Topic
IC4NOTICE: developerWorks Community will be offline May 29-30, 2015 while we upgrade to the latest version of IBM Connections. For more information, read our upgrade FAQ.
No replies
SystemAdmin
SystemAdmin
64 Posts
ACCEPTED ANSWER

Pinned topic Received fatal alert: handshake_failure

‏2012-12-19T18:53:01Z |
I have a application installed on the websphere application server version 8.5 . When I test my application to connect to a third party web service, I got follwing error:Received fatal alert: handshake_failure .

The systemout log is as below:
19/12/12 11:19:12:825 EST 0000010c SystemOut O *** ClientHello, TLSv1
19/12/12 11:19:12:825 EST 0000010c SystemOut O RandomCookie: GMT: 1339091200 bytes = { 170, 115, 147, 72, 126, 170, 44, 65, 134, 180, 36, 37, 68, 239, 161, 81, 41, 91, 187, 124, 18, 114, 20, 16, 230, 100, 14, 115 }
19/12/12 11:19:12:825 EST 0000010c SystemOut O Session ID: {}
19/12/12 11:19:12:825 EST 0000010c SystemOut O Cipher Suites: SSL_RSA_WITH_RC4_128_MD5, SSL_RSA_WITH_RC4_128_SHA, SSL_RSA_WITH_AES_128_CBC_SHA, SSL_RSA_WITH_AES_256_CBC_SHA, SSL_DHE_RSA_WITH_AES_128_CBC_SHA, SSL_DHE_RSA_WITH_AES_256_CBC_SHA, SSL_DHE_DSS_WITH_AES_128_CBC_SHA, SSL_DHE_DSS_WITH_AES_256_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, SSL_RSA_FIPS_WITH_3DES_EDE_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_RC4_128_SHA, SSL_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, SSL_ECDHE_RSA_WITH_AES_256_CBC_SHA, SSL_ECDH_ECDSA_WITH_AES_256_CBC_SHA, SSL_ECDH_RSA_WITH_AES_256_CBC_SHA, SSL_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, SSL_ECDHE_RSA_WITH_AES_128_CBC_SHA, SSL_ECDH_ECDSA_WITH_AES_128_CBC_SHA, SSL_ECDH_RSA_WITH_AES_128_CBC_SHA, SSL_ECDHE_ECDSA_WITH_RC4_128_SHA, SSL_ECDHE_RSA_WITH_RC4_128_SHA, SSL_ECDH_ECDSA_WITH_RC4_128_SHA, SSL_ECDH_RSA_WITH_RC4_128_SHA, SSL_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA, SSL_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA, SSL_ECDH_RSA_WITH_3DES_EDE_CBC_SHA, SSL_RENEGO_PROTECTION_REQUEST
19/12/12 11:19:12:825 EST 0000010c SystemOut O Compression Methods: { 0 }
19/12/12 11:19:12:825 EST 0000010c SystemOut O Extension elliptic_curves, curve names: {secp256r1, secp192r1, secp224r1, secp384r1, secp521r1, secp160k1, secp160r1, secp160r2, secp192k1, secp224k1, secp256k1}
19/12/12 11:19:12:825 EST 0000010c SystemOut O Extension ec_point_formats, formats: uncompressed
19/12/12 11:19:12:825 EST 0000010c SystemOut O ***
19/12/12 11:19:12:825 EST 0000010c SystemOut O WebContainer : 0, WRITE: TLSv1 Handshake, length = 139
19/12/12 11:19:12:825 EST 000000a1 SystemOut O Deferrable Alarm : 3, WRITE: TLSv1 Application Data, length = 939
19/12/12 11:19:12:872 EST 0000010c SystemOut O WebContainer : 0, READ: TLSv1 Handshake, length = 81
19/12/12 11:19:12:872 EST 0000010c SystemOut O *** ServerHello, TLSv1
19/12/12 11:19:12:872 EST 0000010c SystemOut O RandomCookie: GMT: 1339091205 bytes = { 113, 143, 47, 186, 230, 157, 130, 63, 58, 76, 191, 144, 121, 163, 54, 108, 175, 57, 119, 139, 90, 157, 149, 110, 3, 133, 169, 151 }
19/12/12 11:19:12:872 EST 0000010c SystemOut O Session ID: {11, 74, 203, 58, 192, 233, 79, 153, 173, 149, 219, 97, 51, 181, 245, 41, 18, 64, 181, 61, 100, 154, 89, 235, 39, 129, 247, 215, 179, 120, 77, 148}
19/12/12 11:19:12:872 EST 0000010c SystemOut O Cipher Suite: SSL_RSA_WITH_RC4_128_MD5
19/12/12 11:19:12:872 EST 0000010c SystemOut O Compression Method: 0
19/12/12 11:19:12:872 EST 0000010c SystemOut O Extension renegotiation_info, ri_length: 0, ri_connection_data: { null }
19/12/12 11:19:12:872 EST 0000010c SystemOut O ***
19/12/12 11:19:12:872 EST 0000010c SystemOut O JsseJCE: Using MessageDigest MD5 from provider IBMJCE version 1.2
19/12/12 11:19:12:872 EST 0000010c SystemOut O JsseJCE: Using MessageDigest SHA from provider IBMJCE version 1.2
19/12/12 11:19:12:872 EST 0000010c SystemOut O %% Initialized: Session-12, SSL_RSA_WITH_RC4_128_MD5
19/12/12 11:19:12:872 EST 0000010c SystemOut O ** SSL_RSA_WITH_RC4_128_MD5
19/12/12 11:19:12:872 EST 0000010c SystemOut O WebContainer : 0, READ: TLSv1 Handshake, length = 1394
19/12/12 11:19:12:872 EST 0000010c SystemOut O *** Certificate chain
19/12/12 11:19:12:872 EST 0000010c SystemOut O chain [0] = [
[
Version: V3
Subject: CN=prodsvc.mib.com, O=MIB INC, ST=MASSACHUSETTS, C=US
Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5

