Re: Error CERT_CHAIN_INCOMPLETE CERT_CHAIN_UNTRUSTED - Weblogic

This is a discussion on Re: Error CERT_CHAIN_INCOMPLETE CERT_CHAIN_UNTRUSTED - Weblogic ; Hello All, Iam getting the following error .......... : 42 java.lang.Throwable: Stack trace at weblogic.security.utils.SSLSetup.debug(SSLSetup.ja va:245) at com.certicom.tls.record.alert.Alert. (Unknown Source) at com.certicom.tls.record.handshake.HandshakeHandler .fireAlert(Unknown Source) at com.certicom.tls.record.handshake.ClientStateRecei vedServerHello.handle(Unknown Source) at com.certicom.tls.record.handshake.HandshakeHandler .handleHandshakeMessage(Unknown Source) at com.certicom.tls.record.handshake.HandshakeHandler .handleHandshakeMessages(Unknown Source) at com.certicom.tls.record.ReadHandler.interpretConte nt(Unknown Source) ...

+ Reply to Thread
Results 1 to 5 of 5

Thread: Re: Error CERT_CHAIN_INCOMPLETE CERT_CHAIN_UNTRUSTED

  1. Re: Error CERT_CHAIN_INCOMPLETE CERT_CHAIN_UNTRUSTED

    Hello All,
    Iam getting the following error
    ..........
    <000000>
    <000000>
    <000000>
    <000000>
    <000000>
    <000000> : 42
    java.lang.Throwable: Stack trace
    at weblogic.security.utils.SSLSetup.debug(SSLSetup.ja va:245)
    at com.certicom.tls.record.alert.Alert.(Unknown Source)
    at com.certicom.tls.record.handshake.HandshakeHandler .fireAlert(Unknown Source)
    at com.certicom.tls.record.handshake.ClientStateRecei vedServerHello.handle(Unknown Source)
    at com.certicom.tls.record.handshake.HandshakeHandler .handleHandshakeMessage(Unknown Source)
    at com.certicom.tls.record.handshake.HandshakeHandler .handleHandshakeMessages(Unknown Source)
    at com.certicom.tls.record.ReadHandler.interpretConte nt(Unknown Source)
    at com.certicom.tls.record.ReadHandler.readRecord(Unk nown Source)
    at com.certicom.tls.record.ReadHandler.readUntilHands hakeComplete(Unknown Source)
    at com.certicom.tls.interfaceimpl.TLSConnectionImpl.c ompleteHandshake(Unknown Source)
    at com.certicom.tls.record.WriteHandler.write(Unknown Source)
    at java.io.BufferedOutputStream.flushBuffer(Unknown Source)
    at java.io.BufferedOutputStream.flush(Unknown Source)
    at java.io.FilterOutputStream.flush(Unknown Source)
    at weblogic.net.http.HttpURLConnection.writeRequests( HttpURLConnection.java:97)
    at weblogic.net.http.HttpURLConnection.getInputStream (HttpURLConnection.java:284)
    at java.net.HttpURLConnection.getResponseCode(Unknown Source)
    at weblogic.net.http.HttpURLConnection.getResponseCod e(HttpURLConnection.java:662)
    at org.diabetes.phd.services.SSLClient.tryConnection( SSLClient.java:81)
    at org.diabetes.phd.services.SSLClient.wlsURLConnect( SSLClient.java:126)
    at org.diabetes.phd.services.SSLClient.main(SSLClient .java:36)
    >

    <000000>
    <000000>
    <000000> javax.net.ssl.SSLKeyException: FATAL Alert:BAD_CERTIFICATE - A corrupt or unuseable certificate was received.
    at com.certicom.tls.interfaceimpl.TLSConnectionImpl.f ireException(Unknown Source)
    at com.certicom.tls.interfaceimpl.TLSConnectionImpl.f ireAlertSent(Unknown Source)
    at com.certicom.tls.record.handshake.HandshakeHandler .fireAlert(Unknown Source)
    at com.certicom.tls.record.handshake.HandshakeHandler .fireAlert(Unknown Source)
    at com.certicom.tls.record.handshake.ClientStateRecei vedServerHello.handle(Unknown Source)
    at com.certicom.tls.record.handshake.HandshakeHandler .handleHandshakeMessage(Unknown Source)
    at com.certicom.tls.record.handshake.HandshakeHandler .handleHandshakeMessages(Unknown Source)
    at com.certicom.tls.record.ReadHandler.interpretConte nt(Unknown Source)
    at com.certicom.tls.record.ReadHandler.readRecord(Unk nown Source)
    at com.certicom.tls.record.ReadHandler.readUntilHands hakeComplete(Unknown Source)
    at com.certicom.tls.interfaceimpl.TLSConnectionImpl.c ompleteHandshake(Unknown Source)
    at com.certicom.tls.record.WriteHandler.write(Unknown Source)
    at java.io.BufferedOutputStream.flushBuffer(Unknown Source)
    at java.io.BufferedOutputStream.flush(Unknown Source)
    at java.io.FilterOutputStream.flush(Unknown Source)
    at weblogic.net.http.HttpURLConnection.writeRequests( HttpURLConnection.java:97)
    at weblogic.net.http.HttpURLConnection.getInputStream (HttpURLConnection.java:284)
    at java.net.HttpURLConnection.getResponseCode(Unknown Source)
    at weblogic.net.http.HttpURLConnection.getResponseCod e(HttpURLConnection.java:662)
    at org.diabetes.phd.services.SSLClient.tryConnection( SSLClient.java:81)
    at org.diabetes.phd.services.SSLClient.wlsURLConnect( SSLClient.java:126)
    at org.diabetes.phd.services.SSLClient.main(SSLClient .java:36)
    >

    <000000> : 40
    java.lang.Throwable: Stack trace
    at weblogic.security.utils.SSLSetup.debug(SSLSetup.ja va:245)
    at com.certicom.tls.record.alert.Alert.(Unknown Source)
    at com.certicom.tls.record.handshake.HandshakeHandler .fireAlert(Unknown Source)
    at com.certicom.tls.record.handshake.HandshakeHandler .handleHandshakeMessage(Unknown Source)
    at com.certicom.tls.record.handshake.HandshakeHandler .handleHandshakeMessages(Unknown Source)
    at com.certicom.tls.record.ReadHandler.interpretConte nt(Unknown Source)
    at com.certicom.tls.record.ReadHandler.readRecord(Unk nown Source)
    at com.certicom.tls.record.ReadHandler.readUntilHands hakeComplete(Unknown Source)
    at com.certicom.tls.interfaceimpl.TLSConnectionImpl.c ompleteHandshake(Unknown Source)
    at com.certicom.tls.record.WriteHandler.write(Unknown Source)
    at java.io.BufferedOutputStream.flushBuffer(Unknown Source)
    at java.io.BufferedOutputStream.flush(Unknown Source)
    at java.io.FilterOutputStream.flush(Unknown Source)
    at weblogic.net.http.HttpURLConnection.writeRequests( HttpURLConnection.java:97)
    at weblogic.net.http.HttpURLConnection.getInputStream (HttpURLConnection.java:284)
    at java.net.HttpURLConnection.getResponseCode(Unknown Source)
    at weblogic.net.http.HttpURLConnection.getResponseCod e(HttpURLConnection.java:662)
    at org.diabetes.phd.services.SSLClient.tryConnection( SSLClient.java:81)
    at org.diabetes.phd.services.SSLClient.wlsURLConnect( SSLClient.java:126)
    at org.diabetes.phd.services.SSLClient.main(SSLClient .java:36)
    >

