Topic
  • No replies
SystemAdmin
SystemAdmin
64 Posts

Pinned topic Received fatal alert: handshake_failure

‏2012-12-19T18:53:01Z |
I have a application installed on the websphere application server version 8.5 . When I test my application to connect to a third party web service, I got follwing error:Received fatal alert: handshake_failure .

The systemout log is as below:
19/12/12 11:19:12:825 EST 0000010c SystemOut O *** ClientHello, TLSv1
19/12/12 11:19:12:825 EST 0000010c SystemOut O RandomCookie: GMT: 1339091200 bytes = { 170, 115, 147, 72, 126, 170, 44, 65, 134, 180, 36, 37, 68, 239, 161, 81, 41, 91, 187, 124, 18, 114, 20, 16, 230, 100, 14, 115 }
19/12/12 11:19:12:825 EST 0000010c SystemOut O Session ID: {}
19/12/12 11:19:12:825 EST 0000010c SystemOut O Cipher Suites: SSL_RSA_WITH_RC4_128_MD5, SSL_RSA_WITH_RC4_128_SHA, SSL_RSA_WITH_AES_128_CBC_SHA, SSL_RSA_WITH_AES_256_CBC_SHA, SSL_DHE_RSA_WITH_AES_128_CBC_SHA, SSL_DHE_RSA_WITH_AES_256_CBC_SHA, SSL_DHE_DSS_WITH_AES_128_CBC_SHA, SSL_DHE_DSS_WITH_AES_256_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, SSL_RSA_FIPS_WITH_3DES_EDE_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_RC4_128_SHA, SSL_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, SSL_ECDHE_RSA_WITH_AES_256_CBC_SHA, SSL_ECDH_ECDSA_WITH_AES_256_CBC_SHA, SSL_ECDH_RSA_WITH_AES_256_CBC_SHA, SSL_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, SSL_ECDHE_RSA_WITH_AES_128_CBC_SHA, SSL_ECDH_ECDSA_WITH_AES_128_CBC_SHA, SSL_ECDH_RSA_WITH_AES_128_CBC_SHA, SSL_ECDHE_ECDSA_WITH_RC4_128_SHA, SSL_ECDHE_RSA_WITH_RC4_128_SHA, SSL_ECDH_ECDSA_WITH_RC4_128_SHA, SSL_ECDH_RSA_WITH_RC4_128_SHA, SSL_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA, SSL_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA, SSL_ECDH_RSA_WITH_3DES_EDE_CBC_SHA, SSL_RENEGO_PROTECTION_REQUEST
19/12/12 11:19:12:825 EST 0000010c SystemOut O Compression Methods: { 0 }
19/12/12 11:19:12:825 EST 0000010c SystemOut O Extension elliptic_curves, curve names: {secp256r1, secp192r1, secp224r1, secp384r1, secp521r1, secp160k1, secp160r1, secp160r2, secp192k1, secp224k1, secp256k1}
19/12/12 11:19:12:825 EST 0000010c SystemOut O Extension ec_point_formats, formats: uncompressed
19/12/12 11:19:12:825 EST 0000010c SystemOut O ***
19/12/12 11:19:12:825 EST 0000010c SystemOut O WebContainer : 0, WRITE: TLSv1 Handshake, length = 139
19/12/12 11:19:12:825 EST 000000a1 SystemOut O Deferrable Alarm : 3, WRITE: TLSv1 Application Data, length = 939
19/12/12 11:19:12:872 EST 0000010c SystemOut O WebContainer : 0, READ: TLSv1 Handshake, length = 81
19/12/12 11:19:12:872 EST 0000010c SystemOut O *** ServerHello, TLSv1
19/12/12 11:19:12:872 EST 0000010c SystemOut O RandomCookie: GMT: 1339091205 bytes = { 113, 143, 47, 186, 230, 157, 130, 63, 58, 76, 191, 144, 121, 163, 54, 108, 175, 57, 119, 139, 90, 157, 149, 110, 3, 133, 169, 151 }
19/12/12 11:19:12:872 EST 0000010c SystemOut O Session ID: {11, 74, 203, 58, 192, 233, 79, 153, 173, 149, 219, 97, 51, 181, 245, 41, 18, 64, 181, 61, 100, 154, 89, 235, 39, 129, 247, 215, 179, 120, 77, 148}
19/12/12 11:19:12:872 EST 0000010c SystemOut O Cipher Suite: SSL_RSA_WITH_RC4_128_MD5
19/12/12 11:19:12:872 EST 0000010c SystemOut O Compression Method: 0
19/12/12 11:19:12:872 EST 0000010c SystemOut O Extension renegotiation_info, ri_length: 0, ri_connection_data: { null }
19/12/12 11:19:12:872 EST 0000010c SystemOut O ***
19/12/12 11:19:12:872 EST 0000010c SystemOut O JsseJCE: Using MessageDigest MD5 from provider IBMJCE version 1.2
19/12/12 11:19:12:872 EST 0000010c SystemOut O JsseJCE: Using MessageDigest SHA from provider IBMJCE version 1.2
19/12/12 11:19:12:872 EST 0000010c SystemOut O %% Initialized: Session-12, SSL_RSA_WITH_RC4_128_MD5
19/12/12 11:19:12:872 EST 0000010c SystemOut O ** SSL_RSA_WITH_RC4_128_MD5
19/12/12 11:19:12:872 EST 0000010c SystemOut O WebContainer : 0, READ: TLSv1 Handshake, length = 1394
19/12/12 11:19:12:872 EST 0000010c SystemOut O *** Certificate chain
19/12/12 11:19:12:872 EST 0000010c SystemOut O chain [0] = [
[
Version: V3
Subject: CN=prodsvc.mib.com, O=MIB INC, ST=MASSACHUSETTS, C=US
Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5

