• Post Reply Bookmark Topic Watch Topic
  • New Topic
programming forums Java Mobile Certification Databases Caching Books Engineering Micro Controllers OS Languages Paradigms IDEs Build Tools Frameworks Application Servers Open Source This Site Careers Other Pie Elite all forums
this forum made possible by our volunteer staff, including ...
Marshals:
  • Campbell Ritchie
  • Tim Cooke
  • Ron McLeod
  • paul wheaton
  • Jeanne Boyarsky
Sheriffs:
  • Paul Clapham
  • Devaka Cooray
Saloon Keepers:
  • Tim Holloway
  • Roland Mueller
  • Himai Minh
Bartenders:

WARNING: Exception getting SSL Cert java.net.SocketException: Socket Closed

 
Greenhorn
Posts: 8
  • Mark post as helpful
  • send pies
    Number of slices to send:
    Optional 'thank-you' note:
  • Quote
  • Report post to moderator
I have a standalone java class having main method. Actually, it is a webservice client. (it calls webservice). The webservice uses 2 way ssl authentication. So I generated the certificat inside local jre & also improted the certificate which i got from the server. On the server side, i imported the certificate which the client generated. But why calling that webservice I got following excpetion......


keyStore is : C:\certs\localstore.jks
keyStore type is : jks
init keystore
init keymanager of type SunX509
***
found key for : standalone
chain [0] = [
[
Version: V1
Subject: CN=sanjay, OU=reli, O=relia, L=houston, ST=texas, C=77
Signature Algorithm: MD5withRSA, OID = 1.2.840.113549.1.1.4

Key: SunJSSE RSA public key:
public exponent:
010001
modulus:
9dfba044 f7b92216 7c0550d9 fed3d17e 451ca808 62454a95 f666d169 80434d64
33588983 598c00e6 682155e0 28ce990a 7c76b497 672761d4 8f64b1ca d3bdd19b
ca4c3f27 4024a921 e1d628f3 62f0c0ae 860aee61 3185f03a 6e3e559a d8fac905
73ee5670 cb48f0ab def0674a ad2c81f1 d7a12104 9ef6d72b e39fb737 62ec20ad
Validity: [From: Wed Oct 03 16:31:29 CDT 2007,
To: Tue Jan 01 15:31:29 CST 2008]
Issuer: CN=sanjay, OU=reli, O=relia, L=houston, ST=texas, C=77
SerialNumber: [ 47040a31]

]
Algorithm: [MD5withRSA]
Signature:
0000: 16 38 03 57 78 9B AE B2 C8 20 5C D8 99 45 23 5A .8.Wx.... \..E#Z
0010: 43 C7 F2 13 1F AD 28 82 12 1D 7F 3D 6E BF 34 6A C.....(....=n.4j
0020: 2C 8B F9 83 7D 01 B6 A0 49 42 05 9F 4A 2D 2C D2 ,.......IB..J-,.
0030: 66 E3 19 3A F9 46 B6 E8 6F 08 E9 15 A9 8E 73 2D f..:.F..o.....s-
0040: 2B 53 16 EC 2A 86 B7 65 0A 7A 26 EA 5A E2 16 07 +S..*..e.z&.Z...
0050: 00 AC 4B 3B 2C 69 69 63 18 75 33 23 5B 04 3F 64 ..K;,iic.u3#[.?d
0060: 6D 7E EB F6 50 60 27 8C 92 8F A4 0A 35 10 EF FA m...P`'.....5...
0070: A0 D2 FD E9 42 E4 DA 5B BF 34 A7 7D 9E ED 1D 09 ....B..[.4......

]
***
trustStore is: C:\certs\server_secureChanged.jks
trustStore type is : jks
init truststore
adding as trusted cert:
Subject: CN=localhost
Issuer: CN=localhost
Algorithm: RSA; Serial number: 0x46fa6bd7
Valid from Wed Sep 26 09:25:27 CDT 2007 until Tue Dec 25 08:25:27 CST 2007

adding as trusted cert:
Subject: CN=Sukrit Khera, OU=Reliant, O=Reliant, L=Houston, ST=Texas, C=TX
Issuer: CN=Sukrit Khera, OU=Reliant, O=Reliant, L=Houston, ST=Texas, C=TX
Algorithm: DSA; Serial number: 0x46cdb53d
Valid from Thu Aug 23 11:26:37 CDT 2007 until Wed Nov 21 10:26:37 CST 2007

adding as trusted cert:
Subject: CN=xidsslcert, OU=IT, O=Reliant Energy, L=Houston, ST=Texas, C=US
Issuer: CN=xidsslcert, OU=IT, O=Reliant Energy, L=Houston, ST=Texas, C=US
Algorithm: RSA; Serial number: 0x252a698e
Valid from Tue Oct 02 13:30:00 CDT 2007 until Fri Oct 02 13:30:00 CDT 2009

adding as trusted cert:
Subject: CN=localhost
Issuer: CN=localhost
Algorithm: RSA; Serial number: 0x360b2372
Valid from Thu Oct 02 02:25:00 CDT 2003 until Sun Oct 02 02:25:00 CDT 2005

