Closed glassfishrobot closed 13 years ago
Reported by anand_mishra
jdg6688 said: Please when you file an issue with an QA test fall, don't just copy and paste the stack trace. Provide the following information at minimal:
1. Is it an regression.
2. When did you start to see the fail.
3. With which builds of Metro and Glassfish you tested it start to fail.
4. Test with the latest Hudson build for Metro before you file the issue
5. Check if you have filed the same issue before.
anand_mishra said: Issues which i had filed are Metro 2.1 regressions.
As we have started analyzing the results recently, build in which i have see these issue first is b18 of metro, before that the test execution for test run was not stable as we have shifted to Hundson from Test4u for Metro2.1.
These issues i have filed on the basis of b19 of metro.
Please let me know if you need more info issues or any other help
jdg6688 said: The stack trace is for which case.
You listed 3 test cases failed. Can you attached the stack trace fro each of the 3 cases and indicate clearly which is for which.
jdg6688 said: The issue is fixed and verified with .Net 3.5 endpoint.
For the .Net 4.0 endpoint, one need to configure for the audience URI:
System.IdentityModel.Tokens.SecurityTokenException: The AudienceUri in the SamlAssertion cannot be validated. This can be resolved by making configuration changes to the 'issuedTokenAuthentication' element in the 'serviceBehaviors' section. You can add valid uris using the 'allowedAudienceUris' element. This check can also be changed using the 'audienceUriMode' attribute. At runtime setting the IssuedTokenAuthentication object's properties: AllowedAudienceUris and AudienceUriMode will have similar results.
Was assigned to anand_mishra
This issue was imported from java.net JIRA WSIT-1511
Marked as fixed on Monday, December 20th 2010, 1:18:47 am
Scenario
Interop Scenario 1 jsr109interop-s-m-m Interop Scenario 1 interop-s-s-m Interop Scenario 1 interop-s-m-m
SOAP LOG
trying MS server.... Dec 9, 2010 8:29:54 PM [com.sun.xml.ws.policy.parser.PolicyConfigParser] parse INFO: WSP5018: Loaded WSIT configuration from file: file:/home/test4u/anand/tango-3.5/tango/qe-tests/wstrust/interop/src/scenario1-s-m/etc/client-config/wsit-client.xml. Service URL=https://yinyang.india.sun.com:443/Security_Federation_FederatedService_Indigo/Symmetric.svc/Scenario_1_IssuedTokenOverTransport_UsernameOverTransport STS URL=https://null:nullnull Dec 9, 2010 8:29:56 PM [com.sun.xml.ws.policy.parser.PolicyConfigParser] parse INFO: WSP5018: Loaded WSIT configuration from file: file:/home/test4u/anand/tango-3.5/tango/qe-tests/wstrust/interop/src/scenario1-s-m/etc/client-config/wsit-client.xml. Dec 9, 2010 8:29:56 PM com.sun.xml.ws.security.opt.impl.util.CertificateRetriever setServerCertInTheContext INFO: WSS0824: The certificate found in the server wsdl or by server cert property is valid, so using it --[HTTP request - https://yinyang.india.sun.com/Security_Federation_SecurityTokenService_Indigo/Symmetric.svc/Scenario_1_IssuedTokenOverTransport_UsernameOverTransport]-- Accept: application/soap+xml, multipart/related Content-Type: application/soap+xml; charset=utf-8;action="http://schemas.xmlsoap.org/ws/2005/02/trust/RST/Issue" User-Agent: Metro/2.1-b19 (trunk-6629; 2010-12-03T15:51:18+0000) JAXWS-RI/2.2.2-promoted-b02 JAXWS/2.2 <?xml version='1.0' encoding='UTF-8'?>https://yinyang.india.sun.com/Security_Federation_SecurityTokenService_Indigo/Symmetric.svc/Scenario_1_IssuedTokenOverTransport_UsernameOverTransport http://schemas.xmlsoap.org/ws/2005/02/trust/RST/Issue
