首页
学习
活动
专区
圈层
工具
发布

403错误
EN

Stack Overflow用户
提问于 2017-04-04 20:54:59
回答 2查看 1.5K关注 0票数 1

在从WebsphereApplicationServer7 (JRE1.6)调用受保护的1.6服务时,我得到了“org.apache.axis2.AxisFait: HTTP ( 403 )”错误。该服务只是HTTPS,不需要任何身份验证。我通过“签名者证书”将证书导入到Websphere服务器信任库。

通过使用keytool命令将证书添加到仙人掌中,我可以通过相同的Websphere JRE1.6作为独立的java程序调用相同的服务。

任何帮助都是非常感谢的!

SSL调试失败日志:

代码语言:javascript
复制
    O Using SSLEngineImpl.
     O SSLv3 protocol was requested but was not enabled
     O SSLv3 protocol was requested but was not enabled
     O 
Is initial handshake: true
     O Ignoring unsupported cipher suite: SSL_RSA_WITH_AES_128_GCM_SHA256
     O Ignoring unsupported cipher suite: SSL_RSA_WITH_AES_128_CBC_SHA256
     O Ignoring unsupported cipher suite: SSL_DHE_RSA_WITH_AES_128_GCM_SHA256
     O Ignoring unsupported cipher suite: SSL_DHE_RSA_WITH_AES_128_CBC_SHA256
     O Ignoring unsupported cipher suite: SSL_DHE_DSS_WITH_AES_128_GCM_SHA256
     O Ignoring unsupported cipher suite: SSL_DHE_DSS_WITH_AES_128_CBC_SHA256
     O %% Client cached [Session-7, SSL_RSA_WITH_AES_128_CBC_SHA]
     O %% Try resuming [Session-7, SSL_RSA_WITH_AES_128_CBC_SHA] from port -1
     O *** ClientHello, TLSv1
     O RandomCookie:  GMT: 1474467386 bytes = { 207 }
     O Session ID:  {16}
     O Cipher Suites: [SSL_RSA_WITH_AES_128_CBC_SHA, SSL_DHE_RSA_WITH_AES_128_CBC_SHA, SSL_DHE_DSS_WITH_AES_128_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, SSL_RSA_FIPS_WITH_3DES_EDE_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_RC4_128_MD5, SSL_RSA_WITH_RC4_128_SHA, SSL_DHE_DSS_WITH_RC4_128_SHA, SSL_RENEGO_PROTECTION_REQUEST]
     O Compression Methods:  { 0 }
     O ***
     O [write] MD5 and SHA1 hashes:  len = 97
     O 0000: ......X.........

    O ListenerContainer-1, WRITE: TLSv1 Handshake, length = 97
    O [Raw write]: length = 102
    O 0000: ....a......X....

     O [Raw read]: length = 5
     O 0000: 16 03 01 00 51                                     ....Q

     O [Raw read]: length = 81
     O 0000: 02 00 00 4d 03 01 58 e3  96 0b 5b d1 87 59 13 41  ...M..X......Y.A

     O ListenerContainer-1, READ: TLSv1 Handshake, length = 81
     O *** ServerHello, TLSv1
     O RandomCookie:  GMT: 1474467339 bytes = { 91 }
     O Session ID:  {16,128}
     O Cipher Suite: SSL_RSA_WITH_AES_128_CBC_SHA
     O Compression Method: 0
     O Extension renegotiation_info, ri_length: 0, ri_connection_data: { null }
     O ***
     O JsseJCE:  Using MessageDigest MD5 from provider IBMJCE version 1.2
     O JsseJCE:  Using MessageDigest SHA from provider IBMJCE version 1.2
     O JsseJCE:  Using KeyGenerator IbmTlsKeyMaterial from provider TBD via init 
     O CONNECTION KEYGEN:
     O Client Nonce:

    O Server Nonce:

    O Master Secret:
    O 0000: ..0..x.Q.....3..

    O Client MAC write Secret:
    O 0000: ..y..3..........
             ..M.

    O Server MAC write Secret:
    O 0000: 39 33 d2 cf a0 1c 20 fa  e2 4f 02 a1 86 ff b5 c9  93.......O......
             w..L

    O Client write key:
    O 0000: c7 3f fa 9b 84 98 44 bc  4d bb 69 5d 9d d2 71 db  ......D.M.i...q.

    O Server write key:
    O 0000: dc df 01 38 e5 07 32 9e  d4 1a b1 8a 5a e8 6f d4  ...8..2.....Z.o.

