SSL Exception: javax.net.le protocole ssl.SSLHandshakeException: Reçu alerte fatale: certificate_unknown
J'ai créé un SSLClient et SSLServer et a également créé le fichier de clés comme "server.jks" pour SSLServer et "du client.jks" pour SSLClient. tout d'abord j'ai exécuté SSLServer.java fichier et quand je suis à l'exécution de SSLClient.java fichier. C'est jeter une exception "javax.net.ssl.SSLHandshakeException: Received fatal alert: certificate_unknown
" . je ne sais pas pourquoi je reçois cette exception. j'ai suivi http://ruchirawageesha.blogspot.in/2010/07/how-to-create-clientserver-keystores.html pour créer de fichier de clés pour le serveur et le client.
pourriez-vous svp m'aider à résoudre ce problème. si il ya une erreur de créer des certificats de serveur et de client que j'ai fait, alors s'il vous plaît laissez-moi savoir.
SSLServer.java
package com.betterprogrammer.test;
import java.io.*;
import java.security.Security;
import java.security.PrivilegedActionException;
import javax.net.ssl.*;
import com.sun.net.ssl.internal.ssl.Provider;
public class SSLServer {
public static void main(String[] args) throws Exception {
boolean debug = true;
int intSSLport = 4443;
{
Security.addProvider(new Provider());
System.setProperty("javax.net.ssl.keyStore","C:\\Program Files\\Java\\jre6\\bin\\server.jks");
System.setProperty("javax.net.ssl.keyStorePassword", "123456");
}
if(debug){
System.setProperty("javax.net.debug", "all");
}
try {
SSLServerSocketFactory sslServerSocketfactory = (SSLServerSocketFactory) SSLServerSocketFactory.getDefault();
SSLServerSocket sslServerSocket = (SSLServerSocket) sslServerSocketfactory.createServerSocket(intSSLport);
SSLSocket sslSocket = (SSLSocket) sslServerSocket.accept();
while (true) {
PrintWriter out = new PrintWriter(sslSocket.getOutputStream(),true);
BufferedReader in = new BufferedReader(new InputStreamReader(sslSocket.getInputStream()));
String inputLine;
while ((inputLine = in.readLine()) != null) {
out.println(inputLine);
System.out.println(inputLine);
}
out.close();
in.close();
sslSocket.close();
sslServerSocket.close();
}
}
catch (Exception exp) {
PrivilegedActionException priexp = new PrivilegedActionException(exp);
System.out.println(" Priv exp --- " + priexp.getMessage());
System.out.println(" Exception occurred .... " + exp);
exp.printStackTrace();
}
}
}
et SSLClient.java
package com.betterprogrammer.test;
import java.io.*;
import javax.net.ssl.*;
import com.sun.net.ssl.internal.ssl.Provider;
import java.security.Security;
public class SSLClient {
public static void main(String[] args) throws Exception {
String strServerName = "localhost";
int intSSLport = 4443;
PrintWriter out = null;
BufferedReader in = null;
boolean debug = true;
{
Security.addProvider(new Provider());
System.setProperty("javax.net.ssl.keyStore","C:\\Program Files\\Java\\jre6\\bin\\client.jks");
System.setProperty("javax.net.ssl.keyStorePassword", "123456");
}
if(debug){
System.setProperty("javax.net.debug", "all");
}
try {
SSLSocketFactory sslsocketfactory = (SSLSocketFactory) SSLSocketFactory.getDefault();
SSLSocket sslSocket = (SSLSocket) sslsocketfactory.createSocket(strServerName, intSSLport);
out = new PrintWriter(sslSocket.getOutputStream(), true);
in = new BufferedReader(new InputStreamReader(sslSocket.getInputStream()));
BufferedReader stdIn = new BufferedReader(new InputStreamReader(System.in));
String userInput = "Hello Testing ";
out.println(userInput);
while ((userInput = stdIn.readLine()) != null) {
out.println(userInput);
System.out.println("echo: " + in.readLine());
}
out.println(userInput);
out.close();
in.close();
stdIn.close();
sslSocket.close();
}
catch (Exception exp) {
System.out.println(" Exception occurred .... " + exp);
exp.printStackTrace();
}
}
}
Merci,
Après avoir activé le débogage complet:
Débogueur Journal De SSLClient
Allow unsafe renegotiation: false
Allow legacy hello messages: true
Is initial handshake: true
Is secure renegotiation: false
[Raw read]: length = 5
0000: 80 65 01 03 01 .e...
