Статус: Активный участник
Группы: Участники
Зарегистрирован: 02.02.2011(UTC) Сообщений: 43  Откуда: Екатеринбург Сказал «Спасибо»: 15 раз Поблагодарили: 1 раз в 1 постах
|
Добрый день. Устанавливаем защищенное соединение с ЕИС (единая информационная система по гос.закупкам) с использованием КриптоПРО JCP версии 2.0.39014. Пока с нашей стороны использовался закрытый ключ по ГОСТ 2001 все работало хорошо. Но в какой-то момент срок действия истек, и был получен новый ключ, по ГОСТ 2012. И с этим ключом соединение не устанавливается. Собрали логи в подробном режиме, видно что при попытке выполнить Handshake вылетает NullPointerException:
setting up default SSLSocketFactory class ru.CryptoPro.ssl.SSLSocketFactoryImpl is loaded 14-Feb-2019 17:04:55.025 FINE [http-nio-35680-exec-5] ru.CryptoPro.ssl.A.run Applet launched: false 14-Feb-2019 17:04:55.026 INFO [http-nio-35680-exec-5] ru.CryptoPro.ssl.SSLContextImpl.d keyStore is : sakha 14-Feb-2019 17:04:55.026 INFO [http-nio-35680-exec-5] ru.CryptoPro.ssl.SSLContextImpl.d keyStore type is : HDImageStore 14-Feb-2019 17:04:55.027 INFO [http-nio-35680-exec-5] ru.CryptoPro.ssl.SSLContextImpl.d keyStore provider is : 14-Feb-2019 17:04:55.094 INFO [http-nio-35680-exec-5] ru.CryptoPro.ssl.SSLContextImpl.d init key store 14-Feb-2019 17:04:55.095 INFO [http-nio-35680-exec-5] ru.CryptoPro.ssl.SSLContextImpl.d defaultStoreProvider = 14-Feb-2019 17:04:55.095 INFO [http-nio-35680-exec-5] ru.CryptoPro.ssl.SSLContextImpl.d 14-Feb-2019 17:04:56.002 INFO [http-nio-35680-exec-5] ru.CryptoPro.JCP.tools.Starter.check Loading JCP 2.0 39014 14-Feb-2019 17:04:56.055 INFO [http-nio-35680-exec-5] ru.CryptoPro.JCP.tools.Starter.check JCP loaded. 14-Feb-2019 17:04:56.056 INFO [http-nio-35680-exec-5] ru.CryptoPro.ssl.SSLContextImpl.d init key manager of type GostX509 14-Feb-2019 17:04:56.059 FINE [http-nio-35680-exec-5] ru.CryptoPro.ssl.r.<init> %% adding as private keys %% 14-Feb-2019 17:04:56.328 FINE [http-nio-35680-exec-5] ru.CryptoPro.ssl.r.<init> found key: sakha 14-Feb-2019 17:04:56.328 FINE [http-nio-35680-exec-5] ru.CryptoPro.ssl.r.<init>
Certificate chain [0] for key:sakha Subject: SURNAME=Поляков, GIVENNAME=Дмитрий Иванович, T=Генеральный директор, STREET=ул. Дзержинского д. 23 оф. 311, CN=ООО «РАВК», OU=Руководство, O=ООО «РАВК», L=Якутск, ST=14 Республика Саха (Якутия), C=RU, EMAILADDRESS=info@sakhaeltorg.ru, OID.1.2.643.3.131.1.1=#120C303031343335323732323130, OID.1.2.643.100.1=#120D31313331343437303133353433, OID.1.2.643.100.3=#120B3131333237393831343530 Valid from Tue Jan 15 17:08:32 YAKT 2019 until Wed Jan 15 17:08:32 YAKT 2020
