javax.net.ssl.SSLHandshakeException: Received fatal alert: handshake_failure
Question
I am getting a SSL handshake_failure exception when trying to access the freesound.org API. This only happens when I run my application packaged with Adoptium/Temurin 17, but not when I run from my desktop system (OpenJDK from Debian). I'm at loss here. I enabled the net debug, below is the output, perhaps it shines some light on what's going on here.
javax.net.ssl|DEBUG|E4|AsyncHttpClient-3-3|2024-08-06 12:26:15.680 CEST|SupportedGroupsExtension.java:365|Ignore inactive or disabled named group: ffdhe2048
javax.net.ssl|DEBUG|E4|AsyncHttpClient-3-3|2024-08-06 12:26:15.680 CEST|SupportedGroupsExtension.java:365|Ignore inactive or disabled named group: ffdhe3072
javax.net.ssl|DEBUG|E4|AsyncHttpClient-3-3|2024-08-06 12:26:15.680 CEST|SupportedGroupsExtension.java:365|Ignore inactive or disabled named group: ffdhe4096
javax.net.ssl|DEBUG|E4|AsyncHttpClient-3-3|2024-08-06 12:26:15.680 CEST|SupportedGroupsExtension.java:365|Ignore inactive or disabled named group: ffdhe6144
javax.net.ssl|DEBUG|E4|AsyncHttpClient-3-3|2024-08-06 12:26:15.680 CEST|SupportedGroupsExtension.java:365|Ignore inactive or disabled named group: ffdhe8192
javax.net.ssl|WARNING|E4|AsyncHttpClient-3-3|2024-08-06 12:26:15.680 CEST|SupportedGroupsExtension.java:372|no available named group
javax.net.ssl|DEBUG|E4|AsyncHttpClient-3-3|2024-08-06 12:26:15.680 CEST|SSLExtensions.java:272|Ignore, context unavailable extension: supported_groups
javax.net.ssl|DEBUG|E4|AsyncHttpClient-3-3|2024-08-06 12:26:15.680 CEST|ECPointFormatsExtension.java:197|Need no ec_point_formats extension
javax.net.ssl|DEBUG|E4|AsyncHttpClient-3-3|2024-08-06 12:26:15.680 CEST|SSLExtensions.java:272|Ignore, context unavailable extension: ec_point_formats
javax.net.ssl|INFO|E4|AsyncHttpClient-3-3|2024-08-06 12:26:15.680 CEST|AlpnExtension.java:182|No available application protocols
javax.net.ssl|DEBUG|E4|AsyncHttpClient-3-3|2024-08-06 12:26:15.680 CEST|SSLExtensions.java:272|Ignore, context unavailable extension: application_layer_protocol_negotiation
javax.net.ssl|DEBUG|E4|AsyncHttpClient-3-3|2024-08-06 12:26:15.680 CEST|SessionTicketExtension.java:410|Stateless resumption supported
javax.net.ssl|ALL|E4|AsyncHttpClient-3-3|2024-08-06 12:26:15.680 CEST|SignatureScheme.java:393|Ignore unsupported signature scheme: ecdsa_secp256r1_sha256
javax.net.ssl|ALL|E4|AsyncHttpClient-3-3|2024-08-06 12:26:15.680 CEST|SignatureScheme.java:393|Ignore unsupported signature scheme: ecdsa_secp384r1_sha384
javax.net.ssl|ALL|E4|AsyncHttpClient-3-3|2024-08-06 12:26:15.680 CEST|SignatureScheme.java:393|Ignore unsupported signature scheme: ecdsa_secp521r1_sha512
javax.net.ssl|ALL|E4|AsyncHttpClient-3-3|2024-08-06 12:26:15.680 CEST|SignatureScheme.java:393|Ignore unsupported signature scheme: ed25519
javax.net.ssl|ALL|E4|AsyncHttpClient-3-3|2024-08-06 12:26:15.680 CEST|SignatureScheme.java:393|Ignore unsupported signature scheme: ed448
javax.net.ssl|ALL|E4|AsyncHttpClient-3-3|2024-08-06 12:26:15.680 CEST|SignatureScheme.java:393|Ignore unsupported signature scheme: ecdsa_sha224
javax.net.ssl|ALL|E4|AsyncHttpClient-3-3|2024-08-06 12:26:15.680 CEST|SignatureScheme.java:393|Ignore unsupported signature scheme: ecdsa_sha1
javax.net.ssl|ALL|E4|AsyncHttpClient-3-3|2024-08-06 12:26:15.680 CEST|SignatureScheme.java:412|Ignore disabled signature scheme: rsa_md5
javax.net.ssl|DEBUG|E4|AsyncHttpClient-3-3|2024-08-06 12:26:15.680 CEST|ClientHello.java:641|Produced ClientHello handshake message (
"ClientHello": {
"client version" : "TLSv1.2",
"random" : "8C2CB89FF5D087F723F6957807A408EFBC02351255C5ABD0D7F9D2449B377528",
"session id" : "",
"cipher suites" : "[TLS_RSA_WITH_AES_128_GCM_SHA256(0x009C), TLS_RSA_WITH_AES_128_CBC_SHA(0x002F), TLS_RSA_WITH_AES_256_CBC_SHA(0x0035)]",
"compression methods" : "00",
"extensions" : [
"server_name (0)": {
type=host_name (0), value=cdn.freesound.org
},
"status_request (5)": {
"certificate status type": ocsp
"OCSP status request": {
"responder_id": <empty>
"request extensions": {
<empty>
}
}
},
"status_request_v2 (17)": {
"cert status request": {
"certificate status type": ocsp_multi
"OCSP status request": {
"responder_id": <empty>
"request extensions": {
<empty>
}
}
}
},
"extended_master_secret (23)": {
<empty>
},
"session_ticket (35)": {
<empty>
},
"signature_algorithms (13)": {
"signature schemes": [rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, rsa_sha224, dsa_sha224, rsa_pkcs1_sha1, dsa_sha1]
},
"supported_versions (43)": {
"versions": [TLSv1.2]
},
"signature_algorithms_cert (50)": {
"signature schemes": [rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, rsa_sha224, dsa_sha224, rsa_pkcs1_sha1, dsa_sha1]
},
"renegotiation_info (65,281)": {
"renegotiated connection": [<no renegotiated connection>]
}
]
}
)
javax.net.ssl|DEBUG|E4|AsyncHttpClient-3-3|2024-08-06 12:26:15.684 CEST|SSLEngineOutputRecord.java:530|WRITE: TLSv1.2 handshake, length = 187
javax.net.ssl|DEBUG|E4|AsyncHttpClient-3-3|2024-08-06 12:26:15.684 CEST|SSLEngineOutputRecord.java:551|Raw write (
0000: 16 03 03 00 BB 01 00 00 B7 03 03 8C 2C B8 9F F5 ............,...
0010: D0 87 F7 23 F6 95 78 07 A4 08 EF BC 02 35 12 55 ...#..x......5.U
0020: C5 AB D0 D7 F9 D2 44 9B 37 75 28 00 00 06 00 9C ......D.7u(.....
0030: 00 2F 00 35 01 00 00 88 00 00 00 16 00 14 00 00 ./.5............
0040: 11 63 64 6E 2E 66 72 65 65 73 6F 75 6E 64 2E 6F .cdn.freesound.o
0050: 72 67 00 05 00 05 01 00 00 00 00 00 11 00 09 00 rg..............
0060: 07 02 00 04 00 00 00 00 00 17 00 00 00 23 00 00 .............#..
0070: 00 0D 00 1E 00 1C 08 04 08 05 08 06 08 09 08 0A ................
0080: 08 0B 04 01 05 01 06 01 04 02 03 01 03 02 02 01 ................
0090: 02 02 00 2B 00 03 02 03 03 00 32 00 1E 00 1C 08 ...+......2.....
00A0: 04 08 05 08 06 08 09 08 0A 08 0B 04 01 05 01 06 ................
00B0: 01 04 02 03 01 03 02 02 01 02 02 FF 01 00 01 00 ................
