You are viewing a plain text version of this content. The canonical link for it is here.
Posted to soap-user@xml.apache.org by jh...@k4m.com on 2001/05/24 15:20:44 UTC
SSL Error Debug Message, Please Check ....
I got the following network debugging message !
What's the problem .
I followed the Apache Tomcat and Simple Apache SOAP client for SSL
and I Test all in my winnt2000 server (client and server
--------------------------------------
Getting info for "Mr Good"
keyStore is :
keyStore type is : jks
init keystore
init keymanager of type SunX509
trustStore is: C:\soap-2_2\certificate\clientkey.store
trustStore type is : jks
init truststore
adding private entry as trusted cert: [
[
Version: V1
Subject: CN=[jhpark.k4m.com], OU=[B2B], O=[KfourM], L=[DAECHI], ST
=[SEOUL], C=
[KR]
Signature Algorithm: MD5withRSA, OID = 1.2.840.113549.1.1.4
Key: com.sun.rsajca.JSA_RSAPublicKey@29428e
Validity: [From: Thu May 24 22:11:09 GMT+09:00 2001,
To: Wed Aug 22 22:11:09 GMT+09:00 2001]
Issuer: CN=[jhpark.k4m.com], OU=[B2B], O=[KfourM], L=[DAECHI], ST
=[SEOUL], C=[
KR]
SerialNumber: [ 3b0d086d ]
]
Algorithm: [MD5withRSA]
Signature:
0000: A4 8A AB 90 4B FC AE D7 10 2D 96 FD 6B 6F 7E C6 ....K....-..ko..
0010: 08 2B 6F 31 A3 51 0F D0 7A 93 93 6D D3 FF 13 3C .+o1.Q..z..m...<
0020: 31 4A 00 1F 18 BA 70 F6 EB A9 7C 67 35 58 2D AF 1J....p....g5X-.
0030: CF 5F 80 8A AC E6 B4 F9 7F 04 7F BA 40 B7 37 CD ._..........@.7.
0040: 70 06 F6 16 6E 1C 28 48 B1 EA FD 26 19 64 BB C2 p...n.(H...&.d..
0050: 1D 00 1A E8 38 22 1A 3E 20 E4 FA 28 B0 42 86 B7 ....8".> ..(.B..
0060: D3 43 A2 04 03 9D F6 13 CA 84 BF B2 4D 59 83 CF .C..........MY..
0070: 17 93 E2 93 05 41 61 DE 4A 4C A7 4C 13 67 AD 7E .....Aa.JL.L.g..
]
adding as trusted cert: [
[
Version: V1
Subject: CN=[niceguy.k4m.com], OU=[B2B], O=[K4M], L=[DaeChi], ST=[SEOUL],
C=[K
R]
Signature Algorithm: MD5withRSA, OID = 1.2.840.113549.1.1.4
Key: com.sun.rsajca.JSA_RSAPublicKey@26804e
Validity: [From: Thu May 24 22:10:59 GMT+09:00 2001,
To: Wed Aug 22 22:10:59 GMT+09:00 2001]
Issuer: CN=[niceguy.k4m.com], OU=[B2B], O=[K4M], L=[DaeChi], ST=[SEOUL],
C=[KR
]
SerialNumber: [ 3b0d0863 ]
]
Algorithm: [MD5withRSA]
Signature:
0000: 63 5A 43 F2 E5 4E 56 F9 49 CC 33 5E 83 AD F4 C0 cZC..NV.I.3^....
0010: DD 3F 6F 1B F8 33 5E 97 9C B6 3D 53 68 92 8F D2 .?o..3^...=Sh...
0020: AF AE 66 BF A1 73 80 F4 7B 47 D5 4B 9B 1E 90 EC ..f..s...G.K....
0030: AE 4F 09 2E 06 4B 03 E3 C8 BC 0A 74 1A 8C DE BD .O...K.....t....