14-Feb-2019 17:04:56.329 INFO [http-nio-35680-exec-5] ru.CryptoPro.ssl.SSLContextImpl.d trustStore is: /opt/gpms/JCP/cert/certStore 14-Feb-2019 17:04:56.329 INFO [http-nio-35680-exec-5] ru.CryptoPro.ssl.SSLContextImpl.d trustStore type is : HDImageStore 14-Feb-2019 17:04:56.329 INFO [http-nio-35680-exec-5] ru.CryptoPro.ssl.SSLContextImpl.d trustStore provider is : 14-Feb-2019 17:04:56.329 INFO [http-nio-35680-exec-5] ru.CryptoPro.ssl.SSLContextImpl.d init trust store 14-Feb-2019 17:04:56.437 INFO [http-nio-35680-exec-5] ru.CryptoPro.ssl.SSLContextImpl.d init trust manager of type GostX509 14-Feb-2019 17:04:56.438 FINE [http-nio-35680-exec-5] ru.CryptoPro.ssl.g.<init> Trusted certificates: key store. 14-Feb-2019 17:04:56.442 FINE [http-nio-35680-exec-5] ru.CryptoPro.ssl.g.a %% adding as trusted certificates %%
Subject: CN=int223.zakupki.gov.ru, T=Заместитель начальника управления, OU=Управление информационной инфраструктурой, O=Федеральное казначейство, L=Москва, ST=г. Москва, C=RU, EMAILADDRESS=777@roskazna.ru, STREET="ул. Ильинка, д. 7", OID.1.2.643.100.1=#120D31303437373937303139383330, OID.1.2.643.3.131.1.1=#120C303037373130353638373630 Serial number: 4e266341134b6343a6f2c263bdbd186de6f3a75d Valid from Mon Jun 25 19:14:18 YAKT 2018 until Wed Sep 25 19:14:18 YAKT 2019
Subject: CN=Федеральное казначейство, O=Федеральное казначейство, C=RU, L=Москва, STREET="улица Ильинка, дом 7", OID.1.2.643.100.1=#120D31303437373937303139383330, OID.1.2.643.3.131.1.1=#120C303037373130353638373630, ST=г. Москва, EMAILADDRESS=uc_fk@roskazna.ru Serial number: 36acd45500000000012f Valid from Tue Jul 04 23:19:17 YAKT 2017 until Sun Jul 04 23:19:17 YAKT 2027
Subject: CN=Головной удостоверяющий центр, OID.1.2.643.3.131.1.1=#120C303037373130343734333735, OID.1.2.643.100.1=#120D31303437373032303236373031, O=Минкомсвязь России, STREET="125375 г. Москва, ул. Тверская, д. 7", L=Москва, ST=77 г. Москва, C=RU, EMAILADDRESS=dit@minsvyaz.ru Serial number: 34681e40cb41ef33a9a0b7c876929a29 Valid from Fri Jul 20 22:31:14 YAKT 2012 until Sat Jul 17 21:31:14 YAKT 2027
14-Feb-2019 17:04:56.442 INFO [http-nio-35680-exec-5] ru.CryptoPro.ssl.SSLContextImpl.d init context... 14-Feb-2019 17:04:56.474 FINE [http-nio-35680-exec-5] ru.CryptoPro.ssl.SSLContextImpl.engineInit SSLContext engineInit 14-Feb-2019 17:04:56.479 INFO [http-nio-35680-exec-5] ru.CryptoPro.ssl.SSLContextImpl.d Context initiated. instantiated an instance of class ru.CryptoPro.ssl.SSLSocketFactoryImpl 14-Feb-2019 17:04:56.700 FINE [http-nio-35680-exec-5] ru.CryptoPro.ssl.f.a Allow unsafe renegotiation: false Allow legacy hello messages: true Is initial handshake: true Is secure renegotiation: false 14-Feb-2019 17:04:56.721 FINE [http-nio-35680-exec-5] ru.CryptoPro.ssl.ao.r %% No cached client session 14-Feb-2019 17:04:56.727 FINE [http-nio-35680-exec-5] ru.CryptoPro.ssl.f.q %% ClientHello, TLSv1; Cipher Suites: [TLS_CIPHER_2012, TLS_CIPHER_2001, SSL3_CK_GVO_KB2, SSL3_CK_GVO]; Compression Methods: 0; Extensions: Extension ext_hash_and_mac_alg_select, ext_hash_and_mac_alg_select: [48, 32, 48, 30, 48, 8, 6, 6, 42, -123, 3, 2, 2, 9, 48, 8, 6, 6, 42, -123, 3, 2, 2, 22, 48, 8, 6, 6, 42, -123, 3, 2, 2, 23], Extension renegotiation_info, renegotiated_connection: <empty>; 14-Feb-2019 17:04:56.828 FINE [http-nio-35680-exec-5] ru.CryptoPro.ssl.ad.