java.lang.RuntimeException: org.jfrog.build.extractor.maven.BuildInfoRecorder.sessionEnded() listener has failed: 00:17:10.243 at org.jvnet.hudson.maven3.launcher.Maven3Launcher.main(Maven3Launcher.java:79) 00:17:10.244 at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method) 00:17:10.244 at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:57) 00:17:10.245 at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) 00:17:10.248 cause : org.jfrog.build.extractor.maven.BuildInfoRecorder.sessionEnded() listener has failed: 00:17:10.249 at java.lang.reflect.Method.invoke(Method.java:606) 00:17:10.249 at org.codehaus.plexus.classworlds.launcher.Launcher.launchStandard(Launcher.java:330) 00:17:10.250 at org.codehaus.plexus.classworlds.launcher.Launcher.launch(Launcher.java:238) 00:17:10.250 Stack trace : at org.jvnet.hudson.maven3.agent.Maven3Main.launch(Maven3Main.java:174)

Jenkins JIRA | Marcin Pikulski | 2 years ago
  1. 0

    Hi, Been trying to deploy a project (multimodule maven3) to artifactory, but I get en exception shown bellow. Any ideas please? There is nothing magic in my project configuration, mavn with install goal and some memory settings. {noformat} 00:17:09.319 [INFO] Artifactory Build Info Recorder: Saving Build Info to '/home/jenkins/workspace/C2/target/build-info.json' 00:17:10.149 [INFO] Deploying artifact: http://maven.prs.internal/libs-snapshot-local/pl/c2/0.0.3-SNAPSHOT/c2-0.0.3-SNAPSHOT.pom 00:17:10.221 [ERROR] org.jfrog.build.extractor.maven.BuildInfoRecorder.sessionEnded() listener has failed: 00:17:10.223 org.apache.commons.logging.LogConfigurationException: User-specified log class 'org.apache.commons.logging.impl.Log4JLogger' cannot be found or is not useable. 00:17:10.224 at org.apache.commons.logging.impl.LogFactoryImpl.discoverLogImplementation(LogFactoryImpl.java:874) 00:17:10.224 at org.apache.commons.logging.impl.LogFactoryImpl.newInstance(LogFactoryImpl.java:604) 00:17:10.225 at org.apache.commons.logging.impl.LogFactoryImpl.getInstance(LogFactoryImpl.java:336) 00:17:10.225 at org.apache.commons.logging.impl.LogFactoryImpl.getInstance(LogFactoryImpl.java:310) 00:17:10.226 at org.apache.commons.logging.LogFactory.getLog(LogFactory.java:685) 00:17:10.226 at org.apache.http.impl.client.AbstractHttpClient.<init>(AbstractHttpClient.java:187) 00:17:10.227 at org.apache.http.impl.client.DefaultHttpClient.<init>(DefaultHttpClient.java:141) 00:17:10.228 at org.jfrog.build.client.PreemptiveHttpClient.createHttpClient(PreemptiveHttpClient.java:99) 00:17:10.228 at org.jfrog.build.client.PreemptiveHttpClient.<init>(PreemptiveHttpClient.java:72) 00:17:10.229 at org.jfrog.build.client.ArtifactoryHttpClient.getHttpClient(ArtifactoryHttpClient.java:115) 00:17:10.229 at org.jfrog.build.client.ArtifactoryHttpClient.getVersion(ArtifactoryHttpClient.java:128) 00:17:10.230 at org.jfrog.build.client.ArtifactoryBuildInfoClient.getArtifactoryVersion(ArtifactoryBuildInfoClient.java:658) 00:17:10.230 at org.jfrog.build.client.ArtifactoryBuildInfoClient.tryChecksumDeploy(ArtifactoryBuildInfoClient.java:540) 00:17:10.231 at org.jfrog.build.client.ArtifactoryBuildInfoClient.uploadFile(ArtifactoryBuildInfoClient.java:512) 00:17:10.232 at org.jfrog.build.client.ArtifactoryBuildInfoClient.deployArtifact(ArtifactoryBuildInfoClient.java:302) 00:17:10.232 at org.jfrog.build.extractor.maven.BuildDeploymentHelper.deployArtifacts(BuildDeploymentHelper.java:270) 00:17:10.233 at org.jfrog.build.extractor.maven.BuildDeploymentHelper.deploy(BuildDeploymentHelper.java:108) 00:17:10.234 mavenExecutionResult exceptions not empty at org.jfrog.build.extractor.maven.BuildInfoRecorder.sessionEnded(BuildInfoRecorder.java:139) 00:17:10.237 at org.apache.maven.lifecycle.internal.DefaultExecutionEventCatapult.fire(DefaultExecutionEventCatapult.java:64) 00:17:10.237 at org.apache.maven.lifecycle.internal.DefaultExecutionEventCatapult.fire(DefaultExecutionEventCatapult.java:42) 00:17:10.238 00:17:10.238 at org.apache.maven.lifecycle.internal.LifecycleStarter.execute(LifecycleStarter.java:170) 00:17:10.239 at org.apache.maven.DefaultMaven.doExecute(DefaultMaven.java:320) 00:17:10.239 at org.apache.maven.DefaultMaven.execute(DefaultMaven.java:156) 00:17:10.243 message : Internal error: java.lang.RuntimeException: org.jfrog.build.extractor.maven.BuildInfoRecorder.sessionEnded() listener has failed: 00:17:10.243 at org.jvnet.hudson.maven3.launcher.Maven3Launcher.main(Maven3Launcher.java:79) 00:17:10.244 at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method) 00:17:10.244 at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:57) 00:17:10.245 at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) 00:17:10.248 cause : org.jfrog.build.extractor.maven.BuildInfoRecorder.sessionEnded() listener has failed: 00:17:10.249 at java.lang.reflect.Method.invoke(Method.java:606) 00:17:10.249 at org.codehaus.plexus.classworlds.launcher.Launcher.launchStandard(Launcher.java:330) 00:17:10.250 at org.codehaus.plexus.classworlds.launcher.Launcher.launch(Launcher.java:238) 00:17:10.250 Stack trace : at org.jvnet.hudson.maven3.agent.Maven3Main.launch(Maven3Main.java:174) 00:17:10.251 at hudson.maven.Maven3Builder.call(Maven3Builder.java:100) 00:17:10.251 at hudson.maven.Maven3Builder.call(Maven3Builder.java:66) {noformat}

    Jenkins JIRA | 2 years ago | Marcin Pikulski
    java.lang.RuntimeException: org.jfrog.build.extractor.maven.BuildInfoRecorder.sessionEnded() listener has failed: 00:17:10.243 at org.jvnet.hudson.maven3.launcher.Maven3Launcher.main(Maven3Launcher.java:79) 00:17:10.244 at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method) 00:17:10.244 at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:57) 00:17:10.245 at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) 00:17:10.248 cause : org.jfrog.build.extractor.maven.BuildInfoRecorder.sessionEnded() listener has failed: 00:17:10.249 at java.lang.reflect.Method.invoke(Method.java:606) 00:17:10.249 at org.codehaus.plexus.classworlds.launcher.Launcher.launchStandard(Launcher.java:330) 00:17:10.250 at org.codehaus.plexus.classworlds.launcher.Launcher.launch(Launcher.java:238) 00:17:10.250 Stack trace : at org.jvnet.hudson.maven3.agent.Maven3Main.launch(Maven3Main.java:174)
  2. 0

    Hi, Been trying to deploy a project (multimodule maven3) to artifactory, but I get en exception shown bellow. Any ideas please? There is nothing magic in my project configuration, mavn with install goal and some memory settings. {noformat} 00:17:09.319 [INFO] Artifactory Build Info Recorder: Saving Build Info to '/home/jenkins/workspace/C2/target/build-info.json' 00:17:10.149 [INFO] Deploying artifact: http://maven.prs.internal/libs-snapshot-local/pl/c2/0.0.3-SNAPSHOT/c2-0.0.3-SNAPSHOT.pom 00:17:10.221 [ERROR] org.jfrog.build.extractor.maven.BuildInfoRecorder.sessionEnded() listener has failed: 00:17:10.223 org.apache.commons.logging.LogConfigurationException: User-specified log class 'org.apache.commons.logging.impl.Log4JLogger' cannot be found or is not useable. 00:17:10.224 at org.apache.commons.logging.impl.LogFactoryImpl.discoverLogImplementation(LogFactoryImpl.java:874) 00:17:10.224 at org.apache.commons.logging.impl.LogFactoryImpl.newInstance(LogFactoryImpl.java:604) 00:17:10.225 at org.apache.commons.logging.impl.LogFactoryImpl.getInstance(LogFactoryImpl.java:336) 00:17:10.225 at org.apache.commons.logging.impl.LogFactoryImpl.getInstance(LogFactoryImpl.java:310) 00:17:10.226 at org.apache.commons.logging.LogFactory.getLog(LogFactory.java:685) 00:17:10.226 at org.apache.http.impl.client.AbstractHttpClient.<init>(AbstractHttpClient.java:187) 00:17:10.227 at org.apache.http.impl.client.DefaultHttpClient.<init>(DefaultHttpClient.java:141) 00:17:10.228 at org.jfrog.build.client.PreemptiveHttpClient.createHttpClient(PreemptiveHttpClient.java:99) 00:17:10.228 at org.jfrog.build.client.PreemptiveHttpClient.<init>(PreemptiveHttpClient.java:72) 00:17:10.229 at org.jfrog.build.client.ArtifactoryHttpClient.getHttpClient(ArtifactoryHttpClient.java:115) 00:17:10.229 at org.jfrog.build.client.ArtifactoryHttpClient.getVersion(ArtifactoryHttpClient.java:128) 00:17:10.230 at org.jfrog.build.client.ArtifactoryBuildInfoClient.getArtifactoryVersion(ArtifactoryBuildInfoClient.java:658) 00:17:10.230 at org.jfrog.build.client.ArtifactoryBuildInfoClient.tryChecksumDeploy(ArtifactoryBuildInfoClient.java:540) 00:17:10.231 at org.jfrog.build.client.ArtifactoryBuildInfoClient.uploadFile(ArtifactoryBuildInfoClient.java:512) 00:17:10.232 at org.jfrog.build.client.ArtifactoryBuildInfoClient.deployArtifact(ArtifactoryBuildInfoClient.java:302) 00:17:10.232 at org.jfrog.build.extractor.maven.BuildDeploymentHelper.deployArtifacts(BuildDeploymentHelper.java:270) 00:17:10.233 at org.jfrog.build.extractor.maven.BuildDeploymentHelper.deploy(BuildDeploymentHelper.java:108) 00:17:10.234 mavenExecutionResult exceptions not empty at org.jfrog.build.extractor.maven.BuildInfoRecorder.sessionEnded(BuildInfoRecorder.java:139) 00:17:10.237 at org.apache.maven.lifecycle.internal.DefaultExecutionEventCatapult.fire(DefaultExecutionEventCatapult.java:64) 00:17:10.237 at org.apache.maven.lifecycle.internal.DefaultExecutionEventCatapult.fire(DefaultExecutionEventCatapult.java:42) 00:17:10.238 00:17:10.238 at org.apache.maven.lifecycle.internal.LifecycleStarter.execute(LifecycleStarter.java:170) 00:17:10.239 at org.apache.maven.DefaultMaven.doExecute(DefaultMaven.java:320) 00:17:10.239 at org.apache.maven.DefaultMaven.execute(DefaultMaven.java:156) 00:17:10.243 message : Internal error: java.lang.RuntimeException: org.jfrog.build.extractor.maven.BuildInfoRecorder.sessionEnded() listener has failed: 00:17:10.243 at org.jvnet.hudson.maven3.launcher.Maven3Launcher.main(Maven3Launcher.java:79) 00:17:10.244 at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method) 00:17:10.244 at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:57) 00:17:10.245 at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) 00:17:10.248 cause : org.jfrog.build.extractor.maven.BuildInfoRecorder.sessionEnded() listener has failed: 00:17:10.249 at java.lang.reflect.Method.invoke(Method.java:606) 00:17:10.249 at org.codehaus.plexus.classworlds.launcher.Launcher.launchStandard(Launcher.java:330) 00:17:10.250 at org.codehaus.plexus.classworlds.launcher.Launcher.launch(Launcher.java:238) 00:17:10.250 Stack trace : at org.jvnet.hudson.maven3.agent.Maven3Main.launch(Maven3Main.java:174) 00:17:10.251 at hudson.maven.Maven3Builder.call(Maven3Builder.java:100) 00:17:10.251 at hudson.maven.Maven3Builder.call(Maven3Builder.java:66) {noformat}