[Raw read]: length = 98
0000: 00 3C 00 00 00 20 00 00 04 01 00 80 00 00 05 00 .<... ..........
0010: 00 2F 00 00 33 00 00 32 00 00 0A 07 00 C0 00 00 ./..3..2........
0020: 16 00 00 13 00 00 09 06 00 40 00 00 15 00 00 12 .........@......
0030: 00 00 03 02 00 80 00 00 08 00 00 14 00 00 11 00 ................
0040: 00 FF 55 23 87 FB 8F 4F 39 1F 53 16 68 CB F8 4A ..U#...O9.S.h..J
0050: E3 55 F2 65 6F 6D F8 58 6A 3E AC 05 9A 2E 47 00 .U.eom.Xj>....G.
0060: 4A 61 Ja
[read] MD5 and SHA1 hashes: len = 3
0000: 01 03 01 ...
[read] MD5 and SHA1 hashes: len = 98
0000: 00 3C 00 00 00 20 00 00 04 01 00 80 00 00 05 00 .<... ..........
0010: 00 2F 00 00 33 00 00 32 00 00 0A 07 00 C0 00 00 ./..3..2........
0020: 16 00 00 13 00 00 09 06 00 40 00 00 15 00 00 12 .........@......
0030: 00 00 03 02 00 80 00 00 08 00 00 14 00 00 11 00 ................
0040: 00 FF 55 23 87 FB 8F 4F 39 1F 53 16 68 CB F8 4A ..U#...O9.S.h..J
0050: E3 55 F2 65 6F 6D F8 58 6A 3E AC 05 9A 2E 47 00 .U.eom.Xj>....G.
0060: 4A 61 Ja
main, READ: SSL v2, contentType = Handshake, translated length = 75
*** ClientHello, TLSv1
RandomCookie: GMT: 1428326139 bytes = { 143, 79, 57, 31, 83, 22, 104, 203, 248, 74, 227, 85, 242, 101, 111, 109, 248, 88, 106, 62, 172, 5, 154, 46, 71, 0, 74, 97 }
Session ID: {}
Cipher Suites: [SSL_RSA_WITH_RC4_128_MD5, SSL_RSA_WITH_RC4_128_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_DES_CBC_SHA, SSL_DHE_RSA_WITH_DES_CBC_SHA, SSL_DHE_DSS_WITH_DES_CBC_SHA, SSL_RSA_EXPORT_WITH_RC4_40_MD5, SSL_RSA_EXPORT_WITH_DES40_CBC_SHA, SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA, SSL_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA, TLS_EMPTY_RENEGOTIATION_INFO_SCSV]
Compression Methods: { 0 }
***
%% Created: [Session-1, SSL_RSA_WITH_RC4_128_MD5]
*** ServerHello, TLSv1
RandomCookie: GMT: 1428326139 bytes = { 158, 48, 29, 129, 13, 62, 146, 105, 73, 124, 215, 161, 95, 187, 133, 185, 177, 126, 152, 188, 242, 149, 169, 89, 170, 54, 114, 1 }
Session ID: {85, 35, 135, 251, 224, 246, 149, 228, 232, 147, 250, 67, 208, 150, 103, 11, 42, 3, 25, 164, 173, 2, 175, 238, 127, 205, 214, 147, 219, 129, 83, 9}
Cipher Suite: SSL_RSA_WITH_RC4_128_MD5
Compression Method: 0
Extension renegotiation_info, renegotiated_connection: <empty>
***
Cipher suite: SSL_RSA_WITH_RC4_128_MD5
*** Certificate chain
chain [0] = [
