Warning: file_get_contents(/data/phpspider/zhask/data//catemap/9/java/315.json): failed to open stream: No such file or directory in /data/phpspider/zhask/libs/function.php on line 167

Warning: Invalid argument supplied for foreach() in /data/phpspider/zhask/libs/tag.function.php on line 1116

Notice: Undefined index: in /data/phpspider/zhask/libs/function.php on line 180

Warning: array_chunk() expects parameter 1 to be array, null given in /data/phpspider/zhask/libs/function.php on line 181
Java SSLHandshakeException:收到致命警报:握手失败跟进_Java_Ssl_Cxf - Fatal编程技术网

Java SSLHandshakeException:收到致命警报:握手失败跟进

Java SSLHandshakeException:收到致命警报:握手失败跟进,java,ssl,cxf,Java,Ssl,Cxf,以下是这些答案的后续内容: 在我的示例中,所有的可能性都是可以的,但我仍然得到握手错误: 我有密钥库: keyStore is : /home/tibi/Desktop/kdebnav/pki/DigiK-keesdeboekhoudercert.p12 keyStore type is : pkcs12 keyStore provider is : 我有信托商店: trustStore is: /tmp/jssecacerts trustStore type is : jks trus

以下是这些答案的后续内容:

在我的示例中,所有的可能性都是可以的,但我仍然得到握手错误:

我有密钥库:

keyStore is : /home/tibi/Desktop/kdebnav/pki/DigiK-keesdeboekhoudercert.p12
keyStore type is : pkcs12
keyStore provider is : 
我有信托商店:

trustStore is: /tmp/jssecacerts
trustStore type is : jks
trustStore provider is : 
init truststore
adding as trusted cert:
  Subject: CN=SwissSign Platinum CA - G2, O=SwissSign AG, C=CH
  Issuer:  CN=SwissSign Platinum CA - G2, O=SwissSign AG, C=CH
  Algorithm: RSA; Serial number: 0x4eb200670c035d4f
  Valid from Wed Oct 25 10:36:00 CEST 2006 until Sat Oct 25 10:36:00 CEST 2036

adding as trusted cert:
  Subject: EMAILADDRESS=info@valicert.com, CN=http://www.valicert.com/, OU=ValiCert Class 1 Policy Validation Authority, O="ValiCert, Inc.", L=ValiCert Validation Network
  Issuer:  EMAILADDRESS=info@valicert.com, CN=http://www.valicert.com/, OU=ValiCert Class 1 Policy Validation Authority, O="ValiCert, Inc.", L=ValiCert Validation Network
  Algorithm: RSA; Serial number: 0x1
  Valid from Sat Jun 26 00:23:48 CEST 1999 until Wed Jun 26 00:23:48 CEST 2019
客户您好:

*** ClientHello, TLSv1
RandomCookie:  GMT: 1375350579 bytes = { 158, 54, 71, 67, 110, 43, 27, 91, 239, 94, 125, 7, 57, 87, 239, 42, 229, 28, 231, 131, 77, 134, 191, 23, 136, 77, 178, 184 }
Session ID:  {}
Cipher Suites: [TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, TLS_ECDHE_ECDSA_WITH_RC4_128_SHA, TLS_ECDHE_RSA_WITH_RC4_128_SHA, SSL_RSA_WITH_RC4_128_SHA, TLS_ECDH_ECDSA_WITH_RC4_128_SHA, TLS_ECDH_RSA_WITH_RC4_128_SHA, TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_RC4_128_MD5, TLS_EMPTY_RENEGOTIATION_INFO_SCSV, SSL_RSA_WITH_DES_CBC_SHA, SSL_DHE_RSA_WITH_DES_CBC_SHA, SSL_DHE_DSS_WITH_DES_CBC_SHA, SSL_RSA_EXPORT_WITH_RC4_40_MD5, SSL_RSA_EXPORT_WITH_DES40_CBC_SHA, SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA, SSL_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA, TLS_KRB5_WITH_RC4_128_SHA, TLS_KRB5_WITH_RC4_128_MD5, TLS_KRB5_WITH_3DES_EDE_CBC_SHA, TLS_KRB5_WITH_3DES_EDE_CBC_MD5, TLS_KRB5_WITH_DES_CBC_SHA, TLS_KRB5_WITH_DES_CBC_MD5, TLS_KRB5_EXPORT_WITH_RC4_40_SHA, TLS_KRB5_EXPORT_WITH_RC4_40_MD5, TLS_KRB5_EXPORT_WITH_DES_CBC_40_SHA, TLS_KRB5_EXPORT_WITH_DES_CBC_40_MD5]
Compression Methods:  { 0 }
Extension elliptic_curves, curve names: {secp256r1, sect163k1, sect163r2, secp192r1, secp224r1, sect233k1, sect233r1, sect283k1, sect283r1, secp384r1, sect409k1, sect409r1, secp521r1, sect571k1, sect571r1, secp160k1, secp160r1, secp160r2, sect163r1, secp192k1, sect193r1, sect193r2, secp224k1, sect239k1, secp256k1}
Extension ec_point_formats, formats: [uncompressed]
Extension server_name, server_name: [host_name: preprod.procesinfrastructuur.nl]
***
服务器helllo:

*** ServerHello, TLSv1
RandomCookie:  GMT: 1375350579 bytes = { 74, 45, 118, 102, 8, 188, 62, 178, 165, 60, 109, 211, 180, 218, 61, 151, 149, 180, 241, 248, 193, 55, 206, 2, 176, 164, 102, 2 }
Session ID:  {91, 14, 36, 17, 25, 98, 4, 166, 25, 189, 88, 198, 140, 42, 21, 28, 155, 28, 54, 229, 138, 182, 118, 251, 243, 155, 202, 174, 31, 88, 32, 100}
Cipher Suite: TLS_RSA_WITH_AES_128_CBC_SHA
Compression Method: 0
Extension renegotiation_info, renegotiated_connection: <empty>
***
和找到的受信任证书:

***
Found trusted certificate:
[
[
  Version: V3
  Subject: CN=preprod.procesinfrastructuur.nl, SERIALNUMBER=00000004003214345001, OU=Servicemanagement, O=Logius, C=NL
  Signature Algorithm: SHA256withRSA, OID = 1.2.840.113549.1.1.11

  Key:  Sun RSA public key, 2048 bits
  modulus: 18249182214419149210
但仍然是错误。。。。 以下是出错的起点:

*** Finished
verify_data:  { 59, 116, 38, 62, 216, 102, 26, 110, 22, 125, 51, 1 }
***
[write] MD5 and SHA1 hashes:  len = 16
0000: 14 00 00 0C 3B 74 26 3E   D8 66 1A 6E 16 7D 33 01  ....;t&>.f.n..3.
Padded plaintext before ENCRYPTION:  len = 48
0000: 14 00 00 0C 3B 74 26 3E   D8 66 1A 6E 16 7D 33 01  ....;t&>.f.n..3.
0010: 8A 2A 7E 60 F1 86 96 DE   EA 49 27 77 62 02 1D 94  .*.`.....I'wb...
0020: C5 7C C3 99 0B 0B 0B 0B   0B 0B 0B 0B 0B 0B 0B 0B  ................
main, WRITE: TLSv1 Handshake, length = 48
[Raw write]: length = 53
0000: 16 03 01 00 30 DF 9C 60   94 78 FB C9 E4 B7 F9 91  ....0..`.x......
0010: 22 C0 FB 52 A9 0D 69 AB   A5 9E F7 E0 9F DA AF 1F  "..R..i.........
0020: B8 D7 22 D7 29 20 12 9C   EF 23 16 41 D9 80 B8 F7  ..".) ...#.A....
0030: DA 78 BB E7 E9                                     .x...
[Raw read]: length = 5
0000: 15 03 01 00 02                                     .....
[Raw read]: length = 2
0000: 02 28                                              .(
main, READ: TLSv1 Alert, length = 2
main, RECV TLSv1 ALERT:  fatal, handshake_failure

该服务似乎具有错误的wsdl。在提供了改进的wsdl之后,我可以继续


所以请注意wsdl是好的

日志文件中有太多不相关的信息。将其简化为要点,并张贴在此处。编辑成你的问题。谢谢你的建议。我将尝试javax.net的不同选项。这个问题解决了吗?
*** Finished
verify_data:  { 59, 116, 38, 62, 216, 102, 26, 110, 22, 125, 51, 1 }
***
[write] MD5 and SHA1 hashes:  len = 16
0000: 14 00 00 0C 3B 74 26 3E   D8 66 1A 6E 16 7D 33 01  ....;t&>.f.n..3.
Padded plaintext before ENCRYPTION:  len = 48
0000: 14 00 00 0C 3B 74 26 3E   D8 66 1A 6E 16 7D 33 01  ....;t&>.f.n..3.
0010: 8A 2A 7E 60 F1 86 96 DE   EA 49 27 77 62 02 1D 94  .*.`.....I'wb...
0020: C5 7C C3 99 0B 0B 0B 0B   0B 0B 0B 0B 0B 0B 0B 0B  ................
main, WRITE: TLSv1 Handshake, length = 48
[Raw write]: length = 53
0000: 16 03 01 00 30 DF 9C 60   94 78 FB C9 E4 B7 F9 91  ....0..`.x......
0010: 22 C0 FB 52 A9 0D 69 AB   A5 9E F7 E0 9F DA AF 1F  "..R..i.........
0020: B8 D7 22 D7 29 20 12 9C   EF 23 16 41 D9 80 B8 F7  ..".) ...#.A....
0030: DA 78 BB E7 E9                                     .x...
[Raw read]: length = 5
0000: 15 03 01 00 02                                     .....
[Raw read]: length = 2
0000: 02 28                                              .(
main, READ: TLSv1 Alert, length = 2
main, RECV TLSv1 ALERT:  fatal, handshake_failure