Associating a subject to a HTTP URL Connection
Hello,
We have a java client application which authenticates to the server using the JAAS model. The application opens HTTP URL connections from time to time (to servlets that stream data back and forth). The access.log indicates that no subject is associated with the action. Is there a way to associate the authenticated subject with the URL connection?
WLS 8.1 SP2
Thanks,
Bob
Not in a directway, though you may set a token and implement an Identity asserter which can understand the token.
Similar Messages
-
Encrypting authentication details - HTTP URL Connection
Hi,
We have a Java application which retreives HTML content from intranet page using HTTPURLConnection, displays the portion of the content. The site to which we are connecting using HTTPURLConnection requires baisc user authentication and we are passing the user name and passowrd using BASE 64 encoding in the request header. Now this intranet site is going to be hosted externally. Just wanted to know the different options on how to send the user name and password in ecnrypted format.Is the recommendation is just to enable HTTPS for that site and pass user name and password using HTTP URL Connection API? Or are there any other options? Appreciate any inputs.
Thanks.http://java.sun.com/javase/6/docs/technotes/guides/net/http-auth.html
-
What is the difference between HTTPS URL connection and SSLSocket conn
What is the difference between HTTPS URL connection and SSLSocket connection
The difference is that they are different protocols, or rather one protocol layered over the other. If you're within a LAN you will use SSL, if it's a Web service you will use HTTPS.
-
Getting FileNotFound Exception while using https url connection
Hi
I am facing a serious problem in running the code. I am using JSSE in my code and through this application I am hitting a URL which is also using HTTPS and that code is also using JSSE in servlets.
Now when I use the code I get a FileNotFoundException which says that the particular servlet is not located. I have given debug mode on and I could see that initial handshake is over and after that its throwing FileNotFoundException.
This problem is very serious because this system is live and now for this particular case where both the server and client are using JSSE , is failing.
Kindly suggest me some solution
Best Regards
vrkirubakaranHi
Thanx for ur reply,
We tried it from the Browser its working fine, more over we are not using any proxy, but i tried to hit thru the java jsse application its giving FileNotFoundException.
When i gone thru the Debug Log, it shows 403 Access Denied, for ur reference i am pasting the logs below
==========================================
Chkmsg->0100|https://www.ceemea2.citibank.com/servlet/recieve|09082001020202|10210010|123456789012|000002|0.05|
%% No cached client session
*** ClientHello, v3.1
RandomCookie: GMT: 997419653 bytes = { 190, 156, 211, 219, 90, 50, 59, 1, 16, 169, 254, 51, 21, 62, 149, 90, 231, 94, 80, 246, 100, 50, 31, 80, 99, 113, 30, 127 }
Session ID: {}
Cipher Suites: { 0, 3, 0, 17 }
Compression Methods: { 0 }
[write] MD5 and SHA1 hashes: len = 47
0000: 01 00 00 2B 03 01 3B 73 6B 85 BE 9C D3 DB 5A 32 ...+..;sk.....Z2
0010: 3B 01 10 A9 FE 33 15 3E 95 5A E7 5E 50 F6 64 32 ;....3.>.Z.^P.d2
0020: 1F 50 63 71 1E 7F 00 00 04 00 03 00 11 01 00 .Pcq...........
main, WRITE: SSL v3.1 Handshake, length = 47
[write] MD5 and SHA1 hashes: len = 50
0000: 01 03 01 00 09 00 00 00 20 00 00 03 02 00 80 00 ........ .......
0010: 00 11 3B 73 6B 85 BE 9C D3 DB 5A 32 3B 01 10 A9 ..;sk.....Z2;...
0020: FE 33 15 3E 95 5A E7 5E 50 F6 64 32 1F 50 63 71 .3.>.Z.^P.d2.Pcq
0030: 1E 7F ..
main, WRITE: SSL v2, contentType = 22, translated length = 16337
main, READ: SSL v3.0 Handshake, length = 3339
*** ServerHello, v3.0
RandomCookie: GMT: 14337 bytes = { 1, 253, 137, 78, 248, 161, 43, 251, 125, 205, 205, 145, 69, 176, 100, 201, 82, 209, 44, 155, 194, 143, 205, 173, 177, 32, 62, 162 }
Session ID: {14, 91, 242, 201, 133, 233, 30, 179, 233, 88, 72, 170, 146, 254, 185, 30, 0, 204, 59, 190, 74, 213, 180, 255, 110, 242, 135, 204, 143, 104, 171, 178}
Cipher Suite: { 0, 3 }
Compression Method: 0
%% Created: [Session-1, SSL_RSA_EXPORT_WITH_RC4_40_MD5]
** SSL_RSA_EXPORT_WITH_RC4_40_MD5
[read] MD5 and SHA1 hashes: len = 74
0000: 02 00 00 46 03 00 00 00 38 01 01 FD 89 4E F8 A1 ...F....8....N..
0010: 2B FB 7D CD CD 91 45 B0 64 C9 52 D1 2C 9B C2 8F +.....E.d.R.,...
0020: CD AD B1 20 3E A2 20 0E 5B F2 C9 85 E9 1E B3 E9 ... >. .[.......
0030: 58 48 AA 92 FE B9 1E 00 CC 3B BE 4A D5 B4 FF 6E XH.......;.J...n
0040: F2 87 CC 8F 68 AB B2 00 03 00 ....h.....
*** Certificate chain
chain [0] = [
Version: V3
Subject: CN=www.ceemea2.citibank.com, OU=Terms of use at www.verisign.com/rpa (c)00, OU=CGTI, O=Citibank N A, L=London, ST=London, C=GB
Signature Algorithm: MD5withRSA, OID = 1.2.840.113549.1.1.4
Key: com.sun.net.ssl.internal.ssl.JSA_RSAPublicKey@5087d0d6
Validity: [From: Fri Dec 22 05:30:00 GMT+05:30 2000,
To: Sun Dec 23 05:29:59 GMT+05:30 2001]
Issuer: OU=www.verisign.com/CPS Incorp.by Ref. LIABILITY LTD.(c)97 VeriSign, OU=VeriSign International Server CA - Class 3, OU="VeriSign, Inc.", O=VeriSign Trust Network
SerialNumber: [ 6096271c 4fd3f6fb 6d1ba8c2 3971dec5 ]
Certificate Extensions: 5
[1]: ObjectId: 2.16.840.1.113733.1.6.15 Criticality=false
Extension unknown: DER encoded OCTET string =
0000: 04 0B 16 09 35 34 39 31 32 36 33 38 31 ....549126381
[2]: ObjectId: 2.16.840.1.113730.1.1 Criticality=false
NetscapeCertType [
SSL server
[3]: ObjectId: 2.5.29.3 Criticality=false
Extension unknown: DER encoded OCTET string =
0000: 04 82 02 16 30 82 02 12 30 82 02 0E 30 82 02 0A ....0...0...0...
0010: 06 0B 60 86 48 01 86 F8 45 01 07 01 01 30 82 01 ..`.H...E....0..
0020: F9 16 82 01 A7 54 68 69 73 20 63 65 72 74 69 66 .....This certif
0030: 69 63 61 74 65 20 69 6E 63 6F 72 70 6F 72 61 74 icate incorporat
0040: 65 73 20 62 79 20 72 65 66 65 72 65 6E 63 65 2C es by reference,
0050: 20 61 6E 64 20 69 74 73 20 75 73 65 20 69 73 20 and its use is
0060: 73 74 72 69 63 74 6C 79 20 73 75 62 6A 65 63 74 strictly subject
0070: 20 74 6F 2C 20 74 68 65 20 56 65 72 69 53 69 67 to, the VeriSig
0080: 6E 20 43 65 72 74 69 66 69 63 61 74 69 6F 6E 20 n Certification
0090: 50 72 61 63 74 69 63 65 20 53 74 61 74 65 6D 65 Practice Stateme
00A0: 6E 74 20 28 43 50 53 29 2C 20 61 76 61 69 6C 61 nt (CPS), availa
00B0: 62 6C 65 20 61 74 3A 20 68 74 74 70 73 3A 2F 2F ble at: https://
00C0: 77 77 77 2E 76 65 72 69 73 69 67 6E 2E 63 6F 6D www.verisign.com
00D0: 2F 43 50 53 3B 20 62 79 20 45 2D 6D 61 69 6C 20 /CPS; by E-mail
00E0: 61 74 20 43 50 53 2D 72 65 71 75 65 73 74 73 40 at CPS-requests@
00F0: 76 65 72 69 73 69 67 6E 2E 63 6F 6D 3B 20 6F 72 verisign.com; or
0100: 20 62 79 20 6D 61 69 6C 20 61 74 20 56 65 72 69 by mail at Veri
0110: 53 69 67 6E 2C 20 49 6E 63 2E 2C 20 32 35 39 33 Sign, Inc., 2593
0120: 20 43 6F 61 73 74 20 41 76 65 2E 2C 20 4D 6F 75 Coast Ave., Mou
0130: 6E 74 61 69 6E 20 56 69 65 77 2C 20 43 41 20 39 ntain View, CA 9
0140: 34 30 34 33 20 55 53 41 20 54 65 6C 2E 20 2B 31 4043 USA Tel. +1
0150: 20 28 34 31 35 29 20 39 36 31 2D 38 38 33 30 20 (415) 961-8830
0160: 43 6F 70 79 72 69 67 68 74 20 28 63 29 20 31 39 Copyright (c) 19
0170: 39 36 20 56 65 72 69 53 69 67 6E 2C 20 49 6E 63 96 VeriSign, Inc
0180: 2E 20 20 41 6C 6C 20 52 69 67 68 74 73 20 52 65 . All Rights Re
0190: 73 65 72 76 65 64 2E 20 43 45 52 54 41 49 4E 20 served. CERTAIN
01A0: 57 41 52 52 41 4E 54 49 45 53 20 44 49 53 43 4C WARRANTIES DISCL
01B0: 41 49 4D 45 44 20 61 6E 64 20 4C 49 41 42 49 4C AIMED and LIABIL
01C0: 49 54 59 20 4C 49 4D 49 54 45 44 2E A0 0E 06 0C ITY LIMITED.....