[
Version: V3
Subject: CN=John, OU=startup, O=developer, L=bangalore, ST=karnataka, C=91
Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5
Key: Sun RSA public key, 1024 bits
modulus: 123574216535049538229649138532732037450344660032008107623318896073877130816352911991676317388894985357571552005101850107090892510303976778984089005629672968049771222968340272946467454151597928015519714376040070285997043906750602810147154555100812394706180558167843570971003367893266814158255391999837062858379
public exponent: 65537
Validity: [From: Tue Apr 07 11:10:44 IST 2015,
To: Mon Jul 06 11:10:44 IST 2015]
Issuer: CN=John, OU=startup, O=developer, L=bangalore, ST=karnataka, C=91
SerialNumber: [ 55236ddc]
]
Algorithm: [SHA1withRSA]
Signature:
0000: 18 7D 3A 3D 98 43 E1 EA C8 CC 79 01 FF 8B BF E1 ..:=.C....y.....
0010: 07 A9 12 2D 6D D6 47 74 FE 67 D0 CA 11 CE D6 90 ...-m.Gt.g......
0020: 9D BA 94 67 19 7C 24 FD B8 EA 45 14 A3 29 5D F7 ...g..$...E..)].
0030: 6A 4A EA 2E 29 42 2B 04 EC D1 FF E6 B0 A5 1C AA jJ..)B+.........
0040: 2E 79 3D 30 B5 D7 1D CD A5 12 5E AE 91 4C 22 10 .y=0......^..L".
0050: CF 45 8E 36 A6 55 76 CC 15 BE 9F 5C 3B 45 D0 0C .E.6.Uv....\;E..
0060: 07 F2 FA F4 E2 42 6F E5 DF 5F AC EC 60 67 F8 B3 .....Bo.._..`g..
0070: 14 B0 F5 2E F6 F7 97 7E FC 24 EA A0 7E 38 5E 25 .........$...8^%
]
***
*** ServerHelloDone
[write] MD5 and SHA1 hashes: len = 686
0000: 02 00 00 4D 03 01 55 23 87 FB 9E 30 1D 81 0D 3E ...M..U#...0...>
0010: 92 69 49 7C D7 A1 5F BB 85 B9 B1 7E 98 BC F2 95 .iI..._.........
0020: A9 59 AA 36 72 01 20 55 23 87 FB E0 F6 95 E4 E8 .Y.6r. U#.......
0030: 93 FA 43 D0 96 67 0B 2A 03 19 A4 AD 02 AF EE 7F ..C..g.*........
0040: CD D6 93 DB 81 53 09 00 04 00 00 05 FF 01 00 01 .....S..........
0050: 00 0B 00 02 55 00 02 52 00 02 4F 30 82 02 4B 30 ....U..R..O0..K0
0060: 82 01 B4 A0 03 02 01 02 02 04 55 23 6D DC 30 0D ..........U#m.0.
0070: 06 09 2A 86 48 86 F7 0D 01 01 05 05 00 30 6A 31 ..*.H........0j1
0080: 0B 30 09 06 03 55 04 06 13 02 39 31 31 12 30 10 .0...U....911.0.
0090: 06 03 55 04 08 13 09 6B 61 72 6E 61 74 61 6B 61 ..U....karnataka
00A0: 31 12 30 10 06 03 55 04 07 13 09 62 61 6E 67 61 1.0...U....banga
00B0: 6C 6F 72 65 31 12 30 10 06 03 55 04 0A 13 09 64 lore1.0...U....d
00C0: 65 76 65 6C 6F 70 65 72 31 10 30 0E 06 03 55 04 eveloper1.0...U.
