My NodeManager is not reachable. - Tian Jin Oracle User Union

I had AIX migration from 6.1.9.4 to 6.1.9.7  After the migration i am facing the issue as below.When I start my nodemanager (ssl),I see that it has started on the port 5556.But when I see from admin console it gives SSLException.When I try to connect through nmconnect I get following errormain, WRITE: TLSv1 Handshake, length = 109[Raw write]: length = 1140000: 16 03 01 00 6d 01 00 00  69 03 01 58 b4 0e 82 b9  ....m...i..X....0010: 8c 04 da 6a b0 9a c3 d8  ae 13 e4 e5 ec 87 6c 54  ...j..........lT0020: 13 e2 62 c1 87 c0 2e 41  0b 3e 7f 00 00 1e 00 ff  ..b....A........0030: c0 09 c0 13 00 2f c0 04  c0 0e 00 33 00 32 c0 08  ...........3.2..0040: c0 12 00 0a c0 03 c0 0d  00 16 00 13 01 00 00 22  ................0050: 00 0a 00 18 00 16 00 17  00 13 00 15 00 18 00 19  ................0060: 00 0f 00 10 00 11 00 12  00 14 00 16 00 0b 00 02  ................0070: 01 00                                              ..[Raw read]: length = 50000: 15 03 01 00 02                                     .....[Raw read]: length = 20000: 02 28                                              ..main, READ: TLSv1 Alert, length = 2main, RECV TLSv1 ALERT:  fatal, handshake_failuremain, fatal: engine already closed.  Rethrowing javax.net.ssl.SSLException: Received fatal alert: handshake_failuremain, fatal: engine already closed.  Rethrowing javax.net.ssl.SSLException: Received fatal alert: handshake_failuremain, called closeOutbound()main, closeOutboundInternal()main, SEND TLSv1 ALERT:  warning, description = close_notifymain, WRITE: TLSv1 Alert, length = 2[Raw write]: length = 70000: 15 03 01 00 02 01 00                               .......Traceback (innermost last):  File "<console>", line 1, in ?  File "<iostream>", line 123, in nmConnect  File "<iostream>", line 653, in raiseWLSTExceptionWLSTException: Error occured while performing nmConnect : Cannot connect to Node Manager. : Received fatal alert: handshake_failure.

i have got a problem trying to connect to Nodemanager via WLST via nmConnect. I use Weblogic 12.1.3.0.0 on Oracle Linux 64.I got the following messagewls:/offline> nmConnect('weblogic','manager1','localhost','5556','test_domain','/u01/app/oracle/Middleware/test_projects/base_domain','plain')Connecting to Node Manager ...Traceback (innermost last):  File "<console>", line 1, in ?  File "<iostream>", line 111, in nmConnect  File "<iostream>", line 552, in raiseWLSTExceptionWLSTException: Error occurred while performing nmConnect : Cannot connect to Node Manager. : Received error message from Node Manager Server: [Processing for domain 'test_domain' failed due to configuration error: [The domain 'test_domain' at '/u01/app/oracle/Middleware/user_projects/domains/test_domain' was registered in the nodemanager.domains file. Maybe the supplied location '/u01/app/oracle/Middleware/test_projects/base_domain' is taken by mistake. Please check it.]]. Please check Node Manager log for details. Use dumpStack() to view the full stacktrace :wls:/offline>  That is wrong ?

Hello,Please confirm if you have recently change the weblogic password ? Prashant Umap