Key: IBMJCE RSA Public Key:
modulus:
30422506404089282473379301491781371718152057538511615128592268779134499359207590085434809305601128022622711278003878031063886380227198322406343359820273039001921651147804114229540479389008839458230202870751805171349278865389067475990616390853440974206771576827465824933996220605694376307455601001350301985916157149140435545684739693690444777682203071504467932615447643438087801800717023715123398744485091760244259811840776423994175587562274393920343409285842471984855967597703018813061713574796387168165655111144243307720176923151768368277307516535029020991390847874287287997997185060124198049958245046853621046103067
public exponent:
65537

Validity: [From: Sun Nov 13 19:00:00 EST 2011,
To: Fri Dec 15 18:59:59 EST 2017]
Issuer: CN=VeriSign Class 3 Secure Server CA - G3, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US
SerialNumber: 141110145187463003315792484210719012143

Certificate Extensions: 8
[1]: ObjectId: 2.5.29.19 Criticality=false
BasicConstraints:[
CA:false
PathLen: undefined
]

[2]: ObjectId: 2.5.29.15 Criticality=false
KeyUsage [
DigitalSignature
Key_Encipherment
]

[3]: ObjectId: 2.5.29.31 Criticality=false
CRLDistributionPoints [
1 CRL Distribution Points:

Distribution Point: [
Distribution Point Name: URIName: http://SVRSecure-G3-crl.verisign.com/SVRSecureG3.crl
Reason Flags: null
Issuer: null
]
]

[4]: ObjectId: 2.5.29.32 Criticality=false
CertificatePolicies [
[
PolicyInformation: [
CertPolicyId: 2.16.840.1.113733.1.7.23.3
PolicyQualifiers: [PolicyQualifierInfo: [
CPSuri: [
object identifier: 1.3.6.1.5.5.7.2.1
uri: https://www.verisign.com/rpa]
]
]]
]]

[5]: ObjectId: 2.5.29.37 Criticality=false
ExtKeyUsage [
1.3.6.1.5.5.7.3.1 1.3.6.1.5.5.7.3.2]

[6]: ObjectId: 2.5.29.35 Criticality=false
AuthorityKeyIdentifier [
KeyIdentifier [
0000: 0d 44 5c 16 53 44 c1 82 7e 1d 20 ab 25 f4 01 63 .D..SD.........c
0010: d8 be 79 a5 ..y.
]

]

[7]: ObjectId: 1.3.6.1.5.5.7.1.1 Criticality=false
AuthorityInfoAccess [
[accessMethod: 1.3.6.1.5.5.7.48.1
accessLocation: URIName: http://ocsp.verisign.com, accessMethod: 1.3.6.1.5.5.7.48.2
accessLocation: URIName: http://SVRSecure-G3-aia.verisign.com/SVRSecureG3.cer]]