00D0: 0B 13 07 73 74 61 72 74 75 70 31 0D 30 0B 06 03 ...startup1.0...
00E0: 55 04 03 13 04 4A 6F 68 6E 30 1E 17 0D 31 35 30 U....John0...150
00F0: 34 30 37 30 35 34 30 34 34 5A 17 0D 31 35 30 37 407054044Z..1507
0100: 30 36 30 35 34 30 34 34 5A 30 6A 31 0B 30 09 06 06054044Z0j1.0..
0110: 03 55 04 06 13 02 39 31 31 12 30 10 06 03 55 04 .U....911.0...U.
0120: 08 13 09 6B 61 72 6E 61 74 61 6B 61 31 12 30 10 ...karnataka1.0.
0130: 06 03 55 04 07 13 09 62 61 6E 67 61 6C 6F 72 65 ..U....bangalore
0140: 31 12 30 10 06 03 55 04 0A 13 09 64 65 76 65 6C 1.0...U....devel
0150: 6F 70 65 72 31 10 30 0E 06 03 55 04 0B 13 07 73 oper1.0...U....s
0160: 74 61 72 74 75 70 31 0D 30 0B 06 03 55 04 03 13 tartup1.0...U...
0170: 04 4A 6F 68 6E 30 81 9F 30 0D 06 09 2A 86 48 86 .John0..0...*.H.
0180: F7 0D 01 01 01 05 00 03 81 8D 00 30 81 89 02 81 ...........0....
0190: 81 00 AF F9 BC 0C 37 61 CF E9 A6 83 63 4D BD B9 ......7a....cM..
01A0: D8 7D EC 26 04 4D D9 AE CA E1 A0 99 E8 AB FE 0E ...&.M..........
01B0: F2 F2 E6 7A C1 D5 43 0C BE 95 83 01 C0 A9 B9 A9 ...z..C.........
01C0: 8E 19 42 A7 5A 12 66 26 E8 28 9B A2 D5 BE 0A 3A ..B.Z.f&.(.....:
01D0: 66 51 B3 94 4A E9 44 3A 96 64 5E B4 25 84 82 CA fQ..J.D:.d^.%...
01E0: 2B 86 65 1D 16 C4 97 D1 AA 0B D9 4D 9F 9A C8 CC +.e........M....
01F0: DD 2F 79 CB 1C 59 04 EE C0 B5 8D 69 80 46 F5 DA ./y..Y.....i.F..
0200: FB 33 1E E1 78 55 7B 58 24 45 61 8B AB DF C1 80 .3..xU.X$Ea.....
0210: 86 8B 02 03 01 00 01 30 0D 06 09 2A 86 48 86 F7 .......0...*.H..
0220: 0D 01 01 05 05 00 03 81 81 00 18 7D 3A 3D 98 43 ............:=.C
0230: E1 EA C8 CC 79 01 FF 8B BF E1 07 A9 12 2D 6D D6 ....y........-m.
0240: 47 74 FE 67 D0 CA 11 CE D6 90 9D BA 94 67 19 7C Gt.g.........g..
0250: 24 FD B8 EA 45 14 A3 29 5D F7 6A 4A EA 2E 29 42 $...E..)].jJ..)B
0260: 2B 04 EC D1 FF E6 B0 A5 1C AA 2E 79 3D 30 B5 D7 +..........y=0..
0270: 1D CD A5 12 5E AE 91 4C 22 10 CF 45 8E 36 A6 55 ....^..L"..E.6.U
0280: 76 CC 15 BE 9F 5C 3B 45 D0 0C 07 F2 FA F4 E2 42 v....\;E.......B
0290: 6F E5 DF 5F AC EC 60 67 F8 B3 14 B0 F5 2E F6 F7 o.._..`g........
