java.lang.RuntimeException: class for magic number 2560 not found INFO|828/0|Service CrushFTP Server|13-06-28 22:07:30| at org.jgroups.util.Util.readOtherAddress(Util.java:943)

sourceforge.net | 3 months ago
  1. 0

    JGroups / Discussion / Help:TCP Only Config, One way firewall

    sourceforge.net | 3 months ago
    java.lang.RuntimeException: class for magic number 2560 not found INFO|828/0|Service CrushFTP Server|13-06-28 22:07:30| at org.jgroups.util.Util.readOtherAddress(Util.java:943)
  2. 0

    JGroups / Discussion / Help:TCP Only Config, One way firewall

    sourceforge.net | 3 months ago
    java.lang.RuntimeException: class for magic number 2560 not found
  3. 0

    JGroups / Discussion / Help:TCP Only Config, One way firewall

    sourceforge.net | 3 months ago
    java.lang.RuntimeException: class for magic number 0 not found
  4. Speed up your debug routine!

    Automated exception search integrated into your IDE

  5. 0

    users-cxf-apache - Encoding special characters when marshalling - msg#00079 - Recent Discussion OSDir.com

    osdir.com | 8 months ago
    java.lang.RuntimeException: Default SSL context init failed: Keystore was tampered with, or password was incorrect trustStore is: C:\temp\digicert\truststore.jks trustStore type is : jks trustStore provider is : init truststore adding as trusted cert: Valid from Mon Apr 02 20:00:00 EDT 2007 until Sat Apr 02 20:00:00 EDT 2022 trigger seeding of SecureRandom done seeding SecureRandom May 7, 2010 10:49:09 PM org.apache.cxf.transport.https.SSLUtils getCiphersuites INFO: The cipher suites have not been configured, falling back to cipher suite filters. May 7, 2010 10:49:09 PM org.apache.cxf.transport.https.SSLUtils getCiphersuites INFO: The cipher suite filters have not been configured, falling back to default filters. May 7, 2010 10:49:09 PM org.apache.cxf.transport.https.SSLUtils getCiphersFromList INFO: The cipher suites have been set to SSL_RSA_WITH_RC4_128_MD5, SSL_RSA_WITH_RC4_128_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_DES_CBC_SHA, SSL_DHE_RSA_WITH_DES_CBC_SHA, SSL_DHE_DSS_WITH_DES_CBC_SHA, SSL_RSA_EXPORT_WITH_RC4_40_MD5, SSL_RSA_EXPORT_WITH_DES40_CBC_SHA, SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA, SSL_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA, TLS_KRB5_WITH_RC4_128_SHA, TLS_KRB5_WITH_RC4_128_MD5, TLS_KRB5_WITH_3DES_EDE_CBC_SHA, TLS_KRB5_WITH_3DES_EDE_CBC_MD5, TLS_KRB5_WITH_DES_CBC_SHA, TLS_KRB5_WITH_DES_CBC_MD5, TLS_KRB5_EXPORT_WITH_RC4_40_SHA, TLS_KRB5_EXPORT_WITH_RC4_40_MD5, TLS_KRB5_EXPORT_WITH_DES_CBC_40_SHA, TLS_KRB5_EXPORT_WITH_DES_CBC_40_MD5. May 7, 2010 10:49:09 PM org.apache.cxf.interceptor.LoggingOutInterceptor$LoggingCallback onClose INFO: Outbound Message --------------------------- ID: 1 Address: Encoding: UTF-8 Content-Type: text/xml -------------------------------------- %% No cached client session *** ClientHello, TLSv1 RandomCookie: GMT: 1256444197 bytes = { 4, 66, 95, 49, 78, 123, 240, 208, 162, 18, 225, 86, 252, 18, 29, 71, 157, 151, 61, 44, 211, 72, 133, 220, 191, 41, 45, 141 } Session ID: {} Cipher Suites: [SSL_RSA_WITH_RC4_128_MD5, SSL_RSA_WITH_RC4_128_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_DES_CBC_SHA, SSL_DHE_RSA_WITH_DES_CBC_SHA, SSL_DHE_DSS_WITH_DES_CBC_SHA, SSL_RSA_EXPORT_WITH_RC4_40_MD5, SSL_RSA_EXPORT_WITH_DES40_CBC_SHA, SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA, SSL_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA, TLS_KRB5_WITH_RC4_128_SHA, TLS_KRB5_WITH_RC4_128_MD5, TLS_KRB5_WITH_3DES_EDE_CBC_SHA, TLS_KRB5_WITH_3DES_EDE_CBC_MD5, TLS_KRB5_WITH_DES_CBC_SHA, TLS_KRB5_WITH_DES_CBC_MD5, TLS_KRB5_EXPORT_WITH_RC4_40_SHA, TLS_KRB5_EXPORT_WITH_RC4_40_MD5, TLS_KRB5_EXPORT_WITH_DES_CBC_40_SHA, TLS_KRB5_EXPORT_WITH_DES_CBC_40_MD5] Compression Methods: { 0 } *** [write] MD5 and SHA1 hashes: len = 93 0000: 01 00 00 59 03 01 4B E4 D1 25 04 42 5F 31 4E 7B ...Y..K..%.B_1N. 0010: F0 D0 A2 12 E1 56 FC 12 1D 47 9D 97 3D 2C D3 48 .....V...G..=,.H 0020: 85 DC BF 29 2D 8D 00 00 32 00 04 00 05 00 2F 00 ...)-...2...../. 0030: 33 00 32 00 0A 00 16 00 13 00 09 00 15 00 12 00 3.2............. 0040: 03 00 08 00 14 00 11 00 20 00 24 00 1F 00 23 00 ........ .$...#. 0050: 1E 00 22 00 28 00 2B 00 26 00 29 01 00 ..".(.+.&.).. main, WRITE: TLSv1 Handshake, length = 93 [write] MD5 and SHA1 hashes: len = 128 0000: 01 03 01 00 57 00 00 00 20 00 00 04 01 00 80 00 ....W... ....... 0010: 00 05 00 00 2F 00 00 33 00 00 32 00 00 0A 07 00 ..../..3..2..... 0020: C0 00 00 16 00 00 13 00 00 09 06 00 40 00 00 15 ............@... 0030: 00 00 12 00 00 03 02 00 80 00 00 08 00 00 14 00 ................ 0040: 00 11 00 00 20 00 00 24 00 00 1F 00 00 23 00 00 .... ..$.....#.. 0050: 1E 00 00 22 00 00 28 00 00 2B 00 00 26 00 00 29 ..."..(..+..&..) 0060: 4B E4 D1 25 04 42 5F 31 4E 7B F0 D0 A2 12 E1 56 K..%.B_1N......V 0070: FC 12 1D 47 9D 97 3D 2C D3 48 85 DC BF 29 2D 8D ...G..=,.H...)-. main, WRITE: SSLv2 client hello message, length = 128 [Raw write]: length = 130 0000: 80 80 01 03 01 00 57 00 00 00 20 00 00 04 01 00 ......W... ..... 0010: 80 00 00 05 00 00 2F 00 00 33 00 00 32 00 00 0A ....../..3..2... 0020: 07 00 C0 00 00 16 00 00 13 00 00 09 06 00 40 00 ..............@. 0030: 00 15 00 00 12 00 00 03 02 00 80 00 00 08 00 00 ................ 0040: 14 00 00 11 00 00 20 00 00 24 00 00 1F 00 00 23 ...... ..$.....# 0050: 00 00 1E 00 00 22 00 00 28 00 00 2B 00 00 26 00 ....."..(..+..&. 0060: 00 29 4B E4 D1 25 04 42 5F 31 4E 7B F0 D0 A2 12 .)K..