API calling  with Time-outs

I am trying to implement a feature on a Stateless EJB so that when I try to access a resource and that resource doesn't respond at a given time, I want to interrupt the operation and get back to another processing (timeout).
Today I have this approach in J2SE using Threads but I know you cannot start Threads from within an EJB. Do you have any ideas on how to implement a timeout in this scenario? Could be something like:
J2EE Stateles EJB -- method call --> "Untrusted" Java API Call
What I'd like to do is to timeout this method call.
Any ideas?

It is the way you configure your pay elements.
the standard process doesn't pay for the balance
You need to handle using your formula

Similar Messages

  • Repository Creation fails with Time Out Error

    Hi
    I am trying a test setup of OVM3.1.1-305. I am using OpenFiler for iSCSI disks and have created 20GB iSCSI disk for Pool FileSystem and another 260GB iSCSI disk for Data Repository. The server pool gets created fine with the Pool FS and HA and Cluster options enabled. But while exposing the iSCSI disk for data store the job times out. Details of the error message is as below, please help!
    The Job has timed out while executing, and will be aborted.
    Job Construction Phase
    begin()
    Appended operation 'File System Construct' to object '0004fb000009000001b30fa7bc24bef1 (Local FS ibcovs1)'.
    Appended operation 'Cluster File System Present' to object 'fb5840a9a3a78f51'.
    Appended operation 'Repository Construct' to object '0004fb00000300009bfb51738df3f282 (OPNFILER (2))'.
    commit()
    Completed Step: COMMIT
    Objects and Operations
    Object (IN_USE): [LocalFileServer] 0004fb000009000001b30fa7bc24bef1 (Local FS ibcovs1)
    Operation: File System Construct
    Object (CREATED): [Repository] 0004fb00000300009bfb51738df3f282 (OVSRepos)
    Operation: Repository Construct
    Object (IN_USE): [LocalFileServer] 0004fb0000090000a8d525219658c28a (Local FS ibcovs2)
    Object (IN_USE): [Cluster] fb5840a9a3a78f51
    Operation: Cluster File System Present
    Object (CREATED): [LocalFileSystem] 0004fb00000500000cd1d94d87e829e8 (fs_OVSRepos)
    Object (IN_USE): [StorageElement] 0004fb0000180000bf6e8d3ff957b21b (OPNFILER (2))
    Job Running Phase at 04:01 on Mon, Dec 3, 2012
    Job Participants: [44:45:4c:4c:48:00:10:44:80:52:b4:c0:4f:33:42:53 (ibcovs1), 44:45:4c:4c:48:00:10:46:80:32:c6:c0:4f:34:42:53 (ibcovs2)]
    Actioner
    Starting operation 'File System Construct' on object '0004fb00000500000cd1d94d87e829e8 (fs_OVSRepos)'
    Job: 1354487506506, aborted post-commit by user: admin
    Write Methods Invoked
    Class=InternalJobDbImpl vessel_id=2477 method=addTransactionIdentifier accessLevel=6
    Class=LocalFileServerDbImpl vessel_id=788 method=createFileSystem accessLevel=6
    Class=LocalFileSystemDbImpl vessel_id=2486 method=setName accessLevel=6
    Class=LocalFileSystemDbImpl vessel_id=2486 method=setFoundryContext accessLevel=6
    Class=LocalFileSystemDbImpl vessel_id=2486 method=onPersistableCreate accessLevel=6
    Class=LocalFileSystemDbImpl vessel_id=2486 method=setLifecycleState accessLevel=6
    Class=LocalFileSystemDbImpl vessel_id=2486 method=setRollbackLifecycleState accessLevel=6
    Class=LocalFileSystemDbImpl vessel_id=2486 method=setRefreshed accessLevel=6
    Class=LocalFileSystemDbImpl vessel_id=2486 method=setBackingDevices accessLevel=6
    Class=LocalFileSystemDbImpl vessel_id=2486 method=setUuid accessLevel=6
    Class=LocalFileSystemDbImpl vessel_id=2486 method=setPath accessLevel=6
    Class=LocalFileSystemDbImpl vessel_id=2486 method=setSimpleName accessLevel=6
    Class=LocalFileSystemDbImpl vessel_id=2486 method=addFileServer accessLevel=6
    Class=LocalFileSystemDbImpl vessel_id=2486 method=setStorageDevice accessLevel=6
    Class=StorageElementDbImpl vessel_id=1121 method=addLayeredFileSystem accessLevel=6
    Class=LocalFileSystemDbImpl vessel_id=2486 method=setSimpleName accessLevel=6
    Class=LocalFileServerDbImpl vessel_id=922 method=addFileSystem accessLevel=6
    Class=LocalFileSystemDbImpl vessel_id=2486 method=addFileServer accessLevel=6
    Class=ClusterDbImpl vessel_id=1340 method=addLocalFileSystem accessLevel=6
    Class=LocalFileSystemDbImpl vessel_id=2486 method=setCluster accessLevel=6
    Class=LocalFileSystemDbImpl vessel_id=2486 method=setAsset accessLevel=6
    Class=LocalFileSystemDbImpl vessel_id=2486 method=createRepository accessLevel=6
    Class=RepositoryDbImpl vessel_id=2492 method=setName accessLevel=6
    Class=RepositoryDbImpl vessel_id=2492 method=setFoundryContext accessLevel=6
    Class=RepositoryDbImpl vessel_id=2492 method=onPersistableCreate accessLevel=6
    Class=RepositoryDbImpl vessel_id=2492 method=setLifecycleState accessLevel=6
    Class=RepositoryDbImpl vessel_id=2492 method=setRollbackLifecycleState accessLevel=6
    Class=RepositoryDbImpl vessel_id=2492 method=setRefreshed accessLevel=6
    Class=RepositoryDbImpl vessel_id=2492 method=setDom0Uuid accessLevel=6
    Class=RepositoryDbImpl vessel_id=2492 method=setSharePath accessLevel=6
    Class=RepositoryDbImpl vessel_id=2492 method=setSimpleName accessLevel=6
    Class=RepositoryDbImpl vessel_id=2492 method=setFileSystem accessLevel=6
    Class=LocalFileSystemDbImpl vessel_id=2486 method=addRepository accessLevel=6
    Class=RepositoryDbImpl vessel_id=2492 method=setManagerUuid accessLevel=6
    Class=RepositoryDbImpl vessel_id=2492 method=setVersion accessLevel=6
    Class=RepositoryDbImpl vessel_id=2492 method=addJobOperation accessLevel=6
    Class=RepositoryDbImpl vessel_id=2492 method=setSimpleName accessLevel=6
    Class=RepositoryDbImpl vessel_id=2492 method=setDescription accessLevel=6
    Class=InternalJobDbImpl vessel_id=2477 method=setCompletedStep accessLevel=6
    Class=InternalJobDbImpl vessel_id=2477 method=setAssociatedHandles accessLevel=6
    Job Internal Error (Operation)com.oracle.ovm.mgr.api.exception.FailedOperationException: OVMAPI_B000E Storage plugin command [storage_plugin_createFileSystem] failed for storage server [0004fb000009000001b30fa7bc24bef1] failed with [com.oracle.ovm.mgr.api.exception.FailedOperationException: OVMAPI_4010E Attempt to send command: dispatch to server: ibcovs1 failed. OVMAPI_4004E Server Failed Command: dispatch https://?uname?:[email protected]:8899/api/2 storage_plugin_createFileSystem oracle.ocfs2.OCFS2.OCFS2Plugin 0004fb00000500000cd1d94d87e829e8 /dev/mapper/14f504e46494c4552637a6f5154372d7643426d2d49333763 0, Status: java.lang.InterruptedException
    Mon Dec 03 04:03:48 IST 2012
    Mon Dec 03 04:03:48 IST 2012] OVMAPI_4010E Attempt to send command: dispatch to server: ibcovs1 failed. OVMAPI_4004E Server Failed Command: dispatch https://?uname?:[email protected]:8899/api/2 storage_plugin_createFileSystem oracle.ocfs2.OCFS2.OCFS2Plugin 0004fb00000500000cd1d94d87e829e8 /dev/mapper/14f504e46494c4552637a6f5154372d7643426d2d49333763 0, Status: java.lang.InterruptedException
    Mon Dec 03 04:03:48 IST 2012
    Mon Dec 03 04:03:48 IST 2012
    Mon Dec 03 04:03:48 IST 2012
    at com.oracle.ovm.mgr.action.StoragePluginAction.processException(StoragePluginAction.java:1371)
    at com.oracle.ovm.mgr.action.StoragePluginAction.createFileSystem(StoragePluginAction.java:894)
    at com.oracle.ovm.mgr.op.physical.storage.FileSystemConstruct.createFileSystem(FileSystemConstruct.java:57)
    at com.oracle.ovm.mgr.op.physical.storage.FileSystemConstruct.action(FileSystemConstruct.java:49)
    at com.oracle.ovm.mgr.api.collectable.ManagedObjectDbImpl.executeCurrentJobOperationAction(ManagedObjectDbImpl.java:1009)
    at com.oracle.odof.core.AbstractVessel.invokeMethod(AbstractVessel.java:330)
    at com.oracle.odof.core.AbstractVessel.invokeMethod(AbstractVessel.java:290)
    at com.oracle.odof.core.storage.Transaction.invokeMethod(Transaction.java:822)
    at com.oracle.odof.core.Exchange.invokeMethod(Exchange.java:245)
    at com.oracle.ovm.mgr.api.physical.storage.LocalFileServerProxy.executeCurrentJobOperationAction(Unknown Source)
    at com.oracle.ovm.mgr.api.job.JobEngine.operationActioner(JobEngine.java:218)
    at com.oracle.ovm.mgr.api.job.JobEngine.objectActioner(JobEngine.java:309)
    at com.oracle.ovm.mgr.api.job.InternalJobDbImpl.objectCommitter(InternalJobDbImpl.java:1140)
    at com.oracle.odof.core.AbstractVessel.invokeMethod(AbstractVessel.java:330)
    at com.oracle.odof.core.AbstractVessel.invokeMethod(AbstractVessel.java:290)
    at com.oracle.odof.core.BasicWork.invokeMethod(BasicWork.java:136)
    at com.oracle.odof.command.InvokeMethodCommand.process(InvokeMethodCommand.java:100)
    at com.oracle.odof.core.BasicWork.processCommand(BasicWork.java:81)
    at com.oracle.odof.core.TransactionManager.processCommand(TransactionManager.java:773)
    at com.oracle.odof.core.WorkflowManager.processCommand(WorkflowManager.java:401)
    at com.oracle.odof.core.WorkflowManager.processWork(WorkflowManager.java:459)
    at com.oracle.odof.io.AbstractClient.run(AbstractClient.java:42)
    at java.lang.Thread.run(Thread.java:662)
    Caused by: com.oracle.ovm.mgr.api.exception.FailedOperationException: OVMAPI_4010E Attempt to send command: dispatch to server: ibcovs1 failed. OVMAPI_4004E Server Failed Command: dispatch https://?uname?:[email protected]:8899/api/2 storage_plugin_createFileSystem oracle.ocfs2.OCFS2.OCFS2Plugin 0004fb00000500000cd1d94d87e829e8 /dev/mapper/14f504e46494c4552637a6f5154372d7643426d2d49333763 0, Status: java.lang.InterruptedException
    Mon Dec 03 04:03:48 IST 2012
    Mon Dec 03 04:03:48 IST 2012
    at com.oracle.ovm.mgr.action.ActionEngine.sendCommandToServer(ActionEngine.java:507)
    at com.oracle.ovm.mgr.action.ActionEngine.sendDispatchedServerCommand(ActionEngine.java:444)
    at com.oracle.ovm.mgr.action.ActionEngine.sendServerCommand(ActionEngine.java:378)
    at com.oracle.ovm.mgr.action.StoragePluginAction.createFileSystem(StoragePluginAction.java:890)
    ... 27 more
    Caused by: com.oracle.ovm.mgr.api.exception.IllegalOperationException: OVMAPI_4004E Server Failed Command: dispatch https://?uname?:[email protected]:8899/api/2 storage_plugin_createFileSystem oracle.ocfs2.OCFS2.OCFS2Plugin 0004fb00000500000cd1d94d87e829e8 /dev/mapper/14f504e46494c4552637a6f5154372d7643426d2d49333763 0, Status: java.lang.InterruptedException
    Mon Dec 03 04:03:48 IST 2012
    at com.oracle.ovm.mgr.action.ActionEngine.sendAction(ActionEngine.java:798)
    at com.oracle.ovm.mgr.action.ActionEngine.sendCommandToServer(ActionEngine.java:503)
    ... 30 more
    FailedOperationCleanup
    Starting failed operation 'File System Construct' cleanup on object 'fs_OVSRepos'
    Complete rollback operation 'File System Construct' completed with direction=fs_OVSRepos
    Rollbacker
    Executing rollback operation 'File System Construct' on object '0004fb00000500000cd1d94d87e829e8 (fs_OVSRepos)'
    Complete rollback operation 'File System Construct' completed with direction=DONE
    Objects To Be Rolled Back
    Object (IN_USE): [LocalFileServer] 0004fb000009000001b30fa7bc24bef1 (Local FS ibcovs1)
    Object (CREATED): [Repository] 0004fb00000300009bfb51738df3f282 (OVSRepos)
    Object (IN_USE): [LocalFileServer] 0004fb0000090000a8d525219658c28a (Local FS ibcovs2)
    Object (IN_USE): [Cluster] fb5840a9a3a78f51
    Object (CREATED): [LocalFileSystem] 0004fb00000500000cd1d94d87e829e8 (fs_OVSRepos)
    Object (IN_USE): [StorageElement] 0004fb0000180000bf6e8d3ff957b21b (OPNFILER (2))
    Thanks & Regards

    check your messages log and etc on the VM server. The job log doesn't go into enough detail to tell what's causing the issue. It did fail cleanup. Meaning.... that your ocfs2 filesystem is probably orphaned. You have have to clear the iSCSI LUN before trying again.