    <000000>
    <000000>
    <000000>
    <000000>
    <000000>
    <000000>
    <000000>
    <000000>
    <000000>
    <000000> <3083761 readRecord()>
    <000000> <3083761 received HANDSHAKE>
    <000000>
    <000000>
    <000000>
    <000000>
    <000000> <3083761 readRecord()>
    <000000> <3083761 received HANDSHAKE>
    <000000>
    <000000>
    <000000>
    <000000> < cert[0] = [[
    ...................

    java.lang.Throwable: Stack trace
    at weblogic.security.utils.SSLSetup.debug(SSLSetup.ja va:245)
    at com.certicom.tls.record.alert.Alert.(Unknown Source)
    at com.certicom.tls.record.handshake.HandshakeHandler .fireAlert(Unknown Source)
    at com.certicom.tls.record.handshake.ClientStateRecei vedServerHello.handle(Unknown Source)
    at com.certicom.tls.record.handshake.HandshakeHandler .handleHandshakeMessage(Unknown Source)
    at com.certicom.tls.record.handshake.HandshakeHandler .handleHandshakeMessages(Unknown Source)
    at com.certicom.tls.record.ReadHandler.interpretConte nt(Unknown Source)
    at com.certicom.tls.record.ReadHandler.readRecord(Unk nown Source)
    at com.certicom.tls.record.ReadHandler.readUntilHands hakeComplete(Unknown Source)
    at com.certicom.tls.interfaceimpl.TLSConnectionImpl.c ompleteHandshake(Unknown Source)
    at com.certicom.tls.record.WriteHandler.write(Unknown Source)
    at java.io.BufferedOutputStream.flushBuffer(Unknown Source)
    at java.io.BufferedOutputStream.flush(Unknown Source)
    at java.io.FilterOutputStream.flush(Unknown Source)
    at weblogic.net.http.HttpURLConnection.writeRequests( HttpURLConnection.java:97)
    at weblogic.net.http.HttpURLConnection.getInputStream (HttpURLConnection.java:284)
    at weblogic.net.http.HttpURLConnection.getHeaderField (HttpURLConnection.java:527)
    at java.net.HttpURLConnection.getResponseCode(Unknown Source)
    at weblogic.net.http.HttpURLConnection.getResponseCod e(HttpURLConnection.java:662)
    at org.diabetes.phd.services.SSLClient.tryConnection( SSLClient.java:81)
    at org.diabetes.phd.services.SSLClient.wlsURLConnect( SSLClient.java:126)
    at org.diabetes.phd.services.SSLClient.main(SSLClient .java:36)
    >

    <000000>
    <000000>
    <000000> javax.net.ssl.SSLKeyException: FATAL Alert:BAD_CERTIFICATE - A corrupt or unuseable certificate was received.
    at com.certicom.tls.interfaceimpl.TLSConnectionImpl.f ireException(Unknown Source)
    at com.certicom.tls.interfaceimpl.TLSConnectionImpl.f ireAlertSent(Unknown Source)
    at com.certicom.tls.record.handshake.HandshakeHandler .fireAlert(Unknown Source)
    at com.certicom.tls.record.handshake.HandshakeHandler .fireAlert(Unknown Source)
    at com.certicom.tls.record.handshake.ClientStateRecei vedServerHello.handle(Unknown Source)
    at com.certicom.tls.record.handshake.HandshakeHandler .handleHandshakeMessage(Unknown Source)
    at com.certicom.tls.record.handshake.HandshakeHandler .handleHandshakeMessages(Unknown Source)
    at com.certicom.tls.record.ReadHandler.interpretConte nt(Unknown Source)
    at com.certicom.tls.record.ReadHandler.readRecord(Unk nown Source)
    at com.certicom.tls.record.ReadHandler.readUntilHands hakeComplete(Unknown Source)
    at com.certicom.tls.interfaceimpl.TLSConnectionImpl.c ompleteHandshake(Unknown Source)
    at com.certicom.tls.record.WriteHandler.write(Unknown Source)
    at java.io.BufferedOutputStream.flushBuffer(Unknown Source)
    at java.io.BufferedOutputStream.flush(Unknown Source)
    at java.io.FilterOutputStream.flush(Unknown Source)
    at weblogic.net.http.HttpURLConnection.writeRequests( HttpURLConnection.java:97)
    at weblogic.net.http.HttpURLConnection.getInputStream (HttpURLConnection.java:284)
    at weblogic.net.http.HttpURLConnection.getHeaderField (HttpURLConnection.java:527)
    at java.net.HttpURLConnection.getResponseCode(Unknown Source)
    at weblogic.net.http.HttpURLConnection.getResponseCod e(HttpURLConnection.java:662)
    at org.diabetes.phd.services.SSLClient.tryConnection( SSLClient.java:81)
    at org.diabetes.phd.services.SSLClient.wlsURLConnect( SSLClient.java:126)
    at org.diabetes.phd.services.SSLClient.main(SSLClient .java:36)
    >

    <000000> 40
    java.lang.Throwable: Stack trace
    at weblogic.security.utils.SSLSetup.debug(SSLSetup.ja va:245)
    at com.certicom.tls.record.alert.Alert.(Unknown Source)
    at com.certicom.tls.record.handshake.HandshakeHandler .fireAlert(Unknown Source)
    at com.certicom.tls.record.handshake.HandshakeHandler .handleHandshakeMessage(Unknown Source)
    at com.certicom.tls.record.handshake.HandshakeHandler .handleHandshakeMessages(Unknown Source)
    at com.certicom.tls.record.ReadHandler.interpretConte nt(Unknown Source)
    at com.certicom.tls.record.ReadHandler.readRecord(Unk nown Source)
    at com.certicom.tls.record.ReadHandler.readUntilHands hakeComplete(Unknown Source)
    at com.certicom.tls.interfaceimpl.TLSConnectionImpl.c ompleteHandshake(Unknown Source)
    at com.certicom.tls.record.WriteHandler.write(Unknown Source)
    at java.io.BufferedOutputStream.flushBuffer(Unknown Source)
    at java.io.BufferedOutputStream.flush(Unknown Source)
    at java.io.FilterOutputStream.flush(Unknown Source)
    at weblogic.net.http.HttpURLConnection.writeRequests( HttpURLConnection.java:97)
    at weblogic.net.http.HttpURLConnection.getInputStream (HttpURLConnection.java:284)
    at weblogic.net.http.HttpURLConnection.getHeaderField (HttpURLConnection.java:527)
    at java.net.HttpURLConnection.getResponseCode(Unknown Source)
    at weblogic.net.http.HttpURLConnection.getResponseCod e(HttpURLConnection.java:662)
    at org.diabetes.phd.services.SSLClient.tryConnection( SSLClient.java:81)
    at org.diabetes.phd.services.SSLClient.wlsURLConnect( SSLClient.java:126)
    at org.diabetes.phd.services.SSLClient.main(SSLClient .java:36)
    >