[8]: ObjectId: 1.3.6.1.5.5.7.1.12 Criticality=false
Extension unknown: DER encoded OCTET string =
0000: 04 62 30 60 a1 5e a0 5c 30 5a 30 58 30 56 16 09 .b0.....0Z0X0V..
0010: 69 6d 61 67 65 2f 67 69 66 30 21 30 1f 30 07 06 image.gif0.0.0..
0020: 05 2b 0e 03 02 1a 04 14 4b 6b b9 28 96 06 0c bb ........Kk......
0030: d0 52 38 9b 29 ac 4b 07 8b 21 05 18 30 26 16 24 .R8...K.....0...
0040: 68 74 74 70 3a 2f 2f 6c 6f 67 6f 2e 76 65 72 69 http...logo.veri
0050: 73 69 67 6e 2e 63 6f 6d 2f 76 73 6c 6f 67 6f 31 sign.com.vslogo1
0060: 2e 67 69 66 .gif
]
Algorithm: SHA1withRSA
Signature:
0000: 2a ee 31 2e 46 f8 d7 f1 00 91 bd 81 a3 18 bb 9c ..1.F...........
0010: 96 90 fa 64 6a d8 7d 76 e9 22 b9 5c f5 f9 96 be ...dj..v........
0020: 19 3d 55 5f 64 af 2e 60 3f 04 d3 cc b9 5e 2c d2 ..U.d...........
0030: 5c 38 f3 4b 12 62 3c 98 5e ec 59 b2 ac 08 85 8e .8.K.b....Y.....
0040: 0d 0f 57 13 29 df d0 bf df a1 08 38 48 92 d0 32 ..W........8H..2
0050: 05 62 0c 10 1b aa 52 72 ca e9 0f 92 83 62 59 c6 .b....Rr.....bY.
0060: 02 5a 48 eb 81 48 e1 18 46 58 47 b2 f3 a2 8c 06 .ZH..H..FXG.....
0070: 6c 07 87 be a9 34 31 e5 02 c4 cc 5e 11 14 09 0e l....41.........
0080: fe 2a 08 da 7f 4b 74 5a 92 89 29 d7 d4 20 fb 6c .....KtZ.......l
0090: df 2e 28 da 15 dd 1a d8 b9 4e cc 25 6c 6e ab bf .........N..ln..
00a0: 48 d4 c3 55 94 62 37 85 bd fd c2 d1 5e 66 f2 cf H..U.b7......f..
00b0: 3f b3 2e 6b 90 c2 ff 56 a3 2b 5f ce 35 74 89 70 ...k...V....5t.p
00c0: de 85 c7 54 bb f6 6b b1 6b 5e b3 09 25 61 f4 0e ...T..k.k....a..
00d0: fe d6 ba 17 70 1e 26 3b 15 1c ef 70 1c f8 1b 3b ....p......p....
00e0: ca 1d 57 c4 70 d1 aa f8 58 69 e4 6c a5 15 b8 00 ..W.p...Xi.l....
00f0: 1e bf 8a 37 d9 f4 5c 5b 6a e2 02 c1 d8 68 c1 c9 ...7....j....h..

]
19/12/12 11:19:12:872 EST 0000010c SystemOut O ***
19/12/12 11:19:12:872 EST 0000010c SystemOut O Found trusted certificate:
19/12/12 11:19:12:872 EST 0000010c SystemOut O [
[
Version: V3
Subject: CN=prodsvc.mib.com, O=MIB INC, ST=MASSACHUSETTS, C=US
Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5

Key: IBMJCE RSA Public Key:
modulus:
30422506404089282473379301491781371718152057538511615128592268779134499359207590085434809305601128022622711278003878031063886380227198322406343359820273039001921651147804114229540479389008839458230202870751805171349278865389067475990616390853440974206771576827465824933996220605694376307455601001350301985916157149140435545684739693690444777682203071504467932615447643438087801800717023715123398744485091760244259811840776423994175587562274393920343409285842471984855967597703018813061713574796387168165655111144243307720176923151768368277307516535029020991390847874287287997997185060124198049958245046853621046103067
public exponent:
65537

Validity: [From: Sun Nov 13 19:00:00 EST 2011,
To: Fri Dec 15 18:59:59 EST 2017]
Issuer: CN=VeriSign Class 3 Secure Server CA - G3, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US
SerialNumber: 141110145187463003315792484210719012143

