trigger seeding of SecureRandom
done seeding SecureRandom
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256
Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384
Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256
Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384
Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384
Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256
Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256
Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256
Allow unsafe renegotiation: false
Allow legacy hello messages: true
Is initial handshake: true
Is secure renegotiation: false
%% No cached client session
*** ClientHello, TLSv1
RandomCookie: GMT: 1481567117 bytes = { 211, 192, 44, 161, 64, 136, 122, 205, 165, 230, 65, 56, 59, 137, 221, 86, 241, 169, 16, 53, 116, 221, 131, 32, 205, 212, 253, 4 }
Session ID: {}
Cipher Suites: [TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDH_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_DSS_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, TLS_ECDHE_ECDSA_WITH_RC4_128_SHA, TLS_ECDHE_RSA_WITH_RC4_128_SHA, SSL_RSA_WITH_RC4_128_SHA, TLS_ECDH_ECDSA_WITH_RC4_128_SHA, TLS_ECDH_RSA_WITH_RC4_128_SHA, TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_RC4_128_MD5, TLS_EMPTY_RENEGOTIATION_INFO_SCSV]
Compression Methods: { 0 }
Extension elliptic_curves, curve names: {secp256r1, sect163k1, sect163r2, secp192r1, secp224r1, sect233k1, sect233r1, sect283k1, sect283r1, secp384r1, sect409k1, sect409r1, secp521r1, sect571k1, sect571r1, secp160k1, secp160r1, secp160r2, sect163r1, secp192k1, sect193r1, sect193r2, secp224k1, sect239k1, secp256k1}
Extension ec_point_formats, formats: [uncompressed]
***
[write] MD5 and SHA1 hashes: len = 163
main, WRITE: TLSv1 Handshake, length = 163
[Raw write]: length = 168
........
[Raw read]: length = 5
0000: 16 03 01 03 27 ....'
[Raw read]: length = 807
.._....
main, READ: TLSv1 Handshake, length = 807
*** ServerHello, TLSv1
RandomCookie: GMT: 1481567117 bytes = { 50, 90, 110, 173, 63, 133, 211, 19, 213, 52, 121, 153, 180, 61, 109, 9, 79, 65, 79, 162, 69, 239, 77, 234, 84, 156, 221, 186 }
Session ID: {238, 16, 0, 0, 163, 1, 113, 248, 86, 72, 92, 204, 220, 27, 2, 3, 125, 91, 56, 205, 249, 46, 79, 73, 80, 63, 89, 15, 27, 83, 51, 221}
Cipher Suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
Compression Method: 0
Extension renegotiation_info, renegotiated_connection: <empty>
***
%% Initialized: [Session-1, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]
** TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
[read] MD5 and SHA1 hashes: len = 81
.
*** Certificate chain
chain [0] = [
[
Version: V3
Subject: CN=SSL_Self_Signed_Fallback
Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5
Key: Sun RSA public key, 1024 bits
modulus: 95422667998038620095717136296546502868155143574909079882534272667519446041573093105224169057235896235785065572587765350078332906524694695565075484824076770781529967783510629935879282880936627489280695240291738911857790539820734098704607907400970277468632285982033512324651958647226804776551544146815217336463
public exponent: 65537
Validity: [From: Sat Nov 26 22:00:49 GMT+05:00 2016,
To: Mon Nov 26 22:00:49 GMT+05:00 2046]
Issuer: CN=SSL_Self_Signed_Fallback
SerialNumber: [ 27858a22 5d9acc8a 48cbbad7 abe6bf2a]
]
Algorithm: [SHA1withRSA]
Signature:
]
***
[read] MD5 and SHA1 hashes: len = 519
*** ECDH ServerKeyExchange
Server key: Sun EC public key, 256 bits
public x coord: 31164785403102919669884531893978833655876191175023849484538934842298882523989
public y coord: 110505941365010239681036319516345586881365769448738067250087251852633452331862
parameters: secp256r1 [NIST P-256, X9.62 prime256v1] (1.2.840.10045.3.1.7)
[read] MD5 and SHA1 hashes: len = 203
*** ServerHelloDone
[read] MD5 and SHA1 hashes: len = 4
0000: 0E 00 00 00 ....
