|
RSS Feed - WebSphere MQ Support
|
RSS Feed - Message Broker Support
|
SSL problems between MQ AIX Server and Windows java Client |
« View previous topic :: View next topic » |
Author |
Message
|
wuyd |
Posted: Mon Apr 11, 2005 11:13 pm Post subject: SSL problems between MQ AIX Server and Windows java Client |
|
|
Novice
Joined: 11 Apr 2005 Posts: 14
|
hi,
I want to config my aix mq server to use ssl with java client. After I create SelfSigned Cert on aix, I export to my client machine and import it to java client's cacerts. when I run the client java app, it returns error "2009", and error message on server's log are:
04/12/05 15:59:39
AMQ9637: Channel is lacking a certificate.
EXPLANATION:
The channel is lacking a certificate to use for the SSL handshake. The channel
name is 'SSLTEST' (if '????' it is unknown at this stage in the SSL
processing). The channel did not start.
ACTION:
Make sure the appropriate certificates are correctly configured in the key
repositories for both ends of the channel.
Can anybody help me? Thanks |
|
Back to top |
|
 |
wuyd |
Posted: Mon Apr 11, 2005 11:37 pm Post subject: |
|
|
Novice
Joined: 11 Apr 2005 Posts: 14
|
And follow are my client error message:
02:57:58 [1113289078144] Thread: main, Object: com.ibm.mq.MQQueueManager@1f2eedd4 ==> MQManagedObject constructor() entry
02:57:58 [1113289078144] Thread: main, Object: com.ibm.mq.MQQueueManager@1f2eedd4 @(#) common/javabase/com/ibm/mq/MQManagedObject.java, java, j530, j530-L020820 02/08/20 12:25:48
02:57:58 [1113289078144] Thread: main, Object: com.ibm.mq.MQQueueManager@1f2eedd4 <== MQManagedObject constructor() exit
02:57:58 [1113289078144] Thread: main, Object: com.ibm.mq.MQQueueManager@1f2eedd4 ==> MQQueueManager constructor() entry
02:57:58 [1113289078144] Thread: main, Object: com.ibm.mq.MQQueueManager@1f2eedd4 common/javabase/com/ibm/mq/MQQueueManager.java, java, j530, j530-L021003 02/10/01 15:03:42 @(#) 1.56.2.2
02:57:58 [1113289078154] Thread: main Class: *** BuildInfo *** WebSphere MQ classes for Java (5.300)
02:57:58 [1113289078154] Thread: main Class: *** BuildInfo *** j530-L021008 (Production)
02:57:58 [1113289078154] Thread: main, Object: com.ibm.mq.MQQueueManager@1f2eedd4 ==> construct() entry
02:57:58 [1113289078154] Thread: main ==> MQQueueManager::obtainBaseMQQueueManager (Java 1.1 version() entry
02:57:58 [1113289078154] Thread: main ==> MQEnvironment::getDefaultProperty - transport() entry
02:57:58 [1113289078154] Thread: main <== MQEnvironment::getDefaultProperty - transport() exit
02:57:58 [1113289078154] Thread: main, Object: com.ibm.mq.MQClientManagedConnectionFactoryJ11@4153add6 ==> MQClientManagedConnectionFactoryJ11 constructor() entry
02:57:58 [1113289078154] Thread: main ==> MQEnvironment::getDefaultProperty - hostname() entry
02:57:58 [1113289078154] Thread: main <== MQEnvironment::getDefaultProperty - hostname() exit
02:57:58 [1113289078154] Thread: main ==> MQEnvironment::getDefaultProperty - port() entry
02:57:58 [1113289078154] Thread: main <== MQEnvironment::getDefaultProperty - port() exit
02:57:58 [1113289078154] Thread: main ==> MQEnvironment::getDefaultProperty - channel() entry
02:57:58 [1113289078154] Thread: main <== MQEnvironment::getDefaultProperty - channel() exit
02:57:58 [1113289078154] Thread: main ==> MQEnvironment::getDefaultProperty - CCSID() entry
02:57:58 [1113289078154] Thread: main <== MQEnvironment::getDefaultProperty - CCSID() exit
02:57:58 [1113289078154] Thread: main, Object: com.ibm.mq.MQClientManagedConnectionFactoryJ11@4153add6 <== MQClientManagedConnectionFactoryJ11 constructor() exit
02:57:58 [1113289078154] Thread: main ==> Uninitialized object::ClientConnectionRequestInfo constructor() entry
02:57:58 [1113289078154] Thread: main ==> MQEnvironment::getDefaultProperty - connectOptions() entry
02:57:58 [1113289078154] Thread: main <== MQEnvironment::getDefaultProperty - connectOptions() exit
02:57:58 [1113289078164] Thread: main ==> MQEnvironment::getDefaultProperty - securityExit() entry
02:57:58 [1113289078164] Thread: main <== MQEnvironment::getDefaultProperty - securityExit() exit
02:57:58 [1113289078164] Thread: main ==> MQEnvironment::getDefaultProperty - receiveExit() entry
02:57:58 [1113289078164] Thread: main <== MQEnvironment::getDefaultProperty - receiveExit() exit
02:57:58 [1113289078164] Thread: main ==> MQEnvironment::getDefaultProperty - sendExit() entry
02:57:58 [1113289078164] Thread: main <== MQEnvironment::getDefaultProperty - sendExit() exit
02:57:58 [1113289078164] Thread: main ==> MQEnvironment::getDefaultProperty - userID() entry
02:57:58 [1113289078164] Thread: main <== MQEnvironment::getDefaultProperty - userID() exit
02:57:58 [1113289078164] Thread: main ==> MQEnvironment::getDefaultProperty - password() entry
02:57:58 [1113289078164] Thread: main <== MQEnvironment::getDefaultProperty - password() exit
02:57:58 [1113289078164] Thread: main ==> MQEnvironment::getDefaultProperty - SPI() entry
02:57:58 [1113289078164] Thread: main <== MQEnvironment::getDefaultProperty - SPI() exit
02:57:58 [1113289078164] Thread: main ==> MQEnvironment::getDefaultProperty - SSL Cipher Suite() entry
02:57:58 [1113289078164] Thread: main <== MQEnvironment::getDefaultProperty - SSL Cipher Suite() exit
02:57:58 [1113289078164] Thread: main ==> MQEnvironment::getDefaultProperty - SSL Peer Name() entry
02:57:58 [1113289078164] Thread: main <== MQEnvironment::getDefaultProperty - SSL Peer Name() exit
02:57:58 [1113289078164] Thread: main ==> MQEnvironment::getDefaultProperty - SSL CertStores() entry
02:57:58 [1113289078164] Thread: main <== MQEnvironment::getDefaultProperty - SSL CertStores() exit
02:57:58 [1113289078164] Thread: main ==> MQEnvironment::getDefaultProperty - SSL Socket Factory() entry
02:57:58 [1113289078164] Thread: main <== MQEnvironment::getDefaultProperty - SSL Socket Factory() exit
02:57:58 [1113289078164] Thread: main, Object: com.ibm.mq.ClientConnectionRequestInfo@bafc7a2a <== ClientConnectionRequestInfo constructor() exit
02:57:58 [1113289078164] Thread: main, Object: com.ibm.mq.MQSimpleConnectionManager@31402dd4 ==> allocateConnection() entry
02:57:58 [1113289078164] Thread: main, Object: com.ibm.mq.ManagedConnectionStore@276dadd4 ==> chooseOne() entry
02:57:58 [1113289078164] Thread: main, Object: com.ibm.mq.ManagedConnectionStore@276dadd4 <== chooseOne() exit
02:57:58 [1113289078174] Thread: main, Object: com.ibm.mq.StoredManagedConnection@64f7add4 ==> StoredManagedConnection constructor() entry
02:57:58 [1113289078174] Thread: main, Object: com.ibm.mq.MQClientManagedConnectionFactoryJ11@4153add6 ==> _createManagedConnection() entry
02:57:58 [1113289078174] Thread: main, Object: com.ibm.mq.MQManagedConnectionJ11@61162dd4 ==> MQManagedConnection constructor() entry
02:57:58 [1113289078184] Thread: main, Object: com.ibm.mq.MQSESSIONClient@6bb5edd4 ==> setThreadAccess() entry
02:57:58 [1113289078184] Thread: main, Object: com.ibm.mq.MQSESSIONClient@6bb5edd4 Default multi-thread access will be used.
02:57:58 [1113289078194] Thread: main, Object: com.ibm.mq.MQSESSIONClient@6bb5edd4 <== setThreadAccess() exit
02:57:58 [1113289078194] Thread: main ==> MQSESSIONClient::MQCONN() entry
02:57:58 [1113289078194] Thread: main Class: MQSESSIONClient common/javabase/com/ibm/mq/MQSESSIONClient.java, java, j530, j530-L021003 02/10/01 16:52:34 @(#) 1.46.1.4
02:57:58 [1113289078194] Thread: main Class: MQSESSIONClient Queue Manager = 'AAA.BBB.MQM'
02:57:58 [1113289078194] Thread: main ==> MQSESSION::setStringToLength() entry
02:57:58 [1113289078194] Thread: main <== MQSESSION::setStringToLength() exit
02:57:58 [1113289078204] Thread: main, Object: com.ibm.mq.MQInternalCommunications@10e06dd4 ==> Constructor() entry
02:57:58 [1113289078204] Thread: main, Object: com.ibm.mq.MQInternalCommunications@10e06dd4 common/javabase/com/ibm/mq/MQInternalCommunications.java, java, j530, j530-L021003 02/09/30 17:08:19 @(#) 1.56.2.3
02:57:58 [1113289078204] Thread: main ==> MQSESSION::setStringToLength() entry
02:57:58 [1113289078204] Thread: main <== MQSESSION::setStringToLength() exit
02:57:58 [1113289078204] Thread: main ==> MQSESSION::setStringToLength() entry
02:57:58 [1113289078204] Thread: main <== MQSESSION::setStringToLength() exit
02:57:58 [1113289078204] Thread: main ==> MQSESSION::setStringToLength() entry
02:57:58 [1113289078204] Thread: main <== MQSESSION::setStringToLength() exit
02:57:58 [1113289078204] Thread: main ==> MQSESSION::setStringToLength() entry
02:57:58 [1113289078204] Thread: main <== MQSESSION::setStringToLength() exit
02:57:58 [1113289078204] Thread: main, Object: com.ibm.mq.MQInternalCommunications@10e06dd4 userID = 'aaaaa '
02:57:58 [1113289078204] Thread: main, Object: com.ibm.mq.MQInternalCommunications@10e06dd4 longUserID = 'aaaaa '
02:57:58 [1113289078204] Thread: main, Object: com.ibm.mq.MQInternalCommunications@10e06dd4 Queue Manager = 'AAA.BBB.MQM '
02:57:58 [1113289078204] Thread: main, Object: com.ibm.mq.MQInternalCommunications@10e06dd4 Connection handle = 5
02:57:58 [1113289078204] Thread: main, Object: com.ibm.mq.MQInternalCommunications@10e06dd4 CCSID = 819
02:57:58 [1113289078204] Thread: main, Object: com.ibm.mq.MQInternalCommunications@10e06dd4 ==> createSocketConnection() entry
02:57:58 [1113289078204] Thread: main, Object: com.ibm.mq.MQInternalCommunications@10e06dd4 Connecting to 172.172.172.10 on port 1414
02:57:58 [1113289078405] Thread: main ==> SSLHelper::createSSLSocket() entry
02:57:58 [1113289078405] Thread: main Class: SSLHelper peername = 'CN=BBB, O=AAA, C=CN'
02:57:58 [1113289078405] Thread: main Class: SSLHelper certStores = null
02:57:58 [1113289078405] Thread: main Class: SSLHelper sslSocketFactory = null
02:57:58 [1113289078405] Thread: main Class: SSLHelper using default SSLSocketFactory
02:58:03:[1113289083572] Thread: main Class: SSLHelper creating SSL socket
02:58:03:[1113289083632] Thread: main Class: SSLHelper setting enabled cipher suites to 'SSL_RSA_EXPORT_WITH_RC4_40_MD5'
02:58:03:[1113289083632] Thread: main Class: SSLHelper calling startHandshake
02:58:03:[1113289083812] Thread: Thread-0, Object: com.ibm.mq.SSLHelper@36342dd4 ==> handshakeCompleted() entry
02:58:03:[1113289083812] Thread: Thread-0, Object: com.ibm.mq.SSLHelper@36342dd4 event: javax.net.ssl.HandshakeCompletedEvent[source=209b2dd7[SSL_RSA_EXPORT_WITH_RC4_40_MD5: Socket[addr=admin.BBB.bjmcc.net/172.172.172.10,port=1414,localport=4675]]]
02:58:03:[1113289083812] Thread: main Class: SSLHelper checking peername
02:58:03:[1113289083812] Thread: main, Object: com.ibm.mq.PeerName@2b59add7 ==> parseDN(CN=BBB, O=AAA, C=CN)() entry
02:58:03:[1113289083812] Thread: main, Object: com.ibm.mq.PeerName@2b59add7 PeerName setting CN term to BBB
02:58:03:[1113289083812] Thread: main, Object: com.ibm.mq.PeerName@2b59add7 PeerName setting O term to AAA
02:58:03:[1113289083812] Thread: main, Object: com.ibm.mq.PeerName@2b59add7 PeerName setting C term to CN
02:58:03:[1113289083812] Thread: main, Object: com.ibm.mq.PeerName@2b59add7 <== parseDN() exit
02:58:03:[1113289083812] Thread: main, Object: com.ibm.mq.PeerName@16acadd4 ==> parseDN(CN=BBB, O=AAA, C=CN)() entry
02:58:03:[1113289083812] Thread: main, Object: com.ibm.mq.PeerName@16acadd4 PeerName setting CN term to BBB
02:58:03:[1113289083812] Thread: main, Object: com.ibm.mq.PeerName@16acadd4 PeerName setting O term to AAA
02:58:03:[1113289083812] Thread: main, Object: com.ibm.mq.PeerName@16acadd4 PeerName setting C term to CN
02:58:03:[1113289083812] Thread: main, Object: com.ibm.mq.PeerName@16acadd4 <== parseDN() exit
02:58:03:[1113289083812] Thread: main, Object: com.ibm.mq.PeerName@2b59add7 ==> isMatchingPeerName() entry
02:58:03:[1113289083812] Thread: main, Object: com.ibm.mq.PeerName@2b59add7 Comparing "CN=BBB, O=AAA, C=CN" with "CN=BBB, O=AAA, C=CN"
02:58:03:[1113289083812] Thread: main, Object: com.ibm.mq.PeerName@2b59add7 wequals("BBB","BBB"
02:58:03:[1113289083812] Thread: main, Object: com.ibm.mq.PeerName@2b59add7 Comparing BBB
02:58:03:[1113289083812] Thread: main, Object: com.ibm.mq.PeerName@2b59add7 with BBB
02:58:03:[1113289083812] Thread: main, Object: com.ibm.mq.PeerName@2b59add7 wequals("AAA","AAA"
02:58:03:[1113289083812] Thread: main, Object: com.ibm.mq.PeerName@2b59add7 Comparing AAA
02:58:03:[1113289083812] Thread: main, Object: com.ibm.mq.PeerName@2b59add7 with AAA
02:58:03:[1113289083822] Thread: main, Object: com.ibm.mq.PeerName@2b59add7 wequals("CN","CN"
02:58:03:[1113289083822] Thread: main, Object: com.ibm.mq.PeerName@2b59add7 Comparing CN
02:58:03:[1113289083822] Thread: main, Object: com.ibm.mq.PeerName@2b59add7 with CN
02:58:03:[1113289083822] Thread: main, Object: com.ibm.mq.PeerName@2b59add7 <== isMatchingPeerName() exit
02:58:03:[1113289083822] Thread: main Class: SSLHelper peerName matches
02:58:03:[1113289083822] Thread: main, Object: com.ibm.mq.MQInternalCommunications@10e06dd4 <== createSocketConnection() exit
02:58:03:[1113289083822] Thread: main, Object: com.ibm.mq.MQInternalCommunications@10e06dd4 ==> establishChannel() entry
02:58:03:[1113289083822] Thread: main, Object: com.ibm.mq.MQInternalCommunications@10e06dd4 ==> buildInitialData() entry
02:58:03:[1113289083822] Thread: main, Object: com.ibm.mq.MQInternalCommunications@10e06dd4 FAP level 255
02:58:03:[1113289083822] Thread: main, Object: com.ibm.mq.MQInternalCommunications@10e06dd4 Sending IDFlags2 with distLists flag set...
