Anonymous Monk has asked for the wisdom of the Perl Monks concerning the following question:

I am having problem of getting a Perl SSL Socket Server to receive a message sent by a Java SSL Socket client. The Java client is throwing a Socket Exception: Connection reset by peer: socket write error.

The weird thing is that, the SSL server works fine when the message is sent by a Perl SSL Socket client, so I am sure this server code works. And I verified that the Java SSL Socket client can also send a message received by a Java SSL Socket Server. I was also able to get the Perl SSL client to send & receive from the Java SSL server. The only link doesn't work is the Java Client to Perl Server:

Perl Client -> Perl Server OK
Java Client -> Java Server OK
Perl Client -> Java Server OK
Java Client -> Perl Server Failed

Looking at the debug output, the SSL handshaking looks good, and I verified that by modifying the Java client to listen for incoming messages only, and it can receive the message sent by the Perl server.

Since I am relatively new to Perl, I wonder if I am missing something obvious, or if someone has ran into issue like this before, and can give me some hints/pointers to try or look into (a google search didn't give me any good hits). I appreciate for your helps in advance.

Here is the SSL Server code (based on the ssl_server.pl example of IO::Socket::SSL):

use strict; use IO::Socket::SSL; my ($sock, $s, $v_mode); $IO::Socket::SSL::DEBUG = 3; # Check to make sure that we were not accidentally run in the wrong # directory: unless (-d "certs") { if (-d "../certs") { chdir ".."; } else { die "Please run this example from the IO::Socket::SSL distribution + directory!\n"; } } if(!($sock = IO::Socket::SSL->new( Listen => 5, LocalAddr => 'localhost', LocalPort => 9000, Proto => 'tcp', Reuse => 1, SSL_verify_mode => 0x01, SSL_passwd_cb => sub {return "bluebell"}, )) ) { warn "unable to create socket: ", &IO::Socket::SSL::errstr, "\n"; exit(0); } warn "socket created: $sock.\n"; while (1) { warn "waiting for next connection.\n"; while(($s = $sock->accept())) { my ($peer_cert, $subject_name, $issuer_name, $cipher, $sslversio +n, $date, $str); if( ! $s ) { warn "error: ", $sock->errstr, "\n"; next; } warn "connection opened ($s).\n"; if( ref($sock) eq "IO::Socket::SSL") { $subject_name = $s->peer_certificate("subject"); $issuer_name = $s->peer_certificate("issuer"); $cipher = $s->get_cipher(); } warn "\t subject: '$subject_name'.\n"; warn "\t issuer: '$issuer_name'.\n"; warn "\t cipher: '$cipher'.\n"; my $request = "ok"; # somehow swapping next 2 lines will make java client to receive + response # my ($request) = $sock->getlines; sysread($s, $request, 100); print "Received: $request \n"; $date = localtime(); my $response = "Perl SSL Server Responded at $date \r\n"; syswrite($s, $response, length($response)); $s->flush(); $s->close(); warn "\t connection closed.\n"; } } $sock->close(); warn "loop exited.\n";

If I swap the sysread() line with the commented out $sock->getlines line, the Java client will receive the response (but $request will still be blank). So I am sure it's related to how to read from a client socket ($s).

Here is perl server output (with debug set at 3):

DEBUG: .../IO/Socket/SSL.pm:1545: new ctx 36279520 socket created: IO::Socket::SSL=GLOB(0x22775f4). waiting for next connection. DEBUG: .../IO/Socket/SSL.pm:489: no socket yet DEBUG: .../IO/Socket/SSL.pm:491: accept created normal socket IO::Sock +et::SSL=GL OB(0x2277954) DEBUG: .../IO/Socket/SSL.pm:507: starting sslifying DEBUG: .../IO/Socket/SSL.pm:547: Net::SSLeay::accept -> 1 DEBUG: .../IO/Socket/SSL.pm:595: handshake done, socket ready DEBUG: .../IO/Socket/SSL.pm:495: accept_SSL ok connection opened (IO::Socket::SSL=GLOB(0x2277954)). DEBUG: .../IO/Socket/SSL.pm:1276: Could not retrieve peer certificatee +rror:00000 000:lib(0):func(0):reason(0) DEBUG: .../IO/Socket/SSL.pm:1276: Could not retrieve peer certificatee +rror:00000 000:lib(0):func(0):reason(0) subject: ''. issuer: ''. cipher: 'AES128-SHA'. DEBUG: .../IO/Socket/SSL.pm:1276: SSL read errorerror:140D9115:SSL rou +tines:SSL_ GET_PREV_SESSION:session id context uninitialized Received: ok DEBUG: .../IO/Socket/SSL.pm:1276: SSL write errorerror:140D9115:SSL ro +utines:SSL _GET_PREV_SESSION:session id context uninitialized connection closed. DEBUG: .../IO/Socket/SSL.pm:489: no socket yet

Here is the Java code (very basic SSL socket client):

public class SslSocketClient { public static void main(String[] args) throws Exception { SSLSocketFactory f = (SSLSocketFactory) SSLSocketFactory.getDe +fault(); SSLSocket socket = (SSLSocket) f.createSocket("localhost", 900 +0); socket.setEnabledProtocols(new String[] { "SSLv3" }); printSocketInfo(socket); socket.startHandshake(); PrintWriter writer = new PrintWriter(socket.getOutputStream(), + true); BufferedReader reader = new BufferedReader(new InputStreamRead +er( socket.getInputStream())); String line = "JAVA CLIENT REQUEST"; writer.println(line); while ((line = reader.readLine()) != null) { System.out.println("Received: [" + line + "]"); break; } writer.close(); reader.close(); socket.close(); } private static void printSocketInfo(SSLSocket s) { System.out.println("Socket class: " + s.getClass()); System.out.println(" Remote address = " + s.getInetAddress().toString()); System.out.println(" Remote port = " + s.getPort()); System.out.println(" Local socket address = " + s.getLocalSocketAddress().toString()); System.out.println(" Local address = " + s.getLocalAddress().toString()); System.out.println(" Local port = " + s.getLocalPort()); System.out.println(" Need client authentication = " + s.getNeedClientAuth()); SSLSession ss = s.getSession(); System.out.println(" Cipher suite = " + ss.getCipherSuite()) +; System.out.println(" Protocol = " + ss.getProtocol()); + } }

Here is java client out (I set debug to all):