0040: 27 FF E5 A0 1A 14 02 10 BB E4 CE CC 5E CC C8 5F '...........^.._
0050: 70 B1 78 06 9F 97 B2 D6 B7 24 E1 BA F5 1A 55 6E p.x......$....Un
0060: 1B 47 76 8C 20 DD A3 48 60 64 FB 01 EA DF 0F 46 .Gv. ..H`d.....F
0070: 31 CE 82 8B 5E CB 81 4A CD C6 9D 33 B4 5E 48 36 1...^..J...3.^H6
]
init context
trigger seeding of SecureRandom
done seeding SecureRandom
%% No cached client session
*** ClientHello, v3.1
RandomCookie: GMT: 990709973 bytes = { 93, 41, 32, 207, 10, 71, 32, 76,
248, 24
1, 34, 252, 169, 215, 198, 56, 24, 173, 193, 176, 170, 215, 84, 189, 206,
219, 9
9, 61 }
Session ID: {}
Cipher Suites: { 0, 5, 0, 4, 0, 9, 0, 10, 0, 18, 0, 19, 0, 3, 0, 17 }
Compression Methods: { 0 }
***
[write] MD5 and SHA1 hashes: len = 59
0000: 01 00 00 37 03 01 3B 0D 09 D5 5D 29 20 CF 0A 47 ...7..;...]) ..G
0010: 20 4C F8 F1 22 FC A9 D7 C6 38 18 AD C1 B0 AA D7 L.."....8......
0020: 54 BD CE DB 63 3D 00 00 10 00 05 00 04 00 09 00 T...c=..........
0030: 0A 00 12 00 13 00 03 00 11 01 00 ...........
main, WRITE: SSL v3.1 Handshake, length = 59
[write] MD5 and SHA1 hashes: len = 77
0000: 01 03 01 00 24 00 00 00 20 00 00 05 00 00 04 01 ....$... .......
0010: 00 80 00 00 09 06 00 40 00 00 0A 07 00 C0 00 00 .......@........
0020: 12 00 00 13 00 00 03 02 00 80 00 00 11 3B 0D 09 .............;..
0030: D5 5D 29 20 CF 0A 47 20 4C F8 F1 22 FC A9 D7 C6 .]) ..G L.."....
0040: 38 18 AD C1 B0 AA D7 54 BD CE DB 63 3D 8......T...c=
main, WRITE: SSL v2, contentType = 22, translated length = 16310
Caught SOAPException (SOAP-ENV:Client): Error opening socket: null
---------------------------------------------------------------------
To unsubscribe, e-mail: soap-user-unsubscribe@xml.apache.org
For additional commands, email: soap-user-help@xml.apache.org
Re: SSL Error Debug Message, Please Check ....
Posted by Pablo <pa...@eneris.com>.
On 24 May 2001 22:20:44 +0900, jhpark@k4m.com wrote:
> I got the following network debugging message !
> What's the problem .
> I followed the Apache Tomcat and Simple Apache SOAP client for SSL
> and I Test all in my winnt2000 server (client and server
>
>
> --------------------------------------
>
>
> Getting info for "Mr Good"
> keyStore is :
I would say that you don't have a keyStore defined. Have a look at
http://www.eneris.com/~pablo/soapintro and read the part about SSL
and debug. I tried to explain which fields you should look at when
something doesn't work.
Pablo
> keyStore type is : jks
> init keystore
> init keymanager of type SunX509
> trustStore is: C:\soap-2_2\certificate\clientkey.store
> trustStore type is : jks
> init truststore
> adding private entry as trusted cert: [
> [
> Version: V1
> Subject: CN=[jhpark.k4m.com], OU=[B2B], O=[KfourM], L=[DAECHI], ST
> =[SEOUL], C=
> [KR]
> Signature Algorithm: MD5withRSA, OID = 1.2.840.113549.1.1.4
>
> Key: com.sun.rsajca.JSA_RSAPublicKey@29428e
> Validity: [From: Thu May 24 22:11:09 GMT+09:00 2001,
> To: Wed Aug 22 22:11:09 GMT+09:00 2001]
> Issuer: CN=[jhpark.k4m.com], OU=[B2B], O=[KfourM], L=[DAECHI], ST
> =[SEOUL], C=[
> KR]
> SerialNumber: [ 3b0d086d ]
>
> ]
> Algorithm: [MD5withRSA]
> Signature:
> 0000: A4 8A AB 90 4B FC AE D7 10 2D 96 FD 6B 6F 7E C6 ....K....-..ko..