)
javax.net.ssl|DEBUG|E4|AsyncHttpClient-3-3|2024-08-06 12:26:15.749 CEST|SSLEngineInputRecord.java:176|Raw read (
0000: 15 03 03 00 02 02 28 ......(
)
javax.net.ssl|DEBUG|E4|AsyncHttpClient-3-3|2024-08-06 12:26:15.750 CEST|SSLEngineInputRecord.java:213|READ: TLSv1.2 alert, length = 2
javax.net.ssl|DEBUG|E4|AsyncHttpClient-3-3|2024-08-06 12:26:15.750 CEST|Alert.java:238|Received alert message (
"Alert": {
"level" : "fatal",
"description": "handshake_failure"
}
)
javax.net.ssl|ERROR|E4|AsyncHttpClient-3-3|2024-08-06 12:26:15.751 CEST|TransportContext.java:370|Fatal (HANDSHAKE_FAILURE): Received fatal alert: handshake_failure (
"throwable" : {
javax.net.ssl.SSLHandshakeException: Received fatal alert: handshake_failure
at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:117)
at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:365)
at java.base/sun.security.ssl.Alert$AlertConsumer.consume(Alert.java:293)
at java.base/sun.security.ssl.TransportContext.dispatch(TransportContext.java:204)
at java.base/sun.security.ssl.SSLTransport.decode(SSLTransport.java:172)
at java.base/sun.security.ssl.SSLEngineImpl.decode(SSLEngineImpl.java:736)
at java.base/sun.security.ssl.SSLEngineImpl.readRecord(SSLEngineImpl.java:691)
at java.base/sun.security.ssl.SSLEngineImpl.unwrap(SSLEngineImpl.java:506)
at java.base/sun.security.ssl.SSLEngineImpl.unwrap(SSLEngineImpl.java:482)
at java.base/javax.net.ssl.SSLEngine.unwrap(SSLEngine.java:679)
at io.netty.handler.ssl.SslHandler$SslEngineType$3.unwrap(SslHandler.java:295)
at io.netty.handler.ssl.SslHandler.unwrap(SslHandler.java:1301)
at io.netty.handler.ssl.SslHandler.decodeJdkCompatible(SslHandler.java:1203)
at io.netty.handler.ssl.SslHandler.decode(SslHandler.java:1247)
at io.netty.handler.codec.ByteToMessageDecoder.decodeRemovalReentryProtection(ByteToMessageDecoder.java:502)
at io.netty.handler.codec.ByteToMessageDecoder.callDecode(ByteToMessageDecoder.java:441)
at io.netty.handler.codec.ByteToMessageDecoder.channelRead(ByteToMessageDecoder.java:278)
at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:362)
at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:348)
at io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:340)
at io.netty.channel.DefaultChannelPipeline$HeadContext.channelRead(DefaultChannelPipeline.java:1408)
at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:362)
at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:348)
at io.netty.channel.DefaultChannelPipeline.fireChannelRead(DefaultChannelPipeline.java:930)
at io.netty.channel.nio.AbstractNioByteChannel$NioByteUnsafe.read(AbstractNioByteChannel.java:163)
at io.netty.channel.nio.NioEventLoop.processSelectedKey(NioEventLoop.java:677)
at io.netty.channel.nio.NioEventLoop.processSelectedKeysOptimized(NioEventLoop.java:612)
at io.netty.channel.nio.NioEventLoop.processSelectedKeys(NioEventLoop.java:529)
at io.netty.channel.nio.NioEventLoop.run(NioEventLoop.java:491)
at io.netty.util.concurrent.SingleThreadEventExecutor$5.run(SingleThreadEventExecutor.java:905)
at io.netty.util.concurrent.FastThreadLocalRunnable.run(FastThreadLocalRunnable.java:30)
at java.base/java.lang.Thread.run(Thread.java:840)}
)
javax.net.ssl|ALL|E4|AsyncHttpClient-3-3|2024-08-06 12:26:15.751 CEST|SSLSessionImpl.java:1222|Invalidated session: Session(1722939975679|SSL_NULL_WITH_NULL_NULL)
java.util.concurrent.ExecutionException: java.net.ConnectException: Received fatal alert: handshake_failure
at java.base/java.util.concurrent.CompletableFuture.reportGet(CompletableFuture.java:396)
at java.base/java.util.concurrent.CompletableFuture.get(CompletableFuture.java:2073)
at org.asynchttpclient.netty.NettyResponseFuture.get(NettyResponseFuture.java:201)
at de.sciss.freesound.impl.DownloadImpl$$anon$1$$anon$2.$anonfun$run$1(DownloadImpl.scala:62)
at scala.runtime.java8.JFunction0$mcV$sp.apply(JFunction0$mcV$sp.scala:18)
at scala.util.Try$.apply(Try.scala:210)
at de.sciss.freesound.impl.DownloadImpl$$anon$1$$anon$2.run(DownloadImpl.scala:62)
at org.asynchttpclient.netty.NettyResponseFuture.lambda$addListener$0(NettyResponseFuture.java:294)
at java.base/java.util.concurrent.CompletableFuture.uniWhenComplete(CompletableFuture.java:863)
at java.base/java.util.concurrent.CompletableFuture$UniWhenComplete.tryFire(CompletableFuture.java:841)
at java.base/java.util.concurrent.CompletableFuture$Completion.exec(CompletableFuture.java:483)
at java.base/java.util.concurrent.ForkJoinTask.doExec(ForkJoinTask.java:373)
at java.base/java.util.concurrent.ForkJoinPool$WorkQueue.topLevelExec(ForkJoinPool.java:1182)
at java.base/java.util.concurrent.ForkJoinPool.scan(ForkJoinPool.java:1655)
at java.base/java.util.concurrent.ForkJoinPool.runWorker(ForkJoinPool.java:1622)
at java.base/java.util.concurrent.ForkJoinWorkerThread.run(ForkJoinWorkerThread.java:165)
Caused by: java.net.ConnectException: Received fatal alert: handshake_failure
at org.asynchttpclient.netty.channel.NettyConnectListener.onFailure(NettyConnectListener.java:179)
at org.asynchttpclient.netty.channel.NettyConnectListener$1.onFailure(NettyConnectListener.java:151)
at org.asynchttpclient.netty.SimpleFutureListener.operationComplete(SimpleFutureListener.java:26)
at io.netty.util.concurrent.DefaultPromise.notifyListener0(DefaultPromise.java:511)
at io.netty.util.concurrent.DefaultPromise.notifyListeners0(DefaultPromise.java:504)
at io.netty.util.concurrent.DefaultPromise.notifyListenersNow(DefaultPromise.java:483)
at io.netty.util.concurrent.DefaultPromise.notifyListeners(DefaultPromise.java:424)
at io.netty.util.concurrent.DefaultPromise.tryFailure(DefaultPromise.java:121)
at io.netty.handler.ssl.SslHandler.handleUnwrapThrowable(SslHandler.java:1227)
at io.netty.handler.ssl.SslHandler.decodeJdkCompatible(SslHandler.java:1209)
at io.netty.handler.ssl.SslHandler.decode(SslHandler.java:1247)
at io.netty.handler.codec.ByteToMessageDecoder.decodeRemovalReentryProtection(ByteToMessageDecoder.java:502)
at io.netty.handler.codec.ByteToMessageDecoder.callDecode(ByteToMessageDecoder.java:441)
at io.netty.handler.codec.ByteToMessageDecoder.channelRead(ByteToMessageDecoder.java:278)
at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:362)
at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:348)
at io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:340)
at io.netty.channel.DefaultChannelPipeline$HeadContext.channelRead(DefaultChannelPipeline.java:1408)
at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:362)
at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:348)
at io.netty.channel.DefaultChannelPipeline.fireChannelRead(DefaultChannelPipeline.java:930)
at io.netty.channel.nio.AbstractNioByteChannel$NioByteUnsafe.read(AbstractNioByteChannel.java:163)
at io.netty.channel.nio.NioEventLoop.processSelectedKey(NioEventLoop.java:677)
at io.netty.channel.nio.NioEventLoop.processSelectedKeysOptimized(NioEventLoop.java:612)
at io.netty.channel.nio.NioEventLoop.processSelectedKeys(NioEventLoop.java:529)
at io.netty.channel.nio.NioEventLoop.run(NioEventLoop.java:491)
at io.netty.util.concurrent.SingleThreadEventExecutor$5.run(SingleThreadEventExecutor.java:905)
at io.netty.util.concurrent.FastThreadLocalRunnable.run(FastThreadLocalRunnable.java:30)
at java.base/java.lang.Thread.run(Thread.java:840)
Caused by: javax.net.ssl.SSLHandshakeException: Received fatal alert: handshake_failure
at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:117)
at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:365)
at java.base/sun.security.ssl.Alert$AlertConsumer.consume(Alert.java:293)
at java.base/sun.security.ssl.TransportContext.dispatch(TransportContext.java:204)
at java.base/sun.security.ssl.SSLTransport.decode(SSLTransport.java:172)
at java.base/sun.security.ssl.SSLEngineImpl.decode(SSLEngineImpl.java:736)
at java.base/sun.security.ssl.SSLEngineImpl.readRecord(SSLEngineImpl.java:691)
at java.base/sun.security.ssl.SSLEngineImpl.unwrap(SSLEngineImpl.java:506)
at java.base/sun.security.ssl.SSLEngineImpl.unwrap(SSLEngineImpl.java:482)
at java.base/javax.net.ssl.SSLEngine.unwrap(SSLEngine.java:679)
at io.netty.handler.ssl.SslHandler$SslEngineType$3.unwrap(SslHandler.java:295)
at io.netty.handler.ssl.SslHandler.unwrap(SslHandler.java:1301)
at io.netty.handler.ssl.SslHandler.decodeJdkCompatible(SslHandler.java:1203)
... 19 more
javax.net.ssl|ALL|A4|AsyncHttpClient-3-2|2024-08-06 12:27:11.551 CEST|SSLEngineImpl.java:825|Closing outbound of SSLEngine
javax.net.ssl|WARNING|A4|AsyncHttpClient-3-2|2024-08-06 12:27:11.552 CEST|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
javax.net.ssl|DEBUG|A4|AsyncHttpClient-3-2|2024-08-06 12:27:11.552 CEST|SSLEngineOutputRecord.java:530|WRITE: TLSv1.2 alert, length = 2
javax.net.ssl|DEBUG|A4|AsyncHttpClient-3-2|2024-08-06 12:27:11.552 CEST|SSLCipher.java:1773|Plaintext before ENCRYPTION (
0000: 01 00 ..
)
javax.net.ssl|DEBUG|A4|AsyncHttpClient-3-2|2024-08-06 12:27:11.553 CEST|SSLEngineOutputRecord.java:551|Raw write (
0000: 15 03 03 00 1A 00 00 00 00 00 00 00 02 B1 6F 42 ..............oB
0010: CF 75 12 B8 8F 45 6A 5A AA 55 33 2B F6 C6 F0 .u...EjZ.U3+...
)
javax.net.ssl|ALL|74|AsyncHttpClient-3-1|2024-08-06 12:27:12.651 CEST|SSLEngineImpl.java:825|Closing outbound of SSLEngine
javax.net.ssl|WARNING|74|AsyncHttpClient-3-1|2024-08-06 12:27:12.651 CEST|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
javax.net.ssl|DEBUG|74|AsyncHttpClient-3-1|2024-08-06 12:27:12.651 CEST|SSLEngineOutputRecord.java:530|WRITE: TLSv1.2 alert, length = 2
javax.net.ssl|DEBUG|74|AsyncHttpClient-3-1|2024-08-06 12:27:12.651 CEST|SSLCipher.java:1773|Plaintext before ENCRYPTION (
0000: 01 00 ..
)
javax.net.ssl|DEBUG|74|AsyncHttpClient-3-1|2024-08-06 12:27:12.652 CEST|SSLEngineOutputRecord.java:551|Raw write (
0000: 15 03 03 00 1A 00 00 00 00 00 00 00 03 23 08 DD .............#..
0010: 02 A7 FD DF 7A 1D 26 EC 74 86 93 5A 72 7A F9 ....z.&.t..Zrz.