keyStore is : keyStore type is : jks keyStore provider is : init keystore init keymanager of type SunX509 trustStore is: jdaemon.jks trustStore type is : jks trustStore provider is : init truststore adding as trusted cert: Subject: CN=server.local, O=Whatever it is, L=Muenchen, ST=Bayern, C +=DE Issuer: CN=IO::Socket::SSL Demo CA, O=Whatever it is, L=Muenchen, S +T=Bayern, C=DE Algorithm: RSA; Serial number: 0xd6d7e1b4b33091f0 Valid from Mon Dec 31 19:00:01 EST 2007 until Sat Mar 30 03:05:44 ED +T 2019 trigger seeding of SecureRandom done seeding SecureRandom Allow unsafe renegotiation: false Allow legacy hello messages: true Is initial handshake: true Is secure renegotiation: false Socket class: class sun.security.ssl.SSLSocketImpl Remote address = localhost/127.0.0.1 Remote port = 9000 Local socket address = /127.0.0.1:53870 Local address = /127.0.0.1 Local port = 53870 Need client authentication = false Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SH +A256 for SSLv3 Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA2 +56 for SSLv3 Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 for + SSLv3 Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA +256 for SSLv3 Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA25 +6 for SSLv3 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 + for SSLv3 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 + for SSLv3 Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SH +A256 Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA2 +56 Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA +256 Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA25 +6 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 %% No cached client session *** ClientHello, SSLv3 RandomCookie: GMT: 1390798260 bytes = { 153, 106, 142, 102, 148, 64, +225, 24, 24, 136, 79, 134, 143, 115, 220, 42, 72, 148, 22, 144, 112, +151, 37, 216, 236, 187, 47, 133 } Session ID: {} Cipher Suites: [TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WI +TH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_ECDH_ECDSA_WITH +_AES_128_CBC_SHA, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH +_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, TLS_ECDHE_ECDSA_W +ITH_RC4_128_SHA, TLS_ECDHE_RSA_WITH_RC4_128_SHA, SSL_RSA_WITH_RC4_128 +_SHA, TLS_ECDH_ECDSA_WITH_RC4_128_SHA, TLS_ECDH_RSA_WITH_RC4_128_SHA, + TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDHE_RSA_WITH_3DES_EDE_C +BC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_ECDSA_WITH_3DES_EDE_C +BC_SHA, TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE +_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_RC4_128_MD5 +, TLS_EMPTY_RENEGOTIATION_INFO_SCSV] Compression Methods: { 0 } Extension elliptic_curves, curve names: {secp256r1, sect163k1, sect163 +r2, secp192r1, secp224r1, sect233k1, sect233r1, sect283k1, sect283r1, + secp384r1, sect409k1, sect409r1, secp521r1, sect571k1, sect571r1, se +cp160k1, secp160r1, secp160r2, sect163r1, secp192k1, sect193r1, sect1 +93r2, secp224k1, sect239k1, secp256k1} Extension ec_point_formats, formats: [uncompressed] *** [write] MD5 and SHA1 hashes: len = 149 0000: 01 00 00 91 03 00 53 E6 E6 B4 99 6A 8E 66 94 40 ......S....j. +f.@ 0010: E1 18 18 88 4F 86 8F 73 DC 2A 48 94 16 90 70 97 ....O..s.*H.. +.p. 0020: 25 D8 EC BB 2F 85 00 00 2A C0 09 C0 13 00 2F C0 %.../...*.... +./. 0030: 04 C0 0E 00 33 00 32 C0 07 C0 11 00 05 C0 02 C0 ....3.2...... +... 0040: 0C C0 08 C0 12 00 0A C0 03 C0 0D 00 16 00 13 00 ............. +... 0050: 04 00 FF 01 00 00 3E 00 0A 00 34 00 32 00 17 00 ......>...4.2 +... 0060: 01 00 03 00 13 00 15 00 06 00 07 00 09 00 0A 00 ............. +... 0070: 18 00 0B 00 0C 00 19 00 0D 00 0E 00 0F 00 10 00 ............. +... 0080: 11 00 02 00 12 00 04 00 05 00 14 00 08 00 16 00 ............. +... 0090: 0B 00 02 01 00 ..... main, WRITE: SSLv3 Handshake, length = 149 [Raw write]: length = 154 0000: 16 03 00 00 95 01 00 00 91 03 00 53 E6 E6 B4 99 ...........S. +... 0010: 6A 8E 66 94 40 E1 18 18 88 4F 86 8F 73 DC 2A 48 j.f.@....O..s +.*H 0020: 94 16 90 70 97 25 D8 EC BB 2F 85 00 00 2A C0 09 ...p.%.../... +*.. 0030: C0 13 00 2F C0 04 C0 0E 00 33 00 32 C0 07 C0 11 .../.....3.2. +... 0040: 00 05 C0 02 C0 0C C0 08 C0 12 00 0A C0 03 C0 0D ............. +... 0050: 00 16 00 13 00 04 00 FF 01 00 00 3E 00 0A 00 34 ...........>. +..4 0060: 00 32 00 17 00 01 00 03 00 13 00 15 00 06 00 07 .2........... +... 0070: 00 09 00 0A 00 18 00 0B 00 0C 00 19 00 0D 00 0E ............. +... 0080: 00 0F 00 10 00 11 00 02 00 12 00 04 00 05 00 14 ............. +... 0090: 00 08 00 16 00 0B 00 02 01 00 .......... [Raw read]: length = 5 0000: 16 03 00 00 51 ....Q [Raw read]: length = 81 0000: 02 00 00 4D 03 00 53 E6 E6 B4 CA 62 83 80 4E 0B ...M..S....b. +.N. 0010: 57 06 AB C1 1C 72 25 9C F7 ED 80 D1 7E 44 52 76 W....r%...... +DRv 0020: DA 49 4E 80 FD 2D 20 C3 46 48 9A CA 02 18 02 2F .IN..- .FH... +../ 0030: EC E8 E5 09 D6 4E 7A 26 83 EA 66 D8 83 96 93 C1 .....Nz&..f.. +... 0040: 45 62 48 F1 68 17 3B 00 2F 00 00 05 FF 01 00 01 EbH.h.;./.... +... 0050: 00 . main, READ: SSLv3 Handshake, length = 81 *** ServerHello, SSLv3 RandomCookie: GMT: 1390798260 bytes = { 202, 98, 131, 128, 78, 11, 87 +, 6, 171, 193, 28, 114, 37, 156, 247, 237, 128, 209, 126, 68, 82, 118 +, 218, 73, 78, 128, 253, 45 } Session ID: {195, 70, 72, 154, 202, 2, 24, 2, 47, 236, 232, 229, 9, 2 +14, 78, 122, 38, 131, 234, 102, 216, 131, 150, 147, 193, 69, 98, 72, +241, 104, 23, 59} Cipher Suite: TLS_RSA_WITH_AES_128_CBC_SHA Compression Method: 0 Extension renegotiation_info, renegotiated_connection: <empty> *** %% Initialized: [Session-1, TLS_RSA_WITH_AES_128_CBC_SHA] ** TLS_RSA_WITH_AES_128_CBC_SHA [read] MD5 and SHA1 hashes: len = 81 0000: 02 00 00 4D 03 00 53 E6 E6 B4 CA 62 83 80 4E 0B ...M..S....b. +.N. 0010: 57 06 AB C1 1C 72 25 9C F7 ED 80 D1 7E 44 52 76 W....r%...... +DRv 0020: DA 49 4E 80 FD 2D 20 C3 46 48 9A CA 02 18 02 2F .IN..- .FH... +../ 0030: EC E8 E5 09 D6 4E 7A 26 83 EA 66 D8 83 96 93 C1 .....Nz&..f.. +... 0040: 45 62 48 F1 68 17 3B 00 2F 00 00 05 FF 01 00 01 EbH.h.;./.... +... 0050: 00 . [Raw read]: length = 5 0000: 16 03 00 06 94 ..... [Raw read]: length = 1684 0000: 0B 00 06 90 00 06 8D 00 03 5B 30 82 03 57 30 82 .........[0.. +W0. 0010: 02 C0 A0 03 02 01 02 02 09 00 D6 D7 E1 B4 B3 30 ............. +..0 0020: 91 F0 30 0D 06 09 2A 86 48 86 F7 0D 01 01 05 05 ..0...*.H.... +... 0030: 00 30 6C 31 0B 30 09 06 03 55 04 06 13 02 44 45 .0l1.0...U... +.DE 0040: 31 0F 30 0D 06 03 55 04 08 13 06 42 61 79 65 72 1.0...U....Ba +yer 0050: 6E 31 11 30 0F 06 03 55 04 07 13 08 4D 75 65 6E n1.0...U....M +uen 0060: 63 68 65 6E 31 17 30 15 06 03 55 04 0A 13 0E 57 chen1.0...U.. +..W 0070: 68 61 74 65 76 65 72 20 69 74 20 69 73 31 20 30 hatever it is +1 0 0080: 1E 06 03 55 04 03 13 17 49 4F 3A 3A 53 6F 63 6B ...U....IO::S +ock 0090: 65 74 3A 3A 53 53 4C 20 44 65 6D 6F 20 43 41 30 et::SSL Demo +CA0 00A0: 1E 17 0D 30 38 30 31 30 31 30 30 30 30 30 31 5A ...0801010000 +01Z 00B0: 17 0D 31 39 30 33 33 30 30 37 30 35 34 34 5A 30 ..19033007054 +4Z0 00C0: 61 31 0B 30 09 06 03 55 04 06 13 02 44 45 31 0F a1.0...U....D +E1. 