> 0010: 08 2B 6F 31 A3 51 0F D0 7A 93 93 6D D3 FF 13 3C .+o1.Q..z..m...<
> 0020: 31 4A 00 1F 18 BA 70 F6 EB A9 7C 67 35 58 2D AF 1J....p....g5X-.
> 0030: CF 5F 80 8A AC E6 B4 F9 7F 04 7F BA 40 B7 37 CD ._..........@.7.
> 0040: 70 06 F6 16 6E 1C 28 48 B1 EA FD 26 19 64 BB C2 p...n.(H...&.d..
> 0050: 1D 00 1A E8 38 22 1A 3E 20 E4 FA 28 B0 42 86 B7 ....8".> ..(.B..
> 0060: D3 43 A2 04 03 9D F6 13 CA 84 BF B2 4D 59 83 CF .C..........MY..
> 0070: 17 93 E2 93 05 41 61 DE 4A 4C A7 4C 13 67 AD 7E .....Aa.JL.L.g..
>
> ]
> adding as trusted cert: [
> [
> Version: V1
> Subject: CN=[niceguy.k4m.com], OU=[B2B], O=[K4M], L=[DaeChi], ST=[SEOUL],
> C=[K
> R]
> Signature Algorithm: MD5withRSA, OID = 1.2.840.113549.1.1.4
>
> Key: com.sun.rsajca.JSA_RSAPublicKey@26804e
> Validity: [From: Thu May 24 22:10:59 GMT+09:00 2001,
> To: Wed Aug 22 22:10:59 GMT+09:00 2001]
> Issuer: CN=[niceguy.k4m.com], OU=[B2B], O=[K4M], L=[DaeChi], ST=[SEOUL],
> C=[KR
> ]
> SerialNumber: [ 3b0d0863 ]
>
> ]
> Algorithm: [MD5withRSA]
> Signature:
> 0000: 63 5A 43 F2 E5 4E 56 F9 49 CC 33 5E 83 AD F4 C0 cZC..NV.I.3^....
> 0010: DD 3F 6F 1B F8 33 5E 97 9C B6 3D 53 68 92 8F D2 .?o..3^...=Sh...
> 0020: AF AE 66 BF A1 73 80 F4 7B 47 D5 4B 9B 1E 90 EC ..f..s...G.K....
> 0030: AE 4F 09 2E 06 4B 03 E3 C8 BC 0A 74 1A 8C DE BD .O...K.....t....
> 0040: 27 FF E5 A0 1A 14 02 10 BB E4 CE CC 5E CC C8 5F '...........^.._
> 0050: 70 B1 78 06 9F 97 B2 D6 B7 24 E1 BA F5 1A 55 6E p.x......$....Un
> 0060: 1B 47 76 8C 20 DD A3 48 60 64 FB 01 EA DF 0F 46 .Gv. ..H`d.....F
> 0070: 31 CE 82 8B 5E CB 81 4A CD C6 9D 33 B4 5E 48 36 1...^..J...3.^H6
>
> ]
> init context
> trigger seeding of SecureRandom
> done seeding SecureRandom
> %% No cached client session
> *** ClientHello, v3.1
> RandomCookie: GMT: 990709973 bytes = { 93, 41, 32, 207, 10, 71, 32, 76,
> 248, 24
> 1, 34, 252, 169, 215, 198, 56, 24, 173, 193, 176, 170, 215, 84, 189, 206,
> 219, 9
> 9, 61 }
> Session ID: {}
> Cipher Suites: { 0, 5, 0, 4, 0, 9, 0, 10, 0, 18, 0, 19, 0, 3, 0, 17 }
> Compression Methods: { 0 }
> ***
> [write] MD5 and SHA1 hashes: len = 59
> 0000: 01 00 00 37 03 01 3B 0D 09 D5 5D 29 20 CF 0A 47 ...7..;...]) ..G
> 0010: 20 4C F8 F1 22 FC A9 D7 C6 38 18 AD C1 B0 AA D7 L.."....8......
> 0020: 54 BD CE DB 63 3D 00 00 10 00 05 00 04 00 09 00 T...c=..........
> 0030: 0A 00 12 00 13 00 03 00 11 01 00 ...........
