<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SSL error in catalina.out in Alfresco Forum</title>
    <link>https://connect.hyland.com/t5/alfresco-forum/ssl-error-in-catalina-out/m-p/42707#M17757</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;B&gt;Angel Borroy&lt;/B&gt;‌, thank you for your reply.&amp;nbsp; I appreciate the newbie check since I am not too familiar with certs or keystores so any help in this area is appreciated.&amp;nbsp; I thought it might be best to give you more details on what I did in the way of certs and keystores.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Performed the following in the $HOME directory&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Instructions for Generating Repository SSL Keystores&lt;BR /&gt;~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I generated my own certificate.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG src="https://connect.hyland.com/legacyfs/online/alfresco/emoticons/info.png" /&gt; Generate the repository public/private key pair in a keystore:&lt;/P&gt;&lt;P&gt;$ keytool -genkey -alias ssl.repo -keyalg RSA -keystore ssl.keystore -storetype JCEKS -storepass &amp;lt;store password&amp;gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;(ii) Generate a certificate request for the repository key&lt;/P&gt;&lt;P&gt;$ keytool -keystore ssl.keystore -alias ssl.repo -certreq -file repo.csr -storetype JCEKS -storepass &amp;lt;store password&amp;gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I then generated the CA Key and certificate and then finished the rest of the steps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Instructions for Generating a Certificate Authority (CA) Key and Certificate&lt;BR /&gt;~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~&lt;/P&gt;&lt;P&gt;&lt;IMG src="https://connect.hyland.com/legacyfs/online/alfresco/emoticons/info.png" /&gt; Generate the CA private key&lt;/P&gt;&lt;P&gt;$ openssl genrsa -des3 -out ca.key 1024&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;(ii) Generate the CA self-signed certificate&lt;/P&gt;&lt;P&gt;$ openssl req -new -x509 -days 3650 -key ca.key -out ca.crt&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I then picked back up where I left off above.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;(iii) Alfresco CA signs the certificate request, creating a certificate that is valid for 365 days.&lt;/P&gt;&lt;P&gt;$ openssl x509 -CA ca.crt -CAkey ca.key -CAcreateserial -req -in repo.csr -out repo.crt -days 365&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;(iv) Import the Alfresco CA key into the repository key store&lt;/P&gt;&lt;P&gt;$ keytool -import -alias ssl.alfreco.ca -file ca.crt -keystore ssl.keystore -storetype JCEKS -storepass &amp;lt;store password&amp;gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;(v) Import the CA-signed repository certificate into the repository keystore&lt;/P&gt;&lt;P&gt;$ keytool -import -alias ssl.repo -file repo.crt -keystore ssl.keystore -storetype JCEKS -storepass &amp;lt;store password&amp;gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;(vi) Convert the repository keystore to a pkcs12 keystore (for use in browsers such as Firefox). Give the pkcs12 key store the key store password 'alfresco'.&lt;/P&gt;&lt;P&gt;keytool -importkeystore -srckeystore ssl.keystore -srcstorepass&amp;nbsp;&amp;lt;password&amp;gt; -srcstoretype JCEKS -srcalias ssl.repo -srckeypass&amp;nbsp;&amp;lt;password&amp;gt; -destkeystore firefox.p12 -deststoretype pkcs12 -deststorepass alfresco -destalias ssl.repo -destkeypass alfresco&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;(vi) Create a repository truststore containing the Alfresco CA certificate&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;***** This line kept failing for me.&amp;nbsp; Maybe you have some insight into why it failed?********&lt;BR /&gt;keytool -import -alias ssl.alfreco.ca -file ca.crt -keystore ssl.keystore -storetype JCEKS -storepass &amp;lt;store password&amp;gt;&lt;BR /&gt;*** This one executed just fine.*****&lt;BR /&gt;keytool -import -alias alfreco.ca -file ca.crt -keystore ssl.truststore -storetype JCEKS -storepass &amp;lt;store password&amp;gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;(vii) Copy the keystore and truststore to the repository keystore location defined by the property 'dir.keystore'.&lt;/P&gt;&lt;P&gt;cp -f * /store/alf_data/keystore/&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;(viii) Update the SSL properties i.e. properties starting with the prefixes 'alfresco.encryption.ssl.keystore' and 'alfresco.encryption.ssl.truststore'.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are any of the steps above what you mean by "Have you added your public certificate to "cacerts"??&lt;/P&gt;&lt;P&gt;Do you mean to add it to ./jre/lib/security/cacerts?&amp;nbsp; If so can you give more details?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you for the newbie check.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 02 Aug 2018 00:41:24 GMT</pubDate>
    <dc:creator>dkeidel</dc:creator>
    <dc:date>2018-08-02T00:41:24Z</dc:date>
    <item>
      <title>SSL error in catalina.out</title>