Related

RSA premaster secret error

Hello,
I'm developing a java tls ftp client. When I run it on my powebook (jdk 1.4.2_05) this works fine, however when I try to run the same code against the same server on windowsxp (jdk 1.5) I get an " RSA premaster secret error". My code is a slightly modified version of the code found in http://forum.java.sun.com/thread.jsp?forum=9&thread=535212
Does anybody know what the error means and how it can be fixed?
thanks,
Emiel.
For completeness here's the full output of the session:
---------------------------------------------------------------------------
234 AUTH TLS OK.
trigger seeding of SecureRandom
done seeding SecureRandom
export control - checking the cipher suites
export control - no cached value available...
export control - storing legal entry into cache...
%% No cached client session
*** ClientHello, TLSv1
RandomCookie: GMT: 1082374383 bytes = { 208, 252, 117, 151, 13, 69, 130, 81, 58, 49, 131, 77, 9, 48, 143, 3, 59, 255, 160, 14, 249, 58, 59, 8, 240, 150, 204, 74 }
Session ID: {}
Cipher Suites: [SSL_RSA_WITH_RC4_128_MD5, SSL_RSA_WITH_RC4_128_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_DES_CBC_SHA, SSL_DHE_RSA_WITH_DES_CBC_SHA, SSL_DHE_DSS_WITH_DES_CBC_SHA, SSL_RSA_EXPORT_WITH_RC4_40_MD5, SSL_RSA_EXPORT_WITH_DES40_CBC_SHA, SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA, SSL_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA]
Compression Methods: { 0 }
***
[write] MD5 and SHA1 hashes: len = 73
0000: 01 00 00 45 03 01 41 84 B9 EF D0 FC 75 97 0D 45 ...E..A.....u..E
0010: 82 51 3A 31 83 4D 09 30 8F 03 3B FF A0 0E F9 3A .Q:1.M.0..;....:
0020: 3B 08 F0 96 CC 4A 00 00 1E 00 04 00 05 00 2F 00 ;....J......../.
0030: 33 00 32 00 0A 00 16 00 13 00 09 00 15 00 12 00 3.2.............
0040: 03 00 08 00 14 00 11 01 00 .........
main, WRITE: TLSv1 Handshake, length = 73
[write] MD5 and SHA1 hashes: len = 98
0000: 01 03 01 00 39 00 00 00 20 00 00 04 01 00 80 00 ....9... .......
0010: 00 05 00 00 2F 00 00 33 00 00 32 00 00 0A 07 00 ..../..3..2.....
0020: C0 00 00 16 00 00 13 00 00 09 06 00 40 00 00 15 ............#...
0030: 00 00 12 00 00 03 02 00 80 00 00 08 00 00 14 00 ................
0040: 00 11 41 84 B9 EF D0 FC 75 97 0D 45 82 51 3A 31 ..A.....u..E.Q:1
0050: 83 4D 09 30 8F 03 3B FF A0 0E F9 3A 3B 08 F0 96 .M.0..;....:;...
0060: CC 4A .J
main, WRITE: SSLv2 client hello message, length = 98
main, READ: TLSv1 Handshake, length = 42
*** ServerHello, TLSv1
RandomCookie: GMT: 1082374383 bytes = { 52, 233, 60, 43, 185, 179, 44, 223, 26, 86, 103, 119, 13, 160, 194, 116, 2, 28, 53, 250, 46, 55, 90, 20, 56, 109, 52, 106 }
Session ID: {}
Cipher Suite: SSL_RSA_WITH_RC4_128_MD5
Compression Method: 0
***
%% Created: [Session-1, SSL_RSA_WITH_RC4_128_MD5]
** SSL_RSA_WITH_RC4_128_MD5
[read] MD5 and SHA1 hashes: len = 42
0000: 02 00 00 26 03 01 41 84 B9 EF 34 E9 3C 2B B9 B3 ...&..A...4.<+..
0010: 2C DF 1A 56 67 77 0D A0 C2 74 02 1C 35 FA 2E 37 ,..Vgw...t..5..7
0020: 5A 14 38 6D 34 6A 00 00 04 00 Z.8m4j....
main, READ: TLSv1 Handshake, length = 471
*** Certificate chain
chain [0] = [
[
Version: V3
Subject: EMAILADDRESS=none, CN=none, OU=none, O=none, L=none, ST=none, C=nl
Signature Algorithm: MD5withRSA, OID = 1.2.840.113549.1.1.4
Key: Sun RSA public key, 512 bits
modulus: 11098081486406261191796114211645654035308674233469313316362571139059657017831106491999436229882781613314634810526396154426211050331465166756403204277392009
public exponent: 65537
Validity: [From: Fri Sep 10 15:00:24 CEST 2004,
               To: Sun Oct 10 15:00:24 CEST 2004]
Issuer: EMAILADDRESS=none, CN=none, OU=none, O=none, L=none, ST=none, C=nl
SerialNumber: [    00]
]
Algorithm: [MD5withRSA]
Signature:
0000: 60 F6 7E F8 AC 4A 54 86 94 B7 88 B0 B4 D4 B3 E0 `....JT.........
0010: AA F6 4C 96 C2 2B 7C 0F 15 1D 45 47 D2 12 64 69 ..L..+....EG..di
0020: 36 09 02 9A D0 E7 BA AA BD 24 72 4D 59 14 63 94 6........$rMY.c.
0030: B0 BB 37 45 7B AB 1B 02 7D BD 30 0F DF 47 3F 52 ..7E......0..G?R
]
***
The fingerprint of the certificate received is :
de31678c77bcb976bc056541e3b1e53
Do you want to trust on it? y/n...
y
adding as trusted cert:
Subject: EMAILADDRESS=none, CN=none, OU=none, O=none, L=none, ST=none, C=nl
Issuer: EMAILADDRESS=none, CN=none, OU=none, O=none, L=none, ST=none, C=nl
Algorithm: RSA; Serial number: 0x0
Valid from Fri Sep 10 15:00:24 CEST 2004 until Sun Oct 10 15:00:24 CEST 2004
Found trusted certificate:
[
[
Version: V3
Subject: EMAILADDRESS=none, CN=none, OU=none, O=none, L=none, ST=none, C=nl
Signature Algorithm: MD5withRSA, OID = 1.2.840.113549.1.1.4
Key: Sun RSA public key, 512 bits
modulus: 11098081486406261191796114211645654035308674233469313316362571139059657017831106491999436229882781613314634810526396154426211050331465166756403204277392009
public exponent: 65537
Validity: [From: Fri Sep 10 15:00:24 CEST 2004,
               To: Sun Oct 10 15:00:24 CEST 2004]
Issuer: EMAILADDRESS=none, CN=none, OU=none, O=none, L=none, ST=none, C=nl
SerialNumber: [    00]
]
Algorithm: [MD5withRSA]
Signature:
0000: 60 F6 7E F8 AC 4A 54 86 94 B7 88 B0 B4 D4 B3 E0 `....JT.........
0010: AA F6 4C 96 C2 2B 7C 0F 15 1D 45 47 D2 12 64 69 ..L..+....EG..di
0020: 36 09 02 9A D0 E7 BA AA BD 24 72 4D 59 14 63 94 6........$rMY.c.
0030: B0 BB 37 45 7B AB 1B 02 7D BD 30 0F DF 47 3F 52 ..7E......0..G?R
]
[read] MD5 and SHA1 hashes: len = 471
0000: 0B 00 01 D3 00 01 D0 00 01 CD 30 82 01 C9 30 82 ..........0...0.