01D0: 60 86 48 01 86 F8 45 01 07 01 01 01 A1 0E 06 0C `.H...E.........
01E0: 60 86 48 01 86 F8 45 01 07 01 01 02 30 2C 30 2A `.H...E.....0,0*
01F0: 16 28 68 74 74 70 73 3A 2F 2F 77 77 77 2E 76 65 .(https://www.ve
0200: 72 69 73 69 67 6E 2E 63 6F 6D 2F 72 65 70 6F 73 risign.com/repos
0210: 69 74 6F 72 79 2F 43 50 53 20 itory/CPS
[4]: ObjectId: 2.5.29.37 Criticality=false
Extension unknown: DER encoded OCTET string =
0000: 04 0D 30 0B 06 09 60 86 48 01 86 F8 42 04 01 ..0...`.H...B..
[5]: ObjectId: 2.5.29.19 Criticality=false
BasicConstraints:[
CA:false
PathLen: undefined
Algorithm: [MD5withRSA]
Signature:
0000: 0F F0 06 60 B2 15 0F 90 6A 76 D1 4D 59 03 45 17 ...`....jv.MY.E.
0010: 4D 3B 5F F9 82 49 CB E5 CC 5D D0 44 E6 F0 8B 26 M;_..I...].D...&
0020: 46 25 D5 AC B6 31 18 7B F0 27 A2 32 0D E3 EF 1F F%...1...'.2....
0030: 48 36 8F C7 9A 6D FC 2D 32 A1 D3 0F F3 EE A7 21 H6...m.-2......!
0040: B7 40 88 B5 5D 60 3E 93 84 EE 42 9F AC 27 B9 4C .@..]`>...B..'.L
0050: 63 95 E1 2C 7D 89 89 94 D9 F6 FE 48 6D 11 4A 3E c..,.......Hm.J>
0060: 7A 38 C1 48 33 93 B3 0B 31 AE 77 6C 79 4F 27 A4 z8.H3...1.wlyO'.
0070: 90 5A D4 C3 AE 8F 5E AE 52 AE 3C 39 23 12 D2 7A .Z....^.R.<9#..z
chain [1] = [
Version: V3
Subject: OU=www.verisign.com/CPS Incorp.by Ref. LIABILITY LTD.(c)97 VeriSign, OU=VeriSign International Server CA - Class 3, OU="VeriSign, Inc.", O=VeriSign Trust Network
Signature Algorithm: MD2withRSA, OID = 1.2.840.113549.1.1.2
Key: com.sun.net.ssl.internal.ssl.JSA_RSAPublicKey@367bd0d6
Validity: [From: Thu Apr 17 05:30:00 GMT+05:30 1997,
To: Thu Jan 08 05:29:59 GMT+05:30 2004]
Issuer: OU=Class 3 Public Primary Certification Authority, O="VeriSign, Inc.", C=US
SerialNumber: [ 236c971e 2bc60d0b f97460de f108c3c3 ]
Certificate Extensions: 5
[1]: ObjectId: 2.16.840.1.113730.1.1 Criticality=false
NetscapeCertType [
SSL CA
S/MIME CA
[2]: ObjectId: 2.5.29.32 Criticality=false
Extension unknown: DER encoded OCTET string =
0000: 04 82 01 2C 30 82 01 28 30 82 01 24 06 0B 60 86 ...,0..(0..$..`.
0010: 48 01 86 F8 45 01 07 01 01 30 82 01 13 30 28 06 H...E....0...0(.
0020: 08 2B 06 01 05 05 07 02 01 16 1C 68 74 74 70 73 .+.........https
0030: 3A 2F 2F 77 77 77 2E 76 65 72 69 73 69 67 6E 2E ://www.verisign.
0040: 63 6F 6D 2F 43 50 53 30 81 E6 06 08 2B 06 01 05 com/CPS0....+...
0050: 05 07 02 02 30 81 D9 30 15 16 0E 56 65 72 69 53 ....0..0...VeriS
0060: 69 67 6E 2C 20 49 6E 63 2E 30 03 02 01 01 1A 81 ign, Inc.0......
0070: BF 56 65 72 69 53 69 67 6E 27 73 20 43 65 72 74 .VeriSign's Cert
0080: 69 66 69 63 61 74 69 6F 6E 20 50 72 61 63 74 69 ification Practi
0090: 63 65 20 53 74 61 74 65 6D 65 6E 74 2C 20 77 77 ce Statement, ww
00A0: 77 2E 76 65 72 69 73 69 67 6E 2E 63 6F 6D 2F 43 w.verisign.com/C
00B0: 50 53 2C 20 67 6F 76 65 72 6E 73 20 74 68 69 73 PS, governs this
00C0: 20 63 65 72 74 69 66 69 63 61 74 65 20 26 20 69 certificate & i
00D0: 73 20 69 6E 63 6F 72 70 6F 72 61 74 65 64 20 62 s incorporated b
00E0: 79 20 72 65 66 65 72 65 6E 63 65 20 68 65 72 65 y reference here
00F0: 69 6E 2E 20 53 4F 4D 45 20 57 41 52 52 41 4E 54 in. SOME WARRANT
0100: 49 45 53 20 44 49 53 43 4C 41 49 4D 45 44 20 26 IES DISCLAIMED &
0110: 20 4C 49 41 42 49 4C 49 54 59 20 4C 54 44 2E 20 LIABILITY LTD.
0120: 28 63 29 31 39 39 37 20 56 65 72 69 53 69 67 6E (c)1997 VeriSign
[3]: ObjectId: 2.5.29.15 Criticality=false
KeyUsage [
Key_CertSign
Crl_Sign
[4]: ObjectId: 2.5.29.37 Criticality=false
Extension unknown: DER encoded OCTET string =
0000: 04 19 30 17 06 0A 60 86 48 01 86 F8 45 01 08 01 ..0...`.H...E...
0010: 06 09 60 86 48 01 86 F8 42 04 01 ..`.H...B..
[5]: ObjectId: 2.5.29.19 Criticality=false
BasicConstraints:[
CA:true
PathLen:0
Algorithm: [MD2withRSA]
Signature:
0000: B8 8C 98 C3 2B 48 F5 72 CD 68 0D 1A B3 74 63 BB ....+H.r.h...tc.
0010: B1 58 B6 98 45 22 EC 11 8D C7 4E 33 8B 62 5A 21 .X..E"....N3.bZ!
0020: 24 6C 9A C0 42 B4 45 A9 3A FB 67 F0 91 BE 18 1F $l..B.E.:.g.....
0030: D5 48 19 93 6B 8D CB 37 4B 86 E6 7D 9B FD 8C 78 .H..k..7K......x
0040: 99 FF 83 C2 FC D9 55 06 9E 31 66 46 7D 1B 78 60 ......U..1fF..x`
0050: F4 55 D4 6C 55 C8 69 62 70 7C 4D B6 89 06 05 9B .U.lU.ibp.M.....
0060: C8 43 8E CC 0C 28 D5 D1 8C CD 46 50 E3 31 96 66 .C...(....FP.1.f
0070: 92 11 24 1E 4A 5B 4B 66 5E 65 55 1E 5F 37 9A AE ..$.J[Kf^eU._7..
chain [2] = [
Version: V1
Subject: OU=Class 3 Public Primary Certification Authority, O="VeriSign, Inc.", C=US
Signature Algorithm: MD2withRSA, OID = 1.2.840.113549.1.1.2
Key: com.sun.net.ssl.internal.ssl.JSA_RSAPublicKey@6f4bd0d6
Validity: [From: Mon Jan 29 05:30:00 GMT+05:30 1996,
To: Wed Aug 02 05:29:59 GMT+05:30 2028]
Issuer: OU=Class 3 Public Primary Certification Authority, O="VeriSign, Inc.", C=US
SerialNumber: [ 70bae41d 10d92934 b638ca7b 03ccbabf ]
Algorithm: [MD2withRSA]
Signature:
0000: BB 4C 12 2B CF 2C 26 00 4F 14 13 DD A6 FB FC 0A .L.+.,&.O.......
0010: 11 84 8C F3 28 1C 67 92 2F 7C B6 C5 FA DF F0 E8 ....(.g./.......
0020: 95 BC 1D 8F 6C 2C A8 51 CC 73 D8 A4 C0 53 F0 4E ....l,.Q.s...S.N
0030: D6 26 C0 76 01 57 81 92 5E 21 F1 D1 B1 FF E7 D0 .&.v.W..^!......