      <link>https://connect.hyland.com/t5/alfresco-forum/ssl-error-in-catalina-out/m-p/42705#M17755</link>
      <description>I have spent the last day or so trying to debug an issue I am having between Alfresco and SOLR.&amp;nbsp; I have searched the web and seen much about SSL errors and read many relevant posts.&amp;nbsp; I have tried all the following to resolve a&amp;nbsp;SSLHandshakeException ERROR I am seeing in catalina.out:1.&amp;nbsp; replaced&amp;nbsp;poli</description>
      <pubDate>Wed, 01 Aug 2018 06:30:03 GMT</pubDate>
      <guid>https://connect.hyland.com/t5/alfresco-forum/ssl-error-in-catalina-out/m-p/42705#M17755</guid>
      <dc:creator>dkeidel</dc:creator>
      <dc:date>2018-08-01T06:30:03Z</dc:date>
    </item>
    <item>
      <title>Re: SSL error in catalina.out</title>
      <link>https://connect.hyland.com/t5/alfresco-forum/ssl-error-in-catalina-out/m-p/42706#M17756</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Probably this is a newbie check, but... Have you added your public certificate to "cacerts"?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 01 Aug 2018 07:13:50 GMT</pubDate>
      <guid>https://connect.hyland.com/t5/alfresco-forum/ssl-error-in-catalina-out/m-p/42706#M17756</guid>
      <dc:creator>angelborroy</dc:creator>
      <dc:date>2018-08-01T07:13:50Z</dc:date>
    </item>
    <item>
      <title>Re: SSL error in catalina.out</title>
      <link>https://connect.hyland.com/t5/alfresco-forum/ssl-error-in-catalina-out/m-p/42707#M17757</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;B&gt;Angel Borroy&lt;/B&gt;‌, thank you for your reply.&amp;nbsp; I appreciate the newbie check since I am not too familiar with certs or keystores so any help in this area is appreciated.&amp;nbsp; I thought it might be best to give you more details on what I did in the way of certs and keystores.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Performed the following in the $HOME directory&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Instructions for Generating Repository SSL Keystores&lt;BR /&gt;~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I generated my own certificate.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG src="https://connect.hyland.com/legacyfs/online/alfresco/emoticons/info.png" /&gt; Generate the repository public/private key pair in a keystore:&lt;/P&gt;&lt;P&gt;$ keytool -genkey -alias ssl.repo -keyalg RSA -keystore ssl.keystore -storetype JCEKS -storepass &amp;lt;store password&amp;gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;(ii) Generate a certificate request for the repository key&lt;/P&gt;&lt;P&gt;$ keytool -keystore ssl.keystore -alias ssl.repo -certreq -file repo.csr -storetype JCEKS -storepass &amp;lt;store password&amp;gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I then generated the CA Key and certificate and then finished the rest of the steps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Instructions for Generating a Certificate Authority (CA) Key and Certificate&lt;BR /&gt;~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~&lt;/P&gt;&lt;P&gt;&lt;IMG src="https://connect.hyland.com/legacyfs/online/alfresco/emoticons/info.png" /&gt; Generate the CA private key&lt;/P&gt;&lt;P&gt;$ openssl genrsa -des3 -out ca.key 1024&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;(ii) Generate the CA self-signed certificate&lt;/P&gt;&lt;P&gt;$ openssl req -new -x509 -days 3650 -key ca.key -out ca.crt&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I then picked back up where I left off above.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;(iii) Alfresco CA signs the certificate request, creating a certificate that is valid for 365 days.&lt;/P&gt;&lt;P&gt;$ openssl x509 -CA ca.crt -CAkey ca.key -CAcreateserial -req -in repo.csr -out repo.crt -days 365&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;(iv) Import the Alfresco CA key into the repository key store&lt;/P&gt;&lt;P&gt;$ keytool -import -alias ssl.alfreco.ca -file ca.crt -keystore ssl.keystore -storetype JCEKS -storepass &amp;lt;store password&amp;gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;(v) Import the CA-signed repository certificate into the repository keystore&lt;/P&gt;&lt;P&gt;$ keytool -import -alias ssl.repo -file repo.crt -keystore ssl.keystore -storetype JCEKS -storepass &amp;lt;store password&amp;gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;(vi) Convert the repository keystore to a pkcs12 keystore (for use in browsers such as Firefox). Give the pkcs12 key store the key store password 'alfresco'.&lt;/P&gt;&lt;P&gt;keytool -importkeystore -srckeystore ssl.keystore -srcstorepass&amp;nbsp;&amp;lt;password&amp;gt; -srcstoretype JCEKS -srcalias ssl.repo -srckeypass&amp;nbsp;&amp;lt;password&amp;gt; -destkeystore firefox.p12 -deststoretype pkcs12 -deststorepass alfresco -destalias ssl.repo -destkeypass alfresco&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;(vi) Create a repository truststore containing the Alfresco CA certificate&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;***** This line kept failing for me.&amp;nbsp; Maybe you have some insight into why it failed?