    O Client write IV:
    O 0000: a2 15 75 d4 8e d1 1b 4f  31 7b b1 e3 36 01 01 34  ..u....O1...6..4

    O Server write IV:
    O 0000: e6 46 38 f7 aa 03 f2 7e  f4 fb 6b 9f cb 88 df 48  .F8.......k....H

    O %% Server resumed [Session-7, SSL_RSA_WITH_AES_128_CBC_SHA]
    O [read] MD5 and SHA1 hashes:  len = 81
    O 0000: 02 00 00 4d 03 01 58 e3  96 0b 5b d1 87 59 13 41  ...M..X......Y.A

     O [Raw read]: length = 5
     O 0000: 14 03 01 00 01                                     .....

     O [Raw read]: length = 1
     O 0000: 01                                                 .

     O ListenerContainer-1, READ: TLSv1 Change Cipher Spec, length = 1
     O JsseJCE:  Using cipher AES/CBC/NoPadding from provider TBD via init 
     O CipherBox:  Using cipher AES/CBC/NoPadding from provider from init IBMJCE version 1.2
     O JsseJCE:  Using MAC HmacSHA1 from provider TBD via init 
     O MAC:  Using MessageDigest HmacSHA1 from provider IBMJCE version 1.2
     O [Raw read]: length = 5
     O 0000: 16 03 01 00 30                                     ....0

     O [Raw read]: length = 48
     O 0000: 32 d4 5a 8e 54 a3 bc d6  e4 38 f4 fb 3a 85 fa e1  2.Z.T....8......

     O ListenerContainer-1, READ: TLSv1 Handshake, length = 48
     O 0000: 14 00 00 0c 13 9c d6 b0  ca a6 cd e1 81 dd 8b c1  ................

     O *** Finished
     O verify_data:  { 19, 156, 214, 176, 202, 166, 205, 225, 129, 221, 139, 193 }
     O ***
     O JsseJCE:  Using KeyGenerator IbmTlsPrf from provider TBD via init 
     O HandshakeMessage:  TLS Keygenerator IbmTlsPrf  from provider from init IBMJCE version 1.2
     O [read] MD5 and SHA1 hashes:  len = 16
     O 0000: 14 00 00 0c 13 9c d6 b0  ca a6 cd e1 81 dd 8b c1  ................

     O JsseJCE:  Using KeyGenerator IbmTlsPrf from provider TBD via init 
     O HandshakeMessage:  TLS Keygenerator IbmTlsPrf  from provider from init IBMJCE version 1.2
     O ListenerContainer-1, WRITE: TLSv1 Change Cipher Spec, length = 1
     O JsseJCE:  Using cipher AES/CBC/NoPadding from provider TBD via init 
     O CipherBox:  Using cipher AES/CBC/NoPadding from provider from init IBMJCE version 1.2
     O JsseJCE:  Using MAC HmacSHA1 from provider TBD via init 
     O MAC:  Using MessageDigest HmacSHA1 from provider IBMJCE version 1.2
     O *** Finished
     O verify_data:  { 56, 215, 170, 111, 66, 74, 59, 26, 94, 46, 231, 190 }
     O ***
     O [write] MD5 and SHA1 hashes:  len = 16
     O 0000: 14 00 00 0c 38 d7 aa 6f  42 4a 3b 1a 5e 2e e7 be  ....8..oBJ......

     O Padded plaintext before ENCRYPTION:  len = 48
     O 0000: 14 00 00 0c 38 d7 aa 6f  42 4a 3b 1a 5e 2e e7 be  ....8..oBJ......

     O ListenerContainer-1, WRITE: TLSv1 Handshake, length = 48
     O [Raw write]: length = 6
     O 0000: 14 03 01 00 01 01                                  ......

     O [Raw write]: length = 53
     O 0000: 16 03 01 00 30 aa a8 a4  54 00 fd ba 45 1b d8 e2  ....0...T...E...

    O Padded plaintext before ENCRYPTION:  len = 496
    O 0000: 50 4f 53 54 20 2f 49 6c  61 6e 69 53 65 72 76 69  POST..IlaniServi
  ce.svc.HTTP.1.1.
  .Host..otlsap
  p1..enterpri
  se.sun.co
  m.8090..Accept..
  application.soap
  .xml.multipart.r
  elated.text....U
  ser.Agent..IBM.W
  ebServices.1.0..
  Cache.Control..n
  o.cache..Pragma.
  .no.cache..SOAPA
  ction...http...t
  empuri.org.IIlan
  iService.P


     O ListenerContainer-1, WRITE: TLSv1 Application Data, length = 472
     O [Raw write (bb)]: length = 501
     O 0000: 17 03 01 01 f0 be c2 0c  b6 1a 50 47 bc 99 d5 c3  ..........PG....
0010: a9 01 b0 05 0e f2 0b a8  32 a0 19 6f 48 35 3f a4  ........2..oH5..