02:58:03:[1113289083822] Thread: main ==> MQSESSION::setStringToLength() entry
02:58:03:[1113289083822] Thread: main <== MQSESSION::setStringToLength() exit
02:58:03:[1113289083822] Thread: main, Object: com.ibm.mq.MQInternalCommunications@10e06dd4 <== buildInitialData() exit
02:58:03:[1113289083822] Thread: main, Object: com.ibm.mq.MQInternalCommunications@10e06dd4 sending TST_INITIAL_DATA
02:58:03:[1113289083822] Thread: main, Object: com.ibm.mq.MQInternalCommunications@10e06dd4 ==> send() entry
02:58:03:[1113289083822] Thread: main, Object: com.ibm.mq.MQInternalCommunications@10e06dd4 TSH type = 1
02:58:03:[1113289083822] Thread: main, Object: com.ibm.mq.MQInternalCommunications@10e06dd4 Control flags = 1
02:58:03:[1113289083822] Thread: main, Object: com.ibm.mq.MQInternalCommunications@10e06dd4 Message data follows:
02:58:03:[1113289083822] Thread: main, Object: com.ibm.mq.MQInternalCommunications@10e06dd4 Data trace, 102 bytes of data follow:
0000: 4944 2020 ff25 0000 0000 0032 0000 7ffe ID .%.....2....
0010: 0640 0000 3b9a c9ff 5353 4c54 4553 5420 .@..;...SSLTEST
0020: 2020 2020 2020 2020 2020 2020 0100 0333 ...3
0030: 2020 2020 2020 2020 2020 2020 2020 2020
0040: 2020 2020 2020 2020 2020 2020 2020 2020
0050: 2020 2020 2020 2020 2020 2020 2020 2020
0060: 0000 0001 0000 ......
02:58:03:[1113289083822] Thread: main, Object: com.ibm.mq.MQInternalCommunications@10e06dd4 Sending data, 102 bytes of msg data remain
02:58:03:[1113289083822] Thread: main, Object: com.ibm.mq.MQInternalCommunications@10e06dd4 Last segment of message
02:58:03:[1113289083822] Thread: main, Object: com.ibm.mq.MQInternalCommunications@10e06dd4 ==> writeTSH() entry
02:58:03:[1113289083822] Thread: main, Object: com.ibm.mq.MQInternalCommunications@10e06dd4 <== writeTSH() exit
02:58:03:[1113289083822] Thread: main, Object: com.ibm.mq.MQInternalCommunications@10e06dd4 ==> invokeSendExit() entry
02:58:03:[1113289083822] Thread: main, Object: com.ibm.mq.MQInternalCommunications@10e06dd4 Data passed to exit follows:
02:58:03:[1113289083822] Thread: main, Object: com.ibm.mq.MQInternalCommunications@10e06dd4 Data trace, 130 bytes of data follow:
0000: 5453 4820 0000 0082 0101 3100 0000 0000 TSH ......1.....
0010: 0000 0000 0000 0111 0333 0000 4944 2020 .........3..ID
0020: ff25 0000 0000 0032 0000 7ffe 0640 0000 .%.....2.....@..
0030: 3b9a c9ff 5353 4c54 4553 5420 2020 2020 ;...SSLTEST
0040: 2020 2020 2020 2020 0100 0333 2020 2020 ...3
0050: 2020 2020 2020 2020 2020 2020 2020 2020
0060: 2020 2020 2020 2020 2020 2020 2020 2020
0070: 2020 2020 2020 2020 2020 2020 0000 0001 ....
0080: 0000 ..
02:58:03:[1113289083822] Thread: main, Object: com.ibm.mq.MQInternalCommunications@10e06dd4 No user send exit was invoked
02:58:03:[1113289083822] Thread: main, Object: com.ibm.mq.MQInternalCommunications@10e06dd4 <== invokeSendExit() exit
02:58:03:[1113289083822] Thread: main, Object: com.ibm.mq.MQInternalCommunications@10e06dd4 <== send() exit
02:58:03:[1113289083822] Thread: main, Object: com.ibm.mq.MQInternalCommunications@10e06dd4 receiving server reply
02:58:03:[1113289083822] Thread: main, Object: com.ibm.mq.MQInternalCommunications@10e06dd4 ==> receive() entry
02:58:03:[1113289083822] Thread: main, Object: com.ibm.mq.MQInternalCommunications@10e06dd4 ==> receiveBytes() entry
02:58:03:[1113289083822] Thread: main, Object: com.ibm.mq.MQInternalCommunications@10e06dd4 Waiting for data on input stream.
02:58:03:[1113289083822] Thread: Thread-0 Class: SSLHelper Remote peer name = CN=BBB, O=AAA, C=CN
02:58:03:[1113289083822] Thread: Thread-0 Class: SSLHelper Remote issuer = CN=BBB, O=AAA, C=CN
02:58:03:[1113289083822] Thread: Thread-0, Object: com.ibm.mq.SSLHelper@36342dd4 <== handshakeCompleted() exit
02:58:03:[1113289083832] Thread: main, Object: com.ibm.mq.MQInternalCommunications@10e06dd4 Receiving 36 bytes of data.
02:58:03:[1113289083832] Thread: main, Object: com.ibm.mq.MQInternalCommunications@10e06dd4 ==> invokeReceiveExit() entry
02:58:03:[1113289083832] Thread: main, Object: com.ibm.mq.MQInternalCommunications@10e06dd4 Data passed to receive exit follows:
02:58:03:[1113289083832] Thread: main, Object: com.ibm.mq.MQInternalCommunications@10e06dd4 Data trace, 36 bytes of data follow:
0000: 5453 4820 0000 0024 0105 0a00 0000 0000 TSH ...$........
0010: 0000 0000 0000 0111 0333 0000 0000 0008 .........3......
0020: 0000 001a ....
02:58:03:[1113289083832] Thread: main, Object: com.ibm.mq.MQInternalCommunications@10e06dd4 No user receive exit was invoked
02:58:03:[1113289083832] Thread: main, Object: com.ibm.mq.MQInternalCommunications@10e06dd4 <== invokeReceiveExit() exit
02:58:03:[1113289083832] Thread: main, Object: com.ibm.mq.MQInternalCommunications@10e06dd4 ==> readTSH() entry
02:58:03:[1113289083832] Thread: main, Object: com.ibm.mq.MQInternalCommunications@10e06dd4 Segment type = 5
02:58:03:[1113289083832] Thread: main, Object: com.ibm.mq.MQInternalCommunications@10e06dd4 Control flags = 10
02:58:03:[1113289083832] Thread: main, Object: com.ibm.mq.MQInternalCommunications@10e06dd4 Encoding = 0
02:58:03:[1113289083832] Thread: main, Object: com.ibm.mq.MQInternalCommunications@10e06dd4 <== readTSH() exit
02:58:03:[1113289083832] Thread: main, Object: com.ibm.mq.MQInternalCommunications@10e06dd4 Data received.
02:58:03:[1113289083832] Thread: main, Object: com.ibm.mq.MQInternalCommunications@10e06dd4 Received message data follows:
02:58:03:[1113289083842] Thread: main, Object: com.ibm.mq.MQInternalCommunications@10e06dd4 Data trace, 8 bytes of data follow:
0000: 0000 0008 0000 001a ........
02:58:03:[1113289083842] Thread: main, Object: com.ibm.mq.MQInternalCommunications@10e06dd4 <== receiveBytes() exit
02:58:03:[1113289083842] Thread: main, Object: com.ibm.mq.MQInternalCommunications@10e06dd4 <== receive() exit
02:58:03:[1113289083842] Thread: main, Object: com.ibm.mq.MQInternalCommunications@10e06dd4 server sent TCF_CLOSE_CHANNEL on initial connect:err code = 26
02:58:03:[1113289083842] Thread: main, Object: com.ibm.mq.MQInternalCommunications@10e06dd4 ==> close() entry
02:58:03:[1113289083842] Thread: main, Object: com.ibm.mq.MQInternalCommunications@10e06dd4 ==> sendStatus() entry
02:58:03:[1113289083842] Thread: main, Object: com.ibm.mq.MQInternalCommunications@10e06dd4 status = 8
02:58:03:[1113289083842] Thread: main, Object: com.ibm.mq.MQInternalCommunications@10e06dd4 errCode = 0
02:58:03:[1113289083842] Thread: main, Object: com.ibm.mq.MQInternalCommunications@10e06dd4 ==> send() entry
02:58:03:[1113289083842] Thread: main, Object: com.ibm.mq.MQInternalCommunications@10e06dd4 TSH type = 5
02:58:03:[1113289083842] Thread: main, Object: com.ibm.mq.MQInternalCommunications@10e06dd4 Control flags = 8
02:58:03:[1113289083842] Thread: main, Object: com.ibm.mq.MQInternalCommunications@10e06dd4 Sending data, 0 bytes of msg data remain
02:58:03:[1113289083842] Thread: main, Object: com.ibm.mq.MQInternalCommunications@10e06dd4 Last segment of message
02:58:03:[1113289083842] Thread: main, Object: com.ibm.mq.MQInternalCommunications@10e06dd4 ==> writeTSH() entry
02:58:03:[1113289083842] Thread: main, Object: com.ibm.mq.MQInternalCommunications@10e06dd4 <== writeTSH() exit
02:58:03:[1113289083842] Thread: main, Object: com.ibm.mq.MQInternalCommunications@10e06dd4 ==> invokeSendExit() entry
02:58:03:[1113289083842] Thread: main, Object: com.ibm.mq.MQInternalCommunications@10e06dd4 Data passed to exit follows:
02:58:03:[1113289083842] Thread: main, Object: com.ibm.mq.MQInternalCommunications@10e06dd4 Data trace, 28 bytes of data follow:
0000: 5453 4820 0000 001c 0105 3800 0000 0000 TSH ......8.....
0010: 0000 0000 0000 0111 0333 0000 .........3..