<init> ServerHello sessionId: {} 14-Feb-2019 17:04:56.829 FINE [http-nio-35680-exec-5] ru.CryptoPro.ssl.ao.a %% ServerHello, TLSv1; Cipher Suite: TLS_CIPHER_2001; Compression Method: 0; Extensions: Extension renegotiation_info, renegotiated_connection: <empty>, Extension ext_hash_and_mac_alg_select, ext_hash_and_mac_alg_select: [48, 30, 48, 8, 6, 6, 42, -123, 3, 2, 2, 9, 48, 8, 6, 6, 42, -123, 3, 2, 2, 22, 48, 8, 6, 6, 42, -123, 3, 2, 2, 23]; 14-Feb-2019 17:04:56.831 FINE [http-nio-35680-exec-5] ru.CryptoPro.ssl.f.a handshakeDigest :4899f4fa 14-Feb-2019 17:04:56.832 FINE [http-nio-35680-exec-5] ru.CryptoPro.ssl.ao.a ** New session TLS_CIPHER_2001 14-Feb-2019 17:04:56.840 FINE [http-nio-35680-exec-5] ru.CryptoPro.ssl.ao.a %% Certificate message:
Subject: CN=int223.zakupki.gov.ru, T=Заместитель начальника управления, OU=Управление информационной инфраструктурой, O=Федеральное казначейство, L=Москва, ST=г. Москва, C=RU, EMAILADDRESS=777@roskazna.ru, STREET="ул. Ильинка, д. 7", OID.1.2.643.100.1=#120D31303437373937303139383330, OID.1.2.643.3.131.1.1=#120C303037373130353638373630 Valid from Mon Jun 25 19:14:18 YAKT 2018 until Wed Sep 25 19:14:18 YAKT 2019
Subject: CN=Федеральное казначейство, O=Федеральное казначейство, C=RU, L=Москва, STREET="улица Ильинка, дом 7", OID.1.2.643.100.1=#120D31303437373937303139383330, OID.1.2.643.3.131.1.1=#120C303037373130353638373630, ST=г. Москва, EMAILADDRESS=uc_fk@roskazna.ru Valid from Tue Jul 04 23:19:17 YAKT 2017 until Sun Jul 04 23:19:17 YAKT 2027
Subject: CN=Головной удостоверяющий центр, OID.1.2.643.3.131.1.1=#120C303037373130343734333735, OID.1.2.643.100.1=#120D31303437373032303236373031, O=Минкомсвязь России, STREET="125375 г. Москва, ул. Тверская, д. 7", L=Москва, ST=77 г. Москва, C=RU, EMAILADDRESS=dit@minsvyaz.ru Valid from Fri Jul 20 22:31:14 YAKT 2012 until Sat Jul 17 21:31:14 YAKT 2027
14-Feb-2019 17:04:56.872 FINE [http-nio-35680-exec-5] ru.CryptoPro.ssl.w.a [PKIX] Signature provider: JCP 14-Feb-2019 17:04:56.873 FINE [http-nio-35680-exec-5] ru.CryptoPro.ssl.w.a [PKIX] Set some additional (intermediate) certificates 14-Feb-2019 17:04:56.873 FINE [http-nio-35680-exec-5] ru.CryptoPro.ssl.w.a [PKIX] parameters: com.sun.security.enableCRLDP=true com.ibm.security.enableCRLDP=true 14-Feb-2019 17:04:57.045 FINE [http-nio-35680-exec-5] ru.CryptoPro.ssl.w.a [PKIX] Certificate chain was built (length: 3). 14-Feb-2019 17:04:57.045 FINE [http-nio-35680-exec-5] ru.CryptoPro.ssl.w.a [PKIX] Online verification is enabled. 14-Feb-2019 17:04:57.052 FINE [http-nio-35680-exec-5] ru.CryptoPro.ssl.w.a [PKIX] Offline verification is disabled. CRL timer is turned OFF. 14-Feb-2019 17:05:12.528 FINE [http-nio-35680-exec-5] ru.CryptoPro.ssl.w.a [PKIX] The certificate chain is valid. 