javax.net.ssl|DEBUG|01|main|2021-04-22 11:37:29.472 CEST|X509TrustManagerImpl.java:82|adding as trusted certificates ( [...] javax.net.ssl|DEBUG|01|main|2021-04-22 11:37:29.497 CEST|SSLContextImpl.java:993|keyStore is : javax.net.ssl|DEBUG|01|main|2021-04-22 11:37:29.497 CEST|SSLContextImpl.java:994|keyStore type is : pkcs12 javax.net.ssl|DEBUG|01|main|2021-04-22 11:37:29.497 CEST|SSLContextImpl.java:996|keyStore provider is : javax.net.ssl|ALL|01|main|2021-04-22 11:37:29.497 CEST|SSLContextImpl.java:1031|init keystore javax.net.ssl|DEBUG|01|main|2021-04-22 11:37:29.498 CEST|SSLContextImpl.java:1054|init keymanager of type SunX509 javax.net.ssl|ALL|01|main|2021-04-22 11:37:29.499 CEST|SSLContextImpl.java:115|trigger seeding of SecureRandom javax.net.ssl|ALL|01|main|2021-04-22 11:37:29.500 CEST|SSLContextImpl.java:119|done seeding of SecureRandom javax.net.ssl|DEBUG|01|main|2021-04-22 11:37:29.522 CEST|SSLConfiguration.java:458|System property jdk.tls.client.SignatureSchemes is set to 'null' javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:29.605 CEST|SSLConfiguration.java:458|System property jdk.tls.server.SignatureSchemes is set to 'null' javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:29.733 CEST|HandshakeContext.java:298|Ignore unsupported cipher suite: TLS_AES_256_GCM_SHA384 for TLS12 javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:29.733 CEST|HandshakeContext.java:298|Ignore unsupported cipher suite: TLS_AES_128_GCM_SHA256 for TLS12 javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:29.733 CEST|HandshakeContext.java:298|Ignore unsupported cipher suite: TLS_CHACHA20_POLY1305_SHA256 for TLS12 javax.net.ssl|ALL|1E|HttpClient-1-Worker-0|2021-04-22 11:37:29.755 CEST|SignatureScheme.java:384|Ignore unsupported signature scheme: ecdsa_sha224 javax.net.ssl|ALL|1E|HttpClient-1-Worker-0|2021-04-22 11:37:29.755 CEST|SignatureScheme.java:384|Ignore unsupported signature scheme: rsa_sha224 javax.net.ssl|ALL|1E|HttpClient-1-Worker-0|2021-04-22 11:37:29.755 CEST|SignatureScheme.java:384|Ignore unsupported signature scheme: dsa_sha224 javax.net.ssl|ALL|1E|HttpClient-1-Worker-0|2021-04-22 11:37:29.755 CEST|SignatureScheme.java:403|Ignore disabled signature scheme: rsa_md5 javax.net.ssl|INFO|1E|HttpClient-1-Worker-0|2021-04-22 11:37:29.756 CEST|AlpnExtension.java:182|No available application protocols javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:29.756 CEST|SSLExtensions.java:260|Ignore, context unavailable extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:29.756 CEST|SessionTicketExtension.java:408|Stateless resumption supported javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:29.757 CEST|SSLExtensions.java:260|Ignore, context unavailable extension: cookie javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:29.778 CEST|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:29.778 CEST|PreSharedKeyExtension.java:660|No session to resume. javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:29.778 CEST|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:29.780 CEST|ClientHello.java:652|Produced ClientHello handshake message ( "ClientHello": { "client version" : "TLSv1.2", "random" : "56 26 4C 07 5F 99 9C CC EA 39 00 80 CF 88 19 37 35 0D 22 BD 22 B7 1A 17 2F E8 63 1E E3 0A 27 B2", "session id" : "CE 7E 8D 0B 63 34 FC 9B F7 2D 18 ED 3D 91 01 3E 75 AF D5 BD 9E 2D 18 83 FA 8C 2F 05 B0 82 92 1F", "cipher suites" : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA(0xC00A), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA(0xC014), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA(0xC009), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA(0xC013), TLS_DHE_RSA_WITH_AES_256_CBC_SHA(0x0039), TLS_DHE_DSS_WITH_AES_256_CBC_SHA(0x0038), TLS_DHE_RSA_WITH_AES_128_CBC_SHA(0x0033), TLS_DHE_DSS_WITH_AES_128_CBC_SHA(0x0032), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA(0xC005), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA(0xC00F), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA(0xC004), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA(0xC00E), TLS_RSA_WITH_AES_256_GCM_SHA384(0x009D), TLS_RSA_WITH_AES_128_GCM_SHA256(0x009C), TLS_RSA_WITH_AES_256_CBC_SHA256(0x003D), TLS_RSA_WITH_AES_128_CBC_SHA256(0x003C), TLS_RSA_WITH_AES_256_CBC_SHA(0x0035), TLS_RSA_WITH_AES_128_CBC_SHA(0x002F), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]", "compression methods" : "00", "extensions" : [ "server_name (0)": { type=host_name (0), value=some.host.com }, "status_request (5)": { "certificate status type": ocsp "OCSP status request": { "responder_id": "request extensions": { } } }, "supported_groups (10)": { "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192] }, "ec_point_formats (11)": { "formats": [uncompressed] }, "signature_algorithms (13)": { "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, ed25519, ed448, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1] }, "signature_algorithms_cert (50)": { "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, ed25519, ed448, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1] }, "status_request_v2 (17)": { "cert status request": { "certificate status type": ocsp_multi "OCSP status request": { "responder_id": "request extensions": { } } } }, "extended_master_secret (23)": { }, "session_ticket (35)": { }, "supported_versions (43)": { "versions": [TLSv1.3, TLSv1.2] }, "psk_key_exchange_modes (45)": { "ke_modes": [psk_dhe_ke] }, "key_share (51)": { "client_shares": [ { "named group": x25519 "key_exchange": { 0000: D1 9E 26 33 E6 4D 0B FD 57 B9 25 5A 01 18 A1 0C ..&3.M..W.%Z.... 0010: 14 56 43 F9 06 D7 84 D5 8F FA 7C C3 D1 9F 2D 35 .VC...........-5 } }, { "named group": secp256r1 "key_exchange": { 0000: 04 FD E7 C5 01 78 6C 3E 42 EF A7 48 3B 30 78 DA .....xl>B..H;0x. 0010: DF AE B5 7E 22 D7 2E F0 B5 AD 17 AE AD C6 8C 10 ...."........... 0020: AC 84 EE 94 69 CB AA 99 05 DE 02 61 06 E9 CB 79 ....i......a...y 0030: 5B B6 5E 84 5B 8C 87 CC 5D 80 E0 58 20 57 5E D5 [.^.[...]..X W^. 0040: 2C } }, ] } ] } ) javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:29.781 CEST|SSLEngineOutputRecord.java:510|WRITE: TLS13 handshake, length = 476 javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:29.782 CEST|SSLEngineOutputRecord.java:528|Raw write ( [...] ) javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:29.826 CEST|SSLEngineInputRecord.java:177|Raw read ( [...] ) javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:29.826 CEST|SSLEngineInputRecord.java:214|READ: TLSv1.2 handshake, length = 93 javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:29.830 CEST|ServerHello.java:891|Consuming ServerHello handshake message ( "ServerHello": { "server version" : "TLSv1.2", "random" : "35 71 AB 31 36 50 A8 19 FD 1B 83 D1 08 9F DF 9D EA 91 FC EB EE 4B 49 9A 58 F2 ED 9E 55 3D F9 60", "session id" : "73 A6 84 03 AA F4 44 2B BF A5 60 7B 73 AA 29 F7 A7 43 1A 3C DF BE 16 BB 7A 5D D5 F0 E7 92 D7 D4", "cipher suite" : "TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030)", "compression methods" : "00", "extensions" : [ "server_name (0)": { }, "renegotiation_info (65,281)": { "renegotiated connection": [] }, "ec_point_formats (11)": { "formats": [uncompressed, ansiX962_compressed_prime, ansiX962_compressed_char2] } ] } ) javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:29.830 CEST|SSLExtensions.java:173|Ignore unavailable extension: supported_versions javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:29.830 CEST|ServerHello.java:987|Negotiated protocol version: TLSv1.2 javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:29.832 CEST|SSLExtensions.java:192|Consumed extension: renegotiation_info javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:29.832 CEST|SSLExtensions.java:192|Consumed extension: server_name javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:29.832 CEST|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:29.832 CEST|SSLExtensions.java:173|Ignore unavailable extension: status_request javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:29.832 CEST|SSLExtensions.java:192|Consumed extension: ec_point_formats javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:29.832 CEST|SSLExtensions.java:173|Ignore unavailable extension: status_request_v2 javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:29.833 CEST|SSLExtensions.java:173|Ignore unavailable extension: session_ticket javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:29.833 CEST|SSLExtensions.java:163|Ignore unsupported extension: supported_versions javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:29.833 CEST|SSLExtensions.java:163|Ignore unsupported extension: key_share javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:29.833 CEST|SSLExtensions.java:192|Consumed extension: renegotiation_info javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:29.833 CEST|SSLExtensions.java:163|Ignore unsupported extension: pre_shared_key javax.net.ssl|ALL|1E|HttpClient-1-Worker-0|2021-04-22 11:37:29.833 CEST|SSLSessionImpl.java:220|Session initialized: Session(1619084249833|TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) javax.net.ssl|WARNING|1E|HttpClient-1-Worker-0|2021-04-22 11:37:29.833 CEST|SSLExtensions.java:215|Ignore impact of unsupported extension: server_name javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:29.833 CEST|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:29.834 CEST|SSLExtensions.java:207|Ignore unavailable extension: status_request javax.net.ssl|WARNING|1E|HttpClient-1-Worker-0|2021-04-22 11:37:29.834 CEST|SSLExtensions.java:215|Ignore impact of unsupported extension: ec_point_formats javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:29.834 CEST|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:29.834 CEST|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2 javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:29.834 CEST|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:29.834 CEST|SSLExtensions.java:207|Ignore unavailable extension: session_ticket javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:29.834 CEST|SSLExtensions.java:207|Ignore unavailable extension: supported_versions javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:29.834 CEST|SSLExtensions.java:207|Ignore unavailable extension: key_share javax.net.ssl|WARNING|1E|HttpClient-1-Worker-0|2021-04-22 11:37:29.834 CEST|SSLExtensions.java:215|Ignore impact of unsupported extension: renegotiation_info javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:29.834 CEST|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:29.848 CEST|SSLEngineInputRecord.java:177|Raw read ( [...] ) javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:29.853 CEST|SSLEngineInputRecord.java:214|READ: TLSv1.2 handshake, length = 4592 javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:29.861 CEST|CertificateMessage.java:366|Consuming server Certificate handshake message ( "Certificates": [ [...] ] ) javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:29.905 CEST|X509TrustManagerImpl.java:301|Found trusted certificate ( [...] ) javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:29.908 CEST|SSLEngineInputRecord.java:177|Raw read ( [...] ) javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:29.908 CEST|SSLEngineInputRecord.java:214|READ: TLSv1.2 handshake, length = 333 javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:29.913 CEST|ECDHServerKeyExchange.java:514|Consuming ECDH ServerKeyExchange handshake message ( "ECDH ServerKeyExchange": { [...] } ) javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:29.914 CEST|SSLEngineInputRecord.java:177|Raw read ( 0000: 16 03 03 00 04 0E 00 00 00 ......... ) javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:29.914 CEST|SSLEngineInputRecord.java:214|READ: TLSv1.2 handshake, length = 4 javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:29.915 CEST|ServerHelloDone.java:151|Consuming ServerHelloDone handshake message ( ) javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:29.920 CEST|ECDHClientKeyExchange.java:400|Produced ECDHE ClientKeyExchange handshake message ( "ECDH ClientKeyExchange": { [...] } ) javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:29.938 CEST|ChangeCipherSpec.java:115|Produced ChangeCipherSpec message javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:29.938 CEST|Finished.java:398|Produced client Finished handshake message ( "Finished": { "verify data": { 0000: 9E 35 A9 77 68 00 9D 12 99 41 E2 69 }'} ) javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:29.939 CEST|SSLEngineOutputRecord.java:510|WRITE: TLS12 handshake, length = 70 javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:29.939 CEST|SSLEngineOutputRecord.java:528|Raw write ( [...] ) javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:29.940 CEST|SSLEngineOutputRecord.java:510|WRITE: TLS12 change_cipher_spec, length = 1 javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:29.941 CEST|SSLEngineOutputRecord.java:528|Raw write ( 0000: 14 03 03 00 01 01 ...... ) javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:29.941 CEST|SSLEngineOutputRecord.java:510|WRITE: TLS12 handshake, length = 16 javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:29.944 CEST|SSLCipher.java:1770|Plaintext before ENCRYPTION ( 0000: 14 00 00 0C 9E 35 A9 77 68 00 9D 12 99 41 E2 69 .....5.wh....A.i ) javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:29.944 CEST|SSLEngineOutputRecord.java:528|Raw write ( 0000: 16 03 03 00 28 00 00 00 00 00 00 00 00 0B DC 8A ....(........... 0010: 97 94 E3 0B BE AF 57 90 E2 13 AE 1F 8D 1B 31 72 ......W.......1r 0020: 10 96 60 5B D2 C3 DD B7 2D 56 A9 32 B1 ..`[....-V.2. ) javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:29.974 CEST|SSLEngineInputRecord.java:177|Raw read ( 0000: 14 03 03 00 01 01 16 03 03 00 28 78 4C EB 12 0B ..........(xL... 0010: 1B 6C B2 49 8D 30 41 57 65 D8 5B 01 23 4E F1 D0 .l.I.0AWe.[.