init context
trigger seeding of SecureRandom
done seeding SecureRandom
%% No cached client session
*** ClientHello, TLSv1
RandomCookie: GMT: 1191450323 bytes = { 71, 127, 240, 101, 169, 166, 14, 86, 141, 228, 109, 14, 252, 241, 144, 132, 54, 2, 212, 41, 110, 35, 132, 225, 58, 232, 221, 43 }
Session ID: {}
Cipher Suites: [SSL_RSA_WITH_RC4_128_MD5, SSL_RSA_WITH_RC4_128_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_DES_CBC_SHA, SSL_DHE_RSA_WITH_DES_CBC_SHA, SSL_DHE_DSS_WITH_DES_CBC_SHA, SSL_RSA_EXPORT_WITH_RC4_40_MD5, SSL_RSA_EXPORT_WITH_DES40_CBC_SHA, SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA, SSL_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA]
Compression Methods: { 0 }
***
main, WRITE: TLSv1 Handshake, length = 73
main, WRITE: SSLv2 client hello message, length = 98
main, READ: TLSv1 Handshake, length = 1183
*** ServerHello, TLSv1
RandomCookie: GMT: 1191450323 bytes = { 128, 206, 235, 242, 102, 121, 83, 162, 2, 231, 198, 217, 155, 24, 197, 59, 195, 12, 200, 203, 49, 114, 195, 58, 20, 30, 133, 11 }
Session ID: {71, 4, 23, 211, 90, 188, 137, 195, 199, 39, 190, 121, 175, 242, 215, 86, 244, 153, 5, 178, 92, 55, 96, 73, 146, 23, 62, 1, 249, 6, 110, 192}
Cipher Suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA
Compression Method: 0
***
%% Created: [Session-1, TLS_DHE_DSS_WITH_AES_128_CBC_SHA]
** TLS_DHE_DSS_WITH_AES_128_CBC_SHA
*** Certificate chain
chain [0] = [
[
Version: V1
Subject: CN=Sukrit Khera, OU=Reliant, O=Reliant, L=Houston, ST=Texas, C=TX
Signature Algorithm: SHA1withDSA, OID = 1.2.840.10040.4.3

Key: Sun DSA Public Key
Parameters SA
p: fd7f5381 1d751229 52df4a9c 2eece4e7 f611b752 3cef4400 c31e3f80 b6512669
455d4022 51fb593d 8d58fabf c5f5ba30 f6cb9b55 6cd7813b 801d346f f26660b7
6b9950a5 a49f9fe8 047b1022 c24fbba9 d7feb7c6 1bf83b57 e7c6a8a6 150f04fb
83f6d3c5 1ec30235 54135a16 9132f675 f3ae2b61 d72aeff2 2203199d d14801c7
q: 9760508f 15230bcc b292b982 a2eb840b f0581cf5
g: f7e1a085 d69b3dde cbbcab5c 36b857b9 7994afbb fa3aea82 f9574c0b 3d078267
5159578e bad4594f e6710710 8180b449 167123e8 4c281613 b7cf0932 8cc8a6e1
3c167a8b 547c8d28 e0a3ae1e 2bb3a675 916ea37f 0bfa2135 62f1fb62 7a01243b
cca4f1be a8519089 a883dfe1 5ae59f06 928b665e 807b5525 64014c3b fecf492a

y:
46c0cfec 389eb664 f6ea9733 9487ef63 bc40c6af 9fbdebe5 7f8e6b37 7171837f
608071ad 201467ca e2ef249d ba3f95ce 80d850de 5eb70503 60f62dac 1f4f3bce
4505d8b0 66fd51bd f242cc53 56ef3015 d06bf6b4 56ce86c6 9f921e23 60469253
4d91eed7 70df96c8 ed8facdb 7db6507d 95d6c5be 91b33a55 204c475e a013a343

Validity: [From: Thu Aug 23 11:26:37 CDT 2007,
To: Wed Nov 21 10:26:37 CST 2007]
Issuer: CN=Sukrit Khera, OU=Reliant, O=Reliant, L=Houston, ST=Texas, C=TX
SerialNumber: [ 46cdb53d]

]
Algorithm: [SHA1withDSA]
Signature:
0000: 30 2C 02 14 5B D5 20 1F 95 B7 15 40 AF D8 E3 F1 0,..[. ....@....
0010: 81 19 9F C2 11 68 4F E4 02 14 4A DC A5 69 AD AF .....hO...J..i..
0020: 8C 7D 54 F9 E6 B8 CF 6E 9C 9E B1 4A C8 1E ..T....n...J..

]
***
Found trusted certificate:
[
[
Version: V1
Subject: CN=Sukrit Khera, OU=Reliant, O=Reliant, L=Houston, ST=Texas, C=TX
Signature Algorithm: SHA1withDSA, OID = 1.2.840.10040.4.3

Key: Sun DSA Public Key
Parameters SA
p: fd7f5381 1d751229 52df4a9c 2eece4e7 f611b752 3cef4400 c31e3f80 b6512669
455d4022 51fb593d 8d58fabf c5f5ba30 f6cb9b55 6cd7813b 801d346f f26660b7
6b9950a5 a49f9fe8 047b1022 c24fbba9 d7feb7c6 1bf83b57 e7c6a8a6 150f04fb
83f6d3c5 1ec30235 54135a16 9132f675 f3ae2b61 d72aeff2 2203199d d14801c7
q: 9760508f 15230bcc b292b982 a2eb840b f0581cf5
g: f7e1a085 d69b3dde cbbcab5c 36b857b9 7994afbb fa3aea82 f9574c0b 3d078267
5159578e bad4594f e6710710 8180b449 167123e8 4c281613 b7cf0932 8cc8a6e1
3c167a8b 547c8d28 e0a3ae1e 2bb3a675 916ea37f 0bfa2135 62f1fb62 7a01243b
cca4f1be a8519089 a883dfe1 5ae59f06 928b665e 807b5525 64014c3b fecf492a

y:
46c0cfec 389eb664 f6ea9733 9487ef63 bc40c6af 9fbdebe5 7f8e6b37 7171837f
608071ad 201467ca e2ef249d ba3f95ce 80d850de 5eb70503 60f62dac 1f4f3bce
4505d8b0 66fd51bd f242cc53 56ef3015 d06bf6b4 56ce86c6 9f921e23 60469253
4d91eed7 70df96c8 ed8facdb 7db6507d 95d6c5be 91b33a55 204c475e a013a343

Validity: [From: Thu Aug 23 11:26:37 CDT 2007,
To: Wed Nov 21 10:26:37 CST 2007]
Issuer: CN=Sukrit Khera, OU=Reliant, O=Reliant, L=Houston, ST=Texas, C=TX
SerialNumber: [ 46cdb53d]

]
Algorithm: [SHA1withDSA]
Signature:
0000: 30 2C 02 14 5B D5 20 1F 95 B7 15 40 AF D8 E3 F1 0,..[. ....@....
0010: 81 19 9F C2 11 68 4F E4 02 14 4A DC A5 69 AD AF .....hO...J..i..
0020: 8C 7D 54 F9 E6 B8 CF 6E 9C 9E B1 4A C8 1E ..T....n...J..

