TLS/SSL connection

Connection details

Permanent link
https://ehealthsuisse.ihe-europe.net/gss/details/connection.seam?id=2965041
Connection date
9/21/24 1:45:27 AM (CEST GMT+0200)
SUT address
199.45.155.64:49812
Simulator address
10.34.0.14:20070
Simulator keyword
Test RAW Server
Simulator certificate
C=CH,O=IHE,CN=TLS Simulator
Handshake success
Protocol
Cipher suite
Error message
This message was triggered by the simulator
Client requested protocol SSLv3 not enabled or not supported
Error stack trace
This error stack trace was thrown by the simulator
javax.net.ssl.SSLHandshakeException: Client requested protocol SSLv3 not
enabled or not supported
at sun.security.ssl.Handshaker.checkThrown(Handshaker.java:1480)
at
        sun.security.ssl.SSLEngineImpl.checkTaskThrown(SSLEngineImpl.java:509)
at sun.security.ssl.SSLEngineImpl.readNetRecord(SSLEngineImpl.java:780)
at sun.security.ssl.SSLEngineImpl.unwrap(SSLEngineImpl.java:744)
at javax.net.ssl.SSLEngine.unwrap(SSLEngine.java:624)
at org.jboss.netty.handler.ssl.SslHandler.unwrap(SslHandler.java:1212)
at org.jboss.netty.handler.ssl.SslHandler.decode(SslHandler.java:910)
at org.jboss.netty.handler.codec.frame.FrameDecoder.callDecode(FrameDe-
        coder.java:425)
at org.jboss.netty.handler.codec.frame.FrameDecoder.messageReceived(Fr-
        ameDecoder.java:303)
at org.jboss.netty.channel.SimpleChannelUpstreamHandler.handleUpstream-
        (SimpleChannelUpstreamHandler.java:70)
at org.jboss.netty.channel.DefaultChannelPipeline.sendUpstream(Default-
        ChannelPipeline.java:560)
at org.jboss.netty.channel.DefaultChannelPipeline.sendUpstream(Default-
        ChannelPipeline.java:555)
at
        org.jboss.netty.channel.Channels.fireMessageReceived(Channels.java:268)
at
        org.jboss.netty.channel.Channels.fireMessageReceived(Channels.java:255)
at org.jboss.netty.channel.socket.nio.NioWorker.read(NioWorker.java:88)
at org.jboss.netty.channel.socket.nio.AbstractNioWorker.process(Abstra-
        ctNioWorker.java:107)
at org.jboss.netty.channel.socket.nio.AbstractNioSelector.run(Abstract-
        NioSelector.java:312)
at org.jboss.netty.channel.socket.nio.AbstractNioWorker.run(AbstractNi-
        oWorker.java:88)
at org.jboss.netty.channel.socket.nio.NioWorker.run(NioWorker.java:178)
at org.jboss.netty.util.ThreadRenamingRunnable.run(ThreadRenamingRunna-
        ble.java:108)
at org.jboss.netty.util.internal.DeadLockProofWorker$1.run(DeadLockPro-
        ofWorker.java:42)
at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecuto-
        r.java:1152)
at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecut-
        or.java:622)
at java.lang.Thread.run(Thread.java:748)
Caused by: javax.net.ssl.SSLHandshakeException: Client requested protocol SSLv3
not enabled or not supported
at sun.security.ssl.Alerts.getSSLException(Alerts.java:192)
at sun.security.ssl.SSLEngineImpl.fatal(SSLEngineImpl.java:1611)
at sun.security.ssl.Handshaker.fatalSE(Handshaker.java:296)
at sun.security.ssl.Handshaker.fatalSE(Handshaker.java:284)
at sun.security.ssl.ServerHandshaker.clientHello(ServerHandshaker.java-
        :506)
at sun.security.ssl.ServerHandshaker.processMessage(ServerHandshaker.j-
        ava:222)
at sun.security.ssl.Handshaker.processLoop(Handshaker.java:997)
at sun.security.ssl.Handshaker$1.run(Handshaker.java:930)
at sun.security.ssl.Handshaker$1.run(Handshaker.java:928)
at java.security.AccessController.doPrivileged(Native Method)
at sun.security.ssl.Handshaker$DelegatedTask.run(Handshaker.java:1418)
at org.jboss.netty.handler.ssl.SslHandler$4.run(SslHandler.java:1348)
at org.jboss.netty.handler.ssl.ImmediateExecutor.execute(ImmediateExec-
        utor.java:31)
at org.jboss.netty.handler.ssl.SslHandler.runDelegatedTasks(SslHandler-
        .java:1345)
at org.jboss.netty.handler.ssl.SslHandler.unwrap(SslHandler.java:1232)
... 18 more
TLS/SSL events

Intercepted messages

No messages recorded, the TLS handshake failed.