02:58:03:[1113289083842] Thread: main, Object: com.ibm.mq.MQInternalCommunications@10e06dd4 No user send exit was invoked
02:58:03:[1113289083842] Thread: main, Object: com.ibm.mq.MQInternalCommunications@10e06dd4 <== invokeSendExit() exit
02:58:03:[1113289083842] Thread: main, Object: com.ibm.mq.MQInternalCommunications@10e06dd4 <== send() exit
02:58:03:[1113289083842] Thread: main, Object: com.ibm.mq.MQInternalCommunications@10e06dd4 <== sendStatus() exit
02:58:03:[1113289083842] Thread: main, Object: com.ibm.mq.MQInternalCommunications@10e06dd4 <== close() exit
02:58:03:[1113289083842] Thread: main, Object: com.ibm.mq.MQInternalCommunications@10e06dd4 <== establishChannel (via exception)() exit
02:58:03:[1113289083943] Thread: main, Object: com.ibm.mqservices.MQInternalException: MQJE001: MQException:Code 2,Reason 2009
MQJE016:MQ queue manager closed channel immediately during connect,
Closure Reason = 2009 ==> MQException constructor(cc, rc, source, msgid, insrt)() entry
02:58:03:[1113289083943] Thread: main, Object: com.ibm.mqservices.MQInternalException: MQJE001: MQException:Code 2,Reason 2009
MQJE016:MQ queue manager closed channel immediately during connect,
Closure Reason = 2009 common/javabase/com/ibm/mq/MQException.java, java, j530, j530-L020820 02/08/09 13:29:42 @(#) 1.39
02:58:03:[1113289083943] Thread: main, Object: com.ibm.mqservices.MQInternalException: MQJE001: MQException:Code 2,Reason 2009
MQJE016:MQ queue manager closed channel immediately during connect,
Closure Reason = 2009 cc = 2
02:58:03:[1113289083943] Thread: main, Object: com.ibm.mqservices.MQInternalException: MQJE001: MQException:Code 2,Reason 2009
MQJE016:MQ queue manager closed channel immediately during connect,
Closure Reason = 2009 rc = 2009
02:58:03:[1113289083943] Thread: main, Object: com.ibm.mqservices.MQInternalException: MQJE001: MQException:Code 2,Reason 2009
MQJE016:MQ queue manager closed channel immediately during connect,
Closure Reason = 2009 source = null
02:58:03:[1113289083943] Thread: main, Object: com.ibm.mqservices.MQInternalException: MQJE001: MQException:Code 2,Reason 2009
MQJE016:MQ queue manager closed channel immediately during connect,
Closure Reason = 2009 msgId = 57
02:58:03:[1113289083943] Thread: main, Object: com.ibm.mqservices.MQInternalException: MQJE001: MQException:Code 2,Reason 2009
MQJE016:MQ queue manager closed channel immediately during connect,
Closure Reason = 2009 insrt = '2009'
MQJE001: MQException:Code 2,Reason 2009
MQJE016:MQ queue manager closed channel immediately during connect,
Closure Reason = 2009
02:58:03:[1113289083943] Thread: main, Object: com.ibm.mqservices.MQInternalException: MQJE001: MQException:Code 2,Reason 2009
MQJE016:MQ queue manager closed channel immediately during connect,
Closure Reason = 2009 Explanation is 'MQJE001: MQException:Code 2,Reason 2009
MQJE016:MQ queue manager closed channel immediately during connect,
Closure Reason = 2009'
02:58:03:[1113289083943] Thread: main, Object: com.ibm.mqservices.MQInternalException: MQJE001: MQException:Code 2,Reason 2009
MQJE016:MQ queue manager closed channel immediately during connect,
Closure Reason = 2009 <== MQException constructor() exit
02:58:03:[1113289083943] Thread: main, Object: com.ibm.mqservices.MQInternalException: MQJE001: MQException:Code 2,Reason 2009
MQJE016:MQ queue manager closed channel immediately during connect,
Closure Reason = 2009 ==> MQInternalException constructor (cc, rc, msgId, insrt)() entry
02:58:03:[1113289083943] Thread: main, Object: com.ibm.mqservices.MQInternalException: MQJE001: MQException:Code 2,Reason 2009
MQJE016:MQ queue manager closed channel immediately during connect,
Closure Reason = 2009 @(#) common/javabase/com/ibm/mqservices/MQInternalException.java, java, j530, j530-L020820 02/08/20 12:32:40
02:58:03:[1113289083943] Thread: main, Object: com.ibm.mqservices.MQInternalException: MQJE001: MQException:Code 2,Reason 2009
MQJE016:MQ queue manager closed channel immediately during connect,
Closure Reason = 2009 <== MQException private constructor() exit
02:58:03:[1113289083943] Thread: main Class: MQSESSIONClient MQException occurred whilst connecting
02:58:03:[1113289083943] Thread: main <== MQSESSIONClient::MQCONN() exit
02:58:03:[1113289083943] Thread: main, Object: com.ibm.mq.MQManagedConnectionJ11@61162dd4 <== MQManagedConnection constructor (via exception)() exit
02:58:03:[1113289083943] Thread: main, Object: com.ibm.mq.MQException: MQJE001:Code 2,Reason 2009 ==> MQException constructor(cc, rc, source)() entry
02:58:03:[1113289083943] Thread: main, Object: com.ibm.mq.MQException: MQJE001:Code 2,Reason 2009 common/javabase/com/ibm/mq/MQException.java, java, j530, j530-L020820 02/08/09 13:29:42 @(#) 1.39
02:58:03:[1113289083943] Thread: main, Object: com.ibm.mq.MQException: MQJE001:Code 2,Reason 2009 cc = 2
02:58:03:[1113289083943] Thread: main, Object: com.ibm.mq.MQException: MQJE001:Code 2,Reason 2009 rc = 2009
02:58:03:[1113289083943] Thread: main, Object: com.ibm.mq.MQException: MQJE001:Code 2,Reason 2009 source = com.ibm.mq.MQManagedConnectionJ11@61162dd4
MQJE001:Code 2,Reason 2009
02:58:03:[1113289083943] Thread: main, Object: com.ibm.mq.MQException: MQJE001:Code 2,Reason 2009 <== MQException constructor() exit
02:58:03:[1113289083953] Thread: main ==> ReasonCodeInfo::getResourceExceptionClass() entry
02:58:03:[1113289083953] Thread: main <== ReasonCodeInfo::getResourceExceptionClass() exit
02:58:03:[1113289083953] Thread: main, Object: com.ibm.mq.MQClientManagedConnectionFactoryJ11@4153add6 <== _createManagedConnection (via exception)() exit
com.ibm.mq.MQException: MQJE001:Code 2,Reason 2009
at com.ibm.mq.MQManagedConnectionJ11.<init>(MQManagedConnectionJ11.java:172)
at com.ibm.mq.MQClientManagedConnectionFactoryJ11._createManagedConnection(MQClientManagedConnectionFactoryJ11.java:270)
at com.ibm.mq.MQClientManagedConnectionFactoryJ11.createManagedConnection(MQClientManagedConnectionFactoryJ11.java:290)
at com.ibm.mq.StoredManagedConnection.<init>(StoredManagedConnection.java:80)
at com.ibm.mq.MQSimpleConnectionManager.allocateConnection(MQSimpleConnectionManager.java:150)
at com.ibm.mq.MQQueueManager.obtainBaseMQQueueManager(MQQueueManager.java:682)
at com.ibm.mq.MQQueueManager.construct(MQQueueManager.java:620)
at com.ibm.mq.MQQueueManager.<init>(MQQueueManager.java:393)
at test.MQSend.<init>(MQSend.java:35)
at test.MQSend.main(MQSend.java:13)
WebSphere MQ error occurred : Completion code 2 Reason code 2009 Cause null
----------------------------------------------------------------------
follow is my java class:
package test;
import com.ibm.mq.*;
import com.ibm.jms.JMSTextMessage;
import java.security.cert.*;
public class MQSend {
private MQQueueManager qMgr; // define a queue manager
static String openbiz = "test for ssl";
public static void main(String args[]) {
new MQSend();
}
public MQSend() {
try {
MQEnvironment.userID="aaaaa";//"";
MQEnvironment.password="bbbbb";//"";
MQEnvironment.hostname = "172.172.172.10";
MQEnvironment.port = 1414; MQEnvironment.channel="SSLTEST"; MQEnvironment.CCSID = 819; MQEnvironment.properties.put(MQC.TRANSPORT_PROPERTY,MQC.TRANSPORT_MQSERIES_CLIENT);
MQEnvironment.sslCipherSuite = "SSL_RSA_EXPORT_WITH_RC4_40_MD5";//"";//"SSL_RSA_WITH_NULL_MD5";//
MQEnvironment.sslPeerName = "CN=AAA, O=BBB, C=CN";
MQEnvironment.enableTracing(5);
qMgr = new MQQueueManager("AAA.BBB.MQM");
int openOptions = MQC.MQOO_OUTPUT ;
MQQueue system_default_local_queue = qMgr.accessQueue("Q1", openOptions);
MQMessage hello_world = new MQMessage();
hello_world.writeUTF(openbiz);
MQPutMessageOptions pmo = new MQPutMessageOptions();
system_default_local_queue.put(hello_world, pmo);
System.out.println("send success");
system_default_local_queue.close();
qMgr.disconnect();
}
catch (MQException ex) {
ex.printStackTrace();
System.out.println(
"WebSphere MQ error occurred : Completion code "
+ ex.completionCode
+ " Reason code "
+ ex.reasonCode
+ " Cause "
+ ex.getCause());
}
catch (java.io.IOException ex) {
ex.printStackTrace();
System.out.println(
"An error occurred whilst writing to the message buffer: "
+ ex);
}catch (Exception e){
e.printStackTrace();
}catch(Throwable th) {
th.printStackTrace();
}
}
} |
|
Back to top |
|
 |
Tibor |
Posted: Mon Apr 11, 2005 11:46 pm Post subject: |
|
|
 Grand Master
Joined: 20 May 2001 Posts: 1033 Location: Hungary
|
How did you build and set the keystore and truststore on client side?
Tibor |
|
Back to top |
|
 |
wuyd |
Posted: Mon Apr 11, 2005 11:55 pm Post subject: |
|
|
Novice
Joined: 11 Apr 2005 Posts: 14
|
Thanks for you reply.
The config following these steps:
1. I create cert in AIX using
gsk6cmd -cert -create -db ... -label ibmwebspheremqaaa.bbb.mqm (for qmgr)
gsk6cmd -cert -create -db ... -label ibmwebspheremqaaaaa (for client)
2. I export these 2 certs into .p12
3. ftp .p12 files to my windows client machine, and import into IE , to trusted root certificates
4. export x.509 files for these 2 certs
5. use jre's
keytool -import -keystore cacerts -trustcacerts -alias ibmwebspheremqaaa.bbb.mqm -file aaa.cer
and input "yes" for "Trust this certificates" |
|
Back to top |
|
 |
Tibor |
Posted: Tue Apr 12, 2005 12:07 am Post subject: |
|
|
 Grand Master
Joined: 20 May 2001 Posts: 1033 Location: Hungary
|
wuyd,
1. I haven't had success with keytool because I want to import a p12 file . Your process may be right, but where do you make a keystore?
2. How can you set the name and password for keystore when launching the application?
Tibor |
|
Back to top |
|
 |
wuyd |
Posted: Tue Apr 12, 2005 12:26 am Post subject: |
|
|
Novice
Joined: 11 Apr 2005 Posts: 14
|
Tibor,
I think there exist a keystore in jre's lib\security\ direcotry, named cacerts.
when i launchu the application, I set -Djavax.net.ssl.keyStore nnnn -Djavax.net.ssl.keyStorePassword mmmm ...
am I right?
wuyd |
|
Back to top |
|
 |
Tibor |
Posted: Tue Apr 12, 2005 12:42 am Post subject: |
|
|
 Grand Master
Joined: 20 May 2001 Posts: 1033 Location: Hungary
|
wuyd,
The file cacerts is a truststore wich contains the public keys of the root certificates from CAs. I don't recommend you to overwrite it. A keystore contains your own certfiicate's private key.
You can combine these store files, but as far as I see your post, you import only the qmgr's certificate.
Tibor |
|
Back to top |
|
 |
wuyd |
Posted: Tue Apr 12, 2005 1:29 am Post subject: |
|
|
Novice
Joined: 11 Apr 2005 Posts: 14
|
Tibor,
Sorry for I fogotton to post the sentense of import cert for client:
keytool -import -db ... -label ibmwebspheremqaaaaa
This ssl problem puzzle me long times.
wuyd |
|
Back to top |
|
 |
Tibor |
Posted: Tue Apr 12, 2005 2:06 am Post subject: |
|
|
 Grand Master
Joined: 20 May 2001 Posts: 1033 Location: Hungary
|
wuyd,
Can you send an SSL trace? Just switch it on with a command-line argument:
java .... -Djavax.net.debug=true ...
Tibor |
|
Back to top |
|
 |
wuyd |
Posted: Tue Apr 12, 2005 2:32 am Post subject: |
|
|
Novice
Joined: 11 Apr 2005 Posts: 14
|
TIbor,
I generated AMQ.SSL.TRC file on aix, its binary file, I cann't post it. And the trace file generated by "trace -a -j30D,30E -o trace.file" is too big how can i send you? |
|
Back to top |
|
 |
wuyd |
Posted: Tue Apr 12, 2005 6:25 pm Post subject: |
|
|
Novice
Joined: 11 Apr 2005 Posts: 14
|
here is my client side trace info using -Djavax.net.debug=ssl:
I'm crazing...
----------------------------------------------------------
D:\ws512\eclipse\jre\bin>java -Djavax.net.ssl.trustStore=d:\\ws512\\eclipse\\jre
\\lib\\security\\cacerts -Djavax.net.ssl.trustStorePassword=changeit -Djavax.net
.ssl.keyStore=d:\\ws512\\eclipse\\jre\\lib\\security\\cacerts -Djavax.net.ssl.ke
yStorePassword=changeit -Djavax.net.debug=ssl test.MQSend
keyStore is : d:\\ws512\\eclipse\\jre\\lib\\security\\cacerts
keyStore type is : jks
init keystore
init keymanager of type SunX509
trustStore is: d:\\ws512\\eclipse\\jre\\lib\\security\\cacerts
trustStore type is : jks
init truststore
adding as trusted cert: [
[
Version: V3
Subject: EmailAddress=personal-freemail@thawte.com, CN=Thawte Personal Freemai
l CA, OU=Certification Services Division, O=Thawte Consulting, L=Cape Town, ST=W
estern Cape, C=ZA
Signature Algorithm: MD5withRSA, OID = 1.2.840.113549.1.1.4
Key: com.sun.net.ssl.internal.ssl.JSA_RSAPublicKey@4928b46c
Validity: [From: Mon Jan 01 08:00:00 CST 1996,
To: Fri Jan 01 07:59:59 CST 2021]
Issuer: EmailAddress=personal-freemail@thawte.com, CN=Thawte Personal Freemail
CA, OU=Certification Services Division, O=Thawte Consulting, L=Cape Town, ST=We
stern Cape, C=ZA
SerialNumber: [ 0 ]
Certificate Extensions: 1
[1]: ObjectId: 2.5.29.19 Criticality=true
BasicConstraints:[
CA:true
PathLen:2147483647
]
]
Algorithm: [MD5withRSA]
Signature:
0000: C7 EC 92 7E 4E F8 F5 96 A5 67 62 2A A4 F0 4D 11 ....N....gb*..M.
0010: 60 D0 6F 8D 60 58 61 AC 26 BB 52 35 5C 08 CF 30 `.o.`Xa.&.R5\..0
0020: FB A8 4A 96 8A 1F 62 42 23 8C 17 0F F4 BA 64 9C ..J...bB#.....d.
0030: 17 AC 47 29 DF 9D 98 5E D2 6C 60 71 5C A2 AC DC ..G)...^.l`q\...
0040: 79 E3 E7 6E 00 47 1F B5 0D 28 E8 02 9D E4 9A FD y..n.G...(......
0050: 13 F4 A6 D9 7C B1 F8 DC 5F 23 26 09 91 80 73 D0 ........_#&...s.
0060: 14 1B DE 43 A9 83 25 F2 E6 9C 2F 15 CA FE A6 AB ...C..%.../.....
0070: 8A 07 75 8B 0C DD 51 84 6B E4 F8 D1 CE 77 A2 81 ..u...Q.k....w..
]
adding as trusted cert: [
[
Version: V3
Subject: CN=Baltimore CyberTrust Code Signing Root, OU=CyberTrust, O=Baltimore
, C=IE
Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5
Key: com.sun.net.ssl.internal.ssl.JSA_RSAPublicKey@6c2a346c
Validity: [From: Wed May 17 22:01:00 CST 2000,
To: Sun May 18 07:59:00 CST 2025]
Issuer: CN=Baltimore CyberTrust Code Signing Root, OU=CyberTrust, O=Baltimore,
C=IE
SerialNumber: [ 020000bf ]
Certificate Extensions: 4
[1]: ObjectId: 2.5.29.14 Criticality=false
SubjectKeyIdentifier [
KeyIdentifier [
0000: C8 41 34 5C 15 15 04 E5 40 F2 D1 AB 9A 6F 24 92 .A4\....@....o$.
0010: 7A 87 42 5A z.BZ
]
]
[2]: ObjectId: 2.5.29.15 Criticality=true
KeyUsage [
Key_CertSign
Crl_Sign
]
[3]: ObjectId: 2.5.29.19 Criticality=true
BasicConstraints:[
CA:true
PathLen:3
]
[4]: ObjectId: 2.5.29.37 Criticality=false
Extension unknown: DER encoded OCTET string =
0000: 04 0C 30 0A 06 08 2B 06 01 05 05 07 03 03 ..0...+.......
]
Algorithm: [SHA1withRSA]
Signature:
0000: 52 74 AA 95 4B 22 8C C7 3D 96 A4 FE 5D FA 2F B5 Rt..K"..=...]./.
0010: BC EB F0 0B E9 56 38 1D D1 6D 0D A1 BC 68 8B F0 .....V8..m...h..
0020: C5 80 A5 24 34 FD F2 96 18 11 86 A1 36 F5 37 E7 ...$4.......6.7.
0030: 54 40 D5 64 1F C3 5F 70 42 6B 2D 39 C7 9E 52 05 T@.d.._pBk-9..R.