    Write Channel Closed, possible SSL handshaking or trust failurejava.io.IOException: Write Channel Closed, possible SSL handsh
    aking or trust failure
    at com.certicom.tls.record.WriteHandler.write(Unknown Source)
    at com.certicom.tls.interfaceimpl.TLSConnectionImpl.f ireAlertSent(Unknown Source)
    at com.certicom.tls.record.handshake.HandshakeHandler .fireAlert(Unknown Source)
    at com.certicom.tls.record.handshake.HandshakeHandler .fireAlert(Unknown Source)
    at com.certicom.tls.record.handshake.HandshakeHandler .handleHandshakeMessage(Unknown Source)
    at com.certicom.tls.record.handshake.HandshakeHandler .handleHandshakeMessages(Unknown Source)
    at com.certicom.tls.record.ReadHandler.interpretConte nt(Unknown Source)
    at com.certicom.tls.record.ReadHandler.readRecord(Unk nown Source)
    at com.certicom.tls.record.ReadHandler.readUntilHands hakeComplete(Unknown Source)
    at com.certicom.tls.interfaceimpl.TLSConnectionImpl.c ompleteHandshake(Unknown Source)
    at com.certicom.tls.record.WriteHandler.write(Unknown Source)
    at java.io.BufferedOutputStream.flushBuffer(Unknown Source)
    at java.io.BufferedOutputStream.flush(Unknown Source)
    at java.io.FilterOutputStream.flush(Unknown Source)
    at weblogic.net.http.HttpURLConnection.writeRequests( HttpURLConnection.java:97)
    at weblogic.net.http.HttpURLConnection.getInputStream (HttpURLConnection.java:284)
    at java.net.HttpURLConnection.getResponseCode(Unknown Source)
    at weblogic.net.http.HttpURLConnection.getResponseCod e(HttpURLConnection.java:662)
    at org.diabetes.phd.services.SSLClient.tryConnection( SSLClient.java:81)
    at org.diabetes.phd.services.SSLClient.wlsURLConnect( SSLClient.java:126)
    at org.diabetes.phd.services.SSLClient.main(SSLClient .java:36)
    Can anyone help?
    Thanks in advance
    sheets

  2. Re: Error CERT_CHAIN_INCOMPLETE CERT_CHAIN_UNTRUSTED

    Your ssl client is not configured to trust the server identity certificate. You can use these command line properties to make it trust certs from a jks keystore:
    -Dweblogic.security.TrustKeyStore=CustomTrust
    -Dweblogic.security.CustomTrustKeyStoreFileName=

    Pavel.

  3. Re: Error CERT_CHAIN_INCOMPLETE CERT_CHAIN_UNTRUSTED

    Hello,
    Thanks for the prompt reply. Am using the "cacerts" keystore from WL-HOME\server\lib. It doesnt help...Below is the weblogic startup file , the error and Code. Am I missiing something ! I would really appreciate any help on this.

    ---------------START UP---------------
    C:\bea\user_projects\adadomain>"C:\bea\jdk131_06\bin\java" -server -Xmx384m -Dweblogic.security.TrustKeyStore=CustomTrust -Dw
    eblogic.security.CustomTrustKeyStoreFileName=C:\be a\weblogic700\server\lib\cacerts -Dssl.debug=true -Dweblogic.StdoutDebugEna
    bled=true -Dweblogic.security.SSL.ignoreHostnameVerification= true -Dweblogic.security.SSL.enforceConstraints=false -Dweblogic
    webservice.client.ssl.strictcertchecking=false -Dweblogic.webservice.client.verbose=true -Dweblogic.StdoutDebugEnabled=true
    -Dweblogic.Name=adaserver -Dbea.home="C:\bea" -Dweblogic.management.username=system -Dweblogic.management.password=diabetes.o
    rg -Dweblogic.ProductionModeEnabled=false -Dweblogic.management.discover=false -Djava.security.policy="C:\bea\weblogic700\ser
    ver\lib\weblogic.policy" -Xdebug -Xnoagent -Djava.compiler=NONE -Xrunjdwp:transport=dt_socket,address=7654,suspend= n,server=
    y weblogic.Server
    Starting WebLogic Server...
    <000000>
    <140005> xml>
    <000000>
    <090082>
    <000327> domain">
    <101247> es the old version of Servlet DTD. Please, change the public ID in web.xml file to "-//Sun Microsystems, Inc.//DTD Web Applic
    ation 2.3//EN".>
    <101247> D references the old version of Servlet DTD. Please, change the public ID in web.xml file to "-//Sun Microsystems, Inc.//DTD
    Web Application 2.3//EN".>
    <141052>

    JSpell 2.0b HTML Servlet
    Instance: com.wallstreetwise.app.jspell.domain.net.JSpellSer vlet@32468a
    Copyright (c) 1999 Wall Street Wise Software, Inc.
    http://www.thesolutioncafe.com/jspell.html
    MAY NOT BE REDISTRIBUTED - LICENSED FOR USE ON ONE MACHINE ONLY

    JSpell 2.0b HTML Servlet
    Instance: com.wallstreetwise.app.jspell.domain.net.JSpellSer vlet@18188d
    Copyright (c) 1999 Wall Street Wise Software, Inc.
    http://www.thesolutioncafe.com/jspell.html
    MAY NOT BE REDISTRIBUTED - LICENSED FOR USE ON ONE MACHINE ONLY

    JSpell 2.0b HTML Servlet
    Instance: com.wallstreetwise.app.jspell.domain.net.JSpellSer vlet@73e277
    Copyright (c) 1999 Wall Street Wise Software, Inc.
    http://www.thesolutioncafe.com/jspell.html
    MAY NOT BE REDISTRIBUTED - LICENSED FOR USE ON ONE MACHINE ONLY

    JSpell 2.0b HTML Servlet
    Instance: com.wallstreetwise.app.jspell.domain.net.JSpellSer vlet@1921ca
    Copyright (c) 1999 Wall Street Wise Software, Inc.
    http://www.thesolutioncafe.com/jspell.html
    MAY NOT BE REDISTRIBUTED - LICENSED FOR USE ON ONE MACHINE ONLY

    JSpell 2.0b HTML Servlet
    Instance: com.wallstreetwise.app.jspell.domain.net.JSpellSer vlet@798a6c
    Copyright (c) 1999 Wall Street Wise Software, Inc.
    http://www.thesolutioncafe.com/jspell.html
    MAY NOT BE REDISTRIBUTED - LICENSED FOR USE ON ONE MACHINE ONLY

    JSpell 2.0b HTML Servlet
    Instance: com.wallstreetwise.app.jspell.domain.net.JSpellSer vlet@54c945
    Copyright (c) 1999 Wall Street Wise Software, Inc.
    http://www.thesolutioncafe.com/jspell.html
    MAY NOT BE REDISTRIBUTED - LICENSED FOR USE ON ONE MACHINE ONLY

    JSpell 2.0b HTML Servlet
    Instance: com.wallstreetwise.app.jspell.domain.net.JSpellSer vlet@4d0354
    Copyright (c) 1999 Wall Street Wise Software, Inc.
    http://www.thesolutioncafe.com/jspell.html
    MAY NOT BE REDISTRIBUTED - LICENSED FOR USE ON ONE MACHINE ONLY

    JSpell 2.0b HTML Servlet
    Instance: com.wallstreetwise.app.jspell.domain.net.JSpellSer vlet@317471
    Copyright (c) 1999 Wall Street Wise Software, Inc.
    http://www.thesolutioncafe.com/jspell.html
    MAY NOT BE REDISTRIBUTED - LICENSED FOR USE ON ONE MACHINE ONLY

    JSpell 2.0b HTML Servlet
    Instance: com.wallstreetwise.app.jspell.domain.net.JSpellSer vlet@53bd20
    Copyright (c) 1999 Wall Street Wise Software, Inc.
    http://www.thesolutioncafe.com/jspell.html
    MAY NOT BE REDISTRIBUTED - LICENSED FOR USE ON ONE MACHINE ONLY