[http://www.w3.org/2005/08/addressing/anonymous](http://www.w3.org/2005/08/addressing/anonymous)found key for : alice chain [0] = [ [ Version: V3 Subject: CN=Alice, OU=OASIS Interop Test Cert, O=OASIS Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5
Key: Sun RSA public key, 1024 bits modulus: 114223138481062383818743472854345446729415521820579721478671411120076686448918620302220709845014730631814478188984612465856840519852245805751892337820823145686311359090114506894126920369485682523288840662511969165284005936035859388250282090838456799125935768645086141305672131191153192376610593502582005436827 public exponent: 65537 Validity: [From: Sat Mar 19 05:30:00 IST 2005, To: Tue Mar 20 05:29:59 IST 2018] Issuer: CN=OASIS Interop Test CA, O=OASIS SerialNumber: [ 33a6047f b155631f ed672117 8150a899]
Certificate Extensions: 5 [1]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 0A E2 5D 13 50 76 75 41 5D D5 D9 0B 65 2C D0 E6 ..].PvuA]...e,.. 0010: F8 FA 31 88 ..1. ] ]
[2]: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: C0 9D 28 FC C1 EB 35 A1 1D D6 AA AA A0 1C 1A 4D ..(...5........M 0010: C2 49 0F 0F .I.. ]
]
[3]: ObjectId: 2.5.29.31 Criticality=false CRLDistributionPoints [ [ CRLIssuer:[URIName: http://interop.bbtest.net/crl/ca.crl] ]]
[4]: ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_Encipherment Data_Encipherment ]
[5]: ObjectId: 2.5.29.19 Criticality=false BasicConstraints:[ CA:false PathLen: undefined ]
] Algorithm: [SHA1withRSA] Signature: 0000: 05 3A A9 3A 9B D6 FB AC AB 2D 7C 94 94 FD B1 25 .:.:.....-.....% 0010: B1 24 A2 15 C7 23 93 96 C0 A5 A5 78 E6 FD 86 59 .$...#.....x...Y 0020: 21 5A 7B 54 6A 57 DC 14 E2 40 81 4C 87 DF 44 D3 !Z.TjW...@.L..D. 0030: A4 79 5D CF 1D 7E BC AD 8B 3F 38 68 50 52 98 1C .y]......?8hPR.. 0040: 4D 48 C9 0B E8 90 13 76 26 31 4E EB 80 50 BA 40 MH.....v&1N..P.@ 0050: 8A 9D 98 65 74 B4 4F C4 68 5F 91 37 71 42 07 5F ...et.O.h.7qB. 0060: E6 B0 8A FF 08 77 C5 5B 19 08 D4 DF B8 C3 66 94 .....w.[......f. 0070: 03 3A 94 E0 20 F1 07 6E 0D A8 77 58 56 69 10 0D .:.. ..n..wXVi.. 0080: 2C DA 7C 10 68 23 50 4C D3 23 24 2F 2D 6A FD 42 ,...h#PL.#$/-j.B 0090: 06 BE BE 13 91 40 9B 03 D7 3F BA 49 C6 7F 45 C3 .....@...?.I..E. 00A0: D3 97 47 2A 9B 44 0E 2F DB 2E D8 A5 B1 A4 1B 61 ..G*.D./.......a 00B0: 88 F5 4B CE 1F 0E 92 1A F7 F8 15 14 AD 84 C3 0E ..K............. 00C0: DF 96 1B A6 29 06 B0 B8 B1 DE F0 2C 5D 65 A2 E2 ....)......,]e.. 00D0: BC 1F 54 E6 33 40 AD 0E 14 F3 62 F5 13 02 51 D4 ..T.3@....b...Q. 00E0: 87 D3 A9 BD B8 B5 9C 92 20 B1 8E 8B 34 15 03 83 ........ ...4... 00F0: 64 4F 65 E0 04 C6 CB DB 3D 84 D5 70 AF 23 89 4F dOe.....=..p.#.O
]
trustStore is: ../../certs/xws-security/etc/client-truststore.jks trustStore type is : JKS trustStore provider is : init truststore adding as trusted cert: Subject: CN=WssIP, OU=OASIS Interop Test Cert, O=OASIS Issuer: CN=OASIS Interop Test CA, O=OASIS Algorithm: RSA; Serial number: 0x6fa53a6de7386475bde93e4dd80fcd75 Valid from Thu Oct 27 05:30:00 IST 2005 until Sun Oct 28 05:29:59 IST 2018
adding as trusted cert: Subject: CN=OASIS Interop Test CA, O=OASIS Issuer: CN=OASIS Interop Test Root, O=OASIS Algorithm: RSA; Serial number: 0x59a0b145edc835c494f15349e3f1deac Valid from Sat Mar 19 05:30:00 IST 2005 until Wed Mar 20 05:29:59 IST 2019