#N.. 0020: 0A C0 17 FF 17 D0 EC AF 4C 71 7F B1 FA B3 4C FA ........Lq....L. 0030: 54 84 53 T.S ) javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:29.974 CEST|SSLEngineInputRecord.java:214|READ: TLSv1.2 change_cipher_spec, length = 1 javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:29.975 CEST|ChangeCipherSpec.java:149|Consuming ChangeCipherSpec message javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:29.975 CEST|SSLEngineInputRecord.java:177|Raw read ( 0000: 16 03 03 00 28 78 4C EB 12 0B 1B 6C B2 49 8D 30 ....(xL....l.I.0 0010: 41 57 65 D8 5B 01 23 4E F1 D0 0A C0 17 FF 17 D0 AWe.[.#N........ 0020: EC AF 4C 71 7F B1 FA B3 4C FA 54 84 53 ..Lq....L.T.S ) javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:29.976 CEST|SSLEngineInputRecord.java:214|READ: TLSv1.2 handshake, length = 40 javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:29.976 CEST|SSLCipher.java:1672|Plaintext after DECRYPTION ( 0000: 14 00 00 0C AF F7 29 01 22 C3 43 AE 1F F5 38 5A ......).".C...8Z ) javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:29.976 CEST|Finished.java:550|Consuming server Finished handshake message ( "Finished": { "verify data": { 0000: AF F7 29 01 22 C3 43 AE 1F F5 38 5A }'} ) javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:29.979 CEST|SSLEngineOutputRecord.java:271|WRITE: TLS12 application_data, length = 157 javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:29.979 CEST|SSLCipher.java:1770|Plaintext before ENCRYPTION ( [...(headers)] ) javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:29.980 CEST|SSLEngineOutputRecord.java:287|Raw write ( [...] ) javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:29.983 CEST|SSLEngineOutputRecord.java:271|WRITE: TLS12 application_data, length = 1163 javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:29.984 CEST|SSLCipher.java:1770|Plaintext before ENCRYPTION ( [...(post-payload)] ) javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:29.986 CEST|SSLEngineOutputRecord.java:287|Raw write ( [...] ) javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:30.017 CEST|SSLEngineInputRecord.java:177|Raw read ( 0000: 16 03 03 00 1C 78 4C EB 12 0B 1B 6C B3 A9 85 06 .....xL....l.... 0010: 16 4B 08 24 E6 34 A4 91 EF D7 E2 FE 9E A2 B1 E2 .K.$.4.......... 0020: 4F O ) javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:30.017 CEST|SSLEngineInputRecord.java:214|READ: TLSv1.2 handshake, length = 28 javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:30.017 CEST|SSLCipher.java:1672|Plaintext after DECRYPTION ( 0000: 00 00 00 00 .... ) javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:30.017 CEST|HandshakeContext.java:298|Ignore unsupported cipher suite: TLS_AES_256_GCM_SHA384 for TLS12 javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:30.017 CEST|HandshakeContext.java:298|Ignore unsupported cipher suite: TLS_AES_128_GCM_SHA256 for TLS12 javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:30.018 CEST|HandshakeContext.java:298|Ignore unsupported cipher suite: TLS_CHACHA20_POLY1305_SHA256 for TLS12 javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:30.021 CEST|HelloRequest.java:181|Consuming HelloRequest handshake message ( ) javax.net.ssl|ALL|1E|HttpClient-1-Worker-0|2021-04-22 11:37:30.021 CEST|ClientHello.java:534|Try resuming session ( Session(1619084249833|TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) ) javax.net.ssl|ALL|1E|HttpClient-1-Worker-0|2021-04-22 11:37:30.023 CEST|SignatureScheme.java:384|Ignore unsupported signature scheme: ecdsa_sha224 javax.net.ssl|ALL|1E|HttpClient-1-Worker-0|2021-04-22 11:37:30.023 CEST|SignatureScheme.java:384|Ignore unsupported signature scheme: rsa_sha224 javax.net.ssl|ALL|1E|HttpClient-1-Worker-0|2021-04-22 11:37:30.023 CEST|SignatureScheme.java:384|Ignore unsupported signature scheme: dsa_sha224 javax.net.ssl|ALL|1E|HttpClient-1-Worker-0|2021-04-22 11:37:30.023 CEST|SignatureScheme.java:403|Ignore disabled signature scheme: rsa_md5 javax.net.ssl|INFO|1E|HttpClient-1-Worker-0|2021-04-22 11:37:30.024 CEST|AlpnExtension.java:182|No available application protocols javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:30.024 CEST|SSLExtensions.java:260|Ignore, context unavailable extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:30.024 CEST|SSLExtensions.java:260|Ignore, context unavailable extension: session_ticket javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:30.024 CEST|SSLExtensions.java:260|Ignore, context unavailable extension: cookie javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:30.028 CEST|PreSharedKeyExtension.java:680|Existing session has no PSK. javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:30.028 