    JSpell 2.0b HTML Servlet
    Instance: com.wallstreetwise.app.jspell.domain.net.JSpellSer vlet@2587bc
    Copyright (c) 1999 Wall Street Wise Software, Inc.
    http://www.thesolutioncafe.com/jspell.html
    MAY NOT BE REDISTRIBUTED - LICENSED FOR USE ON ONE MACHINE ONLY
    <000000>
    <000000> sing provider SUN version 1.2>
    <000000> ing provider SunRsaSign version 1.0>
    <000000> sing provider SunRsaSign version 1.0>
    <000000> ing provider SunRsaSign version 1.0>
    <000000> provider SUN version 1.2>
    <000000> provider SUN version 1.2>
    <000000>
    <000000>
    <000000>
    <000000> her>
    <000000> Cipher>
    <000000> Cipher>
    <000000>
    <000000> Cipher>
    <000000> her>
    <000000> t>
    <000000>
    <000000> ement>
    <000000>
    <000000> < provider[0] - SUN>
    <000000> < SUN (DSA key/parameter generation; DSA signing; SHA-1, MD5 d
    igests; SecureRandom; X.509 certificates; JKS keystore)>
    <000000> < provider[1] - SunRsaSign>
    <000000> < SUN's provider for RSA signatures>
    <000000>
    <000000>
    <000000>
    <000000>
    >
    <000000>
    <000000>
    <000000>
    <000000>
    <000000> 0>
    <000000>
    <000000>
    <000000>
    <000000>
    <000000>
    <000000>
    <000000>
    >
    <000000>
    <000000>
    <000000>
    <000000>
    <000000>
    <000000>
    <000000>
    <000000>
    <000000>
    <000000>
    <000000>
    <000000>
    <000000>
    <000000>
    <000000>
    <000000>
    <090088> n of server adaserver, realm myrealm. Assuming 6.x private key configuration. Loading the key from file.>
    <000000>
    <000000>
    <000000>
    <000000>
    <000000>
    <090120> -ca.pem on server adaserver.>
    <000000>
    <000000> c700/server\lib\cacerts>
    <000000> Issuer:C=ZA, ST=Western Cape, L=Cape Town, O=Thawte Consulting, OU=Certification Services Division, CN=Thawte Personal Freema
    il CA, EMAIL=personal-freemail@thawte.com
    Subject:C=ZA, ST=Western Cape, L=Cape Town, O=Thawte Consulting, OU=Certification Services Division, CN=Thawte Personal Freem
    ail CA, EMAIL=personal-freemail@thawte.com
    Not Valid Before:Sun Dec 31 18:00:00 CST 1995
    Not Valid After:Thu Dec 31 17:59:59 CST 2020
    Signature Algorithm:MD5withRSA
    >

    <000000> Issuer:C=ZA, ST=Western Cape, L=Cape Town, O=Thawte Consulting, OU=Certification Services Division, CN=Thawte Personal Basic
    CA, EMAIL=personal-basic@thawte.com
    Subject:C=ZA, ST=Western Cape, L=Cape Town, O=Thawte Consulting, OU=Certification Services Division, CN=Thawte Personal Basic
    CA, EMAIL=personal-basic@thawte.com
    Not Valid Before:Sun Dec 31 18:00:00 CST 1995
    Not Valid After:Thu Dec 31 17:59:59 CST 2020
    Signature Algorithm:MD5withRSA
    >

    <000000> Issuer:C=US, ST=MyState, L=MyTown, O=MyOrganization, OU=FOR TESTING ONLY, CN=CACERT
    Subject:C=US, ST=MyState, L=MyTown, O=MyOrganization, OU=FOR TESTING ONLY, CN=CACERT
    Not Valid Before:Thu Mar 21 14:12:27 CST 2002
    Not Valid After:Tue Mar 22 14:12:27 CST 2022
    Signature Algorithm:MD5withRSA
    >

    <000000> Issuer:C=US, O=VeriSign, Inc., OU=Class 3 Public Primary Certification Authority
    Subject:C=US, O=VeriSign, Inc., OU=Class 3 Public Primary Certification Authority
    Not Valid Before:Sun Jan 28 18:00:00 CST 1996
    Not Valid After:Wed Jan 07 17:59:59 CST 2004
    Signature Algorithm:MD2withRSA
    >

    <000000> Issuer:C=US, ST=California, L=San Francisco, O=BEA WebLogic, OU=Security, CN=Demo Certificate Authority Constraints, EMAIL=se
    curity@bea.com
    Subject:C=US, ST=California, L=San Francisco, O=BEA WebLogic, OU=Security, CN=Demo Certificate Authority Constraints, EMAIL=s
    ecurity@bea.com
    Not Valid Before:Fri Nov 01 14:02:11 CST 2002
    Not Valid After:Mon Oct 16 15:02:11 CDT 2006
    Signature Algorithm:MD5withRSA
    >

    <000000> Issuer:C=ZA, ST=Western Cape, L=Cape Town, O=Thawte Consulting, OU=Certification Services Division, CN=Thawte Personal Premiu
    m CA, EMAIL=personal-premium@thawte.com
    Subject:C=ZA, ST=Western Cape, L=Cape Town, O=Thawte Consulting, OU=Certification Services Division, CN=Thawte Personal Premi
    um CA, EMAIL=personal-premium@thawte.com
    Not Valid Before:Sun Dec 31 18:00:00 CST 1995
    Not Valid After:Thu Dec 31 17:59:59 CST 2020
    Signature Algorithm:MD5withRSA
    >

    <000000> Issuer:C=ZA, ST=Western Cape, L=Cape Town, O=Thawte Consulting cc, OU=Certification Services Division, CN=Thawte Server CA, E
    MAIL=server-certs@thawte.com
    Subject:C=ZA, ST=Western Cape, L=Cape Town, O=Thawte Consulting cc, OU=Certification Services Division, CN=Thawte Server CA,
    EMAIL=server-certs@thawte.com
    Not Valid Before:Wed Jul 31 19:00:00 CDT 1996
    Not Valid After:Thu Dec 31 17:59:59 CST 2020
    Signature Algorithm:MD5withRSA
    >

    <000000> Issuer:C=US, O=VeriSign, Inc., OU=Class 4 Public Primary Certification Authority
    Subject:C=US, O=VeriSign, Inc., OU=Class 4 Public Primary Certification Authority
    Not Valid Before:Sun Jan 28 18:00:00 CST 1996
    Not Valid After:Fri Dec 31 17:59:59 CST 1999
    Signature Algorithm:MD2withRSA
    >

    <000000> Issuer:C=US, ST=MyState, L=MyTown, O=MyOrganization, OU=FOR TESTING ONLY, CN=CertGenCAB
    Subject:C=US, ST=MyState, L=MyTown, O=MyOrganization, OU=FOR TESTING ONLY, CN=CertGenCAB
    Not Valid Before:Thu Oct 24 10:54:45 CDT 2002
    Not Valid After:Tue Oct 25 10:54:45 CDT 2022
    Signature Algorithm:MD5withRSA
    >

    <000000> Issuer:C=US, ST=California, L=San Francisco, O=BEA WebLogic, OU=Security, CN=Demo Certificate Authority, EMAIL=security@bea.c
    om
    Subject:C=US, ST=California, L=San Francisco, O=BEA WebLogic, OU=Security, CN=Demo Certificate Authority, EMAIL=security@bea.
    com
    Not Valid Before:Tue May 30 16:10:46 CDT 2000
    Not Valid After:Fri May 14 16:10:46 CDT 2004
    Signature Algorithm:MD5withRSA
    >

    <000000> Issuer:C=US, ST=California, L=San Francisco, O=BEA WebLogic, OU=Security, CN=Demo Certificate Authority, EMAIL=support@bea.co
    m
    Subject:C=US, ST=California, L=San Francisco, O=BEA WebLogic, OU=Security, CN=Demo Certificate Authority, EMAIL=support@bea.c
    om
    Not Valid Before:Tue May 30 16:37:44 CDT 2000
    Not Valid After:Fri May 14 16:37:44 CDT 2004
    Signature Algorithm:MD5withRSA
    >