0010: 01 73 A0 03 02 01 02 02 01 00 30 0D 06 09 2A 86 .s........0...*.
0020: 48 86 F7 0D 01 01 04 05 00 30 6D 31 0B 30 09 06 H........0m1.0..
0030: 03 55 04 06 13 02 6E 6C 31 0D 30 0B 06 03 55 04 .U....nl1.0...U.
0040: 08 13 04 6E 6F 6E 65 31 0D 30 0B 06 03 55 04 07 ...none1.0...U..
0050: 13 04 6E 6F 6E 65 31 0D 30 0B 06 03 55 04 0A 13 ..none1.0...U...
0060: 04 6E 6F 6E 65 31 0D 30 0B 06 03 55 04 0B 13 04 .none1.0...U....
0070: 6E 6F 6E 65 31 0D 30 0B 06 03 55 04 03 13 04 6E none1.0...U....n
0080: 6F 6E 65 31 13 30 11 06 09 2A 86 48 86 F7 0D 01 one1.0...*.H....
0090: 09 01 16 04 6E 6F 6E 65 30 1E 17 0D 30 34 30 39 ....none0...0409
00A0: 31 30 31 33 30 30 32 34 5A 17 0D 30 34 31 30 31 10130024Z..04101
00B0: 30 31 33 30 30 32 34 5A 30 6D 31 0B 30 09 06 03 0130024Z0m1.0...
00C0: 55 04 06 13 02 6E 6C 31 0D 30 0B 06 03 55 04 08 U....nl1.0...U..
00D0: 13 04 6E 6F 6E 65 31 0D 30 0B 06 03 55 04 07 13 ..none1.0...U...
00E0: 04 6E 6F 6E 65 31 0D 30 0B 06 03 55 04 0A 13 04 .none1.0...U....
00F0: 6E 6F 6E 65 31 0D 30 0B 06 03 55 04 0B 13 04 6E none1.0...U....n
0100: 6F 6E 65 31 0D 30 0B 06 03 55 04 03 13 04 6E 6F one1.0...U....no
0110: 6E 65 31 13 30 11 06 09 2A 86 48 86 F7 0D 01 09 ne1.0...*.H.....
0120: 01 16 04 6E 6F 6E 65 30 5C 30 0D 06 09 2A 86 48 ...none0\0...*.H
0130: 86 F7 0D 01 01 01 05 00 03 4B 00 30 48 02 41 00 .........K.0H.A.
0140: D3 E6 4A D5 43 85 F3 A0 5A 20 2C 0C 23 13 29 99 ..J.C...Z ,.#.).
0150: 29 1F 84 4D 87 90 CC AD 10 C8 EB AF DF 55 8F F9 )..M.........U..
0160: 90 17 73 0F 5E 38 6A 3B B7 57 D8 77 AC 66 1C 13 ..s.^8j;.W.w.f..
0170: 42 FB 9E BD 1B 9D 46 25 59 12 35 18 10 63 D2 89 B.....F%Y.5..c..
0180: 02 03 01 00 01 30 0D 06 09 2A 86 48 86 F7 0D 01 .....0...*.H....
0190: 01 04 05 00 03 41 00 60 F6 7E F8 AC 4A 54 86 94 .....A.`....JT..
01A0: B7 88 B0 B4 D4 B3 E0 AA F6 4C 96 C2 2B 7C 0F 15 .........L..+...
01B0: 1D 45 47 D2 12 64 69 36 09 02 9A D0 E7 BA AA BD .EG..di6........
01C0: 24 72 4D 59 14 63 94 B0 BB 37 45 7B AB 1B 02 7D $rMY.c...7E.....
01D0: BD 30 0F DF 47 3F 52 .0..G?R
main, READ: TLSv1 Handshake, length = 4
*** ServerHelloDone
[read] MD5 and SHA1 hashes: len = 4
0000: 0E 00 00 00 ....
main, handling exception: javax.net.ssl.SSLKeyException: RSA premaster secret error
main, SEND TLSv1 ALERT: fatal, description = unexpected_message
main, WRITE: TLSv1 Alert, length = 2
main, called closeSocket()
Error in FtpClient.login()
FtpException: Error in startHandSkake() javax.net.ssl.SSLKeyException: RSA premaster secret error
---------------------------------------------------------------------------
Update: I've also tested this on my linux box using jdk1.5 and I get the same results (failure). However when I run the code on my linux box using jdk 1.4.2 it does work. Obviously something changed in jsse between 1.4 and 1.5... 
Got the same problem using martyr (irc framework) to connect to an irc server. Problems seems to have appeared when i switched to SDK 1.5.0. Will have to downgrade to solve this.
Did you find any solutions to getting this working with 1.5?
Thanks 
It works now, i'm not entirely sure what was wrong but it seems to have been a problem with JCE.
With 1.4 and JCE installed i got the error "javax.net.ssl.SSLException: java.lang.SecurityException: JCE cannot authenticate the provider SunJCE".
Using gentoo i merged sun-jdk with USE=jce, i must have missed something initially but now it works with bot 1.4.2-06 and 1.5.0.
Cheers 
I found the specific cause. It only happens when i launch through my IDE, eclipse. 
... and only in debug mode...
damn, should have figured this out earlier. 
Yes it is eclipse. But on my side it is not debug mode or default run mode.
On my side it the the jre.
If i select the jre1.5 it produces the error
If i select the jdk/jre1.5 it works fine
But i have no idea whats the difference
CU
Sebastian 
Hi ,
I am also getting the error RSA premaster secret error while invoking via JRE 1.5.
However, it works fine with JDK 1.5.
Do anybody have solution, kindly help me.
The trace goes as follows
javax.net.ssl.SSLKeyException: RSA premaster secret error
at com.sun.net.ssl.internal.ssl.PreMasterSecret.<init>(Unknown Source)
at com.sun.net.ssl.internal.ssl.ClientHandshaker.serverHelloDone(Unknown Source)
Thanks & Regards
Raghavan 
Can you please explain in detail as to how you got rid of this problem. Thanks and Happy New Year 
I had the same error running debug in Eclipse. To fix it apart from selecting the jre from inside the jdk I also had to select Use default system libraries 
see also http://forum.java.sun.com/thread.jspa?threadID=581431 
Download and install the Java Cryptography Extension (JCE) Unlimited Strength Jurisdiction Policy Files version 5.0. http://java.sun.com/j2se/1.5.0/download.jsp
Due to import control restrictions, the version of JCE policy files that
are bundled in the JDK(TM) 5.0 environment allow "strong" but limited
cryptography to be used. 
see also http://www.bouncycastle.org/devmailarchive/msg04733.html 
since it really appears to be an eclipse problem, I also opened a bug there https://bugs.eclipse.org/bugs/show_bug.cgi?id=95898 
I have encountered this same error when running the wscompile utility against WSDL on a site with SSL. I have downloaded and installed the revised policy files to no avail. I am using the JDK1.5.0_03 and JWSDP 1.5. I get the same error regardless of running from within eclipse or from a command line prompt. Any assistance would be appreciated.