> main, WRITE: SSL v3.1 Handshake, length = 59
> [write] MD5 and SHA1 hashes: len = 77
> 0000: 01 03 01 00 24 00 00 00 20 00 00 05 00 00 04 01 ....$... .......
> 0010: 00 80 00 00 09 06 00 40 00 00 0A 07 00 C0 00 00 .......@........
> 0020: 12 00 00 13 00 00 03 02 00 80 00 00 11 3B 0D 09 .............;..
> 0030: D5 5D 29 20 CF 0A 47 20 4C F8 F1 22 FC A9 D7 C6 .]) ..G L.."....
> 0040: 38 18 AD C1 B0 AA D7 54 BD CE DB 63 3D 8......T...c=
> main, WRITE: SSL v2, contentType = 22, translated length = 16310
> Caught SOAPException (SOAP-ENV:Client): Error opening socket: null
>
>
> ---------------------------------------------------------------------
> To unsubscribe, e-mail: soap-user-unsubscribe@xml.apache.org
> For additional commands, email: soap-user-help@xml.apache.org
---------------------------------------------------------------------
To unsubscribe, e-mail: soap-user-unsubscribe@xml.apache.org
For additional commands, email: soap-user-help@xml.apache.org
Re: SSL Error Debug Message, Please Check ....
Posted by Pablo <pa...@eneris.com>.
On 24 May 2001 22:20:44 +0900, jhpark@k4m.com wrote:
> I got the following network debugging message !
> What's the problem .
> I followed the Apache Tomcat and Simple Apache SOAP client for SSL
> and I Test all in my winnt2000 server (client and server
>
>
> --------------------------------------
>
>
> Getting info for "Mr Good"
> keyStore is :
I would say that you don't have a keyStore defined. Have a look at
http://www.eneris.com/~pablo/soapintro and read the part about SSL
and debug. I tried to explain which fields you should look at when
something doesn't work.
Pablo
> keyStore type is : jks
> init keystore
> init keymanager of type SunX509
> trustStore is: C:\soap-2_2\certificate\clientkey.store
> trustStore type is : jks
> init truststore
> adding private entry as trusted cert: [
> [
> Version: V1
> Subject: CN=[jhpark.k4m.com], OU=[B2B], O=[KfourM], L=[DAECHI], ST
> =[SEOUL], C=
> [KR]
> Signature Algorithm: MD5withRSA, OID = 1.2.840.113549.1.1.4
>
> Key: com.sun.rsajca.JSA_RSAPublicKey@29428e
> Validity: [From: Thu May 24 22:11:09 GMT+09:00 2001,
> To: Wed Aug 22 22:11:09 GMT+09:00 2001]
> Issuer: CN=[jhpark.k4m.com], OU=[B2B], O=[KfourM], L=[DAECHI], ST
> =[SEOUL], C=[
> KR]
> SerialNumber: [ 3b0d086d ]
>
> ]
> Algorithm: [MD5withRSA]
> Signature:
> 0000: A4 8A AB 90 4B FC AE D7 10 2D 96 FD 6B 6F 7E C6 ....K....-..ko..
> 0010: 08 2B 6F 31 A3 51 0F D0 7A 93 93 6D D3 FF 13 3C .+o1.Q..z..m...<
> 0020: 31 4A 00 1F 18 BA 70 F6 EB A9 7C 67 35 58 2D AF 1J....p....g5X-.
> 0030: CF 5F 80 8A AC E6 B4 F9 7F 04 7F BA 40 B7 37 CD ._..........@.7.
> 0040: 70 06 F6 16 6E 1C 28 48 B1 EA FD 26 19 64 BB C2 p...n.(H...&.d..
> 0050: 1D 00 1A E8 38 22 1A 3E 20 E4 FA 28 B0 42 86 B7 ....8".> ..(.B..
> 0060: D3 43 A2 04 03 9D F6 13 CA 84 BF B2 4D 59 83 CF .C..........MY..
> 0070: 17 93 E2 93 05 41 61 DE 4A 4C A7 4C 13 67 AD 7E .....Aa.JL.L.g..