    <000000> Issuer:C=US, ST=California, L=San Francisco, O=BEA WebLogic, OU=Security, CN=Demo Certificate Authority, EMAIL=security@bea.c
    om
    Subject:C=US, ST=California, L=San Francisco, O=BEA WebLogic, OU=Security, CN=Demo Certificate Authority, EMAIL=security@bea.
    com
    Not Valid Before:Tue May 30 16:10:46 CDT 2000
    Not Valid After:Fri May 14 16:10:46 CDT 2004
    Signature Algorithm:MD5withRSA
    >

    <000000> Issuer:C=US, O=RSA Data Security, Inc., OU=Secure Server Certification Authority
    Subject:C=US, O=RSA Data Security, Inc., OU=Secure Server Certification Authority
    Not Valid Before:Tue Nov 08 18:00:00 CST 1994
    Not Valid After:Thu Jan 07 17:59:59 CST 2010
    Signature Algorithm:MD2withRSA
    >

    <000000> Issuer:C=US, O=VeriSign, Inc., OU=Class 1 Public Primary Certification Authority
    Subject:C=US, O=VeriSign, Inc., OU=Class 1 Public Primary Certification Authority
    Not Valid Before:Sun Jan 28 18:00:00 CST 1996
    Not Valid After:Tue Jan 07 17:59:59 CST 2020
    Signature Algorithm:MD2withRSA
    >

    <000000> Issuer:C=ZA, ST=Western Cape, L=Cape Town, O=Thawte Consulting cc, OU=Certification Services Division, CN=Thawte Premium Serv
    er CA, EMAIL=premium-server@thawte.com
    Subject:C=ZA, ST=Western Cape, L=Cape Town, O=Thawte Consulting cc, OU=Certification Services Division, CN=Thawte Premium Ser
    ver CA, EMAIL=premium-server@thawte.com
    Not Valid Before:Wed Jul 31 19:00:00 CDT 1996
    Not Valid After:Thu Dec 31 17:59:59 CST 2020
    Signature Algorithm:MD5withRSA
    >

    <000000> Issuer:C=US, O=VeriSign, Inc., OU=Class 2 Public Primary Certification Authority
    Subject:C=US, O=VeriSign, Inc., OU=Class 2 Public Primary Certification Authority
    Not Valid Before:Sun Jan 28 18:00:00 CST 1996
    Not Valid After:Wed Jan 07 17:59:59 CST 2004
    Signature Algorithm:MD2withRSA
    >

    <000000> Issuer:C=US, ST=California, L=San Francisco, O=BEA WebLogic, OU=Security, CN=Demo Certificate Authority Constraints, EMAIL=su
    pport@bea.com
    Subject:C=US, ST=California, L=San Francisco, O=BEA WebLogic, OU=Security, CN=Demo Certificate Authority Constraints, EMAIL=s
    upport@bea.com
    Not Valid Before:Fri Nov 01 14:02:22 CST 2002
    Not Valid After:Mon Oct 16 15:02:22 CDT 2006
    Signature Algorithm:MD5withRSA
    >

    <000000>
    <000000>
    <000000> < TLS_RSA_WITH_DES_CBC_SHA>
    <000000> < TLS_RSA_EXPORT1024_WITH_RC4_56_SHA>
    <000000> < TLS_RSA_EXPORT1024_WITH_DES_CBC_SHA>
    <000000> < TLS_RSA_EXPORT_WITH_RC4_40_MD5>
    <000000> < TLS_RSA_EXPORT_WITH_DES40_CBC_SHA>
    <000000> < TLS_RSA_EXPORT_WITH_DES_40_CBC_SHA>
    <000000> < TLS_RSA_WITH_NULL_MD5>
    <000000> < TLS_RSA_WITH_NULL_SHA>
    <000000> < TLS_DH_anon_EXPORT_WITH_RC4_40_MD5>
    <000000> < TLS_DH_anon_EXPORT_WITH_DES40_CBC_SHA>
    <000000> < TLS_DH_anon_EXPORT_WITH_DES_40_CBC_SHA>
    <000331> omain" running in Development Mode>
    <000355> address 10.100.10.100>
    <000355> ress 10.100.10.100>
    <000365>
    <000360>

    ------------ERROR------------------

    <000000>
    <000000>
    <000000>
    <000000>
    <090120> -ca.pem on server adaserver.>
    <000000>
    <000000> c700/server\lib\cacerts>
    <000000> Issuer:C=ZA, ST=Western Cape, L=Cape Town, O=Thawte Consulting, OU=Certification Services Division, CN=Thawte Personal Freema
    il CA, EMAIL=personal-freemail@thawte.com
    Subject:C=ZA, ST=Western Cape, L=Cape Town, O=Thawte Consulting, OU=Certification Services Division, CN=Thawte Personal Freem
    ail CA, EMAIL=personal-freemail@thawte.com
    Not Valid Before:Sun Dec 31 18:00:00 CST 1995
    Not Valid After:Thu Dec 31 17:59:59 CST 2020
    Signature Algorithm:MD5withRSA
    >

    <000000> Issuer:C=ZA, ST=Western Cape, L=Cape Town, O=Thawte Consulting, OU=Certification Services Division, CN=Thawte Personal Basic
    CA, EMAIL=personal-basic@thawte.com
    Subject:C=ZA, ST=Western Cape, L=Cape Town, O=Thawte Consulting, OU=Certification Services Division, CN=Thawte Personal Basic
    CA, EMAIL=personal-basic@thawte.com
    Not Valid Before:Sun Dec 31 18:00:00 CST 1995
    Not Valid After:Thu Dec 31 17:59:59 CST 2020
    Signature Algorithm:MD5withRSA
    >

    <000000> Issuer:C=US, ST=MyState, L=MyTown, O=MyOrganization, OU=FOR TESTING ONLY, CN=CACERT
    Subject:C=US, ST=MyState, L=MyTown, O=MyOrganization, OU=FOR TESTING ONLY, CN=CACERT
    Not Valid Before:Thu Mar 21 14:12:27 CST 2002
    Not Valid After:Tue Mar 22 14:12:27 CST 2022
    Signature Algorithm:MD5withRSA
    >

    <000000> Issuer:C=US, O=VeriSign, Inc., OU=Class 3 Public Primary Certification Authority
    Subject:C=US, O=VeriSign, Inc., OU=Class 3 Public Primary Certification Authority
    Not Valid Before:Sun Jan 28 18:00:00 CST 1996
    Not Valid After:Wed Jan 07 17:59:59 CST 2004
    Signature Algorithm:MD2withRSA
    >

    <000000> Issuer:C=US, ST=California, L=San Francisco, O=BEA WebLogic, OU=Security, CN=Demo Certificate Authority Constraints, EMAIL=se
    curity@bea.com
    Subject:C=US, ST=California, L=San Francisco, O=BEA WebLogic, OU=Security, CN=Demo Certificate Authority Constraints, EMAIL=s
    ecurity@bea.com
    Not Valid Before:Fri Nov 01 14:02:11 CST 2002
    Not Valid After:Mon Oct 16 15:02:11 CDT 2006
    Signature Algorithm:MD5withRSA
    >

    <000000> Issuer:C=ZA, ST=Western Cape, L=Cape Town, O=Thawte Consulting, OU=Certification Services Division, CN=Thawte Personal Premiu
    m CA, EMAIL=personal-premium@thawte.com
    Subject:C=ZA, ST=Western Cape, L=Cape Town, O=Thawte Consulting, OU=Certification Services Division, CN=Thawte Personal Premi
    um CA, EMAIL=personal-premium@thawte.com
    Not Valid Before:Sun Dec 31 18:00:00 CST 1995
    Not Valid After:Thu Dec 31 17:59:59 CST 2020
    Signature Algorithm:MD5withRSA
    >