0040: 21 58 CD 69 17 E3 44 1C 9C 19 44 39 89 5C DC 9C !X.i..D...D9.\..
0050: 00 0F 56 8D 02 99 ED A2 90 45 4C E4 BB 10 A4 3D ..V......EL....=
0060: F0 32 03 0E F1 CE F8 E8 C9 51 8C E6 62 9F E6 9F .2.......Q..b...
0070: C0 7D B7 72 9C C9 36 3A 6B 9F 4E A8 FF 64 0D 64 ...r..6:k.N..d.d
[read] MD5 and SHA1 hashes: len = 3055
0000: 0B 00 0B EB 00 0B E8 00 05 6A 30 82 05 66 30 82 .........j0..f0.
0010: 04 CF A0 03 02 01 02 02 10 60 96 27 1C 4F D3 F6 .........`.'.O..
0020: FB 6D 1B A8 C2 39 71 DE C5 30 0D 06 09 2A 86 48 .m...9q..0...*.H
0030: 86 F7 0D 01 01 04 05 00 30 81 BA 31 1F 30 1D 06 ........0..1.0..
0040: 03 55 04 0A 13 16 56 65 72 69 53 69 67 6E 20 54 .U....VeriSign T
0050: 72 75 73 74 20 4E 65 74 77 6F 72 6B 31 17 30 15 rust Network1.0.
0060: 06 03 55 04 0B 13 0E 56 65 72 69 53 69 67 6E 2C ..U....VeriSign,
0070: 20 49 6E 63 2E 31 33 30 31 06 03 55 04 0B 13 2A Inc.1301..U...*
0080: 56 65 72 69 53 69 67 6E 20 49 6E 74 65 72 6E 61 VeriSign Interna
0090: 74 69 6F 6E 61 6C 20 53 65 72 76 65 72 20 43 41 tional Server CA
00A0: 20 2D 20 43 6C 61 73 73 20 33 31 49 30 47 06 03 - Class 31I0G..
00B0: 55 04 0B 13 40 77 77 77 2E 76 65 72 69 73 69 67 [email protected]
00C0: 6E 2E 63 6F 6D 2F 43 50 53 20 49 6E 63 6F 72 70 n.com/CPS Incorp
00D0: 2E 62 79 20 52 65 66 2E 20 4C 49 41 42 49 4C 49 .by Ref. LIABILI
00E0: 54 59 20 4C 54 44 2E 28 63 29 39 37 20 56 65 72 TY LTD.(c)97 Ver
00F0: 69 53 69 67 6E 30 1E 17 0D 30 30 31 32 32 32 30 iSign0...0012220
0100: 30 30 30 30 30 5A 17 0D 30 31 31 32 32 32 32 33 00000Z..01122223
0110: 35 39 35 39 5A 30 81 AD 31 0B 30 09 06 03 55 04 5959Z0..1.0...U.
0120: 06 13 02 47 42 31 0F 30 0D 06 03 55 04 08 13 06 ...GB1.0...U....
0130: 4C 6F 6E 64 6F 6E 31 0F 30 0D 06 03 55 04 07 14 London1.0...U...
0140: 06 4C 6F 6E 64 6F 6E 31 15 30 13 06 03 55 04 0A .London1.0...U..
0150: 14 0C 43 69 74 69 62 61 6E 6B 20 4E 20 41 31 0D ..Citibank N A1.
0160: 30 0B 06 03 55 04 0B 14 04 43 47 54 49 31 33 30 0...U....CGTI130
0170: 31 06 03 55 04 0B 14 2A 54 65 72 6D 73 20 6F 66 1..U...*Terms of
0180: 20 75 73 65 20 61 74 20 77 77 77 2E 76 65 72 69 use at www.veri
0190: 73 69 67 6E 2E 63 6F 6D 2F 72 70 61 20 28 63 29 sign.com/rpa (c)
01A0: 30 30 31 21 30 1F 06 03 55 04 03 14 18 77 77 77 001!0...U....www
01B0: 2E 63 65 65 6D 65 61 32 2E 63 69 74 69 62 61 6E .ceemea2.citiban
01C0: 6B 2E 63 6F 6D 30 81 9F 30 0D 06 09 2A 86 48 86 k.com0..0...*.H.
01D0: F7 0D 01 01 01 05 00 03 81 8D 00 30 81 89 02 81 ...........0....
01E0: 81 00 BB 27 99 DF 3B A4 10 CE 0F BB 86 4C AB 2A ...'..;......L.*
01F0: 4C AE 66 34 A4 36 F3 0B 0D 02 55 BF E9 16 46 68 L.f4.6....U...Fh
0200: AE D2 FA EA 07 3A 08 0F B0 48 99 6C 89 CA 9A D3 .....:...H.l....
0210: 64 FE F6 ED 24 66 EA C6 86 48 70 56 33 D4 34 57 d...$f...HpV3.4W
0220: 8E 0B DE 42 E1 36 9F 82 BA ED 25 05 AC BB 56 4B ...B.6....%...VK
0230: 45 52 FA E1 CA 81 EE E0 88 A6 6E C8 A9 FD F4 5A ER........n....Z
0240: 01 64 DB F4 6D 51 3D 85 10 57 BF ED 61 DD 0C 65 .d..mQ=..W..a..e
0250: 09 85 08 AC C9 4E E7 2B 81 3D A6 CE 5E 23 D1 EC .....N.+.=..^#..
0260: 6D F5 02 03 01 00 01 A3 82 02 76 30 82 02 72 30 m.........v0..r0
0270: 09 06 03 55 1D 13 04 02 30 00 30 82 02 1F 06 03 ...U....0.0.....
0280: 55 1D 03 04 82 02 16 30 82 02 12 30 82 02 0E 30 U......0...0...0
0290: 82 02 0A 06 0B 60 86 48 01 86 F8 45 01 07 01 01 .....`.H...E....
02A0: 30 82 01 F9 16 82 01 A7 54 68 69 73 20 63 65 72 0.......This cer
02B0: 74 69 66 69 63 61 74 65 20 69 6E 63 6F 72 70 6F tificate incorpo
02C0: 72 61 74 65 73 20 62 79 20 72 65 66 65 72 65 6E rates by referen
02D0: 63 65 2C 20 61 6E 64 20 69 74 73 20 75 73 65 20 ce, and its use
02E0: 69 73 20 73 74 72 69 63 74 6C 79 20 73 75 62 6A is strictly subj
02F0: 65 63 74 20 74 6F 2C 20 74 68 65 20 56 65 72 69 ect to, the Veri
0300: 53 69 67 6E 20 43 65 72 74 69 66 69 63 61 74 69 Sign Certificati
0310: 6F 6E 20 50 72 61 63 74 69 63 65 20 53 74 61 74 on Practice Stat
0320: 65 6D 65 6E 74 20 28 43 50 53 29 2C 20 61 76 61 ement (CPS), ava
0330: 69 6C 61 62 6C 65 20 61 74 3A 20 68 74 74 70 73 ilable at: https
0340: 3A 2F 2F 77 77 77 2E 76 65 72 69 73 69 67 6E 2E ://www.verisign.
0350: 63 6F 6D 2F 43 50 53 3B 20 62 79 20 45 2D 6D 61 com/CPS; by E-ma
0360: 69 6C 20 61 74 20 43 50 53 2D 72 65 71 75 65 73 il at CPS-reques
0370: 74 73 40 76 65 72 69 73 69 67 6E 2E 63 6F 6D 3B [email protected];
0380: 20 6F 72 20 62 79 20 6D 61 69 6C 20 61 74 20 56 or by mail at V
0390: 65 72 69 53 69 67 6E 2C 20 49 6E 63 2E 2C 20 32 eriSign, Inc., 2
03A0: 35 39 33 20 43 6F 61 73 74 20 41 76 65 2E 2C 20 593 Coast Ave.,
03B0: 4D 6F 75 6E 74 61 69 6E 20 56 69 65 77 2C 20 43 Mountain View, C
03C0: 41 20 39 34 30 34 33 20 55 53 41 20 54 65 6C 2E A 94043 USA Tel.
03D0: 20 2B 31 20 28 34 31 35 29 20 39 36 31 2D 38 38 +1 (415) 961-88
03E0: 33 30 20 43 6F 70 79 72 69 67 68 74 20 28 63 29 30 Copyright (c)
03F0: 20 31 39 39 36 20 56 65 72 69 53 69 67 6E 2C 20 1996 VeriSign,
0400: 49 6E 63 2E 20 20 41 6C 6C 20 52 69 67 68 74 73 Inc. All Rights
0410: 20 52 65 73 65 72 76 65 64 2E 20 43 45 52 54 41 Reserved. CERTA
0420: 49 4E 20 57 41 52 52 41 4E 54 49 45 53 20 44 49 IN WARRANTIES DI
0430: 53 43 4C 41 49 4D 45 44 20 61 6E 64 20 4C 49 41 SCLAIMED and LIA
0440: 42 49 4C 49 54 59 20 4C 49 4D 49 54 45 44 2E A0 BILITY LIMITED..
0450: 0E 06 0C 60 86 48 01 86 F8 45 01 07 01 01 01 A1 ...`.H...E......