  • Dir API - Web services Time out

    Hi All,
    I am using Dir API web services to make some mass updates to Config objects. I have developed a client in Java and was able to access/edit the ID objects. The problem I am facing is since the number of objects in the change list is huge ( >1000),  the web services time out.
    I tried to set the time out parameter for the web service call using
    context.put(BindingProviderProperties.REQUEST_TIMEOUT, 600*1000);
    also,
    context.put("com.sun.xml.ws.connect.timeout", 600*1000);
    context.put("com.sun.xml.ws.request.timeout", 600*1000);
    None of them seem to have any impact.
    Any ideas what is the correct way to adjust this time out behaviour?
    Thanks
    Jai

    Hi RK,
    Thanks for that. I am not looking at changing the time outs at Server. I am just interested in changing the time outs for the request I make from the client. The point is I do not want to impact any other services running in the server.
    In WS Navigator, it seems possible to change the time out value using Invocation parameters. (Did not try this yet!!)
    So it must be possible to set the time out for the request from the client.
    Thanks
    Jai
    Edited by: Jaishankar on Aug 25, 2011 2:49 PM

  • Binding parameters to dynamic VO with PL/SQL API call with no where clause

    Hi all,
    I am required to change exisiting queries to queries with "bind" parameters. Some of our VOs are dynamic and with PL/SQL api calls like below:
    String stmtStr = "selectXXX_API_UTILS.chk_urg_since_last_prg("
    + projectId + "," + PPCId + ",'XYZ_TASKS'," + taskId+ ")"
    +" from dual ";
    ViewObject tmpVO = transaction.createViewObjectFromQueryStmt(stmtStr);
    In this regard, I am unsure how to bind the PPCId and taskId parameters to the VO. setWhereClauseParams() would not work here as there is now where clause.
    Thanks in advance,
    Srini

    In case of preparedStatement, we mention bind parameters to be passed using "?". Then we pass paramters sequencially.
    But in the your case following is enough:
    int projectId = 100 ; (hardcoding values for example)
    int taskId = 500 ;
    String stmtStr = "selectXXX_API_UTILS.chk_urg_since_last_prg("
    + projectId + "," + PPCId + ",'XYZ_TASKS'," + taskId+ ")"
    +" from dual ";
    -Anand

  • Sharepoint 2013 REST API calls with JASONP support

    We are working on sharepoint online integration with PHP Based application. We need to provide REST API call which supports JSONP.
    So is it possible to create new REST API Endpoints in Sharepoint online APP? Please sugggest right direction.

    Hi,
    In Office 365 (aka SharePoint Online), you can simply consume the SharePoint data through REST API or WS call,but cannot create your own endpoint.
    By default you can get the JSON response from the Office 365 REST API,its upto you to use the JSONP on your client compatibility not on SharePoint online REST API.
    Sometime before I tried, It didn't work for me.
    If you develop the AppModel, SPRequestor.js does the same job(overcome the Cross domain restriction) the what JSONP does.
    Murugesa Pandian| MCPD | MCTS |SharePoint 2010

  • RZ70 was ended with time-out.

    I'm installing NW2004s SR2 with PI/XI usage:
    I'm using Central SLD. At RZ70 phase I got time-out.
    What is the reason of this?
    Thanks

    I gave up Central SLD and I did reinstallation with local SLD.That time no problem with Rz70.

  • Urgent: Issue with time out sql auzre

    We are trying to connect to our SQL AZURE databased (Northern Europe) we keep getting timeout error. Initially it was post-login phase error and now we keep getting 10600 error. We are on V12 version.
    Any ideas please?
    Here is the detail 
    An unhandled exception of type 'System.Data.SqlClient.SqlException' occurred in System.Data.dll
    Additional information: Connection Timeout Expired.  The timeout period elapsed during the post-login phase.  The connection could have timed out while waiting for server to complete the login process and respond; Or it could have timed out while
    attempting to create multiple active connections.  The duration spent while attempting to connect to this server was - [Pre-Login] initialization=303; handshake=922; [Login] initialization=0; authentication=0; [Post-Login] complete=13000;

    Resolved offline.
    In general, please follow best practices on the linked documentation page below with regards to connectivity issues :
    http://azure.microsoft.com/en-us/documentation/articles/sql-database-connect-central-recommendations/ .

  • Wifi VoIP phone calls with Time Capsule...

    ...is really not seeming to work for me. I have a T Mobile Samsung WiFi phone. The phone can "see" my TC network but cannot seem to connect to it. I keep getting W006.1 errors on the phone. Any suggestions or ideas why this may be? Are these phones on compatible with Linksys routers? HELP!?!

    Make sure the guests have read access. A lot of these small devices don't support SMB/CIFS authentication.

  • What is "menu time out target"?

    Hi all
      Ok in the Connection Menu I have something called "menu time out target" what is this and how to modify it? I'm new
    at DVDSP and I looked in the manual but nothing that explains this. Any help with this would be greatly appreciated!!
    THANKS!!

    Start here:
    iOS: Troubleshooting Wi-Fi networks and connections

  • Side loaded "time-out" app

    I installed a side loaded app called android "time out" to fix my problems with instagram , which didnt want to work, it was giving me an error: camera is too low for this app, or smtgh like that,whatever, that app fixed it. But after that my phone started to restart by itself, and also while i'm browsing internet it get locked by itself. Could this be because of this side loaded apps ? Thanks in advance, be aware of my grammar mistakes.

    Having problem with internet connectivity on WIFI - anything that depends on DNS for data whether it is a web browser or an app while using WIFI.  I call this problem "WIFI Lockout".
    This happens on iphone 4, ipad 2 and ipad 3 that has been updated to iOS 6.
    I am not talking about the issue of the missing apple page (day 1) or the inability to turn on/configure WIFI after updating to iOS 6.
    This is what i have discovered so far.
    You could be in the middle of surfing or using any app that makes data calls based on DNS (when you type google.com that is translated in the background so your device knows where to go - summary only) and suddenly you can go no where or do nothing!
    Sometimes conectivity goes trouble free for long periods, other times it is repetitive "WIFI Lockout".
    Yea sure, you can restart the WIFI connection, but WHO wants to CONTINUALLY do that?
    Interestingly enought the device is still successfully connected to the internet via WIFI, but DNS request fail to pass successfully from the iOS 6 device.
    Apple (or any curious iOS 6 user that wants to see my point), when this happens "WIFI Lockout" open up a browser before you reset the WIFI  connection and type type 74.125.227.144 (google) and then “go” (I tried both safari and chrome).  A google search page will come up and you will be able to execute a search (of course any link you click on will not work as it is dependant on DNS resolution).
    The above IP connection to google proves NON DNS traffic works, so the issue is not the WIFI connection to the access point that is the problem.  It is not an access point configuration/firmware or security protocol issue either because data does pass when the above steps are followed.
    I KNOW THIS IS NOT ALL OF THE PROBLEMS WITH iOS 6, BUT THIS IS A HUGE PROBLEM NOT BEING ABLE TO SURF OR GET DATA THE iOS 6 DEVICE IS REQUESTING WHILE ON WIFI.