    Jenkins JIRA | 2 years ago | Marcin Pikulski
    java.lang.RuntimeException: org.jfrog.build.extractor.maven.BuildInfoRecorder.sessionEnded() listener has failed: 00:17:10.243 at org.jvnet.hudson.maven3.launcher.Maven3Launcher.main(Maven3Launcher.java:79) 00:17:10.244 at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method) 00:17:10.244 at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:57) 00:17:10.245 at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) 00:17:10.248 cause : org.jfrog.build.extractor.maven.BuildInfoRecorder.sessionEnded() listener has failed: 00:17:10.249 at java.lang.reflect.Method.invoke(Method.java:606) 00:17:10.249 at org.codehaus.plexus.classworlds.launcher.Launcher.launchStandard(Launcher.java:330) 00:17:10.250 at org.codehaus.plexus.classworlds.launcher.Launcher.launch(Launcher.java:238) 00:17:10.250 Stack trace : at org.jvnet.hudson.maven3.agent.Maven3Main.launch(Maven3Main.java:174)
  3. 0

    users-cxf-apache - Encoding special characters when marshalling - msg#00079 - Recent Discussion OSDir.com

    osdir.com | 8 months ago
    java.lang.RuntimeException: Default SSL context init failed: Keystore was tampered with, or password was incorrect trustStore is: C:\temp\digicert\truststore.jks trustStore type is : jks trustStore provider is : init truststore adding as trusted cert: Valid from Mon Apr 02 20:00:00 EDT 2007 until Sat Apr 02 20:00:00 EDT 2022 trigger seeding of SecureRandom done seeding SecureRandom May 7, 2010 10:49:09 PM org.apache.cxf.transport.https.SSLUtils getCiphersuites INFO: The cipher suites have not been configured, falling back to cipher suite filters. May 7, 2010 10:49:09 PM org.apache.cxf.transport.https.SSLUtils getCiphersuites INFO: The cipher suite filters have not been configured, falling back to default filters. May 7, 2010 10:49:09 PM org.apache.cxf.transport.https.SSLUtils getCiphersFromList INFO: The cipher suites have been set to SSL_RSA_WITH_RC4_128_MD5, SSL_RSA_WITH_RC4_128_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_DES_CBC_SHA, SSL_DHE_RSA_WITH_DES_CBC_SHA, SSL_DHE_DSS_WITH_DES_CBC_SHA, SSL_RSA_EXPORT_WITH_RC4_40_MD5, SSL_RSA_EXPORT_WITH_DES40_CBC_SHA, SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA, SSL_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA, TLS_KRB5_WITH_RC4_128_SHA, TLS_KRB5_WITH_RC4_128_MD5, TLS_KRB5_WITH_3DES_EDE_CBC_SHA, TLS_KRB5_WITH_3DES_EDE_CBC_MD5, TLS_KRB5_WITH_DES_CBC_SHA, TLS_KRB5_WITH_DES_CBC_MD5, TLS_KRB5_EXPORT_WITH_RC4_40_SHA, TLS_KRB5_EXPORT_WITH_RC4_40_MD5, TLS_KRB5_EXPORT_WITH_DES_CBC_40_SHA, TLS_KRB5_EXPORT_WITH_DES_CBC_40_MD5. May 7, 2010 10:49:09 PM org.apache.cxf.interceptor.LoggingOutInterceptor$LoggingCallback onClose INFO: Outbound Message --------------------------- ID: 1 Address: https://wstest.beaconmutual.com/BeaconQuoteService/BeaconQuoteService.svc Encoding: UTF-8 Content-Type: text/xml -------------------------------------- %% No cached client session *** ClientHello, TLSv1 RandomCookie: GMT: 1256444197 bytes = { 4, 66, 95, 49, 78, 123, 240, 208, 162, 18, 225, 86, 252, 18, 29, 71, 157, 151, 61, 44, 211, 72, 133, 220, 191, 41, 45, 141 } Session ID: {} Cipher Suites: [SSL_RSA_WITH_RC4_128_MD5, SSL_RSA_WITH_RC4_128_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_DES_CBC_SHA, SSL_DHE_RSA_WITH_DES_CBC_SHA, SSL_DHE_DSS_WITH_DES_CBC_SHA, SSL_RSA_EXPORT_WITH_RC4_40_MD5, SSL_RSA_EXPORT_WITH_DES40_CBC_SHA, SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA, SSL_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA, TLS_KRB5_WITH_RC4_128_SHA, TLS_KRB5_WITH_RC4_128_MD5, TLS_KRB5_WITH_3DES_EDE_CBC_SHA, TLS_KRB5_WITH_3DES_EDE_CBC_MD5, TLS_KRB5_WITH_DES_CBC_SHA, TLS_KRB5_WITH_DES_CBC_MD5, TLS_KRB5_EXPORT_WITH_RC4_40_SHA, TLS_KRB5_EXPORT_WITH_RC4_40_MD5, TLS_KRB5_EXPORT_WITH_DES_CBC_40_SHA, TLS_KRB5_EXPORT_WITH_DES_CBC_40_MD5] Compression Methods: { 0 } *** [write] MD5 and SHA1 hashes: len = 93 0000: 01 00 00 59 03 01 4B E4 D1 25 04 42 5F 31 4E 7B ...Y..K..%.B_1N. 0010: F0 D0 A2 12 E1 56 FC 12 1D 47 9D 97 3D 2C D3 48 .....V...G..=,.H 0020: 85 DC BF 29 2D 8D 00 00 32 00 04 00 05 00 2F 00 ...)-...2...../. 0030: 33 00 32 00 0A 00 16 00 13 00 09 00 15 00 12 00 3.2............. 0040: 03 00 08 00 14 00 11 00 20 00 24 00 1F 00 23 00 ........ .$...#. 0050: 1E 00 22 00 28 00 2B 00 26 00 29 01 00 ..".(.+.&.).. main, WRITE: TLSv1 Handshake, length = 93 [write] MD5 and SHA1 hashes: len = 128 0000: 01 03 01 00 57 00 00 00 20 00 00 04 01 00 80 00 ....W... ....... 0010: 00 05 00 00 2F 00 00 33 00 00 32 00 00 0A 07 00 ..../..3..2..... 0020: C0 00 00 16 00 00 13 00 00 09 06 00 40 00 00 15 ............@... 0030: 00 00 12 00 00 03 02 00 80 00 00 08 00 00 14 00 ................ 0040: 00 11 00 00 20 00 00 24 00 00 1F 00 00 23 00 00 .... ..$.....#.. 0050: 1E 00 00 22 00 00 28 00 00 2B 00 00 26 00 00 29 ..."..(..+..&..) 0060: 4B E4 D1 25 04 42 5F 31 4E 7B F0 D0 A2 12 E1 56 K..%.B_1N......V 0070: FC 12 1D 47 9D 97 3D 2C D3 48 85 DC BF 29 2D 8D ...G..=,.H...)-. main, WRITE: SSLv2 client hello message, length = 128 [Raw write]: length = 130 0000: 80 80 01 03 01 00 57 00 00 00 20 00 00 04 01 00 ......W... ..... 0010: 80 00 00 05 00 00 2F 00 00 33 00 00 32 00 00 0A ....../..3..2... 0020: 07 00 C0 00 00 16 00 00 13 00 00 09 06 00 40 00 ..............@. 0030: 00 15 00 00 12 00 00 03 02 00 80 00 00 08 00 00 ................ 0040: 14 00 00 11 00 00 20 00 00 24 00 00 1F 00 00 23 ...... ..$.....# 0050: 00 00 1E 00 00 22 00 00 28 00 00 2B 00 00 26 00 ....."..(..+..&. 0060: 00 29 4B E4 D1 25 04 42 5F 31 4E 7B F0 D0 A2 12 .)K..%.B_1N..... 0070: E1 56 FC 12 1D 47 9D 97 3D 2C D3 48 85 DC BF 29 .V...G..=,.H...) 0080: 2D 8D -. [Raw read]: length = 5 0000: 16 03 01 0D 16 ..... [Raw read]: length = 2515 0000: 02 00 00 46 03 01 4B E4 D1 57 2B 4C E7 E7 78 B4 ...F..K..W+L..x. 0330: 6D 78 C9 79 43 E8 7A 37 FF 5C 35 49 BF A1 C5 0E mx.yC.z7.\5I.... 0340: 00 00 00 ... main, READ: TLSv1 Handshake, length = 3350 *** ServerHello, TLSv1 RandomCookie: GMT: 1256444247 bytes = { 43, 76, 231, 231, 120, 180, 163, 252, 72, 210, 159, 210, 232, 7, 171, 166, 52, 24, 150, 144, 229, 38, 77, 240, 163, 62, 189, 136 } Session ID: {42, 31, 0, 0, 80, 55, 253, 150, 224, 47, 243, 186, 0, 90, 249, 204, 156, 126, 43, 191, 137, 65, 244, 136, 90, 140, 145, 221, 59, 18, 141, 154} Cipher Suite: TLS_RSA_WITH_AES_128_CBC_SHA Compression Method: 0 *** %% Created: [Session-1, TLS_RSA_WITH_AES_128_CBC_SHA] ** TLS_RSA_WITH_AES_128_CBC_SHA [read] MD5 and SHA1 hashes: len = 74 0000: 02 00 00 46 03 01 4B E4 D1 57 2B 4C E7 E7 78 B4 ...F..K..W+L..x. 0010: A3 FC 48 D2 9F D2 E8 07 AB A6 34 18 96 90 E5 26 ..H.......4....& 0020: 4D F0 A3 3E BD 88 20 2A 1F 00 00 50 37 FD 96 E0 M..>.. *...P7... 0030: 2F F3 BA 00 5A F9 CC 9C 7E 2B BF 89 41 F4 88 5A /...Z....+..A..Z 0040: 8C 91 DD 3B 12 8D 9A 00 2F 00 ...;..../. *** Certificate chain chain [0] = [ [ Version: V3 Subject: CN=xxx, OU=Systems, O=xxx, L=xx, ST=xx, C=US Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5 Key: Sun RSA public key, 1024 bits modulus: public exponent: 65537 Validity: [From: Mon Apr 19 20:00:00 EDT 2010, To: Tue Apr 23 19:59:59 EDT 2013] Issuer: CN= SerialNumber: [ ] Certificate Extensions: 9 [1]: ObjectId: 1.3.6.1.5.5.7.1.1 Criticality=false AuthorityInfoAccess [ [accessMethod: 1.3.6.1.5.5.7.48.1 xxx ] [2]: ObjectId: 2.5.29.17 Criticality=false SubjectAlternativeName [ [DNSName: xxx] [3]: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: 50 EA 73 89 DB 29 FB 10 8F 9E E5 01 20 D4 DE 79 P.s..)