0460: 0E 06 0C 60 86 48 01 86 F8 45 01 07 01 01 02 30 ...`.H...E.....0
0470: 2C 30 2A 16 28 68 74 74 70 73 3A 2F 2F 77 77 77 ,0*.(https://www
0480: 2E 76 65 72 69 73 69 67 6E 2E 63 6F 6D 2F 72 65 .verisign.com/re
0490: 70 6F 73 69 74 6F 72 79 2F 43 50 53 20 30 11 06 pository/CPS 0..
04A0: 09 60 86 48 01 86 F8 42 01 01 04 04 03 02 06 40 .`.H...B.......@
04B0: 30 14 06 03 55 1D 25 04 0D 30 0B 06 09 60 86 48 0...U.%..0...`.H
04C0: 01 86 F8 42 04 01 30 19 06 0A 60 86 48 01 86 F8 ...B..0...`.H...
04D0: 45 01 06 0F 04 0B 16 09 35 34 39 31 32 36 33 38 E.......54912638
04E0: 31 30 0D 06 09 2A 86 48 86 F7 0D 01 01 04 05 00 10...*.H........
04F0: 03 81 81 00 0F F0 06 60 B2 15 0F 90 6A 76 D1 4D .......`....jv.M
0500: 59 03 45 17 4D 3B 5F F9 82 49 CB E5 CC 5D D0 44 Y.E.M;_..I...].D
0510: E6 F0 8B 26 46 25 D5 AC B6 31 18 7B F0 27 A2 32 ...&F%...1...'.2
0520: 0D E3 EF 1F 48 36 8F C7 9A 6D FC 2D 32 A1 D3 0F ....H6...m.-2...
0530: F3 EE A7 21 B7 40 88 B5 5D 60 3E 93 84 EE 42 9F ...!.@..]`>...B.
0540: AC 27 B9 4C 63 95 E1 2C 7D 89 89 94 D9 F6 FE 48 .'.Lc..,.......H
0550: 6D 11 4A 3E 7A 38 C1 48 33 93 B3 0B 31 AE 77 6C m.J>z8.H3...1.wl
0560: 79 4F 27 A4 90 5A D4 C3 AE 8F 5E AE 52 AE 3C 39 yO'..Z....^.R.<9
0570: 23 12 D2 7A 00 04 35 30 82 04 31 30 82 03 9A A0 #..z..50..10....
0580: 03 02 01 02 02 10 23 6C 97 1E 2B C6 0D 0B F9 74 ......#l..+....t
0590: 60 DE F1 08 C3 C3 30 0D 06 09 2A 86 48 86 F7 0D `.....0...*.H...
05A0: 01 01 02 05 00 30 5F 31 0B 30 09 06 03 55 04 06 .....0_1.0...U..
05B0: 13 02 55 53 31 17 30 15 06 03 55 04 0A 13 0E 56 ..US1.0...U....V
05C0: 65 72 69 53 69 67 6E 2C 20 49 6E 63 2E 31 37 30 eriSign, Inc.170
05D0: 35 06 03 55 04 0B 13 2E 43 6C 61 73 73 20 33 20 5..U....Class 3
05E0: 50 75 62 6C 69 63 20 50 72 69 6D 61 72 79 20 43 Public Primary C
05F0: 65 72 74 69 66 69 63 61 74 69 6F 6E 20 41 75 74 ertification Aut
0600: 68 6F 72 69 74 79 30 1E 17 0D 39 37 30 34 31 37 hority0...970417
0610: 30 30 30 30 30 30 5A 17 0D 30 34 30 31 30 37 32 000000Z..0401072
0620: 33 35 39 35 39 5A 30 81 BA 31 1F 30 1D 06 03 55 35959Z0..1.0...U
0630: 04 0A 13 16 56 65 72 69 53 69 67 6E 20 54 72 75 ....VeriSign Tru
0640: 73 74 20 4E 65 74 77 6F 72 6B 31 17 30 15 06 03 st Network1.0...
0650: 55 04 0B 13 0E 56 65 72 69 53 69 67 6E 2C 20 49 U....VeriSign, I
0660: 6E 63 2E 31 33 30 31 06 03 55 04 0B 13 2A 56 65 nc.1301..U...*Ve
0670: 72 69 53 69 67 6E 20 49 6E 74 65 72 6E 61 74 69 riSign Internati
0680: 6F 6E 61 6C 20 53 65 72 76 65 72 20 43 41 20 2D onal Server CA -
0690: 20 43 6C 61 73 73 20 33 31 49 30 47 06 03 55 04 Class 31I0G..U.
06A0: 0B 13 40 77 77 77 2E 76 65 72 69 73 69 67 6E 2E [email protected].
06B0: 63 6F 6D 2F 43 50 53 20 49 6E 63 6F 72 70 2E 62 com/CPS Incorp.b
06C0: 79 20 52 65 66 2E 20 4C 49 41 42 49 4C 49 54 59 y Ref. LIABILITY
06D0: 20 4C 54 44 2E 28 63 29 39 37 20 56 65 72 69 53 LTD.(c)97 VeriS
06E0: 69 67 6E 30 81 9F 30 0D 06 09 2A 86 48 86 F7 0D ign0..0...*.H...
06F0: 01 01 01 05 00 03 81 8D 00 30 81 89 02 81 81 00 .........0......
0700: D8 82 80 E8 D6 19 02 7D 1F 85 18 39 25 A2 65 2B ...........9%.e+
0710: E1 BF D4 05 D3 BC E6 36 3B AA F0 4C 6C 5B B6 E7 .......6;..Ll[..
0720: AA 3C 73 45 55 B2 F1 BD EA 97 42 ED 9A 34 0A 15 .<sEU.....B..4..
0730: D4 A9 5C F5 40 25 DD D9 07 C1 32 B2 75 6C C4 CA ..\.@%....2.ul..
0740: BB A3 FE 56 27 71 43 AA 63 F5 30 3E 93 28 E5 FA ...V'qC.c.0>.(..
0750: F1 09 3B F3 B7 4D 4E 39 F7 5C 49 5A B8 C1 1D D3 ..;..MN9.\IZ....
0760: B2 8A FE 70 30 95 42 CB FE 2B 51 8B 5A 3C 3A F9 ...p0.B..+Q.Z<:.
0770: 22 4F 90 B2 02 A7 53 9C 4F 34 E7 AB 04 B2 7B 6F "O....S.O4.....o
0780: 02 03 01 00 01 A3 82 01 90 30 82 01 8C 30 0F 06 .........0...0..
0790: 03 55 1D 13 04 08 30 06 01 01 FF 02 01 00 30 0B .U....0.......0.
07A0: 06 03 55 1D 0F 04 04 03 02 01 06 30 11 06 09 60 ..U........0...`
07B0: 86 48 01 86 F8 42 01 01 04 04 03 02 01 06 30 20 .H...B........0
07C0: 06 03 55 1D 25 04 19 30 17 06 0A 60 86 48 01 86 ..U.%..0...`.H..
07D0: F8 45 01 08 01 06 09 60 86 48 01 86 F8 42 04 01 .E.....`.H...B..
07E0: 30 82 01 35 06 03 55 1D 20 04 82 01 2C 30 82 01 0..5..U. ...,0..
07F0: 28 30 82 01 24 06 0B 60 86 48 01 86 F8 45 01 07 (0..$..`.H...E..
0800: 01 01 30 82 01 13 30 28 06 08 2B 06 01 05 05 07 ..0...0(..+.....
0810: 02 01 16 1C 68 74 74 70 73 3A 2F 2F 77 77 77 2E ....https://www.
0820: 76 65 72 69 73 69 67 6E 2E 63 6F 6D 2F 43 50 53 verisign.com/CPS
0830: 30 81 E6 06 08 2B 06 01 05 05 07 02 02 30 81 D9 0....+.......0..
0840: 30 15 16 0E 56 65 72 69 53 69 67 6E 2C 20 49 6E 0...VeriSign, In
0850: 63 2E 30 03 02 01 01 1A 81 BF 56 65 72 69 53 69 c.0.......VeriSi
0860: 67 6E 27 73 20 43 65 72 74 69 66 69 63 61 74 69 gn's Certificati
0870: 6F 6E 20 50 72 61 63 74 69 63 65 20 53 74 61 74 on Practice Stat
0880: 65 6D 65 6E 74 2C 20 77 77 77 2E 76 65 72 69 73 ement, www.veris
0890: 69 67 6E 2E 63 6F 6D 2F 43 50 53 2C 20 67 6F 76 ign.com/CPS, gov
08A0: 65 72 6E 73 20 74 68 69 73 20 63 65 72 74 69 66 erns this certif
08B0: 69 63 61 74 65 20 26 20 69 73 20 69 6E 63 6F 72 icate & is incor
08C0: 70 6F 72 61 74 65 64 20 62 79 20 72 65 66 65 72 porated by refer
08D0: 65 6E 63 65 20 68 65 72 65 69 6E 2E 20 53 4F 4D ence herein. SOM
08E0: 45 20 57 41 52 52 41 4E 54 49 45 53 20 44 49 53 E WARRANTIES DIS
08F0: 43 4C 41 49 4D 45 44 20 26 20 4C 49 41 42 49 4C CLAIMED & LIABIL
0900: 49 54 59 20 4C 54 44 2E 20 28 63 29 31 39 39 37 ITY LTD. (c)1997
0910: 20 56 65 72 69 53 69 67 6E 30 0D 06 09 2A 86 48 VeriSign0...*.H
0920: 86 F7 0D 01 01 02 05 00 03 81 81 00 B8 8C 98 C3 ................