  • Load Balancing Time Out Settings

    Hi, getting error below and I'm sure its to do with Time Out on Load Balancing, anyone confirm as don't want to mess around with IIS...
    The average of the most recent heartbeat intervals [499] for request [Ping] used by clients is less than or equal to [540].
    Make sure that your firewall configuration is set to work correctly with Exchange ActiveSync and direct push technology. Specifically, make sure that your firewall is configured so that requests to Exchange ActiveSync do not expire before they have the opportunity
    to be processed.
    For more information about how to configure firewall settings when using Exchange ActiveSync, see Microsoft Knowledge Base article 905013, "Enterprise Firewall Configuration for Exchange ActiveSync Direct Push Technology" (http://go.microsoft.com/fwlink/?linkid=3052&kbid=905013).
    Currently timeout is set to 5mins on LB...
    Thanks!

    I'm talking about Health Check Time Values below;
    http://blogs.vmware.com/vsphere/2012/11/load-balancing-using-vcloud-networking-and-security-5-1-edge.html
    Parameter
    Description
    Interval
    Interval at which a server is pinged.
    Timeout
    Time within which a response from the server must be received.
    Health Threshold
    Number of consecutive successful health checks before a server is declared operational.
    Unhealth Threshold
    Number of consecutive unsuccessful health checks before a server is declared dead.

  • Can you change the legth of time (or number of rings) it takes for on iphone 4 to time out making an outgonig call?

    Can you change the legth of time (or number of rings) it takes for on iphone 4 to time out making an outgonig call?
    Mostly it's to call in for radio contests. The Iphone is really good at making a quick call, but it seems to timeout after 15-20 rings. I realise this is a small thing, but free tickets is free tickets.
    Most commenst I see is abotu incoling calls, not outging.
    Thanks.

    No. You can't do this with any phone.

  • Coldfusion 11 java/jre ssl mutual auth api calls.  Help with coldfusion/java logs.