Certificate Extensions: 8
[1]: ObjectId: 2.5.29.19 Criticality=false
BasicConstraints:[
CA:false
PathLen: undefined
]

[2]: ObjectId: 2.5.29.15 Criticality=false
KeyUsage [
DigitalSignature
Key_Encipherment
]

[3]: ObjectId: 2.5.29.31 Criticality=false
CRLDistributionPoints [
1 CRL Distribution Points:

Distribution Point: [
Distribution Point Name: URIName: http://SVRSecure-G3-crl.verisign.com/SVRSecureG3.crl
Reason Flags: null
Issuer: null
]
]

[4]: ObjectId: 2.5.29.32 Criticality=false
CertificatePolicies [
[
PolicyInformation: [
CertPolicyId: 2.16.840.1.113733.1.7.23.3
PolicyQualifiers: [PolicyQualifierInfo: [
CPSuri: [
object identifier: 1.3.6.1.5.5.7.2.1
uri: https://www.verisign.com/rpa]
]
]]
]]

[5]: ObjectId: 2.5.29.37 Criticality=false
ExtKeyUsage [
1.3.6.1.5.5.7.3.1 1.3.6.1.5.5.7.3.2]

[6]: ObjectId: 2.5.29.35 Criticality=false
AuthorityKeyIdentifier [
KeyIdentifier [
0000: 0d 44 5c 16 53 44 c1 82 7e 1d 20 ab 25 f4 01 63 .D..SD.........c
0010: d8 be 79 a5 ..y.
]

]

[7]: ObjectId: 1.3.6.1.5.5.7.1.1 Criticality=false
AuthorityInfoAccess [
[accessMethod: 1.3.6.1.5.5.7.48.1
accessLocation: URIName: http://ocsp.verisign.com, accessMethod: 1.3.6.1.5.5.7.48.2
accessLocation: URIName: http://SVRSecure-G3-aia.verisign.com/SVRSecureG3.cer]]

[8]: ObjectId: 1.3.6.1.5.5.7.1.12 Criticality=false
Extension unknown: DER encoded OCTET string =
0000: 04 62 30 60 a1 5e a0 5c 30 5a 30 58 30 56 16 09 .b0.....0Z0X0V..
0010: 69 6d 61 67 65 2f 67 69 66 30 21 30 1f 30 07 06 image.gif0.0.0..
0020: 05 2b 0e 03 02 1a 04 14 4b 6b b9 28 96 06 0c bb ........Kk......
0030: d0 52 38 9b 29 ac 4b 07 8b 21 05 18 30 26 16 24 .R8...K.....0...
0040: 68 74 74 70 3a 2f 2f 6c 6f 67 6f 2e 76 65 72 69 http...logo.veri
0050: 73 69 67 6e 2e 63 6f 6d 2f 76 73 6c 6f 67 6f 31 sign.com.vslogo1
0060: 2e 67 69 66 .gif
]
Algorithm: SHA1withRSA
Signature:
0000: 2a ee 31 2e 46 f8 d7 f1 00 91 bd 81 a3 18 bb 9c ..1.F...........
0010: 96 90 fa 64 6a d8 7d 76 e9 22 b9 5c f5 f9 96 be ...dj..v........
0020: 19 3d 55 5f 64 af 2e 60 3f 04 d3 cc b9 5e 2c d2 ..U.d...........
0030: 5c 38 f3 4b 12 62 3c 98 5e ec 59 b2 ac 08 85 8e .8.K.b....Y.....
0040: 0d 0f 57 13 29 df d0 bf df a1 08 38 48 92 d0 32 ..W........8H..2
0050: 05 62 0c 10 1b aa 52 72 ca e9 0f 92 83 62 59 c6 .b....Rr.....bY.
0060: 02 5a 48 eb 81 48 e1 18 46 58 47 b2 f3 a2 8c 06 .ZH..H..FXG.....
0070: 6c 07 87 be a9 34 31 e5 02 c4 cc 5e 11 14 09 0e l....41.........
0080: fe 2a 08 da 7f 4b 74 5a 92 89 29 d7 d4 20 fb 6c .....KtZ.......l
0090: df 2e 28 da 15 dd 1a d8 b9 4e cc 25 6c 6e ab bf .........N..ln..
00a0: 48 d4 c3 55 94 62 37 85 bd fd c2 d1 5e 66 f2 cf H..U.b7......f..
00b0: 3f b3 2e 6b 90 c2 ff 56 a3 2b 5f ce 35 74 89 70 ...k...V....5t.p
00c0: de 85 c7 54 bb f6 6b b1 6b 5e b3 09 25 61 f4 0e ...T..k.k....a..
00d0: fe d6 ba 17 70 1e 26 3b 15 1c ef 70 1c f8 1b 3b ....p......p....
00e0: ca 1d 57 c4 70 d1 aa f8 58 69 e4 6c a5 15 b8 00 ..W.p...Xi.l....
00f0: 1e bf 8a 37 d9 f4 5c 5b 6a e2 02 c1 d8 68 c1 c9 ...7....j....h..