...... ..y 0010: 99 48 83 F7 .H.. ] ] [4]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 90 45 08 69 5C 17 71 06 61 61 6C 5E 03 6D 94 7D .E.i\.q.aal^.m.. 0010: 41 5E AE 1B A^.. ] ] [5]: ObjectId: 2.5.29.32 Criticality=false CertificatePolicies [ [CertificatePolicyId: [2.16.840.1.114412.1.3.0.1] [PolicyQualifierInfo: [ qualifierID: 1.3.6.1.5.5.7.2.2 qualifier: 0000: 30 82 01 56 1E 82 01 52 00 41 00 6E 00 79 00 20 0..V...R.A.n.y. 0010: 00 75 00 73 00 65 00 20 00 6F 00 66 00 20 00 74 .u.s.e. .o.f. .t ], PolicyQualifierInfo: [ qualifierID: 1.3.6.1.5.5.7.2.1 qualifier: ]] ] ] [6]: ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:false PathLen: undefined ] [7]: ObjectId: 2.5.29.37 Criticality=false ExtendedKeyUsages [ [1.3.6.1.5.5.7.3.1, 1.3.6.1.5.5.7.3.2]] [8]: ObjectId: 2.5.29.31 Criticality=false CRLDistributionPoints [ [DistributionPoint: [URIName: http://.com/ca3-2010d.crl] , DistributionPoint: [URIName: http://..com/ca3-2010d.crl] ]] [9]: ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_Encipherment ] ] Algorithm: [SHA1withRSA] Signature: 0000: 11 73 A7 85 29 F0 F2 1D C0 F1 6A 09 A1 49 28 27 .s..).....j..I(' E8 69 61 2A 56 20 67 A7 B9 D4 8A CE 5B ....ia*V g.....[ ] chain [1] = [ [ Version: V3 Subject: Key: Sun RSA public key, 2048 bits modulus: public exponent: 65537 Validity: [From: Mon Apr 02 20:00:00 EDT 2007, To: Sat Apr 02 20:00:00 EDT 2022] Issuer: Certificate Extensions: 7 [1]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 50 EA 73 89 DB 29 FB 10 8F 9E E5 01 20 D4 DE 79 P.s..)...... ..y 0010: 99 48 83 F7 .H.. ] ] [2]: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: B1 3E C3 69 03 F8 BF 47 01 D4 98 26 1A 08 02 EF .>.i...G...&.... 0010: 63 64 2B C3 cd+. ] ] [3]: ObjectId: 2.5.29.31 Criticality=false CRLDistributionPoints [ [DistributionPoint: [4]: ObjectId: 2.5.29.32 Criticality=false CertificatePolicies [ [CertificatePolicyId: [2.16.840.1.114412.1.3.0.2] [PolicyQualifierInfo: [ qualifierID: 1.3.6.1.5.5.7.2.1 qualifier: 0000: 16 2E 68 74 74 70 3A 2F 2F 77 77 77 2E 64 69 67 ..http://www.dig 0010: 69 63 65 72 74 2E 63 6F 6D 2F 73 73 6C 2D 63 70 icert.com/ssl-cp 0020: 73 2D 72 65 70 6F 73 69 74 6F 72 79 2E 68 74 6D s-repository.htm ], PolicyQualifierInfo: [ qualifierID: 1.3.6.1.5.5.7.2.2 qualifier: 0000: 30 82 01 56 1E 82 01 52 00 41 00 6E 00 79 00 20 0..V...R.A.n.y. 0010: 00 75 00 73 00 65 00 20 00 6F 00 66 00 20 00 74 .u.s.e. .o.f. .t . . . . . ]] ] ] [5]: ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_CertSign Crl_Sign ] [6]: ObjectId: 1.3.6.1.5.5.7.1.1 Criticality=false AuthorityInfoAccess [ [accessMethod: 1 [7]: ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:true PathLen:2147483647 ] ] Algorithm: [SHA1withRSA] Signature: 0000: 5D 4F 84 F1 A8 88 D3 A3 B2 BC 9C 6D E5 29 49 77 ]O.........m.)Iw 0010: E1 E7 D6 DC A9 D8 35 AE C9 71 DC E5 DB DC 9D 24 ......5..q.....$ 0020: 21 90 A6 CF B7 01 1C 9B D4 57 97 91 D7 75 16 A5 !........W...u.. 0030: 12 D7 B9 3D 2E 89 3D 39 69 8A D6 35 37 F9 F1 21 ...=..=9i..57..! 0040: C4 5B 40 AD 59 A9 2F 5F 3A 00 29 43 27 71 03 E4 .[@.Y./_:.)C'q.. 0050: BD 30 32 55 A6 FE 84 0E 0B 9B 38 19 2C 43 7C AC .02U......8.,C.. 0060: 43 BF 75 31 E5 23 1C 45 55 B7 69 08 91 B5 CF D7 C.u1.#.EU.i..... 0070: D5 B1 5E EE 9F 94 E4 D6 7A B9 18 C3 B8 D6 52 63 ..^.....z.....Rc 0080: 1C 10 BA 8B 2F 6D 5D CC 05 38 F4 56 05 6D EF 9E ..../m]..8.V.m.. 0090: EC E8 61 36 0C 14 4B 85 14 5A 0C 83 4F 22 5C 59 ..a6..K..Z..O"\Y 00A0: CB 8C 8A 71 DA FA C5 10 84 58 CF 07 EE E3 90 C2 ...q.....X...... 00B0: F5 F9 29 C7 5A 23 71 F9 59 B4 64 2B 88 B0 A7 36 ..).Z#q.Y.d+...6 00C0: C7 9A 20 61 EB FA 4E B5 AE 6B 1B E4 E3 EC E2 D9 .. a..N..k...... 00D0: 3C 41 49 A8 20 A4 54 F5 92 8D BB C0 55 20 04 A6 <AI. .T.....U .. 00E0: D8 B0 17 16 CC E3 D0 C8 B4 3D E5 D9 84 C6 D3 F6 .........=...... 00F0: 6E 6D 78 C9 79 43 E8 7A 37 FF 5C 35 49 BF A1 C5 nmx.yC.z7.\5I... ] *** Found trusted certificate: [ [ Version: V3 Subject: Key: Sun RSA public key, 2048 bits modulus: public exponent: 65537 Validity: [From: Mon Apr 02 20:00:00 EDT 2007, To: Sat Apr 02 20:00:00 EDT 2022] Issuer: CN= Certificate Extensions: 7 [1]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 50 EA 73 89 DB 29 FB 10 8F 9E E5 01 20 D4 DE 79 P.s..)...... ..y 0010: 99 48 83 F7 .H.. ] ] [2]: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: B1 3E C3 69 03 F8 BF 47 01 D4 98 26 1A 08 02 EF .>.i...G...&.... 0010: 63 64 2B C3 cd+. ] ] [3]: ObjectId: 2.5.29.31 Criticality=false CRLDistributionPoints [ [DistributionPoint: []] [4]: ObjectId: 2.5.29.32 Criticality=false CertificatePolicies 7.\5I... *** ServerHelloDone [read] MD5 and SHA1 hashes: len = 4 0000: 0E 00 00 00 .... *** ClientKeyExchange, RSA PreMasterSecret, TLSv1 Random Secret: { } [write] MD5 and SHA1 hashes: len = 134 0000: 10 00 00 82 00 80 93 4A 6C 8E 21 B1 03 DF FA E2 .......Jl.!..... 0010: 9C 2C 89 DC 88 94 77 26 8D FB 07 43 B6 63 12 89 .,....w&...C.c.. 0020: 48 F7 94 F0 99 E4 98 98 87 C9 BA 30 EB 47 C3 C9 H..........0.G.. 0030: AE E0 CA 18 7C BC 6C 72 54 D0 68 53 F9 32 8F 3F ......lrT.hS.2.? 0040: B3 8A 54 AA EE B2 8E 89 98 C4 5F B5 4B DA 6E 3F ..T......._.K.n? 0050: 0A 5B 01 4B 9A 1A ED 94 F3 DF B9 5F C9 47 38 37 .[.K......._.G87 0060: 29 B6 E2 1B 40 B1 8F 1A 2E D9 C9 A6 86 A4 B4 82 )...@........... 0070: 31 A7 54 95 D1 88 1D D2 CA 88 2E 5A FD B6 E6 7E 1.T........Z.... 0080: E1 25 44 28 C7 88 .%D(.. main, WRITE: TLSv1 Handshake, length = 134 [Raw write]: length = 139 0000: 16 03 01 00 86 10 00 00 82 00 80 93 4A 6C 8E 21 ............Jl.! 0010: B1 03 DF FA E2 9C 2C 89 DC 88 94 77 26 8D FB 07 ......,....w&... 0020: 43 B6 63 12 89 48 F7 94 F0 99 E4 98 98 87 C9 BA C.c..H.......... 0030: 30 EB 47 C3 C9 AE E0 CA 18 7C BC 6C 72 54 D0 68 0.G........lrT.h 0040: 53 F9 32 8F 3F B3 8A 54 AA EE B2 8E 89 98 C4 5F S.2.?..T......._ 0050: B5 4B DA 6E 3F 0A 5B 01 4B 9A 1A ED 94 F3 DF B9 .K.n?.[.K....... 0060: 5F C9 47 38 37 29 B6 E2 1B 40 B1 8F 1A 2E D9 C9 _.G87)...@...... 0070: A6 86 A4 B4 82 31 A7 54 95 D1 88 1D D2 CA 88 2E .....1.T........ 0080: 5A FD B6 E6 7E E1 25 44 28 C7 88 Z.....%D(.. SESSION KEYGEN: PreMaster Secret: 0000: 03 01 06 0D 87 EB 8B 76 53 3B 86 92 4B 62 A8 A8 .......vS;..Kb.. 0010: 81 93 D0 71 41 74 26 DB C7 EB E2 8D 69 35 C6 00 ...qAt&.....i5.. 0020: A4 75 F9 57 0D 21 09 04 67 38 CC 5A DB F3 AA 28 .u.W.!..g8.Z...( CONNECTION KEYGEN: Client Nonce: 0000: 4B E4 D1 25 04 42 5F 31 4E 7B F0 D0 A2 12 E1 56 K..%.B_1N......V 0010: FC 12 1D 47 9D 97 3D 2C D3 48 85 DC BF 29 2D 8D ...G..=,.H...)-. Server Nonce: 0000: 4B E4 D1 57 2B 4C E7 E7 78 B4 A3 FC 48 D2 9F D2 K..W+L..x...H... 0010: E8 07 AB A6 34 18 96 90 E5 26 4D F0 A3 3E BD 88 ....4....&M..>.. Master Secret: 0000: D5 0B 0C E1 79 E2 33 25 DC 3E 4A 7C BB 06 9A 97 ....y.3%.>J..... 0010: 32 DF 3A 4D E2 5A 30 D8 84 FF 8E 6F 84 1B 3B 9D 2.:M.Z0....o..;. 0020: D9 4E 83 E9 82 C9 11 CC 2F F0 71 B0 3F 6C 3B 92 .N....../.q.?l;. Client MAC write Secret: 0000: 3D D3 8E 9F A6 98 86 9A 6D 21 DA 18 65 AA 17 70 =.......m!..e..p 0010: DA 7B 91 0C .... Server MAC write Secret: 0000: DC 81 F0 F2 B6 DE 7C 0E 37 55 D3 38 80 C3 32 B4 ........7U.8..2. 