*** ECDHClientKeyExchange
ECDH Public value: { 4, 213, 253, 66, 155, 53, 109, 118, 153, 117, 204, 69, 204, 109, 101, 160, 144, 81, 86, 10, 245, 209, 16, 73, 87, 91, 227, 2, 72, 243, 141, 120, 171, 234, 252, 127, 9, 133, 23, 186, 188, 229, 19, 230, 69, 76, 201, 196, 183, 134, 115, 192, 174, 81, 174, 197, 249, 20, 54, 247, 130, 196, 2, 247, 24 }
[write] MD5 and SHA1 hashes: len = 70
0000: 10 00 00 42 41 04 D5 FD 42 9B 35 6D 76 99 75 CC ...BA...B.5mv.u.
0010: 45 CC 6D 65 A0 90 51 56 0A F5 D1 10 49 57 5B E3 E.me..QV....IW[.
0020: 02 48 F3 8D 78 AB EA FC 7F 09 85 17 BA BC E5 13 .H..x...........
0030: E6 45 4C C9 C4 B7 86 73 C0 AE 51 AE C5 F9 14 36 .EL....s..Q....6
0040: F7 82 C4 02 F7 18 ......
main, WRITE: TLSv1 Handshake, length = 70
[Raw write]: length = 75
0000: 16 03 01 00 46 10 00 00 42 41 04 D5 FD 42 9B 35 ....F...BA...B.5
0010: 6D 76 99 75 CC 45 CC 6D 65 A0 90 51 56 0A F5 D1 mv.u.E.me..QV...
0020: 10 49 57 5B E3 02 48 F3 8D 78 AB EA FC 7F 09 85 .IW[..H..x......
0030: 17 BA BC E5 13 E6 45 4C C9 C4 B7 86 73 C0 AE 51 ......EL....s..Q
0040: AE C5 F9 14 36 F7 82 C4 02 F7 18 ....6......
SESSION KEYGEN:
PreMaster Secret:
0000: 4C 20 7B 2E C7 67 01 60 BB 4B BB 1B 6D 63 9F D4 L ...g.`.K..mc..
0010: F5 D8 9A BF C8 2A 21 26 98 20 59 45 50 38 74 42 .....*!&. YEP8tB
CONNECTION KEYGEN:
Client Nonce:
0000: 58 4F EC 8D D3 C0 2C A1 40 88 7A CD A5 E6 41 38 XO....,.@.z...A8
0010: 3B 89 DD 56 F1 A9 10 35 74 DD 83 20 CD D4 FD 04 ;..V...5t.. ....
Server Nonce:
0000: 58 4F EC 8D 32 5A 6E AD 3F 85 D3 13 D5 34 79 99 XO..2Zn.?....4y.
0010: B4 3D 6D 09 4F 41 4F A2 45 EF 4D EA 54 9C DD BA .=m.OAO.E.M.T...
Master Secret:
0000: EF 09 57 E4 92 A2 D0 54 41 04 11 56 A9 D5 9C 47 ..W....TA..V...G
0010: DE 03 B8 4C 55 F2 9E 42 4F 1F 57 65 B3 C3 38 AA ...LU..BO.We..8.
0020: 87 6B 02 C2 CD 1A 53 29 71 9F 37 59 BC D2 B6 5E .k....S)q.7Y...^
Client MAC write Secret:
0000: 76 C5 35 62 CD F5 67 11 8B 29 11 39 B3 73 A0 47 v.5b..g..).9.s.G
0010: CA 4F D7 34 .O.4
Server MAC write Secret:
0000: 11 C0 61 0A 8E 24 A5 A0 DC 3C 83 8A B1 4B 21 2D ..a..$...<...K!-
0010: 06 03 7F 78 ...x
Client write key:
0000: 8B F3 43 13 51 74 62 3E F2 8A B4 13 6A 40 ED 4F ..C.Qtb>....j@.O
0010: 51 BB 5F D1 8F 9F 37 65 D3 65 81 D0 4D D1 49 F0 Q._...7e.e..M.I.
