sanjay patel

Greenhorn
+ Follow
since Sep 28, 2007
Merit badge: grant badges
For More
Cows and Likes
Cows
Total received
0
In last 30 days
0
Total given
0
Likes
Total received
0
Received in last 30 days
0
Total given
0
Given in last 30 days
0
Forums and Threads
Scavenger Hunt
expand Ranch Hand Scavenger Hunt
expand Greenhorn Scavenger Hunt

Recent posts by sanjay patel

I have a webservice which is hosted on sap xi server. I want to invoke that webservice through my tomcat server. The Requirement is to have https ssl handshake between the two servers. For that I imported the sap xi certificate into tomcat's jre cacerts. And As I (tomcat) am a client to SAP XI, I generated the ceritificate, and gave it to xi. They also imported it into their trustStore. Everything seems to be fine, However, when i tried invoking that webservice, i got the {http://xml.apache.org/axis/}HttpErrorCode:401 'Unauthorised' exception. I enabled the ssl log and it seems sap xi's server could be found in tomcat's truststore. But not very sure if the tomcat's certificate could be found in sap xi's truststore. and even if it is found, there could be some encryption-decryption problem too............Not sure, because don't know how to debug the ssl log. Can anyone please tell me what is the exact problem ? Its very urgent. Thanks in advance.

My question is :

I have defined the keystroe/truststore in server.xml while defining connecter for https. Those file paths are something like :
for truststore = ./trust_certs.jks
for keystore = ./keys_certs.jks

When the tomcat 1 restarts, while initializing https, it loads certificates/keys which are there in my keystore & truststore. But while calling webservice on tomcat2, it loads the trusted certificates from the default truststore (ie. /jre/lib/security/cacerts). so I get the error, No trusted certificate found.
16 years ago
I have two tomcat servers. One is client, and the other one is server. I need 2 way SSL authentication between them. Now even if I define entries for keystore and truststore in server.xml, while sending the certificate or validating the certificate, tomcat 1 uses its default keystore/truststore. So I restarted the tomcat with the -Djavax.net.ssl.trustStore=filepath and etc. Now what will happen to the certificates which are already there inside my default keystore i.e. jre/lib/security/cacerts. If any request comes with those certificates, whether my tomcat server will be able verity those even if i started the tomcat with some other truststore.

I need to know it very urgent.
Thanks in advance.
16 years ago
Above was the client side log.
The corresponding server side log is as following :

setSoTimeout(60000) called
http-6443-Processor25, READ: SSL v2, contentType = Handshake, translated length = 73
*** ClientHello, TLSv1
RandomCookie: GMT: 1191450323 bytes = { 71, 127, 240, 101, 169, 166, 14, 86, 141, 228, 109, 14, 252, 241, 144, 132, 54, 2, 212, 41, 110, 35, 132, 225, 58, 232, 221, 43 }
Session ID: {}
Cipher Suites: [SSL_RSA_WITH_RC4_128_MD5, SSL_RSA_WITH_RC4_128_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_DES_CBC_SHA, SSL_DHE_RSA_WITH_DES_CBC_SHA, SSL_DHE_DSS_WITH_DES_CBC_SHA, SSL_RSA_EXPORT_WITH_RC4_40_MD5, SSL_RSA_EXPORT_WITH_DES40_CBC_SHA, SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA, SSL_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA]
Compression Methods: { 0 }
***
%% Created: [Session-1, TLS_DHE_DSS_WITH_AES_128_CBC_SHA]
*** ServerHello, TLSv1
RandomCookie: GMT: 1191450323 bytes = { 128, 206, 235, 242, 102, 121, 83, 162, 2, 231, 198, 217, 155, 24, 197, 59, 195, 12, 200, 203, 49, 114, 195, 58, 20, 30, 133, 11 }
Session ID: {71, 4, 23, 211, 90, 188, 137, 195, 199, 39, 190, 121, 175, 242, 215, 86, 244, 153, 5, 178, 92, 55, 96, 73, 146, 23, 62, 1, 249, 6, 110, 192}
Cipher Suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA
Compression Method: 0
***
Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA
*** Certificate chain
chain [0] = [
[
Version: V1
Subject: CN=Sukrit Khera, OU=Reliant, O=Reliant, L=Houston, ST=Texas, C=TX
Signature Algorithm: SHA1withDSA, OID = 1.2.840.10040.4.3

Key: Sun DSA Public Key
Parameters SA
p: fd7f5381 1d751229 52df4a9c 2eece4e7 f611b752 3cef4400 c31e3f80 b6512669
455d4022 51fb593d 8d58fabf c5f5ba30 f6cb9b55 6cd7813b 801d346f f26660b7
6b9950a5 a49f9fe8 047b1022 c24fbba9 d7feb7c6 1bf83b57 e7c6a8a6 150f04fb
83f6d3c5 1ec30235 54135a16 9132f675 f3ae2b61 d72aeff2 2203199d d14801c7
q: 9760508f 15230bcc b292b982 a2eb840b f0581cf5
g: f7e1a085 d69b3dde cbbcab5c 36b857b9 7994afbb fa3aea82 f9574c0b 3d078267
5159578e bad4594f e6710710 8180b449 167123e8 4c281613 b7cf0932 8cc8a6e1
3c167a8b 547c8d28 e0a3ae1e 2bb3a675 916ea37f 0bfa2135 62f1fb62 7a01243b
cca4f1be a8519089 a883dfe1 5ae59f06 928b665e 807b5525 64014c3b fecf492a

y:
46c0cfec 389eb664 f6ea9733 9487ef63 bc40c6af 9fbdebe5 7f8e6b37 7171837f
608071ad 201467ca e2ef249d ba3f95ce 80d850de 5eb70503 60f62dac 1f4f3bce
4505d8b0 66fd51bd f242cc53 56ef3015 d06bf6b4 56ce86c6 9f921e23 60469253
4d91eed7 70df96c8 ed8facdb 7db6507d 95d6c5be 91b33a55 204c475e a013a343

Validity: [From: Thu Aug 23 11:26:37 CDT 2007,
To: Wed Nov 21 10:26:37 CST 2007]
Issuer: CN=Sukrit Khera, OU=Reliant, O=Reliant, L=Houston, ST=Texas, C=TX
SerialNumber: [ 46cdb53d]

]
Algorithm: [SHA1withDSA]
Signature:
0000: 30 2C 02 14 5B D5 20 1F 95 B7 15 40 AF D8 E3 F1 0,..[. ....@....
0010: 81 19 9F C2 11 68 4F E4 02 14 4A DC A5 69 AD AF .....hO...J..i..
0020: 8C 7D 54 F9 E6 B8 CF 6E 9C 9E B1 4A C8 1E ..T....n...J..