]
*** Diffie-Hellman ServerKeyExchange
DH Modulus: { 244, 136, 253, 88, 78, 73, 219, 205, 32, 180, 157, 228, 145, 7, 54, 107, 51, 108, 56, 13, 69, 29, 15, 124, 136, 179, 28, 124, 91, 45, 142, 246, 243, 201, 35, 192, 67, 240, 165, 91, 24, 141, 142, 187, 85, 140, 184, 93, 56, 211, 52, 253, 124, 23, 87, 67, 163, 29, 24, 108, 222, 51, 33, 44, 181, 42, 255, 60, 225, 177, 41, 64, 24, 17, 141, 124, 132, 167, 10, 114, 214, 134, 196, 3, 25, 200, 7, 41, 122, 202, 149, 12, 217, 150, 159, 171, 208, 10, 80, 155, 2, 70, 211, 8, 61, 102, 164, 93, 65, 159, 156, 124, 189, 137, 75, 34, 25, 38, 186, 171, 162, 94, 195, 85, 233, 47, 120, 199 }
DH Base: { 2 }
Server DH Public Key: { 148, 227, 193, 161, 215, 62, 253, 183, 33, 191, 12, 168, 47, 222, 126, 39, 144, 208, 218, 64, 108, 210, 50, 197, 143, 166, 46, 254, 10, 106, 197, 188, 107, 241, 238, 77, 172, 24, 210, 132, 15, 50, 33, 136, 95, 234, 232, 104, 105, 166, 132, 116, 174, 111, 135, 30, 107, 212, 121, 125, 15, 118, 144, 25, 252, 12, 226, 200, 161, 230, 88, 20, 97, 170, 87, 30, 97, 43, 32, 66, 222, 225, 86, 196, 83, 10, 176, 122, 168, 119, 151, 221, 247, 136, 117, 216, 246, 56, 182, 99, 114, 138, 176, 234, 231, 142, 10, 197, 230, 2, 156, 210, 110, 145, 203, 126, 218, 11, 27, 99, 5, 18, 66, 124, 126, 53, 166, 180 }
Anonymous
*** ServerHelloDone
*** ClientDiffieHellmanPublic
DH Public key: { 89, 116, 138, 150, 47, 252, 170, 129, 129, 91, 58, 16, 73, 239, 106, 28, 143, 230, 108, 97, 69, 3, 96, 51, 225, 119, 169, 150, 148, 139, 81, 193, 52, 77, 41, 1, 183, 236, 180, 7, 4, 187, 116, 15, 185, 222, 170, 164, 109, 143, 66, 167, 0, 240, 84, 233, 69, 236, 116, 66, 237, 229, 66, 37, 112, 228, 208, 156, 13, 42, 140, 195, 44, 13, 94, 201, 227, 178, 183, 210, 198, 10, 206, 216, 73, 53, 69, 234, 122, 148, 16, 112, 215, 191, 134, 164, 79, 223, 75, 186, 140, 54, 49, 165, 41, 132, 219, 45, 83, 167, 39, 49, 222, 255, 251, 198, 5, 229, 31, 210, 209, 51, 69, 180, 194, 21, 109, 190 }
main, WRITE: TLSv1 Handshake, length = 134
SESSION KEYGEN:
PreMaster Secret:
0000: D2 63 2B 7C 9B 82 AE 27 7E 19 DF 18 5F D6 86 2D .c+....'...._..-
0010: 95 00 9C F8 99 19 5C 1C 02 3B CD 07 1E 89 3C 7D ......\..;....<.
0020: 83 79 C4 F3 BF 07 42 B6 5D 01 5C AD BB 44 62 AC .y....B.].\..Db.
0030: BF 41 05 98 A6 50 11 C1 4A FF 1F E2 D9 4F AC 98 .A...P..J....O..
0040: D3 C2 DD 77 36 FB BE DC 88 69 1C 30 F8 A5 E7 A5 ...w6....i.0....
0050: 03 F1 EB E5 03 A6 F5 C0 C7 DB 0D F0 D8 BD D9 77 ...............w
0060: 73 CF EC 38 F4 34 58 75 39 C8 78 00 7A AF 64 20 s..8.4Xu9.x.z.d
0070: A1 65 AA 63 77 E0 3D 75 7F 77 6F 94 32 23 3F 4D .e.cw.=u.wo.2#?M
CONNECTION KEYGEN:
Client Nonce:
0000: 47 04 17 D3 47 7F F0 65 A9 A6 0E 56 8D E4 6D 0E G...G..e...V..m.
0010: FC F1 90 84 36 02 D4 29 6E 23 84 E1 3A E8 DD 2B ....6..)n#..:..+
Server Nonce:
0000: 47 04 17 D3 80 CE EB F2 66 79 53 A2 02 E7 C6 D9 G.......fyS.....
0010: 9B 18 C5 3B C3 0C C8 CB 31 72 C3 3A 14 1E 85 0B ...;....1r.:....
Master Secret:
0000: A0 A4 73 3C 68 3E 64 E5 D4 74 A6 15 D8 C5 BB 64 ..s<h>d..t.....d
0010: 07 11 75 B6 27 7D 17 76 82 D2 A5 4C 5E E5 3F 28 ..u.'..v...L^.?(
0020: 3D 12 14 30 8E 36 22 68 E0 F5 7F BD 91 02 31 E6 =..0.6"h......1.
Client MAC write Secret:
0000: 3E 05 26 99 29 5C 31 34 78 80 03 BF 96 3C 1F C1 >.&.)\14x....<..
0010: 56 42 28 31 VB(1
Server MAC write Secret:
0000: C3 E0 9F 5D 3E F4 6C 6D A8 6A B9 B2 A3 54 ED 41 ...]>.lm.j...T.A
0010: 26 C2 E1 DF &...
Client write key:
0000: 56 0B 04 DF 9F 79 93 D3 01 BD E0 94 11 37 C4 FE V....y.......7..
Server write key:
0000: 3F 96 05 FC D8 84 78 BC 39 5C 8E 73 4A B3 73 C1 ?.....x.9\.sJ.s.
Client write IV:
0000: 47 F2 B4 75 2D 3A 69 4E 1A 43 4E 62 E3 94 65 06 G..u-:iN.CNb..e.
Server write IV:
0000: ED 5E BA 40 FC 08 14 2A 22 3C 6A CC 32 9E CB C7 .^.@...*"<j.2...
main, WRITE: TLSv1 Change Cipher Spec, length = 1
JsseJce: Using cipher AES/CBC/NoPadding from provider SunJCE
*** Finished
verify_data: { 104, 11, 250, 194, 119, 123, 23, 123, 109, 172, 208, 228 }
***
main, WRITE: TLSv1 Handshake, length = 48
main, READ: TLSv1 Change Cipher Spec, length = 1
JsseJce: Using cipher AES/CBC/NoPadding from provider SunJCE
main, READ: TLSv1 Handshake, length = 48
*** Finished
verify_data: { 96, 52, 182, 53, 85, 69, 72, 12, 162, 156, 186, 33 }
***
%% Cached client session: [Session-1, TLS_DHE_DSS_WITH_AES_128_CBC_SHA]
setSoTimeout(150) called
main, WRITE: TLSv1 Application Data, length = 752
main, READ: TLSv1 Handshake, length = 32
*** HelloRequest (empty)
%% Client cached [Session-1, TLS_DHE_DSS_WITH_AES_128_CBC_SHA]
%% Try resuming [Session-1, TLS_DHE_DSS_WITH_AES_128_CBC_SHA] from port 3021
*** ClientHello, TLSv1
RandomCookie: GMT: 1191450324 bytes = { 17, 105, 239, 11, 244, 163, 76, 201, 2, 150, 218, 226, 124, 80, 136, 172, 37, 156, 133, 234, 51, 159, 177, 212, 134, 17, 221, 90 }
Session ID: {71, 4, 23, 211, 90, 188, 137, 195, 199, 39, 190, 121, 175, 242, 215, 86, 244, 153, 5, 178, 92, 55, 96, 73, 146, 23, 62, 1, 249, 6, 110, 192}
Cipher Suites: [SSL_RSA_WITH_RC4_128_MD5, SSL_RSA_WITH_RC4_128_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_DES_CBC_SHA, SSL_DHE_RSA_WITH_DES_CBC_SHA, SSL_DHE_DSS_WITH_DES_CBC_SHA, SSL_RSA_EXPORT_WITH_RC4_40_MD5, SSL_RSA_EXPORT_WITH_DES40_CBC_SHA, SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA, SSL_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA]
Compression Methods: { 0 }
***
main, WRITE: TLSv1 Handshake, length = 128
main, handling exception: java.net.SocketTimeoutException: Read timed out
main, called close()
main, called closeInternal(true)
main, SEND TLSv1 ALERT: warning, description = close_notify
main, WRITE: TLSv1 Alert, length = 32
AxisFault
faultCode: {http://schemas.xmlsoap.org/soap/envelope/}Server.userException
faultSubcode:
faultString: java.net.SocketTimeoutException: Read timed out
faultActor:
faultNode:
faultDetail:
{http://xml.apache.org/axis/}stackTrace:java.net.SocketTimeoutException: Read timed out
at java.net.SocketInputStream.socketRead0(Native Method)
at java.net.SocketInputStream.read(Unknown Source)
at com.sun.net.ssl.internal.ssl.InputRecord.a(Unknown Source)
at com.sun.net.ssl.internal.ssl.InputRecord.read(Unknown Source)
at com.sun.net.ssl.internal.ssl.SSLSocketImpl.a(Unknown Source)
at com.sun.net.ssl.internal.ssl.SSLSocketImpl.a(Unknown Source)
at com.sun.net.ssl.internal.ssl.AppInputStream.read(Unknown Source)
at java.io.BufferedInputStream.fill(Unknown Source)
at java.io.BufferedInputStream.read(Unknown Source)
at org.apache.axis.transport.http.HTTPSender.readHeadersFromSocket(HTTPSender.java:583)
at org.apache.axis.transport.http.HTTPSender.invoke(HTTPSender.java:143)
at org.apache.axis.strategies.InvocationStrategy.visit(InvocationStrategy.java:32)
at org.apache.axis.SimpleChain.doVisiting(SimpleChain.java:118)
at org.apache.axis.SimpleChain.invoke(SimpleChain.java:83)
at org.apache.axis.client.AxisClient.invoke(AxisClient.java:165)
at org.apache.axis.client.Call.invokeEngine(Call.java:2784)
at org.apache.axis.client.Call.invoke(Call.java:2767)
at org.apache.axis.client.Call.invoke(Call.java:2443)
at org.apache.axis.client.Call.invoke(Call.java:2366)
at org.apache.axis.client.Call.invoke(Call.java:1812)
at com.reliant.ws.BillFetchWSSoapBindingStub.fetchContent(BillFetchWSSoapBindingStub.java:111)
at com.reliant.ws.BillFetchClient.main(BillFetchClient.java:41)