)
Context
(java.vendor.url,https://adoptium.net/)
(java.vm.specification.version,17)
(os.name,Linux)
(sun.boot.library.path,/usr/share/mellite-launcher/jre/lib)
(java.version.date,2024-07-16)
(java.home,/usr/share/mellite-launcher/jre)
(java.runtime.version,17.0.12+7)
(os.version,6.1.0-21-amd64)
(java.vendor.version,Temurin-17.0.12+7)
(os.arch,amd64)
(java.library.path,/usr/java/packages/lib:/usr/lib64:/lib64:/lib:/usr/lib)
(java.vm.info,mixed mode)
(java.vendor,Eclipse Adoptium)
In comparison, here is the successful run from my desktop's JDK:
javax.net.ssl|DEBUG|A4|AsyncHttpClient-3-3|2024-08-06 12:43:36.020 CEST|SupportedGroupsExtension.java:365|Ignore inactive or disabled named group: ffdhe2048
javax.net.ssl|DEBUG|A4|AsyncHttpClient-3-3|2024-08-06 12:43:36.020 CEST|SupportedGroupsExtension.java:365|Ignore inactive or disabled named group: ffdhe3072
javax.net.ssl|DEBUG|A4|AsyncHttpClient-3-3|2024-08-06 12:43:36.020 CEST|SupportedGroupsExtension.java:365|Ignore inactive or disabled named group: ffdhe4096
javax.net.ssl|DEBUG|A4|AsyncHttpClient-3-3|2024-08-06 12:43:36.020 CEST|SupportedGroupsExtension.java:365|Ignore inactive or disabled named group: ffdhe6144
javax.net.ssl|DEBUG|A4|AsyncHttpClient-3-3|2024-08-06 12:43:36.020 CEST|SupportedGroupsExtension.java:365|Ignore inactive or disabled named group: ffdhe8192
javax.net.ssl|INFO|A4|AsyncHttpClient-3-3|2024-08-06 12:43:36.020 CEST|AlpnExtension.java:182|No available application protocols
javax.net.ssl|DEBUG|A4|AsyncHttpClient-3-3|2024-08-06 12:43:36.020 CEST|SSLExtensions.java:272|Ignore, context unavailable extension: application_layer_protocol_negotiation
javax.net.ssl|DEBUG|A4|AsyncHttpClient-3-3|2024-08-06 12:43:36.020 CEST|SessionTicketExtension.java:408|Stateless resumption supported
javax.net.ssl|ALL|A4|AsyncHttpClient-3-3|2024-08-06 12:43:36.021 CEST|SignatureScheme.java:412|Ignore disabled signature scheme: rsa_md5
javax.net.ssl|DEBUG|A4|AsyncHttpClient-3-3|2024-08-06 12:43:36.022 CEST|ClientHello.java:641|Produced ClientHello handshake message (
"ClientHello": {
"client version" : "TLSv1.2",
"random" : "57879C88ED8362B503AB13151083D107E8F2EE4D4B4985789716DFA6A029EFC0",
"session id" : "",
"cipher suites" : "[TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA(0xC013), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA(0xC014), TLS_RSA_WITH_AES_128_GCM_SHA256(0x009C), TLS_RSA_WITH_AES_128_CBC_SHA(0x002F), TLS_RSA_WITH_AES_256_CBC_SHA(0x0035)]",
"compression methods" : "00",
"extensions" : [
"server_name (0)": {
type=host_name (0), value=cdn.freesound.org
},
"status_request (5)": {
"certificate status type": ocsp
"OCSP status request": {
"responder_id": <empty>
"request extensions": {
<empty>
}
}
},
"supported_groups (10)": {
"versions": [x25519, secp256r1, secp384r1, secp521r1, x448]
},
"ec_point_formats (11)": {
"formats": [uncompressed]
},
"status_request_v2 (17)": {
"cert status request": {
"certificate status type": ocsp_multi
"OCSP status request": {
"responder_id": <empty>
"request extensions": {
<empty>
}
}
}
},
"extended_master_secret (23)": {
<empty>
},
"session_ticket (35)": {
<empty>
},
"signature_algorithms (13)": {
"signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, ed25519, ed448, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
},
"supported_versions (43)": {
"versions": [TLSv1.2]
},
"signature_algorithms_cert (50)": {
"signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, ed25519, ed448, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
},
"renegotiation_info (65,281)": {
"renegotiated connection": [<no renegotiated connection>]
}
]
}
)
javax.net.ssl|DEBUG|A4|AsyncHttpClient-3-3|2024-08-06 12:43:36.025 CEST|SSLEngineOutputRecord.java:530|WRITE: TLSv1.2 handshake, length = 249
javax.net.ssl|DEBUG|A4|AsyncHttpClient-3-3|2024-08-06 12:43:36.026 CEST|SSLEngineOutputRecord.java:551|Raw write (
0000: 16 03 03 00 F9 01 00 00 F5 03 03 57 87 9C 88 ED ...........W....
0010: 83 62 B5 03 AB 13 15 10 83 D1 07 E8 F2 EE 4D 4B .b............MK
0020: 49 85 78 97 16 DF A6 A0 29 EF C0 00 00 12 C0 2C I.x.....)......,
0030: C0 2B C0 2F C0 30 C0 13 C0 14 00 9C 00 2F 00 35 .+./.0......./.5
0040: 01 00 00 BA 00 00 00 16 00 14 00 00 11 63 64 6E .............cdn
0050: 2E 66 72 65 65 73 6F 75 6E 64 2E 6F 72 67 00 05 .freesound.org..
0060: 00 05 01 00 00 00 00 00 0A 00 0C 00 0A 00 1D 00 ................
0070: 17 00 18 00 19 00 1E 00 0B 00 02 01 00 00 11 00 ................
0080: 09 00 07 02 00 04 00 00 00 00 00 17 00 00 00 23 ...............#
0090: 00 00 00 0D 00 2C 00 2A 04 03 05 03 06 03 08 07 .....,.*........
00A0: 08 08 08 04 08 05 08 06 08 09 08 0A 08 0B 04 01 ................
00B0: 05 01 06 01 04 02 03 03 03 01 03 02 02 03 02 01 ................
00C0: 02 02 00 2B 00 03 02 03 03 00 32 00 2C 00 2A 04 ...+......2.,.*.
00D0: 03 05 03 06 03 08 07 08 08 08 04 08 05 08 06 08 ................
00E0: 09 08 0A 08 0B 04 01 05 01 06 01 04 02 03 03 03 ................
00F0: 01 03 02 02 03 02 01 02 02 FF 01 00 01 00 ..............
)
javax.net.ssl|DEBUG|A4|AsyncHttpClient-3-3|2024-08-06 12:43:36.108 CEST|SSLEngineInputRecord.java:176|Raw read (
0000: 16 03 03 00 61 02 00 00 5D 03 03 48 CD 96 A0 92 ....a...]..H....
0010: F1 E2 D4 87 99 44 6B 6C 8C 7D 69 A6 80 84 65 89 .....Dkl..i...e.
0020: 05 E0 21 44 4F 57 4E 47 52 44 01 20 60 3D B4 DD ..!DOWNGRD. `=..
0030: A3 19 EC DE 0F CF 79 4A 9C DC 6D 9A 95 2C 41 8F ......yJ..m..,A.
0040: BD 0A DA D2 4D 12 51 40 4C 5D F7 2D C0 2F 00 00 ....M.Q@L].-./..
0050: 15 FF 01 00 01 00 00 00 00 00 00 0B 00 04 03 00 ................
0060: 01 02 00 17 00 00 ......
)
javax.net.ssl|DEBUG|A4|AsyncHttpClient-3-3|2024-08-06 12:43:36.108 CEST|SSLEngineInputRecord.java:213|READ: TLSv1.2 handshake, length = 97
javax.net.ssl|DEBUG|A4|AsyncHttpClient-3-3|2024-08-06 12:43:36.109 CEST|ServerHello.java:888|Consuming ServerHello handshake message (
"ServerHello": {
"server version" : "TLSv1.2",
"random" : "48CD96A092F1E2D48799446B6C8C7D69A68084658905E021444F574E47524401",
"session id" : "603DB4DDA319ECDE0FCF794A9CDC6D9A952C418FBD0ADAD24D1251404C5DF72D",
"cipher suite" : "TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F)",
"compression methods" : "00",
"extensions" : [
"renegotiation_info (65,281)": {
"renegotiated connection": [<no renegotiated connection>]
},
"server_name (0)": {
<empty extension_data field>
},
"ec_point_formats (11)": {
"formats": [uncompressed, ansiX962_compressed_prime, ansiX962_compressed_char2]
},
"extended_master_secret (23)": {
<empty>
}
]
}
)
javax.net.ssl|DEBUG|A4|AsyncHttpClient-3-3|2024-08-06 12:43:36.109 CEST|SSLExtensions.java:185|Ignore unavailable extension: supported_versions
javax.net.ssl|DEBUG|A4|AsyncHttpClient-3-3|2024-08-06 12:43:36.109 CEST|ServerHello.java:984|Negotiated protocol version: TLSv1.2
javax.net.ssl|DEBUG|A4|AsyncHttpClient-3-3|2024-08-06 12:43:36.109 CEST|SSLExtensions.java:204|Consumed extension: renegotiation_info
javax.net.ssl|DEBUG|A4|AsyncHttpClient-3-3|2024-08-06 12:43:36.109 CEST|SSLExtensions.java:204|Consumed extension: server_name
javax.net.ssl|DEBUG|A4|AsyncHttpClient-3-3|2024-08-06 12:43:36.109 CEST|SSLExtensions.java:185|Ignore unavailable extension: max_fragment_length
javax.net.ssl|DEBUG|A4|AsyncHttpClient-3-3|2024-08-06 12:43:36.109 CEST|SSLExtensions.java:185|Ignore unavailable extension: status_request
javax.net.ssl|DEBUG|A4|AsyncHttpClient-3-3|2024-08-06 12:43:36.109 CEST|SSLExtensions.java:204|Consumed extension: ec_point_formats
javax.net.ssl|DEBUG|A4|AsyncHttpClient-3-3|2024-08-06 12:43:36.109 CEST|SSLExtensions.java:185|Ignore unavailable extension: status_request_v2
javax.net.ssl|DEBUG|A4|AsyncHttpClient-3-3|2024-08-06 12:43:36.109 CEST|SSLExtensions.java:204|Consumed extension: extended_master_secret
javax.net.ssl|DEBUG|A4|AsyncHttpClient-3-3|2024-08-06 12:43:36.109 CEST|SSLExtensions.java:185|Ignore unavailable extension: session_ticket
javax.net.ssl|DEBUG|A4|AsyncHttpClient-3-3|2024-08-06 12:43:36.109 CEST|SSLExtensions.java:204|Consumed extension: renegotiation_info
javax.net.ssl|ALL|A4|AsyncHttpClient-3-3|2024-08-06 12:43:36.109 CEST|SSLSessionImpl.java:219|Session initialized: Session(1722941016109|TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256)
javax.net.ssl|WARNING|A4|AsyncHttpClient-3-3|2024-08-06 12:43:36.109 CEST|SSLExtensions.java:227|Ignore impact of unsupported extension: server_name
javax.net.ssl|DEBUG|A4|AsyncHttpClient-3-3|2024-08-06 12:43:36.109 CEST|SSLExtensions.java:219|Ignore unavailable extension: max_fragment_length
javax.net.ssl|DEBUG|A4|AsyncHttpClient-3-3|2024-08-06 12:43:36.109 CEST|SSLExtensions.java:219|Ignore unavailable extension: status_request
javax.net.ssl|WARNING|A4|AsyncHttpClient-3-3|2024-08-06 12:43:36.109 CEST|SSLExtensions.java:227|Ignore impact of unsupported extension: ec_point_formats
javax.net.ssl|DEBUG|A4|AsyncHttpClient-3-3|2024-08-06 12:43:36.109 CEST|SSLExtensions.java:219|Ignore unavailable extension: application_layer_protocol_negotiation
javax.net.ssl|DEBUG|A4|AsyncHttpClient-3-3|2024-08-06 12:43:36.109 CEST|SSLExtensions.java:219|Ignore unavailable extension: status_request_v2
javax.net.ssl|WARNING|A4|AsyncHttpClient-3-3|2024-08-06 12:43:36.109 CEST|SSLExtensions.java:227|Ignore impact of unsupported extension: extended_master_secret
javax.net.ssl|DEBUG|A4|AsyncHttpClient-3-3|2024-08-06 12:43:36.110 CEST|SSLExtensions.java:219|Ignore unavailable extension: session_ticket
javax.net.ssl|WARNING|A4|AsyncHttpClient-3-3|2024-08-06 12:43:36.110 CEST|SSLExtensions.java:227|Ignore impact of unsupported extension: renegotiation_info
javax.net.ssl|DEBUG|A4|AsyncHttpClient-3-3|2024-08-06 12:43:36.111 CEST|SSLEngineInputRecord.java:176|Raw read (
0000: 16 03 03 0A 0B 0B 00 0A 07 00 0A 04 00 04 F5 30 ...............0
0010: 82 04 F1 30 82 03 D9 A0 03 02 01 02 02 12 04 9B ...0............