]
***
*** Diffie-Hellman ServerKeyExchange
DH Modulus: { 244, 136, 253, 88, 78, 73, 219, 205, 32, 180, 157, 228, 145, 7, 54, 107, 51, 108, 56, 13, 69, 29, 15, 124, 136, 179, 28, 124, 91, 45, 142, 246, 243, 201, 35, 192, 67, 240, 165, 91, 24, 141, 142, 187, 85, 140, 184, 93, 56, 211, 52, 253, 124, 23, 87, 67, 163, 29, 24, 108, 222, 51, 33, 44, 181, 42, 255, 60, 225, 177, 41, 64, 24, 17, 141, 124, 132, 167, 10, 114, 214, 134, 196, 3, 25, 200, 7, 41, 122, 202, 149, 12, 217, 150, 159, 171, 208, 10, 80, 155, 2, 70, 211, 8, 61, 102, 164, 93, 65, 159, 156, 124, 189, 137, 75, 34, 25, 38, 186, 171, 162, 94, 195, 85, 233, 47, 120, 199 }
DH Base: { 2 }
Server DH Public Key: { 148, 227, 193, 161, 215, 62, 253, 183, 33, 191, 12, 168, 47, 222, 126, 39, 144, 208, 218, 64, 108, 210, 50, 197, 143, 166, 46, 254, 10, 106, 197, 188, 107, 241, 238, 77, 172, 24, 210, 132, 15, 50, 33, 136, 95, 234, 232, 104, 105, 166, 132, 116, 174, 111, 135, 30, 107, 212, 121, 125, 15, 118, 144, 25, 252, 12, 226, 200, 161, 230, 88, 20, 97, 170, 87, 30, 97, 43, 32, 66, 222, 225, 86, 196, 83, 10, 176, 122, 168, 119, 151, 221, 247, 136, 117, 216, 246, 56, 182, 99, 114, 138, 176, 234, 231, 142, 10, 197, 230, 2, 156, 210, 110, 145, 203, 126, 218, 11, 27, 99, 5, 18, 66, 124, 126, 53, 166, 180 }
Signed with a DSA or RSA public key
*** ServerHelloDone
http-6443-Processor25, WRITE: TLSv1 Handshake, length = 1183
http-6443-Processor25, READ: TLSv1 Handshake, length = 134
*** ClientDiffieHellmanPublic
DH Public key: { 89, 116, 138, 150, 47, 252, 170, 129, 129, 91, 58, 16, 73, 239, 106, 28, 143, 230, 108, 97, 69, 3, 96, 51, 225, 119, 169, 150, 148, 139, 81, 193, 52, 77, 41, 1, 183, 236, 180, 7, 4, 187, 116, 15, 185, 222, 170, 164, 109, 143, 66, 167, 0, 240, 84, 233, 69, 236, 116, 66, 237, 229, 66, 37, 112, 228, 208, 156, 13, 42, 140, 195, 44, 13, 94, 201, 227, 178, 183, 210, 198, 10, 206, 216, 73, 53, 69, 234, 122, 148, 16, 112, 215, 191, 134, 164, 79, 223, 75, 186, 140, 54, 49, 165, 41, 132, 219, 45, 83, 167, 39, 49, 222, 255, 251, 198, 5, 229, 31, 210, 209, 51, 69, 180, 194, 21, 109, 190 }
SESSION KEYGEN:
PreMaster Secret:
0000: D2 63 2B 7C 9B 82 AE 27 7E 19 DF 18 5F D6 86 2D .c+....'...._..-
0010: 95 00 9C F8 99 19 5C 1C 02 3B CD 07 1E 89 3C 7D ......\..;....<.
0020: 83 79 C4 F3 BF 07 42 B6 5D 01 5C AD BB 44 62 AC .y....B.].\..Db.
0030: BF 41 05 98 A6 50 11 C1 4A FF 1F E2 D9 4F AC 98 .A...P..J....O..
0040: D3 C2 DD 77 36 FB BE DC 88 69 1C 30 F8 A5 E7 A5 ...w6....i.0....
0050: 03 F1 EB E5 03 A6 F5 C0 C7 DB 0D F0 D8 BD D9 77 ...............w
0060: 73 CF EC 38 F4 34 58 75 39 C8 78 00 7A AF 64 20 s..8.4Xu9.x.z.d
0070: A1 65 AA 63 77 E0 3D 75 7F 77 6F 94 32 23 3F 4D .e.cw.=u.wo.2#?M
CONNECTION KEYGEN:
Client Nonce:
0000: 47 04 17 D3 47 7F F0 65 A9 A6 0E 56 8D E4 6D 0E G...G..e...V..m.
0010: FC F1 90 84 36 02 D4 29 6E 23 84 E1 3A E8 DD 2B ....6..)n#..:..+
Server Nonce:
0000: 47 04 17 D3 80 CE EB F2 66 79 53 A2 02 E7 C6 D9 G.......fyS.....
0010: 9B 18 C5 3B C3 0C C8 CB 31 72 C3 3A 14 1E 85 0B ...;....1r.:....
Master Secret:
0000: A0 A4 73 3C 68 3E 64 E5 D4 74 A6 15 D8 C5 BB 64 ..s<h>d..t.....d
0010: 07 11 75 B6 27 7D 17 76 82 D2 A5 4C 5E E5 3F 28 ..u.'..v...L^.?(
0020: 3D 12 14 30 8E 36 22 68 E0 F5 7F BD 91 02 31 E6 =..0.6"h......1.
Client MAC write Secret:
0000: 3E 05 26 99 29 5C 31 34 78 80 03 BF 96 3C 1F C1 >.&.)\14x....<..
0010: 56 42 28 31 VB(1
Server MAC write Secret:
0000: C3 E0 9F 5D 3E F4 6C 6D A8 6A B9 B2 A3 54 ED 41 ...]>.lm.j...T.A
0010: 26 C2 E1 DF &...
Client write key:
0000: 56 0B 04 DF 9F 79 93 D3 01 BD E0 94 11 37 C4 FE V....y.......7..
Server write key:
0000: 3F 96 05 FC D8 84 78 BC 39 5C 8E 73 4A B3 73 C1 ?.....x.9\.sJ.s.
Client write IV:
0000: 47 F2 B4 75 2D 3A 69 4E 1A 43 4E 62 E3 94 65 06 G..u-:iN.CNb..e.
Server write IV:
0000: ED 5E BA 40 FC 08 14 2A 22 3C 6A CC 32 9E CB C7 .^.@...*"<j.2...
http-6443-Processor25, READ: TLSv1 Change Cipher Spec, length = 1
JsseJce: Using cipher AES/CBC/NoPadding from provider SunJCE
http-6443-Processor25, READ: TLSv1 Handshake, length = 48
*** Finished
verify_data: { 104, 11, 250, 194, 119, 123, 23, 123, 109, 172, 208, 228 }
***
http-6443-Processor25, WRITE: TLSv1 Change Cipher Spec, length = 1
JsseJce: Using cipher AES/CBC/NoPadding from provider SunJCE
*** Finished
verify_data: { 96, 52, 182, 53, 85, 69, 72, 12, 162, 156, 186, 33 }
***
http-6443-Processor25, WRITE: TLSv1 Handshake, length = 48
%% Cached server session: [Session-1, TLS_DHE_DSS_WITH_AES_128_CBC_SHA]
http-6443-Processor25, READ: TLSv1 Application Data, length = 752
%% Invalidated: [Session-1, TLS_DHE_DSS_WITH_AES_128_CBC_SHA]
setSoTimeout(1000) called
*** HelloRequest (empty)
http-6443-Processor25, WRITE: TLSv1 Handshake, length = 32
http-6443-Processor25, READ: TLSv1 Handshake, length = 128
*** ClientHello, TLSv1
RandomCookie: GMT: 1191450324 bytes = { 17, 105, 239, 11, 244, 163, 76, 201, 2, 150, 218, 226, 124, 80, 136, 172, 37, 156, 133, 234, 51, 159, 177, 212, 134, 17, 221, 90 }
Session ID: {71, 4, 23, 211, 90, 188, 137, 195, 199, 39, 190, 121, 175, 242, 215, 86, 244, 153, 5, 178, 92, 55, 96, 73, 146, 23, 62, 1, 249, 6, 110, 192}
Cipher Suites: [SSL_RSA_WITH_RC4_128_MD5, SSL_RSA_WITH_RC4_128_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_DES_CBC_SHA, SSL_DHE_RSA_WITH_DES_CBC_SHA, SSL_DHE_DSS_WITH_DES_CBC_SHA, SSL_RSA_EXPORT_WITH_RC4_40_MD5, SSL_RSA_EXPORT_WITH_DES40_CBC_SHA, SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA, SSL_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA]
Compression Methods: { 0 }
***
%% Created: [Session-2, TLS_DHE_DSS_WITH_AES_128_CBC_SHA]
*** ServerHello, TLSv1
RandomCookie: GMT: 1191450324 bytes = { 164, 24, 106, 45, 233, 112, 201, 145, 153, 62, 125, 34, 207, 118, 189, 228, 214, 134, 104, 240, 157, 52, 201, 17, 186, 8, 248, 95 }
Session ID: {71, 4, 23, 212, 190, 125, 104, 107, 29, 139, 31, 89, 15, 89, 1, 255, 250, 247, 69, 184, 203, 217, 131, 24, 53, 68, 216, 99, 62, 52, 21, 100}
Cipher Suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA
Compression Method: 0
***
Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA
*** Certificate chain
chain [0] = [
[
Version: V1
Subject: CN=Sukrit Khera, OU=Reliant, O=Reliant, L=Houston, ST=Texas, C=TX
Signature Algorithm: SHA1withDSA, OID = 1.2.840.10040.4.3

Key: Sun DSA Public Key
Parameters SA
p: fd7f5381 1d751229 52df4a9c 2eece4e7 f611b752 3cef4400 c31e3f80 b6512669
455d4022 51fb593d 8d58fabf c5f5ba30 f6cb9b55 6cd7813b 801d346f f26660b7
6b9950a5 a49f9fe8 047b1022 c24fbba9 d7feb7c6 1bf83b57 e7c6a8a6 150f04fb
83f6d3c5 1ec30235 54135a16 9132f675 f3ae2b61 d72aeff2 2203199d d14801c7
q: 9760508f 15230bcc b292b982 a2eb840b f0581cf5
g: f7e1a085 d69b3dde cbbcab5c 36b857b9 7994afbb fa3aea82 f9574c0b 3d078267
5159578e bad4594f e6710710 8180b449 167123e8 4c281613 b7cf0932 8cc8a6e1
3c167a8b 547c8d28 e0a3ae1e 2bb3a675 916ea37f 0bfa2135 62f1fb62 7a01243b
cca4f1be a8519089 a883dfe1 5ae59f06 928b665e 807b5525 64014c3b fecf492a

y:
46c0cfec 389eb664 f6ea9733 9487ef63 bc40c6af 9fbdebe5 7f8e6b37 7171837f
608071ad 201467ca e2ef249d ba3f95ce 80d850de 5eb70503 60f62dac 1f4f3bce
4505d8b0 66fd51bd f242cc53 56ef3015 d06bf6b4 56ce86c6 9f921e23 60469253
4d91eed7 70df96c8 ed8facdb 7db6507d 95d6c5be 91b33a55 204c475e a013a343

Validity: [From: Thu Aug 23 11:26:37 CDT 2007,
To: Wed Nov 21 10:26:37 CST 2007]
Issuer: CN=Sukrit Khera, OU=Reliant, O=Reliant, L=Houston, ST=Texas, C=TX
SerialNumber: [ 46cdb53d]

]
Algorithm: [SHA1withDSA]
Signature:
0000: 30 2C 02 14 5B D5 20 1F 95 B7 15 40 AF D8 E3 F1 0,..[. ....@....
0010: 81 19 9F C2 11 68 4F E4 02 14 4A DC A5 69 AD AF .....hO...J..i..
0020: 8C 7D 54 F9 E6 B8 CF 6E 9C 9E B1 4A C8 1E ..T....n...J..