0010: F8 73 DF E3 .s.. Client write key: 0000: 7B FA 8C 89 43 5C ED B4 16 9E C6 6A D3 5D FF A7 ....C\.....j.].. Server write key: 0000: EA 7F CD 96 77 35 0F DB B4 8E 63 FE 41 D9 3B 5F ....w5....c.A.;_ Client write IV: 0000: 74 68 F9 DA BD 6C D3 51 AD 71 1C DF 7B 78 15 B6 th...l.Q.q...x.. Server write IV: 0000: 64 E0 71 8D 7D 53 4B 15 53 AC BD BF F9 C0 78 8D d.q..SK.S.....x. main, WRITE: TLSv1 Change Cipher Spec, length = 1 [Raw write]: length = 6 0000: 14 03 01 00 01 01 ...... *** Finished verify_data: { 109, 97, 67, 95, 197, 170, 72, 116, 16, 58, 97, 123 } *** [write] MD5 and SHA1 hashes: len = 16 0000: 14 00 00 0C 6D 61 43 5F C5 AA 48 74 10 3A 61 7B ....maC_..Ht.:a. Padded plaintext before ENCRYPTION: len = 48 0000: 14 00 00 0C 6D 61 43 5F C5 AA 48 74 10 3A 61 7B ....maC_..Ht.:a. 0010: D1 1D A4 5B A0 A4 EE 28 30 4E 09 0C 48 33 76 98 ...[...(0N..H3v. 0020: B8 86 20 55 0B 0B 0B 0B 0B 0B 0B 0B 0B 0B 0B 0B .. U............ main, WRITE: TLSv1 Handshake, length = 48 [Raw write]: length = 53 0000: 16 03 01 00 30 E2 0A AB B5 AA FC 77 B6 D5 EB 94 ....0......w.... 0010: 6B 33 3B D3 75 23 D4 B2 11 79 94 BA 82 54 84 EE k3;.u#...y...T.. 0020: DE 70 8B 44 B2 8F 09 EC 09 C2 F4 29 DD 76 3E 4A .p.D.......).v>J 0030: C7 18 97 B9 78 ....x [Raw read]: length = 5 0000: 14 03 01 00 01 ..... [Raw read]: length = 1 0000: 01 . main, READ: TLSv1 Change Cipher Spec, length = 1 [Raw read]: length = 5 0000: 16 03 01 00 30 ....0 [Raw read]: length = 48 0000: 2A 3D AE FF DE 13 07 3B 34 B8 F0 22 95 9E 00 1D *=.....;4..".... 0010: 00 52 A5 CD 16 FC FE 2E E7 4E 21 C9 3E C8 F7 B7 .R.......N!.>... 0020: 4D 56 B7 DC 99 13 C8 06 04 65 13 D3 90 F6 74 25 MV.......e....t% main, READ: TLSv1 Handshake, length = 48 Padded plaintext after DECRYPTION: len = 48 0000: 14 00 00 0C 6A 97 DB 52 C7 68 28 67 51 ED 9E 38 ....j..R.h(gQ..8 0010: 8C 9B 50 F3 92 11 26 4C 2D 01 B6 11 B5 9C 76 72 ..P...&L-.....vr 0020: 8B 14 5F 0E 0B 0B 0B 0B 0B 0B 0B 0B 0B 0B 0B 0B .._............. *** Finished verify_data: { 106, 151, 219, 82, 199, 104, 40, 103, 81, 237, 158, 56 } *** %% Cached client session: [Session-1, TLS_RSA_WITH_AES_128_CBC_SHA] [read] MD5 and SHA1 hashes: len = 16 0000: 14 00 00 0C 6A 97 DB 52 C7 68 28 67 51 ED 9E 38 ....j..R.h(gQ..8 Padded plaintext before ENCRYPTION: len = 368 0010: 73 02 B7 C1 57 8E EF A2 07 07 07 07 07 07 07 07 s...W........... *** HelloRequest (empty) %% Client cached [Session-1, TLS_RSA_WITH_AES_128_CBC_SHA] %% Try resuming [Session-1, TLS_RSA_WITH_AES_128_CBC_SHA] from port 2546 *** ClientHello, TLSv1 RandomCookie: GMT: 1256444197 bytes = { 138, 120, 134, 63, 86, 223, 42, 123, 137, 19, 60, 7, 83, 60, 199, 60, 186, 57, 95, 244, 139, 119, 158, 37, 252, 43, 243, 88 } Session ID: {42, 31, 0, 0, 80, 55, 253, 150, 224, 47, 243, 186, 0, 90, 249, 204, 156, 126, 43, 191, 137, 65, 244, 136, 90, 140, 145, 221, 59, 18, 141, 154} Cipher Suites: [SSL_RSA_WITH_RC4_128_MD5, SSL_RSA_WITH_RC4_128_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_DES_CBC_SHA, SSL_DHE_RSA_WITH_DES_CBC_SHA, SSL_DHE_DSS_WITH_DES_CBC_SHA, SSL_RSA_EXPORT_WITH_RC4_40_MD5, SSL_RSA_EXPORT_WITH_DES40_CBC_SHA, SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA, SSL_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA, TLS_KRB5_WITH_RC4_128_SHA, TLS_KRB5_WITH_RC4_128_MD5, TLS_KRB5_WITH_3DES_EDE_CBC_SHA, TLS_KRB5_WITH_3DES_EDE_CBC_MD5, TLS_KRB5_WITH_DES_CBC_SHA, TLS_KRB5_WITH_DES_CBC_MD5, TLS_KRB5_EXPORT_WITH_RC4_40_SHA, TLS_KRB5_EXPORT_WITH_RC4_40_MD5, TLS_KRB5_EXPORT_WITH_DES_CBC_40_SHA, TLS_KRB5_EXPORT_WITH_DES_CBC_40_MD5] Compression Methods: { 0 } *** [write] MD5 and SHA1 hashes: len = 125 main, READ: TLSv1 Handshake, length = 4736 Padded plaintext after DECRYPTION: len = 4736 *** ServerHello, TLSv1 RandomCookie: GMT: 1256444248 bytes = { 203, 166, 103, 61, 49, 5, 241, 224, 171, 116, 142, 41, 158, 125, 94, 19, 126, 235, 117, 67, 245, 85, 76, 236, 239, 134, 179, 151 } Session ID: {76, 11, 0, 0, 115, 46, 228, 166, 49, 19, 37, 7, 178, 252, 166, 228, 215, 246, 221, 20, 93, 151, 217, 62, 204, 21, 243, 187, 119, 92, 42, 174} Cipher Suite: TLS_RSA_WITH_AES_128_CBC_SHA Compression Method: 0 *** %% Created: [Session-2, TLS_RSA_WITH_AES_128_CBC_SHA] ** TLS_RSA_WITH_AES_128_CBC_SHA *** Certificate chain chain [0] = [ [ Version: V3 Subject: CN= Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5 Key: Sun RSA public key, 1024 bits modulus: public exponent: 65537 Validity: [ Certificate Extensions: 9 [1]: ObjectId: 1.3.6.1.5.5.7.1.1 Criticality=false AuthorityInfoAccess [ [accessMethod: 1.3.6.1.5.5.7.48.1 ] [2]: ObjectId: 2.5.29.17 Criticality=f *** Found trusted certificate: [ [ 7.\5I... *** CertificateRequest Cert Types: RSA, DSS, Type-64, Cert Authorities: . . . . . . .[read] MD5 and SHA1 hashes: len = 1365 *** ServerHelloDone [read] MD5 and SHA1 hashes: len = 4 0000: 0E 00 00 00 .... *** Certificate chain *** *** ClientKeyExchange, RSA PreMasterSecret, TLSv1 [Raw write]: length = 181 *** Finished verify_data: { 214, 45, 110, 126, 40, 45, 100, 196, 135, 143, 51, 126 } *** [write] MD5 and SHA1 hashes: len = 16 0000: 14 00 00 0C D6 2D 6E 7E 28 2D 64 C4 87 8F 33 7E .....-n.(-d...3. Padded plaintext before ENCRYPTION: len = 48 Padded plaintext after DECRYPTION: len = 48 0000: 14 00 00 0C 10 40 85 14 79 98 95 9A 19 46 04 D6 .....@..y....F.. 0010: AC 82 3B 0A 87 3F CE B3 CC B5 36 6E 36 F4 AB 0A ..;..?....6n6... 0020: C4 C7 7C B3 0B 0B 0B 0B 0B 0B 0B 0B 0B 0B 0B 0B ................ *** Finished verify_data: { 16, 64, 133, 20, 121, 152, 149, 154, 25, 70, 4, 214 } *** %% Cached client session: [Session-2, TLS_RSA_WITH_AES_128_CBC_SHA] [read] MD5 and SHA1 hashes: len = 16 0000: 14 00 00 0C 10 40 85 14 79 98 95 9A 19 46 04 D6 .....@..y....F.. [Raw read]: length = 5 0000: 17 03 01 05 90 ..... [Raw read]: length = 1424 May 7, 2010 10:49:09 PM org.apache.cxf.interceptor.LoggingInInterceptor logging INFO: Inbound Message ---------------------------- ID: 1 Response-Code: 403 Encoding: ISO-8859-1 Content-Type: text/html Headers: {Content-Length=[1233], X-Powered-By=[ASP.NET], Date=[Sat, 08 May 2010 02:50:00 GMT], Server=[Microsoft-IIS/7.0], content-type=[text/html]} Payload: <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head> <meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1"/> <title>403 - Forbidden: Access is denied.</title> <style type="text/css"> <!-- body{margin:0;font-size:.7em;font-family:Verdana, Arial, Helvetica, sans-serif;background:#EEEEEE;} fieldset{padding:0 15px 10px 15px;} h1{font-size:2.4em;margin:0;color:#FFF;} h2{font-size:1.7em;margin:0;color:#CC0000;} h3{font-size:1.2em;margin:10px 0 0 0;color:#000000;} #header{width:96%;margin:0 0 0 0;padding:6px 2% 6px 2%;font-family:"trebuchet MS", Verdana, sans-serif;color:#FFF; background-color:#555555;} #content{margin:0 0 0 2%;position:relative;} .content-container{background:#FFF;width:96%;margin-top:8px;padding:10px;position:relative;} --> </style> </head> <body> <div id="header"><h1>Server Error</h1></div> <div id="content"> <div class="content-container"><fieldset> <h2>403 - Forbidden: Access is denied.</h2> <h3>You do not have permission to view this directory or page using the credentials that you supplied.</h3> </fieldset></div> </div> </body> </html> at org.apache.cxf.interceptor.StaxInInterceptor.handleMessage(StaxInInterceptor.java:77) at org.apache.cxf.phase.PhaseInterceptorChain.doIntercept(PhaseInterceptorChain.java:243)
  4. Speed up your debug routine!