Key: IBMJCE RSA Public Key:
modulus:
30422506404089282473379301491781371718152057538511615128592268779134499359207590085434809305601128022622711278003878031063886380227198322406343359820273039001921651147804114229540479389008839458230202870751805171349278865389067475990616390853440974206771576827465824933996220605694376307455601001350301985916157149140435545684739693690444777682203071504467932615447643438087801800717023715123398744485091760244259811840776423994175587562274393920343409285842471984855967597703018813061713574796387168165655111144243307720176923151768368277307516535029020991390847874287287997997185060124198049958245046853621046103067
public exponent:
65537

Validity: [From: Sun Nov 13 19:00:00 EST 2011,
To: Fri Dec 15 18:59:59 EST 2017]
Issuer: CN=VeriSign Class 3 Secure Server CA - G3, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US
SerialNumber: 141110145187463003315792484210719012143

Certificate Extensions: 8
[1]: ObjectId: 2.5.29.19 Criticality=false
BasicConstraints:[
CA:false
PathLen: undefined
]

[2]: ObjectId: 2.5.29.15 Criticality=false
KeyUsage [
DigitalSignature
Key_Encipherment
]

[3]: ObjectId: 2.5.29.31 Criticality=false
CRLDistributionPoints [
1 CRL Distribution Points:

Distribution Point: [
Distribution Point Name: URIName: http://SVRSecure-G3-crl.verisign.com/SVRSecureG3.crl
Reason Flags: null
Issuer: null
]
]

[4]: ObjectId: 2.5.29.32 Criticality=false
CertificatePolicies [
[
PolicyInformation: [
CertPolicyId: 2.16.840.1.113733.1.7.23.3
PolicyQualifiers: [PolicyQualifierInfo: [
CPSuri: [
object identifier: 1.3.6.1.5.5.7.2.1
uri: https://www.verisign.com/rpa]
]
]]
]]

[5]: ObjectId: 2.5.29.37 Criticality=false
ExtKeyUsage [
1.3.6.1.5.5.7.3.1 1.3.6.1.5.5.7.3.2]

[6]: ObjectId: 2.5.29.35 Criticality=false
AuthorityKeyIdentifier [
KeyIdentifier [
0000: 0d 44 5c 16 53 44 c1 82 7e 1d 20 ab 25 f4 01 63 .D..SD.........c
0010: d8 be 79 a5 ..y.
]

]

[7]: ObjectId: 1.3.6.1.5.5.7.1.1 Criticality=false
AuthorityInfoAccess [
[accessMethod: 1.3.6.1.5.5.7.48.1
accessLocation: URIName: http://ocsp.verisign.com, accessMethod: 1.3.6.1.5.5.7.48.2
accessLocation: URIName: http://SVRSecure-G3-aia.verisign.com/SVRSecureG3.cer]]