     O Padded plaintext before ENCRYPTION:  len = 32
     O 0000: 3c a3 cc cf c4 13 b4 7e  35 a6 26 d7 0e 78 9e 66  ........5....x.f
0010: 9f a9 2e 22 2f 0a 0a 0a  0a 0a 0a 0a 0a 0a 0a 0a  ................

     O ListenerContainer-1, WRITE: TLSv1 Application Data, length = 1
     O Padded plaintext before ENCRYPTION:  len = 480
     O 0000: 73 6f 61 70 65 6e 76 3a  45 6e 76 65 6c 6f 70 65  soapenv.Envelope
  .xmlns.soapenv..
  http...schemas.x
  mlsoap.org.soap.
  envelope....soap
  env.Body..ns2.Ad
  justBalanc
  e.xmlns..http...
  schemas.datacont
  ract.org.2004.07


     O ListenerContainer-1, WRITE: TLSv1 Application Data, length = 456
     O [Raw write (bb)]: length = 522
     O 0000: 17 03 01 00 20 8b 55 88  99 5b b5 b6 2d 04 a0 b2  ......U.........
0010: 62 88 01 77 f9 d7 7d 58  8c 13 3e 61 0d 55 ab d2  b..w...X...a.U..

     O [Raw read]: length = 5
     O 0000: 16 03 01 00 20                                     .....

     O [Raw read]: length = 32
     O 0000: 9d 7f 17 1a 16 ca 52 b8  8c f6 6e e9 81 a1 e9 47  ......R...n....G
0010: 03 6c ac d4 25 e9 5f 90  a2 48 f7 a2 7c fe 5e 6e  .l.......H.....n

     O ListenerContainer-1, READ: TLSv1 Handshake, length = 32
     O 0000: 00 00 00 00 f6 20 dc f4  08 0c 1a 51 c3 79 9f 04  ...........Q.y..
0010: 73 a2 e1 ea 8a ca dd d4  07 07 07 07 07 07 07 07  s...............

     O ListenerContainer-1, RENEGOTIATE 
     O 
Is initial handshake: false
     O Ignoring unsupported cipher suite: SSL_RSA_WITH_AES_128_GCM_SHA256
     O Ignoring unsupported cipher suite: SSL_RSA_WITH_AES_128_CBC_SHA256
     O Ignoring unsupported cipher suite: SSL_DHE_RSA_WITH_AES_128_GCM_SHA256
     O Ignoring unsupported cipher suite: SSL_DHE_RSA_WITH_AES_128_CBC_SHA256
     O Ignoring unsupported cipher suite: SSL_DHE_DSS_WITH_AES_128_GCM_SHA256
     O Ignoring unsupported cipher suite: SSL_DHE_DSS_WITH_AES_128_CBC_SHA256
     O *** HelloRequest (empty)
     O %% Client cached [Session-7, SSL_RSA_WITH_AES_128_CBC_SHA]
     O %% Try resuming [Session-7, SSL_RSA_WITH_AES_128_CBC_SHA] from port -1
     O *** ClientHello, TLSv1
     O RandomCookie:  GMT: 1474467386 bytes = { 47, 48, 108, 24, 0, 145, 59, 124, 205, 83, 175, 151, 62, 250, 72, 23, 83, 219, 54, 35, 246, 240, 218, 216, 8, 185, 240, 129 }
     O Session ID:  {16, 48, 0, 0, 26, 118, 255, 9, 42, 147, 147, 244, 73, 27, 74, 188, 230, 10, 207, 45, 40, 144, 227, 82, 57, 194, 148, 119, 92, 41, 25, 128}
     O Cipher Suites: [SSL_RSA_WITH_AES_128_CBC_SHA, SSL_DHE_RSA_WITH_AES_128_CBC_SHA, SSL_DHE_DSS_WITH_AES_128_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, SSL_RSA_FIPS_WITH_3DES_EDE_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_RC4_128_MD5, SSL_RSA_WITH_RC4_128_SHA, SSL_DHE_DSS_WITH_RC4_128_SHA]
     O Compression Methods:  { 0 }
     O Extension renegotiation_info, ri_length: 12, ri_connection_data: { 56, 215, 170, 111, 66, 74, 59, 26, 94, 46, 231, 190 }
     O ***
     O [write] MD5 and SHA1 hashes:  len = 114
     O 0000: 01 00 00 6e 03 01 58 e3  96 3a 2f 30 6c 18 00 91  ...n..X....0l...