********&lt;BR /&gt;keytool -import -alias ssl.alfreco.ca -file ca.crt -keystore ssl.keystore -storetype JCEKS -storepass &amp;lt;store password&amp;gt;&lt;BR /&gt;*** This one executed just fine.*****&lt;BR /&gt;keytool -import -alias alfreco.ca -file ca.crt -keystore ssl.truststore -storetype JCEKS -storepass &amp;lt;store password&amp;gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;(vii) Copy the keystore and truststore to the repository keystore location defined by the property 'dir.keystore'.&lt;/P&gt;&lt;P&gt;cp -f * /store/alf_data/keystore/&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;(viii) Update the SSL properties i.e. properties starting with the prefixes 'alfresco.encryption.ssl.keystore' and 'alfresco.encryption.ssl.truststore'.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are any of the steps above what you mean by "Have you added your public certificate to "cacerts"??&lt;/P&gt;&lt;P&gt;Do you mean to add it to ./jre/lib/security/cacerts?&amp;nbsp; If so can you give more details?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you for the newbie check.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 02 Aug 2018 00:41:24 GMT</pubDate>
      <guid>https://connect.hyland.com/t5/alfresco-forum/ssl-error-in-catalina-out/m-p/42707#M17757</guid>
      <dc:creator>dkeidel</dc:creator>
      <dc:date>2018-08-02T00:41:24Z</dc:date>
    </item>
    <item>
      <title>Re: SSL error in catalina.out</title>
      <link>https://connect.hyland.com/t5/alfresco-forum/ssl-error-in-catalina-out/m-p/42708#M17758</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, you have to add your "ca.crt" to "jre/lib/security/cacerts"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On the other hand, you have to understand that "ca.key" is the private part of the certificate to be stored in "keystores" and "ca.crt" is the public part of the certificate to be stored in "truststores". This is why your line is failing.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Check also this blog post:&amp;nbsp;&lt;A href="https://angelborroy.wordpress.com/2016/06/15/configuring-alfresco-ssl-certificates/" rel="nofollow noopener noreferrer"&gt;https://angelborroy.wordpress.com/2016/06/15/configuring-alfresco-ssl-certificates/&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 02 Aug 2018 07:14:08 GMT</pubDate>
      <guid>https://connect.hyland.com/t5/alfresco-forum/ssl-error-in-catalina-out/m-p/42708#M17758</guid>
      <dc:creator>angelborroy</dc:creator>
      <dc:date>2018-08-02T07:14:08Z</dc:date>
    </item>
    <item>
      <title>Re: SSL error in catalina.out</title>
      <link>https://connect.hyland.com/t5/alfresco-forum/ssl-error-in-catalina-out/m-p/42709#M17759</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;B&gt;Angel Borroy&lt;/B&gt;‌ thank you for the reply.&amp;nbsp; Could you please provide for me the exact command to execute to add "ca.crt" to "jre/lib/security/cacerts"?&amp;nbsp; I ask since&amp;nbsp;when I read you blog post you left in your last comment I see the following command:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;keytool –import –trustcacerts -storetype JKS -providerName SUN –file ca.cer –alias ca.ssl –keystore ssl.truststore&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think in this command the cert is being imported into the truststore ssl.truststore instead of&amp;nbsp;&lt;SPAN&gt;"jre/lib/security/cacerts".&amp;nbsp; I also do not know what to use of the other options such as -alias, -providerName, etc.&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 02 Aug 2018 21:14:56 GMT</pubDate>
      <guid>https://connect.hyland.com/t5/alfresco-forum/ssl-error-in-catalina-out/m-p/42709#M17759</guid>
      <dc:creator>dkeidel</dc:creator>
      <dc:date>2018-08-02T21:14:56Z</dc:date>
    </item>
    <item>
      <title>Re: SSL error in catalina.out</title>
      <link>https://connect.hyland.com/t5/alfresco-forum/ssl-error-in-catalina-out/m-p/42710#M17760</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You can import your public part of the certificate to default JVM truststore (jre/lib/security/cacerts) or to specific Tomcat connector truststore (&lt;A href="https://github.com/loftuxab/alfresco-ubuntu-install/blob/master/tomcat/server.xml#L97" rel="nofollow noopener noreferrer"&gt;https://github.com/loftuxab/alfresco-ubuntu-install/blob/master/tomcat/server.xml#L97&lt;/A&gt;).&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In the sample I provided you, second alternative is followed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can use any alias and the same "storetype"and "providerName" values.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 03 Aug 2018 06:58:53 GMT</pubDate>
      <guid>https://connect.hyland.com/t5/alfresco-forum/ssl-error-in-catalina-out/m-p/42710#M17760</guid>
      <dc:creator>angelborroy</dc:creator>
      <dc:date>2018-08-03T06:58:53Z</dc:date>
    </item>
    <item>
      <title>Re: SSL error in catalina.out</title>