]
***
*** Diffie-Hellman ServerKeyExchange
DH Modulus: { 244, 136, 253, 88, 78, 73, 219, 205, 32, 180, 157, 228, 145, 7, 54, 107, 51, 108, 56, 13, 69, 29, 15, 124, 136, 179, 28, 124, 91, 45, 142, 246, 243, 201, 35, 192, 67, 240, 165, 91, 24, 141, 142, 187, 85, 140, 184, 93, 56, 211, 52, 253, 124, 23, 87, 67, 163, 29, 24, 108, 222, 51, 33, 44, 181, 42, 255, 60, 225, 177, 41, 64, 24, 17, 141, 124, 132, 167, 10, 114, 214, 134, 196, 3, 25, 200, 7, 41, 122, 202, 149, 12, 217, 150, 159, 171, 208, 10, 80, 155, 2, 70, 211, 8, 61, 102, 164, 93, 65, 159, 156, 124, 189, 137, 75, 34, 25, 38, 186, 171, 162, 94, 195, 85, 233, 47, 120, 199 }
DH Base: { 2 }
Server DH Public Key: { 206, 190, 197, 13, 130, 18, 225, 244, 0, 115, 167, 70, 205, 10, 14, 3, 239, 157, 144, 22, 188, 39, 255, 156, 189, 120, 28, 199, 159, 201, 229, 214, 185, 142, 117, 137, 65, 164, 52, 182, 217, 98, 186, 247, 11, 197, 142, 137, 186, 3, 208, 118, 160, 31, 10, 114, 154, 82, 107, 193, 165, 40, 235, 132, 199, 42, 121, 104, 184, 241, 191, 35, 160, 87, 224, 179, 102, 210, 169, 28, 176, 128, 77, 188, 180, 150, 213, 165, 247, 87, 156, 187, 87, 32, 147, 19, 164, 13, 38, 68, 233, 78, 174, 143, 70, 13, 82, 93, 162, 148, 91, 64, 243, 28, 56, 150, 92, 61, 207, 200, 147, 45, 39, 94, 198, 182, 221, 5 }
Signed with a DSA or RSA public key
*** CertificateRequest
Cert Types: RSA, DSS,
Cert Authorities:
<CN=Sukrit Khera, OU=Reliant, O=Reliant, L=Houston, ST=Texas, C=TX>
<CN=xidsslcert, OU=IT, O=Reliant Energy, L=Houston, ST=Texas, C=US>
<CN=xidsslcert, OU=IT, O=Reliant Energy, L=Houston, ST=Texas, C=US>
<CN=sanjay, OU=reli, O=relia, L=houston, ST=texas, C=77>
<CN=localhost>
*** ServerHelloDone
http-6443-Processor25, WRITE: TLSv1 Handshake, length = 1680
http-6443-Processor25, READ: TLSv1 Alert, length = 32
http-6443-Processor25, RECV TLSv1 ALERT: warning, close_notify
http-6443-Processor25, called closeInternal(false)
http-6443-Processor25, SEND TLSv1 ALERT: warning, description = close_notify
http-6443-Processor25, WRITE: TLSv1 Alert, length = 32
Exception sending alert: java.net.SocketException: Broken pipe
setSoTimeout(60000) called
Oct 3, 2007 5:29:41 PM org.apache.coyote.http11.Http11Processor action
WARNING: Exception getting SSL Cert
java.net.SocketException: Socket Closed
at java.net.PlainSocketImpl.setOption(PlainSocketImpl.java:177)
at java.net.Socket.setSoTimeout(Socket.java:924)
at com.sun.net.ssl.internal.ssl.SSLSocketImpl.setSoTimeout(DashoA12275)
at org.apache.tomcat.util.net.jsse.JSSE14Support.synchronousHandshake(JSSE14Support.java:99)
at org.apache.tomcat.util.net.jsse.JSSE14Support.handShake(JSSE14Support.java:67)
at org.apache.tomcat.util.net.jsse.JSSESupport.getPeerCertificateChain(JSSESupport.java:120)
at org.apache.coyote.http11.Http11Processor.action(Http11Processor.java:1049)
at org.apache.coyote.Request.action(Request.java:365)
at org.apache.coyote.tomcat5.CoyoteRequest.getAttribute(CoyoteRequest.java:929)
at org.apache.coyote.tomcat5.CoyoteRequestFacade.getAttribute(CoyoteRequestFacade.java:214)
at org.apache.catalina.authenticator.SSLAuthenticator.authenticate(SSLAuthenticator.java:137)
at org.apache.catalina.authenticator.AuthenticatorBase.invoke(AuthenticatorBase.java:504)
at org.apache.catalina.core.StandardValveContext.invokeNext(StandardValveContext.java:102)
at org.apache.catalina.core.StandardPipeline.invoke(StandardPipeline.java:520)
at org.apache.catalina.core.StandardHostValve.invoke(StandardHostValve.java:137)
at org.apache.catalina.core.StandardValveContext.invokeNext(StandardValveContext.java:104)
at org.apache.catalina.valves.ErrorReportValve.invoke(ErrorReportValve.java:118)
at org.apache.catalina.core.StandardValveContext.invokeNext(StandardValveContext.java:102)
at org.apache.catalina.core.StandardPipeline.invoke(StandardPipeline.java:520)
at org.apache.catalina.core.StandardEngineValve.invoke(StandardEngineValve.java:109)
at org.apache.catalina.core.StandardValveContext.invokeNext(StandardValveContext.java:104)
at org.apache.catalina.core.StandardPipeline.invoke(StandardPipeline.java:520)
at org.apache.catalina.core.ContainerBase.invoke(ContainerBase.java:929)
at org.apache.coyote.tomcat5.CoyoteAdapter.service(CoyoteAdapter.java:160)
at org.apache.coyote.http11.Http11Processor.process(Http11Processor.java:799)
at org.apache.coyote.http11.Http11Protocol$Http11ConnectionHandler.processConnection(Http11Protocol.java:705)
at org.apache.tomcat.util.net.TcpWorkerThread.runIt(PoolTcpEndpoint.java:577)
at org.apache.tomcat.util.threads.ThreadPool$ControlRunnable.run(ThreadPool.java:683)
at java.lang.Thread.run(Thread.java:534)
http-6443-Processor25, called close()
http-6443-Processor25, called closeInternal(true)
16 years ago
I have a standalone java class having main method. Actually, it is a webservice client. (it calls webservice). The webservice uses 2 way ssl authentication. So I generated the certificat inside local jre & also improted the certificate which i got from the server. On the server side, i imported the certificate which the client generated. But why calling that webservice I got following excpetion......


keyStore is : C:\certs\localstore.jks
keyStore type is : jks
init keystore
init keymanager of type SunX509
***
found key for : standalone
chain [0] = [
[
Version: V1
Subject: CN=sanjay, OU=reli, O=relia, L=houston, ST=texas, C=77
Signature Algorithm: MD5withRSA, OID = 1.2.840.113549.1.1.4

Key: SunJSSE RSA public key:
public exponent:
010001
modulus:
9dfba044 f7b92216 7c0550d9 fed3d17e 451ca808 62454a95 f666d169 80434d64
33588983 598c00e6 682155e0 28ce990a 7c76b497 672761d4 8f64b1ca d3bdd19b
ca4c3f27 4024a921 e1d628f3 62f0c0ae 860aee61 3185f03a 6e3e559a d8fac905
73ee5670 cb48f0ab def0674a ad2c81f1 d7a12104 9ef6d72b e39fb737 62ec20ad
Validity: [From: Wed Oct 03 16:31:29 CDT 2007,
To: Tue Jan 01 15:31:29 CST 2008]
Issuer: CN=sanjay, OU=reli, O=relia, L=houston, ST=texas, C=77
SerialNumber: [ 47040a31]

]
Algorithm: [MD5withRSA]
Signature:
0000: 16 38 03 57 78 9B AE B2 C8 20 5C D8 99 45 23 5A .8.Wx.... \..E#Z
0010: 43 C7 F2 13 1F AD 28 82 12 1D 7F 3D 6E BF 34 6A C.....(....=n.4j
0020: 2C 8B F9 83 7D 01 B6 A0 49 42 05 9F 4A 2D 2C D2 ,.......IB..J-,.
0030: 66 E3 19 3A F9 46 B6 E8 6F 08 E9 15 A9 8E 73 2D f..:.F..o.....s-
0040: 2B 53 16 EC 2A 86 B7 65 0A 7A 26 EA 5A E2 16 07 +S..*..e.z&.Z...
0050: 00 AC 4B 3B 2C 69 69 63 18 75 33 23 5B 04 3F 64 ..K;,iic.u3#[.?d
0060: 6D 7E EB F6 50 60 27 8C 92 8F A4 0A 35 10 EF FA m...P`'.....5...
0070: A0 D2 FD E9 42 E4 DA 5B BF 34 A7 7D 9E ED 1D 09 ....B..[.4......

]
***
trustStore is: C:\certs\server_secureChanged.jks
trustStore type is : jks
init truststore
adding as trusted cert:
Subject: CN=localhost
Issuer: CN=localhost
Algorithm: RSA; Serial number: 0x46fa6bd7
Valid from Wed Sep 26 09:25:27 CDT 2007 until Tue Dec 25 08:25:27 CST 2007

adding as trusted cert:
Subject: CN=Sukrit Khera, OU=Reliant, O=Reliant, L=Houston, ST=Texas, C=TX
Issuer: CN=Sukrit Khera, OU=Reliant, O=Reliant, L=Houston, ST=Texas, C=TX
Algorithm: DSA; Serial number: 0x46cdb53d
Valid from Thu Aug 23 11:26:37 CDT 2007 until Wed Nov 21 10:26:37 CST 2007

adding as trusted cert:
Subject: CN=xidsslcert, OU=IT, O=Reliant Energy, L=Houston, ST=Texas, C=US
Issuer: CN=xidsslcert, OU=IT, O=Reliant Energy, L=Houston, ST=Texas, C=US
Algorithm: RSA; Serial number: 0x252a698e
Valid from Tue Oct 02 13:30:00 CDT 2007 until Fri Oct 02 13:30:00 CDT 2009

adding as trusted cert:
Subject: CN=localhost
Issuer: CN=localhost
Algorithm: RSA; Serial number: 0x360b2372
Valid from Thu Oct 02 02:25:00 CDT 2003 until Sun Oct 02 02:25:00 CDT 2005

init context
trigger seeding of SecureRandom
done seeding SecureRandom
%% No cached client session
*** ClientHello, TLSv1
RandomCookie: GMT: 1191450323 bytes = { 71, 127, 240, 101, 169, 166, 14, 86, 141, 228, 109, 14, 252, 241, 144, 132, 54, 2, 212, 41, 110, 35, 132, 225, 58, 232, 221, 43 }
Session ID: {}
Cipher Suites: [SSL_RSA_WITH_RC4_128_MD5, SSL_RSA_WITH_RC4_128_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_DES_CBC_SHA, SSL_DHE_RSA_WITH_DES_CBC_SHA, SSL_DHE_DSS_WITH_DES_CBC_SHA, SSL_RSA_EXPORT_WITH_RC4_40_MD5, SSL_RSA_EXPORT_WITH_DES40_CBC_SHA, SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA, SSL_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA]
Compression Methods: { 0 }
***
main, WRITE: TLSv1 Handshake, length = 73
main, WRITE: SSLv2 client hello message, length = 98
main, READ: TLSv1 Handshake, length = 1183
*** ServerHello, TLSv1
RandomCookie: GMT: 1191450323 bytes = { 128, 206, 235, 242, 102, 121, 83, 162, 2, 231, 198, 217, 155, 24, 197, 59, 195, 12, 200, 203, 49, 114, 195, 58, 20, 30, 133, 11 }
Session ID: {71, 4, 23, 211, 90, 188, 137, 195, 199, 39, 190, 121, 175, 242, 215, 86, 244, 153, 5, 178, 92, 55, 96, 73, 146, 23, 62, 1, 249, 6, 110, 192}
Cipher Suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA
Compression Method: 0
***
%% Created: [Session-1, TLS_DHE_DSS_WITH_AES_128_CBC_SHA]
** TLS_DHE_DSS_WITH_AES_128_CBC_SHA
*** Certificate chain
chain [0] = [
[
Version: V1
Subject: CN=Sukrit Khera, OU=Reliant, O=Reliant, L=Houston, ST=Texas, C=TX
Signature Algorithm: SHA1withDSA, OID = 1.2.840.10040.4.3

Key: Sun DSA Public Key
Parameters SA
p: fd7f5381 1d751229 52df4a9c 2eece4e7 f611b752 3cef4400 c31e3f80 b6512669
455d4022 51fb593d 8d58fabf c5f5ba30 f6cb9b55 6cd7813b 801d346f f26660b7
6b9950a5 a49f9fe8 047b1022 c24fbba9 d7feb7c6 1bf83b57 e7c6a8a6 150f04fb
83f6d3c5 1ec30235 54135a16 9132f675 f3ae2b61 d72aeff2 2203199d d14801c7
q: 9760508f 15230bcc b292b982 a2eb840b f0581cf5
g: f7e1a085 d69b3dde cbbcab5c 36b857b9 7994afbb fa3aea82 f9574c0b 3d078267
5159578e bad4594f e6710710 8180b449 167123e8 4c281613 b7cf0932 8cc8a6e1
3c167a8b 547c8d28 e0a3ae1e 2bb3a675 916ea37f 0bfa2135 62f1fb62 7a01243b
cca4f1be a8519089 a883dfe1 5ae59f06 928b665e 807b5525 64014c3b fecf492a

y:
46c0cfec 389eb664 f6ea9733 9487ef63 bc40c6af 9fbdebe5 7f8e6b37 7171837f
608071ad 201467ca e2ef249d ba3f95ce 80d850de 5eb70503 60f62dac 1f4f3bce
4505d8b0 66fd51bd f242cc53 56ef3015 d06bf6b4 56ce86c6 9f921e23 60469253
4d91eed7 70df96c8 ed8facdb 7db6507d 95d6c5be 91b33a55 204c475e a013a343

Validity: [From: Thu Aug 23 11:26:37 CDT 2007,
To: Wed Nov 21 10:26:37 CST 2007]
Issuer: CN=Sukrit Khera, OU=Reliant, O=Reliant, L=Houston, ST=Texas, C=TX
SerialNumber: [ 46cdb53d]

]
Algorithm: [SHA1withDSA]
Signature:
0000: 30 2C 02 14 5B D5 20 1F 95 B7 15 40 AF D8 E3 F1 0,..[. ....@....
0010: 81 19 9F C2 11 68 4F E4 02 14 4A DC A5 69 AD AF .....hO...J..i..
0020: 8C 7D 54 F9 E6 B8 CF 6E 9C 9E B1 4A C8 1E ..T....n...J..

