trigger seeding of SecureRandom done seeding SecureRandom Using SSLEngineImpl. Using SSLEngineImpl. Allow unsafe renegotiation: false Allow legacy hello messages: true Is initial handshake: true Is secure renegotiation: false Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1.1 NIO TLS/SSL HANDSHAKE SELECTOR 1, READ: TLSv1 Handshake, length = 512 Allow unsafe renegotiation: false Allow legacy hello messages: true Is initial handshake: true Is secure renegotiation: false Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1.1 NIO TLS/SSL HANDSHAKE SELECTOR 1, READ: TLSv1 Handshake, length = 512 check handshake state: client_hello[1] update handshake state: client_hello[1] upcoming handshake states: server_hello[2] *** ClientHello, TLSv1.2 RandomCookie: GMT: -1256855513 bytes = { 127, 14, 34, 24, 55, 202, 62, 46, 54, 50, 77, 97, 152, 126, 25, 5, 185, 153, 46, 60, 89, 30, 76, 116, 223, 251, 64, 230 } Session ID: {15, 37, 13, 52, 179, 193, 227, 251, 50, 252, 58, 104, 158, 208, 29, 126, 22, 148, 173, 178, 107, 4, 50, 110, 199, 229, 49, 165, 132, 127, 191, 165} Cipher Suites: [Unknown 0x13:0x1, Unknown 0x13:0x3, Unknown 0x13:0x2, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xcc:0xa9, Unknown 0xcc:0xa8, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_128_GCM_SHA256, TLS_RSA_WITH_AES_256_GCM_SHA384, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_CBC_SHA] Compression Methods: { 0 } Extension server_name, server_name: [type=host_name (0), value=*****.com] Extension extended_master_secret Extension renegotiation_info, renegotiated_connection: Extension elliptic_curves, curve names: {unknown curve 29, secp256r1, secp384r1, secp521r1, unknown curve 256, unknown curve 257} Extension ec_point_formats, formats: [uncompressed] Unsupported extension type_35, data: Unsupported extension type_16, data: 00:0c:02:68:32:08:68:74:74:70:2f:31:2e:31 Unsupported extension status_request, data: 01:00:00:00:00 Unsupported extension type_34, data: 00:08:04:03:05:03:06:03:02:03 Unsupported extension type_51, data: 00:69:00:1d:00:20:02:e4:8f:50:c8:a9:28:9f:f8:a1:ba:af:b5:fa:8f:e2:ad:34:32:c2:c1:6b:35:05:e7:45:e4:c9:57:0b:4e:55:00:17:00:41:04:0f:3f:b7:e4:54:d0:bd:09:3b:34:36:ea:cf:81:bd:7f:fe:45:39:b1:2f:74:4e:71:c8:03:8b:b9:f8:d6:d1:2b:4f:7a:59:ff:dd:fa:30:51:41:d5:f5:82:e9:df:78:92:f9:ba:01:7d:eb:b9:04:4a:26:c4:4f:49:59:30:64:10 Unsupported extension type_43, data: 04:03:04:03:03 Extension signature_algorithms, signature_algorithms: SHA256withECDSA, SHA384withECDSA, SHA512withECDSA, Unknown (hash:0x8, signature:0x4), Unknown (hash:0x8, signature:0x5), Unknown (hash:0x8, signature:0x6), SHA256withRSA, SHA384withRSA, SHA512withRSA, SHA1withECDSA, SHA1withRSA Unsupported extension type_45, data: 01:01 Unsupported extension type_28, data: 40:01 Unsupported extension type_21, data: 00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00 *** %% Initialized: [Session-156, SSL_NULL_WITH_NULL_NULL] TLS/SSL HANDSHAKE POOLED THREAD 1, fatal error: 40: no cipher suites in common javax.net.ssl.SSLHandshakeException: no cipher suites in common %% Invalidated: [Session-156, SSL_NULL_WITH_NULL_NULL] TLS/SSL HANDSHAKE POOLED THREAD 1, SEND TLSv1.2 ALERT: fatal, description = handshake_failure TLS/SSL HANDSHAKE POOLED THREAD 1, WRITE: TLSv1.2 Alert, length = 2 TLS/SSL HANDSHAKE POOLED THREAD 1, fatal: engine already closed. Rethrowing javax.net.ssl.SSLHandshakeException: no cipher suites in common check handshake state: client_hello[1] update handshake state: client_hello[1] upcoming handshake states: server_hello[2] *** ClientHello, TLSv1.2 RandomCookie: GMT: 2057314308 bytes = { 21, 39, 214, 111, 41, 118, 83, 203, 216, 54, 154, 222, 149, 203, 44, 33, 75, 239, 240, 66, 93, 121, 67, 171, 135, 56, 54, 7 } Session ID: {213, 117, 149, 153, 174, 213, 171, 26, 67, 185, 12, 215, 175, 229, 127, 93, 242, 189, 233, 10, 85, 68, 52, 118, 211, 76, 143, 58, 193, 249, 47, 54} Cipher Suites: [Unknown 0x13:0x1, Unknown 0x13:0x3, Unknown 0x13:0x2, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xcc:0xa9, Unknown 