0930: 2B 48 F5 72 CD 68 0D 1A B3 74 63 BB B1 58 B6 98 +H.r.h...tc..X..
0940: 45 22 EC 11 8D C7 4E 33 8B 62 5A 21 24 6C 9A C0 E"....N3.bZ!$l..
0950: 42 B4 45 A9 3A FB 67 F0 91 BE 18 1F D5 48 19 93 B.E.:.g......H..
0960: 6B 8D CB 37 4B 86 E6 7D 9B FD 8C 78 99 FF 83 C2 k..7K......x....
0970: FC D9 55 06 9E 31 66 46 7D 1B 78 60 F4 55 D4 6C ..U..1fF..x`.U.l
0980: 55 C8 69 62 70 7C 4D B6 89 06 05 9B C8 43 8E CC U.ibp.M......C..
0990: 0C 28 D5 D1 8C CD 46 50 E3 31 96 66 92 11 24 1E .(....FP.1.f..$.
09A0: 4A 5B 4B 66 5E 65 55 1E 5F 37 9A AE 00 02 40 30 J[Kf^eU._7....@0
09B0: 82 02 3C 30 82 01 A5 02 10 70 BA E4 1D 10 D9 29 ..<0.....p.....)
09C0: 34 B6 38 CA 7B 03 CC BA BF 30 0D 06 09 2A 86 48 4.8......0...*.H
09D0: 86 F7 0D 01 01 02 05 00 30 5F 31 0B 30 09 06 03 ........0_1.0...
09E0: 55 04 06 13 02 55 53 31 17 30 15 06 03 55 04 0A U....US1.0...U..
09F0: 13 0E 56 65 72 69 53 69 67 6E 2C 20 49 6E 63 2E ..VeriSign, Inc.
0A00: 31 37 30 35 06 03 55 04 0B 13 2E 43 6C 61 73 73 1705..U....Class
0A10: 20 33 20 50 75 62 6C 69 63 20 50 72 69 6D 61 72 3 Public Primar
0A20: 79 20 43 65 72 74 69 66 69 63 61 74 69 6F 6E 20 y Certification
0A30: 41 75 74 68 6F 72 69 74 79 30 1E 17 0D 39 36 30 Authority0...960
0A40: 31 32 39 30 30 30 30 30 30 5A 17 0D 32 38 30 38 129000000Z..2808
0A50: 30 31 32 33 35 39 35 39 5A 30 5F 31 0B 30 09 06 01235959Z0_1.0..
0A60: 03 55 04 06 13 02 55 53 31 17 30 15 06 03 55 04 .U....US1.0...U.
0A70: 0A 13 0E 56 65 72 69 53 69 67 6E 2C 20 49 6E 63 ...VeriSign, Inc
0A80: 2E 31 37 30 35 06 03 55 04 0B 13 2E 43 6C 61 73 .1705..U....Clas
0A90: 73 20 33 20 50 75 62 6C 69 63 20 50 72 69 6D 61 s 3 Public Prima
0AA0: 72 79 20 43 65 72 74 69 66 69 63 61 74 69 6F 6E ry Certification
0AB0: 20 41 75 74 68 6F 72 69 74 79 30 81 9F 30 0D 06 Authority0..0..
0AC0: 09 2A 86 48 86 F7 0D 01 01 01 05 00 03 81 8D 00 .*.H............
0AD0: 30 81 89 02 81 81 00 C9 5C 59 9E F2 1B 8A 01 14 0.......\Y......
0AE0: B4 10 DF 04 40 DB E3 57 AF 6A 45 40 8F 84 0C 0B [email protected]@....
0AF0: D1 33 D9 D9 11 CF EE 02 58 1F 25 F7 2A A8 44 05 .3......X.%.*.D.
0B00: AA EC 03 1F 78 7F 9E 93 B9 9A 00 AA 23 7D D6 AC ....x.......#...
0B10: 85 A2 63 45 C7 72 27 CC F4 4C C6 75 71 D2 39 EF ..cE.r'..L.uq.9.
0B20: 4F 42 F0 75 DF 0A 90 C6 8E 20 6F 98 0F F8 AC 23 OB.u..... o....#
0B30: 5F 70 29 36 A4 C9 86 E7 B1 9A 20 CB 53 A5 85 E7 _p)6...... .S...
0B40: 3D BE 7D 9A FE 24 45 33 DC 76 15 ED 0F A2 71 64 =....$E3.v....qd
0B50: 4C 65 2E 81 68 45 A7 02 03 01 00 01 30 0D 06 09 Le..hE......0...
0B60: 2A 86 48 86 F7 0D 01 01 02 05 00 03 81 81 00 BB *.H.............
0B70: 4C 12 2B CF 2C 26 00 4F 14 13 DD A6 FB FC 0A 11 L.+.,&.O........
0B80: 84 8C F3 28 1C 67 92 2F 7C B6 C5 FA DF F0 E8 95 ...(.g./........
0B90: BC 1D 8F 6C 2C A8 51 CC 73 D8 A4 C0 53 F0 4E D6 ...l,.Q.s...S.N.
0BA0: 26 C0 76 01 57 81 92 5E 21 F1 D1 B1 FF E7 D0 21 &.v.W..^!......!
0BB0: 58 CD 69 17 E3 44 1C 9C 19 44 39 89 5C DC 9C 00 X.i..D...D9.\...
0BC0: 0F 56 8D 02 99 ED A2 90 45 4C E4 BB 10 A4 3D F0 .V......EL....=.
0BD0: 32 03 0E F1 CE F8 E8 C9 51 8C E6 62 9F E6 9F C0 2.......Q..b....
0BE0: 7D B7 72 9C C9 36 3A 6B 9F 4E A8 FF 64 0D 64 ..r..6:k.N..d.d
*** RSA ServerKeyExchange
RSA Modulus: { 0, 220, 139, 250, 222, 127, 49, 15, 95, 89, 215, 106, 138, 129, 235, 255, 93, 104, 66, 162, 49, 12, 56, 164, 176, 248, 178, 247, 19, 165, 158, 146, 23, 35, 24, 200, 200, 229, 62, 237, 249, 75, 51, 235, 70, 187, 24, 192, 112, 11, 73, 244, 220, 249, 20, 101, 136, 192, 4, 9, 50, 41, 141, 209, 85 }
RSA Public Exponent: { 1, 0, 1 }
[read] MD5 and SHA1 hashes: len = 206
0000: 0C 00 00 CA 00 41 00 DC 8B FA DE 7F 31 0F 5F 59 .....A......1._Y
0010: D7 6A 8A 81 EB FF 5D 68 42 A2 31 0C 38 A4 B0 F8 .j....]hB.1.8...
0020: B2 F7 13 A5 9E 92 17 23 18 C8 C8 E5 3E ED F9 4B .......#....>..K
0030: 33 EB 46 BB 18 C0 70 0B 49 F4 DC F9 14 65 88 C0 3.F...p.I....e..
0040: 04 09 32 29 8D D1 55 00 03 01 00 01 00 80 BA 34 ..2)..U........4
0050: E7 DB 69 31 D3 C3 40 70 D6 E8 21 59 F0 51 AB 16 ..i1..@p..!Y.Q..
0060: 30 25 82 6B 89 71 C5 BA 88 EB B4 17 1C 6D E4 B5 0%.k.q.......m..
0070: BB B9 97 3A 44 1D 8D 50 5D F0 3A A6 0A FF 60 CF ...:D..P].:...`.
0080: DE CC ED 96 D8 0F F5 58 46 48 31 B1 35 0C 0D 4B .......XFH1.5..K
0090: 2F 17 10 65 50 14 A1 4B 7E AC 1D 23 7E 46 D1 6B /..eP..K...#.F.k
00A0: 96 67 AC 53 3A 4D 9A F8 6C B1 21 32 CE 88 3C 67 .g.S:M..l.!2..<g
00B0: 2B 31 EA 1E 5D 26 0D 91 C0 97 F3 64 C9 9F 51 34 +1..]&.....d..Q4
00C0: D9 A8 56 1C B8 46 62 8C 53 B8 EB E8 B8 94 ..V..Fb.S.....
*** ServerHelloDone
[read] MD5 and SHA1 hashes: len = 4
0000: 0E 00 00 00 ....
*** ClientKeyExchange, RSA PreMasterSecret, v3.0
Random Secret: { 3, 0, 93, 240, 54, 45, 201, 36, 26, 84, 144, 76, 18, 32, 241, 29, 208, 244, 47, 63, 127, 113, 205, 22, 115, 183, 222, 202, 208, 173, 81, 168, 13, 177, 7, 184, 230, 85, 213, 248, 251, 113, 36, 156, 236, 171, 97, 216 }
[write] MD5 and SHA1 hashes: len = 68
0000: 10 00 00 40 B4 EC 49 02 09 61 36 4F 86 07 26 12 [email protected]..&.
0010: 70 E2 EE 78 5F C8 6A 01 F9 32 89 1C 8B C4 2B 34 p..x_.j..2....+4
0020: E3 B4 21 CA 60 E2 8A 56 B5 B2 20 BE FC 3B 5E 0A ..!.`..V.. ..;^.