      <link>https://connect.hyland.com/t5/alfresco-forum/ssl-error-in-catalina-out/m-p/42711#M17761</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;B&gt;Angel Borroy&lt;/B&gt;‌ I tried the following command:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sudo /opt/jdk1.8.0_181/bin/keytool -importcert -alias alfreco.ca -file ca.crt -keystore /opt/jdk1.8.0_181/jre/lib/security/cacerts&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I did not use&amp;nbsp;-storetype JCEKS&amp;nbsp;as I was getting&amp;nbsp;errors:&amp;nbsp; java.io.IOException: Invalid keystore format alfresco&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I verified that the public part was imported by running:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;$ keytool -v -list -keystore &amp;nbsp; &amp;nbsp; /opt/jdk1.8.0_181/jre/lib/security/cacerts | grep alfre&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;Enter keystore password:&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;changeit&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;Alias name: alfreco.ca&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;So it was added.&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;I am still getting the same error message:&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;Allow unsafe renegotiation: false&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;Allow legacy hello messages: true&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;Is initial handshake: true&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;Is secure renegotiation: false&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;SolrTrackerScheduler_Worker-2, setSoTimeout(60000) called&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;SolrTrackerScheduler_Worker-2, setSoTimeout(60000) called&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLSv1&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 for TLSv1&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 for TLSv1&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1.1&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLSv1.1&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1.1&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 for TLSv1.1&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1.1&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;%% No cached client session&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;*** ClientHello, TLSv1.2&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;RandomCookie:&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;GMT: 1533728767 bytes = { 20, 9, 35, 168, 110, 145, 179, 254, 79, 224, 90, 9, 190, 251, 255, 83, 113, 48, 114, 129, 178, 177, 28, 212, 138, 245, 92, 204 }&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;Session ID:&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;{}&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;Cipher Suites: [TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384, TLS_RSA_WITH_AES_256_CBC_SHA256, TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384, TLS_DHE_RSA_WITH_AES_256_CBC_SHA256, TLS_DHE_DSS_WITH_AES_256_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDH_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_DSS_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256, TLS_RSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_DSS_WITH_AES_128_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, TLS_RSA_WITH_AES_256_GCM_SHA384, TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, TLS_DHE_DSS_WITH_AES_256_GCM_SHA384, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_DSS_WITH_AES_128_GCM_SHA256, TLS_EMPTY_RENEGOTIATION_INFO_SCSV]&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;Compression Methods:&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;{ 0 }&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;Extension elliptic_curves, curve names: {secp256r1, secp384r1, secp521r1, sect283k1, sect283r1, sect409k1, sect409r1, sect571k1, sect571r1, secp256k1}&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;Extension ec_point_formats, formats: [uncompressed]&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;Extension signature_algorithms, signature_algorithms: SHA512withECDSA, SHA512withRSA, SHA384withECDSA, SHA384withRSA, SHA256withECDSA, SHA256withRSA, SHA256withDSA, SHA224withECDSA, SHA224withRSA, SHA224withDSA, SHA1withECDSA, SHA1withRSA, SHA1withDSA&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;Extension extended_master_secret&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;***&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;SolrTrackerScheduler_Worker-2, WRITE: TLSv1.2 Handshake, length = 199&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;SolrTrackerScheduler_Worker-2, READ: TLSv1.2 Alert, length = 2&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;SolrTrackerScheduler_Worker-2, RECV TLSv1.2 ALERT:&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;fatal, handshake_failure&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;SolrTrackerScheduler_Worker-2, called closeSocket()&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;SolrTrackerScheduler_Worker-2, handling exception: javax.net.ssl.SSLHandshakeException: Received fatal alert: handshake_failure&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;SolrTrackerScheduler_Worker-2, called close()&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;SolrTrackerScheduler_Worker-2, called closeInternal(true)&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;SolrTrackerScheduler_Worker-2, called