Server write key:
0000: E8 24 DE D3 CA B6 FB 1C 82 3D DB 08 E0 6E 67 02 .$.......=...ng.
0010: 5A E6 E8 E1 EE B8 E1 FF F0 03 B1 F3 1E B6 21 96 Z.............!.
Client write IV:
0000: 99 1A 9C 4C 13 E9 98 4D 78 7D 22 B7 35 BD 6B 31 ...L...Mx.".5.k1
Server write IV:
0000: 0A BE 0D 9E CB 1C 05 DB B6 9D 15 B1 43 DE 26 FC ............C.&.
main, WRITE: TLSv1 Change Cipher Spec, length = 1
[Raw write]: length = 6
0000: 14 03 01 00 01 01 ......
*** Finished
verify_data: { 209, 235, 181, 143, 143, 12, 249, 129, 111, 254, 104, 210 }
***
[write] MD5 and SHA1 hashes: len = 16
0000: 14 00 00 0C D1 EB B5 8F 8F 0C F9 81 6F FE 68 D2 ............o.h.
Padded plaintext before ENCRYPTION: len = 48
0000: 14 00 00 0C D1 EB B5 8F 8F 0C F9 81 6F FE 68 D2 ............o.h.
0010: 7C FC 1B C6 49 10 F4 4F 69 13 E0 8C 99 B5 29 69 ....I..Oi.....)i
0020: 81 4E 91 69 0B 0B 0B 0B 0B 0B 0B 0B 0B 0B 0B 0B .N.i............
main, WRITE: TLSv1 Handshake, length = 48
[Raw write]: length = 53
..(`.
[Raw read]: length = 5
0000: 14 03 01 00 01 .....
[Raw read]: length = 1
0000: 01 .
main, READ: TLSv1 Change Cipher Spec, length = 1
[Raw read]: length = 5
0000: 16 03 01 00 30 ....0
[Raw read]: length = 48
main, READ: TLSv1 Handshake, length = 48
Padded plaintext after DECRYPTION: len = 48
*** Finished
verify_data: { 145, 143, 55, 15, 140, 174, 110, 57, 96, 175, 115, 114 }
***
%% Cached client session: [Session-1, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]
[read] MD5 and SHA1 hashes: len = 16
0000: 14 00 00 0C 91 8F 37 0F 8C AE 6E 39 60 AF 73 72 ......7...n9`.sr
Padded plaintext before ENCRYPTION: len = 352
main, WRITE: TLSv1 Application Data, length = 352
[Raw write]: length = 357
main, called close()
main, called closeInternal(true)
main, SEND TLSv1 ALERT: warning, description = close_notify
Padded plaintext before ENCRYPTION: len = 32
0000: 01 00 EE A3 12 4F C5 2E 7B 7B 2A 2A 22 7E CF 79 .....O....**"..y
0010: 20 18 01 98 4D 02 09 09 09 09 09 09 09 09 09 09 ...M...........
main, WRITE: TLSv1 Alert, length = 32
[Raw write]: length = 37
0000: 15 03 01 00 20 8E E0 AC 85 71 E2 61 84 09 87 4C .... ....q.a...L
0010: 64 13 49 86 EF D7 EE A1 98 E6 50 9D 15 04 00 D3 d.I.......P.....
0020: B7 1F 1D 69 8F ...i.