[8]: ObjectId: 1.3.6.1.5.5.7.1.12 Criticality=false
Extension unknown: DER encoded OCTET string =
0000: 04 62 30 60 a1 5e a0 5c 30 5a 30 58 30 56 16 09 .b0.....0Z0X0V..
0010: 69 6d 61 67 65 2f 67 69 66 30 21 30 1f 30 07 06 image.gif0.0.0..
0020: 05 2b 0e 03 02 1a 04 14 4b 6b b9 28 96 06 0c bb ........Kk......
0030: d0 52 38 9b 29 ac 4b 07 8b 21 05 18 30 26 16 24 .R8...K.....0...
0040: 68 74 74 70 3a 2f 2f 6c 6f 67 6f 2e 76 65 72 69 http...logo.veri
0050: 73 69 67 6e 2e 63 6f 6d 2f 76 73 6c 6f 67 6f 31 sign.com.vslogo1
0060: 2e 67 69 66 .gif
]
Algorithm: SHA1withRSA
Signature:
0000: 2a ee 31 2e 46 f8 d7 f1 00 91 bd 81 a3 18 bb 9c ..1.F...........
0010: 96 90 fa 64 6a d8 7d 76 e9 22 b9 5c f5 f9 96 be ...dj..v........
0020: 19 3d 55 5f 64 af 2e 60 3f 04 d3 cc b9 5e 2c d2 ..U.d...........
0030: 5c 38 f3 4b 12 62 3c 98 5e ec 59 b2 ac 08 85 8e .8.K.b....Y.....
0040: 0d 0f 57 13 29 df d0 bf df a1 08 38 48 92 d0 32 ..W........8H..2
0050: 05 62 0c 10 1b aa 52 72 ca e9 0f 92 83 62 59 c6 .b....Rr.....bY.
0060: 02 5a 48 eb 81 48 e1 18 46 58 47 b2 f3 a2 8c 06 .ZH..H..FXG.....
0070: 6c 07 87 be a9 34 31 e5 02 c4 cc 5e 11 14 09 0e l....41.........
0080: fe 2a 08 da 7f 4b 74 5a 92 89 29 d7 d4 20 fb 6c .....KtZ.......l
0090: df 2e 28 da 15 dd 1a d8 b9 4e cc 25 6c 6e ab bf .........N..ln..
00a0: 48 d4 c3 55 94 62 37 85 bd fd c2 d1 5e 66 f2 cf H..U.b7......f..
00b0: 3f b3 2e 6b 90 c2 ff 56 a3 2b 5f ce 35 74 89 70 ...k...V....5t.p
00c0: de 85 c7 54 bb f6 6b b1 6b 5e b3 09 25 61 f4 0e ...T..k.k....a..
00d0: fe d6 ba 17 70 1e 26 3b 15 1c ef 70 1c f8 1b 3b ....p......p....
00e0: ca 1d 57 c4 70 d1 aa f8 58 69 e4 6c a5 15 b8 00 ..W.p...Xi.l....
00f0: 1e bf 8a 37 d9 f4 5c 5b 6a e2 02 c1 d8 68 c1 c9 ...7....j....h..

]
19/12/12 11:19:12:872 EST 0000010c SystemOut O ***
19/12/12 11:19:12:872 EST 0000010c SystemOut O Found trusted certificate:
19/12/12 11:19:12:872 EST 0000010c SystemOut O [
[
Version: V3
Subject: CN=prodsvc.mib.com, O=MIB INC, ST=MASSACHUSETTS, C=US
Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5

Key: IBMJCE RSA Public Key:
modulus:
30422506404089282473379301491781371718152057538511615128592268779134499359207590085434809305601128022622711278003878031063886380227198322406343359820273039001921651147804114229540479389008839458230202870751805171349278865389067475990616390853440974206771576827465824933996220605694376307455601001350301985916157149140435545684739693690444777682203071504467932615447643438087801800717023715123398744485091760244259811840776423994175587562274393920343409285842471984855967597703018813061713574796387168165655111144243307720176923151768368277307516535029020991390847874287287997997185060124198049958245046853621046103067
public exponent:
65537

Validity: [From: Sun Nov 13 19:00:00 EST 2011,
To: Fri Dec 15 18:59:59 EST 2017]
Issuer: CN=VeriSign Class 3 Secure Server CA - G3, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US
SerialNumber: 141110145187463003315792484210719012143