adding as trusted cert: Subject: CN=Bob, OU=OASIS Interop Test Cert, O=OASIS Issuer: CN=OASIS Interop Test CA, O=OASIS Algorithm: RSA; Serial number: 0x6038eedbfeac9bbec89d87d3abae71f8 Valid from Sat Mar 19 05:30:00 IST 2005 until Tue Mar 20 05:29:59 IST 2018
adding as trusted cert: Subject: CN=OASIS Interop Test Root, O=OASIS Issuer: CN=OASIS Interop Test Root, O=OASIS Algorithm: RSA; Serial number: 0x530867e26ba26a4436ecbca9f1cfb58d Valid from Sat Mar 19 05:30:00 IST 2005 until Fri Mar 20 05:29:59 IST 2020
trigger seeding of SecureRandom done seeding SecureRandom %% No cached client session
ClientHello, TLSv1 RandomCookie: GMT: 1291841004 bytes = { 103, 168, 118, 56, 249, 164, 209, 64, 139, 20, 205, 47, 166, 115, 130, 54, 80, 125, 131, 148, 242, 72, 146, 174, 220, 41, 218, 131 }
Session ID: {} Cipher Suites: [SSL_RSA_WITH_RC4_128_MD5, SSL_RSA_WITH_RC4_128_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_256_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_DES_CBC_SHA, SSL_DHE_RSA_WITH_DES_CBC_SHA, SSL_DHE_DSS_WITH_DES_CBC_SHA, SSL_RSA_EXPORT_WITH_RC4_40_MD5, SSL_RSA_EXPORT_WITH_DES40_CBC_SHA, SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA, SSL_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA] Compression Methods:
{ 0 }
main, WRITE: TLSv1 Handshake, length = 79 main, WRITE: SSLv2 client hello message, length = 107 main, READ: TLSv1 Handshake, length = 1784 *** ServerHello, TLSv1 RandomCookie: GMT: 1291841003 bytes = { 91, 232, 212, 4, 227, 2, 153, 71, 148, 99, 110, 173, 112, 23, 199, 196, 252, 219, 199, 83, 39, 238, 253, 215, 103, 140, 235, 32 } Session ID: {250, 13, 0, 0, 211, 195, 222, 219, 76, 37, 196, 180, 31, 240, 50, 52, 227, 212, 211, 229, 82, 53, 23, 181, 163, 25, 254, 14, 119, 149, 172, 22} Cipher Suite: TLS_RSA_WITH_AES_128_CBC_SHA Compression Method: 0
%% Created: [Session-1, TLS_RSA_WITH_AES_128_CBC_SHA] ** TLS_RSA_WITH_AES_128_CBC_SHA *** Certificate chain chain [0] = [ [ Version: V3 Subject: CN=Bob, OU=OASIS Interop Test Cert, O=OASIS Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5
Key: Sun RSA public key, 1024 bits modulus: 135295285768874163724858150895572108771303052544131111158491626858771419023556869986177194556598644010563047970383118260987442622257403553743505845304214998847674634607587725027593402879123660460192008702628353163941650161098799365056811528186823367899707404681618830609935129636702367727579605587436315509563 public exponent: 65537 Validity: [From: Sat Mar 19 05:30:00 IST 2005, To: Tue Mar 20 05:29:59 IST 2018] Issuer: CN=OASIS Interop Test CA, O=OASIS SerialNumber: [ 6038eedb feac9bbe c89d87d3 abae71f8]
Certificate Extensions: 5 [1]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 5D E8 39 E6 F4 72 2B 76 61 00 48 44 7F E6 13 D3 ].9..r+va.HD.... 0010: 3F 7C E8 BD ?... ] ]
[2]: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: C0 9D 28 FC C1 EB 35 A1 1D D6 AA AA A0 1C 1A 4D ..(...5........M 0010: C2 49 0F 0F .I.. ]
]
[3]: ObjectId: 2.5.29.31 Criticality=false CRLDistributionPoints [ [ CRLIssuer:[URIName: http://interop.bbtest.net/crl/ca.crl] ]]
[4]: ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_Encipherment Data_Encipherment ]
[5]: ObjectId: 2.5.29.19 Criticality=false BasicConstraints:[ CA:false PathLen: undefined ]
