Above was the client side log.
The corresponding server side log is as following :
setSoTimeout(60000) called
http-6443-Processor25, READ: SSL v2, contentType = Handshake, translated length = 73
*** ClientHello, TLSv1
RandomCookie: GMT: 1191450323 bytes = { 71, 127, 240, 101, 169, 166, 14, 86, 141, 228, 109, 14, 252, 241, 144, 132, 54, 2, 212, 41, 110, 35, 132, 225, 58, 232, 221, 43 }
Session ID: {}
Cipher Suites: [SSL_RSA_WITH_RC4_128_MD5, SSL_RSA_WITH_RC4_128_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_DES_CBC_SHA, SSL_DHE_RSA_WITH_DES_CBC_SHA, SSL_DHE_DSS_WITH_DES_CBC_SHA, SSL_RSA_EXPORT_WITH_RC4_40_MD5, SSL_RSA_EXPORT_WITH_DES40_CBC_SHA, SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA, SSL_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA]
Compression Methods: { 0 }
***
%% Created: [Session-1, TLS_DHE_DSS_WITH_AES_128_CBC_SHA]
*** ServerHello, TLSv1
RandomCookie: GMT: 1191450323 bytes = { 128, 206, 235, 242, 102, 121, 83, 162, 2, 231, 198, 217, 155, 24, 197, 59, 195, 12, 200, 203, 49, 114, 195, 58, 20, 30, 133, 11 }
Session ID: {71, 4, 23, 211, 90, 188, 137, 195, 199, 39, 190, 121, 175, 242, 215, 86, 244, 153, 5, 178, 92, 55, 96, 73, 146, 23, 62, 1, 249, 6, 110, 192}
Cipher Suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA
Compression Method: 0
***
Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA
*** Certificate chain
chain [0] = [
[
Version: V1
Subject: CN=Sukrit Khera, OU=Reliant, O=Reliant, L=Houston, ST=Texas, C=TX
Signature Algorithm: SHA1withDSA, OID = 1.2.840.10040.4.3
Key: Sun DSA Public Key
Parameters

SA
p: fd7f5381 1d751229 52df4a9c 2eece4e7 f611b752 3cef4400 c31e3f80 b6512669
455d4022 51fb593d 8d58fabf c5f5ba30 f6cb9b55 6cd7813b 801d346f f26660b7
6b9950a5 a49f9fe8 047b1022 c24fbba9 d7feb7c6 1bf83b57 e7c6a8a6 150f04fb
83f6d3c5 1ec30235 54135a16 9132f675 f3ae2b61 d72aeff2 2203199d d14801c7
q: 9760508f 15230bcc b292b982 a2eb840b f0581cf5
g: f7e1a085 d69b3dde cbbcab5c 36b857b9 7994afbb fa3aea82 f9574c0b 3d078267
5159578e bad4594f e6710710 8180b449 167123e8 4c281613 b7cf0932 8cc8a6e1
3c167a8b 547c8d28 e0a3ae1e 2bb3a675 916ea37f 0bfa2135 62f1fb62 7a01243b
cca4f1be a8519089 a883dfe1 5ae59f06 928b665e 807b5525 64014c3b fecf492a
y:
46c0cfec 389eb664 f6ea9733 9487ef63 bc40c6af 9fbdebe5 7f8e6b37 7171837f
608071ad 201467ca e2ef249d ba3f95ce 80d850de 5eb70503 60f62dac 1f4f3bce
4505d8b0 66fd51bd f242cc53 56ef3015 d06bf6b4 56ce86c6 9f921e23 60469253
4d91eed7 70df96c8 ed8facdb 7db6507d 95d6c5be 91b33a55 204c475e a013a343
Validity: [From: Thu Aug 23 11:26:37 CDT 2007,
To: Wed Nov 21 10:26:37 CST 2007]
Issuer: CN=Sukrit Khera, OU=Reliant, O=Reliant, L=Houston, ST=Texas, C=TX
SerialNumber: [ 46cdb53d]
]
Algorithm: [SHA1withDSA]
Signature:
0000: 30 2C 02 14 5B D5 20 1F 95 B7 15 40 AF D8 E3 F1 0,..[. ....@....
0010: 81 19 9F C2 11 68 4F E4 02 14 4A DC A5 69 AD AF .....hO...J..i..
0020: 8C 7D 54 F9 E6 B8 CF 6E 9C 9E B1 4A C8 1E ..T....n...J..