main, called closeSocket(selfInitiated)
main, waiting for close_notify or alert: state 5
main, received EOFException: ignored
main, called closeInternal(false)
main, close invoked again; state = 5
Finalizer, called close()
Finalizer, called closeInternal(true)
setting up default SSLSocketFactory
class ru.CryptoPro.ssl.SSLSocketFactoryImpl is loaded
дек 13, 2016 5:42:00 PM ru.CryptoPro.ssl.A run
FINE: Applet launched: false
дек 13, 2016 5:42:00 PM ru.CryptoPro.ssl.A run
FINE: Applet launched: false
дек 13, 2016 5:42:00 PM ru.CryptoPro.ssl.SSLContextImpl d
INFO: keyStore is : d:\Temp\HDImage\stepnov-.000
дек 13, 2016 5:42:00 PM ru.CryptoPro.ssl.SSLContextImpl d
INFO: keyStore is : d:\Temp\HDImage\stepnov-.000
дек 13, 2016 5:42:00 PM ru.CryptoPro.ssl.SSLContextImpl d
INFO: keyStore type is : HDImageStore
дек 13, 2016 5:42:00 PM ru.CryptoPro.ssl.SSLContextImpl d
INFO: keyStore type is : HDImageStore
дек 13, 2016 5:42:00 PM ru.CryptoPro.ssl.SSLContextImpl d
INFO: keyStore provider is : JCP
дек 13, 2016 5:42:00 PM ru.CryptoPro.ssl.SSLContextImpl d
INFO: keyStore provider is : JCP
дек 13, 2016 5:42:00 PM ru.CryptoPro.ssl.SSLContextImpl d
INFO: init key store
дек 13, 2016 5:42:00 PM ru.CryptoPro.ssl.SSLContextImpl d
INFO: init key store
дек 13, 2016 5:42:00 PM ru.CryptoPro.ssl.SSLContextImpl d
INFO: defaultStoreProvider =
дек 13, 2016 5:42:00 PM ru.CryptoPro.ssl.SSLContextImpl d
INFO: defaultStoreProvider =
дек 13, 2016 5:42:00 PM ru.CryptoPro.ssl.SSLContextImpl d
INFO: JCP
дек 13, 2016 5:42:00 PM ru.CryptoPro.ssl.SSLContextImpl d
INFO: JCP
дек 13, 2016 5:42:00 PM ru.CryptoPro.JCP.tools.Starter check
INFO: Loading JCP 2.0 37748
дек 13, 2016 5:42:00 PM ru.CryptoPro.JCP.tools.Starter check
INFO: JCP loaded.
дек 13, 2016 5:42:00 PM ru.CryptoPro.ssl.SSLContextImpl d
INFO: init key manager of type GostX509
дек 13, 2016 5:42:00 PM ru.CryptoPro.ssl.SSLContextImpl d
INFO: init key manager of type GostX509
дек 13, 2016 5:42:00 PM ru.CryptoPro.ssl.r <init>
FINE: %% adding as private keys %%
дек 13, 2016 5:42:00 PM ru.CryptoPro.ssl.r <init>
FINE: %% adding as private keys %%
дек 13, 2016 5:42:00 PM ru.CryptoPro.ssl.r <init>
FINE:
found key: stepnov-17
дек 13, 2016 5:42:00 PM ru.CryptoPro.ssl.r <init>
FINE:
found key: stepnov-17
дек 13, 2016 5:42:00 PM ru.CryptoPro.ssl.r <init>
FINE:
Certificate chain [0] for key:stepnov-17
Subject: SURNAME=Степнов, GIVENNAME=Сергей, INITIALS=С.М., T=Директор, CN=Степнов Сергей Михайлович, OU=Администрация, O="ГКУЗ ПК \"ПКМИАЦ\"", L=Пермь, ST=Пермь, C=RU, EMAILADDRESS=stepnov@omiac.com, OID.1.2.643.100.1=#120D31303235393030393031393439, OID.1.2.643.100.3=#120B3035333838313130373632