]
19/12/12 11:19:12:872 EST 0000010c SystemOut O WebContainer : 0, READ: TLSv1 Handshake, length = 158
19/12/12 11:19:12:872 EST 0000010c SystemOut O *** CertificateRequest
19/12/12 11:19:12:872 EST 0000010c SystemOut O Cert Types: RSA, DSS
19/12/12 11:19:12:872 EST 0000010c SystemOut O Cert Authorities:
19/12/12 11:19:12:872 EST 0000010c SystemOut O <CN="MIB Group, Inc CA", O="MIB Group, Inc", C=US>
19/12/12 11:19:12:872 EST 0000010c SystemOut O <CN="MIB Group, Inc Root CA", O="MIB Group, Inc", C=US>
19/12/12 11:19:12:872 EST 0000010c SystemOut O *** ServerHelloDone
19/12/12 11:19:12:872 EST 0000010c SystemOut O ClientHandshaker: KeyManager com.ibm.ws.ssl.core.WSX509KeyManager
19/12/12 11:19:12:872 EST 0000010c SystemOut O *** Certificate chain
19/12/12 11:19:12:872 EST 0000010c SystemOut O ***
19/12/12 11:19:12:872 EST 0000010c SystemOut O JsseJCE: Using KeyGenerator IbmTlsRsaPremasterSecret from provider TBD via init
19/12/12 11:19:12:872 EST 0000010c SystemOut O JsseJCE: Using cipher RSA/SSL/PKCS1Padding from provider TBD via init
19/12/12 11:19:12:872 EST 0000010c SystemOut O PreMasterSecret: Using cipher for wrap RSA/SSL/PKCS1Padding from provider from init IBMJCE version 1.2
19/12/12 11:19:12:872 EST 0000010c SystemOut O *** ClientKeyExchange, RSA PreMasterSecret, TLSv1
19/12/12 11:19:12:872 EST 0000010c SystemOut O WebContainer : 0, WRITE: TLSv1 Handshake, length = 269
19/12/12 11:19:12:872 EST 0000010c SystemOut O SESSION KEYGEN:
19/12/12 11:19:12:872 EST 0000010c SystemOut O PreMaster Secret:
19/12/12 11:19:12:872 EST 0000010c SystemOut O 0000: 03 01 47 0a 9a a7 b7 97 1d a7 dc 92 2f 2e 87 2a ..G.............
0010: 91 69 a2 79 ae cf 76 5d 86 6c eb 21 a9 45 85 24 .i.y..v..l...E..
0020: ca 60 a3 12 19 d3 89 5b 87 c5 94 47 00 7a aa a0 ...........G.z..

19/12/12 11:19:12:872 EST 0000010c SystemOut O javax.crypto.spec.SecretKeySpec@13e2492
19/12/12 11:19:12:872 EST 0000010c SystemOut O JsseJCE: Using KeyGenerator IbmTlsMasterSecret from provider TBD via init
19/12/12 11:19:12:872 EST 0000010c SystemOut O JsseJCE: Using KeyGenerator IbmTlsKeyMaterial from provider TBD via init
19/12/12 11:19:12:872 EST 0000010c SystemOut O CONNECTION KEYGEN:
19/12/12 11:19:12:872 EST 0000010c SystemOut O Client Nonce:
19/12/12 11:19:12:872 EST 0000010c SystemOut O 0000: 50 d1 e9 00 aa 73 93 48 7e aa 2c 41 86 b4 24 25 P....s.H...A....
0010: 44 ef a1 51 29 5b bb 7c 12 72 14 10 e6 64 0e 73 D..Q.....r...d.s

19/12/12 11:19:12:872 EST 0000010c SystemOut O Server Nonce:
19/12/12 11:19:12:872 EST 0000010c SystemOut O 0000: 50 d1 e9 05 71 8f 2f ba e6 9d 82 3f 3a 4c bf 90 P...q........L..
0010: 79 a3 36 6c af 39 77 8b 5a 9d 95 6e 03 85 a9 97 y.6l.9w.Z..n....