{http://xml.apache.org/axis/}hostname:Main2354pc2

java.net.SocketTimeoutException: Read timed out
at org.apache.axis.AxisFault.makeFault(AxisFault.java:101)
at org.apache.axis.transport.http.HTTPSender.invoke(HTTPSender.java:154)
at org.apache.axis.strategies.InvocationStrategy.visit(InvocationStrategy.java:32)
at org.apache.axis.SimpleChain.doVisiting(SimpleChain.java:118)
at org.apache.axis.SimpleChain.invoke(SimpleChain.java:83)
at org.apache.axis.client.AxisClient.invoke(AxisClient.java:165)
at org.apache.axis.client.Call.invokeEngine(Call.java:2784)
at org.apache.axis.client.Call.invoke(Call.java:2767)
at org.apache.axis.client.Call.invoke(Call.java:2443)
at org.apache.axis.client.Call.invoke(Call.java:2366)
at org.apache.axis.client.Call.invoke(Call.java:1812)
at com.reliant.ws.BillFetchWSSoapBindingStub.fetchContent(BillFetchWSSoapBindingStub.java:111)
at com.reliant.ws.BillFetchClient.main(BillFetchClient.java:41)
Caused by: java.net.SocketTimeoutException: Read timed out
at java.net.SocketInputStream.socketRead0(Native Method)
at java.net.SocketInputStream.read(Unknown Source)
at com.sun.net.ssl.internal.ssl.InputRecord.a(Unknown Source)
at com.sun.net.ssl.internal.ssl.InputRecord.read(Unknown Source)
at com.sun.net.ssl.internal.ssl.SSLSocketImpl.a(Unknown Source)
at com.sun.net.ssl.internal.ssl.SSLSocketImpl.a(Unknown Source)
at com.sun.net.ssl.internal.ssl.AppInputStream.read(Unknown Source)
at java.io.BufferedInputStream.fill(Unknown Source)
at java.io.BufferedInputStream.read(Unknown Source)
at org.apache.axis.transport.http.HTTPSender.readHeadersFromSocket(HTTPSender.java:583)
at org.apache.axis.transport.http.HTTPSender.invoke(HTTPSender.java:143)
... 11 more
Exception in thread "main"