TLSv1.2 - Need Help, please...

While using java jdk v1.7, I am getting the following;  *** ClientHello, TLSv1.2RandomCookie:  GMT: 1461620728 bytes = { 108, 100, 227, 235, 179, 145, 133, 71, 247, 224, 200, 65, 81, 202, 136, 65, 118, 243, 50, 106, 122, 145, 126, 214, 181, 95, 129, 74 }Session ID:  {}Cipher Suites: [TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA, TLS_ECDHE_ECDSA_WITH_RC4_128_SHA, TLS_ECDHE_RSA_WITH_RC4_128_SHA, SSL_RSA_WITH_RC4_128_SHA, TLS_ECDH_ECDSA_WITH_RC4_128_SHA, TLS_ECDH_RSA_WITH_RC4_128_SHA, SSL_RSA_WITH_RC4_128_MD5, TLS_EMPTY_RENEGOTIATION_INFO_SCSV]Compression Methods:  { 0 }Extension elliptic_curves, curve names: {secp256r1, sect163k1, sect163r2, secp192r1, secp224r1, sect233k1, sect233r1, sect283k1, sect283r1, secp384r1, sect409k1, sect409r1, secp521r1, sect571k1, sect571r1, secp160k1, secp160r1, secp160r2, sect163r1, secp192k1, sect193r1, sect193r2, secp224k1, sect239k1, secp256k1}Extension ec_point_formats, formats: [uncompressed]Extension signature_algorithms, signature_algorithms: SHA512withECDSA, SHA512withRSA, SHA384withECDSA, SHA384withRSA, SHA256withECDSA, SHA256withRSA, SHA224withECDSA, SHA224withRSA, SHA1withECDSA, SHA1withRSA, SHA1withDSA, MD5withRSAExtension server_name, server_name: [host_name: tls-test.clarityservices.com]***[write] MD5 and SHA1 hashes:  len = 2160000: 01 00 00 D4 03 03 57 1F   90 F8 6C 64 E3 EB B3 91  ......W...ld....0010: 85 47 F7 E0 C8 41 51 CA   88 41 76 F3 32 6A 7A 91  .G...AQ..Av.2jz.0020: 7E D6 B5 5F 81 4A 00 00   2A C0 09 C0 13 00 2F C0  ..._.J..*...../.0030: 04 C0 0E 00 33 00 32 C0   08 C0 12 00 0A C0 03 C0  ....3.2.........0040: 0D 00 16 00 13 C0 07 C0   11 00 05 C0 02 C0 0C 00  ................0050: 04 00 FF 01 00 00 81 00   0A 00 34 00 32 00 17 00  ..........4.2...0060: 01 00 03 00 13 00 15 00   06 00 07 00 09 00 0A 00  ................0070: 18 00 0B 00 0C 00 19 00   0D 00 0E 00 0F 00 10 00  ................0080: 11 00 02 00 12 00 04 00   05 00 14 00 08 00 16 00  ................0090: 0B 00 02 01 00 00 0D 00   1A 00 18 06 03 06 01 05  ................00A0: 03 05 01 04 03 04 01 03   03 03 01 02 03 02 01 02  ................00B0: 02 01 01 00 00 00 21 00   1F 00 00 1C 74 6C 73 2D  ......!.....tls-00C0: 74 65 73 74 2E 63 6C 61   72 69 74 79 73 65 72 76  test.clarityserv00D0: 69 63 65 73 2E 63 6F 6D                            ices.com1, WRITE: TLSv1.2 Handshake, length = 216[Raw write]: length = 2210000: 16 03 03 00 D8 01 00 00   D4 03 03 57 1F 90 F8 6C  ...........W...l0010: 64 E3 EB B3 91 85 47 F7   E0 C8 41 51 CA 88 41 76  d.....G...AQ..Av0020: F3 32 6A 7A 91 7E D6 B5   5F 81 4A 00 00 2A C0 09  .2jz...._.J..*..0030: C0 13 00 2F C0 04 C0 0E   00 33 00 32 C0 08 C0 12  .../.....3.2....0040: 00 0A C0 03 C0 0D 00 16   00 13 C0 07 C0 11 00 05  ................0050: C0 02 C0 0C 00 04 00 FF   01 00 00 81 00 0A 00 34  ...............40060: 00 32 00 17 00 01 00 03   00 13 00 15 00 06 00 07  .2..............0070: 00 09 00 0A 00 18 00 0B   00 0C 00 19 00 0D 00 0E  ................0080: 00 0F 00 10 00 11 00 02   00 12 00 04 00 05 00 14  ................0090: 00 08 00 16 00 0B 00 02   01 00 00 0D 00 1A 00 18  ................00A0: 06 03 06 01 05 03 05 01   04 03 04 01 03 03 03 01  ................00B0: 02 03 02 01 02 02 01 01   00 00 00 21 00 1F 00 00  ...........!....00C0: 1C 74 6C 73 2D 74 65 73   74 2E 63 6C 61 72 69 74  .tls-test.clarit00D0: 79 73 65 72 76 69 63 65   73 2E 63 6F 6D           yservices.com[Raw read]: length = 50000: 15 03 03 00 02                                     .....[Raw read]: length = 20000: 02 28                                              .(1, READ: TLSv1.2 Alert, length = 21, RECV TLSv1 ALERT:  fatal, handshake_failure1, called closeSocket()1, handling exception: javax.net.ssl.SSLHandshakeException: Received fatal alert: handshake_failure1, called close()1, called closeInternal(true)  Why does it show TLSv1 and fatal, handshake_failure?  Is it the other side that's responding with the TLSv1? Any help would be greatly appreciated.  Thanx.
Hi there, This question needs to be moved to the core Java community.  The Java User Groups community is for discussing Java User Groups. #Moderators can you please move this?
When I try to move it, I only see "Java Enterprise Edition" as a viable option to select.  Is this the one or is there a different group? Thanx.Dave Wygonowski
There should be a Java SE option...
Only option I have available is "Java SE Early Access", under Spaces\Java\Java SE.  Is this the one?  When I go to the Groups, it loads up to "Heartland Oracle Users Group" and that's it.Here are all the options under the Java SE space; Back to Java SE Abstract Window Toolkit (AWT)AccessibilityInternationalization (I18N)Java 2DJava 3DJava Applet DevelopmentJava Desktop ApplicationsJava Install / AutoupdateJava Media FrameworkJava Plug-InJava Runtime Environment (JRE)Java SE Early AccessJava SoundJava UpgradeJava Web Start & JNLPJavaFX 2.0 and LaterSwing
Not sure then sorry - I'm just a user as well, hopefully an Admin can help out
Thanx for the help.

