googleapis / google-cloud-java

Google Cloud Client Library for Java
https://cloud.google.com/java/docs/reference
Apache License 2.0
1.9k stars 1.06k forks source link

Google tranlsate API certificate issue #7588

Closed navin6698 closed 2 years ago

navin6698 commented 3 years ago

Hi I'm using google translate API, first I faced issue for ClassNotFoundExceptions for the classes, later I learnt that it expects all the dependent jars to be available in classpath, After fixing that when I try to call google translate method, I'm getting certificate issue. Please let me know how I can proceed further.

I have added GOOGLE_APPLICATION_CREDENTIALS which points to my credentials file, while debugging I see the json is being parsed still I get No trusted certificate found.

Call stack:

Wed Jun 16 12:24:29 IST 2021 (T9) (Dispatcher:error): com.google.api.gax.rpc.UnavailableException: io.grpc.StatusRuntimeException: UNAVAILABLE: Credentials failed to obtain metadata
    at com.google.api.gax.rpc.ApiExceptionFactory.createException(ApiExceptionFactory.java:69)
    at com.google.api.gax.grpc.GrpcApiExceptionFactory.create(GrpcApiExceptionFactory.java:72)
    at com.google.api.gax.grpc.GrpcApiExceptionFactory.create(GrpcApiExceptionFactory.java:60)
    at com.google.api.gax.grpc.GrpcExceptionCallable$ExceptionTransformingFuture.onFailure(GrpcExceptionCallable.java:97)
    at com.google.api.core.ApiFutures$1.onFailure(ApiFutures.java:68)
    at com.google.common.util.concurrent.Futures$CallbackListener.run(Futures.java:1349)
    at com.google.common.util.concurrent.MoreExecutors$DirectExecutor.execute(MoreExecutors.java:398)
    at com.google.common.util.concurrent.AbstractFuture.executeListener(AbstractFuture.java:1024)
    at com.google.common.util.concurrent.AbstractFuture.complete(AbstractFuture.java:866)
    at com.google.common.util.concurrent.AbstractFuture.setException(AbstractFuture.java:711)
    at io.grpc.stub.ClientCalls$GrpcFuture.setException(ClientCalls.java:563)
    at io.grpc.stub.ClientCalls$UnaryStreamToFuture.onClose(ClientCalls.java:533)
    at io.grpc.internal.DelayedClientCall$DelayedListener$3.run(DelayedClientCall.java:463)
    at io.grpc.internal.DelayedClientCall$DelayedListener.delayOrExecute(DelayedClientCall.java:427)
    at io.grpc.internal.DelayedClientCall$DelayedListener.onClose(DelayedClientCall.java:460)
    at io.grpc.internal.ClientCallImpl.closeObserver(ClientCallImpl.java:553)
    at io.grpc.internal.ClientCallImpl.access$300(ClientCallImpl.java:68)
    at io.grpc.internal.ClientCallImpl$ClientStreamListenerImpl$1StreamClosed.runInternal(ClientCallImpl.java:739)
    at io.grpc.internal.ClientCallImpl$ClientStreamListenerImpl$1StreamClosed.runInContext(ClientCallImpl.java:718)
    at io.grpc.internal.ContextRunnable.run(ContextRunnable.java:37)
    at io.grpc.internal.SerializingExecutor.run(SerializingExecutor.java:123)
    at java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:511)
    at java.util.concurrent.FutureTask.run(FutureTask.java:266)
    at java.util.concurrent.ScheduledThreadPoolExecutor$ScheduledFutureTask.access$201(ScheduledThreadPoolExecutor.java:180)
    at java.util.concurrent.ScheduledThreadPoolExecutor$ScheduledFutureTask.run(ScheduledThreadPoolExecutor.java:293)
    at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1149)
    at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:624)
    at java.lang.Thread.run(Thread.java:748)
    Suppressed: com.google.api.gax.rpc.AsyncTaskException: Asynchronous task failed
        at com.google.api.gax.rpc.ApiExceptions.callAndTranslateApiException(ApiExceptions.java:57)
        at com.google.api.gax.rpc.UnaryCallable.call(UnaryCallable.java:112)
        at com.google.cloud.translate.v3.TranslationServiceClient.translateText(TranslationServiceClient.java:418)
    at io.grpc.Status.asRuntimeException(Status.java:535)
    ... 17 more
Caused by: java.io.IOException: Error getting access token for service account: sun.security.validator.ValidatorException: No trusted certificate found
    at com.google.auth.oauth2.ServiceAccountCredentials.refreshAccessToken(ServiceAccountCredentials.java:612)
    at com.google.auth.oauth2.OAuth2Credentials.refresh(OAuth2Credentials.java:164)
    at com.google.auth.oauth2.OAuth2Credentials.getRequestMetadata(OAuth2Credentials.java:149)
    at com.google.auth.oauth2.ServiceAccountCredentials.getRequestMetadata(ServiceAccountCredentials.java:946)
    at com.google.auth.Credentials.blockingGetToCallback(Credentials.java:112)
    at com.google.auth.Credentials$1.run(Credentials.java:98)
    ... 7 more
Caused by: javax.net.ssl.SSLHandshakeException: sun.security.validator.ValidatorException: No trusted certificate found
    at sun.security.ssl.Alerts.getSSLException(Alerts.java:192)
    at sun.security.ssl.SSLSocketImpl.fatal(SSLSocketImpl.java:1946)
    at sun.security.ssl.Handshaker.fatalSE(Handshaker.java:316)
    at sun.security.ssl.Handshaker.fatalSE(Handshaker.java:310)
    at sun.security.ssl.ClientHandshaker.serverCertificate(ClientHandshaker.java:1639)
    at sun.security.ssl.ClientHandshaker.processMessage(ClientHandshaker.java:223)
    at sun.security.ssl.Handshaker.processLoop(Handshaker.java:1037)
    at sun.security.ssl.Handshaker.process_record(Handshaker.java:965)
    at sun.security.ssl.SSLSocketImpl.readRecord(SSLSocketImpl.java:1064)
    at sun.security.ssl.SSLSocketImpl.performInitialHandshake(SSLSocketImpl.java:1367)
    at sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:1395)
    at sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:1379)
    at sun.net.www.protocol.https.HttpsClient.afterConnect(HttpsClient.java:559)
    at sun.net.www.protocol.https.AbstractDelegateHttpsURLConnection.connect(AbstractDelegateHttpsURLConnection.java:185)
    at sun.net.www.protocol.http.HttpURLConnection.getOutputStream0(HttpURLConnection.java:1334)
    at sun.net.www.protocol.http.HttpURLConnection.getOutputStream(HttpURLConnection.java:1309)
    at sun.net.www.protocol.https.HttpsURLConnectionImpl.getOutputStream(HttpsURLConnectionImpl.java:259)
    at com.google.api.client.http.javanet.NetHttpRequest.execute(NetHttpRequest.java:113)
    at com.google.api.client.http.javanet.NetHttpRequest.execute(NetHttpRequest.java:84)
    at com.google.api.client.http.HttpRequest.execute(HttpRequest.java:1012)
    at com.google.auth.oauth2.ServiceAccountCredentials.refreshAccessToken(ServiceAccountCredentials.java:609)
    ... 12 more
Caused by: sun.security.validator.ValidatorException: No trusted certificate found
    at sun.security.validator.SimpleValidator.buildTrustedChain(SimpleValidator.java:397)
    at sun.security.validator.SimpleValidator.engineValidate(SimpleValidator.java:134)
    at sun.security.validator.Validator.validate(Validator.java:262)
    at sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:330)
    at sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:237)
    at sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:132)
    at sun.security.ssl.ClientHandshaker.serverCertificate(ClientHandshaker.java:1621)
    ... 28 more
TimurSadykov commented 3 years ago