]
***
Found trusted certificate:
[
[
Version: V1
Subject: CN=Sukrit Khera, OU=Reliant, O=Reliant, L=Houston, ST=Texas, C=TX
Signature Algorithm: SHA1withDSA, OID = 1.2.840.10040.4.3

Key: Sun DSA Public Key
Parameters SA
p: fd7f5381 1d751229 52df4a9c 2eece4e7 f611b752 3cef4400 c31e3f80 b6512669
455d4022 51fb593d 8d58fabf c5f5ba30 f6cb9b55 6cd7813b 801d346f f26660b7
6b9950a5 a49f9fe8 047b1022 c24fbba9 d7feb7c6 1bf83b57 e7c6a8a6 150f04fb
83f6d3c5 1ec30235 54135a16 9132f675 f3ae2b61 d72aeff2 2203199d d14801c7
q: 9760508f 15230bcc b292b982 a2eb840b f0581cf5
g: f7e1a085 d69b3dde cbbcab5c 36b857b9 7994afbb fa3aea82 f9574c0b 3d078267
5159578e bad4594f e6710710 8180b449 167123e8 4c281613 b7cf0932 8cc8a6e1
3c167a8b 547c8d28 e0a3ae1e 2bb3a675 916ea37f 0bfa2135 62f1fb62 7a01243b
cca4f1be a8519089 a883dfe1 5ae59f06 928b665e 807b5525 64014c3b fecf492a

y:
46c0cfec 389eb664 f6ea9733 9487ef63 bc40c6af 9fbdebe5 7f8e6b37 7171837f
608071ad 201467ca e2ef249d ba3f95ce 80d850de 5eb70503 60f62dac 1f4f3bce
4505d8b0 66fd51bd f242cc53 56ef3015 d06bf6b4 56ce86c6 9f921e23 60469253
4d91eed7 70df96c8 ed8facdb 7db6507d 95d6c5be 91b33a55 204c475e a013a343

Validity: [From: Thu Aug 23 11:26:37 CDT 2007,
To: Wed Nov 21 10:26:37 CST 2007]
Issuer: CN=Sukrit Khera, OU=Reliant, O=Reliant, L=Houston, ST=Texas, C=TX
SerialNumber: [ 46cdb53d]

]
Algorithm: [SHA1withDSA]
Signature:
0000: 30 2C 02 14 5B D5 20 1F 95 B7 15 40 AF D8 E3 F1 0,..[. ....@....
0010: 81 19 9F C2 11 68 4F E4 02 14 4A DC A5 69 AD AF .....hO...J..i..
0020: 8C 7D 54 F9 E6 B8 CF 6E 9C 9E B1 4A C8 1E ..T....n...J..

]
*** Diffie-Hellman ServerKeyExchange
DH Modulus: { 244, 136, 253, 88, 78, 73, 219, 205, 32, 180, 157, 228, 145, 7, 54, 107, 51, 108, 56, 13, 69, 29, 15, 124, 136, 179, 28, 124, 91, 45, 142, 246, 243, 201, 35, 192, 67, 240, 165, 91, 24, 141, 142, 187, 85, 140, 184, 93, 56, 211, 52, 253, 124, 23, 87, 67, 163, 29, 24, 108, 222, 51, 33, 44, 181, 42, 255, 60, 225, 177, 41, 64, 24, 17, 141, 124, 132, 167, 10, 114, 214, 134, 196, 3, 25, 200, 7, 41, 122, 202, 149, 12, 217, 150, 159, 171, 208, 10, 80, 155, 2, 70, 211, 8, 61, 102, 164, 93, 65, 159, 156, 124, 189, 137, 75, 34, 25, 38, 186, 171, 162, 94, 195, 85, 233, 47, 120, 199 }
DH Base: { 2 }
Server DH Public Key: { 148, 227, 193, 161, 215, 62, 253, 183, 33, 191, 12, 168, 47, 222, 126, 39, 144, 208, 218, 64, 108, 210, 50, 197, 143, 166, 46, 254, 10, 106, 197, 188, 107, 241, 238, 77, 172, 24, 210, 132, 15, 50, 33, 136, 95, 234, 232, 104, 105, 166, 132, 116, 174, 111, 135, 30, 107, 212, 121, 125, 15, 118, 144, 25, 252, 12, 226, 200, 161, 230, 88, 20, 97, 170, 87, 30, 97, 43, 32, 66, 222, 225, 86, 196, 83, 10, 176, 122, 168, 119, 151, 221, 247, 136, 117, 216, 246, 56, 182, 99, 114, 138, 176, 234, 231, 142, 10, 197, 230, 2, 156, 210, 110, 145, 203, 126, 218, 11, 27, 99, 5, 18, 66, 124, 126, 53, 166, 180 }
Anonymous
*** ServerHelloDone
*** ClientDiffieHellmanPublic
DH Public key: { 89, 116, 138, 150, 47, 252, 170, 129, 129, 91, 58, 16, 73, 239, 106, 28, 143, 230, 108, 97, 69, 3, 96, 51, 225, 119, 169, 150, 148, 139, 81, 193, 52, 77, 41, 1, 183, 236, 180, 7, 4, 187, 116, 15, 185, 222, 170, 164, 109, 143, 66, 167, 0, 240, 84, 233, 69, 236, 116, 66, 237, 229, 66, 37, 112, 228, 208, 156, 13, 42, 140, 195, 44, 13, 94, 201, 227, 178, 183, 210, 198, 10, 206, 216, 73, 53, 69, 234, 122, 148, 16, 112, 215, 191, 134, 164, 79, 223, 75, 186, 140, 54, 49, 165, 41, 132, 219, 45, 83, 167, 39, 49, 222, 255, 251, 198, 5, 229, 31, 210, 209, 51, 69, 180, 194, 21, 109, 190 }
main, WRITE: TLSv1 Handshake, length = 134
SESSION KEYGEN:
PreMaster Secret:
0000: D2 63 2B 7C 9B 82 AE 27 7E 19 DF 18 5F D6 86 2D .c+....'...._..-
0010: 95 00 9C F8 99 19 5C 1C 02 3B CD 07 1E 89 3C 7D ......\..;....<.
0020: 83 79 C4 F3 BF 07 42 B6 5D 01 5C AD BB 44 62 AC .y....B.].\..Db.
0030: BF 41 05 98 A6 50 11 C1 4A FF 1F E2 D9 4F AC 98 .A...P..J....O..
0040: D3 C2 DD 77 36 FB BE DC 88 69 1C 30 F8 A5 E7 A5 ...w6....i.0....
0050: 03 F1 EB E5 03 A6 F5 C0 C7 DB 0D F0 D8 BD D9 77 ...............w
0060: 73 CF EC 38 F4 34 58 75 39 C8 78 00 7A AF 64 20 s..8.4Xu9.x.z.d
0070: A1 65 AA 63 77 E0 3D 75 7F 77 6F 94 32 23 3F 4D .e.cw.=u.wo.2#?M
CONNECTION KEYGEN:
Client Nonce:
0000: 47 04 17 D3 47 7F F0 65 A9 A6 0E 56 8D E4 6D 0E G...G..e...V..m.
0010: FC F1 90 84 36 02 D4 29 6E 23 84 E1 3A E8 DD 2B ....6..)n#..:..+
Server Nonce:
0000: 47 04 17 D3 80 CE EB F2 66 79 53 A2 02 E7 C6 D9 G.......fyS.....
0010: 9B 18 C5 3B C3 0C C8 CB 31 72 C3 3A 14 1E 85 0B ...;....1r.:....
Master Secret:
0000: A0 A4 73 3C 68 3E 64 E5 D4 74 A6 15 D8 C5 BB 64 ..s<h>d..t.....d
0010: 07 11 75 B6 27 7D 17 76 82 D2 A5 4C 5E E5 3F 28 ..u.'..v...L^.?(
0020: 3D 12 14 30 8E 36 22 68 E0 F5 7F BD 91 02 31 E6 =..0.6"h......1.
Client MAC write Secret:
0000: 3E 05 26 99 29 5C 31 34 78 80 03 BF 96 3C 1F C1 >.&.)\14x....<..
0010: 56 42 28 31 VB(1
Server MAC write Secret:
0000: C3 E0 9F 5D 3E F4 6C 6D A8 6A B9 B2 A3 54 ED 41 ...]>.lm.j...T.A
0010: 26 C2 E1 DF &...
Client write key:
0000: 56 0B 04 DF 9F 79 93 D3 01 BD E0 94 11 37 C4 FE V....y.......7..
Server write key:
0000: 3F 96 05 FC D8 84 78 BC 39 5C 8E 73 4A B3 73 C1 ?.....x.9\.sJ.s.
Client write IV:
0000: 47 F2 B4 75 2D 3A 69 4E 1A 43 4E 62 E3 94 65 06 G..u-:iN.CNb..e.
Server write IV:
0000: ED 5E BA 40 FC 08 14 2A 22 3C 6A CC 32 9E CB C7 .^.@...*"<j.2...
main, WRITE: TLSv1 Change Cipher Spec, length = 1
JsseJce: Using cipher AES/CBC/NoPadding from provider SunJCE
*** Finished
verify_data: { 104, 11, 250, 194, 119, 123, 23, 123, 109, 172, 208, 228 }
***
main, WRITE: TLSv1 Handshake, length = 48
main, READ: TLSv1 Change Cipher Spec, length = 1
JsseJce: Using cipher AES/CBC/NoPadding from provider SunJCE
main, READ: TLSv1 Handshake, length = 48
*** Finished
verify_data: { 96, 52, 182, 53, 85, 69, 72, 12, 162, 156, 186, 33 }
***
%% Cached client session: [Session-1, TLS_DHE_DSS_WITH_AES_128_CBC_SHA]
setSoTimeout(150) called
main, WRITE: TLSv1 Application Data, length = 752
main, READ: TLSv1 Handshake, length = 32
*** HelloRequest (empty)
%% Client cached [Session-1, TLS_DHE_DSS_WITH_AES_128_CBC_SHA]
%% Try resuming [Session-1, TLS_DHE_DSS_WITH_AES_128_CBC_SHA] from port 3021
*** ClientHello, TLSv1
RandomCookie: GMT: 1191450324 bytes = { 17, 105, 239, 11, 244, 163, 76, 201, 2, 150, 218, 226, 124, 80, 136, 172, 37, 156, 133, 234, 51, 159, 177, 212, 134, 17, 221, 90 }
Session ID: {71, 4, 23, 211, 90, 188, 137, 195, 199, 39, 190, 121, 175, 242, 215, 86, 244, 153, 5, 178, 92, 55, 96, 73, 146, 23, 62, 1, 249, 6, 110, 192}
Cipher Suites: [SSL_RSA_WITH_RC4_128_MD5, SSL_RSA_WITH_RC4_128_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_DES_CBC_SHA, SSL_DHE_RSA_WITH_DES_CBC_SHA, SSL_DHE_DSS_WITH_DES_CBC_SHA, SSL_RSA_EXPORT_WITH_RC4_40_MD5, SSL_RSA_EXPORT_WITH_DES40_CBC_SHA, SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA, SSL_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA]
Compression Methods: { 0 }
***
main, WRITE: TLSv1 Handshake, length = 128
main, handling exception: java.net.SocketTimeoutException: Read timed out
main, called close()
main, called closeInternal(true)
main, SEND TLSv1 ALERT: warning, description = close_notify
main, WRITE: TLSv1 Alert, length = 32
AxisFault
faultCode: {http://schemas.xmlsoap.org/soap/envelope/}Server.userException
faultSubcode:
faultString: java.net.SocketTimeoutException: Read timed out
faultActor:
faultNode:
faultDetail:
{http://xml.apache.org/axis/}stackTrace:java.net.SocketTimeoutException: Read timed out
at java.net.SocketInputStream.socketRead0(Native Method)
at java.net.SocketInputStream.read(Unknown Source)
at com.sun.net.ssl.internal.ssl.InputRecord.a(Unknown Source)
at com.sun.net.ssl.internal.ssl.InputRecord.read(Unknown Source)
at com.sun.net.ssl.internal.ssl.SSLSocketImpl.a(Unknown Source)
at com.sun.net.ssl.internal.ssl.SSLSocketImpl.a(Unknown Source)
at com.sun.net.ssl.internal.ssl.AppInputStream.read(Unknown Source)
at java.io.BufferedInputStream.fill(Unknown Source)
at java.io.BufferedInputStream.read(Unknown Source)
at org.apache.axis.transport.http.HTTPSender.readHeadersFromSocket(HTTPSender.java:583)
at org.apache.axis.transport.http.HTTPSender.invoke(HTTPSender.java:143)
at org.apache.axis.strategies.InvocationStrategy.visit(InvocationStrategy.java:32)
at org.apache.axis.SimpleChain.doVisiting(SimpleChain.java:118)
at org.apache.axis.SimpleChain.invoke(SimpleChain.java:83)
at org.apache.axis.client.AxisClient.invoke(AxisClient.java:165)
at org.apache.axis.client.Call.invokeEngine(Call.java:2784)
at org.apache.axis.client.Call.invoke(Call.java:2767)
at org.apache.axis.client.Call.invoke(Call.java:2443)
at org.apache.axis.client.Call.invoke(Call.java:2366)
at org.apache.axis.client.Call.invoke(Call.java:1812)
at com.reliant.ws.BillFetchWSSoapBindingStub.fetchContent(BillFetchWSSoapBindingStub.java:111)
at com.reliant.ws.BillFetchClient.main(BillFetchClient.java:41)