Valid from Fri Oct 14 11:17:00 GMT+05:00 2016 until Sun Jan 14 11:27:00 GMT+05:00 2018
дек 13, 2016 5:42:00 PM ru.CryptoPro.ssl.r <init>
FINE:
Certificate chain [0] for key:stepnov-17
Subject: SURNAME=Степнов, GIVENNAME=Сергей, INITIALS=С.М., T=Директор, CN=Степнов Сергей Михайлович, OU=Администрация, O="ГКУЗ ПК \"ПКМИАЦ\"", L=Пермь, ST=Пермь, C=RU, EMAILADDRESS=stepnov@omiac.com, OID.1.2.643.100.1=#120D31303235393030393031393439, OID.1.2.643.100.3=#120B3035333838313130373632
Valid from Fri Oct 14 11:17:00 GMT+05:00 2016 until Sun Jan 14 11:27:00 GMT+05:00 2018
дек 13, 2016 5:42:00 PM ru.CryptoPro.ssl.SSLContextImpl d
INFO: trustStore is:
дек 13, 2016 5:42:00 PM ru.CryptoPro.ssl.SSLContextImpl d
INFO: trustStore is:
дек 13, 2016 5:42:00 PM ru.CryptoPro.ssl.SSLContextImpl d
INFO: trustStore type is :
дек 13, 2016 5:42:00 PM ru.CryptoPro.ssl.SSLContextImpl d
INFO: trustStore type is :
дек 13, 2016 5:42:00 PM ru.CryptoPro.ssl.SSLContextImpl d
INFO: trustStore provider is :
дек 13, 2016 5:42:00 PM ru.CryptoPro.ssl.SSLContextImpl d
INFO: trustStore provider is :
дек 13, 2016 5:42:00 PM ru.CryptoPro.ssl.SSLContextImpl d
INFO: init trust store
дек 13, 2016 5:42:00 PM ru.CryptoPro.ssl.SSLContextImpl d
INFO: init trust store
дек 13, 2016 5:42:00 PM ru.CryptoPro.ssl.SSLContextImpl d
INFO: init trust manager of type GostX509
дек 13, 2016 5:42:00 PM ru.CryptoPro.ssl.SSLContextImpl d
INFO: init trust manager of type GostX509
дек 13, 2016 5:42:00 PM ru.CryptoPro.ssl.g <init>
FINE: Trusted certificates: key store.
дек 13, 2016 5:42:00 PM ru.CryptoPro.ssl.g <init>
FINE: Trusted certificates: key store.
дек 13, 2016 5:42:00 PM ru.CryptoPro.ssl.g a
FINE:
%% adding as trusted certificates %%
дек 13, 2016 5:42:00 PM ru.CryptoPro.ssl.g a
FINE:
%% adding as trusted certificates %%
дек 13, 2016 5:42:00 PM ru.CryptoPro.ssl.SSLContextImpl d
INFO: init context...
дек 13, 2016 5:42:00 PM ru.CryptoPro.ssl.SSLContextImpl d
INFO: init context...
дек 13, 2016 5:42:00 PM ru.CryptoPro.ssl.SSLContextImpl engineInit
FINE: SSLContext engineInit
дек 13, 2016 5:42:00 PM ru.CryptoPro.ssl.SSLContextImpl engineInit
FINE: SSLContext engineInit
дек 13, 2016 5:42:00 PM ru.CryptoPro.ssl.SSLContextImpl d
INFO: Context initiated.
дек 13, 2016 5:42:00 PM ru.CryptoPro.ssl.SSLContextImpl d
INFO: Context initiated.
instantiated an instance of class ru.CryptoPro.ssl.SSLSocketFactoryImpl
дек 13, 2016 5:42:00 PM ru.CryptoPro.ssl.g <init>
FINE: Trusted certificates: empty set.
дек 13, 2016 5:42:00 PM ru.CryptoPro.ssl.g <init>
FINE: Trusted certificates: empty set.
