000000 releasing endpoint [2021-04-22 10:59:59,507] ep-0000000000 connection released [...]