0030: D9 81 BB 35 49 C0 22 F6 69 1C F6 84 A7 45 12 C0 ...5I.".i....E..
0040: 22 1E 86 47 "..G
main, WRITE: SSL v3.0 Handshake, length = 68
SESSION KEYGEN:
PreMaster Secret:
0000: 03 00 5D F0 36 2D C9 24 1A 54 90 4C 12 20 F1 1D ..].6-.$.T.L. ..
0010: D0 F4 2F 3F 7F 71 CD 16 73 B7 DE CA D0 AD 51 A8 ../?.q..s.....Q.
0020: 0D B1 07 B8 E6 55 D5 F8 FB 71 24 9C EC AB 61 D8 .....U...q$...a.
CONNECTION KEYGEN:
Client Nonce:
0000: 3B 73 6B 85 BE 9C D3 DB 5A 32 3B 01 10 A9 FE 33 ;sk.....Z2;....3
0010: 15 3E 95 5A E7 5E 50 F6 64 32 1F 50 63 71 1E 7F .>.Z.^P.d2.Pcq..
Server Nonce:
0000: 00 00 38 01 01 FD 89 4E F8 A1 2B FB 7D CD CD 91 ..8....N..+.....
0010: 45 B0 64 C9 52 D1 2C 9B C2 8F CD AD B1 20 3E A2 E.d.R.,...... >.
Master Secret:
0000: 47 F8 BE 08 39 E9 48 F3 21 49 49 AA EA 35 D6 A6 G...9.H.!II..5..
0010: 8C 1A 71 B6 EA 9C C5 CC C4 AF 86 D0 25 6D 89 DE ..q.........%m..
0020: 5E FD 8C FC 2A 3C 18 35 6C B6 67 B0 F8 F7 E1 A3 ^...*<.5l.g.....
Client MAC write Secret:
0000: 35 EA 82 28 5D A7 9E E0 84 B7 EE D0 E3 42 09 77 5..(]........B.w
Server MAC write Secret:
0000: 0F 09 07 42 F3 44 F6 B0 A0 6E 8E 96 D6 DA E5 F5 ...B.D...n......
Client write key:
0000: 54 6A E0 5E 8B 05 03 59 D4 1F E3 FB B9 83 62 F4 Tj.^...Y......b.
Server write key:
0000: D5 7B 57 5B 29 58 36 7E 79 59 4F 66 20 9A 13 62 ..W[)X6.yYOf ..b
... no IV for cipher
main, WRITE: SSL v3.0 Change Cipher Spec, length = 1
*** Finished, v3.0
MD5 Hash: { 15, 249, 230, 83, 227, 150, 56, 210, 34, 235, 9, 89, 131, 214, 230, 12 }
SHA1 Hash: { 108, 86, 236, 53, 127, 202, 85, 117, 129, 156, 34, 177, 24, 29, 176, 163, 175, 46, 72, 236 }
[write] MD5 and SHA1 hashes: len = 40
0000: 14 00 00 24 0F F9 E6 53 E3 96 38 D2 22 EB 09 59 ...$...S..8."..Y
0010: 83 D6 E6 0C 6C 56 EC 35 7F CA 55 75 81 9C 22 B1 ....lV.5..Uu..".
0020: 18 1D B0 A3 AF 2E 48 EC ......H.
Plaintext before ENCRYPTION: len = 56
0000: 14 00 00 24 0F F9 E6 53 E3 96 38 D2 22 EB 09 59 ...$...S..8."..Y
0010: 83 D6 E6 0C 6C 56 EC 35 7F CA 55 75 81 9C 22 B1 ....lV.5..Uu..".
0020: 18 1D B0 A3 AF 2E 48 EC 70 B3 E7 C1 D9 6D D4 01 ......H.p....m..
0030: EE F1 A5 DE F5 D1 11 8C ........
main, WRITE: SSL v3.0 Handshake, length = 56
main, READ: SSL v3.0 Change Cipher Spec, length = 1
main, READ: SSL v3.0 Handshake, length = 56
Plaintext after DECRYPTION: len = 56
0000: 14 00 00 24 FF 99 25 8F B3 9E B7 A8 CA FF 48 64 ...$..%.......Hd
0010: 77 DB BC EE 0C 74 A5 7C 61 A0 16 65 -
Getting the response code from a http url connection
The following program bombs if it does not find a page
import java.net.*;
import java.io.*;
public class URLReader {
public static void main(String[] args) throws Exception {
URL yahoo = new URL("http://www.yahoo.com/sadjhasjd.html");
HttpURLConnection client = (HttpURLConnection) yahoo.openConnection();
int resp_code = 0;
if(client!=null)
resp_code = client.getResponseCode();
I want to get the page that the yahoo returns if it cannot get the page.... just cut and paste the above address in a web browser and see what you get.....how can i get that page back....the above thing throws an IOException...............
thanks
sharadThe problem is it doesn't like .htm or .html for some reason.. I don't know this reason but somebody else might..
Just try taking the .html off the link like this, then I'm sure you'll get the error now.
URL yahoo = new URL("http://www.yahoo.com/sadjhasjd");
I know it's not what you want but that is all I can offer. It seems to only look for the main index.htm(l) or welcome.htm(l) files. Sorry thats as much as I can offer on this. -
Hello every one
actually i successfully login to webpage using httpPost
String urlEncodedContent = preparePostContent(LOGIN_USER_NAME, LOGIN_PASSWORD);
HttpURLConnection urlConnection = doHttpPost(TARGET_URL, urlEncodedContent);
String response = readResponse(urlConnection);but how can navigate from the page which i login to it to other web page in order to get its content
in other words
if i login to www.site.com/login.html
after logging from application i want to go to www.site.com/content/html but i lose my session so i get the content empty !!!
thanksI guarantee that this will work for you: [Java Programmatic Browser|http://www.swview.org/blog/java-programmatic-browser]
What you will do is visit the login page, submit the form and continue to the page you want. Look at the httpunit api for details (form submission). -
Http Request through URL Connection?
Hi ,
Iam using an Applet (under JRE 1.3.0). Iam trying to send a Http Request using URL Connection. It is working fine . However, if the response time of the server is more than 3 minutes , the Response is not coming back to the server and the Applet is in a loop trying to read from the Server. I have observed that the request is sent to the server and it is processed successfully.
When I test it in my local devp. machine it is working fine till 15 minutes which is my requirement.
Can anybody suggest what should be the possible reasons and any workaround for it?
Regards,
TejoKiran.YIam copying the code fragments for the Applet Iam using . Is it a problem with the code? I heard that the URLConnection never times out . How is that it is not able to read the Response?
<CODE >
<HttpMessage>
public class HttpMessage {
URL servlet = null;
Hashtable headers = null;
public HttpMessage(URL servlet) {
this.servlet = servlet;
public InputStream sendGetMessage(Properties args) throws IOException {
String argString = ""; // default
if (args != null) {
argString = "?" + toEncodedString(args);
URL url = new URL(servlet.toExternalForm() + argString);
// Turn off caching
URLConnection con = url.openConnection();
con.setUseCaches(false);
// Send headers
sendHeaders(con);
return con.getInputStream();
private void sendHeaders(URLConnection con) {
if (headers != null) {
Enumeration enum = headers.keys();
while (enum.hasMoreElements()) {
String name = (String) enum.nextElement();
String value = (String) headers.get(name);
con.setRequestProperty(name, value);
</HttpMssage>
<Code used to Read the Response.>
URL url = new URL(getDocumentBase(),"/ccls/test/delay.jsp");
HttpMessage msg = new HttpMessage(url);
InputStream in = msg.sendGetMessage(null);
char[] buff = new char[2048];
int bytesRead;
int ch;
StringBuffer sbtextbox = new StringBuffer("");
DataInputStream data = new DataInputStream(
new BufferedInputStream(in));
String line;
while ((line = data.readLine()) != null) {
sbtextbox.append(line+"\r\n");
</Code used to Read the Response.>
</CODE> -
OS X10.4.11 update, Safari won't connect to secure (HTTPS) URLs
Didn't find any discussion of this particular symptom of the update, so thought I'd ask.
Installed 10.4.11 update over the weekend, which contained Safari v3.0.4. After the (uneventful) install and reboot, I'm unable to connect to any secure (HTTPS) URL. Browser seems to work on non-secure connections (HTTP). My FIREFOX browser on the same machine still works.
Haven't experienced any crashing or other OS issues, only the "Can't make a secure connection" with Safari (so far).
Suggestions would be appreciated.Did you recently install the latest Security upgrade, but did not "repair permissions" on the restart? If so, that's your answer. I have found it essential to "Repair permissions" before and after any Apple system update, or Security update. Otherwise oddities may appear in the operating system.
Also, sometimes reapplying the Combo Update specific to your current version of OS X remedies these types of problems. Here too, it's important to "repair permissions" etc. -
hai guys,
I developed one report and data downloaded into application path and file format is CSV. My development was working fine . Now I want to change file downloaded into FTP location ( this is also working). Now i want to connect HTTP URL path.
How to connect HTTP URL path ( Not Open method only connect)
Thanks in advanceHello,
U can make use of these Fm to connect to URL.
Use this code.