     O Padded plaintext before ENCRYPTION:  len = 144
     O 0000: 01 00 00 6e 03 01 58 e3  96 3a 2f 30 6c 18 00 91  ...n..X....0l...


     O ListenerContainer-1, WRITE: TLSv1 Handshake, length = 144
     O [Raw write]: length = 149
     O 0000: 16 03 01 00 90 39 0c d3  85 c2 c7 a6 db 1b 19 c9  .....9..........


     O [Raw read]: length = 5
     O 0000: 16 03 01 03 c0                                     .....

     O [Raw read]: length = 960
     O 0000: 52 a5 c4 98 5e 3a ba 29  0c 5d 33 ba e7 a6 f6 9d  R.........3.....

     O ListenerContainer-1, READ: TLSv1 Handshake, length = 960
     O 0000: 02 00 00 65 03 01 58 e3  96 0b d1 0f ec fc 78 bd  ...e..X.......x.

     O *** ServerHello, TLSv1
     O RandomCookie:  GMT: 1474467339 bytes = { 209, 15, 236, 252, 120, 189, 229, 92, 195, 178, 12, 253, 84, 35, 32, 141, 135, 199, 74, 135, 129, 147, 179, 39, 140, 238, 136, 245 }
     O Session ID:  {227, 16, 0, 0, 137, 23, 115, 18, 172, 166, 216, 5, 39, 117, 98, 130, 126, 247, 92, 123, 95, 173, 213, 94, 76, 116, 115, 203, 213, 63, 223, 177}
     O Cipher Suite: SSL_RSA_WITH_AES_128_CBC_SHA
     O Compression Method: 0
     O Extension renegotiation_info, ri_length: 24, ri_connection_data: { 56, 215, 170, 111, 66, 74, 59, 26, 94, 46, 231, 190, 19, 156, 214, 176, 202, 166, 205, 225, 129, 221, 139, 193 }
     O ***
     O JsseJCE:  Using MessageDigest MD5 from provider IBMJCE version 1.2
     O JsseJCE:  Using MessageDigest SHA from provider IBMJCE version 1.2
     O RI_Extension verification complete
     O %% Initialized:  [Session-8, SSL_RSA_WITH_AES_128_CBC_SHA]
     O ** SSL_RSA_WITH_AES_128_CBC_SHA
     O [read] MD5 and SHA1 hashes:  len = 105
     O 0000: 02 00 00 65 03 01 58 e3  96 0b d1 0f ec fc 78 bd  ...e..X.......x.

     O *** Certificate chain
     O chain [0] = [
[
  Version: V3
  Subject: CN=OTLS..enterprise.sun.com
  Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5

  Key:  IBMJCE RSA Public Key:
modulus:
23553703497639596335070510257137281846668772458655810320677790628829221930261149412925591183146781723536526781277172608739916146526544854651533994944277413821681774452388324836206810729946188205549925379818388956830834110706891819099617718057830110501768074462851693346833893969477290813937343022841978362903738008267590984351543136396192926768606970581686949544516090193350198903123024609160656153681262348428606470586055201848713219772934786602559592543952662556702629365940208481126300406324501533729138789679650468030591267044786502786266360792591465166026083070678688183035912219682765397505679240220734169611841
public exponent:
65537

  Validity: [From: Mon Feb 27 07:21:04 EST 2017,
               To: Mon Feb 26 19:00:00 EST 2018]
  Issuer: CN=OTLS..enterprise.sun.com
  SerialNumber: [157540854616312716013046194484672082663]

Certificate Extensions: 2
[1]: ObjectId: 2.5.29.37 Criticality=false
ExtKeyUsage [
    1.3.6.1.5.5.7.3.1]

[2]: ObjectId: 2.5.29.15 Criticality=false
KeyUsage [
  Key_Encipherment
  Data_Encipherment
]

]
  Algorithm: [SHA1withRSA]
  Signature:
0000: 95 2e 1f 6b bf f4 08 1b  05 bc af 0b 83 2b d5 9e  ...k............

]
     O ***
     O Found trusted certificate:
     O [
[
  Version: V3
  Subject: CN=OTLS..enterprise.sun.com
  Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5

  Key:  IBMJCE RSA Public Key:
modulus:
23553703497639596335070510257137281846668772458655810320677790628829221930261149412925591183146781723536526781277172608739916146526544854651533994944277413821681774452388324836206810729946188205549925379818388956830834110706891819099617718057830110501768074462851693346833893969477290813937343022841978362903738008267590984351543136396192926768606970581686949544516090193350198903123024609160656153681262348428606470586055201848713219772934786602559592543952662556702629365940208481126300406324501533729138789679650468030591267044786502786266360792591465166026083070678688183035912219682765397505679240220734169611841
public exponent:
65537