@navin6698 It looks like SSL is not enabled, but auth endpoint requires it. Please try adding -Djavax.net.debug=ssl when debugging

navin6698 commented 3 years ago

Hi @TimurSadykov , i have added to -Djavax.net.debug=ssl:handshake:verboto jvm args now I'm getting this:

javax.net.ssl|FINE|6D|Gax-14|2021-06-17 09:15:25.271 IST|Utilities.java:73|the previous server name in SNI (type=host_name (0), value=oauth2.googleapis.com) was replaced with (type=host_name (0), value=oauth2.googleapis.com) javax.net.ssl|FINE|6D|Gax-14|2021-06-17 09:15:25.273 IST|SSLExtensions.java:259|Ignore, context unavailable extension: status_request javax.net.ssl|INFO|6D|Gax-14|2021-06-17 09:15:25.274 IST|AlpnExtension.java:161|No available application protocols javax.net.ssl|FINE|6D|Gax-14|2021-06-17 09:15:25.274 IST|SSLExtensions.java:259|Ignore, context unavailable extension: application_layer_protocol_negotiation javax.net.ssl|FINE|6D|Gax-14|2021-06-17 09:15:25.274 IST|SSLExtensions.java:259|Ignore, context unavailable extension: status_request_v2 javax.net.ssl|FINE|6D|Gax-14|2021-06-17 09:15:25.274 IST|SSLExtensions.java:259|Ignore, context unavailable extension: renegotiation_info javax.net.ssl|FINE|6D|Gax-14|2021-06-17 09:15:25.274 IST|ClientHello.java:567|Produced ClientHello handshake message ( "ClientHello": { "client version" : "TLSv1.2", "random" : "19 5B 14 BB 29 23 51 E9 AF 00 CD DB 85 D0 57 E5 B5 2F D8 8C 68 A7 C6 56 83 46 9A AE 9F 82 25 79", "session id" : "", "cipher suites" : "[TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_RSA_WITH_AES_256_GCM_SHA384(0x009D), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_RSA_WITH_AES_128_GCM_SHA256(0x009C), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_RSA_WITH_AES_256_CBC_SHA256(0x003D), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA(0xC00A), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA(0xC014), TLS_RSA_WITH_AES_256_CBC_SHA(0x0035), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA(0xC005), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA(0xC00F), TLS_DHE_RSA_WITH_AES_256_CBC_SHA(0x0039), TLS_DHE_DSS_WITH_AES_256_CBC_SHA(0x0038), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_RSA_WITH_AES_128_CBC_SHA256(0x003C), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA(0xC009), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA(0xC013), TLS_RSA_WITH_AES_128_CBC_SHA(0x002F), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA(0xC004), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA(0xC00E), TLS_DHE_RSA_WITH_AES_128_CBC_SHA(0x0033), TLS_DHE_DSS_WITH_AES_128_CBC_SHA(0x0032), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]", "compression methods" : "00", "extensions" : [ "supported_groups (10)": { "versions": [secp256r1, secp384r1, secp521r1, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192] }, "ec_point_formats (11)": { "formats": [uncompressed] }, "signature_algorithms (13)": { "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1] }, "signature_algorithms_cert (50)": { "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1] }, "extended_master_secret (23)": {