CEST|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:30.031 CEST|ClientHello.java:652|Produced ClientHello handshake message ( "ClientHello": { "client version" : "TLSv1.2", "random" : "92 0E F4 39 C9 EB D0 CC 29 ED 7D AA DD F7 5C D1 64 EB 73 03 76 A1 24 0E 2C 59 35 13 19 43 4C B9", "session id" : "73 A6 84 03 AA F4 44 2B BF A5 60 7B 73 AA 29 F7 A7 43 1A 3C DF BE 16 BB 7A 5D D5 F0 E7 92 D7 D4", "cipher suites" : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA(0xC00A), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA(0xC014), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA(0xC009), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA(0xC013), TLS_DHE_RSA_WITH_AES_256_CBC_SHA(0x0039), TLS_DHE_DSS_WITH_AES_256_CBC_SHA(0x0038), TLS_DHE_RSA_WITH_AES_128_CBC_SHA(0x0033), TLS_DHE_DSS_WITH_AES_128_CBC_SHA(0x0032), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA(0xC005), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA(0xC00F), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA(0xC004), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA(0xC00E), TLS_RSA_WITH_AES_256_GCM_SHA384(0x009D), TLS_RSA_WITH_AES_128_GCM_SHA256(0x009C), TLS_RSA_WITH_AES_256_CBC_SHA256(0x003D), TLS_RSA_WITH_AES_128_CBC_SHA256(0x003C), TLS_RSA_WITH_AES_256_CBC_SHA(0x0035), TLS_RSA_WITH_AES_128_CBC_SHA(0x002F)]", "compression methods" : "00", "extensions" : [ "server_name (0)": { type=host_name (0), value=some.host.com }, "status_request (5)": { "certificate status type": ocsp "OCSP status request": { "responder_id": "request extensions": { } } }, "supported_groups (10)": { "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192] }, "ec_point_formats (11)": { "formats": [uncompressed] }, "signature_algorithms (13)": { "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, ed25519, ed448, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1] }, "signature_algorithms_cert (50)": { "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, ed25519, ed448, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1] }, "status_request_v2 (17)": { "cert status request": { "certificate status type": ocsp_multi "OCSP status request": { "responder_id": "request extensions": { } } } }, "extended_master_secret (23)": { }, "supported_versions (43)": { "versions": [TLSv1.3, TLSv1.2] }, "psk_key_exchange_modes (45)": { "ke_modes": [psk_dhe_ke] }, "key_share (51)": { "client_shares": [ { "named group": x25519 "key_exchange": { 0000: 77 6B 1C A8 92 FC 2F 09 D7 95 FA 98 85 34 F0 91 wk..../......4.. 0010: C7 30 4F 7A 55 16 84 D4 C4 12 0E D5 B6 3B B0 78 .0OzU........;.x } }, { "named group": secp256r1 "key_exchange": { 0000: 04 26 9E 3D A7 6C C5 C3 64 FC 7A 8D E5 E5 D0 58 .&.=.l..d.z....X 0010: 94 FA 96 B1 91 F1 14 C8 E7 08 D6 B5 77 30 D4 B6 ............w0.. 0020: E6 BA AE 5D B0 8C 7D AE F2 C4 AA 7A 41 F7 38 D5 ...].......zA.8. 0030: 52 47 55 5E 9B 19 AA E9 7E B4 F8 17 0F B9 12 B1 RGU^............ 0040: 5D } }, ] }, "renegotiation_info (65,281)": { "renegotiated connection": [9E 35 A9 77 68 00 9D 12 99 41 E2 69] } ] } ) javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:30.031 CEST|SSLEngineOutputRecord.java:510|WRITE: TLS12 handshake, length = 487 javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:30.032 CEST|SSLCipher.java:1770|Plaintext before ENCRYPTION ( [...] ) javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:30.033 CEST|SSLEngineOutputRecord.java:528|Raw write ( [...] ) javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:30.081 CEST|SSLEngineInputRecord.java:177|Raw read ( [...] ) javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:30.081 CEST|SSLEngineInputRecord.java:214|READ: TLSv1.2 handshake, length = 141 javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:30.082 CEST|SSLCipher.java:1672|Plaintext after DECRYPTION ( [...] ) javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:30.083 CEST|ServerHello.java:891|Consuming ServerHello handshake message ( "ServerHello": { "server version" : "TLSv1.2", "random" : "62 5E B0 DF A4 2A 54 CC 7E 24 D3 06 5D C8 C1 7A 96 BC F3 7F B1 97 69 B8 CA 4E 5F EE A6 A2 D7 B3", "session id" : "93 58 68 2F CB 74 E9 37 58 3F 3C 5A 98 D3 D8 F2 D6 7D 6A 26 8B C0 CC D8 EE D7 F8 A0 A2 D8 5B 77", "cipher suite" : "TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030)", "compression methods" : "00", "extensions" : [ "server_name (0)": { }, "renegotiation_info (65,281)": { "renegotiated connection": [9E 35 A9 77 68 00 9D 12 99 41 E2 69 AF F7 29 01 22 C3 43 AE 1F F5 38 5A] }, "ec_point_formats (11)": { "formats": [uncompressed, ansiX962_compressed_prime, ansiX962_compressed_char2] } ] } ) javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:30.083 