%.B_1N..... 0070: E1 56 FC 12 1D 47 9D 97 3D 2C D3 48 85 DC BF 29 .V...G..=,.H...) 0080: 2D 8D -. [Raw read]: length = 5 0000: 16 03 01 0D 16 ..... [Raw read]: length = 2515 0000: 02 00 00 46 03 01 4B E4 D1 57 2B 4C E7 E7 78 B4 ...F..K..W+L..x. 0330: 6D 78 C9 79 43 E8 7A 37 FF 5C 35 49 BF A1 C5 0E mx.yC.z7.\5I.... 0340: 00 00 00 ... main, READ: TLSv1 Handshake, length = 3350 *** ServerHello, TLSv1 RandomCookie: GMT: 1256444247 bytes = { 43, 76, 231, 231, 120, 180, 163, 252, 72, 210, 159, 210, 232, 7, 171, 166, 52, 24, 150, 144, 229, 38, 77, 240, 163, 62, 189, 136 } Session ID: {42, 31, 0, 0, 80, 55, 253, 150, 224, 47, 243, 186, 0, 90, 249, 204, 156, 126, 43, 191, 137, 65, 244, 136, 90, 140, 145, 221, 59, 18, 141, 154} Cipher Suite: TLS_RSA_WITH_AES_128_CBC_SHA Compression Method: 0 *** %% Created: [Session-1, TLS_RSA_WITH_AES_128_CBC_SHA] ** TLS_RSA_WITH_AES_128_CBC_SHA [read] MD5 and SHA1 hashes: len = 74 0000: 02 00 00 46 03 01 4B E4 D1 57 2B 4C E7 E7 78 B4 ...F..K..W+L..x. 0010: A3 FC 48 D2 9F D2 E8 07 AB A6 34 18 96 90 E5 26 ..H.......4....& 0020: 4D F0 A3 3E BD 88 20 2A 1F 00 00 50 37 FD 96 E0 M..>.. *...P7... 0030: 2F F3 BA 00 5A F9 CC 9C 7E 2B BF 89 41 F4 88 5A /...Z....+..A..Z 0040: 8C 91 DD 3B 12 8D 9A 00 2F 00 ...;..../. *** Certificate chain chain [0] = [ [ Version: V3 Subject: CN=xxx, OU=Systems, O=xxx, L=xx, ST=xx, C=US Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5 Key: Sun RSA public key, 1024 bits modulus: public exponent: 65537 Validity: [From: Mon Apr 19 20:00:00 EDT 2010, To: Tue Apr 23 19:59:59 EDT 2013] Issuer: CN= SerialNumber: [ ] Certificate Extensions: 9 [1]: ObjectId: 1.3.6.1.5.5.7.1.1 Criticality=false AuthorityInfoAccess [ [accessMethod: 1.3.6.1.5.5.7.48.1 xxx ] [2]: ObjectId: 2.5.29.17 Criticality=false SubjectAlternativeName [ [DNSName: xxx] [3]: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: 50 EA 73 89 DB 29 FB 10 8F 9E E5 01 20 D4 DE 79 P.s..)...... ..y 0010: 99 48 83 F7 .H.. ] ] [4]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 90 45 08 69 5C 17 71 06 61 61 6C 5E 03 6D 94 7D .E.i\.q.aal^.m.. 0010: 41 5E AE 1B A^.. ] ] [5]: ObjectId: 2.5.29.32 Criticality=false CertificatePolicies [ [CertificatePolicyId: [2.16.840.1.114412.1.3.0.1] [PolicyQualifierInfo: [ qualifierID: 1.3.6.1.5.5.7.2.2 qualifier: 0000: 30 82 01 56 1E 82 01 52 00 41 00 6E 00 79 00 20 0..V...R.A.n.y. 0010: 00 75 00 73 00 65 00 20 00 6F 00 66 00 20 00 74 .u.s.e. .o.f. .t ], PolicyQualifierInfo: [ qualifierID: 1.3.6.1.5.5.7.2.1 qualifier: ]] ] ] [6]: ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:false PathLen: undefined ] [7]: ObjectId: 2.5.29.37 Criticality=false ExtendedKeyUsages [ [1.3.6.1.5.5.7.3.1, 1.3.6.1.5.5.7.3.2]] [8]: ObjectId: 2.5.29.31 Criticality=false CRLDistributionPoints [ [DistributionPoint: [URIName: ] , DistributionPoint: [URIName: ] ]] [9]: ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_Encipherment ] ] Algorithm: [SHA1withRSA] Signature: 0000: 11 73 A7 85 29 F0 F2 1D C0 F1 6A 09 A1 49 28 27 .s..).....j..I(' E8 69 61 2A 56 20 67 A7 B9 D4 8A CE 5B ....ia*V g.....[ ] chain [1] = [ [ Version: V3 Subject: Key: Sun RSA public key, 2048 bits modulus: public exponent: 65537 Validity: [From: Mon Apr 02 20:00:00 EDT 2007, To: Sat Apr 02 20:00:00 EDT 2022] Issuer: Certificate Extensions: 7 [1]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 50 EA 73 89 DB 29 FB 10 8F 9E E5 01 20 D4 DE 79 P.s..)...... ..y 0010: 99 48 83 F7 .H.. ] ] [2]: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: B1 3E C3 69 03 F8 BF 47 01 D4 98 26 1A 08 02 EF .>.i...G...&.... 0010: 63 64 2B C3 cd+. ] ] [3]: ObjectId: 2.5.29.31 Criticality=false CRLDistributionPoints [ [DistributionPoint: [4]: ObjectId: 2.5.29.32 Criticality=false CertificatePolicies [ [CertificatePolicyId: [2.16.840.1.114412.1.3.0.2] [PolicyQualifierInfo: [ qualifierID: 1.3.6.1.5.5.7.2.1 qualifier: 0000: 16 2E 68 74 74 70 3A 2F 2F 77 77 77 2E 64 69 67 .. 0010: 69 63 65 72 74 2E 63 6F 6D 2F 73 73 6C 2D 63 70 icert.com/ssl-cp 0020: 73 2D 72 65 70 6F 73 69 74 6F 72 79 2E 68 74 6D s-repository.htm ], PolicyQualifierInfo: [ qualifierID: 1.3.6.1.5.5.7.2.2 qualifier: 0000: 30 82 01 56 1E 82 01 52 00 41 00 6E 00 79 00 20 0..V...R.A.n.y. 0010: 00 75 00 73 00 65 00 20 00 6F 00 66 00 20 00 74 .u.s.e. .o.f. .t . . . . . ]] ] ] [5]: ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_CertSign Crl_Sign ] [6]: ObjectId: 1.3.6.1.5.5.7.1.1 Criticality=false AuthorityInfoAccess [ [accessMethod: 1 [7]: ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:true PathLen:2147483647 ] ] Algorithm: [SHA1withRSA] Signature: 0000: 5D 4F 84 F1 A8 88 D3 A3 B2 BC 9C 6D E5 29 49 77 ]O.........m.)Iw 0010: E1 E7 D6 DC A9 D8 35 AE C9 71 DC E5 DB DC 9D 24 ......5..q.....$ 0020: 21 90 A6 CF B7 01 1C 9B D4 57 97 91 D7 75 16 A5 !........W...u.. 0030: 12 D7 B9 3D 2E 89 3D 39 69 8A D6 35 37 F9 F1 21 ...=..=9i..57..! 0040: C4 5B 40 AD 59 A9 2F 5F 3A 00 29 43 27 71 03 E4 .[@.Y./_:.)C'q.. 0050: BD 30 32 55 A6 FE 84 0E 0B 9B 38 19 2C 43 7C AC .02U......8.,C.. 0060: 43 BF 75 31 E5 23 1C 45 55 B7 69 08 91 B5 CF D7 C.u1.#.EU.i..... 0070: D5 B1 5E EE 9F 94 E4 D6 7A B9 18 C3 B8 D6 52 63 ..^.....z.....Rc 0080: 1C 10 BA 8B 2F 6D 5D CC 05 38 F4 56 05 6D EF 9E ..../m]..8.V.m.. 0090: EC E8 61 36 0C 14 4B 85 14 5A 0C 83 4F 22 5C 59 ..a6..K..Z..O"\Y 00A0: CB 8C 8A 71 DA FA C5 10 84 58 CF 07 EE E3 90 C2 ...q.....X...... 00B0: F5 F9 29 C7 5A 23 71 F9 59 B4 64 2B 88 B0 A7 36 ..).Z#q.Y.d+...6 00C0: C7 9A 20 61 EB FA 4E B5 AE 6B 1B E4 E3 EC E2 D9 .. a..N..k...... 00D0: 3C 41 49 A8 20 A4 54 F5 92 8D BB C0 55 20 04 A6 <AI. .T.....U .. 