0xcc:0xa8, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_128_GCM_SHA256, TLS_RSA_WITH_AES_256_GCM_SHA384, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_CBC_SHA] Compression Methods: { 0 } Extension server_name, server_name: [type=host_name (0), value=*****.com] Extension extended_master_secret Extension renegotiation_info, renegotiated_connection: Extension elliptic_curves, curve names: {unknown curve 29, secp256r1, secp384r1, secp521r1, unknown curve 256, unknown curve 257} Extension ec_point_formats, formats: [uncompressed] Unsupported extension type_35, data: Unsupported extension type_16, data: 00:0c:02:68:32:08:68:74:74:70:2f:31:2e:31 Unsupported extension status_request, data: 01:00:00:00:00 Unsupported extension type_34, data: 00:08:04:03:05:03:06:03:02:03 Unsupported extension type_51, data: 00:69:00:1d:00:20:42:18:e5:62:8d:23:35:55:a4:57:b1:34:67:94:4a:97:56:9b:08:f0:9c:68:b6:b6:35:73:3a:08:26:ef:b3:4b:00:17:00:41:04:5e:ba:6e:5c:65:7e:14:df:b1:38:35:d2:76:22:7e:14:87:06:33:1d:2b:a7:7c:6c:0c:62:f7:fe:34:f1:18:48:b5:6a:68:73:e7:11:03:dc:5b:af:b3:1b:c6:6e:4c:b3:f0:d3:99:12:eb:b1:b8:5c:23:1f:87:7c:fe:da:4c:6a Unsupported extension type_43, data: 04:03:04:03:03 Extension signature_algorithms, signature_algorithms: SHA256withECDSA, SHA384withECDSA, SHA512withECDSA, Unknown (hash:0x8, signature:0x4), Unknown (hash:0x8, signature:0x5), Unknown (hash:0x8, signature:0x6), SHA256withRSA, SHA384withRSA, SHA512withRSA, SHA1withECDSA, SHA1withRSA Unsupported extension type_45, data: 01:01 Unsupported extension type_28, data: 40:01 Unsupported extension type_21, data: 00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00 *** %% Initialized: [Session-157, SSL_NULL_WITH_NULL_NULL] TLS/SSL HANDSHAKE POOLED THREAD 1, fatal error: 40: no cipher suites in common javax.net.ssl.SSLHandshakeException: no cipher suites in common %% Invalidated: [Session-157, SSL_NULL_WITH_NULL_NULL] TLS/SSL HANDSHAKE POOLED THREAD 1, SEND TLSv1.2 ALERT: fatal, description = handshake_failure TLS/SSL HANDSHAKE POOLED THREAD 1, WRITE: TLSv1.2 Alert, length = 2 TLS/SSL HANDSHAKE POOLED THREAD 1, fatal: engine already closed. Rethrowing javax.net.ssl.SSLHandshakeException: no cipher suites in common Using SSLEngineImpl. Using SSLEngineImpl. Allow unsafe renegotiation: false Allow legacy hello messages: true Is initial handshake: true Is secure renegotiation: false Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1.1 NIO TLS/SSL HANDSHAKE SELECTOR 1, READ: TLSv1 Handshake, length = 512 Allow unsafe renegotiation: false Allow legacy hello messages: true Is initial handshake: true Is secure renegotiation: false Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1 Ignoring unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 for TLSv1.1 Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 for TLSv1.1 NIO TLS/SSL HANDSHAKE SELECTOR 1, READ: TLSv1 Handshake, length = 512 check handshake state: client_hello[1] update handshake state: client_hello[1] upcoming handshake states: server_hello[2] *** ClientHello, TLSv1.2 RandomCookie: GMT: 403388388 bytes = { 156, 105, 91, 108, 218, 41, 239, 65, 155, 22, 66, 177, 189, 36, 106, 76, 142, 196, 179, 254, 102, 85, 41, 99, 120, 205, 209, 215 } Session ID: {114, 125, 181, 153, 53, 158, 249, 101, 63, 104, 87, 152, 51, 73, 139, 60, 249, 29, 135, 211, 97, 37, 216, 214, 60, 145, 186, 29, 149, 98, 51, 10} Cipher Suites: [Unknown 0x13:0x1, Unknown 0x13:0x3, Unknown 0x13:0x2, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xcc:0xa9, Unknown 0xcc:0xa8, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_128_GCM_SHA256, TLS_RSA_WITH_AES_256_GCM_SHA384, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_CBC_SHA] Compression Methods: { 0 } Extension server_name, server_name: [type=host_name (0), value=*****.com] Extension extended_master_secret Extension renegotiation_info, renegotiated_connection: Extension elliptic_curves, curve names: {unknown curve 29, secp256r1, secp384r1, secp521r1, unknown curve 