    Hello,
    I am here because I have exhausted my Coldfusion/Java ssl keystore certs trouble shooting abilities.  Here is the issue. I am developing a Coldfusion 11 application that must make api calls to Chase payconnexion SOAP services. I am using the coldfusion cfhttp tags to do this, which is using the java jre 1.7.x to accomplish this. The problem, I am getting generic 500 internal server errors from Chase.   They claim that I am not sending a cert during the ssl exchange.    What I have done is:
    - put our wildcard cert/key pair in the coldfusion keystore
    - put our root and chain in the keystore
    - put the chase server cert in the keystore
    - converted the key/crt files to .pfx and make the calls
      to chase with those, something like:
      <cfset objSecurity = createObject("java", "java.security.Security") />
      <cfset storeProvider = objSecurity.getProvider("JsafeJCE")/>
      <cfset Application.sslfix = true />
      <cfhttp url="#chase_api_server#/"
              result="http_response"
            method="post"
            port="1401" charset="utf-8"
            clientCert = "#cert_path#/#cert_file1#"
            clientCertPassword = "#cert_password#">
            <cfhttpparam type="header" name="SOAPAction" value="updateUserProfileRequest"/>
        <cfhttpparam type="header" name="Host" value="ws.payconnexion.com" />
        <cfhttpparam type="xml" value="#trim(my_xml)#"/>
        </cfhttp>
    Here is what I see in the Cf logs, can anyone help me interpret what
    is happening ??
    Thanks,
    Bob
    =============================================================
    found key for : 1
    chain [0] = [
      Version: V3
      Subject: CN=*.payments.austintexas.gov, O=City of Austin, L=Austin, ST=Texas, C=US
      Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5
      Key:  Sun RSA public key, 2048 bits
      modulus: <snip>
      Validity: [From: Mon Aug 11 12:39:37 CDT 2014,
                   To: Thu Sep 01 18:34:24 CDT 2016]
      Issuer: CN=Entrust Certification Authority - L1C, OU="(c) 2009 Entrust, Inc.", OU=www.entrust.net/rpa is incorporated by reference, O="Entrust, Inc.", C=US
      SerialNumber: [<snip>7]
    Certificate Extensions: 9
    [1]: ObjectId: 1.3.6.1.5.5.7.1.1 Criticality=false
    AuthorityInfoAccess [
       accessMethod: ocsp
       accessLocation: URIName: http://ocsp.entrust.net
       accessMethod: caIssuers
       accessLocation: URIName: http://aia.entrust.net/2048-l1c.cer
    [2]: ObjectId: 2.5.29.35 Criticality=false
    AuthorityKeyIdentifier [
    KeyIdentifier [
    <snip>]
    [3]: ObjectId: 2.5.29.19 Criticality=false
    BasicConstraints:[
      CA:false
      PathLen: undefined
    [4]: ObjectId: 2.5.29.31 Criticality=false
    CRLDistributionPoints [
      [DistributionPoint:
         [URIName: http://crl.entrust.net/level1c.crl]
    [5]: ObjectId: 2.5.29.32 Criticality=false
    CertificatePolicies [
      [CertificatePolicyId: [1.2.840.113533.7.75.2]
    [PolicyQualifierInfo: [
      qualifierID: 1.3.6.1.5.5.7.2.1
      qualifier: <snip>
      [CertificatePolicyId: [2.23.140.1.2.2]
    [6]: ObjectId: 2.5.29.37 Criticality=false
    ExtendedKeyUsages [
      serverAuth
      clientAuth
    [7]: ObjectId: 2.5.29.15 Criticality=false
    KeyUsage [
      DigitalSignature
      Key_Encipherment
    [8]: ObjectId: 2.5.29.17 Criticality=false
    SubjectAlternativeName [
      DNSName: *.payments.austintexas.gov
      DNSName: payments.austintexas.gov
    [9]: ObjectId: 2.5.29.14 Criticality=false
    SubjectKeyIdentifier [
    KeyIdentifier [
    <snip>]
      Algorithm: [SHA1withRSA]
      Signature:
    <snip>
    chain [1] = [
      Version: V3
      Subject: CN=Entrust Certification Authority - L1C, OU="(c) 2009 Entrust, Inc.", OU=www.entrust.net/rpa is incorporated by reference, O="Entrust, Inc.", C=US
      Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5
      Key:  Sun RSA public key, 2048 bits
      modulus: <snip>
      public exponent: 65537
      Validity: [From: Fri Nov 11 09:40:40 CST 2011,
                   To: Thu Nov 11 20:51:17 CST 2021]
      Issuer: CN=Entrust.net Certification Authority (2048), OU=(c) 1999 Entrust.net Limited, OU=www.entrust.net/CPS_2048 incorp. by ref. (limits liab.), O=Entrust.net
      SerialNumber: [    <snip>]
    Certificate Extensions: 7
    [1]: ObjectId: 1.3.6.1.5.5.7.1.1 Criticality=false
    AuthorityInfoAccess [
       accessMethod: ocsp
       accessLocation: URIName: http://ocsp.entrust.net
    [2]: ObjectId: 2.5.29.35 Criticality=false
    AuthorityKeyIdentifier [
    KeyIdentifier [
    <snip>]
    [3]: ObjectId: 2.5.29.19 Criticality=true
    BasicConstraints:[
      CA:true
      PathLen:0
    [4]: ObjectId: 2.5.29.31 Criticality=false
    CRLDistributionPoints [
      [DistributionPoint:
         [URIName: http://crl.entrust.net/2048ca.crl]
    [5]: ObjectId: 2.5.29.32 Criticality=false
    CertificatePolicies [
      [CertificatePolicyId: [2.5.29.32.0]
    [PolicyQualifierInfo: [
      qualifierID: 1.3.6.1.5.5.7.2.1
      qualifier: <snip>
    [6]: ObjectId: 2.5.29.15 Criticality=true
    KeyUsage [
      Key_CertSign
      Crl_Sign
    [7]: ObjectId: 2.5.29.14 Criticality=false
    SubjectKeyIdentifier [
    KeyIdentifier [
    <snip>]
      Algorithm: [SHA1withRSA]
      Signature:
    <snip>
    chain [2] = [
      Version: V3
      Subject: CN=Entrust.net Certification Authority (2048), OU=(c) 1999 Entrust.net Limited, OU=www.entrust.net/CPS_2048 incorp. by ref. (limits liab.), O=Entrust.net
      Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5
      Key:  Sun RSA public key, 2048 bits
      modulus: <snip>public exponent: 65537
      Validity: [From: Fri Dec 24 11:50:51 CST 1999,
                   To: Tue Jul 24 09:15:12 CDT 2029]
      Issuer: CN=Entrust.net Certification Authority (2048), OU=(c) 1999 Entrust.net Limited, OU=www.entrust.net/CPS_2048 incorp. by ref. (limits liab.), O=Entrust.net
      SerialNumber: [<snip>]
    Certificate Extensions: 3
    [1]: ObjectId: 2.5.29.19 Criticality=true