02A0: 97 7E FC 24 EA A0 7E 38 5E 25 0E 00 00 00 ...$...8^%....
main, WRITE: TLSv1 Handshake, length = 686
[Raw write]: length = 691
0000: 16 03 01 02 AE 02 00 00 4D 03 01 55 23 87 FB 9E ........M..U#...
0010: 30 1D 81 0D 3E 92 69 49 7C D7 A1 5F BB 85 B9 B1 0...>.iI..._....
0020: 7E 98 BC F2 95 A9 59 AA 36 72 01 20 55 23 87 FB ......Y.6r. U#..
0030: E0 F6 95 E4 E8 93 FA 43 D0 96 67 0B 2A 03 19 A4 .......C..g.*...
0040: AD 02 AF EE 7F CD D6 93 DB 81 53 09 00 04 00 00 ..........S.....
0050: 05 FF 01 00 01 00 0B 00 02 55 00 02 52 00 02 4F .........U..R..O
0060: 30 82 02 4B 30 82 01 B4 A0 03 02 01 02 02 04 55 0..K0..........U
0070: 23 6D DC 30 0D 06 09 2A 86 48 86 F7 0D 01 01 05 #m.0...*.H......
0080: 05 00 30 6A 31 0B 30 09 06 03 55 04 06 13 02 39 ..0j1.0...U....9
0090: 31 31 12 30 10 06 03 55 04 08 13 09 6B 61 72 6E 11.0...U....karn
00A0: 61 74 61 6B 61 31 12 30 10 06 03 55 04 07 13 09 ataka1.0...U....
00B0: 62 61 6E 67 61 6C 6F 72 65 31 12 30 10 06 03 55 bangalore1.0...U
00C0: 04 0A 13 09 64 65 76 65 6C 6F 70 65 72 31 10 30 ....developer1.0
00D0: 0E 06 03 55 04 0B 13 07 73 74 61 72 74 75 70 31 ...U....startup1
00E0: 0D 30 0B 06 03 55 04 03 13 04 4A 6F 68 6E 30 1E .0...U....John0.
00F0: 17 0D 31 35 30 34 30 37 30 35 34 30 34 34 5A 17 ..150407054044Z.
0100: 0D 31 35 30 37 30 36 30 35 34 30 34 34 5A 30 6A .150706054044Z0j
0110: 31 0B 30 09 06 03 55 04 06 13 02 39 31 31 12 30 1.0...U....911.0
0120: 10 06 03 55 04 08 13 09 6B 61 72 6E 61 74 61 6B ...U....karnatak
0130: 61 31 12 30 10 06 03 55 04 07 13 09 62 61 6E 67 a1.0...U....bang
0140: 61 6C 6F 72 65 31 12 30 10 06 03 55 04 0A 13 09 alore1.0...U....
0150: 64 65 76 65 6C 6F 70 65 72 31 10 30 0E 06 03 55 developer1.0...U
0160: 04 0B 13 07 73 74 61 72 74 75 70 31 0D 30 0B 06 ....startup1.0..
0170: 03 55 04 03 13 04 4A 6F 68 6E 30 81 9F 30 0D 06 .U....John0..0..
0180: 09 2A 86 48 86 F7 0D 01 01 01 05 00 03 81 8D 00 .*.H............
0190: 30 81 89 02 81 81 00 AF F9 BC 0C 37 61 CF E9 A6 0..........7a...
01A0: 83 63 4D BD B9 D8 7D EC 26 04 4D D9 AE CA E1 A0 .cM.....&.M.....
01B0: 99 E8 AB FE 0E F2 F2 E6 7A C1 D5 43 0C BE 95 83 ........z..C....
01C0: 01 C0 A9 B9 A9 8E 19 42 A7 5A 12 66 26 E8 28 9B .......B.Z.f&.(.
01D0: A2 D5 BE 0A 3A 66 51 B3 94 4A E9 44 3A 96 64 5E ....:fQ..J.D:.d^
01E0: B4 25 84 82 CA 2B 86 65 1D 16 C4 97 D1 AA 0B D9 .%...+.e........