Thanks in Advance.
 
sanjay patel
Greenhorn
Posts: 8
  • Mark post as helpful
  • send pies
    Number of slices to send:
    Optional 'thank-you' note:
  • Quote
  • Report post to moderator
Above was the client side log.
The corresponding server side log is as following :

setSoTimeout(60000) called
http-6443-Processor25, READ: SSL v2, contentType = Handshake, translated length = 73
*** ClientHello, TLSv1
RandomCookie: GMT: 1191450323 bytes = { 71, 127, 240, 101, 169, 166, 14, 86, 141, 228, 109, 14, 252, 241, 144, 132, 54, 2, 212, 41, 110, 35, 132, 225, 58, 232, 221, 43 }
Session ID: {}
Cipher Suites: [SSL_RSA_WITH_RC4_128_MD5, SSL_RSA_WITH_RC4_128_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_DES_CBC_SHA, SSL_DHE_RSA_WITH_DES_CBC_SHA, SSL_DHE_DSS_WITH_DES_CBC_SHA, SSL_RSA_EXPORT_WITH_RC4_40_MD5, SSL_RSA_EXPORT_WITH_DES40_CBC_SHA, SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA, SSL_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA]
Compression Methods: { 0 }
***
%% Created: [Session-1, TLS_DHE_DSS_WITH_AES_128_CBC_SHA]
*** ServerHello, TLSv1
RandomCookie: GMT: 1191450323 bytes = { 128, 206, 235, 242, 102, 121, 83, 162, 2, 231, 198, 217, 155, 24, 197, 59, 195, 12, 200, 203, 49, 114, 195, 58, 20, 30, 133, 11 }
Session ID: {71, 4, 23, 211, 90, 188, 137, 195, 199, 39, 190, 121, 175, 242, 215, 86, 244, 153, 5, 178, 92, 55, 96, 73, 146, 23, 62, 1, 249, 6, 110, 192}
Cipher Suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA
Compression Method: 0
***
Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA
*** Certificate chain
chain [0] = [
[
Version: V1
Subject: CN=Sukrit Khera, OU=Reliant, O=Reliant, L=Houston, ST=Texas, C=TX
Signature Algorithm: SHA1withDSA, OID = 1.2.840.10040.4.3

Key: Sun DSA Public Key
Parameters SA
p: fd7f5381 1d751229 52df4a9c 2eece4e7 f611b752 3cef4400 c31e3f80 b6512669
455d4022 51fb593d 8d58fabf c5f5ba30 f6cb9b55 6cd7813b 801d346f f26660b7
6b9950a5 a49f9fe8 047b1022 c24fbba9 d7feb7c6 1bf83b57 e7c6a8a6 150f04fb
83f6d3c5 1ec30235 54135a16 9132f675 f3ae2b61 d72aeff2 2203199d d14801c7
q: 9760508f 15230bcc b292b982 a2eb840b f0581cf5
g: f7e1a085 d69b3dde cbbcab5c 36b857b9 7994afbb fa3aea82 f9574c0b 3d078267
5159578e bad4594f e6710710 8180b449 167123e8 4c281613 b7cf0932 8cc8a6e1
3c167a8b 547c8d28 e0a3ae1e 2bb3a675 916ea37f 0bfa2135 62f1fb62 7a01243b
cca4f1be a8519089 a883dfe1 5ae59f06 928b665e 807b5525 64014c3b fecf492a

y:
46c0cfec 389eb664 f6ea9733 9487ef63 bc40c6af 9fbdebe5 7f8e6b37 7171837f
608071ad 201467ca e2ef249d ba3f95ce 80d850de 5eb70503 60f62dac 1f4f3bce
4505d8b0 66fd51bd f242cc53 56ef3015 d06bf6b4 56ce86c6 9f921e23 60469253
4d91eed7 70df96c8 ed8facdb 7db6507d 95d6c5be 91b33a55 204c475e a013a343

Validity: [From: Thu Aug 23 11:26:37 CDT 2007,
To: Wed Nov 21 10:26:37 CST 2007]
Issuer: CN=Sukrit Khera, OU=Reliant, O=Reliant, L=Houston, ST=Texas, C=TX
SerialNumber: [ 46cdb53d]

]
Algorithm: [SHA1withDSA]
Signature:
0000: 30 2C 02 14 5B D5 20 1F 95 B7 15 40 AF D8 E3 F1 0,..[. ....@....
0010: 81 19 9F C2 11 68 4F E4 02 14 4A DC A5 69 AD AF .....hO...J..i..
0020: 8C 7D 54 F9 E6 B8 CF 6E 9C 9E B1 4A C8 1E ..T....n...J..