00D0: 30 0D 06 03 55 04 08 13 06 42 61 79 65 72 6E 31 0...U....Baye +rn1 00E0: 11 30 0F 06 03 55 04 07 13 08 4D 75 65 6E 63 68 .0...U....Mue +nch 00F0: 65 6E 31 17 30 15 06 03 55 04 0A 13 0E 57 68 61 en1.0...U.... +Wha 0100: 74 65 76 65 72 20 69 74 20 69 73 31 15 30 13 06 tever it is1. +0.. 0110: 03 55 04 03 13 0C 73 65 72 76 65 72 2E 6C 6F 63 .U....server. +loc 0120: 61 6C 30 81 9F 30 0D 06 09 2A 86 48 86 F7 0D 01 al0..0...*.H. +... 0130: 01 01 05 00 03 81 8D 00 30 81 89 02 81 81 00 9F ........0.... +... 0140: 98 73 4B 34 AA 4F C2 5A 3C 3D BA F0 54 55 E6 D5 .sK4.O.Z<=..T +U.. 0150: 8A A0 8F E4 94 5A 72 47 34 9A 61 50 CC D0 81 8D .....ZrG4.aP. +... 0160: 37 C4 8E 0C 79 B4 E4 D9 0D 71 06 3D 07 4D 2A FF 7...y....q.=. +M*. 0170: B5 6A EF DB 36 F0 BE ED B2 B0 2E 18 AF F3 35 92 .j..6........ +.5. 0180: 71 15 84 F5 2A CB 18 BD 7E DB 26 18 C1 4E 31 2A q...*.....&.. +N1* 0190: 01 B8 1B C9 A9 DF 6C 62 74 20 49 4D 51 14 93 F4 ......lbt IMQ +... 01A0: D6 18 07 F3 3D D9 F7 DC 10 33 E4 00 A2 6C 62 B0 ....=....3... +lb. 01B0: 59 7E 5F F9 8E B6 A5 AF AD F6 FB E6 FA DF 9B 02 Y._.......... +... 01C0: 03 01 00 01 A3 82 01 0A 30 82 01 06 30 09 06 03 ........0...0 +... 01D0: 55 1D 13 04 02 30 00 30 2C 06 09 60 86 48 01 86 U....0.0,..`. +H.. 01E0: F8 42 01 0D 04 1F 16 1D 4F 70 65 6E 53 53 4C 20 .B......OpenS +SL 01F0: 47 65 6E 65 72 61 74 65 64 20 43 65 72 74 69 66 Generated Cer +tif 0200: 69 63 61 74 65 30 1D 06 03 55 1D 0E 04 16 04 14 icate0...U... +... 0210: BC 81 38 7B 62 C9 DD A9 BA 5E 9C 44 AA AE 71 39 ..8.b....^.D. +.q9 0220: 7A 81 C9 E8 30 81 9E 06 03 55 1D 23 04 81 96 30 z...0....U.#. +..0 0230: 81 93 80 14 DE 65 01 16 19 2E 51 E0 9A 51 1A 37 .....e....Q.. +Q.7 0240: 50 94 7D 39 29 2A 42 2C A1 70 A4 6E 30 6C 31 0B P..9)*B,.p.n0 +l1. 0250: 30 09 06 03 55 04 06 13 02 44 45 31 0F 30 0D 06 0...U....DE1. +0.. 0260: 03 55 04 08 13 06 42 61 79 65 72 6E 31 11 30 0F .U....Bayern1 +.0. 0270: 06 03 55 04 07 13 08 4D 75 65 6E 63 68 65 6E 31 ..U....Muench +en1 0280: 17 30 15 06 03 55 04 0A 13 0E 57 68 61 74 65 76 .0...U....Wha +tev 0290: 65 72 20 69 74 20 69 73 31 20 30 1E 06 03 55 04 er it is1 0.. +.U. 02A0: 03 13 17 49 4F 3A 3A 53 6F 63 6B 65 74 3A 3A 53 ...IO::Socket +::S 02B0: 53 4C 20 44 65 6D 6F 20 43 41 82 09 00 E7 AD 8B SL Demo CA... +... 02C0: 07 55 8A 17 27 30 0B 06 03 55 1D 0F 04 04 03 02 .U..'0...U... +... 02D0: 05 E0 30 0D 06 09 2A 86 48 86 F7 0D 01 01 05 05 ..0...*.H.... +... 02E0: 00 03 81 81 00 22 AC B3 A0 67 EB C2 40 36 9A 56 ....."...g..@ +6.V 02F0: 71 20 FC 2E 4B 3D DB B1 83 F3 96 5A 33 9B DB 33 q ..K=.....Z3 +..3 0300: DE 52 DC 9C 80 36 78 9B E3 90 EA 63 CC 0C AC 0F .R...6x....c. +... 0310: BD 01 20 26 8F 47 27 83 23 A9 90 B6 AE 5C D8 3C .. &.G'.#.... +\.< 0320: 20 27 CA 04 B4 5E 9B 85 FC 34 AF 5E 91 60 3B D2 '...^...4.^. +`;. 0330: DF B7 06 AE E3 01 09 1F 89 AF 0A 18 0A 3F EF 43 ............. +?.C 0340: D6 3D 6E 16 74 32 B3 06 F0 8A F4 80 61 F7 F1 83 .=n.t2......a +... 0350: 85 E8 2C 1D B8 83 F6 81 87 B3 CD 2B 0B 88 1A F9 ..,........+. +... 0360: 3F 15 77 3B CC 00 03 2C 30 82 03 28 30 82 02 91 ?.w;...,0..(0 +... 0370: A0 03 02 01 02 02 09 00 E7 AD 8B 07 55 8A 17 27 ............U +..' 0380: 30 0D 06 09 2A 86 48 86 F7 0D 01 01 05 05 00 30 0...*.H...... +..0 0390: 6C 31 0B 30 09 06 03 55 04 06 13 02 44 45 31 0F l1.0...U....D +E1. 03A0: 30 0D 06 03 55 04 08 13 06 42 61 79 65 72 6E 31 0...U....Baye +rn1 03B0: 11 30 0F 06 03 55 04 07 13 08 4D 75 65 6E 63 68 .0...U....Mue +nch 03C0: 65 6E 31 17 30 15 06 03 55 04 0A 13 0E 57 68 61 en1.0...U.... +Wha 03D0: 74 65 76 65 72 20 69 74 20 69 73 31 20 30 1E 06 tever it is1 +0.. 03E0: 03 55 04 03 13 17 49 4F 3A 3A 53 6F 63 6B 65 74 .U....IO::Soc +ket 03F0: 3A 3A 53 53 4C 20 44 65 6D 6F 20 43 41 30 1E 17 ::SSL Demo CA +0.. 0400: 0D 30 39 30 34 30 31 30 36 34 34 34 38 5A 17 0D .090401064448 +Z.. 0410: 31 39 30 33 33 30 30 36 34 34 34 38 5A 30 6C 31 190330064448Z +0l1 0420: 0B 30 09 06 03 55 04 06 13 02 44 45 31 0F 30 0D .0...U....DE1 +.0. 0430: 06 03 55 04 08 13 06 42 61 79 65 72 6E 31 11 30 ..U....Bayern +1.0 0440: 0F 06 03 55 04 07 13 08 4D 75 65 6E 63 68 65 6E ...U....Muenc +hen 0450: 31 17 30 15 06 03 55 04 0A 13 0E 57 68 61 74 65 1.0...U....Wh +ate 0460: 76 65 72 20 69 74 20 69 73 31 20 30 1E 06 03 55 ver it is1 0. +..U 0470: 04 03 13 17 49 4F 3A 3A 53 6F 63 6B 65 74 3A 3A ....IO::Socke +t:: 0480: 53 53 4C 20 44 65 6D 6F 20 43 41 30 81 9F 30 0D SSL Demo CA0. +.0. 0490: 06 09 2A 86 48 86 F7 0D 01 01 01 05 00 03 81 8D ..*.H........ +... 04A0: 00 30 81 89 02 81 81 00 D9 44 E7 DA B7 29 5C C5 .0.......D... +)\. 04B0: C6 EB C7 47 53 5E F8 28 CE 5A 85 C2 9B 3B 82 18 ...GS^.(.Z... +;.. 04C0: 32 C7 E4 2F 83 0A EF EF 6C 3C 74 F2 29 30 39 35 2../....l<t.) +095 04D0: CD 37 90 3C D4 B2 F2 74 C2 60 8B 04 AF 5B 46 0B .7.<...t.`... +[F. 04E0: E4 FF 75 8B 77 AD A6 26 DA 45 E4 DB 44 33 62 2B ..u.w..&.E..D +3b+ 04F0: 97 38 22 14 47 E2 58 F7 1B D4 76 77 9E F5 9D 6F .8".G.X...vw. +..o 0500: 24 3E 6E EC 37 E4 86 70 2C 08 98 64 C5 56 7B C6 $>n.7..p,..d. +V.. 0510: 84 85 E1 97 A2 F3 5D AF 8B E6 7E 78 F4 7E FC 5E ......]....x. +..^ 0520: EE 4C 9C 9E 05 B7 F9 41 02 03 01 00 01 A3 81 D1 .L.....A..... +... 0530: 30 81 CE 30 1D 06 03 55 1D 0E 04 16 04 14 DE 65 0..0...U..... +..e 0540: 01 16 19 2E 51 E0 9A 51 1A 37 50 94 7D 39 29 2A ....Q..Q.7P.. +9)* 0550: 42 2C 30 81 9E 06 03 55 1D 23 04 81 96 30 81 93 B,0....U.#... +0.. 0560: 80 14 DE 65 01 16 19 2E 51 E0 9A 51 1A 37 50 94 ...e....Q..Q. +7P. 0570: 7D 39 29 2A 42 2C A1 70 A4 6E 30 6C 31 0B 30 09 .9)*B,.p.n0l1 +.0. 0580: 06 03 55 04 06 13 02 44 45 31 0F 30 0D 06 03 55 ..U....DE1.0. +..U 0590: 04 08 13 06 42 61 79 65 72 6E 31 11 30 0F 06 03 ....Bayern1.0 +... 05A0: 55 04 07 13 08 4D 75 65 6E 63 68 65 6E 31 17 30 U....Muenchen +1.0 05B0: 15 06 03 55 04 0A 13 0E 57 68 61 74 65 76 65 72 ...U....Whate +ver 05C0: 20 69 74 20 69 73 31 20 30 1E 06 03 55 04 03 13 it is1 0...U +... 05D0: 17 49 4F 3A 3A 53 6F 63 6B 65 74 3A 3A 53 53 4C .IO::Socket:: +SSL 05E0: 20 44 65 6D 6F 20 43 41 82 09 00 E7 AD 8B 07 55 Demo CA..... +..U 05F0: 8A 17 27 30 0C 06 03 55 1D 13 04 05 30 03 01 01 ..'0...U....0 +... 0600: FF 30 0D 06 09 2A 86 48 86 F7 0D 01 01 05 05 00 .0...*.H..... +... 0610: 03 81 81 00 66 EF 04 5D E3 C2 12 15 74 2D E0 B4 ....f..]....t +-.. 0620: CC 15 C1 31 49 6A BB BA 74 7F 34 01 C8 BF 54 E9 ...1Ij..t.4.. +.T. 0630: 2B 8E 9B 09 0A 8A 1F F0 39 CB 23 C5 7E 8F 16 32 +.......9.#.. +..2 0640: 66 DC 2E 7F 34 9F 66 53 0F 16 AD B6 C1 4C A7 0C f...4.fS..... +L.. 0650: 83 BB 76 3E FB B2 22 E2 8A FB 02 B7 35 FE 57 65 ..v>..".....5 +.We 0660: A1 A7 CF 0B 67 D5 A1 73 33 42 D4 86 D5 7C CF A3 ....g..s3B... +... 0670: 9C 51 10 C4 7E 74 01 B2 02 C2 3C E0 DC F4 C8 38 .Q...t....