дек 13, 2016 5:42:00 PM ru.CryptoPro.ssl.g a
FINE:
%% adding as trusted certificates %%
дек 13, 2016 5:42:00 PM ru.CryptoPro.ssl.g a
FINE:
%% adding as trusted certificates %%
trigger seeding of SecureRandom
done seeding SecureRandom
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256
Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384
Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256
Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384
Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384
Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256
Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256
Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256
Allow unsafe renegotiation: false
Allow legacy hello messages: true
Is initial handshake: true
Is secure renegotiation: false
main, setSoTimeout(240000) called
Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for SSLv3
Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for SSLv3
Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 for SSLv3
Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 for SSLv3
Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 for SSLv3
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for SSLv3
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for SSLv3
Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1
Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLSv1
Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 for TLSv1
Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1
Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1
Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384
Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256
Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384
Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256
Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256
Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256
Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256
Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256
Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256
Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256
%% No cached client session
*** ClientHello, TLSv1
RandomCookie: GMT: 1481567128 bytes = { 228, 87, 111, 255, 103, 199, 130, 126, 98, 226, 22, 139, 77, 237, 219, 250, 194, 43, 14, 181, 49, 115, 30, 179, 76, 172, 209, 59 }
Session ID: {}
Cipher Suites: [TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDH_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_DSS_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, TLS_ECDHE_ECDSA_WITH_RC4_128_SHA, TLS_ECDHE_RSA_WITH_RC4_128_SHA, SSL_RSA_WITH_RC4_128_SHA, TLS_ECDH_ECDSA_WITH_RC4_128_SHA, TLS_ECDH_RSA_WITH_RC4_128_SHA, TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_RC4_128_MD5, TLS_EMPTY_RENEGOTIATION_INFO_SCSV, SSL_RSA_WITH_DES_CBC_SHA, SSL_DHE_RSA_WITH_DES_CBC_SHA, SSL_DHE_DSS_WITH_DES_CBC_SHA, SSL_RSA_EXPORT_WITH_RC4_40_MD5, SSL_RSA_EXPORT_WITH_DES40_CBC_SHA, SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA, SSL_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA, TLS_KRB5_WITH_RC4_128_SHA, TLS_KRB5_WITH_RC4_128_MD5, TLS_KRB5_WITH_3DES_EDE_CBC_SHA, TLS_KRB5_WITH_3DES_EDE_CBC_MD5, TLS_KRB5_WITH_DES_CBC_SHA, TLS_KRB5_WITH_DES_CBC_MD5, TLS_KRB5_EXPORT_WITH_RC4_40_SHA, TLS_KRB5_EXPORT_WITH_RC4_40_MD5, TLS_KRB5_EXPORT_WITH_DES_CBC_40_SHA, TLS_KRB5_EXPORT_WITH_DES_CBC_40_MD5]
Compression Methods: { 0 }
Extension elliptic_curves, curve names: {secp256r1, sect163k1, sect163r2, secp192r1, secp224r1, sect233k1, sect233r1, sect283k1, sect283r1, secp384r1, sect409k1, sect409r1, secp521r1, sect571k1, sect571r1, secp160k1, secp160r1, secp160r2, sect163r1, secp192k1, sect193r1, sect193r2, secp224k1, sect239k1, secp256k1}
Extension ec_point_formats, formats: [uncompressed]
Extension server_name, server_name: [host_name: service.rosminzdrav.ru]