0020: E8 06 69 85 C8 FB 80 6C DB 59 C9 06 F5 1E E6 D4 ..i....l.Y......
0030: 30 0D 06 09 2A 86 48 86 F7 0D 01 01 0B 05 00 30 0...*.H........0
0040: 33 31 0B 30 09 06 03 55 04 06 13 02 55 53 31 16 31.0...U....US1.
0050: 30 14 06 03 55 04 0A 13 0D 4C 65 74 27 73 20 45 0...U....Let's E
0060: 6E 63 72 79 70 74 31 0C 30 0A 06 03 55 04 03 13 ncrypt1.0...U...
0070: 03 52 31 30 30 1E 17 0D 32 34 30 37 31 36 31 36 .R100...24071616
0080: 33 32 33 34 5A 17 0D 32 34 31 30 31 34 31 36 33 3234Z..241014163
0090: 32 33 33 5A 30 1C 31 1A 30 18 06 03 55 04 03 13 233Z0.1.0...U...
00A0: 11 63 64 6E 2E 66 72 65 65 73 6F 75 6E 64 2E 6F .cdn.freesound.o
00B0: 72 67 30 82 01 22 30 0D 06 09 2A 86 48 86 F7 0D rg0.."0...*.H...
00C0: 01 01 01 05 00 03 82 01 0F 00 30 82 01 0A 02 82 ..........0.....
00D0: 01 01 00 D7 9D 4D B4 2F 98 98 14 52 DC 53 6D CF .....M./...R.Sm.
00E0: F9 6D 18 8F 16 DD 7F 35 0D FD 70 B0 67 59 66 EA .m.....5..p.gYf.
00F0: D0 BD 67 EB B3 03 41 98 DB CB 2E 4D 52 2C 6A B9 ..g...A....MR,j.
0100: FD 70 D1 9D 11 F7 E0 9F EF D8 2A D1 46 AD 2B 99 .p........*.F.+.
0110: EE E3 A5 A9 90 4D F3 EE D9 CF 33 E4 B9 54 C2 6A .....M....3..T.j
0120: F7 03 58 07 C3 6E 36 82 8C DE 5B 76 C4 FB 9C 9F ..X..n6...[v....
0130: 66 00 F8 70 82 E4 1C 9F 33 C7 D6 35 D3 3B B4 56 f..p....3..5.;.V
0140: EF D8 ED 43 B9 93 E3 37 56 BD 79 24 E5 86 20 CE ...C...7V.y$.. .
0150: 40 5F A6 91 02 A2 FF E6 46 B2 16 54 68 CA EC 9D @_......F..Th...
0160: 64 87 A4 25 09 CA F8 BC 82 64 35 1A 90 C2 97 9E d..%.....d5.....
0170: 19 30 E3 B2 41 63 8C 21 C7 D7 BA EB 15 A4 BB FD .0..Ac.!........
0180: FC 68 69 94 AD 5A A3 86 FC 07 8D 10 62 4A 20 2E .hi..Z......bJ .
0190: 58 60 2F 94 75 37 72 2D 00 59 5D 94 3E 56 5F 5F X`/.u7r-.Y].>V__
01A0: BA F8 14 0B AD B6 FD 76 FC 94 91 C0 C5 34 9E 71 .......v.....4.q
01B0: 47 8E 30 81 86 89 29 A7 FF AE 04 A2 45 FC 9F 1B G.0...).....E...
01C0: BB 56 91 71 3A 97 31 49 A9 1E 37 3C 67 4A AD 1A .V.q:.1I..7<gJ..
01D0: C2 8F 2D 02 03 01 00 01 A3 82 02 14 30 82 02 10 ..-.........0...
01E0: 30 0E 06 03 55 1D 0F 01 01 FF 04 04 03 02 05 A0 0...U...........
01F0: 30 1D 06 03 55 1D 25 04 16 30 14 06 08 2B 06 01 0...U.%..0...+..
0200: 05 05 07 03 01 06 08 2B 06 01 05 05 07 03 02 30 .......+.......0
0210: 0C 06 03 55 1D 13 01 01 FF 04 02 30 00 30 1D 06 ...U.......0.0..
0220: 03 55 1D 0E 04 16 04 14 5F FA 19 8D 00 03 BB 53 .U......_......S
0230: BE F3 9B 5E 57 5E AE 3F C1 45 17 D7 30 1F 06 03 ...^W^.?.E..0...
0240: 55 1D 23 04 18 30 16 80 14 BB BC C3 47 A5 E4 BC U.#..0......G...
0250: A9 C6 C3 A4 72 0C 10 8D A2 35 E1 C8 E8 30 57 06 ....r....5...0W.
0260: 08 2B 06 01 05 05 07 01 01 04 4B 30 49 30 22 06 .+........K0I0".
0270: 08 2B 06 01 05 05 07 30 01 86 16 68 74 74 70 3A .+.....0...http:
0280: 2F 2F 72 31 30 2E 6F 2E 6C 65 6E 63 72 2E 6F 72 //r10.o.lencr.or
0290: 67 30 23 06 08 2B 06 01 05 05 07 30 02 86 17 68 g0#..+.....0...h
02A0: 74 74 70 3A 2F 2F 72 31 30 2E 69 2E 6C 65 6E 63 ttp://r10.i.lenc
02B0: 72 2E 6F 72 67 2F 30 1C 06 03 55 1D 11 04 15 30 r.org/0...U....0
02C0: 13 82 11 63 64 6E 2E 66 72 65 65 73 6F 75 6E 64 ...cdn.freesound
02D0: 2E 6F 72 67 30 13 06 03 55 1D 20 04 0C 30 0A 30 .org0...U. ..0.0
02E0: 08 06 06 67 81 0C 01 02 01 30 82 01 03 06 0A 2B ...g.....0.....+
02F0: 06 01 04 01 D6 79 02 04 02 04 81 F4 04 81 F1 00 .....y..........
0300: EF 00 75 00 EE CD D0 64 D5 DB 1A CE C5 5C B7 9D ..u....d.....\..
0310: B4 CD 13 A2 32 87 46 7C BC EC DE C3 51 48 59 46 ....2.F.....QHYF
0320: 71 1F B5 9B 00 00 01 90 BC 9A 69 E8 00 00 04 03 q.........i.....
0330: 00 46 30 44 02 20 29 93 F0 6B 9C 00 62 4A 46 97 .F0D. )..k..bJF.
0340: 88 E7 0A 38 69 8A C9 87 AA 1A 37 1D 00 64 C4 FB ...8i.....7..d..
0350: 61 A4 6C 6D 7A 9F 02 20 1D B3 A9 19 2D 3D 3E 21 a.lmz.. ....-=>!
0360: CA 7F F2 EF 27 5B AA F8 23 17 A8 8B 7C 62 07 53 ....'[..#....b.S
0370: A0 95 59 D4 A3 94 80 15 00 76 00 DF E1 56 EB AA ..Y......v...V..
0380: 05 AF B5 9C 0F 86 71 8D A8 C0 32 4E AE 56 D9 6E ......q...2N.V.n
0390: A7 F5 A5 6A 01 D1 C1 3B BE 52 5C 00 00 01 90 BC ...j...;.R\.....
03A0: 9A 6A F6 00 00 04 03 00 47 30 45 02 21 00 BE 5B .j......G0E.!..[
03B0: F1 3F CD 3E A3 49 B0 4E B3 4D 9F C9 44 05 89 F7 .?.>.I.N.M..D...
03C0: 02 BC 21 0A 5E F7 BA 32 A4 06 73 45 0D 0F 02 20 ..!.^..2..sE...
03D0: 14 38 3A CA 8A 06 E2 90 A2 27 93 19 62 72 1C 5D .8:......'..br.]
03E0: B3 A4 69 9F F6 32 E6 33 03 8F 4C 93 54 C8 1E 7F ..i..2.3..L.T...
03F0: 30 0D 06 09 2A 86 48 86 F7 0D 01 01 0B 05 00 03 0...*.H.........
0400: 82 01 01 00 29 94 AC 42 3C 83 DE CE 56 CC F5 41 ....)..B<...V..A
0410: B6 6A 1E 8C 6C 3A FB B9 DE BB 03 C9 C0 9C 92 14 .j..l:..........
0420: AB 87 B0 71 6F 5A 96 3F 65 EC 2A 7D 9D 24 F2 E5 ...qoZ.?e.*..$..
0430: 45 9C 7A F4 B2 93 56 99 09 2E D5 E4 A9 A0 D2 BB E.z...V.........
0440: 66 22 4B 7C 33 9F 22 DA 4E C6 73 AF F1 DE 3A 68 f"K.3.".N.s...:h
0450: 8A 42 3C 6A 2E EA 93 0F B4 E1 A5 BA 9E 9D 8F 83 .B<j............
0460: 91 D8 40 56 90 6C DE E4 73 DD 27 D4 36 84 A0 26 [email protected].'.6..&
0470: CF B0 F3 DA E1 5B 83 BD 8A D1 A7 DD C2 00 3D BA .....[........=.
0480: B2 FF AE 48 DF 24 0C 9B E2 A1 9C DE 5A 8D 44 7C ...H.$......Z.D.
0490: 87 49 7C 3B 31 A3 1B 5E 22 07 E7 25 27 41 34 C6 .I.;1..^"..%'A4.
04A0: 7E C7 39 2F 8F 8A F4 4D DD 08 03 DA 7E AE 48 A4 ..9/...M......H.
04B0: 5F 39 0C 2C DC 2B 9D 98 42 8C CC 9C 12 FE 4B 7D _9.,.+..B.....K.
04C0: 56 45 01 FD 02 54 61 9A 0E 1E C7 1C 1C A2 CE 05 VE...Ta.........
04D0: 83 60 87 06 0C 04 AF 98 99 43 91 CD 8F 0A 32 1B .`.......C....2.