    BasicConstraints:[
      CA:true
      PathLen:2147483647
    [2]: ObjectId: 2.5.29.15 Criticality=true
    KeyUsage [
      Key_CertSign
      Crl_Sign
    [3]: ObjectId: 2.5.29.14 Criticality=false
    SubjectKeyIdentifier [
    KeyIdentifier [
    <snip>]
      Algorithm: [SHA1withRSA]
      Signature:
    <snip>
    trustStore is: /opt/coldfusion11/jre/lib/security/cacerts
    trustStore type is : jks
    trustStore provider is :
    init truststore
    adding as trusted cert:
    <snip 85 certs> 
    trigger seeding of SecureRandom
    done seeding SecureRandom
    Jan 23, 2015 13:15:37 PM Information [ajp-bio-8014-exec-7] - Starting HTTP request {URL='https://ws.payconnexion.com:1401/pconWS/9_5/', method='post'}
    Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256
    Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256
    Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256
    Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256
    Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
    Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
    Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384
    Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256
    Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
    Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384
    Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384
    Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256
    Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256
    Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256
    Allow unsafe renegotiation: true
    Allow legacy hello messages: true
    Is initial handshake: true
    Is secure renegotiation: false
    %% No cached client session
    *** ClientHello, TLSv1
    RandomCookie:  GMT: 1405197529 bytes = { 191, 115, 95, 85, 79, 234, 145, 176, 62, 70, 36, 102, 168, 15, 127, 174, 88, 118, 4, 177, 226, 5, 254, 55, 108, 203, 80, 80 }
    Session ID:  {}
    Cipher Suites: [TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDH_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_DSS_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, TLS_ECDHE_ECDSA_WITH_RC4_128_SHA, TLS_ECDHE_RSA_WITH_RC4_128_SHA, SSL_RSA_WITH_RC4_128_SHA, TLS_ECDH_ECDSA_WITH_RC4_128_SHA, TLS_ECDH_RSA_WITH_RC4_128_SHA, TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_RC4_128_MD5, TLS_EMPTY_RENEGOTIATION_INFO_SCSV]
    Compression Methods:  { 0 }
    Extension elliptic_curves, curve names: {secp256r1, sect163k1, sect163r2, secp192r1, secp224r1, sect233k1, sect233r1, sect283k1, sect283r1, secp384r1, sect409k1, sect409r1, secp521r1, sect571k1, sect571r1, secp160k1, secp160r1, secp160r2, sect163r1, secp192k1, sect193r1, sect193r2, secp224k1, sect239k1, secp256k1}
    Extension ec_point_formats, formats: [uncompressed]
    Extension server_name, server_name: [host_name: ws.payconnexion.com]
    ajp-bio-8014-exec-7, WRITE: TLSv1 Handshake, length = 191
    ajp-bio-8014-exec-7, READ: TLSv1 Handshake, length = 81
    *** ServerHello, TLSv1
    RandomCookie:  <snip>
    Cipher Suite: TLS_RSA_WITH_AES_256_CBC_SHA
    Compression Method: 0
    Extension renegotiation_info, renegotiated_connection: <empty>
    %% Initialized:  [Session-5, TLS_RSA_WITH_AES_256_CBC_SHA]
    ** TLS_RSA_WITH_AES_256_CBC_SHA
    ajp-bio-8014-exec-7, READ: TLSv1 Handshake, length = 4183
    *** Certificate chain
    chain [0] = [
      Version: V3
      Subject: CN=ws.payconnexion.com, OU=PayConnexion, O=JPMorgan Chase, L=New York, ST=New York, C=US
      Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5
      Key:  Sun RSA public key, 2048 bits
      modulus: <snip>
      public exponent: 65537
      Validity: [From: Sun Apr 20 19:00:00 CDT 2014,
                   To: Tue Jun 02 18:59:59 CDT 2015]
      Issuer: CN=VeriSign Class 3 International Server CA - G3, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US
      SerialNumber: [   <snip>]
    Certificate Extensions: 8
    [1]: ObjectId: 1.3.6.1.5.5.7.1.1 Criticality=false
    AuthorityInfoAccess [
       accessMethod: ocsp
       accessLocation: URIName: http://se.symcd.com
       accessMethod: caIssuers
       accessLocation: URIName: http://se.symcb.com/se.crt
    [2]: ObjectId: 2.5.29.35 Criticality=false
    AuthorityKeyIdentifier [
    KeyIdentifier [
    <snip>]
    [3]: ObjectId: 2.5.29.19 Criticality=false
    BasicConstraints:[
      CA:false
      PathLen: undefined
    [4]: ObjectId: 2.5.29.31 Criticality=false
    CRLDistributionPoints [
      [DistributionPoint:
         [URIName: http://se.symcb.com/se.crl]
    [5]: ObjectId: 2.5.29.32 Criticality=false
    CertificatePolicies [
      [CertificatePolicyId: [2.16.840.1.113733.1.7.54]
    [PolicyQualifierInfo: [
      qualifierID: 1.3.6.1.5.5.7.2.1
      qualifier: <snip>
    ], PolicyQualifierInfo: [
      qualifierID: 1.3.6.1.5.5.7.2.2
      qualifier: <snip>
    [6]: ObjectId: 2.5.29.37 Criticality=false
    ExtendedKeyUsages [
      serverAuth
      clientAuth
      2.16.840.1.113730.4.1
    [7]: ObjectId: 2.5.29.15 Criticality=true
    KeyUsage [
      DigitalSignature
      Key_Encipherment
    [8]: ObjectId: 2.5.29.17 Criticality=false
    SubjectAlternativeName [
      DNSName: ws.payconnexion.com
      Algorithm: [SHA1withRSA]
      Signature:
    <snip>
    chain [1] = [
      Version: V3
      Subject: CN=VeriSign Class 3 International Server CA - G3, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US
      Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5
      Key:  Sun RSA public key, 2048 bits
      modulus: <snip>
      public exponent: 65537
      Validity: [From: Sun Feb 07 18:00:00 CST 2010,
                   To: Fri Feb 07 17:59:59 CST 2020]
      Issuer: CN=VeriSign Class 3 Public Primary Certification Authority - G5, OU="(c) 2006 VeriSign, Inc. - For authorized use only", OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US
      SerialNumber: [    <snip>]
    Certificate Extensions: 10
    [1]: ObjectId: 1.3.6.1.5.5.7.1.12 Criticality=false