  Validity: [From: Mon Feb 27 07:21:04 EST 2017,
               To: Mon Feb 26 19:00:00 EST 2018]
  Issuer: CN=OTLS..enterprise.sun.com
  SerialNumber: [157540854616312716013046194484672082663]

Certificate Extensions: 2
[1]: ObjectId: 2.5.29.37 Criticality=false
ExtKeyUsage [
    1.3.6.1.5.5.7.3.1]

[2]: ObjectId: 2.5.29.15 Criticality=false
KeyUsage [
  Key_Encipherment
  Data_Encipherment
]

]
  Algorithm: [SHA1withRSA]
  Signature:
0000: 95 2e 1f 6b bf f4 08 1b  05 bc af 0b 83 2b d5 9e  ...k............

]
     O [read] MD5 and SHA1 hashes:  len = 806
     O 0000: 0b 00 03 22 00 03 1f 00  03 1c 30 82 03 18 30 82  ..........0...0.
0010: 02 00 a0 03 02 01 02 02  10 76 85 43 d2 e9 21 07  .........v.C....

     O *** CertificateRequest
     O Cert Types: RSA, DSS, ECDSA
     O Cert Authorities:
     O <Empty>
     O [read] MD5 and SHA1 hashes:  len = 10
     O 0000: 0d 00 00 06 03 01 02 40  00 00                    ..........

     O *** ServerHelloDone
     O [read] MD5 and SHA1 hashes:  len = 4
     O 0000: 0e 00 00 00                                        ....

     O ClientHandshaker: KeyManager com.ibm.ws.ssl.core.WSX509KeyManager
     O matching alias: default
     O *** Certificate chain
     O chain [0] = [
[
  Version: V3
  Subject: CN=XQ1..enterprise.sun.com, OU=XQ1Node01Cell, OU=XQ1Node01, O=IBM, C=US
  Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5

  Key:  IBMJCE RSA Public Key:
modulus:
110843921622147780318384621158214764705470317393194727986877851877285223474158936772266058764800503835209829711284711944290493529045508433479261112669514928128534895563063819307253434406155487303648611935061998559156762974027014248792380105199377095915876433187824227059900869413289818622830165728007892211197
public exponent:
65537

  Validity: [From: Sun Mar 05 17:32:19 EST 2017,
               To: Mon Mar 05 17:32:19 EST 2018]
  Issuer: CN=XQ1..enterprise.sun.com, OU=Root Certificate, OU=XQ1Node01Cell, OU=XQ1Node01, O=IBM, C=US
  SerialNumber: [32229148073970]

Certificate Extensions: 2
[1]: ObjectId: 2.5.29.17 Criticality=false
SubjectAlternativeName [
[RFC822Name: ProfileUUID:was70profile1-BASE-8665f1be-6c91-4f3f-9737-7ea56a84c9a7]]

[2]: ObjectId: 2.5.29.14 Criticality=false
SubjectKeyIdentifier [
KeyIdentifier [
0000: 4c 25 62 5f 59 c0 a9 87                           L.b.Y...
]
]

]
  Algorithm: [SHA1withRSA]
  Signature:
0000: 64 3c 9d e8 00 ca f0 f9  9a 33 10 a1 16 39 3a 6d  d........3...9.m

]
     O chain [1] = [
[
  Version: V3
  Subject: CN=XQ1..enterprise.sun.com, OU=Root Certificate, OU=XQ1Node01Cell, OU=XQ1Node01, O=IBM, C=US
  Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5

  Key:  IBMJCE RSA Public Key:
modulus:
133709287124393792230601765881699139284227312626945278928615499964607234524332116007234980646619761347476316748109684673947697597508730909561799232875111817433344405710867175697607140981134928059514395419168832779709507872705080489476741742323610788920900244447196181703106638720154734901400895308937603956483
public exponent:
65537

  Validity: [From: Thu Dec 15 12:44:52 EST 2011,
               To: Fri Dec 11 12:44:52 EST 2026]
  Issuer: CN=XQ1..enterprise.sun.com, OU=Root Certificate, OU=XQ1Node01Cell, OU=XQ1Node01, O=IBM, C=US
  SerialNumber: [14851033508608]

Certificate Extensions: 3
[1]: ObjectId: 2.5.29.19 Criticality=true
BasicConstraints:[
CA:true
PathLen:2147483647
]

[2]: ObjectId: 2.5.29.17 Criticality=false
SubjectAlternativeName [
[RFC822Name: ProfileUUID:was70profile1-BASE-8665f1be-6c91-4f3f-9737-7ea56a84c9a7]]

[3]: ObjectId: 2.5.29.14 Criticality=false
SubjectKeyIdentifier [
KeyIdentifier [
0000: 4b be 7e 6a 81 18 dc 91                           K..j....
]
]

]
  Algorithm: [SHA1withRSA]
  Signature:
0000: 7f 18 a5 d0 88 a1 95 d4  2c 8e b9 51 13 21 b5 df  ...........Q....