14-Feb-2019 17:05:12.534 FINE [http-nio-35680-exec-5] ru.CryptoPro.ssl.ao.a %% ServerHelloDone (empty) 14-Feb-2019 17:05:12.536 FINE [http-nio-35680-exec-5] ru.CryptoPro.ssl.at.d Ephemeral key generator: GOST3410DHELEPH, Crypto 14-Feb-2019 17:05:12.599 FINE [http-nio-35680-exec-5] ru.CryptoPro.ssl.ao.a %% ClientKeyExchange... 14-Feb-2019 17:05:12.628 FINE [http-nio-35680-exec-5] ru.CryptoPro.ssl.f.a clntEncIV:C0 69 85 D5 FB 17 CD 43 14-Feb-2019 17:05:12.633 FINE [http-nio-35680-exec-5] ru.CryptoPro.ssl.f.a svrEncIV:48 C5 08 A3 D6 64 6B CA 14-Feb-2019 17:05:12.645 FINE [http-nio-35680-exec-5] ru.CryptoPro.ssl.ao.b %% Finished. 14-Feb-2019 17:05:12.650 FINE [http-nio-35680-exec-5] ru.CryptoPro.ssl.f.a ChangeCipherSpec %% Finished. 14-Feb-2019 17:05:12.751 FINE [http-nio-35680-exec-5] ru.CryptoPro.ssl.ao.a %% Finished. 14-Feb-2019 17:05:12.758 FINE [http-nio-35680-exec-5] ru.CryptoPro.ssl.ao.a %% Didn't cache non-resumable client session: [Session-1, TLS_CIPHER_2001] 14-Feb-2019 17:05:13.163 FINE [http-nio-35680-exec-5] ru.CryptoPro.ssl.f.a Allow unsafe renegotiation: false Allow legacy hello messages: true Is initial handshake: false Is secure renegotiation: true 14-Feb-2019 17:05:13.165 FINE [http-nio-35680-exec-5] ru.CryptoPro.ssl.ao.a %% HelloRequest (empty) 14-Feb-2019 17:05:13.165 FINE [http-nio-35680-exec-5] ru.CryptoPro.ssl.ao.r %% No cached client session 14-Feb-2019 17:05:13.166 FINE [http-nio-35680-exec-5] ru.CryptoPro.ssl.f.q %% ClientHello, TLSv1; Cipher Suites: [TLS_CIPHER_2012, TLS_CIPHER_2001, SSL3_CK_GVO_KB2, SSL3_CK_GVO]; Compression Methods: 0; Extensions: Extension ext_hash_and_mac_alg_select, ext_hash_and_mac_alg_select: [48, 32, 48, 30, 48, 8, 6, 6, 42, -123, 3, 2, 2, 9, 48, 8, 6, 6, 42, -123, 3, 2, 2, 22, 48, 8, 6, 6, 42, -123, 3, 2, 2, 23], Extension renegotiation_info, renegotiated_connection: [60, -84, -69, -75, 0, -126, -8, -105, -83, -68, -60, -90]; 14-Feb-2019 17:05:13.266 FINE [http-nio-35680-exec-5] ru.CryptoPro.ssl.ad.<init> ServerHello sessionId: {} 14-Feb-2019 17:05:13.267 FINE [http-nio-35680-exec-5] ru.CryptoPro.ssl.ao.a %% ServerHello, TLSv1; Cipher Suite: TLS_CIPHER_2001; Compression Method: 0; Extensions: Extension renegotiation_info, renegotiated_connection: [60, -84, -69, -75, 0, -126, -8, -105, -83, -68, -60, -90, -121, -16, 102, -71, 20, 15, 101, 95, 100, 93, 60, 80], Extension ext_hash_and_mac_alg_select, ext_hash_and_mac_alg_select: [48, 30, 48, 8, 6, 6, 42, -123, 3, 2, 2, 9, 48, 8, 6, 6, 42, -123, 3, 2, 2, 22, 48, 8, 6, 6, 42, -123, 3, 2, 2, 23]; 14-Feb-2019 17:05:13.267 FINE [http-nio-35680-exec-5] ru.CryptoPro.ssl.f.a handshakeDigest :659666f8 14-Feb-2019 17:05:13.268 FINE [http-nio-35680-exec-5] ru.CryptoPro.ssl.ao.a ** New session TLS_CIPHER_2001 14-Feb-2019 17:05:13.276 FINE [http-nio-35680-exec-5] ru.CryptoPro.ssl.ao.a %% Certificate message:
Subject: CN=int223.zakupki.gov.ru, T=Заместитель начальника управления, OU=Управление информационной инфраструктурой, O=Федеральное казначейство, L=Москва, ST=г. Москва, C=RU, EMAILADDRESS=777@roskazna.ru, STREET="ул. Ильинка, д. 7", OID.1.2.643.100.1=#120D31303437373937303139383330, OID.1.2.643.3.131.1.1=#120C303037373130353638373630 Valid from Mon Jun 25 19:14:18 YAKT 2018 until Wed Sep 25 19:14:18 YAKT 2019
Subject: CN=Федеральное казначейство, O=Федеральное казначейство, C=RU, L=Москва, STREET="улица Ильинка, дом 7", OID.1.2.643.100.1=#120D31303437373937303139383330, OID.1.2.643.3.131.1.1=#120C303037373130353638373630, ST=г. Москва, EMAILADDRESS=uc_fk@roskazna.ru Valid from Tue Jul 04 23:19:17 YAKT 2017 until Sun Jul 04 23:19:17 YAKT 2027
Subject: CN=Головной удостоверяющий центр, OID.1.2.643.3.131.1.1=#120C303037373130343734333735, OID.1.2.643.100.1=#120D31303437373032303236373031, O=Минкомсвязь России, STREET="125375 г. Москва, ул. Тверская, д. 7", L=Москва, ST=77 г. Москва, C=RU, EMAILADDRESS=dit@minsvyaz.ru Valid from Fri Jul 20 22:31:14 YAKT 2012 until Sat Jul 17 21:31:14 YAKT 2027
14-Feb-2019 17:05:13.277 FINE [http-nio-35680-exec-5] ru.CryptoPro.ssl.w.a [PKIX] Signature provider: JCP 14-Feb-2019 17:05:13.277 FINE [http-nio-35680-exec-5] ru.CryptoPro.ssl.w.a [PKIX] Set some additional (intermediate) certificates 14-Feb-2019 17:05:13.277 FINE [http-nio-35680-exec-5] ru.CryptoPro.ssl.w.a [PKIX] parameters: com.sun.security.enableCRLDP=true com.ibm.security.enableCRLDP=true 14-Feb-2019 17:05:13.282 FINE [http-nio-35680-exec-5] ru.CryptoPro.ssl.w.a [PKIX] Certificate chain was built (length: 3). 14-Feb-2019 17:05:13.283 FINE [http-nio-35680-exec-5] ru.CryptoPro.ssl.w.a [PKIX] Online verification is enabled. 14-Feb-2019 17:05:13.283 FINE [http-nio-35680-exec-5] ru.CryptoPro.ssl.w.a [PKIX] Offline verification is disabled. CRL timer is turned OFF. 14-Feb-2019 17:05:13.299 FINE [http-nio-35680-exec-5] ru.CryptoPro.ssl.w.a [PKIX] The certificate chain is valid. 14-Feb-2019 17:05:13.304 FINE [http-nio-35680-exec-5] ru.CryptoPro.ssl.ab.<init> Given authorities list's size: 0 element(s) 14-Feb-2019 17:05:13.304 FINE [http-nio-35680-exec-5] ru.CryptoPro.ssl.ao.a %% CertificateRequest Cert Authorities: 14-Feb-2019 17:05:13.304 FINE [http-nio-35680-exec-5] ru.CryptoPro.ssl.ao.a %% ServerHelloDone (empty) 14-Feb-2019 17:05:13.304 FINE [http-nio-35680-exec-5] ru.CryptoPro.ssl.ao.a Certificate request is received. 14-Feb-2019 17:05:13.305 FINE [http-nio-35680-exec-5] ru.CryptoPro.ssl.f.a Add certificate algorithm: GOST3410EL [priority: 2] 14-Feb-2019 17:05:13.305 FINE [http-nio-35680-exec-5] ru.CryptoPro.ssl.f.a Add certificate algorithm: GOST3410_2012_256 [priority: 1] 14-Feb-2019 17:05:13.305 FINE [http-nio-35680-exec-5] ru.CryptoPro.ssl.f.a Add certificate algorithm: GOST3410_2012_512 [priority: 0] 14-Feb-2019 17:05:13.305 FINE [http-nio-35680-exec-5] ru.CryptoPro.ssl.ao.a Find client container with type: GOST3410_2012_512 14-Feb-2019 17:05:13.305 FINE [http-nio-35680-exec-5] ru.CryptoPro.ssl.r.a %% getting aliases for Client 14-Feb-2019 