<.. +..8 0680: 14 45 62 0C 65 5A 67 58 B6 DF 76 5E 02 52 F3 5D .Eb.eZgX..v^. +R.] 0690: 26 5E 5C BF &^\. main, READ: SSLv3 Handshake, length = 1684 *** Certificate chain chain [0] = [ [ Version: V3 Subject: CN=server.local, O=Whatever it is, L=Muenchen, ST=Bayern, C +=DE Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5 Key: Sun RSA public key, 1024 bits modulus: 11207177786001184232525249755014335729975411004690399427664 +500433225572552876496243268174679539171018265751766059535710690926924 +256227835602738041290894550998638382241677567966601063784528885875387 +095691785853939768868976474481124073124672513207523775952487943165369 +6157838709989612510301457310093145710190491 public exponent: 65537 Validity: [From: Mon Dec 31 19:00:01 EST 2007, To: Sat Mar 30 03:05:44 EDT 2019] Issuer: CN=IO::Socket::SSL Demo CA, O=Whatever it is, L=Muenchen, ST +=Bayern, C=DE SerialNumber: [ d6d7e1b4 b33091f0] Certificate Extensions: 5 [1]: ObjectId: 2.16.840.1.113730.1.13 Criticality=false Extension unknown: DER encoded OCTET string = 0000: 04 1F 16 1D 4F 70 65 6E 53 53 4C 20 47 65 6E 65 ....OpenSSL G +ene 0010: 72 61 74 65 64 20 43 65 72 74 69 66 69 63 61 74 rated Certifi +cat 0020: 65 e [2]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: BC 81 38 7B 62 C9 DD A9 BA 5E 9C 44 AA AE 71 39 ..8.b....^.D. +.q9 0010: 7A 81 C9 E8 z... ] ] [3]: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: DE 65 01 16 19 2E 51 E0 9A 51 1A 37 50 94 7D 39 .e....Q..Q.7P +..9 0010: 29 2A 42 2C )*B, ] [CN=IO::Socket::SSL Demo CA, O=Whatever it is, L=Muenchen, ST=Bayern, +C=DE] SerialNumber: [ e7ad8b07 558a1727] ] [4]: ObjectId: 2.5.29.15 Criticality=false KeyUsage [ DigitalSignature Non_repudiation Key_Encipherment ] [5]: ObjectId: 2.5.29.19 Criticality=false BasicConstraints:[ CA:false PathLen: undefined ] ] Algorithm: [SHA1withRSA] Signature: 0000: 22 AC B3 A0 67 EB C2 40 36 9A 56 71 20 FC 2E 4B "...g..@6.Vq +..K 0010: 3D DB B1 83 F3 96 5A 33 9B DB 33 DE 52 DC 9C 80 =.....Z3..3.R +... 0020: 36 78 9B E3 90 EA 63 CC 0C AC 0F BD 01 20 26 8F 6x....c...... + &. 0030: 47 27 83 23 A9 90 B6 AE 5C D8 3C 20 27 CA 04 B4 G'.#....\.< ' +... 0040: 5E 9B 85 FC 34 AF 5E 91 60 3B D2 DF B7 06 AE E3 ^...4.^.`;... +... 0050: 01 09 1F 89 AF 0A 18 0A 3F EF 43 D6 3D 6E 16 74 ........?.C.= +n.t 0060: 32 B3 06 F0 8A F4 80 61 F7 F1 83 85 E8 2C 1D B8 2......a..... +,.. 0070: 83 F6 81 87 B3 CD 2B 0B 88 1A F9 3F 15 77 3B CC ......+....?. +w;. ] chain [1] = [ [ Version: V3 Subject: CN=IO::Socket::SSL Demo CA, O=Whatever it is, L=Muenchen, S +T=Bayern, C=DE Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5 Key: Sun RSA public key, 1024 bits modulus: 15257159469254734308605905437420154902370338636776689863870 +663684836353498341581216010621771266324993052300007689157888863713802 +544792112723030586571377860671319865028514787213261898203433195971872 +648959191392436941919496597058474872717005980481540376546516527115877 +8643145012252967470977048399991142136412481 public exponent: 65537 Validity: [From: Wed Apr 01 02:44:48 EDT 2009, To: Sat Mar 30 02:44:48 EDT 2019] Issuer: CN=IO::Socket::SSL Demo CA, O=Whatever it is, L=Muenchen, ST +=Bayern, C=DE SerialNumber: [ e7ad8b07 558a1727] Certificate Extensions: 3 [1]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: DE 65 01 16 19 2E 51 E0 9A 51 1A 37 50 94 7D 39 .e....Q..Q.7P +..9 0010: 29 2A 42 2C )*B, ] ] [2]: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: DE 65 01 16 19 2E 51 E0 9A 51 1A 37 50 94 7D 39 .e....Q..Q.7P +..9 0010: 29 2A 42 2C )*B, ] [CN=IO::Socket::SSL Demo CA, O=Whatever it is, L=Muenchen, ST=Bayern, +C=DE] SerialNumber: [ e7ad8b07 558a1727] ] [3]: ObjectId: 2.5.29.19 Criticality=false BasicConstraints:[ CA:true PathLen:2147483647 ] ] Algorithm: [SHA1withRSA] Signature: 0000: 66 EF 04 5D E3 C2 12 15 74 2D E0 B4 CC 15 C1 31 f..]....t-... +..1 0010: 49 6A BB BA 74 7F 34 01 C8 BF 54 E9 2B 8E 9B 09 Ij..t.4...T.+ +... 0020: 0A 8A 1F F0 39 CB 23 C5 7E 8F 16 32 66 DC 2E 7F ....9.#....2f +... 0030: 34 9F 66 53 0F 16 AD B6 C1 4C A7 0C 83 BB 76 3E 4.fS.....L... +.v> 0040: FB B2 22 E2 8A FB 02 B7 35 FE 57 65 A1 A7 CF 0B ..".....5.We. +... 0050: 67 D5 A1 73 33 42 D4 86 D5 7C CF A3 9C 51 10 C4 g..s3B....... +Q.. 0060: 7E 74 01 B2 02 C2 3C E0 DC F4 C8 38 14 45 62 0C .t....<....8. +Eb. 0070: 65 5A 67 58 B6 DF 76 5E 02 52 F3 5D 26 5E 5C BF eZgX..v^.R.]& +^\. ] *** Found trusted certificate: [ [ Version: V3 Subject: CN=server.local, O=Whatever it is, L=Muenchen, ST=Bayern, C +=DE Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5 Key: Sun RSA public key, 1024 bits modulus: 11207177786001184232525249755014335729975411004690399427664 +500433225572552876496243268174679539171018265751766059535710690926924 +256227835602738041290894550998638382241677567966601063784528885875387 +095691785853939768868976474481124073124672513207523775952487943165369 +6157838709989612510301457310093145710190491 public exponent: 65537 Validity: [From: Mon Dec 31 19:00:01 EST 2007, To: Sat Mar 30 03:05:44 EDT 2019] Issuer: CN=IO::Socket::SSL Demo CA, O=Whatever it is, L=Muenchen, ST +=Bayern, C=DE SerialNumber: [ d6d7e1b4 b33091f0] Certificate Extensions: 5 [1]: ObjectId: 2.16.840.1.113730.1.13 Criticality=false Extension unknown: DER encoded OCTET string = 0000: 04 1F 16 1D 4F 70 65 6E 53 53 4C 20 47 65 6E 65 ....OpenSSL G +ene 0010: 72 61 74 65 64 20 43 65 72 74 69 66 69 63 61 74 rated Certifi +cat 0020: 65 e [2]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: BC 81 38 7B 62 C9 DD A9 BA 5E 9C 44 AA AE 71 39 ..8.b....^.D. +.q9 0010: 7A 81 C9 E8 z... ] ] [3]: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: DE 65 01 16 19 2E 51 E0 9A 51 1A 37 50 94 7D 39 .e....Q..Q.7P +..9 0010: 29 2A 42 2C )*B, ] [CN=IO::Socket::SSL Demo CA, O=Whatever it is, L=Muenchen, ST=Bayern, +C=DE] SerialNumber: [ e7ad8b07 558a1727] ] [4]: ObjectId: 2.5.29.15 Criticality=false KeyUsage [ DigitalSignature Non_repudiation Key_Encipherment ] [5]: ObjectId: 2.5.29.19 Criticality=false BasicConstraints:[ CA:false PathLen: undefined ] ] Algorithm: [SHA1withRSA] Signature: 0000: 22 AC B3 A0 67 EB C2 40 36 9A 56 71 20 FC 2E 4B "...g..@6.Vq +..K 0010: 3D DB B1 83 F3 96 5A 33 9B DB 33 DE 52 DC 9C 80 =.....Z3..3.R +... 0020: 36 78 9B E3 90 EA 63 CC 0C AC 0F BD 01 20 26 8F 6x....c...... + &. 0030: 47 27 83 23 A9 90 B6 AE 5C D8 3C 20 27 CA 04 B4 G'.#....\.< ' +... 0040: 5E 9B 85 FC 34 AF 5E 91 60 3B D2 DF B7 06 AE E3 ^...4.^.`;... +... 0050: 01 09 1F 89 AF 0A 18 0A 3F EF 43 D6 3D 6E 16 74 ........?.C.= +n.t 0060: 32 B3 06 F0 8A F4 80 61 F7 F1 83 85 E8 2C 1D B8 2......a..... +,.. 0070: 83 F6 81 87 B3 CD 2B 0B 88 1A F9 3F 15 77 3B CC ......+....?. +w;. ] [read] MD5 and SHA1 hashes: len = 1684 0000: 0B 00 06 90 00 06 8D 00 03 5B 30 82 03 57 30 82 .........[0.. +W0. 0010: 02 C0 A0 03 02 01 02 02 09 00 D6 D7 E1 B4 B3 30 ............. +..0 0020: 91 F0 30 0D 06 09 2A 86 48 86 F7 0D 01 01 05 05 ..0...*.H.... +... 0030: 00 30 6C 31 0B 30 09 06 03 55 04 06 13 02 44 45 .0l1.0...U... +.DE 0040: 31 0F 30 0D 06 03 55 04 08 13 06 42 61 79 65 72 1.0...U....Ba +yer 0050: 6E 31 11 30 0F 06 03 55 04 07 13 08 4D 75 65 6E n1.0...U....M +uen 0060: 63 68 65 6E 31 17 30 15 06 03 55 04 0A 13 0E 57 chen1.0...U.. +..W 0070: 68 61 74 65 76 65 72 20 69 74 20 69 73 31 20 30 hatever it is +1 0 0080: 1E 06 03 55 04 03 13 17 49 4F 3A 3A 53 6F 63 6B ...U....IO::S +ock 0090: 65 74 3A 3A 53 53 4C 20 44 65 6D 6F 20 43 41 30 et::SSL Demo +CA0 00A0: 1E 17 0D 30 38 30 31 30 31 30 30 30 30 30 31 5A ...0801010000 +01Z 00B0: 17 0D 31 39 30 33 33 30 30 37 30 35 34 34 5A 30 ..19033007054 +4Z0 00C0: 61 31 0B 30 09 06 03 55 04 06 13 02 44 45 31 0F a1.0...U....D +E1. 