00E0: D8 B0 17 16 CC E3 D0 C8 B4 3D E5 D9 84 C6 D3 F6 .........=...... 00F0: 6E 6D 78 C9 79 43 E8 7A 37 FF 5C 35 49 BF A1 C5 nmx.yC.z7.\5I... ] *** Found trusted certificate: [ [ Version: V3 Subject: Key: Sun RSA public key, 2048 bits modulus: public exponent: 65537 Validity: [From: Mon Apr 02 20:00:00 EDT 2007, To: Sat Apr 02 20:00:00 EDT 2022] Issuer: CN= Certificate Extensions: 7 [1]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 50 EA 73 89 DB 29 FB 10 8F 9E E5 01 20 D4 DE 79 P.s..)...... ..y 0010: 99 48 83 F7 .H.. ] ] [2]: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: B1 3E C3 69 03 F8 BF 47 01 D4 98 26 1A 08 02 EF .>.i...G...&.... 0010: 63 64 2B C3 cd+. ] ] [3]: ObjectId: 2.5.29.31 Criticality=false CRLDistributionPoints [ [DistributionPoint: []] [4]: ObjectId: 2.5.29.32 Criticality=false CertificatePolicies 7.\5I... *** ServerHelloDone [read] MD5 and SHA1 hashes: len = 4 0000: 0E 00 00 00 .... *** ClientKeyExchange, RSA PreMasterSecret, TLSv1 Random Secret: { } [write] MD5 and SHA1 hashes: len = 134 0000: 10 00 00 82 00 80 93 4A 6C 8E 21 B1 03 DF FA E2 .......Jl.!..... 0010: 9C 2C 89 DC 88 94 77 26 8D FB 07 43 B6 63 12 89 .,....w&...C.c.. 0020: 48 F7 94 F0 99 E4 98 98 87 C9 BA 30 EB 47 C3 C9 H..........0.G.. 0030: AE E0 CA 18 7C BC 6C 72 54 D0 68 53 F9 32 8F 3F ......lrT.hS.2.? 0040: B3 8A 54 AA EE B2 8E 89 98 C4 5F B5 4B DA 6E 3F ..T......._.K.n? 0050: 0A 5B 01 4B 9A 1A ED 94 F3 DF B9 5F C9 47 38 37 .[.K......._.G87 0060: 29 B6 E2 1B 40 B1 8F 1A 2E D9 C9 A6 86 A4 B4 82 )...@........... 0070: 31 A7 54 95 D1 88 1D D2 CA 88 2E 5A FD B6 E6 7E 1.T........Z.... 0080: E1 25 44 28 C7 88 .%D(.. main, WRITE: TLSv1 Handshake, length = 134 [Raw write]: length = 139 0000: 16 03 01 00 86 10 00 00 82 00 80 93 4A 6C 8E 21 ............Jl.! 0010: B1 03 DF FA E2 9C 2C 89 DC 88 94 77 26 8D FB 07 ......,....w&... 0020: 43 B6 63 12 89 48 F7 94 F0 99 E4 98 98 87 C9 BA C.c..H.......... 0030: 30 EB 47 C3 C9 AE E0 CA 18 7C BC 6C 72 54 D0 68 0.G........lrT.h 0040: 53 F9 32 8F 3F B3 8A 54 AA EE B2 8E 89 98 C4 5F S.2.?..T......._ 0050: B5 4B DA 6E 3F 0A 5B 01 4B 9A 1A ED 94 F3 DF B9 .K.n?.[.K....... 0060: 5F C9 47 38 37 29 B6 E2 1B 40 B1 8F 1A 2E D9 C9 _.G87)...@...... 0070: A6 86 A4 B4 82 31 A7 54 95 D1 88 1D D2 CA 88 2E .....1.T........ 0080: 5A FD B6 E6 7E E1 25 44 28 C7 88 Z.....%D(.. SESSION KEYGEN: PreMaster Secret: 0000: 03 01 06 0D 87 EB 8B 76 53 3B 86 92 4B 62 A8 A8 .......vS;..Kb.. 0010: 81 93 D0 71 41 74 26 DB C7 EB E2 8D 69 35 C6 00 ...qAt&.....i5.. 0020: A4 75 F9 57 0D 21 09 04 67 38 CC 5A DB F3 AA 28 .u.W.!..g8.Z...( CONNECTION KEYGEN: Client Nonce: 0000: 4B E4 D1 25 04 42 5F 31 4E 7B F0 D0 A2 12 E1 56 K..%.B_1N......V 0010: FC 12 1D 47 9D 97 3D 2C D3 48 85 DC BF 29 2D 8D ...G..=,.H...)-. Server Nonce: 0000: 4B E4 D1 57 2B 4C E7 E7 78 B4 A3 FC 48 D2 9F D2 K..W+L..x...H... 0010: E8 07 AB A6 34 18 96 90 E5 26 4D F0 A3 3E BD 88 ....4....&M..>.. Master Secret: 0000: D5 0B 0C E1 79 E2 33 25 DC 3E 4A 7C BB 06 9A 97 ....y.3%.>J..... 0010: 32 DF 3A 4D E2 5A 30 D8 84 FF 8E 6F 84 1B 3B 9D 2.:M.Z0....o..;. 0020: D9 4E 83 E9 82 C9 11 CC 2F F0 71 B0 3F 6C 3B 92 .N....../.q.?l;. Client MAC write Secret: 0000: 3D D3 8E 9F A6 98 86 9A 6D 21 DA 18 65 AA 17 70 =.......m!..e..p 0010: DA 7B 91 0C .... Server MAC write Secret: 0000: DC 81 F0 F2 B6 DE 7C 0E 37 55 D3 38 80 C3 32 B4 ........7U.8..2. 0010: F8 73 DF E3 .s.. Client write key: 0000: 7B FA 8C 89 43 5C ED B4 16 9E C6 6A D3 5D FF A7 ....C\.....j.].. Server write key: 0000: EA 7F CD 96 77 35 0F DB B4 8E 63 FE 41 D9 3B 5F ....w5....c.A.;_ Client write IV: 0000: 74 68 F9 DA BD 6C D3 51 AD 71 1C DF 7B 78 15 B6 th...l.Q.q...x.. Server write IV: 0000: 64 E0 71 8D 7D 53 4B 15 53 AC BD BF F9 C0 78 8D d.q..SK.S.....x. main, WRITE: TLSv1 Change Cipher Spec, length = 1 [Raw write]: length = 6 0000: 14 03 01 00 01 01 ...... *** Finished verify_data: { 109, 97, 67, 95, 197, 170, 72, 116, 16, 58, 97, 123 } *** [write] MD5 and SHA1 hashes: len = 16 0000: 14 00 00 0C 6D 61 43 5F C5 AA 48 74 10 3A 61 7B ....maC_..Ht.:a. Padded plaintext before ENCRYPTION: len = 48 0000: 14 00 00 0C 6D 61 43 5F C5 AA 48 74 10 3A 61 7B ....maC_..Ht.:a. 0010: D1 1D A4 5B A0 A4 EE 28 30 4E 09 0C 48 33 76 98 ...[...(0N..H3v. 0020: B8 86 20 55 0B 0B 0B 0B 0B 0B 0B 0B 0B 0B 0B 0B .. U............ main, WRITE: TLSv1 Handshake, length = 48 [Raw write]: length = 53 0000: 16 03 01 00 30 E2 0A AB B5 AA FC 77 B6 D5 EB 94 ....0......w.... 0010: 6B 33 3B D3 75 23 D4 B2 11 79 94 BA 82 54 84 EE k3;.u#...y...T.. 0020: DE 70 8B 44 B2 8F 09 EC 09 C2 F4 29 DD 76 3E 4A .p.D.......).v>J 0030: C7 18 97 B9 78 ....x [Raw read]: length = 5 0000: 14 03 01 00 01 ..... [Raw read]: length = 1 0000: 01 . main, READ: TLSv1 Change Cipher Spec, length = 1 [Raw read]: length = 5 0000: 16 03 01 00 30 ....0 [Raw read]: length = 48 0000: 2A 3D AE FF DE 13 07 3B 34 B8 F0 22 95 9E 00 1D *=.....;4..".... 0010: 00 52 A5 CD 16 FC FE 2E E7 4E 21 C9 3E C8 F7 B7 .R.......N!.>... 0020: 4D 56 B7 DC 99 13 C8 06 04 65 13 D3 90 F6 74 25 MV.......e....t% main, READ: TLSv1 Handshake, length = 48 Padded plaintext after DECRYPTION: len = 48 0000: 14 00 00 0C 6A 97 DB 52 C7 68 28 67 51 ED 9E 38 ....j..R.h(gQ..8 0010: 8C 9B 50 F3 92 11 26 4C 2D 01 B6 11 B5 9C 76 72 ..P...