{http://xml.apache.org/axis/}hostname:Main2354pc2

java.net.SocketTimeoutException: Read timed out
at org.apache.axis.AxisFault.makeFault(AxisFault.java:101)
at org.apache.axis.transport.http.HTTPSender.invoke(HTTPSender.java:154)
at org.apache.axis.strategies.InvocationStrategy.visit(InvocationStrategy.java:32)
at org.apache.axis.SimpleChain.doVisiting(SimpleChain.java:118)
at org.apache.axis.SimpleChain.invoke(SimpleChain.java:83)
at org.apache.axis.client.AxisClient.invoke(AxisClient.java:165)
at org.apache.axis.client.Call.invokeEngine(Call.java:2784)
at org.apache.axis.client.Call.invoke(Call.java:2767)
at org.apache.axis.client.Call.invoke(Call.java:2443)
at org.apache.axis.client.Call.invoke(Call.java:2366)
at org.apache.axis.client.Call.invoke(Call.java:1812)
at com.reliant.ws.BillFetchWSSoapBindingStub.fetchContent(BillFetchWSSoapBindingStub.java:111)
at com.reliant.ws.BillFetchClient.main(BillFetchClient.java:41)
Caused by: java.net.SocketTimeoutException: Read timed out
at java.net.SocketInputStream.socketRead0(Native Method)
at java.net.SocketInputStream.read(Unknown Source)
at com.sun.net.ssl.internal.ssl.InputRecord.a(Unknown Source)
at com.sun.net.ssl.internal.ssl.InputRecord.read(Unknown Source)
at com.sun.net.ssl.internal.ssl.SSLSocketImpl.a(Unknown Source)
at com.sun.net.ssl.internal.ssl.SSLSocketImpl.a(Unknown Source)
at com.sun.net.ssl.internal.ssl.AppInputStream.read(Unknown Source)
at java.io.BufferedInputStream.fill(Unknown Source)
at java.io.BufferedInputStream.read(Unknown Source)
at org.apache.axis.transport.http.HTTPSender.readHeadersFromSocket(HTTPSender.java:583)
at org.apache.axis.transport.http.HTTPSender.invoke(HTTPSender.java:143)
... 11 more
Exception in thread "main"


Thanks in Advance.
16 years ago
Thanks buddy,

It was really very helpful. The problem was the certificate was invalid. I got the new valid certificate, And I think, I got rid of "No certificate found exception". But now i am facing another exception :

On the JSP, I am getting following exception :
Server Error
org.apache.axis.message.SOAPFaultBuilder.createFault(SOAPFaultBuilder.java:222)
org.apache.axis.message.SOAPFaultBuilder.endElement(SOAPFaultBuilder.java:129)
org.apache.axis.encoding.DeserializationContext.endElement(DeserializationContext.java:1087)
org.apache.xerces.parsers.AbstractSAXParser.endElement(Unknown Source)
org.apache.xerces.impl.XMLNSDocumentScannerImpl.scanEndElement(Unknown Source)
org.apache.xerces.impl.XMLDocumentFragmentScannerImpl$FragmentContentDispatcher.dispatch(Unknown Source)
org.apache.xerces.impl.XMLDocumentFragmentScannerImpl.scanDocument(Unknown Source)
org.apache.xerces.parsers.XML11Configuration.parse(Unknown Source)
org.apache.xerces.parsers.XML11Configuration.parse(Unknown Source)
org.apache.xerces.parsers.XMLParser.parse(Unknown Source)
org.apache.xerces.parsers.AbstractSAXParser.parse(Unknown Source)
javax.xml.parsers.SAXParser.parse(Unknown Source)
org.apache.axis.encoding.DeserializationContext.parse(DeserializationContext.java:227)
org.apache.axis.SOAPPart.getAsSOAPEnvelope(SOAPPart.java:696)
org.apache.axis.Message.getSOAPEnvelope(Message.java:435)
org.apache.axis.handlers.soap.MustUnderstandChecker.invoke(MustUnderstandChecker.java:62)
org.apache.axis.client.AxisClient.invoke(AxisClient.java:206)
org.apache.axis.client.Call.invokeEngine(Call.java:2784)
org.apache.axis.client.Call.invoke(Call.java:2767)
org.apache.axis.client.Call.invoke(Call.java:2443)
org.apache.axis.client.Call.invoke(Call.java:2366)
org.apache.axis.client.Call.invoke(Call.java:1812)
com.reliant.ws.xi.client.Os_getDocumentRequestBindingStub.os_getDocumentRequest(Os_getDocumentRequestBindingStub.java:164)
com.reliant.ws.xi.client.BillFetchClient.fetchContent(BillFetchClient.java:105)
org.apache.jsp.en_005fUS.EBillViewer.EBillWSCall_jsp._jspService(EBillWSCall_jsp.java:56)
org.apache.jasper.runtime.HttpJspBase.service(HttpJspBase.java:94)
javax.servlet.http.HttpServlet.service(HttpServlet.java:802)
org.apache.jasper.servlet.JspServletWrapper.service(JspServletWrapper.java:324)
org.apache.jasper.servlet.JspServlet.serviceJspFile(JspServlet.java:292)
org.apache.jasper.servlet.JspServlet.service(JspServlet.java:236)
javax.servlet.http.HttpServlet.service(HttpServlet.java:802)


And in the tomcat, logs are as following :

setSoTimeout(60000) called
http-6443-Processor24, READ: TLSv1 Handshake, length = 115
*** ClientHello, TLSv1
RandomCookie: GMT: 1191369002 bytes = { 196, 16, 186, 107, 222, 206, 178, 91, 17, 210, 245, 193, 15, 226, 9, 220, 221, 205, 49, 88, 211, 253, 238, 18, 17, 147, 80, 30 }
Session ID: {}
Cipher Suites: [TLS_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_DSS_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, Unknown 0x0:0x36, Unknown 0x0:0x37, SSL_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DH_DSS_WITH_3DES_EDE_CBC_SHA, SSL_DH_RSA_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_RC4_128_SHA, SSL_DHE_DSS_WITH_RC4_128_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, Unknown 0x0:0x30, Unknown 0x0:0x31, SSL_RSA_WITH_RC4_128_MD5, SSL_RSA_WITH_DES_CBC_SHA, SSL_DHE_DSS_WITH_DES_CBC_SHA, SSL_DHE_RSA_WITH_DES_CBC_SHA, SSL_DH_DSS_WITH_DES_CBC_SHA, SSL_DH_RSA_WITH_DES_CBC_SHA, SSL_RSA_EXPORT1024_WITH_DES_CBC_SHA, SSL_DHE_DSS_EXPORT1024_WITH_DES_CBC_SHA, SSL_RSA_EXPORT1024_WITH_RC4_56_SHA, SSL_DHE_DSS_EXPORT1024_WITH_RC4_56_SHA, SSL_RSA_EXPORT_WITH_DES40_CBC_SHA, SSL_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA, SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA, SSL_DH_DSS_EXPORT_WITH_DES40_CBC_SHA, SSL_DH_RSA_EXPORT_WITH_DES40_CBC_SHA, SSL_RSA_EXPORT_WITH_RC4_40_MD5, SSL_RSA_EXPORT_WITH_RC2_CBC_40_MD5, TLS_DH_anon_WITH_AES_256_CBC_SHA, TLS_DH_anon_WITH_AES_128_CBC_SHA]
Compression Methods: { 0 }
***
%% Created: [Session-40, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA]
*** ServerHello, TLSv1
RandomCookie: GMT: 1191368752 bytes = { 200, 13, 37, 217, 169, 155, 45, 136, 34, 249, 189, 120, 199, 92, 52, 99, 81, 144, 69, 138, 129, 156, 102, 227, 69, 26, 105, 248 }
Session ID: {71, 3, 216, 49, 246, 113, 241, 198, 156, 71, 215, 168, 89, 27, 84, 52, 238, 66, 201, 177, 175, 148, 242, 88, 2, 223, 126, 26, 218, 252, 99, 186}
Cipher Suite: SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA
Compression Method: 0
***
Cipher suite: SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA
*** Certificate chain
chain [0] = [
[
Version: V1
Subject: CN=Sukrit Khera, OU=Reliant, O=Reliant, L=Houston, ST=Texas, C=TX
Signature Algorithm: SHA1withDSA, OID = 1.2.840.10040.4.3