    Automated exception search integrated into your IDE

  5. 0

    users-cxf-apache - Encoding special characters when marshalling - msg#00079 - Recent Discussion OSDir.com

    osdir.com | 8 months ago
    java.lang.RuntimeException: Default SSL context init failed: Keystore was tampered with, or password was incorrect trustStore is: C:\temp\digicert\truststore.jks trustStore type is : jks trustStore provider is : init truststore adding as trusted cert: Valid from Mon Apr 02 20:00:00 EDT 2007 until Sat Apr 02 20:00:00 EDT 2022 trigger seeding of SecureRandom done seeding SecureRandom May 7, 2010 10:49:09 PM org.apache.cxf.transport.https.SSLUtils getCiphersuites INFO: The cipher suites have not been configured, falling back to cipher suite filters. May 7, 2010 10:49:09 PM org.apache.cxf.transport.https.SSLUtils getCiphersuites INFO: The cipher suite filters have not been configured, falling back to default filters. May 7, 2010 10:49:09 PM org.apache.cxf.transport.https.SSLUtils getCiphersFromList INFO: The cipher suites have been set to SSL_RSA_WITH_RC4_128_MD5, SSL_RSA_WITH_RC4_128_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_DES_CBC_SHA, SSL_DHE_RSA_WITH_DES_CBC_SHA, SSL_DHE_DSS_WITH_DES_CBC_SHA, SSL_RSA_EXPORT_WITH_RC4_40_MD5, SSL_RSA_EXPORT_WITH_DES40_CBC_SHA, SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA, SSL_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA, TLS_KRB5_WITH_RC4_128_SHA, TLS_KRB5_WITH_RC4_128_MD5, TLS_KRB5_WITH_3DES_EDE_CBC_SHA, TLS_KRB5_WITH_3DES_EDE_CBC_MD5, TLS_KRB5_WITH_DES_CBC_SHA, TLS_KRB5_WITH_DES_CBC_MD5, TLS_KRB5_EXPORT_WITH_RC4_40_SHA, TLS_KRB5_EXPORT_WITH_RC4_40_MD5, TLS_KRB5_EXPORT_WITH_DES_CBC_40_SHA, TLS_KRB5_EXPORT_WITH_DES_CBC_40_MD5. May 7, 2010 10:49:09 PM org.apache.cxf.interceptor.LoggingOutInterceptor$LoggingCallback onClose INFO: Outbound Message --------------------------- ID: 1 Address: Encoding: UTF-8 Content-Type: text/xml -------------------------------------- %% No cached client session *** ClientHello, TLSv1 RandomCookie: GMT: 1256444197 bytes = { 4, 66, 95, 49, 78, 123, 240, 208, 162, 18, 225, 86, 252, 18, 29, 71, 157, 151, 61, 44, 211, 72, 133, 220, 191, 41, 45, 141 } Session ID: {} Cipher Suites: [SSL_RSA_WITH_RC4_128_MD5, SSL_RSA_WITH_RC4_128_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_DES_CBC_SHA, SSL_DHE_RSA_WITH_DES_CBC_SHA, SSL_DHE_DSS_WITH_DES_CBC_SHA, SSL_RSA_EXPORT_WITH_RC4_40_MD5, SSL_RSA_EXPORT_WITH_DES40_CBC_SHA, SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA, SSL_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA, TLS_KRB5_WITH_RC4_128_SHA, TLS_KRB5_WITH_RC4_128_MD5, TLS_KRB5_WITH_3DES_EDE_CBC_SHA, TLS_KRB5_WITH_3DES_EDE_CBC_MD5, TLS_KRB5_WITH_DES_CBC_SHA, TLS_KRB5_WITH_DES_CBC_MD5, TLS_KRB5_EXPORT_WITH_RC4_40_SHA, TLS_KRB5_EXPORT_WITH_RC4_40_MD5, TLS_KRB5_EXPORT_WITH_DES_CBC_40_SHA, TLS_KRB5_EXPORT_WITH_DES_CBC_40_MD5] Compression Methods: { 0 } *** [write] MD5 and SHA1 hashes: len = 93 0000: 01 00 00 59 03 01 4B E4 D1 25 04 42 5F 31 4E 7B ...Y..K..%.B_1N. 0010: F0 D0 A2 12 E1 56 FC 12 1D 47 9D 97 3D 2C D3 48 .....V...G..=,.H 0020: 85 DC BF 29 2D 8D 00 00 32 00 04 00 05 00 2F 00 ...)-...2...../. 0030: 33 00 32 00 0A 00 16 00 13 00 09 00 15 00 12 00 3.2............. 0040: 03 00 08 00 14 00 11 00 20 00 24 00 1F 00 23 00 ........ .$...#. 0050: 1E 00 22 00 28 00 2B 00 26 00 29 01 00 ..".(.+.&.).. main, WRITE: TLSv1 Handshake, length = 93 [write] MD5 and SHA1 hashes: len = 128 0000: 01 03 01 00 57 00 00 00 20 00 00 04 01 00 80 00 ....W... ....... 0010: 00 05 00 00 2F 00 00 33 00 00 32 00 00 0A 07 00 ..../..3..2..... 0020: C0 00 00 16 00 00 13 00 00 09 06 00 40 00 00 15 ............@... 0030: 00 00 12 00 00 03 02 00 80 00 00 08 00 00 14 00 ................ 0040: 00 11 00 00 20 00 00 24 00 00 1F 00 00 23 00 00 .... ..$.....#.. 0050: 1E 00 00 22 00 00 28 00 00 2B 00 00 26 00 00 29 ..."..(..+..&..) 0060: 4B E4 D1 25 04 42 5F 31 4E 7B F0 D0 A2 12 E1 56 K..%.B_1N......V 0070: FC 12 1D 47 9D 97 3D 2C D3 48 85 DC BF 29 2D 8D ...G..=,.H...)-. main, WRITE: SSLv2 client hello message, length = 128 [Raw write]: length = 130 0000: 80 80 01 03 01 00 57 00 00 00 20 00 00 04 01 00 ......W... ..... 0010: 80 00 00 05 00 00 2F 00 00 33 00 00 32 00 00 0A ....../..3..2... 0020: 07 00 C0 00 00 16 00 00 13 00 00 09 06 00 40 00 ..............@. 0030: 00 15 00 00 12 00 00 03 02 00 80 00 00 08 00 00 ................ 0040: 14 00 00 11 00 00 20 00 00 24 00 00 1F 00 00 23 ...... ..$.....# 0050: 00 00 1E 00 00 22 00 00 28 00 00 2B 00 00 26 00 ....."..(..+..&. 0060: 00 29 4B E4 D1 25 04 42 5F 31 4E 7B F0 D0 A2 12 .)K..%.B_1N..... 0070: E1 56 FC 12 1D 47 9D 97 3D 2C D3 48 85 DC BF 29 .V...G..=,.H...) 0080: 2D 8D -. [Raw read]: length = 5 0000: 16 03 01 0D 16 ..... [Raw read]: length = 2515 0000: 02 00 00 46 03 01 4B E4 D1 57 2B 4C E7 E7 78 B4 ...F..K..W+L..x. 0330: 6D 78 C9 79 43 E8 7A 37 FF 5C 35 49 BF A1 C5 0E mx.yC.z7.\5I.... 0340: 00 00 00 ... main, READ: TLSv1 Handshake, length = 3350 *** ServerHello, TLSv1 RandomCookie: GMT: 1256444247 bytes = { 43, 76, 231, 231, 120, 180, 163, 252, 72, 210, 159, 210, 232, 7, 171, 166, 52, 24, 150, 144, 229, 38, 77, 240, 163, 62, 189, 136 } Session ID: {42, 31, 0, 0, 80, 55, 253, 150, 224, 47, 243, 186, 0, 90, 249, 204, 156, 126, 43, 191, 137, 65, 244, 136, 90, 140, 145, 221, 59, 18, 141, 154} Cipher Suite: TLS_RSA_WITH_AES_128_CBC_SHA Compression Method: 0 *** %% Created: [Session-1, TLS_RSA_WITH_AES_128_CBC_SHA] ** TLS_RSA_WITH_AES_128_CBC_SHA [read] MD5 and SHA1 hashes: len = 74 0000: 02 00 00 46 03 01 4B E4 D1 57 2B 4C E7 E7 78 B4 ...F..K..W+L..x. 0010: A3 FC 48 D2 9F D2 E8 07 AB A6 34 18 96 90 E5 26 ..H.......4....& 0020: 4D F0 A3 3E BD 88 20 2A 1F 00 00 50 37 FD 96 E0 M..>.. *...P7... 0030: 2F F3 BA 00 5A F9 CC 9C 7E 2B BF 89 41 F4 88 5A /...Z....+..A..Z 0040: 8C 91 DD 3B 12 8D 9A 00 2F 00 ...;..../. *** Certificate chain chain [0] = [ [ Version: V3 Subject: CN=xxx, OU=Systems, O=xxx, L=xx, ST=xx, C=US Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5 Key: Sun RSA public key, 1024 bits modulus: public exponent: 65537 Validity: [From: Mon Apr 19 20:00:00 EDT 2010, To: Tue Apr 23 19:59:59 EDT 2013] Issuer: CN= SerialNumber: [ ] Certificate Extensions: 9 [1]: ObjectId: 1.3.6.1.5.5.7.1.1 Criticality=false AuthorityInfoAccess [ [accessMethod: 1.3.6.1.5.5.7.48.1 xxx ] [2]: ObjectId: 2.5.29.17 Criticality=false SubjectAlternativeName [ [DNSName: xxx] [3]: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: 50 EA 73 89 DB 29 FB 10 8F 9E E5 01 20 D4 DE 79 P.s..)...... ..y 0010: 99 48 83 F7 .H.. ] ] [4]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 90 45 08 69 5C 17 71 06 61 61 6C 5E 03 6D 94 7D .E.i\.q.aal^.m.. 0010: 41 5E AE 1B A^.. ] ] [5]: ObjectId: 2.5.29.32 Criticality=false CertificatePolicies [ [CertificatePolicyId: [2.16.840.1.114412.1.3.0.1] [PolicyQualifierInfo: [ qualifierID: 1.3.6.1.5.5.7.2.2 qualifier: 0000: 30 82 01 56 1E 82 01 52 00 41 00 6E 00 79 00 20 0..V...R.A.n.y. 0010: 00 75 00 73 00 65 00 20 00 6F 00 66 00 20 00 74 .u.s.e. .o.f. .t ], PolicyQualifierInfo: [ qualifierID: 1.3.6.1.5.5.7.2.1 qualifier: ]] ] ] [6]: ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:false PathLen: undefined ] [7]: ObjectId: 2.5.29.37 Criticality=false ExtendedKeyUsages [ [1.3.6.1.5.5.7.3.1, 1.3.6.1.5.5.7.3.2]] [8]: ObjectId: 2.5.29.31 Criticality=false CRLDistributionPoints [ [DistributionPoint: [URIName: ] , DistributionPoint: [URIName: ] ]] [9]: ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_Encipherment ] ] Algorithm: [SHA1withRSA] Signature: 0000: 11 73 A7 85 29 F0 F2 1D C0 F1 6A 09 A1 49 28 27 .s..).....j..I(' E8 69 61 2A 56 20 67 A7 B9 D4 8A CE 5B ....ia*V g.....[ ] chain [1] = [ [ Version: V3 Subject: Key: Sun RSA public key, 2048 bits modulus: public exponent: 65537 Validity: [From: Mon Apr 02 20:00:00 EDT 2007, To: Sat Apr 02 20:00:00 EDT 2022] Issuer: Certificate Extensions: 7 [1]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 50 EA 73 89 DB 29 FB 10 8F 9E E5 01 20 D4 DE 79 P.s..)...... ..y 0010: 99 48 83 F7 .H.. ] ] [2]: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: B1 3E C3 69 03 F8 BF 47 01 D4 98 26 1A 08 02 EF .>.i...G...&.... 0010: 63 64 2B C3 cd+. ] ] [3]: ObjectId: 2.5.29.31 Criticality=false CRLDistributionPoints [ [DistributionPoint: [4]: ObjectId: 2.5.29.32 Criticality=false CertificatePolicies [ [CertificatePolicyId: [2.16.840.1.114412.1.3.0.2] [PolicyQualifierInfo: [ qualifierID: 1.3.6.1.5.5.7.2.1 qualifier: 0000: 16 2E 68 74 74 70 3A 2F 2F 77 77 77 2E 64 69 67 .. 0010: 69 63 65 72 74 2E 63 6F 6D 2F 73 73 6C 2D 63 70 icert.com/ssl-cp 0020: 73 2D 72 65 70 6F 73 69 74 6F 72 79 2E 68 74 6D s-repository.htm ], PolicyQualifierInfo: [ qualifierID: 1.3.6.1.5.5.7.2.2 qualifier: 0000: 30 82 01 56 1E 82 01 52 00 41 00 6E 00 79 00 20 0..V...R.A.n.y. 0010: 00 75 00 73 00 65 00 20 00 6F 00 66 00 20 00 74 .u.s.e. .o.f. .t . . . . . ]] ] ] [5]: ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_CertSign Crl_Sign ] [6]: ObjectId: 1.3.6.1.5.5.7.1.1 Criticality=false AuthorityInfoAccess [ [accessMethod: 1 [7]: ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:true PathLen:2147483647 ] ] Algorithm: [SHA1withRSA] Signature: 0000: 5D 4F 84 F1 A8 88 D3 A3 B2 BC 9C 6D E5 29 49 77 ]O.........m.)Iw 0010: E1 E7 D6 DC A9 D8 35 AE C9 71 DC E5 DB DC 9D 24 ......5..q.....$ 0020: 21 90 A6 CF B7 01 1C 9B D4 57 97 91 D7 75 16 A5 !........W...u.. 0030: 12 D7 B9 3D 2E 89 3D 39 69 8A D6 35 37 F9 F1 21 ...=..=9i..57..! 0040: C4 5B 40 AD 59 A9 2F 5F 3A 00 29 43 27 71 03 E4 .[@.Y./_:.)C'q.. 0050: BD 30 32 55 A6 FE 84 0E 0B 9B 38 19 2C 43 7C AC .02U......8.,C.. 0060: 43 BF 75 31 E5 23 1C 45 55 B7 69 08 91 B5 CF D7 C.u1.#.EU.i..... 0070: D5 B1 5E EE 9F 94 E4 D6 7A B9 18 C3 B8 D6 52 63 ..^.....z.....Rc 0080: 1C 10 BA 8B 2F 6D 5D CC 05 38 F4 56 05 6D EF 9E ..../m]..8.V.m.. 0090: EC E8 61 36 0C 14 4B 85 14 5A 0C 83 4F 22 5C 59 ..a6..K..Z..O"\Y 00A0: CB 8C 8A 71 DA FA C5 10 84 58 CF 07 EE E3 90 C2 ...q.....X...... 00B0: F5 F9 29 C7 5A 23 71 F9 59 B4 64 2B 88 B0 A7 36 ..).Z#q.Y.d+...6 00C0: C7 9A 20 61 EB FA 4E B5 AE 6B 1B E4 E3 EC E2 D9 .. a..N..k...... 00D0: 3C 41 49 A8 20 A4 54 F5 92 8D BB C0 55 20 04 A6 <AI. .T.....U .. 00E0: D8 B0 17 16 CC E3 D0 C8 B4 3D E5 D9 84 C6 D3 F6 .........=...... 00F0: 6E 6D 78 C9 79 43 E8 7A 37 FF 5C 35 49 BF A1 C5 nmx.yC.z7.