]
***
*** Diffie-Hellman ServerKeyExchange
DH Modulus: { 244, 136, 253, 88, 78, 73, 219, 205, 32, 180, 157, 228, 145, 7, 54, 107, 51, 108, 56, 13, 69, 29, 15, 124, 136, 179, 28, 124, 91, 45, 142, 246, 243, 201, 35, 192, 67, 240, 165, 91, 24, 141, 142, 187, 85, 140, 184, 93, 56, 211, 52, 253, 124, 23, 87, 67, 163, 29, 24, 108, 222, 51, 33, 44, 181, 42, 255, 60, 225, 177, 41, 64, 24, 17, 141, 124, 132, 167, 10, 114, 214, 134, 196, 3, 25, 200, 7, 41, 122, 202, 149, 12, 217, 150, 159, 171, 208, 10, 80, 155, 2, 70, 211, 8, 61, 102, 164, 93, 65, 159, 156, 124, 189, 137, 75, 34, 25, 38, 186, 171, 162, 94, 195, 85, 233, 47, 120, 199 }
DH Base: { 2 }
Server DH Public Key: { 148, 227, 193, 161, 215, 62, 253, 183, 33, 191, 12, 168, 47, 222, 126, 39, 144, 208, 218, 64, 108, 210, 50, 197, 143, 166, 46, 254, 10, 106, 197, 188, 107, 241, 238, 77, 172, 24, 210, 132, 15, 50, 33, 136, 95, 234, 232, 104, 105, 166, 132, 116, 174, 111, 135, 30, 107, 212, 121, 125, 15, 118, 144, 25, 252, 12, 226, 200, 161, 230, 88, 20, 97, 170, 87, 30, 97, 43, 32, 66, 222, 225, 86, 196, 83, 10, 176, 122, 168, 119, 151, 221, 247, 136, 117, 216, 246, 56, 182, 99, 114, 138, 176, 234, 231, 142, 10, 197, 230, 2, 156, 210, 110, 145, 203, 126, 218, 11, 27, 99, 5, 18, 66, 124, 126, 53, 166, 180 }
Signed with a DSA or RSA public key
*** ServerHelloDone
http-6443-Processor25, WRITE: TLSv1 Handshake, length = 1183
http-6443-Processor25, READ: TLSv1 Handshake, length = 134
*** ClientDiffieHellmanPublic
DH Public key: { 89, 116, 138, 150, 47, 252, 170, 129, 129, 91, 58, 16, 73, 239, 106, 28, 143, 230, 108, 97, 69, 3, 96, 51, 225, 119, 169, 150, 148, 139, 81, 193, 52, 77, 41, 1, 183, 236, 180, 7, 4, 187, 116, 15, 185, 222, 170, 164, 109, 143, 66, 167, 0, 240, 84, 233, 69, 236, 116, 66, 237, 229, 66, 37, 112, 228, 208, 156, 13, 42, 140, 195, 44, 13, 94, 201, 227, 178, 183, 210, 198, 10, 206, 216, 73, 53, 69, 234, 122, 148, 16, 112, 215, 191, 134, 164, 79, 223, 75, 186, 140, 54, 49, 165, 41, 132, 219, 45, 83, 167, 39, 49, 222, 255, 251, 198, 5, 229, 31, 210, 209, 51, 69, 180, 194, 21, 109, 190 }
SESSION KEYGEN:
PreMaster Secret:
0000: D2 63 2B 7C 9B 82 AE 27 7E 19 DF 18 5F D6 86 2D .c+....'...._..-
0010: 95 00 9C F8 99 19 5C 1C 02 3B CD 07 1E 89 3C 7D ......\..;....<.
0020: 83 79 C4 F3 BF 07 42 B6 5D 01 5C AD BB 44 62 AC .y....B.].\..Db.
0030: BF 41 05 98 A6 50 11 C1 4A FF 1F E2 D9 4F AC 98 .A...P..J....O..
0040: D3 C2 DD 77 36 FB BE DC 88 69 1C 30 F8 A5 E7 A5 ...w6....i.0....
0050: 03 F1 EB E5 03 A6 F5 C0 C7 DB 0D F0 D8 BD D9 77 ...............w
0060: 73 CF EC 38 F4 34 58 75 39 C8 78 00 7A AF 64 20 s..8.4Xu9.x.z.d
0070: A1 65 AA 63 77 E0 3D 75 7F 77 6F 94 32 23 3F 4D .e.cw.=u.wo.2#?M
CONNECTION KEYGEN:
Client Nonce:
0000: 47 04 17 D3 47 7F F0 65 A9 A6 0E 56 8D E4 6D 0E G...G..e...V..m.
0010: FC F1 90 84 36 02 D4 29 6E 23 84 E1 3A E8 DD 2B ....6..)n#..:..+
Server Nonce:
0000: 47 04 17 D3 80 CE EB F2 66 79 53 A2 02 E7 C6 D9 G.......fyS.....
0010: 9B 18 C5 3B C3 0C C8 CB 31 72 C3 3A 14 1E 85 0B ...;....1r.:....
Master Secret:
0000: A0 A4 73 3C 68 3E 64 E5 D4 74 A6 15 D8 C5 BB 64 ..s<h>d..t.....d
0010: 07 11 75 B6 27 7D 17 76 82 D2 A5 4C 5E E5 3F 28 ..u.'..v...L^.?(
0020: 3D 12 14 30 8E 36 22 68 E0 F5 7F BD 91 02 31 E6 =..0.6"h......1.
Client MAC write Secret:
0000: 3E 05 26 99 29 5C 31 34 78 80 03 BF 96 3C 1F C1 >.&.)\14x....<..
0010: 56 42 28 31 VB(1
Server MAC write Secret:
0000: C3 E0 9F 5D 3E F4 6C 6D A8 6A B9 B2 A3 54 ED 41 ...]>.lm.j...T.A
0010: 26 C2 E1 DF &...
Client write key:
0000: 56 0B 04 DF 9F 79 93 D3 01 BD E0 94 11 37 C4 FE V....y.......7..
Server write key:
0000: 3F 96 05 FC D8 84 78 BC 39 5C 8E 73 4A B3 73 C1 ?.....x.9\.sJ.s.
Client write IV:
0000: 47 F2 B4 75 2D 3A 69 4E 1A 43 4E 62 E3 94 65 06 G..u-:iN.CNb..e.
Server write IV:
0000: ED 5E BA 40 FC 08 14 2A 22 3C 6A CC 32 9E CB C7 .^.@...*"<j.2...
http-6443-Processor25, READ: TLSv1 Change Cipher Spec, length = 1
JsseJce: Using cipher AES/CBC/NoPadding from provider SunJCE
http-6443-Processor25, READ: TLSv1 Handshake, length = 48
*** Finished
verify_data: { 104, 11, 250, 194, 119, 123, 23, 123, 109, 172, 208, 228 }
***
http-6443-Processor25, WRITE: TLSv1 Change Cipher Spec, length = 1
JsseJce: Using cipher AES/CBC/NoPadding from provider SunJCE
*** Finished
verify_data: { 96, 52, 182, 53, 85, 69, 72, 12, 162, 156, 186, 33 }
***
http-6443-Processor25, WRITE: TLSv1 Handshake, length = 48
%% Cached server session: [Session-1, TLS_DHE_DSS_WITH_AES_128_CBC_SHA]
http-6443-Processor25, READ: TLSv1 Application Data, length = 752
%% Invalidated: [Session-1, TLS_DHE_DSS_WITH_AES_128_CBC_SHA]
setSoTimeout(1000) called
*** HelloRequest (empty)
http-6443-Processor25, WRITE: TLSv1 Handshake, length = 32
http-6443-Processor25, READ: TLSv1 Handshake, length = 128
*** ClientHello, TLSv1
RandomCookie: GMT: 1191450324 bytes = { 17, 105, 239, 11, 244, 163, 76, 201, 2, 150, 218, 226, 124, 80, 136, 172, 37, 156, 133, 234, 51, 159, 177, 212, 134, 17, 221, 90 }
Session ID: {71, 4, 23, 211, 90, 188, 137, 195, 199, 39, 190, 121, 175, 242, 215, 86, 244, 153, 5, 178, 92, 55, 96, 73, 146, 23, 62, 1, 249, 6, 110, 192}
Cipher Suites: [SSL_RSA_WITH_RC4_128_MD5, SSL_RSA_WITH_RC4_128_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_DES_CBC_SHA, SSL_DHE_RSA_WITH_DES_CBC_SHA, SSL_DHE_DSS_WITH_DES_CBC_SHA, SSL_RSA_EXPORT_WITH_RC4_40_MD5, SSL_RSA_EXPORT_WITH_DES40_CBC_SHA, SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA, SSL_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA]
Compression Methods: { 0 }
***
%% Created: [Session-2, TLS_DHE_DSS_WITH_AES_128_CBC_SHA]
*** ServerHello, TLSv1
RandomCookie: GMT: 1191450324 bytes = { 164, 24, 106, 45, 233, 112, 201, 145, 153, 62, 125, 34, 207, 118, 189, 228, 214, 134, 104, 240, 157, 52, 201, 17, 186, 8, 248, 95 }
Session ID: {71, 4, 23, 212, 190, 125, 104, 107, 29, 139, 31, 89, 15, 89, 1, 255, 250, 247, 69, 184, 203, 217, 131, 24, 53, 68, 216, 99, 62, 52, 21, 100}
Cipher Suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA
Compression Method: 0
***
Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA
*** Certificate chain
chain [0] = [
[
Version: V1
Subject: CN=Sukrit Khera, OU=Reliant, O=Reliant, L=Houston, ST=Texas, C=TX
Signature Algorithm: SHA1withDSA, OID = 1.2.840.10040.4.3