]
     O ***
     O JsseJCE: Choose KeyGenerator for IbmTlsRsaPremasterSecret.
     O JsseJCE:  Using KeyGenerator IbmTlsRsaPremasterSecret from provider TBD via init 
     O JsseJCE:  Using cipher RSA/SSL/PKCS1Padding from provider TBD via init 
     O PreMasterSecret:  Using cipher for wrap RSA/SSL/PKCS1Padding from provider from init IBMJCE version 1.2
     O *** ClientKeyExchange, RSA PreMasterSecret, TLSv1
     O [write] MD5 and SHA1 hashes:  len = 1857
     O 0000: ...7..4...0...0.

     O Padded plaintext before ENCRYPTION:  len = 1888
     O 0000:  ...7..4...0...0.

     O ListenerContainer-1, WRITE: TLSv1 Handshake, length = 1888
     O SESSION KEYGEN:
     O PreMaster Secret:
     O 0000: ........Q.J...K.

     O javax.crypto.spec.SecretKeySpec@13e5009
     O JsseJCE:  Using KeyGenerator IbmTlsMasterSecret from provider TBD via init 
     O JsseJCE:  Using KeyGenerator IbmTlsKeyMaterial from provider TBD via init 
     O CONNECTION KEYGEN:
     O Client Nonce:
     O 0000: 58 e3 96 3a 2f 30 6c 18  00 91 3b 7c cd 53 af 97  X....0l......S..

     O Server Nonce:
     O 0000: 58 e3 96 0b d1 0f ec fc  78 bd e5 5c c3 b2 0c fd  X.......x.......

     O Master Secret:
     O 0000: 31 f7 d1 f5 85 14 c3 3f  b4 86 26 04 e9 5d 4a 80  1.............J.

     O Client MAC write Secret:
     O 0000: 3d f9 24 a2 e8 6b a3 3a  1d cb 1d 89 c4 92 14 dd  .....k..........

     O Server MAC write Secret:
     O 0000:  ...W......m.Z..2

     O Client write key:
     O 0000:  p..9....U..f....

     O Server write key:
     O 0000: 12 69 bf 32 56 85 16 a8  ef f4 56 f7 2e 59 99 62  .i.2V.....V..Y.b

     O Client write IV:
     O 0000: fe 71 85 da 9e c1 4c 9b  2d 78 47 6d 6b 0b 14 47  .q....L..xGmk..G

     O Server write IV:
     O 0000: b6 00 6c c6 06 89 77 96  73 54 97 77 2b 92 91 6c  ..l...w.sT.w...l

     O JsseJCE:  Using signature RSAforSSL from provider TBD via init 
     O JsseJCE:  Using MessageDigest MD5 from provider IBMJCE version 1.2
     O JsseJCE:  Using MessageDigest SHA from provider IBMJCE version 1.2
     O Signatures:  Using signature RSA from provider from initSignIBMJCE version 1.2
     O *** CertificateVerify
     O [write] MD5 and SHA1 hashes:  len = 134
     O 0000: 0f 00 00 82 00 80 8f 81  da ae ea d9 b0 80 7d f3  ................

     O JsseJCE:  Using KeyGenerator IbmTlsPrf from provider TBD via init 
     O HandshakeMessage:  TLS Keygenerator IbmTlsPrf  from provider from init IBMJCE version 1.2
     O Padded plaintext before ENCRYPTION:  len = 160
     O 0000: 0f 00 00 82 00 80 8f 81  da ae ea d9 b0 80 7d f3  ................

     O ListenerContainer-1, WRITE: TLSv1 Handshake, length = 160
     O Padded plaintext before ENCRYPTION:  len = 32
     O 0000:  ....R..u.iAt7.q.

     O ListenerContainer-1, WRITE: TLSv1 Change Cipher Spec, length = 32
     O JsseJCE:  Using cipher AES/CBC/NoPadding from provider TBD via init 
     O CipherBox:  Using cipher AES/CBC/NoPadding from provider from init IBMJCE version 1.2
     O JsseJCE:  Using MAC HmacSHA1 from provider TBD via init 
     O MAC:  Using MessageDigest HmacSHA1 from provider IBMJCE version 1.2
     O *** Finished
     O verify_data:  {  100 }
     O ***
     O [write] MD5 and SHA1 hashes:  len = 16
     O 0000:  .....g........jd

     O Padded plaintext before ENCRYPTION:  len = 48
     O 0000:  .....g........jd

     O ListenerContainer-1, WRITE: TLSv1 Handshake, length = 48
     O [Raw write]: length = 1893
     O 0000: 16 03 01 07 60 30 e0 6b  5b 53 27 32 30 1a b2 be  .....0.k.S.20...