01F0: 4D 9F 9A C8 CC DD 2F 79 CB 1C 59 04 EE C0 B5 8D M...../y..Y.....
0200: 69 80 46 F5 DA FB 33 1E E1 78 55 7B 58 24 45 61 i.F...3..xU.X$Ea
0210: 8B AB DF C1 80 86 8B 02 03 01 00 01 30 0D 06 09 ............0...
0220: 2A 86 48 86 F7 0D 01 01 05 05 00 03 81 81 00 18 *.H.............
0230: 7D 3A 3D 98 43 E1 EA C8 CC 79 01 FF 8B BF E1 07 .:=.C....y......
0240: A9 12 2D 6D D6 47 74 FE 67 D0 CA 11 CE D6 90 9D ..-m.Gt.g.......
0250: BA 94 67 19 7C 24 FD B8 EA 45 14 A3 29 5D F7 6A ..g..$...E..)].j
0260: 4A EA 2E 29 42 2B 04 EC D1 FF E6 B0 A5 1C AA 2E J..)B+..........
0270: 79 3D 30 B5 D7 1D CD A5 12 5E AE 91 4C 22 10 CF y=0......^..L"..
0280: 45 8E 36 A6 55 76 CC 15 BE 9F 5C 3B 45 D0 0C 07 E.6.Uv....\;E...
0290: F2 FA F4 E2 42 6F E5 DF 5F AC EC 60 67 F8 B3 14 ....Bo.._..`g...
02A0: B0 F5 2E F6 F7 97 7E FC 24 EA A0 7E 38 5E 25 0E ........$...8^%.
02B0: 00 00 00 ...
[Raw read]: length = 5
0000: 15 03 01 00 02 .....
[Raw read]: length = 2
0000: 02 2E ..
main, READ: TLSv1 Alert, length = 2
main, RECV TLSv1 ALERT: fatal, certificate_unknown
main, called closeSocket()
main, handling exception: javax.net.ssl.SSLHandshakeException: Received fatal alert: certificate_unknown
Priv exp --- null
Exception occurred .... javax.net.ssl.SSLHandshakeException: Received fatal alert: certificate_unknown
javax.net.ssl.SSLHandshakeException: Received fatal alert: certificate_unknown
at com.sun.net.ssl.internal.ssl.Alerts.getSSLException(Unknown Source)
at com.sun.net.ssl.internal.ssl.Alerts.getSSLException(Unknown Source)
at com.sun.net.ssl.internal.ssl.SSLSocketImpl.recvAlert(Unknown Source)
at com.sun.net.ssl.internal.ssl.SSLSocketImpl.readRecord(Unknown Source)
at com.sun.net.ssl.internal.ssl.SSLSocketImpl.performInitialHandshake(Unknown Source)
at com.sun.net.ssl.internal.ssl.SSLSocketImpl.readDataRecord(Unknown Source)
at com.sun.net.ssl.internal.ssl.AppInputStream.read(Unknown Source)
at sun.nio.cs.StreamDecoder.readBytes(Unknown Source)
at sun.nio.cs.StreamDecoder.implRead(Unknown Source)
at sun.nio.cs.StreamDecoder.read(Unknown Source)
at java.io.InputStreamReader.read(Unknown Source)
at java.io.BufferedReader.fill(Unknown Source)
at java.io.BufferedReader.readLine(Unknown Source)
at java.io.BufferedReader.readLine(Unknown Source)
at com.betterprogrammer.test.SSLServer.main(SSLServer.java:36)
et Débogueur Journal de SSLServer
keyStore is : C:\Program Files\Java\jre6\bin\server.jks
keyStore type is : jks
keyStore provider is :
init keystore
init keymanager of type SunX509
***
found key for : server
chain [0] = [
[
Version: V3
Subject: CN=John, OU=startup, O=developer, L=bangalore, ST=karnataka, C=91
Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5
Key: Sun RSA public key, 1024 bits
modulus: 123574216535049538229649138532732037450344660032008107623318896073877130816352911991676317388894985357571552005101850107090892510303976778984089005629672968049771222968340272946467454151597928015519714376040070285997043906750602810147154555100812394706180558167843570971003367893266814158255391999837062858379
public exponent: 65537
Validity: [From: Tue Apr 07 11:10:44 IST 2015,
To: Mon Jul 06 11:10:44 IST 2015]
Issuer: CN=John, OU=startup, O=developer, L=bangalore, ST=karnataka, C=91
SerialNumber: [ 55236ddc]
]
Algorithm: [SHA1withRSA]
Signature:
0000: 18 7D 3A 3D 98 43 E1 EA C8 CC 79 01 FF 8B BF E1 ..:=.C....y.....