&L-.....vr 0020: 8B 14 5F 0E 0B 0B 0B 0B 0B 0B 0B 0B 0B 0B 0B 0B .._............. *** Finished verify_data: { 106, 151, 219, 82, 199, 104, 40, 103, 81, 237, 158, 56 } *** %% Cached client session: [Session-1, TLS_RSA_WITH_AES_128_CBC_SHA] [read] MD5 and SHA1 hashes: len = 16 0000: 14 00 00 0C 6A 97 DB 52 C7 68 28 67 51 ED 9E 38 ....j..R.h(gQ..8 Padded plaintext before ENCRYPTION: len = 368 0010: 73 02 B7 C1 57 8E EF A2 07 07 07 07 07 07 07 07 s...W........... *** HelloRequest (empty) %% Client cached [Session-1, TLS_RSA_WITH_AES_128_CBC_SHA] %% Try resuming [Session-1, TLS_RSA_WITH_AES_128_CBC_SHA] from port 2546 *** ClientHello, TLSv1 RandomCookie: GMT: 1256444197 bytes = { 138, 120, 134, 63, 86, 223, 42, 123, 137, 19, 60, 7, 83, 60, 199, 60, 186, 57, 95, 244, 139, 119, 158, 37, 252, 43, 243, 88 } Session ID: {42, 31, 0, 0, 80, 55, 253, 150, 224, 47, 243, 186, 0, 90, 249, 204, 156, 126, 43, 191, 137, 65, 244, 136, 90, 140, 145, 221, 59, 18, 141, 154} Cipher Suites: [SSL_RSA_WITH_RC4_128_MD5, SSL_RSA_WITH_RC4_128_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_DES_CBC_SHA, SSL_DHE_RSA_WITH_DES_CBC_SHA, SSL_DHE_DSS_WITH_DES_CBC_SHA, SSL_RSA_EXPORT_WITH_RC4_40_MD5, SSL_RSA_EXPORT_WITH_DES40_CBC_SHA, SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA, SSL_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA, TLS_KRB5_WITH_RC4_128_SHA, TLS_KRB5_WITH_RC4_128_MD5, TLS_KRB5_WITH_3DES_EDE_CBC_SHA, TLS_KRB5_WITH_3DES_EDE_CBC_MD5, TLS_KRB5_WITH_DES_CBC_SHA, TLS_KRB5_WITH_DES_CBC_MD5, TLS_KRB5_EXPORT_WITH_RC4_40_SHA, TLS_KRB5_EXPORT_WITH_RC4_40_MD5, TLS_KRB5_EXPORT_WITH_DES_CBC_40_SHA, TLS_KRB5_EXPORT_WITH_DES_CBC_40_MD5] Compression Methods: { 0 } *** [write] MD5 and SHA1 hashes: len = 125 main, READ: TLSv1 Handshake, length = 4736 Padded plaintext after DECRYPTION: len = 4736 *** ServerHello, TLSv1 RandomCookie: GMT: 1256444248 bytes = { 203, 166, 103, 61, 49, 5, 241, 224, 171, 116, 142, 41, 158, 125, 94, 19, 126, 235, 117, 67, 245, 85, 76, 236, 239, 134, 179, 151 } Session ID: {76, 11, 0, 0, 115, 46, 228, 166, 49, 19, 37, 7, 178, 252, 166, 228, 215, 246, 221, 20, 93, 151, 217, 62, 204, 21, 243, 187, 119, 92, 42, 174} Cipher Suite: TLS_RSA_WITH_AES_128_CBC_SHA Compression Method: 0 *** %% Created: [Session-2, TLS_RSA_WITH_AES_128_CBC_SHA] ** TLS_RSA_WITH_AES_128_CBC_SHA *** Certificate chain chain [0] = [ [ Version: V3 Subject: CN= Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5 Key: Sun RSA public key, 1024 bits modulus: public exponent: 65537 Validity: [ Certificate Extensions: 9 [1]: ObjectId: 1.3.6.1.5.5.7.1.1 Criticality=false AuthorityInfoAccess [ [accessMethod: 1.3.6.1.5.5.7.48.1 ] [2]: ObjectId: 2.5.29.17 Criticality=f *** Found trusted certificate: [ [ 7.\5I... *** CertificateRequest Cert Types: RSA, DSS, Type-64, Cert Authorities: . . . . . . .[read] MD5 and SHA1 hashes: len = 1365 *** ServerHelloDone [read] MD5 and SHA1 hashes: len = 4 0000: 0E 00 00 00 .... *** Certificate chain *** *** ClientKeyExchange, RSA PreMasterSecret, TLSv1 [Raw write]: length = 181 *** Finished verify_data: { 214, 45, 110, 126, 40, 45, 100, 196, 135, 143, 51, 126 } *** [write] MD5 and SHA1 hashes: len = 16 0000: 14 00 00 0C D6 2D 6E 7E 28 2D 64 C4 87 8F 33 7E .....-n.(-d...3. Padded plaintext before ENCRYPTION: len = 48 Padded plaintext after DECRYPTION: len = 48 0000: 14 00 00 0C 10 40 85 14 79 98 95 9A 19 46 04 D6 .....@..y....F.. 0010: AC 82 3B 0A 87 3F CE B3 CC B5 36 6E 36 F4 AB 0A ..;..?....6n6... 0020: C4 C7 7C B3 0B 0B 0B 0B 0B 0B 0B 0B 0B 0B 0B 0B ................ *** Finished verify_data: { 16, 64, 133, 20, 121, 152, 149, 154, 25, 70, 4, 214 } *** %% Cached client session: [Session-2, TLS_RSA_WITH_AES_128_CBC_SHA] [read] MD5 and SHA1 hashes: len = 16 0000: 14 00 00 0C 10 40 85 14 79 98 95 9A 19 46 04 D6 .....@..y....F.. [Raw read]: length = 5 0000: 17 03 01 05 90 ..... [Raw read]: length = 1424 May 7, 2010 10:49:09 PM org.apache.cxf.interceptor.LoggingInInterceptor logging INFO: Inbound Message ---------------------------- ID: 1 Response-Code: 403 Encoding: ISO-8859-1 Content-Type: text/html Headers: {Content-Length=[1233], X-Powered-By=[ASP.NET], Date=[Sat, 08 May 2010 02:50:00 GMT], Server=[Microsoft-IIS/7.0], content-type=[text/html]} Payload: <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" " ;> <html xmlns=" ;> <head> <meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1"/> <title>403 - Forbidden: Access is denied.</title> <style type="text/css"> <!-- body{margin:0;font-size:.7em;font-family:Verdana, Arial, Helvetica, sans-serif;background:#EEEEEE;} fieldset{padding:0 15px 10px 15px;} h1{font-size:2.4em;margin:0;color:#FFF;} h2{font-size:1.7em;margin:0;color:#CC0000;} h3{font-size:1.2em;margin:10px 0 0 0;color:#000000;} #header{width:96%;margin:0 0 0 0;padding:6px 2% 6px 2%;font-family:"trebuchet MS", Verdana, sans-serif;color:#FFF; background-color:#555555;} #content{margin:0 0 0 2%;position:relative;} .content-container{background:#FFF;width:96%;margin-top:8px;padding:10px;position:relative;} --> </style> </head> <body> <div id="header"><h1>Server Error</h1></div> <div id="content"> <div class="content-container"><fieldset> <h2>403 - Forbidden: Access is denied.</h2> <h3>You do not have permission to view this directory or page using the credentials that you supplied.</h3> </fieldset></div> </div> </body> </html> at org.apache.cxf.interceptor.StaxInInterceptor.handleMessage(StaxInInterceptor.java:77) at org.apache.cxf.phase.PhaseInterceptorChain.doIntercept(PhaseInterceptorChain.java:243)
  6. 0