    Extension unknown: DER encoded OCTET string =
    <snip>
    [2]: ObjectId: 1.3.6.1.5.5.7.1.1 Criticality=false
    AuthorityInfoAccess [
       accessMethod: ocsp
       accessLocation: URIName: http://ocsp.verisign.com
    [3]: ObjectId: 2.5.29.35 Criticality=false
    AuthorityKeyIdentifier [
    KeyIdentifier [
    <snip>]
    [4]: ObjectId: 2.5.29.19 Criticality=true
    BasicConstraints:[
      CA:true
      PathLen:0
    [5]: ObjectId: 2.5.29.31 Criticality=false
    CRLDistributionPoints [
      [DistributionPoint:
         [URIName: http://crl.verisign.com/pca3-g5.crl]
    [6]: ObjectId: 2.5.29.32 Criticality=false
    CertificatePolicies [
      [CertificatePolicyId: [2.16.840.1.113733.1.7.23.3]
    [PolicyQualifierInfo: [
      qualifierID: 1.3.6.1.5.5.7.2.1
      qualifier: <snip>
    ], PolicyQualifierInfo: [
      qualifierID: 1.3.6.1.5.5.7.2.2
      qualifier: <snip>
    [7]: ObjectId: 2.5.29.37 Criticality=false
    ExtendedKeyUsages [
      serverAuth
      clientAuth
      2.16.840.1.113730.4.1
      2.16.840.1.113733.1.8.1
    [8]: ObjectId: 2.5.29.15 Criticality=true
    KeyUsage [
      Key_CertSign
      Crl_Sign
    [9]: ObjectId: 2.5.29.17 Criticality=false
    SubjectAlternativeName [
      CN=VeriSignMPKI-2-7
    [10]: ObjectId: 2.5.29.14 Criticality=false
    SubjectKeyIdentifier [
    KeyIdentifier [
    <snip>]
      Algorithm: [SHA1withRSA]
      Signature:
    <snip>
    chain [2] = [
      Version: V3
      Subject: CN=VeriSign Class 3 Public Primary Certification Authority - G5, OU="(c) 2006 VeriSign, Inc. - For authorized use only", OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US
      Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5
      Key:  Sun RSA public key, 2048 bits
      modulus: <snip>
      public exponent: 65537
      Validity: [From: Tue Nov 07 18:00:00 CST 2006,
                   To: Sun Nov 07 17:59:59 CST 2021]
      Issuer: OU=Class 3 Public Primary Certification Authority, O="VeriSign, Inc.", C=US
      SerialNumber: [<snip>]
    Certificate Extensions: 8
    [1]: ObjectId: 1.3.6.1.5.5.7.1.12 Criticality=false
    Extension unknown: DER encoded OCTET string =
    <snip>
    [2]: ObjectId: 1.3.6.1.5.5.7.1.1 Criticality=false
    AuthorityInfoAccess [
       accessMethod: ocsp
       accessLocation: URIName: http://ocsp.verisign.com
    [3]: ObjectId: 2.5.29.19 Criticality=true
    BasicConstraints:[
      CA:true
      PathLen:2147483647
    [4]: ObjectId: 2.5.29.31 Criticality=false
    CRLDistributionPoints [
      [DistributionPoint:
         [URIName: http://crl.verisign.com/pca3.crl]
    [5]: ObjectId: 2.5.29.32 Criticality=false
    CertificatePolicies [
      [CertificatePolicyId: [2.5.29.32.0]
    [PolicyQualifierInfo: [
      qualifierID: 1.3.6.1.5.5.7.2.1
      qualifier: <snip>
    [6]: ObjectId: 2.5.29.37 Criticality=false
    ExtendedKeyUsages [
      serverAuth
      clientAuth
      codeSigning
      2.16.840.1.113730.4.1
      2.16.840.1.113733.1.8.1
    [7]: ObjectId: 2.5.29.15 Criticality=true
    KeyUsage [
      Key_CertSign
      Crl_Sign
    [8]: ObjectId: 2.5.29.14 Criticality=false
    SubjectKeyIdentifier [
    KeyIdentifier [
    <snip>]
      Algorithm: [SHA1withRSA]
      Signature:
    <snip>
    Found trusted certificate:
      Version: V3
      Subject: CN=ws.payconnexion.com, OU=PayConnexion, O=JPMorgan Chase, L=New York, ST=New York, C=US
      Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5
      Key:  Sun RSA public key, 2048 bits
      modulus:   public exponent: 65537
      Validity: [From: Sun Apr 20 19:00:00 CDT 2014,
                   To: Tue Jun 02 18:59:59 CDT 2015]
      Issuer: CN=VeriSign Class 3 International Server CA - G3, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US
      SerialNumber: [ <snip>]
    Certificate Extensions: 8
    [1]: ObjectId: 1.3.6.1.5.5.7.1.1 Criticality=false
    AuthorityInfoAccess [
       accessMethod: ocsp
       accessLocation: URIName: http://se.symcd.com
       accessMethod: caIssuers
       accessLocation: URIName: http://se.symcb.com/se.crt
    [2]: ObjectId: 2.5.29.35 Criticality=false
    AuthorityKeyIdentifier [
    KeyIdentifier [
    <snip>]
    [3]: ObjectId: 2.5.29.19 Criticality=false
    BasicConstraints:[
      CA:false
      PathLen: undefined
    [4]: ObjectId: 2.5.29.31 Criticality=false
    CRLDistributionPoints [
      [DistributionPoint:
         [URIName: http://se.symcb.com/se.crl]
    [5]: ObjectId: 2.5.29.32 Criticality=false
    CertificatePolicies [
      [CertificatePolicyId: [2.16.840.1.113733.1.7.54]
    [PolicyQualifierInfo: [
      qualifierID: 1.3.6.1.5.5.7.2.1
      qualifier: <snip>
    ], PolicyQualifierInfo: [
      qualifierID: 1.3.6.1.5.5.7.2.2
      qualifier: <snip>
    [6]: ObjectId: 2.5.29.37 Criticality=false
    ExtendedKeyUsages [
      serverAuth
      clientAuth
      2.16.840.1.113730.4.1
    [7]: ObjectId: 2.5.29.15 Criticality=true
    KeyUsage [
      DigitalSignature
      Key_Encipherment
    [8]: ObjectId: 2.5.29.17 Criticality=false
    SubjectAlternativeName [
      DNSName: ws.payconnexion.com
      Algorithm: [SHA1withRSA]
      Signature:
    <snip>
    ajp-bio-8014-exec-7, READ: TLSv1 Handshake, length = 13
    *** CertificateRequest
    Cert Types: RSA, DSS
    Cert Authorities:
    <Empty>
    *** ServerHelloDone
    matching alias: 1
    *** Certificate chain
    chain [0] = [
      Version: V3
      Subject: CN=*.payments.austintexas.gov, O=City of Austin, L=Austin, ST=Texas, C=US
      Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5
      Key:  Sun RSA public key, 2048 bits
      <snip>public exponent: 65537
      Validity: [From: Mon Aug 11 12:39:37 CDT 2014,
                   To: Thu Sep 01 18:34:24 CDT 2016]
      Issuer: CN=Entrust Certification Authority - L1C, OU="(c) 2009 Entrust, Inc.", OU=www.entrust.net/rpa is incorporated by reference, O="Entrust, Inc.", C=US
      SerialNumber: [<snip>]
    Certificate Extensions: 9
    [1]: ObjectId: 1.3.6.1.5.5.7.1.1 Criticality=false