     O [Raw write]: length = 165
     O 0000: 16 03 01 00 a0 42 1b 86  be 1e ac 1d 81 23 74 44  .....B........tD


     O [Raw write]: length = 37
     O 0000: 14 03 01 00 20 24 21 46  20 90 77 7a 1d 02 81 b2  .......F..wz....

     O [Raw write]: length = 53
     O 0000:   ....0.3.a...x...

     O [Raw read]: length = 5
     O 0000: 14 03 01 00 20                                     .....

     O [Raw read]: length = 32
     O 0000:   ...m.....x..0...

     O ListenerContainer-1, READ: TLSv1 Change Cipher Spec, length = 32
     O 0000:   .O.......nJ...g.


     O JsseJCE:  Using cipher AES/CBC/NoPadding from provider TBD via init 
     O CipherBox:  Using cipher AES/CBC/NoPadding from provider from init IBMJCE version 1.2
     O JsseJCE:  Using MAC HmacSHA1 from provider TBD via init 
     O MAC:  Using MessageDigest HmacSHA1 from provider IBMJCE version 1.2
     O [Raw read]: length = 5
     O 0000: 16 03 01 00 30                                     ....0

     O [Raw read]: length = 48
     O 0000: 04 93 78 76 db 42 1d af  85 e9 bd 2b b8 7a d6 e6  ..xv.B.......z..

     O ListenerContainer-1, READ: TLSv1 Handshake, length = 48
     O 0000: 14 00 00 0c 77 2e ab 89  d0 91 9c 47 12 35 00 40  ....w......G.5..

     O *** Finished
     O verify_data:  { 119, 46, 171, 137, 208, 145, 156, 71, 18, 53, 0, 64 }
     O ***
     O JsseJCE:  Using KeyGenerator IbmTlsPrf from provider TBD via init 
     O HandshakeMessage:  TLS Keygenerator IbmTlsPrf  from provider from init IBMJCE version 1.2
     O cached session [Session-8, SSL_RSA_WITH_AES_128_CBC_SHA]
     O %% Cached client session: [Session-8, SSL_RSA_WITH_AES_128_CBC_SHA]
     O [read] MD5 and SHA1 hashes:  len = 16
     O 0000:   ....w......G.5..

     O [Raw read (bb)]: length = 37
     O 0000: 17 03 01 00 20 c4 23 30  6c 3e 32 03 92 8a a8 b8  .......0l.2.....

     O Padded plaintext after DECRYPTION:  len = 32
     O 0000: 48 de e8 a9 44 bf cf 82  73 c1 a2 4c b7 01 8c 12  H...D...s..L....

     O [Raw read (bb)]: length = 1429
     O 0000: 17 03 01 05 90 ed 7b 79  7c b6 e2 b4 2e 17 54 68  .......y......Th

     O Padded plaintext after DECRYPTION:  len = 1424
     O 0000:   TTP.1.1.403.Forb
idden..Content.T
ype..text.html..
Server.http.eq
uiv..Content.Typ
e..content..text
.html..charset.i
so.8859.1......t
itle.403...Forbi
dden..Access.is.
denied...title..

更新:从独立的IBM客户端成功截断ssl日志。

代码语言:javascript
复制
    IBMJSSE2 to send SCSV Cipher Suite on initial ClientHello
JsseJCE:  Using SecureRandom IBMSecureRandom from provider IBMJCE version 1.2

*** ServerHello, TLSv1
Cipher Suite: SSL_RSA_WITH_AES_128_CBC_SHA

*** ServerHelloDone
[read] MD5 and SHA1 hashes:  len = 4

JsseJCE: Choose KeyGenerator for IbmTlsRsaPremasterSecret.
JsseJCE:  Using KeyGenerator IbmTlsRsaPremasterSecret from provider TBD via init 
JsseJCE:  Using cipher RSA/SSL/PKCS1Padding from provider TBD via init 
PreMasterSecret:  Using cipher for wrap RSA/SSL/PKCS1Padding from provider from init IBMJCE version 1.2

JsseJCE:  Using KeyGenerator IbmTlsPrf from provider TBD via init 
HandshakeMessage:  TLS Keygenerator IbmTlsPrf  from provider from init IBMJCE version 1.2
main, WRITE: TLSv1 Change Cipher Spec, length = 1