\5I... ] *** Found trusted certificate: [ [ Version: V3 Subject: Key: Sun RSA public key, 2048 bits modulus: public exponent: 65537 Validity: [From: Mon Apr 02 20:00:00 EDT 2007, To: Sat Apr 02 20:00:00 EDT 2022] Issuer: CN= Certificate Extensions: 7 [1]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 50 EA 73 89 DB 29 FB 10 8F 9E E5 01 20 D4 DE 79 P.s..)...... ..y 0010: 99 48 83 F7 .H.. ] ] [2]: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: B1 3E C3 69 03 F8 BF 47 01 D4 98 26 1A 08 02 EF .>.i...G...&.... 0010: 63 64 2B C3 cd+. ] ] [3]: ObjectId: 2.5.29.31 Criticality=false CRLDistributionPoints [ [DistributionPoint: []] [4]: ObjectId: 2.5.29.32 Criticality=false CertificatePolicies 7.\5I... *** ServerHelloDone [read] MD5 and SHA1 hashes: len = 4 0000: 0E 00 00 00 .... *** ClientKeyExchange, RSA PreMasterSecret, TLSv1 Random Secret: { } [write] MD5 and SHA1 hashes: len = 134 0000: 10 00 00 82 00 80 93 4A 6C 8E 21 B1 03 DF FA E2 .......Jl.!..... 0010: 9C 2C 89 DC 88 94 77 26 8D FB 07 43 B6 63 12 89 .,....w&...C.c.. 0020: 48 F7 94 F0 99 E4 98 98 87 C9 BA 30 EB 47 C3 C9 H..........0.G.. 0030: AE E0 CA 18 7C BC 6C 72 54 D0 68 53 F9 32 8F 3F ......lrT.hS.2.? 0040: B3 8A 54 AA EE B2 8E 89 98 C4 5F B5 4B DA 6E 3F ..T......._.K.n? 0050: 0A 5B 01 4B 9A 1A ED 94 F3 DF B9 5F C9 47 38 37 .[.K......._.G87 0060: 29 B6 E2 1B 40 B1 8F 1A 2E D9 C9 A6 86 A4 B4 82 )...@........... 0070: 31 A7 54 95 D1 88 1D D2 CA 88 2E 5A FD B6 E6 7E 1.T........Z.... 0080: E1 25 44 28 C7 88 .%D(.. main, WRITE: TLSv1 Handshake, length = 134 [Raw write]: length = 139 0000: 16 03 01 00 86 10 00 00 82 00 80 93 4A 6C 8E 21 ............Jl.! 0010: B1 03 DF FA E2 9C 2C 89 DC 88 94 77 26 8D FB 07 ......,....w&... 0020: 43 B6 63 12 89 48 F7 94 F0 99 E4 98 98 87 C9 BA C.c..H.......... 0030: 30 EB 47 C3 C9 AE E0 CA 18 7C BC 6C 72 54 D0 68 0.G........lrT.h 0040: 53 F9 32 8F 3F B3 8A 54 AA EE B2 8E 89 98 C4 5F S.2.?..T......._ 0050: B5 4B DA 6E 3F 0A 5B 01 4B 9A 1A ED 94 F3 DF B9 .K.n?.[.K....... 0060: 5F C9 47 38 37 29 B6 E2 1B 40 B1 8F 1A 2E D9 C9 _.G87)...@...... 0070: A6 86 A4 B4 82 31 A7 54 95 D1 88 1D D2 CA 88 2E .....1.T........ 0080: 5A FD B6 E6 7E E1 25 44 28 C7 88 Z.....%D(.. SESSION KEYGEN: PreMaster Secret: 0000: 03 01 06 0D 87 EB 8B 76 53 3B 86 92 4B 62 A8 A8 .......vS;..Kb.. 0010: 81 93 D0 71 41 74 26 DB C7 EB E2 8D 69 35 C6 00 ...qAt&.....i5.. 0020: A4 75 F9 57 0D 21 09 04 67 38 CC 5A DB F3 AA 28 .u.W.!..g8.Z...( CONNECTION KEYGEN: Client Nonce: 0000: 4B E4 D1 25 04 42 5F 31 4E 7B F0 D0 A2 12 E1 56 K..%.B_1N......V 0010: FC 12 1D 47 9D 97 3D 2C D3 48 85 DC BF 29 2D 8D ...G..=,.H...)-. Server Nonce: 0000: 4B E4 D1 57 2B 4C E7 E7 78 B4 A3 FC 48 D2 9F D2 K..W+L..x...H... 0010: E8 07 AB A6 34 18 96 90 E5 26 4D F0 A3 3E BD 88 ....4....&M..>.. Master Secret: 0000: D5 0B 0C E1 79 E2 33 25 DC 3E 4A 7C BB 06 9A 97 ....y.3%.>J..... 0010: 32 DF 3A 4D E2 5A 30 D8 84 FF 8E 6F 84 1B 3B 9D 2.:M.Z0....o..;. 0020: D9 4E 83 E9 82 C9 11 CC 2F F0 71 B0 3F 6C 3B 92 .N....../.q.?l;. Client MAC write Secret: 0000: 3D D3 8E 9F A6 98 86 9A 6D 21 DA 18 65 AA 17 70 =.......m!..e..p 0010: DA 7B 91 0C .... Server MAC write Secret: 0000: DC 81 F0 F2 B6 DE 7C 0E 37 55 D3 38 80 C3 32 B4 ........7U.8..2. 0010: F8 73 DF E3 .s.. Client write key: 0000: 7B FA 8C 89 43 5C ED B4 16 9E C6 6A D3 5D FF A7 ....C\.....j.].. Server write key: 0000: EA 7F CD 96 77 35 0F DB B4 8E 63 FE 41 D9 3B 5F ....w5....c.A.;_ Client write IV: 0000: 74 68 F9 DA BD 6C D3 51 AD 71 1C DF 7B 78 15 B6 th...l.Q.q...x.. Server write IV: 0000: 64 E0 71 8D 7D 53 4B 15 53 AC BD BF F9 C0 78 8D d.q..SK.S.....x. main, WRITE: TLSv1 Change Cipher Spec, length = 1 [Raw write]: length = 6 0000: 14 03 01 00 01 01 ...... *** Finished verify_data: { 109, 97, 67, 95, 197, 170, 72, 116, 16, 58, 97, 123 } *** [write] MD5 and SHA1 hashes: len = 16 0000: 14 00 00 0C 6D 61 43 5F C5 AA 48 74 10 3A 61 7B ....maC_..Ht.:a. Padded plaintext before ENCRYPTION: len = 48 0000: 14 00 00 0C 6D 61 43 5F C5 AA 48 74 10 3A 61 7B ....maC_..Ht.:a. 0010: D1 1D A4 5B A0 A4 EE 28 30 4E 09 0C 48 33 76 98 ...[...(0N..H3v. 0020: B8 86 20 55 0B 0B 0B 0B 0B 0B 0B 0B 0B 0B 0B 0B .. U............ main, WRITE: TLSv1 Handshake, length = 48 [Raw write]: length = 53 0000: 16 03 01 00 30 E2 0A AB B5 AA FC 77 B6 D5 EB 94 ....0......w.... 0010: 6B 33 3B D3 75 23 D4 B2 11 79 94 BA 82 54 84 EE k3;.u#...y...T.. 0020: DE 70 8B 44 B2 8F 09 EC 09 C2 F4 29 DD 76 3E 4A .p.D.......).v>J 0030: C7 18 97 B9 78 ....x [Raw read]: length = 5 0000: 14 03 01 00 01 ..... [Raw read]: length = 1 0000: 01 . main, READ: TLSv1 Change Cipher Spec, length = 1 [Raw read]: length = 5 0000: 16 03 01 00 30 ....0 [Raw read]: length = 48 0000: 2A 3D AE FF DE 13 07 3B 34 B8 F0 22 95 9E 00 1D *=.....;4..".... 0010: 00 52 A5 CD 16 FC FE 2E E7 4E 21 C9 3E C8 F7 B7 .R.......N!.>... 0020: 4D 56 B7 DC 99 13 C8 06 04 65 13 D3 90 F6 74 25 MV.......e....t% main, READ: TLSv1 Handshake, length = 48 Padded plaintext after DECRYPTION: len = 48 0000: 14 00 00 0C 6A 97 DB 52 C7 68 28 67 51 ED 9E 38 ....j..R.h(gQ..8 0010: 8C 9B 50 F3 92 11 26 4C 2D 01 B6 11 B5 9C 76 72 ..P...&L-.....vr 0020: 8B 14 5F 0E 0B 0B 0B 0B 0B 0B 0B 0B 0B 0B 0B 0B .._............. *** Finished verify_data: { 106, 151, 219, 82, 199, 104, 40, 103, 81, 237, 158, 56 } *** %% Cached client session: [Session-1, TLS_RSA_WITH_AES_128_CBC_SHA] [read] MD5 and SHA1 hashes: len = 16 0000: 14 00 00 0C 6A 97 DB 52 C7 68 28 67 51 ED 9E 38 ....j..R.h(gQ..8 Padded plaintext before ENCRYPTION: len = 368 0010: 73 02 B7 C1 57 8E EF A2 07 07 07 07 07 07 07 07 s...W........... *** HelloRequest (empty) %% Client cached [Session-1, TLS_RSA_WITH_AES_128_CBC_SHA] %% Try resuming [Session-1, TLS_RSA_WITH_AES_128_CBC_SHA] from port 2546 *** ClientHello, TLSv1 RandomCookie: GMT: 1256444197 bytes = { 138, 120, 134, 63, 86, 223, 42, 123, 137, 19, 60, 7, 83, 60, 199, 60, 186, 57, 95, 244, 139, 119, 158, 37, 252, 43, 243, 88 } Session ID: {42, 31, 0, 0, 80, 55, 253, 150, 224, 47, 243, 186, 0, 90, 249, 204, 156, 126, 43, 191, 137, 65, 244, 136, 90, 140, 145, 221, 59, 18, 141, 154} Cipher Suites: [SSL_RSA_WITH_RC4_128_MD5, SSL_RSA_WITH_RC4_128_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_DES_CBC_SHA, SSL_DHE_RSA_WITH_DES_CBC_SHA, SSL_DHE_DSS_WITH_DES_CBC_SHA, SSL_RSA_EXPORT_WITH_RC4_40_MD5, SSL_RSA_EXPORT_WITH_DES40_CBC_SHA, SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA, SSL_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA, TLS_KRB5_WITH_RC4_128_SHA, TLS_KRB5_WITH_RC4_128_MD5, TLS_KRB5_WITH_3DES_EDE_CBC_SHA, TLS_KRB5_WITH_3DES_EDE_CBC_MD5, TLS_KRB5_WITH_DES_CBC_SHA, TLS_KRB5_WITH_DES_CBC_MD5, TLS_KRB5_EXPORT_WITH_RC4_40_SHA, TLS_KRB5_EXPORT_WITH_RC4_40_MD5, TLS_KRB5_EXPORT_WITH_DES_CBC_40_SHA, TLS_KRB5_EXPORT_WITH_DES_CBC_40_MD5] Compression Methods: { 0 } *** [write] MD5 and SHA1 hashes: len = 125 main, READ: TLSv1 Handshake, length = 4736 Padded plaintext after DECRYPTION: len = 4736 *** ServerHello, TLSv1 RandomCookie: GMT: 1256444248 bytes = { 203, 166, 103, 61, 49, 5, 241, 224, 171, 116, 142, 41, 158, 125, 94, 19, 126, 235, 117, 67, 245, 85, 76, 236, 239, 134, 179, 151 } Session ID: {76, 11, 0, 0, 115, 46, 228, 166, 49, 19, 37, 7, 178, 252, 166, 228, 215, 246, 221, 20, 93, 151, 217, 62, 204, 21, 243, 187, 119, 92, 42, 174} Cipher Suite: TLS_RSA_WITH_AES_128_CBC_SHA Compression Method: 0 *** %% Created: [Session-2, TLS_RSA_WITH_AES_128_CBC_SHA] ** TLS_RSA_WITH_AES_128_CBC_SHA *** Certificate chain chain [0] = [ [ Version: V3 Subject: CN= Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5 Key: Sun RSA public key, 1024 bits modulus: public exponent: 65537 Validity: [ Certificate Extensions: 9 [1]: ObjectId: 1.3.6.1.5.5.7.1.1 Criticality=false AuthorityInfoAccess [ [accessMethod: 1.3.6.1.5.5.7.48.1 ] [2]: ObjectId: 2.5.29.17 Criticality=f *** Found trusted certificate: [ [ 7.\5I... *** CertificateRequest Cert Types: RSA, DSS, Type-64, Cert Authorities: . . . . . . .[read] MD5 and SHA1 hashes: len = 1365 *** ServerHelloDone [read] MD5 and SHA1 hashes: len = 4 0000: 0E 00 00 00 .... *** Certificate chain *** *** ClientKeyExchange, RSA PreMasterSecret, TLSv1 [Raw write]: length = 181 *** Finished verify_data: { 214, 45, 110, 126, 40, 45, 100, 196, 135, 143, 51, 126 } *** [write] MD5 and SHA1 hashes: len = 16 0000: 14 00 00 0C D6 2D 6E 7E 28 2D 64 C4 87 8F 33 7E .....-n.(-d...3. Padded plaintext before ENCRYPTION: len = 48 Padded plaintext after DECRYPTION: len = 48 0000: 14 00 00 0C 10 40 85 14 79 98 95 9A 19 46 04 D6 .....@..y....F.. 0010: AC 82 3B 0A 87 3F CE B3 CC B5 36 6E 36 F4 AB 0A ..;..?....6n6... 0020: C4 C7 7C B3 0B 0B 0B 0B 0B 0B 0B 0B 0B 0B 0B 0B ................ *** Finished verify_data: { 16, 64, 133, 20, 121, 152, 149, 154, 25, 70, 4, 214 } *** %% Cached client session: [Session-2, TLS_RSA_WITH_AES_128_CBC_SHA] [read] MD5 and SHA1 hashes: len = 16 0000: 14 00 00 0C 10 40 85 14 79 98 95 9A 19 46 04 D6 .....@..y....F.. [Raw read]: length = 5 0000: 17 03 01 05 90 ..... [Raw read]: length = 1424 May 7, 2010 10:49:09 PM org.apache.cxf.interceptor.LoggingInInterceptor logging INFO: Inbound Message ---------------------------- ID: 1 Response-Code: 403 Encoding: ISO-8859-1 Content-Type: text/html Headers: {Content-Length=[1233], X-Powered-By=[ASP.NET], Date=[Sat, 08 May 2010 02:50:00 GMT], Server=[Microsoft-IIS/7.0], content-type=[text/html]} Payload: <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" " ;> <html xmlns=" ;> <head> <meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1"/> <title>403 - Forbidden: Access is denied.</title> <style type="text/css"> <!-- body{margin:0;font-size:.7em;font-family:Verdana, Arial, Helvetica, sans-serif;background:#EEEEEE;} fieldset{padding:0 15px 10px 15px;} h1{font-size:2.4em;margin:0;color:#FFF;} h2{font-size:1.7em;margin:0;color:#CC0000;} h3{font-size:1.2em;margin:10px 0 0 0;color:#000000;} #header{width:96%;margin:0 0 0 0;padding:6px 2% 6px 2%;font-family:"trebuchet MS", Verdana, sans-serif;color:#FFF; background-color:#555555;} #content{margin:0 0 0 2%;position:relative;} .content-container{background:#FFF;width:96%;margin-top:8px;padding:10px;position:relative;} --> </style> </head> <body> <div id="header"><h1>Server Error</h1></div> <div id="content"> <div class="content-container"><fieldset> <h2>403 - Forbidden: Access is denied.</h2> <h3>You do not have permission to view this directory or page using the credentials that you supplied.</h3> </fieldset></div> </div> </body> </html> at org.apache.cxf.interceptor.StaxInInterceptor.handleMessage(StaxInInterceptor.java:77) at org.apache.cxf.phase.PhaseInterceptorChain.doIntercept(PhaseInterceptorChain.java:243)
  6. 0