0040: CE E7 6A 72 D2 8D 72 3F 47 50 83 AB C7 8D 25 C9 ..jr..r?GP....%.
0050: B0 E3 A7 53 16 95 A6 6A 53 EA 18 9D 8F 78 A9 77 ...S...jS....x.w
0060: 77 1A F9 B4 97 47 59 88 27 28 B5 CA E1 2E D7 3E w....GY.'(.....>
0070: 0E A2 0D B8 22 44 03 E3 D1 63 B0 41 3A A1 F5 A4 ...."D...c.A:...
0080: 2D F7 76 1E 04 54 99 78 32 40 D7 2B 7C 4D BA A6 -.v..T.x2@.+.M..
0090: 9C B0 79 6E 07 BE 8C EC EE D7 38 69 5B C1 0C 56 ..yn......8i[..V
00A0: 68 9F FE EB D1 E1 C8 88 F9 F2 CD 7F BE 85 B4 44 h..............D
00B0: 67 00 50 3E F4 26 03 64 EA 77 7D E8 5E 3E 1C 37 g.P>.&.d.w..^>.7
00C0: 47 C8 D6 EA A4 F3 36 3C 97 C2 39 72 05 94 19 25 G.....6<..9r...%
00D0: C3 D7 37 41 0F C1 1F 87 8A FD AA BE E9 B1 64 57 ..7A..........dW
00E0: E4 DB 92 A1 CF E1 49 E8 3B 1F 91 13 5A C3 8F D9 ......I.;...Z...
00F0: 25 58 49 80 47 0F C6 03 AE AC E3 BF B7 C0 AA 2A %XI.G..........*
]
adding as trusted cert: [
[
Version: V3
Subject: EmailAddress=personal-basic@thawte.com, CN=Thawte Personal Basic CA,
OU=Certification Services Division, O=Thawte Consulting, L=Cape Town, ST=Western
Cape, C=ZA
Signature Algorithm: MD5withRSA, OID = 1.2.840.113549.1.1.4
Key: com.sun.net.ssl.internal.ssl.JSA_RSAPublicKey@4337746c
Validity: [From: Mon Jan 01 08:00:00 CST 1996,
To: Fri Jan 01 07:59:59 CST 2021]
Issuer: EmailAddress=personal-basic@thawte.com, CN=Thawte Personal Basic CA, O
U=Certification Services Division, O=Thawte Consulting, L=Cape Town, ST=Western
Cape, C=ZA
SerialNumber: [ 0 ]
Certificate Extensions: 1
[1]: ObjectId: 2.5.29.19 Criticality=true
BasicConstraints:[
CA:true
PathLen:2147483647
]
]
Algorithm: [MD5withRSA]
Signature:
0000: 2D E2 99 6B B0 3D 7A 89 D7 59 A2 94 01 1F 2B DD -..k.=z..Y....+.
0010: 12 4B 53 C2 AD 7F AA A7 00 5C 91 40 57 25 4A 38 .KS......\.@W%J8
0020: AA 84 70 B9 D9 80 0F A5 7B 5C FB 73 C6 BD D7 8A ..p......\.s....
0030: 61 5C 03 E3 2D 27 A8 17 E0 84 85 42 DC 5E 9B C6 a\..-'.....B.^..
0040: B7 B2 6D BB 74 AF E4 3F CB A7 B7 B0 E0 5D BE 78 ..m.t..?.....].x
0050: 83 25 94 D2 DB 81 0F 79 07 6D 4F F4 39 15 5A 52 .%.....y.mO.9.ZR
0060: 01 7B DE 32 D6 4D 38 F6 12 5C 06 50 DF 05 5B BD ...2.M8..\.P..[.
0070: 14 4B A1 DF 29 BA 3B 41 8D F7 63 56 A1 DF 22 B1 .K..).;A..cV..".
]
adding as trusted cert: [
[
Version: V3
Subject: CN=MQC0001, O=BBBB, C=CN
Signature Algorithm: MD5withRSA, OID = 1.2.840.113549.1.1.4
Key: com.sun.net.ssl.internal.ssl.JSA_RSAPublicKey@5890f46c
Validity: [From: Mon Apr 11 14:08:27 CST 2005,
To: Fri Apr 10 14:08:27 CST 2015]
Issuer: CN=MQC0001, O=BBBB, C=CN
SerialNumber: [ 425b65db ]
]
Algorithm: [MD5withRSA]
Signature:
0000: 18 51 20 99 C2 F2 BA 70 6C 53 3B 3F 34 B4 11 A9 .Q ....plS;?4...
0010: 1D B7 AE 6E 84 C9 F1 42 F7 53 78 D6 07 D8 A7 FB ...n...B.Sx.....
0020: 65 C6 4E D1 EF 76 42 4C C4 9F F3 82 A6 F8 83 87 e.N..vBL........
0030: 57 CF CE 5B CA D8 DC 33 FA B9 8F 8C 07 A3 54 93 W..[...3......T.
]
adding as trusted cert: [
[
Version: V1
Subject: OU=Class 3 Public Primary Certification Authority, O="VeriSign, Inc."
, C=US
Signature Algorithm: MD2withRSA, OID = 1.2.840.113549.1.1.2
Key: com.sun.net.ssl.internal.ssl.JSA_RSAPublicKey@7c49b46c
Validity: [From: Mon Jan 29 08:00:00 CST 1996,
To: Thu Jan 08 07:59:59 CST 2004]
Issuer: OU=Class 3 Public Primary Certification Authority, O="VeriSign, Inc.",
C=US
SerialNumber: [ e49efdf3 3ae80ecf a5113e19 a4240232 ]
]
Algorithm: [MD2withRSA]
Signature:
0000: 61 70 EC 2F 3F 9E FD 2B E6 68 54 21 B0 67 79 08 ap./?..+.hT!.gy.
0010: 0C 20 96 31 8A 0D 7A BE B6 26 DF 79 2C 22 69 49 . .1..z..&.y,"iI
0020: 36 E3 97 77 62 61 A2 32 D7 7A 54 21 36 BA 02 C9 6..wba.2.zT!6...
0030: 34 E7 25 DA 44 35 B0 D2 5C 80 5D B3 94 F8 F9 AC 4.%.D5..\.].....
0040: EE A4 60 75 2A 1F 95 49 23 B1 4A 7C F4 B3 47 72 ..`u*..I#.J...Gr
0050: 21 5B 7E 97 AB 54 AC 62 E7 5D EC AE 9B D2 C9 B2 ![...T.b.]......
0060: 24 FB 82 AD E9 67 15 4B BA AA A6 F0 97 A0 F6 B0 $....g.K........
0070: 97 57 00 C8 0C 3C 09 A0 82 04 BA 41 DA F7 99 A4 .W...<.....A....
]
adding as trusted cert: [
[
Version: V1
Subject: CN=GTE CyberTrust Global Root, OU="GTE CyberTrust Solutions, Inc.", O
=GTE Corporation, C=US
Signature Algorithm: MD5withRSA, OID = 1.2.840.113549.1.1.4
Key: com.sun.net.ssl.internal.ssl.JSA_RSAPublicKey@4e17346c
Validity: [From: Thu Aug 13 08:29:00 CST 1998,
To: Tue Aug 14 07:59:00 CST 2018]
Issuer: CN=GTE CyberTrust Global Root, OU="GTE CyberTrust Solutions, Inc.", O=
GTE Corporation, C=US
SerialNumber: [ 01a5]
]
Algorithm: [MD5withRSA]
Signature:
0000: 6D EB 1B 09 E9 5E D9 51 DB 67 22 61 A4 2A 3C 48 m....^.Q.g"a.*<H
0010: 77 E3 A0 7C A6 DE 73 A2 14 03 85 3D FB AB 0E 30 w.....s....=...0
0020: C5 83 16 33 81 13 08 9E 7B 34 4E DF 40 C8 74 D7 ...3.....4N.@.t.
0030: B9 7D DC F4 76 55 7D 9B 63 54 18 E9 F0 EA F3 5C ....vU..cT.....\
0040: B1 D9 8B 42 1E B9 C0 95 4E BA FA D5 E2 7C F5 68 ...B....N......h
0050: 61 BF 8E EC 05 97 5F 5B B0 D7 A3 85 34 C4 24 A7 a....._[....4.$.
0060: 0D 0F 95 93 EF CB 94 D8 9E 1F 9D 5C 85 6D C7 AA ...........\.m..
0070: AE 4F 1F 22 B5 CD 95 AD BA A7 CC F9 AB 0B 7A 7F .O."..........z.
]
adding as trusted cert: [
[
Version: V3
Subject: EmailAddress=personal-premium@thawte.com, CN=Thawte Personal Premium
CA, OU=Certification Services Division, O=Thawte Consulting, L=Cape Town, ST=Wes
tern Cape, C=ZA
Signature Algorithm: MD5withRSA, OID = 1.2.840.113549.1.1.4
Key: com.sun.net.ssl.internal.ssl.JSA_RSAPublicKey@64cfb46c
Validity: [From: Mon Jan 01 08:00:00 CST 1996,
To: Fri Jan 01 07:59:59 CST 2021]
Issuer: EmailAddress=personal-premium@thawte.com, CN=Thawte Personal Premium C
A, OU=Certification Services Division, O=Thawte Consulting, L=Cape Town, ST=West
ern Cape, C=ZA
SerialNumber: [ 0 ]
Certificate Extensions: 1
[1]: ObjectId: 2.5.29.19 Criticality=true
BasicConstraints:[
CA:true
PathLen:2147483647
]
]
Algorithm: [MD5withRSA]
Signature:
0000: 69 36 89 F7 34 2A 33 72 2F 6D 3B D4 22 B2 B8 6F i6..4*3r/m;."..o
0010: 9A C5 36 66 0E 1B 3C A1 B1 75 5A E6 FD 35 D3 F8 ..6f..<..uZ..5..
0020: A8 F2 07 6F 85 67 8E DE 2B B9 E2 17 B0 3A A0 F0 ...o.g..+....:..
0030: 0E A2 00 9A DF F3 14 15 6E BB C8 85 5A 98 80 F9 ........n...Z...
0040: FF BE 74 1D 3D F3 FE 30 25 D1 37 34 67 FA A5 71 ..t.=..0%.74g..q
0050: 79 30 61 29 72 C0 E0 2C 4C FB 56 E4 3A A8 6F E5 y0a)r..,L.V.:.o.
0060: 32 59 52 DB 75 28 50 59 0C F8 0B 19 E4 AC D9 AF 2YR.u(PY........
0070: 96 8D 2F 50 DB 07 C3 EA 1F AB 33 E0 F5 2B 31 89 ../P......3..+1.
]
adding as trusted cert: [
[
Version: V3
Subject: EmailAddress=server-certs@thawte.com, CN=Thawte Server CA, OU=Certifi
cation Services Division, O=Thawte Consulting cc, L=Cape Town, ST=Western Cape,
C=ZA
Signature Algorithm: MD5withRSA, OID = 1.2.840.113549.1.1.4
Key: com.sun.net.ssl.internal.ssl.JSA_RSAPublicKey@73dbf46c
Validity: [From: Thu Aug 01 08:00:00 CST 1996,
To: Fri Jan 01 07:59:59 CST 2021]
Issuer: EmailAddress=server-certs@thawte.com, CN=Thawte Server CA, OU=Certific
ation Services Division, O=Thawte Consulting cc, L=Cape Town, ST=Western Cape, C
=ZA
SerialNumber: [ 01]
Certificate Extensions: 1
[1]: ObjectId: 2.5.29.19 Criticality=true
BasicConstraints:[
CA:true
PathLen:2147483647
]
]
Algorithm: [MD5withRSA]
Signature:
0000: 07 FA 4C 69 5C FB 95 CC 46 EE 85 83 4D 21 30 8E ..Li\...F...M!0.
0010: CA D9 A8 6F 49 1A E6 DA 51 E3 60 70 6C 84 61 11 ...oI...Q.`pl.a.
0020: A1 1A C8 48 3E 59 43 7D 4F 95 3D A1 8B B7 0B 62 ...H>YC.O.=....b
0030: 98 7A 75 8A DD 88 4E 4E 9E 40 DB A8 CC 32 74 B9 .zu...NN.@...2t.
0040: 6F 0D C6 E3 B3 44 0B D9 8A 6F 9A 29 9B 99 18 28 o....D...o.)...(
0050: 3B D1 E3 40 28 9A 5A 3C D5 B5 E7 20 1B 8B CA A4 ;..@(.Z<... ....
0060: AB 8D E9 51 D9 E2 4C 2C 59 A9 DA B9 B2 75 1B F6 ...Q..L,Y....u..
0070: 42 F2 EF C7 F2 18 F9 89 BC A3 FF 8A 23 2E 70 47 B...........#.pG
]
adding as trusted cert: [
[
Version: V1
Subject: OU=Class 4 Public Primary Certification Authority, O="VeriSign, Inc."
, C=US
Signature Algorithm: MD2withRSA, OID = 1.2.840.113549.1.1.2
Key: com.sun.net.ssl.internal.ssl.JSA_RSAPublicKey@4d0ff46c
Validity: [From: Mon Jan 29 08:00:00 CST 1996,
To: Sat Jan 01 07:59:59 CST 2000]
Issuer: OU=Class 4 Public Primary Certification Authority, O="VeriSign, Inc.",
C=US
SerialNumber: [ 02a60000 01]
]
Algorithm: [MD2withRSA]
Signature:
0000: 53 DD D3 F0 9C 24 7E 40 AA E2 FC 00 1A D7 DA 0C S....$.@........
0010: FC 32 61 B8 15 0D 96 F3 FA 57 1B 7F 33 7C AF E9 .2a......W..3...
0020: 98 9A 61 C8 7A B3 B7 FF B1 DC 99 83 DC AC 12 FC ..a.z...........
0030: 70 C9 1F 38 42 ED 44 F6 80 2E 5B 6B 33 69 AC 9C p..8B.D...[k3i..
0040: D3 5C E7 5F 5A 18 C7 B1 2D 79 04 96 41 91 99 41 .\._Z...-y..A..A
0050: B1 3C 0D BA 84 39 C6 3B 97 F0 26 C9 8E EE BD CC .<...9.;..&.....
0060: 42 95 FF 1E C7 02 3F 54 0C 78 F5 BC AA 60 7C 02 B.....?T.x...`..
0070: 69 E8 DC AC E2 02 76 61 C4 3E 03 EA D2 8A 24 D1 i.....va.>....$.
]
adding as trusted cert: [
[
Version: V3
Subject: CN=Baltimore CyberTrust Root, OU=CyberTrust, O=Baltimore, C=IE
Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5
Key: com.sun.net.ssl.internal.ssl.JSA_RSAPublicKey@6f27346c
Validity: [From: Sat May 13 02:46:00 CST 2000,
To: Tue May 13 07:59:00 CST 2025]
Issuer: CN=Baltimore CyberTrust Root, OU=CyberTrust, O=Baltimore, C=IE
SerialNumber: [ 020000b9 ]
Certificate Extensions: 3
[1]: ObjectId: 2.5.29.14 Criticality=false
SubjectKeyIdentifier [
KeyIdentifier [
0000: E5 9D 59 30 82 47 58 CC AC FA 08 54 36 86 7B 3A ..Y0.GX....T6..:
0010: B5 04 4D F0 ..M.