]
***
*** Diffie-Hellman ServerKeyExchange
DH Modulus: { 244, 136, 253, 88, 78, 73, 219, 205, 32, 180, 157, 228, 145, 7, 54, 107, 51, 108, 56, 13, 69, 29, 15, 124, 136, 179, 28, 124, 91, 45, 142, 246, 243, 201, 35, 192, 67, 240, 165, 91, 24, 141, 142, 187, 85, 140, 184, 93, 56, 211, 52, 253, 124, 23, 87, 67, 163, 29, 24, 108, 222, 51, 33, 44, 181, 42, 255, 60, 225, 177, 41, 64, 24, 17, 141, 124, 132, 167, 10, 114, 214, 134, 196, 3, 25, 200, 7, 41, 122, 202, 149, 12, 217, 150, 159, 171, 208, 10, 80, 155, 2, 70, 211, 8, 61, 102, 164, 93, 65, 159, 156, 124, 189, 137, 75, 34, 25, 38, 186, 171, 162, 94, 195, 85, 233, 47, 120, 199 }
DH Base: { 2 }
Server DH Public Key: { 148, 227, 193, 161, 215, 62, 253, 183, 33, 191, 12, 168, 47, 222, 126, 39, 144, 208, 218, 64, 108, 210, 50, 197, 143, 166, 46, 254, 10, 106, 197, 188, 107, 241, 238, 77, 172, 24, 210, 132, 15, 50, 33, 136, 95, 234, 232, 104, 105, 166, 132, 116, 174, 111, 135, 30, 107, 212, 121, 125, 15, 118, 144, 25, 252, 12, 226, 200, 161, 230, 88, 20, 97, 170, 87, 30, 97, 43, 32, 66, 222, 225, 86, 196, 83, 10, 176, 122, 168, 119, 151, 221, 247, 136, 117, 216, 246, 56, 182, 99, 114, 138, 176, 234, 231, 142, 10, 197, 230, 2, 156, 210, 110, 145, 203, 126, 218, 11, 27, 99, 5, 18, 66, 124, 126, 53, 166, 180 }
Signed with a DSA or RSA public key
*** ServerHelloDone
http-6443-Processor25, WRITE: TLSv1 Handshake, length = 1183
http-6443-Processor25, READ: TLSv1 Handshake, length = 134
*** ClientDiffieHellmanPublic
DH Public key: { 89, 116, 138, 150, 47, 252, 170, 129, 129, 91, 58, 16, 73, 239, 106, 28, 143, 230, 108, 97, 69, 3, 96, 51, 225, 119, 169, 150, 148, 139, 81, 193, 52, 77, 41, 1, 183, 236, 180, 7, 4, 187, 116, 15, 185, 222, 170, 164, 109, 143, 66, 167, 0, 240, 84, 233, 69, 236, 116, 66, 237, 229, 66, 37, 112, 228, 208, 156, 13, 42, 140, 195, 44, 13, 94, 201, 227, 178, 183, 210, 198, 10, 206, 216, 73, 53, 69, 234, 122, 148, 16, 112, 215, 191, 134, 164, 79, 223, 75, 186, 140, 54, 49, 165, 41, 132, 219, 45, 83, 167, 39, 49, 222, 255, 251, 198, 5, 229, 31, 210, 209, 51, 69, 180, 194, 21, 109, 190 }
SESSION KEYGEN:
PreMaster Secret:
0000: D2 63 2B 7C 9B 82 AE 27 7E 19 DF 18 5F D6 86 2D .c+....'...._..-
0010: 95 00 9C F8 99 19 5C 1C 02 3B CD 07 1E 89 3C 7D ......\..;....<.
0020: 83 79 C4 F3 BF 07 42 B6 5D 01 5C AD BB 44 62 AC .y....B.].\..Db.
0030: BF 41 05 98 A6 50 11 C1 4A FF 1F E2 D9 4F AC 98 .A...P..J....O..
0040: D3 C2 DD 77 36 FB BE DC 88 69 1C 30 F8 A5 E7 A5 ...w6....i.0....
0050: 03 F1 EB E5 03 A6 F5 C0 C7 DB 0D F0 D8 BD D9 77 ...............w
0060: 73 CF EC 38 F4 34 58 75 39 C8 78 00 7A AF 64 20 s..8.4Xu9.x.z.d
0070: A1 65 AA 63 77 E0 3D 75 7F 77 6F 94 32 23 3F 4D .e.cw.=u.wo.2#?M
CONNECTION KEYGEN:
Client Nonce:
0000: 47 04 17 D3 47 7F F0 65 A9 A6 0E 56 8D E4 6D 0E G...G..e...V..m.
0010: FC F1 90 84 36 02 D4 29 6E 23 84 E1 3A E8 DD 2B ....6..)n#..:..+
Server Nonce:
0000: 47 04 17 D3 80 CE EB F2 66 79 53 A2 02 E7 C6 D9 G.......fyS.....