}, "supported_versions (43)": { "versions": [TLSv1.2] } ] } ) javax.net.ssl|FINE|6D|Gax-14|2021-06-17 09:15:25.441 IST|ServerHello.java:867|Consuming ServerHello handshake message ( "ServerHello": { "server version" : "TLSv1.2", "random" : "60 CA C5 56 7A 66 73 65 DB BD A6 BC 4F BC 91 90 94 73 73 A6 FA B0 22 34 44 4F 57 4E 47 52 44 01", "session id" : "E2 9A 3B 65 49 07 F6 99 07 F9 8A 6F 8D 76 10 DE B4 53 B9 30 DF C5 EF 4F 76 E0 4B 44 FA 09 AC 7C", "cipher suite" : "TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F)", "compression methods" : "00", "extensions" : [ "extended_master_secret (23)": { }, "renegotiation_info (65,281)": { "renegotiated connection": [] }, "ec_point_formats (11)": { "formats": [uncompressed] } ] } ) javax.net.ssl|FINE|6D|Gax-14|2021-06-17 09:15:25.441 IST|SSLExtensions.java:172|Ignore unavailable extension: supported_versions javax.net.ssl|FINE|6D|Gax-14|2021-06-17 09:15:25.441 IST|ServerHello.java:958|Negotiated protocol version: TLSv1.2 javax.net.ssl|FINE|6D|Gax-14|2021-06-17 09:15:25.441 IST|SSLExtensions.java:191|Consumed extension: renegotiation_info javax.net.ssl|FINE|6D|Gax-14|2021-06-17 09:15:25.442 IST|SSLExtensions.java:172|Ignore unavailable extension: server_name javax.net.ssl|FINE|6D|Gax-14|2021-06-17 09:15:25.442 IST|SSLExtensions.java:172|Ignore unavailable extension: max_fragment_length javax.net.ssl|FINE|6D|Gax-14|2021-06-17 09:15:25.442 IST|SSLExtensions.java:172|Ignore unavailable extension: status_request javax.net.ssl|FINE|6D|Gax-14|2021-06-17 09:15:25.442 IST|SSLExtensions.java:191|Consumed extension: ec_point_formats javax.net.ssl|FINE|6D|Gax-14|2021-06-17 09:15:25.442 IST|SSLExtensions.java:172|Ignore unavailable extension: status_request_v2 javax.net.ssl|FINE|6D|Gax-14|2021-06-17 09:15:25.442 IST|SSLExtensions.java:191|Consumed extension: extended_master_secret javax.net.ssl|FINE|6D|Gax-14|2021-06-17 09:15:25.442 IST|SSLExtensions.java:191|Consumed extension: renegotiation_info javax.net.ssl|FINE|6D|Gax-14|2021-06-17 09:15:25.442 IST|SSLExtensions.java:206|Ignore unavailable extension: server_name javax.net.ssl|FINE|6D|Gax-14|2021-06-17 09:15:25.442 IST|SSLExtensions.java:206|Ignore unavailable extension: max_fragment_length javax.net.ssl|FINE|6D|Gax-14|2021-06-17 09:15:25.443 IST|SSLExtensions.java:206|Ignore unavailable extension: status_request javax.net.ssl|WARNING|6D|Gax-14|2021-06-17 09:15:25.443 IST|SSLExtensions.java:214|Ignore impact of unsupported extension: ec_point_formats javax.net.ssl|FINE|6D|Gax-14|2021-06-17 09:15:25.443 IST|SSLExtensions.java:206|Ignore unavailable extension: application_layer_protocol_negotiation javax.net.ssl|FINE|6D|Gax-14|2021-06-17 09:15:25.443 IST|SSLExtensions.java:206|Ignore unavailable extension: status_request_v2 javax.net.ssl|WARNING|6D|Gax-14|2021-06-17 09:15:25.443 IST|SSLExtensions.java:214|Ignore impact of unsupported extension: extended_master_secret javax.net.ssl|WARNING|6D|Gax-14|2021-06-17 09:15:25.443 IST|SSLExtensions.java:214|Ignore impact of unsupported extension: renegotiation_info javax.net.ssl|FINE|6D|Gax-14|2021-06-17 09:15:25.444 IST|CertificateMessage.java:364|Consuming server Certificate handshake message ( "Certificates": [ "certificate" : { "version" : "v3", "serial number" : "00 90 76 89 18 E9 33 93 A0", "signature algorithm": "SHA256withRSA", "issuer" : "CN=invalid2.invalid, OU="No SNI provided; please fix your client."", "not before" : "2015-01-01 05:30:00.000 IST", "not after" : "2030-01-01 05:30:00.000 IST", "subject" : "CN=invalid2.invalid, OU="No SNI provided; please fix your client."", "subject public key" : "RSA", "extensions" : [ { ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:true PathLen:2147483647 ] }, { ObjectId: 2.5.29.37 Criticality=false ExtendedKeyUsages [ serverAuth clientAuth ] }, { ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_Encipherment Key_CertSign ] }, { ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: BB 0F 38 96 6F 3E BE 4F 2B 46 D0 41 6A D4 AC B5 ..8.o>.O+F.Aj... ] ] } ]} ] ) javax.net.ssl|SEVERE|6D|Gax-14|2021-06-17 09:15:25.444 IST|TransportContext.java:362|Fatal (CERTIFICATE_UNKNOWN): sun.security.validator.ValidatorException: No trusted certificate found ( "throwable" : { sun.security.validator.ValidatorException: No trusted certificate found at sun.security.validator.SimpleValidator.buildTrustedChain(SimpleValidator.java:398) at sun.security.validator.SimpleValidator.engineValidate(SimpleValidator.java:135) at sun.security.validator.Validator.validate(Validator.java:271) at sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:312) at sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:221) at sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:128) at sun.security.ssl.CertificateMessage$T12CertificateConsumer.checkServerCerts(CertificateMessage.java:636) at sun.security.ssl.CertificateMessage$T12CertificateConsumer.onCertificate(CertificateMessage.java:471) at sun.security.ssl.CertificateMessage$T12CertificateConsumer.consume(CertificateMessage.java:367) at sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:376) at sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:479) at sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:457) at sun.security.ssl.TransportContext.dispatch(TransportContext.java:200) at sun.security.ssl.SSLTransport.decode(SSLTransport.java:154) at sun.security.ssl.SSLSocketImpl.decode(SSLSocketImpl.java:1290) at sun.security.ssl.SSLSocketImpl.readHandshakeRecord(SSLSocketImpl.java:1199) at sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:401) at sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:373) at