close()&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;SolrTrackerScheduler_Worker-2, called closeInternal(true)&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;SolrTrackerScheduler_Worker-2, called close()&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;SolrTrackerScheduler_Worker-2, called closeInternal(true)&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;2018-08-08 23:02:39,009&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;ERROR [solr.tracker.CoreTracker] [SolrTrackerScheduler_Worker-2] Tracking failed&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt; javax.net.ssl.SSLHandshakeException: Received fatal alert: handshake_failure&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt; &lt;/SPAN&gt;at sun.security.ssl.Alerts.getSSLException(Alerts.java:192)&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt; &lt;/SPAN&gt;at sun.security.ssl.Alerts.getSSLException(Alerts.java:154)&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt; &lt;/SPAN&gt;at sun.security.ssl.SSLSocketImpl.recvAlert(SSLSocketImpl.java:2038)&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt; &lt;/SPAN&gt;at sun.security.ssl.SSLSocketImpl.readRecord(SSLSocketImpl.java:1135)&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt; &lt;/SPAN&gt;at sun.security.ssl.SSLSocketImpl.performInitialHandshake(SSLSocketImpl.java:1385)&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt; &lt;/SPAN&gt;at sun.security.ssl.SSLSocketImpl.writeRecord(SSLSocketImpl.java:757)&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt; &lt;/SPAN&gt;at sun.security.ssl.AppOutputStream.write(AppOutputStream.java:123)&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt; &lt;/SPAN&gt;at java.io.BufferedOutputStream.flushBuffer(BufferedOutputStream.java:82)&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt; &lt;/SPAN&gt;at java.io.BufferedOutputStream.write(BufferedOutputStream.java:121)&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt; &lt;/SPAN&gt;at java.io.FilterOutputStream.write(FilterOutputStream.java:97)&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt; &lt;/SPAN&gt;at org.apache.commons.httpclient.methods.ByteArrayRequestEntity.writeRequest(ByteArrayRequestEntity.java:90)&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt; &lt;/SPAN&gt;at org.apache.commons.httpclient.methods.EntityEnclosingMethod.writeRequestBody(EntityEnclosingMethod.java:499)&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt; &lt;/SPAN&gt;at org.apache.commons.httpclient.HttpMethodBase.writeRequest(HttpMethodBase.java:2114)&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt; &lt;/SPAN&gt;at org.apache.commons.httpclient.HttpMethodBase.execute(HttpMethodBase.java:1096)&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt; &lt;/SPAN&gt;at org.apache.commons.httpclient.HttpMethodDirector.executeWithRetry(HttpMethodDirector.java:398)&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt; &lt;/SPAN&gt;at org.apache.commons.httpclient.HttpMethodDirector.executeMethod(HttpMethodDirector.java:171)&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt; &lt;/SPAN&gt;at org.apache.commons.httpclient.HttpClient.executeMethod(HttpClient.java:397)&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt; &lt;/SPAN&gt;at org.apache.commons.httpclient.HttpClient.executeMethod(HttpClient.java:323)&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt; &lt;/SPAN&gt;at org.alfresco.httpclient.AbstractHttpClient.executeMethod(AbstractHttpClient.java:135)&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt; &lt;/SPAN&gt;at org.alfresco.httpclient.AbstractHttpClient.sendRemoteRequest(AbstractHttpClient.java:111)&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt; &lt;/SPAN&gt;at org.alfresco.httpclient.HttpClientFactory$HttpsClient.sendRequest(HttpClientFactory.java:371)&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt; &lt;/SPAN&gt;at org.alfresco.solr.client.SOLRAPIClient.getModelsDiff(SOLRAPIClient.java:1056)&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt; &lt;/SPAN&gt;at org.alfresco.solr.tracker.CoreTracker.trackModels(CoreTracker.java:1897)&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt; &lt;/SPAN&gt;at org.alfresco.solr.tracker.CoreTracker.trackRepository(CoreTracker.java:1227)&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt; &lt;/SPAN&gt;at org.alfresco.solr.tracker.CoreTracker.updateIndex(CoreTracker.java:513)&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt; &lt;/SPAN&gt;at org.alfresco.solr.tracker.CoreTrackerJob.execute(CoreTrackerJob.java:45)&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt; &lt;/SPAN&gt;at org.quartz.core.JobRunShell.run(JobRunShell.java:216)&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt; &lt;/SPAN&gt;at org.quartz.simpl.SimpleThreadPool$WorkerThread.run(SimpleThreadPool.java:563)&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;Allow unsafe renegotiation: false&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;Allow legacy hello messages: true&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;Is initial handshake: true&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;Is secure renegotiation: false&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;Allow unsafe renegotiation: false&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;Allow legacy hello messages: true&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;Is initial handshake: true&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;Is secure renegotiation: false&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;http-bio-8443-Acceptor-0, setSoTimeout(240000) called&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;SolrTrackerScheduler_Worker-1, setSoTimeout(60000) called&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;SolrTrackerScheduler_Worker-1, setSoTimeout(60000) called&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;No available cipher suite for TLSv1&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;No available cipher suite for TLSv1.1&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;No available cipher suite for TLSv1.2&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;http-bio-8443-exec-4, handling exception: javax.net.ssl.SSLHandshakeException: No appropriate protocol (protocol is disabled or cipher suites are inappropriate)&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;http-bio-8443-exec-4, SEND TLSv1.2 ALERT:&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;fatal, description = handshake_failure&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;http-bio-8443-exec-4, WRITE: TLSv1.2 Alert, length = 2&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLSv1&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 for TLSv1&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;http-bio-8443-exec-4, called closeSocket()&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 for TLSv1&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;http-bio-8443-exec-4, IOException in getSession():&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;javax.net.ssl.SSLHandshakeException: No appropriate protocol (protocol is disabled or cipher suites are inappropriate)&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;http-bio-8443-exec-4, called close()&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;http-bio-8443-exec-4, called closeInternal(true)&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1.1&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLSv1.1&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1.1&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 for TLSv1.1&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1.1&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;%% No cached client session&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;*** ClientHello, TLSv1.2&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;RandomCookie:&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;GMT: 1533728767 bytes = { 12, 32, 84, 173, 43, 85, 228, 181, 255, 70, 84, 34, 78, 219, 93, 66, 8, 128, 54, 230, 220, 102, 191, 11, 169, 75, 143, 162 }&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;Session ID:&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;{}&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;Cipher Suites: [TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384, TLS_RSA_WITH_AES_256_CBC_SHA256, TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384, TLS_DHE_RSA_WITH_AES_256_CBC_SHA256, TLS_DHE_DSS_WITH_AES_256_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDH_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_DSS_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256, TLS_RSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_DSS_WITH_AES_128_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, TLS_RSA_WITH_AES_256_GCM_SHA384, TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, TLS_DHE_DSS_WITH_AES_256_GCM_SHA384, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_DSS_WITH_AES_128_GCM_SHA256, TLS_EMPTY_RENEGOTIATION_INFO_SCSV]&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;Compression Methods:&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;{ 0 }&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;Extension elliptic_curves, curve names: {secp256r1, secp384r1, secp521r1, sect283k1, sect283r1, sect409k1, sect409r1, sect571k1, sect571r1, secp256k1}&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;Extension ec_point_formats, formats: [uncompressed]&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;Extension signature_algorithms, signature_algorithms: SHA512withECDSA, SHA512withRSA, SHA384withECDSA, SHA384withRSA, SHA256withECDSA, SHA256withRSA, SHA256withDSA, SHA224withECDSA, SHA224withRSA, SHA224withDSA, SHA1withECDSA, SHA1withRSA, SHA1withDSA&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;Extension extended_master_secret&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;***&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;I have attached a more complete catalina.out that contains just the messages from the last time I started tomcat.&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 09 Aug 2018 06:16:26 GMT</pubDate>
      <guid>https://connect.hyland.com/t5/alfresco-forum/ssl-error-in-catalina-out/m-p/42711#M17761</guid>
      <dc:creator>dkeidel</dc:creator>
      <dc:date>2018-08-09T06:16:26Z</dc:date>
    </item>
  </channel>
</rss>