Certificate Extensions: 8
[1]: ObjectId: 2.5.29.19 Criticality=false
BasicConstraints:[
CA:false
PathLen: undefined
]

[2]: ObjectId: 2.5.29.15 Criticality=false
KeyUsage [
DigitalSignature
Key_Encipherment
]

[3]: ObjectId: 2.5.29.31 Criticality=false
CRLDistributionPoints [
1 CRL Distribution Points:

Distribution Point: [
Distribution Point Name: URIName: http://SVRSecure-G3-crl.verisign.com/SVRSecureG3.crl
Reason Flags: null
Issuer: null
]
]

[4]: ObjectId: 2.5.29.32 Criticality=false
CertificatePolicies [
[
PolicyInformation: [
CertPolicyId: 2.16.840.1.113733.1.7.23.3
PolicyQualifiers: [PolicyQualifierInfo: [
CPSuri: [
object identifier: 1.3.6.1.5.5.7.2.1
uri: https://www.verisign.com/rpa]
]
]]
]]

[5]: ObjectId: 2.5.29.37 Criticality=false
ExtKeyUsage [
1.3.6.1.5.5.7.3.1 1.3.6.1.5.5.7.3.2]

[6]: ObjectId: 2.5.29.35 Criticality=false
AuthorityKeyIdentifier [
KeyIdentifier [
0000: 0d 44 5c 16 53 44 c1 82 7e 1d 20 ab 25 f4 01 63 .D..SD.........c
0010: d8 be 79 a5 ..y.
]

]

[7]: ObjectId: 1.3.6.1.5.5.7.1.1 Criticality=false
AuthorityInfoAccess [
[accessMethod: 1.3.6.1.5.5.7.48.1
accessLocation: URIName: http://ocsp.verisign.com, accessMethod: 1.3.6.1.5.5.7.48.2
accessLocation: URIName: http://SVRSecure-G3-aia.verisign.com/SVRSecureG3.cer]]

[8]: ObjectId: 1.3.6.1.5.5.7.1.12 Criticality=false
Extension unknown: DER encoded OCTET string =
0000: 04 62 30 60 a1 5e a0 5c 30 5a 30 58 30 56 16 09 .b0.....0Z0X0V..
0010: 69 6d 61 67 65 2f 67 69 66 30 21 30 1f 30 07 06 image.gif0.0.0..
0020: 05 2b 0e 03 02 1a 04 14 4b 6b b9 28 96 06 0c bb ........Kk......
0030: d0 52 38 9b 29 ac 4b 07 8b 21 05 18 30 26 16 24 .R8...K.....0...
0040: 68 74 74 70 3a 2f 2f 6c 6f 67 6f 2e 76 65 72 69 http...logo.veri
0050: 73 69 67 6e 2e 63 6f 6d 2f 76 73 6c 6f 67 6f 31 sign.com.vslogo1
0060: 2e 67 69 66 .gif
]
Algorithm: SHA1withRSA
Signature:
0000: 2a ee 31 2e 46 f8 d7 f1 00 91 bd 81 a3 18 bb 9c ..1.F...........
0010: 96 90 fa 64 6a d8 7d 76 e9 22 b9 5c f5 f9 96 be ...dj..v........
0020: 19 3d 55 5f 64 af 2e 60 3f 04 d3 cc b9 5e 2c d2 ..U.d...........
0030: 5c 38 f3 4b 12 62 3c 98 5e ec 59 b2 ac 08 85 8e .8.K.b....Y.....
0040: 0d 0f 57 13 29 df d0 bf df a1 08 38 48 92 d0 32 ..W........8H..2
0050: 05 62 0c 10 1b aa 52 72 ca e9 0f 92 83 62 59 c6 .b....Rr.....bY.
0060: 02 5a 48 eb 81 48 e1 18 46 58 47 b2 f3 a2 8c 06 .ZH..H..FXG.....
0070: 6c 07 87 be a9 34 31 e5 02 c4 cc 5e 11 14 09 0e l....41.........
0080: fe 2a 08 da 7f 4b 74 5a 92 89 29 d7 d4 20 fb 6c .....KtZ.......l
0090: df 2e 28 da 15 dd 1a d8 b9 4e cc 25 6c 6e ab bf .........N..ln..
00a0: 48 d4 c3 55 94 62 37 85 bd fd c2 d1 5e 66 f2 cf H..U.b7......f..
00b0: 3f b3 2e 6b 90 c2 ff 56 a3 2b 5f ce 35 74 89 70 ...k...V....5t.p
00c0: de 85 c7 54 bb f6 6b b1 6b 5e b3 09 25 61 f4 0e ...T..k.k....a..
00d0: fe d6 ba 17 70 1e 26 3b 15 1c ef 70 1c f8 1b 3b ....p......p....
00e0: ca 1d 57 c4 70 d1 aa f8 58 69 e4 6c a5 15 b8 00 ..W.p...Xi.l....
00f0: 1e bf 8a 37 d9 f4 5c 5b 6a e2 02 c1 d8 68 c1 c9 ...7....j....h..