    users-cxf-apache - Encoding special characters when marshalling - msg#00079 - Recent Discussion OSDir.com

    osdir.com | 8 months ago
    java.lang.RuntimeException: Default SSL context init failed: Keystore was tampered with, or password was incorrect trustStore is: C:\temp\digicert\truststore.jks trustStore type is : jks trustStore provider is : init truststore adding as trusted cert: Valid from Mon Apr 02 20:00:00 EDT 2007 until Sat Apr 02 20:00:00 EDT 2022 trigger seeding of SecureRandom done seeding SecureRandom May 7, 2010 10:49:09 PM org.apache.cxf.transport.https.SSLUtils getCiphersuites INFO: The cipher suites have not been configured, falling back to cipher suite filters. May 7, 2010 10:49:09 PM org.apache.cxf.transport.https.SSLUtils getCiphersuites INFO: The cipher suite filters have not been configured, falling back to default filters. May 7, 2010 10:49:09 PM org.apache.cxf.transport.https.SSLUtils getCiphersFromList INFO: The cipher suites have been set to SSL_RSA_WITH_RC4_128_MD5, SSL_RSA_WITH_RC4_128_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_DES_CBC_SHA, SSL_DHE_RSA_WITH_DES_CBC_SHA, SSL_DHE_DSS_WITH_DES_CBC_SHA, SSL_RSA_EXPORT_WITH_RC4_40_MD5, SSL_RSA_EXPORT_WITH_DES40_CBC_SHA, SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA, SSL_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA, TLS_KRB5_WITH_RC4_128_SHA, TLS_KRB5_WITH_RC4_128_MD5, TLS_KRB5_WITH_3DES_EDE_CBC_SHA, TLS_KRB5_WITH_3DES_EDE_CBC_MD5, TLS_KRB5_WITH_DES_CBC_SHA, TLS_KRB5_WITH_DES_CBC_MD5, TLS_KRB5_EXPORT_WITH_RC4_40_SHA, TLS_KRB5_EXPORT_WITH_RC4_40_MD5, TLS_KRB5_EXPORT_WITH_DES_CBC_40_SHA, TLS_KRB5_EXPORT_WITH_DES_CBC_40_MD5. May 7, 2010 10:49:09 PM org.apache.cxf.interceptor.LoggingOutInterceptor$LoggingCallback onClose INFO: Outbound Message --------------------------- ID: 1 Address: https://wstest.beaconmutual.com/BeaconQuoteService/BeaconQuoteService.svc Encoding: UTF-8 Content-Type: text/xml -------------------------------------- %% No cached client session *** ClientHello, TLSv1 RandomCookie: GMT: 1256444197 bytes = { 4, 66, 95, 49, 78, 123, 240, 208, 162, 18, 225, 86, 252, 18, 29, 71, 157, 151, 61, 44, 211, 72, 133, 220, 191, 41, 45, 141 } Session ID: {} Cipher Suites: [SSL_RSA_WITH_RC4_128_MD5, SSL_RSA_WITH_RC4_128_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_DES_CBC_SHA, SSL_DHE_RSA_WITH_DES_CBC_SHA, SSL_DHE_DSS_WITH_DES_CBC_SHA, SSL_RSA_EXPORT_WITH_RC4_40_MD5, SSL_RSA_EXPORT_WITH_DES40_CBC_SHA, SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA, SSL_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA, TLS_KRB5_WITH_RC4_128_SHA, TLS_KRB5_WITH_RC4_128_MD5, TLS_KRB5_WITH_3DES_EDE_CBC_SHA, TLS_KRB5_WITH_3DES_EDE_CBC_MD5, TLS_KRB5_WITH_DES_CBC_SHA, TLS_KRB5_WITH_DES_CBC_MD5, TLS_KRB5_EXPORT_WITH_RC4_40_SHA, TLS_KRB5_EXPORT_WITH_RC4_40_MD5, TLS_KRB5_EXPORT_WITH_DES_CBC_40_SHA, TLS_KRB5_EXPORT_WITH_DES_CBC_40_MD5] Compression Methods: { 0 } *** [write] MD5 and SHA1 hashes: len = 93 0000: 01 00 00 59 03 01 4B E4 D1 25 04 42 5F 31 4E 7B ...Y..K..%.B_1N. 0010: F0 D0 A2 12 E1 56 FC 12 1D 47 9D 97 3D 2C D3 48 .....V...G..=,.H 0020: 85 DC BF 29 2D 8D 00 00 32 00 04 00 05 00 2F 00 ...)-...2...../. 0030: 33 00 32 00 0A 00 16 00 13 00 09 00 15 00 12 00 3.2............. 0040: 03 00 08 00 14 00 11 00 20 00 24 00 1F 00 23 00 ........ .$...#. 0050: 1E 00 22 00 28 00 2B 00 26 00 29 01 00 ..".(.+.&.).. main, WRITE: TLSv1 Handshake, length = 93 [write] MD5 and SHA1 hashes: len = 128 0000: 01 03 01 00 57 00 00 00 20 00 00 04 01 00 80 00 ....W... ....... 0010: 00 05 00 00 2F 00 00 33 00 00 32 00 00 0A 07 00 ..../..3..2..... 0020: C0 00 00 16 00 00 13 00 00 09 06 00 40 00 00 15 ............@... 0030: 00 00 12 00 00 03 02 00 80 00 00 08 00 00 14 00 ................ 0040: 00 11 00 00 20 00 00 24 00 00 1F 00 00 23 00 00 .... ..$.....#.. 0050: 1E 00 00 22 00 00 28 00 00 2B 00 00 26 00 00 29 ..."..(..+..&..) 0060: 4B E4 D1 25 04 42 5F 31 4E 7B F0 D0 A2 12 E1 56 K..%.B_1N......V 0070: FC 12 1D 47 9D 97 3D 2C D3 48 85 DC BF 29 2D 8D ...G..=,.H...)-. main, WRITE: SSLv2 client hello message, length = 128 [Raw write]: length = 130 0000: 80 80 01 03 01 00 57 00 00 00 20 00 00 04 01 00 ......W... ..... 0010: 80 00 00 05 00 00 2F 00 00 33 00 00 32 00 00 0A ....../..3..2... 0020: 07 00 C0 00 00 16 00 00 13 00 00 09 06 00 40 00 ..............@. 0030: 00 15 00 00 12 00 00 03 02 00 80 00 00 08 00 00 ................ 0040: 14 00 00 11 00 00 20 00 00 24 00 00 1F 00 00 23 ...... ..$.....# 0050: 00 00 1E 00 00 22 00 00 28 00 00 2B 00 00 26 00 ....."..(..+..&. 0060: 00 29 4B E4 D1 25 04 42 5F 31 4E 7B F0 D0 A2 12 .)K..%.B_1N..... 0070: E1 56 FC 12 1D 47 9D 97 3D 2C D3 48 85 DC BF 29 .V...G..=,.H...) 0080: 2D 8D -. [Raw read]: length = 5 0000: 16 03 01 0D 16 ..... [Raw read]: length = 2515 0000: 02 00 00 46 03 01 4B E4 D1 57 2B 4C E7 E7 78 B4 ...F..K..W+L..x. 0330: 6D 78 C9 79 43 E8 7A 37 FF 5C 35 49 BF A1 C5 0E mx.yC.z7.\5I.... 0340: 00 00 00 ... main, READ: TLSv1 Handshake, length = 3350 *** ServerHello, TLSv1 RandomCookie: GMT: 1256444247 bytes = { 43, 76, 231, 231, 120, 180, 163, 252, 72, 210, 159, 210, 232, 7, 171, 166, 52, 24, 150, 144, 229, 38, 77, 240, 163, 62, 189, 136 } Session ID: {42, 31, 0, 0, 80, 55, 253, 150, 224, 47, 243, 186, 0, 90, 249, 204, 156, 126, 43, 191, 137, 65, 244, 136, 90, 140, 145, 221, 59, 18, 141, 154} Cipher Suite: TLS_RSA_WITH_AES_128_CBC_SHA Compression Method: 0 *** %% Created: [Session-1, TLS_RSA_WITH_AES_128_CBC_SHA] ** TLS_RSA_WITH_AES_128_CBC_SHA [read] MD5 and SHA1 hashes: len = 74 0000: 02 00 00 46 03 01 4B E4 D1 57 2B 4C E7 E7 78 B4 ...F..K..W+L..x. 0010: A3 FC 48 D2 9F D2 E8 07 AB A6 34 18 96 90 E5 26 ..H.......4....