    h3. Summary Daily Email updates not received as Confluence Email Notifications Plugin not working after maintenance h3. Environment * Cloud * h3. Steps to Reproduce Subscribe to daily updates h3. Expected Results Receive email reports showing changes to content in all spaces that you have permission to view. h3. Actual Results Emails are not received as an error occurred on the plugin {noformat} 2015-10-16 17:26:23.545943500 2015-10-16 17:26:23,534 ERROR [ajp-bio-127.0.0.101-8009-exec-944] [atlassian.plugin.manager.DefaultPluginManager] enableConfiguredPluginModule There was an error loading the descriptor 'null' of plugin 'com.atlassian.confluence.plugins.confluence-daily-summary-email'. Disabling. 2015-10-16 17:26:23.545945500 -- referer: https://pocketmobile.jira.com/wiki/plugins/servlet/upm/manage/all | url: /wiki/rest/plugins/1.0/com.atlassian.confluence.plugins.confluence-daily-summary-email-key | userName: sysadmin 2015-10-16 17:26:23.545960500 java.lang.RuntimeException: Unable to enable web fragment 2015-10-16 17:26:23.545961500 at com.atlassian.plugin.web.descriptors.AbstractWebFragmentModuleDescriptor.enabled(AbstractWebFragmentModuleDescriptor.java:133) 2015-10-16 17:26:23.545961500 at com.atlassian.plugin.web.descriptors.DefaultWebPanelModuleDescriptor.enabled(DefaultWebPanelModuleDescriptor.java:179) 2015-10-16 17:26:23.545963500 at com.atlassian.plugin.manager.DefaultPluginManager.notifyModuleEnabled(DefaultPluginManager.java:1846) 2015-10-16 17:26:23.545964500 at com.atlassian.plugin.manager.DefaultPluginManager.enableConfiguredPluginModule(DefaultPluginManager.java:1664) 2015-10-16 17:26:23.545965500 at com.atlassian.plugin.manager.DefaultPluginManager.enableConfiguredPluginModules(DefaultPluginManager.java:1639) 2015-10-16 17:26:23.545968500 at com.atlassian.plugin.manager.DefaultPluginManager.notifyPluginEnabled(DefaultPluginManager.java:1620) 2015-10-16 17:26:23.545969500 at com.atlassian.plugin.manager.DefaultPluginManager.enablePlugins(DefaultPluginManager.java:1595) 2015-10-16 17:26:23.545969500 at com.atlassian.confluence.plugin.EventDispatchingPluginController.enablePlugins(EventDispatchingPluginController.java:134) 2015-10-16 17:26:23.545971500 at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method) 2015-10-16 17:26:23.545971500 at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62) 2015-10-16 17:26:23.545972500 at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) 2015-10-16 17:26:23.545972500 at java.lang.reflect.Method.invoke(Method.java:483) {noformat} h3.Workaround Run the workaround on [Confluence daily summary email is disabled due to corrupted index|https://confluence.atlassian.com/display/CONFKB/Confluence+daily+summary+email+is+disabled+due+to+corrupted+index].