] Algorithm: [SHA1withRSA] Signature: 0000: 88 95 1A FD A5 18 B8 51 BE 63 00 1D 29 58 EE B2 .......Q.c..)X.. 0010: 8B 56 4B FE CC 45 2D 4B 28 34 F0 50 53 F3 3F D1 .VK..E-K(4.PS.?. 0020: 7A 95 1B B5 44 12 85 C2 2A C1 6B 1E 98 35 3C 25 z...D...*.k..5<% 0030: 5B 6C B9 C4 0B 73 E8 3A 18 24 17 82 40 A4 32 20 [l...s.:.$..@.2 0040: BC AA 17 0B 02 DD C1 5F 31 66 2F 1B 82 10 04 1E ......._1f/..... 0050: 78 57 BC 20 04 EB E3 00 02 98 44 04 DF B4 C4 A8 xW. ......D..... 0060: 0B 96 10 86 A7 3D 82 29 95 BC 58 83 03 F4 38 15 .....=.)..X...8. 0070: 81 4A 37 11 A4 A4 40 C6 31 33 BB 03 9B 62 36 E5 .J7...@.13...b6. 0080: 97 AB CA 74 51 D8 23 07 96 86 15 8F AD E7 EA B8 ...tQ.#......... 0090: 5A 7B 4D E7 D3 90 5E 03 DE B7 1C B5 37 D6 27 BE Z.M...^.....7.'. 00A0: 88 E4 DA C4 56 57 7E EC F0 67 9C 93 69 74 31 2E ....VW...g..it1. 00B0: 1A CA 1A 88 9A F0 4D 6D C8 C6 6E 34 45 7B C6 DD ......Mm..n4E... 00C0: F6 12 E2 12 00 3D E4 C2 52 4D D1 91 87 D4 92 A9 .....=..RM...... 00D0: 5A 68 B4 27 52 B1 76 85 94 A0 88 13 4B 3D EF 20 Zh.'R.v.....K=. 00E0: 1A 46 0E 45 C7 11 22 56 42 19 00 C4 A5 C5 A5 D5 .F.E.."VB....... 00F0: 47 FD 38 7C 3A 7C 2F B7 86 4A A8 94 57 79 09 52 G.8.:./..J..Wy.R
] chain [1] = [ [ Version: V3 Subject: CN=OASIS Interop Test CA, O=OASIS Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5
Key: Sun RSA public key, 2048 bits modulus: 19329019747028553711344162644964585726115527843677396096781862313559128229631964283749494866851372238853876909396402791809312519476540098710251648191746033177740255291471160376016063367998408154326373228751512109403653487620106704273932412782889409827485117182783266853040812949810279487667180254237863244355662888886436423141620853783322088346984595034189146741003032018565412302427230615787627970843328857722109377411801955952909029840272904225529876227736678841482735396444025700433332393577837139597021254966500533439306525779422366906892309541456608996480884012600945713312994295498219284728839491783360113279841 public exponent: 65537 Validity: [From: Sat Mar 19 05:30:00 IST 2005, To: Wed Mar 20 05:29:59 IST 2019] Issuer: CN=OASIS Interop Test Root, O=OASIS SerialNumber: [ 59a0b145 edc835c4 94f15349 e3f1deac]
Certificate Extensions: 5 [1]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: C0 9D 28 FC C1 EB 35 A1 1D D6 AA AA A0 1C 1A 4D ..(...5........M 0010: C2 49 0F 0F .I.. ] ]
[2]: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: DF FE 91 95 C7 56 48 26 3D C0 DC 39 3D C6 09 F7 .....VH&=..9=... 0010: 4C FA 48 E2 L.H. ]
]
[3]: ObjectId: 2.5.29.31 Criticality=false CRLDistributionPoints [ [ CRLIssuer:[URIName: http://interop.bbtest.net/crl/root.crl] ]]
[4]: ObjectId: 2.5.29.15 Criticality=true KeyUsage [ Key_CertSign Crl_Sign ]
[5]: ObjectId: 2.5.29.19 Criticality=true BasicConstraints:[ CA:true PathLen:0 ]
] Algorithm: [SHA1withRSA] Signature: 0000: 3B EC 38 63 A6 86 7C 63 C1 6D BE D9 CD 7B FD 6E ;.8c...c.m.....n 0010: E8 E0 1A 25 9A AA A5 54 5A 69 17 21 01 E2 95 1D ...%...TZi.!.... 0020: FA 4A 89 DD 71 62 C9 5C 70 79 5C 06 74 97 E9 51 .J..qb.\py.t..Q 0030: 02 CA 3F F2 81 CE 9A A8 E0 3D 75 B6 D3 1A 13 68 ..?......=u....h 0040: A8 6A DD 11 50 6C A5 02 5F 4F 1B FC 9A 94 E1 FF .j..Pl.._O...... 0050: BC C8 05 AB 85 E4 86 89 28 1C F3 C3 D6 D5 1B 8A ........(....... 0060: E6 3C FA 90 FE E6 35 D1 D0 D3 63 DB 9C AF EE 24 .<....5...c....$ 0070: AE B5 9E F1 03 B6 DC 33 1F 91 42 90 CE F4 CC E1 .......3..B..... 0080: 96 4D 37 49 9B 79 16 3B 0B AE 29 8B 88 43 AD 91 .M7I.y.;..)..C.. 0090: 39 01 B7 C1 B0 D7 00 AE DB 9D FE 06 DE 49 1D BA 9............I.. 00A0: 01 86 01 1A F6 14 E6 75 0D E1 62 A3 BF AB 9E 06 .......u..b..... 00B0: CA 69 9D FC DB 0D 0B 16 43 6D 4C 55 AA EF D7 CC .i......CmLU.... 00C0: 1C 59 7A BE 80 43 87 68 9A FE 5F 73 D7 9F 08 E9 .Yz..C.h.._s.... 00D0: 34 93 4E 9A 32 66 23 29 71 18 23 98 BD 3A AB AD 4.N.2f#)q.#..:.. 00E0: 5A EE 38 D9 95 C9 57 A9 67 58 A6 75 6A 41 62 FE Z.8...W.gX.ujAb. 00F0: C0 38 0C D9 D8 3E BC FC DB 9F A1 CC E7 9E B0 12 .8...>..........