00D0: 30 0D 06 03 55 04 08 13 06 42 61 79 65 72 6E 31 0...U....Baye +rn1 00E0: 11 30 0F 06 03 55 04 07 13 08 4D 75 65 6E 63 68 .0...U....Mue +nch 00F0: 65 6E 31 17 30 15 06 03 55 04 0A 13 0E 57 68 61 en1.0...U.... +Wha 0100: 74 65 76 65 72 20 69 74 20 69 73 31 15 30 13 06 tever it is1. +0.. 0110: 03 55 04 03 13 0C 73 65 72 76 65 72 2E 6C 6F 63 .U....server. +loc 0120: 61 6C 30 81 9F 30 0D 06 09 2A 86 48 86 F7 0D 01 al0..0...*.H. +... 0130: 01 01 05 00 03 81 8D 00 30 81 89 02 81 81 00 9F ........0.... +... 0140: 98 73 4B 34 AA 4F C2 5A 3C 3D BA F0 54 55 E6 D5 .sK4.O.Z<=..T +U.. 0150: 8A A0 8F E4 94 5A 72 47 34 9A 61 50 CC D0 81 8D .....ZrG4.aP. +... 0160: 37 C4 8E 0C 79 B4 E4 D9 0D 71 06 3D 07 4D 2A FF 7...y....q.=. +M*. 0170: B5 6A EF DB 36 F0 BE ED B2 B0 2E 18 AF F3 35 92 .j..6........ +.5. 0180: 71 15 84 F5 2A CB 18 BD 7E DB 26 18 C1 4E 31 2A q...*.....&.. +N1* 0190: 01 B8 1B C9 A9 DF 6C 62 74 20 49 4D 51 14 93 F4 ......lbt IMQ +... 01A0: D6 18 07 F3 3D D9 F7 DC 10 33 E4 00 A2 6C 62 B0 ....=....3... +lb. 01B0: 59 7E 5F F9 8E B6 A5 AF AD F6 FB E6 FA DF 9B 02 Y._.......... +... 01C0: 03 01 00 01 A3 82 01 0A 30 82 01 06 30 09 06 03 ........0...0 +... 01D0: 55 1D 13 04 02 30 00 30 2C 06 09 60 86 48 01 86 U....0.0,..`. +H.. 01E0: F8 42 01 0D 04 1F 16 1D 4F 70 65 6E 53 53 4C 20 .B......OpenS +SL 01F0: 47 65 6E 65 72 61 74 65 64 20 43 65 72 74 69 66 Generated Cer +tif 0200: 69 63 61 74 65 30 1D 06 03 55 1D 0E 04 16 04 14 icate0...U... +... 0210: BC 81 38 7B 62 C9 DD A9 BA 5E 9C 44 AA AE 71 39 ..8.b....^.D. +.q9 0220: 7A 81 C9 E8 30 81 9E 06 03 55 1D 23 04 81 96 30 z...0....U.#. +..0 0230: 81 93 80 14 DE 65 01 16 19 2E 51 E0 9A 51 1A 37 .....e....Q.. +Q.7 0240: 50 94 7D 39 29 2A 42 2C A1 70 A4 6E 30 6C 31 0B P..9)*B,.p.n0 +l1. 0250: 30 09 06 03 55 04 06 13 02 44 45 31 0F 30 0D 06 0...U....DE1. +0.. 0260: 03 55 04 08 13 06 42 61 79 65 72 6E 31 11 30 0F .U....Bayern1 +.0. 0270: 06 03 55 04 07 13 08 4D 75 65 6E 63 68 65 6E 31 ..U....Muench +en1 0280: 17 30 15 06 03 55 04 0A 13 0E 57 68 61 74 65 76 .0...U....Wha +tev 0290: 65 72 20 69 74 20 69 73 31 20 30 1E 06 03 55 04 er it is1 0.. +.U. 02A0: 03 13 17 49 4F 3A 3A 53 6F 63 6B 65 74 3A 3A 53 ...IO::Socket +::S 02B0: 53 4C 20 44 65 6D 6F 20 43 41 82 09 00 E7 AD 8B SL Demo CA... +... 02C0: 07 55 8A 17 27 30 0B 06 03 55 1D 0F 04 04 03 02 .U..'0...U... +... 02D0: 05 E0 30 0D 06 09 2A 86 48 86 F7 0D 01 01 05 05 ..0...*.H.... +... 02E0: 00 03 81 81 00 22 AC B3 A0 67 EB C2 40 36 9A 56 ....."...g..@ +6.V 02F0: 71 20 FC 2E 4B 3D DB B1 83 F3 96 5A 33 9B DB 33 q ..K=.....Z3 +..3 0300: DE 52 DC 9C 80 36 78 9B E3 90 EA 63 CC 0C AC 0F .R...6x....c. +... 0310: BD 01 20 26 8F 47 27 83 23 A9 90 B6 AE 5C D8 3C .. &.G'.#.... +\.< 0320: 20 27 CA 04 B4 5E 9B 85 FC 34 AF 5E 91 60 3B D2 '...^...4.^. +`;. 0330: DF B7 06 AE E3 01 09 1F 89 AF 0A 18 0A 3F EF 43 ............. +?.C 0340: D6 3D 6E 16 74 32 B3 06 F0 8A F4 80 61 F7 F1 83 .=n.t2......a +... 0350: 85 E8 2C 1D B8 83 F6 81 87 B3 CD 2B 0B 88 1A F9 ..,........+. +... 0360: 3F 15 77 3B CC 00 03 2C 30 82 03 28 30 82 02 91 ?.w;...,0..(0 +... 0370: A0 03 02 01 02 02 09 00 E7 AD 8B 07 55 8A 17 27 ............U +..' 0380: 30 0D 06 09 2A 86 48 86 F7 0D 01 01 05 05 00 30 0...*.H...... +..0 0390: 6C 31 0B 30 09 06 03 55 04 06 13 02 44 45 31 0F l1.0...U....D +E1. 03A0: 30 0D 06 03 55 04 08 13 06 42 61 79 65 72 6E 31 0...U....Baye +rn1 03B0: 11 30 0F 06 03 55 04 07 13 08 4D 75 65 6E 63 68 .0...U....Mue +nch 03C0: 65 6E 31 17 30 15 06 03 55 04 0A 13 0E 57 68 61 en1.0...U.... +Wha 03D0: 74 65 76 65 72 20 69 74 20 69 73 31 20 30 1E 06 tever it is1 +0.. 03E0: 03 55 04 03 13 17 49 4F 3A 3A 53 6F 63 6B 65 74 .U....IO::Soc +ket 03F0: 3A 3A 53 53 4C 20 44 65 6D 6F 20 43 41 30 1E 17 ::SSL Demo CA +0.. 0400: 0D 30 39 30 34 30 31 30 36 34 34 34 38 5A 17 0D .090401064448 +Z.. 0410: 31 39 30 33 33 30 30 36 34 34 34 38 5A 30 6C 31 190330064448Z +0l1 0420: 0B 30 09 06 03 55 04 06 13 02 44 45 31 0F 30 0D .0...U....DE1 +.0. 0430: 06 03 55 04 08 13 06 42 61 79 65 72 6E 31 11 30 ..U....Bayern +1.0 0440: 0F 06 03 55 04 07 13 08 4D 75 65 6E 63 68 65 6E ...U....Muenc +hen 0450: 31 17 30 15 06 03 55 04 0A 13 0E 57 68 61 74 65 1.0...U....Wh +ate 0460: 76 65 72 20 69 74 20 69 73 31 20 30 1E 06 03 55 ver it is1 0. +..U 0470: 04 03 13 17 49 4F 3A 3A 53 6F 63 6B 65 74 3A 3A ....IO::Socke +t:: 0480: 53 53 4C 20 44 65 6D 6F 20 43 41 30 81 9F 30 0D SSL Demo CA0. +.0. 0490: 06 09 2A 86 48 86 F7 0D 01 01 01 05 00 03 81 8D ..*.H........ +... 04A0: 00 30 81 89 02 81 81 00 D9 44 E7 DA B7 29 5C C5 .0.......D... +)\. 04B0: C6 EB C7 47 53 5E F8 28 CE 5A 85 C2 9B 3B 82 18 ...GS^.(.Z... +;.. 04C0: 32 C7 E4 2F 83 0A EF EF 6C 3C 74 F2 29 30 39 35 2../....l<t.) +095 04D0: CD 37 90 3C D4 B2 F2 74 C2 60 8B 04 AF 5B 46 0B .7.<...t.`... +[F. 04E0: E4 FF 75 8B 77 AD A6 26 DA 45 E4 DB 44 33 62 2B ..u.w..&.E..D +3b+ 04F0: 97 38 22 14 47 E2 58 F7 1B D4 76 77 9E F5 9D 6F .8".G.X...vw. +..o 0500: 24 3E 6E EC 37 E4 86 70 2C 08 98 64 C5 56 7B C6 $>n.7..p,..d. +V.. 0510: 84 85 E1 97 A2 F3 5D AF 8B E6 7E 78 F4 7E FC 5E ......]....x. +..^ 0520: EE 4C 9C 9E 05 B7 F9 41 02 03 01 00 01 A3 81 D1 .L.....A..... +... 0530: 30 81 CE 30 1D 06 03 55 1D 0E 04 16 04 14 DE 65 0..0...U..... +..e 0540: 01 16 19 2E 51 E0 9A 51 1A 37 50 94 7D 39 29 2A ....Q..Q.7P.. +9)* 0550: 42 2C 30 81 9E 06 03 55 1D 23 04 81 96 30 81 93 B,0....U.#... +0.. 0560: 80 14 DE 65 01 16 19 2E 51 E0 9A 51 1A 37 50 94 ...e....Q..Q. +7P. 0570: 7D 39 29 2A 42 2C A1 70 A4 6E 30 6C 31 0B 30 09 .9)*B,.p.n0l1 +.0. 0580: 06 03 55 04 06 13 02 44 45 31 0F 30 0D 06 03 55 ..U....DE1.0. +..U 0590: 04 08 13 06 42 61 79 65 72 6E 31 11 30 0F 06 03 ....Bayern1.0 +... 05A0: 55 04 07 13 08 4D 75 65 6E 63 68 65 6E 31 17 30 U....Muenchen +1.0 05B0: 15 06 03 55 04 0A 13 0E 57 68 61 74 65 76 65 72 ...U....Whate +ver 05C0: 20 69 74 20 69 73 31 20 30 1E 06 03 55 04 03 13 it is1 0...U +... 05D0: 17 49 4F 3A 3A 53 6F 63 6B 65 74 3A 3A 53 53 4C .IO::Socket:: +SSL 05E0: 20 44 65 6D 6F 20 43 41 82 09 00 E7 AD 8B 07 55 Demo CA..... +..U 05F0: 8A 17 27 30 0C 06 03 55 1D 13 04 05 30 03 01 01 ..'0...U....0 +... 0600: FF 30 0D 06 09 2A 86 48 86 F7 0D 01 01 05 05 00 .0...*.H..... +... 0610: 03 81 81 00 66 EF 04 5D E3 C2 12 15 74 2D E0 B4 ....f..]....t +-.. 0620: CC 15 C1 31 49 6A BB BA 74 7F 34 01 C8 BF 54 E9 ...1Ij..t.4.. +.T. 0630: 2B 8E 9B 09 0A 8A 1F F0 39 CB 23 C5 7E 8F 16 32 +.......9.#.. +..2 0640: 66 DC 2E 7F 34 9F 66 53 0F 16 AD B6 C1 4C A7 0C f...4.fS..... +L.. 0650: 83 BB 76 3E FB B2 22 E2 8A FB 02 B7 35 FE 57 65 ..v>..".....5 +.We 0660: A1 A7 CF 0B 67 D5 A1 73 33 42 D4 86 D5 7C CF A3 ....g..s3B... +... 0670: 9C 51 10 C4 7E 74 01 B2 02 C2 3C E0 DC F4 C8 38 .Q...t....