    <000000> Issuer:C=ZA, ST=Western Cape, L=Cape Town, O=Thawte Consulting cc, OU=Certification Services Division, CN=Thawte Server CA, E
    MAIL=server-certs@thawte.com
    Subject:C=ZA, ST=Western Cape, L=Cape Town, O=Thawte Consulting cc, OU=Certification Services Division, CN=Thawte Server CA,
    EMAIL=server-certs@thawte.com
    Not Valid Before:Wed Jul 31 19:00:00 CDT 1996
    Not Valid After:Thu Dec 31 17:59:59 CST 2020
    Signature Algorithm:MD5withRSA
    >

    <000000> Issuer:C=US, O=VeriSign, Inc., OU=Class 4 Public Primary Certification Authority
    Subject:C=US, O=VeriSign, Inc., OU=Class 4 Public Primary Certification Authority
    Not Valid Before:Sun Jan 28 18:00:00 CST 1996
    Not Valid After:Fri Dec 31 17:59:59 CST 1999
    Signature Algorithm:MD2withRSA
    >

    <000000> Issuer:C=US, ST=MyState, L=MyTown, O=MyOrganization, OU=FOR TESTING ONLY, CN=CertGenCAB
    Subject:C=US, ST=MyState, L=MyTown, O=MyOrganization, OU=FOR TESTING ONLY, CN=CertGenCAB
    Not Valid Before:Thu Oct 24 10:54:45 CDT 2002
    Not Valid After:Tue Oct 25 10:54:45 CDT 2022
    Signature Algorithm:MD5withRSA
    >

    <000000> Issuer:C=US, ST=California, L=San Francisco, O=BEA WebLogic, OU=Security, CN=Demo Certificate Authority, EMAIL=security@bea.c
    om
    Subject:C=US, ST=California, L=San Francisco, O=BEA WebLogic, OU=Security, CN=Demo Certificate Authority, EMAIL=security@bea.
    com
    Not Valid Before:Tue May 30 16:10:46 CDT 2000
    Not Valid After:Fri May 14 16:10:46 CDT 2004
    Signature Algorithm:MD5withRSA
    >

    <000000> Issuer:C=US, ST=California, L=San Francisco, O=BEA WebLogic, OU=Security, CN=Demo Certificate Authority, EMAIL=support@bea.co
    m
    Subject:C=US, ST=California, L=San Francisco, O=BEA WebLogic, OU=Security, CN=Demo Certificate Authority, EMAIL=support@bea.c
    om
    Not Valid Before:Tue May 30 16:37:44 CDT 2000
    Not Valid After:Fri May 14 16:37:44 CDT 2004
    Signature Algorithm:MD5withRSA
    >

    <000000> Issuer:C=US, ST=California, L=San Francisco, O=BEA WebLogic, OU=Security, CN=Demo Certificate Authority, EMAIL=security@bea.c
    om
    Subject:C=US, ST=California, L=San Francisco, O=BEA WebLogic, OU=Security, CN=Demo Certificate Authority, EMAIL=security@bea.
    com
    Not Valid Before:Tue May 30 16:10:46 CDT 2000
    Not Valid After:Fri May 14 16:10:46 CDT 2004
    Signature Algorithm:MD5withRSA
    >

    <000000> Issuer:C=US, O=RSA Data Security, Inc., OU=Secure Server Certification Authority
    Subject:C=US, O=RSA Data Security, Inc., OU=Secure Server Certification Authority
    Not Valid Before:Tue Nov 08 18:00:00 CST 1994
    Not Valid After:Thu Jan 07 17:59:59 CST 2010
    Signature Algorithm:MD2withRSA
    >

    <000000> Issuer:C=US, O=VeriSign, Inc., OU=Class 1 Public Primary Certification Authority
    Subject:C=US, O=VeriSign, Inc., OU=Class 1 Public Primary Certification Authority
    Not Valid Before:Sun Jan 28 18:00:00 CST 1996
    Not Valid After:Tue Jan 07 17:59:59 CST 2020
    Signature Algorithm:MD2withRSA
    >

    <000000> Issuer:C=ZA, ST=Western Cape, L=Cape Town, O=Thawte Consulting cc, OU=Certification Services Division, CN=Thawte Premium Serv
    er CA, EMAIL=premium-server@thawte.com
    Subject:C=ZA, ST=Western Cape, L=Cape Town, O=Thawte Consulting cc, OU=Certification Services Division, CN=Thawte Premium Ser
    ver CA, EMAIL=premium-server@thawte.com
    Not Valid Before:Wed Jul 31 19:00:00 CDT 1996
    Not Valid After:Thu Dec 31 17:59:59 CST 2020
    Signature Algorithm:MD5withRSA
    >

    <000000> Issuer:C=US, O=VeriSign, Inc., OU=Class 2 Public Primary Certification Authority
    Subject:C=US, O=VeriSign, Inc., OU=Class 2 Public Primary Certification Authority
    Not Valid Before:Sun Jan 28 18:00:00 CST 1996
    Not Valid After:Wed Jan 07 17:59:59 CST 2004
    Signature Algorithm:MD2withRSA
    >

    <000000> Issuer:C=US, ST=California, L=San Francisco, O=BEA WebLogic, OU=Security, CN=Demo Certificate Authority Constraints, EMAIL=su
    pport@bea.com
    Subject:C=US, ST=California, L=San Francisco, O=BEA WebLogic, OU=Security, CN=Demo Certificate Authority Constraints, EMAIL=s
    upport@bea.com
    Not Valid Before:Fri Nov 01 14:02:22 CST 2002
    Not Valid After:Mon Oct 16 15:02:22 CDT 2006
    Signature Algorithm:MD5withRSA
    >