256, unknown curve 257} Extension ec_point_formats, formats: [uncompressed] Unsupported extension type_35, data: Unsupported extension type_16, data: 00:0c:02:68:32:08:68:74:74:70:2f:31:2e:31 Unsupported extension status_request, data: 01:00:00:00:00 Unsupported extension type_34, data: 00:08:04:03:05:03:06:03:02:03 Unsupported extension type_51, data: 00:69:00:1d:00:20:4a:bb:34:21:44:fb:9c:06:43:f3:c1:97:ca:4d:f6:03:38:6e:1d:07:7c:10:45:8e:8b:b0:b4:0a:29:c9:0b:0b:00:17:00:41:04:f7:74:a6:bc:e9:c0:2f:20:aa:e7:10:68:a0:8c:e4:3c:2c:79:67:d1:09:1c:81:51:54:0e:e2:09:25:35:04:c0:4b:6a:56:fb:fb:48:43:f2:ec:8a:ef:07:3c:50:e1:a2:85:fa:24:8f:f1:d3:f1:36:73:ea:e0:99:f4:31:83:a1 Unsupported extension type_43, data: 04:03:04:03:03 Extension signature_algorithms, signature_algorithms: SHA256withECDSA, SHA384withECDSA, SHA512withECDSA, Unknown (hash:0x8, signature:0x4), Unknown (hash:0x8, signature:0x5), Unknown (hash:0x8, signature:0x6), SHA256withRSA, SHA384withRSA, SHA512withRSA, SHA1withECDSA, SHA1withRSA Unsupported extension type_45, data: 01:01 Unsupported extension type_28, data: 40:01 Unsupported extension type_21, data: 00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00 *** %% Initialized: [Session-158, SSL_NULL_WITH_NULL_NULL] TLS/SSL HANDSHAKE POOLED THREAD 1, fatal error: 40: no cipher suites in common javax.net.ssl.SSLHandshakeException: no cipher suites in common %% Invalidated: [Session-158, SSL_NULL_WITH_NULL_NULL] TLS/SSL HANDSHAKE POOLED THREAD 1, SEND TLSv1.2 ALERT: fatal, description = handshake_failure TLS/SSL HANDSHAKE POOLED THREAD 1, WRITE: TLSv1.2 Alert, length = 2 TLS/SSL HANDSHAKE POOLED THREAD 1, fatal: engine already closed. Rethrowing javax.net.ssl.SSLHandshakeException: no cipher suites in common check handshake state: client_hello[1] update handshake state: client_hello[1] upcoming handshake states: server_hello[2] *** ClientHello, TLSv1.2 RandomCookie: GMT: 1858678017 bytes = { 60, 209, 224, 57, 237, 211, 84, 79, 6, 9, 101, 27, 92, 12, 75, 126, 86, 146, 34, 76, 92, 185, 248, 3, 83, 67, 39, 213 } Session ID: {201, 146, 191, 192, 252, 205, 173, 230, 211, 166, 250, 73, 79, 88, 189, 216, 52, 64, 139, 9, 95, 241, 19, 95, 187, 116, 108, 111, 194, 5, 44, 1} Cipher Suites: [Unknown 0x13:0x1, Unknown 0x13:0x3, Unknown 0x13:0x2, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, Unknown 0xcc:0xa9, Unknown 0xcc:0xa8, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_128_GCM_SHA256, TLS_RSA_WITH_AES_256_GCM_SHA384, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_CBC_SHA] Compression Methods: { 0 } Extension server_name, server_name: [type=host_name (0), value=*****.com] Extension extended_master_secret Extension renegotiation_info, renegotiated_connection: Extension elliptic_curves, curve names: {unknown curve 29, secp256r1, secp384r1, secp521r1, unknown curve 256, unknown curve 257} Extension ec_point_formats, formats: [uncompressed] Unsupported extension type_35, data: Unsupported extension type_16, data: 00:0c:02:68:32:08:68:74:74:70:2f:31:2e:31 Unsupported extension status_request, data: 01:00:00:00:00 Unsupported extension type_34, data: 00:08:04:03:05:03:06:03:02:03 Unsupported extension type_51, data: 00:69:00:1d:00:20:d3:aa:7c:fb:aa:f8:58:e6:5e:2f:90:40:34:cd:53:c3:61:ed:ad:2a:ba:3f:e7:17:10:80:28:d7:31:27:f2:2c:00:17:00:41:04:88:e2:7b:da:c8:3c:ac:8e:78:e2:3d:6c:94:4d:c0:06:ef:b1:fe:5e:3f:91:68:19:54:69:90:8f:7d:34:e8:72:7a:64:af:4d:f4:7d:20:1a:27:52:98:fc:fc:fb:ae:c6:24:50:9b:18:2a:ef:07:3e:51:40:b6:f3:6e:07:2a:45 Unsupported extension type_43, data: 04:03:04:03:03 Extension signature_algorithms, signature_algorithms: SHA256withECDSA, SHA384withECDSA, SHA512withECDSA, Unknown (hash:0x8, signature:0x4), Unknown (hash:0x8, signature:0x5), Unknown (hash:0x8, signature:0x6), SHA256withRSA, SHA384withRSA, SHA512withRSA, SHA1withECDSA, SHA1withRSA Unsupported extension type_45, data: 01:01 Unsupported extension type_28, data: 40:01 Unsupported extension type_21, data: 00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00 ***