]
19/12/12 11:19:12:872 EST 0000010c SystemOut O WebContainer : 0, READ: TLSv1 Handshake, length = 158
19/12/12 11:19:12:872 EST 0000010c SystemOut O *** CertificateRequest
19/12/12 11:19:12:872 EST 0000010c SystemOut O Cert Types: RSA, DSS
19/12/12 11:19:12:872 EST 0000010c SystemOut O Cert Authorities:
19/12/12 11:19:12:872 EST 0000010c SystemOut O <CN="MIB Group, Inc CA", O="MIB Group, Inc", C=US>
19/12/12 11:19:12:872 EST 0000010c SystemOut O <CN="MIB Group, Inc Root CA", O="MIB Group, Inc", C=US>
19/12/12 11:19:12:872 EST 0000010c SystemOut O *** ServerHelloDone
19/12/12 11:19:12:872 EST 0000010c SystemOut O ClientHandshaker: KeyManager com.ibm.ws.ssl.core.WSX509KeyManager
19/12/12 11:19:12:872 EST 0000010c SystemOut O *** Certificate chain
19/12/12 11:19:12:872 EST 0000010c SystemOut O ***
19/12/12 11:19:12:872 EST 0000010c SystemOut O JsseJCE: Using KeyGenerator IbmTlsRsaPremasterSecret from provider TBD via init
19/12/12 11:19:12:872 EST 0000010c SystemOut O JsseJCE: Using cipher RSA/SSL/PKCS1Padding from provider TBD via init
19/12/12 11:19:12:872 EST 0000010c SystemOut O PreMasterSecret: Using cipher for wrap RSA/SSL/PKCS1Padding from provider from init IBMJCE version 1.2
19/12/12 11:19:12:872 EST 0000010c SystemOut O *** ClientKeyExchange, RSA PreMasterSecret, TLSv1
19/12/12 11:19:12:872 EST 0000010c SystemOut O WebContainer : 0, WRITE: TLSv1 Handshake, length = 269
19/12/12 11:19:12:872 EST 0000010c SystemOut O SESSION KEYGEN:
19/12/12 11:19:12:872 EST 0000010c SystemOut O PreMaster Secret:
19/12/12 11:19:12:872 EST 0000010c SystemOut O 0000: 03 01 47 0a 9a a7 b7 97 1d a7 dc 92 2f 2e 87 2a ..G.............
0010: 91 69 a2 79 ae cf 76 5d 86 6c eb 21 a9 45 85 24 .i.y..v..l...E..
0020: ca 60 a3 12 19 d3 89 5b 87 c5 94 47 00 7a aa a0 ...........G.z..

19/12/12 11:19:12:872 EST 0000010c SystemOut O javax.crypto.spec.SecretKeySpec@13e2492
19/12/12 11:19:12:872 EST 0000010c SystemOut O JsseJCE: Using KeyGenerator IbmTlsMasterSecret from provider TBD via init
19/12/12 11:19:12:872 EST 0000010c SystemOut O JsseJCE: Using KeyGenerator IbmTlsKeyMaterial from provider TBD via init
19/12/12 11:19:12:872 EST 0000010c SystemOut O CONNECTION KEYGEN:
19/12/12 11:19:12:872 EST 0000010c SystemOut O Client Nonce:
19/12/12 11:19:12:872 EST 0000010c SystemOut O 0000: 50 d1 e9 00 aa 73 93 48 7e aa 2c 41 86 b4 24 25 P....s.H...A....
0010: 44 ef a1 51 29 5b bb 7c 12 72 14 10 e6 64 0e 73 D..Q.....r...d.s

19/12/12 11:19:12:872 EST 0000010c SystemOut O Server Nonce:
19/12/12 11:19:12:872 EST 0000010c SystemOut O 0000: 50 d1 e9 05 71 8f 2f ba e6 9d 82 3f 3a 4c bf 90 P...q........L..
0010: 79 a3 36 6c af 39 77 8b 5a 9d 95 6e 03 85 a9 97 y.6l.9w.Z..n....