CEST|SSLExtensions.java:173|Ignore unavailable extension: supported_versions javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:30.083 CEST|ServerHello.java:987|Negotiated protocol version: TLSv1.2 javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:30.084 CEST|SSLExtensions.java:192|Consumed extension: renegotiation_info javax.net.ssl|ALL|1E|HttpClient-1-Worker-0|2021-04-22 11:37:30.084 CEST|SSLSessionImpl.java:1224|Invalidated session: Session(1619084249833|TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:30.084 CEST|SSLExtensions.java:192|Consumed extension: server_name javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:30.084 CEST|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:30.084 CEST|SSLExtensions.java:173|Ignore unavailable extension: status_request javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:30.084 CEST|SSLExtensions.java:192|Consumed extension: ec_point_formats javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:30.084 CEST|SSLExtensions.java:173|Ignore unavailable extension: status_request_v2 javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:30.085 CEST|SSLExtensions.java:173|Ignore unavailable extension: session_ticket javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:30.085 CEST|SSLExtensions.java:163|Ignore unsupported extension: supported_versions javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:30.085 CEST|SSLExtensions.java:163|Ignore unsupported extension: key_share javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:30.085 CEST|SSLExtensions.java:192|Consumed extension: renegotiation_info javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:30.085 CEST|SSLExtensions.java:163|Ignore unsupported extension: pre_shared_key javax.net.ssl|ALL|1E|HttpClient-1-Worker-0|2021-04-22 11:37:30.085 CEST|SSLSessionImpl.java:220|Session initialized: Session(1619084250085|TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) javax.net.ssl|WARNING|1E|HttpClient-1-Worker-0|2021-04-22 11:37:30.085 CEST|SSLExtensions.java:215|Ignore impact of unsupported extension: server_name javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:30.085 CEST|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:30.085 CEST|SSLExtensions.java:207|Ignore unavailable extension: status_request javax.net.ssl|WARNING|1E|HttpClient-1-Worker-0|2021-04-22 11:37:30.085 CEST|SSLExtensions.java:215|Ignore impact of unsupported extension: ec_point_formats javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:30.085 CEST|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:30.086 CEST|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2 javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:30.086 CEST|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:30.086 CEST|SSLExtensions.java:207|Ignore unavailable extension: session_ticket javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:30.086 CEST|SSLExtensions.java:207|Ignore unavailable extension: supported_versions javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:30.086 CEST|SSLExtensions.java:207|Ignore unavailable extension: key_share javax.net.ssl|WARNING|1E|HttpClient-1-Worker-0|2021-04-22 11:37:30.086 CEST|SSLExtensions.java:215|Ignore impact of unsupported extension: renegotiation_info javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:30.086 CEST|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:30.090 CEST|SSLEngineInputRecord.java:177|Raw read ( [...] ) javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:30.091 CEST|SSLEngineInputRecord.java:214|READ: TLSv1.2 handshake, length = 4616 javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:30.096 CEST|SSLCipher.java:1672|Plaintext after DECRYPTION ( [...] ) javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:30.100 CEST|CertificateMessage.java:366|Consuming server Certificate handshake message ( "Certificates": [ [...] ] ) javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:30.102 CEST|X509TrustManagerImpl.java:301|Found trusted certificate ( [...] ) javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:30.104 CEST|SSLEngineInputRecord.java:177|Raw read ( [...] ) javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:30.104 CEST|SSLEngineInputRecord.java:214|READ: TLSv1.2 handshake, length = 357 javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:30.105 CEST|SSLCipher.java:1672|Plaintext after DECRYPTION ( [...] ) javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:30.107 CEST|ECDHServerKeyExchange.java:514|Consuming ECDH ServerKeyExchange handshake message ( "ECDH