Unrecognized SSL message, plaintext connection?

Hi:
I'm getting the an SSLException with the message "Unrecognized SSL message, plaintext connection?" in the first call to unwrap() in the server-side of a handshake. I've turned debugging on. The client and server are running as a junit test, so their debug output appears in the same window in eclipse. Here's the output:
%% No cached client session
*** ClientHello, TLSv1
RandomCookie: GMT: 1124231865 bytes = { 196, 56, 199, 85, 79, 168, 16, 131, 242, 111, 117, 228, 52, 80, 183, 128, 120, 237, 240, 149, 73, 189, 92, 43, 107, 126, 175, 148 }
Session ID: {}
Cipher Suites: [SSL_RSA_WITH_RC4_128_MD5, SSL_RSA_WITH_RC4_128_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_DES_CBC_SHA, SSL_DHE_RSA_WITH_DES_CBC_SHA, SSL_DHE_DSS_WITH_DES_CBC_SHA, SSL_RSA_EXPORT_WITH_RC4_40_MD5, SSL_RSA_EXPORT_WITH_DES40_CBC_SHA, SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA, SSL_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA]
Compression Methods: { 0 }
***
[write] MD5 and SHA1 hashes: len = 73
0000: 01 00 00 45 03 01 43 02 6B B9 C4 38 C7 55 4F A8 ...E..C.k..8.UO.
0010: 10 83 F2 6F 75 E4 34 50 B7 80 78 ED F0 95 49 BD ...ou.4P..x...I.
0020: 5C 2B 6B 7E AF 94 00 00 1E 00 04 00 05 00 2F 00 \+k.........../.
0030: 33 00 32 00 0A 00 16 00 13 00 09 00 15 00 12 00 3.2.............
0040: 03 00 08 00 14 00 11 01 00 .........
main, WRITE: TLSv1 Handshake, length = 73
[write] MD5 and SHA1 hashes: len = 98
0000: 01 03 01 00 39 00 00 00 20 00 00 04 01 00 80 00 ....9... .......
0010: 00 05 00 00 2F 00 00 33 00 00 32 00 00 0A 07 00 ..../..3..2.....
0020: C0 00 00 16 00 00 13 00 00 09 06 00 40 00 00 15 ............#...
0030: 00 00 12 00 00 03 02 00 80 00 00 08 00 00 14 00 ................
0040: 00 11 43 02 6B B9 C4 38 C7 55 4F A8 10 83 F2 6F ..C.k..8.UO....o
0050: 75 E4 34 50 B7 80 78 ED F0 95 49 BD 5C 2B 6B 7E u.4P..x...I.\+k.
0060: AF 94 ..
main, WRITE: SSLv2 client hello message, length = 98
[Raw write]: length = 100
0000: 80 62 01 03 01 00 39 00 00 00 20 00 00 04 01 00 .b....9... .....
0010: 80 00 00 05 00 00 2F 00 00 33 00 00 32 00 00 0A ....../..3..2...
0020: 07 00 C0 00 00 16 00 00 13 00 00 09 06 00 40 00 ..............#.
0030: 00 15 00 00 12 00 00 03 02 00 80 00 00 08 00 00 ................
0040: 14 00 00 11 43 02 6B B9 C4 38 C7 55 4F A8 10 83 ....C.k..8.UO...
0050: F2 6F 75 E4 34 50 B7 80 78 ED F0 95 49 BD 5C 2B .ou.4P..x...I.\+
0060: 6B 7E AF 94 k...
NIO-ChannelServicer Thread, fatal error: 80: problem unwrapping net record
javax.net.ssl.SSLException: Unrecognized SSL message, plaintext connection?
NIO-ChannelServicer Thread, SEND TLSv1 ALERT: fatal, description = internal_error
NIO-ChannelServicer Thread, WRITE: TLSv1 Alert, length = 2
I'm not sure what to look for to solve this. Any suggestions?
Regards,
Nick 
Also, here's the output of ssldump for the handshake:
New TCP connection #1: localhost.localdomain(35331) <-> localhost.localdomain(9845)
1 1  0.0485 (0.0485)  C>S SSLv2 compatible client hello
  Version 3.1
  cipher suites
  TLS_RSA_WITH_RC4_128_MD5
  SSL2_CK_RC4
  TLS_RSA_WITH_RC4_128_SHA
  Unknown value 0x2f
  Unknown value 0x33
  Unknown value 0x32
  TLS_RSA_WITH_3DES_EDE_CBC_SHA
  SSL2_CK_3DES
  TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA
  TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA
  TLS_RSA_WITH_DES_CBC_SHA
  SSL2_CK_DES
  TLS_DHE_RSA_WITH_DES_CBC_SHA
  TLS_DHE_DSS_WITH_DES_CBC_SHA
  TLS_RSA_EXPORT_WITH_RC4_40_MD5
  SSL2_CK_RC4_EXPORT40
  TLS_RSA_EXPORT_WITH_DES40_CBC_SHA
  TLS_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA
  TLS_DHE_DSS_EXPORT_WITH_DES40_CBC_SHAI notice that ssldump doesn't report the null compression method list in its output, but it is there in the debug output (in my previous post). Perhaps that's okay. This suggests to me that there's something wrong with the buffer that the server uses to read bytes from the network. The input buffer is initialized as follows in the constructor:
    wrappedReadBytes = ByteBuffer.allocate(sslSession.getPacketBufferSize());And the code that does the read/unwrap is:
    wrappedReadBytes.clear();
    bytesRead = channel.read(wrappedReadBytes);
    if (bytesRead == -1) {
        // handle error
    }
    try {
        result = sslEngine.unwrap(wrappedReadBytes, dst);
    } catch (SSLException ssle) {
        // handle exception
    }Is there anything obviously wrong with this?
Regards,
Nick 
The obviously wrong thing is, I just discovered, that wrappedReadBytes must be flipped before passing it to unwrap. :) 
You will also need to loop around unwrap until you get a BUFFER_UNDERFLOW result or getHandshakeStatus no longer returns NEED_UNWRAP. This is because unwrap() may not use up all of the data in the buffer in one call. Take a look at Sun's example in JDK_DIR/sample/nio/server/ChannelIOSecure.java