]
]
[2]: ObjectId: 2.5.29.15 Criticality=true
KeyUsage [
Key_CertSign
Crl_Sign
]
[3]: ObjectId: 2.5.29.19 Criticality=true
BasicConstraints:[
CA:true
PathLen:3
]
]
Algorithm: [SHA1withRSA]
Signature:
0000: 85 0C 5D 8E E4 6F 51 68 42 05 A0 DD BB 4F 27 25 ..]..oQhB....O'%
0010: 84 03 BD F7 64 FD 2D D7 30 E3 A4 10 17 EB DA 29 ....d.-.0......)
0020: 29 B6 79 3F 76 F6 19 13 23 B8 10 0A F9 58 A4 D4 ).y?v...#....X..
0030: 61 70 BD 04 61 6A 12 8A 17 D5 0A BD C5 BC 30 7C ap..aj........0.
0040: D6 E9 0C 25 8D 86 40 4F EC CC A3 7E 38 C6 37 11 ...%..@O....8.7.
0050: 4F ED DD 68 31 8E 4C D2 B3 01 74 EE BE 75 5E 07 O..h1.L...t..u^.
0060: 48 1A 7F 70 FF 16 5C 84 C0 79 85 B8 05 FD 7F BE H..p..\..y......
0070: 65 11 A3 0F C0 02 B4 F8 52 37 39 04 D5 A9 31 7A e.......R79...1z
0080: 18 BF A0 2A F4 12 99 F7 A3 45 82 E3 3C 5E F5 9D ...*.....E..<^..
0090: 9E B5 C8 9E 7C 2E C8 A4 9E 4E 08 14 4B 6D FD 70 .........N..Km.p
00A0: 6D 6B 1A 63 BD 64 E6 1F B7 CE F0 F2 9F 2E BB 1B mk.c.d..........
00B0: B7 F2 50 88 73 92 C2 E2 E3 16 8D 9A 32 02 AB 8E ..P.s.......2...
00C0: 18 DD E9 10 11 EE 7E 35 AB 90 AF 3E 30 94 7A D0 .......5...>0.z.
00D0: 33 3D A7 65 0F F5 FC 8E 9E 62 CF 47 44 2C 01 5D 3=.e.....b.GD,.]
00E0: BB 1D B5 32 D2 47 D2 38 2E D0 FE 81 DC 32 6A 1E ...2.G.8.....2j.
00F0: B5 EE 3C D5 FC E7 81 1D 19 C3 24 42 EA 63 39 A9 ..<.......$B.c9.
]
adding as trusted cert: [
[
Version: V1
Subject: OU=Secure Server Certification Authority, O="RSA Data Security, Inc."
, C=US
Signature Algorithm: MD2withRSA, OID = 1.2.840.113549.1.1.2
Key: com.sun.net.ssl.internal.ssl.JSA_RSAPublicKey@6081f46c
Validity: [From: Wed Nov 09 08:00:00 CST 1994,
To: Fri Jan 08 07:59:59 CST 2010]
Issuer: OU=Secure Server Certification Authority, O="RSA Data Security, Inc.",
C=US
SerialNumber: [ 02ad667e 4e45fe5e 576f3c98 195eddc0 ]
]
Algorithm: [MD2withRSA]
Signature:
0000: 65 DD 7E E1 B2 EC B0 E2 3A E0 EC 71 46 9A 19 11 e.......:..qF...
0010: B8 D3 C7 A0 B4 03 40 26 02 3E 09 9C E1 12 B3 D1 ......@&.>......
0020: 5A F6 37 A5 B7 61 03 B6 5B 16 69 3B C6 44 08 0C Z.7..a..[.i;.D..
0030: 88 53 0C 6B 97 49 C7 3E 35 DC 6C B9 BB AA DF 5C .S.k.I.>5.l....\
0040: BB 3A 2F 93 60 B6 A9 4B 4D F2 20 F7 CD 5F 7F 64 .:/.`..KM. .._.d
0050: 7B 8E DC 00 5C D7 FA 77 CA 39 16 59 6F 0E EA D3 ....\..w.9.Yo...
0060: B5 83 7F 4D 4D 42 56 76 B4 C9 5F 04 F8 38 F8 EB ...MMBVv.._..8..
0070: D2 5F 75 5F CD 7B FC E5 8E 80 7C FC 50 ._u_........P
]
adding as trusted cert: [
[
Version: V1
Subject: OU=Class 1 Public Primary Certification Authority, O="VeriSign, Inc."
, C=US
Signature Algorithm: MD2withRSA, OID = 1.2.840.113549.1.1.2
Key: com.sun.net.ssl.internal.ssl.JSA_RSAPublicKey@7410746c
Validity: [From: Mon Jan 29 08:00:00 CST 1996,
To: Wed Jan 08 07:59:59 CST 2020]
Issuer: OU=Class 1 Public Primary Certification Authority, O="VeriSign, Inc.",
C=US
SerialNumber: [ 325033cf 50d156f3 5c81ad65 5c4fc825 ]
]
Algorithm: [MD2withRSA]
Signature:
0000: 4B 44 66 60 68 64 E4 98 1B F3 B0 72 E6 95 89 7C KDf`hd.....r....
0010: DD 7B B3 95 C0 1D 2E D8 D8 19 D0 2D 34 3D C6 50 ...........-4=.P
0020: 9A 10 86 8C AA 3F 3B A8 04 FC 37 52 95 C3 D9 C9 .....?;...7R....
0030: DB CD F2 86 06 C4 B1 1B F0 82 88 30 42 8E 17 50 ...........0B..P
0040: 1C 64 7A B8 3E 99 49 74 97 FC AC 02 43 FB 96 0C .dz.>.It....C...
0050: 56 04 25 0C 7C 7C 87 9D 24 A7 D8 F0 32 29 B5 A4 V.%.....$...2)..
0060: DF 5D A2 4C C5 16 32 A8 42 F6 45 A6 B6 36 B9 E0 .].L..2.B.E..6..
0070: BF 65 36 93 C2 D2 D7 6B DC DE 59 D6 A2 35 F8 45 .e6....k..Y..5.E
]
adding as trusted cert: [
[
Version: V3
Subject: EmailAddress=premium-server@thawte.com, CN=Thawte Premium Server CA,
OU=Certification Services Division, O=Thawte Consulting cc, L=Cape Town, ST=West
ern Cape, C=ZA
Signature Algorithm: MD5withRSA, OID = 1.2.840.113549.1.1.4
Key: com.sun.net.ssl.internal.ssl.JSA_RSAPublicKey@7858f46c
Validity: [From: Thu Aug 01 08:00:00 CST 1996,
To: Fri Jan 01 07:59:59 CST 2021]
Issuer: EmailAddress=premium-server@thawte.com, CN=Thawte Premium Server CA, O
U=Certification Services Division, O=Thawte Consulting cc, L=Cape Town, ST=Weste
rn Cape, C=ZA
SerialNumber: [ 01]
Certificate Extensions: 1
[1]: ObjectId: 2.5.29.19 Criticality=true
BasicConstraints:[
CA:true
PathLen:2147483647
]
]
Algorithm: [MD5withRSA]
Signature:
0000: 26 48 2C 16 C2 58 FA E8 16 74 0C AA AA 5F 54 3F &H,..X...t..._T?
0010: F2 D7 C9 78 60 5E 5E 6E 37 63 22 77 36 7E B2 17 ...x`^^n7c"w6...
0020: C4 34 B9 F5 08 85 FC C9 01 38 FF 4D BE F2 16 42 .4.......8.M...B
0030: 43 E7 BB 5A 46 FB C1 C6 11 1F F1 4A B0 28 46 C9 C..ZF......J.(F.
0040: C3 C4 42 7D BC FA AB 59 6E D5 B7 51 88 11 E3 A4 ..B....Yn..Q....
0050: 85 19 6B 82 4C A4 0C 12 AD E9 A4 AE 3F F1 C3 49 ..k.L.......?..I
0060: 65 9A 8C C5 C8 3E 25 B7 94 99 BB 92 32 71 07 F0 e....>%.....2q..
0070: 86 5E ED 50 27 A6 0D A6 23 F9 BB CB A6 07 14 42 .^.P'...#......B
]
adding as trusted cert: [
[
Version: V1
Subject: CN=GTE CyberTrust Root, O=GTE Corporation, C=US
Signature Algorithm: MD5withRSA, OID = 1.2.840.113549.1.1.4
Key: com.sun.net.ssl.internal.ssl.JSA_RSAPublicKey@7e32346c
Validity: [From: Sat Feb 24 07:01:00 CST 1996,
To: Fri Feb 24 07:59:00 CST 2006]
Issuer: CN=GTE CyberTrust Root, O=GTE Corporation, C=US
SerialNumber: [ 01a3]
]
Algorithm: [MD5withRSA]
Signature:
0000: 12 B3 75 C6 5F 1D E1 61 55 80 00 D4 81 4B 7B 31 ..u._..aU....K.1
0010: 0F 23 63 E7 3D F3 03 F9 F4 36 A8 BB D9 E3 A5 97 .#c.=....6......
0020: 4D EA 2B 29 E0 D6 6A 73 81 E6 C0 89 A3 D3 F1 E0 M.+)..js........
0030: A5 A5 22 37 9A 63 C2 48 20 B4 DB 72 E3 C8 F6 D9 .."7.c.H ..r....
0040: 7C BE B1 AF 53 DA 14 B4 21 B8 D6 D5 96 E3 FE 4E ....S...!......N
0050: 0C 59 62 B6 9A 4A F9 42 DD 8C 6F 81 A9 71 FF F4 .Yb..J.B..o..q..
0060: 0A 72 6D 6D 44 0E 9D F3 74 74 A8 D5 34 49 E9 5E .rmmD...tt..4I.^
0070: 9E E9 B4 7A E1 E5 5A 1F 84 30 9C D3 9F A5 25 D8 ...z..Z..0....%.
]
adding as trusted cert: [
[
Version: V3
Subject: CN=AAAAA, O=BBBB, C=CN
Signature Algorithm: MD5withRSA, OID = 1.2.840.113549.1.1.4
Key: com.sun.net.ssl.internal.ssl.JSA_RSAPublicKey@4bd9746c
Validity: [From: Mon Apr 11 13:26:39 CST 2005,
To: Fri Apr 10 13:26:39 CST 2015]
Issuer: CN=AAAAA, O=BBBB, C=CN
SerialNumber: [ 425b5c0f ]
]
Algorithm: [MD5withRSA]
Signature:
0000: 1B 33 16 20 99 C2 AD 93 91 57 C0 21 A6 87 73 B9 .3. .....W.!..s.
0010: 2D 2D 1B 71 37 C4 B8 9C D7 EE CC 79 A2 52 2F 21 --.q7......y.R/!
0020: A3 84 7D 2F 29 36 43 A3 BC 4B 8E 2B 81 6C EF FD .../)6C..K.+.l..
0030: 6A B2 2C A2 CF 82 8C CA 1E 4A 0D 78 CA 45 C1 EE j.,......J.x.E..
]
adding as trusted cert: [
[
Version: V3
Subject: CN=GTE CyberTrust Root 5, OU="GTE CyberTrust Solutions, Inc.", O=GTE
Corporation, C=US
Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5
Key: com.sun.net.ssl.internal.ssl.JSA_RSAPublicKey@68c1f46c
Validity: [From: Fri Aug 14 22:50:00 CST 1998,
To: Thu Aug 15 07:59:00 CST 2013]
Issuer: CN=GTE CyberTrust Root 5, OU="GTE CyberTrust Solutions, Inc.", O=GTE C
orporation, C=US
SerialNumber: [ 01b6]
Certificate Extensions: 4
[1]: ObjectId: 2.5.29.14 Criticality=false
SubjectKeyIdentifier [
KeyIdentifier [
0000: 76 0A 49 21 38 4C 9F DE F8 C4 49 C7 71 71 91 9D v.I!8L....I.qq..
]
]
[2]: ObjectId: 2.5.29.32 Criticality=false
Extension unknown: DER encoded OCTET string =
0000: 04 10 30 0E 30 0C 06 0A 2A 86 48 86 F8 63 01 02 ..0.0...*.H..c..
0010: 01 03 ..
[3]: ObjectId: 2.5.29.15 Criticality=true
KeyUsage [
Key_CertSign
Crl_Sign
]
[4]: ObjectId: 2.5.29.19 Criticality=true
BasicConstraints:[
CA:true
PathLen:5
]
]
Algorithm: [SHA1withRSA]
Signature:
0000: 41 3A D4 18 5B DA B8 DE 21 1C E1 8E 09 E5 F1 68 A:..[...!......h
0010: 34 FF DE 96 F4 07 F5 A7 3C F3 AC 4A B1 9B FA 92 4.......<..J....
0020: FA 9B ED E6 32 21 AA 4A 76 C5 DC 4F 38 E5 DF D5 ....2!.Jv..O8...
0030: 86 E4 D5 C8 76 7D 98 D7 B1 CD 8F 4D B5 91 23 6C ....v......M..#l
0040: 8B 8A EB EA 7C EF 14 94 C4 C6 F0 1F 4A 2D 32 71 ............J-2q
0050: 63 2B 63 91 26 02 09 B6 80 1D ED E2 CC B8 7F DB c+c.&...........
0060: 87 63 C8 E1 D0 6C 26 B1 35 1D 40 66 10 1B CD 95 .c...l&.5.@f....
0070: 54 18 33 61 EC 13 4F DA 13 F7 99 AF 3E D0 CF 8E T.3a..O.....>...
0080: A6 72 A2 B3 C3 05 9A C9 27 7D 92 CC 7E 52 8D B3 .r......'....R..
0090: AB 70 6D 9E 89 9F 4D EB 1A 75 C2 98 AA D5 02 16 .pm...M..u......
00A0: D7 0C 8A BF 25 E4 EB 2D BC 98 E9 58 38 19 7C B9 ....%..-...X8...
00B0: 37 FE DB E2 99 08 73 06 C7 97 83 6A 7D 10 01 2F 7.....s....j.../
00C0: 32 B9 17 05 4A 65 E6 2F CE BE 5E 53 A6 82 E9 9A 2...Je./..^S....
00D0: 53 0A 84 74 2D 83 CA C8 94 16 76 5F 94 61 28 F0 S..t-.....v_.a(.
00E0: 85 A7 39 BB D7 8B D9 A8 B2 13 1D 54 09 34 24 7D ..9........T.4$.
00F0: 20 81 7D 66 7E A2 90 74 5C 10 C6 BD EC AB 1B C2 ..f...t\.......
]
adding as trusted cert: [
[
Version: V1
Subject: OU=Class 2 Public Primary Certification Authority, O="VeriSign, Inc."