<.. +..8 0680: 14 45 62 0C 65 5A 67 58 B6 DF 76 5E 02 52 F3 5D .Eb.eZgX..v^. +R.] 0690: 26 5E 5C BF &^\. [Raw read]: length = 5 0000: 16 03 00 00 0D ..... [Raw read]: length = 13 0000: 0D 00 00 05 02 01 02 00 00 0E 00 00 00 ............. main, READ: SSLv3 Handshake, length = 13 *** CertificateRequest Cert Types: RSA, DSS Cert Authorities: <Empty> [read] MD5 and SHA1 hashes: len = 9 0000: 0D 00 00 05 02 01 02 00 00 ......... *** ServerHelloDone [read] MD5 and SHA1 hashes: len = 4 0000: 0E 00 00 00 .... main, SEND SSLv3 ALERT: warning, description = no_certificate main, WRITE: SSLv3 Alert, length = 2 [Raw write]: length = 7 0000: 15 03 00 00 02 01 29 ......) *** ClientKeyExchange, RSA PreMasterSecret, SSLv3 [write] MD5 and SHA1 hashes: len = 132 0000: 10 00 00 80 90 4A C8 5C B1 62 A3 60 CE 29 F8 B9 .....J.\.b.`. +).. 0010: C8 CD CF D5 A5 CE EE 41 64 C8 CA 5C 4D DF 51 C1 .......Ad..\M +.Q. 0020: B9 F6 0E 61 5B 7D 2A DA 06 75 81 FD 2D A9 6B E3 ...a[.*..u..- +.k. 0030: 88 31 47 35 5E 7D 7C 89 1C 39 6A 23 B8 40 77 10 .1G5^....9j#. +@w. 0040: F3 7F F9 05 C7 D1 E2 0E 74 0E D4 71 10 F0 5B BA ........t..q. +.[. 0050: 15 24 8A C6 B6 1A FE 96 A6 2A 2C EB A6 F2 9B 99 .$.......*,.. +... 0060: E8 2F A8 07 C6 B7 6E 95 C6 96 71 44 DB 46 B5 0D ./....n...qD. +F.. 0070: 3C 18 3B 0D 2F B1 88 50 E1 F8 FC A9 C9 C4 9D 49 <.;./..P..... +..I 0080: A4 C3 16 77 ...w main, WRITE: SSLv3 Handshake, length = 132 [Raw write]: length = 137 0000: 16 03 00 00 84 10 00 00 80 90 4A C8 5C B1 62 A3 ..........J.\ +.b. 0010: 60 CE 29 F8 B9 C8 CD CF D5 A5 CE EE 41 64 C8 CA `.).........A +d.. 0020: 5C 4D DF 51 C1 B9 F6 0E 61 5B 7D 2A DA 06 75 81 \M.Q....a[.*. +.u. 0030: FD 2D A9 6B E3 88 31 47 35 5E 7D 7C 89 1C 39 6A .-.k..1G5^... +.9j 0040: 23 B8 40 77 10 F3 7F F9 05 C7 D1 E2 0E 74 0E D4 #.@w......... +t.. 0050: 71 10 F0 5B BA 15 24 8A C6 B6 1A FE 96 A6 2A 2C q..[..$...... +.*, 0060: EB A6 F2 9B 99 E8 2F A8 07 C6 B7 6E 95 C6 96 71 ....../....n. +..q 0070: 44 DB 46 B5 0D 3C 18 3B 0D 2F B1 88 50 E1 F8 FC D.F..<.;./..P +... 0080: A9 C9 C4 9D 49 A4 C3 16 77 ....I...w SESSION KEYGEN: PreMaster Secret: 0000: 03 00 F9 B2 67 67 8A 93 E0 E2 D9 FA 50 41 F6 FE ....gg......P +A.. 0010: 9D E9 1B 31 BD AF 2A A7 60 D2 FB BA 9A CB 69 C8 ...1..*.`.... +.i. 0020: 0B F2 0C 64 A6 9A 2B 59 9A A0 27 90 92 64 57 61 ...d..+Y..'.. +dWa CONNECTION KEYGEN: Client Nonce: 0000: 53 E6 E6 B4 99 6A 8E 66 94 40 E1 18 18 88 4F 86 S....j.f.@... +.O. 0010: 8F 73 DC 2A 48 94 16 90 70 97 25 D8 EC BB 2F 85 .s.*H...p.%.. +./. Server Nonce: 0000: 53 E6 E6 B4 CA 62 83 80 4E 0B 57 06 AB C1 1C 72 S....b..N.W.. +..r 0010: 25 9C F7 ED 80 D1 7E 44 52 76 DA 49 4E 80 FD 2D %......DRv.IN +..- Master Secret: 0000: 85 74 AF 85 F7 9D 82 68 A5 B9 D6 8C 69 81 69 C6 .t.....h....i +.i. 0010: 65 D2 98 77 8F 71 2C F6 AE B4 10 85 9E 5A EB 64 e..w.q,...... +Z.d 0020: A9 B6 E1 66 E3 4D 98 70 63 34 64 68 03 DB 64 09 ...f.M.pc4dh. +.d. Client MAC write Secret: 0000: 75 04 33 4D 25 A5 5B E9 1F EC 10 76 73 D5 AA EC u.3M%.[....vs +... 0010: 1B 8E 57 9B ..W. Server MAC write Secret: 0000: 92 7A D2 DA FC 18 4A 7C 10 47 15 B2 F5 58 29 9A .z....J..G... +X). 0010: 1B C3 0B AD .... Client write key: 0000: B3 CD BF 54 67 F9 5A 5B 7F 4D 24 15 8E EA 4A 9A ...Tg.Z[.M$.. +.J. Server write key: 0000: FC FC 5F 48 BB EB 81 22 D3 45 DB 6A 45 F0 66 2E .._H...".E.jE +.f. Client write IV: 0000: 39 7C 39 15 41 11 56 2A 4B 1F 1A 33 D1 01 F8 23 9.9.A.V*K..3. +..# Server write IV: 0000: 89 FC 7F A8 DC AB D0 F4 13 1A C1 A7 AC CB 47 A4 ............. +.G. main, WRITE: SSLv3 Change Cipher Spec, length = 1 [Raw write]: length = 6 0000: 14 03 00 00 01 01 ...... *** Finished verify_data: { 51, 226, 159, 244, 42, 209, 52, 48, 240, 86, 218, 151, + 130, 149, 88, 185, 206, 77, 168, 238, 206, 3, 211, 245, 155, 28, 159 +, 105, 22, 14, 73, 78, 84, 1, 136, 35 } *** [write] MD5 and SHA1 hashes: len = 40 0000: 14 00 00 24 33 E2 9F F4 2A D1 34 30 F0 56 DA 97 ...$3...*.40. +V.. 0010: 82 95 58 B9 CE 4D A8 EE CE 03 D3 F5 9B 1C 9F 69 ..X..M....... +..i 0020: 16 0E 49 4E 54 01 88 23 ..INT..# Padded plaintext before ENCRYPTION: len = 64 0000: 14 00 00 24 33 E2 9F F4 2A D1 34 30 F0 56 DA 97 ...$3...*.40. +V.. 0010: 82 95 58 B9 CE 4D A8 EE CE 03 D3 F5 9B 1C 9F 69 ..X..M....... +..i 0020: 16 0E 49 4E 54 01 88 23 45 89 BA 2E 68 8F 20 33 ..INT..#E...h +. 3 0030: 2A 53 58 AC A2 78 56 E0 21 D7 54 7D 03 03 03 03 *SX..xV.!.T.. +... main, WRITE: SSLv3 Handshake, length = 64 [Raw write]: length = 69 0000: 16 03 00 00 40 39 98 46 50 71 F6 7C EF A7 9E 1A ....@9.FPq... +... 0010: 87 3D 48 28 45 53 A1 40 B0 4F E9 90 5E 12 A2 59 .=H(ES.@.O..^ +..Y 0020: DA 7C 37 8F DE F0 34 06 9E 1E 45 C6 3F 95 7F 60 ..7...4...E.? +..` 0030: 34 22 84 99 C0 FF 65 5F 58 B4 6A 54 DE 05 28 43 4"....e_X.jT. +.(C 0040: 31 48 39 FE A8 1H9.. [Raw read]: length = 5 0000: 14 03 00 00 01 ..... [Raw read]: length = 1 0000: 01 . main, READ: SSLv3 Change Cipher Spec, length = 1 [Raw read]: length = 5 0000: 16 03 00 00 40 ....@ [Raw read]: length = 64 0000: BA B1 9D AA 13 9E 5F B3 21 07 05 2F F1 A8 28 57 ......_.!../. +.(W 0010: 21 86 01 DE 1C 49 EB 29 D3 AB BC 5C 54 47 17 55 !....I.)...\T +G.U 0020: 86 71 AE B7 4C CC 7B DC 4A 27 31 04 A0 90 89 9D .q..L...J'1.. +... 0030: C6 C2 42 B7 D8 58 11 D4 CF FD 6E AE E0 3F DC 9C ..B..X....n.. +?.. main, READ: SSLv3 Handshake, length = 64 Padded plaintext after DECRYPTION: len = 64 0000: 14 00 00 24 56 01 0C 47 AF BD 50 D2 CF 19 3E 7B ...$V..G..P.. +.>. 0010: 5B C4 D1 1A 17 DB 22 00 20 CF 77 4D 02 32 94 C4 [.....". .wM. +2.. 0020: 5D 2E 21 A9 00 1C 70 9B 60 4A 77 8D 32 60 C5 77 ].!...p.`Jw.2 +`.w 0030: 0A 3C 3F 4A 92 CC A5 79 A5 5E 4A A0 13 02 44 03 .<?J...y.^J.. +.D. *** Finished verify_data: { 86, 1, 12, 71, 175, 189, 80, 210, 207, 25, 62, 123, 91 +, 196, 209, 26, 23, 219, 34, 0, 32, 207, 119, 77, 2, 50, 148, 196, 93 +, 46, 33, 169, 0, 28, 112, 155 } *** %% Cached client session: [Session-1, TLS_RSA_WITH_AES_128_CBC_SHA] [read] MD5 and SHA1 hashes: len = 40 0000: 14 00 00 24 56 01 0C 47 AF BD 50 D2 CF 19 3E 7B ...$V..G..P.. +.>. 0010: 5B C4 D1 1A 17 DB 22 00 20 CF 77 4D 02 32 94 C4 [.....". .wM. +2.. 0020: 5D 2E 21 A9 00 1C 70 9B ].!...p. Cipher suite = TLS_RSA_WITH_AES_128_CBC_SHA Protocol = SSLv3 Allow unsafe renegotiation: false Allow legacy hello messages: true Is initial handshake: false Is secure renegotiation: true Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SH +A256 for SSLv3 Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA2 +56 for SSLv3 Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 for + SSLv3 Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA +256 for SSLv3 Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA25 +6 for SSLv3 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 + for SSLv3 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 + for SSLv3 Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SH +A256 Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA2 +56 Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA +256 Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA25 +6 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 %% Client cached [Session-1, TLS_RSA_WITH_AES_128_CBC_SHA] %% Try resuming [Session-1, TLS_RSA_WITH_AES_128_CBC_SHA] from port 53 +870 *** ClientHello, SSLv3 RandomCookie: GMT: 1390798260 bytes = { 232, 207, 241, 82, 195, 68, 2 +25, 204, 168, 188, 105, 104, 211, 140, 209, 81, 237, 40, 56, 52, 71, +183, 126, 173, 58, 63, 71, 47 } Session ID: {195, 70, 72, 154, 202, 