sun.net.www.protocol.https.HttpsClient.afterConnect(HttpsClient.java:587) at sun.net.www.protocol.https.AbstractDelegateHttpsURLConnection.connect(AbstractDelegateHttpsURLConnection.java:197) at sun.net.www.protocol.http.HttpURLConnection.getOutputStream0(HttpURLConnection.java:1340) at sun.net.www.protocol.http.HttpURLConnection.getOutputStream(HttpURLConnection.java:1315) at sun.net.www.protocol.https.HttpsURLConnectionImpl.getOutputStream(HttpsURLConnectionImpl.java:264) at com.google.api.client.http.javanet.NetHttpRequest.execute(NetHttpRequest.java:113) at com.google.api.client.http.javanet.NetHttpRequest.execute(NetHttpRequest.java:84) at com.google.api.client.http.HttpRequest.execute(HttpRequest.java:1012) at com.google.auth.oauth2.ServiceAccountCredentials.refreshAccessToken(ServiceAccountCredentials.java:609) at com.google.auth.oauth2.OAuth2Credentials.refresh(OAuth2Credentials.java:164) at com.google.auth.oauth2.OAuth2Credentials.getRequestMetadata(OAuth2Credentials.java:149) at com.google.auth.oauth2.ServiceAccountCredentials.getRequestMetadata(ServiceAccountCredentials.java:946) at com.google.auth.Credentials.blockingGetToCallback(Credentials.java:112) at com.google.auth.Credentials$1.run(Credentials.java:98) at java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:511) at java.util.concurrent.FutureTask.run(FutureTask.java:266) at java.util.concurrent.ScheduledThreadPoolExecutor$ScheduledFutureTask.access$201(ScheduledThreadPoolExecutor.java:180) at java.util.concurrent.ScheduledThreadPoolExecutor$ScheduledFutureTask.run(ScheduledThreadPoolExecutor.java:293) at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1149) at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:624) at java.lang.Thread.run(Thread.java:748)} ) javax.net.ssl|FINE|6D|Gax-14|2021-06-17 09:15:25.444 IST|SSLSocketImpl.java:1510|close the underlying socket javax.net.ssl|FINE|6D|Gax-14|2021-06-17 09:15:25.444 IST|SSLSocketImpl.java:1529|close the SSL connection (initiative) javax.net.ssl|FINE|6D|Gax-14|2021-06-17 09:15:26.141 IST|Utilities.java:73|the previous server name in SNI (type=host_name (0), value=oauth2.googleapis.com) was replaced with (type=host_name (0), value=oauth2.googleapis.com) javax.net.ssl|FINE|6D|Gax-14|2021-06-17 09:15:26.144 IST|SSLExtensions.java:259|Ignore, context unavailable extension: status_request javax.net.ssl|INFO|6D|Gax-14|2021-06-17 09:15:26.144 IST|AlpnExtension.java:161|No available application protocols javax.net.ssl|FINE|6D|Gax-14|2021-06-17 09:15:26.144 IST|SSLExtensions.java:259|Ignore, context unavailable extension: application_layer_protocol_negotiation javax.net.ssl|FINE|6D|Gax-14|2021-06-17 09:15:26.144 IST|SSLExtensions.java:259|Ignore, context unavailable extension: status_request_v2 javax.net.ssl|FINE|6D|Gax-14|2021-06-17 09:15:26.145 IST|SSLExtensions.java:259|Ignore, context unavailable extension: renegotiation_info javax.net.ssl|FINE|6D|Gax-14|2021-06-17 09:15:26.145 IST|ClientHello.java:567|Produced ClientHello handshake message ( "ClientHello": { "client version" : "TLSv1.2", "random" : "9F B0 E9 A5 F8 42 0A 87 A6 63 BA B1 F1 FF 8E 39 DC 0C 18 D1 8E D2 F0 17 3C C9 84 CF 86 AF 25 09", "session id" : "", "cipher suites" : "[TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_RSA_WITH_AES_256_GCM_SHA384(0x009D), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_RSA_WITH_AES_128_GCM_SHA256(0x009C), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_RSA_WITH_AES_256_CBC_SHA256(0x003D), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA(0xC00A), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA(0xC014), TLS_RSA_WITH_AES_256_CBC_SHA(0x0035), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA(0xC005), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA(0xC00F), TLS_DHE_RSA_WITH_AES_256_CBC_SHA(0x0039), TLS_DHE_DSS_WITH_AES_256_CBC_SHA(0x0038), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_RSA_WITH_AES_128_CBC_SHA256(0x003C), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA(0xC009), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA(0xC013), TLS_RSA_WITH_AES_128_CBC_SHA(0x002F), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA(0xC004), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA(0xC00E), TLS_DHE_RSA_WITH_AES_128_CBC_SHA(0x0033), TLS_DHE_DSS_WITH_AES_128_CBC_SHA(0x0032), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]", "compression methods" : "00", "extensions" : [ "supported_groups (10)": { "versions": [secp256r1, secp384r1, secp521r1, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192] }, "ec_point_formats (11)": { "formats": [uncompressed] }, "signature_algorithms (13)": { "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1] }, "signature_algorithms_cert (50)": { "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1] }, "extended_master_secret (23)": { }, "supported_versions (43)": { "versions": [TLSv1.2] } ] } ) javax.net.ssl|FINE|6D|Gax-14|2021-06-17 09:15:26.302 IST|ServerHello.java:867|Consuming ServerHello handshake message ( "ServerHello": { "server version" : "TLSv1.2", "random" : "60 CA C5 56 56 F5 60 6F 1B C0 0A F7 DE F3 D4 7C B7 7E 1B BE 49 B5 79 0C 44 4F 57 4E 47 52 44 01", "session id" : "19 98 CC CF 71 83 0B E6 C2 6D 6A E3 D4 1E 6C DC DD 66 76 7B C0 16 66 5E 87 34 A9 96 63 44 66 F5", "cipher suite" : "TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F)", "compression methods" : "00", "extensions" : [ "extended_master_secret (23)": { }, "renegotiation_info (65,281)": { "renegotiated connection": [] }, "ec_point_formats (11)": { "formats": [uncompressed] } ] }
navin6698 commented 3 years ago

