TLS/SSL connection

Connection details

Permanent link
https://gazelle.racsel.org/gss/details/connection.seam?id=9778
Connection date
12/21/24 7:58:06 AM (BRT GMT-0300)
SUT address
162.142.125.221:41518
Simulator address
ip58.ip-149-202-25.eu:10077
Simulator keyword
Server RAW TLS 1.2 Floor
Simulator certificate
C=CA,O=Racsel,CN=gazelle.racsel.org
Handshake success
Protocol
Cipher suite
Error message
This message was triggered by the simulator
Client requested protocol TLSv1.1 not enabled or not supported
Error stack trace
This error stack trace was thrown by the simulator
javax.net.ssl.SSLHandshakeException: Client requested protocol TLSv1.1 not
enabled or not supported
at sun.security.ssl.Handshaker.checkThrown(Handshaker.java:1494)
at
        sun.security.ssl.SSLEngineImpl.checkTaskThrown(SSLEngineImpl.java:509)
at sun.security.ssl.SSLEngineImpl.readNetRecord(SSLEngineImpl.java:780)
at sun.security.ssl.SSLEngineImpl.unwrap(SSLEngineImpl.java:744)
at javax.net.ssl.SSLEngine.unwrap(SSLEngine.java:624)
at org.jboss.netty.handler.ssl.SslHandler.unwrap(SslHandler.java:1212)
at org.jboss.netty.handler.ssl.SslHandler.decode(SslHandler.java:910)
at org.jboss.netty.handler.codec.frame.FrameDecoder.callDecode(FrameDe-
        coder.java:425)
at org.jboss.netty.handler.codec.frame.FrameDecoder.messageReceived(Fr-
        ameDecoder.java:303)
at org.jboss.netty.channel.SimpleChannelUpstreamHandler.handleUpstream-
        (SimpleChannelUpstreamHandler.java:70)
at org.jboss.netty.channel.DefaultChannelPipeline.sendUpstream(Default-
        ChannelPipeline.java:560)
at org.jboss.netty.channel.DefaultChannelPipeline.sendUpstream(Default-
        ChannelPipeline.java:555)
at
        org.jboss.netty.channel.Channels.fireMessageReceived(Channels.java:268)
at
        org.jboss.netty.channel.Channels.fireMessageReceived(Channels.java:255)
at org.jboss.netty.channel.socket.nio.NioWorker.read(NioWorker.java:88)
at org.jboss.netty.channel.socket.nio.AbstractNioWorker.process(Abstra-
        ctNioWorker.java:107)
at org.jboss.netty.channel.socket.nio.AbstractNioSelector.run(Abstract-
        NioSelector.java:312)
at org.jboss.netty.channel.socket.nio.AbstractNioWorker.run(AbstractNi-
        oWorker.java:88)
at org.jboss.netty.channel.socket.nio.NioWorker.run(NioWorker.java:178)
at org.jboss.netty.util.ThreadRenamingRunnable.run(ThreadRenamingRunna-
        ble.java:108)
at org.jboss.netty.util.internal.DeadLockProofWorker$1.run(DeadLockPro-
        ofWorker.java:42)
at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecuto-
        r.java:1152)
at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecut-
        or.java:622)
at java.lang.Thread.run(Thread.java:748)
Caused by: javax.net.ssl.SSLHandshakeException: Client requested protocol
TLSv1.1 not enabled or not supported
at sun.security.ssl.Alerts.getSSLException(Alerts.java:192)
at sun.security.ssl.SSLEngineImpl.fatal(SSLEngineImpl.java:1611)
at sun.security.ssl.Handshaker.fatalSE(Handshaker.java:301)
at sun.security.ssl.Handshaker.fatalSE(Handshaker.java:289)
at sun.security.ssl.ServerHandshaker.clientHello(ServerHandshaker.java-
        :506)
at sun.security.ssl.ServerHandshaker.processMessage(ServerHandshaker.j-
        ava:222)
at sun.security.ssl.Handshaker.processLoop(Handshaker.java:1011)
at sun.security.ssl.Handshaker$1.run(Handshaker.java:935)
at sun.security.ssl.Handshaker$1.run(Handshaker.java:933)
at java.security.AccessController.doPrivileged(Native Method)
at sun.security.ssl.Handshaker$DelegatedTask.run(Handshaker.java:1432)
at org.jboss.netty.handler.ssl.SslHandler$4.run(SslHandler.java:1348)
at org.jboss.netty.handler.ssl.ImmediateExecutor.execute(ImmediateExec-
        utor.java:31)
at org.jboss.netty.handler.ssl.SslHandler.runDelegatedTasks(SslHandler-
        .java:1345)
at org.jboss.netty.handler.ssl.SslHandler.unwrap(SslHandler.java:1232)
... 18 more
TLS/SSL events

Intercepted messages

No messages recorded, the TLS handshake failed.