17:05:13.306 WARNING [http-nio-35680-exec-5] ru.CryptoPro.ssl.r.a %% No alias is match 14-Feb-2019 17:05:13.306 FINE [http-nio-35680-exec-5] ru.CryptoPro.ssl.ao.a Found containers: 0 14-Feb-2019 17:05:13.306 FINE [http-nio-35680-exec-5] ru.CryptoPro.ssl.ao.a Find client container with type: GOST3410_2012_256 14-Feb-2019 17:05:13.306 FINE [http-nio-35680-exec-5] ru.CryptoPro.ssl.r.a %% getting aliases for Client 14-Feb-2019 17:05:13.307 FINE [http-nio-35680-exec-5] ru.CryptoPro.ssl.r.a %% matching alias: sakha 14-Feb-2019 17:05:13.307 FINE [http-nio-35680-exec-5] ru.CryptoPro.ssl.ao.a Found containers: 1 14-Feb-2019 17:05:13.308 FINE [http-nio-35680-exec-5] ru.CryptoPro.ssl.ao.a Find client container with type: GOST3410EL 14-Feb-2019 17:05:13.308 FINE [http-nio-35680-exec-5] ru.CryptoPro.ssl.r.a %% getting aliases for Client 14-Feb-2019 17:05:13.308 WARNING [http-nio-35680-exec-5] ru.CryptoPro.ssl.r.a %% No alias is match 14-Feb-2019 17:05:13.308 FINE [http-nio-35680-exec-5] ru.CryptoPro.ssl.ao.a Found containers: 0 14-Feb-2019 17:05:13.308 FINE [http-nio-35680-exec-5] ru.CryptoPro.ssl.ao.a Find any client container with type: GOST3410_2012_512 14-Feb-2019 17:05:13.308 FINE [http-nio-35680-exec-5] ru.CryptoPro.ssl.r.a %% getting aliases for Client 14-Feb-2019 17:05:13.309 WARNING [http-nio-35680-exec-5] ru.CryptoPro.ssl.r.a %% No alias is match 14-Feb-2019 17:05:13.309 FINE [http-nio-35680-exec-5] ru.CryptoPro.ssl.ao.a Select any private key for signature. Found containers: 0 14-Feb-2019 17:05:13.309 FINE [http-nio-35680-exec-5] ru.CryptoPro.ssl.ao.a Find any client container with type: GOST3410_2012_256 14-Feb-2019 17:05:13.309 FINE [http-nio-35680-exec-5] ru.CryptoPro.ssl.r.a %% getting aliases for Client 14-Feb-2019 17:05:13.309 FINE [http-nio-35680-exec-5] ru.CryptoPro.ssl.r.a %% matching alias: sakha 14-Feb-2019 17:05:13.310 FINE [http-nio-35680-exec-5] ru.CryptoPro.ssl.ao.a Select any private key for signature. Found containers: 1 14-Feb-2019 17:05:13.313 FINE [http-nio-35680-exec-5] ru.CryptoPro.ssl.ao.a Private key 'sakha' and certificate are available. 14-Feb-2019 17:05:13.313 FINE [http-nio-35680-exec-5] ru.CryptoPro.ssl.ao.a %% Certificate message:
Subject: SURNAME=Поляков, GIVENNAME=Дмитрий Иванович, T=Генеральный директор, STREET=ул. Дзержинского д. 23 оф. 311, CN=ООО «РАВК», OU=Руководство, O=ООО «РАВК», L=Якутск, ST=14 Республика Саха (Якутия), C=RU, EMAILADDRESS=info@sakhaeltorg.ru, OID.1.2.643.3.131.1.1=#120C303031343335323732323130, OID.1.2.643.100.1=#120D31313331343437303133353433, OID.1.2.643.100.3=#120B3131333237393831343530 Valid from Tue Jan 15 17:08:32 YAKT 2019 until Wed Jan 15 17:08:32 YAKT 2020