0010: 9B 18 C5 3B C3 0C C8 CB 31 72 C3 3A 14 1E 85 0B ...;....1r.:....
Master Secret:
0000: A0 A4 73 3C 68 3E 64 E5 D4 74 A6 15 D8 C5 BB 64 ..s<h>d..t.....d
0010: 07 11 75 B6 27 7D 17 76 82 D2 A5 4C 5E E5 3F 28 ..u.'..v...L^.?(
0020: 3D 12 14 30 8E 36 22 68 E0 F5 7F BD 91 02 31 E6 =..0.6"h......1.
Client MAC write Secret:
0000: 3E 05 26 99 29 5C 31 34 78 80 03 BF 96 3C 1F C1 >.&.)\14x....<..
0010: 56 42 28 31 VB(1
Server MAC write Secret:
0000: C3 E0 9F 5D 3E F4 6C 6D A8 6A B9 B2 A3 54 ED 41 ...]>.lm.j...T.A
0010: 26 C2 E1 DF &...
Client write key:
0000: 56 0B 04 DF 9F 79 93 D3 01 BD E0 94 11 37 C4 FE V....y.......7..
Server write key:
0000: 3F 96 05 FC D8 84 78 BC 39 5C 8E 73 4A B3 73 C1 ?.....x.9\.sJ.s.
Client write IV:
0000: 47 F2 B4 75 2D 3A 69 4E 1A 43 4E 62 E3 94 65 06 G..u-:iN.CNb..e.
Server write IV:
0000: ED 5E BA 40 FC 08 14 2A 22 3C 6A CC 32 9E CB C7 .^.@...*"<j.2...
http-6443-Processor25, READ: TLSv1 Change Cipher Spec, length = 1
JsseJce: Using cipher AES/CBC/NoPadding from provider SunJCE
http-6443-Processor25, READ: TLSv1 Handshake, length = 48
*** Finished
verify_data: { 104, 11, 250, 194, 119, 123, 23, 123, 109, 172, 208, 228 }
***
http-6443-Processor25, WRITE: TLSv1 Change Cipher Spec, length = 1
JsseJce: Using cipher AES/CBC/NoPadding from provider SunJCE
*** Finished
verify_data: { 96, 52, 182, 53, 85, 69, 72, 12, 162, 156, 186, 33 }
***
http-6443-Processor25, WRITE: TLSv1 Handshake, length = 48
%% Cached server session: [Session-1, TLS_DHE_DSS_WITH_AES_128_CBC_SHA]
http-6443-Processor25, READ: TLSv1 Application Data, length = 752
%% Invalidated: [Session-1, TLS_DHE_DSS_WITH_AES_128_CBC_SHA]
setSoTimeout(1000) called
*** HelloRequest (empty)
http-6443-Processor25, WRITE: TLSv1 Handshake, length = 32
http-6443-Processor25, READ: TLSv1 Handshake, length = 128
*** ClientHello, TLSv1
RandomCookie: GMT: 1191450324 bytes = { 17, 105, 239, 11, 244, 163, 76, 201, 2, 150, 218, 226, 124, 80, 136, 172, 37, 156, 133, 234, 51, 159, 177, 212, 134, 17, 221, 90 }
Session ID: {71, 4, 23, 211, 90, 188, 137, 195, 199, 39, 190, 121, 175, 242, 215, 86, 244, 153, 5, 178, 92, 55, 96, 73, 146, 23, 62, 1, 249, 6, 110, 192}
Cipher Suites: [SSL_RSA_WITH_RC4_128_MD5, SSL_RSA_WITH_RC4_128_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_DES_CBC_SHA, SSL_DHE_RSA_WITH_DES_CBC_SHA, SSL_DHE_DSS_WITH_DES_CBC_SHA, SSL_RSA_EXPORT_WITH_RC4_40_MD5, SSL_RSA_EXPORT_WITH_DES40_CBC_SHA, SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA, SSL_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA]
Compression Methods: { 0 }
***
%% Created: [Session-2, TLS_DHE_DSS_WITH_AES_128_CBC_SHA]
*** ServerHello, TLSv1
RandomCookie: GMT: 1191450324 bytes = { 164, 24, 106, 45, 233, 112, 201, 145, 153, 62, 125, 34, 207, 118, 189, 228, 214, 134, 104, 240, 157, 52, 201, 17, 186, 8, 248, 95 }
Session ID: {71, 4, 23, 212, 190, 125, 104, 107, 29, 139, 31, 89, 15, 89, 1, 255, 250, 247, 69, 184, 203, 217, 131, 24, 53, 68, 216, 99, 62, 52, 21, 100}
Cipher Suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA
Compression Method: 0
***
Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA
*** Certificate chain
chain [0] = [
[
Version: V1
Subject: CN=Sukrit Khera, OU=Reliant, O=Reliant, L=Houston, ST=Texas, C=TX
Signature Algorithm: SHA1withDSA, OID = 1.2.840.10040.4.3
Key: Sun DSA Public Key
Parameters

SA
p: fd7f5381 1d751229 52df4a9c 2eece4e7 f611b752 3cef4400 c31e3f80 b6512669
455d4022 51fb593d 8d58fabf c5f5ba30 f6cb9b55 6cd7813b 801d346f f26660b7
6b9950a5 a49f9fe8 047b1022 c24fbba9 d7feb7c6 1bf83b57 e7c6a8a6 150f04fb
83f6d3c5 1ec30235 54135a16 9132f675 f3ae2b61 d72aeff2 2203199d d14801c7
q: 9760508f 15230bcc b292b982 a2eb840b f0581cf5
g: f7e1a085 d69b3dde cbbcab5c 36b857b9 7994afbb fa3aea82 f9574c0b 3d078267
5159578e bad4594f e6710710 8180b449 167123e8 4c281613 b7cf0932 8cc8a6e1
3c167a8b 547c8d28 e0a3ae1e 2bb3a675 916ea37f 0bfa2135 62f1fb62 7a01243b
cca4f1be a8519089 a883dfe1 5ae59f06 928b665e 807b5525 64014c3b fecf492a
y:
46c0cfec 389eb664 f6ea9733 9487ef63 bc40c6af 9fbdebe5 7f8e6b37 7171837f
608071ad 201467ca e2ef249d ba3f95ce 80d850de 5eb70503 60f62dac 1f4f3bce
4505d8b0 66fd51bd f242cc53 56ef3015 d06bf6b4 56ce86c6 9f921e23 60469253
4d91eed7 70df96c8 ed8facdb 7db6507d 95d6c5be 91b33a55 204c475e a013a343
Validity: [From: Thu Aug 23 11:26:37 CDT 2007,
To: Wed Nov 21 10:26:37 CST 2007]
Issuer: CN=Sukrit Khera, OU=Reliant, O=Reliant, L=Houston, ST=Texas, C=TX
SerialNumber: [ 46cdb53d]
]
Algorithm: [SHA1withDSA]
Signature:
0000: 30 2C 02 14 5B D5 20 1F 95 B7 15 40 AF D8 E3 F1 0,..[. ....@....
0010: 81 19 9F C2 11 68 4F E4 02 14 4A DC A5 69 AD AF .....hO...J..i..
0020: 8C 7D 54 F9 E6 B8 CF 6E 9C 9E B1 4A C8 1E ..T....n...J..
]
***
*** Diffie-Hellman ServerKeyExchange
DH Modulus: { 244, 136, 253, 88, 78, 73, 219, 205, 32, 180, 157, 228, 145, 7, 54, 107, 51, 108, 56, 13, 69, 29, 15, 124, 136, 179, 28, 124, 91, 45, 142, 246, 243, 201, 35, 192, 67, 240, 165, 91, 24, 141, 142, 187, 85, 140, 184, 93, 56, 211, 52, 253, 124, 23, 87, 67, 163, 29, 24, 108, 222, 51, 33, 44, 181, 42, 255, 60, 225, 177, 41, 64, 24, 17, 141, 124, 132, 167, 10, 114, 214, 134, 196, 3, 25, 200, 7, 41, 122, 202, 149, 12, 217, 150, 159, 171, 208, 10, 80, 155, 2, 70, 211, 8, 61, 102, 164, 93, 65, 159, 156, 124, 189, 137, 75, 34, 25, 38, 186, 171, 162, 94, 195, 85, 233, 47, 120, 199 }
DH Base: { 2 }
Server DH Public Key: { 206, 190, 197, 13, 130, 18, 225, 244, 0, 115, 167, 70, 205, 10, 14, 3, 239, 157, 144, 22, 188, 39, 255, 156, 189, 120, 28, 199, 159, 201, 229, 214, 185, 142, 117, 137, 65, 164, 52, 182, 217, 98, 186, 247, 11, 197, 142, 137, 186, 3, 208, 118, 160, 31, 10, 114, 154, 82, 107, 193, 165, 40, 235, 132, 199, 42, 121, 104, 184, 241, 191, 35, 160, 87, 224, 179, 102, 210, 169, 28, 176, 128, 77, 188, 180, 150, 213, 165, 247, 87, 156, 187, 87, 32, 147, 19, 164, 13, 38, 68, 233, 78, 174, 143, 70, 13, 82, 93, 162, 148, 91, 64, 243, 28, 56, 150, 92, 61, 207, 200, 147, 45, 39, 94, 198, 182, 221, 5 }
Signed with a DSA or RSA public key
*** CertificateRequest
Cert Types: RSA, DSS,
Cert Authorities:
<CN=Sukrit Khera, OU=Reliant, O=Reliant, L=Houston, ST=Texas, C=TX>
<CN=xidsslcert, OU=IT, O=Reliant Energy, L=Houston, ST=Texas, C=US>
<CN=xidsslcert, OU=IT, O=Reliant Energy, L=Houston, ST=Texas, C=US>