ServerKeyExchange": { [...] } ) javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:30.107 CEST|SSLEngineInputRecord.java:177|Raw read ( [...] ) javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:30.108 CEST|SSLEngineInputRecord.java:214|READ: TLSv1.2 handshake, length = 70 javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:30.108 CEST|SSLCipher.java:1672|Plaintext after DECRYPTION ( [...] ) javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:30.109 CEST|CertificateRequest.java:675|Consuming CertificateRequest handshake message ( "CertificateRequest": { "certificate types": [rsa_sign, dss_sign, ecdsa_sign] "supported signature algorithms": [rsa_pkcs1_sha512, dsa_sha512, ecdsa_secp521r1_sha512, rsa_pkcs1_sha384, dsa_sha384, ecdsa_secp384r1_sha384, rsa_pkcs1_sha256, dsa_sha256, ecdsa_secp256r1_sha256, rsa_sha224, dsa_sha224, ecdsa_sha224, rsa_pkcs1_sha1, dsa_sha1, ecdsa_sha1] "certificate authorities": [] } ) javax.net.ssl|ALL|1E|HttpClient-1-Worker-0|2021-04-22 11:37:30.110 CEST|X509Authentication.java:249|No X.509 cert selected for RSA javax.net.ssl|WARNING|1E|HttpClient-1-Worker-0|2021-04-22 11:37:30.110 CEST|CertificateRequest.java:769|Unavailable authentication scheme: rsa_pkcs1_sha512 javax.net.ssl|ALL|1E|HttpClient-1-Worker-0|2021-04-22 11:37:30.110 CEST|X509Authentication.java:249|No X.509 cert selected for EC javax.net.ssl|WARNING|1E|HttpClient-1-Worker-0|2021-04-22 11:37:30.110 CEST|CertificateRequest.java:769|Unavailable authentication scheme: ecdsa_secp521r1_sha512 javax.net.ssl|ALL|1E|HttpClient-1-Worker-0|2021-04-22 11:37:30.111 CEST|X509Authentication.java:249|No X.509 cert selected for RSA javax.net.ssl|WARNING|1E|HttpClient-1-Worker-0|2021-04-22 11:37:30.111 CEST|CertificateRequest.java:769|Unavailable authentication scheme: rsa_pkcs1_sha384 javax.net.ssl|ALL|1E|HttpClient-1-Worker-0|2021-04-22 11:37:30.111 CEST|X509Authentication.java:249|No X.509 cert selected for EC javax.net.ssl|WARNING|1E|HttpClient-1-Worker-0|2021-04-22 11:37:30.111 CEST|CertificateRequest.java:769|Unavailable authentication scheme: ecdsa_secp384r1_sha384 javax.net.ssl|ALL|1E|HttpClient-1-Worker-0|2021-04-22 11:37:30.111 CEST|X509Authentication.java:249|No X.509 cert selected for RSA javax.net.ssl|WARNING|1E|HttpClient-1-Worker-0|2021-04-22 11:37:30.111 CEST|CertificateRequest.java:769|Unavailable authentication scheme: rsa_pkcs1_sha256 javax.net.ssl|ALL|1E|HttpClient-1-Worker-0|2021-04-22 11:37:30.111 CEST|X509Authentication.java:249|No X.509 cert selected for DSA javax.net.ssl|WARNING|1E|HttpClient-1-Worker-0|2021-04-22 11:37:30.111 CEST|CertificateRequest.java:769|Unavailable authentication scheme: dsa_sha256 javax.net.ssl|ALL|1E|HttpClient-1-Worker-0|2021-04-22 11:37:30.112 CEST|X509Authentication.java:249|No X.509 cert selected for EC javax.net.ssl|WARNING|1E|HttpClient-1-Worker-0|2021-04-22 11:37:30.112 CEST|CertificateRequest.java:769|Unavailable authentication scheme: ecdsa_secp256r1_sha256 javax.net.ssl|ALL|1E|HttpClient-1-Worker-0|2021-04-22 11:37:30.112 CEST|X509Authentication.java:249|No X.509 cert selected for RSA javax.net.ssl|WARNING|1E|HttpClient-1-Worker-0|2021-04-22 11:37:30.112 CEST|CertificateRequest.java:769|Unavailable authentication scheme: rsa_sha224 javax.net.ssl|ALL|1E|HttpClient-1-Worker-0|2021-04-22 11:37:30.112 CEST|X509Authentication.java:249|No X.509 cert selected for DSA javax.net.ssl|WARNING|1E|HttpClient-1-Worker-0|2021-04-22 11:37:30.112 CEST|CertificateRequest.java:769|Unavailable authentication scheme: dsa_sha224 javax.net.ssl|ALL|1E|HttpClient-1-Worker-0|2021-04-22 11:37:30.112 CEST|X509Authentication.java:249|No X.509 cert selected for EC javax.net.ssl|WARNING|1E|HttpClient-1-Worker-0|2021-04-22 11:37:30.112 CEST|CertificateRequest.java:769|Unavailable authentication scheme: ecdsa_sha224 javax.net.ssl|ALL|1E|HttpClient-1-Worker-0|2021-04-22 11:37:30.112 CEST|X509Authentication.java:249|No X.509 cert selected for RSA javax.net.ssl|WARNING|1E|HttpClient-1-Worker-0|2021-04-22 11:37:30.112 CEST|CertificateRequest.java:769|Unavailable authentication scheme: rsa_pkcs1_sha1 javax.net.ssl|ALL|1E|HttpClient-1-Worker-0|2021-04-22 11:37:30.113 CEST|X509Authentication.java:249|No X.509 cert selected for DSA javax.net.ssl|WARNING|1E|HttpClient-1-Worker-0|2021-04-22 11:37:30.113 CEST|CertificateRequest.java:769|Unavailable authentication scheme: dsa_sha1 javax.net.ssl|ALL|1E|HttpClient-1-Worker-0|2021-04-22 11:37:30.113 CEST|X509Authentication.java:249|No X.509 cert selected for EC javax.net.ssl|WARNING|1E|HttpClient-1-Worker-0|2021-04-22 11:37:30.113 CEST|CertificateRequest.java:769|Unavailable authentication scheme: ecdsa_sha1 javax.net.ssl|WARNING|1E|HttpClient-1-Worker-0|2021-04-22 