0010: 07 A9 12 2D 6D D6 47 74 FE 67 D0 CA 11 CE D6 90 ...-m.Gt.g......
0020: 9D BA 94 67 19 7C 24 FD B8 EA 45 14 A3 29 5D F7 ...g..$...E..)].
0030: 6A 4A EA 2E 29 42 2B 04 EC D1 FF E6 B0 A5 1C AA jJ..)B+.........
0040: 2E 79 3D 30 B5 D7 1D CD A5 12 5E AE 91 4C 22 10 .y=0......^..L".
0050: CF 45 8E 36 A6 55 76 CC 15 BE 9F 5C 3B 45 D0 0C .E.6.Uv....\;E..
0060: 07 F2 FA F4 E2 42 6F E5 DF 5F AC EC 60 67 F8 B3 .....Bo.._..`g..
0070: 14 B0 F5 2E F6 F7 97 7E FC 24 EA A0 7E 38 5E 25 .........$...8^%
]
***
trustStore is: C:\Program Files\Java\jre6\lib\security\cacerts
trustStore type is : jks
trustStore provider is :
init truststore
adding as trusted cert:
Subject: CN=SwissSign Platinum CA - G2, O=SwissSign AG, C=CH
Issuer: CN=SwissSign Platinum CA - G2, O=SwissSign AG, C=CH
Algorithm: RSA; Serial number: 0x4eb200670c035d4f
Valid from Wed Oct 25 14:06:00 IST 2006 until Sat Oct 25 14:06:00 IST 2036
adding as trusted cert:
Subject: EMAILADDRESS=info@valicert.com, CN=http://www.valicert.com/, OU=ValiCert Class 1 Policy Validation Authority, O="ValiCert, Inc.", L=ValiCert Validation Network
Issuer: EMAILADDRESS=info@valicert.com, CN=http://www.valicert.com/, OU=ValiCert Class 1 Policy Validation Authority, O="ValiCert, Inc.", L=ValiCert Validation Network
Algorithm: RSA; Serial number: 0x1
Valid from Sat Jun 26 03:53:48 IST 1999 until Wed Jun 26 03:53:48 IST 2019
adding as trusted cert:
Subject: CN=thawte Primary Root CA, OU="(c) 2006 thawte, Inc. - For authorized use only", OU=Certification Services Division, O="thawte, Inc.", C=US
Issuer: CN=thawte Primary Root CA, OU="(c) 2006 thawte, Inc. - For authorized use only", OU=Certification Services Division, O="thawte, Inc.", C=US
Algorithm: RSA; Serial number: 0x344ed55720d5edec49f42fce37db2b6d
Valid from Fri Nov 17 05:30:00 IST 2006 until Thu Jul 17 05:29:59 IST 2036
...................
......................
.........................