<CN=sanjay, OU=reli, O=relia, L=houston, ST=texas, C=77>
<CN=localhost>
*** ServerHelloDone
http-6443-Processor25, WRITE: TLSv1 Handshake, length = 1680
http-6443-Processor25, READ: TLSv1 Alert, length = 32
http-6443-Processor25, RECV TLSv1 ALERT: warning, close_notify
http-6443-Processor25, called closeInternal(false)
http-6443-Processor25, SEND TLSv1 ALERT: warning, description = close_notify
http-6443-Processor25, WRITE: TLSv1 Alert, length = 32
Exception sending alert: java.net.SocketException: Broken pipe
setSoTimeout(60000) called
Oct 3, 2007 5:29:41 PM org.apache.coyote.http11.Http11Processor action
WARNING: Exception getting SSL Cert
java.net.SocketException: Socket Closed
at java.net.PlainSocketImpl.setOption(PlainSocketImpl.java:177)
at java.net.Socket.setSoTimeout(Socket.java:924)
at com.sun.net.ssl.internal.ssl.SSLSocketImpl.setSoTimeout(DashoA12275)
at org.apache.tomcat.util.net.jsse.JSSE14Support.synchronousHandshake(JSSE14Support.java:99)
at org.apache.tomcat.util.net.jsse.JSSE14Support.handShake(JSSE14Support.java:67)
at org.apache.tomcat.util.net.jsse.JSSESupport.getPeerCertificateChain(JSSESupport.java:120)
at org.apache.coyote.http11.Http11Processor.action(Http11Processor.java:1049)
at org.apache.coyote.Request.action(Request.java:365)
at org.apache.coyote.tomcat5.CoyoteRequest.getAttribute(CoyoteRequest.java:929)
at org.apache.coyote.tomcat5.CoyoteRequestFacade.getAttribute(CoyoteRequestFacade.java:214)
at org.apache.catalina.authenticator.SSLAuthenticator.authenticate(SSLAuthenticator.java:137)
at org.apache.catalina.authenticator.AuthenticatorBase.invoke(AuthenticatorBase.java:504)
at org.apache.catalina.core.StandardValveContext.invokeNext(StandardValveContext.java:102)
at org.apache.catalina.core.StandardPipeline.invoke(StandardPipeline.java:520)
at org.apache.catalina.core.StandardHostValve.invoke(StandardHostValve.java:137)
at org.apache.catalina.core.StandardValveContext.invokeNext(StandardValveContext.java:104)
at org.apache.catalina.valves.ErrorReportValve.invoke(ErrorReportValve.java:118)
at org.apache.catalina.core.StandardValveContext.invokeNext(StandardValveContext.java:102)
at org.apache.catalina.core.StandardPipeline.invoke(StandardPipeline.java:520)
at org.apache.catalina.core.StandardEngineValve.invoke(StandardEngineValve.java:109)
at org.apache.catalina.core.StandardValveContext.invokeNext(StandardValveContext.java:104)
at org.apache.catalina.core.StandardPipeline.invoke(StandardPipeline.java:520)
at org.apache.catalina.core.ContainerBase.invoke(ContainerBase.java:929)
at org.apache.coyote.tomcat5.CoyoteAdapter.service(CoyoteAdapter.java:160)
at org.apache.coyote.http11.Http11Processor.process(Http11Processor.java:799)
at org.apache.coyote.http11.Http11Protocol$Http11ConnectionHandler.processConnection(Http11Protocol.java:705)
at org.apache.tomcat.util.net.TcpWorkerThread.runIt(PoolTcpEndpoint.java:577)
at org.apache.tomcat.util.threads.ThreadPool$ControlRunnable.run(ThreadPool.java:683)
at java.lang.Thread.run(Thread.java:534)
http-6443-Processor25, called close()
http-6443-Processor25, called closeInternal(true)