]
Found trusted certificate: [ [ Version: V3 Subject: CN=Bob, OU=OASIS Interop Test Cert, O=OASIS Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5
Key: Sun RSA public key, 1024 bits modulus: 135295285768874163724858150895572108771303052544131111158491626858771419023556869986177194556598644010563047970383118260987442622257403553743505845304214998847674634607587725027593402879123660460192008702628353163941650161098799365056811528186823367899707404681618830609935129636702367727579605587436315509563 public exponent: 65537 Validity: [From: Sat Mar 19 05:30:00 IST 2005, To: Tue Mar 20 05:29:59 IST 2018] Issuer: CN=OASIS Interop Test CA, O=OASIS SerialNumber: [ 6038eedb feac9bbe c89d87d3 abae71f8]
Certificate Extensions: 5 [1]: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [ 0000: 5D E8 39 E6 F4 72 2B 76 61 00 48 44 7F E6 13 D3 ].9..r+va.HD.... 0010: 3F 7C E8 BD ?... ] ]
[2]: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ 0000: C0 9D 28 FC C1 EB 35 A1 1D D6 AA AA A0 1C 1A 4D ..(...5........M 0010: C2 49 0F 0F .I.. ]
]
[3]: ObjectId: 2.5.29.31 Criticality=false CRLDistributionPoints [ [ CRLIssuer:[URIName: http://interop.bbtest.net/crl/ca.crl] ]]
[4]: ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Key_Encipherment Data_Encipherment ]
[5]: ObjectId: 2.5.29.19 Criticality=false BasicConstraints:[ CA:false PathLen: undefined ]
] Algorithm: [SHA1withRSA] Signature: 0000: 88 95 1A FD A5 18 B8 51 BE 63 00 1D 29 58 EE B2 .......Q.c..)X.. 0010: 8B 56 4B FE CC 45 2D 4B 28 34 F0 50 53 F3 3F D1 .VK..E-K(4.PS.?. 0020: 7A 95 1B B5 44 12 85 C2 2A C1 6B 1E 98 35 3C 25 z...D...*.k..5<% 0030: 5B 6C B9 C4 0B 73 E8 3A 18 24 17 82 40 A4 32 20 [l...s.:.$..@.2 0040: BC AA 17 0B 02 DD C1 5F 31 66 2F 1B 82 10 04 1E ......._1f/..... 0050: 78 57 BC 20 04 EB E3 00 02 98 44 04 DF B4 C4 A8 xW. ......D..... 0060: 0B 96 10 86 A7 3D 82 29 95 BC 58 83 03 F4 38 15 .....=.)..X...8. 0070: 81 4A 37 11 A4 A4 40 C6 31 33 BB 03 9B 62 36 E5 .J7...@.13...b6. 0080: 97 AB CA 74 51 D8 23 07 96 86 15 8F AD E7 EA B8 ...tQ.#......... 0090: 5A 7B 4D E7 D3 90 5E 03 DE B7 1C B5 37 D6 27 BE Z.M...^.....7.'. 00A0: 88 E4 DA C4 56 57 7E EC F0 67 9C 93 69 74 31 2E ....VW...g..it1. 00B0: 1A CA 1A 88 9A F0 4D 6D C8 C6 6E 34 45 7B C6 DD ......Mm..n4E... 00C0: F6 12 E2 12 00 3D E4 C2 52 4D D1 91 87 D4 92 A9 .....=..RM...... 00D0: 5A 68 B4 27 52 B1 76 85 94 A0 88 13 4B 3D EF 20 Zh.'R.v.....K=. 00E0: 1A 46 0E 45 C7 11 22 56 42 19 00 C4 A5 C5 A5 D5 .F.E.."VB....... 00F0: 47 FD 38 7C 3A 7C 2F B7 86 4A A8 94 57 79 09 52 G.8.:./..J..Wy.R
] ServerHelloDone ClientKeyExchange, RSA PreMasterSecret, TLSv1 main, WRITE: TLSv1 Handshake, length = 134 SESSION KEYGEN: PreMaster Secret: 0000: 03 01 DB 28 46 4C 83 CF BE 42 D7 0A 01 47 5C 46 ...(FL...B...G\F 0010: 04 12 3A 43 37 7C 80 49 76 29 F5 5B 9E 0D 5F 3C ..:C7..Iv).[.._< 0020: 0C 13 EF F2 12 80 1C E2 53 29 02 6C 17 C0 30 4C ........S).l..0L CONNECTION KEYGEN: Client Nonce: 0000: 4D 00 EE EC 67 A8 76 38 F9 A4 D1 40 8B 14 CD 2F M...g.v8...@.../ 0010: A6 73 82 36 50 7D 83 94 F2 48 92 AE DC 29 DA 83 .s.6P....H...).. Server Nonce: 0000: 4D 00 EE EB 5B E8 D4 04 E3 02 99 47 94 63 6E AD M...[......G.cn. 0010: 70 17 C7 C4 FC DB C7 53 27 EE FD D7 67 8C EB 20 p......S'...g.. Master Secret: 0000: F1 E0 96 83 7B E4 39 7A 2E 64 FA E2 8F 7A AB CD ......9z.d...z.. 0010: 2F B9 A6 E9 4A 29 EB BC 55 BC A0 94 98 6E 98 CC /...J)..U....n.. 0020: 8A 4B 88 23 BA 59 95 2B 81 D0 FF 0C 89 D1 03 80 .K.