Key: Sun DSA Public Key
Parameters SA
p: fd7f5381 1d751229 52df4a9c 2eece4e7 f611b752 3cef4400 c31e3f80 b6512669
455d4022 51fb593d 8d58fabf c5f5ba30 f6cb9b55 6cd7813b 801d346f f26660b7
6b9950a5 a49f9fe8 047b1022 c24fbba9 d7feb7c6 1bf83b57 e7c6a8a6 150f04fb
83f6d3c5 1ec30235 54135a16 9132f675 f3ae2b61 d72aeff2 2203199d d14801c7
q: 9760508f 15230bcc b292b982 a2eb840b f0581cf5
g: f7e1a085 d69b3dde cbbcab5c 36b857b9 7994afbb fa3aea82 f9574c0b 3d078267
5159578e bad4594f e6710710 8180b449 167123e8 4c281613 b7cf0932 8cc8a6e1
3c167a8b 547c8d28 e0a3ae1e 2bb3a675 916ea37f 0bfa2135 62f1fb62 7a01243b
cca4f1be a8519089 a883dfe1 5ae59f06 928b665e 807b5525 64014c3b fecf492a

y:
46c0cfec 389eb664 f6ea9733 9487ef63 bc40c6af 9fbdebe5 7f8e6b37 7171837f
608071ad 201467ca e2ef249d ba3f95ce 80d850de 5eb70503 60f62dac 1f4f3bce
4505d8b0 66fd51bd f242cc53 56ef3015 d06bf6b4 56ce86c6 9f921e23 60469253
4d91eed7 70df96c8 ed8facdb 7db6507d 95d6c5be 91b33a55 204c475e a013a343

Validity: [From: Thu Aug 23 11:26:37 CDT 2007,
To: Wed Nov 21 10:26:37 CST 2007]
Issuer: CN=Sukrit Khera, OU=Reliant, O=Reliant, L=Houston, ST=Texas, C=TX
SerialNumber: [ 46cdb53d]

]
Algorithm: [SHA1withDSA]
Signature:
0000: 30 2C 02 14 5B D5 20 1F 95 B7 15 40 AF D8 E3 F1 0,..[. ....@....
0010: 81 19 9F C2 11 68 4F E4 02 14 4A DC A5 69 AD AF .....hO...J..i..
0020: 8C 7D 54 F9 E6 B8 CF 6E 9C 9E B1 4A C8 1E ..T....n...J..

]
***
*** Diffie-Hellman ServerKeyExchange
DH Modulus: { 244, 136, 253, 88, 78, 73, 219, 205, 32, 180, 157, 228, 145, 7, 54, 107, 51, 108, 56, 13, 69, 29, 15, 124, 136, 179, 28, 124, 91, 45, 142, 246, 243, 201, 35, 192, 67, 240, 165, 91, 24, 141, 142, 187, 85, 140, 184, 93, 56, 211, 52, 253, 124, 23, 87, 67, 163, 29, 24, 108, 222, 51, 33, 44, 181, 42, 255, 60, 225, 177, 41, 64, 24, 17, 141, 124, 132, 167, 10, 114, 214, 134, 196, 3, 25, 200, 7, 41, 122, 202, 149, 12, 217, 150, 159, 171, 208, 10, 80, 155, 2, 70, 211, 8, 61, 102, 164, 93, 65, 159, 156, 124, 189, 137, 75, 34, 25, 38, 186, 171, 162, 94, 195, 85, 233, 47, 120, 199 }
DH Base: { 2 }
Server DH Public Key: { 97, 184, 159, 212, 225, 211, 102, 243, 247, 3, 150, 47, 124, 220, 10, 76, 201, 100, 170, 230, 230, 164, 219, 76, 41, 209, 58, 244, 9, 162, 93, 89, 226, 28, 90, 79, 75, 180, 234, 11, 222, 167, 251, 52, 175, 133, 67, 69, 48, 93, 86, 76, 169, 136, 237, 164, 229, 181, 218, 218, 63, 146, 80, 83, 40, 174, 5, 110, 160, 14, 203, 141, 154, 49, 23, 15, 231, 94, 51, 144, 147, 203, 157, 140, 195, 191, 0, 6, 78, 27, 225, 187, 245, 148, 249, 152, 80, 74, 178, 33, 32, 54, 128, 120, 52, 66, 127, 214, 16, 107, 149, 144, 174, 68, 49, 152, 242, 192, 114, 79, 104, 160, 225, 52, 226, 171, 72, 62 }
Signed with a DSA or RSA public key
*** ServerHelloDone
http-6443-Processor24, WRITE: TLSv1 Handshake, length = 1183
http-6443-Processor24, READ: TLSv1 Handshake, length = 134
*** ClientDiffieHellmanPublic
DH Public key: { 187, 172, 93, 14, 216, 242, 72, 98, 95, 36, 116, 130, 136, 204, 59, 234, 248, 159, 156, 173, 199, 205, 52, 44, 126, 245, 104, 8, 31, 8, 32, 177, 54, 91, 181, 38, 226, 195, 232, 220, 69, 225, 86, 67, 144, 16, 120, 149, 171, 174, 205, 211, 71, 121, 198, 30, 187, 216, 220, 128, 107, 252, 104, 114, 152, 227, 63, 182, 24, 123, 113, 135, 37, 141, 207, 19, 67, 12, 155, 251, 18, 47, 29, 186, 81, 10, 111, 133, 70, 221, 4, 43, 135, 108, 85, 22, 188, 152, 211, 105, 102, 171, 101, 28, 120, 248, 196, 58, 175, 80, 131, 146, 120, 104, 45, 239, 73, 96, 37, 134, 191, 228, 69, 75, 200, 118, 67, 133 }
SESSION KEYGEN:
PreMaster Secret:
0000: 49 A7 D8 D2 CA 83 A2 92 50 27 C0 71 42 86 36 1C I.......P'.qB.6.
0010: 7C C9 74 AB 90 25 42 CF 5F 08 0A BC F4 EB F3 6D ..t..%B._......m
0020: 33 95 AD 55 99 F3 29 E7 E5 C9 93 D9 71 7C 42 9E 3..U..).....q.B.
0030: 2B 66 61 2E 7E 4C 41 09 22 FE 6E 50 C5 FE 5B 44 +fa..LA.".nP..[D
0040: 35 BE FA 58 C0 D4 27 A9 BA 83 95 9B 0D 53 AE 17 5..X..'......S..
0050: 89 81 66 0B 92 E9 A6 97 EA 85 B8 23 50 21 B7 14 ..f........#P!..
0060: 83 26 55 1E AB B6 0D F8 93 B2 7B 0A 58 BC A9 A9 .&U.........X...
0070: EB 9D 7E 40 4F 42 15 23 74 2D 9B BC 02 4C 4F 9D ...@OB.#t-...LO.
CONNECTION KEYGEN:
Client Nonce:
0000: 47 03 D9 2A C4 10 BA 6B DE CE B2 5B 11 D2 F5 C1 G..*...k...[....
0010: 0F E2 09 DC DD CD 31 58 D3 FD EE 12 11 93 50 1E ......1X......P.
Server Nonce:
0000: 47 03 D8 30 C8 0D 25 D9 A9 9B 2D 88 22 F9 BD 78 G..0..%...-."..x
0010: C7 5C 34 63 51 90 45 8A 81 9C 66 E3 45 1A 69 F8 .\4cQ.E...f.E.i.
Master Secret:
0000: 49 9F 1E 4A 0F D5 A4 53 D9 B4 C8 E6 49 FA AC 72 I..J...S....I..r
0010: 4D B7 96 3C 7D 50 22 D8 A2 40 32 B6 54 36 89 63 M..<.P"..@2.T6.c
0020: 01 21 41 CA 01 DB B3 4C B4 C0 49 7A DA FE F9 DC .!A....L..Iz....
Client MAC write Secret:
0000: 16 68 FC 93 C1 1A DC 11 09 9D A9 10 19 53 FD D3 .h...........S..
0010: 19 99 EB D3 ....
Server MAC write Secret:
0000: 22 BE 6B 6F B7 E5 E8 87 A3 BF 0C 0E 65 61 47 DD ".ko........eaG.
0010: 80 54 2E 99 .T..
Client write key:
0000: A5 8E 31 5C 21 F4 02 3A 9E 0A 36 EA B0 91 38 FE ..1\!..:..6...8.
0010: 6E B4 C7 32 00 36 E3 3E n..2.6.>
Server write key:
0000: 13 7C E8 E6 6E 95 EE ED 8E EA 15 E2 6D 3C 65 10 ....n.......m<e.
0010: 5F 45 1B 7B 03 24 6B AD _E...$k.
Client write IV:
0000: C0 48 8C B6 2B 7D 22 B9 .H..+.".
Server write IV:
0000: 11 97 AF 59 E5 F3 C6 FA ...Y....
http-6443-Processor24, READ: TLSv1 Change Cipher Spec, length = 1
JsseJCE: Using JSSE internal implementation for cipher DESede/CBC/NoPadding
http-6443-Processor24, READ: TLSv1 Handshake, length = 40
*** Finished
verify_data: { 211, 11, 40, 247, 90, 11, 221, 233, 126, 171, 69, 44 }
***
http-6443-Processor24, WRITE: TLSv1 Change Cipher Spec, length = 1
JsseJCE: Using JSSE internal implementation for cipher DESede/CBC/NoPadding
*** Finished
verify_data: { 161, 62, 149, 230, 115, 142, 15, 92, 209, 121, 56, 34 }
***
http-6443-Processor24, WRITE: TLSv1 Handshake, length = 40
%% Cached server session: [Session-40, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA]
http-6443-Processor24, READ: TLSv1 Application Data, length = 416
http-6443-Processor24, READ: TLSv1 Application Data, length = 344
%% Invalidated: [Session-40, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA]
setSoTimeout(1000) called
*** HelloRequest (empty)
http-6443-Processor24, WRITE: TLSv1 Handshake, length = 32
http-6443-Processor24, READ: TLSv1 Handshake, length = 168
*** ClientHello, TLSv1
RandomCookie: GMT: 1191369003 bytes = { 50, 222, 217, 139, 197, 155, 142, 122, 170, 64, 197, 13, 187, 77, 236, 142, 39, 66, 174, 91, 212, 158, 83, 225, 113, 39, 83, 1 }
Session ID: {71, 3, 216, 49, 246, 113, 241, 198, 156, 71, 215, 168, 89, 27, 84, 52, 238, 66, 201, 177, 175, 148, 242, 88, 2, 223, 126, 26, 218, 252, 99, 186}
Cipher Suites: [TLS_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_DSS_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, Unknown 0x0:0x36, Unknown 0x0:0x37, SSL_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DH_DSS_WITH_3DES_EDE_CBC_SHA, SSL_DH_RSA_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_RC4_128_SHA, SSL_DHE_DSS_WITH_RC4_128_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, Unknown 0x0:0x30, Unknown 0x0:0x31, SSL_RSA_WITH_RC4_128_MD5, SSL_RSA_WITH_DES_CBC_SHA, SSL_DHE_DSS_WITH_DES_CBC_SHA, SSL_DHE_RSA_WITH_DES_CBC_SHA, SSL_DH_DSS_WITH_DES_CBC_SHA, SSL_DH_RSA_WITH_DES_CBC_SHA, SSL_RSA_EXPORT1024_WITH_DES_CBC_SHA, SSL_DHE_DSS_EXPORT1024_WITH_DES_CBC_SHA, SSL_RSA_EXPORT1024_WITH_RC4_56_SHA, SSL_DHE_DSS_EXPORT1024_WITH_RC4_56_SHA, SSL_RSA_EXPORT_WITH_DES40_CBC_SHA, SSL_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA, SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA, SSL_DH_DSS_EXPORT_WITH_DES40_CBC_SHA, SSL_DH_RSA_EXPORT_WITH_DES40_CBC_SHA, SSL_RSA_EXPORT_WITH_RC4_40_MD5, SSL_RSA_EXPORT_WITH_RC2_CBC_40_MD5, TLS_DH_anon_WITH_AES_256_CBC_SHA, TLS_DH_anon_WITH_AES_128_CBC_SHA]
Compression Methods: { 0 }
***
%% Created: [Session-41, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA]
*** ServerHello, TLSv1
RandomCookie: GMT: 1191368753 bytes = { 247, 203, 127, 157, 82, 121, 195, 241, 40, 242, 189, 105, 153, 130, 71, 97, 52, 127, 220, 220, 79, 70, 28, 175, 88, 16, 162, 95 }
Session ID: {71, 3, 216, 49, 29, 70, 80, 239, 249, 46, 219, 247, 247, 146, 220, 226, 220, 78, 238, 149, 237, 160, 182, 31, 112, 186, 167, 71, 246, 42, 127, 103}
Cipher Suite: SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA
Compression Method: 0
***
Cipher suite: SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA
*** Certificate chain
chain [0] = [
[
Version: V1
Subject: CN=Sukrit Khera, OU=Reliant, O=Reliant, L=Houston, ST=Texas, C=TX
Signature Algorithm: SHA1withDSA, OID = 1.2.840.10040.4.3