, C=US
Signature Algorithm: MD2withRSA, OID = 1.2.840.113549.1.1.2
Key: com.sun.net.ssl.internal.ssl.JSA_RSAPublicKey@7815b46d
Validity: [From: Mon Jan 29 08:00:00 CST 1996,
To: Thu Jan 08 07:59:59 CST 2004]
Issuer: OU=Class 2 Public Primary Certification Authority, O="VeriSign, Inc.",
C=US
SerialNumber: [ ba5ac94c 053b92d6 a7b6df4e d053920d ]
]
Algorithm: [MD2withRSA]
Signature:
0000: B6 00 1F 93 57 A4 07 A7 40 CE 65 40 3F 55 5E ED ....W...@.e@?U^.
0010: EF FA 54 49 A5 30 D6 21 7C 61 87 EE 83 93 0B BF ..TI.0.!.a......
0020: B4 33 F2 98 AC 9F 06 BF 4E A8 CE 14 81 4C CB 04 .3......N....L..
0030: 4E 58 C3 CF 5F EE 7C D7 9A 6F CB 41 8A B7 7F 81 NX.._....o.A....
0040: B8 FF 84 61 C6 27 43 65 1D 0C EC B1 00 0A DD 1B ...a.'Ce........
0050: A4 BB C7 78 20 28 B2 A2 DD 36 95 2E E1 54 4F BF ...x (...6...TO.
0060: 60 B9 77 68 11 99 23 E8 EA 52 E8 AA 00 4E 67 4E `.wh..#..R...NgN
0070: BB 90 B5 45 9B 46 EB 8E 16 EF C4 33 5B 33 3D D5 ...E.F.....3[3=.
]
init context
trigger seeding of SecureRandom
done seeding SecureRandom
%% No cached client session
*** ClientHello, v3.1
RandomCookie: GMT: 1113292883 bytes = { 160, 11, 240, 194, 169, 10, 215, 178, 1
08, 74, 100, 124, 158, 213, 76, 55, 158, 108, 137, 3, 88, 223, 73, 221, 225, 117
, 164, 70 }
Session ID: {}
Cipher Suites: { 0, 3 }
Compression Methods: { 0 }
***
[write] MD5 and SHA1 hashes: len = 45
0000: 01 00 00 29 03 01 42 5C 80 53 A0 0B F0 C2 A9 0A ...)..B\.S......
0010: D7 B2 6C 4A 64 7C 9E D5 4C 37 9E 6C 89 03 58 DF ..lJd...L7.l..X.
0020: 49 DD E1 75 A4 46 00 00 02 00 03 01 00 I..u.F.......
main, WRITE: SSL v3.1 Handshake, length = 45
[write] MD5 and SHA1 hashes: len = 47
0000: 01 03 01 00 06 00 00 00 20 00 00 03 02 00 80 42 ........ ......B
0010: 5C 80 53 A0 0B F0 C2 A9 0A D7 B2 6C 4A 64 7C 9E \.S........lJd..
0020: D5 4C 37 9E 6C 89 03 58 DF 49 DD E1 75 A4 46 .L7.l..X.I..u.F
main, WRITE: SSL v2, contentType = 22, translated length = 16340
main, READ: SSL v3.0 Handshake, length = 3034
*** ServerHello, v3.0
RandomCookie: GMT: 540867808 bytes = { 55, 40, 65, 33, 21, 11, 230, 121, 222, 2
44, 244, 24, 117, 178, 89, 72, 159, 192, 32, 163, 2, 157, 21, 57, 214, 32, 137,
179 }
Session ID: {0, 8, 208, 2, 158, 27, 224, 106, 198, 29, 37, 37, 192, 60, 226, 11
6, 114, 11, 144, 103, 88, 88, 88, 88, 66, 92, 128, 178, 0, 0, 0, 19}
Cipher Suite: { 0, 3 }
Compression Method: 0
***
%% Created: [Session-1, SSL_RSA_EXPORT_WITH_RC4_40_MD5]
** SSL_RSA_EXPORT_WITH_RC4_40_MD5
[read] MD5 and SHA1 hashes: len = 74
0000: 02 00 00 46 03 00 20 3D FD E0 37 28 41 21 15 0B ...F.. =..7(A!..
0010: E6 79 DE F4 F4 18 75 B2 59 48 9F C0 20 A3 02 9D .y....u.YH.. ...
0020: 15 39 D6 20 89 B3 20 00 08 D0 02 9E 1B E0 6A C6 .9. .. .......j.
0030: 1D 25 25 C0 3C E2 74 72 0B 90 67 58 58 58 58 42 .%%.<.tr..gXXXXB
0040: 5C 80 B2 00 00 00 13 00 03 00 \.........
*** Certificate chain
chain [0] = [
[
Version: V3
Subject: CN=AAAAA, O=BBBB, C=CN
Signature Algorithm: MD5withRSA, OID = 1.2.840.113549.1.1.4
Key: com.sun.net.ssl.internal.ssl.JSA_RSAPublicKey@17adf46c
Validity: [From: Mon Apr 11 13:26:39 CST 2005,
To: Fri Apr 10 13:26:39 CST 2015]
Issuer: CN=AAAAA, O=BBBB, C=CN
SerialNumber: [ 425b5c0f ]
]
Algorithm: [MD5withRSA]
Signature:
0000: 1B 33 16 20 99 C2 AD 93 91 57 C0 21 A6 87 73 B9 .3. .....W.!..s.
0010: 2D 2D 1B 71 37 C4 B8 9C D7 EE CC 79 A2 52 2F 21 --.q7......y.R/!
0020: A3 84 7D 2F 29 36 43 A3 BC 4B 8E 2B 81 6C EF FD .../)6C..K.+.l..
0030: 6A B2 2C A2 CF 82 8C CA 1E 4A 0D 78 CA 45 C1 EE j.,......J.x.E..
]
***
updated/found trusted cert: [
[
Version: V3
Subject: CN=AAAAA, O=BBBB, C=CN
Signature Algorithm: MD5withRSA, OID = 1.2.840.113549.1.1.4
Key: com.sun.net.ssl.internal.ssl.JSA_RSAPublicKey@17adf46c
Validity: [From: Mon Apr 11 13:26:39 CST 2005,
To: Fri Apr 10 13:26:39 CST 2015]
Issuer: CN=AAAAA, O=BBBB, C=CN
SerialNumber: [ 425b5c0f ]
]
Algorithm: [MD5withRSA]
Signature:
0000: 1B 33 16 20 99 C2 AD 93 91 57 C0 21 A6 87 73 B9 .3. .....W.!..s.
0010: 2D 2D 1B 71 37 C4 B8 9C D7 EE CC 79 A2 52 2F 21 --.q7......y.R/!
0020: A3 84 7D 2F 29 36 43 A3 BC 4B 8E 2B 81 6C EF FD .../)6C..K.+.l..
0030: 6A B2 2C A2 CF 82 8C CA 1E 4A 0D 78 CA 45 C1 EE j.,......J.x.E..
]
[read] MD5 and SHA1 hashes: len = 343
0000: 0B 00 01 53 00 01 50 00 01 4D 30 82 01 49 30 81 ...S..P..M0..I0.
0010: F4 A0 03 02 01 02 02 04 42 5B 5C 0F 30 0D 06 09 ........B[\.0...
0020: 2A 86 48 86 F7 0D 01 01 04 05 00 30 2C 31 0B 30 *.H........0,1.0
0030: 09 06 03 55 04 06 13 02 43 4E 31 0D 30 0B 06 03 ...U....CN1.0...
0040: 55 04 0A 13 04 42 4D 43 43 31 0E 30 0C 06 03 55 U....BBBB1.0...U
0050: 04 03 13 05 45 44 53 4D 50 30 1E 17 0D 30 35 30 ....AAAAA0...050
0060: 34 31 31 30 35 32 36 33 39 5A 17 0D 31 35 30 34 411052639Z..1504
0070: 31 30 30 35 32 36 33 39 5A 30 2C 31 0B 30 09 06 10052639Z0,1.0..
0080: 03 55 04 06 13 02 43 4E 31 0D 30 0B 06 03 55 04 .U....CN1.0...U.
0090: 0A 13 04 42 4D 43 43 31 0E 30 0C 06 03 55 04 03 ...BBBB1.0...U..
00A0: 13 05 45 44 53 4D 50 30 5C 30 0D 06 09 2A 86 48 ..AAAAA0\0...*.H
00B0: 86 F7 0D 01 01 01 05 00 03 4B 00 30 48 02 41 00 .........K.0H.A.
00C0: C0 B1 F2 62 14 7E 6C D8 4E 83 FA 24 EB 55 C3 3F ...b..l.N..$.U.?
00D0: C4 65 32 57 81 D5 29 E8 47 03 2F 03 E7 14 D8 86 .e2W..).G./.....
00E0: 88 5A 62 DF 3B F4 34 02 15 55 D4 2F 5B 81 1E 24 .Zb.;.4..U./[..$
00F0: 4D E8 DA BD FB 57 E3 48 9A 27 7E 19 F0 9C A2 B5 M....W.H.'......
0100: 02 03 01 00 01 30 0D 06 09 2A 86 48 86 F7 0D 01 .....0...*.H....
0110: 01 04 05 00 03 41 00 1B 33 16 20 99 C2 AD 93 91 .....A..3. .....
0120: 57 C0 21 A6 87 73 B9 2D 2D 1B 71 37 C4 B8 9C D7 W.!..s.--.q7....
0130: EE CC 79 A2 52 2F 21 A3 84 7D 2F 29 36 43 A3 BC ..y.R/!.../)6C..
0140: 4B 8E 2B 81 6C EF FD 6A B2 2C A2 CF 82 8C CA 1E K.+.l..j.,......
0150: 4A 0D 78 CA 45 C1 EE J.x.E..
*** CertificateRequest
Cert Types: RSA,
Cert Authorities:
<OU=Class 3 Public Primary Certification Authority, O="VeriSign, Inc.", C=US>
<OU=Class 2 Public Primary Certification Authority, O="VeriSign, Inc.", C=US>
<OU=Class 1 Public Primary Certification Authority, O="VeriSign, Inc.", C=US>
<OU=Secure Server Certification Authority, O="RSA Data Security, Inc.", C=US>
<EmailAddress=server-certs@thawte.com, CN=Thawte Server CA, OU=Certification Ser
vices Division, O=Thawte Consulting cc, L=Cape Town, ST=Western Cape, C=ZA>
<EmailAddress=premium-server@thawte.com, CN=Thawte Premium Server CA, OU=Certifi
cation Services Division, O=Thawte Consulting cc, L=Cape Town, ST=Western Cape,
C=ZA>
<EmailAddress=personal-basic@thawte.com, CN=Thawte Personal Basic CA, OU=Certifi
cation Services Division, O=Thawte Consulting, L=Cape Town, ST=Western Cape, C=Z
A>
<EmailAddress=personal-freemail@thawte.com, CN=Thawte Personal Freemail CA, OU=C
ertification Services Division, O=Thawte Consulting, L=Cape Town, ST=Western Cap
e, C=ZA>
<EmailAddress=personal-premium@thawte.com, CN=Thawte Personal Premium CA, OU=Cer
tification Services Division, O=Thawte Consulting, L=Cape Town, ST=Western Cape,
C=ZA>
<CN=VeriSign Class 1 CA Individual Subscriber-Persona Not Validated, OU="www.ver
isign.com/repository/RPA Incorp. By Ref.,LIAB.LTD(c)98", OU=VeriSign Trust Netwo
rk, O="VeriSign, Inc.">
<OU=VeriSign Trust Network, OU="(c) 1998 VeriSign, Inc. - For authorized use onl
y", OU=Class 1 Public Primary Certification Authority - G2, O="VeriSign, Inc.",
C=US>
<OU=VeriSign Trust Network, OU="(c) 1998 VeriSign, Inc. - For authorized use onl
y", OU=Class 2 Public Primary Certification Authority - G2, O="VeriSign, Inc.",
C=US>
<OU=VeriSign Trust Network, OU="(c) 1998 VeriSign, Inc. - For authorized use onl
y", OU=Class 3 Public Primary Certification Authority - G2, O="VeriSign, Inc.",
C=US>
<OU=www.verisign.com/CPS Incorp.by Ref. LIABILITY LTD.(c)97 VeriSign, OU=VeriSig
n International Server CA - Class 3, OU="VeriSign, Inc.", O=VeriSign Trust Netwo
rk>
<OU=VeriSign Class 2 OnSite Individual CA, O=VeriSign>
<CN=AAAAA, O=BBBB, C=CN>
<CN=MQC0001, O=BBBB, C=CN>
[read] MD5 and SHA1 hashes: len = 2613
0000: 0D 00 0A 31 01 01 0A 2D 00 61 30 5F 31 0B 30 09 ...1...-.a0_1.0.
0010: 06 03 55 04 06 13 02 55 53 31 17 30 15 06 03 55 ..U....US1.0...U
0020: 04 0A 13 0E 56 65 72 69 53 69 67 6E 2C 20 49 6E ....VeriSign, In
0030: 63 2E 31 37 30 35 06 03 55 04 0B 13 2E 43 6C 61 c.1705..U....Cla
0040: 73 73 20 33 20 50 75 62 6C 69 63 20 50 72 69 6D ss 3 Public Prim
0050: 61 72 79 20 43 65 72 74 69 66 69 63 61 74 69 6F ary Certificatio
0060: 6E 20 41 75 74 68 6F 72 69 74 79 00 61 30 5F 31 n Authority.a0_1
0070: 0B 30 09 06 03 55 04 06 13 02 55 53 31 17 30 15 .0...U....US1.0.
0080: 06 03 55 04 0A 13 0E 56 65 72 69 53 69 67 6E 2C ..U....VeriSign,
0090: 20 49 6E 63 2E 31 37 30 35 06 03 55 04 0B 13 2E Inc.1705..U....
00A0: 43 6C 61 73 73 20 32 20 50 75 62 6C 69 63 20 50 Class 2 Public P
00B0: 72 69 6D 61 72 79 20 43 65 72 74 69 66 69 63 61 rimary Certifica
00C0: 74 69 6F 6E 20 41 75 74 68 6F 72 69 74 79 00 61 tion Authority.a
00D0: 30 5F 31 0B 30 09 06 03 55 04 06 13 02 55 53 31 0_1.0...U....US1
00E0: 17 30 15 06 03 55 04 0A 13 0E 56 65 72 69 53 69 .0...U....VeriSi
00F0: 67 6E 2C 20 49 6E 63 2E 31 37 30 35 06 03 55 04 gn, Inc.1705..U.
0100: 0B 13 2E 43 6C 61 73 73 20 31 20 50 75 62 6C 69 ...Class 1 Publi
0110: 63 20 50 72 69 6D 61 72 79 20 43 65 72 74 69 66 c Primary Certif
0120: 69 63 61 74 69 6F 6E 20 41 75 74 68 6F 72 69 74 ication Authorit
0130: 79 00 61 30 5F 31 0B 30 09 06 03 55 04 06 13 02 y.a0_1.0...U....