& 0020: 4D F0 A3 3E BD 88 20 2A 1F 00 00 50 37 FD 96 E0 M..>.. *...P7... 0030: 2F F3 BA 00 5A F9 CC 9C 7E 2B BF 89 41 F4 88 5A /...Z....+..A..Z 0040: 8C 91 DD 3B 12 8D 9A 00 2F 00 ...;..../. *** Certificate chain chain [0] = [ [ Version: V3 Subject: CN=xxx, OU=Systems, O=xxx, L=xx, ST=xx, C=US Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5 Key: Sun RSA public key, 1024 bits modulus: public exponent: 65537 Validity: [From: Mon Apr 19 20:00:00 EDT 2010, To: Tue Apr 23 19:59:59 EDT 2013] Issuer: CN= SerialNumber: [ ] Certificate Extensions: 9 [1]: ObjectId: 1.3.6.1.5.5.7.1.1 Criticality=false AuthorityInfoAccess [ [accessMethod: 1.3.6.1.5.5.7.48.1 xxx ] [2]: ObjectId: 2.5.29.17 Criticality=false SubjectAlternativeName [ [DNSName: xxx] [3]: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: 50 EA 73 89 DB 29 FB 10 8F 9E E5 01 20 D4 DE 79 P.s..)...... ..y 0010: 99 48 83 F7 .H.. ] ] [4]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 90 45 08 69 5C 17 71 06 61 61 6C 5E 03 6D 94 7D .E.i\.q.aal^.m.. 0010: 41 5E AE 1B A^.. ] ] [5]: ObjectId: 2.5.29.32 Criticality=false CertificatePolicies [ [CertificatePolicyId: [2.16.840.1.114412.1.3.0.1] [PolicyQualifierInfo: [ qualifierID: 1.3.6.1.5.5.7.2.2 qualifier: 0000: 30 82 01 56 1E 82 01 52 00 41 00 6E 00 79 00 20 0..V...R.A.n.y. 0010: 00 75 00 73 00 65 00 20 00 6F 00 66 00 20 00 74 .u.s.e. .o.f. .t ], PolicyQualifierInfo: [ qualifierID: 1.3.6.1.5.5.7.2.1 qualifier: ]] ] ] [6]: ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:false PathLen: undefined ] [7]: ObjectId: 2.5.29.37 Criticality=false ExtendedKeyUsages [ [1.3.6.1.5.5.7.3.1, 1.3.6.1.5.5.7.3.2]] [8]: ObjectId: 2.5.29.31 Criticality=false CRLDistributionPoints [ [DistributionPoint: [URIName: http://.com/ca3-2010d.crl] , DistributionPoint: [URIName: http://..com/ca3-2010d.crl] ]] [9]: ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_Encipherment ] ] Algorithm: [SHA1withRSA] Signature: 0000: 11 73 A7 85 29 F0 F2 1D C0 F1 6A 09 A1 49 28 27 .s..).....j..I(' E8 69 61 2A 56 20 67 A7 B9 D4 8A CE 5B ....ia*V g.....[ ] chain [1] = [ [ Version: V3 Subject: Key: Sun RSA public key, 2048 bits modulus: public exponent: 65537 Validity: [From: Mon Apr 02 20:00:00 EDT 2007, To: Sat Apr 02 20:00:00 EDT 2022] Issuer: Certificate Extensions: 7 [1]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 50 EA 73 89 DB 29 FB 10 8F 9E E5 01 20 D4 DE 79 P.s..)...... ..y 0010: 99 48 83 F7 .H.. ] ] [2]: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: B1 3E C3 69 03 F8 BF 47 01 D4 98 26 1A 08 02 EF .>.i...G...&.... 0010: 63 64 2B C3 cd+. ] ] [3]: ObjectId: 2.5.29.31 Criticality=false CRLDistributionPoints [ [DistributionPoint: [4]: ObjectId: 2.5.29.32 Criticality=false CertificatePolicies [ [CertificatePolicyId: [2.16.840.1.114412.1.3.0.2] [PolicyQualifierInfo: [ qualifierID: 1.3.6.1.5.5.7.2.1 qualifier: 0000: 16 2E 68 74 74 70 3A 2F 2F 77 77 77 2E 64 69 67 ..http://www.dig 0010: 69 63 65 72 74 2E 63 6F 6D 2F 73 73 6C 2D 63 70 icert.com/ssl-cp 0020: 73 2D 72 65 70 6F 73 69 74 6F 72 79 2E 68 74 6D s-repository.htm ], PolicyQualifierInfo: [ qualifierID: 1.3.6.1.5.5.7.2.2 qualifier: 0000: 30 82 01 56 1E 82 01 52 00 41 00 6E 00 79 00 20 0..V...R.A.n.y. 0010: 00 75 00 73 00 65 00 20 00 6F 00 66 00 20 00 74 .u.s.e. .o.f. .t . . . . . ]] ] ] [5]: ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_CertSign Crl_Sign ] [6]: ObjectId: 1.3.6.1.5.5.7.1.1 Criticality=false AuthorityInfoAccess [ [accessMethod: 1 [7]: ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:true PathLen:2147483647 ] ] Algorithm: [SHA1withRSA] Signature: 0000: 5D 4F 84 F1 A8 88 D3 A3 B2 BC 9C 6D E5 29 49 77 ]O.........m.)Iw 0010: E1 E7 D6 DC A9 D8 35 AE C9 71 DC E5 DB DC 9D 24 ......5..q.....$ 0020: 21 90 A6 CF B7 01 1C 9B D4 57 97 91 D7 75 16 A5 !........W...u.. 0030: 12 D7 B9 3D 2E 89 3D 39 69 8A D6 35 37 F9 F1 21 ...=..=9i..57..! 0040: C4 5B 40 AD 59 A9 2F 5F 3A 00 29 43 27 71 03 E4 .[@.Y./_:.)C'q.. 0050: BD 30 32 55 A6 FE 84 0E 0B 9B 38 19 2C 43 7C AC .02U......8.,C.. 0060: 43 BF 75 31 E5 23 1C 45 55 B7 69 08 91 B5 CF D7 C.u1.#.EU.i..... 0070: D5 B1 5E EE 9F 94 E4 D6 7A B9 18 C3 B8 D6 52 63 ..^.....z.....Rc 0080: 1C 10 BA 8B 2F 6D 5D CC 05 38 F4 56 05 6D EF 9E ..../m]..8.V.m.. 0090: EC E8 61 36 0C 14 4B 85 14 5A 0C 83 4F 22 5C 59 ..a6..K..Z..O"\Y 00A0: CB 8C 8A 71 DA FA C5 10 84 58 CF 07 EE E3 90 C2 ...q.....X...... 00B0: F5 F9 29 C7 5A 23 71 F9 59 B4 64 2B 88 B0 A7 36 ..).Z#q.Y.d+...6 00C0: C7 9A 20 61 EB FA 4E B5 AE 6B 1B E4 E3 EC E2 D9 .. a..N..k...... 00D0: 3C 41 49 A8 20 A4 54 F5 92 8D BB C0 55 20 04 A6 <AI. .T.....U .. 00E0: D8 B0 17 16 CC E3 D0 C8 B4 3D E5 D9 84 C6 D3 F6 .........=...... 00F0: 6E 6D 78 C9 79 43 E8 7A 37 FF 5C 35 49 BF A1 C5 nmx.yC.z7.\5I... ] *** Found trusted certificate: [ [ Version: V3 Subject: Key: Sun RSA public key, 2048 bits modulus: public exponent: 65537 Validity: [From: Mon Apr 02 20:00:00 EDT 2007, To: Sat Apr 02 20:00:00 EDT 2022] Issuer: CN= Certificate Extensions: 7 [1]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 50 EA 73 89 DB 29 FB 10 8F 9E E5 01 20 D4 DE 79 P.s..)...... ..y 0010: 99 48 83 F7 .H.. ] ] [2]: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: B1 3E C3 69 03 F8 BF 47 01 D4 98 26 1A 08 02 EF .