04E0: 79 28 47 F5 97 BC 0E 57 03 25 D5 AB 5E 77 CE ED y(G....W.%..^w..
04F0: D1 09 30 CA 3F AC B5 70 28 AF BC DD 1E 5C 8F 17 ..0.?..p(....\..
0500: 12 6E 81 92 00 05 09 30 82 05 05 30 82 02 ED A0 .n.....0...0....
0510: 03 02 01 02 02 10 4B A8 52 93 F7 9A 2F A2 73 06 ......K.R.../.s.
0520: 4B A8 04 8D 75 D0 30 0D 06 09 2A 86 48 86 F7 0D K...u.0...*.H...
0530: 01 01 0B 05 00 30 4F 31 0B 30 09 06 03 55 04 06 .....0O1.0...U..
0540: 13 02 55 53 31 29 30 27 06 03 55 04 0A 13 20 49 ..US1)0'..U... I
0550: 6E 74 65 72 6E 65 74 20 53 65 63 75 72 69 74 79 nternet Security
0560: 20 52 65 73 65 61 72 63 68 20 47 72 6F 75 70 31 Research Group1
0570: 15 30 13 06 03 55 04 03 13 0C 49 53 52 47 20 52 .0...U....ISRG R
0580: 6F 6F 74 20 58 31 30 1E 17 0D 32 34 30 33 31 33 oot X10...240313
0590: 30 30 30 30 30 30 5A 17 0D 32 37 30 33 31 32 32 000000Z..2703122
05A0: 33 35 39 35 39 5A 30 33 31 0B 30 09 06 03 55 04 35959Z031.0...U.
05B0: 06 13 02 55 53 31 16 30 14 06 03 55 04 0A 13 0D ...US1.0...U....
05C0: 4C 65 74 27 73 20 45 6E 63 72 79 70 74 31 0C 30 Let's Encrypt1.0
05D0: 0A 06 03 55 04 03 13 03 52 31 30 30 82 01 22 30 ...U....R100.."0
05E0: 0D 06 09 2A 86 48 86 F7 0D 01 01 01 05 00 03 82 ...*.H..........
05F0: 01 0F 00 30 82 01 0A 02 82 01 01 00 CF 57 E5 E6 ...0.........W..
0600: C4 54 12 ED B4 47 FE C9 27 58 76 46 50 28 8C 1D .T...G..'XvFP(..
0610: 3E 88 DF 05 9D D5 B5 18 29 BD DD B5 5A BF FA F6 >.......)...Z...
0620: CE A3 BE AF 00 21 4B 62 5A 5A 3C 01 2F C5 58 03 .....!KbZZ<./.X.
0630: F6 89 FF 8E 11 43 EB C1 B5 E0 14 07 96 8F 6F 1F .....C........o.
0640: D7 E7 BA 81 39 09 75 65 B7 C2 AF 18 5B 37 26 28 ....9.ue....[7&(
0650: E7 A3 F4 07 2B 6D 1A FF AB 58 BC 95 AE 40 FF E9 ....+m...X...@..
0660: CB 57 C4 B5 5B 7F 78 0D 18 61 BC 17 E7 54 C6 BB .W..[.x..a...T..
0670: 49 91 CD 6E 18 D1 80 85 EE A6 65 36 BC 74 EA BC I..n......e6.t..
0680: 50 4C EA FC 21 F3 38 16 93 94 BA B0 D3 6B 38 06 PL..!.8......k8.
0690: CD 16 12 7A CA 52 75 C8 AD 76 B2 C2 9C 5D 98 45 ...z.Ru..v...].E
06A0: 5C 6F 61 7B C6 2D EE 3C 13 52 86 01 D9 57 E6 38 \oa..-.<.R...W.8
06B0: 1C DF 8D B5 1F 92 91 9A E7 4A 1C CC 45 A8 72 55 .........J..E.rU
06C0: F0 B0 E6 A3 07 EC FD A7 1B 66 9E 3F 48 8B 71 84 .........f.?H.q.
06D0: 71 58 C9 3A FA EF 5E F2 5B 44 2B 3C 74 E7 8F B2 qX.:..^.[D+<t...
06E0: 47 C1 07 6A CD 9A B7 0D 96 F7 12 81 26 51 54 0A G..j........&QT.
06F0: EC 61 F6 F7 F5 E2 F2 8A C8 95 0D 8D 02 03 01 00 .a..............
0700: 01 A3 81 F8 30 81 F5 30 0E 06 03 55 1D 0F 01 01 ....0..0...U....
0710: FF 04 04 03 02 01 86 30 1D 06 03 55 1D 25 04 16 .......0...U.%..
0720: 30 14 06 08 2B 06 01 05 05 07 03 02 06 08 2B 06 0...+.........+.
0730: 01 05 05 07 03 01 30 12 06 03 55 1D 13 01 01 FF ......0...U.....
0740: 04 08 30 06 01 01 FF 02 01 00 30 1D 06 03 55 1D ..0.......0...U.
0750: 0E 04 16 04 14 BB BC C3 47 A5 E4 BC A9 C6 C3 A4 ........G.......
0760: 72 0C 10 8D A2 35 E1 C8 E8 30 1F 06 03 55 1D 23 r....5...0...U.#
0770: 04 18 30 16 80 14 79 B4 59 E6 7B B6 E5 E4 01 73 ..0...y.Y......s
0780: 80 08 88 C8 1A 58 F6 E9 9B 6E 30 32 06 08 2B 06 .....X...n02..+.
0790: 01 05 05 07 01 01 04 26 30 24 30 22 06 08 2B 06 .......&0$0"..+.
07A0: 01 05 05 07 30 02 86 16 68 74 74 70 3A 2F 2F 78 ....0...http://x
07B0: 31 2E 69 2E 6C 65 6E 63 72 2E 6F 72 67 2F 30 13 1.i.lencr.org/0.
07C0: 06 03 55 1D 20 04 0C 30 0A 30 08 06 06 67 81 0C ..U. ..0.0...g..
07D0: 01 02 01 30 27 06 03 55 1D 1F 04 20 30 1E 30 1C ...0'..U... 0.0.
07E0: A0 1A A0 18 86 16 68 74 74 70 3A 2F 2F 78 31 2E ......http://x1.
07F0: 63 2E 6C 65 6E 63 72 2E 6F 72 67 2F 30 0D 06 09 c.lencr.org/0...
0800: 2A 86 48 86 F7 0D 01 01 0B 05 00 03 82 02 01 00 *.H.............
0810: 92 B1 E7 41 37 EB 79 9D 81 E6 CD E2 25 E1 3A 20 ...A7.y.....%.:
0820: E9 90 44 95 A3 81 5C CF C3 5D FD BD A0 70 D5 B1 ..D...\..]...p..
0830: 96 28 22 0B D2 F2 28 CF 0C E7 D4 E6 43 8C 24 22 .("...(.....C.$"
0840: 1D C1 42 92 D1 09 AF 9F 4B F4 C8 70 4F 20 16 B1 ..B.....K..pO ..
0850: 5A DD 01 F6 1F F8 1F 61 6B 14 27 B0 72 8D 63 AE Z......ak.'.r.c.
0860: EE E2 CE 4B CF 37 DD BB A3 D4 CD E7 AD 50 AD BD ...K.7.......P..
0870: BF E3 EC 3E 62 36 70 99 31 A7 E8 8D DD EA 62 E2 ...>b6p.1.....b.
0880: 12 AE F5 9C D4 3D 2C 0C AA D0 9C 79 BE EA 3D 5C .....=,....y..=\
0890: 44 6E 96 31 63 5A 7D D6 7E 4F 24 A0 4B 05 7F 5E Dn.1cZ...O$.K..^
08A0: 6F D2 D4 EA 5F 33 4B 13 D6 57 B6 CA DE 51 B8 5D o..._3K..W...Q.]
08B0: A3 09 82 74 FD C7 78 9E B3 B9 AC 16 DA 4A 2B 96 ...t..x......J+.
08C0: C3 B6 8B 62 8F F9 74 19 A2 9E 03 DE E9 6F 9B B0 ...b..t......o..
08D0: 0F D2 A0 5A F6 85 5C C2 04 B7 C8 D5 4E 32 C4 BF ...Z..\.....N2..
08E0: 04 5D BC 29 F6 F7 81 8F 0C 5D 3C 53 C9 40 90 8B .].).....]<S.@..
08F0: FB B6 08 65 B9 A4 21 D5 09 E5 13 84 84 37 82 CE ...e..!......7..
0900: 10 28 FC 76 C2 06 25 7A 46 52 4D DA 53 72 A4 27 .(.v..%zFRM.Sr.'
0910: 3F 62 70 AC BE 69 48 00 FB 67 0F DB 5B A1 E8 D7 ?bp..iH..g..[...
0920: 03 21 2D D7 C9 F6 99 42 39 83 43 DF 77 0A 12 08 .!-....B9.C.w...
0930: F1 25 D6 BA 94 19 54 18 88 A5 C5 8E E1 1A 99 93 .%....T.........
0940: 79 6B EC 1C F9 31 40 B0 CC 32 00 DF 9F 5E E7 B4 [email protected]...^..
0950: 92 AB 90 82 91 8D 0D E0 1E 95 BA 59 3B 2E 4B 5F ...........Y;.K_
0960: C2 B7 46 35 52 39 06 C0 BD AA AC 52 C1 22 A0 44 ..F5R9.....R.".D
0970: 97 99 F7 0C A0 21 A7 A1 6C 71 47 16 17 01 68 C0 .....!..lqG...h.
0980: CA A6 26 65 04 7C B3 AE C9 E7 94 55 C2 6F 9B 3C ..&e.......U.o.<
0990: 1C A9 F9 2E C5 20 1A F0 76 E0 BE EC 18 D6 4F D8 ..... ..v.....O.
09A0: 25 FB 76 11 E8 BF E6 21 0F E8 E8 CC B5 B6 A7 D5 %.v....!........
09B0: B8 F7 9F 41 CF 61 22 46 6A 83 B6 68 97 2E 7C EA ...A.a"Fj..h....
09C0: 4E 95 DB 23 EB 2E C8 2B 28 84 A4 60 E9 49 F4 44 N..#...+(..`.I.D
09D0: 2E 3B F9 CA 62 57 01 E2 5D 90 16 F9 C9 FC 7A 23 .;..bW..].....z#
09E0: 48 8E A6 D5 81 72 F1 28 FA 5D CE FB ED 4E 73 8F H....r.(.]...Ns.
09F0: 94 2E D2 41 94 98 99 DB A7 AF 70 5F F5 BE FB 02 ...A......p_....
0A00: 20 BF 66 27 6C B4 AD FA 75 12 0B 2B 3E CE 03 9E .f'l...u..+>...