Hi @TimurSadykov , i have added to -Djavax.net.debug=ssl:handshake:verboto jvm args now I'm getting this:

javax.net.ssl|FINE|6D|Gax-14|2021-06-17 09:15:25.271 IST|Utilities.java:73|the previous server name in SNI (type=host_name (0), value=oauth2.googleapis.com) was replaced with (type=host_name (0), value=oauth2.googleapis.com) javax.net.ssl|FINE|6D|Gax-14|2021-06-17 09:15:25.273 IST|SSLExtensions.java:259|Ignore, context unavailable extension: status_request javax.net.ssl|INFO|6D|Gax-14|2021-06-17 09:15:25.274 IST|AlpnExtension.java:161|No available application protocols javax.net.ssl|FINE|6D|Gax-14|2021-06-17 09:15:25.274 IST|SSLExtensions.java:259|Ignore, context unavailable extension: application_layer_protocol_negotiation javax.net.ssl|FINE|6D|Gax-14|2021-06-17 09:15:25.274 IST|SSLExtensions.java:259|Ignore, context unavailable extension: status_request_v2 javax.net.ssl|FINE|6D|Gax-14|2021-06-17 09:15:25.274 IST|SSLExtensions.java:259|Ignore, context unavailable extension: renegotiation_info javax.net.ssl|FINE|6D|Gax-14|2021-06-17 09:15:25.274 IST|ClientHello.java:567|Produced ClientHello handshake message ( "ClientHello": { "client version" : "TLSv1.2", "random" : "19 5B 14 BB 29 23 51 E9 AF 00 CD DB 85 D0 57 E5 B5 2F D8 8C 68 A7 C6 56 83 46 9A AE 9F 82 25 79", "session id" : "", "cipher suites" : "[TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_RSA_WITH_AES_256_GCM_SHA384(0x009D), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_RSA_WITH_AES_128_GCM_SHA256(0x009C), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_RSA_WITH_AES_256_CBC_SHA256(0x003D), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA(0xC00A), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA(0xC014), TLS_RSA_WITH_AES_256_CBC_SHA(0x0035), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA(0xC005), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA(0xC00F), TLS_DHE_RSA_WITH_AES_256_CBC_SHA(0x0039), TLS_DHE_DSS_WITH_AES_256_CBC_SHA(0x0038), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_RSA_WITH_AES_128_CBC_SHA256(0x003C), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA(0xC009), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA(0xC013), TLS_RSA_WITH_AES_128_CBC_SHA(0x002F), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA(0xC004), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA(0xC00E), TLS_DHE_RSA_WITH_AES_128_CBC_SHA(0x0033), TLS_DHE_DSS_WITH_AES_128_CBC_SHA(0x0032), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]", "compression methods" : "00", "extensions" : [ "supported_groups (10)": { "versions": [secp256r1, secp384r1, secp521r1, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192] }, "ec_point_formats (11)": { "formats": [uncompressed] }, "signature_algorithms (13)": { "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1] }, "signature_algorithms_cert (50)": { "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1] }, "extended_master_secret (23)": {