    <000000>
    <000000>
    <000000>
    <000000>
    <000000>
    <000000>
    [BaseWLSSLAdapter] : SSLAdapter verbose output enabled
    [BaseWLSSLAdapter] : Strict cert checking disabled by default
    [BaseWLSSLAdapter] : BasicContraints enforcement is disabled
    [BaseWLSSLAdapter] : Disabling strict checking on adapter weblogic.webservice.client.WLSSLAdapter@ee6fa
    <000000>
    [BaseWLSSLAdapter] : Set TrustManager to weblogic.webservice.client.BaseWLSSLAdapter$NullTr ustManager@5e4874
    [WLSSLAdapter] : Set HostnameVerifier to weblogic.webservice.client.WLSSLAdapter$NullVerifi er@458a40
    <000000>
    [BaseWLSSLAdapter] : Got new socketfactory javax.net.ssl.impl.SSLSocketFactoryImpl@22eec5
    [WLSSLAdapter] : openConnection(https://grid.slacker.com/archimedes/adastatus.cgi) returning weblogic.webservice.client.https
    HttpsURLConnection:https://grid.slacker.com/archimedes/adastatus.cgi
    [WLSSLAdapter] : -- using HostnameVerifier weblogic.webservice.client.WLSSLAdapter$NullVerifi er@458a40
    [WLSSLAdapter] : -- did not receive trusted cert file
    connecting..weblogic.webservice.client.https.Https URLConnection:https://grid.slacker.com/archimedes/adastatus.cgi
    <000000>
    <000000>
    <000000>
    <000000>
    <000000>
    <000000>
    <000000>
    <000000>
    <000000> <6003895 readRecord()>
    <000000> <6003895 received HANDSHAKE>
    <000000>
    <000000>
    <000000>
    <000000>
    <000000> <6003895 readRecord()>
    <000000> <6003895 received HANDSHAKE>
    <000000>
    <000000> : 42
    java.lang.Throwable: Stack trace
    at weblogic.security.utils.SSLSetup.debug(SSLSetup.ja va:245)
    at com.certicom.tls.record.alert.Alert.(Unknown Source)
    at com.certicom.tls.record.handshake.HandshakeHandler .fireAlert(Unknown Source)
    at com.certicom.tls.record.handshake.ClientStateRecei vedServerHello.handle(Unknown Source)
    at com.certicom.tls.record.handshake.HandshakeHandler .handleHandshakeMessage(Unknown Source)
    at com.certicom.tls.record.handshake.HandshakeHandler .handleHandshakeMessages(Unknown Source)
    at com.certicom.tls.record.ReadHandler.interpretConte nt(Unknown Source)
    at com.certicom.tls.record.ReadHandler.readRecord(Unk nown Source)
    at com.certicom.tls.record.ReadHandler.readUntilHands hakeComplete(Unknown Source)
    at com.certicom.tls.interfaceimpl.TLSConnectionImpl.c ompleteHandshake(Unknown Source)
    at com.certicom.tls.record.WriteHandler.write(Unknown Source)
    at com.certicom.net.ssl.HttpsClient.doHandshake(Unkno wn Source)
    at com.certicom.net.ssl.internal.HttpURLConnection.ge tInputStream(Unknown Source)
    at weblogic.webservice.client.https.HttpsURLConnectio n.getInputStream(HttpsURLConnection.java:216)
    at jsp_servlet._results.__test._jspService(Test.jsp:7 8)
    at weblogic.servlet.jsp.JspBase.service(JspBase.java: 27)
    at weblogic.servlet.internal.ServletStubImpl$ServletI nvocationAction.run(ServletStubImpl.java:1058)
    at weblogic.servlet.internal.ServletStubImpl.invokeSe rvlet(ServletStubImpl.java:401)
    at weblogic.servlet.internal.ServletStubImpl.invokeSe rvlet(ServletStubImpl.java:445)
    at weblogic.servlet.internal.ServletStubImpl.invokeSe rvlet(ServletStubImpl.java:306)
    at weblogic.servlet.internal.WebAppServletContext$Ser vletInvocationAction.run(WebAppServletContext.java :5445)
    at weblogic.security.service.SecurityServiceManager.r unAs(SecurityServiceManager.java:780)
    at weblogic.servlet.internal.WebAppServletContext.inv okeServlet(WebAppServletContext.java:3105)
    at weblogic.servlet.internal.ServletRequestImpl.execu te(ServletRequestImpl.java:2588)
    at weblogic.kernel.ExecuteThread.execute(ExecuteThrea d.java:213)
    at weblogic.kernel.ExecuteThread.run(ExecuteThread.ja va:189)
    >

    <000000>
    <000000>
    <000000> javax.net.ssl.SSLKeyException: FATAL Alert:BAD_CERTIFICATE - A corrupt or unuseable certificate was received.
    at com.certicom.tls.interfaceimpl.TLSConnectionImpl.f ireException(Unknown Source)
    at com.certicom.tls.interfaceimpl.TLSConnectionImpl.f ireAlertSent(Unknown Source)
    at com.certicom.tls.record.handshake.HandshakeHandler .fireAlert(Unknown Source)
    at com.certicom.tls.record.handshake.HandshakeHandler .fireAlert(Unknown Source)
    at com.certicom.tls.record.handshake.ClientStateRecei vedServerHello.handle(Unknown Source)
    at com.certicom.tls.record.handshake.HandshakeHandler .handleHandshakeMessage(Unknown Source)
    at com.certicom.tls.record.handshake.HandshakeHandler .handleHandshakeMessages(Unknown Source)
    at com.certicom.tls.record.ReadHandler.interpretConte nt(Unknown Source)
    at com.certicom.tls.record.ReadHandler.readRecord(Unk nown Source)
    at com.certicom.tls.record.ReadHandler.readUntilHands hakeComplete(Unknown Source)
    at com.certicom.tls.interfaceimpl.TLSConnectionImpl.c ompleteHandshake(Unknown Source)
    at com.certicom.tls.record.WriteHandler.write(Unknown Source)
    at com.certicom.net.ssl.HttpsClient.doHandshake(Unkno wn Source)
    at com.certicom.net.ssl.internal.HttpURLConnection.ge tInputStream(Unknown Source)
    at weblogic.webservice.client.https.HttpsURLConnectio n.getInputStream(HttpsURLConnection.java:216)
    at jsp_servlet._results.__test._jspService(Test.jsp:7 8)
    at weblogic.servlet.jsp.JspBase.service(JspBase.java: 27)
    at weblogic.servlet.internal.ServletStubImpl$ServletI nvocationAction.run(ServletStubImpl.java:1058)
    at weblogic.servlet.internal.ServletStubImpl.invokeSe rvlet(ServletStubImpl.java:401)
    at weblogic.servlet.internal.ServletStubImpl.invokeSe rvlet(ServletStubImpl.java:445)
    at weblogic.servlet.internal.ServletStubImpl.invokeSe rvlet(ServletStubImpl.java:306)
    at weblogic.servlet.internal.WebAppServletContext$Ser vletInvocationAction.run(WebAppServletContext.java :5445)
    at weblogic.security.service.SecurityServiceManager.r unAs(SecurityServiceManager.java:780)
    at weblogic.servlet.internal.WebAppServletContext.inv okeServlet(WebAppServletContext.java:3105)
    at weblogic.servlet.internal.ServletRequestImpl.execu te(ServletRequestImpl.java:2588)
    at weblogic.kernel.ExecuteThread.execute(ExecuteThrea d.java:213)
    at weblogic.kernel.ExecuteThread.run(ExecuteThread.ja va:189)
    >

    <000000> : 40
    java.lang.Throwable: Stack trace
    at weblogic.security.utils.SSLSetup.debug(SSLSetup.ja va:245)
    at com.certicom.tls.record.alert.Alert.(Unknown Source)
    at com.certicom.tls.record.handshake.HandshakeHandler .fireAlert(Unknown Source)
    at com.certicom.tls.record.handshake.HandshakeHandler .handleHandshakeMessage(Unknown Source)
    at com.certicom.tls.record.handshake.HandshakeHandler .handleHandshakeMessages(Unknown Source)
    at com.certicom.tls.record.ReadHandler.interpretConte nt(Unknown Source)
    at com.certicom.tls.record.ReadHandler.readRecord(Unk nown Source)
    at com.certicom.tls.record.ReadHandler.readUntilHands hakeComplete(Unknown Source)
    at com.certicom.tls.interfaceimpl.TLSConnectionImpl.c ompleteHandshake(Unknown Source)
    at com.certicom.tls.record.WriteHandler.write(Unknown Source)
    at com.certicom.net.ssl.HttpsClient.doHandshake(Unkno wn Source)
    at com.certicom.net.ssl.internal.HttpURLConnection.ge tInputStream(Unknown Source)
    at weblogic.webservice.client.https.HttpsURLConnectio n.getInputStream(HttpsURLConnection.java:216)
    at jsp_servlet._results.__test._jspService(Test.jsp:7 8)
    at weblogic.servlet.jsp.JspBase.service(JspBase.java: 27)
    at weblogic.servlet.internal.ServletStubImpl$ServletI nvocationAction.run(ServletStubImpl.java:1058)
    at weblogic.servlet.internal.ServletStubImpl.invokeSe rvlet(ServletStubImpl.java:401)
    at weblogic.servlet.internal.ServletStubImpl.invokeSe rvlet(ServletStubImpl.java:445)
    at weblogic.servlet.internal.ServletStubImpl.invokeSe rvlet(ServletStubImpl.java:306)
    at weblogic.servlet.internal.WebAppServletContext$Ser vletInvocationAction.run(WebAppServletContext.java :5445)
    at weblogic.security.service.SecurityServiceManager.r unAs(SecurityServiceManager.java:780)
    at weblogic.servlet.internal.WebAppServletContext.inv okeServlet(WebAppServletContext.java:3105)
    at weblogic.servlet.internal.ServletRequestImpl.execu te(ServletRequestImpl.java:2588)
    at weblogic.kernel.ExecuteThread.execute(ExecuteThrea d.java:213)
    at weblogic.kernel.ExecuteThread.run(ExecuteThread.ja va:189)
    >