0140: 55 53 31 20 30 1E 06 03 55 04 0A 13 17 52 53 41 US1 0...U....RSA
0150: 20 44 61 74 61 20 53 65 63 75 72 69 74 79 2C 20 Data Security,
0160: 49 6E 63 2E 31 2E 30 2C 06 03 55 04 0B 13 25 53 Inc.1.0,..U...%S
0170: 65 63 75 72 65 20 53 65 72 76 65 72 20 43 65 72 ecure Server Cer
0180: 74 69 66 69 63 61 74 69 6F 6E 20 41 75 74 68 6F tification Autho
0190: 72 69 74 79 00 C7 30 81 C4 31 0B 30 09 06 03 55 rity..0..1.0...U
01A0: 04 06 13 02 5A 41 31 15 30 13 06 03 55 04 08 13 ....ZA1.0...U...
01B0: 0C 57 65 73 74 65 72 6E 20 43 61 70 65 31 12 30 .Western Cape1.0
01C0: 10 06 03 55 04 07 13 09 43 61 70 65 20 54 6F 77 ...U....Cape Tow
01D0: 6E 31 1D 30 1B 06 03 55 04 0A 13 14 54 68 61 77 n1.0...U....Thaw
01E0: 74 65 20 43 6F 6E 73 75 6C 74 69 6E 67 20 63 63 te Consulting cc
01F0: 31 28 30 26 06 03 55 04 0B 13 1F 43 65 72 74 69 1(0&..U....Certi
0200: 66 69 63 61 74 69 6F 6E 20 53 65 72 76 69 63 65 fication Service
0210: 73 20 44 69 76 69 73 69 6F 6E 31 19 30 17 06 03 s Division1.0...
0220: 55 04 03 13 10 54 68 61 77 74 65 20 53 65 72 76 U....Thawte Serv
0230: 65 72 20 43 41 31 26 30 24 06 09 2A 86 48 86 F7 er CA1&0$..*.H..
0240: 0D 01 09 01 16 17 73 65 72 76 65 72 2D 63 65 72 ......server-cer
0250: 74 73 40 74 68 61 77 74 65 2E 63 6F 6D 00 D1 30 ts@thawte.com..0
0260: 81 CE 31 0B 30 09 06 03 55 04 06 13 02 5A 41 31 ..1.0...U....ZA1
0270: 15 30 13 06 03 55 04 08 13 0C 57 65 73 74 65 72 .0...U....Wester
0280: 6E 20 43 61 70 65 31 12 30 10 06 03 55 04 07 13 n Cape1.0...U...
0290: 09 43 61 70 65 20 54 6F 77 6E 31 1D 30 1B 06 03 .Cape Town1.0...
02A0: 55 04 0A 13 14 54 68 61 77 74 65 20 43 6F 6E 73 U....Thawte Cons
02B0: 75 6C 74 69 6E 67 20 63 63 31 28 30 26 06 03 55 ulting cc1(0&..U
02C0: 04 0B 13 1F 43 65 72 74 69 66 69 63 61 74 69 6F ....Certificatio
02D0: 6E 20 53 65 72 76 69 63 65 73 20 44 69 76 69 73 n Services Divis
02E0: 69 6F 6E 31 21 30 1F 06 03 55 04 03 13 18 54 68 ion1!0...U....Th
02F0: 61 77 74 65 20 50 72 65 6D 69 75 6D 20 53 65 72 awte Premium Ser
0300: 76 65 72 20 43 41 31 28 30 26 06 09 2A 86 48 86 ver CA1(0&..*.H.
0310: F7 0D 01 09 01 16 19 70 72 65 6D 69 75 6D 2D 73 .......premium-s
0320: 65 72 76 65 72 40 74 68 61 77 74 65 2E 63 6F 6D erver@thawte.com
0330: 00 CE 30 81 CB 31 0B 30 09 06 03 55 04 06 13 02 ..0..1.0...U....
0340: 5A 41 31 15 30 13 06 03 55 04 08 13 0C 57 65 73 ZA1.0...U....Wes
0350: 74 65 72 6E 20 43 61 70 65 31 12 30 10 06 03 55 tern Cape1.0...U
0360: 04 07 13 09 43 61 70 65 20 54 6F 77 6E 31 1A 30 ....Cape Town1.0
0370: 18 06 03 55 04 0A 13 11 54 68 61 77 74 65 20 43 ...U....Thawte C
0380: 6F 6E 73 75 6C 74 69 6E 67 31 28 30 26 06 03 55 onsulting1(0&..U
0390: 04 0B 13 1F 43 65 72 74 69 66 69 63 61 74 69 6F ....Certificatio
03A0: 6E 20 53 65 72 76 69 63 65 73 20 44 69 76 69 73 n Services Divis
03B0: 69 6F 6E 31 21 30 1F 06 03 55 04 03 13 18 54 68 ion1!0...U....Th
03C0: 61 77 74 65 20 50 65 72 73 6F 6E 61 6C 20 42 61 awte Personal Ba
03D0: 73 69 63 20 43 41 31 28 30 26 06 09 2A 86 48 86 sic CA1(0&..*.H.
03E0: F7 0D 01 09 01 16 19 70 65 72 73 6F 6E 61 6C 2D .......personal-
03F0: 62 61 73 69 63 40 74 68 61 77 74 65 2E 63 6F 6D basic@thawte.com
0400: 00 D4 30 81 D1 31 0B 30 09 06 03 55 04 06 13 02 ..0..1.0...U....
0410: 5A 41 31 15 30 13 06 03 55 04 08 13 0C 57 65 73 ZA1.0...U....Wes
0420: 74 65 72 6E 20 43 61 70 65 31 12 30 10 06 03 55 tern Cape1.0...U
0430: 04 07 13 09 43 61 70 65 20 54 6F 77 6E 31 1A 30 ....Cape Town1.0
0440: 18 06 03 55 04 0A 13 11 54 68 61 77 74 65 20 43 ...U....Thawte C
0450: 6F 6E 73 75 6C 74 69 6E 67 31 28 30 26 06 03 55 onsulting1(0&..U
0460: 04 0B 13 1F 43 65 72 74 69 66 69 63 61 74 69 6F ....Certificatio
0470: 6E 20 53 65 72 76 69 63 65 73 20 44 69 76 69 73 n Services Divis
0480: 69 6F 6E 31 24 30 22 06 03 55 04 03 13 1B 54 68 ion1$0"..U....Th
0490: 61 77 74 65 20 50 65 72 73 6F 6E 61 6C 20 46 72 awte Personal Fr
04A0: 65 65 6D 61 69 6C 20 43 41 31 2B 30 29 06 09 2A eemail CA1+0)..*
04B0: 86 48 86 F7 0D 01 09 01 16 1C 70 65 72 73 6F 6E .H........person
04C0: 61 6C 2D 66 72 65 65 6D 61 69 6C 40 74 68 61 77 al-freemail@thaw
04D0: 74 65 2E 63 6F 6D 00 D2 30 81 CF 31 0B 30 09 06 te.com..0..1.0..
04E0: 03 55 04 06 13 02 5A 41 31 15 30 13 06 03 55 04 .U....ZA1.0...U.
04F0: 08 13 0C 57 65 73 74 65 72 6E 20 43 61 70 65 31 ...Western Cape1
0500: 12 30 10 06 03 55 04 07 13 09 43 61 70 65 20 54 .0...U....Cape T
0510: 6F 77 6E 31 1A 30 18 06 03 55 04 0A 13 11 54 68 own1.0...U....Th
0520: 61 77 74 65 20 43 6F 6E 73 75 6C 74 69 6E 67 31 awte Consulting1
0530: 28 30 26 06 03 55 04 0B 13 1F 43 65 72 74 69 66 (0&..U....Certif
0540: 69 63 61 74 69 6F 6E 20 53 65 72 76 69 63 65 73 ication Services
0550: 20 44 69 76 69 73 69 6F 6E 31 23 30 21 06 03 55 Division1#0!..U
0560: 04 03 13 1A 54 68 61 77 74 65 20 50 65 72 73 6F ....Thawte Perso
0570: 6E 61 6C 20 50 72 65 6D 69 75 6D 20 43 41 31 2A nal Premium CA1*
0580: 30 28 06 09 2A 86 48 86 F7 0D 01 09 01 16 1B 70 0(..*.H........p
0590: 65 72 73 6F 6E 61 6C 2D 70 72 65 6D 69 75 6D 40 ersonal-premium@
05A0: 74 68 61 77 74 65 2E 63 6F 6D 00 CF 30 81 CC 31 thawte.com..0..1
05B0: 17 30 15 06 03 55 04 0A 13 0E 56 65 72 69 53 69 .0...U....VeriSi
05C0: 67 6E 2C 20 49 6E 63 2E 31 1F 30 1D 06 03 55 04 gn, Inc.1.0...U.
05D0: 0B 13 16 56 65 72 69 53 69 67 6E 20 54 72 75 73 ...VeriSign Trus
05E0: 74 20 4E 65 74 77 6F 72 6B 31 46 30 44 06 03 55 t Network1F0D..U
05F0: 04 0B 13 3D 77 77 77 2E 76 65 72 69 73 69 67 6E ...=www.verisign
0600: 2E 63 6F 6D 2F 72 65 70 6F 73 69 74 6F 72 79 2F .com/repository/
0610: 52 50 41 20 49 6E 63 6F 72 70 2E 20 42 79 20 52 RPA Incorp. By R
0620: 65 66 2E 2C 4C 49 41 42 2E 4C 54 44 28 63 29 39 ef.,LIAB.LTD(c)9
0630: 38 31 48 30 46 06 03 55 04 03 13 3F 56 65 72 69 81H0F..U...?Veri
0640: 53 69 67 6E 20 43 6C 61 73 73 20 31 20 43 41 20 Sign Class 1 CA
0650: 49 6E 64 69 76 69 64 75 61 6C 20 53 75 62 73 63 Individual Subsc
0660: 72 69 62 65 72 2D 50 65 72 73 6F 6E 61 20 4E 6F riber-Persona No
0670: 74 20 56 61 6C 69 64 61 74 65 64 00 C4 30 81 C1 t Validated..0..
0680: 31 0B 30 09 06 03 55 04 06 13 02 55 53 31 17 30 1.0...U....US1.0
0690: 15 06 03 55 04 0A 13 0E 56 65 72 69 53 69 67 6E ...U....VeriSign
06A0: 2C 20 49 6E 63 2E 31 3C 30 3A 06 03 55 04 0B 13 , Inc.1<0:..U...
06B0: 33 43 6C 61 73 73 20 31 20 50 75 62 6C 69 63 20 3Class 1 Public
06C0: 50 72 69 6D 61 72 79 20 43 65 72 74 69 66 69 63 Primary Certific
06D0: 61 74 69 6F 6E 20 41 75 74 68 6F 72 69 74 79 20 ation Authority
06E0: 2D 20 47 32 31 3A 30 38 06 03 55 04 0B 13 31 28 - G21:08..U...1(
06F0: 63 29 20 31 39 39 38 20 56 65 72 69 53 69 67 6E c) 1998 VeriSign
0700: 2C 20 49 6E 63 2E 20 2D 20 46 6F 72 20 61 75 74 , Inc. - For aut
0710: 68 6F 72 69 7A 65 64 20 75 73 65 20 6F 6E 6C 79 horized use only
0720: 31 1F 30 1D 06 03 55 04 0B 13 16 56 65 72 69 53 1.0...U....VeriS
0730: 69 67 6E 20 54 72 75 73 74 20 4E 65 74 77 6F 72 ign Trust Networ
0740: 6B 00 C4 30 81 C1 31 0B 30 09 06 03 55 04 06 13 k..0..1.0...U...
0750: 02 55 53 31 17 30 15 06 03 55 04 0A 13 0E 56 65 .US1.0...U....Ve
0760: 72 69 53 69 67 6E 2C 20 49 6E 63 2E 31 3C 30 3A riSign, Inc.1<0:
0770: 06 03 55 04 0B 13 33 43 6C 61 73 73 20 32 20 50 ..U...3Class 2 P
0780: 75 62 6C 69 63 20 50 72 69 6D 61 72 79 20 43 65 ublic Primary Ce
0790: 72 74 69 66 69 63 61 74 69 6F 6E 20 41 75 74 68 rtification Auth
07A0: 6F 72 69 74 79 20 2D 20 47 32 31 3A 30 38 06 03 ority - G21:08..
07B0: 55 04 0B 13 31 28 63 29 20 31 39 39 38 20 56 65 U...1(c) 1998 Ve
07C0: 72 69 53 69 67 6E 2C 20 49 6E 63 2E 20 2D 20 46 riSign, Inc. - F
07D0: 6F 72 20 61 75 74 68 6F 72 69 7A 65 64 20 75 73 or authorized us
07E0: 65 20 6F 6E 6C 79 31 1F 30 1D 06 03 55 04 0B 13 e only1.0...U...
07F0: 16 56 65 72 69 53 69 67 6E 20 54 72 75 73 74 20 .VeriSign Trust
0800: 4E 65 74 77 6F 72 6B 00 C4 30 81 C1 31 0B 30 09 Network..0..1.0.
0810: 06 03 55 04 06 13 02 55 53 31 17 30 15 06 03 55 ..U....US1.0...U
0820: 04 0A 13 0E 56 65 72 69 53 69 67 6E 2C 20 49 6E ....VeriSign, In
0830: 63 2E 31 3C 30 3A 06 03 55 04 0B 13 33 43 6C 61 c.1<0:..U...3Cla
0840: 73 73 20 33 20 50 75 62 6C 69 63 20 50 72 69 6D ss 3 Public Prim
0850: 61 72 79 20 43 65 72 74 69 66 69 63 61 74 69 6F ary Certificatio
0860: 6E 20 41 75 74 68 6F 72 69 74 79 20 2D 20 47 32 n Authority - G2
0870: 31 3A 30 38 06 03 55 04 0B 13 31 28 63 29 20 31 1:08..U...1(c) 1
0880: 39 39 38 20 56 65 72 69 53 69 67 6E 2C 20 49 6E 998 VeriSign, In
0890: 63 2E 20 2D 20 46 6F 72 20 61 75 74 68 6F 72 69 c. - For authori
08A0: 7A 65 64 20 75 73 65 20 6F 6E 6C 79 31 1F 30 1D zed use only1.0.
08B0: 06 03 55 04 0B 13 16 56 65 72 69 53 69 67 6E 20 ..U....VeriSign
08C0: 54 72 75 73 74 20 4E 65 74 77 6F 72 6B 00 BD 30 Trust Network..0
08D0: 81 BA 31 1F 30 1D 06 03 55 04 0A 13 16 56 65 72 ..1.0...U....Ver
08E0: 69 53 69 67 6E 20 54 72 75 73 74 20 4E 65 74 77 iSign Trust Netw
08F0: 6F 72 6B 31 17 30 15 06 03 55 04 0B 13 0E 56 65 ork1.0...U....Ve
0900: 72 69 53 69 67 6E 2C 20 49 6E 63 2E 31 33 30 31 riSign, Inc.1301
0910: 06 03 55 04 0B 13 2A 56 65 72 69 53 69 67 6E 20 ..U...*VeriSign
0920: 49 6E 74 65 72 6E 61 74 69 6F 6E 61 6C 20 53 65 International Se
0930: 72 76 65 72 20 43 41 20 2D 20 43 6C 61 73 73 20 rver CA - Class
0940: 33 31 49 30 47 06 03 55 04 0B 13 40 77 77 77 2E 31I0G..U...@www.