}, "supported_versions (43)": { "versions": [TLSv1.2] } ] } ) javax.net.ssl|FINE|6D|Gax-14|2021-06-17 09:15:25.441 IST|ServerHello.java:867|Consuming ServerHello handshake message ( "ServerHello": { "server version" : "TLSv1.2", "random" : "60 CA C5 56 7A 66 73 65 DB BD A6 BC 4F BC 91 90 94 73 73 A6 FA B0 22 34 44 4F 57 4E 47 52 44 01", "session id" : "E2 9A 3B 65 49 07 F6 99 07 F9 8A 6F 8D 76 10 DE B4 53 B9 30 DF C5 EF 4F 76 E0 4B 44 FA 09 AC 7C", "cipher suite" : "TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F)", "compression methods" : "00", "extensions" : [ "extended_master_secret (23)": { }, "renegotiation_info (65,281)": { "renegotiated connection": [] }, "ec_point_formats (11)": { "formats": [uncompressed] } ] } ) javax.net.ssl|FINE|6D|Gax-14|2021-06-17 09:15:25.441 IST|SSLExtensions.java:172|Ignore unavailable extension: supported_versions javax.net.ssl|FINE|6D|Gax-14|2021-06-17 09:15:25.441 IST|ServerHello.java:958|Negotiated protocol version: TLSv1.2 javax.net.ssl|FINE|6D|Gax-14|2021-06-17 09:15:25.441 IST|SSLExtensions.java:191|Consumed extension: renegotiation_info javax.net.ssl|FINE|6D|Gax-14|2021-06-17 09:15:25.442 IST|SSLExtensions.java:172|Ignore unavailable extension: server_name javax.net.ssl|FINE|6D|Gax-14|2021-06-17 09:15:25.442 IST|SSLExtensions.java:172|Ignore unavailable extension: max_fragment_length javax.net.ssl|FINE|6D|Gax-14|2021-06-17 09:15:25.442 IST|SSLExtensions.java:172|Ignore unavailable extension: status_request javax.net.ssl|FINE|6D|Gax-14|2021-06-17 09:15:25.442 IST|SSLExtensions.java:191|Consumed extension: ec_point_formats javax.net.ssl|FINE|6D|Gax-14|2021-06-17 09:15:25.442 IST|SSLExtensions.java:172|Ignore unavailable extension: status_request_v2 javax.net.ssl|FINE|6D|Gax-14|2021-06-17 09:15:25.442 IST|SSLExtensions.java:191|Consumed extension: extended_master_secret javax.net.ssl|FINE|6D|Gax-14|2021-06-17 09:15:25.442 IST|SSLExtensions.java:191|Consumed extension: renegotiation_info javax.net.ssl|FINE|6D|Gax-14|2021-06-17 09:15:25.442 IST|SSLExtensions.java:206|Ignore unavailable extension: server_name javax.net.ssl|FINE|6D|Gax-14|2021-06-17 09:15:25.442 IST|SSLExtensions.java:206|Ignore unavailable extension: max_fragment_length javax.net.ssl|FINE|6D|Gax-14|2021-06-17 09:15:25.443 IST|SSLExtensions.java:206|Ignore unavailable extension: status_request javax.net.ssl|WARNING|6D|Gax-14|2021-06-17 09:15:25.443 IST|SSLExtensions.java:214|Ignore impact of unsupported extension: ec_point_formats javax.net.ssl|FINE|6D|Gax-14|2021-06-17 09:15:25.443 IST|SSLExtensions.java:206|Ignore unavailable extension: application_layer_protocol_negotiation javax.net.ssl|FINE|6D|Gax-14|2021-06-17 09:15:25.443 IST|SSLExtensions.java:206|Ignore unavailable extension: status_request_v2 javax.net.ssl|WARNING|6D|Gax-14|2021-06-17 09:15:25.443 IST|SSLExtensions.java:214|Ignore impact of unsupported extension: extended_master_secret javax.net.ssl|WARNING|6D|Gax-14|2021-06-17 09:15:25.443 IST|SSLExtensions.java:214|Ignore impact of unsupported extension: renegotiation_info javax.net.ssl|FINE|6D|Gax-14|2021-06-17 09:15:25.444 IST|CertificateMessage.java:364|Consuming server Certificate handshake message ( "Certificates": [ "certificate" : { "version" : "v3", "serial number" : "00 90 76 89 18 E9 33 93 A0", "signature algorithm": "SHA256withRSA", "issuer" : "CN=invalid2.invalid, OU="No SNI provided; please fix your client."", "not before" : "2015-01-01 05:30:00.000 IST", "not after" : "2030-01-01 05:30:00.000 IST", "subject" : "CN=invalid2.invalid, OU="No SNI provided; please fix your client."", "subject public key" : "RSA", "extensions" : [ { ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:true PathLen:2147483647 ] }, { ObjectId: 2.5.29.37 Criticality=false ExtendedKeyUsages [ serverAuth clientAuth ] }, { ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_Encipherment Key_CertSign ] }, { ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: BB 0F 38 96 6F 3E BE 4F 2B 46 D0 41 6A D4 AC B5 ..8.o>.O+F.Aj... ] ] } ]} ] ) javax.net.ssl|SEVERE|6D|Gax-14|2021-06-17 09:15:25.444 IST|TransportContext.java:362|Fatal (CERTIFICATE_UNKNOWN): sun.security.validator.ValidatorException: No trusted certificate found ( "throwable" : { sun.security.validator.ValidatorException: No trusted certificate found at sun.security.validator.SimpleValidator.buildTrustedChain(SimpleValidator.java:398) at sun.security.validator.SimpleValidator.engineValidate(SimpleValidator.java:135) at sun.security.validator.Validator.validate(Validator.java:271) at sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:312) at sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:221) at sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:128) at sun.security.ssl.CertificateMessage$T12CertificateConsumer.checkServerCerts(CertificateMessage.java:636) at sun.security.ssl.CertificateMessage$T12CertificateConsumer.onCertificate(CertificateMessage.java:471) at sun.security.ssl.CertificateMessage$T12CertificateConsumer.consume(CertificateMessage.java:367) at sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:376) at sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:479) at sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:457) at sun.security.ssl.TransportContext.dispatch(TransportContext.java:200) at sun.security.ssl.SSLTransport.decode(SSLTransport.java:154) at sun.security.ssl.SSLSocketImpl.decode(SSLSocketImpl.java:1290) at sun.security.ssl.SSLSocketImpl.readHandshakeRecord(SSLSocketImpl.java:1199) at sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:401) at sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:373) at sun.net.www.protocol.https.HttpsClient.afterConnect(HttpsClient.java:587) at sun.net.www.protocol.https.AbstractDelegateHttpsURLConnection.connect(AbstractDelegateHttpsURLConnection.java:197) at sun.net.www.protocol.http.HttpURLConnection.getOutputStream0(HttpURLConnection.java:1340) at sun.net.www.protocol.http.HttpURLConnection.getOutputStream(HttpURLConnection.java:1315) at sun.net.www.protocol.https.HttpsURLConnectionImpl.getOutputStream(HttpsURLConnectionImpl.java:264) at com.google.api.client.http.javanet.NetHttpRequest.execute(NetHttpRequest.java:113) at com.google.api.client.http.javanet.NetHttpRequest.execute(NetHttpRequest.java:84) at com.google.api.client.http.HttpRequest.execute(HttpRequest.java:1012) at com.google.auth.oauth2.ServiceAccountCredentials.refreshAccessToken(ServiceAccountCredentials.java:609) at com.google.auth.oauth2.OAuth2Credentials.refresh(OAuth2Credentials.java:164) at com.google.auth.oauth2.OAuth2Credentials.getRequestMetadata(OAuth2Credentials.java:149) at com.google.auth.oauth2.ServiceAccountCredentials.getRequestMetadata(ServiceAccountCredentials.java:946) at com.google.auth.Credentials.blockingGetToCallback(Credentials.java:112) at com.google.auth.Credentials$1.run(Credentials.java:98) at java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:511) at java.util.concurrent.FutureTask.run(FutureTask.java:266) at java.util.concurrent.ScheduledThreadPoolExecutor$ScheduledFutureTask.access$201(ScheduledThreadPoolExecutor.java:180) at java.util.concurrent.ScheduledThreadPoolExecutor$ScheduledFutureTask.run(ScheduledThreadPoolExecutor.java:293) at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1149) at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:624) at java.lang.Thread.run(Thread.java:748)} ) javax.net.ssl|FINE|6D|Gax-14|2021-06-17 09:15:25.444 IST|SSLSocketImpl.java:1510|close the underlying socket javax.net.ssl|FINE|6D|Gax-14|2021-06-17 09:15:25.444 IST|SSLSocketImpl.java:1529|close the SSL connection (initiative) javax.net.ssl|FINE|6D|Gax-14|2021-06-17 