)
javax.net.ssl|DEBUG|A4|AsyncHttpClient-3-3|2024-08-06 12:43:36.111 CEST|SSLEngineInputRecord.java:213|READ: TLSv1.2 handshake, length = 2571
javax.net.ssl|DEBUG|A4|AsyncHttpClient-3-3|2024-08-06 12:43:36.113 CEST|CertificateMessage.java:366|Consuming server Certificate handshake message (
"Certificates": [
"certificate" : {
"version" : "v3",
"serial number" : "049BE8066985C8FB806CDB59C906F51EE6D4",
"signature algorithm": "SHA256withRSA",
"issuer" : "CN=R10, O=Let's Encrypt, C=US",
"not before" : "2024-07-16 18:32:34.000 CEST",
"not after" : "2024-10-14 18:32:33.000 CEST",
"subject" : "CN=cdn.freesound.org",
"subject public key" : "RSA",
"extensions" : [
{
ObjectId: 1.3.6.1.4.1.11129.2.4.2 Criticality=false
},
{
ObjectId: 1.3.6.1.5.5.7.1.1 Criticality=false
AuthorityInfoAccess [
[
accessMethod: ocsp
accessLocation: URIName: http://r10.o.lencr.org
,
accessMethod: caIssuers
accessLocation: URIName: http://r10.i.lencr.org/
]
]
},
{
ObjectId: 2.5.29.35 Criticality=false
AuthorityKeyIdentifier [
KeyIdentifier [
0000: BB BC C3 47 A5 E4 BC A9 C6 C3 A4 72 0C 10 8D A2 ...G.......r....
0010: 35 E1 C8 E8 5...
]
]
},
{
ObjectId: 2.5.29.19 Criticality=true
BasicConstraints:[
CA:false
PathLen: undefined
]
},
{
ObjectId: 2.5.29.32 Criticality=false
CertificatePolicies [
[CertificatePolicyId: [2.23.140.1.2.1]
[] ]
]
},
{
ObjectId: 2.5.29.37 Criticality=false
ExtendedKeyUsages [
serverAuth
clientAuth
]
},
{
ObjectId: 2.5.29.15 Criticality=true
KeyUsage [
DigitalSignature
Key_Encipherment
]
},
{
ObjectId: 2.5.29.17 Criticality=false
SubjectAlternativeName [
DNSName: cdn.freesound.org
]
},
{
ObjectId: 2.5.29.14 Criticality=false
SubjectKeyIdentifier [
KeyIdentifier [
0000: 5F FA 19 8D 00 03 BB 53 BE F3 9B 5E 57 5E AE 3F _......S...^W^.?
0010: C1 45 17 D7 .E..
]
]
}
]},
"certificate" : {
"version" : "v3",
"serial number" : "4BA85293F79A2FA273064BA8048D75D0",
"signature algorithm": "SHA256withRSA",
"issuer" : "CN=ISRG Root X1, O=Internet Security Research Group, C=US",
"not before" : "2024-03-13 01:00:00.000 CET",
"not after" : "2027-03-13 24:59:59.000 CET",
"subject" : "CN=R10, O=Let's Encrypt, C=US",
"subject public key" : "RSA",
"extensions" : [
{
ObjectId: 1.3.6.1.5.5.7.1.1 Criticality=false
AuthorityInfoAccess [
[
accessMethod: caIssuers
accessLocation: URIName: http://x1.i.lencr.org/
]
]
},
{
ObjectId: 2.5.29.35 Criticality=false
AuthorityKeyIdentifier [
KeyIdentifier [
0000: 79 B4 59 E6 7B B6 E5 E4 01 73 80 08 88 C8 1A 58 y.Y......s.....X
0010: F6 E9 9B 6E ...n
]
]
},
{
ObjectId: 2.5.29.19 Criticality=true
BasicConstraints:[
CA:true
PathLen:0
]
},
{
ObjectId: 2.5.29.31 Criticality=false
CRLDistributionPoints [
[DistributionPoint:
[URIName: http://x1.c.lencr.org/]
]]
},
{
ObjectId: 2.5.29.32 Criticality=false
CertificatePolicies [
[CertificatePolicyId: [2.23.140.1.2.1]
[] ]
]
},
{
ObjectId: 2.5.29.37 Criticality=false
ExtendedKeyUsages [
clientAuth
serverAuth
]
},
{
ObjectId: 2.5.29.15 Criticality=true
KeyUsage [
DigitalSignature
Key_CertSign
Crl_Sign
]
},
{
ObjectId: 2.5.29.14 Criticality=false
SubjectKeyIdentifier [
KeyIdentifier [
0000: BB BC C3 47 A5 E4 BC A9 C6 C3 A4 72 0C 10 8D A2 ...G.......r....
0010: 35 E1 C8 E8 5...
]
]
}
]}
]
)
javax.net.ssl|DEBUG|A4|AsyncHttpClient-3-3|2024-08-06 12:43:36.116 CEST|X509TrustManagerImpl.java:301|Found trusted certificate (
"certificate" : {
"version" : "v3",
"serial number" : "008210CFB0D240E3594463E0BB63828B00",
"signature algorithm": "SHA256withRSA",
"issuer" : "CN=ISRG Root X1, O=Internet Security Research Group, C=US",
"not before" : "2015-06-04 13:04:38.000 CEST",
"not after" : "2035-06-04 13:04:38.000 CEST",
"subject" : "CN=ISRG Root X1, O=Internet Security Research Group, C=US",
"subject public key" : "RSA",
"extensions" : [
{
ObjectId: 2.5.29.19 Criticality=true
BasicConstraints:[
CA:true
PathLen: no limit
]
},
{
ObjectId: 2.5.29.15 Criticality=true
KeyUsage [
Key_CertSign
Crl_Sign
]
},
{
ObjectId: 2.5.29.14 Criticality=false
SubjectKeyIdentifier [
KeyIdentifier [
0000: 79 B4 59 E6 7B B6 E5 E4 01 73 80 08 88 C8 1A 58 y.Y......s.....X
0010: F6 E9 9B 6E ...n
]
]
}
]}
)
javax.net.ssl|DEBUG|A4|AsyncHttpClient-3-3|2024-08-06 12:43:36.117 CEST|SSLEngineInputRecord.java:176|Raw read (
0000: 16 03 03 01 2C 0C 00 01 28 03 00 1D 20 1A 91 23 ....,...(... ..#
0010: C3 D4 F9 EA 60 9B 74 6D F1 09 BB E1 3E 26 E1 C9 ....`.tm....>&..
0020: 65 D0 1A 49 C8 9B CF 5D 91 D8 F1 B0 03 08 04 01 e..I...]........
0030: 00 D4 5F 08 0D 61 F7 6E C7 42 26 3A 37 C3 A5 7B .._..a.n.B&:7...
0040: F3 D7 69 5E D0 D5 4E 72 D4 56 3A CF E2 07 97 76 ..i^..Nr.V:....v
0050: 5B B8 03 ED 01 78 46 14 BC 38 A7 AE 73 27 5E 9A [....xF..8..s'^.
0060: 09 CF DB D2 83 40 98 C8 AB BA 6A 37 38 A6 57 C6 [email protected].
0070: 47 0D 41 F0 FC A7 1E 59 F5 A0 0A 41 E8 EF 94 17 G.A....Y...A....
0080: 5C 37 BC 55 FB 1F EC 1D 08 D1 3E CD 80 20 86 A1 \7.U......>.. ..
0090: 14 98 2D 61 E4 1A 78 A0 B7 8E AA B4 F4 98 81 AA ..-a..x.........
00A0: B6 7F FA BD 19 86 64 62 9A A3 A3 10 4E DF 6F 12 ......db....N.o.
00B0: BD 3C 60 8C 85 39 2C E5 C7 B4 D7 EB B0 FD 63 E8 .<`..9,.......c.
00C0: A4 1D 37 BD 3D 8D 43 C1 E9 B2 41 DC EE 65 6A 19 ..7.=.C...A..ej.
00D0: 69 10 E6 ED B1 21 A0 BA 70 94 71 92 24 71 27 00 i....!..p.q.$q'.
00E0: DD 5E A9 50 AB BC DD F9 5B D0 19 FB BD 2B 39 E2 .^.P....[....+9.
00F0: 05 F6 05 57 F5 3B C1 77 C3 41 E4 09 F1 4D 5D E0 ...W.;.w.A...M].
0100: 46 A3 06 61 3F D3 D8 6C C7 62 D5 89 20 F5 3E 35 F..a?..l.b.. .>5
0110: F1 53 6F D5 51 24 03 3F 99 F0 3A FA 43 2F 20 F0 .So.Q$.?..:.C/ .
0120: 54 D1 22 D5 CF C6 F5 2B 62 42 3A 06 E5 23 28 43 T."....+bB:..#(C
0130: 38 8
)
javax.net.ssl|DEBUG|A4|AsyncHttpClient-3-3|2024-08-06 12:43:36.117 CEST|SSLEngineInputRecord.java:213|READ: TLSv1.2 handshake, length = 300
javax.net.ssl|DEBUG|A4|AsyncHttpClient-3-3|2024-08-06 12:43:36.119 CEST|ECDHServerKeyExchange.java:525|Consuming ECDH ServerKeyExchange handshake message (
"ECDH ServerKeyExchange": {
"parameters": {
"named group": "x25519"
"ecdh public": {
0000: 1A 91 23 C3 D4 F9 EA 60 9B 74 6D F1 09 BB E1 3E ..#....`.tm....>
0010: 26 E1 C9 65 D0 1A 49 C8 9B CF 5D 91 D8 F1 B0 03 &..e..I...].....
},
},
"digital signature": {
"signature algorithm": "rsa_pss_rsae_sha256"
"signature": {
0000: D4 5F 08 0D 61 F7 6E C7 42 26 3A 37 C3 A5 7B F3 ._..a.n.B&:7....
0010: D7 69 5E D0 D5 4E 72 D4 56 3A CF E2 07 97 76 5B .i^..Nr.V:....v[
0020: B8 03 ED 01 78 46 14 BC 38 A7 AE 73 27 5E 9A 09 ....xF..8..s'^..
0030: CF DB D2 83 40 98 C8 AB BA 6A 37 38 A6 57 C6 47 [email protected]
0040: 0D 41 F0 FC A7 1E 59 F5 A0 0A 41 E8 EF 94 17 5C .A....Y...A....\
0050: 37 BC 55 FB 1F EC 1D 08 D1 3E CD 80 20 86 A1 14 7.U......>.. ...
0060: 98 2D 61 E4 1A 78 A0 B7 8E AA B4 F4 98 81 AA B6 .-a..x..........
0070: 7F FA BD 19 86 64 62 9A A3 A3 10 4E DF 6F 12 BD .....db....N.o..
0080: 3C 60 8C 85 39 2C E5 C7 B4 D7 EB B0 FD 63 E8 A4 <`..9,.......c..