    AuthorityInfoAccess [
       accessMethod: ocsp
       accessLocation: URIName: http://ocsp.entrust.net
       accessMethod: caIssuers
       accessLocation: URIName: http://aia.entrust.net/2048-l1c.cer
    [2]: ObjectId: 2.5.29.35 Criticality=false
    AuthorityKeyIdentifier [
    KeyIdentifier [
    <snip>]
    [3]: ObjectId: 2.5.29.19 Criticality=false
    BasicConstraints:[
      CA:false
      PathLen: undefined
    [4]: ObjectId: 2.5.29.31 Criticality=false
    CRLDistributionPoints [
      [DistributionPoint:
         [URIName: http://crl.entrust.net/level1c.crl]
    [5]: ObjectId: 2.5.29.32 Criticality=false
    CertificatePolicies [
      [CertificatePolicyId: [1.2.840.113533.7.75.2]
    [PolicyQualifierInfo: [
      qualifierID: 1.3.6.1.5.5.7.2.1
      qualifier: <snip>
      [CertificatePolicyId: [2.23.140.1.2.2]
    [6]: ObjectId: 2.5.29.37 Criticality=false
    ExtendedKeyUsages [
      serverAuth
      clientAuth
    [7]: ObjectId: 2.5.29.15 Criticality=false
    KeyUsage [
      DigitalSignature
      Key_Encipherment
    [8]: ObjectId: 2.5.29.17 Criticality=false
    SubjectAlternativeName [
      DNSName: *.payments.austintexas.gov
      DNSName: payments.austintexas.gov
    [9]: ObjectId: 2.5.29.14 Criticality=false
    SubjectKeyIdentifier [
    KeyIdentifier [
    <snip>]
      Algorithm: [SHA1withRSA]
      Signature:
    <snip>
    chain [1] = [
      Version: V3
      Subject: CN=Entrust Certification Authority - L1C, OU="(c) 2009 Entrust, Inc.", OU=www.entrust.net/rpa is incorporated by reference, O="Entrust, Inc.", C=US
      Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5
      Key:  Sun RSA public key, 2048 bits
      modulus: <snip>
      public exponent: 65537
      Validity: [From: Fri Nov 11 09:40:40 CST 2011,
                   To: Thu Nov 11 20:51:17 CST 2021]
      Issuer: CN=Entrust.net Certification Authority (2048), OU=(c) 1999 Entrust.net Limited, OU=www.entrust.net/CPS_2048 incorp. by ref. (limits liab.), O=Entrust.net
      SerialNumber: [<snip>]
    Certificate Extensions: 7
    [1]: ObjectId: 1.3.6.1.5.5.7.1.1 Criticality=false
    AuthorityInfoAccess [
       accessMethod: ocsp
       accessLocation: URIName: http://ocsp.entrust.net
    [2]: ObjectId: 2.5.29.35 Criticality=false
    AuthorityKeyIdentifier [
    KeyIdentifier [
    <snip>]
    [3]: ObjectId: 2.5.29.19 Criticality=true
    BasicConstraints:[
      CA:true
      PathLen:0
    [4]: ObjectId: 2.5.29.31 Criticality=false
    CRLDistributionPoints [
      [DistributionPoint:
         [URIName: http://crl.entrust.net/2048ca.crl]
    [5]: ObjectId: 2.5.29.32 Criticality=false
    CertificatePolicies [
      [CertificatePolicyId: [2.5.29.32.0]
    [PolicyQualifierInfo: [
      qualifierID: 1.3.6.1.5.5.7.2.1
      qualifier: <snip>
    [6]: ObjectId: 2.5.29.15 Criticality=true
    KeyUsage [
      Key_CertSign
      Crl_Sign
    [7]: ObjectId: 2.5.29.14 Criticality=false
    SubjectKeyIdentifier [
    KeyIdentifier [
    <snip>]
      Algorithm: [SHA1withRSA]
      Signature:
    <snip>
    chain [2] = [
      Version: V3
      Subject: CN=Entrust.net Certification Authority (2048), OU=(c) 1999 Entrust.net Limited, OU=www.entrust.net/CPS_2048 incorp. by ref. (limits liab.), O=Entrust.net
      Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5
      Key:  Sun RSA public key, 2048 bits
      modulus: <snip>public exponent: 65537
      Validity: [From: Fri Dec 24 11:50:51 CST 1999,
                   To: Tue Jul 24 09:15:12 CDT 2029]
      Issuer: CN=Entrust.net Certification Authority (2048), OU=(c) 1999 Entrust.net Limited, OU=www.entrust.net/CPS_2048 incorp. by ref. (limits liab.), O=Entrust.net
      SerialNumber: [<snip>]
    Certificate Extensions: 3
    [1]: ObjectId: 2.5.29.19 Criticality=true
    BasicConstraints:[
      CA:true
      PathLen:2147483647
    [2]: ObjectId: 2.5.29.15 Criticality=true
    KeyUsage [
      Key_CertSign
      Crl_Sign
    [3]: ObjectId: 2.5.29.14 Criticality=false
    SubjectKeyIdentifier [
    KeyIdentifier [
    <snip>]
      Algorithm: [SHA1withRSA]
      Signature:
    <snip>
    *** ClientKeyExchange, RSA PreMasterSecret, TLSv1
    ajp-bio-8014-exec-7, WRITE: TLSv1 Handshake, length = 3970
    SESSION KEYGEN:
    PreMaster Secret:
    <snip>
    CONNECTION KEYGEN:
    Client Nonce:
    <snip>
    Server Nonce:
    <snip>
    Master Secret:
    <snip>
    Client MAC write Secret:
    <snip>
    Server MAC write Secret:
    <snip>
    Client write key:
    <snip>
    Server write key:
    <snip>
    Client write IV:
    <snip>
    Server write IV:
    <snip>
    *** CertificateVerify
    ajp-bio-8014-exec-7, WRITE: TLSv1 Handshake, length = 262
    ajp-bio-8014-exec-7, WRITE: TLSv1 Change Cipher Spec, length = 1
    *** Finished
    verify_data:  { 51, 254, 40, 56, 247, 218, 130, 183, 112, 239, 95, 4 }
    ajp-bio-8014-exec-7, WRITE: TLSv1 Handshake, length = 48
    ajp-bio-8014-exec-7, READ: TLSv1 Change Cipher Spec, length = 1
    ajp-bio-8014-exec-7, READ: TLSv1 Handshake, length = 48
    *** Finished
    verify_data:  { 89, 182, 137, 178, 177, 31, 27, 115, 151, 90, 169, 49 }
    %% Cached client session: [Session-5, TLS_RSA_WITH_AES_256_CBC_SHA]
    ajp-bio-8014-exec-7, setSoTimeout(60000) called
    ajp-bio-8014-exec-7, WRITE: TLSv1 Application Data, length = 1520
    ajp-bio-8014-exec-7, READ: TLSv1 Application Data, length = 128
    Jan 23, 2015 13:15:38 PM Information [ajp-bio-8014-exec-7] - HTTP request completed  {Status Code=500 ,Time taken=1302 ms}
    ajp-bio-8014-exec-7, READ: TLSv1 Application Data, length = 256
    ajp-bio-8014-exec-7, READ: TLSv1 Alert, length = 32
    ajp-bio-8014-exec-7, RECV TLSv1 ALERT:  warning, close_notify
    ajp-bio-8014-exec-7, called closeInternal(false)
    ajp-bio-8014-exec-7, SEND TLSv1 ALERT:  warning, description = close_notify
    ajp-bio-8014-exec-7, WRITE: TLSv1 Alert, length = 32
    ajp-bio-8014-exec-7, called closeSocket(selfInitiated)
    ajp-bio-8014-exec-7, called close()
    ajp-bio-8014-exec-7, called closeInternal(true)