#.Y.+........ Client MAC write Secret: 0000: 57 44 6D 40 1B 70 F1 05 FF D6 ED EF 60 AA C7 82 WDm@.p......`... 0010: 03 28 D0 81 .(.. Server MAC write Secret: 0000: 4B F4 19 81 0C F0 3D 37 7F 48 20 1B FE 56 6F AE K.....=7.H ..Vo. 0010: 70 09 81 55 p..U Client write key: 0000: 2B 24 EC 70 14 81 BD 9C A9 37 3D E5 ED 40 34 8C +$.p.....7=..@4. Server write key: 0000: 0A 57 6B 6D BC CE F2 47 F4 C3 2F 2D 06 B8 6C D8 .Wkm...G../-..l. Client write IV: 0000: 5A 7E 2B 76 6F B6 24 48 97 65 88 20 CB 5E AD 5A Z.+vo.$H.e. .^.Z Server write IV: 0000: DC A9 E2 33 8D 31 42 2F 8F C3 79 5B 23 87 CB 82 ...3.1B/..y[#... main, WRITE: TLSv1 Change Cipher Spec, length = 1 *** Finished verify_data: { 158, 170, 232, 56, 154, 241, 227, 99, 49, 217, 241, 250 }
main, WRITE: TLSv1 Handshake, length = 48 main, READ: TLSv1 Change Cipher Spec, length = 1 main, READ: TLSv1 Handshake, length = 48 *** Finished verify_data: { 156, 5, 9, 18, 189, 129, 43, 235, 75, 87, 143, 156 }
%% Cached client session: [Session-1, TLS_RSA_WITH_AES_128_CBC_SHA] main, WRITE: TLSv1 Application Data, length = 512 main, WRITE: TLSv1 Application Data, length = 3296 main, READ: TLSv1 Application Data, length = 7200 --[HTTP response - https://yinyang.india.sun.com/Security_Federation_SecurityTokenService_Indigo/Symmetric.svc/Scenario_1_IssuedTokenOverTransport_UsernameOverTransport - 200]-- null: HTTP/1.1 200 OK Content-Length: 6993 Content-Type: application/soap+xml; charset=utf-8 Date: Thu, 09 Dec 2010 14:59:55 GMT Server: Microsoft-IIS/7.0 X-Powered-By: ASP.NEThttp://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/Issue</a:Action>uuid:7622efb6-57a0-49cf-a624-38bc07cf0264</a:RelatesTo>a6164eed-fe32-4787-ab49-bd752ce48f2c 2010-12-09T14:59:55.583Z</u:Created>2010-12-09T15:04:55.583Z</u:Expires></u:Timestamp></o:Security></s:Header>urn:oasis:names:tc:SAML:1.0:assertion</wst:TokenType></e:EncryptionMethod></e:EncryptionMethod>Xeg55vRyK3ZhAEhEf+YT0z986L0=</o:KeyIdentifier></o:SecurityTokenReference> Lq1Ngv73zXg8vlMUnN0l5vMu5QJa00pmb2TpD0mvE11RY/UdoLEJVzO9QhAwe1vPkG2j4Zz4sT97/l8zvpsp0RBPs9TtitRe48W31kCTnuThYy3ZMf7X7XJQahqEv2sZPFp6ILOW8jUGtCuq+jL4Kkvmqtb/sOQtfwJM5KytPoQ=</e:CipherValue></e:CipherData></e:EncryptedKey> 1BapIQEwpIq2bNRSdPAWZwzZ6sAfY6ieaU4rUKrBUzcWPv3aVHwaTpS88ICzBh7eCXFcGpmZUWvhfJVQOQwtlG6PZigeDgv93b6FGj83bbjcr154EOi1oPl19Y+nZFMWhzeroECCF2+aWlGzo9ZTbgWw2fJpdVRINdJmVfJ1YjzaNBodUKHNIq9aOanD3C4N6kqoR3G6qzWOyLtbzVvVrzJJCe7b6xiPgN2UjL7HaZOFVcow5m52JinVtzND997JKeI+Rj+G2p+a0HSlHTbeUX9gREIjRxPR+xM6edfOJX63TN57VEEd1LWorKPiZgBPkR8gRg9uICo969ZOlCo2CAi+KnWA6cF8vkzR2c9lB8YxtaEFP30eCaWRFbINzRKQugMFzi9bUc1yXd8Sfe+wHKxCjW+HSXi17qpbAY25tVYY22TkDz4Jkjxrv6tjqk3e+cItp58yyUQy0nT1bS4dR78F8VMfL6/UUmoBjEI34XDDJuPshpndlyInuq3e66b+dwqhJBE7lnSbuOf65IT0uh+c0CsWIE9XNtm6/IDA0V+gs6CUaaCpSADFtna0KMynN2LGLdfk5wck2/wdmPDbGyZb+UKnhMt4ynu4lLk/UXDHw7/KbF7fWcPakGYfkCLmaO/5X/GqgcIyjhAGAef8jPtJs4+6U0o2Cufz2NOOUgvj8+9JjvZp9MgcdA2+8oOQemFs2RmXhmp4exvf74AQ8AJ9uAzDOJWkBx0fSDU5qLf3iEspqXdKwQkOgNOwOLr+26YQekwNWJ++ontQZyqy3TlWJdzRxb0jQrefkjfkZBnAsDpPJTTg39+JfqZg6EkK8mOv+h1ywO7elSSnphfGqtayyNhmBvoGxRixSvDYrbRNZEz9szzego1rAmXE0cZOAfUT0c2xOoavYDcYHBGTZqGGJA6TbTDOYRoQFYv7roT4p1iJkk16OrvD17svRQcAtBlYI14EKQkFdjeBT5Pg5xLFDv6js/bYh49ypZBARzgON4qUNrfMZAnPoYYuAP5aXgE+qCseRyvn3CIeuiJBQGm0uMKkYSJ5F3N0TYhJ6j+iYc16O7IfuE+4YOt5PGmzwtLG7H+pQSevDLzVH9SvT//yMDXcGw4TIiTzDY/2I5QG6LKX9D9kCBxUkAL457KEj0DhdrtzpzQucHofJHMJkv17/dU6UnRnXohBI7lzLn9au4+menv3Rs0ousEm8Syn+75MUvxff9nNQBRlALmVTvCDLkYcJVhrhh8ay