14-Feb-2019 17:05:13.314 FINE [http-nio-35680-exec-5] ru.CryptoPro.ssl.at.d Ephemeral key generator: GOST3410DHELEPH, Crypto 14-Feb-2019 17:05:13.333 FINE [http-nio-35680-exec-5] ru.CryptoPro.ssl.ao.a %% ClientKeyExchange... 14-Feb-2019 17:05:13.359 FINE [http-nio-35680-exec-5] ru.CryptoPro.ssl.f.a clntEncIV:3F 75 F8 A2 2B 0A 48 D1 14-Feb-2019 17:05:13.363 FINE [http-nio-35680-exec-5] ru.CryptoPro.ssl.f.a svrEncIV:AC A6 22 39 FC C3 EE B6 14-Feb-2019 17:05:13.371 FINE [http-nio-35680-exec-5] ru.CryptoPro.ssl.K.a Handshake digest by key algorithm: GOST3410DH_2012_256, choose digest algorithm: GR 34.11-2012 (256) 14-Feb-2019 17:05:13.372 FINE [http-nio-35680-exec-5] ru.CryptoPro.ssl.at.a Create certificate verify: GOST3411_2012_256withGOST3410DH_2012_256, JCP 14-Feb-2019 17:05:13.373 FINE [http-nio-35680-exec-5] ru.CryptoPro.ssl.am.a THROW java.lang.NullPointerException at ru.CryptoPro.ssl.at.a(Unknown Source) at ru.CryptoPro.ssl.at.a(Unknown Source) at ru.CryptoPro.ssl.ao.a(Unknown Source) at ru.CryptoPro.ssl.ao.a(Unknown Source) at ru.CryptoPro.ssl.f.o(Unknown Source) at ru.CryptoPro.ssl.f.a(Unknown Source) at ru.CryptoPro.ssl.am.a(Unknown Source) at ru.CryptoPro.ssl.am.a(Unknown Source) at ru.CryptoPro.ssl.aa.read(Unknown Source) at java.io.BufferedInputStream.fill(BufferedInputStream.java:246) at java.io.BufferedInputStream.read(BufferedInputStream.java:265) at org.apache.commons.httpclient.HttpParser.readRawLine(HttpParser.java:78) at org.apache.commons.httpclient.HttpParser.readLine(HttpParser.java:106) at org.apache.commons.httpclient.HttpConnection.readLine(HttpConnection.java:1116) at org.apache.commons.httpclient.HttpMethodBase.readStatusLine(HttpMethodBase.java:1973) at org.apache.commons.httpclient.HttpMethodBase.readResponse(HttpMethodBase.java:1735) at org.apache.commons.httpclient.HttpMethodBase.execute(HttpMethodBase.java:1098) at org.apache.commons.httpclient.HttpMethodDirector.executeWithRetry(HttpMethodDirector.java:398) at org.apache.commons.httpclient.HttpMethodDirector.executeMethod(HttpMethodDirector.java:171) at org.apache.commons.httpclient.HttpClient.executeMethod(HttpClient.java:397) at org.apache.commons.httpclient.HttpClient.executeMethod(HttpClient.java:323) at ru.naumen.gpms.oosIntegration.transport.OOSTransportHTTP.sendData(OOSTransportHTTP.java:89) at ru.naumen.gpms.oosIntegration.transport.OOSTransportFacade.sendData(OOSTransportFacade.java:59) at ru.naumen.gpms.oosIntegration.common.oosMessage.ba.OOSMessageSendToOOSBA.execute(OOSMessageSendToOOSBA.java:107) at ru.naumen.core.hibernate.bactions.BusinessActionBase$1.operate(BusinessActionBase.java:38) at ru.naumen.core.hibernate.executor.ExternalSessionExecutorBase$OperationToFunctionWrapper.function(ExternalSessionExecutorBase.java:36) at ru.naumen.core.hibernate.executor.ExternalSessionExecutorBase.execute(ExternalSessionExecutorBase.java:54) at ru.naumen.core.hibernate.executor.ExternalSessionExecutorBase.execute(ExternalSessionExecutorBase.java:111) at ru.naumen.core.hibernate.bactions.BusinessActionBase.execute(BusinessActionBase.java:34) at ru.naumen.gpms.oosIntegration.common.oosMessage.ui.OOSMessageSendToOOSBC.push(OOSMessageSendToOOSBC.java:45) at