SSL handshake failure

I'm trying to connect to a server who is supposed to support TLSv1 and SSLv3 but without success. I'm using InstallCert.java for testing purposes and can fetch certificates from a lot of servers without problems but it fails with javax.net.ssl.SSLHandshakeException: Received fatal alert: handshake_failure against the server that i want to run it against. Works to connect with firefox though so the server seams to be quite okey.. I have no access to any logs on the server but here's the output when i run InstallCert.java with -Djavax.net.debug=all.
trigger seeding of SecureRandom
done seeding SecureRandom
Opening connection to 194.14.58.9:19100...
main, setSoTimeout(10000) called
Starting SSL handshake...
%% No cached client session
*** ClientHello, TLSv1
RandomCookie: GMT: 1192395754 bytes = { 74, 175, 190, 30, 55, 18, 194, 238, 25, 155, 61, 85, 140, 26, 148, 49, 193, 153, 73, 116, 219, 41, 231, 64, 248, 105, 70, 146 }
Session ID: {}
Cipher Suites: [SSL_RSA_WITH_RC4_128_MD5, SSL_RSA_WITH_RC4_128_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_DES_CBC_SHA, SSL_DHE_RSA_WITH_DES_CBC_SHA, SSL_DHE_DSS_WITH_DES_CBC_SHA, SSL_RSA_EXPORT_WITH_RC4_40_MD5, SSL_RSA_EXPORT_WITH_DES40_CBC_SHA, SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA, SSL_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA]
Compression Methods: { 0 }
***
[write] MD5 and SHA1 hashes: len = 73
0000: 01 00 00 45 03 01 47 13 84 EA 4A AF BE 1E 37 12 ...E..G...J...7.
0010: C2 EE 19 9B 3D 55 8C 1A 94 31 C1 99 49 74 DB 29 ....=U...1..It.)
0020: E7 40 F8 69 46 92 00 00 1E 00 04 00 05 00 2F 00 .#.iF........./.
0030: 33 00 32 00 0A 00 16 00 13 00 09 00 15 00 12 00 3.2.............
0040: 03 00 08 00 14 00 11 01 00 .........
main, WRITE: TLSv1 Handshake, length = 73
[write] MD5 and SHA1 hashes: len = 98
0000: 01 03 01 00 39 00 00 00 20 00 00 04 01 00 80 00 ....9... .......
0010: 00 05 00 00 2F 00 00 33 00 00 32 00 00 0A 07 00 ..../..3..2.....
0020: C0 00 00 16 00 00 13 00 00 09 06 00 40 00 00 15 ............#...
0030: 00 00 12 00 00 03 02 00 80 00 00 08 00 00 14 00 ................
0040: 00 11 47 13 84 EA 4A AF BE 1E 37 12 C2 EE 19 9B ..G...J...7.....
0050: 3D 55 8C 1A 94 31 C1 99 49 74 DB 29 E7 40 F8 69 =U...1..It.).#.i
0060: 46 92 F.
main, WRITE: SSLv2 client hello message, length = 98
[Raw write]: length = 100
0000: 80 62 01 03 01 00 39 00 00 00 20 00 00 04 01 00 .b....9... .....
0010: 80 00 00 05 00 00 2F 00 00 33 00 00 32 00 00 0A ....../..3..2...
0020: 07 00 C0 00 00 16 00 00 13 00 00 09 06 00 40 00 ..............#.
0030: 00 15 00 00 12 00 00 03 02 00 80 00 00 08 00 00 ................
0040: 14 00 00 11 47 13 84 EA 4A AF BE 1E 37 12 C2 EE ....G...J...7...
0050: 19 9B 3D 55 8C 1A 94 31 C1 99 49 74 DB 29 E7 40 ..=U...1..It.).#
0060: F8 69 46 92 .iF.
[Raw read]: length = 5
0000: 15 03 01 00 02 .....
[Raw read]: length = 2
0000: 02 28 .(
main, READ: TLSv1 Alert, length = 2
main, RECV TLSv1 ALERT: fatal, handshake_failure
main, called closeSocket()
main, handling exception: javax.net.ssl.SSLHandshakeException: Received fatal alert: handshake_failure
javax.net.ssl.SSLHandshakeException: Received fatal alert: handshake_failure
at com.sun.net.ssl.internal.ssl.Alerts.getSSLException(Alerts.java:174)
at com.sun.net.ssl.internal.ssl.Alerts.getSSLException(Alerts.java:136)
at com.sun.net.ssl.internal.ssl.SSLSocketImpl.recvAlert(SSLSocketImpl.java:1657)
at com.sun.net.ssl.internal.ssl.SSLSocketImpl.readRecord(SSLSocketImpl.java:932)
at com.sun.net.ssl.internal.ssl.SSLSocketImpl.performInitialHandshake(SSLSocketImpl.java:1096)
at com.sun.net.ssl.internal.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:1123)
at com.sun.net.ssl.internal.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:1107)
at InstallCert.main(InstallCert.java:70)
Could not obtain server certificate chain
Help would be greatly appreciated
Thanks in advance!
//Marcus 
The server seems to be set up with useClientMode=true. There is no ServerHello, just two ClientHellos, one from the server and one from you. 
ejp, have I missed something? All I see from the server is
[Raw read]: length = 5
0000: 15 03 01 00 02 .....
[Raw read]: length = 2
0000: 02 28 .( which is the handshake_failure alert. 
Seems I misread it.
Maybe the server won't accept the SSLv2ClientHello?
In which case the OP should just remove it from the enabled protocols. Long past its use-by date in any case. 
I have tried different protocols like TLSv1, SSLv3 and SSLv2Hello but same error all the time, but as I sad it works in firefox so they do something different then jsse, the question is what.. Do you have any more suggestions that i could try? 
ghstark wrote:
ejp, have I missed something? All I see from the server is
[Raw read]: length = 5
0000: 15 03 01 00 02 .....
[Raw read]: length = 2