0950: 76 65 72 69 73 69 67 6E 2E 63 6F 6D 2F 43 50 53 verisign.com/CPS
0960: 20 49 6E 63 6F 72 70 2E 62 79 20 52 65 66 2E 20 Incorp.by Ref.
0970: 4C 49 41 42 49 4C 49 54 59 20 4C 54 44 2E 28 63 LIABILITY LTD.(c
0980: 29 39 37 20 56 65 72 69 53 69 67 6E 00 45 30 43 )97 VeriSign.E0C
0990: 31 11 30 0F 06 03 55 04 0A 13 08 56 65 72 69 53 1.0...U....VeriS
09A0: 69 67 6E 31 2E 30 2C 06 03 55 04 0B 13 25 56 65 ign1.0,..U...%Ve
09B0: 72 69 53 69 67 6E 20 43 6C 61 73 73 20 32 20 4F riSign Class 2 O
09C0: 6E 53 69 74 65 20 49 6E 64 69 76 69 64 75 61 6C nSite Individual
09D0: 20 43 41 00 2E 30 2C 31 0B 30 09 06 03 55 04 06 CA..0,1.0...U..
09E0: 13 02 43 4E 31 0D 30 0B 06 03 55 04 0A 13 04 42 ..CN1.0...U....B
09F0: 4D 43 43 31 0E 30 0C 06 03 55 04 03 13 05 45 44 MCC1.0...U....ED
0A00: 53 4D 50 00 30 30 2E 31 0B 30 09 06 03 55 04 06 SMP.00.1.0...U..
0A10: 13 02 43 4E 31 0D 30 0B 06 03 55 04 0A 13 04 42 ..CN1.0...U....B
0A20: 4D 43 43 31 10 30 0E 06 03 55 04 03 13 07 4D 51 MCC1.0...U....MQ
0A30: 43 30 30 30 31 C0001
*** ServerHelloDone
[read] MD5 and SHA1 hashes: len = 4
0000: 0E 00 00 00 ....
main, SEND SSL v3.0 ALERT: warning, description = no_certificate
main, WRITE: SSL v3.0 Alert, length = 2
*** ClientKeyExchange, RSA PreMasterSecret, v3.0
Random Secret: { 3, 0, 83, 126, 97, 186, 223, 244, 161, 44, 84, 154, 3, 98, 81,
171, 133, 177, 45, 39, 58, 145, 90, 9, 134, 170, 29, 27, 7, 72, 230, 134, 0, 62
, 55, 30, 68, 111, 91, 65, 59, 200, 74, 114, 91, 213, 225, 80 }
[write] MD5 and SHA1 hashes: len = 68
0000: 10 00 00 40 6F 1B 42 38 B0 F0 DA D8 35 58 35 52 ...@o.B8....5X5R
0010: 13 D5 B9 31 E5 2C BB 07 93 19 97 C4 04 9D DA F9 ...1.,..........
0020: E5 4A 79 0B E1 9A 94 83 FA 62 EF C2 6B 13 03 3F .Jy......b..k..?
0030: D5 5D 39 F7 41 A6 F2 65 65 BC E8 21 51 69 6F 01 .]9.A..ee..!Qio.
0040: C4 2B 4B 53 .+KS
main, WRITE: SSL v3.0 Handshake, length = 68
SESSION KEYGEN:
PreMaster Secret:
0000: 03 00 53 7E 61 BA DF F4 A1 2C 54 9A 03 62 51 AB ..S.a....,T..bQ.
0010: 85 B1 2D 27 3A 91 5A 09 86 AA 1D 1B 07 48 E6 86 ..-':.Z......H..
0020: 00 3E 37 1E 44 6F 5B 41 3B C8 4A 72 5B D5 E1 50 .>7.Do[A;.Jr[..P
CONNECTION KEYGEN:
Client Nonce:
0000: 42 5C 80 53 A0 0B F0 C2 A9 0A D7 B2 6C 4A 64 7C B\.S........lJd.
0010: 9E D5 4C 37 9E 6C 89 03 58 DF 49 DD E1 75 A4 46 ..L7.l..X.I..u.F
Server Nonce:
0000: 20 3D FD E0 37 28 41 21 15 0B E6 79 DE F4 F4 18 =..7(A!...y....
0010: 75 B2 59 48 9F C0 20 A3 02 9D 15 39 D6 20 89 B3 u.YH.. ....9. ..
Master Secret:
0000: 23 51 2E 7B D6 2F 57 D3 45 EF 7C 46 6A 9A 64 76 #Q.../W.E..Fj.dv
0010: 06 E6 DF 2D 99 7B B6 96 77 79 F6 E5 20 7B AD 0A ...-....wy.. ...
0020: A6 B0 43 6A CC 10 25 3D 4E 86 08 1D 71 F0 8E 69 ..Cj..%=N...q..i
Client MAC write Secret:
0000: 5B 95 12 A0 D2 E3 EB C7 E5 97 14 84 68 F0 68 FC [...........h.h.
Server MAC write Secret:
0000: 4C 8A B5 AA 23 56 26 7F 9E 81 E1 1E 9F 94 49 2F L...#V&.......I/
Client write key:
0000: D1 A4 13 55 C3 16 D1 FF 24 A4 9C BA 0B ED 5C F0 ...U....$.....\.
Server write key:
0000: 2A 2B F0 82 D1 C5 F8 86 AD 7B C0 61 16 DF B1 75 *+.........a...u
... no IV for cipher
main, WRITE: SSL v3.0 Change Cipher Spec, length = 1
*** Finished, v3.0
MD5 Hash: { 174, 106, 88, 163, 14, 122, 206, 119, 123, 35, 100, 0, 114, 51, 92,
222 }
SHA1 Hash: { 101, 76, 228, 222, 248, 187, 194, 113, 86, 131, 145, 251, 45, 157,
114, 172, 64, 233, 187, 96 }
***
[write] MD5 and SHA1 hashes: len = 40
0000: 14 00 00 24 AE 6A 58 A3 0E 7A CE 77 7B 23 64 00 ...$.jX..z.w.#d.
0010: 72 33 5C DE 65 4C E4 DE F8 BB C2 71 56 83 91 FB r3\.eL.....qV...
0020: 2D 9D 72 AC 40 E9 BB 60 -.r.@..`
Plaintext before ENCRYPTION: len = 56
0000: 14 00 00 24 AE 6A 58 A3 0E 7A CE 77 7B 23 64 00 ...$.jX..z.w.#d.
0010: 72 33 5C DE 65 4C E4 DE F8 BB C2 71 56 83 91 FB r3\.eL.....qV...
0020: 2D 9D 72 AC 40 E9 BB 60 99 4A 8B 08 E8 A4 A1 E5 -.r.@..`.J......
0030: C8 62 55 74 A4 92 CF 2D .bUt...-
main, WRITE: SSL v3.0 Handshake, length = 56
main, READ: SSL v3.0 Change Cipher Spec, length = 1
main, READ: SSL v3.0 Handshake, length = 56
Plaintext after DECRYPTION: len = 56
0000: 14 00 00 24 C3 86 BD 43 12 58 E8 ED 57 99 D5 02 ...$...C.X..W...
0010: 88 14 3E E6 6D 2A 09 94 69 21 D8 19 5B A5 C0 19 ..>.m*..i!..[...
0020: AE 7F 5D 54 29 17 35 FD E8 97 0D 1C 1B 08 31 86 ..]T).5.......1.
0030: DD 70 EC ED 1D 6B D4 93 .p...k..
*** Finished, v3.0
MD5 Hash: { 195, 134, 189, 67, 18, 88, 232, 237, 87, 153, 213, 2, 136, 20, 62,
230 }
SHA1 Hash: { 109, 42, 9, 148, 105, 33, 216, 25, 91, 165, 192, 25, 174, 127, 93,
84, 41, 23, 53, 253 }
***
%% Cached client session: [Session-1, SSL_RSA_EXPORT_WITH_RC4_40_MD5]
[read] MD5 and SHA1 hashes: len = 40
0000: 14 00 00 24 C3 86 BD 43 12 58 E8 ED 57 99 D5 02 ...$...C.X..W...
0010: 88 14 3E E6 6D 2A 09 94 69 21 D8 19 5B A5 C0 19 ..>.m*..i!..[...
0020: AE 7F 5D 54 29 17 35 FD ..]T).5.
Plaintext before ENCRYPTION: len = 146
0000: 54 53 48 20 00 00 00 82 01 01 31 00 00 00 00 00 TSH ......1.....
0010: 00 00 00 00 00 00 01 11 03 33 00 00 49 44 20 20 .........3..ID
0020: FF 25 00 00 00 00 00 32 00 00 7F FE 06 40 00 00 .%.....2.....@..
0030: 3B 9A C9 FF 53 53 4C 54 45 53 54 20 20 20 20 20 ;...SSLTEST
0040: 20 20 20 20 20 20 20 20 01 00 03 33 20 20 20 20 ...3
0050: 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
0060: 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
0070: 20 20 20 20 20 20 20 20 20 20 20 20 00 00 00 01 ....
0080: 00 00 D4 5C B5 EC DF D7 32 44 03 C8 7B 94 5A C9 ...\....2D....Z.
0090: 4E 3F N?
main, WRITE: SSL v3.0 Application Data, length = 146
main, READ: SSL v3.0 Application Data, length = 52
Plaintext after DECRYPTION: len = 52
0000: 54 53 48 20 00 00 00 24 01 05 0A 00 00 00 00 00 TSH ...$........
0010: 00 00 00 00 00 00 01 11 03 33 00 00 00 00 00 08 .........3......
0020: 00 00 00 1A A9 53 CF 66 61 23 F9 1B BF 28 06 A6 .....S.fa#...(..
0030: 90 35 16 83 .5..
Plaintext before ENCRYPTION: len = 44
0000: 54 53 48 20 00 00 00 1C 01 05 38 00 00 00 00 00 TSH ......8.....
0010: 00 00 00 00 00 00 01 11 03 33 00 00 FC B8 22 00 .........3....".
0020: B8 21 FB 75 4F 94 92 44 FF 4A 76 64 .!.uO..D.Jvd
main, WRITE: SSL v3.0 Application Data, length = 44
main, SEND SSL v3.0 ALERT: warning, description = close_notify
Plaintext before ENCRYPTION: len = 18
0000: 01 00 D2 AF 69 BC F9 55 C2 E2 10 AD A8 A4 09 0F ....i..U........
0010: ED 4A .J
main, WRITE: SSL v3.0 Alert, length = 18
MQJE001:MQException:Completion Code 2,Reason 2009
MQJE016:MQ queue manager closed channel immediately during connect,
Closure Reason = 2009
MQJE001:Completion Code 2,Reason 2009
com.ibm.mq.MQException: MQJE001:Completion Code 2,Reason 2009
at com.ibm.mq.MQManagedConnectionJ11.<init>(MQManagedConnectionJ11.java:
172)
at com.ibm.mq.MQClientManagedConnectionFactoryJ11._createManagedConnecti
on(MQClientManagedConnectionFactoryJ11.java:270)
at com.ibm.mq.MQClientManagedConnectionFactoryJ11.createManagedConnectio
n(MQClientManagedConnectionFactoryJ11.java:290)
at com.ibm.mq.StoredManagedConnection.<init>(StoredManagedConnection.jav
a:80)
at com.ibm.mq.MQSimpleConnectionManager.allocateConnection(MQSimpleConne
ctionManager.java:150)
at com.ibm.mq.MQQueueManager.obtainBaseMQQueueManager(MQQueueManager.jav
a:682)
at com.ibm.mq.MQQueueManager.construct(MQQueueManager.java:620)
at com.ibm.mq.MQQueueManager.<init>(MQQueueManager.java:393)
at test.MQSend.<init>(MQSend.java:35)
at test.MQSend.main(MQSend.java:13)
WebSphere MQ error occurred : Completion code 2 Reason code 2009 Cause null |
|
Back to top |
|
 |
Tibor |
Posted: Tue Apr 12, 2005 11:28 pm Post subject: |
|
|
 Grand Master
Joined: 20 May 2001 Posts: 1033 Location: Hungary
|
wuyd,
There are 2 line in your trace:
Quote: |
main, SEND SSL v3.0 ALERT: warning, description = no_certificate
main, WRITE: SSL v3.0 Alert, length = 2 |
I think this is the real error message.
Tibor |
|
Back to top |
|
 |
wuyd |
Posted: Wed Apr 13, 2005 12:14 am Post subject: |
|
|
Novice
Joined: 11 Apr 2005 Posts: 14
|
Tibor,
Does this real message means client side could not get the certificate?
But I just setup the MQ Server environment in WinXP, and using .p12 file generated by AIX, config the channel to use ssl, and the java client(also used to connect to AIX MQ server) could connect to QMGR in WinXP through ssl.
wuyd |
|
Back to top |
|
 |
wuyd |
Posted: Wed Apr 13, 2005 5:57 pm Post subject: |
|
|
Novice
Joined: 11 Apr 2005 Posts: 14
|
Tibor,
I want to say VERY VERY MUCH thanks to you. When using cert store generated by gsk6cmd, it works.
Does this means my jdk's cert store has some compatible problems with MQ's?
wuyd |
|
Back to top |
|
 |
Tibor |
Posted: Wed Apr 13, 2005 11:59 pm Post subject: |
|
|
 Grand Master
Joined: 20 May 2001 Posts: 1033 Location: Hungary
|
wuyd,
This is a keytool problem, just look an earlier post about it:
Quote: |
To generate my JKS keystore from a PKCS#12 file, I use
java -classpath org.mortbay.jetty.jar org.mortbay.util.PKCS12Import file.p12 file.jks
The jar file comes from the jetty servlet engine distribution.
For the JKS truststore (I have a separate truststore that only contains the CA certificates) I use the J2SE keytool.
Note that the J2SE keytool is not able to import private keys into a keystore, it only imports public keys. You need to import the private keys if you have defined your svrconn channel with sslcauth(required). I have only found 2 free tools to do this:
* the Jetty jar file above
* if you download the J2EE SDK from Sun, it should contain an improved keytool that is able to import private keys
|
Tibor |
|
Back to top |
|
 |
|
|
 |
Goto page 1, 2 Next |
Page 1 of 2 |
|
You cannot post new topics in this forum You cannot reply to topics in this forum You cannot edit your posts in this forum You cannot delete your posts in this forum You cannot vote in polls in this forum
|
|
|
|