    Atlassian JIRA | 12 months ago | Nabil Khalid
    java.lang.RuntimeException: Unable to enable web fragment 2015-10-16 17:26:23.545961500 at com.atlassian.plugin.web.descriptors.AbstractWebFragmentModuleDescriptor.enabled(AbstractWebFragmentModuleDescriptor.java:133) 2015-10-16 17:26:23.545961500 at com.atlassian.plugin.web.descriptors.DefaultWebPanelModuleDescriptor.enabled(DefaultWebPanelModuleDescriptor.java:179) 2015-10-16 17:26:23.545963500 at com.atlassian.plugin.manager.DefaultPluginManager.notifyModuleEnabled(DefaultPluginManager.java:1846) 2015-10-16 17:26:23.545964500 at com.atlassian.plugin.manager.DefaultPluginManager.enableConfiguredPluginModule(DefaultPluginManager.java:1664) 2015-10-16 17:26:23.545965500 at com.atlassian.plugin.manager.DefaultPluginManager.enableConfiguredPluginModules(DefaultPluginManager.java:1639) 2015-10-16 17:26:23.545968500 at com.atlassian.plugin.manager.DefaultPluginManager.notifyPluginEnabled(DefaultPluginManager.java:1620) 2015-10-16 17:26:23.545969500 at com.atlassian.plugin.manager.DefaultPluginManager.enablePlugins(DefaultPluginManager.java:1595) 2015-10-16 17:26:23.545969500 at com.atlassian.confluence.plugin.EventDispatchingPluginController.enablePlugins(EventDispatchingPluginController.java:134) 2015-10-16 17:26:23.545971500 at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method) 2015-10-16 17:26:23.545971500 at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)

    Not finding the right solution?
    Take a tour to get the most out of Samebug.

    Tired of useless tips?

    Automated exception search integrated into your IDE

    Root Cause Analysis

    1. java.lang.RuntimeException

      org.jfrog.build.extractor.maven.BuildInfoRecorder.sessionEnded() listener has failed: 00:17:10.243 at org.jvnet.hudson.maven3.launcher.Maven3Launcher.main(Maven3Launcher.java:79) 00:17:10.244 at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method) 00:17:10.244 at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:57) 00:17:10.245 at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) 00:17:10.248 cause : org.jfrog.build.extractor.maven.BuildInfoRecorder.sessionEnded() listener has failed: 00:17:10.249 at java.lang.reflect.Method.invoke(Method.java:606) 00:17:10.249 at org.codehaus.plexus.classworlds.launcher.Launcher.launchStandard(Launcher.java:330) 00:17:10.250 at org.codehaus.plexus.classworlds.launcher.Launcher.launch(Launcher.java:238) 00:17:10.250 Stack trace : at org.jvnet.hudson.maven3.agent.Maven3Main.launch(Maven3Main.java:174)

      at hudson.maven.Maven3Builder.call()
    2. Hudson Maven Embedder
      Maven3Builder.call
      1. hudson.maven.Maven3Builder.call(Maven3Builder.java:100)
      2. hudson.maven.Maven3Builder.call(Maven3Builder.java:66)
      2 frames