2, 24, 2, 47, 236, 232, 229, 9, 2 +14, 78, 122, 38, 131, 234, 102, 216, 131, 150, 147, 193, 69, 98, 72, +241, 104, 23, 59} Cipher Suites: [TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WI +TH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_ECDH_ECDSA_WITH +_AES_128_CBC_SHA, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH +_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, TLS_ECDHE_ECDSA_W +ITH_RC4_128_SHA, TLS_ECDHE_RSA_WITH_RC4_128_SHA, SSL_RSA_WITH_RC4_128 +_SHA, TLS_ECDH_ECDSA_WITH_RC4_128_SHA, TLS_ECDH_RSA_WITH_RC4_128_SHA, + TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDHE_RSA_WITH_3DES_EDE_C +BC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_ECDSA_WITH_3DES_EDE_C +BC_SHA, TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE +_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_RC4_128_MD5 +] Compression Methods: { 0 } Extension elliptic_curves, curve names: {secp256r1, sect163k1, sect163 +r2, secp192r1, secp224r1, sect233k1, sect233r1, sect283k1, sect283r1, + secp384r1, sect409k1, sect409r1, secp521r1, sect571k1, sect571r1, se +cp160k1, secp160r1, secp160r2, sect163r1, secp192k1, sect193r1, sect1 +93r2, secp224k1, sect239k1, secp256k1} Extension ec_point_formats, formats: [uncompressed] Extension renegotiation_info, renegotiated_connection: 33:e2:9f:f4:2a: +d1:34:30:f0:56:da:97:82:95:58:b9:ce:4d:a8:ee:ce:03:d3:f5:9b:1c:9f:69: +16:0e:49:4e:54:01:88:23 *** [write] MD5 and SHA1 hashes: len = 220 0000: 01 00 00 D8 03 00 53 E6 E6 B4 E8 CF F1 52 C3 44 ......S...... +R.D 0010: E1 CC A8 BC 69 68 D3 8C D1 51 ED 28 38 34 47 B7 ....ih...Q.(8 +4G. 0020: 7E AD 3A 3F 47 2F 20 C3 46 48 9A CA 02 18 02 2F ..:?G/ .FH... +../ 0030: EC E8 E5 09 D6 4E 7A 26 83 EA 66 D8 83 96 93 C1 .....Nz&..f.. +... 0040: 45 62 48 F1 68 17 3B 00 28 C0 09 C0 13 00 2F C0 EbH.h.;.(.... +./. 0050: 04 C0 0E 00 33 00 32 C0 07 C0 11 00 05 C0 02 C0 ....3.2...... +... 0060: 0C C0 08 C0 12 00 0A C0 03 C0 0D 00 16 00 13 00 ............. +... 0070: 04 01 00 00 67 00 0A 00 34 00 32 00 17 00 01 00 ....g...4.2.. +... 0080: 03 00 13 00 15 00 06 00 07 00 09 00 0A 00 18 00 ............. +... 0090: 0B 00 0C 00 19 00 0D 00 0E 00 0F 00 10 00 11 00 ............. +... 00A0: 02 00 12 00 04 00 05 00 14 00 08 00 16 00 0B 00 ............. +... 00B0: 02 01 00 FF 01 00 25 24 33 E2 9F F4 2A D1 34 30 ......%$3...* +.40 00C0: F0 56 DA 97 82 95 58 B9 CE 4D A8 EE CE 03 D3 F5 .V....X..M... +... 00D0: 9B 1C 9F 69 16 0E 49 4E 54 01 88 23 ...i..INT..# Padded plaintext before ENCRYPTION: len = 256 0000: 01 00 00 D8 03 00 53 E6 E6 B4 E8 CF F1 52 C3 44 ......S...... +R.D 0010: E1 CC A8 BC 69 68 D3 8C D1 51 ED 28 38 34 47 B7 ....ih...Q.(8 +4G. 0020: 7E AD 3A 3F 47 2F 20 C3 46 48 9A CA 02 18 02 2F ..:?G/ .FH... +../ 0030: EC E8 E5 09 D6 4E 7A 26 83 EA 66 D8 83 96 93 C1 .....Nz&..f.. +... 0040: 45 62 48 F1 68 17 3B 00 28 C0 09 C0 13 00 2F C0 EbH.h.;.(.... +./. 0050: 04 C0 0E 00 33 00 32 C0 07 C0 11 00 05 C0 02 C0 ....3.2...... +... 0060: 0C C0 08 C0 12 00 0A C0 03 C0 0D 00 16 00 13 00 ............. +... 0070: 04 01 00 00 67 00 0A 00 34 00 32 00 17 00 01 00 ....g...4.2.. +... 0080: 03 00 13 00 15 00 06 00 07 00 09 00 0A 00 18 00 ............. +... 0090: 0B 00 0C 00 19 00 0D 00 0E 00 0F 00 10 00 11 00 ............. +... 00A0: 02 00 12 00 04 00 05 00 14 00 08 00 16 00 0B 00 ............. +... 00B0: 02 01 00 FF 01 00 25 24 33 E2 9F F4 2A D1 34 30 ......%$3...* +.40 00C0: F0 56 DA 97 82 95 58 B9 CE 4D A8 EE CE 03 D3 F5 .V....X..M... +... 00D0: 9B 1C 9F 69 16 0E 49 4E 54 01 88 23 FB 12 48 6B ...i..INT..#. +.Hk 00E0: 3B 6D 6E 7C 80 61 F1 ED 7C E2 A6 C8 AC 21 54 F6 ;mn..a....... +!T. 00F0: 0F 0F 0F 0F 0F 0F 0F 0F 0F 0F 0F 0F 0F 0F 0F 0F ............. +... main, WRITE: SSLv3 Handshake, length = 256 [Raw write]: length = 261 0000: 16 03 00 01 00 07 1F F4 EC 7B 91 FD 8A 6A D0 8F ............. +j.. 0010: 18 CF 97 1C 81 43 25 5F 2C 7F E3 19 B6 62 22 AD .....C%_,.... +b". 0020: 4D 55 D4 10 EB E9 63 18 F5 20 17 7B A9 F4 B7 39 MU....c.. ... +..9 0030: 3A C7 29 CB 64 AF C3 BD 66 C0 90 B4 B7 10 82 CC :.).d...f.... +... 0040: 08 F8 F7 7D F4 4C 54 13 EB 89 10 F3 6C 3A A8 7B .....LT.....l +:.. 0050: EF 35 34 E2 F0 B2 3F C1 93 4B 87 31 0E 6E FD E4 .54...?..K.1. +n.. 0060: CF 76 5B 0A CC 20 8F 92 4A A4 DA 26 9B 3B 35 54 .v[.. ..J..&. +;5T 0070: 3D E1 A3 82 7A 7C 8B E8 44 ED 78 04 33 97 2C 56 =...z...D.x.3 +.,V 0080: 60 79 AE F2 FD 05 D3 27 E4 6A 4D F0 B2 B2 2E E8 `y.....'.jM.. +... 0090: A2 8B 46 11 74 E0 25 F7 E2 47 BB 99 26 33 19 5A ..F.t.%..G..& +3.Z 00A0: 46 97 8D 03 34 FD 5D C8 2F 94 F3 F0 22 05 EF FB F...4.]./..." +... 00B0: E1 D1 91 4D 3B 18 15 7D B1 8E 10 71 11 09 24 67 ...M;......q. +.$g 00C0: BF EC E9 2A 76 BE 3C FC 1C F5 38 83 1E 9E DF 13 ...*v.<...8.. +... 00D0: AC 1E 3C C1 1D 62 CB 9B 51 B8 46 F0 A2 30 86 F8 ..<..b..Q.F.. +0.. 00E0: 86 50 45 15 A5 81 99 1D 1A 4E AA A7 8B 0E FB A4 .PE......N... +... 00F0: 00 57 AA 4D D0 F8 95 46 CD 2C 22 C2 FF 13 B6 FA .W.M...F.,".. +... 0100: 23 D0 6D 27 3B #.m'; Padded plaintext before ENCRYPTION: len = 48 0000: 4A 41 56 41 20 43 4C 49 45 4E 54 20 52 45 51 55 JAVA CLIENT R +EQU 0010: 45 53 54 0D 0A 99 48 2E 4A CF B8 EE 8B 8C F7 82 EST...H.J.... +... 0020: D5 EF ED 81 DA AA B5 59 73 06 06 06 06 06 06 06 .......Ys.... +... main, WRITE: SSLv3 Application Data, length = 48 [Raw write]: length = 53 0000: 17 03 00 00 30 3C 2A C1 3E DF 99 D5 CE DA DC 6B ....0<*.>.... +..k 0010: CD 7D 86 65 E9 62 15 7C 32 FE BE 25 D3 99 45 8B ...e.b..2..%. +.E. 0020: BF F4 DA C1 DC EE 6C A9 89 14 8F 95 C6 29 3F B4 ......l...... +)?. 0030: 8D 78 66 F3 2D .xf.- main, handling exception: java.net.SocketException: Connection reset %% Invalidated: [Session-1, TLS_RSA_WITH_AES_128_CBC_SHA] main, SEND SSLv3 ALERT: fatal, description = unexpected_message Padded plaintext before ENCRYPTION: len = 32 0000: 02 0A 3A D4 C7 C3 AA FB E2 EA CC E9 95 7E 3F D9 ..:.......... +.?. 0010: 9A 81 B5 84 DB C4 09 09 09 09 09 09 09 09 09 09 ............. +... main, WRITE: SSLv3 Alert, length = 32 main, Exception sending alert: java.net.SocketException: Connection re +set by peer: socket write error main, called closeSocket() Exception in thread "main" java.net.SocketException: Connection reset at java.net.SocketInputStream.read(SocketInputStream.java:189) at java.net.SocketInputStream.read(SocketInputStream.java:121) at sun.security.ssl.InputRecord.readFully(InputRecord.java:312) at sun.security.ssl.InputRecord.read(InputRecord.java:350) at sun.security.ssl.SSLSocketImpl.readRecord(SSLSocketImpl.java:85 +8) at sun.security.ssl.SSLSocketImpl.readDataRecord(SSLSocketImpl.jav +a:815) at sun.security.ssl.AppInputStream.read(AppInputStream.java:102) at sun.nio.cs.StreamDecoder.readBytes(StreamDecoder.java:283) at sun.nio.cs.StreamDecoder.implRead(StreamDecoder.java:325) at sun.nio.cs.StreamDecoder.read(StreamDecoder.java:177) at java.io.InputStreamReader.read(InputStreamReader.java:184) at java.io.BufferedReader.fill(BufferedReader.java:154) at java.io.BufferedReader.readLine(BufferedReader.java:317) at java.io.BufferedReader.readLine(BufferedReader.java:382) at SslSocketClient.main(SslSocketClient.java:19)