>.i...G...&.... 0010: 63 64 2B C3 cd+. ] ] [3]: ObjectId: 2.5.29.31 Criticality=false CRLDistributionPoints [ [DistributionPoint: []] [4]: ObjectId: 2.5.29.32 Criticality=false CertificatePolicies 7.\5I... *** ServerHelloDone [read] MD5 and SHA1 hashes: len = 4 0000: 0E 00 00 00 .... *** ClientKeyExchange, RSA PreMasterSecret, TLSv1 Random Secret: { } [write] MD5 and SHA1 hashes: len = 134 0000: 10 00 00 82 00 80 93 4A 6C 8E 21 B1 03 DF FA E2 .......Jl.!..... 0010: 9C 2C 89 DC 88 94 77 26 8D FB 07 43 B6 63 12 89 .,....w&...C.c.. 0020: 48 F7 94 F0 99 E4 98 98 87 C9 BA 30 EB 47 C3 C9 H..........0.G.. 0030: AE E0 CA 18 7C BC 6C 72 54 D0 68 53 F9 32 8F 3F ......lrT.hS.2.? 0040: B3 8A 54 AA EE B2 8E 89 98 C4 5F B5 4B DA 6E 3F ..T......._.K.n? 0050: 0A 5B 01 4B 9A 1A ED 94 F3 DF B9 5F C9 47 38 37 .[.K......._.G87 0060: 29 B6 E2 1B 40 B1 8F 1A 2E D9 C9 A6 86 A4 B4 82 )...@........... 0070: 31 A7 54 95 D1 88 1D D2 CA 88 2E 5A FD B6 E6 7E 1.T........Z.... 0080: E1 25 44 28 C7 88 .%D(.. main, WRITE: TLSv1 Handshake, length = 134 [Raw write]: length = 139 0000: 16 03 01 00 86 10 00 00 82 00 80 93 4A 6C 8E 21 ............Jl.! 0010: B1 03 DF FA E2 9C 2C 89 DC 88 94 77 26 8D FB 07 ......,....w&... 0020: 43 B6 63 12 89 48 F7 94 F0 99 E4 98 98 87 C9 BA C.c..H.......... 0030: 30 EB 47 C3 C9 AE E0 CA 18 7C BC 6C 72 54 D0 68 0.G........lrT.h 0040: 53 F9 32 8F 3F B3 8A 54 AA EE B2 8E 89 98 C4 5F S.2.?..T......._ 0050: B5 4B DA 6E 3F 0A 5B 01 4B 9A 1A ED 94 F3 DF B9 .K.n?.[.K....... 0060: 5F C9 47 38 37 29 B6 E2 1B 40 B1 8F 1A 2E D9 C9 _.G87)...@...... 0070: A6 86 A4 B4 82 31 A7 54 95 D1 88 1D D2 CA 88 2E .....1.T........ 0080: 5A FD B6 E6 7E E1 25 44 28 C7 88 Z.....%D(.. SESSION KEYGEN: PreMaster Secret: 0000: 03 01 06 0D 87 EB 8B 76 53 3B 86 92 4B 62 A8 A8 .......vS;..Kb.. 0010: 81 93 D0 71 41 74 26 DB C7 EB E2 8D 69 35 C6 00 ...qAt&.....i5.. 0020: A4 75 F9 57 0D 21 09 04 67 38 CC 5A DB F3 AA 28 .u.W.!..g8.Z...( CONNECTION KEYGEN: Client Nonce: 0000: 4B E4 D1 25 04 42 5F 31 4E 7B F0 D0 A2 12 E1 56 K..%.B_1N......V 0010: FC 12 1D 47 9D 97 3D 2C D3 48 85 DC BF 29 2D 8D ...G..=,.H...)-. Server Nonce: 0000: 4B E4 D1 57 2B 4C E7 E7 78 B4 A3 FC 48 D2 9F D2 K..W+L..x...H... 0010: E8 07 AB A6 34 18 96 90 E5 26 4D F0 A3 3E BD 88 ....4....&M..>.. Master Secret: 0000: D5 0B 0C E1 79 E2 33 25 DC 3E 4A 7C BB 06 9A 97 ....y.3%.>J..... 0010: 32 DF 3A 4D E2 5A 30 D8 84 FF 8E 6F 84 1B 3B 9D 2.:M.Z0....o..;. 0020: D9 4E 83 E9 82 C9 11 CC 2F F0 71 B0 3F 6C 3B 92 .N....../.q.?l;. Client MAC write Secret: 0000: 3D D3 8E 9F A6 98 86 9A 6D 21 DA 18 65 AA 17 70 =.......m!..e..p 0010: DA 7B 91 0C .... Server MAC write Secret: 0000: DC 81 F0 F2 B6 DE 7C 0E 37 55 D3 38 80 C3 32 B4 ........7U.8..2. 0010: F8 73 DF E3 .s.. Client write key: 0000: 7B FA 8C 89 43 5C ED B4 16 9E C6 6A D3 5D FF A7 ....C\.....j.].. Server write key: 0000: EA 7F CD 96 77 35 0F DB B4 8E 63 FE 41 D9 3B 5F ....w5....c.A.;_ Client write IV: 0000: 74 68 F9 DA BD 6C D3 51 AD 71 1C DF 7B 78 15 B6 th...l.Q.q...x.. Server write IV: 0000: 64 E0 71 8D 7D 53 4B 15 53 AC BD BF F9 C0 78 8D d.q..SK.S.....x. main, WRITE: TLSv1 Change Cipher Spec, length = 1 [Raw write]: length = 6 0000: 14 03 01 00 01 01 ...... *** Finished verify_data: { 109, 97, 67, 95, 197, 170, 72, 116, 16, 58, 97, 123 } *** [write] MD5 and SHA1 hashes: len = 16 0000: 14 00 00 0C 6D 61 43 5F C5 AA 48 74 10 3A 61 7B ....maC_..Ht.:a. Padded plaintext before ENCRYPTION: len = 48 0000: 14 00 00 0C 6D 61 43 5F C5 AA 48 74 10 3A 61 7B ....maC_..Ht.:a. 0010: D1 1D A4 5B A0 A4 EE 28 30 4E 09 0C 48 33 76 98 ...[...(0N..H3v. 0020: B8 86 20 55 0B 0B 0B 0B 0B 0B 0B 0B 0B 0B 0B 0B .. U............ main, WRITE: TLSv1 Handshake, length = 48 [Raw write]: length = 53 0000: 16 03 01 00 30 E2 0A AB B5 AA FC 77 B6 D5 EB 94 ....0......w.... 0010: 6B 33 3B D3 75 23 D4 B2 11 79 94 BA 82 54 84 EE k3;.u#...y...T.. 0020: DE 70 8B 44 B2 8F 09 EC 09 C2 F4 29 DD 76 3E 4A .p.D.......).v>J 0030: C7 18 97 B9 78 ....x [Raw read]: length = 5 0000: 14 03 01 00 01 ..... [Raw read]: length = 1 0000: 01 . main, READ: TLSv1 Change Cipher Spec, length = 1 [Raw read]: length = 5 0000: 16 03 01 00 30 ....0 [Raw read]: length = 48 0000: 2A 3D AE FF DE 13 07 3B 34 B8 F0 22 95 9E 00 1D *=.....;4..".... 0010: 00 52 A5 CD 16 FC FE 2E E7 4E 21 C9 3E C8 F7 B7 .R.......N!.>... 0020: 4D 56 B7 DC 99 13 C8 06 04 65 13 D3 90 F6 74 25 MV.......e....t% main, READ: TLSv1 Handshake, length = 48 Padded plaintext after DECRYPTION: len = 48 0000: 14 00 00 0C 6A 97 DB 52 C7 68 28 67 51 ED 9E 38 ....j..R.h(gQ..8 0010: 8C 9B 50 F3 92 11 26 4C 2D 01 B6 11 B5 9C 76 72 ..P...&L-.....vr 0020: 8B 14 5F 0E 0B 0B 0B 0B 0B 0B 0B 0B 0B 0B 0B 0B .._............. *** Finished verify_data: { 106, 151, 219, 82, 199, 104, 40, 103, 81, 237, 158, 56 } *** %% Cached client session: [Session-1, TLS_RSA_WITH_AES_128_CBC_SHA] [read] MD5 and SHA1 hashes: len = 16 0000: 14 00 00 0C 6A 97 DB 52 C7 68 28 67 51 ED 9E 38 ....j..R.h(gQ..8 Padded plaintext before ENCRYPTION: len = 368 0010: 73 02 B7 C1 57 8E EF A2 07 07 07 07 07 07 07 07 s...W........... *** HelloRequest (empty) %% Client cached [Session-1, TLS_RSA_WITH_AES_128_CBC_SHA] %% Try resuming [Session-1, TLS_RSA_WITH_AES_128_CBC_SHA] from port 2546 *** ClientHello, TLSv1 RandomCookie: GMT: 1256444197 bytes = { 138, 120, 134, 63, 86, 223, 42, 123, 137, 19, 60, 7, 83, 60, 199, 60, 186, 57, 95, 244, 139, 119, 158, 37, 252, 43, 243, 88 } Session ID: {42, 31, 0, 0, 80, 55, 