0000: 02 28 .( which is the handshake_failure alert.That's all there is to see.. I'm confused to.. :( 
I don't think you've tried my first suggestion yet. Remove SSLv2Hello from the enabled protocols. 
ejp wrote:
I don't think you've tried my first suggestion yet. Remove SSLv2Hello from the enabled protocols.socket.setEnabledProtocols(new String[] {"TLSv1","SSLv3"});trigger seeding of SecureRandom
done seeding SecureRandom
Opening connection to 194.14.58.9:19100...
main, setSoTimeout(10000) called
Starting SSL handshake...
%% No cached client session
*** ClientHello, TLSv1
RandomCookie: GMT: 1192517154 bytes = { 197, 21, 97, 186, 21, 179, 52, 66, 202, 119, 153, 223, 28, 61, 234, 105, 74, 162, 196, 61, 181, 218, 157, 8, 76, 56, 11, 238 }
Session ID: {}
Cipher Suites: [SSL_RSA_WITH_RC4_128_MD5, SSL_RSA_WITH_RC4_128_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_DES_CBC_SHA, SSL_DHE_RSA_WITH_DES_CBC_SHA, SSL_DHE_DSS_WITH_DES_CBC_SHA, SSL_RSA_EXPORT_WITH_RC4_40_MD5, SSL_RSA_EXPORT_WITH_DES40_CBC_SHA, SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA, SSL_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA]
Compression Methods: { 0 }
***
[write] MD5 and SHA1 hashes: len = 73
0000: 01 00 00 45 03 01 47 14 5E 22 C5 15 61 BA 15 B3 ...E..G.^"..a...
0010: 34 42 CA 77 99 DF 1C 3D EA 69 4A A2 C4 3D B5 DA 4B.w...=.iJ..=..
0020: 9D 08 4C 38 0B EE 00 00 1E 00 04 00 05 00 2F 00 ..L8........../.
0030: 33 00 32 00 0A 00 16 00 13 00 09 00 15 00 12 00 3.2.............
0040: 03 00 08 00 14 00 11 01 00 .........
main, WRITE: TLSv1 Handshake, length = 73
[Raw write]: length = 78
0000: 16 03 01 00 49 01 00 00 45 03 01 47 14 5E 22 C5 ....I...E..G.^".
0010: 15 61 BA 15 B3 34 42 CA 77 99 DF 1C 3D EA 69 4A .a...4B.w...=.iJ
0020: A2 C4 3D B5 DA 9D 08 4C 38 0B EE 00 00 1E 00 04 ..=....L8.......
0030: 00 05 00 2F 00 33 00 32 00 0A 00 16 00 13 00 09 .../.3.2........
0040: 00 15 00 12 00 03 00 08 00 14 00 11 01 00 ..............
[Raw read]: length = 5
0000: 15 03 01 00 02 .....
[Raw read]: length = 2
0000: 02 28 .(
main, READ: TLSv1 Alert, length = 2
main, RECV TLSv1 ALERT: fatal, handshake_failure
main, called closeSocket()
main, handling exception: javax.net.ssl.SSLHandshakeException: Received fatal alert: handshake_failure
javax.net.ssl.SSLHandshakeException: Received fatal alert: handshake_failure
at com.sun.net.ssl.internal.ssl.Alerts.getSSLException(Alerts.java:174)
at com.sun.net.ssl.internal.ssl.Alerts.getSSLException(Alerts.java:136)
at com.sun.net.ssl.internal.ssl.SSLSocketImpl.recvAlert(SSLSocketImpl.java:1657)
at com.sun.net.ssl.internal.ssl.SSLSocketImpl.readRecord(SSLSocketImpl.java:932)
at com.sun.net.ssl.internal.ssl.SSLSocketImpl.performInitialHandshake(SSLSocketImpl.java:1096)
at com.sun.net.ssl.internal.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:1123)
at com.sun.net.ssl.internal.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:1107)
at InstallCert.main(InstallCert.java:71)
Could not obtain server certificate chain 
OK, so either the server won't agree to any of the cipher suites that are sent with the ClientHello, or else it is an SSLv2 server and won't speak SSLv3 or TLSv1. Can you check that? One longwinded way is to use an IBM JDK, as IBM's JSSE supports SSLv2, although I imagine you would have to specifically enable it in the code. 
I have called the company hosting the server and that assure me that the server supports TLS 1.0 and SSL 3.0 but i'll go on and try with the IBM JDK, you'll hear from me again! The ciphersuite should be AES 256 SHA1, they told me and that is supported by jsse. 
AES 256 SHA1, they told me and that is supported by jsse.Well it's not in there the list your client sent with the ClientHello.
Have you downloaded and installed the JCE Unlimited Strength Jurisdiction files? 
Thanks!!
That was the problem! I'm a little angry though, I mean it's crazy that US-export rules stop me from getting a secure cipher by default! A good thing would be to put a little hint in the debug so that one try with the JCE Unlimited Strength Jurisdiction files directly and not tear one's hair off! I took for granted that the ones with no numbers where 256 bit ciphers... because in the JSSE user guide http://java.sun.com/javase/6/docs/technotes/guides/security/jsse/JSSERefGuide.html#Introduction they don't say anything about the fact that some ciphers isn't included. 
It's actually not due to US export rules: they were removed during the Clinton administration. It's now US sensitivity as to other countries' possible import rules ... 
Are you sure that they haven't put them rules back now when it's the Bush administration ;)
Okey, may be so but i works now and that's all that matters. Hope other people will see this thread as I think many has the same problems.. I have seen a lot of similar threads on the net.