***
[write] MD5 and SHA1 hashes: len = 228
main, WRITE: TLSv1 Handshake, length = 228
[Raw write]: length = 233
[Raw read]: length = 5
0000: 16 03 01 08 85 .....
[Raw read]: length = 2181
main, READ: TLSv1 Handshake, length = 2181
*** ServerHello, TLSv1
RandomCookie: GMT: 1481567128 bytes = { 33, 184, 2, 6, 81, 155, 233, 36, 65, 195, 29, 210, 132, 251, 151, 255, 172, 52, 241, 47, 228, 180, 50, 77, 0, 0, 0, 0 }
Session ID: {76, 175, 251, 41, 192, 209, 29, 83, 247, 146, 34, 82, 85, 159, 38, 223, 239, 148, 87, 171, 134, 72, 19, 52, 49, 188, 251, 47, 194, 246, 224, 207}
Cipher Suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA
Compression Method: 0
***
Warning: No renegotiation indication extension in ServerHello
%% Initialized: [Session-2, TLS_DHE_DSS_WITH_AES_128_CBC_SHA]
** TLS_DHE_DSS_WITH_AES_128_CBC_SHA
[read] MD5 and SHA1 hashes: len = 74
дек 13, 2016 5:42:00 PM org.apache.cxf.phase.PhaseInterceptorChain doDefaultLogging
WARNING: Interceptor for {http://service.rosminzdrav.ru/MedStaff}IServiceService#{http://service.rosminzdrav.ru/MedStaff}PutEmployee has thrown exception, unwinding now
org.apache.cxf.interceptor.Fault: Marshalling Error: java.lang.RuntimeException: Unexpected error: java.security.InvalidAlgorithmParameterException: the trustAnchors parameter must be non-empty
*** Certificate chain
chain [0] = [
[
Version: V3
Subject: SURNAME=ОП, GIVENNAME=Минздрава, T=Открытые порталы Минздрава России, CN=*.rosminzdrav.ru, O=Министерство здравоохранения РФ, L=г. Москва, ST=Москва, C=RU, EMAILADDRESS=open@rosminzdrav.ru, OID.1.2.643.100.3=#120B3131313131313131313130
Signature Algorithm: 1.2.643.2.2.3, OID = 1.2.643.2.2.3
Key: ru.CryptoPro.JCP.Key.GostPublicKey
Validity: [From: Tue Oct 20 12:50:00 GMT+05:00 2015,
To: Fri Jan 20 13:00:00 GMT+05:00 2017]
Issuer: CN=УЦ Минздрава России, O=Минздрав России, OU=Департамент информационных технологий и связи, L=Москва, ST=77 г.Москва, C=RU, EMAILADDRESS=ca@rosminzdrav.ru, STREET=Рахмановский переулок д.3/25, OID.1.2.643.3.131.1.1=#120C303037373037373738323436, OID.1.2.643.100.1=#120D31313237373436343630383936
SerialNumber: [ 1445856e 00000000 3701]
Certificate Extensions: 9
[1]: ObjectId: 1.2.643.100.111 Criticality=false
Extension unknown: DER encoded OCTET string =
0000: 04 2D 0C 2B 22 D0 9A D1 80 D0 B8 D0 BF D1 82 D0 .-.+"...........
0010: BE D0 9F D1 80 D0 BE 20 43 53 50 22 20 28 D0 B2 ....... CSP" (..
0020: D0 B5 D1 80 D1 81 D0 B8 D1 8F 20 33 2E 36 29 .......... 3.6)
[2]: ObjectId: 1.2.643.100.112 Criticality=false
Extension unknown: DER encoded OCTET string =
0000: 04 82 01 2A 30 82 01 26 0C 2B 22 D0 9A D1 80 D0 ...*0..&.+".....
0010: B8 D0 BF D1 82 D0 BE D0 9F D1 80 D0 BE 20 43 53 ............. CS
0020: 50 22 20 28 D0 B2 D0 B5 D1 80 D1 81 D0 B8 D1 8F P" (............
0030: 20 33 2E 36 29 0C 53 22 D0 A3 D0 B4 D0 BE D1 81 3.6).S"........
0040: D1 82 D0 BE D0 B2 D0 B5 D1 80 D1 8F D1 8E D1 89 ................
0050: D0 B8 D0 B9 20 D1 86 D0 B5 D0 BD D1 82 D1 80 20 .... ..........
0060: 22 D0 9A D1 80 D0 B8 D0 BF D1 82 D0 BE D0 9F D1 "...............
0070: 80 D0 BE 20 D0 A3 D0 A6 22 20 D0 B2 D0 B5 D1 80 ... ...." ......
0080: D1 81 D0 B8 D0 B8 20 31 2E 35 0C 50 20 D0 A1 D0 ...... 1.5.P ...
0090: B5 D1 80 D1 82 D0 B8 D1 84 D0 B8 D0 BA D0 B0 D1 ................
00A0: 82 20 D1 81 D0 BE D0 BE D1 82 D0 B2 D0 B5 D1 82 . ..............
00B0: D1 81 D1 82 D0 B2 D0 B8 D1 8F 20 E2 84 96 20 D0 .......... ... .
00C0: A1 D0 A4 2F 31 32 31 2D 31 38 35 39 20 D0 BE D1 .../121-1859 ...
00D0: 82 20 31 37 2E 30 36 2E 32 30 31 32 0C 50 20 D0 . 17.06.2012.P .
00E0: A1 D0 B5 D1 80 D1 82 D0 B8 D1 84 D0 B8 D0 BA D0 ................
00F0: B0 D1 82 20 D1 81 D0 BE D0 BE D1 82 D0 B2 D0 B5 ... ............
0100: D1 82 D1 81 D1 82 D0 B2 D0 B8 D1 8F 20 E2 84 96 ............ ...
0110: 20 D0 A1 D0 A4 2F 31 32 38 2D 31 38 32 32 20 D0 ..../128-1822 .