Key: Sun DSA Public Key
Parameters SA
p: fd7f5381 1d751229 52df4a9c 2eece4e7 f611b752 3cef4400 c31e3f80 b6512669
455d4022 51fb593d 8d58fabf c5f5ba30 f6cb9b55 6cd7813b 801d346f f26660b7
6b9950a5 a49f9fe8 047b1022 c24fbba9 d7feb7c6 1bf83b57 e7c6a8a6 150f04fb
83f6d3c5 1ec30235 54135a16 9132f675 f3ae2b61 d72aeff2 2203199d d14801c7
q: 9760508f 15230bcc b292b982 a2eb840b f0581cf5
g: f7e1a085 d69b3dde cbbcab5c 36b857b9 7994afbb fa3aea82 f9574c0b 3d078267
5159578e bad4594f e6710710 8180b449 167123e8 4c281613 b7cf0932 8cc8a6e1
3c167a8b 547c8d28 e0a3ae1e 2bb3a675 916ea37f 0bfa2135 62f1fb62 7a01243b
cca4f1be a8519089 a883dfe1 5ae59f06 928b665e 807b5525 64014c3b fecf492a

y:
46c0cfec 389eb664 f6ea9733 9487ef63 bc40c6af 9fbdebe5 7f8e6b37 7171837f
608071ad 201467ca e2ef249d ba3f95ce 80d850de 5eb70503 60f62dac 1f4f3bce
4505d8b0 66fd51bd f242cc53 56ef3015 d06bf6b4 56ce86c6 9f921e23 60469253
4d91eed7 70df96c8 ed8facdb 7db6507d 95d6c5be 91b33a55 204c475e a013a343

Validity: [From: Thu Aug 23 11:26:37 CDT 2007,
To: Wed Nov 21 10:26:37 CST 2007]
Issuer: CN=Sukrit Khera, OU=Reliant, O=Reliant, L=Houston, ST=Texas, C=TX
SerialNumber: [ 46cdb53d]

]
Algorithm: [SHA1withDSA]
Signature:
0000: 30 2C 02 14 5B D5 20 1F 95 B7 15 40 AF D8 E3 F1 0,..[. ....@....
0010: 81 19 9F C2 11 68 4F E4 02 14 4A DC A5 69 AD AF .....hO...J..i..
0020: 8C 7D 54 F9 E6 B8 CF 6E 9C 9E B1 4A C8 1E ..T....n...J..

]
***
*** Diffie-Hellman ServerKeyExchange
DH Modulus: { 244, 136, 253, 88, 78, 73, 219, 205, 32, 180, 157, 228, 145, 7, 54, 107, 51, 108, 56, 13, 69, 29, 15, 124, 136, 179, 28, 124, 91, 45, 142, 246, 243, 201, 35, 192, 67, 240, 165, 91, 24, 141, 142, 187, 85, 140, 184, 93, 56, 211, 52, 253, 124, 23, 87, 67, 163, 29, 24, 108, 222, 51, 33, 44, 181, 42, 255, 60, 225, 177, 41, 64, 24, 17, 141, 124, 132, 167, 10, 114, 214, 134, 196, 3, 25, 200, 7, 41, 122, 202, 149, 12, 217, 150, 159, 171, 208, 10, 80, 155, 2, 70, 211, 8, 61, 102, 164, 93, 65, 159, 156, 124, 189, 137, 75, 34, 25, 38, 186, 171, 162, 94, 195, 85, 233, 47, 120, 199 }
DH Base: { 2 }
Server DH Public Key: { 234, 100, 116, 209, 132, 201, 1, 108, 90, 9, 71, 197, 146, 96, 184, 146, 124, 225, 190, 207, 80, 151, 205, 187, 125, 135, 30, 116, 184, 56, 234, 66, 188, 121, 117, 186, 2, 65, 158, 227, 225, 1, 174, 151, 40, 218, 142, 169, 214, 16, 226, 248, 61, 209, 185, 6, 62, 202, 11, 31, 174, 92, 182, 7, 251, 193, 123, 152, 144, 71, 80, 12, 79, 151, 55, 69, 21, 241, 136, 211, 135, 61, 5, 70, 126, 254, 60, 234, 119, 206, 53, 245, 171, 249, 168, 253, 53, 147, 192, 40, 56, 142, 116, 93, 252, 253, 185, 177, 158, 89, 202, 33, 201, 148, 56, 135, 227, 117, 87, 114, 91, 158, 40, 132, 175, 101, 225, 23 }
Signed with a DSA or RSA public key
*** CertificateRequest
Cert Types: RSA, DSS,
Cert Authorities:
<CN=Sukrit Khera, OU=Reliant, O=Reliant, L=Houston, ST=Texas, C=TX>
<CN=xidsslcert, OU=IT, O=Reliant Energy, L=Houston, ST=Texas, C=US>
<CN=xidsslcert, OU=IT, O=Reliant Energy, L=Houston, ST=Texas, C=US>
<CN=localhost>
*** ServerHelloDone
http-6443-Processor24, WRITE: TLSv1 Handshake, length = 1568
http-6443-Processor24, READ: TLSv1 Handshake, length = 792
*** Certificate chain
chain [0] = [
[
Version: V3
Subject: CN=xidsslcert, OU=IT, O=Reliant Energy, L=Houston, ST=Texas, C=US
Signature Algorithm: MD5withRSA, OID = 1.2.840.113549.1.1.4

Key: SunJSSE RSA public key:
public exponent:
010001
modulus:
8b5afe97 b25c92f2 c260fff0 99bea762 9ec73c55 8d41d8f9 4271f756 f31ae8d4
323818c6 a4d72319 a0c60bcc 384e8a70 67b59d5a 200ef31f 19686695 7de7c2c4
c694f995 549762b7 5cec7437 062e094c 0c224652 fea37a69 2417487c 03f92194
5ee6ffe1 5ba5cd9e f15a932b 3b7ed1b0 8cde0661 685d8b61 8c950f78 6e640803
Validity: [From: Wed Oct 03 11:07:00 CDT 2007,
To: Sat Oct 03 11:07:00 CDT 2009]
Issuer: CN=xidsslcert, OU=IT, O=Reliant Energy, L=Houston, ST=Texas, C=US
SerialNumber: [ 92f61660]

Certificate Extensions: 1
[1]: ObjectId: 2.5.29.14 Criticality=false
SubjectKeyIdentifier [
KeyIdentifier [
0000: D9 F1 54 4E 60 F0 21 A0 2C 81 C9 57 F9 EF 24 97 ..TN`.!.,..W..$.
0010: 84 4D A4 04 .M..
]
]

]
Algorithm: [MD5withRSA]
Signature:
0000: 5A B8 9A 3D 58 28 E4 CD CB C3 F7 66 C8 2A 49 79 Z..=X(.....f.*Iy
0010: 3B 61 8B 16 3A 2F EB 20 B0 1A E1 51 CB ED 6E 51 ;a..:/. ...Q..nQ
0020: 18 17 6D 62 8A 61 05 BC 76 1B D4 9D 7F ED EB 69 ..mb.a..v......i
0030: 6A AE 35 83 35 91 C0 B6 B4 4B BE 78 1E 0F F1 34 j.5.5....K.x...4
0040: 97 57 5F 7D 2D BC 4D DA 8E CD A7 D0 34 C0 C4 51 .W_.-.M.....4..Q
0050: D8 7B F6 0A 66 67 6A BC 55 67 9F E1 39 F0 AD A8 ....fgj.Ug..9...
0060: A2 01 FB 7A 58 CE 8F 86 CF 87 81 B8 15 49 E2 31 ...zX........I.1
0070: C4 0D 79 A1 E4 02 FF 69 C2 38 E7 AC F5 56 1D B6 ..y....i.8...V..