SSL  handshaking problems

Hi All,
Does anybody have any clue why SSL stops normal handshaking process ???
It starts using MD5 and SHA1 hashes and then suddenly goes for a "Raw write" which caused generation of "javax.net.ssl.SSLException: Unrecognized SSL message, plaintext connection?"
The full stack trace is below, really appreciate any comments, please help...
Thanks
Victor
Stack trace:
X509KeyManager passed to SSLContext.init(): need an X509ExtendedKeyManager for SSLEngine use
trigger seeding of SecureRandom
done seeding SecureRandom
Authenticating with controller 10.2.0.245:25322
%% No cached client session
*** ClientHello, TLSv1
RandomCookie: GMT: 1134825562 bytes = { 144, 209, 196, 45, 65, 26, 3, 223, 78, 234, 60, 127, 116, 101, 198, 95, 194, 227, 66, 75, 94, 141, 98, 110, 249, 205, 120, 46 }
Session ID: {}
Cipher Suites: [SSL_RSA_WITH_RC4_128_MD5, SSL_RSA_WITH_RC4_128_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_DES_CBC_SHA, SSL_DHE_RSA_WITH_DES_CBC_SHA, SSL_DHE_DSS_WITH_DES_CBC_SHA, SSL_RSA_EXPORT_WITH_RC4_40_MD5, SSL_RSA_EXPORT_WITH_DES40_CBC_SHA, SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA, SSL_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA]
Compression Methods: { 0 }
***
[write] MD5 and SHA1 hashes: len = 73
0000: 01 00 00 45 03 01 44 A4 10 5A 90 D1 C4 2D 41 1A ...E..D..Z...-A.
0010: 03 DF 4E EA 3C 7F 74 65 C6 5F C2 E3 42 4B 5E 8D ..N.<.te._..BK^.
0020: 62 6E F9 CD 78 2E 00 00 1E 00 04 00 05 00 2F 00 bn..x........./.
0030: 33 00 32 00 0A 00 16 00 13 00 09 00 15 00 12 00 3.2.............
0040: 03 00 08 00 14 00 11 01 00 .........
Thread-3, WRITE: TLSv1 Handshake, length = 73
[write] MD5 and SHA1 hashes: len = 98
0000: 01 03 01 00 39 00 00 00 20 00 00 04 01 00 80 00 ....9... .......
0010: 00 05 00 00 2F 00 00 33 00 00 32 00 00 0A 07 00 ..../..3..2.....
0020: C0 00 00 16 00 00 13 00 00 09 06 00 40 00 00 15 ............#...
0030: 00 00 12 00 00 03 02 00 80 00 00 08 00 00 14 00 ................
0040: 00 11 44 A4 10 5A 90 D1 C4 2D 41 1A 03 DF 4E EA ..D..Z...-A...N.
0050: 3C 7F 74 65 C6 5F C2 E3 42 4B 5E 8D 62 6E F9 CD <.te._..BK^.bn..
0060: 78 2E x.
Thread-3, WRITE: SSLv2 client hello message, length = 98
[Raw write]: length = 100
0000: 80 62 01 03 01 00 39 00 00 00 20 00 00 04 01 00 .b....9... .....
0010: 80 00 00 05 00 00 2F 00 00 33 00 00 32 00 00 0A ....../..3..2...
0020: 07 00 C0 00 00 16 00 00 13 00 00 09 06 00 40 00 ..............#.
0030: 00 15 00 00 12 00 00 03 02 00 80 00 00 08 00 00 ................
0040: 14 00 00 11 44 A4 10 5A 90 D1 C4 2D 41 1A 03 DF ....D..Z...-A...
0050: 4E EA 3C 7F 74 65 C6 5F C2 E3 42 4B 5E 8D 62 6E N.<.te._..BK^.bn
0060: F9 CD 78 2E ..x.
[Raw read]: length = 5
0000: 00 01 00 00 00 .....
Thread-3, handling exception: javax.net.ssl.SSLException: Unrecognized SSL message, plaintext connection?
Thread-3, SEND TLSv1 ALERT: fatal, description = unexpected_message
Thread-3, WRITE: TLSv1 Alert, length = 2
[Raw write]: length = 7
0000: 15 03 01 00 02 02 0A .......
Thread-3, called closeSocket()
Failed to connect to controller on 10.2.0.245:25322 (javax.net.ssl.SSLException: Unrecognized SSL message, plaintext connection?)
javax.net.ssl.SSLException: Unrecognized SSL message, plaintext connection?
at com.sun.net.ssl.internal.ssl.InputRecord.handleUnknownRecord(InputRecord.java:521)
at com.sun.net.ssl.internal.ssl.InputRecord.read(InputRecord.java:355)
at com.sun.net.ssl.internal.ssl.SSLSocketImpl.readRecord(SSLSocketImpl.java:722)
at com.sun.net.ssl.internal.ssl.SSLSocketImpl.performInitialHandshake(SSLSocketImpl.java:1029)
at com.sun.net.ssl.internal.ssl.SSLSocketImpl.writeRecord(SSLSocketImpl.java:621)
at com.sun.net.ssl.internal.ssl.AppOutputStream.write(AppOutputStream.java:59)
at java.io.BufferedOutputStream.flushBuffer(BufferedOutputStream.java:65)
at java.io.BufferedOutputStream.flush(BufferedOutputStream.java:123)
at java.io.DataOutputStream.flush(DataOutputStream.java:106)
at org.continuent.sequoia.driver.Driver.connectToController(Driver.java:420)
at org.continuent.sequoia.driver.Driver.connect(Driver.java:304)
at net.sourceforge.squirrel_sql.fw.sql.SQLDriverManager.getConnection(SQLDriverManager.java:125)
at net.sourceforge.squirrel_sql.client.mainframe.action.OpenConnectionCommand.execute(OpenConnectionCommand.java:97)
at net.sourceforge.squirrel_sql.client.mainframe.action.ConnectToAliasCommand$SheetHandler.run(ConnectToAliasCommand.java:381)
at net.sourceforge.squirrel_sql.fw.util.TaskExecuter.run(TaskExecuter.java:82)
at java.lang.Thread.run(Thread.java:619)
Controller 10.2.0.245:25322 is now suspected of failure
Controller 10.2.0.245:25322 is removed from suspect list 
you are connected to a site which isn't running SSL. 
Excuse me. I think I'm having the same problem. The first time my client tries to connect to the server, I get back "HTTP/"; then the connection is closed and I get the "unrecognized SSL message" exception.
What could cause this other than the server not using SSL? And is there any way to work around it?
Thanks,
Brian

Categories

Resources