19/12/12 11:19:12:872 EST 0000010c SystemOut O Master Secret:
19/12/12 11:19:12:934 EST 0000010c SystemOut O 0000: 1a f1 f5 a8 a3 d9 00 1c 98 c1 c7 01 51 86 3c 3b ............Q...
0010: bf 01 69 3e 2d 75 bb 41 b5 1d a1 48 a9 9c 02 1c ..i..u.A...H....
0020: 20 7d 9e 11 3b cd 58 b2 5d 86 0f 18 7e 1b a9 ae ......X.........

19/12/12 11:19:12:934 EST 0000010c SystemOut O Client MAC write Secret:
19/12/12 11:19:12:934 EST 0000010c SystemOut O 0000: 9b 35 96 20 fa 93 ca 89 2a 64 bc d1 b2 d1 7c 14 .5.......d......

19/12/12 11:19:12:934 EST 0000010c SystemOut O Server MAC write Secret:
19/12/12 11:19:12:934 EST 0000010c SystemOut O 0000: ee 10 3e 6e 65 4e 7b 0c 9f de 18 80 1d 0b f6 ca ...neN..........

19/12/12 11:19:12:934 EST 0000010c SystemOut O Client write key:
19/12/12 11:19:12:934 EST 0000010c SystemOut O 0000: c7 92 1b 01 0e 00 7f d9 ee 19 5b 47 01 01 75 15 ...........G..u.

19/12/12 11:19:12:934 EST 0000010c SystemOut O Server write key:
19/12/12 11:19:12:934 EST 0000010c SystemOut O 0000: 95 c7 ec 0c 19 86 2f 86 f2 6b 72 99 1a 43 02 ad .........kr..C..

19/12/12 11:19:12:934 EST 0000010c SystemOut O ... no IV used for this cipher
19/12/12 11:19:12:934 EST 0000010c SystemOut O JsseJCE: Using KeyGenerator IbmTlsPrf from provider TBD via init
19/12/12 11:19:12:934 EST 0000010c SystemOut O HandshakeMessage: TLS Keygenerator IbmTlsPrf from provider from init IBMJCE version 1.2
19/12/12 11:19:12:934 EST 0000010c SystemOut O WebContainer : 0, WRITE: TLSv1 Change Cipher Spec, length = 1
19/12/12 11:19:12:934 EST 0000010c SystemOut O JsseJCE: Using cipher RC4 from provider TBD via init
19/12/12 11:19:12:934 EST 0000010c SystemOut O CipherBox: Using cipher RC4 from provider from init IBMJCE version 1.2
19/12/12 11:19:12:934 EST 0000010c SystemOut O JsseJCE: Using MAC HmacMD5 from provider TBD via init
19/12/12 11:19:12:934 EST 0000010c SystemOut O MAC: Using MessageDigest HmacMD5 from provider IBMJCE version 1.2
19/12/12 11:19:12:934 EST 0000010c SystemOut O *** Finished
19/12/12 11:19:12:934 EST 0000010c SystemOut O verify_data: { 53, 83, 139, 220, 29, 208, 63, 72, 8, 72, 45, 136 }
19/12/12 11:19:12:934 EST 0000010c SystemOut O ***
19/12/12 11:19:12:934 EST 0000010c SystemOut O WebContainer : 0, WRITE: TLSv1 Handshake, length = 32
19/12/12 11:19:12:934 EST 0000010c SystemOut O WebContainer : 0, READ: TLSv1 Alert, length = 2
19/12/12 11:19:12:934 EST 0000010c SystemOut O WebContainer : 0, RECV TLSv1 ALERT: fatal, handshake_failure
19/12/12 11:19:12:934 EST 0000010c SystemOut O %% Invalidated: Session-12, SSL_RSA_WITH_RC4_128_MD5
19/12/12 11:19:12:934 EST 0000010c SystemOut O WebContainer : 0, called closeSocket()
19/12/12 11:19:12:934 EST 0000010c SystemOut O WebContainer : 0, handling exception: javax.net.ssl.SSLHandshakeException: Received fatal alert: handshake_failure