    Ok, apparently Chase person who said we were not sending the certs and achieving mutual auth
    was incorrect.   The https calls were connecting, and mutual auth was taking place.   The 500
    error was about a soap envelope being delivered, and NOT SSL as I directed to.   Everything
    is working fine now. 
    Thanks,
    Bob

  • I have Problem uploading photos to craigslist. It says it has a problem communicating with the server and times out. It works in explorer but not Firefox and I just recently downloaded the new version of firefox. Can you be of any help?

    Photos will not upload and the server times out.

    Well, two thoughts.
    The battery has completely discharged and will take overnight to recharge, so don't expect much in an hour.
    The battery has deep discharged and is now dead. It will never recharge and should be replaced.
    If your iPod Touch, iPhone, or iPad is Broken
    Apple does not fix iDevices. Instead they exchange yours for a refurbished or new replacement depending upon the age of your device and refurbished inventories. On rare occasions when there are no longer refurbished units for your older model, they may replace it with the next newer model.
    You may take your device to an Apple retailer for help or you may call Customer Service and arrange to send your device to Apple:
    Apple Store Customer Service at 1-800-676-2775 or visit online Help for more information.
    To contact product and tech support: Contacting Apple for support and service - this includes international calling numbers.
    iPod Service Support and Costs
    iPhone Service Support and Costs
    iPad Service Support and Costs
    There are third-party firms that do repairs on iDevices, and there are places where you can order parts to DIY if you feel up to the task. Start with Google to search for these.
    The flat fee for a battery exchange is, I believe, $99.00 USD.

  • IPod updates 2 touch with the new software, and from the update they are not connected with Time phase. They appear calling but never they enter the calls. I make calls with other users and if one connects but in these two not from the update

    iPod updates 2 touch with the new software, and from the update they are not connected with Time phase. They appear calling but never they enter the calls. I make calls with other users and if one connects but in these two not from the update

    I use Firefox 95% of the time, and there's no problem with flash content (and I'm still at .55 - downloaded .64 last week but I haven't got round to making the change yet). At the rate they've been changing it recently it may well be out of date already .
    I've been trying it in Safari, too with no problems apart from You Tube, but that's because I'm blocking Google cookies.
    One thought does occur - if your Flash preferences are set to block all Local Storage, it may be that the problem site is trying to use Flash cookies (LSOs). I had this problem recently with the BBC iPlayer streaming content. Little Snitch notified an attempt to connect to a new URL - emp.bbci.co.uk.
    If I disallowed it, no streaming; when I allowed the connection, it still wouldn't stream, so I did a bit of digging and came to the conclusion that it was trying to set a Flash cookie. When I unblocked, lo and behold - streaming resumed as normal.
    I now have LSOs blocked in a more subtle way that lets the site think it's being set (but it ain't) and the streaming still works.
    As for permissions repair - always repair from local; the permissions on the original disc will have been superceded by updates and new installations of Apple software.
    DU needs to be reading the packages on the HD, not the (now out of date) install disc.
    The recurring repair messages are normal and don't mean anything's wrong. As long as the final message is 'repair complete' there's no need to dwell on it.
    http://support.apple.com/kb/TS1448 (for Leopard and Snow Leopard - Lion no doubt has it's own set).

Maybe you are looking for