Key: Sun DSA Public Key
Parameters SA
p: fd7f5381 1d751229 52df4a9c 2eece4e7 f611b752 3cef4400 c31e3f80 b6512669
455d4022 51fb593d 8d58fabf c5f5ba30 f6cb9b55 6cd7813b 801d346f f26660b7
6b9950a5 a49f9fe8 047b1022 c24fbba9 d7feb7c6 1bf83b57 e7c6a8a6 150f04fb
83f6d3c5 1ec30235 54135a16 9132f675 f3ae2b61 d72aeff2 2203199d d14801c7
q: 9760508f 15230bcc b292b982 a2eb840b f0581cf5
g: f7e1a085 d69b3dde cbbcab5c 36b857b9 7994afbb fa3aea82 f9574c0b 3d078267
5159578e bad4594f e6710710 8180b449 167123e8 4c281613 b7cf0932 8cc8a6e1
3c167a8b 547c8d28 e0a3ae1e 2bb3a675 916ea37f 0bfa2135 62f1fb62 7a01243b
cca4f1be a8519089 a883dfe1 5ae59f06 928b665e 807b5525 64014c3b fecf492a

y:
46c0cfec 389eb664 f6ea9733 9487ef63 bc40c6af 9fbdebe5 7f8e6b37 7171837f
608071ad 201467ca e2ef249d ba3f95ce 80d850de 5eb70503 60f62dac 1f4f3bce
4505d8b0 66fd51bd f242cc53 56ef3015 d06bf6b4 56ce86c6 9f921e23 60469253
4d91eed7 70df96c8 ed8facdb 7db6507d 95d6c5be 91b33a55 204c475e a013a343

Validity: [From: Thu Aug 23 11:26:37 CDT 2007,
To: Wed Nov 21 10:26:37 CST 2007]
Issuer: CN=Sukrit Khera, OU=Reliant, O=Reliant, L=Houston, ST=Texas, C=TX
SerialNumber: [ 46cdb53d]

]
Algorithm: [SHA1withDSA]
Signature:
0000: 30 2C 02 14 5B D5 20 1F 95 B7 15 40 AF D8 E3 F1 0,..[. ....@....
0010: 81 19 9F C2 11 68 4F E4 02 14 4A DC A5 69 AD AF .....hO...J..i..
0020: 8C 7D 54 F9 E6 B8 CF 6E 9C 9E B1 4A C8 1E ..T....n...J..