11:37:30.113 CEST|CertificateRequest.java:779|No available authentication scheme javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:30.113 CEST|ServerHelloDone.java:151|Consuming ServerHelloDone handshake message ( ) javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:30.113 CEST|CertificateMessage.java:299|No X.509 certificate for client authentication, use empty Certificate message instead javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:30.114 CEST|CertificateMessage.java:330|Produced client Certificate handshake message ( "Certificates": ) javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:30.116 CEST|ECDHClientKeyExchange.java:400|Produced ECDHE ClientKeyExchange handshake message ( "ECDH ClientKeyExchange": { [...] } ) javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:30.121 CEST|ChangeCipherSpec.java:115|Produced ChangeCipherSpec message javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:30.121 CEST|Finished.java:398|Produced client Finished handshake message ( "Finished": { "verify data": { 0000: F5 71 95 47 23 45 0D 5D DC E4 F3 7B }'} ) javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:30.121 CEST|SSLEngineOutputRecord.java:510|WRITE: TLS12 handshake, length = 77 javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:30.121 CEST|SSLCipher.java:1770|Plaintext before ENCRYPTION ( [...] ) javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:30.122 CEST|SSLEngineOutputRecord.java:528|Raw write ( [...] ) javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:30.122 CEST|SSLEngineOutputRecord.java:510|WRITE: TLS12 change_cipher_spec, length = 1 javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:30.123 CEST|SSLCipher.java:1770|Plaintext before ENCRYPTION ( 0000: 01 . ) javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:30.123 CEST|SSLEngineOutputRecord.java:528|Raw write ( 0000: 14 03 03 00 19 00 00 00 00 00 00 00 05 28 7A 22 .............(z" 0010: 20 EB 44 51 DD A7 C2 EA F8 A4 F6 CF D0 32 .DQ.........2 ) javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:30.123 CEST|SSLEngineOutputRecord.java:510|WRITE: TLS12 handshake, length = 16 javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:30.123 CEST|SSLCipher.java:1770|Plaintext before ENCRYPTION ( 0000: 14 00 00 0C F5 71 95 47 23 45 0D 5D DC E4 F3 7B .....q.G#E.].... ) javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:30.124 CEST|SSLEngineOutputRecord.java:528|Raw write ( 0000: 16 03 03 00 28 00 00 00 00 00 00 00 00 9C 6E 42 ....(.........nB 0010: 79 7C FF 43 6B 8C F8 AA B4 5F 8D 0C 45 D8 0D 51 y..Ck...._..E..Q 0020: 01 C6 49 14 51 39 80 C6 75 89 50 70 B6 ..I.Q9..u.Pp. ) javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:30.154 CEST|SSLEngineInputRecord.java:177|Raw read ( [...] ) javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:30.154 CEST|SSLEngineInputRecord.java:214|READ: TLSv1.2 change_cipher_spec, length = 25 javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:30.154 CEST|SSLCipher.java:1672|Plaintext after DECRYPTION ( 0000: 01 . ) javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:30.155 CEST|ChangeCipherSpec.java:149|Consuming ChangeCipherSpec message javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:30.156 CEST|SSLEngineInputRecord.java:177|Raw read ( [...] ) javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:30.156 CEST|SSLEngineInputRecord.java:214|READ: TLSv1.2 handshake, length = 40 javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:30.156 CEST|SSLCipher.java:1672|Plaintext after DECRYPTION ( 0000: 14 00 00 0C 7F 45 DF AC E9 F9 A6 1C B8 53 35 95 .....E.......S5. ) javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:30.157 CEST|Finished.java:550|Consuming server Finished handshake message ( "Finished": { "verify data": { 0000: 7F 45 DF AC E9 F9 A6 1C B8 53 35 95 }'} ) javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:30.157 CEST|SSLEngineInputRecord.java:177|Raw read ( [...] ) javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:30.158 CEST|SSLEngineInputRecord.java:214|READ: TLSv1.2 application_data, length = 395 javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:30.158 CEST|SSLCipher.java:1672|Plaintext after DECRYPTION ( [...(response-headers)] ) javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:30.178 CEST|SSLEngineInputRecord.java:177|Raw read ( [...] ) javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:30.179 CEST|SSLEngineInputRecord.java:214|READ: TLSv1.2 application_data, length = 405 javax.net.ssl|DEBUG|1E|HttpClient-1-Worker-0|2021-04-22 11:37:30.179 CEST|SSLCipher.java:1672|Plaintext after DECRYPTION ( [...(response-payload)] )