0Q29wGoFqAesNUu7m8r6m8DpuMVWlsf6W992kXokZyakwlpaJxrv6VZNrIVzzKhBtf5wZhF5WCvybnThF3U0P+j8m01KN+FfzyxBDlqcZI6q8XTutYTO8CRDhUKGHCad9GZ5aNiafHrdPEKPvTlKf+4BFDFIX7xEIlaktsvmw+WyNArtgnz3/CaifUPqls2TbSwukCp/OaMUOyhlUVRBIpID4QrZv4qAxwujlN8PN5jhyYuhRRjDrNy3CSS6ldMILHaqPuwPOlzXJBYQenK+n04hxVO25S+wx6Z4CzIquxPbouYA9Erqp95t+qwMxNxIBvgS9j5ZKtL2pIV76tNCYYMk0PSiFI0SspL/e1VYnRpT11HQoF8vTfPhb7hlhg5aX8afFie6Cnd1OInpoiItKWRkVYufe/tVlNC7I+4Gz1pvaWcgtNQGPrKzDUYR4e95Sc/CYWpum66Sguqp80n2TnQ1c6Jf0/yyHnARj8PjQhutdcyqtoYDQSzacohR8GFIuHlNGkzSFhCZojGsQav8bFCVB2C9F2AeZ2j9E1z9yOPTVm0LqPVwvgxt/vZcquuvXoIRshC4d/PLz/IO/5ZDVox3WBPiJdYaSg8A8fEahACKjL/qfAajJP8xYoiUa2WlR9Z2BaiaHpIeIPyJQThgZe9P9Qh5MFKB91BaMND34giJOU7Hii5ucoBd1pXc74C6MKnY/AbTczaocSiattJKgLeXVWT0FYcg7Q7cXy+U5xhh7kvhAAyjRqFjMRFOnJH65YimteSle2vqB/aQV8XM5j7Qf8f0agz8zlbeBVa9c8HEDZYQOvYwsooWkkt9mUZemVSdfBIKuPO8J+6ysXZDyonbYH3+NRCtv5Xbj6jCI1JKM3mo/pd2/ZHsXMnJT9Y6CFREahix0k3S3j66f4S3Mjw4tYZ+S+p7OJIuEv1t+XMmK5qrwRTw1bx1kxW1luqwu6PUlpVO67oj7U4MaUQWm8jQE4v3Y5Iq0jXl0flP+V9OBSLou8fcE2Y9SgT3zH//LSdxdkSEhWnLXjjsYN+yveDpTZfpL8yrv5eRe0ALzFnDgC8F5v2btJiQK1lUxLN6op+MCBfoBGV9TLVvhLCWCcOyTiZT8TLlqFRGHnx3uDQDrXVYRZOPISTZHrZTT0ceA8p8O46mcclezq24H6VeEo6sFMv8qUJBdK5rahvP/J36CsdcMdKv94ZUXzqdvW2G1QXethUJlIqZ//omH3WMeyqhWfz/Ac/rhd+XIvbRpZeLreDl/U5YYqI+kVS1oPCmcIKZmjeFxXw//ax3C5a1h/XYVO5v4f4mdwYjM4KwUeYVC9crKZJ9Ypse0sopLSUf6mpBURVexi3enPtLiN6W0G0FPwMqb4S7/fPFAPTdmfDQxRKxJYFH8KAI18AIerUNkjSwmX/VbbrFR/vyFpfalirTabqEvq72p1OfFbfXeEFufCB2WhAQF4c2PU2udMRQ3whZYBCjz+AaXWVAViDTVPD3SONnD/iCbflkrFv/pF5uBtWjjKOltSNE9TAdTc1XGfzrCRG5e7yXvPZmne2MW7TnKwncXfQ7HSAdbGdpIqhSYVUN9KhEBrybvGbYpmqK5HH8AUPlwvh+o8Vs9Ha53I9mOgx512hnIgDCPKse4ZYUCAFvhYC9c6f4xJgYGnwGcQpqGi3A83ik+Xvgd7GvoipCE7QBohdNf9v6cbZITBCM53UcWF9jDPb5PeP7dFqIx7b+hq4MewcAJ1fHB8M8sMzHe3gTl5JcQepCxnDwuWfXKO3PvR1naI/OtS0XB4v7qpUOswmxCJcs8fAEYY1HAJ1i7ncKNevN4OM981SvMqTOLmpTbE1bg7VTRRtbCKr4JWqj5qwghPCYn6h3znI5NKxIICY</e:CipherValue></e:CipherData></e:EncryptedData></wst:RequestedSecurityToken>https://yinyang.india.sun.com/Security_Federation_FederatedService_Indigo/Symmetric.svc/Scenario_1_IssuedTokenOverTransport_UsernameOverTransport </wsp:AppliesTo>saml-73</o:KeyIdentifier></o:SecurityTokenReference></wst:RequestedAttachedReference>saml-73</o:KeyIdentifier></o:SecurityTokenReference></wst:RequestedUnattachedReference>http://schemas.xmlsoap.org/ws/2005/02/trust/CK/PSHA1</wst:ComputedKey></wst:RequestedProofToken>hjDF8A/XBA6dUdle6VYyyI9CfgAhNQwdvZaCAuhm9yw=</wst:BinarySecret></wst:Entropy>2010-12-09T14:59:55.552Z</wsu:Created>2010-12-10T02:59:55.552Z</wsu:Expires></wst:Lifetime>256</wst:KeySize></wst:RequestSecurityTokenResponse></s:Body></s:Envelope>--------------------
--[HTTP request - https://yinyang.india.sun.com:443/Security_Federation_FederatedService_Indigo/Symmetric.svc/Scenario_1_IssuedTokenOverTransport_UsernameOverTransport]--
Accept: application/soap+xml, multipart/related
Content-Type: application/soap+xml; charset=utf-8;action="http://xmlsoap.org/Ping"
User-Agent: Metro/2.1-b19 (trunk-6629; 2010-12-03T15:51:18+0000) JAXWS-RI/2.2.2-promoted-b02 JAXWS/2.2
<?xml version='1.0' encoding='UTF-8'?>https://yinyang.india.sun.com:443/Security_Federation_FederatedService_Indigo/Symmetric.svc/Scenario_1_IssuedTokenOverTransport_UsernameOverTransport http://xmlsoap.org/Ping
[http://www.w3.org/2005/08/addressing/anonymous](http://www.w3.org/2005/08/addressing/anonymous)main, WRITE: TLSv1 Handshake, length = 111 main, READ: TLSv1 Handshake, length = 74