]
***
*** Diffie-Hellman ServerKeyExchange
DH Modulus: { 244, 136, 253, 88, 78, 73, 219, 205, 32, 180, 157, 228, 145, 7, 54, 107, 51, 108, 56, 13, 69, 29, 15, 124, 136, 179, 28, 124, 91, 45, 142, 246, 243, 201, 35, 192, 67, 240, 165, 91, 24, 141, 142, 187, 85, 140, 184, 93, 56, 211, 52, 253, 124, 23, 87, 67, 163, 29, 24, 108, 222, 51, 33, 44, 181, 42, 255, 60, 225, 177, 41, 64, 24, 17, 141, 124, 132, 167, 10, 114, 214, 134, 196, 3, 25, 200, 7, 41, 122, 202, 149, 12, 217, 150, 159, 171, 208, 10, 80, 155, 2, 70, 211, 8, 61, 102, 164, 93, 65, 159, 156, 124, 189, 137, 75, 34, 25, 38, 186, 171, 162, 94, 195, 85, 233, 47, 120, 199 }
DH Base: { 2 }
Server DH Public Key: { 206, 190, 197, 13, 130, 18, 225, 244, 0, 115, 167, 70, 205, 10, 14, 3, 239, 157, 144, 22, 188, 39, 255, 156, 189, 120, 28, 199, 159, 201, 229, 214, 185, 142, 117, 137, 65, 164, 52, 182, 217, 98, 186, 247, 11, 197, 142, 137, 186, 3, 208, 118, 160, 31, 10, 114, 154, 82, 107, 193, 165, 40, 235, 132, 199, 42, 121, 104, 184, 241, 191, 35, 160, 87, 224, 179, 102, 210, 169, 28, 176, 128, 77, 188, 180, 150, 213, 165, 247, 87, 156, 187, 87, 32, 147, 19, 164, 13, 38, 68, 233, 78, 174, 143, 70, 13, 82, 93, 162, 148, 91, 64, 243, 28, 56, 150, 92, 61, 207, 200, 147, 45, 39, 94, 198, 182, 221, 5 }
Signed with a DSA or RSA public key
*** CertificateRequest
Cert Types: RSA, DSS,
Cert Authorities:
<CN=Sukrit Khera, OU=Reliant, O=Reliant, L=Houston, ST=Texas, C=TX>
<CN=xidsslcert, OU=IT, O=Reliant Energy, L=Houston, ST=Texas, C=US>
<CN=xidsslcert, OU=IT, O=Reliant Energy, L=Houston, ST=Texas, C=US>
<CN=sanjay, OU=reli, O=relia, L=houston, ST=texas, C=77>
<CN=localhost>
*** ServerHelloDone
http-6443-Processor25, WRITE: TLSv1 Handshake, length = 1680
http-6443-Processor25, READ: TLSv1 Alert, length = 32
http-6443-Processor25, RECV TLSv1 ALERT: warning, close_notify
http-6443-Processor25, called closeInternal(false)
http-6443-Processor25, SEND TLSv1 ALERT: warning, description = close_notify
http-6443-Processor25, WRITE: TLSv1 Alert, length = 32
Exception sending alert: java.net.SocketException: Broken pipe
setSoTimeout(60000) called
Oct 3, 2007 5:29:41 PM org.apache.coyote.http11.Http11Processor action
WARNING: Exception getting SSL Cert
java.net.SocketException: Socket Closed
at java.net.PlainSocketImpl.setOption(PlainSocketImpl.java:177)
at java.net.Socket.setSoTimeout(Socket.java:924)
at com.sun.net.ssl.internal.ssl.SSLSocketImpl.setSoTimeout(DashoA12275)
at org.apache.tomcat.util.net.jsse.JSSE14Support.synchronousHandshake(JSSE14Support.java:99)
at org.apache.tomcat.util.net.jsse.JSSE14Support.handShake(JSSE14Support.java:67)
at org.apache.tomcat.util.net.jsse.JSSESupport.getPeerCertificateChain(JSSESupport.java:120)
at org.apache.coyote.http11.Http11Processor.action(Http11Processor.java:1049)
at org.apache.coyote.Request.action(Request.java:365)
at org.apache.coyote.tomcat5.CoyoteRequest.getAttribute(CoyoteRequest.java:929)
at org.apache.coyote.tomcat5.CoyoteRequestFacade.getAttribute(CoyoteRequestFacade.java:214)
at org.apache.catalina.authenticator.SSLAuthenticator.authenticate(SSLAuthenticator.java:137)
at org.apache.catalina.authenticator.AuthenticatorBase.invoke(AuthenticatorBase.java:504)
at org.apache.catalina.core.StandardValveContext.invokeNext(StandardValveContext.java:102)
at org.apache.catalina.core.StandardPipeline.invoke(StandardPipeline.java:520)
at org.apache.catalina.core.StandardHostValve.invoke(StandardHostValve.java:137)
at org.apache.catalina.core.StandardValveContext.invokeNext(StandardValveContext.java:104)
at org.apache.catalina.valves.ErrorReportValve.invoke(ErrorReportValve.java:118)
at org.apache.catalina.core.StandardValveContext.invokeNext(StandardValveContext.java:102)
at org.apache.catalina.core.StandardPipeline.invoke(StandardPipeline.java:520)
at org.apache.catalina.core.StandardEngineValve.invoke(StandardEngineValve.java:109)
at org.apache.catalina.core.StandardValveContext.invokeNext(StandardValveContext.java:104)
at org.apache.catalina.core.StandardPipeline.invoke(StandardPipeline.java:520)
at org.apache.catalina.core.ContainerBase.invoke(ContainerBase.java:929)
at org.apache.coyote.tomcat5.CoyoteAdapter.service(CoyoteAdapter.java:160)
at org.apache.coyote.http11.Http11Processor.process(Http11Processor.java:799)
at org.apache.coyote.http11.Http11Protocol$Http11ConnectionHandler.processConnection(Http11Protocol.java:705)
at org.apache.tomcat.util.net.TcpWorkerThread.runIt(PoolTcpEndpoint.java:577)
at org.apache.tomcat.util.threads.ThreadPool$ControlRunnable.run(ThreadPool.java:683)
at java.lang.Thread.run(Thread.java:534)
http-6443-Processor25, called close()
http-6443-Processor25, called closeInternal(true)
 
Ranch Hand
Posts: 220
  • Mark post as helpful
  • send pies
    Number of slices to send:
    Optional 'thank-you' note:
  • Quote
  • Report post to moderator
sanjay,

these are hard to read, aren't they? I see that the client sets a short timeout of 150 ms, then fails to recieve the server's reply within that time and gives up with the error you see. Can you increase this timeout to something much larger?
 
reply
    Bookmark Topic Watch Topic
  • New Topic