JsseJCE:  Using cipher AES/CBC/NoPadding from provider TBD via init 
CipherBox:  Using cipher AES/CBC/NoPadding from provider from init IBMJCE version 1.2
JsseJCE:  Using MAC HmacSHA1 from provider TBD via init 

main, READ: TLSv1 Change Cipher Spec, length = 1
JsseJCE:  Using cipher AES/CBC/NoPadding from provider TBD via init 
CipherBox:  Using cipher AES/CBC/NoPadding from provider from init IBMJCE version 1.2

*** ServerHello, TLSv1
Cipher Suite: SSL_RSA_WITH_AES_128_CBC_SHA

*** ServerHelloDone
[read] MD5 and SHA1 hashes:  len = 4
0000: 0e 00 00 00                                        ....

ClientHandshaker: KeyManager com.ibm.jsse2.aJ
JsseJCE:  Using KeyAgreement ECDH from provider IBMJCE version 1.2
JsseJCE:  Using signature SHA1withECDSA from provider TBD via init 
JsseJCE:  Using signature NONEwithECDSA from provider TBD via init 
JsseJCE:  Using KeyFactory EC from provider IBMJCE version 1.2
JsseJCE:  Using KeyPairGenerator EC from provider TBD via init 
JsseJce:  EC is available
*** Certificate chain
***
JsseJCE: Choose KeyGenerator for IbmTlsRsaPremasterSecret.
JsseJCE:  Using KeyGenerator IbmTlsRsaPremasterSecret from provider TBD via init 
JsseJCE:  Using cipher RSA/SSL/PKCS1Padding from provider TBD via init 
PreMasterSecret:  Using cipher for wrap RSA/SSL/PKCS1Padding from provider from init IBMJCE version 1.2
*** ClientKeyExchange, RSA PreMasterSecret, TLSv1

JsseJCE:  Using cipher AES/CBC/NoPadding from provider TBD via init 
CipherBox:  Using cipher AES/CBC/NoPadding from provider from init IBMJCE version 1.2
JsseJCE:  Using MAC HmacSHA1 from provider TBD via init 
MAC:  Using MessageDigest HmacSHA1 from provider IBMJCE version 1.2
*** Finished
verify_data:  { 216, 231, 207, 130, 172, 141, 204, 125, 55, 250, 84, 30 }
***
JsseJCE:  Using KeyGenerator IbmTlsPrf from provider TBD via init 
HandshakeMessage:  TLS Keygenerator IbmTlsPrf  from provider from init IBMJCE version 1.2
cached session [Session-2, SSL_RSA_WITH_AES_128_CBC_SHA]
%% Cached client session: [Session-2, SSL_RSA_WITH_AES_128_CBC_SHA]

main, READ: TLSv1 Application Data, length = 720
  TTP.1.1.200.OK..
  Cache.Control..p
  rivate..Content.
EN

回答 2

Stack Overflow用户

发布于 2017-04-07 19:06:02

我们通过关闭IIS服务器上的“客户证书”要求解决了此问题,该要求以前设置为可选。我们想要单向SSL,但是服务器被设置为双向SSL客户端身份验证。

它适用于独立的Java客户端,因为Java没有发送客户端证书,而且由于“客户-证书”在IIS上是可选的,所以它工作得很好。

但是,Websphere Application Server将默认的“客户端证书”发送给IIS,IIS显然对此证书一无所知,因此它失败了。

这可以从问题中的故障日志中验证。就在“* CertificateRequest”之后,was正在发送默认证书。

票数 0
EN

Stack Overflow用户

发布于 2017-04-11 13:30:08

Brow偏离子将允许您在全球范围内设置最高的java安全性,同时降低所选特定应用程序的安全性。我们建议将JRE的版本始终保持在最新版本的机器上。

  1. 下载最新(x86)版本的Jre https://java.com/en/download/
  2. 下载布朗离子- 布朗离子评价工具包
  3. 创建一个概要文件和一个规则,以便从最新版本切换到JRE1.6版本。有关如何做到这一点的简单指导,请参阅我们网站上的“保持Java最新的演示视频”。
  4. 使用Browsium文件,可以修改Deployment.Properties文件以更改SSL和TLS属性。

如果你需要帮助,请告诉我。

票数 0
EN
页面原文内容由Stack Overflow提供。腾讯云小微IT领域专用引擎提供翻译支持
原文链接:

https://stackoverflow.com/questions/43217534

复制
相关文章

相似问题

领券
问题归档专栏文章快讯文章归档关键词归档开发者手册归档开发者手册 Section 归档