CNHT
CALL FUNCTION 'WS_EXECUTE' "#EC *
EXPORTING
COMMANDLINE = LV_CMDLINE
PROGRAM = LV_PGMNAME
EXCEPTIONS
FRONTEND_ERROR = 1
NO_BATCH = 2
PROG_NOT_FOUND = 3
ILLEGAL_OPTION = 4
GUI_REFUSE_EXECUTE = 5
OTHERS = 6.
IF SY-SUBRC <> 0.
Where LV_CMDLINE = WWW.SAP.COM
LV_PGMNAME = IEXPLORE.EXE
If useful reward points
Vasanth
Message was edited by: Vasanth M -
How to do Handshake with tired party(bank) HTTPS URL from SAP PI server
Dear Expert,
I have developed bunch of scenarios, all are synchronous ABAP proxy to HTTP_AAE with bank on PI 7.4(dual stack). Bank web server is HTTPS enabled server. Our ABAP developments are still in progress also we have few issue in connection from ECC to PI.but that is not the focus of discussion here.
we want to do the handshake to check the connectivity with bank on their HTTPS URL from PI. Bank has provided the privet key for SSL from their server and corresponding public key they have maintained on their server. I have imported the private key under NWA -> Certificates -> Key Storage -> TrustedCA->Import Entry->Entry Type->PKCS#12->select the SSL.p12 file->import , also I have selected the option to "Use SSL" in HTTP_AAE receiver communication channel and selected the corresponding entryin "keystore view" and "keystore entry". All these I have done in our DEV system, and we are trying to connect our PI dev to bank Dev server.
Questions
Is there any specific steps to do the handshake with third party HTTPS(bank in my case) server? if not, how can we just test the HTTPS connectivity by using the SSL private installed on our PI server, without running the complete scenarios. Our PI has been installed on UNIX, and "telnet https url 443" is working, as network team has opened the HTTPS port.
We have not enabled the SSL technically on our PI server, and we have not installed any generated certificate from our PI server. Moreover, we have not made our PI url as "https:hostname:port" as we just need to communicate with bank by using their private key. Do you guys think we should enable the SSL? if yes, please explain why.
What is the best practice to test the connection with third party having HTTPS URL? how can I just assure HTTPS communication is working fine, before testing my actual scenarios.
Thanks for helping always.
Regards,
FarhanHi Farhan,
Some part of the blog is applicable for sending HTTPS request to partners/third party (Receiver SOAP Adapter).
If banks certificates are already in trustedCA, then, can you check if it also imported under user PIISuser under Identity management in NWA. If above 2 steps are done then i think your are good to go. But be careful when you install certificate, it should be in proper order.
As you already mentioned, connectivity is already established and you are able to PIng/telnet from pi server, connectivity looks ok.
While sending request, if you are getting 401 unauthorized, below might be the reason -
1. Certificate not installed correctly or some missing steps
2. Partner or TP is not ready to receive it, some certificate issue in there side.
other than 401 means you are ok (As per certificate and Connectivity) - 403 and 500 errors are next stops.
403 - error because of encoding method.
500 - data issue.
Regards
Aashish Sinha -
hello all,
I hope you can help me.
Please have a look at my code below
I open an URL Connection but I can't close it.
If i type in a DOS Box netstat I see a lot of connection.
Now my question is how can I close the connection.
m_http.disconnect() seems not to work.
public class Unbenannt1 extends Applet
Button button1 = new Button();
private HttpURLConnection m_http = null;
private URL m_MyAlarmURL = null;
private URLConnection m_MyURLConnection = null;
private long m_TimeAlarmXML = 0;
private boolean m_TimeUpdate = true;
/**Das Applet initialisieren*/
public void init()
String a_str = "http://"+ getCodeBase().getHost() + "/x.xml";
try
m_MyAlarmURL = new URL( a_str );
catch ( MalformedURLException ie )
try
jbInit();
catch(Exception e)
e.printStackTrace();
/**Initialisierung der Komponenten*/
private void jbInit() throws Exception
button1.setLabel("button1");
button1.setBounds(new Rectangle(27, 28, 78, 27));
button1.addActionListener(new java.awt.event.ActionListener() {
public void actionPerformed(ActionEvent e) {
button1_actionPerformed(e);
setLayout(null);
setBackground(java.awt.Color.lightGray);
setSize(426,266);
this.add(button1, null);
void button1_actionPerformed(ActionEvent e)
int a_int = 0;
try
m_MyURLConnection = m_MyAlarmURL.openConnection();
m_http = (HttpURLConnection)m_MyURLConnection;
m_http.setRequestMethod( "HEAD" );
m_http.setUseCaches(false);
m_http.connect();
a_int = m_http.getResponseCode();
m_http.disconnect();
m_http = null;
m_MyURLConnection = null;
System.gc();
catch ( java.io.IOException ioe )
a_int = 404;
}Thanks a lot
PredigerUsually those connections linger around for some time, and will then be closed by the OS once a certain timeout has been reached. I don't know how to change that timeout, though.
Btw: the docs don't claim that the connection will be closed. The description for disconnect() is "Indicates that other requests to the server are unlikely in the near future"
If you still see the connection after a while, then something is wrong, but I've seen connections like that hang around for several minutes even after the JVM was terminated.
Thomas -
Problems with SAP BC to post a request to https URL
Hello,
in a integration scenario one of our partners wants to send a xml to our server via https.<br/>
I tried this internal with a test business connector. I simple use the WmPublic.pub.client http service.<br/>
I try to post a record to an https:// URL and get an error. It seems that there is some trouble with the ssl handshake. However it is working in the browser.<br/>
The option Security -> Certificates -> Trusted Certificates -> CA Certificates Directory is 'unspecified'. Therefore no server certificate should be reject.<br/>
<br/>
Now I got an 'iaik.security.ssl.SSLException: Peer sent alert: Alert Fatal: handshake failure<br/>
' error. I do not find any helpful entries in this forum. Did anyone solve this issue?<br/>
<br/>
Thank you,<br/>
Nils<br/>
<br/>
error:<br/>
2009-08-03 10:08:13 CEST iaik.security.ssl.SSLException: Peer sent alert: Alert Fatal: handshake failure<br/>
at iaik.security.ssl.r.f(Unknown Source)<br/>
at iaik.security.ssl.x.b(Unknown Source)<br/>
at iaik.security.ssl.x.a(Unknown Source)<br/>
at iaik.security.ssl.r.d(Unknown Source)<br/>
at iaik.security.ssl.SSLTransport.startHandshake(Unknown Source)<br/>
at iaik.security.ssl.SSLTransport.getInputStream(Unknown Source)<br/>
at iaik.security.ssl.SSLSocket.getInputStream(Unknown Source)<br/>
at com.wm.net.NetURLConnection.trySSLConnect(NetURLConnection.java:691)<br/>
at com.wm.net.NetURLConnection.httpsConnect(NetURLConnection.java:562)<br/>
at com.wm.net.NetURLConnection.connect(NetURLConnection.java:171)<br/>
at com.wm.net.HttpURLConnection.getOutputStream(HttpURLConnection.java:419)<br/>
at com.wm.net.HttpContext.getOutputStream(HttpContext.java:578)<br/>
at com.wm.net.HttpContext.getOutputStream(HttpContext.java:554)<br/>
at com.wm.net.HttpContext.post(HttpContext.java:338)<br/>
at pub.client.http(client.java:512)<br/>
<br/>
SAP BC Info:<br/>
Software <br/>
Product webMethods Integration Server <br/>
Version 4.6 (Standard Encryption) Release Notes <br/>
Updates BC46_CoreFix7 <br/>
Build Number 940 + CoreFix 7 [Fixes 1-205 + SP1-3] <br/>
SSL Standard (40-bit), Provider: IAIK 2.6 <br/>
<br/>
Server Environment <br/>
Java Version 1.3.1_20 (47.0) <br/>
Java Vendor Sun Microsystems Inc. <br/>
Java Home /usr/jdk1.3.1_20/jre <br/>
Java VM Version 1.3.1_20-b03 <br/>
Java VM Info Java HotSpot(TM) Client VM (mixed mode) <br/>
Classpath /usr/local/sapbc46/server/updates/BC46_CoreFix7.jar<br/>
/usr/local/sapbc46/server/lib/server.jar<br/>
/usr/java/lib/i18n.jar<br/>
/usr/java/jre/lib/rt.jar<br/>
/usr/java/lib/i18n.jar<br/>
/usr/java/jre/lib/rt.jar<br/>
/usr/java/lib/i18n.jar<br/>
/usr/java/jre/lib/rt.jar<br/>
/usr/java/lib/i18n.jar<br/>
/usr/java/jre/lib/rt.jar<br/>
/usr/java/lib/i18n.jar<br/>
/usr/java/jre/lib/rt.jar<br/>
/usr/java/lib/i18n.jar<br/>
/usr/java/jre/lib/rt.jar<br/>
/usr/local/sapbc46/server/lib/classes<br/>
/usr/local/sapbc46/server/lib/client.jar<br/>
/usr/local/sapbc46/server/lib/mail.jar<br/>
/usr/local/sapbc46/server/lib/server.jar<br/>
packages/SAP/code/classes<br/>
packages/SAP/code/jars/static/inqmyxml.jar<br/>
packages/SAP/code/jars/static/jARM.jar<br/>
packages/SAP/code/jars/static/jCO.jar<br/>
packages/SAP/code/jars/static/sapjco.jar<br/>
packages/SAP/code/jars/static/sapxmltoolkit.jar<br/>
packages/WmPartners/code/classes<br/>
packages/WmWin32/code/classes <br/>
OS Linux <br/>
OS Platform i386 <br/>
OS Version 2.6.18.8-0.13-default <br/>
Current User sapbc <br/>
Working Dir /usr/local/sapbc46/server<br/>Ok - in this case you need to include to session based SSL setup in your flow (scenario).