09:15:26.141 IST|Utilities.java:73|the previous server name in SNI (type=host_name (0), value=oauth2.googleapis.com) was replaced with (type=host_name (0), value=oauth2.googleapis.com) javax.net.ssl|FINE|6D|Gax-14|2021-06-17 09:15:26.144 IST|SSLExtensions.java:259|Ignore, context unavailable extension: status_request javax.net.ssl|INFO|6D|Gax-14|2021-06-17 09:15:26.144 IST|AlpnExtension.java:161|No available application protocols javax.net.ssl|FINE|6D|Gax-14|2021-06-17 09:15:26.144 IST|SSLExtensions.java:259|Ignore, context unavailable extension: application_layer_protocol_negotiation javax.net.ssl|FINE|6D|Gax-14|2021-06-17 09:15:26.144 IST|SSLExtensions.java:259|Ignore, context unavailable extension: status_request_v2 javax.net.ssl|FINE|6D|Gax-14|2021-06-17 09:15:26.145 IST|SSLExtensions.java:259|Ignore, context unavailable extension: renegotiation_info javax.net.ssl|FINE|6D|Gax-14|2021-06-17 09:15:26.145 IST|ClientHello.java:567|Produced ClientHello handshake message ( "ClientHello": { "client version" : "TLSv1.2", "random" : "9F B0 E9 A5 F8 42 0A 87 A6 63 BA B1 F1 FF 8E 39 DC 0C 18 D1 8E D2 F0 17 3C C9 84 CF 86 AF 25 09", "session id" : "", "cipher suites" : "[TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_RSA_WITH_AES_256_GCM_SHA384(0x009D), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_RSA_WITH_AES_128_GCM_SHA256(0x009C), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_RSA_WITH_AES_256_CBC_SHA256(0x003D), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA(0xC00A), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA(0xC014), TLS_RSA_WITH_AES_256_CBC_SHA(0x0035), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA(0xC005), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA(0xC00F), TLS_DHE_RSA_WITH_AES_256_CBC_SHA(0x0039), TLS_DHE_DSS_WITH_AES_256_CBC_SHA(0x0038), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_RSA_WITH_AES_128_CBC_SHA256(0x003C), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA(0xC009), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA(0xC013), TLS_RSA_WITH_AES_128_CBC_SHA(0x002F), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA(0xC004), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA(0xC00E), TLS_DHE_RSA_WITH_AES_128_CBC_SHA(0x0033), TLS_DHE_DSS_WITH_AES_128_CBC_SHA(0x0032), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]", "compression methods" : "00", "extensions" : [ "supported_groups (10)": { "versions": [secp256r1, secp384r1, secp521r1, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192] }, "ec_point_formats (11)": { "formats": [uncompressed] }, "signature_algorithms (13)": { "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1] }, "signature_algorithms_cert (50)": { "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1] }, "extended_master_secret (23)": { }, "supported_versions (43)": { "versions": [TLSv1.2] } ] } ) javax.net.ssl|FINE|6D|Gax-14|2021-06-17 09:15:26.302 IST|ServerHello.java:867|Consuming ServerHello handshake message ( "ServerHello": { "server version" : "TLSv1.2", "random" : "60 CA C5 56 56 F5 60 6F 1B C0 0A F7 DE F3 D4 7C B7 7E 1B BE 49 B5 79 0C 44 4F 57 4E 47 52 44 01", "session id" : "19 98 CC CF 71 83 0B E6 C2 6D 6A E3 D4 1E 6C DC DD 66 76 7B C0 16 66 5E 87 34 A9 96 63 44 66 F5", "cipher suite" : "TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F)", "compression methods" : "00", "extensions" : [ "extended_master_secret (23)": { }, "renegotiation_info (65,281)": { "renegotiated connection": [] }, "ec_point_formats (11)": { "formats": [uncompressed] } ] }
meredithslota commented 2 years ago

Hi there! If this issue is still present, can you please file an updated issue here? https://github.com/googleapis/java-translate There have been a number of fixes in the library since this issue was filed, so hopefully you are no longer seeing this.