ru.naumen.guic.components.actions.UIButton.push(UIButton.java:141) at ru.naumen.gpms.ui.customrenderers.buttonPressed_jsp._jspService(buttonPressed_jsp.java:193) at org.apache.jasper.runtime.HttpJspBase.service(HttpJspBase.java:70) at javax.servlet.http.HttpServlet.service(HttpServlet.java:742) at ru.naumen.fx.servlet.FxJspFakeServlet.runServlet(FxJspFakeServlet.java:191) at ru.naumen.fx.servlet.FxJspFakeServlet.processFakedJsp(FxJspFakeServlet.java:184) at ru.naumen.fx.servlet.FxJspFakeServlet.service(FxJspFakeServlet.java:106) at ru.naumen.bk.BKServletBase.service(BKServletBase.java:54) at javax.servlet.http.HttpServlet.service(HttpServlet.java:742) at ru.naumen.fx.servlet.FxServlet$1.execute(FxServlet.java:340) at ru.naumen.fx.services.servletlistener.FxServletListenerServiceUtils.handleFxServletListenerService(FxServletListenerServiceUtils.java:68) at ru.naumen.fx.servlet.FxServlet.service(FxServlet.java:281) at javax.servlet.http.HttpServlet.service(HttpServlet.java:742) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:231) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:166) at org.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:52) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:193) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:166) at org.apache.catalina.core.StandardWrapperValve.invoke(StandardWrapperValve.java:198) at org.apache.catalina.core.StandardContextValve.invoke(StandardContextValve.java:96) at org.apache.catalina.authenticator.AuthenticatorBase.invoke(AuthenticatorBase.java:496) at org.apache.catalina.core.StandardHostValve.invoke(StandardHostValve.java:140) at org.apache.catalina.valves.ErrorReportValve.invoke(ErrorReportValve.java:81) at org.apache.catalina.valves.AbstractAccessLogValve.invoke(AbstractAccessLogValve.java:650) at org.apache.catalina.core.StandardEngineValve.invoke(StandardEngineValve.java:87) at org.apache.catalina.connector.CoyoteAdapter.service(CoyoteAdapter.java:342) at org.apache.coyote.http11.Http11Processor.service(Http11Processor.java:803) at org.apache.coyote.AbstractProcessorLight.process(AbstractProcessorLight.java:66) at org.apache.coyote.AbstractProtocol$ConnectionHandler.process(AbstractProtocol.java:790) at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1468) at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49) at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1149) at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:624) at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61) at java.lang.Thread.run(Thread.java:748)
14-Feb-2019 17:05:13.374 FINE [http-nio-35680-exec-5] ru.CryptoPro.ssl.am.a http-nio-35680-exec-5, SEND TLSv1 ALERT: fatal, description = INTERNAL_ERROR
Тот же лог архивом:  log.zip (5kb) загружен 3 раз(а).Подскажите, пожалуйста, что можно сделать? Отредактировано пользователем 14 февраля 2019 г. 13:35:16(UTC)
| Причина: Не указана
|