The pub.security:setKeyAndChain and pub.security:clearKeyAndChain services are used to control which client certificate
the SAP BC server presents to remote servers. You need to use these services to switch between certificates and
certificate chains if you are not using aliases for remote servers.
List of services to be used:
pub.security:clearKeyAndChain
-- Associates the default key and certificate chain with the subsequent set of invoked services.
pub.security:setKeyAndChain
-- Processes a digital signature to make sure that the provided data has not been modified. The signature input is the DER encoding of the PKCS#7 SignedData object.
pub.security.pkcs7:sign
-- Creates a PKCS7 SignedData object.
pub.security.pkcs7:verify
-- Processes a digital signature to make sure that the provided data has not been modified.
pub.security.util:createMessageDigest
-- Generates a message digest for a given message.
pub.security.util:getCertificateInfo
-- Retrieves information (e.g., serial number, issuer, expiration date) from a digital certificate.
pub.security.util:loadPKCS7CertChain
-- Converts a certificate chain that is in PKCS7 format to a list (a one-dimensional array) of byte arrays.
Example:
Invoke pub.client:http to send data to Company D.
Invoke pub.security:setKeyAndChain using the key and certificate chain for Company B.
Invoke pub.client:http to send data to Company B.
Invoke pub.security:setKeyAndChain using the key and certificate chain for Company C.
Invoke pub.client:http to send data to Company C.
Invoke pub.security:clearKeyAndChain to revert back to the default key and certificate chain for Company
Au2019s server.
Invoke pub.client:http to send data to Company D.
Edited by: Kai Lerch-Baier on Aug 3, 2009 1:47 PM -
Map Viewer URL Connection Issue
Hi,
I have an UI project, for which i have created a Deployment Profile named 'adfXXXXXUI' nothing but created a adflibrary for that UI project.
While creating the adf jar, i have come across an Option called 'Connections' .
Here i have selected Connection Names Only ... means i will be getting all the names of the connections i have created & those will be reflected in my local connection.xml file.
After configuring the rest of the params, i deployed my UI project to "deploy -> adfXXXXXUI.jar".
And we have used this jar to integrate with another UI application ... And the taskflows avilable in the jar will be used in the other UI application.
Now here is my problem ... Actually my connections.xml file has a URL Connection. This is how it looks like....
<?xml version = '1.0' encoding = 'UTF-8'?>
<References xmlns="http://xmlns.oracle.com/adf/jndi">
<Reference name="MapServer" className="oracle.adf.model.connection.url.HttpURLConnection" xmlns="">
<Factory className="oracle.adf.model.connection.url.URLConnectionFactory"/>
<RefAddresses>
<XmlRefAddr addrType="MapServer">
<Contents>
<urlconnection name="MapServer" url="http://sbsys1.intra.schneider.com:8109/mapviewer"/>
</Contents>
</XmlRefAddr>
</RefAddresses>
</Reference><Reference name="snibuilddb" className="oracle.jdeveloper.db.adapter.DatabaseProvider" credentialStoreKey="snibuilddb" xmlns="">
<Factory className="oracle.jdeveloper.db.adapter.DatabaseProviderFactory"/>
<RefAddresses>
<StringRefAddr addrType="subtype">
<Contents>oraJDBC</Contents>
</StringRefAddr>
<StringRefAddr addrType="user">
<Contents>sni_guest</Contents>
</StringRefAddr>
<StringRefAddr addrType="port">
<Contents>3720</Contents>
</StringRefAddr>
<StringRefAddr addrType="hostname">
<Contents>uxsys186v</Contents>
</StringRefAddr>
<SecureRefAddr addrType="password"/>
<StringRefAddr addrType="serviceName">
<Contents>snit0.world</Contents>
</StringRefAddr>
<StringRefAddr addrType="DeployPassword">
<Contents>true</Contents>
</StringRefAddr>
<StringRefAddr addrType="oraDriverType">
<Contents>thin</Contents>
</StringRefAddr>
</RefAddresses>
</Reference>
</References>
All the taskflows avaialble in my jar using the URL connection which mentioned above. But the adflibray jar got created with a file named 'jar-connection.xml', where i can see <Reference/> as an empty Tag. Because i have selected connections name only as an option when creating the adflibrary for my UI.
Hence it is appearing so ... But when i added this jar to the other application, i have dragged & dropped the taskflows as a region on to the JSPX page. And i started running the page. On the page .... i can see only the data which is not making use of MapServer connection defiition. Along with that, some maps needs to rendered .. but that is not happening. Rest of the page with the filter critieria is being displayed properly.
Now i have selected Include Connection Details as an option, by editing the adfLibrary Deployment profile of the UI & redeployed & found the same thing. Like, though i specify the Include Connection Details as an option ... i did not see those URL connection details in my jar-connection.xml file.Still it is not working.
All the taskflows inside the jar are trying to use this URL connection from jar-connection.xml, which is avaiable inside the adfLibUI.jar.
I tried with a scenorio some thing like ... For the application to which i have added this adfUILibrary, there itself i created a URLConnection ... but it did not worked as well.
Requesting you to let me know how can i get avail of my URL connection in to my jar ...
Thanks & Regards,
Kiran KonjetiThis is purely ssl issue. You can try adding the below logic first.. This code basically sets ssl properties for us.
import java.security.Security;
Security.addProvider(new com.sun.net.ssl.internal.ssl.Provider());
Properties properties = System.getProperties();
String handlers = System.getProperty("java.protocol.handler.pkgs");
if (handlers == null) {
// nothing specified yet (expected case)
properties.put("java.protocol.handler.pkgs", "com.sun.net.ssl.internal.www.protocol");
else {
// something already there, put ourselves out front
properties.put("java.protocol.handler.pkgs", "com.sun.net.ssl.internal.www.protocol|".concat(handlers));
System.setProperties(properties);
Below you start your code.... -
How to make pool of url connections in wls?
Hi, i have a project in which i have to make a http post to multiple web
servers to retrieve
XML files in response to user requests. Right now i just open the
url for each request.
Is there any way to pool URL connections in weblogic
thanks
wasiq
Are u using Custom Connection Pool or some App Servers Conn Pool for LDAP Connection?
If you are opening LDAP Connection in your program code and wondering how to monitor, then it needs to be done on the LDAP Server side. Not from the application. -
Receiver HTTP(S) connection
Scenario: IDOC-XI-HTTP(S)
Can I do a HTTP(S) connection with Receiver comm channel ? I wan to do a secured HTTP post to the 3rd party.But When I try to create a 'Receiver' Comm channel, I only see Transport protocol of HTTP 1.0 and there is no option for selecting HTTP(S)..
But will it be a secured connection If:
1> If I specify https://ww/test.com/testpath or
2> Create a RFC destination to above URL of type 'G'(HTTP to external server) and specify HTTPS option in 'Special tab' and choose SSL option. Then Specify this destination in the comm channel.
Will any of the above options work?
OR Simple HTTPS is NOT supported for making a post to external sever from XI ?
-Thanks
BhavenHi,
This might help you
HTTP adapter
HTTP Adapter
/people/kausik.medavarapu/blog/2005/12/29/csv-file-lookup-with-http-request-and-response-in-xi
/people/siva.maranani/blog/2005/09/15/push-data-to-mvc-architectured-application-using-xi
http://help.sap.com/saphelp_nw2004s/helpdata/en/43/64dbb0af9f30b4e10000000a11466f/frameset.htm
Regards
Agasthuri Doss
Maybe you are looking for
-
How can i get firefox to ask me to open or save a download?
firefox used to ask me to open or save a file when i downloaded it and now it doesn't, is there a way 2 change it back 2 the way it was?
-
Dear All When i am creating the project definition i am giving finish date.After scheduling is carried out for networking and for WBS.In networking and in wbs i am getting the st.date&fi.date but i am not getting the st.date in project definition.So
-
Anyone here use the nike+ running app with the ipod touch?
i just got the new ipod touch 5g and wanted to get the nike+ running app because it's free, the alternate would be nike+ sensor is $20 extra. so i wanted to know: 1. how accurate the nike+ running app is in term of recording distance? since i don't h
-
(RR FORMAT) ORACLE의 2000년대 DATE FORMAT
제품 : SQL*PLUS 작성날짜 : 1997-04-23 (RR FORMAT) ORACLE의 2000년대 DATE FORMAT ========================================== 이 문서는 단지 정보 제공을 목적으로 하며 여기에 있는 내용은 통보 없이 변경될 수 있습니다. 오라클은 이 문서에 오류가 없다는 것을 보증하지 않으며, 특정 목 적에 부합하거나 혹은 상업성에 대한 묵시적인 보증과 조건 -구두적으로 표현되었 거나
-
Data source not shown in active state after replicating from source system
Hi Gurus, I have activated the datasou 0CO_PC_ACT_05 in R/3 system form RSA5 and replicated the same in BW system. After replication when i try to activate the datasource by instaling the business content.It is not getting installed. The datasource i