0090: 1D 37 BD 3D 8D 43 C1 E9 B2 41 DC EE 65 6A 19 69 .7.=.C...A..ej.i
00A0: 10 E6 ED B1 21 A0 BA 70 94 71 92 24 71 27 00 DD ....!..p.q.$q'..
00B0: 5E A9 50 AB BC DD F9 5B D0 19 FB BD 2B 39 E2 05 ^.P....[....+9..
00C0: F6 05 57 F5 3B C1 77 C3 41 E4 09 F1 4D 5D E0 46 ..W.;.w.A...M].F
00D0: A3 06 61 3F D3 D8 6C C7 62 D5 89 20 F5 3E 35 F1 ..a?..l.b.. .>5.
00E0: 53 6F D5 51 24 03 3F 99 F0 3A FA 43 2F 20 F0 54 So.Q$.?..:.C/ .T
00F0: D1 22 D5 CF C6 F5 2B 62 42 3A 06 E5 23 28 43 38 ."....+bB:..#(C8
},
}
}
)
javax.net.ssl|DEBUG|A4|AsyncHttpClient-3-3|2024-08-06 12:43:36.119 CEST|SSLEngineInputRecord.java:176|Raw read (
0000: 16 03 03 00 04 0E 00 00 00 .........
)
javax.net.ssl|DEBUG|A4|AsyncHttpClient-3-3|2024-08-06 12:43:36.119 CEST|SSLEngineInputRecord.java:213|READ: TLSv1.2 handshake, length = 4
javax.net.ssl|DEBUG|A4|AsyncHttpClient-3-3|2024-08-06 12:43:36.119 CEST|ServerHelloDone.java:151|Consuming ServerHelloDone handshake message (
<empty>
)
javax.net.ssl|DEBUG|A4|AsyncHttpClient-3-3|2024-08-06 12:43:36.124 CEST|ECDHClientKeyExchange.java:407|Produced ECDHE ClientKeyExchange handshake message (
"ECDH ClientKeyExchange": {
"ecdh public": {
0000: DF DE 34 CC 2C F7 99 CD A7 39 4B 4F 1B C6 9A B0 ..4.,....9KO....
0010: 64 F1 41 4D 60 D3 B1 1F F1 B9 5F A1 83 E6 95 23 d.AM`....._....#
},
}
)
javax.net.ssl|DEBUG|A4|AsyncHttpClient-3-3|2024-08-06 12:43:36.126 CEST|ChangeCipherSpec.java:115|Produced ChangeCipherSpec message
javax.net.ssl|DEBUG|A4|AsyncHttpClient-3-3|2024-08-06 12:43:36.126 CEST|Finished.java:396|Produced client Finished handshake message (
"Finished": {
"verify data": {
0000: 5F F9 21 46 07 95 76 72 9B A8 F8 0D
}'}
)
javax.net.ssl|DEBUG|A4|AsyncHttpClient-3-3|2024-08-06 12:43:36.126 CEST|SSLEngineOutputRecord.java:530|WRITE: TLSv1.2 handshake, length = 37
javax.net.ssl|DEBUG|A4|AsyncHttpClient-3-3|2024-08-06 12:43:36.126 CEST|SSLEngineOutputRecord.java:551|Raw write (
0000: 16 03 03 00 25 10 00 00 21 20 DF DE 34 CC 2C F7 ....%...! ..4.,.
0010: 99 CD A7 39 4B 4F 1B C6 9A B0 64 F1 41 4D 60 D3 ...9KO....d.AM`.
0020: B1 1F F1 B9 5F A1 83 E6 95 23 ...._....#
)
javax.net.ssl|DEBUG|A4|AsyncHttpClient-3-3|2024-08-06 12:43:36.126 CEST|SSLEngineOutputRecord.java:530|WRITE: TLSv1.2 change_cipher_spec, length = 1
javax.net.ssl|DEBUG|A4|AsyncHttpClient-3-3|2024-08-06 12:43:36.126 CEST|SSLEngineOutputRecord.java:551|Raw write (
0000: 14 03 03 00 01 01 ......
)
javax.net.ssl|DEBUG|A4|AsyncHttpClient-3-3|2024-08-06 12:43:36.127 CEST|SSLEngineOutputRecord.java:530|WRITE: TLSv1.2 handshake, length = 16
javax.net.ssl|DEBUG|A4|AsyncHttpClient-3-3|2024-08-06 12:43:36.127 CEST|SSLCipher.java:1773|Plaintext before ENCRYPTION (
0000: 14 00 00 0C 5F F9 21 46 07 95 76 72 9B A8 F8 0D ...._.!F..vr....
)
javax.net.ssl|DEBUG|A4|AsyncHttpClient-3-3|2024-08-06 12:43:36.127 CEST|SSLEngineOutputRecord.java:551|Raw write (
0000: 16 03 03 00 28 00 00 00 00 00 00 00 00 41 5F F1 ....(........A_.
0010: 41 EE C5 75 22 18 E9 D9 10 93 18 15 C7 2C EB D2 A..u"........,..
0020: E4 79 CA B0 03 49 A6 72 C8 B0 2A FB 5C .y...I.r..*.\
)
javax.net.ssl|DEBUG|A4|AsyncHttpClient-3-3|2024-08-06 12:43:36.195 CEST|SSLEngineInputRecord.java:176|Raw read (
0000: 14 03 03 00 01 01 ......
)
javax.net.ssl|DEBUG|A4|AsyncHttpClient-3-3|2024-08-06 12:43:36.195 CEST|SSLEngineInputRecord.java:213|READ: TLSv1.2 change_cipher_spec, length = 1
javax.net.ssl|DEBUG|A4|AsyncHttpClient-3-3|2024-08-06 12:43:36.195 CEST|ChangeCipherSpec.java:149|Consuming ChangeCipherSpec message
javax.net.ssl|DEBUG|A4|AsyncHttpClient-3-3|2024-08-06 12:43:36.195 CEST|SSLEngineInputRecord.java:176|Raw read (
0000: 16 03 03 00 28 AA E7 9A 1C C3 EB 91 CD CD 4C FA ....(.........L.
0010: 9F 2A D5 3A AE 96 4E F2 1C 0A 03 A2 CB BA A0 41 .*.:..N........A
0020: 3F 9C 59 F2 E3 EB 52 9C F1 24 7A F8 95 ?.Y...R..$z..
)
javax.net.ssl|DEBUG|A4|AsyncHttpClient-3-3|2024-08-06 12:43:36.195 CEST|SSLEngineInputRecord.java:213|READ: TLSv1.2 handshake, length = 40
javax.net.ssl|DEBUG|A4|AsyncHttpClient-3-3|2024-08-06 12:43:36.196 CEST|SSLCipher.java:1675|Plaintext after DECRYPTION (
0000: 14 00 00 0C 37 43 AD F2 F5 B5 BD A4 5E AD F0 2F ....7C......^../
)
javax.net.ssl|DEBUG|A4|AsyncHttpClient-3-3|2024-08-06 12:43:36.196 CEST|Finished.java:548|Consuming server Finished handshake message (
"Finished": {
"verify data": {
0000: 37 43 AD F2 F5 B5 BD A4 5E AD F0 2F
}'}
)
javax.net.ssl|DEBUG|A4|AsyncHttpClient-3-3|2024-08-06 12:43:36.196 CEST|SSLEngineOutputRecord.java:280|WRITE: TLSv1.2 application_data, length = 182
...
Context
(java.vendor.url,https://java.oracle.com/)
(java.vm.specification.version,17)
(os.name,Linux)
(sun.boot.library.path,/home/hhrutz/.jdks/openjdk-17.0.2/lib)
(java.version.date,2022-01-18)
(java.home,/home/hhrutz/.jdks/openjdk-17.0.2)
(java.runtime.version,17.0.2+8-86)
(os.version,6.1.0-21-amd64)
(java.vendor.version,null)
(os.arch,amd64)
(java.library.path,/usr/java/packages/lib:/usr/lib64:/lib64:/lib:/usr/lib)
(java.vm.info,mixed mode, sharing)
(java.vendor,Oracle Corporation)
From my lay perspective, I can see the various messages Ignore unsupported signature scheme: ecdsa_... in the first case, and I can see the ECDSA schemes appear in the 'hello' of the second case, so perhaps those are the ones I need and that are missing in Adoptium?
I can confirm that this is an Adoptium specific bug / problem. I tried to build my project using Amazon Corretto. For further context, it's a desktop application packaged with sbt-native-packager using jlink. No issues there:
javax.net.ssl|DEBUG|05|AsyncHttpClient-3-3|2024-08-06 13:21:39.600 CEST|SupportedGroupsExtension.java:365|Ignore inactive or disabled named group: ffdhe2048
javax.net.ssl|DEBUG|05|AsyncHttpClient-3-3|2024-08-06 13:21:39.600 CEST|SupportedGroupsExtension.java:365|Ignore inactive or disabled named group: ffdhe3072
javax.net.ssl|DEBUG|05|AsyncHttpClient-3-3|2024-08-06 13:21:39.600 CEST|SupportedGroupsExtension.java:365|Ignore inactive or disabled named group: ffdhe4096
javax.net.ssl|DEBUG|05|AsyncHttpClient-3-3|2024-08-06 13:21:39.600 CEST|SupportedGroupsExtension.java:365|Ignore inactive or disabled named group: ffdhe6144
javax.net.ssl|DEBUG|05|AsyncHttpClient-3-3|2024-08-06 13:21:39.600 CEST|SupportedGroupsExtension.java:365|Ignore inactive or disabled named group: ffdhe8192
javax.net.ssl|INFO|05|AsyncHttpClient-3-3|2024-08-06 13:21:39.600 CEST|AlpnExtension.java:182|No available application protocols
javax.net.ssl|DEBUG|05|AsyncHttpClient-3-3|2024-08-06 13:21:39.600 CEST|SSLExtensions.java:272|Ignore, context unavailable extension: application_layer_protocol_negotiation
javax.net.ssl|DEBUG|05|AsyncHttpClient-3-3|2024-08-06 13:21:39.600 CEST|SessionTicketExtension.java:410|Stateless resumption supported
javax.net.ssl|ALL|05|AsyncHttpClient-3-3|2024-08-06 13:21:39.600 CEST|SignatureScheme.java:412|Ignore disabled signature scheme: rsa_md5
javax.net.ssl|DEBUG|05|AsyncHttpClient-3-3|2024-08-06 13:21:39.601 CEST|ClientHello.java:641|Produced ClientHello handshake message (
"ClientHello": {
"client version" : "TLSv1.2",
"random" : "ED19462F9F54C82CF6B84C5094F8970BDD005C7C824D865F2F1A50AB18FA321C",
"session id" : "",
"cipher suites" : "[TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA(0xC013), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA(0xC014), TLS_RSA_WITH_AES_128_GCM_SHA256(0x009C), TLS_RSA_WITH_AES_128_CBC_SHA(0x002F), TLS_RSA_WITH_AES_256_CBC_SHA(0x0035)]",
"compression methods" : "00",
"extensions" : [
"server_name (0)": {
type=host_name (0), value=cdn.freesound.org
},
"status_request (5)": {
"certificate status type": ocsp
"OCSP status request": {
"responder_id": <empty>
"request extensions": {
<empty>
}
}
},
"supported_groups (10)": {
"versions": [x25519, secp256r1, secp384r1, secp521r1, x448]
},
"ec_point_formats (11)": {
"formats": [uncompressed]
},
"status_request_v2 (17)": {
"cert status request": {
"certificate status type": ocsp_multi
"OCSP status request": {
"responder_id": <empty>
"request extensions": {
<empty>
}
}
}
},
"extended_master_secret (23)": {
<empty>
},
"session_ticket (35)": {
<empty>
},
"signature_algorithms (13)": {
"signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, ed25519, ed448, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
},
"supported_versions (43)": {
"versions": [TLSv1.2]
},
"signature_algorithms_cert (50)": {
"signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, ed25519, ed448, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
},
"renegotiation_info (65,281)": {
"renegotiated connection": [<no renegotiated connection>]
}
]
}
)
javax.net.ssl|DEBUG|05|AsyncHttpClient-3-3|2024-08-06 13:21:39.605 CEST|SSLEngineOutputRecord.java:530|WRITE: TLSv1.2 handshake, length = 249
javax.net.ssl|DEBUG|05|AsyncHttpClient-3-3|2024-08-06 13:21:39.605 CEST|SSLEngineOutputRecord.java:551|Raw write (
0000: 16 03 03 00 F9 01 00 00 F5 03 03 ED 19 46 2F 9F .............F/.