19/12/12 11:19:12:872 EST 0000010c SystemOut O Master Secret:
19/12/12 11:19:12:934 EST 0000010c SystemOut O 0000: 1a f1 f5 a8 a3 d9 00 1c 98 c1 c7 01 51 86 3c 3b ............Q...
0010: bf 01 69 3e 2d 75 bb 41 b5 1d a1 48 a9 9c 02 1c ..i..u.A...H....
0020: 20 7d 9e 11 3b cd 58 b2 5d 86 0f 18 7e 1b a9 ae ......X.........

19/12/12 11:19:12:934 EST 0000010c SystemOut O Client MAC write Secret:
19/12/12 11:19:12:934 EST 0000010c SystemOut O 0000: 9b 35 96 20 fa 93 ca 89 2a 64 bc d1 b2 d1 7c 14 .5.......d......

19/12/12 11:19:12:934 EST 0000010c SystemOut O Server MAC write Secret:
19/12/12 11:19:12:934 EST 0000010c SystemOut O 0000: ee 10 3e 6e 65 4e 7b 0c 9f de 18 80 1d 0b f6 ca ...neN..........

19/12/12 11:19:12:934 EST 0000010c SystemOut O Client write key:
19/12/12 11:19:12:934 EST 0000010c SystemOut O 0000: c7 92 1b 01 0e 00 7f d9 ee 19 5b 47 01 01 75 15 ...........G..u.

19/12/12 11:19:12:934 EST 0000010c SystemOut O Server write key:
19/12/12 11:19:12:934 EST 0000010c SystemOut O 0000: 95 c7 ec 0c 19 86 2f 86 f2 6b 72 99 1a 43 02 ad .........kr..C..

19/12/12 11:19:12:934 EST 0000010c SystemOut O ... no IV used for this cipher
19/12/12 11:19:12:934 EST 0000010c SystemOut O JsseJCE: Using KeyGenerator IbmTlsPrf from provider TBD via init
19/12/12 11:19:12:934 EST 0000010c SystemOut O HandshakeMessage: TLS Keygenerator IbmTlsPrf from provider from init IBMJCE version 1.2
19/12/12 11:19:12:934 EST 0000010c SystemOut O WebContainer : 0, WRITE: TLSv1 Change Cipher Spec, length = 1
19/12/12 11:19:12:934 EST 0000010c SystemOut O JsseJCE: Using cipher RC4 from provider TBD via init
19/12/12 11:19:12:934 EST 0000010c SystemOut O CipherBox: Using cipher RC4 from provider from init IBMJCE version 1.2
19/12/12 11:19:12:934 EST 0000010c SystemOut O JsseJCE: Using MAC HmacMD5 from provider TBD via init
19/12/12 11:19:12:934 EST 0000010c SystemOut O MAC: Using MessageDigest HmacMD5 from provider IBMJCE version 1.2
19/12/12 11:19:12:934 EST 0000010c SystemOut O *** Finished
19/12/12 11:19:12:934 EST 0000010c SystemOut O verify_data: { 53, 83, 139, 220, 29, 208, 63, 72, 8, 72, 45, 136 }
19/12/12 11:19:12:934 EST 0000010c SystemOut O ***
19/12/12 11:19:12:934 EST 0000010c SystemOut O WebContainer : 0, WRITE: TLSv1 Handshake, length = 32
19/12/12 11:19:12:934 EST 0000010c SystemOut O WebContainer : 0, READ: TLSv1 Alert, length = 2
19/12/12 11:19:12:934 EST 0000010c SystemOut O WebContainer : 0, RECV TLSv1 ALERT: fatal, handshake_failure
19/12/12 11:19:12:934 EST 0000010c SystemOut O %% Invalidated: Session-12, SSL_RSA_WITH_RC4_128_MD5
19/12/12 11:19:12:934 EST 0000010c SystemOut O WebContainer : 0, called closeSocket()
19/12/12 11:19:12:934 EST 0000010c SystemOut O WebContainer : 0, handling exception: javax.net.ssl.SSLHandshakeException: Received fatal alert: handshake_failure