253, 150, 224, 47, 243, 186, 0, 90, 249, 204, 156, 126, 43, 191, 137, 65, 244, 136, 90, 140, 145, 221, 59, 18, 141, 154} Cipher Suites: [SSL_RSA_WITH_RC4_128_MD5, SSL_RSA_WITH_RC4_128_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_DES_CBC_SHA, SSL_DHE_RSA_WITH_DES_CBC_SHA, SSL_DHE_DSS_WITH_DES_CBC_SHA, SSL_RSA_EXPORT_WITH_RC4_40_MD5, SSL_RSA_EXPORT_WITH_DES40_CBC_SHA, SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA, SSL_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA, TLS_KRB5_WITH_RC4_128_SHA, TLS_KRB5_WITH_RC4_128_MD5, TLS_KRB5_WITH_3DES_EDE_CBC_SHA, TLS_KRB5_WITH_3DES_EDE_CBC_MD5, TLS_KRB5_WITH_DES_CBC_SHA, TLS_KRB5_WITH_DES_CBC_MD5, TLS_KRB5_EXPORT_WITH_RC4_40_SHA, TLS_KRB5_EXPORT_WITH_RC4_40_MD5, TLS_KRB5_EXPORT_WITH_DES_CBC_40_SHA, TLS_KRB5_EXPORT_WITH_DES_CBC_40_MD5] Compression Methods: { 0 } *** [write] MD5 and SHA1 hashes: len = 125 main, READ: TLSv1 Handshake, length = 4736 Padded plaintext after DECRYPTION: len = 4736 *** ServerHello, TLSv1 RandomCookie: GMT: 1256444248 bytes = { 203, 166, 103, 61, 49, 5, 241, 224, 171, 116, 142, 41, 158, 125, 94, 19, 126, 235, 117, 67, 245, 85, 76, 236, 239, 134, 179, 151 } Session ID: {76, 11, 0, 0, 115, 46, 228, 166, 49, 19, 37, 7, 178, 252, 166, 228, 215, 246, 221, 20, 93, 151, 217, 62, 204, 21, 243, 187, 119, 92, 42, 174} Cipher Suite: TLS_RSA_WITH_AES_128_CBC_SHA Compression Method: 0 *** %% Created: [Session-2, TLS_RSA_WITH_AES_128_CBC_SHA] ** TLS_RSA_WITH_AES_128_CBC_SHA *** Certificate chain chain [0] = [ [ Version: V3 Subject: CN= Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5 Key: Sun RSA public key, 1024 bits modulus: public exponent: 65537 Validity: [ Certificate Extensions: 9 [1]: ObjectId: 1.3.6.1.5.5.7.1.1 Criticality=false AuthorityInfoAccess [ [accessMethod: 1.3.6.1.5.5.7.48.1 ] [2]: ObjectId: 2.5.29.17 Criticality=f *** Found trusted certificate: [ [ 7.\5I... *** CertificateRequest Cert Types: RSA, DSS, Type-64, Cert Authorities: . . . . . . .[read] MD5 and SHA1 hashes: len = 1365 *** ServerHelloDone [read] MD5 and SHA1 hashes: len = 4 0000: 0E 00 00 00 .... *** Certificate chain *** *** ClientKeyExchange, RSA PreMasterSecret, TLSv1 [Raw write]: length = 181 *** Finished verify_data: { 214, 45, 110, 126, 40, 45, 100, 196, 135, 143, 51, 126 } *** [write] MD5 and SHA1 hashes: len = 16 0000: 14 00 00 0C D6 2D 6E 7E 28 2D 64 C4 87 8F 33 7E .....-n.(-d...3. Padded plaintext before ENCRYPTION: len = 48 Padded plaintext after DECRYPTION: len = 48 0000: 14 00 00 0C 10 40 85 14 79 98 95 9A 19 46 04 D6 .....@..y....F.. 0010: AC 82 3B 0A 87 3F CE B3 CC B5 36 6E 36 F4 AB 0A ..;..?....6n6... 0020: C4 C7 7C B3 0B 0B 0B 0B 0B 0B 0B 0B 0B 0B 0B 0B ................ *** Finished verify_data: { 16, 64, 133, 20, 121, 152, 149, 154, 25, 70, 4, 214 } *** %% Cached client session: [Session-2, TLS_RSA_WITH_AES_128_CBC_SHA] [read] MD5 and SHA1 hashes: len = 16 0000: 14 00 00 0C 10 40 85 14 79 98 95 9A 19 46 04 D6 .....@..y....F.. [Raw read]: length = 5 0000: 17 03 01 05 90 ..... [Raw read]: length = 1424 May 7, 2010 10:49:09 PM org.apache.cxf.interceptor.LoggingInInterceptor logging INFO: Inbound Message ---------------------------- ID: 1 Response-Code: 403 Encoding: ISO-8859-1 Content-Type: text/html Headers: {Content-Length=[1233], X-Powered-By=[ASP.NET], Date=[Sat, 08 May 2010 02:50:00 GMT], Server=[Microsoft-IIS/7.0], content-type=[text/html]} Payload: <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head> <meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1"/> <title>403 - Forbidden: Access is denied.</title> <style type="text/css"> <!-- body{margin:0;font-size:.7em;font-family:Verdana, Arial, Helvetica, sans-serif;background:#EEEEEE;} fieldset{padding:0 15px 10px 15px;} h1{font-size:2.4em;margin:0;color:#FFF;} h2{font-size:1.7em;margin:0;color:#CC0000;} h3{font-size:1.2em;margin:10px 0 0 0;color:#000000;} #header{width:96%;margin:0 0 0 0;padding:6px 2% 6px 2%;font-family:"trebuchet MS", Verdana, sans-serif;color:#FFF; background-color:#555555;} #content{margin:0 0 0 2%;position:relative;} .content-container{background:#FFF;width:96%;margin-top:8px;padding:10px;position:relative;} --> </style> </head> <body> <div id="header"><h1>Server Error</h1></div> <div id="content"> <div class="content-container"><fieldset> <h2>403 - Forbidden: Access is denied.</h2> <h3>You do not have permission to view this directory or page using the credentials that you supplied.</h3> </fieldset></div> </div> </body> </html> at org.apache.cxf.interceptor.StaxInInterceptor.handleMessage(StaxInInterceptor.java:77) at org.apache.cxf.phase.PhaseInterceptorChain.doIntercept(PhaseInterceptorChain.java:243)

    Not finding the right solution?
    Take a tour to get the most out of Samebug.

    Tired of useless tips?

    Automated exception search integrated into your IDE

    Root Cause Analysis

    1. java.lang.RuntimeException

      class for magic number 2560 not found INFO|828/0|Service CrushFTP Server|13-06-28 22:07:30| at org.jgroups.util.Util.readOtherAddress(Util.java:943)

      at org.jgroups.util.Util.readAddress()
    2. JGroups
      GossipRouter$ConnectionHandler.readLoop
      1. org.jgroups.util.Util.readAddress(Util.java:893)
      2. org.jgroups.util.Util.readAddresses(Util.java:992)
      3. org.jgroups.stack.GossipData.readFrom(GossipData.java:122)
      4. org.jgroups.stack.GossipRouter$ConnectionHandler.readLoop(GossipRouter.java:690)
      4 frames