0010: 54 C8 2C F6 B8 4C 50 94 F8 97 0B DD 00 5C 7C 82 T.,..LP......\..
0020: 4D 86 5F 2F 1A 50 AB 18 FA 32 1C 00 00 12 C0 2C M._/.P...2.....,
0030: C0 2B C0 2F C0 30 C0 13 C0 14 00 9C 00 2F 00 35 .+./.0......./.5
0040: 01 00 00 BA 00 00 00 16 00 14 00 00 11 63 64 6E .............cdn
0050: 2E 66 72 65 65 73 6F 75 6E 64 2E 6F 72 67 00 05 .freesound.org..
0060: 00 05 01 00 00 00 00 00 0A 00 0C 00 0A 00 1D 00 ................
0070: 17 00 18 00 19 00 1E 00 0B 00 02 01 00 00 11 00 ................
0080: 09 00 07 02 00 04 00 00 00 00 00 17 00 00 00 23 ...............#
0090: 00 00 00 0D 00 2C 00 2A 04 03 05 03 06 03 08 07 .....,.*........
00A0: 08 08 08 04 08 05 08 06 08 09 08 0A 08 0B 04 01 ................
00B0: 05 01 06 01 04 02 03 03 03 01 03 02 02 03 02 01 ................
00C0: 02 02 00 2B 00 03 02 03 03 00 32 00 2C 00 2A 04 ...+......2.,.*.
00D0: 03 05 03 06 03 08 07 08 08 08 04 08 05 08 06 08 ................
00E0: 09 08 0A 08 0B 04 01 05 01 06 01 04 02 03 03 03 ................
00F0: 01 03 02 02 03 02 01 02 02 FF 01 00 01 00 ..............
)
javax.net.ssl|DEBUG|05|AsyncHttpClient-3-3|2024-08-06 13:21:39.831 CEST|SSLEngineInputRecord.java:176|Raw read (
0000: 16 03 03 00 61 02 00 00 5D 03 03 81 D5 8B EC 94 ....a...].......
0010: 55 41 8F A0 AE E0 C3 C8 7F D0 0B E8 40 49 66 94 UA..........@If.
0020: 07 21 C7 44 4F 57 4E 47 52 44 01 20 AF E3 F4 D8 .!.DOWNGRD. ....
0030: AA 50 55 CF A4 21 A2 98 E2 CD 37 4F 11 E0 D4 07 .PU..!....7O....
0040: 08 E8 68 B8 1C 90 C3 EA EE 65 7E 3F C0 2F 00 00 ..h......e.?./..
0050: 15 FF 01 00 01 00 00 00 00 00 00 0B 00 04 03 00 ................
0060: 01 02 00 17 00 00 ......
)
javax.net.ssl|DEBUG|05|AsyncHttpClient-3-3|2024-08-06 13:21:39.832 CEST|SSLEngineInputRecord.java:213|READ: TLSv1.2 handshake, length = 97
javax.net.ssl|DEBUG|05|AsyncHttpClient-3-3|2024-08-06 13:21:39.832 CEST|ServerHello.java:897|Consuming ServerHello handshake message (
"ServerHello": {
"server version" : "TLSv1.2",
"random" : "81D58BEC9455418FA0AEE0C3C87FD00BE8404966940721C7444F574E47524401",
"session id" : "AFE3F4D8AA5055CFA421A298E2CD374F11E0D40708E868B81C90C3EAEE657E3F",
"cipher suite" : "TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F)",
"compression methods" : "00",
"extensions" : [
"renegotiation_info (65,281)": {
"renegotiated connection": [<no renegotiated connection>]
},
"server_name (0)": {
<empty extension_data field>
},
"ec_point_formats (11)": {
"formats": [uncompressed, ansiX962_compressed_prime, ansiX962_compressed_char2]
},
"extended_master_secret (23)": {
<empty>
}
]
}
)
javax.net.ssl|DEBUG|05|AsyncHttpClient-3-3|2024-08-06 13:21:39.832 CEST|SSLExtensions.java:185|Ignore unavailable extension: supported_versions
javax.net.ssl|DEBUG|05|AsyncHttpClient-3-3|2024-08-06 13:21:39.832 CEST|ServerHello.java:993|Negotiated protocol version: TLSv1.2
javax.net.ssl|DEBUG|05|AsyncHttpClient-3-3|2024-08-06 13:21:39.832 CEST|SSLExtensions.java:204|Consumed extension: renegotiation_info
javax.net.ssl|DEBUG|05|AsyncHttpClient-3-3|2024-08-06 13:21:39.832 CEST|SSLExtensions.java:204|Consumed extension: server_name
javax.net.ssl|DEBUG|05|AsyncHttpClient-3-3|2024-08-06 13:21:39.832 CEST|SSLExtensions.java:185|Ignore unavailable extension: max_fragment_length
javax.net.ssl|DEBUG|05|AsyncHttpClient-3-3|2024-08-06 13:21:39.832 CEST|SSLExtensions.java:185|Ignore unavailable extension: status_request
javax.net.ssl|DEBUG|05|AsyncHttpClient-3-3|2024-08-06 13:21:39.832 CEST|SSLExtensions.java:204|Consumed extension: ec_point_formats
javax.net.ssl|DEBUG|05|AsyncHttpClient-3-3|2024-08-06 13:21:39.833 CEST|SSLExtensions.java:185|Ignore unavailable extension: status_request_v2
javax.net.ssl|DEBUG|05|AsyncHttpClient-3-3|2024-08-06 13:21:39.833 CEST|SSLExtensions.java:204|Consumed extension: extended_master_secret
javax.net.ssl|DEBUG|05|AsyncHttpClient-3-3|2024-08-06 13:21:39.833 CEST|SSLExtensions.java:185|Ignore unavailable extension: session_ticket
javax.net.ssl|DEBUG|05|AsyncHttpClient-3-3|2024-08-06 13:21:39.833 CEST|SSLExtensions.java:204|Consumed extension: renegotiation_info
javax.net.ssl|ALL|05|AsyncHttpClient-3-3|2024-08-06 13:21:39.833 CEST|SSLSessionImpl.java:219|Session initialized: Session(1722943299833|TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256)
javax.net.ssl|WARNING|05|AsyncHttpClient-3-3|2024-08-06 13:21:39.833 CEST|SSLExtensions.java:227|Ignore impact of unsupported extension: server_name
javax.net.ssl|DEBUG|05|AsyncHttpClient-3-3|2024-08-06 13:21:39.833 CEST|SSLExtensions.java:219|Ignore unavailable extension: max_fragment_length
javax.net.ssl|DEBUG|05|AsyncHttpClient-3-3|2024-08-06 13:21:39.833 CEST|SSLExtensions.java:219|Ignore unavailable extension: status_request
javax.net.ssl|WARNING|05|AsyncHttpClient-3-3|2024-08-06 13:21:39.833 CEST|SSLExtensions.java:227|Ignore impact of unsupported extension: ec_point_formats
javax.net.ssl|DEBUG|05|AsyncHttpClient-3-3|2024-08-06 13:21:39.833 CEST|SSLExtensions.java:219|Ignore unavailable extension: application_layer_protocol_negotiation
javax.net.ssl|DEBUG|05|AsyncHttpClient-3-3|2024-08-06 13:21:39.833 CEST|SSLExtensions.java:219|Ignore unavailable extension: status_request_v2
javax.net.ssl|WARNING|05|AsyncHttpClient-3-3|2024-08-06 13:21:39.833 CEST|SSLExtensions.java:227|Ignore impact of unsupported extension: extended_master_secret
javax.net.ssl|DEBUG|05|AsyncHttpClient-3-3|2024-08-06 13:21:39.833 CEST|SSLExtensions.java:219|Ignore unavailable extension: session_ticket
javax.net.ssl|WARNING|05|AsyncHttpClient-3-3|2024-08-06 13:21:39.833 CEST|SSLExtensions.java:227|Ignore impact of unsupported extension: renegotiation_info
...
Context
(java.vendor.url,https://aws.amazon.com/corretto/)
(java.vm.specification.version,17)
(os.name,Linux)
(sun.boot.library.path,/usr/share/mellite/jre/lib)
(java.version.date,2024-07-16)
(java.home,/usr/share/mellite/jre)
(java.runtime.version,17.0.12+7-LTS)
(os.version,6.1.0-21-amd64)
(java.vendor.version,Corretto-17.0.12.7.1)
(os.arch,amd64)
(java.library.path,/usr/java/packages/lib:/usr/lib64:/lib64:/lib:/usr/lib)
(java.vm.info,mixed mode)
(java.vendor,Amazon.com Inc.)
We are marking this issue as stale because it has not been updated for a while. This is just a way to keep the support issues queue manageable. It will be closed soon unless the stale label is removed by a committer, or a new comment is made.
@Sciss So sorry I missed this! We ship the Mozilla set of certificates with Temurin (Corretto may ship a different set). You can try the latest 17.0.13 (some new ones were added recently) else you may need to manually add it to the cert store.
We are marking this issue as stale because it has not been updated for a while. This is just a way to keep the support issues queue manageable. It will be closed soon unless the stale label is removed by a committer, or a new comment is made.