0120: BE D1 82 20 30 31 2E 30 36 2E 32 30 31 32 ... 01.06.2012
[3]: ObjectId: 2.5.29.35 Criticality=false
AuthorityKeyIdentifier [
KeyIdentifier [
0000: CB B2 FD 05 69 A1 C9 9F 22 3E 53 C8 84 F6 8B BC ....i...">S.....
0010: D4 FD AB FA ....
]
[CN=УЦ Минздрава России, O=Минздрав России, OU=Департамент информационных технологий и связи, L=Москва, ST=77 г.Москва, C=RU, EMAILADDRESS=ca@rosminzdrav.ru, STREET=Рахмановский переулок д.3/25, OID.1.2.643.3.131.1.1=#120C303037373037373738323436, OID.1.2.643.100.1=#120D31313237373436343630383936]
SerialNumber: [ 63690329 d4366687 4a3e9ec0 37d8143a]
]
[4]: ObjectId: 2.5.29.31 Criticality=false
CRLDistributionPoints [
[DistributionPoint:
[URIName:
http://crl1.rosminzdrav....53c884f68bbcd4fdabfa.crl]
]]
[5]: ObjectId: 2.5.29.32 Criticality=false
CertificatePolicies [
[CertificatePolicyId: [1.2.643.100.113.1]
[] ]
[CertificatePolicyId: [1.2.643.100.113.2]
[] ]
]
[6]: ObjectId: 2.5.29.37 Criticality=false
ExtendedKeyUsages [
serverAuth
]
[7]: ObjectId: 2.5.29.15 Criticality=true
KeyUsage [
DigitalSignature
Non_repudiation
Key_Encipherment
Data_Encipherment
]
[8]: ObjectId: 2.5.29.16 Criticality=false
PrivateKeyUsage: [
From: Tue Oct 20 12:50:00 GMT+05:00 2015, To: Fri Jan 20 12:50:00 GMT+05:00 2017]
[9]: ObjectId: 2.5.29.14 Criticality=false
SubjectKeyIdentifier [
KeyIdentifier [
0000: B0 15 AD 04 87 76 AE AA 4E 2A E0 E7 3C C5 5D 1C .....v..N*..<.].
0010: 76 83 79 BE v.y.
]
]
]
Algorithm: [1.2.643.2.2.3]
Signature:
0000: 57 7A D6 9F E2 4C 19 33 4A 91 0F 11 BA 13 11 ED Wz...L.3J.......
0010: CB 3B 69 88 B8 9E 9A 89 32 44 96 2F 06 0A EE 2D .;i.....2D./...-
0020: 5F 63 FC 11 67 AD 95 39 2C 9D F5 B3 00 15 51 8F _c..g..9,.....Q.
0030: A6 09 C4 1E 7D E5 2D 9D F2 CA D9 63 C8 EA B1 90 ......-....c....
]
***
main, handling exception: java.lang.RuntimeException: Unexpected error: java.security.InvalidAlgorithmParameterException: the trustAnchors parameter must be non-empty
%% Invalidated: [Session-2, TLS_DHE_DSS_WITH_AES_128_CBC_SHA]
main, SEND TLSv1 ALERT: fatal, description = internal_error
main, WRITE: TLSv1 Alert, length = 2
[Raw write]: length = 7
0000: 15 03 01 00 02 02 50 ......P
main, called closeSocket()
main, called close()
main, called closeInternal(true)
Exception in thread "main" javax.xml.ws.soap.SOAPFaultException: Marshalling Error: java.lang.RuntimeException: Unexpected error: java.security.InvalidAlgorithmParameterException: the trustAnchors parameter must be non-empty
at org.apache.cxf.jaxws.JaxWsClientProxy.invoke(JaxWsClientProxy.java:156)
at com.sun.proxy.$Proxy53.putEmployee(Unknown Source)
at ru.swan.rosminzdrav.medstaff.MedStaffClient.putMedStaff(MedStaffClient.java:360)
at ru.swan.rosminzdrav.medstaff.MedStaffReplicator.replicateEmployee(MedStaffReplicator.java:376)
at ru.swan.rosminzdrav.test.RunTest.main(RunTest.java:34)