]
***
Found trusted certificate:
[
[
Version: V3
Subject: CN=xidsslcert, OU=IT, O=Reliant Energy, L=Houston, ST=Texas, C=US
Signature Algorithm: MD5withRSA, OID = 1.2.840.113549.1.1.4

Key: SunJSSE RSA public key:
public exponent:
010001
modulus:
8b5afe97 b25c92f2 c260fff0 99bea762 9ec73c55 8d41d8f9 4271f756 f31ae8d4
323818c6 a4d72319 a0c60bcc 384e8a70 67b59d5a 200ef31f 19686695 7de7c2c4
c694f995 549762b7 5cec7437 062e094c 0c224652 fea37a69 2417487c 03f92194
5ee6ffe1 5ba5cd9e f15a932b 3b7ed1b0 8cde0661 685d8b61 8c950f78 6e640803
Validity: [From: Wed Oct 03 11:07:00 CDT 2007,
To: Sat Oct 03 11:07:00 CDT 2009]
Issuer: CN=xidsslcert, OU=IT, O=Reliant Energy, L=Houston, ST=Texas, C=US
SerialNumber: [ 92f61660]

Certificate Extensions: 1
[1]: ObjectId: 2.5.29.14 Criticality=false
SubjectKeyIdentifier [
KeyIdentifier [
0000: D9 F1 54 4E 60 F0 21 A0 2C 81 C9 57 F9 EF 24 97 ..TN`.!.,..W..$.
0010: 84 4D A4 04 .M..
]
]

]
Algorithm: [MD5withRSA]
Signature:
0000: 5A B8 9A 3D 58 28 E4 CD CB C3 F7 66 C8 2A 49 79 Z..=X(.....f.*Iy
0010: 3B 61 8B 16 3A 2F EB 20 B0 1A E1 51 CB ED 6E 51 ;a..:/. ...Q..nQ
0020: 18 17 6D 62 8A 61 05 BC 76 1B D4 9D 7F ED EB 69 ..mb.a..v......i
0030: 6A AE 35 83 35 91 C0 B6 B4 4B BE 78 1E 0F F1 34 j.5.5....K.x...4
0040: 97 57 5F 7D 2D BC 4D DA 8E CD A7 D0 34 C0 C4 51 .W_.-.M.....4..Q
0050: D8 7B F6 0A 66 67 6A BC 55 67 9F E1 39 F0 AD A8 ....fgj.Ug..9...
0060: A2 01 FB 7A 58 CE 8F 86 CF 87 81 B8 15 49 E2 31 ...zX........I.1
0070: C4 0D 79 A1 E4 02 FF 69 C2 38 E7 AC F5 56 1D B6 ..y....i.8...V..

]
*** ClientDiffieHellmanPublic
DH Public key: { 105, 149, 232, 226, 94, 15, 21, 244, 199, 39, 200, 61, 215, 170, 178, 117, 11, 89, 246, 84, 184, 77, 133, 177, 165, 175, 167, 118, 207, 111, 201, 22, 92, 36, 230, 229, 13, 230, 105, 116, 25, 49, 223, 252, 222, 189, 126, 104, 202, 249, 142, 33, 244, 210, 138, 79, 114, 112, 31, 225, 200, 219, 160, 127, 216, 243, 235, 117, 243, 33, 67, 148, 147, 212, 238, 83, 50, 248, 237, 12, 110, 236, 40, 50, 20, 76, 250, 137, 26, 226, 19, 42, 46, 240, 197, 209, 78, 235, 132, 91, 148, 35, 82, 227, 118, 182, 250, 110, 239, 54, 146, 94, 208, 240, 186, 25, 56, 187, 192, 57, 186, 158, 8, 46, 113, 5, 71, 218 }
SESSION KEYGEN:
PreMaster Secret:
0000: 94 66 6F BE B6 90 E7 7D EC 27 92 11 0C A7 99 64 .fo......'.....d
0010: CE CC 12 5C 12 96 B7 8F 07 41 43 F0 78 75 83 E1 ...\.....AC.xu..
0020: 9E 7B A9 A8 1A 5D 34 34 23 24 E5 7A 4B 83 DE BF .....]44#$.zK...
0030: 28 66 0A 32 E2 EB FA 92 DF 49 A6 42 E2 C1 FD 18 (f.2.....I.B....
0040: 4C 26 EB 3B DB C3 6C B0 34 19 02 6C BB 5B F8 A2 L&.;..l.4..l.[..
0050: 8B E9 E6 D5 43 E6 4E 12 BC EB 05 D4 47 E9 24 0B ....C.N.....G.$.
0060: 28 49 84 C0 3E FD 9E 56 9F 2A 92 65 B7 9B 59 4A (I..>..V.*.e..YJ
0070: 37 EE 00 61 B9 73 49 B8 A8 4A 93 6F 76 3A E0 24 7..a.sI..J.ov:.$
CONNECTION KEYGEN:
Client Nonce:
0000: 47 03 D9 2B 32 DE D9 8B C5 9B 8E 7A AA 40 C5 0D G..+2......z.@..
0010: BB 4D EC 8E 27 42 AE 5B D4 9E 53 E1 71 27 53 01 .M..'B.[..S.q'S.
Server Nonce:
0000: 47 03 D8 31 F7 CB 7F 9D 52 79 C3 F1 28 F2 BD 69 G..1....Ry..(..i
0010: 99 82 47 61 34 7F DC DC 4F 46 1C AF 58 10 A2 5F ..Ga4...OF..X.._
Master Secret:
0000: BF C7 77 37 B7 B7 21 5B 8D 6F 52 39 8B 49 16 4E ..w7..![.oR9.I.N
0010: 09 6E 7B 8A 98 EC 5B 53 A9 09 33 8B F0 71 2A 96 .n....[S..3..q*.
0020: 73 6D 39 DD BF B4 71 BC 70 7E DF 07 01 B0 53 02 sm9...q.p.....S.
Client MAC write Secret:
0000: 93 F0 DB 50 22 A3 26 17 BA E1 DD 03 38 31 B0 C5 ...P".&.....81..
0010: 17 CF 81 CE ....
Server MAC write Secret:
0000: 8B 2B C0 24 2F 7B EE 27 38 DD 38 F8 A0 E7 60 9A .+.$/..'8.8...`.
0010: A7 32 5B D4 .2[.
Client write key:
0000: 93 6A 62 AC A0 6A F2 2B A6 98 D5 F1 E3 4E C1 AF .jb..j.+.....N..
0010: BF F0 8F BD 7A 63 65 FF ....zce.
Server write key:
0000: 3F D7 90 CA CF E5 19 FD AC F2 B2 B4 31 7F 54 3B ?...........1.T;
0010: 11 E3 24 51 0D 0F BF F7 ..$Q....
Client write IV:
0000: 98 EA 72 A4 07 2C 58 5F ..r..,X_
Server write IV:
0000: AD 85 14 0C 50 BA D1 52 ....P..R
http-6443-Processor24, READ: TLSv1 Handshake, length = 160
*** CertificateVerify
JsseJCE: Using JSSE internal implementation for cipher RSA/ECB/PKCS1Padding
http-6443-Processor24, READ: TLSv1 Change Cipher Spec, length = 24
JsseJCE: Using JSSE internal implementation for cipher DESede/CBC/NoPadding
http-6443-Processor24, READ: TLSv1 Handshake, length = 40
*** Finished
verify_data: { 101, 170, 20, 59, 12, 25, 179, 131, 10, 46, 184, 145 }
***
http-6443-Processor24, WRITE: TLSv1 Change Cipher Spec, length = 24
JsseJCE: Using JSSE internal implementation for cipher DESede/CBC/NoPadding
*** Finished
verify_data: { 197, 255, 11, 236, 139, 118, 31, 171, 167, 86, 37, 103 }
***
http-6443-Processor24, WRITE: TLSv1 Handshake, length = 40
%% Cached server session: [Session-41, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA]
http-6443-Processor24, handling exception: java.net.SocketTimeoutException: Read timed out
setSoTimeout(60000) called
http-6443-Processor24, WRITE: TLSv1 Application Data, length = 1336
http-6443-Processor24, called close()
http-6443-Processor24, called closeInternal(true)
http-6443-Processor24, SEND TLSv1 ALERT: warning, description = close_notify
http-6443-Processor24, WRITE: TLSv1 Alert, length = 24

Any idea ?
Again Thanks for the reply.
16 years ago
name changed..........
now can i expect a reply/solution ?
16 years ago
I have a webservice which is hosted on sap xi server. My class in tomcat will call it over https protocol. For that, tomcat needs to import the xi certificate. I did it in cacerts which resides in jre's lib/security directory. Still, it doesn't work. But the strange thing is, if i write the stand alone class, and use the same cacerts file, it works.

// For standalone class
System.setProperty("javax.net.ssl.trustStore", "C:\\certs\\cacerts");

//For class which is in tomcat
System.setProperty("javax.net.ssl.trustStore", <cacerts file path> ;
System.setProperty("javax.net.ssl.trustStorePassword", "changeit");

I am getting the following exception :

javax.net.ssl.SSLHandshakeException: sun.security.validator.ValidatorException: No trusted certificate found
org.apache.axis.AxisFault.makeFault(AxisFault.java:101)
org.apache.axis.transport.http.HTTPSender.invoke(HTTPSender.java:154)
org.apache.axis.strategies.InvocationStrategy.visit(InvocationStrategy.java:32)
org.apache.axis.SimpleChain.doVisiting(SimpleChain.java:118)
org.apache.axis.SimpleChain.invoke(SimpleChain.java:83)
org.apache.axis.client.AxisClient.invoke(AxisClient.java:165)
org.apache.axis.client.Call.invokeEngine(Call.java:2784)
org.apache.axis.client.Call.invoke(Call.java:2767)
org.apache.axis.client.Call.invoke(Call.java:2443)
org.apache.axis.client.Call.invoke(Call.java:2366)
org.apache.axis.client.Call.invoke(Call.java:1812)
com.reliant.ws.xi.client.Os_getDocumentRequestBindingStub.os_getDocumentRequest(Os_getDocumentRequestBindingStub.java:164)
com.reliant.ws.xi.client.BillFetchClient.fetchContent(BillFetchClient.java:83)
org.apache.jsp.en_005fUS.EBillViewer.EBillWSCall_jsp._jspService(EBillWSCall_jsp.java:56)
org.apache.jasper.runtime.HttpJspBase.service(HttpJspBase.java:94)
javax.servlet.http.HttpServlet.service(HttpServlet.java:802)
org.apache.jasper.servlet.JspServletWrapper.service(JspServletWrapper.java:324)
org.apache.jasper.servlet.JspServlet.serviceJspFile(JspServlet.java:292)
org.apache.jasper.servlet.JspServlet.service(JspServlet.java:236)
javax.servlet.http.HttpServlet.service(HttpServlet.java:802)
16 years ago