Replies are listed 'Best First'.
Re: Perl SSL Socket Server fails to receive from Java SSL Socket Client
by noxxi (Pilgrim) on Aug 11, 2014 at 17:52 UTC

    From your code I see, that you are using a fairly old version of IO::Socket::SSL (because it uses default certificates). I would recommend to use a newer version, which also comes with more documentation, including examples on how to write a SSL server.

    Also, it is not clear what you are trying to do. Your Perl SSL-Server requests a client certificate, which the client does not provide.Do you really want to use client certificates?

      Thanks for your response. I am actually using SSL v1.997 (the latest from cpan). The SSL Server code was based on an example file came with IO-Socket-1.997 package, so are you suggesting that I should not be using the default certificates (/certs dir), but with explicit configuration like this:
      SSL_cert_file => 'server-cert.pem', SSL_key_file => 'server-key.pem',
      I think the example code just prints out the client certificate if available for demo purpose. Yes, it doesn't do anything with the client certificate at all. What I am trying to do is, to have a SSL server that reads a text request, and then sends back a text response. It doesn't need to have client authentication (yet), I just try to get something basic working first.
        The example code was rotten and did not work any more. I've updated the code at https://github.com/noxxi/p5-io-socket-ssl and the updates will be included in the next release of IO::Socket::SSL.
Re: Perl SSL Socket Server fails to receive from Java SSL Socket Client
by Lotus1 (Vicar) on Aug 11, 2014 at 14:36 UTC

    Next time please use <readmore> ... </readmore> to hide the long file dumps and large chunks of code. People are more likely to read your question if they don't have to wade through such a long post.

    Markup in the Monastery