>
> ]
> adding as trusted cert: [
> [
> Version: V1
> Subject: CN=[niceguy.k4m.com], OU=[B2B], O=[K4M], L=[DaeChi], ST=[SEOUL],
> C=[K
> R]
> Signature Algorithm: MD5withRSA, OID = 1.2.840.113549.1.1.4
>
> Key: com.sun.rsajca.JSA_RSAPublicKey@26804e
> Validity: [From: Thu May 24 22:10:59 GMT+09:00 2001,
> To: Wed Aug 22 22:10:59 GMT+09:00 2001]
> Issuer: CN=[niceguy.k4m.com], OU=[B2B], O=[K4M], L=[DaeChi], ST=[SEOUL],
> C=[KR
> ]
> SerialNumber: [ 3b0d0863 ]
>
> ]
> Algorithm: [MD5withRSA]
> Signature:
> 0000: 63 5A 43 F2 E5 4E 56 F9 49 CC 33 5E 83 AD F4 C0 cZC..NV.I.3^....
> 0010: DD 3F 6F 1B F8 33 5E 97 9C B6 3D 53 68 92 8F D2 .?o..3^...=Sh...
> 0020: AF AE 66 BF A1 73 80 F4 7B 47 D5 4B 9B 1E 90 EC ..f..s...G.K....
> 0030: AE 4F 09 2E 06 4B 03 E3 C8 BC 0A 74 1A 8C DE BD .O...K.....t....
> 0040: 27 FF E5 A0 1A 14 02 10 BB E4 CE CC 5E CC C8 5F '...........^.._
> 0050: 70 B1 78 06 9F 97 B2 D6 B7 24 E1 BA F5 1A 55 6E p.x......$....Un
> 0060: 1B 47 76 8C 20 DD A3 48 60 64 FB 01 EA DF 0F 46 .Gv. ..H`d.....F
> 0070: 31 CE 82 8B 5E CB 81 4A CD C6 9D 33 B4 5E 48 36 1...^..J...3.^H6
>
> ]
> init context
> trigger seeding of SecureRandom
> done seeding SecureRandom
> %% No cached client session
> *** ClientHello, v3.1
> RandomCookie: GMT: 990709973 bytes = { 93, 41, 32, 207, 10, 71, 32, 76,
> 248, 24
> 1, 34, 252, 169, 215, 198, 56, 24, 173, 193, 176, 170, 215, 84, 189, 206,
> 219, 9
> 9, 61 }
> Session ID: {}
> Cipher Suites: { 0, 5, 0, 4, 0, 9, 0, 10, 0, 18, 0, 19, 0, 3, 0, 17 }
> Compression Methods: { 0 }
> ***
> [write] MD5 and SHA1 hashes: len = 59
> 0000: 01 00 00 37 03 01 3B 0D 09 D5 5D 29 20 CF 0A 47 ...7..;...]) ..G
> 0010: 20 4C F8 F1 22 FC A9 D7 C6 38 18 AD C1 B0 AA D7 L.."....8......
> 0020: 54 BD CE DB 63 3D 00 00 10 00 05 00 04 00 09 00 T...c=..........
> 0030: 0A 00 12 00 13 00 03 00 11 01 00 ...........
> main, WRITE: SSL v3.1 Handshake, length = 59
> [write] MD5 and SHA1 hashes: len = 77
> 0000: 01 03 01 00 24 00 00 00 20 00 00 05 00 00 04 01 ....$... .......
> 0010: 00 80 00 00 09 06 00 40 00 00 0A 07 00 C0 00 00 .......@........
> 0020: 12 00 00 13 00 00 03 02 00 80 00 00 11 3B 0D 09 .............;..
> 0030: D5 5D 29 20 CF 0A 47 20 4C F8 F1 22 FC A9 D7 C6 .]) ..G L.."....
> 0040: 38 18 AD C1 B0 AA D7 54 BD CE DB 63 3D 8......T...c=
> main, WRITE: SSL v2, contentType = 22, translated length = 16310
> Caught SOAPException (SOAP-ENV:Client): Error opening socket: null
>
>
> ---------------------------------------------------------------------
> To unsubscribe, e-mail: soap-user-unsubscribe@xml.apache.org
> For additional commands, email: soap-user-help@xml.apache.org
---------------------------------------------------------------------
To unsubscribe, e-mail: soap-user-unsubscribe@xml.apache.org
For additional commands, email: soap-user-help@xml.apache.org