    <000000>
    java.io.IOException: Write Channel Closed, possible SSL handshaking or trust failure
    at com.certicom.tls.record.WriteHandler.write(Unknown Source)
    at com.certicom.tls.interfaceimpl.TLSConnectionImpl.f ireAlertSent(Unknown Source)
    at com.certicom.tls.record.handshake.HandshakeHandler .fireAlert(Unknown Source)
    at com.certicom.tls.record.handshake.HandshakeHandler .fireAlert(Unknown Source)
    at com.certicom.tls.record.handshake.HandshakeHandler .handleHandshakeMessage(Unknown Source)
    at com.certicom.tls.record.handshake.HandshakeHandler .handleHandshakeMessages(Unknown Source)
    at com.certicom.tls.record.ReadHandler.interpretConte nt(Unknown Source)
    at com.certicom.tls.record.ReadHandler.readRecord(Unk nown Source)
    at com.certicom.tls.record.ReadHandler.readUntilHands hakeComplete(Unknown Source)
    at com.certicom.tls.interfaceimpl.TLSConnectionImpl.c ompleteHandshake(Unknown Source)
    at com.certicom.tls.record.WriteHandler.write(Unknown Source)
    at com.certicom.net.ssl.HttpsClient.doHandshake(Unkno wn Source)
    at com.certicom.net.ssl.internal.HttpURLConnection.ge tInputStream(Unknown Source)
    at weblogic.webservice.client.https.HttpsURLConnectio n.getInputStream(HttpsURLConnection.java:216)
    at jsp_servlet._results.__test._jspService(Test.jsp:7 8)
    at weblogic.servlet.jsp.JspBase.service(JspBase.java: 27)
    at weblogic.servlet.internal.ServletStubImpl$ServletI nvocationAction.run(ServletStubImpl.java:1058)
    at weblogic.servlet.internal.ServletStubImpl.invokeSe rvlet(ServletStubImpl.java:401)
    at weblogic.servlet.internal.ServletStubImpl.invokeSe rvlet(ServletStubImpl.java:445)
    at weblogic.servlet.internal.ServletStubImpl.invokeSe rvlet(ServletStubImpl.java:306)
    at weblogic.servlet.internal.WebAppServletContext$Ser vletInvocationAction.run(WebAppServletContext.java :5445)
    at weblogic.security.service.SecurityServiceManager.r unAs(SecurityServiceManager.java:780)
    at weblogic.servlet.internal.WebAppServletContext.inv okeServlet(WebAppServletContext.java:3105)
    at weblogic.servlet.internal.ServletRequestImpl.execu te(ServletRequestImpl.java:2588)
    at weblogic.kernel.ExecuteThread.execute(ExecuteThrea d.java:213)
    at weblogic.kernel.ExecuteThread.run(ExecuteThread.ja va:189)

    -----------------CODE------------------

    <%@ page import="java.io.*"%>
    <%@ page import="java.net.*"%>
    <%@ page import="weblogic.security.SSL.*"%>
    <%@ page import="javax.net.ssl.*"%>
    <%@ page import="javax.security.cert.X509Certificate"%>
    <%@ page import="weblogic.security.utils.SSLSetup"%>
    <%@ page import="weblogic.webservice.client.*"%>
    <%@ page import="java.security.*"%>

    <%@ page import="org.diabetes.phd.services.NulledHostnameVerifier"%>


    <% HttpURLConnection http = null;

    String data = "543";
    String host="grid.slacker.com";
    String query = "/archimedes/adastatus.cgi";
    System.out.println("connecting..");

    try{

    java.util.Properties p = System.getProperties();
    String s = p.getProperty("java.protocol.handler.pkgs");
    if (s == null) {
    s = "weblogic.net";
    } else if (s.indexOf("weblogic.net") == -1) {
    s += "|weblogic.net";
    }
    p.put("java.protocol.handler.pkgs", s);
    System.setProperties(p);

    StringBuffer outstr = new StringBuffer();
    outstr.append(" JDK Protocol Handlers and Security Providers:\n");
    outstr.append(" java.protocol.handler.pkgs - ");
    outstr.append(System.getProperties().getProperty("java.protocol.handler.pkgs"));
    outstr.append("\n");
    Provider[] provs = java.security.Security.getProviders();
    for (int i=0; i outstr.append(" provider[" + i + "] - " + provs[i].getName() +
    " - " + provs[i].getInfo() + "\n");
    outstr.append("\n");
    System.out.println("connecting outstr.." + outstr.toString());
    //Security.addProvider(new com.sun.net.ssl.internal.ssl.Provider());

    URL wlsUrl = new URL("https", host, query);
    weblogic.net.http.HttpsURLConnection connection =
    new weblogic.net.http.HttpsURLConnection(wlsUrl);

    HostnameVerifierJSSE hVerifier = new NulledHostnameVerifier();

    connection.setHostnameVerifierJSSE(hVerifier);
    connection.connect();
    //SSLAdapter adapter = SSLAdapterFactory.getDefaultFactory().getSSLAdapte r();
    SSLAdapterFactory factory = SSLAdapterFactory.getDefaultFactory();
    WLSSLAdapter adapter = (WLSSLAdapter) factory.getSSLAdapter();

    // InputStream in = adapter.openConnection(wlsUrl).getInputStream();

    /* System.out.println("connecting wlsUrl.." + wlsUrl);
    String responseStr = "\t\t" +
    connection.getResponseCode() + " -- " +
    connection.getResponseMessage() + "\n\t\t" +
    connection.getContent().getClass().getName() + "\n";
    System.out.println("connecting responseStr.." + responseStr); */

    http = (HttpURLConnection)adapter.openConnection(wlsUrl);
    http.setRequestMethod("POST");
    http.setDoOutput(true);
    http.setUseCaches( false );
    http.setDoInput( true );
    System.out.println("connecting.." + http);
    String content = "job_id="+URLEncoder.encode(data)+
    "&OK="+URLEncoder.encode("Submit");
    DataOutputStream osw = new DataOutputStream (http.getOutputStream());
    osw.writeBytes(content);
    osw.flush();
    osw.close();
    InputStream input = http.getInputStream();
    int bytesReady = input.available();
    System.out.println("ready:"+ bytesReady);

    }
    catch(Exception eX)
    {
    eX.printStackTrace();
    }



    %>


    -------------------END---------------

  4. Re: Error CERT_CHAIN_INCOMPLETE CERT_CHAIN_UNTRUSTED

    I've assumed you were running on 8.1 The property for setting trusted CA keystore in 7.0 is
    -Dweblogic.security.SSL.trustedCAkeystore=
    Or, in case of an SSL client running on server, you do not need to set this, since it will use the server trust configuration by default. This applies to the URL api you use. See http://e-docs.bea.com/wls/docs70/secmanage/ssl.html for more info about configuring the server.

    In case of webservices API the property is:
    -Dweblogic.webservice.client.ssl.trustedcertfile=
    Or you can configure trust programmatically with adapter.setTrustedCertifcatesFile() method. See http://e-docs.bea.com/wls/docs70/webserv/security.html for more info.

    Whichever api you use make sure the client trusted certificates contain a CA certificate that issued the server identity certificate.

    Pavel.

  5. Re: Error CERT_CHAIN_INCOMPLETE CERT_CHAIN_UNTRUSTED

    Thanks a lot. That really helped.

+ Reply to Thread