ServerHello, TLSv1 RandomCookie: GMT: 1291841003 bytes = { 158, 11, 27, 220, 171, 255, 160, 108, 138, 200, 137, 82, 226, 63, 15, 237, 9, 128, 95, 209, 170, 138, 158, 200, 239, 83, 157, 146 }
Session ID:
{250, 13, 0, 0, 211, 195, 222, 219, 76, 37, 196, 180, 31, 240, 50, 52, 227, 212, 211, 229, 82, 53, 23, 181, 163, 25, 254, 14, 119, 149, 172, 22}
Cipher Suite: TLS_RSA_WITH_AES_128_CBC_SHA Compression Method: 0
CONNECTION KEYGEN: Client Nonce: 0000: 4D 00 EE ED C4 F0 8E 1E 3E 22 C6 77 77 D4 DB FC M.......>".ww... 0010: 82 53 F3 F0 3F 42 F2 84 E8 57 B6 06 71 51 B1 CA .S..?B...W..qQ.. Server Nonce: 0000: 4D 00 EE EB 9E 0B 1B DC AB FF A0 6C 8A C8 89 52 M..........l...R 0010: E2 3F 0F ED 09 80 5F D1 AA 8A 9E C8 EF 53 9D 92 .?...._......S.. Master Secret: 0000: F1 E0 96 83 7B E4 39 7A 2E 64 FA E2 8F 7A AB CD ......9z.d...z.. 0010: 2F B9 A6 E9 4A 29 EB BC 55 BC A0 94 98 6E 98 CC /...J)..U....n.. 0020: 8A 4B 88 23 BA 59 95 2B 81 D0 FF 0C 89 D1 03 80 .K.#.Y.+........ Client MAC write Secret: 0000: 92 D7 B4 E5 CD BB 3D DC 07 9D EE 70 A9 56 1B 42 ......=....p.V.B 0010: 9D 55 7F 0A .U.. Server MAC write Secret: 0000: 2E E9 FA E2 EE D5 29 77 4E 8A 2C 0A BB 4E 4E 6A ......)wN.,..NNj 0010: 78 85 72 60 x.r` Client write key: 0000: 46 5E 98 CA 3F F1 59 9A B6 2C FB F1 62 CF B4 16 F^..?.Y..,..b... Server write key: 0000: 11 FE 86 16 2B 8F 3E 21 C2 7A 24 6E 70 FD A7 E6 ....+.>!.z$np... Client write IV: 0000: C8 3C 13 5B 2B 52 8A FB 1E 18 61 FF DA 8B 7D 3A .<.[+R....a....: Server write IV: 0000: 35 74 46 56 42 FF 1E 12 E4 13 0C 00 DA 27 EE 8D 5tFVB........'.. %% Server resumed [Session-1, TLS_RSA_WITH_AES_128_CBC_SHA] main, READ: TLSv1 Change Cipher Spec, length = 1 main, READ: TLSv1 Handshake, length = 48
Finished verify_data: { 160, 8, 84, 184, 173, 136, 228, 180, 233, 198, 230, 12 }
main, WRITE: TLSv1 Change Cipher Spec, length = 1
Finished verify_data: { 89, 163, 115, 40, 63, 29, 31, 2, 209, 132, 15, 10 }
main, WRITE: TLSv1 Handshake, length = 48 main, WRITE: TLSv1 Application Data, length = 480 main, WRITE: TLSv1 Application Data, length = 7216 main, READ: TLSv1 Application Data, length = 864 --[HTTP response - https://yinyang.india.sun.com:443/Security_Federation_FederatedService_Indigo/Symmetric.svc/Scenario_1_IssuedTokenOverTransport_UsernameOverTransport - 500]-- null: HTTP/1.1 500 Internal Server Error Content-Length: 644 Content-Type: application/soap+xml; charset=utf-8 Date: Thu, 09 Dec 2010 14:59:55 GMT Server: Microsoft-IIS/7.0 X-Powered-By: ASP.NEThttp://www.w3.org/2005/08/addressing/soap/fault</a:Action>uuid:08deebd0-6d99-4d04-87f1-1e91cd8011ce</a:RelatesTo></s:Header>s:Sender</s:Value>a:InvalidSecurity</s:Value></s:Subcode></s:Code>An error occurred when verifying security for the message.</s:Text></s:Reason></s:Fault></s:Body></s:Envelope>--------------------
========================================================== ../../../interop/logs/run_log/scenario1-s-m-output.txt
javax.xml.ws.soap.SOAPFaultException: An error occurred when verifying security for the message.
at com.sun.xml.ws.fault.SOAP12Fault.getProtocolException(SOAP12Fault.java:229)
at com.sun.xml.ws.fault.SOAPFaultBuilder.createException(SOAPFaultBuilder.java:126)
at com.sun.xml.ws.client.sei.SyncMethodHandler.invoke(SyncMethodHandler.java:123)
at com.sun.xml.ws.client.sei.SyncMethodHandler.invoke(SyncMethodHandler.java:93)
at com.sun.xml.ws.client.sei.SEIStub.invoke(SEIStub.java:144)
at $Proxy40.ping(Unknown Source)
at simple.client.PingServiceClientMS.main(PingServiceClientMS.java:62)
Affected Versions
[2.1]