IST 2021
adding as trusted cert:
Subject: CN=GeoTrust Primary Certification Authority - G3, OU=(c) 2008 GeoTrust Inc. - For authorized use only, O=GeoTrust Inc., C=US
Issuer: CN=GeoTrust Primary Certification Authority - G3, OU=(c) 2008 GeoTrust Inc. - For authorized use only, O=GeoTrust Inc., C=US
Algorithm: RSA; Serial number: 0x15ac6e9419b2794b41f627a9c3180f1f
Valid from Wed Apr 02 05:30:00 IST 2008 until Wed Dec 02 05:29:59 IST 2037
adding as trusted cert:
Subject: CN=GTE CyberTrust Root 5, OU="GTE CyberTrust Solutions, Inc.", O=GTE Corporation, C=US
Issuer: CN=GTE CyberTrust Root 5, OU="GTE CyberTrust Solutions, Inc.", O=GTE Corporation, C=US
Algorithm: RSA; Serial number: 0x1b6
Valid from Fri Aug 14 20:20:00 IST 1998 until Thu Aug 15 05:29:00 IST 2013
adding as trusted cert:
Subject: CN=UTN-USERFirst-Object, OU=http://www.usertrust.com, O=The USERTRUST Network, L=Salt Lake City, ST=UT, C=US
Issuer: CN=UTN-USERFirst-Object, OU=http://www.usertrust.com, O=The USERTRUST Network, L=Salt Lake City, ST=UT, C=US
Algorithm: RSA; Serial number: 0x44be0c8b500024b411d3362de0b35f1b
Valid from Sat Jul 10 00:01:20 IST 1999 until Wed Jul 10 00:10:36 IST 2019
adding as trusted cert:
Subject: CN=UTN - DATACorp SGC, OU=http://www.usertrust.com, O=The USERTRUST Network, L=Salt Lake City, ST=UT, C=US
Issuer: CN=UTN - DATACorp SGC, OU=http://www.usertrust.com, O=The USERTRUST Network, L=Salt Lake City, ST=UT, C=US
Algorithm: RSA; Serial number: 0x44be0c8b500021b411d32a6806a9ad69
Valid from Fri Jun 25 00:27:21 IST 1999 until Tue Jun 25 00:36:30 IST 2019
adding as trusted cert:
Subject: CN=Sonera Class2 CA, O=Sonera, C=FI
Issuer: CN=Sonera Class2 CA, O=Sonera, C=FI
Algorithm: RSA; Serial number: 0x1d
Valid from Fri Apr 06 12:59:40 IST 2001 until Tue Apr 06 12:59:40 IST 2021
adding as trusted cert:
Subject: CN=TC TrustCenter Class 2 CA II, OU=TC TrustCenter Class 2 CA, O=TC TrustCenter GmbH, C=DE
Issuer: CN=TC TrustCenter Class 2 CA II, OU=TC TrustCenter Class 2 CA, O=TC TrustCenter GmbH, C=DE
Algorithm: RSA; Serial number: 0x2e6a000100021fd752212c115c3b
Valid from Thu Jan 12 20:08:43 IST 2006 until Thu Jan 01 04:29:59 IST 2026
trigger seeding of SecureRandom
done seeding SecureRandom
Allow unsafe renegotiation: false
Allow legacy hello messages: true
Is initial handshake: true
Is secure renegotiation: false
matching alias: server
main, called closeSocket()
OriginalL'auteur Krishna | 2015-04-07
Vous devez vous connecter pour publier un commentaire.
j'ai enfin pu résoudre mon exception de lui-même.
En fait j'ai fait des erreurs stupides qui a été :-
À la fois client et serveur de fichier, j'ai été en utilisant la même propriété que
J'ai eu à utiliser javax.net.le protocole ssl.trustStore au lieu de j'ai été en utilisant javax.net.le protocole ssl.fichier de clés en client et javax.net.le protocole ssl.trustStorePassword au lieu de j'ai été en utilisant javax.net.le protocole ssl.keyStorePassword de client aussi. Ainsi, après la correction de mon exception a été supprimé et il a commencé à travailler.
grâce
OriginalL'auteur Krishna